Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Internet Security 2010 Malware & Explorer.exe crash


  • Please log in to reply
8 replies to this topic

#1 zubadoo

zubadoo

  • Members
  • 21 posts
  • OFFLINE
  •  
  • Local time:10:18 AM

Posted 07 April 2010 - 10:28 AM

Hello, I think I am infected with the internet security 2010 malware and my explorer is crashing so I am having trouble diagnosing & fixing the issue. Here are the sequence of events that happened:

-Notice of possible malware from Kaspersky. Saw fake internet security scan screen & notification of malware infection
-Restarted computer
-Tried to re-log on to computer, but got explorer.exe crash. Only see blue background (not blue screen of death), no apps. Unable to navigate via run menu on task manager
-Crash message is: instruction at 0x9519286b referenced memory at 0x9519286b. The memory could not be read
-I can see ~ 43 processes in task manager. Some of them look fishy, i.e. there are spaces between the process name & .exe
-Unable to boot into safe mode (hangs)
-Repaired xp with boot CD, still same explorer crash problem, but now can boot to safe mode
-Safe mode opens fine, no explorer crash
-Cant install mbam or superantimalware in safe mode (“the windows installer service could not be accessed”), cant access internet to update
-Tried renaming explorer.exe file & extension & change reference in regedit. Explorer still crashes
-In safe mode, after msconfig, cant change startup selections (“access denied, need administrator account” even though my account is administrator). Stuck in diagnostic selective startup mode.

Please help. Not sure what to do here. Any help with this is greatly appreciated.

BC AdBot (Login to Remove)

 


#2 zubadoo

zubadoo
  • Topic Starter

  • Members
  • 21 posts
  • OFFLINE
  •  
  • Local time:10:18 AM

Posted 08 April 2010 - 02:20 PM

bump

#3 Budapest

Budapest

    Bleepin' Cynic


  • Moderator
  • 23,579 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:01:18 AM

Posted 08 April 2010 - 04:21 PM

See this guide:

http://www.bleepingcomputer.com/virus-remo...t-security-2010
The power of accurate observation is commonly called cynicism by those who haven't got it.

—George Bernard Shaw

#4 zubadoo

zubadoo
  • Topic Starter

  • Members
  • 21 posts
  • OFFLINE
  •  
  • Local time:10:18 AM

Posted 08 April 2010 - 09:20 PM

Thank you for the help.

I followed that post, but it did not work. Here is what I did:
-In safe mode ran rkill.com
-Ran MBAM, got code 2 error, followed rest of procedure & got it to work
-MBAM full scan Found items below (see MBAM1)
-Restarted & logged on normal with normal startup
-Noticed some error messages plus windows installer keeps popping up
-Installed superantispyware & updated. Found items below (see sas1)
-Restarted & ran MBAM again, quick scan. Found the items below (see MBAM2)
-I also searched the c drive to find any new files that were being created. Found a file at C:\Temp\log.txt that shows copying of my startup programs (see log.txt below)

PLEASE HELP! I don't know what to do. Thank you.

MBAM1
----------------------------------------------------
Malwarebytes' Anti-Malware 1.45
www.malwarebytes.org

Database version: 3930

Windows 5.1.2600 Service Pack 2 (Safe Mode)
Internet Explorer 6.0.2900.2180

4/8/2010 7:01:29 PM
mbam-log-2010-04-08 (19-01-29).txt

Scan type: Full scan (C:\|)
Objects scanned: 269616
Time elapsed: 57 minute(s), 29 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 4
Registry Values Infected: 4
Registry Data Items Infected: 5
Folders Infected: 0
Files Infected: 14

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msascui.exe (Security.Hijack) -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MsMpEng.exe (Security.Hijack) -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MpCmdRun.exe (Security.Hijack) -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msseces.exe (Security.Hijack) -> No action taken.

