Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Browser search results are hijacked


  • This topic is locked This topic is locked
8 replies to this topic

#1 bcharles1002

bcharles1002

  • Members
  • 6 posts
  • OFFLINE
  •  
  • Local time:10:06 PM

Posted 12 May 2010 - 10:08 AM

Computer had security essentials 2010 rogueware and was removed using a combination of steps with hijackthis, malwarebytes, and spybot. Computer's only symptoms now are any searches in google or yahoo return search results that look correct, but once a link is clicked on it takes the user to another site.

For example a search for waffles would have a link to wikipedia on the results page, but clicking it loads a site like askalot or similar site.


It appears to be something messing with dns. Typing a url in manually works as expected.

Things tried:

malwarebytes
hijackthis
spybot s&d

Tried above in safe mode too. Reboots have been performed so that should flush DNS and ipconfig /all shows the correct DNS server. I also checked the hosts file. Nothing unusual there.

Thanks for the help.

Per the sticky topic/article on submitting requests here is the dds info (also attached the dds attach and ark files):


DDS (Ver_10-03-17.01) - NTFSx86 NETWORK
Run by katie at 9:02:00.25 on Wed 05/12/2010
Internet Explorer: 8.0.6001.18882
Microsoft® Windows Vista™ Business 6.0.6002.2.1252.1.1033.18.2021.1559 [GMT -4:00]

AV: Symantec AntiVirus *On-access scanning enabled* (Updated) {FB06448E-52B8-493A-90F3-E43226D3305C}
SP: Symantec AntiVirus *enabled* (Updated) {6C85A515-B91D-4D2B-AF18-40984A4A8493}
SP: Windows Defender *disabled* (Outdated) {D68DDC3A-831F-4FAE-9E44-DA132C1ACF46}

============== Running Processes ===============

C:\Windows\system32\wininit.exe
C:\Windows\system32\lsm.exe
C:\Windows\system32\svchost.exe -k DcomLaunch
C:\Windows\system32\svchost.exe -k rpcss
C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted
C:\Windows\system32\svchost.exe -k netsvcs
C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted
C:\Windows\system32\svchost.exe -k NetworkService
C:\Windows\system32\svchost.exe -k LocalService
C:\Windows\system32\svchost.exe -k LocalServiceNoNetwork
C:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted
C:\Windows\Explorer.EXE
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Users\katie\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\OZ81LFNU\HiJackThis[1].exe
C:\Windows\system32\NOTEPAD.EXE
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Users\katie\Desktop\dds.scr
C:\Windows\system32\wbem\wmiprvse.exe

============== Pseudo HJT Report ===============

uStart Page = hxxp://www.aol.com/
mDefault_Page_URL = hxxp://www.gateway.com
mWinlogon: Userinit=c:\windows\system32\Userinit.exe
BHO: Adobe PDF Reader Link Helper: {06849e9f-c8d7-4d59-b87d-784b7d6be0b3} - c:\program files\common files\adobe\acrobat\activex\AcroIEHelper.dll
BHO: Spybot-S&D IE Protection: {53707962-6f74-2d53-2644-206d7942484f} - c:\program files\spybot - search & destroy\SDHelper.dll
BHO: SSVHelper Class: {761497bb-d6f0-462c-b6eb-d4daf1d92d43} - c:\program files\java\jre1.6.0_01\bin\ssv.dll
BHO: Adobe PDF Conversion Toolbar Helper: {ae7cd045-e861-484f-8273-0445ee161910} - c:\program files\adobe\acrobat 8.0\acrobat\AcroIEFavClient.dll
TB: Adobe PDF: {47833539-d0c5-4125-9fa8-0819e2eaac93} - c:\program files\adobe\acrobat 8.0\acrobat\AcroIEFavClient.dll
EB: Adobe PDF: {182ec0be-5110-49c8-a062-beb1d02a220b} - c:\program files\adobe\acrobat 8.0\acrobat\AcroIEFavClient.dll
uRun: [SpybotSD TeaTimer] c:\program files\spybot - search & destroy\TeaTimer.exe
mRun: [Windows Defender] %ProgramFiles%\Windows Defender\MSASCui.exe -hide
mRun: [RemoteControl] "c:\program files\cyberlink\powerdvd\PDVDServ.exe"
mRun: [LanguageShortcut] "c:\program files\cyberlink\powerdvd\language\Language.exe"
mRun: [IgfxTray] c:\windows\system32\igfxtray.exe
mRun: [HotKeysCmds] c:\windows\system32\hkcmd.exe
mRun: [Persistence] c:\windows\system32\igfxpers.exe
mRun: [ccApp] "c:\program files\common files\symantec shared\ccApp.exe"
mRun: [vptray] c:\progra~1\symant~1\VPTray.exe
mRun: [googletalk] c:\program files\google\google talk\googletalk.exe /autostart
mRun: [Acrobat Assistant 8.0] "c:\program files\adobe\acrobat 8.0\acrobat\Acrotray.exe"
mRun: [<NO NAME>]
mRun: [RoxWatchTray] "c:\program files\common files\roxio shared\9.0\sharedcom\RoxWatchTray9.exe"
mRun: [SigmatelSysTrayApp] sttray.exe
mRunOnce: [Launcher] %WINDIR%\SMINST\launcher.exe
mRunOnce: [<NO NAME>]
mRunOnce: [GrpConv] grpconv -o
mPolicies-explorer: BindDirectlyToPropertySetStorage = 0 (0x0)
mPolicies-system: EnableLUA = 0 (0x0)
mPolicies-system: SoftwareSASGeneration = 3 (0x3)
mPolicies-system: EnableUIADesktopToggle = 0 (0x0)
IE: Append to existing PDF - c:\program files\adobe\acrobat 8.0\acrobat\AcroIEFavClient.dll/AcroIEAppend.html
IE: Convert link target to Adobe PDF - c:\program files\adobe\acrobat 8.0\acrobat\AcroIEFavClient.dll/AcroIECapture.html
IE: Convert link target to existing PDF - c:\program files\adobe\acrobat 8.0\acrobat\AcroIEFavClient.dll/AcroIEAppend.html
IE: Convert selected links to Adobe PDF - c:\program files\adobe\acrobat 8.0\acrobat\AcroIEFavClient.dll/AcroIECaptureSelLinks.html
IE: Convert selected links to existing PDF - c:\program files\adobe\acrobat 8.0\acrobat\AcroIEFavClient.dll/AcroIEAppendSelLinks.html
IE: Convert selection to Adobe PDF - c:\program files\adobe\acrobat 8.0\acrobat\AcroIEFavClient.dll/AcroIECapture.html
IE: Convert selection to existing PDF - c:\program files\adobe\acrobat 8.0\acrobat\AcroIEFavClient.dll/AcroIEAppend.html
IE: Convert to Adobe PDF - c:\program files\adobe\acrobat 8.0\acrobat\AcroIEFavClient.dll/AcroIECapture.html
IE: E&xport to Microsoft Excel - c:\progra~1\micros~2\office12\EXCEL.EXE/3000
IE: {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - {CAFEEFAC-0016-0000-0001-ABCDEFFEDCBC} - c:\program files\java\jre1.6.0_01\bin\ssv.dll
IE: {92780B25-18CC-41C8-B9BE-3C9C571A8263} - {FF059E31-CC5A-4E2E-BF3B-96E929D65503} - c:\progra~1\micros~2\office11\REFIEBAR.DLL
IE: {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - {53707962-6F74-2D53-2644-206D7942484F} - c:\program files\spybot - search & destroy\SDHelper.dll
DPF: {4788DE0A-3552-49EA-AC8C-233DA52523B9} - hxxp://www.blackberry.com/devicesoftware/AxLoader.cab
DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_01-windows-i586.cab
DPF: {CAFEEFAC-0016-0000-0001-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_01-windows-i586.cab
DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_01-windows-i586.cab
Notify: igfxcui - igfxdev.dll

============= SERVICES / DRIVERS ===============

S2 SavRoam;SAVRoam;c:\program files\symantec antivirus\SavRoam.exe [2006-11-28 122008]
S2 Symantec AntiVirus;Symantec AntiVirus;c:\program files\symantec antivirus\Rtvscan.exe [2006-11-28 1962136]
S3 EraserUtilRebootDrv;EraserUtilRebootDrv;c:\program files\common files\symantec shared\eengine\EraserUtilRebootDrv.sys [2009-9-3 102448]
S3 FontCache;Windows Font Cache Service;c:\windows\system32\svchost.exe -k LocalServiceAndNoImpersonation [2008-9-23 21504]
S3 NETw2v32;Intel® PRO/Wireless 2200BG Network Connection Driver for Windows Vista;c:\windows\system32\drivers\NETw2v32.sys [2006-11-2 2589184]
S3 OKI OPHC DCS Loader;OKI OPHC DCS Loader;c:\windows\system32\spool\drivers\w32x86\3\OPHCLDCS.EXE [2005-5-10 24576]

