Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Infected with x.exe virus


  • This topic is locked This topic is locked
3 replies to this topic

#1 BoszMc

BoszMc

  • Members
  • 3 posts
  • OFFLINE
  •  
  • Local time:01:37 PM

Posted 29 January 2011 - 03:50 AM

desperated to remove this virus (x.exe) it disables anything (sounds, firewall, etc..)
i've tried mbam and combofix as my friend told to do so. im dont have that much of a talent when removing viruses. please help me

sorry i attached the wrong file here is the dds



DDS (Ver_10-12-12.02) - NTFSx86
Run by Tatoosh at 16:29:00.60 on Sat 01/29/2011
Internet Explorer: 7.0.5730.13
Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.1023.490 [GMT -8:00]

AV: Panda Cloud Antivirus *Enabled/Updated* {5AD27692-540A-464E-B625-78275FA38393}

============== Running Processes ===============

C:\Program Files\Faronics\Deep Freeze\Install C-0\DF5Serv.exe
C:\WINDOWS\system32\nvsvc32.exe
C:\WINDOWS\system32\svchost -k DcomLaunch
svchost.exe
svchost.exe
svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Common Files\Acronis\Schedule2\schedul2.exe
C:\Program Files\Malwarebytes' Anti-Malware\mbamservice.exe
C:\Program Files\Panda Security\Panda Cloud Antivirus\PSANHost.exe
D:\EA Games\Need for Speed Undercover\PB\PnkBstrA.exe
C:\WINDOWS\system32\wscntfy.exe
C:\Program Files\Faronics\Deep Freeze\Install C-0\_$Df\FrzState2k.exe
C:\WINDOWS\explorer.exe
C:\WINDOWS\System32\svchost.exe -k netsvcs
C:\Documents and Settings\Tatoosh\Local Settings\Application Data\Google\Chrome\Application\chrome.exe
C:\Documents and Settings\Tatoosh\Local Settings\Application Data\Google\Chrome\Application\chrome.exe
C:\Documents and Settings\Tatoosh\Local Settings\Application Data\Google\Chrome\Application\chrome.exe
C:\Documents and Settings\Tatoosh\Local Settings\Application Data\Google\Chrome\Application\chrome.exe
C:\Documents and Settings\Tatoosh\Local Settings\Application Data\Google\Chrome\Application\chrome.exe
C:\Documents and Settings\Tatoosh\Desktop\dds.scr

============== Pseudo HJT Report ===============

BHO: Groove GFS Browser Helper: {72853161-30c5-4d22-b7f9-0bbc1d38a37e} - c:\progra~1\micros~2\office12\GRA8E1~1.DLL
uRun: [Google Update] "c:\documents and settings\tatoosh\local settings\application data\google\update\GoogleUpdate.exe" /c
uRun: [Messenger (Yahoo!)] "c:\progra~1\yahoo!\messenger\YahooMessenger.exe" -quiet
uRun: [RocketDock] "c:\program files\rocketdock\RocketDock.exe"
mRun: [RTHDCPL] RTHDCPL.EXE
mRun: [NvMediaCenter] RUNDLL32.EXE c:\windows\system32\NvMcTray.dll,NvTaskbarInit
mRun: [NvCplDaemon] RUNDLL32.EXE c:\windows\system32\NvCpl.dll,NvStartup
mRun: [nwiz] c:\program files\nvidia corporation\nview\nwiz.exe /installquiet
mRun: [Malwarebytes' Anti-Malware] "c:\program files\malwarebytes' anti-malware\mbamgui.exe" /starttray
mRun: [PWRISOVM.EXE] c:\program files\poweriso\PWRISOVM.EXE
mRun: [GrooveMonitor] "c:\program files\microsoft office\office12\GrooveMonitor.exe"
mRun: [PSUNMain] "c:\program files\panda security\panda cloud antivirus\PSUNMain.exe" /Traybar
mRun: [AdobeAAMUpdater-1.0] "c:\program files\common files\adobe\oobe\pdapp\uwa\UpdaterStartupUtility.exe"
mRun: [SwitchBoard] c:\program files\common files\adobe\switchboard\SwitchBoard.exe
mRun: [AdobeCS5ServiceManager] "c:\program files\common files\adobe\cs5servicemanager\CS5ServiceManager.exe" -launchedbylogin
mRun: [TrueImageMonitor.exe] c:\program files\acronis\trueimagehome\TrueImageMonitor.exe
mRun: [AcronisTimounterMonitor] c:\program files\acronis\trueimagehome\TimounterMonitor.exe
mRun: [Acronis Scheduler2 Service] "c:\program files\common files\acronis\schedule2\schedhlp.exe"
dRunOnce: [_nltide_2] regsvr32 /s /n /i:U shell32
IE: E&xport to Microsoft Excel - c:\progra~1\micros~2\office12\EXCEL.EXE/3000
IE: {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe
IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe
IE: {2670000A-7350-4f3c-8081-5663EE0C6C49} - {48E73304-E1D6-4330-914C-F5F514E3486C} - c:\progra~1\micros~2\office12\ONBttnIE.dll
IE: {92780B25-18CC-41C8-B9BE-3C9C571A8263} - {FF059E31-CC5A-4E2E-BF3B-96E929D65503} - c:\progra~1\micros~2\office12\REFIEBAR.DLL
Handler: grooveLocalGWS - {88FED34C-F0CA-4636-A375-3CB6248B04CD} - c:\progra~1\micros~2\office12\GR99D3~1.DLL
Notify: DfLogon - LogonDll.dll
SSODL: WPDShServiceObj - {AAA288BA-9A4C-45B0-95D7-94D524869DB5} - c:\windows\system32\wpdshserviceobj.dll
SEH: Groove GFS Stub Execution Hook: {b5a7f190-dda6-4420-b3ba-52453494e6cd} - c:\progra~1\micros~2\office12\GRA8E1~1.DLL

