Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Searches redirected and programs can not open


  • Please log in to reply
12 replies to this topic

#1 DAC1357

DAC1357

  • Members
  • 7 posts
  • OFFLINE
  •  
  • Local time:04:18 PM

Posted 24 August 2010 - 02:20 PM

Anytime I try to open even the simplest programs, I am given the following prompt:
Choose the program you want to open to use to open this file:
File:

I can not open most programs, including .exe files such as malwarebytes, and fortunately I can still open internet explorer.

Another problem I have been having is the redirections when I click on a link in Yahoos search. This happens approximately 75% of the time. I have been redirected to numerous different websites advertising their products.

I have no idea what to do and I would really appreciate your help!

BC AdBot (Login to Remove)

 


#2 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,490 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:07:18 PM

Posted 24 August 2010 - 03:53 PM

Hello and welcome!!
If XP
Go here to Doug KNox's Windows® XP File Association Fixes
Run 9th down on left... EXE File Association Fix ... the EXE not EML one.



FOR VISTA
Go to File association fixes for Windows Vista

Click the exe box
Instructions:
To fix the association for a particular file type, download the corresponding fix from the above links table (Use Right-click - Save as option in your browser to download the fixes). Unzip the fix and extract the .REG file to the Desktop. Right-click the REG file and choose Merge. Note that you need to be an administrator to apply these fixes.



Next run MBAM (MalwareBytes):

Please download Malwarebytes Anti-Malware (v1.46) and save it to your desktop.
Before you save it rename it to say zztoy.exe


alternate download link 1
alternate download link 2
MBAM may "make changes to your registry" as part of its disinfection routine. If using other security programs that detect registry changes (ie Spybot's Teatimer), they may interfere or alert you. Temporarily disable such programs or permit them to allow the changes.
  • Make sure you are connected to the Internet.
  • Double-click on mbam-setup.exe to install the application.
  • When the installation begins, follow the prompts and do not make any changes to default settings.
  • When installation has finished, make sure you leave both of these checked:
    • Update Malwarebytes' Anti-Malware
    • Launch Malwarebytes' Anti-Malware
  • Then click Finish.
MBAM will automatically start and you will be asked to update the program before performing a scan.
  • If an update is found, the program will automatically update itself. Press the OK button to close that box and continue.
  • If you encounter any problems while downloading the definition updates, manually download them from here and just double-click on mbam-rules.exe to install.
On the Scanner tab:
  • Make sure the "Perform Quick Scan" option is selected.
  • Then click on the Scan button.
  • If asked to select the drives to scan, leave all the drives selected and click on the Start Scan button.
  • The scan will begin and "Scan in progress" will show at the top. It may take some time to complete so please be patient.
  • When the scan is finished, a message box will say "The scan completed successfully. Click 'Show Results' to display all objects found".
  • Click OK to close the message box and continue with the removal process.
Back at the main Scanner screen:
  • Click on the Show Results button to see a list of any malware that was found.
  • Make sure that everything is checked, and click Remove Selected.
  • When removal is completed, a log report will open in Notepad.
  • The log is automatically saved and can be viewed by clicking the Logs tab in MBAM.
  • Copy and paste the contents of that report in your next reply. Be sure to post the complete log to include the top portion which shows MBAM's database version and your operating system.
  • Exit MBAM when done.
Note: If MBAM encounters a file that is difficult to remove, you will be asked to reboot your computer so MBAM can proceed with the disinfection process. If asked to restart the computer, please do so immediately. Failure to reboot normally (not into safe mode) will prevent MBAM from removing all the malware.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#3 DAC1357

DAC1357
  • Topic Starter

  • Members
  • 7 posts
  • OFFLINE
  •  
  • Local time:04:18 PM

Posted 25 August 2010 - 08:09 PM

Sorry for this late response but I was having problems with Malwarebytes yesterday and partly today....
It kept freezing so I thought the best action was to delete the four infected files found, I deleted them and then restarted the scan so now I have 2 log files.
Also I would like to think you for allowing me access to my programs once again with the .exe fix:)

Malwarebytes' Anti-Malware 1.46
www.malwarebytes.org

Database version: 4472

Windows 5.1.2600 Service Pack 3
Internet Explorer 7.0.5730.13

8/25/2010 4:21:53 PM
mbam-log-2010-08-25 (16-21-53).txt

Scan type: Quick scan
Objects scanned: 19950
Time elapsed: 9 minute(s), 30 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 1
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 3

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
C:\Documents and Settings\David\Local Settings\Application Data\Windows Server\bvlblk.dll (Spyware.Passwords) -> Delete on reboot.

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
C:\Documents and Settings\David\Local Settings\Application Data\Windows Server\bvlblk.dll (Spyware.Passwords) -> Delete on reboot.
C:\Documents and Settings\David\Local Settings\Temp\96.tmp (Backdoor.Bot) -> Quarantined and deleted successfully.
C:\Documents and Settings\David\Local Settings\Temp\97.tmp (Backdoor.Bot) -> Quarantined and deleted successfully.





Malwarebytes' Anti-Malware 1.46
www.malwarebytes.org

Database version: 4472

Windows 5.1.2600 Service Pack 3
Internet Explorer 7.0.5730.13

8/25/2010 5:54:24 PM
mbam-log-2010-08-25 (17-54-24).txt

Scan type: Quick scan
Objects scanned: 164044
Time elapsed: 38 minute(s), 38 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 3
Registry Data Items Infected: 3
Folders Infected: 0
Files Infected: 0

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
HKEY_CLASSES_ROOT\.exe\shell\open\command\(default) (Hijack.ExeFile) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\secfile\shell\open\command\(default) (Rogue.MultipleAV) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\AppCertDlls\appsecdll (Trojan.Agent) -> Quarantined and deleted successfully.

Registry Data Items Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\AntiVirusDisableNotify (Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\FirewallDisableNotify (Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\UpdatesDisableNotify (Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.

Folders Infected:
(No malicious items detected)

Files Infected:
(No malicious items detected)

#4 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,490 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:07:18 PM

Posted 25 August 2010 - 09:32 PM

Hello,you're welcome,first note is the first scan found a backdoor bot.
A backdoor Trojan can allow an attacker to
gain control of the system, log keystrokes, steal passwords, access personal
data, send malevolent outgoing traffic, and close the security warning
messages displayed by some anti-virus and security programs.

I would advise you to disconnect this PC from the Internet, and then go to
a known clean computer and change any passwords or security information held
on the infected computer. In particular, check whatever relates to online
banking financial transactions, shopping, credit cards, or sensitive
personal information. It is also wise to contact your financial institutions
to apprise them of your situation.


Next run ATF and SAS: If you cannot access Safe Mode,run in normal ,but let me know.

Note: On Vista, "Windows Temp" is disabled. To empty "Windows Temp" ATF-Cleaner must be "Run as an Administrator".

From your regular user account..
Download Attribune's ATF Cleaner and then SUPERAntiSpyware , Free Home Version. Save both to desktop ..
DO NOT run yet.
Open SUPER from icon and install and Update it
Under Scanner Options make sure the following are checked (leave all others unchecked):
Close browsers before scanning.
Scan for tracking cookies.
Terminate memory threats before quarantining
.
Click the "Close" button to leave the control center screen and exit the program. DO NOT run yet.

Now reboot into Safe Mode: How to enter safe mode(XP)
Using the F8 Method
Restart your computer.
When the machine first starts again it will generally list some equipment that is installed in your machine, amount of memory, hard drives installed etc. At this point you should gently tap the F8 key repeatedly until you are presented with a Windows XP Advanced Options menu.
Select the option for Safe Mode using the arrow keys.
Then press enter on your keyboard to boot into Safe Mode
.

Double-click ATF-Cleaner.exe to run the program.
Under Main "Select Files to Delete" choose: Select All.
Click the Empty Selected button.

