Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Infected Data Restore


  • This topic is locked This topic is locked
11 replies to this topic

#1 doubled

doubled

  • Members
  • 7 posts
  • OFFLINE
  •  
  • Local time:11:40 PM

Posted 30 September 2011 - 07:53 AM

Infected with Data Restore
ran iexplore.exe, once and it did appear to stop malware, since Microsoft Essentials came up with a message that a security issue had been found and reported that backdoor:Win32/Agent.ACG Severe Issue. Removed the issue.
Attempted to install MalwareBytes and ir went through almost the entire install process and at the very end it came up with an error that it could not be installed.
Errors
At the Saving uninstall information...
(Small Window pops up)
Setup
(With red circle with X in it) Access is denied [OK]
Then another window pops up
Setup was not completed
Please correct the problem and run setup again. [OK]

Attempted to do this in safe mode. Also got an error that it had to restart to remove the unsuccessful install of MalwareBytes.

Followed the Steps in the Remove Data Restore guide
Ran rkill but does not appear to have stopped malware from running.
Ran tdsskiller.exe (renamed 123.com) did not find any to kill
Attempt to install newest version of malwarebytes and get an error message that installation could not be completed.

.
DDS (Ver_2011-08-26.01) - NTFSx86
Internet Explorer: 8.0.6001.18702
Run by Gary Davis at 0:46:42 on 2011-09-30
Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.1015.611 [GMT -4:00]
.
AV: Microsoft Security Essentials *Enabled/Updated* {EDB4FA23-53B8-4AFA-8C5D-99752CCA7095}
AV: Microsoft Security Essentials *Disabled/Updated* {BCF43643-A118-4432-AEDE-D861FCBCFCDF}
.
============== Running Processes ===============
.
C:\WINDOWS\system32\svchost -k DcomLaunch
svchost.exe
c:\Program Files\Microsoft Security Client\Antimalware\MsMpEng.exe
C:\WINDOWS\System32\svchost.exe -k netsvcs
svchost.exe
svchost.exe
C:\WINDOWS\system32\spoolsv.exe
svchost.exe
C:\Program Files\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe
C:\Program Files\Bonjour\mDNSResponder.exe
C:\Program Files\Common Files\Intuit\Update Service\IntuitUpdateService.exe
C:\windows\system\hpsysdrv.exe
C:\WINDOWS\system32\hkcmd.exe
C:\Program Files\USB Storage RW\shwicon.exe
C:\HP\KBD\KBD.EXE
C:\WINDOWS\system32\igfxtray.exe
C:\Program Files\iTunes\iTunesHelper.exe
svchost.exe
C:\Program Files\iPod\bin\iPodService.exe
C:\WINDOWS\system32\attrib.exe
C:\WINDOWS\explorer.exe
.
============== Pseudo HJT Report ===============
.
mSearch Bar = hxxp://srch-qus7.hpwis.com/
BHO: Adobe PDF Reader Link Helper: {06849e9f-c8d7-4d59-b87d-784b7d6be0b3} - c:\program files\common files\adobe\acrobat\activex\AcroIEHelper.dll
BHO: Windows Live Sign-in Helper: {9030d464-4c02-4abf-8ecc-5164760863c6} - c:\program files\common files\microsoft shared\windows live\WindowsLiveLogin.dll
TB: {EF99BD32-C1FB-11D2-892F-0090271D4F88} - No File
EB: {4528BBE0-4E08-11D5-AD55-00010333D0AD} - No File
EB: {32683183-48a0-441b-a342-7c2a440a9478} - No File
uRun: [NVIEW] rundll32.exe nview.dll,nViewLoadHook
uRun: [PDFSaver]
uRun: [DIUULhYTmDbYe.exe] c:\documents and settings\all users\application data\DIUULhYTmDbYe.exe
uRun: [gISJwRGiQWMK.exe] c:\documents and settings\all users\application data\gISJwRGiQWMK.exe
mRun: [hpsysdrv] c:\windows\system\hpsysdrv.exe
mRun: [HotKeysCmds] c:\windows\system32\hkcmd.exe
mRun: [KYE_Showicon] "c:\program files\usb storage rw\shwicon.exe" -t"kye\USB Storage RW"
mRun: [KBD] c:\hp\kbd\KBD.EXE
mRun: [StorageGuard] "c:\program files\veritas software\update manager\sgtray.exe" /r
mRun: [Recguard] c:\windows\sminst\RECGUARD.EXE
mRun: [NvCplDaemon] RUNDLL32.EXE NvQTwk,NvCplDaemon initialize
mRun: [nwiz] nwiz.exe /installquiet /keeploaded
mRun: [PS2] c:\windows\system32\ps2.exe
mRun: [AlcxMonitor] ALCXMNTR.EXE
mRun: [IgfxTray] c:\windows\system32\igfxtray.exe
mRun: [QuickTime Task] "c:\program files\quicktime\qttask.exe" -atboottime
mRun: [iTunesHelper] "c:\program files\itunes\iTunesHelper.exe"
mRun: [MSC] "c:\program files\microsoft security client\msseces.exe" -hide -runkey
mRun: [Adobe Reader Speed Launcher] "c:\program files\adobe\reader 8.0\reader\Reader_sl.exe"
mRun: [Adobe ARM] "c:\program files\common files\adobe\arm\1.0\AdobeARM.exe"
dRun: [DWQueuedReporting] "c:\progra~1\common~1\micros~1\dw\dwtrig20.exe" -t
StartupFolder: c:\documents and settings\gary davis\start menu\programs\startup\dxdiag.exe
mPolicies-explorer: <NO NAME> =
mPolicies-system: DisableTaskMgr = 1 (0x1)
IE: E&xport to Microsoft Excel - c:\progra~1\micros~2\office12\EXCEL.EXE/3000
IE: {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe
IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe
IE: {92780B25-18CC-41C8-B9BE-3C9C571A8263} - {FF059E31-CC5A-4E2E-BF3B-96E929D65503} - c:\progra~1\micros~2\office12\REFIEBAR.DLL
Trusted Zone: intuit.com\ttlc
