Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Mebroot Infection


  • This topic is locked This topic is locked
29 replies to this topic

#1 Hirogen

Hirogen

  • Members
  • 16 posts
  • OFFLINE
  •  
  • Local time:09:19 AM

Posted 19 May 2010 - 08:39 PM

I recently was hit with a computer virus. The message I was getting read,

“Application cannot be executed. The file wuaclt.exe is infected.”

Little Red shields pop up on the right hand side of the task bar. I have AVG on the computer and I could not get it to run at all. I bought Webroot Internet Essentials 2010 and had the computer turned off for a few days. I loaded in safe mode and did a system restore. The computer would either load to the welcome screen OR load to just the desktop wallpaper. So I was sure the virus was still there. At this point, I downloaded Malwarebytes and would run a scan but I could not get rid of the Rogue Antispyware it found on the computer. I downloaded Viperescue and it found some threats, deleted one but couldn’t finish off the others and I got a Failed message. I tried a System Restore but the computer wouldn’t let me complete it. I restarted and was able to get to the desktop and install Webroot. I ran a scan and it found some viruses. When the scan was complete, I clicked Quarantine but then the computer froze up. I noticed after I installed Webroot the red shield disappeared, but I was certain the virus is still there. Whenever the computer gets turned on, the red shield is back and a balloon pops up stating,

“Your computer might be at risk. Your anti-virus might be out of date. Click this balloon to fix the problem.”

Then Webroot loads and the red shield goes away. I scanned again overnight but the computer froze up halfway through so I turned it off and back on.
I did see a few virus names and here are the ones I was able to see,

Troj/Mbroot-H
Mal/Webstart-A
Troj/JavaDl-V

I did read the virus guide but I didn’t want to take action until I hear from an expert. I am pretty sure I have Antispyware soft but according to the guide the file should be cmd.exe not, wuaclt.exe which is the message I was getting. I never clicked on it so I never saw the website it took me to.

I tried to surf the web but the computer would freeze up and I would have to restart. I did also scan again Malwarebytes and ran a scan last night and the program showed I was clear. So, I am at a loss as what to do next here. I would appreciate any help.


Responded to by boopme...
Helo acually if you have the Mebroot infection we may as well go right to DDS and GMER to fix this.

Please go here....
Preparation Guide ,do steps 6 - 9.

Create a DDS log and post it in the new topic explained in step 9,which is here Virus, Trojan, Spyware, and Malware Removal Logs and not in this topic,thanks.
If Gmer won't run,skip it and move on.
Let me know if that went well...

Ran through steps 6-9, tried to run gmer. Scanned..then went to a blue screen stating A problem has been detected and windows has been shut down to prevent damage to your computer. Problem file pwryaow.sys

Log from DDS:

DDS (Ver_10-03-17.01) - NTFSx86
Run by Drinka Family at 18:05:10.31 on Wed 05/19/2010
Internet Explorer: 6.0.2900.5512 BrowserJavaVersion: 1.6.0_18
Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.511.148 [GMT -7:00]

AV: AVG Anti-Virus Free *On-access scanning disabled* (Outdated) {17DDD097-36FF-435F-9E1B-52D74245D6BF}
AV: Webroot Internet Security Essentials *On-access scanning enabled* (Updated) {77E10C7F-2CCA-4187-9394-BDBC267AD597}
FW: Webroot Internet Security Essentials *enabled* {63671000-11A2-46DD-BADD-A084CABCDEAE}

============== Running Processes ===============

C:\Program Files\Webroot\WebrootSecurity\WRConsumerService.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\system32\svchost -k DcomLaunch
svchost.exe
C:\WINDOWS\System32\svchost.exe -k netsvcs
C:\WINDOWS\system32\svchost.exe -k WudfServiceGroup
svchost.exe
svchost.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\Program Files\AVG\AVG9\avgchsvx.exe
C:\WINDOWS\system32\spoolsv.exe
svchost.exe
C:\Program Files\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe
C:\Program Files\AVG\AVG9\avgwdsvc.exe
C:\Program Files\Bonjour\mDNSResponder.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\Java\jre6\bin\jqs.exe
C:\Program Files\Webroot\WebrootSecurity\SpySweeper.exe
C:\Program Files\AVG\AVG9\avgnsx.exe
C:\PROGRA~1\AVG\AVG9\avgtray.exe
C:\Program Files\ATI Technologies\ATI.ACE\Core-Static\MOM.exe
C:\WINDOWS\ALCXMNTR.EXE
C:\Program Files\Common Files\Java\Java Update\jusched.exe
C:\Program Files\iTunes\iTunesHelper.exe
C:\Program Files\Webroot\WebrootSecurity\SpySweeperUI.exe
C:\Program Files\MSI\Common\RaUI.exe
C:\Program Files\ATI Technologies\ATI.ACE\Core-Static\ccc.exe
C:\Program Files\iPod\bin\iPodService.exe
C:\Program Files\Common Files\Java\Java Update\jucheck.exe
C:\WINDOWS\system32\wuauclt.exe
C:\Program Files\Mozilla Firefox\firefox.exe
C:\Documents and Settings\Drinka Family\Desktop\dds.scr

============== Pseudo HJT Report ===============

uInternet Settings,ProxyOverride = *.local
uURLSearchHooks: UrlSearchHook Class: {00000000-6e41-4fd3-8538-502f5495e5fc} - c:\program files\ask.com\GenericAskToolbar.dll
uURLSearchHooks: Vuze Remote Toolbar: {ba14329e-9550-4989-b3f2-9732e92d17cc} - c:\program files\vuze_remote\tbVuz1.dll
BHO: AVG Safe Search: {3ca2f312-6f6e-4b53-a66e-4e65e497c8c0} - c:\program files\avg\avg9\avgssie.dll
BHO: Vuze Remote Toolbar: {ba14329e-9550-4989-b3f2-9732e92d17cc} - c:\program files\vuze_remote\tbVuz1.dll
BHO: Ask Toolbar: {d4027c7f-154a-4066-a1ad-4243d8127440} - c:\program files\ask.com\GenericAskToolbar.dll
BHO: Java™ Plug-In 2 SSV Helper: {dbc80044-a445-435b-bc74-9c25c1c588a9} - c:\program files\java\jre6\bin\jp2ssv.dll
BHO: JQSIEStartDetectorImpl Class: {e7e6f031-17ce-4c07-bc86-eabfe594f69c} - c:\program files\java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll
TB: Vuze Remote Toolbar: {ba14329e-9550-4989-b3f2-9732e92d17cc} - c:\program files\vuze_remote\tbVuz1.dll
TB: Ask Toolbar: {d4027c7f-154a-4066-a1ad-4243d8127440} - c:\program files\ask.com\GenericAskToolbar.dll
uRun: [Google Update] "c:\documents and settings\drinka family\local settings\application data\google\update\GoogleUpdate.exe" /c
mRun: [AVG9_TRAY] "c:\progra~1\avg\avg9\avgtray.exe"
mRun: [StartCCC] "c:\program files\ati technologies\ati.ace\core-static\CLIStart.exe" MSRun
mRun: [AlcxMonitor] "ALCXMNTR.EXE"
mRun: [SunJavaUpdateSched] "c:\program files\common files\java\java update\jusched.exe"
mRun: [QuickTime Task] "c:\program files\quicktime\qttask.exe" -atboottime
mRun: [iTunesHelper] "c:\program files\itunes\iTunesHelper.exe"
mRun: [SpySweeper] "c:\program files\webroot\webrootsecurity\SpySweeperUI.exe" /startintray
StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\msiwir~1.lnk - c:\program files\msi\common\RaUI.exe
IE: {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe
IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe
DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_18-windows-i586.cab
DPF: {CAFEEFAC-0016-0000-0018-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_18-windows-i586.cab
DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_18-windows-i586.cab
DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} - hxxp://download.macromedia.com/pub/shockwave/cabs/flash/swflash.cab
Handler: linkscanner - {F274614C-63F8-47D5-A4D1-FBDDE494F8D1} - c:\program files\avg\avg9\avgpp.dll
Notify: AtiExtEvent - Ati2evxx.dll
Notify: avgrsstarter - avgrsstx.dll
SSODL: WPDShServiceObj - {AAA288BA-9A4C-45B0-95D7-94D524869DB5} - c:\windows\system32\WPDShServiceObj.dll

================= FIREFOX ===================

FF - ProfilePath - c:\docume~1\drinka~1\applic~1\mozilla\firefox\profiles\4iwp8x1v.default\
FF - prefs.js: browser.search.defaulturl - hxxp://search.conduit.com/ResultsExt.aspx?ctid=CT2504091&SearchSource=3&q={searchTerms}
FF - prefs.js: browser.search.selectedEngine - Google
FF - prefs.js: keyword.URL - hxxp://search.conduit.com/ResultsExt.aspx?ctid=CT2504091&q=
FF - component: c:\documents and settings\drinka family\application data\mozilla\firefox\profiles\4iwp8x1v.default\extensions\{ba14329e-9550-4989-b3f2-9732e92d17cc}\components\FFExternalAlert.dll
FF - component: c:\documents and settings\drinka family\application data\mozilla\firefox\profiles\4iwp8x1v.default\extensions\{ba14329e-9550-4989-b3f2-9732e92d17cc}\components\RadioWMPCore.dll
FF - component: c:\program files\avg\avg9\firefox\components\avgssff.dll
FF - plugin: c:\documents and settings\drinka family\local settings\application data\google\update\1.2.183.23\npGoogleOneClick8.dll
FF - HiddenExtension: Microsoft .NET Framework Assistant: {20a82645-c095-46ed-80e3-08825760534b} - c:\windows\microsoft.net\framework\v3.5\windows presentation foundation\dotnetassistantextension\
FF - HiddenExtension: Java Console: No Registry Reference - c:\program files\mozilla firefox\extensions\{CAFEEFAC-0016-0000-0018-ABCDEFFEDCBA}

