Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Infected with Trojan.Bamital!inf and possibly another virus.


  • This topic is locked This topic is locked
97 replies to this topic

#1 Skitz69

Skitz69

  • Members
  • 51 posts
  • OFFLINE
  •  
  • Local time:11:05 AM

Posted 28 September 2010 - 02:11 AM

Hey all.
I recently got infected with Trojan.Bamital!inf and Symantec Endpoint Protection picked this up. The file name this trojan uses is wininit.exe which I believe is a windows process. The scanner only logged the risk, but didn't delete it, at least not to my knowledge. The symantec site lists way to remove the trojan. I followed the steps and went to the registry but was unable to find the registry entries I was supposed to delete.

I've done scans with updated Malwarebytes and SuperAntiSpyware and both didn't find anything on full scans. I also scanned in safe mode.

I also believe there is another virus because occasionally my task bar doesn't not respond and windows asks if I want to refresh it in order to get it to work.

I was unable to get a gmer log as it says: C:\Windows\System32\config\system: The system cannot find the file specified.
This leaves gmer only able to scan services, registry and files in C, but no other options. The scan revealed no results in these sections.

Thanks in advance.

Here is my dds.text log:



DDS (Ver_10-03-17.01) - NTFSX64
Run by USER at 14:35:41.75 on Tue 28/09/2010
Internet Explorer: 8.0.7600.16385 BrowserJavaVersion: 1.6.0_17
Microsoft Windows 7 Enterprise 6.1.7600.0.1252.61.1033.18.1913.434 [GMT 8:00]

SP: SUPERAntiSpyware *enabled* (Updated) {222A897C-5018-402e-943F-7E7AC8560DA7}

============== Running Processes ===============

C:\Windows\system32\wininit.exe
C:\Windows\system32\lsm.exe
C:\Windows\system32\svchost.exe -k DcomLaunch
C:\Program Files (x86)\Novell\CASA\bin\micasad.exe
C:\Windows\system32\svchost.exe -k RPCSS
C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted
C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted
C:\Windows\system32\svchost.exe -k netsvcs
C:\Windows\system32\svchost.exe -k LocalService
C:\Program Files (x86)\Symantec\Symantec Endpoint Protection\Smc.exe
C:\Windows\system32\svchost.exe -k NetworkService
C:\Program Files (x86)\Novell\ZENworks\bin\ZenworksWindowsService.exe
C:\Program Files (x86)\Common Files\Symantec Shared\ccSvcHst.exe
C:\Windows\System32\spoolsv.exe
C:\Windows\system32\svchost.exe -k LocalServiceNoNetwork
C:\Program Files\SUPERAntiSpyware\SASCORE64.EXE
C:\Windows\system32\svchost.exe -k apphost
C:\Program Files (x86)\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe
C:\Program Files (x86)\Bonjour\mDNSResponder.exe
C:\Program Files (x86)\Common Files\Microsoft Shared\VS7DEBUG\mdm.exe
C:\Windows\Microsoft.NET\Framework64\v3.0\Windows Communication Foundation\SMSvcHost.exe
C:\Program Files (x86)\CDBurnerXP\NMSAccessU.exe
C:\Program Files (x86)\Novell\ZENworks\bin\nzrWinVNC.exe
C:\Program Files (x86)\Novell\ZENworks\bin\nzrWinVNCApp.exe
C:\Program Files (x86)\Symantec\Symantec Endpoint Protection\Rtvscan.exe
C:\Windows\system32\svchost.exe -k iissvcs
C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSVC.EXE
C:\Windows\system32\SearchIndexer.exe
C:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted
C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSvcM.exe
C:\Windows\system32\taskhost.exe
C:\Program Files (x86)\Symantec\Symantec Endpoint Protection\SmcGui.exe
C:\Program Files (x86)\Symantec\Symantec Endpoint Protection\ProtectionUtilSurrogate.exe
C:\Program Files\Apoint2K\Apoint.exe
C:\Windows\System32\igfxtray.exe
C:\Windows\System32\igfxpers.exe
C:\Program Files (x86)\NetMeter\NetMeter.exe
C:\Program Files (x86)\Pasco scientific\DataStudio\PASPortal.exe
C:\Program Files (x86)\Pasco scientific\DataStudio\PASPortal.exe
C:\Windows\system32\igfxsrvc.exe
C:\Program Files (x86)\Common Files\Symantec Shared\ccApp.exe
C:\Program Files\Apoint2K\ApMsgFwd.exe
C:\Program Files (x86)\Novell\ZENworks\bin\ZenUserDaemon.exe
C:\Program Files\Apoint2K\HidFind.exe
C:\Program Files\Apoint2K\Apntex.exe
C:\Windows\system32\conhost.exe
C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\AdobeARM.exe
C:\Users\USER\AppData\Local\Google\Update\1.2.183.29\GoogleCrashHandler.exe
C:\Program Files (x86)\iTunes\iTunesHelper.exe
C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation
C:\Program Files\Windows Media Player\wmpnetwk.exe
C:\Program Files\iPod\bin\iPodService.exe
C:\Program Files\Common Files\Microsoft Shared\Ink\InputPersonalization.exe
C:\Program Files\SUPERAntiSpyware\SUPERANTISPYWARE.EXE
C:\Users\lUSER\AppData\Local\Google\Chrome\Application\chrome.exe
C:\Users\USER\AppData\Local\Google\Chrome\Application\chrome.exe
C:\Users\USER\AppData\Local\Google\Chrome\Application\chrome.exe
C:\Users\USER\AppData\Local\Google\Chrome\Application\chrome.exe
C:\Users\USER\AppData\Local\Google\Chrome\Application\chrome.exe
C:\Windows\system32\taskhost.exe
C:\Program Files (x86)\IObit\IObit Security 360\is360.exe
C:\Program Files (x86)\IObit\IObit Security 360\is360tray.exe
C:\Program Files (x86)\IObit\IObit Security 360\IS360srv.exe
C:\Users\USER\AppData\Local\Google\Chrome\Application\chrome.exe
C:\Users\USER\AppData\Local\Google\Chrome\Application\chrome.exe
C:\Users\USER\AppData\Local\Google\Chrome\Application\chrome.exe
C:\Windows\System32\rundll32.exe
C:\Windows\Explorer.EXE
C:\Users\USER\AppData\Local\Google\Chrome\Application\chrome.exe
C:\Program Files (x86)\Symantec\Symantec Endpoint Protection\SymCorpUI.exe
C:\Windows\system32\taskeng.exe
C:\Windows\system32\taskeng.exe
C:\Windows\system32\SearchProtocolHost.exe
C:\Windows\system32\SearchFilterHost.exe
D:\Documents\Ant\dds.scr
C:\Windows\system32\conhost.exe
C:\Windows\system32\wbem\wmiprvse.exe

