Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

search engine result redirect plus error screen


  • This topic is locked This topic is locked
2 replies to this topic

#1 nummynummy69

nummynummy69

  • Members
  • 1 posts
  • OFFLINE
  •  
  • Local time:12:16 AM

Posted 05 November 2010 - 03:25 PM

Hi Guys

I have two problems which i hope both are just one, i am struggling to sort out a issue with interent explorer. when using a search engine i am getting redirected to a different result, much like a lot of people on here. I also when surfing will have random explorer windows open again to a screen which is similar to those that the search engine result give

the other problem i have is a error screen saying that my memory is full. i cant remember the exact number / problem it is but googling it told me to try you guys.

I have downloaded Combo fix and ran a scan and below is my report. Please guys help me out i at my whits end with this

ComboFix 10-11-05.01 - Dad 05/11/2010 19:09:36.2.2 - x86
Microsoft Windows XP Home Edition 5.1.2600.3.1252.44.1033.18.1022.440 [GMT 0:00]
Running from: c:\documents and settings\Dad\Desktop\ComboFix.exe
AV: McAfee VirusScan *On-access scanning enabled* (Updated) {84B5EE75-6421-4CDE-A33A-DD43BA9FAD83}
FW: McAfee Personal Firewall *enabled* {94894B63-8C7F-4050-BDA4-813CA00DA3E8}
* Resident AV is active

.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.
.
---- Previous Run -------
.
c:\documents and settings\Dad\Local Settings\Application Data\{4A38074C-C0CC-4E56-9A3A-5ED13752ECF0}\chrome.manifest
c:\documents and settings\Dad\Local Settings\Application Data\{4A38074C-C0CC-4E56-9A3A-5ED13752ECF0}\chrome\content\_cfg.js
c:\documents and settings\Dad\Local Settings\Application Data\{4A38074C-C0CC-4E56-9A3A-5ED13752ECF0}\chrome\content\overlay.xul
c:\documents and settings\Dad\Local Settings\Application Data\{4A38074C-C0CC-4E56-9A3A-5ED13752ECF0}\install.rdf
c:\documents and settings\Dad\Local Settings\Application Data\56577.exe
c:\program files\MyWay\SrchAstt\1.bin\MYSRCHAS.DLL
c:\program files\MyWay\SrchAstt\Cache\000287E3
c:\program files\MyWay\SrchAstt\Cache\0005B84B
c:\program files\MyWay\SrchAstt\Cache\00134A0C
c:\program files\MyWay\SrchAstt\Cache\0095F24A
c:\program files\MyWay\SrchAstt\Cache\0095F4FA
c:\program files\MyWay\SrchAstt\Cache\0095F632
c:\program files\MyWay\SrchAstt\Cache\00B9F2D8
c:\program files\MyWay\SrchAstt\Cache\files.ini
c:\windows\system32\csncui.dll
c:\windows\system32\plugin1.dat

.
((((((((((((((((((((((((((((((((((((((( Drivers/Services )))))))))))))))))))))))))))))))))))))))))))))))))
.

-------\Legacy_CMDSERVICE
-------\Service_NPF


((((((((((((((((((((((((( Files Created from 2010-10-05 to 2010-11-05 )))))))))))))))))))))))))))))))
.

2010-11-05 17:17 . 2010-11-05 17:17 -------- d-----w- c:\documents and settings\Dad\Application Data\Malwarebytes
2010-11-05 17:17 . 2010-04-29 15:39 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2010-11-05 17:17 . 2010-11-05 17:17 -------- d-----w- c:\documents and settings\All Users\Application Data\Malwarebytes
2010-11-05 17:17 . 2010-11-05 17:17 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
2010-11-05 17:17 . 2010-04-29 15:39 20952 ----a-w- c:\windows\system32\drivers\mbam.sys
2010-11-05 16:08 . 2010-11-05 16:09 -------- d-----w- c:\documents and settings\Dad\Local Settings\Application Data\Temp
2010-11-05 16:06 . 2010-11-05 16:07 -------- d-----w- c:\documents and settings\Dad\Local Settings\Application Data\Deployment
2010-11-01 19:33 . 2010-11-01 19:36 -------- dc-h--w- c:\windows\ie8
2010-11-01 19:26 . 2010-11-01 19:36 -------- d-----w- C:\0ebacdaa952fd7b5b46e061ae73b93
2010-10-29 17:00 . 2010-10-29 17:00 0 ----a-w- c:\windows\ativpsrm.bin
2010-10-29 16:42 . 2001-08-17 11:49 23552 -c--a-w- c:\windows\system32\dllcache\atixbar.sys
2010-10-19 17:23 . 2010-10-07 23:21 6146896 ----a-w- c:\documents and settings\All Users\Application Data\Microsoft\Windows Defender\Definition Updates\{F569ADED-73DC-486F-BD4A-71F3179B5C3C}\mpengine.dll

