Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Unknown Infection/Process


  • This topic is locked This topic is locked
27 replies to this topic

#1 David Billo

David Billo

  • Members
  • 37 posts
  • OFFLINE
  •  
  • Local time:03:59 AM

Posted 07 November 2011 - 01:40 PM

I noticed and odd number process running which can't be terminated:
3627135109:2052050471.exe

Trend Micro Titanium Internet Security won't run, although Windows Security Centre says that it is running, nothing in the tray, and manual start has no effect.

Can't run Malwarebytes or HijackThis (both crash within seconds)

Ran DDS and got reports dds.txt and attach.txt

GMER runs, but crashes before finishing, afterwards can't be run. Tried the various renaming tricks, but seems to crash when it gets to the Devices scan. I'm going to try running each part separately and saving, and see if I can get most of the logs generated.

Otherwise computer seems to be working normally, except for occasional delays opening a webpage.

dds.txt:
.
DDS (Ver_2011-08-26.01) - NTFSx86
Internet Explorer: 8.0.6001.18702
Run by David Billo at 12:47:50 on 2011-11-07
Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.2046.1476 [GMT -5:00]
.
AV: Trend Micro Titanium Internet Security *Enabled/Updated* {7D2296BC-32CC-4519-917E-52E652474AF5}
FW: Trend Micro Firewall Booster *Enabled*
.
============== Running Processes ===============
.
D:\WINDOWS\system32\svchost -k DcomLaunch
svchost.exe
D:\WINDOWS\3627135109:2052050471.exe
D:\WINDOWS\System32\svchost.exe -k netsvcs
svchost.exe
svchost.exe
D:\WINDOWS\system32\spoolsv.exe
D:\WINDOWS\explorer.exe
D:\WINDOWS\RTHDCPL.EXE
D:\WINDOWS\SOUNDMAN.EXE
D:\WINDOWS\system32\RUNDLL32.EXE
D:\Program Files\Microsoft IntelliType Pro\itype.exe
D:\WINDOWS\Logi_MwX.Exe
D:\Program Files\Common Files\Java\Java Update\jusched.exe
D:\WINDOWS\system32\ctfmon.exe
D:\Program Files\GEEK SQUAD UPS\pppeuser.exe
D:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe
D:\Program Files\Windows Live\Messenger\msnmsgr.exe
D:\Program Files\Microsoft IntelliType Pro\dpupdchk.exe
D:\Program Files\Logitech\SetPoint\SetPoint.exe
D:\Program Files\Common Files\Logishrd\KHAL2\KHALMNPR.EXE
svchost.exe
D:\WINDOWS\system32\crypserv.exe
D:\Program Files\GIGABYTE\EnergySaver\GSvr.exe
D:\Program Files\Java\jre6\bin\jqs.exe
D:\Program Files\NVIDIA Corporation\Performance Drivers\nvPDsvc.exe
D:\WINDOWS\system32\nvsvc32.exe
D:\Program Files\GEEK SQUAD UPS\ppped.exe
D:\WINDOWS\system32\svchost.exe -k imgsvc
D:\WINDOWS\System32\svchost.exe -k HTTPFilter
D:\Program Files\Windows Live\Contacts\wlcomm.exe
D:\Program Files\Internet Explorer\iexplore.exe
D:\Program Files\Internet Explorer\iexplore.exe
D:\Program Files\Internet Explorer\iexplore.exe
.
============== Pseudo HJT Report ===============
.
uStart Page = hxxp://www.google.ca/ig?hl=en&source=iglk
uURLSearchHooks: DeviceVM Url Search Hook: {0063bf63-bfff-4b8f-9d26-4267df7f17dd} - d:\windows\system32\dvmurl.dll
uURLSearchHooks: H - No File
uWinlogon: Shell=d:\documents and settings\david billo\local settings\application data\85b031d8\X
BHO: AcroIEHlprObj Class: {06849e9f-c8d7-4d59-b87d-784b7d6be0b3} - d:\program files\adobe\acrobat 7.0\activex\AcroIEHelper.dll
BHO: TmIEPlugInBHO Class: {1ca1377b-dc1d-4a52-9585-6e06050fac53} - d:\program files\trend micro\amsp\module\20004\1.5.1504\6.6.1088\TmIEPlg.dll
BHO: {5C255C8A-E604-49b4-9D64-90988571CECB} - No File
BHO: Windows Live Sign-in Helper: {9030d464-4c02-4abf-8ecc-5164760863c6} - d:\program files\common files\microsoft shared\windows live\WindowsLiveLogin.dll
BHO: Google Toolbar Helper: {aa58ed58-01dd-4d91-8333-cf10577473f7} - d:\program files\google\google toolbar\GoogleToolbar_32.dll
