Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Blank desktop; Google redirects; Can't run anti-malware programs


  • This topic is locked This topic is locked
17 replies to this topic

#1 Judy85

Judy85

  • Members
  • 9 posts
  • OFFLINE
  •  
  • Local time:06:58 AM

Posted 12 October 2011 - 12:48 AM

Earlier while surfing the web, I seem to have picked up a virus. It caused google to redirect, and started bringing up all sorts of popups that claimed my hard drive had critical errors, etc. When I searched google for the content of these messages, they were consistent with the "System Restore" virus. I found info on how to manually remove, and tried some things, but may have made it worse and probably should have just left it alone. There aren't anymore popups at this point, but my desktop is blank, my start menu has lots of missing programs, and google redirects, and the browser will randomly open a new tab leading to junk sites. The redirects start with "eminentsearchsystem". I cannot run any anti-malware. A message comes up that says "Windows cannot access the specified device, path, or file. You may not have the appropriate permissions to access the item."

I did the DDS log, but when doing the GMER scan, it shut down in the middle of it. I did the .exe and renamed it to iexplore.exe, and tried to open it, but a message pops up saying: LoadDriver("C:\DOCUME~1\Judy\LOCALS~1\Temp\pgriipow.sys")error 0xC000010E: Cannot create a stable subkey under a volatile parent key.

When I close this message, the GMER scan pops up, starts scanning and stops. I hit Scan and it begins to scan again. But once again, it stops in the middle of the scan and just shuts down.

Is my computer a goner?

Judy

.
DDS (Ver_2011-08-26.01) - NTFSx86
Internet Explorer: 8.0.6001.18702 BrowserJavaVersion: 1.6.0_21
Run by Judy at 0:03:40 on 2011-10-12
Microsoft Windows XP Home Edition 5.1.2600.3.1252.1.1033.18.1013.421 [GMT -5:00]
.
.
============== Running Processes ===============
.
C:\WINDOWS\system32\svchost -k DcomLaunch
C:\WINDOWS\3238090663:1487470142.exe
C:\WINDOWS\system32\svchost -k rpcss
C:\WINDOWS\System32\svchost.exe -k netsvcs
C:\WINDOWS\system32\svchost.exe -k NetworkService
C:\WINDOWS\system32\svchost.exe -k LocalService
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\system32\svchost.exe -k LocalService
C:\Program Files\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe
C:\Program Files\Bonjour\mDNSResponder.exe
C:\Program Files\Java\jre6\bin\jqs.exe
C:\Program Files\System Control Manager\MSIService.exe
C:\PROGRA~1\PHAROS~1\Core\CTskMstr.exe
C:\WINDOWS\system32\svchost.exe -k imgsvc
C:\Program Files\Toshiba\Bluetooth Toshiba Stack\TosBtSrv.exe
C:\Program Files\Yahoo!\SoftwareUpdate\YahooAUService.exe
C:\WINDOWS\explorer.exe
C:\WINDOWS\System32\alg.exe
C:\WINDOWS\system32\wscntfy.exe
C:\WINDOWS\Explorer.exe
C:\WINDOWS\system32\igfxtray.exe
C:\WINDOWS\system32\hkcmd.exe
C:\WINDOWS\system32\igfxpers.exe
C:\WINDOWS\system32\igfxsrvc.exe
C:\WINDOWS\RTHDCPL.EXE
C:\Program Files\System Control Manager\MGSysCtrl.exe
C:\Program Files\Google\Gmail Notifier\gnotify.exe
C:\Program Files\Common Files\Java\Java Update\jusched.exe
C:\Program Files\iTunes\iTunesHelper.exe
C:\Program Files\Common Files\Adobe\ARM\1.0\AdobeARM.exe
C:\WINDOWS\system32\ctfmon.exe
C:\WINDOWS\system32\wbem\unsecapp.exe
C:\WINDOWS\system32\wbem\wmiprvse.exe
C:\Documents and Settings\Judy\Application Data\Dropbox\bin\Dropbox.exe
C:\Program Files\iPod\bin\iPodService.exe
C:\Program Files\Mozilla Firefox\firefox.exe
C:\Program Files\Mozilla Firefox\plugin-container.exe
C:\WINDOWS\system32\wbem\wmiprvse.exe
.
============== Pseudo HJT Report ===============
.
uStart Page = hxxp://www.google.com/
uSearch Page = hxxp://www.google.com
uSearch Bar = hxxp://www.google.com/ie
uDefault_Search_URL = hxxp://www.google.com/ie
uInternet Connection Wizard,ShellNext = iexplore
uInternet Settings,ProxyOverride = *.local
uSearchAssistant = hxxp://www.google.com/ie
uSearchURL,(Default) = hxxp://www.google.com/search?q=%s
mSearchAssistant = hxxp://search.live.com/sphome.aspx
uURLSearchHooks: H - No File
uURLSearchHooks: H - No File
uWinlogon: Shell=c:\documents and settings\judy\local settings\application data\a75701c1\X
BHO: {02478D38-C3F9-4efb-9B51-7695ECA05670} - No File
BHO: Adobe PDF Reader Link Helper: {06849e9f-c8d7-4d59-b87d-784b7d6be0b3} - c:\program files\common files\adobe\acrobat\activex\AcroIEHelper.dll
BHO: Java™ Plug-In 2 SSV Helper: {dbc80044-a445-435b-bc74-9c25c1c588a9} - c:\program files\java\jre6\bin\jp2ssv.dll
BHO: JQSIEStartDetectorImpl Class: {e7e6f031-17ce-4c07-bc86-eabfe594f69c} - c:\program files\java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll
TB: {21FA44EF-376D-4D53-9B0F-8A89D3229068} - No File
uRun: [ctfmon.exe] c:\windows\system32\ctfmon.exe
uRun: [Messenger (Yahoo!)] "c:\progra~1\yahoo!\messen~1\YahooMessenger.exe" -quiet
mRun: [IgfxTray] c:\windows\system32\igfxtray.exe
mRun: [HotKeysCmds] c:\windows\system32\hkcmd.exe
mRun: [Persistence] c:\windows\system32\igfxpers.exe
mRun: [RTHDCPL] RTHDCPL.EXE
mRun: [Alcmtr] ALCMTR.EXE
mRun: [ITSecMng] %ProgramFiles%\TOSHIBA\Bluetooth Toshiba Stack\ItSecMng.exe /START
mRun: [MGSysCtrl] c:\program files\system control manager\MGSysCtrl.exe
mRun: [{0228e555-4f9c-4e35-a3ec-b109a192b4c2}] c:\program files\google\gmail notifier\gnotify.exe
mRun: [SNM] c:\program files\spynomore\SNM.exe /startup
mRun: [SunJavaUpdateSched] "c:\program files\common files\java\java update\jusched.exe"
mRun: [QuickTime Task] "c:\program files\quicktime\qttask.exe" -atboottime
mRun: [iTunesHelper] "c:\program files\itunes\iTunesHelper.exe"
mRun: [Adobe Reader Speed Launcher] "c:\program files\adobe\reader 8.0\reader\Reader_sl.exe"
mRun: [Adobe ARM] "c:\program files\common files\adobe\arm\1.0\AdobeARM.exe"
mRun: [MWrPiWAOYHWVw.exe] c:\documents and settings\all users\application data\MWrPiWAOYHWVw.exe
StartupFolder: c:\docume~1\judy\startm~1\programs\startup\dropbox.lnk - c:\documents and settings\judy\application data\dropbox\bin\Dropbox.exe
uPolicies-explorer: NoDesktop = 1 (0x1)
IE: Add to Google Photos Screensa&ver - c:\windows\system32\GPhotos.scr/200
IE: E&xport to Microsoft Excel - c:\progra~1\micros~2\office12\EXCEL.EXE/3000
IE: {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe
IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe
IE: {92780B25-18CC-41C8-B9BE-3C9C571A8263} - {FF059E31-CC5A-4E2E-BF3B-96E929D65503} - c:\progra~1\micros~2\office12\REFIEBAR.DLL
LSP: mswsock.dll
DPF: {02BF25D5-8C17-4B23-BC80-D3488ABDDC6B} - hxxp://appldnld.apple.com.edgesuite.net/content.info.apple.com/QuickTime/qtactivex/qtplugin.cab
DPF: {0CCA191D-13A6-4E29-B746-314DEE697D83} - hxxp://upload.facebook.com/controls/2008.10.10_v5.5.8/FacebookPhotoUploader5.cab
DPF: {8100D56A-5661-482C-BEE8-AFECE305D968} - hxxp://upload.facebook.com/controls/2009.07.28_v5.5.8.1/FacebookPhotoUploader55.cab
DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_21-windows-i586.cab
DPF: {CAFEEFAC-0016-0000-0021-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_21-windows-i586.cab
DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_21-windows-i586.cab
TCP: DhcpNameServer = 209.18.47.61 209.18.47.62
TCP: Interfaces\{F8448E12-20C5-4DAB-B1C6-E40989D6A93D} : DhcpNameServer = 209.18.47.61 209.18.47.62
Notify: igfxcui - igfxdev.dll
SSODL: WPDShServiceObj - {AAA288BA-9A4C-45B0-95D7-94D524869DB5} - c:\windows\system32\WPDShServiceObj.dll
.
================= FIREFOX ===================
.
FF - ProfilePath - c:\documents and settings\judy\application data\mozilla\firefox\profiles\3prjsx6y.default\
FF - prefs.js: browser.startup.homepage - hxxp://www.google.com/
FF - plugin: c:\documents and settings\judy\application data\move networks\plugins\npqmp071503000010.dll
FF - plugin: c:\documents and settings\judy\application data\move networks\plugins\npqmp071505000010.dll
FF - plugin: c:\documents and settings\judy\application data\move networks\plugins\npqmp071505000011.dll
FF - plugin: c:\program files\google\picasa3\npPicasa3.dll
FF - plugin: c:\program files\java\jre6\bin\new_plugin\npdeployJava1.dll
FF - plugin: c:\program files\microsoft silverlight\4.0.60531.0\npctrlui.dll
FF - plugin: c:\program files\mozilla firefox\plugins\npdeployJava1.dll
FF - plugin: c:\program files\mozilla firefox\plugins\NPDFusionWebFirefox.dll
.
---- FIREFOX POLICIES ----
FF - user.js: yahoo.ytff.general.dontshowhpoffer - true
============= SERVICES / DRIVERS ===============
.
R2 Micro Star SCM;Micro Star SCM;c:\program files\system control manager\MSIService.exe [2009-3-4 159744]
R3 RSUSBSTOR;RtsUStor.Sys Realtek USB Card Reader;c:\windows\system32\drivers\RtsUStor.sys [2009-3-4 162816]
S3 PTDMBus;PANTECH USB Modem Composite Device Driver ;c:\windows\system32\drivers\PTDMBus.sys [2009-11-2 55128]
S3 PTDMMdm;PANTECH USB Modem Drivers ;c:\windows\system32\drivers\PTDMMdm.sys [2009-11-2 160984]
S3 PTDMVsp;PANTECH USB Modem Serial Port ;c:\windows\system32\drivers\PTDMVsp.sys [2009-11-2 160984]
S3 PTDMWFLT;PTDMWWAN Filter Driver;c:\windows\system32\drivers\PTDMWFLT.sys [2009-11-2 13528]
S3 PTDMWWAN;PANTECH USB Modem WWAN Driver;c:\windows\system32\drivers\PTDMWWAN.sys [2009-11-2 118360]
S3 Rts516xIR;Realtek IR Driver;c:\windows\system32\drivers\rts516xir.sys --> c:\windows\system32\drivers\Rts516xIR.sys [?]
.
=============== Created Last 30 ================
.
2011-10-11 23:51:37 -------- d--h--w- c:\windows\PIF
2011-10-11 22:42:04 1558832 ---ha-w- c:\program files\TDSSKiller.exe
2011-10-11 22:15:46 140 ---ha-w- c:\program files\script.reg
2011-10-11 21:59:09 709120 ---ha-w- c:\program files\libcurl.dll
2011-10-11 21:59:09 660496 ---ha-w- c:\program files\Setup.exe
2011-10-11 21:59:09 401920 ---ha-w- c:\program files\ssleay32.dll
2011-10-11 21:59:09 1835520 ---ha-w- c:\program files\libeay32.dll
2011-10-11 21:59:08 -------- d--h--w- c:\program files\AU
2011-10-11 21:58:22 2405576 ---ha-w- c:\program files\HousecallLauncher64.exe
2011-10-11 21:56:12 1558832 ----a-w- c:\program files\random.exe
2011-10-11 19:31:56 -------- d--ha-w- c:\program files\PC Tools Security
2011-10-11 19:31:53 -------- d--ha-w- c:\documents and settings\all users\application data\virus4
2011-10-11 19:30:39 -------- d--h--w- c:\documents and settings\all users\application data\PC Tools
2011-10-11 19:05:14 -------- d-sh--w- c:\documents and settings\judy\local settings\application data\a75701c1
.
==================== Find3M ====================
.
2011-10-12 01:41:06 41272 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2011-09-09 09:12:13 599040 ---ha-w- c:\windows\system32\crypt32.dll
2011-08-31 22:00:50 22216 ---ha-w- c:\windows\system32\drivers\mbam.sys
2011-08-31 14:55:14 404640 ---ha-w- c:\windows\system32\FlashPlayerCPLApp.cpl
2011-07-15 13:29:31 456320 ---ha-w- c:\windows\system32\drivers\mrxsmb.sys
.
============= FINISH: 0:10:37.14 ===============

Attached Files



BC AdBot (Login to Remove)

 


#2 Judy85

Judy85
  • Topic Starter

  • Members
  • 9 posts
  • OFFLINE
  •  
  • Local time:06:58 AM

Posted 12 October 2011 - 01:49 AM

I tried the GMER scan one more time, and it simply shut down suddenly in the middle of the scan. But I was able to hit the "Copy" button on it, and save what it had so far into Notepad. I attached it, but the scan didn't complete.

Attached Files

  • Attached File  ark.txt   4.32KB   4 downloads

Edited by Judy85, 12 October 2011 - 01:50 AM.


#3 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:07:58 AM

Posted 12 October 2011 - 03:29 AM

Hello and Welcome to the forums!