Registry Values Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\adobe_reader (Trojan.Agent) -> No action taken.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\idstrf (Malware.Trace) -> No action taken.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\winid (Malware.Trace) -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\sinizemoru (Trojan.Vundo) -> No action taken.

Registry Data Items Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Clients\StartMenuInternet\FIREFOX.EXE\shell\open\command\(default) (Hijack.StartMenuInternet) -> Bad: ("C:\Documents and Settings\Gerry\Local Settings\Application Data\ave.exe" /START "firefox.exe") Good: (firefox.exe) -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Clients\StartMenuInternet\FIREFOX.EXE\shell\safemode\command\(default) (Hijack.StartMenuInternet) -> Bad: ("C:\Documents and Settings\Gerry\Local Settings\Application Data\ave.exe" /START "firefox.exe -safe-mode") Good: (firefox.exe -safe-mode) -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\AntiVirusDisableNotify (Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\FirewallDisableNotify (Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\UpdatesDisableNotify (Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> No action taken.

Folders Infected:
(No malicious items detected)

Files Infected:
C:\WINDOWS\system32\drivers\zvxmjetf.sys (Rootkit.Agent) -> No action taken.
C:\Program Files\Internet Explorer\js.mui (Trojan.Downloader) -> No action taken.
C:\Documents and Settings\Gerry\Local Settings\Temp\wmpscfgs.exe (Trojan.Agent) -> No action taken.
C:\WINDOWS\Temp\wmpscfgs.exe (Trojan.Agent) -> No action taken.
c:\program files\internet explorer\wmpscfgs.exe (Trojan.Agent) -> No action taken.
C:\Documents and Settings\Silmara\Start Menu\Programs\Startup\scandisk.dll (Trojan.Downloader) -> No action taken.
C:\Documents and Settings\Silmara\Start Menu\Programs\Startup\scandisk.lnk (Trojan.Downloader) -> No action taken.
C:\WINDOWS\system32\notepad.dll (Trojan.Agent) -> No action taken.
C:\Documents and Settings\Gerry\Local Settings\Temp\nsrbgxod.bak (Trojan.Agent) -> No action taken.
C:\Documents and Settings\Silmara\Local Settings\Temp\nsrbgxod.bak (Trojan.Agent) -> No action taken.
C:\Documents and Settings\Gerry\ntload.dll (Trojan.Agent) -> No action taken.
C:\Documents and Settings\Silmara\ntload.dll (Trojan.Agent) -> No action taken.
C:\Documents and Settings\Gerry\Local Settings\Application Data\ave.exe (Rogue.MultipleAV) -> No action taken.
C:\Documents and Settings\Gerry\rundll32.exe (Heuristics.Reserved.Word.Exploit) -> No action taken.


SAS1
----------------------------------------------------
SUPERAntiSpyware Scan Log
http://www.superantispyware.com

Generated 04/08/2010 at 09:10 PM

Application Version : 4.35.1002

Core Rules Database Version : 4744
Trace Rules Database Version: 2597

Scan type : Complete Scan
Total Scan Time : 00:40:21

Memory items scanned : 464
Memory threats detected : 1
Registry items scanned : 9140
Registry threats detected : 14
File items scanned : 25086
File threats detected : 160

Trojan.Smitfraud Variant-Gen/Bensorty
C:\WINDOWS\SYSTEM32\D7VVR.DLL
C:\WINDOWS\SYSTEM32\D7VVR.DLL
HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler#{A9BA40A1-74F1-52BD-F431-00B15A2C8953}
HKCR\CLSID\{A9BA40A1-74F1-52BD-F431-00B15A2C8953}
HKCR\CLSID\{A9BA40A1-74F1-52BD-F431-00B15A2C8953}
HKCR\CLSID\{A9BA40A1-74F1-52BD-F431-00B15A2C8953}#ThreadingModel
HKCR\CLSID\{A9BA40A1-74F1-52BD-F431-00B15A2C8953}\InProcServer32
HKCR\CLSID\{A9BA40A1-74F1-52BD-F431-00B15A2C8953}\InProcServer32#ThreadingModel
HKU\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{A9BA40A1-74F1-52BD-F431-00B15A2C8953}
HKU\S-1-5-21-854245398-926492609-682003330-1003\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{A9BA40A1-74F1-52BD-F431-00B15A2C8953}
HKU\S-1-5-18\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{A9BA40A1-74F1-52BD-F431-00B15A2C8953}

