Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Copyright violation / ap manager virus


  • This topic is locked This topic is locked
23 replies to this topic

#1 brdrgrl

brdrgrl

  • Members
  • 12 posts
  • OFFLINE
  •  
  • Local time:01:14 AM

Posted 14 May 2010 - 12:38 PM

Hello. This started out a couple of weeks ago with a copyright violation pop-up. I tried to ignore but it kept appearing. I had an anti-virus at the time (Symantec) but knew there was a newer/different version (Endpoint) available from my provider so I tried installing it. I have yet to be able to. The messages received indicated that the download was interrupted. I also cannot uninstall my existing version. Certain security sites that I attempted to access were blocked. I finally thought I had found a forum to help and submitted a Hijackthis log to them. I did receive a response and "fixed" the things that were indicated. I noticed that certain programs were still in my lists after the fix. One such was Performance Solution Hotrevenue. I tried to uninstall manually but was told I needed to enter a code to complete the uninstall. This did not look right so I didn't do it. I've searched online for other solutions and was able to install and run (from a flashdrive) CCleaner and ISOBit security. Supposedly problems were found and removed but I still think the computer is infected. One other problem I've noticed is that certain file permission have been changed and prohibits me from making program changes. I think you have this info in my logs but my system is Vista Home Premium, 32-Bit, 2GB Ram, IE 7. Thank you in advance for any help you can offer or provide.


DDS (Ver_10-03-17.01) - NTFSx86
Run by Amy at 12:09:18.29 on Fri 05/14/2010
Internet Explorer: 7.0.6001.18000
Microsoft® Windows Vista™ Home Premium 6.0.6001.1.1252.1.1033.18.2039.1228 [GMT -4:00]

AV: Symantec AntiVirus *On-access scanning enabled* (Updated) {FB06448E-52B8-493A-90F3-E43226D3305C}
SP: Symantec AntiVirus *enabled* (Updated) {6C85A515-B91D-4D2B-AF18-40984A4A8493}
SP: Windows Defender *enabled* (Updated) {D68DDC3A-831F-4FAE-9E44-DA132C1ACF46}

============== Running Processes ===============

C:\Windows\system32\wininit.exe
C:\Windows\system32\lsm.exe
C:\Windows\system32\svchost.exe -k DcomLaunch
C:\Windows\system32\svchost.exe -k rpcss
C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted
C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted
C:\Windows\system32\svchost.exe -k netsvcs
C:\Windows\system32\SLsvc.exe
C:\Windows\system32\svchost.exe -k LocalService
C:\Windows\system32\svchost.exe -k NetworkService
C:\Program Files\Common Files\Symantec Shared\ccSvcHst.exe
C:\Windows\system32\Dwm.exe
C:\Windows\Explorer.EXE
C:\Windows\System32\spoolsv.exe
C:\Windows\system32\taskeng.exe
C:\Windows\system32\svchost.exe -k LocalServiceNoNetwork
C:\Windows\system32\taskeng.exe
C:\Windows\system32\rundll32.exe
C:\Windows\System32\igfxtray.exe
C:\Users\Amy\AppData\Local\Temp\Ctr.exe
C:\Windows\System32\igfxpers.exe
C:\Windows\RtHDVCpl.exe
C:\Windows\System32\spool\drivers\w32x86\3\EKIJ5000MUI.exe
C:\Program Files\Common Files\Symantec Shared\ccApp.exe
C:\Program Files\Symantec AntiVirus\VPTray.exe
C:\Program Files\iTunes\iTunesHelper.exe
C:\Windows\WindowsMobile\wmdcBase.exe
C:\Windows\ehome\ehtray.exe
C:\Windows\system32\agrsmsvc.exe
C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
C:\Program Files\Bonjour\mDNSResponder.exe
C:\Program Files\Symantec AntiVirus\DefWatch.exe
C:\Windows\system32\igfxsrvc.exe
C:\Program Files\Kodak\printer\center\KodakSvc.exe
C:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted
C:\Windows\system32\svchost.exe -k imgsvc
C:\Program Files\Symantec AntiVirus\Rtvscan.exe
C:\Windows\System32\svchost.exe -k WerSvcGroup
C:\Windows\system32\SearchIndexer.exe
C:\Windows\system32\WUDFHost.exe
C:\Windows\ehome\ehmsas.exe
C:\Windows\system32\svchost.exe -k WindowsMobile
C:\Program Files\iPod\bin\iPodService.exe
C:\Program Files\Symantec AntiVirus\DoScan.exe
C:\Program Files\Symantec AntiVirus\SavUI.exe
C:\Program Files\Windows Media Player\wmpnetwk.exe
C:\Windows\system32\svchost.exe -k SDRSVC
\\?\C:\Windows\system32\wbem\WMIADAP.EXE
C:\Windows\system32\wbem\wmiprvse.exe
C:\Windows\system32\wbem\wmiprvse.exe
J:\My_Files\dds.scr

============== Pseudo HJT Report ===============

uStart Page = hxxp://espn.go.com/
uDefault_Page_URL = hxxp://www.gateway.com/g/startpage.html?Ch=Retail&SubCH=&Br=EM&Loc=ENG_US&Sys=DTP&M=T5274a
mStart Page = hxxp://www.gateway.com/g/startpage.html?Ch=Retail&SubCH=&Br=EM&Loc=ENG_US&Sys=DTP&M=T5274a
mDefault_Page_URL = hxxp://www.gateway.com/g/startpage.html?Ch=Retail&SubCH=&Br=EM&Loc=ENG_US&Sys=DTP&M=T5274a
uInternet Settings,ProxyOverride = *.local
mSearchAssistant = hxxp://www.gateway.com/g/sidepanel.html?Ch=Retail&SubCH=&Br=EM&Loc=ENG_US&Sys=DTP&M=T5274a
BHO: {2ac9d6a0-69c5-4ec7-8459-1f9fe7f60081} - rerujito.dll
TB: &Google: {2318c2b1-4965-11d4-9b18-009027a5cd4f} - c:\program files\google\googletoolbar1.dll
uRun: [ehTray.exe] c:\windows\ehome\ehTray.exe
uRun: [WMPNSCFG] c:\program files\windows media player\WMPNSCFG.exe
uRun: [M5T8QL3YW3] c:\users\amy\appdata\local\temp\Ctr.exe
mRun: [Windows Defender] %ProgramFiles%\Windows Defender\MSASCui.exe -hide
mRun: [IgfxTray] c:\windows\system32\igfxtray.exe
mRun: [HotKeysCmds] c:\windows\system32\hkcmd.exe
mRun: [Persistence] c:\windows\system32\igfxpers.exe
mRun: [RtHDVCpl] RtHDVCpl.exe
mRun: [EKIJ5000StatusMonitor] c:\windows\system32\spool\drivers\w32x86\3\EKIJ5000MUI.exe
mRun: [ccApp] "c:\program files\common files\symantec shared\ccApp.exe"
mRun: [vptray] c:\progra~1\symant~1\VPTray.exe
mRun: [QuickTime Task] "c:\program files\quicktime\QTTask.exe" -atboottime
mRun: [iTunesHelper] "c:\program files\itunes\iTunesHelper.exe"
mRun: [Adobe ARM] "c:\program files\common files\adobe\arm\1.0\AdobeARM.exe"
mRun: [Windows Mobile-based device management] %WINDIR%\WindowsMobile\wmdcBase.exe
mRun: [vuvusebeni] Rundll32.exe "warosadi.dll",s
mRunOnce: [Launcher] %WINDIR%\SMINST\launcher.exe
dRun: [Hnewejigulukaceg] rundll32.exe "c:\windows\system32\config\systemprofile\appdata\local\ALeUDAPu.dll",Startup
dRun: [hsf87efjhdsf87f3jfsdi7fhsujfd] c:\windows\temp\win.exe
dRun: [M5T8QL3YW3] c:\windows\temp\Ctp.exe
uPolicies-explorer: NoFolderOptions = 1 (0x1)
mPolicies-system: EnableLUA = 0 (0x0)
mPolicies-system: EnableUIADesktopToggle = 0 (0x0)
mPolicies-system: DisableTaskMgr = 1 (0x1)
dPolicies-explorer: NoFolderOptions = 1 (0x1)
dPolicies-system: DisableRegistryTools = 1 (0x1)
dPolicies-system: DisableTaskMgr = 1 (0x1)
IE: E&xport to Microsoft Excel - c:\progra~1\micros~3\office12\EXCEL.EXE/3000
IE: {92780B25-18CC-41C8-B9BE-3C9C571A8263} - {FF059E31-CC5A-4E2E-BF3B-96E929D65503} - c:\progra~1\micros~3\office12\REFIEBAR.DLL
Trusted Zone: ncspearson.com
DPF: {3860DD98-0549-4D50-AA72-5D17D200EE10} - hxxp://cdn.scan.onecare.live.com/resource/download/scanner/en-us/wlscctrl2.cab
DPF: {C7DEDA04-2FFF-4B81-AE66-0A0E0EF4AD2F} - hxxp://imagefinishers.lifepics.com/net/Uploader/LPUploader57.cab
DPF: {CAFECAFE-0013-0001-0028-ABCDEFABCDEF}
DPF: {E2883E8F-472F-4FB0-9522-AC9BF37916A7} - hxxp://platformdl.adobe.com/NOS/getPlusPlus/1.6/gp.cab
DPF: {FD0B6769-6490-4A91-AA0A-B5AE0DC75AC9} - hxxps://secure.logmein.com/activex/ractrl.cab?lmi=100
TCP: NameServer = 93.188.164.14,93.188.166.162
TCP: {4C19592D-34E3-489E-9431-34303C579F86} = 93.188.164.14,93.188.166.162
Notify: igfxcui - igfxdev.dll
AppInit_DLLs: kihugiga.dll
LSA: Notification Packages = scecli kihugiga.dll
IFEO: MpCmdRun.exe - c:\windows\system32\svchost.exe
IFEO: MsMpEng.exe - c:\windows\system32\svchost.exe
IFEO: msseces.exe - c:\windows\system32\svchost.exe

