Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

System Restore wont turn on


  • This topic is locked This topic is locked
35 replies to this topic

#1 Woozy82

Woozy82

  • Members
  • 20 posts
  • OFFLINE
  •  
  • Local time:05:09 PM

Posted 01 September 2011 - 01:48 PM

I noticed my System Restore Service was off and wont turn back on. So I ran: Run/services.msc/System Restore Service/Start and this is the message it gave me

---------------------------
Services
---------------------------
The System Restore Service service on Local Computer started and then stopped. Some services stop automatically if they have no work to do, for example, the Performance Logs and Alerts service.
---------------------------
OK
---------------------------

also I think my email & facebook accounts have been hacked from this pc

hijackthis
Logfile of Trend Micro HijackThis v2.0.4
Scan saved at 1:32:15 PM, on 9/1/2011
Platform: Windows XP SP3 (WinNT 5.01.2600)
MSIE: Internet Explorer v8.00 (8.00.6001.18702)
Boot mode: Normal

Running processes:
C:\windows\System32\smss.exe
C:\windows\SYSTEM32\winlogon.exe
C:\windows\system32\services.exe
C:\windows\system32\lsass.exe
C:\windows\system32\svchost.exe
C:\windows\System32\svchost.exe
C:\windows\system32\svchost.exe
C:\Program Files\AVAST Software\Avast\AvastSvc.exe
C:\windows\system32\spoolsv.exe
C:\Program Files\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe
C:\Program Files\Bonjour\mDNSResponder.exe
C:\Program Files\Fasoo DRM\fService.exe
C:\WINDOWS\system32\FsUsbExService.Exe
C:\Program Files\Java\jre6\bin\jqs.exe
C:\Program Files\LogMeIn\x86\LMIGuardianSvc.exe
C:\Program Files\LogMeIn\x86\RaMaint.exe
C:\Program Files\LogMeIn\x86\LogMeIn.exe
C:\Program Files\Malwarebytes' Anti-Malware\mbamservice.exe
C:\Program Files\Motorola\MotoHelper\MotoHelperService.exe
C:\Program Files\Nero\Update\NASvc.exe
C:\Program Files\Palm, Inc\novacom\x86\novacomd.exe
C:\windows\system32\nvsvc32.exe
C:\Program Files\Palm\PDK\tcprelay.exe
C:\Program Files\HTC\Internet Pass-Through\PassThruSvr.exe
C:\windows\Explorer.EXE
C:\Program Files\Motorola\MotoHelper\MotoHelperAgent.exe
c:\Program Files\Microsoft SQL Server\90\Shared\sqlwriter.exe
C:\windows\system32\svchost.exe
C:\Program Files\Yahoo!\SoftwareUpdate\YahooAUService.exe
C:\Program Files\AVAST Software\Avast\avastUI.exe
C:\PROGRA~1\FASOOD~1\fph.exe
C:\Program Files\iTunes\iTunesHelper.exe
C:\Documents and Settings\All Users\Application Data\LGMOBILEAX\B2C_Client\B2CNotiAgent.exe
C:\windows\system32\ctfmon.exe
C:\Program Files\Common Files\InstallShield\UpdateService\isuspm.exe
C:\Program Files\Microsoft ActiveSync\wcescomm.exe
C:\PROGRA~1\MICROS~3\rapimgr.exe
C:\Program Files\iPod\bin\iPodService.exe
C:\Program Files\Internet Explorer\IEXPLORE.EXE
C:\Program Files\Internet Explorer\IEXPLORE.EXE
C:\Program Files\Siber Systems\AI RoboForm\RoboTaskBarIcon.exe
C:\Program Files\Internet Explorer\IEXPLORE.EXE
C:\Program Files\Malwarebytes' Anti-Malware\mbam.exe
C:\windows\system32\NOTEPAD.EXE
C:\Program Files\Trend Micro\HiJackThis\HiJackThis.exe

