Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Help Invisable iexplore.exe


  • This topic is locked This topic is locked
2 replies to this topic

#1 DarkBlades

DarkBlades

  • Members
  • 1 posts
  • OFFLINE
  •  
  • Local time:04:04 PM

Posted 24 May 2011 - 10:51 PM

The mistake I made was "using" Combofix without being asked to. But I did use combofix... -_-'

and the computer has revealed some files that were invisable. Not sure if iexporer.exe malware is removed but files on my desktop that were once missing are now restored.. I have yet to hear the voices and invisable iexporer.exe...

Here is my log...


ComboFix 11-05-24.01 - Emilio Gomez 05/24/2011 20:00:36.1.1 - x86
Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.990.684 [GMT -7:00]
Running from: c:\documents and settings\Emilio Gomez\Desktop\ComboFix.exe
AV: avast! Antivirus *Enabled/Updated* {7591DB91-41F0-48A3-B128-1A293FD8233D}
.
.
((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.
.
c:\documents and settings\Emilio Gomez\2gweorjqjutp92vjy9gake
c:\documents and settings\Emilio Gomez\Application Data\Adobe\plugs
c:\documents and settings\Emilio Gomez\Application Data\Adobe\plugs\mmc14306562.txt
c:\documents and settings\Emilio Gomez\Application Data\Adobe\shed
c:\documents and settings\Emilio Gomez\Application Data\Adobe\shed\thr1.chm
c:\documents and settings\Emilio Gomez\Application Data\PriceGong
c:\documents and settings\Emilio Gomez\Application Data\PriceGong\Data\1.xml
c:\documents and settings\Emilio Gomez\Application Data\PriceGong\Data\a.xml
c:\documents and settings\Emilio Gomez\Application Data\PriceGong\Data\b.xml
c:\documents and settings\Emilio Gomez\Application Data\PriceGong\Data\c.xml
c:\documents and settings\Emilio Gomez\Application Data\PriceGong\Data\d.xml
c:\documents and settings\Emilio Gomez\Application Data\PriceGong\Data\e.xml
c:\documents and settings\Emilio Gomez\Application Data\PriceGong\Data\f.xml
c:\documents and settings\Emilio Gomez\Application Data\PriceGong\Data\g.xml
c:\documents and settings\Emilio Gomez\Application Data\PriceGong\Data\h.xml
c:\documents and settings\Emilio Gomez\Application Data\PriceGong\Data\i.xml
c:\documents and settings\Emilio Gomez\Application Data\PriceGong\Data\J.xml
c:\documents and settings\Emilio Gomez\Application Data\PriceGong\Data\k.xml
c:\documents and settings\Emilio Gomez\Application Data\PriceGong\Data\l.xml
c:\documents and settings\Emilio Gomez\Application Data\PriceGong\Data\m.xml
c:\documents and settings\Emilio Gomez\Application Data\PriceGong\Data\mru.xml
c:\documents and settings\Emilio Gomez\Application Data\PriceGong\Data\n.xml
c:\documents and settings\Emilio Gomez\Application Data\PriceGong\Data\o.xml
c:\documents and settings\Emilio Gomez\Application Data\PriceGong\Data\p.xml
c:\documents and settings\Emilio Gomez\Application Data\PriceGong\Data\q.xml
c:\documents and settings\Emilio Gomez\Application Data\PriceGong\Data\r.xml