============= SERVICES / DRIVERS ===============

R2 KodakSvc;Kodak AiO Device Service;c:\program files\kodak\printer\center\KodakSvc.exe [2008-2-28 18944]
R2 Symantec AntiVirus;Symantec AntiVirus;c:\program files\symantec antivirus\Rtvscan.exe [2008-10-23 1956752]
R3 EraserUtilRebootDrv;EraserUtilRebootDrv;c:\program files\common files\symantec shared\eengine\EraserUtilRebootDrv.sys [2009-9-25 102448]
R3 NdisrdMP;NdisrdMP;c:\windows\system32\drivers\ndisrd.sys [2009-7-8 22016]
S3 Ndisrd;WinpkFilter Service;c:\windows\system32\drivers\ndisrd.sys [2009-7-8 22016]
S3 NETw2v32;Intel® PRO/Wireless 2200BG Network Connection Driver for Windows Vista;c:\windows\system32\drivers\netw2v32.sys [2006-11-2 2589184]
S3 SavRoam;SAVRoam;c:\program files\symantec antivirus\SavRoam.exe [2008-10-23 121744]

=============== Created Last 30 ================

2010-05-14 16:07:28 0 ----a-w- c:\users\amy\defogger_reenable
2010-05-04 23:36:44 0 d-----w- c:\program files\Symantec
2010-05-04 18:20:18 0 d-----w- c:\programdata\IObit
2010-05-04 18:20:14 0 d-----w- c:\program files\IObit
2010-05-03 21:27:44 0 d-----w- C:\Trend Micro
2010-05-02 02:08:08 43108 ----a-w- c:\windows\Sysvxd.exe
2010-04-30 02:42:11 84992 --sha-r- c:\windows\system32\sqlceqp30S.dll
2010-04-15 10:58:44 384512 ----a-w- c:\windows\system32\bqbschmxie.dll

==================== Find3M ====================

2010-05-04 23:36:44 805 ----a-w- c:\windows\system32\drivers\SYMEVENT.INF
2010-05-04 23:36:44 123952 ----a-w- c:\windows\system32\drivers\SYMEVENT.SYS
2010-05-04 23:36:44 10563 ----a-w- c:\windows\system32\drivers\SYMEVENT.CAT
2010-05-03 20:03:28 86016 ----a-w- c:\windows\inf\infstrng.dat
2010-05-03 20:03:28 86016 ----a-w- c:\windows\inf\infstor.dat
2010-05-03 20:03:28 51200 ----a-w- c:\windows\inf\infpub.dat
2010-03-09 16:28:40 833024 ----a-w- c:\windows\system32\wininet.dll
2010-03-09 16:25:21 78336 ----a-w- c:\windows\system32\ieencode.dll
2010-03-09 14:01:47 26624 ----a-w- c:\windows\system32\ieUnatt.exe
2010-03-04 18:54:51 430080 ----a-w- c:\windows\system32\vbscript.dll
2010-02-20 23:39:35 24064 ----a-w- c:\windows\system32\nshhttp.dll
2010-02-20 23:37:20 31232 ----a-w- c:\windows\system32\httpapi.dll
2010-02-18 14:49:31 3598216 ----a-w- c:\windows\system32\ntkrnlpa.exe
2010-02-18 14:49:31 3545992 ----a-w- c:\windows\system32\ntoskrnl.exe
2010-02-18 14:11:41 190464 ----a-w- c:\windows\system32\iphlpsvc.dll
2008-08-10 14:31:14 665600 ----a-w- c:\windows\inf\drvindex.dat
2008-01-21 02:43:21 174 --sha-w- c:\program files\desktop.ini
2006-11-02 12:42:02 30674 ----a-w- c:\windows\inf\perflib\0409\perfd.dat
2006-11-02 12:42:02 30674 ----a-w- c:\windows\inf\perflib\0409\perfc.dat
2006-11-02 12:42:02 287440 ----a-w- c:\windows\inf\perflib\0409\perfi.dat
2006-11-02 12:42:02 287440 ----a-w- c:\windows\inf\perflib\0409\perfh.dat
2006-11-02 09:20:21 287440 ----a-w- c:\windows\inf\perflib\0000\perfi.dat
2006-11-02 09:20:21 287440 ----a-w- c:\windows\inf\perflib\0000\perfh.dat
2006-11-02 09:20:19 30674 ----a-w- c:\windows\inf\perflib\0000\perfd.dat
2006-11-02 09:20:19 30674 ----a-w- c:\windows\inf\perflib\0000\perfc.dat
2010-01-30 02:19:18 80896 --sha-w- c:\windows\system32\rerujito.dll
2010-01-30 02:19:18 80896 --sha-w- c:\windows\system32\warosadi.dll

============= FINISH: 12:12:34.00 ===============

Attached Files



BC AdBot (Login to Remove)

 


#2 fireman4it

fireman4it

    Bleepin' Fireman


  • Malware Response Team
  • 13,505 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Greenup, Ill USA
  • Local time:12:14 AM

Posted 14 May 2010 - 01:27 PM


Hello brdrgrl,
  • Welcome to Bleeping Computer.
  • My name is fireman4it and I will be helping you with your Malware problem.

    Please take note of some guidelines for this fix:
  • Refrain from making any changes to your computer including installing/uninstall programs, deleting files, modifying the registry, and running scanners or tools.
  • If you do not understand any step(s) provided, please do not hesitate to ask before continuing.
  • Even if things appear to be better, it might not mean we are finished. Please continue to follow my instructions and reply back until I give you the "all clean".
  • Finally, please reply using the button in the lower right hand corner of your screen. Do not start a new topic. The logs that you post should be pasted directly into the reply, unless they do not fit into the post.


1.
Download and Run RKill
    Please download RKill by Grinler from one of the 4 links below and save it to your desktop.