My name is Gringo and I'll be glad to help you with your computer problems.

Somethings to remember while we are working together.

  • Do not run any other tool untill instructed to do so!
  • please Do not Attach logs or put in code boxes.
  • Tell me about any problems that have occurred during the fix.
  • Tell me of any other symptoms you may be having as these can help also.
  • Do not run anything while running a fix.
  • Do not run any other tool untill instructed to do so!


Click on the Watch Topic Button and select Immediate Notification and click on proceed, this will help you to get notified faster when I have replied and make the cleaning process faster.

Please print out or make a copy in notpad of any instructions given, as sometimes it is necessary to go offline and you will lose access to them.

Please download DummyCreator.zip and unzip it.
  • Run the tool.
  • Copy and paste the following into the edit box:

    C:\WINDOWS\3238090663
  • Press Create button and post the content of the Result.txt.

    Important: Restart the computer.

Run Combofix:

You may be asked to install or update the Recovery Console (Win XP Only) if this happens please allow it to do so (you will need to be connected to the internet for this)

Before you run Combofix I will need you to turn off any security software you have running, If you do not know how to do this you can find out >here< or >here<

Combofix may need to reboot your computer more than once to do its job this is normal.

You can download Combofix from one of these links.
Link 1
Link 2
Link 3
1. Close any open browsers or any other programs that are open.
2. Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.

Double click on combofix.exe & follow the prompts.
When finished, it will produce a report for you.

Note 1: Do not mouseclick combofix's window while it's running. That may cause it to stall

Note 2: If you recieve an error "Illegal operation attempted on a registery key that has been marked for deletion." Please restart the computer

"information and logs"

  • In your next post I need the following
  • Log from Combofix
  • let me know of any problems you may have had
  • How is the computer doing now?

Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#4 Judy85

Judy85
  • Topic Starter

  • Members
  • 9 posts
  • OFFLINE
  •  
  • Local time:06:58 AM

Posted 12 October 2011 - 07:47 PM

I was able to do the dummy creator, and I have the Result file on my computer, but I'm posting this from my phone because as I was running ComboFix, it got to where it downloaded the Windows Recovery Console or whatever its called, and now it just seems to be stuck. When I clicked Yes for it to scan for malware, the blue box is just sitting there still with the 100% shown from the download and the yellow cursor just blinking. Its been like that for over half an hr. Is this normal?? There was an error message that popped up before the blue box opened that said parasites found & that something tried to attach itself to combofix. I copied that info into notepad, but I'm not sure I should open any other windows while combofix is running. What do I do?

#5 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:07:58 AM

Posted 12 October 2011 - 08:34 PM

restart the computer and run combofix in safe mode



Ok lets try this, I want you to run combofix in safe mode but it is very important that when combofix reboots the computer for you to direct it back into safe mode so it can finish the scan.

Boot into Safe Mode

Reboot your computer in Safe Mode.
  • If the computer is running, shut down Windows, and then turn off the power.
  • Wait 30 seconds, and then turn the computer on.
  • Start tapping the F8 key. The Windows Advanced Options Menu appears. If you begin tapping the F8 key too soon, some computers display a "keyboard error" message. To resolve this, restart the computer and try again.
  • Ensure that the Safe Mode option is selected.
  • Press Enter. The computer then begins to start in Safe mode.
  • Login on your usual account.

after combofix has finished its scan please post the report back here.

Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#6 Judy85

Judy85
  • Topic Starter

  • Members
  • 9 posts
  • OFFLINE
  •  
  • Local time:06:58 AM

Posted 12 October 2011 - 10:38 PM

Ok, here is the Dummy Creator log:

DummyCreator by Farbar
Ran by Judy (administrator) on 12-10-2011 at 18:50:54
**************************************************************

C:\WINDOWS\3238090663 [12-10-2011 18:50:55]

== End of log ==

And I successfully finished ComboFix in Safe Mode. Rebooted early because it said I had a rootkit. Here is the log:

ComboFix 11-10-12.04 - Judy 10/12/2011 21:05:14.1.2 - x86 MINIMAL
Microsoft Windows XP Home Edition 5.1.2600.3.1252.1.1033.18.1013.822 [GMT -5:00]
Running from: c:\documents and settings\Judy\My Documents\Downloads\ComboFix.exe
.
.
((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.
.
c:\program files\Setup.exe
c:\windows\$NtUninstallKB22889$\2807497153\@
c:\windows\$NtUninstallKB22889$\2807497153\click.tlb
c:\windows\$NtUninstallKB22889$\2807497153\L\opiucjoo
c:\windows\$NtUninstallKB22889$\2807497153\loader(2).tlb
c:\windows\$NtUninstallKB22889$\2807497153\loader.tlb
c:\windows\$NtUninstallKB22889$\2807497153\U\@00000001
c:\windows\$NtUninstallKB22889$\2807497153\U\@000000c0
c:\windows\$NtUninstallKB22889$\2807497153\U\@000000cb
c:\windows\$NtUninstallKB22889$\2807497153\U\@000000cf
c:\windows\$NtUninstallKB22889$\2807497153\U\@80000000
c:\windows\$NtUninstallKB22889$\2807497153\U\@800000c0
c:\windows\$NtUninstallKB22889$\2807497153\U\@800000cb
c:\windows\$NtUninstallKB22889$\2807497153\U\@800000cf
c:\windows\{2521BB91-29B1-4d7e-9137-AC9875D77735}
c:\windows\system32\c_48355.nls
c:\windows\system32\d3d9caps.dat
c:\windows\$NtUninstallKB22889$\1339708966 . . . . Failed to delete
.
c:\program files\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe . . . is infected!!
c:\program files\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe . . . was deleted!! You should re-install the program it pertains to
.
c:\program files\Bonjour\mDNSResponder.exe . . . is infected!!
c:\program files\Bonjour\mDNSResponder.exe . . . was deleted!! You should re-install the program it pertains to
.
c:\program files\iPod\bin\iPodService.exe . . . is infected!!
c:\program files\iPod\bin\iPodService.exe . . . was deleted!! You should re-install the program it pertains to
.
c:\program files\Java\jre6\bin\jqs.exe . . . is infected!!
c:\program files\Java\jre6\bin\jqs.exe . . . was deleted!! You should re-install the program it pertains to
.
c:\program files\System Control Manager\MSIService.exe . . . is infected!!
c:\program files\System Control Manager\MSIService.exe . . . was deleted!! You should re-install the program it pertains to
.
c:\progra~1\PHAROS~1\Core\CTskMstr.exe . . . is infected!!
c:\progra~1\PHAROS~1\Core\CTskMstr.exe . . . was deleted!! You should re-install the program it pertains to
.
c:\program files\Toshiba\Bluetooth Toshiba Stack\TosBtSrv.exe . . . is infected!!
c:\program files\Toshiba\Bluetooth Toshiba Stack\TosBtSrv.exe . . . was deleted!! You should re-install the program it pertains to
.
c:\program files\Yahoo!\SoftwareUpdate\YahooAUService.exe . . . is infected!!
c:\program files\Yahoo!\SoftwareUpdate\YahooAUService.exe . . . was deleted!! You should re-install the program it pertains to
.
.
((((((((((((((((((((((((((((((((((((((( Drivers/Services )))))))))))))))))))))))))))))))))))))))))))))))))
.
.
-------\Service_a75701c1
.
.
((((((((((((((((((((((((( Files Created from 2011-09-13 to 2011-10-13 )))))))))))))))))))))))))))))))
.
.
2011-10-13 01:55 . 2011-02-16 13:25 138496 ----a-w- c:\windows\system32\drivers\afd.sys
2011-10-12 23:50 . 2011-10-12 23:50 -------- d-----w- c:\windows\3238090663
2011-10-12 01:16 . 2011-10-12 01:34 -------- d---a-w- c:\documents and settings\All Users\Application Data\TEMP
2011-10-11 23:51 . 2011-10-11 23:51 -------- d--h--w- c:\windows\PIF
2011-10-11 22:42 . 2011-10-10 14:42 1558832 ---ha-w- c:\program files\TDSSKiller.exe
2011-10-11 22:23 . 2011-10-11 22:36 -------- d--h--w- c:\documents and settings\New Account
2011-10-11 22:15 . 2010-04-16 21:46 140 ---ha-w- c:\program files\script.reg
2011-10-11 21:59 . 2010-10-27 09:40 401920 ---ha-w- c:\program files\ssleay32.dll
2011-10-11 21:59 . 2010-10-27 09:40 1835520 ---ha-w- c:\program files\libeay32.dll
2011-10-11 21:59 . 2010-10-06 13:05 709120 ---ha-w- c:\program files\libcurl.dll
2011-10-11 21:59 . 2011-10-11 21:59 -------- d--h--w- c:\program files\AU
2011-10-11 21:58 . 2011-10-11 21:58 2405576 ---ha-w- c:\program files\HousecallLauncher64.exe
2011-10-11 21:56 . 2011-10-12 01:37 1558832 ----a-w- c:\program files\random.exe
2011-10-11 19:50 . 2011-10-11 19:51 -------- d--h--w- c:\documents and settings\Administrator
2011-10-11 19:31 . 2011-10-12 04:23 -------- d--ha-w- c:\program files\PC Tools Security
2011-10-11 19:31 . 2011-10-11 23:48 -------- d--ha-w- c:\documents and settings\All Users\Application Data\virus4
2011-10-11 19:30 . 2011-10-12 01:34 -------- d--h--w- c:\documents and settings\All Users\Application Data\PC Tools
2011-10-11 19:05 . 2011-10-11 19:05 -------- d-sh--w- c:\documents and settings\Judy\Local Settings\Application Data\a75701c1
.
.
.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2011-10-12 01:41 . 2009-08-02 20:42 41272 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2011-09-09 09:12 . 2009-03-04 22:15 599040 ---ha-w- c:\windows\system32\crypt32.dll
2011-08-31 22:00 . 2009-08-02 20:42 22216 ---ha-w- c:\windows\system32\drivers\mbam.sys
2011-08-31 14:55 . 2011-07-02 02:25 404640 ---ha-w- c:\windows\system32\FlashPlayerCPLApp.cpl
2011-07-15 13:29 . 2009-03-04 22:15 456320 ---ha-w- c:\windows\system32\drivers\mrxsmb.sys
2011-09-07 03:04 . 2011-06-11 06:40 134104 ---ha-w- c:\program files\mozilla firefox\components\browsercomps.dll
.
.
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shelliconoverlayidentifiers\DropboxExt1]
@="{FB314ED9-A251-47B7-93E1-CDD82E34AF8B}"
[HKEY_CLASSES_ROOT\CLSID\{FB314ED9-A251-47B7-93E1-CDD82E34AF8B}]
2011-02-18 05:12 94208 ----a-w- c:\documents and settings\Judy\Application Data\Dropbox\bin\DropboxExt.14.dll
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shelliconoverlayidentifiers\DropboxExt2]
@="{FB314EDA-A251-47B7-93E1-CDD82E34AF8B}"
[HKEY_CLASSES_ROOT\CLSID\{FB314EDA-A251-47B7-93E1-CDD82E34AF8B}]
2011-02-18 05:12 94208 ----a-w- c:\documents and settings\Judy\Application Data\Dropbox\bin\DropboxExt.14.dll
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shelliconoverlayidentifiers\DropboxExt3]
@="{FB314EDB-A251-47B7-93E1-CDD82E34AF8B}"
[HKEY_CLASSES_ROOT\CLSID\{FB314EDB-A251-47B7-93E1-CDD82E34AF8B}]
2011-02-18 05:12 94208 ----a-w- c:\documents and settings\Judy\Application Data\Dropbox\bin\DropboxExt.14.dll
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shelliconoverlayidentifiers\DropboxExt4]
@="{FB314EDC-A251-47B7-93E1-CDD82E34AF8B}"
[HKEY_CLASSES_ROOT\CLSID\{FB314EDC-A251-47B7-93E1-CDD82E34AF8B}]
2011-02-18 05:12 94208 ----a-w- c:\documents and settings\Judy\Application Data\Dropbox\bin\DropboxExt.14.dll
.
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"Messenger (Yahoo!)"="c:\progra~1\Yahoo!\MESSEN~1\YahooMessenger.exe" [2011-08-22 6276408]
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"IgfxTray"="c:\windows\system32\igfxtray.exe" [2007-12-19 135168]
"HotKeysCmds"="c:\windows\system32\hkcmd.exe" [2007-12-19 159744]
"Persistence"="c:\windows\system32\igfxpers.exe" [2007-12-19 131072]
"RTHDCPL"="RTHDCPL.EXE" [2008-12-30 18082304]
"ITSecMng"="c:\program files\TOSHIBA\Bluetooth Toshiba Stack\ItSecMng.exe" [2007-09-29 75136]
"MGSysCtrl"="c:\program files\System Control Manager\MGSysCtrl.exe" [2008-10-09 688128]
"{0228e555-4f9c-4e35-a3ec-b109a192b4c2}"="c:\program files\Google\Gmail Notifier\gnotify.exe" [2005-07-15 479232]
"SunJavaUpdateSched"="c:\program files\Common Files\Java\Java Update\jusched.exe" [2010-05-14 248552]
"QuickTime Task"="c:\program files\QuickTime\qttask.exe" [2010-03-19 421888]
"iTunesHelper"="c:\program files\iTunes\iTunesHelper.exe" [2010-07-21 141608]
"Adobe Reader Speed Launcher"="c:\program files\Adobe\Reader 8.0\Reader\Reader_sl.exe" [2011-05-27 40368]
"Adobe ARM"="c:\program files\Common Files\Adobe\ARM\1.0\AdobeARM.exe" [2011-03-30 937920]
.
c:\documents and settings\Judy\Start Menu\Programs\Startup\
Dropbox.lnk - c:\documents and settings\Judy\Application Data\Dropbox\bin\Dropbox.exe [2011-5-25 24176560]
.
c:\documents and settings\All Users\Start Menu\Programs\Startup\
Bluetooth Manager.lnk - c:\program files\Toshiba\Bluetooth Toshiba Stack\TosBtMng.exe [2008-2-22 2938184]
.
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]
"EnableFirewall"= 0 (0x0)
.
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"%windir%\\system32\\sessmgr.exe"=
"c:\\Program Files\\iTunes\\iTunes.exe"=
"c:\\Program Files\\Microsoft Office\\Office12\\OUTLOOK.EXE"=
"c:\\Program Files\\Yahoo!\\Messenger\\YahooMessenger.exe"=
"c:\\Documents and Settings\\Judy\\Application Data\\Dropbox\\bin\\Dropbox.exe"=
"c:\\Program Files\\Spotify\\spotify.exe"=
"c:\\Program Files\\Mozilla Firefox\\firefox.exe"=
"c:\\Program Files\\Common Files\\Adobe\\ARM\\1.0\\AdobeARM.exe"=
"c:\\Program Files\\Google\\Gmail Notifier\\gnotify.exe"=
"c:\\Program Files\\Common Files\\Java\\Java Update\\jusched.exe"=
"c:\\Program Files\\Common Files\\Java\\Java Update\\jucheck.exe"=
"c:\\Program Files\\Java\\jre6\\bin\\javaw.exe"=
"c:\\Program Files\\Common Files\\Java\\Java Update\\jaucheck.exe"=
"c:\\Documents and Settings\\New Account\\My Documents\\Downloads\\iExplore.exe"=
"c:\\Documents and Settings\\Judy\\Desktop\\sdasetup_revwire207[1].exe"=
"c:\\Program Files\\Malwarebytes' Anti-Malware\\mbam.exe"=
"c:\\Documents and Settings\\Judy\\My Documents\\Downloads\\iexplore.exe"=
.
R3 RSUSBSTOR;RtsUStor.Sys Realtek USB Card Reader;c:\windows\system32\drivers\RtsUStor.sys [3/4/2009 7:29 PM 162816]
S2 Micro Star SCM;Micro Star SCM;c:\program files\System Control Manager\MSIService.exe --> c:\program files\System Control Manager\MSIService.exe [?]
S3 PTDMBus;PANTECH USB Modem Composite Device Driver ;c:\windows\system32\drivers\PTDMBus.sys [11/2/2009 4:40 PM 55128]
S3 PTDMMdm;PANTECH USB Modem Drivers ;c:\windows\system32\drivers\PTDMMdm.sys [11/2/2009 4:40 PM 160984]
S3 PTDMVsp;PANTECH USB Modem Serial Port ;c:\windows\system32\drivers\PTDMVsp.sys [11/2/2009 4:40 PM 160984]
S3 PTDMWFLT;PTDMWWAN Filter Driver;c:\windows\system32\drivers\PTDMWFLT.sys [11/2/2009 4:40 PM 13528]
S3 PTDMWWAN;PANTECH USB Modem WWAN Driver;c:\windows\system32\drivers\PTDMWWAN.sys [11/2/2009 4:40 PM 118360]
S3 Rts516xIR;Realtek IR Driver;c:\windows\system32\DRIVERS\Rts516xIR.sys --> c:\windows\system32\DRIVERS\Rts516xIR.sys [?]
.
Contents of the 'Scheduled Tasks' folder
.
2011-09-08 c:\windows\Tasks\AppleSoftwareUpdate.job
- c:\program files\Apple Software Update\SoftwareUpdate.exe [2009-10-22 16:50]
.
.
------- Supplementary Scan -------
.
uStart Page = hxxp://www.google.com/
uDefault_Search_URL = hxxp://www.google.com/ie
uInternet Connection Wizard,ShellNext = iexplore
uInternet Settings,ProxyOverride = *.local
uSearchAssistant = hxxp://www.google.com/ie
uSearchURL,(Default) = hxxp://www.google.com/search?q=%s
IE: Add to Google Photos Screensa&ver - c:\windows\system32\GPhotos.scr/200
IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~2\Office12\EXCEL.EXE/3000
TCP: DhcpNameServer = 209.18.47.61 209.18.47.62
FF - ProfilePath - c:\documents and settings\Judy\Application Data\Mozilla\Firefox\Profiles\3prjsx6y.default\
FF - prefs.js: browser.startup.homepage - hxxp://www.google.com/
FF - user.js: yahoo.ytff.general.dontshowhpoffer - true
.
- - - - ORPHANS REMOVED - - - -
.
URLSearchHooks-{81017EA9-9AA8-4A6A-9734-7AF40E7D593F} - (no file)
HKLM-Run-SNM - c:\program files\SpyNoMore\SNM.exe
HKLM-Run-MWrPiWAOYHWVw.exe - c:\documents and settings\All Users\Application Data\MWrPiWAOYHWVw.exe
.
.
.
**************************************************************************
.
catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2011-10-12 21:59
Windows 5.1.2600 Service Pack 3 NTFS
.
scanning hidden processes ...
.
scanning hidden autostart entries ...
.
scanning hidden files ...
.
scan completed successfully
hidden files: 0
.
**************************************************************************
.
--------------------- DLLs Loaded Under Running Processes ---------------------
.
- - - - - - - > 'explorer.exe'(1656)
c:\windows\system32\WININET.dll
c:\documents and settings\Judy\Application Data\Dropbox\bin\DropboxExt.14.dll
c:\progra~1\WINDOW~2\wmpband.dll
c:\windows\system32\ieframe.dll
.
Completion time: 2011-10-12 22:17:59 - machine was rebooted
ComboFix-quarantined-files.txt 2011-10-13 03:17
.
Pre-Run: 17,485,889,536 bytes free
Post-Run: 18,278,469,632 bytes free
.
- - End Of File - - 938DC2AC42F40C022D795CDC10F520D1