If you use Firefox or Opera browser click that browser at the top and choose: Select All
Click the Empty Selected button.
If you would like to keep your saved passwords, please click No at the prompt.
Click Exit on the Main menu to close the program
.

NOW Scan with SUPER
Open from the desktop icon or the program Files list
On the left, make sure you check C:\Fixed Drive.
Perform a Complete scan. After scan,Verify they are all checked.
Click OK on the summary screen to quarantine all found items.
If asked if you want to reboot, click "Yes" and reboot normally.

To retrieve the removal information after reboot, launch SUPERAntispyware again.
Click Preferences, then click the Statistics/Logs tab.
Under Scanner Logs, double-click SUPERAntiSpyware Scan Log.
If there are several logs, click the current dated log and press View log.
A text file will open in your default text editor.
Please copy and paste the Scan Log results in your next reply.
Click Close to exit the program.


Now an online scan with ESET
  • Hold down Control and click on the following link to open ESET OnlineScan in a new window.
    ESET OnlineScan
  • Click the ESET Online Scanner button.
  • For alternate browsers only: (Microsoft Internet Explorer users can skip these steps)
    • Click on Export to text file... to download the ESET Smart Installer. Save it to your desktop.
    • Double click on the Eset Smart Installer icon on your desktop.
  • Check the "YES, I accept the Terms of Use"
  • Click the Start button.
  • Accept any security warnings from your browser.
  • Check Scan archives
  • Push the Start button.
  • ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this can take some time.
  • When the scan completes, push "List of found threats"
  • Push "Export to text file", and save the file to your desktop using a unique name, such as ESETScan. Include the contents of this report in your next reply.
  • Push the "<<Back" button.
  • Push Finish
In your next reply, please include the following:
  • Eset Scan Log


NOTE: In some instances if no malware is found there will be no log produced.

Please ask any needed questions,post logs and Let us know how the PC is running now.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#5 DAC1357

DAC1357
  • Topic Starter

  • Members
  • 7 posts
  • OFFLINE
  •  
  • Local time:04:18 PM

Posted 26 August 2010 - 10:29 AM

Thank you for the heads up!
I changed my passwords and called my CC to make sure everything was fine...so far it seems nothing has changed


Heres the SUPERAntiSpyware Scan Log:

SUPERAntiSpyware Scan Log
http://www.superantispyware.com

Generated 08/25/2010 at 10:09 PM

Application Version : 4.41.1000

Core Rules Database Version : 5407
Trace Rules Database Version: 3219

Scan type : Complete Scan
Total Scan Time : 01:11:17

Memory items scanned : 207
Memory threats detected : 0
Registry items scanned : 7249
Registry threats detected : 1
File items scanned : 20719
File threats detected : 124

