Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

rundll32 error at boot up, The instruction at "0x010017f1"


  • This topic is locked This topic is locked
29 replies to this topic

#1 poser3dart

poser3dart

  • Members
  • 16 posts
  • OFFLINE
  •  
  • Local time:05:43 AM

Posted 01 July 2011 - 04:24 PM

Hi, ( hope this is the right forum to post this) first let me state what I remember. I think I had a virus on this laptop way back and I deleted the file (I do not remember what file nor what virus if it was one, because the screen got the Normal HP Lines through the display and has sat up for awhile). I now have a new screen and am in the process of using the laptop again.

Now to the problem: Every time I boot up I get the "The instruction at "0x010017f1" referenced memory at "0x01000003c". The memory could not be "read" message during welcome. Note: it is the same message at each boot-up, numbers do not change.

Now to what I have done to try to correct the problem: I have ran and fixed all problems in registry with "Registry Mechanic" that it found. I have ran full scan with "Spybot - Search & Destroy" and I have ran full virus scan with "McAfee". Also I have checked registry "Run" and "MSCONFIG". I have stopped and booted with all non-microsoft services disabled from msconfig and still the above problem. I have checked the memory in another laptop and with memtest and both chips are fine. I have also re-extracted the rundll32 file in case it was corrupted. On a side note it does not pop up in safe mode with either user (me or admin).

I know I may be able to fix this by a complete reinstall but as you can see in my files, I have a lot installed and prefer not to have to do that if at all possible.

So any help at all please, and thank you.



.
DDS (Ver_2011-06-23.01) - NTFSx86
Internet Explorer: 8.0.6001.18702 BrowserJavaVersion: 1.6.0_24
Run by Winds at 8:08:04 on 2011-07-01
Microsoft Windows XP Home Edition 5.1.2600.3.1252.1.1033.18.1534.854 [GMT -4:00]
.
AV: McAfee VirusScan Enterprise *Disabled/Updated* {918A2B0B-2C60-4016-A4AB-E868DEABF7F0}
.
============== Running Processes ===============
.
C:\WINDOWS\System32\Ati2evxx.exe
C:\WINDOWS\system32\svchost -k DcomLaunch
svchost.exe
C:\WINDOWS\System32\svchost.exe -k netsvcs
svchost.exe
svchost.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\ctfmon.exe
C:\WINDOWS\system32\spoolsv.exe
svchost.exe
D:\tools\APC\APC PowerChute Personal Edition\mainserv.exe
C:\Program Files\Java\jre6\bin\jqs.exe
D:\system\Network Associates\Common Framework\FrameworkService.exe
D:\system\Network Associates\VirusScan\Mcshield.exe
D:\system\Network Associates\VirusScan\VsTskMgr.exe
C:\Program Files\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE
C:\WINDOWS\system32\oodag.exe
C:\Program Files\Common Files\PC Tools\sMonitor\StartManSvc.exe
D:\system\Raxco\PerfectDisk\PDAgent.exe
C:\WINDOWS\System32\svchost.exe -k imgsvc
C:\Program Files\Hewlett-Packard\Shared\hpqwmiex.exe
D:\system\Raxco\PerfectDisk\PDEngine.exe
C:\Program Files\Hewlett-Packard\HP Quick Launch Buttons\QlbCtrl.exe
C:\Program Files\hpq\HP Wireless Assistant\HP Wireless Assistant.exe
C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe
C:\Program Files\Synaptics\SynTP\SynTPEnh.exe
D:\system\Network Associates\Common Framework\UdaterUI.exe
D:\system\Network Associates\VirusScan\SHSTAT.EXE
D:\system\Network Associates\Common Framework\McTray.exe
C:\WINDOWS\System32\svchost.exe -k HTTPFilter
D:\tools\Everest\everest.exe
D:\tools\CPal\CPal.exe
D:\system\FreePOPs\freepopsd.exe
D:\browsers\Mozilla Firefox\firefox.exe
.
============== Pseudo HJT Report ===============
.
uStart Page = hxxp://www.google.com/
uInternet Connection Wizard,ShellNext = hxxp://h50203.www5.hp.com/HPISWeb/customer/DeviceMgrErrorCode.aspx?code=28
BHO: Adobe PDF Link Helper: {18df081c-e8ad-4283-a596-fa578c2ebdc3} - c:\program files\common files\adobe\acrobat\activex\AcroIEHelperShim.dll
BHO: Spybot-S&D IE Protection: {53707962-6f74-2d53-2644-206d7942484f} - d:\browsers\spybot~1\SDHelper.dll
BHO: scriptproxy: {7db2d5a0-7241-4e79-b68d-6309f01c5231} - d:\system\network associates\virusscan\Scriptcl.dll
BHO: Java™ Plug-In 2 SSV Helper: {dbc80044-a445-435b-bc74-9c25c1c588a9} - c:\program files\java\jre6\bin\jp2ssv.dll
BHO: JQSIEStartDetectorImpl Class: {e7e6f031-17ce-4c07-bc86-eabfe594f69c} - c:\program files\java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll
TB: Zend Studio: {95188727-288f-4581-a48d-eab3bd027314} - d:\web\zendst~1\toolbars\ZENDIE~1.DLL
EB: {32683183-48a0-441b-a342-7c2a440a9478} - No File
uRun: [EVEREST AutoStart] d:\tools\everest\everest.exe
uRun: [ctfmon.exe] c:\windows\system32\ctfmon.exe
mRun: [QlbCtrl.exe] c:\program files\hewlett-packard\hp quick launch buttons\QlbCtrl.exe /Start
mRun: [hpWirelessAssistant] c:\program files\hpq\hp wireless assistant\HP Wireless Assistant.exe
mRun: [ATIPTA] "c:\program files\ati technologies\ati control panel\atiptaxx.exe"
mRun: [SynTPEnh] c:\program files\synaptics\syntp\SynTPEnh.exe
mRun: [McAfeeUpdaterUI] "d:\system\network associates\common framework\UdaterUI.exe" /StartedFromRunKey
mRun: [ShStatEXE] "d:\system\network associates\virusscan\SHSTAT.EXE" /STANDALONE
mRun: [SynTPStart] c:\program files\synaptics\syntp\SynTPStart.exe
mRun: [KeePass 2 PreLoad] "d:\tools\keepass password safe 2\KeePass.exe" --preload
mRun: [Adobe Reader Speed Launcher] "d:\apps\adobe\reader 9.0\reader\Reader_sl.exe"
mRun: [Adobe ARM] "c:\program files\common files\adobe\arm\1.0\AdobeARM.exe"
StartupFolder: c:\docume~1\winds\startm~1\programs\startup\cookie pal.lnk - d:\tools\cpal\CPal.exe
StartupFolder: c:\docume~1\winds\startm~1\programs\startup\freepops.lnk - d:\system\freepops\freepopsd.exe
IE: E&xport to Microsoft Excel - d:\apps\micros~2\office12\EXCEL.EXE/3000
IE: Zend Studio - Debug current page - d:\web\zend studio\toolbars\ZendIEToolbar.dll/DebugCurrent.html
IE: Zend Studio - Debug next page - d:\web\zend studio\toolbars\ZendIEToolbar.dll/DebugNext.html
IE: {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe
IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe
IE: {92780B25-18CC-41C8-B9BE-3C9C571A8263} - {FF059E31-CC5A-4E2E-BF3B-96E929D65503} - d:\apps\micros~2\office12\REFIEBAR.DLL
IE: {A26ABCF0-1C8F-46e7-A67C-0489DC21B9CC} - {95188727-288F-4581-A48D-EAB3BD027314} - d:\web\zendst~1\toolbars\ZENDIE~1.DLL
IE: {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - {53707962-6F74-2D53-2644-206D7942484F} - d:\browsers\spybot~1\SDHelper.dll
DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} - hxxp://www.update.microsoft.com/microsoftupdate/v6/V5Controls/en/x86/client/muweb_site.cab?1300797918875
DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_24-windows-i586.cab
DPF: {CAFEEFAC-0016-0000-0003-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_03-windows-i586.cab
DPF: {CAFEEFAC-0016-0000-0024-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_24-windows-i586.cab
DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_24-windows-i586.cab
TCP: DhcpNameServer = 192.168.1.1
TCP: Interfaces\{F7A3FBF1-20B4-43B7-844B-D9F22EC1A976} : DhcpNameServer = 192.168.1.1
Handler: qv - {0B4BB6DC-D020-4173-97F2-3AD91AFD6559} - d:\bible\quickverse 2010\quickverse 2010\qvprotwrapper.dll
Notify: AtiExtEvent - Ati2evxx.dll
Hosts: 127.0.0.1 www.spywareinfo.com
.
================= FIREFOX ===================
.
FF - ProfilePath - c:\documents and settings\winds\application data\mozilla\firefox\profiles\379b6glz.default\
FF - plugin: c:\program files\java\jre6\bin\new_plugin\npdeployJava1.dll
FF - plugin: d:\apps\adobe\reader 9.0\reader\air\nppdf32.dll
FF - plugin: d:\apps\adobe\reader 9.0\reader\browser\nppdf32.dll
FF - plugin: d:\browsers\mozilla firefox\plugins\npdeployJava1.dll
FF - plugin: d:\movie stuff\quicktime\plugins\npqtplugin.dll
FF - plugin: d:\movie stuff\quicktime\plugins\npqtplugin2.dll
FF - plugin: d:\movie stuff\quicktime\plugins\npqtplugin3.dll
FF - plugin: d:\movie stuff\quicktime\plugins\npqtplugin4.dll
FF - plugin: d:\movie stuff\quicktime\plugins\npqtplugin5.dll
FF - plugin: d:\movie stuff\quicktime\plugins\npqtplugin6.dll
FF - plugin: d:\movie stuff\quicktime\plugins\npqtplugin7.dll
FF - Ext: Default: {972ce4c6-7e08-4474-a285-3208198ce6fd} - d:\browsers\mozilla firefox\extensions\{972ce4c6-7e08-4474-a285-3208198ce6fd}
FF - Ext: Java Console: {CAFEEFAC-0016-0000-0003-ABCDEFFEDCBA} - d:\browsers\mozilla firefox\extensions\{CAFEEFAC-0016-0000-0003-ABCDEFFEDCBA}
FF - Ext: Java Console: {CAFEEFAC-0016-0000-0024-ABCDEFFEDCBA} - d:\browsers\mozilla firefox\extensions\{CAFEEFAC-0016-0000-0024-ABCDEFFEDCBA}
FF - Ext: Java Quick Starter: jqs@sun.com - c:\program files\java\jre6\lib\deploy\jqs\ff
FF - Ext: Microsoft .NET Framework Assistant: {20a82645-c095-46ed-80e3-08825760534b} - c:\windows\microsoft.net\framework\v3.5\windows presentation foundation\DotNetAssistantExtension
FF - Ext: Microsoft .NET Framework Assistant: {20a82645-c095-46ed-80e3-08825760534b} - %profile%\extensions\{20a82645-c095-46ed-80e3-08825760534b}
FF - Ext: Adblock Plus: {d10d0bf8-f5b5-c8b4-a8b2-2b9879e08c5d} - %profile%\extensions\{d10d0bf8-f5b5-c8b4-a8b2-2b9879e08c5d}
FF - Ext: BetterCache: {f8454bbe-519f-4004-85c1-12d1b31988fc} - %profile%\extensions\{f8454bbe-519f-4004-85c1-12d1b31988fc}
FF - Ext: BetterPrivacy: {d40f5e7b-d2cf-4856-b441-cc613eeffbe3} - %profile%\extensions\{d40f5e7b-d2cf-4856-b441-cc613eeffbe3}
FF - Ext: CacheViewer: {71328583-3CA7-4809-B4BA-570A85818FBB} - %profile%\extensions\{71328583-3CA7-4809-B4BA-570A85818FBB}
FF - Ext: CS Lite: {00084897-021a-4361-8423-083407a033e0} - %profile%\extensions\{00084897-021a-4361-8423-083407a033e0}
FF - Ext: DownloadHelper: {b9db16a4-6edc-47ec-a1f4-b86292ed211d} - %profile%\extensions\{b9db16a4-6edc-47ec-a1f4-b86292ed211d}
FF - Ext: Download Statusbar: {D4DD63FA-01E4-46a7-B6B1-EDAB7D6AD389} - %profile%\extensions\{D4DD63FA-01E4-46a7-B6B1-EDAB7D6AD389}
FF - Ext: Element Hiding Helper for Adblock Plus: elemhidehelper@adblockplus.org - %profile%\extensions\elemhidehelper@adblockplus.org
FF - Ext: Extended Statusbar: {daf44bf7-a45e-4450-979c-91cf07434c3d} - %profile%\extensions\{daf44bf7-a45e-4450-979c-91cf07434c3d}
FF - Ext: FEBE: {4BBDD651-70CF-4821-84F8-2B918CF89CA3} - %profile%\extensions\{4BBDD651-70CF-4821-84F8-2B918CF89CA3}
FF - Ext: Firebug: firebug@software.joehewitt.com - %profile%\extensions\firebug@software.joehewitt.com
FF - Ext: Image Zoom: {1A2D0EC4-75F5-4c91-89C4-3656F6E44B68} - %profile%\extensions\{1A2D0EC4-75F5-4c91-89C4-3656F6E44B68}
FF - Ext: Link Alert: linkalert.conlan@addons.mozilla.com - %profile%\extensions\linkalert.conlan@addons.mozilla.com
FF - Ext: Live HTTP Headers: {8f8fe09b-0bd3-4470-bc1b-8cad42b8203a} - %profile%\extensions\{8f8fe09b-0bd3-4470-bc1b-8cad42b8203a}
FF - Ext: Live IP Address: {7C9AE782-DB21-4e40-81FB-AD8A53A6233A} - %profile%\extensions\{7C9AE782-DB21-4e40-81FB-AD8A53A6233A}
FF - Ext: MeasureIt: {75CEEE46-9B64-46f8-94BF-54012DE155F0} - %profile%\extensions\{75CEEE46-9B64-46f8-94BF-54012DE155F0}
FF - Ext: No-Referer : {e806da17-8400-4b6b-9c34-1bb4fe84aedc} - %profile%\extensions\{e806da17-8400-4b6b-9c34-1bb4fe84aedc}
FF - Ext: Organize Status Bar: {35106bca-6c78-48c7-ac28-56df30b51d2c} - %profile%\extensions\{35106bca-6c78-48c7-ac28-56df30b51d2c}
FF - Ext: NoUn Buttons: {99f30549-35d4-11d9-8a2a-396c6e707e82} - %profile%\extensions\{99f30549-35d4-11d9-8a2a-396c6e707e82}
FF - Ext: Old Location Bar: {3205B348-523A-4fac-9BC4-9939CBF583B0} - %profile%\extensions\{3205B348-523A-4fac-9BC4-9939CBF583B0}
FF - Ext: NoScript: {73a6fe31-595d-460b-a920-fcc0f8843232} - %profile%\extensions\{73a6fe31-595d-460b-a920-fcc0f8843232}
FF - Ext: Zoom toolbar: {FBFB7597-9E32-46b4-A500-8B6B0412777F} - %profile%\extensions\{FBFB7597-9E32-46b4-A500-8B6B0412777F}
FF - Ext: TooManyTabs: TooManyTabs@visibotech.com - %profile%\extensions\TooManyTabs@visibotech.com
FF - Ext: Update Notifier: {95f24680-9e31-11da-a746-0800200c9a66} - %profile%\extensions\{95f24680-9e31-11da-a746-0800200c9a66}
FF - Ext: Sxipper: sxipper@sxip.com - %profile%\extensions\sxipper@sxip.com
FF - Ext: Session Manager: {1280606b-2510-4fe0-97ef-9b5a22eafe30} - %profile%\extensions\{1280606b-2510-4fe0-97ef-9b5a22eafe30}
FF - Ext: Save Complete: savecomplete@perlprogrammer.com - %profile%\extensions\savecomplete@perlprogrammer.com
FF - Ext: RightToClick: {cd617375-6743-4ee8-bac4-fbf10f35729e} - %profile%\extensions\{cd617375-6743-4ee8-bac4-fbf10f35729e}
FF - Ext: QuickJava: {E6C1199F-E687-42da-8C24-E7770CC3AE66} - %profile%\extensions\{E6C1199F-E687-42da-8C24-E7770CC3AE66}
FF - Ext: PopupMaster: {35106bca-6c78-48c7-ac28-56df30b51d2d} - %profile%\extensions\{35106bca-6c78-48c7-ac28-56df30b51d2d}
FF - Ext: Zend Studio Toolbar: {3c9761ad-a43d-4447-b924-f5d83cb48063} - %profile%\extensions\{3c9761ad-a43d-4447-b924-f5d83cb48063}
.
---- FIREFOX POLICIES ----
FF - user.js: zend.ZDE_Path - d:\web\zend studio\ZendStudio.exe
.
============= SERVICES / DRIVERS ===============
.
P2 McShield;McAfee McShield;d:\system\network associates\virusscan\Mcshield.exe [2006-11-29 144960]
R2 McAfeeFramework;McAfee Framework Service;d:\system\network associates\common framework\FrameworkService.exe [2011-3-21 104000]
R2 McTaskManager;McAfee Task Manager;d:\system\network associates\virusscan\VsTskMgr.exe [2006-11-29 54872]
R2 PCToolsSSDMonitorSvc;PC Tools Startup and Shutdown Monitor service;c:\program files\common files\pc tools\smonitor\StartManSvc.exe [2011-6-30 583640]
R3 EverestDriver;Lavalys EVEREST Kernel Driver;d:\tools\everest\kerneld.wnt [2011-3-22 23152]
R3 HSFHWATI;HSFHWATI;c:\windows\system32\drivers\HSFHWATI.sys [2005-8-22 231424]
R3 mfeavfk;McAfee Inc.;c:\windows\system32\drivers\mfeavfk.sys [2011-3-21 72264]
R3 mfebopk;McAfee Inc.;c:\windows\system32\drivers\mfebopk.sys [2011-3-21 34152]
R3 mfehidk;McAfee Inc.;c:\windows\system32\drivers\mfehidk.sys [2011-3-21 168776]
S3 epmntdrv;epmntdrv;c:\windows\system32\epmntdrv.sys [2011-6-28 13192]
S3 EuGdiDrv;EuGdiDrv;c:\windows\system32\EuGdiDrv.sys [2011-6-28 8456]
S3 JL2005;JL2005A Toy Camera;c:\windows\system32\drivers\toywdm.sys [2005-5-9 71336]
S3 XDva375;XDva375;\??\c:\windows\system32\xdva375.sys --> c:\windows\system32\XDva375.sys [?]
.
=============== Created Last 30 ================
.
2011-07-01 01:33:44 -------- d-----w- c:\documents and settings\winds\application data\Registry Mechanic
2011-07-01 01:28:01 880640 ----a-w- c:\windows\system32\UniBox10.ocx
2011-07-01 01:28:01 212992 ----a-w- c:\windows\system32\UniBoxVB12.ocx
2011-07-01 01:28:01 1101824 ----a-w- c:\windows\system32\UniBox210.ocx
2011-07-01 01:28:00 -------- d-----w- c:\program files\common files\PC Tools
2011-06-29 20:43:17 -------- d-----w- c:\documents and settings\winds\application data\KeePass
2011-06-29 16:03:04 -------- d-----w- c:\documents and settings\winds\application data\GMetrixSMS
2011-06-28 22:06:38 86408 ----a-w- c:\windows\system32\setupempdrv03.exe
2011-06-28 22:06:38 8456 ----a-w- c:\windows\system32\EuGdiDrv.sys
2011-06-28 22:06:38 1774720 ----a-w- c:\windows\system32\BootMan.exe
2011-06-28 22:06:38 14848 ----a-w- c:\windows\system32\EuEpmGdi.dll
2011-06-28 22:06:38 13192 ----a-w- c:\windows\system32\epmntdrv.sys
2011-06-28 19:34:55 -------- d-----w- c:\windows\SxsCaPendDel
2011-06-28 19:16:49 105472 -c----w- c:\windows\system32\dllcache\mup.sys
2011-06-28 18:15:24 -------- d-----w- c:\program files\Microsoft Visual Studio 8
2011-06-28 18:14:40 -------- d-----w- c:\documents and settings\winds\local settings\application data\Microsoft Help
2011-06-07 16:35:34 103864 ----a-w- c:\program files\internet explorer\plugins\nppdf32.dll
.
==================== Find3M ====================
.
2011-05-02 15:31:52 692736 ----a-w- c:\windows\system32\inetcomm.dll
2011-04-29 17:25:27 151552 ----a-w- c:\windows\system32\schannel.dll
2011-04-29 16:19:43 456320 ----a-w- c:\windows\system32\drivers\mrxsmb.sys
2011-04-25 16:11:12 916480 ----a-w- c:\windows\system32\wininet.dll
2011-04-25 16:11:11 43520 ------w- c:\windows\system32\licmgr10.dll
2011-04-25 16:11:11 1469440 ----a-w- c:\windows\system32\inetcpl.cpl
2011-04-25 12:01:22 385024 ------w- c:\windows\system32\html.iec
2011-04-21 13:37:43 105472 ----a-w- c:\windows\system32\drivers\mup.sys
.
============= FINISH: 8:08:31.21 ===============