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.yahoo.com/
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = 192.168.*.*;*.local
O1 - Hosts: 50.22.140.200 autostart.sh
O2 - BHO: AcroIEHelperStub - {18DF081C-E8AD-4283-A596-FA578C2EBDC3} - C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelperShim.dll
O2 - BHO: RoboForm BHO - {724d43a9-0d85-11d4-9908-00400523e39a} - C:\Program Files\Siber Systems\AI RoboForm\roboform.dll
O2 - BHO: Groove GFS Browser Helper - {72853161-30C5-4D22-B7F9-0BBC1D38A37E} - C:\Program Files\Microsoft Office\Office12\GrooveShellExtensions.dll
O2 - BHO: avast! WebRep - {8E5E2654-AD2D-48bf-AC2D-D17F00898D06} - C:\Program Files\AVAST Software\Avast\aswWebRepIE.dll
O2 - BHO: Google Toolbar Helper - {AA58ED58-01DD-4d91-8333-CF10577473F7} - C:\Program Files\Google\Google Toolbar\GoogleToolbar_32.dll
O2 - BHO: Google Toolbar Notifier BHO - {AF69DE43-7D58-4638-B6FA-CE66B5AD205D} - C:\Program Files\Google\GoogleToolbarNotifier\5.7.6406.1642\swg.dll
O2 - BHO: Java(tm) Plug-In 2 SSV Helper - {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Program Files\Java\jre6\bin\jp2ssv.dll
O2 - BHO: JQSIEStartDetectorImpl - {E7E6F031-17CE-4C07-BC86-EABFE594F69C} - C:\Program Files\Java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll
O3 - Toolbar: avast! WebRep - {8E5E2654-AD2D-48bf-AC2D-D17F00898D06} - C:\Program Files\AVAST Software\Avast\aswWebRepIE.dll
O3 - Toolbar: &RoboForm - {724d43a0-0d85-11d4-9908-00400523e39a} - C:\Program Files\Siber Systems\AI RoboForm\roboform.dll
O3 - Toolbar: Google Toolbar - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - C:\Program Files\Google\Google Toolbar\GoogleToolbar_32.dll
O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\system32\NvCpl.dll,NvStartup
O4 - HKLM\..\Run: [ISUSPM Startup] "c:\Program Files\Common Files\InstallShield\UpdateService\isuspm.exe" -startup
O4 - HKLM\..\Run: [avast] "C:\Program Files\AVAST Software\Avast\avastUI.exe" /nogui
O4 - HKLM\..\Run: [FPH Exe] "C:\PROGRA~1\FASOOD~1\fph.exe"
O4 - HKCU\..\Run: [ctfmon.exe] C:\windows\system32\ctfmon.exe
O4 - HKCU\..\Run: [ISUSScheduler] "C:\Program Files\Common Files\InstallShield\UpdateService\issch.exe" -start
O4 - HKCU\..\Run: [ISUSPM] "C:\Program Files\Common Files\InstallShield\UpdateService\isuspm.exe" -scheduler
O4 - HKCU\..\Run: [swg] "C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe"
O8 - Extra context menu item: Customize Menu - file://C:\Program Files\Siber Systems\AI RoboForm\RoboFormComCustomizeIEMenu.html
O8 - Extra context menu item: Fill Forms - file://C:\Program Files\Siber Systems\AI RoboForm\RoboFormComFillForms.html
O8 - Extra context menu item: Google Sidewiki... - res://C:\Program Files\Google\Google Toolbar\Component\GoogleToolbarDynamic_mui_en_7461B1589E8B4FB7.dll/cmsidewiki.html
O8 - Extra context menu item: RoboForm Toolbar - file://C:\Program Files\Siber Systems\AI RoboForm\RoboFormComShowToolbar.html
O8 - Extra context menu item: Save Forms - file://C:\Program Files\Siber Systems\AI RoboForm\RoboFormComSavePass.html
O9 - Extra button: Send to OneNote - {2670000A-7350-4f3c-8081-5663EE0C6C49} - C:\PROGRA~1\MICROS~2\Office12\ONBttnIE.dll
O9 - Extra 'Tools' menuitem: S&end to OneNote - {2670000A-7350-4f3c-8081-5663EE0C6C49} - C:\PROGRA~1\MICROS~2\Office12\ONBttnIE.dll
O9 - Extra button: Create Mobile Favorite - {2EAF5BB1-070F-11D3-9307-00C04FAE2D4F} - C:\PROGRA~1\MICROS~3\INetRepl.dll
O9 - Extra button: (no name) - {2EAF5BB2-070F-11D3-9307-00C04FAE2D4F} - C:\PROGRA~1\MICROS~3\INetRepl.dll
O9 - Extra 'Tools' menuitem: Create Mobile Favorite... - {2EAF5BB2-070F-11D3-9307-00C04FAE2D4F} - C:\PROGRA~1\MICROS~3\INetRepl.dll
O9 - Extra button: Fill Forms - {320AF880-6646-11D3-ABEE-C5DBF3571F46} - file://C:\Program Files\Siber Systems\AI RoboForm\RoboFormComFillForms.html
O9 - Extra 'Tools' menuitem: Fill Forms - {320AF880-6646-11D3-ABEE-C5DBF3571F46} - file://C:\Program Files\Siber Systems\AI RoboForm\RoboFormComFillForms.html
O9 - Extra button: Save - {320AF880-6646-11D3-ABEE-C5DBF3571F49} - file://C:\Program Files\Siber Systems\AI RoboForm\RoboFormComSavePass.html
O9 - Extra 'Tools' menuitem: Save Forms - {320AF880-6646-11D3-ABEE-C5DBF3571F49} - file://C:\Program Files\Siber Systems\AI RoboForm\RoboFormComSavePass.html
O9 - Extra button: RoboForm - {724d43aa-0d85-11d4-9908-00400523e39a} - file://C:\Program Files\Siber Systems\AI RoboForm\RoboFormComShowToolbar.html
O9 - Extra 'Tools' menuitem: RoboForm Toolbar - {724d43aa-0d85-11d4-9908-00400523e39a} - file://C:\Program Files\Siber Systems\AI RoboForm\RoboFormComShowToolbar.html
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\Office12\REFIEBAR.DLL
O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\windows\Network Diagnostic\xpnetdiag.exe
O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\windows\Network Diagnostic\xpnetdiag.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O10 - Unknown file in Winsock LSP: c:\windows\system32\nwprovau.dll
O15 - Trusted Zone: *.samsungportal.com
O16 - DPF: {08BCD971-A13B-4D6E-A2A5-E9B2324FC00D} (ClientEXE Class) - http://service.samsungportal.com/EP/web/common/cabfiles/CM_ClientEXE.cab
O16 - DPF: {18C690F8-769B-4F07-A687-0FC0D45FFCC8} (ManCertCtrl Class) - https://partnerlogin.samsungelectronics.com/en/secui/SecuiB2BIE-en.cab
O16 - DPF: {30528230-99f7-4bb4-88d8-fa1d4f56a2ab} (Installation Support) - C:\Program Files\Yahoo!\Common\Yinsthelper.dll
O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} (WUWebControl Class) - http://www.update.microsoft.com/windowsupdate/v6/V5Controls/en/x86/client/wuweb_site.cab?1234822826343
O16 - DPF: {714E667D-360C-4BFB-8C1A-E4812B608CC1} (ACUBETrustChecker Control) - http://service.samsungportal.com/EP/web/common/cabfiles/ACUBETrustChecker.cab
O16 - DPF: {74DBCB52-F298-4110-951D-AD2FF67BC8AB} (NVIDIA Smart Scan) - http://www.nvidia.com/content/DriverDownload/nforce/NvidiaSmartScan.cab
O16 - DPF: {C1F8FC10-E5DB-4112-9DBF-6C3FF728D4E3} (DellSystemLite.Scanner) - http://support.dell.com/systemprofiler/DellSystemLite.CAB
O16 - DPF: {C4D88B8E-352B-11D6-BF77-0080C740A177} (Setup Class) - http://service.samsungportal.com/EP/web/common/cabfiles/ActiveXSetup.cab
O16 - DPF: {D25A9538-F962-4501-9E68-D7C3DDECB148} (xWebView2 Control) - http://10.1.10.50/template/xWebView2.cab
O16 - DPF: {DAF7E6E6-D53A-439A-B28D-12271406B8A9} (RIM AxLoader) - http://mobileapps.blackberry.com/devicesoftware/AxLoader.cab
O16 - DPF: {E2883E8F-472F-4FB0-9522-AC9BF37916A7} - http://platformdl.adobe.com/NOS/getPlusPlus/1.6/gp.cab
O16 - DPF: {F2B7C894-49BD-4582-A142-0AE1C99460C2} (CodeAxNew Class) - http://service.samsungportal.com/EP/web/common/cabfiles/CM_CodeAxNew.cab
O16 - DPF: {FD0B6769-6490-4A91-AA0A-B5AE0DC75AC9} (Performance Viewer Activex Control) - https://secure.logmein.com/activex/ractrl.cab?lmi=100
O18 - Protocol: grooveLocalGWS - {88FED34C-F0CA-4636-A375-3CB6248B04CD} - C:\Program Files\Microsoft Office\Office12\GrooveSystemServices.dll
O22 - SharedTaskScheduler: Browseui preloader - {438755C2-A8BA-11D1-B96B-00A0C90312E1} - C:\windows\system32\browseui.dll
O22 - SharedTaskScheduler: Component Categories cache daemon - {8C7461EF-2B13-11d2-BE35-3078302C2030} - C:\windows\system32\browseui.dll
O23 - Service: Apple Mobile Device - Apple Inc. - C:\Program Files\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe
O23 - Service: avast! Antivirus - AVAST Software - C:\Program Files\AVAST Software\Avast\AvastSvc.exe
O23 - Service: Bonjour Service - Apple Inc. - C:\Program Files\Bonjour\mDNSResponder.exe
O23 - Service: Keyboard Filter Recovery Service (fService) - Fasoo.com - C:\Program Files\Fasoo DRM\fService.exe
O23 - Service: FsUsbExService - Teruten - C:\WINDOWS\system32\FsUsbExService.Exe
O23 - Service: Google Update Service (gupdate) (gupdate) - Google Inc. - C:\Program Files\Google\Update\GoogleUpdate.exe
O23 - Service: Google Update Service (gupdatem) (gupdatem) - Google Inc. - C:\Program Files\Google\Update\GoogleUpdate.exe
O23 - Service: Google Software Updater (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
O23 - Service: iPod Service - Apple Inc. - C:\Program Files\iPod\bin\iPodService.exe
O23 - Service: Java Quick Starter (JavaQuickStarterService) - Sun Microsystems, Inc. - C:\Program Files\Java\jre6\bin\jqs.exe
O23 - Service: LMIGuardianSvc - LogMeIn, Inc. - C:\Program Files\LogMeIn\x86\LMIGuardianSvc.exe
O23 - Service: LogMeIn Maintenance Service (LMIMaint) - LogMeIn, Inc. - C:\Program Files\LogMeIn\x86\RaMaint.exe
O23 - Service: LogMeIn - LogMeIn, Inc. - C:\Program Files\LogMeIn\x86\LogMeIn.exe
O23 - Service: MBAMService - Malwarebytes Corporation - C:\Program Files\Malwarebytes' Anti-Malware\mbamservice.exe
O23 - Service: MotoHelper Service (MotoHelper) - Unknown owner - C:\Program Files\Motorola\MotoHelper\MotoHelperService.exe
O23 - Service: @C:\Program Files\Nero\Update\NASvc.exe,-200 (NAUpdate) - Nero AG - C:\Program Files\Nero\Update\NASvc.exe
O23 - Service: Palm Novacom (NovacomD) - Palm - C:\Program Files\Palm, Inc\novacom\x86\novacomd.exe
O23 - Service: NVIDIA Display Driver Service (NVSvc) - NVIDIA Corporation - C:\windows\system32\nvsvc32.exe
O23 - Service: Palm TCP Relay (Palm_TCP_Relay) - Unknown owner - C:\Program Files\Palm\PDK\tcprelay.exe
O23 - Service: Internet Pass-Through Service (PassThru Service) - Unknown owner - C:\Program Files\HTC\Internet Pass-Through\PassThruSvr.exe
O23 - Service: ServiceLayer - Nokia - C:\Program Files\PC Connectivity Solution\ServiceLayer.exe
O23 - Service: XAudioService - Conexant Systems, Inc. - C:\windows\system32\DRIVERS\xaudio.exe
O23 - Service: Yahoo! Updater (YahooAUService) - Yahoo! Inc. - C:\Program Files\Yahoo!\SoftwareUpdate\YahooAUService.exe

