Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

iu82.exe


  • This topic is locked This topic is locked
36 replies to this topic

#1 jose_007

jose_007

  • Members
  • 160 posts
  • OFFLINE
  •  
  • Local time:08:28 AM

Posted 05 May 2010 - 11:10 PM

Sirs,
For last two months,whenever I start my PC ,icons,task bar take a long time to appear (approx 4-5 mins) .
Also since last month,I have been getting alerts(through AVG resident shield) everytime I am surfing on net about some trojans
A file called
C:/windows/system32/iu82.exe appears almost daily.
Though everytime I send the files to virus vault,but they keep reappearing giving indication of malware.
The PC tooo has become very very slow
I have tried to run MBAM and antispyware but of no use.
I have online armour firewall ,and I am surprised how virus/trojans managed to get into PC while it was guarding PC.Is there a better firewall ?

Please help me with the problem.
Thanks
Jose

Here is resident shield log...
Resident Shield detection
"Infection" "Object" "Result" "Detection time" "Object Type" "Process"
"Virus identified Worm/Generic.BDZH" "C:\WINDOWS\system32\iu82.exe" "Moved to Virus Vault" "5/4/2010, 4:16:06 PM" "file" "C:\WINDOWS\System32\cmd.exe"
"Virus identified Worm/Generic.BDZH" "C:\WINDOWS\system32\iu82.exe" "Moved to Virus Vault" "5/3/2010, 11:25:43 PM" "file" "C:\WINDOWS\System32\cmd.exe"
"Virus identified Worm/Generic.BDZH" "C:\WINDOWS\system32\iu82.exe" "Infected" "5/3/2010, 11:21:11 PM" "file" "C:\WINDOWS\System32\cmd.exe"
"Virus identified Worm/Generic.BDZH" "C:\WINDOWS\system32\iu82.exe" "Infected" "5/3/2010, 11:21:05 PM" "file" "C:\WINDOWS\System32\cmd.exe"
"Trojan horse Agent.ASLB" "C:\Documents and Settings\NetworkService\Local Settings\Temporary Internet Files\Content.IE5\K1G1K6KQ\rifwv[1].bmp" "Moved to Virus Vault" "5/3/2010, 11:20:40 PM" "file" "C:\WINDOWS\System32\SVCHOST.EXE"
"Virus identified Worm/Generic.BDZH" "C:\WINDOWS\system32\iu82.exe" "Infected" "5/3/2010, 11:20:29 PM" "file" "C:\WINDOWS\System32\cmd.exe"
"Virus identified Worm/Generic.BDZH" "C:\WINDOWS\system32\iu82.exe" "Moved to Virus Vault" "5/3/2010, 11:18:59 PM" "file" "C:\WINDOWS\System32\cmd.exe"
"Virus identified Worm/Generic.BDZH" "C:\WINDOWS\system32\iu82.exe" "Moved to Virus Vault" "5/2/2010, 11:46:31 AM" "file" "C:\WINDOWS\System32\cmd.exe"
"Virus identified Worm/Generic.BDZH" "C:\WINDOWS\system32\iu82.exe" "Infected" "5/2/2010, 11:38:36 AM" "file" "C:\WINDOWS\System32\cmd.exe"
"Virus identified Worm/Generic.BDZH" "C:\WINDOWS\system32\iu82.exe" "Infected" "5/2/2010, 11:38:16 AM" "file" "C:\WINDOWS\System32\cmd.exe"
"Virus identified Worm/Generic.BDZH" "C:\WINDOWS\system32\iu82.exe" "Infected" "5/2/2010, 11:38:03 AM" "file" "C:\WINDOWS\System32\cmd.exe"
"Virus identified Worm/Generic.BDZH" "C:\WINDOWS\system32\iu82.exe" "Moved to Virus Vault" "5/2/2010, 11:37:41 AM" "file" "C:\WINDOWS\System32\cmd.exe"
"Virus identified Worm/Generic.BDZH" "C:\WINDOWS\system32\iu82.exe" "Infected" "5/1/2010, 11:53:08 PM" "file" "C:\WINDOWS\System32\cmd.exe"
"Virus identified Worm/Generic.BDZH" "C:\WINDOWS\system32\iu82.exe" "Moved to Virus Vault" "5/1/2010, 11:52:37 PM" "file" "C:\WINDOWS\System32\cmd.exe"
"Virus identified Worm/Generic.BDZH" "C:\WINDOWS\system32\iu82.exe" "Infected" "5/1/2010, 4:18:10 PM" "file" "C:\WINDOWS\System32\cmd.exe"
"Virus identified Worm/Generic.BDZH" "C:\WINDOWS\system32\iu82.exe" "Moved to Virus Vault" "5/1/2010, 4:17:46 PM" "file" "C:\WINDOWS\System32\cmd.exe"
"Trojan horse PSW.OnlineGames3.AIPX" "C:\System Volume Information\_restore{F0341502-C5E3-45FC-A9F0-362DA8579095}\RP54\A0249320.exe" "Moved to Virus Vault" "5/1/2010, 11:48:04 AM" "file" "C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe"
"Trojan horse SHeur3.SLG" "C:\System Volume Information\_restore{F0341502-C5E3-45FC-A9F0-362DA8579095}\RP54\A0249319.exe" "Moved to Virus Vault" "5/1/2010, 11:48:03 AM" "file" "C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe"
"Trojan horse Dropper.Generic2.DBS" "C:\System Volume Information\_restore{F0341502-C5E3-45FC-A9F0-362DA8579095}\RP54\A0249318.exe" "Moved to Virus Vault" "5/1/2010, 11:47:59 AM" "file" "C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe"
"Virus found Dropper.Rozena" "C:\System Volume Information\_restore{F0341502-C5E3-45FC-A9F0-362DA8579095}\RP54\A0249317.exe" "Moved to Virus Vault" "5/1/2010, 11:47:53 AM" "file" "C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe"
"Virus found Dropper.Rozena" "C:\System Volume Information\_restore{F0341502-C5E3-45FC-A9F0-362DA8579095}\RP54\A0249316.exe" "Moved to Virus Vault" "5/1/2010, 11:47:41 AM" "file" "C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe"
"Virus identified Worm/Generic.BDZH" "C:\WINDOWS\system32\iu82.exe" "Infected" "5/1/2010, 11:47:33 AM" "file" "C:\WINDOWS\System32\cmd.exe"
"Trojan horse Generic17.BDJX" "C:\System Volume Information\_restore{F0341502-C5E3-45FC-A9F0-362DA8579095}\RP54\A0249315.exe" "Moved to Virus Vault" "5/1/2010, 11:47:24 AM" "file" "C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe"
"Trojan horse Crypt.TLS" "C:\System Volume Information\_restore{F0341502-C5E3-45FC-A9F0-362DA8579095}\RP54\A0249314.exe" "Moved to Virus Vault" "5/1/2010, 11:47:18 AM" "file" "C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe"
"Trojan horse SHeur3.SHH" "C:\System Volume Information\_restore{F0341502-C5E3-45FC-A9F0-362DA8579095}\RP54\A0249313.exe" "Moved to Virus Vault" "5/1/2010, 11:47:14 AM" "file" "C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe"
"Virus identified Worm/Generic.BDZH" "C:\WINDOWS\system32\iu82.exe" "Infected" "5/1/2010, 11:46:26 AM" "file" "C:\WINDOWS\System32\cmd.exe"
"Virus identified Worm/Generic.BDZH" "C:\WINDOWS\system32\iu82.exe" "Moved to Virus Vault" "5/1/2010, 11:46:11 AM" "file" "C:\WINDOWS\System32\cmd.exe"
"Virus identified Worm/Generic.BDZH" "C:\WINDOWS\system32\iu82.exe" "Infected" "5/1/2010, 11:45:07 AM" "file" "C:\WINDOWS\System32\cmd.exe"
"Virus identified Worm/Generic.BDZH" "C:\WINDOWS\system32\iu82.exe" "Infected" "5/1/2010, 11:44:42 AM" "file" "C:\WINDOWS\System32\cmd.exe"
"Virus identified Worm/Generic.BDZH" "C:\WINDOWS\system32\iu82.exe" "Infected" "5/1/2010, 11:44:36 AM" "file" "C:\WINDOWS\System32\cmd.exe"
"Virus identified Worm/Generic.BDZH" "C:\WINDOWS\system32\iu82.exe" "Moved to Virus Vault" "5/1/2010, 11:44:05 AM" "file" "C:\WINDOWS\System32\cmd.exe"
"Virus identified Worm/Downadup" "C:\Documents and Settings\NetworkService\Local Settings\Temporary Internet Files\Content.IE5\MN6X2R4X\lsml[1].png" "Moved to Virus Vault" "5/1/2010, 11:42:07 AM" "file" "C:\WINDOWS\System32\SVCHOST.EXE"
"Virus identified Worm/Generic.BDZH" "C:\WINDOWS\system32\iu82.exe" "Infected" "5/1/2010, 11:42:04 AM" "file" "C:\WINDOWS\System32\cmd.exe"
"Virus identified Worm/Generic.BDZH" "C:\WINDOWS\system32\iu82.exe" "Moved to Virus Vault" "5/1/2010, 11:42:03 AM" "file" "C:\WINDOWS\System32\cmd.exe"
"Virus found Dropper.Rozena" "C:\WINDOWS\system32\z\eoo1.exe" "Moved to Virus Vault" "5/1/2010, 10:47:12 AM" "file" "C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe"
"Trojan horse PSW.OnlineGames3.AIPX" "C:\WINDOWS\system32\z\P001.exe" "Moved to Virus Vault" "5/1/2010, 10:47:08 AM" "file" "C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe"
"Trojan horse SHeur3.SLG" "C:\WINDOWS\system32\z\J002.exe" "Moved to Virus Vault" "5/1/2010, 10:47:07 AM" "file" "C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe"
"Trojan horse Dropper.Generic2.DBS" "C:\WINDOWS\system32\z\J001.exe" "Moved to Virus Vault" "5/1/2010, 10:47:05 AM" "file" "C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe"
"Virus found Dropper.Rozena" "C:\WINDOWS\system32\z\H001.exe" "Moved to Virus Vault" "5/1/2010, 10:47:04 AM" "file" "C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe"
"Trojan horse Generic17.BDJX" "C:\WINDOWS\system32\z\D001.exe" "Moved to Virus Vault" "5/1/2010, 10:46:56 AM" "file" "C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe"
"Trojan horse Crypt.TLS" "C:\WINDOWS\system32\z\B7878.exe" "Moved to Virus Vault" "5/1/2010, 10:46:55 AM" "file" "C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe"
"Trojan horse SHeur3.SHH" "C:\WINDOWS\system32\z\A16.exe" "Moved to Virus Vault" "5/1/2010, 10:46:53 AM" "file" "C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe"
"Virus identified Worm/Generic.BDZH" "C:\WINDOWS\system32\iu82.exe" "Moved to Virus Vault" "5/1/2010, 9:23:37 AM" "file" "C:\WINDOWS\System32\cmd.exe"
"Virus identified Worm/Generic.BDZH" "C:\WINDOWS\system32\iu82.exe" "Moved to Virus Vault" "4/30/2010, 12:23:35 AM" "file" "C:\WINDOWS\System32\cmd.exe"
"Virus identified Worm/Generic.BDZH" "C:\WINDOWS\system32\iu82.exe" "Moved to Virus Vault" "4/30/2010, 12:22:40 AM" "file" "C:\WINDOWS\System32\cmd.exe"
"Virus identified Worm/Generic.BDZH" "C:\WINDOWS\system32\iu82.exe" "Moved to Virus Vault" "4/30/2010, 12:20:01 AM" "file" "C:\WINDOWS\System32\cmd.exe"
"Virus identified Worm/Generic.BDZH" "C:\WINDOWS\system32\iu82.exe" "Moved to Virus Vault" "4/30/2010, 12:19:45 AM" "file" "C:\WINDOWS\System32\cmd.exe"
"Virus identified Worm/Generic.BDZH" "C:\WINDOWS\system32\iu82.exe" "Moved to Virus Vault" "4/30/2010, 12:18:25 AM" "file" "C:\WINDOWS\System32\cmd.exe"
"Virus identified Worm/Generic.BDZH" "C:\WINDOWS\system32\iu82.exe" "Infected" "4/30/2010, 12:17:34 AM" "file" "C:\WINDOWS\System32\cmd.exe"
"Virus identified Worm/Generic.BDZH" "C:\WINDOWS\system32\iu82.exe" "Moved to Virus Vault" "4/30/2010, 12:17:23 AM" "file" "C:\WINDOWS\System32\cmd.exe"
"Virus identified Worm/Downadup" "C:\Documents and Settings\NetworkService\Local Settings\Temporary Internet Files\Content.IE5\0XA50XM9\taiqlrv[1].gif" "Moved to Virus Vault" "4/30/2010, 12:17:15 AM" "file" "C:\WINDOWS\System32\SVCHOST.EXE"
"Virus identified Worm/Downadup" "C:\Documents and Settings\NetworkService\Local Settings\Temporary Internet Files\Content.IE5\2Z8BC149\zmriov[1].bmp" "Moved to Virus Vault" "4/30/2010, 12:16:26 AM" "file" "C:\WINDOWS\System32\SVCHOST.EXE"
"Virus identified Worm/Generic.BDZH" "C:\WINDOWS\system32\iu82.exe" "Moved to Virus Vault" "4/29/2010, 1:07:44 PM" "file" "C:\WINDOWS\System32\cmd.exe"
"Trojan horse Downloader.Generic9.BKQC" "E:\180 SERIALS, KEYS, KEYGENS & CRACKS\KeyGen [ avast! Professional Edition 4.6.744 ].exe" "Infected" "4/28/2010, 12:40:01 AM" "file" "C:\WINDOWS\EXPLORER.EXE"
"Virus identified Worm/Generic.BDZH" "C:\WINDOWS\system32\iu82.exe" "Moved to Virus Vault" "4/27/2010, 10:38:44 AM" "file" "C:\WINDOWS\System32\cmd.exe"
"Virus identified Worm/Generic.BDZH" "C:\WINDOWS\system32\iu82.exe" "Moved to Virus Vault" "4/27/2010, 10:38:15 AM" "file" "C:\WINDOWS\System32\cmd.exe"
"Virus identified Worm/Generic.BDZH" "C:\WINDOWS\system32\iu82.exe" "Moved to Virus Vault" "4/27/2010, 10:37:28 AM" "file" "C:\WINDOWS\System32\cmd.exe"
"Virus identified Worm/Generic.BDZH" "C:\WINDOWS\system32\iu82.exe" "Moved to Virus Vault" "4/27/2010, 9:10:01 AM" "file" "C:\WINDOWS\System32\cmd.exe"
"Virus identified Worm/Generic.BDZH" "C:\WINDOWS\system32\iu82.exe" "Moved to Virus Vault" "4/27/2010, 9:09:41 AM" "file" "C:\WINDOWS\System32\cmd.exe"
"Virus identified Worm/Generic.BDZH" "C:\WINDOWS\system32\iu82.exe" "Infected" "4/27/2010, 9:08:54 AM" "file" "C:\WINDOWS\System32\cmd.exe"
"Virus identified Worm/Generic.BDZH" "C:\WINDOWS\system32\iu82.exe" "Infected" "4/27/2010, 9:07:50 AM" "file" "C:\WINDOWS\System32\cmd.exe"
"Virus identified Worm/Generic.BDZH" "C:\WINDOWS\system32\iu82.exe" "Moved to Virus Vault" "4/27/2010, 9:07:50 AM" "file" "C:\WINDOWS\System32\cmd.exe"
"Virus found Win32/Heur" "C:\WINDOWS\system32\asr_52235.exe" "Moved to Virus Vault" "4/21/2010, 10:50:09 AM" "file" "C:\WINDOWS\System32\cmd.exe"
"Virus identified Worm/Generic.BDZH" "C:\WINDOWS\system32\iu82.exe" "Moved to Virus Vault" "4/21/2010, 10:49:47 AM" "file" "C:\WINDOWS\System32\cmd.exe"
"Virus identified Worm/Generic.BDZH" "C:\WINDOWS\system32\iu82.exe" "Infected" "4/19/2010, 3:08:51 PM" "file" "C:\WINDOWS\System32\cmd.exe"
"Virus found Win32/Heur" "C:\WINDOWS\system32\asr_45757.exe" "Moved to Virus Vault" "4/19/2010, 3:08:17 PM" "file" "C:\WINDOWS\System32\cmd.exe"
"Virus identified Worm/Generic.BDZH" "C:\WINDOWS\system32\iu82.exe" "Moved to Virus Vault" "4/19/2010, 3:07:58 PM" "file" "C:\WINDOWS\System32\cmd.exe"
"Virus identified Worm/Generic.BDZH" "C:\WINDOWS\system32\iu82.exe" "Moved to Virus Vault" "4/19/2010, 3:05:25 PM" "file" "C:\WINDOWS\System32\cmd.exe"
"Virus identified Worm/Generic.BDZH" "C:\WINDOWS\system32\iu82.exe" "Moved to Virus Vault" "4/19/2010, 3:04:39 PM" "file" "C:\WINDOWS\System32\cmd.exe"
"Virus identified Worm/Generic.BDZH" "C:\WINDOWS\system32\iu82.exe" "Moved to Virus Vault" "4/19/2010, 3:04:07 PM" "file" "C:\WINDOWS\System32\cmd.exe"
"Virus identified Worm/Generic.BDZH" "C:\WINDOWS\system32\iu82.exe" "Moved to Virus Vault" "4/19/2010, 3:02:08 PM"






