Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

NTVDM CPU error


  • This topic is locked This topic is locked
21 replies to this topic

#1 oukil

oukil

  • Members
  • 12 posts
  • OFFLINE
  •  
  • Local time:03:53 AM

Posted 27 November 2010 - 10:04 PM

Just this evening ive been getting and error when in startup which states "The NTVDM CPU has encountered an illegal instruction" since then my pc became very slow!!. and i cant even use Run to make commands nor the Task Manager.
I havent downloaded or installed any new applications..although i used a flash drive which seemed infected, My Nod32 detected a few worms and trojan,i thought it was okay but then it kept detecting a worm in C:\WINDOWS\system32\AUTOCONVE.EXE and couldnt get rid of it. I tried CCleaner to remove two suspicious files from startup,(ANLEAP.exe and AUTOCONVE ) it worked but i still havent deleted it and i cant use the task manager =(



DDS (Ver_10-11-27.01) - NTFSx86
Run by oukil at 2:45:59.45 on Sun 11/28/2010
Internet Explorer: 7.0.5730.13 BrowserJavaVersion: 1.6.0_22
Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.1278.734 [GMT 0:00]

AV: ESET NOD32 Antivirus 3.0 *On-access scanning enabled* (Updated) {E5E70D32-0101-4F12-8FB0-D96ACA4F34C0}

============== Running Processes ===============

C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\system32\svchost -k DcomLaunch
svchost.exe
C:\WINDOWS\System32\svchost.exe -k netsvcs
svchost.exe
svchost.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\spoolsv.exe
svchost.exe
C:\program files\internet explorer\IEXPLORE.EXE
C:\Program Files\ESET\ESET NOD32 Antivirus\ekrn.exe
C:\WINDOWS\system32\svchost.exe -k hpdevmgmt
C:\Program Files\ESET\ESET NOD32 Antivirus\egui.exe
C:\Program Files\Analog Devices\Core\smax4pnp.exe
C:\Program Files\Common Files\Java\Java Update\jusched.exe
C:\Program Files\Modem Samsung SCH-U209\sysctrlU.exe
C:\Program Files\Modem Samsung SCH-U209\SamsungPnPServiceManager.exe
C:\Program Files\Java\jre6\bin\jqs.exe
C:\Program Files\HP\Digital Imaging\bin\hpqtra08.exe
C:\Program Files\Malwarebytes' Anti-Malware\mbamservice.exe
C:\Program Files\Nero\Nero8\Nero BackItUp\NBService.exe
C:\WINDOWS\System32\svchost.exe -k HPZ12
C:\WINDOWS\system32\IoctlSvc.exe
C:\WINDOWS\System32\svchost.exe -k HPZ12
C:\WINDOWS\system32\svchost.exe -k imgsvc
"C:\WINDOWS\system32\svchost.exe"
C:\Program Files\HP\Digital Imaging\bin\hpqSTE08.exe
C:\Program Files\Mozilla Firefox\firefox.exe
C:\Documents and Settings\oukil\Desktop\dds.scr

============== Pseudo HJT Report ===============

uStart Page = hxxp://www.inwi.ma/
BHO: {5C255C8A-E604-49b4-9D64-90988571CECB} - No File
BHO: Programme d'aide de l'Assistant de connexion Windows Live: {9030d464-4c02-4abf-8ecc-5164760863c6} - c:\program files\common files\microsoft shared\windows live\WindowsLiveLogin.dll
BHO: Java™ Plug-In 2 SSV Helper: {dbc80044-a445-435b-bc74-9c25c1c588a9} - c:\program files\java\jre6\bin\jp2ssv.dll
BHO: JQSIEStartDetectorImpl Class: {e7e6f031-17ce-4c07-bc86-eabfe594f69c} - c:\program files\java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll
uRun: [WhatPulse] c:\program files\whatpulse\WhatPulse.exe
uRun: [Google Update] "c:\documents and settings\oukil\local settings\application data\google\update\GoogleUpdate.exe" /c
uRun: [Z810SysStart] c:\program files\modem samsung sch-u209\sysctrlU.exe
uRun: [Z810PNP] c:\program files\modem samsung sch-u209\SamsungPnPServiceManager.exe
uRun: [uTorrent] "c:\program files\utorrent\uTorrent.exe"
mRun: [egui] "c:\program files\eset\eset nod32 antivirus\egui.exe" /hide /waitservice
mRun: [SoundMAXPnP] c:\program files\analog devices\core\smax4pnp.exe
mRun: [NBKeyScan] "c:\program files\nero\nero8\nero backitup\NBKeyScan.exe"
mRun: [SunJavaUpdateSched] "c:\program files\common files\java\java update\jusched.exe"
mRun: [TaskTray]
dRunOnce: [_nltide_2] regsvr32 /s /n /i:U shell32
dRunOnce: [IE8] rundll32 advpack.dll,LaunchINFSection IE8.INF,FirstUserStart
dRunOnce: [ShowDeskFix] regsvr32 /s /n /i:u shell32
StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\hpdigi~1.lnk - c:\program files\hp\digital imaging\bin\hpqtra08.exe
uPolicies-explorer: NoFind = 1 (0x1)
uPolicies-explorer: NoRun = 1 (0x1)
uPolicies-system: DisableTaskMgr = 1 (0x1)
uPolicies-system: DisableRegistryTools = 1 (0x1)
mPolicies-explorer: NoFolderOptions = 1 (0x1)
IE: E&xporter vers Microsoft Excel - c:\progra~1\micros~4\office11\EXCEL.EXE/3000
IE: {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe
IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe
IE: {92780B25-18CC-41C8-B9BE-3C9C571A8263} - {FF059E31-CC5A-4E2E-BF3B-96E929D65503} - c:\progra~1\micros~4\office11\REFIEBAR.DLL
DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_22-windows-i586.cab
DPF: {CAFEEFAC-0016-0000-0022-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_22-windows-i586.cab
DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_22-windows-i586.cab
TCP: {41CE646F-6E15-4E7E-85A7-43D4F37D5732} = 192.168.50.58 192.168.60.55
Notify: AtiExtEvent - Ati2evxx.dll
Notify: LBTWlgn - c:\program files\common files\logishrd\bluetooth\LBTWlgn.dll
SSODL: WPDShServiceObj - {AAA288BA-9A4C-45B0-95D7-94D524869DB5} - c:\windows\system32\wpdshserviceobj.dll
IFEO: autoruns.exe - c:\windows\system32\AUTOCONVE.EXE
IFEO: mmc.exe - c:\windows\system32\AUTOCONVE.EXE
IFEO: msconfig.exe - c:\windows\system32\AUTOCONVE.EXE
IFEO: procexp.exe - c:\windows\system32\AUTOCONVE.EXE
IFEO: regedit.exe - c:\windows\system32\AUTOCONVE.EXE

