Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

computers got patched dx trojan


  • This topic is locked This topic is locked
93 replies to this topic

#1 debbie40

debbie40

  • Members
  • 54 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:isle of wight england
  • Local time:11:16 AM

Posted 20 September 2010 - 04:23 PM

hi after looking everywhere for a solution i kept coming back here for advice and after getting no where hope you can help.I am writing from my pc but the problem is with my emachines e520 laptop.Ive run malwarebytes anti malware,avg 9,windows malicious software,super antispyware,and they all find infections that none of them can remove.avg says c\windows\winxs\x86\windows tdi over tcp twice and virus identified win32\patched dx = c\windows\system32\drivers\tdx.sys ,malwarebytes says registry values infected 1 hkey current user /software/microsoft/windows\current\policies\explorer\nofolderoptions(hijack.folderoptions)>delete on reboot + 2 files infected.I can no longer access the internet it says local access only.I
DDS (Ver_10-03-17.01) - NTFSx86
Run by darren at 19:34:09.04 on 20/09/2010
Internet Explorer: 8.0.6001.18943
Microsoft® Windows Vista™ Home Basic 6.0.6002.2.1252.44.1033.18.953.323 [GMT 1:00]

SP: Windows Defender *enabled* (Updated) {D68DDC3A-831F-4FAE-9E44-DA132C1ACF46}
SP: SUPERAntiSpyware *disabled* (Updated) {222A897C-5018-402e-943F-7E7AC8560DA7}

============== Running Processes ===============

C:\Windows\system32\wininit.exe
C:\Program Files\AVG\AVG9\avgchsvx.exe
C:\Program Files\AVG\AVG9\avgrsx.exe
C:\Windows\system32\lsm.exe
C:\Program Files\AVG\AVG9\avgcsrvx.exe
C:\Windows\system32\svchost.exe -k DcomLaunch
C:\Windows\system32\svchost.exe -k rpcss
C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted
C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted
C:\Windows\system32\svchost.exe -k netsvcs
C:\Windows\system32\svchost.exe -k GPSvcGroup
C:\Windows\system32\SLsvc.exe
C:\Windows\system32\svchost.exe -k LocalService
C:\Windows\Explorer.EXE
C:\Windows\system32\Dwm.exe
C:\Windows\system32\WLANExt.exe
C:\Windows\System32\spoolsv.exe
C:\Windows\system32\taskeng.exe
C:\Windows\system32\svchost.exe -k LocalServiceNoNetwork
C:\Program Files\AVG\AVG9\avgwdsvc.exe
C:\Windows\system32\svchost.exe -k bthsvcs
C:\Windows\system32\svchost.exe -k NetworkService
C:\Program Files\EMACHINES\eMachines Recovery Management\Service\ETService.exe
C:\Program Files\Common Files\InterVideo\RegMgr\iviRegMgr.exe
C:\Program Files\Common Files\LightScribe\LSSrvc.exe
C:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted
C:\Windows\system32\svchost.exe -k regsvc
C:\Windows\system32\svchost.exe -k imgsvc
C:\Windows\System32\svchost.exe -k WerSvcGroup
C:\Windows\system32\SearchIndexer.exe
C:\Program Files\AVG\AVG9\avgemc.exe
C:\Program Files\AVG\AVG9\avgcsrvx.exe
C:\Windows\System32\igfxtray.exe
C:\Windows\System32\igfxpers.exe
C:\Windows\RtHDVCpl.exe
C:\Program Files\Common Files\Java\Java Update\jusched.exe
C:\Program Files\Windows Media Player\wmpnscfg.exe
C:\Windows\system32\igfxsrvc.exe
C:\Program Files\Windows Media Player\wmpnetwk.exe
C:\Windows\system32\taskeng.exe
C:\Windows\system32\wbem\wmiprvse.exe
C:\Windows\system32\DllHost.exe
C:\Windows\system32\DllHost.exe
C:\Users\darren\Desktop\cleaning tools\dds.scr
C:\Windows\system32\wbem\wmiprvse.exe