DPF: DirectAnimation Java Classes - file://c:\windows\java\classes\dajava.cab
DPF: Microsoft XML Parser for Java - file://c:\windows\java\classes\xmldso.cab
DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} - hxxp://update.microsoft.com/windowsupdate/v6/V5Controls/en/x86/client/wuweb_site.cab?1292038092265
DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} - hxxp://www.update.microsoft.com/microsoftupdate/v6/V5Controls/en/x86/client/muweb_site.cab?1292038169968
DPF: {CAFEEFAC-0014-0000-0001-ABCDEFFEDCBA}
DPF: {DE22A7AB-A739-4C58-AD52-21F9CD6306B7} - hxxp://download.microsoft.com/download/7/E/6/7E6A8567-DFE4-4624-87C3-163549BE2704/clearadj.cab
Handler: lbxfile - {56831180-F115-11d2-B6AA-00104B2B9943} - c:\program files\libronix dls\system\FileProt.dll
Handler: lbxres - {24508F1B-9E94-40EE-9759-9AF5795ADF52} - c:\program files\libronix dls\system\ResProt.dll
Notify: igfxcui - igfxsrvc.dll
SSODL: WPDShServiceObj - {AAA288BA-9A4C-45B0-95D7-94D524869DB5} - c:\windows\system32\WPDShServiceObj.dll
.
================= FIREFOX ===================
.
FF - ProfilePath - c:\documents and settings\gary davis\application data\mozilla\firefox\profiles\3rae2jxc.default\
FF - plugin: c:\program files\microsoft silverlight\4.0.60531.0\npctrlui.dll
FF - plugin: c:\program files\microsoft\office live\npOLW.dll
FF - plugin: c:\program files\viewpoint\viewpoint media player\npViewpoint.dll
.
============= SERVICES / DRIVERS ===============
.
R1 MpFilter;Microsoft Malware Protection Driver;c:\windows\system32\drivers\MpFilter.sys [2010-3-25 165648]
R1 MpKsl7afe4775;MpKsl7afe4775;c:\documents and settings\all users\application data\microsoft\microsoft antimalware\definition updates\{efff88c0-c195-4d2a-a947-6a997f42b549}\MpKsl7afe4775.sys [2011-9-30 28752]
S1 MpKsl5ec03213;MpKsl5ec03213;\??\c:\documents and settings\all users\application data\microsoft\microsoft antimalware\definition updates\{713d0f2b-d712-42f0-a8c2-51dd993c3c40}\mpksl5ec03213.sys --> c:\documents and settings\all users\application data\microsoft\microsoft antimalware\definition updates\{713d0f2b-d712-42f0-a8c2-51dd993c3c40}\MpKsl5ec03213.sys [?]
S1 MpKsl76248623;MpKsl76248623;\??\c:\documents and settings\all users\application data\microsoft\microsoft antimalware\definition updates\{1af63f10-ad26-480e-bbcf-ce3cc083ec77}\mpksl76248623.sys --> c:\documents and settings\all users\application data\microsoft\microsoft antimalware\definition updates\{1af63f10-ad26-480e-bbcf-ce3cc083ec77}\MpKsl76248623.sys [?]
S1 MpKsl85debead;MpKsl85debead;\??\c:\documents and settings\all users\application data\microsoft\microsoft antimalware\definition updates\{79b9a9ed-bb15-4dc6-b577-70fa52ce4b35}\mpksl85debead.sys --> c:\documents and settings\all users\application data\microsoft\microsoft antimalware\definition updates\{79b9a9ed-bb15-4dc6-b577-70fa52ce4b35}\MpKsl85debead.sys [?]
S1 MpKslc3efc170;MpKslc3efc170;\??\c:\documents and settings\all users\application data\microsoft\microsoft antimalware\definition updates\{69ad6777-f700-4161-93a1-d9e9da7eefda}\mpkslc3efc170.sys --> c:\documents and settings\all users\application data\microsoft\microsoft antimalware\definition updates\{69ad6777-f700-4161-93a1-d9e9da7eefda}\MpKslc3efc170.sys [?]
S3 msCMTSrvc;Content Monitoring Tool;c:\windows\system32\msCMTsrvc.exe [2002-11-8 163840]
.
=============== Created Last 30 ================
.
2011-09-30 04:31:48 28752 ---ha-w- c:\documents and settings\all users\application data\microsoft\microsoft antimalware\definition updates\{efff88c0-c195-4d2a-a947-6a997f42b549}\MpKsl7afe4775.sys
2011-09-30 04:31:01 56200 ---ha-w- c:\documents and settings\all users\application data\microsoft\microsoft antimalware\definition updates\{efff88c0-c195-4d2a-a947-6a997f42b549}\offreg.dll
2011-09-30 03:47:07 709968 ----a-w- c:\windows\isRS-000.tmp
2011-09-30 03:31:41 505856 ---ha-w- c:\documents and settings\all users\application data\gISJwRGiQWMK.exe
2011-09-30 03:02:59 -------- d--h--w- c:\documents and settings\gary davis\application data\Malwarebytes
2011-09-29 17:53:48 346112 ---ha-w- c:\documents and settings\all users\application data\6DSS92c31Apgjk.exe
2011-09-29 16:55:17 465920 ---ha-w- c:\documents and settings\all users\application data\DIUULhYTmDbYe.exe
2011-09-28 20:43:43 7269712 ---ha-w- c:\documents and settings\all users\application data\microsoft\microsoft antimalware\definition updates\{efff88c0-c195-4d2a-a947-6a997f42b549}\mpengine.dll
2011-09-03 10:17:37 599040 -c-h--w- c:\windows\system32\dllcache\crypt32.dll
.
==================== Find3M ====================
.
2011-09-13 18:19:19 404640 ---ha-w- c:\windows\system32\FlashPlayerCPLApp.cpl
2011-09-09 09:12:13 599040 ---ha-w- c:\windows\system32\crypt32.dll
2011-07-15 13:29:31 456320 ---ha-w- c:\windows\system32\drivers\mrxsmb.sys
2011-07-08 14:02:00 10496 ---ha-w- c:\windows\system32\drivers\ndistapi.sys
.
============= FINISH: 0:50:12.60 ===============

