Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Trojan and/or Malware that is invisible to scanners


  • This topic is locked This topic is locked
13 replies to this topic

#1 nawkturn

nawkturn

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:06:53 PM

Posted 08 May 2010 - 09:28 PM

Hello,

Before I go ahead and start this topic, I would like to let the resolver know that I am more or less an advanced use of the computers, so chime in any of the technical instructions without basic explanations.

Few weeks ago, I was infected by Avsoft malware.

After running mbam and removing the rogues, I thought I was off the hook. But I was not right. Not so soon i guess.

Since that day, till the moment I type this post, I am still suffering from an unknown trojan / malware that is not noticeable but is still bugging me.

Here are the symptoms I see:

> My google search links gets redirected to ad pages. (Only for chrome)

> My chrome browser wouldn't load pages, unless I start it with --no-sandbox arguments, which I know is not advisable as it leaves it open for attacks

I ran the following programs with up-to-date definitions/databases (or what ever they call it) but found nothing:

1. MBAM
2. Super Anti-SpyWare
3. Spybot

All of them say that I have NO issues what ever.

Last week, my Symatec firewall has popped up couple of times, asking me to block two .exe's from my %windir%/System32 directory. I was convinced since then, that I have a bigger infection than I know of. Here were that files that it notified and I deleted:

%windir%/System32/firewall.exe (confirmed trojan)
%windir%/System32/Isass.exe (yes I know you might be tempted to think that it is lsass.exe, but NO. It is Issas.exe and a trojan)


What I see often is that my laptop's wireless LED seems to be blinking at times and the "Connections" in the "Log Viewer..." of the Symantec Firewall shows that my laptop is connecting to some ad websites.


I followed the guidelines to post a malware issues post and hence the logs below:

DDS.txt / Attach.txt / rootkitscan.txt

Let me know if you need any info.

Thanks a lot for your help!

Attached Files


Edited by nawkturn, 08 May 2010 - 09:29 PM.


BC AdBot (Login to Remove)

 


#2 nawkturn

nawkturn
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:06:53 PM

Posted 09 May 2010 - 08:16 PM

Update:

I scanned with AVG and it looks like I am infected by a trojan named Agent_r.QS :

AVG 9.0 Anti-Virus command line scanner
Copyright © 1992 - 2009 AVG Technologies
Program version 9.0.782, engine 9.0.814
Virus Database: Version 271.1.1/2863 2010-05-09

C:\WINDOWS\system32\svchost.exe (1656):\memory_001a0000 Trojan horse Agent_r.QS
C:\WINDOWS\system32\svchost.exe (1656) Trojan horse Agent_r.QS
C:\WINDOWS\Explorer.EXE (1600):\memory_001a0000 Trojan horse Agent_r.QS
C:\WINDOWS\Explorer.EXE (1600) Trojan horse Agent_r.QS

#3 Blade

Blade

    Strong in the Bleepforce


  • Site Admin
  • 12,792 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:US
  • Local time:06:53 PM

Posted 10 May 2010 - 12:22 AM

Hello, and welcome.gif to the Malware Removal forum! My online alias is Blade Zephon, or Blade for short, and I will be assisting you with your malware issues!

If you have since resolved the original problem you were having, we would appreciate you letting us know.

In the upper right hand corner of the topic you will see a button called Options. If you click on this in the drop-down menu you can choose Track this topic. By doing this and then choosing Immediate E-Mail notification and then clicking on Proceed you will be advised when we respond to your topic and facilitate the cleaning of your machine.

Before we begin cleaning your machine, I'd like to lay out some guidelines for us to follow while we are working together.
  • I will be assisting you with your malware issues. This may or may not resolve other problems you are having with your computer. If you are still having problems after your machine has been determined clean, I will be glad to direct you to the proper forum for assistance.
  • Even if things appear better, that does not mean we are finished. Please continue to follow my instructions until I give you the all clean. Absence of symptoms does not mean that all the malware has been removed. If a piece of the infection is left, it can regenerate and reinfect your machine.
  • Attention to detail is important! Since I cannot see or directly interact with your computer I am dependent on you to "be my eyes" and provide as much information as you can regarding the current state of your computer.
  • I ask that you please refrain from running tools other than those I suggest to you while I am cleaning up your computer. The reason for this is so I know what is going on with the machine at any time. If you act independently it will cause changes to your system that I will not be aware of, which will make the process of cleaning the machine a much slower and more difficult process. Additionally, some programs can interfere with others and hamper the recovery process.
  • Please perform all steps in the order received. If you are unsure or confused about any instructions I give you, you should ask me to clarify before doing anything. Additionally, if you run into any problems while carrying out instructions, you should STOP and reply back here explaining what happened.
  • After 5 days if a topic is not replied to we assume it has been abandoned and it is closed. If you need additional time, that is perfectly alright; you just need to let us know beforehand. smile.gif

***************************************************

Please perform the following steps below so we can have a look at the current condition of your machine.

Download Combofix from any of the links below but rename it to renamed.exe before saving it to your desktop.


Link 1
Link 2

* IMPORTANT !!! Save ComboFix.exe to your Desktop
  • VERY IMPORTANT: Disable all running antivirus, antimalware and firewall programs as they may interfere with the proper running of ComboFix. Click on this link to see a list of programs that should be disabled. NOTE: This list is not all-inclusive. If yours is not listed and you do not know how to disable it, please ask.
  • Double click on renamed.exe & follow the prompts.
  • As part of it's process, ComboFix will check to see if the Microsoft Windows Recovery Console is installed. With malware infections being as they are today, it's strongly recommended to have this pre-installed on your machine before doing any malware removal. It will allow you to boot up into a special recovery/repair mode that will allow us to more easily help you should your computer have a problem after an attempted removal of malware.
  • Follow the prompts to allow ComboFix to download and install the Microsoft Windows Recovery Console, and when prompted, agree to the End-User License Agreement to install the Microsoft Windows Recovery Console.
**Please note: If the Microsoft Windows Recovery Console is already installed, ComboFix will continue it's malware removal procedures.



Once the Microsoft Windows Recovery Console is installed using ComboFix, you should see the following message:



Click on Yes, to continue scanning for malware.

When finished, it will produce a log for you. Please include the C:\ComboFix.txt in your next reply

A word of warning: Neither I nor sUBs are responsible for any damage you may have caused your machine by running ComboFix on your own.
This tool is not a toy and not for everyday use.
ComboFix SHOULD NOT be used unless requested by a forum helper


~Blade


In your next reply, please include the following:
ComboFix Log

animinionsmalltext.gif
If I am helping you, it has been 48 hours since your last post, and I have yet to reply to your topic, please send me a PM
Become a BleepingComputer fan: Facebook
Follow us on Twitter!


#4 nawkturn

nawkturn
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:06:53 PM

Posted 10 May 2010 - 02:43 AM

Hey BZ!

I think combofix has taken care of the rootkit rogue which was hiding all the time till now. I could see some error with "catch me.." something when combofix first attempted rebooting the machine. I started celebrations then and it performed around 50 scans the next boot and seems like all is good now! I am attaching the log it spit however. Let me know if you think all is good.

Observation:
> Chrome runs without any runtime arguments!!

Thanks a lot man!

ComboFix 10-05-09.04 - nawkturn 05/09/2010 22:53:29.1.2 - x86
Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.3066.2330 [GMT -7:00]
Running from: c:\documents and settings\Administrator\Desktop\renamed.exe
AV: Symantec AntiVirus Corporate Edition *On-access scanning disabled* (Updated) {FB06448E-52B8-493A-90F3-E43226D3305C}
FW: Symantec Client Firewall *enabled* {5CB76A43-5FAD-476B-B9FF-26FA61F13187}
.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.

c:\documents and settings\All Users\Start Menu\Internet Explorer.lnk
C:\Install.exe
c:\windows\system32\Cache
c:\windows\system32\images
c:\windows\system32\images\toolbar\calendar.gif
c:\windows\system32\images\toolbar\crlogo.gif
c:\windows\system32\images\toolbar\export.gif
c:\windows\system32\images\toolbar\export_over.gif
c:\windows\system32\images\toolbar\exportd.gif
c:\windows\system32\images\toolbar\First.gif
c:\windows\system32\images\toolbar\first_over.gif
c:\windows\system32\images\toolbar\Firstd.gif
c:\windows\system32\images\toolbar\gotopage.gif
c:\windows\system32\images\toolbar\gotopage_over.gif
c:\windows\system32\images\toolbar\gotopaged.gif
c:\windows\system32\images\toolbar\grouptree.gif
c:\windows\system32\images\toolbar\grouptree_over.gif
c:\windows\system32\images\toolbar\grouptreed.gif
c:\windows\system32\images\toolbar\grouptreepressed.gif
c:\windows\system32\images\toolbar\Last.gif
c:\windows\system32\images\toolbar\last_over.gif
c:\windows\system32\images\toolbar\Lastd.gif
c:\windows\system32\images\toolbar\Next.gif
c:\windows\system32\images\toolbar\next_over.gif
c:\windows\system32\images\toolbar\Nextd.gif
c:\windows\system32\images\toolbar\Prev.gif
c:\windows\system32\images\toolbar\prev_over.gif
c:\windows\system32\images\toolbar\Prevd.gif
c:\windows\system32\images\toolbar\print.gif
c:\windows\system32\images\toolbar\print_over.gif
c:\windows\system32\images\toolbar\printd.gif
c:\windows\system32\images\toolbar\Refresh.gif
c:\windows\system32\images\toolbar\refresh_over.gif
c:\windows\system32\images\toolbar\refreshd.gif
c:\windows\system32\images\toolbar\Search.gif
c:\windows\system32\images\toolbar\search_over.gif
c:\windows\system32\images\toolbar\searchd.gif
c:\windows\system32\images\toolbar\up.gif
c:\windows\system32\images\toolbar\up_over.gif
c:\windows\system32\images\toolbar\upd.gif
c:\windows\system32\images\tree\begindots.gif
c:\windows\system32\images\tree\beginminus.gif
c:\windows\system32\images\tree\beginplus.gif
c:\windows\system32\images\tree\blank.gif
c:\windows\system32\images\tree\blankdots.gif
c:\windows\system32\images\tree\dots.gif
c:\windows\system32\images\tree\lastdots.gif
c:\windows\system32\images\tree\lastminus.gif
c:\windows\system32\images\tree\lastplus.gif
c:\windows\system32\images\tree\Magnify.gif
c:\windows\system32\images\tree\minus.gif
c:\windows\system32\images\tree\minusbox.gif
c:\windows\system32\images\tree\plus.gif
c:\windows\system32\images\tree\plusbox.gif
c:\windows\system32\images\tree\singleminus.gif
c:\windows\system32\images\tree\singleplus.gif
c:\windows\system32\tmp.reg
c:\windows\system32\VB6KO.DLL
c:\windows\YAHELITE.INI

Infected copy of c:\windows\system32\drivers\iaStor.sys was found and disinfected
Restored copy from - Kitty had a snack tongue.gif
.
((((((((((((((((((((((((((((((((((((((( Drivers/Services )))))))))))))))))))))))))))))))))))))))))))))))))
.

-------\Legacy_NPF


((((((((((((((((((((((((( Files Created from 2010-04-10 to 2010-05-10 )))))))))))))))))))))))))))))))
.