=============== Created Last 30 ================

2010-05-11 15:11:32 0 d-----w- c:\programdata\Spybot - Search & Destroy
2010-05-11 15:11:32 0 d-----w- c:\program files\Spybot - Search & Destroy
2010-05-10 19:53:38 904776 ----a-w- c:\windows\system32\drivers\tcpip.sys
2010-05-10 19:53:36 30720 ----a-w- c:\windows\system32\drivers\tcpipreg.sys
2010-05-10 15:16:52 3600456 ----a-w- c:\windows\system32\ntkrnlpa.exe
2010-05-10 15:16:51 3548216 ----a-w- c:\windows\system32\ntoskrnl.exe
2010-05-10 12:59:10 1314816 ----a-w- c:\windows\system32\quartz.dll
2010-05-10 12:59:09 50176 ----a-w- c:\windows\system32\iyuv_32.dll
2010-05-10 12:59:09 31744 ----a-w- c:\windows\system32\msvidc32.dll
2010-05-10 12:59:09 22528 ----a-w- c:\windows\system32\msyuv.dll
2010-05-10 12:59:09 13312 ----a-w- c:\windows\system32\msrle32.dll
2010-05-10 12:59:09 12288 ----a-w- c:\windows\system32\tsbyuv.dll
2010-05-10 12:59:08 91136 ----a-w- c:\windows\system32\avifil32.dll
2010-05-10 12:59:08 82944 ----a-w- c:\windows\system32\mciavi32.dll
2010-05-10 12:59:08 123904 ----a-w- c:\windows\system32\msvfw32.dll
2010-05-10 12:59:03 212992 ----a-w- c:\windows\system32\drivers\mrxsmb10.sys
2010-05-10 12:59:03 105984 ----a-w- c:\windows\system32\drivers\mrxsmb.sys
2010-05-07 15:20:11 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2010-05-07 15:20:10 20952 ----a-w- c:\windows\system32\drivers\mbam.sys
2010-05-06 19:09:49 0 d-----w- c:\users\katie\appdata\roaming\Malwarebytes
2010-05-06 19:09:41 0 d-----w- c:\programdata\Malwarebytes
2010-05-06 19:09:41 0 d-----w- c:\program files\Malwarebytes' Anti-Malware
2010-05-06 13:43:58 108281766 ----a-w- c:\windows\MEMORY.DMP
2010-05-06 13:38:49 16 ----a-w- c:\users\katie\appdata\roaming\woxcdv.dat
2010-04-21 13:15:25 0 d-----w- c:\users\katie\appdata\roaming\scdata
2010-04-21 13:10:55 70 ----a-w- c:\users\katie\appdata\roaming\wp4.dat
2010-04-21 13:10:55 36 ----a-w- c:\users\katie\appdata\roaming\skynet.dat
2010-04-21 13:10:55 3 ----a-w- c:\users\katie\appdata\roaming\wp3.dat

==================== Find3M ====================

2010-03-05 21:06:46 0 ----a-w- c:\users\katie\appdata\roaming\wklnhst.dat
2010-01-06 08:06:16 51200 ----a-w- c:\windows\inf\infpub.dat
2010-01-06 08:06:15 86016 ----a-w- c:\windows\inf\infstor.dat
2010-01-06 08:06:15 665600 ----a-w- c:\windows\inf\drvindex.dat
2010-01-06 08:06:15 143360 ----a-w- c:\windows\inf\infstrng.dat
2009-03-09 13:48:46 174 --sha-w- c:\program files\desktop.ini
2006-11-02 12:42:07 30674 ----a-w- c:\windows\inf\perflib\0409\perfd.dat
2006-11-02 12:42:07 30674 ----a-w- c:\windows\inf\perflib\0409\perfc.dat
2006-11-02 12:42:07 287440 ----a-w- c:\windows\inf\perflib\0409\perfi.dat
2006-11-02 12:42:07 287440 ----a-w- c:\windows\inf\perflib\0409\perfh.dat
2006-11-02 09:20:21 287440 ----a-w- c:\windows\inf\perflib\0000\perfi.dat
2006-11-02 09:20:21 287440 ----a-w- c:\windows\inf\perflib\0000\perfh.dat
2006-11-02 09:20:19 30674 ----a-w- c:\windows\inf\perflib\0000\perfd.dat
2006-11-02 09:20:19 30674 ----a-w- c:\windows\inf\perflib\0000\perfc.dat
2008-03-24 18:55:08 16384 --sha-w- c:\windows\temp\cookies\index.dat
2008-03-24 18:55:08 16384 --sha-w- c:\windows\temp\history\history.ie5\index.dat
2008-03-24 18:55:08 32768 --sha-w- c:\windows\temp\temporary internet files\content.ie5\index.dat

============= FINISH: 9:04:32.94 ===============

Attached Files



BC AdBot (Login to Remove)

 


#2 bcharles1002

bcharles1002
  • Topic Starter

  • Members
  • 6 posts
  • OFFLINE
  •  
  • Local time:10:06 PM

Posted 12 May 2010 - 10:14 AM

rkill was the other thing used to help get rid of se2010. followed this from your site http://www.bleepingcomputer.com/virus-remo...essentials-2010

again thanks for the help

#3 fireman4it

fireman4it

    Bleepin' Fireman


  • Malware Response Team
  • 13,505 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Greenup, Ill USA
  • Local time:10:06 PM

Posted 12 May 2010 - 10:55 AM

Hello bcharles1002,
  • Welcome to Bleeping Computer.
  • My name is fireman4it and I will be helping you with your Malware problem.

    Please take note of some guidelines for this fix:
  • Refrain from making any changes to your computer including installing/uninstall programs, deleting files, modifying the registry, and running scanners or tools.
  • If you do not understand any step(s) provided, please do not hesitate to ask before continuing.
  • Even if things appear to be better, it might not mean we are finished. Please continue to follow my instructions and reply back until I give you the "all clean".
  • Finally, please reply using the button in the lower right hand corner of your screen. Do not start a new topic. The logs that you post should be pasted directly into the reply, unless they do not fit into the post.

1.
We need to disable Spybot S&D's "TeaTimer"
TeaTimer works by preventing ANY changes to the system. It will attempt to undo any fixes we run, because it blocks these fixes from running.

In order to safeguard your system from problems that can be brought on by a half finished fix, we need to disable TeaTimer. We can reenable it when we're done if you like.
  1. Open SpyBot Search and Destroy by going to Start -> All Programs -> Spybot Search and Destroy -> Spybot Search and Destroy.
  2. If prompted with a legal dialog, accept the warning.
  3. Click and then on "Advanced Mode"
  4. You may be presented with a warning dialog. If so, press
  5. Click on
  6. Click on
  7. Uncheck this checkbox:
  8. Close/Exit Spybot Search and Destroy

2.
We need to disable your Windows Defender Real-time Protection as it may interfere with the fixes that we need to make.
  • Open Windows Defender.
  • Click on Tools, General Settings.
  • Scroll down and uncheck Turn on real-time protection (recommended).
  • After you uncheck this, click on the Save button and close Windows Defender.
After all of the fixes are complete it is very important that you enable Real-time Protection again.

3.
Install Recovery Console and Run ComboFix

This tool is not a toy. If used the wrong way you could trash your computer. Please use only under direction of a Helper. If you decide to do so anyway, please do not blame me or ComboFix.

Download Combofix from any of the links below, and save it to your desktop.

Link 1
Link 2
  • Close/disable all anti-virus and anti-malware programs so they do not interfere with the running of ComboFix. Refer to this page if you are not sure how.
  • Close any open windows, including this one.
  • Double click on ComboFix.exe & follow the prompts.
  • As part of it's process, ComboFix will check to see if the Microsoft Windows Recovery Console is installed. With malware infections being as they are today, it's strongly recommended to have this pre-installed on your machine before doing any malware removal. It will allow you to boot up into a special recovery/repair mode that will allow us to more easily help you should your computer have a problem after an attempted removal of malware.
  • If you did not have it installed, you will see the prompt below. Choose YES.
  • Follow the prompts to allow ComboFix to download and install the Microsoft Windows Recovery Console, and when prompted, agree to the End-User License Agreement to install the Microsoft Windows Recovery Console.

**Please note: If the Microsoft Windows Recovery Console is already installed, ComboFix will continue it's malware removal procedures.

Note:The Windows Recovery Console will allow you to boot up into a special recovery (repair) mode. This allows us to more easily help you
should your computer have a problem after an attempted removal of malware. It is a simple procedure that will only take a few moments of your time.
  • Once the Microsoft Windows Recovery Console is installed using ComboFix, you should see the following message:

  • Click on Yes, to continue scanning for malware.
  • When finished, it will produce a report for you. Please post the contents of the log (C:\ComboFix.txt).
Leave your computer alone while ComboFix is running.
ComboFix will restart your computer if malware is found; allow it to do so.


Note: Please Do NOT mouseclick combofix's window while its running because it may cause it to stall.

Things to include in your next reply:
Combofix.txt
How is your machine running now? Any redirects?

" Extinguishing Malware from the world"

The Virus, Trojan, Spyware, and Malware Removal forum is very busy. If I'm helping you and I've not posted back within 24 hrs., send a PM with your topic link. Thank you.