c:\documents and settings\Emilio Gomez\Application Data\PriceGong\Data\s.xml
c:\documents and settings\Emilio Gomez\Application Data\PriceGong\Data\t.xml
c:\documents and settings\Emilio Gomez\Application Data\PriceGong\Data\u.xml
c:\documents and settings\Emilio Gomez\Application Data\PriceGong\Data\v.xml
c:\documents and settings\Emilio Gomez\Application Data\PriceGong\Data\w.xml
c:\documents and settings\Emilio Gomez\Application Data\PriceGong\Data\x.xml
c:\documents and settings\Emilio Gomez\Application Data\PriceGong\Data\y.xml
c:\documents and settings\Emilio Gomez\Application Data\PriceGong\Data\z.xml
c:\documents and settings\Emilio Gomez\Local Settings\Application Data\{69A3E986-3E2C-4826-A679-71E9AFD2827A}
c:\documents and settings\Emilio Gomez\Local Settings\Application Data\{69A3E986-3E2C-4826-A679-71E9AFD2827A}\chrome.manifest
c:\documents and settings\Emilio Gomez\Local Settings\Application Data\{69A3E986-3E2C-4826-A679-71E9AFD2827A}\chrome\content\_cfg.js
c:\documents and settings\Emilio Gomez\Local Settings\Application Data\{69A3E986-3E2C-4826-A679-71E9AFD2827A}\chrome\content\overlay.xul
c:\documents and settings\Emilio Gomez\Local Settings\Application Data\{69A3E986-3E2C-4826-A679-71E9AFD2827A}\install.rdf
c:\documents and settings\Emilio Gomez\piabaj.exe
c:\documents and settings\Emilio Gomez\wiexc.exe
c:\program files\Shared
c:\program files\Shared\shared.sig
.
Infected copy of c:\windows\system32\drivers\volsnap.sys was found and disinfected
Restored copy from - Kitty had a snack :P
.
((((((((((((((((((((((((( Files Created from 2011-04-25 to 2011-05-25 )))))))))))))))))))))))))))))))
.
.
2011-05-19 05:10 . 2011-05-19 05:18 53248 ----a-w- c:\windows\system32\drivers\rk_remover.sys
2011-05-19 05:03 . 2011-05-19 05:03 150528 ----a-w- c:\windows\system32\drivers\IOCTLfuzzer.sys
2011-05-14 19:42 . 2011-05-14 19:42 -------- d-----w- c:\documents and settings\Emilio Gomez\Application Data\GlarySoft
2011-05-14 19:41 . 2011-05-14 19:41 -------- d-----w- c:\program files\Glary Utilities
2011-05-14 19:20 . 2011-05-14 19:20 -------- d-----w- c:\program files\VS Revo Group
2011-05-14 16:39 . 2011-05-14 16:39 -------- d-----w- c:\documents and settings\Emilio Gomez\Application Data\Malwarebytes
2011-05-14 16:39 . 2010-12-21 01:09 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2011-05-14 16:39 . 2011-05-14 16:39 -------- d-----w- c:\documents and settings\All Users\Application Data\Malwarebytes
2011-05-14 16:39 . 2011-05-14 16:39 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
2011-05-13 16:55 . 2011-05-13 16:55 -------- d-----w- c:\windows\system32\wbem\Repository
2011-05-13 16:54 . 2011-05-13 16:54 -------- d-----w- c:\program files\TuneUp Utilities 2011
2011-05-13 01:06 . 2011-05-13 16:54 -------- d-----w- c:\documents and settings\All Users\Application Data\kF28601KiIgO28601
2011-05-12 23:54 . 2011-05-14 16:24 0 ----a-w- c:\windows\Nzamacihir.bin