BHO: Google Toolbar Notifier BHO: {af69de43-7d58-4638-b6fa-ce66b5ad205d} - d:\program files\google\googletoolbarnotifier\5.7.6406.1642\swg.dll
BHO: TmBpIeBHO Class: {bbacbafd-fa5e-4079-8b33-00eb9f13d4ac} - d:\program files\trend micro\amsp\module\20002\6.6.1010\6.6.1010\TmBpIe32.dll
BHO: Java™ Plug-In 2 SSV Helper: {dbc80044-a445-435b-bc74-9c25c1c588a9} - d:\program files\java\jre6\bin\jp2ssv.dll
BHO: JQSIEStartDetectorImpl Class: {e7e6f031-17ce-4c07-bc86-eabfe594f69c} - d:\program files\java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll
TB: Google Toolbar: {2318c2b1-4965-11d4-9b18-009027a5cd4f} - d:\program files\google\google toolbar\GoogleToolbar_32.dll
TB: {C55BBCD6-41AD-48AD-9953-3609C48EACC7} - No File
uRun: [OE] d:\program files\trend micro\internet security\tmas_oe\TMAS_OEMon.exe
uRun: [ctfmon.exe] d:\windows\system32\ctfmon.exe
uRun: [PowerPanel Personal Edition User Interaction] "d:\program files\geek squad ups\pppeuser.exe"
uRun: [swg] "d:\program files\google\googletoolbarnotifier\GoogleToolbarNotifier.exe"
uRun: [msnmsgr] "d:\program files\windows live\messenger\msnmsgr.exe" /background
mRun: [RTHDCPL] RTHDCPL.EXE
mRun: [SoundMan] SOUNDMAN.EXE
mRun: [AlcWzrd] ALCWZRD.EXE
mRun: [Alcmtr] ALCMTR.EXE
mRun: [GEST] =
mRun: [JMB36X IDE Setup] d:\windows\raidtool\xInsIDE.exe
mRun: [36X Raid Configurer] d:\windows\system32\xRaidSetup.exe boot
mRun: [NvCplDaemon] RUNDLL32.EXE d:\windows\system32\NvCpl.dll,NvStartup
mRun: [nwiz] nwiz.exe /install
mRun: [NvMediaCenter] RUNDLL32.EXE d:\windows\system32\NvMcTray.dll,NvTaskbarInit
mRun: [NeroFilterCheck] d:\program files\common files\ahead\lib\NeroCheck.exe
mRun: [itype] "d:\program files\microsoft intellitype pro\itype.exe"
mRun: [Kernel and Hardware Abstraction Layer] KHALMNPR.EXE
mRun: [Logitech Hardware Abstraction Layer] KHALMNPR.EXE
mRun: [Logitech Utility] Logi_MwX.Exe
mRun: [Trend Micro Titanium] "d:\program files\trend micro\titanium\uiframework\uiWinMgr.exe" -set Silent "1" SplashURL ""
mRun: [Trend Micro Client Framework] "d:\program files\trend micro\uniclient\uifrmwrk\UIWatchDog.exe"
mRun: [SunJavaUpdateSched] "d:\program files\common files\java\java update\jusched.exe"
mRunOnce: [Malwarebytes' Anti-Malware] d:\program files\malwarebytes' anti-malware\mbamgui.exe /install /silent
dRun: [OE] d:\program files\trend micro\internet security\tmas_oe\TMAS_OEMon.exe
StartupFolder: d:\docume~1\davidb~1\startm~1\programs\startup\produc~1.lnk - d:\program files\common files\logishared\ereg\setpoint\eReg.exe
StartupFolder: d:\docume~1\alluse~1\startm~1\programs\startup\adober~1.lnk - d:\program files\adobe\acrobat 7.0\reader\reader_sl.exe
StartupFolder: d:\docume~1\alluse~1\startm~1\programs\startup\logite~1.lnk - d:\program files\logitech\setpoint\SetPoint.exe
StartupFolder: d:\docume~1\alluse~1\startm~1\programs\startup\micros~1.lnk - d:\program files\microsoft office\office10\OSA.EXE
IE: E&xport to Microsoft Excel - d:\progra~1\micros~3\office10\EXCEL.EXE/3000
IE: Google Sidewiki... - d:\program files\google\google toolbar\component\GoogleToolbarDynamic_mui_en_E11712C84EA7E12B.dll/cmsidewiki.html
IE: {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe
IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - d:\program files\messenger\msmsgs.exe
DPF: {166B1BCA-3F9C-11CF-8075-444553540000} - hxxp://fpdownload.macromedia.com/get/shockwave/cabs/director/sw.cab
DPF: {31435657-9980-0010-8000-00AA00389B71} - hxxp://download.microsoft.com/download/e/2/f/e2fcec4b-6c8b-48b7-adab-ab9c403a978f/wvc1dmo.cab
DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_29-windows-i586.cab
DPF: {CAFEEFAC-0016-0000-0029-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_29-windows-i586.cab
DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_29-windows-i586.cab
DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} - hxxp://fpdownload2.macromedia.com/get/shockwave/cabs/flash/swflash.cab
DPF: {E2883E8F-472F-4FB0-9522-AC9BF37916A7} - hxxp://platformdl.adobe.com/NOS/getPlusPlus/1.6/gp.cab
TCP: DhcpNameServer = 192.168.2.1 192.168.2.1
TCP: Interfaces\{9292DC20-E50A-4ED5-B388-2065C99C581C} : DhcpNameServer = 192.168.2.1 192.168.2.1
Handler: tmbp - {1A77E7DC-C9A0-4110-8A37-2F36BAE71ECF} - d:\program files\trend micro\amsp\module\20002\6.6.1010\6.6.1010\TmBpIe32.dll
Handler: tmpx - {0E526CB5-7446-41D1-A403-19BFE95E8C23} - d:\program files\trend micro\amsp\module\20004\1.5.1504\6.6.1088\TmIEPlg.dll
Notify: LBTWlgn - d:\program files\common files\logitech\bluetooth\LBTWlgn.dll
SSODL: WPDShServiceObj - {AAA288BA-9A4C-45B0-95D7-94D524869DB5} - d:\windows\system32\WPDShServiceObj.dll
.
============= SERVICES / DRIVERS ===============
.
R2 GEST Service;GEST Service for program management.;d:\program files\gigabyte\energysaver\GSvr.exe [2009-5-22 68136]
R2 NVIDIA Performance Driver Service;NVIDIA Performance Driver Service;d:\program files\nvidia corporation\performance drivers\nvPDsvc.exe [2008-12-11 3575808]
R2 tmevtmgr;tmevtmgr;d:\windows\system32\drivers\tmevtmgr.sys [2010-11-17 64080]
R3 NmPar;PCI Parallel Port;d:\windows\system32\drivers\NmPar.sys [2008-12-24 80256]
R3 tmcfw;Trend Micro Common Firewall Service;d:\windows\system32\drivers\TM_CFW.sys [2010-11-17 341072]
R4 MBAMSwissArmy;MBAMSwissArmy;d:\windows\system32\drivers\mbamswissarmy.sys [2011-3-5 41272]
S2 Amsp;Trend Micro Solution Platform;d:\program files\trend micro\amsp\coreServiceShell.exe [2010-11-17 188272]
S2 clr_optimization_v4.0.30319_32;Microsoft .NET Framework NGEN v4.0.30319_X86;d:\windows\microsoft.net\framework\v4.0.30319\mscorsvw.exe [2010-3-18 130384]
S2 gupdate;Google Update Service (gupdate);d:\program files\google\update\GoogleUpdate.exe [2011-2-12 136176]
S3 gupdatem;Google Update Service (gupdatem);d:\program files\google\update\GoogleUpdate.exe [2011-2-12 136176]
S3 WPFFontCache_v0400;Windows Presentation Foundation Font Cache 4.0.0.0;d:\windows\microsoft.net\framework\v4.0.30319\wpf\WPFFontCache_v0400.exe [2010-3-18 753504]
.
=============== Created Last 30 ================
.
2011-10-19 16:54:19 -------- d-sh--w- d:\documents and settings\david billo\local settings\application data\85b031d8
2011-10-19 15:07:33 -------- d-----w- d:\program files\JDownloader
.
==================== Find3M ====================
.
2011-11-07 17:44:45 41272 ----a-w- d:\windows\system32\drivers\mbamswissarmy.sys
2011-11-07 17:30:13 16608 ----a-w- d:\windows\gdrv.sys
2011-10-13 14:32:19 414368 ----a-w- d:\windows\system32\FlashPlayerCPLApp.cpl
2011-10-03 18:38:27 102400 ----a-w- d:\windows\RegBootClean.exe
2011-10-03 09:06:03 472808 ----a-w- d:\windows\system32\deployJava1.dll
2011-10-03 06:37:52 73728 ----a-w- d:\windows\system32\javacpl.cpl
2011-09-26 15:41:20 611328 ----a-w- d:\windows\system32\uiautomationcore.dll
2011-09-26 15:41:20 220160 ----a-w- d:\windows\system32\oleacc.dll
2011-09-26 15:41:14 20480 ----a-w- d:\windows\system32\oleaccrc.dll
2011-09-09 09:12:13 599040 ----a-w- d:\windows\system32\crypt32.dll
2011-09-06 13:20:51 1858944 ----a-w- d:\windows\system32\win32k.sys
2011-08-31 22:00:50 22216 ----a-w- d:\windows\system32\drivers\mbam.sys
2011-08-22 23:48:55 916480 ----a-w- d:\windows\system32\wininet.dll
2011-08-22 23:48:54 43520 ----a-w- d:\windows\system32\licmgr10.dll
2011-08-22 23:48:54 1469440 ----a-w- d:\windows\system32\inetcpl.cpl
2011-08-22 11:56:39 385024 ----a-w- d:\windows\system32\html.iec
2011-08-17 13:49:54 138496 ----a-w- d:\windows\system32\drivers\afd.sys
.
============= FINISH: 12:48:09.25 ===============

