Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Infected with Trojan


  • This topic is locked This topic is locked
24 replies to this topic

#1 forever681

forever681

  • Members
  • 118 posts
  • OFFLINE
  •  
  • Local time:10:01 AM

Posted 14 April 2010 - 01:24 AM

Hello, I think my kid went to some website and it got infected with Trojan, I can't run malwarebytes even by renaming it. Here's the Hijackthis log, please help, thanks so much.


Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 11:20:52 PM, on 4/13/2010
Platform: Windows Vista SP1 (WinNT 6.00.1905)
MSIE: Internet Explorer v7.00 (7.00.6001.18000)
Boot mode: Normal

Running processes:
C:\Windows\system32\Dwm.exe
C:\Windows\Explorer.EXE
C:\Windows\system32\taskeng.exe
C:\Program Files\Toshiba\Utilities\KeNotify.exe
C:\Windows\System32\hkcmd.exe
C:\Windows\System32\igfxpers.exe
C:\Program Files\Common Files\Symantec Shared\ccApp.exe
C:\Program Files\Symantec AntiVirus\VPTray.exe
C:\Windows\system32\igfxsrvc.exe
C:\Program Files\iTunes\iTunesHelper.exe
C:\Program Files\Synaptics\SynTP\SynTPEnh.exe
C:\Windows\ehome\ehtray.exe
C:\Program Files\Common Files\Nero\Lib\NMBgMonitor.exe
C:\Windows\ehome\ehmsas.exe
C:\Program Files\Synaptics\SynTP\SynTPHelper.exe
C:\Program Files\Synaptics\SynTP\SynToshiba.exe
C:\Program Files\Common Files\Nero\Lib\NMIndexStoreSvr.exe
E:\Malwarebytes' Anti-Malware\Malwarebytes' Anti-Malware\explorer.exe
C:\Program Files\Symantec AntiVirus\DoScan.exe
C:\Program Files\Symantec AntiVirus\SavUI.exe
C:\Windows\system32\SearchFilterHost.exe
C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.hotmail.com/
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = *.local
R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName =
O2 - BHO: (no name) - {036d6a92-7b48-4e06-a62f-c3401eb016a3} - fimahafu.dll (file missing)
O4 - HKLM\..\Run: [SynTPEnh] C:\Program Files\Synaptics\SynTP\SynTPEnh.exe
O4 - HKLM\..\Run: [Windows Defender] %ProgramFiles%\Windows Defender\MSASCui.exe -hide
O4 - HKLM\..\Run: [HWSetup] C:\Program Files\TOSHIBA\Utilities\HWSetup.exe hwSetUP
O4 - HKLM\..\Run: [KeNotify] C:\Program Files\TOSHIBA\Utilities\KeNotify.exe
O4 - HKLM\..\Run: [NBKeyScan] "C:\Program Files\Nero\Nero8\Nero BackItUp\NBKeyScan.exe"
O4 - HKLM\..\Run: [SynTPStart] C:\Program Files\Synaptics\SynTP\SynTPStart.exe
O4 - HKLM\..\Run: [IgfxTray] C:\Windows\system32\igfxtray.exe
O4 - HKLM\..\Run: [HotKeysCmds] C:\Windows\system32\hkcmd.exe
O4 - HKLM\..\Run: [Persistence] C:\Windows\system32\igfxpers.exe
O4 - HKLM\..\Run: [ccApp] "C:\Program Files\Common Files\Symantec Shared\ccApp.exe"
O4 - HKLM\..\Run: [vptray] C:\PROGRA~1\SYMANT~1\VPTray.exe
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\QTTask.exe" -atboottime
O4 - HKLM\..\Run: [iTunesHelper] "C:\Program Files\iTunes\iTunesHelper.exe"
O4 - HKLM\..\Run: [misamikafi] Rundll32.exe "dehaseha.dll",s
O4 - HKCU\..\Run: [ehTray.exe] C:\Windows\ehome\ehTray.exe
O4 - HKCU\..\Run: [BgMonitor_{79662E04-7C6C-4d9f-84C7-88D8A56B10AA}] "C:\Program Files\Common Files\Nero\Lib\NMBgMonitor.exe"
O4 - HKCU\..\Run: [WMPNSCFG] C:\Program Files\Windows Media Player\WMPNSCFG.exe
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~4\Office12\EXCEL.EXE/3000
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0\bin\npjpi160.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0\bin\npjpi160.dll
O9 - Extra button: AIM - {AC9E2541-2814-11d5-BC6D-00B0D0A1DE45} - C:\Program Files\AIM\aim.exe
O16 - DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} (Shockwave Flash Object) - http://fpdownload2.macromedia.com/get/shoc...ash/swflash.cab
O17 - HKLM\System\CCS\Services\Tcpip\..\{923B438C-D655-4F07-ABAE-AD77850EA9A1}: NameServer = 83.149.115.157,4.2.2.1,68.94.156.1 68.94.157.1
O17 - HKLM\System\CCS\Services\Tcpip\..\{A09571E1-ABC9-4273-AD14-1577614854A7}: NameServer = 83.149.115.157,4.2.2.1,68.94.156.1 68.94.157.1
O20 - AppInit_DLLs: masutora.dll
O23 - Service: Agere Modem Call Progress Audio (AgereModemAudio) - Agere Systems - C:\Windows\system32\agrsmsvc.exe
O23 - Service: Apple Mobile Device - Apple Inc. - C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
O23 - Service: Bonjour Service - Apple Inc. - C:\Program Files\Bonjour\mDNSResponder.exe
O23 - Service: Symantec Event Manager (ccEvtMgr) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccSvcHst.exe
O23 - Service: Symantec Settings Manager (ccSetMgr) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccSvcHst.exe
O23 - Service: Symantec AntiVirus Definition Watcher (DefWatch) - Symantec Corporation - C:\Program Files\Symantec AntiVirus\DefWatch.exe
O23 - Service: Google Update Service (gupdate) (gupdate) - Google Inc. - C:\Program Files\Google\Update\GoogleUpdate.exe
O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\1150\Intel 32\IDriverT.exe
O23 - Service: iPod Service - Apple Inc. - C:\Program Files\iPod\bin\iPodService.exe
O23 - Service: LiveUpdate - Symantec Corporation - C:\PROGRA~1\Symantec\LIVEUP~1\LUCOMS~1.EXE
O23 - Service: Nero BackItUp Scheduler 3 - Nero AG - C:\Program Files\Nero\Nero8\Nero BackItUp\NBService.exe
O23 - Service: NMIndexingService - Nero AG - C:\Program Files\Common Files\Nero\Lib\NMIndexingService.exe
O23 - Service: SAVRoam (SavRoam) - symantec - C:\Program Files\Symantec AntiVirus\SavRoam.exe
O23 - Service: ScsiAccess - Unknown owner - C:\Program Files\Photodex\ProShowGold\ScsiAccess.exe
O23 - Service: Symantec AntiVirus - Symantec Corporation - C:\Program Files\Symantec AntiVirus\Rtvscan.exe
O23 - Service: TOSHIBA Optical Disc Drive Service (TODDSrv) - TOSHIBA Corporation - C:\Windows\system32\TODDSrv.exe
O23 - Service: Ulead Burning Helper (UleadBurningHelper) - Ulead Systems, Inc. - C:\Program Files\Common Files\Ulead Systems\DVD\ULCDRSvr.exe

--
End of file - 6289 bytes


BC AdBot (Login to Remove)

 


#2 schrauber

schrauber

    Mr.Mechanic


  • Malware Response Team
  • 24,794 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Munich,Germany
  • Local time:07:01 PM

Posted 18 April 2010 - 09:54 AM

Hello and welcome to Bleeping Computer

We apologize for the delay in responding to your request for help. Here at Bleeping Computer we get overwhelmed at times, and we are trying our best to keep up. Please note that your topic was not intentionally overlooked. Our mission is to help everyone in need, but sometimes it takes just a little longer to get to every request for help. No one is ignored here.

If you have since resolved the original problem you were having, we would appreciate you letting us know. If not please perform the following steps below so we can have a look at the current condition of your machine.

If you have not done so, include a clear description of the problems you're having, along with any steps you may have performed so far.

Upon completing the steps below another staff member will review and take the steps necessary with you to get your machine back in working order clean and free of malware.

If you have already posted a DDS log, please do so again, as your situation may have changed.
Use the 'Add Reply' and add the new log to this thread.


Thanks and again sorry for the delay.

We need to see some information about what is happening in your machine. Please perform the following scan:
  • Download DDS by sUBs from one of the following links. Save it to your desktop.
  • Double click on the DDS icon, allow it to run.
  • A small box will open, with an explaination about the tool. No input is needed, the scan is running.
  • Notepad will open with the results.
  • Follow the instructions that pop up for posting the results.
  • Close the program window, and delete the program from your desktop.
Please note: You may have to disable any script protection running if the scan fails to run. After downloading the tool, disconnect from the internet and disable all antivirus protection. Run the scan, enable your A/V and reconnect to the internet.

Information on A/V control HERE



Please download GMER from one of the following locations and save it to your desktop:
  • Main Mirror
    This version will download a randomly named file (Recommended)
  • Zipped Mirror
    This version will download a zip file you will need to extract first. If you use this mirror, please extract the zip file to your desktop.
  • Disconnect from the Internet and close all running programs.
  • Temporarily disable any real-time active protection so your security programs will not conflict with gmer's driver.
  • Double-click on the randomly named GMER file (i.e. n7gmo46c.exe) and allow the gmer.sys driver to load if asked.
  • Note: If you downloaded the zipped version, extract the file to its own folder such as C:\gmer and then double-click on gmer.exe.


  • GMER will open to the Rootkit/Malware tab and perform an automatic quick scan when first run. (do not use the computer while the scan is in progress)
  • If you receive a WARNING!!! about rootkit activity and are asked to fully scan your system...click NO.
  • Now click the Scan button. If you see a rootkit warning window, click OK.
  • When the scan is finished, click the Save... button to save the scan results to your Desktop. Save the file as gmer.log.
  • Click the Copy button and paste the results into your next reply.
  • Exit GMER and re-enable all active protection when done.
-- If you encounter any problems, try running GMER in Safe Mode.
regards,
schrauber

Posted Image
Posted Image

If I've not posted back within 48 hrs., feel free to send a PM with your topic link. Thank you!

If I have helped you then please consider donating to continue the fight against malware Posted Image

#3 forever681

forever681
  • Topic Starter

  • Members
  • 118 posts
  • OFFLINE
  •  
  • Local time:10:01 AM

Posted 18 April 2010 - 11:39 PM

Thanks so much for helping me. Below is the log for DDS.


