Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

XP Defender "Pro" Virus/Malware


  • This topic is locked This topic is locked
16 replies to this topic

#1 Kaboobie

Kaboobie

  • Members
  • 15 posts
  • OFFLINE
  •  
  • Local time:09:45 AM

Posted 16 March 2010 - 02:50 PM

Yesterday I was surfing deviantart and froze, page shut down then I got this "XP Defender Pro" popping up with trojan warnings everywhere.
It totally blocked my IE and anti-virus program (only Avast! at the time). I used an old PC to find info and attempt a clean. So far I have used Malwarebytes (in safe mode only), Super Anti-Spyware & SpyBots S&D. I lost function of all exe files so had to use the exefix_xp to get those working. Everything seemed to be ok, but I am finding sometimes, generally when I very first open IE, I am being re-drected in my browser so its obviously still there somewhere. I had reverted back to the old IE 6 (I know, shoot me) because I cant stand IE 8 and was seeking something else before updating to SP3 which I was always told was crap. TOO slow obviously and I have no idea. sad.gif P.S Now all the anti-spyware things are all running at once and I dont know which ones to turn off or leave on LOL. EDIT: Ive removed my old HJT log and pasted the newest DDS log & HJT log I've just done now. Still getting occasional browser hijacks, no trojan popups. GMER absolutely will NOT work for me.Please suggest something else if we have to go that way, wasted 8 hours on that thing sad.gif


DDS (Ver_09-12-01.01) - NTFSx86
Run by Kellie at 5:28:24.71 on Thu 18/03/2010
Internet Explorer: 6.0.2900.2180
Microsoft Windows XP Professional 5.1.2600.2.1252.1.1033.18.3583.3082 [GMT 11:00]

AV: avast! antivirus 4.8.1351 [VPS 100317-0] *On-access scanning enabled* (Updated) {7591DB91-41F0-48A3-B128-1A293FD8233D}

============== Running Processes ===============

C:\WINDOWS\system32\nvsvc32.exe
C:\WINDOWS\system32\svchost -k DcomLaunch
svchost.exe
C:\WINDOWS\System32\svchost.exe -k netsvcs
svchost.exe
svchost.exe
C:\Program Files\Alwil Software\Avast4\aswUpdSv.exe
C:\Program Files\Alwil Software\Avast4\ashServ.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\RTHDCPL.EXE
C:\PROGRA~1\ALWILS~1\Avast4\ashDisp.exe
C:\WINDOWS\system32\RUNDLL32.EXE
C:\Program Files\Java\jre6\bin\jusched.exe
C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
C:\WINDOWS\system32\spoolsv.exe
svchost.exe
C:\Program Files\Java\jre6\bin\jqs.exe
C:\Program Files\Common Files\LightScribe\LSSrvc.exe
C:\WINDOWS\system32\HPZipm12.exe
C:\WINDOWS\system32\svchost.exe -k imgsvc
C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe
C:\Program Files\Alwil Software\Avast4\ashWebSv.exe
C:\WINDOWS\system32\wuauclt.exe
C:\Documents and Settings\Kellie\Desktop\dds.scr

============== Pseudo HJT Report ===============

uStart Page = hxxp://www.google.com.au/ig?hl=en&source=iglk
BHO: Adobe PDF Reader Link Helper: {06849e9f-c8d7-4d59-b87d-784b7d6be0b3} - c:\program files\common files\adobe\acrobat\activex\AcroIEHelper.dll
BHO: {5C255C8A-E604-49b4-9D64-90988571CECB} - No File
BHO: Windows Live Sign-in Helper: {9030d464-4c02-4abf-8ecc-5164760863c6} - c:\program files\common files\microsoft shared\windows live\WindowsLiveLogin.dll
BHO: Java™ Plug-In 2 SSV Helper: {dbc80044-a445-435b-bc74-9c25c1c588a9} - c:\program files\java\jre6\bin\jp2ssv.dll
BHO: JQSIEStartDetectorImpl Class: {e7e6f031-17ce-4c07-bc86-eabfe594f69c} - c:\program files\java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll
uRun: [SUPERAntiSpyware] c:\program files\superantispyware\SUPERAntiSpyware.exe
mRun: [RTHDCPL] RTHDCPL.EXE
mRun: [Alcmtr] ALCMTR.EXE
mRun: [NBKeyScan] "c:\program files\nero\nero8\nero backitup\NBKeyScan.exe"
mRun: [avast!] c:\progra~1\alwils~1\avast4\ashDisp.exe
mRun: [NeroFilterCheck] c:\program files\common files\nero\lib\NeroCheck.exe
mRun: [QuickTime Task] "c:\program files\quicktime\qttask.exe" -atboottime
mRun: [nwiz] nwiz.exe /installquiet
mRun: [NvCplDaemon] RUNDLL32.EXE c:\windows\system32\NvCpl.dll,NvStartup
mRun: [NvMediaCenter] RUNDLL32.EXE c:\windows\system32\NvMcTray.dll,NvTaskbarInit
mRun: [Malwarebytes Anti-Malware (reboot)] "c:\program files\malwarebytes' anti-malware\mbam.exe" /runcleanupscript
mRun: [SunJavaUpdateSched] "c:\program files\java\jre6\bin\jusched.exe"
mRun: [AdobeCS4ServiceManager] "c:\program files\common files\adobe\cs4servicemanager\CS4ServiceManager.exe" -launchedbylogin
IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe
DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} - hxxp://update.microsoft.com/microsoftupdate/v6/V5Controls/en/x86/client/wuweb_site.cab?1262913135109
DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} - hxxp://update.microsoft.com/microsoftupdate/v6/V5Controls/en/x86/client/muweb_site.cab?1262913104234
DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_15-windows-i586.cab
DPF: {CAFEEFAC-0016-0000-0015-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_15-windows-i586.cab
DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_15-windows-i586.cab
DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} - hxxp://download.macromedia.com/pub/shockwave/cabs/flash/swflash.cab
Notify: !SASWinLogon - c:\program files\superantispyware\SASWINLO.dll
SSODL: WPDShServiceObj - {AAA288BA-9A4C-45B0-95D7-94D524869DB5} - c:\windows\system32\WPDShServiceObj.dll
SEH: SABShellExecuteHook Class: {5ae067d3-9afb-48e0-853a-ebb7f4a000da} - c:\program files\superantispyware\SASSEH.DLL
mASetup: {10880D85-AAD9-4558-ABDC-2AB1552D831F} - "c:\program files\common files\lightscribe\LSRunOnce.exe"

============= SERVICES / DRIVERS ===============

R1 aswSP;avast! Self Protection;c:\windows\system32\drivers\aswSP.sys [2009-6-21 114768]
R1 SASDIFSV;SASDIFSV;c:\program files\superantispyware\sasdifsv.sys [2010-2-17 12872]
R1 SASKUTIL;SASKUTIL;c:\program files\superantispyware\SASKUTIL.SYS [2010-2-17 66632]
R2 aswFsBlk;aswFsBlk;c:\windows\system32\drivers\aswFsBlk.sys [2009-6-21 20560]
R2 avast! Antivirus;avast! Antivirus;c:\program files\alwil software\avast4\ashServ.exe [2009-6-21 138680]
R3 avast! Mail Scanner;avast! Mail Scanner;c:\program files\alwil software\avast4\ashMaiSv.exe [2009-6-21 254040]
R3 avast! Web Scanner;avast! Web Scanner;c:\program files\alwil software\avast4\ashWebSv.exe [2009-6-21 352920]
R3 SASENUM;SASENUM;c:\program files\superantispyware\SASENUM.SYS [2010-2-17 12872]
R3 VCSVADHWSer;Avnex Virtual Audio Device (WDM);c:\windows\system32\drivers\vcsvad.sys [2009-12-9 17792]

=============== Created Last 30 ================

2010-03-16 19:05:35 0 d-----w- c:\program files\Trend Micro
2010-03-16 06:58:34 0 d-----w- c:\program files\Spybot - Search & Destroy
2010-03-16 06:58:34 0 d-----w- c:\docume~1\alluse~1\applic~1\Spybot - Search & Destroy
2010-03-16 06:19:52 0 d-----w- c:\program files\SpywareBlaster
2010-03-16 03:47:29 0 d-----w- c:\docume~1\alluse~1\applic~1\SUPERAntiSpyware.com
2010-03-16 03:47:21 0 d-----w- c:\program files\SUPERAntiSpyware
2010-03-16 03:47:21 0 d-----w- c:\docume~1\kellie\applic~1\SUPERAntiSpyware.com
2010-03-16 02:52:50 0 d-----w- c:\docume~1\kellie\applic~1\Malwarebytes
2010-03-16 02:52:46 0 d-----w- c:\program files\Malwarebytes' Anti-Malware
2010-03-16 02:52:46 0 d-----w- c:\docume~1\alluse~1\applic~1\Malwarebytes
2010-03-16 02:30:20 0 d-----w- c:\program files\InterMute
2010-03-08 21:33:52 0 d-----w- c:\docume~1\alluse~1\applic~1\Avnex
2010-03-08 04:19:27 37474 ----a-w- c:\documents and settings\kellie\.recently-used.xbel
2010-03-07 01:11:54 0 d-----w- c:\docume~1\kellie\applic~1\ids
2010-03-07 01:11:47 0 d-----w- c:\program files\IDS
2010-03-06 21:03:29 0 d-----w- c:\docume~1\kellie\applic~1\Ambient Design
2010-03-06 21:01:27 0 d-----w- c:\program files\Ambient Design
2010-02-17 00:16:55 59264 -c--a-w- c:\windows\system32\dllcache\usbaudio.sys
2010-02-17 00:16:55 59264 ----a-w- c:\windows\system32\drivers\USBAUDIO.sys
2010-02-17 00:05:33 0 d-----w- C:\AV_LOGS
2010-02-17 00:02:20 0 d-----w- c:\docume~1\kellie\applic~1\Avnex
2010-02-17 00:02:00 0 d-----w- c:\program files\AV Vcs 7.0 DIAMOND

==================== Find3M ====================

2010-01-12 04:03:33 6359168 ----a-w- c:\windows\system32\nv4_disp.dll
2010-01-12 04:03:33 61440 ----a-w- c:\windows\system32\OpenCL.dll
2010-01-12 04:03:33 592488 -c--a-w- c:\windows\system32\nvudisp.exe
2010-01-12 04:03:33 4104192 ----a-w- c:\windows\system32\nvcuda.dll
2010-01-12 04:03:33 4077672 ----a-w- c:\windows\system32\nvcuvenc.dll
2010-01-12 04:03:33 2283526 ----a-w- c:\windows\system32\nvdata.bin
2010-01-12 04:03:33 2259560 ----a-w- c:\windows\system32\nvcuvid.dll
2010-01-12 04:03:33 182888 ----a-w- c:\windows\system32\nvcodins.dll
2010-01-12 04:03:33 182888 ----a-w- c:\windows\system32\nvcod.dll
2010-01-12 04:03:33 14458880 ----a-w- c:\windows\system32\nvoglnt.dll
2010-01-12 04:03:33 11632640 ----a-w- c:\windows\system32\nvcompiler.dll
2010-01-12 04:03:33 1081344 ----a-w- c:\windows\system32\nvapi.dll
2010-01-11 11:17:44 278120 ----a-w- c:\windows\system32\nvmccs.dll
2010-01-11 11:17:44 154216 ----a-w- c:\windows\system32\nvsvc32.exe
2010-01-11 11:17:44 145000 ----a-w- c:\windows\system32\nvcolor.exe
2010-01-11 11:17:44 13666408 ----a-w- c:\windows\system32\nvcpl.dll
2010-01-11 11:17:44 110696 ----a-w- c:\windows\system32\nvmctray.dll
2010-01-11 11:17:40 81920 ----a-w- c:\windows\system32\nvwddi.dll
2006-06-24 22:48:54 32768 -c--a-r- c:\windows\inf\UpdateUSB.exe

============= FINISH: 5:28:45.00 ===============

Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 5:29:46 AM, on 18/03/2010
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\nvsvc32.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Alwil Software\Avast4\aswUpdSv.exe
C:\Program Files\Alwil Software\Avast4\ashServ.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\RTHDCPL.EXE
C:\PROGRA~1\ALWILS~1\Avast4\ashDisp.exe
C:\WINDOWS\system32\RUNDLL32.EXE
C:\Program Files\Java\jre6\bin\jusched.exe
C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Java\jre6\bin\jqs.exe
C:\Program Files\Common Files\LightScribe\LSSrvc.exe
C:\WINDOWS\system32\HPZipm12.exe
C:\WINDOWS\system32\svchost.exe
C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe
C:\Program Files\Alwil Software\Avast4\ashWebSv.exe
C:\WINDOWS\system32\wuauclt.exe
C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelper.dll
O2 - BHO: (no name) - {5C255C8A-E604-49b4-9D64-90988571CECB} - (no file)
O2 - BHO: Windows Live Sign-in Helper - {9030D464-4C02-4ABF-8ECC-5164760863C6} - C:\Program Files\Common Files\Microsoft Shared\Windows Live\WindowsLiveLogin.dll
O2 - BHO: Java™ Plug-In 2 SSV Helper - {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Program Files\Java\jre6\bin\jp2ssv.dll
O2 - BHO: JQSIEStartDetectorImpl - {E7E6F031-17CE-4C07-BC86-EABFE594F69C} - C:\Program Files\Java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll
O4 - HKLM\..\Run: [RTHDCPL] RTHDCPL.EXE
O4 - HKLM\..\Run: [Alcmtr] ALCMTR.EXE
O4 - HKLM\..\Run: [NBKeyScan] "C:\Program Files\Nero\Nero8\Nero BackItUp\NBKeyScan.exe"
O4 - HKLM\..\Run: [avast!] C:\PROGRA~1\ALWILS~1\Avast4\ashDisp.exe
O4 - HKLM\..\Run: [NeroFilterCheck] C:\Program Files\Common Files\Nero\Lib\NeroCheck.exe
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\Run: [nwiz] nwiz.exe /installquiet
O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\system32\NvCpl.dll,NvStartup
O4 - HKLM\..\Run: [NvMediaCenter] RUNDLL32.EXE C:\WINDOWS\system32\NvMcTray.dll,NvTaskbarInit
O4 - HKLM\..\Run: [Malwarebytes Anti-Malware (reboot)] "C:\Program Files\Malwarebytes' Anti-Malware\mbam.exe" /runcleanupscript
O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre6\bin\jusched.exe"
O4 - HKLM\..\Run: [AdobeCS4ServiceManager] "C:\Program Files\Common Files\Adobe\CS4ServiceManager\CS4ServiceManager.exe" -launchedbylogin
O4 - HKCU\..\Run: [SUPERAntiSpyware] C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} (WUWebControl Class) - http://update.microsoft.com/microsoftupdat...b?1262913135109
O16 - DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} (MUWebControl Class) - http://update.microsoft.com/microsoftupdat...b?1262913104234
O20 - Winlogon Notify: !SASWinLogon - C:\Program Files\SUPERAntiSpyware\SASWINLO.dll
O23 - Service: avast! iAVS4 Control Service (aswUpdSv) - ALWIL Software - C:\Program Files\Alwil Software\Avast4\aswUpdSv.exe
O23 - Service: avast! Antivirus - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashServ.exe
O23 - Service: avast! Mail Scanner - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe
O23 - Service: avast! Web Scanner - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashWebSv.exe
O23 - Service: FLEXnet Licensing Service - Acresso Software Inc. - C:\Program Files\Common Files\Macrovision Shared\FLEXnet Publisher\FNPLicensingService.exe
O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
O23 - Service: iPodService - Apple Computer, Inc. - C:\Program Files\iPod\bin\iPodService.exe
O23 - Service: Java Quick Starter (JavaQuickStarterService) - Sun Microsystems, Inc. - C:\Program Files\Java\jre6\bin\jqs.exe
O23 - Service: LightScribeService Direct Disc Labeling Service (LightScribeService) - Hewlett-Packard Company - C:\Program Files\Common Files\LightScribe\LSSrvc.exe
O23 - Service: NMIndexingService - Nero AG - C:\Program Files\Common Files\Nero\Lib\NMIndexingService.exe
O23 - Service: NVIDIA Display Driver Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\system32\nvsvc32.exe
O23 - Service: Pml Driver HPZ12 - HP - C:\WINDOWS\system32\HPZipm12.exe

--
End of file - 5056 bytes

Please, any assistance would be appreciated smile.gif

Edited by Kaboobie, 17 March 2010 - 01:43 PM.


BC AdBot (Login to Remove)

 


#2 Kaboobie

Kaboobie
  • Topic Starter

  • Members
  • 15 posts
  • OFFLINE
  •  
  • Local time:09:45 AM

Posted 18 March 2010 - 10:42 PM

[b]Title was: Win32:Alureon-FR / Browser Hijacks / XP Defender, Each day a new one appears ~ OB

Started with XP Defender Pro killing everything. I posted about that but now it is esculating stupidly to new viruses so I am starting over. As before, I cannot run GMER and am writing this around Avast! warnings. Moving to chest does, obviously, nothing. Says its in the system32 drivers atapi. I am still being redirected on most internet sites, but not all. Ive since installed Zone Alarm (free) as well. I dont know whether to update my system now or after this crap is gone so Im waiting for info since I have no idea, and Im unsure if its even safe to use with this new one. I am pasting the latest DDS logs, I dont know what else you need since gmer wont run.


