Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Sality,Heur, Couple of Trojans. And a lot of errors.


  • This topic is locked This topic is locked
18 replies to this topic

#1 Kimoi

Kimoi

  • Members
  • 10 posts
  • OFFLINE
  •  
  • Local time:06:57 PM

Posted 31 August 2010 - 06:45 AM

My Avira always detect several viruses on my computer. Whenever i try to execute a program. it gets detected by my anti virus and says it has a Sality virus. But that was before. Now, all my files contain HEUR\Malware. And i dont know what the hell that is. These are the list of Viruses and Errors that my anti virus detects:

C:\Documents and Settings\HP\Local Settings\Temp\E_N4\internet.fne
TR/Gendal.184320.CT

C:\WINDOWS\system32\304537\83F45F.EXE
TR/Dropper.Gen

The two of those always get detected at the same time. Then after i deny access. An error message appears. It was all Symbols and signs. But the only thing i can identify is the website: "http://dywt.com.cn"

And after that, whenever i try to open Mozilla Firefox, this error appears:

Windows cannot find 'C:\Program Files\Java\jre6\lib\deploy\jqs\ff\..\..\..\..\bin\jqsnotify.exe'. Make sure you typed the name correctly, and then try again. To search a file, click the Start button, and then click Search.

But it does open after i click OK.

That's it. But most of the time, i get detections from almost all of the programs installed on my computer.

I tried several Malware and Sality removal software like: Norman Malware Cleaner (it always freezes even if i tried to download another one), Malware Bytes, Symantec W32 SalityAE Removal Tool.

All of them does not work. Please help mellow.gif

Here is my log:




DDS (Ver_10-03-17.01) - NTFSx86
Run by HP at 14:34:43.25 on Tue 08/31/2010
Internet Explorer: 6.0.2900.5512 BrowserJavaVersion: 1.6.0_20
Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.2550.1317 [GMT 8:00]

AV: AntiVir Desktop *On-access scanning enabled* (Updated) {AD166499-45F9-482A-A743-FDD3350758C7}

============== Running Processes ===============

C:\WINDOWS\system32\svchost -k DcomLaunch
svchost.exe
C:\WINDOWS\System32\svchost.exe -k netsvcs
svchost.exe
svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Avira\AntiVir Desktop\sched.exe
C:\Program Files\Avira\AntiVir Desktop\avguard.exe
svchost.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\RTHDCPL.EXE
C:\WINDOWS\system32\igfxtray.exe
C:\WINDOWS\system32\igfxpers.exe
C:\Program Files\Common Files\Adobe\ARM\1.0\AdobeARM.exe
C:\Program Files\Common Files\Java\Java Update\jusched.exe
C:\Program Files\Avira\AntiVir Desktop\avgnt.exe
C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe
C:\Program Files\ANI\ANIWZCS2 Service\WZCSLDR2.exe
C:\Program Files\D-Link\D-Link Wireless G DWA-110\AirGCFG.exe
C:\Program Files\ClamWin\bin\ClamTray.exe
C:\Program Files\DivX\DivX Update\DivXUpdate.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\uTorrent\uTorrent.exe
C:\Program Files\Java\jre6\launch4j-tmp\wowd.exe
C:\Program Files\LimeWire\LimeWire.exe
C:\Program Files\Java\jre6\bin\jqs.exe
C:\WINDOWS\system32\svchost.exe -k imgsvc
C:\WINDOWS\system32\wscntfy.exe
C:\Program Files\Yahoo!\Messenger\ymsgr_tray.exe
C:\WINDOWS\system32\igfxsrvc.exe
C:\games\Need For Speed Underground 2\speed2.exe
C:\Program Files\Mozilla Firefox\firefox.exe
C:\WINDOWS\system32\notepad.exe
C:\Documents and Settings\HP\Desktop\dds.scr

============== Pseudo HJT Report ===============

uStart Page = about:blank
BHO: Adobe PDF Link Helper: {18df081c-e8ad-4283-a596-fa578c2ebdc3} - c:\program files\common files\adobe\acrobat\activex\AcroIEHelperShim.dll
BHO: Groove GFS Browser Helper: {72853161-30c5-4d22-b7f9-0bbc1d38a37e} - c:\progra~1\micros~2\office12\GRA8E1~1.DLL
BHO: Wowd Page Grabber: {99756919-c498-4d97-9e20-2076de0e42b9} - c:\program files\wowd\ext\eiexxpw.dll
BHO: Ask Toolbar: {d4027c7f-154a-4066-a1ad-4243d8127440} - c:\program files\ask.com\GenericAskToolbar.dll
BHO: Java™ Plug-In 2 SSV Helper: {dbc80044-a445-435b-bc74-9c25c1c588a9} - c:\program files\java\jre6\bin\jp2ssv.dll
BHO: JQSIEStartDetectorImpl Class: {e7e6f031-17ce-4c07-bc86-eabfe594f69c} - c:\program files\java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll
BHO: Yontoo Layers: {fd72061e-9fde-484d-a58a-0bab4151cad8} - c:\program files\yontoo layers client\YontooIEClient.dll
TB: Ask Toolbar: {d4027c7f-154a-4066-a1ad-4243d8127440} - c:\program files\ask.com\GenericAskToolbar.dll
uRun: [Messenger (Yahoo!)] "c:\program files\yahoo!\messenger\YahooMessenger.exe" -quiet
uRun: [ctfmon.exe] c:\windows\system32\ctfmon.exe
uRun: [WowdStartup] c:\program files\wowd\wowd.exe auto_started=true
uRun: [uTorrent] "c:\program files\utorrent\uTorrent.exe"
mRun: [RTHDCPL] RTHDCPL.EXE
mRun: [Alcmtr] ALCMTR.EXE
mRun: [igfxtray] c:\windows\system32\igfxtray.exe
mRun: [igfxhkcmd] c:\windows\system32\hkcmd.exe
mRun: [igfxpers] c:\windows\system32\igfxpers.exe
mRun: [Adobe Reader Speed Launcher] "c:\program files\adobe\reader 9.0\reader\Reader_sl.exe"
mRun: [Adobe ARM] "c:\program files\common files\adobe\arm\1.0\AdobeARM.exe"
mRun: [SunJavaUpdateSched] "c:\program files\common files\java\java update\jusched.exe"
mRun: [avgnt] "c:\program files\avira\antivir desktop\avgnt.exe" /min
mRun: [GrooveMonitor] "c:\program files\microsoft office\office12\GrooveMonitor.exe"
mRun: [ANIWZCS2Service] c:\program files\ani\aniwzcs2 service\WZCSLDR2.exe
mRun: [D-Link D-Link Wireless G DWA-110] c:\program files\d-link\d-link wireless g dwa-110\AirGCFG.exe
mRun: [ClamWin] "c:\program files\clamwin\bin\ClamTray.exe" --logon
mRun: [DivXUpdate] "c:\program files\divx\divx update\DivXUpdate.exe" /CHECKNOW
mRun: [83F45F] c:\windows\system32\304537\83F45F.EXE
StartupFolder: c:\docume~1\hp\startm~1\programs\startup\83f45f.lnk - c:\windows\system32\304537\83F45F.EXE
StartupFolder: c:\docume~1\hp\startm~1\programs\startup\limewi~1.lnk - c:\program files\limewire\LimeWire.exe
mPolicies-system: EnableLUA = 0 (0x0)
IE: E&xport to Microsoft Excel - c:\progra~1\micros~2\office12\EXCEL.EXE/3000
IE: {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe
IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe
IE: {2670000A-7350-4f3c-8081-5663EE0C6C49} - {48E73304-E1D6-4330-914C-F5F514E3486C} - c:\progra~1\micros~2\office12\ONBttnIE.dll
IE: {92780B25-18CC-41C8-B9BE-3C9C571A8263} - {FF059E31-CC5A-4E2E-BF3B-96E929D65503} - c:\progra~1\micros~2\office12\REFIEBAR.DLL
DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_20-windows-i586.cab
DPF: {CAFEEFAC-0016-0000-0003-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_03-windows-i586.cab
DPF: {CAFEEFAC-0016-0000-0020-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_20-windows-i586.cab
DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_20-windows-i586.cab
DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} - hxxp://download.macromedia.com/pub/shockwave/cabs/flash/swflash.cab
Handler: grooveLocalGWS - {88FED34C-F0CA-4636-A375-3CB6248B04CD} - c:\progra~1\micros~2\office12\GR99D3~1.DLL
Notify: igfxcui - igfxdev.dll
Notify: WB - c:\program files\stardock\mycolors\fastload.dll
Notify: WBSrv - c:\progra~1\stardock\object~1\window~1\wbsrv.dll
SEH: Groove GFS Stub Execution Hook: {b5a7f190-dda6-4420-b3ba-52453494e6cd} - c:\progra~1\micros~2\office12\GRA8E1~1.DLL

================= FIREFOX ===================

FF - ProfilePath - c:\docume~1\hp\applic~1\mozilla\firefox\profiles\0pl4cdgb.default\
FF - prefs.js: browser.startup.homepage - hxxp://www.google.com.ph/
FF - component: c:\documents and settings\hp\application data\mozilla\firefox\profiles\0pl4cdgb.default\extensions\{300b27df-97e5-4219-ab2b-03aa67d5d557}\components\eff30pw.dll
FF - plugin: c:\program files\divx\divx plus web player\npdivx32.dll
FF - plugin: c:\program files\google\update\1.2.183.13\npGoogleOneClick8.dll
FF - plugin: c:\program files\java\jre6\bin\new_plugin\npdeployJava1.dll
FF - HiddenExtension: Java Console: No Registry Reference - c:\program files\mozilla firefox\extensions\{CAFEEFAC-0016-0000-0003-ABCDEFFEDCBA}
FF - HiddenExtension: Java Console: No Registry Reference - c:\program files\mozilla firefox\extensions\{CAFEEFAC-0016-0000-0020-ABCDEFFEDCBA}

---- FIREFOX POLICIES ----
c:\program files\mozilla firefox\greprefs\all.js - pref("ui.use_native_colors", true);
c:\program files\mozilla firefox\greprefs\all.js - pref("ui.use_native_popup_windows", false);
c:\program files\mozilla firefox\greprefs\all.js - pref("browser.enable_click_image_resizing", true);
c:\program files\mozilla firefox\greprefs\all.js - pref("accessibility.browsewithcaret_shortcut.enabled", true);
c:\program files\mozilla firefox\greprefs\all.js - pref("javascript.options.mem.high_water_mark", 32);
c:\program files\mozilla firefox\greprefs\all.js - pref("javascript.options.mem.gc_frequency", 1600);
c:\program files\mozilla firefox\greprefs\all.js - pref("network.auth.force-generic-ntlm", false);
c:\program files\mozilla firefox\greprefs\all.js - pref("svg.smil.enabled", false);
c:\program files\mozilla firefox\greprefs\all.js - pref("ui.trackpoint_hack.enabled", -1);
c:\program files\mozilla firefox\greprefs\all.js - pref("browser.formfill.debug", false);
c:\program files\mozilla firefox\greprefs\all.js - pref("browser.formfill.agedWeight", 2);
c:\program files\mozilla firefox\greprefs\all.js - pref("browser.formfill.bucketSize", 1);
c:\program files\mozilla firefox\greprefs\all.js - pref("browser.formfill.maxTimeGroupings", 25);
c:\program files\mozilla firefox\greprefs\all.js - pref("browser.formfill.timeGroupingSize", 604800);
c:\program files\mozilla firefox\greprefs\all.js - pref("browser.formfill.boundaryWeight", 25);
c:\program files\mozilla firefox\greprefs\all.js - pref("browser.formfill.prefixWeight", 5);
c:\program files\mozilla firefox\greprefs\all.js - pref("html5.enable", false);
c:\program files\mozilla firefox\greprefs\security-prefs.js - pref("security.ssl3.rsa_seed_sha", true);
c:\program files\mozilla firefox\defaults\pref\firefox-branding.js - pref("app.update.download.backgroundInterval", 600);
c:\program files\mozilla firefox\defaults\pref\firefox-branding.js - pref("app.update.url.manual", "http://www.firefox.com");
c:\program files\mozilla firefox\defaults\pref\firefox-branding.js - pref("browser.search.param.yahoo-fr-ja", "mozff");
c:\program files\mozilla firefox\defaults\pref\firefox.js - pref("extensions.{972ce4c6-7e08-4474-a285-3208198ce6fd}.name", "chrome://browser/locale/browser.properties");
c:\program files\mozilla firefox\defaults\pref\firefox.js - pref("extensions.{972ce4c6-7e08-4474-a285-3208198ce6fd}.description", "chrome://browser/locale/browser.properties");
c:\program files\mozilla firefox\defaults\pref\firefox.js - pref("xpinstall.whitelist.add", "addons.mozilla.org");
c:\program files\mozilla firefox\defaults\pref\firefox.js - pref("xpinstall.whitelist.add.36", "getpersonas.com");
c:\program files\mozilla firefox\defaults\pref\firefox.js - pref("lightweightThemes.update.enabled", true);
c:\program files\mozilla firefox\defaults\pref\firefox.js - pref("browser.allTabs.previews", false);
c:\program files\mozilla firefox\defaults\pref\firefox.js - pref("plugins.hide_infobar_for_outdated_plugin", false);
c:\program files\mozilla firefox\defaults\pref\firefox.js - pref("plugins.update.notifyUser", false);
c:\program files\mozilla firefox\defaults\pref\firefox.js - pref("toolbar.customization.usesheet", false);
c:\program files\mozilla firefox\defaults\pref\firefox.js - pref("browser.taskbar.previews.enable", false);
c:\program files\mozilla firefox\defaults\pref\firefox.js - pref("browser.taskbar.previews.max", 20);
c:\program files\mozilla firefox\defaults\pref\firefox.js - pref("browser.taskbar.previews.cachetime", 20);

============= SERVICES / DRIVERS ===============

R1 avgio;avgio;c:\program files\avira\antivir desktop\avgio.sys [2010-7-13 11608]
R2 AntiVirSchedulerService;Avira AntiVir Scheduler;c:\program files\avira\antivir desktop\sched.exe [2010-7-13 108289]
R2 AntiVirService;Avira AntiVir Guard;c:\program files\avira\antivir desktop\avguard.exe [2010-7-13 185089]
R2 avgntflt;avgntflt;c:\windows\system32\drivers\avgntflt.sys [2010-7-13 56816]
R2 cpuz133;cpuz133;c:\windows\system32\drivers\cpuz133_x32.sys [2010-7-28 20968]
R2 WinFLdrv;WinFLdrv;c:\windows\system32\WinFLdrv.sys [2010-8-7 17984]
S0 cerc6;cerc6; [x]
S2 gupdate;Google Update Service (gupdate);c:\program files\google\update\GoogleUpdate.exe [2010-8-13 135664]
S3 aic32p;aic32p;\??\c:\windows\system32\drivers\kklkfk.sys --> c:\windows\system32\drivers\kklkfk.sys [?]
S3 NDISKIO;NDISKIO;c:\docume~1\hp\locals~1\temp\00000fa9.nmc\nse\bin\ndiskio.sys [2010-8-26 24168]
S3 nsak;nsak;c:\docume~1\hp\locals~1\temp\00000a79.nmc\nse\bin\nsak.sys [2010-8-25 18120]

