Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

STOPzilla keeps detecting Kamsoft Trojans


  • This topic is locked This topic is locked
16 replies to this topic

#1 Bcfuser

Bcfuser

  • Members
  • 10 posts
  • OFFLINE
  •  
  • Local time:07:53 PM

Posted 01 June 2010 - 05:43 PM

Hello,

I reecntly started getting notifications from STOPzilla on my regularly scheduled scans that I am infected with the Kamsoft Trojan. It then gives me a bunch of registry entries that start with "dotnet" or "netfx". It allows me to remove them but they keep coming back. I would appreciate your help in getting rid of these completely if they are in fact a Trojan. Here is my DDS log. I have also attached GMER and DDS scans.
As I use this computer for work, this has been a big problem for me.

Thanks VERY VERY much!!

DDS (Ver_10-03-17.01) - NTFSx86
Run by Rob at 21:44:10.54 on Mon 05/31/2010
Internet Explorer: 8.0.6001.18702
Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.3070.1674 [GMT -4:00]

AV: Protection System *On-access scanning enabled* (Outdated) {28e00e3b-806e-4533-925c-f4c3d79514b9}
AV: McAfee VirusScan *On-access scanning enabled* (Updated) {84B5EE75-6421-4CDE-A33A-DD43BA9FAD83}
FW: McAfee Personal Firewall *enabled* {94894B63-8C7F-4050-BDA4-813CA00DA3E8}

============== Running Processes ===============

C:\Program Files\Webroot\WebrootSecurity\WRConsumerService.exe
C:\WINDOWS\system32\svchost -k DcomLaunch
c:\Program Files\Common Files\iS3\Anti-Spyware\SZServer.exe
svchost.exe
C:\WINDOWS\System32\svchost.exe -k netsvcs
C:\Program Files\WIDCOMM\Bluetooth Software\bin\btwdins.exe
svchost.exe
svchost.exe
C:\WINDOWS\system32\spoolsv.exe
svchost.exe
C:\Program Files\Adobe\Photoshop Elements 5.0\PhotoshopElementsFileAgent.exe
C:\Program Files\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe
C:\Program Files\Bonjour\mDNSResponder.exe
C:\Program Files\Flip Video\FlipShare\FlipShareService.exe
C:\Program Files\Intel\Intel Matrix Storage Manager\Iaantmon.exe
C:\Program Files\Java\jre6\bin\jqs.exe
C:\Program Files\LeapFrog\LeapFrog Connect\CommandService.exe
C:\Program Files\McAfee\SiteAdvisor\McSACore.exe
C:\PROGRA~1\McAfee\MSC\mcmscsvc.exe
c:\PROGRA~1\COMMON~1\mcafee\mna\mcnasvc.exe
c:\PROGRA~1\COMMON~1\mcafee\mcproxy\mcproxy.exe
C:\PROGRA~1\McAfee\VIRUSS~1\mcshield.exe
C:\Program Files\McAfee\MPF\MPFSrv.exe
C:\Program Files\McAfee\MSK\MskSrver.exe
C:\WINDOWS\system32\nvsvc32.exe
C:\WINDOWS\Explorer.EXE
c:\PROGRA~1\mcafee.com\agent\mcagent.exe
C:\WINDOWS\stsystra.exe
C:\Program Files\Intel\Intel Matrix Storage Manager\Iaanotif.exe
C:\Program Files\Dell\Media Experience\DMXLauncher.exe
C:\Program Files\Roxio\Drag-to-Disc\DrgToDsc.exe
C:\Program Files\Microsoft IntelliPoint\point32.exe
C:\Program Files\ScanSoft\PaperPort\pptd40nt.exe
C:\Program Files\WDC\SetIcon.exe
C:\Program Files\Common Files\Java\Java Update\jusched.exe
C:\Program Files\LeapFrog\LeapFrog Connect\Monitor.exe
C:\WINDOWS\system32\svchost.exe -k imgsvc
C:\Program Files\iTunes\iTunesHelper.exe
C:\Program Files\Webroot\WebrootSecurity\SpySweeper.exe
C:\Program Files\Webroot\WebrootSecurity\SpySweeperUI.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\WIDCOMM\Bluetooth Software\BTTray.exe
C:\Program Files\Digital Line Detect\DLG.exe
C:\Program Files\Webroot\Washer\WasherSvc.exe
C:\Program Files\Nikon\PictureProject\NkbMonitor.exe
C:\PROGRA~1\WIDCOMM\BLUETO~1\BTSTAC~1.EXE
c:\blp\API\office tools\bxlartd.exe
c:\blp\API\office tools\bxlaui.exe
C:\Program Files\BUFFALO\NASNAVI\nassche.exe
c:\PROGRA~1\mcafee\msc\mcshell.exe
c:\blp\api\bbcomm.exe
C:\Program Files\iPod\bin\iPodService.exe
C:\PROGRA~1\McAfee\VIRUSS~1\mcsysmon.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Internet Explorer\iexplore.exe
c:\Program Files\STOPzilla!\STOPzilla.exe
c:\Program Files\STOPzilla!\SZOptions.exe
c:\Program Files\Common Files\iS3\Anti-Spyware\SZScanner.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Documents and Settings\Rob\Desktop\dds.scr

