Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Infected with rootkit


  • This topic is locked This topic is locked
17 replies to this topic

#1 KramerKelso

KramerKelso

  • Members
  • 17 posts
  • OFFLINE
  •  
  • Local time:08:48 AM

Posted 26 September 2011 - 09:12 PM

Hi,

My laptop got infected with rootkit virus. There is a background process with name 3498460175:4038818095.exe which is the infection I believe. I detected it when I was running Malware Antibytes, it gets crashed every time and its binary mbam.exe also gets corrupted. I tried running rkill.exe and Superantispyware following the discussion on this thread (http://www.bleepingcomputer.com/forums/topic420572.html). But it did not help. So I followed the steps 6-9 from http://www.bleepingcomputer.com/forums/topic34773.html and below posting DDS.txt. Also attaching Attach.txt and ark.txt.

Can somebody please help? It will save me from lot of trouble.

Thanks in advance,
Kramer

DDS.txt:


.
DDS (Ver_2011-08-26.01) - NTFSx86
Internet Explorer: 7.0.5730.13 BrowserJavaVersion: 1.6.0_15
Run by savallu at 19:00:36 on 2011-09-26
Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.3510.2695 [GMT -7:00]
.
AV: VirusScan Enterprise + AntiSpyware Enterprise *Disabled/Updated* {918A2B0B-2C60-4016-A4AB-E868DEABF7F0}
FW: McAfee Host Intrusion Prevention Firewall *Enabled*
.
============== Running Processes ===============
.
C:\WINDOWS\system32\svchost -k DcomLaunch
svchost.exe
C:\WINDOWS\System32\svchost.exe -k netsvcs
svchost.exe
svchost.exe
C:\Program Files\Cisco\Cisco AnyConnect VPN Client\vpnagent.exe
C:\WINDOWS\3498460175:4038818095.exe
C:\WINDOWS\system32\spoolsv.exe
c:\drivers\audio\r255264\wdm\stacsv.exe
svchost.exe
C:\Program Files\SUPERAntiSpyware\SASCORE.EXE
C:\Program Files\Cisco Systems\VPN Client\cvpnd.exe
C:\Program Files\McAfee\Host Intrusion Prevention\FireSvc.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\McAfee\Host Intrusion Prevention\HIPSCore\HIPSvc.exe
C:\Program Files\McAfee\VirusScan Enterprise\engineserver.exe
C:\Program Files\McAfee\Common Framework\FrameworkService.exe
C:\Program Files\McAfee\VirusScan Enterprise\vstskmgr.exe
C:\Program Files\McAfee\Host Intrusion Prevention\FireTray.exe
C:\WINDOWS\system32\mfevtps.exe
C:\Program Files\McAfee\VirusScan Enterprise\SHSTAT.EXE
C:\Program Files\DellTPad\Apoint.exe
C:\WINDOWS\system32\AESTFltr.exe
C:\WINDOWS\orclobi\MyDesktop\MyDesktopService.exe
C:\Program Files\IDT\WDM\sttray.exe
C:\WINDOWS\system32\igfxtray.exe
C:\Program Files\CDBurnerXP\NMSAccessU.exe
C:\WINDOWS\system32\hkcmd.exe
C:\WINDOWS\system32\igfxpers.exe
C:\Program Files\Oracle\ODrive\XfsSvcCon.exe
C:\Program Files\McAfee\Common Framework\udaterui.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\RocketDock\RocketDock.exe
C:\Program Files\McAfee\Common Framework\McTray.exe
C:\Program Files\WIDCOMM\Bluetooth Software\BTTray.exe
C:\WINDOWS\orclobi\MyDesktop\MyDesktopQOS.exe
C:\Program Files\Microsoft SQL Server\90\Shared\sqlwriter.exe
C:\WINDOWS\system32\svchost.exe -k imgsvc
C:\Program Files\Rainmeter\Rainmeter.exe
C:\PROGRA~1\WIDCOMM\BLUETO~1\BTSTAC~1.EXE
C:\WINDOWS\system32\wuauclt.exe
C:\Program Files\WIDCOMM\Bluetooth Software\bin\btwdins.exe
C:\Program Files\DellTPad\ApMsgFwd.exe
C:\Program Files\DellTPad\HidFind.exe
C:\Program Files\DellTPad\Apntex.exe
C:\Program Files\SRWare Iron\iron.exe
C:\Program Files\SRWare Iron\iron.exe
C:\Program Files\SRWare Iron\iron.exe
C:\Program Files\SRWare Iron\iron.exe
C:\Program Files\SRWare Iron\iron.exe
C:\Program Files\SRWare Iron\iron.exe
C:\Program Files\McAfee\Common Framework\McScript_InUse.exe
C:\WINDOWS\system32\igfxsrvc.exe
.
============== Pseudo HJT Report ===============
.
uStart Page = hxxp://search.conduit.com?SearchSource=10&ctid=CT2645238
uSearch Page =
uSearch Bar =
mDefault_Page_URL = hxxp://my.oracle.com/
mStart Page = hxxp://my.oracle.com/
uInternet Settings,ProxyOverride = *.local
mSearchAssistant =
uURLSearchHooks: H - No File
uURLSearchHooks: H - No File
BHO: {02478D38-C3F9-4efb-9B51-7695ECA05670} - No File
BHO: Adobe PDF Link Helper: {18df081c-e8ad-4283-a596-fa578c2ebdc3} - c:\program files\common files\adobe\acrobat\activex\AcroIEHelperShim.dll
BHO: RealPlayer Download and Record Plugin for Internet Explorer: {3049c3e9-b461-4bc5-8870-4c09146192ca} - c:\documents and settings\all users\application data\real\realplayer\browserrecordplugin\ie\rpbrowserrecordplugin.dll
BHO: Spybot-S&D IE Protection: {53707962-6f74-2d53-2644-206d7942484f} - c:\progra~1\spybot~1\SDHelper.dll
BHO: ODriveAdvPropHelper Class: {5d33b3e0-4fb3-4ed1-9106-b6eb06a3b7c2} - c:\windows\system32\ODriveHelper.DLL
BHO: McAfee SiteAdvisor BHO: {b164e929-a1b6-4a06-b104-2cd0e90a88ff} - c:\program files\mcafee\siteadvisor enterprise\McIEPlg.dll
BHO: Java™ Plug-In 2 SSV Helper: {dbc80044-a445-435b-bc74-9c25c1c588a9} - c:\program files\java\jre6\bin\jp2ssv.dll
BHO: JQSIEStartDetectorImpl Class: {e7e6f031-17ce-4c07-bc86-eabfe594f69c} - c:\program files\java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll
TB: McAfee SiteAdvisor Toolbar: {0ebbbe48-bad4-4b4c-8e5a-516abecae064} - c:\program files\mcafee\siteadvisor enterprise\McIEPlg.dll
uRun: [ctfmon.exe] c:\windows\system32\ctfmon.exe
uRun: [SpybotSD TeaTimer] c:\program files\spybot - search & destroy\TeaTimer.exe
uRun: [RocketDock] "c:\program files\rocketdock\RocketDock.exe"
uRun: [SUPERAntiSpyware] c:\program files\superantispyware\SUPERAntiSpyware.exe
mRun: [IMJPMIG8.1] "c:\windows\ime\imjp8_1\IMJPMIG.EXE" /Spoil /RemAdvDef /Migration32
mRun: [PHIME2002ASync] c:\windows\system32\ime\tintlgnt\TINTSETP.EXE /SYNC
mRun: [PHIME2002A] c:\windows\system32\ime\tintlgnt\TINTSETP.EXE /IMEName
mRun: [ShStatEXE] "c:\program files\mcafee\virusscan enterprise\SHSTAT.EXE" /STANDALONE
mRun: [Apoint] c:\program files\delltpad\Apoint.exe
mRun: [MSPY2002] c:\windows\system32\ime\pintlgnt\ImScInst.exe /SYNC
mRun: [AESTFltr] %SystemRoot%\system32\AESTFltr.exe /NoDlg
mRun: [SysTrayApp] %ProgramFiles%\IDT\WDM\sttray.exe
mRun: [IgfxTray] c:\windows\system32\igfxtray.exe
mRun: [HotKeysCmds] c:\windows\system32\hkcmd.exe
mRun: [Persistence] c:\windows\system32\igfxpers.exe
mRun: [ntpgds] c:\windows\orclobi\synctime.exe
mRun: [McAfeeUpdaterUI] "c:\program files\mcafee\common framework\udaterui.exe" /StartedFromRunKey
mRun: [KernelFaultCheck] %systemroot%\system32\dumprep 0 -k
mRun: [McAfee Host Intrusion Prevention Tray] "c:\program files\mcafee\host intrusion prevention\FireTray.exe"
dRunOnce: [FirefoxConfig] c:\windows\orclobi\config\openofficeconfig.exe
dRunOnce: [ThunderbirdConfig] c:\windows\orclobi\config\thunderbirdconfig.exe
dRunOnce: [LightningConfig] c:\windows\orclobi\config\lightningconfig.exe
dRunOnce: [disable_hibernation] c:\windows\orclobi\temp\disable_hibernation.bat
StartupFolder: c:\docume~1\savall~1.st-\startm~1\programs\startup\rainme~1.lnk - c:\program files\rainmeter\Rainmeter.exe
StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\blueto~1.lnk - c:\program files\widcomm\bluetooth software\BTTray.exe
StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\multim~1.lnk - c:\program files\mmtaskbar\MultiMon.exe
StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\vpncli~1.lnk - c:\windows\installer\{51fb15f4-ad27-43bc-ad4b-dd0354fb6bbd}\Icon3E5562ED7.ico
uPolicies-explorer: ForceStartMenuLogoff = 1 (0x1)
mPolicies-system: hidefastuserswitching = 1 (0x1)
mPolicies-system: promptpasswordonresume = 1 (0x1)
mPolicies-system: LocalAccountTokenFilterPolicy = 1 (0x1)
IE: Add to Google Photos Screensa&ver - c:\windows\system32\GPhotos.scr/200
IE: E&xport to Microsoft Excel - c:\progra~1\micros~2\office12\EXCEL.EXE/3000
IE: Send to &Bluetooth Device... - c:\program files\widcomm\bluetooth software\btsendto_ie_ctx.htm
IE: Send To Bluetooth - c:\program files\widcomm\bluetooth software\btsendto_ie.htm
IE: {CCA281CA-C863-46ef-9331-5C8D4460577F} - c:\program files\widcomm\bluetooth software\btsendto_ie.htm
IE: {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe
IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe
IE: {92780B25-18CC-41C8-B9BE-3C9C571A8263} - {FF059E31-CC5A-4E2E-BF3B-96E929D65503} - c:\progra~1\micros~2\office12\REFIEBAR.DLL
IE: {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - {53707962-6F74-2D53-2644-206D7942484F} - c:\progra~1\spybot~1\SDHelper.dll
LSP: mswsock.dll
Trusted Zone: oraclecorp.com\global-service
Trusted Zone: oraclecorp.com\global-service
DPF: {3EA4FA88-E0BE-419A-A732-9B79B87A6ED0} - hxxp://dl.tvunetworks.com/TVUAx.cab
DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} - hxxp://update.microsoft.com/windowsupdate/v6/V5Controls/en/x86/client/wuweb_site.cab?1256749179093
DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_15-windows-i586.cab
DPF: {CAFEEFAC-0016-0000-0015-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_15-windows-i586.cab
DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_15-windows-i586.cab
DPF: {E06E2E99-0AA1-11D4-ABA6-0060082AA75C} - hxxps://ouweb.webex.com/client/T27LB/training/ieatgpc.cab
DPF: {E2883E8F-472F-4FB0-9522-AC9BF37916A7} - hxxp://platformdl.adobe.com/NOS/getPlusPlus/1.6/gp.cab
TCP: DhcpNameServer = 192.168.0.1
TCP: Interfaces\{2E211B7C-0A69-4D7B-A88A-DDA07FCE4FF7} : DhcpNameServer = 192.168.0.1
Handler: dssrequest - {5513F07E-936B-4E52-9B00-067394E91CC5} - c:\program files\mcafee\siteadvisor enterprise\McIEPlg.dll
Handler: sacore - {5513F07E-936B-4E52-9B00-067394E91CC5} - c:\program files\mcafee\siteadvisor enterprise\McIEPlg.dll
Notify: !SASWinLogon - c:\program files\superantispyware\SASWINLO.DLL
Notify: igfxcui - igfxdev.dll
SSODL: WPDShServiceObj - {AAA288BA-9A4C-45B0-95D7-94D524869DB5} - c:\windows\system32\WPDShServiceObj.dll
SEH: SABShellExecuteHook Class: {5ae067d3-9afb-48e0-853a-ebb7f4a000da} - c:\program files\superantispyware\SASSEH.DLL
LSA: Notification Packages = scecli gdspwfilter
Hosts: 127.0.0.1 www.spywareinfo.com
Hosts: 148.87.127.117 rmdc-twvpn-1.oraclevpn.com
.
================= FIREFOX ===================
.
FF - ProfilePath - c:\documents and settings\savallu.st-users\application data\mozilla\firefox\profiles\btr756ap.default\
FF - prefs.js: browser.search.defaulturl - hxxp://search.conduit.com/ResultsExt.aspx?ctid=CT1060933&SearchSource=3&q={searchTerms}
FF - prefs.js: browser.startup.homepage - hxxp://en-US.start3.mozilla.com/firefox?client=firefox-a&rls=org.mozilla:en-US:official
FF - prefs.js: keyword.URL - hxxp://search.conduit.com/ResultsExt.aspx?ctid=CT1060933&q=
FF - prefs.js: network.proxy.type - 2
FF - plugin: c:\documents and settings\all users\application data\real\realplayer\browserrecordplugin\mozillaplugins\nprphtml5videoshim.dll
FF - plugin: c:\documents and settings\savallu.st-users\application data\mozilla\plugins\npgoogletalk.dll
FF - plugin: c:\documents and settings\savallu.st-users\application data\mozilla\plugins\npgtpo3dautoplugin.dll
FF - plugin: c:\documents and settings\savallu.st-users\local settings\application data\google\update\1.2.183.39\npGoogleOneClick8.dll
FF - plugin: c:\program files\checkpoint\zaforcefield\trustchecker\bin\npFFApi.dll
FF - plugin: c:\program files\divx\divx plus web player\npdivx32.dll
FF - plugin: c:\program files\google\google earth\plugin\npgeplugin.dll
FF - plugin: c:\program files\google\picasa3\npPicasa3.dll
FF - plugin: c:\program files\google\update\1.2.183.39\npGoogleOneClick8.dll
FF - plugin: c:\program files\google\update\1.3.21.71\npGoogleUpdate3.dll
FF - plugin: c:\program files\microsoft silverlight\4.0.60310.0\npctrlui.dll
FF - plugin: c:\program files\mozilla firefox\plugins\npwachk.dll
FF - plugin: c:\windows\system32\tvuax\npTVUAx.dll
.
---- FIREFOX POLICIES ----
FF - user.js: yahoo.ytff.general.dontshowhpoffer - true
============= SERVICES / DRIVERS ===============
.
R0 mfehidk;McAfee Inc. mfehidk;c:\windows\system32\drivers\mfehidk.sys [2009-10-28 344712]
R0 stdflt;Disk Filter Driver for Accelerometer;c:\windows\system32\drivers\stdfltn.sys [2010-10-25 17072]
R1 SASDIFSV;SASDIFSV;c:\program files\superantispyware\sasdifsv.sys [2011-7-22 12880]
R1 SASKUTIL;SASKUTIL;c:\program files\superantispyware\SASKUTIL.SYS [2011-7-12 67664]
R2 !SASCORE;SAS Core Service;c:\program files\superantispyware\SASCore.exe [2011-8-11 116608]
R2 CoLinuxDriver;CoLinuxDriver;c:\program files\colinux\linux.sys [2010-9-1 83968]
R2 enterceptAgent;McAfee Host Intrusion Prevention Service;c:\program files\mcafee\host intrusion prevention\FireSvc.exe [2010-2-16 1498224]
R2 hips;McAfee HIPSCore Service;c:\program files\mcafee\host intrusion prevention\hipscore\HIPSvc.exe [2010-7-15 35696]
R2 McAfeeEngineService;McAfee Engine Service;c:\program files\mcafee\virusscan enterprise\engineserver.exe [2010-8-25 22816]
R2 McAfeeFramework;McAfee Framework Service;c:\program files\mcafee\common framework\FrameworkService.exe [2009-9-22 103744]
R2 McTaskManager;McAfee Task Manager;c:\program files\mcafee\virusscan enterprise\vstskmgr.exe [2010-8-25 66880]
R2 mfevtp;McAfee Validation Trust Protection Service;c:\windows\system32\mfevtps.exe [2009-10-28 69192]
R2 MyDesktopWindows;MyDesktopService;c:\windows\orclobi\mydesktop\MyDesktopService.exe [2011-2-18 1032192]
R2 OdService;ODrive Service;c:\program files\oracle\odrive\xfssvccon.exe svcmanager --> c:\program files\oracle\odrive\XfsSvcCon.exe svcmanager [?]
R2 PMEMNT;PMEMNT;c:\windows\pmemnt.sys [2010-10-25 7012]
R2 QOSMyDesktop;QOS MyDesktop;c:\windows\orclobi\mydesktop\MyDesktopQOS.exe [2009-10-13 472064]
R2 risdpcie;risdpcie;c:\windows\system32\drivers\risdpe86.sys [2010-10-25 47616]
R2 vpnagent;Cisco AnyConnect VPN Agent;c:\program files\cisco\cisco anyconnect vpn client\vpnagent.exe [2011-6-10 641464]
R3 Acceler;Accelerometer Service;c:\windows\system32\drivers\Accelern.sys [2010-10-25 42672]
R3 AESTAud;AE Audio Service;c:\windows\system32\drivers\AESTAud.sys [2010-10-25 113664]
R3 cvusbdrv;Dell ControlVault;c:\windows\system32\drivers\cvusbdrv.sys [2010-10-25 33832]
R3 e1kexpress;Intel® PRO/1000 PCI Express Network Connection Driver K;c:\windows\system32\drivers\e1k5132.sys [2010-10-25 167080]
R3 FirehkMP;FirehkMP;c:\windows\system32\drivers\firehk.sys [2009-10-28 44680]
R3 HIPK;McAfee Inc. HIPK;c:\windows\system32\drivers\HIPK.sys [2009-10-28 107896]
R3 HIPPSK;McAfee Inc. HIPPSK;c:\windows\system32\drivers\HIPPSK.sys [2009-10-28 38680]
R3 HIPQK;McAfee Inc. HIPQK;c:\windows\system32\drivers\HIPQK.sys [2009-10-28 35584]
R3 Impcd;Impcd;c:\windows\system32\drivers\Impcd.sys [2010-10-25 132480]
R3 IntcDAud;Intel® Display Audio;c:\windows\system32\drivers\IntcDAud.sys [2010-10-25 215040]
R3 tap0801;TAP-Win32 Adapter V8;c:\windows\system32\drivers\tap0801.sys [2006-10-1 26624]
R3 tap0801co;TAP-Win32 Adapter V8 (coLinux);c:\windows\system32\drivers\tap0801co.sys [2006-8-30 25856]
S2 gupdate;Google Update Service (gupdate);c:\program files\google\update\GoogleUpdate.exe [2010-11-2 136176]
S2 McAfee SiteAdvisor Enterprise Service;McAfee SiteAdvisor Enterprise Service;c:\program files\mcafee\siteadvisor enterprise\McSACore.exe [2010-3-25 226624]
S2 McShield;McAfee McShield;c:\program files\mcafee\virusscan enterprise\mcshield.exe [2010-8-25 147984]
S3 Cam3820;Cam3820 PC Camera Driver;c:\windows\system32\drivers\cam3820a.sys [2009-7-8 308096]
S3 Firehk;McAfee NDIS Intermediate Filter;c:\windows\system32\drivers\firehk.sys [2009-10-28 44680]
S3 gupdatem;Google Update Service (gupdatem);c:\program files\google\update\GoogleUpdate.exe [2010-11-2 136176]
S3 mfeavfk;McAfee Inc. mfeavfk;c:\windows\system32\drivers\mfeavfk.sys [2009-10-28 91896]
S3 mfebopk;McAfee Inc. mfebopk;c:\windows\system32\drivers\mfebopk.sys [2009-10-28 43192]
S3 mferkdet;McAfee Inc. mferkdet;c:\windows\system32\drivers\mferkdet.sys [2009-10-28 66536]
S4 BrlAPI;BrlAPI;c:\cygwin\bin\cygrunsrv.exe [2011-3-24 68096]
S4 buttonsvc32;Dell ControlPoint Button Service;c:\program files\dell\dell controlpoint\DCPButtonSvc.exe [2009-11-20 278304]
S4 dcpsysmgrsvc;Dell ControlPoint System Manager;c:\program files\dell\dell controlpoint\system manager\DCPSysMgrSvc.exe [2010-2-8 376688]
S4 InstallFilterService;FF Install Filter Service;c:\program files\stmicroelectronics\accelerometerp11\InstallFilterService.exe [2010-10-25 60928]
S4 MsDtsServer100;SQL Server Integration Services 10.0;c:\program files\microsoft sql server\100\dts\binn\MsDtsSrvr.exe [2011-3-3 214888]
S4 MSSQLFDLauncher;SQL Full-text Filter Daemon Launcher (MSSQLSERVER);c:\program files\microsoft sql server\mssql10.mssqlserver\mssql\binn\fdlauncher.exe [2008-7-10 31256]
S4 MSSQLServerADHelper100;SQL Active Directory Helper Service;c:\program files\microsoft sql server\100\shared\sqladhlp.exe [2008-7-10 47128]
S4 ODBTPServer;ODBTP Server;c:\odbtp\odbtpsrv.exe [2011-3-24 98304]
S4 ReportServer;SQL Server Reporting Services (MSSQLSERVER);c:\program files\microsoft sql server\msrs10.mssqlserver\reporting services\reportserver\bin\ReportingServicesService.exe [2011-3-3 1118056]
S4 RsFx0103;RsFx0103 Driver;c:\windows\system32\drivers\RsFx0103.sys [2009-3-30 239336]
UnknownUnknown dsload;dsload; [x]
.
=============== Created Last 30 ================
.
2011-09-27 01:52:13 40328 ----a-w- c:\windows\system32\HIPIS0e011b3.dll
2011-09-27 01:36:13 -------- d-----w- c:\windows\Internet Logs
2011-09-26 23:42:32 -------- d-----w- c:\documents and settings\savallu.st-users\application data\CheckPoint
2011-09-26 23:36:55 0 ----a-w- c:\windows\system32\ConduitEngine.tmp
2011-09-26 23:36:55 -------- d-----w- c:\documents and settings\savallu.st-users\local settings\application data\Conduit
2011-09-26 23:36:34 -------- d-----w- c:\program files\CheckPoint
2011-09-26 23:36:24 -------- d-----w- c:\windows\system32\ZoneLabs
2011-09-26 19:30:07 22216 ----a-w- c:\windows\system32\drivers\mbam.sys
2011-09-26 19:12:07 -------- d-----w- c:\documents and settings\savallu.st-users\application data\SUPERAntiSpyware.com
2011-09-26 19:11:52 -------- d-----w- c:\program files\SUPERAntiSpyware
2011-09-26 19:11:52 -------- d-----w- c:\documents and settings\all users\application data\SUPERAntiSpyware.com
2011-09-26 18:09:00 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
2011-09-26 17:54:03 -------- d--h--w- c:\windows\PIF
2011-09-26 16:46:26 -------- d--h--w- c:\documents and settings\all users\application data\Common Files
2011-09-26 16:45:30 -------- d-----w- c:\documents and settings\all users\application data\MFAData
2011-09-26 16:03:46 41272 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2011-09-25 08:43:53 48016 --sha-w- c:\windows\system32\c_34041.nl_
2011-09-25 07:43:28 -------- d-----w- c:\program files\PC Tools Security
2011-09-25 07:43:28 -------- d-----w- c:\program files\common files\PC Tools
2011-09-25 07:42:18 -------- d-----w- c:\documents and settings\all users\application data\PC Tools
2011-09-25 07:18:28 -------- d-----w- c:\documents and settings\savallu.st-users\application data\OpenCloud Security
2011-09-16 17:23:12 89944 ----a-w- c:\windows\system32\SQSRVRES.DLL
2011-09-16 17:23:12 72536 ----a-w- c:\windows\system32\perf-MSSQLSERVER-sqlctr10.2.4000.0.dll
.
==================== Find3M ====================
.
2011-09-27 01:54:30 75264 ----a-w- c:\windows\system32\drivers\ipsec.sys
2011-09-27 01:49:38 456320 ----a-w- c:\windows\system32\drivers\mrxsmb.sys
2011-09-27 01:45:07 145616 ----a-w- c:\windows\system32\drivers\FireTDI.sys
2011-09-26 23:46:21 42112 ----a-w- c:\windows\system32\drivers\imapi.sys
2011-09-09 09:12:13 599040 ----a-w- c:\windows\system32\crypt32.dll
2011-09-09 07:13:46 136512 ----a-w- c:\windows\system32\KevlarSigs.dll
2011-07-08 14:02:00 10496 ----a-w- c:\windows\system32\drivers\ndistapi.sys
2011-06-30 18:28:30 226656 ------w- c:\program files\cnsload_1309458510594.tmp
2011-06-30 17:59:13 226656 ------w- c:\program files\cnsload_1309456753939.tmp
.
============= FINISH: 19:01:36.07 ===============