2011-05-04 01:37 . 2011-05-04 01:37 20747 ----a-w- c:\windows\system32\drivers\AegisP.sys
2011-05-04 01:37 . 2005-11-25 02:51 245248 ----a-w- c:\windows\system32\rt73.sys
2011-05-04 01:37 . 2003-10-13 22:30 94208 ----a-w- c:\windows\system32\GTW32N50.dll
2011-05-04 01:37 . 2003-09-26 06:28 31930 ----a-w- c:\windows\system32\GTNDIS3.VXD
2011-05-04 01:37 . 2003-09-26 05:15 15872 ----a-w- c:\windows\system32\GTNDIS5.sys
2011-05-04 01:37 . 2005-02-02 01:18 17992 ----a-w- c:\windows\system32\drivers\bcm42rly.sys
2011-05-04 01:37 . 2005-02-02 01:18 17992 ----a-w- c:\windows\system32\bcm42rly.sys
2011-05-04 01:37 . 2005-02-02 01:18 17992 ----a-w- c:\windows\bcm42rly.sys
2011-05-04 01:37 . 2005-11-04 00:41 32768 ----a-w- c:\windows\system32\GTGina.dll
2011-05-04 01:37 . 2011-05-04 01:37 -------- d--h--w- c:\program files\InstallShield Installation Information
2011-05-04 01:37 . 2011-05-04 01:37 -------- d-----w- c:\program files\Compact Wireless-G USB Adapter Wireless Network Monitor
2011-05-04 01:37 . 2011-05-04 01:37 -------- d-----w- c:\program files\Common Files\InstallShield
.
.
.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2011-03-30 17:02 . 2011-04-15 02:45 31552 ----a-w- c:\windows\system32\TURegOpt.exe
2011-03-30 16:57 . 2011-04-22 03:27 29504 ----a-w- c:\windows\system32\uxtuneup.dll
2011-03-07 05:33 . 2010-10-01 03:32 692736 ----a-w- c:\windows\system32\inetcomm.dll
2011-03-04 06:37 . 2008-04-13 23:00 420864 ----a-w- c:\windows\system32\vbscript.dll
2011-03-03 13:21 . 2008-04-13 23:00 1857920 ----a-w- c:\windows\system32\win32k.sys
.
.
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4
.
[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\URLSearchHooks]
"{bf7380fa-e3b4-4db2-af3e-9d8783a45bfc}"= "c:\program files\uTorrentBar\tbuTor.dll" [2010-12-09 3911776]
.
[HKEY_CLASSES_ROOT\clsid\{bf7380fa-e3b4-4db2-af3e-9d8783a45bfc}]
.
[HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{30F9B915-B755-4826-820B-08FBA6BD249D}]
2010-12-09 20:51 3911776 ----a-w- c:\program files\ConduitEngine\ConduitEngine.dll
.
[HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{bf7380fa-e3b4-4db2-af3e-9d8783a45bfc}]
2010-12-09 20:51 3911776 ----a-w- c:\program files\uTorrentBar\tbuTor.dll
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Toolbar]
"{bf7380fa-e3b4-4db2-af3e-9d8783a45bfc}"= "c:\program files\uTorrentBar\tbuTor.dll" [2010-12-09 3911776]
"{30F9B915-B755-4826-820B-08FBA6BD249D}"= "c:\program files\ConduitEngine\ConduitEngine.dll" [2010-12-09 3911776]
.
[HKEY_CLASSES_ROOT\clsid\{bf7380fa-e3b4-4db2-af3e-9d8783a45bfc}]
.
[HKEY_CLASSES_ROOT\clsid\{30f9b915-b755-4826-820b-08fba6bd249d}]
.
[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Toolbar\Webbrowser]
"{BF7380FA-E3B4-4DB2-AF3E-9D8783A45BFC}"= "c:\program files\uTorrentBar\tbuTor.dll" [2010-12-09 3911776]
"{30F9B915-B755-4826-820B-08FBA6BD249D}"= "c:\program files\ConduitEngine\ConduitEngine.dll" [2010-12-09 3911776]