=============== Created Last 30 ================

2010-08-31 06:30:07 0 ----a-w- c:\documents and settings\hp\defogger_reenable
2010-08-28 07:32:15 0 d-----w- c:\docume~1\hp\applic~1\Malwarebytes
2010-08-28 07:32:08 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2010-08-28 07:32:07 20952 ----a-w- c:\windows\system32\drivers\mbam.sys
2010-08-28 07:32:07 0 d-----w- c:\program files\Malwarebytes' Anti-Malware
2010-08-28 07:32:07 0 d-----w- c:\docume~1\alluse~1\applic~1\Malwarebytes
2010-08-27 22:34:57 2560 ------w- c:\windows\system32\xpsp4res.dll
2010-08-27 11:29:12 0 d-----w- c:\docume~1\hp\applic~1\LimeWire
2010-08-26 19:16:11 272128 -c----w- c:\windows\system32\dllcache\bthport.sys
2010-08-26 19:16:11 272128 ------w- c:\windows\system32\drivers\bthport.sys
2010-08-26 19:12:35 455680 -c----w- c:\windows\system32\dllcache\mrxsmb.sys
2010-08-26 12:34:21 2189952 -c----w- c:\windows\system32\dllcache\ntoskrnl.exe
2010-08-26 12:34:21 2146304 -c----w- c:\windows\system32\dllcache\ntkrnlmp.exe
2010-08-26 12:34:20 2066816 -c----w- c:\windows\system32\dllcache\ntkrnlpa.exe
2010-08-26 12:34:20 2024448 -c----w- c:\windows\system32\dllcache\ntkrpamp.exe
2010-08-26 03:58:11 0 d-----w- C:\BFU
2010-08-26 03:48:15 0 d-----w- c:\program files\Trend Micro
2010-08-25 15:51:48 69632 ----a-w- c:\windows\ALCMTR.EXE
2010-08-25 15:15:34 0 d-----w- c:\windows\system32\OLEDSP32.DLL
2010-08-23 22:56:48 0 d-----w- c:\program files\HyCam2
2010-08-23 13:04:20 0 d-----w- c:\windows\system32\appmgmt
2010-08-22 17:23:12 0 d-----w- c:\docume~1\alluse~1\applic~1\Save Data
2010-08-22 17:23:05 124688 ----a-w- c:\windows\system32\MSWINSCK.OCX
2010-08-22 14:46:33 0 d-----w- c:\windows\system32\SoftwareDistribution
2010-08-21 03:09:15 0 d-----w- c:\program files\softendo.com
2010-08-18 11:06:12 0 d--h--w- c:\windows\system32\GroupPolicy
2010-08-13 13:39:28 0 d-----w- C:\Downloads
2010-08-13 04:04:47 0 d-----w- c:\program files\common files\DivX Shared
2010-08-13 03:34:29 0 d-----w- c:\program files\DivX
2010-08-12 04:00:27 0 d-----w- c:\docume~1\alluse~1\applic~1\DivX
2010-08-08 14:37:08 411368 ----a-w- c:\windows\system32\deployJava1.dll
2010-08-07 04:23:09 21504 -c--a-w- c:\windows\system32\dllcache\hidserv.dll
2010-08-07 04:23:09 21504 ----a-w- c:\windows\system32\hidserv.dll
2010-08-07 04:22:54 32128 -c--a-w- c:\windows\system32\dllcache\usbccgp.sys
2010-08-07 04:22:54 32128 ----a-w- c:\windows\system32\drivers\usbccgp.sys
2010-08-07 02:03:12 180224 ----a-w- c:\windows\system32\WinVd32.sys
2010-08-07 02:03:10 7680 ----a-w- c:\windows\system32\WinFLsrv.exe
2010-08-07 02:03:05 33982 ----a-w- c:\windows\system32\flk-icon.ico
2010-08-07 02:03:05 0 d-----w- c:\program files\Folder Lock 6
2010-08-07 00:16:08 7 ----a-w- c:\windows\system32\ANIWZCSUSERNAME
2010-08-06 16:12:09 0 d-----w- c:\docume~1\hp\applic~1\.clamwin
2010-08-06 16:11:55 0 d-----w- c:\program files\ClamWin
2010-08-06 16:11:55 0 d-----w- c:\documents and settings\all users\.clamwin
2010-08-06 16:02:02 0 d-----w- c:\program files\uTorrent
2010-08-06 16:01:57 0 d-----w- c:\docume~1\hp\applic~1\uTorrent
2010-08-06 09:30:25 3284 ----a-w- c:\windows\system32\ANIWZCS{BB1984EB-2081-4619-B1B8-F4A2A8A1D8BA}
2010-08-06 09:26:08 0 d-----w- c:\program files\ANI
2010-08-06 09:25:31 459520 ----a-w- c:\windows\system32\drivers\Dr71WU.sys
2010-08-06 09:25:31 0 d-----w- c:\program files\D-Link
2010-08-06 09:20:07 25 ----a-w- c:\windows\popcinfot.dat
2010-08-06 04:00:37 9369 --sha-r- c:\windows\system32\setting.ini
2010-08-06 03:44:22 20992 -c--a-w- c:\windows\system32\dllcache\rtl8139.sys
2010-08-06 03:44:22 20992 ----a-w- c:\windows\system32\drivers\RTL8139.sys

==================== Find3M ====================

2010-08-07 03:52:27 56816 ----a-w- c:\windows\system32\drivers\avgntflt.sys
2010-07-13 13:05:49 507904 ----a-w- c:\windows\system32\winlogon.exe
2010-07-13 12:45:53 21640 ----a-w- c:\windows\system32\emptyregdb.dat
2010-06-30 12:31:35 149504 ----a-w- c:\windows\system32\schannel.dll
2010-06-24 12:10:44 81920 ----a-w- c:\windows\system32\ieencode.dll
2010-06-24 12:10:44 667136 ----a-w- c:\windows\system32\wininet.dll
2010-06-23 13:44:04 1851904 ----a-w- c:\windows\system32\win32k.sys
2010-06-17 14:03:00 80384 ----a-w- c:\windows\system32\iccvid.dll
2010-06-14 07:41:45 1172480 ----a-w- c:\windows\system32\msxml3.dll
2010-06-09 23:01:10 133616 ------w- c:\windows\system32\pxafs.dll
2010-06-09 23:01:10 126448 ------w- c:\windows\system32\pxinsi64.exe
2010-06-09 23:01:10 123888 ------w- c:\windows\system32\pxcpyi64.exe

============= FINISH: 14:35:09.31 ===============

Oh and i forgot. I cannot enter safe mode. I got a blue screen saying that my computer is gonna crash and the system prevented it from doing so. Hope that info also helps.

EDIT: Posts merged ~BP

Attached Files


Edited by Budapest, 31 August 2010 - 03:38 PM.


BC AdBot (Login to Remove)

 


#2 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:10:57 AM

Posted 08 September 2010 - 06:02 PM

Hi,

Welcome to Bleeping Computer. My name is m0le and I will be helping you with your log.
  • Please subscribe to this topic, if you haven't already. You can subscribe by clicking the Options box to the right of your topic title and selecting Track This Topic.

  • Please avoid installing/uninstalling or updating any programs and attempting any unsupervised fixes or scans. This can make helping you impossible.

  • Please reply to this post so I know you are there.
The forum is busy and we need to have replies as soon as possible. If I haven't had a reply after 3 days I will bump the topic and if you do not reply by the following day after that then I will close the topic.

Once I receive a reply then I will return with your first instructions.

Thanks thumbup2.gif
Posted Image
m0le is a proud member of UNITE

#3 Kimoi

Kimoi
  • Topic Starter

  • Members
  • 10 posts
  • OFFLINE
  •  
  • Local time:06:57 PM

Posted 12 September 2010 - 03:51 PM

Thanks for replying! Ive waited for your reply for a week or so. Anyway, here i am. I hope i am not late.

#4 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:10:57 AM

Posted 12 September 2010 - 06:18 PM

No, not too late but if you do have Sality on board then we're sunk.

This family of malware is a polymorphic file infector which infects .exe, .scr files, downloads more malicious files to your computer, steals sensitive system information/passwords and sends it back to the attacker.

With this particular infection, the safest solution and only sure way to remove it effectively is to reformat and reinstall the OS.


Let's see what we can find out from the PC

Please download ComboFix from one of these locations:* IMPORTANT !!! Save ComboFix.exe to your Desktop making sure you rename it comfix.exe
  • Disable your AntiVirus and AntiSpyware applications, usually via a right click on the System Tray icon. They may otherwise interfere with our tools. (Click on this link to see a list of programs that should be disabled. The list is not all inclusive.)
  • Double click on Comfix.exe & follow the prompts.
  • As part of it's process, ComboFix will check to see if the Microsoft Windows Recovery Console is installed. With malware infections being as they are today, it's strongly recommended to have this pre-installed on your machine before doing any malware removal. It will allow you to boot up into a special recovery/repair mode that will allow us to more easily help you should your computer have a problem after an attempted removal of malware.
  • Follow the prompts to allow ComboFix to download and install the Microsoft Windows Recovery Console, and when prompted, agree to the End-User License Agreement to install the Microsoft Windows Recovery Console.
**Please note: If the Microsoft Windows Recovery Console is already installed, ComboFix will continue it's malware removal procedures.



Once the Microsoft Windows Recovery Console is installed using ComboFix, you should see the following message:



Click on Yes, to continue scanning for malware.

When finished, it shall produce a log for you. Please include the C:\ComboFix.txt in your next reply.
Posted Image
m0le is a proud member of UNITE

#5 Kimoi

Kimoi
  • Topic Starter

  • Members
  • 10 posts
  • OFFLINE
  •  
  • Local time:06:57 PM

Posted 13 September 2010 - 02:52 AM

Here is my Combofix log:

ComboFix 10-09-12.02 - HP 09/13/2010 15:35:06.1.2 - x86
Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.2550.1772 [GMT 8:00]
Running from: c:\documents and settings\HP\Desktop\comfix.exe.exe
AV: AntiVir Desktop *On-access scanning disabled* (Updated) {AD166499-45F9-482A-A743-FDD3350758C7}
.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.

C:\desktop.ini
c:\docume~1\HP\LOCALS~1\Temp\E_N4
c:\docume~1\HP\LOCALS~1\Temp\E_N4\cnvpe.fne
c:\docume~1\HP\LOCALS~1\Temp\E_N4\dp1.fne
c:\docume~1\HP\LOCALS~1\Temp\E_N4\eAPI.fne
c:\docume~1\HP\LOCALS~1\Temp\E_N4\HtmlView.fne
c:\docume~1\HP\LOCALS~1\Temp\E_N4\internet.fne
c:\docume~1\HP\LOCALS~1\Temp\E_N4\krnln.fnr
c:\docume~1\HP\LOCALS~1\Temp\E_N4\shell.fne
c:\docume~1\HP\LOCALS~1\Temp\E_N4\spec.fne
c:\windows\a3kebook.ini
c:\windows\akebook.ini
c:\windows\ANS2000.INI
c:\windows\system32\304537
c:\windows\system32\setting.ini
c:\windows\system32\Thumbs.db
c:\windows\system32\winlogon.bak

.
((((((((((((((((((((((((((((((((((((((( Drivers/Services )))))))))))))))))))))))))))))))))))))))))))))))))
.

-------\Legacy_AIC32P
-------\Service_aic32p


((((((((((((((((((((((((( Files Created from 2010-08-13 to 2010-09-13 )))))))))))))))))))))))))))))))
.

2010-09-12 15:26 . 2008-04-13 21:42 159232 ----a-w- c:\windows\system32\ptpusd.dll
2010-09-12 15:26 . 2001-08-17 14:36 5632 ----a-w- c:\windows\system32\ptpusb.dll
2010-09-12 15:26 . 2008-04-13 16:15 15104 -c--a-w- c:\windows\system32\dllcache\usbscan.sys
2010-09-12 15:26 . 2008-04-13 16:15 15104 ----a-w- c:\windows\system32\drivers\usbscan.sys
2010-09-12 14:52 . 2010-09-12 15:27 -------- d-----w- c:\documents and settings\HP\Application Data\Apple Computer
2010-09-12 14:52 . 2009-05-18 05:17 26600 ----a-w- c:\windows\system32\drivers\GEARAspiWDM.sys
2010-09-12 14:52 . 2008-04-17 04:12 107368 ----a-w- c:\windows\system32\GEARAspi.dll
2010-09-08 08:17 . 2010-09-08 08:17 -------- d-----w- c:\documents and settings\HP\Local Settings\Application Data\Apple
2010-09-08 08:17 . 2010-09-12 15:26 -------- d-----w- c:\documents and settings\All Users\Application Data\Apple
2010-09-08 08:16 . 2010-09-12 14:52 -------- d-----w- c:\documents and settings\HP\Local Settings\Application Data\Apple Computer
2010-09-06 16:24 . 2010-09-06 16:25 -------- d-----w- c:\program files\Common Files\Adobe
2010-09-06 16:17 . 2010-09-06 16:17 -------- d-----w- c:\program files\Common Files\Adobe AIR
2010-09-05 15:53 . 2010-09-05 15:53 -------- d-----w- c:\program files\Free Mouse Auto Clicker
2010-09-05 03:13 . 2010-09-05 03:13 -------- d-----w- c:\documents and settings\HP\Application Data\Media Player Classic
2010-09-04 11:40 . 2010-09-04 15:41 -------- d-----w- c:\documents and settings\HP\Application Data\vlc
2010-09-04 10:00 . 2010-09-04 10:00 -------- d-----w- c:\program files\VideoLAN
2010-09-04 09:59 . 2010-09-04 10:16 -------- d-----w- c:\program files\Graboid
2010-09-01 01:12 . 2010-09-01 01:12 73000 ----a-w- c:\documents and settings\All Users\Application Data\Apple Computer\Installer Cache\iTunes 10.0.0.68\SetupAdmin.exe
2010-08-31 04:42 . 2010-09-07 07:20 -------- d-----w- c:\documents and settings\HP\Local Settings\Application Data\AskToolbar
2010-08-28 07:32 . 2010-08-28 07:32 -------- d-----w- c:\documents and settings\HP\Application Data\Malwarebytes
2010-08-28 07:32 . 2010-04-29 07:39 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2010-08-28 07:32 . 2010-08-28 07:32 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
2010-08-28 07:32 . 2010-08-28 07:32 -------- d-----w- c:\documents and settings\All Users\Application Data\Malwarebytes
2010-08-28 07:32 . 2010-04-29 07:39 20952 ----a-w- c:\windows\system32\drivers\mbam.sys
2010-08-27 22:34 . 2008-05-03 11:55 2560 ------w- c:\windows\system32\xpsp4res.dll
2010-08-26 19:16 . 2008-06-13 11:05 272128 -c----w- c:\windows\system32\dllcache\bthport.sys
2010-08-26 19:16 . 2008-06-13 11:05 272128 ------w- c:\windows\system32\drivers\bthport.sys
2010-08-26 19:12 . 2010-02-24 13:11 455680 -c----w- c:\windows\system32\dllcache\mrxsmb.sys
2010-08-26 19:00 . 2007-07-27 15:11 26488 ----a-w- c:\windows\system32\spupdsvc.exe
2010-08-26 19:00 . 2010-08-28 03:29 -------- d--h--w- c:\windows\$hf_mig$
2010-08-26 12:34 . 2010-04-28 02:25 2189952 -c----w- c:\windows\system32\dllcache\ntoskrnl.exe
2010-08-26 12:34 . 2010-04-27 13:59 2146304 -c----w- c:\windows\system32\dllcache\ntkrnlmp.exe
2010-08-26 12:34 . 2010-04-27 13:05 2066816 -c----w- c:\windows\system32\dllcache\ntkrnlpa.exe
2010-08-26 12:34 . 2010-04-27 13:05 2024448 -c----w- c:\windows\system32\dllcache\ntkrpamp.exe
2010-08-26 03:58 . 2010-08-26 03:59 -------- d-----w- C:\BFU
2010-08-26 03:48 . 2010-08-26 03:48 388096 ----a-r- c:\documents and settings\HP\Application Data\Microsoft\Installer\{45A66726-69BC-466B-A7A4-12FCBA4883D7}\HiJackThis.exe
2010-08-26 03:48 . 2010-08-26 03:48 -------- d-----w- c:\program files\Trend Micro
2010-08-25 15:51 . 2010-08-25 16:16 69632 ----a-w- c:\windows\ALCMTR.EXE
2010-08-25 15:41 . 2010-08-25 16:06 668912 ----a-w- c:\documents and settings\All Users\Application Data\Yahoo!\YUpdater\yupdater.exe
2010-08-25 15:40 . 2010-08-25 15:54 118849 ----a-w- c:\documents and settings\All Users\Application Data\DivX\ControlPanel\Uninstaller.exe
2010-08-25 15:15 . 2010-08-25 15:15 -------- d-----w- c:\windows\system32\OLEDSP32.DLL
2010-08-23 22:56 . 2010-08-23 22:59 -------- d-----w- c:\program files\HyCam2
2010-08-22 17:23 . 2010-08-22 17:23 -------- d-----w- c:\documents and settings\All Users\Application Data\Save Data
2010-08-21 03:09 . 2010-08-21 03:09 -------- d-----w- c:\program files\softendo.com
2010-08-18 11:06 . 2010-08-18 11:06 -------- d--h--w- c:\windows\system32\GroupPolicy