ALL OTHER HELP REQUESTS VIA THE PM SYSTEM WILL BE IGNORED. The Forums are there for a reason!
Thanks-


  userbar_eis_500.gif

If I have helped you, consider making a donation to help me continue the fight against Malware! Just click btn_donate_LG.gif


#4 bcharles1002

bcharles1002
  • Topic Starter

  • Members
  • 6 posts
  • OFFLINE
  •  
  • Local time:10:06 PM

Posted 12 May 2010 - 01:44 PM

Thank you very much. So far there have been no redirects and the system is operational. Here is the combofix log:

ComboFix 10-05-11.06 - katie 05/12/2010 13:40:50.1.2 - x86
Microsoft® Windows Vista™ Business 6.0.6002.2.1252.1.1033.18.2021.1065 [GMT -4:00]
Running from: c:\users\katie\Desktop\ComboFix.exe
AV: Symantec AntiVirus *On-access scanning disabled* (Updated) {FB06448E-52B8-493A-90F3-E43226D3305C}
SP: Symantec AntiVirus *disabled* (Updated) {6C85A515-B91D-4D2B-AF18-40984A4A8493}
SP: Windows Defender *disabled* (Outdated) {D68DDC3A-831F-4FAE-9E44-DA132C1ACF46}
* Created a new restore point
.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.

c:\programdata\Macromedia\SwUpdate
c:\programdata\Macromedia\SwUpdate\Flags.dtd
c:\programdata\Macromedia\SwUpdate\UA.dtd
c:\programdata\Macromedia\SwUpdate\UAcpt.dtd
c:\users\katie\AppData\Local\Microsoft\Windows\Temporary Internet Files\6XnPjM.jpg
c:\users\katie\AppData\Local\Microsoft\Windows\Temporary Internet Files\7Y7ya4px.jpg
c:\users\katie\AppData\Local\Microsoft\Windows\Temporary Internet Files\B5kMOJp0A.jpg
c:\users\katie\AppData\Local\Microsoft\Windows\Temporary Internet Files\x2XaOLB80.jpg
c:\users\katie\g2mdlhlpx.exe
D:\Autorun.inf

Infected copy of c:\windows\system32\drivers\mouclass.sys was found and disinfected
Restored copy from - Kitty had a snack tongue.gif
.
((((((((((((((((((((((((( Files Created from 2010-04-12 to 2010-05-12 )))))))))))))))))))))))))))))))
.

2010-05-12 17:48 . 2010-05-12 17:48 -------- d-----w- c:\users\RA-Admin\AppData\Local\temp
2010-05-12 17:48 . 2010-05-12 17:48 -------- d-----w- c:\users\katie\AppData\Local\temp
2010-05-12 17:31 . 2010-05-12 17:32 -------- d-----w- C:\32788R22FWJFW
2010-05-11 15:11 . 2010-05-11 17:37 -------- d-----w- c:\programdata\Spybot - Search & Destroy
2010-05-11 15:11 . 2010-05-11 15:14 -------- d-----w- c:\program files\Spybot - Search & Destroy
2010-05-10 19:53 . 2009-12-08 20:01 904776 ----a-w- c:\windows\system32\drivers\tcpip.sys
2010-05-10 19:53 . 2009-12-08 17:26 30720 ----a-w- c:\windows\system32\drivers\tcpipreg.sys
2010-05-10 15:16 . 2009-12-08 20:01 3600456 ----a-w- c:\windows\system32\ntkrnlpa.exe
2010-05-10 15:16 . 2009-12-08 20:01 3548216 ----a-w- c:\windows\system32\ntoskrnl.exe
2010-05-10 12:59 . 2009-12-04 18:29 1314816 ----a-w- c:\windows\system32\quartz.dll
2010-05-10 12:59 . 2009-12-04 18:30 12288 ----a-w- c:\windows\system32\tsbyuv.dll
2010-05-10 12:59 . 2009-12-04 18:28 22528 ----a-w- c:\windows\system32\msyuv.dll
2010-05-10 12:59 . 2009-12-04 18:28 31744 ----a-w- c:\windows\system32\msvidc32.dll
2010-05-10 12:59 . 2009-12-04 18:28 13312 ----a-w- c:\windows\system32\msrle32.dll
2010-05-10 12:59 . 2009-12-04 18:28 50176 ----a-w- c:\windows\system32\iyuv_32.dll
2010-05-10 12:59 . 2009-12-04 18:28 123904 ----a-w- c:\windows\system32\msvfw32.dll
2010-05-10 12:59 . 2009-12-04 18:28 82944 ----a-w- c:\windows\system32\mciavi32.dll
2010-05-10 12:59 . 2009-12-04 18:27 91136 ----a-w- c:\windows\system32\avifil32.dll
2010-05-10 12:59 . 2009-12-04 15:56 212992 ----a-w- c:\windows\system32\drivers\mrxsmb10.sys
2010-05-10 12:59 . 2009-12-04 15:56 105984 ----a-w- c:\windows\system32\drivers\mrxsmb.sys
2010-05-07 15:20 . 2010-04-29 19:39 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2010-05-07 15:20 . 2010-04-29 19:39 20952 ----a-w- c:\windows\system32\drivers\mbam.sys
2010-05-06 19:09 . 2010-05-06 19:09 -------- d-----w- c:\users\katie\AppData\Roaming\Malwarebytes
2010-05-06 19:09 . 2010-05-07 15:20 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
2010-05-06 19:09 . 2010-05-06 19:09 -------- d-----w- c:\programdata\Malwarebytes
2010-04-21 13:15 . 2010-05-04 13:21 -------- d-----w- c:\users\katie\AppData\Roaming\scdata

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2010-05-11 13:47 . 2006-11-02 11:18 -------- d-----w- c:\program files\Windows Mail
2010-05-11 13:46 . 2008-03-24 19:18 -------- d-----w- c:\programdata\Microsoft Help
2010-05-06 13:38 . 2010-05-06 13:38 16 ----a-w- c:\users\katie\AppData\Roaming\woxcdv.dat
2010-05-06 13:22 . 2008-05-12 12:40 -------- d-----w- c:\programdata\FLEXnet
2010-04-21 13:19 . 2010-04-21 13:10 70 ----a-w- c:\users\katie\AppData\Roaming\wp4.dat
2010-04-21 13:19 . 2010-04-21 13:10 3 ----a-w- c:\users\katie\AppData\Roaming\wp3.dat
2010-04-21 13:10 . 2010-04-21 13:10 36 ----a-w- c:\users\katie\AppData\Roaming\skynet.dat
2010-03-05 21:06 . 2010-03-05 21:06 0 ----a-w- c:\users\katie\AppData\Roaming\wklnhst.dat
.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"Windows Defender"="c:\program files\Windows Defender\MSASCui.exe" [2008-01-19 1008184]
"RemoteControl"="c:\program files\CyberLink\PowerDVD\PDVDServ.exe" [2006-12-07 69216]
"LanguageShortcut"="c:\program files\CyberLink\PowerDVD\Language\Language.exe" [2006-12-06 54832]
"IgfxTray"="c:\windows\system32\igfxtray.exe" [2008-01-02 141848]
"HotKeysCmds"="c:\windows\system32\hkcmd.exe" [2008-01-02 166424]
"Persistence"="c:\windows\system32\igfxpers.exe" [2008-01-02 133656]
"ccApp"="c:\program files\Common Files\Symantec Shared\ccApp.exe" [2006-11-22 107112]
"vptray"="c:\progra~1\SYMANT~1\VPTray.exe" [2006-11-28 134808]
"googletalk"="c:\program files\Google\Google Talk\googletalk.exe" [2007-01-01 3739648]
"Acrobat Assistant 8.0"="c:\program files\Adobe\Acrobat 8.0\Acrobat\Acrotray.exe" [2008-01-11 623992]
"RoxWatchTray"="c:\program files\Common Files\Roxio Shared\9.0\SharedCOM\RoxWatchTray9.exe" [2008-06-08 236016]
"SigmatelSysTrayApp"="sttray.exe" [2006-11-22 303104]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce]
"Launcher"="c:\windows\SMINST\launcher.exe" [2007-07-13 40072]

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\system]
"EnableLUA"= 0 (0x0)
"SoftwareSASGeneration"= 3 (0x3)
"EnableUIADesktopToggle"= 0 (0x0)

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\group policy\state\S-1-5-21-220523388-1659004503-682003330-1208\Scripts\Logon\0\0]
"Script"=\\raserver001\SYSVOL\GrantExperts.Com\scripts\map.bat

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\group policy\state\S-1-5-21-220523388-1659004503-682003330-2179\Scripts\Logon\0\0]
"Script"=\\raserver001\SYSVOL\GrantExperts.Com\scripts\map.bat

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\WinDefend]
@="Service"

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\atchk]
2007-01-27 08:59 400192 ----a-w- c:\program files\Intel\AMT\atchk.exe

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\McAfeeAntiSpyware]
"DisableMonitoring"=dword:00000001

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecAntiVirus]
"DisableMonitoring"=dword:00000001

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Svc]
"VistaSp2"=hex(cool.gif:a2,a8,38,92,31,f1,ca,01

R1 aefb;aefb;c:\windows\system32\aefb.sys [x]
R3 NETw2v32;Intel® PRO/Wireless 2200BG Network Connection Driver for Windows Vista;c:\windows\system32\DRIVERS\NETw2v32.sys [2006-11-02 2589184]
R3 OKI OPHC DCS Loader;OKI OPHC DCS Loader;c:\windows\system32\spool\DRIVERS\W32X86\3\OPHCLDCS.EXE [2005-05-10 24576]
S2 SavRoam;SavRoam;c:\program files\Symantec AntiVirus\SavRoam.exe [2006-11-28 122008]
S3 EraserUtilRebootDrv;EraserUtilRebootDrv;c:\program files\Common Files\Symantec Shared\EENGINE\EraserUtilRebootDrv.sys [2009-09-03 102448]