DDS (Ver_09-12-01.01) - NTFSx86
Run by Kellie at 14:25:11.56 on Fri 19/03/2010
Internet Explorer: 6.0.2900.2180
Microsoft Windows XP Professional 5.1.2600.2.1252.1.1033.18.3583.3062 [GMT 11:00]

AV: avast! antivirus 4.8.1351 [VPS 100318-1] *On-access scanning enabled* (Updated) {7591DB91-41F0-48A3-B128-1A293FD8233D}
FW: ZoneAlarm Firewall *enabled* {829BDA32-94B3-44F4-8446-F8FCFF809F8B}

============== Running Processes ===============

C:\WINDOWS\system32\nvsvc32.exe
C:\WINDOWS\system32\svchost -k DcomLaunch
svchost.exe
svchost.exe
svchost.exe
C:\WINDOWS\system32\ZoneLabs\vsmon.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\Alwil Software\Avast4\aswUpdSv.exe
C:\Program Files\CheckPoint\ZAForceField\IswSvc.exe
C:\Program Files\Alwil Software\Avast4\ashServ.exe
C:\Program Files\CheckPoint\ZAForceField\ForceField.exe
C:\WINDOWS\system32\spoolsv.exe
svchost.exe
C:\Program Files\Java\jre6\bin\jqs.exe
C:\Program Files\Common Files\LightScribe\LSSrvc.exe
C:\WINDOWS\system32\HPZipm12.exe
C:\WINDOWS\system32\svchost.exe -k imgsvc
C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe
C:\Program Files\Alwil Software\Avast4\ashWebSv.exe
C:\WINDOWS\RTHDCPL.EXE
C:\PROGRA~1\ALWILS~1\Avast4\ashDisp.exe
C:\WINDOWS\system32\RUNDLL32.EXE
C:\Program Files\Java\jre6\bin\jusched.exe
C:\Program Files\Zone Labs\ZoneAlarm\zlclient.exe
C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
C:\WINDOWS\system32\wuauclt.exe
C:\Program Files\Adobe\Reader 8.0\Reader\AcroRd32.exe
C:\WINDOWS\System32\svchost.exe -k netsvcs
C:\Program Files\Common Files\Adobe\Updater5\AdobeUpdater.exe
C:\Documents and Settings\Kellie\Desktop\dds.scr

============== Pseudo HJT Report ===============

uStart Page = hxxp://www.google.com.au/ig?hl=en&source=iglk
BHO: Adobe PDF Reader Link Helper: {06849e9f-c8d7-4d59-b87d-784b7d6be0b3} - c:\program files\common files\adobe\acrobat\activex\AcroIEHelper.dll
BHO: {5C255C8A-E604-49b4-9D64-90988571CECB} - No File
BHO: ZoneAlarm Toolbar Registrar: {8a4a36c2-0535-4d2c-bd3d-496cb7eed6e3} - c:\program files\checkpoint\zaforcefield\trustchecker\bin\TrustCheckerIEPlugin.dll
BHO: Windows Live Sign-in Helper: {9030d464-4c02-4abf-8ecc-5164760863c6} - c:\program files\common files\microsoft shared\windows live\WindowsLiveLogin.dll
BHO: Java™ Plug-In 2 SSV Helper: {dbc80044-a445-435b-bc74-9c25c1c588a9} - c:\program files\java\jre6\bin\jp2ssv.dll
BHO: JQSIEStartDetectorImpl Class: {e7e6f031-17ce-4c07-bc86-eabfe594f69c} - c:\program files\java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll
TB: ZoneAlarm Toolbar: {ee2ac4e5-b0b0-4ec6-88a9-bca1a32ab107} - c:\program files\checkpoint\zaforcefield\trustchecker\bin\TrustCheckerIEPlugin.dll
uRun: [SUPERAntiSpyware] c:\program files\superantispyware\SUPERAntiSpyware.exe
mRun: [RTHDCPL] RTHDCPL.EXE
mRun: [Alcmtr] ALCMTR.EXE
mRun: [NBKeyScan] "c:\program files\nero\nero8\nero backitup\NBKeyScan.exe"
mRun: [avast!] c:\progra~1\alwils~1\avast4\ashDisp.exe
mRun: [NeroFilterCheck] c:\program files\common files\nero\lib\NeroCheck.exe
mRun: [QuickTime Task] "c:\program files\quicktime\qttask.exe" -atboottime
mRun: [nwiz] nwiz.exe /installquiet
mRun: [NvCplDaemon] RUNDLL32.EXE c:\windows\system32\NvCpl.dll,NvStartup
mRun: [NvMediaCenter] RUNDLL32.EXE c:\windows\system32\NvMcTray.dll,NvTaskbarInit
mRun: [SunJavaUpdateSched] "c:\program files\java\jre6\bin\jusched.exe"
mRun: [AdobeCS4ServiceManager] "c:\program files\common files\adobe\cs4servicemanager\CS4ServiceManager.exe" -launchedbylogin
mRun: [ZoneAlarm Client] "c:\program files\zone labs\zonealarm\zlclient.exe"
mRun: [ISW] "c:\program files\checkpoint\zaforcefield\ForceField.exe" /icon="hidden"
IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe
DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} - hxxp://update.microsoft.com/microsoftupdate/v6/V5Controls/en/x86/client/wuweb_site.cab?1262913135109
DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} - hxxp://update.microsoft.com/microsoftupdate/v6/V5Controls/en/x86/client/muweb_site.cab?1262913104234
DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_15-windows-i586.cab
DPF: {CAFEEFAC-0016-0000-0015-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_15-windows-i586.cab
DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_15-windows-i586.cab
DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} - hxxp://download.macromedia.com/pub/shockwave/cabs/flash/swflash.cab
Notify: !SASWinLogon - c:\program files\superantispyware\SASWINLO.dll
SSODL: WPDShServiceObj - {AAA288BA-9A4C-45B0-95D7-94D524869DB5} - c:\windows\system32\WPDShServiceObj.dll
SEH: SABShellExecuteHook Class: {5ae067d3-9afb-48e0-853a-ebb7f4a000da} - c:\program files\superantispyware\SASSEH.DLL
mASetup: {10880D85-AAD9-4558-ABDC-2AB1552D831F} - "c:\program files\common files\lightscribe\LSRunOnce.exe"

============= SERVICES / DRIVERS ===============

R1 aswSP;avast! Self Protection;c:\windows\system32\drivers\aswSP.sys [2009-6-21 114768]
R1 SASDIFSV;SASDIFSV;c:\program files\superantispyware\sasdifsv.sys [2010-2-17 12872]
R1 SASKUTIL;SASKUTIL;c:\program files\superantispyware\SASKUTIL.SYS [2010-2-17 66632]
R1 vsdatant;vsdatant;c:\windows\system32\vsdatant.sys [2010-3-19 486280]
R2 aswFsBlk;aswFsBlk;c:\windows\system32\drivers\aswFsBlk.sys [2009-6-21 20560]
R2 avast! Antivirus;avast! Antivirus;c:\program files\alwil software\avast4\ashServ.exe [2009-6-21 138680]
R2 ISWKL;ZoneAlarm Toolbar ISWKL;c:\program files\checkpoint\zaforcefield\ISWKL.sys [2009-10-15 25208]
R2 IswSvc;ZoneAlarm Toolbar IswSvc;c:\program files\checkpoint\zaforcefield\ISWSVC.exe [2009-10-15 476528]
R2 vsmon;TrueVector Internet Monitor;c:\windows\system32\zonelabs\vsmon.exe -service --> c:\windows\system32\zonelabs\vsmon.exe -service [?]
R3 avast! Mail Scanner;avast! Mail Scanner;c:\program files\alwil software\avast4\ashMaiSv.exe [2009-6-21 254040]
R3 avast! Web Scanner;avast! Web Scanner;c:\program files\alwil software\avast4\ashWebSv.exe [2009-6-21 352920]
R3 SASENUM;SASENUM;c:\program files\superantispyware\SASENUM.SYS [2010-2-17 12872]
R3 VCSVADHWSer;Avnex Virtual Audio Device (WDM);c:\windows\system32\drivers\vcsvad.sys [2009-12-9 17792]

=============== Created Last 30 ================

2010-03-19 02:35:01 664 ----a-w- c:\windows\system32\d3d9caps.dat
2010-03-19 02:21:28 0 d-----w- c:\docume~1\kellie\applic~1\CheckPoint
2010-03-19 02:21:17 0 d-----w- c:\program files\CheckPoint
2010-03-19 02:21:16 4212 ---ha-w- c:\windows\system32\zllictbl.dat
2010-03-19 02:21:08 1238408 ----a-w- c:\windows\system32\zpeng25.dll
2010-03-19 02:21:08 0 d-----w- c:\windows\system32\ZoneLabs
2010-03-19 02:21:07 422437 ----a-w- c:\windows\system32\vsconfig.xml
2010-03-19 02:21:06 0 d-----w- c:\program files\Zone Labs
2010-03-19 02:20:28 0 d-----w- c:\windows\Internet Logs
2010-03-19 01:02:00 0 d-----w- c:\windows\system32\NtmsData
2010-03-18 01:53:37 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2010-03-18 01:53:35 19160 ----a-w- c:\windows\system32\drivers\mbam.sys
2010-03-16 19:05:35 0 d-----w- c:\program files\Trend Micro
2010-03-16 06:58:34 0 d-----w- c:\program files\Spybot - Search & Destroy
2010-03-16 06:58:34 0 d-----w- c:\docume~1\alluse~1\applic~1\Spybot - Search & Destroy
2010-03-16 06:19:52 0 d-----w- c:\program files\SpywareBlaster
2010-03-16 03:47:29 0 d-----w- c:\docume~1\alluse~1\applic~1\SUPERAntiSpyware.com
2010-03-16 03:47:21 0 d-----w- c:\program files\SUPERAntiSpyware
2010-03-16 03:47:21 0 d-----w- c:\docume~1\kellie\applic~1\SUPERAntiSpyware.com
2010-03-16 02:52:50 0 d-----w- c:\docume~1\kellie\applic~1\Malwarebytes
2010-03-16 02:52:46 0 d-----w- c:\program files\Malwarebytes' Anti-Malware
2010-03-16 02:52:46 0 d-----w- c:\docume~1\alluse~1\applic~1\Malwarebytes
2010-03-16 02:30:20 0 d-----w- c:\program files\InterMute
2010-03-08 21:33:52 0 d-----w- c:\docume~1\alluse~1\applic~1\Avnex
2010-03-08 04:19:27 37474 ----a-w- c:\documents and settings\kellie\.recently-used.xbel
2010-03-07 01:11:54 0 d-----w- c:\docume~1\kellie\applic~1\ids
2010-03-07 01:11:47 0 d-----w- c:\program files\IDS
2010-03-06 21:03:29 0 d-----w- c:\docume~1\kellie\applic~1\Ambient Design
2010-03-06 21:01:27 0 d-----w- c:\program files\Ambient Design

==================== Find3M ====================

2010-03-19 03:24:40 95360 ----a-w- c:\windows\system32\drivers\atapi.sys
2010-01-12 04:03:33 6359168 ----a-w- c:\windows\system32\nv4_disp.dll
2010-01-12 04:03:33 61440 ----a-w- c:\windows\system32\OpenCL.dll
2010-01-12 04:03:33 592488 -c--a-w- c:\windows\system32\nvudisp.exe
2010-01-12 04:03:33 4104192 ----a-w- c:\windows\system32\nvcuda.dll
2010-01-12 04:03:33 4077672 ----a-w- c:\windows\system32\nvcuvenc.dll
2010-01-12 04:03:33 2283526 ----a-w- c:\windows\system32\nvdata.bin
2010-01-12 04:03:33 2259560 ----a-w- c:\windows\system32\nvcuvid.dll
2010-01-12 04:03:33 182888 ----a-w- c:\windows\system32\nvcodins.dll
2010-01-12 04:03:33 182888 ----a-w- c:\windows\system32\nvcod.dll
2010-01-12 04:03:33 14458880 ----a-w- c:\windows\system32\nvoglnt.dll
2010-01-12 04:03:33 11632640 ----a-w- c:\windows\system32\nvcompiler.dll
2010-01-12 04:03:33 1081344 ----a-w- c:\windows\system32\nvapi.dll
2010-01-11 11:17:44 278120 ----a-w- c:\windows\system32\nvmccs.dll
2010-01-11 11:17:44 154216 ----a-w- c:\windows\system32\nvsvc32.exe
2010-01-11 11:17:44 145000 ----a-w- c:\windows\system32\nvcolor.exe
2010-01-11 11:17:44 13666408 ----a-w- c:\windows\system32\nvcpl.dll
2010-01-11 11:17:44 110696 ----a-w- c:\windows\system32\nvmctray.dll
2010-01-11 11:17:40 81920 ----a-w- c:\windows\system32\nvwddi.dll
2006-06-24 22:48:54 32768 -c--a-r- c:\windows\inf\UpdateUSB.exe

============= FINISH: 14:25:51.32 ===============

Attached File  Attach.txt   14.34KB   6 downloads

I also dont know whether to close my first topic, since thats where it all began sad.gif

Edited by Orange Blossom, 18 March 2010 - 11:21 PM.
Merged topics. ~ OB


#3 sempai

sempai

    noypi


  • Malware Response Team
  • 5,288 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:3 stars and a sun
  • Local time:06:45 AM

Posted 19 March 2010 - 09:06 AM

Hello Kaboobie my name is Sempai and welcome to Bleeping Computer. smile.gif
*We apologize for the delay. Forum have been busy.

* Please stay with me until I declare that your computer is clean as most users don't reply anymore once they found out that their computer is running smoothly, but absence of symptoms does not mean that a computer is free from infection.

*It is important not to make any further changes or run any other tools unless instructed to. This may hinder the cleaning process of your machine.

*Please be patient, all Bleeping Computer helpers are volunteers and have lives outside this forum.

*You must reply within 5 days otherwise this topic will be closed.




++++++++++++++++++++++++++


1. Download and run HAMeb_check.exe. Post the contents of the resulting log when you reply.



2. We Need to check for Rootkits with RootRepeal
  1. Download RootRepeal from the following location and save it to your desktop.
  2. Open on your desktop.
  3. Click the tab.
  4. Click the button.
  5. Check all seven boxes:
  6. Push Ok
  7. Check the box for your main system drive (Usually C:), and press Ok.
  8. Allow RootRepeal to run a scan of your system. This may take some time.
  9. Once the scan completes, push the button. Save the log to your desktop, using a distinctive name, such as RootRepeal.txt. Include this report in your next reply.


~Semp

~Semp

btn_donate_LG.gif
You can help me continue the fight against malware by making a donation, Thank you.

If I am helping you and I didn't reply within 48 hours... Please send me a private message.
Topics that are not replied within 5 days will be close. Please don't PM asking for support, post on the Forums instead.

Member of UNITE (Unified Network of Instructors and Trained Eliminators) 


#4 Kaboobie

Kaboobie
  • Topic Starter

  • Members
  • 15 posts
  • OFFLINE
  •  
  • Local time:09:45 AM

Posted 19 March 2010 - 02:00 PM

Hi Sempai, thanks for your reply smile.gif Here are the logs requested.