When it was done, I rebooted into normal mode. My desktop icons are back, and the files in my Start menu are back. Google still redirected a couple times, but not as much as before.
When I logged on in normal mode, there was one error message that popped up that said something about a system device manager (I think? I left the message open to copy it, but it went away..)either not loading or not being found, or having to close...can't really remember, sorry!

Let me know what's next..thanks for your help

#7 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:07:58 AM

Posted 13 October 2011 - 08:10 AM

Greetings

Good That cleaned up some bad guys but I see some other stuff that we need to go after, so I want you to run this custom script for me.

:Run CFScript:

Open Notepad and copy/paste the text in the box into the window:

ClearJavaCache::

Save it to your desktop as CFScript.txt

Refering to the picture above, drag CFScript.txt into ComboFix.exe
Posted Image
This will let ComboFix run again.
Restart if you have to.
Save the produced logfile to your desktop.

Note: Do not mouseclick combofix's window whilst it's running. That may cause it to stall

"information and logs"

  • In your next post I need the following

  • report from Combofix
  • let me know of any problems you may have had
  • How is the computer doing now after running the script?

Gringo

I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#8 Judy85

Judy85
  • Topic Starter

  • Members
  • 9 posts
  • OFFLINE
  •  
  • Local time:06:58 AM

Posted 13 October 2011 - 12:03 PM

Hello,

Here is the ComboFix log with the new script:

ComboFix 11-10-13.03 - Judy 10/13/2011 11:10:10.2.2 - x86
Microsoft Windows XP Home Edition 5.1.2600.3.1252.1.1033.18.1013.557 [GMT -5:00]
Running from: c:\documents and settings\Judy\My Documents\Downloads\ComboFix.exe
Command switches used :: c:\documents and settings\Judy\Desktop\CFScript.txt
.
.
((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.
.
c:\windows\system32\
.
.
((((((((((((((((((((((((( Files Created from 2011-09-13 to 2011-10-13 )))))))))))))))))))))))))))))))
.
.
2011-10-13 01:55 . 2011-02-16 13:25 138496 ----a-w- c:\windows\system32\drivers\afd.sys
2011-10-12 23:50 . 2011-10-12 23:50 -------- d-----w- c:\windows\3238090663
2011-10-12 01:16 . 2011-10-12 01:34 -------- d---a-w- c:\documents and settings\All Users\Application Data\TEMP
2011-10-11 23:51 . 2011-10-11 23:51 -------- d--h--w- c:\windows\PIF
2011-10-11 22:42 . 2011-10-10 14:42 1558832 ---ha-w- c:\program files\TDSSKiller.exe
2011-10-11 22:23 . 2011-10-11 22:36 -------- d--h--w- c:\documents and settings\New Account
2011-10-11 22:15 . 2010-04-16 21:46 140 ---ha-w- c:\program files\script.reg
2011-10-11 21:59 . 2010-10-27 09:40 401920 ---ha-w- c:\program files\ssleay32.dll
2011-10-11 21:59 . 2010-10-27 09:40 1835520 ---ha-w- c:\program files\libeay32.dll
2011-10-11 21:59 . 2010-10-06 13:05 709120 ---ha-w- c:\program files\libcurl.dll
2011-10-11 21:59 . 2011-10-11 21:59 -------- d--h--w- c:\program files\AU
2011-10-11 21:58 . 2011-10-11 21:58 2405576 ---ha-w- c:\program files\HousecallLauncher64.exe
2011-10-11 21:56 . 2011-10-12 01:37 1558832 ----a-w- c:\program files\random.exe
2011-10-11 19:50 . 2011-10-11 19:51 -------- d--h--w- c:\documents and settings\Administrator
2011-10-11 19:31 . 2011-10-12 04:23 -------- d--ha-w- c:\program files\PC Tools Security
2011-10-11 19:31 . 2011-10-11 23:48 -------- d--ha-w- c:\documents and settings\All Users\Application Data\virus4
2011-10-11 19:30 . 2011-10-12 01:34 -------- d--h--w- c:\documents and settings\All Users\Application Data\PC Tools
2011-10-11 19:05 . 2011-10-11 19:05 -------- d-sh--w- c:\documents and settings\Judy\Local Settings\Application Data\a75701c1
.
.
.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2011-10-12 01:41 . 2009-08-02 20:42 41272 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2011-09-09 09:12 . 2009-03-04 22:15 599040 ---ha-w- c:\windows\system32\crypt32.dll
2011-08-31 22:00 . 2009-08-02 20:42 22216 ---ha-w- c:\windows\system32\drivers\mbam.sys
2011-08-31 14:55 . 2011-07-02 02:25 404640 ---ha-w- c:\windows\system32\FlashPlayerCPLApp.cpl
2011-09-07 03:04 . 2011-06-11 06:40 134104 ---ha-w- c:\program files\mozilla firefox\components\browsercomps.dll
.
.
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shelliconoverlayidentifiers\DropboxExt1]
@="{FB314ED9-A251-47B7-93E1-CDD82E34AF8B}"
[HKEY_CLASSES_ROOT\CLSID\{FB314ED9-A251-47B7-93E1-CDD82E34AF8B}]
2011-02-18 05:12 94208 ----a-w- c:\documents and settings\Judy\Application Data\Dropbox\bin\DropboxExt.14.dll
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shelliconoverlayidentifiers\DropboxExt2]
@="{FB314EDA-A251-47B7-93E1-CDD82E34AF8B}"
[HKEY_CLASSES_ROOT\CLSID\{FB314EDA-A251-47B7-93E1-CDD82E34AF8B}]
2011-02-18 05:12 94208 ----a-w- c:\documents and settings\Judy\Application Data\Dropbox\bin\DropboxExt.14.dll
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shelliconoverlayidentifiers\DropboxExt3]
@="{FB314EDB-A251-47B7-93E1-CDD82E34AF8B}"
[HKEY_CLASSES_ROOT\CLSID\{FB314EDB-A251-47B7-93E1-CDD82E34AF8B}]
2011-02-18 05:12 94208 ----a-w- c:\documents and settings\Judy\Application Data\Dropbox\bin\DropboxExt.14.dll
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shelliconoverlayidentifiers\DropboxExt4]
@="{FB314EDC-A251-47B7-93E1-CDD82E34AF8B}"
[HKEY_CLASSES_ROOT\CLSID\{FB314EDC-A251-47B7-93E1-CDD82E34AF8B}]
2011-02-18 05:12 94208 ----a-w- c:\documents and settings\Judy\Application Data\Dropbox\bin\DropboxExt.14.dll
.
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"Messenger (Yahoo!)"="c:\progra~1\Yahoo!\MESSEN~1\YahooMessenger.exe" [2011-08-22 6276408]
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"IgfxTray"="c:\windows\system32\igfxtray.exe" [2007-12-19 135168]
"HotKeysCmds"="c:\windows\system32\hkcmd.exe" [2007-12-19 159744]
"Persistence"="c:\windows\system32\igfxpers.exe" [2007-12-19 131072]
"RTHDCPL"="RTHDCPL.EXE" [2008-12-30 18082304]
"ITSecMng"="c:\program files\TOSHIBA\Bluetooth Toshiba Stack\ItSecMng.exe" [2007-09-29 75136]
"MGSysCtrl"="c:\program files\System Control Manager\MGSysCtrl.exe" [2008-10-09 688128]
"{0228e555-4f9c-4e35-a3ec-b109a192b4c2}"="c:\program files\Google\Gmail Notifier\gnotify.exe" [2005-07-15 479232]
"SunJavaUpdateSched"="c:\program files\Common Files\Java\Java Update\jusched.exe" [2010-05-14 248552]
"QuickTime Task"="c:\program files\QuickTime\qttask.exe" [2010-03-19 421888]
"iTunesHelper"="c:\program files\iTunes\iTunesHelper.exe" [2010-07-21 141608]
"Adobe Reader Speed Launcher"="c:\program files\Adobe\Reader 8.0\Reader\Reader_sl.exe" [2011-05-27 40368]
"Adobe ARM"="c:\program files\Common Files\Adobe\ARM\1.0\AdobeARM.exe" [2011-03-30 937920]
.
c:\documents and settings\Judy\Start Menu\Programs\Startup\
Dropbox.lnk - c:\documents and settings\Judy\Application Data\Dropbox\bin\Dropbox.exe [2011-5-25 24176560]
.
c:\documents and settings\All Users\Start Menu\Programs\Startup\
Bluetooth Manager.lnk - c:\program files\Toshiba\Bluetooth Toshiba Stack\TosBtMng.exe [2008-2-22 2938184]
.
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"%windir%\\system32\\sessmgr.exe"=
"c:\\Program Files\\iTunes\\iTunes.exe"=
"c:\\Program Files\\Microsoft Office\\Office12\\OUTLOOK.EXE"=
"c:\\Program Files\\Yahoo!\\Messenger\\YahooMessenger.exe"=
"c:\\Documents and Settings\\Judy\\Application Data\\Dropbox\\bin\\Dropbox.exe"=
"c:\\Program Files\\Spotify\\spotify.exe"=
"c:\\Program Files\\Mozilla Firefox\\firefox.exe"=
"c:\\Program Files\\Common Files\\Adobe\\ARM\\1.0\\AdobeARM.exe"=
"c:\\Program Files\\Google\\Gmail Notifier\\gnotify.exe"=
"c:\\Program Files\\Common Files\\Java\\Java Update\\jusched.exe"=
"c:\\Program Files\\Common Files\\Java\\Java Update\\jucheck.exe"=
"c:\\Program Files\\Java\\jre6\\bin\\javaw.exe"=
"c:\\Program Files\\Common Files\\Java\\Java Update\\jaucheck.exe"=
"c:\\Documents and Settings\\New Account\\My Documents\\Downloads\\iExplore.exe"=
"c:\\Documents and Settings\\Judy\\Desktop\\sdasetup_revwire207[1].exe"=
"c:\\Program Files\\Malwarebytes' Anti-Malware\\mbam.exe"=
"c:\\Documents and Settings\\Judy\\My Documents\\Downloads\\iexplore.exe"=
.
R3 RSUSBSTOR;RtsUStor.Sys Realtek USB Card Reader;c:\windows\system32\drivers\RtsUStor.sys [3/4/2009 7:29 PM 162816]
S2 Micro Star SCM;Micro Star SCM;c:\program files\System Control Manager\MSIService.exe --> c:\program files\System Control Manager\MSIService.exe [?]
S3 PTDMBus;PANTECH USB Modem Composite Device Driver ;c:\windows\system32\drivers\PTDMBus.sys [11/2/2009 4:40 PM 55128]
S3 PTDMMdm;PANTECH USB Modem Drivers ;c:\windows\system32\drivers\PTDMMdm.sys [11/2/2009 4:40 PM 160984]
S3 PTDMVsp;PANTECH USB Modem Serial Port ;c:\windows\system32\drivers\PTDMVsp.sys [11/2/2009 4:40 PM 160984]
S3 PTDMWFLT;PTDMWWAN Filter Driver;c:\windows\system32\drivers\PTDMWFLT.sys [11/2/2009 4:40 PM 13528]
S3 PTDMWWAN;PANTECH USB Modem WWAN Driver;c:\windows\system32\drivers\PTDMWWAN.sys [11/2/2009 4:40 PM 118360]
S3 Rts516xIR;Realtek IR Driver;c:\windows\system32\DRIVERS\Rts516xIR.sys --> c:\windows\system32\DRIVERS\Rts516xIR.sys [?]
.
Contents of the 'Scheduled Tasks' folder
.
2011-09-08 c:\windows\Tasks\AppleSoftwareUpdate.job
- c:\program files\Apple Software Update\SoftwareUpdate.exe [2009-10-22 16:50]
.
.
------- Supplementary Scan -------
.
uStart Page = hxxp://www.google.com/
uDefault_Search_URL = hxxp://www.google.com/ie
uInternet Connection Wizard,ShellNext = iexplore
uInternet Settings,ProxyOverride = *.local
uSearchAssistant = hxxp://www.google.com/ie
uSearchURL,(Default) = hxxp://www.google.com/search?q=%s
IE: Add to Google Photos Screensa&ver - c:\windows\system32\GPhotos.scr/200
IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~2\Office12\EXCEL.EXE/3000
TCP: DhcpNameServer = 209.18.47.61 209.18.47.62
FF - ProfilePath - c:\documents and settings\Judy\Application Data\Mozilla\Firefox\Profiles\3prjsx6y.default\
FF - prefs.js: browser.startup.homepage - hxxp://www.google.com/
FF - user.js: yahoo.ytff.general.dontshowhpoffer - true
.
.
**************************************************************************
.
catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2011-10-13 11:43
Windows 5.1.2600 Service Pack 3 NTFS
.
scanning hidden processes ...
.
scanning hidden autostart entries ...
.
scanning hidden files ...
.
scan completed successfully
hidden files: 0
.
**************************************************************************
.
--------------------- DLLs Loaded Under Running Processes ---------------------
.
- - - - - - - > 'winlogon.exe'(864)
c:\windows\system32\igfxdev.dll
.
Completion time: 2011-10-13 11:58:52
ComboFix-quarantined-files.txt 2011-10-13 16:58
ComboFix2.txt 2011-10-13 03:18
.
Pre-Run: 17,092,370,432 bytes free
Post-Run: 17,258,029,056 bytes free
.
- - End Of File - - BAEED138CAC0A39107D2DAC9B131807F