2010-05-08 19:31 . 2010-05-10 04:57 -------- d-----w- c:\windows\system32\wbem\Logs
2010-05-08 19:12 . 2010-05-08 19:12 -------- d-----w- C:\IP Scanner
2010-05-07 00:23 . 2010-05-07 00:23 -------- d-----w- c:\program files\Microsoft Visual Studio .NET
2010-05-07 00:22 . 2010-05-07 00:23 -------- d-----w- C:\oraclexe
2010-05-06 21:38 . 2010-02-24 13:11 455680 -c----w- c:\windows\system32\dllcache\mrxsmb.sys
2010-05-06 21:37 . 2010-01-13 14:01 86016 -c----w- c:\windows\system32\dllcache\cabview.dll
2010-05-06 21:37 . 2009-12-24 06:59 177664 -c----w- c:\windows\system32\dllcache\wintrust.dll
2010-05-06 04:01 . 2010-05-06 04:01 -------- d-----w- c:\documents and settings\db2admin\Application Data\Apple Computer
2010-05-06 04:01 . 2010-05-06 04:01 -------- d-----w- c:\documents and settings\db2admin\Local Settings\Application Data\Apple Computer
2010-05-05 02:27 . 2010-05-05 02:27 -------- d-----w- c:\program files\Trend Micro
2010-05-04 06:12 . 2010-05-04 06:12 -------- d-----w- c:\program files\iPod
2010-05-04 06:12 . 2010-05-04 06:12 -------- d-----w- c:\program files\iTunes
2010-05-04 06:11 . 2010-05-04 06:11 -------- d-----w- c:\program files\QuickTime
2010-05-03 06:44 . 2010-05-03 06:44 -------- d-----w- C:\40ef91df2a86f5e25c
2010-05-03 03:58 . 2010-05-03 04:13 -------- d-----w- c:\documents and settings\Administrator\Application Data\Apple Computer
2010-05-03 03:55 . 2010-05-03 03:55 -------- d-----w- c:\program files\Apple Software Update
2010-05-03 03:55 . 2010-04-16 15:33 41472 ----a-w- c:\windows\system32\drivers\usbaapl.sys
2010-05-03 03:55 . 2010-04-16 15:33 3003680 ----a-w- c:\windows\system32\usbaaplrc.dll
2010-05-03 03:55 . 2010-05-04 06:10 -------- d-----w- c:\program files\Bonjour
2010-05-02 16:41 . 2010-05-08 23:08 -------- d-----w- c:\documents and settings\Administrator\Application Data\skypePM
2010-05-02 16:41 . 2010-05-02 16:41 56 ---ha-w- c:\windows\system32\ezsidmv.dat
2010-05-02 16:37 . 2010-05-09 20:57 -------- d-----w- c:\documents and settings\Administrator\Application Data\Skype
2010-05-02 16:36 . 2010-05-02 16:36 -------- d-----w- c:\program files\Common Files\Skype
2010-05-02 16:36 . 2010-05-02 16:37 -------- d-----r- c:\program files\Skype
2010-05-02 16:36 . 2010-05-02 16:36 -------- d-----w- c:\documents and settings\All Users\Application Data\Skype
2010-04-29 23:11 . 2010-04-29 23:11 -------- d-----w- c:\documents and settings\Administrator\Application Data\WDPlugin
2010-04-27 19:40 . 2010-02-26 05:43 251904 -c----w- c:\windows\system32\dllcache\iepeers.dll
2010-04-27 19:40 . 2010-03-10 04:33 1025024 -c----w- c:\windows\system32\dllcache\browseui.dll
2010-04-27 19:40 . 2009-08-14 13:21 1850624 -c----w- c:\windows\system32\dllcache\win32k.sys
2010-04-27 19:39 . 2009-06-12 12:31 80896 -c----w- c:\windows\system32\dllcache\tlntsess.exe
2010-04-27 19:39 . 2009-06-12 12:31 76288 -c----w- c:\windows\system32\dllcache\telnet.exe
2010-04-27 06:25 . 2010-05-09 18:59 -------- d---a-w- c:\documents and settings\All Users\Application Data\TEMP
2010-04-27 06:16 . 2010-04-27 06:16 -------- d-----w- c:\program files\Alwil Software
2010-04-27 06:16 . 2010-04-27 06:16 -------- d-----w- c:\documents and settings\All Users\Application Data\Alwil Software
2010-04-24 09:14 . 2010-04-24 09:14 -------- d-----w- c:\documents and settings\db2admin\Local Settings\Application Data\avG
2010-04-24 09:14 . 2010-04-24 09:14 -------- d-----w- c:\documents and settings\All Users\Application Data\avG
2010-04-24 06:28 . 2010-04-24 06:28 -------- d-----w- c:\documents and settings\All Users\Application Data\SUPERAntiSpyware.com
2010-04-24 06:27 . 2010-04-24 06:27 -------- d-----w- c:\documents and settings\db2admin\Application Data\SUPERAntiSpyware.com
2010-04-24 06:22 . 2010-04-24 06:23 -------- d-----w- c:\documents and settings\db2admin\SmitfraudFix
2010-04-24 03:43 . 2010-04-24 03:43 -------- d-----w- c:\documents and settings\db2admin\Application Data\Malwarebytes
2010-04-23 19:46 . 2010-04-23 19:46 -------- d-----w- c:\documents and settings\NetworkService\Local Settings\Application Data\javasharedresources
2010-04-23 01:04 . 2010-04-23 01:07 -------- d-----w- c:\documents and settings\Administrator\723540.tmp
2010-04-21 21:50 . 2010-04-21 21:50 -------- d-----w- c:\documents and settings\All Users\Application Data\AGNS
2010-04-21 18:30 . 2010-05-06 21:38 -------- d-----w- C:\swd
2010-04-20 18:44 . 2009-12-08 09:23 474112 -c----w- c:\windows\system32\dllcache\shlwapi.dll
2010-04-20 18:44 . 2009-10-15 16:28 81920 -c----w- c:\windows\system32\dllcache\fontsub.dll
2010-04-20 18:44 . 2009-10-15 16:28 119808 -c----w- c:\windows\system32\dllcache\t2embed.dll
2010-04-20 18:43 . 2010-02-26 05:43 667136 -c----w- c:\windows\system32\dllcache\wininet.dll
2010-04-20 18:43 . 2010-02-26 05:43 627712 -c----w- c:\windows\system32\dllcache\urlmon.dll
2010-04-20 18:43 . 2010-03-10 04:33 1509888 -c----w- c:\windows\system32\dllcache\shdocvw.dll
2010-04-20 18:43 . 2010-02-26 05:43 3073024 -c----w- c:\windows\system32\dllcache\mshtml.dll
2010-04-20 04:49 . 2009-08-07 02:23 274288 ----a-w- c:\windows\system32\mucltui.dll
2010-04-20 04:37 . 2009-10-23 15:28 3558912 -c----w- c:\windows\system32\dllcache\moviemk.exe
2010-04-19 23:22 . 2008-09-10 01:14 1307648 -c----w- c:\windows\system32\dllcache\msxml6.dll
2010-04-19 23:22 . 2008-04-14 05:57 79872 -c----w- c:\windows\system32\dllcache\msxml6r.dll
2010-04-19 23:22 . 2007-06-26 18:30 22060 -c----w- c:\windows\system32\dllcache\npds.zip
2010-04-19 23:22 . 2007-06-26 18:26 403 -c----w- c:\windows\system32\dllcache\npdrmv2.zip
2010-04-19 23:22 . 2008-04-14 12:40 102912 -c----w- c:\windows\system32\dllcache\dpcdll.dll
2010-04-19 23:19 . 2008-04-14 12:42 294912 -c----w- c:\windows\system32\dllcache\dlimport.exe
2010-04-19 02:49 . 2010-04-21 21:51 -------- d-----w- c:\documents and settings\db2admin\Local Settings\Application Data\AGNS
2010-04-19 02:12 . 2010-04-21 21:51 -------- d-----w- c:\documents and settings\Administrator\Local Settings\Application Data\AGNS
2010-04-18 07:05 . 2010-05-01 14:42 -------- d-----w- c:\documents and settings\db2admin\Local Settings\Application Data\Temp
2010-04-18 07:05 . 2010-04-18 07:06 -------- d-----w- c:\documents and settings\db2admin\Local Settings\Application Data\Google
2010-04-17 22:55 . 2010-04-17 22:55 -------- d-----w- c:\documents and settings\db2admin\Application Data\Subversion
2010-04-17 22:19 . 2010-05-06 04:08 -------- d-----w- c:\documents and settings\db2admin\Local Settings\Application Data\TSVNCache
2010-04-17 15:28 . 2010-04-17 15:29 -------- d-----w- c:\documents and settings\Administrator\Application Data\GetRightToGo
2010-04-13 14:33 . 2010-04-22 19:58 -------- d-----w- c:\documents and settings\NetworkService\Local Settings\Application Data\Apple Computer
2010-04-13 14:33 . 2010-04-13 14:33 -------- d-----w- c:\documents and settings\NetworkService\Application Data\Apple Computer
2010-04-12 23:48 . 1998-06-10 23:34 65536 ----a-w- c:\windows\system32\rexxapi.dll
2010-04-12 23:48 . 1998-06-10 23:25 23040 ----a-w- c:\windows\system32\rxapi.exe
2010-04-12 23:48 . 1998-06-10 23:34 640512 ----a-w- c:\windows\system32\rexx.dll
2010-04-11 07:50 . 2010-04-15 05:31 -------- d-----w- c:\documents and settings\NetworkService\Local Settings\Application Data\Adobe
2010-04-10 12:05 . 2010-04-10 12:05 -------- d-s---w- c:\documents and settings\NetworkService\UserData

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2010-05-10 06:11 . 2005-04-05 17:21 -------- d-----w- c:\program files\C4ebreg
2010-05-10 06:09 . 2007-03-05 22:09 40 ----a-w- c:\windows\system32\profile.dat
2010-05-10 05:45 . 2009-03-17 18:44 -------- d-----w- c:\documents and settings\Administrator\Application Data\.purple
2010-05-10 01:13 . 2010-05-10 01:11 161296 ----a-w- c:\windows\system32\drivers\tmcomm.sys
2010-05-09 19:13 . 2006-01-24 00:45 -------- d-----w- c:\program files\Common Files\Symantec Shared
2010-05-09 19:10 . 2010-05-09 19:10 -------- d-----w- c:\program files\AVG
2010-05-08 21:41 . 2010-05-08 21:41 -------- d-----w- c:\documents and settings\Administrator\Application Data\Simply Super Software
2010-05-07 22:48 . 2006-03-27 21:50 -------- d-----w- c:\program files\WST
2010-05-07 00:26 . 2005-04-05 19:45 -------- d--h--w- c:\program files\InstallShield Installation Information
2010-05-07 00:23 . 2009-02-10 17:09 -------- d-----w- c:\documents and settings\All Users\Application Data\Microsoft Help
2010-05-05 03:40 . 2009-10-13 04:53 2352 ----a-w- c:\documents and settings\LocalService\Local Settings\Application Data\FontCache3.0.0.0.dat
2010-05-03 06:51 . 2005-04-04 18:17 94232 ----a-w- c:\documents and settings\Administrator\Local Settings\Application Data\GDIPFONTCACHEV1.DAT
2010-05-03 03:56 . 2010-04-08 20:10 -------- d-----w- c:\program files\Common Files\Apple
2010-05-02 02:54 . 2009-12-09 05:49 1324 ----a-w- c:\windows\system32\d3d9caps.dat
2010-04-29 22:39 . 2010-04-09 03:37 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2010-04-29 22:39 . 2010-04-09 03:37 20952 ----a-w- c:\windows\system32\drivers\mbam.sys
2010-04-26 02:46 . 2010-04-08 20:12 -------- d-----w- c:\documents and settings\All Users\Application Data\Apple Computer
2010-04-21 21:50 . 2007-09-05 21:03 -------- d-----w- c:\program files\AT&T Network Client Install
2010-04-14 01:54 . 2009-06-05 17:16 -------- d-----w- c:\documents and settings\Administrator\Application Data\FileZilla
2010-04-13 07:03 . 2009-07-07 14:13 -------- d-----w- c:\documents and settings\Administrator\Application Data\TeamViewer
2010-04-11 07:50 . 2007-02-20 21:23 1100 ----a-w- c:\windows\system32\d3d8caps.dat
2010-04-10 03:19 . 2010-04-10 03:19 -------- d-----w- c:\documents and settings\All Users\Application Data\{8CD7F5AF-ECFA-4793-BF40-D8F42DBFF906}
2010-04-09 03:37 . 2010-04-09 03:37 -------- d-----w- c:\documents and settings\Administrator\Application Data\Malwarebytes
2010-04-09 03:37 . 2010-04-09 03:37 -------- d-----w- c:\documents and settings\All Users\Application Data\Malwarebytes
2010-04-08 23:34 . 2009-06-25 03:22 75832 ---ha-w- c:\windows\system32\mlfcache.dat
2010-04-08 20:20 . 2010-04-08 20:20 91424 ----a-w- c:\windows\system32\dnssd.dll
2010-04-08 20:20 . 2010-04-08 20:20 107808 ----a-w- c:\windows\system32\dns-sd.exe
2010-04-08 20:14 . 2010-04-08 20:13 -------- d-----w- c:\documents and settings\All Users\Application Data\{429CAD59-35B1-4DBC-BB6D-1DB246563521}
2010-04-08 20:11 . 2010-04-08 20:10 -------- d-----w- c:\documents and settings\All Users\Application Data\Apple
2010-03-27 04:52 . 2010-03-26 05:26 444952 ----a-w- c:\windows\system32\wrap_oal.dll
2010-03-27 04:52 . 2010-03-26 05:26 109080 ----a-w- c:\windows\system32\OpenAL32.dll
2010-03-26 05:26 . 2010-03-26 05:26 -------- d-----w- c:\program files\OpenAL
2010-02-26 05:43 . 2004-08-04 05:00 667136 ----a-w- c:\windows\system32\wininet.dll
2010-02-26 05:43 . 2004-08-04 05:00 81920 ----a-w- c:\windows\system32\ieencode.dll
2010-02-25 18:11 . 2005-07-29 18:05 64792 ----a-w- c:\windows\isamunin.exe
2010-02-24 13:11 . 2004-08-04 05:00 455680 ----a-w- c:\windows\system32\drivers\mrxsmb.sys
2010-02-17 18:08 . 2009-10-08 22:32 6400 ----a-w- c:\windows\system32\drivers\isamfilter.sys
2009-06-22 15:07 . 2009-06-22 15:07 27976 ----a-w- c:\program files\mozilla firefox\plugins\atgpcdec.dll
2009-06-22 15:07 . 2009-06-22 15:07 126360 ----a-w- c:\program files\mozilla firefox\plugins\atgpcext.dll
2009-07-02 14:31 . 2009-06-22 15:07 98712 ----a-w- c:\program files\mozilla firefox\plugins\ieatgpc.dll
2009-08-06 23:21 . 2009-08-06 23:21 8 --sh--r- c:\windows\system32\4F3E1CF907.dll
.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shelliconoverlayidentifiers\1TortoiseNormal]
@="{C5994560-53D9-4125-87C9-F193FC689CB2}"
[HKEY_CLASSES_ROOT\CLSID\{C5994560-53D9-4125-87C9-F193FC689CB2}]
2009-08-14 02:55 85768 ----a-w- c:\program files\Common Files\TortoiseOverlays\TortoiseOverlays.dll

