Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Recurring Blue Screens


  • This topic is locked This topic is locked
12 replies to this topic

#1 Ryan McHugh

Ryan McHugh

  • Members
  • 31 posts
  • OFFLINE
  •  
  • Local time:12:05 PM

Posted 14 July 2011 - 04:51 PM

I am going to refer you to the MRT Team:

Based upon this google: BA96E9FC124585F4CBEC11416D85DC1E - rkhdrv40.sys


As requested in this thread I have started a thread here.

Speccy Info about the computer.

Problem: I've been experiencing blue screens related to "rkhdrv40.sys"

As of this time, I have tried using "SystemLook" to look for the .sys file, checking "scheduled tasks" to make sure it's not running because of something in there, and used BlueScreenView to save logs of the bsods. I'm not (knowingly) running "Rootkit Unhooker", and can't see it in all programs, or add/remove.

Attached are the requested DDS and GMER logs, as well as an updated bsod.txt from BlueScreenView.

Thanks in advance for your help,
Ryan

---
DDS (Ver_2011-07-14.01) - NTFS_x86
Internet Explorer: 8.0.6001.18702
Run by Ryan McHugh at 16:42:17 on 2011-07-14
Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.2942.2130 [GMT -4:00]
.
AV: Microsoft Security Essentials *Enabled/Updated* {EDB4FA23-53B8-4AFA-8C5D-99752CCA7095}
AV: Microsoft Security Essentials *Disabled/Updated* {BCF43643-A118-4432-AEDE-D861FCBCFCDF}
.
============== Running Processes ================
.
C:\WINDOWS\system32\Ati2evxx.exe
C:\Program Files\Microsoft Security Client\Antimalware\MsMpEng.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\Microsoft.NET\Framework\v4.0.30319\aspnet_state.exe
D:\MICROS\Common\Bin\CIService.exe
D:\Micros\Common\Bin\DbUpdateServer.exe
C:\WINDOWS\system32\inetsrv\inetinfo.exe
D:\Micros\Common\Bin\3700d.exe
D:\MICROS\Common\Bin\AutoSeqServ.exe
D:\MICROS\Common\Bin\RunDBMS.exe
D:\Micros\Common\Bin\CALSrv.exe
D:\Micros\Common\Bin\DSM.exe
d:\micros\common\bin\microsremotingservice.exe
C:\Program Files\OO Software\CleverCache\ooccag.exe
C:\Program Files\Raxco\PerfectDisk10\PDAgent.exe
C:\Program Files\CyberPower PowerPanel Personal Edition\ppped.exe
D:\Micros\Res\GSS\Bin\GSSDataService.exe
D:\Micros\Common\Bin\MDSHTTPService.exe
D:\Micros\RES\POS\Bin\ResSIMDB.exe
D:\MICROS\Common\Bin\CMS.exe
D:\MICROS\Common\Bin\ComScheduler.exe
C:\Program Files\TeamViewer\Version6\TeamViewer_Service.exe
D:\MICROS\Common\Bin\CMSC.exe
D:\Micros\Common\Bin\resdbs.exe
C:\Program Files\Sybase\ASA\win32\dbsrv9.exe
C:\WINDOWS\System32\alg.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\system32\rdpclip.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\OO Software\CleverCache\ooccctrl.exe
C:\Program Files\CyberPower PowerPanel Personal Edition\pppeuser.exe
C:\Program Files\Microsoft Security Client\msseces.exe
C:\WINDOWS\system32\ctfmon.exe
D:\MICROS\Res\Pos\Bin\CPanel.exe
D:\Micros\Common\Bin\CCS.exe
D:\Micros\Res\Pos\Bin\PrintAdapter.exe
D:\Micros\Common\Bin\pcontrol.exe
C:\Documents and Settings\Ryan McHugh\Local Settings\Application Data\Google\Chrome\Application\chrome.exe
C:\Documents and Settings\Ryan McHugh\Local Settings\Application Data\Google\Chrome\Application\chrome.exe
C:\WINDOWS\system32\logon.scr
C:\WINDOWS\system32\wbem\wmiprvse.exe
C:\WINDOWS\system32\svchost.exe -k DcomLaunch
C:\WINDOWS\system32\svchost.exe -k rpcss
C:\WINDOWS\System32\svchost.exe -k netsvcs
C:\WINDOWS\system32\svchost.exe -k LocalService
C:\WINDOWS\system32\svchost.exe -k LocalService
C:\WINDOWS\System32\svchost.exe -k HTTPFilter
.
============== Pseudo HJT Report ===============
.
uRun: [ctfmon.exe] c:\windows\system32\ctfmon.exe
mRun: [ooccctrl.exe] c:\program files\oo software\clevercache\ooccctrl.exe /tasktray
mRun: [PowerPanel Personal Edition User Interaction] c:\program files\cyberpower powerpanel personal edition\pppeuser.exe
mRun: [MSC] "c:\program files\microsoft security client\msseces.exe" -hide -runkey
dRun: [DWQueuedReporting] "c:\progra~1\common~1\micros~1\dw\dwtrig20.exe" -t
uPolicies-Explorer: NoDriveTypeAutoRun = dword:323
uPolicies-Explorer: NoDriveAutoRun = dword:67108863
uPolicies-Explorer: NoDrives = dword:0
mPolicies-Explorer: NoDriveAutoRun = dword:67108863
mPolicies-Explorer: NoDrives = dword:0
mPolicies-Explorer: NoDriveTypeAutoRun = dword:323
mPolicies-System: dontdisplaylastusername = dword:1
mPolicies-Windows\System: Allow-LogonScript-NetbiosDisabled = dword:1
mPolicies-Explorer: NoDriveTypeAutoRun = dword:323
mPolicies-Explorer: NoDriveAutoRun = dword:67108863
IE: {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe
IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe
.
INFO: HKCU has more than 50 listed domains.
If you wish to scan all of them, select the 'Force scan all domains' option.
.
.
INFO: HKLM has more than 50 listed domains.
If you wish to scan all of them, select the 'Force scan all domains' option.
.
DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} - hxxp://update.microsoft.com/windowsupdate/v6/V5Controls/en/x86/client/wuweb_site.cab?1156357814031
DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} - hxxp://update.microsoft.com/microsoftupdate/v6/V5Controls/en/x86/client/muweb_site.cab?1156357861968
DPF: {8FFBE65D-2C9C-4669-84BD-5829DC0B603C} - hxxp://fpdownload.macromedia.com/get/flashplayer/current/ultrashim.cab
TCP: Interfaces\{07C26080-F37E-48F5-9190-E046B7A876A0} : NameServer = 192.168.3.1
TCP: Interfaces\{3C8ABB80-DF12-4BDA-9A50-8C03BFC75D2C} : DHCPNameServer = 192.168.0.1
TCP: Interfaces\{E9284B7E-711E-4834-BA65-1E09ED45363B} : NameServer = 208.67.222.222,208.67.220.220
Handler: ipp - <Clsid value has no data>
Handler: msdaipp - <Clsid value has no data>
Notify: AtiExtEvent - Ati2evxx.dll
SSODL: WPDShServiceObj - {AAA288BA-9A4C-45B0-95D7-94D524869DB5} - c:\windows\system32\WPDShServiceObj.dll
SEH: Windows Desktop Search Namespace Manager - {56F9679E-7826-4C84-81F3-532071A8BCC5} - c:\program files\windows desktop search\MSNLNamespaceMgr.dll
mASetup: {44BBA840-CC51-11CF-AAFA-00AA00B6015C} - "c:\program files\outlook express\setup50.exe" /APP:OE /CALLER:WINNT /user /install
mASetup: {7790769C-0471-11d2-AF11-00C04FA35D02} - "c:\program files\outlook express\setup50.exe" /APP:WAB /CALLER:WINNT /user /install
IFEO: Your Image File Name Here without a path - ntsd -d
Hosts: 127.0.0.1 www.spywareinfo.com
.
================= FIREFOX ===================
.
FF - ProfilePath - c:\documents and settings\ryan mchugh\application data\mozilla\firefox\profiles\bd6my2ux.default\
FF - plugin: c:\program files\mozilla firefox\plugins\npdeployJava1.dll
FF - Ext: Default: {972ce4c6-7e08-4474-a285-3208198ce6fd} - c:\program files\mozilla firefox\extensions\{972ce4c6-7e08-4474-a285-3208198ce6fd}
.
============= SERVICES / DRIVERS ===============
.
R0 ahcix86;ahcix86;c:\windows\system32\drivers\ahcix86.sys [2007-3-21 120320]
R0 rkhdrv40;Rootkit Unhooker Driver;c:\windows\system32\drivers\rkhdrv40.sys [2010-9-10 24448]
R0 SI3112r;ATI-4379 Serial ATA Controller;c:\windows\system32\drivers\SI3112r.sys [2006-8-23 102528]
R1 MpFilter;Microsoft Malware Protection Driver;c:\windows\system32\drivers\MpFilter.sys [2010-3-25 165264]
R1 MpKsl39573fa1;MpKsl39573fa1;c:\documents and settings\all users\application data\microsoft\microsoft antimalware\definition updates\{1423983e-15d7-4842-8817-aa356b456c52}\MpKsl39573fa1.sys [2011-7-14 28752]
R2 CISERVICE;MICROS Caller ID Service;d:\micros\common\bin\CIService.exe [2006-3-29 69632]
R2 DbUpdateServer;MICROS DB Update Service;d:\micros\common\bin\DbUpdateServer.exe [2006-3-29 102400]
R2 Iprip;RIP Listener;c:\windows\system32\svchost.exe -k netsvcs [2006-2-28 14336]
R2 MICROS 3700d Server;MICROS 3700d Server;d:\micros\common\bin\3700d.exe [2006-3-29 479232]
R2 MICROS Autosequence Server;MICROS Autosequence Server;d:\micros\common\bin\AutoSeqServ.exe [2006-3-29 86016]
R2 MICROS CAL Service;MICROS CAL Service;d:\micros\common\bin\CALSrv.exe [2006-3-30 155648]
R2 MICROS Distributed Service Manager;MICROS Distributed Service Manager;d:\micros\common\bin\DSM.exe [2006-3-29 565248]
R2 MICROS Remoting Service;MICROS Remoting Service;d:\micros\common\bin\MicrosRemotingService.exe [2009-1-23 81920]
R2 MicrosCashManagementComServer;MICROS Cash Management Com Server;d:\micros\common\bin\CMSC.exe [2006-3-29 934912]
R2 NPF;NetGroup Packet Filter Driver;c:\windows\system32\drivers\npf.sys [2010-6-25 35088]
R2 srvGSSDataService;MICROS GSS Data Service;d:\micros\res\gss\bin\GSSDataService.exe [2010-4-13 589824]
R2 srvMDSHTTPService;MICROS MDS HTTP Service;d:\micros\common\bin\MDSHTTPService.exe [2006-3-29 417792]