--
End of file - 13081 bytes

Malwarebytes' Anti-Malware
Malwarebytes' Anti-Malware 1.51.1.1800
www.malwarebytes.org

Database version: 7631

Windows 5.1.2600 Service Pack 3
Internet Explorer 8.0.6001.18702

9/1/2011 2:16:49 PM
mbam-log-2011-09-01 (14-16-49).txt

Scan type: Quick scan
Objects scanned: 264294
Time elapsed: 5 minute(s), 12 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 1

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
c:\RECYCLER\s-1-5-21-776561741-2111687655-682003330-1003\Dc31.exe (TheftMarker.Crude) -> Quarantined and deleted successfully.

pertty sure Im infected Avast free isn't seeing it, guess that why its free. Thanks in advanced for the help my friends

Edited by Woozy82, 01 September 2011 - 02:18 PM.


BC AdBot (Login to Remove)

 


#2 HelpBot

HelpBot

    Bleepin' Binary Bot


  • Bots
  • 12,743 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:06:09 PM

Posted 06 September 2011 - 01:50 PM

Hello and welcome to Bleeping Computer!

I am HelpBot: an automated program designed to help the Bleeping Computer Staff better assist you! This message contains very important information, so please read through all of it before doing anything.

We apologize for the delay in responding to your request for help. Here at Bleeping Computer we get overwhelmed at times, and we are trying our best to keep up. Please note that your topic was not intentionally overlooked. Our mission is to help everyone in need, but sometimes it takes just a little longer to get to every request for help. No one is ignored here.

To help Bleeping Computer better assist you please perform the following steps:

***************************************************

Posted Image In order to continue receiving help at BleepingComputer.com, YOU MUST tell me if you still need help or if your issue has already been resolved on your own or through another resource! To tell me this, please click on the following link and follow the instructions there.

CLICK THIS LINK >>> http://www.bleepingcomputer.com/logreply/417036 <<< CLICK THIS LINK



If you no longer need help, then all you needed to do was the previous instructions of telling me so. You can skip the rest of this post. If you do need help please continue with Step 2 below.

***************************************************

Posted Image If you still need help, I would like you to post a Reply to this topic (click the "Add Reply" button in the lower right hand of this page). In that reply, please include the following information:

  • If you have not done so already, include a clear description of the problems you're having, along with any steps you may have performed so far.
  • A new DDS and GMER log. For your convenience, you will find the instructions for generating these logs repeated at the bottom of this post.
    • Please do this even if you have previously posted logs for us.
    • If you were unable to produce the logs originally please try once more.
    • If you are unable to create a log please provide detailed information about your installed Windows Operating System including the Version, Edition and if it is a 32bit or a 64bit system.
    • If you are unsure about any of these characteristics just post what you can and we will guide you.
  • Please tell us if you have your original Windows CD/DVD available.
  • Upon completing the above steps and posting a reply, another staff member will review your topic and do their best to resolve your issues.