[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\svchost]
LocalServiceNoNetwork REG_MULTI_SZ PLA DPS BFE mpssvc
HPZ12 REG_MULTI_SZ Pml Driver HPZ12 Net Driver HPZ12
LocalServiceAndNoImpersonation REG_MULTI_SZ FontCache
.
.
------- Supplementary Scan -------
.
uStart Page = hxxp://www.aol.com/
IE: Append to existing PDF - c:\program files\Adobe\Acrobat 8.0\Acrobat\AcroIEFavClient.dll/AcroIEAppend.html
IE: Convert link target to Adobe PDF - c:\program files\Adobe\Acrobat 8.0\Acrobat\AcroIEFavClient.dll/AcroIECapture.html
IE: Convert link target to existing PDF - c:\program files\Adobe\Acrobat 8.0\Acrobat\AcroIEFavClient.dll/AcroIEAppend.html
IE: Convert selected links to Adobe PDF - c:\program files\Adobe\Acrobat 8.0\Acrobat\AcroIEFavClient.dll/AcroIECaptureSelLinks.html
IE: Convert selected links to existing PDF - c:\program files\Adobe\Acrobat 8.0\Acrobat\AcroIEFavClient.dll/AcroIEAppendSelLinks.html
IE: Convert selection to Adobe PDF - c:\program files\Adobe\Acrobat 8.0\Acrobat\AcroIEFavClient.dll/AcroIECapture.html
IE: Convert selection to existing PDF - c:\program files\Adobe\Acrobat 8.0\Acrobat\AcroIEFavClient.dll/AcroIEAppend.html
IE: Convert to Adobe PDF - c:\program files\Adobe\Acrobat 8.0\Acrobat\AcroIEFavClient.dll/AcroIECapture.html
IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~2\Office12\EXCEL.EXE/3000
.

**************************************************************************
scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully
hidden files:

**************************************************************************
.
--------------------- LOCKED REGISTRY KEYS ---------------------

[HKEY_LOCAL_MACHINE\system\ControlSet001\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0000\AllUserSettings]
@Denied: (A) (Users)
@Denied: (A) (Everyone)
@Allowed: (B 1 2 3 4 5) (S-1-5-20)
"BlindDial"=dword:00000000
.
Completion time: 2010-05-12 13:50:57
ComboFix-quarantined-files.txt 2010-05-12 17:50

Pre-Run: 28,843,225,088 bytes free
Post-Run: 28,733,657,088 bytes free

- - End Of File - - EDD58583244A53559FEF2E807666A742


#5 fireman4it

fireman4it

    Bleepin' Fireman


  • Malware Response Team
  • 13,505 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Greenup, Ill USA
  • Local time:10:06 PM

Posted 12 May 2010 - 03:44 PM

Hello,

Looks like we got the main infection! Lets do some more checking.

We need to run a CFScript.

1. Close any open browsers.

2. Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.

3. Open notepad and copy/paste the text in the codebox below into it:

CODE
File::
c:\windows\system32\aefb.sys

reglock::
[HKEY_LOCAL_MACHINE\system\ControlSet001\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0000]

Registry::
[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\McAfeeAntiSpyware]
"DisableMonitoring"=-

Driver::
aefb


Save this as CFScript.txt, in the same location as ComboFix.exe

2.
Please download Malwarebytes Anti-Malware (v1.44) and save it to your desktop.MBAM may "make changes to your registry" as part of its disinfection routine. If using other security programs that detect registry changes (ie Spybot's Teatimer), they may interfere or alert you. Temporarily disable such programs or permit them to allow the changes.
  • Make sure you are connected to the Internet.
  • Double-click on mbam-setup.exe to install the application.
    For instructions with screenshots, please refer to the How to use Malwarebytes' Anti-Malware Guide.
  • When the installation begins, follow the prompts and do not make any changes to default settings.
  • When installation has finished, make sure you leave both of these checked:
    • Update Malwarebytes' Anti-Malware
    • Launch Malwarebytes' Anti-Malware
  • Then click Finish.
MBAM will automatically start and you will be asked to update the program before performing a scan.
  • If an update is found, the program will automatically update itself. Press the OK button to close that box and continue.
  • If you encounter any problems while downloading the definition updates, manually download them from here and just double-click on mbam-rules.exe to install.
On the Scanner tab:
  • Make sure the "Perform Quick Scan" option is selected.
  • Then click on the Scan button.
  • If asked to select the drives to scan, leave all the drives selected and click on the Start Scan button.
  • The scan will begin and "Scan in progress" will show at the top. It may take some time to complete so please be patient.
  • When the scan is finished, a message box will say "The scan completed successfully. Click 'Show Results' to display all objects found".
  • Click OK to close the message box and continue with the removal process.
Back at the main Scanner screen:
  • Click on the Show Results button to see a list of any malware that was found.
  • Make sure that everything is checked, and click Remove Selected.
  • When removal is completed, a log report will open in Notepad.
  • The log is automatically saved and can be viewed by clicking the Logs tab in MBAM.
  • Copy and paste the contents of that report in your next reply. Be sure to post the complete log to include the top portion which shows MBAM's database version and your operating system.
  • Exit MBAM when done.
Note: If MBAM encounters a file that is difficult to remove, you will be asked to reboot your computer so MBAM can proceed with the disinfection process. If asked to restart the computer, please do so immediately. Failure to reboot normally (not into safe mode) will prevent MBAM from removing all the malware.

3.
I'd like us to scan your machine with ESET OnlineScan
  1. Hold down Control and click on the following link to open ESET OnlineScan in a new window.
    ESET OnlineScan
  2. Click the button.
  3. For alternate browsers only: (Microsoft Internet Explorer users can skip these steps)
    1. Click on to download the ESET Smart Installer. Save it to your desktop.
    2. Double click on the icon on your desktop.
  4. Check
  5. Click the button.
  6. Accept any security warnings from your browser.
  7. Check
  8. Push the Start button.
  9. ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this can take some time.
  10. When the scan completes, push
  11. Push , and save the file to your desktop using a unique name, such as ESETScan. Include the contents of this report in your next reply.
  12. Push the button.
  13. Push
Note for Vista Users: Eset is compatible but Internet Explorer must be run as Administrator. To do this, right-click on the IE icon in the Start Menu or Quick Launch Bar on the Taskbar and select "Run as Administrator" from the context menu.)

You can refer to this short video by: neomage
**Note**
To optimize scanning time and produce a more sensible report for review:
  • Close any open programs
  • Turn off the real time scanner of any existing antivirus program while performing the online scan.

4.
New Adobe Reader Installation:
  • Go here and click on the Download button to download the latest version of Adobe Reader.
  • Save this file to your desktop and run it to install the latest version of Adobe Reader.

5.
Your version of Java is out of date. Older versions have vulnerabilities that malicious sites can use to exploit and infect your system. Please follow these steps to remove older version Java components and update:
  • Download the latest version of Java Runtime Environment (JRE) Version 6 and save it to your desktop.
  • Look for "JDK 6 Update 20 (JDK or JRE)".
  • Click the "Download JRE" button to the right.
  • Select your Platform: "Windows".
  • Select your Language: "Multi-language".
  • Read the License Agreement, and then check the box that says: "Accept License Agreement".
  • Click Continue and the page will refresh.
  • Under Required Files, check the box for Windows Offline Installation, click the link below it and save the file to your desktop.
  • Close any programs you may have running - especially your web browser.
Go to Start > Settings > Control Panel, double-click on Add/Remove Programs and remove all older versions of Java.
  • Check (highlight) any item with Java Runtime Environment (JRE or J2SE) in the name.
  • Click the Remove or Change/Remove button and follow the onscreen instructions for the Java uninstaller.
  • Repeat as many times as necessary to remove each Java versions.
  • Reboot your computer once all Java components are removed.
  • Then from your desktop double-click on jre-6u20-windows-i586.exe to install the newest version.
  • If using Windows Vista and the installer refuses to launch due to insufficient user permissions, then Run As Administrator.
  • When the Java Setup - Welcome window opens, click the Install > button.
  • If offered to install a Toolbar, just uncheck the box before continuing unless you want it.
-- Starting with Java 6u10, the uninstaller incorporated in each new release uses Enhanced Auto update to automatically remove the previous version when updating to a later update release. It will not remove older versions, so they will need to be removed manually.
-- Java is updated frequently. If you want to be automatically notified of future updates, just turn on the Java Automatic Update feature and you will not have to remember to update when Java releases a new version.


Note: The Java Quick Starter (JQS.exe) adds a service to improve the initial startup time of Java applets and applications. To disable the JQS service if you don't want to use it, go to Start > Control Panel > Java > Advanced > Miscellaneous and uncheck the box for Java Quick Starter. Click Ok and reboot your computer.

Things to include in your next reply:
Combofix.txt
MBAM log
ESET log
A new DDS log
How is your machine running now?




Refering to the picture above, drag CFScript into ComboFix.exe

When finished, it shall produce a log for you at C:\ComboFix.txt which I will require in your next reply.

" Extinguishing Malware from the world"

The Virus, Trojan, Spyware, and Malware Removal forum is very busy. If I'm helping you and I've not posted back within 24 hrs., send a PM with your topic link. Thank you.