============== Pseudo HJT Report ===============

uStart Page = www.google.com
mLocal Page = c:\windows\syswow64\blank.htm
uInternet Settings,ProxyOverride = <local>;*.local
BHO: Adobe PDF Link Helper: {18df081c-e8ad-4283-a596-fa578c2ebdc3} - c:\program files (x86)\common files\adobe\acrobat\activex\AcroIEHelperShim.dll
BHO: {5C255C8A-E604-49b4-9D64-90988571CECB} - No File
BHO: Groove GFS Browser Helper: {72853161-30c5-4d22-b7f9-0bbc1d38a37e} - c:\program files (x86)\microsoft office\office12\GrooveShellExtensions.dll
BHO: Windows Live ID Sign-in Helper: {9030d464-4c02-4abf-8ecc-5164760863c6} - c:\program files (x86)\common files\microsoft shared\windows live\WindowsLiveLogin.dll
BHO: Ask Toolbar: {d4027c7f-154a-4066-a1ad-4243d8127440} - c:\program files (x86)\ask.com\GenericAskToolbar.dll
BHO: Java™ Plug-In 2 SSV Helper: {dbc80044-a445-435b-bc74-9c25c1c588a9} - c:\program files (x86)\java\jre6\bin\jp2ssv.dll
TB: Ask Toolbar: {d4027c7f-154a-4066-a1ad-4243d8127440} - c:\program files (x86)\ask.com\GenericAskToolbar.dll
uRun: [c:\program files (x86)\netmeter\netmeter.exe] c:\program files (x86)\netmeter\NetMeter.exe
uRun: [Google Update] "c:\users\USER\appdata\local\google\update\GoogleUpdate.exe" /c
uRun: [msnmsgr] "c:\program files (x86)\windows live\messenger\msnmsgr.exe" /background
mRun: [ccApp] "c:\program files (x86)\common files\symantec shared\ccApp.exe"
mRun: [ZenNotifyIcon] c:\program files (x86)\novell\zenworks\bin\ZenNotifyIcon.exe
mRun: [ZENWorksUserDaemon] c:\program files (x86)\novell\zenworks\bin\ZenUserDaemon.exe
mRun: [NalView] c:\program files (x86)\novell\zenworks\bin\nalview.exe
mRun: [Adobe Reader Speed Launcher] "c:\program files (x86)\adobe\reader 9.0\reader\Reader_sl.exe"
mRun: [Adobe ARM] "c:\program files (x86)\common files\adobe\arm\1.0\AdobeARM.exe"
mRun: [QuickTime Task] "c:\program files (x86)\quicktime\QTTask.exe" -atboottime
mRun: [iTunesHelper] "c:\program files (x86)\itunes\iTunesHelper.exe"
mRun: [Malwarebytes Anti-Malware (reboot)] "d:\documents\malwarebytes' anti-malware\mbam.exe" /runcleanupscript
mRun: [IObit Security 360] "c:\program files (x86)\iobit\iobit security 360\IS360tray.exe" /autostart
StartupFolder: c:\progra~3\micros~1\windows\startm~1\programs\startup\paspor~1.lnk - c:\windows\installer\{69cd58cd-d8ec-4db4-981b-1c256f105c7b}\NewShortcut1.exe
StartupFolder: c:\progra~3\micros~1\windows\startm~1\programs\startup\paspor~1.lnk - c:\windows\installer\{69cd58cd-d8ec-4db4-981b-1c256f105c7b}\NewShortcut1.exe
uPolicies-explorer: NoThemesTab = 1 (0x1)
uPolicies-explorer: NoDesktopCleanupWizard = 1 (0x1)
uPolicies-explorer: NoCloseDragDropBands = 1 (0x1)
uPolicies-explorer: NoMovingBands = 1 (0x1)
uPolicies-explorer: NoStartMenuMyGames = 1 (0x1)
uPolicies-explorer: NoSearchProgramsInStartMenu = 1 (0x1)
uPolicies-explorer: NoSetTaskbar = 1 (0x1)
uPolicies-explorer: NoToolbarsOnTaskbar = 1 (0x1)
uPolicies-explorer: NoTrayContextMenu = 1 (0x1)
uPolicies-explorer: TaskbarLockAll = 1 (0x1)
uPolicies-explorer: TaskbarNoAddRemoveToolbar = 1 (0x1)
uPolicies-explorer: TaskbarNoDragToolbar = 1 (0x1)
uPolicies-explorer: TaskbarNoResize = 1 (0x1)
uPolicies-explorer: NoNetConnectDisconnect = 1 (0x1)
uPolicies-explorer: NoInplaceSharing = 1 (0x1)
uPolicies-explorer: NoChangeStartMenu = 1 (0x1)
uPolicies-explorer: HideSCAHealth = 1 (0x1)
uPolicies-explorer: NoActiveDesktopChanges = 1 (0x1)
uPolicies-system: NoDispSettingsPage = 1 (0x1)
uPolicies-system: NoColorChoice = 1 (0x1)
uPolicies-system: NoVisualStyleChoice = 1 (0x1)
uPolicies-system: NoSizeChoice = 1 (0x1)
uPolicies-system: Wallpaper = c:\windows\web\wallpaper\school backgrounds\Wallpaper.jpg
uPolicies-system: WallpaperStyle = 2
uPolicies-system: NoDispAppearancePage = 0 (0x0)
mPolicies-explorer: NoActiveDesktop = 1 (0x1)
mPolicies-explorer: NoActiveDesktopChanges = 1 (0x1)
mPolicies-explorer: ForceActiveDesktopOn = 0 (0x0)
mPolicies-explorer: HideSCAHealth = 1 (0x1)
mPolicies-explorer: NoWelcomeScreen = 1 (0x1)
mPolicies-explorer: UseDefaultTile = 1 (0x1)
mPolicies-system: ConsentPromptBehaviorAdmin = 0 (0x0)
mPolicies-system: ConsentPromptBehaviorUser = 3 (0x3)
mPolicies-system: EnableLUA = 0 (0x0)
mPolicies-system: EnableUIADesktopToggle = 0 (0x0)
mPolicies-system: PromptOnSecureDesktop = 0 (0x0)
dPolicies-explorer: HideSCAHealth = 1 (0x1)
IE: E&xport to Microsoft Excel - c:\progra~2\micros~1\office12\EXCEL.EXE/3000
IE: {219C3416-8CB2-491a-A3C7-D9FCDDC9D600} - {5F7B1267-94A9-47F5-98DB-E99415F33AEC} - c:\program files (x86)\windows live\writer\WriterBrowserExtension.dll
IE: {2670000A-7350-4f3c-8081-5663EE0C6C49} - {48E73304-E1D6-4330-914C-F5F514E3486C} - c:\progra~2\micros~1\office12\ONBttnIE.dll
IE: {92780B25-18CC-41C8-B9BE-3C9C571A8263} - {FF059E31-CC5A-4E2E-BF3B-96E929D65503} - c:\progra~2\micros~1\office12\REFIEBAR.DLL
Trusted Zone: portal
Trusted Zone: wa.edu.au\portal.allsaints
DPF: {233C1507-6A77-46A4-9443-F871F945D258} - hxxp://download.macromedia.com/pub/shockwave/cabs/director/sw.cab
DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_17-windows-i586.cab
DPF: {CAFEEFAC-0016-0000-0017-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_17-windows-i586.cab
DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_17-windows-i586.cab
DPF: {E2883E8F-472F-4FB0-9522-AC9BF37916A7} - hxxp://platformdl.adobe.com/NOS/getPlusPlus/1.6/gp.cab
Handler: grooveLocalGWS - {88FED34C-F0CA-4636-A375-3CB6248B04CD} - c:\program files (x86)\microsoft office\office12\GrooveSystemServices.dll
SEH: Groove GFS Stub Execution Hook: {b5a7f190-dda6-4420-b3ba-52453494e6cd} - c:\program files (x86)\microsoft office\office12\GrooveShellExtensions.dll
LSA: Authentication Packages = msv1_0 ZenV1_0
BHO-X64: Windows Live Family Safety Browser Helper Class: {4f3ed5cd-0726-42a9-87f5-d13f3d2976ac} - c:\program files\windows live\family safety\fssbho.dll
BHO-X64: Windows Live Family Safety Browser Helper - No File
BHO-X64: Windows Live ID Sign-in Helper: {9030D464-4C02-4ABF-8ECC-5164760863C6} - c:\program files\common files\microsoft shared\windows live\WindowsLiveLogin.dll
TB-X64: {D4027C7F-154A-4066-A1AD-4243D8127440} - No File
mRun-x64: [Apoint] c:\program files\apoint2k\Apoint.exe
mRun-x64: [ThpSrv] c:\windows\system32\thpsrv /logon
mRun-x64: [IgfxTray] c:\windows\system32\igfxtray.exe
mRun-x64: [HotKeysCmds] c:\windows\system32\hkcmd.exe
mRun-x64: [Persistence] c:\windows\system32\igfxpers.exe
SEH-X64: ZENworks Adaptive Agent: {763370C4-268E-4308-A60C-D8DA0342BE32} - c:\program files (x86)\novell\zenworks\bin\NalShell.dll

================= FIREFOX ===================

FF - ProfilePath - c:\users\USER\appdata\roaming\mozilla\firefox\profiles\fu9q1w8y.default\
FF - prefs.js: browser.startup.homepage - hxxp://portal.allsaints.wa.edu.au/
FF - prefs.js: network.proxy.type - 4
FF - plugin: c:\program files (x86)\google\google earth\plugin\npgeplugin.dll
FF - plugin: c:\program files (x86)\microsoft\office live\npOLW.dll
FF - plugin: c:\program files (x86)\windows live\photo gallery\NPWLPG.dll
FF - plugin: c:\users\USER\appdata\local\google\update\1.2.183.29\npGoogleOneClick8.dll
FF - HiddenExtension: Java Console: No Registry Reference - c:\program files (x86)\mozilla firefox\extensions\{CAFEEFAC-0016-0000-0016-ABCDEFFEDCBA}
FF - HiddenExtension: Java Console: No Registry Reference - c:\program files (x86)\mozilla firefox\extensions\{CAFEEFAC-0016-0000-0017-ABCDEFFEDCBA}

---- FIREFOX POLICIES ----
c:\program files (x86)\mozilla firefox\greprefs\security-prefs.js - pref("security.ssl3.rsa_seed_sha", true);

============= SERVICES / DRIVERS ===============

R0 PxHlpa64;PxHlpa64;c:\windows\system32\drivers\PxHlpa64.sys [2010-3-8 54480]
R0 Thpdrv;TOSHIBA HDD Protection Driver;c:\windows\system32\drivers\thpdrv.sys [2009-6-29 34880]
R0 Thpevm;TOSHIBA HDD Protection - Shock Sensor Driver;c:\windows\system32\drivers\Thpevm.sys [2009-6-29 14784]
R1 SASDIFSV;SASDIFSV;c:\program files\superantispyware\sasdifsv64.sys [2010-2-18 14920]
R1 SASKUTIL;SASKUTIL;c:\program files\superantispyware\saskutil64.sys [2010-2-18 12360]
R1 vwififlt;Virtual WiFi Filter Driver;c:\windows\system32\drivers\vwififlt.sys [2009-7-14 59904]
R2 !SASCORE;SAS Core Service;c:\program files\superantispyware\SASCore64.exe [2010-6-30 128752]
R2 Novell Identity Store;Novell Identity Store;c:\program files (x86)\novell\casa\bin\micasad.exe [2009-6-24 245760]
R2 Novell ZENworks Agent Service;Novell ZENworks Agent Service;c:\program files (x86)\novell\zenworks\bin\ZenworksWindowsService.exe [2009-11-26 28672]
R2 nzwinvnc;Novell ZENworks Remote Management powered by VNC;c:\program files (x86)\novell\zenworks\bin\nzrWinVNC.exe [2009-11-20 1835008]
R3 dfmirage;dfmirage;c:\windows\system32\drivers\dfmirage.sys [2009-6-9 36432]
R3 EraserUtilRebootDrv;EraserUtilRebootDrv;c:\program files (x86)\common files\symantec shared\eengine\EraserUtilRebootDrv.sys [2010-6-1 132656]
R3 L1C;NDIS Miniport Driver for Atheros AR813x/AR815x PCI-E Ethernet Controller;c:\windows\system32\drivers\L1C62x64.sys [2009-11-13 67072]
R3 PGEffect;Pangu effect driver;c:\windows\system32\drivers\PGEffect.sys [2010-3-4 35008]
R3 QIOMem;Generic IO & Memory Access;c:\windows\system32\drivers\QIOMem.sys [2010-2-24 12800]
R3 rtl8192se;Realtek Wireless LAN 802.11n PCI-E NIC NT Driver;c:\windows\system32\drivers\rtl8192se.sys [2010-2-24 1093152]
S2 Novell ZENworks Image-Safe Data Service;Novell ZENworks ISD Service;c:\program files (x86)\novell\zenworks\bin\preboot\novell-zisdservice.exe [2009-11-19 90112]
S3 e1yexpress;Intel® Gigabit Network Connections Driver;c:\windows\system32\drivers\e1y62x64.sys [2009-10-20 289496]
S3 FLEXnet Licensing Service 64;FLEXnet Licensing Service 64;c:\program files\common files\macrovision shared\flexnet publisher\FNPLicensingService64.exe [2010-3-8 1038088]
S3 fssfltr;fssfltr;c:\windows\system32\drivers\fssfltr.sys [2009-11-5 61280]
S3 fsssvc;Windows Live Family Safety Service;c:\program files (x86)\windows live\family safety\fsssvc.exe [2010-4-28 704872]
S3 HECIx64;Intel® Management Engine Interface;c:\windows\system32\drivers\HECIx64.sys [2009-11-4 56344]
S3 NETw5s64;Intel® Wireless WiFi Link 5000 Series Adapter Driver for Windows 7 - 64 Bit;c:\windows\system32\drivers\NETw5s64.sys [2009-9-15 6952960]
S3 netw5v64;Intel® Wireless WiFi Link 5000 Series Adapter Driver for Windows Vista 64 Bit;c:\windows\system32\drivers\netw5v64.sys [2009-6-11 5434368]
S3 TBtnKey;TOSHIBA Tablet PC Buttons Type N HID Driver;c:\windows\system32\drivers\TBtnKey.sys [2009-7-20 20032]
S3 wisdpen;Wacom Penabled MiniDriver;c:\windows\system32\drivers\wisdpen.sys [2009-11-4 37160]