    Link 1
    Link 2
    Link 3
    Link 4

  • Before we begin, you should disable your anti-malware softwares you have installed so they do not interfere RKill running as some anti-malware softwares detect RKill as malicious. Please refer to this page if you are not sure how.
  • Double-click on Rkill on your desktop to run it. (If you are using Windows Vista, please right-click on it and select Run As Administrator)
  • A black screen will appear and then disappear. Please do not worry, that is normal. This means that the tool has been successfully executed.
  • If nothing happens or if the tool does not run, please let me know in your next reply

2.
Install Recovery Console and Run ComboFix

This tool is not a toy. If used the wrong way you could trash your computer. Please use only under direction of a Helper. If you decide to do so anyway, please do not blame me or ComboFix.

Download Combofix from any of the links below, and save it to your desktop.

Link 1
Link 2
  • Close/disable all anti-virus and anti-malware programs so they do not interfere with the running of ComboFix. Refer to this page if you are not sure how.
  • Close any open windows, including this one.
  • Double click on ComboFix.exe & follow the prompts.
  • As part of it's process, ComboFix will check to see if the Microsoft Windows Recovery Console is installed. With malware infections being as they are today, it's strongly recommended to have this pre-installed on your machine before doing any malware removal. It will allow you to boot up into a special recovery/repair mode that will allow us to more easily help you should your computer have a problem after an attempted removal of malware.
  • If you did not have it installed, you will see the prompt below. Choose YES.
  • Follow the prompts to allow ComboFix to download and install the Microsoft Windows Recovery Console, and when prompted, agree to the End-User License Agreement to install the Microsoft Windows Recovery Console.

**Please note: If the Microsoft Windows Recovery Console is already installed, ComboFix will continue it's malware removal procedures.

Note:The Windows Recovery Console will allow you to boot up into a special recovery (repair) mode. This allows us to more easily help you
should your computer have a problem after an attempted removal of malware. It is a simple procedure that will only take a few moments of your time.
  • Once the Microsoft Windows Recovery Console is installed using ComboFix, you should see the following message:

  • Click on Yes, to continue scanning for malware.
  • When finished, it will produce a report for you. Please post the contents of the log (C:\ComboFix.txt).
Leave your computer alone while ComboFix is running.
ComboFix will restart your computer if malware is found; allow it to do so.


Note: Please Do NOT mouseclick combofix's window while its running because it may cause it to stall.


Things to include in your next reply:
Combofix.txt
How is your machine running now?

" Extinguishing Malware from the world"

The Virus, Trojan, Spyware, and Malware Removal forum is very busy. If I'm helping you and I've not posted back within 24 hrs., send a PM with your topic link. Thank you.

ALL OTHER HELP REQUESTS VIA THE PM SYSTEM WILL BE IGNORED. The Forums are there for a reason!
Thanks-


  userbar_eis_500.gif

If I have helped you, consider making a donation to help me continue the fight against Malware! Just click btn_donate_LG.gif


#3 brdrgrl

brdrgrl
  • Topic Starter

  • Members
  • 12 posts
  • OFFLINE
  •  
  • Local time:01:14 AM

Posted 14 May 2010 - 03:24 PM

Hi fireman4it. Thanks for helping. The only thing I tried after the fix was my internet explorer link. I received "illegal operation attempted on a registry key that has been marked for deletion. I will patiently await further instructions. Here is the log file:

ComboFix 10-05-14.05 - Amy 05/14/2010 15:52:52.1.2 - x86
Microsoft® Windows Vista™ Home Premium 6.0.6001.1.1252.1.1033.18.2039.1161 [GMT -4:00]
Running from: c:\users\Amy\Desktop\ComboFix.exe
AV: Symantec AntiVirus *On-access scanning disabled* (Updated) {FB06448E-52B8-493A-90F3-E43226D3305C}
SP: Symantec AntiVirus *disabled* (Updated) {6C85A515-B91D-4D2B-AF18-40984A4A8493}
SP: Windows Defender *enabled* (Updated) {D68DDC3A-831F-4FAE-9E44-DA132C1ACF46}
.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.

c:\programdata\pragmamfeklnmal.dll
c:\users\Amy\AppData\Local\{C90D69F3-3717-43AF-A3A8-E6967EA74BEA}
c:\users\Amy\AppData\Local\{C90D69F3-3717-43AF-A3A8-E6967EA74BEA}\chrome.manifest
c:\users\Amy\AppData\Local\{C90D69F3-3717-43AF-A3A8-E6967EA74BEA}\chrome\content\_cfg.js
c:\users\Amy\AppData\Local\{C90D69F3-3717-43AF-A3A8-E6967EA74BEA}\chrome\content\overlay.xul
c:\users\Amy\AppData\Local\{C90D69F3-3717-43AF-A3A8-E6967EA74BEA}\install.rdf
c:\users\Amy\g2mdlhlpx.exe
c:\windows\PRAGMAixopjstfpe
c:\windows\PRAGMAixopjstfpe\PRAGMAc.dll
c:\windows\PRAGMAixopjstfpe\PRAGMAcfg.ini
c:\windows\PRAGMAixopjstfpe\PRAGMAd.sys
c:\windows\system32\bqbschmxie.dll
c:\windows\system32\config\systemprofile\AppData\Local\ALeUDAPu.dll
c:\windows\system32\drivers\ndisrd.sys
c:\windows\system32\drivers\snetcfg.exe
c:\windows\system32\ndisapi.dll
c:\windows\system32\pragmabbr.dll
c:\windows\system32\pragmaserf.dll
c:\windows\system32\PRAGMAsrcr.dat
c:\windows\system32\rerujito.dll
c:\windows\system32\warosadi.dll
c:\windows\Sysvxd.exe
D:\Autorun.inf

Infected copy of c:\windows\system32\drivers\volmgr.sys was found and disinfected
Restored copy from - Kitty had a snack tongue.gif
.
((((((((((((((((((((((((((((((((((((((( Drivers/Services )))))))))))))))))))))))))))))))))))))))))))))))))
.

-------\Service_PRAGMAixopjstfpe
-------\Legacy_PRAGMAIXOPJSTFPE
-------\Service_Ndisrd
-------\Service_NdisrdMP


((((((((((((((((((((((((( Files Created from 2010-04-14 to 2010-05-14 )))))))))))))))))))))))))))))))
.

2010-05-14 20:02 . 2010-05-14 20:05 -------- d-----w- c:\users\Amy\AppData\Local\temp
2010-05-14 17:31 . 2010-05-14 17:31 680 ----a-w- c:\users\Amy\AppData\Local\d3d9caps.dat
2010-05-04 23:36 . 2010-05-04 23:36 -------- d-----w- c:\program files\Symantec
2010-05-04 18:20 . 2010-05-04 18:20 -------- d-----w- c:\programdata\IObit
2010-05-04 18:20 . 2010-05-04 18:20 -------- d-----w- c:\program files\IObit
2010-05-03 21:27 . 2010-05-03 21:27 -------- d-----w- C:\Trend Micro
2010-04-30 20:58 . 2010-05-04 14:32 120 ----a-w- c:\users\Amy\AppData\Local\Frugaf.dat
2010-04-30 20:58 . 2010-05-04 14:32 0 ----a-w- c:\users\Amy\AppData\Local\Efavux.bin
2010-04-30 02:42 . 2010-04-30 02:42 84992 --sha-r- c:\windows\system32\sqlceqp30S.dll
2010-04-30 02:19 . 2010-04-30 02:19 107520 ----a-w- c:\windows\system32\Spool\prtprocs\w32x86\b00000bfb.dll
2010-04-30 02:18 . 2010-04-30 02:18 107520 ----a-w- c:\windows\system32\Spool\prtprocs\w32x86\b00000de8.dll