Rogue.Component/Trace
HKLM\Software\Microsoft\0C9CB79B
HKLM\Software\Microsoft\0C9CB79B#0c9cb79b
HKLM\Software\Microsoft\0C9CB79B#Version
HKLM\Software\Microsoft\0C9CB79B#0c9c1a1b
HKLM\Software\Microsoft\0C9CB79B#0c9c73fe

Adware.Tracking Cookie

Rogue.Agent/Gen-Nullo[DLL]
C:\WINDOWS\SMPROFLT.DLL

Adware.Vundo/Variant-Taki
C:\WINDOWS\SYSTEM32\MIMADOVE.DLL



MBAM2

----------------------------------------------------
Malwarebytes' Anti-Malware 1.45
www.malwarebytes.org

Database version: 3930

Windows 5.1.2600 Service Pack 2
Internet Explorer 6.0.2900.2180

4/8/2010 9:41:08 PM
mbam-log-2010-04-08 (21-41-08).txt

Scan type: Quick scan
Objects scanned: 127199
Time elapsed: 7 minute(s), 47 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 2
Registry Data Items Infected: 1
Folders Infected: 0
Files Infected: 4

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\idstrf (Malware.Trace) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\sinizemoru (Trojan.Vundo) -> Quarantined and deleted successfully.

Registry Data Items Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\UpdatesDisableNotify (Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.

Folders Infected:
(No malicious items detected)

Files Infected:
C:\Program Files\Internet Explorer\js.mui (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\Documents and Settings\Gerry\Local Settings\Temp\wmpscfgs.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\wmpscfgs.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Gerry\rundll32.exe (Heuristics.Reserved.Word.Exploit) -> Quarantined and deleted successfully.



