Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

JS/Crypted ID.gen - infection


  • This topic is locked This topic is locked
20 replies to this topic

#1 estevan514

estevan514

  • Members
  • 13 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Beautiful British Columbia
  • Local time:06:53 AM

Posted 08 September 2011 - 07:52 PM

Hello. A week or so ago, I was infected with the PC Repair virus/trojan and thought I had it licked with Malwarebytes Anti-Malware and F-Prot AV. I soon found that a good number of files are still hidden after altering the Files Properties check box listings.

Today, I've discovered I have the JS Crypted ID.gen virus which my F-Prot AV program quarantines as tools[1].js but it just keeps showing up. Also I lose the ability to open any applications, including My Documents and My Computer. When I reboot, things appear fine for a short while, but then, alas it all goes to h*ll in a hand basket again.

Any help with this would be appreciated. I'm reading here in the forum, that a reformat and cleaning of the drive is the best approach. Is this entirely necessary in this case or any case?

I'm dealing with a rebuilt Compaq Presario laptop w Windows XP. I've had the unit from new and a buddy rebuilt it a couple of years ago.

Thanks, Steve

BC AdBot (Login to Remove)

 


#2 Orange Blossom

Orange Blossom

    OBleepin Investigator


  • Moderator
  • 36,848 posts
  • OFFLINE
  •  
  • Gender:Not Telling
  • Location:Bloomington, IN
  • Local time:10:53 AM

Posted 09 September 2011 - 12:38 AM

Hello,

Please follow the instructions in ==>This Guide<== starting at step 6. If you cannot complete a step, skip it and continue.

Once the proper logs are created, then post them in a reply to this topic by using the Add Reply button.

If you can produce at least some of the logs, then please create the post and explain what happens when you try to create the log(s) that you couldn't get. If you cannot produce any of the logs, then still post the reply and explain that you followed the Prep. Guide, were unable to create the logs, and describe what happens when you try to create the logs.

Please note that I am not a member of the Malware Removal Team and will not be assisting you in removing the infection. I'm simply helping you to post the information they need in order to assist you.

If HelpBot replies to your topic, PLEASE follow Step One so it will report your topic to the team members.

Orange Blossom :cherry:
Help us help you. If HelpBot replies, you MUST follow step 1 in its reply so we know you need help.

Orange Blossom

An ounce of prevention is worth a pound of cure

SpywareBlaster, WinPatrol Plus, ESET Smart Security, Malwarebytes' Anti-Malware, NoScript Firefox ext., Norton noscript

#3 estevan514

estevan514
  • Topic Starter

  • Members
  • 13 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Beautiful British Columbia
  • Local time:06:53 AM

Posted 09 September 2011 - 11:23 AM

Thanks OB for your help in getting this process started. Your assistance is appreciated!

Attached are the dds, attach and ark.txt files requested. I look forward to getting this computer running clean and faster! Thanks again for your help!


Cheers, Steve


Attached File  dds.txt   10.63KB   1 downloads
Attached File  attach.txt   10.53KB   1 downloads
Attached File  ark.txt   23.24KB   0 downloads


#4 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:10:53 AM

Posted 10 September 2011 - 12:49 AM

Hello and Welcome to the forums!

My name is Gringo and I'll be glad to help you with your computer problems.

Somethings to remember while we are working together.

  • Do not run any other tool untill instructed to do so!
  • please Do not Attach logs or put in code boxes.
  • Tell me about any problems that have occurred during the fix.
  • Tell me of any other symptoms you may be having as these can help also.
  • Do not run anything while running a fix.
  • Do not run any other tool untill instructed to do so!


Click on the Watch Topic Button and select Immediate Notification and click on proceed, this will help you to get notified faster when I have replied and make the cleaning process faster.

Please print out or make a copy in notpad of any instructions given, as sometimes it is necessary to go offline and you will lose access to them.

Run Combofix:

You may be asked to install or update the Recovery Console (Win XP Only) if this happens please allow it to do so (you will need to be connected to the internet for this)

Before you run Combofix I will need you to turn off any security software you have running, If you do not know how to do this you can find out >here< or >here<

Combofix may need to reboot your computer more than once to do its job this is normal.

You can download Combofix from one of these links.
Link 1
Link 2
Link 3
1. Close any open browsers or any other programs that are open.
2. Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.

Double click on combofix.exe & follow the prompts.
When finished, it will produce a report for you.

Note 1: Do not mouseclick combofix's window while it's running. That may cause it to stall

Note 2: If you recieve an error "Illegal operation attempted on a registery key that has been marked for deletion." Please restart the computer

"information and logs"

  • In your next post I need the following
  • Log from Combofix
  • let me know of any problems you may have had
  • How is the computer doing now?

Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#5 estevan514

estevan514
  • Topic Starter

  • Members
  • 13 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Beautiful British Columbia
  • Local time:06:53 AM

Posted 10 September 2011 - 06:02 PM

Thanks for the info Gringo. After running ComboFix and having it reboot my computer only once, I experienced the inability to open any applications or files, even My Computer which would partially open with no content. I then shut down, came back several hours later and rebooted. Now, everything appears to open alright, Firefox, MS Word etc, but what I'm experiencing is every 10 secs or so, the screen I'm working in ghosts out- as in the cursor is lost, content and everything is still there, but as I'm typing here, there's a few seconds of interruption, then the cursor comes back and I can continue. And it's not like when the cursor comes back it displays the letters I've been typing while it ghosted out. More like once the cursor goes, nothing happens, when it comes back, I pick up where it left off.

I am not able to find the log that ComboFix created, if indeed it did create one. Where might I find it? One other issue, when I went to search for all ComboFix files, it got caught in a loop showing an excessive number of Folders for ComboFix. When I look in my C:\ drive directory, it shows the ComboFix Folder, but when I click on the folder, it brings me to a My Computer type menu box listing all directories, only instead of being titled My Computer - it's called ComboFix.

The ghost screen happens every few seconds now, and appears to be lasting for longer periods.

Steve

#6 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:10:53 AM

Posted 10 September 2011 - 06:18 PM

Hello

Ok lets try this, I want you to run combofix in safe mode but it is very important that when combofix reboots the computer for you to direct it back into safe mode so it can finish the scan.

Boot into Safe Mode

Reboot your computer in Safe Mode.
  • If the computer is running, shut down Windows, and then turn off the power.
  • Wait 30 seconds, and then turn the computer on.
  • Start tapping the F8 key. The Windows Advanced Options Menu appears. If you begin tapping the F8 key too soon, some computers display a "keyboard error" message. To resolve this, restart the computer and try again.
  • Ensure that the Safe Mode option is selected.
  • Press Enter. The computer then begins to start in Safe mode.
  • Login on your usual account.

after combofix has finished its scan please post the report back here.

Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#7 estevan514

estevan514
  • Topic Starter

  • Members
  • 13 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Beautiful British Columbia
  • Local time:06:53 AM

Posted 10 September 2011 - 09:34 PM

Gringo

After a reboot in Safe Mode, I was able to complete a ComboFix log. However my computer is now displaying messages as follows:

1. hello4: hki233.exe - Application Error The instruction at '0x77f5234c' referenced memory at '0xfb91e3cc'. The memory could not be "written". Click OK to terminate the program.

2. RUNDLL - Error in InetCpl.cpl Missing entry: ClearMyTracksByProcess

3. http://quizfinddomain.com/d/p2i2d22421 Congratulations! You are the BC Winner for Sept 10. Select a prize and enter your email on the next page to claim DID NOT CLAIM

4. File Download - 300250ad.html From: served.antventure.com DID NOT DOWNLOAD

Here is the ComboFix log:


ComboFix 11-09-10.02 - Steve 09/10/2011 18:09:15.2.1 - x86 MINIMAL
Microsoft Windows XP Home Edition 5.1.2600.1.1252.1.1033.18.895.677 [GMT -7:00]
Running from: c:\documents and settings\Steve\Desktop\ComboFix.exe
.
.
((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.
.
c:\documents and settings\All Users\Application Data\06U4R.exe
c:\documents and settings\Steve\06U4R.com
c:\documents and settings\Steve\Local Settings\Application Data\06U4R.exe
c:\program files\Adobe\Reader 9.0\Reader\Reader_sl.exe
c:\program files\Analog Devices\SoundMAX\SMax4PNP.exe
c:\program files\Apoint2K\Apoint.exe
c:\program files\ATI Technologies\ATI Control Panel\atiptaxx.exe
c:\program files\Common Files\Adobe\ARM\1.0\AdobeARM.exe
c:\program files\Common Files\Java\Java Update\jusched.exe
c:\program files\Common Files\Spigot\Search Settings\SearchSettings.exe
c:\program files\FRISK Software\F-PROT Antivirus for Windows\FProtTray.exe
c:\program files\IObit\Advanced SystemCare 3\AWC.exe
c:\program files\messenger\msmsgsin.exe
c:\windows\Fonts\06U4R.com
c:\windows\Tasks\At100.job
c:\windows\Tasks\At101.job
c:\windows\Tasks\At104.job
c:\windows\Tasks\At105.job
c:\windows\Tasks\At108.job
c:\windows\Tasks\At109.job
c:\windows\Tasks\At112.job
c:\windows\Tasks\At113.job
c:\windows\Tasks\At116.job
c:\windows\Tasks\At117.job
c:\windows\Tasks\At119.job
c:\windows\Tasks\At120.job
c:\windows\Tasks\At121.job
c:\windows\Tasks\At122.job
c:\windows\Tasks\At123.job
c:\windows\Tasks\At124.job
c:\windows\Tasks\At125.job
c:\windows\Tasks\At126.job
c:\windows\Tasks\At127.job
c:\windows\Tasks\At128.job
c:\windows\Tasks\At129.job
c:\windows\Tasks\At130.job
c:\windows\Tasks\At131.job
c:\windows\Tasks\At132.job
c:\windows\Tasks\At133.job
c:\windows\Tasks\At134.job
c:\windows\Tasks\At135.job
c:\windows\Tasks\At136.job
c:\windows\Tasks\At137.job
c:\windows\Tasks\At138.job
c:\windows\Tasks\At139.job
c:\windows\Tasks\At140.job
c:\windows\Tasks\At141.job
c:\windows\Tasks\At142.job
c:\windows\Tasks\At143.job
c:\windows\Tasks\At144.job
c:\windows\Tasks\At26.job
c:\windows\Tasks\At29.job
c:\windows\Tasks\At30.job
c:\windows\Tasks\At33.job
c:\windows\Tasks\At35.job
c:\windows\Tasks\At37.job
c:\windows\Tasks\At38.job
c:\windows\Tasks\At41.job
c:\windows\Tasks\At42.job
c:\windows\Tasks\At45.job
c:\windows\Tasks\At46.job
c:\windows\Tasks\At49.job
c:\windows\Tasks\At51.job
c:\windows\Tasks\At53.job
c:\windows\Tasks\At55.job
c:\windows\Tasks\At57.job
c:\windows\Tasks\At60.job
c:\windows\Tasks\At61.job
c:\windows\Tasks\At63.job
c:\windows\Tasks\At65.job
c:\windows\Tasks\At66.job
c:\windows\Tasks\At69.job
c:\windows\Tasks\At70.job
c:\windows\Tasks\At73.job
c:\windows\Tasks\At74.job
c:\windows\Tasks\At77.job
c:\windows\Tasks\At78.job
c:\windows\Tasks\At81.job
c:\windows\Tasks\At83.job
c:\windows\Tasks\At85.job
c:\windows\Tasks\At87.job
c:\windows\Tasks\At90.job
c:\windows\Tasks\At91.job
c:\windows\Tasks\At93.job
c:\windows\Tasks\At94.job
c:\windows\Tasks\At97.job
.
.
((((((((((((((((((((((((( Files Created from 2011-08-11 to 2011-09-11 )))))))))))))))))))))))))))))))
.
.
2011-09-11 00:47 . 2011-09-11 00:47 38912 ----a-w- c:\windows\system32\06U4R.com
2011-09-10 22:40 . 2011-09-10 22:40 -------- d-----w- c:\windows\system32\config\systemprofile\Application Data\IObit
2011-09-09 01:58 . 2011-09-09 01:58 -------- d-----w- c:\program files\Common Files\Java
2011-09-08 15:58 . 2011-09-08 15:58 -------- d-s---w- c:\documents and settings\LocalService\UserData
2011-09-08 14:55 . 2011-09-08 14:55 -------- d-s---w- c:\windows\system32\config\systemprofile\UserData
2011-09-08 06:35 . 2011-09-08 06:35 -------- d-----w- c:\windows\system32\config\systemprofile\Local Settings\Application Data\Microsoft
2011-09-07 07:13 . 2011-09-07 07:13 -------- d-----w- c:\documents and settings\Steve\Application Data\Search Settings
2011-09-07 07:13 . 2011-09-07 07:13 -------- d-----w- c:\windows\system32\config\systemprofile\Application Data\Application Updater
2011-09-07 07:13 . 2011-09-07 07:13 -------- d-----w- c:\program files\Application Updater
2011-09-07 07:13 . 2011-09-07 07:13 -------- d-----w- c:\program files\IObit Toolbar
2011-09-07 07:13 . 2011-09-07 07:13 -------- d-----w- c:\program files\Common Files\Spigot
2011-09-01 15:00 . 2011-09-03 16:23 -------- d-----w- c:\program files\Cobian Backup 8
2011-08-31 18:09 . 2011-08-31 18:09 -------- d-----w- C:\Application Data
2011-08-31 03:37 . 2010-09-22 19:46 700632 ----a-w- c:\windows\system32\drivers\FStopW.sys
2011-08-31 03:36 . 2011-08-31 03:36 -------- d-----w- c:\program files\FRISK Software
2011-08-31 02:55 . 2011-08-31 02:55 -------- d-----w- c:\windows\PIF
2011-08-31 01:41 . 2011-08-31 01:41 -------- d-----w- c:\documents and settings\Steve\Local Settings\Application Data\Identities
2011-08-30 15:58 . 2011-08-30 15:59 -------- d-----w- c:\windows\system32\sdtmp
2011-08-30 15:57 . 2011-08-30 15:57 -------- d-----w- c:\documents and settings\All Users\Application Data\TEMP
2011-08-28 00:28 . 2011-08-28 00:28 -------- d-----w- c:\documents and settings\Steve\Application Data\Malwarebytes
2011-08-28 00:28 . 2011-07-07 02:52 41272 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2011-08-28 00:28 . 2011-08-28 00:28 -------- d-----w- c:\documents and settings\All Users\Application Data\Malwarebytes
2011-08-28 00:28 . 2011-08-31 04:11 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
2011-08-28 00:28 . 2011-07-07 02:52 21048 ----a-w- c:\windows\system32\drivers\mbam.sys
2011-08-28 00:11 . 2011-08-28 00:14 -------- d-----w- c:\documents and settings\Guest
.
.
.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2008-08-17 00:42 . 2008-08-17 00:42 13112 ----a-w- c:\program files\mozilla firefox\plugins\cgpcfg.dll
2008-08-17 00:42 . 2008-08-17 00:42 70456 ----a-w- c:\program files\mozilla firefox\plugins\CgpCore.dll
2008-08-17 00:42 . 2008-08-17 00:42 91448 ----a-w- c:\program files\mozilla firefox\plugins\confmgr.dll
2008-08-17 00:42 . 2008-08-17 00:42 20800 ----a-w- c:\program files\mozilla firefox\plugins\ctxlogging.dll
2008-08-17 00:43 . 2008-08-17 00:43 206136 ----a-w- c:\program files\mozilla firefox\plugins\ctxmui.dll
2008-08-17 00:42 . 2008-08-17 00:42 31032 ----a-w- c:\program files\mozilla firefox\plugins\icafile.dll
2008-08-17 00:42 . 2008-08-17 00:42 40248 ----a-w- c:\program files\mozilla firefox\plugins\icalogon.dll
2007-06-22 01:39 . 2007-06-22 01:39 34376 ----a-w- c:\program files\mozilla firefox\plugins\logging.dll
2008-05-21 15:41 . 2008-05-21 15:41 479232 ----a-w- c:\program files\mozilla firefox\plugins\msvcm80.dll
2008-05-21 15:41 . 2008-05-21 15:41 548864 ----a-w- c:\program files\mozilla firefox\plugins\msvcp80.dll
2008-05-21 15:41 . 2008-05-21 15:41 626688 ----a-w- c:\program files\mozilla firefox\plugins\msvcr80.dll
2008-06-05 20:58 . 2008-06-05 20:58 648504 ----a-w- c:\program files\mozilla firefox\plugins\sslsdk_b.dll
2008-08-17 00:42 . 2008-08-17 00:42 23864 ----a-w- c:\program files\mozilla firefox\plugins\TcpPServ.dll
.
<pre>
c:\program files\Adobe\Reader 9.0\Reader\Reader_sl .exe
c:\program files\Analog Devices\SoundMAX\SMax4PNP .exe
c:\program files\Apoint2K\Apoint .exe
c:\program files\ATI Technologies\ATI Control Panel\atiptaxx .exe
c:\program files\Common Files\Adobe\ARM\1.0\AdobeARM .exe
c:\program files\Common Files\Java\Java Update\jusched .exe
c:\program files\Common Files\Spigot\Search Settings\SearchSettings .exe
c:\program files\FRISK Software\F-PROT Antivirus for Windows\FProtTray .exe
c:\program files\IObit\Advanced SystemCare 3\AWC .exe
</pre>
.
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4
.
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"Advanced SystemCare 3"="c:\program files\IObit\Advanced SystemCare 3\AWC.exe" [N/A]
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"Apoint"="c:\program files\Apoint2K\Apoint.exe" [N/A]
"SoundMAXPnP"="c:\program files\Analog Devices\SoundMAX\SMax4PNP.exe" [N/A]
"AGRSMMSG"="AGRSMMSG.exe" [2005-04-19 88209]
"ATIPTA"="c:\program files\ATI Technologies\ATI Control Panel\atiptaxx.exe" [N/A]