R2 svcCashManager;MICROS Cash Management;d:\micros\common\bin\CMS.exe [2006-3-29 2327040]
R2 svcCOMScheduler;MICROS LM COM Scheduler;d:\micros\common\bin\ComScheduler.exe [2006-3-29 412672]
R2 TeamViewer6;TeamViewer 6;c:\program files\teamviewer\version6\TeamViewer_Service.exe [2011-6-1 2337144]
R3 MICROS Credit Card Server;MICROS Credit Card Server;d:\micros\common\bin\CCS.exe [2006-3-29 192512]
R3 MICROS Database Service;MICROS Database Service;d:\micros\common\bin\resdbs.exe [2006-3-29 1642496]
R3 MICROS Print Controller;MICROS Print Controller;d:\micros\common\bin\pcontrol.exe [2006-3-29 368640]
R3 SQLANYs_sqlSRVR-MCRSPOS-3R;sqlSRVR-MCRSPOS-3R;c:\program files\sybase\asa\win32\dbsrv9.exe [2006-2-23 77824]
R3 teamviewervpn;TeamViewer VPN Adapter;c:\windows\system32\drivers\teamviewervpn.sys [2011-4-14 25088]
S1 mferkdk;VSCore mferkdk;\??\c:\program files\mcafee\virusscan enterprise\mferkdk.sys --> c:\program files\mcafee\virusscan enterprise\mferkdk.sys [?]
S1 MpKsl1c0b8a5e;MpKsl1c0b8a5e;\??\c:\documents and settings\all users\application data\microsoft\microsoft antimalware\definition updates\{b53170bd-399d-49e3-8c58-1b9bcdcec809}\mpksl1c0b8a5e.sys --> c:\documents and settings\all users\application data\microsoft\microsoft antimalware\definition updates\{b53170bd-399d-49e3-8c58-1b9bcdcec809}\MpKsl1c0b8a5e.sys [?]
S1 MpKsl2b3bbd01;MpKsl2b3bbd01;\??\c:\documents and settings\all users\application data\microsoft\microsoft antimalware\definition updates\{4dd68867-0403-4e21-bd9d-b3266500428b}\mpksl2b3bbd01.sys --> c:\documents and settings\all users\application data\microsoft\microsoft antimalware\definition updates\{4dd68867-0403-4e21-bd9d-b3266500428b}\MpKsl2b3bbd01.sys [?]
S1 MpKsl3bfc8f11;MpKsl3bfc8f11;\??\c:\documents and settings\all users\application data\microsoft\microsoft antimalware\definition updates\{fa50f7fd-6887-4762-b1c0-7efd9ddb2fde}\mpksl3bfc8f11.sys --> c:\documents and settings\all users\application data\microsoft\microsoft antimalware\definition updates\{fa50f7fd-6887-4762-b1c0-7efd9ddb2fde}\MpKsl3bfc8f11.sys [?]
S1 MpKsl5dd46928;MpKsl5dd46928;\??\c:\documents and settings\all users\application data\microsoft\microsoft antimalware\definition updates\{7745089d-89d8-4b2e-bf84-edb67a208cef}\mpksl5dd46928.sys --> c:\documents and settings\all users\application data\microsoft\microsoft antimalware\definition updates\{7745089d-89d8-4b2e-bf84-edb67a208cef}\MpKsl5dd46928.sys [?]
S1 MpKsl81aff128;MpKsl81aff128;\??\c:\documents and settings\all users\application data\microsoft\microsoft antimalware\definition updates\{b2dca9a3-6800-4c6f-b0f6-2771bd41c930}\mpksl81aff128.sys --> c:\documents and settings\all users\application data\microsoft\microsoft antimalware\definition updates\{b2dca9a3-6800-4c6f-b0f6-2771bd41c930}\MpKsl81aff128.sys [?]
S1 MpKsl93542826;MpKsl93542826;\??\c:\documents and settings\all users\application data\microsoft\microsoft antimalware\definition updates\{1423983e-15d7-4842-8817-aa356b456c52}\mpksl93542826.sys --> c:\documents and settings\all users\application data\microsoft\microsoft antimalware\definition updates\{1423983e-15d7-4842-8817-aa356b456c52}\MpKsl93542826.sys [?]
S1 MpKslad117e2e;MpKslad117e2e;\??\c:\documents and settings\all users\application data\microsoft\microsoft antimalware\definition updates\{f4d7db3f-c5d3-4047-a8a4-38cc7e7368e8}\mpkslad117e2e.sys --> c:\documents and settings\all users\application data\microsoft\microsoft antimalware\definition updates\{f4d7db3f-c5d3-4047-a8a4-38cc7e7368e8}\MpKslad117e2e.sys [?]
S1 MpKslcea6d27f;MpKslcea6d27f;\??\c:\documents and settings\all users\application data\microsoft\microsoft antimalware\definition updates\{f4d7db3f-c5d3-4047-a8a4-38cc7e7368e8}\mpkslcea6d27f.sys --> c:\documents and settings\all users\application data\microsoft\microsoft antimalware\definition updates\{f4d7db3f-c5d3-4047-a8a4-38cc7e7368e8}\MpKslcea6d27f.sys [?]
S2 clr_optimization_v4.0.30319_32;Microsoft .NET Framework NGEN v4.0.30319_X86;c:\windows\microsoft.net\framework\v4.0.30319\mscorsvw.exe [2010-3-18 130384]
S2 MICROS Backup Server;MICROS Backup Server;d:\micros\common\bin\resbsm.exe [2006-3-29 880640]
S2 MICROS ILDS Server;MICROS ILDS Server;d:\micros\common\bin\ilds.exe [2006-3-29 487424]
S2 MICROS Interface Server;MICROS Interface Server;d:\micros\common\bin\Ifs.exe [2006-3-29 94208]
S2 MICROS KDS Controller;MICROS KDS Controller;d:\micros\res\kds\bin\KDSController.exe [2006-3-29 811008]
S3 Auto RTPatch Scheduler;Auto RTPatch Scheduler;c:\program files\common files\pocketsoft\rtpatch\autortp\artpschd.exe [2003-10-29 409600]
S3 EraserUtilDrv10633;EraserUtilDrv10633;\??\c:\program files\common files\symantec shared\eengine\eraserutildrv10633.sys --> c:\program files\common files\symantec shared\eengine\EraserUtilDrv10633.sys [?]
S3 HPKBCCID;HP Keyboard Smart Card Driver;c:\windows\system32\drivers\HPKBCCID.sys [2005-8-4 48512]
S3 MICROS Table Management System;MICROS Table Management System;d:\micros\common\bin\TMSService.exe [2006-11-16 217088]
S3 MicrosDesk;MICROS Secure Desktop;d:\micros\common\bin\MicrosDsk.exe [2006-3-29 87040]
S3 MICROSTMSInterface;MICROS TMS Interface;d:\micros\common\bin\TMSInterface.exe [2006-3-29 515584]
S3 STC2DFU;STCII DFU Adapter;c:\windows\system32\drivers\Stc2Dfu.sys [2004-10-25 7796]
S3 usbdpfp;U.are.UŽ Fingerprint Reader Class Driver;c:\windows\system32\drivers\usbdpfp.sys [2008-2-15 47104]
S3 Winacusb;Winacusb;c:\windows\system32\drivers\winacusb.sys --> c:\windows\system32\drivers\winacusb.sys [?]
S3 WPFFontCache_v0400;Windows Presentation Foundation Font Cache 4.0.0.0;c:\windows\microsoft.net\framework\v4.0.30319\wpf\WPFFontCache_v0400.exe [2010-3-18 753504]
S4 NTIdn;NTIdn;c:\windows\system32\drivers\ntidn.sys [2006-3-30 89012]
S4 WinRM;Windows Remote Management (WS-Management);c:\windows\system32\svchost.exe -k WINRM [2006-2-28 14336]
.
=============== File Associations ===============
.
FileExt: .txt: Notepad++_file="c:\program files\notepad++\notepad++.exe" "%1"
FileExt: .ini: Notepad++_file="c:\program files\notepad++\notepad++.exe" "%1"
.
=============== Created Last 30 ================
.
2011-07-14 20:11:20 28752 ----a-w- c:\documents and settings\all users\application data\microsoft\microsoft antimalware\definition updates\{1423983e-15d7-4842-8817-aa356b456c52}\MpKsl39573fa1.sys
2011-07-14 18:16:24 7074640 ----a-w- c:\documents and settings\all users\application data\microsoft\microsoft antimalware\definition updates\{1423983e-15d7-4842-8817-aa356b456c52}\mpengine.dll
2011-07-14 18:09:58 -------- d-sha-r- C:\cmdcons
2011-07-14 18:02:08 -------- d-----w- c:\program files\Spybot - Search & Destroy
2011-07-14 18:02:08 -------- d-----w- c:\documents and settings\all users\application data\Spybot - Search & Destroy
2011-07-14 17:58:31 -------- d-----w- c:\documents and settings\ryan mchugh\local settings\application data\Google
2011-07-14 17:57:56 -------- d-----w- c:\documents and settings\ryan mchugh\local settings\application data\Mozilla
2011-07-13 17:13:19 -------- d-----w- c:\documents and settings\ryan mchugh\application data\Malwarebytes
2011-07-13 17:13:14 39984 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2011-07-13 17:13:09 22712 ----a-w- c:\windows\system32\drivers\mbam.sys
2011-07-13 17:10:32 21992 ----a-w- c:\windows\system32\drivers\cpuz135_x32.sys
2011-07-13 17:10:32 -------- d-----w- c:\program files\CPUID
2011-07-13 17:10:13 -------- d-----w- c:\program files\NirSoft
2011-06-16 17:51:58 105472 -c----w- c:\windows\system32\dllcache\mup.sys
.
==================== Find3M ====================
.
2011-06-29 07:33:17 404640 ----a-w- c:\windows\system32\FlashPlayerCPLApp.cpl
2011-06-26 06:45:56 256000 ----a-w- c:\windows\PEV.exe
2011-06-13 13:36:20 1142 ----a-w- c:\windows\system32\mailrpt.bat
2011-06-02 14:02:05 1858944 ----a-w- c:\windows\system32\win32k.sys
2011-05-02 15:31:52 692736 ----a-w- c:\windows\system32\inetcomm.dll
2011-04-29 17:25:27 151552 ----a-w- c:\windows\system32\schannel.dll
2011-04-29 16:19:43 456320 ----a-w- c:\windows\system32\drivers\mrxsmb.sys
2011-04-26 11:07:50 33280 ----a-w- c:\windows\system32\csrsrv.dll
2011-04-26 11:07:50 293376 ----a-w- c:\windows\system32\winsrv.dll
2011-04-25 16:11:12 916480 ----a-w- c:\windows\system32\wininet.dll
2011-04-25 16:11:11 43520 ----a-w- c:\windows\system32\licmgr10.dll
2011-04-25 16:11:11 1469440 ------w- c:\windows\system32\inetcpl.cpl
2011-04-25 12:01:22 385024 ----a-w- c:\windows\system32\html.iec
2011-04-21 13:37:43 105472 ----a-w- c:\windows\system32\drivers\mup.sys
.
============= FINISH: 16:42:42.07 ===============