Google is still redirecting :(

#9 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:07:58 AM

Posted 13 October 2011 - 12:21 PM

Hello

I want you to run this tool for me next.

tdsskiller:

Please read carefully and follow these steps.
  • Download TDSSKiller and save it to your Desktop.
  • doubleclick on TDSSKiller.exe to run the application, then on Start Scan.
  • If an infected file is detected, the default action will be Cure, click on Continue.
  • If a suspicious file is detected, the default action will be Skip, click on Continue.
  • It may ask you to reboot the computer to complete the process. Click on Reboot Now.
  • If no reboot is require, click on Report. A log file should appear. Please copy and paste the contents of that file here.
  • If a reboot is required, the report can also be found in your root directory, (usually C:\ folder) in the form of "TDSSKiller.[Version]_[Date]_[Time]_log.txt". Please copy and paste the contents of that file here.

Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#10 Judy85

Judy85
  • Topic Starter

  • Members
  • 9 posts
  • OFFLINE
  •  
  • Local time:06:58 AM

Posted 13 October 2011 - 12:58 PM

Here's the TDSS log:

12:50:55.0609 0264 TDSS rootkit removing tool 2.6.8.0 Oct 12 2011 07:30:54
12:50:57.0437 0264 ============================================================
12:50:57.0437 0264 Current date / time: 2011/10/13 12:50:57.0437
12:50:57.0437 0264 SystemInfo:
12:50:57.0437 0264
12:50:57.0437 0264 OS Version: 5.1.2600 ServicePack: 3.0
12:50:57.0437 0264 Product type: Workstation
12:50:57.0437 0264 ComputerName: JUDYNETBOOK
12:50:57.0437 0264 UserName: Judy
12:50:57.0437 0264 Windows directory: C:\WINDOWS
12:50:57.0437 0264 System windows directory: C:\WINDOWS
12:50:57.0437 0264 Processor architecture: Intel x86
12:50:57.0437 0264 Number of processors: 2
12:50:57.0437 0264 Page size: 0x1000
12:50:57.0437 0264 Boot type: Normal boot
12:50:57.0437 0264 ============================================================
12:50:58.0890 0264 Initialize success
12:51:03.0937 2244 ============================================================
12:51:03.0937 2244 Scan started
12:51:03.0937 2244 Mode: Manual;
12:51:03.0937 2244 ============================================================
12:51:05.0328 2244 Abiosdsk - ok
12:51:05.0343 2244 abp480n5 - ok
12:51:05.0406 2244 ACPI (8fd99680a539792a30e97944fdaecf17) C:\WINDOWS\system32\DRIVERS\ACPI.sys
12:51:05.0406 2244 ACPI - ok
12:51:05.0421 2244 ACPIEC (9859c0f6936e723e4892d7141b1327d5) C:\WINDOWS\system32\DRIVERS\ACPIEC.sys
12:51:05.0421 2244 ACPIEC - ok
12:51:05.0453 2244 adpu160m - ok
12:51:05.0484 2244 aec (8bed39e3c35d6a489438b8141717a557) C:\WINDOWS\system32\drivers\aec.sys
12:51:05.0500 2244 aec - ok
12:51:05.0562 2244 AFD (8d499b1276012eb907e7a9e0f4d8fda4) C:\WINDOWS\System32\drivers\afd.sys
12:51:05.0562 2244 AFD - ok
12:51:05.0578 2244 Aha154x - ok
12:51:05.0593 2244 aic78u2 - ok
12:51:05.0609 2244 aic78xx - ok
12:51:05.0640 2244 AliIde - ok
12:51:05.0656 2244 amsint - ok
12:51:05.0734 2244 AR5416 (7d53e5646ba23fd51296f7ef8979a000) C:\WINDOWS\system32\DRIVERS\athw.sys
12:51:05.0781 2244 AR5416 - ok
12:51:05.0796 2244 asc - ok
12:51:05.0812 2244 asc3350p - ok
12:51:05.0828 2244 asc3550 - ok
12:51:05.0875 2244 AsyncMac (b153affac761e7f5fcfa822b9c4e97bc) C:\WINDOWS\system32\DRIVERS\asyncmac.sys
12:51:05.0875 2244 AsyncMac - ok
12:51:05.0890 2244 atapi (9f3a2f5aa6875c72bf062c712cfa2674) C:\WINDOWS\system32\DRIVERS\atapi.sys
12:51:05.0890 2244 atapi - ok
12:51:05.0906 2244 Atdisk - ok
12:51:05.0937 2244 Atmarpc (9916c1225104ba14794209cfa8012159) C:\WINDOWS\system32\DRIVERS\atmarpc.sys
12:51:05.0953 2244 Atmarpc - ok
12:51:05.0984 2244 audstub (d9f724aa26c010a217c97606b160ed68) C:\WINDOWS\system32\DRIVERS\audstub.sys
12:51:05.0984 2244 audstub - ok
12:51:06.0000 2244 Beep (da1f27d85e0d1525f6621372e7b685e9) C:\WINDOWS\system32\drivers\Beep.sys
12:51:06.0015 2244 Beep - ok
12:51:06.0109 2244 catchme - ok
12:51:06.0140 2244 cbidf2k (90a673fc8e12a79afbed2576f6a7aaf9) C:\WINDOWS\system32\drivers\cbidf2k.sys
12:51:06.0140 2244 cbidf2k - ok
12:51:06.0171 2244 CCDECODE (0be5aef125be881c4f854c554f2b025c) C:\WINDOWS\system32\DRIVERS\CCDECODE.sys
12:51:06.0171 2244 CCDECODE - ok
12:51:06.0187 2244 cd20xrnt - ok
12:51:06.0218 2244 Cdaudio (c1b486a7658353d33a10cc15211a873b) C:\WINDOWS\system32\drivers\Cdaudio.sys
12:51:06.0218 2244 Cdaudio - ok
12:51:06.0250 2244 Cdfs (c885b02847f5d2fd45a24e219ed93b32) C:\WINDOWS\system32\drivers\Cdfs.sys
12:51:06.0250 2244 Cdfs - ok
12:51:06.0281 2244 Cdrom (1f4260cc5b42272d71f79e570a27a4fe) C:\WINDOWS\system32\DRIVERS\cdrom.sys
12:51:06.0281 2244 Cdrom - ok
12:51:06.0296 2244 Changer - ok
12:51:06.0328 2244 CmBatt (0f6c187d38d98f8df904589a5f94d411) C:\WINDOWS\system32\DRIVERS\CmBatt.sys
12:51:06.0328 2244 CmBatt - ok
12:51:06.0343 2244 CmdIde - ok
12:51:06.0375 2244 Compbatt (6e4c9f21f0fae8940661144f41b13203) C:\WINDOWS\system32\DRIVERS\compbatt.sys
12:51:06.0375 2244 Compbatt - ok
12:51:06.0406 2244 Cpqarray - ok
12:51:06.0421 2244 dac2w2k - ok
12:51:06.0453 2244 dac960nt - ok
12:51:06.0484 2244 Disk (044452051f3e02e7963599fc8f4f3e25) C:\WINDOWS\system32\DRIVERS\disk.sys
12:51:06.0484 2244 Disk - ok
12:51:06.0546 2244 dmboot (d992fe1274bde0f84ad826acae022a41) C:\WINDOWS\system32\drivers\dmboot.sys
12:51:06.0593 2244 dmboot - ok
12:51:06.0625 2244 dmio (7c824cf7bbde77d95c08005717a95f6f) C:\WINDOWS\system32\drivers\dmio.sys
12:51:06.0625 2244 dmio - ok
12:51:06.0656 2244 dmload (e9317282a63ca4d188c0df5e09c6ac5f) C:\WINDOWS\system32\drivers\dmload.sys
12:51:06.0656 2244 dmload - ok
12:51:06.0687 2244 DMusic (8a208dfcf89792a484e76c40e5f50b45) C:\WINDOWS\system32\drivers\DMusic.sys
12:51:06.0703 2244 DMusic - ok
12:51:06.0734 2244 dpti2o - ok
12:51:06.0750 2244 drmkaud (8f5fcff8e8848afac920905fbd9d33c8) C:\WINDOWS\system32\drivers\drmkaud.sys
12:51:06.0750 2244 drmkaud - ok
12:51:06.0796 2244 Fastfat (38d332a6d56af32635675f132548343e) C:\WINDOWS\system32\drivers\Fastfat.sys
12:51:06.0812 2244 Fastfat - ok
12:51:06.0843 2244 Fdc (92cdd60b6730b9f50f6a1a0c1f8cdc81) C:\WINDOWS\system32\drivers\Fdc.sys
12:51:06.0859 2244 Fdc - ok
12:51:06.0875 2244 Fips (d45926117eb9fa946a6af572fbe1caa3) C:\WINDOWS\system32\drivers\Fips.sys
12:51:06.0890 2244 Fips - ok
12:51:06.0906 2244 Flpydisk (9d27e7b80bfcdf1cdd9b555862d5e7f0) C:\WINDOWS\system32\drivers\Flpydisk.sys
12:51:06.0906 2244 Flpydisk - ok
12:51:06.0937 2244 FltMgr (b2cf4b0786f8212cb92ed2b50c6db6b0) C:\WINDOWS\system32\DRIVERS\fltMgr.sys
12:51:06.0937 2244 FltMgr - ok
12:51:06.0953 2244 Fs_Rec (3e1e2bd4f39b0e2b7dc4f4d2bcc2779a) C:\WINDOWS\system32\drivers\Fs_Rec.sys
12:51:06.0953 2244 Fs_Rec - ok
12:51:06.0984 2244 Ftdisk (6ac26732762483366c3969c9e4d2259d) C:\WINDOWS\system32\DRIVERS\ftdisk.sys
12:51:06.0984 2244 Ftdisk - ok
12:51:07.0015 2244 GEARAspiWDM (8182ff89c65e4d38b2de4bb0fb18564e) C:\WINDOWS\system32\DRIVERS\GEARAspiWDM.sys
12:51:07.0015 2244 GEARAspiWDM - ok
12:51:07.0046 2244 Gpc (0a02c63c8b144bd8c86b103dee7c86a2) C:\WINDOWS\system32\DRIVERS\msgpc.sys
12:51:07.0046 2244 Gpc - ok
12:51:07.0093 2244 HDAudBus (573c7d0a32852b48f3058cfd8026f511) C:\WINDOWS\system32\DRIVERS\HDAudBus.sys
12:51:07.0109 2244 HDAudBus - ok
12:51:07.0125 2244 HidUsb (ccf82c5ec8a7326c3066de870c06daf1) C:\WINDOWS\system32\DRIVERS\hidusb.sys
12:51:07.0125 2244 HidUsb - ok
12:51:07.0156 2244 hpn - ok
12:51:07.0203 2244 HTTP (f80a415ef82cd06ffaf0d971528ead38) C:\WINDOWS\system32\Drivers\HTTP.sys
12:51:07.0203 2244 HTTP - ok
12:51:07.0234 2244 i2omgmt - ok
12:51:07.0250 2244 i2omp - ok
12:51:07.0265 2244 i8042prt (4a0b06aa8943c1e332520f7440c0aa30) C:\WINDOWS\system32\DRIVERS\i8042prt.sys
12:51:07.0265 2244 i8042prt - ok
12:51:07.0484 2244 ialm (0f68e2ec713f132ffb19e45415b09679) C:\WINDOWS\system32\DRIVERS\igxpmp32.sys
12:51:07.0671 2244 ialm - ok
12:51:07.0703 2244 Imapi (083a052659f5310dd8b6a6cb05edcf8e) C:\WINDOWS\system32\DRIVERS\imapi.sys
12:51:07.0703 2244 Imapi - ok
12:51:07.0734 2244 ini910u - ok
12:51:07.0937 2244 IntcAzAudAddService (81b7003bf13ff3ac95d7b2d4c2e8f787) C:\WINDOWS\system32\drivers\RtkHDAud.sys
12:51:08.0078 2244 IntcAzAudAddService - ok
12:51:08.0093 2244 IntelIde - ok
