Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Unknown malware - infects IE, creates At1-At24.job files


  • This topic is locked This topic is locked
16 replies to this topic

#1 oldclaret

oldclaret

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:08:22 PM

Posted 15 May 2010 - 04:28 PM

Upon bootup, file C:\programdata\6TMDwA02.exe is created. It also appears to be downloaded from the Internet.
Trend warns about it, but it appears to be downloaded even if "blocked". I am not sure if the exe is being regenerated
locally and/or downloaded from the Internet.

6TMDwA02 executes (visible in DDS.txt as a running process) and creates files At1.job through At24.job in folder c:\Windows\Tasks.
6TMDwa02 cannot be deleted until the job files have been generated. After generation, I can delete the exe and
the job files, but the problem persists.The malware exhibits by trying to launch IE. If IE is running, it opens
various websites, periodically closing Internet Explorer. It almost makes IE unusable.

I have run scans with ComboFix, SuperAntiSpyware, MalwarebyAntiMalware, and Trend. ComboFix detects and deletes
6TMDwa02.exe and the job files, but they are regenerated on the next boot. ComboFix was run in SafeMode. The last
2 times I ran ComboFix, it crashed the system while writing the log.


DDS (Ver_10-03-17.01) - NTFSx86
Run by OldClaret at 16:34:12.07 on Sat 05/15/2010
Internet Explorer: 8.0.6001.18904
Microsoft® Windows Vista™ Home Premium 6.0.6002.2.1252.1.1033.18.1917.1178 [GMT -4:00]

SP: Lavasoft Ad-Watch Live! *disabled* (Updated) {67844DAE-4F77-4D69-9457-98E8CFFDAA22}
SP: Windows Defender *disabled* (Updated) {D68DDC3A-831F-4FAE-9E44-DA132C1ACF46}

============== Running Processes ===============

C:\Windows\system32\wininit.exe
C:\Windows\system32\lsm.exe
C:\Windows\system32\svchost.exe -k DcomLaunch
C:\Windows\Microsoft.Net\Framework\v3.0\WPF\PresentationFontCache.exe
C:\Windows\system32\svchost.exe -k rpcss
C:\Windows\system32\Ati2evxx.exe
C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted
C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted
C:\Windows\system32\svchost.exe -k netsvcs
C:\Windows\system32\svchost.exe -k GPSvcGroup
C:\Windows\system32\SLsvc.exe
C:\Windows\system32\svchost.exe -k LocalService
C:\Windows\system32\Ati2evxx.exe
C:\Windows\system32\svchost.exe -k NetworkService
C:\Windows\System32\spoolsv.exe
C:\Windows\system32\svchost.exe -k LocalServiceNoNetwork
C:\Windows\system32\agrsmsvc.exe
C:\Program Files\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe
C:\Program Files\Bonjour\mDNSResponder.exe
C:\Program Files\TOSHIBA\ConfigFree\CFSvcs.exe
C:\Toshiba\IVP\ISM\pinger.exe
C:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted
C:\Windows\system32\svchost.exe -k imgsvc
C:\Program Files\Toshiba\TOSHIBA DVD PLAYER\TNaviSrv.exe
C:\Windows\system32\TODDSrv.exe
C:\Program Files\Toshiba\Power Saver\TosCoSrv.exe
C:\Program Files\Toshiba\Bluetooth Toshiba Stack\TosBtSrv.exe
C:\Program Files\Common Files\Ulead Systems\DVD\ULCDRSvr.exe
C:\Windows\System32\svchost.exe -k WerSvcGroup
C:\Windows\system32\SearchIndexer.exe
C:\Windows\system32\taskeng.exe
C:\Windows\system32\taskeng.exe
C:\Windows\system32\Dwm.exe
C:\Windows\Explorer.EXE
C:\Program Files\RegCure\RegCure.exe
C:\Windows\RtHDVCpl.exe
C:\Program Files\Toshiba\ConfigFree\NDSTray.exe
C:\Windows\Samsung\PanelMgr\SSMMgr.exe
C:\Program Files\Toshiba\TBS\HSON.exe
C:\Program Files\Windows Media Player\wmpnscfg.exe
C:\Windows\ehome\ehtray.exe
C:\Program Files\WordWeb\wweb32.exe
C:\Program Files\Windows Media Player\wmpnetwk.exe
C:\Program Files\Toshiba\ConfigFree\CFSwMgr.exe
C:\Windows\ehome\ehmsas.exe
C:\Program Files\Trend Micro\Internet Security\TmProxy.exe
C:\Program Files\Trend Micro\Internet Security\TmPfw.exe
C:\Program Files\Trend Micro\TrendSecure\TISProToolbar\ProToolbarUpdate.exe
C:\Program Files\IEHistoryPH\IEHistoryShellNotifier .exe
C:\Program Files\ATI Technologies\ATI.ACE\Core-Static\MOM.EXE
C:\Program Files\Toshiba\FlashCards\TCrdMain .exe
C:\Program Files\IEHistoryPH\IEHistoryShellNotifier .exe
C:\Program Files\ATI Technologies\ATI.ACE\Core-Static\CCC.exe
C:\Program Files\Trend Micro\BM\TMBMSRV.exe
C:\Windows\system32\wbem\wmiprvse.exe
C:\ProgramData\6TMDwA02.exe
C:\Program Files\Trend Micro\TrendSecure\TISProToolbar\PlatformDependent\ProToolbarComm.exe
C:\Program Files\Trend Micro\TrendSecure\TSCFPlatformCOMSvr.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Users\Steve\Desktop\dds.scr
C:\Windows\system32\wbem\wmiprvse.exe

============== Pseudo HJT Report ===============

uStart Page = hxxp://www.cnn.com/
uInternet Settings,ProxyOverride = *.local
BHO: Adobe PDF Link Helper: {18df081c-e8ad-4283-a596-fa578c2ebdc3} - c:\program files\common files\adobe\acrobat\activex\AcroIEHelperShim.dll
BHO: TSToolbarBHO: {43c6d902-a1c5-45c9-91f6-fd9e90337e18} - c:\program files\trend micro\trendsecure\tisprotoolbar\TSToolbar.dll
BHO: SSVHelper Class: {761497bb-d6f0-462c-b6eb-d4daf1d92d43} - c:\program files\java\jre1.6.0_02\bin\ssv.dll
BHO: Google Toolbar Helper: {aa58ed58-01dd-4d91-8333-cf10577473f7} - c:\program files\google\google toolbar\GoogleToolbar_32.dll
BHO: Google Toolbar Notifier BHO: {af69de43-7d58-4638-b6fa-ce66b5ad205d} - c:\program files\google\googletoolbarnotifier\5.4.4525.1752\swg.dll
BHO: Google Dictionary Compression sdch: {c84d72fe-e17d-4195-bb24-76c02e2e7c4e} - c:\program files\google\google toolbar\component\fastsearch_B7C5AC242193BB3E.dll
TB: Google Toolbar: {2318c2b1-4965-11d4-9b18-009027a5cd4f} - c:\program files\google\google toolbar\GoogleToolbar_32.dll
TB: Trend Micro Toolbar: {ccac5586-44d7-4c43-b64a-f042461a97d2} - c:\program files\trend micro\trendsecure\tisprotoolbar\TSToolbar.dll
uRun: [TOSCDSPD] c:\program files\toshiba\toscdspd\TOSCDSPD.exe
uRun: [WMPNSCFG] c:\program files\windows media player\WMPNSCFG.exe
uRun: [ehTray.exe] c:\windows\ehome\ehTray.exe
mRun: [Windows Defender] %ProgramFiles%\Windows Defender\MSASCui.exe -hide
mRun: [RtHDVCpl] RtHDVCpl.exe
mRun: [HSON] %ProgramFiles%\TOSHIBA\TBS\HSON.exe
mRun: [00TCrdMain] %ProgramFiles%\TOSHIBA\FlashCards\TCrdMain.exe
mRun: [NDSTray.exe] NDSTray.exe
mRun: [StartCCC] c:\program files\ati technologies\ati.ace\core-static\CLIStart.exe
mRun: [IEHistory] c:\program files\iehistoryph\IEHistoryShellNotifier.exe
mRun: [Samsung PanelMgr] c:\windows\samsung\panelmgr\SSMMgr.exe /autorun
mRun: [Adobe Reader Speed Launcher] "c:\program files\adobe\reader 9.0\reader\Reader_sl.exe"
mRun: [QuickTime Task] "c:\program files\quicktime\QTTask .exe" -atboottime
mRun: [UfSeAgnt.exe] "c:\program files\trend micro\internet security\UfSeAgnt.exe"
StartupFolder: c:\users\steve\appdata\roaming\microsoft\windows\start menu\programs\startup\OneNote Table Of Contents.onetoc2
StartupFolder: c:\users\steve\appdata\roaming\micros~1\windows\startm~1\programs\startup\wordweb.lnk - c:\program files\wordweb\wweb32.exe
mPolicies-explorer: BindDirectlyToPropertySetStorage = 0 (0x0)
mPolicies-system: EnableLUA = 0 (0x0)
mPolicies-system: EnableUIADesktopToggle = 0 (0x0)
IE: Add to Google Photos Screensa&ver - c:\windows\system32\GPhotos.scr/200
IE: E&xport to Microsoft Excel - c:\progra~1\micros~3\office12\EXCEL.EXE/3000
IE: {53F6FCCD-9E22-4d71-86EA-6E43136192AB}
IE: {925DAB62-F9AC-4221-806A-057BFB1014AA}
IE: {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - {CAFEEFAC-0016-0000-0002-ABCDEFFEDCBC} - c:\program files\java\jre1.6.0_02\bin\ssv.dll
IE: {2670000A-7350-4f3c-8081-5663EE0C6C49} - {48E73304-E1D6-4330-914C-F5F514E3486C} - c:\progra~1\micros~3\office12\ONBttnIE.dll
IE: {92780B25-18CC-41C8-B9BE-3C9C571A8263} - {FF059E31-CC5A-4E2E-BF3B-96E929D65503} - c:\progra~1\micros~3\office12\REFIEBAR.DLL
Trusted Zone: turbotax.com
DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_02-windows-i586.cab
DPF: {8FFBE65D-2C9C-4669-84BD-5829DC0B603C} - hxxp://fpdownload.macromedia.com/get/flashplayer/current/ultrashim.cab
DPF: {CAFEEFAC-0016-0000-0002-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_02-windows-i586.cab
DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_02-windows-i586.cab
DPF: {F27237D7-93C8-44C2-AC6E-D6057B9A918F} - hxxps://juniper.net/dana-cached/sc/JuniperSetupClient.cab
Handler: tmtb - {04EAF3FB-4BAC-4B5A-A37D-A1CF210A5A42} - c:\program files\trend micro\trendsecure\tisprotoolbar\TSToolbar.dll