System.BrokenFileAssociation
HKCR\.exe

Adware.Tracking Cookie
a.ads2.msads.net [ C:\Documents and Settings\David\Application Data\Macromedia\Flash Player\#SharedObjects\7YDT6WQT ]
ads2.msads.net [ C:\Documents and Settings\David\Application Data\Macromedia\Flash Player\#SharedObjects\7YDT6WQT ]
b.ads2.msads.net [ C:\Documents and Settings\David\Application Data\Macromedia\Flash Player\#SharedObjects\7YDT6WQT ]
cdn4.specificclick.net [ C:\Documents and Settings\David\Application Data\Macromedia\Flash Player\#SharedObjects\7YDT6WQT ]
core.insightexpressai.com [ C:\Documents and Settings\David\Application Data\Macromedia\Flash Player\#SharedObjects\7YDT6WQT ]
googleads.g.doubleclick.net [ C:\Documents and Settings\David\Application Data\Macromedia\Flash Player\#SharedObjects\7YDT6WQT ]
hs.interpolls.com [ C:\Documents and Settings\David\Application Data\Macromedia\Flash Player\#SharedObjects\7YDT6WQT ]
ia.media-imdb.com [ C:\Documents and Settings\David\Application Data\Macromedia\Flash Player\#SharedObjects\7YDT6WQT ]
interclick.com [ C:\Documents and Settings\David\Application Data\Macromedia\Flash Player\#SharedObjects\7YDT6WQT ]
m1.2mdn.net [ C:\Documents and Settings\David\Application Data\Macromedia\Flash Player\#SharedObjects\7YDT6WQT ]
macromedia.com [ C:\Documents and Settings\David\Application Data\Macromedia\Flash Player\#SharedObjects\7YDT6WQT ]
media-ti.pictela.net [ C:\Documents and Settings\David\Application Data\Macromedia\Flash Player\#SharedObjects\7YDT6WQT ]
media.cnbc.com [ C:\Documents and Settings\David\Application Data\Macromedia\Flash Player\#SharedObjects\7YDT6WQT ]
media.mtvnservices.com [ C:\Documents and Settings\David\Application Data\Macromedia\Flash Player\#SharedObjects\7YDT6WQT ]
media.nbcsandiego.com [ C:\Documents and Settings\David\Application Data\Macromedia\Flash Player\#SharedObjects\7YDT6WQT ]
media.wcnc.com [ C:\Documents and Settings\David\Application Data\Macromedia\Flash Player\#SharedObjects\7YDT6WQT ]
media1.break.com [ C:\Documents and Settings\David\Application Data\Macromedia\Flash Player\#SharedObjects\7YDT6WQT ]
mediaforgews.com [ C:\Documents and Settings\David\Application Data\Macromedia\Flash Player\#SharedObjects\7YDT6WQT ]
naiadsystems.com [ C:\Documents and Settings\David\Application Data\Macromedia\Flash Player\#SharedObjects\7YDT6WQT ]
objects.tremormedia.com [ C:\Documents and Settings\David\Application Data\Macromedia\Flash Player\#SharedObjects\7YDT6WQT ]
s0.2mdn.net [ C:\Documents and Settings\David\Application Data\Macromedia\Flash Player\#SharedObjects\7YDT6WQT ]
secure-us.imrworldwide.com [ C:\Documents and Settings\David\Application Data\Macromedia\Flash Player\#SharedObjects\7YDT6WQT ]
serving-sys.com [ C:\Documents and Settings\David\Application Data\Macromedia\Flash Player\#SharedObjects\7YDT6WQT ]
spe.atdmt.com [ C:\Documents and Settings\David\Application Data\Macromedia\Flash Player\#SharedObjects\7YDT6WQT ]
udn.specificclick.net [ C:\Documents and Settings\David\Application Data\Macromedia\Flash Player\#SharedObjects\7YDT6WQT ]
video.redorbit.com [ C:\Documents and Settings\David\Application Data\Macromedia\Flash Player\#SharedObjects\7YDT6WQT ]
vidii.hardsextube.com [ C:\Documents and Settings\David\Application Data\Macromedia\Flash Player\#SharedObjects\7YDT6WQT ]
www.blogsmithmedia.com [ C:\Documents and Settings\David\Application Data\Macromedia\Flash Player\#SharedObjects\7YDT6WQT ]
www.naiadsystems.com [ C:\Documents and Settings\David\Application Data\Macromedia\Flash Player\#SharedObjects\7YDT6WQT ]
yieldmanager.edgesuite.net [ C:\Documents and Settings\David\Application Data\Macromedia\Flash Player\#SharedObjects\7YDT6WQT ]
.2o7.net [ C:\Documents and Settings\David\Application Data\Mozilla\Firefox\Profiles\37xi9j73.default\cookies.sqlite ]
.2o7.net [ C:\Documents and Settings\David\Application Data\Mozilla\Firefox\Profiles\37xi9j73.default\cookies.sqlite ]
.2o7.net [ C:\Documents and Settings\David\Application Data\Mozilla\Firefox\Profiles\37xi9j73.default\cookies.sqlite ]
.2o7.net [ C:\Documents and Settings\David\Application Data\Mozilla\Firefox\Profiles\37xi9j73.default\cookies.sqlite ]
.2o7.net [ C:\Documents and Settings\David\Application Data\Mozilla\Firefox\Profiles\37xi9j73.default\cookies.sqlite ]
.2o7.net [ C:\Documents and Settings\David\Application Data\Mozilla\Firefox\Profiles\37xi9j73.default\cookies.sqlite ]
.2o7.net [ C:\Documents and Settings\David\Application Data\Mozilla\Firefox\Profiles\37xi9j73.default\cookies.sqlite ]
.2o7.net [ C:\Documents and Settings\David\Application Data\Mozilla\Firefox\Profiles\37xi9j73.default\cookies.sqlite ]
.2o7.net [ C:\Documents and Settings\David\Application Data\Mozilla\Firefox\Profiles\37xi9j73.default\cookies.sqlite ]
.ad.yieldmanager.com [ C:\Documents and Settings\David\Application Data\Mozilla\Firefox\Profiles\37xi9j73.default\cookies.sqlite ]
.ad.yieldmanager.com [ C:\Documents and Settings\David\Application Data\Mozilla\Firefox\Profiles\37xi9j73.default\cookies.sqlite ]
.ad.yieldmanager.com [ C:\Documents and Settings\David\Application Data\Mozilla\Firefox\Profiles\37xi9j73.default\cookies.sqlite ]
.adbrite.com [ C:\Documents and Settings\David\Application Data\Mozilla\Firefox\Profiles\37xi9j73.default\cookies.sqlite ]
.adinterax.com [ C:\Documents and Settings\David\Application Data\Mozilla\Firefox\Profiles\37xi9j73.default\cookies.sqlite ]
.adinterax.com [ C:\Documents and Settings\David\Application Data\Mozilla\Firefox\Profiles\37xi9j73.default\cookies.sqlite ]
.adopt.euroclick.com [ C:\Documents and Settings\David\Application Data\Mozilla\Firefox\Profiles\37xi9j73.default\cookies.sqlite ]
.adopt.specificclick.net [ C:\Documents and Settings\David\Application Data\Mozilla\Firefox\Profiles\37xi9j73.default\cookies.sqlite ]
.ads.revsci.net [ C:\Documents and Settings\David\Application Data\Mozilla\Firefox\Profiles\37xi9j73.default\cookies.sqlite ]
.advertising.com [ C:\Documents and Settings\David\Application Data\Mozilla\Firefox\Profiles\37xi9j73.default\cookies.sqlite ]
.advertising.com [ C:\Documents and Settings\David\Application Data\Mozilla\Firefox\Profiles\37xi9j73.default\cookies.sqlite ]
.advertising.com [ C:\Documents and Settings\David\Application Data\Mozilla\Firefox\Profiles\37xi9j73.default\cookies.sqlite ]
.advertising.com [ C:\Documents and Settings\David\Application Data\Mozilla\Firefox\Profiles\37xi9j73.default\cookies.sqlite ]
.advertising.com [ C:\Documents and Settings\David\Application Data\Mozilla\Firefox\Profiles\37xi9j73.default\cookies.sqlite ]
.bizjournals.112.2o7.net [ C:\Documents and Settings\David\Application Data\Mozilla\Firefox\Profiles\37xi9j73.default\cookies.sqlite ]
.bs.serving-sys.com [ C:\Documents and Settings\David\Application Data\Mozilla\Firefox\Profiles\37xi9j73.default\cookies.sqlite ]
.imrworldwide.com [ C:\Documents and Settings\David\Application Data\Mozilla\Firefox\Profiles\37xi9j73.default\cookies.sqlite ]
.data.coremetrics.com [ C:\Documents and Settings\David\Application Data\Mozilla\Firefox\Profiles\37xi9j73.default\cookies.sqlite ]
.dominionenterprises.112.2o7.net [ C:\Documents and Settings\David\Application Data\Mozilla\Firefox\Profiles\37xi9j73.default\cookies.sqlite ]
.doubleclick.net [ C:\Documents and Settings\David\Application Data\Mozilla\Firefox\Profiles\37xi9j73.default\cookies.sqlite ]
.eyewonder.com [ C:\Documents and Settings\David\Application Data\Mozilla\Firefox\Profiles\37xi9j73.default\cookies.sqlite ]
.eyewonder.com [ C:\Documents and Settings\David\Application Data\Mozilla\Firefox\Profiles\37xi9j73.default\cookies.sqlite ]
.insightexpressai.com [ C:\Documents and Settings\David\Application Data\Mozilla\Firefox\Profiles\37xi9j73.default\cookies.sqlite ]
.insightexpressai.com [ C:\Documents and Settings\David\Application Data\Mozilla\Firefox\Profiles\37xi9j73.default\cookies.sqlite ]
.insightexpressai.com [ C:\Documents and Settings\David\Application Data\Mozilla\Firefox\Profiles\37xi9j73.default\cookies.sqlite ]
.insightexpressai.com [ C:\Documents and Settings\David\Application Data\Mozilla\Firefox\Profiles\37xi9j73.default\cookies.sqlite ]
.insightexpressai.com [ C:\Documents and Settings\David\Application Data\Mozilla\Firefox\Profiles\37xi9j73.default\cookies.sqlite ]
.insightexpressai.com [ C:\Documents and Settings\David\Application Data\Mozilla\Firefox\Profiles\37xi9j73.default\cookies.sqlite ]
.insightexpressai.com [ C:\Documents and Settings\David\Application Data\Mozilla\Firefox\Profiles\37xi9j73.default\cookies.sqlite ]
.insightexpressai.com [ C:\Documents and Settings\David\Application Data\Mozilla\Firefox\Profiles\37xi9j73.default\cookies.sqlite ]
.insightexpressai.com [ C:\Documents and Settings\David\Application Data\Mozilla\Firefox\Profiles\37xi9j73.default\cookies.sqlite ]
.insightexpressai.com [ C:\Documents and Settings\David\Application Data\Mozilla\Firefox\Profiles\37xi9j73.default\cookies.sqlite ]
.insightexpressai.com [ C:\Documents and Settings\David\Application Data\Mozilla\Firefox\Profiles\37xi9j73.default\cookies.sqlite ]
.insightexpressai.com [ C:\Documents and Settings\David\Application Data\Mozilla\Firefox\Profiles\37xi9j73.default\cookies.sqlite ]
.insightexpressai.com [ C:\Documents and Settings\David\Application Data\Mozilla\Firefox\Profiles\37xi9j73.default\cookies.sqlite ]
.insightexpressai.com [ C:\Documents and Settings\David\Application Data\Mozilla\Firefox\Profiles\37xi9j73.default\cookies.sqlite ]
.insightexpressai.com [ C:\Documents and Settings\David\Application Data\Mozilla\Firefox\Profiles\37xi9j73.default\cookies.sqlite ]
.insightexpressai.com [ C:\Documents and Settings\David\Application Data\Mozilla\Firefox\Profiles\37xi9j73.default\cookies.sqlite ]
.insightexpressai.com [ C:\Documents and Settings\David\Application Data\Mozilla\Firefox\Profiles\37xi9j73.default\cookies.sqlite ]
.insightexpressai.com [ C:\Documents and Settings\David\Application Data\Mozilla\Firefox\Profiles\37xi9j73.default\cookies.sqlite ]
.insightexpressai.com [ C:\Documents and Settings\David\Application Data\Mozilla\Firefox\Profiles\37xi9j73.default\cookies.sqlite ]
.insightexpressai.com [ C:\Documents and Settings\David\Application Data\Mozilla\Firefox\Profiles\37xi9j73.default\cookies.sqlite ]
.insightexpressai.com [ C:\Documents and Settings\David\Application Data\Mozilla\Firefox\Profiles\37xi9j73.default\cookies.sqlite ]
.insightexpressai.com [ C:\Documents and Settings\David\Application Data\Mozilla\Firefox\Profiles\37xi9j73.default\cookies.sqlite ]
.insightexpressai.com [ C:\Documents and Settings\David\Application Data\Mozilla\Firefox\Profiles\37xi9j73.default\cookies.sqlite ]
.insightexpressai.com [ C:\Documents and Settings\David\Application Data\Mozilla\Firefox\Profiles\37xi9j73.default\cookies.sqlite ]
.insightexpressai.com [ C:\Documents and Settings\David\Application Data\Mozilla\Firefox\Profiles\37xi9j73.default\cookies.sqlite ]
.insightexpressai.com [ C:\Documents and Settings\David\Application Data\Mozilla\Firefox\Profiles\37xi9j73.default\cookies.sqlite ]
.insightexpressai.com [ C:\Documents and Settings\David\Application Data\Mozilla\Firefox\Profiles\37xi9j73.default\cookies.sqlite ]
.media.adrevolver.com [ C:\Documents and Settings\David\Application Data\Mozilla\Firefox\Profiles\37xi9j73.default\cookies.sqlite ]
.media.adrevolver.com [ C:\Documents and Settings\David\Application Data\Mozilla\Firefox\Profiles\37xi9j73.default\cookies.sqlite ]
.mediaplex.com [ C:\Documents and Settings\David\Application Data\Mozilla\Firefox\Profiles\37xi9j73.default\cookies.sqlite ]
.mediaplex.com [ C:\Documents and Settings\David\Application Data\Mozilla\Firefox\Profiles\37xi9j73.default\cookies.sqlite ]
.msnportal.112.2o7.net [ C:\Documents and Settings\David\Application Data\Mozilla\Firefox\Profiles\37xi9j73.default\cookies.sqlite ]
.nasdaq.122.2o7.net [ C:\Documents and Settings\David\Application Data\Mozilla\Firefox\Profiles\37xi9j73.default\cookies.sqlite ]
.overture.com [ C:\Documents and Settings\David\Application Data\Mozilla\Firefox\Profiles\37xi9j73.default\cookies.sqlite ]
.realmedia.com [ C:\Documents and Settings\David\Application Data\Mozilla\Firefox\Profiles\37xi9j73.default\cookies.sqlite ]
.realmedia.com [ C:\Documents and Settings\David\Application Data\Mozilla\Firefox\Profiles\37xi9j73.default\cookies.sqlite ]
.realmedia.com [ C:\Documents and Settings\David\Application Data\Mozilla\Firefox\Profiles\37xi9j73.default\cookies.sqlite ]
.revsci.net [ C:\Documents and Settings\David\Application Data\Mozilla\Firefox\Profiles\37xi9j73.default\cookies.sqlite ]
.statse.webtrendslive.com [ C:\Documents and Settings\David\Application Data\Mozilla\Firefox\Profiles\37xi9j73.default\cookies.sqlite ]
.statse.webtrendslive.com [ C:\Documents and Settings\David\Application Data\Mozilla\Firefox\Profiles\37xi9j73.default\cookies.sqlite ]
.serving-sys.com [ C:\Documents and Settings\David\Application Data\Mozilla\Firefox\Profiles\37xi9j73.default\cookies.sqlite ]
.serving-sys.com [ C:\Documents and Settings\David\Application Data\Mozilla\Firefox\Profiles\37xi9j73.default\cookies.sqlite ]
.serving-sys.com [ C:\Documents and Settings\David\Application Data\Mozilla\Firefox\Profiles\37xi9j73.default\cookies.sqlite ]
.serving-sys.com [ C:\Documents and Settings\David\Application Data\Mozilla\Firefox\Profiles\37xi9j73.default\cookies.sqlite ]
.serving-sys.com [ C:\Documents and Settings\David\Application Data\Mozilla\Firefox\Profiles\37xi9j73.default\cookies.sqlite ]
.serving-sys.com [ C:\Documents and Settings\David\Application Data\Mozilla\Firefox\Profiles\37xi9j73.default\cookies.sqlite ]
.specificclick.net [ C:\Documents and Settings\David\Application Data\Mozilla\Firefox\Profiles\37xi9j73.default\cookies.sqlite ]
.statcounter.com [ C:\Documents and Settings\David\Application Data\Mozilla\Firefox\Profiles\37xi9j73.default\cookies.sqlite ]
.statcounter.com [ C:\Documents and Settings\David\Application Data\Mozilla\Firefox\Profiles\37xi9j73.default\cookies.sqlite ]
.statcounter.com [ C:\Documents and Settings\David\Application Data\Mozilla\Firefox\Profiles\37xi9j73.default\cookies.sqlite ]
.statse.webtrendslive.com [ C:\Documents and Settings\David\Application Data\Mozilla\Firefox\Profiles\37xi9j73.default\cookies.sqlite ]
.tradedoubler.com [ C:\Documents and Settings\David\Application Data\Mozilla\Firefox\Profiles\37xi9j73.default\cookies.sqlite ]
.tremor.adbureau.net [ C:\Documents and Settings\David\Application Data\Mozilla\Firefox\Profiles\37xi9j73.default\cookies.sqlite ]
.warnerbros.112.2o7.net [ C:\Documents and Settings\David\Application Data\Mozilla\Firefox\Profiles\37xi9j73.default\cookies.sqlite ]
.ww3.shoshkeles.com [ C:\Documents and Settings\David\Application Data\Mozilla\Firefox\Profiles\37xi9j73.default\cookies.sqlite ]
.ww3.shoshkeles.com [ C:\Documents and Settings\David\Application Data\Mozilla\Firefox\Profiles\37xi9j73.default\cookies.sqlite ]
.zedo.com [ C:\Documents and Settings\David\Application Data\Mozilla\Firefox\Profiles\37xi9j73.default\cookies.sqlite ]
ad.yieldmanager.com [ C:\Documents and Settings\David\Application Data\Mozilla\Firefox\Profiles\37xi9j73.default\cookies.sqlite ]
.interclick.com [ C:\Documents and Settings\David\Application Data\Mozilla\Firefox\Profiles\37xi9j73.default\cookies.sqlite ]
.revsci.net [ C:\Documents and Settings\David\Application Data\Mozilla\Firefox\Profiles\37xi9j73.default\cookies.sqlite ]
statse.webtrendslive.com [ C:\Documents and Settings\David\Application Data\Mozilla\Firefox\Profiles\37xi9j73.default\cookies.sqlite ]
server.iad.liveperson.net [ C:\Documents and Settings\David\Application Data\Mozilla\Firefox\Profiles\37xi9j73.default\cookies.sqlite ]
server.iad.liveperson.net [ C:\Documents and Settings\David\Application Data\Mozilla\Firefox\Profiles\37xi9j73.default\cookies.sqlite ]