Attached Files



BC AdBot (Login to Remove)

 


#2 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:09:48 AM

Posted 29 September 2011 - 03:19 PM

Hello and Welcome to the forums!

My name is Gringo and I'll be glad to help you with your computer problems.

Somethings to remember while we are working together.

  • Do not run any other tool untill instructed to do so!
  • please Do not Attach logs or put in code boxes.
  • Tell me about any problems that have occurred during the fix.
  • Tell me of any other symptoms you may be having as these can help also.
  • Do not run anything while running a fix.
  • Do not run any other tool untill instructed to do so!


Click on the Watch Topic Button and select Immediate Notification and click on proceed, this will help you to get notified faster when I have replied and make the cleaning process faster.

Please print out or make a copy in notpad of any instructions given, as sometimes it is necessary to go offline and you will lose access to them.

Please download DummyCreator.zip and unzip it.
  • Run the tool.
  • Copy and paste the following into the edit box:

    C:\WINDOWS\3498460175
  • Press Create button and post the content of the Result.txt.

    Important: Restart the computer.

Run Combofix:

You may be asked to install or update the Recovery Console (Win XP Only) if this happens please allow it to do so (you will need to be connected to the internet for this)

Before you run Combofix I will need you to turn off any security software you have running, If you do not know how to do this you can find out >here< or >here<

Combofix may need to reboot your computer more than once to do its job this is normal.

You can download Combofix from one of these links.
Link 1
Link 2
Link 3
1. Close any open browsers or any other programs that are open.
2. Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.

Double click on combofix.exe & follow the prompts.
When finished, it will produce a report for you.

Note 1: Do not mouseclick combofix's window while it's running. That may cause it to stall

Note 2: If you recieve an error "Illegal operation attempted on a registery key that has been marked for deletion." Please restart the computer

"information and logs"

  • In your next post I need the following
  • Log from Combofix
  • let me know of any problems you may have had
  • How is the computer doing now?

Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#3 KramerKelso

KramerKelso
  • Topic Starter

  • Members
  • 17 posts
  • OFFLINE
  •  
  • Local time:08:48 AM

Posted 30 September 2011 - 01:39 PM

Hi Gringo,

Thank you for helping me out with this.

I followed your instructions and first ran DummyCreator.exe and below is Result.txt:

DummyCreator by Farbar
Ran by savallu (administrator) on 30-09-2011 at 11:05:01
**************************************************************

C:\WINDOWS\3498460175 [30-09-2011 11:05:02]

== End of log ==

I then ran ComboFix.exe (downloaded from the first link). I waited for 30 minutes and the window that opened on clicking ComboFix.exe was there and nothing happened. Then I closed it and rebooted the machine. Then tried downloading it from the second link and did the same. Exactly same behavior. Then I rebooted and downloaded from the third link and this time it just exits after clicking ComboFix.exe. But I checked the list of processes and I no longer see the rootkit process 3498460175:4038818095.exe in the list. Thus, there is no log generated from ComboFix.exe. And the machine is fine. I rebooted couple of times to see if the rootkit process shows up. But it does not shows up now. The machine is fine.

Please let me know the next step. Does this mean that the rootkit trojan is removed? Also, please let me know if I should run Malware Antibytes or Superantispyware now. Earlier, these program were being killed on startup.

Awaiting for your reply.

Thanks,
Kramer

#4 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:09:48 AM

Posted 30 September 2011 - 06:36 PM

Hello

Ok lets try this, I want you to run combofix in safe mode but it is very important that when combofix reboots the computer for you to direct it back into safe mode so it can finish the scan.

Boot into Safe Mode

Reboot your computer in Safe Mode.
  • If the computer is running, shut down Windows, and then turn off the power.
  • Wait 30 seconds, and then turn the computer on.
  • Start tapping the F8 key. The Windows Advanced Options Menu appears. If you begin tapping the F8 key too soon, some computers display a "keyboard error" message. To resolve this, restart the computer and try again.
  • Ensure that the Safe Mode option is selected.
  • Press Enter. The computer then begins to start in Safe mode.
  • Login on your usual account.

after combofix has finished its scan please post the report back here.

Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#5 KramerKelso

KramerKelso
  • Topic Starter

  • Members
  • 17 posts
  • OFFLINE
  •  
  • Local time:08:48 AM

Posted 30 September 2011 - 09:30 PM

Hi Gringo,

Thanks for the quick reply. Booting into the safe mode did the trick. But I figured out the culprit was Super Anti Spyware. It had a process SAS...exe in the background even in the safe mode. I could not figure out how to disable it because the process pops back again once I kill it from task manager. So I uninstalled it, rebooted back to safe mode and ran ComboFix and it ran fine.

First, it installed windows recovery. Then it popped up the following two messages:


1. Visual Studio Just-In-Time Debugger:

An unhandled win32 exception occured in rmbr.3xe [1788]

2. ComboFix - ZeroAccess:

You are infected with Rootkit.ZeroAccess! It has inserted itself into the tcp/ip stack. This is particularly difficult infection.

If for any reason that you're unable to connect to the internet after running ComboFix, reboot once and see if that fixes it.

If it's not fixed, run ComboFix one more time.

----

It then rebooted itself a few times and finished the scan. Please find the log report below. Please let me know the further course of action.

Thanks a ton. I really appreciate it.