ALL OTHER HELP REQUESTS VIA THE PM SYSTEM WILL BE IGNORED. The Forums are there for a reason!
Thanks-


  userbar_eis_500.gif

If I have helped you, consider making a donation to help me continue the fight against Malware! Just click btn_donate_LG.gif


#6 bcharles1002

bcharles1002
  • Topic Starter

  • Members
  • 6 posts
  • OFFLINE
  •  
  • Local time:10:06 PM

Posted 13 May 2010 - 11:33 AM

Thank you. I have conducted the scans and updated adobe and jre. System appears to be operating normally. Here is the info:

combofix:
ComboFix 10-05-11.06 - katie 05/13/2010 12:06:53.2.2 - x86
Microsoft® Windows Vista™ Business 6.0.6002.2.1252.1.1033.18.2021.1120 [GMT -4:00]
Running from: C:\ComboFix.exe
Command switches used :: C:\CFScript.txt
AV: Symantec AntiVirus *On-access scanning disabled* (Updated) {FB06448E-52B8-493A-90F3-E43226D3305C}
SP: Symantec AntiVirus *disabled* (Updated) {6C85A515-B91D-4D2B-AF18-40984A4A8493}
SP: Windows Defender *disabled* (Outdated) {D68DDC3A-831F-4FAE-9E44-DA132C1ACF46}

FILE ::
"c:\windows\system32\aefb.sys"
.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.
C:\Users\katie\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\2\64956e82-38e9b08b multiple threats deleted - quarantined
C:\Users\katie\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\35\11cce563-54bb2059 multiple threats deleted - quarantined
C:\Users\katie\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\40\2d3a2a68-592930c5 Java/TrojanDownloader.Agent.NAM trojan deleted - quarantined
C:\Users\katie\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\40\4c871c68-7376075b multiple threats deleted - quarantined
C:\Users\katie\AppData\Roaming\scdata\wispex.html Win32/Adware.WinAntiVirus application cleaned by deleting - quarantined
C:\Windows\System32\config\systemprofile\AppData\Local\jrivtgbeb\dnsdssxtssd.exe a variant of Win32/Kryptik.EGS trojan cleaned by deleting - quarantined

.
((((((((((((((((((((((((((((((((((((((( Drivers/Services )))))))))))))))))))))))))))))))))))))))))))))))))
.

-------\Legacy_AEFB
-------\Service_aefb


((((((((((((((((((((((((( Files Created from 2010-04-13 to 2010-05-13 )))))))))))))))))))))))))))))))
.

2010-05-13 16:12 . 2010-05-13 16:12 -------- d-----w- c:\users\RA-Admin\AppData\Local\temp
2010-05-13 16:12 . 2010-05-13 16:12 -------- d-----w- c:\users\Public\AppData\Local\temp
2010-05-13 16:12 . 2010-05-13 16:12 -------- d-----w- c:\users\ed\AppData\Local\temp
2010-05-13 16:12 . 2010-05-13 16:12 -------- d-----w- c:\users\Default\AppData\Local\temp
2010-05-13 16:12 . 2010-05-13 16:12 -------- d-----w- c:\users\blake\AppData\Local\temp
2010-05-13 15:55 . 2010-05-13 15:55 -------- d-----w- c:\program files\Common Files\Java
2010-05-13 15:54 . 2010-05-13 15:54 411368 ----a-w- c:\windows\system32\deployJava1.dll
2010-05-13 15:54 . 2010-05-13 15:54 -------- d-----w- c:\program files\Java
2010-05-13 12:36 . 2010-05-13 12:36 -------- d-----w- c:\program files\ESET
2010-05-13 12:15 . 2010-04-29 19:39 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2010-05-13 12:15 . 2010-04-29 19:39 20952 ----a-w- c:\windows\system32\drivers\mbam.sys
2010-05-12 18:08 . 2009-12-11 11:43 302080 ----a-w- c:\windows\system32\drivers\srv.sys
2010-05-12 18:08 . 2009-12-11 11:43 98816 ----a-w- c:\windows\system32\drivers\srvnet.sys
2010-05-12 17:51 . 2010-05-13 16:15 -------- d-----w- c:\users\katie\AppData\Local\temp
2010-05-12 17:28 . 2010-05-12 17:28 3687182 ----a-r- C:\ComboFix.exe
2010-05-11 15:11 . 2010-05-11 17:37 -------- d-----w- c:\programdata\Spybot - Search & Destroy
2010-05-11 15:11 . 2010-05-11 15:14 -------- d-----w- c:\program files\Spybot - Search & Destroy
2010-05-10 19:53 . 2009-12-08 20:01 904776 ----a-w- c:\windows\system32\drivers\tcpip.sys
2010-05-10 19:53 . 2009-12-08 17:26 30720 ----a-w- c:\windows\system32\drivers\tcpipreg.sys
2010-05-10 15:16 . 2009-12-08 20:01 3600456 ----a-w- c:\windows\system32\ntkrnlpa.exe
2010-05-10 15:16 . 2009-12-08 20:01 3548216 ----a-w- c:\windows\system32\ntoskrnl.exe
2010-05-10 12:59 . 2009-12-04 18:29 1314816 ----a-w- c:\windows\system32\quartz.dll
2010-05-10 12:59 . 2009-12-04 18:30 12288 ----a-w- c:\windows\system32\tsbyuv.dll
2010-05-10 12:59 . 2009-12-04 18:28 22528 ----a-w- c:\windows\system32\msyuv.dll
2010-05-10 12:59 . 2009-12-04 18:28 31744 ----a-w- c:\windows\system32\msvidc32.dll
2010-05-10 12:59 . 2009-12-04 18:28 13312 ----a-w- c:\windows\system32\msrle32.dll
2010-05-10 12:59 . 2009-12-04 18:28 50176 ----a-w- c:\windows\system32\iyuv_32.dll
2010-05-10 12:59 . 2009-12-04 18:28 123904 ----a-w- c:\windows\system32\msvfw32.dll
2010-05-10 12:59 . 2009-12-04 18:28 82944 ----a-w- c:\windows\system32\mciavi32.dll
2010-05-10 12:59 . 2009-12-04 18:27 91136 ----a-w- c:\windows\system32\avifil32.dll
2010-05-10 12:59 . 2009-12-04 15:56 212992 ----a-w- c:\windows\system32\drivers\mrxsmb10.sys
2010-05-10 12:59 . 2009-12-04 15:56 105984 ----a-w- c:\windows\system32\drivers\mrxsmb.sys
2010-05-06 19:09 . 2010-05-06 19:09 -------- d-----w- c:\users\katie\AppData\Roaming\Malwarebytes
2010-05-06 19:09 . 2010-05-13 12:16 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
2010-05-06 19:09 . 2010-05-06 19:09 -------- d-----w- c:\programdata\Malwarebytes
2010-04-21 13:15 . 2010-05-13 13:14 -------- d-----w- c:\users\katie\AppData\Roaming\scdata

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2010-05-13 15:30 . 2008-04-02 13:07 -------- d-----w- c:\program files\Common Files\Adobe
2010-05-11 13:47 . 2006-11-02 11:18 -------- d-----w- c:\program files\Windows Mail
2010-05-11 13:46 . 2008-03-24 19:18 -------- d-----w- c:\programdata\Microsoft Help
2010-05-06 13:38 . 2010-05-06 13:38 16 ----a-w- c:\users\katie\AppData\Roaming\woxcdv.dat
2010-05-06 13:22 . 2008-05-12 12:40 -------- d-----w- c:\programdata\FLEXnet
2010-04-21 13:19 . 2010-04-21 13:10 70 ----a-w- c:\users\katie\AppData\Roaming\wp4.dat
2010-04-21 13:19 . 2010-04-21 13:10 3 ----a-w- c:\users\katie\AppData\Roaming\wp3.dat
2010-04-21 13:10 . 2010-04-21 13:10 36 ----a-w- c:\users\katie\AppData\Roaming\skynet.dat
2010-03-05 21:06 . 2010-03-05 21:06 0 ----a-w- c:\users\katie\AppData\Roaming\wklnhst.dat
.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"Windows Defender"="c:\program files\Windows Defender\MSASCui.exe" [2008-01-19 1008184]
"RemoteControl"="c:\program files\CyberLink\PowerDVD\PDVDServ.exe" [2006-12-07 69216]
"LanguageShortcut"="c:\program files\CyberLink\PowerDVD\Language\Language.exe" [2006-12-06 54832]
"IgfxTray"="c:\windows\system32\igfxtray.exe" [2008-01-02 141848]
"HotKeysCmds"="c:\windows\system32\hkcmd.exe" [2008-01-02 166424]
"Persistence"="c:\windows\system32\igfxpers.exe" [2008-01-02 133656]
"ccApp"="c:\program files\Common Files\Symantec Shared\ccApp.exe" [2006-11-22 107112]
"vptray"="c:\progra~1\SYMANT~1\VPTray.exe" [2006-11-28 134808]
"googletalk"="c:\program files\Google\Google Talk\googletalk.exe" [2007-01-01 3739648]
"Acrobat Assistant 8.0"="c:\program files\Adobe\Acrobat 8.0\Acrobat\Acrotray.exe" [2008-01-11 623992]
"RoxWatchTray"="c:\program files\Common Files\Roxio Shared\9.0\SharedCOM\RoxWatchTray9.exe" [2008-06-08 236016]
"SigmatelSysTrayApp"="sttray.exe" [2006-11-22 303104]
"Adobe Reader Speed Launcher"="c:\program files\Adobe\Reader 9.0\Reader\Reader_sl.exe" [2009-12-22 35760]
"Adobe ARM"="c:\program files\Common Files\Adobe\ARM\1.0\AdobeARM.exe" [2009-12-11 948672]
"SunJavaUpdateSched"="c:\program files\Common Files\Java\Java Update\jusched.exe" [2010-02-18 248040]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce]
"Launcher"="c:\windows\SMINST\launcher.exe" [2007-07-13 40072]