Attached Files



BC AdBot (Login to Remove)

 


#2 HelpBot

HelpBot

    Bleepin' Binary Bot


  • Bots
  • 12,696 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:11:40 PM

Posted 05 October 2011 - 07:55 AM

Hello and welcome to Bleeping Computer!

I am HelpBot: an automated program designed to help the Bleeping Computer Staff better assist you! This message contains very important information, so please read through all of it before doing anything.

We apologize for the delay in responding to your request for help. Here at Bleeping Computer we get overwhelmed at times, and we are trying our best to keep up. Please note that your topic was not intentionally overlooked. Our mission is to help everyone in need, but sometimes it takes just a little longer to get to every request for help. No one is ignored here.

To help Bleeping Computer better assist you please perform the following steps:

***************************************************

Posted Image In order to continue receiving help at BleepingComputer.com, YOU MUST tell me if you still need help or if your issue has already been resolved on your own or through another resource! To tell me this, please click on the following link and follow the instructions there.

CLICK THIS LINK >>> http://www.bleepingcomputer.com/logreply/421238 <<< CLICK THIS LINK



If you no longer need help, then all you needed to do was the previous instructions of telling me so. You can skip the rest of this post. If you do need help please continue with Step 2 below.

***************************************************

Posted Image If you still need help, I would like you to post a Reply to this topic (click the "Add Reply" button in the lower right hand of this page). In that reply, please include the following information:

  • If you have not done so already, include a clear description of the problems you're having, along with any steps you may have performed so far.
  • A new DDS and GMER log. For your convenience, you will find the instructions for generating these logs repeated at the bottom of this post.
    • Please do this even if you have previously posted logs for us.
    • If you were unable to produce the logs originally please try once more.
    • If you are unable to create a log please provide detailed information about your installed Windows Operating System including the Version, Edition and if it is a 32bit or a 64bit system.
    • If you are unsure about any of these characteristics just post what you can and we will guide you.
  • Please tell us if you have your original Windows CD/DVD available.
  • Upon completing the above steps and posting a reply, another staff member will review your topic and do their best to resolve your issues.

Thank you for your patience, and again sorry for the delay.

***************************************************

We need to see some information about what is happening in your machine. Please perform the following scan again:

  • Download DDS by sUBs from one of the following links if you no longer have it available. Save it to your desktop.
  • Double click on the DDS icon, allow it to run.
  • A small box will open, with an explanation about the tool. No input is needed, the scan is running.
  • Notepad will open with the results.
  • Follow the instructions that pop up for posting the results.
  • Close the program window, and delete the program from your desktop.
Please note: You may have to disable any script protection running if the scan fails to run. After downloading the tool, disconnect from the internet and disable all antivirus protection. Run the scan, enable your A/V and reconnect to the internet.

Information on A/V control HERE


We also need a new log from the GMER anti-rootkit Scanner.

Please note that if you are running a 64-bit version of Windows you will not be able to run GMER and you may skip this step.

Please first disable any CD emulation programs using the steps found in this topic:

Why we request you disable CD Emulation when receiving Malware Removal Advice


Then create another GMER log and post it as an attachment to the reply where you post your new DDS log. Instructions on how to properly create a GMER log can be found here:

How to create a GMER log


As I am just a silly little program running on the BleepingComputer.com servers, please do not send me private messages as I do not know how to read and reply to them! Thanks!

#3 doubled

doubled
  • Topic Starter

  • Members
  • 7 posts
  • OFFLINE
  •  
  • Local time:11:40 PM

Posted 05 October 2011 - 08:26 AM

Have not made any changes to or turned on the computer since posting these logs.
Computer is a HP Compaq Presario 6000T running Windows XP Pro, believe with WinXP SP3 installed. Not sure of all the latest updates and patches have been installed though.
I have removed this computer from it's ethernet/internet connection. Using a second computer to access bleepingcomputer.com, download apps as needed, and transferring to infected computer with flash drive.

#4 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:03:40 AM

Posted 05 October 2011 - 04:55 PM

Hi,

Welcome to Bleeping Computer. My name is m0le and I will be helping you with your log.
  • Please subscribe to this topic, if you haven't already. Click the Watch This Topic button at the top on the right.

  • Please avoid installing/uninstalling or updating any programs and attempting any unsupervised fixes or scans. This can make helping you impossible.