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2010-09-18 11:23 . 2004-10-27 18:11 974848 ----a-w- c:\windows\system32\mfc42u.dll
2010-09-18 06:53 . 2004-10-27 18:11 974848 ----a-w- c:\windows\system32\mfc42.dll
2010-09-18 06:53 . 2004-10-27 18:11 954368 ----a-w- c:\windows\system32\mfc40.dll
2010-09-18 06:53 . 2004-10-27 18:11 953856 ----a-w- c:\windows\system32\mfc40u.dll
2010-09-09 22:52 . 2006-04-17 13:12 6084944 ----a-w- c:\documents and settings\All Users\Application Data\Microsoft\Windows Defender\Definition Updates\Backup\mpengine.dll
2010-09-04 13:09 . 2010-08-06 16:19 9344 ----a-w- c:\windows\system32\drivers\mfeclnk.sys
2010-09-04 13:09 . 2010-08-06 16:19 88544 ----a-w- c:\windows\system32\drivers\mfendisk.sys
2010-09-04 13:09 . 2010-08-06 16:19 84264 ----a-w- c:\windows\system32\drivers\mferkdet.sys
2010-09-04 13:09 . 2010-08-06 16:19 84072 ----a-w- c:\windows\system32\drivers\mfetdi2k.sys
2010-09-04 13:09 . 2010-08-06 16:19 52104 ----a-w- c:\windows\system32\drivers\mfebopk.sys
2010-09-04 13:09 . 2010-08-06 16:19 386712 ----a-w- c:\windows\system32\drivers\mfehidk.sys
2010-09-04 13:09 . 2010-08-06 16:19 312904 ----a-w- c:\windows\system32\drivers\mfefirek.sys
2010-09-04 13:09 . 2010-08-06 16:19 95600 ----a-w- c:\windows\system32\drivers\mfeapfk.sys
2010-09-04 13:09 . 2010-08-06 16:19 55840 ----a-w- c:\windows\system32\drivers\cfwids.sys
2010-09-04 13:09 . 2010-08-06 16:19 152992 ----a-w- c:\windows\system32\drivers\mfeavfk.sys
2010-09-01 11:51 . 2004-10-27 18:11 285824 ----a-w- c:\windows\system32\atmfd.dll
2010-08-31 13:42 . 2004-10-27 18:12 1852800 ----a-w- c:\windows\system32\win32k.sys
2010-08-27 17:00 . 2010-09-17 15:41 62976 ----a-w- c:\windows\system32\drivers\Cdrom.sy@
2010-08-27 08:02 . 2004-10-27 18:12 119808 ----a-w- c:\windows\system32\t2embed.dll
2010-08-27 05:57 . 2004-10-27 18:12 99840 ----a-w- c:\windows\system32\srvsvc.dll
2010-08-26 13:39 . 2004-10-27 18:12 357248 ----a-w- c:\windows\system32\drivers\srv.sys
2010-08-26 12:52 . 2009-04-16 12:09 5120 ----a-w- c:\windows\system32\xpsp4res.dll
2010-08-23 16:12 . 2004-10-27 18:11 617472 ----a-w- c:\windows\system32\comctl32.dll
2010-08-17 13:17 . 2004-10-27 18:12 58880 ----a-w- c:\windows\system32\spoolsv.exe
2010-08-16 08:45 . 2004-10-27 18:12 590848 ----a-w- c:\windows\system32\rpcrt4.dll
2010-08-13 10:50 . 2010-08-13 10:50 21361 ----a-w- c:\windows\system32\drivers\AegisP.sys
.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"SpybotSD TeaTimer"="c:\program files\Spybot - Search & Destroy\TeaTimer.exe" [2009-03-05 2260480]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"CoolSwitch"="c:\windows\system32\taskswitch.exe" [2001-10-08 45632]
"mcui_exe"="c:\program files\McAfee.com\Agent\mcagent.exe" [2010-04-01 1180976]

