Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Infected with Windows XP Recovery w/ TDSS (Google redirect and phantom audio playing)


  • This topic is locked This topic is locked
22 replies to this topic

#1 TJFuchs

TJFuchs

  • Members
  • 11 posts
  • OFFLINE
  •  
  • Local time:01:48 PM

Posted 30 June 2011 - 08:33 PM

My wife accidentally downloaded the Iexplore.exe virus/Windows XP Recovery virus from her spam e-mail. It has hidden all of the desktop shortcuts and redirects any Google search as well as plays random audio from videos or ads at random intervals while the computer is in use. Attempted to use rkill and MalwareBytes to remove it in the past using the help guide but the virus has come back stronger than ever. Help!

.
DDS (Ver_2011-06-23.01) - NTFSx86
Internet Explorer: 6.0.2900.2180 BrowserJavaVersion: 1.6.0_23
Run by Administrator at 18:03:08 on 2011-06-30
Microsoft Windows XP Professional 5.1.2600.2.1252.1.1033.18.1015.486 [GMT -5:00]
.
.
============== Running Processes ===============
.
C:\WINDOWS\system32\svchost -k DcomLaunch
svchost.exe
C:\WINDOWS\System32\svchost.exe -k netsvcs
svchost.exe
svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Common Files\Java\Java Update\jusched.exe
svchost.exe
C:\Program Files\Common Files\Adobe\ARM\1.0\AdobeARM.exe
C:\Program Files\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe
C:\Program Files\iTunes\iTunesHelper.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
C:\Program Files\Bonjour\mDNSResponder.exe
C:\Program Files\Java\jre6\bin\jqs.exe
C:\Program Files\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE
C:\WINDOWS\system32\psapi32.exe
C:\WINDOWS\system32\svchost.exe -k imgsvc
C:\WINDOWS\system32\lzexpand32.exe
C:\Program Files\iPod\bin\iPodService.exe
C:\WINDOWS\System32\svchost.exe -k HTTPFilter
C:\WINDOWS\system32\wscntfy.exe
C:\Program Files\Mozilla Firefox\firefox.exe
C:\Program Files\Mozilla Firefox\plugin-container.exe
C:\Program Files\Common Files\Java\Java Update\jucheck.exe
C:\WINDOWS\explorer.exe
C:\Program Files\Internet Explorer\iexplore.exe
.
============== Pseudo HJT Report ===============
.
uStart Page = www.yahoo.com
uSearch Bar = hxxp://go.compaq.com/1Q00CDT/0409/bl8.asp
mStart Page = hxxp://go.compaq.com/1Q00CDT/0409/bl7.asp
mSearch Bar = hxxp://go.compaq.com/1Q00CDT/0409/bl8.asp
uInternet Settings,ProxyOverride = *.local
BHO: {0d086b0a-a8ec-470d-b67c-d202c0833a13} - c:\windows\system32\avtapi32.dll
BHO: Adobe PDF Link Helper: {18df081c-e8ad-4283-a596-fa578c2ebdc3} - c:\program files\common files\adobe\acrobat\activex\AcroIEHelperShim.dll
BHO: 6c75261a: {c32f6545-efe0-c5bf-043d-e178de1d3db8} - c:\windows\system32\setupapi32.dll
BHO: Java™ Plug-In 2 SSV Helper: {dbc80044-a445-435b-bc74-9c25c1c588a9} - c:\program files\java\jre6\bin\jp2ssv.dll
BHO: JQSIEStartDetectorImpl Class: {e7e6f031-17ce-4c07-bc86-eabfe594f69c} - c:\program files\java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll
uRun: [ctfmon.exe] c:\windows\system32\ctfmon.exe
uRun: [SUPERAntiSpyware] c:\program files\superantispyware\SUPERAntiSpyware.exe
uRun: [dRBAHQLTbF] c:\documents and settings\all users\application data\dRBAHQLTbF.exe
mRun: [SunJavaUpdateSched] "c:\program files\common files\java\java update\jusched.exe"
mRun: [srmclean] c:\cpqs\scom\srmclean.exe
mRun: [SetRefresh] c:\program files\compaq\setrefresh\SetRefresh.exe
mRun: [Adobe Reader Speed Launcher] "c:\program files\adobe\reader 10.0\reader\Reader_sl.exe"
mRun: [Adobe ARM] "c:\program files\common files\adobe\arm\1.0\AdobeARM.exe"
mRun: [QuickTime Task] "c:\program files\quicktime\qttask.exe" -atboottime
mRun: [iTunesHelper] "c:\program files\itunes\iTunesHelper.exe"
mPolicies-system: DisableTaskMgr = 1 (0x1)
IE: E&xport to Microsoft Excel - c:\progra~1\micros~2\office11\EXCEL.EXE/3000
IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe
IE: {92780B25-18CC-41C8-B9BE-3C9C571A8263} - {FF059E31-CC5A-4E2E-BF3B-96E929D65503} - c:\progra~1\micros~2\office11\REFIEBAR.DLL
DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_23-windows-i586.cab
DPF: {CAFEEFAC-0014-0002-0001-ABCDEFFEDCBA} - hxxp://java.sun.com/products/plugin/autodl/jinstall-142-windows-i586.cab
DPF: {CAFEEFAC-0016-0000-0023-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_23-windows-i586.cab
DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_23-windows-i586.cab
TCP: DhcpNameServer = 192.168.1.254
TCP: Interfaces\{403837A9-DF27-4D2D-9BA8-9B9B6E97DA8F} : DhcpNameServer = 192.168.1.254
Notify: !SASWinLogon - c:\program files\superantispyware\SASWINLO.DLL
Notify: igfxcui - igfxsrvc.dll
AppInit_DLLs: c:\windows\system32\setupapi32.dll
SEH: SABShellExecuteHook Class: {5ae067d3-9afb-48e0-853a-ebb7f4a000da} - c:\program files\superantispyware\SASSEH.DLL
Hosts: 127.0.0.1 www.spywareinfo.com
.
================= FIREFOX ===================
.
FF - ProfilePath - c:\documents and settings\administrator\application data\mozilla\firefox\profiles\q9qvqppm.default\
FF - prefs.js: network.proxy.type - 0
FF - plugin: c:\program files\java\jre6\bin\new_plugin\npdeployJava1.dll
FF - Ext: Default: {972ce4c6-7e08-4474-a285-3208198ce6fd} - c:\program files\mozilla firefox\extensions\{972ce4c6-7e08-4474-a285-3208198ce6fd}
FF - Ext: Java Console: {CAFEEFAC-0016-0000-0023-ABCDEFFEDCBA} - c:\program files\mozilla firefox\extensions\{CAFEEFAC-0016-0000-0023-ABCDEFFEDCBA}
FF - Ext: Java Quick Starter: jqs@sun.com - c:\program files\java\jre6\lib\deploy\jqs\ff
FF - Ext: XULRunner: {97EE8841-E63D-459D-AB63-FB35C9DFEEEC} - c:\documents and settings\administrator\local settings\application data\{97EE8841-E63D-459D-AB63-FB35C9DFEEEC}
FF - Ext: XUL Cache: {19d83726-09b1-4563-93d5-99b3873fcda7} - %profile%\extensions\{19d83726-09b1-4563-93d5-99b3873fcda7}
FF - Ext: XUL Cache: {268fdd74-a487-46c8-9f72-60e100c470d5} - %profile%\extensions\{268fdd74-a487-46c8-9f72-60e100c470d5}
.
============= SERVICES / DRIVERS ===============
.
R1 SASDIFSV;SASDIFSV;c:\program files\superantispyware\sasdifsv.sys [2010-2-17 12872]
R1 SASKUTIL;SASKUTIL;c:\program files\superantispyware\SASKUTIL.SYS [2010-5-10 67656]
R2 NetDDEdsdm32;Network DDE DSDM ;c:\windows\system32\psapi32.exe [2011-6-18 764416]
S2 MBAMService;MBAMService;c:\program files\malwarebytes' anti-malware\mbamservice.exe [2011-6-11 366640]
S3 MBAMProtector;MBAMProtector;\??\c:\windows\system32\drivers\mbam.sys --> c:\windows\system32\drivers\mbam.sys [?]
S3 MBAMSwissArmy;MBAMSwissArmy;c:\windows\system32\drivers\mbamswissarmy.sys [2011-6-11 39984]
S3 McComponentHostService;McAfee Security Scan Component Host Service;c:\program files\mcafee security scan\2.0.181\McCHSvc.exe [2010-1-15 227232]
.
=============== Created Last 30 ================
.
2011-06-30 21:58:10 362496 ---ha-w- c:\documents and settings\all users\application data\15589156.exe
2011-06-30 18:25:10 446464 ---ha-w- c:\documents and settings\all users\application data\dRBAHQLTbF.exe
2011-06-24 17:20:03 -------- d--h--w- c:\program files\Spybot - Search & Destroy
2011-06-24 17:20:03 -------- d--h--w- c:\documents and settings\all users\application data\Spybot - Search & Destroy
2011-06-24 17:16:22 -------- d--h--w- c:\program files\CCleaner
2011-06-24 17:15:35 -------- d--h--w- c:\documents and settings\all users\application data\SUPERAntiSpyware.com
2011-06-24 17:15:35 -------- d--h--w- c:\documents and settings\administrator\application data\SUPERAntiSpyware.com
2011-06-24 17:15:21 -------- d--h--w- c:\program files\SUPERAntiSpyware
2011-06-21 22:05:06 0 ---ha-w- c:\documents and settings\administrator\qgcelfoquw.tmp
2011-06-18 05:06:39 764416 ---ha-w- c:\windows\system32\lzexpand32.exe
2011-06-18 05:06:36 764416 ---ha-w- c:\windows\system32\psapi32.exe
2011-06-18 05:06:34 349696 ---ha-w- c:\windows\system32\avtapi32.dll
2011-06-18 05:06:29 764416 ---ha-w- c:\documents and settings\administrator\0.44235668642221726.exe
2011-06-12 04:58:34 175616 ---ha-w- c:\windows\system32\setupapi32.dll
2011-06-11 06:02:12 -------- d-s---w- c:\documents and settings\administrator\UserData
2011-06-11 05:43:58 -------- d--h--w- c:\documents and settings\administrator\application data\AVG10
2011-06-11 05:41:34 -------- d--h--w- c:\documents and settings\all users\application data\Common Files
2011-06-11 05:29:32 -------- d--h--w- c:\documents and settings\all users\application data\AVG10
2011-06-11 05:26:27 -------- d--h--w- c:\program files\AVG
2011-06-11 05:23:59 -------- d--h--w- c:\documents and settings\administrator\application data\Malwarebytes
2011-06-11 05:23:27 39984 ---ha-w- c:\windows\system32\drivers\mbamswissarmy.sys
2011-06-11 05:23:25 -------- d--h--w- c:\documents and settings\all users\application data\Malwarebytes
2011-06-11 05:23:22 -------- d--h--w- c:\program files\Malwarebytes' Anti-Malware
2011-06-11 05:20:03 -------- d--h--w- c:\documents and settings\all users\application data\MFAData
2011-06-11 03:32:19 4224 ---ha-w- c:\windows\system32\beep.sys
.
==================== Find3M ====================
.
2011-05-18 17:42:53 0 ---ha-w- c:\windows\Otecejinur.bin
.
============= FINISH: 18:03:44.90 ===============