Thank you for your patience, and again sorry for the delay.

***************************************************

We need to see some information about what is happening in your machine. Please perform the following scan again:

  • Download DDS by sUBs from one of the following links if you no longer have it available. Save it to your desktop.
  • Double click on the DDS icon, allow it to run.
  • A small box will open, with an explanation about the tool. No input is needed, the scan is running.
  • Notepad will open with the results.
  • Follow the instructions that pop up for posting the results.
  • Close the program window, and delete the program from your desktop.
Please note: You may have to disable any script protection running if the scan fails to run. After downloading the tool, disconnect from the internet and disable all antivirus protection. Run the scan, enable your A/V and reconnect to the internet.

Information on A/V control HERE


We also need a new log from the GMER anti-rootkit Scanner.

Please note that if you are running a 64-bit version of Windows you will not be able to run GMER and you may skip this step.

Please first disable any CD emulation programs using the steps found in this topic:

Why we request you disable CD Emulation when receiving Malware Removal Advice


Then create another GMER log and post it as an attachment to the reply where you post your new DDS log. Instructions on how to properly create a GMER log can be found here:

How to create a GMER log


As I am just a silly little program running on the BleepingComputer.com servers, please do not send me private messages as I do not know how to read and reply to them! Thanks!

#3 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:10:09 PM

Posted 06 September 2011 - 05:03 PM

Hi,

Welcome to Bleeping Computer. My name is m0le and I will be helping you with your log.
  • Please subscribe to this topic, if you haven't already. Click the Watch This Topic button at the top on the right.

  • Please avoid installing/uninstalling or updating any programs and attempting any unsupervised fixes or scans. This can make helping you impossible.

  • Please reply to this post so I know you are there.
The forum is busy and we need to have replies as soon as possible. If I haven't had a reply after 3 days I will bump the topic and if you do not reply by the following day after that then I will close the topic.

----------------------------------------------

It looks like adware symptoms so please run MBAM and SAS

Please download Posted Image Malwarebytes Anti-Malware and save it to your desktop.
  • Make sure you are connected to the Internet.
  • Double-click on mbam-setup.exe to install the application or, if you are using Vista, right-click and select Run As Administrator on mbam-setup.exe to install the application.
  • When the installation begins, follow the prompts and do not make any changes to default settings.
  • When installation has finished, make sure you leave both of these checked:
    • Update Malwarebytes' Anti-Malware
    • Launch Malwarebytes' Anti-Malware
  • Then click Finish.
  • MBAM will automatically start and you will be asked to update the program before performing a scan. If an update is found, the program will automatically update itself. Press the OK button to close that box and continue.
    If MBAM won't update then download and update MBAM on a clean computer then save the rules.ref folder to a memory stick. This file is found here: 'C:\Documents and Settings\All Users\Application Data\Malwarebytes\Malwarebytes' Anti-Malware' then transfer it across to the infected computer.
  • On the Scanner tab:
    • Make sure the "Perform Full Scan" option is selected.
    • Then click on the Scan button.
  • If asked to select the drives to scan, leave all the drives selected and click on the Start Scan button.
  • The scan will begin and "Scan in progress" will show at the top. It may take some time to complete so please be patient.
  • When the scan is finished, a message box will say "The scan completed successfully. Click 'Show Results' to display all objects found".
  • Click OK to close the message box and continue with the removal process.
  • Back at the main Scanner screen, click on the Show Results button to see a list of any malware that was found.
  • Make sure that everything is checked, and click Remove Selected.
  • When removal is completed, a log report will open in Notepad.
  • The log is automatically saved and can be viewed by clicking the Logs tab in MBAM.
  • Copy and paste the contents of that report in your next reply and exit MBAM.
Note: If MBAM encounters a file that is difficult to remove, you may be asked to reboot your computer so it can proceed with the disinfection process. Regardless if prompted to restart the computer or not, please do so immediately. Failure to reboot normally (not into safe mode) will prevent MBAM from removing all the malware. MBAM may make changes to your registry as part of its disinfection routine. If you're using other security programs that detect registry changes, they may alert you after scanning with MBAM. Please permit the program to allow the changes.


And

Download and scan with SUPERAntiSpyware Free for Home Users
  • Double-click SUPERAntiSpyware.exe and use the default settings for installation.
  • An icon will be created on your desktop. Double-click that icon to launch the program.
  • If asked to update the program definitions, click "Yes". If not, update the definitions before scanning by selecting "Check for Updates". (If you encounter any problems while downloading the updates, manually download them from here. Double-click on the hyperlink for Download Installer and save SASDEFINITIONS.EXE to your desktop. Then double-click on SASDEFINITIONS.EXE to install the definitions.)
  • In the Main Menu, click the Preferences... button.
  • Click the Scanning Control tab.
  • Under Scanner Options make sure the following are checked (leave all others unchecked):
    • Close browsers before scanning.
    • Scan for tracking cookies.
    • Terminate memory threats before quarantining.
  • Click the "Close" button to leave the control center screen.
  • Back on the main screen, under "Scan for Harmful Software" click Scan your computer.
  • On the left, make sure you check C:\Fixed Drive.
  • On the right, under "Complete Scan", choose Perform Complete Scan.
  • Click "Next" to start the scan. Please be patient while it scans your computer.
  • After the scan is complete, a Scan Summary box will appear with potentially harmful items that were detected. Click "OK".
  • Make sure everything has a checkmark next to it and click "Next".
  • A notification will appear that "Quarantine and Removal is Complete". Click "OK" and then click the "Finish" button to return to the main menu.
  • If asked if you want to reboot, click "Yes".
  • To retrieve the removal information after reboot, launch SUPERAntispyware again.
    • Click Preferences, then click the Statistics/Logs tab.
    • Under Scanner Logs, double-click SUPERAntiSpyware Scan Log.
    • If there are several logs, click the current dated log and press View log. A text file will open in your default text editor.
    • Please copy and paste the Scan Log results in your next reply.
  • Click Close to exit the program.

