Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Highly Infected


  • This topic is locked This topic is locked
94 replies to this topic

#1 infected mqan

infected mqan

  • Members
  • 148 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:definitely somewhere
  • Local time:11:53 PM

Posted 05 June 2011 - 01:42 PM

Hello, I was reccomended to this site from a good buddy. Anyways, I'll try to explain my situation as best as possible:

I was attempting to fix this pc for a buddy until i came upon some serious problems. First of all I tried uninstalling unused/old programs and that's when I realized the pc was infected; I can't uninstall crucial programs that are unneeded. I tried uninstalling Itunes, some StarWars game, and a few other programs, and everytime I tried to uninstall them I would be greeted by an error message(I can copy and paste the error message if needed). Then I tried to open a browser(ie), and was immediately redirected to some "anti virus" web sites. I then closed the browser and tried to open MBAM, it said MBAM was "infected" and couldn't be opened. I then tried to open my AntiVirus, but wouldn't open, saying it was "infected". I then rebooted in safemode with networking, updated MBAM, and found about 12 trojans and viruses(I successfully removed them). I was then able to restart normally and open a browser with no re-directs. I then downloaded Avira, and scanned; and it found about 20+ viruses, rogue viruses, trojans, and other types of malware. I succesfully quarntined/moved those. I then installed SuperAntiSpyware, and ran that. It detected some 320 infections, some 240 cookies, the others being trojans and just weird infections i've never recognized before; I then successfully removed/quarantined those. But I am still unable to uninstall programs. I installed firefox, but when I tried to open it, I was greeted to an error message. The browser(firefox) just closes immediately when I try to open it, and the only option I have is to "send error report to mozilla"; I can go through these processes again if I need to get the exact error messages I've been recieving. So I don't know to do now. I really wanna figure out what I can do to remove all the infections if it's not too late. Also need to figure out why I can't uninstall programs and get firefox to install properly.


Also Windows Updates aren't working/installing either.
Also Avira keeps randomally popping up saying it has detected a virus. I have the option to press [Remove]. So I pressed [remove] and then the notice that appears in the bottom right that initially notified me about the virus, just closes/minimizes out. It then does a quick little "system scan" which takes about 25 seconds.

I am going to try running Full Scans of MBAM and SuperAntiSpy since I have only ran the quick scans. I will also try running another Avira scan. Maybe in safe mode? I don't know, i'm going to continue doing basic counter measures while I wait for a response.

Thanks,
Infected Maqn- Mitch

Edited by infected mqan, 05 June 2011 - 04:31 PM.


BC AdBot (Login to Remove)

 


#2 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 72,924 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:01:53 AM

Posted 05 June 2011 - 04:19 PM

Hello, Mitch,tes post this
would be greeted by an error message(I can copy and paste the error message if needed


Please download the TDSS Rootkit Removing Tool (TDSSKiller.exe) and save it to your Desktop. <-Important!!!
Be sure to download TDSSKiller.exe (v2.5.0.0) from Kaspersky's website and not TDSSKiller.zip which appears to be an older version 2.3.2.2 of the tool.
  • Double-click on TDSSKiller.exe to run the tool for known TDSS variants.
    Vista/Windows 7 users right-click and select Run As Administrator.
  • If TDSSKiller does not run, try renaming it.
  • To do this, right-click on TDSSKiller.exe, select Rename and give it a random name with the .com file extension (i.e. 123abc.com). If you do not see the file extension, please refer to How to change the file extension.
  • Click the Start Scan button.
  • Do not use the computer during the scan
  • If the scan completes with nothing found, click Close to exit.
  • If malicious objects are found, they will show in the Scan results - Select action for found objects and offer three options.
  • Ensure Cure (default) is selected, then click Continue > Reboot now to finish the cleaning process.
  • A log file named TDSSKiller_version_date_time_log.txt (i.e. TDSSKiller.2.4.0.0_27.07.2010_09.o7.26_log.txt) will be created and saved to the root directory (usually Local Disk C:).
  • Copy and paste the contents of that file in your next reply.


If TDSSKiller does not run, try renaming it. To do this, right-click on TDSSKiller.exe, select Rename and give it a random name with the .com file extension (i.e. 123abc.com). If you do not see the file extension, please refer to these[/color] instructions. In some cases it may be necessary to redownload TDSSKiller and randomly rename it before downloading and saving to the computer.


Next Update both MBAM and SAS and run This then those two.

RKill....

Download and Run RKill
  • Please download RKill by Grinler from one of the 4 links below and save it to your desktop.

    Link 1
    Link 2
    Link 3
    Link 4

  • Before we begin, you should disable your anti-malware softwares you have installed so they do not interfere RKill running as some anti-malware softwares detect RKill as malicious. Please refer to this page if you are not sure how.
  • Double-click on Rkill on your desktop to run it. [color=red](If you are using Windows Vista, please right-click on it and select Run As Administrator)
  • A black screen will appear and then disappear. Please do not worry, that is normal. This means that the tool has been successfully executed.
  • If nothing happens or if the tool does not run, please let me know in your next reply

Do not reboot your computer after running rkill as the malware programs will start again. Or if rebooting is required run it again.

^^

If you get an alert that Rkill is "infected", ignore it. The alert is just a fake warning given by the rogue software which tries to terminate programs that try to remove it. If you see such a warning, leave the warning on the screen and then run Rkill again. By not closing the warning, this sometimes allows you to bypass the malware's attempt to protect itself so that Rkill can perform its routine.


Try this with RKill.... download iExplore.exe or eXplorer.exe, which are renamed copies of rkill.com, and try them instead.

Do not reboot your computer after running rkill as the malware programs will start again.


Post the TDSS,SAS and MBAM logs
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#3 infected mqan

infected mqan
  • Topic Starter

  • Members
  • 148 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:definitely somewhere
  • Local time:11:53 PM

Posted 05 June 2011 - 05:55 PM

Hello boop, thanks for the response! As instructed:

when I try to uninstall Itunes, error message:
(Internal Failure)
Error Number: 0x80040707
Description:
[ OK ]
-------------- ; I then press [ ok ] and ;
iTunes
Access is Denied.
[ OK ]

~~~~~~~~~
when I try to uninstall Star Wars Empire at War Demo, error message:
(Star Wars Empire at War Demo)
>SetupDLL\SetupDLL.cpp (390)
pAPP:Star Wars Empire at War Demo
PVENDOR:LucasArts
PGUID:1E875C1C-7BFF-47D6-8A01-E9C93A244B41
$11.0.0.28844
@windows Xp Service Pack 2 (2600) IE 8.0.6001.18702
[ OK ]
--------; I press [ ok ] and ;
(InstallShield Wizard)
Setup has expereinced an error.
Please do the following:
-Close any running programs
-Empty your temporary folder
-Check your internet connection (internet-based Setups)
Then try to run the Setup again.
Error code: -5001 [ OK ]
~~~~~~~~~~~
I just re-installed Firefox, and now it seems to open and work just fine. ( Maybe when Avira detected those viruses and I clicked {remove} ).