.
[HKEY_CLASSES_ROOT\clsid\{bf7380fa-e3b4-4db2-af3e-9d8783a45bfc}]
.
[HKEY_CLASSES_ROOT\clsid\{30f9b915-b755-4826-820b-08fba6bd249d}]
.
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"SUPERAntiSpyware"="c:\program files\SUPERAntiSpyware\SUPERAntiSpyware.exe" [2011-05-13 2424192]
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"SoundMAXPnP"="c:\program files\Analog Devices\Core\smax4pnp.exe" [2007-08-01 1036288]
"SunJavaUpdateSched"="c:\program files\Common Files\Java\Java Update\jusched.exe" [2010-05-14 248552]
"AdobeAAMUpdater-1.0"="c:\program files\Common Files\Adobe\OOBE\PDApp\UWA\UpdaterStartupUtility.exe" [2010-03-06 500208]
"SwitchBoard"="c:\program files\Common Files\Adobe\SwitchBoard\SwitchBoard.exe" [2010-02-19 517096]
"AdobeCS5ServiceManager"="c:\program files\Common Files\Adobe\CS5ServiceManager\CS5ServiceManager.exe" [2010-02-22 406992]
.
[hkey_local_machine\software\microsoft\windows\currentversion\explorer\ShellExecuteHooks]
"{5AE067D3-9AFB-48E0-853A-EBB7F4A000DA}"= "c:\program files\SUPERAntiSpyware\SASSEH.DLL" [2008-05-13 77824]
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\!SASWinLogon]
2009-09-03 22:21 548352 ----a-w- c:\program files\SUPERAntiSpyware\SASWINLO.DLL
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\LMIinit]
2010-12-29 07:50 87424 ----a-w- c:\windows\system32\LMIinit.dll
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run-]
"Adobe Reader Speed Launcher"="c:\program files\Adobe\Reader 9.0\Reader\Reader_sl.exe"
"Adobe ARM"="c:\program files\Common Files\Adobe\ARM\1.0\AdobeARM.exe"
"LogMeIn GUI"="c:\program files\LogMeIn\x86\LogMeInSystray.exe"
"GrooveMonitor"="c:\program files\Microsoft Office\Office12\GrooveMonitor.exe"
.
[HKEY_LOCAL_MACHINE\software\microsoft\security center]
"AntiVirusOverride"=dword:00000001
.
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"%windir%\\system32\\sessmgr.exe"=
"c:\\Program Files\\Microsoft Office\\Office12\\OUTLOOK.EXE"=
"c:\\Program Files\\Microsoft Office\\Office12\\GROOVE.EXE"=
"c:\\Program Files\\Microsoft Office\\Office12\\ONENOTE.EXE"=
"c:\\Program Files\\uTorrent\\uTorrent.exe"=
.
R1 SASDIFSV;SASDIFSV;c:\program files\SUPERAntiSpyware\sasdifsv.sys [2/17/2010 11:25 AM 12872]
R1 SASKUTIL;SASKUTIL;c:\program files\SUPERAntiSpyware\SASKUTIL.SYS [5/10/2010 11:41 AM 67656]
R2 LMIGuardianSvc;LMIGuardianSvc;c:\program files\LogMeIn\x86\LMIGuardianSvc.exe [9/27/2010 3:47 PM 374152]
R2 LMIInfo;LogMeIn Kernel Information Provider;c:\program files\LogMeIn\x86\rainfo.sys [5/31/2010 12:31 PM 12856]
R3 brfilt;Brother MFC Filter Driver;c:\windows\system32\drivers\BrFilt.sys [11/10/2010 6:23 PM 2944]
R3 BrSerWDM;Brother WDM Serial driver;c:\windows\system32\drivers\BrSerWdm.sys [11/10/2010 6:23 PM 60416]
R3 BrUsbMdm;Brother MFC USB Fax Only Modem;c:\windows\system32\drivers\BrUsbMdm.sys [11/10/2010 6:23 PM 11008]