============== Pseudo HJT Report ===============

uStart Page = about:blank
uDefault_Page_URL = hxxp://homepage.emachines.com/rdr.aspx?b=ACEW&l=0809&s=2&o=vb32&d=0210&m=e520
mStart Page = about:blank
mDefault_Page_URL = hxxp://homepage.emachines.com/rdr.aspx?b=ACEW&l=0809&s=2&o=vb32&d=0210&m=e520
uInternet Settings,ProxyOverride = <local>
BHO: AVG Safe Search: {3ca2f312-6f6e-4b53-a66e-4e65e497c8c0} - c:\program files\avg\avg9\avgssie.dll
BHO: Java™ Plug-In 2 SSV Helper: {dbc80044-a445-435b-bc74-9c25c1c588a9} - c:\program files\java\jre6\bin\jp2ssv.dll
TB: {CCC7A320-B3CA-4199-B1A6-9F516DD69829} - No File
uRun: [WMPNSCFG] c:\program files\windows media player\WMPNSCFG.exe
uRun: [SUPERAntiSpyware] c:\program files\superantispyware\SUPERAntiSpyware.exe
mRun: [IgfxTray] c:\windows\system32\igfxtray.exe
mRun: [HotKeysCmds] c:\windows\system32\hkcmd.exe
mRun: [Persistence] c:\windows\system32\igfxpers.exe
mRun: [Skytel] Skytel.exe
mRun: [Malwarebytes Anti-Malware (reboot)] "c:\program files\malwarebytes' anti-malware\mbam.exe" /runcleanupscript
mRun: [RtHDVCpl] RtHDVCpl.exe
mRun: [SunJavaUpdateSched] "c:\program files\common files\java\java update\jusched.exe"
mPolicies-explorer: BindDirectlyToPropertySetStorage = 0 (0x0)
mPolicies-system: EnableUIADesktopToggle = 0 (0x0)
IE: E&xport to Microsoft Excel - c:\progra~1\micros~2\office12\EXCEL.EXE/3000
IE: Google Sidewiki...
IE: {2670000A-7350-4f3c-8081-5663EE0C6C49} - {48E73304-E1D6-4330-914C-F5F514E3486C} - c:\progra~1\micros~2\office12\ONBttnIE.dll
IE: {92780B25-18CC-41C8-B9BE-3C9C571A8263} - {FF059E31-CC5A-4E2E-BF3B-96E929D65503} - c:\progra~1\micros~2\office12\REFIEBAR.DLL
Trusted Zone: microsoft.com\*.windowsupdate
Trusted Zone: microsoft.com\update
Trusted Zone: windowsupdate.com
DPF: {3860DD98-0549-4D50-AA72-5D17D200EE10} - hxxp://cdn.scan.onecare.live.com/resource/download/scanner/en-us/wlscctrl2.cab
DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_21-windows-i586.cab
DPF: {CAFEEFAC-0016-0000-0021-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_21-windows-i586.cab
DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_21-windows-i586.cab
Handler: linkscanner - {F274614C-63F8-47D5-A4D1-FBDDE494F8D1} - c:\program files\avg\avg9\avgpp.dll
Notify: igfxcui - igfxdev.dll
AppInit_DLLs: AVGRSSTX.DLL,avgrsstx.dll

============= SERVICES / DRIVERS ===============

R1 AvgLdx86;AVG Free AVI Loader Driver x86;c:\windows\system32\drivers\avgldx86.sys [2010-9-11 216400]
R1 AvgMfx86;AVG Free On-access Scanner Minifilter Driver x86;c:\windows\system32\drivers\avgmfx86.sys [2010-9-11 29584]
R1 SASDIFSV;SASDIFSV;c:\program files\superantispyware\sasdifsv.sys [2010-2-17 12872]
R1 SASKUTIL;SASKUTIL;c:\program files\superantispyware\SASKUTIL.SYS [2010-5-10 67656]
R2 avg9emc;AVG Free E-mail Scanner;c:\program files\avg\avg9\avgemc.exe [2010-9-11 921952]
R2 avg9wd;AVG Free WatchDog;c:\program files\avg\avg9\avgwdsvc.exe [2010-9-11 308136]
R2 ETService;Empowering Technology Service;c:\program files\emachines\emachines recovery management\service\ETService.exe [2010-2-23 24576]
R2 regi;regi;c:\windows\system32\drivers\regi.sys [2007-4-18 11032]
S1 AvgTdiX;AVG Free Network Redirector;c:\windows\system32\drivers\avgtdix.sys [2010-9-11 243024]
S3 AVG Security Toolbar Service;AVG Security Toolbar Service;c:\program files\avg\avg9\toolbar\toolbarbroker.exe --> c:\program files\avg\avg9\toolbar\ToolbarBroker.exe [?]
S3 hwusbfake;Huawei DataCard USB Fake;c:\windows\system32\drivers\ewusbfake.sys [2010-2-23 103040]