C:\Documents and Settings\Kellie\Desktop\HAMeb_check.exe
Sat 20/03/2010 at 5:41:57.57

Full Name Remote Desktop Help Assistant Account
Account active No
Local Group Memberships

~~ Checking profile list ~~

No HelpAssistant profile in List

~~ Checking for HelpAssistant directories ~~

none found

~~ Checking mbr ~~

Stealth MBR rootkit/Mebroot/Sinowal detector 0.3.7 by Gmer, http://www.gmer.net

device: opened successfully
user: MBR read successfully
called modules: ntkrnlpa.exe CLASSPNP.SYS disk.sys ACPI.sys hal.dll >>UNKNOWN [0x8B43BCA1]<<
kernel: MBR read successfully
user & kernel MBR OK

~~ Checking for termsrv32.dll ~~

termsrv32.dll was not found


HKEY_LOCAL_MACHINE\system\currentcontrolset\services\termservice\parameters
ServiceDll REG_EXPAND_SZ %SystemRoot%\System32\termsrv.dll

~~ Checking firewall ports ~~

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\DomainProfile\GloballyOpenPorts\List]

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\GloballyOpenPorts\List]


~~ EOF ~~

ROOTREPEAL © AD, 2007-2009
==================================================
Scan Start Time: 2010/03/20 05:45
Program Version: Version 1.3.5.0
Windows Version: Windows XP SP2
==================================================

Drivers
-------------------
Name: mbr.sys
Image Path: C:\DOCUME~1\Kellie\LOCALS~1\Temp\mbr.sys
Address: 0xAD321000 Size: 20864 File Visible: No Signed: -
Status: -

Name: rootrepeal.sys
Image Path: C:\WINDOWS\system32\drivers\rootrepeal.sys
Address: 0xA47A5000 Size: 49152 File Visible: No Signed: -
Status: -

Hidden/Locked Files
-------------------
Path: c:\documents and settings\networkservice\local settings\temporary internet files\content.ie5\index.dat
Status: Allocation size mismatch (API: 536576, Raw: 475136)

SSDT
-------------------
#: 025 Function Name: NtClose
Status: Hooked by "C:\WINDOWS\System32\Drivers\aswSP.SYS" at address 0xa9ed36b8

#: 031 Function Name: NtConnectPort
Status: Hooked by "C:\WINDOWS\System32\vsdatant.sys" at address 0xac98e630

#: 037 Function Name: NtCreateFile
Status: Hooked by "C:\WINDOWS\System32\vsdatant.sys" at address 0xac987d80

#: 041 Function Name: NtCreateKey
Status: Hooked by "C:\WINDOWS\System32\Drivers\aswSP.SYS" at address 0xa9ed3574

#: 046 Function Name: NtCreatePort
Status: Hooked by "C:\WINDOWS\System32\vsdatant.sys" at address 0xac98ee40

#: 047 Function Name: NtCreateProcess
Status: Hooked by "C:\WINDOWS\System32\vsdatant.sys" at address 0xac9a5d30

#: 048 Function Name: NtCreateProcessEx
Status: Hooked by "C:\WINDOWS\System32\vsdatant.sys" at address 0xac9a6150

#: 050 Function Name: NtCreateSection
Status: Hooked by "C:\WINDOWS\System32\vsdatant.sys" at address 0xac9b0240

#: 056 Function Name: NtCreateWaitablePort
Status: Hooked by "C:\WINDOWS\System32\vsdatant.sys" at address 0xac98efb0

#: 062 Function Name: NtDeleteFile
Status: Hooked by "C:\WINDOWS\System32\vsdatant.sys" at address 0xac988c60

#: 063 Function Name: NtDeleteKey
Status: Hooked by "C:\WINDOWS\System32\vsdatant.sys" at address 0xac9ad780

#: 065 Function Name: NtDeleteValueKey
Status: Hooked by "C:\WINDOWS\System32\Drivers\aswSP.SYS" at address 0xa9ed3a52

#: 068 Function Name: NtDuplicateObject
Status: Hooked by "C:\WINDOWS\System32\vsdatant.sys" at address 0xac9a4e70

#: 098 Function Name: NtLoadKey
Status: Hooked by "C:\WINDOWS\System32\vsdatant.sys" at address 0xac9ae080

#: 099 Function Name: NtLoadKey2
Status: Hooked by "C:\WINDOWS\System32\vsdatant.sys" at address 0xac9ae2b0

#: 116 Function Name: NtOpenFile
Status: Hooked by "C:\WINDOWS\System32\vsdatant.sys" at address 0xac988750

#: 119 Function Name: NtOpenKey
Status: Hooked by "C:\WINDOWS\System32\Drivers\aswSP.SYS" at address 0xa9ed364e

#: 122 Function Name: NtOpenProcess
Status: Hooked by "C:\WINDOWS\System32\vsdatant.sys" at address 0xac9a8450

#: 128 Function Name: NtOpenThread
Status: Hooked by "C:\WINDOWS\System32\vsdatant.sys" at address 0xac9a8020

#: 177 Function Name: NtQueryValueKey
Status: Hooked by "C:\WINDOWS\System32\Drivers\aswSP.SYS" at address 0xa9ed376e

#: 192 Function Name: NtRenameKey
Status: Hooked by "C:\WINDOWS\System32\vsdatant.sys" at address 0xac9af430

#: 193 Function Name: NtReplaceKey
Status: Hooked by "C:\WINDOWS\System32\vsdatant.sys" at address 0xac9aea40

#: 200 Function Name: NtRequestWaitReplyPort
Status: Hooked by "C:\WINDOWS\System32\vsdatant.sys" at address 0xac98e180

#: 204 Function Name: NtRestoreKey
Status: Hooked by "C:\WINDOWS\System32\Drivers\aswSP.SYS" at address 0xa9ed372e

#: 210 Function Name: NtSecureConnectPort
Status: Hooked by "C:\WINDOWS\System32\vsdatant.sys" at address 0xac98e910

#: 224 Function Name: NtSetInformationFile
Status: Hooked by "C:\WINDOWS\System32\vsdatant.sys" at address 0xac989080

#: 237 Function Name: NtSetSecurityObject
Status: Hooked by "C:\WINDOWS\System32\vsdatant.sys" at address 0xac9af8e0

#: 247 Function Name: NtSetValueKey
Status: Hooked by "C:\WINDOWS\System32\Drivers\aswSP.SYS" at address 0xa9ed38ae

#: 255 Function Name: NtSystemDebugControl
Status: Hooked by "C:\WINDOWS\System32\vsdatant.sys" at address 0xac9a6d20

#: 257 Function Name: NtTerminateProcess
Status: Hooked by "C:\Program Files\SUPERAntiSpyware\SASKUTIL.SYS" at address 0xac921320

Shadow SSDT
-------------------
#: 460 Function Name: NtUserMessageCall
Status: Hooked by "C:\WINDOWS\System32\vsdatant.sys" at address 0xac98cd80

#: 475 Function Name: NtUserPostMessage
Status: Hooked by "C:\WINDOWS\System32\vsdatant.sys" at address 0xac98cee0

#: 476 Function Name: NtUserPostThreadMessage
Status: Hooked by "C:\WINDOWS\System32\vsdatant.sys" at address 0xac98d030

#: 491 Function Name: NtUserRegisterRawInputDevices
Status: Hooked by "C:\WINDOWS\System32\vsdatant.sys" at address 0xac98a710

#: 502 Function Name: NtUserSendInput
Status: Hooked by "C:\WINDOWS\System32\vsdatant.sys" at address 0xac98d470

==EOF==


#5 sempai

sempai

    noypi


  • Malware Response Team
  • 5,288 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:3 stars and a sun
  • Local time:06:45 AM

Posted 19 March 2010 - 07:23 PM

Good morning Kaboobie,


1. Please download TDSSKiller.zip and save it to your desktop.
  • Extract the zip file to your desktop (Right click on the file and choose extract all).
  • Double-Click (Run as administrator for Vista) TDSSKiller.exe to run it.
  • When it finished press any key to continue (Let reboot if needed).
  • Once completed it will create a log in your C:\ drive
  • Please post the contents of that log.



2. Download Combofix (by Subs) from any of the links below, and save it to your desktop.
Link 1
Link 2
  • Temporary disable your anti-virus and anti-malware programs so they do not interfere with the running of ComboFix.
  • Close any open windows, including this one.
  • Double click on ComboFix.exe & follow the prompts.
  • ComboFix will check to see if the Microsoft Windows Recovery Console is installed.
    • It's strongly recommended to have this pre-installed on your machine before doing any malware removal.
  • If you did not have it installed, you will see the prompt below. Choose YES.

  • Follow the prompts to allow ComboFix to download and install the Microsoft Windows Recovery Console.
  • When prompted, agree to the End-User License Agreement to install the Microsoft Windows Recovery Console.
**Please note**
*If the Microsoft Windows Recovery Console is already installed, ComboFix will continue it's malware removal procedures.
*The Windows Recovery Console will allow you to boot up into a special recovery (repair) mode.
*This allows us to more easily help you should your computer have a problem after an attempted removal of malware.
  • Once the Microsoft Windows Recovery Console is installed using ComboFix, you should see the following message:

  • Click on Yes, to continue scanning for malware.
  • When finished, it will produce a report for you. Please post the contents of the log (C:\ComboFix.txt).
**Please note**
*Leave your computer alone while ComboFix is running.
*ComboFix will restart your computer if malware is found; allow it to do so.
*Please Do NOT mouseclick combofix's window while its running because it may call it to stall.


Warning!
This tool is not a toy and not for everyday use.
ComboFix SHOULD NOT be used unless requested by a forum helper, *** If your are not the topic starter DO NOT run this tool as it could cause irreversible damage to your computer.


If you need help, see this link:
http://www.bleepingcomputer.com/combofix/how-to-use-combofix




~Semp

~Semp

btn_donate_LG.gif
You can help me continue the fight against malware by making a donation, Thank you.

If I am helping you and I didn't reply within 48 hours... Please send me a private message.
Topics that are not replied within 5 days will be close. Please don't PM asking for support, post on the Forums instead.

Member of UNITE (Unified Network of Instructors and Trained Eliminators) 


#6 Kaboobie

Kaboobie
  • Topic Starter

  • Members
  • 15 posts
  • OFFLINE
  •  
  • Local time:09:45 AM

Posted 19 March 2010 - 07:53 PM

Hi Sempai, thanks again. Here are the logs. I should mention, occasionally my pc wont boot normally, the only way it has is by selecting the "last known good configuration" option. Not sure if that helps. Combofix did not reboot me. Logs now smile.gif

11:30:17:546 3400 TDSS rootkit removing tool 2.2.8 Mar 10 2010 15:53:20
11:30:17:546 3400 ================================================================================
11:30:17:546 3400 SystemInfo:

11:30:17:546 3400 OS Version: 5.1.2600 ServicePack: 2.0
11:30:17:546 3400 Product type: Workstation
11:30:17:546 3400 ComputerName: ZIPPY-C32D6124
11:30:17:546 3400 UserName: Kellie
11:30:17:546 3400 Windows directory: C:\WINDOWS
11:30:17:546 3400 Processor architecture: Intel x86
11:30:17:546 3400 Number of processors: 2
11:30:17:546 3400 Page size: 0x1000
11:30:17:546 3400 Boot type: Normal boot
11:30:17:546 3400 ================================================================================
11:30:17:562 3400 UnloadDriverW: NtUnloadDriver error 2
11:30:17:562 3400 ForceUnloadDriverW: UnloadDriverW(klmd21) error 2
11:30:17:656 3400 wfopen_ex: Trying to open file C:\WINDOWS\system32\config\system
11:30:17:656 3400 wfopen_ex: MyNtCreateFileW error 32 (C0000043)
11:30:17:656 3400 wfopen_ex: Trying to KLMD file open
11:30:17:656 3400 wfopen_ex: File opened ok (Flags 2)
11:30:17:656 3400 wfopen_ex: Trying to open file C:\WINDOWS\system32\config\software
11:30:17:656 3400 wfopen_ex: MyNtCreateFileW error 32 (C0000043)
11:30:17:656 3400 wfopen_ex: Trying to KLMD file open
11:30:17:656 3400 wfopen_ex: File opened ok (Flags 2)
11:30:17:656 3400 Initialize success
11:30:17:656 3400
11:30:17:656 3400 Scanning Services ...
11:30:18:046 3400 GetAdvancedServicesInfo: Raw services enum returned 319 services
11:30:18:046 3400
11:30:18:046 3400 Scanning Kernel memory ...
11:30:18:046 3400 Devices to scan: 10
11:30:18:046 3400
11:30:18:046 3400 Driver Name: Disk
11:30:18:046 3400 IRP_MJ_CREATE : B80EEC30
11:30:18:046 3400 IRP_MJ_CREATE_NAMED_PIPE : 804F4476
11:30:18:046 3400 IRP_MJ_CLOSE : B80EEC30
11:30:18:046 3400 IRP_MJ_READ : B80E8D9B
11:30:18:046 3400 IRP_MJ_WRITE : B80E8D9B
11:30:18:046 3400 IRP_MJ_QUERY_INFORMATION : 804F4476
11:30:18:046 3400 IRP_MJ_SET_INFORMATION : 804F4476
11:30:18:046 3400 IRP_MJ_QUERY_EA : 804F4476
11:30:18:046 3400 IRP_MJ_SET_EA : 804F4476
11:30:18:046 3400 IRP_MJ_FLUSH_BUFFERS : B80E9366
11:30:18:046 3400 IRP_MJ_QUERY_VOLUME_INFORMATION : 804F4476
11:30:18:046 3400 IRP_MJ_SET_VOLUME_INFORMATION : 804F4476
11:30:18:046 3400 IRP_MJ_DIRECTORY_CONTROL : 804F4476
11:30:18:046 3400 IRP_MJ_FILE_SYSTEM_CONTROL : 804F4476
11:30:18:046 3400 IRP_MJ_DEVICE_CONTROL : B80E944D
11:30:18:046 3400 IRP_MJ_INTERNAL_DEVICE_CONTROL : B80ECFC3
11:30:18:046 3400 IRP_MJ_SHUTDOWN : B80E9366
11:30:18:046 3400 IRP_MJ_LOCK_CONTROL : 804F4476
11:30:18:046 3400 IRP_MJ_CLEANUP : 804F4476
11:30:18:046 3400 IRP_MJ_CREATE_MAILSLOT : 804F4476
11:30:18:046 3400 IRP_MJ_QUERY_SECURITY : 804F4476
11:30:18:046 3400 IRP_MJ_SET_SECURITY : 804F4476
11:30:18:046 3400 IRP_MJ_POWER : B80EAEF3
11:30:18:046 3400 IRP_MJ_SYSTEM_CONTROL : B80EFA24
11:30:18:046 3400 IRP_MJ_DEVICE_CHANGE : 804F4476
11:30:18:046 3400 IRP_MJ_QUERY_QUOTA : 804F4476
11:30:18:046 3400 IRP_MJ_SET_QUOTA : 804F4476
11:30:18:062 3400 C:\WINDOWS\system32\DRIVERS\disk.sys - Verdict: 1
11:30:18:062 3400
11:30:18:062 3400 Driver Name: Disk
11:30:18:062 3400 IRP_MJ_CREATE : B80EEC30
11:30:18:062 3400 IRP_MJ_CREATE_NAMED_PIPE : 804F4476
11:30:18:062 3400 IRP_MJ_CLOSE : B80EEC30
11:30:18:062 3400 IRP_MJ_READ : B80E8D9B
11:30:18:062 3400 IRP_MJ_WRITE : B80E8D9B
11:30:18:062 3400 IRP_MJ_QUERY_INFORMATION : 804F4476
11:30:18:062 3400 IRP_MJ_SET_INFORMATION : 804F4476
11:30:18:062 3400 IRP_MJ_QUERY_EA : 804F4476
11:30:18:062 3400 IRP_MJ_SET_EA : 804F4476
11:30:18:062 3400 IRP_MJ_FLUSH_BUFFERS : B80E9366
11:30:18:062 3400 IRP_MJ_QUERY_VOLUME_INFORMATION : 804F4476
11:30:18:062 3400 IRP_MJ_SET_VOLUME_INFORMATION : 804F4476
11:30:18:062 3400 IRP_MJ_DIRECTORY_CONTROL : 804F4476
11:30:18:062 3400 IRP_MJ_FILE_SYSTEM_CONTROL : 804F4476
11:30:18:062 3400 IRP_MJ_DEVICE_CONTROL : B80E944D
11:30:18:062 3400 IRP_MJ_INTERNAL_DEVICE_CONTROL : B80ECFC3
11:30:18:062 3400 IRP_MJ_SHUTDOWN : B80E9366
11:30:18:062 3400 IRP_MJ_LOCK_CONTROL : 804F4476
11:30:18:062 3400 IRP_MJ_CLEANUP : 804F4476
11:30:18:062 3400 IRP_MJ_CREATE_MAILSLOT : 804F4476
11:30:18:062 3400 IRP_MJ_QUERY_SECURITY : 804F4476
11:30:18:062 3400 IRP_MJ_SET_SECURITY : 804F4476
11:30:18:062 3400 IRP_MJ_POWER : B80EAEF3
11:30:18:062 3400 IRP_MJ_SYSTEM_CONTROL : B80EFA24
11:30:18:062 3400 IRP_MJ_DEVICE_CHANGE : 804F4476
11:30:18:062 3400 IRP_MJ_QUERY_QUOTA : 804F4476
11:30:18:062 3400 IRP_MJ_SET_QUOTA : 804F4476
11:30:18:062 3400 C:\WINDOWS\system32\DRIVERS\disk.sys - Verdict: 1
11:30:18:062 3400
11:30:18:062 3400 Driver Name: Disk
11:30:18:062 3400 IRP_MJ_CREATE : B80EEC30
11:30:18:062 3400 IRP_MJ_CREATE_NAMED_PIPE : 804F4476
11:30:18:062 3400 IRP_MJ_CLOSE : B80EEC30
11:30:18:062 3400 IRP_MJ_READ : B80E8D9B
11:30:18:062 3400 IRP_MJ_WRITE : B80E8D9B
11:30:18:062 3400 IRP_MJ_QUERY_INFORMATION : 804F4476
11:30:18:062 3400 IRP_MJ_SET_INFORMATION : 804F4476
11:30:18:062 3400 IRP_MJ_QUERY_EA : 804F4476
11:30:18:062 3400 IRP_MJ_SET_EA : 804F4476
11:30:18:062 3400 IRP_MJ_FLUSH_BUFFERS : B80E9366
11:30:18:062 3400 IRP_MJ_QUERY_VOLUME_INFORMATION : 804F4476
11:30:18:062 3400 IRP_MJ_SET_VOLUME_INFORMATION : 804F4476
11:30:18:062 3400 IRP_MJ_DIRECTORY_CONTROL : 804F4476
11:30:18:062 3400 IRP_MJ_FILE_SYSTEM_CONTROL : 804F4476
11:30:18:062 3400 IRP_MJ_DEVICE_CONTROL : B80E944D
11:30:18:062 3400 IRP_MJ_INTERNAL_DEVICE_CONTROL : B80ECFC3
11:30:18:062 3400 IRP_MJ_SHUTDOWN : B80E9366
11:30:18:062 3400 IRP_MJ_LOCK_CONTROL : 804F4476
11:30:18:062 3400 IRP_MJ_CLEANUP : 804F4476
11:30:18:062 3400 IRP_MJ_CREATE_MAILSLOT : 804F4476
11:30:18:062 3400 IRP_MJ_QUERY_SECURITY : 804F4476
11:30:18:062 3400 IRP_MJ_SET_SECURITY : 804F4476
11:30:18:062 3400 IRP_MJ_POWER : B80EAEF3
11:30:18:062 3400 IRP_MJ_SYSTEM_CONTROL : B80EFA24
11:30:18:062 3400 IRP_MJ_DEVICE_CHANGE : 804F4476
11:30:18:062 3400 IRP_MJ_QUERY_QUOTA : 804F4476
11:30:18:062 3400 IRP_MJ_SET_QUOTA : 804F4476
11:30:18:062 3400 C:\WINDOWS\system32\DRIVERS\disk.sys - Verdict: 1
11:30:18:062 3400
11:30:18:062 3400 Driver Name: Disk
11:30:18:062 3400 IRP_MJ_CREATE : B80EEC30
11:30:18:062 3400 IRP_MJ_CREATE_NAMED_PIPE : 804F4476
11:30:18:062 3400 IRP_MJ_CLOSE : B80EEC30
11:30:18:062 3400 IRP_MJ_READ : B80E8D9B
11:30:18:062 3400 IRP_MJ_WRITE : B80E8D9B
11:30:18:062 3400 IRP_MJ_QUERY_INFORMATION : 804F4476
11:30:18:062 3400 IRP_MJ_SET_INFORMATION : 804F4476
11:30:18:062 3400 IRP_MJ_QUERY_EA : 804F4476
11:30:18:062 3400 IRP_MJ_SET_EA : 804F4476
11:30:18:062 3400 IRP_MJ_FLUSH_BUFFERS : B80E9366
11:30:18:062 3400 IRP_MJ_QUERY_VOLUME_INFORMATION : 804F4476
11:30:18:062 3400 IRP_MJ_SET_VOLUME_INFORMATION : 804F4476
11:30:18:062 3400 IRP_MJ_DIRECTORY_CONTROL : 804F4476
11:30:18:062 3400 IRP_MJ_FILE_SYSTEM_CONTROL : 804F4476
11:30:18:062 3400 IRP_MJ_DEVICE_CONTROL : B80E944D
11:30:18:062 3400 IRP_MJ_INTERNAL_DEVICE_CONTROL : B80ECFC3
11:30:18:062 3400 IRP_MJ_SHUTDOWN : B80E9366
11:30:18:062 3400 IRP_MJ_LOCK_CONTROL : 804F4476
11:30:18:062 3400 IRP_MJ_CLEANUP : 804F4476
11:30:18:062 3400 IRP_MJ_CREATE_MAILSLOT : 804F4476
11:30:18:062 3400 IRP_MJ_QUERY_SECURITY : 804F4476
11:30:18:062 3400 IRP_MJ_SET_SECURITY : 804F4476
11:30:18:062 3400 IRP_MJ_POWER : B80EAEF3
11:30:18:062 3400 IRP_MJ_SYSTEM_CONTROL : B80EFA24
11:30:18:062 3400 IRP_MJ_DEVICE_CHANGE : 804F4476
11:30:18:062 3400 IRP_MJ_QUERY_QUOTA : 804F4476
11:30:18:062 3400 IRP_MJ_SET_QUOTA : 804F4476
11:30:18:062 3400 C:\WINDOWS\system32\DRIVERS\disk.sys - Verdict: 1
11:30:18:062 3400
11:30:18:062 3400 Driver Name: USBSTOR
11:30:18:062 3400 IRP_MJ_CREATE : AD972218
11:30:18:062 3400 IRP_MJ_CREATE_NAMED_PIPE : 804F4476
11:30:18:062 3400 IRP_MJ_CLOSE : AD972218
11:30:18:062 3400 IRP_MJ_READ : AD97223C
11:30:18:062 3400 IRP_MJ_WRITE : AD97223C
11:30:18:062 3400 IRP_MJ_QUERY_INFORMATION : 804F4476
11:30:18:062 3400 IRP_MJ_SET_INFORMATION : 804F4476
11:30:18:062 3400 IRP_MJ_QUERY_EA : 804F4476
11:30:18:062 3400 IRP_MJ_SET_EA : 804F4476
11:30:18:062 3400 IRP_MJ_FLUSH_BUFFERS : 804F4476
11:30:18:062 3400 IRP_MJ_QUERY_VOLUME_INFORMATION : 804F4476
11:30:18:062 3400 IRP_MJ_SET_VOLUME_INFORMATION : 804F4476
11:30:18:062 3400 IRP_MJ_DIRECTORY_CONTROL : 804F4476
11:30:18:062 3400 IRP_MJ_FILE_SYSTEM_CONTROL : 804F4476
11:30:18:062 3400 IRP_MJ_DEVICE_CONTROL : AD972180
11:30:18:062 3400 IRP_MJ_INTERNAL_DEVICE_CONTROL : AD96D9E6
11:30:18:062 3400 IRP_MJ_SHUTDOWN : 804F4476
11:30:18:062 3400 IRP_MJ_LOCK_CONTROL : 804F4476
11:30:18:062 3400 IRP_MJ_CLEANUP : 804F4476
11:30:18:062 3400 IRP_MJ_CREATE_MAILSLOT : 804F4476
11:30:18:062 3400 IRP_MJ_QUERY_SECURITY : 804F4476
11:30:18:062 3400 IRP_MJ_SET_SECURITY : 804F4476
11:30:18:062 3400 IRP_MJ_POWER : AD9715F0
11:30:18:062 3400 IRP_MJ_SYSTEM_CONTROL : AD96FA6E
11:30:18:062 3400 IRP_MJ_DEVICE_CHANGE : 804F4476
11:30:18:062 3400 IRP_MJ_QUERY_QUOTA : 804F4476
11:30:18:062 3400 IRP_MJ_SET_QUOTA : 804F4476
11:30:18:078 3400 C:\WINDOWS\system32\DRIVERS\USBSTOR.SYS - Verdict: 1
11:30:18:078 3400
11:30:18:078 3400 Driver Name: USBSTOR
11:30:18:078 3400 IRP_MJ_CREATE : AD972218
11:30:18:078 3400 IRP_MJ_CREATE_NAMED_PIPE : 804F4476
11:30:18:078 3400 IRP_MJ_CLOSE : AD972218
11:30:18:078 3400 IRP_MJ_READ : AD97223C
11:30:18:078 3400 IRP_MJ_WRITE : AD97223C
11:30:18:078 3400 IRP_MJ_QUERY_INFORMATION : 804F4476
11:30:18:078 3400 IRP_MJ_SET_INFORMATION : 804F4476
11:30:18:078 3400 IRP_MJ_QUERY_EA : 804F4476
11:30:18:078 3400 IRP_MJ_SET_EA : 804F4476
11:30:18:078 3400 IRP_MJ_FLUSH_BUFFERS : 804F4476
11:30:18:078 3400 IRP_MJ_QUERY_VOLUME_INFORMATION : 804F4476
11:30:18:078 3400 IRP_MJ_SET_VOLUME_INFORMATION : 804F4476
11:30:18:078 3400 IRP_MJ_DIRECTORY_CONTROL : 804F4476
11:30:18:078 3400 IRP_MJ_FILE_SYSTEM_CONTROL : 804F4476
11:30:18:078 3400 IRP_MJ_DEVICE_CONTROL : AD972180
11:30:18:078 3400 IRP_MJ_INTERNAL_DEVICE_CONTROL : AD96D9E6
11:30:18:078 3400 IRP_MJ_SHUTDOWN : 804F4476
11:30:18:078 3400 IRP_MJ_LOCK_CONTROL : 804F4476
11:30:18:078 3400 IRP_MJ_CLEANUP : 804F4476
11:30:18:078 3400 IRP_MJ_CREATE_MAILSLOT : 804F4476
11:30:18:078 3400 IRP_MJ_QUERY_SECURITY : 804F4476
11:30:18:078 3400 IRP_MJ_SET_SECURITY : 804F4476
11:30:18:078 3400 IRP_MJ_POWER : AD9715F0
11:30:18:078 3400 IRP_MJ_SYSTEM_CONTROL : AD96FA6E
11:30:18:078 3400 IRP_MJ_DEVICE_CHANGE : 804F4476
11:30:18:078 3400 IRP_MJ_QUERY_QUOTA : 804F4476
11:30:18:078 3400 IRP_MJ_SET_QUOTA : 804F4476
11:30:18:078 3400 C:\WINDOWS\system32\DRIVERS\USBSTOR.SYS - Verdict: 1
11:30:18:078 3400
11:30:18:078 3400 Driver Name: USBSTOR
11:30:18:078 3400 IRP_MJ_CREATE : AD972218
11:30:18:078 3400 IRP_MJ_CREATE_NAMED_PIPE : 804F4476
11:30:18:078 3400 IRP_MJ_CLOSE : AD972218
11:30:18:078 3400 IRP_MJ_READ : AD97223C
11:30:18:078 3400 IRP_MJ_WRITE : AD97223C
11:30:18:078 3400 IRP_MJ_QUERY_INFORMATION : 804F4476
11:30:18:078 3400 IRP_MJ_SET_INFORMATION : 804F4476
11:30:18:078 3400 IRP_MJ_QUERY_EA : 804F4476
11:30:18:078 3400 IRP_MJ_SET_EA : 804F4476
11:30:18:078 3400 IRP_MJ_FLUSH_BUFFERS : 804F4476
11:30:18:078 3400 IRP_MJ_QUERY_VOLUME_INFORMATION : 804F4476
11:30:18:078 3400 IRP_MJ_SET_VOLUME_INFORMATION : 804F4476
11:30:18:078 3400 IRP_MJ_DIRECTORY_CONTROL : 804F4476
11:30:18:078 3400 IRP_MJ_FILE_SYSTEM_CONTROL : 804F4476
11:30:18:078 3400 IRP_MJ_DEVICE_CONTROL : AD972180
11:30:18:078 3400 IRP_MJ_INTERNAL_DEVICE_CONTROL : AD96D9E6
11:30:18:078 3400 IRP_MJ_SHUTDOWN : 804F4476
11:30:18:078 3400 IRP_MJ_LOCK_CONTROL : 804F4476
11:30:18:078 3400 IRP_MJ_CLEANUP : 804F4476
11:30:18:078 3400 IRP_MJ_CREATE_MAILSLOT : 804F4476
11:30:18:078 3400 IRP_MJ_QUERY_SECURITY : 804F4476
11:30:18:078 3400 IRP_MJ_SET_SECURITY : 804F4476
11:30:18:078 3400 IRP_MJ_POWER : AD9715F0
11:30:18:078 3400 IRP_MJ_SYSTEM_CONTROL : AD96FA6E
11:30:18:078 3400 IRP_MJ_DEVICE_CHANGE : 804F4476
11:30:18:078 3400 IRP_MJ_QUERY_QUOTA : 804F4476
11:30:18:078 3400 IRP_MJ_SET_QUOTA : 804F4476
11:30:18:078 3400 C:\WINDOWS\system32\DRIVERS\USBSTOR.SYS - Verdict: 1
11:30:18:078 3400
11:30:18:078 3400 Driver Name: USBSTOR
11:30:18:078 3400 IRP_MJ_CREATE : AD972218
11:30:18:078 3400 IRP_MJ_CREATE_NAMED_PIPE : 804F4476
11:30:18:078 3400 IRP_MJ_CLOSE : AD972218
11:30:18:078 3400 IRP_MJ_READ : AD97223C
11:30:18:078 3400 IRP_MJ_WRITE : AD97223C
11:30:18:078 3400 IRP_MJ_QUERY_INFORMATION : 804F4476
11:30:18:078 3400 IRP_MJ_SET_INFORMATION : 804F4476
11:30:18:078 3400 IRP_MJ_QUERY_EA : 804F4476
11:30:18:078 3400 IRP_MJ_SET_EA : 804F4476
11:30:18:078 3400 IRP_MJ_FLUSH_BUFFERS : 804F4476
11:30:18:078 3400 IRP_MJ_QUERY_VOLUME_INFORMATION : 804F4476
11:30:18:078 3400 IRP_MJ_SET_VOLUME_INFORMATION : 804F4476
11:30:18:078 3400 IRP_MJ_DIRECTORY_CONTROL : 804F4476
11:30:18:078 3400 IRP_MJ_FILE_SYSTEM_CONTROL : 804F4476
11:30:18:078 3400 IRP_MJ_DEVICE_CONTROL : AD972180
11:30:18:078 3400 IRP_MJ_INTERNAL_DEVICE_CONTROL : AD96D9E6
11:30:18:078 3400 IRP_MJ_SHUTDOWN : 804F4476
11:30:18:078 3400 IRP_MJ_LOCK_CONTROL : 804F4476
11:30:18:078 3400 IRP_MJ_CLEANUP : 804F4476
11:30:18:078 3400 IRP_MJ_CREATE_MAILSLOT : 804F4476
11:30:18:078 3400 IRP_MJ_QUERY_SECURITY : 804F4476
11:30:18:078 3400 IRP_MJ_SET_SECURITY : 804F4476
11:30:18:078 3400 IRP_MJ_POWER : AD9715F0
11:30:18:078 3400 IRP_MJ_SYSTEM_CONTROL : AD96FA6E
11:30:18:078 3400 IRP_MJ_DEVICE_CHANGE : 804F4476
11:30:18:078 3400 IRP_MJ_QUERY_QUOTA : 804F4476
11:30:18:078 3400 IRP_MJ_SET_QUOTA : 804F4476
11:30:18:078 3400 C:\WINDOWS\system32\DRIVERS\USBSTOR.SYS - Verdict: 1
11:30:18:078 3400
11:30:18:078 3400 Driver Name: Disk
11:30:18:078 3400 IRP_MJ_CREATE : B80EEC30
11:30:18:078 3400 IRP_MJ_CREATE_NAMED_PIPE : 804F4476
11:30:18:078 3400 IRP_MJ_CLOSE : B80EEC30
11:30:18:078 3400 IRP_MJ_READ : B80E8D9B
11:30:18:078 3400 IRP_MJ_WRITE : B80E8D9B
11:30:18:078 3400 IRP_MJ_QUERY_INFORMATION : 804F4476
11:30:18:078 3400 IRP_MJ_SET_INFORMATION : 804F4476
11:30:18:078 3400 IRP_MJ_QUERY_EA : 804F4476
11:30:18:078 3400 IRP_MJ_SET_EA : 804F4476
11:30:18:078 3400 IRP_MJ_FLUSH_BUFFERS : B80E9366
11:30:18:078 3400 IRP_MJ_QUERY_VOLUME_INFORMATION : 804F4476
11:30:18:078 3400 IRP_MJ_SET_VOLUME_INFORMATION : 804F4476
11:30:18:078 3400 IRP_MJ_DIRECTORY_CONTROL : 804F4476
11:30:18:078 3400 IRP_MJ_FILE_SYSTEM_CONTROL : 804F4476
11:30:18:078 3400 IRP_MJ_DEVICE_CONTROL : B80E944D
11:30:18:078 3400 IRP_MJ_INTERNAL_DEVICE_CONTROL : B80ECFC3
11:30:18:078 3400 IRP_MJ_SHUTDOWN : B80E9366
11:30:18:078 3400 IRP_MJ_LOCK_CONTROL : 804F4476
11:30:18:078 3400 IRP_MJ_CLEANUP : 804F4476
11:30:18:078 3400 IRP_MJ_CREATE_MAILSLOT : 804F4476
11:30:18:078 3400 IRP_MJ_QUERY_SECURITY : 804F4476
11:30:18:078 3400 IRP_MJ_SET_SECURITY : 804F4476
11:30:18:078 3400 IRP_MJ_POWER : B80EAEF3
11:30:18:078 3400 IRP_MJ_SYSTEM_CONTROL : B80EFA24
11:30:18:078 3400 IRP_MJ_DEVICE_CHANGE : 804F4476
11:30:18:078 3400 IRP_MJ_QUERY_QUOTA : 804F4476
11:30:18:078 3400 IRP_MJ_SET_QUOTA : 804F4476
11:30:18:078 3400 C:\WINDOWS\system32\DRIVERS\disk.sys - Verdict: 1
11:30:18:078 3400
11:30:18:078 3400 Driver Name: atapi
11:30:18:078 3400 IRP_MJ_CREATE : 8B43BCA1
11:30:18:078 3400 IRP_MJ_CREATE_NAMED_PIPE : 8B43BCA1
11:30:18:078 3400 IRP_MJ_CLOSE : 8B43BCA1
11:30:18:078 3400 IRP_MJ_READ : 8B43BCA1
11:30:18:078 3400 IRP_MJ_WRITE : 8B43BCA1
11:30:18:078 3400 IRP_MJ_QUERY_INFORMATION : 8B43BCA1
11:30:18:078 3400 IRP_MJ_SET_INFORMATION : 8B43BCA1
11:30:18:078 3400 IRP_MJ_QUERY_EA : 8B43BCA1
11:30:18:078 3400 IRP_MJ_SET_EA : 8B43BCA1
11:30:18:078 3400 IRP_MJ_FLUSH_BUFFERS : 8B43BCA1
11:30:18:078 3400 IRP_MJ_QUERY_VOLUME_INFORMATION : 8B43BCA1
11:30:18:078 3400 IRP_MJ_SET_VOLUME_INFORMATION : 8B43BCA1
11:30:18:078 3400 IRP_MJ_DIRECTORY_CONTROL : 8B43BCA1
11:30:18:078 3400 IRP_MJ_FILE_SYSTEM_CONTROL : 8B43BCA1
11:30:18:078 3400 IRP_MJ_DEVICE_CONTROL : 8B43BCA1
11:30:18:078 3400 IRP_MJ_INTERNAL_DEVICE_CONTROL : 8B43BCA1
11:30:18:078 3400 IRP_MJ_SHUTDOWN : 8B43BCA1
11:30:18:078 3400 IRP_MJ_LOCK_CONTROL : 8B43BCA1
11:30:18:078 3400 IRP_MJ_CLEANUP : 8B43BCA1
11:30:18:078 3400 IRP_MJ_CREATE_MAILSLOT : 8B43BCA1
11:30:18:078 3400 IRP_MJ_QUERY_SECURITY : 8B43BCA1
11:30:18:078 3400 IRP_MJ_SET_SECURITY : 8B43BCA1
11:30:18:078 3400 IRP_MJ_POWER : 8B43BCA1
11:30:18:078 3400 IRP_MJ_SYSTEM_CONTROL : 8B43BCA1
11:30:18:078 3400 IRP_MJ_DEVICE_CHANGE : 8B43BCA1
11:30:18:078 3400 IRP_MJ_QUERY_QUOTA : 8B43BCA1
11:30:18:078 3400 IRP_MJ_SET_QUOTA : 8B43BCA1
11:30:18:078 3400 Driver "atapi" infected by TDSS rootkit!
11:30:18:078 3400 C:\WINDOWS\system32\DRIVERS\atapi.sys - Verdict: 1
11:30:18:078 3400 File "C:\WINDOWS\system32\DRIVERS\atapi.sys" infected by TDSS rootkit ... 11:30:18:078 3400 Processing driver file: C:\WINDOWS\system32\DRIVERS\atapi.sys
11:30:18:078 3400 ProcessDirEnumEx: FindFirstFile(C:\WINDOWS\system32\DriverStore\FileRepository\*) error 3
11:30:18:250 3400 vfvi6
11:30:18:265 3400 !dsvbh1
11:30:18:750 3400 dsvbh2
11:30:18:750 3400 fdfb2
11:30:18:750 3400 Backup copy found, using it..
11:30:18:765 3400 will be cured on next reboot
11:30:18:765 3400 Reboot required for cure complete..
11:30:18:796 3400 Cure on reboot scheduled successfully
11:30:18:796 3400
11:30:18:796 3400 Completed
11:30:18:796 3400
11:30:18:796 3400 Results:
11:30:18:796 3400 Memory objects infected / cured / cured on reboot: 1 / 0 / 0
11:30:18:796 3400 Registry objects infected / cured / cured on reboot: 0 / 0 / 0
11:30:18:796 3400 File objects infected / cured / cured on reboot: 1 / 0 / 1
11:30:18:796 3400
11:30:18:796 3400 fclose_ex: Trying to close file C:\WINDOWS\system32\config\system
11:30:18:796 3400 fclose_ex: Trying to close file C:\WINDOWS\system32\config\software
11:30:18:796 3400 UnloadDriverW: NtUnloadDriver error 1
11:30:18:796 3400 KLMD_Unload: UnloadDriverW(klmd21) error 1
11:30:18:796 3400 KLMD(ARK) unloaded successfully