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2010-05-04 23:36 . 2009-09-13 16:18 805 ----a-w- c:\windows\system32\drivers\SYMEVENT.INF
2010-05-04 23:36 . 2009-09-13 16:18 123952 ----a-w- c:\windows\system32\drivers\SYMEVENT.SYS
2010-05-04 23:36 . 2009-09-13 16:18 10563 ----a-w- c:\windows\system32\drivers\SYMEVENT.CAT
2010-05-03 20:42 . 2008-05-07 09:30 -------- d-----w- c:\program files\Google
2010-05-03 16:19 . 2009-07-09 03:44 -------- d-----w- c:\program files\Windows Live Safety Center
2010-04-24 15:06 . 2010-04-24 15:06 658184 ----a-w- c:\programdata\Microsoft\eHome\Packages\MCESpotlight\MCESpotlight\SpotlightResources.dll
2010-04-18 19:50 . 2008-05-07 09:25 -------- d-----w- c:\program files\Common Files\Adobe
2010-04-15 07:19 . 2006-11-02 11:18 -------- d-----w- c:\program files\Windows Mail
2010-04-15 07:03 . 2008-05-07 09:27 -------- d-----w- c:\programdata\Microsoft Help
2010-03-31 07:21 . 2010-03-26 21:05 -------- d-----w- c:\programdata\NOS
2010-03-26 21:05 . 2010-03-26 21:05 -------- d-----w- c:\program files\Common Files\Adobe AIR
2010-03-26 21:05 . 2010-03-26 21:05 86016 ----a-w- c:\programdata\NOS\Adobe_Downloads\arh.exe
2010-03-09 16:28 . 2010-03-30 18:03 833024 ----a-w- c:\windows\system32\wininet.dll
2010-03-09 16:25 . 2010-03-30 18:03 78336 ----a-w- c:\windows\system32\ieencode.dll
2010-03-09 14:01 . 2010-03-30 18:03 26624 ----a-w- c:\windows\system32\ieUnatt.exe
2010-03-05 18:21 . 2010-03-05 18:21 72488 ----a-w- c:\programdata\Apple Computer\Installer Cache\iTunes 9.0.3.15\SetupAdmin.exe
2010-03-04 18:54 . 2010-04-14 12:18 430080 ----a-w- c:\windows\system32\vbscript.dll
2010-02-24 08:23 . 2008-08-10 14:22 103992 ----a-w- c:\users\Amy\AppData\Local\GDIPFONTCACHEV1.DAT
2010-02-23 11:32 . 2010-04-14 12:18 212992 ----a-w- c:\windows\system32\drivers\mrxsmb10.sys
2010-02-23 11:32 . 2010-04-14 12:18 78848 ----a-w- c:\windows\system32\drivers\mrxsmb20.sys
2010-02-23 11:32 . 2010-04-14 12:18 105984 ----a-w- c:\windows\system32\drivers\mrxsmb.sys
2010-02-20 23:39 . 2010-03-12 08:01 24064 ----a-w- c:\windows\system32\nshhttp.dll
2010-02-20 23:37 . 2010-03-12 08:01 31232 ----a-w- c:\windows\system32\httpapi.dll
2010-02-20 21:18 . 2010-03-12 08:01 411136 ----a-w- c:\windows\system32\drivers\http.sys
2010-02-18 14:49 . 2010-04-14 12:17 898952 ----a-w- c:\windows\system32\drivers\tcpip.sys
2010-02-18 14:49 . 2010-04-14 12:18 3598216 ----a-w- c:\windows\system32\ntkrnlpa.exe
2010-02-18 14:49 . 2010-04-14 12:18 3545992 ----a-w- c:\windows\system32\ntoskrnl.exe
2010-02-18 14:11 . 2010-04-14 12:17 190464 ----a-w- c:\windows\system32\iphlpsvc.dll
2010-02-18 11:52 . 2010-04-14 12:17 25088 ----a-w- c:\windows\system32\drivers\tunnel.sys
2010-01-30 02:19 . 2010-01-30 02:19 80896 --sha-w- c:\windows\System32\kihugiga.dll
.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"ehTray.exe"="c:\windows\ehome\ehTray.exe" [2008-01-21 125952]
"WMPNSCFG"="c:\program files\Windows Media Player\WMPNSCFG.exe" [2008-01-21 202240]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"Windows Defender"="c:\program files\Windows Defender\MSASCui.exe" [2008-01-21 1008184]
"IgfxTray"="c:\windows\system32\igfxtray.exe" [2008-02-22 141848]
"HotKeysCmds"="c:\windows\system32\hkcmd.exe" [2008-02-22 166424]
"Persistence"="c:\windows\system32\igfxpers.exe" [2008-02-22 133656]
"RtHDVCpl"="RtHDVCpl.exe" [2007-04-23 4435968]
"EKIJ5000StatusMonitor"="c:\windows\system32\spool\DRIVERS\W32X86\3\EKIJ5000MUI.exe" [2008-02-15 1052672]
"ccApp"="c:\program files\Common Files\Symantec Shared\ccApp.exe" [2008-02-01 115560]
"vptray"="c:\progra~1\SYMANT~1\VPTray.exe" [2008-10-23 136080]
"QuickTime Task"="c:\program files\QuickTime\QTTask.exe" [2009-11-11 417792]
"iTunesHelper"="c:\program files\iTunes\iTunesHelper.exe" [2010-02-15 141608]
"Adobe ARM"="c:\program files\Common Files\Adobe\ARM\1.0\AdobeARM.exe" [2010-03-24 952768]
"Windows Mobile-based device management"="c:\windows\WindowsMobile\wmdcBase.exe" [2007-05-31 648072]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce]
"Launcher"="c:\windows\SMINST\launcher.exe" [2008-01-19 40072]

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\system]
"EnableLUA"= 0 (0x0)
"EnableUIADesktopToggle"= 0 (0x0)

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\drivers32]
"aux"=wdmaud.drv

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\ccEvtMgr]
@="Service"

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\ccSetMgr]
@="Service"

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\Symantec Antivirus]
@="Service"

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\WinDefend]
@="Service"

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecAntiVirus]
"DisableMonitoring"=dword:00000001

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Svc\S-1-5-18]
"EnableNotifications\\Ref"=dword:00000001

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Svc\S-1-5-21-3917738136-2676680180-1288316716-1000]
"EnableNotifications\\Ref"=dword:00000001

R3 NETw2v32;Intel® PRO/Wireless 2200BG Network Connection Driver for Windows Vista;c:\windows\system32\DRIVERS\NETw2v32.sys [2006-11-02 2589184]
R3 SavRoam;SavRoam;c:\program files\Symantec AntiVirus\SavRoam.exe [2008-10-23 121744]
S2 KodakSvc;Kodak AiO Device Service;c:\program files\Kodak\printer\center\KodakSvc.exe [2008-02-28 18944]
S3 EraserUtilRebootDrv;EraserUtilRebootDrv;c:\program files\Common Files\Symantec Shared\EENGINE\EraserUtilRebootDrv.sys [2009-08-27 102448]


[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\svchost]
WindowsMobile REG_MULTI_SZ wcescomm rapimgr
LocalServiceRestricted REG_MULTI_SZ WcesComm RapiMgr
.
Contents of the 'Scheduled Tasks' folder
.
.
------- Supplementary Scan -------
.
uStart Page = hxxp://espn.go.com/
mStart Page = hxxp://www.gateway.com/g/startpage.html?Ch=Retail&SubCH=&Br=EM&Loc=ENG_US&Sys=DTP&M=T5274a
uInternet Settings,ProxyOverride = *.local
IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~3\Office12\EXCEL.EXE/3000
Trusted Zone: ncspearson.com
DPF: {C7DEDA04-2FFF-4B81-AE66-0A0E0EF4AD2F} - hxxp://imagefinishers.lifepics.com/net/Uploader/LPUploader57.cab
DPF: {CAFECAFE-0013-0001-0028-ABCDEFABCDEF}
.
- - - - ORPHANS REMOVED - - - -

BHO-{2ac9d6a0-69c5-4ec7-8459-1f9fe7f60081} - rerujito.dll
HKLM-Run-vuvusebeni - warosadi.dll



**************************************************************************
scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully
hidden files:

**************************************************************************
.
--------------------- LOCKED REGISTRY KEYS ---------------------