Best,
Kramer

-------


ComboFix 11-09-30.05 - savallu 09/30/2011 19:07:02.1.4 - x86 NETWORK
Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.3510.3175 [GMT -7:00]
Running from: c:\documents and settings\savallu.ST-USERS\Desktop\AntiVirus\New30thSept\ComboFix.exe
AV: VirusScan Enterprise + AntiSpyware Enterprise *Disabled/Updated* {918A2B0B-2C60-4016-A4AB-E868DEABF7F0}
FW: McAfee Host Intrusion Prevention Firewall *Disabled* {2F1275E3-2F4F-43E9-944B-3F63F9BDA5F5}
.
.
((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.
.
C:\data
c:\data\DBForBug.bak
c:\data\DBForBug.bak.gz
c:\documents and settings\Admin\WINDOWS
c:\documents and settings\savallu.ST-USERS\a.exe
c:\documents and settings\savallu.ST-USERS\Application Data\OpenCloud Security
c:\documents and settings\savallu.ST-USERS\Application Data\OpenCloud Security\ldr.ini
c:\documents and settings\savallu.ST-USERS\Application Data\OpenCloud Security\OpenCloud Security.ico
C:\Documents
c:\drivers\application
c:\drivers\application\R257449\Filter Driver\INFCACHE.1
c:\drivers\application\R257449\Filter Driver\release.dat
c:\drivers\application\R257449\Filter Driver\stdfltn.cat
c:\drivers\application\R257449\Filter Driver\stdfltn.inf
c:\drivers\application\R257449\Filter Driver\stdfltn.PNF
c:\drivers\application\R257449\Filter Driver\stdfltn.sys
c:\drivers\application\R257449\Sensor Driver\accelern.cat
c:\drivers\application\R257449\Sensor Driver\accelern.inf
c:\drivers\application\R257449\Sensor Driver\accelern.PNF
c:\drivers\application\R257449\Sensor Driver\accelern.sys
c:\drivers\application\R257449\Sensor Driver\INFCACHE.1
c:\drivers\application\R257449\Sensor Driver\release.dat
c:\program files\cnsload_1309456753939.tmp
c:\program files\cnsload_1309458510594.tmp
c:\program files\google\common\google updater\googleupdaterservice.exe
c:\program files\INSTALL.LOG
c:\windows\$NtUninstallKB30315$
c:\windows\$NtUninstallKB30315$\2005112779
c:\windows\$NtUninstallKB30315$\256149200\@
c:\windows\$NtUninstallKB30315$\256149200\click.tlb
c:\windows\$NtUninstallKB30315$\256149200\L\ghpavzxd
c:\windows\$NtUninstallKB30315$\256149200\loader.tlb
c:\windows\$NtUninstallKB30315$\256149200\U\@00000001
c:\windows\$NtUninstallKB30315$\256149200\U\@000000c0
c:\windows\$NtUninstallKB30315$\256149200\U\@000000cb
c:\windows\$NtUninstallKB30315$\256149200\U\@000000cf
c:\windows\$NtUninstallKB30315$\256149200\U\@80000000
c:\windows\$NtUninstallKB30315$\256149200\U\@800000c0
c:\windows\$NtUninstallKB30315$\256149200\U\@800000cb
c:\windows\$NtUninstallKB30315$\256149200\U\@800000cf
c:\windows\{2521BB91-29B1-4d7e-9137-AC9875D77735}
c:\windows\3498460175
c:\windows\kill.exe
c:\windows\system32\c_34041.nls
c:\windows\system32\d3d9caps.dat
c:\windows\system32\drivers\etc\lmhosts
c:\windows\system32\system.bat
c:\windows\system32\Thumbs.db
.
Infected copy of c:\windows\system32\drivers\cdrom.sys was found and disinfected
Restored copy from - The cat found it :)
c:\program files\WIDCOMM\Bluetooth Software\bin\btwdins.exe . . . is infected!!
c:\program files\WIDCOMM\Bluetooth Software\bin\btwdins.exe . . . was deleted!! You should re-install the program it pertains to
.
c:\program files\Cisco Systems\VPN Client\cvpnd.exe . . . is infected!!
c:\program files\Cisco Systems\VPN Client\cvpnd.exe . . . was deleted!! You should re-install the program it pertains to
.
c:\program files\Google\Update\GoogleUpdate.exe . . . is infected!!
c:\program files\Google\Update\GoogleUpdate.exe . . . was deleted!! You should re-install the program it pertains to
.
c:\program files\McAfee\SiteAdvisor Enterprise\McSACore.exe . . . is infected!!
c:\program files\McAfee\SiteAdvisor Enterprise\McSACore.exe . . . was deleted!! You should re-install the program it pertains to
.
c:\program files\McAfee\VirusScan Enterprise\engineserver.exe . . . is infected!!
c:\program files\McAfee\VirusScan Enterprise\engineserver.exe . . . was deleted!! You should re-install the program it pertains to
.
c:\program files\McAfee\Common Framework\FrameworkService.exe . . . is infected!!
c:\program files\McAfee\Common Framework\FrameworkService.exe . . . was deleted!! You should re-install the program it pertains to
.
c:\program files\McAfee\VirusScan Enterprise\vstskmgr.exe . . . is infected!!
c:\program files\McAfee\VirusScan Enterprise\vstskmgr.exe . . . was deleted!! You should re-install the program it pertains to
.
Infected copy of c:\windows\system32\mfevtps.exe was found and disinfected
Restored copy from - c:\windows\Installer\$PatchCache$\Managed\A237233B8594DD144B93DD2A3D72355C\7.0.5\mfevtps.exe
.
c:\windows\orclobi\MyDesktop\MyDesktopService.exe . . . is infected!!
c:\windows\orclobi\MyDesktop\MyDesktopService.exe . . . was deleted!! You should re-install the program it pertains to
.
c:\program files\CDBurnerXP\NMSAccessU.exe . . . is infected!!
c:\program files\CDBurnerXP\NMSAccessU.exe . . . was deleted!! You should re-install the program it pertains to
.
c:\program files\Oracle\ODrive\XfsSvcCon.exe . . . is infected!!
c:\program files\Oracle\ODrive\XfsSvcCon.exe . . . was deleted!! You should re-install the program it pertains to
.
c:\windows\orclobi\MyDesktop\MyDesktopQOS.exe . . . is infected!!
c:\windows\orclobi\MyDesktop\MyDesktopQOS.exe . . . was deleted!! You should re-install the program it pertains to
.
c:\drivers\audio\r255264\wdm\stacsv.exe . . . is infected!!
c:\drivers\audio\r255264\wdm\stacsv.exe . . . was deleted!! You should re-install the program it pertains to
.
c:\program files\Cisco\Cisco AnyConnect VPN Client\vpnagent.exe . . . is infected!!
c:\program files\Cisco\Cisco AnyConnect VPN Client\vpnagent.exe . . . was deleted!! You should re-install the program it pertains to
.
.
((((((((((((((((((((((((((((((((((((((( Drivers/Services )))))))))))))))))))))))))))))))))))))))))))))))))
.
.
-------\Service_f4486d0
.
.
((((((((((((((((((((((((( Files Created from 2011-09-01 to 2011-10-01 )))))))))))))))))))))))))))))))
.
.
2011-10-01 02:02 . 2008-04-14 12:00 62976 ----a-w- c:\windows\system32\drivers\cdrom.sys
2011-09-27 02:37 . 2011-09-27 02:37 -------- d-----w- c:\program files\Sophos
2011-09-27 01:36 . 2011-09-27 01:36 -------- d-----w- c:\windows\Internet Logs
2011-09-26 23:42 . 2011-09-26 23:42 -------- d-----w- c:\documents and settings\savallu.ST-USERS\Application Data\CheckPoint
2011-09-26 23:36 . 2011-09-27 01:28 -------- d-----w- c:\documents and settings\savallu.ST-USERS\Local Settings\Application Data\Conduit
2011-09-26 23:36 . 2011-09-26 23:36 0 ----a-w- c:\windows\system32\ConduitEngine.tmp
2011-09-26 23:36 . 2011-09-26 23:36 -------- d-----w- c:\program files\CheckPoint
2011-09-26 23:36 . 2011-09-27 01:30 -------- d-----w- c:\windows\system32\ZoneLabs
2011-09-26 19:30 . 2011-09-01 00:00 22216 ----a-w- c:\windows\system32\drivers\mbam.sys
2011-09-26 19:12 . 2011-09-26 19:12 -------- d-----w- c:\documents and settings\savallu.ST-USERS\Application Data\SUPERAntiSpyware.com
2011-09-26 19:11 . 2011-10-01 01:49 -------- d-----w- c:\program files\SUPERAntiSpyware
2011-09-26 19:11 . 2011-09-26 19:11 -------- d-----w- c:\documents and settings\All Users\Application Data\SUPERAntiSpyware.com
2011-09-26 18:09 . 2011-09-26 21:00 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
2011-09-26 17:54 . 2011-09-26 17:54 -------- d--h--w- c:\windows\PIF
2011-09-26 16:46 . 2011-09-26 16:46 -------- d--h--w- c:\documents and settings\All Users\Application Data\Common Files
2011-09-26 16:45 . 2011-09-26 16:59 -------- d-----w- c:\documents and settings\All Users\Application Data\MFAData
2011-09-26 16:03 . 2011-09-26 21:01 41272 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2011-09-25 08:43 . 2011-09-27 15:45 48016 --sha-w- c:\windows\system32\c_34041.nl_
2011-09-25 07:43 . 2011-09-25 08:49 -------- d-----w- c:\program files\PC Tools Security
2011-09-25 07:43 . 2011-09-25 08:49 -------- d-----w- c:\program files\Common Files\PC Tools
2011-09-25 07:43 . 2011-09-25 08:48 -------- d---a-w- c:\documents and settings\All Users\Application Data\TEMP
2011-09-25 07:42 . 2011-09-25 08:48 -------- d-----w- c:\documents and settings\All Users\Application Data\PC Tools
2011-09-16 17:23 . 2010-09-17 17:16 89944 ----a-w- c:\windows\system32\SQSRVRES.DLL
2011-09-16 17:23 . 2010-09-17 17:16 72536 ----a-w- c:\windows\system32\perf-MSSQLSERVER-sqlctr10.2.4000.0.dll
.
.
.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2011-09-27 01:54 . 2009-10-28 02:41 75264 ----a-w- c:\windows\system32\drivers\ipsec.sys
2011-09-27 01:49 . 2009-10-28 02:41 456320 ----a-w- c:\windows\system32\drivers\mrxsmb.sys
2011-09-27 01:45 . 2010-02-16 21:20 145616 ----a-w- c:\windows\system32\drivers\FireTDI.sys
2011-09-26 23:46 . 2008-04-14 00:11 42112 ----a-w- c:\windows\system32\drivers\imapi.sys
2011-09-16 17:22 . 2011-03-24 20:02 121728 ----a-w- c:\documents and settings\All Users\Application Data\Microsoft\VisualStudio\9.0\1033\ResourceCache.dll
2011-09-09 09:12 . 2009-10-28 02:40 599040 ----a-w- c:\windows\system32\crypt32.dll
2011-09-09 07:13 . 2009-10-28 16:32 136512 ----a-w- c:\windows\system32\KevlarSigs.dll
2011-07-08 14:02 . 2009-10-28 02:41 10496 ----a-w- c:\windows\system32\drivers\ndistapi.sys
2010-08-26 04:07 . 2009-10-28 16:24 23864 ----a-w- c:\program files\mozilla firefox\components\Scriptff.dll
.
.
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4
.
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"SpybotSD TeaTimer"="c:\program files\Spybot - Search & Destroy\TeaTimer.exe" [2009-01-26 2144088]
"RocketDock"="c:\program files\RocketDock\RocketDock.exe" [2007-09-02 495616]
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"IMJPMIG8.1"="c:\windows\IME\imjp8_1\IMJPMIG.EXE" [2008-04-14 208952]
"PHIME2002ASync"="c:\windows\system32\IME\TINTLGNT\TINTSETP.EXE" [2008-04-14 455168]
"PHIME2002A"="c:\windows\system32\IME\TINTLGNT\TINTSETP.EXE" [2008-04-14 455168]
"ShStatEXE"="c:\program files\McAfee\VirusScan Enterprise\SHSTAT.EXE" [2010-08-26 124224]
"Apoint"="c:\program files\DellTPad\Apoint.exe" [2010-05-12 288112]
"MSPY2002"="c:\windows\system32\IME\PINTLGNT\ImScInst.exe" [2008-04-14 59392]
"AESTFltr"="c:\windows\system32\AESTFltr.exe" [2010-04-30 737280]
"SysTrayApp"="c:\program files\IDT\WDM\sttray.exe" [2010-04-30 495711]
"IgfxTray"="c:\windows\system32\igfxtray.exe" [2010-04-30 141848]
"HotKeysCmds"="c:\windows\system32\hkcmd.exe" [2010-04-30 174104]
"Persistence"="c:\windows\system32\igfxpers.exe" [2010-04-30 144920]
"ntpgds"="c:\windows\orclobi\synctime.exe" [2003-04-07 110993]
"McAfeeUpdaterUI"="c:\program files\McAfee\Common Framework\udaterui.exe" [2009-09-23 136512]
"McAfee Host Intrusion Prevention Tray"="c:\program files\McAfee\Host Intrusion Prevention\FireTray.exe" [2010-02-16 979104]
.
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\RunOnce]
"FirefoxConfig"="c:\windows\orclobi\config\openofficeconfig.exe" [2009-10-20 397914]
"ThunderbirdConfig"="c:\windows\orclobi\config\thunderbirdconfig.exe" [2009-06-23 200630]
"LightningConfig"="c:\windows\orclobi\config\lightningconfig.exe" [2008-09-24 409663]
"disable_hibernation"="c:\windows\ORCLOBI\Temp\disable_hibernation.bat" [2010-07-16 90]
.
c:\documents and settings\savallu.ST-USERS\Start Menu\Programs\Startup\
Rainmeter.lnk - c:\program files\Rainmeter\Rainmeter.exe [2010-11-28 116736]
.
c:\documents and settings\All Users\Start Menu\Programs\Startup\
Bluetooth.lnk - c:\program files\WIDCOMM\Bluetooth Software\BTTray.exe [2010-2-25 636256]
MultiMon Taskbar.lnk - c:\program files\MMTaskbar\MultiMon.exe [2010-12-3 294912]
VPN Client.lnk - c:\windows\Installer\{51FB15F4-AD27-43BC-AD4B-DD0354FB6BBD}\Icon3E5562ED7.ico [2010-10-25 6144]
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\system]
"hidefastuserswitching"= 1 (0x1)
"promptpasswordonresume"= 1 (0x1)
"LocalAccountTokenFilterPolicy"= 1 (0x1)
.
[HKEY_CURRENT_USER\software\microsoft\windows\currentversion\policies\explorer]
"ForceStartMenuLogoff"= 1 (0x1)
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\McAfeeEngineService]
@="Service"
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\Wdf01000.sys]
@="Driver"
.
[HKLM\~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^Dell ControlPoint System Manager.lnk]
path=c:\documents and settings\All Users\Start Menu\Programs\Startup\Dell ControlPoint System Manager.lnk
backup=c:\windows\pss\Dell ControlPoint System Manager.lnkCommon Startup
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Adobe ARM]
2010-09-21 06:07 932288 ----a-r- c:\program files\Common Files\Adobe\ARM\1.0\AdobeARM.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Adobe Reader Speed Launcher]
2010-09-23 11:47 35760 ----a-w- c:\program files\Adobe\Reader 9.0\Reader\reader_sl.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\ddoctorv2]
2008-04-24 20:25 202560 ----a-w- c:\program files\Comcast\Desktop Doctor\bin\sprtcmd.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\DellControlPoint]
2009-11-02 18:40 657920 ----a-w- c:\program files\Dell\Dell ControlPoint\Dell.ControlPoint.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\DivXUpdate]
2010-09-16 20:04 1164584 ----a-w- c:\program files\DivX\DivX Update\DivXUpdate.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Freecorder FLV Service]
2010-06-26 17:09 167936 ----a-w- c:\program files\Freecorder\FLVSrvc.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Google Update]
2010-11-03 05:06 136176 ----atw- c:\documents and settings\savallu.ST-USERS\Local Settings\Application Data\Google\Update\GoogleUpdate.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\iTunesHelper]
2010-09-24 09:10 421160 ----a-w- c:\program files\iTunes\iTunesHelper.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Messenger (Yahoo!)]
2010-06-01 17:17 5252408 ----a-w- c:\progra~1\Yahoo!\Messenger\YahooMessenger.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\QuickTime Task]
2010-09-08 18:17 421888 ----a-w- c:\program files\QuickTime\QTTask.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\RunUVC]
2009-04-25 00:07 7540736 ----a-w- c:\program files\UVC Video Camera\EffectDir\UVCTray.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\TkBellExe]
2010-11-25 21:07 274608 ----a-w- c:\program files\real\realplayer\Update\realsched.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\UVCSti]
2009-07-08 22:48 245760 ----a-w- c:\program files\UVC Video Camera\UVCSti.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\services]
"YahooAUService"=2 (0x2)
"WMPNetworkSvc"=3 (0x3)
"SQLWriter"=2 (0x2)
"sprtsvc_ddoctorv2"=2 (0x2)
"ReportServer"=2 (0x2)
"PictureTaker"=3 (0x3)
"odserv"=3 (0x3)
"ODBTPServer"=2 (0x2)
"MSSQLServerOLAPService"=2 (0x2)
"MsDtsServer100"=2 (0x2)
"JavaQuickStarterService"=2 (0x2)
"iPod Service"=3 (0x3)
"InstallFilterService"=2 (0x2)
"gusvc"=3 (0x3)
"gupdate"=2 (0x2)
"dcpsysmgrsvc"=2 (0x2)
"buttonsvc32"=2 (0x2)
"BrlAPI"=3 (0x3)
"Bonjour Service"=2 (0x2)
"Apple Mobile Device"=2 (0x2)
.
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]
"DisableUnicastResponsesToMulticastBroadcast"= 0 (0x0)
.
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"%windir%\\system32\\sessmgr.exe"=
.
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\GloballyOpenPorts\List]
"22:TCP"= 22:TCP:SSH Server
"23:TCP"= 23:TCP:Telnet Server
"137:UDP"= 137:UDP:@xpsp2res.dll,-22001
"138:UDP"= 138:UDP:@xpsp2res.dll,-22002
"139:TCP"= 139:TCP:@xpsp2res.dll,-22004
"445:TCP"= 445:TCP:@xpsp2res.dll,-22005
"1830:TCP"= 1830:TCP:EM Agent
"2847:TCP"= 2847:TCP:SAV Quarantine
"2848:TCP"= 2848:TCP:SAV Quarantine (HTTPS)
"2967:UDP"= 2967:UDP:SAV Client
"2967:TCP"= 2967:TCP:SAV Client
"5900:TCP"= 5900:TCP:VNC Server
"5800:TCP"= 5800:TCP:VNC Web Server
"3389:TCP"= 3389:TCP:@xpsp2res.dll,-22009
"38292:TCP"= 38292:TCP:SAV Msgsys
"38037:TCP"= 38037:TCP:SAV Msgsys
"38293:UDP"= 38293:UDP:Intel PDS
"38293:TCP"= 38293:TCP:Intel PDS
"21:TCP"= 21:TCP:FTP Server
.
R0 stdflt;Disk Filter Driver for Accelerometer;c:\windows\system32\drivers\stdfltn.sys [10/25/2010 11:45 AM 17072]
R2 risdpcie;risdpcie;c:\windows\system32\drivers\risdpe86.sys [10/25/2010 12:35 PM 47616]
R3 Acceler;Accelerometer Service;c:\windows\system32\drivers\Accelern.sys [10/25/2010 11:45 AM 42672]
R3 e1kexpress;Intel® PRO/1000 PCI Express Network Connection Driver K;c:\windows\system32\drivers\e1k5132.sys [10/25/2010 12:35 PM 167080]
R3 FirehkMP;FirehkMP;c:\windows\system32\drivers\firehk.sys [10/28/2009 9:31 AM 44680]
R3 tap0801;TAP-Win32 Adapter V8;c:\windows\system32\drivers\tap0801.sys [10/1/2006 5:37 AM 26624]
R3 tap0801co;TAP-Win32 Adapter V8 (coLinux);c:\windows\system32\drivers\tap0801co.sys [8/30/2006 3:00 PM 25856]
S2 CoLinuxDriver;CoLinuxDriver;c:\program files\coLinux\linux.sys [9/1/2010 3:59 PM 83968]
S2 enterceptAgent;McAfee Host Intrusion Prevention Service;c:\program files\McAfee\Host Intrusion Prevention\FireSvc.exe [2/16/2010 2:20 PM 1498224]
S2 gupdate;Google Update Service (gupdate);c:\program files\Google\Update\GoogleUpdate.exe /svc --> c:\program files\Google\Update\GoogleUpdate.exe [?]
S2 hips;McAfee HIPSCore Service;c:\program files\McAfee\Host Intrusion Prevention\HIPSCore\HIPSvc.exe [7/15/2010 11:33 PM 35696]
S2 McAfee SiteAdvisor Enterprise Service;McAfee SiteAdvisor Enterprise Service;"c:\program files\McAfee\SiteAdvisor Enterprise\McSACore.exe" --> c:\program files\McAfee\SiteAdvisor Enterprise\McSACore.exe [?]
S2 McAfeeEngineService;McAfee Engine Service;"c:\program files\McAfee\VirusScan Enterprise\engineserver.exe" --> c:\program files\McAfee\VirusScan Enterprise\engineserver.exe [?]
S2 mfevtp;McAfee Validation Trust Protection Service;c:\windows\system32\mfevtps.exe [10/28/2009 9:24 AM 70728]
S2 MyDesktopWindows;MyDesktopService;c:\windows\orclobi\MyDesktop\MyDesktopService.exe --> c:\windows\orclobi\MyDesktop\MyDesktopService.exe [?]
S2 OdService;ODrive Service;c:\program files\Oracle\ODrive\XfsSvcCon.exe svcmanager --> c:\program files\Oracle\ODrive\XfsSvcCon.exe svcmanager [?]
S2 PMEMNT;PMEMNT;c:\windows\pmemnt.sys [10/25/2010 9:58 AM 7012]
S2 QOSMyDesktop;QOS MyDesktop;c:\windows\orclobi\MyDesktop\MyDesktopQOS.exe --> c:\windows\orclobi\MyDesktop\MyDesktopQOS.exe [?]
S2 vpnagent;Cisco AnyConnect VPN Agent;"c:\program files\Cisco\Cisco AnyConnect VPN Client\vpnagent.exe" --> c:\program files\Cisco\Cisco AnyConnect VPN Client\vpnagent.exe [?]
S3 AESTAud;AE Audio Service;c:\windows\system32\drivers\AESTAud.sys [10/25/2010 12:35 PM 113664]
S3 Cam3820;Cam3820 PC Camera Driver;c:\windows\system32\drivers\cam3820a.sys [7/8/2009 3:48 PM 308096]
S3 cvusbdrv;Dell ControlVault;c:\windows\system32\drivers\cvusbdrv.sys [10/25/2010 12:35 PM 33832]
S3 Firehk;McAfee NDIS Intermediate Filter;c:\windows\system32\drivers\firehk.sys [10/28/2009 9:31 AM 44680]
S3 gupdatem;Google Update Service (gupdatem);c:\program files\Google\Update\GoogleUpdate.exe /medsvc --> c:\program files\Google\Update\GoogleUpdate.exe [?]
S3 HIPK;McAfee Inc. HIPK;c:\windows\system32\drivers\HIPK.sys [10/28/2009 9:31 AM 107896]
S3 HIPPSK;McAfee Inc. HIPPSK;c:\windows\system32\drivers\HIPPSK.sys [10/28/2009 9:31 AM 38680]
S3 HIPQK;McAfee Inc. HIPQK;c:\windows\system32\drivers\HIPQK.sys [10/28/2009 9:31 AM 35584]
S3 Impcd;Impcd;c:\windows\system32\drivers\Impcd.sys [10/25/2010 12:35 PM 132480]
S3 IntcDAud;Intel® Display Audio;c:\windows\system32\drivers\IntcDAud.sys [10/25/2010 12:35 PM 215040]
S3 MEMSWEEP2;MEMSWEEP2;\??\c:\windows\system32\3E.tmp --> c:\windows\system32\3E.tmp [?]
S3 mferkdet;McAfee Inc. mferkdet;c:\windows\system32\drivers\mferkdet.sys [10/28/2009 9:24 AM 66536]
S4 BrlAPI;BrlAPI;c:\cygwin\bin\cygrunsrv.exe [3/24/2011 7:12 PM 68096]
S4 buttonsvc32;Dell ControlPoint Button Service;c:\program files\Dell\Dell ControlPoint\DCPButtonSvc.exe [11/20/2009 5:42 PM 278304]
S4 dcpsysmgrsvc;Dell ControlPoint System Manager;c:\program files\Dell\Dell ControlPoint\System Manager\DCPSysMgrSvc.exe [2/8/2010 4:20 PM 376688]
S4 InstallFilterService;FF Install Filter Service;c:\program files\STMicroelectronics\AccelerometerP11\InstallFilterService.exe [10/25/2010 11:45 AM 60928]
S4 MsDtsServer100;SQL Server Integration Services 10.0;c:\program files\Microsoft SQL Server\100\DTS\Binn\MsDtsSrvr.exe [3/3/2011 9:50 AM 214888]
S4 MSSQLFDLauncher;SQL Full-text Filter Daemon Launcher (MSSQLSERVER);c:\program files\Microsoft SQL Server\MSSQL10.MSSQLSERVER\MSSQL\Binn\fdlauncher.exe [7/10/2008 1:15 AM 31256]
S4 MSSQLServerADHelper100;SQL Active Directory Helper Service;c:\program files\Microsoft SQL Server\100\Shared\sqladhlp.exe [7/10/2008 2:49 AM 47128]
S4 ODBTPServer;ODBTP Server;c:\odbtp\odbtpsrv.exe [3/24/2011 1:14 PM 98304]
S4 ReportServer;SQL Server Reporting Services (MSSQLSERVER);c:\program files\Microsoft SQL Server\MSRS10.MSSQLSERVER\Reporting Services\ReportServer\bin\ReportingServicesService.exe [3/3/2011 10:03 AM 1118056]
S4 RsFx0103;RsFx0103 Driver;c:\windows\system32\drivers\RsFx0103.sys [3/30/2009 3:09 AM 239336]
UnknownUnknown dsload;dsload; [x]
.
Contents of the 'Scheduled Tasks' folder
.
2011-09-29 c:\windows\Tasks\GoogleUpdateTaskUserS-1-5-21-22612181-1167196868-26564730-49618Core.job
- c:\documents and settings\savallu.ST-USERS\Local Settings\Application Data\Google\Update\GoogleUpdate.exe [2010-11-05 05:06]
.
2011-09-30 c:\windows\Tasks\GoogleUpdateTaskUserS-1-5-21-22612181-1167196868-26564730-49618UA.job
- c:\documents and settings\savallu.ST-USERS\Local Settings\Application Data\Google\Update\GoogleUpdate.exe [2010-11-05 05:06]
.
2011-10-01 c:\windows\Tasks\RealUpgradeLogonTaskS-1-5-21-22612181-1167196868-26564730-49618.job
- c:\program files\Real\RealUpgrade\realupgrade.exe [2010-11-05 19:33]
.
2011-09-27 c:\windows\Tasks\RealUpgradeScheduledTaskS-1-5-21-22612181-1167196868-26564730-49618.job
- c:\program files\Real\RealUpgrade\realupgrade.exe [2010-11-05 19:33]
.
.
------- Supplementary Scan -------
.
uStart Page = hxxp://search.conduit.com?SearchSource=10&ctid=CT2645238
mStart Page = hxxp://my.oracle.com/
uInternet Settings,ProxyOverride = *.local
IE: Add to Google Photos Screensa&ver - c:\windows\system32\GPhotos.scr/200
IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~2\Office12\EXCEL.EXE/3000
IE: Send to &Bluetooth Device... - c:\program files\WIDCOMM\Bluetooth Software\btsendto_ie_ctx.htm
IE: Send To Bluetooth - c:\program files\WIDCOMM\Bluetooth Software\btsendto_ie.htm
Trusted Zone: oraclecorp.com\global-service
Trusted Zone: oraclecorp.com\global-service
TCP: DhcpNameServer = 192.168.0.1
.
- - - - ORPHANS REMOVED - - - -
.
HKCU-Run-SUPERAntiSpyware - c:\program files\SUPERAntiSpyware\SUPERAntiSpyware.exe
AddRemove-WZCLINE - c:\program files\WinZip\winzip32
.
.
.
**************************************************************************
.
catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2011-09-30 19:18
Windows 5.1.2600 Service Pack 3 NTFS
.
scanning hidden processes ...
.
scanning hidden autostart entries ...
.
scanning hidden files ...
.
scan completed successfully
hidden files: 0
.
**************************************************************************
.
[HKEY_LOCAL_MACHINE\System\ControlSet001\Services\MEMSWEEP2]
"ImagePath"="\??\c:\windows\system32\3E.tmp"
.
--------------------- DLLs Loaded Under Running Processes ---------------------
.
- - - - - - - > 'explorer.exe'(1488)
c:\windows\system32\WININET.dll
c:\windows\system32\IEFRAME.dll
c:\progra~1\COMMON~1\MICROS~1\WEBCOM~1\11\OWC11.DLL
c:\windows\system32\msi.dll
c:\windows\WinSxS\x86_Microsoft.VC80.CRT_1fc8b3b9a1e18e3b_8.0.50727.4053_x-ww_e6967989\MSVCR80.dll
.
Completion time: 2011-09-30 19:23:09 - machine was rebooted
ComboFix-quarantined-files.txt 2011-10-01 02:23
.
Pre-Run: 142,009,577,472 bytes free
Post-Run: 143,584,448,512 bytes free
.
WindowsXP-KB310994-SP2-Pro-BootDisk-ENU.exe
[boot loader]
timeout=2
default=multi(0)disk(0)rdisk(0)partition(1)\WINDOWS
[operating systems]
c:\cmdcons\BOOTSECT.DAT="Microsoft Windows Recovery Console" /cmdcons
UnsupportedDebug="do not select this" /debug
multi(0)disk(0)rdisk(0)partition(1)\WINDOWS="Microsoft Windows XP Professional" /noexecute=optin /fastdetect
.
- - End Of File - - 298ECC054990B466AA5D8A7E1FA576C3