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2010-09-13 07:42 . 2010-07-15 00:31 -------- d-----w- c:\program files\Wowd
2010-09-13 07:41 . 2010-08-27 11:29 -------- d-----w- c:\documents and settings\HP\Application Data\LimeWire
2010-09-13 07:40 . 2010-08-06 16:01 -------- d-----w- c:\documents and settings\HP\Application Data\uTorrent
2010-09-12 14:51 . 2010-09-12 14:51 -------- d-----w- c:\program files\iTunes
2010-09-12 14:51 . 2010-09-12 14:51 -------- d-----w- c:\documents and settings\All Users\Application Data\{429CAD59-35B1-4DBC-BB6D-1DB246563521}
2010-09-12 14:51 . 2010-09-12 14:51 -------- d-----w- c:\program files\iPod
2010-09-12 14:51 . 2010-09-08 08:17 -------- d-----w- c:\program files\Common Files\Apple
2010-09-12 14:51 . 2010-09-08 08:17 -------- d-----w- c:\documents and settings\All Users\Application Data\Apple Computer
2010-09-12 14:51 . 2010-09-12 14:51 -------- d-----w- c:\program files\Apple Software Update
2010-09-12 14:50 . 2010-09-12 14:50 -------- d-----w- c:\program files\Bonjour
2010-09-08 08:18 . 2010-09-08 08:17 -------- d-----w- c:\program files\QuickTime
2010-09-07 17:01 . 2010-07-28 02:52 -------- d-----w- c:\program files\Ask.com
2010-09-05 17:56 . 2010-07-13 02:16 -------- d-----w- c:\program files\Cheat Engine
2010-09-03 12:28 . 2010-08-06 09:20 25 ----a-w- c:\windows\popcinfot.dat
2010-09-03 09:03 . 2010-08-13 03:35 -------- d-----w- c:\program files\Google
2010-08-27 20:40 . 2010-07-13 03:00 -------- d-----w- c:\program files\LimeWire
2010-08-25 16:19 . 2010-08-07 02:03 7680 ----a-w- c:\windows\system32\WinFLsrv.exe
2010-08-25 15:20 . 2010-08-13 14:25 27653280 ----a-w- c:\documents and settings\All Users\Application Data\Yahoo!\YUpdater\msgup1000_1270_us_u2.exe
2010-08-25 15:20 . 2010-07-15 00:32 287744 --s---r- c:\documents and settings\All Users\Application Data\Tarma Installer\{889DF117-14D1-44EE-9F31-C5FB5D47F68B}\Setup.exe
2010-08-25 15:20 . 2010-08-13 04:05 118437 ----a-w- c:\documents and settings\All Users\Application Data\DivX\WebPlayer\Uninstaller.exe
2010-08-25 15:18 . 2010-08-13 04:05 126090 ----a-w- c:\documents and settings\All Users\Application Data\DivX\DivXDecoderShortcut\Uninstaller.exe
2010-08-25 15:18 . 2010-08-13 04:05 115593 ----a-w- c:\documents and settings\All Users\Application Data\DivX\DFXPlugin\Uninstaller.exe
2010-08-25 15:17 . 2010-08-13 04:05 115568 ----a-w- c:\documents and settings\All Users\Application Data\DivX\Converter\Uninstaller.exe
2010-08-23 23:01 . 2010-08-13 04:05 -------- d-----w- c:\documents and settings\HP\Application Data\DivX
2010-08-23 13:13 . 2010-08-07 02:03 -------- d-----w- c:\program files\Folder Lock 6
2010-08-13 04:07 . 2010-08-13 04:07 57344 ----a-w- c:\documents and settings\All Users\Application Data\DivX\RunAsUser\RUNASUSERPROCESS.dll
2010-08-13 04:05 . 2010-08-12 04:00 -------- d-----w- c:\documents and settings\All Users\Application Data\DivX
2010-08-13 04:05 . 2010-08-13 03:34 -------- d-----w- c:\program files\DivX
2010-08-13 04:04 . 2010-08-13 04:04 -------- d-----w- c:\program files\Common Files\DivX Shared
2010-08-13 03:34 . 2010-08-13 04:05 1062184 ----a-w- c:\documents and settings\All Users\Application Data\DivX\Setup\Resource.dll
2010-08-09 21:28 . 2010-07-15 00:31 -------- d-----w- c:\documents and settings\HP\Application Data\Wowd
2010-08-09 21:27 . 2010-08-09 21:27 157184 ----a-w- c:\documents and settings\HP\Application Data\Mozilla\Firefox\Profiles\0pl4cdgb.default\extensions\{300B27DF-97E5-4219-AB2B-03AA67D5D557}\components\eff30pw.dll
2010-08-08 14:37 . 2010-08-08 14:37 503808 ----a-w- c:\documents and settings\HP\Application Data\Sun\Java\Deployment\SystemCache\6.0\4\7ec4bf04-1a666248-n\msvcp71.dll
2010-08-08 14:37 . 2010-08-08 14:37 499712 ----a-w- c:\documents and settings\HP\Application Data\Sun\Java\Deployment\SystemCache\6.0\4\7ec4bf04-1a666248-n\jmc.dll
2010-08-08 14:37 . 2010-08-08 14:37 348160 ----a-w- c:\documents and settings\HP\Application Data\Sun\Java\Deployment\SystemCache\6.0\4\7ec4bf04-1a666248-n\msvcr71.dll
2010-08-08 14:37 . 2010-08-08 14:37 61440 ----a-w- c:\documents and settings\HP\Application Data\Sun\Java\Deployment\SystemCache\6.0\42\4488892a-70f08047-n\decora-sse.dll
2010-08-08 14:37 . 2010-08-08 14:37 12800 ----a-w- c:\documents and settings\HP\Application Data\Sun\Java\Deployment\SystemCache\6.0\42\4488892a-70f08047-n\decora-d3d.dll
2010-08-08 14:36 . 2010-08-08 14:37 411368 ----a-w- c:\windows\system32\deployJava1.dll
2010-08-08 14:36 . 2010-07-13 02:59 -------- d-----w- c:\program files\Java
2010-08-07 03:52 . 2010-07-13 03:02 96104 ----a-w- c:\windows\system32\drivers\avipbb.sys
2010-08-07 03:52 . 2010-07-13 03:02 56816 ----a-w- c:\windows\system32\drivers\avgntflt.sys
2010-08-07 02:03 . 2010-08-07 02:03 180224 ----a-w- c:\windows\system32\WinVd32.sys
2010-08-06 16:14 . 2010-08-06 16:12 -------- d-----w- c:\documents and settings\HP\Application Data\.clamwin
2010-08-06 16:11 . 2010-08-06 16:11 -------- d-----w- c:\program files\ClamWin
2010-08-06 16:02 . 2010-08-06 16:02 -------- d-----w- c:\program files\uTorrent
2010-08-06 14:47 . 2010-07-13 03:01 -------- d-----w- c:\documents and settings\All Users\Application Data\Yahoo!
2010-08-06 09:26 . 2010-08-06 09:26 -------- d-----w- c:\program files\ANI
2010-08-06 09:26 . 2010-07-13 02:48 -------- d--h--w- c:\program files\InstallShield Installation Information
2010-08-06 09:25 . 2010-08-06 09:25 -------- d-----w- c:\program files\D-Link
2010-08-06 09:25 . 2010-08-06 09:25 -------- d-----w- c:\documents and settings\HP\Application Data\InstallShield
2010-07-28 02:52 . 2010-07-28 02:52 -------- d-----w- c:\program files\CPUID
2010-07-27 10:44 . 2010-07-27 10:44 91424 ----a-w- c:\windows\system32\dnssd.dll
2010-07-27 10:44 . 2010-07-27 10:44 75040 ----a-w- c:\windows\system32\jdns_sd.dll
2010-07-27 10:44 . 2010-07-27 10:44 197920 ----a-w- c:\windows\system32\dnssdX.dll
2010-07-27 10:44 . 2010-07-27 10:44 107808 ----a-w- c:\windows\system32\dns-sd.exe
2010-07-23 02:21 . 2010-07-23 02:21 -------- d-----w- c:\documents and settings\HP\Application Data\runic games
2010-07-23 02:12 . 2010-07-23 02:12 -------- d-----w- c:\program files\Runic Games
2010-07-15 00:55 . 2010-07-15 00:55 68456 ----a-w- c:\documents and settings\HP\Local Settings\Application Data\GDIPFONTCACHEV1.DAT
2010-07-15 00:31 . 2010-07-15 00:31 0 ----a-w- c:\windows\nsreg.dat
2010-07-15 00:18 . 2010-07-13 12:48 87263 ----a-w- c:\windows\pchealth\helpctr\OfflineCache\index.dat
2010-07-13 13:05 . 2008-04-14 12:00 507904 ----a-w- c:\windows\system32\winlogon.exe
2010-07-13 12:45 . 2010-07-13 12:45 21640 ----a-w- c:\windows\system32\emptyregdb.dat
2010-06-30 12:31 . 2008-04-14 12:00 149504 ----a-w- c:\windows\system32\schannel.dll
2010-06-29 16:13 . 2010-09-11 14:42 52224 ----a-w- c:\documents and settings\HP\Application Data\Mozilla\Firefox\Profiles\0pl4cdgb.default\extensions\{7b13ec3e-999a-4b70-b9cb-2617b8323822}\components\FFExternalAlert.dll
2010-06-29 16:13 . 2010-09-11 14:42 101376 ----a-w- c:\documents and settings\HP\Application Data\Mozilla\Firefox\Profiles\0pl4cdgb.default\extensions\{7b13ec3e-999a-4b70-b9cb-2617b8323822}\components\RadioWMPCore.dll
2010-06-24 12:10 . 2008-04-14 12:00 667136 ----a-w- c:\windows\system32\wininet.dll
2010-06-24 12:10 . 2008-04-14 04:41 81920 ----a-w- c:\windows\system32\ieencode.dll
2010-06-23 13:44 . 2008-04-14 12:00 1851904 ----a-w- c:\windows\system32\win32k.sys
2010-06-21 15:27 . 2008-04-14 12:00 354304 ----a-w- c:\windows\system32\drivers\srv.sys
2010-06-17 14:03 . 2008-04-14 04:41 80384 ----a-w- c:\windows\system32\iccvid.dll
.