"Adobe Reader Speed Launcher"="c:\program files\Adobe\Reader 9.0\Reader\Reader_sl.exe" [N/A]
"Adobe ARM"="c:\program files\Common Files\Adobe\ARM\1.0\AdobeARM.exe" [N/A]
"F-PROT Antivirus Tray application"="c:\program files\FRISK Software\F-PROT Antivirus for Windows\FProtTray.exe" [N/A]
"SearchSettings"="c:\program files\Common Files\Spigot\Search Settings\SearchSettings.exe" [N/A]
"SunJavaUpdateSched"="c:\program files\Common Files\Java\Java Update\jusched.exe" [N/A]
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\FPAVServer]
@="Service"
.
R0 atiide;atiide;c:\windows\system32\drivers\atiide.sys [9/20/2010 10:14 PM 5632]
R0 FPAV_RTP;FPAV_RTP;c:\windows\system32\drivers\FStopW.sys [8/30/2011 8:37 PM 700632]
R2 FPAVServer;F-PROT Antivirus for Windows system;c:\program files\FRISK Software\F-PROT Antivirus for Windows\FPAVServer.exe [11/3/2010 4:40 PM 83624]
S2 Application Updater;Application Updater;c:\program files\Application Updater\ApplicationUpdater.exe [8/17/2011 1:00 PM 402328]
S2 IS360service;IS360service;c:\program files\IObit\IObit Security 360\is360srv.exe [1/17/2011 12:44 PM 312152]
.
Contents of the 'Scheduled Tasks' folder
.
2011-09-11 c:\windows\Tasks\At103.job
- c:\windows\System32\06U4R.com [2011-09-11 00:47]
.
2011-09-11 c:\windows\Tasks\At106.job
- c:\windows\System32\06U4R.com [2011-09-11 00:47]
.
2011-09-11 c:\windows\Tasks\At110.job
- c:\windows\System32\06U4R.com [2011-09-11 00:47]
.
2011-09-11 c:\windows\Tasks\At115.job
- c:\windows\System32\06U4R.com [2011-09-11 00:47]
.
2011-09-11 c:\windows\Tasks\At118.job
- c:\windows\System32\06U4R.com [2011-09-11 00:47]
.
2011-09-11 c:\windows\Tasks\At27.job
- c:\windows\System32\06U4R.com [2011-09-11 00:47]
.
2011-09-11 c:\windows\Tasks\At31.job
- c:\windows\System32\06U4R.com [2011-09-11 00:47]
.
2011-09-11 c:\windows\Tasks\At34.job
- c:\windows\System32\06U4R.com [2011-09-11 00:47]
.
2011-09-11 c:\windows\Tasks\At40.job
- c:\windows\System32\06U4R.com [2011-09-11 00:47]
.
2011-09-11 c:\windows\Tasks\At44.job
- c:\windows\System32\06U4R.com [2011-09-11 00:47]
.
2011-09-11 c:\windows\Tasks\At48.job
- c:\windows\System32\06U4R.com [2011-09-11 00:47]
.
2011-09-11 c:\windows\Tasks\At52.job
- c:\windows\System32\06U4R.com [2011-09-11 00:47]
.
2011-09-11 c:\windows\Tasks\At56.job
- c:\windows\System32\06U4R.com [2011-09-11 00:47]
.
2011-09-11 c:\windows\Tasks\At59.job
- c:\windows\System32\06U4R.com [2011-09-11 00:47]
.
2011-09-11 c:\windows\Tasks\At64.job
- c:\windows\System32\06U4R.com [2011-09-11 00:47]
.
2011-09-11 c:\windows\Tasks\At68.job
- c:\windows\System32\06U4R.com [2011-09-11 00:47]
.
2011-09-11 c:\windows\Tasks\At71.job
- c:\windows\System32\06U4R.com [2011-09-11 00:47]
.
2011-09-11 c:\windows\Tasks\At75.job
- c:\windows\System32\06U4R.com [2011-09-11 00:47]
.
2011-09-11 c:\windows\Tasks\At79.job
- c:\windows\System32\06U4R.com [2011-09-11 00:47]
.
2011-09-11 c:\windows\Tasks\At82.job
- c:\windows\System32\06U4R.com [2011-09-11 00:47]
.
2011-09-11 c:\windows\Tasks\At86.job
- c:\windows\System32\06U4R.com [2011-09-11 00:47]
.
2011-09-11 c:\windows\Tasks\At89.job
- c:\windows\System32\06U4R.com [2011-09-11 00:47]
.
2011-09-11 c:\windows\Tasks\At95.job
- c:\windows\System32\06U4R.com [2011-09-11 00:47]
.
2011-09-11 c:\windows\Tasks\At98.job
- c:\windows\System32\06U4R.com [2011-09-11 00:47]
.
2011-09-08 c:\windows\Tasks\SmartDefrag.job
- c:\program files\IObit\IObit SmartDefrag\IObit SmartDefrag.exe [2011-09-08 23:48]
.
.
------- Supplementary Scan -------
.
uStart Page = hxxp://www.google.com/
uInternet Connection Wizard,ShellNext = iexplore
IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~2\OFFICE11\EXCEL.EXE/3000
IE: {{c95fe080-8f5d-11d2-a20b-00aa003c157a} - %SystemRoot%\web\related.htm
TCP: DhcpNameServer = 192.168.1.254 199.185.220.254
FF - ProfilePath - c:\documents and settings\Steve\Application Data\Mozilla\Firefox\Profiles\d7r8xwl3.default\
FF - prefs.js: browser.search.selectedEngine - Yahoo
FF - prefs.js: browser.startup.homepage - hxxp://www.google.com/
FF - prefs.js: keyword.URL - hxxp://search.yahoo.com/search?fr=greentree_ff1&ei=utf-8&type=642886&p=
FF - prefs.js: network.proxy.type - 0
FF - Ext: Default: {972ce4c6-7e08-4474-a285-3208198ce6fd} - c:\program files\Mozilla Firefox\extensions\{972ce4c6-7e08-4474-a285-3208198ce6fd}
FF - Ext: Java Console: {CAFEEFAC-0016-0000-0022-ABCDEFFEDCBA} - c:\program files\Mozilla Firefox\extensions\{CAFEEFAC-0016-0000-0022-ABCDEFFEDCBA}
FF - Ext: Java Console: {CAFEEFAC-0016-0000-0026-ABCDEFFEDCBA} - c:\program files\Mozilla Firefox\extensions\{CAFEEFAC-0016-0000-0026-ABCDEFFEDCBA}
FF - Ext: Java Quick Starter: jqs@sun.com - c:\program files\Java\jre6\lib\deploy\jqs\ff
FF - user.js: browser.cache.memory.capacity - 16000
FF - user.js: browser.chrome.favicons - false
FF - user.js: browser.display.show_image_placeholders - true
FF - user.js: browser.turbo.enabled - true
FF - user.js: browser.urlbar.autocomplete.enabled - true
FF - user.js: browser.urlbar.autofill - true
FF - user.js: content.max.tokenizing.time - 3000000
FF - user.js: content.maxtextrun - 4095
FF - user.js: content.notify.backoffcount - 5
FF - user.js: content.notify.interval - 1000000
FF - user.js: content.notify.ontimer - true
FF - user.js: content.switch.threshold - 1000000
FF - user.js: dom.disable_window_status_change - true
FF - user.js: network.http.max-connections - 48
FF - user.js: network.http.max-connections-per-server - 16
FF - user.js: network.http.max-persistent-connections-per-proxy - 16
FF - user.js: network.http.max-persistent-connections-per-server - 8
FF - user.js: network.http.pipelining - true
FF - user.js: network.http.pipelining.firstrequest - true
FF - user.js: network.http.pipelining.maxrequests - 8
FF - user.js: network.http.proxy.pipelining - true
FF - user.js: network.http.request.max-start-delay - 0
FF - user.js: nglayout.initialpaint.delay - 1000
FF - user.js: plugin.expose_full_path - true
FF - user.js: ui.submenuDelay - 0
.
.
**************************************************************************
.
catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2011-09-10 18:21
Windows 5.1.2600 Service Pack 1 NTFS
.
scanning hidden processes ...
.
scanning hidden autostart entries ...
.
scanning hidden files ...
.
scan completed successfully
hidden files: 0
.
**************************************************************************
.
Stealth MBR rootkit/Mebroot/Sinowal/TDL4 detector 0.4.2 by Gmer, http://www.gmer.net
Windows 5.1.2600 Disk: HITACHI_DK23FA-40 rev.00M5A0A0 -> Harddisk0\DR0 -> \Device\Ide\IdeDeviceP0T0L0-3
.
device: opened successfully
user: MBR read successfully
error: Read A device attached to the system is not functioning.
kernel: MBR read successfully
detected disk devices:
detected hooks:
\Driver\atapi DriverStartIo -> 0x84B2531B
user & kernel MBR OK
copy of MBR has been found in sector 78124095
.
**************************************************************************
.
--------------------- LOCKED REGISTRY KEYS ---------------------
.
[HKEY_LOCAL_MACHINE\software\Microsoft\Windows\CurrentVersion\Reinstall\:õwjY*]
"DisplayName"="???\16?\11\09"
"DeviceDesc"="???\16?\11\09"
"ProviderName"="???\11?#@\11??"
"MFG"="???????"
"ReinstallString"=".10.1000.3"
"DeviceInstanceIds"=multi:"c:\\docume~1\\steve\\locals~1\\temp\\pft169.tmp\\sbdrv\\smbus\\smbusati.inf\00"
.
--------------------- DLLs Loaded Under Running Processes ---------------------
.
- - - - - - - > 'winlogon.exe'(228)
c:\windows\System32\ODBC32.dll
c:\windows\system32\Ati2evxx.dll
.
- - - - - - - > 'lsass.exe'(284)
c:\windows\System32\dssenh.dll
.
Completion time: 2011-09-10 18:25:50
ComboFix-quarantined-files.txt 2011-09-11 01:25
.
Pre-Run: 25,881,333,760 bytes free
Post-Run: 25,916,735,488 bytes free
.
- - End Of File - - F5B1EB3CBA78AD6C041E752B657C3CF3

#8 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:10:53 AM

Posted 11 September 2011 - 05:34 PM

Greetings

Good That cleaned up some bad guys but I see some other stuff that we need to go after, so I want you to run this custom script for me.