=============== Created Last 30 ================

2010-09-20 18:31:48 0 ----a-w- c:\users\darren\defogger_reenable
2010-09-17 20:31:34 0 d-----w- c:\users\darren\appdata\roaming\SUPERAntiSpyware.com
2010-09-17 20:31:34 0 d-----w- c:\programdata\SUPERAntiSpyware.com
2010-09-17 20:31:16 0 d-----w- c:\program files\SUPERAntiSpyware
2010-09-17 01:04:58 0 d-----w- c:\windows\system32\MpEngineStore
2010-09-16 21:51:09 0 d-----w- c:\windows\system32\eu-ES
2010-09-16 21:51:09 0 d-----w- c:\windows\system32\ca-ES
2010-09-16 21:51:07 0 d-----w- c:\windows\system32\vi-VN
2010-09-16 21:43:48 0 d-----w- c:\windows\system32\SPReview
2010-09-16 21:23:15 928768 ----a-w- c:\windows\system32\scavenge.dll
2010-09-16 21:23:02 57856 ----a-w- c:\windows\system32\compcln.exe
2010-09-16 21:15:59 800768 ----a-w- c:\windows\system32\advapi32.dll
2010-09-16 21:07:23 0 d-----w- c:\windows\system32\EventProviders
2010-09-16 21:06:37 0 d-----w- C:\42ba6321c29b48836134b7
2010-09-16 19:24:00 0 d-----w- c:\programdata\Sun
2010-09-16 19:23:31 423656 ----a-w- c:\windows\system32\deployJava1.dll
2010-09-13 23:48:13 112 ----a-w- c:\programdata\733APK.dat
2010-09-12 20:05:36 0 d-----w- c:\users\darren\appdata\roaming\uTorrent
2010-09-11 15:29:42 0 d--h--w- C:\$AVG
2010-09-11 15:09:57 12536 ----a-w- c:\windows\system32\avgrsstx.dll
2010-09-11 15:09:54 243024 ----a-w- c:\windows\system32\drivers\avgtdix.sys
2010-09-11 15:09:37 216400 ----a-w- c:\windows\system32\drivers\avgldx86.sys
2010-09-11 15:09:33 0 d-----w- c:\windows\system32\drivers\Avg
2010-09-11 13:34:15 0 d-----w- c:\users\darren\appdata\roaming\Malwarebytes
2010-09-11 13:34:04 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2010-09-11 13:34:03 20952 ----a-w- c:\windows\system32\drivers\mbam.sys
2010-09-11 13:34:03 0 d-----w- c:\programdata\Malwarebytes
2010-09-11 13:34:02 0 d-----w- c:\program files\Malwarebytes' Anti-Malware
2010-09-09 21:47:12 779776 ----a-w- c:\windows\system32\drivers\pogot.sys
2010-09-09 21:47:03 5 ----a-w- C:\zrpt.xml
2010-09-09 12:38:14 12 ----a-w- c:\windows\bthservsdp.dat
2010-09-03 22:00:56 0 d-----w- c:\program files\TVersity Codec Pack
2010-09-02 13:48:31 18904 ----a-w- c:\windows\system32\StructuredQuerySchemaTrivial.bin
2010-09-02 13:48:28 11967524 ----a-w- c:\windows\system32\korwbrkr.lex
2010-09-02 00:06:35 0 d-----w- c:\program files\Essentials Codec Pack
2010-09-01 17:51:32 57667 ----a-w- c:\windows\system32\ieuinit.inf
2010-09-01 17:22:27 34304 ----a-w- c:\windows\system32\atmlib.dll
2010-09-01 17:21:42 68096 ----a-w- c:\windows\system32\wlanhlp.dll
2010-09-01 17:20:15 98816 ----a-w- c:\windows\system32\mfps.dll
2010-09-01 17:20:15 53248 ----a-w- c:\windows\system32\rrinstaller.exe
2010-09-01 17:20:15 24576 ----a-w- c:\windows\system32\mfpmp.exe
2010-09-01 17:20:15 2048 ----a-w- c:\windows\system32\mferror.dll
2010-09-01 17:14:03 53248 ----a-w- c:\windows\system32\tsgqec.dll
2010-09-01 17:14:03 136192 ----a-w- c:\windows\system32\aaclient.dll
2010-09-01 17:11:03 1696768 ----a-w- c:\windows\system32\gameux.dll
2010-09-01 16:56:31 293376 ----a-w- c:\windows\system32\browserchoice.exe
2010-09-01 16:28:45 172032 ----a-w- c:\windows\system32\wintrust.dll
2010-09-01 16:28:42 98304 ----a-w- c:\windows\system32\cabview.dll
2010-09-01 16:08:56 65536 --sha-w- c:\users\darren\ntuser.dat{a4a324a4-b5d6-11df-805f-001eecce80d2}.TM.blf
2010-09-01 16:08:56 524288 --sha-w- c:\users\darren\ntuser.dat{a4a324a4-b5d6-11df-805f-001eecce80d2}.TMContainer00000000000000000002.regtrans-ms
2010-09-01 16:08:56 524288 --sha-w- c:\users\darren\ntuser.dat{a4a324a4-b5d6-11df-805f-001eecce80d2}.TMContainer00000000000000000001.regtrans-ms
2010-09-01 15:49:46 0 d-----w- c:\program files\AVG
2010-09-01 15:49:26 0 d-----w- c:\programdata\avg9
2010-09-01 15:40:00 0 d-----w- c:\programdata\CrapCleaner
2010-09-01 15:29:37 2421760 ----a-w- c:\windows\system32\wucltux.dll
2010-09-01 15:29:25 87552 ----a-w- c:\windows\system32\wudriver.dll
2010-09-01 15:29:11 33792 ----a-w- c:\windows\system32\wuapp.exe
2010-09-01 15:29:11 171608 ----a-w- c:\windows\system32\wuwebv.dll
2010-08-26 10:36:34 0 d-----w- c:\users\darren\appdata\roaming\Samsung
2010-08-26 10:35:26 0 d-----w- c:\program files\Samsung