------- Sigcheck -------

[-] 2010-07-13 . 679A7259741F6A09994F02CE261B5F2E . 507904 . . [5.1.2600.5512] . . c:\windows\system32\winlogon.exe

.
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{99756919-C498-4D97-9E20-2076DE0E42B9}]
2010-08-06 14:14 200704 ----a-w- c:\program files\Wowd\ext\eiexxpw.dll

[HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{D4027C7F-154A-4066-A1AD-4243D8127440}]
2010-05-26 07:23 1385864 ----a-w- c:\program files\Ask.com\GenericAskToolbar.dll

[HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{FD72061E-9FDE-484D-A58A-0BAB4151CAD8}]
2010-02-24 23:01 194912 ------w- c:\program files\Yontoo Layers Client\YontooIEClient.dll

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Toolbar]
"{D4027C7F-154A-4066-A1AD-4243D8127440}"= "c:\program files\Ask.com\GenericAskToolbar.dll" [2010-05-26 1385864]

[HKEY_CLASSES_ROOT\clsid\{d4027c7f-154a-4066-a1ad-4243d8127440}]
[HKEY_CLASSES_ROOT\GenericAskToolbar.ToolbarWnd.1]
[HKEY_CLASSES_ROOT\TypeLib\{2996F0E7-292B-4CAE-893F-47B8B1C05B56}]
[HKEY_CLASSES_ROOT\GenericAskToolbar.ToolbarWnd]

[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Toolbar\Webbrowser]
"{D4027C7F-154A-4066-A1AD-4243D8127440}"= "c:\program files\Ask.com\GenericAskToolbar.dll" [2010-05-26 1385864]

[HKEY_CLASSES_ROOT\clsid\{d4027c7f-154a-4066-a1ad-4243d8127440}]
[HKEY_CLASSES_ROOT\GenericAskToolbar.ToolbarWnd.1]
[HKEY_CLASSES_ROOT\TypeLib\{2996F0E7-292B-4CAE-893F-47B8B1C05B56}]
[HKEY_CLASSES_ROOT\GenericAskToolbar.ToolbarWnd]

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"Messenger (Yahoo!)"="c:\program files\Yahoo!\Messenger\YahooMessenger.exe" [2010-08-25 4433136]
"WowdStartup"="c:\program files\Wowd\wowd.exe" [2010-08-25 52224]
"uTorrent"="c:\program files\uTorrent\uTorrent.exe" [2010-08-06 327472]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"RTHDCPL"="RTHDCPL.EXE" [2006-11-15 16270848]
"igfxtray"="c:\windows\system32\igfxtray.exe" [2006-03-22 94208]
"igfxhkcmd"="c:\windows\system32\hkcmd.exe" [2006-03-22 77824]
"igfxpers"="c:\windows\system32\igfxpers.exe" [2006-03-22 118784]
"SunJavaUpdateSched"="c:\program files\Common Files\Java\Java Update\jusched.exe" [2010-02-18 248040]
"avgnt"="c:\program files\Avira\AntiVir Desktop\avgnt.exe" [2009-03-02 209153]
"GrooveMonitor"="c:\program files\Microsoft Office\Office12\GrooveMonitor.exe" [2006-10-26 31016]
"ANIWZCS2Service"="c:\program files\ANI\ANIWZCS2 Service\WZCSLDR2.exe" [2007-01-19 49152]
"D-Link D-Link Wireless G DWA-110"="c:\program files\D-Link\D-Link Wireless G DWA-110\AirGCFG.exe" [2008-04-15 1675264]
"ClamWin"="c:\program files\ClamWin\bin\ClamTray.exe" [2010-08-25 86016]
"DivXUpdate"="c:\program files\DivX\DivX Update\DivXUpdate.exe" [2010-06-03 1144104]
"Adobe Reader Speed Launcher"="c:\program files\Adobe\Reader 9.0\Reader\Reader_sl.exe" [2010-06-20 35760]
"Adobe ARM"="c:\program files\Common Files\Adobe\ARM\1.0\AdobeARM.exe" [2010-06-09 976832]
"QuickTime Task"="c:\program files\QuickTime\QTTask.exe" [2010-08-09 421888]
"iTunesHelper"="c:\program files\iTunes\iTunesHelper.exe" [2010-09-01 421160]

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\WB]
2009-06-09 01:55 30000 ----a-w- c:\program files\Stardock\MyColors\fastload.dll

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\WBSrv]
2005-12-20 14:57 176128 ----a-w- c:\progra~1\Stardock\OBJECT~1\WINDOW~1\WbSrv.dll

[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\lsa]
Authentication Packages REG_MULTI_SZ msv1_0 nwprovau

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]
"EnableFirewall"= 0 (0x0)

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"%windir%\\system32\\sessmgr.exe"=
"c:\\Program Files\\Yahoo!\\Messenger\\YahooMessenger.exe"=
"c:\\Program Files\\Microsoft Office\\Office12\\OUTLOOK.EXE"=
"c:\\Program Files\\Microsoft Office\\Office12\\GROOVE.EXE"=
"c:\\Program Files\\Microsoft Office\\Office12\\ONENOTE.EXE"=
"c:\\Program Files\\Java\\jre1.6.0_03\\launch4j-tmp\\wowd.exe"=
"c:\\Program Files\\uTorrent\\uTorrent.exe"=
"c:\\Program Files\\Java\\jre6\\launch4j-tmp\\wowd.exe"=
"c:\\games\\Warcraft 1.24d\\Frozen Throne.exe"=
"c:\\WINDOWS\\RTHDCPL.EXE"=
"c:\\Program Files\\Avira\\AntiVir Desktop\\avcenter.exe"=
"c:\\WINDOWS\\ALCMTR.EXE"=
"c:\\WINDOWS\\system32\\igfxtray.exe"=
"c:\\Program Files\\Adobe\\Reader 9.0\\Reader\\Reader_sl.exe"=
"c:\\Program Files\\Mozilla Firefox\\firefox.exe"=
"c:\\WINDOWS\\system32\\hkcmd.exe"=
"c:\\Program Files\\LimeWire\\LimeWire.exe"=
"c:\\Program Files\\Bonjour\\mDNSResponder.exe"=
"c:\\Program Files\\iTunes\\iTunes.exe"=

R2 AntiVirSchedulerService;Avira AntiVir Scheduler;c:\program files\Avira\AntiVir Desktop\sched.exe [7/13/2010 11:02 AM 108289]
R2 cpuz133;cpuz133;c:\windows\system32\drivers\cpuz133_x32.sys [7/28/2010 10:52 AM 20968]
R2 WinFLdrv;WinFLdrv;c:\windows\system32\WinFLdrv.sys [8/7/2010 10:03 AM 17984]
S0 cerc6;cerc6; [x]
S2 gupdate;Google Update Service (gupdate);c:\program files\Google\Update\GoogleUpdate.exe [8/13/2010 11:35 AM 135664]
S3 NDISKIO;NDISKIO;\??\c:\docume~1\HP\LOCALS~1\Temp\00000fa9.nmc\nse\bin\ndiskio.sys --> c:\docume~1\HP\LOCALS~1\Temp\00000fa9.nmc\nse\bin\ndiskio.sys [?]
S3 nsak;nsak;\??\c:\docume~1\HP\LOCALS~1\Temp\00000a79.nmc\nse\bin\nsak.sys --> c:\docume~1\HP\LOCALS~1\Temp\00000a79.nmc\nse\bin\nsak.sys [?]
.
Contents of the 'Scheduled Tasks' folder

2010-09-12 c:\windows\Tasks\AppleSoftwareUpdate.job
- c:\program files\Apple Software Update\SoftwareUpdate.exe [2009-10-22 03:50]

2010-09-13 c:\windows\Tasks\GoogleUpdateTaskMachineCore.job
- c:\program files\Google\Update\GoogleUpdate.exe [2010-08-13 03:35]

2010-09-13 c:\windows\Tasks\GoogleUpdateTaskMachineUA.job
- c:\program files\Google\Update\GoogleUpdate.exe [2010-08-13 03:35]

2010-09-13 c:\windows\Tasks\Scheduled Update for Ask Toolbar.job
- c:\program files\Ask.com\UpdateTask.exe [2010-05-26 07:23]

2010-09-13 c:\windows\Tasks\WGASetup.job
- c:\windows\system32\KB905474\wgasetup.exe [2010-08-28 14:18]
.
.
------- Supplementary Scan -------
.
uStart Page = about:blank
uInternet Settings,ProxyOverride = *.local
IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~2\Office12\EXCEL.EXE/3000
FF - ProfilePath - c:\documents and settings\HP\Application Data\Mozilla\Firefox\Profiles\0pl4cdgb.default\
FF - prefs.js: browser.startup.homepage - hxxp://www.google.com.ph/
FF - component: c:\documents and settings\HP\Application Data\Mozilla\Firefox\Profiles\0pl4cdgb.default\extensions\{300B27DF-97E5-4219-AB2B-03AA67D5D557}\components\eff30pw.dll
FF - plugin: c:\program files\DivX\DivX Plus Web Player\npdivx32.dll
FF - plugin: c:\program files\Google\Update\1.2.183.13\npGoogleOneClick8.dll
FF - plugin: c:\program files\Java\jre6\bin\new_plugin\npdeployJava1.dll
.
- - - - ORPHANS REMOVED - - - -

HKLM-Run-83F45F - c:\windows\system32\304537\83F45F.EXE



**************************************************************************

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2010-09-13 15:40
Windows 5.1.2600 Service Pack 3 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...


c:\windows\system32\sys_drv.dat 6024 bytes
c:\windows\system32\sys_drv_2.dat 5020 bytes
c:\windows\system32\WinFLdrv.sys 17984 bytes executable
c:\windows\system32\LogFiles
c:\documents and settings\HP\Application Data\systemfl.$dk 990 bytes

scan completed successfully
hidden files: 5

**************************************************************************
.
--------------------- LOCKED REGISTRY KEYS ---------------------

[HKEY_USERS\S-1-5-21-1343024091-527237240-1417001333-1003\Software\Microsoft\Windows\CurrentVersion\Explorer\CLSID]
@Denied: (Full) (LocalSystem)

[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{A483C63A-CDBC-426E-BF93-872502E8144E}]
@Denied: (A 2) (Everyone)
@="FlashBroker"
"LocalizedString"="@c:\\WINDOWS\\system32\\Macromed\\Flash\\FlashUtil10h_ActiveX.exe,-101"

[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{A483C63A-CDBC-426E-BF93-872502E8144E}\Elevation]
"Enabled"=dword:00000001

[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{A483C63A-CDBC-426E-BF93-872502E8144E}\LocalServer32]
@="c:\\WINDOWS\\system32\\Macromed\\Flash\\FlashUtil10h_ActiveX.exe"

[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{A483C63A-CDBC-426E-BF93-872502E8144E}\TypeLib]
@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"

[HKEY_LOCAL_MACHINE\software\Classes\Interface\{E3F2C3CB-5EB8-4A04-B22C-7E3B4B6AF30F}]
@Denied: (A 2) (Everyone)
@="IFlashBroker4"

[HKEY_LOCAL_MACHINE\software\Classes\Interface\{E3F2C3CB-5EB8-4A04-B22C-7E3B4B6AF30F}\ProxyStubClsid32]
@="{00020424-0000-0000-C000-000000000046}"

[HKEY_LOCAL_MACHINE\software\Classes\Interface\{E3F2C3CB-5EB8-4A04-B22C-7E3B4B6AF30F}\TypeLib]
@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"
"Version"="1.0"
.
--------------------- DLLs Loaded Under Running Processes ---------------------

- - - - - - - > 'winlogon.exe'(764)
c:\program files\Stardock\MyColors\fastload.dll
c:\progra~1\Stardock\OBJECT~1\WINDOW~1\wbsrv.dll
.
------------------------ Other Running Processes ------------------------
.
c:\program files\Avira\AntiVir Desktop\avguard.exe
c:\program files\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe
c:\program files\Bonjour\mDNSResponder.exe
c:\program files\Java\jre6\bin\jqs.exe
c:\windows\system32\wscntfy.exe
c:\windows\RTHDCPL.EXE
c:\program files\Java\jre6\launch4j-tmp\wowd.exe
c:\program files\LimeWire\LimeWire.exe
c:\program files\iPod\bin\iPodService.exe
c:\program files\Yahoo!\Messenger\ymsgr_tray.exe
.
**************************************************************************
.
Completion time: 2010-09-13 15:50:00 - machine was rebooted
ComboFix-quarantined-files.txt 2010-09-13 07:49

Pre-Run: 5,067,808,768 bytes free
Post-Run: 6,165,643,264 bytes free

WindowsXP-KB310994-SP2-Pro-BootDisk-ENU.exe
[boot loader]
timeout=2
default=multi(0)disk(0)rdisk(0)partition(1)\WINDOWS
[operating systems]
c:\cmdcons\BOOTSECT.DAT="Microsoft Windows Recovery Console" /cmdcons
UnsupportedDebug="do not select this" /debug
multi(0)disk(0)rdisk(0)partition(1)\WINDOWS="Microsoft Windows XP Professional" /noexecute=optin /fastdetect

- - End Of File - - 8F655E00B1CFE8DCE6F51F8BA3B81CBF


#6 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:10:57 AM

Posted 13 September 2010 - 04:20 PM

Please make sure that you can view all hidden files. Instructions on how to do this can be found here:

How to see hidden files in Windows

Go to Jotti

When the jotti page has finished loading, click the Browse button and navigate to the following file and click Submit.

c:\windows\system32\winlogon.exe

Please post back the results of the scan in your next post.

If Jotti is busy, try the same at VirusTotal


Then please run Combofix again, as below

1. Close any open browsers.

2. Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.

3. Open notepad and copy/paste the text in the box below into it:

QUOTE
Driver::
cerc6

RegLock::
[HKEY_USERS\S-1-5-21-1343024091-527237240-1417001333-1003\Software\Microsoft\Windows\CurrentVersion\Explorer\CLSID]
[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{A483C63A-CDBC-426E-BF93-872502E8144E}]
[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{A483C63A-CDBC-426E-BF93-872502E8144E}\Elevation]
[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{A483C63A-CDBC-426E-BF93-872502E8144E}\LocalServer32]
[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{A483C63A-CDBC-426E-BF93-872502E8144E}\TypeLib]
[HKEY_LOCAL_MACHINE\software\Classes\Interface\{E3F2C3CB-5EB8-4A04-B22C-7E3B4B6AF30F}]
[HKEY_LOCAL_MACHINE\software\Classes\Interface\{E3F2C3CB-5EB8-4A04-B22C-7E3B4B6AF30F}\ProxyStubClsid32]
[HKEY_LOCAL_MACHINE\software\Classes\Interface\{E3F2C3CB-5EB8-4A04-B22C-7E3B4B6AF30F}\TypeLib]


Save this as CFScript.txt, in the same location as Comfix.exe (called ComboFix.exe in the below graphic)




Refering to the picture above, drag CFScript into ComboFix.exe

If the program requests for you to update Combofix then click Yes.

When finished, it shall produce a log for you at C:\ComboFix.txt which I will require in your next reply.
Posted Image
m0le is a proud member of UNITE

#7 Kimoi

Kimoi
  • Topic Starter

  • Members
  • 10 posts
  • OFFLINE
  •  
  • Local time:06:57 PM

Posted 14 September 2010 - 03:47 AM

I did the Jotti Malware Scan and it detected nothing:

Filename: winlogon.exe
Status: Scan finished. 0 out of 19 scanners reported malware.

Scan taken on: Tue 14 Sep 2010 10:01:43 (CET) Permalink

Additional info
File size: 507904 bytes
Filetype: PE32 executable for MS Windows (GUI) Intel 80386 32-bit
MD5: 679a7259741f6a09994f02ce261b5f2e
SHA1: 65c19a973b4959f0dfd5c835d014edb2d6acacfe

[ArcaVir]
2010-09-14 Found nothing

[G DATA]
2010-09-14 Found nothing

[Avast! antivirus]
2010-09-13 Found nothing

[Ikarus]
2010-09-14 Found nothing

[Grisoft AVG Anti-Virus]
2010-09-13 Found nothing

[Kaspersky Anti-Virus]
2010-09-13 Found nothing

[Avira AntiVir]
2010-09-13 Found nothing

[ESET NOD32]
2010-09-13 Found nothing

[Softwin BitDefender]
2010-09-14 Found nothing

[Panda Antivirus]
2010-09-13 Found nothing

[ClamAV]
2010-09-14 Found nothing

[Quick Heal]
2010-09-14 Found nothing

[CPsecure]
2010-09-13 Found nothing

[Sophos]
2010-09-14 Found nothing

[Dr.Web]
2010-09-14 Found nothing

[VirusBlokAda VBA32]
2010-09-13 Found nothing

[Frisk F-Prot Antivirus]
2010-09-13 Found nothing

[VirusBuster]
2010-09-13 Found nothing

[F-Secure Anti-Virus]
2010-09-14 Found nothing



Here is my log after the Jotti:

ComboFix 10-09-13.02 - HP 09/14/2010 16:29:55.3.2 - x86
Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.2550.1786 [GMT 8:00]
Running from: c:\documents and settings\HP\Desktop\comfix.exe.exe
AV: AntiVir Desktop *On-access scanning disabled* (Updated) {AD166499-45F9-482A-A743-FDD3350758C7}
.