And here are the contents of the ESETScan:
C:\Documents and Settings\David\Application Data\Woyfac\uraly.exe a variant of Win32/Kryptik.FHJ trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{12A005B0-4DDF-40EA-BFEB-F7C561A521D5}\RP58\A0009621.exe a variant of Win32/Kryptik.FHJ trojan cleaned by deleting - quarantined

#6 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,490 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:07:18 PM

Posted 26 August 2010 - 02:08 PM

Looks much better,how;s it runmning.. let's do another quick scan and see if this it clear.


Rerun MBAM (MalwareBytes) like this:

Open MBAM in normal/regular mode and click Update tab, select Check for Updates,when done
click Scanner tab,select Quick scan and scan (normal mode).
After scan click Remove Selected, Post new scan log and Reboot into normal mode.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#7 DAC1357

DAC1357
  • Topic Starter

  • Members
  • 7 posts
  • OFFLINE
  •  
  • Local time:04:18 PM

Posted 26 August 2010 - 05:01 PM

Its running alot better now:D
Although it does still freeze from time to time

Unfortunately the scan did produce a positive:(

Malwarebytes' Anti-Malware 1.46
www.malwarebytes.org

Database version: 4486

Windows 5.1.2600 Service Pack 3
Internet Explorer 7.0.5730.13

8/26/2010 2:59:54 PM
mbam-log-2010-08-26 (14-59-54).txt

Scan type: Quick scan
Objects scanned: 162593
Time elapsed: 33 minute(s), 38 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 1
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 0

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\{324ba944-4300-b04f-43fc-e72e33a8112e} (Trojan.ZbotR.Gen) -> Quarantined and deleted successfully.