I do not see an Attachments Button, but I do have the "ark.txt and attach.txt" files ready if you need them put into a post.

Edited by boopme, 01 July 2011 - 09:24 PM.


BC AdBot (Login to Remove)

 


#2 poser3dart

poser3dart
  • Topic Starter

  • Members
  • 16 posts
  • OFFLINE
  •  
  • Local time:05:43 AM

Posted 07 July 2011 - 07:25 PM

It's been 7 days and no replies so I did some more digging. I found out what was causing the error. It is a hidden windows task schedule. It does not show in the task window nor did a HD or Reg. search find it, so I do not know where it is hidden at, as I could not find it.

To remove the error I had to disable Task Scheduler from admin/services. The file is called TOFGKEU.job, and as I said I have no idea where it is but would like to still find out so I can remove it and also know where it is.

I also notice I can attach files in this forum, so I'm guessing the forum I first posted in just doesn't allow it. So I will attach the 2 files that I couldn't before.

Attached Files



#3 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:10:43 AM

Posted 10 July 2011 - 06:43 PM

Hi,

Welcome to Bleeping Computer. My name is m0le and I will be helping you with your log.
  • Please subscribe to this topic, if you haven't already. Click the Watch This Topic button at the top on the right.

  • Please avoid installing/uninstalling or updating any programs and attempting any unsupervised fixes or scans. This can make helping you impossible.

  • Please reply to this post so I know you are there.
The forum is busy and we need to have replies as soon as possible. If I haven't had a reply after 3 days I will bump the topic and if you do not reply by the following day after that then I will close the topic.

Once I receive a reply then I will return with your first instructions.

Thanks :thumbup2:
Posted Image
m0le is a proud member of UNITE

#4 poser3dart

poser3dart
  • Topic Starter

  • Members
  • 16 posts
  • OFFLINE
  •  
  • Local time:05:43 AM

Posted 10 July 2011 - 10:19 PM

Hello m0le and thank you for looking into this.

#5 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:10:43 AM

Posted 11 July 2011 - 04:42 PM

The Gmer scan has some rootkit-like entries but I would like to see a couple more scans

  • Download TDSSKiller and save it to your Desktop.

  • Extract its contents to your desktop and make sure TDSSKiller.exe (the contents of the zipped file) is on the Desktop itself, not within a folder on the desktop.

  • Go to Start > Run (Or you can hold down your Windows key and press R) and copy and paste the following into the text field. (make sure you include the quote marks) Then press OK.

    "%userprofile%\Desktop\TDSSKiller.exe" -l report.txt

  • Now click Start Scan.
  • If Malicious objects are found, ensure Cure is selected then click Continue > Reboot now.
  • Click Close
  • Finally press Report and copy and paste the contents into your next reply. If you've rebooted then the log will be found at C:\


And

Please download aswMBR ( 511KB ) to your desktop.
  • Double click the aswMBR.exe icon to run it
  • Click the Scan button to start the scan
  • On completion of the scan, click the save log button, save it to your desktop and post it in your next reply.

Posted Image
m0le is a proud member of UNITE

#6 poser3dart

poser3dart
  • Topic Starter

  • Members
  • 16 posts
  • OFFLINE
  •  
  • Local time:05:43 AM

Posted 11 July 2011 - 06:29 PM

Here are the two reports:

Tdsskiller report:

2011/07/11 18:51:54.0734 0416 TDSS rootkit removing tool 2.5.9.0 Jul 1 2011 18:45:21
2011/07/11 18:51:55.0140 0416 ================================================================================
2011/07/11 18:51:55.0140 0416 SystemInfo:
2011/07/11 18:51:55.0140 0416
2011/07/11 18:51:55.0140 0416 OS Version: 5.1.2600 ServicePack: 3.0
2011/07/11 18:51:55.0140 0416 Product type: Workstation
2011/07/11 18:51:55.0140 0416 ComputerName: FAD-1SYNOU7NNH3
2011/07/11 18:51:55.0140 0416 UserName: Winds
2011/07/11 18:51:55.0140 0416 Windows directory: C:\WINDOWS
2011/07/11 18:51:55.0140 0416 System windows directory: C:\WINDOWS
2011/07/11 18:51:55.0140 0416 Processor architecture: Intel x86
2011/07/11 18:51:55.0140 0416 Number of processors: 1
2011/07/11 18:51:55.0140 0416 Page size: 0x1000
2011/07/11 18:51:55.0140 0416 Boot type: Normal boot
2011/07/11 18:51:55.0140 0416 ================================================================================
2011/07/11 18:51:56.0437 0416 Initialize success
2011/07/11 18:51:58.0093 1744 ================================================================================
2011/07/11 18:51:58.0093 1744 Scan started
2011/07/11 18:51:58.0093 1744 Mode: Manual;
2011/07/11 18:51:58.0093 1744 ================================================================================
2011/07/11 18:51:59.0171 1744 ACPI (8fd99680a539792a30e97944fdaecf17) C:\WINDOWS\system32\DRIVERS\ACPI.sys
2011/07/11 18:51:59.0234 1744 ACPIEC (9859c0f6936e723e4892d7141b1327d5) C:\WINDOWS\system32\DRIVERS\ACPIEC.sys
2011/07/11 18:51:59.0328 1744 aec (8bed39e3c35d6a489438b8141717a557) C:\WINDOWS\system32\drivers\aec.sys
2011/07/11 18:51:59.0390 1744 AFD (355556d9e580915118cd7ef736653a89) C:\WINDOWS\System32\drivers\afd.sys
2011/07/11 18:51:59.0609 1744 AmdK8 (0a4d13b388c814560bd69c3a496ecfa8) C:\WINDOWS\system32\DRIVERS\AmdK8.sys
2011/07/11 18:51:59.0687 1744 Arp1394 (b5b8a80875c1dededa8b02765642c32f) C:\WINDOWS\system32\DRIVERS\arp1394.sys
2011/07/11 18:51:59.0812 1744 AsyncMac (b153affac761e7f5fcfa822b9c4e97bc) C:\WINDOWS\system32\DRIVERS\asyncmac.sys
2011/07/11 18:51:59.0843 1744 atapi (9f3a2f5aa6875c72bf062c712cfa2674) C:\WINDOWS\system32\DRIVERS\atapi.sys
2011/07/11 18:51:59.0937 1744 ati2mtag (d81980c64543ba5c39dd2a92dc1d2daf) C:\WINDOWS\system32\DRIVERS\ati2mtag.sys
2011/07/11 18:52:00.0000 1744 Atmarpc (9916c1225104ba14794209cfa8012159) C:\WINDOWS\system32\DRIVERS\atmarpc.sys
2011/07/11 18:52:00.0046 1744 audstub (d9f724aa26c010a217c97606b160ed68) C:\WINDOWS\system32\DRIVERS\audstub.sys
2011/07/11 18:52:00.0140 1744 BCM43XX (37f385a93c620cbe0f89c17e45f697a1) C:\WINDOWS\system32\DRIVERS\bcmwl5.sys
2011/07/11 18:52:00.0203 1744 Beep (da1f27d85e0d1525f6621372e7b685e9) C:\WINDOWS\system32\drivers\Beep.sys
2011/07/11 18:52:00.0265 1744 Bridge (f934d1b230f84e1d19dd00ac5a7a83ed) C:\WINDOWS\system32\DRIVERS\bridge.sys
2011/07/11 18:52:00.0281 1744 BridgeMP (f934d1b230f84e1d19dd00ac5a7a83ed) C:\WINDOWS\system32\DRIVERS\bridge.sys
2011/07/11 18:52:00.0328 1744 CAMCAUD (c2ef37f09cfee9665e6cd7c0b0afb84f) C:\WINDOWS\system32\drivers\camc6aud.sys
2011/07/11 18:52:00.0390 1744 CAMCHALA (512df898de5c0654647acd5c82f0bd99) C:\WINDOWS\system32\drivers\camc6hal.sys
2011/07/11 18:52:00.0437 1744 cbidf2k (90a673fc8e12a79afbed2576f6a7aaf9) C:\WINDOWS\system32\drivers\cbidf2k.sys
2011/07/11 18:52:00.0468 1744 CCDECODE (0be5aef125be881c4f854c554f2b025c) C:\WINDOWS\system32\DRIVERS\CCDECODE.sys
2011/07/11 18:52:00.0531 1744 Cdaudio (c1b486a7658353d33a10cc15211a873b) C:\WINDOWS\system32\drivers\Cdaudio.sys
2011/07/11 18:52:00.0578 1744 Cdfs (c885b02847f5d2fd45a24e219ed93b32) C:\WINDOWS\system32\drivers\Cdfs.sys
2011/07/11 18:52:00.0625 1744 Cdrom (1f4260cc5b42272d71f79e570a27a4fe) C:\WINDOWS\system32\DRIVERS\cdrom.sys
2011/07/11 18:52:00.0703 1744 CmBatt (0f6c187d38d98f8df904589a5f94d411) C:\WINDOWS\system32\DRIVERS\CmBatt.sys
2011/07/11 18:52:00.0765 1744 Compbatt (6e4c9f21f0fae8940661144f41b13203) C:\WINDOWS\system32\DRIVERS\compbatt.sys
2011/07/11 18:52:00.0921 1744 DefragFS (d38c27df7b3e8840b4b92ed5c5c06c2c) C:\WINDOWS\system32\drivers\DefragFS.sys
2011/07/11 18:52:00.0968 1744 Disk (044452051f3e02e7963599fc8f4f3e25) C:\WINDOWS\system32\DRIVERS\disk.sys
2011/07/11 18:52:01.0046 1744 dmboot (d992fe1274bde0f84ad826acae022a41) C:\WINDOWS\system32\drivers\dmboot.sys
2011/07/11 18:52:01.0078 1744 dmio (7c824cf7bbde77d95c08005717a95f6f) C:\WINDOWS\system32\drivers\dmio.sys
2011/07/11 18:52:01.0140 1744 dmload (e9317282a63ca4d188c0df5e09c6ac5f) C:\WINDOWS\system32\drivers\dmload.sys
2011/07/11 18:52:01.0343 1744 DMusic (8a208dfcf89792a484e76c40e5f50b45) C:\WINDOWS\system32\drivers\DMusic.sys
2011/07/11 18:52:01.0437 1744 drmkaud (8f5fcff8e8848afac920905fbd9d33c8) C:\WINDOWS\system32\drivers\drmkaud.sys
2011/07/11 18:52:01.0484 1744 epmntdrv (f07ba56b0235f15eff8f10dc6389c42e) C:\WINDOWS\system32\epmntdrv.sys
2011/07/11 18:52:01.0546 1744 EuGdiDrv (1f2f4ab15ce03ecc257feb2f6dc5a013) C:\WINDOWS\system32\EuGdiDrv.sys
2011/07/11 18:52:01.0656 1744 EverestDriver (69c7c1f9b0b24f31604a68679bd07555) D:\tools\Everest\kerneld.wnt
2011/07/11 18:52:01.0718 1744 Fastfat (38d332a6d56af32635675f132548343e) C:\WINDOWS\system32\drivers\Fastfat.sys
2011/07/11 18:52:01.0765 1744 Fdc (92cdd60b6730b9f50f6a1a0c1f8cdc81) C:\WINDOWS\system32\drivers\Fdc.sys
2011/07/11 18:52:01.0796 1744 Fips (d45926117eb9fa946a6af572fbe1caa3) C:\WINDOWS\system32\drivers\Fips.sys
2011/07/11 18:52:01.0828 1744 Flpydisk (9d27e7b80bfcdf1cdd9b555862d5e7f0) C:\WINDOWS\system32\drivers\Flpydisk.sys
2011/07/11 18:52:01.0890 1744 FltMgr (b2cf4b0786f8212cb92ed2b50c6db6b0) C:\WINDOWS\system32\drivers\fltmgr.sys
2011/07/11 18:52:01.0953 1744 Fs_Rec (3e1e2bd4f39b0e2b7dc4f4d2bcc2779a) C:\WINDOWS\system32\drivers\Fs_Rec.sys
2011/07/11 18:52:02.0000 1744 Ftdisk (6ac26732762483366c3969c9e4d2259d) C:\WINDOWS\system32\DRIVERS\ftdisk.sys
2011/07/11 18:52:02.0046 1744 giveio (77ebf3e9386daa51551af429052d88d0) C:\WINDOWS\system32\giveio.sys
2011/07/11 18:52:02.0109 1744 Gpc (0a02c63c8b144bd8c86b103dee7c86a2) C:\WINDOWS\system32\DRIVERS\msgpc.sys
2011/07/11 18:52:02.0171 1744 HidBatt (748031ff4fe45ccc47546294905feab8) C:\WINDOWS\system32\DRIVERS\HidBatt.sys
2011/07/11 18:52:02.0218 1744 hidusb (ccf82c5ec8a7326c3066de870c06daf1) C:\WINDOWS\system32\DRIVERS\hidusb.sys
2011/07/11 18:52:02.0296 1744 HpqKbFiltr (35956140e686d53bf676cf0c778880fc) C:\WINDOWS\system32\DRIVERS\HpqKbFiltr.sys
2011/07/11 18:52:02.0359 1744 HSFHWATI (14794f142befc962ab142584607a6631) C:\WINDOWS\system32\DRIVERS\HSFHWATI.sys
2011/07/11 18:52:02.0421 1744 HSF_DPV (0e44af3828111d4c3e73c33ac95226d8) C:\WINDOWS\system32\DRIVERS\HSF_DPV.sys
2011/07/11 18:52:02.0484 1744 HTTP (f80a415ef82cd06ffaf0d971528ead38) C:\WINDOWS\system32\Drivers\HTTP.sys
2011/07/11 18:52:02.0578 1744 i8042prt (4a0b06aa8943c1e332520f7440c0aa30) C:\WINDOWS\system32\DRIVERS\i8042prt.sys
2011/07/11 18:52:02.0625 1744 Imapi (083a052659f5310dd8b6a6cb05edcf8e) C:\WINDOWS\system32\DRIVERS\imapi.sys
2011/07/11 18:52:02.0828 1744 ip6fw (3bb22519a194418d5fec05d800a19ad0) C:\WINDOWS\system32\drivers\ip6fw.sys
2011/07/11 18:52:02.0890 1744 IpFilterDriver (731f22ba402ee4b62748adaf6363c182) C:\WINDOWS\system32\DRIVERS\ipfltdrv.sys
2011/07/11 18:52:02.0921 1744 IpInIp (b87ab476dcf76e72010632b5550955f5) C:\WINDOWS\system32\DRIVERS\ipinip.sys
2011/07/11 18:52:02.0953 1744 IpNat (cc748ea12c6effde940ee98098bf96bb) C:\WINDOWS\system32\DRIVERS\ipnat.sys
2011/07/11 18:52:03.0000 1744 IPSec (23c74d75e36e7158768dd63d92789a91) C:\WINDOWS\system32\DRIVERS\ipsec.sys
2011/07/11 18:52:03.0031 1744 IRENUM (c93c9ff7b04d772627a3646d89f7bf89) C:\WINDOWS\system32\DRIVERS\irenum.sys
2011/07/11 18:52:03.0078 1744 isapnp (05a299ec56e52649b1cf2fc52d20f2d7) C:\WINDOWS\system32\DRIVERS\isapnp.sys
2011/07/11 18:52:03.0125 1744 JL2005 (816cd714e945def436564679f6b6777d) C:\WINDOWS\system32\Drivers\toywdm.sys
2011/07/11 18:52:03.0171 1744 Kbdclass (463c1ec80cd17420a542b7f36a36f128) C:\WINDOWS\system32\DRIVERS\kbdclass.sys
2011/07/11 18:52:03.0203 1744 kbdhid (9ef487a186dea361aa06913a75b3fa99) C:\WINDOWS\system32\DRIVERS\kbdhid.sys
2011/07/11 18:52:03.0250 1744 kmixer (692bcf44383d056aed41b045a323d378) C:\WINDOWS\system32\drivers\kmixer.sys
2011/07/11 18:52:03.0296 1744 KSecDD (b467646c54cc746128904e1654c750c1) C:\WINDOWS\system32\drivers\KSecDD.sys
2011/07/11 18:52:03.0437 1744 mdmxsdk (3c318b9cd391371bed62126581ee9961) C:\WINDOWS\system32\DRIVERS\mdmxsdk.sys
2011/07/11 18:52:03.0500 1744 mfeapfk (1f334eb2a13816df45671ebb98896da7) C:\WINDOWS\system32\drivers\mfeapfk.sys
2011/07/11 18:52:03.0531 1744 mfeavfk (8a1dedbbdad33587f6fad780ce4b34b5) C:\WINDOWS\system32\drivers\mfeavfk.sys
2011/07/11 18:52:03.0562 1744 mfebopk (d800e31a019a6979698eef0507baa746) C:\WINDOWS\system32\drivers\mfebopk.sys
2011/07/11 18:52:03.0625 1744 mfehidk (0ae14fab8e25c258c6ebf3827c649273) C:\WINDOWS\system32\drivers\mfehidk.sys
2011/07/11 18:52:03.0765 1744 mferkdk (e72afc5056f6804c616e7dc32a38945f) D:\system\Network Associates\VirusScan\mferkdk.sys
2011/07/11 18:52:03.0796 1744 mfetdik (a47f0f63e92730de15d41624ab998c5c) C:\WINDOWS\system32\drivers\mfetdik.sys
2011/07/11 18:52:03.0859 1744 mnmdd (4ae068242760a1fb6e1a44bf4e16afa6) C:\WINDOWS\system32\drivers\mnmdd.sys
2011/07/11 18:52:03.0906 1744 Modem (dfcbad3cec1c5f964962ae10e0bcc8e1) C:\WINDOWS\system32\drivers\Modem.sys
2011/07/11 18:52:03.0968 1744 Mouclass (35c9e97194c8cfb8430125f8dbc34d04) C:\WINDOWS\system32\DRIVERS\mouclass.sys
2011/07/11 18:52:04.0000 1744 mouhid (b1c303e17fb9d46e87a98e4ba6769685) C:\WINDOWS\system32\DRIVERS\mouhid.sys
2011/07/11 18:52:04.0046 1744 MountMgr (a80b9a0bad1b73637dbcbba7df72d3fd) C:\WINDOWS\system32\drivers\MountMgr.sys
2011/07/11 18:52:04.0125 1744 MRxDAV (11d42bb6206f33fbb3ba0288d3ef81bd) C:\WINDOWS\system32\DRIVERS\mrxdav.sys
2011/07/11 18:52:04.0203 1744 MRxSmb (0dc719e9b15e902346e87e9dcd5751fa) C:\WINDOWS\system32\DRIVERS\mrxsmb.sys
2011/07/11 18:52:04.0265 1744 Msfs (c941ea2454ba8350021d774daf0f1027) C:\WINDOWS\system32\drivers\Msfs.sys
2011/07/11 18:52:04.0312 1744 MSKSSRV (d1575e71568f4d9e14ca56b7b0453bf1) C:\WINDOWS\system32\drivers\MSKSSRV.sys
2011/07/11 18:52:04.0359 1744 MSPCLOCK (325bb26842fc7ccc1fcce2c457317f3e) C:\WINDOWS\system32\drivers\MSPCLOCK.sys