12:51:08.0125 2244 intelppm (8c953733d8f36eb2133f5bb58808b66b) C:\WINDOWS\system32\DRIVERS\intelppm.sys
12:51:08.0125 2244 intelppm - ok
12:51:08.0171 2244 Ip6Fw (3bb22519a194418d5fec05d800a19ad0) C:\WINDOWS\system32\DRIVERS\Ip6Fw.sys
12:51:08.0171 2244 Ip6Fw - ok
12:51:08.0187 2244 IpFilterDriver (731f22ba402ee4b62748adaf6363c182) C:\WINDOWS\system32\DRIVERS\ipfltdrv.sys
12:51:08.0203 2244 IpFilterDriver - ok
12:51:08.0218 2244 IpInIp (b87ab476dcf76e72010632b5550955f5) C:\WINDOWS\system32\DRIVERS\ipinip.sys
12:51:08.0218 2244 IpInIp - ok
12:51:08.0250 2244 IpNat (cc748ea12c6effde940ee98098bf96bb) C:\WINDOWS\system32\DRIVERS\ipnat.sys
12:51:08.0265 2244 IpNat - ok
12:51:08.0296 2244 IPSec (23c74d75e36e7158768dd63d92789a91) C:\WINDOWS\system32\DRIVERS\ipsec.sys
12:51:08.0296 2244 IPSec - ok
12:51:08.0312 2244 IRENUM (c93c9ff7b04d772627a3646d89f7bf89) C:\WINDOWS\system32\DRIVERS\irenum.sys
12:51:08.0312 2244 IRENUM - ok
12:51:08.0359 2244 isapnp (05a299ec56e52649b1cf2fc52d20f2d7) C:\WINDOWS\system32\DRIVERS\isapnp.sys
12:51:08.0359 2244 isapnp - ok
12:51:08.0390 2244 Kbdclass (463c1ec80cd17420a542b7f36a36f128) C:\WINDOWS\system32\DRIVERS\kbdclass.sys
12:51:08.0390 2244 Kbdclass - ok
12:51:08.0437 2244 kmixer (692bcf44383d056aed41b045a323d378) C:\WINDOWS\system32\drivers\kmixer.sys
12:51:08.0437 2244 kmixer - ok
12:51:08.0468 2244 KSecDD (b467646c54cc746128904e1654c750c1) C:\WINDOWS\system32\drivers\KSecDD.sys
12:51:08.0468 2244 KSecDD - ok
12:51:08.0500 2244 lbrtfdc - ok
12:51:08.0546 2244 mnmdd (4ae068242760a1fb6e1a44bf4e16afa6) C:\WINDOWS\system32\drivers\mnmdd.sys
12:51:08.0562 2244 mnmdd - ok
12:51:08.0593 2244 Modem (dfcbad3cec1c5f964962ae10e0bcc8e1) C:\WINDOWS\system32\drivers\Modem.sys
12:51:08.0593 2244 Modem - ok
12:51:08.0625 2244 Mouclass (35c9e97194c8cfb8430125f8dbc34d04) C:\WINDOWS\system32\DRIVERS\mouclass.sys
12:51:08.0625 2244 Mouclass - ok
12:51:08.0640 2244 mouhid (b1c303e17fb9d46e87a98e4ba6769685) C:\WINDOWS\system32\DRIVERS\mouhid.sys
12:51:08.0640 2244 mouhid - ok
12:51:08.0656 2244 MountMgr (a80b9a0bad1b73637dbcbba7df72d3fd) C:\WINDOWS\system32\drivers\MountMgr.sys
12:51:08.0656 2244 MountMgr - ok
12:51:08.0671 2244 mraid35x - ok
12:51:08.0703 2244 MRxDAV (11d42bb6206f33fbb3ba0288d3ef81bd) C:\WINDOWS\system32\DRIVERS\mrxdav.sys
12:51:08.0703 2244 MRxDAV - ok
12:51:08.0765 2244 MRxSmb (7d304a5eb4344ebeeab53a2fe3ffb9f0) C:\WINDOWS\system32\DRIVERS\mrxsmb.sys
12:51:08.0796 2244 MRxSmb - ok
12:51:08.0828 2244 Msfs (c941ea2454ba8350021d774daf0f1027) C:\WINDOWS\system32\drivers\Msfs.sys
12:51:08.0828 2244 Msfs - ok
12:51:08.0859 2244 MSKSSRV (d1575e71568f4d9e14ca56b7b0453bf1) C:\WINDOWS\system32\drivers\MSKSSRV.sys
12:51:08.0859 2244 MSKSSRV - ok
12:51:08.0875 2244 MSPCLOCK (325bb26842fc7ccc1fcce2c457317f3e) C:\WINDOWS\system32\drivers\MSPCLOCK.sys
12:51:08.0875 2244 MSPCLOCK - ok
12:51:08.0906 2244 MSPQM (bad59648ba099da4a17680b39730cb3d) C:\WINDOWS\system32\drivers\MSPQM.sys
12:51:08.0906 2244 MSPQM - ok
12:51:08.0937 2244 mssmbios (af5f4f3f14a8ea2c26de30f7a1e17136) C:\WINDOWS\system32\DRIVERS\mssmbios.sys
12:51:08.0937 2244 mssmbios - ok
12:51:08.0968 2244 MSTEE (e53736a9e30c45fa9e7b5eac55056d1d) C:\WINDOWS\system32\drivers\MSTEE.sys
12:51:08.0968 2244 MSTEE - ok
12:51:09.0000 2244 Mup (de6a75f5c270e756c5508d94b6cf68f5) C:\WINDOWS\system32\drivers\Mup.sys
12:51:09.0000 2244 Mup - ok
12:51:09.0031 2244 NABTSFEC (5b50f1b2a2ed47d560577b221da734db) C:\WINDOWS\system32\DRIVERS\NABTSFEC.sys
12:51:09.0031 2244 NABTSFEC - ok
12:51:09.0062 2244 NDIS (1df7f42665c94b825322fae71721130d) C:\WINDOWS\system32\drivers\NDIS.sys
12:51:09.0078 2244 NDIS - ok
12:51:09.0093 2244 NdisIP (7ff1f1fd8609c149aa432f95a8163d97) C:\WINDOWS\system32\DRIVERS\NdisIP.sys
12:51:09.0093 2244 NdisIP - ok
12:51:09.0125 2244 NdisTapi (0109c4f3850dfbab279542515386ae22) C:\WINDOWS\system32\DRIVERS\ndistapi.sys
12:51:09.0125 2244 NdisTapi - ok
12:51:09.0171 2244 Ndisuio (f927a4434c5028758a842943ef1a3849) C:\WINDOWS\system32\DRIVERS\ndisuio.sys
12:51:09.0171 2244 Ndisuio - ok
12:51:09.0203 2244 NdisWan (edc1531a49c80614b2cfda43ca8659ab) C:\WINDOWS\system32\DRIVERS\ndiswan.sys
12:51:09.0218 2244 NdisWan - ok
12:51:09.0250 2244 NDProxy (9282bd12dfb069d3889eb3fcc1000a9b) C:\WINDOWS\system32\drivers\NDProxy.sys
12:51:09.0250 2244 NDProxy - ok
12:51:09.0265 2244 NetBIOS (5d81cf9a2f1a3a756b66cf684911cdf0) C:\WINDOWS\system32\DRIVERS\netbios.sys
12:51:09.0281 2244 NetBIOS - ok
12:51:09.0296 2244 NetBT (74b2b2f5bea5e9a3dc021d685551bd3d) C:\WINDOWS\system32\DRIVERS\netbt.sys
12:51:09.0312 2244 NetBT - ok
12:51:09.0359 2244 Npfs (3182d64ae053d6fb034f44b6def8034a) C:\WINDOWS\system32\drivers\Npfs.sys
12:51:09.0359 2244 Npfs - ok
12:51:09.0421 2244 Ntfs (78a08dd6a8d65e697c18e1db01c5cdca) C:\WINDOWS\system32\drivers\Ntfs.sys
12:51:09.0437 2244 Ntfs - ok
12:51:09.0468 2244 Null (73c1e1f395918bc2c6dd67af7591a3ad) C:\WINDOWS\system32\drivers\Null.sys
12:51:09.0468 2244 Null - ok
12:51:09.0500 2244 NwlnkFlt (b305f3fad35083837ef46a0bbce2fc57) C:\WINDOWS\system32\DRIVERS\nwlnkflt.sys
12:51:09.0500 2244 NwlnkFlt - ok
12:51:09.0546 2244 NwlnkFwd (c99b3415198d1aab7227f2c88fd664b9) C:\WINDOWS\system32\DRIVERS\nwlnkfwd.sys
12:51:09.0546 2244 NwlnkFwd - ok
12:51:09.0593 2244 Parport (5575faf8f97ce5e713d108c2a58d7c7c) C:\WINDOWS\system32\drivers\Parport.sys
12:51:09.0593 2244 Parport - ok
12:51:09.0609 2244 PartMgr (beb3ba25197665d82ec7065b724171c6) C:\WINDOWS\system32\drivers\PartMgr.sys
12:51:09.0609 2244 PartMgr - ok
12:51:09.0640 2244 ParVdm (70e98b3fd8e963a6a46a2e6247e0bea1) C:\WINDOWS\system32\drivers\ParVdm.sys
12:51:09.0656 2244 ParVdm - ok
12:51:09.0671 2244 PCI (a219903ccf74233761d92bef471a07b1) C:\WINDOWS\system32\DRIVERS\pci.sys
12:51:09.0671 2244 PCI - ok
12:51:09.0687 2244 PCIDump - ok
12:51:09.0703 2244 PCIIde (ccf5f451bb1a5a2a522a76e670000ff0) C:\WINDOWS\system32\DRIVERS\pciide.sys
12:51:09.0703 2244 PCIIde - ok
12:51:09.0734 2244 Pcmcia (9e89ef60e9ee05e3f2eef2da7397f1c1) C:\WINDOWS\system32\drivers\Pcmcia.sys
12:51:09.0750 2244 Pcmcia - ok
12:51:09.0765 2244 PDCOMP - ok
12:51:09.0781 2244 PDFRAME - ok
12:51:09.0796 2244 PDRELI - ok
12:51:09.0812 2244 PDRFRAME - ok
12:51:09.0843 2244 perc2 - ok
12:51:09.0859 2244 perc2hib - ok
12:51:09.0937 2244 PptpMiniport (efeec01b1d3cf84f16ddd24d9d9d8f99) C:\WINDOWS\system32\DRIVERS\raspptp.sys
12:51:09.0937 2244 PptpMiniport - ok
12:51:09.0953 2244 PSched (09298ec810b07e5d582cb3a3f9255424) C:\WINDOWS\system32\DRIVERS\psched.sys
12:51:09.0968 2244 PSched - ok
12:51:10.0046 2244 PTDMBus (d4ddccd1a0d747e9779019f0a690fcad) C:\WINDOWS\system32\DRIVERS\PTDMBus.sys
12:51:10.0093 2244 PTDMBus - ok
12:51:10.0203 2244 PTDMMdm (2cd607e62167802b3553ee2dfdb3f0bb) C:\WINDOWS\system32\DRIVERS\PTDMMdm.sys
12:51:10.0218 2244 PTDMMdm - ok
12:51:10.0250 2244 PTDMVsp (2821ac34cbda96c7fa67128f81e11721) C:\WINDOWS\system32\DRIVERS\PTDMVsp.sys
12:51:10.0250 2244 PTDMVsp - ok
12:51:10.0296 2244 PTDMWFLT (5b1d4608c73b51fa8fe047e3a2e7ed94) C:\WINDOWS\system32\DRIVERS\PTDMWFLT.sys
12:51:10.0296 2244 PTDMWFLT - ok
12:51:10.0312 2244 PTDMWWAN (c8c70892ba50649b23320381216c3da0) C:\WINDOWS\system32\DRIVERS\PTDMWWAN.sys
12:51:10.0328 2244 PTDMWWAN - ok
12:51:10.0343 2244 Ptilink (80d317bd1c3dbc5d4fe7b1678c60cadd) C:\WINDOWS\system32\DRIVERS\ptilink.sys
12:51:10.0343 2244 Ptilink - ok
12:51:10.0406 2244 PxHelp20 (49452bfcec22f36a7a9b9c2181bc3042) C:\WINDOWS\system32\Drivers\PxHelp20.sys
12:51:10.0406 2244 PxHelp20 - ok
12:51:10.0421 2244 ql1080 - ok
12:51:10.0437 2244 Ql10wnt - ok
12:51:10.0453 2244 ql12160 - ok
12:51:10.0468 2244 ql1240 - ok
12:51:10.0500 2244 ql1280 - ok
12:51:10.0515 2244 RasAcd (fe0d99d6f31e4fad8159f690d68ded9c) C:\WINDOWS\system32\DRIVERS\rasacd.sys
12:51:10.0515 2244 RasAcd - ok
12:51:10.0578 2244 Rasl2tp (11b4a627bc9614b885c4969bfa5ff8a6) C:\WINDOWS\system32\DRIVERS\rasl2tp.sys
12:51:10.0578 2244 Rasl2tp - ok
12:51:10.0593 2244 RasPppoe (5bc962f2654137c9909c3d4603587dee) C:\WINDOWS\system32\DRIVERS\raspppoe.sys
12:51:10.0593 2244 RasPppoe - ok
12:51:10.0625 2244 Raspti (fdbb1d60066fcfbb7452fd8f9829b242) C:\WINDOWS\system32\DRIVERS\raspti.sys
12:51:10.0625 2244 Raspti - ok
12:51:10.0656 2244 Rdbss (7ad224ad1a1437fe28d89cf22b17780a) C:\WINDOWS\system32\DRIVERS\rdbss.sys