Here is GMER log
GMER 1.0.15.15281 - http://www.gmer.net
Rootkit scan 2010-05-06 09:05:16
Windows 5.1.2600 Service Pack 2
Running: gmer.exe; Driver: C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\fgayipod.sys


---- System - GMER 1.0.15 ----

SSDT \??\C:\WINDOWS\system32\drivers\OADriver.sys (OA Helper Driver/Tall Emu) ZwAllocateVirtualMemory [0xF562D420]
SSDT \??\C:\WINDOWS\system32\drivers\OADriver.sys (OA Helper Driver/Tall Emu) ZwAssignProcessToJobObject [0xF562DC60]
SSDT \??\C:\WINDOWS\system32\drivers\OADriver.sys (OA Helper Driver/Tall Emu) ZwConnectPort [0xF562BA90]
SSDT \??\C:\WINDOWS\system32\drivers\OADriver.sys (OA Helper Driver/Tall Emu) ZwCreateFile [0xF563ACB0]
SSDT \??\C:\WINDOWS\system32\drivers\OADriver.sys (OA Helper Driver/Tall Emu) ZwCreatePort [0xF562B740]
SSDT \??\C:\WINDOWS\system32\drivers\OADriver.sys (OA Helper Driver/Tall Emu) ZwCreateProcess [0xF5628320]
SSDT \??\C:\WINDOWS\system32\drivers\OADriver.sys (OA Helper Driver/Tall Emu) ZwCreateProcessEx [0xF5628710]
SSDT \??\C:\WINDOWS\system32\drivers\OADriver.sys (OA Helper Driver/Tall Emu) ZwCreateSection [0xF5627DE0]
SSDT \??\C:\WINDOWS\system32\drivers\OADriver.sys (OA Helper Driver/Tall Emu) ZwCreateThread [0xF5629CA0]
SSDT \??\C:\WINDOWS\system32\drivers\OADriver.sys (OA Helper Driver/Tall Emu) ZwDebugActiveProcess [0xF562A900]
SSDT \??\C:\WINDOWS\system32\drivers\OADriver.sys (OA Helper Driver/Tall Emu) ZwDuplicateObject [0xF562B410]
SSDT \??\C:\WINDOWS\system32\drivers\OADriver.sys (OA Helper Driver/Tall Emu) ZwLoadDriver [0xF562CB40]
SSDT \??\C:\WINDOWS\system32\drivers\OADriver.sys (OA Helper Driver/Tall Emu) ZwOpenFile [0xF563B420]
SSDT \??\C:\WINDOWS\system32\drivers\OADriver.sys (OA Helper Driver/Tall Emu) ZwOpenProcess [0xF5629630]
SSDT \??\C:\WINDOWS\system32\drivers\OADriver.sys (OA Helper Driver/Tall Emu) ZwOpenSection [0xF5628080]
SSDT \??\C:\WINDOWS\system32\drivers\OADriver.sys (OA Helper Driver/Tall Emu) ZwOpenThread [0xF562A1C0]
SSDT \??\C:\WINDOWS\system32\drivers\OADriver.sys (OA Helper Driver/Tall Emu) ZwProtectVirtualMemory [0xF562D8A0]
SSDT \??\C:\WINDOWS\system32\drivers\OADriver.sys (OA Helper Driver/Tall Emu) ZwQueryDirectoryFile [0xF562CFB0]
SSDT \??\C:\WINDOWS\system32\drivers\OADriver.sys (OA Helper Driver/Tall Emu) ZwQueueApcThread [0xF562DE00]
SSDT \??\C:\WINDOWS\system32\drivers\OADriver.sys (OA Helper Driver/Tall Emu) ZwRequestWaitReplyPort [0xF562C690]
SSDT \??\C:\WINDOWS\system32\drivers\OADriver.sys (OA Helper Driver/Tall Emu) ZwRestoreKey [0xF563A940]
SSDT \??\C:\WINDOWS\system32\drivers\OADriver.sys (OA Helper Driver/Tall Emu) ZwResumeThread [0xF562B060]
SSDT \??\C:\WINDOWS\system32\drivers\OADriver.sys (OA Helper Driver/Tall Emu) ZwSecureConnectPort [0xF562BE80]
SSDT \??\C:\WINDOWS\system32\drivers\OADriver.sys (OA Helper Driver/Tall Emu) ZwSetContextThread [0xF562A6E0]
SSDT \??\C:\WINDOWS\system32\drivers\OADriver.sys (OA Helper Driver/Tall Emu) ZwSetSystemInformation [0xF562AAA0]
SSDT \??\C:\WINDOWS\system32\drivers\OADriver.sys (OA Helper Driver/Tall Emu) ZwShutdownSystem [0xF562CA10]
SSDT \??\C:\WINDOWS\system32\drivers\OADriver.sys (OA Helper Driver/Tall Emu) ZwSuspendProcess [0xF562B240]
SSDT \??\C:\WINDOWS\system32\drivers\OADriver.sys (OA Helper Driver/Tall Emu) ZwSuspendThread [0xF562AE60]
SSDT \??\C:\WINDOWS\system32\drivers\OADriver.sys (OA Helper Driver/Tall Emu) ZwSystemDebugControl [0xF562AC90]
SSDT \??\C:\WINDOWS\system32\drivers\OADriver.sys (OA Helper Driver/Tall Emu) ZwTerminateProcess [0xF5629A30]
SSDT \??\C:\WINDOWS\system32\drivers\OADriver.sys (OA Helper Driver/Tall Emu) ZwTerminateThread [0xF562A4B0]
SSDT \??\C:\WINDOWS\system32\drivers\OADriver.sys (OA Helper Driver/Tall Emu) ZwUnloadDriver [0xF562CD70]
SSDT \??\C:\WINDOWS\system32\drivers\OADriver.sys (OA Helper Driver/Tall Emu) ZwWriteVirtualMemory [0xF562DA70]