DDS (Ver_10-03-17.01) - NTFSx86
Run by Andy at 21:28:48.27 on Sun 04/18/2010
Internet Explorer: 7.0.6001.18000
Microsoft® Windows Vista™ Home Premium 6.0.6001.1.1252.1.1033.18.1013.174 [GMT -7:00]

AV: Symantec AntiVirus *On-access scanning enabled* (Updated) {FB06448E-52B8-493A-90F3-E43226D3305C}
SP: Symantec AntiVirus *enabled* (Updated) {6C85A515-B91D-4D2B-AF18-40984A4A8493}
SP: Windows Defender *disabled* (Updated) {D68DDC3A-831F-4FAE-9E44-DA132C1ACF46}

============== Running Processes ===============

C:\Windows\system32\wininit.exe
C:\Windows\system32\lsm.exe
C:\Windows\system32\svchost.exe -k DcomLaunch
C:\Windows\system32\svchost.exe -k rpcss
C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted
C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted
C:\Windows\system32\svchost.exe -k netsvcs
C:\Windows\system32\SLsvc.exe
C:\Windows\system32\svchost.exe -k LocalService
C:\Windows\system32\svchost.exe -k NetworkService
C:\Program Files\Common Files\Symantec Shared\ccSvcHst.exe
C:\Windows\system32\Dwm.exe
C:\Windows\Explorer.EXE
C:\Windows\System32\spoolsv.exe
C:\Windows\system32\taskeng.exe
C:\Program Files\Synaptics\SynTP\SynTPEnh.exe
C:\Program Files\Toshiba\Utilities\KeNotify.exe
C:\Windows\System32\igfxpers.exe
C:\Program Files\Common Files\Symantec Shared\ccApp.exe
C:\Windows\system32\svchost.exe -k LocalServiceNoNetwork
C:\Program Files\Symantec AntiVirus\VPTray.exe
C:\Program Files\iTunes\iTunesHelper.exe
C:\Windows\ehome\ehtray.exe
C:\Program Files\Common Files\Nero\Lib\NMBgMonitor.exe
C:\Windows\system32\taskeng.exe
C:\Windows\system32\agrsmsvc.exe
C:\Windows\system32\igfxsrvc.exe
C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
C:\Program Files\Bonjour\mDNSResponder.exe
C:\Program Files\Symantec AntiVirus\DefWatch.exe
C:\Program Files\Nero\Nero8\Nero BackItUp\NBService.exe
C:\Windows\System32\svchost.exe -k HPZ12
C:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted
C:\Program Files\Synaptics\SynTP\SynToshiba.exe
C:\Program Files\Photodex\ProShowGold\ScsiAccess.exe
C:\Windows\system32\svchost.exe -k imgsvc
C:\Program Files\Symantec AntiVirus\Rtvscan.exe
C:\Windows\system32\TODDSrv.exe
C:\Program Files\Common Files\Ulead Systems\DVD\ULCDRSvr.exe
C:\Windows\System32\svchost.exe -k WerSvcGroup
C:\Windows\system32\SearchIndexer.exe
C:\Windows\ehome\ehmsas.exe
C:\Windows\system32\WUDFHost.exe
C:\Program Files\Common Files\Nero\Lib\NMIndexingService.exe
C:\Program Files\Common Files\Nero\Lib\NMIndexStoreSvr.exe
C:\Program Files\Synaptics\SynTP\SynTPHelper.exe
C:\Program Files\Symantec AntiVirus\DoScan.exe
C:\Program Files\iPod\bin\iPodService.exe
C:\Program Files\Symantec AntiVirus\SavUI.exe
C:\Users\Andy\Desktop\dds.scr
C:\PROGRA~1\Symantec\LIVEUP~1\LUCOMS~1.EXE
C:\Windows\system32\wbem\wmiprvse.exe

============== Pseudo HJT Report ===============

uStart Page = hxxp://www.hotmail.com/
uInternet Settings,ProxyOverride = *.local
BHO: {036d6a92-7b48-4e06-a62f-c3401eb016a3} - fimahafu.dll
TB: {6ADB0F93-1AA5-4BCF-9DF4-CEA689A3C111} - No File
uRun: [ehTray.exe] c:\windows\ehome\ehTray.exe
uRun: [BgMonitor_{79662E04-7C6C-4d9f-84C7-88D8A56B10AA}] "c:\program files\common files\nero\lib\NMBgMonitor.exe"
uRun: [WMPNSCFG] c:\program files\windows media player\WMPNSCFG.exe
mRun: [SynTPEnh] c:\program files\synaptics\syntp\SynTPEnh.exe
mRun: [Windows Defender] %ProgramFiles%\Windows Defender\MSASCui.exe -hide
mRun: [HWSetup] c:\program files\toshiba\utilities\HWSetup.exe hwSetUP
mRun: [KeNotify] c:\program files\toshiba\utilities\KeNotify.exe
mRun: [NBKeyScan] "c:\program files\nero\nero8\nero backitup\NBKeyScan.exe"
mRun: [SynTPStart] c:\program files\synaptics\syntp\SynTPStart.exe
mRun: [IgfxTray] c:\windows\system32\igfxtray.exe
mRun: [HotKeysCmds] c:\windows\system32\hkcmd.exe
mRun: [Persistence] c:\windows\system32\igfxpers.exe
mRun: [ccApp] "c:\program files\common files\symantec shared\ccApp.exe"
mRun: [vptray] c:\progra~1\symant~1\VPTray.exe
mRun: [QuickTime Task] "c:\program files\quicktime\QTTask.exe" -atboottime
mRun: [iTunesHelper] "c:\program files\itunes\iTunesHelper.exe"
mRun: [Malwarebytes Anti-Malware (reboot)] "e:\malwarebytes' anti-malware\malwarebytes' anti-malware\winword.exe" /runcleanupscript
mRun: [misamikafi] Rundll32.exe "dehaseha.dll",s
mPolicies-system: EnableLUA = 0 (0x0)
mPolicies-system: EnableUIADesktopToggle = 0 (0x0)
IE: E&xport to Microsoft Excel - c:\progra~1\micros~4\office12\EXCEL.EXE/3000
IE: {AC9E2541-2814-11d5-BC6D-00B0D0A1DE45} - c:\program files\aim\aim.exe
IE: {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - {CAFEEFAC-0016-0000-0000-ABCDEFFEDCBC} - c:\program files\java\jre1.6.0\bin\npjpi160.dll
DPF: {8FFBE65D-2C9C-4669-84BD-5829DC0B603C} - hxxp://fpdownload.macromedia.com/get/flashplayer/current/ultrashim.cab
DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} - hxxp://fpdownload2.macromedia.com/get/shockwave/cabs/flash/swflash.cab
Notify: igfxcui - igfxdev.dll
AppInit_DLLs: masutora.dll
LSA: Notification Packages = scecli masutora.dll

============= SERVICES / DRIVERS ===============

R3 EraserUtilRebootDrv;EraserUtilRebootDrv;c:\program files\common files\symantec shared\eengine\EraserUtilRebootDrv.sys [2009-9-5 102448]

=============== Created Last 30 ================

2010-04-15 07:20:10 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2010-04-15 07:20:07 20824 ----a-w- c:\windows\system32\drivers\mbam.sys
2010-04-14 17:20:58 4838 ----a-w- c:\windows\system32\PerfStringBackup.TMP
2010-04-14 12:19:06 0 d-----w- c:\programdata\avG
2010-04-14 07:08:09 0 d-----w- C:\Malwarebytes' Anti-Malware
2010-03-28 09:09:07 0 d-----w- c:\users\andy\appdata\roaming\Facebook

==================== Find3M ====================

2009-12-01 05:50:18 51200 ----a-w- c:\windows\inf\infpub.dat
2009-12-01 05:50:18 143360 ----a-w- c:\windows\inf\infstrng.dat
2009-11-01 21:09:25 86016 ----a-w- c:\windows\inf\infstor.dat
2008-06-14 20:36:33 174 --sha-w- c:\program files\desktop.ini
2008-06-14 20:19:52 665600 ----a-w- c:\windows\inf\drvindex.dat
2006-11-02 12:42:02 30674 ----a-w- c:\windows\inf\perflib\0409\perfd.dat
2006-11-02 12:42:02 30674 ----a-w- c:\windows\inf\perflib\0409\perfc.dat
2006-11-02 12:42:02 287440 ----a-w- c:\windows\inf\perflib\0409\perfi.dat
2006-11-02 12:42:02 287440 ----a-w- c:\windows\inf\perflib\0409\perfh.dat
2006-11-02 09:20:21 287440 ----a-w- c:\windows\inf\perflib\0000\perfi.dat
2006-11-02 09:20:21 287440 ----a-w- c:\windows\inf\perflib\0000\perfh.dat
2006-11-02 09:20:19 30674 ----a-w- c:\windows\inf\perflib\0000\perfd.dat
2006-11-02 09:20:19 30674 ----a-w- c:\windows\inf\perflib\0000\perfc.dat
2009-08-25 03:26:51 16384 --sha-w- c:\windows\serviceprofiles\localservice\appdata\local\microsoft\windows\history\history.ie5\index.dat
2009-08-25 03:26:51 32768 --sha-w- c:\windows\serviceprofiles\localservice\appdata\local\microsoft\windows\temporary internet files\content.ie5\index.dat
2009-01-15 15:41:38 16384 --sha-w- c:\windows\serviceprofiles\localservice\appdata\local\temp\cookies\index.dat
2009-01-15 15:41:38 16384 --sha-w- c:\windows\serviceprofiles\localservice\appdata\local\temp\history\history.ie5\index.dat
2009-01-15 15:41:38 32768 --sha-w- c:\windows\serviceprofiles\localservice\appdata\local\temp\temporary internet files\content.ie5\index.dat
2009-08-25 03:26:51 16384 --sha-w- c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft\windows\cookies\index.dat
2009-01-15 15:43:50 16384 --sha-w- c:\windows\serviceprofiles\networkservice\appdata\local\microsoft\windows\history\history.ie5\index.dat
2009-01-15 15:43:50 32768 --sha-w- c:\windows\serviceprofiles\networkservice\appdata\local\microsoft\windows\temporary internet files\content.ie5\index.dat
2009-01-13 23:33:45 16384 --sha-w- c:\windows\serviceprofiles\networkservice\appdata\local\temp\cookies\index.dat
2009-01-13 23:33:45 16384 --sha-w- c:\windows\serviceprofiles\networkservice\appdata\local\temp\history\history.ie5\index.dat
2009-01-13 23:36:33 32768 --sha-w- c:\windows\serviceprofiles\networkservice\appdata\local\temp\temporary internet files\content.ie5\index.dat
2009-01-15 15:43:50 16384 --sha-w- c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft\windows\cookies\index.dat
2010-01-14 00:40:05 57344 --sha-w- c:\windows\system32\vomuganu.exe
2008-12-10 02:35:16 16384 --sha-w- c:\windows\system32\config\systemprofile\appdata\local\microsoft\feeds cache\index.dat
2008-12-10 02:35:16 32768 --sha-w- c:\windows\system32\config\systemprofile\appdata\local\microsoft\windows\history\history.ie5\mshist012008120920081210\index.dat

============= FINISH: 21:33:12.10 ===============




UNLESS SPECIFICALLY INSTRUCTED, DO NOT POST THIS LOG.
IF REQUESTED, ZIP IT UP & ATTACH IT

DDS (Ver_10-03-17.01)

Microsoft® Windows Vista™ Home Premium
Boot Device: \Device\HarddiskVolume2
Install Date: 5/23/2007 12:04:28 PM
System Uptime: 4/18/2010 9:25:56 PM (0 hours ago)

Motherboard: TOSHIBA | | IAKAA
Processor: Genuine Intel® CPU T2080 @ 1.73GHz | U2E1 | 1733/mhz

==== Disk Partitions =========================

C: is FIXED (NTFS) - 110 GiB total, 27.134 GiB free.
D: is CDROM ()
E: is Removable

==== Disabled Device Manager Items =============

Class GUID:
Description:
Device ID: ROOT\LEGACY_BEEP\XX_KBIWKMRINBQBEK_XX
Manufacturer:
Name:
PNP Device ID: ROOT\LEGACY_BEEP\XX_KBIWKMRINBQBEK_XX
Service: kbiwkmrinbqbek

Class GUID:
Description:
Device ID: ROOT\LEGACY_BEEP\XX_UACD.SYS_XX
Manufacturer:
Name:
PNP Device ID: ROOT\LEGACY_BEEP\XX_UACD.SYS_XX
Service: UACd.sys

==== System Restore Points ===================

No restore point in system.