  • Please reply to this post so I know you are there.
The forum is busy and we need to have replies as soon as possible. If I haven't had a reply after 3 days I will bump the topic and if you do not reply by the following day after that then I will close the topic.

----------------------------------------------

Some definite malware here. Please download and run Combofix. As you are transferring to an infected machine without a connection you will be asked to install the recovery console and you should ignore this request in this case.

Please download ComboFix from one of these locations:* IMPORTANT !!! Save ComboFix.exe to your Desktop making sure you rename it comfix.exe
  • Disable your AntiVirus and AntiSpyware applications including Firewalls, usually via a right click on the System Tray icon. They may otherwise interfere with our tools. (Click on this link to see a list of programs that should be disabled. The list is not all inclusive.)
  • Double click on Comfix.exe & follow the prompts.
  • As part of it's process, ComboFix will check to see if the Microsoft Windows Recovery Console is installed. With malware infections being as they are today, it's strongly recommended to have this pre-installed on your machine before doing any malware removal. It will allow you to boot up into a special recovery/repair mode that will allow us to more easily help you should your computer have a problem after an attempted removal of malware.
  • As advised earlier do not allow ComboFix to download and install the Microsoft Windows Recovery Console.

Posted Image


You should now see the following message:

Posted Image


Click on Yes, to continue scanning for malware.

When finished, it shall produce a log for you. Please include the C:\ComboFix.txt in your next reply.
Posted Image
m0le is a proud member of UNITE