---- Kernel code sections - GMER 1.0.15 ----

.text ntoskrnl.exe!_abnormal_termination + 107 804E2DD8 12 Bytes [40, B7, 62, F5, 20, 83, 62, ...]
.text ntoskrnl.exe!_abnormal_termination + 320 804E2FF1 3 Bytes [DE, 62, F5] {FISUB WORD [EDX-0xb]}
.text ntoskrnl.exe!_abnormal_termination + 3A3 804E3074 2 Bytes [E0, A6] {LOOPNZ 0xffffffffffffffa8}
.text ntoskrnl.exe!_abnormal_termination + 3A6 804E3077 1 Byte [F5]
.text ntoskrnl.exe!_abnormal_termination + 443 804E3114 2 Bytes [40, B2]
.text ...
init C:\WINDOWS\system32\drivers\ALCXSENS.SYS entry point in "init" section [0xFA859900]

---- User code sections - GMER 1.0.15 ----

.text C:\WINDOWS\system32\wdfmgr.exe[372] kernel32.dll!FreeLibrary + 15 7C80AA7B 4 Bytes CALL 71B0003D
.text C:\WINDOWS\system32\csrss.exe[380] KERNEL32.dll!FreeLibrary + 15 7C80AA7B 4 Bytes CALL 71AF003D
.text C:\WINDOWS\system32\winlogon.exe[404] kernel32.dll!FreeLibrary + 15 7C80AA7B 4 Bytes CALL 71AF003D
.text C:\WINDOWS\system32\services.exe[452] kernel32.dll!FreeLibrary + 15 7C80AA7B 4 Bytes CALL 71AF003D
.text C:\WINDOWS\system32\lsass.exe[464] kernel32.dll!FreeLibrary + 15 7C80AA7B 4 Bytes CALL 71AF003D
.text ...
.text C:\WINDOWS\system32\wuauclt.exe[596] kernel32.dll!LoadLibraryExW + C4 7C801BB5 4 Bytes CALL 00BF0001
.text C:\WINDOWS\system32\wuauclt.exe[596] kernel32.dll!CreateProcessW 7C802332 6 Bytes JMP 5F0A0F5A
.text C:\WINDOWS\system32\wuauclt.exe[596] kernel32.dll!CreateProcessA 7C802367 6 Bytes JMP 5F040F5A
.text C:\WINDOWS\system32\wuauclt.exe[596] kernel32.dll!FreeLibrary + 15 7C80AA7B 4 Bytes CALL 71B0003D
.text C:\WINDOWS\system32\wuauclt.exe[596] USER32.dll!ExitWindowsEx 77D89E6D 6 Bytes JMP 5F0D0F5A
.text C:\WINDOWS\system32\svchost.exe[608] kernel32.dll!FreeLibrary + 15 7C80AA7B 4 Bytes CALL 71AF003D
.text C:\WINDOWS\system32\svchost.exe[688] kernel32.dll!FreeLibrary + 15 7C80AA7B 4 Bytes CALL 71AF003D
.text C:\WINDOWS\System32\svchost.exe[732] kernel32.dll!FreeLibrary + 15 7C80AA7B 4 Bytes CALL 71AF003D
.text C:\PROGRA~1\AVG\AVG8\avgrsx.exe[756] kernel32.dll!FreeLibrary + 15 7C80AA7B 4 Bytes CALL 71B0003D
.text C:\WINDOWS\system32\svchost.exe[796] kernel32.dll!FreeLibrary + 15 7C80AA7B 4 Bytes CALL 71AF003D
.text ...
.text C:\WINDOWS\Explorer.EXE[1224] kernel32.dll!LoadLibraryExW + C4 7C801BB5 4 Bytes CALL 01280001
.text C:\WINDOWS\Explorer.EXE[1224] kernel32.dll!CreateProcessW 7C802332 6 Bytes JMP 5F0A0F5A
.text C:\WINDOWS\Explorer.EXE[1224] kernel32.dll!CreateProcessA 7C802367 6 Bytes JMP 5F040F5A
.text C:\WINDOWS\Explorer.EXE[1224] kernel32.dll!FreeLibrary + 15 7C80AA7B 4 Bytes CALL 71AF003D
.text C:\WINDOWS\Explorer.EXE[1224] USER32.dll!ExitWindowsEx 77D89E6D 6 Bytes JMP 5F0D0F5A
.text C:\WINDOWS\Explorer.EXE[1224] iphlpapi.dll!IcmpSendEcho2 76D6B704 6 Bytes JMP 5F100F5A
.text C:\Program Files\Common Files\LightScribe\LSSrvc.exe[1412] kernel32.dll!FreeLibrary + 15 7C80AA7B 4 Bytes CALL 71B0003D
.text C:\WINDOWS\system32\spoolsv.exe[1616] kernel32.dll!FreeLibrary + 15 7C80AA7B 4 Bytes CALL 71AF003D
.text C:\Program Files\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE[2016] kernel32.dll!FreeLibrary + 15 7C80AA7B 4 Bytes CALL 71B0003D
.text C:\Program Files\AVG\AVG8\avgcsrvx.exe[2100] kernel32.dll!FreeLibrary + 15 7C80AA7B 4 Bytes CALL 71B0003D
.text C:\WINDOWS\System32\alg.exe[2772] kernel32.dll!FreeLibrary + 15 7C80AA7B 4 Bytes CALL 71B0003D
.text C:\WINDOWS\SOUNDMAN.EXE[3340] kernel32.dll!LoadLibraryExW + C4 7C801BB5 4 Bytes CALL 00C50001
.text C:\WINDOWS\SOUNDMAN.EXE[3340] kernel32.dll!CreateProcessW 7C802332 6 Bytes JMP 5F0A0F5A
.text C:\WINDOWS\SOUNDMAN.EXE[3340] kernel32.dll!CreateProcessA 7C802367 6 Bytes JMP 5F040F5A
.text C:\WINDOWS\SOUNDMAN.EXE[3340] kernel32.dll!FreeLibrary + 15 7C80AA7B 4 Bytes CALL 71B0003D
.text C:\WINDOWS\SOUNDMAN.EXE[3340] USER32.dll!ExitWindowsEx 77D89E6D 6 Bytes JMP 5F0D0F5A
.text C:\PROGRA~1\AVG\AVG8\avgtray.exe[3536] kernel32.dll!LoadLibraryExW + C4 7C801BB5 4 Bytes CALL 00E50001
.text C:\PROGRA~1\AVG\AVG8\avgtray.exe[3536] kernel32.dll!CreateProcessW 7C802332 6 Bytes JMP 5F0A0F5A
.text C:\PROGRA~1\AVG\AVG8\avgtray.exe[3536] kernel32.dll!CreateProcessA 7C802367 6 Bytes JMP 5F040F5A
.text C:\PROGRA~1\AVG\AVG8\avgtray.exe[3536] kernel32.dll!FreeLibrary + 15 7C80AA7B 4 Bytes CALL 71B0003D
.text C:\PROGRA~1\AVG\AVG8\avgtray.exe[3536] USER32.dll!ExitWindowsEx 77D89E6D 6 Bytes JMP 5F0D0F5A
.text C:\PROGRA~1\AVG\AVG8\avgtray.exe[3536] ole32.dll!CoCreateInstanceEx 77525FB1 6 Bytes JMP 5F130F5A
.text C:\PROGRA~1\AVG\AVG8\avgtray.exe[3536] ole32.dll!CoCreateInstance 77526009 6 Bytes JMP 5F100F5A
.text C:\WINDOWS\system32\ctfmon.exe[3644] kernel32.dll!LoadLibraryExW + C4 7C801BB5 4 Bytes CALL 00C00001
.text C:\WINDOWS\system32\ctfmon.exe[3644] kernel32.dll!CreateProcessW 7C802332 6 Bytes JMP 5F0A0F5A
.text C:\WINDOWS\system32\ctfmon.exe[3644] kernel32.dll!CreateProcessA 7C802367 6 Bytes JMP 5F040F5A
.text C:\WINDOWS\system32\ctfmon.exe[3644] kernel32.dll!FreeLibrary + 15 7C80AA7B 4 Bytes CALL 71B0003D
.text C:\WINDOWS\system32\ctfmon.exe[3644] USER32.dll!ExitWindowsEx 77D89E6D 6 Bytes JMP 5F0D0F5A

---- Devices - GMER 1.0.15 ----

Device \Driver\Tcpip \Device\Ip OAmon.sys (TDI Helper Driver/Tall Emu)

AttachedDevice \Driver\Tcpip \Device\Ip avgtdix.sys (AVG Network connection watcher/AVG Technologies CZ, s.r.o.)

Device \Driver\Tcpip \Device\Tcp OAmon.sys (TDI Helper Driver/Tall Emu)

AttachedDevice \Driver\Tcpip \Device\Tcp avgtdix.sys (AVG Network connection watcher/AVG Technologies CZ, s.r.o.)

Device \Driver\Tcpip \Device\Udp OAmon.sys (TDI Helper Driver/Tall Emu)

AttachedDevice \Driver\Tcpip \Device\Udp avgtdix.sys (AVG Network connection watcher/AVG Technologies CZ, s.r.o.)

Device \Driver\Tcpip \Device\RawIp OAmon.sys (TDI Helper Driver/Tall Emu)

AttachedDevice \Driver\Tcpip \Device\RawIp avgtdix.sys (AVG Network connection watcher/AVG Technologies CZ, s.r.o.)