2011/07/11 18:52:04.0390 1744 MSPQM (bad59648ba099da4a17680b39730cb3d) C:\WINDOWS\system32\drivers\MSPQM.sys
2011/07/11 18:52:04.0421 1744 mssmbios (af5f4f3f14a8ea2c26de30f7a1e17136) C:\WINDOWS\system32\DRIVERS\mssmbios.sys
2011/07/11 18:52:04.0468 1744 MSTEE (e53736a9e30c45fa9e7b5eac55056d1d) C:\WINDOWS\system32\drivers\MSTEE.sys
2011/07/11 18:52:04.0531 1744 Mup (de6a75f5c270e756c5508d94b6cf68f5) C:\WINDOWS\system32\drivers\Mup.sys
2011/07/11 18:52:04.0578 1744 NABTSFEC (5b50f1b2a2ed47d560577b221da734db) C:\WINDOWS\system32\DRIVERS\NABTSFEC.sys
2011/07/11 18:52:04.0625 1744 NDIS (1df7f42665c94b825322fae71721130d) C:\WINDOWS\system32\drivers\NDIS.sys
2011/07/11 18:52:04.0671 1744 NdisIP (7ff1f1fd8609c149aa432f95a8163d97) C:\WINDOWS\system32\DRIVERS\NdisIP.sys
2011/07/11 18:52:04.0718 1744 NdisTapi (1ab3d00c991ab086e69db84b6c0ed78f) C:\WINDOWS\system32\DRIVERS\ndistapi.sys
2011/07/11 18:52:04.0750 1744 Ndisuio (f927a4434c5028758a842943ef1a3849) C:\WINDOWS\system32\DRIVERS\ndisuio.sys
2011/07/11 18:52:04.0796 1744 NdisWan (edc1531a49c80614b2cfda43ca8659ab) C:\WINDOWS\system32\DRIVERS\ndiswan.sys
2011/07/11 18:52:04.0843 1744 NDProxy (9282bd12dfb069d3889eb3fcc1000a9b) C:\WINDOWS\system32\drivers\NDProxy.sys
2011/07/11 18:52:04.0906 1744 NetBIOS (5d81cf9a2f1a3a756b66cf684911cdf0) C:\WINDOWS\system32\DRIVERS\netbios.sys
2011/07/11 18:52:04.0937 1744 NetBT (74b2b2f5bea5e9a3dc021d685551bd3d) C:\WINDOWS\system32\DRIVERS\netbt.sys
2011/07/11 18:52:05.0000 1744 NIC1394 (e9e47cfb2d461fa0fc75b7a74c6383ea) C:\WINDOWS\system32\DRIVERS\nic1394.sys
2011/07/11 18:52:05.0062 1744 Npfs (3182d64ae053d6fb034f44b6def8034a) C:\WINDOWS\system32\drivers\Npfs.sys
2011/07/11 18:52:05.0109 1744 Ntfs (78a08dd6a8d65e697c18e1db01c5cdca) C:\WINDOWS\system32\drivers\Ntfs.sys
2011/07/11 18:52:05.0187 1744 Null (73c1e1f395918bc2c6dd67af7591a3ad) C:\WINDOWS\system32\drivers\Null.sys
2011/07/11 18:52:05.0250 1744 NwlnkFlt (b305f3fad35083837ef46a0bbce2fc57) C:\WINDOWS\system32\DRIVERS\nwlnkflt.sys
2011/07/11 18:52:05.0265 1744 NwlnkFwd (c99b3415198d1aab7227f2c88fd664b9) C:\WINDOWS\system32\DRIVERS\nwlnkfwd.sys
2011/07/11 18:52:05.0343 1744 ohci1394 (ca33832df41afb202ee7aeb05145922f) C:\WINDOWS\system32\DRIVERS\ohci1394.sys
2011/07/11 18:52:05.0406 1744 Parport (5575faf8f97ce5e713d108c2a58d7c7c) C:\WINDOWS\system32\drivers\Parport.sys
2011/07/11 18:52:05.0437 1744 PartMgr (beb3ba25197665d82ec7065b724171c6) C:\WINDOWS\system32\drivers\PartMgr.sys
2011/07/11 18:52:05.0468 1744 ParVdm (70e98b3fd8e963a6a46a2e6247e0bea1) C:\WINDOWS\system32\drivers\ParVdm.sys
2011/07/11 18:52:05.0515 1744 PCI (a219903ccf74233761d92bef471a07b1) C:\WINDOWS\system32\DRIVERS\pci.sys
2011/07/11 18:52:05.0593 1744 PCIIde (ccf5f451bb1a5a2a522a76e670000ff0) C:\WINDOWS\system32\DRIVERS\pciide.sys
2011/07/11 18:52:05.0640 1744 Pcmcia (9e89ef60e9ee05e3f2eef2da7397f1c1) C:\WINDOWS\system32\DRIVERS\pcmcia.sys
2011/07/11 18:52:05.0890 1744 pfc (957b82ec80ad7ead64e5e47df6b0dc40) C:\WINDOWS\system32\drivers\pfc.sys
2011/07/11 18:52:05.0953 1744 PptpMiniport (efeec01b1d3cf84f16ddd24d9d9d8f99) C:\WINDOWS\system32\DRIVERS\raspptp.sys
2011/07/11 18:52:06.0000 1744 PQNTDrv (4228630829c0e521c43d882a00533374) C:\WINDOWS\system32\drivers\PQNTDrv.sys
2011/07/11 18:52:06.0031 1744 Processor (a32bebaf723557681bfc6bd93e98bd26) C:\WINDOWS\system32\DRIVERS\processr.sys
2011/07/11 18:52:06.0078 1744 PSched (09298ec810b07e5d582cb3a3f9255424) C:\WINDOWS\system32\DRIVERS\psched.sys
2011/07/11 18:52:06.0125 1744 Ptilink (80d317bd1c3dbc5d4fe7b1678c60cadd) C:\WINDOWS\system32\DRIVERS\ptilink.sys
2011/07/11 18:52:06.0281 1744 RasAcd (fe0d99d6f31e4fad8159f690d68ded9c) C:\WINDOWS\system32\DRIVERS\rasacd.sys
2011/07/11 18:52:06.0328 1744 Rasl2tp (11b4a627bc9614b885c4969bfa5ff8a6) C:\WINDOWS\system32\DRIVERS\rasl2tp.sys
2011/07/11 18:52:06.0375 1744 RasPppoe (5bc962f2654137c9909c3d4603587dee) C:\WINDOWS\system32\DRIVERS\raspppoe.sys
2011/07/11 18:52:06.0406 1744 Raspti (fdbb1d60066fcfbb7452fd8f9829b242) C:\WINDOWS\system32\DRIVERS\raspti.sys
2011/07/11 18:52:06.0453 1744 Rdbss (7ad224ad1a1437fe28d89cf22b17780a) C:\WINDOWS\system32\DRIVERS\rdbss.sys
2011/07/11 18:52:06.0468 1744 RDPCDD (4912d5b403614ce99c28420f75353332) C:\WINDOWS\system32\DRIVERS\RDPCDD.sys
2011/07/11 18:52:06.0531 1744 RDPWD (6728e45b66f93c08f11de2e316fc70dd) C:\WINDOWS\system32\drivers\RDPWD.sys
2011/07/11 18:52:06.0593 1744 redbook (f828dd7e1419b6653894a8f97a0094c5) C:\WINDOWS\system32\DRIVERS\redbook.sys
2011/07/11 18:52:06.0687 1744 RTL8023xp (eacd871fdbe85393d112782896c2d7dd) C:\WINDOWS\system32\DRIVERS\Rtnicxp.sys
2011/07/11 18:52:06.0734 1744 rtl8139 (d507c1400284176573224903819ffda3) C:\WINDOWS\system32\DRIVERS\RTL8139.SYS
2011/07/11 18:52:06.0812 1744 sdbus (8d04819a3ce51b9eb47e5689b44d43c4) C:\WINDOWS\system32\DRIVERS\sdbus.sys
2011/07/11 18:52:06.0859 1744 Secdrv (90a3935d05b494a5a39d37e71f09a677) C:\WINDOWS\system32\DRIVERS\secdrv.sys
2011/07/11 18:52:06.0906 1744 Serial (cca207a8896d4c6a0c9ce29a4ae411a7) C:\WINDOWS\system32\drivers\Serial.sys
2011/07/11 18:52:06.0968 1744 Sfloppy (8e6b8c671615d126fdc553d1e2de5562) C:\WINDOWS\system32\drivers\Sfloppy.sys
2011/07/11 18:52:07.0031 1744 SLIP (866d538ebe33709a5c9f5c62b73b7d14) C:\WINDOWS\system32\DRIVERS\SLIP.sys
2011/07/11 18:52:07.0109 1744 speedfan (5d6401db90ec81b71f8e2c5c8f0fef23) C:\WINDOWS\system32\speedfan.sys
2011/07/11 18:52:07.0156 1744 splitter (ab8b92451ecb048a4d1de7c3ffcb4a9f) C:\WINDOWS\system32\drivers\splitter.sys
2011/07/11 18:52:07.0218 1744 sptd (e8b705f9abe446aaf7a315ef8b4aea5a) C:\WINDOWS\System32\Drivers\sptd.sys
2011/07/11 18:52:07.0265 1744 sr (76bb022c2fb6902fd5bdd4f78fc13a5d) C:\WINDOWS\system32\DRIVERS\sr.sys
2011/07/11 18:52:07.0328 1744 Srv (47ddfc2f003f7f9f0592c6874962a2e7) C:\WINDOWS\system32\DRIVERS\srv.sys
2011/07/11 18:52:07.0390 1744 streamip (77813007ba6265c4b6098187e6ed79d2) C:\WINDOWS\system32\DRIVERS\StreamIP.sys
2011/07/11 18:52:07.0421 1744 swenum (3941d127aef12e93addf6fe6ee027e0f) C:\WINDOWS\system32\DRIVERS\swenum.sys
2011/07/11 18:52:07.0453 1744 swmidi (8ce882bcc6cf8a62f2b2323d95cb3d01) C:\WINDOWS\system32\drivers\swmidi.sys
2011/07/11 18:52:07.0625 1744 SynTP (0f332c0ba9b968ebc8cbb906416f8597) C:\WINDOWS\system32\DRIVERS\SynTP.sys
2011/07/11 18:52:07.0671 1744 sysaudio (8b83f3ed0f1688b4958f77cd6d2bf290) C:\WINDOWS\system32\drivers\sysaudio.sys
2011/07/11 18:52:07.0734 1744 Tcpip (9aefa14bd6b182d61e3119fa5f436d3d) C:\WINDOWS\system32\DRIVERS\tcpip.sys
2011/07/11 18:52:07.0765 1744 TDPIPE (6471a66807f5e104e4885f5b67349397) C:\WINDOWS\system32\drivers\TDPIPE.sys
2011/07/11 18:52:07.0796 1744 TDTCP (c56b6d0402371cf3700eb322ef3aaf61) C:\WINDOWS\system32\drivers\TDTCP.sys
2011/07/11 18:52:07.0843 1744 TermDD (88155247177638048422893737429d9e) C:\WINDOWS\system32\DRIVERS\termdd.sys
2011/07/11 18:52:07.0906 1744 tifm21 (e4c85c291ddb3dc5e4a2f227ca465ba6) C:\WINDOWS\system32\drivers\tifm21.sys
2011/07/11 18:52:07.0984 1744 Udfs (5787b80c2e3c5e2f56c2a233d91fa2c9) C:\WINDOWS\system32\drivers\Udfs.sys
2011/07/11 18:52:08.0062 1744 Update (402ddc88356b1bac0ee3dd1580c76a31) C:\WINDOWS\system32\DRIVERS\update.sys
2011/07/11 18:52:08.0125 1744 usbccgp (173f317ce0db8e21322e71b7e60a27e8) C:\WINDOWS\system32\DRIVERS\usbccgp.sys
2011/07/11 18:52:08.0171 1744 usbehci (65dcf09d0e37d4c6b11b5b0b76d470a7) C:\WINDOWS\system32\DRIVERS\usbehci.sys
2011/07/11 18:52:08.0203 1744 usbhub (1ab3cdde553b6e064d2e754efe20285c) C:\WINDOWS\system32\DRIVERS\usbhub.sys
2011/07/11 18:52:08.0250 1744 usbohci (0daecce65366ea32b162f85f07c6753b) C:\WINDOWS\system32\DRIVERS\usbohci.sys
2011/07/11 18:52:08.0281 1744 USBSTOR (a32426d9b14a089eaa1d922e0c5801a9) C:\WINDOWS\system32\DRIVERS\USBSTOR.SYS
2011/07/11 18:52:08.0312 1744 VgaSave (0d3a8fafceacd8b7625cd549757a7df1) C:\WINDOWS\System32\drivers\vga.sys
2011/07/11 18:52:08.0375 1744 VolSnap (4c8fcb5cc53aab716d810740fe59d025) C:\WINDOWS\system32\drivers\VolSnap.sys
2011/07/11 18:52:08.0453 1744 Wanarp (e20b95baedb550f32dd489265c1da1f6) C:\WINDOWS\system32\DRIVERS\wanarp.sys
2011/07/11 18:52:08.0515 1744 Wdf01000 (fd47474bd21794508af449d9d91af6e6) C:\WINDOWS\system32\DRIVERS\Wdf01000.sys
2011/07/11 18:52:08.0593 1744 wdmaud (6768acf64b18196494413695f0c3a00f) C:\WINDOWS\system32\drivers\wdmaud.sys
2011/07/11 18:52:08.0656 1744 winachsf (214bc3ad84907ad6ad655ac5465f449a) C:\WINDOWS\system32\DRIVERS\HSF_CNXT.sys
2011/07/11 18:52:08.0750 1744 WmiAcpi (c42584fd66ce9e17403aebca199f7bdb) C:\WINDOWS\system32\DRIVERS\wmiacpi.sys
2011/07/11 18:52:08.0796 1744 WSTCODEC (c98b39829c2bbd34e454150633c62c78) C:\WINDOWS\system32\DRIVERS\WSTCODEC.SYS
2011/07/11 18:52:08.0890 1744 MBR (0x1B8) (8f558eb6672622401da993e1e865c861) \Device\Harddisk0\DR0
2011/07/11 18:52:09.0031 1744 MBR (0x1B8) (8f558eb6672622401da993e1e865c861) \Device\Harddisk1\DR1
2011/07/11 18:52:09.0062 1744 Boot (0x1200) (6f9c8c104e7e6b6696b7cc7b8a43ae13) \Device\Harddisk0\DR0\Partition0
2011/07/11 18:52:09.0093 1744 Boot (0x1200) (af3ca850dcae4e97446006844d46942b) \Device\Harddisk0\DR0\Partition1
2011/07/11 18:52:09.0125 1744 Boot (0x1200) (c65b19c9bc4de764632a0d9c4254b555) \Device\Harddisk0\DR0\Partition2
2011/07/11 18:52:09.0171 1744 Boot (0x1200) (2399d7da533242ae25ff9a477757b9ef) \Device\Harddisk0\DR0\Partition3
2011/07/11 18:52:09.0203 1744 Boot (0x1200) (094007a8079660ee26a48e9f43b35cfa) \Device\Harddisk0\DR0\Partition4
2011/07/11 18:52:09.0218 1744 Boot (0x1200) (b1426007030dd3e4cddb93111c97929a) \Device\Harddisk1\DR1\Partition0
2011/07/11 18:52:09.0234 1744 Boot (0x1200) (0114f8919024fffe595f4c46708c1d4b) \Device\Harddisk1\DR1\Partition1
2011/07/11 18:52:09.0250 1744 Boot (0x1200) (026bf03c6a45d353749602c9ba4fc32d) \Device\Harddisk1\DR1\Partition2
2011/07/11 18:52:09.0609 1744 Boot (0x1200) (9f668265a93865ff6b036acea16d85e4) \Device\Harddisk1\DR1\Partition3
2011/07/11 18:52:09.0625 1744 Boot (0x1200) (2511951a03217d8b84fdaddf30e328c7) \Device\Harddisk1\DR1\Partition4
2011/07/11 18:52:09.0640 1744 ================================================================================
2011/07/11 18:52:09.0640 1744 Scan finished
2011/07/11 18:52:09.0640 1744 ================================================================================
2011/07/11 18:52:09.0656 0620 Detected object count: 0
2011/07/11 18:52:09.0656 0620 Actual detected object count: 0
2011/07/11 18:52:26.0734 2696 Deinitialize success