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shelliconoverlayidentifiers\2TortoiseModified]
@="{C5994561-53D9-4125-87C9-F193FC689CB2}"
[HKEY_CLASSES_ROOT\CLSID\{C5994561-53D9-4125-87C9-F193FC689CB2}]
2009-08-14 02:55 85768 ----a-w- c:\program files\Common Files\TortoiseOverlays\TortoiseOverlays.dll

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shelliconoverlayidentifiers\3TortoiseConflict]
@="{C5994562-53D9-4125-87C9-F193FC689CB2}"
[HKEY_CLASSES_ROOT\CLSID\{C5994562-53D9-4125-87C9-F193FC689CB2}]
2009-08-14 02:55 85768 ----a-w- c:\program files\Common Files\TortoiseOverlays\TortoiseOverlays.dll

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shelliconoverlayidentifiers\4TortoiseLocked]
@="{C5994563-53D9-4125-87C9-F193FC689CB2}"
[HKEY_CLASSES_ROOT\CLSID\{C5994563-53D9-4125-87C9-F193FC689CB2}]
2009-08-14 02:55 85768 ----a-w- c:\program files\Common Files\TortoiseOverlays\TortoiseOverlays.dll

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shelliconoverlayidentifiers\5TortoiseReadOnly]
@="{C5994564-53D9-4125-87C9-F193FC689CB2}"
[HKEY_CLASSES_ROOT\CLSID\{C5994564-53D9-4125-87C9-F193FC689CB2}]
2009-08-14 02:55 85768 ----a-w- c:\program files\Common Files\TortoiseOverlays\TortoiseOverlays.dll

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shelliconoverlayidentifiers\6TortoiseDeleted]
@="{C5994565-53D9-4125-87C9-F193FC689CB2}"
[HKEY_CLASSES_ROOT\CLSID\{C5994565-53D9-4125-87C9-F193FC689CB2}]
2009-08-14 02:55 85768 ----a-w- c:\program files\Common Files\TortoiseOverlays\TortoiseOverlays.dll

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shelliconoverlayidentifiers\7TortoiseAdded]
@="{C5994566-53D9-4125-87C9-F193FC689CB2}"
[HKEY_CLASSES_ROOT\CLSID\{C5994566-53D9-4125-87C9-F193FC689CB2}]
2009-08-14 02:55 85768 ----a-w- c:\program files\Common Files\TortoiseOverlays\TortoiseOverlays.dll

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shelliconoverlayidentifiers\8TortoiseIgnored]
@="{C5994567-53D9-4125-87C9-F193FC689CB2}"
[HKEY_CLASSES_ROOT\CLSID\{C5994567-53D9-4125-87C9-F193FC689CB2}]
2009-08-14 02:55 85768 ----a-w- c:\program files\Common Files\TortoiseOverlays\TortoiseOverlays.dll

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shelliconoverlayidentifiers\9TortoiseUnversioned]
@="{C5994568-53D9-4125-87C9-F193FC689CB2}"
[HKEY_CLASSES_ROOT\CLSID\{C5994568-53D9-4125-87C9-F193FC689CB2}]
2009-08-14 02:55 85768 ----a-w- c:\program files\Common Files\TortoiseOverlays\TortoiseOverlays.dll


[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"IMJPMIG8.1"="c:\windows\IME\imjp8_1\IMJPMIG.EXE" [2004-08-04 208952]
"PHIME2002ASync"="c:\windows\system32\IME\TINTLGNT\TINTSETP.EXE" [2004-08-04 455168]
"PHIME2002A"="c:\windows\system32\IME\TINTLGNT\TINTSETP.EXE" [2004-08-04 455168]
"stgclean"="c:\sdwork\w32main2.exe" [2010-05-07 299008]
"ccApp"="c:\program files\Common Files\Symantec Shared\ccApp.exe" [2006-07-19 52896]
"vptray"="c:\progra~1\SYMANT~2\SYMANT~2\VPTray.exe" [2006-09-27 125168]
"BluetoothAuthenticationAgent"="bthprops.cpl" [2008-04-14 110592]
"TpShocks"="TpShocks.exe" [2008-06-06 181536]
"PWRMGRTR"="c:\progra~1\ThinkPad\UTILIT~1\PWRMGRTR.DLL" [2008-09-25 331776]
"BLOG"="c:\progra~1\ThinkPad\UTILIT~1\BatLogEx.DLL" [2008-09-25 208896]
"SynTPEnh"="c:\program files\Synaptics\SynTP\SynTPEnh.exe" [2008-07-03 1323008]
"TPFNF7"="c:\program files\Lenovo\NPDIRECT\TPFNF7SP.exe" [2008-12-19 60192]
"TPHOTKEY"="c:\program files\Lenovo\HOTKEY\TPOSDSVC.exe" [2008-03-24 68464]
"TPKMAPHELPER"="c:\program files\ThinkPad\Utilities\TpKmapAp.exe" [2007-01-09 868352]
"C4EBReg"="c:\program files\C4ebreg\c4ebreg.exe" [2010-02-25 482584]
"Isamtray"="c:\program files\C4ebreg\isamtray.exe" [2010-02-25 285976]
"EZEJMNAP"="c:\progra~1\ThinkPad\UTILIT~1\EzEjMnAp.Exe" [2008-06-05 242976]
"StartCCC"="c:\program files\ATI Technologies\ATI.ACE\Core-Static\CLIStart.exe" [2008-01-21 61440]
"IgfxTray"="c:\windows\system32\igfxtray.exe" [2008-12-19 150040]
"HotKeysCmds"="c:\windows\system32\hkcmd.exe" [2008-12-19 170520]
"Persistence"="c:\windows\system32\igfxpers.exe" [2008-12-19 141848]
"ISSI Service"="c:\sdwork\issimsvc.exe" [2010-02-11 241392]
"Synchronization Manager"="c:\windows\system32\mobsync.exe" [2008-04-14 143360]
"iTunesHelper"="c:\program files\iTunes\iTunesHelper.exe" [2010-04-28 142120]
"QuickTime Task"="c:\program files\QuickTime\QTTask.exe" [2010-03-18 421888]
"ISUSPM Startup"="c:\program files\Common Files\InstallShield\UpdateService\isuspm.exe" [2005-08-11 249856]

c:\documents and settings\All Users\Start Menu\Programs\Startup\
VPN Client.lnk - c:\windows\Installer\{08B785C1-3893-4154-B53B-F5D341D0AAAA}\Icon3E5562ED7.ico [2009-12-7 6144]

[HKEY_CURRENT_USER\software\microsoft\windows\currentversion\policies\explorer]
"NoDevMgrUpdate"= 1 (0x1)

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\pcsinst]
2007-11-02 10:45 49152 ----a-w- c:\windows\system32\pcsinst.dll

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\tpfnf2]
2006-09-06 16:37 34344 ----a-w- c:\program files\Lenovo\HOTKEY\notifyf2.dll

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\tphotkey]
2008-03-17 16:02 34080 ----a-w- c:\program files\Lenovo\HOTKEY\tphklock.dll

[HKLM\~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^Bluetooth.lnk]
path=c:\documents and settings\All Users\Start Menu\Programs\Startup\Bluetooth.lnk
backup=c:\windows\pss\Bluetooth.lnkCommon Startup

[HKLM\~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^VPN Client.lnk]
path=c:\documents and settings\All Users\Start Menu\Programs\Startup\VPN Client.lnk
backup=c:\windows\pss\VPN Client.lnkCommon Startup

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Adobe Reader Speed Launcher]
2008-10-15 08:04 39792 ----a-w- c:\program files\Adobe\Reader 8.0\Reader\reader_sl.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Google Update]
2009-03-28 06:02 133104 ----atw- c:\documents and settings\Administrator\Local Settings\Application Data\Google\Update\GoogleUpdate.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\NetSP - restore settings on power failure]
2009-10-07 19:36 87392 ----a-w- c:\program files\AT&T Network Client\NetSP.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\QuickTime Task]
2010-03-18 04:53 421888 ----a-w- c:\program files\QuickTime\QTTask.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\SunJavaUpdateSched]
2009-08-21 17:28 149280 ----a-w- c:\program files\Java\jre6\bin\jusched.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\services]
"FileZilla Server"=2 (0x2)
"DB2REMOTECMD_DB2COPY1"=3 (0x3)
"DB2MGMTSVC_DB2COPY1"=3 (0x3)
"DB2LICD_DB2COPY1"=3 (0x3)
"DB2GOVERNOR_DB2COPY1"=3 (0x3)
"DB2DAS00"=3 (0x3)
"btwdins"=2 (0x2)

[HKEY_LOCAL_MACHINE\software\microsoft\security center]
"FirewallDisableNotify"=dword:00000001

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecAntiVirus]
"DisableMonitoring"=dword:00000001

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecFirewall]
"DisableMonitoring"=dword:00000001

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]
"EnableFirewall"= 0 (0x0)