:Run CFScript:

Open Notepad and copy/paste the text in the box into the window:

ClearJavaCache::

File::
c:\windows\System32\06U4R.com 

Folder::
c:\program files\Common Files\Spigot\Search Settings

AtJob::

RenV::
c:\program files\Adobe\Reader 9.0\Reader\Reader_sl .exe
c:\program files\Analog Devices\SoundMAX\SMax4PNP .exe
c:\program files\Apoint2K\Apoint .exe
c:\program files\ATI Technologies\ATI Control Panel\atiptaxx .exe
c:\program files\Common Files\Adobe\ARM\1.0\AdobeARM .exe
c:\program files\Common Files\Java\Java Update\jusched .exe
c:\program files\Common Files\Spigot\Search Settings\SearchSettings .exe
c:\program files\FRISK Software\F-PROT Antivirus for Windows\FProtTray .exe
c:\program files\IObit\Advanced SystemCare 3\AWC .exe


Save it to your desktop as CFScript.txt

Refering to the picture above, drag CFScript.txt into ComboFix.exe
Posted Image
This will let ComboFix run again.
Restart if you have to.
Save the produced logfile to your desktop.

Note: Do not mouseclick combofix's window whilst it's running. That may cause it to stall


I want you to run this tool for me next.

tdsskiller:

Please read carefully and follow these steps.
  • Download TDSSKiller and save it to your Desktop.
  • doubleclick on TDSSKiller.exe to run the application, then on Start Scan.
  • If an infected file is detected, the default action will be Cure, click on Continue.
  • If a suspicious file is detected, the default action will be Skip, click on Continue.
  • It may ask you to reboot the computer to complete the process. Click on Reboot Now.
  • If no reboot is require, click on Report. A log file should appear. Please copy and paste the contents of that file here.
  • If a reboot is required, the report can also be found in your root directory, (usually C:\ folder) in the form of "TDSSKiller.[Version]_[Date]_[Time]_log.txt". Please copy and paste the contents of that file here.



"information and logs"

  • In your next post I need the following

  • report from Combofix
  • report from TDSSKiller
  • let me know of any problems you may have had
  • How is the computer doing now after running the script?

Gringo

I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#9 estevan514

estevan514
  • Topic Starter

  • Members
  • 13 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Beautiful British Columbia
  • Local time:06:53 AM

Posted 11 September 2011 - 09:02 PM

Hey Gringo. The computer is running just as well as before this virus hit. Everything seems to be in order. What's next?

Here are the files:

CF Log:

ComboFix 11-09-10.02 - Steve 09/11/2011 18:29:00.3.1 - x86
Microsoft Windows XP Home Edition 5.1.2600.1.1252.1.1033.18.895.596 [GMT -7:00]
Running from: c:\documents and settings\Steve\Desktop\ComboFix.exe
Command switches used :: c:\documents and settings\Steve\Desktop\CFScript.txt
.
FILE ::
"c:\windows\System32\06U4R.com"
.
.
((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.
.
c:\program files\Common Files\Spigot\Search Settings
c:\program files\Common Files\Spigot\Search Settings\config.ini
c:\program files\Common Files\Spigot\Search Settings\SearchSettings.exe
c:\program files\Common Files\Spigot\Search Settings\yahoo_ff.xml
c:\program files\Common Files\Spigot\Search Settings\yahoo_ie.xml
c:\windows\Fonts\06U4R.com
c:\windows\System32\06U4R.com
c:\windows\system32\DC120fc7_32.dll
c:\windows\Tasks\At103.job
c:\windows\Tasks\At106.job
c:\windows\Tasks\At110.job
c:\windows\Tasks\At115.job
c:\windows\Tasks\At118.job
c:\windows\Tasks\At145.job
c:\windows\Tasks\At146.job
c:\windows\Tasks\At147.job
c:\windows\Tasks\At148.job
c:\windows\Tasks\At149.job
c:\windows\Tasks\At150.job
c:\windows\Tasks\At151.job
c:\windows\Tasks\At152.job
c:\windows\Tasks\At153.job
c:\windows\Tasks\At154.job
c:\windows\Tasks\At155.job
c:\windows\Tasks\At156.job
c:\windows\Tasks\At157.job
c:\windows\Tasks\At158.job
c:\windows\Tasks\At159.job
c:\windows\Tasks\At160.job
c:\windows\Tasks\At161.job
c:\windows\Tasks\At162.job
c:\windows\Tasks\At163.job
c:\windows\Tasks\At164.job
c:\windows\Tasks\At165.job
c:\windows\Tasks\At166.job
c:\windows\Tasks\At167.job
c:\windows\Tasks\At168.job
c:\windows\Tasks\At27.job
c:\windows\Tasks\At31.job
c:\windows\Tasks\At34.job
c:\windows\Tasks\At40.job
c:\windows\Tasks\At44.job
c:\windows\Tasks\At48.job
c:\windows\Tasks\At52.job
c:\windows\Tasks\At56.job
c:\windows\Tasks\At59.job
c:\windows\Tasks\At64.job
c:\windows\Tasks\At68.job
c:\windows\Tasks\At71.job
c:\windows\Tasks\At75.job
c:\windows\Tasks\At79.job
c:\windows\Tasks\At82.job
c:\windows\Tasks\At86.job
c:\windows\Tasks\At89.job
c:\windows\Tasks\At95.job
c:\windows\Tasks\At98.job
Pass LEGAL for license information. Built Sat Jun 25 23:20 2011c:\documents and settings\Guest\NTUSER.DAT.LOG
.
.
((((((((((((((((((((((((( Files Created from 2011-08-12 to 2011-09-12 )))))))))))))))))))))))))))))))
.
.
2011-09-12 01:09 . 2011-09-11 22:43 112128 ----a-w- c:\windows\system32\06U4R.com_
2011-09-10 22:40 . 2011-09-10 22:40 -------- d-----w- c:\windows\system32\config\systemprofile\Application Data\IObit
2011-09-09 01:58 . 2011-09-09 01:58 -------- d-----w- c:\program files\Common Files\Java
2011-09-08 15:58 . 2011-09-08 15:58 -------- d-s---w- c:\documents and settings\LocalService\UserData
2011-09-08 14:55 . 2011-09-08 14:55 -------- d-s---w- c:\windows\system32\config\systemprofile\UserData
2011-09-08 06:35 . 2011-09-08 06:35 -------- d-----w- c:\windows\system32\config\systemprofile\Local Settings\Application Data\Microsoft
2011-09-07 07:13 . 2011-09-07 07:13 -------- d-----w- c:\documents and settings\Steve\Application Data\Search Settings
2011-09-07 07:13 . 2011-09-07 07:13 -------- d-----w- c:\windows\system32\config\systemprofile\Application Data\Application Updater
2011-09-07 07:13 . 2011-09-07 07:13 -------- d-----w- c:\program files\Application Updater
2011-09-07 07:13 . 2011-09-12 01:36 -------- d-----w- c:\program files\Common Files\Spigot
2011-09-07 07:13 . 2011-09-07 07:13 -------- d-----w- c:\program files\IObit Toolbar
2011-09-01 15:00 . 2011-09-03 16:23 -------- d-----w- c:\program files\Cobian Backup 8
2011-08-31 18:09 . 2011-08-31 18:09 -------- d-----w- C:\Application Data
2011-08-31 03:37 . 2010-09-22 19:46 700632 ----a-w- c:\windows\system32\drivers\FStopW.sys
2011-08-31 03:36 . 2011-08-31 03:36 -------- d-----w- c:\program files\FRISK Software
2011-08-31 02:55 . 2011-08-31 02:55 -------- d-----w- c:\windows\PIF
2011-08-31 01:41 . 2011-08-31 01:41 -------- d-----w- c:\documents and settings\Steve\Local Settings\Application Data\Identities
2011-08-30 15:58 . 2011-08-30 15:59 -------- d-----w- c:\windows\system32\sdtmp
2011-08-30 15:57 . 2011-08-30 15:57 -------- d-----w- c:\documents and settings\All Users\Application Data\TEMP
2011-08-28 00:28 . 2011-08-28 00:28 -------- d-----w- c:\documents and settings\Steve\Application Data\Malwarebytes
2011-08-28 00:28 . 2011-07-07 02:52 41272 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2011-08-28 00:28 . 2011-08-28 00:28 -------- d-----w- c:\documents and settings\All Users\Application Data\Malwarebytes
2011-08-28 00:28 . 2011-08-31 04:11 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
2011-08-28 00:28 . 2011-07-07 02:52 21048 ----a-w- c:\windows\system32\drivers\mbam.sys
2011-08-28 00:11 . 2011-08-28 00:14 -------- d-----w- c:\documents and settings\Guest
.
.
.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2008-08-17 00:42 . 2008-08-17 00:42 13112 ----a-w- c:\program files\mozilla firefox\plugins\cgpcfg.dll
2008-08-17 00:42 . 2008-08-17 00:42 70456 ----a-w- c:\program files\mozilla firefox\plugins\CgpCore.dll
2008-08-17 00:42 . 2008-08-17 00:42 91448 ----a-w- c:\program files\mozilla firefox\plugins\confmgr.dll
2008-08-17 00:42 . 2008-08-17 00:42 20800 ----a-w- c:\program files\mozilla firefox\plugins\ctxlogging.dll
2008-08-17 00:43 . 2008-08-17 00:43 206136 ----a-w- c:\program files\mozilla firefox\plugins\ctxmui.dll
2008-08-17 00:42 . 2008-08-17 00:42 31032 ----a-w- c:\program files\mozilla firefox\plugins\icafile.dll
2008-08-17 00:42 . 2008-08-17 00:42 40248 ----a-w- c:\program files\mozilla firefox\plugins\icalogon.dll
2007-06-22 01:39 . 2007-06-22 01:39 34376 ----a-w- c:\program files\mozilla firefox\plugins\logging.dll
2008-05-21 15:41 . 2008-05-21 15:41 479232 ----a-w- c:\program files\mozilla firefox\plugins\msvcm80.dll
2008-05-21 15:41 . 2008-05-21 15:41 548864 ----a-w- c:\program files\mozilla firefox\plugins\msvcp80.dll
2008-05-21 15:41 . 2008-05-21 15:41 626688 ----a-w- c:\program files\mozilla firefox\plugins\msvcr80.dll
2008-06-05 20:58 . 2008-06-05 20:58 648504 ----a-w- c:\program files\mozilla firefox\plugins\sslsdk_b.dll
2008-08-17 00:42 . 2008-08-17 00:42 23864 ----a-w- c:\program files\mozilla firefox\plugins\TcpPServ.dll
.
.
((((((((((((((((((((((((((((( SnapShot@2011-09-11_01.21.30 )))))))))))))))))))))))))))))))))))))))))
.
+ 2011-09-11 22:23 . 2011-09-11 22:23 16384 c:\windows\temp\Perflib_Perfdata_7a4.dat
- 2003-03-31 12:00 . 2011-09-03 19:10 59842 c:\windows\system32\perfc009.dat
+ 2003-03-31 12:00 . 2011-09-11 01:40 59842 c:\windows\system32\perfc009.dat
+ 2011-09-08 14:55 . 2011-09-11 04:29 32768 c:\windows\system32\config\systemprofile\UserData\index.dat
- 2011-09-08 14:55 . 2011-09-10 15:12 32768 c:\windows\system32\config\systemprofile\UserData\index.dat
+ 2011-09-11 17:36 . 2011-09-11 22:24 32768 c:\windows\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\index.dat
- 2011-09-10 22:01 . 2011-09-11 01:02 32768 c:\windows\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\index.dat
+ 2011-09-10 15:11 . 2011-09-11 04:28 65536 c:\windows\system32\config\systemprofile\Local Settings\History\History.IE5\MSHist012011091020110911\index.dat
- 2011-09-10 15:11 . 2011-09-10 15:25 65536 c:\windows\system32\config\systemprofile\Local Settings\History\History.IE5\MSHist012011091020110911\index.dat
+ 2010-09-21 03:59 . 2011-09-11 22:24 16384 c:\windows\system32\config\systemprofile\Local Settings\History\History.IE5\index.dat
- 2010-09-21 03:59 . 2011-09-11 01:02 16384 c:\windows\system32\config\systemprofile\Local Settings\History\History.IE5\index.dat
+ 2003-03-31 12:00 . 2011-09-11 01:40 395768 c:\windows\system32\perfh009.dat
- 2003-03-31 12:00 . 2011-09-03 19:10 395768 c:\windows\system32\perfh009.dat
+ 2010-09-21 03:59 . 2011-09-11 22:22 163840 c:\windows\system32\config\systemprofile\Cookies\index.dat
.
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4
.
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"Advanced SystemCare 3"="c:\program files\IObit\Advanced SystemCare 3\AWC.exe" [2010-05-17 2345680]
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"Apoint"="c:\program files\Apoint2K\Apoint.exe" [2003-10-08 159744]
"SoundMAXPnP"="c:\program files\Analog Devices\SoundMAX\SMax4PNP.exe" [2004-06-30 1388544]
"AGRSMMSG"="AGRSMMSG.exe" [2005-04-19 88209]
"ATIPTA"="c:\program files\ATI Technologies\ATI Control Panel\atiptaxx.exe" [2004-05-16 335872]
"Adobe Reader Speed Launcher"="c:\program files\Adobe\Reader 9.0\Reader\Reader_sl.exe" [2010-06-20 35760]
"Adobe ARM"="c:\program files\Common Files\Adobe\ARM\1.0\AdobeARM.exe" [2010-09-21 932288]
"F-PROT Antivirus Tray application"="c:\program files\FRISK Software\F-PROT Antivirus for Windows\FProtTray.exe" [2010-11-03 1674016]
"SunJavaUpdateSched"="c:\program files\Common Files\Java\Java Update\jusched.exe" [2011-04-08 254696]
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\FPAVServer]
@="Service"
.
R0 atiide;atiide;c:\windows\system32\drivers\atiide.sys [9/20/2010 10:14 PM 5632]
R0 FPAV_RTP;FPAV_RTP;c:\windows\system32\drivers\FStopW.sys [8/30/2011 8:37 PM 700632]
R2 Application Updater;Application Updater;c:\program files\Application Updater\ApplicationUpdater.exe [8/17/2011 1:00 PM 402328]
R2 FPAVServer;F-PROT Antivirus for Windows system;c:\program files\FRISK Software\F-PROT Antivirus for Windows\FPAVServer.exe [11/3/2010 4:40 PM 83624]
R2 IS360service;IS360service;c:\program files\IObit\IObit Security 360\is360srv.exe [1/17/2011 12:44 PM 312152]
.
.
------- Supplementary Scan -------
.
uStart Page = hxxp://www.google.com/
uInternet Connection Wizard,ShellNext = iexplore
IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~2\OFFICE11\EXCEL.EXE/3000
IE: {{c95fe080-8f5d-11d2-a20b-00aa003c157a} - %SystemRoot%\web\related.htm
TCP: DhcpNameServer = 192.168.1.254 199.185.220.254
FF - ProfilePath - c:\documents and settings\Steve\Application Data\Mozilla\Firefox\Profiles\d7r8xwl3.default\
FF - prefs.js: browser.search.selectedEngine - Yahoo
FF - prefs.js: browser.startup.homepage - hxxp://www.google.com/
FF - prefs.js: keyword.URL - hxxp://search.yahoo.com/search?fr=greentree_ff1&ei=utf-8&type=642886&p=
FF - prefs.js: network.proxy.type - 0
FF - Ext: Default: {972ce4c6-7e08-4474-a285-3208198ce6fd} - c:\program files\Mozilla Firefox\extensions\{972ce4c6-7e08-4474-a285-3208198ce6fd}
FF - Ext: Java Console: {CAFEEFAC-0016-0000-0022-ABCDEFFEDCBA} - c:\program files\Mozilla Firefox\extensions\{CAFEEFAC-0016-0000-0022-ABCDEFFEDCBA}
FF - Ext: Java Console: {CAFEEFAC-0016-0000-0026-ABCDEFFEDCBA} - c:\program files\Mozilla Firefox\extensions\{CAFEEFAC-0016-0000-0026-ABCDEFFEDCBA}
FF - Ext: Java Quick Starter: jqs@sun.com - c:\program files\Java\jre6\lib\deploy\jqs\ff
FF - user.js: browser.cache.memory.capacity - 16000
FF - user.js: browser.chrome.favicons - false
FF - user.js: browser.display.show_image_placeholders - true
FF - user.js: browser.turbo.enabled - true
FF - user.js: browser.urlbar.autocomplete.enabled - true
FF - user.js: browser.urlbar.autofill - true
FF - user.js: content.max.tokenizing.time - 3000000
FF - user.js: content.maxtextrun - 4095
FF - user.js: content.notify.backoffcount - 5
FF - user.js: content.notify.interval - 1000000
FF - user.js: content.notify.ontimer - true
FF - user.js: content.switch.threshold - 1000000
FF - user.js: dom.disable_window_status_change - true
FF - user.js: network.http.max-connections - 48
FF - user.js: network.http.max-connections-per-server - 16
FF - user.js: network.http.max-persistent-connections-per-proxy - 16
FF - user.js: network.http.max-persistent-connections-per-server - 8
FF - user.js: network.http.pipelining - true
FF - user.js: network.http.pipelining.firstrequest - true
FF - user.js: network.http.pipelining.maxrequests - 8
FF - user.js: network.http.proxy.pipelining - true
FF - user.js: network.http.request.max-start-delay - 0
FF - user.js: nglayout.initialpaint.delay - 1000
FF - user.js: plugin.expose_full_path - true
FF - user.js: ui.submenuDelay - 0
.
- - - - ORPHANS REMOVED - - - -
.
HKLM-Run-SearchSettings - c:\program files\Common Files\Spigot\Search Settings\SearchSettings.exe
.
.
.
**************************************************************************
.
catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2011-09-11 18:37
Windows 5.1.2600 Service Pack 1 NTFS
.
scanning hidden processes ...
.
scanning hidden autostart entries ...
.
scanning hidden files ...
.
scan completed successfully
hidden files: 0
.
**************************************************************************
.
Stealth MBR rootkit/Mebroot/Sinowal/TDL4 detector 0.4.2 by Gmer, http://www.gmer.net
Windows 5.1.2600 Disk: HITACHI_DK23FA-40 rev.00M5A0A0 -> Harddisk0\DR0 -> \Device\Ide\IdeDeviceP0T0L0-3
.
device: opened successfully
user: MBR read successfully
error: Read A device attached to the system is not functioning.
kernel: MBR read successfully
detected disk devices:
detected hooks:
\Driver\atapi DriverStartIo -> 0x84B6531B
user & kernel MBR OK
copy of MBR has been found in sector 78124095
.
**************************************************************************
.
--------------------- LOCKED REGISTRY KEYS ---------------------
.
[HKEY_LOCAL_MACHINE\software\Microsoft\Windows\CurrentVersion\Reinstall\:õwjY*]
"DisplayName"="???\16?\11\09"
"DeviceDesc"="???\16?\11\09"
"ProviderName"="???\11?#@\11??"
"MFG"="???????"
"ReinstallString"=".10.1000.3"
"DeviceInstanceIds"=multi:"c:\\docume~1\\steve\\locals~1\\temp\\pft169.tmp\\sbdrv\\smbus\\smbusati.inf\00"
.
--------------------- DLLs Loaded Under Running Processes ---------------------
.
- - - - - - - > 'winlogon.exe'(564)
c:\windows\System32\ODBC32.dll
c:\windows\system32\Ati2evxx.dll
.
- - - - - - - > 'lsass.exe'(620)
c:\windows\System32\dssenh.dll
.
Completion time: 2011-09-11 18:40:47
ComboFix-quarantined-files.txt 2011-09-12 01:40
ComboFix2.txt 2011-09-11 01:25
.
Pre-Run: 24,382,275,584 bytes free
Post-Run: 24,419,098,624 bytes free
.
- - End Of File - - 9C677B181E1D2BE06A8F21D051EAA6F8