============= SERVICES / DRIVERS ===============

R0 DeepFrz;DeepFrz;c:\windows\system32\drivers\DeepFrz.sys [2007-10-25 131472]
R0 tdrpman147;Acronis Try&Decide and Restore Points filter (build 147);c:\windows\system32\drivers\tdrpm147.sys [2011-1-29 971232]
R1 PSINKNC;PSINKNC;c:\windows\system32\drivers\PSINKNC.sys [2010-6-17 129992]
R2 MBAMService;MBAMService;c:\program files\malwarebytes' anti-malware\mbamservice.exe [2011-1-28 363344]
R2 NanoServiceMain;Panda Cloud Antivirus Service;c:\program files\panda security\panda cloud antivirus\PSANHost.exe [2010-8-9 140608]
R2 PSINAflt;PSINAflt;c:\windows\system32\drivers\PSINAflt.sys [2010-5-27 141384]
R2 PSINFile;PSINFile;c:\windows\system32\drivers\PSINFile.sys [2010-7-21 97096]
R2 PSINProc;PSINProc;c:\windows\system32\drivers\PSINProc.sys [2010-4-30 111624]
R2 PSINProt;PSINProt;c:\windows\system32\drivers\PSINProt.sys [2010-7-21 112456]
R3 MBAMProtector;MBAMProtector;c:\windows\system32\drivers\mbam.sys [2011-1-28 20952]
R3 NVHDA;Service for NVIDIA High Definition Audio Driver;c:\windows\system32\drivers\nvhda32.sys [2011-1-28 100712]
S3 Ambfilt;Ambfilt;c:\windows\system32\drivers\Ambfilt.sys [2011-1-27 1684736]
S3 FXDrv32;FXDrv32;\??\f:\fxdrv32.sys --> f:\FXDrv32.sys [?]
S3 GGSAFERDriver;GGSAFER Driver;\??\d:\garena\safedrv.sys --> d:\garena\safedrv.sys [?]
S3 MBAMSwissArmy;MBAMSwissArmy;c:\windows\system32\drivers\mbamswissarmy.sys [2011-1-28 38224]
S3 SwitchBoard;SwitchBoard;c:\program files\common files\adobe\switchboard\SwitchBoard.exe [2010-2-19 517096]