Device \Driver\Tcpip \Device\IPMULTICAST OAmon.sys (TDI Helper Driver/Tall Emu)

AttachedDevice \FileSystem\Fastfat \Fat fltMgr.sys (Microsoft Filesystem Filter Manager/Microsoft Corporation)

---- Disk sectors - GMER 1.0.15 ----

Disk \Device\Harddisk0\DR0 sector 62: copy of MBR

---- EOF - GMER 1.0.15 ----





Here is DDS log

DDS (Ver_10-03-17.01) - FAT32x86
Run by Administrator at 8:57:05.56 on Thu 05/06/2010
Internet Explorer: 6.0.2900.2180
Microsoft Windows XP Professional 5.1.2600.2.1252.1.1033.18.191.67 [GMT 5.5:30]

AV: AVG Anti-Virus Free *On-access scanning enabled* (Updated) {17DDD097-36FF-435F-9E1B-52D74245D6BF}
FW: Online Armor Firewall *disabled* {B797DAA0-7E2E-4711-8BB3-D12744F1922A}

============== Running Processes ===============

C:\WINDOWS\system32\svchost -k DcomLaunch
SVCHOST.EXE
C:\WINDOWS\System32\svchost.exe -k netsvcs
SVCHOST.EXE
SVCHOST.EXE
C:\Program Files\Tall Emu\Online Armor\OAcat.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\spoolsv.exe
C:\PROGRA~1\AVG\AVG8\avgwdsvc.exe
C:\Program Files\Common Files\LightScribe\LSSrvc.exe
C:\Program Files\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE
C:\PROGRA~1\AVG\AVG8\avgrsx.exe
C:\PROGRA~1\AVG\AVG8\avgnsx.exe
C:\PROGRA~1\AVG\AVG8\avgemc.exe
C:\Program Files\AVG\AVG8\avgcsrvx.exe
C:\WINDOWS\SOUNDMAN.EXE
C:\PROGRA~1\AVG\AVG8\avgtray.exe
C:\WINDOWS\system32\ctfmon.exe
C:\WINDOWS\system32\wuauclt.exe
C:\WINDOWS\System32\svchost.exe -k HTTPFilter
C:\Documents and Settings\Administrator\Desktop\dds.scr

============== Pseudo HJT Report ===============

uStart Page = about:blank
uSearchURL,(Default) = hxxp://www.google.com/search?q=%s
BHO: AcroIEHlprObj Class: {06849e9f-c8d7-4d59-b87d-784b7d6be0b3} - c:\program files\adobe\acrobat 5.0\reader\activex\AcroIEHelper.ocx
BHO: AVG Safe Search: {3ca2f312-6f6e-4b53-a66e-4e65e497c8c0} - c:\program files\avg\avg8\avgssie.dll
BHO: AVG Security Toolbar: {a057a204-bacc-4d26-9990-79a187e2698e} - c:\progra~1\avg\avg8\AVGTOO~1.DLL
TB: AVG Security Toolbar: {a057a204-bacc-4d26-9990-79a187e2698e} - c:\progra~1\avg\avg8\AVGTOO~1.DLL
uRun: [ctfmon.exe] c:\windows\system32\ctfmon.exe
mRun: [SoundMan] SOUNDMAN.EXE
mRun: [SiSPower] Rundll32.exe SiSPower.dll,ModeAgent
mRun: [NeroFilterCheck] c:\program files\common files\ahead\lib\NeroCheck.exe
mRun: [AVG8_TRAY] c:\progra~1\avg\avg8\avgtray.exe
mRun: [@OnlineArmor GUI] "c:\program files\tall emu\online armor\oaui.exe"
mRun: [TkBellExe] "c:\program files\common files\real\update_ob\realsched.exe" -osboot
IE: E&xport to Microsoft Excel - c:\progra~1\micros~2\office11\EXCEL.EXE/3000
IE: Save with Download Manager... - file://c:\program files\j river\media center 11\DMDownload.htm
IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe
IE: {92780B25-18CC-41C8-B9BE-3C9C571A8263} - {FF059E31-CC5A-4E2E-BF3B-96E929D65503} - c:\progra~1\micros~2\office11\REFIEBAR.DLL
Handler: linkscanner - {F274614C-63F8-47D5-A4D1-FBDDE494F8D1} - c:\program files\avg\avg8\avgpp.dll
Notify: !SASWinLogon - c:\program files\superantispyware\SASWINLO.dll
Notify: avgrsstarter - avgrsstx.dll
SEH: SABShellExecuteHook Class: {5ae067d3-9afb-48e0-853a-ebb7f4a000da} - c:\program files\superantispyware\SASSEH.DLL
SEH: OA Shell Helper: {4f07da45-8170-4859-9b5f-037ef2970034} - c:\progra~1\tallem~1\online~1\oaevent.dll

================= FIREFOX ===================

FF - ProfilePath - c:\docume~1\admini~1\applic~1\mozilla\firefox\profiles\8hscxe3h.default\
FF - plugin: c:\documents and settings\all users\application data\real\realplayer\browserrecordplugin\mozillaplugins\nprphtml5videoshim.dll
FF - plugin: c:\program files\google\google earth\plugin\npgeplugin.dll
FF - plugin: c:\program files\google\update\1.2.183.23\npGoogleOneClick8.dll
FF - plugin: c:\program files\opera\program\plugins\NPDocBox.dll
FF - plugin: c:\program files\opera\program\plugins\nppdf32.dll

============= SERVICES / DRIVERS ===============

R1 AvgLdx86;AVG AVI Loader Driver x86;c:\windows\system32\drivers\avgldx86.sys [2009-1-4 335240]
R1 AvgMfx86;AVG On-access Scanner Minifilter Driver x86;c:\windows\system32\drivers\avgmfx86.sys [2009-1-4 27784]
R1 AvgTdiX;AVG8 Network Redirector;c:\windows\system32\drivers\avgtdix.sys [2009-1-4 108552]
R1 OADevice;OADriver;c:\windows\system32\drivers\OADriver.sys [2010-3-1 223312]
R1 OAmon;OAmon;c:\windows\system32\drivers\OAmon.sys [2010-3-1 24656]
R1 OAnet;OAnet;c:\windows\system32\drivers\OAnet.sys [2010-3-1 29776]
R1 SASDIFSV;SASDIFSV;c:\program files\superantispyware\sasdifsv.sys [2010-1-5 9968]
R1 SASKUTIL;SASKUTIL;c:\program files\superantispyware\SASKUTIL.SYS [2010-1-5 74480]
R2 avg8emc;AVG8 E-mail Scanner;c:\progra~1\avg\avg8\avgemc.exe [2009-1-4 908056]
R2 avg8wd;AVG8 WatchDog;c:\progra~1\avg\avg8\avgwdsvc.exe [2009-1-4 297752]
R2 OAcat;Online Armor Helper Service;c:\program files\tall emu\online armor\oacat.exe [2010-3-1 1282248]
S2 gupdate;Google Update Service (gupdate);c:\program files\google\update\GoogleUpdate.exe [2010-3-23 136176]
S2 SvcOnlineArmor;Online Armor;c:\program files\tall emu\online armor\oasrv.exe [2010-3-1 3291336]
S3 SASENUM;SASENUM;c:\program files\superantispyware\SASENUM.SYS [2010-1-5 7408]

=============== Created Last 30 ================

2010-05-03 18:23:54 0 d-----w- c:\program files\Airline Tycoon Evolution
2010-05-03 06:26:16 0 d-----w- c:\program files\CDCheck
2010-05-03 02:54:07 0 d-----w- c:\program files\DatawareGames
2010-05-01 18:24:46 1318912 ----a-w- c:\program files\Update_ATE_1.03.exe
2010-05-01 05:23:07 174 ----a-w- c:\windows\system32\z.rar
2010-04-27 19:17:27 0 d-----w- c:\program files\NovaLogic
2010-04-27 18:30:40 0 d-----w- c:\windows\Downloaded Installations
2010-04-27 05:18:11 0 d-----w- c:\program files\Activision
2010-04-27 05:03:06 0 d-----w- c:\program files\Cheatbook Database 2005
2010-04-27 03:41:07 0 ----a-w- c:\windows\system32\asr_35521.exe
2010-04-27 03:40:52 78 ----a-w- c:\windows\system32\asr_wjpdk
2010-04-26 19:59:10 0 d-----w- c:\windows\Profiles
2010-04-26 19:59:06 0 d-----w- c:\windows\system32\Adobe
2010-04-21 05:19:57 77 ----a-w- c:\windows\system32\asr_aegfj
2010-04-21 05:19:06 0 d-----w- c:\windows\system32\z
2010-04-21 05:17:08 76 ----a-w- c:\windows\system32\asr_bzmgz
2010-04-19 18:44:59 0 d-----w- c:\program files\Emicsoft Studio
2010-04-19 18:21:28 0 d-----w- c:\program files\common files\DVDVideoSoft
2010-04-19 18:21:27 0 d-----w- c:\program files\DVDVideoSoft
2010-04-19 13:46:48 25 ----a-w- c:\windows\cdplayer.ini
2010-04-19 13:40:19 0 d-----w- c:\program files\common files\xing shared
2010-04-19 13:38:28 0 d-----w- c:\program files\common files\Real
2010-04-19 09:37:46 79 ----a-w- c:\windows\system32\asr_zloul
2010-04-19 07:19:44 0 d-sh--w- C:\FOUND.076
2010-04-19 06:17:12 0 d-sh--w- C:\FOUND.075
2010-04-19 06:00:31 0 d-----w- c:\program files\NirSoft
2010-04-18 18:11:30 0 d-sh--w- C:\FOUND.074
2010-04-18 17:54:56 0 d-sh--w- C:\FOUND.073
2010-04-18 17:32:58 0 d-sh--w- C:\FOUND.072
2010-04-17 17:45:20 0 d-sh--w- C:\FOUND.071
2010-04-17 14:53:27 4096 ----a-w- c:\windows\d3dx.dat
2010-04-17 14:42:57 0 d-----w- c:\program files\Marble Blast Demo
2010-04-17 13:52:44 0 d-sh--w- C:\FOUND.070
2010-04-17 13:42:04 0 d-sh--w- C:\FOUND.069
2010-04-17 13:31:02 0 d-sh--w- C:\FOUND.068
2010-04-14 15:05:27 79 ----a-w- c:\windows\system32\asr_fzklx
2010-04-14 15:05:18 78 ----a-w- c:\windows\system32\asr_rjmvg
2010-04-06 09:53:16 0 d-sh--w- C:\FOUND.067

==================== Find3M ====================

2010-04-29 10:09:38 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2010-04-29 10:09:26 20952 ----a-w- c:\windows\system32\drivers\mbam.sys
2010-04-26 03:32:34 720896 ----a-w- c:\windows\iun6002ev.exe
2010-04-19 13:38:40 499712 ----a-w- c:\windows\system32\msvcp71.dll
2010-03-12 12:32:40 261632 ----a-w- c:\windows\PEV.exe
2010-02-12 10:44:38 11952 ----a-w- c:\windows\system32\avgrsstx.dll

============= FINISH: 8:58:12.95 ===============


BC AdBot (Login to Remove)

 


#2 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:01:28 PM

Posted 08 May 2010 - 06:23 AM

Hi,

Welcome to Bleeping Computer. My name is m0le and I will be helping you with your log.
  • Please subscribe to this topic, if you haven't already. You can subscribe by clicking the Options box to the right of your topic title and selecting Track This Topic.

  • Please avoid installing/uninstalling or updating any programs and attempting any unsupervised fixes or scans. This can make helping you impossible.

  • Please reply to this post so I know you are there.
The forum is busy and we need to have replies as soon as possible. If I haven't had a reply after 3 days I will bump the topic and if you do not reply by the following day after that then I will close the topic.