============= SERVICES / DRIVERS ===============

R1 tmlwf;Trend Micro NDIS 6.0 Filter Driver;c:\windows\system32\drivers\tmlwf.sys [2010-5-5 146448]
R2 SSPORT;SSPORT;c:\windows\system32\drivers\SSPORT.SYS [2009-1-9 5120]
R2 tmpreflt;tmpreflt;c:\windows\system32\drivers\tmpreflt.sys [2010-5-12 36368]
R2 tmwfp;Trend Micro WFP Callout Driver;c:\windows\system32\drivers\tmwfp.sys [2010-5-5 283152]
R3 FwLnk;FwLnk Driver;c:\windows\system32\drivers\FwLnk.sys [2007-8-22 7168]
R3 RTL8187B;Realtek RTL8187B Wireless 802.11g 54Mbps USB 2.0 Network Adapter;c:\windows\system32\drivers\rtl8187B.sys [2007-10-27 252416]
R3 tmevtmgr;tmevtmgr;c:\windows\system32\drivers\tmevtmgr.sys [2010-5-5 50704]
R3 TmPfw;Trend Micro Personal Firewall;c:\program files\trend micro\internet security\TmPfw.exe [2010-5-12 497008]
R3 TmProxy;Trend Micro Proxy Service;c:\program files\trend micro\internet security\TmProxy.exe [2010-5-12 689416]
S2 gupdate;Google Update Service (gupdate);c:\program files\google\update\GoogleUpdate.exe [2010-1-5 135664]
S3 FontCache;Windows Font Cache Service;c:\windows\system32\svchost.exe -k LocalServiceAndNoImpersonation [2008-5-31 21504]
S3 winbondcir;Winbond IR Transceiver;c:\windows\system32\drivers\winbondcir.sys [2007-3-28 43008]
S3 Winferno Subscription Service;Winferno Subscription Service;c:\program files\common files\winferno\wss\WSS.exe [2009-3-22 126976]

=============== Created Last 30 ================

2010-05-15 20:31:16 525824 ----a-w- C:\dds.scr
2010-05-15 20:27:54 0 ----a-w- c:\users\steve\defogger_reenable
2010-05-15 20:26:53 284915 ----a-w- C:\gmer.zip
2010-05-15 20:26:46 50477 ----a-w- C:\Defogger.exe
2010-05-15 20:22:41 69122 ----a-w- c:\programdata\6TMDwA02.exe
2010-05-15 11:50:13 0 d-sh--w- C:\$RECYCLE.BIN
2010-05-15 11:37:59 0 d-----w- C:\ComboFix
2010-05-15 01:17:29 0 d-----w- c:\programdata\SUPERAntiSpyware.com
2010-05-15 01:17:19 0 d-----w- c:\users\steve\appdata\roaming\SUPERAntiSpyware.com
2010-05-15 01:17:19 0 d-----w- c:\program files\SUPERAntiSpyware
2010-05-13 23:21:10 0 d--h--w- c:\windows\PIF
2010-05-13 22:37:34 0 d-----w- c:\programdata\RegCure
2010-05-13 12:19:22 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2010-05-13 12:19:21 20952 ----a-w- c:\windows\system32\drivers\mbam.sys
2010-05-13 12:19:21 0 d-----w- c:\programdata\Malwarebytes
2010-05-12 20:23:50 36368 ----a-w- c:\windows\system32\drivers\tmpreflt.sys
2010-05-12 20:23:50 230928 ----a-w- c:\windows\system32\drivers\tmxpflt.sys
2010-05-12 20:23:50 1322680 ----a-w- c:\windows\system32\drivers\vsapint.sys
2010-05-12 20:09:14 0 d-----w- c:\program files\Trend Micro
2010-05-12 17:41:38 738816 ----a-w- c:\windows\system32\inetcomm.dll
2010-05-12 13:13:29 98816 ----a-w- c:\windows\sed.exe
2010-05-12 13:13:29 77312 ----a-w- c:\windows\MBR.exe
2010-05-12 13:13:29 256512 ----a-w- c:\windows\PEV.exe
2010-05-12 13:13:29 161792 ----a-w- c:\windows\SWREG.exe
2010-05-06 00:41:30 283152 ----a-w- c:\windows\system32\drivers\tmwfp.sys
2010-05-06 00:41:29 89872 ----a-w- c:\windows\system32\drivers\tmtdi.sys
2010-05-06 00:41:29 59920 ----a-w- c:\windows\system32\drivers\tmactmon.sys
2010-05-06 00:41:29 50704 ----a-w- c:\windows\system32\drivers\tmevtmgr.sys
2010-05-06 00:41:29 158224 ----a-w- c:\windows\system32\drivers\tmcomm.sys
2010-05-06 00:41:29 146448 ----a-w- c:\windows\system32\drivers\tmlwf.sys
2010-05-06 00:17:50 0 d-----w- c:\windows\pss
2010-05-05 20:02:21 0 ----a-w- C:\debug
2010-05-04 01:23:22 0 d-----w- C:\Tax
2010-05-01 13:01:03 112 ----a-w- c:\programdata\hB5783b.dat
2010-05-01 03:14:41 0 d-----w- c:\users\steve\appdata\roaming\Malwarebytes
2010-05-01 03:04:07 0 d-----w- c:\program files\Malwarebytes' Anti-Malware
2010-04-26 23:05:34 0 d-----w- c:\program files\Microsoft WSE
2010-04-26 22:54:58 0 d-----w- c:\program files\Family Tree Maker 2010
2010-04-26 22:54:58 0 d-----w- c:\program files\BCL Technologies
2010-04-16 01:14:06 420352 ----a-w- c:\windows\system32\vbscript.dll
2010-04-16 01:14:05 79360 ----a-w- c:\windows\system32\drivers\mrxsmb20.sys
2010-04-16 01:14:04 212992 ----a-w- c:\windows\system32\drivers\mrxsmb10.sys
2010-04-16 01:14:04 106496 ----a-w- c:\windows\system32\drivers\mrxsmb.sys
2010-04-16 01:13:56 3600776 ----a-w- c:\windows\system32\ntkrnlpa.exe
2010-04-16 01:13:56 3548040 ----a-w- c:\windows\system32\ntoskrnl.exe
2010-04-16 01:13:38 904576 ----a-w- c:\windows\system32\drivers\tcpip.sys
2010-04-16 01:13:38 25088 ----a-w- c:\windows\system32\drivers\tunnel.sys
2010-04-16 01:13:38 200704 ----a-w- c:\windows\system32\iphlpsvc.dll
2010-04-16 01:13:35 62464 ----a-w- c:\windows\system32\l3codeca.acm
2010-04-16 01:13:35 220672 ----a-w- c:\windows\system32\l3codecp.acm

==================== Find3M ====================

2010-05-12 20:13:20 51200 ----a-w- c:\windows\inf\infpub.dat
2010-05-12 20:13:20 143360 ----a-w- c:\windows\inf\infstrng.dat
2010-05-12 20:13:19 143360 ----a-w- c:\windows\inf\infstor.dat
2010-02-23 06:39:13 916480 ----a-w- c:\windows\system32\wininet.dll
2010-02-23 06:33:45 71680 ----a-w- c:\windows\system32\iesetup.dll
2010-02-23 06:33:45 109056 ----a-w- c:\windows\system32\iesysprep.dll
2010-02-23 04:55:36 133632 ----a-w- c:\windows\system32\ieUnatt.exe
2010-02-20 23:06:41 24064 ----a-w- c:\windows\system32\nshhttp.dll
2010-02-20 23:05:14 30720 ----a-w- c:\windows\system32\httpapi.dll
2009-11-18 00:33:46 665600 ----a-w- c:\windows\inf\drvindex.dat
2008-05-31 13:38:08 174 --sha-w- c:\program files\desktop.ini
2006-11-02 12:42:02 30674 ----a-w- c:\windows\inf\perflib\0409\perfd.dat
2006-11-02 12:42:02 30674 ----a-w- c:\windows\inf\perflib\0409\perfc.dat
2006-11-02 12:42:02 287440 ----a-w- c:\windows\inf\perflib\0409\perfi.dat
2006-11-02 12:42:02 287440 ----a-w- c:\windows\inf\perflib\0409\perfh.dat
2006-11-02 09:20:21 287440 ----a-w- c:\windows\inf\perflib\0000\perfi.dat
2006-11-02 09:20:21 287440 ----a-w- c:\windows\inf\perflib\0000\perfh.dat
2006-11-02 09:20:19 30674 ----a-w- c:\windows\inf\perflib\0000\perfd.dat
2006-11-02 09:20:19 30674 ----a-w- c:\windows\inf\perflib\0000\perfc.dat
2009-10-24 00:45:37 245760 --sha-w- c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft\windows\ietldcache\index.dat

============= FINISH: 16:35:33.45 ===============

Attached Files



BC AdBot (Login to Remove)

 


#2 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:12:22 AM

Posted 16 May 2010 - 06:55 PM

Hi,

Welcome to Bleeping Computer. My name is m0le and I will be helping you with your log.
  • Please subscribe to this topic, if you haven't already. You can subscribe by clicking the Options box to the right of your topic title and selecting Track This Topic.