((((((((((((((((((((((((( Files Created from 2010-08-14 to 2010-09-14 )))))))))))))))))))))))))))))))
.

2010-09-13 07:41 . 2010-09-13 07:41 -------- d-----w- c:\windows\system32\LogFiles
2010-09-13 07:27 . 2010-09-13 07:50 -------- d-----w- C:\comfix.exe
2010-09-12 15:26 . 2008-04-13 21:42 159232 ----a-w- c:\windows\system32\ptpusd.dll
2010-09-12 15:26 . 2001-08-17 14:36 5632 ----a-w- c:\windows\system32\ptpusb.dll
2010-09-12 15:26 . 2008-04-13 16:15 15104 -c--a-w- c:\windows\system32\dllcache\usbscan.sys
2010-09-12 15:26 . 2008-04-13 16:15 15104 ----a-w- c:\windows\system32\drivers\usbscan.sys
2010-09-12 14:52 . 2010-09-12 15:27 -------- d-----w- c:\documents and settings\HP\Application Data\Apple Computer
2010-09-12 14:52 . 2009-05-18 05:17 26600 ----a-w- c:\windows\system32\drivers\GEARAspiWDM.sys
2010-09-12 14:52 . 2008-04-17 04:12 107368 ----a-w- c:\windows\system32\GEARAspi.dll
2010-09-08 08:17 . 2010-09-08 08:17 -------- d-----w- c:\documents and settings\HP\Local Settings\Application Data\Apple
2010-09-08 08:17 . 2010-09-12 15:26 -------- d-----w- c:\documents and settings\All Users\Application Data\Apple
2010-09-08 08:16 . 2010-09-12 14:52 -------- d-----w- c:\documents and settings\HP\Local Settings\Application Data\Apple Computer
2010-09-06 16:24 . 2010-09-06 16:25 -------- d-----w- c:\program files\Common Files\Adobe
2010-09-06 16:17 . 2010-09-06 16:17 -------- d-----w- c:\program files\Common Files\Adobe AIR
2010-09-05 15:53 . 2010-09-05 15:53 -------- d-----w- c:\program files\Free Mouse Auto Clicker
2010-09-05 03:13 . 2010-09-05 03:13 -------- d-----w- c:\documents and settings\HP\Application Data\Media Player Classic
2010-09-04 11:40 . 2010-09-04 15:41 -------- d-----w- c:\documents and settings\HP\Application Data\vlc
2010-09-04 10:00 . 2010-09-04 10:00 -------- d-----w- c:\program files\VideoLAN
2010-09-04 09:59 . 2010-09-04 10:16 -------- d-----w- c:\program files\Graboid
2010-09-01 01:12 . 2010-09-01 01:12 73000 ----a-w- c:\documents and settings\All Users\Application Data\Apple Computer\Installer Cache\iTunes 10.0.0.68\SetupAdmin.exe
2010-08-31 04:42 . 2010-09-13 16:22 -------- d-----w- c:\documents and settings\HP\Local Settings\Application Data\AskToolbar
2010-08-28 07:32 . 2010-08-28 07:32 -------- d-----w- c:\documents and settings\HP\Application Data\Malwarebytes
2010-08-28 07:32 . 2010-04-29 07:39 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2010-08-28 07:32 . 2010-08-28 07:32 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
2010-08-28 07:32 . 2010-08-28 07:32 -------- d-----w- c:\documents and settings\All Users\Application Data\Malwarebytes
2010-08-28 07:32 . 2010-04-29 07:39 20952 ----a-w- c:\windows\system32\drivers\mbam.sys
2010-08-27 22:34 . 2008-05-03 11:55 2560 ------w- c:\windows\system32\xpsp4res.dll
2010-08-26 19:16 . 2008-06-13 11:05 272128 -c----w- c:\windows\system32\dllcache\bthport.sys
2010-08-26 19:16 . 2008-06-13 11:05 272128 ------w- c:\windows\system32\drivers\bthport.sys
2010-08-26 19:12 . 2010-02-24 13:11 455680 -c----w- c:\windows\system32\dllcache\mrxsmb.sys
2010-08-26 19:00 . 2007-07-27 15:11 26488 ----a-w- c:\windows\system32\spupdsvc.exe
2010-08-26 19:00 . 2010-08-28 03:29 -------- d--h--w- c:\windows\$hf_mig$
2010-08-26 12:34 . 2010-04-28 02:25 2189952 -c----w- c:\windows\system32\dllcache\ntoskrnl.exe
2010-08-26 12:34 . 2010-04-27 13:59 2146304 -c----w- c:\windows\system32\dllcache\ntkrnlmp.exe
2010-08-26 12:34 . 2010-04-27 13:05 2066816 -c----w- c:\windows\system32\dllcache\ntkrnlpa.exe
2010-08-26 12:34 . 2010-04-27 13:05 2024448 -c----w- c:\windows\system32\dllcache\ntkrpamp.exe
2010-08-26 03:58 . 2010-08-26 03:59 -------- d-----w- C:\BFU
2010-08-26 03:48 . 2010-08-26 03:48 388096 ----a-r- c:\documents and settings\HP\Application Data\Microsoft\Installer\{45A66726-69BC-466B-A7A4-12FCBA4883D7}\HiJackThis.exe
2010-08-26 03:48 . 2010-08-26 03:48 -------- d-----w- c:\program files\Trend Micro
2010-08-25 15:51 . 2010-08-25 16:16 69632 ----a-w- c:\windows\ALCMTR.EXE
2010-08-25 15:41 . 2010-08-25 16:06 668912 ----a-w- c:\documents and settings\All Users\Application Data\Yahoo!\YUpdater\yupdater.exe
2010-08-25 15:40 . 2010-08-25 15:54 118849 ----a-w- c:\documents and settings\All Users\Application Data\DivX\ControlPanel\Uninstaller.exe
2010-08-25 15:15 . 2010-08-25 15:15 -------- d-----w- c:\windows\system32\OLEDSP32.DLL
2010-08-23 22:56 . 2010-08-23 22:59 -------- d-----w- c:\program files\HyCam2
2010-08-22 17:23 . 2010-08-22 17:23 -------- d-----w- c:\documents and settings\All Users\Application Data\Save Data
2010-08-21 03:09 . 2010-08-21 03:09 -------- d-----w- c:\program files\softendo.com
2010-08-18 11:06 . 2010-08-18 11:06 -------- d--h--w- c:\windows\system32\GroupPolicy

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2010-09-14 08:03 . 2010-08-27 11:29 -------- d-----w- c:\documents and settings\HP\Application Data\LimeWire
2010-09-14 07:41 . 2010-08-06 16:01 -------- d-----w- c:\documents and settings\HP\Application Data\uTorrent
2010-09-13 09:05 . 2010-07-15 00:31 -------- d-----w- c:\program files\Wowd
2010-09-12 14:51 . 2010-09-12 14:51 -------- d-----w- c:\program files\iTunes
2010-09-12 14:51 . 2010-09-12 14:51 -------- d-----w- c:\documents and settings\All Users\Application Data\{429CAD59-35B1-4DBC-BB6D-1DB246563521}
2010-09-12 14:51 . 2010-09-12 14:51 -------- d-----w- c:\program files\iPod
2010-09-12 14:51 . 2010-09-08 08:17 -------- d-----w- c:\program files\Common Files\Apple
2010-09-12 14:51 . 2010-09-08 08:17 -------- d-----w- c:\documents and settings\All Users\Application Data\Apple Computer
2010-09-12 14:51 . 2010-09-12 14:51 -------- d-----w- c:\program files\Apple Software Update
2010-09-12 14:50 . 2010-09-12 14:50 -------- d-----w- c:\program files\Bonjour
2010-09-08 08:18 . 2010-09-08 08:17 -------- d-----w- c:\program files\QuickTime
2010-09-07 17:01 . 2010-07-28 02:52 -------- d-----w- c:\program files\Ask.com
2010-09-05 17:56 . 2010-07-13 02:16 -------- d-----w- c:\program files\Cheat Engine
2010-09-03 12:28 . 2010-08-06 09:20 25 ----a-w- c:\windows\popcinfot.dat
2010-09-03 09:03 . 2010-08-13 03:35 -------- d-----w- c:\program files\Google
2010-08-27 20:40 . 2010-07-13 03:00 -------- d-----w- c:\program files\LimeWire
2010-08-25 16:19 . 2010-08-07 02:03 7680 ----a-w- c:\windows\system32\WinFLsrv.exe
2010-08-25 15:20 . 2010-08-13 14:25 27653280 ----a-w- c:\documents and settings\All Users\Application Data\Yahoo!\YUpdater\msgup1000_1270_us_u2.exe
2010-08-25 15:20 . 2010-07-15 00:32 287744 --s---r- c:\documents and settings\All Users\Application Data\Tarma Installer\{889DF117-14D1-44EE-9F31-C5FB5D47F68B}\Setup.exe
2010-08-25 15:20 . 2010-08-13 04:05 118437 ----a-w- c:\documents and settings\All Users\Application Data\DivX\WebPlayer\Uninstaller.exe
2010-08-25 15:18 . 2010-08-13 04:05 126090 ----a-w- c:\documents and settings\All Users\Application Data\DivX\DivXDecoderShortcut\Uninstaller.exe
2010-08-25 15:18 . 2010-08-13 04:05 115593 ----a-w- c:\documents and settings\All Users\Application Data\DivX\DFXPlugin\Uninstaller.exe
2010-08-25 15:17 . 2010-08-13 04:05 115568 ----a-w- c:\documents and settings\All Users\Application Data\DivX\Converter\Uninstaller.exe
2010-08-23 23:01 . 2010-08-13 04:05 -------- d-----w- c:\documents and settings\HP\Application Data\DivX
2010-08-23 13:13 . 2010-08-07 02:03 -------- d-----w- c:\program files\Folder Lock 6
2010-08-13 04:07 . 2010-08-13 04:07 57344 ----a-w- c:\documents and settings\All Users\Application Data\DivX\RunAsUser\RUNASUSERPROCESS.dll
2010-08-13 04:05 . 2010-08-12 04:00 -------- d-----w- c:\documents and settings\All Users\Application Data\DivX
2010-08-13 04:05 . 2010-08-13 03:34 -------- d-----w- c:\program files\DivX
2010-08-13 04:04 . 2010-08-13 04:04 -------- d-----w- c:\program files\Common Files\DivX Shared
2010-08-13 03:34 . 2010-08-13 04:05 1062184 ----a-w- c:\documents and settings\All Users\Application Data\DivX\Setup\Resource.dll
2010-08-09 21:28 . 2010-07-15 00:31 -------- d-----w- c:\documents and settings\HP\Application Data\Wowd
2010-08-09 21:27 . 2010-08-09 21:27 157184 ----a-w- c:\documents and settings\HP\Application Data\Mozilla\Firefox\Profiles\0pl4cdgb.default\extensions\{300B27DF-97E5-4219-AB2B-03AA67D5D557}\components\eff30pw.dll
2010-08-08 14:37 . 2010-08-08 14:37 503808 ----a-w- c:\documents and settings\HP\Application Data\Sun\Java\Deployment\SystemCache\6.0\4\7ec4bf04-1a666248-n\msvcp71.dll
2010-08-08 14:37 . 2010-08-08 14:37 499712 ----a-w- c:\documents and settings\HP\Application Data\Sun\Java\Deployment\SystemCache\6.0\4\7ec4bf04-1a666248-n\jmc.dll
2010-08-08 14:37 . 2010-08-08 14:37 348160 ----a-w- c:\documents and settings\HP\Application Data\Sun\Java\Deployment\SystemCache\6.0\4\7ec4bf04-1a666248-n\msvcr71.dll
2010-08-08 14:37 . 2010-08-08 14:37 61440 ----a-w- c:\documents and settings\HP\Application Data\Sun\Java\Deployment\SystemCache\6.0\42\4488892a-70f08047-n\decora-sse.dll
2010-08-08 14:37 . 2010-08-08 14:37 12800 ----a-w- c:\documents and settings\HP\Application Data\Sun\Java\Deployment\SystemCache\6.0\42\4488892a-70f08047-n\decora-d3d.dll
2010-08-08 14:36 . 2010-08-08 14:37 411368 ----a-w- c:\windows\system32\deployJava1.dll
2010-08-08 14:36 . 2010-07-13 02:59 -------- d-----w- c:\program files\Java
2010-08-07 03:52 . 2010-07-13 03:02 96104 ----a-w- c:\windows\system32\drivers\avipbb.sys
2010-08-07 03:52 . 2010-07-13 03:02 56816 ----a-w- c:\windows\system32\drivers\avgntflt.sys
2010-08-07 02:03 . 2010-08-07 02:03 180224 ----a-w- c:\windows\system32\WinVd32.sys
2010-08-06 16:14 . 2010-08-06 16:12 -------- d-----w- c:\documents and settings\HP\Application Data\.clamwin
2010-08-06 16:11 . 2010-08-06 16:11 -------- d-----w- c:\program files\ClamWin
2010-08-06 16:02 . 2010-08-06 16:02 -------- d-----w- c:\program files\uTorrent
2010-08-06 14:47 . 2010-07-13 03:01 -------- d-----w- c:\documents and settings\All Users\Application Data\Yahoo!
2010-08-06 09:26 . 2010-08-06 09:26 -------- d-----w- c:\program files\ANI
2010-08-06 09:26 . 2010-07-13 02:48 -------- d--h--w- c:\program files\InstallShield Installation Information
2010-08-06 09:25 . 2010-08-06 09:25 -------- d-----w- c:\program files\D-Link
2010-08-06 09:25 . 2010-08-06 09:25 -------- d-----w- c:\documents and settings\HP\Application Data\InstallShield
2010-07-28 02:52 . 2010-07-28 02:52 -------- d-----w- c:\program files\CPUID
2010-07-27 10:44 . 2010-07-27 10:44 91424 ----a-w- c:\windows\system32\dnssd.dll
2010-07-27 10:44 . 2010-07-27 10:44 75040 ----a-w- c:\windows\system32\jdns_sd.dll
2010-07-27 10:44 . 2010-07-27 10:44 197920 ----a-w- c:\windows\system32\dnssdX.dll
2010-07-27 10:44 . 2010-07-27 10:44 107808 ----a-w- c:\windows\system32\dns-sd.exe
2010-07-23 02:21 . 2010-07-23 02:21 -------- d-----w- c:\documents and settings\HP\Application Data\runic games
2010-07-23 02:12 . 2010-07-23 02:12 -------- d-----w- c:\program files\Runic Games
2010-07-15 00:55 . 2010-07-15 00:55 68456 ----a-w- c:\documents and settings\HP\Local Settings\Application Data\GDIPFONTCACHEV1.DAT
2010-07-15 00:31 . 2010-07-15 00:31 0 ----a-w- c:\windows\nsreg.dat
2010-07-15 00:18 . 2010-07-13 12:48 87263 ----a-w- c:\windows\pchealth\helpctr\OfflineCache\index.dat
2010-07-13 13:05 . 2008-04-14 12:00 507904 ----a-w- c:\windows\system32\winlogon.exe
2010-07-13 12:45 . 2010-07-13 12:45 21640 ----a-w- c:\windows\system32\emptyregdb.dat
2010-06-30 12:31 . 2008-04-14 12:00 149504 ----a-w- c:\windows\system32\schannel.dll
2010-06-29 16:13 . 2010-09-11 14:42 52224 ----a-w- c:\documents and settings\HP\Application Data\Mozilla\Firefox\Profiles\0pl4cdgb.default\extensions\{7b13ec3e-999a-4b70-b9cb-2617b8323822}\components\FFExternalAlert.dll
2010-06-29 16:13 . 2010-09-11 14:42 101376 ----a-w- c:\documents and settings\HP\Application Data\Mozilla\Firefox\Profiles\0pl4cdgb.default\extensions\{7b13ec3e-999a-4b70-b9cb-2617b8323822}\components\RadioWMPCore.dll
2010-06-24 12:10 . 2008-04-14 12:00 667136 ----a-w- c:\windows\system32\wininet.dll
2010-06-24 12:10 . 2008-04-14 04:41 81920 ----a-w- c:\windows\system32\ieencode.dll
2010-06-23 13:44 . 2008-04-14 12:00 1851904 ----a-w- c:\windows\system32\win32k.sys
2010-06-21 15:27 . 2008-04-14 12:00 354304 ----a-w- c:\windows\system32\drivers\srv.sys
2010-06-17 14:03 . 2008-04-14 04:41 80384 ----a-w- c:\windows\system32\iccvid.dll
.