[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0000\AllUserSettings]
@Denied: (A) (Users)
@Denied: (A) (Everyone)
@Allowed: (B 1 2 3 4 5) (S-1-5-20)
"BlindDial"=dword:00000000
"MSCurrentCountry"=dword:000000b5
.
------------------------ Other Running Processes ------------------------
.
c:\program files\Common Files\Symantec Shared\ccSvcHst.exe
c:\windows\system32\rundll32.exe
c:\windows\system32\agrsmsvc.exe
c:\program files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
c:\program files\Bonjour\mDNSResponder.exe
c:\program files\Symantec AntiVirus\DefWatch.exe
c:\program files\Symantec AntiVirus\Rtvscan.exe
c:\windows\system32\WUDFHost.exe
c:\windows\RtHDVCpl.exe
c:\program files\Symantec AntiVirus\VPTray.exe
c:\windows\system32\igfxsrvc.exe
c:\windows\ehome\ehmsas.exe
c:\program files\iPod\bin\iPodService.exe
c:\program files\Windows Media Player\wmpnetwk.exe
c:\\?\c:\windows\system32\wbem\WMIADAP.EXE
.
**************************************************************************
.
Completion time: 2010-05-14 16:10:21 - machine was rebooted
ComboFix-quarantined-files.txt 2010-05-14 20:10

Pre-Run: 226,398,515,200 bytes free
Post-Run: 226,298,441,728 bytes free

- - End Of File - - 0CD633C6C49EC0271FF4907BD5D624AD


#4 fireman4it

fireman4it

    Bleepin' Fireman


  • Malware Response Team
  • 13,505 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Greenup, Ill USA
  • Local time:12:14 AM

Posted 14 May 2010 - 04:13 PM

Hello,


Things are looking much better but we have some work to do.

1.
We need to run a CFScript.

1. Close any open browsers.

2. Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.

3. Open notepad and copy/paste the text in the codebox below into it:

CODE
Killall::

Rootkit::
c:\windows\System32\kihugiga.dll

File::
c:\users\Amy\AppData\Local\Frugaf.dat
c:\users\Amy\AppData\Local\Efavux.bin

Registry::
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\system]
"EnableLUA"=-
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\system]
"EnableUIADesktopToggle"=-
[HKEY_LOCAL_MACHINE\software\microsoft\security center\Svc\S-1-5-18]
"EnableNotifications\\Ref"=-
[HKEY_LOCAL_MACHINE\software\microsoft\security center\Svc\S-1-5-21-3917738136-2676680180-1288316716-1000]
"EnableNotifications\\Ref"=-

DDS::
Trusted Zone: ncspearson.com
DPF: {C7DEDA04-2FFF-4B81-AE66-0A0E0EF4AD2F} - hxxp://imagefinishers.lifepics.com/net/Uploader/LPUploader57.cab
DPF: {CAFECAFE-0013-0001-0028-ABCDEFABCDEF}

Reglock::
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0000]


Save this as CFScript.txt, in the same location as ComboFix.exe




Refering to the picture above, drag CFScript into ComboFix.exe

When finished, it shall produce a log for you at C:\ComboFix.txt which I will require in your next reply.

2.
Please download Malwarebytes Anti-Malware (v1.44) and save it to your desktop.MBAM may "make changes to your registry" as part of its disinfection routine. If using other security programs that detect registry changes (ie Spybot's Teatimer), they may interfere or alert you. Temporarily disable such programs or permit them to allow the changes.
  • Make sure you are connected to the Internet.
  • Double-click on mbam-setup.exe to install the application.
    For instructions with screenshots, please refer to the How to use Malwarebytes' Anti-Malware Guide.
  • When the installation begins, follow the prompts and do not make any changes to default settings.
  • When installation has finished, make sure you leave both of these checked:
    • Update Malwarebytes' Anti-Malware
    • Launch Malwarebytes' Anti-Malware
  • Then click Finish.
MBAM will automatically start and you will be asked to update the program before performing a scan.
  • If an update is found, the program will automatically update itself. Press the OK button to close that box and continue.
  • If you encounter any problems while downloading the definition updates, manually download them from here and just double-click on mbam-rules.exe to install.
On the Scanner tab:
  • Make sure the "Perform Quick Scan" option is selected.
  • Then click on the Scan button.
  • If asked to select the drives to scan, leave all the drives selected and click on the Start Scan button.
  • The scan will begin and "Scan in progress" will show at the top. It may take some time to complete so please be patient.
  • When the scan is finished, a message box will say "The scan completed successfully. Click 'Show Results' to display all objects found".
  • Click OK to close the message box and continue with the removal process.
Back at the main Scanner screen:
  • Click on the Show Results button to see a list of any malware that was found.
  • Make sure that everything is checked, and click Remove Selected.
  • When removal is completed, a log report will open in Notepad.
  • The log is automatically saved and can be viewed by clicking the Logs tab in MBAM.
  • Copy and paste the contents of that report in your next reply. Be sure to post the complete log to include the top portion which shows MBAM's database version and your operating system.
  • Exit MBAM when done.
Note: If MBAM encounters a file that is difficult to remove, you will be asked to reboot your computer so MBAM can proceed with the disinfection process. If asked to restart the computer, please do so immediately. Failure to reboot normally (not into safe mode) will prevent MBAM from removing all the malware.

Things to include in your next reply::
Combofix.txt
MBAM log
A new DDS log
How is your machine running now?

" Extinguishing Malware from the world"

The Virus, Trojan, Spyware, and Malware Removal forum is very busy. If I'm helping you and I've not posted back within 24 hrs., send a PM with your topic link. Thank you.

ALL OTHER HELP REQUESTS VIA THE PM SYSTEM WILL BE IGNORED. The Forums are there for a reason!
Thanks-


  userbar_eis_500.gif

If I have helped you, consider making a donation to help me continue the fight against Malware! Just click btn_donate_LG.gif


#5 brdrgrl

brdrgrl
  • Topic Starter

  • Members
  • 12 posts
  • OFFLINE
  •  
  • Local time:01:14 AM

Posted 16 May 2010 - 09:32 AM

Fireman, I was able to complete run the CFscript and generate a log but have not been able to run the Malwarebytes because I haven't had an internet connection. I have improperly working devices - WinpkFilter Miniports. I have been reluctant to do anything to them because I know I'm not supposed to make changes while we're trying to fix things. I disabled the devices and wired my modem directly to a laptop to contact you but did not make any other changes to the desktop. Can I try this setup for the desktop, or attempt to uninstall, or is it possible to run the Malwarebytes without internet access? I'm including the 2nd combo fix log in case it helps. Thanks.

ComboFix 10-05-14.05 - Amy 05/15/2010 8:34.2.2 - x86
Microsoft® Windows Vista™ Home Premium 6.0.6001.1.1252.1.1033.18.2039.1126 [GMT -4:00]
Running from: c:\users\Amy\Desktop\ComboFix.exe
Command switches used :: c:\users\Amy\Desktop\CFScript.txt
AV: Symantec AntiVirus *On-access scanning disabled* (Updated) {FB06448E-52B8-493A-90F3-E43226D3305C}
SP: Symantec AntiVirus *disabled* (Updated) {6C85A515-B91D-4D2B-AF18-40984A4A8493}
SP: Windows Defender *enabled* (Updated) {D68DDC3A-831F-4FAE-9E44-DA132C1ACF46}

FILE ::
"c:\users\Amy\AppData\Local\Efavux.bin"
"c:\users\Amy\AppData\Local\Frugaf.dat"
.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.

c:\users\Amy\AppData\Local\Efavux.bin
c:\users\Amy\AppData\Local\Frugaf.dat
c:\windows\system32\kihugiga.dll

.
((((((((((((((((((((((((( Files Created from 2010-04-15 to 2010-05-15 )))))))))))))))))))))))))))))))
.