12:51:10.0656 2244 Rdbss - ok
12:51:10.0671 2244 RDPCDD (4912d5b403614ce99c28420f75353332) C:\WINDOWS\system32\DRIVERS\RDPCDD.sys
12:51:10.0671 2244 RDPCDD - ok
12:51:10.0718 2244 RDPWD (fc105dd312ed64eb66bff111e8ec6eac) C:\WINDOWS\system32\drivers\RDPWD.sys
12:51:10.0718 2244 RDPWD - ok
12:51:10.0765 2244 redbook (f828dd7e1419b6653894a8f97a0094c5) C:\WINDOWS\system32\DRIVERS\redbook.sys
12:51:10.0781 2244 redbook - ok
12:51:10.0828 2244 RSUSBSTOR (7ffa9821b1c5e0e0667e0a2685cfb89f) C:\WINDOWS\system32\Drivers\RtsUStor.sys
12:51:10.0828 2244 RSUSBSTOR - ok
12:51:10.0875 2244 rtl8187Se (85334aa5417ba063e9aae58eb3c7280d) C:\WINDOWS\system32\DRIVERS\rtl8187Se.sys
12:51:10.0890 2244 rtl8187Se - ok
12:51:10.0937 2244 RTLE8023xp (185641ad7e80bfce0aa545d3ec79d557) C:\WINDOWS\system32\DRIVERS\Rtenicxp.sys
12:51:10.0937 2244 RTLE8023xp - ok
12:51:10.0953 2244 Rts516xIR - ok
12:51:11.0000 2244 Secdrv (90a3935d05b494a5a39d37e71f09a677) C:\WINDOWS\system32\DRIVERS\secdrv.sys
12:51:11.0000 2244 Secdrv - ok
12:51:11.0046 2244 Serial (cca207a8896d4c6a0c9ce29a4ae411a7) C:\WINDOWS\system32\drivers\Serial.sys
12:51:11.0046 2244 Serial - ok
12:51:11.0093 2244 Sfloppy (8e6b8c671615d126fdc553d1e2de5562) C:\WINDOWS\system32\DRIVERS\sfloppy.sys
12:51:11.0093 2244 Sfloppy - ok
12:51:11.0125 2244 Simbad - ok
12:51:11.0171 2244 SLIP (866d538ebe33709a5c9f5c62b73b7d14) C:\WINDOWS\system32\DRIVERS\SLIP.sys
12:51:11.0171 2244 SLIP - ok
12:51:11.0187 2244 Sparrow - ok
12:51:11.0234 2244 splitter (ab8b92451ecb048a4d1de7c3ffcb4a9f) C:\WINDOWS\system32\drivers\splitter.sys
12:51:11.0234 2244 splitter - ok
12:51:11.0265 2244 sr (76bb022c2fb6902fd5bdd4f78fc13a5d) C:\WINDOWS\system32\DRIVERS\sr.sys
12:51:11.0265 2244 sr - ok
12:51:11.0328 2244 Srv (47ddfc2f003f7f9f0592c6874962a2e7) C:\WINDOWS\system32\DRIVERS\srv.sys
12:51:11.0343 2244 Srv - ok
12:51:11.0390 2244 streamip (77813007ba6265c4b6098187e6ed79d2) C:\WINDOWS\system32\DRIVERS\StreamIP.sys
12:51:11.0390 2244 streamip - ok
12:51:11.0406 2244 swenum (3941d127aef12e93addf6fe6ee027e0f) C:\WINDOWS\system32\DRIVERS\swenum.sys
12:51:11.0406 2244 swenum - ok
12:51:11.0437 2244 swmidi (8ce882bcc6cf8a62f2b2323d95cb3d01) C:\WINDOWS\system32\drivers\swmidi.sys
12:51:11.0437 2244 swmidi - ok
12:51:11.0453 2244 symc810 - ok
12:51:11.0484 2244 symc8xx - ok
12:51:11.0500 2244 sym_hi - ok
12:51:11.0515 2244 sym_u3 - ok
12:51:11.0562 2244 sysaudio (8b83f3ed0f1688b4958f77cd6d2bf290) C:\WINDOWS\system32\drivers\sysaudio.sys
12:51:11.0562 2244 sysaudio - ok
12:51:11.0640 2244 Tcpip (9aefa14bd6b182d61e3119fa5f436d3d) C:\WINDOWS\system32\DRIVERS\tcpip.sys
12:51:11.0640 2244 Tcpip - ok
12:51:11.0671 2244 TDPIPE (6471a66807f5e104e4885f5b67349397) C:\WINDOWS\system32\drivers\TDPIPE.sys
12:51:11.0671 2244 TDPIPE - ok
12:51:11.0703 2244 TDTCP (c56b6d0402371cf3700eb322ef3aaf61) C:\WINDOWS\system32\drivers\TDTCP.sys
12:51:11.0703 2244 TDTCP - ok
12:51:11.0734 2244 TermDD (88155247177638048422893737429d9e) C:\WINDOWS\system32\DRIVERS\termdd.sys
12:51:11.0734 2244 TermDD - ok
12:51:11.0781 2244 TosIde - ok
12:51:11.0812 2244 tosporte (8d624d3bd1f2d78bd1c01a2d4e954b4e) C:\WINDOWS\system32\DRIVERS\tosporte.sys
12:51:11.0812 2244 tosporte - ok
12:51:11.0843 2244 tosrfbd (399c5e4db7bdd5a83a7d26c96389b85a) C:\WINDOWS\system32\DRIVERS\tosrfbd.sys
12:51:11.0843 2244 tosrfbd - ok
12:51:11.0875 2244 tosrfbnp (181e217a7a326817d97946d045b3cb46) C:\WINDOWS\system32\Drivers\tosrfbnp.sys
12:51:11.0875 2244 tosrfbnp - ok
12:51:11.0906 2244 Tosrfcom (e90ace3b4fa7a85f992bc21eb779c407) C:\WINDOWS\system32\Drivers\tosrfcom.sys
12:51:11.0906 2244 Tosrfcom - ok
12:51:11.0937 2244 Tosrfhid (efc95c0dc6f96b228f58319776006548) C:\WINDOWS\system32\DRIVERS\Tosrfhid.sys
12:51:11.0937 2244 Tosrfhid - ok
12:51:11.0953 2244 tosrfnds (c52fd27b9adf3a1f22cb90e6bcf9b0cb) C:\WINDOWS\system32\DRIVERS\tosrfnds.sys
12:51:11.0953 2244 tosrfnds - ok
12:51:12.0000 2244 TosRfSnd (156d63f6898e4d95f2962f2b72862868) C:\WINDOWS\system32\drivers\tosrfsnd.sys
12:51:12.0000 2244 TosRfSnd - ok
12:51:12.0031 2244 Tosrfusb (98c04a6432ce9c2ad328f57b9384d348) C:\WINDOWS\system32\DRIVERS\tosrfusb.sys
12:51:12.0031 2244 Tosrfusb - ok
12:51:12.0078 2244 Udfs (5787b80c2e3c5e2f56c2a233d91fa2c9) C:\WINDOWS\system32\drivers\Udfs.sys
12:51:12.0078 2244 Udfs - ok
12:51:12.0125 2244 ULCDRHlp (a4e07da3ae2078bd96e84d4baa07b71d) C:\WINDOWS\system32\Drivers\ULCDRHlp.sys
12:51:12.0125 2244 ULCDRHlp - ok
12:51:12.0140 2244 ultra - ok
12:51:12.0171 2244 Update (402ddc88356b1bac0ee3dd1580c76a31) C:\WINDOWS\system32\DRIVERS\update.sys
12:51:12.0187 2244 Update - ok
12:51:12.0250 2244 USBAAPL (4b8a9c16b6d9258ed99c512aecb8c555) C:\WINDOWS\system32\Drivers\usbaapl.sys
12:51:12.0265 2244 USBAAPL - ok
12:51:12.0296 2244 usbccgp (173f317ce0db8e21322e71b7e60a27e8) C:\WINDOWS\system32\DRIVERS\usbccgp.sys
12:51:12.0296 2244 usbccgp - ok
12:51:12.0312 2244 USBCCID - ok
12:51:12.0343 2244 usbehci (65dcf09d0e37d4c6b11b5b0b76d470a7) C:\WINDOWS\system32\DRIVERS\usbehci.sys
12:51:12.0343 2244 usbehci - ok
12:51:12.0375 2244 usbhub (1ab3cdde553b6e064d2e754efe20285c) C:\WINDOWS\system32\DRIVERS\usbhub.sys
12:51:12.0375 2244 usbhub - ok
12:51:12.0421 2244 usbprint (a717c8721046828520c9edf31288fc00) C:\WINDOWS\system32\DRIVERS\usbprint.sys
12:51:12.0437 2244 usbprint - ok
12:51:12.0468 2244 usbscan (a0b8cf9deb1184fbdd20784a58fa75d4) C:\WINDOWS\system32\DRIVERS\usbscan.sys
12:51:12.0484 2244 usbscan - ok
12:51:12.0531 2244 usbstor (a32426d9b14a089eaa1d922e0c5801a9) C:\WINDOWS\system32\DRIVERS\USBSTOR.SYS
12:51:12.0531 2244 usbstor - ok
12:51:12.0546 2244 usbuhci (26496f9dee2d787fc3e61ad54821ffe6) C:\WINDOWS\system32\DRIVERS\usbuhci.sys
12:51:12.0546 2244 usbuhci - ok
12:51:12.0578 2244 usbvideo (63bbfca7f390f4c49ed4b96bfb1633e0) C:\WINDOWS\system32\Drivers\usbvideo.sys
12:51:12.0593 2244 usbvideo - ok
12:51:12.0609 2244 VgaSave (0d3a8fafceacd8b7625cd549757a7df1) C:\WINDOWS\System32\drivers\vga.sys
12:51:12.0609 2244 VgaSave - ok
12:51:12.0625 2244 ViaIde - ok
12:51:12.0656 2244 VolSnap (4c8fcb5cc53aab716d810740fe59d025) C:\WINDOWS\system32\drivers\VolSnap.sys
12:51:12.0656 2244 VolSnap - ok
12:51:12.0703 2244 Wanarp (e20b95baedb550f32dd489265c1da1f6) C:\WINDOWS\system32\DRIVERS\wanarp.sys
12:51:12.0703 2244 Wanarp - ok
12:51:12.0718 2244 WDICA - ok
12:51:12.0765 2244 wdmaud (6768acf64b18196494413695f0c3a00f) C:\WINDOWS\system32\drivers\wdmaud.sys
12:51:12.0765 2244 wdmaud - ok
12:51:12.0812 2244 WmiAcpi (c42584fd66ce9e17403aebca199f7bdb) C:\WINDOWS\system32\DRIVERS\wmiacpi.sys
12:51:12.0828 2244 WmiAcpi - ok
12:51:12.0875 2244 WS2IFSL (6abe6e225adb5a751622a9cc3bc19ce8) C:\WINDOWS\System32\drivers\ws2ifsl.sys
12:51:12.0875 2244 WS2IFSL - ok
12:51:12.0921 2244 WSTCODEC (c98b39829c2bbd34e454150633c62c78) C:\WINDOWS\system32\DRIVERS\WSTCODEC.SYS
12:51:12.0921 2244 WSTCODEC - ok
12:51:12.0968 2244 WudfPf (f15feafffbb3644ccc80c5da584e6311) C:\WINDOWS\system32\DRIVERS\WudfPf.sys
12:51:12.0968 2244 WudfPf - ok
12:51:13.0000 2244 WudfRd (28b524262bce6de1f7ef9f510ba3985b) C:\WINDOWS\system32\DRIVERS\wudfrd.sys
12:51:13.0000 2244 WudfRd - ok
12:51:13.0078 2244 MBR (0x1B8) (6f9a1d528242bc09104b85e0becf5554) \Device\Harddisk0\DR0
12:51:13.0078 2244 \Device\Harddisk0\DR0 ( Rootkit.Boot.SST.a ) - infected
12:51:13.0078 2244 \Device\Harddisk0\DR0 - detected Rootkit.Boot.SST.a (0)
12:51:13.0093 2244 Boot (0x1200) (560a56196b1e6e6d0afe77d474579def) \Device\Harddisk0\DR0\Partition0
12:51:13.0093 2244 \Device\Harddisk0\DR0\Partition0 - ok
12:51:13.0125 2244 Boot (0x1200) (9f0e332f5e9f2192b54e34342bf8469d) \Device\Harddisk0\DR0\Partition1
12:51:13.0125 2244 \Device\Harddisk0\DR0\Partition1 - ok
12:51:13.0125 2244 ============================================================
12:51:13.0125 2244 Scan finished
12:51:13.0125 2244 ============================================================
12:51:13.0156 3668 Detected object count: 1
12:51:13.0156 3668 Actual detected object count: 1
12:51:23.0031 3668 \Device\Harddisk0\DR0 ( Rootkit.Boot.SST.a ) - will be cured on reboot
12:51:23.0031 3668 \Device\Harddisk0\DR0 - ok
12:51:23.0031 3668 \Device\Harddisk0\DR0 ( Rootkit.Boot.SST.a ) - User select action: Cure
12:51:27.0546 3604 Deinitialize success