==== Installed Programs ======================

µTorrent
Adobe Flash Player 10 ActiveX
Adobe Flash Player 10 Plugin
Adobe Reader 7.0
Adobe Shockwave Player
AOL Instant Messenger
Apple Application Support
Apple Mobile Device Support
Apple Software Update
Atheros Driver Installation Program
AutoUpdate
AVI 3GP Joiner V1.20
Bonjour
CD/DVD Drive Acoustic Silencer
Convert AVI to MP4 1.3
DivX Codec
DivX Version Checker
DVD Decrypter (Remove Only)
DVD MovieFactory for TOSHIBA
DVD Shrink 3.2
DVDFab 6.2.0.5 (11/11/2009)
Facebook Plug-In
Google Update Helper
HijackThis 2.0.2
ImgBurn
ImTOO DVD to MP4 Converter
Intel® Graphics Media Accelerator Driver
iTunes
Java™ SE Runtime Environment 6
LiveUpdate 3.2 (Symantec Corporation)
Malwarebytes' Anti-Malware
Microsoft Office 2000 Premium
Microsoft Visual C++ 2005 Redistributable
Microsoft XML Parser
Mobipocket Reader 6.1
Move Media Player
MSXML 4.0 SP2 (KB936181)
MSXML 4.0 SP2 (KB941833)
MSXML 4.0 SP2 (KB954430)
Nero 8
Penguins!
Photodex Presenter
ProShow Gold
QuickTime
Realtek 8169 PCI, 8168 and 8101E PCIe Ethernet Network Card Driver for Windows Vista
Realtek High Definition Audio Driver
Symantec AntiVirus
Synaptics Pointing Device Driver
Texas Instruments PCIxx21/x515/xx12 drivers.
TIPCI
TOSHIBA Disc Creator
TOSHIBA Extended Tiles for Windows Mobility Center
TOSHIBA Flash Cards Support Utility
TOSHIBA Hardware Setup
TOSHIBA SD Memory Utilities
TOSHIBA Software Modem
Utility Common Driver
VC80CRTRedist - 8.0.50727.762
VLC media player 1.0.3
WinDVD for TOSHIBA
WinRAR archiver
Yahoo! SiteBuilder

==== Event Viewer Messages From Past Week ========

4/18/2010 9:32:05 PM, Error: Service Control Manager [7022] - The KtmRm for Distributed Transaction Coordinator service hung on starting.
4/15/2010 11:01:47 PM, Error: Service Control Manager [7026] - The following boot-start or system-start driver(s) failed to load: nkhiy Tosrfcom
4/14/2010 10:13:53 AM, Error: EventLog [6008] - The previous system shutdown at 10:06:34 AM on 4/14/2010 was unexpected.
4/13/2010 9:24:41 PM, Error: Service Control Manager [7031] - The Symantec AntiVirus service terminated unexpectedly. It has done this 1 time(s). The following corrective action will be taken in 10000 milliseconds: Restart the service.
4/13/2010 9:03:06 PM, Error: srv [2018] - The server was unable to allocate from the system paged pool because the server reached the configured limit for paged pool allocations.
4/13/2010 8:56:29 PM, Error: Service Control Manager [7009] - A timeout was reached (30000 milliseconds) while waiting for the Nero BackItUp Scheduler 3 service to connect.
4/13/2010 8:56:29 PM, Error: Service Control Manager [7000] - The Nero BackItUp Scheduler 3 service failed to start due to the following error: The service did not respond to the start or control request in a timely fashion.
4/13/2010 6:54:16 PM, Error: Service Control Manager [7026] - The following boot-start or system-start driver(s) failed to load: AFD DfsC eeCtrl NetBIOS netbt nsiproxy PSched RasAcd rdbss Smb SPBBCDrv spldr SRTSP SRTSPX SYMTDI tdx Tosrfcom Wanarpv6
4/13/2010 6:54:16 PM, Error: Service Control Manager [7001] - The Workstation service depends on the Network Store Interface Service service which failed to start because of the following error: The dependency service or group failed to start.
4/13/2010 6:54:16 PM, Error: Service Control Manager [7001] - The WebDav Client Redirector Driver service depends on the Redirected Buffering Sub Sysytem service which failed to start because of the following error: A device attached to the system is not functioning.
4/13/2010 6:54:16 PM, Error: Service Control Manager [7001] - The WebClient service depends on the WebDav Client Redirector Driver service which failed to start because of the following error: The dependency service or group failed to start.
4/13/2010 6:54:16 PM, Error: Service Control Manager [7001] - The TCP/IP NetBIOS Helper service depends on the Ancilliary Function Driver for Winsock service which failed to start because of the following error: A device attached to the system is not functioning.
4/13/2010 6:54:16 PM, Error: Service Control Manager [7001] - The SMB MiniRedirector Wrapper and Engine service depends on the Redirected Buffering Sub Sysytem service which failed to start because of the following error: A device attached to the system is not functioning.
4/13/2010 6:54:16 PM, Error: Service Control Manager [7001] - The SMB 2.0 MiniRedirector service depends on the SMB MiniRedirector Wrapper and Engine service which failed to start because of the following error: The dependency service or group failed to start.
4/13/2010 6:54:16 PM, Error: Service Control Manager [7001] - The SMB 1.x MiniRedirector service depends on the SMB MiniRedirector Wrapper and Engine service which failed to start because of the following error: The dependency service or group failed to start.
4/13/2010 6:54:16 PM, Error: Service Control Manager [7001] - The Network Store Interface Service service depends on the NSI proxy service service which failed to start because of the following error: A device attached to the system is not functioning.
4/13/2010 6:54:16 PM, Error: Service Control Manager [7001] - The Network Location Awareness service depends on the Network Store Interface Service service which failed to start because of the following error: The dependency service or group failed to start.
4/13/2010 6:54:16 PM, Error: Service Control Manager [7001] - The Network List Service service depends on the Network Location Awareness service which failed to start because of the following error: The dependency service or group failed to start.
4/13/2010 6:54:16 PM, Error: Service Control Manager [7001] - The Network Connections service depends on the Network Store Interface Service service which failed to start because of the following error: The dependency service or group failed to start.
4/13/2010 6:54:16 PM, Error: Service Control Manager [7001] - The IP Helper service depends on the Network Store Interface Service service which failed to start because of the following error: The dependency service or group failed to start.
4/13/2010 6:54:16 PM, Error: Service Control Manager [7001] - The DNS Client service depends on the NetIO Legacy TDI Support Driver service which failed to start because of the following error: A device attached to the system is not functioning.
4/13/2010 6:54:16 PM, Error: Service Control Manager [7001] - The DHCP Client service depends on the Ancilliary Function Driver for Winsock service which failed to start because of the following error: A device attached to the system is not functioning.
4/13/2010 6:54:16 PM, Error: Service Control Manager [7001] - The Computer Browser service depends on the Server service which failed to start because of the following error: The dependency service or group failed to start.
4/13/2010 6:54:06 PM, Error: Microsoft-Windows-DistributedCOM [10005] - DCOM got error "1084" attempting to start the service WSearch with arguments "" in order to run the server: {9E175B6D-F52A-11D8-B9A5-505054503030}
4/13/2010 6:54:05 PM, Error: Microsoft-Windows-DistributedCOM [10005] - DCOM got error "1084" attempting to start the service WSearch with arguments "" in order to run the server: {7D096C5F-AC08-4F1F-BEB7-5C22C517CE39}
4/13/2010 6:53:31 PM, Error: Microsoft-Windows-DistributedCOM [10005] - DCOM got error "1068" attempting to start the service netprofm with arguments "" in order to run the server: {A47979D2-C419-11D9-A5B4-001185AD2B89}
4/13/2010 6:53:31 PM, Error: Microsoft-Windows-DistributedCOM [10005] - DCOM got error "1068" attempting to start the service netman with arguments "" in order to run the server: {BA126AD1-2166-11D1-B1D0-00805FC1270E}
4/13/2010 6:53:31 PM, Error: Microsoft-Windows-DistributedCOM [10005] - DCOM got error "1068" attempting to start the service fdPHost with arguments "" in order to run the server: {145B4335-FE2A-4927-A040-7C35AD3180EF}
4/13/2010 6:53:28 PM, Error: Microsoft-Windows-DistributedCOM [10005] - DCOM got error "1084" attempting to start the service EventSystem with arguments "" in order to run the server: {1BE1F766-5536-11D1-B726-00C04FB926AF}
4/13/2010 6:53:21 PM, Error: Microsoft-Windows-DistributedCOM [10005] - DCOM got error "1084" attempting to start the service ShellHWDetection with arguments "" in order to run the server: {DD522ACC-F821-461A-A407-50B198B896DC}
4/13/2010 6:53:14 PM, Error: Microsoft-Windows-TerminalServices-LocalSessionManager [1048] - Terminal Service start failed. The relevant status code was This service cannot be started in Safe Mode .
4/13/2010 6:53:14 PM, Error: Microsoft-Windows-DistributedCOM [10005] - DCOM got error "1084" attempting to start the service TermService with arguments "" in order to run the server: {F9A874B6-F8A8-4D73-B5A8-AB610816828B}
4/13/2010 6:53:08 PM, Error: EventLog [6008] - The previous system shutdown at 6:50:04 PM on 4/13/2010 was unexpected.
4/13/2010 6:52:36 PM, Error: volsnap [25] - The shadow copies of volume C: were deleted because the shadow copy storage could not grow in time. Consider reducing the IO load on the system or choose a shadow copy storage volume that is not being shadow copied.
4/13/2010 12:25:13 AM, Error: Schannel [36874] - An SSL connection request was received from a remote client application, but none of the cipher suites supported by the client application are supported by the server. The SSL connection request has failed.
4/11/2010 11:22:49 AM, Error: Service Control Manager [7026] - The following boot-start or system-start driver(s) failed to load: Tosrfcom
4/11/2010 11:22:49 AM, Error: Service Control Manager [7000] - The vlxovsbk service failed to start due to the following error: The system cannot find the file specified.

==== End Of File ===========================



#4 forever681

forever681
  • Topic Starter

  • Members
  • 118 posts
  • OFFLINE
  •  
  • Local time:10:01 AM

Posted 19 April 2010 - 02:30 AM

Here's the GMER log, took me awhile to scan it.

GMER 1.0.15.15281 - http://www.gmer.net
Rootkit scan 2010-04-19 00:27:32
Windows 6.0.6001 Service Pack 1
Running: omtpcprn.exe; Driver: C:\Users\Andy\AppData\Local\Temp\kglyqpod.sys


---- System - GMER 1.0.15 ----

INT 0x52 ? 84BD1BF8
INT 0x62 ? 84BD1BF8
INT 0x82 ? 83A42BF8
INT 0x92 ? 83A42BF8
INT 0xA2 ? 84BD1BF8

---- Kernel code sections - GMER 1.0.15 ----

? System32\Drivers\spmy.sys The system cannot find the path specified. !
.rsrc C:\Windows\system32\drivers\volmgr.sys entry point in ".rsrc" section [0x86413014]
.text USBPORT.SYS!DllUnload 86A3B46F 5 Bytes JMP 84BD11D8

---- User code sections - GMER 1.0.15 ----

.text C:\Windows\system32\svchost.exe[804] ntdll.dll!NtProtectVirtualMemory 77028968 5 Bytes JMP 0036000A
.text C:\Windows\system32\svchost.exe[804] ntdll.dll!NtWriteVirtualMemory 770292A8 5 Bytes JMP 0037000A
.text C:\Windows\system32\svchost.exe[804] ntdll.dll!KiUserExceptionDispatcher 770299E8 5 Bytes JMP 0035000A
.text C:\Windows\Explorer.EXE[1076] ntdll.dll!NtProtectVirtualMemory 77028968 5 Bytes JMP 007D000A
.text C:\Windows\Explorer.EXE[1076] ntdll.dll!NtWriteVirtualMemory 770292A8 5 Bytes JMP 007E000A
.text C:\Windows\Explorer.EXE[1076] ntdll.dll!KiUserExceptionDispatcher 770299E8 5 Bytes JMP 007C000A