---- FIREFOX POLICIES ----
c:\program files\mozilla firefox\greprefs\all.js - pref("ui.use_native_colors", true);
c:\program files\mozilla firefox\greprefs\all.js - pref("ui.use_native_popup_windows", false);
c:\program files\mozilla firefox\greprefs\all.js - pref("browser.enable_click_image_resizing", true);
c:\program files\mozilla firefox\greprefs\all.js - pref("accessibility.browsewithcaret_shortcut.enabled", true);
c:\program files\mozilla firefox\greprefs\all.js - pref("javascript.options.mem.high_water_mark", 32);
c:\program files\mozilla firefox\greprefs\all.js - pref("javascript.options.mem.gc_frequency", 1600);
c:\program files\mozilla firefox\greprefs\all.js - pref("network.auth.force-generic-ntlm", false);
c:\program files\mozilla firefox\greprefs\all.js - pref("svg.smil.enabled", false);
c:\program files\mozilla firefox\greprefs\all.js - pref("ui.trackpoint_hack.enabled", -1);
c:\program files\mozilla firefox\greprefs\all.js - pref("browser.formfill.debug", false);
c:\program files\mozilla firefox\greprefs\all.js - pref("browser.formfill.agedWeight", 2);
c:\program files\mozilla firefox\greprefs\all.js - pref("browser.formfill.bucketSize", 1);
c:\program files\mozilla firefox\greprefs\all.js - pref("browser.formfill.maxTimeGroupings", 25);
c:\program files\mozilla firefox\greprefs\all.js - pref("browser.formfill.timeGroupingSize", 604800);
c:\program files\mozilla firefox\greprefs\all.js - pref("browser.formfill.boundaryWeight", 25);
c:\program files\mozilla firefox\greprefs\all.js - pref("browser.formfill.prefixWeight", 5);
c:\program files\mozilla firefox\greprefs\all.js - pref("html5.enable", false);
c:\program files\mozilla firefox\greprefs\security-prefs.js - pref("security.ssl.allow_unrestricted_renego_everywhere__temporarily_available_pref", true);
c:\program files\mozilla firefox\greprefs\security-prefs.js - pref("security.ssl.renego_unrestricted_hosts", "");
c:\program files\mozilla firefox\greprefs\security-prefs.js - pref("security.ssl.treat_unsafe_negotiation_as_broken", false);
c:\program files\mozilla firefox\greprefs\security-prefs.js - pref("security.ssl.require_safe_negotiation", false);
c:\program files\mozilla firefox\greprefs\security-prefs.js - pref("security.ssl3.rsa_seed_sha", true);
c:\program files\mozilla firefox\defaults\pref\firefox-branding.js - pref("app.update.download.backgroundInterval", 600);
c:\program files\mozilla firefox\defaults\pref\firefox-branding.js - pref("app.update.url.manual", "http://www.firefox.com");
c:\program files\mozilla firefox\defaults\pref\firefox-branding.js - pref("browser.search.param.yahoo-fr-ja", "mozff");
c:\program files\mozilla firefox\defaults\pref\firefox.js - pref("extensions.{972ce4c6-7e08-4474-a285-3208198ce6fd}.name", "chrome://browser/locale/browser.properties");
c:\program files\mozilla firefox\defaults\pref\firefox.js - pref("extensions.{972ce4c6-7e08-4474-a285-3208198ce6fd}.description", "chrome://browser/locale/browser.properties");
c:\program files\mozilla firefox\defaults\pref\firefox.js - pref("xpinstall.whitelist.add", "addons.mozilla.org");
c:\program files\mozilla firefox\defaults\pref\firefox.js - pref("xpinstall.whitelist.add.36", "getpersonas.com");
c:\program files\mozilla firefox\defaults\pref\firefox.js - pref("lightweightThemes.update.enabled", true);
c:\program files\mozilla firefox\defaults\pref\firefox.js - pref("browser.allTabs.previews", false);
c:\program files\mozilla firefox\defaults\pref\firefox.js - pref("plugins.hide_infobar_for_outdated_plugin", false);
c:\program files\mozilla firefox\defaults\pref\firefox.js - pref("plugins.update.notifyUser", false);
c:\program files\mozilla firefox\defaults\pref\firefox.js - pref("toolbar.customization.usesheet", false);
c:\program files\mozilla firefox\defaults\pref\firefox.js - pref("browser.taskbar.previews.enable", false);
c:\program files\mozilla firefox\defaults\pref\firefox.js - pref("browser.taskbar.previews.max", 20);
c:\program files\mozilla firefox\defaults\pref\firefox.js - pref("browser.taskbar.previews.cachetime", 20);

============= SERVICES / DRIVERS ===============

R0 ssfs0bbc;ssfs0bbc;c:\windows\system32\drivers\ssfs0bbc.sys [2009-11-6 29808]
R1 AvgMfx86;AVG Free On-access Scanner Minifilter Driver x86;c:\windows\system32\drivers\avgmfx86.sys [2010-3-8 29512]
R1 AvgTdiX;AVG Free Network Redirector;c:\windows\system32\drivers\avgtdix.sys [2010-3-8 242896]
R1 pwipf6;pwipf6;c:\windows\system32\drivers\pwipf6.sys [2010-5-18 108880]
R1 SBRE;SBRE;c:\windows\system32\drivers\SBREDrv.sys [2010-5-15 93872]
R2 avg9wd;AVG Free WatchDog;c:\program files\avg\avg9\avgwdsvc.exe [2010-3-8 308064]
R2 WebrootSpySweeperService;Webroot Spy Sweeper Engine;c:\program files\webroot\webrootsecurity\SpySweeper.exe [2009-11-6 4048240]
R2 WRConsumerService;Webroot Client Service;c:\program files\webroot\webrootsecurity\WRConsumerService.exe [2010-5-18 1201640]
S0 thrtc;thrtc;c:\windows\system32\drivers\kaocvk.sys --> c:\windows\system32\drivers\kaocvk.sys [?]
S2 avg9emc;AVG Free E-mail Scanner;c:\program files\avg\avg9\avgemc.exe [2010-3-8 916760]

=============== Created Last 30 ================

2010-05-20 01:02:51 0 ----a-w- c:\documents and settings\drinka family\defogger_reenable
2010-05-19 03:37:11 195 ----a-w- c:\windows\system32\MRT.INI
2010-05-19 00:52:59 775168 ----a-w- c:\windows\isRS-000.tmp
2010-05-19 00:52:49 0 d-----w- c:\program files\Ask.com
2010-05-19 00:52:25 0 d-----w- c:\program files\MSSOAP
2010-05-19 00:52:17 108880 ----a-w- c:\windows\system32\drivers\pwipf6.sys
2010-05-19 00:51:44 1563008 ----a-w- c:\windows\WRSetup.dll
2010-05-19 00:51:44 0 d-----w- c:\docume~1\drinka~1\applic~1\Webroot
2010-05-19 00:51:44 0 d-----w- c:\docume~1\alluse~1\applic~1\Webroot
2010-05-19 00:51:43 0 d-----w- c:\program files\Webroot
2010-05-19 00:45:18 164 ----a-w- c:\windows\install.dat
2010-05-15 16:47:38 93872 ----a-w- c:\windows\system32\drivers\SBREDrv.sys
2010-05-15 16:47:38 27944 ----a-w- c:\windows\system32\sbbd.exe
2010-05-15 16:46:38 0 d-----w- C:\VIPRERESCUE
2010-05-15 07:12:06 0 d-----w- c:\program files\ESET
2010-05-15 06:57:45 0 d-----w- c:\docume~1\drinka~1\applic~1\Malwarebytes
2010-05-15 06:57:32 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2010-05-15 06:57:30 20952 ----a-w- c:\windows\system32\drivers\mbam.sys
2010-05-15 06:52:28 0 d-----w- c:\windows\system32\wbem\Repository
2010-05-15 05:39:35 0 d-----w- c:\program files\Malwarebytes' Anti-Malware
2010-05-15 05:39:35 0 d-----w- c:\docume~1\alluse~1\applic~1\Malwarebytes
2010-05-12 19:49:41 0 d--h--w- C:\$AVG

==================== Find3M ====================

2010-04-21 15:46:55 242896 ----a-w- c:\windows\system32\drivers\avgtdix.sys
2010-03-14 19:00:15 411368 ----a-w- c:\windows\system32\deploytk.dll
2010-03-14 18:00:00 85504 ----a-w- c:\windows\system32\ff_vfw.dll
2010-03-09 11:09:18 430080 ----a-w- c:\windows\system32\vbscript.dll
2010-03-09 01:56:21 12464 ----a-w- c:\windows\system32\avgrsstx.dll
2010-03-08 05:11:32 21640 ----a-w- c:\windows\system32\emptyregdb.dat
2010-02-26 05:43:57 667136 ----a-w- c:\windows\system32\wininet.dll
2010-02-26 05:43:54 81920 ----a-w- c:\windows\system32\ieencode.dll

============= FINISH: 18:05:42.75 ===============


Thanks in advance!

Attached Files



BC AdBot (Login to Remove)

 


#2 thewall

thewall

  • Malware Response Team
  • 6,425 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Florida
  • Local time:11:19 AM

Posted 21 May 2010 - 11:41 AM


Hello Hirogen smile.gif Welcome to the BC HijackThis Log and Analysis forum. I will be assisting you in cleaning up your system.


I ask that you refrain from running tools other than those we suggest while we are cleaning up your computer. The reason for this is so we know what is going on with the machine at any time. Some programs can interfere with others and hamper the recovery process.



In the upper right hand corner of the topic you will see a button called Options. If you click on this in the drop-down menu you can choose Track this topic. By doing this and then choosing Immediate E-Mail notification and then clicking on Proceed you will be advised when we respond the your topic and facilitate the cleaning of your machine.


Please keep in mind that we have a large backlog of users just like yourself waiting to be helped so try to be as timely as possible in your replies. Since we do this on a part-time voluntary basis we are limited on how many logs we can respond to and keep open due to time restraints. If you have to be away or can't answer for some other reason just let me know. Thank you for your understanding.



After 5 days if a topic is not replied to we assume it has been abandoned and it is closed.