Log.txt
----------------------------------------------------
[21:45:20 - qttask .exe] +++PPP> LOCK
[21:45:21 - qttask .exe] +++PPP> UNLOCK
[21:45:21 - realsched.exe] +++PPP> LOCK
[21:45:21 - realsched.exe] +++PPP> UNLOCK
[21:45:21 - WDBtnMgrUI.exe] +++PPP> LOCK
[21:45:22 - KHALMNPR.EXE] +++PPP> LOCK
[21:45:22 - WDBtnMgrUI.exe] +++PPP> UNLOCK
[21:45:22 - iaanotif.exe] +++PPP> LOCK
[21:45:22 - KHALMNPR.EXE] +++PPP> UNLOCK
[21:45:23 - CTSysVol.exe] +++PPP> LOCK
[21:45:23 - iaanotif.exe] +++PPP> UNLOCK
[21:45:23 - qttask .exe] +++PPP> LOCK
[21:45:23 - CTSysVol.exe] +++PPP> UNLOCK
[21:45:24 - qttask .exe] +++PPP> UNLOCK
[21:45:24 - CTHELPER.EXE] +++PPP> LOCK
[21:45:25 - realsched.exe] +++PPP> LOCK
[21:45:25 - CTHELPER.EXE] +++PPP> UNLOCK
[21:45:25 - qttask .exe] ======> SLEEPING
[21:45:25 - realsched.exe] +++PPP> UNLOCK
[21:45:25 - MemOptimizer.exe] +++PPP> LOCK
[21:45:26 - MemOptimizer.exe] +++PPP> UNLOCK
[21:45:26 - seccopy .exe] +++PPP> LOCK
[21:45:26 - realsched.exe] ======> SLEEPING
[21:45:26 - WDBtnMgrUI.exe] +++PPP> LOCK
[21:45:26 - seccopy .exe] +++PPP> UNLOCK
[21:45:27 - KHALMNPR.EXE] +++PPP> LOCK
[21:45:27 - WDBtnMgrUI.exe] +++PPP> UNLOCK
[21:45:27 - SUPERAntiSpyware.exe] +++PPP> LOCK
[21:45:27 - KHALMNPR.EXE] +++PPP> UNLOCK
[21:45:27 - WDBtnMgrUI.exe] ======> SLEEPING
[21:45:28 - SUPERAntiSpyware.exe] +++PPP> UNLOCK
[21:45:28 - seccopy .exe] +++PPP> LOCK
[21:45:28 - KHALMNPR.EXE] ======> SLEEPING
[21:45:28 - seccopy .exe] +++PPP> UNLOCK
[21:45:28 - iaanotif.exe] +++PPP> LOCK
[21:45:29 - CTSysVol.exe] +++PPP> LOCK
[21:45:29 - iaanotif.exe] +++PPP> UNLOCK
[21:45:29 - CTSysVol.exe] +++PPP> UNLOCK
[21:45:29 - CTHELPER.EXE] +++PPP> LOCK
[21:45:29 - iaanotif.exe] ======> SLEEPING
[21:45:30 - CTSysVol.exe] ======> SLEEPING
[21:45:30 - MemOptimizer.exe] +++PPP> LOCK
[21:45:30 - CTHELPER.EXE] +++PPP> UNLOCK
[21:45:30 - MemOptimizer.exe] +++PPP> UNLOCK
[21:45:30 - seccopy .exe] +++PPP> LOCK
[21:45:31 - CTHELPER.EXE] ======> SLEEPING
[21:45:31 - SUPERAntiSpyware.exe] +++PPP> LOCK
[21:45:31 - seccopy .exe] +++PPP> UNLOCK
[21:45:31 - seccopy .exe] +++PPP> LOCK
[21:45:31 - SUPERAntiSpyware.exe] +++PPP> UNLOCK
[21:45:31 - MemOptimizer.exe] ======> SLEEPING
[21:45:32 - seccopy .exe] +++PPP> UNLOCK
[21:45:32 - seccopy .exe] ======> SLEEPING
[21:45:33 - khalmnpr .exe] +++PPP> LOCK
[21:45:33 - seccopy .exe] ======> SLEEPING
[21:45:33 - khalmnpr .exe] +++PPP> UNLOCK
[21:45:33 - khalmnpr .exe] +++PPP> LOCK
[21:45:34 - khalmnpr .exe] +++PPP> UNLOCK
[21:45:34 - SUPERAntiSpyware.exe] ======> SLEEPING
[21:45:34 - khalmnpr .exe] ======> SLEEPING
[21:45:37 - seccopy .exe] +++PPP> LOCK
[21:45:38 - seccopy .exe] +++PPP> UNLOCK
[21:45:38 - seccopy .exe] +++PPP> LOCK
[21:45:38 - seccopy .exe] +++PPP> UNLOCK
[21:45:39 - seccopy .exe] ======> SLEEPING
[21:45:39 - avp.exe] +++PPP> LOCK
[21:45:40 - avp.exe] +++PPP> UNLOCK
[21:45:40 - avp.exe] +++PPP> LOCK
[21:45:40 - qttask .exe] ======> GETTING MUTEX
[21:45:40 - qttask .exe] ======> GOT MUTEX
[21:45:40 - avp.exe] +++PPP> UNLOCK
[21:45:41 - avp.exe] ======> SLEEPING
[21:45:41 - realsched.exe] ======> GETTING MUTEX