Attached Files



BC AdBot (Login to Remove)

 


#2 CatByte

CatByte

    bleepin' tiger


  • Malware Response Team
  • 14,664 posts
  • OFFLINE
  •  
  • Gender:Not Telling
  • Location:Canada
  • Local time:12:05 PM

Posted 15 July 2011 - 05:09 PM

Hi,

Please do the following:

Download ComboFix from one of the following locations:
Link 1
Link 2

VERY IMPORTANT !!! Save ComboFix.exe to your Desktop

* IMPORTANT - Disable your AntiVirus and AntiSpyware applications, usually via a right click on the System Tray icon. They may otherwise interfere with our tools. If you have difficulty properly disabling your protective programs, refer to this link here
  • Double click on ComboFix.exe & follow the prompts.
As part of it's process, ComboFix will check to see if the Microsoft Windows Recovery Console is installed. With malware infections being as they are today, it's strongly recommended to have this pre-installed on your machine before doing any malware removal. It will allow you to boot up into a special recovery/repair mode that will allow us to more easily help you should your computer have a problem after an attempted removal of malware.

  • Follow the prompts to allow ComboFix to download and install the Microsoft Windows Recovery Console, and when prompted, agree to the End-User License Agreement to install the Microsoft Windows Recovery Console.
**Please note: If the Microsoft Windows Recovery Console is already installed, ComboFix will continue it's malware removal procedures.

Posted Image

  • Once the Microsoft Windows Recovery Console is installed using ComboFix, you should see the following message:

Posted Image

  • Click on Yes, to continue scanning for malware.
When finished, it shall produce a log for you. Please include the C:\ComboFix.txt in your next reply.
Notes:
1. Do not mouse-click Combofix's window while it is running. That may cause it to stall.
2. Do not "re-run" Combofix. If you have a problem, reply back for further instructions.

Microsoft MVP - 2010, 2011, 2012, 2013, 2014, 2015


#3 Ryan McHugh

Ryan McHugh
  • Topic Starter

  • Members
  • 31 posts
  • OFFLINE
  •  
  • Local time:12:05 PM

Posted 16 July 2011 - 01:00 AM

Hi CatByte -

Attached is the log you requested. In the future would you prefer the .txt attached, or in the body of the reply?