============== Pseudo HJT Report ===============

uStart Page = hxxp://www.google.com/ig
uSearch Page = hxxp://www.google.com
uSearch Bar = hxxp://www.google.com
mDefault_Page_URL = hxxp://www.google.com
uInternet Settings,ProxyOverride = *.local
uSearchAssistant = hxxp://www.google.com/ie
uSearchURL,(Default) = hxxp://www.google.com/search?q=%s
mSearchAssistant = hxxp://www.google.com/ie
BHO: Adobe PDF Reader Link Helper: {06849e9f-c8d7-4d59-b87d-784b7d6be0b3} - c:\program files\common files\adobe\acrobat\activex\AcroIEHelper.dll
BHO: McAfee Phishing Filter: {27b4851a-3207-45a2-b947-be8afe6163ab} - c:\progra~1\mcafee\msk\mskapbho.dll
BHO: scriptproxy: {7db2d5a0-7241-4e79-b68d-6309f01c5231} - c:\program files\mcafee\virusscan\scriptsn.dll
BHO: McAfee SiteAdvisor BHO: {b164e929-a1b6-4a06-b104-2cd0e90a88ff} - c:\progra~1\mcafee\sitead~1\mcieplg.dll
BHO: Java™ Plug-In 2 SSV Helper: {dbc80044-a445-435b-bc74-9c25c1c588a9} - c:\program files\java\jre6\bin\jp2ssv.dll
BHO: STOPzilla Browser Helper Object: {e3215f20-3212-11d6-9f8b-00d0b743919d} - c:\program files\stopzilla!\SZIEBHO.dll
BHO: JQSIEStartDetectorImpl Class: {e7e6f031-17ce-4c07-bc86-eabfe594f69c} - c:\program files\java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll
TB: McAfee SiteAdvisor Toolbar: {0ebbbe48-bad4-4b4c-8e5a-516abecae064} - c:\progra~1\mcafee\sitead~1\mcieplg.dll
TB: {D4027C7F-154A-4066-A1AD-4243D8127440} - No File
uRun: [ctfmon.exe] "c:\windows\system32\ctfmon.exe"
uRun: [CLRHost] "c:\blp\api\office tools\bbxlcmd.exe"
mRun: [NvCplDaemon] "RUNDLL32.EXE" c:\windows\system32\NvCpl.dll,NvStartup
mRun: [SigmatelSysTrayApp] "stsystra.exe"
mRun: [IAAnotif] "c:\program files\intel\intel matrix storage manager\Iaanotif.exe"
mRun: [DMXLauncher] "c:\program files\dell\media experience\DMXLauncher.exe"
mRun: [RoxioDragToDisc] "c:\program files\roxio\drag-to-disc\DrgToDsc.exe"
mRun: [IntelliPoint] "c:\program files\microsoft intellipoint\point32.exe"
mRun: [PaperPort PTD] "c:\program files\scansoft\paperport\pptd40nt.exe"
mRun: [IndexSearch] "c:\program files\scansoft\paperport\IndexSearch.exe"
mRun: [SetIcon] "\Program Files\WDC\SetIcon.exe"
mRun: [SunJavaUpdateSched] "c:\program files\common files\java\java update\jusched.exe"
mRun: [Monitor] "c:\program files\leapfrog\leapfrog connect\Monitor.exe"
mRun: [<NO NAME>]
mRun: [RoxWatchTray] "c:\program files\common files\roxio shared\9.0\sharedcom\RoxWatchTray9.exe"
mRun: [iTunesHelper] "c:\program files\itunes\iTunesHelper.exe"
mRun: [QuickTime Task] "c:\program files\quicktime\qttask.exe" -atboottime
mRun: [Adobe Reader Speed Launcher] "c:\program files\adobe\reader 8.0\reader\Reader_sl.exe"
mRun: [Adobe ARM] "c:\program files\common files\adobe\arm\1.0\AdobeARM.exe"
mRun: [SpySweeper] "c:\program files\webroot\webrootsecurity\SpySweeperUI.exe" /startintray
StartupFolder: c:\docume~1\rob\startm~1\programs\startup\buffal~1.lnk - c:\program files\buffalo\nasnavi\NasNavi.exe
StartupFolder: c:\docume~1\rob\startm~1\programs\startup\memeoa~1.lnk - c:\docume~1\rob\applic~1\microsoft\installer\{bd1f8143-c678-43cd-a296-a3a32a8c2976}\NewShortcut4_51A847D327C24F7797772AF2A4E486ED.exe
StartupFolder: c:\docume~1\rob\startm~1\programs\startup\nassch~1.lnk - c:\program files\buffalo\nasnavi\nassche.exe
StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\blueto~1.lnk - c:\program files\widcomm\bluetooth software\BTTray.exe
StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\deskto~1.lnk - c:\program files\research in motion\blackberry\DesktopMgr.exe
StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\digita~1.lnk - c:\program files\digital line detect\DLG.exe
StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\nkbmon~1.lnk - c:\program files\nikon\pictureproject\NkbMonitor.exe
uPolicies-explorer: NoThemesTab = 0 (0x0)
uPolicies-system: EnableProfileQuota = 1 (0x1)
uPolicies-system: NoColorChoice = 0 (0x0)
uPolicies-system: NoSizeChoice = 0 (0x0)
IE: Google Sidewiki... - c:\program files\google\google toolbar\component\GoogleToolbarDynamic_mui_en_A54B7D6FB1DA63EA.dll/cmsidewiki.html
IE: {CCA281CA-C863-46ef-9331-5C8D4460577F} - c:\program files\widcomm\bluetooth software\btsendto_ie.htm
IE: {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe
IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe
IE: {77BF5300-1474-4EC7-9980-D32B190E9B07} - {77BF5300-1474-4EC7-9980-D32B190E9B07} - c:\program files\skype\toolbars\internet explorer\SkypeIEPlugin.dll
IE: {92780B25-18CC-41C8-B9BE-3C9C571A8263} - {FF059E31-CC5A-4E2E-BF3B-96E929D65503} - c:\progra~1\micros~4\office11\REFIEBAR.DLL
Trusted Zone: internet
Trusted Zone: mcafee.com
DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} - hxxp://www.update.microsoft.com/microsoftupdate/v6/V5Controls/en/x86/client/muweb_site.cab?1263829666265
DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_20-windows-i586.cab
DPF: {CAFEEFAC-0015-0000-0006-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.5.0/jinstall-1_5_0_06-windows-i586.cab
DPF: {CAFEEFAC-0016-0000-0020-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_20-windows-i586.cab
DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_20-windows-i586.cab
DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} - hxxp://fpdownload.macromedia.com/pub/shockwave/cabs/flash/swflash.cab
Handler: dssrequest - {5513F07E-936B-4E52-9B00-067394E91CC5} - c:\progra~1\mcafee\sitead~1\McIEPlg.dll
Handler: sacore - {5513F07E-936B-4E52-9B00-067394E91CC5} - c:\progra~1\mcafee\sitead~1\McIEPlg.dll
Handler: skype4com - {FFC8B962-9B40-4DFF-9458-1830C7DD7F5D} - c:\progra~1\common~1\skype\SKYPE4~1.DLL
LSA: Notification Packages = scecli iowpre.dll