aswmbr report:

aswMBR version 0.9.7.705 Copyright© 2011 AVAST Software
Run date: 2011-07-11 18:54:28
-----------------------------
18:54:28.046 OS Version: Windows 5.1.2600 Service Pack 3
18:54:28.046 Number of processors: 1 586 0x2402
18:54:28.046 ComputerName: FAD-1SYNOU7NNH3 UserName: Winds
18:54:28.250 Initialize success
18:56:07.937 AVAST engine defs: 11071101
18:56:31.937 Disk 0 (boot) \Device\Harddisk0\DR0 -> \Device\Ide\IdeDeviceP0T0L0-4
18:56:31.937 Disk 0 Vendor: WDC_WD3200BEVE-00A0HT0 11.01A11 Size: 305245MB BusType: 3
18:56:31.937 Disk 1 \Device\Harddisk1\DR1 -> \Device\Ide\IdeDeviceP0T1L0-c
18:56:31.937 Disk 1 Vendor: WDC_WD3200BEVE-00A0HT0 11.01A11 Size: 305245MB BusType: 3
18:56:33.953 Disk 0 MBR read successfully
18:56:33.953 Disk 0 MBR scan
18:56:33.953 Disk 0 Windows XP default MBR code
18:56:35.953 Disk 0 scanning sectors +625137345
18:56:35.968 Disk 0 scanning C:\WINDOWS\system32\drivers
18:56:50.718 Service scanning
18:56:52.140 Disk 0 trace - called modules:
18:56:52.171 ntkrnlpa.exe CLASSPNP.SYS disk.sys ACPI.sys hal.dll atapi.sys pciide.sys PCIIDEX.SYS
18:56:52.171 1 nt!IofCallDriver -> \Device\Harddisk0\DR0[0x89951ab8]
18:56:52.687 3 CLASSPNP.SYS[ba108fd7] -> nt!IofCallDriver -> \Device\00000076[0x899b61a8]
18:56:52.687 5 ACPI.sys[b9f7f620] -> nt!IofCallDriver -> \Device\Ide\IdeDeviceP0T0L0-4[0x899ec940]
18:56:53.187 AVAST engine scan C:\WINDOWS
19:11:06.312 File: C:\WINDOWS\system32\javak.dll **INFECTED** Win32:MalOb-EI [Cryp]
19:14:04.875 AVAST engine scan C:\Documents and Settings\Winds
19:17:24.359 AVAST engine scan C:\Documents and Settings\All Users
19:24:17.015 Scan finished successfully
19:26:35.843 Disk 0 MBR has been saved successfully to "C:\Documents and Settings\Winds\Desktop\MBR.dat"
19:26:35.843 The log file has been saved successfully to "C:\Documents and Settings\Winds\Desktop\aswMBR.txt"

#7 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:10:43 AM

Posted 11 July 2011 - 07:39 PM

javak.dll is not known to me but for now we will leave it and see if Combofix is familiar with it.

Please download ComboFix from one of these locations:* IMPORTANT !!! Save ComboFix.exe to your Desktop making sure you rename it comfix.exe
  • Disable your AntiVirus and AntiSpyware applications including Firewalls, usually via a right click on the System Tray icon. They may otherwise interfere with our tools. (Click on this link to see a list of programs that should be disabled. The list is not all inclusive.)
  • Double click on Comfix.exe & follow the prompts.
  • As part of it's process, ComboFix will check to see if the Microsoft Windows Recovery Console is installed. With malware infections being as they are today, it's strongly recommended to have this pre-installed on your machine before doing any malware removal. It will allow you to boot up into a special recovery/repair mode that will allow us to more easily help you should your computer have a problem after an attempted removal of malware.
  • Follow the prompts to allow ComboFix to download and install the Microsoft Windows Recovery Console, and when prompted, agree to the End-User License Agreement to install the Microsoft Windows Recovery Console.
**Please note: If the Microsoft Windows Recovery Console is already installed, ComboFix will continue it's malware removal procedures.

Posted Image


Once the Microsoft Windows Recovery Console is installed using ComboFix, you should see the following message:

Posted Image


Click on Yes, to continue scanning for malware.

When finished, it shall produce a log for you. Please include the C:\ComboFix.txt in your next reply.
Posted Image
m0le is a proud member of UNITE