  • Please avoid installing/uninstalling or updating any programs and attempting any unsupervised fixes or scans. This can make helping you impossible.

  • Please reply to this post so I know you are there.
The forum is busy and we need to have replies as soon as possible. If I haven't had a reply after 3 days I will bump the topic and if you do not reply by the following day after that then I will close the topic.

Once I receive a reply then I will return with your first instructions.

Thanks thumbup2.gif
Posted Image
m0le is a proud member of UNITE

#3 oldclaret

oldclaret
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:08:22 PM

Posted 17 May 2010 - 04:17 AM

I'm onboard. Before we proceed, I want to let you know the state of my computer. Once the process 6TMDwA02 is running, it bogs down my computer a lot with disk access and attempts to use IE. Therefore, the current state is that I have used Task Manager to manually kill the process tree of 6TMDwA02, manually deleted file C:\ProgramData\6TMDwA02.exe, manually deleted files C:\windows\tasks\At1.job through At24.job, and disconnected from the Internet. Before discovering Bleepingcomputer, I ran Combofix. It detected and deleted 6TMDwA02.exe and At1.job, but apparently do not cure. As long as I stay offline, I am probably ok, but if we need to activate the infection for testing, I can go online to do so. Finally, as you probably already know, "6TMDwA02.exe" appears to be a random name.

I may not be available until this evening.

#4 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:12:22 AM

Posted 17 May 2010 - 12:58 PM

The AT*.job files are connected to the TDSS rootkit. There is no sign of that here but we should be thorough.

Please run Rkill

Download and Run RKill

Please download RKill by Grinler from one of the 4 links below and save it to your desktop.

Link 1
Link 2
Link 3
Link 4
  • Before we begin, you should disable your anti-malware softwares you have installed so they do not interfere RKill running as some anti-malware softwares detect RKill as malicious. Please refer to this page if you are not sure how.
  • Double-click on Rkill on your desktop to run it. (If you are using Windows Vista, please right-click on it and select Run As Administrator)
  • A black screen will appear and then disappear. Please do not worry, that is normal. This means that the tool has been successfully executed.
  • Please post the resulting log in your next reply.


Now run Combofix

Please download ComboFix from one of these locations:* IMPORTANT !!! Save ComboFix.exe to your Desktop making sure you rename it comfix.exe
  • Disable your AntiVirus and AntiSpyware applications, usually via a right click on the System Tray icon. They may otherwise interfere with our tools. (Click on this link to see a list of programs that should be disabled. The list is not all inclusive.)
  • Double click on Comfix.exe & follow the prompts.
  • As part of it's process, ComboFix will check to see if the Microsoft Windows Recovery Console is installed. With malware infections being as they are today, it's strongly recommended to have this pre-installed on your machine before doing any malware removal. It will allow you to boot up into a special recovery/repair mode that will allow us to more easily help you should your computer have a problem after an attempted removal of malware.
  • Follow the prompts to allow ComboFix to download and install the Microsoft Windows Recovery Console, and when prompted, agree to the End-User License Agreement to install the Microsoft Windows Recovery Console.
**Please note: If the Microsoft Windows Recovery Console is already installed, ComboFix will continue it's malware removal procedures.



Once the Microsoft Windows Recovery Console is installed using ComboFix, you should see the following message:



Click on Yes, to continue scanning for malware.

When finished, it shall produce a log for you. Please include the C:\ComboFix.txt in your next reply.


Posted Image
m0le is a proud member of UNITE

#5 oldclaret

oldclaret
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:08:22 PM

Posted 17 May 2010 - 05:25 PM



RKill.log:

This log file is located at C:\rkill.log.
Please post this only if requested to by the person helping you.
Otherwise you can close this log when you wish.
Ran as Steve on 05/17/2010 at 18:07:27.


Processes terminated by Rkill or while it was running:


C:\Users\Steve\Desktop\rkill.com


Rkill completed on 05/17/2010 at 18:07:30.


Combofix.txt:


ComboFix 10-05-10.05 - Steve 05/17/2010 18:09:42.8.2 - x86
Microsoft® Windows Vista™ Home Premium 6.0.6002.2.1252.1.1033.18.1917.1257 [GMT -4:00]
Running from: c:\users\Steve\Desktop\ComFix.exe
SP: Lavasoft Ad-Watch Live! *disabled* (Updated) {67844DAE-4F77-4D69-9457-98E8CFFDAA22}
SP: Windows Defender *disabled* (Updated) {D68DDC3A-831F-4FAE-9E44-DA132C1ACF46}
.

((((((((((((((((((((((((( Files Created from 2010-04-17 to 2010-05-17 )))))))))))))))))))))))))))))))
.

2010-05-17 22:16 . 2010-05-17 22:16 -------- d-----w- c:\users\Steve\AppData\Local\temp
2010-05-17 22:16 . 2010-05-17 22:16 -------- d-----w- c:\users\Public\AppData\Local\temp
2010-05-17 22:16 . 2010-05-17 22:16 -------- d-----w- c:\users\Default\AppData\Local\temp
2010-05-17 22:05 . 2010-05-17 22:06 214 ----a-w- C:\comfile.reg
2010-05-16 18:24 . 2009-12-04 16:39 230928 ----a-w- c:\windows\system32\drivers\tmxpflt.sys
2010-05-16 18:24 . 2009-12-04 16:38 36368 ----a-w- c:\windows\system32\drivers\tmpreflt.sys
2010-05-16 18:24 . 2009-12-04 16:05 1322680 ----a-w- c:\windows\system32\drivers\vsapint.sys
2010-05-16 18:05 . 2010-05-16 18:11 -------- d-----w- c:\program files\Trend Micro
2010-05-16 17:44 . 2010-05-16 17:44 -------- d-----w- c:\users\Steve\log
2010-05-16 11:31 . 2010-05-16 11:31 -------- d-----w- c:\program files\Exterminate It!
2010-05-16 11:31 . 2010-05-16 11:31 4470952 ----a-w- C:\ExterminateItSetup.exe
2010-05-16 10:33 . 2010-05-16 10:28 119808 ----a-w- C:\VundoFix.exe
2010-05-15 20:31 . 2010-05-15 20:29 525824 ----a-w- C:\dds.scr
2010-05-15 20:26 . 2010-05-15 20:24 284915 ----a-w- C:\gmer.zip
2010-05-15 20:26 . 2010-05-15 20:25 50477 ----a-w- C:\Defogger.exe
2010-05-15 11:59 . 2010-05-15 11:59 388096 ----a-r- c:\users\Steve\AppData\Roaming\Microsoft\Installer\{45A66726-69BC-466B-A7A4-12FCBA4883D7}\HiJackThis.exe
2010-05-15 01:19 . 2010-05-15 01:19 63488 ----a-w- c:\users\Steve\AppData\Roaming\SUPERAntiSpyware.com\SUPERAntiSpyware\SDDLLS\SD10006.dll
2010-05-15 01:18 . 2010-05-15 01:18 52224 ----a-w- c:\users\Steve\AppData\Roaming\SUPERAntiSpyware.com\SUPERAntiSpyware\SDDLLS\SD10005.dll
2010-05-15 01:18 . 2010-05-15 01:18 117760 ----a-w- c:\users\Steve\AppData\Roaming\SUPERAntiSpyware.com\SUPERAntiSpyware\SDDLLS\UIREPAIR.DLL
2010-05-15 01:17 . 2010-05-15 01:17 -------- d-----w- c:\programdata\SUPERAntiSpyware.com
2010-05-15 01:17 . 2010-05-15 14:58 -------- d-----w- c:\program files\SUPERAntiSpyware
2010-05-15 01:17 . 2010-05-15 01:17 -------- d-----w- c:\users\Steve\AppData\Roaming\SUPERAntiSpyware.com
2010-05-13 23:21 . 2010-05-13 23:21 -------- d--h--w- c:\windows\PIF
2010-05-13 22:37 . 2010-05-13 22:47 -------- d-----w- c:\programdata\RegCure
2010-05-13 22:37 . 2010-05-13 22:40 -------- d-----w- c:\program files\RegCure
2010-05-13 12:19 . 2010-04-29 19:39 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2010-05-13 12:19 . 2010-05-13 12:19 -------- d-----w- c:\programdata\Malwarebytes
2010-05-13 12:19 . 2010-04-29 19:39 20952 ----a-w- c:\windows\system32\drivers\mbam.sys
2010-05-12 17:41 . 2010-01-29 15:40 738816 ----a-w- c:\windows\system32\inetcomm.dll
2010-05-06 00:41 . 2010-05-06 00:41 283152 ----a-w- c:\windows\system32\drivers\tmwfp.sys
2010-05-06 00:41 . 2010-05-06 00:41 89872 ----a-w- c:\windows\system32\drivers\tmtdi.sys
2010-05-06 00:41 . 2010-05-06 00:41 59920 ----a-w- c:\windows\system32\drivers\tmactmon.sys
2010-05-06 00:41 . 2010-05-06 00:41 50704 ----a-w- c:\windows\system32\drivers\tmevtmgr.sys
2010-05-06 00:41 . 2010-05-06 00:41 158224 ----a-w- c:\windows\system32\drivers\tmcomm.sys
2010-05-06 00:41 . 2010-05-06 00:41 146448 ----a-w- c:\windows\system32\drivers\tmlwf.sys
2010-05-04 01:23 . 2010-05-04 01:24 -------- d-----w- C:\Tax
2010-05-01 03:14 . 2010-05-01 03:14 -------- d-----w- c:\users\Steve\AppData\Roaming\Malwarebytes
2010-05-01 03:04 . 2010-05-16 11:05 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
2010-04-26 23:07 . 2010-04-26 23:07 -------- d-----w- c:\users\Steve\AppData\Local\IsolatedStorage
2010-04-26 23:06 . 2010-04-26 23:06 -------- d-----w- c:\users\Steve\AppData\Local\Ancestry.com
2010-04-26 23:05 . 2010-04-26 23:05 1078 ----a-r- c:\users\Steve\AppData\Roaming\Microsoft\Installer\{EDEA8AB7-7683-4ED2-AA19-E6C078064C0D}\DocumentationShortcu_EDEA8AB776834ED2AA19E6C078064C0D.exe
2010-04-26 23:05 . 2010-04-26 23:05 10134 ----a-r- c:\users\Steve\AppData\Roaming\Microsoft\Installer\{EDEA8AB7-7683-4ED2-AA19-E6C078064C0D}\ARPPRODUCTICON.exe
2010-04-26 23:05 . 2010-04-26 23:05 -------- d-----w- c:\program files\Microsoft WSE
2010-04-26 22:54 . 2010-04-26 23:07 -------- d-----w- c:\program files\Family Tree Maker 2010
2010-04-26 22:54 . 2010-04-26 23:04 -------- d-----w- c:\program files\BCL Technologies