2010-05-15 12:37 . 2010-05-15 12:39 -------- d-----w- c:\users\Amy\AppData\Local\temp
2010-05-15 12:37 . 2010-05-15 12:37 -------- d-----w- c:\users\Public\AppData\Local\temp
2010-05-15 12:37 . 2010-05-15 12:37 -------- d-----w- c:\users\Default\AppData\Local\temp
2010-05-14 17:31 . 2010-05-14 17:31 680 ----a-w- c:\users\Amy\AppData\Local\d3d9caps.dat
2010-05-04 23:36 . 2010-05-04 23:36 -------- d-----w- c:\program files\Symantec
2010-05-04 18:20 . 2010-05-04 18:20 -------- d-----w- c:\programdata\IObit
2010-05-04 18:20 . 2010-05-04 18:20 -------- d-----w- c:\program files\IObit
2010-05-03 21:27 . 2010-05-03 21:27 -------- d-----w- C:\Trend Micro
2010-04-30 02:42 . 2010-04-30 02:42 84992 --sha-r- c:\windows\system32\sqlceqp30S.dll
2010-04-30 02:19 . 2010-04-30 02:19 107520 ----a-w- c:\windows\system32\Spool\prtprocs\w32x86\b00000bfb.dll
2010-04-30 02:18 . 2010-04-30 02:18 107520 ----a-w- c:\windows\system32\Spool\prtprocs\w32x86\b00000de8.dll

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2010-05-04 23:36 . 2009-09-13 16:18 805 ----a-w- c:\windows\system32\drivers\SYMEVENT.INF
2010-05-04 23:36 . 2009-09-13 16:18 123952 ----a-w- c:\windows\system32\drivers\SYMEVENT.SYS
2010-05-04 23:36 . 2009-09-13 16:18 10563 ----a-w- c:\windows\system32\drivers\SYMEVENT.CAT
2010-05-03 20:42 . 2008-05-07 09:30 -------- d-----w- c:\program files\Google
2010-05-03 16:19 . 2009-07-09 03:44 -------- d-----w- c:\program files\Windows Live Safety Center
2010-04-24 15:06 . 2010-04-24 15:06 658184 ----a-w- c:\programdata\Microsoft\eHome\Packages\MCESpotlight\MCESpotlight\SpotlightResources.dll
2010-04-18 19:50 . 2008-05-07 09:25 -------- d-----w- c:\program files\Common Files\Adobe
2010-04-15 07:19 . 2006-11-02 11:18 -------- d-----w- c:\program files\Windows Mail
2010-04-15 07:03 . 2008-05-07 09:27 -------- d-----w- c:\programdata\Microsoft Help
2010-03-31 07:21 . 2010-03-26 21:05 -------- d-----w- c:\programdata\NOS
2010-03-26 21:05 . 2010-03-26 21:05 -------- d-----w- c:\program files\Common Files\Adobe AIR
2010-03-26 21:05 . 2010-03-26 21:05 86016 ----a-w- c:\programdata\NOS\Adobe_Downloads\arh.exe
2010-03-09 16:28 . 2010-03-30 18:03 833024 ----a-w- c:\windows\system32\wininet.dll
2010-03-09 16:25 . 2010-03-30 18:03 78336 ----a-w- c:\windows\system32\ieencode.dll
2010-03-09 14:01 . 2010-03-30 18:03 26624 ----a-w- c:\windows\system32\ieUnatt.exe
2010-03-05 18:21 . 2010-03-05 18:21 72488 ----a-w- c:\programdata\Apple Computer\Installer Cache\iTunes 9.0.3.15\SetupAdmin.exe
2010-03-04 18:54 . 2010-04-14 12:18 430080 ----a-w- c:\windows\system32\vbscript.dll
2010-02-24 08:23 . 2008-08-10 14:22 103992 ----a-w- c:\users\Amy\AppData\Local\GDIPFONTCACHEV1.DAT
2010-02-23 11:32 . 2010-04-14 12:18 212992 ----a-w- c:\windows\system32\drivers\mrxsmb10.sys
2010-02-23 11:32 . 2010-04-14 12:18 78848 ----a-w- c:\windows\system32\drivers\mrxsmb20.sys
2010-02-23 11:32 . 2010-04-14 12:18 105984 ----a-w- c:\windows\system32\drivers\mrxsmb.sys
2010-02-20 23:39 . 2010-03-12 08:01 24064 ----a-w- c:\windows\system32\nshhttp.dll
2010-02-20 23:37 . 2010-03-12 08:01 31232 ----a-w- c:\windows\system32\httpapi.dll
2010-02-20 21:18 . 2010-03-12 08:01 411136 ----a-w- c:\windows\system32\drivers\http.sys
2010-02-18 14:49 . 2010-04-14 12:17 898952 ----a-w- c:\windows\system32\drivers\tcpip.sys
2010-02-18 14:49 . 2010-04-14 12:18 3598216 ----a-w- c:\windows\system32\ntkrnlpa.exe
2010-02-18 14:49 . 2010-04-14 12:18 3545992 ----a-w- c:\windows\system32\ntoskrnl.exe
2010-02-18 14:11 . 2010-04-14 12:17 190464 ----a-w- c:\windows\system32\iphlpsvc.dll
2010-02-18 11:52 . 2010-04-14 12:17 25088 ----a-w- c:\windows\system32\drivers\tunnel.sys
.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"ehTray.exe"="c:\windows\ehome\ehTray.exe" [2008-01-21 125952]
"WMPNSCFG"="c:\program files\Windows Media Player\WMPNSCFG.exe" [2008-01-21 202240]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"Windows Defender"="c:\program files\Windows Defender\MSASCui.exe" [2008-01-21 1008184]
"IgfxTray"="c:\windows\system32\igfxtray.exe" [2008-02-22 141848]
"HotKeysCmds"="c:\windows\system32\hkcmd.exe" [2008-02-22 166424]
"Persistence"="c:\windows\system32\igfxpers.exe" [2008-02-22 133656]
"RtHDVCpl"="RtHDVCpl.exe" [2007-04-23 4435968]
"EKIJ5000StatusMonitor"="c:\windows\system32\spool\DRIVERS\W32X86\3\EKIJ5000MUI.exe" [2008-02-15 1052672]
"ccApp"="c:\program files\Common Files\Symantec Shared\ccApp.exe" [2008-02-01 115560]
"vptray"="c:\progra~1\SYMANT~1\VPTray.exe" [2008-10-23 136080]
"QuickTime Task"="c:\program files\QuickTime\QTTask.exe" [2009-11-11 417792]
"iTunesHelper"="c:\program files\iTunes\iTunesHelper.exe" [2010-02-15 141608]
"Adobe ARM"="c:\program files\Common Files\Adobe\ARM\1.0\AdobeARM.exe" [2010-03-24 952768]
"Windows Mobile-based device management"="c:\windows\WindowsMobile\wmdcBase.exe" [2007-05-31 648072]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce]
"Launcher"="c:\windows\SMINST\launcher.exe" [2008-01-19 40072]

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\drivers32]
"aux"=wdmaud.drv

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\ccEvtMgr]
@="Service"

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\ccSetMgr]
@="Service"

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\Symantec Antivirus]
@="Service"

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\WinDefend]
@="Service"

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecAntiVirus]
"DisableMonitoring"=dword:00000001

R3 NETw2v32;Intel® PRO/Wireless 2200BG Network Connection Driver for Windows Vista;c:\windows\system32\DRIVERS\NETw2v32.sys [2006-11-02 2589184]
R3 SavRoam;SavRoam;c:\program files\Symantec AntiVirus\SavRoam.exe [2008-10-23 121744]
S2 KodakSvc;Kodak AiO Device Service;c:\program files\Kodak\printer\center\KodakSvc.exe [2008-02-28 18944]
S3 EraserUtilRebootDrv;EraserUtilRebootDrv;c:\program files\Common Files\Symantec Shared\EENGINE\EraserUtilRebootDrv.sys [2009-08-27 102448]


[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\svchost]
WindowsMobile REG_MULTI_SZ wcescomm rapimgr
LocalServiceRestricted REG_MULTI_SZ WcesComm RapiMgr
.
.
------- Supplementary Scan -------
.
uStart Page = hxxp://espn.go.com/
mStart Page = hxxp://www.gateway.com/g/startpage.html?Ch=Retail&SubCH=&Br=EM&Loc=ENG_US&Sys=DTP&M=T5274a
uInternet Settings,ProxyOverride = *.local
IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~3\Office12\EXCEL.EXE/3000
.