=============== Created Last 30 ================

2010-09-27 15:53:37 0 d-----w- c:\users\USER\appdata\roaming\IObit
2010-09-27 15:53:29 0 d-----w- c:\programdata\IObit
2010-09-27 15:53:22 0 d-----w- c:\program files (x86)\IObit
2010-09-27 15:48:16 0 d-----w- c:\program files (x86)\Trend Micro
2010-09-24 14:55:13 0 d-----w- c:\users\USER\Tracing
2010-09-23 15:00:29 0 ----a-w- c:\users\USER\jagex__preferences3.dat
2010-09-23 15:00:28 99 ----a-w- c:\users\USER\jagex_runescape_preferences2.dat
2010-09-23 14:58:26 46 ----a-w- c:\users\USER\jagex_runescape_preferences.dat
2010-09-22 10:44:01 0 d-----w- c:\users\USER\appdata\roaming\LimeWire
2010-09-22 10:40:01 0 d-----w- c:\program files (x86)\LimeWire
2010-09-21 02:21:57 0 d-----w- c:\programdata\DivX
2010-09-04 07:27:40 0 d-----w- c:\program files\7-Zip

==================== Find3M ====================

2009-11-09 05:56:57 31548 ----a-w- c:\windows\inf\perflib\0411\perfd.dat
2009-11-09 05:56:57 31548 ----a-w- c:\windows\inf\perflib\0411\perfc.dat
2009-11-09 05:56:57 141988 ----a-w- c:\windows\inf\perflib\0411\perfi.dat
2009-11-09 05:56:57 141988 ----a-w- c:\windows\inf\perflib\0411\perfh.dat
2009-11-09 05:27:40 31548 ----a-w- c:\windows\inf\perflib\0404\perfd.dat
2009-11-09 05:27:40 31548 ----a-w- c:\windows\inf\perflib\0404\perfc.dat
2009-11-09 05:27:40 117840 ----a-w- c:\windows\inf\perflib\0404\perfi.dat
2009-11-09 05:27:40 117840 ----a-w- c:\windows\inf\perflib\0404\perfh.dat
2009-11-09 05:13:02 31548 ----a-w- c:\windows\inf\perflib\0804\perfd.dat
2009-11-09 05:13:02 31548 ----a-w- c:\windows\inf\perflib\0804\perfc.dat
2009-11-09 05:13:02 111310 ----a-w- c:\windows\inf\perflib\0804\perfi.dat
2009-11-09 05:13:02 111310 ----a-w- c:\windows\inf\perflib\0804\perfh.dat
2009-11-06 08:36:02 31548 ----a-w- c:\windows\inf\perflib\0412\perfd.dat
2009-11-06 08:36:02 31548 ----a-w- c:\windows\inf\perflib\0412\perfc.dat
2009-11-06 08:36:02 157694 ----a-w- c:\windows\inf\perflib\0412\perfi.dat
2009-11-06 08:36:02 157694 ----a-w- c:\windows\inf\perflib\0412\perfh.dat
2009-11-06 08:19:34 37534 ----a-w- c:\windows\inf\perflib\0410\perfd.dat
2009-11-06 08:19:34 37534 ----a-w- c:\windows\inf\perflib\0410\perfc.dat
2009-11-06 08:19:34 335478 ----a-w- c:\windows\inf\perflib\0410\perfi.dat
2009-11-06 08:19:34 335478 ----a-w- c:\windows\inf\perflib\0410\perfh.dat
2009-11-05 04:07:37 38104 ----a-w- c:\windows\inf\perflib\0407\perfd.dat
2009-11-05 04:07:37 38104 ----a-w- c:\windows\inf\perflib\0407\perfc.dat
2009-11-05 04:07:37 295922 ----a-w- c:\windows\inf\perflib\0407\perfi.dat
2009-11-05 04:07:37 295922 ----a-w- c:\windows\inf\perflib\0407\perfh.dat
2009-11-05 02:43:34 38160 ----a-w- c:\windows\inf\perflib\040c\perfd.dat
2009-11-05 02:43:34 38160 ----a-w- c:\windows\inf\perflib\040c\perfc.dat
2009-11-05 02:43:34 344522 ----a-w- c:\windows\inf\perflib\040c\perfi.dat
2009-11-05 02:43:34 344522 ----a-w- c:\windows\inf\perflib\040c\perfh.dat
2009-07-14 05:37:38 31548 ----a-w- c:\windows\inf\perflib\0409\perfd.dat
2009-07-14 05:37:38 31548 ----a-w- c:\windows\inf\perflib\0409\perfc.dat
2009-07-14 05:37:38 291294 ----a-w- c:\windows\inf\perflib\0409\perfi.dat
2009-07-14 05:37:38 291294 ----a-w- c:\windows\inf\perflib\0409\perfh.dat
2009-07-14 04:54:24 174 --sha-w- c:\program files\desktop.ini
2009-07-14 04:54:24 174 --sha-w- c:\program files (x86)\desktop.ini
2009-07-14 01:00:34 291294 ----a-w- c:\windows\inf\perflib\0000\perfi.dat
2009-07-14 01:00:34 291294 ----a-w- c:\windows\inf\perflib\0000\perfh.dat
2009-07-14 01:00:32 31548 ----a-w- c:\windows\inf\perflib\0000\perfd.dat
2009-07-14 01:00:32 31548 ----a-w- c:\windows\inf\perflib\0000\perfc.dat
2009-06-01 10:19:08 6253 ----a-w- c:\program files (x86)\eula.rtf
2009-06-10 20:44:08 9633792 --sha-r- c:\windows\fonts\StaticCache.dat
2010-04-21 10:39:11 16384 --sha-w- c:\windows\serviceprofiles\networkservice\appdata\local\microsoft\windows\history\history.ie5\index.dat
2010-04-21 10:39:11 32768 --sha-w- c:\windows\serviceprofiles\networkservice\appdata\local\microsoft\windows\temporary internet files\content.ie5\index.dat
2010-04-21 10:39:11 16384 --sha-w- c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft\windows\cookies\index.dat
2010-04-21 10:39:11 245760 --sha-w- c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft\windows\ietldcache\index.dat
2009-07-14 01:39:53 398848 --sha-w- c:\windows\winsxs\amd64_microsoft-windows-mail-app_31bf3856ad364e35_6.1.7600.16385_none_4d4d1f2f696639a2\WinMail.exe
2009-07-14 01:14:45 396800 --sha-w- c:\windows\winsxs\x86_microsoft-windows-mail-app_31bf3856ad364e35_6.1.7600.16385_none_f12e83abb108c86c\WinMail.exe

============= FINISH: 14:38:27.92 ===============

Attached Files


Edited by Skitz69, 28 September 2010 - 02:53 AM.


BC AdBot (Login to Remove)

 


#2 Shannon2012

Shannon2012

  • Security Colleague
  • 3,657 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:North Carolina, USA
  • Local time:11:05 PM

Posted 02 October 2010 - 06:37 AM


Hello and welcome to Bleeping Computer

We apologize for the delay in responding to your request for help. Here at Bleeping Computer we get overwhelmed at times, and we are trying our best to keep up. Please note that your topic was not intentionally overlooked. Our mission is to help everyone in need, but sometimes it takes just a little longer to get to every request for help. No one is ignored here.

If you have since resolved the original problem you were having, we would appreciate you letting us know. If not please perform the following steps below so we can have a look at the current condition of your machine.

If you have not done so, include a clear description of the problems you're having, along with any steps you may have performed so far.

Upon completing the steps below another staff member will review and take the steps necessary with you to get your machine back in working order clean and free of malware.

If you have already posted a DDS log, please do so again, as your situation may have changed.
Use the 'Add Reply' and add the new log to this thread.

Thanks and again sorry for the delay.

We need to see some information about what is happening in your machine. Please perform the following scan:
  • Download DDS by sUBs from one of the following links. Save it to your desktop.
  • Double click on the DDS icon, allow it to run.
  • A small box will open, with an explaination about the tool. No input is needed, the scan is running.
  • Notepad will open with the results.
  • Follow the instructions that pop up for posting the results.
  • Close the program window, and delete the program from your desktop.
Please note: You may have to disable any script protection running if the scan fails to run. After downloading the tool, disconnect from the internet and disable all antivirus protection. Run the scan, enable your A/V and reconnect to the internet.