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2010-05-17 21:53 . 2008-01-27 14:19 -------- d-----w- c:\programdata\Google Updater
2010-05-16 21:17 . 2010-05-01 13:01 112 ----a-w- c:\programdata\hB5783b.dat
2010-05-16 21:14 . 2010-04-15 01:24 -------- d-----w- c:\program files\QuickTime
2010-05-16 18:20 . 2007-10-27 17:06 -------- d-----w- c:\programdata\Trend Micro
2010-05-13 12:17 . 2007-08-22 20:03 -------- d-----w- c:\program files\Google
2010-05-12 18:55 . 2006-11-02 11:18 -------- d-----w- c:\program files\Windows Mail
2010-05-12 18:55 . 2007-10-27 16:17 -------- d-----w- c:\programdata\Microsoft Help
2010-05-12 17:10 . 2009-02-07 14:34 -------- d-----w- c:\program files\Lavasoft
2010-05-01 12:58 . 2010-04-15 01:31 -------- d-----w- c:\program files\iTunes
2010-05-01 12:58 . 2007-12-10 03:41 -------- d-----w- c:\program files\IEHistoryPH
2010-04-26 23:05 . 2007-08-22 19:39 -------- d--h--w- c:\program files\InstallShield Installation Information
2010-04-19 02:40 . 2007-10-27 18:54 -------- d-----w- c:\program files\EditURLs
2010-04-15 01:32 . 2010-04-15 01:31 -------- d-----w- c:\programdata\{429CAD59-35B1-4DBC-BB6D-1DB246563521}
2010-04-15 01:31 . 2010-04-15 01:31 -------- d-----w- c:\program files\iPod
2010-04-15 01:31 . 2009-08-30 19:57 -------- d-----w- c:\program files\Common Files\Apple
2010-04-15 01:15 . 2010-04-15 01:15 -------- d-----w- c:\program files\Bonjour
2010-04-15 01:12 . 2010-04-15 01:12 73000 ----a-w- c:\programdata\Apple Computer\Installer Cache\iTunes 9.1.0.79\SetupAdmin.exe
2010-03-20 20:14 . 2010-03-20 20:14 667648 ----a-w- c:\users\Steve\AppData\Roaming\Macromedia\Flash Player\www.macromedia.com\bin\octoshape\pmv306hw-1002180-0-main.dll
2010-03-05 14:01 . 2010-04-16 01:14 420352 ----a-w- c:\windows\system32\vbscript.dll
2010-02-24 00:20 . 2007-10-27 17:11 83288 ----a-w- c:\users\Steve\AppData\Local\GDIPFONTCACHEV1.DAT
2010-02-23 11:10 . 2010-04-16 01:14 212992 ----a-w- c:\windows\system32\drivers\mrxsmb10.sys
2010-02-23 11:10 . 2010-04-16 01:14 79360 ----a-w- c:\windows\system32\drivers\mrxsmb20.sys
2010-02-23 11:10 . 2010-04-16 01:14 106496 ----a-w- c:\windows\system32\drivers\mrxsmb.sys
2010-02-23 06:39 . 2010-03-30 21:54 916480 ----a-w- c:\windows\system32\wininet.dll
2010-02-23 06:33 . 2010-03-30 21:54 109056 ----a-w- c:\windows\system32\iesysprep.dll
2010-02-23 06:33 . 2010-03-30 21:54 71680 ----a-w- c:\windows\system32\iesetup.dll
2010-02-23 04:55 . 2010-03-30 21:54 133632 ----a-w- c:\windows\system32\ieUnatt.exe
2010-02-20 23:06 . 2010-03-21 20:19 24064 ----a-w- c:\windows\system32\nshhttp.dll
2010-02-20 23:05 . 2010-03-21 20:19 30720 ----a-w- c:\windows\system32\httpapi.dll
2010-02-20 20:53 . 2010-03-21 20:19 411648 ----a-w- c:\windows\system32\drivers\http.sys
2010-02-18 14:07 . 2010-04-16 01:13 904576 ----a-w- c:\windows\system32\drivers\tcpip.sys
2010-02-18 14:07 . 2010-04-16 01:13 3600776 ----a-w- c:\windows\system32\ntkrnlpa.exe
2010-02-18 14:07 . 2010-04-16 01:13 3548040 ----a-w- c:\windows\system32\ntoskrnl.exe
2010-02-18 13:30 . 2010-04-16 01:13 200704 ----a-w- c:\windows\system32\iphlpsvc.dll
2010-02-18 11:28 . 2010-04-16 01:13 25088 ----a-w- c:\windows\system32\drivers\tunnel.sys
.
CODE
<pre>
c:\program files\Adobe\Reader 9.0\Reader\Reader_sl .exe
c:\program files\ATI Technologies\ATI.ACE\Core-Static\CLIStart .exe
c:\program files\Common Files\Adobe\ARM\1.0\AdobeARM .exe
c:\program files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier .exe
c:\program files\IEHistoryPH\IEHistoryShellNotifier .exe
c:\program files\iTunes\iTunesHelper .exe
c:\program files\Malwarebytes' Anti-Malware\mbam .exe
c:\program files\QuickTime\QTTask          .exe
c:\program files\QuickTime\QTTask         .exe
c:\program files\QuickTime\QTTask        .exe
c:\program files\QuickTime\QTTask       .exe
c:\program files\QuickTime\QTTask      .exe
c:\program files\QuickTime\QTTask     .exe
c:\program files\QuickTime\QTTask    .exe
c:\program files\QuickTime\QTTask   .exe
c:\program files\QuickTime\QTTask  .exe
c:\program files\QuickTime\QTTask .exe
c:\program files\SUPERAntiSpyware\SUPERAntiSpyware .exe
c:\program files\Synaptics\SynTP\SynTPStart .exe
c:\program files\Toshiba\FlashCards\TCrdMain .exe
c:\program files\Toshiba\Power Saver\TPwrMain .exe
c:\program files\Toshiba\SmoothView\SmoothView .exe
c:\program files\Toshiba\TBS\HSON .exe
c:\program files\Toshiba\TOSCDSPD\TOSCDSPD .exe
</pre>


((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"TOSCDSPD"="c:\program files\TOSHIBA\TOSCDSPD\TOSCDSPD.exe" [2010-05-11 35848]
"WMPNSCFG"="c:\program files\Windows Media Player\WMPNSCFG.exe" [2008-01-19 202240]
"ehTray.exe"="c:\windows\ehome\ehTray.exe" [2008-01-19 125952]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"QuickTime Task"="c:\program files\QuickTime\QTTask .exe -atboottime" [X]
"Windows Defender"="c:\program files\Windows Defender\MSASCui.exe" [2008-01-19 1008184]
"RtHDVCpl"="RtHDVCpl.exe" [2007-08-10 4702208]
"HSON"="c:\program files\TOSHIBA\TBS\HSON.exe" [2010-05-01 35844]
"00TCrdMain"="c:\program files\TOSHIBA\FlashCards\TCrdMain.exe" [2010-05-01 35844]
"NDSTray.exe"="NDSTray.exe" [N/A]
"StartCCC"="c:\program files\ATI Technologies\ATI.ACE\Core-Static\CLIStart.exe" [N/A]
"IEHistory"="c:\program files\IEHistoryPH\IEHistoryShellNotifier.exe" [2010-05-01 35844]
"Samsung PanelMgr"="c:\windows\Samsung\PanelMgr\SSMMgr.exe" [2008-08-18 536576]
"Adobe Reader Speed Launcher"="c:\program files\Adobe\Reader 9.0\Reader\Reader_sl.exe" [2010-05-01 35844]
"UfSeAgnt.exe"="c:\program files\Trend Micro\Internet Security\UfSeAgnt.exe" [2010-01-26 1020248]

c:\users\Steve\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\
OneNote Table Of Contents.onetoc2 [2009-4-29 3656]
WordWeb.lnk - c:\program files\WordWeb\wweb32.exe [2008-5-13 44384]