ComboFix 10-03-19.06 - Kellie 20/03/2010 11:42:08.1.2 - x86
Microsoft Windows XP Professional 5.1.2600.2.1252.1.1033.18.3583.3148 [GMT 11:00]
Running from: c:\documents and settings\Kellie\Desktop\ComboFix.exe
AV: avast! antivirus 4.8.1368 [VPS 100319-1] *On-access scanning disabled* (Updated) {7591DB91-41F0-48A3-B128-1A293FD8233D}
FW: ZoneAlarm Firewall *disabled* {829BDA32-94B3-44F4-8446-F8FCFF809F8B}
.

((((((((((((((((((((((((( Files Created from 2010-02-20 to 2010-03-20 )))))))))))))))))))))))))))))))
.

2010-03-19 03:28 . 2010-03-19 03:28 -------- d-s---w- c:\documents and settings\LocalService\UserData
2010-03-19 02:35 . 2010-03-19 02:35 -------- d-----w- c:\documents and settings\NetworkService\Local Settings\Application Data\Adobe
2010-03-19 02:35 . 2010-03-19 20:48 664 ----a-w- c:\windows\system32\d3d9caps.dat
2010-03-19 02:20 . 2010-03-20 00:33 -------- d-----w- c:\windows\Internet Logs
2010-03-19 01:02 . 2010-03-19 01:12 -------- d-----w- c:\windows\system32\NtmsData
2010-03-18 01:54 . 2010-03-18 01:54 5115824 ----a-w- c:\documents and settings\All Users\Application Data\Malwarebytes\Malwarebytes' Anti-Malware\mbam-setup.exe
2010-03-18 01:53 . 2010-01-07 05:07 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2010-03-18 01:53 . 2010-01-07 05:07 19160 ----a-w- c:\windows\system32\drivers\mbam.sys
2010-03-16 19:05 . 2010-03-17 18:32 -------- d-----w- c:\program files\Trend Micro
2010-03-16 06:58 . 2010-03-18 01:05 -------- d-----w- c:\program files\Spybot - Search & Destroy
2010-03-16 06:58 . 2010-03-16 07:20 -------- d-----w- c:\documents and settings\All Users\Application Data\Spybot - Search & Destroy
2010-03-16 06:20 . 2010-03-19 06:53 -------- d---a-w- c:\documents and settings\All Users\Application Data\TEMP
2010-03-16 04:51 . 2010-03-16 04:51 -------- d-----w- c:\documents and settings\Administrator\Application Data\Malwarebytes
2010-03-16 04:48 . 2010-03-16 04:48 -------- d-----w- c:\documents and settings\Administrator\Local Settings\Application Data\Microsoft
2010-03-16 04:47 . 2010-03-16 04:48 -------- d-----w- c:\documents and settings\Administrator
2010-03-16 03:48 . 2010-03-16 03:48 52224 ----a-w- c:\documents and settings\Kellie\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\SDDLLS\SD10005.dll
2010-03-16 03:48 . 2010-03-19 00:57 117760 ----a-w- c:\documents and settings\Kellie\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\SDDLLS\UIREPAIR.DLL
2010-03-16 03:47 . 2010-03-16 03:47 -------- d-----w- c:\documents and settings\All Users\Application Data\SUPERAntiSpyware.com
2010-03-16 03:47 . 2010-03-16 03:47 -------- d-----w- c:\program files\SUPERAntiSpyware
2010-03-16 03:47 . 2010-03-16 03:47 -------- d-----w- c:\documents and settings\Kellie\Application Data\SUPERAntiSpyware.com
2010-03-16 02:52 . 2010-03-16 02:52 -------- d-----w- c:\documents and settings\Kellie\Application Data\Malwarebytes
2010-03-16 02:52 . 2010-03-18 02:33 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
2010-03-16 02:52 . 2010-03-16 02:52 -------- d-----w- c:\documents and settings\All Users\Application Data\Malwarebytes
2010-03-16 02:30 . 2010-03-16 02:30 -------- d-----w- c:\program files\InterMute
2010-03-16 01:18 . 2010-03-16 01:18 -------- d-s---w- c:\documents and settings\NetworkService\UserData
2010-03-08 21:33 . 2010-03-08 21:33 -------- d-----w- c:\documents and settings\All Users\Application Data\Avnex
2010-03-07 01:11 . 2010-03-07 01:20 -------- d-----w- c:\documents and settings\Kellie\Application Data\ids
2010-03-07 01:11 . 2010-03-07 01:11 -------- d-----w- c:\program files\IDS
2010-03-06 21:03 . 2010-03-06 21:03 -------- d-----w- c:\documents and settings\Kellie\Application Data\Ambient Design
2010-03-06 21:01 . 2010-03-06 21:01 -------- d-----w- c:\program files\Ambient Design

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2010-03-20 00:31 . 2004-08-04 12:00 95360 ----a-w- c:\windows\system32\drivers\atapi.sys
2010-03-20 00:30 . 2010-03-20 00:32 211968 ----a-w- c:\windows\Internet Logs\xDB2.tmp
2010-03-20 00:25 . 2010-03-19 04:24 2114372 ----a-w- c:\windows\Internet Logs\tvDebug.Zip
2010-03-19 06:53 . 2010-02-17 00:02 -------- d-----w- c:\program files\AV Vcs 7.0 DIAMOND
2010-03-19 04:22 . 2010-03-19 04:25 79872 ----a-w- c:\windows\Internet Logs\xDB1.tmp
2010-03-19 02:21 . 2010-03-19 02:21 -------- d-----w- c:\documents and settings\Kellie\Application Data\CheckPoint
2010-03-19 02:21 . 2010-03-19 02:21 -------- d-----w- c:\program files\CheckPoint
2010-03-19 02:21 . 2010-03-19 02:21 4212 ---ha-w- c:\windows\system32\zllictbl.dat
2010-03-19 02:21 . 2010-03-19 02:21 -------- d-----w- c:\program files\Zone Labs
2010-03-17 19:53 . 2009-03-31 10:30 -------- d-----w- c:\documents and settings\Kellie\Application Data\SecondLife
2010-03-16 03:46 . 2009-03-29 04:28 -------- d-----w- c:\program files\Common Files\Wise Installation Wizard
2010-03-10 02:32 . 2009-05-23 06:00 -------- d-----w- c:\program files\GreenLife Emerald Viewer
2010-03-08 04:19 . 2009-04-12 08:36 -------- d-----w- c:\documents and settings\Kellie\Application Data\gtk-2.0
2010-03-03 08:45 . 2009-10-12 18:24 -------- d-----w- c:\documents and settings\Kellie\Application Data\Skype
2010-02-17 00:02 . 2010-02-17 00:02 -------- d-----w- c:\documents and settings\Kellie\Application Data\Avnex
2010-02-08 00:21 . 2010-02-08 00:19 -------- d-----w- c:\program files\NVIDIA Corporation
2010-02-08 00:20 . 2009-03-29 04:29 -------- d-----w- c:\program files\AGEIA Technologies
2010-02-08 00:20 . 2010-02-08 00:20 -------- d-----w- c:\documents and settings\All Users\Application Data\NVIDIA Corporation
2010-02-06 16:27 . 2009-03-29 06:58 146040 -c--a-w- c:\documents and settings\Kellie\Local Settings\Application Data\GDIPFONTCACHEV1.DAT
2010-02-06 16:25 . 2010-02-06 16:25 -------- d-----w- c:\documents and settings\All Users\Application Data\FLEXnet
2010-02-06 16:07 . 2009-03-29 10:03 -------- d-----w- c:\program files\Common Files\Adobe
2010-02-06 16:06 . 2010-02-06 16:06 -------- d-----w- c:\program files\Adobe Media Player
2010-02-06 16:05 . 2010-02-06 16:05 -------- d-----w- c:\program files\Common Files\Adobe AIR
2010-02-06 16:02 . 2010-02-06 16:02 -------- d-----w- c:\program files\Common Files\Macrovision Shared
2010-02-04 18:05 . 2010-02-04 18:05 -------- d-----w- c:\program files\Microsoft XNA
2010-01-24 22:56 . 2009-06-21 23:21 -------- d-----w- c:\program files\Windows Live Safety Center
2010-01-11 11:17 . 2010-01-11 11:17 278120 ----a-w- c:\windows\system32\nvmccs.dll
2010-01-11 11:17 . 2010-01-11 11:17 154216 ----a-w- c:\windows\system32\nvsvc32.exe
2010-01-11 11:17 . 2010-01-11 11:17 145000 ----a-w- c:\windows\system32\nvcolor.exe
2010-01-11 11:17 . 2010-01-11 11:17 13666408 ----a-w- c:\windows\system32\nvcpl.dll
2010-01-11 11:17 . 2010-01-11 11:17 110696 ----a-w- c:\windows\system32\nvmctray.dll
2010-01-11 11:17 . 2010-01-11 11:17 81920 ----a-w- c:\windows\system32\nvwddi.dll
.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"SUPERAntiSpyware"="c:\program files\SUPERAntiSpyware\SUPERAntiSpyware.exe" [2010-02-18 2012912]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"RTHDCPL"="RTHDCPL.EXE" [2008-07-31 16806912]
"avast!"="c:\progra~1\ALWILS~1\Avast4\ashDisp.exe" [2009-11-24 81000]
"NeroFilterCheck"="c:\program files\Common Files\Nero\Lib\NeroCheck.exe" [2008-03-25 570664]
"QuickTime Task"="c:\program files\QuickTime\qttask.exe" [2009-05-26 413696]
"NvCplDaemon"="c:\windows\system32\NvCpl.dll" [2010-01-11 13666408]
"NvMediaCenter"="c:\windows\system32\NvMcTray.dll" [2010-01-11 110696]
"SunJavaUpdateSched"="c:\program files\Java\jre6\bin\jusched.exe" [2009-07-24 149280]
"AdobeCS4ServiceManager"="c:\program files\Common Files\Adobe\CS4ServiceManager\CS4ServiceManager.exe" [2008-08-13 611712]
"ZoneAlarm Client"="c:\program files\Zone Labs\ZoneAlarm\zlclient.exe" [2009-11-22 1037192]
"ISW"="c:\program files\CheckPoint\ZAForceField\ForceField.exe" [2009-10-14 730480]

[hkey_local_machine\software\microsoft\windows\currentversion\explorer\ShellExecuteHooks]
"{5AE067D3-9AFB-48E0-853A-EBB7F4A000DA}"= "c:\program files\SUPERAntiSpyware\SASSEH.DLL" [2008-05-12 77824]

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\!SASWinLogon]
2009-09-03 03:21 548352 ----a-w- c:\program files\SUPERAntiSpyware\SASWINLO.dll

[HKLM\~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^HP Digital Imaging Monitor.lnk]
path=c:\documents and settings\All Users\Start Menu\Programs\Startup\HP Digital Imaging Monitor.lnk
backup=c:\windows\pss\HP Digital Imaging Monitor.lnkCommon Startup

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Adobe Reader Speed Launcher]
2008-01-11 12:16 39792 -c--a-w- c:\program files\Adobe\Reader 8.0\Reader\reader_sl.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\HP Software Update]
2005-05-11 13:12 49152 -c--a-w- c:\program files\HP\HP Software Update\hpwuSchd2.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\MSMSGS]
2004-10-13 16:24 1694208 ------w- c:\program files\Messenger\msmsgs.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\NeroFilterCheck]
2008-03-25 04:33 570664 ----a-w- c:\program files\Common Files\Nero\Lib\NeroCheck.exe

[HKEY_CURRENT_USER\software\microsoft\windows\currentversion\run-]
"ctfmon.exe"=c:\windows\system32\ctfmon.exe

[HKEY_LOCAL_MACHINE\software\microsoft\security center]
"AntiVirusOverride"=dword:00000001

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring]
"DisableMonitoring"=dword:00000001

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecAntiVirus]
"DisableMonitoring"=dword:00000001

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecFirewall]
"DisableMonitoring"=dword:00000001

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\ZoneLabsFirewall]
"DisableMonitoring"=dword:00000001