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
(No malicious items detected)

#8 DAC1357

DAC1357
  • Topic Starter

  • Members
  • 7 posts
  • OFFLINE
  •  
  • Local time:04:18 PM

Posted 28 August 2010 - 02:49 PM

I have ran another malwarebytes quick scan after an update with the same one file that can't seem to quarantined

In addition I ran another SUPERAntiSpyware scan after an update:

SUPERAntiSpyware Scan Log
http://www.superantispyware.com

Generated 08/28/2010 at 12:26 PM

Application Version : 4.42.1000

Core Rules Database Version : 5407
Trace Rules Database Version: 3219

Scan type : Complete Scan
Total Scan Time : 00:31:22

Memory items scanned : 539
Memory threats detected : 0
Registry items scanned : 7264
Registry threats detected : 1
File items scanned : 21077
File threats detected : 32

System.BrokenFileAssociation
HKCR\.exe

Adware.Tracking Cookie
C:\Documents and Settings\David\Cookies\david@oasn04.247realmedia[1].txt
C:\Documents and Settings\David\Cookies\david@content.yieldmanager[2].txt
C:\Documents and Settings\David\Cookies\david@realmedia[2].txt
C:\Documents and Settings\David\Cookies\david@network.realmedia[1].txt
C:\Documents and Settings\David\Cookies\david@ads.bleepingcomputer[1].txt
C:\Documents and Settings\David\Cookies\david@ehg-eset.hitbox[1].txt
C:\Documents and Settings\David\Cookies\david@247realmedia[1].txt
C:\Documents and Settings\David\Cookies\david@mediaplex[1].txt
C:\Documents and Settings\David\Cookies\david@2o7[2].txt
C:\Documents and Settings\David\Cookies\david@invitemedia[2].txt
C:\Documents and Settings\David\Cookies\david@advertising[2].txt
C:\Documents and Settings\David\Cookies\david@casalemedia[2].txt
C:\Documents and Settings\David\Cookies\david@atdmt[1].txt
C:\Documents and Settings\David\Cookies\david@hitbox[1].txt
C:\Documents and Settings\David\Cookies\david@imrworldwide[2].txt
C:\Documents and Settings\David\Cookies\david@adbrite[2].txt
C:\Documents and Settings\David\Cookies\david@doubleclick[1].txt
C:\Documents and Settings\David\Cookies\david@ads.cnn[2].txt
C:\Documents and Settings\David\Cookies\david@revsci[1].txt
C:\Documents and Settings\David\Cookies\david@media6degrees[2].txt
C:\Documents and Settings\David\Cookies\david@content.yieldmanager[3].txt
C:\Documents and Settings\David\Cookies\david@collective-media[2].txt
C:\Documents and Settings\David\Cookies\david@kontera[1].txt
C:\Documents and Settings\David\Cookies\david@insightexpressai[1].txt
C:\Documents and Settings\David\Cookies\david@ad.yieldmanager[1].txt
C:\Documents and Settings\David\Cookies\david@adinterax[1].txt
C:\Documents and Settings\David\Cookies\david@apmebf[1].txt
C:\Documents and Settings\David\Cookies\david@ad.wsod[1].txt
C:\Documents and Settings\David\Cookies\david@citi.bridgetrack[2].txt
C:\Documents and Settings\David\Cookies\david@videoegg.adbureau[2].txt
core.insightexpressai.com [ C:\Documents and Settings\David\Application Data\Macromedia\Flash Player\#SharedObjects\7YDT6WQT ]
s0.2mdn.net [ C:\Documents and Settings\David\Application Data\Macromedia\Flash Player\#SharedObjects\7YDT6WQT ]


I will now proceed to run another ESET online scan...I hope this is ok
UPDATE: No threats were found on the ESET online scan

Additionally I will be deleting numerous files on this computer to free up some space

Edited by DAC1357, 28 August 2010 - 03:59 PM.


#9 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,490 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:07:18 PM

Posted 28 August 2010 - 07:15 PM

Yes these are good to do.
The repeating file is it the ZBot one?

I think we need to look for rootkits.
Please run the following scan.

Please download Rootkit Unhooker and save it to your Desktop
  • Double-click on RKUnhookerLE to run it
  • Click the Report tab, then click Scan
  • Check Drivers, Stealth, and uncheck the rest
  • Click OK
  • Wait until it's finished and then go to File > Save Report
  • Save the report to your Desktop
Copy the entire contents of the report and paste it in a reply here.

Note** you may get this warning it is ok, just ignore

"Rootkit Unhooker has detected a parasite inside itself!
It is recommended to remove parasite, okay?"