Attached Files



BC AdBot (Login to Remove)

 


#2 RPMcMurphy

RPMcMurphy

    Bleeping *^#@%~


  • Malware Response Team
  • 3,970 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:03:48 PM

Posted 30 June 2011 - 10:10 PM

Hello and welcome. Please follow these guidelines while we work on your PC:
  • Malware removal is a sometimes lengthy and tedious process. Please stick with the thread until I’ve given you the “All clear.” Absence of symptoms does not mean your machine is clean!
  • Please do not run any scans or install/uninstall any applications without being directed to do so.
  • Please note that the forum is very busy and if I don't hear from you within five days this thread will be closed.
Posted Image Download ComboFix from one of the following locations:
Link 1
Link 2

VERY IMPORTANT !!! Save ComboFix.exe to your Desktop

* IMPORTANT - Disable your AntiVirus and AntiSpyware applications, usually via a right click on the System Tray icon. They may otherwise interfere with our tools. If you have difficulty properly disabling your protective programs, refer to this link
  • Double click on ComboFix.exe & follow the prompts.
As part of it's process, ComboFix will check to see if the Microsoft Windows Recovery Console is installed. With malware infections being as they are today, it's strongly recommended to have this pre-installed on your machine before doing any malware removal. It will allow you to boot up into a special recovery/repair mode that will allow us to more easily help you should your computer have a problem after an attempted removal of malware.

  • Follow the prompts to allow ComboFix to download and install the Microsoft Windows Recovery Console, and when prompted, agree to the End-User License Agreement to install the Microsoft Windows Recovery Console.
**Please note: If the Microsoft Windows Recovery Console is already installed, ComboFix will continue it's malware removal procedures.

Posted Image

  • Once the Microsoft Windows Recovery Console is installed using ComboFix, you should see the following message:

Posted Image

  • Click on Yes, to continue scanning for malware.
When finished, it shall produce a log for you. Please include the C:\ComboFix.txt in your next reply.
Notes:
1. Do not mouse-click Combofix's window while it is running. That may cause it to stall.
2. Do not "re-run" Combofix. If you have a problem, reply back for further instructions.


Please include the following in your next post:
  • ComboFix log

Threads are closed after 5 days of inactivity.

ASAP & UNITE Member


The help you receive here is free. If you wish to show your appreciation, then you may btn_donate_SM.gif


#3 TJFuchs

TJFuchs
  • Topic Starter

  • Members
  • 11 posts
  • OFFLINE
  •  
  • Local time:01:48 PM

Posted 01 July 2011 - 01:45 AM

Thanks for arriving so quickly to help! Here's the ComboFix log:

ComboFix 11-06-30.03 - Administrator 07/01/2011 1:33.1.1 - x86
Microsoft Windows XP Professional 5.1.2600.2.1252.1.1033.18.1015.781 [GMT -5:00]
Running from: c:\documents and settings\Administrator\Desktop\ComboFix.exe
.
.
((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.
.
c:\documents and settings\Administrator\0.44235668642221726.exe
c:\documents and settings\Administrator\Application Data\Mozilla\Firefox\Profiles\q9qvqppm.default\extensions\{19d83726-09b1-4563-93d5-99b3873fcda7}
c:\documents and settings\Administrator\Application Data\Mozilla\Firefox\Profiles\q9qvqppm.default\extensions\{19d83726-09b1-4563-93d5-99b3873fcda7}\chrome.manifest
c:\documents and settings\Administrator\Application Data\Mozilla\Firefox\Profiles\q9qvqppm.default\extensions\{19d83726-09b1-4563-93d5-99b3873fcda7}\chrome\xulcache.jar
c:\documents and settings\Administrator\Application Data\Mozilla\Firefox\Profiles\q9qvqppm.default\extensions\{19d83726-09b1-4563-93d5-99b3873fcda7}\defaults\preferences\xulcache.js
c:\documents and settings\Administrator\Application Data\Mozilla\Firefox\Profiles\q9qvqppm.default\extensions\{19d83726-09b1-4563-93d5-99b3873fcda7}\install.rdf
c:\documents and settings\Administrator\Application Data\Mozilla\Firefox\Profiles\q9qvqppm.default\extensions\{268fdd74-a487-46c8-9f72-60e100c470d5}
c:\documents and settings\Administrator\Application Data\Mozilla\Firefox\Profiles\q9qvqppm.default\extensions\{268fdd74-a487-46c8-9f72-60e100c470d5}\chrome.manifest
c:\documents and settings\Administrator\Application Data\Mozilla\Firefox\Profiles\q9qvqppm.default\extensions\{268fdd74-a487-46c8-9f72-60e100c470d5}\chrome\xulcache.jar
c:\documents and settings\Administrator\Application Data\Mozilla\Firefox\Profiles\q9qvqppm.default\extensions\{268fdd74-a487-46c8-9f72-60e100c470d5}\defaults\preferences\xulcache.js
c:\documents and settings\Administrator\Application Data\Mozilla\Firefox\Profiles\q9qvqppm.default\extensions\{268fdd74-a487-46c8-9f72-60e100c470d5}\install.rdf
c:\documents and settings\Administrator\Desktop\Windows XP Repair.lnk
c:\documents and settings\Administrator\Desktop\Windows XP Restore.lnk
c:\documents and settings\Administrator\Local Settings\Application Data\{97EE8841-E63D-459D-AB63-FB35C9DFEEEC}
c:\documents and settings\Administrator\Local Settings\Application Data\{97EE8841-E63D-459D-AB63-FB35C9DFEEEC}\chrome.manifest
c:\documents and settings\Administrator\Local Settings\Application Data\{97EE8841-E63D-459D-AB63-FB35C9DFEEEC}\chrome\content\_cfg.js
c:\documents and settings\Administrator\Local Settings\Application Data\{97EE8841-E63D-459D-AB63-FB35C9DFEEEC}\chrome\content\overlay.xul
c:\documents and settings\Administrator\Local Settings\Application Data\{97EE8841-E63D-459D-AB63-FB35C9DFEEEC}\install.rdf
c:\documents and settings\Administrator\My Documents\Start Menu\Programs\Windows XP Repair
c:\documents and settings\Administrator\My Documents\Start Menu\Programs\Windows XP Repair\Uninstall Windows XP Repair.lnk
c:\documents and settings\Administrator\My Documents\Start Menu\Programs\Windows XP Repair\Windows XP Repair.lnk
c:\documents and settings\Administrator\My Documents\Start Menu\Programs\Windows XP Restore
c:\documents and settings\Administrator\My Documents\Start Menu\Programs\Windows XP Restore\Uninstall Windows XP Restore.lnk
c:\documents and settings\Administrator\My Documents\Start Menu\Programs\Windows XP Restore\Windows XP Restore.lnk
c:\documents and settings\All Users\Application Data\15589156.exe
c:\documents and settings\All Users\Application Data\dRBAHQLTbF.exe
c:\documents and settings\LocalService\Application Data\020000003c8d88611270C.manifest
c:\documents and settings\LocalService\Application Data\020000003c8d88611270O.manifest
c:\documents and settings\LocalService\Application Data\020000003c8d88611270P.manifest
c:\documents and settings\LocalService\Application Data\020000003c8d88611270S.manifest
.
Infected copy of c:\windows\system32\drivers\volsnap.sys was found and disinfected
Restored copy from - Kitty had a snack :P
.
((((((((((((((((((((((((( Files Created from 2011-06-01 to 2011-07-01 )))))))))))))))))))))))))))))))
.
.
2011-06-24 17:20 . 2011-06-28 19:59 -------- d--h--w- c:\documents and settings\All Users\Application Data\Spybot - Search & Destroy
2011-06-24 17:20 . 2011-06-24 17:20 -------- d--h--w- c:\program files\Spybot - Search & Destroy
2011-06-24 17:16 . 2011-06-24 17:16 -------- d--h--w- c:\program files\CCleaner
2011-06-24 17:15 . 2011-06-24 17:15 -------- d--h--w- c:\documents and settings\All Users\Application Data\SUPERAntiSpyware.com
2011-06-24 17:15 . 2011-06-24 17:15 -------- d--h--w- c:\documents and settings\Administrator\Application Data\SUPERAntiSpyware.com
2011-06-24 17:15 . 2011-06-24 17:15 -------- d--h--w- c:\program files\SUPERAntiSpyware
2011-06-21 22:05 . 2011-06-21 22:05 0 ---ha-w- c:\documents and settings\Administrator\qgcelfoquw.tmp
2011-06-18 05:06 . 2011-06-18 05:06 764416 ---ha-w- c:\windows\system32\lzexpand32.exe
2011-06-18 05:06 . 2011-06-18 05:06 764416 ---ha-w- c:\windows\system32\psapi32.exe
2011-06-18 05:06 . 2011-06-18 05:06 349696 ---ha-w- c:\windows\system32\avtapi32.dll
2011-06-12 04:58 . 2011-06-12 04:58 175616 ---ha-w- c:\windows\system32\setupapi32.dll
2011-06-11 06:02 . 2011-06-25 20:49 -------- d-s---w- c:\documents and settings\Administrator\UserData
2011-06-11 05:43 . 2011-06-11 05:43 -------- d--h--w- c:\documents and settings\Administrator\Application Data\AVG10
2011-06-11 05:41 . 2011-06-11 05:41 -------- d--h--w- c:\documents and settings\All Users\Application Data\Common Files
2011-06-11 05:29 . 2011-06-11 15:05 -------- d--h--w- c:\documents and settings\All Users\Application Data\AVG10
2011-06-11 05:26 . 2011-06-11 05:26 -------- d--h--w- c:\program files\AVG
2011-06-11 05:23 . 2011-06-11 05:23 -------- d--h--w- c:\documents and settings\Administrator\Application Data\Malwarebytes
2011-06-11 05:23 . 2011-05-29 14:11 39984 ---ha-w- c:\windows\system32\drivers\mbamswissarmy.sys
2011-06-11 05:23 . 2011-06-11 05:23 -------- d--h--w- c:\documents and settings\All Users\Application Data\Malwarebytes
2011-06-11 05:23 . 2011-06-11 05:23 -------- d--h--w- c:\program files\Malwarebytes' Anti-Malware
2011-06-11 05:20 . 2011-06-11 06:14 -------- d--h--w- c:\documents and settings\All Users\Application Data\MFAData
2011-06-11 03:32 . 2004-08-04 12:00 4224 ---ha-w- c:\windows\system32\beep.sys
.
.
.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
.
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4
.
[HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{0D086B0A-A8EC-470D-B67C-D202C0833A13}]
2011-06-18 05:06 349696 ---ha-w- c:\windows\system32\avtapi32.dll
.
[HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{C32F6545-EFE0-C5BF-043D-E178DE1D3DB8}]
2011-06-12 04:58 175616 ---ha-w- c:\windows\system32\setupapi32.dll
.
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"SUPERAntiSpyware"="c:\program files\SUPERAntiSpyware\SUPERAntiSpyware.exe" [2011-06-10 2424192]
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"SunJavaUpdateSched"="c:\program files\Common Files\Java\Java Update\jusched.exe" [2010-05-14 248552]
"srmclean"="c:\cpqs\Scom\srmclean.exe" [2001-07-24 36864]
"SetRefresh"="c:\program files\Compaq\SetRefresh\SetRefresh.exe" [2003-11-06 524800]
"Adobe Reader Speed Launcher"="c:\program files\Adobe\Reader 10.0\Reader\Reader_sl.exe" [2011-01-30 35736]
"Adobe ARM"="c:\program files\Common Files\Adobe\ARM\1.0\AdobeARM.exe" [2011-03-30 937920]
"QuickTime Task"="c:\program files\QuickTime\qttask.exe" [2010-11-29 421888]
"iTunesHelper"="c:\program files\iTunes\iTunesHelper.exe" [2011-03-02 421160]
.
[hkey_local_machine\software\microsoft\windows\currentversion\explorer\ShellExecuteHooks]
"{5AE067D3-9AFB-48E0-853A-EBB7F4A000DA}"= "c:\program files\SUPERAntiSpyware\SASSEH.DLL" [2008-05-13 77824]
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\!SASWinLogon]
2009-09-03 22:21 548352 ---ha-w- c:\program files\SUPERAntiSpyware\SASWINLO.DLL
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\windows]
"AppInit_DLLs"=c:\windows\system32\setupapi32.dll
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\MSIServer]
@="Service"
.
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]
"DisableNotifications"= 1 (0x1)
.
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=
"c:\\Program Files\\Bonjour\\mDNSResponder.exe"=
"c:\\Program Files\\iTunes\\iTunes.exe"=
"c:\\WINDOWS\\system32\\psapi32.exe"=
.
R1 SASDIFSV;SASDIFSV;c:\program files\SUPERAntiSpyware\sasdifsv.sys [2/17/2010 1:25 PM 12872]
R1 SASKUTIL;SASKUTIL;c:\program files\SUPERAntiSpyware\SASKUTIL.SYS [5/10/2010 1:41 PM 67656]
R2 NetDDEdsdm32;Network DDE DSDM ;c:\windows\system32\psapi32.exe [6/18/2011 12:06 AM 764416]
S2 MBAMService;MBAMService;c:\program files\Malwarebytes' Anti-Malware\mbamservice.exe [6/11/2011 12:23 AM 366640]
S3 MBAMProtector;MBAMProtector;\??\c:\windows\system32\drivers\mbam.sys --> c:\windows\system32\drivers\mbam.sys [?]
S3 MBAMSwissArmy;MBAMSwissArmy;c:\windows\system32\drivers\mbamswissarmy.sys [6/11/2011 12:23 AM 39984]
S3 McComponentHostService;McAfee Security Scan Component Host Service;c:\program files\McAfee Security Scan\2.0.181\McCHSvc.exe [1/15/2010 7:49 AM 227232]
.
Contents of the 'Scheduled Tasks' folder
.
2011-06-25 c:\windows\Tasks\AppleSoftwareUpdate.job
- c:\program files\Apple Software Update\SoftwareUpdate.exe [2009-10-22 17:50]
.
2011-07-01 c:\windows\Tasks\WGASetup.job
- c:\windows\system32\KB905474\wgasetup.exe [2010-11-21 04:18]
.
.
------- Supplementary Scan -------
.
uStart Page = www.yahoo.com
mStart Page = hxxp://go.compaq.com/1Q00CDT/0409/bl7.asp
mSearch Bar = hxxp://go.compaq.com/1Q00CDT/0409/bl8.asp
uInternet Settings,ProxyOverride = *.local
IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~2\OFFICE11\EXCEL.EXE/3000
TCP: DhcpNameServer = 192.168.1.254
FF - ProfilePath - c:\documents and settings\Administrator\Application Data\Mozilla\Firefox\Profiles\q9qvqppm.default\
FF - prefs.js: network.proxy.type - 0
FF - Ext: Default: {972ce4c6-7e08-4474-a285-3208198ce6fd} - c:\program files\Mozilla Firefox\extensions\{972ce4c6-7e08-4474-a285-3208198ce6fd}
FF - Ext: Java Console: {CAFEEFAC-0016-0000-0023-ABCDEFFEDCBA} - c:\program files\Mozilla Firefox\extensions\{CAFEEFAC-0016-0000-0023-ABCDEFFEDCBA}
FF - Ext: Java Quick Starter: jqs@sun.com - c:\program files\Java\jre6\lib\deploy\jqs\ff
.
- - - - ORPHANS REMOVED - - - -
.
HKCU-Run-dRBAHQLTbF - c:\documents and settings\All Users\Application Data\dRBAHQLTbF.exe
.
.
.
**************************************************************************
.
catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2011-07-01 01:39
Windows 5.1.2600 Service Pack 2 NTFS
.
scanning hidden processes ...
.
scanning hidden autostart entries ...
.
scanning hidden files ...
.
scan completed successfully
hidden files: 0
.
**************************************************************************
.
[HKEY_LOCAL_MACHINE\System\ControlSet002\Services\2143E8]
"imagepath"="\??\c:\windows\TEMP\2143E8.tmp"
.
--------------------- DLLs Loaded Under Running Processes ---------------------
.
- - - - - - - > 'winlogon.exe'(652)
c:\program files\SUPERAntiSpyware\SASWINLO.DLL
.
Completion time: 2011-07-01 01:43:43
ComboFix-quarantined-files.txt 2011-07-01 06:43
.
Pre-Run: 2,267,574,272 bytes free
Post-Run: 3,022,159,872 bytes free
.
WindowsXP-KB310994-SP2-Pro-BootDisk-ENU.exe
[boot loader]
timeout=2
default=multi(0)disk(0)rdisk(0)partition(1)\WINDOWS
[operating systems]
c:\cmdcons\BOOTSECT.DAT="Microsoft Windows Recovery Console" /cmdcons
UnsupportedDebug="do not select this" /debug
multi(0)disk(0)rdisk(0)partition(1)\WINDOWS="Microsoft Windows XP Professional" /noexecute=optin /fastdetect
.
- - End Of File - - 282116984087C326EA80D6997A8938DC

#4 RPMcMurphy

RPMcMurphy

    Bleeping *^#@%~


  • Malware Response Team
  • 3,970 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:03:48 PM

Posted 01 July 2011 - 10:10 PM

TJFuchs:

Posted Image Open Notepad Go to Start> All Programs> Accessories> Notepad ( this will only work with Notepad ) and copy all the text inside the Codebox by highlighting it all and pressing CTRL C on your keyboard, then paste it into Notepad, make sure there is no space before and above File::

http://www.bleepingcomputer.com/forums/topic407039.html
Collect::
c:\documents and settings\Administrator\qgcelfoquw.tmp
c:\windows\system32\lzexpand32.exe
c:\windows\system32\psapi32.exe
c:\windows\system32\avtapi32.dll
c:\windows\system32\setupapi32.dll
Driver::
NetDDEdsdm32
Registry::
[-HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{0d086b0a-a8ec-470d-b67c-d202c0833a13}]
[-HKEY_CLASSES_ROOT\CLSID\{0d086b0a-a8ec-470d-b67c-d202c0833a13}]
[-HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{c32f6545-efe0-c5bf-043d-e178de1d3db8}]
[-HKEY_CLASSES_ROOT\CLSID\{c32f6545-efe0-c5bf-043d-e178de1d3db8}]
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"c:\\WINDOWS\\system32\\psapi32.exe"=-

Save this as CFScript to your desktop.