TDSS Killer Log:

2011/09/11 18:46:35.0140 1572 TDSS rootkit removing tool 2.5.21.0 Sep 10 2011 21:07:05
2011/09/11 18:46:35.0546 1572 ================================================================================
2011/09/11 18:46:35.0546 1572 SystemInfo:
2011/09/11 18:46:35.0546 1572
2011/09/11 18:46:35.0546 1572 OS Version: 5.1.2600 ServicePack: 1.0
2011/09/11 18:46:35.0546 1572 Product type: Workstation
2011/09/11 18:46:35.0546 1572 ComputerName: ISTVAN-6AHLEK7T
2011/09/11 18:46:35.0546 1572 UserName: Steve
2011/09/11 18:46:35.0562 1572 Windows directory: C:\WINDOWS
2011/09/11 18:46:35.0562 1572 System windows directory: C:\WINDOWS
2011/09/11 18:46:35.0562 1572 Processor architecture: Intel x86
2011/09/11 18:46:35.0562 1572 Number of processors: 1
2011/09/11 18:46:35.0562 1572 Page size: 0x1000
2011/09/11 18:46:35.0562 1572 Boot type: Normal boot
2011/09/11 18:46:35.0562 1572 ================================================================================
2011/09/11 18:46:37.0109 1572 Initialize success
2011/09/11 18:47:12.0421 4012 ================================================================================
2011/09/11 18:47:12.0421 4012 Scan started
2011/09/11 18:47:12.0421 4012 Mode: Manual;
2011/09/11 18:47:12.0421 4012 ================================================================================
2011/09/11 18:47:12.0968 4012 ACPI (94ddd4b3acbd7a9558e1762cd58386f9) C:\WINDOWS\System32\DRIVERS\ACPI.sys
2011/09/11 18:47:13.0140 4012 ACPIEC (9859c0f6936e723e4892d7141b1327d5) C:\WINDOWS\System32\DRIVERS\ACPIEC.sys
2011/09/11 18:47:13.0234 4012 aeaudio (75bee80a25fc7f690dcd57570dc159c1) C:\WINDOWS\System32\drivers\aeaudio.sys
2011/09/11 18:47:13.0406 4012 aec (ff773feda15e8bd97fd54fe87a0acdbe) C:\WINDOWS\System32\drivers\aec.sys
2011/09/11 18:47:13.0515 4012 AFD (51b1872b62d1c335bac53313913c8d5b) C:\WINDOWS\System32\drivers\afd.sys
2011/09/11 18:47:13.0781 4012 AgereSoftModem (029e01cb2938bec5af31bf47b6af0159) C:\WINDOWS\System32\DRIVERS\AGRSM.sys
2011/09/11 18:47:14.0187 4012 ApfiltrService (d3da11b88ab29076b78ff79f35f0586b) C:\WINDOWS\System32\DRIVERS\Apfiltr.sys
2011/09/11 18:47:14.0406 4012 Arp1394 (e47ae30589d7195bb044847fbb63a06e) C:\WINDOWS\System32\DRIVERS\arp1394.sys
2011/09/11 18:47:14.0734 4012 AsyncMac (03f403b07a884fc2aa54a0916c410931) C:\WINDOWS\System32\DRIVERS\asyncmac.sys
2011/09/11 18:47:15.0000 4012 atapi (95b858761a00e1d4f81f79a0da019aca) C:\WINDOWS\System32\DRIVERS\atapi.sys
2011/09/11 18:47:15.0234 4012 ati2mtag (83f24e252908e59c4a7ef203bf7f4c02) C:\WINDOWS\System32\DRIVERS\ati2mtag.sys
2011/09/11 18:47:15.0437 4012 atiide (899c9f94ed5ec5eff71aa6e17a084419) C:\WINDOWS\System32\DRIVERS\atiide.sys
2011/09/11 18:47:15.0531 4012 Atmarpc (8d735ca1cbdb0081b0e3b9ff0eb222d0) C:\WINDOWS\System32\DRIVERS\atmarpc.sys
2011/09/11 18:47:15.0734 4012 audstub (d9f724aa26c010a217c97606b160ed68) C:\WINDOWS\System32\DRIVERS\audstub.sys
2011/09/11 18:47:15.0906 4012 BCM43XX (114234fafec7060392195170e1c4d45e) C:\WINDOWS\System32\DRIVERS\bcmwl5.sys
2011/09/11 18:47:16.0109 4012 Beep (da1f27d85e0d1525f6621372e7b685e9) C:\WINDOWS\System32\drivers\Beep.sys
2011/09/11 18:47:16.0203 4012 caboagp (10d5fb74ee18ea49c30daaa203c0e0ec) C:\WINDOWS\System32\DRIVERS\atisgkaf.sys
2011/09/11 18:47:16.0578 4012 cbidf2k (90a673fc8e12a79afbed2576f6a7aaf9) C:\WINDOWS\System32\drivers\cbidf2k.sys
2011/09/11 18:47:16.0812 4012 Cdaudio (c1b486a7658353d33a10cc15211a873b) C:\WINDOWS\System32\drivers\Cdaudio.sys
2011/09/11 18:47:17.0046 4012 Cdfs (049a38451f2611caf2fd528e023a0b5a) C:\WINDOWS\System32\drivers\Cdfs.sys
2011/09/11 18:47:17.0125 4012 Cdrom (6506e033ad04cfec9ee56dbefd1083dd) C:\WINDOWS\System32\DRIVERS\cdrom.sys
2011/09/11 18:47:17.0375 4012 CmBatt (8e7f784abf6cd9482fbfecb9b53912aa) C:\WINDOWS\System32\DRIVERS\CmBatt.sys
2011/09/11 18:47:17.0656 4012 Compbatt (df1b1a24bf52d0ebc01ed4ece8979f50) C:\WINDOWS\System32\DRIVERS\compbatt.sys
2011/09/11 18:47:18.0000 4012 DevUpper (5dc28c3458fcc7258edd9f817bad8cc7) C:\WINDOWS\System32\DRIVERS\tiumflt.sys
2011/09/11 18:47:18.0171 4012 Disk (d1b16340ceaceecbf52340a0cbdf43e1) C:\WINDOWS\System32\DRIVERS\disk.sys
2011/09/11 18:47:18.0281 4012 dmboot (e18132d39407aadca6b1d19adf408a8a) C:\WINDOWS\System32\drivers\dmboot.sys
2011/09/11 18:47:18.0484 4012 dmio (aca44e9a8e2ff7c833664263c8478629) C:\WINDOWS\System32\drivers\dmio.sys
2011/09/11 18:47:18.0531 4012 dmload (e9317282a63ca4d188c0df5e09c6ac5f) C:\WINDOWS\System32\drivers\dmload.sys
2011/09/11 18:47:18.0718 4012 DMusic (ef05974d47d56fa8387f170f05bae5e7) C:\WINDOWS\System32\drivers\DMusic.sys
2011/09/11 18:47:18.0812 4012 drmkaud (fd859e517fa2abb53654afa7ec9e3a94) C:\WINDOWS\System32\drivers\drmkaud.sys
2011/09/11 18:47:19.0031 4012 Fastfat (e4a3a8f3e60b542a747b10e86faa5dad) C:\WINDOWS\System32\drivers\Fastfat.sys
2011/09/11 18:47:19.0109 4012 Fdc (19c5c7eac0190a42522290bf002f64ea) C:\WINDOWS\System32\DRIVERS\fdc.sys
2011/09/11 18:47:19.0281 4012 Fips (e153ab8a11de5452bcf5ac7652dbf3ed) C:\WINDOWS\System32\drivers\Fips.sys
2011/09/11 18:47:19.0375 4012 Flpydisk (8f70d1f7606f7442e2f7383f3701d728) C:\WINDOWS\System32\drivers\Flpydisk.sys
2011/09/11 18:47:19.0671 4012 FPAV_RTP (a98b9d16a38df7afdc1a465925d03884) C:\WINDOWS\System32\DRIVERS\FStopW.sys
2011/09/11 18:47:19.0906 4012 Fs_Rec (3e1e2bd4f39b0e2b7dc4f4d2bcc2779a) C:\WINDOWS\System32\drivers\Fs_Rec.sys
2011/09/11 18:47:20.0078 4012 Ftdisk (6ac26732762483366c3969c9e4d2259d) C:\WINDOWS\System32\DRIVERS\ftdisk.sys
2011/09/11 18:47:20.0156 4012 Gpc (13591e0a02e85de2a388f3ec4bd206df) C:\WINDOWS\System32\DRIVERS\msgpc.sys
2011/09/11 18:47:20.0390 4012 hidusb (1de6783b918f540149aa69943bdfeba8) C:\WINDOWS\System32\DRIVERS\hidusb.sys
2011/09/11 18:47:20.0593 4012 i8042prt (7080f46568108cc6ea73e460ee6ee702) C:\WINDOWS\System32\DRIVERS\i8042prt.sys
2011/09/11 18:47:20.0796 4012 Imapi (3cb4410747f2330d97b10b656d5bb2ac) C:\WINDOWS\System32\DRIVERS\imapi.sys
2011/09/11 18:47:20.0968 4012 IpFilterDriver (731f22ba402ee4b62748adaf6363c182) C:\WINDOWS\System32\DRIVERS\ipfltdrv.sys
2011/09/11 18:47:21.0156 4012 IpInIp (f56dd863ba732a4e8ee58d486c31250f) C:\WINDOWS\System32\DRIVERS\ipinip.sys
2011/09/11 18:47:21.0234 4012 IpNat (fc672ad6e9676814a0c844912f2abcff) C:\WINDOWS\System32\DRIVERS\ipnat.sys
2011/09/11 18:47:21.0406 4012 IPSec (1c4802409cfd4a7051f458b744cfcaa5) C:\WINDOWS\System32\DRIVERS\ipsec.sys
2011/09/11 18:47:21.0484 4012 IRENUM (b43201394646b7e98c89056edda686b5) C:\WINDOWS\System32\DRIVERS\irenum.sys
2011/09/11 18:47:21.0703 4012 isapnp (e504f706ccb699c2596e9a3da1596e87) C:\WINDOWS\System32\DRIVERS\isapnp.sys
2011/09/11 18:47:21.0796 4012 Kbdclass (1e7f78c2fc393356cd884c6fde7966f9) C:\WINDOWS\System32\DRIVERS\kbdclass.sys
2011/09/11 18:47:21.0968 4012 kmixer (10e0feb086d8c1419b958c9034e4668a) C:\WINDOWS\System32\drivers\kmixer.sys
2011/09/11 18:47:22.0109 4012 KSecDD (abc70e8b89cce44731a346deb764bf95) C:\WINDOWS\System32\drivers\KSecDD.sys
2011/09/11 18:47:22.0312 4012 MidiSyn (63c34814492aa65fc517b002de77b191) C:\WINDOWS\System32\drivers\MidiSyn.sys
2011/09/11 18:47:22.0437 4012 mnmdd (4ae068242760a1fb6e1a44bf4e16afa6) C:\WINDOWS\System32\drivers\mnmdd.sys
2011/09/11 18:47:22.0703 4012 Modem (7760873e4ec17f288e61f00044dea000) C:\WINDOWS\System32\drivers\Modem.sys
2011/09/11 18:47:22.0812 4012 Mouclass (81fb25d6ee5e0728d2c0630c58d7d908) C:\WINDOWS\System32\DRIVERS\mouclass.sys
2011/09/11 18:47:22.0953 4012 mouhid (b1c303e17fb9d46e87a98e4ba6769685) C:\WINDOWS\System32\DRIVERS\mouhid.sys
2011/09/11 18:47:23.0046 4012 MountMgr (d4face53a1c48cf8419b4cf494d2ee2e) C:\WINDOWS\System32\drivers\MountMgr.sys
2011/09/11 18:47:23.0296 4012 MRxDAV (d30cba20cc355d3648b9fed5bb55a9d5) C:\WINDOWS\System32\DRIVERS\mrxdav.sys
2011/09/11 18:47:23.0515 4012 MRxSmb (7a3a2be44e12e2abde1af891e83ac130) C:\WINDOWS\System32\DRIVERS\mrxsmb.sys
2011/09/11 18:47:23.0578 4012 Msfs (a1831538e119363d0d90d757ac8a2012) C:\WINDOWS\System32\drivers\Msfs.sys
2011/09/11 18:47:23.0750 4012 MSKSSRV (9686ded76afb73b48905c77a002c3ad5) C:\WINDOWS\System32\drivers\MSKSSRV.sys
2011/09/11 18:47:23.0796 4012 MSPCLOCK (bd8a0dcf208c27e20416bf9e8aed9cf9) C:\WINDOWS\System32\drivers\MSPCLOCK.sys