Google isn't redirecting anymore :D

#11 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:07:58 AM

Posted 13 October 2011 - 01:43 PM

Hello


how are things doing now?



These logs are looking alot better. But we still have some work to do.

Please print out these instructions, or copy them to a Notepad file. It will make it easier for you to follow the instructions and complete all of the necessary steps..

uninstall some programs

1. click on start
2. then go to settings
3. after that you need control panel
4. look for the icon add/remove programs
click on the following programs

xxx
xxx
xxx


and click on remove

Update Adobe Reader

Recently there have been vunerabilities detected in older versions of Adobe Reader. It is strongly suggested that you update to the current version.

You can download it from http://www.adobe.com/products/acrobat/readstep2.html
After installing the latest Adobe Reader, uninstall all previous versions.
If you already have Adobe Photoshop® Album Starter Edition installed or do not wish to have it installed UNcheck the box which says Also Download Adobe Photoshop® Album Starter Edition.

If you don't like Adobe Reader (53 MB), you can download Foxit PDF Reader(7 MB) from here. It's a much smaller file to download and uses a lot less resources than Adobe Reader.

Note: When installing FoxitReader, be carefull not to install anything to do with AskBar.
[/list]
Your Java is out of date.

It can be updated by the Java control panel
  • click on Start-> Control Panel (Classic View)-> Java (looks like a coffee cup) -> Update Tab -> Update Now.
  • An update should begin;
  • follow the prompts

Clear your Java Cache

  • click on Start-> Control Panel (Classic View)-> Java (looks like a coffee cup)
    • On the General tab, under Temporary Internet Files, click the Settings button.
    • Next, click on the Delete Files button
    • There are two options in the window to clear the cache - Leave BOTH Checked
      Applications and Applets
      Trace and Log Files
  • Click OK on Delete Temporary Files Window
    Note: This deletes ALL the Downloaded Applications and Applets from the CACHE.
  • Click OK to leave the Temporary Files Window
  • Click OK to leave the Java Control Panel.

TFC(Temp File Cleaner):

  • Please download TFC to your desktop,
  • Save any unsaved work. TFC will close all open application windows.
  • Double-click TFC.exe to run the program.
  • If prompted, click "Yes" to reboot.
Note: Save your work. TFC will automatically close any open programs, let it run uninterrupted. It shouldn't take longer take a couple of minutes, and may only take a few seconds. Only if needed will you be prompted to reboot.

: Malwarebytes' Anti-Malware :

  • I would like you to rerun MBAM
  • Double-click mbam icon
  • go to the update tab at the top
  • click on check for updates
  • If an update is found, it will download and install the latest version.
  • Once the program has loaded, select Perform quick scan, then click Scan.
  • When the scan is complete, click OK, then Show Results to view the results.
  • Be sure that everything is Checked (ticked) except items in the C:\System Volume Information folder and click on Remove Selected.
  • When completed, a log will open in Notepad. please copy and paste the log into your next reply
  • If you accidently close it, the log file is saved here and will be named like this:
  • C:\Documents and Settings\Username\Application Data\Malwarebytes\Malwarebytes' Anti-Malware\Logs\mbam-log-date (time).txt

Note: If MBAM encounters a file that is difficult to remove, you will be presented with 1 of 2 prompts.
Click OK to either and let MBAM proceed with the disinfection process.
If asked to restart the computer, please do so immediately. Failure to reboot will prevent MBAM from removing all the malware.


Download HijackThis

  • Go Here to download HijackThis Installer
  • Save HijackThis Installer to your desktop.
  • Double-click on the HijackThis Installer icon on your desktop. (Vista and Win 7 right click and run as admin)
  • By default it will install to C:\Program Files\Trend Micro\HijackThis .
  • Click on Install.
  • It will create a HijackThis icon on the desktop.
  • Once installed it will launch Hijackthis.
  • Click on the Do a system scan and save a logfile button. It will scan and the log should open in notepad.
  • Click on Edit > Select All then click on Edit > Copy to copy the entire contents of the log.
  • Come back here to this thread and Paste the log in your next reply.
  • DO NOT use the AnalyseThis button its findings are dangerous if misinterpreted.
  • DO NOT have Hijackthis fix anything yet. Most of what it finds will be harmless or even required.

If you have problems running Hijackthis.

sometimes we have to run it like this To run HijackThis as an administrator,
rightclick HijackThis.exe (located: C:\Program Files\Trend Micro\HiJackThis\HiJackThis.exe)
and select to run as administrator

"information and logs"

  • In your next post I need the following

  • Log From MBAM
  • report from Hijackthis
  • let me know of any problems you may have had
  • How is the computer doing now?

Gringo

I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#12 Judy85

Judy85
  • Topic Starter

  • Members
  • 9 posts
  • OFFLINE
  •  
  • Local time:06:58 AM

Posted 13 October 2011 - 03:17 PM

Hi Gringo,

Everything seems back to normal!
The only different thing that is happening that didn't happen before this mess is
whenever I log onto my desktop, I get an error message that says "System Control
Manager has encountered a problem and needs to close. We are sorry for the
inconvenience."
Not sure what the System Control Manager is...

Here is the MBAM log:

Malwarebytes' Anti-Malware 1.51.2.1300
www.malwarebytes.org

Database version: 7940

Windows 5.1.2600 Service Pack 3
Internet Explorer 8.0.6001.18702

10/13/2011 3:04:19 PM
mbam-log-2011-10-13 (15-04-19).txt

Scan type: Quick scan
Objects scanned: 190076
Time elapsed: 3 minute(s), 26 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 1

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
c:\documents and settings\new account\my documents\downloads\WiNlOgOn.exe (Heuristics.Reserved.Word.Exploit) -> Quarantined and deleted successfully.


And the HiJackThis log:

Logfile of Trend Micro HijackThis v2.0.4
Scan saved at 3:13:47 PM, on 10/13/2011
Platform: Windows XP SP3 (WinNT 5.01.2600)
MSIE: Internet Explorer v8.00 (8.00.6001.18702)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\igfxtray.exe
C:\WINDOWS\system32\hkcmd.exe
C:\WINDOWS\system32\wscntfy.exe
C:\WINDOWS\system32\igfxpers.exe
C:\WINDOWS\RTHDCPL.EXE
C:\WINDOWS\system32\igfxsrvc.exe
C:\Program Files\TOSHIBA\Bluetooth Toshiba Stack\ItSecMng.exe
C:\Program Files\Google\Gmail Notifier\gnotify.exe
C:\Program Files\Common Files\Java\Java Update\jusched.exe
C:\WINDOWS\system32\ctfmon.exe
C:\WINDOWS\system32\wbem\unsecapp.exe
C:\Program Files\Toshiba\Bluetooth Toshiba Stack\TosBtMng.exe
C:\Documents and Settings\Judy\Application Data\Dropbox\bin\Dropbox.exe
C:\Program Files\Toshiba\Bluetooth Toshiba Stack\TosA2dp.exe
C:\Program Files\Toshiba\Bluetooth Toshiba Stack\TosBtHid.exe
C:\Program Files\Toshiba\Bluetooth Toshiba Stack\TosBtHsp.exe
C:\WINDOWS\system32\msiexec.exe
C:\Program Files\Trend Micro\HiJackThis\HiJackThis.exe

R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = *.local
R3 - URLSearchHook: (no name) - {472734EA-242A-422b-ADF8-83D1E48CC825} - (no file)
O2 - BHO: (no name) - {02478D38-C3F9-4efb-9B51-7695ECA05670} - (no file)
O2 - BHO: AcroIEHelperStub - {18DF081C-E8AD-4283-A596-FA578C2EBDC3} - C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelperShim.dll
O2 - BHO: Java™ Plug-In 2 SSV Helper - {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Program Files\Java\jre6\bin\jp2ssv.dll
O2 - BHO: JQSIEStartDetectorImpl - {E7E6F031-17CE-4C07-BC86-EABFE594F69C} - C:\Program Files\Java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll
O4 - HKLM\..\Run: [IgfxTray] C:\WINDOWS\system32\igfxtray.exe
O4 - HKLM\..\Run: [HotKeysCmds] C:\WINDOWS\system32\hkcmd.exe
O4 - HKLM\..\Run: [Persistence] C:\WINDOWS\system32\igfxpers.exe
O4 - HKLM\..\Run: [RTHDCPL] RTHDCPL.EXE
O4 - HKLM\..\Run: [ITSecMng] %ProgramFiles%\TOSHIBA\Bluetooth Toshiba Stack\ItSecMng.exe /START
O4 - HKLM\..\Run: [MGSysCtrl] C:\Program Files\System Control Manager\MGSysCtrl.exe
O4 - HKLM\..\Run: [{0228e555-4f9c-4e35-a3ec-b109a192b4c2}] C:\Program Files\Google\Gmail Notifier\gnotify.exe
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\Run: [iTunesHelper] "C:\Program Files\iTunes\iTunesHelper.exe"
O4 - HKLM\..\Run: [Adobe ARM] "C:\Program Files\Common Files\Adobe\ARM\1.0\AdobeARM.exe"
O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Common Files\Java\Java Update\jusched.exe"
O4 - HKCU\..\Run: [Messenger (Yahoo!)] "C:\PROGRA~1\Yahoo!\MESSEN~1\YahooMessenger.exe" -quiet
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
O4 - Startup: Dropbox.lnk = C:\Documents and Settings\Judy\Application Data\Dropbox\bin\Dropbox.exe
O4 - Global Startup: Bluetooth Manager.lnk = ?
O8 - Extra context menu item: Add to Google Photos Screensa&ver - res://C:\WINDOWS\system32\GPhotos.scr/200
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\Office12\EXCEL.EXE/3000
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\Office12\REFIEBAR.DLL
O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe (file missing)
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe (file missing)
O14 - IERESET.INF: START_PAGE_URL=http://www.msi.com.tw
O16 - DPF: {02BF25D5-8C17-4B23-BC80-D3488ABDDC6B} (QuickTime Object) - http://appldnld.apple.com.edgesuite.net/content.info.apple.com/QuickTime/qtactivex/qtplugin.cab
O16 - DPF: {0CCA191D-13A6-4E29-B746-314DEE697D83} (Facebook Photo Uploader 5 Control) - http://upload.facebook.com/controls/2008.10.10_v5.5.8/FacebookPhotoUploader5.cab
O16 - DPF: {8100D56A-5661-482C-BEE8-AFECE305D968} (Facebook Photo Uploader 5 Control) - http://upload.facebook.com/controls/2009.07.28_v5.5.8.1/FacebookPhotoUploader55.cab
O22 - SharedTaskScheduler: Browseui preloader - {438755C2-A8BA-11D1-B96B-00A0C90312E1} - C:\WINDOWS\system32\browseui.dll
O22 - SharedTaskScheduler: Component Categories cache daemon - {8C7461EF-2B13-11d2-BE35-3078302C2030} - C:\WINDOWS\system32\browseui.dll
O23 - Service: Apple Mobile Device - Unknown owner - C:\Program Files\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe (file missing)
O23 - Service: Bonjour Service - Unknown owner - C:\Program Files\Bonjour\mDNSResponder.exe (file missing)
O23 - Service: Google Updater Service (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
O23 - Service: iPod Service - Unknown owner - C:\Program Files\iPod\bin\iPodService.exe (file missing)
O23 - Service: Java Quick Starter (JavaQuickStarterService) - Unknown owner - C:\Program Files\Java\jre6\bin\jqs.exe (file missing)
O23 - Service: Micro Star SCM - Unknown owner - C:\Program Files\System Control Manager\MSIService.exe (file missing)
O23 - Service: Pharos Systems ComTaskMaster - Unknown owner - C:\PROGRA~1\PHAROS~1\Core\CTskMstr.exe (file missing)
O23 - Service: TOSHIBA Bluetooth Service - Unknown owner - C:\Program Files\Toshiba\Bluetooth Toshiba Stack\TosBtSrv.exe (file missing)
O23 - Service: Yahoo! Updater (YahooAUService) - Unknown owner - C:\Program Files\Yahoo!\SoftwareUpdate\YahooAUService.exe (file missing)

--
End of file - 6525 bytes

#13 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:07:58 AM

Posted 13 October 2011 - 04:12 PM

Hello

remove these from add/remove



These logs are looking very good, we are almost done!!! Just one more scan to go.

:Remove unneeded startup entries:

This part of the fix is purely optional
These are programs that start up when you turn on your computer but don't need to be, any of these programs you can click on their icons (or start from the control panel) and start the program when you need it. By stopping these programs you will boot up faster and your computer will work faster.

  • Run HijackThis
  • Click on the Scan button
  • Put a check beside all of the items listed below (if present):

    • O4 - HKLM\..\Run: [IgfxTray] C:\WINDOWS\system32\igfxtray.exe
      O4 - HKLM\..\Run: [{0228e555-4f9c-4e35-a3ec-b109a192b4c2}] C:\Program Files\Google\Gmail Notifier\gnotify.exe
      O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
      O4 - HKLM\..\Run: [iTunesHelper] "C:\Program Files\iTunes\iTunesHelper.exe"
      O4 - HKLM\..\Run: [Adobe ARM] "C:\Program Files\Common Files\Adobe\ARM\1.0\AdobeARM.exe"
      O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Common Files\Java\Java Update\jusched.exe"
      O4 - HKCU\..\Run: [Messenger (Yahoo!)] "C:\PROGRA~1\Yahoo!\MESSEN~1\YahooMessenger.exe" -quiet
      O4 - Startup: Dropbox.lnk = C:\Documents and Settings\Judy\Application Data\Dropbox\bin\Dropbox.exe
  • Close all open windows and browsers/email, etc...
  • Click on the "Fix Checked" button
  • When completed, close the application.