Then disable your security programs and drag the CFScript into ComboFix.exe as you see in the screenshot below.

Posted Image


This will start ComboFix again. After reboot, (in case it asks to reboot), post the contents of Combofix.txt in your next reply.

Posted Image You have this program installed, Malwarebytes' Anti-Malware (MBAM). Please update it and run a scan.

Open MBAM
  • Click the Update tab
  • Click Check for Updates
  • If an update is found, it will download and install the latest version.
  • The program will close to update and reopen.
  • Once the program has loaded, select "Perform Quick Scan", then click Scan.
  • The scan may take some time to finish,so please be patient.
  • When the scan is complete, click OK, then Show Results to view the results.
  • Uncheck any entries from C:\System Volume Information or C:\Qoobox
  • Make sure that everything else is checked, and click Remove Selected.
  • When disinfection is completed, a log will open in Notepad and you may be prompted to Restart.(See Extra Note)
  • The log is automatically saved by MBAM and can be viewed by clicking the Logs tab in MBAM.
  • Copy&Paste the entire report in your next reply.
Extra Note:
If MBAM encounters a file that is difficult to remove,you will be presented with 1 of 2 prompts,click OK to either and let MBAM proceed with the disinfection process,if asked to restart the computer,please do so immediately.

Please include the following in your next post:
  • ComboFix log
  • MBAM log

Threads are closed after 5 days of inactivity.

ASAP & UNITE Member


The help you receive here is free. If you wish to show your appreciation, then you may btn_donate_SM.gif


#5 TJFuchs

TJFuchs
  • Topic Starter

  • Members
  • 11 posts
  • OFFLINE
  •  
  • Local time:01:48 PM

Posted 02 July 2011 - 12:47 AM

ComboFix 11-07-01.01 - Administrator 07/01/2011 23:54:58.2.1 - x86
Microsoft Windows XP Professional 5.1.2600.2.1252.1.1033.18.1015.734 [GMT -5:00]
Running from: C:\Documents and Settings\Administrator\Desktop\ComboFix.exe
Command switches used :: C:\Documents and Settings\Administrator\Desktop\CFScript.txt

file zipped: c:\documents and settings\Administrator\qgcelfoquw.tmp
file zipped: c:\windows\system32\avtapi32.dll
file zipped: c:\windows\system32\lzexpand32.exe
file zipped: c:\windows\system32\psapi32.exe
file zipped: c:\windows\system32\setupapi32.dll


((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))


c:\documents and settings\Administrator\qgcelfoquw.tmp
C:\Documents and Settings\LocalService\Application Data\020000003c8d88611270C.manifest
C:\Documents and Settings\LocalService\Application Data\020000003c8d88611270O.manifest
C:\Documents and Settings\LocalService\Application Data\020000003c8d88611270P.manifest
C:\Documents and Settings\LocalService\Application Data\020000003c8d88611270S.manifest
c:\windows\system32\avtapi32.dll
c:\windows\system32\lzexpand32.exe
c:\windows\system32\psapi32.exe
c:\windows\system32\setupapi32.dll


((((((((((((((((((((((((((((((((((((((( Drivers/Services )))))))))))))))))))))))))))))))))))))))))))))))))
.

-------\Legacy_NETDDEDSDM32
-------\Service_NetDDEdsdm32


((((((((((((((((((((((((( Files Created from 2011-06-02 to 2011-07-02 )))))))))))))))))))))))))))))))


2011-07-02 04:59:17 . 2011-06-18 05:06:33 764416 ----a-w- C:\WINDOWS\system32\avtapi32.exe
2011-06-24 17:20:03 . 2011-06-28 19:59:04 -------- d-----w- C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy
2011-06-24 17:20:03 . 2011-06-24 17:20:09 -------- d-----w- C:\Program Files\Spybot - Search & Destroy
2011-06-24 17:16:22 . 2011-06-24 17:16:27 -------- d-----w- C:\Program Files\CCleaner
2011-06-24 17:15:35 . 2011-06-24 17:15:35 -------- d-----w- C:\Documents and Settings\All Users\Application Data\SUPERAntiSpyware.com
2011-06-24 17:15:35 . 2011-06-24 17:15:35 -------- d-----w- C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com
2011-06-24 17:15:21 . 2011-06-24 17:15:54 -------- d-----w- C:\Program Files\SUPERAntiSpyware
2011-06-11 06:02:12 . 2011-06-25 20:49:02 -------- d-s---w- C:\Documents and Settings\Administrator\UserData
2011-06-11 05:43:58 . 2011-06-11 05:43:58 -------- d-----w- C:\Documents and Settings\Administrator\Application Data\AVG10
2011-06-11 05:41:34 . 2011-06-11 05:41:34 -------- d-----w- C:\Documents and Settings\All Users\Application Data\Common Files
2011-06-11 05:29:32 . 2011-06-11 15:05:31 -------- d-----w- C:\Documents and Settings\All Users\Application Data\AVG10
2011-06-11 05:26:27 . 2011-06-11 05:26:27 -------- d-----w- C:\Program Files\AVG
2011-06-11 05:23:59 . 2011-06-11 05:23:59 -------- d-----w- C:\Documents and Settings\Administrator\Application Data\Malwarebytes
2011-06-11 05:23:27 . 2011-05-29 14:11:30 39984 ----a-w- C:\WINDOWS\system32\drivers\mbamswissarmy.sys
2011-06-11 05:23:25 . 2011-06-11 05:23:25 -------- d-----w- C:\Documents and Settings\All Users\Application Data\Malwarebytes
2011-06-11 05:23:22 . 2011-06-11 05:23:29 -------- d-----w- C:\Program Files\Malwarebytes' Anti-Malware
2011-06-11 05:20:03 . 2011-06-11 06:14:06 -------- d-----w- C:\Documents and Settings\All Users\Application Data\MFAData
2011-06-11 03:32:19 . 2004-08-04 12:00:00 4224 ----a-w- C:\WINDOWS\system32\beep.sys
.


(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))



((((((((((((((((((((((((((((( SnapShot@2011-07-01_06.39.51 )))))))))))))))))))))))))))))))))))))))))

+ 2011-07-02 05:02:01 . 2011-07-02 05:02:01 16384 C:\WINDOWS\Temp\Perflib_Perfdata_1bc.dat
+ 2010-12-11 05:35:19 . 2011-07-01 15:15:26 47716296 C:\WINDOWS\system32\MRT.exe

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))


*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"SUPERAntiSpyware"="C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe" [2011-06-10 16:26:00 2424192]
"ctfmon.exe"="C:\WINDOWS\system32\ctfmon.exe" [2004-08-04 07:56:50 15360]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"SunJavaUpdateSched"="C:\Program Files\Common Files\Java\Java Update\jusched.exe" [2010-05-14 17:44:46 248552]
"srmclean"="C:\Cpqs\Scom\srmclean.exe" [2001-07-24 21:34:25 36864]
"SetRefresh"="C:\Program Files\Compaq\SetRefresh\SetRefresh.exe" [2003-11-06 15:22:30 524800]
"Adobe Reader Speed Launcher"="C:\Program Files\Adobe\Reader 10.0\Reader\Reader_sl.exe" [2011-01-30 15:45:14 35736]
"Adobe ARM"="C:\Program Files\Common Files\Adobe\ARM\1.0\AdobeARM.exe" [2011-03-30 17:29:02 937920]
"QuickTime Task"="C:\Program Files\QuickTime\qttask.exe" [2010-11-29 23:38:18 421888]
"iTunesHelper"="C:\Program Files\iTunes\iTunesHelper.exe" [2011-03-02 03:45:30 421160]

[hkey_local_machine\software\microsoft\windows\currentversion\explorer\ShellExecuteHooks]
"{5AE067D3-9AFB-48E0-853A-EBB7F4A000DA}"= "C:\Program Files\SUPERAntiSpyware\SASSEH.DLL" [2008-05-13 17:13:36 77824]

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\!SASWinLogon]
2009-09-03 22:21:41 548352 ----a-w- C:\Program Files\SUPERAntiSpyware\SASWINLO.DLL

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\MSIServer]
@="Service"

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]
"DisableNotifications"= 1 (0x1)

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=
"C:\\Program Files\\Bonjour\\mDNSResponder.exe"=
"C:\\Program Files\\iTunes\\iTunes.exe"=