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=
"c:\\Program Files\\SecondLife\\SLVoice.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpqtra08.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpqste08.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpofxm08.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hposfx08.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hposid01.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpqscnvw.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpqkygrp.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpqCopy.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpfccopy.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpzwiz01.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\Unload\\HpqPhUnl.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\Unload\\HpqDIA.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpoews01.exe"=
"c:\\Program Files\\Windows Live\\Messenger\\wlcsdk.exe"=
"c:\\Program Files\\Yahoo!\\Messenger\\YahooMessenger.exe"=
"c:\\Program Files\\Yahoo!\\Messenger\\YServer.exe"=
"c:\\Program Files\\iTunes\\iTunes.exe"=
"c:\\Program Files\\GreenLife Emerald Viewer\\SLVoice.exe"=
"c:\\Program Files\\Windows Live\\Messenger\\msnmsgr.exe"=
"c:\\Program Files\\Microsoft Games\\Age of Empires III\\age3.exe"=
"c:\\Program Files\\Common Files\\Adobe\\CS4ServiceManager\\CS4ServiceManager.exe"=
"c:\\Program Files\\Skype\\Phone\\Skype.exe"=

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\GloballyOpenPorts\List]
"5353:TCP"= 5353:TCP:Adobe CSI CS4

R1 aswSP;avast! Self Protection;c:\windows\system32\drivers\aswSP.sys [21/06/2009 10:11 AM 114768]
R1 SASDIFSV;SASDIFSV;c:\program files\SUPERAntiSpyware\sasdifsv.sys [17/02/2010 10:25 AM 12872]
R1 SASKUTIL;SASKUTIL;c:\program files\SUPERAntiSpyware\SASKUTIL.SYS [17/02/2010 10:15 AM 66632]
R2 aswFsBlk;aswFsBlk;c:\windows\system32\drivers\aswFsBlk.sys [21/06/2009 10:11 AM 20560]
R2 ISWKL;ZoneAlarm Toolbar ISWKL;c:\program files\CheckPoint\ZAForceField\ISWKL.sys [15/10/2009 12:30 AM 25208]
R2 IswSvc;ZoneAlarm Toolbar IswSvc;c:\program files\CheckPoint\ZAForceField\ISWSVC.exe [15/10/2009 12:30 AM 476528]
R3 SASENUM;SASENUM;c:\program files\SUPERAntiSpyware\SASENUM.SYS [17/02/2010 10:15 AM 12872]
R3 VCSVADHWSer;Avnex Virtual Audio Device (WDM);c:\windows\system32\drivers\vcsvad.sys [9/12/2009 7:19 PM 17792]

--- Other Services/Drivers In Memory ---

*NewlyCreated* - KLMDB
*Deregistered* - klmdb

[HKEY_LOCAL_MACHINE\software\microsoft\active setup\installed components\{10880D85-AAD9-4558-ABDC-2AB1552D831F}]
2008-02-26 04:06 451872 -c--a-w- c:\program files\Common Files\LightScribe\LSRunOnce.exe
.
Contents of the 'Scheduled Tasks' folder

2010-03-11 c:\windows\Tasks\AppleSoftwareUpdate.job
- c:\program files\Apple Software Update\SoftwareUpdate.exe [2008-07-30 02:34]
.
.
------- Supplementary Scan -------
.
uStart Page = hxxp://www.google.com.au/ig?hl=en&source=iglk
.
- - - - ORPHANS REMOVED - - - -

HKLM-Run-NBKeyScan - c:\program files\Nero\Nero8\Nero BackItUp\NBKeyScan.exe
HKLM-Run-nwiz - nwiz.exe
SafeBoot-klmdb.sys
AddRemove-NVIDIA Display Control Panel - c:\program files\NVIDIA Corporation\Uninstall\nvuninst.exe
AddRemove-Xenofex2 - c:\progra~1\JASCSO~1\PAINTS~1\Plugins\XENOFE~1\UNWISE.EXE



**************************************************************************

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2010-03-20 11:45
Windows 5.1.2600 Service Pack 2 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully
hidden files: 0

**************************************************************************
.
--------------------- DLLs Loaded Under Running Processes ---------------------

- - - - - - - > 'winlogon.exe'(732)
c:\program files\SUPERAntiSpyware\SASWINLO.dll
c:\program files\Common Files\Adobe\Adobe Drive CS4\AdobeDriveCS4_NP.dll
c:\program files\CheckPoint\ZAForceField\Plugins\ISWSHEX.dll

- - - - - - - > 'lsass.exe'(788)
c:\program files\CheckPoint\ZAForceField\Plugins\ISWSHEX.dll

- - - - - - - > 'explorer.exe'(3480)
c:\program files\CheckPoint\ZAForceField\Plugins\ISWSHEX.dll
c:\windows\system32\WPDShServiceObj.dll
c:\windows\system32\PortableDeviceTypes.dll
c:\windows\system32\PortableDeviceApi.dll
.
Completion time: 2010-03-20 11:46:19
ComboFix-quarantined-files.txt 2010-03-20 00:46

Pre-Run: 548,989,599,744 bytes free
Post-Run: 548,998,086,656 bytes free

WindowsXP-KB310994-SP2-Pro-BootDisk-ENU.exe
[boot loader]
timeout=2
default=multi(0)disk(0)rdisk(0)partition(1)\WINDOWS
[operating systems]
c:\cmdcons\BOOTSECT.DAT="Microsoft Windows Recovery Console" /cmdcons
multi(0)disk(0)rdisk(0)partition(1)\WINDOWS="Microsoft Windows XP Professional" /noexecute=optin /fastdetect

Current=4 Default=4 Failed=3 LastKnownGood=5 Sets=1,2,3,4,5
- - End Of File - - 52C6E9B20228010332F1645A4329DF18


#7 sempai

sempai

    noypi


  • Malware Response Team
  • 5,288 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:3 stars and a sun
  • Local time:06:45 AM

Posted 19 March 2010 - 08:12 PM

Hi,

Looks good, atapi.sys was infected and cured. How's the computer running after that last fixed?


+++++++++++++++++++++

1. Go to Start > Run
  • Copy and paste the following command line into the Run box, then click OK.
cmd /c mbr -t& start mbr.log
  • mbr.log will pop up, please post the contents in your reply.



2. We need to execute a ComboFix script. (Tutorials on how to disable your anti virus and anti malware programs can be found HERE.)
1. Close any open browsers.

2. Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.

3. Open notepad and copy/paste the text in the code box below into it:

CODE
Registry::
[HKEY_LOCAL_MACHINE\software\microsoft\security center]
"AntiVirusOverride"=dword:00000000
[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring]
"DisableMonitoring"=dword:00000000
[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\ZoneLabsFirewall]
"DisableMonitoring"=dword:00000000


4. Save this as CFScript.txt, in the same location as ComboFix.exe




5. Refering to the picture above, drag CFScript into ComboFix.exe

6. When finished, it shall produce a log for you at C:\ComboFix.txt which I will require in your next reply.



~Semp




~Semp

btn_donate_LG.gif
You can help me continue the fight against malware by making a donation, Thank you.

If I am helping you and I didn't reply within 48 hours... Please send me a private message.
Topics that are not replied within 5 days will be close. Please don't PM asking for support, post on the Forums instead.

Member of UNITE (Unified Network of Instructors and Trained Eliminators) 


#8 Kaboobie

Kaboobie
  • Topic Starter

  • Members
  • 15 posts
  • OFFLINE
  •  
  • Local time:09:45 AM

Posted 19 March 2010 - 08:27 PM

I havent really done any surfing to see how it is running, and it hasn't rebooted since the first combofix. Im not sure whether to turn everything on again, reboot and see or just wait until we are done. I don't want to re-kill it LOL. I have noticed my browser hasnt been redirected so far though, which is nice smile.gif. Here are the logs.

Stealth MBR rootkit/Mebroot/Sinowal detector 0.3.7 by Gmer, http://www.gmer.net

device: opened successfully
user: MBR read successfully
called modules: ntkrnlpa.exe catchme.sys CLASSPNP.SYS disk.sys ACPI.sys hal.dll tsk6.tmp pciide.sys PCIIDEX.SYS
kernel: MBR read successfully
user & kernel MBR OK


ComboFix 10-03-19.06 - Kellie 20/03/2010 12:19:43.2.2 - x86
Microsoft Windows XP Professional 5.1.2600.2.1252.1.1033.18.3583.3096 [GMT 11:00]
Running from: c:\documents and settings\Kellie\Desktop\ComboFix.exe
Command switches used :: c:\documents and settings\Kellie\Desktop\CFScript.txt
AV: avast! antivirus 4.8.1368 [VPS 100319-1] *On-access scanning disabled* (Updated) {7591DB91-41F0-48A3-B128-1A293FD8233D}
FW: ZoneAlarm Firewall *disabled* {829BDA32-94B3-44F4-8446-F8FCFF809F8B}
.

((((((((((((((((((((((((( Files Created from 2010-02-20 to 2010-03-20 )))))))))))))))))))))))))))))))
.

2010-03-19 03:28 . 2010-03-19 03:28 -------- d-s---w- c:\documents and settings\LocalService\UserData
2010-03-19 02:35 . 2010-03-19 02:35 -------- d-----w- c:\documents and settings\NetworkService\Local Settings\Application Data\Adobe
2010-03-19 02:35 . 2010-03-19 20:48 664 ----a-w- c:\windows\system32\d3d9caps.dat
2010-03-19 02:20 . 2010-03-20 00:33 -------- d-----w- c:\windows\Internet Logs
2010-03-19 01:02 . 2010-03-19 01:12 -------- d-----w- c:\windows\system32\NtmsData
2010-03-18 01:54 . 2010-03-18 01:54 5115824 ----a-w- c:\documents and settings\All Users\Application Data\Malwarebytes\Malwarebytes' Anti-Malware\mbam-setup.exe
2010-03-18 01:53 . 2010-01-07 05:07 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2010-03-18 01:53 . 2010-01-07 05:07 19160 ----a-w- c:\windows\system32\drivers\mbam.sys
2010-03-16 19:05 . 2010-03-17 18:32 -------- d-----w- c:\program files\Trend Micro
2010-03-16 06:58 . 2010-03-18 01:05 -------- d-----w- c:\program files\Spybot - Search & Destroy
2010-03-16 06:58 . 2010-03-16 07:20 -------- d-----w- c:\documents and settings\All Users\Application Data\Spybot - Search & Destroy
2010-03-16 06:20 . 2010-03-19 06:53 -------- d---a-w- c:\documents and settings\All Users\Application Data\TEMP
2010-03-16 04:51 . 2010-03-16 04:51 -------- d-----w- c:\documents and settings\Administrator\Application Data\Malwarebytes
2010-03-16 04:48 . 2010-03-16 04:48 -------- d-----w- c:\documents and settings\Administrator\Local Settings\Application Data\Microsoft
2010-03-16 04:47 . 2010-03-16 04:48 -------- d-----w- c:\documents and settings\Administrator
2010-03-16 03:48 . 2010-03-16 03:48 52224 ----a-w- c:\documents and settings\Kellie\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\SDDLLS\SD10005.dll
2010-03-16 03:48 . 2010-03-19 00:57 117760 ----a-w- c:\documents and settings\Kellie\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\SDDLLS\UIREPAIR.DLL
2010-03-16 03:47 . 2010-03-16 03:47 -------- d-----w- c:\documents and settings\All Users\Application Data\SUPERAntiSpyware.com
2010-03-16 03:47 . 2010-03-16 03:47 -------- d-----w- c:\program files\SUPERAntiSpyware
2010-03-16 03:47 . 2010-03-16 03:47 -------- d-----w- c:\documents and settings\Kellie\Application Data\SUPERAntiSpyware.com
2010-03-16 02:52 . 2010-03-16 02:52 -------- d-----w- c:\documents and settings\Kellie\Application Data\Malwarebytes
2010-03-16 02:52 . 2010-03-18 02:33 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
2010-03-16 02:52 . 2010-03-16 02:52 -------- d-----w- c:\documents and settings\All Users\Application Data\Malwarebytes
2010-03-16 02:30 . 2010-03-16 02:30 -------- d-----w- c:\program files\InterMute
2010-03-16 01:18 . 2010-03-16 01:18 -------- d-s---w- c:\documents and settings\NetworkService\UserData
2010-03-08 21:33 . 2010-03-08 21:33 -------- d-----w- c:\documents and settings\All Users\Application Data\Avnex
2010-03-07 01:11 . 2010-03-07 01:20 -------- d-----w- c:\documents and settings\Kellie\Application Data\ids
2010-03-07 01:11 . 2010-03-07 01:11 -------- d-----w- c:\program files\IDS
2010-03-06 21:03 . 2010-03-06 21:03 -------- d-----w- c:\documents and settings\Kellie\Application Data\Ambient Design
2010-03-06 21:01 . 2010-03-06 21:01 -------- d-----w- c:\program files\Ambient Design

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2010-03-20 00:31 . 2004-08-04 12:00 95360 ------w- c:\windows\system32\drivers\atapi.sys
2010-03-20 00:30 . 2010-03-20 00:32 211968 ----a-w- c:\windows\Internet Logs\xDB2.tmp
2010-03-20 00:25 . 2010-03-19 04:24 2114372 ----a-w- c:\windows\Internet Logs\tvDebug.Zip
2010-03-19 06:53 . 2010-02-17 00:02 -------- d-----w- c:\program files\AV Vcs 7.0 DIAMOND
2010-03-19 04:22 . 2010-03-19 04:25 79872 ----a-w- c:\windows\Internet Logs\xDB1.tmp
2010-03-19 02:21 . 2010-03-19 02:21 -------- d-----w- c:\documents and settings\Kellie\Application Data\CheckPoint
2010-03-19 02:21 . 2010-03-19 02:21 -------- d-----w- c:\program files\CheckPoint
2010-03-19 02:21 . 2010-03-19 02:21 4212 ---ha-w- c:\windows\system32\zllictbl.dat
2010-03-19 02:21 . 2010-03-19 02:21 -------- d-----w- c:\program files\Zone Labs
2010-03-17 19:53 . 2009-03-31 10:30 -------- d-----w- c:\documents and settings\Kellie\Application Data\SecondLife
2010-03-16 03:46 . 2009-03-29 04:28 -------- d-----w- c:\program files\Common Files\Wise Installation Wizard
2010-03-10 02:32 . 2009-05-23 06:00 -------- d-----w- c:\program files\GreenLife Emerald Viewer
2010-03-08 04:19 . 2009-04-12 08:36 -------- d-----w- c:\documents and settings\Kellie\Application Data\gtk-2.0
2010-03-03 08:45 . 2009-10-12 18:24 -------- d-----w- c:\documents and settings\Kellie\Application Data\Skype
2010-02-17 00:02 . 2010-02-17 00:02 -------- d-----w- c:\documents and settings\Kellie\Application Data\Avnex
2010-02-08 00:21 . 2010-02-08 00:19 -------- d-----w- c:\program files\NVIDIA Corporation
2010-02-08 00:20 . 2009-03-29 04:29 -------- d-----w- c:\program files\AGEIA Technologies
2010-02-08 00:20 . 2010-02-08 00:20 -------- d-----w- c:\documents and settings\All Users\Application Data\NVIDIA Corporation
2010-02-06 16:27 . 2009-03-29 06:58 146040 -c--a-w- c:\documents and settings\Kellie\Local Settings\Application Data\GDIPFONTCACHEV1.DAT
2010-02-06 16:25 . 2010-02-06 16:25 -------- d-----w- c:\documents and settings\All Users\Application Data\FLEXnet
2010-02-06 16:07 . 2009-03-29 10:03 -------- d-----w- c:\program files\Common Files\Adobe
2010-02-06 16:06 . 2010-02-06 16:06 -------- d-----w- c:\program files\Adobe Media Player
2010-02-06 16:05 . 2010-02-06 16:05 -------- d-----w- c:\program files\Common Files\Adobe AIR
2010-02-06 16:02 . 2010-02-06 16:02 -------- d-----w- c:\program files\Common Files\Macrovision Shared
2010-02-04 18:05 . 2010-02-04 18:05 -------- d-----w- c:\program files\Microsoft XNA
2010-01-24 22:56 . 2009-06-21 23:21 -------- d-----w- c:\program files\Windows Live Safety Center
2010-01-11 11:17 . 2010-01-11 11:17 278120 ----a-w- c:\windows\system32\nvmccs.dll
2010-01-11 11:17 . 2010-01-11 11:17 154216 ----a-w- c:\windows\system32\nvsvc32.exe
2010-01-11 11:17 . 2010-01-11 11:17 145000 ----a-w- c:\windows\system32\nvcolor.exe
2010-01-11 11:17 . 2010-01-11 11:17 13666408 ----a-w- c:\windows\system32\nvcpl.dll
2010-01-11 11:17 . 2010-01-11 11:17 110696 ----a-w- c:\windows\system32\nvmctray.dll
2010-01-11 11:17 . 2010-01-11 11:17 81920 ----a-w- c:\windows\system32\nvwddi.dll
.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"SUPERAntiSpyware"="c:\program files\SUPERAntiSpyware\SUPERAntiSpyware.exe" [2010-02-18 2012912]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"RTHDCPL"="RTHDCPL.EXE" [2008-07-31 16806912]
"avast!"="c:\progra~1\ALWILS~1\Avast4\ashDisp.exe" [2009-11-24 81000]
"NeroFilterCheck"="c:\program files\Common Files\Nero\Lib\NeroCheck.exe" [2008-03-25 570664]
"QuickTime Task"="c:\program files\QuickTime\qttask.exe" [2009-05-26 413696]
"NvCplDaemon"="c:\windows\system32\NvCpl.dll" [2010-01-11 13666408]
"NvMediaCenter"="c:\windows\system32\NvMcTray.dll" [2010-01-11 110696]
"SunJavaUpdateSched"="c:\program files\Java\jre6\bin\jusched.exe" [2009-07-24 149280]
"AdobeCS4ServiceManager"="c:\program files\Common Files\Adobe\CS4ServiceManager\CS4ServiceManager.exe" [2008-08-13 611712]
"ZoneAlarm Client"="c:\program files\Zone Labs\ZoneAlarm\zlclient.exe" [2009-11-22 1037192]
"ISW"="c:\program files\CheckPoint\ZAForceField\ForceField.exe" [2009-10-14 730480]