=============== Created Last 30 ================

2011-01-29 23:54:29 -------- d-sha-r- C:\cmdcons
2011-01-29 23:51:31 98816 ----a-w- c:\windows\sed.exe
2011-01-29 23:51:31 89088 ----a-w- c:\windows\MBR.exe
2011-01-29 23:51:31 256512 ----a-w- c:\windows\PEV.exe
2011-01-29 23:51:31 161792 ----a-w- c:\windows\SWREG.exe
2011-01-29 15:17:04 16299862 ------w- C:\Persi0.sys
2011-01-29 15:17:03 65536 ----a-w- c:\windows\system32\LogonDll.dll
2011-01-29 15:17:02 -------- d-----w- c:\program files\Faronics
2011-01-29 15:06:11 -------- d-----w- C:\Deepfreeze 6.30.20.1875
2011-01-29 13:58:35 2069272 ----a-w- c:\windows\system32\AutoPartNt.exe
2011-01-29 13:24:08 971232 ----a-w- c:\windows\system32\drivers\tdrpm147.sys
2011-01-29 13:24:04 540000 ----a-w- c:\windows\system32\drivers\timntr.sys
2011-01-29 13:24:04 44704 ----a-w- c:\windows\system32\drivers\tifsfilt.sys
2011-01-29 13:23:54 134272 ----a-w- c:\windows\system32\drivers\snman380.sys
2011-01-29 11:30:35 -------- d-----w- c:\windows\system32\GroupPolicy
2011-01-29 08:34:54 -------- d-----w- c:\docume~1\alluse~1\applic~1\regid.1986-12.com.adobe
2011-01-29 07:57:55 -------- d-----w- c:\program files\RocketDock
2011-01-29 02:03:43 -------- d-----w- c:\docume~1\tatoosh\locals~1\applic~1\Yahoo
2011-01-28 23:06:19 -------- d-----w- c:\windows\SxsCaPendDel
2011-01-28 22:57:02 -------- d-----w- c:\program files\Yahoo!
2011-01-28 20:04:58 -------- d-----w- c:\docume~1\tatoosh\locals~1\applic~1\Adobe
2011-01-28 18:43:59 -------- d-----w- c:\docume~1\tatoosh\locals~1\applic~1\Temp
2011-01-28 18:43:55 -------- d-----w- c:\docume~1\tatoosh\locals~1\applic~1\Google
2011-01-28 18:43:12 -------- d-----w- c:\docume~1\tatoosh\locals~1\applic~1\Deployment
2011-01-28 11:31:05 -------- d-----w- c:\docume~1\tatoosh\applic~1\Panda Security
2011-01-28 11:30:13 -------- d-----w- c:\program files\Panda Security
2011-01-28 11:30:13 -------- d-----w- c:\docume~1\alluse~1\applic~1\Panda Security
2011-01-28 10:30:59 -------- d-----w- c:\program files\VideoLAN
2011-01-28 10:29:53 692224 ----a-w- c:\program files\common files\installshield\professional\runtime\0701\intel32\iKernel.dll
2011-01-28 10:29:53 57344 ----a-w- c:\program files\common files\installshield\professional\runtime\0701\intel32\ctor.dll
2011-01-28 10:29:53 5632 ----a-w- c:\program files\common files\installshield\professional\runtime\0701\intel32\DotNetInstaller.exe
2011-01-28 10:29:53 237568 ----a-w- c:\program files\common files\installshield\professional\runtime\0701\intel32\iscript.dll
2011-01-28 10:29:53 163972 ----a-w- c:\program files\common files\installshield\professional\runtime\0701\intel32\iGdi.dll
2011-01-28 10:29:53 155648 ----a-w- c:\program files\common files\installshield\professional\runtime\0701\intel32\iuser.dll
2011-01-28 10:29:52 282756 ----a-w- c:\program files\common files\installshield\professional\runtime\0701\intel32\setup.dll
2011-01-28 10:06:15 2829 ----a-w- c:\windows\War3Unin.pif
2011-01-28 10:06:14 139264 ----a-w- c:\windows\War3Unin.exe
2011-01-28 10:04:25 -------- d-----w- c:\windows\system32\LogFiles
2011-01-28 09:50:35 -------- d-----w- c:\windows\system32\URTTemp
2011-01-28 09:48:31 86016 ----a-w- c:\windows\unvise32.exe
2011-01-28 09:46:27 217088 ----a-w- c:\windows\system32\libmySQL.dll
2011-01-28 09:43:10 -------- d-----w- c:\docume~1\tatoosh\applic~1\Command & Conquer 3 Kane's Wrath