[hkey_local_machine\software\microsoft\windows\currentversion\explorer\ShellExecuteHooks]
"{56F9679E-7826-4C84-81F3-532071A8BCC5}"= "c:\program files\Windows Desktop Search\MSNLNamespaceMgr.dll" [2009-05-24 304128]

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\GoToAssist]
2010-09-21 20:03 16680 ----a-w- c:\program files\Citrix\GoToAssist\570\g2awinlogon.dll

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\mcmscsvc]
@=""

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\MCODS]
@=""

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\WinDefend]
@="Service"

[HKLM\~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^Belkin Wireless Networking Utility.lnk]
backup=c:\windows\pss\Belkin Wireless Networking Utility.lnkCommon Startup

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run-disabled]
"QuickTime Task"="c:\program files\QuickTime\qttask.exe" -atboottime

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring]
"DisableMonitoring"=dword:00000001

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\McAfeeAntiVirus]
"DisableMonitoring"=dword:00000001

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\McAfeeFirewall]
"DisableMonitoring"=dword:00000001

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecAntiVirus]
"DisableMonitoring"=dword:00000001

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecFirewall]
"DisableMonitoring"=dword:00000001

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=
"%SystemDir%\\winsecurityxp\\mswinup.exe"=
"c:\\Program Files\\Messenger\\msmsgs.exe"=
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"c:\\Program Files\\iTunes\\iTunes.exe"=
"c:\\Program Files\\BT Broadband Desktop Help\\btbb\\BTHelpBrowser.exe"=
"c:\\Program Files\\BT Broadband Desktop Help\\btbb\\BTHelpNotifier.exe"=
"c:\\Program Files\\Windows Live\\Sync\\WindowsLiveSync.exe"=
"c:\\Program Files\\Common Files\\McAfee\\McSvcHost\\McSvHost.exe"=

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\GloballyOpenPorts\List]
"14418:TCP"= 14418:TCP:BitComet 14418 TCP
"14418:UDP"= 14418:UDP:BitComet 14418 UDP
"1723:TCP"= 1723:TCP:@xpsp2res.dll,-22015
"1701:UDP"= 1701:UDP:@xpsp2res.dll,-22016
"500:UDP"= 500:UDP:@xpsp2res.dll,-22017

R0 EnumProcessesDriver;EnumProcessesDriver;c:\windows\system32\drivers\EnumProcessesDriver.sys [15/06/2010 20:11 15888]
R0 sptd;sptd;c:\windows\system32\drivers\sptd.sys [23/03/2007 19:08 639224]
R1 mfetdi2k;McAfee Inc. mfetdi2k;c:\windows\system32\drivers\mfetdi2k.sys [06/08/2010 16:19 84072]
R2 McAfee SiteAdvisor Service;McAfee SiteAdvisor Service;c:\program files\McAfee\SiteAdvisor\McSACore.exe [19/12/2008 18:13 88176]
R2 McMPFSvc;McAfee Personal Firewall;"c:\program files\Common Files\Mcafee\McSvcHost\McSvHost.exe" /McCoreSvc [06/08/2010 16:19 271480]
R2 McNaiAnn;McAfee VirusScan Announcer;"c:\program files\Common Files\McAfee\McSvcHost\McSvHost.exe" /McCoreSvc [06/08/2010 16:19 271480]
R2 mfefire;McAfee Firewall Core Service;c:\program files\Common Files\McAfee\SystemCore\mfefire.exe [06/08/2010 16:20 188136]
R2 mfevtp;McAfee Validation Trust Protection Service;c:\program files\Common Files\McAfee\SystemCore\mfevtps.exe [06/08/2010 16:19 141792]
R2 WinDefend;Windows Defender;c:\program files\Windows Defender\MsMpEng.exe [03/11/2006 18:19 13592]
R3 cfwids;McAfee Inc. cfwids;c:\windows\system32\drivers\cfwids.sys [06/08/2010 16:19 55840]
R3 mfefirek;McAfee Inc. mfefirek;c:\windows\system32\drivers\mfefirek.sys [06/08/2010 16:19 312904]
R3 mfendiskmp;mfendiskmp;c:\windows\system32\drivers\mfendisk.sys [06/08/2010 16:19 88544]
S2 PIEUsb;FilmScan35;c:\windows\system32\drivers\usbscan.sys [22/04/2005 15:20 15104]
S3 mfendisk;McAfee Core NDIS Intermediate Filter;c:\windows\system32\drivers\mfendisk.sys [06/08/2010 16:19 88544]
S3 mferkdet;McAfee Inc. mferkdet;c:\windows\system32\drivers\mferkdet.sys [06/08/2010 16:19 84264]
S3 Navcar;Navman In-car Navigator USB Driver Service;c:\windows\system32\drivers\Navcar.sys [24/03/2007 18:24 30329]
S3 Vsp;Vsp;c:\windows\system32\drivers\vsp.sys [26/04/2005 07:37 3351]