Note: multiple IFEO entries found. Please refer to Attach.txt

================= FIREFOX ===================

FF - ProfilePath - c:\docume~1\oukil\applic~1\mozilla\firefox\profiles\febeprof.my\
FF - prefs.js: browser.startup.homepage - hxxp://fr.start3.mozilla.com/firefox?client=firefox-a&rls=org.mozilla:fr:official
FF - component: c:\documents and settings\oukil\application data\mozilla\firefox\profiles\febeprof.my\extensions\{0b457caa-602d-484a-8fe7-c1d894a011ba}\platform\winnt_x86-msvc\components\SSSLauncher.dll
FF - plugin: c:\documents and settings\oukil\local settings\application data\google\update\1.2.183.39\npGoogleOneClick8.dll
FF - plugin: c:\program files\java\jre6\bin\new_plugin\npdeployJava1.dll
FF - plugin: c:\program files\mozilla firefox\plugins\npFoxitReaderPlugin.dll
FF - HiddenExtension: Java Console: No Registry Reference - c:\program files\mozilla firefox\extensions\{CAFEEFAC-0016-0000-0020-ABCDEFFEDCBA}
FF - HiddenExtension: Java Console: No Registry Reference - c:\program files\mozilla firefox\extensions\{CAFEEFAC-0016-0000-0021-ABCDEFFEDCBA}
FF - HiddenExtension: Java Console: No Registry Reference - c:\program files\mozilla firefox\extensions\{CAFEEFAC-0016-0000-0022-ABCDEFFEDCBA}
FF - Extension: Default: {972ce4c6-7e08-4474-a285-3208198ce6fd} - c:\program files\mozilla firefox\extensions\{972ce4c6-7e08-4474-a285-3208198ce6fd}
FF - Extension: Java Console: {CAFEEFAC-0016-0000-0020-ABCDEFFEDCBA} - c:\program files\mozilla firefox\extensions\{CAFEEFAC-0016-0000-0020-ABCDEFFEDCBA}
FF - Extension: Java Console: {CAFEEFAC-0016-0000-0021-ABCDEFFEDCBA} - c:\program files\mozilla firefox\extensions\{CAFEEFAC-0016-0000-0021-ABCDEFFEDCBA}
FF - Extension: Java Console: {CAFEEFAC-0016-0000-0022-ABCDEFFEDCBA} - c:\program files\mozilla firefox\extensions\{CAFEEFAC-0016-0000-0022-ABCDEFFEDCBA}
FF - Extension: FEBE: {4BBDD651-70CF-4821-84F8-2B918CF89CA3} - c:\docume~1\oukil\applic~1\mozilla\firefox\profiles\febeprof.my\extensions\{4BBDD651-70CF-4821-84F8-2B918CF89CA3}
FF - Extension: Adblock Plus: {d10d0bf8-f5b5-c8b4-a8b2-2b9879e08c5d} - c:\docume~1\oukil\applic~1\mozilla\firefox\profiles\febeprof.my\extensions\{d10d0bf8-f5b5-c8b4-a8b2-2b9879e08c5d}
FF - Extension: Clean And Close: clean_and_close@csb7.com - c:\docume~1\oukil\applic~1\mozilla\firefox\profiles\febeprof.my\extensions\clean_and_close@csb7.com
FF - Extension: DownloadHelper: {b9db16a4-6edc-47ec-a1f4-b86292ed211d} - c:\docume~1\oukil\applic~1\mozilla\firefox\profiles\febeprof.my\extensions\{b9db16a4-6edc-47ec-a1f4-b86292ed211d}
FF - Extension: Flagfox: {1018e4d6-728f-4b20-ad56-37578a4de76b} - c:\docume~1\oukil\applic~1\mozilla\firefox\profiles\febeprof.my\extensions\{1018e4d6-728f-4b20-ad56-37578a4de76b}
FF - Extension: Show Go!: showgo@supernova00 - c:\docume~1\oukil\applic~1\mozilla\firefox\profiles\febeprof.my\extensions\showgo@supernova00
FF - Extension: Tab Mix Plus: {dc572301-7619-498c-a57d-39143191b318} - c:\docume~1\oukil\applic~1\mozilla\firefox\profiles\febeprof.my\extensions\{dc572301-7619-498c-a57d-39143191b318}
FF - Extension: WOT: {a0d7ccb3-214d-498b-b4aa-0e8fda9a7bf7} - c:\docume~1\oukil\applic~1\mozilla\firefox\profiles\febeprof.my\extensions\{a0d7ccb3-214d-498b-b4aa-0e8fda9a7bf7}
FF - Extension: own: {35f30c40-35d4-11d9-8dbc-000c6e787ef7} - c:\docume~1\oukil\applic~1\mozilla\firefox\profiles\febeprof.my\extensions\{35f30c40-35d4-11d9-8dbc-000c6e787ef7}
FF - Extension: FireShot: {0b457cAA-602d-484a-8fe7-c1d894a011ba} - c:\docume~1\oukil\applic~1\mozilla\firefox\profiles\febeprof.my\extensions\{0b457cAA-602d-484a-8fe7-c1d894a011ba}
FF - Extension: MultirowBookmarksToolbar: {FBF6D7FB-F305-4445-BB3D-FEF66579A033} - c:\docume~1\oukil\applic~1\mozilla\firefox\profiles\febeprof.my\extensions\{FBF6D7FB-F305-4445-BB3D-FEF66579A033}
FF - Extension: Sxipper: sxipper@sxip.com - c:\docume~1\oukil\applic~1\mozilla\firefox\profiles\febeprof.my\extensions\sxipper@sxip.com
FF - Extension: Lola: lol@stream18.com - c:\docume~1\oukil\applic~1\mozilla\firefox\profiles\febeprof.my\extensions\lol@stream18.com
FF - Extension: vShare Plugin: vshare@toolbar - c:\docume~1\oukil\applic~1\mozilla\firefox\profiles\febeprof.my\extensions\vshare@toolbar
FF - Extension: Java Quick Starter: jqs@sun.com - c:\program files\java\jre6\lib\deploy\jqs\ff

---- FIREFOX POLICIES ----
FF - user.js: yahoo.homepage.dontask - true
============= SERVICES / DRIVERS ===============

R1 epfwtdir;epfwtdir;c:\windows\system32\drivers\epfwtdir.sys [2008-10-24 35168]
R1 oreans32;oreans32;c:\windows\system32\drivers\oreans32.sys [2010-11-27 33824]
R2 ekrn;Eset Service;c:\program files\eset\eset nod32 antivirus\ekrn.exe [2009-10-7 472280]
R2 LBeepKE;Logitech Beep Suppression Driver;c:\windows\system32\drivers\LBeepKE.sys [2010-9-5 10448]
R2 MBAMService;MBAMService;c:\program files\malwarebytes' anti-malware\mbamservice.exe [2010-11-28 363344]
R3 MBAMProtector;MBAMProtector;c:\windows\system32\drivers\mbam.sys [2010-11-28 20952]
R3 SKUSBKBF;USB Keyboard Filter Driver;c:\windows\system32\drivers\skusbkbf.sys [2010-9-5 14048]
R3 UsblgwmAtc;LGE Wireless USB Serial02 Device;c:\windows\system32\drivers\lgwusbser02.sys [2010-10-5 21248]
R3 usblgwmbus;LGE Wireless Composite USB Device;c:\windows\system32\drivers\lgwusbbus.sys [2010-10-5 13696]
R3 UsblgwmDiag;LGE Wireless USB Serial01 Device;c:\windows\system32\drivers\lgwusbser01.sys [2010-10-5 21248]
R3 USBlgwmModem;LGE Wireless USB Modem;c:\windows\system32\drivers\lgwusbmodem.sys [2010-10-5 25216]
S2 Backup_Info;Backup_Info;c:\program files\common files\microsoft shared\msinfo\msbackup.exe [2010-11-27 2705920]
S3 MBAMSwissArmy;MBAMSwissArmy;c:\windows\system32\drivers\mbamswissarmy.sys [2010-11-28 38224]
S3 UsbEvdoAtc;LGE EVDO USB Serial Port;c:\windows\system32\drivers\lgevdoatc.sys --> c:\windows\system32\drivers\lgevdoatc.sys [?]
S3 usbevdobus;LGE EVDO Composite USB Device;c:\windows\system32\drivers\lgevdobus.sys --> c:\windows\system32\drivers\lgevdobus.sys [?]
S3 UsbEvdoDiag;LGE EVDO USB Serial DM Port;c:\windows\system32\drivers\lgevdodiag.sys --> c:\windows\system32\drivers\lgevdodiag.sys [?]
S3 USBEVDOModem;LGE EVDO USB Modem;c:\windows\system32\drivers\lgevdomodem.sys --> c:\windows\system32\drivers\lgevdomodem.sys [?]
S4 ADSLAutoconnect;ADSLAutoconnect;c:\program files\adsl autoconnect\ADSL Autoconnect.exe [2010-9-5 446464]

=============== File Associations ===============

.txt=NFOPad

=============== Created Last 30 ================

2010-11-28 01:56:16 326116 --shatr- C:\CTFMON.EXE
2010-11-28 00:17:41 -------- d-----w- c:\docume~1\oukil\applic~1\Malwarebytes
2010-11-28 00:15:34 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2010-11-28 00:15:32 -------- d-----w- c:\docume~1\alluse~1\applic~1\Malwarebytes
2010-11-28 00:15:23 20952 ----a-w- c:\windows\system32\drivers\mbam.sys
2010-11-28 00:15:23 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
2010-11-27 21:21:53 326116 --shatr- c:\windows\system32\AUTOCONVE.EXE
2010-11-27 21:15:29 2705920 --sh--w- c:\program files\mmsbackup.exe
2010-11-27 21:15:15 2705920 ---h--r- C:\msbackup.exe
2010-11-27 21:13:52 2705920 --s---w- c:\program files\common files\microsoft shared\msinfo\msbackup.exe
2010-11-27 21:13:47 33824 ----a-w- c:\windows\system32\drivers\oreans32.sys
2010-11-27 20:46:55 326116 --shatr- c:\windows\ANLEAP.EXE
2010-11-25 21:59:29 -------- d-----w- c:\windows\system32\NtmsData
2010-11-16 21:03:17 -------- d-----w- c:\program files\uotoorr
2010-11-16 02:04:40 -------- d-----w- c:\program files\Speccy
2010-11-10 23:44:21 -------- d-----w- c:\documents and settings\oukil\dwhelper
2010-11-06 16:20:59 -------- d-----w- c:\docume~1\oukil\locals~1\applic~1\WMTools Downloaded Files
2010-10-31 05:26:14 -------- d-----w- c:\program files\Acoustica Mixcraft 5
2010-10-31 05:07:48 -------- d-----w- c:\program files\Audacity

==================== Find3M ====================

2010-09-15 04:50:37 472808 ----a-w- c:\windows\system32\deployJava1.dll
2010-09-15 02:29:49 73728 ----a-w- c:\windows\system32\javacpl.cpl
2010-09-05 03:41:26 0 ----a-w- c:\windows\ativpsrm.bin
2009-02-19 19:28:02 326116 --shatr- c:\windows\ANLEAP.EXE
2009-02-19 19:28:02 326116 --shatr- c:\windows\system32\AUTOCONVE.EXE

============= FINISH: 2:46:29.35 ===============




Thanks

oukil

Attached Files


Edited by oukil, 28 November 2010 - 08:22 AM.