==================== Find3M ====================

2010-09-16 21:59:16 86016 ----a-w- c:\windows\inf\infstor.dat
2010-09-16 21:59:16 51200 ----a-w- c:\windows\inf\infpub.dat
2010-09-16 21:59:16 143360 ----a-w- c:\windows\inf\infstrng.dat
2010-09-16 21:50:55 665600 ----a-w- c:\windows\inf\drvindex.dat
2010-09-16 21:38:21 37665 ----a-w- c:\windows\fonts\GlobalUserInterface.CompositeFont
2010-06-26 06:05:49 916480 ----a-w- c:\windows\system32\wininet.dll
2010-06-26 06:02:15 71680 ----a-w- c:\windows\system32\iesetup.dll
2010-06-26 06:02:15 109056 ----a-w- c:\windows\system32\iesysprep.dll
2010-06-26 04:25:02 133632 ----a-w- c:\windows\system32\ieUnatt.exe
2008-01-21 02:57:01 174 --sha-w- c:\program files\desktop.ini
2006-11-02 12:39:34 30674 ----a-w- c:\windows\inf\perflib\0409\perfd.dat
2006-11-02 12:39:34 30674 ----a-w- c:\windows\inf\perflib\0409\perfc.dat
2006-11-02 12:39:34 287440 ----a-w- c:\windows\inf\perflib\0409\perfi.dat
2006-11-02 12:39:34 287440 ----a-w- c:\windows\inf\perflib\0409\perfh.dat
2006-11-02 09:20:21 287440 ----a-w- c:\windows\inf\perflib\0000\perfi.dat
2006-11-02 09:20:21 287440 ----a-w- c:\windows\inf\perflib\0000\perfh.dat
2006-11-02 09:20:19 30674 ----a-w- c:\windows\inf\perflib\0000\perfd.dat
2006-11-02 09:20:19 30674 ----a-w- c:\windows\inf\perflib\0000\perfc.dat

============= FINISH: 19:35:32.10 ===============
have read the preparation guide and am attaching the files as asked(i hope, ive never done this before} i know how busy you all are and i patiently await your reply.thanx xx

Attached Files



BC AdBot (Login to Remove)

 


#2 Elise

Elise

    Bleepin' Blonde


  • Malware Study Hall Admin
  • 60,817 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:Romania
  • Local time:01:16 PM

Posted 27 September 2010 - 08:16 AM

Hello ,
And welcome.gif to the Bleeping Computer Malware Removal Forum
. My name is Elise and I'll be glad to help you with your computer problems.