2011-01-28 09:21:57 32768 ----a-w- c:\program files\common files\installshield\professional\runtime\Objectps.dll
2011-01-28 09:21:56 749568 ----a-w- c:\program files\common files\installshield\professional\runtime\10\50\intel32\iKernel.dll
2011-01-28 09:21:56 69715 ----a-w- c:\program files\common files\installshield\professional\runtime\10\50\intel32\ctor.dll
2011-01-28 09:21:56 5632 ----a-w- c:\program files\common files\installshield\professional\runtime\10\50\intel32\DotNetInstaller.exe
2011-01-28 09:21:56 274432 ----a-w- c:\program files\common files\installshield\professional\runtime\10\50\intel32\iscript.dll
2011-01-28 09:21:56 180224 ----a-w- c:\program files\common files\installshield\professional\runtime\10\50\intel32\iuser.dll
2011-01-28 09:21:54 192644 ----a-w- c:\program files\common files\installshield\professional\runtime\10\50\intel32\iGdi.dll
2011-01-28 09:21:53 323716 ----a-w- c:\program files\common files\installshield\professional\runtime\10\50\intel32\setup.dll
2011-01-28 08:31:50 33104 ----a-w- c:\windows\system32\spool\prtprocs\w32x86\msonpppr.dll
2011-01-28 08:31:50 32592 ----a-w- c:\windows\system32\msonpmon.dll
2011-01-28 08:27:45 -------- d-----w- c:\windows\SHELLNEW
2011-01-28 08:27:33 -------- d-----w- c:\docume~1\tatoosh\locals~1\applic~1\Microsoft Help
2011-01-28 08:24:14 -------- d-----w- c:\program files\PowerISO
2011-01-28 08:23:37 -------- d-----w- c:\program files\CCleaner
2011-01-28 08:21:32 -------- d-----w- c:\docume~1\tatoosh\applic~1\Malwarebytes
2011-01-28 08:19:59 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2011-01-28 08:19:59 -------- d-----w- c:\docume~1\alluse~1\applic~1\Malwarebytes
2011-01-28 08:19:56 20952 ----a-w- c:\windows\system32\drivers\mbam.sys
2011-01-28 08:19:56 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
2011-01-28 08:04:37 -------- d-----w- c:\docume~1\alluse~1\applic~1\NVIDIA Corporation
2011-01-28 08:04:13 26216 ----a-r- c:\windows\system32\nvhdap32.dll
2011-01-28 08:04:13 100712 ----a-r- c:\windows\system32\drivers\nvhda32.sys
2011-01-28 08:03:40 240592 ----a-w- c:\windows\system32\nvdrsdb0.bin
2011-01-28 08:03:38 813672 ----a-w- c:\windows\system32\nvgenco32.dll
2011-01-28 08:03:38 240592 ----a-w- c:\windows\system32\nvdrsdb1.bin
2011-01-28 08:03:38 1 ----a-w- c:\windows\system32\nvdrssel.bin
2011-01-28 08:03:37 888424 ----a-r- c:\windows\system32\nvdispco32.dll
2011-01-28 08:03:22 61440 ----a-w- c:\windows\system32\OpenCL.dll
2011-01-28 08:03:20 14532608 ----a-w- c:\windows\system32\nvoglnt.dll
2011-01-28 08:03:19 2293194 ----a-w- c:\windows\system32\nvdata.bin
2011-01-28 08:03:18 2932840 ----a-w- c:\windows\system32\nvcuvid.dll
2011-01-28 08:03:18 2666600 ----a-w- c:\windows\system32\nvcuvenc.dll
2011-01-28 08:03:17 4882432 ----a-w- c:\windows\system32\nvcuda.dll
2011-01-28 08:02:55 1462272 ----a-w- c:\windows\system32\nvapi.dll
2011-01-28 08:02:55 13012992 ----a-w- c:\windows\system32\nvcompiler.dll
2011-01-28 08:02:53 9623680 -c--a-w- c:\windows\system32\dllcache\nv4_mini.sys
2011-01-28 08:02:53 9623680 ----a-w- c:\windows\system32\drivers\nv4_mini.sys
2011-01-28 08:02:52 6359552 -c--a-w- c:\windows\system32\dllcache\nv4_disp.dll
2011-01-28 08:02:52 6359552 ----a-w- c:\windows\system32\nv4_disp.dll
2011-01-28 08:00:04 -------- d-----w- c:\program files\NVIDIA Corporation