2011/09/11 18:47:23.0937 4012 MSPQM (f6a726b8832db1f88326b8be98b11981) C:\WINDOWS\System32\drivers\MSPQM.sys
2011/09/11 18:47:24.0062 4012 Mup (08c56887f06473b09fc1b39e7dec0fb6) C:\WINDOWS\System32\drivers\Mup.sys
2011/09/11 18:47:24.0203 4012 NDIS (3b350e5a2a5e951453f3993275a4523a) C:\WINDOWS\System32\drivers\NDIS.sys
2011/09/11 18:47:24.0343 4012 NdisTapi (08d43bbdacdf23f34d79e44ed35c1b4c) C:\WINDOWS\System32\DRIVERS\ndistapi.sys
2011/09/11 18:47:24.0515 4012 Ndisuio (e6b6d5e4c9c199b7bb56d7862ea68fbc) C:\WINDOWS\System32\DRIVERS\ndisuio.sys
2011/09/11 18:47:24.0640 4012 NdisWan (15787deca8c5428beeaa8044f544fd85) C:\WINDOWS\System32\DRIVERS\ndiswan.sys
2011/09/11 18:47:24.0812 4012 NDProxy (59fc3fb44d2669bc144fd87826bb571f) C:\WINDOWS\System32\drivers\NDProxy.sys
2011/09/11 18:47:24.0921 4012 NetBIOS (e351339fa17c4a70940e15b5e3dae6e2) C:\WINDOWS\System32\DRIVERS\netbios.sys
2011/09/11 18:47:25.0046 4012 NetBT (d96f3bc5a6e7452b0e3275b560dc8528) C:\WINDOWS\System32\DRIVERS\netbt.sys
2011/09/11 18:47:25.0218 4012 NIC1394 (ff4ceca01030be87d530e2c5859738db) C:\WINDOWS\System32\DRIVERS\nic1394.sys
2011/09/11 18:47:25.0375 4012 Npfs (20aba9f035e3a98877480e34fcc4dcb3) C:\WINDOWS\System32\drivers\Npfs.sys
2011/09/11 18:47:25.0609 4012 Ntfs (e3ae9c79498210a5f39fe5a9ad62bc55) C:\WINDOWS\System32\drivers\Ntfs.sys
2011/09/11 18:47:25.0875 4012 Null (73c1e1f395918bc2c6dd67af7591a3ad) C:\WINDOWS\System32\drivers\Null.sys
2011/09/11 18:47:25.0953 4012 NwlnkFlt (b305f3fad35083837ef46a0bbce2fc57) C:\WINDOWS\System32\DRIVERS\nwlnkflt.sys
2011/09/11 18:47:26.0125 4012 NwlnkFwd (c99b3415198d1aab7227f2c88fd664b9) C:\WINDOWS\System32\DRIVERS\nwlnkfwd.sys
2011/09/11 18:47:26.0203 4012 ohci1394 (52c36c911f83f200130b2f84e01f3511) C:\WINDOWS\System32\DRIVERS\ohci1394.sys
2011/09/11 18:47:26.0437 4012 Parport (67fd105f525a94c0246c9088e85a2f3b) C:\WINDOWS\System32\DRIVERS\parport.sys
2011/09/11 18:47:26.0515 4012 PartMgr (3334430c29dc338092f79c38ef7b4cd0) C:\WINDOWS\System32\drivers\PartMgr.sys
2011/09/11 18:47:26.0687 4012 ParVdm (70e98b3fd8e963a6a46a2e6247e0bea1) C:\WINDOWS\System32\drivers\ParVdm.sys
2011/09/11 18:47:26.0750 4012 PCI (9390447f3b1be5064a3ebe98c555a1e5) C:\WINDOWS\System32\DRIVERS\pci.sys
2011/09/11 18:47:26.0843 4012 PCIIde (ccf5f451bb1a5a2a522a76e670000ff0) C:\WINDOWS\System32\DRIVERS\pciide.sys
2011/09/11 18:47:27.0046 4012 Pcmcia (4ca446e011e2f61ac45eb2e3bc3f1584) C:\WINDOWS\System32\DRIVERS\pcmcia.sys
2011/09/11 18:47:27.0359 4012 PptpMiniport (fed674d73eb56c35444f701e847bf85b) C:\WINDOWS\System32\DRIVERS\raspptp.sys
2011/09/11 18:47:27.0625 4012 Processor (0f8a31ab9d8963f66ad93d3f69a1914c) C:\WINDOWS\System32\DRIVERS\processr.sys
2011/09/11 18:47:27.0828 4012 PSched (944440247fe6988c88b376ed85a0cd1a) C:\WINDOWS\System32\DRIVERS\psched.sys
2011/09/11 18:47:27.0875 4012 Ptilink (80d317bd1c3dbc5d4fe7b1678c60cadd) C:\WINDOWS\System32\DRIVERS\ptilink.sys
2011/09/11 18:47:28.0078 4012 RasAcd (fe0d99d6f31e4fad8159f690d68ded9c) C:\WINDOWS\System32\DRIVERS\rasacd.sys
2011/09/11 18:47:28.0296 4012 Rasl2tp (4c242c79a9c0d98d52d6f8cb9248d528) C:\WINDOWS\System32\DRIVERS\rasl2tp.sys
2011/09/11 18:47:28.0359 4012 RasPppoe (888335b3be346119cf7b4eff3a3fca7c) C:\WINDOWS\System32\DRIVERS\raspppoe.sys
2011/09/11 18:47:28.0500 4012 Raspti (fdbb1d60066fcfbb7452fd8f9829b242) C:\WINDOWS\System32\DRIVERS\raspti.sys
2011/09/11 18:47:28.0593 4012 Rdbss (df80c149c96fcfbb8a3dc3d5dd950aa8) C:\WINDOWS\System32\DRIVERS\rdbss.sys
2011/09/11 18:47:28.0671 4012 RDPCDD (4912d5b403614ce99c28420f75353332) C:\WINDOWS\System32\DRIVERS\RDPCDD.sys
2011/09/11 18:47:28.0921 4012 RDPWD (0606700377b6fb8b04475e92507adade) C:\WINDOWS\System32\drivers\RDPWD.sys
2011/09/11 18:47:29.0078 4012 redbook (ab56d6ed4e86d2b6f819a24a070f35f7) C:\WINDOWS\System32\DRIVERS\redbook.sys
2011/09/11 18:47:29.0234 4012 RTL8023xp (7c005e1af3b1c04e36637a1269205009) C:\WINDOWS\System32\DRIVERS\Rtlnicxp.sys
2011/09/11 18:47:29.0390 4012 rtl8139 (7a0db9fc3dc3c620aea30ea2a6557cac) C:\WINDOWS\System32\DRIVERS\RTL8139.SYS
2011/09/11 18:47:29.0531 4012 Secdrv (d26e26ea516450af9d072635c60387f4) C:\WINDOWS\System32\DRIVERS\secdrv.sys
2011/09/11 18:47:29.0734 4012 senfilt (9a4c4a4b191200f12085d188be70e4e3) C:\WINDOWS\System32\drivers\senfilt.sys
2011/09/11 18:47:29.0937 4012 Serial (dc7cbfec14b1b38bcf32aba922ffeaad) C:\WINDOWS\System32\drivers\Serial.sys
2011/09/11 18:47:29.0984 4012 Sfloppy (4e1b8866f3d208dee3906a191cb493e3) C:\WINDOWS\System32\drivers\Sfloppy.sys
2011/09/11 18:47:30.0281 4012 smwdm (854786d53c11ea9842f51176b139bd4b) C:\WINDOWS\System32\drivers\smwdm.sys
2011/09/11 18:47:30.0546 4012 splitter (32c54211e9e8a45cbcb097beaeb1999a) C:\WINDOWS\System32\drivers\splitter.sys
2011/09/11 18:47:30.0640 4012 sr (cd952661dbdf31c42e325a06bc67fd0e) C:\WINDOWS\System32\DRIVERS\sr.sys
2011/09/11 18:47:30.0906 4012 Srv (94619eb663216f9bf12f9b950fcab3c0) C:\WINDOWS\System32\DRIVERS\srv.sys
2011/09/11 18:47:31.0140 4012 swenum (064740c5c02de46723c4b8200ee876df) C:\WINDOWS\System32\DRIVERS\swenum.sys
2011/09/11 18:47:31.0218 4012 swmidi (94abc808fc4b6d7d2bbf42b85e25bb4d) C:\WINDOWS\System32\drivers\swmidi.sys
2011/09/11 18:47:31.0593 4012 sysaudio (b0b19f036f76333ab3338c7493e87b12) C:\WINDOWS\System32\drivers\sysaudio.sys
2011/09/11 18:47:31.0921 4012 Tcpip (244a2f9816bc9b593957281ef577d976) C:\WINDOWS\System32\DRIVERS\tcpip.sys
2011/09/11 18:47:32.0312 4012 TDPIPE (1a96630babbd59e8b885eae0dfbe6a3e) C:\WINDOWS\System32\drivers\TDPIPE.sys
2011/09/11 18:47:32.0359 4012 TDTCP (d1c578c6b37713694c5edd7c2d7f7451) C:\WINDOWS\System32\drivers\TDTCP.sys
2011/09/11 18:47:32.0562 4012 TermDD (194c51bc28a7ce9818012142b062e431) C:\WINDOWS\System32\DRIVERS\termdd.sys
2011/09/11 18:47:32.0781 4012 tiumfwl (65e8e81c2f40abce9db98fd232f86bf8) C:\WINDOWS\System32\drivers\tiumfwl.sys
2011/09/11 18:47:32.0953 4012 Udfs (01ca8ec606522d2f60820b0c0086fdd5) C:\WINDOWS\System32\drivers\Udfs.sys
2011/09/11 18:47:33.0187 4012 Update (164cfae1d766905f56c432acfc54f28c) C:\WINDOWS\System32\DRIVERS\update.sys
2011/09/11 18:47:33.0406 4012 usbehci (2d0c2f3836f72e85d41d9c50aeeb5423) C:\WINDOWS\System32\DRIVERS\usbehci.sys
2011/09/11 18:47:33.0453 4012 usbhub (d7bf70ac85e48b6c4df953401eccb75a) C:\WINDOWS\System32\DRIVERS\usbhub.sys
2011/09/11 18:47:33.0640 4012 usbohci (4e7d2f6df7a7e02d80fe0b109f0c9f02) C:\WINDOWS\System32\DRIVERS\usbohci.sys
2011/09/11 18:47:33.0718 4012 USBSTOR (4923c60f9c381eae679db04021d26abb) C:\WINDOWS\System32\DRIVERS\USBSTOR.SYS
2011/09/11 18:47:33.0937 4012 VgaSave (08d2edfd7261242b8aea27f1fe11e120) C:\WINDOWS\System32\drivers\vga.sys
2011/09/11 18:47:34.0062 4012 VolSnap (6fdc9523ef81617cf5028f47fcaf0fbe) C:\WINDOWS\System32\drivers\VolSnap.sys
2011/09/11 18:47:34.0250 4012 Wanarp (484af08f15d1306ff2e8b64fe62a160c) C:\WINDOWS\System32\DRIVERS\wanarp.sys
2011/09/11 18:47:34.0359 4012 wdmaud (499b653356a9e5589ee83ac47e5d2a8c) C:\WINDOWS\System32\drivers\wdmaud.sys
2011/09/11 18:47:34.0640 4012 WmiAcpi (73b52a0154ed66db39cbcb5c94271e81) C:\WINDOWS\System32\DRIVERS\wmiacpi.sys
2011/09/11 18:47:34.0765 4012 MBR (0x1B8) (2839639fa37b8353e792a2a30a12ced3) \Device\Harddisk0\DR0
2011/09/11 18:47:34.0781 4012 \Device\Harddisk0\DR0 - detected Rootkit.Win32.TDSS.tdl4 (0)
2011/09/11 18:47:34.0796 4012 Boot (0x1200) (679d254dff7cbd41c75e0e0eccea78d9) \Device\Harddisk0\DR0\Partition0
2011/09/11 18:47:34.0812 4012 ================================================================================
2011/09/11 18:47:34.0812 4012 Scan finished
2011/09/11 18:47:34.0812 4012 ================================================================================
2011/09/11 18:47:34.0843 3308 Detected object count: 1
2011/09/11 18:47:34.0843 3308 Actual detected object count: 1
2011/09/11 18:48:09.0046 3308 \Device\Harddisk0\DR0 (Rootkit.Win32.TDSS.tdl4) - will be cured after reboot
2011/09/11 18:48:09.0046 3308 \Device\Harddisk0\DR0 - ok
2011/09/11 18:48:09.0046 3308 Rootkit.Win32.TDSS.tdl4(\Device\Harddisk0\DR0) - User select action: Cure
2011/09/11 18:49:28.0828 1912 Deinitialize success