    NOTE**You can research each of those lines >here< and see if you want to keep them or not
    just copy the name between the brakets and paste into the search space
    O4 - HKLM\..\Run: [IntelliPoint]



If you have any problems running Hijackthis.

sometimes we have to run it like this To run HijackThis as an administrator,
rightclick HijackThis.exe (located: C:\Program Files\Trend Micro\HiJackThis\HiJackThis.exe)
and select to run as administrator


Eset Online Scanner

**Note** You will need to use Internet explorer for this scan - Vista and win 7 right click on IE shortcut and run as admin

Go Eset web page to run an online scannner from ESET.

  • Turn off the real time scanner of any existing antivirus program while performing the online scan
  • click on the ESET Online Scanner button
  • Tick the box next to YES, I accept the Terms of Use.
    • Click Start
  • When asked, allow the activex control to install
    • Click Start
  • Make sure that the option Remove found threats is unticked and the Scan Archives option is ticked.
  • Click on Advanced Settings, ensure the options
    Scan for potentially unwanted applications, Scan for potentially unsafe applications, and Enable Anti-Stealth Technology are ticked.
  • Click Scan
  • Wait for the scan to finish
  • Click on copy to clipboard and paste the results here in this topic
  • you may also find here C:\Program Files\Eset\Eset Online Scanner\log.txt
Copy and paste that log as a reply to this topic

Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#14 Judy85

Judy85
  • Topic Starter

  • Members
  • 9 posts
  • OFFLINE
  •  
  • Local time:06:58 AM

Posted 13 October 2011 - 06:13 PM

Hello,

ESET log:

C:\Documents and Settings\Judy\Local Settings\Application Data\a75701c1\X Win32/Sirefef.DD trojan
C:\Qoobox\Quarantine\C\Program Files\Bonjour\mDNSResponder.exe.vir Win32/Patched.HN trojan
C:\Qoobox\Quarantine\C\Program Files\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe.vir Win32/Patched.HN trojan
C:\Qoobox\Quarantine\C\Program Files\iPod\bin\iPodService.exe.vir Win32/Patched.HN trojan
C:\Qoobox\Quarantine\C\Program Files\Java\jre6\bin\jqs.exe.vir Win32/Patched.HN trojan
C:\Qoobox\Quarantine\C\Program Files\PHAROS~1\Core\CTskMstr.exe.vir Win32/Patched.HN trojan
C:\Qoobox\Quarantine\C\Program Files\System Control Manager\MSIService.exe.vir Win32/Patched.HN trojan
C:\Qoobox\Quarantine\C\Program Files\Toshiba\Bluetooth Toshiba Stack\TosBtSrv.exe.vir Win32/Patched.HN trojan
C:\Qoobox\Quarantine\C\Program Files\Yahoo!\SoftwareUpdate\YahooAUService.exe.vir Win32/Patched.HN trojan
C:\Qoobox\Quarantine\C\WINDOWS\assembly\GAC_MSIL\desktop.ini.vir a variant of Win32/Sirefef.CH trojan
C:\System Volume Information\_restore{24A47983-12B9-4479-ABEC-59D01BD2250E}\RP262\A0059494.ini a variant of Win32/Sirefef.CH trojan
C:\System Volume Information\_restore{24A47983-12B9-4479-ABEC-59D01BD2250E}\RP262\A0059502.ini a variant of Win32/Sirefef.CH trojan
C:\System Volume Information\_restore{24A47983-12B9-4479-ABEC-59D01BD2250E}\RP262\A0061502.ini a variant of Win32/Sirefef.CH trojan
C:\System Volume Information\_restore{24A47983-12B9-4479-ABEC-59D01BD2250E}\RP262\A0062502.ini a variant of Win32/Sirefef.CH trojan
C:\System Volume Information\_restore{24A47983-12B9-4479-ABEC-59D01BD2250E}\RP262\A0062552.exe Win32/Patched.HN trojan
C:\System Volume Information\_restore{24A47983-12B9-4479-ABEC-59D01BD2250E}\RP262\A0062671.ini a variant of Win32/Sirefef.CH trojan
C:\System Volume Information\_restore{24A47983-12B9-4479-ABEC-59D01BD2250E}\RP262\A0062707.ini a variant of Win32/Sirefef.CH trojan
C:\System Volume Information\_restore{24A47983-12B9-4479-ABEC-59D01BD2250E}\RP262\A0062713.exe a variant of Win32/Kryptik.TUX trojan
C:\System Volume Information\_restore{24A47983-12B9-4479-ABEC-59D01BD2250E}\RP262\A0062716.ini a variant of Win32/Sirefef.CH trojan
C:\System Volume Information\_restore{24A47983-12B9-4479-ABEC-59D01BD2250E}\RP262\A0062762.exe Win32/Patched.HN trojan
C:\System Volume Information\_restore{24A47983-12B9-4479-ABEC-59D01BD2250E}\RP262\A0062935.exe a variant of Win32/Kryptik.TUX trojan
C:\System Volume Information\_restore{24A47983-12B9-4479-ABEC-59D01BD2250E}\RP262\A0062936.exe a variant of Win32/Kryptik.TUX trojan
C:\System Volume Information\_restore{24A47983-12B9-4479-ABEC-59D01BD2250E}\RP262\A0062946.ini a variant of Win32/Sirefef.CH trojan
C:\System Volume Information\_restore{24A47983-12B9-4479-ABEC-59D01BD2250E}\RP263\A0062974.ini a variant of Win32/Sirefef.CH trojan
C:\System Volume Information\_restore{24A47983-12B9-4479-ABEC-59D01BD2250E}\RP265\A0063979.ini a variant of Win32/Sirefef.CH trojan
C:\System Volume Information\_restore{24A47983-12B9-4479-ABEC-59D01BD2250E}\RP266\A0063996.ini a variant of Win32/Sirefef.CH trojan
C:\System Volume Information\_restore{24A47983-12B9-4479-ABEC-59D01BD2250E}\RP266\A0064011.ini a variant of Win32/Sirefef.CH trojan
C:\System Volume Information\_restore{24A47983-12B9-4479-ABEC-59D01BD2250E}\RP266\A0064025.ini a variant of Win32/Sirefef.CH trojan
C:\System Volume Information\_restore{24A47983-12B9-4479-ABEC-59D01BD2250E}\RP266\A0064149.ini a variant of Win32/Sirefef.CH trojan
C:\System Volume Information\_restore{24A47983-12B9-4479-ABEC-59D01BD2250E}\RP266\A0064186.exe Win32/Patched.HN trojan
C:\System Volume Information\_restore{24A47983-12B9-4479-ABEC-59D01BD2250E}\RP266\A0064187.exe Win32/Patched.HN trojan
C:\System Volume Information\_restore{24A47983-12B9-4479-ABEC-59D01BD2250E}\RP266\A0064188.exe Win32/Patched.HN trojan
C:\System Volume Information\_restore{24A47983-12B9-4479-ABEC-59D01BD2250E}\RP266\A0064189.exe Win32/Patched.HN trojan
C:\System Volume Information\_restore{24A47983-12B9-4479-ABEC-59D01BD2250E}\RP266\A0064190.exe Win32/Patched.HN trojan
C:\System Volume Information\_restore{24A47983-12B9-4479-ABEC-59D01BD2250E}\RP266\A0064191.exe Win32/Patched.HN trojan
C:\System Volume Information\_restore{24A47983-12B9-4479-ABEC-59D01BD2250E}\RP266\A0064192.exe Win32/Patched.HN trojan
C:\System Volume Information\_restore{24A47983-12B9-4479-ABEC-59D01BD2250E}\RP266\A0064193.exe Win32/Patched.HN trojan

#15 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:07:58 AM

Posted 13 October 2011 - 08:38 PM

Hello

There are some minor things in your online scan that should be removed.


delete files

  • Copy all text in the quote box (below)...to Notepad.

    @echo off
    del /f /s /q "C:\Documents and Settings\Judy\Local Settings\Application Data\a75701c1\X"
    del %0

  • Save the Notepad file on your desktop...as delfile.bat... save type as "All Files"
    It should look like this: Posted Image<--XPPosted Image<--vista
  • Double click on delfile.bat to execute it.
    A black CMD window will flash, then disappear...this is normal.
  • The files and folders, if found...will have been deleted and the "delfile.bat" file will also be deleted.


The rest of the Online scan is only reporting backups created during the course of this fix C:\Qoobox\Quarantine\, and/or items located in System Restore's cache C:\System Volume Information\, Whatever is in these folders can't harm you unless you choose to perform a manual restore. the following steps will remove these backups.


Very well done!! This is my general post for when your logs show no more signs of malware - Please let me know if you still are having problems with your computer and what these problems are.


The following procedure will implement some cleanup procedures. It will also reset your System Restore by flushing out previous restore points and create a new restore point. It will also remove all the backups our tools may have made.

Any programs and logs that are left over you can just be deleted from the desktop. TFC is a free temp file cleaner that is very easy to use, I would keep this and use before you do any scans or when you want to free up some space.

:DeFogger:

  • To re-enable your Emulation drivers, double click DeFogger to run the tool.
  • The application window will appear
  • Click the Re-enable button to re-enable your CD Emulation drivers
  • Click Yes to continue
  • A 'Finished!' message will appear
  • Click OK
  • DeFogger will now ask to reboot the machine - click OK
Your Emulation drivers are now re-enabled.


:Uninstall ComboFix:

  • turn off all active protection software
  • push the "windows key" + "R" (between the "Ctrl" button and "Alt" Button)
  • please copy and past the following into the box ComboFix /Uninstall and click OK.
  • Note the space between the X and the /Uninstall, it needs to be there.
  • Posted Image


:remove tools:

Please download OTCleanIt and save it to desktop. This tool will remove all the tools we used to clean your pc.
  • Double-click OTCleanIt.exe.
  • Click the CleanUp! button.
  • Select Yes when the "Begin cleanup Process?" prompt appears.
  • If you are prompted to Reboot during the cleanup, select Yes.
  • The tool will delete itself once it finishes, if not delete it by yourself.
  • If asked to restart the computer, please do so
Note: If you receive a warning from your firewall or other security programs regarding OTCleanIt attempting to contact the internet, please allow it to do so.


:Make your Internet Explorer more secure:

  • From within Internet Explorer click on the Tools menu and then click on Options.
  • Click once on the Security tab
  • Click once on the Internet icon so it becomes highlighted.
  • Click once on the Custom Level button.
  • Change the Download signed ActiveX controls to Prompt
  • Change the Download unsigned ActiveX controls to Disable
  • Change the Initialise and script ActiveX controls not marked as safe to Disable
  • Change the Installation of desktop items to Prompt
  • Change the Launching programs and files in an IFRAME to Prompt
  • When all these settings have been made, click on the OK button.
  • If it prompts you as to whether or not you want to save the settings, press the Yes button.
    Next press the Apply button and then the OK to exit the Internet Properties page.


:Make Firefox more secure:

please visit this page to explain how to make Firefox more secure - How to Secure Firefox


Make sure your applications have all of their updates

It is also possible for other programs on your computer to have security vulnerability that can allow malware to infect you. Therefore, it is also a good idea to check for the latest versions of commonly installed applications that are regularly patched to fix vulnerabilities. You can check these by visiting Secunia Software Inspector


:Turn On Automatic Updates:

Turn On Automatic Updates
1. Click Start, click Run, type sysdm.cpl, and then press ENTER.
2. Click the Automatic Updates tab, and then click to select one of the following options. We recommend that you select the Automatic (recommended) Automatically download recommended updates for my computer and install them

If you click this setting, click to select the day and time for scheduled updates to occur. You can schedule Automatic Updates for any time of day. Remember, your computer must be on at the scheduled time for updates to be installed. After you set this option, Windows recognizes when you are online and uses your Internet connection to find updates on the Windows Update Web site or on the Microsoft Update Web site that apply to your computer. Updates are downloaded automatically in the background, and you are not notified or interrupted during this process. An icon appears in the notification area of your taskbar when the updates are being downloaded. You can point to the icon to view the download status. To pause or to resume the download, right-click the icon, and then click Pause or Resume. When the download is completed, another message appears in the notification area so that you can review the updates that are scheduled for installation. If you choose not to install at that time, Windows starts the installation on your set schedule.

or visit http://www.windowsupdate.com regularly. This will ensure your computer has always the latest security updates available installed on your computer. If there are new updates to install, install them immediately, reboot your computer, and revisit the site until there are no more critical updates.

:antispyware programs:

I would reccomend the download and installation of some or all of the following programs (all free), and the updating of them regularly:

  • WinPatrol As a robust security monitor, WinPatrol will alert you to hijackings, malware attacks and critical changes made to your computer without your permission. WinPatrol takes snapshot of your critical system resources and alerts you to any changes that may occur without your knowledge.
  • Spyware Blaster - By altering your registry, this program stops harmful sites from installing things like ActiveX Controls on your machines.
  • Malwarebytes' Anti-Malware Malwarebytes' Anti-Malware is a new and powerful anti-malware tool. It is
    totally free but for real-time protection you will have to pay a small one-time fee. We used this to help clean your computer and recomend keeping it and using often.

Here is some great reading about how to be safer online:

PC Safety and Security - What Do I Need? from my friends at Tech Support Forum
and
COMPUTER SECURITY - a short guide to staying safer online from my friends at Malware Removal

I'd be grateful if you could reply to this post so that I know you have read it and, if you've no other questions, the thread can then be closed.

I Will Keep This Open For About Three Days, If Anything Comes Up - Just Come Back And Let Me Know, after that time you will have to send me a PM

My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->Posted Image<-- Don't worry every little bit helps.

Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users