--- Other Services/Drivers In Memory ---

*Deregistered* - mfeavfk01
.
Contents of the 'Scheduled Tasks' folder

2008-11-11 c:\windows\Tasks\AppleSoftwareUpdate.job
- c:\program files\Apple Software Update\SoftwareUpdate.exe [2008-07-30 11:34]

2010-11-05 c:\windows\Tasks\GlaryInitialize.job
- c:\program files\Glary Utilities\initialize.exe [2008-05-24 12:22]

2010-11-05 c:\windows\Tasks\MP Scheduled Scan.job
- c:\program files\Windows Defender\MpCmdRun.exe [2006-11-03 18:20]

2010-11-05 c:\windows\Tasks\User_Feed_Synchronization-{1D89DE44-FE27-47CF-A38C-05D19B161F5D}.job
- c:\windows\system32\msfeedssync.exe [2006-10-17 04:31]
.
.
------- Supplementary Scan -------
.
uStart Page = hxxp://www.msn.com
uSearchMigratedDefaultURL = hxxp://search.yahoo.com/search?p={searchTerms}&ei=utf-8&fr=b1ie7
mStart Page = hxxp://www.msn.com
IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~4\OFFICE11\EXCEL.EXE/3000
DPF: Microsoft XML Parser for Java - file://c:\windows\Java\classes\xmldso.cab
.

**************************************************************************

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2010-11-05 19:30
Windows 5.1.2600 Service Pack 3 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully
hidden files: 0

**************************************************************************

Stealth MBR rootkit/Mebroot/Sinowal/TDL4 detector 0.4.1 by Gmer, http://www.gmer.net
Windows 5.1.2600 Disk: WDC_WD2000BB-00GUA0 rev.08.02D08 -> \Device\Ide\IdePort0

device: opened successfully
user: MBR read successfully

Disk trace:
called modules: ntoskrnl.exe CLASSPNP.SYS disk.sys ACPI.sys hal.dll >>UNKNOWN [0x872AA446]<<
_asm { PUSH EBP; MOV EBP, ESP; PUSH ECX; MOV EAX, [EBP+0x8]; CMP EAX, [0x872b0504]; MOV EAX, [0x872b0580]; PUSH EBX; PUSH ESI; MOV ESI, [EBP+0xc]; MOV EBX, [ESI+0x60]; PUSH EDI; JNZ 0x20; MOV [EBP+0x8], EAX; }
1 nt!IofCallDriver[0x804E13B9] -> \Device\Harddisk0\DR0[0x872E2AB8]
3 CLASSPNP[0xF7883FD7] -> nt!IofCallDriver[0x804E13B9] -> \Device\0000007b[0x8730CC80]
5 ACPI[0xF76EB620] -> nt!IofCallDriver[0x804E13B9] -> [0x872E3940]
\Driver\atapi[0x872B9D10] -> IRP_MJ_CREATE -> 0x872AA446
error: Read The system cannot find the file specified.
kernel: MBR read successfully
_asm { XOR AX, AX; MOV SS, AX; MOV SP, 0x7c00; STI ; PUSH AX; POP ES; PUSH AX; POP DS; CLD ; MOV SI, 0x7c1b; MOV DI, 0x61b; PUSH AX; PUSH DI; MOV CX, 0x1e5; REP MOVSB ; RETF ; MOV BP, 0x7be; MOV CL, 0x4; CMP [BP+0x0], CH; JL 0x2e; JNZ 0x3a; }
detected hooks:
\Device\Ide\IdeDeviceP2T0L0-1b -> \??\IDE#DiskWDC_WD2000BB-00GUA0_____________________08.02D08#5&26aa62d6&0&0.0.0#{53f56307-b6bf-11d0-94f2-00a0c91efb8b} device not found
\Driver\atapi DriverStartIo -> 0x872AA292
user & kernel MBR OK
Warning: possible TDL3 rootkit infection !