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=
"c:\\Documents and Settings\\Administrator\\Local Settings\\Application Data\\Google\\Google Talk Plugin\\googletalkplugin.dll"=
"c:\\Documents and Settings\\Administrator\\Local Settings\\Application Data\\Google\\Google Talk Plugin\\googletalkplugin.exe"=
"c:\\Program Files\\Microsoft Office\\Live Meeting 8\\Console\\PWConsole.exe"=
"c:\\Documents and Settings\\db2admin\\Local Settings\\Application Data\\Google\\Google Talk Plugin\\googletalkplugin.dll"=
"c:\\Documents and Settings\\db2admin\\Local Settings\\Application Data\\Google\\Google Talk Plugin\\googletalkplugin.exe"=
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"c:\\Program Files\\Skype\\Plugin Manager\\skypePM.exe"=
"c:\\Program Files\\Bonjour\\mDNSResponder.exe"=
"c:\\Program Files\\iTunes\\iTunes.exe"=
"c:\\Program Files\\Skype\\Phone\\Skype.exe"=

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\GloballyOpenPorts\List]


R0 TPDIGIMN;TPDIGIMN;c:\windows\system32\drivers\ApsHM86.sys [5/14/2008 9:21 AM 19496]
R2 OracleXETNSListener;OracleXETNSListener;c:\oraclexe\app\oracle\product\10.2.0\server\BIN\TNSLSNR.EXE [2/2/2006 12:49 AM 204800]
R2 Power Manager DBC Service;Power Manager DBC Service;c:\program files\ThinkPad\Utilities\PWMDBSVC.exe [12/19/2008 6:41 AM 94208]
R2 SavRoam;SAVRoam;c:\program files\Symantec Client Security\Symantec AntiVirus\SavRoam.exe [9/27/2006 1:33 PM 116464]
R3 e1yexpress;Intel® Gigabit Network Connections Driver;c:\windows\system32\drivers\e1y5132.sys [12/19/2008 6:17 AM 243856]
R3 EraserUtilRebootDrv;EraserUtilRebootDrv;c:\program files\Common Files\Symantec Shared\EENGINE\EraserUtilRebootDrv.sys [8/30/2009 8:56 AM 102448]
S2 OracleServiceXE;OracleServiceXE;c:\oraclexe\app\oracle\product\10.2.0\server\bin\ORACLE.EXE XE --> c:\oraclexe\app\oracle\product\10.2.0\server\bin\ORACLE.EXE XE [?]
S3 IsamFilter;IsamFilter;c:\windows\system32\drivers\isamfilter.sys [10/8/2009 3:32 PM 6400]
S3 MEMSWEEP2;MEMSWEEP2;\??\c:\windows\system32\264.tmp --> c:\windows\system32\264.tmp [?]
S4 msvsmon80;Visual Studio 2005 Remote Debugger;c:\program files\Microsoft Visual Studio 8\Common7\IDE\Remote Debugger\x86\msvsmon.exe [9/23/2005 8:01 AM 2799808]
S4 OracleJobSchedulerXE;OracleJobSchedulerXE;c:\oraclexe\app\oracle\product\10.2.0\server\Bin\extjob.exe XE --> c:\oraclexe\app\oracle\product\10.2.0\server\Bin\extjob.exe XE [?]
UnknownUnknown dsload;dsload; [x]

--- Other Services/Drivers In Memory ---

*Deregistered* - dsgrab_01ca147c0fcebc2c

.
Contents of the 'Scheduled Tasks' folder

2010-05-10 c:\windows\Tasks\PMTask.job
- c:\progra~1\ThinkPad\UTILIT~1\PWMIDTSK.EXE [2008-12-19 01:47]
.
.
------- Supplementary Scan -------
.
uStart Page = hxxp://yahoo.com/
mStart Page = hxxp://yahoo.com
uInternet Connection Wizard,ShellNext = iexplore
uInternet Settings,ProxyOverride = ;;*.local;<local>
uSearchURL,(Default) = hxxp://yahoo.com/customize/ycomp/defaults/su/*http://yahoo.com
IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~2\Office12\EXCEL.EXE/3000
IE: Send to &Bluetooth Device... - c:\program files\ThinkPad\Bluetooth Software\btsendto_ie_ctx.htm
IE: Send To Bluetooth - c:\program files\ThinkPad\Bluetooth Software\btsendto_ie.htm
IE: {{898EA8C8-E7FF-479B-8935-AEC46303B9E5} - {898EA8C8-E7FF-479B-8935-AEC46303B9E5} - c:\program files\Skype\Toolbars\Internet Explorer\skypeieplugin.dll
DPF: Microsoft XML Parser for Java - file://c:\windows\Java\classes\xmldso.cab
DPF: {9519B2A2-6592-4E41-8290-D0298459270C} - hxxp://google.com
FF - ProfilePath - c:\documents and settings\Administrator\Application Data\Mozilla\Firefox\Profiles\qb0l1osw.default\
FF - prefs.js: browser.startup.homepage - hxxp://google.com
FF - component: c:\program files\Mozilla Firefox\extensions\{AB2CE124-6272-4b12-94A9-7303C7397BD1}\components\SkypeFfComponent.dll
FF - plugin: c:\documents and settings\Administrator\Application Data\Mozilla\plugins\npatgpc.dll
FF - plugin: c:\documents and settings\Administrator\Application Data\Mozilla\plugins\npgoogletalk.dll
FF - plugin: c:\documents and settings\Administrator\Local Settings\Application Data\Google\Update\1.2.183.23\npGoogleOneClick8.dll
FF - plugin: c:\program files\DivX\DivX Plus Web Player\npdivx32.dll
FF - plugin: c:\program files\Mozilla Firefox\plugins\npatgpc.dll
FF - plugin: c:\program files\Mozilla Firefox\plugins\NPCentraUpdater.dll
FF - plugin: c:\program files\Mozilla Firefox\plugins\npcpsweb.dll
FF - plugin: c:\program files\Mozilla Firefox\plugins\npwdplugin821.dll

---- FIREFOX POLICIES ----
FF - user.js: yahoo.ytff.general.dontshowhpoffer - truec:\program files\Mozilla Firefox\greprefs\all.js - pref("ui.use_native_colors", true);
c:\program files\Mozilla Firefox\greprefs\all.js - pref("network.auth.force-generic-ntlm", false);
c:\program files\Mozilla Firefox\greprefs\all.js - pref("svg.smil.enabled", false);
c:\program files\Mozilla Firefox\greprefs\security-prefs.js - pref("security.ssl.allow_unrestricted_renego_everywhere__temporarily_available_pref", true);
c:\program files\Mozilla Firefox\greprefs\security-prefs.js - pref("security.ssl.renego_unrestricted_hosts", "");
c:\program files\Mozilla Firefox\greprefs\security-prefs.js - pref("security.ssl.treat_unsafe_negotiation_as_broken", false);
c:\program files\Mozilla Firefox\greprefs\security-prefs.js - pref("security.ssl.require_safe_negotiation", false);
c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("extensions.{972ce4c6-7e08-4474-a285-3208198ce6fd}.name", "chrome://browser/locale/browser.properties");
c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("extensions.{972ce4c6-7e08-4474-a285-3208198ce6fd}.description", "chrome://browser/locale/browser.properties");
c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("plugins.update.notifyUser", false);
.
- - - - ORPHANS REMOVED - - - -

HKLM-Run-ISAM SMT Service - c:\program files\C4ebreg\isamsmt.exe
Notify-ACNotify - ACNotify.dll
Notify-atmgrtok - atmgrtok.dll
MSConfigStartUp-GM4IE - c:\program files\GM4IE\gm4ie.exe
MSConfigStartUp-iTunesHelper - c:\itunes\iTunesHelper.exe



**************************************************************************

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2010-05-09 23:15
Windows 5.1.2600 Service Pack 3 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully
hidden files: 0

**************************************************************************

[HKEY_LOCAL_MACHINE\System\ControlSet001\Services\MEMSWEEP2]
"ImagePath"="\??\c:\windows\system32\264.tmp"
.
--------------------- DLLs Loaded Under Running Processes ---------------------

- - - - - - - > 'winlogon.exe'(1292)
c:\program files\ThinkPad\ConnectUtilities\ACNotify.dll
c:\program files\ThinkPad\ConnectUtilities\AcSvcStub.dll
c:\program files\ThinkPad\ConnectUtilities\AcLocSettings.dll
c:\program files\ThinkPad\ConnectUtilities\ACHelper.dll
c:\windows\system32\Ati2evxx.dll
c:\program files\Lenovo\HOTKEY\tphklock.dll
c:\windows\system32\pcsinst.dll

- - - - - - - > 'explorer.exe'(3844)
c:\program files\Common Files\TortoiseOverlays\TortoiseOverlays.dll
c:\program files\TortoiseSVN\bin\TortoiseStub.dll
c:\program files\TortoiseSVN\bin\TortoiseSVN.dll
c:\program files\TortoiseSVN\bin\intl3_tsvn.dll
c:\program files\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelper.dll
c:\program files\Lenovo\HOTKEY\hkvolkey.dll
.
------------------------ Other Running Processes ------------------------
.
c:\windows\system32\Ati2evxx.exe
c:\program files\Intel\WiFi\bin\S24EvMon.exe
c:\windows\system32\Ati2evxx.exe
c:\program files\Common Files\Symantec Shared\ccSetMgr.exe
c:\program files\Common Files\Symantec Shared\ccEvtMgr.exe
c:\program files\Common Files\Symantec Shared\ccProxy.exe
c:\program files\Symantec Client Security\Symantec Client Firewall\ISSVC.exe
c:\program files\Common Files\Symantec Shared\SNDSrvc.exe
c:\program files\Common Files\Symantec Shared\SPBBC\SPBBCSvc.exe
c:\windows\system32\Drivers\trcboot.exe
c:\program files\ThinkPad\ConnectUtilities\AcPrfMgrSvc.exe
c:\program files\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe
c:\program files\Bonjour\mDNSResponder.exe
c:\program files\Symantec Client Security\Symantec AntiVirus\DefWatch.exe
c:\program files\Intel\WiFi\bin\EvtEng.exe
c:\windows\system32\inetsrv\inetinfo.exe
c:\program files\TortoiseSVN\bin\TSVNCache.exe
c:\program files\Microsoft SQL Server\MSSQL.1\MSSQL\Binn\sqlservr.exe
c:\notes\ntmulti.exe
c:\windows\system32\TpShocks.exe
c:\windows\system32\rundll32.exe
c:\program files\Lenovo\HOTKEY\TPONSCR.exe
c:\windows\system32\java.exe
c:\program files\Lenovo\Zoom\TpScrex.exe
c:\program files\Synaptics\SynTP\SynTPLpr.exe
c:\program files\ATI Technologies\ATI.ACE\Core-Static\MOM.exe
c:\program files\Common Files\Intel\WirelessCommon\RegSrvc.exe
c:\program files\Symantec Client Security\Symantec AntiVirus\Rtvscan.exe
c:\program files\Symantec Client Security\Symantec Client Firewall\SymSPort.exe
c:\windows\System32\TPHDEXLG.exe
c:\windows\system32\TpKmpSVC.exe
c:\program files\ATI Technologies\ATI.ACE\Core-Static\ccc.exe
c:\program files\ThinkPad\ConnectUtilities\AcSvc.exe
c:\windows\system32\Drivers\ldlcserv.exe
c:\program files\iPod\bin\iPodService.exe
c:\windows\system32\wscntfy.exe
c:\program files\ThinkPad\ConnectUtilities\SvcGuiHlpr.exe
.
**************************************************************************
.
Completion time: 2010-05-09 23:24:09 - machine was rebooted
ComboFix-quarantined-files.txt 2010-05-10 06:24

Pre-Run: 72,038,072,320 bytes free
Post-Run: 73,055,064,064 bytes free

- - End Of File - - 24241E7B7238C5936ECC66655772572C

Attached Files

  • Attached File  log.txt   32.79KB   7 downloads

Edited by Blade Zephon, 11 May 2010 - 04:46 AM.
Posted log in reply to facilitate analysis. Please do not attach logs unless the board software will not let you post them directly. Thanks!


#5 nawkturn

nawkturn
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:06:53 PM

Posted 10 May 2010 - 07:13 PM

I think the trojan is lingering somewhere. Today I was working on something, I saw this:

c:\windows\system32\explorer.exe

c:\windows\system32\spooIsv.exe

both are malicious and I removed them. Should I run the combofix again?

Thanks!