Information on A/V control HERE

We also need a new log from the GMER anti-rootkit scanner. Please first disable any CD emulation programs using the steps found in this topic:

Why we request you disable CD Emulation when receiving Malware Removal Advice

Then create another GMER log and post it as an attachment to the reply where you post your new DDS log. Instructions on how to properly create a GMER log can be found here:

How to create a GMER log


Shannon

#3 Skitz69

Skitz69
  • Topic Starter

  • Members
  • 51 posts
  • OFFLINE
  •  
  • Local time:11:05 AM

Posted 02 October 2010 - 07:31 AM

Thanks for the reply.
The only problem I am having at the moment is that my task bar occasionally disappears and asks me to refresh it in order to make it work. I believe I still have the trojan.
I tried to use GMER again but I got the same error message. C:\Windows\System32\config\system: The system cannot find the file specified.
This leaves gmer only able to scan services, registry and files in C, but no other options. The scan revealed no results in these sections.
I have also attached the other text document.

Here is my dds log:

DDS (Ver_10-03-17.01) - NTFSX64
Run by USER at 19:58:32.69 on Sat 02/10/2010
Internet Explorer: 8.0.7600.16385 BrowserJavaVersion: 1.6.0_17
Microsoft Windows 7 Enterprise 6.1.7600.0.1252.61.1033.18.1913.939 [GMT 8:00]

SP: SUPERAntiSpyware *enabled* (Updated) {222A897C-5018-402e-943F-7E7AC8560DA7}

============== Running Processes ===============

C:\Windows\system32\wininit.exe
C:\Windows\system32\lsm.exe
C:\Windows\system32\svchost.exe -k DcomLaunch
C:\Program Files (x86)\Novell\CASA\bin\micasad.exe
C:\Windows\system32\svchost.exe -k RPCSS
C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted
C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted
C:\Windows\system32\svchost.exe -k netsvcs
C:\Windows\system32\svchost.exe -k LocalService
C:\Program Files (x86)\Symantec\Symantec Endpoint Protection\Smc.exe
C:\Windows\system32\svchost.exe -k NetworkService
C:\Program Files (x86)\Novell\ZENworks\bin\ZenworksWindowsService.exe
C:\Program Files (x86)\Common Files\Symantec Shared\ccSvcHst.exe
C:\Windows\System32\spoolsv.exe
C:\Windows\system32\svchost.exe -k LocalServiceNoNetwork
C:\Program Files\SUPERAntiSpyware\SASCORE64.EXE
C:\Windows\system32\svchost.exe -k apphost
C:\Program Files (x86)\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe
C:\Program Files (x86)\Bonjour\mDNSResponder.exe
C:\Program Files (x86)\Common Files\Microsoft Shared\VS7DEBUG\mdm.exe
C:\Windows\Microsoft.NET\Framework64\v3.0\Windows Communication Foundation\SMSvcHost.exe
C:\Program Files (x86)\CDBurnerXP\NMSAccessU.exe
C:\Program Files (x86)\Novell\ZENworks\bin\nzrWinVNC.exe
C:\Program Files (x86)\Novell\ZENworks\bin\nzrWinVNCApp.exe
C:\Windows\system32\svchost.exe -k imgsvc
C:\Program Files (x86)\Symantec\Symantec Endpoint Protection\Rtvscan.exe
C:\Windows\system32\svchost.exe -k iissvcs
C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSVC.EXE
C:\Windows\system32\SearchIndexer.exe
C:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted
C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSvcM.exe
C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation
C:\Windows\system32\taskhost.exe
C:\Program Files (x86)\Symantec\Symantec Endpoint Protection\SmcGui.exe
C:\Program Files (x86)\Symantec\Symantec Endpoint Protection\ProtectionUtilSurrogate.exe
C:\Program Files\Apoint2K\Apoint.exe
C:\Windows\System32\igfxtray.exe
C:\Windows\System32\igfxpers.exe
C:\Program Files (x86)\NetMeter\NetMeter.exe
C:\Program Files (x86)\Pasco scientific\DataStudio\PASPortal.exe
C:\Windows\system32\igfxsrvc.exe
C:\Program Files\Apoint2K\ApMsgFwd.exe
C:\Program Files\Apoint2K\HidFind.exe
C:\Program Files (x86)\Common Files\Symantec Shared\ccApp.exe
C:\Program Files\Apoint2K\Apntex.exe
C:\Windows\system32\conhost.exe
C:\Program Files (x86)\Novell\ZENworks\bin\ZenUserDaemon.exe
C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\AdobeARM.exe
C:\Users\USER\AppData\Local\Google\Update\1.2.183.29\GoogleCrashHandler.exe
C:\Program Files (x86)\iTunes\iTunesHelper.exe
C:\Program Files\Windows Media Player\wmpnetwk.exe
C:\Program Files\iPod\bin\iPodService.exe
C:\Users\USER\AppData\Local\Google\Chrome\Application\chrome.exe
C:\Users\USER\AppData\Local\Google\Chrome\Application\chrome.exe
C:\Windows\System32\rundll32.exe
C:\Users\USER\AppData\Local\Google\Chrome\Application\chrome.exe
C:\Windows\system32\taskeng.exe
C:\Windows\System32\svchost.exe -k WerSvcGroup
C:\Windows\Explorer.EXE
C:\Windows\system32\wbem\wmiprvse.exe
D:\Documents\Ant\dds.scr
C:\Windows\system32\conhost.exe
C:\Windows\system32\wbem\wmiprvse.exe