#8 poser3dart

poser3dart
  • Topic Starter

  • Members
  • 16 posts
  • OFFLINE
  •  
  • Local time:05:43 AM

Posted 11 July 2011 - 08:40 PM

ComboFix 11-07-11.02 - Winds 07/11/2011 21:26:54.1.1 - x86
Microsoft Windows XP Home Edition 5.1.2600.3.1252.1.1033.18.1406.720 [GMT -4:00]
Running from: c:\documents and settings\Winds\Desktop\comfix.exe
AV: McAfee VirusScan Enterprise *Disabled/Updated* {918A2B0B-2C60-4016-A4AB-E868DEABF7F0}
* Created a new restore point
.
.
((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.
.
c:\documents and settings\Winds\WINDOWS
c:\windows\system32\drivers\npf.sys
c:\windows\system32\Packet.dll
c:\windows\system32\WanPacket.dll
c:\windows\system32\wpcap.dll
.
.
((((((((((((((((((((((((( Files Created from 2011-06-12 to 2011-07-12 )))))))))))))))))))))))))))))))
.
.
2011-07-02 00:56 . 2011-07-02 00:56 -------- d-----w- c:\program files\MSECache
2011-07-01 01:33 . 2011-07-01 01:33 -------- d-----w- c:\documents and settings\Winds\Application Data\Registry Mechanic
2011-07-01 01:28 . 2008-04-02 20:54 1101824 ----a-w- c:\windows\system32\UniBox210.ocx
2011-07-01 01:28 . 2008-04-02 20:53 212992 ----a-w- c:\windows\system32\UniBoxVB12.ocx
2011-07-01 01:28 . 2008-04-02 20:53 880640 ----a-w- c:\windows\system32\UniBox10.ocx
2011-07-01 01:28 . 2011-07-01 01:28 -------- d-----w- c:\program files\Common Files\PC Tools
2011-06-29 20:43 . 2011-07-08 01:13 -------- d-----w- c:\documents and settings\Winds\Application Data\KeePass
2011-06-29 16:03 . 2011-06-29 16:03 -------- d-----w- c:\documents and settings\Winds\Application Data\GMetrixSMS
2011-06-28 22:06 . 2010-07-27 22:42 1774720 ----a-w- c:\windows\system32\BootMan.exe
2011-06-28 22:06 . 2010-07-15 12:44 86408 ----a-w- c:\windows\system32\setupempdrv03.exe
2011-06-28 22:06 . 2010-07-15 12:44 8456 ----a-w- c:\windows\system32\EuGdiDrv.sys
2011-06-28 22:06 . 2010-07-15 12:44 13192 ----a-w- c:\windows\system32\epmntdrv.sys
2011-06-28 22:06 . 2010-07-15 12:44 14848 ----a-w- c:\windows\system32\EuEpmGdi.dll
2011-06-28 19:34 . 2011-06-28 19:39 -------- d-----w- c:\windows\SxsCaPendDel
2011-06-28 19:16 . 2011-04-21 13:37 105472 -c----w- c:\windows\system32\dllcache\mup.sys
2011-06-28 18:20 . 2011-06-28 18:26 -------- d-----w- c:\program files\Microsoft Works
2011-06-28 18:19 . 2011-06-28 18:19 -------- d-----w- c:\program files\Microsoft.NET
2011-06-28 18:15 . 2011-06-28 18:15 -------- d-----w- c:\program files\Microsoft Visual Studio 8
2011-06-28 18:14 . 2011-06-28 18:14 -------- d-----w- c:\documents and settings\Winds\Local Settings\Application Data\Microsoft Help
2011-06-28 18:14 . 2011-06-29 17:24 -------- d-----w- c:\documents and settings\All Users\Application Data\Microsoft Help
.
.
.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2011-05-02 15:31 . 2011-03-22 00:12 692736 ----a-w- c:\windows\system32\inetcomm.dll
2011-04-29 17:25 . 2003-03-31 19:00 151552 ----a-w- c:\windows\system32\schannel.dll
2011-04-29 16:19 . 2003-03-31 19:00 456320 ----a-w- c:\windows\system32\drivers\mrxsmb.sys
2011-04-25 16:11 . 2003-03-31 19:00 916480 ----a-w- c:\windows\system32\wininet.dll
2011-04-25 16:11 . 2003-03-31 19:00 43520 ------w- c:\windows\system32\licmgr10.dll
2011-04-25 16:11 . 2003-03-31 19:00 1469440 ----a-w- c:\windows\system32\inetcpl.cpl
2011-04-25 12:01 . 2011-03-22 01:16 385024 ------w- c:\windows\system32\html.iec
2011-04-21 13:37 . 2003-03-31 19:00 105472 ----a-w- c:\windows\system32\drivers\mup.sys
.
.
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4
.
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"EVEREST AutoStart"="d:\tools\Everest\everest.exe" [2008-03-27 2085472]
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"SynTPStart"="c:\program files\Synaptics\SynTP\SynTPStart.exe" [2007-09-15 102400]
"SynTPEnh"="c:\program files\Synaptics\SynTP\SynTPEnh.exe" [2007-09-15 1015808]
"ShStatEXE"="d:\system\Network Associates\VirusScan\SHSTAT.EXE" [2006-11-29 112216]
"QlbCtrl.exe"="c:\program files\Hewlett-Packard\HP Quick Launch Buttons\QlbCtrl.exe" [2007-10-19 202032]
"McAfeeUpdaterUI"="d:\system\Network Associates\Common Framework\UdaterUI.exe" [2006-11-17 136768]
"KeePass 2 PreLoad"="d:\tools\KeePass Password Safe 2\KeePass.exe" [2011-04-10 1733120]
"hpWirelessAssistant"="c:\program files\hpq\HP Wireless Assistant\HP Wireless Assistant.exe" [2005-12-13 507904]
"ATIPTA"="c:\program files\ATI Technologies\ATI Control Panel\atiptaxx.exe" [2005-12-02 344064]
"Adobe Reader Speed Launcher"="d:\apps\adobe\Reader 9.0\Reader\Reader_sl.exe" [2011-06-08 37296]
"Adobe ARM"="c:\program files\Common Files\Adobe\ARM\1.0\AdobeARM.exe" [2011-03-30 937920]
.
c:\documents and settings\Winds\Start Menu\Programs\Startup\
Cookie Pal.lnk - d:\tools\CPal\CPal.exe [2011-4-18 372775]
FreePOPs.lnk - d:\system\FreePOPs\freepopsd.exe [2011-4-20 49152]
.
[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\session manager]
BootExecute REG_MULTI_SZ pdboot.exe\0autocheck autochk *\0oodbs
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\Wdf01000.sys]
@="Driver"
.
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]
"EnableFirewall"= 0 (0x0)
.
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"d:\\system\\Network Associates\\Common Framework\\FrameworkService.exe"=
"c:\\WINDOWS\\system32\\sessmgr.exe"=
"d:\\tools\\TeamViewer\\Version5\\TeamViewer.exe"=
"c:\\Program Files\\TeamViewer\\Version6\\TeamViewer.exe"=
"c:\\Program Files\\TeamViewer\\Version6\\TeamViewer_Service.exe"=
"d:\\apps\\Microsoft Office\\Office12\\OUTLOOK.EXE"=
"k:\\wamp\\bin\\apache\\Apache2.2.11\\bin\\httpd.exe"=
"C:0\\EQ2\\EQ2VoiceService.exe"=
"e:\\Half-Life\\hl.exe"=
.
R2 PCToolsSSDMonitorSvc;PC Tools Startup and Shutdown Monitor service;c:\program files\Common Files\PC Tools\sMonitor\StartManSvc.exe [6/30/2011 9:28 PM 583640]
R3 HSFHWATI;HSFHWATI;c:\windows\system32\drivers\HSFHWATI.sys [8/22/2005 3:06 PM 231424]
S3 epmntdrv;epmntdrv;c:\windows\system32\epmntdrv.sys [6/28/2011 6:06 PM 13192]
S3 EuGdiDrv;EuGdiDrv;c:\windows\system32\EuGdiDrv.sys [6/28/2011 6:06 PM 8456]
S3 JL2005;JL2005A Toy Camera;c:\windows\system32\drivers\toywdm.sys [5/9/2005 8:22 PM 71336]
S3 XDva375;XDva375;\??\c:\windows\system32\XDva375.sys --> c:\windows\system32\XDva375.sys [?]
S4 sptd;sptd;c:\windows\system32\drivers\sptd.sys [3/22/2011 1:04 PM 646392]
.
Contents of the 'Scheduled Tasks' folder
.
.
------- Supplementary Scan -------
.
uStart Page = hxxp://www.google.com/
uInternet Connection Wizard,ShellNext = hxxp://h50203.www5.hp.com/HPISWeb/customer/DeviceMgrErrorCode.aspx?code=28
IE: E&xport to Microsoft Excel - d:\apps\MICROS~2\Office12\EXCEL.EXE/3000
IE: Zend Studio - Debug current page - d:\web\Zend Studio\toolbars\ZendIEToolbar.dll/DebugCurrent.html
IE: Zend Studio - Debug next page - d:\web\Zend Studio\toolbars\ZendIEToolbar.dll/DebugNext.html
TCP: DhcpNameServer = 192.168.1.1
Handler: qv - {0B4BB6DC-D020-4173-97F2-3AD91AFD6559} - d:\bible\QuickVerse 2010\QuickVerse 2010\qvprotwrapper.dll
FF - ProfilePath - c:\documents and settings\Winds\Application Data\Mozilla\Firefox\Profiles\379b6glz.default\
FF - Ext: Default: {972ce4c6-7e08-4474-a285-3208198ce6fd} - d:\browsers\Mozilla Firefox\extensions\{972ce4c6-7e08-4474-a285-3208198ce6fd}
FF - Ext: Java Console: {CAFEEFAC-0016-0000-0003-ABCDEFFEDCBA} - d:\browsers\Mozilla Firefox\extensions\{CAFEEFAC-0016-0000-0003-ABCDEFFEDCBA}
FF - Ext: Java Console: {CAFEEFAC-0016-0000-0024-ABCDEFFEDCBA} - d:\browsers\Mozilla Firefox\extensions\{CAFEEFAC-0016-0000-0024-ABCDEFFEDCBA}
FF - Ext: Java Quick Starter: jqs@sun.com - c:\program files\Java\jre6\lib\deploy\jqs\ff
FF - Ext: Microsoft .NET Framework Assistant: {20a82645-c095-46ed-80e3-08825760534b} - c:\windows\Microsoft.NET\Framework\v3.5\Windows Presentation Foundation\DotNetAssistantExtension
FF - Ext: Microsoft .NET Framework Assistant: {20a82645-c095-46ed-80e3-08825760534b} - %profile%\extensions\{20a82645-c095-46ed-80e3-08825760534b}
FF - Ext: Adblock Plus: {d10d0bf8-f5b5-c8b4-a8b2-2b9879e08c5d} - %profile%\extensions\{d10d0bf8-f5b5-c8b4-a8b2-2b9879e08c5d}
FF - Ext: BetterCache: {f8454bbe-519f-4004-85c1-12d1b31988fc} - %profile%\extensions\{f8454bbe-519f-4004-85c1-12d1b31988fc}
FF - Ext: BetterPrivacy: {d40f5e7b-d2cf-4856-b441-cc613eeffbe3} - %profile%\extensions\{d40f5e7b-d2cf-4856-b441-cc613eeffbe3}
FF - Ext: CacheViewer: {71328583-3CA7-4809-B4BA-570A85818FBB} - %profile%\extensions\{71328583-3CA7-4809-B4BA-570A85818FBB}
FF - Ext: CS Lite: {00084897-021a-4361-8423-083407a033e0} - %profile%\extensions\{00084897-021a-4361-8423-083407a033e0}
FF - Ext: DownloadHelper: {b9db16a4-6edc-47ec-a1f4-b86292ed211d} - %profile%\extensions\{b9db16a4-6edc-47ec-a1f4-b86292ed211d}
FF - Ext: Download Statusbar: {D4DD63FA-01E4-46a7-B6B1-EDAB7D6AD389} - %profile%\extensions\{D4DD63FA-01E4-46a7-B6B1-EDAB7D6AD389}
FF - Ext: Element Hiding Helper for Adblock Plus: elemhidehelper@adblockplus.org - %profile%\extensions\elemhidehelper@adblockplus.org
FF - Ext: Extended Statusbar: {daf44bf7-a45e-4450-979c-91cf07434c3d} - %profile%\extensions\{daf44bf7-a45e-4450-979c-91cf07434c3d}
FF - Ext: FEBE: {4BBDD651-70CF-4821-84F8-2B918CF89CA3} - %profile%\extensions\{4BBDD651-70CF-4821-84F8-2B918CF89CA3}
FF - Ext: Firebug: firebug@software.joehewitt.com - %profile%\extensions\firebug@software.joehewitt.com
FF - Ext: Image Zoom: {1A2D0EC4-75F5-4c91-89C4-3656F6E44B68} - %profile%\extensions\{1A2D0EC4-75F5-4c91-89C4-3656F6E44B68}
FF - Ext: Link Alert: linkalert.conlan@addons.mozilla.com - %profile%\extensions\linkalert.conlan@addons.mozilla.com
FF - Ext: Live HTTP Headers: {8f8fe09b-0bd3-4470-bc1b-8cad42b8203a} - %profile%\extensions\{8f8fe09b-0bd3-4470-bc1b-8cad42b8203a}
FF - Ext: Live IP Address: {7C9AE782-DB21-4e40-81FB-AD8A53A6233A} - %profile%\extensions\{7C9AE782-DB21-4e40-81FB-AD8A53A6233A}
FF - Ext: MeasureIt: {75CEEE46-9B64-46f8-94BF-54012DE155F0} - %profile%\extensions\{75CEEE46-9B64-46f8-94BF-54012DE155F0}
FF - Ext: No-Referer : {e806da17-8400-4b6b-9c34-1bb4fe84aedc} - %profile%\extensions\{e806da17-8400-4b6b-9c34-1bb4fe84aedc}
FF - Ext: Organize Status Bar: {35106bca-6c78-48c7-ac28-56df30b51d2c} - %profile%\extensions\{35106bca-6c78-48c7-ac28-56df30b51d2c}
FF - Ext: NoUn Buttons: {99f30549-35d4-11d9-8a2a-396c6e707e82} - %profile%\extensions\{99f30549-35d4-11d9-8a2a-396c6e707e82}
FF - Ext: Old Location Bar: {3205B348-523A-4fac-9BC4-9939CBF583B0} - %profile%\extensions\{3205B348-523A-4fac-9BC4-9939CBF583B0}
FF - Ext: NoScript: {73a6fe31-595d-460b-a920-fcc0f8843232} - %profile%\extensions\{73a6fe31-595d-460b-a920-fcc0f8843232}
FF - Ext: Zoom toolbar: {FBFB7597-9E32-46b4-A500-8B6B0412777F} - %profile%\extensions\{FBFB7597-9E32-46b4-A500-8B6B0412777F}
FF - Ext: TooManyTabs: TooManyTabs@visibotech.com - %profile%\extensions\TooManyTabs@visibotech.com
FF - Ext: Update Notifier: {95f24680-9e31-11da-a746-0800200c9a66} - %profile%\extensions\{95f24680-9e31-11da-a746-0800200c9a66}
FF - Ext: Sxipper: sxipper@sxip.com - %profile%\extensions\sxipper@sxip.com
FF - Ext: Session Manager: {1280606b-2510-4fe0-97ef-9b5a22eafe30} - %profile%\extensions\{1280606b-2510-4fe0-97ef-9b5a22eafe30}
FF - Ext: Save Complete: savecomplete@perlprogrammer.com - %profile%\extensions\savecomplete@perlprogrammer.com
FF - Ext: RightToClick: {cd617375-6743-4ee8-bac4-fbf10f35729e} - %profile%\extensions\{cd617375-6743-4ee8-bac4-fbf10f35729e}
FF - Ext: QuickJava: {E6C1199F-E687-42da-8C24-E7770CC3AE66} - %profile%\extensions\{E6C1199F-E687-42da-8C24-E7770CC3AE66}
FF - Ext: PopupMaster: {35106bca-6c78-48c7-ac28-56df30b51d2d} - %profile%\extensions\{35106bca-6c78-48c7-ac28-56df30b51d2d}
FF - Ext: Zend Studio Toolbar: {3c9761ad-a43d-4447-b924-f5d83cb48063} - %profile%\extensions\{3c9761ad-a43d-4447-b924-f5d83cb48063}
FF - user.js: zend.ZDE_Path - d:\web\Zend Studio\ZendStudio.exe
.
- - - - ORPHANS REMOVED - - - -
.
AddRemove-LifeGlobe Goldfish Aquarium_is1 - c:\program files\Prolific Publishing
AddRemove-LifeGlobe Sharks, Terrors of the Deep_is1 - c:\program files\Prolific Publishing
AddRemove-TweakUI - c:\windows\rundll32.exe
.
.
.
**************************************************************************
.
catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2011-07-11 21:29
Windows 5.1.2600 Service Pack 3 NTFS
.
scanning hidden processes ...
.
scanning hidden autostart entries ...
.
scanning hidden files ...
.
scan completed successfully
hidden files: 0
.
**************************************************************************
.
--------------------- LOCKED REGISTRY KEYS ---------------------
.
[HKEY_USERS\S-1-5-21-527237240-1645522239-839522115-1004\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved\{C2EC4949-9320-180B-8858-2965447CABFF}*]
@Allowed: (Read) (RestrictedCode)
@Allowed: (Read) (RestrictedCode)
"nappbdimoolfnegobolmchachhob"=hex:6a,61,6c,65,68,6d,6e,61,6b,66,64,67,6b,69,
70,6e,6e,70,68,6f,00,f3
"mafplahmclljledkkjdpoceked"=hex:6a,61,6c,65,68,6d,6e,61,6b,66,64,67,6b,69,70,
6e,6e,70,68,6f,00,f3
"dblojpnepfeniepajhbkgikkhggafkmbmohldkhd"=hex:6b,61,66,70,6c,61,68,6e,63,68,
6d,69,64,67,66,70,66,65,64,69,64,70,00,06
"cblojpnepfeniepajhbkgikkhglpijgmfjjijl"=hex:68,61,67,64,67,6d,6a,63,68,6a,6c,
63,61,6e,69,69,00,e4
"cblojpnepfeniepajhbkgikkhgiabdkgdcalem"=hex:67,61,62,65,68,6c,66,70,63,65,67,
65,67,64,00,69
.
[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{C2EC4949-9320-180B-8858-2965447CABFF}\InProcServer32*]
"ebjpmlnkhoffclkodoffjaldkhdbckloofojnmkpfi"=hex:6b,61,66,70,6c,61,68,6e,63,68,
6d,69,64,67,66,70,66,65,64,69,64,70,00,06
"dbjpmlnkhoffclkodoffjaldkhdbfkhgkjlopndj"=hex:68,61,67,64,67,6d,6a,63,68,6a,
6c,63,61,6e,69,69,00,e4
"dbjpmlnkhoffclkodoffjaldkhdbanbpopjbgjoj"=hex:67,61,62,65,68,6c,66,70,63,65,
67,65,67,64,00,69
.
[HKEY_LOCAL_MACHINE\software\Microsoft\Windows\CurrentVersion\Reinstall\:wjY*]
"DisplayName"="??\18\17?\11\09"
"DeviceDesc"="??\18\17?\11\09"
"ProviderName"="???\11?\16?\11??"
"MFG"="???????"
"ReinstallString"=".10.1000.4"
"DeviceInstanceIds"=multi:"c:\\swsetup\\sp32048\\sbdrv\\smbus\\smbusati.inf\00"
.
[HKEY_LOCAL_MACHINE\software\Microsoft\Windows\CurrentVersion\System*]
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
.
--------------------- DLLs Loaded Under Running Processes ---------------------
.
- - - - - - - > 'winlogon.exe'(840)
c:\windows\system32\Ati2evxx.dll
.
Completion time: 2011-07-11 21:31:35
ComboFix-quarantined-files.txt 2011-07-12 01:31
.
Pre-Run: 34,920,013,824 bytes free
Post-Run: 35,073,679,360 bytes free
.
WindowsXP-KB310994-SP2-Home-BootDisk-ENU.exe
[boot loader]
timeout=2
default=multi(0)disk(0)rdisk(0)partition(1)\WINDOWS
[operating systems]
c:\cmdcons\BOOTSECT.DAT="Microsoft Windows Recovery Console" /cmdcons
UnsupportedDebug="do not select this" /debug
multi(0)disk(0)rdisk(0)partition(1)\WINDOWS="Microsoft Windows XP Home Edition" /fastdetect /usepmtimer /NoExecute=OptIn
.
- - End Of File - - 89D9F5016AC56092819C44E8441CD41F

#9 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:10:43 AM

Posted 12 July 2011 - 04:25 PM

Rerun Combofix with the following script, shown below

1. Close any open browsers.

2. Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.

3. Open notepad and copy/paste the text in the box below into it:

File::
C:\WINDOWS\system32\javak.dll

RegNull::
[HKEY_USERS\S-1-5-21-527237240-1645522239-839522115-1004\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved\{C2EC4949-9320-180B-8858-2965447CABFF}*]
[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{C2EC4949-9320-180B-8858-2965447CABFF}\InProcServer32*]
[HKEY_LOCAL_MACHINE\software\Microsoft\Windows\CurrentVersion\Reinstall\:wjY*]
[HKEY_LOCAL_MACHINE\software\Microsoft\Windows\CurrentVersion\System*]


Save this as CFScript.txt, in the same location as Comfix.exe (called ComboFix.exe in the below graphic)


Posted Image

Refering to the picture above, drag CFScript into ComboFix.exe

If the program requests for you to update Combofix then click Yes.