Following is System and Section portions of GMER scan, (will add more as I get them)
GMER 1.0.15.15641 - http://www.gmer.net
Rootkit scan 2011-11-07 13:23:44
Windows 5.1.2600 Service Pack 3
Running: vj0q85z1[1].exe; Driver: D:\DOCUME~1\DAVIDB~1\LOCALS~1\Temp\pwldrpow.sys


---- System - GMER 1.0.15 ----

SSDT 8990D780 ZwCreateKey
SSDT 89777500 ZwCreateMutant
SSDT 8990C580 ZwCreateProcess
SSDT 8990C880 ZwCreateProcessEx
SSDT 897778C0 ZwCreateSymbolicLinkObject
SSDT 89777020 ZwCreateThread
SSDT 8990DD80 ZwDeleteKey
SSDT 8990E680 ZwDeleteValueKey
SSDT 89777AA0 ZwDuplicateObject
SSDT 89777200 ZwLoadDriver
SSDT 8990CB80 ZwOpenProcess
SSDT 8990EC60 ZwOpenSection
SSDT 8990CE80 ZwOpenThread
SSDT 8990E080 ZwRenameKey
SSDT 8990E380 ZwRestoreKey
SSDT 897776E0 ZwSetSystemInformation
SSDT 8990DA80 ZwSetValueKey
SSDT 8990D180 ZwTerminateProcess
SSDT 8990D480 ZwTerminateThread
SSDT 8990EE40 ZwWriteVirtualMemory

---- Kernel code sections - GMER 1.0.15 ----

.text ntkrnlpa.exe!IoReuseIrp + 8B 804EF90D 7 Bytes CALL 8A417865
.text atapi.sys B9F1184D 7 Bytes CALL 8A414370
.text D:\WINDOWS\system32\DRIVERS\nv4_mini.sys section is writeable [0xB9028360, 0x35483F, 0xE8000020]
.text cdrom.sys BA158300 2 Bytes [00, 00] {ADD [EAX], AL}
.text cdrom.sys BA158303 2 Bytes [00, 40]
.text cdrom.sys BA158307 5 Bytes [C0, 49, 4E, 49, 54] {ROR BYTE [ECX+0x4e], 0x49; PUSH ESP}
.text cdrom.sys BA158310 2 Bytes [DE, 0C]
.text cdrom.sys BA158314 2 Bytes [80, D6]
.text ...
.PAGE D:\WINDOWS\system32\DRIVERS\cdrom.sys unknown last section [0xBA166800, 0x100, 0xC0000040]
? D:\WINDOWS\system32\DRIVERS\cdrom.sys suspicious PE modification
.text D:\WINDOWS\system32\drivers\hardlock.sys section is writeable [0xB544A400, 0x82482, 0xE8000020]
.protectÿÿÿÿhardlockentry point in ".protectÿÿÿÿhardlockentry point in ".protectÿÿÿÿhardlockentry point in ".p" section [0xB54EA420] D:\WINDOWS\system32\drivers\hardlock.sys entry point in ".protectÿÿÿÿhardlockentry point in ".protectÿÿÿÿhardlockentry point in ".p" section [0xB54EA420]
.protectÿÿÿÿhardlockunknown last code section [0xB54EA200, 0x5105, 0xE0000020] D:\WINDOWS\system32\drivers\hardlock.sys unknown last code section [0xB54EA200, 0x5105, 0xE0000020]
? D:\DOCUME~1\DAVIDB~1\LOCALS~1\Temp\mbr.sys The system cannot find the file specified. !