R1 SASDIFSV;SASDIFSV;C:\Program Files\SUPERAntiSpyware\sasdifsv.sys [2/17/2010 1:25:48 PM 12872]
R1 SASKUTIL;SASKUTIL;C:\Program Files\SUPERAntiSpyware\SASKUTIL.SYS [5/10/2010 1:41:30 PM 67656]
S2 MBAMService;MBAMService;C:\Program Files\Malwarebytes' Anti-Malware\mbamservice.exe [6/11/2011 12:23:27 AM 366640]
S3 MBAMProtector;MBAMProtector;\??\C:\WINDOWS\system32\drivers\mbam.sys --> C:\WINDOWS\system32\drivers\mbam.sys [?]
S3 MBAMSwissArmy;MBAMSwissArmy;C:\WINDOWS\system32\drivers\mbamswissarmy.sys [6/11/2011 12:23:27 AM 39984]
S3 McComponentHostService;McAfee Security Scan Component Host Service;C:\Program Files\McAfee Security Scan\2.0.181\McCHSvc.exe [1/15/2010 7:49:20 AM 227232]

Contents of the 'Scheduled Tasks' folder

2011-06-25 C:\WINDOWS\Tasks\AppleSoftwareUpdate.job
- C:\Program Files\Apple Software Update\SoftwareUpdate.exe [2009-10-22 17:50:20 . 2009-10-22 17:50:20]

2011-07-02 C:\WINDOWS\Tasks\WGASetup.job
- C:\WINDOWS\system32\KB905474\wgasetup.exe [2010-11-21 17:32:25 . 2009-03-11 04:18:08]


------- Supplementary Scan -------

uStart Page = www.yahoo.com
mStart Page = hxxp://go.compaq.com/1Q00CDT/0409/bl7.asp
mSearch Bar = hxxp://go.compaq.com/1Q00CDT/0409/bl8.asp
uInternet Settings,ProxyOverride = *.local
IE: E&xport to Microsoft Excel - C:\PROGRA~1\MICROS~2\OFFICE11\EXCEL.EXE/3000
TCP: DhcpNameServer = 192.168.1.254
FF - ProfilePath - C:\Documents and Settings\Administrator\Application Data\Mozilla\Firefox\Profiles\q9qvqppm.default\
FF - prefs.js: network.proxy.type - 0
FF - Ext: Default: {972ce4c6-7e08-4474-a285-3208198ce6fd} - C:\Program Files\Mozilla Firefox\extensions\{972ce4c6-7e08-4474-a285-3208198ce6fd}
FF - Ext: Java Console: {CAFEEFAC-0016-0000-0023-ABCDEFFEDCBA} - C:\Program Files\Mozilla Firefox\extensions\{CAFEEFAC-0016-0000-0023-ABCDEFFEDCBA}
FF - Ext: Java Quick Starter: jqs@sun.com - C:\Program Files\Java\jre6\lib\deploy\jqs\ff


**************************************************************************

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2011-07-02 00:02:54
Windows 5.1.2600 Service Pack 2 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully
hidden files: 0

**************************************************************************

[HKEY_LOCAL_MACHINE\System\ControlSet002\Services\2143E8]
"imagepath"="\??\C:\WINDOWS\TEMP\2143E8.tmp"

--------------------- DLLs Loaded Under Running Processes ---------------------

- - - - - - - > 'winlogon.exe'(656)
C:\Program Files\SUPERAntiSpyware\SASWINLO.DLL

- - - - - - - > 'explorer.exe'(2456)
C:\WINDOWS\system32\msi.dll

------------------------ Other Running Processes ------------------------

C:\Program Files\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe
C:\Program Files\Bonjour\mDNSResponder.exe
C:\Program Files\Java\jre6\bin\jqs.exe
C:\Program Files\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE
C:\WINDOWS\system32\wscntfy.exe
C:\Program Files\iPod\bin\iPodService.exe

**************************************************************************

Completion time: 2011-07-02 00:07:11 - machine was rebooted
ComboFix-quarantined-files.txt 2011-07-02 05:07:09
ComboFix2.txt 2011-07-01 06:43:43

Pre-Run: 2,922,295,296 bytes free
Post-Run: 2,821,492,736 bytes free

- - End Of File - - 8594292D88C4529B7D7B6A66D648F1E0


Malwarebytes' Anti-Malware 1.51.0.1200
www.malwarebytes.org

Database version: 7002

Windows 5.1.2600 Service Pack 2
Internet Explorer 6.0.2900.2180

7/2/2011 12:20:11 AM
mbam-log-2011-07-02 (00-20-11).txt

Scan type: Quick scan
Objects scanned: 145171
Time elapsed: 5 minute(s), 4 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 5

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
c:\WINDOWS\system32\avtapi32.exe (Trojan.Tracur) -> Quarantined and deleted successfully.
c:\WINDOWS\system32\020000003c8d88611270c.manifest (Malware.Trace) -> Quarantined and deleted successfully.
c:\WINDOWS\system32\020000003c8d88611270o.manifest (Malware.Trace) -> Quarantined and deleted successfully.
c:\WINDOWS\system32\020000003c8d88611270p.manifest (Malware.Trace) -> Quarantined and deleted successfully.
c:\WINDOWS\system32\020000003c8d88611270s.manifest (Malware.Trace) -> Quarantined and deleted successfully.


Thank you again so much!

#6 RPMcMurphy

RPMcMurphy

    Bleeping *^#@%~


  • Malware Response Team
  • 3,970 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:03:48 PM

Posted 02 July 2011 - 03:02 PM

TJFuchs:

Please do this next:

Posted Image Please visit this site
  • In the Link to topic where this file was requested: field, enter the following:

    http://www.bleepingcomputer.com/forums/topic407039.html
  • In the Browse to the file you want to submit: field, click on browse and navigate to the following file:

    C:\Qoobox\Quarantine\[4]-Submit_,<date>_<time>.zip[/b] (the date & time will roughly be the time you last ran ComboFix)
  • In the comments field enter the following:

    Failed submission
  • Press the send file button.

Posted Image Open Notepad Go to Start> All Programs> Accessories> Notepad ( this will only work with Notepad ) and copy all the text inside the Codebox by highlighting it all and pressing CTRL C on your keyboard, then paste it into Notepad, make sure there is no space before and above Driver::

Driver::
2143E8
Rootkit::
C:\WINDOWS\TEMP\2143E8.tmp

Save this as CFScript to your desktop.

Then disable your security programs and drag the CFScript into ComboFix.exe as you see in the screenshot below.

Posted Image


This will start ComboFix again. After reboot, (in case it asks to reboot), post the contents of Combofix.txt in your next reply.

Please include the following in your next post:
  • ComboFix log

Threads are closed after 5 days of inactivity.

ASAP & UNITE Member


The help you receive here is free. If you wish to show your appreciation, then you may btn_donate_SM.gif


#7 TJFuchs

TJFuchs
  • Topic Starter

  • Members
  • 11 posts
  • OFFLINE
  •  
  • Local time:01:48 PM

Posted 02 July 2011 - 04:52 PM

Your help is very appreciated!