R3 BrUsbScn;Brother MFC USB Scanner driver;c:\windows\system32\drivers\BrUsbScn.sys [11/10/2010 6:23 PM 10368]
S0 cerc6;cerc6; [x]
S2 gupdate;Google Update Service (gupdate);c:\program files\Google\Update\GoogleUpdate.exe [11/8/2010 12:48 PM 136176]
S3 androidusb;ADB Interface Driver;c:\windows\system32\drivers\smhwadb.sys [1/25/2011 9:52 AM 25728]
S3 gupdatem;Google Update Service (gupdatem);c:\program files\Google\Update\GoogleUpdate.exe [11/8/2010 12:48 PM 136176]
S3 IOCTLfuzzer;IOCTLfuzzer;c:\windows\system32\drivers\IOCTLfuzzer.sys [5/18/2011 10:03 PM 150528]
S3 rk_remover-boot;rk_remover-boot;c:\windows\system32\drivers\rk_remover.sys [5/18/2011 10:10 PM 53248]
S3 smhwdev;SmartPhone dummy USB PNP Device (Normal);c:\windows\system32\drivers\smhwdev.sys [1/25/2011 9:52 AM 100864]
S3 smhwser;USB Device for Legacy Serial Communication (Normal);c:\windows\system32\drivers\smhwser.sys [1/25/2011 9:52 AM 108032]
S3 SwitchBoard;Adobe SwitchBoard;c:\program files\Common Files\Adobe\SwitchBoard\SwitchBoard.exe [2/19/2010 1:37 PM 517096]
.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Svchost - NetSvcs
UxTuneUp
.
Contents of the 'Scheduled Tasks' folder
.
2011-05-25 c:\windows\Tasks\GlaryInitialize.job
- c:\program files\Glary Utilities\initialize.exe [2011-05-14 00:24]
.
2011-05-25 c:\windows\Tasks\GoogleUpdateTaskMachineCore.job
- c:\program files\Google\Update\GoogleUpdate.exe [2010-11-08 19:48]
.
2011-05-25 c:\windows\Tasks\GoogleUpdateTaskMachineUA.job
- c:\program files\Google\Update\GoogleUpdate.exe [2010-11-08 19:48]
.
.
------- Supplementary Scan -------
.
uStart Page = hxxp://www.yahoo.com/
IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~2\Office12\EXCEL.EXE/3000
IE: Google Sidewiki... - c:\program files\Google\Google Toolbar\Component\GoogleToolbarDynamic_mui_en_D183CA64F05FDD98.dll/cmsidewiki.html
FF - ProfilePath - c:\documents and settings\Emilio Gomez\Application Data\Mozilla\Firefox\Profiles\u778rmhq.default\
FF - prefs.js: browser.search.defaulturl - hxxp://search.conduit.com/ResultsExt.aspx?ctid=CT2786678&SearchSource=3&q={searchTerms}
FF - prefs.js: browser.search.selectedEngine -
FF - prefs.js: browser.startup.homepage - hxxp://www.yahoo.com
FF - Ext: Default: {972ce4c6-7e08-4474-a285-3208198ce6fd} - c:\program files\Mozilla Firefox\extensions\{972ce4c6-7e08-4474-a285-3208198ce6fd}
FF - Ext: Java Quick Starter: jqs@sun.com - c:\program files\Java\jre6\lib\deploy\jqs\ff
FF - Ext: Conduit Engine : engine@conduit.com - %profile%\extensions\engine@conduit.com
FF - Ext: uTorrentBar Community Toolbar: {bf7380fa-e3b4-4db2-af3e-9d8783a45bfc} - %profile%\extensions\{bf7380fa-e3b4-4db2-af3e-9d8783a45bfc}
FF - user.js: network.http.max-persistent-connections-per-server - 4
FF - user.js: nglayout.initialpaint.delay - 600
FF - user.js: content.notify.interval - 600000
FF - user.js: content.max.tokenizing.time - 1800000
FF - user.js: content.switch.threshold - 600000
.
.