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\system]
"EnableLUA"= 0 (0x0)
"EnableUIADesktopToggle"= 0 (0x0)

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\WinDefend]
@="Service"

[HKLM\~\startupfolder\C:^Users^Steve^AppData^Roaming^Microsoft^Windows^Start Menu^Programs^Startup^OneNote 2007 Screen Clipper and Launcher.lnk]
path=c:\users\Steve\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\OneNote 2007 Screen Clipper and Launcher.lnk
backup=c:\windows\pss\OneNote 2007 Screen Clipper and Launcher.lnk.Startup
backupExtension=.Startup

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Adobe ARM]
c:\program files\Common Files\Adobe\ARM\1.0\AdobeARM.exe [N/A]

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\iTunesHelper]
2010-05-01 12:58 35844 ----a-w- c:\program files\iTunes\iTunesHelper.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\SmoothView]
2010-05-01 12:58 35844 ----a-w- c:\program files\Toshiba\SmoothView\SmoothView.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\swg]
c:\program files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe [N/A]

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\McAfeeAntiSpyware]
"DisableMonitoring"=dword:00000001

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Svc]
"VistaSp2"=hex(cool.gif:d3,81,1a,b7,f7,37,ca,01

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Svc\S-1-5-21-2445608544-3522571878-3089126978-1000]
"EnableNotificationsRef"=dword:00000001

R0 Lbd;Lbd;c:\windows\system32\DRIVERS\Lbd.sys [x]
R2 gupdate;Google Update Service (gupdate);c:\program files\Google\Update\GoogleUpdate.exe [2010-01-06 135664]
R2 tmpreflt;tmpreflt;c:\windows\system32\DRIVERS\tmpreflt.sys [2009-12-04 36368]
R3 tmevtmgr;tmevtmgr;c:\windows\system32\DRIVERS\tmevtmgr.sys [2010-05-06 50704]
R3 TmPfw;Trend Micro Personal Firewall;c:\program files\Trend Micro\Internet Security\TmPfw.exe [2010-05-06 497008]
R3 TmProxy;Trend Micro Proxy Service;c:\program files\Trend Micro\Internet Security\TmProxy.exe [2010-05-06 689416]
R3 winbondcir;Winbond IR Transceiver;c:\windows\system32\DRIVERS\winbondcir.sys [2007-03-28 43008]
R3 Winferno Subscription Service;Winferno Subscription Service;c:\program files\Common Files\Winferno\WSS\WSS.exe [2007-07-30 126976]
S1 tmlwf;Trend Micro NDIS 6.0 Filter Driver;c:\windows\system32\DRIVERS\tmlwf.sys [2010-05-06 146448]
S2 SSPORT;SSPORT;c:\windows\system32\Drivers\SSPORT.sys [2006-11-22 5120]
S2 tmwfp;Trend Micro WFP Callout Driver;c:\windows\system32\DRIVERS\tmwfp.sys [2010-05-06 283152]
S3 FwLnk;FwLnk Driver;c:\windows\system32\DRIVERS\FwLnk.sys [2006-11-20 7168]
S3 RTL8187B;Realtek RTL8187B Wireless 802.11g 54Mbps USB 2.0 Network Adapter;c:\windows\system32\DRIVERS\RTL8187B.sys [2007-06-01 252416]


[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\svchost]
LocalServiceAndNoImpersonation REG_MULTI_SZ FontCache
.
Contents of the 'Scheduled Tasks' folder

2010-05-17 c:\windows\Tasks\Google Software Updater.job
- c:\program files\Google\Common\Google Updater\GoogleUpdaterService.exe [2007-08-22 03:08]

2010-05-17 c:\windows\Tasks\GoogleUpdateTaskMachineCore.job
- c:\program files\Google\Update\GoogleUpdate.exe [2010-01-06 01:38]

2010-05-17 c:\windows\Tasks\GoogleUpdateTaskMachineUA.job
- c:\program files\Google\Update\GoogleUpdate.exe [2010-01-06 01:38]

2010-05-15 c:\windows\Tasks\RegCure Program Check.job
- c:\program files\RegCure\RegCure.exe [2010-04-29 18:43]

2010-05-17 c:\windows\Tasks\RegCure Startup.job
- c:\program files\RegCure\RegCure.exe [2010-04-29 18:43]

2010-05-14 c:\windows\Tasks\RegCure.job
- c:\program files\RegCure\RegCure.exe [2010-04-29 18:43]

2010-05-17 c:\windows\Tasks\WSSHelper.job
- c:\program files\Common Files\Winferno\WSS\WSSHelper.exe [2009-03-23 16:49]
.
.
------- Supplementary Scan -------
.
uStart Page = hxxp://www.cnn.com/
uInternet Settings,ProxyOverride = *.local
IE: Add to Google Photos Screensa&ver - c:\windows\system32\GPhotos.scr/200
IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~3\Office12\EXCEL.EXE/3000
Trusted Zone: turbotax.com
DPF: {F27237D7-93C8-44C2-AC6E-D6057B9A918F} - hxxps://juniper.net/dana-cached/sc/JuniperSetupClient.cab
.

**************************************************************************

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2010-05-17 18:16
Windows 6.0.6002 Service Pack 2 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

HKCU\Software\Microsoft\Windows\CurrentVersion\Run
TOSCDSPD = c:\program files\TOSHIBA\TOSCDSPD\TOSCDSPD.exe?/i?????w?<? h??? [???[?@?[?X?[?p?

scanning hidden files ...

scan completed successfully
hidden files: 0

**************************************************************************
.
--------------------- LOCKED REGISTRY KEYS ---------------------

[HKEY_USERS\.Default\Software\Microsoft\Internet Explorer\User Preferences]
@Denied: (2) (LocalSystem)
"88D7D0879DAB32E14DE5B3A805A34F98AFF34F5977"=hex:01,00,00,00,d0,8c,9d,df,01,15,
d1,11,8c,7a,00,c0,4f,c2,97,eb,01,00,00,00,c8,c4,7b,90,ef,c4,d2,42,b5,1e,25,\
"2D53CFFC5C1A3DD2E97B7979AC2A92BD59BC839E81"=hex:01,00,00,00,d0,8c,9d,df,01,15,
d1,11,8c,7a,00,c0,4f,c2,97,eb,01,00,00,00,c8,c4,7b,90,ef,c4,d2,42,b5,1e,25,\

[HKEY_LOCAL_MACHINE\system\ControlSet001\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0000\AllUserSettings]
@Denied: (A) (Users)
@Denied: (A) (Everyone)
@Allowed: (B 1 2 3 4 5) (S-1-5-20)
"BlindDial"=dword:00000000
"MSCurrentCountry"=dword:000000b5
.
Completion time: 2010-05-17 18:20:03
ComboFix-quarantined-files.txt 2010-05-17 22:20
ComboFix2.txt 2010-05-12 16:53

Pre-Run: 92,124,237,824 bytes free
Post-Run: 92,095,000,576 bytes free

- - End Of File - - A87E4D2B44693A3EC482F8F2425DD6A2


#6 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:12:22 AM

Posted 17 May 2010 - 06:50 PM

There's a file infector at work here. Please rerun Combofix as below.

1. Close any open browsers.

2. Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.

3. Open notepad and copy/paste the text in the quotebox below into it:

CODE
RenV::
c:\program files\Adobe\Reader 9.0\Reader\Reader_sl .exe
c:\program files\ATI Technologies\ATI.ACE\Core-Static\CLIStart .exe
c:\program files\Common Files\Adobe\ARM\1.0\AdobeARM .exe
c:\program files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier .exe
c:\program files\IEHistoryPH\IEHistoryShellNotifier .exe
c:\program files\iTunes\iTunesHelper .exe
c:\program files\Malwarebytes' Anti-Malware\mbam .exe
c:\program files\QuickTime\QTTask          .exe
c:\program files\QuickTime\QTTask         .exe
c:\program files\QuickTime\QTTask        .exe
c:\program files\QuickTime\QTTask       .exe
c:\program files\QuickTime\QTTask      .exe
c:\program files\QuickTime\QTTask     .exe
c:\program files\QuickTime\QTTask    .exe
c:\program files\QuickTime\QTTask   .exe
c:\program files\QuickTime\QTTask  .exe
c:\program files\QuickTime\QTTask .exe
c:\program files\SUPERAntiSpyware\SUPERAntiSpyware .exe
c:\program files\Synaptics\SynTP\SynTPStart .exe
c:\program files\Toshiba\FlashCards\TCrdMain .exe
c:\program files\Toshiba\Power Saver\TPwrMain .exe
c:\program files\Toshiba\SmoothView\SmoothView .exe
c:\program files\Toshiba\TBS\HSON .exe
c:\program files\Toshiba\TOSCDSPD\TOSCDSPD .exe

RegLock::
[HKEY_USERS\.Default\Software\Microsoft\Internet Explorer\User Preferences]
[HKEY_LOCAL_MACHINE\system\ControlSet001\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0000\AllUserSettings]


Save this as CFScript.txt, in the same location as ComboFix.exe




Refering to the picture above, drag CFScript into ComboFix.exe

When finished, it shall produce a log for you at C:\ComboFix.txt which I will require in your next reply.
Posted Image
m0le is a proud member of UNITE

#7 oldclaret

oldclaret
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:08:22 PM

Posted 17 May 2010 - 07:26 PM

ComboFix 10-05-10.05 - Steve 05/17/2010 20:12:00.9.2 - x86
Microsoft® Windows Vista™ Home Premium 6.0.6002.2.1252.1.1033.18.1917.1226 [GMT -4:00]
Running from: c:\users\Steve\Desktop\ComFix.exe
Command switches used :: c:\users\Steve\Desktop\CFScript.txt
SP: Lavasoft Ad-Watch Live! *disabled* (Updated) {67844DAE-4F77-4D69-9457-98E8CFFDAA22}
SP: Windows Defender *disabled* (Updated) {D68DDC3A-831F-4FAE-9E44-DA132C1ACF46}
.