#6 Blade

Blade

    Strong in the Bleepforce


  • Site Admin
  • 12,792 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:US
  • Local time:06:53 PM

Posted 11 May 2010 - 05:47 AM

Hello nawkturn.

QUOTE
I think the trojan is lingering somewhere. Today I was working on something, I saw this:

c:\windows\system32\explorer.exe

c:\windows\system32\spooIsv.exe


Regarding the two files mentioned above, what program detected the files?

***************************************************

1. Open notepad and copy/paste the text in the codebox below into it:

CODE
Registry::
[HKEY_LOCAL_MACHINE\software\microsoft\security center]
"FirewallDisableNotify"=-

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecAntiVirus]
"DisableMonitoring"=-

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecFirewall]
"DisableMonitoring"=-


Save this as CFScript.txt, in the same location as ComboFix.exe

2. Close any open browsers.

3. VERY IMPORTANT: Disable all running antivirus, antimalware and firewall programs as they may interfere with the proper running of ComboFix. Click on this link to see a list of programs that should be disabled. NOTE: This list is not all-inclusive. If yours is not listed and you do not know how to disable it, please ask.



Refering to the picture above, drag CFScript into ComboFix.exe

When finished, it shall produce a log for you at C:\ComboFix.txt which I will require in your next reply.

~Blade

In your next reply, please include the following:
ComboFix log

animinionsmalltext.gif
If I am helping you, it has been 48 hours since your last post, and I have yet to reply to your topic, please send me a PM
Become a BleepingComputer fan: Facebook
Follow us on Twitter!


#7 nawkturn

nawkturn
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:06:53 PM

Posted 12 May 2010 - 01:10 AM

Hi BZ,

The "c:\windows\system32\spooIsv.exe" was reported by Symantec Firewall, asking me to Block connections.

I did and deleted it. And after that, I launched Process Explorer and was looking at the running processes, and I found the c:\windows\system32\explorer.exe.

After a bit of Googling, I figured that this is not the exe that should be running. So I removed it as well.


Here is resultant log you asked for:

ComboFix 10-05-11.04 - nawkturn 05/11/2010 22:12:30.2.2 - x86
Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.3066.1699 [GMT -7:00]
Running from: c:\documents and settings\Administrator\Desktop\renamed.exe
Command switches used :: c:\documents and settings\Administrator\Desktop\cfscript.txt
AV: Symantec AntiVirus Corporate Edition *On-access scanning disabled* (Updated) {FB06448E-52B8-493A-90F3-E43226D3305C}
FW: Symantec Client Firewall *disabled* {5CB76A43-5FAD-476B-B9FF-26FA61F13187}
.

((((((((((((((((((((((((( Files Created from 2010-04-12 to 2010-05-12 )))))))))))))))))))))))))))))))
.

2010-05-11 21:39 . 2010-05-11 21:39 -------- d-----w- c:\documents and settings\Administrator\workspace-1
2010-05-11 00:14 . 2010-05-11 00:14 -------- d--h--w- c:\windows\$hf_mig$
2010-05-11 00:14 . 2008-06-17 19:02 8461312 -c----w- c:\windows\system32\dllcache\shell32.dll
2010-05-08 19:31 . 2010-05-11 19:49 -------- d-----w- c:\windows\system32\wbem\Logs
2010-05-08 19:12 . 2010-05-08 19:12 -------- d-----w- C:\IP Scanner
2010-05-07 00:23 . 2010-05-07 00:23 -------- d-----w- c:\program files\Microsoft Visual Studio .NET
2010-05-07 00:22 . 2010-05-07 00:23 -------- d-----w- C:\oraclexe
2010-05-06 21:38 . 2010-02-24 13:11 455680 -c----w- c:\windows\system32\dllcache\mrxsmb.sys
2010-05-06 21:37 . 2010-01-13 14:01 86016 -c----w- c:\windows\system32\dllcache\cabview.dll
2010-05-06 21:37 . 2009-12-24 06:59 177664 -c----w- c:\windows\system32\dllcache\wintrust.dll
2010-05-06 04:01 . 2010-05-06 04:01 -------- d-----w- c:\documents and settings\db2admin\Application Data\Apple Computer
2010-05-06 04:01 . 2010-05-06 04:01 -------- d-----w- c:\documents and settings\db2admin\Local Settings\Application Data\Apple Computer
2010-05-05 02:27 . 2010-05-05 02:27 -------- d-----w- c:\program files\Trend Micro
2010-05-04 06:12 . 2010-05-04 06:12 -------- d-----w- c:\program files\iPod
2010-05-04 06:12 . 2010-05-04 06:12 -------- d-----w- c:\program files\iTunes
2010-05-04 06:11 . 2010-05-04 06:11 -------- d-----w- c:\program files\QuickTime
2010-05-03 06:44 . 2010-05-03 06:44 -------- d-----w- C:\40ef91df2a86f5e25c
2010-05-03 03:58 . 2010-05-03 04:13 -------- d-----w- c:\documents and settings\Administrator\Application Data\Apple Computer
2010-05-03 03:55 . 2010-05-03 03:55 -------- d-----w- c:\program files\Apple Software Update
2010-05-03 03:55 . 2010-04-16 15:33 41472 ----a-w- c:\windows\system32\drivers\usbaapl.sys
2010-05-03 03:55 . 2010-04-16 15:33 3003680 ----a-w- c:\windows\system32\usbaaplrc.dll
2010-05-03 03:55 . 2010-05-04 06:10 -------- d-----w- c:\program files\Bonjour
2010-05-02 16:41 . 2010-05-08 23:08 -------- d-----w- c:\documents and settings\Administrator\Application Data\skypePM
2010-05-02 16:41 . 2010-05-02 16:41 56 ---ha-w- c:\windows\system32\ezsidmv.dat
2010-05-02 16:37 . 2010-05-09 20:57 -------- d-----w- c:\documents and settings\Administrator\Application Data\Skype
2010-05-02 16:36 . 2010-05-02 16:36 -------- d-----w- c:\program files\Common Files\Skype
2010-05-02 16:36 . 2010-05-02 16:37 -------- d-----r- c:\program files\Skype
2010-05-02 16:36 . 2010-05-02 16:36 -------- d-----w- c:\documents and settings\All Users\Application Data\Skype
2010-04-29 23:11 . 2010-04-29 23:11 -------- d-----w- c:\documents and settings\Administrator\Application Data\WDPlugin
2010-04-27 19:40 . 2010-02-26 05:43 251904 -c----w- c:\windows\system32\dllcache\iepeers.dll
2010-04-27 19:40 . 2010-03-10 04:33 1025024 -c----w- c:\windows\system32\dllcache\browseui.dll
2010-04-27 19:40 . 2009-08-14 13:21 1850624 -c----w- c:\windows\system32\dllcache\win32k.sys
2010-04-27 19:39 . 2009-06-12 12:31 80896 -c----w- c:\windows\system32\dllcache\tlntsess.exe
2010-04-27 19:39 . 2009-06-12 12:31 76288 -c----w- c:\windows\system32\dllcache\telnet.exe
2010-04-27 06:25 . 2010-05-09 18:59 -------- d---a-w- c:\documents and settings\All Users\Application Data\TEMP
2010-04-27 06:16 . 2010-04-27 06:16 -------- d-----w- c:\documents and settings\All Users\Application Data\Alwil Software
2010-04-24 09:14 . 2010-04-24 09:14 -------- d-----w- c:\documents and settings\db2admin\Local Settings\Application Data\avG
2010-04-24 09:14 . 2010-04-24 09:14 -------- d-----w- c:\documents and settings\All Users\Application Data\avG
2010-04-24 06:28 . 2010-04-24 06:28 -------- d-----w- c:\documents and settings\All Users\Application Data\SUPERAntiSpyware.com
2010-04-24 06:27 . 2010-04-24 06:27 -------- d-----w- c:\documents and settings\db2admin\Application Data\SUPERAntiSpyware.com
2010-04-24 03:43 . 2010-04-24 03:43 -------- d-----w- c:\documents and settings\db2admin\Application Data\Malwarebytes
2010-04-23 19:46 . 2010-04-23 19:46 -------- d-----w- c:\documents and settings\NetworkService\Local Settings\Application Data\javasharedresources
2010-04-23 01:04 . 2010-04-23 01:07 -------- d-----w- c:\documents and settings\Administrator\723540.tmp
2010-04-21 21:50 . 2010-04-21 21:50 -------- d-----w- c:\documents and settings\All Users\Application Data\AGNS
2010-04-21 18:30 . 2010-05-11 21:32 -------- d-----w- C:\swd
2010-04-20 18:44 . 2009-12-08 09:23 474112 -c----w- c:\windows\system32\dllcache\shlwapi.dll
2010-04-20 18:44 . 2009-10-15 16:28 81920 -c----w- c:\windows\system32\dllcache\fontsub.dll
2010-04-20 18:44 . 2009-10-15 16:28 119808 -c----w- c:\windows\system32\dllcache\t2embed.dll
2010-04-20 18:43 . 2010-02-26 05:43 667136 -c----w- c:\windows\system32\dllcache\wininet.dll
2010-04-20 18:43 . 2010-02-26 05:43 627712 -c----w- c:\windows\system32\dllcache\urlmon.dll
2010-04-20 18:43 . 2010-03-10 04:33 1509888 -c----w- c:\windows\system32\dllcache\shdocvw.dll
2010-04-20 18:43 . 2010-02-26 05:43 3073024 -c----w- c:\windows\system32\dllcache\mshtml.dll
2010-04-20 04:49 . 2009-08-07 02:23 274288 ----a-w- c:\windows\system32\mucltui.dll
2010-04-20 04:37 . 2009-10-23 15:28 3558912 -c----w- c:\windows\system32\dllcache\moviemk.exe
2010-04-19 23:22 . 2008-09-10 01:14 1307648 -c----w- c:\windows\system32\dllcache\msxml6.dll
2010-04-19 23:22 . 2008-04-14 05:57 79872 -c----w- c:\windows\system32\dllcache\msxml6r.dll
2010-04-19 23:22 . 2007-06-26 18:30 22060 -c----w- c:\windows\system32\dllcache\npds.zip
2010-04-19 23:22 . 2007-06-26 18:26 403 -c----w- c:\windows\system32\dllcache\npdrmv2.zip
2010-04-19 23:22 . 2008-04-14 12:40 102912 -c----w- c:\windows\system32\dllcache\dpcdll.dll
2010-04-19 23:19 . 2008-04-14 12:42 294912 -c----w- c:\windows\system32\dllcache\dlimport.exe
2010-04-19 02:49 . 2010-04-21 21:51 -------- d-----w- c:\documents and settings\db2admin\Local Settings\Application Data\AGNS
2010-04-19 02:12 . 2010-04-21 21:51 -------- d-----w- c:\documents and settings\Administrator\Local Settings\Application Data\AGNS
2010-04-18 07:05 . 2010-05-01 14:42 -------- d-----w- c:\documents and settings\db2admin\Local Settings\Application Data\Temp
2010-04-18 07:05 . 2010-04-18 07:06 -------- d-----w- c:\documents and settings\db2admin\Local Settings\Application Data\Google
2010-04-17 22:55 . 2010-04-17 22:55 -------- d-----w- c:\documents and settings\db2admin\Application Data\Subversion
2010-04-17 22:19 . 2010-05-11 01:04 -------- d-----w- c:\documents and settings\db2admin\Local Settings\Application Data\TSVNCache
2010-04-17 15:28 . 2010-04-17 15:29 -------- d-----w- c:\documents and settings\Administrator\Application Data\GetRightToGo
2010-04-13 14:33 . 2010-04-22 19:58 -------- d-----w- c:\documents and settings\NetworkService\Local Settings\Application Data\Apple Computer
2010-04-13 14:33 . 2010-04-13 14:33 -------- d-----w- c:\documents and settings\NetworkService\Application Data\Apple Computer
2010-04-12 23:48 . 1998-06-10 23:34 65536 ----a-w- c:\windows\system32\rexxapi.dll
2010-04-12 23:48 . 1998-06-10 23:25 23040 ----a-w- c:\windows\system32\rxapi.exe
2010-04-12 23:48 . 1998-06-10 23:34 640512 ----a-w- c:\windows\system32\rexx.dll