**************************************************************************

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2010-05-15 08:39
Windows 6.0.6001 Service Pack 1 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully
hidden files: 0

**************************************************************************
.
------------------------ Other Running Processes ------------------------
.
c:\program files\Common Files\Symantec Shared\ccSvcHst.exe
c:\windows\system32\agrsmsvc.exe
c:\program files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
c:\program files\Bonjour\mDNSResponder.exe
c:\program files\Symantec AntiVirus\DefWatch.exe
c:\program files\Symantec AntiVirus\Rtvscan.exe
c:\windows\system32\WUDFHost.exe
c:\windows\RtHDVCpl.exe
c:\program files\Symantec AntiVirus\VPTray.exe
c:\windows\system32\igfxsrvc.exe
c:\windows\ehome\ehmsas.exe
c:\program files\iPod\bin\iPodService.exe
c:\program files\Windows Media Player\wmpnetwk.exe
c:\\?\c:\windows\system32\wbem\WMIADAP.EXE
.
**************************************************************************
.
Completion time: 2010-05-15 08:44:21 - machine was rebooted
ComboFix-quarantined-files.txt 2010-05-15 12:44
ComboFix2.txt 2010-05-14 20:10

Pre-Run: 226,321,448,960 bytes free
Post-Run: 226,193,203,200 bytes free

- - End Of File - - C4CB8C0AE14B6AFD4AE3D9528B839B7B


#6 fireman4it

fireman4it

    Bleepin' Fireman


  • Malware Response Team
  • 13,505 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Greenup, Ill USA
  • Local time:12:14 AM

Posted 16 May 2010 - 03:26 PM

Hello,

QUOTE
Can I try this setup for the desktop, or attempt to uninstall, or is it possible to run the Malwarebytes without internet access? I'm including the 2nd combo fix log in case it helps. Thanks.

Yes you can try try the same setup,but first try the following:

  • Go to Start -> Control Panel -> Network and Internet Connection ->Network Connections.
  • Right-click your default connection, usually Local Area Connection or Dial-up Connection (if you are using dial-up), and left-click on the Properties option.
  • Double-click on the Internet Protocol (TCP/IP) item and select the radio button that says "Obtain DNS servers automatically".
  • Click OK twice.
    spacer.gif
  • Go to Start -> Run...
  • In the Open: field type cmd and click OK or hit Enter.
    This will open a Command Prompt.
  • At the DOS prompt screen, type in ipconfig /flushdns and then press Enter (notice the space between "ipconfig" and "/flushdns").
  • Exit the Command Prompt.
  • Reboot your PC and try to open any website.


IF this doesn't work try your setup. MalwareBytes can also be ran without a internet connection as long as it on your machine already.


" Extinguishing Malware from the world"

The Virus, Trojan, Spyware, and Malware Removal forum is very busy. If I'm helping you and I've not posted back within 24 hrs., send a PM with your topic link. Thank you.

ALL OTHER HELP REQUESTS VIA THE PM SYSTEM WILL BE IGNORED. The Forums are there for a reason!
Thanks-


  userbar_eis_500.gif

If I have helped you, consider making a donation to help me continue the fight against Malware! Just click btn_donate_LG.gif


#7 brdrgrl

brdrgrl
  • Topic Starter

  • Members
  • 12 posts
  • OFFLINE
  •  
  • Local time:01:14 AM

Posted 16 May 2010 - 03:46 PM

I tried the first fix. After entering ipconfig /flushdns I received "The requested operation requires elevation." After that, I tried running Malwarebytes but received Run Time errors '0' and '440'. Thought it might be because I couldn't update so I tried again after manually adding the updates. Same errors when I tried to access Malewarebytes preceded by vb Accelerator SGrid II Cont.

#8 fireman4it

fireman4it

    Bleepin' Fireman


  • Malware Response Team
  • 13,505 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Greenup, Ill USA
  • Local time:12:14 AM

Posted 16 May 2010 - 05:32 PM

Hello,

It sounds like your copy of MBAM might be corrupt please delete that copy through add/remove programs and download and install a fresh copy.

Are you able to access the internet when hardwired?

" Extinguishing Malware from the world"

The Virus, Trojan, Spyware, and Malware Removal forum is very busy. If I'm helping you and I've not posted back within 24 hrs., send a PM with your topic link. Thank you.

ALL OTHER HELP REQUESTS VIA THE PM SYSTEM WILL BE IGNORED. The Forums are there for a reason!
Thanks-


  userbar_eis_500.gif

If I have helped you, consider making a donation to help me continue the fight against Malware! Just click btn_donate_LG.gif


#9 brdrgrl

brdrgrl
  • Topic Starter

  • Members
  • 12 posts
  • OFFLINE
  •  
  • Local time:01:14 AM

Posted 16 May 2010 - 06:27 PM

OK. Uninstalled. I originally downloaded Malwarebytes from the link you sent in one of your posts. I saved it to a flash drive and then copied to the problem PC. Should I try the other download link 2 or is there another site you recommend? No, I could not connect when hardwired to my high speed modem. Is it ok to uninstall the the network adaptors that are marked as having hardware issues or should I try to uninstall and then re-install the modem itself. I'm attaching the Network adaptors part of my device manager. The first Realtek is ok, it's the next 4 lines that are the problem. Thanks.

Attached Files



#10 fireman4it

fireman4it

    Bleepin' Fireman


  • Malware Response Team
  • 13,505 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Greenup, Ill USA
  • Local time:12:14 AM

Posted 17 May 2010 - 12:53 AM

Hello,

Yes i would Uninstall those network drivers then reinstall them.

" Extinguishing Malware from the world"

The Virus, Trojan, Spyware, and Malware Removal forum is very busy. If I'm helping you and I've not posted back within 24 hrs., send a PM with your topic link. Thank you.

ALL OTHER HELP REQUESTS VIA THE PM SYSTEM WILL BE IGNORED. The Forums are there for a reason!
Thanks-


  userbar_eis_500.gif

If I have helped you, consider making a donation to help me continue the fight against Malware! Just click btn_donate_LG.gif


#11 brdrgrl

brdrgrl
  • Topic Starter

  • Members
  • 12 posts
  • OFFLINE
  •  
  • Local time:01:14 AM

Posted 17 May 2010 - 05:17 PM

I tried to uninstall each of the WinpkFilter Miniport entries and nothing changed. They are still there. The only changes are between enabling and disabling - the exclamation changes to a down arrow when disables. I still cannot connect to the internet. I tried installing and running another (newer) version of Malewarebytes (1.46, I think) but I received the same errors:

vbAccelerator SGrid II Control

Run-time error '0'


and

Malwarebytes' Anti-Malware

Run-time error '440':

Automation error


I also tried renaming the Malwarebytes.exe and then running. Same error messages. Is there anything else I can try? Thanks.

#12 fireman4it

fireman4it

    Bleepin' Fireman


  • Malware Response Team
  • 13,505 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Greenup, Ill USA
  • Local time:12:14 AM

Posted 17 May 2010 - 05:52 PM

Hello,

Here is what Malwarebytes says to do when getting that error.


ISSUE: I'm getting a Runtime error 0 and 440 automation error.



Please do the following to see if it fixes the error:
  • Please copy and paste the following text in the Code box exactly as written into notepad (not wordpad or any other text editor):
    CODE
          regsvr32 "C:\Program Files\Malwarebytes' Anti-Malware\mbamext.dll"
          regsvr32 "C:\Program Files\Malwarebytes' Anti-Malware\ssubtmr6.dll"
          regsvr32 "C:\Program Files\Malwarebytes' Anti-Malware\vbalsgrid6.ocx"

  • Once you've done that click on File and select Save As...
  • In the Save dialogue box click on the drop down menu next to Save as type and select All Files
  • Name the file MBAM Fix.bat (the .bat extension is very important)
  • Save the file to your desktop and double click it to run it on XP. For Vista please right click on it and choose Run As Admin
  • Click OK to each of the 3 dialog boxes that should show a success message for each file registered
  • If you get an error that REGSVR32 "is not recognized as an internal or external command, operable program or batch file", then ensure that the file REGSVR32.EXE exists in the %WINDIR%\SYSTEM32 folder. If it's not found there you can copy if from another Computer running the same operating system and service pack level.
    If that doesn't fix it then please download and install the Microsoft Visual Basic Common Controls from here to see if it helps.