BC AdBot (Login to Remove)

 


#2 oukil

oukil
  • Topic Starter

  • Members
  • 12 posts
  • OFFLINE
  •  
  • Local time:03:53 AM

Posted 30 November 2010 - 02:41 PM

Bump .

:whistle:

#3 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:03:53 AM

Posted 04 December 2010 - 09:48 PM

Hi,

Welcome to Bleeping Computer. My name is m0le and I will be helping you with your log.
  • Please subscribe to this topic, if you haven't already. You can subscribe by clicking the Options box to the right of your topic title and selecting Track This Topic.

  • Please avoid installing/uninstalling or updating any programs and attempting any unsupervised fixes or scans. This can make helping you impossible.

  • Please reply to this post so I know you are there.
The forum is busy and we need to have replies as soon as possible. If I haven't had a reply after 3 days I will bump the topic and if you do not reply by the following day after that then I will close the topic.

Once I receive a reply then I will return with your first instructions.

Thanks :thumbup2:
Posted Image
m0le is a proud member of UNITE

#4 oukil

oukil
  • Topic Starter

  • Members
  • 12 posts
  • OFFLINE
  •  
  • Local time:03:53 AM

Posted 05 December 2010 - 05:55 PM

thank you very much m0le


im ready , and already subscribed

#5 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:03:53 AM

Posted 05 December 2010 - 08:08 PM

Please run MBAM first

Please download Posted Image Malwarebytes Anti-Malware and save it to your desktop.
  • Make sure you are connected to the Internet.
  • Double-click on mbam-setup.exe to install the application or, if you are using Vista, right-click and select Run As Administrator on mbam-setup.exe to install the application.
  • When the installation begins, follow the prompts and do not make any changes to default settings.
  • When installation has finished, make sure you leave both of these checked:
    • Update Malwarebytes' Anti-Malware
    • Launch Malwarebytes' Anti-Malware
  • Then click Finish.
  • MBAM will automatically start and you will be asked to update the program before performing a scan. If an update is found, the program will automatically update itself. Press the OK button to close that box and continue.
    If MBAM won't update then download and update MBAM on a clean computer then save the rules.ref folder to a memory stick. This file is found here: 'C:\Documents and Settings\All Users\Application Data\Malwarebytes\Malwarebytes' Anti-Malware' then transfer it across to the infected computer.
  • On the Scanner tab:
    • Make sure the "Perform Full Scan" option is selected.
    • Then click on the Scan button.
  • If asked to select the drives to scan, leave all the drives selected and click on the Start Scan button.
  • The scan will begin and "Scan in progress" will show at the top. It may take some time to complete so please be patient.
  • When the scan is finished, a message box will say "The scan completed successfully. Click 'Show Results' to display all objects found".
  • Click OK to close the message box and continue with the removal process.
  • Back at the main Scanner screen, click on the Show Results button to see a list of any malware that was found.
  • Make sure that everything is checked, and click Remove Selected.
  • When removal is completed, a log report will open in Notepad.
  • The log is automatically saved and can be viewed by clicking the Logs tab in MBAM.
  • Copy and paste the contents of that report in your next reply and exit MBAM.
Note: If MBAM encounters a file that is difficult to remove, you may be asked to reboot your computer so it can proceed with the disinfection process. Regardless if prompted to restart the computer or not, please do so immediately. Failure to reboot normally (not into safe mode) will prevent MBAM from removing all the malware. MBAM may make changes to your registry as part of its disinfection routine. If you're using other security programs that detect registry changes, they may alert you after scanning with MBAM. Please permit the program to allow the changes.


Now run Combofix

Please download ComboFix from one of these locations:* IMPORTANT !!! Save ComboFix.exe to your Desktop making sure you rename it comfix.exe
  • Disable your AntiVirus and AntiSpyware applications, usually via a right click on the System Tray icon. They may otherwise interfere with our tools. (Click on this link to see a list of programs that should be disabled. The list is not all inclusive.)
  • Double click on Comfix.exe & follow the prompts.
  • As part of it's process, ComboFix will check to see if the Microsoft Windows Recovery Console is installed. With malware infections being as they are today, it's strongly recommended to have this pre-installed on your machine before doing any malware removal. It will allow you to boot up into a special recovery/repair mode that will allow us to more easily help you should your computer have a problem after an attempted removal of malware.
  • Follow the prompts to allow ComboFix to download and install the Microsoft Windows Recovery Console, and when prompted, agree to the End-User License Agreement to install the Microsoft Windows Recovery Console.
**Please note: If the Microsoft Windows Recovery Console is already installed, ComboFix will continue it's malware removal procedures.

Posted Image


Once the Microsoft Windows Recovery Console is installed using ComboFix, you should see the following message:

Posted Image


Click on Yes, to continue scanning for malware.

When finished, it shall produce a log for you. Please include the C:\ComboFix.txt in your next reply.
Posted Image
m0le is a proud member of UNITE

#6 oukil

oukil
  • Topic Starter

  • Members
  • 12 posts
  • OFFLINE
  •  
  • Local time:03:53 AM

Posted 06 December 2010 - 09:24 AM

hello , just to update i used many programs to scan before , one of them "Spybot search and destroy" which detected a Win32.AutoRun.tmp and deleted it

but i still suspect i have an infection in msbackup.exe

anyway here is the MAM log

-------------------------------------------------------------------------

Malwarebytes' Anti-Malware 1.50
www.malwarebytes.org

Database version: 5214

Windows 5.1.2600 Service Pack 3
Internet Explorer 7.0.5730.13

12/6/2010 11:11:51 AM
mbam-log-2010-12-06 (11-11-51).txt

Scan type: Full scan (C:\|)
Objects scanned: 164473
Time elapsed: 1 hour(s), 18 minute(s), 37 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 1
Folders Infected: 0
Files Infected: 1

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows NT\SystemRestore\DisableConfig (Windows.Tool.Disabled) -> Bad: (1) Good: (0) -> Not selected for removal.

Folders Infected:
(No malicious items detected)

Files Infected:
c:\documents and settings\oukil\my documents\downloads\GFT\dfx.for.windows.media.player.v9.301.x64.incl.keymaker-core\keygen.exe (RiskWare.Tool.CK) -> Quarantined and deleted successfully.




---------------------------------------------------------------------------------------------

and the combofix log

ComboFix 10-12-04.06 - oukil 12/06/2010 13:59:24.1.1 - x86
Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.1278.488 [GMT 0:00]
Running from: c:\documents and settings\oukil\My Documents\FF DL\ComboFix.exe
.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.

.
((((((((((((((((((((((((((((((((((((((( Drivers/Services )))))))))))))))))))))))))))))))))))))))))))))))))
.

-------\Legacy_BACKUP_INFO


((((((((((((((((((((((((( Files Created from 2010-11-06 to 2010-12-06 )))))))))))))))))))))))))))))))
.

2010-12-06 02:24 . 2010-12-06 02:24 76696 ----a-w- c:\windows\system32\drivers\pxrts.sys
2010-12-06 02:24 . 2010-12-06 02:24 -------- d-----w- c:\program files\Prevx
2010-12-06 02:24 . 2010-12-06 03:44 -------- d-----w- c:\documents and settings\All Users\Application Data\PrevxCSI
2010-12-06 02:15 . 2010-12-06 13:20 -------- d-----w- c:\documents and settings\All Users\Application Data\Spybot - Search & Destroy
2010-12-06 02:15 . 2010-12-06 02:16 -------- d-----w- c:\program files\Spybot - Search & Destroy
2010-12-06 02:10 . 2010-11-29 17:42 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2010-12-06 02:10 . 2010-12-06 04:15 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
2010-12-06 02:10 . 2010-11-29 17:42 20952 ----a-w- c:\windows\system32\drivers\mbam.sys
2010-12-06 01:51 . 2010-12-06 01:51 -------- d-----w- c:\program files\Uniblue
2010-12-06 01:23 . 2010-12-06 01:23 -------- d-----w- c:\documents and settings\oukil\Local Settings\Application Data\PackageAware
2010-12-06 00:55 . 2010-12-06 00:55 -------- d-----w- c:\documents and settings\oukil\Application Data\Boost Windows
2010-12-06 00:55 . 2010-12-06 00:55 -------- d-----w- c:\documents and settings\All Users\Application Data\TEMP
2010-12-06 00:55 . 2010-12-06 00:58 -------- d-----w- c:\program files\Boost Windows
2010-12-05 17:34 . 2008-02-28 13:26 1414440 ----a-w- c:\windows\system32\ShellManager310E2D762.dll
2010-12-05 00:06 . 2010-12-05 00:06 -------- d-----w- c:\documents and settings\oukil\Application Data\UltraVNC
2010-12-04 23:57 . 2010-12-05 17:09 -------- d-----w- c:\program files\UltraVNC
2010-12-02 15:19 . 2010-12-02 15:19 -------- d-----w- c:\documents and settings\Administrator
2010-12-02 14:59 . 2010-12-02 14:59 -------- d-----w- C:\z0120
2010-12-01 22:51 . 2008-04-14 13:00 221184 ----a-w- c:\windows\system32\wmpns.dll
2010-11-28 00:17 . 2010-11-28 00:17 -------- d-----w- c:\documents and settings\oukil\Application Data\Malwarebytes
2010-11-28 00:15 . 2010-11-28 00:15 -------- d-----w- c:\documents and settings\All Users\Application Data\Malwarebytes
2010-11-27 21:13 . 2010-11-27 21:13 33824 ----a-w- c:\windows\system32\drivers\oreans32.sys
2010-11-25 21:59 . 2010-12-06 00:57 -------- d-----w- c:\windows\system32\NtmsData
2010-11-16 21:03 . 2010-11-16 21:03 -------- d-----w- c:\program files\uotoorr
2010-11-16 02:04 . 2010-11-16 02:04 -------- d-----w- c:\program files\Speccy
2010-11-10 23:44 . 2010-11-10 23:47 -------- d-----w- c:\documents and settings\oukil\dwhelper
2010-11-06 16:20 . 2010-11-06 16:20 -------- d-----w- c:\documents and settings\oukil\Local Settings\Application Data\WMTools Downloaded Files