Once I receive a reply then I will return with your first instructions.

Thanks thumbup2.gif
Posted Image
m0le is a proud member of UNITE

#3 jose_007

jose_007
  • Topic Starter

  • Members
  • 160 posts
  • OFFLINE
  •  
  • Local time:08:28 AM

Posted 08 May 2010 - 12:15 PM

Sir
Thanks for replying to topic.
Please continue with instructions.

Thanks again
Jose

#4 jose_007

jose_007
  • Topic Starter

  • Members
  • 160 posts
  • OFFLINE
  •  
  • Local time:08:28 AM

Posted 08 May 2010 - 12:20 PM

QUOTE
Please avoid installing/uninstalling or updating any programs


Sir,
I deleted a few games and some useless softwares yesterday.
Hope that doesn't create problem..


Thanks
Jose

#5 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:01:28 PM

Posted 08 May 2010 - 12:52 PM

No problem with those uninstalls, jose.

There's no rootkit on this machine and there's obviously some stubborn malware on here so please run the following programs

Download and Run RKill

Please download RKill by Grinler from one of the 4 links below and save it to your desktop.

Link 1
Link 2
Link 3
Link 4
  • Before we begin, you should disable your anti-malware softwares you have installed so they do not interfere RKill running as some anti-malware softwares detect RKill as malicious. Please refer to this page if you are not sure how.
  • Double-click on Rkill on your desktop to run it. (If you are using Windows Vista, please right-click on it and select Run As Administrator)
  • A black screen will appear and then disappear. Please do not worry, that is normal. This means that the tool has been successfully executed.
  • Please post the resulting log in your next reply.


Then

Please download ComboFix from one of these locations:* IMPORTANT !!! Save ComboFix.exe to your Desktop making sure you rename it comfix.exe
  • Disable your AntiVirus and AntiSpyware applications, usually via a right click on the System Tray icon. They may otherwise interfere with our tools. (Click on this link to see a list of programs that should be disabled. The list is not all inclusive.)
  • Double click on Comfix.exe & follow the prompts.
  • As part of it's process, ComboFix will check to see if the Microsoft Windows Recovery Console is installed. With malware infections being as they are today, it's strongly recommended to have this pre-installed on your machine before doing any malware removal. It will allow you to boot up into a special recovery/repair mode that will allow us to more easily help you should your computer have a problem after an attempted removal of malware.
  • Follow the prompts to allow ComboFix to download and install the Microsoft Windows Recovery Console, and when prompted, agree to the End-User License Agreement to install the Microsoft Windows Recovery Console.
**Please note: If the Microsoft Windows Recovery Console is already installed, ComboFix will continue it's malware removal procedures.



Once the Microsoft Windows Recovery Console is installed using ComboFix, you should see the following message:



Click on Yes, to continue scanning for malware.

When finished, it shall produce a log for you. Please include the C:\ComboFix.txt in your next reply.

Thanks thumbup2.gif
Posted Image
m0le is a proud member of UNITE

#6 jose_007

jose_007
  • Topic Starter

  • Members
  • 160 posts
  • OFFLINE
  •  
  • Local time:08:28 AM

Posted 09 May 2010 - 04:41 AM

Sir,

Here is RKill Report

This log file is located at C:\rkill.log.
Please post this only if requested to by the person helping you.
Otherwise you can close this log when you wish.
Ran as Administrator on 05/09/2010 at 14:56:56.


Processes terminated by Rkill or while it was running:




Rkill completed on 05/09/2010 at 14:56:57.



And Comfix report
ComboFix 10-05-08.02 - Administrator 05/09/2010 15:02:30.7.1 - FAT32x86
Microsoft Windows XP Professional 5.1.2600.2.1252.1.1033.18.191.65 [GMT 5.5:30]
Running from: c:\documents and settings\Administrator\Desktop\comfix.exe
AV: AVG Anti-Virus Free *On-access scanning disabled* (Outdated) {17DDD097-36FF-435F-9E1B-52D74245D6BF}
FW: Online Armor Firewall *disabled* {B797DAA0-7E2E-4711-8BB3-D12744F1922A}
* Created a new restore point
.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.

c:\windows\system32\asr_35521.exe

.
((((((((((((((((((((((((( Files Created from 2010-04-09 to 2010-05-09 )))))))))))))))))))))))))))))))
.

2010-05-03 06:26 . 2010-05-03 06:26 -------- d-----w- c:\program files\CDCheck
2010-05-03 02:54 . 2010-05-03 02:54 -------- d-----w- c:\program files\DatawareGames
2010-05-01 18:24 . 2010-05-01 18:25 1318912 ----a-w- c:\program files\Update_ATE_1.03.exe
2010-04-27 18:30 . 2010-04-27 18:30 -------- d-----w- c:\windows\Downloaded Installations
2010-04-27 05:18 . 2010-04-27 05:18 -------- d-----w- c:\program files\Activision
2010-04-27 05:03 . 2010-04-27 05:03 -------- d-----w- c:\program files\Cheatbook Database 2005
2010-04-26 19:59 . 2010-04-26 19:59 -------- d-----w- c:\windows\Profiles
2010-04-26 19:59 . 2010-04-26 19:59 -------- d-----w- c:\windows\system32\Adobe
2010-04-26 19:59 . 2010-04-26 19:59 -------- d-----w- c:\program files\Common Files\Adobe
2010-04-26 19:59 . 2010-04-26 19:59 -------- d-----w- c:\documents and settings\Administrator\Application Data\InterTrust
2010-04-21 05:19 . 2010-04-21 05:19 -------- d-----w- c:\windows\system32\z
2010-04-19 18:44 . 2010-04-19 18:45 -------- d-----w- c:\program files\Emicsoft Studio
2010-04-19 18:21 . 2010-04-19 18:21 -------- d-----w- c:\program files\Common Files\DVDVideoSoft
2010-04-19 18:21 . 2010-04-19 18:21 -------- d-----w- c:\program files\DVDVideoSoft
2010-04-19 13:42 . 2010-04-19 13:42 45056 ----a-w- c:\documents and settings\All Users\Application Data\Real\RealPlayer\BrowserRecordPlugin\ThinShims\rpnpshimwmp.dll
2010-04-19 13:42 . 2010-04-19 13:42 49152 ----a-w- c:\documents and settings\All Users\Application Data\Real\RealPlayer\BrowserRecordPlugin\Firefox\Ext\Components\nprpffbrowserrecordext.dll
2010-04-19 13:42 . 2010-04-19 13:42 45056 ----a-w- c:\documents and settings\All Users\Application Data\Real\RealPlayer\BrowserRecordPlugin\ThinShims\rpnpshimswf.dll
2010-04-19 13:42 . 2010-04-19 13:42 45056 ----a-w- c:\documents and settings\All Users\Application Data\Real\RealPlayer\BrowserRecordPlugin\ThinShims\rpnpshimrp.dll
2010-04-19 13:42 . 2010-04-19 13:42 45056 ----a-w- c:\documents and settings\All Users\Application Data\Real\RealPlayer\BrowserRecordPlugin\ThinShims\rpnpshimqt.dll
2010-04-19 13:42 . 2010-04-19 13:42 308808 ----a-w- c:\documents and settings\All Users\Application Data\Real\RealPlayer\BrowserRecordPlugin\Common\rpmainbrowserrecordplugin.dll
2010-04-19 13:42 . 2010-04-19 13:42 14848 ----a-w- c:\documents and settings\All Users\Application Data\Real\RealPlayer\BrowserRecordPlugin\MozillaPlugins\nprphtml5videoshim.dll
2010-04-19 13:42 . 2010-04-19 13:42 40960 ----a-w- c:\documents and settings\All Users\Application Data\Real\RealPlayer\BrowserRecordPlugin\Chrome\Hook\rpchromebrowserrecordhelper.dll
2010-04-19 13:41 . 2010-04-19 13:41 341600 ----a-w- c:\documents and settings\All Users\Application Data\Real\RealPlayer\BrowserRecordPlugin\IE\rpbrowserrecordplugin.dll
2010-04-19 13:40 . 2010-04-19 13:40 -------- d-----w- c:\program files\Common Files\xing shared
2010-04-19 13:38 . 2010-04-19 13:38 -------- d-----w- c:\program files\Common Files\Real
2010-04-19 07:19 . 2010-04-19 07:19 -------- d-----w- C:\FOUND.076
2010-04-19 06:17 . 2010-04-19 06:17 -------- d-----w- C:\FOUND.075
2010-04-19 06:00 . 2010-04-19 06:00 -------- d-----w- c:\program files\NirSoft
2010-04-18 18:11 . 2010-04-18 18:11 -------- d-----w- C:\FOUND.074
2010-04-18 17:54 . 2010-04-18 17:54 -------- d-----w- C:\FOUND.073
2010-04-18 17:32 . 2010-04-18 17:32 -------- d-----w- C:\FOUND.072
2010-04-17 17:45 . 2010-04-17 17:45 -------- d-----w- C:\FOUND.071
2010-04-17 14:53 . 2010-04-17 14:53 4096 ----a-w- c:\windows\d3dx.dat
2010-04-17 14:42 . 2010-04-17 14:42 -------- d-----w- c:\program files\Marble Blast Demo
2010-04-17 13:52 . 2010-04-17 13:52 -------- d-----w- C:\FOUND.070
2010-04-17 13:42 . 2010-04-17 13:42 -------- d-----w- C:\FOUND.069
2010-04-17 13:31 . 2010-04-17 13:31 -------- d-----w- C:\FOUND.068

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2010-05-01 04:25 . 2010-04-17 15:32 6153352 ----a-w- c:\documents and settings\All Users\Application Data\Malwarebytes\Malwarebytes' Anti-Malware\mbam-setup.exe
2010-05-01 04:21 . 2010-02-01 17:12 117760 ----a-w- c:\documents and settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\SDDLLS\UIREPAIR.DLL
2010-04-29 10:09 . 2010-01-25 18:23 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2010-04-29 10:09 . 2010-01-25 18:23 20952 ----a-w- c:\windows\system32\drivers\mbam.sys
2010-04-26 10:32 . 2009-01-04 13:58 63984 ----a-w- c:\documents and settings\Administrator\Local Settings\Application Data\GDIPFONTCACHEV1.DAT
2010-04-26 03:32 . 2009-10-08 02:28 720896 ----a-w- c:\windows\iun6002ev.exe
2010-04-19 13:38 . 2003-03-18 16:44 499712 ----a-w- c:\windows\system32\msvcp71.dll
2010-03-31 07:58 . 2010-03-31 07:58 -------- d-----w- c:\documents and settings\All Users\Application Data\QuickTime
2010-02-12 10:44 . 2009-01-04 14:27 11952 ----a-w- c:\windows\system32\avgrsstx.dll
2010-02-12 10:44 . 2009-01-04 14:26 335240 ----a-w- c:\windows\system32\drivers\avgldx86.sys
2010-02-12 10:44 . 2009-01-04 14:26 27784 ----a-w- c:\windows\system32\drivers\avgmfx86.sys
.