---- Kernel IAT/EAT - GMER 1.0.15 ----

IAT \SystemRoot\System32\Drivers\SCSIPORT.SYS[ntoskrnl.exe!DbgBreakPoint] 83A414A8
IAT \SystemRoot\system32\drivers\pci.sys[ntoskrnl.exe!IoDetachDevice] [82A65C4C] \SystemRoot\System32\Drivers\spmy.sys
IAT \SystemRoot\system32\drivers\pci.sys[ntoskrnl.exe!IoAttachDeviceToDeviceStack] [82A65CA0] \SystemRoot\System32\Drivers\spmy.sys
IAT \SystemRoot\system32\drivers\atapi.sys[ataport.SYS!AtaPortWritePortUchar] [82A356D2] \SystemRoot\System32\Drivers\spmy.sys
IAT \SystemRoot\system32\drivers\atapi.sys[ataport.SYS!AtaPortReadPortUchar] [82A35040] \SystemRoot\System32\Drivers\spmy.sys
IAT \SystemRoot\system32\drivers\atapi.sys[ataport.SYS!AtaPortWritePortBufferUshort] [82A357FC] \SystemRoot\System32\Drivers\spmy.sys
IAT \SystemRoot\system32\drivers\atapi.sys[ataport.SYS!AtaPortReadPortUshort] [82A350BE] \SystemRoot\System32\Drivers\spmy.sys
IAT \SystemRoot\system32\drivers\atapi.sys[ataport.SYS!AtaPortReadPortBufferUshort] [82A3513C] \SystemRoot\System32\Drivers\spmy.sys
IAT \SystemRoot\system32\drivers\ataport.SYS[ntoskrnl.exe!DbgBreakPoint] 83A422D8
IAT \SystemRoot\system32\DRIVERS\USBPORT.SYS[ntoskrnl.exe!DbgBreakPoint] 84BD12D8
IAT \SystemRoot\system32\DRIVERS\i8042prt.sys[HAL.dll!READ_PORT_UCHAR] [82A45048] \SystemRoot\System32\Drivers\spmy.sys
IAT \SystemRoot\system32\DRIVERS\storport.sys[ntoskrnl.exe!DbgBreakPoint] 84BE22D8

---- Devices - GMER 1.0.15 ----

Device \FileSystem\Ntfs \Ntfs 848041F8

AttachedDevice \Driver\kbdclass \Device\KeyboardClass0 Wdf01000.sys (WDF Dynamic/Microsoft Corporation)
AttachedDevice \Driver\kbdclass \Device\KeyboardClass1 Wdf01000.sys (WDF Dynamic/Microsoft Corporation)

Device \Driver\volmgr \Device\VolMgrControl 83A441F8
Device \Driver\usbuhci \Device\USBPDO-0 84B0D500
Device \Driver\usbuhci \Device\USBPDO-1 84B0D500
Device \Driver\usbuhci \Device\USBPDO-2 84B0D500
Device \Driver\usbuhci \Device\USBPDO-3 84B0D500
Device \Driver\usbehci \Device\USBPDO-4 84AFF1F8
Device \Driver\volmgr \Device\HarddiskVolume1 83A441F8
Device \Driver\volmgr \Device\HarddiskVolume2 83A441F8
Device \Driver\cdrom \Device\CdRom0 84BCB1F8
Device \Driver\atapi \Device\Ide\IdePort0 848031F8
Device \Driver\atapi \Device\Ide\IdePort1 848031F8
Device \Driver\atapi \Device\Ide\IdeDeviceP1T0L0-2 848031F8
Device \Driver\iScsiPrt \Device\RaidPort0 84BE31F8
Device \Driver\usbuhci \Device\USBFDO-0 84B0D500
Device \Driver\usbuhci \Device\USBFDO-1 84B0D500
Device \Driver\usbuhci \Device\USBFDO-2 84B0D500
Device \Driver\usbuhci \Device\USBFDO-3 84B0D500
Device \Driver\usbehci \Device\USBFDO-4 84AFF1F8
Device \FileSystem\cdfs \Cdfs 84AB41F8
Device -> \Driver\atapi \Device\Harddisk0\DR0 848DAAC8

---- Registry - GMER 1.0.15 ----

Reg HKLM\SYSTEM\ControlSet001\Services\kbiwkmrinbqbek@start 1
Reg HKLM\SYSTEM\ControlSet001\Services\kbiwkmrinbqbek@type 1
Reg HKLM\SYSTEM\ControlSet001\Services\kbiwkmrinbqbek@group file system
Reg HKLM\SYSTEM\ControlSet001\Services\kbiwkmrinbqbek@imagepath \systemroot\system32\drivers\kbiwkmpaprrwvn.sys
Reg HKLM\SYSTEM\ControlSet001\Services\kbiwkmrinbqbek\main (not active ControlSet)
Reg HKLM\SYSTEM\ControlSet001\Services\kbiwkmrinbqbek\main@aid 20029
Reg HKLM\SYSTEM\ControlSet001\Services\kbiwkmrinbqbek\main@sid 0
Reg HKLM\SYSTEM\ControlSet001\Services\kbiwkmrinbqbek\main\delete (not active ControlSet)
Reg HKLM\SYSTEM\ControlSet001\Services\kbiwkmrinbqbek\main\injector (not active ControlSet)
Reg HKLM\SYSTEM\ControlSet001\Services\kbiwkmrinbqbek\main\injector@* kbiwkmwsp.dll
Reg HKLM\SYSTEM\ControlSet001\Services\kbiwkmrinbqbek\main\tasks (not active ControlSet)
Reg HKLM\SYSTEM\ControlSet001\Services\kbiwkmrinbqbek\modules (not active ControlSet)
Reg HKLM\SYSTEM\ControlSet001\Services\kbiwkmrinbqbek\modules@kbiwkmrk.sys \systemroot\system32\drivers\kbiwkmpaprrwvn.sys
Reg HKLM\SYSTEM\ControlSet001\Services\kbiwkmrinbqbek\modules@kbiwkmcmd.dll \systemroot\system32\kbiwkmbpyxtlcc.dll
Reg HKLM\SYSTEM\ControlSet001\Services\kbiwkmrinbqbek\modules@kbiwkmlog.dat \systemroot\system32\kbiwkmocroytlc.dat
Reg HKLM\SYSTEM\ControlSet001\Services\kbiwkmrinbqbek\modules@kbiwkmwsp.dll \systemroot\system32\kbiwkmbvxuvvyd.dll
Reg HKLM\SYSTEM\ControlSet001\Services\kbiwkmrinbqbek\modules@kbiwkm.dat \systemroot\system32\kbiwkmbisilcxq.dat
Reg HKLM\SYSTEM\ControlSet001\Services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC (not active ControlSet)
Reg HKLM\SYSTEM\ControlSet001\Services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC@u0 0x38 0x00 0x75 0x02 ...
Reg HKLM\SYSTEM\ControlSet001\Services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC@h0 0
Reg HKLM\SYSTEM\ControlSet001\Services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC@hdf12 0x7E 0x9B 0xA0 0xB4 ...
Reg HKLM\SYSTEM\ControlSet001\Services\UACd.sys@start 1
Reg HKLM\SYSTEM\ControlSet001\Services\UACd.sys@type 1
Reg HKLM\SYSTEM\ControlSet001\Services\UACd.sys@imagepath \systemroot\system32\drivers\UACektwekpwxy.sys
Reg HKLM\SYSTEM\ControlSet001\Services\UACd.sys@group file system
Reg HKLM\SYSTEM\ControlSet001\Services\UACd.sys\modules (not active ControlSet)
Reg HKLM\SYSTEM\ControlSet001\Services\UACd.sys\modules@UACd \\?\globalroot\systemroot\system32\drivers\UACektwekpwxy.sys
Reg HKLM\SYSTEM\ControlSet001\Services\UACd.sys\modules@UACc \\?\globalroot\systemroot\system32\UACtbuikidmxq.dll
Reg HKLM\SYSTEM\ControlSet001\Services\UACd.sys\modules@uacbbr \\?\globalroot\systemroot\system32\UACoebrmtqpfv.dll
Reg HKLM\SYSTEM\ControlSet001\Services\UACd.sys\modules@UACsr \\?\globalroot\systemroot\system32\UACosofxbwjrx.dat
Reg HKLM\SYSTEM\ControlSet002\Services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC (not active ControlSet)
Reg HKLM\SYSTEM\ControlSet002\Services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC@u0 0x38 0x00 0x75 0x02 ...
Reg HKLM\SYSTEM\ControlSet002\Services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC@h0 0
Reg HKLM\SYSTEM\ControlSet002\Services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC@hdf12 0x7E 0x9B 0xA0 0xB4 ...
Reg HKLM\SYSTEM\CurrentControlSet\Services\sptd\Cfg@s1 771343423
Reg HKLM\SYSTEM\CurrentControlSet\Services\sptd\Cfg@s2 285507792
Reg HKLM\SYSTEM\CurrentControlSet\Services\sptd\Cfg@h0 1
Reg HKLM\SYSTEM\CurrentControlSet\Services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC
Reg HKLM\SYSTEM\CurrentControlSet\Services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC@u0 0x38 0x00 0x75 0x02 ...
Reg HKLM\SYSTEM\CurrentControlSet\Services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC@h0 0
Reg HKLM\SYSTEM\CurrentControlSet\Services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC@hdf12 0x7E 0x9B 0xA0 0xB4 ...
Reg HKLM\SYSTEM\CurrentControlSet\Services\WmiApRpl\Performance@Object List 6598 6604 6616 6626 6636 6656 6700 6710 6748 6754 6770 6778
Reg HKLM\SYSTEM\CurrentControlSet\Services\WmiApRpl\Performance@Last Counter 6792
Reg HKLM\SYSTEM\CurrentControlSet\Services\WmiApRpl\Performance@Last Help 6793
Reg HKLM\SYSTEM\CurrentControlSet\Services\WmiApRpl\Performance@First Counter 6598
Reg HKLM\SYSTEM\CurrentControlSet\Services\WmiApRpl\Performance@First Help 6599

---- Files - GMER 1.0.15 ----

File C:\Windows\system32\drivers\volmgr.sys suspicious modification
File C:\Windows\system32\drivers\atapi.sys suspicious modification

---- EOF - GMER 1.0.15 ----


#5 schrauber

schrauber

    Mr.Mechanic


  • Malware Response Team
  • 24,794 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Munich,Germany
  • Local time:07:01 PM

Posted 19 April 2010 - 01:45 PM

Hello, forever681
Welcome to the Bleeping Computer Forums. My name is Thomas (Tom is fine), and I will be helping you fixing your problems.

If you do not make a reply in 5 days, we will have to close your topic.

You may want to keep the link to this topic in your favourites. Alternatively, you can click the button at the top bar of this topic and Track this Topic. The topics you are tracking can be found here.

Please take note of some guidelines for this fix:
  • Refrain from making any changes to your computer including installing/uninstall programs, deleting files, modifying the registry, and running scanners or tools. Doing so could cause changes to the directions I have to give you and prolong the time required. Further more, you should not be taking any advice relating to this computer from any other source throughout the course of this fix.
  • If you do not understand any step(s) provided, please do not hesitate to ask before continuing. I would much rather clarify instructions or explain them differently than have something important broken.
  • Even if things appear to be better, it might not mean we are finished. Please continue to follow my instructions and reply back until I give you the "all clean". We do not want to clean you part-way, only to have the system re-infect itself.
  • Please reply using the button in the lower right hand corner of your screen. Do not start a new topic. The logs that you post should be pasted directly into the reply. Only attach them if requested or if they do not fit into the post.
  • Old topics are closed after 3 days with no reply, and working topics are closed after 5 days. If for any reason you cannot complete instructions within that time, that's fine, just post back here so that we know you're still here.
  • Please set your system to show all files.
    Click Start, open My Computer, select the Tools menu and click Folder Options.
    Select the View Tab. Under the Hidden files and folders heading, select Show hidden files and folders.
    Uncheck: Hide file extensions for known file types
    Uncheck the Hide protected operating system files (recommended) option.
    Click Yes to confirm.





Please go here and have a look how you can disable your security software.