------- Sigcheck -------

[-] 2010-07-13 . 679A7259741F6A09994F02CE261B5F2E . 507904 . . [5.1.2600.5512] . . c:\windows\system32\winlogon.exe

.
((((((((((((((((((((((((((((( SnapShot@2010-09-13_07.40.39 )))))))))))))))))))))))))))))))))))))))))
.
+ 2010-09-14 07:40 . 2010-09-14 07:40 16384 c:\windows\Temp\Perflib_Perfdata_110.dat
.
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{99756919-C498-4D97-9E20-2076DE0E42B9}]
2010-08-06 14:14 200704 ----a-w- c:\program files\Wowd\ext\eiexxpw.dll

[HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{D4027C7F-154A-4066-A1AD-4243D8127440}]
2010-05-26 07:23 1385864 ----a-w- c:\program files\Ask.com\GenericAskToolbar.dll

[HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{FD72061E-9FDE-484D-A58A-0BAB4151CAD8}]
2010-02-24 23:01 194912 ------w- c:\program files\Yontoo Layers Client\YontooIEClient.dll

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Toolbar]
"{D4027C7F-154A-4066-A1AD-4243D8127440}"= "c:\program files\Ask.com\GenericAskToolbar.dll" [2010-05-26 1385864]

[HKEY_CLASSES_ROOT\clsid\{d4027c7f-154a-4066-a1ad-4243d8127440}]
[HKEY_CLASSES_ROOT\GenericAskToolbar.ToolbarWnd.1]
[HKEY_CLASSES_ROOT\TypeLib\{2996F0E7-292B-4CAE-893F-47B8B1C05B56}]
[HKEY_CLASSES_ROOT\GenericAskToolbar.ToolbarWnd]

[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Toolbar\Webbrowser]
"{D4027C7F-154A-4066-A1AD-4243D8127440}"= "c:\program files\Ask.com\GenericAskToolbar.dll" [2010-05-26 1385864]

[HKEY_CLASSES_ROOT\clsid\{d4027c7f-154a-4066-a1ad-4243d8127440}]
[HKEY_CLASSES_ROOT\GenericAskToolbar.ToolbarWnd.1]
[HKEY_CLASSES_ROOT\TypeLib\{2996F0E7-292B-4CAE-893F-47B8B1C05B56}]
[HKEY_CLASSES_ROOT\GenericAskToolbar.ToolbarWnd]

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"Messenger (Yahoo!)"="c:\program files\Yahoo!\Messenger\YahooMessenger.exe" [2010-08-25 4433136]
"WowdStartup"="c:\program files\Wowd\wowd.exe" [2010-08-25 52224]
"uTorrent"="c:\program files\uTorrent\uTorrent.exe" [2010-08-06 327472]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"RTHDCPL"="RTHDCPL.EXE" [2006-11-15 16270848]
"igfxtray"="c:\windows\system32\igfxtray.exe" [2006-03-22 94208]
"igfxhkcmd"="c:\windows\system32\hkcmd.exe" [2006-03-22 77824]
"igfxpers"="c:\windows\system32\igfxpers.exe" [2006-03-22 118784]
"SunJavaUpdateSched"="c:\program files\Common Files\Java\Java Update\jusched.exe" [2010-02-18 248040]
"avgnt"="c:\program files\Avira\AntiVir Desktop\avgnt.exe" [2009-03-02 209153]
"GrooveMonitor"="c:\program files\Microsoft Office\Office12\GrooveMonitor.exe" [2006-10-26 31016]
"ANIWZCS2Service"="c:\program files\ANI\ANIWZCS2 Service\WZCSLDR2.exe" [2007-01-19 49152]
"D-Link D-Link Wireless G DWA-110"="c:\program files\D-Link\D-Link Wireless G DWA-110\AirGCFG.exe" [2008-04-15 1675264]
"ClamWin"="c:\program files\ClamWin\bin\ClamTray.exe" [2010-08-25 86016]
"DivXUpdate"="c:\program files\DivX\DivX Update\DivXUpdate.exe" [2010-06-03 1144104]
"Adobe Reader Speed Launcher"="c:\program files\Adobe\Reader 9.0\Reader\Reader_sl.exe" [2010-06-20 35760]
"Adobe ARM"="c:\program files\Common Files\Adobe\ARM\1.0\AdobeARM.exe" [2010-06-09 976832]
"QuickTime Task"="c:\program files\QuickTime\QTTask.exe" [2010-08-09 421888]
"iTunesHelper"="c:\program files\iTunes\iTunesHelper.exe" [2010-09-01 421160]

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\WB]
2009-06-09 01:55 30000 ----a-w- c:\program files\Stardock\MyColors\fastload.dll

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\WBSrv]
2005-12-20 14:57 176128 ----a-w- c:\progra~1\Stardock\OBJECT~1\WINDOW~1\WbSrv.dll

[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\lsa]
Authentication Packages REG_MULTI_SZ msv1_0 nwprovau

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"%windir%\\system32\\sessmgr.exe"=
"c:\\Program Files\\Yahoo!\\Messenger\\YahooMessenger.exe"=
"c:\\Program Files\\Microsoft Office\\Office12\\OUTLOOK.EXE"=
"c:\\Program Files\\Microsoft Office\\Office12\\GROOVE.EXE"=
"c:\\Program Files\\Microsoft Office\\Office12\\ONENOTE.EXE"=
"c:\\Program Files\\Java\\jre1.6.0_03\\launch4j-tmp\\wowd.exe"=
"c:\\Program Files\\uTorrent\\uTorrent.exe"=
"c:\\Program Files\\Java\\jre6\\launch4j-tmp\\wowd.exe"=
"c:\\games\\Warcraft 1.24d\\Frozen Throne.exe"=
"c:\\WINDOWS\\RTHDCPL.EXE"=
"c:\\Program Files\\Avira\\AntiVir Desktop\\avcenter.exe"=
"c:\\WINDOWS\\ALCMTR.EXE"=
"c:\\WINDOWS\\system32\\igfxtray.exe"=
"c:\\Program Files\\Adobe\\Reader 9.0\\Reader\\Reader_sl.exe"=
"c:\\Program Files\\Mozilla Firefox\\firefox.exe"=
"c:\\WINDOWS\\system32\\hkcmd.exe"=
"c:\\Program Files\\LimeWire\\LimeWire.exe"=
"c:\\Program Files\\Bonjour\\mDNSResponder.exe"=
"c:\\Program Files\\iTunes\\iTunes.exe"=

R2 AntiVirSchedulerService;Avira AntiVir Scheduler;c:\program files\Avira\AntiVir Desktop\sched.exe [7/13/2010 11:02 AM 108289]
R2 cpuz133;cpuz133;c:\windows\system32\drivers\cpuz133_x32.sys [7/28/2010 10:52 AM 20968]
R2 WinFLdrv;WinFLdrv;c:\windows\system32\WinFLdrv.sys [8/7/2010 10:03 AM 17984]
S0 cerc6;cerc6; [x]
S2 gupdate;Google Update Service (gupdate);c:\program files\Google\Update\GoogleUpdate.exe [8/13/2010 11:35 AM 135664]
S3 NDISKIO;NDISKIO;\??\c:\docume~1\HP\LOCALS~1\Temp\00000fa9.nmc\nse\bin\ndiskio.sys --> c:\docume~1\HP\LOCALS~1\Temp\00000fa9.nmc\nse\bin\ndiskio.sys [?]
S3 nsak;nsak;\??\c:\docume~1\HP\LOCALS~1\Temp\00000a79.nmc\nse\bin\nsak.sys --> c:\docume~1\HP\LOCALS~1\Temp\00000a79.nmc\nse\bin\nsak.sys [?]
.
Contents of the 'Scheduled Tasks' folder

2010-09-12 c:\windows\Tasks\AppleSoftwareUpdate.job
- c:\program files\Apple Software Update\SoftwareUpdate.exe [2009-10-22 03:50]

2010-09-14 c:\windows\Tasks\GoogleUpdateTaskMachineCore.job
- c:\program files\Google\Update\GoogleUpdate.exe [2010-08-13 03:35]

2010-09-14 c:\windows\Tasks\GoogleUpdateTaskMachineUA.job
- c:\program files\Google\Update\GoogleUpdate.exe [2010-08-13 03:35]

2010-09-14 c:\windows\Tasks\Scheduled Update for Ask Toolbar.job
- c:\program files\Ask.com\UpdateTask.exe [2010-05-26 07:23]

2010-09-14 c:\windows\Tasks\WGASetup.job
- c:\windows\system32\KB905474\wgasetup.exe [2010-08-28 14:18]
.
.
------- Supplementary Scan -------
.
uStart Page = about:blank
uInternet Settings,ProxyOverride = *.local
IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~2\Office12\EXCEL.EXE/3000
FF - ProfilePath - c:\documents and settings\HP\Application Data\Mozilla\Firefox\Profiles\0pl4cdgb.default\
FF - prefs.js: browser.startup.homepage - hxxp://www.google.com.ph/
FF - component: c:\documents and settings\HP\Application Data\Mozilla\Firefox\Profiles\0pl4cdgb.default\extensions\{300B27DF-97E5-4219-AB2B-03AA67D5D557}\components\eff30pw.dll
FF - plugin: c:\program files\DivX\DivX Plus Web Player\npdivx32.dll
FF - plugin: c:\program files\Google\Update\1.2.183.13\npGoogleOneClick8.dll
FF - plugin: c:\program files\Java\jre6\bin\new_plugin\npdeployJava1.dll
.

**************************************************************************

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2010-09-14 16:34
Windows 5.1.2600 Service Pack 3 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...


c:\windows\system32\sys_drv.dat 6024 bytes
c:\windows\system32\sys_drv_2.dat 5020 bytes
c:\windows\system32\WinFLdrv.sys 17984 bytes executable

scan completed successfully
hidden files: 3

**************************************************************************
.
--------------------- DLLs Loaded Under Running Processes ---------------------

- - - - - - - > 'winlogon.exe'(760)
c:\program files\Stardock\MyColors\fastload.dll
c:\progra~1\Stardock\OBJECT~1\WINDOW~1\wbsrv.dll
.
Completion time: 2010-09-14 16:35:44
ComboFix-quarantined-files.txt 2010-09-14 08:35
ComboFix2.txt 2010-09-13 07:50

Pre-Run: 6,101,577,728 bytes free
Post-Run: 6,090,854,400 bytes free

- - End Of File - - A5127C7C1F57468BAC60ECAF0F7E17D2


#8 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:10:57 AM

Posted 14 September 2010 - 06:25 PM

No problems on those two logs then.

Please run the following program

Please download ATF Cleaner by Atribune.
    Double-click ATF-Cleaner.exe to run the program.
    Under Main "Select Files to Delete" choose: Select All.
    Click the Empty Selected button.
If you use Firefox browser
    Click Firefox at the top and choose: Select All
    Click the Empty Selected button.
    NOTE: If you would like to keep your saved passwords, please click No at the prompt.
If you use Opera browser
    Click Opera at the top and choose: Select All
    Click the Empty Selected button.
    NOTE: If you would like to keep your saved passwords, please click No at the prompt.
Click Exit on the Main menu to close the program.
For Technical Support, double-click the e-mail address located at the bottom of each menu.

NB: If you are using Firefox and this has caused page loading problems then please clear your private data. To do this go
to the Tools menu, select Clear Private Data, and then check Cache. Click Clear Private Data Now.

This could also be Clear Recent History or similar

Then close Firefox and then reopen it.



Now clear your Java cache

To Clear the Java Runtime Environment (JRE) cache, do this:
  • Click Start > Settings > Control Panel.
  • Double-click the Java icon. If you don't see it, go to Other options in the left panel or change to Classic View
    -The Java Control Panel appears.
  • Click "Settings" under Temporary Internet Files.
    -The Temporary Files Settings dialog box appears.
  • Click "Delete Files".
    -The Delete Temporary Files dialog box appears.
    -There are three options on this window to clear the cache.
    • Delete Files
    • Applications and applets
    • Trace and log files
  • Click "OK" on Delete Temporary Files window.
    -Note: This deletes all the Downloaded Applications and Applets from the cache.
  • Click "OK" on Temporary Files Settings window.
  • Close the Java Control Panel.
You can also view these instructions along with screenshots here.