Posted Image
m0le is a proud member of UNITE

#4 Woozy82

Woozy82
  • Topic Starter

  • Members
  • 20 posts
  • OFFLINE
  •  
  • Local time:05:09 PM

Posted 07 September 2011 - 03:48 PM

Thank for the reply my friend. Here are the updated logs you requested

mbam-log-2011-09-07 (14-32-29)
Malwarebytes' Anti-Malware 1.51.1.1800
www.malwarebytes.org

Database version: 7672

Windows 5.1.2600 Service Pack 3
Internet Explorer 8.0.6001.18702

9/7/2011 2:32:29 PM
mbam-log-2011-09-07 (14-32-29).txt

Scan type: Full scan (C:\|D:\|)
Objects scanned: 482789
Time elapsed: 1 hour(s), 43 minute(s), 35 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 0

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
(No malicious items detected)

SUPERAntiSpyware Scan Log - 09-07-2011 - 14-48-44
SUPERAntiSpyware Scan Log
http://www.superantispyware.com

Generated 09/07/2011 at 02:48 PM

Application Version : 5.0.1118

Core Rules Database Version : 7653
Trace Rules Database Version: 5465

Scan type       : Quick Scan
Total Scan Time : 00:05:29

Operating System Information
Windows XP Professional 32-bit, Service Pack 3 (Build 5.01.2600)
Administrator

Memory items scanned      : 487
Memory threats detected   : 0
Registry items scanned    : 34505
Registry threats detected : 26
File items scanned        : 8200
File threats detected     : 3

Adware.Tracking Cookie
	C:\Documents and Settings\Stars Wireless\Cookies\I3S6B1W0.txt

Unclassified.Oreans32
	HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_OREANS32
	HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_OREANS32#NextInstance
	HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_OREANS32\0000
	HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_OREANS32\0000#Service
	HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_OREANS32\0000#Legacy
	HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_OREANS32\0000#ConfigFlags
	HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_OREANS32\0000#Class
	HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_OREANS32\0000#ClassGUID
	HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_OREANS32\0000#DeviceDesc
	HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_OREANS32\0000#Capabilities
	HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_OREANS32\0000#Driver
	HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_OREANS32\0000\LogConf
	HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_OREANS32\0000\Control
	HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_OREANS32\0000\Control#ActiveService
	HKLM\SYSTEM\CurrentControlSet\Services\oreans32
	HKLM\SYSTEM\CurrentControlSet\Services\oreans32#Type
	HKLM\SYSTEM\CurrentControlSet\Services\oreans32#Start
	HKLM\SYSTEM\CurrentControlSet\Services\oreans32#ErrorControl
	HKLM\SYSTEM\CurrentControlSet\Services\oreans32#ImagePath
	HKLM\SYSTEM\CurrentControlSet\Services\oreans32#DisplayName
	HKLM\SYSTEM\CurrentControlSet\Services\oreans32\Security
	HKLM\SYSTEM\CurrentControlSet\Services\oreans32\Security#Security
	HKLM\SYSTEM\CurrentControlSet\Services\oreans32\Enum
	HKLM\SYSTEM\CurrentControlSet\Services\oreans32\Enum#0
	HKLM\SYSTEM\CurrentControlSet\Services\oreans32\Enum#Count
	HKLM\SYSTEM\CurrentControlSet\Services\oreans32\Enum#NextInstance

Rogue.AntiMalwareDoctor
	C:\Documents and Settings\Stars Wireless\Application Data\D953CA566D3C60F6AD6FDF594EA6FE1A

Application.Oreans32
	C:\WINDOWS\SYSTEM32\DRIVERS\OREANS32.SYS

My bad that was the quick scan performing the complete scan now then i will edit this post

Edited by Woozy82, 07 September 2011 - 03:53 PM.


#5 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:10:09 PM

Posted 07 September 2011 - 04:45 PM

There's evidence of a rogue antivirus which likes to stop system restores as it is one way to try and regain access to the system for the user.

Please run Combofix

Please download ComboFix from one of these locations:* IMPORTANT !!! Save ComboFix.exe to your Desktop making sure you rename it comfix.exe
  • Disable your AntiVirus and AntiSpyware applications including Firewalls, usually via a right click on the System Tray icon. They may otherwise interfere with our tools. (Click on this link to see a list of programs that should be disabled. The list is not all inclusive.)
  • Double click on Comfix.exe & follow the prompts.
  • As part of it's process, ComboFix will check to see if the Microsoft Windows Recovery Console is installed. With malware infections being as they are today, it's strongly recommended to have this pre-installed on your machine before doing any malware removal. It will allow you to boot up into a special recovery/repair mode that will allow us to more easily help you should your computer have a problem after an attempted removal of malware.
  • Follow the prompts to allow ComboFix to download and install the Microsoft Windows Recovery Console, and when prompted, agree to the End-User License Agreement to install the Microsoft Windows Recovery Console.
**Please note: If the Microsoft Windows Recovery Console is already installed, ComboFix will continue it's malware removal procedures.

Posted Image


Once the Microsoft Windows Recovery Console is installed using ComboFix, you should see the following message:

Posted Image


Click on Yes, to continue scanning for malware.

When finished, it shall produce a log for you. Please include the C:\ComboFix.txt in your next reply.
Posted Image
m0le is a proud member of UNITE

#6 Woozy82

Woozy82
  • Topic Starter

  • Members
  • 20 posts
  • OFFLINE
  •  
  • Local time:05:09 PM

Posted 07 September 2011 - 05:17 PM

Is it necessary to complete SUPERAntiSpyware Complete scan finish before running ComboFix? If so no need to respond I will let it finish before running ComboFix. this is my personal work pc & I leave work @ 6pm central time so bare with me please. One of my employees must have been playing on it when I wasn't there and got it infected.