I do not recommend that you have more than one anti virus product installed and running on your computer at a time. The reason for this is that if both products have their automatic (Real-Time) protection switched on, then those products which do not encrypt the virus strings within them can cause other anti virus products to cause "false alarms". It can also lead to a clash as both products fight for access to files which are opened again this is the resident/automatic protection. In general terms, the two programs may conflict and cause:
1) False Alarms: When the anti virus software tells you that your PC has a virus when it actually doesn't.
2) System Performance Problems: Your system may lock up due to both products attempting to access the same file at the same time.
Therefore please go to add/remove in the control panel and remove either AVG or Webroot Internet Security Essentials.







Try running GMER once again but this time uncheck everything but Sections.





Note: Please post the log in the reply window and do not make it an attachment. Do this with all subsequent replies unless I ask otherwise.







Thanks,



thewall





If I have helped you then please consider donating so I can continue the fight against malware Posted Image
All donations go directly to the helper

Posted Image

Due to the large amount of backlogs we have I cannot respond to PMs for help unless I am already working with you

#3 Hirogen

Hirogen
  • Topic Starter

  • Members
  • 16 posts
  • OFFLINE
  •  
  • Local time:09:19 AM

Posted 24 May 2010 - 11:31 PM

Ok, I tried to uninstall AVG but I got a message it failed. I am attaching the log because I am getting it is too big to post.

#4 thewall

thewall

  • Malware Response Team
  • 6,425 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Florida
  • Local time:11:19 AM

Posted 25 May 2010 - 07:55 AM

Did you mean to attach the log in your last post?
If I have helped you then please consider donating so I can continue the fight against malware Posted Image
All donations go directly to the helper

Posted Image

Due to the large amount of backlogs we have I cannot respond to PMs for help unless I am already working with you

#5 Hirogen

Hirogen
  • Topic Starter

  • Members
  • 16 posts
  • OFFLINE
  •  
  • Local time:09:19 AM

Posted 25 May 2010 - 04:02 PM

Yes, I did. I will try again.

#6 Hirogen

Hirogen
  • Topic Starter

  • Members
  • 16 posts
  • OFFLINE
  •  
  • Local time:09:19 AM

Posted 25 May 2010 - 07:39 PM

How should I post this? It is 7.32 MB and I cannot get the file to attach.

I tested it out with a different log and I cannot get that one to delete on my post.

Attached Files


Edited by Hirogen, 25 May 2010 - 07:41 PM.


#7 thewall

thewall

  • Malware Response Team
  • 6,425 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Florida
  • Local time:11:19 AM

Posted 25 May 2010 - 08:55 PM

Not sure what you were trying to do but what you posted was the Attach.txt which went with DDS. I'm looking for the GMER log. Don't worry about posting all of it just try to copy and post around the last 15 or so lines in the log. It doesn't have to be a specific number.
If I have helped you then please consider donating so I can continue the fight against malware Posted Image
All donations go directly to the helper

Posted Image

Due to the large amount of backlogs we have I cannot respond to PMs for help unless I am already working with you

#8 Hirogen

Hirogen
  • Topic Starter

  • Members
  • 16 posts
  • OFFLINE
  •  
  • Local time:09:19 AM

Posted 26 May 2010 - 08:43 AM

Ok, here are the last few lines,

[AVG.SETUP.MODEL] DEBUG 2010-05-25 04:18:32,265 DRINKADESKTOP PID:2268 THID:2280 ID:130812BE-9159-4af7-9BE5-7A3217DA050B:1007.782.123028 MSG:aBUSkeamTfxFqv1HO+DAIWV8GLrnXX+77jCoC2NHVg8GGsoXE1xknd6gyMz1xoS7UhhMnbDiunUPs+zXyH1E7xKkFigLN8HAQdIZV8JpMTSVhf1LN
[AVG.SETUP.MODEL] DEBUG 2010-05-25 04:18:32,265 DRINKADESKTOP PID:2268 THID:2280 ID:130812BE-9159-4af7-9BE5-7A3217DA050B:1007.782.123028 MSG:aDMnXyfcWhngHNFrXHTWPJJeYjMkqw2qx12ZvGGYTbKp4Oxf83vtM58K3hzGh0hr8YflikgVoUBejuHNxzvxuefeI+bKKYw==
[AVG.SETUP.MODEL] DEBUG 2010-05-25 04:18:32,265 DRINKADESKTOP PID:2268 THID:2280 ID:130812BE-9159-4af7-9BE5-7A3217DA050B:1007.782.123028 MSG:aBORTM8h5svySum7NfAf8O8DS8/9Wnjz92g9d9/nVUZu9NVAsmV1DTG3Fwl2e3Ze4mDyOPlBDy9dFFoBxD+duKOilfUi1DA==
[AVG.SETUP.MODEL] DEBUG 2010-05-25 04:18:32,265 DRINKADESKTOP PID:2268 THID:2280 ID:130812BE-9159-4af7-9BE5-7A3217DA050B:1007.782.123028 MSG:aCIZsD+TafOTaIErm9BEiUYjY2S+W8eA5VddK1WzbryksxSG8YA88tsenSoaS70lvxUZDYpt3S5QGmtZOjAoyY2THQnSZrw==
[AVG.SETUP.MODEL] DEBUG 2010-05-25 04:18:32,265 DRINKADESKTOP PID:2268 THID:2280 ID:130812BE-9159-4af7-9BE5-7A3217DA050B:1007.782.123028 MSG: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
[AVG.SETUP.MODEL] DEBUG 2010-05-25 04:18:32,265 DRINKADESKTOP PID:2268 THID:2280 ID:130812BE-9159-4af7-9BE5-7A3217DA050B:1007.782.123028 MSG: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
[AVG.SETUP.MODEL] DEBUG 2010-05-25 04:18:32,265 DRINKADESKTOP PID:2268 THID:2280 ID:130812BE-9159-4af7-9BE5-7A3217DA050B:1007.782.123028 MSG:aD/kLyVqmkBg=
[AVG.SETUP.MODEL] DEBUG 2010-05-25 04:18:32,265 DRINKADESKTOP PID:2268 THID:2280 ID:130812BE-9159-4af7-9BE5-7A3217DA050B:1007.782.123028 MSG:aAQ5rkEN9AJU=
[AVG.SETUP.MODEL] DEBUG 2010-05-25 04:18:32,312 DRINKADESKTOP PID:2268 THID:2280 ID:130812BE-9159-4af7-9BE5-7A3217DA050B:2150.782.123028 MSG:aCYTZ21LLxjhT+k9KRQU=
[AVG.SETUP.MODEL] DEBUG 2010-05-25 04:18:32,312 DRINKADESKTOP PID:2268 THID:2280 ID:130812BE-9159-4af7-9BE5-7A3217DA050B:1684.782.123028 MSG:*
[AVG.SETUP.MODEL] DEBUG 2010-05-25 04:18:32,312 DRINKADESKTOP PID:2268 THID:2280 ID:130812BE-9159-4af7-9BE5-7A3217DA050B:2020.782.123028 MSG:*
[AVG.SETUP.MODEL] DEBUG 2010-05-25 04:18:32,312 DRINKADESKTOP PID:2268 THID:2280 ID:130812BE-9159-4af7-9BE5-7A3217DA050B:2021.782.123028 MSG:*
[AVG.SETUP.MODEL] DEBUG 2010-05-25 04:18:32,312 DRINKADESKTOP PID:2268 THID:2280 ID:130812BE-9159-4af7-9BE5-7A3217DA050B:2022.782.123028 MSG:*
[AVG.SETUP.MODEL] DEBUG 2010-05-25 04:18:32,312 DRINKADESKTOP PID:2268 THID:2280 ID:130812BE-9159-4af7-9BE5-7A3217DA050B:2023.782.123028 MSG:*
[AVG.SETUP.MODEL] DEBUG 2010-05-25 04:18:32,312 DRINKADESKTOP PID:2268 THID:2280 ID:130812BE-9159-4af7-9BE5-7A3217DA050B:1412.782.123028 MSG:aCYTZyknWsFBU+kVAKQ==
[AVG.SETUP.MODEL] DEBUG 2010-05-25 04:18:32,328 DRINKADESKTOP PID:2268 THID:2280 ID:130812BE-9159-4af7-9BE5-7A3217DA050B:2150.782.123028 MSG:aDZralSWSgH5X+/rCCcI=
[AVG.SETUP.MODEL] DEBUG 2010-05-25 04:18:32,328 DRINKADESKTOP PID:2268 THID:2280 ID:130812BE-9159-4af7-9BE5-7A3217DA050B:1684.782.123028 MSG:*
[AVG.SETUP.MODEL] DEBUG 2010-05-25 04:18:32,328 DRINKADESKTOP PID:2268 THID:2280 ID:130812BE-9159-4af7-9BE5-7A3217DA050B:2075.782.123028 MSG:aCIZsD+TafJKEfhyD8zIIO62xsC/pktN5EsFQw2jX8lRLsEr8XTkcgvueePy3znRo

#9 thewall

thewall

  • Malware Response Team
  • 6,425 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Florida
  • Local time:11:19 AM

Posted 26 May 2010 - 11:37 AM

Please download ComboFix from one of these locations:

Link 1
Link 2

* IMPORTANT !!! Save ComboFix.exe to your Desktop
  • Disable your AntiVirus and AntiSpyware applications, usually via a right click on the System Tray icon. They may otherwise interfere with our tools. Instruction can be found HERE
  • Double click on ComboFix.exe & follow the prompts.
  • As part of it's process, ComboFix will check to see if the Microsoft Windows Recovery Console is installed. With malware infections being as they are today, it's strongly recommended to have this pre-installed on your machine before doing any malware removal. It will allow you to boot up into a special recovery/repair mode that will allow us to more easily help you should your computer have a problem after an attempted removal of malware.
  • Follow the prompts to allow ComboFix to download and install the Microsoft Windows Recovery Console, and when prompted, agree to the End-User License Agreement to install the Microsoft Windows Recovery Console.

**Please note: If the Microsoft Windows Recovery Console is already installed, ComboFix will continue it's malware removal procedures.




Once the Microsoft Windows Recovery Console is installed using ComboFix, you should see the following message:





Click on Yes, to continue scanning for malware.

When finished, it will produce a log for you. Please include the C:\ComboFix.txt in your next reply.