#6 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:09:48 AM

Posted 30 September 2011 - 09:43 PM

Greetings

Good That cleaned up some bad guys but I see some other stuff that we need to go after, so I want you to run this custom script for me.

:Run CFScript:

Open Notepad and copy/paste the text in the box into the window:

ClearJavaCache::

File::
c:\windows\system32\ConduitEngine.tmp
c:\windows\system32\c_34041.nl_

Folder::
c:\documents and settings\savallu.ST-USERS\Local Settings\Application Data\Conduit

DDS::
uStart Page = hxxp://search.conduit.com?SearchSource=10&ctid=CT2645238


Save it to your desktop as CFScript.txt

Refering to the picture above, drag CFScript.txt into ComboFix.exe
Posted Image
This will let ComboFix run again.
Restart if you have to.
Save the produced logfile to your desktop.

Note: Do not mouseclick combofix's window whilst it's running. That may cause it to stall

"information and logs"

  • In your next post I need the following

  • report from Combofix
  • let me know of any problems you may have had
  • How is the computer doing now after running the script?

Gringo

I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#7 KramerKelso

KramerKelso
  • Topic Starter

  • Members
  • 17 posts
  • OFFLINE
  •  
  • Local time:08:48 AM

Posted 30 September 2011 - 10:00 PM

Hi Gringo,

I followed your instructions and ComboFix ran fine. Just want to add that this time I ran it in the normal mode. There was no reboot. Please find the log below.