#5 doubled

doubled
  • Topic Starter

  • Members
  • 7 posts
  • OFFLINE
  •  
  • Local time:11:40 PM

Posted 05 October 2011 - 09:37 PM

Here is the ComboFix Log

ComboFix 11-10-05.02 - Gary Davis 10/05/2011 22:01:46.1.1 - x86
Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.1015.639 [GMT -4:00]
Running from: c:\documents and settings\Gary Davis\Desktop\comfix.exe
AV: Microsoft Security Essentials *Disabled/Updated* {BCF43643-A118-4432-AEDE-D861FCBCFCDF}
AV: Microsoft Security Essentials *Disabled/Updated* {EDB4FA23-53B8-4AFA-8C5D-99752CCA7095}
.
WARNING -THIS MACHINE DOES NOT HAVE THE RECOVERY CONSOLE INSTALLED !!
.
.
((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.
.
c:\documents and settings\Administrator\WINDOWS
c:\documents and settings\All Users\Application Data\6DSS92c31Apgjk.exe
c:\documents and settings\All Users\Application Data\DIUULhYTmDbYe.exe
c:\documents and settings\All Users\Application Data\gISJwRGiQWMK.exe
c:\documents and settings\Default User\WINDOWS
c:\documents and settings\Gary Davis\Start Menu\Programs\Data Restore
c:\documents and settings\Gary Davis\Start Menu\Programs\Data Restore\Data Restore.lnk
c:\documents and settings\Gary Davis\Start Menu\Programs\Data Restore\Uninstall Data Restore.lnk
c:\documents and settings\Gary Davis\Start Menu\Programs\Startup\dxdiag.exe
c:\documents and settings\Gary Davis\WINDOWS
c:\program files\messenger\msmsgsin.exe
c:\windows\isRS-000.tmp
c:\windows\system32\config\systemprofile\WINDOWS
c:\windows\system32\ps2.bat
D:\Autorun.inf
.
.
((((((((((((((((((((((((( Files Created from 2011-09-06 to 2011-10-06 )))))))))))))))))))))))))))))))
.
.
2011-09-30 03:02 . 2011-09-30 03:02 -------- d--h--w- c:\documents and settings\Gary Davis\Application Data\Malwarebytes
2011-09-30 02:00 . 2011-09-30 02:00 -------- d--h--w- c:\documents and settings\Administrator\Application Data\Malwarebytes
2011-09-28 20:43 . 2011-09-12 23:14 7269712 ---ha-w- c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{EFFF88C0-C195-4D2A-A947-6A997F42B549}\mpengine.dll
.
.
.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2011-09-13 18:19 . 2011-06-19 00:22 404640 ---ha-w- c:\windows\system32\FlashPlayerCPLApp.cpl
2011-09-12 23:14 . 2011-05-28 19:32 7269712 ---ha-w- c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\Backup\mpengine.dll
2011-09-09 09:12 . 2003-03-14 07:52 599040 ---ha-w- c:\windows\system32\crypt32.dll
2011-07-15 13:29 . 2003-03-14 07:57 456320 ---ha-w- c:\windows\system32\drivers\mrxsmb.sys
2011-07-13 03:39 . 2011-08-03 01:58 6881616 ---ha-w- c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\Updates\mpengine.dll
2011-07-08 14:02 . 2003-03-14 07:26 10496 ---ha-w- c:\windows\system32\drivers\ndistapi.sys
2011-09-07 17:33 . 2011-05-12 18:55 134104 ---ha-w- c:\program files\mozilla firefox\components\browsercomps.dll
.
.
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4
.
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"NVIEW"="nview.dll" [2002-10-01 548933]
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"KYE_Showicon"="c:\program files\USB Storage RW\shwicon.exe -tKYE\USB Storage RW" [X]
"NvCplDaemon"="NvQTwk" [X]
"hpsysdrv"="c:\windows\system\hpsysdrv.exe" [1998-05-08 52736]
"HotKeysCmds"="c:\windows\system32\hkcmd.exe" [2004-11-02 126976]
"KBD"="c:\hp\KBD\KBD.EXE" [2001-07-07 61440]
"StorageGuard"="c:\program files\VERITAS Software\Update Manager\sgtray.exe" [2002-06-18 155648]
"Recguard"="c:\windows\SMINST\RECGUARD.EXE" [2002-09-14 212992]
"nwiz"="nwiz.exe" [2002-10-01 372736]
"PS2"="c:\windows\system32\ps2.exe" [2002-08-01 81920]