============== Pseudo HJT Report ===============

uStart Page = www.google.com
mLocal Page = c:\windows\syswow64\blank.htm
uInternet Settings,ProxyOverride = <local>;*.local
BHO: Adobe PDF Link Helper: {18df081c-e8ad-4283-a596-fa578c2ebdc3} - c:\program files (x86)\common files\adobe\acrobat\activex\AcroIEHelperShim.dll
BHO: {5C255C8A-E604-49b4-9D64-90988571CECB} - No File
BHO: Groove GFS Browser Helper: {72853161-30c5-4d22-b7f9-0bbc1d38a37e} - c:\program files (x86)\microsoft office\office12\GrooveShellExtensions.dll
BHO: Windows Live ID Sign-in Helper: {9030d464-4c02-4abf-8ecc-5164760863c6} - c:\program files (x86)\common files\microsoft shared\windows live\WindowsLiveLogin.dll
BHO: Ask Toolbar: {d4027c7f-154a-4066-a1ad-4243d8127440} - c:\program files (x86)\ask.com\GenericAskToolbar.dll
BHO: Java™ Plug-In 2 SSV Helper: {dbc80044-a445-435b-bc74-9c25c1c588a9} - c:\program files (x86)\java\jre6\bin\jp2ssv.dll
TB: Ask Toolbar: {d4027c7f-154a-4066-a1ad-4243d8127440} - c:\program files (x86)\ask.com\GenericAskToolbar.dll
uRun: [c:\program files (x86)\netmeter\netmeter.exe] c:\program files (x86)\netmeter\NetMeter.exe
uRun: [Google Update] "c:\users\USER\appdata\local\google\update\GoogleUpdate.exe" /c
uRun: [msnmsgr] "c:\program files (x86)\windows live\messenger\msnmsgr.exe" /background
mRun: [ccApp] "c:\program files (x86)\common files\symantec shared\ccApp.exe"
mRun: [ZenNotifyIcon] c:\program files (x86)\novell\zenworks\bin\ZenNotifyIcon.exe
mRun: [ZENWorksUserDaemon] c:\program files (x86)\novell\zenworks\bin\ZenUserDaemon.exe
mRun: [NalView] c:\program files (x86)\novell\zenworks\bin\nalview.exe
mRun: [Adobe Reader Speed Launcher] "c:\program files (x86)\adobe\reader 9.0\reader\Reader_sl.exe"
mRun: [Adobe ARM] "c:\program files (x86)\common files\adobe\arm\1.0\AdobeARM.exe"
mRun: [QuickTime Task] "c:\program files (x86)\quicktime\QTTask.exe" -atboottime
mRun: [iTunesHelper] "c:\program files (x86)\itunes\iTunesHelper.exe"
mRun: [IObit Security 360] "c:\program files (x86)\iobit\iobit security 360\IS360tray.exe" /autostart
StartupFolder: c:\progra~3\micros~1\windows\startm~1\programs\startup\paspor~1.lnk - c:\windows\installer\{69cd58cd-d8ec-4db4-981b-1c256f105c7b}\NewShortcut1.exe
StartupFolder: c:\progra~3\micros~1\windows\startm~1\programs\startup\paspor~1.lnk - c:\windows\installer\{69cd58cd-d8ec-4db4-981b-1c256f105c7b}\NewShortcut1.exe
uPolicies-explorer: NoThemesTab = 1 (0x1)
uPolicies-explorer: NoDesktopCleanupWizard = 1 (0x1)
uPolicies-explorer: NoCloseDragDropBands = 1 (0x1)
uPolicies-explorer: NoMovingBands = 1 (0x1)
uPolicies-explorer: NoStartMenuMyGames = 1 (0x1)
uPolicies-explorer: NoSearchProgramsInStartMenu = 1 (0x1)
uPolicies-explorer: NoSetTaskbar = 1 (0x1)
uPolicies-explorer: NoToolbarsOnTaskbar = 1 (0x1)
uPolicies-explorer: NoTrayContextMenu = 1 (0x1)
uPolicies-explorer: TaskbarLockAll = 1 (0x1)
uPolicies-explorer: TaskbarNoAddRemoveToolbar = 1 (0x1)
uPolicies-explorer: TaskbarNoDragToolbar = 1 (0x1)
uPolicies-explorer: TaskbarNoResize = 1 (0x1)
uPolicies-explorer: NoNetConnectDisconnect = 1 (0x1)
uPolicies-explorer: NoInplaceSharing = 1 (0x1)
uPolicies-explorer: NoChangeStartMenu = 1 (0x1)
uPolicies-explorer: HideSCAHealth = 1 (0x1)
uPolicies-explorer: NoActiveDesktopChanges = 1 (0x1)
uPolicies-system: NoDispSettingsPage = 1 (0x1)
uPolicies-system: NoColorChoice = 1 (0x1)
uPolicies-system: NoVisualStyleChoice = 1 (0x1)
uPolicies-system: NoSizeChoice = 1 (0x1)
uPolicies-system: Wallpaper = c:\windows\web\wallpaper\school backgrounds\Wallpaper.jpg
uPolicies-system: WallpaperStyle = 2
uPolicies-system: NoDispAppearancePage = 0 (0x0)
mPolicies-explorer: NoActiveDesktop = 1 (0x1)
mPolicies-explorer: NoActiveDesktopChanges = 1 (0x1)
mPolicies-explorer: ForceActiveDesktopOn = 0 (0x0)
mPolicies-explorer: HideSCAHealth = 1 (0x1)
mPolicies-explorer: NoWelcomeScreen = 1 (0x1)
mPolicies-explorer: UseDefaultTile = 1 (0x1)
mPolicies-system: ConsentPromptBehaviorAdmin = 0 (0x0)
mPolicies-system: ConsentPromptBehaviorUser = 3 (0x3)
mPolicies-system: EnableLUA = 0 (0x0)
mPolicies-system: EnableUIADesktopToggle = 0 (0x0)
mPolicies-system: PromptOnSecureDesktop = 0 (0x0)
dPolicies-explorer: HideSCAHealth = 1 (0x1)
IE: E&xport to Microsoft Excel - c:\progra~2\micros~1\office12\EXCEL.EXE/3000
IE: {219C3416-8CB2-491a-A3C7-D9FCDDC9D600} - {5F7B1267-94A9-47F5-98DB-E99415F33AEC} - c:\program files (x86)\windows live\writer\WriterBrowserExtension.dll
IE: {2670000A-7350-4f3c-8081-5663EE0C6C49} - {48E73304-E1D6-4330-914C-F5F514E3486C} - c:\progra~2\micros~1\office12\ONBttnIE.dll
IE: {92780B25-18CC-41C8-B9BE-3C9C571A8263} - {FF059E31-CC5A-4E2E-BF3B-96E929D65503} - c:\progra~2\micros~1\office12\REFIEBAR.DLL
Trusted Zone: portal
Trusted Zone: wa.edu.au\portal.allsaints
DPF: {233C1507-6A77-46A4-9443-F871F945D258} - hxxp://download.macromedia.com/pub/shockwave/cabs/director/sw.cab
DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_17-windows-i586.cab
DPF: {CAFEEFAC-0016-0000-0017-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_17-windows-i586.cab
DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_17-windows-i586.cab
DPF: {E2883E8F-472F-4FB0-9522-AC9BF37916A7} - hxxp://platformdl.adobe.com/NOS/getPlusPlus/1.6/gp.cab
Handler: grooveLocalGWS - {88FED34C-F0CA-4636-A375-3CB6248B04CD} - c:\program files (x86)\microsoft office\office12\GrooveSystemServices.dll
SEH: Groove GFS Stub Execution Hook: {b5a7f190-dda6-4420-b3ba-52453494e6cd} - c:\program files (x86)\microsoft office\office12\GrooveShellExtensions.dll
LSA: Authentication Packages = msv1_0 ZenV1_0
BHO-X64: Windows Live Family Safety Browser Helper Class: {4f3ed5cd-0726-42a9-87f5-d13f3d2976ac} - c:\program files\windows live\family safety\fssbho.dll
BHO-X64: Windows Live Family Safety Browser Helper - No File
BHO-X64: Windows Live ID Sign-in Helper: {9030D464-4C02-4ABF-8ECC-5164760863C6} - c:\program files\common files\microsoft shared\windows live\WindowsLiveLogin.dll
TB-X64: {D4027C7F-154A-4066-A1AD-4243D8127440} - No File
mRun-x64: [Apoint] c:\program files\apoint2k\Apoint.exe
mRun-x64: [ThpSrv] c:\windows\system32\thpsrv /logon
mRun-x64: [IgfxTray] c:\windows\system32\igfxtray.exe
mRun-x64: [HotKeysCmds] c:\windows\system32\hkcmd.exe
mRun-x64: [Persistence] c:\windows\system32\igfxpers.exe
SEH-X64: ZENworks Adaptive Agent: {763370C4-268E-4308-A60C-D8DA0342BE32} - c:\program files (x86)\novell\zenworks\bin\NalShell.dll

================= FIREFOX ===================

FF - ProfilePath - c:\users\USER\appdata\roaming\mozilla\firefox\profiles\fu9q1w8y.default\
FF - prefs.js: browser.startup.homepage - hxxp://portal.allsaints.wa.edu.au/
FF - prefs.js: network.proxy.type - 4
FF - plugin: c:\program files (x86)\google\google earth\plugin\npgeplugin.dll
FF - plugin: c:\program files (x86)\microsoft\office live\npOLW.dll
FF - plugin: c:\program files (x86)\windows live\photo gallery\NPWLPG.dll
FF - plugin: c:\users\USER\appdata\local\google\update\1.2.183.29\npGoogleOneClick8.dll
FF - HiddenExtension: Java Console: No Registry Reference - c:\program files (x86)\mozilla firefox\extensions\{CAFEEFAC-0016-0000-0016-ABCDEFFEDCBA}
FF - HiddenExtension: Java Console: No Registry Reference - c:\program files (x86)\mozilla firefox\extensions\{CAFEEFAC-0016-0000-0017-ABCDEFFEDCBA}

---- FIREFOX POLICIES ----
c:\program files (x86)\mozilla firefox\greprefs\security-prefs.js - pref("security.ssl3.rsa_seed_sha", true);

============= SERVICES / DRIVERS ===============

R0 PxHlpa64;PxHlpa64;c:\windows\system32\drivers\PxHlpa64.sys [2010-3-8 54480]
R0 Thpdrv;TOSHIBA HDD Protection Driver;c:\windows\system32\drivers\thpdrv.sys [2009-6-29 34880]
R0 Thpevm;TOSHIBA HDD Protection - Shock Sensor Driver;c:\windows\system32\drivers\Thpevm.sys [2009-6-29 14784]
R1 SASDIFSV;SASDIFSV;c:\program files\superantispyware\sasdifsv64.sys [2010-2-18 14920]
R1 SASKUTIL;SASKUTIL;c:\program files\superantispyware\saskutil64.sys [2010-2-18 12360]
R1 vwififlt;Virtual WiFi Filter Driver;c:\windows\system32\drivers\vwififlt.sys [2009-7-14 59904]
R2 !SASCORE;SAS Core Service;c:\program files\superantispyware\SASCore64.exe [2010-6-30 128752]
R2 Novell Identity Store;Novell Identity Store;c:\program files (x86)\novell\casa\bin\micasad.exe [2009-6-24 245760]
R2 Novell ZENworks Agent Service;Novell ZENworks Agent Service;c:\program files (x86)\novell\zenworks\bin\ZenworksWindowsService.exe [2009-11-26 28672]
R2 nzwinvnc;Novell ZENworks Remote Management powered by VNC;c:\program files (x86)\novell\zenworks\bin\nzrWinVNC.exe [2009-11-20 1835008]
R2 Symantec AntiVirus;Symantec Endpoint Protection;c:\program files (x86)\symantec\symantec endpoint protection\Rtvscan.exe [2009-9-17 2477304]
R3 dfmirage;dfmirage;c:\windows\system32\drivers\dfmirage.sys [2009-6-9 36432]
R3 EraserUtilRebootDrv;EraserUtilRebootDrv;c:\program files (x86)\common files\symantec shared\eengine\EraserUtilRebootDrv.sys [2010-6-1 132656]
R3 L1C;NDIS Miniport Driver for Atheros AR813x/AR815x PCI-E Ethernet Controller;c:\windows\system32\drivers\L1C62x64.sys [2009-11-13 67072]
R3 PGEffect;Pangu effect driver;c:\windows\system32\drivers\PGEffect.sys [2010-3-4 35008]
R3 QIOMem;Generic IO & Memory Access;c:\windows\system32\drivers\QIOMem.sys [2010-2-24 12800]
R3 rtl8192se;Realtek Wireless LAN 802.11n PCI-E NIC NT Driver;c:\windows\system32\drivers\rtl8192se.sys [2010-2-24 1093152]
S2 IS360service;IS360service;c:\program files (x86)\iobit\iobit security 360\is360srv.exe [2010-9-27 312152]
S2 Novell ZENworks Image-Safe Data Service;Novell ZENworks ISD Service;c:\program files (x86)\novell\zenworks\bin\preboot\novell-zisdservice.exe [2009-11-19 90112]
S3 e1yexpress;Intel® Gigabit Network Connections Driver;c:\windows\system32\drivers\e1y62x64.sys [2009-10-20 289496]
S3 FLEXnet Licensing Service 64;FLEXnet Licensing Service 64;c:\program files\common files\macrovision shared\flexnet publisher\FNPLicensingService64.exe [2010-3-8 1038088]
S3 fssfltr;fssfltr;c:\windows\system32\drivers\fssfltr.sys [2009-11-5 61280]
S3 fsssvc;Windows Live Family Safety Service;c:\program files (x86)\windows live\family safety\fsssvc.exe [2010-4-28 704872]
S3 HECIx64;Intel® Management Engine Interface;c:\windows\system32\drivers\HECIx64.sys [2009-11-4 56344]
S3 NETw5s64;Intel® Wireless WiFi Link 5000 Series Adapter Driver for Windows 7 - 64 Bit;c:\windows\system32\drivers\NETw5s64.sys [2009-9-15 6952960]
S3 netw5v64;Intel® Wireless WiFi Link 5000 Series Adapter Driver for Windows Vista 64 Bit;c:\windows\system32\drivers\netw5v64.sys [2009-6-11 5434368]
S3 StorSvc;Storage Service;c:\windows\system32\svchost.exe -k LocalSystemNetworkRestricted [2009-7-14 27136]
S3 TBtnKey;TOSHIBA Tablet PC Buttons Type N HID Driver;c:\windows\system32\drivers\TBtnKey.sys [2009-7-20 20032]
S3 TOSHIBA HDD SSD Alert Service;TOSHIBA HDD SSD Alert Service;c:\program files\toshiba\toshiba hdd ssd alert\TosSmartSrv.exe [2009-8-3 137560]
S3 WatAdminSvc;Windows Activation Technologies Service;c:\windows\system32\wat\WatAdminSvc.exe [2010-3-5 1255736]
S3 wisdpen;Wacom Penabled MiniDriver;c:\windows\system32\drivers\wisdpen.sys [2009-11-4 37160]
S3 ZENPreAgent;Novell ZENworks Pre Agent;c:\windows\novell\zenworks\bin\ZENPreAgent.exe [2010-3-24 192512]