Thanks a lot,
Kramer

----------------------------


ComboFix 11-09-30.05 - savallu 09/30/2011 19:48:38.2.4 - x86
Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.3510.2840 [GMT -7:00]
Running from: c:\documents and settings\savallu.ST-USERS\Desktop\AntiVirus\New30thSept\ComboFix.exe
Command switches used :: c:\documents and settings\savallu.ST-USERS\Desktop\AntiVirus\New30thSept\CFScript.txt
AV: VirusScan Enterprise + AntiSpyware Enterprise *Disabled/Updated* {918A2B0B-2C60-4016-A4AB-E868DEABF7F0}
FW: McAfee Host Intrusion Prevention Firewall *Enabled* {2F1275E3-2F4F-43E9-944B-3F63F9BDA5F5}
.
FILE ::
"c:\windows\system32\c_34041.nl_"
"c:\windows\system32\ConduitEngine.tmp"
.
.
((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.
.
c:\documents and settings\savallu.ST-USERS\Local Settings\Application Data\Conduit
c:\windows\system32\
c:\windows\system32\c_34041.nl_
c:\windows\system32\ConduitEngine.tmp
c:\windows\system32\d3d9caps.dat
.
.
((((((((((((((((((((((((( Files Created from 2011-09-01 to 2011-10-01 )))))))))))))))))))))))))))))))
.
.
2011-10-01 02:33 . 2010-02-16 21:20 40328 ----a-w- c:\windows\system32\HIPIS0e011b3.dll
2011-10-01 02:02 . 2008-04-14 12:00 62976 ----a-w- c:\windows\system32\drivers\cdrom.sys
2011-09-27 02:37 . 2011-09-27 02:37 -------- d-----w- c:\program files\Sophos
2011-09-27 01:36 . 2011-09-27 01:36 -------- d-----w- c:\windows\Internet Logs
2011-09-26 23:42 . 2011-09-26 23:42 -------- d-----w- c:\documents and settings\savallu.ST-USERS\Application Data\CheckPoint
2011-09-26 23:36 . 2011-09-26 23:36 -------- d-----w- c:\program files\CheckPoint
2011-09-26 23:36 . 2011-09-27 01:30 -------- d-----w- c:\windows\system32\ZoneLabs
2011-09-26 19:30 . 2011-09-01 00:00 22216 ----a-w- c:\windows\system32\drivers\mbam.sys
2011-09-26 19:12 . 2011-09-26 19:12 -------- d-----w- c:\documents and settings\savallu.ST-USERS\Application Data\SUPERAntiSpyware.com
2011-09-26 19:11 . 2011-10-01 01:49 -------- d-----w- c:\program files\SUPERAntiSpyware
2011-09-26 19:11 . 2011-09-26 19:11 -------- d-----w- c:\documents and settings\All Users\Application Data\SUPERAntiSpyware.com
2011-09-26 18:09 . 2011-09-26 21:00 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
2011-09-26 17:54 . 2011-09-26 17:54 -------- d--h--w- c:\windows\PIF
2011-09-26 16:46 . 2011-09-26 16:46 -------- d--h--w- c:\documents and settings\All Users\Application Data\Common Files
2011-09-26 16:45 . 2011-09-26 16:59 -------- d-----w- c:\documents and settings\All Users\Application Data\MFAData
2011-09-26 16:03 . 2011-09-26 21:01 41272 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2011-09-25 07:43 . 2011-09-25 08:49 -------- d-----w- c:\program files\PC Tools Security
2011-09-25 07:43 . 2011-09-25 08:49 -------- d-----w- c:\program files\Common Files\PC Tools
2011-09-25 07:43 . 2011-09-25 08:48 -------- d---a-w- c:\documents and settings\All Users\Application Data\TEMP
2011-09-25 07:42 . 2011-09-25 08:48 -------- d-----w- c:\documents and settings\All Users\Application Data\PC Tools
2011-09-16 17:23 . 2010-09-17 17:16 89944 ----a-w- c:\windows\system32\SQSRVRES.DLL
2011-09-16 17:23 . 2010-09-17 17:16 72536 ----a-w- c:\windows\system32\perf-MSSQLSERVER-sqlctr10.2.4000.0.dll
.
.
.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2011-09-27 01:54 . 2009-10-28 02:41 75264 ----a-w- c:\windows\system32\drivers\ipsec.sys
2011-09-27 01:49 . 2009-10-28 02:41 456320 ----a-w- c:\windows\system32\drivers\mrxsmb.sys
2011-09-27 01:45 . 2010-02-16 21:20 145616 ----a-w- c:\windows\system32\drivers\FireTDI.sys
2011-09-26 23:46 . 2008-04-14 00:11 42112 ----a-w- c:\windows\system32\drivers\imapi.sys
2011-09-16 17:22 . 2011-03-24 20:02 121728 ----a-w- c:\documents and settings\All Users\Application Data\Microsoft\VisualStudio\9.0\1033\ResourceCache.dll
2011-09-09 09:12 . 2009-10-28 02:40 599040 ----a-w- c:\windows\system32\crypt32.dll
2011-09-09 07:13 . 2009-10-28 16:32 136512 ----a-w- c:\windows\system32\KevlarSigs.dll
2011-07-08 14:02 . 2009-10-28 02:41 10496 ----a-w- c:\windows\system32\drivers\ndistapi.sys
2010-08-26 04:07 . 2009-10-28 16:24 23864 ----a-w- c:\program files\mozilla firefox\components\Scriptff.dll
.
.
((((((((((((((((((((((((((((( SnapShot@2011-10-01_02.18.52 )))))))))))))))))))))))))))))))))))))))))
.
+ 2011-10-01 02:35 . 2011-10-01 02:35 16384 c:\windows\temp\Perflib_Perfdata_9c.dat
+ 2011-10-01 02:35 . 2011-10-01 02:35 10134 c:\windows\Installer\{E008BEB1-AB63-46C1-BD3D-08D3A1F8E26D}\ARPPRODUCTICON.exe
- 2011-02-01 19:32 . 2011-02-01 19:32 10134 c:\windows\Installer\{E008BEB1-AB63-46C1-BD3D-08D3A1F8E26D}\ARPPRODUCTICON.exe
+ 2009-10-28 02:41 . 2011-10-01 02:38 574664 c:\windows\system32\perfh009.dat
+ 2009-10-28 02:41 . 2011-10-01 02:38 129848 c:\windows\system32\perfc009.dat
+ 2011-10-01 02:35 . 2011-10-01 02:35 119789 c:\windows\system32\api_hook_list.dat
.
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4
.
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"SpybotSD TeaTimer"="c:\program files\Spybot - Search & Destroy\TeaTimer.exe" [2009-01-26 2144088]
"RocketDock"="c:\program files\RocketDock\RocketDock.exe" [2007-09-02 495616]
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"IMJPMIG8.1"="c:\windows\IME\imjp8_1\IMJPMIG.EXE" [2008-04-14 208952]
"PHIME2002ASync"="c:\windows\system32\IME\TINTLGNT\TINTSETP.EXE" [2008-04-14 455168]
"PHIME2002A"="c:\windows\system32\IME\TINTLGNT\TINTSETP.EXE" [2008-04-14 455168]
"ShStatEXE"="c:\program files\McAfee\VirusScan Enterprise\SHSTAT.EXE" [2010-08-26 124224]
"Apoint"="c:\program files\DellTPad\Apoint.exe" [2010-05-12 288112]
"MSPY2002"="c:\windows\system32\IME\PINTLGNT\ImScInst.exe" [2008-04-14 59392]
"AESTFltr"="c:\windows\system32\AESTFltr.exe" [2010-04-30 737280]
"SysTrayApp"="c:\program files\IDT\WDM\sttray.exe" [2010-04-30 495711]
"IgfxTray"="c:\windows\system32\igfxtray.exe" [2010-04-30 141848]
"HotKeysCmds"="c:\windows\system32\hkcmd.exe" [2010-04-30 174104]
"Persistence"="c:\windows\system32\igfxpers.exe" [2010-04-30 144920]
"ntpgds"="c:\windows\orclobi\synctime.exe" [2003-04-07 110993]
"McAfeeUpdaterUI"="c:\program files\McAfee\Common Framework\udaterui.exe" [2009-09-23 136512]
"McAfee Host Intrusion Prevention Tray"="c:\program files\McAfee\Host Intrusion Prevention\FireTray.exe" [2010-02-16 979104]
.
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\RunOnce]
"FirefoxConfig"="c:\windows\orclobi\config\openofficeconfig.exe" [2009-10-20 397914]
"ThunderbirdConfig"="c:\windows\orclobi\config\thunderbirdconfig.exe" [2009-06-23 200630]
"LightningConfig"="c:\windows\orclobi\config\lightningconfig.exe" [2008-09-24 409663]
"disable_hibernation"="c:\windows\ORCLOBI\Temp\disable_hibernation.bat" [2010-07-16 90]
.
c:\documents and settings\savallu.ST-USERS\Start Menu\Programs\Startup\
Rainmeter.lnk - c:\program files\Rainmeter\Rainmeter.exe [2010-11-28 116736]
.
c:\documents and settings\All Users\Start Menu\Programs\Startup\
Bluetooth.lnk - c:\program files\WIDCOMM\Bluetooth Software\BTTray.exe [2010-2-25 636256]
MultiMon Taskbar.lnk - c:\program files\MMTaskbar\MultiMon.exe [2010-12-3 294912]
VPN Client.lnk - c:\windows\Installer\{51FB15F4-AD27-43BC-AD4B-DD0354FB6BBD}\Icon3E5562ED7.ico [2010-10-25 6144]
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\system]
"hidefastuserswitching"= 1 (0x1)
"promptpasswordonresume"= 1 (0x1)
"LocalAccountTokenFilterPolicy"= 1 (0x1)
.
[HKEY_CURRENT_USER\software\microsoft\windows\currentversion\policies\explorer]
"ForceStartMenuLogoff"= 1 (0x1)
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\McAfeeEngineService]
@="Service"
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\Wdf01000.sys]
@="Driver"
.
[HKLM\~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^Dell ControlPoint System Manager.lnk]
path=c:\documents and settings\All Users\Start Menu\Programs\Startup\Dell ControlPoint System Manager.lnk
backup=c:\windows\pss\Dell ControlPoint System Manager.lnkCommon Startup
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Adobe ARM]
2010-09-21 06:07 932288 ----a-r- c:\program files\Common Files\Adobe\ARM\1.0\AdobeARM.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Adobe Reader Speed Launcher]
2010-09-23 11:47 35760 ----a-w- c:\program files\Adobe\Reader 9.0\Reader\reader_sl.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\ddoctorv2]
2008-04-24 20:25 202560 ----a-w- c:\program files\Comcast\Desktop Doctor\bin\sprtcmd.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\DellControlPoint]
2009-11-02 18:40 657920 ----a-w- c:\program files\Dell\Dell ControlPoint\Dell.ControlPoint.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\DivXUpdate]
2010-09-16 20:04 1164584 ----a-w- c:\program files\DivX\DivX Update\DivXUpdate.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Freecorder FLV Service]
2010-06-26 17:09 167936 ----a-w- c:\program files\Freecorder\FLVSrvc.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Google Update]
2010-11-03 05:06 136176 ----atw- c:\documents and settings\savallu.ST-USERS\Local Settings\Application Data\Google\Update\GoogleUpdate.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\iTunesHelper]
2010-09-24 09:10 421160 ----a-w- c:\program files\iTunes\iTunesHelper.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Messenger (Yahoo!)]
2010-06-01 17:17 5252408 ----a-w- c:\progra~1\Yahoo!\Messenger\YahooMessenger.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\QuickTime Task]
2010-09-08 18:17 421888 ----a-w- c:\program files\QuickTime\QTTask.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\RunUVC]
2009-04-25 00:07 7540736 ----a-w- c:\program files\UVC Video Camera\EffectDir\UVCTray.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\TkBellExe]
2010-11-25 21:07 274608 ----a-w- c:\program files\real\realplayer\Update\realsched.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\UVCSti]
2009-07-08 22:48 245760 ----a-w- c:\program files\UVC Video Camera\UVCSti.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\services]
"YahooAUService"=2 (0x2)
"WMPNetworkSvc"=3 (0x3)
"SQLWriter"=2 (0x2)
"sprtsvc_ddoctorv2"=2 (0x2)
"ReportServer"=2 (0x2)
"PictureTaker"=3 (0x3)
"odserv"=3 (0x3)
"ODBTPServer"=2 (0x2)
"MSSQLServerOLAPService"=2 (0x2)
"MsDtsServer100"=2 (0x2)
"JavaQuickStarterService"=2 (0x2)
"iPod Service"=3 (0x3)
"InstallFilterService"=2 (0x2)
"gusvc"=3 (0x3)
"gupdate"=2 (0x2)
"dcpsysmgrsvc"=2 (0x2)
"buttonsvc32"=2 (0x2)
"BrlAPI"=3 (0x3)
"Bonjour Service"=2 (0x2)
"Apple Mobile Device"=2 (0x2)
.
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]
"DisableUnicastResponsesToMulticastBroadcast"= 0 (0x0)
.
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"%windir%\\system32\\sessmgr.exe"=
"c:\\Documents and Settings\\savallu.ST-USERS\\Local Settings\\Application Data\\Google\\Google Talk Plugin\\googletalkplugin.exe"=
"c:\\Program Files\\McAfee\\Common Framework\\FrameworkService.exe"=
.
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\GloballyOpenPorts\List]
"22:TCP"= 22:TCP:SSH Server
"23:TCP"= 23:TCP:Telnet Server
"137:UDP"= 137:UDP:@xpsp2res.dll,-22001
"138:UDP"= 138:UDP:@xpsp2res.dll,-22002
"139:TCP"= 139:TCP:@xpsp2res.dll,-22004
"445:TCP"= 445:TCP:@xpsp2res.dll,-22005
"1830:TCP"= 1830:TCP:EM Agent
"2847:TCP"= 2847:TCP:SAV Quarantine
"2848:TCP"= 2848:TCP:SAV Quarantine (HTTPS)
"2967:UDP"= 2967:UDP:SAV Client
"2967:TCP"= 2967:TCP:SAV Client
"5900:TCP"= 5900:TCP:VNC Server
"5800:TCP"= 5800:TCP:VNC Web Server
"3389:TCP"= 3389:TCP:@xpsp2res.dll,-22009
"38292:TCP"= 38292:TCP:SAV Msgsys
"38037:TCP"= 38037:TCP:SAV Msgsys
"38293:UDP"= 38293:UDP:Intel PDS
"38293:TCP"= 38293:TCP:Intel PDS
"21:TCP"= 21:TCP:FTP Server
.
R0 stdflt;Disk Filter Driver for Accelerometer;c:\windows\system32\drivers\stdfltn.sys [10/25/2010 11:45 AM 17072]
R2 CoLinuxDriver;CoLinuxDriver;c:\program files\coLinux\linux.sys [9/1/2010 3:59 PM 83968]
R2 enterceptAgent;McAfee Host Intrusion Prevention Service;c:\program files\McAfee\Host Intrusion Prevention\FireSvc.exe [2/16/2010 2:20 PM 1498224]
R2 hips;McAfee HIPSCore Service;c:\program files\McAfee\Host Intrusion Prevention\HIPSCore\HIPSvc.exe [7/15/2010 11:33 PM 35696]
R2 mfevtp;McAfee Validation Trust Protection Service;c:\windows\system32\mfevtps.exe [10/28/2009 9:24 AM 70728]
R2 PMEMNT;PMEMNT;c:\windows\pmemnt.sys [10/25/2010 9:58 AM 7012]
R2 risdpcie;risdpcie;c:\windows\system32\drivers\risdpe86.sys [10/25/2010 12:35 PM 47616]
R3 Acceler;Accelerometer Service;c:\windows\system32\drivers\Accelern.sys [10/25/2010 11:45 AM 42672]
R3 AESTAud;AE Audio Service;c:\windows\system32\drivers\AESTAud.sys [10/25/2010 12:35 PM 113664]
R3 cvusbdrv;Dell ControlVault;c:\windows\system32\drivers\cvusbdrv.sys [10/25/2010 12:35 PM 33832]
R3 e1kexpress;Intel® PRO/1000 PCI Express Network Connection Driver K;c:\windows\system32\drivers\e1k5132.sys [10/25/2010 12:35 PM 167080]
R3 FirehkMP;FirehkMP;c:\windows\system32\drivers\firehk.sys [10/28/2009 9:31 AM 44680]
R3 HIPK;McAfee Inc. HIPK;c:\windows\system32\drivers\HIPK.sys [10/28/2009 9:31 AM 107896]
R3 HIPPSK;McAfee Inc. HIPPSK;c:\windows\system32\drivers\HIPPSK.sys [10/28/2009 9:31 AM 38680]
R3 HIPQK;McAfee Inc. HIPQK;c:\windows\system32\drivers\HIPQK.sys [10/28/2009 9:31 AM 35584]
R3 Impcd;Impcd;c:\windows\system32\drivers\Impcd.sys [10/25/2010 12:35 PM 132480]
R3 IntcDAud;Intel® Display Audio;c:\windows\system32\drivers\IntcDAud.sys [10/25/2010 12:35 PM 215040]
R3 tap0801;TAP-Win32 Adapter V8;c:\windows\system32\drivers\tap0801.sys [10/1/2006 5:37 AM 26624]
R3 tap0801co;TAP-Win32 Adapter V8 (coLinux);c:\windows\system32\drivers\tap0801co.sys [8/30/2006 3:00 PM 25856]
S2 gupdate;Google Update Service (gupdate);c:\program files\Google\Update\GoogleUpdate.exe /svc --> c:\program files\Google\Update\GoogleUpdate.exe [?]
S2 McAfee SiteAdvisor Enterprise Service;McAfee SiteAdvisor Enterprise Service;"c:\program files\McAfee\SiteAdvisor Enterprise\McSACore.exe" --> c:\program files\McAfee\SiteAdvisor Enterprise\McSACore.exe [?]
S2 McAfeeEngineService;McAfee Engine Service;"c:\program files\McAfee\VirusScan Enterprise\engineserver.exe" --> c:\program files\McAfee\VirusScan Enterprise\engineserver.exe [?]
S2 MyDesktopWindows;MyDesktopService;c:\windows\orclobi\MyDesktop\MyDesktopService.exe --> c:\windows\orclobi\MyDesktop\MyDesktopService.exe [?]
S2 OdService;ODrive Service;c:\program files\Oracle\ODrive\XfsSvcCon.exe svcmanager --> c:\program files\Oracle\ODrive\XfsSvcCon.exe svcmanager [?]
S2 QOSMyDesktop;QOS MyDesktop;c:\windows\orclobi\MyDesktop\MyDesktopQOS.exe --> c:\windows\orclobi\MyDesktop\MyDesktopQOS.exe [?]
S2 vpnagent;Cisco AnyConnect VPN Agent;"c:\program files\Cisco\Cisco AnyConnect VPN Client\vpnagent.exe" --> c:\program files\Cisco\Cisco AnyConnect VPN Client\vpnagent.exe [?]
S3 Cam3820;Cam3820 PC Camera Driver;c:\windows\system32\drivers\cam3820a.sys [7/8/2009 3:48 PM 308096]
S3 Firehk;McAfee NDIS Intermediate Filter;c:\windows\system32\drivers\firehk.sys [10/28/2009 9:31 AM 44680]
S3 gupdatem;Google Update Service (gupdatem);c:\program files\Google\Update\GoogleUpdate.exe /medsvc --> c:\program files\Google\Update\GoogleUpdate.exe [?]
S3 MEMSWEEP2;MEMSWEEP2;\??\c:\windows\system32\3E.tmp --> c:\windows\system32\3E.tmp [?]
S3 mferkdet;McAfee Inc. mferkdet;c:\windows\system32\drivers\mferkdet.sys [10/28/2009 9:24 AM 66536]
S4 BrlAPI;BrlAPI;c:\cygwin\bin\cygrunsrv.exe [3/24/2011 7:12 PM 68096]
S4 buttonsvc32;Dell ControlPoint Button Service;c:\program files\Dell\Dell ControlPoint\DCPButtonSvc.exe [11/20/2009 5:42 PM 278304]
S4 dcpsysmgrsvc;Dell ControlPoint System Manager;c:\program files\Dell\Dell ControlPoint\System Manager\DCPSysMgrSvc.exe [2/8/2010 4:20 PM 376688]
S4 InstallFilterService;FF Install Filter Service;c:\program files\STMicroelectronics\AccelerometerP11\InstallFilterService.exe [10/25/2010 11:45 AM 60928]
S4 MsDtsServer100;SQL Server Integration Services 10.0;c:\program files\Microsoft SQL Server\100\DTS\Binn\MsDtsSrvr.exe [3/3/2011 9:50 AM 214888]
S4 MSSQLFDLauncher;SQL Full-text Filter Daemon Launcher (MSSQLSERVER);c:\program files\Microsoft SQL Server\MSSQL10.MSSQLSERVER\MSSQL\Binn\fdlauncher.exe [7/10/2008 1:15 AM 31256]
S4 MSSQLServerADHelper100;SQL Active Directory Helper Service;c:\program files\Microsoft SQL Server\100\Shared\sqladhlp.exe [7/10/2008 2:49 AM 47128]
S4 ODBTPServer;ODBTP Server;c:\odbtp\odbtpsrv.exe [3/24/2011 1:14 PM 98304]
S4 ReportServer;SQL Server Reporting Services (MSSQLSERVER);c:\program files\Microsoft SQL Server\MSRS10.MSSQLSERVER\Reporting Services\ReportServer\bin\ReportingServicesService.exe [3/3/2011 10:03 AM 1118056]
S4 RsFx0103;RsFx0103 Driver;c:\windows\system32\drivers\RsFx0103.sys [3/30/2009 3:09 AM 239336]
UnknownUnknown dsload;dsload; [x]
.
--- Other Services/Drivers In Memory ---
.
*Deregistered* - dsgrab_01cc374f761185b1
.
Contents of the 'Scheduled Tasks' folder
.
2011-09-29 c:\windows\Tasks\GoogleUpdateTaskUserS-1-5-21-22612181-1167196868-26564730-49618Core.job
- c:\documents and settings\savallu.ST-USERS\Local Settings\Application Data\Google\Update\GoogleUpdate.exe [2010-11-05 05:06]
.
2011-09-30 c:\windows\Tasks\GoogleUpdateTaskUserS-1-5-21-22612181-1167196868-26564730-49618UA.job
- c:\documents and settings\savallu.ST-USERS\Local Settings\Application Data\Google\Update\GoogleUpdate.exe [2010-11-05 05:06]
.
2011-10-01 c:\windows\Tasks\RealUpgradeLogonTaskS-1-5-21-22612181-1167196868-26564730-49618.job
- c:\program files\Real\RealUpgrade\realupgrade.exe [2010-11-05 19:33]
.
2011-09-27 c:\windows\Tasks\RealUpgradeScheduledTaskS-1-5-21-22612181-1167196868-26564730-49618.job
- c:\program files\Real\RealUpgrade\realupgrade.exe [2010-11-05 19:33]
.
.
------- Supplementary Scan -------
.
mStart Page = hxxp://my.oracle.com/
uInternet Settings,ProxyOverride = *.local
IE: Add to Google Photos Screensa&ver - c:\windows\system32\GPhotos.scr/200
IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~2\Office12\EXCEL.EXE/3000
IE: Send to &Bluetooth Device... - c:\program files\WIDCOMM\Bluetooth Software\btsendto_ie_ctx.htm
IE: Send To Bluetooth - c:\program files\WIDCOMM\Bluetooth Software\btsendto_ie.htm
Trusted Zone: oraclecorp.com\global-service
Trusted Zone: oraclecorp.com\global-service
TCP: DhcpNameServer = 192.168.0.1
.
.
**************************************************************************
.
catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2011-09-30 19:56
Windows 5.1.2600 Service Pack 3 NTFS
.
scanning hidden processes ...
.
scanning hidden autostart entries ...
.
scanning hidden files ...
.
scan completed successfully
hidden files: 0
.
**************************************************************************
.
[HKEY_LOCAL_MACHINE\System\ControlSet001\Services\MEMSWEEP2]
"ImagePath"="\??\c:\windows\system32\3E.tmp"
.
--------------------- DLLs Loaded Under Running Processes ---------------------
.
- - - - - - - > 'winlogon.exe'(1096)
c:\windows\system32\HcApi.dll
c:\windows\system32\KevlarSigs.dll
.
- - - - - - - > 'lsass.exe'(1156)
c:\windows\system32\HcApi.dll
c:\windows\system32\KevlarSigs.dll
.
- - - - - - - > 'csrss.exe'(1064)
c:\windows\system32\HcApi.dll
c:\windows\system32\KevlarSigs.dll
.
Completion time: 2011-09-30 19:58:30
ComboFix-quarantined-files.txt 2011-10-01 02:58
ComboFix2.txt 2011-10-01 02:23
.
Pre-Run: 143,594,627,072 bytes free
Post-Run: 143,587,254,272 bytes free
.
- - End Of File - - 0884FF9064836D2320E89F6D9AA99746