Download Combofix from any of the links below but rename it to before saving it to your desktop.

Link 1
Link 2



--------------------------------------------------------------------

Double click on the renamed Combofix.exe & follow the prompts.
    When finished, it will produce a report for you.
  • As part of it's process, ComboFix will check to see if the Microsoft Windows Recovery Console is installed. With malware infections being as they are today, it's strongly recommended to have this pre-installed on your machine before doing any malware removal. It will allow you to boot up into a special recovery/repair mode that will allow us to more easily help you should your computer have a problem after an attempted removal of malware.
  • Follow the prompts to allow ComboFix to download and install the Microsoft Windows Recovery Console, and when prompted, agree to the End-User License Agreement to install the Microsoft Windows Recovery Console.
**Please note: If the Microsoft Windows Recovery Console is already installed, ComboFix will continue it's malware removal procedures.



Once the Microsoft Windows Recovery Console is installed using ComboFix, you should see the following message:



Click on Yes, to continue scanning for malware.

When finished, it will produce a log for you. Please include the C:\ComboFix.txt in your next reply.

This tool is not a toy and not for everyday use.
ComboFix SHOULD NOT be used unless requested by a forum helper


If you need help, see this link:
http://www.bleepingcomputer.com/combofix/how-to-use-combofix
regards,
schrauber

Posted Image
Posted Image

If I've not posted back within 48 hrs., feel free to send a PM with your topic link. Thank you!

If I have helped you then please consider donating to continue the fight against malware Posted Image

#6 forever681

forever681
  • Topic Starter

  • Members
  • 118 posts
  • OFFLINE
  •  
  • Local time:10:01 AM

Posted 20 April 2010 - 12:41 AM

Thanks Tom for your help, below is log for Combofix.

ComboFix 10-04-19.01 - Andy 04/19/2010 22:15:05.3.2 - x86
Microsoft® Windows Vista™ Home Premium 6.0.6001.1.1252.1.1033.18.1013.419 [GMT -7:00]
Running from: c:\users\Andy\Desktop\schrauber.exe
AV: Symantec AntiVirus *On-access scanning disabled* (Updated) {FB06448E-52B8-493A-90F3-E43226D3305C}
SP: Symantec AntiVirus *disabled* (Updated) {6C85A515-B91D-4D2B-AF18-40984A4A8493}
SP: Windows Defender *disabled* (Updated) {D68DDC3A-831F-4FAE-9E44-DA132C1ACF46}
.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.

c:\programdata\Microsoft\Network\Downloader\qmgr0.dat
c:\programdata\Microsoft\Network\Downloader\qmgr1.dat
c:\users\Andy\AppData\Roaming\inst.exe
c:\windows\system32\funeroga.exe
c:\windows\system32\jopisado.dll
c:\windows\system32\jopisado.exe
c:\windows\system32\vomuganu.exe
c:\windows\Tasks\botvlbkx.job
c:\windows\Tasks\phqghume.job

----- BITS: Possible infected sites -----

hxxp://77.74.48.118
hxxp://82.98.235.29
Infected copy of c:\windows\system32\drivers\volmgr.sys was found and disinfected
Restored copy from - Kitty had a snack tongue.gif
.
((((((((((((((((((((((((( Files Created from 2010-03-20 to 2010-04-20 )))))))))))))))))))))))))))))))
.

2010-04-20 05:25 . 2010-04-20 05:28 -------- d-----w- c:\users\Andy\AppData\Local\temp
2010-04-20 05:25 . 2010-04-20 05:25 -------- d-----w- c:\users\Public\AppData\Local\temp
2010-04-20 05:25 . 2010-04-20 05:25 -------- d-----w- c:\users\Default\AppData\Local\temp
2010-04-15 07:20 . 2010-03-30 07:46 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2010-04-15 07:20 . 2010-03-30 07:45 20824 ----a-w- c:\windows\system32\drivers\mbam.sys
2010-04-14 12:19 . 2010-04-14 12:19 -------- d-----w- c:\programdata\avG
2010-04-14 07:08 . 2010-04-14 17:17 -------- d-----w- C:\Malwarebytes' Anti-Malware
2010-03-28 09:09 . 2010-03-28 09:09 -------- d-----w- c:\users\Andy\AppData\Roaming\Facebook

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2010-04-20 05:21 . 2010-04-14 17:20 4838 ----a-w- c:\windows\system32\PerfStringBackup.TMP
2010-04-16 04:53 . 2009-09-06 07:21 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
2010-04-14 08:40 . 2010-01-31 20:16 -------- d-----w- c:\users\Andy\AppData\Roaming\vlc
2010-04-13 07:29 . 2008-02-02 05:56 -------- d-----w- c:\users\Andy\AppData\Roaming\uTorrent
2010-04-01 20:37 . 2007-01-05 23:24 -------- d-----w- c:\program files\Google
2010-03-28 09:09 . 2010-03-28 09:09 50354 ----a-w- c:\users\Andy\AppData\Roaming\Facebook\uninstall.exe
2010-03-28 00:19 . 2009-11-14 05:24 143976 ----a-w- c:\users\Andy\AppData\Roaming\Move Networks\uninstall.exe
2010-03-28 00:19 . 2009-10-15 00:50 5642688 ----a-w- c:\users\Andy\AppData\Roaming\Move Networks\plugins\npqmp071701000002.dll
2010-03-28 00:19 . 2009-02-18 02:50 -------- d-----w- c:\users\Andy\AppData\Roaming\Move Networks
2010-03-18 02:48 . 2007-09-19 01:37 -------- d-----w- c:\programdata\DVD Shrink
2010-03-12 04:26 . 2007-11-09 02:28 -------- d-----w- c:\users\Andy\AppData\Roaming\RipIt4Me
2010-03-06 05:30 . 2010-03-06 05:30 847040 ----a-w- c:\users\Andy\AppData\Roaming\Facebook\axfbootloader.dll
2010-03-06 05:30 . 2010-03-06 05:30 5582848 ----a-w- c:\users\Andy\AppData\Roaming\Facebook\npfbplugin_1_0_3.dll
2010-03-03 05:03 . 2008-03-26 06:35 -------- d-----w- c:\users\Andy\AppData\Roaming\dvdcss
2010-02-16 09:00 . 2010-04-10 03:02 84912 ----a-w- c:\programdata\Symantec\Definitions\VirusDefs\20100409.039\NAVENG.SYS
2010-02-16 09:00 . 2010-04-10 03:02 1324720 ----a-w- c:\programdata\Symantec\Definitions\VirusDefs\20100409.039\NAVEX15.SYS
2010-02-16 09:00 . 2010-04-03 03:08 84912 ----a-w- c:\programdata\Symantec\Definitions\VirusDefs\20100402.004\NAVENG.SYS
2010-02-16 09:00 . 2010-04-03 03:08 1324720 ----a-w- c:\programdata\Symantec\Definitions\VirusDefs\20100402.004\NAVEX15.SYS
2010-02-16 09:00 . 2010-02-16 09:00 84912 ----a-w- c:\programdata\Symantec\Definitions\VirusDefs\BinHub\naveng.sys
2010-02-16 09:00 . 2010-02-16 09:00 1324720 ----a-w- c:\programdata\Symantec\Definitions\VirusDefs\BinHub\navex15.sys
2010-01-20 01:59 . 2010-01-20 01:59 65024 --sh--w- c:\windows\System32\dutuhabe.dll
2010-01-13 02:13 . 2010-01-13 02:13 64512 --sha-w- c:\windows\System32\masutora.dll
2010-01-20 01:55 . 2010-01-20 01:55 62464 --sha-w- c:\windows\System32\mobahibe.dll
2010-01-20 01:59 . 2010-01-20 01:59 206336 --sh--w- c:\windows\System32\vojijaje.exe
.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"ehTray.exe"="c:\windows\ehome\ehTray.exe" [2008-01-19 125952]
"BgMonitor_{79662E04-7C6C-4d9f-84C7-88D8A56B10AA}"="c:\program files\Common Files\Nero\Lib\NMBgMonitor.exe" [2007-08-03 202024]
"WMPNSCFG"="c:\program files\Windows Media Player\WMPNSCFG.exe" [2008-01-19 202240]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"SynTPEnh"="c:\program files\Synaptics\SynTP\SynTPEnh.exe" [2008-04-03 1045800]
"Windows Defender"="c:\program files\Windows Defender\MSASCui.exe" [2008-01-19 1008184]
"HWSetup"="c:\program files\TOSHIBA\Utilities\HWSetup.exe" [2006-11-01 413696]
"KeNotify"="c:\program files\TOSHIBA\Utilities\KeNotify.exe" [2006-11-07 34352]
"NBKeyScan"="c:\program files\Nero\Nero8\Nero BackItUp\NBKeyScan.exe" [2007-08-08 1828136]
"SynTPStart"="c:\program files\Synaptics\SynTP\SynTPStart.exe" [2007-07-27 204800]
"IgfxTray"="c:\windows\system32\igfxtray.exe" [2008-02-12 141848]
"HotKeysCmds"="c:\windows\system32\hkcmd.exe" [2008-02-12 166424]
"Persistence"="c:\windows\system32\igfxpers.exe" [2008-02-12 133656]
"ccApp"="c:\program files\Common Files\Symantec Shared\ccApp.exe" [2006-11-23 107112]
"vptray"="c:\progra~1\SYMANT~1\VPTray.exe" [2006-11-28 134808]
"QuickTime Task"="c:\program files\QuickTime\QTTask.exe" [2009-09-05 417792]
"iTunesHelper"="c:\program files\iTunes\iTunesHelper.exe" [2009-10-29 141600]

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\system]
"EnableLUA"= 0 (0x0)
"EnableUIADesktopToggle"= 0 (0x0)

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\drivers32]
"aux"=wdmaud.drv

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\WinDefend]
@="Service"

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\NeroFilterCheck]
2007-03-01 22:57 153136 ----a-w- c:\program files\Common Files\Nero\Lib\NeroCheck.exe

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\McAfeeAntiSpyware]
"DisableMonitoring"=dword:00000001

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecAntiVirus]
"DisableMonitoring"=dword:00000001

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Svc\S-1-5-21-1679199247-1024483943-2079821399-1000]
"EnableNotificationsRef"=dword:00000001

R0 nkhiy;nkhiy;c:\windows\System32\drivers\ordf.sys [x]
R2 gupdate;Google Update Service (gupdate);c:\program files\Google\Update\GoogleUpdate.exe [2010-02-02 135664]
R2 vlxovsbk;vlxovsbk;c:\windows\system32\drivers\ssvorwfe.sys [x]
R3 EraserUtilDrv10621;EraserUtilDrv10621;c:\program files\Common Files\Symantec Shared\EENGINE\EraserUtilDrv10621.sys [x]
R3 MEMSWEEP2;MEMSWEEP2;c:\windows\system32\1D36.tmp [x]
R3 SavRoam;SavRoam;c:\program files\Symantec AntiVirus\SavRoam.exe [2006-11-28 122008]
R4 sptd;sptd;c:\windows\system32\Drivers\sptd.sys [2008-04-16 717296]
S3 EraserUtilRebootDrv;EraserUtilRebootDrv;c:\program files\Common Files\Symantec Shared\EENGINE\EraserUtilRebootDrv.sys [2009-08-27 102448]


[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\svchost]
HPZ12 REG_MULTI_SZ Pml Driver HPZ12 Net Driver HPZ12
.
Contents of the 'Scheduled Tasks' folder

2010-04-20 c:\windows\Tasks\GoogleUpdateTaskMachineCore.job
- c:\program files\Google\Update\GoogleUpdate.exe [2010-02-02 02:40]