When finished, it shall produce a log for you at C:\ComboFix.txt which I will require in your next reply.
Posted Image
m0le is a proud member of UNITE

#10 poser3dart

poser3dart
  • Topic Starter

  • Members
  • 16 posts
  • OFFLINE
  •  
  • Local time:05:43 AM

Posted 12 July 2011 - 05:02 PM

the new log

ComboFix 11-07-12.09 - Winds 07/12/2011 17:55:02.2.1 - x86
Microsoft Windows XP Home Edition 5.1.2600.3.1252.1.1033.18.1406.918 [GMT -4:00]
Running from: c:\documents and settings\Winds\Desktop\comfix.exe
Command switches used :: c:\documents and settings\Winds\Desktop\CFScript.txt
AV: McAfee VirusScan Enterprise *Disabled/Updated* {918A2B0B-2C60-4016-A4AB-E868DEABF7F0}
.
FILE ::
"c:\windows\system32\javak.dll"
.
.
((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.
.
c:\windows\system32\javak.dll
.
.
((((((((((((((((((((((((( Files Created from 2011-06-12 to 2011-07-12 )))))))))))))))))))))))))))))))
.
.
2011-07-12 21:53 . 2011-07-12 21:53 -------- d-----w- C:\comfix
2011-07-02 00:56 . 2011-07-02 00:56 -------- d-----w- c:\program files\MSECache
2011-07-01 01:33 . 2011-07-01 01:33 -------- d-----w- c:\documents and settings\Winds\Application Data\Registry Mechanic
2011-07-01 01:28 . 2008-04-02 20:54 1101824 ----a-w- c:\windows\system32\UniBox210.ocx
2011-07-01 01:28 . 2008-04-02 20:53 212992 ----a-w- c:\windows\system32\UniBoxVB12.ocx
2011-07-01 01:28 . 2008-04-02 20:53 880640 ----a-w- c:\windows\system32\UniBox10.ocx
2011-07-01 01:28 . 2011-07-01 01:28 -------- d-----w- c:\program files\Common Files\PC Tools
2011-06-29 20:43 . 2011-07-08 01:13 -------- d-----w- c:\documents and settings\Winds\Application Data\KeePass
2011-06-29 16:03 . 2011-06-29 16:03 -------- d-----w- c:\documents and settings\Winds\Application Data\GMetrixSMS
2011-06-28 22:06 . 2010-07-27 22:42 1774720 ----a-w- c:\windows\system32\BootMan.exe
2011-06-28 22:06 . 2010-07-15 12:44 86408 ----a-w- c:\windows\system32\setupempdrv03.exe
2011-06-28 22:06 . 2010-07-15 12:44 8456 ----a-w- c:\windows\system32\EuGdiDrv.sys
2011-06-28 22:06 . 2010-07-15 12:44 13192 ----a-w- c:\windows\system32\epmntdrv.sys
2011-06-28 22:06 . 2010-07-15 12:44 14848 ----a-w- c:\windows\system32\EuEpmGdi.dll
2011-06-28 19:34 . 2011-06-28 19:39 -------- d-----w- c:\windows\SxsCaPendDel
2011-06-28 19:16 . 2011-04-21 13:37 105472 -c----w- c:\windows\system32\dllcache\mup.sys
2011-06-28 18:20 . 2011-06-28 18:26 -------- d-----w- c:\program files\Microsoft Works
2011-06-28 18:19 . 2011-06-28 18:19 -------- d-----w- c:\program files\Microsoft.NET
2011-06-28 18:15 . 2011-06-28 18:15 -------- d-----w- c:\program files\Microsoft Visual Studio 8
2011-06-28 18:14 . 2011-06-28 18:14 -------- d-----w- c:\documents and settings\Winds\Local Settings\Application Data\Microsoft Help
2011-06-28 18:14 . 2011-06-29 17:24 -------- d-----w- c:\documents and settings\All Users\Application Data\Microsoft Help
.
.
.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2011-05-02 15:31 . 2011-03-22 00:12 692736 ----a-w- c:\windows\system32\inetcomm.dll
2011-04-29 17:25 . 2003-03-31 19:00 151552 ----a-w- c:\windows\system32\schannel.dll
2011-04-29 16:19 . 2003-03-31 19:00 456320 ----a-w- c:\windows\system32\drivers\mrxsmb.sys
2011-04-25 16:11 . 2003-03-31 19:00 916480 ----a-w- c:\windows\system32\wininet.dll
2011-04-25 16:11 . 2003-03-31 19:00 43520 ------w- c:\windows\system32\licmgr10.dll
2011-04-25 16:11 . 2003-03-31 19:00 1469440 ----a-w- c:\windows\system32\inetcpl.cpl
2011-04-25 12:01 . 2011-03-22 01:16 385024 ------w- c:\windows\system32\html.iec
2011-04-21 13:37 . 2003-03-31 19:00 105472 ----a-w- c:\windows\system32\drivers\mup.sys
.
.
((((((((((((((((((((((((((((( SnapShot@2011-07-12_01.30.01 )))))))))))))))))))))))))))))))))))))))))
.
+ 2011-07-12 21:50 . 2011-07-12 21:50 16384 c:\windows\Temp\Perflib_Perfdata_5a4.dat
.
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4
.
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"EVEREST AutoStart"="d:\tools\Everest\everest.exe" [2008-03-27 2085472]
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"SynTPStart"="c:\program files\Synaptics\SynTP\SynTPStart.exe" [2007-09-15 102400]
"SynTPEnh"="c:\program files\Synaptics\SynTP\SynTPEnh.exe" [2007-09-15 1015808]
"ShStatEXE"="d:\system\Network Associates\VirusScan\SHSTAT.EXE" [2006-11-29 112216]
"QlbCtrl.exe"="c:\program files\Hewlett-Packard\HP Quick Launch Buttons\QlbCtrl.exe" [2007-10-19 202032]
"McAfeeUpdaterUI"="d:\system\Network Associates\Common Framework\UdaterUI.exe" [2006-11-17 136768]
"KeePass 2 PreLoad"="d:\tools\KeePass Password Safe 2\KeePass.exe" [2011-04-10 1733120]
"hpWirelessAssistant"="c:\program files\hpq\HP Wireless Assistant\HP Wireless Assistant.exe" [2005-12-13 507904]
"ATIPTA"="c:\program files\ATI Technologies\ATI Control Panel\atiptaxx.exe" [2005-12-02 344064]
"Adobe Reader Speed Launcher"="d:\apps\adobe\Reader 9.0\Reader\Reader_sl.exe" [2011-06-08 37296]
"Adobe ARM"="c:\program files\Common Files\Adobe\ARM\1.0\AdobeARM.exe" [2011-03-30 937920]
.
c:\documents and settings\Winds\Start Menu\Programs\Startup\
Cookie Pal.lnk - d:\tools\CPal\CPal.exe [2011-4-18 372775]
FreePOPs.lnk - d:\system\FreePOPs\freepopsd.exe [2011-4-20 49152]
.
[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\session manager]
BootExecute REG_MULTI_SZ pdboot.exe\0autocheck autochk *\0oodbs
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\Wdf01000.sys]
@="Driver"
.
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]
"EnableFirewall"= 0 (0x0)
.
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"d:\\system\\Network Associates\\Common Framework\\FrameworkService.exe"=
"c:\\WINDOWS\\system32\\sessmgr.exe"=
"d:\\tools\\TeamViewer\\Version5\\TeamViewer.exe"=
"c:\\Program Files\\TeamViewer\\Version6\\TeamViewer.exe"=
"c:\\Program Files\\TeamViewer\\Version6\\TeamViewer_Service.exe"=
"d:\\apps\\Microsoft Office\\Office12\\OUTLOOK.EXE"=
"k:\\wamp\\bin\\apache\\Apache2.2.11\\bin\\httpd.exe"=
"C:0\\EQ2\\EQ2VoiceService.exe"=
"e:\\Half-Life\\hl.exe"=
.
R2 PCToolsSSDMonitorSvc;PC Tools Startup and Shutdown Monitor service;c:\program files\Common Files\PC Tools\sMonitor\StartManSvc.exe [6/30/2011 9:28 PM 583640]
R3 HSFHWATI;HSFHWATI;c:\windows\system32\drivers\HSFHWATI.sys [8/22/2005 3:06 PM 231424]
S3 epmntdrv;epmntdrv;c:\windows\system32\epmntdrv.sys [6/28/2011 6:06 PM 13192]
S3 EuGdiDrv;EuGdiDrv;c:\windows\system32\EuGdiDrv.sys [6/28/2011 6:06 PM 8456]
S3 JL2005;JL2005A Toy Camera;c:\windows\system32\drivers\toywdm.sys [5/9/2005 8:22 PM 71336]
S3 XDva375;XDva375;\??\c:\windows\system32\XDva375.sys --> c:\windows\system32\XDva375.sys [?]
S4 sptd;sptd;c:\windows\system32\drivers\sptd.sys [3/22/2011 1:04 PM 646392]
.
--- Other Services/Drivers In Memory ---
.
*Deregistered* - EverestDriver
.
.
------- Supplementary Scan -------
.
uStart Page = hxxp://www.google.com/
uInternet Connection Wizard,ShellNext = hxxp://h50203.www5.hp.com/HPISWeb/customer/DeviceMgrErrorCode.aspx?code=28
IE: E&xport to Microsoft Excel - d:\apps\MICROS~2\Office12\EXCEL.EXE/3000
IE: Zend Studio - Debug current page - d:\web\Zend Studio\toolbars\ZendIEToolbar.dll/DebugCurrent.html
IE: Zend Studio - Debug next page - d:\web\Zend Studio\toolbars\ZendIEToolbar.dll/DebugNext.html
TCP: DhcpNameServer = 192.168.1.1
Handler: qv - {0B4BB6DC-D020-4173-97F2-3AD91AFD6559} - d:\bible\QuickVerse 2010\QuickVerse 2010\qvprotwrapper.dll
FF - ProfilePath - c:\documents and settings\Winds\Application Data\Mozilla\Firefox\Profiles\379b6glz.default\
FF - Ext: Default: {972ce4c6-7e08-4474-a285-3208198ce6fd} - d:\browsers\Mozilla Firefox\extensions\{972ce4c6-7e08-4474-a285-3208198ce6fd}
FF - Ext: Java Console: {CAFEEFAC-0016-0000-0003-ABCDEFFEDCBA} - d:\browsers\Mozilla Firefox\extensions\{CAFEEFAC-0016-0000-0003-ABCDEFFEDCBA}
FF - Ext: Java Console: {CAFEEFAC-0016-0000-0024-ABCDEFFEDCBA} - d:\browsers\Mozilla Firefox\extensions\{CAFEEFAC-0016-0000-0024-ABCDEFFEDCBA}
FF - Ext: Java Quick Starter: jqs@sun.com - c:\program files\Java\jre6\lib\deploy\jqs\ff
FF - Ext: Microsoft .NET Framework Assistant: {20a82645-c095-46ed-80e3-08825760534b} - c:\windows\Microsoft.NET\Framework\v3.5\Windows Presentation Foundation\DotNetAssistantExtension
FF - Ext: Microsoft .NET Framework Assistant: {20a82645-c095-46ed-80e3-08825760534b} - %profile%\extensions\{20a82645-c095-46ed-80e3-08825760534b}
FF - Ext: Adblock Plus: {d10d0bf8-f5b5-c8b4-a8b2-2b9879e08c5d} - %profile%\extensions\{d10d0bf8-f5b5-c8b4-a8b2-2b9879e08c5d}
FF - Ext: BetterCache: {f8454bbe-519f-4004-85c1-12d1b31988fc} - %profile%\extensions\{f8454bbe-519f-4004-85c1-12d1b31988fc}
FF - Ext: BetterPrivacy: {d40f5e7b-d2cf-4856-b441-cc613eeffbe3} - %profile%\extensions\{d40f5e7b-d2cf-4856-b441-cc613eeffbe3}
FF - Ext: CacheViewer: {71328583-3CA7-4809-B4BA-570A85818FBB} - %profile%\extensions\{71328583-3CA7-4809-B4BA-570A85818FBB}
FF - Ext: CS Lite: {00084897-021a-4361-8423-083407a033e0} - %profile%\extensions\{00084897-021a-4361-8423-083407a033e0}
FF - Ext: DownloadHelper: {b9db16a4-6edc-47ec-a1f4-b86292ed211d} - %profile%\extensions\{b9db16a4-6edc-47ec-a1f4-b86292ed211d}
FF - Ext: Download Statusbar: {D4DD63FA-01E4-46a7-B6B1-EDAB7D6AD389} - %profile%\extensions\{D4DD63FA-01E4-46a7-B6B1-EDAB7D6AD389}
FF - Ext: Element Hiding Helper for Adblock Plus: elemhidehelper@adblockplus.org - %profile%\extensions\elemhidehelper@adblockplus.org
FF - Ext: Extended Statusbar: {daf44bf7-a45e-4450-979c-91cf07434c3d} - %profile%\extensions\{daf44bf7-a45e-4450-979c-91cf07434c3d}
FF - Ext: FEBE: {4BBDD651-70CF-4821-84F8-2B918CF89CA3} - %profile%\extensions\{4BBDD651-70CF-4821-84F8-2B918CF89CA3}
FF - Ext: Firebug: firebug@software.joehewitt.com - %profile%\extensions\firebug@software.joehewitt.com
FF - Ext: Image Zoom: {1A2D0EC4-75F5-4c91-89C4-3656F6E44B68} - %profile%\extensions\{1A2D0EC4-75F5-4c91-89C4-3656F6E44B68}
FF - Ext: Link Alert: linkalert.conlan@addons.mozilla.com - %profile%\extensions\linkalert.conlan@addons.mozilla.com
FF - Ext: Live HTTP Headers: {8f8fe09b-0bd3-4470-bc1b-8cad42b8203a} - %profile%\extensions\{8f8fe09b-0bd3-4470-bc1b-8cad42b8203a}
FF - Ext: Live IP Address: {7C9AE782-DB21-4e40-81FB-AD8A53A6233A} - %profile%\extensions\{7C9AE782-DB21-4e40-81FB-AD8A53A6233A}
FF - Ext: MeasureIt: {75CEEE46-9B64-46f8-94BF-54012DE155F0} - %profile%\extensions\{75CEEE46-9B64-46f8-94BF-54012DE155F0}
FF - Ext: No-Referer : {e806da17-8400-4b6b-9c34-1bb4fe84aedc} - %profile%\extensions\{e806da17-8400-4b6b-9c34-1bb4fe84aedc}
FF - Ext: Organize Status Bar: {35106bca-6c78-48c7-ac28-56df30b51d2c} - %profile%\extensions\{35106bca-6c78-48c7-ac28-56df30b51d2c}
FF - Ext: NoUn Buttons: {99f30549-35d4-11d9-8a2a-396c6e707e82} - %profile%\extensions\{99f30549-35d4-11d9-8a2a-396c6e707e82}
FF - Ext: Old Location Bar: {3205B348-523A-4fac-9BC4-9939CBF583B0} - %profile%\extensions\{3205B348-523A-4fac-9BC4-9939CBF583B0}
FF - Ext: NoScript: {73a6fe31-595d-460b-a920-fcc0f8843232} - %profile%\extensions\{73a6fe31-595d-460b-a920-fcc0f8843232}
FF - Ext: Zoom toolbar: {FBFB7597-9E32-46b4-A500-8B6B0412777F} - %profile%\extensions\{FBFB7597-9E32-46b4-A500-8B6B0412777F}
FF - Ext: TooManyTabs: TooManyTabs@visibotech.com - %profile%\extensions\TooManyTabs@visibotech.com
FF - Ext: Update Notifier: {95f24680-9e31-11da-a746-0800200c9a66} - %profile%\extensions\{95f24680-9e31-11da-a746-0800200c9a66}
FF - Ext: Sxipper: sxipper@sxip.com - %profile%\extensions\sxipper@sxip.com
FF - Ext: Session Manager: {1280606b-2510-4fe0-97ef-9b5a22eafe30} - %profile%\extensions\{1280606b-2510-4fe0-97ef-9b5a22eafe30}
FF - Ext: Save Complete: savecomplete@perlprogrammer.com - %profile%\extensions\savecomplete@perlprogrammer.com
FF - Ext: RightToClick: {cd617375-6743-4ee8-bac4-fbf10f35729e} - %profile%\extensions\{cd617375-6743-4ee8-bac4-fbf10f35729e}
FF - Ext: QuickJava: {E6C1199F-E687-42da-8C24-E7770CC3AE66} - %profile%\extensions\{E6C1199F-E687-42da-8C24-E7770CC3AE66}
FF - Ext: PopupMaster: {35106bca-6c78-48c7-ac28-56df30b51d2d} - %profile%\extensions\{35106bca-6c78-48c7-ac28-56df30b51d2d}
FF - Ext: Zend Studio Toolbar: {3c9761ad-a43d-4447-b924-f5d83cb48063} - %profile%\extensions\{3c9761ad-a43d-4447-b924-f5d83cb48063}
FF - user.js: zend.ZDE_Path - d:\web\Zend Studio\ZendStudio.exe
.
.
**************************************************************************
.
catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2011-07-12 17:58
Windows 5.1.2600 Service Pack 3 NTFS
.
scanning hidden processes ...
.
scanning hidden autostart entries ...
.
scanning hidden files ...
.
scan completed successfully
hidden files: 0
.
**************************************************************************
.
--------------------- LOCKED REGISTRY KEYS ---------------------
.
[HKEY_LOCAL_MACHINE\software\Microsoft\Windows\CurrentVersion\Reinstall\:wjY*]
"DisplayName"="??\18\17?\11\09"
"DeviceDesc"="??\18\17?\11\09"
"ProviderName"="???\11?\16?\11??"
"MFG"="???????"
"ReinstallString"=".10.1000.4"
"DeviceInstanceIds"=multi:"c:\\swsetup\\sp32048\\sbdrv\\smbus\\smbusati.inf\00"
.
--------------------- DLLs Loaded Under Running Processes ---------------------
.
- - - - - - - > 'winlogon.exe'(840)
c:\windows\system32\Ati2evxx.dll
.
Completion time: 2011-07-12 17:59:55
ComboFix-quarantined-files.txt 2011-07-12 21:59
ComboFix2.txt 2011-07-12 01:31
.
Pre-Run: 35,058,352,128 bytes free
Post-Run: 35,044,298,752 bytes free
.
- - End Of File - - 69D084AD4F2EC3492901B55379A31753