ComboFix 11-07-02.02 - Administrator 07/02/2011 16:34:08.4.1 - x86
Microsoft Windows XP Professional 5.1.2600.2.1252.1.1033.18.1015.722 [GMT -5:00]
Running from: c:\documents and settings\Administrator\Desktop\ComboFix.exe
Command switches used :: c:\documents and settings\Administrator\Desktop\CFScript.txt
.
.
((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.
.
.
((((((((((((((((((((((((((((((((((((((( Drivers/Services )))))))))))))))))))))))))))))))))))))))))))))))))
.
.
-------\Service_2143E8
.
.
((((((((((((((((((((((((( Files Created from 2011-06-02 to 2011-07-02 )))))))))))))))))))))))))))))))
.
.
2011-06-24 17:20 . 2011-06-28 19:59 -------- d-----w- c:\documents and settings\All Users\Application Data\Spybot - Search & Destroy
2011-06-24 17:20 . 2011-06-24 17:20 -------- d-----w- c:\program files\Spybot - Search & Destroy
2011-06-24 17:16 . 2011-06-24 17:16 -------- d-----w- c:\program files\CCleaner
2011-06-24 17:15 . 2011-06-24 17:15 -------- d-----w- c:\documents and settings\All Users\Application Data\SUPERAntiSpyware.com
2011-06-24 17:15 . 2011-06-24 17:15 -------- d-----w- c:\documents and settings\Administrator\Application Data\SUPERAntiSpyware.com
2011-06-24 17:15 . 2011-06-24 17:15 -------- d-----w- c:\program files\SUPERAntiSpyware
2011-06-11 06:02 . 2011-06-25 20:49 -------- d-s---w- c:\documents and settings\Administrator\UserData
2011-06-11 05:43 . 2011-06-11 05:43 -------- d-----w- c:\documents and settings\Administrator\Application Data\AVG10
2011-06-11 05:41 . 2011-06-11 05:41 -------- d-----w- c:\documents and settings\All Users\Application Data\Common Files
2011-06-11 05:29 . 2011-06-11 15:05 -------- d-----w- c:\documents and settings\All Users\Application Data\AVG10
2011-06-11 05:26 . 2011-06-11 05:26 -------- d-----w- c:\program files\AVG
2011-06-11 05:23 . 2011-06-11 05:23 -------- d-----w- c:\documents and settings\Administrator\Application Data\Malwarebytes
2011-06-11 05:23 . 2011-05-29 14:11 39984 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2011-06-11 05:23 . 2011-06-11 05:23 -------- d-----w- c:\documents and settings\All Users\Application Data\Malwarebytes
2011-06-11 05:23 . 2011-06-11 05:23 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
2011-06-11 05:20 . 2011-06-11 06:14 -------- d-----w- c:\documents and settings\All Users\Application Data\MFAData
2011-06-11 03:32 . 2004-08-04 12:00 4224 ----a-w- c:\windows\system32\beep.sys
.
.
.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
.
((((((((((((((((((((((((((((( SnapShot@2011-07-01_06.39.51 )))))))))))))))))))))))))))))))))))))))))
.
+ 2011-07-02 21:41 . 2011-07-02 21:41 16384 c:\windows\Temp\Perflib_Perfdata_cc.dat
+ 2010-12-11 05:35 . 2011-07-01 15:15 47716296 c:\windows\system32\MRT.exe
.
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4
.
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"SUPERAntiSpyware"="c:\program files\SUPERAntiSpyware\SUPERAntiSpyware.exe" [2011-06-10 2424192]
"ctfmon.exe"="c:\windows\system32\ctfmon.exe" [2004-08-04 15360]
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"SunJavaUpdateSched"="c:\program files\Common Files\Java\Java Update\jusched.exe" [2010-05-14 248552]
"srmclean"="c:\cpqs\Scom\srmclean.exe" [2001-07-24 36864]
"SetRefresh"="c:\program files\Compaq\SetRefresh\SetRefresh.exe" [2003-11-06 524800]
"Adobe Reader Speed Launcher"="c:\program files\Adobe\Reader 10.0\Reader\Reader_sl.exe" [2011-01-30 35736]
"Adobe ARM"="c:\program files\Common Files\Adobe\ARM\1.0\AdobeARM.exe" [2011-03-30 937920]
"QuickTime Task"="c:\program files\QuickTime\qttask.exe" [2010-11-29 421888]
"iTunesHelper"="c:\program files\iTunes\iTunesHelper.exe" [2011-03-02 421160]
.
[hkey_local_machine\software\microsoft\windows\currentversion\explorer\ShellExecuteHooks]
"{5AE067D3-9AFB-48E0-853A-EBB7F4A000DA}"= "c:\program files\SUPERAntiSpyware\SASSEH.DLL" [2008-05-13 77824]
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\!SASWinLogon]
2009-09-03 22:21 548352 ----a-w- c:\program files\SUPERAntiSpyware\SASWINLO.DLL
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\MSIServer]
@="Service"
.
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]
"DisableNotifications"= 1 (0x1)
.
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=
"c:\\Program Files\\Bonjour\\mDNSResponder.exe"=
"c:\\Program Files\\iTunes\\iTunes.exe"=
.
R1 SASDIFSV;SASDIFSV;c:\program files\SUPERAntiSpyware\sasdifsv.sys [2/17/2010 1:25 PM 12872]
R1 SASKUTIL;SASKUTIL;c:\program files\SUPERAntiSpyware\SASKUTIL.SYS [5/10/2010 1:41 PM 67656]
S2 MBAMService;MBAMService;c:\program files\Malwarebytes' Anti-Malware\mbamservice.exe [6/11/2011 12:23 AM 366640]
S3 MBAMProtector;MBAMProtector;\??\c:\windows\system32\drivers\mbam.sys --> c:\windows\system32\drivers\mbam.sys [?]
S3 MBAMSwissArmy;MBAMSwissArmy;c:\windows\system32\drivers\mbamswissarmy.sys [6/11/2011 12:23 AM 39984]
S3 McComponentHostService;McAfee Security Scan Component Host Service;c:\program files\McAfee Security Scan\2.0.181\McCHSvc.exe [1/15/2010 7:49 AM 227232]
.
Contents of the 'Scheduled Tasks' folder
.
2011-06-25 c:\windows\Tasks\AppleSoftwareUpdate.job
- c:\program files\Apple Software Update\SoftwareUpdate.exe [2009-10-22 17:50]
.
2011-07-02 c:\windows\Tasks\WGASetup.job
- c:\windows\system32\KB905474\wgasetup.exe [2010-11-21 04:18]
.
.
------- Supplementary Scan -------
.
uStart Page = www.yahoo.com
mStart Page = hxxp://go.compaq.com/1Q00CDT/0409/bl7.asp
mSearch Bar = hxxp://go.compaq.com/1Q00CDT/0409/bl8.asp
uInternet Settings,ProxyOverride = *.local
IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~2\OFFICE11\EXCEL.EXE/3000
TCP: DhcpNameServer = 192.168.1.254
FF - ProfilePath - c:\documents and settings\Administrator\Application Data\Mozilla\Firefox\Profiles\q9qvqppm.default\
FF - prefs.js: network.proxy.type - 0
FF - Ext: Default: {972ce4c6-7e08-4474-a285-3208198ce6fd} - c:\program files\Mozilla Firefox\extensions\{972ce4c6-7e08-4474-a285-3208198ce6fd}
FF - Ext: Java Console: {CAFEEFAC-0016-0000-0023-ABCDEFFEDCBA} - c:\program files\Mozilla Firefox\extensions\{CAFEEFAC-0016-0000-0023-ABCDEFFEDCBA}
FF - Ext: Java Quick Starter: jqs@sun.com - c:\program files\Java\jre6\lib\deploy\jqs\ff
.
.
**************************************************************************
.
catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2011-07-02 16:42
Windows 5.1.2600 Service Pack 2 NTFS
.
scanning hidden processes ...
.
scanning hidden autostart entries ...
.
scanning hidden files ...
.
scan completed successfully
hidden files: 0
.
**************************************************************************
.
--------------------- DLLs Loaded Under Running Processes ---------------------
.
- - - - - - - > 'winlogon.exe'(656)
c:\program files\SUPERAntiSpyware\SASWINLO.DLL
.
- - - - - - - > 'explorer.exe'(3992)
c:\windows\system32\msi.dll
.
------------------------ Other Running Processes ------------------------
.
c:\program files\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe
c:\program files\Bonjour\mDNSResponder.exe
c:\program files\Java\jre6\bin\jqs.exe
c:\program files\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE
c:\windows\system32\wscntfy.exe
c:\program files\iPod\bin\iPodService.exe
.
**************************************************************************
.
Completion time: 2011-07-02 16:46:26 - machine was rebooted
ComboFix-quarantined-files.txt 2011-07-02 21:46
ComboFix2.txt 2011-07-02 05:34
ComboFix3.txt 2011-07-02 05:08
ComboFix4.txt 2011-07-01 06:43
.
Pre-Run: 1,991,962,624 bytes free
Post-Run: 1,983,602,688 bytes free
.
- - End Of File - - 53BCB97C019099A95A7F632D15DA75B7

#8 RPMcMurphy

RPMcMurphy

    Bleeping *^#@%~


  • Malware Response Team
  • 3,970 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:03:48 PM

Posted 02 July 2011 - 05:43 PM

TJFuchs:

How is your computer running now? Please do this next:

Posted Image Your Java is out of date. Older versions have vulnerabilities that malware can use to infect your system.

Java™ can be updated from the Java control panel Start > Control Panel (Classic View) > Java (looks like a coffee cup) > Update Tab > Update Now. An update should begin; follow the prompts. If it does not, let me know.

Once the install is complete...

Go into the Control Panel and double-click the Java Icon. (looks like a coffee cup)
  • On the General tab, under Temporary Internet Files, click the Settings button.
  • Next, click on the Delete Files button
  • There are two options in the window to clear the cache - Leave BOTH Checked
    • Applications and Applets
    • Trace and Log Files
  • Click OK on Delete Temporary Files Window
Note: This deletes ALL the Downloaded Applications and Applets from the CACHE.
  • Click OK to leave the Temporary Files Window
  • Click OK to leave the Java Control Panel.
Posted Image Please run ESET Online Scanner
  • Place a check mark in the box YES, I accept the Terms Of Use
  • Click the Start button.
  • Now click the Install button.
  • Click Start. The scanner engine will initialize and update.
  • Do Not place a check mark in the box beside Remove found threats.
  • Click the Scan button. The scan will now run, please be patient.
  • When the scan finishes copy and paste the results into your next reply.
Please include the following in your next post:
  • How is the computer running?
  • ESET log

Threads are closed after 5 days of inactivity.

ASAP & UNITE Member


The help you receive here is free. If you wish to show your appreciation, then you may btn_donate_SM.gif


#9 TJFuchs

TJFuchs
  • Topic Starter

  • Members
  • 11 posts
  • OFFLINE
  •  
  • Local time:01:48 PM

Posted 02 July 2011 - 08:22 PM

My computer is running better, for sure - there hasn't been any phantom audio instances for quite a while now, although Google still redirects every now and again.