How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#10 DAC1357

DAC1357
  • Topic Starter

  • Members
  • 7 posts
  • OFFLINE
  •  
  • Local time:04:18 PM

Posted 29 August 2010 - 12:05 PM

That was a really quick scan I hope I did it right lol

RkU Version: 3.8.388.590, Type LE (SR2)
==============================================
OS Name: Windows XP
Version 5.1.2600 (Service Pack 3)
Number of processors #1
==============================================
>Drivers
==============================================
0xA4367000 C:\WINDOWS\system32\drivers\RtkHDAud.sys 4689920 bytes (Realtek Semiconductor Corp., Realtek® High Definition Audio Function Driver)
0xBF012000 C:\WINDOWS\System32\SiSGRV.dll 4567040 bytes (Silicon Integrated Systems Corporation, SiS Compatible Super VGA Driver)
0x804D7000 C:\WINDOWS\system32\ntkrnlpa.exe 2150400 bytes (Microsoft Corporation, NT Kernel & System)
0x804D7000 PnpManager 2150400 bytes
0x804D7000 RAW 2150400 bytes
0x804D7000 WMIxWDM 2150400 bytes
0xA3422000 C:\WINDOWS\system32\drivers\netlock.sys 2134016 bytes (OSA Technologies, An Avocent Company, OSA Network Driver Driver)
0xBF800000 Win32k 1855488 bytes
0xBF800000 C:\WINDOWS\System32\win32k.sys 1855488 bytes (Microsoft Corporation, Multi-User Win32 Driver)
0xA41FE000 C:\PROGRA~1\COMMON~1\SYMANT~1\VIRUSD~1\20080910.003\NAVEX15.SYS 868352 bytes (Symantec Corporation, AV Engine)
0xF72A4000 Ntfs.sys 577536 bytes (Microsoft Corporation, NT File System Driver)
0xA3E9F000 C:\WINDOWS\system32\DRIVERS\mrxsmb.sys 458752 bytes (Microsoft Corporation, Windows NT SMB Minirdr)
0xA3F5C000 C:\Program Files\Common Files\Symantec Shared\SPBBC\SPBBCDrv.sys 417792 bytes (Symantec Corporation, SPBBC Driver)
0xA3E41000 C:\Program Files\Common Files\Symantec Shared\EENGINE\eeCtrl.sys 385024 bytes (Symantec Corporation, Symantec Eraser Control Driver)
0xF6F5B000 C:\WINDOWS\system32\DRIVERS\update.sys 385024 bytes (Microsoft Corporation, Update Driver)
0xA415D000 C:\WINDOWS\system32\DRIVERS\tcpip.sys 364544 bytes (Microsoft Corporation, TCP/IP Protocol Driver)
0xA33A3000 C:\WINDOWS\system32\DRIVERS\srv.sys 356352 bytes (Microsoft Corporation, Server driver)
0xF71C2000 C:\WINDOWS\system32\DRIVERS\sisgrp.sys 339968 bytes (Silicon Integrated Systems Corporation, SiS Compatible Super VGA Driver)
0xA42D2000 C:\WINDOWS\System32\Drivers\SRTSP.SYS 299008 bytes (Symantec Corporation, Symantec AutoProtect)
0xBFFA0000 C:\WINDOWS\System32\ATMFD.DLL 286720 bytes (Adobe Systems Incorporated, Windows NT OpenType/Type 1 Font Driver)
0xA315A000 C:\WINDOWS\System32\Drivers\HTTP.sys 266240 bytes (Microsoft Corporation, HTTP Protocol Stack)
0xA40AC000 C:\PROGRA~1\COMMON~1\SYMANT~1\SymcData\idsdefs\20080909.001\SymIDSCo.sys 253952 bytes (Symantec Corporation, IDS Core Driver)
0xF6FB9000 C:\WINDOWS\system32\DRIVERS\rdpdr.sys 196608 bytes (Microsoft Corporation, Microsoft RDP Device redirector)
0xF73E8000 ACPI.sys 188416 bytes (Microsoft Corporation, ACPI Driver for NT)
0xA37A4000 C:\WINDOWS\system32\DRIVERS\mrxdav.sys 184320 bytes (Microsoft Corporation, Windows NT WebDav Minirdr)
0xF7277000 NDIS.sys 184320 bytes (Microsoft Corporation, NDIS 5.1 wrapper driver)
0xA4131000 C:\WINDOWS\System32\Drivers\SYMTDI.SYS 180224 bytes (Symantec Corporation, Network Dispatch Driver)
0xA3F0F000 C:\WINDOWS\system32\DRIVERS\rdbss.sys 176128 bytes (Microsoft Corporation, Redirected Drive Buffering SubSystem Driver)
0xF70ED000 C:\WINDOWS\system32\DRIVERS\HDAudBus.sys 163840 bytes (Windows ® Server 2003 DDK provider, High Definition Audio Bus Driver v1.0a)
0xA4084000 C:\WINDOWS\system32\DRIVERS\netbt.sys 163840 bytes (Microsoft Corporation, MBT Transport driver)
0xF7392000 dmio.sys 155648 bytes (Microsoft Corp., Veritas Software, NT Disk Manager I/O Driver)
0xA410C000 C:\WINDOWS\system32\Drivers\SYMEVENT.SYS 151552 bytes (Symantec Corporation, Symantec Event Library)
0xA3DD9000 C:\WINDOWS\System32\Drivers\Fastfat.SYS 147456 bytes (Microsoft Corporation, Fast FAT File System Driver)
0xA4343000 C:\WINDOWS\system32\drivers\portcls.sys 147456 bytes (Microsoft Corporation, Port Class (Class Driver for Port/Miniport Devices))
0xF718A000 C:\WINDOWS\system32\DRIVERS\USBPORT.SYS 147456 bytes (Microsoft Corporation, USB 1.1 & 2.0 Port Driver)
0xF7115000 C:\WINDOWS\system32\DRIVERS\ks.sys 143360 bytes (Microsoft Corporation, Kernel CSA Library)
0xA4062000 C:\WINDOWS\System32\drivers\afd.sys 139264 bytes (Microsoft Corporation, Ancillary Function Driver for WinSock)
0xA3F3A000 C:\Program Files\SUPERAntiSpyware\SASKUTIL.SYS 139264 bytes (SUPERAdBlocker.com and SUPERAntiSpyware.com, SASKUTIL.SYS)
0xA40EA000 C:\WINDOWS\System32\Drivers\SYMFW.SYS 139264 bytes (Symantec Corporation, Firewall Filter Driver)
0x806E4000 ACPI_HAL 134400 bytes
0x806E4000 C:\WINDOWS\system32\hal.dll 134400 bytes (Microsoft Corporation, Hardware Abstraction Layer DLL)
0xF735A000 fltmgr.sys 131072 bytes (Microsoft Corporation, Microsoft Filesystem Filter Manager)
0xF73B8000 ftdisk.sys 126976 bytes (Microsoft Corporation, FT Disk Driver)
0xA3E25000 C:\Program Files\Common Files\Symantec Shared\EENGINE\EraserUtilRebootDrv.sys 114688 bytes (Symantec Corporation, Symantec Eraser Utility Driver)
0xF725D000 Mup.sys 106496 bytes (Microsoft Corporation, Multiple UNC Provider driver)
0xF737A000 atapi.sys 98304 bytes (Microsoft Corporation, IDE/ATAPI Port Driver)
0xA3DC1000 C:\WINDOWS\System32\Drivers\dump_atapi.sys 98304 bytes
0xF7331000 KSecDD.sys 94208 bytes (Microsoft Corporation, Kernel Security Support Provider Interface)
0xF70C2000 C:\WINDOWS\system32\DRIVERS\ndiswan.sys 94208 bytes (Microsoft Corporation, MS PPP Framing Driver (Strong Encryption))
0xA41E9000 C:\PROGRA~1\COMMON~1\SYMANT~1\VIRUSD~1\20080910.003\NAVENG.SYS 86016 bytes (Symantec Corporation, AV Engine)
0xA3005000 C:\WINDOWS\system32\drivers\wdmaud.sys 86016 bytes (Microsoft Corporation, MMSYSTEM Wave/Midi API mapper)
0xF70D9000 C:\WINDOWS\system32\DRIVERS\parport.sys 81920 bytes (Microsoft Corporation, Parallel Port Driver)
0xF71AE000 C:\WINDOWS\system32\DRIVERS\VIDEOPRT.SYS 81920 bytes (Microsoft Corporation, Video Port Driver)
0xA41B6000 C:\WINDOWS\system32\DRIVERS\ipsec.sys 77824 bytes (Microsoft Corporation, IPSec Driver)
0xA27B7000 C:\WINDOWS\system32\Drivers\psdvdisk.sys 77824 bytes (HiTRUST, PSD Virtual Disk Driver)
0xBF000000 C:\WINDOWS\System32\drivers\dxg.sys 73728 bytes (Microsoft Corporation, DirectX Graphics Driver)
0xF7348000 sr.sys 73728 bytes (Microsoft Corporation, System Restore Filesystem Filter Driver)
0xA371B000 C:\WINDOWS\system32\drivers\int15.sys 69632 bytes
0xF73D7000 pci.sys 69632 bytes (Microsoft Corporation, NT Plug and Play PCI Enumerator)
0xF70B1000 C:\WINDOWS\system32\DRIVERS\psched.sys 69632 bytes (Microsoft Corporation, MS QoS Packet Scheduler)
0xF76A7000 C:\WINDOWS\system32\DRIVERS\cdrom.sys 65536 bytes (Microsoft Corporation, SCSI CD-ROM Driver)
0xF7527000 ohci1394.sys 65536 bytes (Microsoft Corporation, 1394 OpenHCI Port Driver)
0xF76D7000 C:\WINDOWS\system32\DRIVERS\serial.sys 65536 bytes (Microsoft Corporation, Serial Device Driver)
0xF75D7000 C:\WINDOWS\system32\drivers\drmk.sys 61440 bytes (Microsoft Corporation, Microsoft Kernel DRM Descrambler Filter)
0xF76C7000 C:\WINDOWS\system32\DRIVERS\redbook.sys 61440 bytes (Microsoft Corporation, Redbook Audio Filter Driver)
0xF7011000 C:\WINDOWS\system32\drivers\sysaudio.sys 61440 bytes (Microsoft Corporation, System Audio WDM Filter)
0xF75C7000 C:\WINDOWS\system32\DRIVERS\usbhub.sys 61440 bytes (Microsoft Corporation, Default Hub Driver for USB)
0xF7537000 C:\WINDOWS\system32\DRIVERS\1394BUS.SYS 57344 bytes (Microsoft Corporation, 1394 Bus Device Driver)