[21:45:42 - WDBtnMgrUI.exe] ======> GETTING MUTEX
[21:45:43 - KHALMNPR.EXE] ======> GETTING MUTEX
[21:45:44 - seccopy .exe] +++PPP> LOCK
[21:45:44 - iaanotif.exe] ======> GETTING MUTEX
[21:45:44 - seccopy .exe] +++PPP> UNLOCK
[21:45:44 - seccopy .exe] +++PPP> LOCK
[21:45:45 - CTSysVol.exe] ======> GETTING MUTEX
[21:45:45 - seccopy .exe] +++PPP> UNLOCK
[21:45:45 - seccopy .exe] ======> SLEEPING
[21:45:46 - CTHELPER.EXE] ======> GETTING MUTEX
[21:45:46 - avp .exe] +++PPP> LOCK
[21:45:46 - MemOptimizer.exe] ======> GETTING MUTEX
[21:45:46 - avp .exe] +++PPP> UNLOCK
[21:45:46 - avp .exe] +++PPP> LOCK
[21:45:47 - avp .exe] +++PPP> UNLOCK
[21:45:47 - seccopy .exe] ======> GETTING MUTEX
[21:45:47 - avp .exe] ======> SLEEPING
[21:45:48 - seccopy .exe] ======> GETTING MUTEX
[21:45:49 - SUPERAntiSpyware.exe] ======> GETTING MUTEX
[21:45:49 - khalmnpr .exe] ======> GETTING MUTEX
[21:45:50 - seccopy .exe] +++PPP> LOCK
[21:45:51 - seccopy .exe] +++PPP> UNLOCK
[21:45:51 - seccopy .exe] +++PPP> LOCK
[21:45:51 - seccopy .exe] +++PPP> UNLOCK
[21:45:52 - seccopy .exe] ======> SLEEPING
[21:45:52 - avp .exe] +++PPP> LOCK
[21:45:53 - avp .exe] +++PPP> UNLOCK
[21:45:53 - avp .exe] +++PPP> LOCK
[21:45:53 - avp .exe] +++PPP> UNLOCK
[21:45:53 - avp .exe] ======> SLEEPING
[21:45:54 - seccopy .exe] ======> GETTING MUTEX
[21:45:56 - avp.exe] ======> GETTING MUTEX
[21:45:59 - avp .exe] +++PPP> LOCK
[21:45:59 - avp .exe] +++PPP> UNLOCK
[21:45:59 - avp .exe] +++PPP> LOCK
[21:46:00 - avp .exe] +++PPP> UNLOCK
[21:46:00 - avp .exe] ======> SLEEPING
[21:46:00 - seccopy .exe] ======> GETTING MUTEX
[21:46:02 - avp .exe] ======> GETTING MUTEX
[21:46:05 - avp .exe] +++PPP> LOCK
[21:46:06 - avp .exe] +++PPP> UNLOCK
[21:46:06 - avp .exe] +++PPP> LOCK
[21:46:06 - avp .exe] +++PPP> UNLOCK
[21:46:06 - avp .exe] ======> SLEEPING
[21:46:07 - seccopy .exe] ======> GETTING MUTEX
[21:46:08 - avp .exe] ======> GETTING MUTEX
[21:46:09 - avp .exe] +++PPP> LOCK
[21:46:10 - avp .exe] +++PPP> UNLOCK
[21:46:10 - avp .exe] +++PPP> LOCK
[21:46:10 - avp .exe] +++PPP> UNLOCK
[21:46:10 - avp .exe] ======> SLEEPING
[21:46:11 - avp .exe] +++PPP> LOCK
[21:46:12 - avp .exe] +++PPP> UNLOCK
[21:46:12 - avp .exe] +++PPP> LOCK
[21:46:12 - avp .exe] +++PPP> UNLOCK
[21:46:13 - avp .exe] ======> SLEEPING
[21:46:15 - avp .exe] ======> GETTING MUTEX
[21:46:15 - avp .exe] +++PPP> LOCK
[21:46:16 - avp .exe] +++PPP> UNLOCK
[21:46:16 - avp .exe] +++PPP> LOCK
[21:46:16 - avp .exe] +++PPP> UNLOCK
[21:46:17 - avp .exe] ======> SLEEPING
[21:46:18 - avp .exe] +++PPP> LOCK
[21:46:18 - avp .exe] +++PPP> UNLOCK
[21:46:18 - avp .exe] +++PPP> LOCK
[21:46:19 - avp .exe] +++PPP> UNLOCK
[21:46:19 - avp .exe] ======> SLEEPING
[21:46:21 - avp .exe] ======> GETTING MUTEX
[21:46:22 - avp .exe] +++PPP> LOCK
[21:46:22 - avp .exe] +++PPP> UNLOCK
[21:46:22 - avp .exe] +++PPP> LOCK
[21:46:23 - avp .exe] +++PPP> UNLOCK
[21:46:23 - avp .exe] ======> SLEEPING
[21:46:25 - avp .exe] +++PPP> LOCK
[21:46:25 - avp .exe] +++PPP> UNLOCK
[21:46:25 - avp .exe] +++PPP> LOCK
[21:46:25 - avp .exe] ======> GETTING MUTEX