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2010-09-18 20:55 . 2010-09-05 03:36 16400 ----a-w- c:\windows\system32\drivers\LNonPnP.sys
2010-09-15 04:50 . 2010-09-05 21:08 472808 ----a-w- c:\windows\system32\deployJava1.dll
2010-09-15 02:29 . 2010-09-05 21:08 73728 ----a-w- c:\windows\system32\javacpl.cpl
.

------- Sigcheck -------

[-] 2010-09-05 . E248A8391D7388A0A3679D1FB33E003D . 361600 . . [5.1.2600.5625] . . c:\windows\system32\dllcache\TCPIP.SYS
[-] 2010-09-05 . E248A8391D7388A0A3679D1FB33E003D . 361600 . . [5.1.2600.5625] . . c:\windows\system32\drivers\TCPIP.SYS

[-] 2010-08-21 . 362BC5AF8EAF712832C58CC13AE05750 . 1614848 . . [5.1.2600.5512] . . c:\windows\system32\sfcfiles.dll
.
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"uTorrent"="c:\program files\uTorrent\uTorrent.exe" [2010-11-16 328056]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"EvtMgr6"="c:\program files\Logitech\SetPointP\SetPoint.exe" [2010-05-18 1311312]
"Malwarebytes' Anti-Malware"="c:\program files\Malwarebytes' Anti-Malware\mbamgui.exe" [2010-11-29 443728]
"SoundMAXPnP"="c:\program files\Analog Devices\Core\smax4pnp.exe" [2004-10-14 1404928]
"SunJavaUpdateSched"="c:\program files\Common Files\Java\Java Update\jusched.exe" [2010-05-14 248552]
"Autorun Eater"="c:\program files\Autorun Eater\oldmcdonald.exe" [2010-05-06 516216]

c:\documents and settings\All Users\Start Menu\Programs\Startup\
HP Digital Imaging Monitor.lnk - c:\program files\HP\Digital Imaging\bin\hpqtra08.exe [2007-1-2 210520]

[HKEY_CURRENT_USER\software\microsoft\windows\currentversion\policies\system]
"NoConfigPage"= 0 (0x0)
"NoDevMgrPage"= 0 (0x0)
"NoFileSysPage"= 0 (0x0)
"NoVirtMemPage"= 0 (0x0)

[HKEY_USERS\.default\software\microsoft\windows\currentversion\policies\system]
"NoConfigPage"= 0 (0x0)
"NoDevMgrPage"= 0 (0x0)
"NoFileSysPage"= 0 (0x0)
"NoVirtMemPage"= 0 (0x0)

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\LBTWlgn]
2010-05-06 09:29 64592 ----a-w- c:\program files\Common Files\LogiShrd\Bluetooth\LBTWLgn.dll

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\AppMgmt]
@=""

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\Wdf01000.sys]
@="Driver"

[HKLM\~\startupfolder\C:^Documents and Settings^oukil^Start Menu^Programs^Startup^Logitech . Product Registration.lnk]
backup=c:\windows\pss\Logitech . Product Registration.lnkStartup
backupExtension=Startup

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Load]
U?? ? [?]

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Run]
U?? ? [?]
HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\DAEMON Tools Lite

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\InnoSetupRegFile.0000000001]
2010-12-06 03:46 709456 ----a-w- c:\windows\is-7DEEV.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\MSConfig]
2008-04-14 13:00 169984 ----a-w- c:\windows\pchealth\helpctr\binaries\msconfig.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\SpybotSD TeaTimer]
2009-01-26 15:31 2144088 --sha-r- c:\program files\Spybot - Search & Destroy\TeaTimer.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\StartCCC]
2010-02-10 23:32 61440 ----a-w- c:\program files\ATI Technologies\ATI.ACE\Core-Static\CLIStart.exe

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]
"EnableFirewall"= 0 (0x0)

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"%windir%\\system32\\sessmgr.exe"=
"c:\\Program Files\\Windows Live\\Messenger\\wlcsdk.exe"=
"c:\\Program Files\\Windows Live\\Messenger\\msnmsgr.exe"=
"c:\\Program Files\\uTorrent\\uTorrent.exe"=

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\GloballyOpenPorts\List]
"5900:TCP"= 5900:TCP:vnc5900
"5800:TCP"= 5800:TCP:vnc5800

R0 sptd;sptd;c:\windows\system32\drivers\sptd.sys [9/5/2010 5:06 AM 721904]
R1 oreans32;oreans32;c:\windows\system32\drivers\oreans32.sys [11/27/2010 9:13 PM 33824]
R2 LBeepKE;Logitech Beep Suppression Driver;c:\windows\system32\drivers\LBeepKE.sys [9/5/2010 3:36 AM 10448]
R2 MBAMService;MBAMService;c:\program files\Malwarebytes' Anti-Malware\mbamservice.exe [12/6/2010 2:10 AM 363344]
R3 MBAMProtector;MBAMProtector;c:\windows\system32\drivers\mbam.sys [12/6/2010 2:10 AM 20952]
R3 UsblgwmAtc;LGE Wireless USB Serial02 Device;c:\windows\system32\drivers\lgwusbser02.sys [10/5/2010 12:19 AM 21248]
R3 usblgwmbus;LGE Wireless Composite USB Device;c:\windows\system32\drivers\lgwusbbus.sys [10/5/2010 12:19 AM 13696]
R3 UsblgwmDiag;LGE Wireless USB Serial01 Device;c:\windows\system32\drivers\lgwusbser01.sys [10/5/2010 12:19 AM 21248]
R3 USBlgwmModem;LGE Wireless USB Modem;c:\windows\system32\drivers\lgwusbmodem.sys [10/5/2010 12:19 AM 25216]
S3 UsbEvdoAtc;LGE EVDO USB Serial Port;c:\windows\system32\DRIVERS\lgevdoatc.sys --> c:\windows\system32\DRIVERS\lgevdoatc.sys [?]
S3 usbevdobus;LGE EVDO Composite USB Device;c:\windows\system32\DRIVERS\lgevdobus.sys --> c:\windows\system32\DRIVERS\lgevdobus.sys [?]
S3 UsbEvdoDiag;LGE EVDO USB Serial DM Port;c:\windows\system32\DRIVERS\lgevdodiag.sys --> c:\windows\system32\DRIVERS\lgevdodiag.sys [?]
S3 USBEVDOModem;LGE EVDO USB Modem;c:\windows\system32\DRIVERS\lgevdomodem.sys --> c:\windows\system32\DRIVERS\lgevdomodem.sys [?]
S4 ADSLAutoconnect;ADSLAutoconnect;c:\program files\ADSL Autoconnect\ADSL Autoconnect.exe [9/5/2010 4:16 AM 446464]