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\system]
"EnableLUA"= 0 (0x0)
"SoftwareSASGeneration"= 3 (0x3)
"EnableUIADesktopToggle"= 0 (0x0)

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\group policy\state\S-1-5-21-220523388-1659004503-682003330-1208\Scripts\Logon\0\0]
"Script"=\\raserver001\SYSVOL\GrantExperts.Com\scripts\map.bat

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\group policy\state\S-1-5-21-220523388-1659004503-682003330-2179\Scripts\Logon\0\0]
"Script"=\\raserver001\SYSVOL\GrantExperts.Com\scripts\map.bat

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\WinDefend]
@="Service"

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\atchk]
2007-01-27 08:59 400192 ----a-w- c:\program files\Intel\AMT\atchk.exe

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecAntiVirus]
"DisableMonitoring"=dword:00000001

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Svc]
"VistaSp2"=hex(cool.gif:a2,a8,38,92,31,f1,ca,01

R3 NETw2v32;Intel® PRO/Wireless 2200BG Network Connection Driver for Windows Vista;c:\windows\system32\DRIVERS\NETw2v32.sys [2006-11-02 2589184]
R3 OKI OPHC DCS Loader;OKI OPHC DCS Loader;c:\windows\system32\spool\DRIVERS\W32X86\3\OPHCLDCS.EXE [2005-05-10 24576]
S2 SavRoam;SavRoam;c:\program files\Symantec AntiVirus\SavRoam.exe [2006-11-28 122008]
S3 EraserUtilRebootDrv;EraserUtilRebootDrv;c:\program files\Common Files\Symantec Shared\EENGINE\EraserUtilRebootDrv.sys [2009-09-03 102448]


[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\svchost]
LocalServiceNoNetwork REG_MULTI_SZ PLA DPS BFE mpssvc
HPZ12 REG_MULTI_SZ Pml Driver HPZ12 Net Driver HPZ12
LocalServiceAndNoImpersonation REG_MULTI_SZ FontCache
.
.
------- Supplementary Scan -------
.
uStart Page = hxxp://www.aol.com/
IE: Append to existing PDF - c:\program files\Adobe\Acrobat 8.0\Acrobat\AcroIEFavClient.dll/AcroIEAppend.html
IE: Convert link target to Adobe PDF - c:\program files\Adobe\Acrobat 8.0\Acrobat\AcroIEFavClient.dll/AcroIECapture.html
IE: Convert link target to existing PDF - c:\program files\Adobe\Acrobat 8.0\Acrobat\AcroIEFavClient.dll/AcroIEAppend.html
IE: Convert selected links to Adobe PDF - c:\program files\Adobe\Acrobat 8.0\Acrobat\AcroIEFavClient.dll/AcroIECaptureSelLinks.html
IE: Convert selected links to existing PDF - c:\program files\Adobe\Acrobat 8.0\Acrobat\AcroIEFavClient.dll/AcroIEAppendSelLinks.html
IE: Convert selection to Adobe PDF - c:\program files\Adobe\Acrobat 8.0\Acrobat\AcroIEFavClient.dll/AcroIECapture.html
IE: Convert selection to existing PDF - c:\program files\Adobe\Acrobat 8.0\Acrobat\AcroIEFavClient.dll/AcroIEAppend.html
IE: Convert to Adobe PDF - c:\program files\Adobe\Acrobat 8.0\Acrobat\AcroIEFavClient.dll/AcroIECapture.html
IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~2\Office12\EXCEL.EXE/3000
.

**************************************************************************
scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully
hidden files:

**************************************************************************
.
------------------------ Other Running Processes ------------------------
.
c:\program files\Common Files\Symantec Shared\ccSvcHst.exe
c:\program files\Intel\AMT\atchksrv.exe
c:\program files\Microsoft Small Business\Business Contact Manager\BcmSqlStartupSvc.exe
c:\program files\Symantec AntiVirus\DefWatch.exe
c:\program files\Intel\AMT\LMS.exe
c:\program files\CyberLink\Shared Files\RichVideo.exe
c:\program files\Symantec AntiVirus\VPTray.exe
c:\windows\system32\igfxsrvc.exe
c:\windows\sttray.exe
c:\program files\Microsoft SQL Server\90\Shared\sqlbrowser.exe
c:\program files\Microsoft SQL Server\90\Shared\sqlwriter.exe
c:\program files\Symantec AntiVirus\Rtvscan.exe
c:\windows\system32\WUDFHost.exe
c:\program files\Microsoft SQL Server\MSSQL.1\MSSQL\Binn\sqlservr.exe
c:\program files\Common Files\Macrovision Shared\FLEXnet Publisher\FNPLicensingService.exe
c:\\?\c:\windows\system32\wbem\WMIADAP.EXE
.
**************************************************************************
.
Completion time: 2010-05-13 12:23:02 - machine was rebooted
ComboFix-quarantined-files.txt 2010-05-13 16:23
ComboFix2.txt 2010-05-12 17:50

Pre-Run: 29,530,226,688 bytes free
Post-Run: 29,244,841,984 bytes free

- - End Of File - - 314BFFC85A7F02C75F314870403CDD0D

MBAM:

Malwarebytes' Anti-Malware 1.46
www.malwarebytes.org

Database version: 4096

Windows 6.0.6002 Service Pack 2
Internet Explorer 8.0.6001.18882

5/13/2010 8:30:10 AM
mbam-log-2010-05-13 (08-30-10).txt

Scan type: Quick scan
Objects scanned: 153714
Time elapsed: 11 minute(s), 54 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 0

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
(No malicious items detected)

DDS:


DDS (Ver_10-03-17.01) - NTFSx86
Run by katie at 12:24:41.85 on Thu 05/13/2010
Internet Explorer: 8.0.6001.18882
Microsoft® Windows Vista™ Business 6.0.6002.2.1252.1.1033.18.2021.995 [GMT -4:00]

AV: Symantec AntiVirus *On-access scanning disabled* (Updated) {FB06448E-52B8-493A-90F3-E43226D3305C}
SP: Symantec AntiVirus *disabled* (Updated) {6C85A515-B91D-4D2B-AF18-40984A4A8493}
SP: Windows Defender *disabled* (Outdated) {D68DDC3A-831F-4FAE-9E44-DA132C1ACF46}

============== Running Processes ===============

C:\Windows\system32\wininit.exe
C:\Windows\system32\lsm.exe
C:\Windows\system32\svchost.exe -k DcomLaunch
C:\Windows\system32\svchost.exe -k rpcss
C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted
C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted
C:\Windows\system32\svchost.exe -k netsvcs
C:\Windows\system32\svchost.exe -k GPSvcGroup
C:\Windows\system32\SLsvc.exe
C:\Windows\system32\svchost.exe -k LocalService
C:\Windows\system32\svchost.exe -k NetworkService
C:\Program Files\Common Files\Symantec Shared\ccSvcHst.exe
C:\Windows\System32\spoolsv.exe
C:\Windows\system32\svchost.exe -k LocalServiceNoNetwork
C:\Program Files\Intel\AMT\atchksrv.exe
C:\Program Files\Microsoft Small Business\Business Contact Manager\BcmSqlStartupSvc.exe
C:\Program Files\Symantec AntiVirus\DefWatch.exe
C:\Program Files\Intel\AMT\LMS.exe
C:\Windows\System32\svchost.exe -k HPZ12
C:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted
C:\Program Files\CyberLink\Shared Files\RichVideo.exe
C:\Windows\system32\taskeng.exe
C:\Windows\system32\taskeng.exe
C:\Windows\system32\Dwm.exe
C:\Program Files\CyberLink\PowerDVD\PDVDServ.exe
C:\Windows\System32\igfxtray.exe
C:\Windows\System32\igfxpers.exe
C:\Program Files\Common Files\Symantec Shared\ccApp.exe
C:\Program Files\Symantec AntiVirus\VPTray.exe
C:\Program Files\Adobe\Acrobat 8.0\Acrobat\Acrotray.exe
C:\Windows\system32\igfxsrvc.exe
C:\Windows\sttray.exe
C:\Program Files\Common Files\Java\Java Update\jusched.exe
C:\Program Files\Symantec AntiVirus\SavRoam.exe
c:\Program Files\Microsoft SQL Server\90\Shared\sqlbrowser.exe
c:\Program Files\Microsoft SQL Server\90\Shared\sqlwriter.exe
C:\Windows\system32\svchost.exe -k imgsvc
C:\Program Files\Symantec AntiVirus\Rtvscan.exe
C:\Windows\System32\svchost.exe -k WerSvcGroup
C:\Windows\system32\SearchIndexer.exe
C:\Windows\system32\WUDFHost.exe
c:\Program Files\Microsoft SQL Server\MSSQL.1\MSSQL\Binn\sqlservr.exe
C:\Program Files\Common Files\Macrovision Shared\FLEXnet Publisher\FNPLicensingService.exe
C:\Windows\system32\wbem\wmiprvse.exe
C:\Windows\system32\wuauclt.exe
C:\Windows\Explorer.exe
C:\Windows\system32\wbem\wmiprvse.exe
C:\Windows\system32\vssvc.exe
C:\Windows\System32\svchost.exe -k swprv
C:\Users\katie\Desktop\dds.scr