2010-04-20 c:\windows\Tasks\GoogleUpdateTaskMachineUA.job
- c:\program files\Google\Update\GoogleUpdate.exe [2010-02-02 02:40]
.
.
------- Supplementary Scan -------
.
uStart Page = hxxp://www.hotmail.com/
uInternet Settings,ProxyOverride = *.local
IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~4\Office12\EXCEL.EXE/3000
TCP: {923B438C-D655-4F07-ABAE-AD77850EA9A1} = 83.149.115.157,4.2.2.1,68.94.156.1 68.94.157.1
TCP: {A09571E1-ABC9-4273-AD14-1577614854A7} = 83.149.115.157,4.2.2.1,68.94.156.1 68.94.157.1
.
- - - - ORPHANS REMOVED - - - -

BHO-{036d6a92-7b48-4e06-a62f-c3401eb016a3} - fimahafu.dll
HKLM-Run-Malwarebytes Anti-Malware (reboot) - e:\malwarebytes' anti-malware\Malwarebytes' Anti-Malware\winword.exe
HKLM-Run-misamikafi - dehaseha.dll



**************************************************************************

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2010-04-19 22:28
Windows 6.0.6001 Service Pack 1 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully
hidden files: 0

**************************************************************************

[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet003\Services\MEMSWEEP2]
"ImagePath"="\??\c:\windows\system32\1D36.tmp"
.
--------------------- LOCKED REGISTRY KEYS ---------------------

[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet003\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0000\AllUserSettings]
@Denied: (A) (Users)
@Denied: (A) (Everyone)
@Allowed: (B 1 2 3 4 5) (S-1-5-20)
"BlindDial"=dword:00000000
"MSCurrentCountry"=dword:000000b5
.
------------------------ Other Running Processes ------------------------
.
c:\program files\Common Files\Symantec Shared\ccSvcHst.exe
c:\windows\system32\agrsmsvc.exe
c:\program files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
c:\program files\Bonjour\mDNSResponder.exe
c:\program files\Symantec AntiVirus\DefWatch.exe
c:\program files\Nero\Nero8\Nero BackItUp\NBService.exe
c:\program files\Photodex\ProShowGold\ScsiAccess.exe
c:\program files\Symantec AntiVirus\Rtvscan.exe
c:\windows\system32\TODDSrv.exe
c:\program files\Common Files\Ulead Systems\DVD\ULCDRSvr.exe
c:\program files\Symantec AntiVirus\VPTray.exe
c:\windows\system32\igfxsrvc.exe
c:\windows\ehome\ehmsas.exe
c:\program files\Synaptics\SynTP\SynToshiba.exe
c:\program files\Synaptics\SynTP\SynTPHelper.exe
c:\program files\Common Files\Nero\Lib\NMIndexingService.exe
c:\program files\Common Files\Nero\Lib\NMIndexStoreSvr.exe
c:\program files\iPod\bin\iPodService.exe
.
**************************************************************************
.
Completion time: 2010-04-19 22:36:25 - machine was rebooted
ComboFix-quarantined-files.txt 2010-04-20 05:36

Pre-Run: 29,029,920,768 bytes free
Post-Run: 30,460,006,400 bytes free

- - End Of File - - F68CA9A0B86673F8B29412EFD5360EFC


#7 schrauber

schrauber

    Mr.Mechanic


  • Malware Response Team
  • 24,794 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Munich,Germany
  • Local time:07:01 PM

Posted 21 April 2010 - 12:17 PM

Hi,


Open notepad and copy/paste the text in the quotebox below into it:

QUOTE
http://www.bleepingcomputer.com/forums/t/309588/infected-with-trojan/

Collect::
c:\windows\System32\dutuhabe.dll
c:\windows\System32\masutora.dll
c:\windows\System32\mobahibe.dll
c:\windows\System32\vojijaje.exe
c:\windows\System32\drivers\ordf.sys
c:\windows\system32\drivers\ssvorwfe.sys
Driver::
nkhiy
vlxovsbk


Save this as CFScript.txt





Refering to the picture above, drag CFScript.txt into ComboFix.exe

When finished, it shall produce a log for you. Post that log in your next reply.

**Note**

When CF finishes running, the ComboFix log will open along with a message box--do not be alarmed. With the above script, ComboFix will capture files to submit for analysis.
  • Ensure you are connected to the internet and click OK on the message box.

regards,
schrauber

Posted Image
Posted Image

If I've not posted back within 48 hrs., feel free to send a PM with your topic link. Thank you!

If I have helped you then please consider donating to continue the fight against malware Posted Image

#8 forever681

forever681
  • Topic Starter

  • Members
  • 118 posts
  • OFFLINE
  •  
  • Local time:10:01 AM

Posted 21 April 2010 - 11:45 PM

ComboFix 10-04-19.01 - Andy 04/21/2010 18:52:28.4.2 - x86
Microsoft® Windows Vista™ Home Premium 6.0.6001.1.1252.1.1033.18.1013.404 [GMT -7:00]
Running from: c:\users\Andy\Desktop\schrauber.exe
Command switches used :: c:\users\Andy\Desktop\CFScript.txt
AV: Symantec AntiVirus *On-access scanning disabled* (Updated) {FB06448E-52B8-493A-90F3-E43226D3305C}
SP: Symantec AntiVirus *disabled* (Updated) {6C85A515-B91D-4D2B-AF18-40984A4A8493}
SP: Windows Defender *disabled* (Updated) {D68DDC3A-831F-4FAE-9E44-DA132C1ACF46}

file zipped: c:\windows\System32\dutuhabe.dll
file zipped: c:\windows\System32\masutora.dll
file zipped: c:\windows\System32\mobahibe.dll
file zipped: c:\windows\System32\vojijaje.exe
.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.

c:\windows\System32\dutuhabe.dll
c:\windows\system32\masutora.dll
c:\windows\System32\mobahibe.dll
c:\windows\System32\vojijaje.exe

.
((((((((((((((((((((((((((((((((((((((( Drivers/Services )))))))))))))))))))))))))))))))))))))))))))))))))
.

-------\Service_nkhiy
-------\Service_vlxovsbk


((((((((((((((((((((((((( Files Created from 2010-03-22 to 2010-04-22 )))))))))))))))))))))))))))))))
.

2010-04-22 01:59 . 2010-04-22 02:03 -------- d-----w- c:\users\Andy\AppData\Local\temp
2010-04-22 01:59 . 2010-04-22 01:59 -------- d-----w- c:\users\Public\AppData\Local\temp
2010-04-22 01:59 . 2010-04-22 01:59 -------- d-----w- c:\users\Default\AppData\Local\temp
2010-04-15 07:20 . 2010-03-30 07:46 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2010-04-15 07:20 . 2010-03-30 07:45 20824 ----a-w- c:\windows\system32\drivers\mbam.sys
2010-04-14 12:19 . 2010-04-14 12:19 -------- d-----w- c:\programdata\avG
2010-04-14 07:08 . 2010-04-14 17:17 -------- d-----w- C:\Malwarebytes' Anti-Malware
2010-03-28 09:09 . 2010-03-28 09:09 -------- d-----w- c:\users\Andy\AppData\Roaming\Facebook

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2010-04-21 03:37 . 2007-09-19 01:37 -------- d-----w- c:\programdata\DVD Shrink
2010-04-20 05:40 . 2010-04-14 17:20 4838 ----a-w- c:\windows\system32\PerfStringBackup.TMP
2010-04-16 04:53 . 2009-09-06 07:21 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
2010-04-14 08:40 . 2010-01-31 20:16 -------- d-----w- c:\users\Andy\AppData\Roaming\vlc
2010-04-13 07:29 . 2008-02-02 05:56 -------- d-----w- c:\users\Andy\AppData\Roaming\uTorrent
2010-04-01 20:37 . 2007-01-05 23:24 -------- d-----w- c:\program files\Google
2010-03-28 09:09 . 2010-03-28 09:09 50354 ----a-w- c:\users\Andy\AppData\Roaming\Facebook\uninstall.exe
2010-03-28 00:19 . 2009-11-14 05:24 143976 ----a-w- c:\users\Andy\AppData\Roaming\Move Networks\uninstall.exe
2010-03-28 00:19 . 2009-10-15 00:50 5642688 ----a-w- c:\users\Andy\AppData\Roaming\Move Networks\plugins\npqmp071701000002.dll
2010-03-28 00:19 . 2009-02-18 02:50 -------- d-----w- c:\users\Andy\AppData\Roaming\Move Networks
2010-03-12 04:26 . 2007-11-09 02:28 -------- d-----w- c:\users\Andy\AppData\Roaming\RipIt4Me
2010-03-06 05:30 . 2010-03-06 05:30 847040 ----a-w- c:\users\Andy\AppData\Roaming\Facebook\axfbootloader.dll
2010-03-06 05:30 . 2010-03-06 05:30 5582848 ----a-w- c:\users\Andy\AppData\Roaming\Facebook\npfbplugin_1_0_3.dll
2010-03-03 05:03 . 2008-03-26 06:35 -------- d-----w- c:\users\Andy\AppData\Roaming\dvdcss
2010-02-16 09:00 . 2010-04-10 03:02 84912 ----a-w- c:\programdata\Symantec\Definitions\VirusDefs\20100409.039\NAVENG.SYS
2010-02-16 09:00 . 2010-04-10 03:02 1324720 ----a-w- c:\programdata\Symantec\Definitions\VirusDefs\20100409.039\NAVEX15.SYS
2010-02-16 09:00 . 2010-04-03 03:08 84912 ----a-w- c:\programdata\Symantec\Definitions\VirusDefs\20100402.004\NAVENG.SYS
2010-02-16 09:00 . 2010-04-03 03:08 1324720 ----a-w- c:\programdata\Symantec\Definitions\VirusDefs\20100402.004\NAVEX15.SYS
2010-02-16 09:00 . 2010-02-16 09:00 84912 ----a-w- c:\programdata\Symantec\Definitions\VirusDefs\BinHub\naveng.sys
2010-02-16 09:00 . 2010-02-16 09:00 1324720 ----a-w- c:\programdata\Symantec\Definitions\VirusDefs\BinHub\navex15.sys
.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"ehTray.exe"="c:\windows\ehome\ehTray.exe" [2008-01-19 125952]
"BgMonitor_{79662E04-7C6C-4d9f-84C7-88D8A56B10AA}"="c:\program files\Common Files\Nero\Lib\NMBgMonitor.exe" [2007-08-03 202024]
"WMPNSCFG"="c:\program files\Windows Media Player\WMPNSCFG.exe" [2008-01-19 202240]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"SynTPEnh"="c:\program files\Synaptics\SynTP\SynTPEnh.exe" [2008-04-03 1045800]
"Windows Defender"="c:\program files\Windows Defender\MSASCui.exe" [2008-01-19 1008184]
"HWSetup"="c:\program files\TOSHIBA\Utilities\HWSetup.exe" [2006-11-01 413696]
"KeNotify"="c:\program files\TOSHIBA\Utilities\KeNotify.exe" [2006-11-07 34352]
"NBKeyScan"="c:\program files\Nero\Nero8\Nero BackItUp\NBKeyScan.exe" [2007-08-08 1828136]
"SynTPStart"="c:\program files\Synaptics\SynTP\SynTPStart.exe" [2007-07-27 204800]
"IgfxTray"="c:\windows\system32\igfxtray.exe" [2008-02-12 141848]
"HotKeysCmds"="c:\windows\system32\hkcmd.exe" [2008-02-12 166424]
"Persistence"="c:\windows\system32\igfxpers.exe" [2008-02-12 133656]
"ccApp"="c:\program files\Common Files\Symantec Shared\ccApp.exe" [2006-11-23 107112]
"vptray"="c:\progra~1\SYMANT~1\VPTray.exe" [2006-11-28 134808]
"QuickTime Task"="c:\program files\QuickTime\QTTask.exe" [2009-09-05 417792]
"iTunesHelper"="c:\program files\iTunes\iTunesHelper.exe" [2009-10-29 141600]

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\system]
"EnableLUA"= 0 (0x0)
"EnableUIADesktopToggle"= 0 (0x0)

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\drivers32]
"aux"=wdmaud.drv