C:\Documents and Settings\Administrator\Application Data\dwm.exe a variant of Win32/Kryptik.PUQ trojan
C:\Documents and Settings\Administrator\Application Data\Microsoft\conhost.exe a variant of Win32/Kryptik.PUQ trojan
C:\Documents and Settings\Administrator\Local Settings\temp\csrss.exe a variant of Win32/Kryptik.PUQ trojan
C:\Documents and Settings\Administrator\Local Settings\temp\ms0cfg32.exe a variant of Win32/Kryptik.PUQ trojan
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\YH012L45\IgE6LTvA[1].exe a variant of Win32/Kryptik.PUQ trojan
C:\Qoobox\Quarantine\C\Documents and Settings\Administrator\0.44235668642221726.exe.vir a variant of Win32/Kryptik.PGS trojan
C:\Qoobox\Quarantine\C\Documents and Settings\Administrator\Application Data\Mozilla\Firefox\Profiles\q9qvqppm.default\extensions\{19d83726-09b1-4563-93d5-99b3873fcda7}\chrome.manifest.vir Win32/TrojanDownloader.Tracur.F trojan
C:\Qoobox\Quarantine\C\Documents and Settings\Administrator\Application Data\Mozilla\Firefox\Profiles\q9qvqppm.default\extensions\{268fdd74-a487-46c8-9f72-60e100c470d5}\chrome.manifest.vir Win32/TrojanDownloader.Tracur.F trojan
C:\Qoobox\Quarantine\C\Documents and Settings\All Users\Application Data\15589156.exe.vir a variant of Win32/Kryptik.PSL trojan
C:\Qoobox\Quarantine\C\Documents and Settings\All Users\Application Data\dRBAHQLTbF.exe.vir a variant of Win32/Kryptik.PSL trojan
C:\System Volume Information\_restore{D0D4C289-1775-4E84-B8F1-E8133151EDAF}\RP182\A0016016.manifest Win32/TrojanDownloader.Tracur.F trojan
C:\System Volume Information\_restore{D0D4C289-1775-4E84-B8F1-E8133151EDAF}\RP182\A0016037.manifest Win32/TrojanDownloader.Tracur.F trojan
C:\System Volume Information\_restore{D0D4C289-1775-4E84-B8F1-E8133151EDAF}\RP182\A0016074.exe a variant of Win32/Kryptik.PGS trojan
C:\System Volume Information\_restore{D0D4C289-1775-4E84-B8F1-E8133151EDAF}\RP182\A0016075.manifest Win32/TrojanDownloader.Tracur.F trojan
C:\System Volume Information\_restore{D0D4C289-1775-4E84-B8F1-E8133151EDAF}\RP182\A0016076.manifest Win32/TrojanDownloader.Tracur.F trojan
C:\System Volume Information\_restore{D0D4C289-1775-4E84-B8F1-E8133151EDAF}\RP182\A0016080.exe a variant of Win32/Kryptik.PSL trojan
C:\System Volume Information\_restore{D0D4C289-1775-4E84-B8F1-E8133151EDAF}\RP182\A0016081.exe a variant of Win32/Kryptik.PSL trojan
C:\System Volume Information\_restore{D0D4C289-1775-4E84-B8F1-E8133151EDAF}\RP182\A0016090.sys Win32/Olmasco.E trojan
C:\System Volume Information\_restore{D0D4C289-1775-4E84-B8F1-E8133151EDAF}\RP184\A0016276.exe a variant of Win32/Kryptik.PGS trojan
C:\System Volume Information\_restore{D0D4C289-1775-4E84-B8F1-E8133151EDAF}\RP184\A0016277.exe a variant of Win32/Kryptik.PGS trojan
C:\System Volume Information\_restore{D0D4C289-1775-4E84-B8F1-E8133151EDAF}\RP184\A0016278.dll a variant of Win32/Kryptik.PQF trojan
Operating memory a variant of Win32/Kryptik.PUQ trojan

#10 RPMcMurphy

RPMcMurphy

    Bleeping *^#@%~


  • Malware Response Team
  • 3,970 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:03:48 PM

Posted 02 July 2011 - 08:48 PM

TJFuchs:

Posted Image Open Notepad Go to Start> All Programs> Accessories> Notepad ( this will only work with Notepad ) and copy all the text inside the Codebox by highlighting it all and pressing CTRL C on your keyboard, then paste it into Notepad, make sure there is no space before and above File::

File::
C:\Documents and Settings\Administrator\Application Data\dwm.exe
C:\Documents and Settings\Administrator\Application Data\Microsoft\conhost.exe
C:\Documents and Settings\Administrator\Local Settings\temp\csrss.exe
C:\Documents and Settings\Administrator\Local Settings\temp\ms0cfg32.exe 
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\YH012L45\IgE6LTvA[1].exe

Save this as CFScript to your desktop.

Then disable your security programs and drag the CFScript into ComboFix.exe as you see in the screenshot below.

Posted Image


This will start ComboFix again. After reboot, (in case it asks to reboot), post the contents of Combofix.txt in your next reply.

Please include the following in your next post:
  • ComboFix log
  • How is the computer running now?

Threads are closed after 5 days of inactivity.

ASAP & UNITE Member


The help you receive here is free. If you wish to show your appreciation, then you may btn_donate_SM.gif


#11 TJFuchs

TJFuchs
  • Topic Starter

  • Members
  • 11 posts
  • OFFLINE
  •  
  • Local time:01:48 PM

Posted 04 July 2011 - 08:47 PM

Hello - posting this from my phone - last update caused internet to no longer work - getting 'Proxy server is refusing connections' message. Help!

#12 RPMcMurphy

RPMcMurphy

    Bleeping *^#@%~


  • Malware Response Team
  • 3,970 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:03:48 PM

Posted 05 July 2011 - 12:06 AM

TJFuchs:

Posted Image If your network icon appears on the Windows taskbar, then you can repair it by right-clicking on the icon and selecting Repair.

Posted Image

If you have no task bar icon do this:
  • Click on the Start button.
  • Click on the Settings menu option.
  • Click on the Control Panel option.
  • When the Control Panel opens, double-click on the Network Connections icon. If your Control Panel is set to Category View, then double-click on Network and Internet Connections and then click on Network Connections at the bottom.
  • You will now see a list of available network connections. Locate the connection for your Wireless or Lan adapter and right-click on it.
  • click on the Repair menu option.

Posted Image

Let the repair process perform its tasks and when it has finished, your Internet connection should be working again.

If that doesn't work - try the following:
  • Go to Start > Control Panel, and choose Network Connections.
  • Right click on your default connection, usually Local Area Connection for cable and DSL or Dial-up Connection if you are using Dial-up, and choose Properties.
  • Click the Networking tab
  • Double-click on the Internet Protocol (TCP/IP) item.
  • Write down the settings in case you should need to change them back.
  • Select the radio button that says "Obtain DNS servers automatically".
  • Click OK twice to get out of the properties screen and restart your computer.
  • If not prompted to reboot go ahead and reboot manually.
In I.E.
  • Check internet options settings.
  • Tools > Internet Options > Connections
  • LAN settings
  • Choose "automatically detect settings"
  • uncheck both proxy settings boxes
In FireFox
  • Click on Advanced -> Network -> Setttings…
  • the No Proxy option should be selected
Open notepad and copy/paste the text in the quotebox below into it:

@Echo on
ipconfig /release
ipconfig /renew
ipconfig /flushdns
netsh winsock reset all
netsh int ip reset all
shutdown -r -t 1
del %0


Save this as flush.bat Choose to "Save type as - All Files"
It should look like this: Posted Image
Double click on flush.bat & allow it to run. Your computer will reboot.

Let me know if that gets you back up and running.

Threads are closed after 5 days of inactivity.

ASAP & UNITE Member


The help you receive here is free. If you wish to show your appreciation, then you may btn_donate_SM.gif


#13 TJFuchs

TJFuchs
  • Topic Starter

  • Members
  • 11 posts
  • OFFLINE
  •  
  • Local time:01:48 PM

Posted 05 July 2011 - 12:41 AM

It did get me back up and running. Thank you so much.

#14 RPMcMurphy

RPMcMurphy

    Bleeping *^#@%~


  • Malware Response Team
  • 3,970 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:03:48 PM

Posted 05 July 2011 - 05:39 PM

Great! This should open that last ComboFix log for you. Please post it.

Posted Image Click Start > Run or press Windows Key + R copy/paste the following into the run box that opens and press OK:
c:\ComboFix.txt

Threads are closed after 5 days of inactivity.

ASAP & UNITE Member


The help you receive here is free. If you wish to show your appreciation, then you may btn_donate_SM.gif