#10 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:10:53 AM

Posted 11 September 2011 - 09:05 PM

rerun combofix once more for me please


gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#11 estevan514

estevan514
  • Topic Starter

  • Members
  • 13 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Beautiful British Columbia
  • Local time:06:53 AM

Posted 11 September 2011 - 10:13 PM

Here is the most recent CF Log:


ComboFix 11-09-10.02 - Steve 09/11/2011 20:03:07.4.1 - x86
Microsoft Windows XP Home Edition 5.1.2600.1.1252.1.1033.18.895.576 [GMT -7:00]
Running from: c:\documents and settings\Steve\Desktop\ComboFix.exe
.
.
((((((((((((((((((((((((( Files Created from 2011-08-12 to 2011-09-12 )))))))))))))))))))))))))))))))
.
.
2011-09-12 01:09 . 2011-09-11 22:43 112128 ----a-w- c:\windows\system32\06U4R.com_
2011-09-10 22:40 . 2011-09-10 22:40 -------- d-----w- c:\windows\system32\config\systemprofile\Application Data\IObit
2011-09-09 01:58 . 2011-09-09 01:58 -------- d-----w- c:\program files\Common Files\Java
2011-09-08 15:58 . 2011-09-08 15:58 -------- d-s---w- c:\documents and settings\LocalService\UserData
2011-09-08 14:55 . 2011-09-08 14:55 -------- d-s---w- c:\windows\system32\config\systemprofile\UserData
2011-09-08 06:35 . 2011-09-08 06:35 -------- d-----w- c:\windows\system32\config\systemprofile\Local Settings\Application Data\Microsoft
2011-09-07 07:13 . 2011-09-07 07:13 -------- d-----w- c:\documents and settings\Steve\Application Data\Search Settings
2011-09-07 07:13 . 2011-09-07 07:13 -------- d-----w- c:\windows\system32\config\systemprofile\Application Data\Application Updater
2011-09-07 07:13 . 2011-09-07 07:13 -------- d-----w- c:\program files\Application Updater
2011-09-07 07:13 . 2011-09-12 01:36 -------- d-----w- c:\program files\Common Files\Spigot
2011-09-07 07:13 . 2011-09-07 07:13 -------- d-----w- c:\program files\IObit Toolbar
2011-09-01 15:00 . 2011-09-03 16:23 -------- d-----w- c:\program files\Cobian Backup 8
2011-08-31 18:09 . 2011-08-31 18:09 -------- d-----w- C:\Application Data
2011-08-31 03:37 . 2010-09-22 19:46 700632 ----a-w- c:\windows\system32\drivers\FStopW.sys
2011-08-31 03:36 . 2011-08-31 03:36 -------- d-----w- c:\program files\FRISK Software
2011-08-31 02:55 . 2011-08-31 02:55 -------- d-----w- c:\windows\PIF
2011-08-31 01:41 . 2011-08-31 01:41 -------- d-----w- c:\documents and settings\Steve\Local Settings\Application Data\Identities
2011-08-30 15:58 . 2011-08-30 15:59 -------- d-----w- c:\windows\system32\sdtmp
2011-08-30 15:57 . 2011-08-30 15:57 -------- d-----w- c:\documents and settings\All Users\Application Data\TEMP
2011-08-28 00:28 . 2011-08-28 00:28 -------- d-----w- c:\documents and settings\Steve\Application Data\Malwarebytes
2011-08-28 00:28 . 2011-07-07 02:52 41272 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2011-08-28 00:28 . 2011-08-28 00:28 -------- d-----w- c:\documents and settings\All Users\Application Data\Malwarebytes
2011-08-28 00:28 . 2011-08-31 04:11 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
2011-08-28 00:28 . 2011-07-07 02:52 21048 ----a-w- c:\windows\system32\drivers\mbam.sys
2011-08-28 00:11 . 2011-08-28 00:14 -------- d-----w- c:\documents and settings\Guest
.
.
.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2008-08-17 00:42 . 2008-08-17 00:42 13112 ----a-w- c:\program files\mozilla firefox\plugins\cgpcfg.dll
2008-08-17 00:42 . 2008-08-17 00:42 70456 ----a-w- c:\program files\mozilla firefox\plugins\CgpCore.dll
2008-08-17 00:42 . 2008-08-17 00:42 91448 ----a-w- c:\program files\mozilla firefox\plugins\confmgr.dll
2008-08-17 00:42 . 2008-08-17 00:42 20800 ----a-w- c:\program files\mozilla firefox\plugins\ctxlogging.dll
2008-08-17 00:43 . 2008-08-17 00:43 206136 ----a-w- c:\program files\mozilla firefox\plugins\ctxmui.dll
2008-08-17 00:42 . 2008-08-17 00:42 31032 ----a-w- c:\program files\mozilla firefox\plugins\icafile.dll
2008-08-17 00:42 . 2008-08-17 00:42 40248 ----a-w- c:\program files\mozilla firefox\plugins\icalogon.dll
2007-06-22 01:39 . 2007-06-22 01:39 34376 ----a-w- c:\program files\mozilla firefox\plugins\logging.dll
2008-05-21 15:41 . 2008-05-21 15:41 479232 ----a-w- c:\program files\mozilla firefox\plugins\msvcm80.dll
2008-05-21 15:41 . 2008-05-21 15:41 548864 ----a-w- c:\program files\mozilla firefox\plugins\msvcp80.dll
2008-05-21 15:41 . 2008-05-21 15:41 626688 ----a-w- c:\program files\mozilla firefox\plugins\msvcr80.dll
2008-06-05 20:58 . 2008-06-05 20:58 648504 ----a-w- c:\program files\mozilla firefox\plugins\sslsdk_b.dll
2008-08-17 00:42 . 2008-08-17 00:42 23864 ----a-w- c:\program files\mozilla firefox\plugins\TcpPServ.dll
.
.
((((((((((((((((((((((((((((( SnapShot@2011-09-11_01.21.30 )))))))))))))))))))))))))))))))))))))))))
.
+ 2011-09-12 01:50 . 2011-09-12 01:50 16384 c:\windows\temp\Perflib_Perfdata_c0.dat
- 2003-03-31 12:00 . 2011-09-03 19:10 59842 c:\windows\system32\perfc009.dat
+ 2003-03-31 12:00 . 2011-09-11 01:40 59842 c:\windows\system32\perfc009.dat
+ 2011-09-08 14:55 . 2011-09-11 04:29 32768 c:\windows\system32\config\systemprofile\UserData\index.dat
- 2011-09-08 14:55 . 2011-09-10 15:12 32768 c:\windows\system32\config\systemprofile\UserData\index.dat
+ 2011-09-11 17:36 . 2011-09-12 01:50 32768 c:\windows\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\index.dat
- 2011-09-10 22:01 . 2011-09-11 01:02 32768 c:\windows\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\index.dat
+ 2011-09-10 15:11 . 2011-09-11 04:28 65536 c:\windows\system32\config\systemprofile\Local Settings\History\History.IE5\MSHist012011091020110911\index.dat
- 2011-09-10 15:11 . 2011-09-10 15:25 65536 c:\windows\system32\config\systemprofile\Local Settings\History\History.IE5\MSHist012011091020110911\index.dat
+ 2010-09-21 03:59 . 2011-09-12 01:50 16384 c:\windows\system32\config\systemprofile\Local Settings\History\History.IE5\index.dat
- 2010-09-21 03:59 . 2011-09-11 01:02 16384 c:\windows\system32\config\systemprofile\Local Settings\History\History.IE5\index.dat
+ 2003-03-31 12:00 . 2011-09-11 01:40 395768 c:\windows\system32\perfh009.dat
- 2003-03-31 12:00 . 2011-09-03 19:10 395768 c:\windows\system32\perfh009.dat
+ 2010-09-21 03:59 . 2011-09-12 01:50 163840 c:\windows\system32\config\systemprofile\Cookies\index.dat
.
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4
.
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"Advanced SystemCare 3"="c:\program files\IObit\Advanced SystemCare 3\AWC.exe" [2010-05-17 2345680]
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"Apoint"="c:\program files\Apoint2K\Apoint.exe" [2003-10-08 159744]
"SoundMAXPnP"="c:\program files\Analog Devices\SoundMAX\SMax4PNP.exe" [2004-06-30 1388544]
"AGRSMMSG"="AGRSMMSG.exe" [2005-04-19 88209]
"ATIPTA"="c:\program files\ATI Technologies\ATI Control Panel\atiptaxx.exe" [2004-05-16 335872]
"Adobe Reader Speed Launcher"="c:\program files\Adobe\Reader 9.0\Reader\Reader_sl.exe" [2010-06-20 35760]
"Adobe ARM"="c:\program files\Common Files\Adobe\ARM\1.0\AdobeARM.exe" [2010-09-21 932288]
"F-PROT Antivirus Tray application"="c:\program files\FRISK Software\F-PROT Antivirus for Windows\FProtTray.exe" [2010-11-03 1674016]
"SunJavaUpdateSched"="c:\program files\Common Files\Java\Java Update\jusched.exe" [2011-04-08 254696]
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\FPAVServer]
@="Service"
.
R0 atiide;atiide;c:\windows\system32\drivers\atiide.sys [9/20/2010 10:14 PM 5632]
R0 FPAV_RTP;FPAV_RTP;c:\windows\system32\drivers\FStopW.sys [8/30/2011 8:37 PM 700632]
R2 Application Updater;Application Updater;c:\program files\Application Updater\ApplicationUpdater.exe [8/17/2011 1:00 PM 402328]
R2 FPAVServer;F-PROT Antivirus for Windows system;c:\program files\FRISK Software\F-PROT Antivirus for Windows\FPAVServer.exe [11/3/2010 4:40 PM 83624]
R2 IS360service;IS360service;c:\program files\IObit\IObit Security 360\is360srv.exe [1/17/2011 12:44 PM 312152]
.
.
------- Supplementary Scan -------
.
uStart Page = hxxp://www.google.com/
uInternet Connection Wizard,ShellNext = iexplore
IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~2\OFFICE11\EXCEL.EXE/3000
IE: {{c95fe080-8f5d-11d2-a20b-00aa003c157a} - %SystemRoot%\web\related.htm
TCP: DhcpNameServer = 192.168.1.254 199.185.220.254
FF - ProfilePath - c:\documents and settings\Steve\Application Data\Mozilla\Firefox\Profiles\d7r8xwl3.default\
FF - prefs.js: browser.search.selectedEngine - Yahoo
FF - prefs.js: browser.startup.homepage - hxxp://www.google.com/
FF - prefs.js: keyword.URL - hxxp://search.yahoo.com/search?fr=greentree_ff1&ei=utf-8&type=642886&p=
FF - prefs.js: network.proxy.type - 0
FF - Ext: Default: {972ce4c6-7e08-4474-a285-3208198ce6fd} - c:\program files\Mozilla Firefox\extensions\{972ce4c6-7e08-4474-a285-3208198ce6fd}
FF - Ext: Java Console: {CAFEEFAC-0016-0000-0022-ABCDEFFEDCBA} - c:\program files\Mozilla Firefox\extensions\{CAFEEFAC-0016-0000-0022-ABCDEFFEDCBA}
FF - Ext: Java Console: {CAFEEFAC-0016-0000-0026-ABCDEFFEDCBA} - c:\program files\Mozilla Firefox\extensions\{CAFEEFAC-0016-0000-0026-ABCDEFFEDCBA}
FF - Ext: Java Quick Starter: jqs@sun.com - c:\program files\Java\jre6\lib\deploy\jqs\ff
FF - user.js: browser.cache.memory.capacity - 16000
FF - user.js: browser.chrome.favicons - false
FF - user.js: browser.display.show_image_placeholders - true
FF - user.js: browser.turbo.enabled - true
FF - user.js: browser.urlbar.autocomplete.enabled - true
FF - user.js: browser.urlbar.autofill - true
FF - user.js: content.max.tokenizing.time - 3000000
FF - user.js: content.maxtextrun - 4095
FF - user.js: content.notify.backoffcount - 5
FF - user.js: content.notify.interval - 1000000
FF - user.js: content.notify.ontimer - true
FF - user.js: content.switch.threshold - 1000000
FF - user.js: dom.disable_window_status_change - true
FF - user.js: network.http.max-connections - 48
FF - user.js: network.http.max-connections-per-server - 16
FF - user.js: network.http.max-persistent-connections-per-proxy - 16
FF - user.js: network.http.max-persistent-connections-per-server - 8
FF - user.js: network.http.pipelining - true
FF - user.js: network.http.pipelining.firstrequest - true
FF - user.js: network.http.pipelining.maxrequests - 8
FF - user.js: network.http.proxy.pipelining - true
FF - user.js: network.http.request.max-start-delay - 0
FF - user.js: nglayout.initialpaint.delay - 1000
FF - user.js: plugin.expose_full_path - true
FF - user.js: ui.submenuDelay - 0
.
.
**************************************************************************
.
catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2011-09-11 20:08
Windows 5.1.2600 Service Pack 1 NTFS
.
scanning hidden processes ...
.
scanning hidden autostart entries ...
.
scanning hidden files ...
.
scan completed successfully
hidden files: 0
.
**************************************************************************
.
--------------------- LOCKED REGISTRY KEYS ---------------------
.
[HKEY_LOCAL_MACHINE\software\Microsoft\Windows\CurrentVersion\Reinstall\:õwjY*]
"DisplayName"="???\16?\11\09"
"DeviceDesc"="???\16?\11\09"
"ProviderName"="???\11?#@\11??"
"MFG"="???????"
"ReinstallString"=".10.1000.3"
"DeviceInstanceIds"=multi:"c:\\docume~1\\steve\\locals~1\\temp\\pft169.tmp\\sbdrv\\smbus\\smbusati.inf\00"
.
--------------------- DLLs Loaded Under Running Processes ---------------------
.
- - - - - - - > 'winlogon.exe'(552)
c:\windows\System32\ODBC32.dll
c:\windows\system32\Ati2evxx.dll
.
- - - - - - - > 'lsass.exe'(608)
c:\windows\System32\dssenh.dll
.
Completion time: 2011-09-11 20:10:04
ComboFix-quarantined-files.txt 2011-09-12 03:10
ComboFix2.txt 2011-09-12 01:40
ComboFix3.txt 2011-09-11 01:25
.
Pre-Run: 24,410,021,888 bytes free
Post-Run: 24,405,041,152 bytes free
.
- - End Of File - - 686EAE23003A29CA38B71C683800A694

#12 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:10:53 AM

Posted 11 September 2011 - 10:30 PM

These logs are looking alot better. But we still have some work to do.

Please print out these instructions, or copy them to a Notepad file. It will make it easier for you to follow the instructions and complete all of the necessary steps..

uninstall some programs

1. click on start
2. then go to settings
3. after that you need control panel
4. look for the icon add/remove programs
click on the following programs

Adobe Reader 9.3.4

and click on remove

Update Adobe Reader

Recently there have been vunerabilities detected in older versions of Adobe Reader. It is strongly suggested that you update to the current version.

You can download it from http://www.adobe.com/products/acrobat/readstep2.html
After installing the latest Adobe Reader, uninstall all previous versions.
If you already have Adobe Photoshop® Album Starter Edition installed or do not wish to have it installed UNcheck the box which says Also Download Adobe Photoshop® Album Starter Edition.

If you don't like Adobe Reader (53 MB), you can download Foxit PDF Reader(7 MB) from here. It's a much smaller file to download and uses a lot less resources than Adobe Reader.

Note: When installing FoxitReader, be carefull not to install anything to do with AskBar.
[/list]
Your Java is out of date.

It can be updated by the Java control panel
  • click on Start-> Control Panel (Classic View)-> Java (looks like a coffee cup) -> Update Tab -> Update Now.
  • An update should begin;
  • follow the prompts

Clear your Java Cache

  • click on Start-> Control Panel (Classic View)-> Java (looks like a coffee cup)
    • On the General tab, under Temporary Internet Files, click the Settings button.
    • Next, click on the Delete Files button
    • There are two options in the window to clear the cache - Leave BOTH Checked
      Applications and Applets
      Trace and Log Files
  • Click OK on Delete Temporary Files Window
    Note: This deletes ALL the Downloaded Applications and Applets from the CACHE.
  • Click OK to leave the Temporary Files Window
  • Click OK to leave the Java Control Panel.

TFC(Temp File Cleaner):

  • Please download TFC to your desktop,
  • Save any unsaved work. TFC will close all open application windows.
  • Double-click TFC.exe to run the program.
  • If prompted, click "Yes" to reboot.
Note: Save your work. TFC will automatically close any open programs, let it run uninterrupted. It shouldn't take longer take a couple of minutes, and may only take a few seconds. Only if needed will you be prompted to reboot.

: Malwarebytes' Anti-Malware :

  • I would like you to rerun MBAM
  • Double-click mbam icon
  • go to the update tab at the top
  • click on check for updates
  • If an update is found, it will download and install the latest version.
  • Once the program has loaded, select Perform quick scan, then click Scan.
  • When the scan is complete, click OK, then Show Results to view the results.
  • Be sure that everything is Checked (ticked) except items in the C:\System Volume Information folder and click on Remove Selected.
  • When completed, a log will open in Notepad. please copy and paste the log into your next reply
  • If you accidently close it, the log file is saved here and will be named like this:
  • C:\Documents and Settings\Username\Application Data\Malwarebytes\Malwarebytes' Anti-Malware\Logs\mbam-log-date (time).txt

Note: If MBAM encounters a file that is difficult to remove, you will be presented with 1 of 2 prompts.
Click OK to either and let MBAM proceed with the disinfection process.
If asked to restart the computer, please do so immediately. Failure to reboot will prevent MBAM from removing all the malware.


Download HijackThis

  • Go Here to download HijackThis Installer
  • Save HijackThis Installer to your desktop.
  • Double-click on the HijackThis Installer icon on your desktop. (Vista and Win 7 right click and run as admin)
  • By default it will install to C:\Program Files\Trend Micro\HijackThis .
  • Click on Install.
  • It will create a HijackThis icon on the desktop.
  • Once installed it will launch Hijackthis.
  • Click on the Do a system scan and save a logfile button. It will scan and the log should open in notepad.
  • Click on Edit > Select All then click on Edit > Copy to copy the entire contents of the log.
  • Come back here to this thread and Paste the log in your next reply.
  • DO NOT use the AnalyseThis button its findings are dangerous if misinterpreted.
  • DO NOT have Hijackthis fix anything yet. Most of what it finds will be harmless or even required.

If you have problems running Hijackthis.

sometimes we have to run it like this To run HijackThis as an administrator,
rightclick HijackThis.exe (located: C:\Program Files\Trend Micro\HiJackThis\HiJackThis.exe)
and select to run as administrator

"information and logs"

  • In your next post I need the following

  • Log From MBAM
  • report from Hijackthis
  • let me know of any problems you may have had
  • How is the computer doing now?

Gringo

I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#13 estevan514

estevan514
  • Topic Starter

  • Members
  • 13 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Beautiful British Columbia
  • Local time:06:53 AM

Posted 12 September 2011 - 12:09 AM

One question. On these last serious of downloads and scans, I had my F-Prot AV on. Should this have been disabled, or does it make a difference?


Here are the requested logs:

Malwarebytes' Anti-Malware 1.51.1.1800
www.malwarebytes.org

Database version: 7697

Windows 5.1.2600 Service Pack 1
Internet Explorer 6.0.2800.1106

9/11/2011 9:53:50 PM
mbam-log-2011-09-11 (21-53-50).txt

Scan type: Quick scan
Objects scanned: 162645
Time elapsed: 6 minute(s), 0 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 1
Registry Keys Infected: 0
Registry Values Infected: 1
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 1

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
c:\program files\common files\Spigot\wtxpcom\components\widgitoolbarff.dll (Adware.WidgiToolbar) -> Delete on reboot.

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs\C:\PROGRAM FILES\COMMON FILES\SPIGOT\WTXPCOM\COMPONENTS\WIDGITOOLBARFF.DLL (Adware.WidgiToolbar) -> Value: WIDGITOOLBARFF.DLL -> Quarantined and deleted successfully.

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
c:\program files\common files\Spigot\wtxpcom\components\widgitoolbarff.dll (Adware.WidgiToolbar) -> Delete on reboot.