============= SERVICES / DRIVERS ===============

R0 ssfs0bbc;ssfs0bbc;c:\windows\system32\drivers\ssfs0bbc.sys [2009-4-21 29808]
R0 szkg5;szkg5;c:\windows\system32\drivers\SZKG.sys [2009-12-7 61328]
R0 szkgfs;szkgfs;c:\windows\system32\drivers\SZKGFS.sys [2010-2-24 173328]
R1 mfehidk;McAfee Inc. mfehidk;c:\windows\system32\drivers\mfehidk.sys [2008-3-23 214664]
R2 McAfee SiteAdvisor Service;McAfee SiteAdvisor Service;c:\program files\mcafee\siteadvisor\McSACore.exe [2009-9-4 93320]
R2 McProxy;McAfee Proxy Service;c:\progra~1\common~1\mcafee\mcproxy\mcproxy.exe [2008-3-23 359952]
R2 McShield;McAfee Real-time Scanner;c:\progra~1\mcafee\viruss~1\mcshield.exe [2008-3-23 144704]
R2 WebrootSpySweeperService;Webroot Spy Sweeper Engine;c:\program files\webroot\webrootsecurity\SpySweeper.exe [2009-11-6 4048240]
R2 WRConsumerService;Webroot Client Service;c:\program files\webroot\webrootsecurity\WRConsumerService.exe [2009-9-4 1201640]
R2 wwEngineSvc;Window Washer Engine;c:\program files\webroot\washer\WasherSvc.exe [2007-10-5 598856]
R3 McSysmon;McAfee SystemGuards;c:\progra~1\mcafee\viruss~1\mcsysmon.exe [2008-3-23 606736]
R3 mfeavfk;McAfee Inc. mfeavfk;c:\windows\system32\drivers\mfeavfk.sys [2008-3-23 79816]
R3 mfebopk;McAfee Inc. mfebopk;c:\windows\system32\drivers\mfebopk.sys [2008-3-23 35272]
R3 mfesmfk;McAfee Inc. mfesmfk;c:\windows\system32\drivers\mfesmfk.sys [2008-3-23 40552]
S0 is3srv;is3srv;c:\windows\system32\drivers\is3srv.sys [2009-12-7 61328]
S3 mferkdk;McAfee Inc. mferkdk;c:\windows\system32\drivers\mferkdk.sys [2008-3-23 34248]
S3 Si670m;WayTech Bluetooth USB Filter Driver;c:\windows\system32\drivers\Si670m.sys [2007-9-30 13312]
S4 Viewpoint Manager Service;Viewpoint Manager Service;c:\program files\viewpoint\common\ViewpointService.exe [2008-3-24 24652]