I will be working on your malware issues, this may or may not solve other issues you may have with your machine.

Please note that whatever repairs we make, are for fixing your computer problems only and by no means should be used on another computer.
  • The cleaning process is not instant. Logs can take some time to research, so please be patient with me. I know that you need your computer working as quickly as possible, and I will work hard to help see that happen.
  • Please reply using the Add/Reply button in the lower right hand corner of your screen. Do not start a new topic.
  • The logs that you post should be pasted directly into the reply. Only attach them if requested or if they do not fit into the post.
  • Unfortunately, if I do not hear back from you within 5 days, I will be forced to close your topic. If you still need help after I have closed your topic, send me or a moderator a personal message with the address of the thread or feel free to create a new one.
You may want to keep the link to this topic in your favorites. Alternatively, you can click the button at the top bar of this topic and Track this Topic, where you can choose email notifications. The topics you are tracking are shown here.
-----------------------------------------------------------

If you have since resolved the original problem you were having, we would appreciate you letting us know. If not please perform the following steps below so we can have a look at the current condition of your machine.

If you have not done so, include a clear description of the problems you're having, along with any steps you may have performed so far.

If you have already posted a log, please do so again, as your situation may have changed.
Use the 'Add Reply' and add the new log to this thread.

We need to see some information about what is happening in your machine. Please perform the following scan:
  • Please download OTL from one of the following mirrors:
  • Save it to your desktop.
  • Double click on the icon on your desktop.
  • Click the "Scan All Users" checkbox.
  • Push the Quick Scan button.
  • Two reports will open, copy and paste them in a reply here:
    • OTListIt.txt <-- Will be opened
    • Extra.txt <-- Will be minimized

Please download Rootkit Unhooker and save it to your Desktop
  • Double-click on RKUnhookerLE to run it
  • Click the Report tab, then click Scan
  • Check Drivers, Stealth and uncheck the rest
  • Click OK
  • Wait until it's finished and then go to File > Save Report
  • Save the report to your Desktop
Copy the entire contents of the report and paste it in a reply here.

Note - you may get this warning it is ok, just ignore: "Rootkit Unhooker has detected a parasite inside itself!
It is recommended to remove parasite, okay?"


-------------------------------------------------------------
In the meantime please, do NOT install any new programs or update anything unless told to do so while we are fixing your problem

If you still need help, please include the following in your next reply
  • A detailed description of your problems
  • A new OTL log (don't forget extra.txt)
  • RKU log

Thanks and again sorry for the delay.

regards, Elise


"Now faith is the substance of things hoped for, the evidence of things not seen."

 

Follow BleepingComputer on: Facebook | Twitter | Google+ | lockerdome

 

Malware analyst @ Emsisoft


#3 debbie40

debbie40
  • Topic Starter

  • Members
  • 54 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:isle of wight england
  • Local time:11:16 AM

Posted 28 September 2010 - 09:19 AM

hi elise,thanx for helping me with this .i havent used my laptop(which has the prob) since i first posted.the other programmes i have used (the ones i mention in my first post) got rid of some stuff but its the stuff still on there thats causing probs.cant get online at all so im using my pc for this.ive run the scans you asked and posted the results.i couldnt copy and paste(it wouldnt let me paste) so ive attached the logs.i hope this is ok .

Attached Files


Edited by debbie40, 28 September 2010 - 09:27 AM.