0xF7577000 C:\WINDOWS\system32\DRIVERS\CLASSPNP.SYS 53248 bytes (Microsoft Corporation, SCSI Class System Dll)
0xF76E7000 C:\WINDOWS\system32\DRIVERS\i8042prt.sys 53248 bytes (Microsoft Corporation, i8042 Port Driver)
0xF76F7000 C:\WINDOWS\system32\DRIVERS\rasl2tp.sys 53248 bytes (Microsoft Corporation, RAS L2TP mini-port/call-manager driver)
0xF7557000 VolSnap.sys 53248 bytes (Microsoft Corporation, Volume Shadow Copy Driver)
0xF7717000 C:\WINDOWS\system32\DRIVERS\raspptp.sys 49152 bytes (Microsoft Corporation, Peer-to-Peer Tunneling Protocol)
0xF7647000 C:\WINDOWS\System32\Drivers\Fips.SYS 45056 bytes (Microsoft Corporation, FIPS Crypto Driver)
0xF7547000 MountMgr.sys 45056 bytes (Microsoft Corporation, Mount Manager)
0xF7707000 C:\WINDOWS\system32\DRIVERS\raspppoe.sys 45056 bytes (Microsoft Corporation, RAS PPPoE mini-port/call-manager driver)
0xF7697000 C:\WINDOWS\system32\DRIVERS\SiSGbeXP.sys 45056 bytes (Silicon Integrated Systems Corp., NDIS 5.1 Miniport Driver for SiS191/SiS190 Ethernet Device)
0xF7587000 uagp35.sys 45056 bytes (Microsoft Corporation, MS AGPv3.5 Filter)
0xF7517000 isapnp.sys 40960 bytes (Microsoft Corporation, PNP ISA Bus Driver)
0xF7777000 C:\WINDOWS\System32\Drivers\NDProxy.SYS 40960 bytes (Microsoft Corporation, NDIS Proxy)
0xF75F7000 C:\WINDOWS\System32\Drivers\SRTSPX.SYS 40960 bytes (Symantec Corporation, Symantec AutoProtect)
0xF7767000 C:\WINDOWS\system32\DRIVERS\termdd.sys 40960 bytes (Microsoft Corporation, Terminal Server Driver)
0xF7567000 disk.sys 36864 bytes (Microsoft Corporation, PnP Disk Driver)
0xF7687000 C:\WINDOWS\system32\DRIVERS\intelppm.sys 36864 bytes (Microsoft Corporation, Processor Device Driver)
0xF7727000 C:\WINDOWS\system32\DRIVERS\msgpc.sys 36864 bytes (Microsoft Corporation, MS General Packet Classifier)
0xF7627000 C:\WINDOWS\system32\DRIVERS\netbios.sys 36864 bytes (Microsoft Corporation, NetBIOS interface driver)
0xA3C21000 C:\WINDOWS\System32\Drivers\Normandy.SYS 36864 bytes (RKU Driver)
0xF7607000 C:\WINDOWS\System32\Drivers\SYMIDS.SYS 36864 bytes (Symantec Corporation, IDS Filter Driver)
0xF7617000 C:\WINDOWS\system32\DRIVERS\wanarp.sys 36864 bytes (Microsoft Corporation, MS Remote Access and Routing ARP Driver)
0xF787F000 C:\WINDOWS\System32\Drivers\Npfs.SYS 32768 bytes (Microsoft Corporation, NPFS Driver)
0xF78C7000 C:\WINDOWS\system32\Drivers\psdfilter.sys 32768 bytes (HiTRUST, PSD Filter Driver)
0xF781F000 C:\WINDOWS\system32\DRIVERS\usbehci.sys 32768 bytes (Microsoft Corporation, EHCI eUSB Miniport Driver)
0xF782F000 C:\WINDOWS\system32\DRIVERS\fdc.sys 28672 bytes (Microsoft Corporation, Floppy Disk Controller Driver)
0xF7827000 C:\WINDOWS\System32\Drivers\GEARAspiWDM.sys 28672 bytes (GEAR Software Inc., CDRom Class Filter Driver)
0xF789F000 C:\WINDOWS\system32\drivers\osaio.sys 28672 bytes (OSA Technologies, An Avocent Company, OSA I/O Port Driver)
0xF7797000 C:\WINDOWS\system32\DRIVERS\PCIIDEX.SYS 28672 bytes (Microsoft Corporation, PCI IDE Bus Driver Extension)
0xF788F000 C:\WINDOWS\System32\Drivers\SYMNDIS.SYS 28672 bytes (Symantec Corporation, NDIS Filter Driver)
0xF783F000 C:\WINDOWS\system32\DRIVERS\kbdclass.sys 24576 bytes (Microsoft Corporation, Keyboard Class Driver)
0xF7837000 C:\WINDOWS\system32\DRIVERS\mouclass.sys 24576 bytes (Microsoft Corporation, Mouse Class Driver)
0xF7887000 C:\WINDOWS\System32\Drivers\SYMREDRV.SYS 24576 bytes (Symantec Corporation, Redirector Filter Driver)
0xF786F000 C:\WINDOWS\System32\drivers\vga.sys 24576 bytes (Microsoft Corporation, VGA/Super VGA Video Driver)
0xF7877000 C:\WINDOWS\System32\Drivers\Msfs.SYS 20480 bytes (Microsoft Corporation, Mailslot driver)
0xF78B7000 C:\WINDOWS\system32\drivers\OsaFsLoc.sys 20480 bytes (OSA Technologies, Filesystem Lock driver)
0xF779F000 PartMgr.sys 20480 bytes (Microsoft Corporation, Partition Manager)
0xF784F000 C:\WINDOWS\system32\DRIVERS\ptilink.sys 20480 bytes (Parallel Technologies, Inc., Parallel Technologies DirectParallel IO Library)
0xF7857000 C:\WINDOWS\system32\DRIVERS\raspti.sys 20480 bytes (Microsoft Corporation, PTI DirectParallel® mini-port/call-manager driver)
0xF78A7000 C:\WINDOWS\system32\DRIVERS\srvkp.sys 20480 bytes (Silicon Integrated Systems Corporation, SiS VGA Driver Manager)
0xF7847000 C:\WINDOWS\system32\DRIVERS\TDI.SYS 20480 bytes (Microsoft Corporation, TDI Wrapper)
0xF7817000 C:\WINDOWS\system32\DRIVERS\usbohci.sys 20480 bytes (Microsoft Corporation, OHCI USB Miniport Driver)
0xF78CF000 C:\WINDOWS\System32\watchdog.sys 20480 bytes (Microsoft Corporation, Watchdog Driver)
0xF79E3000 C:\WINDOWS\system32\DRIVERS\mssmbios.sys 16384 bytes (Microsoft Corporation, System Management BIOS Driver)
0xA3C9D000 C:\WINDOWS\system32\DRIVERS\ndisuio.sys 16384 bytes (Microsoft Corporation, NDIS User mode I/O Driver)
0xF79BF000 C:\WINDOWS\system32\DRIVERS\serenum.sys 16384 bytes (Microsoft Corporation, Serial Port Enumerator)
0xF792B000 UBHelper.sys 16384 bytes
0xF7927000 C:\WINDOWS\system32\BOOTVID.dll 12288 bytes (Microsoft Corporation, VGA Boot Driver)
0xF6F3F000 C:\WINDOWS\System32\drivers\Dxapi.sys 12288 bytes (Microsoft Corporation, DirectX API Driver)
0xF79C3000 C:\WINDOWS\system32\DRIVERS\ndistapi.sys 12288 bytes (Microsoft Corporation, NDIS 3.0 connection wrapper driver)
0xA3768000 C:\WINDOWS\system32\drivers\netlimiter.sys 12288 bytes
0xF7009000 C:\WINDOWS\system32\DRIVERS\rasacd.sys 12288 bytes (Microsoft Corporation, RAS Automatic Connection Driver)
0xA37A0000 C:\WINDOWS\system32\drivers\tvicport.sys 12288 bytes (EnTech Taiwan, TVicPort Driver for Windows NT/2000/XP)
0xF7A4D000 C:\WINDOWS\System32\Drivers\Beep.SYS 8192 bytes (Microsoft Corporation, BEEP Driver)
0xF7A1B000 dmload.sys 8192 bytes (Microsoft Corp., Veritas Software., NT Disk Manager Startup Driver)
0xF7A5D000 C:\WINDOWS\System32\Drivers\dump_WMILIB.SYS 8192 bytes
0xF7A4B000 C:\WINDOWS\System32\Drivers\Fs_Rec.SYS 8192 bytes (Microsoft Corporation, File System Recognizer Driver)
0xF7A17000 C:\WINDOWS\system32\KDCOM.DLL 8192 bytes (Microsoft Corporation, Kernel Debugger HW Extension DLL)
0xF7A4F000 C:\WINDOWS\System32\Drivers\mnmdd.SYS 8192 bytes (Microsoft Corporation, Frame buffer simulator)
0xF7A37000 C:\WINDOWS\system32\DRIVERS\NTIDrvr.sys 8192 bytes (NewTech Infosystems, Inc., NTI CD-ROM Filter Driver)
0xF7A51000 C:\WINDOWS\System32\DRIVERS\RDPCDD.sys 8192 bytes (Microsoft Corporation, RDP Miniport)
0xF7A3B000 C:\WINDOWS\system32\DRIVERS\swenum.sys 8192 bytes (Microsoft Corporation, Plug and Play Software Device Enumerator)
0xF7A53000 C:\WINDOWS\System32\Drivers\SYMDNS.SYS 8192 bytes (Symantec Corporation, DNS Filter Driver)
0xF7A3D000 C:\WINDOWS\system32\DRIVERS\USBD.SYS 8192 bytes (Microsoft Corporation, Universal Serial Bus Driver)
0xF7A19000 C:\WINDOWS\system32\DRIVERS\WMILIB.SYS 8192 bytes (Microsoft Corporation, WMILIB WMI support library Dll)
0xF7B1E000 C:\WINDOWS\system32\DRIVERS\audstub.sys 4096 bytes (Microsoft Corporation, AudStub Driver)
0xF7C5B000 C:\WINDOWS\System32\drivers\dxgthk.sys 4096 bytes (Microsoft Corporation, DirectX Graphics Driver Thunk)
0xF7AF2000 C:\WINDOWS\System32\Drivers\Null.SYS 4096 bytes (Microsoft Corporation, NULL Driver)
0xF7AF5000 C:\WINDOWS\system32\drivers\osanbm.sys 4096 bytes (Windows ® Server 2003 DDK provider, Windows int15 Driver)
0xF7ADF000 pciide.sys 4096 bytes (Microsoft Corporation, Generic PCI IDE Bus Driver)
0xF7C33000 C:\WINDOWS\system32\drivers\zntport.sys 4096 bytes (Zeal SoftStudio, zntport)
==============================================
>Stealth
==============================================