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\WinDefend]
@="Service"

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\NeroFilterCheck]
2007-03-01 22:57 153136 ----a-w- c:\program files\Common Files\Nero\Lib\NeroCheck.exe

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\McAfeeAntiSpyware]
"DisableMonitoring"=dword:00000001

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecAntiVirus]
"DisableMonitoring"=dword:00000001

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Svc\S-1-5-21-1679199247-1024483943-2079821399-1000]
"EnableNotificationsRef"=dword:00000001

R2 gupdate;Google Update Service (gupdate);c:\program files\Google\Update\GoogleUpdate.exe [2010-02-02 135664]
R3 EraserUtilDrv10621;EraserUtilDrv10621;c:\program files\Common Files\Symantec Shared\EENGINE\EraserUtilDrv10621.sys [x]
R3 MEMSWEEP2;MEMSWEEP2;c:\windows\system32\1D36.tmp [x]
R3 SavRoam;SavRoam;c:\program files\Symantec AntiVirus\SavRoam.exe [2006-11-28 122008]
R4 sptd;sptd;c:\windows\system32\Drivers\sptd.sys [2008-04-16 717296]
S3 EraserUtilRebootDrv;EraserUtilRebootDrv;c:\program files\Common Files\Symantec Shared\EENGINE\EraserUtilRebootDrv.sys [2009-08-27 102448]


[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\svchost]
HPZ12 REG_MULTI_SZ Pml Driver HPZ12 Net Driver HPZ12
.
Contents of the 'Scheduled Tasks' folder

2010-04-22 c:\windows\Tasks\GoogleUpdateTaskMachineCore.job
- c:\program files\Google\Update\GoogleUpdate.exe [2010-02-02 02:40]

2010-04-22 c:\windows\Tasks\GoogleUpdateTaskMachineUA.job
- c:\program files\Google\Update\GoogleUpdate.exe [2010-02-02 02:40]
.
.
------- Supplementary Scan -------
.
uStart Page = hxxp://www.hotmail.com/
uInternet Settings,ProxyOverride = *.local
IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~4\Office12\EXCEL.EXE/3000
TCP: {923B438C-D655-4F07-ABAE-AD77850EA9A1} = 83.149.115.157,4.2.2.1,68.94.156.1 68.94.157.1
TCP: {A09571E1-ABC9-4273-AD14-1577614854A7} = 83.149.115.157,4.2.2.1,68.94.156.1 68.94.157.1
.

**************************************************************************

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2010-04-21 19:03
Windows 6.0.6001 Service Pack 1 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully
hidden files: 0

**************************************************************************

[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet003\Services\MEMSWEEP2]
"ImagePath"="\??\c:\windows\system32\1D36.tmp"
.
--------------------- LOCKED REGISTRY KEYS ---------------------

[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet003\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0000\AllUserSettings]
@Denied: (A) (Users)
@Denied: (A) (Everyone)
@Allowed: (B 1 2 3 4 5) (S-1-5-20)
"BlindDial"=dword:00000000
"MSCurrentCountry"=dword:000000b5
.
------------------------ Other Running Processes ------------------------
.
c:\program files\Common Files\Symantec Shared\ccSvcHst.exe
c:\windows\system32\agrsmsvc.exe
c:\program files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
c:\program files\Bonjour\mDNSResponder.exe
c:\program files\Symantec AntiVirus\DefWatch.exe
c:\program files\Symantec AntiVirus\VPTray.exe
c:\program files\Nero\Nero8\Nero BackItUp\NBService.exe
c:\windows\system32\igfxsrvc.exe
c:\program files\Photodex\ProShowGold\ScsiAccess.exe
c:\program files\Symantec AntiVirus\Rtvscan.exe
c:\windows\system32\TODDSrv.exe
c:\windows\ehome\ehmsas.exe
c:\program files\Common Files\Ulead Systems\DVD\ULCDRSvr.exe
c:\program files\Common Files\Nero\Lib\NMIndexingService.exe
c:\program files\Common Files\Nero\Lib\NMIndexStoreSvr.exe
c:\program files\iPod\bin\iPodService.exe
.
**************************************************************************
.
Completion time: 2010-04-21 19:13:49 - machine was rebooted
ComboFix-quarantined-files.txt 2010-04-22 02:13
ComboFix2.txt 2010-04-20 05:36

Pre-Run: 22,834,266,112 bytes free
Post-Run: 22,795,751,424 bytes free

- - End Of File - - 7FFFCA2E0E0F3DB3F92B29CC43363649
Upload was successful


#9 forever681

forever681
  • Topic Starter

  • Members
  • 118 posts
  • OFFLINE
  •  
  • Local time:10:01 AM

Posted 23 April 2010 - 12:59 AM

Tom, I am going to be out of town until next Tuesday 4/27 and have no access to Internet, I will be back, thanks so much for all your help.

#10 schrauber

schrauber

    Mr.Mechanic


  • Malware Response Team
  • 24,794 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Munich,Germany
  • Local time:07:01 PM

Posted 23 April 2010 - 02:00 PM

Ok smile.gif

Let me know when you are back and we will go from there smile.gif
regards,
schrauber

Posted Image
Posted Image

If I've not posted back within 48 hrs., feel free to send a PM with your topic link. Thank you!

If I have helped you then please consider donating to continue the fight against malware Posted Image

#11 schrauber

schrauber

    Mr.Mechanic


  • Malware Response Team
  • 24,794 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Munich,Germany
  • Local time:07:01 PM

Posted 27 April 2010 - 01:09 PM

Still with me?
regards,
schrauber

Posted Image
Posted Image

If I've not posted back within 48 hrs., feel free to send a PM with your topic link. Thank you!

If I have helped you then please consider donating to continue the fight against malware Posted Image

#12 forever681

forever681
  • Topic Starter

  • Members
  • 118 posts
  • OFFLINE
  •  
  • Local time:10:01 AM

Posted 28 April 2010 - 01:12 AM

Yes I am back, please continue on, thanks so much.

#13 schrauber

schrauber

    Mr.Mechanic


  • Malware Response Team
  • 24,794 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Munich,Germany
  • Local time:07:01 PM

Posted 30 April 2010 - 11:29 AM

Ok smile.gif

Please delete your copy of Combofix and download a fresh one, let it run with doubleclick and post back with the content of the logfile.
regards,
schrauber

Posted Image
Posted Image

If I've not posted back within 48 hrs., feel free to send a PM with your topic link. Thank you!

If I have helped you then please consider donating to continue the fight against malware Posted Image

#14 forever681

forever681
  • Topic Starter

  • Members
  • 118 posts
  • OFFLINE
  •  
  • Local time:10:01 AM

Posted 30 April 2010 - 07:33 PM

ComboFix 10-04-30.01 - Andy 04/30/2010 17:12:20.5.2 - x86
Microsoft® Windows Vista™ Home Premium 6.0.6001.1.1252.1.1033.18.1013.289 [GMT -7:00]
Running from: c:\users\Andy\Desktop\schrauber.exe
AV: Symantec AntiVirus *On-access scanning disabled* (Updated) {FB06448E-52B8-493A-90F3-E43226D3305C}
SP: Symantec AntiVirus *enabled* (Updated) {6C85A515-B91D-4D2B-AF18-40984A4A8493}
SP: Windows Defender *disabled* (Updated) {D68DDC3A-831F-4FAE-9E44-DA132C1ACF46}
.

((((((((((((((((((((((((( Files Created from 2010-04-01 to 2010-05-01 )))))))))))))))))))))))))))))))
.

2010-05-01 00:20 . 2010-05-01 00:20 -------- d-----w- c:\users\Andy\AppData\Local\temp
2010-05-01 00:20 . 2010-05-01 00:20 -------- d-----w- c:\users\Public\AppData\Local\temp
2010-05-01 00:20 . 2010-05-01 00:20 -------- d-----w- c:\users\Default\AppData\Local\temp
2010-04-15 07:20 . 2010-03-30 07:46 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2010-04-15 07:20 . 2010-03-30 07:45 20824 ----a-w- c:\windows\system32\drivers\mbam.sys
2010-04-14 12:19 . 2010-04-14 12:19 -------- d-----w- c:\programdata\avG
2010-04-14 07:08 . 2010-04-14 17:17 -------- d-----w- C:\Malwarebytes' Anti-Malware
2010-04-10 03:02 . 2010-02-16 09:00 84912 ----a-w- c:\programdata\Symantec\Definitions\VirusDefs\20100409.039\NAVENG.SYS
2010-04-10 03:02 . 2010-02-16 09:00 1324720 ----a-w- c:\programdata\Symantec\Definitions\VirusDefs\20100409.039\NAVEX15.SYS
2010-04-10 03:02 . 2009-08-27 18:09 177520 ----a-w- c:\programdata\Symantec\Definitions\VirusDefs\20100409.039\NAVENG32.DLL
2010-04-10 03:02 . 2009-08-27 18:09 1647984 ----a-w- c:\programdata\Symantec\Definitions\VirusDefs\20100409.039\NAVEX32A.DLL
2010-04-10 03:02 . 2009-08-27 18:09 102448 ----a-w- c:\programdata\Symantec\Definitions\VirusDefs\20100409.039\ERASER.SYS
2010-04-10 03:02 . 2009-12-14 09:00 2747440 ----a-w- c:\programdata\Symantec\Definitions\VirusDefs\20100409.039\CCERASER.DLL
2010-04-10 03:02 . 2009-10-19 08:00 259440 ----a-w- c:\programdata\Symantec\Definitions\VirusDefs\20100409.039\ECMSVR32.DLL
2010-04-10 03:02 . 2009-08-27 18:09 371248 ----a-w- c:\programdata\Symantec\Definitions\VirusDefs\20100409.039\EECTRL.SYS
2010-04-03 03:08 . 2010-02-16 09:00 84912 ----a-w- c:\programdata\Symantec\Definitions\VirusDefs\20100402.004\NAVENG.SYS
2010-04-03 03:08 . 2010-02-16 09:00 1324720 ----a-w- c:\programdata\Symantec\Definitions\VirusDefs\20100402.004\NAVEX15.SYS
2010-04-03 03:08 . 2009-10-19 08:00 259440 ----a-w- c:\programdata\Symantec\Definitions\VirusDefs\20100402.004\ECMSVR32.DLL
2010-04-03 03:08 . 2009-08-27 18:09 371248 ----a-w- c:\programdata\Symantec\Definitions\VirusDefs\20100402.004\EECTRL.SYS
2010-04-03 03:08 . 2009-08-27 18:09 177520 ----a-w- c:\programdata\Symantec\Definitions\VirusDefs\20100402.004\NAVENG32.DLL
2010-04-03 03:08 . 2009-08-27 18:09 1647984 ----a-w- c:\programdata\Symantec\Definitions\VirusDefs\20100402.004\NAVEX32A.DLL
2010-04-03 03:08 . 2009-08-27 18:09 102448 ----a-w- c:\programdata\Symantec\Definitions\VirusDefs\20100402.004\ERASER.SYS
2010-04-03 03:08 . 2009-12-14 09:00 2747440 ----a-w- c:\programdata\Symantec\Definitions\VirusDefs\20100402.004\CCERASER.DLL