=============== Created Last 30 ================


==================== Find3M ====================


============= FINISH: 21:44:31.84 ===============

Here is part of my Stopzilla log

Block/Extraction Registry enforcer 2010-05-31 21:59:14 Extracted registry key hklm\software\microsoft\windows nt\currentversion\image file execution options\netfx64[2].exe
Block/Extraction Registry enforcer 2010-05-31 21:59:14 Extracted registry key hklm\software\microsoft\windows nt\currentversion\image file execution options\netfx64[1].exe
Block/Extraction Registry enforcer 2010-05-31 21:59:14 Extracted registry key hklm\software\microsoft\windows nt\currentversion\image file execution options\netfx64.exe
Block/Extraction Registry enforcer 2010-05-31 21:59:14 Extracted registry key hklm\software\microsoft\windows nt\currentversion\image file execution options\netfx35_x86[2].exe
Block/Extraction Registry enforcer 2010-05-31 21:59:14 Extracted registry key hklm\software\microsoft\windows nt\currentversion\image file execution options\netfx35_x86[1].exe
Block/Extraction Registry enforcer 2010-05-31 21:59:14 Extracted registry key hklm\software\microsoft\windows nt\currentversion\image file execution options\netfx35_x86.exe
Block/Extraction Registry enforcer 2010-05-31 21:59:14 Extracted registry key hklm\software\microsoft\windows nt\currentversion\image file execution options\netfx35_x64[2].exe
Block/Extraction Registry enforcer 2010-05-31 21:59:14 Extracted registry key hklm\software\microsoft\windows nt\currentversion\image file execution options\netfx35_x64[1].exe
Block/Extraction Registry enforcer 2010-05-31 21:59:14 Extracted registry key hklm\software\microsoft\windows nt\currentversion\image file execution options\netfx35_x64.exe
Block/Extraction Registry enforcer 2010-05-31 21:59:13 Extracted registry key hklm\software\microsoft\windows nt\currentversion\image file execution options\netfx35_ia64[2].exe
Block/Extraction Registry enforcer 2010-05-31 21:59:13 Extracted registry key hklm\software\microsoft\windows nt\currentversion\image file execution options\netfx35_ia64[1].exe
Block/Extraction Registry enforcer 2010-05-31 21:59:13 Extracted registry key hklm\software\microsoft\windows nt\currentversion\image file execution options\netfx35_ia64.exe
Block/Extraction Registry enforcer 2010-05-31 21:59:13 Extracted registry key hklm\software\microsoft\windows nt\currentversion\image file execution options\netfx30sp1_x86[2].exe
Block/Extraction Registry enforcer 2010-05-31 21:59:13 Extracted registry key hklm\software\microsoft\windows nt\currentversion\image file execution options\netfx30sp1_x86[1].exe
Block/Extraction Registry enforcer 2010-05-31 21:59:13 Extracted registry key hklm\software\microsoft\windows nt\currentversion\image file execution options\netfx30sp1_x86.exe
Block/Extraction Registry enforcer 2010-05-31 21:59:13 Extracted registry key hklm\software\microsoft\windows nt\currentversion\image file execution options\netfx30sp1_x64[2].exe
Block/Extraction Registry enforcer 2010-05-31 21:59:13 Extracted registry key hklm\software\microsoft\windows nt\currentversion\image file execution options\netfx30sp1_x64[1].exe
Block/Extraction Registry enforcer 2010-05-31 21:59:13 Extracted registry key hklm\software\microsoft\windows nt\currentversion\image file execution options\netfx30sp1_x64.exe
Block/Extraction Registry enforcer 2010-05-31 21:59:13 Extracted registry key hklm\software\microsoft\windows nt\currentversion\image file execution options\netfx20sp2_x86[2].exe
Block/Extraction Registry enforcer 2010-05-31 21:59:13 Extracted registry key hklm\software\microsoft\windows nt\currentversion\image file execution options\netfx20sp2_x86[1].exe
Block/Extraction Registry enforcer 2010-05-31 21:59:13 Extracted registry key hklm\software\microsoft\windows nt\currentversion\image file execution options\netfx20sp2_x86.exe
Block/Extraction Registry enforcer 2010-05-31 21:59:13 Extracted registry key hklm\software\microsoft\windows nt\currentversion\image file execution options\netfx20sp2_x64[2].exe
Block/Extraction Registry enforcer 2010-05-31 21:59:13 Extracted registry key hklm\software\microsoft\windows nt\currentversion\image file execution options\netfx20sp2_x64[1].exe
Block/Extraction Registry enforcer 2010-05-31 21:59:13 Extracted registry key hklm\software\microsoft\windows nt\currentversion\image file execution options\netfx20sp2_x64.exe
Block/Extraction Registry enforcer 2010-05-31 21:59:13 Extracted registry key hklm\software\microsoft\windows nt\currentversion\image file execution options\netfx20sp2_ia64[2].exe
Block/Extraction Registry enforcer 2010-05-31 21:59:13 Extracted registry key hklm\software\microsoft\windows nt\currentversion\image file execution options\netfx20sp2_ia64[1].exe
Block/Extraction Registry enforcer 2010-05-31 21:59:13 Extracted registry key hklm\software\microsoft\windows nt\currentversion\image file execution options\netfx20sp2_ia64.exe