If I have helped you then please consider donating so I can continue the fight against malware Posted Image
All donations go directly to the helper

Posted Image

Due to the large amount of backlogs we have I cannot respond to PMs for help unless I am already working with you

#10 Hirogen

Hirogen
  • Topic Starter

  • Members
  • 16 posts
  • OFFLINE
  •  
  • Local time:09:19 AM

Posted 28 May 2010 - 10:07 AM

Here is the log from Combofix

ComboFix 10-05-26.03 - Drinka Family 05/27/2010 6:46.1.2 - x86
Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.511.293 [GMT -7:00]
Running from: c:\documents and settings\Drinka Family\Desktop\ComboFix.exe
AV: AVG Anti-Virus Free *On-access scanning disabled* (Outdated) {17DDD097-36FF-435F-9E1B-52D74245D6BF}
AV: Webroot Internet Security Essentials *On-access scanning disabled* (Updated) {77E10C7F-2CCA-4187-9394-BDBC267AD597}
FW: Webroot Internet Security Essentials *disabled* {63671000-11A2-46DD-BADD-A084CABCDEAE}
* Created a new restore point
.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.

H:\Autorun.inf

.
original MBR restored successfully !
.
((((((((((((((((((((((((( Files Created from 2010-04-27 to 2010-05-27 )))))))))))))))))))))))))))))))
.

2010-05-26 19:47 . 2010-05-26 19:47 503808 ----a-w- c:\documents and settings\Drinka Family\Application Data\Sun\Java\Deployment\SystemCache\6.0\46\f84c6ae-1ef646f1-n\msvcp71.dll
2010-05-26 19:47 . 2010-05-26 19:47 348160 ----a-w- c:\documents and settings\Drinka Family\Application Data\Sun\Java\Deployment\SystemCache\6.0\46\f84c6ae-1ef646f1-n\msvcr71.dll
2010-05-26 19:47 . 2010-05-26 19:47 61440 ----a-w- c:\documents and settings\Drinka Family\Application Data\Sun\Java\Deployment\SystemCache\6.0\50\5535ab32-176add74-n\decora-sse.dll
2010-05-26 19:47 . 2010-05-26 19:47 499712 ----a-w- c:\documents and settings\Drinka Family\Application Data\Sun\Java\Deployment\SystemCache\6.0\46\f84c6ae-1ef646f1-n\jmc.dll
2010-05-26 19:47 . 2010-05-26 19:47 12800 ----a-w- c:\documents and settings\Drinka Family\Application Data\Sun\Java\Deployment\SystemCache\6.0\50\5535ab32-176add74-n\decora-d3d.dll
2010-05-19 01:17 . 2010-05-19 05:56 -------- d-----w- c:\documents and settings\Drinka Family\Local Settings\Application Data\AskToolbar
2010-05-19 00:52 . 2010-05-19 21:01 -------- d-----w- c:\program files\Ask.com
2010-05-19 00:52 . 2010-05-19 00:52 -------- d-----w- c:\program files\MSSOAP
2010-05-19 00:52 . 2010-05-19 00:47 108880 ----a-w- c:\windows\system32\drivers\pwipf6.sys
2010-05-19 00:51 . 2010-05-19 02:45 -------- d-----w- c:\documents and settings\Drinka Family\Application Data\Webroot
2010-05-19 00:51 . 2010-05-19 01:14 -------- d-----w- c:\documents and settings\All Users\Application Data\Webroot
2010-05-19 00:51 . 2009-11-06 22:19 1563008 ----a-w- c:\windows\WRSetup.dll
2010-05-19 00:51 . 2010-05-19 00:51 -------- d-----w- c:\program files\Webroot
2010-05-19 00:45 . 2010-05-19 00:47 164 ----a-w- c:\windows\install.dat
2010-05-15 15:31 . 2010-05-19 00:41 -------- d-----w- c:\documents and settings\Administrator.DRINKADESKTOP
2010-05-15 07:12 . 2010-05-15 07:12 -------- d-----w- c:\program files\ESET
2010-05-15 06:57 . 2010-05-19 00:41 -------- d-----w- c:\documents and settings\Drinka Family\Application Data\Malwarebytes
2010-05-15 05:39 . 2010-05-15 05:39 -------- d-----w- c:\documents and settings\All Users\Application Data\Malwarebytes
2010-05-12 19:49 . 2010-05-12 19:49 -------- d-----w- C:\$AVG
2010-04-30 22:10 . 2010-04-30 22:10 -------- d-----w- c:\documents and settings\NetworkService\Local Settings\Application Data\Vuze_Remote
2010-04-30 22:10 . 2010-04-30 22:10 -------- d-----w- c:\documents and settings\NetworkService\Local Settings\Application Data\Apple

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2010-05-25 04:10 . 2010-03-09 01:56 -------- d-----w- c:\documents and settings\All Users\Application Data\avg9
2010-05-19 03:25 . 2010-03-14 14:56 -------- d---a-w- c:\documents and settings\All Users\Application Data\TEMP
2010-05-19 03:16 . 2010-03-14 14:56 -------- d-----w- c:\program files\Mystery Case Files - Return to Ravenhearst
2010-05-19 01:17 . 2010-03-10 03:46 -------- d-----w- c:\program files\Vuze_Remote
2010-05-19 00:52 . 2010-05-19 00:52 775168 ----a-w- c:\windows\isRS-000.tmp
2010-05-15 16:34 . 2010-05-15 16:34 -------- d-----w- c:\documents and settings\Administrator.DRINKADESKTOP\Application Data\U3
2010-05-15 15:32 . 2010-05-15 15:32 -------- d-----w- c:\documents and settings\Administrator.DRINKADESKTOP\Application Data\Malwarebytes
2010-05-15 06:57 . 2010-05-15 05:39 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
2010-05-15 06:36 . 2010-05-15 06:36 -------- d-----w- c:\documents and settings\Administrator\Application Data\Malwarebytes
2010-05-08 23:31 . 2010-03-14 14:56 -------- d-----w- c:\documents and settings\All Users\Application Data\BigFishGamesCache
2010-04-29 22:39 . 2010-05-15 06:57 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2010-04-29 22:39 . 2010-05-15 06:57 20952 ----a-w- c:\windows\system32\drivers\mbam.sys
2010-04-21 15:46 . 2010-03-09 01:56 242896 ----a-w- c:\windows\system32\drivers\avgtdix.sys
2010-04-19 22:52 . 2010-04-18 19:26 -------- d-----w- c:\documents and settings\Drinka Family\Application Data\Apple Computer
2010-04-18 18:20 . 2010-04-18 18:19 -------- d-----w- c:\program files\iTunes
2010-04-18 18:20 . 2010-04-18 18:19 -------- d-----w- c:\documents and settings\All Users\Application Data\{429CAD59-35B1-4DBC-BB6D-1DB246563521}
2010-04-18 18:19 . 2010-04-18 18:19 -------- d-----w- c:\program files\iPod
2010-04-18 18:19 . 2010-04-18 17:32 -------- d-----w- c:\program files\Common Files\Apple
2010-04-18 18:19 . 2010-04-18 18:17 -------- d-----w- c:\documents and settings\All Users\Application Data\Apple Computer
2010-04-18 18:18 . 2010-04-18 18:17 -------- d-----w- c:\program files\QuickTime
2010-04-18 18:16 . 2010-04-18 18:16 -------- d-----w- c:\program files\Apple Software Update
2010-04-18 17:32 . 2010-04-18 17:32 -------- d-----w- c:\program files\Bonjour
2010-04-18 17:32 . 2010-04-18 17:32 -------- d-----w- c:\documents and settings\All Users\Application Data\Apple
2010-04-17 05:42 . 2010-03-10 03:48 -------- d-----w- c:\documents and settings\Drinka Family\Application Data\Azureus
2010-04-17 01:48 . 2010-04-17 01:48 8851392 ----a-w- c:\documents and settings\Drinka Family\Application Data\Azureus\tmp\AZU1412366242750345043.tmp\Vuze_4.4.0.0a_win32.exe
2010-03-26 08:48 . 2010-03-26 08:48 73000 ----a-w- c:\documents and settings\All Users\Application Data\Apple Computer\Installer Cache\iTunes 9.1.0.79\SetupAdmin.exe
2010-03-14 19:01 . 2010-03-14 19:01 61440 ----a-w- c:\documents and settings\Drinka Family\Application Data\Sun\Java\Deployment\SystemCache\6.0\17\6d0ad391-67a3cfee-n\decora-sse.dll
2010-03-14 19:01 . 2010-03-14 19:01 503808 ----a-w- c:\documents and settings\Drinka Family\Application Data\Sun\Java\Deployment\SystemCache\6.0\54\1a209876-4c732e9c-n\msvcp71.dll
2010-03-14 19:01 . 2010-03-14 19:01 499712 ----a-w- c:\documents and settings\Drinka Family\Application Data\Sun\Java\Deployment\SystemCache\6.0\54\1a209876-4c732e9c-n\jmc.dll
2010-03-14 19:01 . 2010-03-14 19:01 348160 ----a-w- c:\documents and settings\Drinka Family\Application Data\Sun\Java\Deployment\SystemCache\6.0\54\1a209876-4c732e9c-n\msvcr71.dll
2010-03-14 19:01 . 2010-03-14 19:01 12800 ----a-w- c:\documents and settings\Drinka Family\Application Data\Sun\Java\Deployment\SystemCache\6.0\17\6d0ad391-67a3cfee-n\decora-d3d.dll
2010-03-14 19:00 . 2010-03-14 19:00 411368 ----a-w- c:\windows\system32\deploytk.dll
2010-03-14 18:00 . 2010-03-25 18:15 85504 ----a-w- c:\windows\system32\ff_vfw.dll
2010-03-14 14:18 . 2010-03-10 02:25 12328 ----a-w- c:\documents and settings\Drinka Family\Local Settings\Application Data\GDIPFONTCACHEV1.DAT
2010-03-10 03:46 . 2010-03-10 03:46 52224 ----a-w- c:\documents and settings\Drinka Family\Application Data\Mozilla\Firefox\Profiles\4iwp8x1v.default\extensions\{ba14329e-9550-4989-b3f2-9732e92d17cc}\components\FFExternalAlert.dll
2010-03-10 03:46 . 2010-03-10 03:46 101376 ----a-w- c:\documents and settings\Drinka Family\Application Data\Mozilla\Firefox\Profiles\4iwp8x1v.default\extensions\{ba14329e-9550-4989-b3f2-9732e92d17cc}\components\RadioWMPCore.dll
2010-03-10 02:07 . 2010-03-10 02:07 0 ----a-w- c:\windows\ativpsrm.bin
2010-03-09 11:09 . 2008-04-14 12:00 430080 ----a-w- c:\windows\system32\vbscript.dll
2010-03-09 05:22 . 2010-03-08 05:13 86327 ----a-w- c:\windows\pchealth\helpctr\OfflineCache\index.dat
2010-03-09 01:56 . 2010-03-09 01:56 12464 ----a-w- c:\windows\system32\avgrsstx.dll
2010-03-09 01:56 . 2010-03-09 01:56 29512 ----a-w- c:\windows\system32\drivers\avgmfx86.sys
2010-03-09 01:43 . 2010-03-09 01:43 0 ----a-w- c:\windows\nsreg.dat
2010-03-09 01:34 . 2010-03-09 01:34 20747 ----a-w- c:\windows\system32\drivers\AegisP.sys
2010-03-08 05:11 . 2010-03-08 05:11 21640 ----a-w- c:\windows\system32\emptyregdb.dat
2010-03-08 05:10 . 2010-03-08 05:10 295424 ----a-w- c:\windows\system32\termsrv32.dll
.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\URLSearchHooks]
"{00000000-6E41-4FD3-8538-502F5495E5FC}"= "c:\program files\Ask.com\GenericAskToolbar.dll" [2010-02-04 1197448]
"{ba14329e-9550-4989-b3f2-9732e92d17cc}"= "c:\program files\Vuze_Remote\tbVuz1.dll" [2010-05-19 2515552]