I will now proceed with the following instructions:
Run TDS;post log. Update MBAM&SAS. Run RKill;post log. Quick scan with MBAM&SAS;post logs.:

tds log:
2011/06/05 16:48:52.0500 1244 TDSS rootkit removing tool 2.5.3.0 May 25 2011 07:09:24
2011/06/05 16:48:53.0015 1244 ================================================================================
2011/06/05 16:48:53.0015 1244 SystemInfo:
2011/06/05 16:48:53.0015 1244
2011/06/05 16:48:53.0015 1244 OS Version: 5.1.2600 ServicePack: 2.0
2011/06/05 16:48:53.0015 1244 Product type: Workstation
2011/06/05 16:48:53.0015 1244 ComputerName: JEFFZ
2011/06/05 16:48:53.0015 1244 UserName: Owner
2011/06/05 16:48:53.0015 1244 Windows directory: C:\WINDOWS
2011/06/05 16:48:53.0015 1244 System windows directory: C:\WINDOWS
2011/06/05 16:48:53.0015 1244 Processor architecture: Intel x86
2011/06/05 16:48:53.0015 1244 Number of processors: 1
2011/06/05 16:48:53.0015 1244 Page size: 0x1000
2011/06/05 16:48:53.0015 1244 Boot type: Normal boot
2011/06/05 16:48:53.0015 1244 ================================================================================
2011/06/05 16:48:54.0718 1244 Initialize success
2011/06/05 16:49:04.0984 1632 ================================================================================
2011/06/05 16:49:04.0984 1632 Scan started
2011/06/05 16:49:04.0984 1632 Mode: Manual;
2011/06/05 16:49:04.0984 1632 ================================================================================
2011/06/05 16:49:06.0562 1632 ACPI (a10c7534f7223f4a73a948967d00e69b) C:\WINDOWS\system32\DRIVERS\ACPI.sys
2011/06/05 16:49:06.0796 1632 ACPIEC (9859c0f6936e723e4892d7141b1327d5) C:\WINDOWS\system32\drivers\ACPIEC.sys
2011/06/05 16:49:07.0265 1632 aec (1ee7b434ba961ef845de136224c30fec) C:\WINDOWS\system32\drivers\aec.sys
2011/06/05 16:49:07.0515 1632 AFD (55e6e1c51b6d30e54335750955453702) C:\WINDOWS\System32\drivers\afd.sys
2011/06/05 16:49:07.0750 1632 AFS2K (0ebb674888cbdefd5773341c16dd6a07) C:\WINDOWS\system32\drivers\AFS2K.sys
2011/06/05 16:49:08.0000 1632 agp440 (2c428fa0c3e3a01ed93c9b2a27d8d4bb) C:\WINDOWS\system32\DRIVERS\agp440.sys
2011/06/05 16:49:08.0687 1632 ALCXWDM (8d6c30e515717248e0e52b85fd7ac466) C:\WINDOWS\system32\drivers\ALCXWDM.SYS
2011/06/05 16:49:09.0156 1632 AmdK7 (680ad1c1bb16239e28d8f33a54a7a3c7) C:\WINDOWS\system32\DRIVERS\amdk7.sys
2011/06/05 16:49:09.0671 1632 Arp1394 (f0d692b0bffb46e30eb3cea168bbc49f) C:\WINDOWS\system32\DRIVERS\arp1394.sys
2011/06/05 16:49:10.0390 1632 AsyncMac (02000abf34af4c218c35d257024807d6) C:\WINDOWS\system32\DRIVERS\asyncmac.sys
2011/06/05 16:49:10.0640 1632 atapi (cdfe4411a69c224bd1d11b2da92dac51) C:\WINDOWS\system32\DRIVERS\atapi.sys
2011/06/05 16:49:10.0984 1632 Atmarpc (ec88da854ab7d7752ec8be11a741bb7f) C:\WINDOWS\system32\DRIVERS\atmarpc.sys
2011/06/05 16:49:11.0218 1632 audstub (d9f724aa26c010a217c97606b160ed68) C:\WINDOWS\system32\DRIVERS\audstub.sys
2011/06/05 16:49:11.0437 1632 avgio (0b497c79824f8e1bf22fa6aacd3de3a0) C:\Program Files\Avira\AntiVir Desktop\avgio.sys
2011/06/05 16:49:11.0765 1632 avgntflt (47b879406246ffdced59e18d331a0e7d) C:\WINDOWS\system32\DRIVERS\avgntflt.sys
2011/06/05 16:49:12.0000 1632 avipbb (5fedef54757b34fb611b9ec8fb399364) C:\WINDOWS\system32\DRIVERS\avipbb.sys
2011/06/05 16:49:12.0250 1632 Beep (da1f27d85e0d1525f6621372e7b685e9) C:\WINDOWS\system32\drivers\Beep.sys
2011/06/05 16:49:12.0515 1632 Bridge (e4e6a0922e3d983728c9ad4e8d466954) C:\WINDOWS\system32\DRIVERS\bridge.sys
2011/06/05 16:49:12.0578 1632 BridgeMP (e4e6a0922e3d983728c9ad4e8d466954) C:\WINDOWS\system32\DRIVERS\bridge.sys
2011/06/05 16:49:12.0796 1632 cbidf2k (90a673fc8e12a79afbed2576f6a7aaf9) C:\WINDOWS\system32\drivers\cbidf2k.sys
2011/06/05 16:49:13.0125 1632 Cdaudio (c1b486a7658353d33a10cc15211a873b) C:\WINDOWS\system32\drivers\Cdaudio.sys
2011/06/05 16:49:13.0390 1632 Cdfs (cd7d5152df32b47f4e36f710b35aae02) C:\WINDOWS\system32\drivers\Cdfs.sys
2011/06/05 16:49:13.0625 1632 Cdrom (af9c19b3100fe010496b1a27181fbf72) C:\WINDOWS\system32\DRIVERS\cdrom.sys
2011/06/05 16:49:14.0609 1632 Disk (00ca44e4534865f8a3b64f7c0984bff0) C:\WINDOWS\system32\DRIVERS\disk.sys
2011/06/05 16:49:14.0968 1632 dmboot (c0fbb516e06e243f0cf31f597e7ebf7d) C:\WINDOWS\system32\drivers\dmboot.sys
2011/06/05 16:49:15.0296 1632 dmio (f5e7b358a732d09f4bcf2824b88b9e28) C:\WINDOWS\system32\drivers\dmio.sys
2011/06/05 16:49:15.0546 1632 dmload (e9317282a63ca4d188c0df5e09c6ac5f) C:\WINDOWS\system32\drivers\dmload.sys
2011/06/05 16:49:15.0843 1632 DMusic (a6f881284ac1150e37d9ae47ff601267) C:\WINDOWS\system32\drivers\DMusic.sys
2011/06/05 16:49:16.0156 1632 drmkaud (1ed4dbbae9f5d558dbba4cc450e3eb2e) C:\WINDOWS\system32\drivers\drmkaud.sys
2011/06/05 16:49:16.0437 1632 Fastfat (3117f595e9615e04f05a54fc15a03b20) C:\WINDOWS\system32\drivers\Fastfat.sys
2011/06/05 16:49:16.0703 1632 Fdc (ced2e8396a8838e59d8fd529c680e02c) C:\WINDOWS\system32\DRIVERS\fdc.sys
2011/06/05 16:49:16.0937 1632 Fips (e153ab8a11de5452bcf5ac7652dbf3ed) C:\WINDOWS\system32\drivers\Fips.sys
2011/06/05 16:49:17.0203 1632 Flpydisk (0dd1de43115b93f4d85e889d7a86f548) C:\WINDOWS\system32\DRIVERS\flpydisk.sys
2011/06/05 16:49:17.0500 1632 FltMgr (3d234fb6d6ee875eb009864a299bea29) C:\WINDOWS\system32\drivers\fltmgr.sys
2011/06/05 16:49:17.0734 1632 Fs_Rec (3e1e2bd4f39b0e2b7dc4f4d2bcc2779a) C:\WINDOWS\system32\drivers\Fs_Rec.sys
2011/06/05 16:49:17.0984 1632 Ftdisk (6ac26732762483366c3969c9e4d2259d) C:\WINDOWS\system32\DRIVERS\ftdisk.sys
2011/06/05 16:49:18.0234 1632 GEARAspiWDM (2fb04db459c71f416ee8b05448ca4ac3) C:\WINDOWS\system32\DRIVERS\GEARAspiWDM.sys
2011/06/05 16:49:18.0500 1632 Gpc (c0f1d4a21de5a415df8170616703debf) C:\WINDOWS\system32\DRIVERS\msgpc.sys
2011/06/05 16:49:18.0796 1632 HidUsb (1de6783b918f540149aa69943bdfeba8) C:\WINDOWS\system32\DRIVERS\hidusb.sys
2011/06/05 16:49:19.0125 1632 HPZid412 (d03d10f7ded688fecf50f8fbf1ea9b8a) C:\WINDOWS\system32\DRIVERS\HPZid412.sys
2011/06/05 16:49:19.0390 1632 HPZipr12 (89f41658929393487b6b7d13c8528ce3) C:\WINDOWS\system32\DRIVERS\HPZipr12.sys
2011/06/05 16:49:19.0625 1632 HPZius12 (abcb05ccdbf03000354b9553820e39f8) C:\WINDOWS\system32\DRIVERS\HPZius12.sys
2011/06/05 16:49:19.0921 1632 HTTP (9f8b0f4276f618964fd118be4289b7cd) C:\WINDOWS\system32\Drivers\HTTP.sys
2011/06/05 16:49:20.0359 1632 i8042prt (5502b58eef7486ee6f93f3f164dcb808) C:\WINDOWS\system32\DRIVERS\i8042prt.sys
2011/06/05 16:49:20.0656 1632 ialm (0acebb31989cbf9a5663fe4a33d28d21) C:\WINDOWS\system32\DRIVERS\ialmnt5.sys