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\svchost]
HPZ12 REG_MULTI_SZ Pml Driver HPZ12 Net Driver HPZ12
hpdevmgmt REG_MULTI_SZ hpqcxs08 hpqddsvc
.
Contents of the 'Scheduled Tasks' folder
.
.
------- Supplementary Scan -------
.
FF - ProfilePath - c:\documents and settings\oukil\Application Data\Mozilla\Firefox\Profiles\febeprof.my\
FF - prefs.js: browser.startup.homepage - hxxp://fr.start3.mozilla.com/firefox?client=firefox-a&rls=org.mozilla:fr:official
FF - component: c:\documents and settings\oukil\Application Data\Mozilla\Firefox\Profiles\febeprof.my\extensions\{0b457cAA-602d-484a-8fe7-c1d894a011ba}\platform\WINNT_x86-msvc\components\SSSLauncher.dll
FF - plugin: c:\program files\Java\jre6\bin\new_plugin\npdeployJava1.dll
FF - Extension: Default: {972ce4c6-7e08-4474-a285-3208198ce6fd} - c:\program files\Mozilla Firefox\extensions\{972ce4c6-7e08-4474-a285-3208198ce6fd}
FF - Extension: Java Console: {CAFEEFAC-0016-0000-0020-ABCDEFFEDCBA} - c:\program files\Mozilla Firefox\extensions\{CAFEEFAC-0016-0000-0020-ABCDEFFEDCBA}
FF - Extension: Java Console: {CAFEEFAC-0016-0000-0021-ABCDEFFEDCBA} - c:\program files\Mozilla Firefox\extensions\{CAFEEFAC-0016-0000-0021-ABCDEFFEDCBA}
FF - Extension: Java Console: {CAFEEFAC-0016-0000-0022-ABCDEFFEDCBA} - c:\program files\Mozilla Firefox\extensions\{CAFEEFAC-0016-0000-0022-ABCDEFFEDCBA}
FF - Extension: FEBE: {4BBDD651-70CF-4821-84F8-2B918CF89CA3} - c:\documents and settings\oukil\Application Data\Mozilla\Firefox\Profiles\febeprof.my\extensions\{4BBDD651-70CF-4821-84F8-2B918CF89CA3}
FF - Extension: Adblock Plus: {d10d0bf8-f5b5-c8b4-a8b2-2b9879e08c5d} - c:\documents and settings\oukil\Application Data\Mozilla\Firefox\Profiles\febeprof.my\extensions\{d10d0bf8-f5b5-c8b4-a8b2-2b9879e08c5d}
FF - Extension: Clean And Close: clean_and_close@csb7.com - c:\documents and settings\oukil\Application Data\Mozilla\Firefox\Profiles\febeprof.my\extensions\clean_and_close@csb7.com
FF - Extension: DownloadHelper: {b9db16a4-6edc-47ec-a1f4-b86292ed211d} - c:\documents and settings\oukil\Application Data\Mozilla\Firefox\Profiles\febeprof.my\extensions\{b9db16a4-6edc-47ec-a1f4-b86292ed211d}
FF - Extension: Flagfox: {1018e4d6-728f-4b20-ad56-37578a4de76b} - c:\documents and settings\oukil\Application Data\Mozilla\Firefox\Profiles\febeprof.my\extensions\{1018e4d6-728f-4b20-ad56-37578a4de76b}
FF - Extension: Show Go!: showgo@supernova00 - c:\documents and settings\oukil\Application Data\Mozilla\Firefox\Profiles\febeprof.my\extensions\showgo@supernova00
FF - Extension: Tab Mix Plus: {dc572301-7619-498c-a57d-39143191b318} - c:\documents and settings\oukil\Application Data\Mozilla\Firefox\Profiles\febeprof.my\extensions\{dc572301-7619-498c-a57d-39143191b318}
FF - Extension: WOT: {a0d7ccb3-214d-498b-b4aa-0e8fda9a7bf7} - c:\documents and settings\oukil\Application Data\Mozilla\Firefox\Profiles\febeprof.my\extensions\{a0d7ccb3-214d-498b-b4aa-0e8fda9a7bf7}
FF - Extension: own: {35f30c40-35d4-11d9-8dbc-000c6e787ef7} - c:\documents and settings\oukil\Application Data\Mozilla\Firefox\Profiles\febeprof.my\extensions\{35f30c40-35d4-11d9-8dbc-000c6e787ef7}
FF - Extension: FireShot: {0b457cAA-602d-484a-8fe7-c1d894a011ba} - c:\documents and settings\oukil\Application Data\Mozilla\Firefox\Profiles\febeprof.my\extensions\{0b457cAA-602d-484a-8fe7-c1d894a011ba}
FF - Extension: MultirowBookmarksToolbar: {FBF6D7FB-F305-4445-BB3D-FEF66579A033} - c:\documents and settings\oukil\Application Data\Mozilla\Firefox\Profiles\febeprof.my\extensions\{FBF6D7FB-F305-4445-BB3D-FEF66579A033}
FF - Extension: Sxipper: sxipper@sxip.com - c:\documents and settings\oukil\Application Data\Mozilla\Firefox\Profiles\febeprof.my\extensions\sxipper@sxip.com
FF - Extension: Lola: lol@stream18.com - c:\documents and settings\oukil\Application Data\Mozilla\Firefox\Profiles\febeprof.my\extensions\lol@stream18.com
FF - Extension: Java Quick Starter: jqs@sun.com - c:\program files\Java\jre6\lib\deploy\jqs\ff

---- FIREFOX POLICIES ----
FF - user.js: yahoo.homepage.dontask - true
.
.
------- File Associations -------
.
vbefile\shell\edit\command=%SystemRoot%\System32\Notepad.exe %1
vbsfile\shell\edit\command=c:\windows\Notepad.exe %1
.txt=NFOPad
.
- - - - ORPHANS REMOVED - - - -

MSConfigStartUp-UniblueRegistryBooster - c:\program files\Uniblue\RegistryBooster\launcher.exe



**************************************************************************

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2010-12-06 14:08
Windows 5.1.2600 Service Pack 3 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully
hidden files: 0

**************************************************************************
.
--------------------- LOCKED REGISTRY KEYS ---------------------

[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{A483C63A-CDBC-426E-BF93-872502E8144E}]
@Denied: (A 2) (Everyone)
@="FlashBroker"
"LocalizedString"="@c:\\WINDOWS\\system32\\Macromed\\Flash\\FlashUtil10h_ActiveX.exe,-101"

[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{A483C63A-CDBC-426E-BF93-872502E8144E}\Elevation]
"Enabled"=dword:00000001

[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{A483C63A-CDBC-426E-BF93-872502E8144E}\LocalServer32]
@="c:\\WINDOWS\\system32\\Macromed\\Flash\\FlashUtil10h_ActiveX.exe"

[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{A483C63A-CDBC-426E-BF93-872502E8144E}\TypeLib]
@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"

[HKEY_LOCAL_MACHINE\software\Classes\Interface\{E3F2C3CB-5EB8-4A04-B22C-7E3B4B6AF30F}]
@Denied: (A 2) (Everyone)
@="IFlashBroker4"

[HKEY_LOCAL_MACHINE\software\Classes\Interface\{E3F2C3CB-5EB8-4A04-B22C-7E3B4B6AF30F}\ProxyStubClsid32]
@="{00020424-0000-0000-C000-000000000046}"

[HKEY_LOCAL_MACHINE\software\Classes\Interface\{E3F2C3CB-5EB8-4A04-B22C-7E3B4B6AF30F}\TypeLib]
@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"
"Version"="1.0"
.
--------------------- DLLs Loaded Under Running Processes ---------------------

- - - - - - - > 'winlogon.exe'(508)
c:\windows\system32\Ati2evxx.dll
c:\program files\common files\logishrd\bluetooth\LBTWlgn.dll

- - - - - - - > 'explorer.exe'(3244)
c:\windows\system32\WININET.dll
c:\windows\system32\ieframe.dll
c:\windows\system32\wpdshserviceobj.dll
c:\windows\system32\portabledevicetypes.dll
c:\windows\system32\portabledeviceapi.dll
.
------------------------ Other Running Processes ------------------------
.
c:\windows\system32\Ati2evxx.exe
c:\windows\system32\Ati2evxx.exe
c:\program files\Java\jre6\bin\jqs.exe
c:\windows\system32\wscntfy.exe
c:\program files\Autorun Eater\billy.exe
c:\program files\HP\Digital Imaging\bin\hpqSTE08.exe
c:\windows\system32\taskmgr.exe
.
**************************************************************************
.
Completion time: 2010-12-06 14:13:49 - machine was rebooted
ComboFix-quarantined-files.txt 2010-12-06 14:13

Pre-Run: 9,391,124,480 bytes free
Post-Run: 9,341,624,320 bytes free

WindowsXP-KB310994-SP2-Pro-BootDisk-ENU.exe
[boot loader]
timeout=2
default=multi(0)disk(0)rdisk(0)partition(1)\WINDOWS
[operating systems]
c:\cmdcons\BOOTSECT.DAT="Microsoft Windows Recovery Console" /cmdcons
UnsupportedDebug="do not select this" /debug
multi(0)disk(0)rdisk(0)partition(1)\WINDOWS="Microsoft Windows XP Professional" /noexecute=optin /fastdetect

- - End Of File - - 67CF7E8254A4C614C1CB78AF0777B652

#7 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:03:53 AM

Posted 06 December 2010 - 07:10 PM

msbackup.exe is malware. Where have you seen this file?

Also:

Registry Data Items Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows NT\SystemRestore\DisableConfig (Windows.Tool.Disabled) -> Bad: (1) Good: (0) -> Not selected for removal.


MBAM requested you select this for removal which would be a good idea as it would restore your Task Manager. Please rerun and select for removal.


Now please rerun Combofix as shown below

1. Close any open browsers.

2. Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.