**************************************************************************
.
catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2011-05-24 20:08
Windows 5.1.2600 Service Pack 3 NTFS
.
scanning hidden processes ...
.
scanning hidden autostart entries ...
.
scanning hidden files ...
.
scan completed successfully
hidden files: 0
.
**************************************************************************
.
--------------------- LOCKED REGISTRY KEYS ---------------------
.
[HKEY_USERS\S-1-5-21-1390067357-1343024091-1417001333-500\Software\Microsoft\Internet Explorer\User Preferences]
@Denied: (2) (Administrator)
"88D7D0879DAB32E14DE5B3A805A34F98AFF34F5977"=hex:01,00,00,00,d0,8c,9d,df,01,15,
d1,11,8c,7a,00,c0,4f,c2,97,eb,01,00,00,00,76,2d,2a,37,fc,f4,9a,43,91,d1,fa,\
"2D53CFFC5C1A3DD2E97B7979AC2A92BD59BC839E81"=hex:01,00,00,00,d0,8c,9d,df,01,15,
d1,11,8c,7a,00,c0,4f,c2,97,eb,01,00,00,00,76,2d,2a,37,fc,f4,9a,43,91,d1,fa,\
.
[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{A483C63A-CDBC-426E-BF93-872502E8144E}]
@Denied: (A 2) (Everyone)
@="FlashBroker"
"LocalizedString"="@c:\\WINDOWS\\system32\\Macromed\\Flash\\FlashUtil10l_ActiveX.exe,-101"
.
[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{A483C63A-CDBC-426E-BF93-872502E8144E}\Elevation]
"Enabled"=dword:00000001
.
[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{A483C63A-CDBC-426E-BF93-872502E8144E}\LocalServer32]
@="c:\\WINDOWS\\system32\\Macromed\\Flash\\FlashUtil10l_ActiveX.exe"
.
[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{A483C63A-CDBC-426E-BF93-872502E8144E}\TypeLib]
@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"
.
[HKEY_LOCAL_MACHINE\software\Classes\Interface\{E3F2C3CB-5EB8-4A04-B22C-7E3B4B6AF30F}]
@Denied: (A 2) (Everyone)
@="IFlashBroker4"
.
[HKEY_LOCAL_MACHINE\software\Classes\Interface\{E3F2C3CB-5EB8-4A04-B22C-7E3B4B6AF30F}\ProxyStubClsid32]
@="{00020424-0000-0000-C000-000000000046}"
.
[HKEY_LOCAL_MACHINE\software\Classes\Interface\{E3F2C3CB-5EB8-4A04-B22C-7E3B4B6AF30F}\TypeLib]
@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"
"Version"="1.0"
.
--------------------- DLLs Loaded Under Running Processes ---------------------
.
- - - - - - - > 'winlogon.exe'(928)
c:\program files\SUPERAntiSpyware\SASWINLO.DLL
c:\windows\system32\WININET.dll
c:\windows\system32\Ati2evxx.dll
c:\windows\system32\LMIinit.dll
.
Completion time: 2011-05-24 20:11:31
ComboFix-quarantined-files.txt 2011-05-25 03:11
.
Pre-Run: 57,807,577,088 bytes free
Post-Run: 58,183,020,544 bytes free
.
WindowsXP-KB310994-SP2-Pro-BootDisk-ENU.exe
[boot loader]
timeout=2
default=multi(0)disk(0)rdisk(0)partition(1)\WINDOWS
[operating systems]
c:\cmdcons\BOOTSECT.DAT="Microsoft Windows Recovery Console" /cmdcons
UnsupportedDebug="do not select this" /debug
multi(0)disk(0)rdisk(0)partition(1)\WINDOWS="Microsoft Windows XP Professional" /noexecute=optin /fastdetect
.
- - End Of File - - 45FD37DF278E31C95451CB1161A20C23