Logfile of Trend Micro HijackThis v2.0.4
Scan saved at 10:03:40 PM, on 9/11/2011
Platform: Windows XP SP1 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP1 (6.00.2800.1106)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\csrss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\System32\Ati2evxx.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\Apoint2K\Apoint.exe
C:\Program Files\Analog Devices\SoundMAX\SMax4PNP.exe
C:\WINDOWS\AGRSMMSG.exe
C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe
C:\Program Files\FRISK Software\F-PROT Antivirus for Windows\FProtTray.exe
C:\Program Files\Common Files\Java\Java Update\jusched.exe
C:\Program Files\Apoint2K\Apntex.exe
C:\Program Files\IObit\Advanced SystemCare 3\AWC.exe
C:\WINDOWS\System32\alg.exe
C:\Program Files\Application Updater\ApplicationUpdater.exe
C:\Program Files\FRISK Software\F-PROT Antivirus for Windows\FPAVServer.exe
C:\Program Files\IObit\IObit Security 360\IS360srv.exe
C:\Program Files\Java\jre6\bin\jqs.exe
C:\Program Files\Analog Devices\SoundMAX\SMAgent.exe
C:\Program Files\Microsoft Office\OFFICE11\OUTLOOK.EXE
C:\Program Files\Microsoft Office\OFFICE11\WINWORD.EXE
C:\Program Files\Mozilla Firefox\firefox.exe
C:\Program Files\Mozilla Firefox\plugin-container.exe
C:\WINDOWS\system32\msiexec.exe
C:\Program Files\Trend Micro\HiJackThis\HiJackThis.exe
C:\WINDOWS\System32\wbem\wmiprvse.exe

R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
O2 - BHO: Java™ Plug-In 2 SSV Helper - {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Program Files\Java\jre6\bin\jp2ssv.dll
O2 - BHO: JQSIEStartDetectorImpl - {E7E6F031-17CE-4C07-BC86-EABFE594F69C} - C:\Program Files\Java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll
O3 - Toolbar: &Radio - {8E718888-423F-11D2-876E-00A0C9082467} - C:\WINDOWS\System32\msdxm.ocx
O4 - HKLM\..\Run: [Apoint] C:\Program Files\Apoint2K\Apoint.exe
O4 - HKLM\..\Run: [SoundMAXPnP] C:\Program Files\Analog Devices\SoundMAX\SMax4PNP.exe
O4 - HKLM\..\Run: [AGRSMMSG] AGRSMMSG.exe
O4 - HKLM\..\Run: [ATIPTA] C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe
O4 - HKLM\..\Run: [F-PROT Antivirus Tray application] C:\Program Files\FRISK Software\F-PROT Antivirus for Windows\FProtTray.exe
O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Common Files\Java\Java Update\jusched.exe"
O4 - HKCU\..\Run: [Advanced SystemCare 3] "C:\Program Files\IObit\Advanced SystemCare 3\AWC.exe" /startup
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\OFFICE11\EXCEL.EXE/3000
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\OFFICE11\REFIEBAR.DLL
O9 - Extra button: Related - {c95fe080-8f5d-11d2-a20b-00aa003c157a} - C:\WINDOWS\web\related.htm
O9 - Extra 'Tools' menuitem: Show &Related Links - {c95fe080-8f5d-11d2-a20b-00aa003c157a} - C:\WINDOWS\web\related.htm
O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} (WUWebControl Class) - http://update.microsoft.com/windowsupdate/v6/V5Controls/en/x86/client/wuweb_site.cab?1285048016265
O16 - DPF: {E2883E8F-472F-4FB0-9522-AC9BF37916A7} - http://platformdl.adobe.com/NOS/getPlusPlus/1.6/gp.cab
O22 - SharedTaskScheduler: Browseui preloader - {438755C2-A8BA-11D1-B96B-00A0C90312E1} - C:\WINDOWS\System32\browseui.dll
O22 - SharedTaskScheduler: Component Categories cache daemon - {8C7461EF-2B13-11d2-BE35-3078302C2030} - C:\WINDOWS\System32\browseui.dll
O23 - Service: Application Updater - Spigot, Inc. - C:\Program Files\Application Updater\ApplicationUpdater.exe
O23 - Service: Ati HotKey Poller - Unknown owner - C:\WINDOWS\System32\Ati2evxx.exe
O23 - Service: F-PROT Antivirus for Windows system (FPAVServer) - FRISK Software International - C:\Program Files\FRISK Software\F-PROT Antivirus for Windows\FPAVServer.exe
O23 - Service: IS360service - IObit - C:\Program Files\IObit\IObit Security 360\IS360srv.exe
O23 - Service: Java Quick Starter (JavaQuickStarterService) - Sun Microsystems, Inc. - C:\Program Files\Java\jre6\bin\jqs.exe
O23 - Service: SoundMAX Agent Service (SoundMAX Agent Service (default)) - Analog Devices, Inc. - C:\Program Files\Analog Devices\SoundMAX\SMAgent.exe

--
End of file - 4837 bytes

#14 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:10:53 AM

Posted 12 September 2011 - 12:33 AM

Greetings

These logs are looking very good, we are almost done!!! Just one more scan to go.

:Remove unneeded startup entries:

This part of the fix is purely optional
These are programs that start up when you turn on your computer but don't need to be, any of these programs you can click on their icons (or start from the control panel) and start the program when you need it. By stopping these programs you will boot up faster and your computer will work faster.

  • Run HijackThis
  • Click on the Scan button
  • Put a check beside all of the items listed below (if present):

    • O4 - HKLM\..\Run: [SoundMAXPnP] C:\Program Files\Analog Devices\SoundMAX\SMax4PNP.exe
      O4 - HKLM\..\Run: [ATIPTA] C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe
      O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Common Files\Java\Java Update\jusched.exe"
      O4 - HKCU\..\Run: [Advanced SystemCare 3] "C:\Program Files\IObit\Advanced SystemCare 3\AWC.exe" /startup
  • Close all open windows and browsers/email, etc...
  • Click on the "Fix Checked" button
  • When completed, close the application.

    NOTE**You can research each of those lines >here< and see if you want to keep them or not
    just copy the name between the brakets and paste into the search space
    O4 - HKLM\..\Run: [IntelliPoint]



If you have any problems running Hijackthis.

sometimes we have to run it like this To run HijackThis as an administrator,
rightclick HijackThis.exe (located: C:\Program Files\Trend Micro\HiJackThis\HiJackThis.exe)
and select to run as administrator


Eset Online Scanner

**Note** You will need to use Internet explorer for this scan - Vista and win 7 right click on IE shortcut and run as admin

Go Eset web page to run an online scannner from ESET.

  • Turn off the real time scanner of any existing antivirus program while performing the online scan
  • click on the ESET Online Scanner button
  • Tick the box next to YES, I accept the Terms of Use.
    • Click Start
  • When asked, allow the activex control to install
    • Click Start
  • Make sure that the option Remove found threats is unticked and the Scan Archives option is ticked.
  • Click on Advanced Settings, ensure the options
    Scan for potentially unwanted applications, Scan for potentially unsafe applications, and Enable Anti-Stealth Technology are ticked.
  • Click Scan
  • Wait for the scan to finish
  • Click on copy to clipboard and paste the results here in this topic
  • you may also find here C:\Program Files\Eset\Eset Online Scanner\log.txt
Copy and paste that log as a reply to this topic

Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#15 estevan514

estevan514
  • Topic Starter

  • Members
  • 13 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Beautiful British Columbia
  • Local time:06:53 AM

Posted 12 September 2011 - 10:23 AM

Gringo


C:\Documents and Settings\Steve\My Documents\Computer\Downloads\InternationalPrimoPDF.exe Win32/OpenCandy application
C:\Program Files\Application Updater\ApplicationUpdater.exe probably a variant of Win32/Adware.Toolbar.Dealio application
C:\Program Files\Common Files\Spigot\wtxpcom\components\WidgiToolbarFF.dll.5 a variant of Win32/Adware.Toolbar.Dealio application
C:\Program Files\Common Files\Spigot\wtxpcom\components\WidgiToolbarFF.dll.6 a variant of Win32/Adware.Toolbar.Dealio application
C:\Program Files\IObit Toolbar\IE\4.6\iobitToolbarIE.dll a variant of Win32/Adware.Toolbar.Dealio application
C:\Qoobox\Quarantine\C\Documents and Settings\All Users\Application Data\06U4R.exe.vir a variant of Win32/Kryptik.QGA trojan
C:\Qoobox\Quarantine\C\Documents and Settings\Steve\06U4R.com.vir a variant of Win32/Kryptik.QGA trojan
C:\Qoobox\Quarantine\C\Documents and Settings\Steve\Local Settings\Application Data\06U4R.exe.vir a variant of Win32/Kryptik.QGA trojan
C:\Qoobox\Quarantine\C\Program Files\Adobe\Reader 9.0\Reader\Reader_sl.exe.vir a variant of Win32/Injector.JCF trojan
C:\Qoobox\Quarantine\C\Program Files\Analog Devices\SoundMAX\SMax4PNP.exe.vir a variant of Win32/Injector.JCF trojan
C:\Qoobox\Quarantine\C\Program Files\Apoint2K\Apoint.exe.vir a variant of Win32/Injector.JCF trojan
C:\Qoobox\Quarantine\C\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe.vir a variant of Win32/Injector.JCF trojan
C:\Qoobox\Quarantine\C\Program Files\Common Files\Adobe\ARM\1.0\AdobeARM.exe.vir a variant of Win32/Injector.JCF trojan
C:\Qoobox\Quarantine\C\Program Files\Common Files\Java\Java Update\jusched.exe.vir a variant of Win32/Injector.JCF trojan
C:\Qoobox\Quarantine\C\Program Files\Common Files\Spigot\Search Settings\SearchSettings.exe.vir a variant of Win32/Adware.Toolbar.Dealio application
C:\Qoobox\Quarantine\C\Program Files\FRISK Software\F-PROT Antivirus for Windows\FProtTray.exe.vir a variant of Win32/Injector.JCF trojan
C:\Qoobox\Quarantine\C\Program Files\IObit\Advanced SystemCare 3\AWC.exe.vir a variant of Win32/Injector.JCF trojan
C:\Qoobox\Quarantine\C\WINDOWS\Fonts\06U4R.com.vir a variant of Win32/Kryptik.QGA trojan
C:\System Volume Information\_restore{65651D86-7771-4A1A-B66A-3FA34B8CCF33}\RP36\A0020534.exe a variant of Win32/Kryptik.IXE trojan
C:\System Volume Information\_restore{65651D86-7771-4A1A-B66A-3FA34B8CCF33}\RP36\A0020579.exe a variant of Win32/Kryptik.IXE trojan
C:\System Volume Information\_restore{DF47D482-77AC-44EB-AECD-C92B85054B57}\RP295\A0017741.com a variant of Win32/Kryptik.QGA trojan
C:\System Volume Information\_restore{DF47D482-77AC-44EB-AECD-C92B85054B57}\RP295\A0019766.exe a variant of Win32/Kryptik.QGA trojan
C:\System Volume Information\_restore{DF47D482-77AC-44EB-AECD-C92B85054B57}\RP295\A0019767.com a variant of Win32/Kryptik.QGA trojan
C:\System Volume Information\_restore{DF47D482-77AC-44EB-AECD-C92B85054B57}\RP295\A0019768.exe a variant of Win32/Kryptik.QGA trojan
C:\System Volume Information\_restore{DF47D482-77AC-44EB-AECD-C92B85054B57}\RP295\A0019769.exe a variant of Win32/Injector.JCF trojan
C:\System Volume Information\_restore{DF47D482-77AC-44EB-AECD-C92B85054B57}\RP295\A0019770.exe a variant of Win32/Injector.JCF trojan
C:\System Volume Information\_restore{DF47D482-77AC-44EB-AECD-C92B85054B57}\RP295\A0019771.exe a variant of Win32/Injector.JCF trojan
C:\System Volume Information\_restore{DF47D482-77AC-44EB-AECD-C92B85054B57}\RP295\A0019772.exe a variant of Win32/Injector.JCF trojan
C:\System Volume Information\_restore{DF47D482-77AC-44EB-AECD-C92B85054B57}\RP295\A0019773.exe a variant of Win32/Injector.JCF trojan
C:\System Volume Information\_restore{DF47D482-77AC-44EB-AECD-C92B85054B57}\RP295\A0019774.exe a variant of Win32/Injector.JCF trojan
C:\System Volume Information\_restore{DF47D482-77AC-44EB-AECD-C92B85054B57}\RP295\A0019775.exe a variant of Win32/Injector.JCF trojan
C:\System Volume Information\_restore{DF47D482-77AC-44EB-AECD-C92B85054B57}\RP295\A0019776.exe a variant of Win32/Injector.JCF trojan
C:\System Volume Information\_restore{DF47D482-77AC-44EB-AECD-C92B85054B57}\RP295\A0019777.exe a variant of Win32/Injector.JCF trojan
C:\System Volume Information\_restore{DF47D482-77AC-44EB-AECD-C92B85054B57}\RP295\A0019779.com a variant of Win32/Kryptik.QGA trojan
C:\System Volume Information\_restore{DF47D482-77AC-44EB-AECD-C92B85054B57}\RP295\A0019844.com a variant of Win32/Kryptik.QGA trojan
C:\System Volume Information\_restore{DF47D482-77AC-44EB-AECD-C92B85054B57}\RP295\A0022881.exe a variant of Win32/Adware.Toolbar.Dealio application
C:\System Volume Information\_restore{DF47D482-77AC-44EB-AECD-C92B85054B57}\RP295\A0022882.com a variant of Win32/Kryptik.QGA trojan
C:\WINDOWS\Fonts\06U4R.com_ a variant of Win32/Kryptik.QGA trojan
Operating memory probably a variant of Win32/Adware.Toolbar.Dealio application




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users