"AlcxMonitor"="ALCXMNTR.EXE" [2004-09-07 57344]
"IgfxTray"="c:\windows\system32\igfxtray.exe" [2004-11-02 155648]
"QuickTime Task"="c:\program files\QuickTime\qttask.exe" [2010-09-08 421888]
"iTunesHelper"="c:\program files\iTunes\iTunesHelper.exe" [2010-11-18 421160]
"MSC"="c:\program files\Microsoft Security Client\msseces.exe" [2011-06-15 997920]
"Adobe Reader Speed Launcher"="c:\program files\Adobe\Reader 8.0\Reader\Reader_sl.exe" [2011-08-31 40368]
"Adobe ARM"="c:\program files\Common Files\Adobe\ARM\1.0\AdobeARM.exe" [2011-03-30 937920]
.
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run]
"DWQueuedReporting"="c:\progra~1\COMMON~1\MICROS~1\DW\dwtrig20.exe" [2008-11-04 435096]
.
c:\documents and settings\All Users\Start Menu\Programs\Startup\
PDF-Capture.lnk - c:\program files\PDF-XChangeSDKEU\PDFSaver.exe [2011-1-19 61440]
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\MsMpSvc]
@="Service"
.
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]
"EnableFirewall"= 0 (0x0)
.
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"c:\\Program Files\\Bonjour\\mDNSResponder.exe"=
"c:\\Program Files\\iTunes\\iTunes.exe"=
.
S1 MpKsl5ec03213;MpKsl5ec03213;\??\c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{713D0F2B-D712-42F0-A8C2-51DD993C3C40}\MpKsl5ec03213.sys --> c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{713D0F2B-D712-42F0-A8C2-51DD993C3C40}\MpKsl5ec03213.sys [?]
S1 MpKsl76248623;MpKsl76248623;\??\c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{1AF63F10-AD26-480E-BBCF-CE3CC083EC77}\MpKsl76248623.sys --> c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{1AF63F10-AD26-480E-BBCF-CE3CC083EC77}\MpKsl76248623.sys [?]
S1 MpKsl85debead;MpKsl85debead;\??\c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{79B9A9ED-BB15-4DC6-B577-70FA52CE4B35}\MpKsl85debead.sys --> c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{79B9A9ED-BB15-4DC6-B577-70FA52CE4B35}\MpKsl85debead.sys [?]
S1 MpKslc3efc170;MpKslc3efc170;\??\c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{69AD6777-F700-4161-93A1-D9E9DA7EEFDA}\MpKslc3efc170.sys --> c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{69AD6777-F700-4161-93A1-D9E9DA7EEFDA}\MpKslc3efc170.sys [?]
.
.
------- Supplementary Scan -------
.
mSearch Bar = hxxp://srch-qus7.hpwis.com/
IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~2\Office12\EXCEL.EXE/3000
Trusted Zone: intuit.com\ttlc
DPF: DirectAnimation Java Classes - file://c:\windows\Java\classes\dajava.cab
DPF: Microsoft XML Parser for Java - file://c:\windows\Java\classes\xmldso.cab
FF - ProfilePath - c:\documents and settings\Gary Davis\Application Data\Mozilla\Firefox\Profiles\3rae2jxc.default\
.
- - - - ORPHANS REMOVED - - - -
.
HKCU-Run-PDFSaver - (no file)
HKCU-Run-DIUULhYTmDbYe.exe - c:\documents and settings\All Users\Application Data\DIUULhYTmDbYe.exe
HKCU-Run-gISJwRGiQWMK.exe - c:\documents and settings\All Users\Application Data\gISJwRGiQWMK.exe
.
.
.
**************************************************************************
.
catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2011-10-05 22:20
Windows 5.1.2600 Service Pack 3 NTFS
.
scanning hidden processes ...
.
scanning hidden autostart entries ...
.
scanning hidden files ...
.
scan completed successfully
hidden files: 0
.
**************************************************************************
.
Completion time: 2011-10-05 22:31:57
ComboFix-quarantined-files.txt 2011-10-06 02:31
.
Pre-Run: 52,843,229,184 bytes free
Post-Run: 53,387,923,456 bytes free
.
- - End Of File - - DD48F2D5C9C6F44FE867AF3D3BEF46DC