Now run the ESET scanner

  1. Hold down Control and click on the following link to open ESET OnlineScan in a new window.
    ESET OnlineScan
  2. Click the button.
  3. For alternate browsers only: (Microsoft Internet Explorer users can skip these steps)
    1. Click on to download the ESET Smart Installer. Save it to your desktop.
    2. Double click on the icon on your desktop.
  4. Check
  5. Click the button.
  6. Accept any security warnings from your browser.
  7. Leave the top box checked and then check
  8. Push the Start button.
  9. ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this can take some time.
  10. When the scan completes, push
  11. Push , and save the file to your desktop using a unique name, such as ESETScan. Include the contents of this report in your next reply.
  12. Push the button.
  13. Push
NOTE: If no malware is found then no log will be produced. Let me know if this is the case.
Posted Image
m0le is a proud member of UNITE

#9 Kimoi

Kimoi
  • Topic Starter

  • Members
  • 10 posts
  • OFFLINE
  •  
  • Local time:06:57 PM

Posted 15 September 2010 - 01:29 AM

After i finished deleting my cookies with ATF Cleaner and clearing my java's cache, the error when starting firefox is still there. i do not know why :|

Anyway, here is my ESETScan log:

C:\Documents and Settings\HP\Desktop\Dota-Allstars HP Bar viewer A\Inventory A+\Inventory A+.exe probably a variant of Win32/Agent.GCJKSOH trojan cleaned by deleting - quarantined
C:\Documents and Settings\HP\My Documents\Downloads\Dota-Allstars HP Bar viewer A.zip probably a variant of Win32/Agent.GCJKSOH trojan deleted - quarantined
C:\games\Warcraft 1.24d\Warcraft 1.24d.exe Win32/Hakaglan.AH worm cleaned by deleting - quarantined
C:\games\Warcraft 1.24d\AI Scripts\AI Scripts.exe Win32/Hakaglan.AH worm cleaned by deleting - quarantined
C:\games\Warcraft 1.24d\Campaigns\Campaigns.exe Win32/Hakaglan.AH worm cleaned by deleting - quarantined
C:\games\Warcraft 1.24d\Errors\Errors.exe Win32/Hakaglan.AH worm cleaned by deleting - quarantined
C:\games\Warcraft 1.24d\Logs\Logs.exe Win32/Hakaglan.AH worm cleaned by deleting - quarantined
C:\games\Warcraft 1.24d\Maps\Maps.exe Win32/Hakaglan.AH worm cleaned by deleting - quarantined
C:\games\Warcraft 1.24d\Maps\DotA\DotA.exe Win32/Hakaglan.AH worm cleaned by deleting - quarantined
C:\games\Warcraft 1.24d\Maps\DotA\DotA_Allstars_6.51_AIplus_1.52_Revision_02\DotA_Allstars_6.51_AIplus_1.52_Revision_02.exe Win32/Hakaglan.AH worm cleaned by deleting - quarantined
C:\games\Warcraft 1.24d\Maps\Download\Download.exe Win32/Hakaglan.AH worm cleaned by deleting - quarantined
C:\games\Warcraft 1.24d\Maps\FrozenThrone\FrozenThrone.exe Win32/Hakaglan.AH worm cleaned by deleting - quarantined
C:\games\Warcraft 1.24d\Maps\FrozenThrone\Scenario\Scenario.exe Win32/Hakaglan.AH worm cleaned by deleting - quarantined
C:\games\Warcraft 1.24d\redist\redist.exe Win32/Hakaglan.AH worm cleaned by deleting - quarantined
C:\games\Warcraft 1.24d\redist\miles\miles.exe Win32/Hakaglan.AH worm cleaned by deleting - quarantined
C:\games\Warcraft 1.24d\replay\replay.exe Win32/Hakaglan.AH worm cleaned by deleting - quarantined
C:\games\Warcraft 1.24d\save\save.exe Win32/Hakaglan.AH worm cleaned by deleting - quarantined
C:\games\Warcraft 1.24d\save\Multiplayer\Multiplayer.exe Win32/Hakaglan.AH worm cleaned by deleting - quarantined
C:\games\Warcraft 1.24d\Screenshots\Screenshots.exe Win32/Hakaglan.AH worm cleaned by deleting - quarantined
C:\games\Warcraft 1.24d\support\support.exe Win32/Hakaglan.AH worm cleaned by deleting - quarantined
C:\games\Warcraft 1.24d\support\BattleNet\BattleNet.exe Win32/Hakaglan.AH worm cleaned by deleting - quarantined
C:\games\Warcraft 1.24d\support\Images\Images.exe Win32/Hakaglan.AH worm cleaned by deleting - quarantined
C:\games\Warcraft 1.24d\support\Images\ClanIcons\ClanIcons.exe Win32/Hakaglan.AH worm cleaned by deleting - quarantined
C:\games\Warcraft 1.24d\support\Images\Nav\Nav.exe Win32/Hakaglan.AH worm cleaned by deleting - quarantined
C:\games\Warcraft 1.24d\support\Layout\Layout.exe Win32/Hakaglan.AH worm cleaned by deleting - quarantined
C:\games\Warcraft 1.24d\support\Readme\Readme.exe Win32/Hakaglan.AH worm cleaned by deleting - quarantined
C:\games\Warcraft 1.24d\support\Support\Support.exe Win32/Hakaglan.AH worm cleaned by deleting - quarantined
C:\games\Warcraft 1.24d\support\WorldEdit\WorldEdit.exe Win32/Hakaglan.AH worm cleaned by deleting - quarantined
C:\System Volume Information\_restore{4DD36991-9EB7-4364-9A95-E73EC7B602CC}\RP2\A0003675.exe probably a variant of Win32/Agent.GCJKSOH trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{4DD36991-9EB7-4364-9A95-E73EC7B602CC}\RP2\A0003676.exe Win32/Hakaglan.AH worm cleaned by deleting - quarantined
C:\System Volume Information\_restore{4DD36991-9EB7-4364-9A95-E73EC7B602CC}\RP2\A0003677.exe Win32/Hakaglan.AH worm cleaned by deleting - quarantined
C:\System Volume Information\_restore{4DD36991-9EB7-4364-9A95-E73EC7B602CC}\RP2\A0003678.exe Win32/Hakaglan.AH worm cleaned by deleting - quarantined
C:\System Volume Information\_restore{4DD36991-9EB7-4364-9A95-E73EC7B602CC}\RP2\A0003679.exe Win32/Hakaglan.AH worm cleaned by deleting - quarantined
C:\System Volume Information\_restore{4DD36991-9EB7-4364-9A95-E73EC7B602CC}\RP2\A0003680.exe Win32/Hakaglan.AH worm cleaned by deleting - quarantined
C:\System Volume Information\_restore{4DD36991-9EB7-4364-9A95-E73EC7B602CC}\RP2\A0003681.exe Win32/Hakaglan.AH worm cleaned by deleting - quarantined
C:\System Volume Information\_restore{4DD36991-9EB7-4364-9A95-E73EC7B602CC}\RP2\A0003682.exe Win32/Hakaglan.AH worm cleaned by deleting - quarantined
C:\System Volume Information\_restore{4DD36991-9EB7-4364-9A95-E73EC7B602CC}\RP2\A0003683.exe Win32/Hakaglan.AH worm cleaned by deleting - quarantined
C:\System Volume Information\_restore{4DD36991-9EB7-4364-9A95-E73EC7B602CC}\RP2\A0003684.exe Win32/Hakaglan.AH worm cleaned by deleting - quarantined
C:\System Volume Information\_restore{4DD36991-9EB7-4364-9A95-E73EC7B602CC}\RP2\A0003685.exe Win32/Hakaglan.AH worm cleaned by deleting - quarantined
C:\System Volume Information\_restore{4DD36991-9EB7-4364-9A95-E73EC7B602CC}\RP2\A0003686.exe Win32/Hakaglan.AH worm cleaned by deleting - quarantined
C:\System Volume Information\_restore{4DD36991-9EB7-4364-9A95-E73EC7B602CC}\RP2\A0003687.exe Win32/Hakaglan.AH worm cleaned by deleting - quarantined
C:\System Volume Information\_restore{4DD36991-9EB7-4364-9A95-E73EC7B602CC}\RP2\A0003688.exe Win32/Hakaglan.AH worm cleaned by deleting - quarantined
C:\System Volume Information\_restore{4DD36991-9EB7-4364-9A95-E73EC7B602CC}\RP2\A0003689.exe Win32/Hakaglan.AH worm cleaned by deleting - quarantined
C:\System Volume Information\_restore{4DD36991-9EB7-4364-9A95-E73EC7B602CC}\RP2\A0003690.exe Win32/Hakaglan.AH worm cleaned by deleting - quarantined
C:\System Volume Information\_restore{4DD36991-9EB7-4364-9A95-E73EC7B602CC}\RP2\A0003691.exe Win32/Hakaglan.AH worm cleaned by deleting - quarantined
C:\System Volume Information\_restore{4DD36991-9EB7-4364-9A95-E73EC7B602CC}\RP2\A0003692.exe Win32/Hakaglan.AH worm cleaned by deleting - quarantined
C:\System Volume Information\_restore{4DD36991-9EB7-4364-9A95-E73EC7B602CC}\RP2\A0003693.exe Win32/Hakaglan.AH worm cleaned by deleting - quarantined
C:\System Volume Information\_restore{4DD36991-9EB7-4364-9A95-E73EC7B602CC}\RP2\A0003694.exe Win32/Hakaglan.AH worm cleaned by deleting - quarantined
C:\System Volume Information\_restore{4DD36991-9EB7-4364-9A95-E73EC7B602CC}\RP2\A0003695.exe Win32/Hakaglan.AH worm cleaned by deleting - quarantined
C:\System Volume Information\_restore{4DD36991-9EB7-4364-9A95-E73EC7B602CC}\RP2\A0003696.exe Win32/Hakaglan.AH worm cleaned by deleting - quarantined
C:\System Volume Information\_restore{4DD36991-9EB7-4364-9A95-E73EC7B602CC}\RP2\A0003697.exe Win32/Hakaglan.AH worm cleaned by deleting - quarantined
C:\System Volume Information\_restore{4DD36991-9EB7-4364-9A95-E73EC7B602CC}\RP2\A0003698.exe Win32/Hakaglan.AH worm cleaned by deleting - quarantined
C:\System Volume Information\_restore{4DD36991-9EB7-4364-9A95-E73EC7B602CC}\RP2\A0003699.exe Win32/Hakaglan.AH worm cleaned by deleting - quarantined
C:\System Volume Information\_restore{4DD36991-9EB7-4364-9A95-E73EC7B602CC}\RP2\A0003700.exe Win32/Hakaglan.AH worm cleaned by deleting - quarantined
C:\System Volume Information\_restore{4DD36991-9EB7-4364-9A95-E73EC7B602CC}\RP2\A0003701.exe Win32/Hakaglan.AH worm cleaned by deleting - quarantined
C:\WINDOWS\system32\2ED281\dp1.fne probably a variant of Win32/TrojanDownloader.Agent.GLIHXKA trojan cleaned by deleting - quarantined


#10 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:10:57 AM

Posted 15 September 2010 - 06:42 PM

The Warcraft copy was infected. wacko.gif

The Java issue may be something different though. It sounds like a plug-in has gone from the system and the installer can't find it to load it.

Please go into Add/Remove programs and uninstall Java. Now reinstall it and with all its components it should now work.

Let me know.
Posted Image
m0le is a proud member of UNITE

#11 Kimoi

Kimoi
  • Topic Starter

  • Members
  • 10 posts
  • OFFLINE
  •  
  • Local time:06:57 PM

Posted 16 September 2010 - 03:58 AM

So if i delete Warcraft on my computer, the infection will be gone? My AVG still detects several cases of HEUR/MALWARE on different files. :|

Thanks btw. My Mozilla already works fine. :D

Edited by Kimoi, 16 September 2010 - 04:08 AM.


#12 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:10:57 AM

Posted 16 September 2010 - 04:41 PM

QUOTE(Kimoi @ Sep 16 2010, 09:58 AM) View Post
So if i delete Warcraft on my computer, the infection will be gone? My AVG still detects several cases of HEUR/MALWARE on different files. :|


Your Warcraft has already been removed. AVG may still be detecting HEUR/MALWARE from the quarantine folders or it could be that HEUR/MALWARE (which means "it acts like malware") may not be malware at all.


Please run MBAM

Please download Malwarebytes Anti-Malware and save it to your desktop.
  • Make sure you are connected to the Internet.
  • Double-click on mbam-setup.exe to install the application or, if you are using Vista, right-click and select Run As Administrator on mbam-setup.exe to install the application.
  • When the installation begins, follow the prompts and do not make any changes to default settings.
  • When installation has finished, make sure you leave both of these checked:
    • Update Malwarebytes' Anti-Malware
    • Launch Malwarebytes' Anti-Malware
  • Then click Finish.
  • MBAM will automatically start and you will be asked to update the program before performing a scan. If an update is found, the program will automatically update itself. Press the OK button to close that box and continue.
    If MBAM won't update then download and update MBAM on a clean computer then save the rules.ref folder to a memory stick. This file is found here: 'C:\Documents and Settings\All Users\Application Data\Malwarebytes\Malwarebytes' Anti-Malware' then transfer it across to the infected computer.
  • On the Scanner tab:
    • Make sure the "Perform Full Scan" option is selected.
    • Then click on the Scan button.
  • If asked to select the drives to scan, leave all the drives selected and click on the Start Scan button.
  • The scan will begin and "Scan in progress" will show at the top. It may take some time to complete so please be patient.
  • When the scan is finished, a message box will say "The scan completed successfully. Click 'Show Results' to display all objects found".
  • Click OK to close the message box and continue with the removal process.
  • Back at the main Scanner screen, click on the Show Results button to see a list of any malware that was found.
  • Make sure that everything is checked, and click Remove Selected.
  • When removal is completed, a log report will open in Notepad.
  • The log is automatically saved and can be viewed by clicking the Logs tab in MBAM.
  • Copy and paste the contents of that report in your next reply and exit MBAM.
Note: If MBAM encounters a file that is difficult to remove, you may be asked to reboot your computer so it can proceed with the disinfection process. Regardless if prompted to restart the computer or not, please do so immediately. Failure to reboot normally (not into safe mode) will prevent MBAM from removing all the malware. MBAM may make changes to your registry as part of its disinfection routine. If you're using other security programs that detect registry changes, they may alert you after scanning with MBAM. Please permit the program to allow the changes.


And then Superantispyware

Download and scan with SUPERAntiSpyware Free for Home Users
  • Double-click SUPERAntiSpyware.exe and use the default settings for installation.
  • An icon will be created on your desktop. Double-click that icon to launch the program.
  • If asked to update the program definitions, click "Yes". If not, update the definitions before scanning by selecting "Check for Updates". (If you encounter any problems while downloading the updates, manually download them from here. Double-click on the hyperlink for Download Installer and save SASDEFINITIONS.EXE to your desktop. Then double-click on SASDEFINITIONS.EXE to install the definitions.)
  • In the Main Menu, click the Preferences... button.
  • Click the Scanning Control tab.
  • Under Scanner Options make sure the following are checked (leave all others unchecked):
    • Close browsers before scanning.
    • Scan for tracking cookies.
    • Terminate memory threats before quarantining.
  • Click the "Close" button to leave the control center screen.
  • Back on the main screen, under "Scan for Harmful Software" click Scan your computer.
  • On the left, make sure you check C:\Fixed Drive.
  • On the right, under "Complete Scan", choose Perform Complete Scan.
  • Click "Next" to start the scan. Please be patient while it scans your computer.
  • After the scan is complete, a Scan Summary box will appear with potentially harmful items that were detected. Click "OK".
  • Make sure everything has a checkmark next to it and click "Next".
  • A notification will appear that "Quarantine and Removal is Complete". Click "OK" and then click the "Finish" button to return to the main menu.
  • If asked if you want to reboot, click "Yes".
  • To retrieve the removal information after reboot, launch SUPERAntispyware again.
    • Click Preferences, then click the Statistics/Logs tab.
    • Under Scanner Logs, double-click SUPERAntiSpyware Scan Log.
    • If there are several logs, click the current dated log and press View log. A text file will open in your default text editor.
    • Please copy and paste the Scan Log results in your next reply.
  • Click Close to exit the program.