Thanks for your help,
Ryan

ComboFix 11-07-15.03 - Ryan McHugh 07/16/2011 1:50.4.1 - x86
Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.2942.1953 [GMT -4:00]
Running from: c:\documents and settings\Ryan McHugh\Desktop\ComboFix.exe
AV: Microsoft Security Essentials *Disabled/Updated* {BCF43643-A118-4432-AEDE-D861FCBCFCDF}
AV: Microsoft Security Essentials *Disabled/Updated* {EDB4FA23-53B8-4AFA-8C5D-99752CCA7095}
.
.
((((((((((((((((((((((((( Files Created from 2011-06-16 to 2011-07-16 )))))))))))))))))))))))))))))))
.
.
2011-07-15 20:48 . 2011-07-15 20:48 28752 ----a-w- c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{62451362-133D-477B-8316-5C0028FC1676}\MpKsl47a5c8f2.sys
2011-07-15 20:47 . 2011-06-07 15:55 7074640 ----a-w- c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{62451362-133D-477B-8316-5C0028FC1676}\mpengine.dll
2011-07-14 20:51 . 2011-07-14 20:51 -------- d-----w- c:\program files\Speccy
2011-07-14 18:02 . 2011-07-14 19:27 -------- d-----w- c:\documents and settings\All Users\Application Data\Spybot - Search & Destroy
2011-07-14 18:02 . 2011-07-14 18:08 -------- d-----w- c:\program files\Spybot - Search & Destroy
2011-07-14 17:58 . 2011-07-14 17:59 -------- d-----w- c:\documents and settings\Ryan McHugh\Local Settings\Application Data\Google
2011-07-14 17:57 . 2011-07-14 17:57 -------- d-----w- c:\documents and settings\Ryan McHugh\Local Settings\Application Data\Mozilla
2011-07-13 17:13 . 2011-07-13 17:13 -------- d-----w- c:\documents and settings\Ryan McHugh\Application Data\Malwarebytes
2011-07-13 17:13 . 2011-05-29 13:11 39984 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2011-07-13 17:13 . 2011-05-29 13:11 22712 ----a-w- c:\windows\system32\drivers\mbam.sys
2011-07-13 17:10 . 2011-07-13 17:10 -------- d-----w- c:\program files\CPUID
2011-07-13 17:10 . 2010-11-09 19:35 21992 ----a-w- c:\windows\system32\drivers\cpuz135_x32.sys
2011-07-13 17:10 . 2011-07-13 17:10 -------- d-----w- c:\program files\NirSoft
2011-06-16 17:51 . 2011-04-21 13:37 105472 -c----w- c:\windows\system32\dllcache\mup.sys
.
.
.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2011-06-29 07:33 . 2011-05-14 21:34 404640 ----a-w- c:\windows\system32\FlashPlayerCPLApp.cpl
2011-06-13 13:36 . 2009-02-04 21:11 1142 ----a-w- c:\windows\system32\mailrpt.bat
2011-06-07 15:55 . 2010-10-18 03:50 7074640 ----a-w- c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\Backup\mpengine.dll
2011-06-02 14:02 . 2006-02-28 12:00 1858944 ----a-w- c:\windows\system32\win32k.sys
2011-05-02 15:31 . 2006-08-23 16:35 692736 ----a-w- c:\windows\system32\inetcomm.dll
2011-04-29 17:25 . 2006-02-28 12:00 151552 ----a-w- c:\windows\system32\schannel.dll
2011-04-29 16:19 . 2006-02-28 12:00 456320 ----a-w- c:\windows\system32\drivers\mrxsmb.sys
2011-04-26 11:07 . 2006-02-28 12:00 33280 ----a-w- c:\windows\system32\csrsrv.dll
2011-04-26 11:07 . 2006-02-28 12:00 293376 ----a-w- c:\windows\system32\winsrv.dll
2011-04-25 16:11 . 2006-02-28 12:00 916480 ----a-w- c:\windows\system32\wininet.dll
2011-04-25 16:11 . 2006-02-28 12:00 43520 ----a-w- c:\windows\system32\licmgr10.dll
2011-04-25 16:11 . 2006-02-28 12:00 1469440 ------w- c:\windows\system32\inetcpl.cpl
2011-04-25 12:01 . 2006-02-28 12:00 385024 ----a-w- c:\windows\system32\html.iec
2011-04-21 13:37 . 2006-02-28 12:00 105472 ----a-w- c:\windows\system32\drivers\mup.sys
.
.
((((((((((((((((((((((((((((( SnapShot_2011-07-14_18.14.36 )))))))))))))))))))))))))))))))))))))))))
.
+ 2006-02-28 12:00 . 2011-07-14 20:15 573698 c:\windows\system32\perfh009.dat
- 2006-02-28 12:00 . 2011-07-13 17:12 573698 c:\windows\system32\perfh009.dat
+ 2006-02-28 12:00 . 2011-07-14 20:15 112898 c:\windows\system32\perfc009.dat
- 2006-02-28 12:00 . 2011-07-13 17:12 112898 c:\windows\system32\perfc009.dat
+ 2006-08-25 14:00 . 2011-07-14 20:12 222122 c:\windows\system32\inetsrv\MetaBase.bin
.
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"ooccctrl.exe"="c:\program files\OO Software\CleverCache\ooccctrl.exe" [2007-01-28 1911568]
"PowerPanel Personal Edition User Interaction"="c:\program files\CyberPower PowerPanel Personal Edition\pppeuser.exe" [2009-05-27 315392]
"MSC"="c:\program files\Microsoft Security Client\msseces.exe" [2010-11-30 997408]
.
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run]
"DWQueuedReporting"="c:\progra~1\COMMON~1\MICROS~1\DW\dwtrig20.exe" [2008-11-04 435096]
.
c:\documents and settings\chris\Start Menu\Programs\Startup\
Autosequences and Reports.lnk - d:\micros\Common\Bin\AutoSeqExec.exe [2006-3-29 2370048]
.
[hkey_local_machine\software\microsoft\windows\currentversion\explorer\ShellExecuteHooks]
"{56F9679E-7826-4C84-81F3-532071A8BCC5}"= "c:\program files\Windows Desktop Search\MSNLNamespaceMgr.dll" [2009-05-25 304128]
.
[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\session manager]
BootExecute REG_MULTI_SZ PDBoot.exe\0autocheck autochk *
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\MsMpSvc]
@="Service"
.
[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring]
"DisableMonitoring"=dword:00000001
.
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]
"DisableUnicastResponsesToMulticastBroadcast"= 0 (0x0)
.
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"c:\\WINDOWS\\system32\\sessmgr.exe"=
"c:\\WINDOWS\\Network Diagnostic\\xpnetdiag.exe"=
"c:\\Program Files\\TeamViewer\\Version6\\TeamViewer.exe"=
"c:\\Program Files\\TeamViewer\\Version6\\TeamViewer_Service.exe"=
.
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\GloballyOpenPorts\List]
"3389:TCP"= 3389:TCP:24.61.238.0/255.255.255.0,76.24.43.0/255.255.255.0,192.168.0.0/255.255.0.0:Enabled:@xpsp2res.dll,-22009
.
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\IcmpSettings]
"AllowInboundTimestampRequest"= 1 (0x1)
"AllowInboundMaskRequest"= 0 (0x0)
"AllowInboundRouterRequest"= 0 (0x0)
"AllowOutboundDestinationUnreachable"= 0 (0x0)
"AllowOutboundSourceQuench"= 0 (0x0)
"AllowOutboundParameterProblem"= 0 (0x0)
"AllowOutboundTimeExceeded"= 0 (0x0)
"AllowRedirect"= 0 (0x0)
"AllowOutboundPacketTooBig"= 0 (0x0)
"AllowInboundEchoRequest"= 1 (0x1)
.
R0 ahcix86;ahcix86;c:\windows\system32\drivers\ahcix86.sys [3/21/2007 10:38 AM 120320]
R0 rkhdrv40;Rootkit Unhooker Driver;c:\windows\system32\drivers\rkhdrv40.sys [9/10/2010 3:45 PM 24448]
R0 SI3112r;ATI-4379 Serial ATA Controller;c:\windows\system32\drivers\SI3112r.sys [8/23/2006 2:07 PM 102528]
R1 MpKsl47a5c8f2;MpKsl47a5c8f2;c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{62451362-133D-477B-8316-5C0028FC1676}\MpKsl47a5c8f2.sys [7/15/2011 4:48 PM 28752]
R2 CISERVICE;MICROS Caller ID Service;d:\micros\Common\Bin\CIService.exe [3/29/2006 11:29 PM 69632]
R2 DbUpdateServer;MICROS DB Update Service;d:\micros\Common\Bin\DbUpdateServer.exe [3/29/2006 11:18 PM 102400]
R2 Iprip;RIP Listener;c:\windows\System32\svchost.exe -k netsvcs [2/28/2006 8:00 AM 14336]
R2 MICROS 3700d Server;MICROS 3700d Server;d:\micros\Common\Bin\3700d.exe [3/29/2006 11:22 PM 479232]
R2 MICROS Autosequence Server;MICROS Autosequence Server;d:\micros\Common\Bin\AutoSeqServ.exe [3/29/2006 11:27 PM 86016]
R2 MICROS CAL Service;MICROS CAL Service;d:\micros\Common\Bin\CALSrv.exe [3/30/2006 4:10 AM 155648]
R2 MICROS Distributed Service Manager;MICROS Distributed Service Manager;d:\micros\Common\Bin\DSM.exe [3/29/2006 10:59 PM 565248]
R2 MICROS Remoting Service;MICROS Remoting Service;d:\micros\Common\Bin\MicrosRemotingService.exe [1/23/2009 1:32 AM 81920]
R2 MicrosCashManagementComServer;MICROS Cash Management Com Server;d:\micros\Common\Bin\CMSC.exe [3/29/2006 11:18 PM 934912]
R2 NPF;NetGroup Packet Filter Driver;c:\windows\system32\drivers\npf.sys [6/25/2010 1:07 PM 35088]
R2 srvGSSDataService;MICROS GSS Data Service;d:\micros\Res\GSS\Bin\GSSDataService.exe [4/13/2010 2:48 AM 589824]
R2 srvMDSHTTPService;MICROS MDS HTTP Service;d:\micros\Common\Bin\MDSHTTPService.exe [3/29/2006 11:35 PM 417792]
R2 svcCashManager;MICROS Cash Management;d:\micros\Common\Bin\CMS.exe [3/29/2006 11:18 PM 2327040]
R2 svcCOMScheduler;MICROS LM COM Scheduler;d:\micros\Common\Bin\ComScheduler.exe [3/29/2006 11:14 PM 412672]
R2 TeamViewer6;TeamViewer 6;c:\program files\TeamViewer\Version6\TeamViewer_Service.exe [6/1/2011 8:44 AM 2337144]
R3 MICROS Credit Card Server;MICROS Credit Card Server;d:\micros\Common\Bin\CCS.exe [3/29/2006 11:23 PM 192512]
R3 MICROS Database Service;MICROS Database Service;d:\micros\Common\Bin\resdbs.exe [3/29/2006 10:38 PM 1642496]
R3 MICROS Print Controller;MICROS Print Controller;d:\micros\Common\Bin\pcontrol.exe [3/29/2006 11:31 PM 368640]
R3 SQLANYs_sqlSRVR-MCRSPOS-3R;sqlSRVR-MCRSPOS-3R;c:\program files\Sybase\ASA\win32\dbsrv9.exe [2/23/2006 5:14 PM 77824]
R3 teamviewervpn;TeamViewer VPN Adapter;c:\windows\system32\drivers\teamviewervpn.sys [4/14/2011 11:04 AM 25088]
S1 MpKsl1c0b8a5e;MpKsl1c0b8a5e;\??\c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{B53170BD-399D-49E3-8C58-1B9BCDCEC809}\MpKsl1c0b8a5e.sys --> c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{B53170BD-399D-49E3-8C58-1B9BCDCEC809}\MpKsl1c0b8a5e.sys [?]
S1 MpKsl2b3bbd01;MpKsl2b3bbd01;\??\c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{4DD68867-0403-4E21-BD9D-B3266500428B}\MpKsl2b3bbd01.sys --> c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{4DD68867-0403-4E21-BD9D-B3266500428B}\MpKsl2b3bbd01.sys [?]
S1 MpKsl3bfc8f11;MpKsl3bfc8f11;\??\c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{FA50F7FD-6887-4762-B1C0-7EFD9DDB2FDE}\MpKsl3bfc8f11.sys --> c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{FA50F7FD-6887-4762-B1C0-7EFD9DDB2FDE}\MpKsl3bfc8f11.sys [?]
S1 MpKsl5dd46928;MpKsl5dd46928;\??\c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{7745089D-89D8-4B2E-BF84-EDB67A208CEF}\MpKsl5dd46928.sys --> c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{7745089D-89D8-4B2E-BF84-EDB67A208CEF}\MpKsl5dd46928.sys [?]
S1 MpKsl81aff128;MpKsl81aff128;\??\c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{B2DCA9A3-6800-4C6F-B0F6-2771BD41C930}\MpKsl81aff128.sys --> c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{B2DCA9A3-6800-4C6F-B0F6-2771BD41C930}\MpKsl81aff128.sys [?]
S1 MpKsl93542826;MpKsl93542826;\??\c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{1423983E-15D7-4842-8817-AA356B456C52}\MpKsl93542826.sys --> c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{1423983E-15D7-4842-8817-AA356B456C52}\MpKsl93542826.sys [?]
S1 MpKslad117e2e;MpKslad117e2e;\??\c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{F4D7DB3F-C5D3-4047-A8A4-38CC7E7368E8}\MpKslad117e2e.sys --> c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{F4D7DB3F-C5D3-4047-A8A4-38CC7E7368E8}\MpKslad117e2e.sys [?]
S1 MpKslcea6d27f;MpKslcea6d27f;\??\c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{F4D7DB3F-C5D3-4047-A8A4-38CC7E7368E8}\MpKslcea6d27f.sys --> c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{F4D7DB3F-C5D3-4047-A8A4-38CC7E7368E8}\MpKslcea6d27f.sys [?]
S2 clr_optimization_v4.0.30319_32;Microsoft .NET Framework NGEN v4.0.30319_X86;c:\windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe [3/18/2010 1:16 PM 130384]
S2 MICROS Backup Server;MICROS Backup Server;d:\micros\Common\Bin\resbsm.exe [3/29/2006 11:00 PM 880640]
S2 MICROS ILDS Server;MICROS ILDS Server;d:\micros\Common\Bin\ilds.exe [3/29/2006 10:49 PM 487424]
S2 MICROS Interface Server;MICROS Interface Server;d:\micros\Common\Bin\Ifs.exe [3/29/2006 11:25 PM 94208]
S2 MICROS KDS Controller;MICROS KDS Controller;d:\micros\Res\KDS\Bin\KDSController.exe [3/29/2006 11:27 PM 811008]
S3 Auto RTPatch Scheduler;Auto RTPatch Scheduler;c:\program files\Common Files\PocketSoft\RTPatch\AutoRTP\artpschd.exe [10/29/2003 8:00 PM 409600]
S3 EraserUtilDrv10633;EraserUtilDrv10633;\??\c:\program files\Common Files\Symantec Shared\EENGINE\EraserUtilDrv10633.sys --> c:\program files\Common Files\Symantec Shared\EENGINE\EraserUtilDrv10633.sys [?]
S3 HPKBCCID;HP Keyboard Smart Card Driver;c:\windows\system32\drivers\HPKBCCID.sys [8/4/2005 5:30 AM 48512]
S3 MICROS Table Management System;MICROS Table Management System;d:\micros\Common\Bin\TMSService.exe [11/16/2006 5:17 PM 217088]
S3 MicrosDesk;MICROS Secure Desktop;d:\micros\Common\Bin\MicrosDsk.exe [3/29/2006 11:14 PM 87040]
S3 MICROSTMSInterface;MICROS TMS Interface;d:\micros\Common\Bin\TMSInterface.exe [3/29/2006 11:18 PM 515584]
S3 PSEXESVC;PsExec;c:\windows\PSEXESVC.EXE [6/26/2008 8:02 PM 99592]
S3 STC2DFU;STCII DFU Adapter;c:\windows\system32\drivers\Stc2Dfu.sys [10/25/2004 1:04 AM 7796]
S3 usbdpfp;U.are.UŽ Fingerprint Reader Class Driver;c:\windows\system32\drivers\usbdpfp.sys [2/15/2008 9:03 AM 47104]
S3 Winacusb;Winacusb;c:\windows\system32\DRIVERS\winacusb.sys --> c:\windows\system32\DRIVERS\winacusb.sys [?]
S3 WPFFontCache_v0400;Windows Presentation Foundation Font Cache 4.0.0.0;c:\windows\Microsoft.NET\Framework\v4.0.30319\WPF\WPFFontCache_v0400.exe [3/18/2010 1:16 PM 753504]
S4 NTIdn;NTIdn;c:\windows\system32\drivers\ntidn.sys [3/30/2006 4:11 AM 89012]
S4 WinRM;Windows Remote Management (WS-Management);c:\windows\system32\svchost.exe -k WINRM [2/28/2006 8:00 AM 14336]
.
--- Other Services/Drivers In Memory ---
.
*NewlyCreated* - CPUZ135
*NewlyCreated* - FFXIQKOC
*NewlyCreated* - MPKSL39573FA1
*NewlyCreated* - MPKSL47A5C8F2
*Deregistered* - cpuz135
*Deregistered* - ffxiqkoc
*Deregistered* - MpKsl39573fa1
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\svchost]
WINRM REG_MULTI_SZ WINRM
.
Contents of the 'Scheduled Tasks' folder
.
2011-07-15 c:\windows\Tasks\GoogleUpdateTaskUserS-1-5-21-1993962763-1383384898-725345543-1018Core.job
- c:\documents and settings\Ryan McHugh\Local Settings\Application Data\Google\Update\GoogleUpdate.exe [2011-07-14 17:58]
.
2011-07-16 c:\windows\Tasks\GoogleUpdateTaskUserS-1-5-21-1993962763-1383384898-725345543-1018UA.job
- c:\documents and settings\Ryan McHugh\Local Settings\Application Data\Google\Update\GoogleUpdate.exe [2011-07-14 17:58]
.
.
------- Supplementary Scan -------
.
TCP: Interfaces\{07C26080-F37E-48F5-9190-E046B7A876A0}: NameServer = 192.168.3.1
TCP: Interfaces\{E9284B7E-711E-4834-BA65-1E09ED45363B}: NameServer = 208.67.222.222,208.67.220.220
FF - ProfilePath - c:\documents and settings\Ryan McHugh\Application Data\Mozilla\Firefox\Profiles\bd6my2ux.default\
FF - Ext: Default: {972ce4c6-7e08-4474-a285-3208198ce6fd} - c:\program files\Mozilla Firefox\extensions\{972ce4c6-7e08-4474-a285-3208198ce6fd}
.
.
------- File Associations -------
.
.txt=Notepad++_file
.
.
**************************************************************************
.
catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2011-07-16 01:53
Windows 5.1.2600 Service Pack 3 NTFS
.
scanning hidden processes ...
.
scanning hidden autostart entries ...
.
scanning hidden files ...
.
scan completed successfully
hidden files: 0
.
**************************************************************************
.
--------------------- LOCKED REGISTRY KEYS ---------------------
.
[HKEY_LOCAL_MACHINE\software\Microsoft\Windows\CurrentVersion\System*]
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
.
--------------------- DLLs Loaded Under Running Processes ---------------------
.
- - - - - - - > 'winlogon.exe'(972)
c:\windows\system32\Ati2evxx.dll
.
- - - - - - - > 'winlogon.exe'(3388)
c:\windows\system32\Ati2evxx.dll
.
- - - - - - - > 'explorer.exe'(516)
c:\windows\system32\WININET.dll
c:\windows\system32\ieframe.dll
c:\windows\system32\webcheck.dll
c:\windows\system32\WPDShServiceObj.dll
c:\windows\system32\PortableDeviceTypes.dll
c:\windows\system32\PortableDeviceApi.dll
c:\windows\system32\l3codeca.acm
.
Completion time: 2011-07-16 01:55:26
ComboFix-quarantined-files.txt 2011-07-16 05:55
ComboFix2.txt 2011-07-14 18:16
ComboFix3.txt 2010-08-05 19:11
.
Pre-Run: 24,160,980,992 bytes free
Post-Run: 24,143,970,304 bytes free
.
WindowsXP-KB310994-SP2-Pro-BootDisk-ENU.exe
[boot loader]
timeout=2
default=multi(0)disk(0)rdisk(0)partition(1)\WINDOWS
[operating systems]
c:\cmdcons\BOOTSECT.DAT="Microsoft Windows Recovery Console" /cmdcons
UnsupportedDebug="do not select this" /debug
multi(0)disk(0)rdisk(0)partition(1)\WINDOWS="Microsoft Windows XP Professional" /noexecute=optin /fastdetect /usepmtimer
.
- - End Of File - - 01994C2987B9FE331FE0B1286E14E2F1