Block/Extraction Registry enforcer 2010-05-31 21:59:13 Extracted registry key hklm\software\microsoft\windows nt\currentversion\image file execution options\netfx20sp1_x86[2].exe
Block/Extraction Registry enforcer 2010-05-31 21:59:13 Extracted registry key hklm\software\microsoft\windows nt\currentversion\image file execution options\netfx20sp1_x86[1].exe
Block/Extraction Registry enforcer 2010-05-31 21:59:13 Extracted registry key hklm\software\microsoft\windows nt\currentversion\image file execution options\netfx20sp1_x86.exe
Block/Extraction Registry enforcer 2010-05-31 21:59:13 Extracted registry key hklm\software\microsoft\windows nt\currentversion\image file execution options\netfx20sp1_x64[2].exe
Block/Extraction Registry enforcer 2010-05-31 21:59:13 Extracted registry key hklm\software\microsoft\windows nt\currentversion\image file execution options\netfx20sp1_x64[1].exe
Block/Extraction Registry enforcer 2010-05-31 21:59:13 Extracted registry key hklm\software\microsoft\windows nt\currentversion\image file execution options\netfx20sp1_x64.exe
Block/Extraction Registry enforcer 2010-05-31 21:59:13 Extracted registry key hklm\software\microsoft\windows nt\currentversion\image file execution options\netfx20sp1_ia64[2].exe
Block/Extraction Registry enforcer 2010-05-31 21:59:13 Extracted registry key hklm\software\microsoft\windows nt\currentversion\image file execution options\netfx20sp1_ia64[1].exe
Block/Extraction Registry enforcer 2010-05-31 21:59:13 Extracted registry key hklm\software\microsoft\windows nt\currentversion\image file execution options\netfx20sp1_ia64.exe
Block/Extraction Registry enforcer 2010-05-31 21:59:13 Extracted registry key hklm\software\microsoft\windows nt\currentversion\image file execution options\dotnetfx[2].exe
Block/Extraction Registry enforcer 2010-05-31 21:59:13 Extracted registry key hklm\software\microsoft\windows nt\currentversion\image file execution options\dotnetfx[1].exe
Block/Extraction Registry enforcer 2010-05-31 21:59:13 Extracted registry key hklm\software\microsoft\windows nt\currentversion\image file execution options\dotnetfx3_x64[2].exe
Block/Extraction Registry enforcer 2010-05-31 21:59:12 Extracted registry key hklm\software\microsoft\windows nt\currentversion\image file execution options\dotnetfx3_x64[1].exe
Block/Extraction Registry enforcer 2010-05-31 21:59:12 Extracted registry key hklm\software\microsoft\windows nt\currentversion\image file execution options\dotnetfx3_x64.exe
Block/Extraction Registry enforcer 2010-05-31 21:59:12 Extracted registry key hklm\software\microsoft\windows nt\currentversion\image file execution options\dotnetfx3_ia64[2].exe
Block/Extraction Registry enforcer 2010-05-31 21:59:12 Extracted registry key hklm\software\microsoft\windows nt\currentversion\image file execution options\dotnetfx3_ia64[1].exe
Block/Extraction Registry enforcer 2010-05-31 21:59:12 Extracted registry key hklm\software\microsoft\windows nt\currentversion\image file execution options\dotnetfx3_ia64.exe
Block/Extraction Registry enforcer 2010-05-31 21:59:12 Extracted registry key hklm\software\microsoft\windows nt\currentversion\image file execution options\dotnetfx3[2].exe
Block/Extraction Registry enforcer 2010-05-31 21:59:12 Extracted registry key hklm\software\microsoft\windows nt\currentversion\image file execution options\dotnetfx3[1].exe
Block/Extraction Registry enforcer 2010-05-31 21:59:12 Extracted registry key hklm\software\microsoft\windows nt\currentversion\image file execution options\dotnetfx3setup[2].exe
Block/Extraction Registry enforcer 2010-05-31 21:59:12 Extracted registry key hklm\software\microsoft\windows nt\currentversion\image file execution options\dotnetfx3setup[1].exe
Block/Extraction Registry enforcer 2010-05-31 21:59:12 Extracted registry key hklm\software\microsoft\windows nt\currentversion\image file execution options\dotnetfx3setup.exe
Block/Extraction Registry enforcer 2010-05-31 21:59:12 Extracted registry key hklm\software\microsoft\windows nt\currentversion\image file execution options\dotnetfx35[2].exe
Block/Extraction Registry enforcer 2010-05-31 21:59:12 Extracted registry key hklm\software\microsoft\windows nt\currentversion\image file execution options\dotnetfx35[1].exe
Block/Extraction Registry enforcer 2010-05-31 21:59:12 Extracted registry key hklm\software\microsoft\windows nt\currentversion\image file execution options\dotnetfx35setup[2].exe
Block/Extraction Registry enforcer 2010-05-31 21:59:12 Extracted registry key hklm\software\microsoft\windows nt\currentversion\image file execution options\dotnetfx35setup[1].exe
Block/Extraction Registry enforcer 2010-05-31 21:59:12 Extracted registry key hklm\software\microsoft\windows nt\currentversion\image file execution options\dotnetfx35setup.exe
Block/Extraction Registry enforcer 2010-05-31 21:59:12 Extracted registry key hklm\software\microsoft\windows nt\currentversion\image file execution options\dotnetfx35.exe