=============== Created Last 30 ================

2010-09-27 15:53:37 0 d-----w- c:\users\USER\appdata\roaming\IObit
2010-09-27 15:53:29 0 d-----w- c:\programdata\IObit
2010-09-27 15:53:22 0 d-----w- c:\program files (x86)\IObit
2010-09-27 15:48:16 0 d-----w- c:\program files (x86)\Trend Micro
2010-09-24 14:55:13 0 d-----w- c:\users\USER\Tracing
2010-09-23 15:00:29 0 ----a-w- c:\users\USER\jagex__preferences3.dat
2010-09-23 15:00:28 99 ----a-w- c:\users\USER\jagex_runescape_preferences2.dat
2010-09-23 14:58:26 46 ----a-w- c:\users\USER\jagex_runescape_preferences.dat
2010-09-22 10:44:01 0 d-----w- c:\users\USER\appdata\roaming\LimeWire
2010-09-22 10:40:01 0 d-----w- c:\program files (x86)\LimeWire
2010-09-21 02:21:57 0 d-----w- c:\programdata\DivX
2010-09-04 07:27:40 0 d-----w- c:\program files\7-Zip

==================== Find3M ====================

2010-09-10 14:38:10 225328 ----a-w- c:\windows\system32\drivers\wpshelper.sys
2009-11-09 05:56:57 31548 ----a-w- c:\windows\inf\perflib\0411\perfd.dat
2009-11-09 05:56:57 31548 ----a-w- c:\windows\inf\perflib\0411\perfc.dat
2009-11-09 05:56:57 141988 ----a-w- c:\windows\inf\perflib\0411\perfi.dat
2009-11-09 05:56:57 141988 ----a-w- c:\windows\inf\perflib\0411\perfh.dat
2009-11-09 05:27:40 31548 ----a-w- c:\windows\inf\perflib\0404\perfd.dat
2009-11-09 05:27:40 31548 ----a-w- c:\windows\inf\perflib\0404\perfc.dat
2009-11-09 05:27:40 117840 ----a-w- c:\windows\inf\perflib\0404\perfi.dat
2009-11-09 05:27:40 117840 ----a-w- c:\windows\inf\perflib\0404\perfh.dat
2009-11-09 05:13:02 31548 ----a-w- c:\windows\inf\perflib\0804\perfd.dat
2009-11-09 05:13:02 31548 ----a-w- c:\windows\inf\perflib\0804\perfc.dat
2009-11-09 05:13:02 111310 ----a-w- c:\windows\inf\perflib\0804\perfi.dat
2009-11-09 05:13:02 111310 ----a-w- c:\windows\inf\perflib\0804\perfh.dat
2009-11-06 08:36:02 31548 ----a-w- c:\windows\inf\perflib\0412\perfd.dat
2009-11-06 08:36:02 31548 ----a-w- c:\windows\inf\perflib\0412\perfc.dat
2009-11-06 08:36:02 157694 ----a-w- c:\windows\inf\perflib\0412\perfi.dat
2009-11-06 08:36:02 157694 ----a-w- c:\windows\inf\perflib\0412\perfh.dat
2009-11-06 08:19:34 37534 ----a-w- c:\windows\inf\perflib\0410\perfd.dat
2009-11-06 08:19:34 37534 ----a-w- c:\windows\inf\perflib\0410\perfc.dat
2009-11-06 08:19:34 335478 ----a-w- c:\windows\inf\perflib\0410\perfi.dat
2009-11-06 08:19:34 335478 ----a-w- c:\windows\inf\perflib\0410\perfh.dat
2009-11-05 04:07:37 38104 ----a-w- c:\windows\inf\perflib\0407\perfd.dat
2009-11-05 04:07:37 38104 ----a-w- c:\windows\inf\perflib\0407\perfc.dat
2009-11-05 04:07:37 295922 ----a-w- c:\windows\inf\perflib\0407\perfi.dat
2009-11-05 04:07:37 295922 ----a-w- c:\windows\inf\perflib\0407\perfh.dat
2009-11-05 02:43:34 38160 ----a-w- c:\windows\inf\perflib\040c\perfd.dat
2009-11-05 02:43:34 38160 ----a-w- c:\windows\inf\perflib\040c\perfc.dat
2009-11-05 02:43:34 344522 ----a-w- c:\windows\inf\perflib\040c\perfi.dat
2009-11-05 02:43:34 344522 ----a-w- c:\windows\inf\perflib\040c\perfh.dat
2009-07-14 05:37:38 31548 ----a-w- c:\windows\inf\perflib\0409\perfd.dat
2009-07-14 05:37:38 31548 ----a-w- c:\windows\inf\perflib\0409\perfc.dat
2009-07-14 05:37:38 291294 ----a-w- c:\windows\inf\perflib\0409\perfi.dat
2009-07-14 05:37:38 291294 ----a-w- c:\windows\inf\perflib\0409\perfh.dat
2009-07-14 04:54:24 174 --sha-w- c:\program files\desktop.ini
2009-07-14 04:54:24 174 --sha-w- c:\program files (x86)\desktop.ini
2009-07-14 01:00:34 291294 ----a-w- c:\windows\inf\perflib\0000\perfi.dat
2009-07-14 01:00:34 291294 ----a-w- c:\windows\inf\perflib\0000\perfh.dat
2009-07-14 01:00:32 31548 ----a-w- c:\windows\inf\perflib\0000\perfd.dat
2009-07-14 01:00:32 31548 ----a-w- c:\windows\inf\perflib\0000\perfc.dat
2009-06-01 10:19:08 6253 ----a-w- c:\program files (x86)\eula.rtf
2009-06-10 20:44:08 9633792 --sha-r- c:\windows\fonts\StaticCache.dat
2010-04-21 10:39:11 16384 --sha-w- c:\windows\serviceprofiles\networkservice\appdata\local\microsoft\windows\history\history.ie5\index.dat
2010-04-21 10:39:11 32768 --sha-w- c:\windows\serviceprofiles\networkservice\appdata\local\microsoft\windows\temporary internet files\content.ie5\index.dat
2010-04-21 10:39:11 16384 --sha-w- c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft\windows\cookies\index.dat
2010-04-21 10:39:11 245760 --sha-w- c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft\windows\ietldcache\index.dat
2009-07-14 01:39:53 398848 --sha-w- c:\windows\winsxs\amd64_microsoft-windows-mail-app_31bf3856ad364e35_6.1.7600.16385_none_4d4d1f2f696639a2\WinMail.exe
2009-07-14 01:14:45 396800 --sha-w- c:\windows\winsxs\x86_microsoft-windows-mail-app_31bf3856ad364e35_6.1.7600.16385_none_f12e83abb108c86c\WinMail.exe

============= FINISH: 20:00:38.93 ===============

Edited by Skitz69, 02 October 2010 - 07:33 AM.


#4 etavares

etavares

    Bleepin' Remover


  • Malware Response Team
  • 15,514 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:11:05 PM

Posted 05 October 2010 - 11:52 AM

Hello, Skitz69.
We can't use GMER with a 64bit system, so that's why you're getting those error messages. Bamital is a backdoor trojan.

Do you know what this startup item is?
StartupFolder: c:\progra~3\micros~1\windows\startm~1\programs\startup\paspor~1.lnk


Backdoor Warning
One or more of the identified infections is a backdoor trojan.

This allows hackers to remotely control your computer, steal critical system information and download and execute files.

I would counsel you to disconnect this PC from the Internet immediately. If you do any banking or other financial transactions on the PC or if it should contain any other sensitive information, please get to a known clean computer and change all passwords where applicable, and it would be wise to contact those same financial institutions to apprise them of your situation.

Though the trojan has been identified and can be killed, because of it's backdoor functionality, your PC is very likely compromised and there is no way to be sure your computer can ever again be trusted. Many experts in the security community believe that once infected with this type of trojan, the best course of action would be a reformat and reinstall of the OS. Please read these for more information:

How Do I Handle Possible Identify Theft, Internet Fraud and CC Fraud?
When Should I Format, How Should I Reinstall

We can still clean this machine but I can't guarantee that it will be 100% secure afterwards. Let me know what you decide to do. If you do decide to proceed, please continue with the fix below.
P2P Warning and Request
The log shows that you have been using so called peer-to-peer or file-sharing programmes (in your case uTorrent, LimeWire). These programmes allow to share files between users as the name(s) suggest. In today's world the cyber crime has come a long way and any means is used to infect personal computers to make use of their stored data or machine power for further propagation of their malware files. A popular means is the use of file-sharing tools as a tremendous amount of prospective victims can be reached through it.

It is therefore possible to be infected by downloading manipulated files via peer-to-peer tools and thus suggested to be used with intense care. I recommend that you uninstall this program. That is optional, however. If you decide to not uninstall, please refrain from using it until I let you know your computer is clean.