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2010-05-12 05:03 . 2009-03-17 18:44 -------- d-----w- c:\documents and settings\Administrator\Application Data\.purple
2010-05-11 22:43 . 2006-03-27 21:50 -------- d-----w- c:\program files\WST
2010-05-11 21:46 . 2006-01-24 00:45 -------- d-----w- c:\program files\Common Files\Symantec Shared
2010-05-11 17:05 . 2005-04-05 17:21 -------- d-----w- c:\program files\C4ebreg
2010-05-11 00:57 . 2007-03-05 22:09 40 ----a-w- c:\windows\system32\profile.dat
2010-05-10 22:01 . 2009-02-10 17:09 -------- d-----w- c:\documents and settings\All Users\Application Data\Microsoft Help
2010-05-10 01:13 . 2010-05-10 01:11 161296 ----a-w- c:\windows\system32\drivers\tmcomm.sys
2010-05-09 19:10 . 2010-05-09 19:10 -------- d-----w- c:\program files\AVG
2010-05-08 21:41 . 2010-05-08 21:41 -------- d-----w- c:\documents and settings\Administrator\Application Data\Simply Super Software
2010-05-07 00:26 . 2005-04-05 19:45 -------- d--h--w- c:\program files\InstallShield Installation Information
2010-05-05 03:40 . 2009-10-13 04:53 2352 ----a-w- c:\documents and settings\LocalService\Local Settings\Application Data\FontCache3.0.0.0.dat
2010-05-03 06:51 . 2005-04-04 18:17 94232 ----a-w- c:\documents and settings\Administrator\Local Settings\Application Data\GDIPFONTCACHEV1.DAT
2010-05-03 03:56 . 2010-04-08 20:10 -------- d-----w- c:\program files\Common Files\Apple
2010-05-02 02:54 . 2009-12-09 05:49 1324 ----a-w- c:\windows\system32\d3d9caps.dat
2010-04-29 22:39 . 2010-04-09 03:37 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2010-04-29 22:39 . 2010-04-09 03:37 20952 ----a-w- c:\windows\system32\drivers\mbam.sys
2010-04-26 02:46 . 2010-04-08 20:12 -------- d-----w- c:\documents and settings\All Users\Application Data\Apple Computer
2010-04-21 21:50 . 2007-09-05 21:03 -------- d-----w- c:\program files\AT&T Network Client Install
2010-04-14 01:54 . 2009-06-05 17:16 -------- d-----w- c:\documents and settings\Administrator\Application Data\FileZilla
2010-04-13 07:03 . 2009-07-07 14:13 -------- d-----w- c:\documents and settings\Administrator\Application Data\TeamViewer
2010-04-11 07:50 . 2007-02-20 21:23 1100 ----a-w- c:\windows\system32\d3d8caps.dat
2010-04-10 03:19 . 2010-04-10 03:19 -------- d-----w- c:\documents and settings\All Users\Application Data\{8CD7F5AF-ECFA-4793-BF40-D8F42DBFF906}
2010-04-09 03:37 . 2010-04-09 03:37 -------- d-----w- c:\documents and settings\Administrator\Application Data\Malwarebytes
2010-04-09 03:37 . 2010-04-09 03:37 -------- d-----w- c:\documents and settings\All Users\Application Data\Malwarebytes
2010-04-08 23:34 . 2009-06-25 03:22 75832 ---ha-w- c:\windows\system32\mlfcache.dat
2010-04-08 20:20 . 2010-04-08 20:20 91424 ----a-w- c:\windows\system32\dnssd.dll
2010-04-08 20:20 . 2010-04-08 20:20 107808 ----a-w- c:\windows\system32\dns-sd.exe
2010-04-08 20:14 . 2010-04-08 20:13 -------- d-----w- c:\documents and settings\All Users\Application Data\{429CAD59-35B1-4DBC-BB6D-1DB246563521}
2010-04-08 20:11 . 2010-04-08 20:10 -------- d-----w- c:\documents and settings\All Users\Application Data\Apple
2010-03-27 04:52 . 2010-03-26 05:26 444952 ----a-w- c:\windows\system32\wrap_oal.dll
2010-03-27 04:52 . 2010-03-26 05:26 109080 ----a-w- c:\windows\system32\OpenAL32.dll
2010-03-26 05:26 . 2010-03-26 05:26 -------- d-----w- c:\program files\OpenAL
2010-02-26 05:43 . 2004-08-04 05:00 667136 ----a-w- c:\windows\system32\wininet.dll
2010-02-26 05:43 . 2004-08-04 05:00 81920 ----a-w- c:\windows\system32\ieencode.dll
2010-02-25 18:11 . 2005-07-29 18:05 64792 ----a-w- c:\windows\isamunin.exe
2010-02-24 13:11 . 2004-08-04 05:00 455680 ----a-w- c:\windows\system32\drivers\mrxsmb.sys
2010-02-17 18:08 . 2009-10-08 22:32 6400 ----a-w- c:\windows\system32\drivers\isamfilter.sys
2009-06-22 15:07 . 2009-06-22 15:07 27976 ----a-w- c:\program files\mozilla firefox\plugins\atgpcdec.dll
2009-06-22 15:07 . 2009-06-22 15:07 126360 ----a-w- c:\program files\mozilla firefox\plugins\atgpcext.dll
2009-07-02 14:31 . 2009-06-22 15:07 98712 ----a-w- c:\program files\mozilla firefox\plugins\ieatgpc.dll
2009-08-06 23:21 . 2009-08-06 23:21 8 --sh--r- c:\windows\system32\4F3E1CF907.dll
.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shelliconoverlayidentifiers\1TortoiseNormal]
@="{C5994560-53D9-4125-87C9-F193FC689CB2}"
[HKEY_CLASSES_ROOT\CLSID\{C5994560-53D9-4125-87C9-F193FC689CB2}]
2009-08-14 02:55 85768 ----a-w- c:\program files\Common Files\TortoiseOverlays\TortoiseOverlays.dll

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shelliconoverlayidentifiers\2TortoiseModified]
@="{C5994561-53D9-4125-87C9-F193FC689CB2}"
[HKEY_CLASSES_ROOT\CLSID\{C5994561-53D9-4125-87C9-F193FC689CB2}]
2009-08-14 02:55 85768 ----a-w- c:\program files\Common Files\TortoiseOverlays\TortoiseOverlays.dll

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shelliconoverlayidentifiers\3TortoiseConflict]
@="{C5994562-53D9-4125-87C9-F193FC689CB2}"
[HKEY_CLASSES_ROOT\CLSID\{C5994562-53D9-4125-87C9-F193FC689CB2}]
2009-08-14 02:55 85768 ----a-w- c:\program files\Common Files\TortoiseOverlays\TortoiseOverlays.dll

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shelliconoverlayidentifiers\4TortoiseLocked]
@="{C5994563-53D9-4125-87C9-F193FC689CB2}"
[HKEY_CLASSES_ROOT\CLSID\{C5994563-53D9-4125-87C9-F193FC689CB2}]
2009-08-14 02:55 85768 ----a-w- c:\program files\Common Files\TortoiseOverlays\TortoiseOverlays.dll

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shelliconoverlayidentifiers\5TortoiseReadOnly]
@="{C5994564-53D9-4125-87C9-F193FC689CB2}"
[HKEY_CLASSES_ROOT\CLSID\{C5994564-53D9-4125-87C9-F193FC689CB2}]
2009-08-14 02:55 85768 ----a-w- c:\program files\Common Files\TortoiseOverlays\TortoiseOverlays.dll

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shelliconoverlayidentifiers\6TortoiseDeleted]
@="{C5994565-53D9-4125-87C9-F193FC689CB2}"
[HKEY_CLASSES_ROOT\CLSID\{C5994565-53D9-4125-87C9-F193FC689CB2}]
2009-08-14 02:55 85768 ----a-w- c:\program files\Common Files\TortoiseOverlays\TortoiseOverlays.dll

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shelliconoverlayidentifiers\7TortoiseAdded]
@="{C5994566-53D9-4125-87C9-F193FC689CB2}"
[HKEY_CLASSES_ROOT\CLSID\{C5994566-53D9-4125-87C9-F193FC689CB2}]
2009-08-14 02:55 85768 ----a-w- c:\program files\Common Files\TortoiseOverlays\TortoiseOverlays.dll

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shelliconoverlayidentifiers\8TortoiseIgnored]
@="{C5994567-53D9-4125-87C9-F193FC689CB2}"
[HKEY_CLASSES_ROOT\CLSID\{C5994567-53D9-4125-87C9-F193FC689CB2}]
2009-08-14 02:55 85768 ----a-w- c:\program files\Common Files\TortoiseOverlays\TortoiseOverlays.dll

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shelliconoverlayidentifiers\9TortoiseUnversioned]
@="{C5994568-53D9-4125-87C9-F193FC689CB2}"
[HKEY_CLASSES_ROOT\CLSID\{C5994568-53D9-4125-87C9-F193FC689CB2}]
2009-08-14 02:55 85768 ----a-w- c:\program files\Common Files\TortoiseOverlays\TortoiseOverlays.dll

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"ISUSScheduler"="c:\program files\Common Files\InstallShield\UpdateService\issch.exe" [2006-09-11 86960]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"IMJPMIG8.1"="c:\windows\IME\imjp8_1\IMJPMIG.EXE" [2004-08-04 208952]
"PHIME2002ASync"="c:\windows\system32\IME\TINTLGNT\TINTSETP.EXE" [2004-08-04 455168]
"PHIME2002A"="c:\windows\system32\IME\TINTLGNT\TINTSETP.EXE" [2004-08-04 455168]
"stgclean"="c:\sdwork\w32main2.exe" [2010-05-07 299008]
"ccApp"="c:\program files\Common Files\Symantec Shared\ccApp.exe" [2006-07-19 52896]
"vptray"="c:\progra~1\SYMANT~2\SYMANT~2\VPTray.exe" [2006-09-27 125168]
"BluetoothAuthenticationAgent"="bthprops.cpl" [2008-04-14 110592]
"TpShocks"="TpShocks.exe" [2008-06-06 181536]
"PWRMGRTR"="c:\progra~1\ThinkPad\UTILIT~1\PWRMGRTR.DLL" [2008-09-25 331776]
"BLOG"="c:\progra~1\ThinkPad\UTILIT~1\BatLogEx.DLL" [2008-09-25 208896]
"SynTPEnh"="c:\program files\Synaptics\SynTP\SynTPEnh.exe" [2008-07-03 1323008]
"TPFNF7"="c:\program files\Lenovo\NPDIRECT\TPFNF7SP.exe" [2008-12-19 60192]
"TPHOTKEY"="c:\program files\Lenovo\HOTKEY\TPOSDSVC.exe" [2008-03-24 68464]
"TPKMAPHELPER"="c:\program files\ThinkPad\Utilities\TpKmapAp.exe" [2007-01-09 868352]
"C4EBReg"="c:\program files\C4ebreg\c4ebreg.exe" [2010-02-25 482584]
"Isamtray"="c:\program files\C4ebreg\isamtray.exe" [2010-02-25 285976]
"EZEJMNAP"="c:\progra~1\ThinkPad\UTILIT~1\EzEjMnAp.Exe" [2008-06-05 242976]
"StartCCC"="c:\program files\ATI Technologies\ATI.ACE\Core-Static\CLIStart.exe" [2008-01-21 61440]
"IgfxTray"="c:\windows\system32\igfxtray.exe" [2008-12-19 150040]
"HotKeysCmds"="c:\windows\system32\hkcmd.exe" [2008-12-19 170520]
"Persistence"="c:\windows\system32\igfxpers.exe" [2008-12-19 141848]
"ISSI Service"="c:\sdwork\issimsvc.exe" [2010-02-11 241392]
"Synchronization Manager"="c:\windows\system32\mobsync.exe" [2008-04-14 143360]
"iTunesHelper"="c:\program files\iTunes\iTunesHelper.exe" [2010-04-28 142120]
"QuickTime Task"="c:\program files\QuickTime\QTTask.exe" [2010-03-18 421888]
"ISUSPM Startup"="c:\program files\Common Files\InstallShield\UpdateService\isuspm.exe" [2005-08-11 249856]

c:\documents and settings\All Users\Start Menu\Programs\Startup\
VPN Client.lnk - c:\windows\Installer\{08B785C1-3893-4154-B53B-F5D341D0AAAA}\Icon3E5562ED7.ico [2009-12-7 6144]