#11 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:10:43 AM

Posted 12 July 2011 - 06:14 PM

That looks better. Run ESET's online scanner next

I'd like us to scan your machine with ESET OnlineScan
  • Hold down Control and click on the following link to open ESET OnlineScan in a new window.
    ESET OnlineScan
  • Click the Posted Image button.
  • For alternate browsers only: (Microsoft Internet Explorer users can skip these steps)
    • Click on Posted Image to download the ESET Smart Installer. Save it to your desktop.
    • Double click on the Posted Image icon on your desktop.
  • Check Posted Image
  • Click the Posted Image button.
  • Accept any security warnings from your browser.
  • Under scan settings, check Posted Image and check Remove found threats
  • Click Advanced settings and select the following:
    • Scan potentially unwanted applications
    • Scan for potentially unsafe applications
    • Enable Anti-Stealth technology
  • ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this can take some time.
  • When the scan completes, push Posted Image
  • Push Posted Image, and save the file to your desktop using a unique name, such as ESETScan. Include the contents of this report in your next reply.
  • Push the Posted Image button.
  • Push Posted Image
If no log is generated that means nothing was found. Please let me know if this happens.
Posted Image
m0le is a proud member of UNITE

#12 poser3dart

poser3dart
  • Topic Starter

  • Members
  • 16 posts
  • OFFLINE
  •  
  • Local time:05:43 AM

Posted 13 July 2011 - 07:00 AM

wow that took a long time (6hrs)to run lol, heres the log

C:\Qoobox\Quarantine\C\WINDOWS\system32\javak.dll.vir a variant of Win32/Kryptik.NDC trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{2FFABB94-BE7C-47EC-9D76-EFD34C5FE8C4}\RP2\A0000326.dll a variant of Win32/Kryptik.NDC trojan cleaned by deleting - quarantined
D:\tools\DAEMON Tools\SetupDTSB.exe Win32/Adware.WhenU.SaveNow application cleaned by deleting - quarantined
D:\web\Evrsoft\1st Page 2000 \IScripts\Buttons\Six buttons from hell.izs JS/SixButtons.A trojan cleaned by deleting - quarantined
E:\emulators\cheats\car2sd3d.zip Win32/Keylogger.HotKeysHook.A virus deleted - quarantined
H:\docs\hacks\john171w.zip Win32/HackTool.John application deleted - quarantined
H:\docs\hacks\john171w\john1701\run\john-386.exe Win32/HackTool.John application cleaned by deleting - quarantined
H:\docs\hacks\john171w\john1701\run\unafs.exe Win32/HackTool.John application cleaned by deleting - quarantined
H:\docs\hacks\john171w\john1701\run\unique.exe Win32/HackTool.John application cleaned by deleting - quarantined
H:\docs\hacks\john171w\john1701\run\unshadow.exe Win32/HackTool.John application cleaned by deleting - quarantined
I:\System Volume Information\_restore{2BC27012-9387-4928-8A07-C7DBB4C54524}\RP37\A0006910.exe a variant of Win32/Keygen.AK application cleaned by deleting - quarantined
I:\System Volume Information\_restore{2BC27012-9387-4928-8A07-C7DBB4C54524}\RP37\A0007157.exe a variant of Win32/PSWTool.RAS.A application deleted - quarantined
I:\System Volume Information\_restore{2BC27012-9387-4928-8A07-C7DBB4C54524}\RP37\A0007689.exe a variant of Win32/Keygen.AG application cleaned by deleting - quarantined
I:\to sort\bkup\avc-free.exe Win32/OpenCandy application deleted - quarantined
J:\!new web stuff\web tools\avc-free.exe Win32/OpenCandy application deleted - quarantined


a few of these i know of like: john1701, daemon, 1stpage java buttons and avc-free(well don't know what the opencandy is but the app is - Any Video Converter), car2sd3d is a game trainer which i don't even play anymore lol.

#13 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:10:43 AM

Posted 13 July 2011 - 05:11 PM

There's some worrying elements in that log. However, ESET has removed them all.

Can you please run MBAM at this stage as I want to check the adware has gone

Please download Posted Image Malwarebytes Anti-Malware and save it to your desktop.
  • Make sure you are connected to the Internet.
  • Double-click on mbam-setup.exe to install the application or, if you are using Vista, right-click and select Run As Administrator on mbam-setup.exe to install the application.
  • When the installation begins, follow the prompts and do not make any changes to default settings.
  • When installation has finished, make sure you leave both of these checked:
    • Update Malwarebytes' Anti-Malware
    • Launch Malwarebytes' Anti-Malware
  • Then click Finish.
  • MBAM will automatically start and you will be asked to update the program before performing a scan. If an update is found, the program will automatically update itself. Press the OK button to close that box and continue.
    If MBAM won't update then download and update MBAM on a clean computer then save the rules.ref folder to a memory stick. This file is found here: 'C:\Documents and Settings\All Users\Application Data\Malwarebytes\Malwarebytes' Anti-Malware' then transfer it across to the infected computer.
  • On the Scanner tab:
    • Make sure the "Perform Full Scan" option is selected.
    • Then click on the Scan button.
  • If asked to select the drives to scan, leave all the drives selected and click on the Start Scan button.
  • The scan will begin and "Scan in progress" will show at the top. It may take some time to complete so please be patient.
  • When the scan is finished, a message box will say "The scan completed successfully. Click 'Show Results' to display all objects found".
  • Click OK to close the message box and continue with the removal process.
  • Back at the main Scanner screen, click on the Show Results button to see a list of any malware that was found.
  • Make sure that everything is checked, and click Remove Selected.
  • When removal is completed, a log report will open in Notepad.
  • The log is automatically saved and can be viewed by clicking the Logs tab in MBAM.
  • Copy and paste the contents of that report in your next reply and exit MBAM.
Note: If MBAM encounters a file that is difficult to remove, you may be asked to reboot your computer so it can proceed with the disinfection process. Regardless if prompted to restart the computer or not, please do so immediately. Failure to reboot normally (not into safe mode) will prevent MBAM from removing all the malware. MBAM may make changes to your registry as part of its disinfection routine. If you're using other security programs that detect registry changes, they may alert you after scanning with MBAM. Please permit the program to allow the changes.
Posted Image
m0le is a proud member of UNITE

#14 poser3dart

poser3dart
  • Topic Starter

  • Members
  • 16 posts
  • OFFLINE
  •  
  • Local time:05:43 AM

Posted 13 July 2011 - 06:30 PM

Malwarebytes' Anti-Malware 1.51.0.1200
www.malwarebytes.org

Database version: 7116

Windows 5.1.2600 Service Pack 3
Internet Explorer 8.0.6001.18702

7/13/2011 7:29:44 PM
mbam-log-2011-07-13 (19-29-44).txt

Scan type: Full scan (C:\|D:\|E:\|F:\|G:\|H:\|I:\|J:\|K:\|L:\|)
Objects scanned: 565204
Time elapsed: 55 minute(s), 58 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 2
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 5

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
HKEY_CURRENT_USER\SOFTWARE\A9YA3MI1CF (Trojan.FakeAlert) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\C2MJB7NYRU (Trojan.FakeAlert) -> Quarantined and deleted successfully.

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
d:\system volume information\_restore{2ffabb94-be7c-47ec-9d76-efd34c5fe8c4}\RP2\A0000384.exe (Adware.WhenU) -> Quarantined and deleted successfully.
e:\portable solsuite 2008 v8.4\SolSuite.exe (Trojan.Agent) -> Quarantined and deleted successfully.
e:\Halo\chktrust.exe (Trojan.Agent) -> Quarantined and deleted successfully.
i:\system volume information\_restore{2bc27012-9387-4928-8a07-c7dbb4c54524}\RP18\A0003053.exe (Trojan.Agent) -> Quarantined and deleted successfully.
i:\system volume information\_restore{2bc27012-9387-4928-8a07-c7dbb4c54524}\RP37\A0007693.exe (Riskware.Tool.CK) -> Quarantined and deleted successfully.

#15 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:10:43 AM

Posted 13 July 2011 - 07:00 PM

Please follow that up with Superantispyware

Download and scan with SUPERAntiSpyware Free for Home Users
  • Double-click SUPERAntiSpyware.exe and use the default settings for installation.
  • An icon will be created on your desktop. Double-click that icon to launch the program.
  • If asked to update the program definitions, click "Yes". If not, update the definitions before scanning by selecting "Check for Updates". (If you encounter any problems while downloading the updates, manually download them from here. Double-click on the hyperlink for Download Installer and save SASDEFINITIONS.EXE to your desktop. Then double-click on SASDEFINITIONS.EXE to install the definitions.)
  • In the Main Menu, click the Preferences... button.
  • Click the Scanning Control tab.
  • Under Scanner Options make sure the following are checked (leave all others unchecked):
    • Close browsers before scanning.
    • Scan for tracking cookies.
    • Terminate memory threats before quarantining.
  • Click the "Close" button to leave the control center screen.
  • Back on the main screen, under "Scan for Harmful Software" click Scan your computer.
  • On the left, make sure you check C:\Fixed Drive.
  • On the right, under "Complete Scan", choose Perform Complete Scan.
  • Click "Next" to start the scan. Please be patient while it scans your computer.
  • After the scan is complete, a Scan Summary box will appear with potentially harmful items that were detected. Click "OK".
  • Make sure everything has a checkmark next to it and click "Next".
  • A notification will appear that "Quarantine and Removal is Complete". Click "OK" and then click the "Finish" button to return to the main menu.
  • If asked if you want to reboot, click "Yes".
  • To retrieve the removal information after reboot, launch SUPERAntispyware again.
    • Click Preferences, then click the Statistics/Logs tab.
    • Under Scanner Logs, double-click SUPERAntiSpyware Scan Log.
    • If there are several logs, click the current dated log and press View log. A text file will open in your default text editor.
    • Please copy and paste the Scan Log results in your next reply.
  • Click Close to exit the program.

Posted Image
m0le is a proud member of UNITE




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users