3. Open notepad and copy/paste the text in the box below into it:

Registry::
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Load]
"U?? ?"=-
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Run]
"U?? ?"=-


Save this as CFScript.txt, in the same location as Comfix.exe (called ComboFix.exe in the below graphic)


Posted Image

Refering to the picture above, drag CFScript into ComboFix.exe

If the program requests for you to update Combofix then click Yes.

When finished, it shall produce a log for you at C:\ComboFix.txt which I will require in your next reply.
Posted Image
m0le is a proud member of UNITE

#8 oukil

oukil
  • Topic Starter

  • Members
  • 12 posts
  • OFFLINE
  •  
  • Local time:03:53 AM

Posted 07 December 2010 - 03:01 PM

msbackup.exe was detected by nod32 whenever i put a removable drive :(

i fixed that problem with MBAM.


here is the Combofix log.




ComboFix 10-12-04.06 - oukil 12/07/2010 19:34:10.2.1 - x86
Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.1278.838 [GMT 0:00]
Running from: c:\documents and settings\oukil\My Documents\FF DL\ComboFix.exe
Command switches used :: c:\documents and settings\oukil\My Documents\FF DL\CFScript.txt
.

((((((((((((((((((((((((( Files Created from 2010-11-07 to 2010-12-07 )))))))))))))))))))))))))))))))
.

2010-12-07 12:43 . 2010-12-07 14:07 -------- d-----w- c:\documents and settings\oukil\Application Data\InfraRecorder
2010-12-06 17:20 . 2004-04-18 23:39 5632 ----a-w- c:\program files\Common Files\InstallShield\Professional\RunTime\10\50\Intel32\DotNetInstaller.exe
2010-12-06 05:20 . 2010-12-06 05:20 16968 ----a-w- c:\windows\system32\drivers\hitmanpro35.sys
2010-12-06 05:19 . 2010-12-06 05:19 -------- d-----w- c:\documents and settings\All Users\Application Data\Hitman Pro
2010-12-06 05:19 . 2010-12-06 05:19 -------- d-----w- c:\program files\Hitman Pro 3.5
2010-12-06 05:09 . 2010-12-06 05:09 -------- d-----w- c:\documents and settings\All Users\Application Data\Autorun Eater
2010-12-06 05:09 . 2010-12-06 05:09 -------- d-----w- c:\program files\Autorun Eater
2010-12-06 04:31 . 2010-12-06 04:31 -------- d-----w- c:\program files\InfraRecorder
2010-12-06 03:46 . 2010-12-06 03:46 709456 ----a-w- c:\windows\is-7DEEV.exe
2010-12-06 02:24 . 2010-12-06 02:24 76696 ----a-w- c:\windows\system32\drivers\pxrts.sys
2010-12-06 02:24 . 2010-12-06 02:24 -------- d-----w- c:\program files\Prevx
2010-12-06 02:24 . 2010-12-06 03:44 -------- d-----w- c:\documents and settings\All Users\Application Data\PrevxCSI
2010-12-06 02:15 . 2010-12-07 17:28 -------- d-----w- c:\documents and settings\All Users\Application Data\Spybot - Search & Destroy
2010-12-06 02:15 . 2010-12-06 02:16 -------- d-----w- c:\program files\Spybot - Search & Destroy
2010-12-06 02:10 . 2010-11-29 17:42 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2010-12-06 02:10 . 2010-12-06 04:15 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
2010-12-06 02:10 . 2010-11-29 17:42 20952 ----a-w- c:\windows\system32\drivers\mbam.sys
2010-12-06 01:51 . 2010-12-06 01:51 -------- d-----w- c:\program files\Uniblue
2010-12-06 01:23 . 2010-12-06 01:23 -------- d-----w- c:\documents and settings\oukil\Local Settings\Application Data\PackageAware
2010-12-06 00:55 . 2010-12-06 00:55 -------- d-----w- c:\documents and settings\oukil\Application Data\Boost Windows
2010-12-06 00:55 . 2010-12-06 00:55 -------- d-----w- c:\documents and settings\All Users\Application Data\TEMP
2010-12-06 00:55 . 2010-12-06 00:58 -------- d-----w- c:\program files\Boost Windows
2010-12-05 17:34 . 2008-02-28 13:26 1414440 ----a-w- c:\windows\system32\ShellManager310E2D762.dll
2010-12-05 00:06 . 2010-12-05 00:06 -------- d-----w- c:\documents and settings\oukil\Application Data\UltraVNC
2010-12-04 23:57 . 2010-12-05 17:09 -------- d-----w- c:\program files\UltraVNC
2010-12-02 15:19 . 2010-12-02 15:19 -------- d-----w- c:\documents and settings\Administrator
2010-12-02 14:59 . 2010-12-02 14:59 -------- d-----w- C:\z0120
2010-12-01 22:51 . 2008-04-14 13:00 221184 ----a-w- c:\windows\system32\wmpns.dll
2010-11-28 00:17 . 2010-11-28 00:17 -------- d-----w- c:\documents and settings\oukil\Application Data\Malwarebytes
2010-11-28 00:15 . 2010-11-28 00:15 -------- d-----w- c:\documents and settings\All Users\Application Data\Malwarebytes
2010-11-27 21:13 . 2010-11-27 21:13 33824 ----a-w- c:\windows\system32\drivers\oreans32.sys
2010-11-25 21:59 . 2010-12-06 00:57 -------- d-----w- c:\windows\system32\NtmsData
2010-11-16 21:03 . 2010-11-16 21:03 -------- d-----w- c:\program files\uotoorr
2010-11-16 02:04 . 2010-11-16 02:04 -------- d-----w- c:\program files\Speccy
2010-11-10 23:44 . 2010-11-10 23:47 -------- d-----w- c:\documents and settings\oukil\dwhelper

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2010-09-18 20:55 . 2010-09-05 03:36 16400 ----a-w- c:\windows\system32\drivers\LNonPnP.sys
2010-09-15 04:50 . 2010-09-05 21:08 472808 ----a-w- c:\windows\system32\deployJava1.dll
2010-09-15 02:29 . 2010-09-05 21:08 73728 ----a-w- c:\windows\system32\javacpl.cpl
.

------- Sigcheck -------

[-] 2010-09-05 . E248A8391D7388A0A3679D1FB33E003D . 361600 . . [5.1.2600.5625] . . c:\windows\system32\dllcache\TCPIP.SYS
[-] 2010-09-05 . E248A8391D7388A0A3679D1FB33E003D . 361600 . . [5.1.2600.5625] . . c:\windows\system32\drivers\TCPIP.SYS

[-] 2010-08-21 . 362BC5AF8EAF712832C58CC13AE05750 . 1614848 . . [5.1.2600.5512] . . c:\windows\system32\sfcfiles.dll
.
((((((((((((((((((((((((((((( SnapShot@2010-12-06_14.08.44 )))))))))))))))))))))))))))))))))))))))))
.
+ 2010-12-06 17:23 . 2010-12-06 17:23 16384 c:\windows\Temp\Perflib_Perfdata_668.dat
+ 2004-10-05 16:10 . 2004-10-05 16:10 23040 c:\windows\system32\PostProc.dll
- 2010-09-05 02:44 . 2004-10-05 16:10 23040 c:\windows\system32\PostProc.dll
+ 2001-09-19 12:47 . 2001-09-19 12:47 765952 c:\windows\system\crlds3d.dll
- 2010-09-05 02:44 . 2001-09-19 12:47 765952 c:\windows\system\crlds3d.dll
.
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"uTorrent"="c:\program files\uTorrent\uTorrent.exe" [2010-11-16 328056]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"EvtMgr6"="c:\program files\Logitech\SetPointP\SetPoint.exe" [2010-05-18 1311312]
"Malwarebytes' Anti-Malware"="c:\program files\Malwarebytes' Anti-Malware\mbamgui.exe" [2010-11-29 443728]
"SunJavaUpdateSched"="c:\program files\Common Files\Java\Java Update\jusched.exe" [2010-05-14 248552]
"Autorun Eater"="c:\program files\Autorun Eater\oldmcdonald.exe" [2010-05-06 516216]
"SoundMAXPnP"="c:\program files\Analog Devices\Core\smax4pnp.exe" [2004-10-14 1404928]

c:\documents and settings\All Users\Start Menu\Programs\Startup\
HP Digital Imaging Monitor.lnk - c:\program files\HP\Digital Imaging\bin\hpqtra08.exe [2007-1-2 210520]

[HKEY_CURRENT_USER\software\microsoft\windows\currentversion\policies\system]
"NoConfigPage"= 0 (0x0)
"NoDevMgrPage"= 0 (0x0)
"NoFileSysPage"= 0 (0x0)
"NoVirtMemPage"= 0 (0x0)

[HKEY_USERS\.default\software\microsoft\windows\currentversion\policies\system]
"NoConfigPage"= 0 (0x0)
"NoDevMgrPage"= 0 (0x0)
"NoFileSysPage"= 0 (0x0)
"NoVirtMemPage"= 0 (0x0)

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\LBTWlgn]
2010-05-06 09:29 64592 ----a-w- c:\program files\Common Files\LogiShrd\Bluetooth\LBTWLgn.dll

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\AppMgmt]
@=""

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\Wdf01000.sys]
@="Driver"

[HKLM\~\startupfolder\C:^Documents and Settings^oukil^Start Menu^Programs^Startup^Logitech . Product Registration.lnk]
backup=c:\windows\pss\Logitech . Product Registration.lnkStartup
backupExtension=Startup

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Load]
U?? ? [?]