[HKEY_CURRENT_USER\software\microsoft\windows\currentversion\policies\explorer]
"NoDevMgrUpdate"= 1 (0x1)

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\pcsinst]
2007-11-02 10:45 49152 ----a-w- c:\windows\system32\pcsinst.dll

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\tpfnf2]
2006-09-06 16:37 34344 ----a-w- c:\program files\Lenovo\HOTKEY\notifyf2.dll

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\tphotkey]
2008-03-17 16:02 34080 ----a-w- c:\program files\Lenovo\HOTKEY\tphklock.dll

[HKLM\~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^Bluetooth.lnk]
path=c:\documents and settings\All Users\Start Menu\Programs\Startup\Bluetooth.lnk
backup=c:\windows\pss\Bluetooth.lnkCommon Startup

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Adobe Reader Speed Launcher]
2008-10-15 08:04 39792 ----a-w- c:\program files\Adobe\Reader 8.0\Reader\reader_sl.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Google Update]
2009-03-28 06:02 133104 ----atw- c:\documents and settings\Administrator\Local Settings\Application Data\Google\Update\GoogleUpdate.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\QuickTime Task]
2010-03-18 04:53 421888 ----a-w- c:\program files\QuickTime\QTTask.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\SunJavaUpdateSched]
2009-08-21 17:28 149280 ----a-w- c:\program files\Java\jre6\bin\jusched.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\services]
"FileZilla Server"=2 (0x2)
"DB2REMOTECMD_DB2COPY1"=3 (0x3)
"DB2MGMTSVC_DB2COPY1"=3 (0x3)
"DB2LICD_DB2COPY1"=3 (0x3)
"DB2GOVERNOR_DB2COPY1"=3 (0x3)
"DB2DAS00"=3 (0x3)
"btwdins"=2 (0x2)
"WZCSVC"=2 (0x2)
"wuauserv"=2 (0x2)
"wscsvc"=2 (0x2)

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=
"c:\\Documents and Settings\\Administrator\\Local Settings\\Application Data\\Google\\Google Talk Plugin\\googletalkplugin.dll"=
"c:\\Documents and Settings\\Administrator\\Local Settings\\Application Data\\Google\\Google Talk Plugin\\googletalkplugin.exe"=
"c:\\Program Files\\Microsoft Office\\Live Meeting 8\\Console\\PWConsole.exe"=
"c:\\Documents and Settings\\db2admin\\Local Settings\\Application Data\\Google\\Google Talk Plugin\\googletalkplugin.dll"=
"c:\\Documents and Settings\\db2admin\\Local Settings\\Application Data\\Google\\Google Talk Plugin\\googletalkplugin.exe"=
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"c:\\Program Files\\Skype\\Plugin Manager\\skypePM.exe"=
"c:\\Program Files\\Bonjour\\mDNSResponder.exe"=
"c:\\Program Files\\iTunes\\iTunes.exe"=
"c:\\Program Files\\Skype\\Phone\\Skype.exe"=

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\GloballyOpenPorts\List]


R0 TPDIGIMN;TPDIGIMN;c:\windows\system32\drivers\ApsHM86.sys [5/14/2008 9:21 AM 19496]
R3 e1yexpress;Intel® Gigabit Network Connections Driver;c:\windows\system32\drivers\e1y5132.sys [12/19/2008 6:17 AM 243856]
R3 EraserUtilRebootDrv;EraserUtilRebootDrv;c:\program files\Common Files\Symantec Shared\EENGINE\EraserUtilRebootDrv.sys [8/30/2009 8:56 AM 102448]
S3 IsamFilter;IsamFilter;c:\windows\system32\drivers\isamfilter.sys [10/8/2009 3:32 PM 6400]
S3 MEMSWEEP2;MEMSWEEP2;\??\c:\windows\system32\264.tmp --> c:\windows\system32\264.tmp [?]

UnknownUnknown dsload;dsload; [x]

--- Other Services/Drivers In Memory ---

*Deregistered* - dsgrab_01ca147c0fcebc2c

Contents of the 'Scheduled Tasks' folder

2010-05-11 c:\windows\Tasks\PMTask.job
- c:\progra~1\ThinkPad\UTILIT~1\PWMIDTSK.EXE [2008-12-19 01:47]
.
.
------- Supplementary Scan -------
.
uStart Page = hxxp://yahoo.com/
mStart Page = hxxp://yahoo.com
uInternet Connection Wizard,ShellNext = iexplore
uInternet Settings,ProxyOverride = ;;*.local;<local>
uSearchURL,(Default) = hxxp://yahoo.com/customize/ycomp/defaults/su/*http://yahoo.com
IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~2\Office12\EXCEL.EXE/3000
IE: Send to &Bluetooth Device... - c:\program files\ThinkPad\Bluetooth Software\btsendto_ie_ctx.htm
IE: Send To Bluetooth - c:\program files\ThinkPad\Bluetooth Software\btsendto_ie.htm
IE: {{898EA8C8-E7FF-479B-8935-AEC46303B9E5} - {898EA8C8-E7FF-479B-8935-AEC46303B9E5} - c:\program files\Skype\Toolbars\Internet Explorer\skypeieplugin.dll
DPF: Microsoft XML Parser for Java - file://c:\windows\Java\classes\xmldso.cab
FF - ProfilePath - c:\documents and settings\Administrator\Application Data\Mozilla\Firefox\Profiles\qb0l1osw.default\
FF - component: c:\program files\Mozilla Firefox\extensions\{AB2CE124-6272-4b12-94A9-7303C7397BD1}\components\SkypeFfComponent.dll
FF - plugin: c:\documents and settings\Administrator\Application Data\Mozilla\plugins\npatgpc.dll
FF - plugin: c:\documents and settings\Administrator\Application Data\Mozilla\plugins\npgoogletalk.dll
FF - plugin: c:\documents and settings\Administrator\Local Settings\Application Data\Google\Update\1.2.183.23\npGoogleOneClick8.dll
FF - plugin: c:\program files\DivX\DivX Plus Web Player\npdivx32.dll
FF - plugin: c:\program files\Mozilla Firefox\plugins\npatgpc.dll
FF - plugin: c:\program files\Mozilla Firefox\plugins\NPCentraUpdater.dll
FF - plugin: c:\program files\Mozilla Firefox\plugins\npcpsweb.dll
FF - plugin: c:\program files\Mozilla Firefox\plugins\npwdplugin821.dll

---- FIREFOX POLICIES ----
FF - user.js: yahoo.ytff.general.dontshowhpoffer - truec:\program files\Mozilla Firefox\greprefs\all.js - pref("ui.use_native_colors", true);
c:\program files\Mozilla Firefox\greprefs\all.js - pref("network.auth.force-generic-ntlm", false);
c:\program files\Mozilla Firefox\greprefs\all.js - pref("svg.smil.enabled", false);
c:\program files\Mozilla Firefox\greprefs\security-prefs.js - pref("security.ssl.allow_unrestricted_renego_everywhere__temporarily_available_pref", true);
c:\program files\Mozilla Firefox\greprefs\security-prefs.js - pref("security.ssl.renego_unrestricted_hosts", "");
c:\program files\Mozilla Firefox\greprefs\security-prefs.js - pref("security.ssl.treat_unsafe_negotiation_as_broken", false);
c:\program files\Mozilla Firefox\greprefs\security-prefs.js - pref("security.ssl.require_safe_negotiation", false);
c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("extensions.{972ce4c6-7e08-4474-a285-3208198ce6fd}.name", "chrome://browser/locale/browser.properties");
c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("extensions.{972ce4c6-7e08-4474-a285-3208198ce6fd}.description", "chrome://browser/locale/browser.properties");
c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("plugins.update.notifyUser", false);
.

**************************************************************************

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2010-05-11 22:26
Windows 5.1.2600 Service Pack 3 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully
hidden files: 0

**************************************************************************

[HKEY_LOCAL_MACHINE\System\ControlSet001\Services\MEMSWEEP2]
"ImagePath"="\??\c:\windows\system32\264.tmp"
.
--------------------- DLLs Loaded Under Running Processes ---------------------

- - - - - - - > 'winlogon.exe'(1288)
c:\windows\system32\Ati2evxx.dll
c:\program files\Lenovo\HOTKEY\tphklock.dll
c:\windows\system32\pcsinst.dll
c:\windows\system32\igfxdev.dll
c:\program files\Lenovo\HOTKEY\notifyf2.dll

- - - - - - - > 'explorer.exe'(3188)
c:\program files\Common Files\TortoiseOverlays\TortoiseOverlays.dll
c:\program files\TortoiseSVN\bin\TortoiseStub.dll
c:\program files\TortoiseSVN\bin\TortoiseSVN.dll
c:\program files\TortoiseSVN\bin\intl3_tsvn.dll
.
Completion time: 2010-05-11 22:35:35
ComboFix-quarantined-files.txt 2010-05-12 05:35
ComboFix2.txt 2010-05-10 06:24

Pre-Run: 71,364,825,088 bytes free
Post-Run: 71,439,024,128 bytes free

- - End Of File - - 6C13E124063CC32A7EE41893FE7FACD1


Thanks!

Edited by nawkturn, 12 May 2010 - 01:15 PM.


#8 Blade

Blade

    Strong in the Bleepforce


  • Site Admin
  • 12,792 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:US
  • Local time:06:53 PM

Posted 13 May 2010 - 10:52 PM

Hello nawkturn

Let's do a comprehensive scan to check for remaining malware on the machine. Please be aware that this scan will take some time to run.

Please go to the Kaspersky website and perform an online antivirus scan.
  1. Read through the requirements and privacy statement and click on Accept button.
  2. It will start downloading and installing the scanner and virus definitions. You will be prompted to install an application from Kaspersky. Click Run.
  3. When the downloads have finished, click on Settings.
  4. Make sure these boxes are checked (ticked). If they are not, please tick them and click on the Save button:
      Spyware, Adware, Dialers, and other potentially dangerous programs
      Archives
  5. Click on My Computer under Scan.
  6. Once the scan is complete, it will display the results. Click on View Scan Report.
  7. You will see a list of infected items there. Click on Save Report As....
  8. Save this report to a convenient place. Change the Files of type to Text file (.txt) before clicking on the Save button.
  9. Please post this log in your next reply .

~Blade


In your next reply, please include the following:
Kaspersky Log
How is the computer running?

animinionsmalltext.gif
If I am helping you, it has been 48 hours since your last post, and I have yet to reply to your topic, please send me a PM
Become a BleepingComputer fan: Facebook
Follow us on Twitter!


#9 nawkturn

nawkturn
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:06:53 PM

Posted 15 May 2010 - 06:51 PM

I am on it right now. I will keep you posted.

#10 Blade

Blade

    Strong in the Bleepforce


  • Site Admin
  • 12,792 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:US
  • Local time:06:53 PM

Posted 16 May 2010 - 02:45 AM

Alright, I'll keep a lookout for the results.

animinionsmalltext.gif
If I am helping you, it has been 48 hours since your last post, and I have yet to reply to your topic, please send me a PM
Become a BleepingComputer fan: Facebook
Follow us on Twitter!