2011/06/05 16:49:21.0031 1632 Imapi (f8aa320c6a0409c0380e5d8a99d76ec6) C:\WINDOWS\system32\DRIVERS\imapi.sys
2011/06/05 16:49:21.0421 1632 IntelIde (2d722b2b54ab55b2fa475eb58d7b2aad) C:\WINDOWS\system32\DRIVERS\intelide.sys
2011/06/05 16:49:21.0656 1632 ip6fw (4448006b6bc60e6c027932cfc38d6855) C:\WINDOWS\system32\drivers\ip6fw.sys
2011/06/05 16:49:21.0921 1632 IpFilterDriver (731f22ba402ee4b62748adaf6363c182) C:\WINDOWS\system32\DRIVERS\ipfltdrv.sys
2011/06/05 16:49:22.0156 1632 IpInIp (e1ec7f5da720b640cd8fb8424f1b14bb) C:\WINDOWS\system32\DRIVERS\ipinip.sys
2011/06/05 16:49:22.0406 1632 IpNat (e2168cbc7098ffe963c6f23f472a3593) C:\WINDOWS\system32\DRIVERS\ipnat.sys
2011/06/05 16:49:22.0640 1632 IPSec (64537aa5c003a6afeee1df819062d0d1) C:\WINDOWS\system32\DRIVERS\ipsec.sys
2011/06/05 16:49:22.0875 1632 IRENUM (50708daa1b1cbb7d6ac1cf8f56a24410) C:\WINDOWS\system32\DRIVERS\irenum.sys
2011/06/05 16:49:23.0125 1632 isapnp (e504f706ccb699c2596e9a3da1596e87) C:\WINDOWS\system32\DRIVERS\isapnp.sys
2011/06/05 16:49:23.0421 1632 Kbdclass (ebdee8a2ee5393890a1acee971c4c246) C:\WINDOWS\system32\DRIVERS\kbdclass.sys
2011/06/05 16:49:23.0687 1632 kbdhid (e182fa8e49e8ee41b4adc53093f3c7e6) C:\WINDOWS\system32\DRIVERS\kbdhid.sys
2011/06/05 16:49:23.0984 1632 kmixer (ba5deda4d934e6288c2f66caf58d2562) C:\WINDOWS\system32\drivers\kmixer.sys
2011/06/05 16:49:24.0218 1632 KSecDD (674d3e5a593475915dc6643317192403) C:\WINDOWS\system32\drivers\KSecDD.sys
2011/06/05 16:49:24.0750 1632 ltmodem5 (6f9ed0bf94350f51dd73b96ecf7843c3) C:\WINDOWS\system32\DRIVERS\ltmdmnt.sys
2011/06/05 16:49:25.0125 1632 MBAMProtector (3d2c13377763eeac0ca6fb46f57217ed) C:\WINDOWS\system32\drivers\mbam.sys
2011/06/05 16:49:25.0343 1632 MBAMSwissArmy (b309912717c29fc67e1ba4730a82b6dd) C:\WINDOWS\system32\drivers\mbamswissarmy.sys
2011/06/05 16:49:25.0593 1632 MDC8021X (d7010580bf4e45d5e793a1fe75758c69) C:\WINDOWS\system32\DRIVERS\mdc8021x.sys
2011/06/05 16:49:25.0843 1632 mnmdd (4ae068242760a1fb6e1a44bf4e16afa6) C:\WINDOWS\system32\drivers\mnmdd.sys
2011/06/05 16:49:26.0109 1632 Modem (6fc6f9d7acc36dca9b914565a3aeda05) C:\WINDOWS\system32\drivers\Modem.sys
2011/06/05 16:49:26.0343 1632 Mouclass (34e1f0031153e491910e12551400192c) C:\WINDOWS\system32\DRIVERS\mouclass.sys
2011/06/05 16:49:26.0609 1632 mouhid (b1c303e17fb9d46e87a98e4ba6769685) C:\WINDOWS\system32\DRIVERS\mouhid.sys
2011/06/05 16:49:26.0890 1632 MountMgr (65653f3b4477f3c63e68a9659f85ee2e) C:\WINDOWS\system32\drivers\MountMgr.sys
2011/06/05 16:49:27.0234 1632 MRxDAV (29414447eb5bde2f8397dc965dbb3156) C:\WINDOWS\system32\DRIVERS\mrxdav.sys
2011/06/05 16:49:27.0562 1632 MRxSmb (fb6c89bb3ce282b08bdb1e3c179e1c39) C:\WINDOWS\system32\DRIVERS\mrxsmb.sys
2011/06/05 16:49:27.0875 1632 Msfs (561b3a4333ca2dbdba28b5b956822519) C:\WINDOWS\system32\drivers\Msfs.sys
2011/06/05 16:49:28.0109 1632 MSKSSRV (ae431a8dd3c1d0d0610cdbac16057ad0) C:\WINDOWS\system32\drivers\MSKSSRV.sys
2011/06/05 16:49:28.0328 1632 MSPCLOCK (13e75fef9dfeb08eeded9d0246e1f448) C:\WINDOWS\system32\drivers\MSPCLOCK.sys
2011/06/05 16:49:28.0578 1632 MSPQM (1988a33ff19242576c3d0ef9ce785da7) C:\WINDOWS\system32\drivers\MSPQM.sys
2011/06/05 16:49:28.0812 1632 mssmbios (469541f8bfd2b32659d5d463a6714bce) C:\WINDOWS\system32\DRIVERS\mssmbios.sys
2011/06/05 16:49:29.0062 1632 Mup (82035e0f41c2dd05ae41d27fe6cf7de1) C:\WINDOWS\system32\drivers\Mup.sys
2011/06/05 16:49:29.0296 1632 NDIS (558635d3af1c7546d26067d5d9b6959e) C:\WINDOWS\system32\drivers\NDIS.sys
2011/06/05 16:49:29.0531 1632 NdisTapi (08d43bbdacdf23f34d79e44ed35c1b4c) C:\WINDOWS\system32\DRIVERS\ndistapi.sys
2011/06/05 16:49:29.0781 1632 Ndisuio (34d6cd56409da9a7ed573e1c90a308bf) C:\WINDOWS\system32\DRIVERS\ndisuio.sys
2011/06/05 16:49:30.0031 1632 NdisWan (0b90e255a9490166ab368cd55a529893) C:\WINDOWS\system32\DRIVERS\ndiswan.sys
2011/06/05 16:49:30.0281 1632 NDProxy (59fc3fb44d2669bc144fd87826bb571f) C:\WINDOWS\system32\drivers\NDProxy.sys
2011/06/05 16:49:30.0546 1632 NetBIOS (3a2aca8fc1d7786902ca434998d7ceb4) C:\WINDOWS\system32\DRIVERS\netbios.sys
2011/06/05 16:49:30.0796 1632 NetBT (0c80e410cd2f47134407ee7dd19cc86b) C:\WINDOWS\system32\DRIVERS\netbt.sys
2011/06/05 16:49:31.0093 1632 NIC1394 (5c5c53db4fef16cf87b9911c7e8c6fbc) C:\WINDOWS\system32\DRIVERS\nic1394.sys
2011/06/05 16:49:31.0359 1632 Npfs (4f601bcb8f64ea3ac0994f98fed03f8e) C:\WINDOWS\system32\drivers\Npfs.sys
2011/06/05 16:49:31.0625 1632 Ntfs (19a811ef5f1ed5c926a028ce107ff1af) C:\WINDOWS\system32\drivers\Ntfs.sys
2011/06/05 16:49:31.0968 1632 Null (73c1e1f395918bc2c6dd67af7591a3ad) C:\WINDOWS\system32\drivers\Null.sys
2011/06/05 16:49:32.0328 1632 nv (2b298519edbfcf451d43e0f1e8f1006d) C:\WINDOWS\system32\DRIVERS\nv4_mini.sys
2011/06/05 16:49:32.0890 1632 NwlnkFlt (b305f3fad35083837ef46a0bbce2fc57) C:\WINDOWS\system32\DRIVERS\nwlnkflt.sys
2011/06/05 16:49:33.0140 1632 NwlnkFwd (c99b3415198d1aab7227f2c88fd664b9) C:\WINDOWS\system32\DRIVERS\nwlnkfwd.sys
2011/06/05 16:49:33.0375 1632 ohci1394 (0951db8e5823ea366b0e408d71e1ba2a) C:\WINDOWS\system32\DRIVERS\ohci1394.sys
2011/06/05 16:49:33.0609 1632 Parport (29744eb4ce659dfe3b4122deb45bc478) C:\WINDOWS\system32\DRIVERS\parport.sys
2011/06/05 16:49:33.0843 1632 PartMgr (3334430c29dc338092f79c38ef7b4cd0) C:\WINDOWS\system32\drivers\PartMgr.sys
2011/06/05 16:49:34.0078 1632 ParVdm (70e98b3fd8e963a6a46a2e6247e0bea1) C:\WINDOWS\system32\drivers\ParVdm.sys
2011/06/05 16:49:34.0343 1632 PCI (8086d9979234b603ad5bc2f5d890b234) C:\WINDOWS\system32\DRIVERS\pci.sys
2011/06/05 16:49:34.0796 1632 PCIIde (ccf5f451bb1a5a2a522a76e670000ff0) C:\WINDOWS\System32\DRIVERS\pciide.sys
2011/06/05 16:49:35.0015 1632 Pcmcia (82a087207decec8456fbe8537947d579) C:\WINDOWS\system32\drivers\Pcmcia.sys
2011/06/05 16:49:36.0015 1632 pfc (da86016f0672ada925f589ede715f185) C:\WINDOWS\system32\drivers\pfc.sys
2011/06/05 16:49:36.0281 1632 PptpMiniport (1c5cc65aac0783c344f16353e60b72ac) C:\WINDOWS\system32\DRIVERS\raspptp.sys
2011/06/05 16:49:36.0546 1632 Processor (0d97d88720a4087ec93af7dbb303b30a) C:\WINDOWS\system32\DRIVERS\processr.sys
2011/06/05 16:49:36.0796 1632 Ps2 (9b793a1ffd480155fe9ee5261153f21b) C:\WINDOWS\system32\DRIVERS\PS2.sys
2011/06/05 16:49:37.0062 1632 PSched (48671f327553dcf1d27f6197f622a668) C:\WINDOWS\system32\DRIVERS\psched.sys
2011/06/05 16:49:37.0328 1632 Ptilink (80d317bd1c3dbc5d4fe7b1678c60cadd) C:\WINDOWS\system32\DRIVERS\ptilink.sys