#4 CatByte

CatByte

    bleepin' tiger


  • Malware Response Team
  • 14,664 posts
  • OFFLINE
  •  
  • Gender:Not Telling
  • Location:Canada
  • Local time:12:05 PM

Posted 16 July 2011 - 05:21 AM

Hi,

Please do the following:

  • Very Important! Temporarily disable your anti-virus, script blocking and any anti-malware real-time protection before following the steps below.
  • They can interfere with ComboFix or remove some of its embedded files which may cause "unpredictable results".
Copy/paste the text inside the Codebox below into notepad:

Here's how to do that:
Click Start > Run type Notepad click OK.
This will open an empty notepad file:

Copy all the text inside of the code box - Press Ctrl+C (or right click on the highlighted section and choose 'copy')

KillAll::

File::
c:\windows\system32\drivers\rkhdrv40.sys

Driver::
rkhdrv40

Now paste the copied text into the open notepad - press CTRL+V (or right click and choose 'paste')

Save this file to your desktop, Save this as "CFScript"


Here's how to do that:

1.Click File;
2.Click Save As... Change the directory to your desktop;
3.Change the Save as type to "All Files";
4.Type in the file name: CFScript
5.Click Save ...

Posted Image
  • Referring to the screenshot above, drag CFScript.txt into ComboFix.exe.
  • ComboFix will now run a scan on your system. It may reboot your system when it finishes. This is normal.
  • When finished, it shall produce a log for you.
  • Copy and paste the contents of the log in your next reply.

CAUTION: Do not mouse-click ComboFix's window while it is running. That may cause it to stall.


NEXT

  • Please open your MalwareBytes AntiMalware Program
  • Click the Update Tab and search for updates
  • If an update is found, it will download and install the latest version.
  • Once the program has loaded, select "Perform Quick Scan", then click Scan.
  • The scan may take some time to finish, so please be patient.
  • When the scan is complete, click OK, then Show Results to view the results.
  • Make sure that everything is checked, and click Remove Selected. <-- very important
  • When disinfection is completed, a log will open in Notepad and you may be prompted to Restart. (See Extra Note)
  • The log is automatically saved by MBAM and can be viewed by clicking the Logs tab in MBAM.
  • Copy&Paste the entire report in your next reply.

Extra Note:If MBAM encounters a file that is difficult to remove, you will be presented with 1 of 2 prompts, click OK to either and let MBAM proceed with the disinfection process, if asked to restart the computer, please do so immediately.



NEXT


Go here to run an online scanner from ESET.
  • Turn off the real time scanner of any existing antivirus program while performing the online scan
  • Tick the box next to YES, I accept the Terms of Use.
  • Click Start
  • When asked, allow the activeX control to install
  • Click Start
  • Make sure that the option Remove found threats is unticked and the Scan Archives option is ticked.
  • Click on Advanced Settings, ensure the options Scan for potentially unwanted applications, Scan for potentially unsafe applications, and Enable Anti-Stealth Technology are ticked.
  • Click Scan
  • Wait for the scan to finish
  • When the scan completes, press the LIST OF THREATS FOUND button
  • Press EXPORT TO TEXT FILE , name the file ESETSCAN and save it to your desktop
  • Include the contents of this report in your next reply.
  • Press the BACK button.
  • Press Finish

Microsoft MVP - 2010, 2011, 2012, 2013, 2014, 2015


#5 Ryan McHugh

Ryan McHugh
  • Topic Starter

  • Members
  • 31 posts
  • OFFLINE
  •  
  • Local time:12:05 PM

Posted 17 July 2011 - 12:55 AM

Earlier when I tried running the Combofix script, it disabled the internet connection on the computer and never came back up. I'll have to try it again tomorrow. (I didn't have time to fix it today, had to just restart the computer via power button, because it doesn't have a keyboard/mouse/monitor hooked up to it and I normally just RDP into it, because it's at the office, and I'm not there very often.)

Sorry about the delay in the reply. Busy day today. :)

Edited by Ryan McHugh, 17 July 2011 - 01:08 AM.


#6 CatByte

CatByte

    bleepin' tiger


  • Malware Response Team
  • 14,664 posts
  • OFFLINE
  •  
  • Gender:Not Telling
  • Location:Canada
  • Local time:12:05 PM

Posted 17 July 2011 - 07:53 AM

OK, thanks for letting me know, usually a reboot will bring back your connection, if not, try the following:

if your network icon appears on the Windows taskbar, then you can repair it by right-clicking on the icon and selecting Repair.