---- User code sections - GMER 1.0.15 ----

.text D:\Program Files\Internet Explorer\iexplore.exe[1976] USER32.dll!DialogBoxParamW 7E4247AB 5 Bytes JMP 3E2154D5 D:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text D:\Program Files\Internet Explorer\iexplore.exe[1976] USER32.dll!SetWindowsHookExW 7E42820F 5 Bytes JMP 3E2E9AD1 D:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text D:\Program Files\Internet Explorer\iexplore.exe[1976] USER32.dll!CallNextHookEx 7E42B3C6 5 Bytes JMP 3E2DD10D D:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text D:\Program Files\Internet Explorer\iexplore.exe[1976] USER32.dll!CreateWindowExW 7E42D0A3 5 Bytes JMP 3E2EDB44 D:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text D:\Program Files\Internet Explorer\iexplore.exe[1976] USER32.dll!UnhookWindowsHookEx 7E42D5F3 5 Bytes JMP 3E25464E D:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text D:\Program Files\Internet Explorer\iexplore.exe[1976] USER32.dll!DialogBoxIndirectParamW 7E432072 5 Bytes JMP 3E3E5397 D:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text D:\Program Files\Internet Explorer\iexplore.exe[1976] USER32.dll!MessageBoxIndirectA 7E43A082 5 Bytes JMP 3E3E52C9 D:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text D:\Program Files\Internet Explorer\iexplore.exe[1976] USER32.dll!DialogBoxParamA 7E43B144 5 Bytes JMP 3E3E5334 D:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text D:\Program Files\Internet Explorer\iexplore.exe[1976] USER32.dll!MessageBoxExW 7E450838 5 Bytes JMP 3E3E519A D:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text D:\Program Files\Internet Explorer\iexplore.exe[1976] USER32.dll!MessageBoxExA 7E45085C 5 Bytes JMP 3E3E51FC D:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text D:\Program Files\Internet Explorer\iexplore.exe[1976] USER32.dll!DialogBoxIndirectParamA 7E456D7D 5 Bytes JMP 3E3E53FA D:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text D:\Program Files\Internet Explorer\iexplore.exe[1976] USER32.dll!MessageBoxIndirectW 7E4664D5 5 Bytes JMP 3E3E525E D:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text D:\Program Files\Internet Explorer\iexplore.exe[1976] ole32.dll!CoCreateInstance 774FF1AC 5 Bytes JMP 3E2EDBA0 D:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text D:\Program Files\Internet Explorer\iexplore.exe[1976] ole32.dll!OleLoadFromStream 7752981B 5 Bytes JMP 3E3E56FF D:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text D:\Program Files\Internet Explorer\iexplore.exe[2104] USER32.dll!DialogBoxParamW 7E4247AB 5 Bytes JMP 3E2154D5 D:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text D:\Program Files\Internet Explorer\iexplore.exe[2104] USER32.dll!SetWindowsHookExW 7E42820F 5 Bytes JMP 3E2E9AD1 D:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text D:\Program Files\Internet Explorer\iexplore.exe[2104] USER32.dll!CallNextHookEx 7E42B3C6 5 Bytes JMP 3E2DD10D D:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text D:\Program Files\Internet Explorer\iexplore.exe[2104] USER32.dll!CreateWindowExW 7E42D0A3 5 Bytes JMP 3E2EDB44 D:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text D:\Program Files\Internet Explorer\iexplore.exe[2104] USER32.dll!UnhookWindowsHookEx 7E42D5F3 5 Bytes JMP 3E25464E D:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text D:\Program Files\Internet Explorer\iexplore.exe[2104] USER32.dll!DialogBoxIndirectParamW 7E432072 5 Bytes JMP 3E3E5397 D:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text D:\Program Files\Internet Explorer\iexplore.exe[2104] USER32.dll!MessageBoxIndirectA 7E43A082 5 Bytes JMP 3E3E52C9 D:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text D:\Program Files\Internet Explorer\iexplore.exe[2104] USER32.dll!DialogBoxParamA 7E43B144 5 Bytes JMP 3E3E5334 D:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text D:\Program Files\Internet Explorer\iexplore.exe[2104] USER32.dll!MessageBoxExW 7E450838 5 Bytes JMP 3E3E519A D:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text D:\Program Files\Internet Explorer\iexplore.exe[2104] USER32.dll!MessageBoxExA 7E45085C 5 Bytes JMP 3E3E51FC D:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text D:\Program Files\Internet Explorer\iexplore.exe[2104] USER32.dll!DialogBoxIndirectParamA 7E456D7D 5 Bytes JMP 3E3E53FA D:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text D:\Program Files\Internet Explorer\iexplore.exe[2104] USER32.dll!MessageBoxIndirectW 