============== Pseudo HJT Report ===============

uStart Page = hxxp://www.aol.com/
BHO: Adobe PDF Reader Link Helper: {06849e9f-c8d7-4d59-b87d-784b7d6be0b3} - c:\program files\common files\adobe\acrobat\activex\AcroIEHelper.dll
BHO: Adobe PDF Link Helper: {18df081c-e8ad-4283-a596-fa578c2ebdc3} - c:\program files\common files\adobe\acrobat\activex\AcroIEHelperShim.dll
BHO: Adobe PDF Conversion Toolbar Helper: {ae7cd045-e861-484f-8273-0445ee161910} - c:\program files\adobe\acrobat 8.0\acrobat\AcroIEFavClient.dll
BHO: Java™ Plug-In 2 SSV Helper: {dbc80044-a445-435b-bc74-9c25c1c588a9} - c:\program files\java\jre6\bin\jp2ssv.dll
TB: Adobe PDF: {47833539-d0c5-4125-9fa8-0819e2eaac93} - c:\program files\adobe\acrobat 8.0\acrobat\AcroIEFavClient.dll
mRun: [Windows Defender] %ProgramFiles%\Windows Defender\MSASCui.exe -hide
mRun: [RemoteControl] "c:\program files\cyberlink\powerdvd\PDVDServ.exe"
mRun: [LanguageShortcut] "c:\program files\cyberlink\powerdvd\language\Language.exe"
mRun: [IgfxTray] c:\windows\system32\igfxtray.exe
mRun: [HotKeysCmds] c:\windows\system32\hkcmd.exe
mRun: [Persistence] c:\windows\system32\igfxpers.exe
mRun: [ccApp] "c:\program files\common files\symantec shared\ccApp.exe"
mRun: [vptray] c:\progra~1\symant~1\VPTray.exe
mRun: [googletalk] c:\program files\google\google talk\googletalk.exe /autostart
mRun: [Acrobat Assistant 8.0] "c:\program files\adobe\acrobat 8.0\acrobat\Acrotray.exe"
mRun: [RoxWatchTray] "c:\program files\common files\roxio shared\9.0\sharedcom\RoxWatchTray9.exe"
mRun: [SigmatelSysTrayApp] sttray.exe
mRun: [Adobe Reader Speed Launcher] "c:\program files\adobe\reader 9.0\reader\Reader_sl.exe"
mRun: [Adobe ARM] "c:\program files\common files\adobe\arm\1.0\AdobeARM.exe"
mRun: [SunJavaUpdateSched] "c:\program files\common files\java\java update\jusched.exe"
mRunOnce: [Launcher] %WINDIR%\SMINST\launcher.exe
mPolicies-explorer: BindDirectlyToPropertySetStorage = 0 (0x0)
mPolicies-system: EnableLUA = 0 (0x0)
mPolicies-system: SoftwareSASGeneration = 3 (0x3)
mPolicies-system: EnableUIADesktopToggle = 0 (0x0)
IE: Append to existing PDF - c:\program files\adobe\acrobat 8.0\acrobat\AcroIEFavClient.dll/AcroIEAppend.html
IE: Convert link target to Adobe PDF - c:\program files\adobe\acrobat 8.0\acrobat\AcroIEFavClient.dll/AcroIECapture.html
IE: Convert link target to existing PDF - c:\program files\adobe\acrobat 8.0\acrobat\AcroIEFavClient.dll/AcroIEAppend.html
IE: Convert selected links to Adobe PDF - c:\program files\adobe\acrobat 8.0\acrobat\AcroIEFavClient.dll/AcroIECaptureSelLinks.html
IE: Convert selected links to existing PDF - c:\program files\adobe\acrobat 8.0\acrobat\AcroIEFavClient.dll/AcroIEAppendSelLinks.html
IE: Convert selection to Adobe PDF - c:\program files\adobe\acrobat 8.0\acrobat\AcroIEFavClient.dll/AcroIECapture.html
IE: Convert selection to existing PDF - c:\program files\adobe\acrobat 8.0\acrobat\AcroIEFavClient.dll/AcroIEAppend.html
IE: Convert to Adobe PDF - c:\program files\adobe\acrobat 8.0\acrobat\AcroIEFavClient.dll/AcroIECapture.html
IE: E&xport to Microsoft Excel - c:\progra~1\micros~2\office12\EXCEL.EXE/3000
IE: {92780B25-18CC-41C8-B9BE-3C9C571A8263} - {FF059E31-CC5A-4E2E-BF3B-96E929D65503} - c:\progra~1\micros~2\office11\REFIEBAR.DLL
DPF: {4788DE0A-3552-49EA-AC8C-233DA52523B9} - hxxp://www.blackberry.com/devicesoftware/AxLoader.cab
DPF: {7530BFB8-7293-4D34-9923-61A11451AFC5} - hxxp://download.eset.com/special/eos/OnlineScanner.cab
DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_20-windows-i586.cab
DPF: {CAFEEFAC-0016-0000-0020-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_20-windows-i586.cab
DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_20-windows-i586.cab
Notify: igfxcui - igfxdev.dll

============= SERVICES / DRIVERS ===============

R2 SavRoam;SAVRoam;c:\program files\symantec antivirus\SavRoam.exe [2006-11-28 122008]
R2 Symantec AntiVirus;Symantec AntiVirus;c:\program files\symantec antivirus\Rtvscan.exe [2006-11-28 1962136]
R3 EraserUtilRebootDrv;EraserUtilRebootDrv;c:\program files\common files\symantec shared\eengine\EraserUtilRebootDrv.sys [2009-9-3 102448]
S3 FontCache;Windows Font Cache Service;c:\windows\system32\svchost.exe -k LocalServiceAndNoImpersonation [2008-9-23 21504]
S3 NETw2v32;Intel® PRO/Wireless 2200BG Network Connection Driver for Windows Vista;c:\windows\system32\drivers\NETw2v32.sys [2006-11-2 2589184]
S3 OKI OPHC DCS Loader;OKI OPHC DCS Loader;c:\windows\system32\spool\drivers\w32x86\3\OPHCLDCS.EXE [2005-5-10 24576]

=============== Created Last 30 ================

2010-05-13 16:22:20 0 d-sh--w- C:\$RECYCLE.BIN
2010-05-13 15:55:16 0 d-----w- c:\programdata\Sun
2010-05-13 15:54:45 411368 ----a-w- c:\windows\system32\deployJava1.dll
2010-05-13 15:47:33 0 d-----w- c:\windows\system32\appmgmt
2010-05-13 12:36:32 0 d-----w- c:\program files\ESET
2010-05-13 12:15:58 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2010-05-13 12:15:57 20952 ----a-w- c:\windows\system32\drivers\mbam.sys
2010-05-12 18:08:13 302080 ----a-w- c:\windows\system32\drivers\srv.sys
2010-05-12 18:08:12 98816 ----a-w- c:\windows\system32\drivers\srvnet.sys
2010-05-12 17:32:16 77312 ----a-w- c:\windows\MBR.exe
2010-05-12 17:32:15 98816 ----a-w- c:\windows\sed.exe
2010-05-12 17:32:15 256512 ----a-w- c:\windows\PEV.exe
2010-05-12 17:32:15 161792 ----a-w- c:\windows\SWREG.exe
2010-05-12 17:28:03 3687182 ----a-r- C:\ComboFix.exe
2010-05-11 15:11:32 0 d-----w- c:\programdata\Spybot - Search & Destroy
2010-05-11 15:11:32 0 d-----w- c:\program files\Spybot - Search & Destroy
2010-05-10 19:53:38 904776 ----a-w- c:\windows\system32\drivers\tcpip.sys
2010-05-10 19:53:36 30720 ----a-w- c:\windows\system32\drivers\tcpipreg.sys
2010-05-10 15:16:52 3600456 ----a-w- c:\windows\system32\ntkrnlpa.exe
2010-05-10 15:16:51 3548216 ----a-w- c:\windows\system32\ntoskrnl.exe
2010-05-10 12:59:10 1314816 ----a-w- c:\windows\system32\quartz.dll
2010-05-10 12:59:09 50176 ----a-w- c:\windows\system32\iyuv_32.dll
2010-05-10 12:59:09 31744 ----a-w- c:\windows\system32\msvidc32.dll
2010-05-10 12:59:09 22528 ----a-w- c:\windows\system32\msyuv.dll
2010-05-10 12:59:09 13312 ----a-w- c:\windows\system32\msrle32.dll
2010-05-10 12:59:09 12288 ----a-w- c:\windows\system32\tsbyuv.dll
2010-05-10 12:59:08 91136 ----a-w- c:\windows\system32\avifil32.dll
2010-05-10 12:59:08 82944 ----a-w- c:\windows\system32\mciavi32.dll
2010-05-10 12:59:08 123904 ----a-w- c:\windows\system32\msvfw32.dll
2010-05-10 12:59:03 212992 ----a-w- c:\windows\system32\drivers\mrxsmb10.sys
2010-05-10 12:59:03 105984 ----a-w- c:\windows\system32\drivers\mrxsmb.sys
2010-05-06 19:09:49 0 d-----w- c:\users\katie\appdata\roaming\Malwarebytes
2010-05-06 19:09:41 0 d-----w- c:\programdata\Malwarebytes
2010-05-06 19:09:41 0 d-----w- c:\program files\Malwarebytes' Anti-Malware
2010-05-06 13:43:58 108281766 ----a-w- c:\windows\MEMORY.DMP
2010-05-06 13:38:49 16 ----a-w- c:\users\katie\appdata\roaming\woxcdv.dat
2010-04-21 13:15:25 0 d-----w- c:\users\katie\appdata\roaming\scdata
2010-04-21 13:10:55 70 ----a-w- c:\users\katie\appdata\roaming\wp4.dat
2010-04-21 13:10:55 36 ----a-w- c:\users\katie\appdata\roaming\skynet.dat
2010-04-21 13:10:55 3 ----a-w- c:\users\katie\appdata\roaming\wp3.dat