Posted Image

If you have no task bar icon do this:

  • Click on the Start button.
  • Click on the Settings menu option.
  • Click on the Control Panel option.
  • When the Control Panel opens, double-click on the Network Connections icon. If your Control Panel is set to Category View, then double-click on Network and Internet Connections and then click on Network Connections at the bottom.
  • You will now see a list of available network connections. Locate the connection for your Wireless or Lan adapter and right-click on it.
  • click on the Repair menu option.

Posted Image

Let the repair process perform its tasks and when it has finished, your Internet connection should be working again.

Microsoft MVP - 2010, 2011, 2012, 2013, 2014, 2015


#7 Ryan McHugh

Ryan McHugh
  • Topic Starter

  • Members
  • 31 posts
  • OFFLINE
  •  
  • Local time:12:05 PM

Posted 17 July 2011 - 12:53 PM

ESet found no threats, and didn't give me the option to export.

Below are the combofix and mbam logs.

Thanks for your help,

Ryan

---
//Combofix Log ---


ComboFix 11-07-15.03 - Ryan McHugh 07/16/2011 8:50.5.1 - x86
Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.2942.1864 [GMT -4:00]
Running from: c:\documents and settings\Ryan McHugh\Desktop\ComboFix.exe
Command switches used :: c:\documents and settings\Ryan McHugh\Desktop\CFScript.txt
AV: Microsoft Security Essentials *Disabled/Updated* {BCF43643-A118-4432-AEDE-D861FCBCFCDF}
AV: Microsoft Security Essentials *Disabled/Updated* {EDB4FA23-53B8-4AFA-8C5D-99752CCA7095}
.
FILE ::
"c:\windows\system32\drivers\rkhdrv40.sys"
.
.
((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.
.
c:\windows\system32\drivers\rkhdrv40.sys
.
.
((((((((((((((((((((((((((((((((((((((( Drivers/Services )))))))))))))))))))))))))))))))))))))))))))))))))
.
.
-------\Legacy_RKHDRV40
-------\Service_rkhdrv40
.
.
((((((((((((((((((((((((( Files Created from 2011-06-17 to 2011-07-17 )))))))))))))))))))))))))))))))
.
.
2011-07-16 12:51 . 2011-07-16 12:51 -------- d-sh--w- c:\documents and settings\LocalService\IETldCache
2011-07-16 06:02 . 2011-07-16 06:02 28752 ----a-w- c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{9D6E7D0F-9DE0-49BE-BECF-E86863011AC1}\MpKslb201418d.sys
2011-07-16 06:01 . 2011-06-07 15:55 7074640 ----a-w- c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{9D6E7D0F-9DE0-49BE-BECF-E86863011AC1}\mpengine.dll
2011-07-14 20:51 . 2011-07-14 20:51 -------- d-----w- c:\program files\Speccy
2011-07-14 18:02 . 2011-07-14 19:27 -------- d-----w- c:\documents and settings\All Users\Application Data\Spybot - Search & Destroy
2011-07-14 18:02 . 2011-07-14 18:08 -------- d-----w- c:\program files\Spybot - Search & Destroy
2011-07-14 17:58 . 2011-07-14 17:59 -------- d-----w- c:\documents and settings\Ryan McHugh\Local Settings\Application Data\Google
2011-07-14 17:57 . 2011-07-14 17:57 -------- d-----w- c:\documents and settings\Ryan McHugh\Local Settings\Application Data\Mozilla
2011-07-13 17:13 . 2011-07-13 17:13 -------- d-----w- c:\documents and settings\Ryan McHugh\Application Data\Malwarebytes
2011-07-13 17:13 . 2011-05-29 13:11 39984 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2011-07-13 17:13 . 2011-05-29 13:11 22712 ----a-w- c:\windows\system32\drivers\mbam.sys
2011-07-13 17:10 . 2011-07-13 17:10 -------- d-----w- c:\program files\CPUID
2011-07-13 17:10 . 2010-11-09 19:35 21992 ----a-w- c:\windows\system32\drivers\cpuz135_x32.sys
2011-07-13 17:10 . 2011-07-13 17:10 -------- d-----w- c:\program files\NirSoft
.
.
.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2011-06-29 07:33 . 2011-05-14 21:34 404640 ----a-w- c:\windows\system32\FlashPlayerCPLApp.cpl
2011-06-13 13:36 . 2009-02-04 21:11 1142 ----a-w- c:\windows\system32\mailrpt.bat
2011-06-07 15:55 . 2010-10-18 03:50 7074640 ----a-w- c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\Backup\mpengine.dll
2011-06-02 14:02 . 2006-02-28 12:00 1858944 ----a-w- c:\windows\system32\win32k.sys
2011-05-02 15:31 . 2006-08-23 16:35 692736 ----a-w- c:\windows\system32\inetcomm.dll
2011-04-29 17:25 . 2006-02-28 12:00 151552 ----a-w- c:\windows\system32\schannel.dll
2011-04-29 16:19 . 2006-02-28 12:00 456320 ----a-w- c:\windows\system32\drivers\mrxsmb.sys
2011-04-26 11:07 . 2006-02-28 12:00 33280 ----a-w- c:\windows\system32\csrsrv.dll
2011-04-26 11:07 . 2006-02-28 12:00 293376 ----a-w- c:\windows\system32\winsrv.dll
2011-04-25 16:11 . 2006-02-28 12:00 916480 ----a-w- c:\windows\system32\wininet.dll
2011-04-25 16:11 . 2006-02-28 12:00 43520 ----a-w- c:\windows\system32\licmgr10.dll
2011-04-25 16:11 . 2006-02-28 12:00 1469440 ------w- c:\windows\system32\inetcpl.cpl
2011-04-25 12:01 . 2006-02-28 12:00 385024 ----a-w- c:\windows\system32\html.iec
2011-04-21 13:37 . 2006-02-28 12:00 105472 ----a-w- c:\windows\system32\drivers\mup.sys
.
.
((((((((((((((((((((((((((((( SnapShot_2011-07-14_18.14.36 )))))))))))))))))))))))))))))))))))))))))
.
+ 2010-08-06 18:13 . 2011-07-16 18:08 32768 c:\windows\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\index.dat
- 2010-08-06 18:13 . 2011-07-14 17:18 32768 c:\windows\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\index.dat
- 2007-03-30 08:04 . 2011-07-14 17:18 32768 c:\windows\system32\config\systemprofile\Local Settings\History\History.IE5\index.dat
+ 2007-03-30 08:04 . 2011-07-16 18:08 32768 c:\windows\system32\config\systemprofile\Local Settings\History\History.IE5\index.dat
- 2010-08-06 18:13 . 2011-07-14 17:18 16384 c:\windows\system32\config\systemprofile\Cookies\index.dat
+ 2011-07-16 18:08 . 2011-07-16 18:08 16384 c:\windows\system32\config\systemprofile\Cookies\index.dat
+ 2006-02-28 12:00 . 2011-07-16 17:57 573698 c:\windows\system32\perfh009.dat
- 2006-02-28 12:00 . 2011-07-13 17:12 573698 c:\windows\system32\perfh009.dat
- 2006-02-28 12:00 . 2011-07-13 17:12 112898 c:\windows\system32\perfc009.dat
+ 2006-02-28 12:00 . 2011-07-16 17:57 112898 c:\windows\system32\perfc009.dat
+ 2006-08-25 14:00 . 2011-07-16 17:53 222121 c:\windows\system32\inetsrv\MetaBase.bin
.
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"ooccctrl.exe"="c:\program files\OO Software\CleverCache\ooccctrl.exe" [2007-01-28 1911568]
"PowerPanel Personal Edition User Interaction"="c:\program files\CyberPower PowerPanel Personal Edition\pppeuser.exe" [2009-05-27 315392]
"MSC"="c:\program files\Microsoft Security Client\msseces.exe" [2010-11-30 997408]
.
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run]
"DWQueuedReporting"="c:\progra~1\COMMON~1\MICROS~1\DW\dwtrig20.exe" [2008-11-04 435096]
.
c:\documents and settings\chris\Start Menu\Programs\Startup\
Autosequences and Reports.lnk - d:\micros\Common\Bin\AutoSeqExec.exe [2006-3-29 2370048]
.
[hkey_local_machine\software\microsoft\windows\currentversion\explorer\ShellExecuteHooks]
"{56F9679E-7826-4C84-81F3-532071A8BCC5}"= "c:\program files\Windows Desktop Search\MSNLNamespaceMgr.dll" [2009-05-25 304128]
.
[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\session manager]
BootExecute REG_MULTI_SZ PDBoot.exe\0autocheck autochk *
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\MsMpSvc]
@="Service"
.
[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring]
"DisableMonitoring"=dword:00000001
.
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]
"DisableUnicastResponsesToMulticastBroadcast"= 0 (0x0)
.
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"c:\\WINDOWS\\system32\\sessmgr.exe"=
"c:\\WINDOWS\\Network Diagnostic\\xpnetdiag.exe"=
"c:\\Program Files\\TeamViewer\\Version6\\TeamViewer.exe"=
"c:\\Program Files\\TeamViewer\\Version6\\TeamViewer_Service.exe"=
.
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\GloballyOpenPorts\List]
"3389:TCP"= 3389:TCP:24.61.238.0/255.255.255.0,76.24.43.0/255.255.255.0,192.168.0.0/255.255.0.0:Enabled:@xpsp2res.dll,-22009
.
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\IcmpSettings]
"AllowInboundTimestampRequest"= 1 (0x1)
"AllowInboundMaskRequest"= 0 (0x0)
"AllowInboundRouterRequest"= 0 (0x0)
"AllowOutboundDestinationUnreachable"= 0 (0x0)
"AllowOutboundSourceQuench"= 0 (0x0)
"AllowOutboundParameterProblem"= 0 (0x0)
"AllowOutboundTimeExceeded"= 0 (0x0)
"AllowRedirect"= 0 (0x0)
"AllowOutboundPacketTooBig"= 0 (0x0)
"AllowInboundEchoRequest"= 1 (0x1)
.
R0 ahcix86;ahcix86;c:\windows\system32\drivers\ahcix86.sys [3/21/2007 10:38 AM 120320]
R0 SI3112r;ATI-4379 Serial ATA Controller;c:\windows\system32\drivers\SI3112r.sys [8/23/2006 2:07 PM 102528]
R1 MpKslb201418d;MpKslb201418d;c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{9D6E7D0F-9DE0-49BE-BECF-E86863011AC1}\MpKslb201418d.sys [7/16/2011 2:02 AM 28752]
R2 CISERVICE;MICROS Caller ID Service;d:\micros\Common\Bin\CIService.exe [3/29/2006 11:29 PM 69632]
R2 DbUpdateServer;MICROS DB Update Service;d:\micros\Common\Bin\DbUpdateServer.exe [3/29/2006 11:18 PM 102400]
R2 Iprip;RIP Listener;c:\windows\System32\svchost.exe -k netsvcs [2/28/2006 8:00 AM 14336]
R2 MICROS 3700d Server;MICROS 3700d Server;d:\micros\Common\Bin\3700d.exe [3/29/2006 11:22 PM 479232]
R2 MICROS Autosequence Server;MICROS Autosequence Server;d:\micros\Common\Bin\AutoSeqServ.exe [3/29/2006 11:27 PM 86016]
R2 MICROS CAL Service;MICROS CAL Service;d:\micros\Common\Bin\CALSrv.exe [3/30/2006 4:10 AM 155648]
R2 MICROS Distributed Service Manager;MICROS Distributed Service Manager;d:\micros\Common\Bin\DSM.exe [3/29/2006 10:59 PM 565248]
R2 MICROS Remoting Service;MICROS Remoting Service;d:\micros\Common\Bin\MicrosRemotingService.exe [1/23/2009 1:32 AM 81920]