7E4664D5 5 Bytes JMP 3E3E525E D:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text D:\Program Files\Internet Explorer\iexplore.exe[2104] ole32.dll!CoCreateInstance 774FF1AC 5 Bytes JMP 3E2EDBA0 D:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text D:\Program Files\Internet Explorer\iexplore.exe[2104] ole32.dll!OleLoadFromStream 7752981B 5 Bytes JMP 3E3E56FF D:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text D:\Program Files\Internet Explorer\iexplore.exe[3140] USER32.dll!DialogBoxParamW 7E4247AB 5 Bytes JMP 3E2154D5 D:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text D:\Program Files\Internet Explorer\iexplore.exe[3140] USER32.dll!CreateWindowExW 7E42D0A3 5 Bytes JMP 3E2EDB44 D:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text D:\Program Files\Internet Explorer\iexplore.exe[3140] USER32.dll!DialogBoxIndirectParamW 7E432072 5 Bytes JMP 3E3E5397 D:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text D:\Program Files\Internet Explorer\iexplore.exe[3140] USER32.dll!MessageBoxIndirectA 7E43A082 5 Bytes JMP 3E3E52C9 D:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text D:\Program Files\Internet Explorer\iexplore.exe[3140] USER32.dll!DialogBoxParamA 7E43B144 5 Bytes JMP 3E3E5334 D:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text D:\Program Files\Internet Explorer\iexplore.exe[3140] USER32.dll!MessageBoxExW 7E450838 5 Bytes JMP 3E3E519A D:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text D:\Program Files\Internet Explorer\iexplore.exe[3140] USER32.dll!MessageBoxExA 7E45085C 5 Bytes JMP 3E3E51FC D:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text D:\Program Files\Internet Explorer\iexplore.exe[3140] USER32.dll!DialogBoxIndirectParamA 7E456D7D 5 Bytes JMP 3E3E53FA D:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text D:\Program Files\Internet Explorer\iexplore.exe[3140] USER32.dll!MessageBoxIndirectW 7E4664D5 5 Bytes JMP 3E3E525E D:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text D:\Program Files\Internet Explorer\iexplore.exe[3692] USER32.dll!DialogBoxParamW 7E4247AB 5 Bytes JMP 3E2154D5 D:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text D:\Program Files\Internet Explorer\iexplore.exe[3692] USER32.dll!SetWindowsHookExW 7E42820F 5 Bytes JMP 3E2E9AD1 D:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text D:\Program Files\Internet Explorer\iexplore.exe[3692] USER32.dll!CallNextHookEx 7E42B3C6 5 Bytes JMP 3E2DD10D D:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text D:\Program Files\Internet Explorer\iexplore.exe[3692] USER32.dll!CreateWindowExW 7E42D0A3 5 Bytes JMP 3E2EDB44 D:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text D:\Program Files\Internet Explorer\iexplore.exe[3692] USER32.dll!UnhookWindowsHookEx 7E42D5F3 5 Bytes JMP 3E25464E D:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text D:\Program Files\Internet Explorer\iexplore.exe[3692] USER32.dll!DialogBoxIndirectParamW 7E432072 5 Bytes JMP 3E3E5397 D:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text D:\Program Files\Internet Explorer\iexplore.exe[3692] USER32.dll!MessageBoxIndirectA 7E43A082 5 Bytes JMP 3E3E52C9 D:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text D:\Program Files\Internet Explorer\iexplore.exe[3692] USER32.dll!DialogBoxParamA 7E43B144 5 Bytes JMP 3E3E5334 D:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text D:\Program Files\Internet Explorer\iexplore.exe[3692] USER32.dll!MessageBoxExW 7E450838 5 Bytes JMP 3E3E519A D:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text D:\Program Files\Internet Explorer\iexplore.exe[3692] USER32.dll!MessageBoxExA 7E45085C 5 Bytes JMP 3E3E51FC D:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text D:\Program Files\Internet Explorer\iexplore.exe[3692] USER32.dll!DialogBoxIndirectParamA 7E456D7D 5 Bytes JMP 3E3E53FA D:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text D:\Program Files\Internet Explorer\iexplore.exe[3692] USER32.dll!MessageBoxIndirectW 7E4664D5 5 Bytes JMP 3E3E525E D:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text D:\Program Files\Internet Explorer\iexplore.exe[3692] ole32.dll!CoCreateInstance 774FF1AC 5 Bytes JMP 3E2EDBA0 D:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text D:\Program Files\Internet Explorer\iexplore.exe[3692] ole32.dll!OleLoadFromStream 7752981B 5 Bytes JMP 3E3E56FF D:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)