I will Run ComboFix tomorrow, here is the Complete Scan of

SUPERAntiSpyware Scan Log - 09-07-2011 - 18-01-36
SUPERAntiSpyware Scan Log
http://www.superantispyware.com

Generated 09/07/2011 at 06:01 PM

Application Version : 5.0.1118

Core Rules Database Version : 7653
Trace Rules Database Version: 5465

Scan type       : Complete Scan
Total Scan Time : 02:11:49

Operating System Information
Windows XP Professional 32-bit, Service Pack 3 (Build 5.01.2600)
Administrator

Memory items scanned      : 504
Memory threats detected   : 0
Registry items scanned    : 43157
Registry threats detected : 26
File items scanned        : 258207
File threats detected     : 8

Unclassified.Oreans32
	HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_OREANS32
	HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_OREANS32#NextInstance
	HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_OREANS32\0000
	HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_OREANS32\0000#Service
	HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_OREANS32\0000#Legacy
	HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_OREANS32\0000#ConfigFlags
	HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_OREANS32\0000#Class
	HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_OREANS32\0000#ClassGUID
	HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_OREANS32\0000#DeviceDesc
	HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_OREANS32\0000\Control
	HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_OREANS32\0000\Control#*NewlyCreated*
	HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_OREANS32\0000\Control#ActiveService
	HKLM\SYSTEM\CurrentControlSet\Services\oreans32
	HKLM\SYSTEM\CurrentControlSet\Services\oreans32#Type
	HKLM\SYSTEM\CurrentControlSet\Services\oreans32#Start
	HKLM\SYSTEM\CurrentControlSet\Services\oreans32#ErrorControl
	HKLM\SYSTEM\CurrentControlSet\Services\oreans32#ImagePath
	HKLM\SYSTEM\CurrentControlSet\Services\oreans32#DisplayName
	HKLM\SYSTEM\CurrentControlSet\Services\oreans32\Security
	HKLM\SYSTEM\CurrentControlSet\Services\oreans32\Security#Security
	HKLM\SYSTEM\CurrentControlSet\Services\oreans32\Enum
	HKLM\SYSTEM\CurrentControlSet\Services\oreans32\Enum#0
	HKLM\SYSTEM\CurrentControlSet\Services\oreans32\Enum#Count
	HKLM\SYSTEM\CurrentControlSet\Services\oreans32\Enum#NextInstance

Adware.Tracking Cookie
	C:\Documents and Settings\Stars Wireless\Cookies\I4LCV9QM.txt

Application.Oreans32
	HKLM\System\ControlSet001\Services\OREANS32
	C:\WINDOWS\SYSTEM32\DRIVERS\OREANS32.SYS
	HKLM\System\ControlSet001\Enum\Root\LEGACY_OREANS32
	C:\SYSTEM VOLUME INFORMATION\_RESTORE{A69E8315-643F-45FD-8CF6-71F888DBD734}\RP59\A0085830.SYS

Trojan.Agent/Gen-Krpytik
	C:\LG ELECTRONICS\JOYPHONE(1.7.4)\PROGRAM FOLDER\P2K05SEEM 1.0-RC1\P2KAPI3.DLL

Trojan.Agent/Gen-FakeAlert
	C:\SYSTEM VOLUME INFORMATION\_RESTORE{A69E8315-643F-45FD-8CF6-71F888DBD734}\RP59\A0028525.EXE
	C:\SYSTEM VOLUME INFORMATION\_RESTORE{A69E8315-643F-45FD-8CF6-71F888DBD734}\RP59\A0037029.EXE
	C:\SYSTEM VOLUME INFORMATION\_RESTORE{A69E8315-643F-45FD-8CF6-71F888DBD734}\RP59\A0082927.EXE
	C:\SYSTEM VOLUME INFORMATION\_RESTORE{A69E8315-643F-45FD-8CF6-71F888DBD734}\RP59\A0116911.EXE

Edited by Woozy82, 07 September 2011 - 06:16 PM.


#7 Woozy82

Woozy82
  • Topic Starter

  • Members
  • 20 posts
  • OFFLINE
  •  
  • Local time:05:09 PM

Posted 08 September 2011 - 01:46 PM

well i ran ComboFix it gave me an error when trying to install Microsoft Windows Recovery Console something about not being partitioned correctly. I let it scan any way, around phase 50 computer went blue screen. I try to reboot and it told me file missing or corrupt C:\WINDOWS\system32\config\system. So I guess Combofix deleted a system file. Can i use the Dell xp installation disk to repair the system file and keep my files

#8 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:10:09 PM

Posted 08 September 2011 - 04:28 PM

Combofix did not delete the system file. It may be the rootkit that did this or it may have hidden the file.

Can i use the Dell xp installation disk to repair the system file and keep my files


Normally you could but there appears to be some malware still present so it would depend. It is okay to try and repair the problem so you can keep your files but after that we need to address the rootkit.
Posted Image
m0le is a proud member of UNITE

#9 Woozy82

Woozy82
  • Topic Starter

  • Members
  • 20 posts
  • OFFLINE
  •  
  • Local time:05:09 PM

Posted 09 September 2011 - 12:12 PM

I'm in the Recovery Console on the CD, login it C:\WINDOWS. Any idea what files may be missing or corrupt. What are the commands to copy file from D:\I386 to C:\WINDOWS\system32

Edited by Woozy82, 09 September 2011 - 12:27 PM.


#10 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:10:09 PM

Posted 09 September 2011 - 07:32 PM

Let's try and do this another way.

Download GETxPUD.exe to the desktop of your clean computer
  • Run GETxPUD.exe
  • A new folder will appear on the desktop.
  • Open the GETxPUD folder and click on the get&burn.bat
  • The program will download xpud_0.9.2.iso, and upon finished will open BurnCDCC ready to burn the image.
  • Click on Start and follow the prompts to burn the image to a CD.
  • Download http://noahdfear.net/downloads/rst.sh to the USB drive
  • Insert the USB drive and CD in the Sick computer and boot the computer from the CD again
  • Press File
  • Expand mnt
  • Expand your USB (sdb1)
  • Confirm that you see rst.sh that you downloaded there
  • Press Tool at the top
  • Choose Open Terminal
  • Type bash rst.sh
  • Press Enter
  • After it has finished a report will be located at sdb1 named enum.log
  • Plug that USB back into the clean computer and open it
Please note: If you have an ethernet connection you can access the internet by way of xPUD (Firefox). You can perform all these steps on your sick computer. When you download the download will reside in the Download folder. It can be found under the File tab also. You can similarly access our thread by way of this OS too so you can send the logs that way.

Please also note - all text entries are case sensitive

Copy and paste the enum.log for my review
Posted Image
m0le is a proud member of UNITE

#11 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:10:09 PM

Posted 14 September 2011 - 06:46 PM

You still there?
Posted Image
m0le is a proud member of UNITE

#12 Woozy82

Woozy82
  • Topic Starter

  • Members
  • 20 posts
  • OFFLINE
  •  
  • Local time:05:09 PM

Posted 14 September 2011 - 07:20 PM

I'm still here, wasn't able to restore with window XP disc & I didn't run the GETxPUD. I just restored an old backup I had. I noticed it has the same problem. I ran malwarebytes & superanti-spyware both full scan again, I can post logs if you want or run them again if need be. Backup & restore still won't run.