[HKEY_CLASSES_ROOT\clsid\{00000000-6e41-4fd3-8538-502f5495e5fc}]

[HKEY_CLASSES_ROOT\clsid\{ba14329e-9550-4989-b3f2-9732e92d17cc}]

[HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{ba14329e-9550-4989-b3f2-9732e92d17cc}]
2010-05-19 01:17 2515552 ----a-w- c:\program files\Vuze_Remote\tbVuz1.dll

[HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{D4027C7F-154A-4066-A1AD-4243D8127440}]
2010-02-04 23:50 1197448 ----a-w- c:\program files\Ask.com\GenericAskToolbar.dll

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Toolbar]
"{ba14329e-9550-4989-b3f2-9732e92d17cc}"= "c:\program files\Vuze_Remote\tbVuz1.dll" [2010-05-19 2515552]
"{D4027C7F-154A-4066-A1AD-4243D8127440}"= "c:\program files\Ask.com\GenericAskToolbar.dll" [2010-02-04 1197448]

[HKEY_CLASSES_ROOT\clsid\{ba14329e-9550-4989-b3f2-9732e92d17cc}]

[HKEY_CLASSES_ROOT\clsid\{d4027c7f-154a-4066-a1ad-4243d8127440}]
[HKEY_CLASSES_ROOT\GenericAskToolbar.ToolbarWnd.1]
[HKEY_CLASSES_ROOT\TypeLib\{2996F0E7-292B-4CAE-893F-47B8B1C05B56}]
[HKEY_CLASSES_ROOT\GenericAskToolbar.ToolbarWnd]

[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Toolbar\Webbrowser]
"{BA14329E-9550-4989-B3F2-9732E92D17CC}"= "c:\program files\Vuze_Remote\tbVuz1.dll" [2010-05-19 2515552]
"{D4027C7F-154A-4066-A1AD-4243D8127440}"= "c:\program files\Ask.com\GenericAskToolbar.dll" [2010-02-04 1197448]

[HKEY_CLASSES_ROOT\clsid\{ba14329e-9550-4989-b3f2-9732e92d17cc}]

[HKEY_CLASSES_ROOT\clsid\{d4027c7f-154a-4066-a1ad-4243d8127440}]
[HKEY_CLASSES_ROOT\GenericAskToolbar.ToolbarWnd.1]
[HKEY_CLASSES_ROOT\TypeLib\{2996F0E7-292B-4CAE-893F-47B8B1C05B56}]
[HKEY_CLASSES_ROOT\GenericAskToolbar.ToolbarWnd]

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shelliconoverlayidentifiers\BackupIconOverlayId]
@="{2EE61E5C-8F94-4AAB-8A80-D2A8CD1FEDAD}"
[HKEY_CLASSES_ROOT\CLSID\{2EE61E5C-8F94-4AAB-8A80-D2A8CD1FEDAD}]
2009-11-06 22:14 238968 ----a-w- c:\program files\Webroot\WebrootSecurity\Backup\CtxMenu_1_0_0_10.dll

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"Google Update"="c:\documents and settings\Drinka Family\Local Settings\Application Data\Google\Update\GoogleUpdate.exe" [2010-03-09 135664]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"StartCCC"="c:\program files\ATI Technologies\ATI.ACE\Core-Static\CLIStart.exe" [2010-02-11 61440]
"AlcxMonitor"="ALCXMNTR.EXE" [2004-09-07 57344]
"SunJavaUpdateSched"="c:\program files\Common Files\Java\Java Update\jusched.exe" [2010-02-18 248040]
"QuickTime Task"="c:\program files\QuickTime\qttask.exe" [2010-03-18 421888]
"iTunesHelper"="c:\program files\iTunes\iTunesHelper.exe" [2010-03-26 142120]
"SpySweeper"="c:\program files\Webroot\WebrootSecurity\SpySweeperUI.exe" [2009-11-06 6515784]

c:\documents and settings\All Users\Start Menu\Programs\Startup\
MSI Wireless Utility.lnk - c:\program files\MSI\Common\RaUI.exe [2010-3-8 425984]

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\avgrsstarter]
2010-03-09 01:56 12464 ----a-w- c:\windows\system32\avgrsstx.dll

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\WebrootSpySweeperService]
@="Service"

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\WRConsumerService]
@="Service"

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"%windir%\\system32\\sessmgr.exe"=
"c:\\Program Files\\AVG\\AVG9\\avgemc.exe"=
"c:\\Program Files\\AVG\\AVG9\\avgupd.exe"=
"c:\\Program Files\\AVG\\AVG9\\avgnsx.exe"=
"c:\\Program Files\\Vuze\\Azureus.exe"=
"c:\\Program Files\\Bonjour\\mDNSResponder.exe"=
"c:\\Program Files\\iTunes\\iTunes.exe"=

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\GloballyOpenPorts\List]
"65533:TCP"= 65533:TCP:Services
"52344:TCP"= 52344:TCP:Services
"3193:TCP"= 3193:TCP:Services
"4886:TCP"= 4886:TCP:Services
"3389:TCP"= 3389:TCP:Remote Desktop

R0 ssfs0bbc;ssfs0bbc;c:\windows\system32\drivers\ssfs0bbc.sys [11/6/2009 12:00 PM 29808]
R1 AvgTdiX;AVG Free Network Redirector;c:\windows\system32\drivers\avgtdix.sys [3/8/2010 6:56 PM 242896]
R1 pwipf6;pwipf6;c:\windows\system32\drivers\pwipf6.sys [5/18/2010 5:52 PM 108880]
R1 SBRE;SBRE;c:\windows\system32\drivers\SBREDrv.sys [5/15/2010 9:47 AM 93872]
R2 avg9wd;AVG Free WatchDog;c:\program files\AVG\AVG9\avgwdsvc.exe [3/8/2010 6:56 PM 308064]
R2 WRConsumerService;Webroot Client Service;c:\program files\Webroot\WebrootSecurity\WRConsumerService.exe [5/18/2010 5:53 PM 1201640]
S0 thrtc;thrtc;c:\windows\system32\drivers\kaocvk.sys --> c:\windows\system32\drivers\kaocvk.sys [?]
S2 avg9emc;AVG Free E-mail Scanner;c:\program files\AVG\AVG9\avgemc.exe [3/8/2010 6:56 PM 916760]
.
Contents of the 'Scheduled Tasks' folder

2010-05-14 c:\windows\Tasks\AppleSoftwareUpdate.job
- c:\program files\Apple Software Update\SoftwareUpdate.exe [2009-10-22 18:50]

2010-05-15 c:\windows\Tasks\GoogleUpdateTaskUserS-1-5-21-2025429265-527237240-842925246-1003Core.job
- c:\documents and settings\Drinka Family\Local Settings\Application Data\Google\Update\GoogleUpdate.exe [2010-03-09 01:41]

2010-05-26 c:\windows\Tasks\GoogleUpdateTaskUserS-1-5-21-2025429265-527237240-842925246-1003UA.job
- c:\documents and settings\Drinka Family\Local Settings\Application Data\Google\Update\GoogleUpdate.exe [2010-03-09 01:41]

2010-05-26 c:\windows\Tasks\Scheduled Update for Ask Toolbar.job
- c:\program files\Ask.com\UpdateTask.exe [2010-02-04 23:50]

2010-05-27 c:\windows\Tasks\WGASetup.job
- c:\windows\system32\KB905474\wgasetup.exe [2010-03-12 05:18]

2010-05-19 c:\windows\Tasks\wrSpySweeper_LA161199E3BC14D4D9ADEAB71E1BF2997.job
- c:\program files\Webroot\WebrootSecurity\SpySweeperUI.exe [2010-05-19 22:19]

2010-05-19 c:\windows\Tasks\wrSpySweeper_LA161199E3BC14D4D9ADEAB71E1BF2997.job
- c:\program files\Webroot\WebrootSecurity\SpySweeperUI.exe [2010-05-19 22:19]

2010-05-19 c:\windows\Tasks\wrSpySweeper_LFD4C05E327104E4DB7EAC07CEF47182B.job
- c:\program files\Webroot\WebrootSecurity\SpySweeperUI.exe [2010-05-19 22:19]