---- EOF - GMER 1.0.15 ----

Devices portion of GMER scan:
GMER 1.0.15.15641 - http://www.gmer.net
Rootkit scan 2011-11-07 14:35:23
Windows 5.1.2600 Service Pack 3
Running: gvf2b3hj[1].exe; Driver: D:\DOCUME~1\DAVIDB~1\LOCALS~1\Temp\pwldrpow.sys


---- Devices - GMER 1.0.15 ----

AttachedDevice \Driver\Tcpip \Device\Ip tmtdi.sys (Trend Micro TDI Driver (i386-fre)/Trend Micro Inc.)
AttachedDevice \Driver\Tcpip \Device\Tcp tmtdi.sys (Trend Micro TDI Driver (i386-fre)/Trend Micro Inc.)
AttachedDevice \Driver\Tcpip \Device\Udp tmtdi.sys (Trend Micro TDI Driver (i386-fre)/Trend Micro Inc.)
AttachedDevice \Driver\Tcpip \Device\RawIp tmtdi.sys (Trend Micro TDI Driver (i386-fre)/Trend Micro Inc.)
AttachedDevice \FileSystem\Fastfat \Fat fltmgr.sys (Microsoft Filesystem Filter Manager/Microsoft Corporation)

---- EOF - GMER 1.0.15 ----


Modules portion of scan comes up clean.
Processes portion of scan crashes immediately.
Threads portion of scan comes up clean...or does it?
Initial startup copy and paste has this:
---- Devices - GMER 1.0.15 ----

AttachedDevice \FileSystem\Fastfat \Fat fltmgr.sys (Microsoft Filesystem Filter Manager/Microsoft Corporation)
AttachedDevice \Driver\Tcpip \Device\Ip tmtdi.sys (Trend Micro TDI Driver (i386-fre)/Trend Micro Inc.)
AttachedDevice \Driver\Tcpip \Device\Tcp tmtdi.sys (Trend Micro TDI Driver (i386-fre)/Trend Micro Inc.)
AttachedDevice \Driver\Tcpip \Device\Udp tmtdi.sys (Trend Micro TDI Driver (i386-fre)/Trend Micro Inc.)
AttachedDevice \Driver\Tcpip \Device\RawIp tmtdi.sys (Trend Micro TDI Driver (i386-fre)/Trend Micro Inc.)

---- Threads - GMER 1.0.15 ----

Thread System [4:116] 8A417875
Thread System [4:120] 8A417875

---- EOF - GMER 1.0.15 ----

Libraries portion of scan comes up clean.
Services portion of scan comes up clean.
Registry portion of scan comes up clean
Files portion of scan finds the numbered .exe, plus a number of items ($uninstall I think) but crashes before finished.

Hope that helps a little.

Attached Files


Edited by David Billo, 07 November 2011 - 02:59 PM.


BC AdBot (Login to Remove)

 


#2 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:03:59 AM

Posted 10 November 2011 - 12:52 AM

Hello and Welcome to the forums!

My name is Gringo and I'll be glad to help you with your computer problems.

Somethings to remember while we are working together.

  • Do not run any other tool untill instructed to do so!
  • please Do not Attach logs or put in code boxes.
  • Tell me about any problems that have occurred during the fix.
  • Tell me of any other symptoms you may be having as these can help also.
  • Do not run anything while running a fix.
  • Do not run any other tool untill instructed to do so!


Click on the Watch Topic Button and select Immediate Notification and click on proceed, this will help you to get notified faster when I have replied and make the cleaning process faster.

Please print out or make a copy in notpad of any instructions given, as sometimes it is necessary to go offline and you will lose access to them.

Run Combofix:

You may be asked to install or update the Recovery Console (Win XP Only) if this happens please allow it to do so (you will need to be connected to the internet for this)

Before you run Combofix I will need you to turn off any security software you have running, If you do not know how to do this you can find out >here< or >here<

Combofix may need to reboot your computer more than once to do its job this is normal.

You can download Combofix from one of these links.
Link 1
Link 2
Link 3
1. Close any open browsers or any other programs that are open.
2. Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.

Double click on combofix.exe & follow the prompts.
When finished, it will produce a report for you.

Note 1: Do not mouseclick combofix's window while it's running. That may cause it to stall

Note 2: If you recieve an error "Illegal operation attempted on a registery key that has been marked for deletion." Please restart the computer

"information and logs"

  • In your next post I need the following
  • Log from Combofix
  • let me know of any problems you may have had
  • How is the computer doing now?

Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#3 David Billo

David Billo
  • Topic Starter

  • Members
  • 37 posts
  • OFFLINE
  •  
  • Local time:03:59 AM

Posted 10 November 2011 - 12:02 PM

One thing that came to light yesterday is that my CD/DVD burning functionality was gone, neither Nero, nor the Windows burning functions worked.

I was not able to turn off the Trend Micro Internet Security, because, even though Security Centre showed it to be functioning, there was no tray icon, and Task Manager I couldn't see any of the usual processes associated with it. I turned of WinPatrol.