R2 MicrosCashManagementComServer;MICROS Cash Management Com Server;d:\micros\Common\Bin\CMSC.exe [3/29/2006 11:18 PM 934912]
R2 NPF;NetGroup Packet Filter Driver;c:\windows\system32\drivers\npf.sys [6/25/2010 1:07 PM 35088]
R2 srvGSSDataService;MICROS GSS Data Service;d:\micros\Res\GSS\Bin\GSSDataService.exe [4/13/2010 2:48 AM 589824]
R2 srvMDSHTTPService;MICROS MDS HTTP Service;d:\micros\Common\Bin\MDSHTTPService.exe [3/29/2006 11:35 PM 417792]
R2 svcCashManager;MICROS Cash Management;d:\micros\Common\Bin\CMS.exe [3/29/2006 11:18 PM 2327040]
R2 svcCOMScheduler;MICROS LM COM Scheduler;d:\micros\Common\Bin\ComScheduler.exe [3/29/2006 11:14 PM 412672]
R2 TeamViewer6;TeamViewer 6;c:\program files\TeamViewer\Version6\TeamViewer_Service.exe [6/1/2011 8:44 AM 2337144]
R3 MICROS Credit Card Server;MICROS Credit Card Server;d:\micros\Common\Bin\CCS.exe [3/29/2006 11:23 PM 192512]
R3 MICROS Database Service;MICROS Database Service;d:\micros\Common\Bin\resdbs.exe [3/29/2006 10:38 PM 1642496]
R3 MICROS Print Controller;MICROS Print Controller;d:\micros\Common\Bin\pcontrol.exe [3/29/2006 11:31 PM 368640]
R3 SQLANYs_sqlSRVR-MCRSPOS-3R;sqlSRVR-MCRSPOS-3R;c:\program files\Sybase\ASA\win32\dbsrv9.exe [2/23/2006 5:14 PM 77824]
R3 teamviewervpn;TeamViewer VPN Adapter;c:\windows\system32\drivers\teamviewervpn.sys [4/14/2011 11:04 AM 25088]
S1 MpKsl1c0b8a5e;MpKsl1c0b8a5e;\??\c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{B53170BD-399D-49E3-8C58-1B9BCDCEC809}\MpKsl1c0b8a5e.sys --> c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{B53170BD-399D-49E3-8C58-1B9BCDCEC809}\MpKsl1c0b8a5e.sys [?]
S1 MpKsl2b3bbd01;MpKsl2b3bbd01;\??\c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{4DD68867-0403-4E21-BD9D-B3266500428B}\MpKsl2b3bbd01.sys --> c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{4DD68867-0403-4E21-BD9D-B3266500428B}\MpKsl2b3bbd01.sys [?]
S1 MpKsl3bfc8f11;MpKsl3bfc8f11;\??\c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{FA50F7FD-6887-4762-B1C0-7EFD9DDB2FDE}\MpKsl3bfc8f11.sys --> c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{FA50F7FD-6887-4762-B1C0-7EFD9DDB2FDE}\MpKsl3bfc8f11.sys [?]
S1 MpKsl5dd46928;MpKsl5dd46928;\??\c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{7745089D-89D8-4B2E-BF84-EDB67A208CEF}\MpKsl5dd46928.sys --> c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{7745089D-89D8-4B2E-BF84-EDB67A208CEF}\MpKsl5dd46928.sys [?]
S1 MpKsl81aff128;MpKsl81aff128;\??\c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{B2DCA9A3-6800-4C6F-B0F6-2771BD41C930}\MpKsl81aff128.sys --> c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{B2DCA9A3-6800-4C6F-B0F6-2771BD41C930}\MpKsl81aff128.sys [?]
S1 MpKsl93542826;MpKsl93542826;\??\c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{1423983E-15D7-4842-8817-AA356B456C52}\MpKsl93542826.sys --> c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{1423983E-15D7-4842-8817-AA356B456C52}\MpKsl93542826.sys [?]
S1 MpKslad117e2e;MpKslad117e2e;\??\c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{F4D7DB3F-C5D3-4047-A8A4-38CC7E7368E8}\MpKslad117e2e.sys --> c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{F4D7DB3F-C5D3-4047-A8A4-38CC7E7368E8}\MpKslad117e2e.sys [?]
S1 MpKslcea6d27f;MpKslcea6d27f;\??\c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{F4D7DB3F-C5D3-4047-A8A4-38CC7E7368E8}\MpKslcea6d27f.sys --> c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{F4D7DB3F-C5D3-4047-A8A4-38CC7E7368E8}\MpKslcea6d27f.sys [?]
S2 clr_optimization_v4.0.30319_32;Microsoft .NET Framework NGEN v4.0.30319_X86;c:\windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe [3/18/2010 1:16 PM 130384]
S2 MICROS Backup Server;MICROS Backup Server;d:\micros\Common\Bin\resbsm.exe [3/29/2006 11:00 PM 880640]
S2 MICROS ILDS Server;MICROS ILDS Server;d:\micros\Common\Bin\ilds.exe [3/29/2006 10:49 PM 487424]
S2 MICROS Interface Server;MICROS Interface Server;d:\micros\Common\Bin\Ifs.exe [3/29/2006 11:25 PM 94208]
S2 MICROS KDS Controller;MICROS KDS Controller;d:\micros\Res\KDS\Bin\KDSController.exe [3/29/2006 11:27 PM 811008]
S3 Auto RTPatch Scheduler;Auto RTPatch Scheduler;c:\program files\Common Files\PocketSoft\RTPatch\AutoRTP\artpschd.exe [10/29/2003 8:00 PM 409600]
S3 EraserUtilDrv10633;EraserUtilDrv10633;\??\c:\program files\Common Files\Symantec Shared\EENGINE\EraserUtilDrv10633.sys --> c:\program files\Common Files\Symantec Shared\EENGINE\EraserUtilDrv10633.sys [?]
S3 HPKBCCID;HP Keyboard Smart Card Driver;c:\windows\system32\drivers\HPKBCCID.sys [8/4/2005 5:30 AM 48512]
S3 MICROS Table Management System;MICROS Table Management System;d:\micros\Common\Bin\TMSService.exe [11/16/2006 5:17 PM 217088]
S3 MicrosDesk;MICROS Secure Desktop;d:\micros\Common\Bin\MicrosDsk.exe [3/29/2006 11:14 PM 87040]
S3 MICROSTMSInterface;MICROS TMS Interface;d:\micros\Common\Bin\TMSInterface.exe [3/29/2006 11:18 PM 515584]
S3 PSEXESVC;PsExec;c:\windows\PSEXESVC.EXE [6/26/2008 8:02 PM 99592]
S3 STC2DFU;STCII DFU Adapter;c:\windows\system32\drivers\Stc2Dfu.sys [10/25/2004 1:04 AM 7796]
S3 usbdpfp;U.are.UŽ Fingerprint Reader Class Driver;c:\windows\system32\drivers\usbdpfp.sys [2/15/2008 9:03 AM 47104]
S3 Winacusb;Winacusb;c:\windows\system32\DRIVERS\winacusb.sys --> c:\windows\system32\DRIVERS\winacusb.sys [?]
S3 WPFFontCache_v0400;Windows Presentation Foundation Font Cache 4.0.0.0;c:\windows\Microsoft.NET\Framework\v4.0.30319\WPF\WPFFontCache_v0400.exe [3/18/2010 1:16 PM 753504]
S4 NTIdn;NTIdn;c:\windows\system32\drivers\ntidn.sys [3/30/2006 4:11 AM 89012]
S4 WinRM;Windows Remote Management (WS-Management);c:\windows\system32\svchost.exe -k WINRM [2/28/2006 8:00 AM 14336]
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\svchost]
WINRM REG_MULTI_SZ WINRM
.
Contents of the 'Scheduled Tasks' folder
.
2011-07-16 c:\windows\Tasks\GoogleUpdateTaskUserS-1-5-21-1993962763-1383384898-725345543-1018Core.job
- c:\documents and settings\Ryan McHugh\Local Settings\Application Data\Google\Update\GoogleUpdate.exe [2011-07-14 17:58]
.
2011-07-17 c:\windows\Tasks\GoogleUpdateTaskUserS-1-5-21-1993962763-1383384898-725345543-1018UA.job
- c:\documents and settings\Ryan McHugh\Local Settings\Application Data\Google\Update\GoogleUpdate.exe [2011-07-14 17:58]
.
.
------- Supplementary Scan -------
.
TCP: Interfaces\{07C26080-F37E-48F5-9190-E046B7A876A0}: NameServer = 192.168.3.1
TCP: Interfaces\{E9284B7E-711E-4834-BA65-1E09ED45363B}: NameServer = 208.67.222.222,208.67.220.220
FF - ProfilePath - c:\documents and settings\Ryan McHugh\Application Data\Mozilla\Firefox\Profiles\bd6my2ux.default\
FF - Ext: Default: {972ce4c6-7e08-4474-a285-3208198ce6fd} - c:\program files\Mozilla Firefox\extensions\{972ce4c6-7e08-4474-a285-3208198ce6fd}
.
.
**************************************************************************
.
catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2011-07-17 09:51
Windows 5.1.2600 Service Pack 3 NTFS
.
scanning hidden processes ...
.
scanning hidden autostart entries ...
.
scanning hidden files ...
.
scan completed successfully
hidden files: 0
.
**************************************************************************
.
[HKEY_LOCAL_MACHINE\System\ControlSet001\Services\PEVSystemStart]
"ImagePath"="\"c:\combofix\pev.cfxxe\" EXEC /i \"c:\combofix\REGT.cfxxe\" /S \"c:\combofix\erunt.dat\""
.
--------------------- LOCKED REGISTRY KEYS ---------------------
.
[HKEY_LOCAL_MACHINE\software\Microsoft\Windows\CurrentVersion\System*]
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
.
--------------------- DLLs Loaded Under Running Processes ---------------------
.
- - - - - - - > 'winlogon.exe'(960)
c:\windows\system32\Ati2evxx.dll
.
- - - - - - - > 'winlogon.exe'(1516)
c:\windows\system32\Ati2evxx.dll
.
- - - - - - - > 'explorer.exe'(2064)
c:\windows\system32\WININET.dll
c:\windows\system32\ieframe.dll
c:\windows\system32\webcheck.dll
c:\windows\system32\WPDShServiceObj.dll
c:\windows\system32\PortableDeviceTypes.dll
c:\windows\system32\PortableDeviceApi.dll
.
------------------------ Other Running Processes ------------------------
.
c:\windows\system32\Ati2evxx.exe
c:\program files\Microsoft Security Client\Antimalware\MsMpEng.exe
c:\windows\system32\Ati2evxx.exe
c:\windows\Microsoft.NET\Framework\v4.0.30319\aspnet_state.exe
c:\windows\system32\inetsrv\inetinfo.exe
d:\micros\Common\Bin\RunDBMS.exe
c:\program files\OO Software\CleverCache\ooccag.exe
c:\program files\Raxco\PerfectDisk10\PDAgent.exe
c:\program files\CyberPower PowerPanel Personal Edition\ppped.exe
d:\micros\RES\POS\Bin\ResSIMDB.exe
d:\micros\Res\Pos\Bin\PrintAdapter.exe
c:\windows\system32\rdpclip.exe
c:\windows\system32\wscntfy.exe
c:\windows\system32\Ati2evxx.exe
.
**************************************************************************
.
Completion time: 2011-07-17 09:53:35 - machine was rebooted
ComboFix-quarantined-files.txt 2011-07-17 13:53
ComboFix2.txt 2011-07-16 05:55
ComboFix3.txt 2011-07-14 18:16
ComboFix4.txt 2010-08-05 19:11
.
Pre-Run: 23,968,702,464 bytes free
Post-Run: 24,062,713,856 bytes free
.
WindowsXP-KB310994-SP2-Pro-BootDisk-ENU.exe
[boot loader]
timeout=2
default=multi(0)disk(0)rdisk(0)partition(1)\WINDOWS
[operating systems]
c:\cmdcons\BOOTSECT.DAT="Microsoft Windows Recovery Console" /cmdcons
UnsupportedDebug="do not select this" /debug
multi(0)disk(0)rdisk(0)partition(1)\WINDOWS="Microsoft Windows XP Professional" /noexecute=optin /fastdetect /usepmtimer
.
- - End Of File - - 1636A46FD25959093DE0B9DC5BCA38D0