2010-05-19 c:\windows\Tasks\wrSpySweeper_LFD4C05E327104E4DB7EAC07CEF47182B.job
- c:\program files\Webroot\WebrootSecurity\SpySweeperUI.exe [2010-05-19 22:19]
.
.
------- Supplementary Scan -------
.
uInternet Settings,ProxyOverride = *.local
FF - ProfilePath - c:\documents and settings\Drinka Family\Application Data\Mozilla\Firefox\Profiles\4iwp8x1v.default\
FF - prefs.js: browser.search.defaulturl - hxxp://search.conduit.com/ResultsExt.aspx?ctid=CT2504091&SearchSource=3&q={searchTerms}
FF - prefs.js: browser.search.selectedEngine - Google
FF - prefs.js: keyword.URL - hxxp://search.conduit.com/ResultsExt.aspx?ctid=CT2504091&q=
FF - component: c:\documents and settings\Drinka Family\Application Data\Mozilla\Firefox\Profiles\4iwp8x1v.default\extensions\{ba14329e-9550-4989-b3f2-9732e92d17cc}\components\FFExternalAlert.dll
FF - component: c:\documents and settings\Drinka Family\Application Data\Mozilla\Firefox\Profiles\4iwp8x1v.default\extensions\{ba14329e-9550-4989-b3f2-9732e92d17cc}\components\RadioWMPCore.dll
FF - component: c:\program files\AVG\AVG9\Firefox\components\avgssff.dll
FF - plugin: c:\documents and settings\Drinka Family\Local Settings\Application Data\Google\Update\1.2.183.23\npGoogleOneClick8.dll
FF - HiddenExtension: Microsoft .NET Framework Assistant: {20a82645-c095-46ed-80e3-08825760534b} - c:\windows\Microsoft.NET\Framework\v3.5\Windows Presentation Foundation\DotNetAssistantExtension\

---- FIREFOX POLICIES ----
c:\program files\Mozilla Firefox\greprefs\all.js - pref("ui.use_native_colors", true);
c:\program files\Mozilla Firefox\greprefs\all.js - pref("network.auth.force-generic-ntlm", false);
c:\program files\Mozilla Firefox\greprefs\all.js - pref("svg.smil.enabled", false);
c:\program files\Mozilla Firefox\greprefs\security-prefs.js - pref("security.ssl.allow_unrestricted_renego_everywhere__temporarily_available_pref", true);
c:\program files\Mozilla Firefox\greprefs\security-prefs.js - pref("security.ssl.renego_unrestricted_hosts", "");
c:\program files\Mozilla Firefox\greprefs\security-prefs.js - pref("security.ssl.treat_unsafe_negotiation_as_broken", false);
c:\program files\Mozilla Firefox\greprefs\security-prefs.js - pref("security.ssl.require_safe_negotiation", false);
c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("extensions.{972ce4c6-7e08-4474-a285-3208198ce6fd}.name", "chrome://browser/locale/browser.properties");
c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("extensions.{972ce4c6-7e08-4474-a285-3208198ce6fd}.description", "chrome://browser/locale/browser.properties");
c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("plugins.update.notifyUser", false);
.

**************************************************************************

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2010-05-27 06:52
Windows 5.1.2600 Service Pack 3 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully
hidden files: 0

**************************************************************************
.
--------------------- DLLs Loaded Under Running Processes ---------------------

- - - - - - - > 'winlogon.exe'(624)
c:\windows\system32\Ati2evxx.dll
.
Completion time: 2010-05-27 06:56:57
ComboFix-quarantined-files.txt 2010-05-27 13:56

Pre-Run: 30,389,297,152 bytes free
Post-Run: 30,448,672,768 bytes free

WindowsXP-KB310994-SP2-Pro-BootDisk-ENU.exe
[boot loader]
timeout=2
default=multi(0)disk(0)rdisk(0)partition(2)\WINDOWS
[operating systems]
c:\cmdcons\BOOTSECT.DAT="Microsoft Windows Recovery Console" /cmdcons
multi(0)disk(0)rdisk(0)partition(2)\WINDOWS="Microsoft Windows XP Professional" /noexecute=optin /fastdetect

- - End Of File - - D36D758C7BF59FFF7C5330EF5F74CA70


#11 thewall

thewall

  • Malware Response Team
  • 6,425 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Florida
  • Local time:11:19 AM

Posted 28 May 2010 - 02:23 PM

Here is a link that should help you uninstall AVG:

http://www.avg.com/us-en/download-tools



Run GMER once again making sure you leave only Sections checked. The log should not be that long but if it is let me know otherwise going ahead and post it.
If I have helped you then please consider donating so I can continue the fight against malware Posted Image
All donations go directly to the helper

Posted Image

Due to the large amount of backlogs we have I cannot respond to PMs for help unless I am already working with you

#12 Hirogen

Hirogen
  • Topic Starter

  • Members
  • 16 posts
  • OFFLINE
  •  
  • Local time:09:19 AM

Posted 29 May 2010 - 09:37 PM

I took off AVG with the link..thanks for that, here is the new log,

ComboFix 10-05-28.02 - Drinka Family 05/28/2010 21:22:13.2.2 - x86
Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.511.177 [GMT -7:00]
Running from: c:\documents and settings\Drinka Family\Desktop\ComboFix.exe
AV: Webroot Internet Security Essentials *On-access scanning disabled* (Updated) {77E10C7F-2CCA-4187-9394-BDBC267AD597}
FW: Webroot Internet Security Essentials *disabled* {63671000-11A2-46DD-BADD-A084CABCDEAE}
.

((((((((((((((((((((((((( Files Created from 2010-04-28 to 2010-05-29 )))))))))))))))))))))))))))))))
.

2010-05-27 14:09 . 2010-05-27 14:09 -------- d-s---w- c:\windows\Cookies
2010-05-26 19:47 . 2010-05-26 19:47 503808 ----a-w- c:\documents and settings\Drinka Family\Application Data\Sun\Java\Deployment\SystemCache\6.0\46\f84c6ae-1ef646f1-n\msvcp71.dll
2010-05-26 19:47 . 2010-05-26 19:47 348160 ----a-w- c:\documents and settings\Drinka Family\Application Data\Sun\Java\Deployment\SystemCache\6.0\46\f84c6ae-1ef646f1-n\msvcr71.dll
2010-05-26 19:47 . 2010-05-26 19:47 61440 ----a-w- c:\documents and settings\Drinka Family\Application Data\Sun\Java\Deployment\SystemCache\6.0\50\5535ab32-176add74-n\decora-sse.dll
2010-05-26 19:47 . 2010-05-26 19:47 499712 ----a-w- c:\documents and settings\Drinka Family\Application Data\Sun\Java\Deployment\SystemCache\6.0\46\f84c6ae-1ef646f1-n\jmc.dll
2010-05-26 19:47 . 2010-05-26 19:47 12800 ----a-w- c:\documents and settings\Drinka Family\Application Data\Sun\Java\Deployment\SystemCache\6.0\50\5535ab32-176add74-n\decora-d3d.dll
2010-05-19 01:17 . 2010-05-27 14:40 -------- d-----w- c:\documents and settings\Drinka Family\Local Settings\Application Data\AskToolbar
2010-05-19 00:52 . 2010-05-19 21:01 -------- d-----w- c:\program files\Ask.com
2010-05-19 00:52 . 2010-05-19 00:52 -------- d-----w- c:\program files\MSSOAP
2010-05-19 00:52 . 2010-05-19 00:47 108880 ----a-w- c:\windows\system32\drivers\pwipf6.sys
2010-05-19 00:51 . 2010-05-19 02:45 -------- d-----w- c:\documents and settings\Drinka Family\Application Data\Webroot
2010-05-19 00:51 . 2010-05-19 01:14 -------- d-----w- c:\documents and settings\All Users\Application Data\Webroot
2010-05-19 00:51 . 2009-11-06 22:19 1563008 ----a-w- c:\windows\WRSetup.dll
2010-05-19 00:51 . 2010-05-19 00:51 -------- d-----w- c:\program files\Webroot
2010-05-19 00:45 . 2010-05-19 00:47 164 ----a-w- c:\windows\install.dat
2010-05-15 15:31 . 2010-05-19 00:41 -------- d-----w- c:\documents and settings\Administrator.DRINKADESKTOP
2010-05-15 07:12 . 2010-05-15 07:12 -------- d-----w- c:\program files\ESET
2010-05-15 06:57 . 2010-05-19 00:41 -------- d-----w- c:\documents and settings\Drinka Family\Application Data\Malwarebytes
2010-05-15 05:39 . 2010-05-15 05:39 -------- d-----w- c:\documents and settings\All Users\Application Data\Malwarebytes
2010-05-12 19:49 . 2010-05-12 19:49 -------- d-----w- C:\$AVG
2010-04-30 22:10 . 2010-04-30 22:10 -------- d-----w- c:\documents and settings\NetworkService\Local Settings\Application Data\Vuze_Remote
2010-04-30 22:10 . 2010-04-30 22:10 -------- d-----w- c:\documents and settings\NetworkService\Local Settings\Application Data\Apple