#6 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:03:40 AM

Posted 06 October 2011 - 05:54 PM

Please run MBAM next

Please download Posted Image Malwarebytes Anti-Malware and save it to your desktop.
  • Make sure you are connected to the Internet.
  • Double-click on mbam-setup.exe to install the application or, if you are using Vista, right-click and select Run As Administrator on mbam-setup.exe to install the application.
  • When the installation begins, follow the prompts and do not make any changes to default settings.
  • When installation has finished, make sure you leave both of these checked:
    • Update Malwarebytes' Anti-Malware
    • Launch Malwarebytes' Anti-Malware
  • Then click Finish.
  • MBAM will automatically start and you will be asked to update the program before performing a scan. If an update is found, the program will automatically update itself. Press the OK button to close that box and continue.
    If MBAM won't update then download and update MBAM on a clean computer then save the rules.ref folder to a memory stick. This file is found here: 'C:\Documents and Settings\All Users\Application Data\Malwarebytes\Malwarebytes' Anti-Malware' then transfer it across to the infected computer.
  • On the Scanner tab:
    • Make sure the "Perform Full Scan" option is selected.
    • Then click on the Scan button.
  • If asked to select the drives to scan, leave all the drives selected and click on the Start Scan button.
  • The scan will begin and "Scan in progress" will show at the top. It may take some time to complete so please be patient.
  • When the scan is finished, a message box will say "The scan completed successfully. Click 'Show Results' to display all objects found".
  • Click OK to close the message box and continue with the removal process.
  • Back at the main Scanner screen, click on the Show Results button to see a list of any malware that was found.
  • Make sure that everything is checked, and click Remove Selected.
  • When removal is completed, a log report will open in Notepad.
  • The log is automatically saved and can be viewed by clicking the Logs tab in MBAM.
  • Copy and paste the contents of that report in your next reply and exit MBAM.
Note: If MBAM encounters a file that is difficult to remove, you may be asked to reboot your computer so it can proceed with the disinfection process. Regardless if prompted to restart the computer or not, please do so immediately. Failure to reboot normally (not into safe mode) will prevent MBAM from removing all the malware. MBAM may make changes to your registry as part of its disinfection routine. If you're using other security programs that detect registry changes, they may alert you after scanning with MBAM. Please permit the program to allow the changes.
Posted Image
m0le is a proud member of UNITE