Posted Image
m0le is a proud member of UNITE

#13 Kimoi

Kimoi
  • Topic Starter

  • Members
  • 10 posts
  • OFFLINE
  •  
  • Local time:06:57 PM

Posted 17 September 2010 - 03:17 AM

Before this computer was infected with Sality, those files were not infected at all. :|

Here are my logs.

MBAM:

Malwarebytes' Anti-Malware 1.46
www.malwarebytes.org

Database version: 4636

Windows 5.1.2600 Service Pack 3
Internet Explorer 6.0.2900.5512

9/17/2010 2:14:53 PM
mbam-log-2010-09-17 (14-14-53).txt

Scan type: Full scan (C:\|D:\|E:\|G:\|H:\|I:\|J:\|)
Objects scanned: 229173
Time elapsed: 53 minute(s), 9 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 6

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
C:\WINDOWS\system32\2ED281\cnvpe.fne (Worm.Autorun) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\2ED281\eAPI.fne (Worm.Autorun) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\2ED281\HtmlView.fne (HackTool.Patcher) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\2ED281\internet.fne (HackTool.Patcher) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\2ED281\krnln.fnr (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\2ED281\RegEx.fnr (Worm.AutoRun) -> Quarantined and deleted successfully.



















SUPERAntiSpyware:

SUPERAntiSpyware Scan Log
http://www.superantispyware.com

Generated 09/17/2010 at 03:36 PM

Application Version : 4.43.1000

Core Rules Database Version : 5523
Trace Rules Database Version: 3335

Scan type : Complete Scan
Total Scan Time : 00:54:43

Memory items scanned : 517
Memory threats detected : 0
Registry items scanned : 5578
Registry threats detected : 0
File items scanned : 92534
File threats detected : 183

Adware.Tracking Cookie
C:\Documents and Settings\HP\Cookies\hp@questionmarket[2].txt
C:\Documents and Settings\HP\Cookies\hp@media6degrees[2].txt
C:\Documents and Settings\HP\Cookies\hp@adbrite[2].txt
C:\Documents and Settings\HP\Cookies\hp@ads.pubmatic[2].txt
C:\Documents and Settings\HP\Cookies\hp@ad.yieldmanager[2].txt
C:\Documents and Settings\HP\Cookies\hp@content.yieldmanager[1].txt
C:\Documents and Settings\HP\Cookies\hp@doubleclick[2].txt
C:\Documents and Settings\HP\Cookies\hp@ak[2].txt
C:\Documents and Settings\HP\Cookies\hp@ads.admaxasia[1].txt
C:\Documents and Settings\HP\Cookies\hp@yieldmanager[1].txt
cdn4.specificclick.net [ C:\Documents and Settings\HP\Application Data\Macromedia\Flash Player\#SharedObjects\SQ95FPBG ]
ia.media-imdb.com [ C:\Documents and Settings\HP\Application Data\Macromedia\Flash Player\#SharedObjects\SQ95FPBG ]
media.ign.com [ C:\Documents and Settings\HP\Application Data\Macromedia\Flash Player\#SharedObjects\SQ95FPBG ]
media.scanscout.com [ C:\Documents and Settings\HP\Application Data\Macromedia\Flash Player\#SharedObjects\SQ95FPBG ]
media.y8.com [ C:\Documents and Settings\HP\Application Data\Macromedia\Flash Player\#SharedObjects\SQ95FPBG ]
media1.break.com [ C:\Documents and Settings\HP\Application Data\Macromedia\Flash Player\#SharedObjects\SQ95FPBG ]
msnbcmedia.msn.com [ C:\Documents and Settings\HP\Application Data\Macromedia\Flash Player\#SharedObjects\SQ95FPBG ]
secure-us.imrworldwide.com [ C:\Documents and Settings\HP\Application Data\Macromedia\Flash Player\#SharedObjects\SQ95FPBG ]
.doubleclick.net [ C:\Documents and Settings\HP\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.gostats.com [ C:\Documents and Settings\HP\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
ad.yieldmanager.com [ C:\Documents and Settings\HP\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.content.yieldmanager.com [ C:\Documents and Settings\HP\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.media.contextweb.com [ C:\Documents and Settings\HP\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.media.contextweb.com [ C:\Documents and Settings\HP\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.media.contextweb.com [ C:\Documents and Settings\HP\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.gostats.com [ C:\Documents and Settings\HP\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.server.cpmstar.com [ C:\Documents and Settings\HP\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.server.cpmstar.com [ C:\Documents and Settings\HP\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
fidelity.rotator.hadj7.adjuggler.net [ C:\Documents and Settings\HP\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
fidelity.rotator.hadj7.adjuggler.net [ C:\Documents and Settings\HP\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
fidelity.rotator.hadj7.adjuggler.net [ C:\Documents and Settings\HP\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
fidelity.rotator.hadj7.adjuggler.net [ C:\Documents and Settings\HP\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.www.burstnet.com [ C:\Documents and Settings\HP\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.burstnet.com [ C:\Documents and Settings\HP\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
gogamer.advertserve.com [ C:\Documents and Settings\HP\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.adbrite.com [ C:\Documents and Settings\HP\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.server.cpmstar.com [ C:\Documents and Settings\HP\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
gr.burstnet.com [ C:\Documents and Settings\HP\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.mediadakine.com [ C:\Documents and Settings\HP\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.advertising.com [ C:\Documents and Settings\HP\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
d.mediadakine.com [ C:\Documents and Settings\HP\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.advertising.com [ C:\Documents and Settings\HP\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.yieldmanager.net [ C:\Documents and Settings\HP\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.kontera.com [ C:\Documents and Settings\HP\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.atdmt.com [ C:\Documents and Settings\HP\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.bs.serving-sys.com [ C:\Documents and Settings\HP\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.serving-sys.com [ C:\Documents and Settings\HP\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.serving-sys.com [ C:\Documents and Settings\HP\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.serving-sys.com [ C:\Documents and Settings\HP\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.serving-sys.com [ C:\Documents and Settings\HP\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.serving-sys.com [ C:\Documents and Settings\HP\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.serving-sys.com [ C:\Documents and Settings\HP\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.serving-sys.com [ C:\Documents and Settings\HP\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.interclick.com [ C:\Documents and Settings\HP\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.interclick.com [ C:\Documents and Settings\HP\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.interclick.com [ C:\Documents and Settings\HP\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.adserver.adtechus.com [ C:\Documents and Settings\HP\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.apmebf.com [ C:\Documents and Settings\HP\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.mediaplex.com [ C:\Documents and Settings\HP\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.adtech.de [ C:\Documents and Settings\HP\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
www.3dstats.com [ C:\Documents and Settings\HP\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.imrworldwide.com [ C:\Documents and Settings\HP\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.imrworldwide.com [ C:\Documents and Settings\HP\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.ads.pointroll.com [ C:\Documents and Settings\HP\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.pointroll.com [ C:\Documents and Settings\HP\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.collective-media.net [ C:\Documents and Settings\HP\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.kitnmedia.com [ C:\Documents and Settings\HP\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.revsci.net [ C:\Documents and Settings\HP\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.atdmt.com [ C:\Documents and Settings\HP\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.w3counter.com [ C:\Documents and Settings\HP\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.adbrite.com [ C:\Documents and Settings\HP\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.adscendmedia.com [ C:\Documents and Settings\HP\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.azjmp.com [ C:\Documents and Settings\HP\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.azjmp.com [ C:\Documents and Settings\HP\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.azjmp.com [ C:\Documents and Settings\HP\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.smileycentral.com [ C:\Documents and Settings\HP\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.smileycentral.com [ C:\Documents and Settings\HP\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.smileycentral.com [ C:\Documents and Settings\HP\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
kronos.bravenetmedia.com [ C:\Documents and Settings\HP\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
p231t3s1067682.kronos.bravenetmedia.com [ C:\Documents and Settings\HP\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.lfstmedia.com [ C:\Documents and Settings\HP\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.casalemedia.com [ C:\Documents and Settings\HP\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.lfstmedia.com [ C:\Documents and Settings\HP\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
adserver.adreactor.com [ C:\Documents and Settings\HP\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.casalemedia.com [ C:\Documents and Settings\HP\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.lfstmedia.com [ C:\Documents and Settings\HP\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.collective-media.net [ C:\Documents and Settings\HP\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
in.getclicky.com [ C:\Documents and Settings\HP\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.invitemedia.com [ C:\Documents and Settings\HP\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.collective-media.net [ C:\Documents and Settings\HP\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.collective-media.net [ C:\Documents and Settings\HP\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.invitemedia.com [ C:\Documents and Settings\HP\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.zedo.com [ C:\Documents and Settings\HP\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.zedo.com [ C:\Documents and Settings\HP\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.advertising.com [ C:\Documents and Settings\HP\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.tacoda.net [ C:\Documents and Settings\HP\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.adbrite.com [ C:\Documents and Settings\HP\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.adbrite.com [ C:\Documents and Settings\HP\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
www.googleadservices.com [ C:\Documents and Settings\HP\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.revsci.net [ C:\Documents and Settings\HP\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.mediaplex.com [ C:\Documents and Settings\HP\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.revsci.net [ C:\Documents and Settings\HP\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.revsci.net [ C:\Documents and Settings\HP\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
uk.sitestat.com [ C:\Documents and Settings\HP\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
uk.sitestat.com [ C:\Documents and Settings\HP\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.100questionsbeforemarriage.com [ C:\Documents and Settings\HP\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.100questionsbeforemarriage.com [ C:\Documents and Settings\HP\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.100questionsbeforemarriage.com [ C:\Documents and Settings\HP\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.screensaver-download.com [ C:\Documents and Settings\HP\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.screensaver-download.com [ C:\Documents and Settings\HP\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.screensaver-download.com [ C:\Documents and Settings\HP\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.specificclick.net [ C:\Documents and Settings\HP\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.specificclick.net [ C:\Documents and Settings\HP\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.2o7.net [ C:\Documents and Settings\HP\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.yadro.ru [ C:\Documents and Settings\HP\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.ero-advertising.com [ C:\Documents and Settings\HP\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.ero-advertising.com [ C:\Documents and Settings\HP\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.ero-advertising.com [ C:\Documents and Settings\HP\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.media6degrees.com [ C:\Documents and Settings\HP\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.media6degrees.com [ C:\Documents and Settings\HP\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.invitemedia.com [ C:\Documents and Settings\HP\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.pointroll.com [ C:\Documents and Settings\HP\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.ads.pointroll.com [ C:\Documents and Settings\HP\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.ads.pointroll.com [ C:\Documents and Settings\HP\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.ads.pointroll.com [ C:\Documents and Settings\HP\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.ads.pointroll.com [ C:\Documents and Settings\HP\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.ads.pointroll.com [ C:\Documents and Settings\HP\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.ads.pointroll.com [ C:\Documents and Settings\HP\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.zedo.com [ C:\Documents and Settings\HP\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.revsci.net [ C:\Documents and Settings\HP\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.timeinc.122.2o7.net [ C:\Documents and Settings\HP\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.fastclick.net [ C:\Documents and Settings\HP\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.revsci.net [ C:\Documents and Settings\HP\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.adbrite.com [ C:\Documents and Settings\HP\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.content.yieldmanager.com [ C:\Documents and Settings\HP\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.adbrite.com [ C:\Documents and Settings\HP\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.adecn.com [ C:\Documents and Settings\HP\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.media6degrees.com [ C:\Documents and Settings\HP\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.media6degrees.com [ C:\Documents and Settings\HP\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.advertising.com [ C:\Documents and Settings\HP\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.advertising.com [ C:\Documents and Settings\HP\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.tribalfusion.com [ C:\Documents and Settings\HP\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
ad.yieldmanager.com [ C:\Documents and Settings\HP\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.fastclick.net [ C:\Documents and Settings\HP\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.fastclick.net [ C:\Documents and Settings\HP\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.fastclick.net [ C:\Documents and Settings\HP\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.fastclick.net [ C:\Documents and Settings\HP\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.tacoda.net [ C:\Documents and Settings\HP\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.tacoda.net [ C:\Documents and Settings\HP\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.tacoda.net [ C:\Documents and Settings\HP\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.tacoda.net [ C:\Documents and Settings\HP\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.tacoda.net [ C:\Documents and Settings\HP\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.advertising.com [ C:\Documents and Settings\HP\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.advertising.com [ C:\Documents and Settings\HP\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.at.atwola.com [ C:\Documents and Settings\HP\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.at.atwola.com [ C:\Documents and Settings\HP\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.chitika.net [ C:\Documents and Settings\HP\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.statcounter.com [ C:\Documents and Settings\HP\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.kontera.com [ C:\Documents and Settings\HP\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.kontera.com [ C:\Documents and Settings\HP\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.kontera.com [ C:\Documents and Settings\HP\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.revsci.net [ C:\Documents and Settings\HP\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.revsci.net [ C:\Documents and Settings\HP\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
ad.yieldmanager.com [ C:\Documents and Settings\HP\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.burstnet.com [ C:\Documents and Settings\HP\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.casalemedia.com [ C:\Documents and Settings\HP\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
www.burstnet.com [ C:\Documents and Settings\HP\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.casalemedia.com [ C:\Documents and Settings\HP\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.casalemedia.com [ C:\Documents and Settings\HP\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.casalemedia.com [ C:\Documents and Settings\HP\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.casalemedia.com [ C:\Documents and Settings\HP\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.casalemedia.com [ C:\Documents and Settings\HP\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.casalemedia.com [ C:\Documents and Settings\HP\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.revsci.net [ C:\Documents and Settings\HP\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.revsci.net [ C:\Documents and Settings\HP\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.questionmarket.com [ C:\Documents and Settings\HP\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.questionmarket.com [ C:\Documents and Settings\HP\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.adbrite.com [ C:\Documents and Settings\HP\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
.adbrite.com [ C:\Documents and Settings\HP\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
ad.yieldmanager.com [ C:\Documents and Settings\HP\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]
ad.yieldmanager.com [ C:\Documents and Settings\HP\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies ]

Trojan.Agent/Gen-WormBot
C:\WINDOWS\SYSTEM32\2ED281\SHELL.FNE

Worm.Autorun/Bot
C:\WINDOWS\SYSTEM32\2ED281\SPEC.FNE


#14 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:10:57 AM

Posted 17 September 2010 - 03:52 PM

Polymorphic file infectors are usually more destructive than this.

Please run MBAM again and let's see if any other files have been infected.
Posted Image
m0le is a proud member of UNITE

#15 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:10:57 AM

Posted 20 September 2010 - 10:37 AM

You still there, Kimoi?
Posted Image
m0le is a proud member of UNITE




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users