Registry Cleaner Warning


I also see that you have a Ccleaner installed. It is a great tool that I use. However, be careful of the registry cleaning functionality (versus file cleaning), Here at BC, we do not recommend using registry cleaners as they don't speed up your computer and they can do more harm than good if they remove a legitimate entry. If you do use it, make sure to use a tool like ERUNT to back up your registry first. Merely backing it up yourself via regedit wont' help you if you can't boot up as a result!

See here for more information:
http://www.bleepingcomputer.com/forums/ind...p;#entry1326578



Ask Toolbar Warning"

I see you have the Ask.Com toolbar installed. This often comes bundled with spyware and is recommended you remove.

Please see here for more information:
http://www.bleepingcomputer.com/uninstall/...sk-Toolbar.html

If you would like to remove it, please go to add/Remove Programs and uninstall it.


Trusted Zone Warning

Having trusted sites may not be a good idea. The reason why I say it's not a good idea is because the security settings for the internet is not extremely high and once you put a site in your trusted zone, basically almost anymore or thing, including hackers or other malicious software have full access to that site which can lead to hijacking that site and may even have access to your computer. Are you sure you trust a site to that degree?

It is recommended NOT to have ANY sites in your Trusted Zone unless the site requires it to function properly and you trust it very well. Other than that, it is not necessary for you to add any sites into the trusted zone. If you're not sure, and/or you do not need these in your trusted zone to facilitate access or you did not knowingly permit this access yourself, then please remove those sites from your trusted zone.

They can be accessed in Internet Explorer via Tools>>Internet Options>>Security>>Trusted Zone>>Sites. Remove if there are any there.



Step 1


We need to replace that file, but we can't do it while windows is running. Do you have your Windows installation CD handy?

etavares


If I don't respond within 2 days, please feel free to PM me.
Please don't ask for help via PM. The forums are there for a reason. Please post in the forums so others may benefit as well.

Posted Image
Unified Network of Instructors and Trusted Eliminators
 


#5 Skitz69

Skitz69
  • Topic Starter

  • Members
  • 51 posts
  • OFFLINE
  •  
  • Local time:11:05 AM

Posted 06 October 2010 - 01:19 AM

Hey

Thanks for the informative reply.

The laptop that is infected does not have a cd drive and came pre-installed with windows. I am currently using another computer to reply and the infected one isn't connected to the internet. I don't think I have any windows installation disk/usb anyway.

Also I am cleaning up the parts of the computer you requested and I will find out if that file is safe or not.

I would like to try and remove the file without formatting as I don't use the computer for banking or anything like that, just for browsing internet and music.

Thanks again.

Edited by Skitz69, 06 October 2010 - 01:21 AM.


#6 etavares

etavares

    Bleepin' Remover


  • Malware Response Team
  • 15,514 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:11:05 PM

Posted 06 October 2010 - 05:49 PM

Hello, Skitz69.
Please let me knwo if you know what this is:
StartupFolder: c:\progra~3\micros~1\windows\startm~1\programs\startup\paspor~1.lnk


Since you don't have a Windows CD, we can do it another way. Regardless, we need to find a clean replacement on your machine first.



Download SystemLook from one of the links below and save it to your Desktop.
Download Mirror #1
Download Mirror #2
  • Double-click SystemLook.exe to run it.
  • A blank Windows shall open with the title "SystemLook v1.0-by Jpshortstuff".
  • Copy and Paste the content of the following codebox into the main textfield under "File":
    CODE
    :filefind
    wininit.ex*
  • Please Confirm everything is copied and Pasted as I have provided above
  • Click the Look button to start the scan.
  • When finished, a notepad window will open with the results of the scan.
  • Please post this log in your next reply.


Note: The log can also be found on your Desktop entitled SystemLook.txt
2nd Note: The scan may take a while from several seconds to a minute or more depending on the number of files you have and how fast your computer can perform the task


etavares


If I don't respond within 2 days, please feel free to PM me.
Please don't ask for help via PM. The forums are there for a reason. Please post in the forums so others may benefit as well.

Posted Image
Unified Network of Instructors and Trusted Eliminators
 


#7 Skitz69

Skitz69
  • Topic Starter

  • Members
  • 51 posts
  • OFFLINE
  •  
  • Local time:11:05 AM

Posted 08 October 2010 - 11:49 PM

Hey, thanks again for the reply.

Sorry for the long wait for my reply, I am moving house and have to use usb internet.
I am not quite sure what that file in the startup menu is. I believe it may belong to pasportal or data studio which are both safe programs. I am not sure if it does belong to them though.

As soon as the scan had finished with systemlook, Symantec Endpoint Protection Notification came up saying a security risk was detected. Trojan.Bamital!inf
File: C:\Windows\SysWOW64\wininit.exe
It said action taken: Delete failed: Quarantine failed : Access denied
Hope that helps.


Here is my log:

SystemLook 04.09.10 by jpshortstuff
Log created at 12:39 on 09/10/2010 by USER
Administrator - Elevation successful
WARNING: SystemLook running under WOW64. Use SystemLook_x64 for accurate results.