==================== Find3M ====================

2010-03-05 21:06:46 0 ----a-w- c:\users\katie\appdata\roaming\wklnhst.dat
2010-01-06 08:06:16 51200 ----a-w- c:\windows\inf\infpub.dat
2010-01-06 08:06:15 86016 ----a-w- c:\windows\inf\infstor.dat
2010-01-06 08:06:15 665600 ----a-w- c:\windows\inf\drvindex.dat
2010-01-06 08:06:15 143360 ----a-w- c:\windows\inf\infstrng.dat
2009-03-09 13:48:46 174 --sha-w- c:\program files\desktop.ini
2006-11-02 12:42:07 30674 ----a-w- c:\windows\inf\perflib\0409\perfd.dat
2006-11-02 12:42:07 30674 ----a-w- c:\windows\inf\perflib\0409\perfc.dat
2006-11-02 12:42:07 287440 ----a-w- c:\windows\inf\perflib\0409\perfi.dat
2006-11-02 12:42:07 287440 ----a-w- c:\windows\inf\perflib\0409\perfh.dat
2006-11-02 09:20:21 287440 ----a-w- c:\windows\inf\perflib\0000\perfi.dat
2006-11-02 09:20:21 287440 ----a-w- c:\windows\inf\perflib\0000\perfh.dat
2006-11-02 09:20:19 30674 ----a-w- c:\windows\inf\perflib\0000\perfd.dat
2006-11-02 09:20:19 30674 ----a-w- c:\windows\inf\perflib\0000\perfc.dat

============= FINISH: 12:24:51.38 ===============

ESET:

C:\Users\katie\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\2\64956e82-38e9b08b multiple threats deleted - quarantined
C:\Users\katie\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\35\11cce563-54bb2059 multiple threats deleted - quarantined
C:\Users\katie\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\40\2d3a2a68-592930c5 Java/TrojanDownloader.Agent.NAM trojan deleted - quarantined
C:\Users\katie\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\40\4c871c68-7376075b multiple threats deleted - quarantined
C:\Users\katie\AppData\Roaming\scdata\wispex.html Win32/Adware.WinAntiVirus application cleaned by deleting - quarantined
C:\Windows\System32\config\systemprofile\AppData\Local\jrivtgbeb\dnsdssxtssd.exe a variant of Win32/Kryptik.EGS trojan cleaned by deleting - quarantined


#7 fireman4it

fireman4it

    Bleepin' Fireman


  • Malware Response Team
  • 13,505 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Greenup, Ill USA
  • Local time:10:06 PM

Posted 13 May 2010 - 06:03 PM

Hello, bcharles1002.
Congratulations! You now appear clean! specool.gif


Uninstall Combofix
  • Make sure that Combofix.exe that you downloaded is on your Desktop but Do not run it!
    o *If it is not on your Desktop, the below will not work.
  • Click on then Run....
  • Now copy & paste the green bolded text in the run-box and click OK.

    ComboFix /Uninstall



    <Notice the space between the "x" and "/".> <--- It needs to be there
    Windows Vista users: Press the Windows Key + R to bring the Run... Command and then from there you can add in the Combofix /Uninstall


  • Please advise if this step is missed for any reason as it performs some important actions:
    "This will uninstall Combofix, delete its related folders and files, reset your clock settings, hide file extensions, hide the system/hidden files and resets System Restore again.
    It also makes a clean Restore Point and flashes all the old restore points in order to prevent possible reinfection from an old one through system restore".

Are things running okay? Do you have any more questions?

System Still Slow?
You may wish to try StartupLite. Simply download this tool to your desktop and run it. It will explain any optional auto-start programs on your system, and offer the option to stop these programs from starting at startup. This will result in fewer programs running when you boot your system, and should improve preformance.
If that does not work, you can try the steps mentioned in Slow Computer/browser? Check Here First; It May Not Be Malware.

We Need to Clean Up Our Mess
  • Download OTC by OldTimer and save it to your desktop.
  • Double click icon to start the program. If you are using Vista, please right-click and choose run as administrator
  • Then Click the big button.
  • You will get a prompt saying "Being Cleanup Process". Please select Yes.
  • Restart your computer when prompted.



Recommendations
Below are some recommendations to lower your chances of (re)infection.
  1. Install and maintain an outbound firewall
  2. Install Spyware Blaster and update it regularly
    If you wish, the commercial version provides automatic updating.
  3. Install the MVPs hosts file, and update it regularly
    You can use the HostMan host file manager to do this automaticly if you wish.
    For more information on the hosts file, and what it can do for you, you can view the Tutorial on the Hosts file
  4. Install an Anti-Spyware program, and update it regularly
    Malware Byte's Anti Malware is an excellent Anti-Spyware scanner. It's scan times are usually under ten minutes, and has excellent detection and removal rates.
    SUPERAntiSpyware is another good scanner with high detection and removal rates.
    Both programs are free for non commercial home use but provide a resident and do not nag if you purchase the paid versions.
  5. Keep Windows (and your other Microsoft software) up to date!
    I cannot stress how important this is enough. Often holes are found in Internet Explorer or Windows itself that require patching. Sometimes these holes will allow an attacker unrestricted access to your computer.

    If you are using Windows XP or earlier
    Visit the Microsoft Update Website and follow the on screen instructions to setup Microsoft Update. Also follow the instructions to update your system. Please REBOOT and repeat this process until there are no more updates to install!!

    If you are using Windows Vista
    1. Click the "Start Menu" (or Windows Orb)
    2. Click "All Programs"
    3. Click "Windows Update"
    4. On the left, choose "Change Settings"
    5. Ensure that the checkbox "Use Microsoft Update" at the bottom of the window is checked.
    6. Press OK and accept the UAC prompt.
      Note: You shouldn't need to check this checkbox every single time you update, only the first time.
    7. Click "Check for Updates" in the upper left corner.
    8. Follow the instructions to install the latest updates.
    9. Reboot and repeat the "Check for Updates" until there are no more critical updates to install
  6. Keep your other software up to date as well
    Software does not need to be made by Microsoft to be insecure. You can use the Secunia Online Software occasionally to help you check for out of date software on your machine.
  7. Stay up to date!
    The MOST IMPORTANT part of any security setup is keeping the software up to date. Malware writers release new variants every single day. If your software updates don't keep up, then the malware will always be one step ahead. Not a good thing sad.gif.

" Extinguishing Malware from the world"

The Virus, Trojan, Spyware, and Malware Removal forum is very busy. If I'm helping you and I've not posted back within 24 hrs., send a PM with your topic link. Thank you.

ALL OTHER HELP REQUESTS VIA THE PM SYSTEM WILL BE IGNORED. The Forums are there for a reason!
Thanks-


  userbar_eis_500.gif

If I have helped you, consider making a donation to help me continue the fight against Malware! Just click btn_donate_LG.gif


#8 bcharles1002

bcharles1002
  • Topic Starter

  • Members
  • 6 posts
  • OFFLINE
  •  
  • Local time:10:06 PM

Posted 14 May 2010 - 07:13 AM

Great News! The system is still operating normally and I will run the uninstall, follow the cleanup process, and review the recommendations. thumbup.gif

#9 fireman4it

fireman4it

    Bleepin' Fireman


  • Malware Response Team
  • 13,505 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Greenup, Ill USA
  • Local time:10:06 PM

Posted 14 May 2010 - 01:23 PM

This thread will now be closed since the issue seems to be resolved.

If you need this topic reopened, please send a Private Message to any one of the moderating team member or myself. Please include a link to this thread with your request. This applies only to the originator of this thread.

Other members who need assistance please start your own topic in a new thread. Thanks!

The fixes and advice in this thread are for this machine only. Do not apply the instructions from this thread to your own machine. Please start a new thread describing your issue and someone will be along to assist you.

" Extinguishing Malware from the world"

The Virus, Trojan, Spyware, and Malware Removal forum is very busy. If I'm helping you and I've not posted back within 24 hrs., send a PM with your topic link. Thank you.

ALL OTHER HELP REQUESTS VIA THE PM SYSTEM WILL BE IGNORED. The Forums are there for a reason!
Thanks-


  userbar_eis_500.gif

If I have helped you, consider making a donation to help me continue the fight against Malware! Just click btn_donate_LG.gif





0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users