#11 nawkturn

nawkturn
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:06:53 PM

Posted 16 May 2010 - 04:47 PM

Hello BZ,

Here is the report:


File name Threat Threats count
C:\Documents and Settings\All Users\Application Data\Symantec\Symantec AntiVirus Corporate Edition\7.5\Quarantine\05C80000.VBN Infected: Trojan.Win32.FraudPack.atgm 1
C:\Documents and Settings\All Users\Application Data\Symantec\Symantec AntiVirus Corporate Edition\7.5\Quarantine\05C80001\4FDE2CD7.VBN Infected: Trojan.Win32.FraudPack.aumu 1
C:\Documents and Settings\All Users\Application Data\Symantec\Symantec AntiVirus Corporate Edition\7.5\Quarantine\07DC0000\4FDEBA44.VBN Infected: Trojan.Win32.FraudPack.atgm 1
C:\Documents and Settings\All Users\Application Data\Symantec\Symantec AntiVirus Corporate Edition\7.5\Quarantine\07DC0001\4FDEBDE6.VBN Infected: Trojan.Win32.FraudPack.atgm 1
C:\Documents and Settings\All Users\Application Data\Symantec\Symantec AntiVirus Corporate Edition\7.5\Quarantine\07DC0002\4FDF1F47.VBN Infected: Trojan.Win32.FraudPack.atgm 1
C:\Documents and Settings\All Users\Application Data\Symantec\Symantec AntiVirus Corporate Edition\7.5\Quarantine\07DC0003.VBN Infected: Trojan.Win32.FraudPack.atgo 1
C:\Documents and Settings\All Users\Application Data\Symantec\Symantec AntiVirus Corporate Edition\7.5\Quarantine\07DC0004.VBN Infected: Trojan.Win32.FraudPack.atgo 1
C:\Documents and Settings\All Users\Application Data\Symantec\Symantec AntiVirus Corporate Edition\7.5\Quarantine\07DC0005.VBN Infected: Trojan.Win32.FraudPack.atgo 1
C:\Documents and Settings\All Users\Application Data\Symantec\Symantec AntiVirus Corporate Edition\7.5\Quarantine\0B740000\4BFDC57E.VBN Infected: Packed.Win32.Katusha.j 1
C:\Documents and Settings\All Users\Application Data\Symantec\Symantec AntiVirus Corporate Edition\7.5\Quarantine\0C200000.VBN Infected: Trojan.Win32.FraudPack.atgo 1
C:\Documents and Settings\All Users\Application Data\Symantec\Symantec AntiVirus Corporate Edition\7.5\Quarantine\11E40000\5BE5838E.VBN Infected: Packed.Win32.Katusha.j 1
C:\Documents and Settings\All Users\Application Data\Symantec\Symantec AntiVirus Corporate Edition\7.5\Quarantine\11E40001\5BE5888D.VBN Infected: Packed.Win32.Katusha.j 1
C:\Documents and Settings\All Users\Application Data\Symantec\Symantec AntiVirus Corporate Edition\7.5\Quarantine\11E40002\5BE58CA5.VBN Infected: Packed.Win32.Katusha.j 1
C:\Documents and Settings\All Users\Application Data\Symantec\Symantec AntiVirus Corporate Edition\7.5\Quarantine\11E40003\5BE59072.VBN Infected: Packed.Win32.Katusha.j 1
C:\Documents and Settings\All Users\Application Data\Symantec\Symantec AntiVirus Corporate Edition\7.5\Quarantine\11E40004\5BE59443.VBN Infected: Packed.Win32.Katusha.j 1
C:\Documents and Settings\All Users\Application Data\Symantec\Symantec AntiVirus Corporate Edition\7.5\Quarantine\11E40005\5BE597F7.VBN Infected: Packed.Win32.Katusha.j 1
C:\Documents and Settings\All Users\Application Data\Symantec\Symantec AntiVirus Corporate Edition\7.5\Quarantine\176C0000\5FEC94D7.VBN Infected: Packed.Win32.Katusha.j 1
C:\Documents and Settings\All Users\Application Data\Symantec\Symantec AntiVirus Corporate Edition\7.5\Quarantine\176C0001.VBN Infected: Packed.Win32.Katusha.j 1
C:\Documents and Settings\All Users\Application Data\Symantec\Symantec AntiVirus Corporate Edition\7.5\Quarantine\176C0002.VBN Infected: Packed.Win32.Katusha.j 1
C:\Documents and Settings\All Users\Application Data\Symantec\Symantec AntiVirus Corporate Edition\7.5\Quarantine\176C0003\5FECBB3E.VBN Infected: Packed.Win32.Krap.ao 1
C:\Documents and Settings\All Users\Application Data\Symantec\Symantec AntiVirus Corporate Edition\7.5\Quarantine\176C0004\5FECBB4D.VBN Infected: Packed.Win32.Krap.ao 1


It found few stuffs that were quarantined and apart from that, it seems to be clean. Is it safe to delete all the files from the quarantine folder?


About the overall observation on computer's behavior:

Before the process, there was certainly a lot of lag going on with svchost and the adware website connections were getting established as reported in the firewall. But now, it seems to be like it is back to normal state and I do not see any suspicious connections or lag from certain processes. I think the combofix has performed a ninja feat in killing all the bloody malwares and trojans. I should personally thank you for all the patience and diligence in getting me out of this pit.

thumbup.gif

#12 Blade

Blade

    Strong in the Bleepforce


  • Site Admin
  • 12,792 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:US
  • Local time:06:53 PM

Posted 18 May 2010 - 12:21 AM

Hello nawkturn.

QUOTE
I think the combofix has performed a ninja feat in killing all the bloody malwares and trojans.


LOL! hysterical.gif Don't think I've ever heard it put like that before.

Your Java is out of date. Older versions have vulnerabilities that malicious sites can use to exploit and infect your system. Please follow these steps to remove older version Java components and update:
  • Download the latest version of Java Runtime Environment (JRE) Version 6 and save it to your desktop.
  • Look for "Java Runtime Environment (JRE)" JRE 6 Update 20.
  • Click the Download button to the right.
  • Select your Platform: "Windows".
  • Select your Language: "Multi-language".
  • Read the License Agreement, and then check the box that says: "Accept License Agreement".
  • Click Continue and the page will refresh.
  • Under Required Files, check the box for Windows Offline Installation, click the link below it and save the file to your desktop.
  • Close any programs you may have running - especially your web browser.
Go to Start > Settings > Control Panel, double-click on Add/Remove Programs and remove all older versions of Java.
  • Check (highlight) any item with Java Runtime Environment (JRE or J2SE) in the name.
  • Click the Remove or Change/Remove button and follow the onscreen instructions for the Java uninstaller.
  • Repeat as many times as necessary to remove each Java versions.
  • Reboot your computer once all Java components are removed.
  • Then from your desktop double-click on jre-6u20-windows-i586.exe to install the newest version.
  • If using Windows Vista and the installer refuses to launch due to insufficient user permissions, then Run As Administrator.
-- If you choose to update via the Java applet in Control Panel, uncheck the option to install the Toolbar unless you want it.
-- Starting with Java 6u10, the uninstaller incorporated in each new release uses Enhanced Auto update to automatically remove the previous version when updating to a later update release. It will not remove older versions, so they will need to be removed manually.
-- Java is updated frequently. If you want to be automatically notified of future updates, just turn on the Java Automatic Update feature and you will not have to remember to update when Java releases a new version.


Note: The Java Quick Starter (JQS.exe) adds a service to improve the initial startup time of Java applets and applications. To disable the JQS service if you don't want to use it, go to Start > Control Panel > Java > Advanced > Miscellaneous and uncheck the box for Java Quick Starter. Click Ok and reboot your computer.

***************************************************

Your Adobe Reader is out of date. Please uninstall it through Add/Remove Programs and download the latest version from Adobe: Download
Please untick all proposed toolbars unless you really want them.

***************************************************
  • Click on Start>Run
  • Now type combofix /Uninstall in the runbox and click OK. Notice the space between the "x" and "/".
  • You will then recieve a message letting you know that Combofix was uninstalled Successfully.
This will remove files/folders assoicated with combofix and uninstall it.

***************************************************

Your machine appears to be clean!

If you disabled emulation drivers earlier, you can re-enable them now if you wish:

To re-enable your Emulation drivers, double click DeFogger to run the tool.
  • The application window will appear
  • Click the Re-enable button to re-enable your CD Emulation drivers
  • Click Yes to continue
  • A 'Finished!' message will appear
  • Click OK
  • DeFogger will now ask to reboot the machine - click OK
IMPORTANT! If you receive an error message while running DeFogger, please post the log defogger_enable which will appear on your desktop.

Your Emulation drivers are now re-enabled.

***************************************************

I highly recommend that you read through the below set of very helpful suggestions and implement them; they will help protect you from reinfectionI recommend you regularly visit the Windows Update Site!
  • Lots of Hacking/Trojans use the methods found (plugged by the updates) that have not been stopped by people not updating.
  • By updating your machine, you have one less headache!
  • Update ALL Critical updates and any other Windows updates for services/programs that you use.
  • If you wish, you can also use automatic updates. This is a good thing to have if you want to be up-to-date all the time, but can also be a bit of an annoyance due to its handling and the sizes of the updates. If you wish to turn on automatic updates then you will find here is a nice little article about turning on automatic updates.
  • Note that it will download them for you, but you still have to actually click install.
  • If you do not want to have automatic updates turned on, or are on dial-up, you can always download updates seperately at: http://windowsupdate.microsoft.com.
It is also a good idea to check for the latest versions of commonly installed applications that are regularly patched to fix vulnerabilities. You can check these by visiting Secunia Software Inspector and Calendar of Updates.

For a nice list of freeware programs in all categories, please have a look at this thread with freeware products that are regarded as useful by the users of this forum: Commonly Used Freeware Replacements.

Another recommendation, is to download HostsMan. It safeguards you with a regularly updated Hosts-file that blocks dangerous sites from opening. This adds another bit of safety while surfing the Internet. For installlation and setting up, follow these steps:
  1. Double-click the Downloaded installer and install the tool to a location of your choice
  2. Via the Startmenu, navigate to HostsMan and run the program.
    1. Click "Hosts" in the menu
    2. Click "Manage Updates" in the submenu
    3. Out of the three, select at least one of them (I have MVPS Host as my main one)
    4. Click "Add Update." After that you will only need to click on the following button to retrieve updates:
  3. Click the X to exit the program.
Finally, and definitely the MOST IMPORTANT step, click on the following tutorial and follow each step listed there:

Simple and easy ways to keep your computer safe and secure on the Internet

Glad I was able to help and if there any other problems related to your computer please feel free to post them in the appropriate forum. Though we help people with spyware and viruses here at BC, we also help people with other computer problems! Do not forget to tell your friends about us!

~Blade

Edited by Blade Zephon, 18 May 2010 - 12:22 AM.

animinionsmalltext.gif
If I am helping you, it has been 48 hours since your last post, and I have yet to reply to your topic, please send me a PM
Become a BleepingComputer fan: Facebook
Follow us on Twitter!


#13 nawkturn

nawkturn
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:06:53 PM

Posted 19 May 2010 - 09:16 AM

Hello BZ,

Thank you for the great help again. I feel relieved now I can't thank you and your team enough for the effort you guys put.

I used to think that this might be a paid service when I hit this forum through google. Now I am truly inspired after knowing what it is about, so I would like to spend a couple of hours every week to help out other folks to the best of my ability. I will go through the guidelines you posted on IRC sometime ago and start my service here.

Have a very good day!!

#14 Blade

Blade

    Strong in the Bleepforce


  • Site Admin
  • 12,792 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:US
  • Local time:06:53 PM

Posted 19 May 2010 - 06:13 PM

Hi nawkturn.

QUOTE
Now I am truly inspired after knowing what it is about, so I would like to spend a couple of hours every week to help out other folks to the best of my ability.


Look forward to seeing you around the forums thumbup2.gif

Since this issue appears to be resolved ... this Topic has been closed. Glad we could help. smile.gif

If you need this topic reopened, please send me a PM.
Please include the address of this thread in your request.
This applies only to the original topic starter.

Everyone else please start a new topic.

~Blade

animinionsmalltext.gif
If I am helping you, it has been 48 hours since your last post, and I have yet to reply to your topic, please send me a PM
Become a BleepingComputer fan: Facebook
Follow us on Twitter!





0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users