#13 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:10:09 PM

Posted 14 September 2011 - 07:45 PM

Okay, so the problem looks less likely to be malware. Can you post the logs though.
Posted Image
m0le is a proud member of UNITE

#14 Woozy82

Woozy82
  • Topic Starter

  • Members
  • 20 posts
  • OFFLINE
  •  
  • Local time:05:09 PM

Posted 14 September 2011 - 08:43 PM

okay, I will post them tomarrow when I got to work

#15 Woozy82

Woozy82
  • Topic Starter

  • Members
  • 20 posts
  • OFFLINE
  •  
  • Local time:05:09 PM

Posted 15 September 2011 - 12:23 PM

Malwarebytes' Anti-Malware Scan Log
Malwarebytes' Anti-Malware 1.51.1.1800
www.malwarebytes.org

Database version: 7703

Windows 5.1.2600 Service Pack 3
Internet Explorer 8.0.6001.18702

9/12/2011 4:41:21 PM
mbam-log-2011-09-12 (16-41-21).txt

Scan type: Full scan (C:\|)
Objects scanned: 442748
Time elapsed: 1 hour(s), 2 minute(s), 10 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 2
Registry Values Infected: 0
Registry Data Items Infected: 3
Folders Infected: 0
Files Infected: 12

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
HKEY_CURRENT_USER\Software\Antimalware Doctor Inc (Rogue.AntimalwareDoctor) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Uninstall\Antimalware Doctor (Rogue.AntimalwareDoctor) -> Quarantined and deleted successfully.

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\AntiVirusDisableNotify (PUM.Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\UpdatesDisableNotify (PUM.Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows NT\SystemRestore\DisableConfig (Windows.Tool.Disabled) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.

Folders Infected:
(No malicious items detected)

Files Infected:
c:\lg electronics\joyphone(1.7.4)\program folder\cdma_worksho_registered\cdma workshop.exe (Trojan.Agent) -> Not selected for removal.
c:\lg electronics\joyphone(1.7.4)\program folder\dark sanyo esn spc good english tool\sanyo good english tool.exe (Trojan.FakeAlert) -> Not selected for removal.
c:\system volume information\_restore{a69e8315-643f-45fd-8cf6-71f888dbd734}\RP37\A0004324.exe (BackDoor.Bifrose) -> Quarantined and deleted successfully.
c:\system volume information\_restore{a69e8315-643f-45fd-8cf6-71f888dbd734}\RP50\A0004549.exe (RiskWare.Tool.CK) -> Quarantined and deleted successfully.
c:\system volume information\_restore{a69e8315-643f-45fd-8cf6-71f888dbd734}\RP50\A0004550.exe (RiskWare.Tool.CK) -> Quarantined and deleted successfully.
c:\system volume information\_restore{a69e8315-643f-45fd-8cf6-71f888dbd734}\RP50\A0004563.exe (RiskWare.Tool.CK) -> Quarantined and deleted successfully.
c:\system volume information\_restore{a69e8315-643f-45fd-8cf6-71f888dbd734}\RP50\A0004564.exe (RiskWare.Tool.CK) -> Quarantined and deleted successfully.
c:\system volume information\_restore{a69e8315-643f-45fd-8cf6-71f888dbd734}\RP57\A0006993.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
c:\system volume information\_restore{a69e8315-643f-45fd-8cf6-71f888dbd734}\RP59\A0007301.exe (RiskWare.Tool.CK) -> Quarantined and deleted successfully.
c:\system volume information\_restore{a69e8315-643f-45fd-8cf6-71f888dbd734}\RP59\A0026232.exe (Trojan.AVKiller) -> Quarantined and deleted successfully.
c:\system volume information\_restore{a69e8315-643f-45fd-8cf6-71f888dbd734}\RP59\A0067752.exe (RiskWare.Tool.CK) -> Quarantined and deleted successfully.
c:\system volume information\_restore{a69e8315-643f-45fd-8cf6-71f888dbd734}\RP59\A0113611.exe (PUP.Hacktool.Patcher) -> Quarantined and deleted successfully.

SUPERAntiSpyware Scan Log
SUPERAntiSpyware Scan Log
http://www.superantispyware.com

Generated 09/12/2011 at 06:56 PM

Application Version : 5.0.1118

Core Rules Database Version : 7677
Trace Rules Database Version: 5489

Scan type       : Complete Scan
Total Scan Time : 01:52:49

Operating System Information
Windows XP Professional 32-bit, Service Pack 3 (Build 5.01.2600)
Administrator

Memory items scanned      : 506
Memory threats detected   : 0
Registry items scanned    : 42604
Registry threats detected : 30
File items scanned        : 194749
File threats detected     : 35

Unclassified.Oreans32
	HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_OREANS32
	HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_OREANS32#NextInstance
	HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_OREANS32\0000
	HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_OREANS32\0000#Service
	HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_OREANS32\0000#Legacy
	HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_OREANS32\0000#ConfigFlags
	HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_OREANS32\0000#Class
	HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_OREANS32\0000#ClassGUID
	HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_OREANS32\0000#DeviceDesc
	HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_OREANS32\0000#Capabilities
	HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_OREANS32\0000#Driver
	HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_OREANS32\0000\LogConf
	HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_OREANS32\0000\Control
	HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_OREANS32\0000\Control#ActiveService
	HKLM\SYSTEM\CurrentControlSet\Services\oreans32
	HKLM\SYSTEM\CurrentControlSet\Services\oreans32#Type
	HKLM\SYSTEM\CurrentControlSet\Services\oreans32#Start
	HKLM\SYSTEM\CurrentControlSet\Services\oreans32#ErrorControl
	HKLM\SYSTEM\CurrentControlSet\Services\oreans32#ImagePath
	HKLM\SYSTEM\CurrentControlSet\Services\oreans32#DisplayName
	HKLM\SYSTEM\CurrentControlSet\Services\oreans32\Security
	HKLM\SYSTEM\CurrentControlSet\Services\oreans32\Security#Security
	HKLM\SYSTEM\CurrentControlSet\Services\oreans32\Enum
	HKLM\SYSTEM\CurrentControlSet\Services\oreans32\Enum#0
	HKLM\SYSTEM\CurrentControlSet\Services\oreans32\Enum#Count
	HKLM\SYSTEM\CurrentControlSet\Services\oreans32\Enum#NextInstance