[21:46:26 - avp .exe] +++PPP> UNLOCK
[21:46:26 - avp .exe] ======> SLEEPING
[21:46:28 - avp .exe] ======> GETTING MUTEX
[21:46:28 - avp .exe] +++PPP> LOCK
[21:46:29 - avp .exe] +++PPP> UNLOCK
[21:46:29 - avp .exe] +++PPP> LOCK
[21:46:29 - avp .exe] +++PPP> UNLOCK
[21:46:30 - avp .exe] ======> SLEEPING
[21:46:31 - avp .exe] +++PPP> LOCK
[21:46:32 - avp .exe] ======> GETTING MUTEX
[21:46:32 - avp .exe] +++PPP> UNLOCK
[21:46:32 - avp .exe] +++PPP> LOCK
[21:46:32 - avp .exe] +++PPP> UNLOCK
[21:46:33 - avp .exe] ======> SLEEPING
[21:46:34 - avp .exe] ======> GETTING MUTEX
[21:46:35 - avp .exe] +++PPP> LOCK
[21:46:35 - avp .exe] +++PPP> UNLOCK
[21:46:35 - avp .exe] +++PPP> LOCK
[21:46:36 - avp .exe] +++PPP> UNLOCK
[21:46:38 - avp .exe] +++PPP> LOCK
[21:46:38 - avp .exe] ======> GETTING MUTEX
[21:46:39 - avp .exe] +++PPP> UNLOCK
[21:46:39 - avp .exe] +++PPP> LOCK
[21:46:39 - avp .exe] +++PPP> UNLOCK
[21:46:39 - avp .exe] ======> SLEEPING
[21:46:40 - qttask .exe] ======> DOING I NSTALLS
[21:46:41 - qttask .exe] ---------> LOCKING MUTEX
[21:46:41 - qttask .exe] +++III> LOCK
[21:46:41 - qttask .exe] ---------> 1
[21:46:41 - qttask .exe] STARTUP: C:\WINDOWS\system32\ctfmon.exe
[21:46:41 - qttask .exe] !!!!!!!!!!!!!!NOT MY FILE!!!!!!!!!!!!!!!!!!!!!
[21:46:41 - qttask .exe] STARTUP: "C:\Program Files\TuneUp Utilities 2009\MemOptimizer.exe" autostart
[21:46:41 - avp .exe] ======> GETTING MUTEX
[21:46:42 - qttask .exe] DELETEING ALL FILES IN: c:\program files\tuneup utilities 2009\*.delme*
[21:46:42 - avp .exe] ======> SLEEPING
[21:46:43 - qttask .exe] STARTUP: "C:\program files\seccopy\seccopy .exe"
[21:46:43 - qttask .exe] DELETEING ALL FILES IN: c:\program files\seccopy\*.delme*
[21:46:44 - qttask .exe] STARTUP: "c:\program files\seccopy\seccopy .exe"
[21:46:45 - avp .exe] ======> GETTING MUTEX
[21:46:48 - avp .exe] ======> GETTING MUTEX
[21:46:54 - avp .exe] ======> GETTING MUTEX
[21:46:57 - avp .exe] ======> GETTING MUTEX
[21:50:33 - realsched.exe] +++PPP> LOCK
[21:50:33 - realsched.exe] +++PPP> UNLOCK
[21:50:33 - realsched.exe] +++PPP> LOCK
[21:50:34 - realsched.exe] +++PPP> UNLOCK
[21:50:34 - realsched.exe] ======> SLEEPING
[21:50:49 - realsched.exe] ======> GETTING MUTEX
[21:50:49 - realsched.exe] ======> GOT MUTEX
[21:51:49 - realsched.exe] ======> DOING I NSTALLS
[21:51:49 - realsched.exe] ---------> LOCKING MUTEX
[21:51:49 - realsched.exe] +++III> LOCK
[21:51:49 - realsched.exe] ---------> 1
[21:51:49 - realsched.exe] STARTUP: C:\WINDOWS\system32\ctfmon.exe
[21:51:49 - realsched.exe] !!!!!!!!!!!!!!NOT MY FILE!!!!!!!!!!!!!!!!!!!!!
[21:51:49 - realsched.exe] STARTUP: "C:\Program Files\TuneUp Utilities 2009\MemOptimizer.exe" autostart
[21:51:49 - realsched.exe] DELETEING ALL FILES IN: c:\program files\tuneup utilities 2009\*.delme*
[21:51:50 - realsched.exe] STARTUP: "C:\program files\seccopy\seccopy .exe"
[21:51:50 - realsched.exe] DELETEING ALL FILES IN: c:\program files\seccopy\*.delme*
[21:51:51 - realsched.exe] STARTUP: "c:\program files\seccopy\seccopy .exe"
[21:51:51 - realsched.exe] DELETEING ALL FILES IN: c:\program files\seccopy\*.delme*