2011/06/05 16:49:38.0140 1632 RasAcd (fe0d99d6f31e4fad8159f690d68ded9c) C:\WINDOWS\system32\DRIVERS\rasacd.sys
2011/06/05 16:49:38.0406 1632 Rasl2tp (98faeb4a4dcf812ba1c6fca4aa3e115c) C:\WINDOWS\system32\DRIVERS\rasl2tp.sys
2011/06/05 16:49:38.0656 1632 RasPppoe (7306eeed8895454cbed4669be9f79faa) C:\WINDOWS\system32\DRIVERS\raspppoe.sys
2011/06/05 16:49:38.0906 1632 Raspti (fdbb1d60066fcfbb7452fd8f9829b242) C:\WINDOWS\system32\DRIVERS\raspti.sys
2011/06/05 16:49:39.0171 1632 Rdbss (03b965b1ca47f6ef60eb5e51cb50e0af) C:\WINDOWS\system32\DRIVERS\rdbss.sys
2011/06/05 16:49:39.0406 1632 RDPCDD (4912d5b403614ce99c28420f75353332) C:\WINDOWS\system32\DRIVERS\RDPCDD.sys
2011/06/05 16:49:39.0671 1632 RDPWD (b54cd38a9ebfbf2b3561426e3fe26f62) C:\WINDOWS\system32\drivers\RDPWD.sys
2011/06/05 16:49:39.0906 1632 redbook (b31b4588e4086d8d84adbf9845c2402b) C:\WINDOWS\system32\DRIVERS\redbook.sys
2011/06/05 16:49:40.0187 1632 Revoflt (8b5b8a11306190c6963d3473f052d3c8) C:\WINDOWS\system32\DRIVERS\revoflt.sys
2011/06/05 16:49:40.0484 1632 rtl8139 (d507c1400284176573224903819ffda3) C:\WINDOWS\system32\DRIVERS\RTL8139.SYS
2011/06/05 16:49:40.0734 1632 S3Psddr (0dbcc071a268e0340a2ba6bdd98bace4) C:\WINDOWS\system32\DRIVERS\s3gnbm.sys
2011/06/05 16:49:40.0953 1632 SASDIFSV (a3281aec37e0720a2bc28034c2df2a56) C:\Program Files\SUPERAntiSpyware\SASDIFSV.SYS
2011/06/05 16:49:40.0984 1632 SASKUTIL (61db0d0756a99506207fd724e3692b25) C:\Program Files\SUPERAntiSpyware\SASKUTIL.SYS
2011/06/05 16:49:41.0218 1632 sbp2port (3e2c3b180872be4120f246d85560b734) C:\WINDOWS\system32\DRIVERS\sbp2port.sys
2011/06/05 16:49:41.0453 1632 Secdrv (90a3935d05b494a5a39d37e71f09a677) C:\WINDOWS\system32\DRIVERS\secdrv.sys
2011/06/05 16:49:41.0687 1632 Serenum (a2d868aeeff612e70e213c451a70cafb) C:\WINDOWS\system32\DRIVERS\serenum.sys
2011/06/05 16:49:41.0953 1632 Serial (cd9404d115a00d249f70a371b46d5a26) C:\WINDOWS\system32\DRIVERS\serial.sys
2011/06/05 16:49:42.0203 1632 Sfloppy (0d13b6df6e9e101013a7afb0ce629fe0) C:\WINDOWS\system32\drivers\Sfloppy.sys
2011/06/05 16:49:42.0546 1632 SISAGP (99d5140d748ba27576a4c883e536e6d6) C:\WINDOWS\system32\DRIVERS\SISAGP.sys
2011/06/05 16:49:42.0984 1632 SPBBCDrv (924e82d6dec26f82036e69b8d3f04216) C:\Program Files\Common Files\Symantec Shared\SPBBC\SPBBCDrv.sys
2011/06/05 16:49:43.0312 1632 splitter (0ce218578fff5f4f7e4201539c45c78f) C:\WINDOWS\system32\drivers\splitter.sys
2011/06/05 16:49:43.0562 1632 sr (e41b6d037d6cd08461470af04500dc24) C:\WINDOWS\system32\DRIVERS\sr.sys
2011/06/05 16:49:43.0828 1632 Srv (7a4f147cc6b133f905f6e65e2f8669fb) C:\WINDOWS\system32\DRIVERS\srv.sys
2011/06/05 16:49:44.0109 1632 ssmdrv (a36ee93698802cd899f98bfd553d8185) C:\WINDOWS\system32\DRIVERS\ssmdrv.sys
2011/06/05 16:49:44.0375 1632 swenum (03c1bae4766e2450219d20b993d6e046) C:\WINDOWS\system32\DRIVERS\swenum.sys
2011/06/05 16:49:44.0656 1632 swmidi (94abc808fc4b6d7d2bbf42b85e25bb4d) C:\WINDOWS\system32\drivers\swmidi.sys
2011/06/05 16:49:45.0343 1632 sysaudio (650ad082d46bac0e64c9c0e0928492fd) C:\WINDOWS\system32\drivers\sysaudio.sys
2011/06/05 16:49:45.0750 1632 Tcpip (2a5554fc5b1e04e131230e3ce035c3f9) C:\WINDOWS\system32\DRIVERS\tcpip.sys
2011/06/05 16:49:46.0062 1632 TDPIPE (38d437cf2d98965f239b0abcd66dcb0f) C:\WINDOWS\system32\drivers\TDPIPE.sys
2011/06/05 16:49:46.0281 1632 TDTCP (ed0580af02502d00ad8c4c066b156be9) C:\WINDOWS\system32\drivers\TDTCP.sys
2011/06/05 16:49:46.0531 1632 TermDD (a540a99c281d933f3d69d55e48727f47) C:\WINDOWS\system32\DRIVERS\termdd.sys
2011/06/05 16:49:47.0000 1632 Udfs (12f70256f140cd7d52c58c7048fde657) C:\WINDOWS\system32\drivers\Udfs.sys
2011/06/05 16:49:47.0359 1632 Update (ced744117e91bdc0beb810f7d8608183) C:\WINDOWS\system32\DRIVERS\update.sys
2011/06/05 16:49:47.0687 1632 usbaudio (45a0d14b26c35497ad93bce7e15c9941) C:\WINDOWS\system32\drivers\usbaudio.sys
2011/06/05 16:49:47.0921 1632 usbccgp (bffd9f120cc63bcbaa3d840f3eef9f79) C:\WINDOWS\system32\DRIVERS\usbccgp.sys
2011/06/05 16:49:48.0187 1632 usbehci (15e993ba2f6946b2bfbbfcd30398621e) C:\WINDOWS\system32\DRIVERS\usbehci.sys
2011/06/05 16:49:48.0437 1632 usbhub (c72f40947f92cea56a8fb532edf025f1) C:\WINDOWS\system32\DRIVERS\usbhub.sys
2011/06/05 16:49:48.0687 1632 usbohci (bdfe799a8531bad8a5a985821fe78760) C:\WINDOWS\system32\DRIVERS\usbohci.sys
2011/06/05 16:49:48.0921 1632 usbprint (a42369b7cd8886cd7c70f33da6fcbcf5) C:\WINDOWS\system32\DRIVERS\usbprint.sys
2011/06/05 16:49:49.0171 1632 usbscan (a6bc71402f4f7dd5b77fd7f4a8ddba85) C:\WINDOWS\system32\DRIVERS\usbscan.sys
2011/06/05 16:49:49.0421 1632 USBSTOR (6cd7b22193718f1d17a47a1cd6d37e75) C:\WINDOWS\system32\DRIVERS\USBSTOR.SYS
2011/06/05 16:49:49.0687 1632 usbuhci (f8fd1400092e23c8f2f31406ef06167b) C:\WINDOWS\system32\DRIVERS\usbuhci.sys
2011/06/05 16:49:49.0937 1632 VgaSave (8a60edd72b4ea5aea8202daf0e427925) C:\WINDOWS\System32\drivers\vga.sys
2011/06/05 16:49:50.0187 1632 viaagp1 (099f10c7b9d4c7a2bf48d4c6eca1e7f1) C:\WINDOWS\system32\DRIVERS\viaagp1.sys
2011/06/05 16:49:50.0406 1632 ViaIde (59cb1338ad3654417bea49636457f65d) C:\WINDOWS\System32\DRIVERS\viaide.sys
2011/06/05 16:49:50.0656 1632 VolSnap (ee4660083deba849ff6c485d944b379b) C:\WINDOWS\system32\drivers\VolSnap.sys
2011/06/05 16:49:50.0921 1632 Wanarp (984ef0b9788abf89974cfed4bfbaacbc) C:\WINDOWS\system32\DRIVERS\wanarp.sys
2011/06/05 16:49:51.0375 1632 wdmaud (efd235ca22b57c81118c1aeb4798f1c1) C:\WINDOWS\system32\drivers\wdmaud.sys
2011/06/05 16:49:51.0656 1632 WlanUIG (01a3d371863250118591fb829eec91ac) C:\WINDOWS\system32\DRIVERS\WlanUIG.sys
2011/06/05 16:49:51.0921 1632 wltwo51 (7f3076461d610561008b57ff16ef2a15) C:\WINDOWS\system32\DRIVERS\wltwo51.sys
2011/06/05 16:49:52.0281 1632 {6080A529-897E-4629-A488-ABA0C29B635E} (f0890825e7a9f4a808190a781c480568) C:\WINDOWS\system32\drivers\ialmsbw.sys
2011/06/05 16:49:52.0546 1632 {D31A0762-0CEB-444e-ACFF-B049A1F6FE91} (8854f5453cce4c5831538e935f92f73b) C:\WINDOWS\system32\drivers\ialmkchw.sys
2011/06/05 16:49:52.0625 1632 MBR (0x1B8) (24bf22b59c30b9b11e1af62cfc3c418e) \Device\Harddisk0\DR0
2011/06/05 16:49:52.0656 1632 ================================================================================
2011/06/05 16:49:52.0656 1632 Scan finished
2011/06/05 16:49:52.0656 1632 ================================================================================
2011/06/05 16:49:52.0687 4004 Detected object count: 0
2011/06/05 16:49:52.0687 4004 Actual detected object count: 0
2011/06/05 16:50:13.0000 4032 Deinitialize success