Rogue.AntiMalwareDoctor
	C:\Documents and Settings\Stars Wireless\Application Data\D953CA566D3C60F6AD6FDF594EA6FE1A

Application.Oreans32
	HKLM\System\ControlSet001\Services\OREANS32
	C:\WINDOWS\SYSTEM32\DRIVERS\OREANS32.SYS
	HKLM\System\ControlSet001\Enum\Root\LEGACY_OREANS32
	HKLM\System\ControlSet002\Services\OREANS32
	HKLM\System\ControlSet002\Enum\Root\LEGACY_OREANS32
	C:\SYSTEM VOLUME INFORMATION\_RESTORE{A69E8315-643F-45FD-8CF6-71F888DBD734}\RP59\A0085830.SYS

Adware.Tracking Cookie
	a.ads2.msads.net [ C:\DOCUMENTS AND SETTINGS\STARS WIRELESS\APPLICATION DATA\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\R4JQ6DVZ ]
	ad.insightexpressai.com [ C:\DOCUMENTS AND SETTINGS\STARS WIRELESS\APPLICATION DATA\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\R4JQ6DVZ ]
	b.ads2.msads.net [ C:\DOCUMENTS AND SETTINGS\STARS WIRELESS\APPLICATION DATA\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\R4JQ6DVZ ]
	cdn.eyewonder.com [ C:\DOCUMENTS AND SETTINGS\STARS WIRELESS\APPLICATION DATA\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\R4JQ6DVZ ]
	cdn.insights.gravity.com [ C:\DOCUMENTS AND SETTINGS\STARS WIRELESS\APPLICATION DATA\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\R4JQ6DVZ ]
	cloud.video.unrulymedia.com [ C:\DOCUMENTS AND SETTINGS\STARS WIRELESS\APPLICATION DATA\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\R4JQ6DVZ ]
	convoad.technoratimedia.net [ C:\DOCUMENTS AND SETTINGS\STARS WIRELESS\APPLICATION DATA\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\R4JQ6DVZ ]
	crackle.com [ C:\DOCUMENTS AND SETTINGS\STARS WIRELESS\APPLICATION DATA\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\R4JQ6DVZ ]
	ia.media-imdb.com [ C:\DOCUMENTS AND SETTINGS\STARS WIRELESS\APPLICATION DATA\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\R4JQ6DVZ ]
	interclick.com [ C:\DOCUMENTS AND SETTINGS\STARS WIRELESS\APPLICATION DATA\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\R4JQ6DVZ ]
	kona.kontera.com [ C:\DOCUMENTS AND SETTINGS\STARS WIRELESS\APPLICATION DATA\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\R4JQ6DVZ ]
	macromedia.com [ C:\DOCUMENTS AND SETTINGS\STARS WIRELESS\APPLICATION DATA\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\R4JQ6DVZ ]
	media.mtvnservices.com [ C:\DOCUMENTS AND SETTINGS\STARS WIRELESS\APPLICATION DATA\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\R4JQ6DVZ ]
	media.oprah.com [ C:\DOCUMENTS AND SETTINGS\STARS WIRELESS\APPLICATION DATA\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\R4JQ6DVZ ]
	media.scanscout.com [ C:\DOCUMENTS AND SETTINGS\STARS WIRELESS\APPLICATION DATA\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\R4JQ6DVZ ]
	media.socialvibe.com [ C:\DOCUMENTS AND SETTINGS\STARS WIRELESS\APPLICATION DATA\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\R4JQ6DVZ ]
	media.tattomedia.com [ C:\DOCUMENTS AND SETTINGS\STARS WIRELESS\APPLICATION DATA\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\R4JQ6DVZ ]
	media1.break.com [ C:\DOCUMENTS AND SETTINGS\STARS WIRELESS\APPLICATION DATA\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\R4JQ6DVZ ]
	media10.washingtonpost.com [ C:\DOCUMENTS AND SETTINGS\STARS WIRELESS\APPLICATION DATA\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\R4JQ6DVZ ]
	msnbcmedia.msn.com [ C:\DOCUMENTS AND SETTINGS\STARS WIRELESS\APPLICATION DATA\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\R4JQ6DVZ ]
	objects.tremormedia.com [ C:\DOCUMENTS AND SETTINGS\STARS WIRELESS\APPLICATION DATA\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\R4JQ6DVZ ]
	secure-us.imrworldwide.com [ C:\DOCUMENTS AND SETTINGS\STARS WIRELESS\APPLICATION DATA\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\R4JQ6DVZ ]
	sftrack.searchforce.net [ C:\DOCUMENTS AND SETTINGS\STARS WIRELESS\APPLICATION DATA\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\R4JQ6DVZ ]
	udn.specificclick.net [ C:\DOCUMENTS AND SETTINGS\STARS WIRELESS\APPLICATION DATA\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\R4JQ6DVZ ]
	video.redorbit.com [ C:\DOCUMENTS AND SETTINGS\STARS WIRELESS\APPLICATION DATA\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\R4JQ6DVZ ]
	videos.mediaite.com [ C:\DOCUMENTS AND SETTINGS\STARS WIRELESS\APPLICATION DATA\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\R4JQ6DVZ ]
	www.pornhub.com [ C:\DOCUMENTS AND SETTINGS\STARS WIRELESS\APPLICATION DATA\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\R4JQ6DVZ ]

Trojan.Agent/Gen-Krpytik
	C:\LG ELECTRONICS\JOYPHONE(1.7.4)\PROGRAM FOLDER\P2K05SEEM 1.0-RC1\P2KAPI3.DLL

Trojan.Agent/Gen-FakeAlert
	C:\SYSTEM VOLUME INFORMATION\_RESTORE{A69E8315-643F-45FD-8CF6-71F888DBD734}\RP59\A0028525.EXE
	C:\SYSTEM VOLUME INFORMATION\_RESTORE{A69E8315-643F-45FD-8CF6-71F888DBD734}\RP59\A0037029.EXE
	C:\SYSTEM VOLUME INFORMATION\_RESTORE{A69E8315-643F-45FD-8CF6-71F888DBD734}\RP59\A0082927.EXE
	C:\SYSTEM VOLUME INFORMATION\_RESTORE{A69E8315-643F-45FD-8CF6-71F888DBD734}\RP59\A0116911.EXE





0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users