#11 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,490 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:07:18 PM

Posted 29 August 2010 - 09:00 PM

Hmm, Let's double check our selves.

Rerun MBAM (MalwareBytes) like this:

Open MBAM in normal/regular mode and click Update tab, select Check for Updates,when done
click Scanner tab,select Quick scan and scan (normal mode).
After scan click Remove Selected, Post new scan log and Reboot into normal mode.


An Alternate ARK scan'.
Please download GMER from one of the following locations and save it to your desktop:
  • Main Mirror
    This version will download a randomly named file (Recommended)
  • Zipped Mirror
    This version will download a zip file you will need to extract first. If you use this mirror, please extract the zip file to your desktop.
  • Disconnect from the Internet and close all running programs.
  • Temporarily disable any real-time active protection so your security programs will not conflict with gmer's driver.
  • Double-click on the randomly named GMER file (i.e. n7gmo46c.exe) and allow the gmer.sys driver to load if asked.
  • Note: If you downloaded the zipped version, extract the file to its own folder such as C:\gmer and then double-click on gmer.exe.

    Posted Image
  • GMER will open to the Rootkit/Malware tab and perform an automatic quick scan when first run. (do not use the computer while the scan is in progress)
  • If you receive a WARNING!!! about rootkit activity and are asked to fully scan your system...click NO.
  • Now click the Scan button. If you see a rootkit warning window, click OK.
  • When the scan is finished, click the Save... button to save the scan results to your Desktop. Save the file as gmer.log.
  • Click the Copy button and paste the results into your next reply.
  • Exit GMER and be sure to re-enable your anti-virus, Firewall and any other security programs you had disabled.
-- If you encounter any problems, try running GMER in safe mode.
-- If GMER crashes or keeps resulting in a BSODs, uncheck Devices on the right side before scanning
.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#12 DAC1357

DAC1357
  • Topic Starter

  • Members
  • 7 posts
  • OFFLINE
  •  
  • Local time:04:18 PM

Posted 02 September 2010 - 12:25 PM

Ok sorry for this late response but I have been running the GMER scan a few times over the past few days with no luck...but malwarebytes did come clean on the original scan.
Currently I am installing the ESET scanner and uninstalling the norton antivirus.
When that is complete I will try the GMER scan once more, probably in safe mode as suggested.

Edited by DAC1357, 02 September 2010 - 12:32 PM.


#13 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,490 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:07:18 PM

Posted 02 September 2010 - 02:13 PM

This ARK may be easier to run than GMer.

Please download Sophos Anti-rootkit & save it to your desktop.
alternate download link
Note: If using the vendor's download site you will be asked to register with MySophos so an email containing an activation link can be sent to your email address.

Be sure to print out and read the Sophos Anti-Rookit User Manual and Release Notes.
  • Double-click sar_15_sfx.exe to begin the installation, read the license agreement and click Accept.
  • Allow the default location of C:\Program Files\Sophos\Sophos Anti-Rootkit and click Install.
  • A message will appear "Sophos Anti-Rootkit was successfully installed. Click 'yes' to start it now".
  • Click Yes and allow the driver and its randomly named .tmp file (i.e. F.tmp) to load if asked.
  • If the scan did not start automatically, make sure the following are checked:
    • Running processes
    • Windows Registry
    • Local Hard Drives
  • Click Start scan.
  • Sophos Anti-Rootkit will scan the selected areas and display any suspicious files in the upper panel.
  • When the scan is complete, a pop-up screen will appear with "Rootkit Scan Results". Click OK to continue.
  • Click on the suspicious file to display more information about it in the lower panel which also includes whether the item is recommended for removal.
    • Files tagged as Removable: No are not marked for removal and cannot be removed.
    • Files tagged as Removable: Yes (clean up recommended) are marked for removal by default.
    • Files tagged as Removable: Yes (but clean up not recommended) are not marked for removal because Sophos did not recognize them. These files will require further investigation.
  • Select only items recommended for removal, then click "Clean up checked items". You will be asked to confirm, click Yes.
  • A pop up window will appear advising the cleanup will finish when you restart your computer. Click Restart Now.
  • After reboot, a dialog box displays the files you selected for removal and the action taken.
  • Click Empty list and then click Continue to re-scan your computer a second time to ensure everything was cleaned.
  • When done, go to Start > Run and type or copy/paste: %temp%\sarscan.log
  • This should open the log from the rootkit scan. Please post this log in your next reply. If you have a problem, you can find sarscan.log in C:\Documents and Settings\<username>\Local Settings\Temp\.
Before performing an ARK scan it is recommended to do the following to ensure more accurate results and avoid common issues that may cause false detections.
  • Disconnect from the Internet or physically unplug you Internet cable connection.
  • Clean out your temporary files.
  • Close all open programs, scheduling/updating tasks and background processes that might activate during the scan including the screensaver.
  • Temporarily disable your anti-virus and real-time anti-spyware protection.
  • After starting the scan, do not use the computer until the scan has completed.
  • When finished, re-enable your anti-virus/anti-malware (or reboot) and then you can reconnect to the Internet.

How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users