#8 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:09:48 AM

Posted 30 September 2011 - 10:07 PM

These logs are looking alot better. But we still have some work to do.

Please print out these instructions, or copy them to a Notepad file. It will make it easier for you to follow the instructions and complete all of the necessary steps..

uninstall some programs

1. click on start
2. then go to settings
3. after that you need control panel
4. look for the icon add/remove programs
click on the following programs

Adobe Reader 9.4.0

and click on remove

Update Adobe Reader

Recently there have been vunerabilities detected in older versions of Adobe Reader. It is strongly suggested that you update to the current version.

You can download it from http://www.adobe.com/products/acrobat/readstep2.html
After installing the latest Adobe Reader, uninstall all previous versions.
If you already have Adobe Photoshop® Album Starter Edition installed or do not wish to have it installed UNcheck the box which says Also Download Adobe Photoshop® Album Starter Edition.

If you don't like Adobe Reader (53 MB), you can download Foxit PDF Reader(7 MB) from here. It's a much smaller file to download and uses a lot less resources than Adobe Reader.

Note: When installing FoxitReader, be carefull not to install anything to do with AskBar.
[/list]
Your Java is out of date.

It can be updated by the Java control panel
  • click on Start-> Control Panel (Classic View)-> Java (looks like a coffee cup) -> Update Tab -> Update Now.
  • An update should begin;
  • follow the prompts

Clear your Java Cache

  • click on Start-> Control Panel (Classic View)-> Java (looks like a coffee cup)
    • On the General tab, under Temporary Internet Files, click the Settings button.
    • Next, click on the Delete Files button
    • There are two options in the window to clear the cache - Leave BOTH Checked
      Applications and Applets
      Trace and Log Files
  • Click OK on Delete Temporary Files Window
    Note: This deletes ALL the Downloaded Applications and Applets from the CACHE.
  • Click OK to leave the Temporary Files Window
  • Click OK to leave the Java Control Panel.

TFC(Temp File Cleaner):

  • Please download TFC to your desktop,
  • Save any unsaved work. TFC will close all open application windows.
  • Double-click TFC.exe to run the program.
  • If prompted, click "Yes" to reboot.
Note: Save your work. TFC will automatically close any open programs, let it run uninterrupted. It shouldn't take longer take a couple of minutes, and may only take a few seconds. Only if needed will you be prompted to reboot.

: Malwarebytes' Anti-Malware :

  • Please download Malwarebytes' Anti-Malware to your desktop.
  • Double-click mbam-setup.exe and follow the prompts to install the program.
  • At the end, be sure a checkmark is placed next to
    • Update Malwarebytes' Anti-Malware
    • and Launch Malwarebytes' Anti-Malware
  • then click Finish.
  • If an update is found, it will download and install the latest version.
  • Once the program has loaded, select Perform quick scan, then click Scan.
  • When the scan is complete, click OK, then Show Results to view the results.
  • Be sure that everything is Checked (ticked) except items in the C:\System Volume Information folder and click on Remove Selected.
  • When completed, a log will open in Notepad. please copy and paste the log into your next reply
    • If you accidently close it, the log file is saved here and will be named like this:
    • C:\Documents and Settings\Username\Application Data\Malwarebytes\Malwarebytes' Anti-Malware\Logs\mbam-log-date (time).txt

Note: If MBAM encounters a file that is difficult to remove, you will be presented with 1 of 2 prompts.
Click OK to either and let MBAM proceed with the disinfection process.
If asked to restart the computer, please do so immediately. Failure to reboot will prevent MBAM from removing all the malware.


Download HijackThis

  • Go Here to download HijackThis Installer
  • Save HijackThis Installer to your desktop.
  • Double-click on the HijackThis Installer icon on your desktop. (Vista and Win 7 right click and run as admin)
  • By default it will install to C:\Program Files\Trend Micro\HijackThis .
  • Click on Install.
  • It will create a HijackThis icon on the desktop.
  • Once installed it will launch Hijackthis.
  • Click on the Do a system scan and save a logfile button. It will scan and the log should open in notepad.
  • Click on Edit > Select All then click on Edit > Copy to copy the entire contents of the log.
  • Come back here to this thread and Paste the log in your next reply.
  • DO NOT use the AnalyseThis button its findings are dangerous if misinterpreted.
  • DO NOT have Hijackthis fix anything yet. Most of what it finds will be harmless or even required.


If you have problems running Hijackthis.

sometimes we have to run it like this To run HijackThis as an administrator,
rightclick HijackThis.exe (located: C:\Program Files\Trend Micro\HiJackThis\HiJackThis.exe)
and select to run as administrator

"information and logs"

  • In your next post I need the following

  • Log From MBAM
  • report from Hijackthis
  • let me know of any problems you may have had
  • How is the computer doing now?

Gringo

I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#9 KramerKelso

KramerKelso
  • Topic Starter

  • Members
  • 17 posts
  • OFFLINE
  •  
  • Local time:08:48 AM

Posted 01 October 2011 - 01:42 AM

Hi Gringo,

Followed your instructions and could successfully finish running all of them without any problems. Please find the MBAM and Hijackthis logs below.

Thanks a lot,
Kramer

--------------------------------

Log of MBAM:

Malwarebytes' Anti-Malware 1.51.2.1300
www.malwarebytes.org

Database version: 7839

Windows 5.1.2600 Service Pack 3
Internet Explorer 7.0.5730.13

9/30/2011 11:35:39 PM
mbam-log-2011-09-30 (23-35-39).txt

Scan type: Quick scan
Objects scanned: 222246
Time elapsed: 2 minute(s), 52 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 0

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
(No malicious items detected)

=====================================

Log of Hijackthis:


Logfile of Trend Micro HijackThis v2.0.4
Scan saved at 11:38:52 PM, on 9/30/2011
Platform: Windows XP SP3 (WinNT 5.01.2600)
MSIE: Internet Explorer v7.00 (7.00.6000.17099)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\McAfee\Host Intrusion Prevention\FireSvc.exe
C:\Program Files\McAfee\Host Intrusion Prevention\HIPSCore\HIPSvc.exe
C:\Program Files\Java\jre6\bin\jqs.exe
C:\Program Files\McAfee\Common Framework\FrameworkService.exe
C:\WINDOWS\system32\mfevtps.exe
C:\Program Files\Microsoft SQL Server\90\Shared\sqlwriter.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\wbem\wmiapsrv.exe
C:\Program Files\McAfee\VirusScan Enterprise\SHSTAT.EXE
C:\Program Files\DellTPad\Apoint.exe
C:\WINDOWS\system32\AESTFltr.exe
C:\Program Files\IDT\WDM\sttray.exe
C:\WINDOWS\system32\igfxtray.exe
C:\WINDOWS\system32\hkcmd.exe
C:\WINDOWS\system32\igfxpers.exe
C:\Program Files\McAfee\Common Framework\udaterui.exe
C:\Program Files\McAfee\Common Framework\UdaterUI.exe
C:\Program Files\McAfee\Host Intrusion Prevention\FireTray.exe
C:\Program Files\Common Files\Java\Java Update\jusched.exe
C:\Program Files\RocketDock\RocketDock.exe
C:\Program Files\McAfee\Common Framework\McTray.exe
C:\Program Files\WIDCOMM\Bluetooth Software\BTTray.exe
C:\PROGRA~1\WIDCOMM\BLUETO~1\BTSTAC~1.EXE
C:\WINDOWS\system32\msiexec.exe
C:\Program Files\DellTPad\ApMsgFwd.exe
C:\Program Files\DellTPad\HidFind.exe
C:\Program Files\DellTPad\Apntex.exe
C:\Program Files\Rainmeter\Rainmeter.exe
C:\Program Files\SRWare Iron\iron.exe
C:\Program Files\SRWare Iron\iron.exe
C:\Program Files\SRWare Iron\iron.exe
C:\Program Files\SRWare Iron\iron.exe
C:\Program Files\TextPad 5\TextPad.exe
C:\Program Files\Trend Micro\HiJackThis\HiJackThis.exe
C:\WINDOWS\system32\igfxsrvc.exe

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://my.oracle.com/
R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = *.local
R3 - URLSearchHook: (no name) - - (no file)
R3 - URLSearchHook: (no name) - {472734EA-242A-422b-ADF8-83D1E48CC825} - (no file)
O2 - BHO: (no name) - {02478D38-C3F9-4efb-9B51-7695ECA05670} - (no file)
O2 - BHO: RealPlayer Download and Record Plugin for Internet Explorer - {3049C3E9-B461-4BC5-8870-4C09146192CA} - C:\Documents and Settings\All Users\Application Data\Real\RealPlayer\BrowserRecordPlugin\IE\rpbrowserrecordplugin.dll
O2 - BHO: Spybot-S&D IE Protection - {53707962-6F74-2D53-2644-206D7942484F} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O2 - BHO: Oracle Drive Helper Object - {5D33B3E0-4FB3-4ED1-9106-B6EB06A3B7C2} - C:\WINDOWS\SYSTEM32\ODriveHelper.DLL
O2 - BHO: McAfee SiteAdvisor BHO - {B164E929-A1B6-4A06-B104-2CD0E90A88FF} - C:\Program Files\McAfee\SiteAdvisor Enterprise\McIEPlg.dll
O2 - BHO: Java™ Plug-In 2 SSV Helper - {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Program Files\Java\jre6\bin\jp2ssv.dll
O2 - BHO: JQSIEStartDetectorImpl - {E7E6F031-17CE-4C07-BC86-EABFE594F69C} - C:\Program Files\Java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll
O3 - Toolbar: McAfee SiteAdvisor Toolbar - {0EBBBE48-BAD4-4B4C-8E5A-516ABECAE064} - C:\Program Files\McAfee\SiteAdvisor Enterprise\McIEPlg.dll
O4 - HKLM\..\Run: [IMJPMIG8.1] "C:\WINDOWS\IME\imjp8_1\IMJPMIG.EXE" /Spoil /RemAdvDef /Migration32
O4 - HKLM\..\Run: [PHIME2002ASync] C:\WINDOWS\system32\IME\TINTLGNT\TINTSETP.EXE /SYNC
O4 - HKLM\..\Run: [PHIME2002A] C:\WINDOWS\system32\IME\TINTLGNT\TINTSETP.EXE /IMEName
O4 - HKLM\..\Run: [ShStatEXE] "C:\Program Files\McAfee\VirusScan Enterprise\SHSTAT.EXE" /STANDALONE
O4 - HKLM\..\Run: [Apoint] C:\Program Files\DellTPad\Apoint.exe
O4 - HKLM\..\Run: [MSPY2002] C:\WINDOWS\system32\IME\PINTLGNT\ImScInst.exe /SYNC
O4 - HKLM\..\Run: [AESTFltr] %SystemRoot%\system32\AESTFltr.exe /NoDlg
O4 - HKLM\..\Run: [SysTrayApp] %ProgramFiles%\IDT\WDM\sttray.exe
O4 - HKLM\..\Run: [IgfxTray] C:\WINDOWS\system32\igfxtray.exe
O4 - HKLM\..\Run: [HotKeysCmds] C:\WINDOWS\system32\hkcmd.exe
O4 - HKLM\..\Run: [Persistence] C:\WINDOWS\system32\igfxpers.exe
O4 - HKLM\..\Run: [ntpgds] C:\WINDOWS\orclobi\synctime.exe
O4 - HKLM\..\Run: [McAfeeUpdaterUI] "C:\Program Files\McAfee\Common Framework\udaterui.exe" /StartedFromRunKey
O4 - HKLM\..\Run: [McAfee Host Intrusion Prevention Tray] "C:\Program Files\McAfee\Host Intrusion Prevention\FireTray.exe"
O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Common Files\Java\Java Update\jusched.exe"
O4 - HKLM\..\RunOnce: [Malwarebytes' Anti-Malware] C:\Program Files\Malwarebytes' Anti-Malware\mbamgui.exe /install /silent
O4 - HKCU\..\Run: [SpybotSD TeaTimer] C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
O4 - HKCU\..\Run: [RocketDock] "C:\Program Files\RocketDock\RocketDock.exe"
O4 - HKUS\S-1-5-18\..\RunOnce: [FirefoxConfig] C:\WINDOWS\orclobi\config\openofficeconfig.exe (User 'SYSTEM')
O4 - HKUS\S-1-5-18\..\RunOnce: [ThunderbirdConfig] C:\WINDOWS\orclobi\config\thunderbirdconfig.exe (User 'SYSTEM')
O4 - HKUS\S-1-5-18\..\RunOnce: [LightningConfig] C:\WINDOWS\orclobi\config\lightningconfig.exe (User 'SYSTEM')
O4 - HKUS\S-1-5-18\..\RunOnce: [disable_hibernation] C:\WINDOWS\ORCLOBI\Temp\disable_hibernation.bat (User 'SYSTEM')
O4 - HKUS\.DEFAULT\..\RunOnce: [FirefoxConfig] C:\WINDOWS\orclobi\config\openofficeconfig.exe (User 'Default user')
O4 - Startup: Rainmeter.lnk = C:\Program Files\Rainmeter\Rainmeter.exe
O4 - Global Startup: Bluetooth.lnk = ?
O4 - Global Startup: MultiMon Taskbar.lnk = C:\Program Files\MMTaskbar\MultiMon.exe
O4 - Global Startup: VPN Client.lnk = ?
O8 - Extra context menu item: Add to Google Photos Screensa&ver - res://C:\WINDOWS\system32\GPhotos.scr/200
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\Office12\EXCEL.EXE/3000
O8 - Extra context menu item: Send to &Bluetooth Device... - C:\Program Files\WIDCOMM\Bluetooth Software\btsendto_ie_ctx.htm
O8 - Extra context menu item: Send To Bluetooth - C:\Program Files\WIDCOMM\Bluetooth Software\btsendto_ie.htm
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\Office12\REFIEBAR.DLL
O9 - Extra button: @btrez.dll,-4015 - {CCA281CA-C863-46ef-9331-5C8D4460577F} - C:\Program Files\WIDCOMM\Bluetooth Software\btsendto_ie.htm
O9 - Extra 'Tools' menuitem: @btrez.dll,-12650 - {CCA281CA-C863-46ef-9331-5C8D4460577F} - C:\Program Files\WIDCOMM\Bluetooth Software\btsendto_ie.htm
O9 - Extra button: (no name) - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O9 - Extra 'Tools' menuitem: Spybot - Search & Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe (file missing)
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe (file missing)
O16 - DPF: {3EA4FA88-E0BE-419A-A732-9B79B87A6ED0} (CTVUAxCtrl Object) - http://dl.tvunetworks.com/TVUAx.cab
O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} (WUWebControl Class) - http://update.microsoft.com/windowsupdate/v6/V5Controls/en/x86/client/wuweb_site.cab?1256749179093
O16 - DPF: {E06E2E99-0AA1-11D4-ABA6-0060082AA75C} (GpcContainer Class) - https://ouweb.webex.com/client/T27LB/training/ieatgpc.cab
O16 - DPF: {E2883E8F-472F-4FB0-9522-AC9BF37916A7} - http://platformdl.adobe.com/NOS/getPlusPlus/1.6/gp.cab
O17 - HKLM\System\CCS\Services\Tcpip\Parameters: Domain = st-users.us.oracle.com
O17 - HKLM\Software\..\Telephony: DomainName = st-users.us.oracle.com
O17 - HKLM\System\CCS\Services\Tcpip\..\{5CC236F4-AB5D-4373-B340-E52ABE80D9E2}: Domain = us.oracle.com
O17 - HKLM\System\CS1\Services\Tcpip\Parameters: Domain = st-users.us.oracle.com
O18 - Protocol: dssrequest - {5513F07E-936B-4E52-9B00-067394E91CC5} - C:\Program Files\McAfee\SiteAdvisor Enterprise\McIEPlg.dll
O18 - Protocol: sacore - {5513F07E-936B-4E52-9B00-067394E91CC5} - C:\Program Files\McAfee\SiteAdvisor Enterprise\McIEPlg.dll
O22 - SharedTaskScheduler: Browseui preloader - {438755C2-A8BA-11D1-B96B-00A0C90312E1} - C:\WINDOWS\system32\browseui.dll
O22 - SharedTaskScheduler: Component Categories cache daemon - {8C7461EF-2B13-11d2-BE35-3078302C2030} - C:\WINDOWS\system32\browseui.dll
O23 - Service: Bluetooth Service (btwdins) - Unknown owner - C:\Program Files\WIDCOMM\Bluetooth Software\bin\btwdins.exe (file missing)
O23 - Service: Cisco Systems, Inc. VPN Service (CVPND) - Unknown owner - C:\Program Files\Cisco Systems\VPN Client\cvpnd.exe (file missing)
O23 - Service: McAfee Host Intrusion Prevention Service (enterceptAgent) - McAfee, Inc. - C:\Program Files\McAfee\Host Intrusion Prevention\FireSvc.exe
O23 - Service: Google Update Service (gupdate) (gupdate) - Unknown owner - C:\Program Files\Google\Update\GoogleUpdate.exe (file missing)
O23 - Service: Google Update Service (gupdatem) (gupdatem) - Unknown owner - C:\Program Files\Google\Update\GoogleUpdate.exe (file missing)
O23 - Service: Google Updater Service (gusvc) - Unknown owner - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe (file missing)
O23 - Service: McAfee HIPSCore Service (hips) - McAfee, Inc. - C:\Program Files\McAfee\Host Intrusion Prevention\HIPSCore\HIPSvc.exe
O23 - Service: Java Quick Starter (JavaQuickStarterService) - Sun Microsystems, Inc. - C:\Program Files\Java\jre6\bin\jqs.exe
O23 - Service: McAfee SiteAdvisor Enterprise Service - Unknown owner - C:\Program Files\McAfee\SiteAdvisor Enterprise\McSACore.exe (file missing)
O23 - Service: McAfee Engine Service (McAfeeEngineService) - Unknown owner - C:\Program Files\McAfee\VirusScan Enterprise\engineserver.exe (file missing)
O23 - Service: McAfee Framework Service (McAfeeFramework) - McAfee, Inc. - C:\Program Files\McAfee\Common Framework\FrameworkService.exe
O23 - Service: McAfee McShield (McShield) - Unknown owner - C:\Program Files\McAfee\VirusScan Enterprise\mcshield.exe
O23 - Service: McAfee Task Manager (McTaskManager) - Unknown owner - C:\Program Files\McAfee\VirusScan Enterprise\vstskmgr.exe (file missing)
O23 - Service: McAfee Validation Trust Protection Service (mfevtp) - McAfee, Inc. - C:\WINDOWS\system32\mfevtps.exe
O23 - Service: MyDesktopService (MyDesktopWindows) - Unknown owner - C:\WINDOWS\orclobi\MyDesktop\MyDesktopService.exe (file missing)
O23 - Service: NMSAccessU - Unknown owner - C:\Program Files\CDBurnerXP\NMSAccessU.exe (file missing)
O23 - Service: ODrive Service (OdService) - Unknown owner - C:\Program Files\Oracle\ODrive\XfsSvcCon.exe (file missing)
O23 - Service: OpenVPN Service (OpenVPNService) - Unknown owner - C:\Program Files\OpenVPN\bin\openvpnserv.exe
O23 - Service: QOS MyDesktop (QOSMyDesktop) - Unknown owner - C:\WINDOWS\orclobi\MyDesktop\MyDesktopQOS.exe (file missing)
O23 - Service: Audio Service (STacSV) - Unknown owner - c:\drivers\audio\r255264\wdm\stacsv.exe (file missing)
O23 - Service: Cisco AnyConnect VPN Agent (vpnagent) - Unknown owner - C:\Program Files\Cisco\Cisco AnyConnect VPN Client\vpnagent.exe (file missing)