BC AdBot (Login to Remove)

 


#2 SweetTech

SweetTech

    Agent ST


  • Members
  • 13,421 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Antarctica
  • Local time:07:04 PM

Posted 31 May 2011 - 11:29 AM

Hello and welcome to the forums!

My secret agent name on the forums is SweetTech (you can call me ST for short), it's a pleasure to meet you. :)

I am very sorry for the delay in responding, but as you can see we are at the moment being flooded with logs which, when paired with the never-ending shortage of helpers, resulted in the delayed responding to your thread.

I would be glad to take a look at your log and help you with solving any malware problems.

If you have since resolved the issues you were originally experiencing, or have received help elsewhere, please inform me so that this topic can be closed.

If you have not, please adhere to the guidelines below and then follow instructions as outlined further below:

  • Logs from malware removal programs (OTL is one of them) can take some time to analyze. I need you to be patient while I analyze any logs you post. Please remember, I am a volunteer, and I do have a life outside of these forums.
  • Please make sure to carefully read any instruction that I give you. Attention to detail is important! Since I cannot see or directly interact with your computer I am dependent on you to "be my eyes" and provide as much information as you can regarding the current state of your computer.
  • If you're not sure, or if something unexpected happens, do NOT continue! Stop and ask!
  • If I instruct you to download a specific tool in which you already have, please delete the copy that you have and re-download the tool. The reason I ask you to do this is because these tools are updated fairly regularly.
  • Do not do things I do not ask for, such as running a spyware scan on your computer. The one thing that you should always do, is to make sure sure that your anti-virus definitions are up-to-date!
  • Please do not use the Attachment feature for any log file. Do a Copy/Paste of the entire contents of the log file and submit it inside your post.
  • I am going to stick with you until ALL malware is gone from your system. I would appreciate it if you would do the same. From this point, we're in this together ;)
    Because of this, you must reply within three days
    failure to reply will result in the topic being closed!
  • Please do not PM me directly for help. If you have any questions, post them in this topic.
  • Lastly, I am no magician. I will try very hard to fix your issues, but no promises can be made. Also be aware that some infections are so severe that you might need to resort to reformatting and reinstalling your operating system.
    Don't worry, this only happens in severe cases, but it sadly does happen. Be prepared to back up your data. Have means of backing up your data available.

____________________________________________________

Posted Image One or more of the identified infections is a backdoor trojan and password stealer.

This type of infection allows hackers to access and remotely control your computer, log keystrokes, steal critical system information, and download and execute files without your knowledge.
If you do any banking or other financial transactions on the PC or if it contains any other sensitive information, then from a clean computer, change all passwords where applicable.
It would also be wise to contact those same financial institutions to appraise them of your situation.


I highly suggest you take a look at the two links provided below:
1. How Do I Handle Possible Identify Theft, Internet Fraud, and CC Fraud?
2. When should I re-format? How should I reinstall?


We can still clean this machine but I can't guarantee that it will be 100% secure afterwards. Let me know what you decide to do. If you decide to go through with the cleanup, please proceed with the following steps.



NEXT:



Rootkit UnHooker (RkU)
Please download Rootkit Unhooker from one of the following links and save it to your desktop.
Link 1 (.exe file)
Link 2 (zipped file)
Link 3 (.rar file)In order to use this tool if you downloaded from either of the second two links, you will need to extract the RKUnhookerLE.exe file using a program capable of extracing ZIP and RAR compressed files. If you don't have an extraction program, you can downlaod, install and use the free 7-zip utility.

  • Double-click on RKUnhookerLE.exe to start the program.
    Vista/Windows 7 users right-click and select Run As Administrator.
  • Click the Report tab, then click Scan.
  • Check Drivers, Stealth Code, and uncheck the rest.
  • Click OK.
  • Wait until it's finished and then go to File > Save Report.
  • Save the report to your Desktop.
  • Copy and paste the contents of the report into your next reply.
-- Note: You may get this warning...just ignore it, click OK and continue: "Rootkit Unhooker has detected a parasite inside itself! It is recommended to remove parasite, okay?".



NEXT:


Running OTL

We need to create a FULL OTL Report
  • Please download OTL from here:
  • Save it to your desktop.
  • Double click on the Posted Image icon on your desktop.
  • Click the "Scan All Users" checkbox.
  • Change the "Extra Registry" option to "SafeList"
  • Push the Posted Image button.
  • Two reports will open, copy and paste them in a reply here:
    • OTL.txt <-- Will be opened
    • Extras.txt <-- Will be minimized

NEXT:


Please provide an update on how things are running in your next reply.

Edited by SweetTech, 31 May 2011 - 11:30 AM.

Have I helped you? If you'd like to assist in the fight against malware, click here Posted Image


The instructions seen in this post have been specifically tailored to this user and the issues they are experiencing with their computer. If you think you have a similar problem, please first read this topic, and then begin your own, new thread. I do not offer private support via Private Message.


#3 SweetTech

SweetTech

    Agent ST


  • Members
  • 13,421 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Antarctica
  • Local time:07:04 PM

Posted 02 June 2011 - 11:08 AM

Due to the lack of feedback, this topic is now closed.In the event you still have problems, please send me or any Moderator a Private Message and ask them to reopen this topic within the next 5 days. Please include a link to your topic in the Private Message. Thank you.

Have I helped you? If you'd like to assist in the fight against malware, click here Posted Image


The instructions seen in this post have been specifically tailored to this user and the issues they are experiencing with their computer. If you think you have a similar problem, please first read this topic, and then begin your own, new thread. I do not offer private support via Private Message.





0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users