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Run]
U?? ? [?]

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\InnoSetupRegFile.0000000001]
2010-12-06 03:46 709456 ----a-w- c:\windows\is-7DEEV.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\MSConfig]
2008-04-14 13:00 169984 ----a-w- c:\windows\pchealth\helpctr\binaries\msconfig.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\SpybotSD TeaTimer]
2009-01-26 15:31 2144088 --sha-r- c:\program files\Spybot - Search & Destroy\TeaTimer.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\StartCCC]
2010-02-10 23:32 61440 ----a-w- c:\program files\ATI Technologies\ATI.ACE\Core-Static\CLIStart.exe

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"%windir%\\system32\\sessmgr.exe"=
"c:\\Program Files\\Windows Live\\Messenger\\wlcsdk.exe"=
"c:\\Program Files\\Windows Live\\Messenger\\msnmsgr.exe"=
"c:\\Program Files\\uTorrent\\uTorrent.exe"=

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\GloballyOpenPorts\List]
"5900:TCP"= 5900:TCP:vnc5900
"5800:TCP"= 5800:TCP:vnc5800

R0 sptd;sptd;c:\windows\system32\drivers\sptd.sys [9/5/2010 5:06 AM 721904]
R1 oreans32;oreans32;c:\windows\system32\drivers\oreans32.sys [11/27/2010 9:13 PM 33824]
R2 LBeepKE;Logitech Beep Suppression Driver;c:\windows\system32\drivers\LBeepKE.sys [9/5/2010 3:36 AM 10448]
R3 MBAMProtector;MBAMProtector;c:\windows\system32\drivers\mbam.sys [12/6/2010 2:10 AM 20952]
R3 UsblgwmAtc;LGE Wireless USB Serial02 Device;c:\windows\system32\drivers\lgwusbser02.sys [10/5/2010 12:19 AM 21248]
R3 usblgwmbus;LGE Wireless Composite USB Device;c:\windows\system32\drivers\lgwusbbus.sys [10/5/2010 12:19 AM 13696]
R3 UsblgwmDiag;LGE Wireless USB Serial01 Device;c:\windows\system32\drivers\lgwusbser01.sys [10/5/2010 12:19 AM 21248]
R3 USBlgwmModem;LGE Wireless USB Modem;c:\windows\system32\drivers\lgwusbmodem.sys [10/5/2010 12:19 AM 25216]
S2 MBAMService;MBAMService;c:\program files\Malwarebytes' Anti-Malware\mbamservice.exe [12/6/2010 2:10 AM 363344]
S3 UsbEvdoAtc;LGE EVDO USB Serial Port;c:\windows\system32\DRIVERS\lgevdoatc.sys --> c:\windows\system32\DRIVERS\lgevdoatc.sys [?]
S3 usbevdobus;LGE EVDO Composite USB Device;c:\windows\system32\DRIVERS\lgevdobus.sys --> c:\windows\system32\DRIVERS\lgevdobus.sys [?]
S3 UsbEvdoDiag;LGE EVDO USB Serial DM Port;c:\windows\system32\DRIVERS\lgevdodiag.sys --> c:\windows\system32\DRIVERS\lgevdodiag.sys [?]
S3 USBEVDOModem;LGE EVDO USB Modem;c:\windows\system32\DRIVERS\lgevdomodem.sys --> c:\windows\system32\DRIVERS\lgevdomodem.sys [?]
S4 ADSLAutoconnect;ADSLAutoconnect;c:\program files\ADSL Autoconnect\ADSL Autoconnect.exe [9/5/2010 4:16 AM 446464]

--- Other Services/Drivers In Memory ---

*Deregistered* - PROCEXP141

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\svchost]
HPZ12 REG_MULTI_SZ Pml Driver HPZ12 Net Driver HPZ12
hpdevmgmt REG_MULTI_SZ hpqcxs08 hpqddsvc
.
.
------- Supplementary Scan -------
.
FF - ProfilePath - c:\documents and settings\oukil\Application Data\Mozilla\Firefox\Profiles\febeprof.my\
FF - prefs.js: browser.startup.homepage - hxxp://fr.start3.mozilla.com/firefox?client=firefox-a&rls=org.mozilla:fr:official
FF - component: c:\documents and settings\oukil\Application Data\Mozilla\Firefox\Profiles\febeprof.my\extensions\{0b457cAA-602d-484a-8fe7-c1d894a011ba}\platform\WINNT_x86-msvc\components\SSSLauncher.dll
FF - plugin: c:\program files\Java\jre6\bin\new_plugin\npdeployJava1.dll
FF - Extension: Default: {972ce4c6-7e08-4474-a285-3208198ce6fd} - c:\program files\Mozilla Firefox\extensions\{972ce4c6-7e08-4474-a285-3208198ce6fd}
FF - Extension: Java Console: {CAFEEFAC-0016-0000-0020-ABCDEFFEDCBA} - c:\program files\Mozilla Firefox\extensions\{CAFEEFAC-0016-0000-0020-ABCDEFFEDCBA}
FF - Extension: Java Console: {CAFEEFAC-0016-0000-0021-ABCDEFFEDCBA} - c:\program files\Mozilla Firefox\extensions\{CAFEEFAC-0016-0000-0021-ABCDEFFEDCBA}
FF - Extension: Java Console: {CAFEEFAC-0016-0000-0022-ABCDEFFEDCBA} - c:\program files\Mozilla Firefox\extensions\{CAFEEFAC-0016-0000-0022-ABCDEFFEDCBA}
FF - Extension: FEBE: {4BBDD651-70CF-4821-84F8-2B918CF89CA3} - c:\documents and settings\oukil\Application Data\Mozilla\Firefox\Profiles\febeprof.my\extensions\{4BBDD651-70CF-4821-84F8-2B918CF89CA3}
FF - Extension: Adblock Plus: {d10d0bf8-f5b5-c8b4-a8b2-2b9879e08c5d} - c:\documents and settings\oukil\Application Data\Mozilla\Firefox\Profiles\febeprof.my\extensions\{d10d0bf8-f5b5-c8b4-a8b2-2b9879e08c5d}
FF - Extension: Clean And Close: clean_and_close@csb7.com - c:\documents and settings\oukil\Application Data\Mozilla\Firefox\Profiles\febeprof.my\extensions\clean_and_close@csb7.com
FF - Extension: DownloadHelper: {b9db16a4-6edc-47ec-a1f4-b86292ed211d} - c:\documents and settings\oukil\Application Data\Mozilla\Firefox\Profiles\febeprof.my\extensions\{b9db16a4-6edc-47ec-a1f4-b86292ed211d}
FF - Extension: Flagfox: {1018e4d6-728f-4b20-ad56-37578a4de76b} - c:\documents and settings\oukil\Application Data\Mozilla\Firefox\Profiles\febeprof.my\extensions\{1018e4d6-728f-4b20-ad56-37578a4de76b}
FF - Extension: Show Go!: showgo@supernova00 - c:\documents and settings\oukil\Application Data\Mozilla\Firefox\Profiles\febeprof.my\extensions\showgo@supernova00
FF - Extension: Tab Mix Plus: {dc572301-7619-498c-a57d-39143191b318} - c:\documents and settings\oukil\Application Data\Mozilla\Firefox\Profiles\febeprof.my\extensions\{dc572301-7619-498c-a57d-39143191b318}
FF - Extension: WOT: {a0d7ccb3-214d-498b-b4aa-0e8fda9a7bf7} - c:\documents and settings\oukil\Application Data\Mozilla\Firefox\Profiles\febeprof.my\extensions\{a0d7ccb3-214d-498b-b4aa-0e8fda9a7bf7}
FF - Extension: own: {35f30c40-35d4-11d9-8dbc-000c6e787ef7} - c:\documents and settings\oukil\Application Data\Mozilla\Firefox\Profiles\febeprof.my\extensions\{35f30c40-35d4-11d9-8dbc-000c6e787ef7}
FF - Extension: FireShot: {0b457cAA-602d-484a-8fe7-c1d894a011ba} - c:\documents and settings\oukil\Application Data\Mozilla\Firefox\Profiles\febeprof.my\extensions\{0b457cAA-602d-484a-8fe7-c1d894a011ba}
FF - Extension: MultirowBookmarksToolbar: {FBF6D7FB-F305-4445-BB3D-FEF66579A033} - c:\documents and settings\oukil\Application Data\Mozilla\Firefox\Profiles\febeprof.my\extensions\{FBF6D7FB-F305-4445-BB3D-FEF66579A033}
FF - Extension: Sxipper: sxipper@sxip.com - c:\documents and settings\oukil\Application Data\Mozilla\Firefox\Profiles\febeprof.my\extensions\sxipper@sxip.com
FF - Extension: Lola: lol@stream18.com - c:\documents and settings\oukil\Application Data\Mozilla\Firefox\Profiles\febeprof.my\extensions\lol@stream18.com
FF - Extension: Java Quick Starter: jqs@sun.com - c:\program files\Java\jre6\lib\deploy\jqs\ff

---- FIREFOX POLICIES ----
FF - user.js: yahoo.homepage.dontask - true
.