rkill log:
This log file is located at C:\rkill.log.
Please post this only if requested to by the person helping you.
Otherwise you can close this log when you wish.

Rkill was run on 06/05/2011 at 17:00:23.
Operating System: Microsoft Windows XP


Processes terminated by Rkill or while it was running:




Rkill completed on 06/05/2011 at 17:00:55.

MBAM log:
Malwarebytes' Anti-Malware 1.51.0.1200
www.malwarebytes.org

Database version: 6779

Windows 5.1.2600 Service Pack 2
Internet Explorer 8.0.6001.18702

6/5/2011 5:52:07 PM
mbam-log-2011-06-05 (17-52-07).txt

Scan type: Quick scan
Objects scanned: 273066
Time elapsed: 20 minute(s), 6 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 2
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 3

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\glibjuns (Rogue.AntivirusSuite.Gen) -> Value: glibjuns -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyServer (PUM.Bad.Proxy) -> Value: ProxyServer -> Quarantined and deleted successfully.

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
c:\documents and settings\owner.your-kybtg65gxe\local settings\Temp\7D.tmp (Spyware.Passwords.XGen) -> Quarantined and deleted successfully.
c:\documents and settings\owner.your-kybtg65gxe\local settings\Temp\jar_cache4923883326547161637.tmp (Spyware.Passwords.XGen) -> Quarantined and deleted successfully.
c:\documents and settings\owner.your-kybtg65gxe\local settings\Temp\jar_cache7286140604672578746.tmp (Spyware.Passwords.XGen) -> Quarantined and deleted successfully.