Filesystem trace:
called modules: ntoskrnl.exe hal.dll mfehidk.sys sr.sys fltmgr.sys >>UNKNOWN [0x873CF1D8]<<
c:\windows\system32\drivers\mfehidk.sys McAfee, Inc. SYSCORE
_asm { MOV EDX, [ESP+0x8]; LEA ECX, [ESP+0x4]; PUSH EAX; MOV EAX, ESP; PUSH EAX; PUSH 0x873cf008; MOV EAX, 0xf7746980; CALL EAX; }
1 nt!IofCallDriver[0x804E13B9] -> [0x8723E998]
3 nt[0x805794B1] -> nt!IofCallDriver[0x804E13B9] -> [0x8724DBC8]
5 sr[0xF7670870] -> nt!IofCallDriver[0x804E13B9] -> [0x8724DA90]
7 fltmgr[0xF768D5C8] -> nt!IofCallDriver[0x804E13B9] -> [0x8724C770]
\FileSystem\Ntfs[0x872889B0] -> IRP_MJ_CREATE -> 0x873CF1D8

Registry trace:
called modules: ntoskrnl.exe sptd.sys mfehidk.sys hal.dll mfeapfk.sys >>UNKNOWN [0x8738171C]<<
c:\combofix\sptd.sys Duplex Secure Ltd. SCSI Pass Through Direct
c:\windows\system32\drivers\mfehidk.sys McAfee, Inc. SYSCORE
c:\windows\system32\drivers\mfeapfk.sys McAfee, Inc. SYSCORE
_asm { PUSH EBP; MOV EBP, ESP; JMP 0xfffffffff91eae42; }

**************************************************************************
.
--------------------- LOCKED REGISTRY KEYS ---------------------

[HKEY_USERS\S-1-5-21-915333897-4210697009-1163199446-1006\Software\SecuROM\!CAUTION! NEVER A OR CHANGE ANY KEY*]
"??"=hex:35,6c,01,d1,b8,3c,8b,1f,92,05,c0,76,ad,65,08,03,53,9c,b4,36,be,60,bd,
97,06,ba,8d,52,8d,8e,91,de,74,92,b1,31,6c,6d,6f,7b,02,c3,f6,9e,df,dd,ab,10,\
"??"=hex:98,92,76,c1,aa,88,4f,41,49,86,ff,73,28,c6,e6,0d

[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{A483C63A-CDBC-426E-BF93-872502E8144E}]
@Denied: (A 2) (Everyone)
@="FlashBroker"
"LocalizedString"="@c:\\WINDOWS\\system32\\Macromed\\Flash\\FlashUtil10k_ActiveX.exe,-101"

[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{A483C63A-CDBC-426E-BF93-872502E8144E}\Elevation]
"Enabled"=dword:00000001

[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{A483C63A-CDBC-426E-BF93-872502E8144E}\LocalServer32]
@="c:\\WINDOWS\\system32\\Macromed\\Flash\\FlashUtil10k_ActiveX.exe"

[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{A483C63A-CDBC-426E-BF93-872502E8144E}\TypeLib]
@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"

[HKEY_LOCAL_MACHINE\software\Classes\Interface\{E3F2C3CB-5EB8-4A04-B22C-7E3B4B6AF30F}]
@Denied: (A 2) (Everyone)
@="IFlashBroker4"

[HKEY_LOCAL_MACHINE\software\Classes\Interface\{E3F2C3CB-5EB8-4A04-B22C-7E3B4B6AF30F}\ProxyStubClsid32]
@="{00020424-0000-0000-C000-000000000046}"

[HKEY_LOCAL_MACHINE\software\Classes\Interface\{E3F2C3CB-5EB8-4A04-B22C-7E3B4B6AF30F}\TypeLib]
@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"
"Version"="1.0"
.
--------------------- DLLs Loaded Under Running Processes ---------------------

- - - - - - - > 'winlogon.exe'(1192)
c:\windows\system32\Ati2evxx.dll
c:\program files\Citrix\GoToAssist\570\G2AWinLogon.dll