((((((((((((((((((((((((( Files Created from 2010-04-18 to 2010-05-18 )))))))))))))))))))))))))))))))
.

2010-05-18 00:19 . 2010-05-18 00:19 -------- d-----w- c:\users\Steve\AppData\Local\temp
2010-05-18 00:19 . 2010-05-18 00:19 -------- d-----w- c:\users\Public\AppData\Local\temp
2010-05-18 00:19 . 2010-05-18 00:19 -------- d-----w- c:\users\Default\AppData\Local\temp
2010-05-17 22:05 . 2010-05-17 22:06 214 ----a-w- C:\comfile.reg
2010-05-16 18:24 . 2009-12-04 16:39 230928 ----a-w- c:\windows\system32\drivers\tmxpflt.sys
2010-05-16 18:24 . 2009-12-04 16:38 36368 ----a-w- c:\windows\system32\drivers\tmpreflt.sys
2010-05-16 18:24 . 2009-12-04 16:05 1322680 ----a-w- c:\windows\system32\drivers\vsapint.sys
2010-05-16 18:05 . 2010-05-16 18:11 -------- d-----w- c:\program files\Trend Micro
2010-05-16 17:44 . 2010-05-16 17:44 -------- d-----w- c:\users\Steve\log
2010-05-16 11:31 . 2010-05-16 11:31 -------- d-----w- c:\program files\Exterminate It!
2010-05-16 11:31 . 2010-05-16 11:31 4470952 ----a-w- C:\ExterminateItSetup.exe
2010-05-16 10:33 . 2010-05-16 10:28 119808 ----a-w- C:\VundoFix.exe
2010-05-15 20:31 . 2010-05-15 20:29 525824 ----a-w- C:\dds.scr
2010-05-15 20:26 . 2010-05-15 20:24 284915 ----a-w- C:\gmer.zip
2010-05-15 20:26 . 2010-05-15 20:25 50477 ----a-w- C:\Defogger.exe
2010-05-15 11:59 . 2010-05-15 11:59 388096 ----a-r- c:\users\Steve\AppData\Roaming\Microsoft\Installer\{45A66726-69BC-466B-A7A4-12FCBA4883D7}\HiJackThis.exe
2010-05-15 01:19 . 2010-05-15 01:19 63488 ----a-w- c:\users\Steve\AppData\Roaming\SUPERAntiSpyware.com\SUPERAntiSpyware\SDDLLS\SD10006.dll
2010-05-15 01:18 . 2010-05-15 01:18 52224 ----a-w- c:\users\Steve\AppData\Roaming\SUPERAntiSpyware.com\SUPERAntiSpyware\SDDLLS\SD10005.dll
2010-05-15 01:18 . 2010-05-15 01:18 117760 ----a-w- c:\users\Steve\AppData\Roaming\SUPERAntiSpyware.com\SUPERAntiSpyware\SDDLLS\UIREPAIR.DLL
2010-05-15 01:17 . 2010-05-15 01:17 -------- d-----w- c:\programdata\SUPERAntiSpyware.com
2010-05-15 01:17 . 2010-05-18 00:11 -------- d-----w- c:\program files\SUPERAntiSpyware
2010-05-15 01:17 . 2010-05-15 01:17 -------- d-----w- c:\users\Steve\AppData\Roaming\SUPERAntiSpyware.com
2010-05-13 23:21 . 2010-05-13 23:21 -------- d--h--w- c:\windows\PIF
2010-05-13 22:37 . 2010-05-13 22:47 -------- d-----w- c:\programdata\RegCure
2010-05-13 22:37 . 2010-05-13 22:40 -------- d-----w- c:\program files\RegCure
2010-05-13 12:19 . 2010-04-29 19:39 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2010-05-13 12:19 . 2010-05-13 12:19 -------- d-----w- c:\programdata\Malwarebytes
2010-05-13 12:19 . 2010-04-29 19:39 20952 ----a-w- c:\windows\system32\drivers\mbam.sys
2010-05-12 17:41 . 2010-01-29 15:40 738816 ----a-w- c:\windows\system32\inetcomm.dll
2010-05-06 00:41 . 2010-05-06 00:41 283152 ----a-w- c:\windows\system32\drivers\tmwfp.sys
2010-05-06 00:41 . 2010-05-06 00:41 89872 ----a-w- c:\windows\system32\drivers\tmtdi.sys
2010-05-06 00:41 . 2010-05-06 00:41 59920 ----a-w- c:\windows\system32\drivers\tmactmon.sys
2010-05-06 00:41 . 2010-05-06 00:41 50704 ----a-w- c:\windows\system32\drivers\tmevtmgr.sys
2010-05-06 00:41 . 2010-05-06 00:41 158224 ----a-w- c:\windows\system32\drivers\tmcomm.sys
2010-05-06 00:41 . 2010-05-06 00:41 146448 ----a-w- c:\windows\system32\drivers\tmlwf.sys
2010-05-04 01:23 . 2010-05-04 01:24 -------- d-----w- C:\Tax
2010-05-01 03:14 . 2010-05-01 03:14 -------- d-----w- c:\users\Steve\AppData\Roaming\Malwarebytes
2010-05-01 03:04 . 2010-05-18 00:11 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
2010-04-26 23:07 . 2010-04-26 23:07 -------- d-----w- c:\users\Steve\AppData\Local\IsolatedStorage
2010-04-26 23:06 . 2010-04-26 23:06 -------- d-----w- c:\users\Steve\AppData\Local\Ancestry.com
2010-04-26 23:05 . 2010-04-26 23:05 1078 ----a-r- c:\users\Steve\AppData\Roaming\Microsoft\Installer\{EDEA8AB7-7683-4ED2-AA19-E6C078064C0D}\DocumentationShortcu_EDEA8AB776834ED2AA19E6C078064C0D.exe
2010-04-26 23:05 . 2010-04-26 23:05 10134 ----a-r- c:\users\Steve\AppData\Roaming\Microsoft\Installer\{EDEA8AB7-7683-4ED2-AA19-E6C078064C0D}\ARPPRODUCTICON.exe
2010-04-26 23:05 . 2010-04-26 23:05 -------- d-----w- c:\program files\Microsoft WSE
2010-04-26 22:54 . 2010-04-26 23:07 -------- d-----w- c:\program files\Family Tree Maker 2010
2010-04-26 22:54 . 2010-04-26 23:04 -------- d-----w- c:\program files\BCL Technologies