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2010-05-29 04:14 . 2010-03-09 01:56 -------- d-----w- c:\documents and settings\All Users\Application Data\avg9
2010-05-19 03:25 . 2010-03-14 14:56 -------- d---a-w- c:\documents and settings\All Users\Application Data\TEMP
2010-05-19 03:16 . 2010-03-14 14:56 -------- d-----w- c:\program files\Mystery Case Files - Return to Ravenhearst
2010-05-19 01:17 . 2010-03-10 03:46 -------- d-----w- c:\program files\Vuze_Remote
2010-05-19 00:52 . 2010-05-19 00:52 775168 ----a-w- c:\windows\isRS-000.tmp
2010-05-15 16:34 . 2010-05-15 16:34 -------- d-----w- c:\documents and settings\Administrator.DRINKADESKTOP\Application Data\U3
2010-05-15 15:32 . 2010-05-15 15:32 -------- d-----w- c:\documents and settings\Administrator.DRINKADESKTOP\Application Data\Malwarebytes
2010-05-15 06:57 . 2010-05-15 05:39 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
2010-05-15 06:36 . 2010-05-15 06:36 -------- d-----w- c:\documents and settings\Administrator\Application Data\Malwarebytes
2010-05-08 23:31 . 2010-03-14 14:56 -------- d-----w- c:\documents and settings\All Users\Application Data\BigFishGamesCache
2010-04-29 22:39 . 2010-05-15 06:57 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2010-04-29 22:39 . 2010-05-15 06:57 20952 ----a-w- c:\windows\system32\drivers\mbam.sys
2010-04-19 22:52 . 2010-04-18 19:26 -------- d-----w- c:\documents and settings\Drinka Family\Application Data\Apple Computer
2010-04-18 18:20 . 2010-04-18 18:19 -------- d-----w- c:\program files\iTunes
2010-04-18 18:20 . 2010-04-18 18:19 -------- d-----w- c:\documents and settings\All Users\Application Data\{429CAD59-35B1-4DBC-BB6D-1DB246563521}
2010-04-18 18:19 . 2010-04-18 18:19 -------- d-----w- c:\program files\iPod
2010-04-18 18:19 . 2010-04-18 17:32 -------- d-----w- c:\program files\Common Files\Apple
2010-04-18 18:19 . 2010-04-18 18:17 -------- d-----w- c:\documents and settings\All Users\Application Data\Apple Computer
2010-04-18 18:18 . 2010-04-18 18:17 -------- d-----w- c:\program files\QuickTime
2010-04-18 18:16 . 2010-04-18 18:16 -------- d-----w- c:\program files\Apple Software Update
2010-04-18 17:32 . 2010-04-18 17:32 -------- d-----w- c:\program files\Bonjour
2010-04-18 17:32 . 2010-04-18 17:32 -------- d-----w- c:\documents and settings\All Users\Application Data\Apple
2010-04-17 05:42 . 2010-03-10 03:48 -------- d-----w- c:\documents and settings\Drinka Family\Application Data\Azureus
2010-04-17 01:48 . 2010-04-17 01:48 8851392 ----a-w- c:\documents and settings\Drinka Family\Application Data\Azureus\tmp\AZU1412366242750345043.tmp\Vuze_4.4.0.0a_win32.exe
2010-03-26 08:48 . 2010-03-26 08:48 73000 ----a-w- c:\documents and settings\All Users\Application Data\Apple Computer\Installer Cache\iTunes 9.1.0.79\SetupAdmin.exe
2010-03-14 19:01 . 2010-03-14 19:01 61440 ----a-w- c:\documents and settings\Drinka Family\Application Data\Sun\Java\Deployment\SystemCache\6.0\17\6d0ad391-67a3cfee-n\decora-sse.dll
2010-03-14 19:01 . 2010-03-14 19:01 503808 ----a-w- c:\documents and settings\Drinka Family\Application Data\Sun\Java\Deployment\SystemCache\6.0\54\1a209876-4c732e9c-n\msvcp71.dll
2010-03-14 19:01 . 2010-03-14 19:01 499712 ----a-w- c:\documents and settings\Drinka Family\Application Data\Sun\Java\Deployment\SystemCache\6.0\54\1a209876-4c732e9c-n\jmc.dll
2010-03-14 19:01 . 2010-03-14 19:01 348160 ----a-w- c:\documents and settings\Drinka Family\Application Data\Sun\Java\Deployment\SystemCache\6.0\54\1a209876-4c732e9c-n\msvcr71.dll
2010-03-14 19:01 . 2010-03-14 19:01 12800 ----a-w- c:\documents and settings\Drinka Family\Application Data\Sun\Java\Deployment\SystemCache\6.0\17\6d0ad391-67a3cfee-n\decora-d3d.dll
2010-03-14 19:00 . 2010-03-14 19:00 411368 ----a-w- c:\windows\system32\deploytk.dll
2010-03-14 18:00 . 2010-03-25 18:15 85504 ----a-w- c:\windows\system32\ff_vfw.dll
2010-03-14 14:18 . 2010-03-10 02:25 12328 ----a-w- c:\documents and settings\Drinka Family\Local Settings\Application Data\GDIPFONTCACHEV1.DAT
2010-03-10 03:46 . 2010-03-10 03:46 52224 ----a-w- c:\documents and settings\Drinka Family\Application Data\Mozilla\Firefox\Profiles\4iwp8x1v.default\extensions\{ba14329e-9550-4989-b3f2-9732e92d17cc}\components\FFExternalAlert.dll
2010-03-10 03:46 . 2010-03-10 03:46 101376 ----a-w- c:\documents and settings\Drinka Family\Application Data\Mozilla\Firefox\Profiles\4iwp8x1v.default\extensions\{ba14329e-9550-4989-b3f2-9732e92d17cc}\components\RadioWMPCore.dll
2010-03-10 02:07 . 2010-03-10 02:07 0 ----a-w- c:\windows\ativpsrm.bin
2010-03-09 11:09 . 2008-04-14 12:00 430080 ----a-w- c:\windows\system32\vbscript.dll
2010-03-09 05:22 . 2010-03-08 05:13 86327 ----a-w- c:\windows\pchealth\helpctr\OfflineCache\index.dat
2010-03-09 01:43 . 2010-03-09 01:43 0 ----a-w- c:\windows\nsreg.dat
2010-03-09 01:34 . 2010-03-09 01:34 20747 ----a-w- c:\windows\system32\drivers\AegisP.sys
2010-03-08 05:11 . 2010-03-08 05:11 21640 ----a-w- c:\windows\system32\emptyregdb.dat
2010-03-08 05:10 . 2010-03-08 05:10 295424 ----a-w- c:\windows\system32\termsrv32.dll
.

((((((((((((((((((((((((((((( SnapShot@2010-05-27_13.52.29 )))))))))))))))))))))))))))))))))))))))))
.
+ 2010-05-29 04:11 . 2010-05-29 04:11 16384 c:\windows\Temp\Perflib_Perfdata_700.dat
+ 2010-05-27 14:09 . 2010-05-29 04:11 32768 c:\windows\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\index.dat
+ 2010-03-08 05:18 . 2010-05-29 04:11 32768 c:\windows\system32\config\systemprofile\Local Settings\History\History.IE5\index.dat
- 2010-03-08 05:18 . 2010-05-27 13:18 32768 c:\windows\system32\config\systemprofile\Local Settings\History\History.IE5\index.dat
+ 2010-05-29 03:39 . 2010-05-29 04:11 16384 c:\windows\system32\config\systemprofile\Cookies\index.dat
- 2010-03-08 05:18 . 2010-05-27 13:18 16384 c:\windows\system32\config\systemprofile\Cookies\index.dat
+ 2010-05-27 14:09 . 2010-05-27 13:45 16384 c:\windows\Cookies\index.dat
.
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\URLSearchHooks]
"{00000000-6E41-4FD3-8538-502F5495E5FC}"= "c:\program files\Ask.com\GenericAskToolbar.dll" [2010-02-04 1197448]
"{ba14329e-9550-4989-b3f2-9732e92d17cc}"= "c:\program files\Vuze_Remote\tbVuz1.dll" [2010-05-19 2515552]

[HKEY_CLASSES_ROOT\clsid\{00000000-6e41-4fd3-8538-502f5495e5fc}]

[HKEY_CLASSES_ROOT\clsid\{ba14329e-9550-4989-b3f2-9732e92d17cc}]

[HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{ba14329e-9550-4989-b3f2-9732e92d17cc}]
2010-05-19 01:17 2515552 ----a-w- c:\program files\Vuze_Remote\tbVuz1.dll

[HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{D4027C7F-154A-4066-A1AD-4243D8127440}]
2010-02-04 23:50 1197448 ----a-w- c:\program files\Ask.com\GenericAskToolbar.dll

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Toolbar]
"{ba14329e-9550-4989-b3f2-9732e92d17cc}"= "c:\program files\Vuze_Remote\tbVuz1.dll" [2010-05-19 2515552]
"{D4027C7F-154A-4066-A1AD-4243D8127440}"= "c:\program files\Ask.com\GenericAskToolbar.dll" [2010-02-04 1197448]

[HKEY_CLASSES_ROOT\clsid\{ba14329e-9550-4989-b3f2-9732e92d17cc}]

[HKEY_CLASSES_ROOT\clsid\{d4027c7f-154a-4066-a1ad-4243d8127440}]
[HKEY_CLASSES_ROOT\GenericAskToolbar.ToolbarWnd.1]
[HKEY_CLASSES_ROOT\TypeLib\{2996F0E7-292B-4CAE-893F-47B8B1C05B56}]
[HKEY_CLASSES_ROOT\GenericAskToolbar.ToolbarWnd]

[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Toolbar\Webbrowser]
"{BA14329E-9550-4989-B3F2-9732E92D17CC}"= "c:\program files\Vuze_Remote\tbVuz1.dll" [2010-05-19 2515552]
"{D4027C7F-154A-4066-A1AD-4243D8127440}"= "c:\program files\Ask.com\GenericAskToolbar.dll" [2010-02-04 1197448]

[HKEY_CLASSES_ROOT\clsid\{ba14329e-9550-4989-b3f2-9732e92d17cc}]

[HKEY_CLASSES_ROOT\clsid\{d4027c7f-154a-4066-a1ad-4243d8127440}]
[HKEY_CLASSES_ROOT\GenericAskToolbar.ToolbarWnd.1]
[HKEY_CLASSES_ROOT\TypeLib\{2996F0E7-292B-4CAE-893F-47B8B1C05B56}]
[HKEY_CLASSES_ROOT\GenericAskToolbar.ToolbarWnd]

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shelliconoverlayidentifiers\BackupIconOverlayId]
@="{2EE61E5C-8F94-4AAB-8A80-D2A8CD1FEDAD}"
[HKEY_CLASSES_ROOT\CLSID\{2EE61E5C-8F94-4AAB-8A80-D2A8CD1FEDAD}]
2009-11-06 22:14 238968 ----a-w- c:\program files\Webroot\WebrootSecurity\Backup\CtxMenu_1_0_0_10.dll