========== filefind ==========

Searching for "wininit.ex*"
C:\Windows\System32\wininit.exe --a---- 96256 bytes [23:36 13/07/2009] [01:14 14/07/2009] (Unable to calculate MD5)
C:\Windows\System32\de-DE\wininit.exe.mui --a---- 5120 bytes [04:02 05/11/2009] [10:39 13/07/2009] 150A6D5C88E3F1F762F474A88CA3AB7A
C:\Windows\System32\en-US\wininit.exe.mui --a---- 5120 bytes [05:35 14/07/2009] [02:05 14/07/2009] 0CA1666E3535B8045352649498A8E1A6
C:\Windows\System32\fr-FR\wininit.exe.mui --a---- 5120 bytes [07:37 06/11/2009] [10:39 13/07/2009] 5AF1FD479961DD493544119B80B52CD1
C:\Windows\System32\it-IT\wininit.exe.mui --a---- 5632 bytes [08:14 06/11/2009] [10:45 13/07/2009] E9325A155EEA8A716032F056F85C3F2E
C:\Windows\System32\ja-JP\wininit.exe.mui --a---- 4096 bytes [05:50 09/11/2009] [11:53 13/07/2009] 98B066C435C4164C7661AAF0A8124FE3
C:\Windows\System32\ko-KR\wininit.exe.mui --a---- 4096 bytes [08:30 06/11/2009] [11:59 13/07/2009] 8E194149421314A28A856DF5DBE8A065
C:\Windows\System32\zh-CN\wininit.exe.mui --a---- 3584 bytes [05:07 09/11/2009] [11:59 13/07/2009] 1B61C83697CAAE05C8FE4C04BA2DAD02
C:\Windows\System32\zh-TW\wininit.exe.mui --a---- 3584 bytes [05:21 09/11/2009] [11:59 13/07/2009] 94410E837042F9F6CFE5E9638F2C51B1
C:\Windows\SysWOW64\wininit.exe --a---- 96256 bytes [23:36 13/07/2009] [01:14 14/07/2009] (Unable to calculate MD5)
C:\Windows\SysWOW64\de-DE\wininit.exe.mui --a---- 5120 bytes [04:02 05/11/2009] [10:39 13/07/2009] 150A6D5C88E3F1F762F474A88CA3AB7A
C:\Windows\SysWOW64\en-US\wininit.exe.mui --a---- 5120 bytes [05:35 14/07/2009] [02:05 14/07/2009] 0CA1666E3535B8045352649498A8E1A6
C:\Windows\SysWOW64\fr-FR\wininit.exe.mui --a---- 5120 bytes [07:37 06/11/2009] [10:39 13/07/2009] 5AF1FD479961DD493544119B80B52CD1
C:\Windows\SysWOW64\it-IT\wininit.exe.mui --a---- 5632 bytes [08:14 06/11/2009] [10:45 13/07/2009] E9325A155EEA8A716032F056F85C3F2E
C:\Windows\SysWOW64\ja-JP\wininit.exe.mui --a---- 4096 bytes [05:50 09/11/2009] [11:53 13/07/2009] 98B066C435C4164C7661AAF0A8124FE3
C:\Windows\SysWOW64\ko-KR\wininit.exe.mui --a---- 4096 bytes [08:30 06/11/2009] [11:59 13/07/2009] 8E194149421314A28A856DF5DBE8A065
C:\Windows\SysWOW64\zh-CN\wininit.exe.mui --a---- 3584 bytes [05:07 09/11/2009] [11:59 13/07/2009] 1B61C83697CAAE05C8FE4C04BA2DAD02
C:\Windows\SysWOW64\zh-TW\wininit.exe.mui --a---- 3584 bytes [05:21 09/11/2009] [11:59 13/07/2009] 94410E837042F9F6CFE5E9638F2C51B1
C:\Windows\winsxs\amd64_microsoft-windows-wininit.resources_31bf3856ad364e35_6.1.7600.16385_de-de_f869ac74355a4089\wininit.exe.mui --a---- 5120 bytes [04:02 05/11/2009] [11:07 13/07/2009] 5B6FDF0DA2B2B6D1255396A57E6972C3
C:\Windows\winsxs\amd64_microsoft-windows-wininit.resources_31bf3856ad364e35_6.1.7600.16385_en-us_a15a826d24384c4e\wininit.exe.mui --a---- 5120 bytes [05:35 14/07/2009] [02:25 14/07/2009] 52445E61DF6C069AC858A0D9F81A97A2
C:\Windows\winsxs\amd64_microsoft-windows-wininit.resources_31bf3856ad364e35_6.1.7600.16385_fr-fr_43dd555017315455\wininit.exe.mui --a---- 5120 bytes [07:36 06/11/2009] [11:00 13/07/2009] 8D37DB7F360E87A7232815204B32C99F
C:\Windows\winsxs\amd64_microsoft-windows-wininit.resources_31bf3856ad364e35_6.1.7600.16385_it-it_2e054b96ee6339d3\wininit.exe.mui --a---- 5632 bytes [08:13 06/11/2009] [11:06 13/07/2009] 5AA9682A187D757D69FEC76CA3C97271
C:\Windows\winsxs\amd64_microsoft-windows-wininit.resources_31bf3856ad364e35_6.1.7600.16385_ja-jp_d02acaa3e17e4bae\wininit.exe.mui --a---- 4096 bytes [05:50 09/11/2009] [11:14 13/07/2009] 2ACB6E8EFBDD6C7855DA100FD80EB02C
C:\Windows\winsxs\amd64_microsoft-windows-wininit.resources_31bf3856ad364e35_6.1.7600.16385_ko-kr_7394a758d3ef12c4\wininit.exe.mui --a---- 4096 bytes [08:30 06/11/2009] [12:14 13/07/2009] 7757DD8AC8D57FC7C094535E5FC155E0
C:\Windows\winsxs\amd64_microsoft-windows-wininit.resources_31bf3856ad364e35_6.1.7600.16385_zh-cn_00e0ecdb0b5a2660\wininit.exe.mui --a---- 3584 bytes [05:06 09/11/2009] [12:08 13/07/2009] 014F9D30B713801DA5F7370A25984E0D
C:\Windows\winsxs\amd64_microsoft-windows-wininit.resources_31bf3856ad364e35_6.1.7600.16385_zh-tw_04dd2a3108cb02d0\wininit.exe.mui --a---- 3584 bytes [05:21 09/11/2009] [12:08 13/07/2009] D12938FA8A903650CF4FD9E91E9340A7
C:\Windows\winsxs\amd64_microsoft-windows-wininit_31bf3856ad364e35_6.1.7600.16385_none_8ce7aa761e01ad49\wininit.exe --a---- 129024 bytes [23:52 13/07/2009] [01:39 14/07/2009] 94355C28C1970635A31B3FE52EB7CEBA
C:\Windows\winsxs\x86_microsoft-windows-wininit.resources_31bf3856ad364e35_6.1.7600.16385_de-de_9c4b10f07cfccf53\wininit.exe.mui --a---- 5120 bytes [04:02 05/11/2009] [10:39 13/07/2009] 150A6D5C88E3F1F762F474A88CA3AB7A
C:\Windows\winsxs\x86_microsoft-windows-wininit.resources_31bf3856ad364e35_6.1.7600.16385_en-us_453be6e96bdadb18\wininit.exe.mui --a---- 5120 bytes [05:35 14/07/2009] [02:05 14/07/2009] 0CA1666E3535B8045352649498A8E1A6
C:\Windows\winsxs\x86_microsoft-windows-wininit.resources_31bf3856ad364e35_6.1.7600.16385_fr-fr_e7beb9cc5ed3e31f\wininit.exe.mui --a---- 5120 bytes [07:37 06/11/2009] [10:39 13/07/2009] 5AF1FD479961DD493544119B80B52CD1
C:\Windows\winsxs\x86_microsoft-windows-wininit.resources_31bf3856ad364e35_6.1.7600.16385_it-it_d1e6b0133605c89d\wininit.exe.mui --a---- 5632 bytes [08:14 06/11/2009] [10:45 13/07/2009] E9325A155EEA8A716032F056F85C3F2E
C:\Windows\winsxs\x86_microsoft-windows-wininit.resources_31bf3856ad364e35_6.1.7600.16385_ja-jp_740c2f202920da78\wininit.exe.mui --a---- 4096 bytes [05:50 09/11/2009] [11:53 13/07/2009] 98B066C435C4164C7661AAF0A8124FE3
C:\Windows\winsxs\x86_microsoft-windows-wininit.resources_31bf3856ad364e35_6.1.7600.16385_ko-kr_17760bd51b91a18e\wininit.exe.mui --a---- 4096 bytes [08:30 06/11/2009] [11:59 13/07/2009] 8E194149421314A28A856DF5DBE8A065
C:\Windows\winsxs\x86_microsoft-windows-wininit.resources_31bf3856ad364e35_6.1.7600.16385_zh-cn_a4c2515752fcb52a\wininit.exe.mui --a---- 3584 bytes [05:07 09/11/2009] [11:59 13/07/2009] 1B61C83697CAAE05C8FE4C04BA2DAD02
C:\Windows\winsxs\x86_microsoft-windows-wininit.resources_31bf3856ad364e35_6.1.7600.16385_zh-tw_a8be8ead506d919a\wininit.exe.mui --a---- 3584 bytes [05:21 09/11/2009] [11:59 13/07/2009] 94410E837042F9F6CFE5E9638F2C51B1
C:\Windows\winsxs\x86_microsoft-windows-wininit_31bf3856ad364e35_6.1.7600.16385_none_30c90ef265a43c13\wininit.exe --a---- 96256 bytes [23:36 13/07/2009] [01:14 14/07/2009] B5C5DCAD3899512020D135600129D665

-= EOF =-


#8 etavares

etavares

    Bleepin' Remover


  • Malware Response Team
  • 15,514 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:11:05 PM

Posted 09 October 2010 - 06:37 AM

Hello, Skitz69.

Ok, manual removal time. First, we need to copy the file to a location we can access later.
  1. Please open Notepad.
  2. Copy and paste the text in the box below into Notepad, excluding the word code.
    CODE
    @ECHO OFF
    copy C:\Windows\winsxs\x86_microsoft-windows-wininit_31bf3856ad364e35_6.1.7600.16385_none_30c90ef265a43c13\wininit.exe c:\windows\wininit.new > %USERPROFILE%\Desktop\CopyLog.txt
    dir c:\windows\wininit.new >> %USERPROFILE%\Desktop\CopyLog.txt
    start %USERPROFILE%\Desktop\CopyLog.txt
    del %0

    This fix is custom made for this user's computer.
  3. Select File-->Save As
  4. Select File as Type: All Types (*.*)
  5. Save it to your desktop as fixme.bat
  6. Right-click on fixme.bat on your desktop and select "Run As Administrator". If Windows asks, click YES to allow it to proceed.
  7. A window will briefly pop up then close.
  8. A log will open, please copy and paste it into your response.

etavares


If I don't respond within 2 days, please feel free to PM me.
Please don't ask for help via PM. The forums are there for a reason. Please post in the forums so others may benefit as well.

Posted Image
Unified Network of Instructors and Trusted Eliminators
 


#9 Skitz69

Skitz69
  • Topic Starter

  • Members
  • 51 posts
  • OFFLINE
  •  
  • Local time:11:05 AM

Posted 09 October 2010 - 09:20 AM

Hey

Heres my log:

1 file(s) copied.
Volume in drive C is System
Volume Serial Number is A83F-61FB

Directory of c:\windows

14/07/2009 09:14 AM 96,256 wininit.new
1 File(s) 96,256 bytes
0 Dir(s) 40,385,929,216 bytes free


#10 etavares

etavares

    Bleepin' Remover


  • Malware Response Team
  • 15,514 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:11:05 PM

Posted 10 October 2010 - 06:53 AM

OK, next up we need your Windows 7 installation CD. Do you have it?


If I don't respond within 2 days, please feel free to PM me.
Please don't ask for help via PM. The forums are there for a reason. Please post in the forums so others may benefit as well.

Posted Image
Unified Network of Instructors and Trusted Eliminators
 


#11 Skitz69

Skitz69
  • Topic Starter

  • Members
  • 51 posts
  • OFFLINE
  •  
  • Local time:11:05 AM

Posted 11 October 2010 - 08:09 AM

No I don't sorry. I don't even have a CD drive on the infected computer.

#12 etavares

etavares

    Bleepin' Remover


  • Malware Response Team
  • 15,514 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:11:05 PM

Posted 11 October 2010 - 05:57 PM

Ok, I have an idea, but need to ensure this tool works on 64bit windows. I'll be back in the next day or so.

Nevermind...it doesn't work. Back in a bit.

Edited by etavares, 11 October 2010 - 05:58 PM.


If I don't respond within 2 days, please feel free to PM me.
Please don't ask for help via PM. The forums are there for a reason. Please post in the forums so others may benefit as well.

Posted Image
Unified Network of Instructors and Trusted Eliminators
 


#13 etavares

etavares

    Bleepin' Remover


  • Malware Response Team
  • 15,514 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:11:05 PM

Posted 11 October 2010 - 06:03 PM

Do you have a spare thumbdrive to devote to the cause? We need to bootup outside of Windows. We can create a free bootable flash drive with basic functionality if you have one.


If I don't respond within 2 days, please feel free to PM me.
Please don't ask for help via PM. The forums are there for a reason. Please post in the forums so others may benefit as well.

Posted Image
Unified Network of Instructors and Trusted Eliminators
 


#14 Skitz69

Skitz69
  • Topic Starter

  • Members
  • 51 posts
  • OFFLINE
  •  
  • Local time:11:05 AM

Posted 12 October 2010 - 06:43 AM

Yes, I do have a few free thumb drives I can use. I have a 4 GB and a 2 GB one. Can either be used?

Thanks.

#15 etavares

etavares

    Bleepin' Remover


  • Malware Response Team
  • 15,514 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:11:05 PM

Posted 12 October 2010 - 05:33 PM

OK, first, do you have a backup? Just in case. This is an important Windows file. The good news is that our approach allows us to undo what we did. Both flash drives should work fine.

Next, I need to buy a flashdrive to test on my end first. Long story, but I only have two, both of which are work related and not mine to do with as I please. smile.gif

I'll be back in a day or two. Please reply back and let me know about your backup status.



If I don't respond within 2 days, please feel free to PM me.
Please don't ask for help via PM. The forums are there for a reason. Please post in the forums so others may benefit as well.

Posted Image
Unified Network of Instructors and Trusted Eliminators
 





0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users