SAS log: SUPERAntiSpyware Scan Log
http://www.superantispyware.com

Generated 06/05/2011 at 05:28 PM

Application Version : 4.53.1000

Core Rules Database Version : 7205
Trace Rules Database Version: 5017

Scan type : Quick Scan
Total Scan Time : 00:25:08

Memory items scanned : 437
Memory threats detected : 0
Registry items scanned : 1549
Registry threats detected : 0
File items scanned : 10643
File threats detected : 3

Adware.Tracking Cookie
C:\Documents and Settings\Owner.YOUR-KYBTG65GXE\Cookies\owner@imrworldwide[2].txt
C:\Documents and Settings\Owner.YOUR-KYBTG65GXE\Cookies\owner@solvemedia[2].txt
C:\Documents and Settings\Owner.YOUR-KYBTG65GXE\Cookies\owner@collective-media[1].txt

#4 infected mqan

infected mqan
  • Topic Starter

  • Members
  • 148 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:definitely somewhere
  • Local time:11:53 PM

Posted 05 June 2011 - 05:56 PM

I just finished the last of your instructions. Both SAS and MBAM found infections. After mbam removed the infections it asked to reboot to complete to process. I chose [reboot later]. You mentioned I shouldn't reboot with Rkill or something. Is it safe to reboot?
I await further instructions.

edit: i'm sure you'll review everything I posted, but did RKill work correctly. I don't know if worked or not. When the black screen appeared, it said something about it stopped. I didn't write down what it said in the black screen, but it dissapeared after a minute then the log was brought up.

Thanks,
Mitch

Edited by infected mqan, 05 June 2011 - 05:59 PM.


#5 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 72,924 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:01:53 AM

Posted 05 June 2011 - 07:53 PM

Everything went well. Yes reboot now. I see you onlt have XP service pack 2 installed ,not 3. This leaves you open to some newer malwares.

Can you install now?


I'd like us to scan your machine with ESET OnlineScan
  • Hold down Control and click on the following link to open ESET OnlineScan in a new window.
    ESET OnlineScan
  • Click the Posted Image button.
  • For alternate browsers only: (Microsoft Internet Explorer users can skip these steps)
    • Click on Posted Image to download the ESET Smart Installer. Save it to your desktop.
    • Double click on the Posted Image icon on your desktop.
  • Check Posted Image
  • Click the Posted Image button.
  • Accept any security warnings from your browser.
  • Under scan settings, check Posted Image and check Remove found threats
  • Click Advanced settings and select the following:
    • Scan potentially unwanted applications
    • Scan for potentially unsafe applications
    • Enable Anti-Stealth technology
  • ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this can take some time.
  • When the scan completes, push Posted Image
  • Push Posted Image, and save the file to your desktop using a unique name, such as ESETScan. Include the contents of this report in your next reply.
  • Push the Posted Image button.
  • Push Posted Image


NOTE: In some instances if no malware is found there will be no log produced.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#6 infected mqan

infected mqan
  • Topic Starter

  • Members
  • 148 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:definitely somewhere
  • Local time:11:53 PM

Posted 05 June 2011 - 07:59 PM

Ok, just to clarify; do you want me to upgrade my xp sp2 , to 3? And I will now follow your instructions.(Restarting now, then will start online scan.)

and: i'm trying to install Windows SP3, do you know which link I need to follow.
(source:http://www.microsoft.com/downloads/en/details.aspx?FamilyID=68c48dad-bc34-40be-8d85-6bb4f56f5110&displaylang=en)

The 3 links I have to chose from are:
Overview of Windows XP Service Pack 3.docx(97KB)

Overview of Windows XP Service Pack 3.pdf(324KB)

Overview of Windows XP Service Pack 3.xps(447KB)

Edited by infected mqan, 05 June 2011 - 08:09 PM.


#7 infected mqan

infected mqan
  • Topic Starter

  • Members
  • 148 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:definitely somewhere
  • Local time:11:53 PM

Posted 05 June 2011 - 08:17 PM

(didn't mean to double post)

Edited by infected mqan, 05 June 2011 - 08:28 PM.


#8 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 72,924 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:01:53 AM

Posted 05 June 2011 - 08:29 PM

Probably easiest and safest thru here
http://support.microsoft.com/kb/322389
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#9 infected mqan

infected mqan
  • Topic Starter

  • Members
  • 148 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:definitely somewhere
  • Local time:11:53 PM

Posted 05 June 2011 - 08:38 PM

Thanks for that link! I have already started the ESET Online Scan.. and at this rate I assume it while take a while. Should I have upgraded sp3 before the ESET or does it matter. Anyways, the eset is on 5%, i'll wait for your reply.

#10 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 72,924 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:01:53 AM

Posted 05 June 2011 - 08:48 PM

Should not matter ,,, usually 2 hours but can be more,depends on ,drive size,compy speed,how much it has to clean etc... I'll look back tomorrow.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#11 infected mqan

infected mqan
  • Topic Starter

  • Members
  • 148 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:definitely somewhere
  • Local time:11:53 PM

Posted 05 June 2011 - 11:58 PM

ESET log:
C:\Documents and Settings\Owner.YOUR-KYBTG65GXE\Local Settings\Application Data\{8EFD7890-ECDA-4331-8160-F11BDA2CF0A6}\chrome\content\overlay.xul probably a variant of Win32/Agent.NVQFFQI trojan cleaned by deleting - quarantined
C:\WINDOWS\system32\wnapp.exe probably a variant of Win32/Agent.DVCWYBK trojan cleaned by deleting - quarantined

I clicked finish. I will now attempt to install sp3; amd await further instructions.

#12 infected mqan

infected mqan
  • Topic Starter

  • Members
  • 148 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:definitely somewhere
  • Local time:11:53 PM

Posted 06 June 2011 - 12:20 AM

Windows Update isn't working properly. It isn't detecting any updates. I found the link to manually install sp3 and once it finished downloading; I tried to open it and was greeted by:
C:\Documents and Settings\Owner.Your-KYBTG65GXE\Desktop\WindowsXP-KB936929-SP3-x86-ENU.exe is not a valid Win32 application. [ OK ]

When I try to do a express Windows Update it says I need to install:
Windows Genuine Advantage Validation Tool (KB892130)
And that isn't installing. I can't figure out how in the world to get SP3, been doing some searching for quite some time and can't seem to resolve it.

edit: after doing research I validated my Windows. Then attempted to use Windows Update. It then detected I needed SP3 and 2 other updates. But SP3 still fails to install.

Edited by infected mqan, 06 June 2011 - 01:01 AM.


#13 infected mqan

infected mqan
  • Topic Starter

  • Members
  • 148 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:definitely somewhere
  • Local time:11:53 PM

Posted 06 June 2011 - 09:44 AM

good morning, before I went to sleep last night I did another Avira virus scan. (Avira kept popping up saying it detected a trojan and virus. Here are my avira logs, it found 12 more troajsn and viruses. They just don't seem to stop.



Avira AntiVir Personal
Report file date: Monday, June 06, 2011 03:14

Scanning for 2720185 virus strains and unwanted programs.

The program is running as an unrestricted full version.
Online services are available:

Licensee : Avira AntiVir Personal - FREE Antivirus
Serial number : 0000149996-ADJIE-0000001
Platform : Windows XP
Windows version : (Service Pack 2) [5.1.2600]
Boot mode : Normally booted
Username : SYSTEM
Computer name : JEFFZ