#4 Elise

Elise

    Bleepin' Blonde


  • Malware Study Hall Admin
  • 60,817 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:Romania
  • Local time:01:16 PM

Posted 28 September 2010 - 09:27 AM

Hello again,

COMBOFIX
---------------
Please download ComboFix from one of these locations:
  • Disable your AntiVirus and AntiSpyware applications, usually via a right click on the System Tray icon. They may otherwise interfere with our tools. (Click on this link to see a list of programs that should be disabled. The list is not all inclusive.)
  • Double click on Combofix.exe and follow the prompts.
  • As part of it's process, ComboFix will check to see if the Microsoft Windows Recovery Console is installed. With malware infections being as they are today, it's strongly recommended to have this pre-installed on your machine before doing any malware removal. It will allow you to boot up into a special recovery/repair mode that will allow us to more easily help you should your computer have a problem after an attempted removal of malware.
  • Follow the prompts to allow ComboFix to download and install the Microsoft Windows Recovery Console, and when prompted, agree to the End-User License Agreement to install the Microsoft Windows Recovery Console.
**Please note: If the Microsoft Windows Recovery Console is already installed, or if you are running Vista, ComboFix will continue it's malware removal procedures.



Once the Microsoft Windows Recovery Console is installed using ComboFix, you should see the following message:



Click on Yes, to continue scanning for malware.

When finished, it shall produce a log for you. Please include the C:\ComboFix.txt in your next reply.

regards, Elise


"Now faith is the substance of things hoped for, the evidence of things not seen."

 

Follow BleepingComputer on: Facebook | Twitter | Google+ | lockerdome

 

Malware analyst @ Emsisoft


#5 debbie40

debbie40
  • Topic Starter

  • Members
  • 54 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:isle of wight england
  • Local time:11:16 AM

Posted 28 September 2010 - 11:06 AM

heres the combofix log

Attached Files



#6 Elise

Elise

    Bleepin' Blonde


  • Malware Study Hall Admin
  • 60,817 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:Romania
  • Local time:01:16 PM

Posted 28 September 2010 - 11:33 AM

Hello there, still some cleanup to do.

CF-SCRIPT
-------------
We need to execute a CF-script.
  • Close any open browsers.
  • Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.
  • Click Start > Run and in the box that opens type notepad and press enter. Copy/paste the text in the codebox below into it:
CODE
RenV::
c:\program files\Adobe\Reader 8.0\Reader\Reader_sl .exe
c:\program files\AVG\AVG9\avgtray .exe
c:\program files\Launch Manager\LManager .exe
c:\program files\Malwarebytes' Anti-Malware\mbam .exe

Registry::
[-HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Ewapotuqoleziba]
[-HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\LvkoZkfgota]
[-HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\LvkoZkfgpuc]
[-HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\LvkoZkfgqvO]
[-HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Trejamujo]
[-HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\vcwfurmv]
[-HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\YXE7DXCQ37]

Save this as CFScript.txt, in the same location as ComboFix.exe



Refering to the picture above, drag CFScript into ComboFix.exe

When finished, it shall produce a log for you at C:\ComboFix.txt which I will require in your next reply.

regards, Elise


"Now faith is the substance of things hoped for, the evidence of things not seen."

 

Follow BleepingComputer on: Facebook | Twitter | Google+ | lockerdome

 

Malware analyst @ Emsisoft


#7 debbie40

debbie40
  • Topic Starter

  • Members
  • 54 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:isle of wight england
  • Local time:11:16 AM

Posted 28 September 2010 - 01:17 PM

hi elise heres the log

Attached Files



#8 Elise

Elise

    Bleepin' Blonde


  • Malware Study Hall Admin
  • 60,817 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:Romania
  • Local time:01:16 PM

Posted 28 September 2010 - 03:06 PM

Hello again, please run the following as a CFScript (instructions as last time). Post me the resulting log.

CODE
Driver::
pogot

Rootkit::
c:\windows\system32\drivers\pogot.sys

RenV::
c:\program files\Adobe\Reader 8.0\Reader\Reader_sl .exe
c:\program files\AVG\AVG9\avgtray .exe
c:\program files\Launch Manager\LManager .exe
c:\program files\Malwarebytes' Anti-Malware\mbam .exe

regards, Elise


"Now faith is the substance of things hoped for, the evidence of things not seen."

 

Follow BleepingComputer on: Facebook | Twitter | Google+ | lockerdome

 

Malware analyst @ Emsisoft


#9 debbie40

debbie40
  • Topic Starter

  • Members
  • 54 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:isle of wight england
  • Local time:11:16 AM

Posted 28 September 2010 - 03:49 PM

i have tried this last step 4 times and each time it comes up with a red x in a box saying c\users\darren\desktop\combofix.exe "Illegal operation attemted on registry key that has been marked for deletion " and wont continue.im sure ive done it the same as last time. it does this if i click on combofix.exe or CFScript.txt

Edited by debbie40, 28 September 2010 - 03:51 PM.