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2010-05-18 00:11 . 2010-04-15 01:24 -------- d-----w- c:\program files\QuickTime
2010-05-18 00:11 . 2010-04-15 01:31 -------- d-----w- c:\program files\iTunes
2010-05-18 00:11 . 2007-12-10 03:41 -------- d-----w- c:\program files\IEHistoryPH
2010-05-17 21:53 . 2008-01-27 14:19 -------- d-----w- c:\programdata\Google Updater
2010-05-16 21:17 . 2010-05-01 13:01 112 ----a-w- c:\programdata\hB5783b.dat
2010-05-16 18:20 . 2007-10-27 17:06 -------- d-----w- c:\programdata\Trend Micro
2010-05-13 12:17 . 2007-08-22 20:03 -------- d-----w- c:\program files\Google
2010-05-12 18:55 . 2006-11-02 11:18 -------- d-----w- c:\program files\Windows Mail
2010-05-12 18:55 . 2007-10-27 16:17 -------- d-----w- c:\programdata\Microsoft Help
2010-05-12 17:10 . 2009-02-07 14:34 -------- d-----w- c:\program files\Lavasoft
2010-04-26 23:05 . 2007-08-22 19:39 -------- d--h--w- c:\program files\InstallShield Installation Information
2010-04-19 02:40 . 2007-10-27 18:54 -------- d-----w- c:\program files\EditURLs
2010-04-15 01:32 . 2010-04-15 01:31 -------- d-----w- c:\programdata\{429CAD59-35B1-4DBC-BB6D-1DB246563521}
2010-04-15 01:31 . 2010-04-15 01:31 -------- d-----w- c:\program files\iPod
2010-04-15 01:31 . 2009-08-30 19:57 -------- d-----w- c:\program files\Common Files\Apple
2010-04-15 01:15 . 2010-04-15 01:15 -------- d-----w- c:\program files\Bonjour
2010-04-15 01:12 . 2010-04-15 01:12 73000 ----a-w- c:\programdata\Apple Computer\Installer Cache\iTunes 9.1.0.79\SetupAdmin.exe
2010-03-20 20:14 . 2010-03-20 20:14 667648 ----a-w- c:\users\Steve\AppData\Roaming\Macromedia\Flash Player\www.macromedia.com\bin\octoshape\pmv306hw-1002180-0-main.dll
2010-03-05 14:01 . 2010-04-16 01:14 420352 ----a-w- c:\windows\system32\vbscript.dll
2010-02-24 00:20 . 2007-10-27 17:11 83288 ----a-w- c:\users\Steve\AppData\Local\GDIPFONTCACHEV1.DAT
2010-02-23 11:10 . 2010-04-16 01:14 212992 ----a-w- c:\windows\system32\drivers\mrxsmb10.sys
2010-02-23 11:10 . 2010-04-16 01:14 79360 ----a-w- c:\windows\system32\drivers\mrxsmb20.sys
2010-02-23 11:10 . 2010-04-16 01:14 106496 ----a-w- c:\windows\system32\drivers\mrxsmb.sys
2010-02-23 06:39 . 2010-03-30 21:54 916480 ----a-w- c:\windows\system32\wininet.dll
2010-02-23 06:33 . 2010-03-30 21:54 109056 ----a-w- c:\windows\system32\iesysprep.dll
2010-02-23 06:33 . 2010-03-30 21:54 71680 ----a-w- c:\windows\system32\iesetup.dll
2010-02-23 04:55 . 2010-03-30 21:54 133632 ----a-w- c:\windows\system32\ieUnatt.exe
2010-02-20 23:06 . 2010-03-21 20:19 24064 ----a-w- c:\windows\system32\nshhttp.dll
2010-02-20 23:05 . 2010-03-21 20:19 30720 ----a-w- c:\windows\system32\httpapi.dll
2010-02-20 20:53 . 2010-03-21 20:19 411648 ----a-w- c:\windows\system32\drivers\http.sys
2010-02-18 14:07 . 2010-04-16 01:13 904576 ----a-w- c:\windows\system32\drivers\tcpip.sys
2010-02-18 14:07 . 2010-04-16 01:13 3600776 ----a-w- c:\windows\system32\ntkrnlpa.exe
2010-02-18 14:07 . 2010-04-16 01:13 3548040 ----a-w- c:\windows\system32\ntoskrnl.exe
2010-02-18 13:30 . 2010-04-16 01:13 200704 ----a-w- c:\windows\system32\iphlpsvc.dll
2010-02-18 11:28 . 2010-04-16 01:13 25088 ----a-w- c:\windows\system32\drivers\tunnel.sys
.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"TOSCDSPD"="c:\program files\TOSHIBA\TOSCDSPD\TOSCDSPD.exe" [2007-05-18 430080]
"WMPNSCFG"="c:\program files\Windows Media Player\WMPNSCFG.exe" [2008-01-19 202240]
"ehTray.exe"="c:\windows\ehome\ehTray.exe" [2008-01-19 125952]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"QuickTime Task"="c:\program files\QuickTime\QTTask .exe -atboottime" [X]
"Windows Defender"="c:\program files\Windows Defender\MSASCui.exe" [2008-01-19 1008184]
"RtHDVCpl"="RtHDVCpl.exe" [2007-08-10 4702208]
"HSON"="c:\program files\TOSHIBA\TBS\HSON.exe" [2006-12-07 55416]
"00TCrdMain"="c:\program files\TOSHIBA\FlashCards\TCrdMain.exe" [2007-05-22 538744]
"NDSTray.exe"="NDSTray.exe" [BU]
"StartCCC"="c:\program files\ATI Technologies\ATI.ACE\Core-Static\CLIStart.exe" [2006-11-10 90112]
"IEHistory"="c:\program files\IEHistoryPH\IEHistoryShellNotifier.exe" [2006-12-13 138752]
"Samsung PanelMgr"="c:\windows\Samsung\PanelMgr\SSMMgr.exe" [2008-08-18 536576]
"Adobe Reader Speed Launcher"="c:\program files\Adobe\Reader 9.0\Reader\Reader_sl.exe" [2010-04-04 36272]
"UfSeAgnt.exe"="c:\program files\Trend Micro\Internet Security\UfSeAgnt.exe" [2010-01-26 1020248]

c:\users\Steve\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\
OneNote Table Of Contents.onetoc2 [2009-4-29 3656]
WordWeb.lnk - c:\program files\WordWeb\wweb32.exe [2008-5-13 44384]

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\system]
"EnableLUA"= 0 (0x0)
"EnableUIADesktopToggle"= 0 (0x0)

[HKLM\~\startupfolder\C:^Users^Steve^AppData^Roaming^Microsoft^Windows^Start Menu^Programs^Startup^OneNote 2007 Screen Clipper and Launcher.lnk]
path=c:\users\Steve\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\OneNote 2007 Screen Clipper and Launcher.lnk
backup=c:\windows\pss\OneNote 2007 Screen Clipper and Launcher.lnk.Startup
backupExtension=.Startup

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Adobe ARM]
2010-03-24 18:17 952768 ----a-w- c:\program files\Common Files\Adobe\ARM\1.0\AdobeARM.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\iTunesHelper]
2010-03-26 05:10 142120 ----a-w- c:\program files\iTunes\iTunesHelper.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\SmoothView]
2007-06-16 04:01 448080 ----a-w- c:\program files\Toshiba\SmoothView\SmoothView.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\swg]
2008-01-27 14:19 68856 ----a-w- c:\program files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\McAfeeAntiSpyware]
"DisableMonitoring"=dword:00000001

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Svc]
"VistaSp2"=hex(cool.gif:d3,81,1a,b7,f7,37,ca,01

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Svc\S-1-5-21-2445608544-3522571878-3089126978-1000]
"EnableNotificationsRef"=dword:00000001

R0 Lbd;Lbd;c:\windows\system32\DRIVERS\Lbd.sys [x]
R2 gupdate;Google Update Service (gupdate);c:\program files\Google\Update\GoogleUpdate.exe [2010-01-06 135664]
R2 tmpreflt;tmpreflt;c:\windows\system32\DRIVERS\tmpreflt.sys [2009-12-04 36368]
R3 tmevtmgr;tmevtmgr;c:\windows\system32\DRIVERS\tmevtmgr.sys [2010-05-06 50704]
R3 TmPfw;Trend Micro Personal Firewall;c:\program files\Trend Micro\Internet Security\TmPfw.exe [2010-05-06 497008]
R3 TmProxy;Trend Micro Proxy Service;c:\program files\Trend Micro\Internet Security\TmProxy.exe [2010-05-06 689416]
R3 winbondcir;Winbond IR Transceiver;c:\windows\system32\DRIVERS\winbondcir.sys [2007-03-28 43008]
R3 Winferno Subscription Service;Winferno Subscription Service;c:\program files\Common Files\Winferno\WSS\WSS.exe [2007-07-30 126976]
S1 tmlwf;Trend Micro NDIS 6.0 Filter Driver;c:\windows\system32\DRIVERS\tmlwf.sys [2010-05-06 146448]
S2 SSPORT;SSPORT;c:\windows\system32\Drivers\SSPORT.sys [2006-11-22 5120]
S2 tmwfp;Trend Micro WFP Callout Driver;c:\windows\system32\DRIVERS\tmwfp.sys [2010-05-06 283152]
S3 FwLnk;FwLnk Driver;c:\windows\system32\DRIVERS\FwLnk.sys [2006-11-20 7168]
S3 RTL8187B;Realtek RTL8187B Wireless 802.11g 54Mbps USB 2.0 Network Adapter;c:\windows\system32\DRIVERS\RTL8187B.sys [2007-06-01 252416]


[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\svchost]
LocalServiceNoNetwork REG_MULTI_SZ PLA DPS BFE mpssvc ehstart
rpcss REG_MULTI_SZ RpcSs
DcomLaunch REG_MULTI_SZ PlugPlay DcomLaunch
wdisvc REG_MULTI_SZ WdiServiceHost
GPSvcGroup REG_MULTI_SZ GPSvc
LocalServiceAndNoImpersonation REG_MULTI_SZ FontCache
.
Contents of the 'Scheduled Tasks' folder

2010-05-17 c:\windows\Tasks\Google Software Updater.job
- c:\program files\Google\Common\Google Updater\GoogleUpdaterService.exe [2007-08-22 03:08]

2010-05-17 c:\windows\Tasks\GoogleUpdateTaskMachineCore.job
- c:\program files\Google\Update\GoogleUpdate.exe [2010-01-06 01:38]

2010-05-18 c:\windows\Tasks\GoogleUpdateTaskMachineUA.job
- c:\program files\Google\Update\GoogleUpdate.exe [2010-01-06 01:38]

2010-05-15 c:\windows\Tasks\RegCure Program Check.job
- c:\program files\RegCure\RegCure.exe [2010-04-29 18:43]

2010-05-18 c:\windows\Tasks\RegCure Startup.job
- c:\program files\RegCure\RegCure.exe [2010-04-29 18:43]

2010-05-14 c:\windows\Tasks\RegCure.job
- c:\program files\RegCure\RegCure.exe [2010-04-29 18:43]

2010-05-17 c:\windows\Tasks\WSSHelper.job
- c:\program files\Common Files\Winferno\WSS\WSSHelper.exe [2009-03-23 16:49]
.
.
------- Supplementary Scan -------
.
uStart Page = hxxp://www.cnn.com/
uInternet Settings,ProxyOverride = *.local
IE: Add to Google Photos Screensa&ver - c:\windows\system32\GPhotos.scr/200
IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~3\Office12\EXCEL.EXE/3000
Trusted Zone: turbotax.com
DPF: {F27237D7-93C8-44C2-AC6E-D6057B9A918F} - hxxps://juniper.net/dana-cached/sc/JuniperSetupClient.cab
.
.
Completion time: 2010-05-17 20:22:15
ComboFix-quarantined-files.txt 2010-05-18 00:22
ComboFix2.txt 2010-05-17 22:20
ComboFix3.txt 2010-05-12 16:53

Pre-Run: 91,914,682,368 bytes free
Post-Run: 91,887,034,368 bytes free

- - End Of File - - 7C0831CEE92383AD58D212EA986AAC37


#8 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:12:22 AM

Posted 17 May 2010 - 07:41 PM

No more file infector and the At*.job files are not being created now.