Version information:
BUILD.DAT : 10.0.0.648 31823 Bytes 4/1/2011 18:36:00
AVSCAN.EXE : 10.0.4.2 442024 Bytes 4/1/2011 22:07:43
AVSCAN.DLL : 10.0.3.0 46440 Bytes 4/1/2011 22:07:57
LUKE.DLL : 10.0.3.2 104296 Bytes 4/1/2011 22:07:53
LUKERES.DLL : 10.0.0.1 12648 Bytes 2/11/2010 05:40:49
VBASE000.VDF : 7.10.0.0 19875328 Bytes 11/6/2009 15:05:36
VBASE001.VDF : 7.11.0.0 13342208 Bytes 12/14/2010 21:15:47
VBASE002.VDF : 7.11.3.0 1950720 Bytes 2/9/2011 21:15:47
VBASE003.VDF : 7.11.5.225 1980416 Bytes 4/7/2011 06:27:07
VBASE004.VDF : 7.11.8.178 2354176 Bytes 5/31/2011 06:27:57
VBASE005.VDF : 7.11.8.179 2048 Bytes 5/31/2011 06:27:57
VBASE006.VDF : 7.11.8.180 2048 Bytes 5/31/2011 06:27:57
VBASE007.VDF : 7.11.8.181 2048 Bytes 5/31/2011 06:27:57
VBASE008.VDF : 7.11.8.182 2048 Bytes 5/31/2011 06:27:58
VBASE009.VDF : 7.11.8.183 2048 Bytes 5/31/2011 06:27:58
VBASE010.VDF : 7.11.8.184 2048 Bytes 5/31/2011 06:27:58
VBASE011.VDF : 7.11.8.185 2048 Bytes 5/31/2011 06:27:58
VBASE012.VDF : 7.11.8.186 2048 Bytes 5/31/2011 06:27:58
VBASE013.VDF : 7.11.8.222 121856 Bytes 6/2/2011 06:28:01
VBASE014.VDF : 7.11.9.7 134656 Bytes 6/4/2011 06:28:04
VBASE015.VDF : 7.11.9.8 2048 Bytes 6/4/2011 06:28:04
VBASE016.VDF : 7.11.9.9 2048 Bytes 6/4/2011 06:28:04
VBASE017.VDF : 7.11.9.10 2048 Bytes 6/4/2011 06:28:05
VBASE018.VDF : 7.11.9.11 2048 Bytes 6/4/2011 06:28:05
VBASE019.VDF : 7.11.9.12 2048 Bytes 6/4/2011 06:28:05
VBASE020.VDF : 7.11.9.13 2048 Bytes 6/4/2011 06:28:05
VBASE021.VDF : 7.11.9.14 2048 Bytes 6/4/2011 06:28:05
VBASE022.VDF : 7.11.9.15 2048 Bytes 6/4/2011 06:28:06
VBASE023.VDF : 7.11.9.16 2048 Bytes 6/4/2011 06:28:06
VBASE024.VDF : 7.11.9.17 2048 Bytes 6/4/2011 06:28:06
VBASE025.VDF : 7.11.9.18 2048 Bytes 6/4/2011 06:28:06
VBASE026.VDF : 7.11.9.19 2048 Bytes 6/4/2011 06:28:06
VBASE027.VDF : 7.11.9.20 2048 Bytes 6/4/2011 06:28:06
VBASE028.VDF : 7.11.9.21 2048 Bytes 6/4/2011 06:28:07
VBASE029.VDF : 7.11.9.22 2048 Bytes 6/4/2011 06:28:07
VBASE030.VDF : 7.11.9.23 2048 Bytes 6/4/2011 06:28:07
VBASE031.VDF : 7.11.9.32 64512 Bytes 6/6/2011 06:33:37
Engineversion : 8.2.5.12
AEVDF.DLL : 8.1.2.1 106868 Bytes 3/28/2011 21:15:27
AESCRIPT.DLL : 8.1.3.65 1606010 Bytes 6/5/2011 06:29:11
AESCN.DLL : 8.1.7.2 127349 Bytes 3/28/2011 21:15:27
AESBX.DLL : 8.2.1.34 323957 Bytes 6/5/2011 06:29:14
AERDL.DLL : 8.1.9.9 639347 Bytes 3/25/2011 17:21:38
AEPACK.DLL : 8.2.6.8 557430 Bytes 6/5/2011 06:29:02
AEOFFICE.DLL : 8.1.1.25 205178 Bytes 6/5/2011 06:28:56
AEHEUR.DLL : 8.1.2.123 3502456 Bytes 6/5/2011 06:28:54
AEHELP.DLL : 8.1.17.2 246135 Bytes 6/5/2011 06:28:21
AEGEN.DLL : 8.1.5.6 401780 Bytes 6/5/2011 06:28:19
AEEMU.DLL : 8.1.3.0 393589 Bytes 3/28/2011 21:15:19
AECORE.DLL : 8.1.21.1 196983 Bytes 6/5/2011 06:28:14
AEBB.DLL : 8.1.1.0 53618 Bytes 3/28/2011 21:15:19
AVWINLL.DLL : 10.0.0.0 19304 Bytes 3/28/2011 21:15:31
AVPREF.DLL : 10.0.0.0 44904 Bytes 4/1/2011 22:07:42
AVREP.DLL : 10.0.0.10 174120 Bytes 6/5/2011 06:29:17
AVREG.DLL : 10.0.3.2 53096 Bytes 4/1/2011 22:07:42
AVSCPLR.DLL : 10.0.4.2 84840 Bytes 4/1/2011 22:07:43
AVARKT.DLL : 10.0.22.6 231784 Bytes 4/1/2011 22:07:38
AVEVTLOG.DLL : 10.0.0.8 203112 Bytes 4/1/2011 22:07:41
SQLITE3.DLL : 3.6.19.0 355688 Bytes 6/17/2010 20:27:22
AVSMTP.DLL : 10.0.0.17 63848 Bytes 3/28/2011 21:15:30
NETNT.DLL : 10.0.0.0 11624 Bytes 3/28/2011 21:15:39
RCIMAGE.DLL : 10.0.0.26 2550120 Bytes 4/1/2011 22:07:58
RCTEXT.DLL : 10.0.58.0 97128 Bytes 3/28/2011 21:15:52

Configuration settings for the scan:
Jobname.............................: Complete system scan
Configuration file..................: c:\program files\avira\antivir desktop\sysscan.avp
Logging.............................: low
Primary action......................: interactive
Secondary action....................: ignore
Scan master boot sector.............: on
Scan boot sector....................: on
Boot sectors........................: C:, D:,
Process scan........................: on
Extended process scan...............: on
Scan registry.......................: on
Search for rootkits.................: on
Integrity checking of system files..: off
Scan all files......................: All files
Scan archives.......................: on
Recursion depth.....................: 20
Smart extensions....................: on
Macro heuristic.....................: on
File heuristic......................: medium

Start of the scan: Monday, June 06, 2011 03:14

Starting search for hidden objects.
HKEY_LOCAL_MACHINE\System\ControlSet001\Services\NtmsSvc\Config\Standalone\drivelist
[NOTE] The registry entry is invisible.

The scan of running processes will be started
Scan process 'msdtc.exe' - '40' Module(s) have been scanned
Scan process 'dllhost.exe' - '59' Module(s) have been scanned
Scan process 'dllhost.exe' - '45' Module(s) have been scanned
Scan process 'vssvc.exe' - '48' Module(s) have been scanned
Scan process 'avscan.exe' - '70' Module(s) have been scanned
Scan process 'avcenter.exe' - '62' Module(s) have been scanned
Scan process 'alg.exe' - '31' Module(s) have been scanned
Scan process 'svchost.exe' - '39' Module(s) have been scanned
Scan process 'avshadow.exe' - '25' Module(s) have been scanned
Scan process 'mbamservice.exe' - '40' Module(s) have been scanned
Scan process 'jqs.exe' - '33' Module(s) have been scanned
Scan process 'GEARSEC.EXE' - '9' Module(s) have been scanned
Scan process 'ccSetMgr.exe' - '36' Module(s) have been scanned
Scan process 'avguard.exe' - '53' Module(s) have been scanned
Scan process 'ctfmon.exe' - '25' Module(s) have been scanned
Scan process 'jusched.exe' - '22' Module(s) have been scanned
Scan process 'avgnt.exe' - '49' Module(s) have been scanned
Scan process 'HPWuSchd2.exe' - '17' Module(s) have been scanned
Scan process 'igfxtray.exe' - '29' Module(s) have been scanned
Scan process 'KBD.EXE' - '46' Module(s) have been scanned
Scan process 'hkcmd.exe' - '29' Module(s) have been scanned
Scan process 'hpsysdrv.exe' - '13' Module(s) have been scanned
Scan process 'svchost.exe' - '34' Module(s) have been scanned
Scan process 'sched.exe' - '43' Module(s) have been scanned
Scan process 'spoolsv.exe' - '54' Module(s) have been scanned
Scan process 'Explorer.EXE' - '92' Module(s) have been scanned
Scan process 'svchost.exe' - '37' Module(s) have been scanned
Scan process 'svchost.exe' - '32' Module(s) have been scanned
Scan process 'svchost.exe' - '161' Module(s) have been scanned
Scan process 'svchost.exe' - '38' Module(s) have been scanned
Scan process 'svchost.exe' - '51' Module(s) have been scanned
Scan process 'lsass.exe' - '58' Module(s) have been scanned
Scan process 'services.exe' - '36' Module(s) have been scanned
Scan process 'winlogon.exe' - '61' Module(s) have been scanned
Scan process 'csrss.exe' - '14' Module(s) have been scanned
Scan process 'smss.exe' - '2' Module(s) have been scanned

Starting master boot sector scan:
Master boot sector HD0
[INFO] No virus was found!