==================== Find3M ====================


============= FINISH: 16:29:17.71 ===============

attach

EDIT: Posts merged ~BP

Attached Files


Edited by Budapest, 29 January 2011 - 03:47 PM.


BC AdBot (Login to Remove)

 


#2 oneof4

oneof4

  • Malware Response Team
  • 3,779 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:The Collective
  • Local time:01:37 AM

Posted 03 February 2011 - 04:28 PM

Hello and welcome to Bleeping Computer

We apologize for the delay in responding to your request for help. Here at Bleeping Computer we get overwhelmed at times, and we are trying our best to keep up. Please note that your topic was not intentionally overlooked. Our mission is to help everyone in need, but sometimes it takes just a little longer to get to every request for help. No one is ignored here.

If you have since resolved the original problem you were having, we would appreciate you letting us know. If not please perform the following steps below so we can have a look at the current condition of your machine.

If you have not done so, include a clear description of the problems you're having, along with any steps you may have performed so far.

Upon completing the steps below another staff member will review and take the steps necessary with you to get your machine back in working order clean and free of malware.

We need to create a New FULL OTL Report
  • Please download OTL from here if you have not done so already:
  • Save it to your desktop.
  • Double click on the Posted Image icon on your desktop.
  • Click the "Scan All Users" checkbox.
  • Change the "Extra Registry" option to "SafeList"
  • Push the Posted Image button.
  • Two reports will open, copy and paste them in a reply here:
    • OTL.txt <-- Will be opened
    • Extra.txt <-- Will be minimized
After downloading the tool, disconnect from the internet and disable all antivirus protection. Run the scan, enable your A/V and reconnect to the internet.

Information on A/V control HERE

We also need a new log from the GMER anti-rootkit scanner. Please first disable any CD emulation programs using the steps found in this topic:

Why we request you disable CD Emulation when receiving Malware Removal Advice

Please download GMER from one of the following locations and save it to your desktop:
  • Main Mirror
    This version will download a randomly named file (Recommended)
  • Zipped Mirror
    This version will download a zip file you will need to extract first. If you use this mirror, please extract the zip file to your desktop.
  • Disconnect from the Internet and close all running programs.
  • Temporarily disable any real-time active protection so your security programs will not conflict with gmer's driver.
  • Double-click on the randomly named GMER file (i.e. n7gmo46c.exe) and allow the gmer.sys driver to load if asked.
  • Note: If you downloaded the zipped version, extract the file to its own folder such as C:\gmer and then double-click on gmer.exe.

    Posted Image
  • GMER will open to the Rootkit/Malware tab and perform an automatic quick scan when first run. (do not use the computer while the scan is in progress)
  • If you receive a WARNING!!! about rootkit activity and are asked to fully scan your system...click NO.
  • Now click the Scan button. If you see a rootkit warning window, click OK.
  • When the scan is finished, click the Save... button to save the scan results to your Desktop. Save the file as gmer.log.
  • Click the Copy button and paste the results into your next reply.
  • Exit GMER and be sure to re-enable your anti-virus, Firewall and any other security programs you had disabled.
-- If you encounter any problems, try running GMER in safe mode.
-- If GMER crashes or keeps resulting in a BSODs, uncheck Devices on the right side before scanning
.

Best Regards,
oneof4.

Best Regards,
oneof4.


#3 oneof4

oneof4

  • Malware Response Team
  • 3,779 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:The Collective
  • Local time:01:37 AM

Posted 07 February 2011 - 04:42 PM

Do you still need help?

Best Regards,
oneof4.


#4 Blade

Blade

    Strong in the Bleepforce


  • Site Admin
  • 12,702 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:US
  • Local time:01:37 AM

Posted 11 February 2011 - 02:36 PM

Due to the lack of feedback, this topic is now closed.In the event you still have problems, please send me or any Moderator a Private Message and ask them to reopen this topic within the next 5 days.

Posted Image

If I am helping you, it has been 48 hours since your last post, and I have yet to reply to your topic, please send me a PM
Become a BleepingComputer fan: Facebook
Follow us on Twitter!
Circle us on Google+





0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users