--
End of file - 12112 bytes

#10 KramerKelso

KramerKelso
  • Topic Starter

  • Members
  • 17 posts
  • OFFLINE
  •  
  • Local time:08:48 AM

Posted 02 October 2011 - 11:15 PM

Bumping the topic:

Hi Gringo,

Could you please let me know the next step? I really appreciate your help.

Regards,
Kramer

#11 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:09:48 AM

Posted 03 October 2011 - 12:39 PM

Greetings

Sory for the delay have been mad busy the last few days

These logs are looking very good, we are almost done!!! Just one more scan to go.

:Remove unneeded startup entries:

This part of the fix is purely optional
These are programs that start up when you turn on your computer but don't need to be, any of these programs you can click on their icons (or start from the control panel) and start the program when you need it. By stopping these programs you will boot up faster and your computer will work faster.

  • Run HijackThis
  • Click on the Scan button
  • Put a check beside all of the items listed below (if present):

    • O4 - HKLM\..\Run: [SysTrayApp] %ProgramFiles%\IDT\WDM\sttray.exe
      O4 - HKLM\..\Run: [IgfxTray] C:\WINDOWS\system32\igfxtray.exe
      O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Common Files\Java\Java Update\jusched.exe"
      O4 - HKCU\..\Run: [RocketDock] "C:\Program Files\RocketDock\RocketDock.exe"
      O4 - Startup: Rainmeter.lnk = C:\Program Files\Rainmeter\Rainmeter.exe
  • Close all open windows and browsers/email, etc...
  • Click on the "Fix Checked" button
  • When completed, close the application.

    NOTE**You can research each of those lines >here< and see if you want to keep them or not
    just copy the name between the brakets and paste into the search space
    O4 - HKLM\..\Run: [IntelliPoint]



If you have any problems running Hijackthis.

sometimes we have to run it like this To run HijackThis as an administrator,
rightclick HijackThis.exe (located: C:\Program Files\Trend Micro\HiJackThis\HiJackThis.exe)
and select to run as administrator


Eset Online Scanner

**Note** You will need to use Internet explorer for this scan - Vista and win 7 right click on IE shortcut and run as admin

Go Eset web page to run an online scannner from ESET.

  • Turn off the real time scanner of any existing antivirus program while performing the online scan
  • click on the ESET Online Scanner button
  • Tick the box next to YES, I accept the Terms of Use.
    • Click Start
  • When asked, allow the activex control to install
    • Click Start
  • Make sure that the option Remove found threats is unticked and the Scan Archives option is ticked.
  • Click on Advanced Settings, ensure the options
    Scan for potentially unwanted applications, Scan for potentially unsafe applications, and Enable Anti-Stealth Technology are ticked.
  • Click Scan
  • Wait for the scan to finish
  • Click on copy to clipboard and paste the results here in this topic
  • you may also find here C:\Program Files\Eset\Eset Online Scanner\log.txt
Copy and paste that log as a reply to this topic

Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#12 KramerKelso

KramerKelso
  • Topic Starter

  • Members
  • 17 posts
  • OFFLINE
  •  
  • Local time:08:48 AM

Posted 04 October 2011 - 01:02 AM

Hi Gringo,

Thank you for the reply. I followed your instructions and please find below the log of ESET scanner.

Thanks a lot for helping me out with this in spite of your busy schedule.