**************************************************************************

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2010-12-07 19:38
Windows 5.1.2600 Service Pack 3 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully
hidden files: 0

**************************************************************************
.
--------------------- LOCKED REGISTRY KEYS ---------------------

[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{A483C63A-CDBC-426E-BF93-872502E8144E}]
@Denied: (A 2) (Everyone)
@="FlashBroker"
"LocalizedString"="@c:\\WINDOWS\\system32\\Macromed\\Flash\\FlashUtil10h_ActiveX.exe,-101"

[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{A483C63A-CDBC-426E-BF93-872502E8144E}\Elevation]
"Enabled"=dword:00000001

[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{A483C63A-CDBC-426E-BF93-872502E8144E}\LocalServer32]
@="c:\\WINDOWS\\system32\\Macromed\\Flash\\FlashUtil10h_ActiveX.exe"

[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{A483C63A-CDBC-426E-BF93-872502E8144E}\TypeLib]
@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"

[HKEY_LOCAL_MACHINE\software\Classes\Interface\{E3F2C3CB-5EB8-4A04-B22C-7E3B4B6AF30F}]
@Denied: (A 2) (Everyone)
@="IFlashBroker4"

[HKEY_LOCAL_MACHINE\software\Classes\Interface\{E3F2C3CB-5EB8-4A04-B22C-7E3B4B6AF30F}\ProxyStubClsid32]
@="{00020424-0000-0000-C000-000000000046}"

[HKEY_LOCAL_MACHINE\software\Classes\Interface\{E3F2C3CB-5EB8-4A04-B22C-7E3B4B6AF30F}\TypeLib]
@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"
"Version"="1.0"
.
--------------------- DLLs Loaded Under Running Processes ---------------------

- - - - - - - > 'winlogon.exe'(504)
c:\windows\system32\Ati2evxx.dll
c:\program files\common files\logishrd\bluetooth\LBTWlgn.dll

- - - - - - - > 'explorer.exe'(1096)
c:\windows\system32\WININET.dll
c:\windows\system32\ieframe.dll
c:\windows\system32\wpdshserviceobj.dll
c:\windows\system32\portabledevicetypes.dll
c:\windows\system32\portabledeviceapi.dll
.
Completion time: 2010-12-07 19:40:35
ComboFix-quarantined-files.txt 2010-12-07 19:40
ComboFix2.txt 2010-12-06 14:13

Pre-Run: 7,985,852,416 bytes free
Post-Run: 7,978,278,912 bytes free

- - End Of File - - B7BA1BD14867E02CC78E618EFEAE0EA9

#9 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:03:53 AM

Posted 07 December 2010 - 05:13 PM

Not liking these Unicode entries

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Load]
U?? ? [?]

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Run]
U?? ? [?]


...and Combofix couldn't remove them either. Please run SystemLook and let's see what they are.

Please download SystemLook from one of the links below and save it to your Desktop.
Download Mirror #1
Download Mirror #2

  • Double-click SystemLook.exe to run it.
  • Copy the content of the following codebox into the main textfield:
    :reg
    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Load]
    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Run]
    
  • Click the Look button to start the scan.
  • When finished, a notepad window will open with the results of the scan. Please post this log in your next reply.
Note: The log can also be found on your Desktop entitled SystemLook.txt
Posted Image
m0le is a proud member of UNITE

#10 oukil

oukil
  • Topic Starter

  • Members
  • 12 posts
  • OFFLINE
  •  
  • Local time:03:53 AM

Posted 07 December 2010 - 09:17 PM

jusr one more thing, i noticed that i cant use "Internet Options" in the Control Panel see HERE :wacko:

that is the SystemLook log. :)

SystemLook 04.09.10 by jpshortstuff
Log created at 02:17 on 08/12/2010 by oukil
Administrator - Elevation successful

========== reg ==========

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Load]
"hkey"="HKCU"
"item"="Load"
"inimapping"="0"
"command"="U?? ?"
"key"="SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows"


[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Run]
"hkey"="HKCU"
"item"="Run"
"inimapping"="0"
"command"="U?? ?"
"key"="SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows"


-= EOF =-

Edited by oukil, 07 December 2010 - 09:43 PM.


#11 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:03:53 AM

Posted 08 December 2010 - 06:06 PM

Let's deal with the Control Panel problem too then.

Rerun SystemLook

Please download SystemLook from one of the links below and save it to your Desktop.
Download Mirror #1
Download Mirror #2

  • Double-click SystemLook.exe to run it.
  • Copy the content of the following codebox into the main textfield:
    :reg
    [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies]
    
  • Click the Look button to start the scan.
  • When finished, a notepad window will open with the results of the scan. Please post this log in your next reply.
Note: The log can also be found on your Desktop entitled SystemLook.txt

Edited by m0le, 08 December 2010 - 06:07 PM.

Posted Image
m0le is a proud member of UNITE

#12 oukil

oukil
  • Topic Starter

  • Members
  • 12 posts
  • OFFLINE
  •  
  • Local time:03:53 AM

Posted 08 December 2010 - 07:03 PM

SystemLook 04.09.10 by jpshortstuff
Log created at 00:02 on 09/12/2010 by oukil
Administrator - Elevation successful

========== reg ==========

[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies]
(No values found)

[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\ActiveDesktop]

[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Associations]

[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Attachments]

[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer]

[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Network]

[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\system]

[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\WindowsUpdate]


-= EOF =-

#13 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:03:53 AM

Posted 08 December 2010 - 07:14 PM

Gone. :angry:

Please run System Restore with this script

  • Double-click SystemLook.exe to run it.
  • Copy the content of the following codebox into the main textfield:
    :reg
    [HKEY_CURRENT_USER\Control Panel\don't load]
    
  • Click the Look button to start the scan.
  • When finished, a notepad window will open with the results of the scan. Please post this log in your next reply.
Note: The log can also be found on your Desktop entitled SystemLook.txt
Posted Image
m0le is a proud member of UNITE

#14 oukil

oukil
  • Topic Starter

  • Members
  • 12 posts
  • OFFLINE
  •  
  • Local time:03:53 AM

Posted 08 December 2010 - 07:47 PM

SystemLook 04.09.10 by jpshortstuff
Log created at 00:46 on 09/12/2010 by oukil
Administrator - Elevation successful

========== reg ==========

[HKEY_CURRENT_USER\Control Panel\don't load]
"ncpa.cpl"="No"
"odbccp32.cpl"="No"


-= EOF =-

#15 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:03:53 AM

Posted 08 December 2010 - 08:08 PM

Okay, let's try and clear the suspicious folders and get your icon back in one go.

Backup Your Registry with ERUNT
  • Please use the following link and scroll down to ERUNT and download it.
    http://aumha.org/freeware/freeware.php
  • For version with the Installer:
    Use the setup program to install ERUNT on your computer
  • For the zipped version:
    Unzip all the files into a folder of your choice.
Click Erunt.exe to backup your registry to the folder of your choice.

Note: to restore your registry, go to the folder and start ERDNT.exe


Download OTL to your desktop.

Open OTL

Under the Custom Scans/Fixes box at the bottom, paste in the following

:reg
[-HKEY_CURRENT_USER\Control Panel\don't load]
[-HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Load]
[-HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Run]
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\exefile\shell\open\command]
""=""%1" %*"


Then click the Run Fix button at the top

Let the program run unhindered.

When done it will say "Fix Complete press ok to open the log"
Please post that log in your next reply. Note: If a file or folder cannot be moved immediately you may be asked to reboot the machine to finish the move process. If you are asked to reboot the machine choose Yes. In this case, after the reboot, open Notepad (Start->All Programs->Accessories->Notepad), click File->Open, in the File Name box enter *.log and press the Enter key, navigate to the C:\_OTL\MovedFiles folder, and open the newest .log file present, and copy/paste the contents of that document back here in your next post.


Please also run OTL as a scan, see below:

  • Run OTL. Make sure all other windows are closed and to let it run uninterrupted.
  • When the window appears, underneath Output at the top change it to Minimal Output.
  • Under the Standard Registry box change it to All.
  • Check the boxes beside LOP Check and Purity Check.
  • Click the Run Scan button. Do not change any settings unless otherwise told to do so. The scan wont take long.
  • When the scan completes, it will open two notepad windows. OTL.Txt and Extras.Txt. These are saved in the same location as OTL.
  • Please copy (Edit->Select All, Edit->Copy) the contents of these files, one at a time, and post it with your next reply.

Posted Image
m0le is a proud member of UNITE




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users