#15 TJFuchs

TJFuchs
  • Topic Starter

  • Members
  • 11 posts
  • OFFLINE
  •  
  • Local time:01:48 PM

Posted 06 July 2011 - 03:59 PM

ComboFix 11-07-02.03 - Administrator 07/03/2011 9:08.5.1 - x86
Microsoft Windows XP Professional 5.1.2600.2.1252.1.1033.18.1015.728 [GMT -5:00]
Running from: c:\documents and settings\Administrator\Desktop\ComboFix.exe
Command switches used :: c:\documents and settings\Administrator\Desktop\CFScript.txt
.
FILE ::
"c:\documents and settings\Administrator\Application Data\dwm.exe"
"c:\documents and settings\Administrator\Application Data\Microsoft\conhost.exe"
"c:\documents and settings\Administrator\Local Settings\temp\csrss.exe"
"c:\documents and settings\Administrator\Local Settings\temp\ms0cfg32.exe"
"c:\documents and settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\YH012L45\IgE6LTvA[1].exe"
.
.
((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.
.
c:\documents and settings\Administrator\Application Data\dwm.exe
c:\documents and settings\Administrator\Application Data\Microsoft\conhost.exe
c:\documents and settings\Administrator\Local Settings\temp\csrss.exe
c:\documents and settings\Administrator\Local Settings\temp\ms0cfg32.exe
c:\documents and settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\YH012L45\IgE6LTvA[1].exe
.
.
((((((((((((((((((((((((( Files Created from 2011-06-03 to 2011-07-03 )))))))))))))))))))))))))))))))
.
.
2011-07-03 00:43 . 2011-07-03 00:43 -------- d-----w- c:\program files\ESET
2011-06-24 17:20 . 2011-06-28 19:59 -------- d-----w- c:\documents and settings\All Users\Application Data\Spybot - Search & Destroy
2011-06-24 17:20 . 2011-06-24 17:20 -------- d-----w- c:\program files\Spybot - Search & Destroy
2011-06-24 17:16 . 2011-06-24 17:16 -------- d-----w- c:\program files\CCleaner
2011-06-24 17:15 . 2011-06-24 17:15 -------- d-----w- c:\documents and settings\All Users\Application Data\SUPERAntiSpyware.com
2011-06-24 17:15 . 2011-06-24 17:15 -------- d-----w- c:\documents and settings\Administrator\Application Data\SUPERAntiSpyware.com
2011-06-24 17:15 . 2011-06-24 17:15 -------- d-----w- c:\program files\SUPERAntiSpyware
2011-06-11 06:02 . 2011-06-25 20:49 -------- d-s---w- c:\documents and settings\Administrator\UserData
2011-06-11 05:43 . 2011-06-11 05:43 -------- d-----w- c:\documents and settings\Administrator\Application Data\AVG10
2011-06-11 05:41 . 2011-06-11 05:41 -------- d-----w- c:\documents and settings\All Users\Application Data\Common Files
2011-06-11 05:29 . 2011-06-11 15:05 -------- d-----w- c:\documents and settings\All Users\Application Data\AVG10
2011-06-11 05:26 . 2011-06-11 05:26 -------- d-----w- c:\program files\AVG
2011-06-11 05:23 . 2011-06-11 05:23 -------- d-----w- c:\documents and settings\Administrator\Application Data\Malwarebytes
2011-06-11 05:23 . 2011-05-29 14:11 39984 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2011-06-11 05:23 . 2011-06-11 05:23 -------- d-----w- c:\documents and settings\All Users\Application Data\Malwarebytes
2011-06-11 05:23 . 2011-06-11 05:23 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
2011-06-11 05:20 . 2011-06-11 06:14 -------- d-----w- c:\documents and settings\All Users\Application Data\MFAData
2011-06-11 03:32 . 2004-08-04 12:00 4224 ----a-w- c:\windows\system32\beep.sys
.
.
.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2011-05-04 09:52 . 2010-12-21 05:49 472808 ----a-w- c:\windows\system32\deployJava1.dll
2011-05-04 07:25 . 2010-12-21 05:49 73728 ----a-w- c:\windows\system32\javacpl.cpl
.
.
((((((((((((((((((((((((((((( SnapShot@2011-07-01_06.39.51 )))))))))))))))))))))))))))))))))))))))))
.
+ 2011-07-03 14:15 . 2011-07-03 14:15 16384 c:\windows\Temp\Perflib_Perfdata_104.dat
+ 2011-07-03 00:37 . 2011-05-04 09:52 157472 c:\windows\system32\javaws.exe
- 2010-12-21 05:49 . 2010-12-21 05:48 157472 c:\windows\system32\javaws.exe
- 2010-12-21 05:49 . 2010-12-21 05:48 145184 c:\windows\system32\javaw.exe
+ 2011-07-03 00:37 . 2011-05-04 09:52 145184 c:\windows\system32\javaw.exe
+ 2011-07-03 00:37 . 2011-05-04 09:52 145184 c:\windows\system32\java.exe
- 2010-12-21 05:49 . 2010-12-21 05:48 145184 c:\windows\system32\java.exe
+ 2011-07-03 00:38 . 2011-07-03 00:38 203776 c:\windows\Installer\a15f1f.msi
+ 2010-12-11 05:35 . 2011-07-01 15:15 47716296 c:\windows\system32\MRT.exe
.
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4
.
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"SUPERAntiSpyware"="c:\program files\SUPERAntiSpyware\SUPERAntiSpyware.exe" [2011-06-10 2424192]
"ctfmon.exe"="c:\windows\system32\ctfmon.exe" [2004-08-04 15360]
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"srmclean"="c:\cpqs\Scom\srmclean.exe" [2001-07-24 36864]
"SetRefresh"="c:\program files\Compaq\SetRefresh\SetRefresh.exe" [2003-11-06 524800]
"Adobe Reader Speed Launcher"="c:\program files\Adobe\Reader 10.0\Reader\Reader_sl.exe" [2011-01-30 35736]
"Adobe ARM"="c:\program files\Common Files\Adobe\ARM\1.0\AdobeARM.exe" [2011-03-30 937920]
"QuickTime Task"="c:\program files\QuickTime\qttask.exe" [2010-11-29 421888]
"iTunesHelper"="c:\program files\iTunes\iTunesHelper.exe" [2011-03-02 421160]
"SunJavaUpdateSched"="c:\program files\Common Files\Java\Java Update\jusched.exe" [2011-04-08 254696]
.
[hkey_local_machine\software\microsoft\windows\currentversion\explorer\ShellExecuteHooks]
"{5AE067D3-9AFB-48E0-853A-EBB7F4A000DA}"= "c:\program files\SUPERAntiSpyware\SASSEH.DLL" [2008-05-13 77824]
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\!SASWinLogon]
2009-09-03 22:21 548352 ----a-w- c:\program files\SUPERAntiSpyware\SASWINLO.DLL
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\MSIServer]
@="Service"
.
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]
"DisableNotifications"= 1 (0x1)
.
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=
"c:\\Program Files\\Bonjour\\mDNSResponder.exe"=
"c:\\Program Files\\iTunes\\iTunes.exe"=
.
R1 SASDIFSV;SASDIFSV;c:\program files\SUPERAntiSpyware\sasdifsv.sys [2/17/2010 1:25 PM 12872]
R1 SASKUTIL;SASKUTIL;c:\program files\SUPERAntiSpyware\SASKUTIL.SYS [5/10/2010 1:41 PM 67656]
S2 MBAMService;MBAMService;c:\program files\Malwarebytes' Anti-Malware\mbamservice.exe [6/11/2011 12:23 AM 366640]
S3 MBAMProtector;MBAMProtector;\??\c:\windows\system32\drivers\mbam.sys --> c:\windows\system32\drivers\mbam.sys [?]
S3 MBAMSwissArmy;MBAMSwissArmy;c:\windows\system32\drivers\mbamswissarmy.sys [6/11/2011 12:23 AM 39984]
S3 McComponentHostService;McAfee Security Scan Component Host Service;c:\program files\McAfee Security Scan\2.0.181\McCHSvc.exe [1/15/2010 7:49 AM 227232]
.
Contents of the 'Scheduled Tasks' folder
.
2011-06-25 c:\windows\Tasks\AppleSoftwareUpdate.job
- c:\program files\Apple Software Update\SoftwareUpdate.exe [2009-10-22 17:50]
.
2011-07-03 c:\windows\Tasks\WGASetup.job
- c:\windows\system32\KB905474\wgasetup.exe [2010-11-21 04:18]
.
.
------- Supplementary Scan -------
.
uStart Page = www.yahoo.com
mStart Page = hxxp://go.compaq.com/1Q00CDT/0409/bl7.asp
mSearch Bar = hxxp://go.compaq.com/1Q00CDT/0409/bl8.asp
uInternet Settings,ProxyOverride = *.local
uInternet Settings,ProxyServer = http=127.0.0.1:58545
IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~2\OFFICE11\EXCEL.EXE/3000
TCP: DhcpNameServer = 192.168.1.254
FF - ProfilePath - c:\documents and settings\Administrator\Application Data\Mozilla\Firefox\Profiles\q9qvqppm.default\
FF - prefs.js: network.proxy.http - 127.0.0.1
FF - prefs.js: network.proxy.http_port - 58545
FF - prefs.js: network.proxy.type - 1
FF - Ext: Default: {972ce4c6-7e08-4474-a285-3208198ce6fd} - c:\program files\Mozilla Firefox\extensions\{972ce4c6-7e08-4474-a285-3208198ce6fd}
FF - Ext: Java Console: {CAFEEFAC-0016-0000-0023-ABCDEFFEDCBA} - c:\program files\Mozilla Firefox\extensions\{CAFEEFAC-0016-0000-0023-ABCDEFFEDCBA}
FF - Ext: Java Console: {CAFEEFAC-0016-0000-0026-ABCDEFFEDCBA} - c:\program files\Mozilla Firefox\extensions\{CAFEEFAC-0016-0000-0026-ABCDEFFEDCBA}
FF - Ext: Java Quick Starter: jqs@sun.com - c:\program files\Java\jre6\lib\deploy\jqs\ff
.
.
**************************************************************************
.
catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2011-07-03 09:16
Windows 5.1.2600 Service Pack 2 NTFS
.
scanning hidden processes ...
.
scanning hidden autostart entries ...
.
scanning hidden files ...
.
scan completed successfully
hidden files: 0
.
**************************************************************************
.
--------------------- DLLs Loaded Under Running Processes ---------------------
.
- - - - - - - > 'winlogon.exe'(656)
c:\program files\SUPERAntiSpyware\SASWINLO.DLL
.
- - - - - - - > 'explorer.exe'(2484)
c:\windows\system32\msi.dll
.
------------------------ Other Running Processes ------------------------
.
c:\program files\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe
c:\program files\Bonjour\mDNSResponder.exe
c:\program files\Java\jre6\bin\jqs.exe
c:\program files\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE
c:\windows\system32\wscntfy.exe
c:\program files\iPod\bin\iPodService.exe
.
**************************************************************************
.
Completion time: 2011-07-03 09:21:28 - machine was rebooted
ComboFix-quarantined-files.txt 2011-07-03 14:21
ComboFix2.txt 2011-07-02 21:46
ComboFix3.txt 2011-07-02 05:34
ComboFix4.txt 2011-07-02 05:08
ComboFix5.txt 2011-07-03 14:07
.
Pre-Run: 1,161,310,208 bytes free
Post-Run: 1,163,624,448 bytes free
.
- - End Of File - - 8506860A16A232EFF052BA4EB96A2CF0




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users