[hkey_local_machine\software\microsoft\windows\currentversion\explorer\ShellExecuteHooks]
"{5AE067D3-9AFB-48E0-853A-EBB7F4A000DA}"= "c:\program files\SUPERAntiSpyware\SASSEH.DLL" [2008-05-12 77824]

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\!SASWinLogon]
2009-09-03 03:21 548352 ----a-w- c:\program files\SUPERAntiSpyware\SASWINLO.dll

[HKLM\~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^HP Digital Imaging Monitor.lnk]
path=c:\documents and settings\All Users\Start Menu\Programs\Startup\HP Digital Imaging Monitor.lnk
backup=c:\windows\pss\HP Digital Imaging Monitor.lnkCommon Startup

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Adobe Reader Speed Launcher]
2008-01-11 12:16 39792 -c--a-w- c:\program files\Adobe\Reader 8.0\Reader\reader_sl.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\HP Software Update]
2005-05-11 13:12 49152 -c--a-w- c:\program files\HP\HP Software Update\hpwuSchd2.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\MSMSGS]
2004-10-13 16:24 1694208 ------w- c:\program files\Messenger\msmsgs.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\NeroFilterCheck]
2008-03-25 04:33 570664 ----a-w- c:\program files\Common Files\Nero\Lib\NeroCheck.exe

[HKEY_CURRENT_USER\software\microsoft\windows\currentversion\run-]
"ctfmon.exe"=c:\windows\system32\ctfmon.exe

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecAntiVirus]
"DisableMonitoring"=dword:00000001

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecFirewall]
"DisableMonitoring"=dword:00000001

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=
"c:\\Program Files\\SecondLife\\SLVoice.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpqtra08.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpqste08.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpofxm08.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hposfx08.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hposid01.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpqscnvw.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpqkygrp.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpqCopy.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpfccopy.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpzwiz01.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\Unload\\HpqPhUnl.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\Unload\\HpqDIA.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpoews01.exe"=
"c:\\Program Files\\Windows Live\\Messenger\\wlcsdk.exe"=
"c:\\Program Files\\Yahoo!\\Messenger\\YahooMessenger.exe"=
"c:\\Program Files\\Yahoo!\\Messenger\\YServer.exe"=
"c:\\Program Files\\iTunes\\iTunes.exe"=
"c:\\Program Files\\GreenLife Emerald Viewer\\SLVoice.exe"=
"c:\\Program Files\\Windows Live\\Messenger\\msnmsgr.exe"=
"c:\\Program Files\\Microsoft Games\\Age of Empires III\\age3.exe"=
"c:\\Program Files\\Common Files\\Adobe\\CS4ServiceManager\\CS4ServiceManager.exe"=
"c:\\Program Files\\Skype\\Phone\\Skype.exe"=

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\GloballyOpenPorts\List]
"5353:TCP"= 5353:TCP:Adobe CSI CS4

R1 aswSP;avast! Self Protection;c:\windows\system32\drivers\aswSP.sys [21/06/2009 10:11 AM 114768]
R1 SASDIFSV;SASDIFSV;c:\program files\SUPERAntiSpyware\sasdifsv.sys [17/02/2010 10:25 AM 12872]
R1 SASKUTIL;SASKUTIL;c:\program files\SUPERAntiSpyware\SASKUTIL.SYS [17/02/2010 10:15 AM 66632]
R2 aswFsBlk;aswFsBlk;c:\windows\system32\drivers\aswFsBlk.sys [21/06/2009 10:11 AM 20560]
R2 ISWKL;ZoneAlarm Toolbar ISWKL;c:\program files\CheckPoint\ZAForceField\ISWKL.sys [15/10/2009 12:30 AM 25208]
R2 IswSvc;ZoneAlarm Toolbar IswSvc;c:\program files\CheckPoint\ZAForceField\ISWSVC.exe [15/10/2009 12:30 AM 476528]
R3 SASENUM;SASENUM;c:\program files\SUPERAntiSpyware\SASENUM.SYS [17/02/2010 10:15 AM 12872]
R3 VCSVADHWSer;Avnex Virtual Audio Device (WDM);c:\windows\system32\drivers\vcsvad.sys [9/12/2009 7:19 PM 17792]

--- Other Services/Drivers In Memory ---

*NewlyCreated* - KLMDB
*Deregistered* - klmdb

[HKEY_LOCAL_MACHINE\software\microsoft\active setup\installed components\{10880D85-AAD9-4558-ABDC-2AB1552D831F}]
2008-02-26 04:06 451872 -c--a-w- c:\program files\Common Files\LightScribe\LSRunOnce.exe
.
Contents of the 'Scheduled Tasks' folder

2010-03-11 c:\windows\Tasks\AppleSoftwareUpdate.job
- c:\program files\Apple Software Update\SoftwareUpdate.exe [2008-07-30 02:34]
.
.
------- Supplementary Scan -------
.
uStart Page = hxxp://www.google.com.au/ig?hl=en&source=iglk
.

**************************************************************************
scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully
hidden files:

**************************************************************************
.
--------------------- DLLs Loaded Under Running Processes ---------------------

- - - - - - - > 'winlogon.exe'(732)
c:\program files\SUPERAntiSpyware\SASWINLO.dll
c:\program files\Common Files\Adobe\Adobe Drive CS4\AdobeDriveCS4_NP.dll
c:\program files\CheckPoint\ZAForceField\Plugins\ISWSHEX.dll

- - - - - - - > 'lsass.exe'(788)
c:\program files\CheckPoint\ZAForceField\Plugins\ISWSHEX.dll

- - - - - - - > 'explorer.exe'(3072)
c:\program files\CheckPoint\ZAForceField\Plugins\ISWSHEX.dll
c:\windows\system32\WPDShServiceObj.dll
c:\windows\system32\PortableDeviceTypes.dll
c:\windows\system32\PortableDeviceApi.dll
.
Completion time: 2010-03-20 12:21:35
ComboFix-quarantined-files.txt 2010-03-20 01:21
ComboFix2.txt 2010-03-20 00:46

Pre-Run: 549,015,461,888 bytes free
Post-Run: 549,002,670,080 bytes free

Current=4 Default=4 Failed=3 LastKnownGood=5 Sets=1,2,3,4,5
- - End Of File - - 976D9131DC3096B36EEBD36B5A381CB7


#9 sempai

sempai

    noypi


  • Malware Response Team
  • 5,288 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:3 stars and a sun
  • Local time:06:45 AM

Posted 19 March 2010 - 08:41 PM

That's a healthy log... thumbup2.gif At this moment I can assume that you're already clean, but we need to justify that by running a few more scans. smile.gif


++++++++++++++++++++


1. I'd like us to scan your machine with ESET OnlineScan
  1. Hold down Control and click on the following link to open ESET OnlineScan in a new window.
    ESET OnlineScan
  2. Click the button.
  3. For alternate browsers only: (Microsoft Internet Explorer users can skip these steps)
    1. Click on to download the ESET Smart Installer. Save it to your desktop.
    2. Double click on the icon on your desktop.
  4. Check
  5. Click the button.
  6. Accept any security warnings from your browser.
  7. Check
  8. Push the Start button.
  9. ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this can take some time.
  10. When the scan completes, push
  11. Push , and save the file to your desktop using a unique name, such as ESETScan. Include the contents of this report in your next reply.
  12. Push the button.
  13. Push



2. Please create a new DDS log and post it for my review, thanks.


~Semp

~Semp

btn_donate_LG.gif
You can help me continue the fight against malware by making a donation, Thank you.

If I am helping you and I didn't reply within 48 hours... Please send me a private message.
Topics that are not replied within 5 days will be close. Please don't PM asking for support, post on the Forums instead.

Member of UNITE (Unified Network of Instructors and Trained Eliminators) 


#10 Kaboobie

Kaboobie
  • Topic Starter

  • Members
  • 15 posts
  • OFFLINE
  •  
  • Local time:09:45 AM

Posted 19 March 2010 - 09:52 PM

Hi again smile.gif

The ESET scan came back with no threats found, it didnt offer an option to save a log. I have the newest DDS log for you.


DDS (Ver_09-12-01.01) - NTFSx86
Run by Kellie at 13:47:12.87 on Sat 20/03/2010
Internet Explorer: 6.0.2900.2180
Microsoft Windows XP Professional 5.1.2600.2.1252.1.1033.18.3583.2999 [GMT 11:00]

AV: avast! antivirus 4.8.1368 [VPS 100319-1] *On-access scanning disabled* (Updated) {7591DB91-41F0-48A3-B128-1A293FD8233D}
FW: ZoneAlarm Firewall *disabled* {829BDA32-94B3-44F4-8446-F8FCFF809F8B}

============== Running Processes ===============

C:\WINDOWS\system32\nvsvc32.exe
C:\WINDOWS\system32\svchost -k DcomLaunch
svchost.exe
C:\WINDOWS\System32\svchost.exe -k netsvcs
svchost.exe
svchost.exe
C:\Program Files\Alwil Software\Avast4\aswUpdSv.exe
C:\Program Files\CheckPoint\ZAForceField\IswSvc.exe
C:\Program Files\Alwil Software\Avast4\ashServ.exe
C:\Program Files\CheckPoint\ZAForceField\ForceField.exe
C:\WINDOWS\system32\spoolsv.exe
svchost.exe
C:\Program Files\Java\jre6\bin\jqs.exe
C:\Program Files\Common Files\LightScribe\LSSrvc.exe
C:\WINDOWS\system32\HPZipm12.exe
C:\WINDOWS\system32\svchost.exe -k imgsvc
C:\WINDOWS\RTHDCPL.EXE
C:\PROGRA~1\ALWILS~1\Avast4\ashDisp.exe
C:\WINDOWS\system32\RUNDLL32.EXE
C:\Program Files\Java\jre6\bin\jusched.exe
C:\WINDOWS\system32\wuauclt.exe
C:\WINDOWS\explorer.exe
C:\Documents and Settings\Kellie\Desktop\dds.scr

============== Pseudo HJT Report ===============

uStart Page = hxxp://www.google.com.au/ig?hl=en&source=iglk
BHO: Adobe PDF Reader Link Helper: {06849e9f-c8d7-4d59-b87d-784b7d6be0b3} - c:\program files\common files\adobe\acrobat\activex\AcroIEHelper.dll
BHO: {5C255C8A-E604-49b4-9D64-90988571CECB} - No File
BHO: ZoneAlarm Toolbar Registrar: {8a4a36c2-0535-4d2c-bd3d-496cb7eed6e3} - c:\program files\checkpoint\zaforcefield\trustchecker\bin\TrustCheckerIEPlugin.dll
BHO: Windows Live Sign-in Helper: {9030d464-4c02-4abf-8ecc-5164760863c6} - c:\program files\common files\microsoft shared\windows live\WindowsLiveLogin.dll
BHO: Java™ Plug-In 2 SSV Helper: {dbc80044-a445-435b-bc74-9c25c1c588a9} - c:\program files\java\jre6\bin\jp2ssv.dll
BHO: JQSIEStartDetectorImpl Class: {e7e6f031-17ce-4c07-bc86-eabfe594f69c} - c:\program files\java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll
TB: ZoneAlarm Toolbar: {ee2ac4e5-b0b0-4ec6-88a9-bca1a32ab107} - c:\program files\checkpoint\zaforcefield\trustchecker\bin\TrustCheckerIEPlugin.dll
uRun: [SUPERAntiSpyware] c:\program files\superantispyware\SUPERAntiSpyware.exe
mRun: [RTHDCPL] RTHDCPL.EXE
mRun: [avast!] c:\progra~1\alwils~1\avast4\ashDisp.exe
mRun: [NeroFilterCheck] c:\program files\common files\nero\lib\NeroCheck.exe
mRun: [QuickTime Task] "c:\program files\quicktime\qttask.exe" -atboottime
mRun: [NvCplDaemon] RUNDLL32.EXE c:\windows\system32\NvCpl.dll,NvStartup
mRun: [NvMediaCenter] RUNDLL32.EXE c:\windows\system32\NvMcTray.dll,NvTaskbarInit
mRun: [SunJavaUpdateSched] "c:\program files\java\jre6\bin\jusched.exe"
mRun: [AdobeCS4ServiceManager] "c:\program files\common files\adobe\cs4servicemanager\CS4ServiceManager.exe" -launchedbylogin
mRun: [ZoneAlarm Client] "c:\program files\zone labs\zonealarm\zlclient.exe"
mRun: [ISW] "c:\program files\checkpoint\zaforcefield\ForceField.exe" /icon="hidden"
IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe
DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} - hxxp://update.microsoft.com/microsoftupdate/v6/V5Controls/en/x86/client/wuweb_site.cab?1262913135109
DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} - hxxp://update.microsoft.com/microsoftupdate/v6/V5Controls/en/x86/client/muweb_site.cab?1262913104234
DPF: {7530BFB8-7293-4D34-9923-61A11451AFC5} - hxxp://download.eset.com/special/eos/OnlineScanner.cab
DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_15-windows-i586.cab
DPF: {CAFEEFAC-0016-0000-0015-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_15-windows-i586.cab
DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_15-windows-i586.cab
DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} - hxxp://download.macromedia.com/pub/shockwave/cabs/flash/swflash.cab
Notify: !SASWinLogon - c:\program files\superantispyware\SASWINLO.dll
SSODL: WPDShServiceObj - {AAA288BA-9A4C-45B0-95D7-94D524869DB5} - c:\windows\system32\WPDShServiceObj.dll
SEH: SABShellExecuteHook Class: {5ae067d3-9afb-48e0-853a-ebb7f4a000da} - c:\program files\superantispyware\SASSEH.DLL
mASetup: {10880D85-AAD9-4558-ABDC-2AB1552D831F} - "c:\program files\common files\lightscribe\LSRunOnce.exe"

============= SERVICES / DRIVERS ===============

R1 aswSP;avast! Self Protection;c:\windows\system32\drivers\aswSP.sys [2009-6-21 114768]
R1 SASDIFSV;SASDIFSV;c:\program files\superantispyware\sasdifsv.sys [2010-2-17 12872]
R1 SASKUTIL;SASKUTIL;c:\program files\superantispyware\SASKUTIL.SYS [2010-2-17 66632]
R1 vsdatant;vsdatant;c:\windows\system32\vsdatant.sys [2010-3-19 486280]
R2 aswFsBlk;aswFsBlk;c:\windows\system32\drivers\aswFsBlk.sys [2009-6-21 20560]
R2 avast! Antivirus;avast! Antivirus;c:\program files\alwil software\avast4\ashServ.exe [2009-6-21 138680]
R2 ISWKL;ZoneAlarm Toolbar ISWKL;c:\program files\checkpoint\zaforcefield\ISWKL.sys [2009-10-15 25208]
R2 IswSvc;ZoneAlarm Toolbar IswSvc;c:\program files\checkpoint\zaforcefield\ISWSVC.exe [2009-10-15 476528]
R3 SASENUM;SASENUM;c:\program files\superantispyware\SASENUM.SYS [2010-2-17 12872]
R3 VCSVADHWSer;Avnex Virtual Audio Device (WDM);c:\windows\system32\drivers\vcsvad.sys [2009-12-9 17792]
S2 vsmon;TrueVector Internet Monitor;c:\windows\system32\zonelabs\vsmon.exe -service --> c:\windows\system32\zonelabs\vsmon.exe -service [?]
S3 avast! Mail Scanner;avast! Mail Scanner;c:\program files\alwil software\avast4\ashMaiSv.exe [2009-6-21 254040]
S3 avast! Web Scanner;avast! Web Scanner;c:\program files\alwil software\avast4\ashWebSv.exe [2009-6-21 352920]