#7 doubled

doubled
  • Topic Starter

  • Members
  • 7 posts
  • OFFLINE
  •  
  • Local time:11:40 PM

Posted 07 October 2011 - 06:31 AM

MalwareBytes was able to install and update.
Here is the results log:

Malwarebytes' Anti-Malware 1.51.2.1300
www.malwarebytes.org

Database version: 7891

Windows 5.1.2600 Service Pack 3
Internet Explorer 8.0.6001.18702

10/7/2011 7:05:47 AM
mbam-log-2011-10-07 (07-05-47).txt

Scan type: Full scan (C:\|D:\|G:\|)
Objects scanned: 256476
Time elapsed: 2 hour(s), 36 minute(s), 31 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 1
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 7

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\msCMTSrvc (Trojan.Downloader) -> Quarantined and deleted successfully.

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
c:\WINDOWS\system32\mscmtsrvc.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
c:\Qoobox\quarantine\C\documents and settings\all users\application data\6dss92c31apgjk.exe.vir (Trojan.FakeAlert) -> Quarantined and deleted successfully.
c:\Qoobox\quarantine\C\documents and settings\all users\application data\diuulhytmdbye.exe.vir (Trojan.FakeAlert) -> Quarantined and deleted successfully.
c:\Qoobox\quarantine\C\documents and settings\all users\application data\gisjwrgiqwmk.exe.vir (Trojan.FakeAlert) -> Quarantined and deleted successfully.
c:\system volume information\_restore{4eecaa6d-e054-4047-b63d-48aaf0863709}\RP332\A0035279.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
c:\system volume information\_restore{4eecaa6d-e054-4047-b63d-48aaf0863709}\RP332\A0035280.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
c:\system volume information\_restore{4eecaa6d-e054-4047-b63d-48aaf0863709}\RP332\A0035281.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.

#8 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:03:40 AM

Posted 07 October 2011 - 08:09 PM

That looks like it's finished the trojan off. Please mop up by running ESET

I'd like us to scan your machine with ESET OnlineScan
  • Hold down Control and click on the following link to open ESET OnlineScan in a new window.
    ESET OnlineScan
  • Click the Posted Image button.
  • For alternate browsers only: (Microsoft Internet Explorer users can skip these steps)
    • Click on Posted Image to download the ESET Smart Installer. Save it to your desktop.
    • Double click on the Posted Image icon on your desktop.
  • Check Posted Image
  • Click the Posted Image button.
  • Accept any security warnings from your browser.
  • Under scan settings, check Posted Image and check Remove found threats
  • Click Advanced settings and select the following:
    • Scan potentially unwanted applications
    • Scan for potentially unsafe applications
    • Enable Anti-Stealth technology
  • ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this can take some time.
  • Copy and paste the resulting log in your next reply
If no log is generated that means nothing was found. Please let me know if this happens.
Posted Image
m0le is a proud member of UNITE

#9 doubled

doubled
  • Topic Starter

  • Members
  • 7 posts
  • OFFLINE
  •  
  • Local time:11:40 PM

Posted 07 October 2011 - 08:14 PM

FYI - I will not be able to get to the computer until Sunday. I will run the ESET and post results Sunday.
Thanks

#10 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:03:40 AM

Posted 07 October 2011 - 08:20 PM

No problem :thumbup2:
Posted Image
m0le is a proud member of UNITE

#11 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:03:40 AM

Posted 13 October 2011 - 08:47 PM

Hi,

I have not had a reply from you for 6 days. Can you please tell me if you still need help with your computer as I am unable to help other members with their problems while I have your topic still open. The time taken between posts can also change the situation with your PC making it more difficult to help you.

If you like you can PM me.

Thanks,


m0le
Posted Image
m0le is a proud member of UNITE

#12 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:03:40 AM

Posted 15 October 2011 - 06:05 PM

Due to the lack of feedback, this topic is now closed.In the event you still have problems, please send me or any Moderator a Private Message and ask them to reopen this topic within the next 5 days. Please include a link to your topic in the Private Message. Thank you.
Posted Image
m0le is a proud member of UNITE




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users