- - - - - - - > 'explorer.exe'(3144)
c:\progra~1\mcafee\SITEAD~1\saHook.dll
c:\windows\system32\ieframe.dll
c:\windows\system32\OneX.DLL
c:\windows\system32\eappprxy.dll
c:\windows\system32\webcheck.dll
c:\windows\system32\WPDShServiceObj.dll
c:\windows\system32\PortableDeviceTypes.dll
c:\windows\system32\PortableDeviceApi.dll
.
------------------------ Other Running Processes ------------------------
.
c:\windows\system32\Ati2evxx.exe
c:\windows\system32\Ati2evxx.exe
c:\windows\system32\rundll32.exe
c:\program files\Common Files\EPSON\eEBAPI\eEBSVC.exe
c:\program files\Common Files\EPSON\eEBAPI\SAgent2.exe
c:\program files\Java\jre6\bin\jqs.exe
c:\program files\Common Files\Motive\McciCMService.exe
c:\windows\system32\rundll32.exe
c:\program files\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE
c:\program files\Common Files\McAfee\SystemCore\mcshield.exe
.
**************************************************************************
.
Completion time: 2010-11-05 19:43:19 - machine was rebooted
ComboFix-quarantined-files.txt 2010-11-05 19:43

Pre-Run: 166,323,081,216 bytes free
Post-Run: 166,272,880,640 bytes free

- - End Of File - - D14BC005BF3CC972A0F81D3D2ACE8391

Attached Files

  • Attached File  log.txt   17.24KB   1 downloads

Edited by elise025, 05 November 2010 - 04:03 PM.
Since a log is posted, I'm moving this to the Malware Removal forum ~ Elise


BC AdBot (Login to Remove)

 


#2 etavares

etavares

    Bleepin' Remover


  • Malware Response Team
  • 15,514 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:08:16 PM

Posted 13 November 2010 - 11:44 AM

Hello and welcome to Bleeping Computer

We apologize for the delay in responding to your request for help. Here at Bleeping Computer we get overwhelmed at times, and we are trying our best to keep up. Please note that your topic was not intentionally overlooked. Our mission is to help everyone in need, but sometimes it takes just a little longer to get to every request for help. No one is ignored here.

If you have since resolved the original problem you were having, we would appreciate you letting us know. If not please perform the following steps below so we can have a look at the current condition of your machine.

If you have not done so, include a clear description of the problems you're having, along with any steps you may have performed so far.

Please refrain from running tools or applying updates other than those we suggest while we are cleaning up your computer. The reason for this is so we know what is going on with the machine at any time. Some programs can interfere with others and hamper the recovery process. Please also continue to work with me until I give you the all clear. Even if your computer appears to act better, you may still be infected.

Even if you have already provided information about your PC, we need a new log to see what has changed since you originally posted your problem.

Once we start working together, please reply back within 3 days or this thread may be closed so we can help others who are waiting.

We need to create an OTL report,
  • Please download OTL from this link.
  • Save it to your desktop.
  • Double click on the Posted Image icon on your desktop.
  • Click the "Scan All Users" checkbox.
  • Under the Custom Scan box paste this in:

    netsvcs
    msconfig
    drivers32 /all
    %systemroot%\system32\*.dll /lockedfiles
    %systemroot%\system32\*.sys /90
    %systemroot%\Tasks\*.job /lockedfiles
    %systemroot%\System32\config\*.sav
    %SYSTEMDRIVE%\*.*
    %systemroot%\system32\Spool\prtprocs\w32x86\*.dll
    %systemroot%\*. /mp /s
    HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
    CREATERESTOREPOINT

  • Click the Quick Scan button.
  • The scan should take a few minutes.
  • Please copy and paste both logs in your reply.

We also need a new log from the GMER anti-rootkit scanner. Please first disable any CD emulation programs using the steps found in this topic:

Why we request you disable CD Emulation when receiving Malware Removal Advice

Then create another GMER log and post it as an attachment to the reply where you post your new OTL log. Instructions on how to properly create a GMER log can be found here:

How to create a GMER log


In your reply, please post both OTL logs and the GMER log.


If I don't respond within 2 days, please feel free to PM me.
Please don't ask for help via PM. The forums are there for a reason. Please post in the forums so others may benefit as well.

Posted Image
Unified Network of Instructors and Trusted Eliminators
 


#3 etavares

etavares

    Bleepin' Remover


  • Malware Response Team
  • 15,514 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:08:16 PM

Posted 18 November 2010 - 06:54 PM

Due to the lack of feedback, this Topic is closed.

If you need this topic reopened, please request this by sending the moderating team
a PM with the address of the thread. This applies only to the original topic starter.

Everyone else please begin a New Topic.


If I don't respond within 2 days, please feel free to PM me.
Please don't ask for help via PM. The forums are there for a reason. Please post in the forums so others may benefit as well.

Posted Image
Unified Network of Instructors and Trusted Eliminators
 





0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users