Block/Extraction Registry enforcer 2010-05-31 21:59:12 Extracted registry key hklm\software\microsoft\windows nt\currentversion\image file execution options\dotnetfx30sp1setup[2].exe
Block/Extraction Registry enforcer 2010-05-31 21:59:12 Extracted registry key hklm\software\microsoft\windows nt\currentversion\image file execution options\dotnetfx30sp1setup[1].exe
Block/Extraction Registry enforcer 2010-05-31 21:59:12 Extracted registry key hklm\software\microsoft\windows nt\currentversion\image file execution options\dotnetfx30sp1setup.exe
Block/Extraction Registry enforcer 2010-05-31 21:59:12 Extracted registry key hklm\software\microsoft\windows nt\currentversion\image file execution options\dotnetfx3.exe
Block/Extraction Registry enforcer 2010-05-31 21:59:12 Extracted registry key hklm\software\microsoft\windows nt\currentversion\image file execution options\dotnetfx.exe
Block/Extraction Registry enforcer 2010-05-31 21:59:12 Extracted registry key hklm\software\microsoft\windows nt\currentversion\image file execution options\dotnet3[2].exe
Block/Extraction Registry enforcer 2010-05-31 21:59:12 Extracted registry key hklm\software\microsoft\windows nt\currentversion\image file execution options\dotnet3[1].exe
Block/Extraction Registry enforcer 2010-05-31 21:59:12 Extracted registry key hklm\software\microsoft\windows nt\currentversion\image file execution options\dotnet3.exe
Information Home page protection 2010-05-31 21:58:21 Checking homepage... OK
Block/Extraction NT Service enforcer 2010-05-31 21:58:14 Disabled service: messenger -
Block/Extraction NT Service enforcer 2010-05-31 21:58:01 Disabled service: messenger -
Information Internet ExplorerSiteguard 2010-05-31 21:57:58 Inspecting registered Internet Explorer toolbars
Information Registry enforcer 2010-05-31 21:57:58 Inspecting registered Explorer bars
Block/Extraction Registry enforcer 2010-05-31 21:57:58 Deleting WinLogon registry
Information Registry enforcer 2010-05-31 21:57:55 Inspecting WinLogon notification handlers and modules loaded by WinLogon
Information Registry enforcer 2010-05-31 21:57:54 Inspecting WinSock registry (LSP Chain)
Information Registry enforcer 2010-05-31 21:57:54 Inspecting registered Browser Helper Objects (BHOs)
Block/Extraction NT Service enforcer 2010-05-31 21:57:52 Disabled service: messenger -
Information Process enforcer 2010-05-31 21:57:47 Starting process watcher
Block/Extraction NT Service enforcer 2010-05-31 21:51:36 Disabled service: messenger -
Block/Extraction NT Service enforcer 2010-05-31 21:51:36 Disabled service: messenger -
Block/Extraction NT Service enforcer 2010-05-31 21:50:03 Disabled service: messenger -
Block/Extraction NT Service enforcer 2010-05-31 21:50:03 Disabled service: messenger -
Block/Extraction NT Service enforcer 2010-05-31 21:47:31 Disabled service: messenger -
Block/Extraction NT Service enforcer 2010-05-31 21:47:31 Disabled service: messenger -
Block/Extraction NT Service enforcer 2010-05-31 21:46:52 Disabled service: messenger -
Block/Extraction NT Service enforcer 2010-05-31 21:46:52 Disabled service: messenger -
Block/Extraction File enforcer 2010-05-31 21:44:20 Deleted file: c:\documents and settings\rob\local settings\temp\c3.tmp\evp.exe
Block/Extraction Process enforcer 2010-05-31 21:44:20 Terminated process: (5328) c:\documents and settings\rob\local settings\temp\c3.tmp\evp.exe
Block/Extraction Process enforcer 2010-05-31 21:44:20 Terminated process: (5316) c:\documents and settings\rob\local settings\temp\c3.tmp\evp.exe
Block/Extraction Process enforcer 2010-05-31 21:44:20 Terminated process: (4272) c:\documents and settings\rob\local settings\temp\c3.tmp\evp.exe
Block/Extraction File enforcer 2010-05-31 21:44:19 Quarantined file: c:\documents and settings\rob\local settings\temp\c3.tmp\evp.exe
Information General 2010-05-31 21:41:43 Started system scan.
Block/Extraction NT Service enforcer 2010-05-31 21:40:01 Disabled service: messenger -
Information Home page protection 2010-05-31 21:39:52 Checking homepage... OK
Block/Extraction NT Service enforcer 2010-05-31 21:39:51 Disabled service: messenger -
Block/Extraction Registry enforcer 2010-05-31 21:39:48 Deleting WinLogon registry
Information Internet ExplorerSiteguard 2010-05-31 21:39:48 Inspecting registered Internet Explorer toolbars
Information Registry enforcer 2010-05-31 21:39:48 Inspecting registered Explorer bars
Information Registry enforcer 2010-05-31 21:39:46 Inspecting WinLogon notification handlers and modules loaded by WinLogon
Information Registry enforcer 2010-05-31 21:39:43 Inspecting WinSock registry (LSP Chain)
Information Registry enforcer 2010-05-31 21:39:43 Inspecting registered Browser Helper Objects (BHOs)
Block/Extraction NT Service enforcer 2010-05-31 21:39:39 Disabled service: messenger -
Information Process enforcer 2010-05-31 21:39:38 Starting process watcher