=============== Created Last 30 ================

2010-03-20 01:45:49 0 d-----w- c:\program files\ESET
2010-03-20 01:19:16 0 d-----w- C:\ComboFix
2010-03-20 00:39:38 0 d-sha-r- C:\cmdcons
2010-03-20 00:38:25 98816 ----a-w- c:\windows\sed.exe
2010-03-20 00:38:25 77312 ----a-w- c:\windows\MBR.exe
2010-03-20 00:38:25 261632 ----a-w- c:\windows\PEV.exe
2010-03-20 00:38:25 161792 ----a-w- c:\windows\SWREG.exe
2010-03-19 02:35:01 664 ----a-w- c:\windows\system32\d3d9caps.dat
2010-03-19 02:21:28 0 d-----w- c:\docume~1\kellie\applic~1\CheckPoint
2010-03-19 02:21:17 0 d-----w- c:\program files\CheckPoint
2010-03-19 02:21:16 4212 ---ha-w- c:\windows\system32\zllictbl.dat
2010-03-19 02:21:08 1238408 ----a-w- c:\windows\system32\zpeng25.dll
2010-03-19 02:21:08 0 d-----w- c:\windows\system32\ZoneLabs
2010-03-19 02:21:07 422437 ----a-w- c:\windows\system32\vsconfig.xml
2010-03-19 02:21:06 0 d-----w- c:\program files\Zone Labs
2010-03-19 02:20:28 0 d-----w- c:\windows\Internet Logs
2010-03-19 01:02:00 0 d-----w- c:\windows\system32\NtmsData
2010-03-18 01:53:37 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2010-03-18 01:53:35 19160 ----a-w- c:\windows\system32\drivers\mbam.sys
2010-03-16 19:05:35 0 d-----w- c:\program files\Trend Micro
2010-03-16 06:58:34 0 d-----w- c:\program files\Spybot - Search & Destroy
2010-03-16 06:58:34 0 d-----w- c:\docume~1\alluse~1\applic~1\Spybot - Search & Destroy
2010-03-16 03:47:29 0 d-----w- c:\docume~1\alluse~1\applic~1\SUPERAntiSpyware.com
2010-03-16 03:47:21 0 d-----w- c:\program files\SUPERAntiSpyware
2010-03-16 03:47:21 0 d-----w- c:\docume~1\kellie\applic~1\SUPERAntiSpyware.com
2010-03-16 02:52:50 0 d-----w- c:\docume~1\kellie\applic~1\Malwarebytes
2010-03-16 02:52:46 0 d-----w- c:\program files\Malwarebytes' Anti-Malware
2010-03-16 02:52:46 0 d-----w- c:\docume~1\alluse~1\applic~1\Malwarebytes
2010-03-16 02:30:20 0 d-----w- c:\program files\InterMute
2010-03-08 21:33:52 0 d-----w- c:\docume~1\alluse~1\applic~1\Avnex
2010-03-08 04:19:27 37474 ----a-w- c:\documents and settings\kellie\.recently-used.xbel
2010-03-07 01:11:54 0 d-----w- c:\docume~1\kellie\applic~1\ids
2010-03-07 01:11:47 0 d-----w- c:\program files\IDS
2010-03-06 21:03:29 0 d-----w- c:\docume~1\kellie\applic~1\Ambient Design
2010-03-06 21:01:27 0 d-----w- c:\program files\Ambient Design

==================== Find3M ====================

2010-03-20 00:31:56 95360 ------w- c:\windows\system32\drivers\atapi.sys
2010-01-12 04:03:33 6359168 ----a-w- c:\windows\system32\nv4_disp.dll
2010-01-12 04:03:33 61440 ----a-w- c:\windows\system32\OpenCL.dll
2010-01-12 04:03:33 592488 -c--a-w- c:\windows\system32\nvudisp.exe
2010-01-12 04:03:33 4104192 ----a-w- c:\windows\system32\nvcuda.dll
2010-01-12 04:03:33 4077672 ----a-w- c:\windows\system32\nvcuvenc.dll
2010-01-12 04:03:33 2283526 ----a-w- c:\windows\system32\nvdata.bin
2010-01-12 04:03:33 2259560 ----a-w- c:\windows\system32\nvcuvid.dll
2010-01-12 04:03:33 182888 ----a-w- c:\windows\system32\nvcodins.dll
2010-01-12 04:03:33 182888 ----a-w- c:\windows\system32\nvcod.dll
2010-01-12 04:03:33 14458880 ----a-w- c:\windows\system32\nvoglnt.dll
2010-01-12 04:03:33 11632640 ----a-w- c:\windows\system32\nvcompiler.dll
2010-01-12 04:03:33 1081344 ----a-w- c:\windows\system32\nvapi.dll
2010-01-11 11:17:44 278120 ----a-w- c:\windows\system32\nvmccs.dll
2010-01-11 11:17:44 154216 ----a-w- c:\windows\system32\nvsvc32.exe
2010-01-11 11:17:44 145000 ----a-w- c:\windows\system32\nvcolor.exe
2010-01-11 11:17:44 13666408 ----a-w- c:\windows\system32\nvcpl.dll
2010-01-11 11:17:44 110696 ----a-w- c:\windows\system32\nvmctray.dll
2010-01-11 11:17:40 81920 ----a-w- c:\windows\system32\nvwddi.dll
2006-06-24 22:48:54 32768 -c--a-r- c:\windows\inf\UpdateUSB.exe

============= FINISH: 13:47:20.35 ===============

If it is all clean, Im not sure what to do next. As in, what programs to keep and what order to do things in, such as make a restore point then update service packs/browser etc or.. well any of that stuff. I dont know LOL

I havent rebooted yet either. LOL. I guess I need to learn how to plug the holes :|


#11 sempai

sempai

    noypi


  • Malware Response Team
  • 5,288 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:3 stars and a sun
  • Local time:06:45 AM

Posted 19 March 2010 - 10:04 PM

Hi,

QUOTE
If it is all clean, Im not sure what to do next. As in, what programs to keep and what order to do things in, such as make a restore point then update service packs/browser etc or.. well any of that stuff. I dont know LOL

Don't worry we will not end this without going to that part.... thumbup2.giftongue.gif

After doing the update below, please restart your PC tongue.gif tongue.gif tongue.gif Then tell me any other issues, concerns or questions that you still have on mind before we do the final step. smile.gif

++++++++++++++++++


1. Your Java is out of date. Older versions have vulnerabilities that malicious sites can use to exploit and infect your system. Please follow these steps to remove older version Java components and update:
  • Download the latest version of  Java Runtime Environment (JRE) Version 6 and save it to your desktop.
  • Look for "JDK 6 Update 18 (JDK or JRE)...allows end-users to run Java applications".
  • Click the "Download JRE" button to the right.
  • Select your Platform: "Windows".
  • Select your Language: "Multi-language".
  • Read the License Agreement, and then check the box that says: "Accept License Agreement".
  • Click Continue and the page will refresh.
  • Click on the link to download Windows Offline Installation and save the file to your desktop.
  • Close any programs you may have running - especially your web browser.
  • Go to Start > Settings > Control Panel, double-click on Add/Remove Programs and remove all older versions of Java.
  • Check (highlight) any item with Java Runtime Environment (JRE or J2SE) in the name.
  • Click the Remove or Change/Remove button.
  • Repeat as many times as necessary to remove each Java versions.
  • Reboot your computer once all Java components are removed.
  • Then from your desktop double-click on jre-6u18-windows-i586-p.exe to install the newest version.



2. Download the latest version of Adobe Reader. --> HERE
  • Unchecked Free McAfeeŽ Security Scan Plus.
  • Click download and install it by following the prompts.


~Semp

~Semp

btn_donate_LG.gif
You can help me continue the fight against malware by making a donation, Thank you.

If I am helping you and I didn't reply within 48 hours... Please send me a private message.
Topics that are not replied within 5 days will be close. Please don't PM asking for support, post on the Forums instead.

Member of UNITE (Unified Network of Instructors and Trained Eliminators) 


#12 Kaboobie

Kaboobie
  • Topic Starter

  • Members
  • 15 posts
  • OFFLINE
  •  
  • Local time:09:45 AM

Posted 19 March 2010 - 10:41 PM

Updated both of those things, seems to be running nicely again now. No virus popups or browser re-directs. I am noticing boot up is a little slower, Im wondering if thats just from ZA, Avast! and SAS loading up? I used to only have Avast! so figure it could be from the two new programs loading.
I never know whether to "always" allow things to access the net or if its best to just allow when things ask in ZA.
I also have a disc looking icon on my desktop called settings.dat, which could be from my failed backup attempt Im not sure LOL.
My desktop is pretty cluttered at the moment hysterical.gif
And yeah I still dont know which order to update my security patches etc lol

Thats all the questions I can think of at the moment, you've been great! thumbup.gif

#13 sempai

sempai

    noypi


  • Malware Response Team
  • 5,288 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:3 stars and a sun
  • Local time:06:45 AM

Posted 19 March 2010 - 11:15 PM

Yay!!! You finally found the courage to restart your PC. hysterical.gif <--Just kidding.

Installing those new programs will surely create an effect on your boot up time because they are being loaded upon start up, and weather you still want to keep them or not... it's all up to you.
But remember to always use an Antivirus and Firewall program, I can suggest that you keep Avast.

You already have MBAM installed which is a very good anti-malware program, you can keep it for on demand scan.

With regards to your ZA firewall, if you decided to remove it make sure that windows firewall is "ON". I can't monitor what your firewall is prompting you to gain access or not so I can't give you a definite answer on that, the only thing that I can tell is that if you know the programs that wishes to gain access then you really need to allow it. And if you really don't know how to use it, I suggest that you just remove it because it will be useless if you will just allow everything.... then use the default windows firewall.


+++++++++++++++++++++++

OK now let's get back on business...... laugh.gif


1. Uninstall Combofix
  • The following will implement some cleanup procedures as well as reset  System Restore points:
  • Click Start > Run  and copy/paste the following bolded text into the Run box and click OK:
    ComboFix /Uninstall



2. Delete/uninstall the following:
  1. HAMeb_check.exe
  2. RootRepeal
  3. TDSSKiller
  4. DDS
  5. ESET <-- Go to control panel > add remove programs and uninstall it



3. Download and Run OTC

We will now remove the tools we used during this fix using OTC.
  • Download OTC by OldTimer and save it to your desktop.
  • Double click icon to start the program. If you are using Vista, please right-click and choose run as administrator
  • Then Click the big button.
  • You will get a prompt saying "Being Cleanup Process". Please select Yes.
  • Restart your computer when prompted.



4. Download TFC to your desktop (TFC only cleans temp folders. It will not clean URL history, prefetch, or cookies).
TFC (Temp File Cleaner) will clear out all temp folders for all user accounts (temp, IE temp, java, FF, Opera, Chrome, Safari), including Administrator, All Users, LocalService, NetworkService, and any other accounts in the user folder.
  • Open the file and close any other windows.
  • It will close all programs itself when run, make sure to let it run uninterrupted.
  • Click the Start button to begin the process. The program should not take long to finish its job
  • Once it's finished it should reboot your machine, if not, do this yourself to ensure a complete clean
Note: TFC requires a reboot immediately after running. Be sure to save any unsaved work before running TFC.




5. Your Log is Clean, please take the time to read below to secure your machine and take the necessary steps to keep it Clean smile.gif
How to prevent Malware: by miekiemoes
How to increase PC speed: by miekiemoes

Visit Microsoft's Windows Update Site Frequently
It is important that you visit http://www.windowsupdate.com regularly. This will ensure your computer has always the latest security updates available installed on your computer. If there are new updates to install, install them immediately, reboot your computer, and revisit the site until there are no more critical updates.

Make sure your applications have all of their updates
It is also possible for other programs on your computer to have security vulnerability that can allow malware to infect you. Therefore, it is also a good idea to check for the latest versions of commonly installed applications that are regularly patched to fix vulnerabilities. You can check these by visiting Secunia Software Inspector and Calendar of Updates.

Install SpywareBlaster
SpywareBlaster will added a large list of programs and sites into your Internet Explorer settings that will protect you from running and downloading known malicious programs.
A tutorial on installing & using this product can be found here:
Using SpywareBlaster to protect your computer from Spyware and Malware


Practice Safe Internet
One of the main reasons people get infected in the first place is that they are not practicing Safe Internet. You practice Safe Internet when you educate yourself on how to properly use the Internet through the use of security tools and good practice. Knowing how you can get infected and what types of files and sites to avoid will be the most crucial step in keeping your computer malware free. The reality is that the majority of people who are infected with malware are ones who click on things they shouldn't be clicking on. Whether these things are files or sites it doesn't really matter. If something is out to get you, and you click on it, it most likely will. Below are a list of simple precautions to take to keep your computer clean and running securely:
  1. If you receive an attachment from someone you do not know, DO NOT OPEN IT! Simple as that. Opening attachments from people you do not know is a very common method for viruses or worms to infect your computer.
  2. If you receive an attachment and it ends with a .exe, .com, .bat, or .pif do not open the attachment unless you know for a fact that it is clean. For the casual computer user, you will almost never receive a valid attachment of this type.
  3. If you receive an attachment from someone you know, and it looks suspicious, then it probably is. The email could be from someone you know infected with a malware that is trying to infect everyone in their address book.
  4. If you are browsing the Internet and a popup appears saying that you are infected, ignore it!. These are, as far as I am concerned, scams that are being used to scare you into purchasing a piece of software. For an example of these types of popups, or Foistware, you should read this article: Foistware, And how to avoid it.
    There are also programs that disguise themselves as Anti-Spyware or security products but are instead scams. For a list of these types of programs we recommend you visit this link: Rogue/Suspect Anti-Spyware Products & Web Sites
  5. Another tactic to fool you on the web is when a site displays a popup that looks like a normal Windows message or alert. When you click on them, though, they instead bring you to another site that is trying to push a product on you. We suggest that you close these windows by clicking on the X instead of the OK button. Alternatively, you can check to see if it's a real alert by right-clicking on the window. If there is a menu that comes up saying Add to Favorites... you know it's a fake.
  6. Do not go to adult sites. I know this may bother some of you, but the fact is that a large amount of malware is pushed through these types of sites. I am not saying all adult sites do this, but a lot do.
  7. When using an Instant Messaging program be cautious about clicking on links people send to you. It is not uncommon for infections to send a message to everyone in the infected person's contact list that contains a link to an infection. Instead when you receive a message that contains a link, message back to the person asking if it is legit before you click on it.
  8. Stay away from Warez and Crack sites! In addition to the obvious copyright issues, the downloads from these sites are typically overrun with infections.
  9. Be careful of what you download off of web sites and Peer-2-Peer networks. Some sites disguise malware as legitimate software to trick you into installing them and Peer-2-Peer networks are crawling with it. If you want to download a piece of software a from a site, and are not sure if they are legitimate, you can use McAfee Siteadvisor to look up info on the site.
  10. DO NOT INSTALL any software without first reading the End User License Agreement, otherwise known as the EULA. A tactic that some developers use is to offer their software for free, but have spyware and other programs you do not want bundled with it. This is where they make their money. By reading the agreement there is a good chance you can spot this and not install the software.


To help me continue my fight against malware, please consider a donation. Thank you.



With regards,
~ Semp smile.gif


~Semp

btn_donate_LG.gif
You can help me continue the fight against malware by making a donation, Thank you.

If I am helping you and I didn't reply within 48 hours... Please send me a private message.
Topics that are not replied within 5 days will be close. Please don't PM asking for support, post on the Forums instead.

Member of UNITE (Unified Network of Instructors and Trained Eliminators) 


#14 Kaboobie

Kaboobie
  • Topic Starter

  • Members
  • 15 posts
  • OFFLINE
  •  
  • Local time:09:45 AM

Posted 19 March 2010 - 11:42 PM

thumbup2.gif

All clean and sparkly again!
I still have the settings.dat disc icon thing on desktop, Im wondering if I can just delete that and the TFC.
Is it worth keeping SB S&D or just grabbing Spywareblaster? If they are all just on demand then thats fine.
In regards to ZA, its been a while since Ive used it, I used to have a clue, I think this just scared me, my first serious infection LOL

I will definitely be reading all those sites, AFTER I go and update my service packs that I've been avoiding huh.gif (I dont like IE 8 but OK, lesson learned lol)

Thanks again you've been awesome clapping.gif

#15 sempai

sempai

    noypi


  • Malware Response Team
  • 5,288 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:3 stars and a sun
  • Local time:06:45 AM

Posted 19 March 2010 - 11:54 PM

Hi,

If that settings.dat only appeared when we did the fixed then you can safely delete it.

QUOTE
Is it worth keeping SB S&D or just grabbing Spywareblaster? If they are all just on demand then thats fine.

Using Spybot S&D for on demand scan will do no harm plus it also comes with extra features. Spywareblaster will do no scan, it will only add a large list on your host file so that known bad sites will be block and help prevent from getting infected. It's helpful and I really recommend that you use it.

Hope that helps.


~Semp

Edited by sempai, 19 March 2010 - 11:56 PM.

~Semp

btn_donate_LG.gif
You can help me continue the fight against malware by making a donation, Thank you.

If I am helping you and I didn't reply within 48 hours... Please send me a private message.
Topics that are not replied within 5 days will be close. Please don't PM asking for support, post on the Forums instead.

Member of UNITE (Unified Network of Instructors and Trained Eliminators) 





0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users