#5 Budapest

Budapest

    Bleepin' Cynic


  • Moderator
  • 23,579 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:01:18 AM

Posted 08 April 2010 - 10:04 PM

Before we start fixing anything you should print out these instructions or copy them to a NotePad file so they will be accessible. Some steps will require you to disconnect from the Internet or use Safe Mode and you will not have access to this page.

Please download Dr.Web CureIt and save it to your desktop. DO NOT perform a scan yet.
alternate download link
Note: The file will be randomly named (i.e. 5mkuvc4z.exe).

Reboot your computer in "Safe Mode" using the F8 method. To do this, restart your computer and after hearing your computer beep once during startup (but before the Windows icon appears) press the F8 key repeatedly. A menu will appear with several options. Use the arrow keys to navigate and select the option to run Windows in "Safe Mode".

Scan with Dr.Web CureIt as follows:
  • Double-click on the randomly named file to open the program and click Start. (There is no need to update if you just downloaded the most current version
  • Read the Virus check by DrWeb scanner prompt and click Ok where asked to Start scan now? Allow the setup.exe to load if asked by any of your security programs.
  • The Express scan will automatically begin.
    (This is a short scan of files currently running in memory, boot sectors, and targeted folders).
  • If prompted to dowload the Full version Free Trial, ignore and click the X to close the window.
  • If an infected object is found, you will be prompted to move anything that cannot be cured. Click Yes to All. (This will move any detected files to the C:\Documents and Settings\userprofile\DoctorWeb\Quarantine folder if they can't be cured)
  • After the Express Scan is finished, put a check next to Complete scan to scan all local disks and removable media.
  • In the top menu, click Settings > Change settings, and uncheck "Heuristic analysis" under the "Scanning" tab, then click Apply, Ok.
  • Back at the main window, click the green arrow "Start Scanning" button on the right under the Dr.Web logo.
  • Please be patient as this scan could take a long time to complete.
  • When the scan has finished, a message will be displayed at the bottom indicating if any viruses were found.
  • Click Select All, then choose Cure > Move incurable.
  • In the top menu, click file and choose save report list.
  • Save the DrWeb.csv report to your desktop.
  • Exit Dr.Web Cureit when done.
  • Important! Reboot your computer because it could be possible that files in use will be moved/deleted during reboot.
  • After reboot, post the contents of the log from Dr.Web in your next reply. (You can use Notepad to open the DrWeb.cvs report)