Attached Files



BC AdBot (Login to Remove)

 


#2 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:11:53 PM

Posted 04 June 2010 - 09:12 PM

Hi,

Welcome to Bleeping Computer. My name is m0le and I will be helping you with your log.
  • Please subscribe to this topic, if you haven't already. You can subscribe by clicking the Options box to the right of your topic title and selecting Track This Topic.

  • Please avoid installing/uninstalling or updating any programs and attempting any unsupervised fixes or scans. This can make helping you impossible.

  • Please reply to this post so I know you are there.
The forum is busy and we need to have replies as soon as possible. If I haven't had a reply after 3 days I will bump the topic and if you do not reply by the following day after that then I will close the topic.

Once I receive a reply then I will return with your first instructions.

Thanks thumbup2.gif
Posted Image
m0le is a proud member of UNITE

#3 Bcfuser

Bcfuser
  • Topic Starter

  • Members
  • 10 posts
  • OFFLINE
  •  
  • Local time:07:53 PM

Posted 05 June 2010 - 11:03 AM

I'm ready for your help. Thanks!

#4 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:11:53 PM

Posted 05 June 2010 - 11:54 AM

There's not much in the logs so far so please download and run the two programs below.

Please download Malwarebytes Anti-Malware and save it to your desktop.
  • Make sure you are connected to the Internet.
  • Double-click on mbam-setup.exe to install the application or, if you are using Vista, right-click and select Run As Administrator on mbam-setup.exe to install the application.
  • When the installation begins, follow the prompts and do not make any changes to default settings.
  • When installation has finished, make sure you leave both of these checked:
    • Update Malwarebytes' Anti-Malware
    • Launch Malwarebytes' Anti-Malware
  • Then click Finish.
  • MBAM will automatically start and you will be asked to update the program before performing a scan. If an update is found, the program will automatically update itself. Press the OK button to close that box and continue. If you encounter any problems while downloading the updates, manually download them from here and just double-click on mbam-rules.exe to install.
  • On the Scanner tab:
    • Make sure the "Perform Full Scan" option is selected.
    • Then click on the Scan button.
  • If asked to select the drives to scan, leave all the drives selected and click on the Start Scan button.
  • The scan will begin and "Scan in progress" will show at the top. It may take some time to complete so please be patient.
  • When the scan is finished, a message box will say "The scan completed successfully. Click 'Show Results' to display all objects found".
  • Click OK to close the message box and continue with the removal process.
  • Back at the main Scanner screen, click on the Show Results button to see a list of any malware that was found.
  • Make sure that everything is checked, and click Remove Selected.
  • When removal is completed, a log report will open in Notepad.
  • The log is automatically saved and can be viewed by clicking the Logs tab in MBAM.
  • Copy and paste the contents of that report in your next reply and exit MBAM.
Note: If MBAM encounters a file that is difficult to remove, you may be asked to reboot your computer so it can proceed with the disinfection process. Regardless if prompted to restart the computer or not, please do so immediately. Failure to reboot normally (not into safe mode) will prevent MBAM from removing all the malware. MBAM may make changes to your registry as part of its disinfection routine. If you're using other security programs that detect registry changes, they may alert you after scanning with MBAM. Please permit the program to allow the changes.


And

Download and scan with SUPERAntiSpyware Free for Home Users
  • Double-click SUPERAntiSpyware.exe and use the default settings for installation.
  • An icon will be created on your desktop. Double-click that icon to launch the program.
  • If asked to update the program definitions, click "Yes". If not, update the definitions before scanning by selecting "Check for Updates". (If you encounter any problems while downloading the updates, manually download them from here. Double-click on the hyperlink for Download Installer and save SASDEFINITIONS.EXE to your desktop. Then double-click on SASDEFINITIONS.EXE to install the definitions.)
  • In the Main Menu, click the Preferences... button.
  • Click the Scanning Control tab.
  • Under Scanner Options make sure the following are checked (leave all others unchecked):
    • Close browsers before scanning.
    • Scan for tracking cookies.
    • Terminate memory threats before quarantining.
  • Click the "Close" button to leave the control center screen.
  • Back on the main screen, under "Scan for Harmful Software" click Scan your computer.
  • On the left, make sure you check C:\Fixed Drive.
  • On the right, under "Complete Scan", choose Perform Complete Scan.
  • Click "Next" to start the scan. Please be patient while it scans your computer.
  • After the scan is complete, a Scan Summary box will appear with potentially harmful items that were detected. Click "OK".
  • Make sure everything has a checkmark next to it and click "Next".
  • A notification will appear that "Quarantine and Removal is Complete". Click "OK" and then click the "Finish" button to return to the main menu.
  • If asked if you want to reboot, click "Yes".
  • To retrieve the removal information after reboot, launch SUPERAntispyware again.
    • Click Preferences, then click the Statistics/Logs tab.
    • Under Scanner Logs, double-click SUPERAntiSpyware Scan Log.
    • If there are several logs, click the current dated log and press View log. A text file will open in your default text editor.
    • Please copy and paste the Scan Log results in your next reply.
  • Click Close to exit the program.

Posted Image
m0le is a proud member of UNITE

#5 Bcfuser

Bcfuser
  • Topic Starter

  • Members
  • 10 posts
  • OFFLINE
  •  
  • Local time:07:53 PM

Posted 05 June 2010 - 01:36 PM

I'm having a little trouble getting the computer in question connected to the internet to download and run superantispyware. Please bear with me. Thanks

#6 Bcfuser

Bcfuser
  • Topic Starter

  • Members
  • 10 posts
  • OFFLINE
  •  
  • Local time:07:53 PM

Posted 05 June 2010 - 02:46 PM

Here are the scan files you requested thanks!

Attached Files



#7 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:11:53 PM

Posted 05 June 2010 - 06:11 PM

A malicious temp file showing up but nothing apparently created it. I don't buy it.

Please download ComboFix from one of these locations:* IMPORTANT !!! Save ComboFix.exe to your Desktop making sure you rename it comfix.exe
  • Disable your AntiVirus and AntiSpyware applications, usually via a right click on the System Tray icon. They may otherwise interfere with our tools. (Click on this link to see a list of programs that should be disabled. The list is not all inclusive.)
  • Double click on Comfix.exe & follow the prompts.
  • As part of it's process, ComboFix will check to see if the Microsoft Windows Recovery Console is installed. With malware infections being as they are today, it's strongly recommended to have this pre-installed on your machine before doing any malware removal. It will allow you to boot up into a special recovery/repair mode that will allow us to more easily help you should your computer have a problem after an attempted removal of malware.
  • Follow the prompts to allow ComboFix to download and install the Microsoft Windows Recovery Console, and when prompted, agree to the End-User License Agreement to install the Microsoft Windows Recovery Console.
**Please note: If the Microsoft Windows Recovery Console is already installed, ComboFix will continue it's malware removal procedures.



Once the Microsoft Windows Recovery Console is installed using ComboFix, you should see the following message:



Click on Yes, to continue scanning for malware.

When finished, it shall produce a log for you. Please include the C:\ComboFix.txt in your next reply.
Posted Image
m0le is a proud member of UNITE

#8 Bcfuser

Bcfuser
  • Topic Starter

  • Members
  • 10 posts
  • OFFLINE
  •  
  • Local time:07:53 PM

Posted 05 June 2010 - 08:19 PM

Here is the log...is catchme.exe ok? It pops up as malware now on reboot in stopzilla.

Attached Files



#9 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:11:53 PM

Posted 05 June 2010 - 08:52 PM

QUOTE
is catchme.exe ok? It pops up as malware now on reboot in stopzilla.