How is the PC running?


Run ESET's online scan to look for remnants - remove any found.

I'd like us to scan your machine with ESET OnlineScan
  1. Hold down Control and click on the following link to open ESET OnlineScan in a new window.
    ESET OnlineScan
  2. Click the button.
  3. For alternate browsers only: (Microsoft Internet Explorer users can skip these steps)
    1. Click on to download the ESET Smart Installer. Save it to your desktop.
    2. Double click on the icon on your desktop.
  4. Check
  5. Click the button.
  6. Accept any security warnings from your browser.
  7. Leave the top box checked and then check
  8. Push the Start button.
  9. ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this can take some time.
  10. When the scan completes, push
  11. Push , and save the file to your desktop using a unique name, such as ESETScan. Include the contents of this report in your next reply.
  12. Push the button.
  13. Push
NOTE: If no malware is found then no log will be produced. Let me know if this is the case.
Posted Image
m0le is a proud member of UNITE

#9 oldclaret

oldclaret
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:08:22 PM

Posted 17 May 2010 - 08:13 PM


The computer appears to be clean (no *.job files or 6TMDwa02.exe) and seems to be running ok, except that I cannot run Eset. After acknowledging the EULA and pressing Start, it goes to the next page, the progress bar very quickly gets to about 90% complete (no time to even check the Scan Archives checkbox) and then I get a message form Microsoft Windows:

Internet Explorer has stopped working
A problem caused the program to stop working correctly.
Windows will close the program and notify you if a solution is available

The only choice is to "Close Program". When I do that, I get sent back to the EULA page.



#10 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:12:22 AM

Posted 17 May 2010 - 08:16 PM

Could be a problem with ESET's process that conflicts with your PC.

Let's try another online scanner to be sure

Perform an online scan with Kaspersky WebScanner. This can take a long time so please be patient.

If you have troubles getting it to run.... - STOP - and tell me about it!

(Requires free Java Runtime Environment (JRE) be installed before scanning for malware as ActiveX is no longer being used.)
  • Click on the ...button.
  • The program will launch and fill in the Information section ... on the left.
  • Read the "Requirements and Limitations" then press... the ...button.
  • The program will begin downloading the latest program and definition files.
    It takes a while... please be patient and let it finish.
  • Once the files have been downloaded, click on the ...button.
    In the scan settings make sure the following are selected:
    • Detect malicious programs of the following categories:
      Viruses, Worms, Trojan Horses, Rootkits
      Spyware, Adware, Dialers and other potentially dangerous programs
    • Scan compound files (doesn't apply to the File scan area):
      Archives
      Mail databases
      By default the above items should already be checked.
    • Click the ...button, if you made any changes.
  • Now under the Scan section on the left:
      Select My Computer
  • The program will start and scan your system. This will run for a while, be patient... let it run.
    Once the scan is complete, it will display if your system has been infected.
  • Save the scan results as a Text file ... save it to your desktop.
  • Copy and paste the saved scan results file in your next reply.

Posted Image
m0le is a proud member of UNITE

#11 oldclaret

oldclaret
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:08:22 PM

Posted 18 May 2010 - 05:25 AM

Great progress! We got the agent pinned down.

--------------------------------------------------------------------------------
KASPERSKY ONLINE SCANNER 7.0: scan report
Tuesday, May 18, 2010
Operating system: Microsoft Windows Vista Home Premium Edition, 32-bit Service Pack 2 (build 6002)
Kaspersky Online Scanner version: 7.0.26.13
Last database update: Monday, May 17, 2010 22:29:58
Records in database: 4120271
--------------------------------------------------------------------------------

Scan settings:
scan using the following database: extended
Scan archives: yes
Scan e-mail databases: yes

Scan area - My Computer:
C:\
D:\

Scan statistics:
Objects scanned: 159774
Threats found: 1
Infected objects found: 1
Suspicious objects found: 0
Scan duration: 03:18:26


File name / Threat / Threats count
C:\Program Files\QuickTime\QTTask.exe Infected: Trojan.Win32.Agent.dxuk 1

Selected area has been scanned.


#12 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:12:22 AM

Posted 18 May 2010 - 03:43 PM

Yes, that's the dropper, the executable file which masqueraded as a legitimate file and brought the malware.

Let's clean up the PC and you can give it a test run.

Please download ATF Cleaner by Atribune.
    Double-click ATF-Cleaner.exe to run the program.
    Under Main "Select Files to Delete" choose: Select All.
    Click the Empty Selected button.
If you use Firefox browser
    Click Firefox at the top and choose: Select All
    Click the Empty Selected button.
    NOTE: If you would like to keep your saved passwords, please click No at the prompt.
If you use Opera browser
    Click Opera at the top and choose: Select All
    Click the Empty Selected button.
    NOTE: If you would like to keep your saved passwords, please click No at the prompt.
Click Exit on the Main menu to close the program.
For Technical Support, double-click the e-mail address located at the bottom of each menu.

If you are using Firefox and this has caused page loading problems then please clear your private data. To do this go
to the Tools menu, select Clear Private Data, and then check Cache. Click Clear Private Data Now.

This could also be Clear Recent History or similar

Then close Firefox and then reopen it.


Then

To Clear the Java Runtime Environment (JRE) cache, do this:
  • Click Start > Settings > Control Panel.
  • Double-click the Java icon.
    -The Java Control Panel appears.
  • Click "Settings" under Temporary Internet Files.
    -The Temporary Files Settings dialog box appears.
  • Click "Delete Files".
    -The Delete Temporary Files dialog box appears.
    -There are three options on this window to clear the cache.
    • Delete Files
    • View Applications
    • View Applets
  • Click "OK" on Delete Temporary Files window.
    -Note: This deletes all the Downloaded Applications and Applets from the cache.
  • Click "OK" on Temporary Files Settings window.
  • Close the Java Control Panel.
You can also view these instructions along with screenshots here.
Posted Image
m0le is a proud member of UNITE

#13 oldclaret

oldclaret
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:08:22 PM

Posted 18 May 2010 - 05:33 PM


Done - ran ATF Clearner and cleared JRE cache. For Java, the "Temporary File Settings" dialog and the "Delete Temporary Files" dialog is different than the screenshots. Probably because of the new Java that I installed for Kaspersky (?)

The Delete Temporary Files dialog box now has 2 options:

-Applications and applets
-Trace and log files

I checked both boxes and deleted. I would be happy to send screenshots if you like.

#14 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:12:22 AM

Posted 18 May 2010 - 05:39 PM

No need. Thanks for the info and I have updated my info. thumbup2.gif

We can go to the final instructions now.

You're clean. Good stuff! thumbup2.gif

Let's do some clearing up

Uninstall ComboFix

Remove Combofix now that we're done with it.
  • Please press the Windows Key and R on your keyboard. This will bring up the Run... command.
    (For Vista/Windows 7 please click Start -> All Programs -> Accessories -> Run)
  • Now type in Combofix /Uninstall in the runbox and click OK. (Notice the space between "Combofix" and "/")
  • Please follow the prompts to uninstall Combofix.
  • You will then receive a message saying Combofix was uninstalled successfully once it's done uninstalling itself.
This will uninstall Combofix and anything associated with it.


Download and Run OTC

We will now remove the tools we used during this fix using OTC.
  • Download OTC by OldTimer and save it to your desktop.
  • Double click icon to start the program. If you are using Vista, please right-click and choose run as administrator
  • Then Click the big button.
  • You will get a prompt saying "Being Cleanup Process". Please select Yes.
  • Restart your computer when prompted.
------------------------------------------------------------------------------------------------------------------------

Here's some advice on how you can keep your PC clean


Update your AntiVirus Software

It is imperative that you update your Antivirus software at least once a week (Even more if you wish). If you do not update your antivirus software then it will not be able to catch any of the new variants that may come out. If you use a commercial antivirus program you must make sure you keep renewing your subscription. Otherwise, once your subscription runs out, you may not be able to update the programs virus definitions.


Make sure your applications have all of their updates

It is also possible for other programs on your computer to have security vulnerability that can allow malware to infect you. Therefore, it is also a good idea to check for the latest versions of commonly installed applications that are regularly patched to fix vulnerabilities. You can check these by visiting Secunia Software Inspector and Calendar of Updates.


Install an AntiSpyware Program

A highly recommended AntiSpyware program is SuperAntiSpyware. You can download the free Home Version. or the Pro version for a 15 day trial period.

Installing this or another recommended program will provide spyware & hijacker protection on your computer alongside your virus protection. You should scan your computer with an AntiSpyware program on a regular basis just as you would an antivirus software.


Finally, here's a treasure trove of antivirus, antimalware and antispyware resources


That's it oldclaret, happy surfing!

Cheers.

m0le
Posted Image
m0le is a proud member of UNITE

#15 oldclaret

oldclaret
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:08:22 PM

Posted 18 May 2010 - 05:54 PM

Brilliant! Thanks. Before you go, Kaspersky detected QTTask.exe as the agent. Did it also disinfect it? I am not sure if the file should have been deleted or not (it is still there).

Do I need to disable my anti-virus before uninstalling ComboFix? During the uninstall, Trend popped up a few warnings about file access. It went by too fast for me to note the file names or to select "unblock".

Thanks again. A donation is coming.

Oldclaret




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users