((((((((((((((((((((((((((((( SnapShot@2010-02-11_03.47.28 )))))))))))))))))))))))))))))))))))))))))
.
+ 2010-03-31 07:59 . 1999-11-10 06:35 86016 c:\windows\unvise32qt.exe
+ 2006-02-28 06:30 . 2010-03-01 18:14 49970 c:\windows\system32\perfc009.dat
+ 2010-03-01 18:13 . 2009-12-05 01:57 29776 c:\windows\system32\drivers\OAnet.sys
+ 2010-03-01 18:13 . 2009-12-05 01:58 24656 c:\windows\system32\drivers\OAmon.sys
+ 2010-04-26 19:59 . 2001-03-14 07:36 12288 c:\windows\system32\Adobe\SVG Viewer\SVGRSRC.DLL
+ 2010-03-23 14:17 . 2010-03-23 14:17 22528 c:\windows\Installer\a8fa1.msi
+ 2010-04-19 13:40 . 2010-04-19 13:40 20480 c:\windows\Installer\396bfd.msi
+ 2010-03-23 14:24 . 2010-03-23 14:24 25214 c:\windows\Installer\{656C0E21-331E-11DF-81CE-005056806466}\UNINST_Uninstall_G_F6A848FB884248E6A4CDCBDCF41F6A74_1.exe
+ 2010-04-19 18:31 . 2010-04-19 18:31 25214 c:\windows\Installer\{08C0729E-3E50-11DF-9D81-005056806466}\UNINST_Uninstall_G_F6A848FB884248E6A4CDCBDCF41F6A74_1.exe
+ 2010-04-19 13:41 . 2010-04-19 13:41 5632 c:\windows\system32\pndx5032.dll
+ 2010-04-19 13:41 . 2010-04-19 13:41 6656 c:\windows\system32\pndx5016.dll
+ 2010-04-19 13:41 . 2010-04-19 13:41 185920 c:\windows\system32\rmoc3260.dll
+ 2010-04-19 13:38 . 2010-04-19 13:38 278528 c:\windows\system32\pncrt.dll
+ 2006-02-28 06:30 . 2010-03-01 18:14 347698 c:\windows\system32\perfh009.dat
+ 2009-01-04 13:22 . 2010-04-26 02:52 240736 c:\windows\system32\FNTCACHE.DAT
+ 2010-03-01 18:13 . 2009-12-05 01:57 223312 c:\windows\system32\drivers\OADriver.sys
+ 2010-04-26 19:59 . 2001-03-14 07:44 491574 c:\windows\system32\Adobe\SVG Viewer\SVGControl.dll
+ 2010-04-26 19:59 . 2001-03-14 07:40 299059 c:\windows\system32\Adobe\SVG Viewer\NPSVGVw.dll
+ 2010-04-26 19:59 . 2001-01-20 15:43 147456 c:\windows\system32\Adobe\SVG Viewer\Bib.dll
+ 2010-04-26 19:59 . 2001-02-28 02:59 397312 c:\windows\system32\Adobe\SVG Viewer\AceLite.dll
+ 2009-10-08 02:30 . 1998-10-29 09:15 306688 c:\windows\IsUninst.exe
+ 2010-04-27 18:30 . 2010-04-27 18:30 829952 c:\windows\Downloaded Installations\DAEMON Tools 3.47\daemon.msi
+ 2010-04-26 19:59 . 2001-03-14 07:37 1597491 c:\windows\system32\Adobe\SVG Viewer\SVGView.dll
+ 2010-04-26 19:59 . 2001-03-14 03:36 1441792 c:\windows\system32\Adobe\SVG Viewer\CoolType.dll
+ 2010-04-26 19:59 . 2001-03-14 03:36 1138688 c:\windows\system32\Adobe\SVG Viewer\Agm.dll
+ 2010-04-27 05:20 . 2010-04-27 05:20 10541568 c:\windows\Installer\16138b.msi
.
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"SoundMan"="SOUNDMAN.EXE" [2004-05-14 67072]
"SiSPower"="SiSPower.dll" [2004-09-01 49152]
"NeroFilterCheck"="c:\program files\Common Files\Ahead\Lib\NeroCheck.exe" [2006-01-12 155648]
"AVG8_TRAY"="c:\progra~1\AVG\AVG8\avgtray.exe" [2010-02-12 2000152]
"@OnlineArmor GUI"="c:\program files\Tall Emu\Online Armor\oaui.exe" [2009-12-05 6622920]
"TkBellExe"="c:\program files\Common Files\Real\Update_OB\realsched.exe" [2010-04-19 202256]

[hkey_local_machine\software\microsoft\windows\currentversion\explorer\ShellExecuteHooks]
"{5AE067D3-9AFB-48E0-853A-EBB7F4A000DA}"= "c:\program files\SUPERAntiSpyware\SASSEH.DLL" [2008-05-13 77824]
"{4F07DA45-8170-4859-9B5F-037EF2970034}"= "c:\progra~1\TALLEM~1\ONLINE~1\oaevent.dll" [2009-12-05 923336]

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\!SASWinLogon]
2009-09-03 08:51 548352 ----a-w- c:\program files\SUPERAntiSpyware\SASWINLO.dll

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\avgrsstarter]
2010-02-12 10:44 11952 ----a-w- c:\windows\system32\avgrsstx.dll

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\TkBellExe]
realsched.exe -osboot [X]

[HKEY_LOCAL_MACHINE\software\microsoft\security center]
"AntiVirusOverride"=dword:00000001

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=
"c:\\Program Files\\AVG\\AVG8\\avgupd.exe"=
"c:\\Program Files\\AVG\\AVG8\\avgemc.exe"=

R1 AvgLdx86;AVG AVI Loader Driver x86;c:\windows\system32\drivers\avgldx86.sys [1/4/2009 7:56 PM 335240]
R1 AvgTdiX;AVG8 Network Redirector;c:\windows\system32\drivers\avgtdix.sys [1/4/2009 7:56 PM 108552]
R1 OADevice;OADriver;c:\windows\system32\drivers\OADriver.sys [3/1/2010 11:43 PM 223312]
R1 OAmon;OAmon;c:\windows\system32\drivers\OAmon.sys [3/1/2010 11:43 PM 24656]
R1 OAnet;OAnet;c:\windows\system32\drivers\OAnet.sys [3/1/2010 11:43 PM 29776]
R1 SASDIFSV;SASDIFSV;c:\program files\SUPERAntiSpyware\sasdifsv.sys [1/5/2010 7:56 AM 9968]
R1 SASKUTIL;SASKUTIL;c:\program files\SUPERAntiSpyware\SASKUTIL.SYS [1/5/2010 7:56 AM 74480]
R2 avg8emc;AVG8 E-mail Scanner;c:\progra~1\AVG\AVG8\avgemc.exe [1/4/2009 7:56 PM 908056]
R2 avg8wd;AVG8 WatchDog;c:\progra~1\AVG\AVG8\avgwdsvc.exe [1/4/2009 7:56 PM 297752]
R2 OAcat;Online Armor Helper Service;c:\program files\Tall Emu\Online Armor\oacat.exe [3/1/2010 11:43 PM 1282248]
S2 gupdate;Google Update Service (gupdate);"c:\program files\Google\Update\GoogleUpdate.exe" /svc --> c:\program files\Google\Update\GoogleUpdate.exe [?]
S2 SvcOnlineArmor;Online Armor;c:\program files\Tall Emu\Online Armor\oasrv.exe [3/1/2010 11:43 PM 3291336]
S3 SASENUM;SASENUM;c:\program files\SUPERAntiSpyware\SASENUM.SYS [1/5/2010 7:56 AM 7408]
.
Contents of the 'Scheduled Tasks' folder

2010-05-03 c:\windows\Tasks\RealUpgradeScheduledTaskS-1-5-21-73586283-2077806209-725345543-500.job
- c:\program files\Real\RealUpgrade\realupgrade.exe [2010-02-24 16:39]

2010-05-09 c:\windows\Tasks\RealUpgradeLogonTaskS-1-5-21-73586283-2077806209-725345543-500.job
- c:\program files\Real\RealUpgrade\realupgrade.exe [2010-02-24 16:39]
.
.
------- Supplementary Scan -------
.
uStart Page = about:blank
uSearchURL,(Default) = hxxp://www.google.com/search?q=%s
IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~2\OFFICE11\EXCEL.EXE/3000
IE: Save with Download Manager... - file://c:\program files\J River\Media Center 11\DMDownload.htm
FF - ProfilePath - c:\documents and settings\Administrator\Application Data\Mozilla\Firefox\Profiles\8hscxe3h.default\
FF - plugin: c:\documents and settings\All Users\Application Data\Real\RealPlayer\BrowserRecordPlugin\MozillaPlugins\nprphtml5videoshim.dll
FF - plugin: c:\program files\Opera\program\plugins\NPDocBox.dll
FF - plugin: c:\program files\Opera\program\plugins\nppdf32.dll
.

**************************************************************************

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2010-05-09 15:08
Windows 5.1.2600 Service Pack 2 FAT NTAPI

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully
hidden files: 0

**************************************************************************
.
--------------------- DLLs Loaded Under Running Processes ---------------------

- - - - - - - > 'winlogon.exe'(404)
c:\program files\SUPERAntiSpyware\SASWINLO.dll
.
Completion time: 2010-05-09 15:08:49
ComboFix-quarantined-files.txt 2010-05-09 09:38
ComboFix2.txt 2010-03-30 11:37
ComboFix3.txt 2010-02-19 08:18
ComboFix4.txt 2010-02-16 11:44
ComboFix5.txt 2010-05-09 09:29

Pre-Run: 10,157,195,264 bytes free
Post-Run: 10,132,996,096 bytes free

- - End Of File - - FA92C9B0A90CAEE290BCDD9F75E5F0FE



Thanks,
Jose


#7 jose_007

jose_007
  • Topic Starter

  • Members
  • 160 posts
  • OFFLINE
  •  
  • Local time:08:28 AM

Posted 09 May 2010 - 04:44 AM

Sir
One thing to add...

I noticed a folder "C:\WINDOWS\system32\z " created on april 21 2010 which creates suspicion in my mind because iu82.exe alerts started from april 19 2010
Should I delete the folder ???


Thaks
Jose

#8 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:01:28 PM

Posted 09 May 2010 - 11:00 AM

It won't hurt to add that to the mix.

1. Close any open browsers.

2. Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.

3. Open notepad and copy/paste the text in the quotebox below into it:

QUOTE
File::
c:\windows\system32\z

Folder::
c:\windows\system32\z


Save this as CFScript.txt, in the same location as ComboFix.exe




Refering to the picture above, drag CFScript into ComboFix.exe

When finished, it shall produce a log for you at C:\ComboFix.txt which I will require in your next reply.