It is indeed. Part of Combofix and absolutely fine. Another reason not to recommend StopZilla.. tongue.gif

Let's rerun Combofix to clear up a few things

1. Close any open browsers.

2. Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.

3. Open notepad and copy/paste the text in the quotebox below into it:

QUOTE
File::
c:\windows\Hnavubemobeli.dat
c:\program files\qcmjilpb.txt


Save this as CFScript.txt, in the same location as Comfix.exe (called ComboFix.exe in the below graphic)




Refering to the picture above, drag CFScript into ComboFix.exe

When finished, it shall produce a log for you at C:\ComboFix.txt which I will require in your next reply.
Posted Image
m0le is a proud member of UNITE

#10 Bcfuser

Bcfuser
  • Topic Starter

  • Members
  • 10 posts
  • OFFLINE
  •  
  • Local time:07:53 PM

Posted 06 June 2010 - 08:32 AM

Here is the latest combofix log (combofix2.exe). Thanks!

Attached Files



#11 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:11:53 PM

Posted 06 June 2010 - 05:22 PM

Yeah, that looks fine. smile.gif

Please run ESET next to check for remnants

I'd like us to scan your machine with ESET OnlineScan
  1. Hold down Control and click on the following link to open ESET OnlineScan in a new window.
    ESET OnlineScan
  2. Click the button.
  3. For alternate browsers only: (Microsoft Internet Explorer users can skip these steps)
    1. Click on to download the ESET Smart Installer. Save it to your desktop.
    2. Double click on the icon on your desktop.
  4. Check
  5. Click the button.
  6. Accept any security warnings from your browser.
  7. Leave the top box checked and then check
  8. Push the Start button.
  9. ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this can take some time.
  10. When the scan completes, push
  11. Push , and save the file to your desktop using a unique name, such as ESETScan. Include the contents of this report in your next reply.
  12. Push the button.
  13. Push
NOTE: If no malware is found then no log will be produced. Let me know if this is the case.
Posted Image
m0le is a proud member of UNITE

#12 Bcfuser

Bcfuser
  • Topic Starter

  • Members
  • 10 posts
  • OFFLINE
  •  
  • Local time:07:53 PM

Posted 06 June 2010 - 09:40 PM

So I ran ESET and it came up clean! thumbup2.gif If everything is all good, can I just assume that Stopzill is just giving me a whole bunch of false positives for the "dotnet" and "netfx" files?

#13 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:11:53 PM

Posted 07 June 2010 - 12:18 PM

Yes, we can safely say that these are false positives.

From my point of view the PC looks good, how is it running?
Posted Image
m0le is a proud member of UNITE

#14 Bcfuser

Bcfuser
  • Topic Starter

  • Members
  • 10 posts
  • OFFLINE
  •  
  • Local time:07:53 PM

Posted 07 June 2010 - 12:30 PM

It's running ok. Startup is slow between mcafee and stopzilla. I'll probably uninstall stopzilla and use soemthing else. I booted the machine up this morning and Stopzilla went crazy with all of the files from combofix and GMER.

#15 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:11:53 PM

Posted 07 June 2010 - 01:36 PM

I always recommend the uninstallation of StopZilla.

You're clean. Good stuff! thumbup2.gif

Let's do some clearing up

Uninstall ComboFix

Remove Combofix now that we're done with it.
  • Please press the Windows Key and R on your keyboard. This will bring up the Run... command.
    (For Vista/Windows 7 please click Start -> All Programs -> Accessories -> Run)
  • Now type in Combofix /Uninstall in the runbox and click OK. (Notice the space between "Combofix" and "/")
  • Please follow the prompts to uninstall Combofix.
  • You will then receive a message saying Combofix was uninstalled successfully once it's done uninstalling itself.
This will uninstall Combofix and anything associated with it.


Download and Run OTC

We will now remove the tools we used during this fix using OTC.
  • Download OTC by OldTimer and save it to your desktop.
  • Double click icon to start the program. If you are using Vista, please right-click and choose run as administrator
  • Then Click the big button.
  • You will get a prompt saying "Being Cleanup Process". Please select Yes.
  • Restart your computer when prompted.
------------------------------------------------------------------------------------------------------------------------

Here's some advice on how you can keep your PC clean


Use and update your AntiVirus Software

You must have a good antivirus. There are plenty to choose from but I personally recommend the free options of Avast and Avira Antivir. If you want to purchase a security program then I recommend any of the following: AVG, Norton, McAfee, Kaspersky and ESET Nod32.

It is imperative that you update your Antivirus software at least once a week (Even more if you wish). If you do not update your antivirus software then it will not be able to catch any of the new variants that may come out. If you use a commercial antivirus program you must make sure you keep renewing your subscription. Otherwise, once your subscription runs out, you may not be able to update the programs virus definitions.


Make sure your applications have all of their updates

It is also possible for other programs on your computer to have security vulnerability that can allow malware to infect you. Therefore, it is also a good idea to check for the latest versions of commonly installed applications that are regularly patched to fix vulnerabilities. You can check these by visiting Secunia Software Inspector and Calendar of Updates.


Install an AntiSpyware Program

A highly recommended AntiSpyware program is SuperAntiSpyware. You can download the free Home Version. or the Pro version for a 15 day trial period.

Installing this or another recommended program will provide spyware & hijacker protection on your computer alongside your virus protection. You should scan your computer with an AntiSpyware program on a regular basis just as you would an antivirus software.


Finally, here's a treasure trove of antivirus, antimalware and antispyware resources


That's it Bcfuser, happy surfing!

Cheers.

m0le
Posted Image
m0le is a proud member of UNITE




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users