" Extinguishing Malware from the world"

The Virus, Trojan, Spyware, and Malware Removal forum is very busy. If I'm helping you and I've not posted back within 24 hrs., send a PM with your topic link. Thank you.

ALL OTHER HELP REQUESTS VIA THE PM SYSTEM WILL BE IGNORED. The Forums are there for a reason!
Thanks-


  userbar_eis_500.gif

If I have helped you, consider making a donation to help me continue the fight against Malware! Just click btn_donate_LG.gif


#13 brdrgrl

brdrgrl
  • Topic Starter

  • Members
  • 12 posts
  • OFFLINE
  •  
  • Local time:01:14 AM

Posted 17 May 2010 - 09:35 PM

Hi Fireman. I've got an internet connection again (hardwired) but the last suggestions you sent did not work. Nothing happened when I ran the .bat file except that the cmd prompt flashed I did not receive any ok's or errors. The visual basic download updated successfully but didn't help. When those two things didn't work I used the F8 boot menu option to disable driver signature enforcement. That didn't work so I found another way to attempt to uninstall the WinpkFilter. After that, I was able to connect. I've since tried installing and running Malwarebytes (and the .bat fix again) but am receiving the same error messages. Any other thoughts? Thanks.

#14 fireman4it

fireman4it

    Bleepin' Fireman


  • Malware Response Team
  • 13,505 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Greenup, Ill USA
  • Local time:12:14 AM

Posted 17 May 2010 - 10:58 PM

Hello,

Lets go ahead and try some different scanners. sometimes MBAM just don't wanna work sad.gif


1.
Please download ATF Cleaner by Atribune. (This program is for XP and Windows 2000 only)
    Double-click ATF-Cleaner.exe to run the program.
    Under Main "Select Files to Delete" choose: Select All.
    Click the Empty Selected button.
If you use Firefox browser
    Click Firefox at the top and choose: Select All
    Click the Empty Selected button.
    NOTE: If you would like to keep your saved passwords, please click No at the prompt.
If you use Opera browser
    Click Opera at the top and choose: Select All
    Click the Empty Selected button.
    NOTE: If you would like to keep your saved passwords, please click No at the prompt.
Click Exit on the Main menu to close the program.
For Technical Support, double-click the e-mail address located at the bottom of each menu.

2.
Please download and scan with SUPERAntiSpyware Free
  • Double-click SUPERAntiSypware.exe and use the default settings for installation.
  • An icon will be created on your desktop. Double-click that icon to launch the program.
  • If it will not start, go to Start > All Prgrams > SUPERAntiSpyware and click on Alternate Start.
  • If asked to update the program definitions, click "Yes". If not, update the definitions before scanning by selecting "Check for Updates". (If you encounter any problems while downloading the updates, manually download them from here. Double-click on the hyperlink for Download Installer and save SASDEFINITIONS.EXE to your desktop. Then double-click on SASDEFINITIONS.EXE to install the definitions.)
  • In the Main Menu, click the Preferences... button.
  • Click the "General and Startup" tab, and under Start-up Options, make sure "Start SUPERAntiSpyware when Windows starts" box is unchecked.
  • Click the "Scanning Control" tab, and under Scanner Options, make sure the following are checked (leave all others unchecked):
    • Close browsers before scanning.
    • Scan for tracking cookies.
    • Terminate memory threats before quarantining.
  • Click the "Close" button to leave the control center screen and exit the program.
  • Do not run a scan just yet.
Reboot your computer in "Safe Mode" using the F8 method. To do this, restart your computer and after hearing your computer beep once during startup (but before the Windows icon appears) press the F8 key repeatedly. A menu will appear with several options. Use the arrow keys to navigate and select the option to run Windows in "Safe Mode".

Scan with SUPERAntiSpyware as follows:
  • Launch the program and back on the main screen, under "Scan for Harmful Software" click Scan your computer.
  • On the left, make sure you check C:\Fixed Drive.
  • On the right, under "Complete Scan", choose Perform Complete Scan and click "Next".
  • After the scan is complete, a Scan Summary box will appear with potentially harmful items that were detected. Click "OK".
  • Make sure everything has a checkmark next to it and click "Next".
  • A notification will appear that "Quarantine and Removal is Complete". Click "OK" and then click the "Finish" button to return to the main menu.
  • If asked if you want to reboot, click "Yes" and reboot normally.
  • To retrieve the removal information after reboot, launch SUPERAntispyware again.
    • Click Preferences, then click the Statistics/Logs tab.
    • Under Scanner Logs, double-click SUPERAntiSpyware Scan Log.
    • If there are several logs, click the current dated log and press View log. A text file will open in your default text editor.
    • Please copy and paste the Scan Log results in your next reply.
  • Click Close to exit the program.
If you have a problem downloading, installing or getting SAS to run, try downloading and using the SUPERAntiSpyware Portable Scanner instead. Save the randomly named file (i.e. SAS_1710895.COM) to a usb drive or CD and transfer to the infected computer. Then double-click on it to launch and scan. The file is randomly named to help keep malware from blocking the scanner.

3.
I'd like us to scan your machine with ESET OnlineScan
  1. Hold down Control and click on the following link to open ESET OnlineScan in a new window.
    ESET OnlineScan
  2. Click the button.
  3. For alternate browsers only: (Microsoft Internet Explorer users can skip these steps)
    1. Click on to download the ESET Smart Installer. Save it to your desktop.
    2. Double click on the icon on your desktop.
  4. Check
  5. Click the button.
  6. Accept any security warnings from your browser.
  7. Check
  8. Push the Start button.
  9. ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this can take some time.
  10. When the scan completes, push
  11. Push , and save the file to your desktop using a unique name, such as ESETScan. Include the contents of this report in your next reply.
  12. Push the button.
  13. Push
Note for Vista Users: Eset is compatible but Internet Explorer must be run as Administrator. To do this, right-click on the IE icon in the Start Menu or Quick Launch Bar on the Taskbar and select "Run as Administrator" from the context menu.)

You can refer to this short video by: neomage
**Note**
To optimize scanning time and produce a more sensible report for review:
  • Close any open programs
  • Turn off the real time scanner of any existing antivirus program while performing the online scan.

Here are a few links to tell you about the infection you had.
http://www.securelist.com/en/descriptions/old60840
http://www.sophos.com/security/analyses/vi...e/w32bagza.html
http://www.symantec.com/security_response/...-99&tabid=2


Things to include in your next reply:
SAS log
Eset log
A new DDS log
How is the machine running? Any signs of Malware?

" Extinguishing Malware from the world"

The Virus, Trojan, Spyware, and Malware Removal forum is very busy. If I'm helping you and I've not posted back within 24 hrs., send a PM with your topic link. Thank you.

ALL OTHER HELP REQUESTS VIA THE PM SYSTEM WILL BE IGNORED. The Forums are there for a reason!
Thanks-


  userbar_eis_500.gif

If I have helped you, consider making a donation to help me continue the fight against Malware! Just click btn_donate_LG.gif


#15 brdrgrl

brdrgrl
  • Topic Starter

  • Members
  • 12 posts
  • OFFLINE
  •  
  • Local time:01:14 AM

Posted 18 May 2010 - 04:19 PM

Hi Fireman. I'm working on your last instructions. I made it thru to ESET online scanner. An hour and a half later and over 100000 files and it still says 49% complete. Does this sound right? I disabled auto protect for my antivirus (Symantec) but it seems to have re-started itself as I've received auto-protect results during the scan. The first time I stopped the scan, disabled, and started again because the scan seemed to have stopped. This time, I didn't stop and the targets and files scanned are changing but the progress is not. The Auto-Protect Results window is still open - it indicates that the risk is SpywareGuard2008, a file named ptnfvretssd.exe was quarantined and a reboot is required. The percentage complete finally changed but I'm still wondering if the auto-protect (if it is in fact my Symantec) will interfere with the scan?




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users