#10 Elise

Elise

    Bleepin' Blonde


  • Malware Study Hall Admin
  • 60,817 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:Romania
  • Local time:01:16 PM

Posted 28 September 2010 - 03:52 PM

Please restart your computer, then try again. smile.gif

regards, Elise


"Now faith is the substance of things hoped for, the evidence of things not seen."

 

Follow BleepingComputer on: Facebook | Twitter | Google+ | lockerdome

 

Malware analyst @ Emsisoft


#11 debbie40

debbie40
  • Topic Starter

  • Members
  • 54 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:isle of wight england
  • Local time:11:16 AM

Posted 28 September 2010 - 04:27 PM

ok elise thanx that worked thumbup.gif the computer scanned and then restarted and this is the log.it is getting late now so i will check back tomorrow.thanx for all the help so far

Attached Files


Edited by debbie40, 28 September 2010 - 05:06 PM.


#12 Elise

Elise

    Bleepin' Blonde


  • Malware Study Hall Admin
  • 60,817 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:Romania
  • Local time:01:16 PM

Posted 29 September 2010 - 01:37 AM

Hi, that is looking a whole lot better already. smile.gif How are things running now? Any problems left?


MALWAREBYTES ANTIMALWARE
-------------------------------------------
Please launch MBAM and update the program before performing a scan.
  • If an update is found, the program will automatically update itself. Press the OK button to close that box and continue.
  • If you encounter any problems while downloading the definition updates, manually download them from here and just double-click on mbam-rules.exe to install.
On the Scanner tab:
  • Make sure the "Perform Full Scan" option is selected.
  • Then click on the Scan button.
  • If asked to select the drives to scan, leave all the drives selected and click on the Start Scan button.
  • The scan will begin and "Scan in progress" will show at the top. It may take some time to complete so please be patient.
  • When the scan is finished, a message box will say "The scan completed successfully. Click 'Show Results' to display all objects found".
  • Click OK to close the message box and continue with the removal process.
Back at the main Scanner screen:
  • Click on the Show Results button to see a list of any malware that was found.
  • Make sure that everything is checked, and click Remove Selected.
  • When removal is completed, a log report will open in Notepad.
  • The log is automatically saved and can be viewed by clicking the Logs tab in MBAM.
  • Copy and paste the contents of that report in your next reply. Be sure to post the complete log to include the top portion which shows MBAM's database version and your operating system.
  • Exit MBAM when done.
Note: If MBAM encounters a file that is difficult to remove, you will be asked to reboot your computer so MBAM can proceed with the disinfection process. If asked to restart the computer, please do so immediately. Failure to reboot normally (not into safe mode) will prevent MBAM from removing all the malware.

regards, Elise


"Now faith is the substance of things hoped for, the evidence of things not seen."

 

Follow BleepingComputer on: Facebook | Twitter | Google+ | lockerdome

 

Malware analyst @ Emsisoft


#13 debbie40

debbie40
  • Topic Starter

  • Members
  • 54 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:isle of wight england
  • Local time:11:16 AM

Posted 29 September 2010 - 08:35 AM

hi elise ive been busy this morn so im gonna do the next bit now.will get back to you when done thumbup2.gif

Edited by debbie40, 29 September 2010 - 08:46 AM.


#14 Elise

Elise

    Bleepin' Blonde


  • Malware Study Hall Admin
  • 60,817 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:Romania
  • Local time:01:16 PM

Posted 29 September 2010 - 09:39 AM

Okay, thank you for letting me know.

regards, Elise


"Now faith is the substance of things hoped for, the evidence of things not seen."

 

Follow BleepingComputer on: Facebook | Twitter | Google+ | lockerdome

 

Malware analyst @ Emsisoft


#15 debbie40

debbie40
  • Topic Starter

  • Members
  • 54 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:isle of wight england
  • Local time:11:16 AM

Posted 29 September 2010 - 10:32 AM

hi elise all done 1 item removed heres the log

Attached Files


Edited by debbie40, 29 September 2010 - 10:39 AM.





0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users