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2010-04-30 05:31 . 2010-01-31 20:16 -------- d-----w- c:\users\Andy\AppData\Roaming\vlc
2010-04-30 05:17 . 2010-04-14 17:20 4838 ----a-w- c:\windows\system32\PerfStringBackup.TMP
2010-04-21 03:37 . 2007-09-19 01:37 -------- d-----w- c:\programdata\DVD Shrink
2010-04-16 04:53 . 2009-09-06 07:21 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
2010-04-13 07:29 . 2008-02-02 05:56 -------- d-----w- c:\users\Andy\AppData\Roaming\uTorrent
2010-04-01 20:37 . 2007-01-05 23:24 -------- d-----w- c:\program files\Google
2010-03-28 09:09 . 2010-03-28 09:09 50354 ----a-w- c:\users\Andy\AppData\Roaming\Facebook\uninstall.exe
2010-03-28 09:09 . 2010-03-28 09:09 -------- d-----w- c:\users\Andy\AppData\Roaming\Facebook
2010-03-28 00:19 . 2009-11-14 05:24 143976 ----a-w- c:\users\Andy\AppData\Roaming\Move Networks\uninstall.exe
2010-03-28 00:19 . 2009-10-15 00:50 5642688 ----a-w- c:\users\Andy\AppData\Roaming\Move Networks\plugins\npqmp071701000002.dll
2010-03-28 00:19 . 2009-02-18 02:50 -------- d-----w- c:\users\Andy\AppData\Roaming\Move Networks
2010-03-12 04:26 . 2007-11-09 02:28 -------- d-----w- c:\users\Andy\AppData\Roaming\RipIt4Me
2010-03-06 05:30 . 2010-03-06 05:30 847040 ----a-w- c:\users\Andy\AppData\Roaming\Facebook\axfbootloader.dll
2010-03-06 05:30 . 2010-03-06 05:30 5582848 ----a-w- c:\users\Andy\AppData\Roaming\Facebook\npfbplugin_1_0_3.dll
2010-03-03 05:03 . 2008-03-26 06:35 -------- d-----w- c:\users\Andy\AppData\Roaming\dvdcss
2010-02-16 09:00 . 2010-02-16 09:00 84912 ----a-w- c:\programdata\Symantec\Definitions\VirusDefs\BinHub\naveng.sys
2010-02-16 09:00 . 2010-02-16 09:00 1324720 ----a-w- c:\programdata\Symantec\Definitions\VirusDefs\BinHub\navex15.sys
.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"ehTray.exe"="c:\windows\ehome\ehTray.exe" [2008-01-19 125952]
"BgMonitor_{79662E04-7C6C-4d9f-84C7-88D8A56B10AA}"="c:\program files\Common Files\Nero\Lib\NMBgMonitor.exe" [2007-08-03 202024]
"WMPNSCFG"="c:\program files\Windows Media Player\WMPNSCFG.exe" [2008-01-19 202240]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"SynTPEnh"="c:\program files\Synaptics\SynTP\SynTPEnh.exe" [2008-04-03 1045800]
"Windows Defender"="c:\program files\Windows Defender\MSASCui.exe" [2008-01-19 1008184]
"HWSetup"="c:\program files\TOSHIBA\Utilities\HWSetup.exe" [2006-11-01 413696]
"KeNotify"="c:\program files\TOSHIBA\Utilities\KeNotify.exe" [2006-11-07 34352]
"NBKeyScan"="c:\program files\Nero\Nero8\Nero BackItUp\NBKeyScan.exe" [2007-08-08 1828136]
"SynTPStart"="c:\program files\Synaptics\SynTP\SynTPStart.exe" [2007-07-27 204800]
"IgfxTray"="c:\windows\system32\igfxtray.exe" [2008-02-12 141848]
"HotKeysCmds"="c:\windows\system32\hkcmd.exe" [2008-02-12 166424]
"Persistence"="c:\windows\system32\igfxpers.exe" [2008-02-12 133656]
"ccApp"="c:\program files\Common Files\Symantec Shared\ccApp.exe" [2006-11-23 107112]
"vptray"="c:\progra~1\SYMANT~1\VPTray.exe" [2006-11-28 134808]
"QuickTime Task"="c:\program files\QuickTime\QTTask.exe" [2009-09-05 417792]
"iTunesHelper"="c:\program files\iTunes\iTunesHelper.exe" [2009-10-29 141600]

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\system]
"EnableLUA"= 0 (0x0)
"EnableUIADesktopToggle"= 0 (0x0)

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\drivers32]
"aux"=wdmaud.drv

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\WinDefend]
@="Service"

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\NeroFilterCheck]
2007-03-01 22:57 153136 ----a-w- c:\program files\Common Files\Nero\Lib\NeroCheck.exe

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\McAfeeAntiSpyware]
"DisableMonitoring"=dword:00000001

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecAntiVirus]
"DisableMonitoring"=dword:00000001

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Svc\S-1-5-21-1679199247-1024483943-2079821399-1000]
"EnableNotificationsRef"=dword:00000001

R2 gupdate;Google Update Service (gupdate);c:\program files\Google\Update\GoogleUpdate.exe [2010-02-02 135664]
R3 EraserUtilDrv10621;EraserUtilDrv10621;c:\program files\Common Files\Symantec Shared\EENGINE\EraserUtilDrv10621.sys [x]
R3 MEMSWEEP2;MEMSWEEP2;c:\windows\system32\1D36.tmp [x]
R3 SavRoam;SavRoam;c:\program files\Symantec AntiVirus\SavRoam.exe [2006-11-28 122008]
R4 sptd;sptd;c:\windows\system32\Drivers\sptd.sys [2008-04-16 717296]
S3 EraserUtilRebootDrv;EraserUtilRebootDrv;c:\program files\Common Files\Symantec Shared\EENGINE\EraserUtilRebootDrv.sys [2009-08-27 102448]


[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\svchost]
HPZ12 REG_MULTI_SZ Pml Driver HPZ12 Net Driver HPZ12
.
Contents of the 'Scheduled Tasks' folder

2010-04-30 c:\windows\Tasks\GoogleUpdateTaskMachineCore.job
- c:\program files\Google\Update\GoogleUpdate.exe [2010-02-02 02:40]

2010-04-30 c:\windows\Tasks\GoogleUpdateTaskMachineUA.job
- c:\program files\Google\Update\GoogleUpdate.exe [2010-02-02 02:40]
.
.
------- Supplementary Scan -------
.
uStart Page = hxxp://www.hotmail.com/
uInternet Settings,ProxyOverride = *.local
IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~4\Office12\EXCEL.EXE/3000
TCP: {923B438C-D655-4F07-ABAE-AD77850EA9A1} = 83.149.115.157,4.2.2.1,68.94.156.1 68.94.157.1
TCP: {A09571E1-ABC9-4273-AD14-1577614854A7} = 83.149.115.157,4.2.2.1,68.94.156.1 68.94.157.1
.

**************************************************************************

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2010-04-30 17:20
Windows 6.0.6001 Service Pack 1 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully
hidden files: 0

**************************************************************************

[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet003\Services\MEMSWEEP2]
"ImagePath"="\??\c:\windows\system32\1D36.tmp"
.
--------------------- LOCKED REGISTRY KEYS ---------------------

[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet003\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0000\AllUserSettings]
@Denied: (A) (Users)
@Denied: (A) (Everyone)
@Allowed: (B 1 2 3 4 5) (S-1-5-20)
"BlindDial"=dword:00000000
"MSCurrentCountry"=dword:000000b5
.
Completion time: 2010-04-30 17:24:41
ComboFix-quarantined-files.txt 2010-05-01 00:24
ComboFix2.txt 2010-04-22 04:42
ComboFix3.txt 2010-04-20 05:36

Pre-Run: 19,391,856,640 bytes free
Post-Run: 19,367,661,568 bytes free

- - End Of File - - F68467FEB01D9E9B883094D083AC3B22


#15 schrauber

schrauber

    Mr.Mechanic


  • Malware Response Team
  • 24,794 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Munich,Germany
  • Local time:07:01 PM

Posted 01 May 2010 - 09:36 AM

Hi,


Please download Malwarebytes Anti-Malware and save it to your desktop.
alternate download link 1
alternate download link 2

MBAM may "make changes to your registry" as part of its disinfection routine. If using other security programs that detect registry changes (ie Spybot's Teatimer), they may interfere or alert you. Temporarily disable such programs or permit them to allow the changes.
  • Make sure you are connected to the Internet.
  • Double-click on mbam-setup.exe to install the application.
  • When the installation begins, follow the prompts and do not make any changes to default settings.
  • When installation has finished, make sure you leave both of these checked:
    • Update Malwarebytes' Anti-Malware
    • Launch Malwarebytes' Anti-Malware
  • Then click Finish.
MBAM will automatically start and you will be asked to update the program before performing a scan.
  • If an update is found, the program will automatically update itself. Press the OK button to close that box and continue.
  • If you encounter any problems while downloading the definition updates, manually download them from here and just double-click on mbam-rules.exe to install.
On the Scanner tab:
  • Make sure the "Perform Quick Scan" option is selected.
  • Then click on the Scan button.
  • If asked to select the drives to scan, leave all the drives selected and click on the Start Scan button.
  • The scan will begin and "Scan in progress" will show at the top. It may take some time to complete so please be patient.
  • When the scan is finished, a message box will say "The scan completed successfully. Click 'Show Results' to display all objects found".
  • Click OK to close the message box and continue with the removal process.
Back at the main Scanner screen:
  • Click on the Show Results button to see a list of any malware that was found.
  • Make sure that everything is checked, and click Remove Selected.
  • When removal is completed, a log report will open in Notepad.
  • The log is automatically saved and can be viewed by clicking the Logs tab in MBAM.
  • Copy and paste the contents of that report in your next reply. Be sure to post the complete log to include the top portion which shows MBAM's database version and your operating system.
  • Exit MBAM when done.
Note: If MBAM encounters a file that is difficult to remove, you will be asked to reboot your computer so MBAM can proceed with the disinfection process. If asked to restart the computer, please do so immediately. Failure to reboot normally (not into safe mode) will prevent MBAM from removing all the malware.






I'd like us to scan your machine with ESET OnlineScan
  • Hold down Control and click on the following link to open ESET OnlineScan in a new window.
    ESET OnlineScan
  • Click the button.
  • For alternate browsers only: (Microsoft Internet Explorer users can skip these steps)
    • Click on to download the ESET Smart Installer. Save it to your desktop.
    • Double click on the icon on your desktop.
  • Check
  • Click the button.
  • Accept any security warnings from your browser.
  • Check
  • Push the Start button.
  • ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this can take some time.
  • When the scan completes, push
  • Push , and save the file to your desktop using a unique name, such as ESETScan. Include the contents of this report in your next reply.
  • Push the button.
  • Push
A log file will be saved here: C:\Program Files\ESET\ESET Online Scanner\log.txt





  1. Please download OTL from one of the following mirrors:
  2. Save it to your desktop.
  3. Double click on the icon on your desktop.
  4. Under the Custom Scan box paste this in
    netsvcs
    %SYSTEMDRIVE%\*.exe
    /md5start
    eventlog.dll
    scecli.dll
    netlogon.dll
    cngaudit.dll
    sceclt.dll
    ntelogon.dll
    logevent.dll
    iaStor.sys
    nvstor.sys
    atapi.sys
    IdeChnDr.sys
    viasraid.sys
    AGP440.sys
    vaxscsi.sys
    nvatabus.sys
    viamraid.sys
    nvata.sys
    nvgts.sys
    iastorv.sys
    ViPrt.sys
    eNetHook.dll
    ahcix86.sys
    KR10N.sys
    nvstor32.sys
    ahcix86s.sys
    nvrd32.sys
    symmpi.sys
    adp3132.sys
    mv61xx.sys
    /md5stop
    %systemroot%\*. /mp /s
    CREATERESTOREPOINT
    %systemroot%\system32\*.dll /lockedfiles
    %systemroot%\Tasks\*.job /lockedfiles
    %systemroot%\system32\drivers\*.sys /lockedfiles
    %systemroot%\System32\config\*.sav
    %systemdrive%\*.sys /90 /md5
  5. Push the Quick Scan button.
  6. Two reports will open, copy and paste them in a reply here:
    • OTL.txt <-- Will be opened
    • Extra.txt <-- Will be minimized

regards,
schrauber

Posted Image
Posted Image

If I've not posted back within 48 hrs., feel free to send a PM with your topic link. Thank you!

If I have helped you then please consider donating to continue the fight against malware Posted Image




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users