Regards,
Kramer

---------------------------------------------------------------


ESETSmartInstaller@High as CAB hook log:
OnlineScanner.ocx - registred OK
Update failed (41217). Trying proxy abc.abc.com80
finished. ret_update=-1 e_gle=41221
Update failed (41221). Trying proxy abc.abc.com80
finished. ret_update=-1 e_gle=41221
esets_scanner_update returned -1 esets_gle=1
esets_scanner_update returned -1 esets_gle=41221
Update failed (41217). Trying proxy abc.abc.com80
finished. ret_update=-1 e_gle=41221
Update failed (41221). Trying proxy abc.abc.com80
finished. ret_update=-1 e_gle=41221
esets_scanner_update returned -1 esets_gle=1
# version=7
# IEXPLORE.EXE=7.00.6000.17099 (vista_gdr.110617-1500)
# OnlineScanner.ocx=1.0.0.6528
# api_version=3.0.2
# EOSSerial=744997124d8e4c4ab48db0b316fb5393
# end=finished
# remove_checked=false
# archives_checked=true
# unwanted_checked=true
# unsafe_checked=true
# antistealth_checked=true
# utc_time=2011-10-04 05:46:04
# local_time=2011-10-03 10:46:04 (-0800, Pacific Daylight Time)
# country="United States"
# lang=1033
# osver=5.1.2600 NT Service Pack 3
# compatibility_mode=512 16777215 100 0 0 0 0 0
# compatibility_mode=8192 67108863 100 0 0 0 0 0
# scanned=408457
# found=73
# cleaned=0
# scan_time=12311
C:\Downloads\SoftonicDownloader_for_transbar (1).exe a variant of Win32/SoftonicDownloader.A application (unable to clean) 00000000000000000000000000000000 I
C:\Downloads\SoftonicDownloader_for_transbar.exe a variant of Win32/SoftonicDownloader.A application (unable to clean) 00000000000000000000000000000000 I
C:\Program Files\McAfee\Common Framework\naPrdMgr.exe Win32/Patched.HN trojan (unable to clean) 00000000000000000000000000000000 I
C:\Qoobox\Quarantine\C\DRIVERS\audio\R255264\WDM\stacsv.exe.vir Win32/Patched.HN trojan (unable to clean) 00000000000000000000000000000000 I
C:\Qoobox\Quarantine\C\Program Files\CDBurnerXP\NMSAccessU.exe.vir Win32/Patched.HN trojan (unable to clean) 00000000000000000000000000000000 I
C:\Qoobox\Quarantine\C\Program Files\Cisco\Cisco AnyConnect VPN Client\vpnagent.exe.vir Win32/Patched.HN trojan (unable to clean) 00000000000000000000000000000000 I
C:\Qoobox\Quarantine\C\Program Files\Cisco Systems\VPN Client\cvpnd.exe.vir Win32/Patched.HN trojan (unable to clean) 00000000000000000000000000000000 I
C:\Qoobox\Quarantine\C\Program Files\Google\Update\GoogleUpdate.exe.vir Win32/Patched.HN trojan (unable to clean) 00000000000000000000000000000000 I
C:\Qoobox\Quarantine\C\Program Files\McAfee\Common Framework\FrameworkService.exe.vir Win32/Patched.HN trojan (unable to clean) 00000000000000000000000000000000 I
C:\Qoobox\Quarantine\C\Program Files\McAfee\SiteAdvisor Enterprise\McSACore.exe.vir Win32/Patched.HN trojan (unable to clean) 00000000000000000000000000000000 I
C:\Qoobox\Quarantine\C\Program Files\McAfee\VirusScan Enterprise\engineserver.exe.vir Win32/Patched.HN trojan (unable to clean) 00000000000000000000000000000000 I
C:\Qoobox\Quarantine\C\Program Files\McAfee\VirusScan Enterprise\vstskmgr.exe.vir Win32/Patched.HN trojan (unable to clean) 00000000000000000000000000000000 I
C:\Qoobox\Quarantine\C\Program Files\Oracle\ODrive\XfsSvcCon.exe.vir Win32/Patched.HN trojan (unable to clean) 00000000000000000000000000000000 I
C:\Qoobox\Quarantine\C\Program Files\WIDCOMM\Bluetooth Software\bin\btwdins.exe.vir Win32/Patched.HN trojan (unable to clean) 00000000000000000000000000000000 I
C:\Qoobox\Quarantine\C\WINDOWS\assembly\GAC_MSIL\desktop.ini.vir a variant of Win32/Sirefef.CH trojan (unable to clean) 00000000000000000000000000000000 I
C:\Qoobox\Quarantine\C\WINDOWS\OrclOBI\MyDesktop\MyDesktopQOS.exe.vir Win32/Patched.HN trojan (unable to clean) 00000000000000000000000000000000 I
C:\Qoobox\Quarantine\C\WINDOWS\OrclOBI\MyDesktop\MyDesktopService.exe.vir Win32/Patched.HN trojan (unable to clean) 00000000000000000000000000000000 I
C:\Qoobox\Quarantine\C\WINDOWS\system32\c_34041.nl_.vir a variant of Win32/Sirefef.CR trojan (unable to clean) 00000000000000000000000000000000 I
C:\Qoobox\Quarantine\C\WINDOWS\system32\mfevtps.exe.vir Win32/Patched.HN trojan (unable to clean) 00000000000000000000000000000000 I
C:\Qoobox\Quarantine\C\WINDOWS\system32\Drivers\cdrom.sys.vir a variant of Win32/Rootkit.Kryptik.DM trojan (unable to clean) 00000000000000000000000000000000 I
C:\System Volume Information\_restore{133E536C-CC44-458A-8BC6-FD65C45EB3FA}\RP2\A0001082.sys a variant of Win32/Rootkit.Kryptik.DM trojan (unable to clean) 00000000000000000000000000000000 I
C:\System Volume Information\_restore{133E536C-CC44-458A-8BC6-FD65C45EB3FA}\RP2\A0001119.sys a variant of Win32/Rootkit.Kryptik.DM trojan (unable to clean) 00000000000000000000000000000000 I
C:\System Volume Information\_restore{133E536C-CC44-458A-8BC6-FD65C45EB3FA}\RP3\A0001211.sys a variant of Win32/Rootkit.Kryptik.DM trojan (unable to clean) 00000000000000000000000000000000 I
C:\System Volume Information\_restore{133E536C-CC44-458A-8BC6-FD65C45EB3FA}\RP3\A0001244.ini a variant of Win32/Sirefef.CH trojan (unable to clean) 00000000000000000000000000000000 I
C:\System Volume Information\_restore{133E536C-CC44-458A-8BC6-FD65C45EB3FA}\RP3\A0001292.sys a variant of Win32/Rootkit.Kryptik.DM trojan (unable to clean) 00000000000000000000000000000000 I
C:\System Volume Information\_restore{133E536C-CC44-458A-8BC6-FD65C45EB3FA}\RP3\A0001293.ini a variant of Win32/Sirefef.CH trojan (unable to clean) 00000000000000000000000000000000 I
C:\System Volume Information\_restore{133E536C-CC44-458A-8BC6-FD65C45EB3FA}\RP3\A0001396.sys a variant of Win32/Rootkit.Kryptik.DM trojan (unable to clean) 00000000000000000000000000000000 I
C:\System Volume Information\_restore{133E536C-CC44-458A-8BC6-FD65C45EB3FA}\RP3\A0001397.ini a variant of Win32/Sirefef.CH trojan (unable to clean) 00000000000000000000000000000000 I
C:\System Volume Information\_restore{133E536C-CC44-458A-8BC6-FD65C45EB3FA}\RP3\A0001438.sys a variant of Win32/Rootkit.Kryptik.DM trojan (unable to clean) 00000000000000000000000000000000 I
C:\System Volume Information\_restore{133E536C-CC44-458A-8BC6-FD65C45EB3FA}\RP3\A0001439.ini a variant of Win32/Sirefef.CH trojan (unable to clean) 00000000000000000000000000000000 I
C:\System Volume Information\_restore{133E536C-CC44-458A-8BC6-FD65C45EB3FA}\RP3\A0002438.sys a variant of Win32/Rootkit.Kryptik.DM trojan (unable to clean) 00000000000000000000000000000000 I
C:\System Volume Information\_restore{133E536C-CC44-458A-8BC6-FD65C45EB3FA}\RP3\A0002439.ini a variant of Win32/Sirefef.CH trojan (unable to clean) 00000000000000000000000000000000 I
C:\System Volume Information\_restore{133E536C-CC44-458A-8BC6-FD65C45EB3FA}\RP4\A0002528.sys a variant of Win32/Rootkit.Kryptik.DM trojan (unable to clean) 00000000000000000000000000000000 I
C:\System Volume Information\_restore{133E536C-CC44-458A-8BC6-FD65C45EB3FA}\RP4\A0002529.ini a variant of Win32/Sirefef.CH trojan (unable to clean) 00000000000000000000000000000000 I
C:\System Volume Information\_restore{133E536C-CC44-458A-8BC6-FD65C45EB3FA}\RP4\A0002580.sys a variant of Win32/Rootkit.Kryptik.DM trojan (unable to clean) 00000000000000000000000000000000 I
C:\System Volume Information\_restore{133E536C-CC44-458A-8BC6-FD65C45EB3FA}\RP4\A0002581.ini a variant of Win32/Sirefef.CH trojan (unable to clean) 00000000000000000000000000000000 I
C:\System Volume Information\_restore{133E536C-CC44-458A-8BC6-FD65C45EB3FA}\RP4\A0003580.sys a variant of Win32/Rootkit.Kryptik.DM trojan (unable to clean) 00000000000000000000000000000000 I
C:\System Volume Information\_restore{133E536C-CC44-458A-8BC6-FD65C45EB3FA}\RP4\A0003581.ini a variant of Win32/Sirefef.CH trojan (unable to clean) 00000000000000000000000000000000 I
C:\System Volume Information\_restore{133E536C-CC44-458A-8BC6-FD65C45EB3FA}\RP4\A0003644.sys a variant of Win32/Rootkit.Kryptik.DM trojan (unable to clean) 00000000000000000000000000000000 I
C:\System Volume Information\_restore{133E536C-CC44-458A-8BC6-FD65C45EB3FA}\RP4\A0003645.ini a variant of Win32/Sirefef.CH trojan (unable to clean) 00000000000000000000000000000000 I
C:\System Volume Information\_restore{133E536C-CC44-458A-8BC6-FD65C45EB3FA}\RP4\A0003693.sys a variant of Win32/Rootkit.Kryptik.DM trojan (unable to clean) 00000000000000000000000000000000 I
C:\System Volume Information\_restore{133E536C-CC44-458A-8BC6-FD65C45EB3FA}\RP4\A0003694.ini a variant of Win32/Sirefef.CH trojan (unable to clean) 00000000000000000000000000000000 I
C:\System Volume Information\_restore{133E536C-CC44-458A-8BC6-FD65C45EB3FA}\RP4\A0004693.sys a variant of Win32/Rootkit.Kryptik.DM trojan (unable to clean) 00000000000000000000000000000000 I
C:\System Volume Information\_restore{133E536C-CC44-458A-8BC6-FD65C45EB3FA}\RP4\A0004694.ini a variant of Win32/Sirefef.CH trojan (unable to clean) 00000000000000000000000000000000 I
C:\System Volume Information\_restore{133E536C-CC44-458A-8BC6-FD65C45EB3FA}\RP4\A0004739.sys a variant of Win32/Rootkit.Kryptik.DM trojan (unable to clean) 00000000000000000000000000000000 I
C:\System Volume Information\_restore{133E536C-CC44-458A-8BC6-FD65C45EB3FA}\RP4\A0004740.ini a variant of Win32/Sirefef.CH trojan (unable to clean) 00000000000000000000000000000000 I
C:\System Volume Information\_restore{133E536C-CC44-458A-8BC6-FD65C45EB3FA}\RP4\A0004750.sys a variant of Win32/Rootkit.Kryptik.DM trojan (unable to clean) 00000000000000000000000000000000 I
C:\System Volume Information\_restore{133E536C-CC44-458A-8BC6-FD65C45EB3FA}\RP4\A0004751.ini a variant of Win32/Sirefef.CH trojan (unable to clean) 00000000000000000000000000000000 I
C:\System Volume Information\_restore{133E536C-CC44-458A-8BC6-FD65C45EB3FA}\RP4\A0004756.sys a variant of Win32/Rootkit.Kryptik.DM trojan (unable to clean) 00000000000000000000000000000000 I
C:\System Volume Information\_restore{133E536C-CC44-458A-8BC6-FD65C45EB3FA}\RP4\A0004757.ini a variant of Win32/Sirefef.CH trojan (unable to clean) 00000000000000000000000000000000 I
C:\System Volume Information\_restore{133E536C-CC44-458A-8BC6-FD65C45EB3FA}\RP4\A0004793.sys a variant of Win32/Rootkit.Kryptik.DM trojan (unable to clean) 00000000000000000000000000000000 I
C:\System Volume Information\_restore{133E536C-CC44-458A-8BC6-FD65C45EB3FA}\RP4\A0004794.ini a variant of Win32/Sirefef.CH trojan (unable to clean) 00000000000000000000000000000000 I
C:\System Volume Information\_restore{133E536C-CC44-458A-8BC6-FD65C45EB3FA}\RP4\A0004812.exe Win32/Patched.HN trojan (unable to clean) 00000000000000000000000000000000 I
C:\System Volume Information\_restore{133E536C-CC44-458A-8BC6-FD65C45EB3FA}\RP4\A0004822.sys a variant of Win32/Rootkit.Kryptik.DM trojan (unable to clean) 00000000000000000000000000000000 I
C:\System Volume Information\_restore{133E536C-CC44-458A-8BC6-FD65C45EB3FA}\RP4\A0004823.ini a variant of Win32/Sirefef.CH trojan (unable to clean) 00000000000000000000000000000000 I
C:\System Volume Information\_restore{133E536C-CC44-458A-8BC6-FD65C45EB3FA}\RP4\A0004853.sys a variant of Win32/Rootkit.Kryptik.DM trojan (unable to clean) 00000000000000000000000000000000 I
C:\System Volume Information\_restore{133E536C-CC44-458A-8BC6-FD65C45EB3FA}\RP4\A0004900.exe Win32/Patched.HN trojan (unable to clean) 00000000000000000000000000000000 I
C:\System Volume Information\_restore{133E536C-CC44-458A-8BC6-FD65C45EB3FA}\RP4\A0004901.exe Win32/Patched.HN trojan (unable to clean) 00000000000000000000000000000000 I
C:\System Volume Information\_restore{133E536C-CC44-458A-8BC6-FD65C45EB3FA}\RP4\A0004902.exe Win32/Patched.HN trojan (unable to clean) 00000000000000000000000000000000 I
C:\System Volume Information\_restore{133E536C-CC44-458A-8BC6-FD65C45EB3FA}\RP4\A0004903.exe Win32/Patched.HN trojan (unable to clean) 00000000000000000000000000000000 I
C:\System Volume Information\_restore{133E536C-CC44-458A-8BC6-FD65C45EB3FA}\RP4\A0004904.exe Win32/Patched.HN trojan (unable to clean) 00000000000000000000000000000000 I
C:\System Volume Information\_restore{133E536C-CC44-458A-8BC6-FD65C45EB3FA}\RP4\A0004905.exe Win32/Patched.HN trojan (unable to clean) 00000000000000000000000000000000 I
C:\System Volume Information\_restore{133E536C-CC44-458A-8BC6-FD65C45EB3FA}\RP4\A0004906.exe Win32/Patched.HN trojan (unable to clean) 00000000000000000000000000000000 I
C:\System Volume Information\_restore{133E536C-CC44-458A-8BC6-FD65C45EB3FA}\RP4\A0004907.exe Win32/Patched.HN trojan (unable to clean) 00000000000000000000000000000000 I
C:\System Volume Information\_restore{133E536C-CC44-458A-8BC6-FD65C45EB3FA}\RP4\A0004908.exe Win32/Patched.HN trojan (unable to clean) 00000000000000000000000000000000 I
C:\System Volume Information\_restore{133E536C-CC44-458A-8BC6-FD65C45EB3FA}\RP4\A0004909.exe Win32/Patched.HN trojan (unable to clean) 00000000000000000000000000000000 I
C:\System Volume Information\_restore{133E536C-CC44-458A-8BC6-FD65C45EB3FA}\RP4\A0004910.exe Win32/Patched.HN trojan (unable to clean) 00000000000000000000000000000000 I
C:\System Volume Information\_restore{133E536C-CC44-458A-8BC6-FD65C45EB3FA}\RP4\A0004911.exe Win32/Patched.HN trojan (unable to clean) 00000000000000000000000000000000 I
C:\System Volume Information\_restore{133E536C-CC44-458A-8BC6-FD65C45EB3FA}\RP4\A0004912.exe Win32/Patched.HN trojan (unable to clean) 00000000000000000000000000000000 I
C:\System Volume Information\_restore{133E536C-CC44-458A-8BC6-FD65C45EB3FA}\RP4\A0004913.exe Win32/Patched.HN trojan (unable to clean) 00000000000000000000000000000000 I
D:\Install\SoftonicDownloader_for_pnotes.exe a variant of Win32/SoftonicDownloader.A application (unable to clean) 00000000000000000000000000000000 I
D:\Install\winamp5581_full_emusic-7plus_en-us.exe Win32/OpenCandy application (unable to clean) 00000000000000000000000000000000 I
D:\Install\winscp429setup.exe Win32/OpenCandy application (unable to clean) 00000000000000000000000000000000 I

Edited by KramerKelso, 04 October 2011 - 01:03 AM.


#13 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:09:48 AM

Posted 04 October 2011 - 10:43 AM

Hello

There are some minor things in your online scan that should be removed.


delete files

  • Copy all text in the quote box (below)...to Notepad.

    @echo off
    del /f /s /q "C:\Downloads\SoftonicDownloader_for_transbar (1).exe"
    del /f /s /q "C:\Downloads\SoftonicDownloader_for_transbar.exe"
    del /f /s /q "C:\Program Files\McAfee\Common Framework\naPrdMgr.exe"
    del /f /s /q "D:\Install\SoftonicDownloader_for_pnotes.exe"
    del /f /s /q "D:\Install\winamp5581_full_emusic-7plus_en-us.exe"
    del /f /s /q "D:\Install\winscp429setup.exe"
    del %0

  • Save the Notepad file on your desktop...as delfile.bat... save type as "All Files"
    It should look like this: Posted Image<--XPPosted Image<--vista
  • Double click on delfile.bat to execute it.
    A black CMD window will flash, then disappear...this is normal.
  • The files and folders, if found...will have been deleted and the "delfile.bat" file will also be deleted.


The rest of the Online scan is only reporting backups created during the course of this fix C:\Qoobox\Quarantine\, and/or items located in System Restore's cache C:\System Volume Information\, Whatever is in these folders can't harm you unless you choose to perform a manual restore. the following steps will remove these backups.


Very well done!! This is my general post for when your logs show no more signs of malware - Please let me know if you still are having problems with your computer and what these problems are.


The following procedure will implement some cleanup procedures. It will also reset your System Restore by flushing out previous restore points and create a new restore point. It will also remove all the backups our tools may have made.

Any programs and logs that are left over you can just be deleted from the desktop. TFC is a free temp file cleaner that is very easy to use, I would keep this and use before you do any scans or when you want to free up some space.

:DeFogger:

  • To re-enable your Emulation drivers, double click DeFogger to run the tool.
  • The application window will appear
  • Click the Re-enable button to re-enable your CD Emulation drivers
  • Click Yes to continue
  • A 'Finished!' message will appear
  • Click OK
  • DeFogger will now ask to reboot the machine - click OK
Your Emulation drivers are now re-enabled.


:Uninstall ComboFix:

  • turn off all active protection software
  • push the "windows key" + "R" (between the "Ctrl" button and "Alt" Button)
  • please copy and past the following into the box ComboFix /Uninstall and click OK.
  • Note the space between the X and the /Uninstall, it needs to be there.
  • Posted Image


:remove tools:

Please download OTCleanIt and save it to desktop. This tool will remove all the tools we used to clean your pc.
  • Double-click OTCleanIt.exe.
  • Click the CleanUp! button.
  • Select Yes when the "Begin cleanup Process?" prompt appears.
  • If you are prompted to Reboot during the cleanup, select Yes.
  • The tool will delete itself once it finishes, if not delete it by yourself.
  • If asked to restart the computer, please do so
Note: If you receive a warning from your firewall or other security programs regarding OTCleanIt attempting to contact the internet, please allow it to do so.


:Make your Internet Explorer more secure:

  • From within Internet Explorer click on the Tools menu and then click on Options.
  • Click once on the Security tab
  • Click once on the Internet icon so it becomes highlighted.
  • Click once on the Custom Level button.
  • Change the Download signed ActiveX controls to Prompt
  • Change the Download unsigned ActiveX controls to Disable
  • Change the Initialise and script ActiveX controls not marked as safe to Disable
  • Change the Installation of desktop items to Prompt
  • Change the Launching programs and files in an IFRAME to Prompt
  • When all these settings have been made, click on the OK button.
  • If it prompts you as to whether or not you want to save the settings, press the Yes button.
    Next press the Apply button and then the OK to exit the Internet Properties page.


:Make Firefox more secure:

please visit this page to explain how to make Firefox more secure - How to Secure Firefox


Make sure your applications have all of their updates

It is also possible for other programs on your computer to have security vulnerability that can allow malware to infect you. Therefore, it is also a good idea to check for the latest versions of commonly installed applications that are regularly patched to fix vulnerabilities. You can check these by visiting Secunia Software Inspector


:Turn On Automatic Updates:

Turn On Automatic Updates
1. Click Start, click Run, type sysdm.cpl, and then press ENTER.
2. Click the Automatic Updates tab, and then click to select one of the following options. We recommend that you select the Automatic (recommended) Automatically download recommended updates for my computer and install them

If you click this setting, click to select the day and time for scheduled updates to occur. You can schedule Automatic Updates for any time of day. Remember, your computer must be on at the scheduled time for updates to be installed. After you set this option, Windows recognizes when you are online and uses your Internet connection to find updates on the Windows Update Web site or on the Microsoft Update Web site that apply to your computer. Updates are downloaded automatically in the background, and you are not notified or interrupted during this process. An icon appears in the notification area of your taskbar when the updates are being downloaded. You can point to the icon to view the download status. To pause or to resume the download, right-click the icon, and then click Pause or Resume. When the download is completed, another message appears in the notification area so that you can review the updates that are scheduled for installation. If you choose not to install at that time, Windows starts the installation on your set schedule.

or visit http://www.windowsupdate.com regularly. This will ensure your computer has always the latest security updates available installed on your computer. If there are new updates to install, install them immediately, reboot your computer, and revisit the site until there are no more critical updates.

:antispyware programs:

I would reccomend the download and installation of some or all of the following programs (all free), and the updating of them regularly:

  • WinPatrol As a robust security monitor, WinPatrol will alert you to hijackings, malware attacks and critical changes made to your computer without your permission. WinPatrol takes snapshot of your critical system resources and alerts you to any changes that may occur without your knowledge.
  • Spyware Blaster - By altering your registry, this program stops harmful sites from installing things like ActiveX Controls on your machines.
  • Malwarebytes' Anti-Malware Malwarebytes' Anti-Malware is a new and powerful anti-malware tool. It is
    totally free but for real-time protection you will have to pay a small one-time fee. We used this to help clean your computer and recomend keeping it and using often.

Here is some great reading about how to be safer online:

PC Safety and Security - What Do I Need? from my friends at Tech Support Forum
and
COMPUTER SECURITY - a short guide to staying safer online from my friends at Malware Removal

I'd be grateful if you could reply to this post so that I know you have read it and, if you've no other questions, the thread can then be closed.

I Will Keep This Open For About Three Days, If Anything Comes Up - Just Come Back And Let Me Know, after that time you will have to send me a PM

My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->Posted Image<-- Don't worry every little bit helps.

Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#14 KramerKelso

KramerKelso
  • Topic Starter

  • Members
  • 17 posts
  • OFFLINE
  •  
  • Local time:08:48 AM

Posted 04 October 2011 - 05:46 PM

Hi Gringo,

I think I screwed up the last step a little. I stored all the files I was using for cleaning up in a folder on Desktop and by mistake I deleted that folder. Now "ComboFix /Uninstall" is not running. I recreated the folder with the same name, downloaded ComboFix again and re-run the uninstall command. This time it prompted me to whether I want to run ComboFix. When I said yes, a black window opens and it just stays there. How do I clean up ComboFix? I did the rest of the steps (deleted files using .bat file, enabled CD emulation using Defogger, used OTC.exe to clean up the files).

Also, I have a McAffe installed from work place. And I could not find any way to disable it while running uninstall command for ComboFix. There are three modules installed under McAffe: Host Intrusion Prevention, SiteAdvisor Enterprise and VirusScan Enterprise. And there is no Security center from where I can disable it. I dont know if this is interfering during the uninstall process of ComboFix. I tried it on safe mode too but McAfee kicks in even in safe mode (when I open browser and try downloading ComboFix.exe again in safe mode, McAfee prompts me if I want to download this or not since it may be malicious). Please let me know the next step.

Sorry for the mix up.

Thanks,
Kramer

#15 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:09:48 AM

Posted 04 October 2011 - 09:23 PM

Hello

run this to clean-up combofix

http://download.bleepingcomputer.com/sUBs/CF_UNINST.EXE


gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users