Then please run the ESET online scan

I'd like us to scan your machine with ESET OnlineScan
  1. Hold down Control and click on the following link to open ESET OnlineScan in a new window.
    ESET OnlineScan
  2. Click the button.
  3. For alternate browsers only: (Microsoft Internet Explorer users can skip these steps)
    1. Click on to download the ESET Smart Installer. Save it to your desktop.
    2. Double click on the icon on your desktop.
  4. Check
  5. Click the button.
  6. Accept any security warnings from your browser.
  7. Leave the top box checked and then check
  8. Push the Start button.
  9. ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this can take some time.
  10. When the scan completes, push
  11. Push , and save the file to your desktop using a unique name, such as ESETScan. Include the contents of this report in your next reply.
  12. Push the button.
  13. Push
NOTE: If no malware is found then no log will be produced. Let me know if this is the case.
Posted Image
m0le is a proud member of UNITE

#9 jose_007

jose_007
  • Topic Starter

  • Members
  • 160 posts
  • OFFLINE
  •  
  • Local time:08:28 AM

Posted 09 May 2010 - 11:44 PM

Sir

Combofix log

ComboFix 10-05-08.02 - Administrator 05/10/2010 7:46.8.1 - FAT32x86
Microsoft Windows XP Professional 5.1.2600.2.1252.1.1033.18.191.92 [GMT 5.5:30]
Running from: c:\documents and settings\Administrator\Desktop\comfix.exe
Command switches used :: c:\documents and settings\Administrator\Desktop\CFScript.txt
AV: AVG Anti-Virus Free *On-access scanning disabled* (Outdated) {17DDD097-36FF-435F-9E1B-52D74245D6BF}
FW: Online Armor Firewall *disabled* {B797DAA0-7E2E-4711-8BB3-D12744F1922A}

FILE ::
"c:\windows\system32\z"
.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.

c:\windows\system32\z
c:\windows\system32\z\D.bat
c:\windows\system32\z\F001.exe

.
((((((((((((((((((((((((( Files Created from 2010-04-10 to 2010-05-10 )))))))))))))))))))))))))))))))
.

2010-05-03 06:26 . 2010-05-03 06:26 -------- d-----w- c:\program files\CDCheck
2010-05-03 02:54 . 2010-05-03 02:54 -------- d-----w- c:\program files\DatawareGames
2010-05-01 18:24 . 2010-05-01 18:25 1318912 ----a-w- c:\program files\Update_ATE_1.03.exe
2010-04-27 18:30 . 2010-04-27 18:30 -------- d-----w- c:\windows\Downloaded Installations
2010-04-27 05:18 . 2010-04-27 05:18 -------- d-----w- c:\program files\Activision
2010-04-27 05:03 . 2010-04-27 05:03 -------- d-----w- c:\program files\Cheatbook Database 2005
2010-04-26 19:59 . 2010-04-26 19:59 -------- d-----w- c:\windows\Profiles
2010-04-26 19:59 . 2010-04-26 19:59 -------- d-----w- c:\windows\system32\Adobe
2010-04-26 19:59 . 2010-04-26 19:59 -------- d-----w- c:\program files\Common Files\Adobe
2010-04-26 19:59 . 2010-04-26 19:59 -------- d-----w- c:\documents and settings\Administrator\Application Data\InterTrust
2010-04-19 18:44 . 2010-04-19 18:45 -------- d-----w- c:\program files\Emicsoft Studio
2010-04-19 18:21 . 2010-04-19 18:21 -------- d-----w- c:\program files\Common Files\DVDVideoSoft
2010-04-19 18:21 . 2010-04-19 18:21 -------- d-----w- c:\program files\DVDVideoSoft
2010-04-19 13:42 . 2010-04-19 13:42 45056 ----a-w- c:\documents and settings\All Users\Application Data\Real\RealPlayer\BrowserRecordPlugin\ThinShims\rpnpshimwmp.dll
2010-04-19 13:42 . 2010-04-19 13:42 49152 ----a-w- c:\documents and settings\All Users\Application Data\Real\RealPlayer\BrowserRecordPlugin\Firefox\Ext\Components\nprpffbrowserrecordext.dll
2010-04-19 13:42 . 2010-04-19 13:42 45056 ----a-w- c:\documents and settings\All Users\Application Data\Real\RealPlayer\BrowserRecordPlugin\ThinShims\rpnpshimswf.dll
2010-04-19 13:42 . 2010-04-19 13:42 45056 ----a-w- c:\documents and settings\All Users\Application Data\Real\RealPlayer\BrowserRecordPlugin\ThinShims\rpnpshimrp.dll
2010-04-19 13:42 . 2010-04-19 13:42 45056 ----a-w- c:\documents and settings\All Users\Application Data\Real\RealPlayer\BrowserRecordPlugin\ThinShims\rpnpshimqt.dll
2010-04-19 13:42 . 2010-04-19 13:42 308808 ----a-w- c:\documents and settings\All Users\Application Data\Real\RealPlayer\BrowserRecordPlugin\Common\rpmainbrowserrecordplugin.dll
2010-04-19 13:42 . 2010-04-19 13:42 14848 ----a-w- c:\documents and settings\All Users\Application Data\Real\RealPlayer\BrowserRecordPlugin\MozillaPlugins\nprphtml5videoshim.dll
2010-04-19 13:42 . 2010-04-19 13:42 40960 ----a-w- c:\documents and settings\All Users\Application Data\Real\RealPlayer\BrowserRecordPlugin\Chrome\Hook\rpchromebrowserrecordhelper.dll
2010-04-19 13:41 . 2010-04-19 13:41 341600 ----a-w- c:\documents and settings\All Users\Application Data\Real\RealPlayer\BrowserRecordPlugin\IE\rpbrowserrecordplugin.dll
2010-04-19 13:40 . 2010-04-19 13:40 -------- d-----w- c:\program files\Common Files\xing shared
2010-04-19 13:38 . 2010-04-19 13:38 -------- d-----w- c:\program files\Common Files\Real
2010-04-19 07:19 . 2010-04-19 07:19 -------- d-----w- C:\FOUND.076
2010-04-19 06:17 . 2010-04-19 06:17 -------- d-----w- C:\FOUND.075
2010-04-19 06:00 . 2010-04-19 06:00 -------- d-----w- c:\program files\NirSoft
2010-04-18 18:11 . 2010-04-18 18:11 -------- d-----w- C:\FOUND.074
2010-04-18 17:54 . 2010-04-18 17:54 -------- d-----w- C:\FOUND.073
2010-04-18 17:32 . 2010-04-18 17:32 -------- d-----w- C:\FOUND.072
2010-04-17 17:45 . 2010-04-17 17:45 -------- d-----w- C:\FOUND.071
2010-04-17 14:53 . 2010-04-17 14:53 4096 ----a-w- c:\windows\d3dx.dat
2010-04-17 14:42 . 2010-04-17 14:42 -------- d-----w- c:\program files\Marble Blast Demo
2010-04-17 13:52 . 2010-04-17 13:52 -------- d-----w- C:\FOUND.070
2010-04-17 13:42 . 2010-04-17 13:42 -------- d-----w- C:\FOUND.069
2010-04-17 13:31 . 2010-04-17 13:31 -------- d-----w- C:\FOUND.068

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2010-05-01 04:25 . 2010-04-17 15:32 6153352 ----a-w- c:\documents and settings\All Users\Application Data\Malwarebytes\Malwarebytes' Anti-Malware\mbam-setup.exe
2010-05-01 04:21 . 2010-02-01 17:12 117760 ----a-w- c:\documents and settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\SDDLLS\UIREPAIR.DLL
2010-04-29 10:09 . 2010-01-25 18:23 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2010-04-29 10:09 . 2010-01-25 18:23 20952 ----a-w- c:\windows\system32\drivers\mbam.sys
2010-04-26 10:32 . 2009-01-04 13:58 63984 ----a-w- c:\documents and settings\Administrator\Local Settings\Application Data\GDIPFONTCACHEV1.DAT
2010-04-26 03:32 . 2009-10-08 02:28 720896 ----a-w- c:\windows\iun6002ev.exe
2010-04-19 13:38 . 2003-03-18 16:44 499712 ----a-w- c:\windows\system32\msvcp71.dll
2010-03-31 07:58 . 2010-03-31 07:58 -------- d-----w- c:\documents and settings\All Users\Application Data\QuickTime
2010-02-12 10:44 . 2009-01-04 14:27 11952 ----a-w- c:\windows\system32\avgrsstx.dll
2010-02-12 10:44 . 2009-01-04 14:26 335240 ----a-w- c:\windows\system32\drivers\avgldx86.sys
2010-02-12 10:44 . 2009-01-04 14:26 27784 ----a-w- c:\windows\system32\drivers\avgmfx86.sys
.

((((((((((((((((((((((((((((( SnapShot@2010-02-11_03.47.28 )))))))))))))))))))))))))))))))))))))))))
.
+ 2010-03-31 07:59 . 1999-11-10 06:35 86016 c:\windows\unvise32qt.exe
+ 2006-02-28 06:30 . 2010-03-01 18:14 49970 c:\windows\system32\perfc009.dat
+ 2010-03-01 18:13 . 2009-12-05 01:57 29776 c:\windows\system32\drivers\OAnet.sys
+ 2010-03-01 18:13 . 2009-12-05 01:58 24656 c:\windows\system32\drivers\OAmon.sys
+ 2010-04-26 19:59 . 2001-03-14 07:36 12288 c:\windows\system32\Adobe\SVG Viewer\SVGRSRC.DLL
+ 2010-03-23 14:17 . 2010-03-23 14:17 22528 c:\windows\Installer\a8fa1.msi
+ 2010-04-19 13:40 . 2010-04-19 13:40 20480 c:\windows\Installer\396bfd.msi
+ 2010-03-23 14:24 . 2010-03-23 14:24 25214 c:\windows\Installer\{656C0E21-331E-11DF-81CE-005056806466}\UNINST_Uninstall_G_F6A848FB884248E6A4CDCBDCF41F6A74_1.exe
+ 2010-04-19 18:31 . 2010-04-19 18:31 25214 c:\windows\Installer\{08C0729E-3E50-11DF-9D81-005056806466}\UNINST_Uninstall_G_F6A848FB884248E6A4CDCBDCF41F6A74_1.exe
+ 2010-04-19 13:41 . 2010-04-19 13:41 5632 c:\windows\system32\pndx5032.dll
+ 2010-04-19 13:41 . 2010-04-19 13:41 6656 c:\windows\system32\pndx5016.dll
+ 2010-04-19 13:41 . 2010-04-19 13:41 185920 c:\windows\system32\rmoc3260.dll
+ 2010-04-19 13:38 . 2010-04-19 13:38 278528 c:\windows\system32\pncrt.dll
+ 2006-02-28 06:30 . 2010-03-01 18:14 347698 c:\windows\system32\perfh009.dat
+ 2009-01-04 13:22 . 2010-04-26 02:52 240736 c:\windows\system32\FNTCACHE.DAT
+ 2010-03-01 18:13 . 2009-12-05 01:57 223312 c:\windows\system32\drivers\OADriver.sys
+ 2010-04-26 19:59 . 2001-03-14 07:44 491574 c:\windows\system32\Adobe\SVG Viewer\SVGControl.dll
+ 2010-04-26 19:59 . 2001-03-14 07:40 299059 c:\windows\system32\Adobe\SVG Viewer\NPSVGVw.dll
+ 2010-04-26 19:59 . 2001-01-20 15:43 147456 c:\windows\system32\Adobe\SVG Viewer\Bib.dll
+ 2010-04-26 19:59 . 2001-02-28 02:59 397312 c:\windows\system32\Adobe\SVG Viewer\AceLite.dll
+ 2009-10-08 02:30 . 1998-10-29 09:15 306688 c:\windows\IsUninst.exe
+ 2010-04-27 18:30 . 2010-04-27 18:30 829952 c:\windows\Downloaded Installations\DAEMON Tools 3.47\daemon.msi
+ 2010-04-26 19:59 . 2001-03-14 07:37 1597491 c:\windows\system32\Adobe\SVG Viewer\SVGView.dll
+ 2010-04-26 19:59 . 2001-03-14 03:36 1441792 c:\windows\system32\Adobe\SVG Viewer\CoolType.dll
+ 2010-04-26 19:59 . 2001-03-14 03:36 1138688 c:\windows\system32\Adobe\SVG Viewer\Agm.dll
+ 2010-04-27 05:20 . 2010-04-27 05:20 10541568 c:\windows\Installer\16138b.msi
.
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"SoundMan"="SOUNDMAN.EXE" [2004-05-14 67072]
"SiSPower"="SiSPower.dll" [2004-09-01 49152]
"NeroFilterCheck"="c:\program files\Common Files\Ahead\Lib\NeroCheck.exe" [2006-01-12 155648]
"AVG8_TRAY"="c:\progra~1\AVG\AVG8\avgtray.exe" [2010-02-12 2000152]
"@OnlineArmor GUI"="c:\program files\Tall Emu\Online Armor\oaui.exe" [2009-12-05 6622920]
"TkBellExe"="c:\program files\Common Files\Real\Update_OB\realsched.exe" [2010-04-19 202256]