Start scanning boot sectors:
Boot sector 'C:\'
[INFO] No virus was found!
Boot sector 'D:\'
[INFO] No virus was found!

Starting to scan executable files (registry).
The registry was scanned ( '366' files ).


Starting the file scan:

Begin scan in 'C:\' <PRESARIO>
C:\System Volume Information\_restore{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP1055\A0115105.dll
[DETECTION] Is the TR/Crypt.XPACK.Gen Trojan
C:\System Volume Information\_restore{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP1055\A0115106.ini
[DETECTION] Contains recognition pattern of the ADSPY/Sahat.AO.2 adware or spyware
C:\System Volume Information\_restore{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP1055\A0115107.exe
[DETECTION] Is the TR/Dldr.KaTum.3 Trojan
C:\System Volume Information\_restore{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP1055\A0115108.exe
[DETECTION] Is the TR/Dropper.Gen Trojan
C:\System Volume Information\_restore{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP1055\A0115109.exe
[DETECTION] Is the TR/Crypt.XPACK.Gen2 Trojan
C:\System Volume Information\_restore{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP1055\A0115110.exe
[DETECTION] Is the TR/Ag.267520 Trojan
C:\System Volume Information\_restore{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP1055\A0115111.exe
[DETECTION] Is the TR/Downloader.Gen Trojan
C:\System Volume Information\_restore{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP1055\A0115112.ini
[DETECTION] Contains recognition pattern of the ADSPY/IPInsight.A adware or spyware
C:\System Volume Information\_restore{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP1055\A0115113.exe
[DETECTION] Contains recognition pattern of the ADSPY/MemoryWatcher adware or spyware
C:\System Volume Information\_restore{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP1055\A0115114.exe
[DETECTION] Is the TR/Downloader.Gen Trojan
C:\System Volume Information\_restore{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP1055\A0115115.ini
[DETECTION] Contains recognition pattern of the ADSPY/IPInsight.A adware or spyware
C:\System Volume Information\_restore{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP1055\A0115116.exe
[DETECTION] Contains recognition pattern of the ADSPY/MemoryWatcher adware or spyware
Begin scan in 'D:\' <PRESARIO_RP>

Beginning disinfection:
C:\System Volume Information\_restore{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP1055\A0115116.exe
[DETECTION] Contains recognition pattern of the ADSPY/MemoryWatcher adware or spyware
[NOTE] The file was moved to the quarantine directory under the name '45574386.qua'.
C:\System Volume Information\_restore{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP1055\A0115115.ini
[DETECTION] Contains recognition pattern of the ADSPY/IPInsight.A adware or spyware
[NOTE] The file was moved to the quarantine directory under the name '5dc06c21.qua'.
C:\System Volume Information\_restore{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP1055\A0115114.exe
[DETECTION] Is the TR/Downloader.Gen Trojan
[NOTE] The file was moved to the quarantine directory under the name '0f9f36c9.qua'.
C:\System Volume Information\_restore{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP1055\A0115113.exe
[DETECTION] Contains recognition pattern of the ADSPY/MemoryWatcher adware or spyware
[NOTE] The file was moved to the quarantine directory under the name '69a8790b.qua'.
C:\System Volume Information\_restore{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP1055\A0115112.ini
[DETECTION] Contains recognition pattern of the ADSPY/IPInsight.A adware or spyware
[NOTE] The file was moved to the quarantine directory under the name '2c2c5435.qua'.
C:\System Volume Information\_restore{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP1055\A0115111.exe
[DETECTION] Is the TR/Downloader.Gen Trojan
[NOTE] The file was moved to the quarantine directory under the name '53376654.qua'.
C:\System Volume Information\_restore{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP1055\A0115110.exe
[DETECTION] Is the TR/Ag.267520 Trojan
[NOTE] The file was moved to the quarantine directory under the name '1f8f4a1e.qua'.
C:\System Volume Information\_restore{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP1055\A0115109.exe
[DETECTION] Is the TR/Crypt.XPACK.Gen2 Trojan
[NOTE] The file was moved to the quarantine directory under the name '63970a4e.qua'.
C:\System Volume Information\_restore{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP1055\A0115108.exe
[DETECTION] Is the TR/Dropper.Gen Trojan
[NOTE] The file was moved to the quarantine directory under the name '4ecd2500.qua'.
C:\System Volume Information\_restore{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP1055\A0115107.exe
[DETECTION] Is the TR/Dldr.KaTum.3 Trojan
[NOTE] The file was moved to the quarantine directory under the name '57a51e9a.qua'.
C:\System Volume Information\_restore{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP1055\A0115106.ini
[DETECTION] Contains recognition pattern of the ADSPY/Sahat.AO.2 adware or spyware
[NOTE] The file was moved to the quarantine directory under the name '3bf932aa.qua'.
C:\System Volume Information\_restore{FDF7E1BD-3514-4652-A0DC-09D8FF2520E1}\RP1055\A0115105.dll
[DETECTION] Is the TR/Crypt.XPACK.Gen Trojan
[NOTE] The file was moved to the quarantine directory under the name '4a400b3f.qua'.


End of the scan: Monday, June 06, 2011 09:40
Used time: 1:36:24 Hour(s)

The scan has been done completely.

10743 Scanned directories
543868 Files were scanned
12 Viruses and/or unwanted programs were found
0 Files were classified as suspicious
0 files were deleted
0 Viruses and unwanted programs were repaired
12 Files were moved to quarantine
0 Files were renamed
0 Files cannot be scanned
543856 Files not concerned
19690 Archives were scanned
0 Warnings
13 Notes
367159 Objects were scanned with rootkit scan
1 Hidden objects were found

#14 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 72,924 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:01:53 AM

Posted 06 June 2011 - 03:23 PM

Hi most if these are in the System Volume Information or your System Restore points. I usually do this last but looks like we should clear that now.''
Next you should Create a New Restore Point to prevent possible reinfection from an old one. Some of the malware you picked up could have been saved in System Restore. Since this is a protected directory your tools cannot access to delete these files, they sometimes can reinfect your system if you accidentally use an old restore point. Setting a new restore point AFTER cleaning your system will help prevent this and enable your computer to "roll-back" to a clean working state.

The easiest and safest way to do this is:
  • Go to Start > Programs > Accessories > System Tools and click "System Restore".
  • Choose the radio button marked "Create a Restore Point" on the first screen then click "Next". Give the R.P. a name, then click "Create". The new point will be stamped with the current date and time. Keep a log of this so you can find it easily should you need to use System Restore.
  • Then use Disk Cleanup to remove all but the most recently created Restore Point.
  • Go to Start > Run and type: Cleanmgr
  • Click "Ok". Disk Cleanup will scan your files for several minutes, then open.
  • Click the "More Options" tab, then click the "Clean up" button under System Restore.
  • Click Ok. You will be prompted with "Are you sure you want to delete all but the most recent restore point?"
  • Click Yes, then click Ok.
  • Click Yes again when prompted with "Are you sure you want to perform these actions?"
  • Disk Cleanup will remove the files and close automatically.
Vista Users can refer to these links: Create a New Restore Point and Disk Cleanup.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#15 infected mqan

infected mqan
  • Topic Starter

  • Members
  • 148 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:definitely somewhere
  • Local time:11:53 PM

Posted 06 June 2011 - 03:41 PM

Good day to you boop,
I followed your instructions.
-created new System Restore Point
-Disk Clean and removed old restore points

I await further instructions.




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users