//Mbam log


Malwarebytes' Anti-Malware 1.51.1.1800
www.malwarebytes.org

Database version: 7174

Windows 5.1.2600 Service Pack 3
Internet Explorer 8.0.6001.18702

7/17/2011 10:01:08 AM
mbam-log-2011-07-17 (10-01-08).txt

Scan type: Quick scan
Objects scanned: 207880
Time elapsed: 2 minute(s), 5 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 0

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
(No malicious items detected)

#8 CatByte

CatByte

    bleepin' tiger


  • Malware Response Team
  • 14,664 posts
  • OFFLINE
  •  
  • Gender:Not Telling
  • Location:Canada
  • Local time:12:05 PM

Posted 17 July 2011 - 01:04 PM

How is the computer running now?

Are there any outstanding issues?

Microsoft MVP - 2010, 2011, 2012, 2013, 2014, 2015


#9 Ryan McHugh

Ryan McHugh
  • Topic Starter

  • Members
  • 31 posts
  • OFFLINE
  •  
  • Local time:12:05 PM

Posted 17 July 2011 - 01:15 PM

It hasn't blue screened since we've done all these steps. I'd say it's resolved for now, and if I need any more help I'll be sure to come back and make a new post referencing this one.

Thanks so much for all your help,

Ryan

#10 CatByte

CatByte

    bleepin' tiger


  • Malware Response Team
  • 14,664 posts
  • OFFLINE
  •  
  • Gender:Not Telling
  • Location:Canada
  • Local time:12:05 PM

Posted 17 July 2011 - 01:50 PM

Hi

Just some housekeeping to do now,

Please do the following:


You can delete the DDS and GMER logs and programs from your desktop.


NEXT


Follow these steps to uninstall Combofix

  • Make sure your security programs are totally disabled.
  • Click START then RUN
  • Now copy/paste Combofix /uninstall into the runbox and click OK. Note the space between the ..X and the /U, it needs to be there.

Posted Image


If there are any logs/tools remaining on your desktop > right click and delete them.


NEXT


Below I have included a number of recommendations for how to protect your computer against malware infections.

  • It is good security practice to change your passwords to all your online accounts on a fairly regular basis, this is especially true after an infection. Refer to this Microsoft article
    Strong passwords: How to create and use them
    Then consider a password keeper, to keep all your passwords safe. KeePass is a small utility that allows you to manage all your passwords.

  • Keep Windows updated by regularly checking their website at :
    http://windowsupdate.microsoft.com/
    This will ensure your computer has always the latest security updates available installed on your computer.

  • Make Internet Explorer more secure
    • Click Start > Run
    • Type Inetcpl.cpl & click OK
    • Click on the Security tab
    • Click Reset all zones to default level
    • Make sure the Internet Zone is selected & Click Custom level
    • In the ActiveX section, set the first two options ("Download signed and unsigned ActiveX controls) to "Prompt", and ("Initialize and Script ActiveX controls not marked as safe") to "Disable".
    • Next Click OK, then Apply button and then OK to exit the Internet Properties page.

  • Download TFC to your desktop
    • Close any open windows.
    • Double click the TFC icon to run the program
    • TFC will close all open programs itself in order to run,
    • Click the Start button to begin the process.
    • Allow TFC to run uninterrupted.
    • The program should not take long to finish it's job
    • Once its finished it should automatically reboot your machine,
    • if it doesn't, manually reboot to ensure a complete clean
    It's normal after running TFC cleaner that the PC will be slower to boot the first time.

  • WOT, Web of Trust, warns you about risky websites that try to scam visitors, deliver malware or send spam. Protect your computer against online threats by using WOT as your front-line layer of protection when browsing or searching in unfamiliar territory. WOT's color-coded icons show you ratings for 21 million websites, helping you avoid the dangerous sites:
    • Green to go
    • Yellow for caution
    • Red to stop
    WOT has an addon available for both Firefox and IE

  • Keep a backup of your important files - Now, more than ever, it's especially important to protect your digital files and memories. This article is full of good information on alternatives for home backup solutions.

  • ERUNT (Emergency Recovery Utility NT) allows you to keep a complete backup of your registry and restore it when needed. The standard registry backup options that come with Windows back up most of the registry but not all of it. ERUNT however creates a complete backup set, including the Security hive and user related sections. ERUNT is easy to use and since it creates a full backup, there are no options or choices other than to select the location of the backup files. The backup set includes a small executable that will launch the registry restore if needed.

  • In light of your recent issue, I'm sure you'd like to avoid any future infections. Please take a look at this well written article:
    PC Safety and Security--What Do I Need?.


**Be very wary with any security software that is advertised in popups or in other ways. They are not only usually of no use, but often have malware in them.


Thank you for your patience, and performing all of the procedures requested.

Please respond one last time so we can consider the thread resolved and close it, thank-you.

Microsoft MVP - 2010, 2011, 2012, 2013, 2014, 2015


#11 Ryan McHugh

Ryan McHugh
  • Topic Starter

  • Members
  • 31 posts
  • OFFLINE
  •  
  • Local time:12:05 PM

Posted 17 July 2011 - 09:38 PM

Following instructions and replying one last time.

Thanks again for all the help!

-Ryan

#12 CatByte

CatByte

    bleepin' tiger


  • Malware Response Team
  • 14,664 posts
  • OFFLINE
  •  
  • Gender:Not Telling
  • Location:Canada
  • Local time:12:05 PM

Posted 18 July 2011 - 05:59 AM

you are welcome

stay safe :hello:

~CB

Microsoft MVP - 2010, 2011, 2012, 2013, 2014, 2015


#13 CatByte

CatByte

    bleepin' tiger


  • Malware Response Team
  • 14,664 posts
  • OFFLINE
  •  
  • Gender:Not Telling
  • Location:Canada
  • Local time:12:05 PM

Posted 18 July 2011 - 05:59 AM

It appears that this issue is resolved, therefore I am closing the topic. If that is not the case and you need or wish to continue with this topic, please send me or any Moderator a Personal Message (PM) that you would like this topic re-opened.

Microsoft MVP - 2010, 2011, 2012, 2013, 2014, 2015





0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users