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"Google Update"="c:\documents and settings\Drinka Family\Local Settings\Application Data\Google\Update\GoogleUpdate.exe" [2010-03-09 135664]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"StartCCC"="c:\program files\ATI Technologies\ATI.ACE\Core-Static\CLIStart.exe" [2010-02-11 61440]
"AlcxMonitor"="ALCXMNTR.EXE" [2004-09-07 57344]
"SunJavaUpdateSched"="c:\program files\Common Files\Java\Java Update\jusched.exe" [2010-02-18 248040]
"QuickTime Task"="c:\program files\QuickTime\qttask.exe" [2010-03-18 421888]
"iTunesHelper"="c:\program files\iTunes\iTunesHelper.exe" [2010-03-26 142120]
"SpySweeper"="c:\program files\Webroot\WebrootSecurity\SpySweeperUI.exe" [2009-11-06 6515784]

c:\documents and settings\All Users\Start Menu\Programs\Startup\
MSI Wireless Utility.lnk - c:\program files\MSI\Common\RaUI.exe [2010-3-8 425984]

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\WebrootSpySweeperService]
@="Service"

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\WRConsumerService]
@="Service"

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"%windir%\\system32\\sessmgr.exe"=
"c:\\Program Files\\Vuze\\Azureus.exe"=
"c:\\Program Files\\Bonjour\\mDNSResponder.exe"=
"c:\\Program Files\\iTunes\\iTunes.exe"=

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\GloballyOpenPorts\List]
"65533:TCP"= 65533:TCP:Services
"52344:TCP"= 52344:TCP:Services
"3193:TCP"= 3193:TCP:Services
"4886:TCP"= 4886:TCP:Services
"3389:TCP"= 3389:TCP:Remote Desktop

R0 ssfs0bbc;ssfs0bbc;c:\windows\system32\drivers\ssfs0bbc.sys [11/6/2009 12:00 PM 29808]
R1 pwipf6;pwipf6;c:\windows\system32\drivers\pwipf6.sys [5/18/2010 5:52 PM 108880]
R1 SBRE;SBRE;c:\windows\system32\drivers\SBREDrv.sys [5/15/2010 9:47 AM 93872]
R2 WRConsumerService;Webroot Client Service;c:\program files\Webroot\WebrootSecurity\WRConsumerService.exe [5/18/2010 5:53 PM 1201640]
S0 thrtc;thrtc;c:\windows\system32\drivers\kaocvk.sys --> c:\windows\system32\drivers\kaocvk.sys [?]
.
Contents of the 'Scheduled Tasks' folder

2010-05-14 c:\windows\Tasks\AppleSoftwareUpdate.job
- c:\program files\Apple Software Update\SoftwareUpdate.exe [2009-10-22 18:50]

2010-05-29 c:\windows\Tasks\GoogleUpdateTaskUserS-1-5-21-2025429265-527237240-842925246-1003Core.job
- c:\documents and settings\Drinka Family\Local Settings\Application Data\Google\Update\GoogleUpdate.exe [2010-03-09 01:41]

2010-05-29 c:\windows\Tasks\GoogleUpdateTaskUserS-1-5-21-2025429265-527237240-842925246-1003UA.job
- c:\documents and settings\Drinka Family\Local Settings\Application Data\Google\Update\GoogleUpdate.exe [2010-03-09 01:41]

2010-05-29 c:\windows\Tasks\Scheduled Update for Ask Toolbar.job
- c:\program files\Ask.com\UpdateTask.exe [2010-02-04 23:50]

2010-05-29 c:\windows\Tasks\WGASetup.job
- c:\windows\system32\KB905474\wgasetup.exe [2010-03-12 05:18]
.
.
------- Supplementary Scan -------
.
uInternet Settings,ProxyOverride = *.local
FF - ProfilePath - c:\documents and settings\Drinka Family\Application Data\Mozilla\Firefox\Profiles\4iwp8x1v.default\
FF - prefs.js: browser.search.defaulturl - hxxp://search.conduit.com/ResultsExt.aspx?ctid=CT2504091&SearchSource=3&q={searchTerms}
FF - prefs.js: browser.search.selectedEngine - Google
FF - prefs.js: keyword.URL - hxxp://search.conduit.com/ResultsExt.aspx?ctid=CT2504091&q=
FF - component: c:\documents and settings\Drinka Family\Application Data\Mozilla\Firefox\Profiles\4iwp8x1v.default\extensions\{ba14329e-9550-4989-b3f2-9732e92d17cc}\components\FFExternalAlert.dll
FF - component: c:\documents and settings\Drinka Family\Application Data\Mozilla\Firefox\Profiles\4iwp8x1v.default\extensions\{ba14329e-9550-4989-b3f2-9732e92d17cc}\components\RadioWMPCore.dll
FF - plugin: c:\documents and settings\Drinka Family\Local Settings\Application Data\Google\Update\1.2.183.23\npGoogleOneClick8.dll
FF - HiddenExtension: Microsoft .NET Framework Assistant: {20a82645-c095-46ed-80e3-08825760534b} - c:\windows\Microsoft.NET\Framework\v3.5\Windows Presentation Foundation\DotNetAssistantExtension\

---- FIREFOX POLICIES ----
c:\program files\Mozilla Firefox\greprefs\all.js - pref("ui.use_native_colors", true);
c:\program files\Mozilla Firefox\greprefs\all.js - pref("network.auth.force-generic-ntlm", false);
c:\program files\Mozilla Firefox\greprefs\all.js - pref("svg.smil.enabled", false);
c:\program files\Mozilla Firefox\greprefs\security-prefs.js - pref("security.ssl.allow_unrestricted_renego_everywhere__temporarily_available_pref", true);
c:\program files\Mozilla Firefox\greprefs\security-prefs.js - pref("security.ssl.renego_unrestricted_hosts", "");
c:\program files\Mozilla Firefox\greprefs\security-prefs.js - pref("security.ssl.treat_unsafe_negotiation_as_broken", false);
c:\program files\Mozilla Firefox\greprefs\security-prefs.js - pref("security.ssl.require_safe_negotiation", false);
c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("extensions.{972ce4c6-7e08-4474-a285-3208198ce6fd}.name", "chrome://browser/locale/browser.properties");
c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("extensions.{972ce4c6-7e08-4474-a285-3208198ce6fd}.description", "chrome://browser/locale/browser.properties");
c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("plugins.update.notifyUser", false);
.
- - - - ORPHANS REMOVED - - - -

Notify-avgrsstarter - avgrsstx.dll



**************************************************************************
scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully
hidden files:

**************************************************************************
.
--------------------- DLLs Loaded Under Running Processes ---------------------

- - - - - - - > 'winlogon.exe'(600)
c:\windows\system32\Ati2evxx.dll

- - - - - - - > 'explorer.exe'(2988)
c:\program files\Webroot\WebrootSecurity\Backup\CtxMenu_1_0_0_10.dll
c:\windows\system32\WPDShServiceObj.dll
c:\windows\system32\PortableDeviceTypes.dll
c:\windows\system32\PortableDeviceApi.dll
.
Completion time: 2010-05-28 21:28:49
ComboFix-quarantined-files.txt 2010-05-29 04:28
ComboFix2.txt 2010-05-27 13:56

Pre-Run: 31,036,637,184 bytes free
Post-Run: 31,006,552,064 bytes free

- - End Of File - - B466355CD1AA1E4AE34A571BEF4505D8


#13 thewall

thewall

  • Malware Response Team
  • 6,425 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Florida
  • Local time:11:19 AM

Posted 29 May 2010 - 09:49 PM

Ooops!! smile.gif You ran the wrong thing. I needed a GMER log not ComboFix. Make sure everything is unchecked except Sections.
If I have helped you then please consider donating so I can continue the fight against malware Posted Image
All donations go directly to the helper

Posted Image

Due to the large amount of backlogs we have I cannot respond to PMs for help unless I am already working with you

#14 Hirogen

Hirogen
  • Topic Starter

  • Members
  • 16 posts
  • OFFLINE
  •  
  • Local time:09:19 AM

Posted 29 May 2010 - 09:55 PM

You are too fast! smile.gif I realized what I did and tried to run gmer but my computer restarted itself...I then realized I had C: checked here is the GMER log,

GMER 1.0.15.15281 - http://www.gmer.net
Rootkit scan 2010-05-29 19:53:35
Windows 5.1.2600 Service Pack 3
Running: gmer.exe; Driver: C:\DOCUME~1\DRINKA~1\LOCALS~1\Temp\pwryraow.sys


---- Kernel code sections - GMER 1.0.15 ----

.text ntoskrnl.exe!ZwYieldExecution + 12E 804E4988 12 Bytes [10, 0F, 64, AA, 88, C1, 35, ...] {ADC [EDI], CL; STOS BYTE FS:[EDI]; MOV CL, AL; XOR EAX, 0x64187082; STOSB }
.text ntoskrnl.exe!ZwYieldExecution + 346 804E4BA0 4 Bytes CALL 07D08480
.text C:\WINDOWS\system32\DRIVERS\ati2mtag.sys section is writeable [0xF7F1E000, 0x1C5D38, 0xE8000020]

---- EOF - GMER 1.0.15 ----

Edited by Hirogen, 29 May 2010 - 09:55 PM.


#15 thewall

thewall

  • Malware Response Team
  • 6,425 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Florida
  • Local time:11:19 AM

Posted 29 May 2010 - 10:25 PM

That looks OK. Let's run a scan:


I'd like us to scan your machine with ESET OnlineScan
  1. Hold down Control and click on the following link to open ESET OnlineScan in a new window.
    ESET OnlineScan
  2. Click the button.
  3. For alternate browsers only: (Microsoft Internet Explorer users can skip these steps)
    1. Click on to download the ESET Smart Installer. Save it to your desktop.
    2. Double click on the icon on your desktop.
  4. Check
  5. Click the button.
  6. Accept any security warnings from your browser.
  7. Check
  8. Push the Start button.
  9. ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this can take some time.
  10. When the scan completes, push
  11. Push , and save the file to your desktop using a unique name, such as ESETScan. Include the contents of this report in your next reply.
  12. Push the button.
  13. Push

If I have helped you then please consider donating so I can continue the fight against malware Posted Image
All donations go directly to the helper

Posted Image

Due to the large amount of backlogs we have I cannot respond to PMs for help unless I am already working with you




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users