The power of accurate observation is commonly called cynicism by those who haven't got it.

—George Bernard Shaw

#6 zubadoo

zubadoo
  • Topic Starter

  • Members
  • 21 posts
  • OFFLINE
  •  
  • Local time:10:18 AM

Posted 10 April 2010 - 07:20 AM

I followed your post exactly. The log is listed below. I'm surprise that this is all it found given the issues I have with all the start-up items (none of which it found).

Please advise on next steps. Thanks.


couponprinter.exe\data012;C:\Documents and Settings\Gerry\My Documents\My Completed Downloads\latest\couponprinter.exe;Adware.Coupons.34;;
couponprinter.exe\data013;C:\Documents and Settings\Gerry\My Documents\My Completed Downloads\latest\couponprinter.exe;Adware.Coupons.34;;
couponprinter.exe\data015;C:\Documents and Settings\Gerry\My Documents\My Completed Downloads\latest\couponprinter.exe;Adware.Coupons.34;;
couponprinter.exe\data016;C:\Documents and Settings\Gerry\My Documents\My Completed Downloads\latest\couponprinter.exe;Adware.Coupons.34;;
couponprinter.exe;C:\Documents and Settings\Gerry\My Documents\My Completed Downloads\latest;Container contains infected objects;Moved.;
gbiehcef.dll;c:\program files\gbplugin;Probably BACKDOOR.Trojan;Incurable.Will be deleted after restart.;
stress+reducers.exe;C:\Documents and Settings\Gerry\Desktop\_desktop_back_up\yahoo-bc-gshagmc;Joke.Puncher;Incurable.Moved.;
698500.old;C:\Program Files\Adobe;Trojan.Siggen.59885;Deleted.;
npCouponPrinter.dll;C:\Program Files\Mozilla Firefox\plugins;Adware.Coupons.34;Incurable.Moved.;

#7 Budapest

Budapest

    Bleepin' Cynic


  • Moderator
  • 23,579 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:01:18 AM

Posted 10 April 2010 - 04:51 PM

Please run a scan with SUPERAntiSpyware in Safe Mode and post the log.
The power of accurate observation is commonly called cynicism by those who haven't got it.

—George Bernard Shaw

#8 zubadoo

zubadoo
  • Topic Starter

  • Members
  • 21 posts
  • OFFLINE
  •  
  • Local time:10:18 AM

Posted 10 April 2010 - 05:18 PM

I booted into safe mode & tried to start the program and it would not start - it may have been compromised. Then I tried to uninstall & also reinstall. Both times I get the following message:

The windows installer service could not be accessed. This can occur if you are running windows in safe mode, or if the windows installer is not correctly installed.

By the way, my account is an administrator account so I should be able to install a program.

Please advise on next step.

Thanks.

#9 Budapest

Budapest

    Bleepin' Cynic


  • Moderator
  • 23,579 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:01:18 AM

Posted 10 April 2010 - 07:40 PM

I think we need to get the experts involved with this. See this topic:

http://www.bleepingcomputer.com/forums/t/34773/preparation-guide-for-use-before-using-malware-removal-tools-and-requesting-help/
The power of accurate observation is commonly called cynicism by those who haven't got it.

—George Bernard Shaw




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users