[hkey_local_machine\software\microsoft\windows\currentversion\explorer\ShellExecuteHooks]
"{5AE067D3-9AFB-48E0-853A-EBB7F4A000DA}"= "c:\program files\SUPERAntiSpyware\SASSEH.DLL" [2008-05-13 77824]
"{4F07DA45-8170-4859-9B5F-037EF2970034}"= "c:\progra~1\TALLEM~1\ONLINE~1\oaevent.dll" [2009-12-05 923336]

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\!SASWinLogon]
2009-09-03 08:51 548352 ----a-w- c:\program files\SUPERAntiSpyware\SASWINLO.dll

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\avgrsstarter]
2010-02-12 10:44 11952 ----a-w- c:\windows\system32\avgrsstx.dll

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\TkBellExe]
realsched.exe -osboot [X]

[HKEY_LOCAL_MACHINE\software\microsoft\security center]
"AntiVirusOverride"=dword:00000001

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=
"c:\\Program Files\\AVG\\AVG8\\avgupd.exe"=
"c:\\Program Files\\AVG\\AVG8\\avgemc.exe"=

R1 AvgLdx86;AVG AVI Loader Driver x86;c:\windows\system32\drivers\avgldx86.sys [1/4/2009 7:56 PM 335240]
R1 AvgTdiX;AVG8 Network Redirector;c:\windows\system32\drivers\avgtdix.sys [1/4/2009 7:56 PM 108552]
R1 OADevice;OADriver;c:\windows\system32\drivers\OADriver.sys [3/1/2010 11:43 PM 223312]
R1 OAmon;OAmon;c:\windows\system32\drivers\OAmon.sys [3/1/2010 11:43 PM 24656]
R1 OAnet;OAnet;c:\windows\system32\drivers\OAnet.sys [3/1/2010 11:43 PM 29776]
R1 SASDIFSV;SASDIFSV;c:\program files\SUPERAntiSpyware\sasdifsv.sys [1/5/2010 7:56 AM 9968]
R1 SASKUTIL;SASKUTIL;c:\program files\SUPERAntiSpyware\SASKUTIL.SYS [1/5/2010 7:56 AM 74480]
R2 avg8emc;AVG8 E-mail Scanner;c:\progra~1\AVG\AVG8\avgemc.exe [1/4/2009 7:56 PM 908056]
R2 avg8wd;AVG8 WatchDog;c:\progra~1\AVG\AVG8\avgwdsvc.exe [1/4/2009 7:56 PM 297752]
R2 OAcat;Online Armor Helper Service;c:\program files\Tall Emu\Online Armor\oacat.exe [3/1/2010 11:43 PM 1282248]
S2 gupdate;Google Update Service (gupdate);"c:\program files\Google\Update\GoogleUpdate.exe" /svc --> c:\program files\Google\Update\GoogleUpdate.exe [?]
S2 SvcOnlineArmor;Online Armor;c:\program files\Tall Emu\Online Armor\oasrv.exe [3/1/2010 11:43 PM 3291336]
S3 SASENUM;SASENUM;c:\program files\SUPERAntiSpyware\SASENUM.SYS [1/5/2010 7:56 AM 7408]
.
Contents of the 'Scheduled Tasks' folder

2010-05-03 c:\windows\Tasks\RealUpgradeScheduledTaskS-1-5-21-73586283-2077806209-725345543-500.job
- c:\program files\Real\RealUpgrade\realupgrade.exe [2010-02-24 16:39]

2010-05-10 c:\windows\Tasks\RealUpgradeLogonTaskS-1-5-21-73586283-2077806209-725345543-500.job
- c:\program files\Real\RealUpgrade\realupgrade.exe [2010-02-24 16:39]
.
.
------- Supplementary Scan -------
.
uStart Page = about:blank
uSearchURL,(Default) = hxxp://www.google.com/search?q=%s
IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~2\OFFICE11\EXCEL.EXE/3000
IE: Save with Download Manager... - file://c:\program files\J River\Media Center 11\DMDownload.htm
FF - ProfilePath - c:\documents and settings\Administrator\Application Data\Mozilla\Firefox\Profiles\8hscxe3h.default\
FF - plugin: c:\documents and settings\All Users\Application Data\Real\RealPlayer\BrowserRecordPlugin\MozillaPlugins\nprphtml5videoshim.dll
FF - plugin: c:\program files\Opera\program\plugins\NPDocBox.dll
FF - plugin: c:\program files\Opera\program\plugins\nppdf32.dll
.

**************************************************************************

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2010-05-10 07:52
Windows 5.1.2600 Service Pack 2 FAT NTAPI

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully
hidden files: 0

**************************************************************************
.
--------------------- DLLs Loaded Under Running Processes ---------------------

- - - - - - - > 'winlogon.exe'(412)
c:\program files\SUPERAntiSpyware\SASWINLO.dll
.
Completion time: 2010-05-10 07:52:45
ComboFix-quarantined-files.txt 2010-05-10 02:22
ComboFix2.txt 2010-05-09 09:38
ComboFix3.txt 2010-03-30 11:37
ComboFix4.txt 2010-02-19 08:18
ComboFix5.txt 2010-05-10 02:13

Pre-Run: 10,124,722,176 bytes free
Post-Run: 10,094,493,696 bytes free

- - End Of File - - 81F571EA94A59AB6B47B0D479BF50031



ESET log
C:\System Volume Information\_restore{F0341502-C5E3-45FC-A9F0-362DA8579095}\RP48\A0243732.exe probably a variant of Win32/KillFiles trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{F0341502-C5E3-45FC-A9F0-362DA8579095}\RP53\A0245968.exe probably a variant of Win32/KillFiles trojan cleaned by deleting - quarantined


Thanks
Jose


#10 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:01:28 PM

Posted 10 May 2010 - 09:40 AM

Those two logs look fine.

You're clean. Good stuff! thumbup2.gif

Let's do some clearing up

Uninstall ComboFix

Remove Combofix now that we're done with it.
  • Please press the Windows Key and R on your keyboard. This will bring up the Run... command.
    (For Vista/Windows 7 please click Start -> All Programs -> Accessories -> Run)
  • Now type in Combofix /Uninstall in the runbox and click OK. (Notice the space between "Combofix" and "/")
  • Please follow the prompts to uninstall Combofix.
  • You will then receive a message saying Combofix was uninstalled successfully once it's done uninstalling itself.
This will uninstall Combofix and anything associated with it.


Download and Run OTC

We will now remove the tools we used during this fix using OTC.
  • Download OTC by OldTimer and save it to your desktop.
  • Double click icon to start the program. If you are using Vista, please right-click and choose run as administrator
  • Then Click the big button.
  • You will get a prompt saying "Being Cleanup Process". Please select Yes.
  • Restart your computer when prompted.
------------------------------------------------------------------------------------------------------------------------

Here's some advice on how you can keep your PC clean


Update your AntiVirus Software

It is imperative that you update your Antivirus software at least once a week (Even more if you wish). If you do not update your antivirus software then it will not be able to catch any of the new variants that may come out. If you use a commercial antivirus program you must make sure you keep renewing your subscription. Otherwise, once your subscription runs out, you may not be able to update the programs virus definitions.


Make sure your applications have all of their updates

It is also possible for other programs on your computer to have security vulnerability that can allow malware to infect you. Therefore, it is also a good idea to check for the latest versions of commonly installed applications that are regularly patched to fix vulnerabilities. You can check these by visiting Secunia Software Inspector and Calendar of Updates.


Install an AntiSpyware Program

A highly recommended AntiSpyware program is SuperAntiSpyware. You can download the free Home Version. or the Pro version for a 15 day trial period.

Installing this or another recommended program will provide spyware & hijacker protection on your computer alongside your virus protection. You should scan your computer with an AntiSpyware program on a regular basis just as you would an antivirus software.


Finally, here's a treasure trove of antivirus, antimalware and antispyware resources


That's it jose, happy surfing!

Cheers.

m0le
Posted Image
m0le is a proud member of UNITE

#11 jose_007

jose_007
  • Topic Starter

  • Members
  • 160 posts
  • OFFLINE
  •  
  • Local time:08:28 AM

Posted 10 May 2010 - 12:21 PM

Sir

Good to know PC is clean now...but the desktop icons still take a loong time to appear .
Whats the reason for that ?

Thanks
Jose

#12 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:01:28 PM

Posted 10 May 2010 - 01:30 PM

The boot may be slow for a number of reasons.

I recommend that you read this tutorial on the site which explains what you can do to speed up your PC.
Posted Image
m0le is a proud member of UNITE

#13 jose_007

jose_007
  • Topic Starter

  • Members
  • 160 posts
  • OFFLINE
  •  
  • Local time:08:28 AM

Posted 12 May 2010 - 09:37 PM

Sir,
Thanks for helping me with my PC and claering my doubts

Jose

#14 jose_007

jose_007
  • Topic Starter

  • Members
  • 160 posts
  • OFFLINE
  •  
  • Local time:08:28 AM

Posted 13 May 2010 - 02:07 PM

Sir,
Before you close this thread,I had a doubt.

I just noticed some suspicious files in C:\windows\system32 \
(attaching screenshot)

Please name the files to be deleted.

Thanks
Jose


#15 jose_007

jose_007
  • Topic Starter

  • Members
  • 160 posts
  • OFFLINE
  •  
  • Local time:08:28 AM

Posted 13 May 2010 - 02:09 PM

Sir,
I am concered about the files with initials asr_..... because combofix ealier deleted one file with similar name.

Also I am recieving regular alerts from my firewall about yt57


So please take care of them in your reply.

Thanks
Jose




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users