Of course, ComboFix warned about the Trend Micro real time scanner running, but since I had no way to turn it off, I forges ahead with a warning from ComboFix. By the second reboot, I also noticed that WinPatrol was running again, but unable to do anything about it. ComboFix did it's thing, however:

ComboFix 11-11-10.02 - David Billo 11/10/2011 11:31:11.1.2 - x86
Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.2046.1699 [GMT -5:00]
Running from: d:\documents and settings\David Billo\Desktop\ComboFix.exe
AV: Trend Micro Titanium Internet Security *Enabled/Updated* {7D2296BC-32CC-4519-917E-52E652474AF5}
FW: Trend Micro Firewall Booster *Enabled* {3E790E9E-6A5D-4303-A7F9-185EC20F3EB6}
.
.
((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.
.
d:\documents and settings\All Users\Application Data\TEMP
d:\documents and settings\David Billo\Local Settings\Application Data\85b031d8\U
d:\documents and settings\David Billo\Local Settings\Application Data\85b031d8\U\80000000.@
d:\documents and settings\David Billo\Local Settings\Application Data\85b031d8\U\800000cb.@
d:\documents and settings\David Billo\Local Settings\Application Data\85b031d8\U\800000cf.@
d:\documents and settings\David Billo\Local Settings\Application Data\85b031d8\X
d:\documents and settings\David Billo\Local Settings\Application Data\ryf.exe
d:\windows\$NtUninstallKB19351$
d:\windows\$NtUninstallKB19351$\2242916824\L\kqqwsmaj
d:\windows\$NtUninstallKB19351$\3229516175
d:\windows\system32\encapi32.dll
d:\windows\system32\service
d:\windows\system32\service\03112010_TIS17_SfFniAU.log
d:\windows\system32\service\04052010_TIS17_SfFniAU.log
d:\windows\system32\service\06112009_TIS17_SfFniAU.log
d:\windows\system32\service\07042010_TIS17_SfFniAU.log
d:\windows\system32\service\09062010_TIS17_SfFniAU.log
d:\windows\system32\service\10062009_TIS17_SfFniAU.log
d:\windows\system32\service\10112009_TIS17_SfFniAU.log
d:\windows\system32\service\11122009_TIS17_SfFniAU.log
d:\windows\system32\service\12082010_TIS17_SfFniAU.log
d:\windows\system32\service\12112009_TIS17_SfFniAU.log
d:\windows\system32\service\16092009_TIS17_SfFniAU.log
d:\windows\system32\service\17032010_TIS17_SfFniAU.log
d:\windows\system32\service\18112009_TIS17_SfFniAU.log
d:\windows\system32\service\19112009_TIS17_SfFniAU.log
d:\windows\system32\service\20112009_TIS17_SfFniAU.log
d:\windows\system32\service\22122009_TIS17_SfFniAU.log
d:\windows\system32\service\23052009_TIS17_SfFniAU.log
d:\windows\system32\service\24092009_TIS17_SfFniAU.log
d:\windows\system32\service\29092009_TIS17_SfFniAU.log
d:\windows\system32\service\30032010_TIS17_SfFniAU.log
.
Infected copy of d:\windows\system32\drivers\cdrom.sys was found and disinfected
Restored copy from - The cat found it :)
.
((((((((((((((((((((((((((((((((((((((( Drivers/Services )))))))))))))))))))))))))))))))))))))))))))))))))
.
.
-------\Service_85b031d8
.
.
((((((((((((((((((((((((( Files Created from 2011-10-10 to 2011-11-10 )))))))))))))))))))))))))))))))
.
.
2011-11-10 16:29 . 2008-04-14 12:00 62976 -c--a-w- d:\windows\system32\dllcache\cdrom.sys
2011-11-10 16:29 . 2008-04-14 12:00 62976 ----a-w- d:\windows\system32\drivers\cdrom.sys
2011-11-08 19:29 . 2011-11-08 19:29 -------- d-----w- d:\documents and settings\David Billo\Application Data\WinPatrol
2011-11-08 19:29 . 2011-11-08 19:29 -------- d-----w- d:\program files\BillP Studios
2011-11-08 19:29 . 2011-11-08 19:29 -------- d-----w- d:\documents and settings\All Users\Application Data\InstallMate
2011-10-19 16:54 . 2011-11-10 16:34 -------- d-sh--w- d:\documents and settings\David Billo\Local Settings\Application Data\85b031d8
2011-10-19 15:07 . 2011-11-10 16:07 -------- d-----w- d:\program files\JDownloader
2011-10-19 15:03 . 2011-10-19 15:03 -------- d-----w- d:\program files\Common Files\Java
.
.
.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2011-11-10 16:35 . 2009-05-22 23:14 16608 ----a-w- d:\windows\gdrv.sys
2011-10-13 14:32 . 2011-05-17 17:03 414368 ----a-w- d:\windows\system32\FlashPlayerCPLApp.cpl
2011-10-10 14:22 . 2009-05-22 23:08 692736 ----a-w- d:\windows\system32\inetcomm.dll
2011-10-03 18:38 . 2011-03-05 16:13 102400 ----a-w- d:\windows\RegBootClean.exe
2011-10-03 09:06 . 2010-05-02 20:56 472808 ----a-w- d:\windows\system32\deployJava1.dll
2011-10-03 06:37 . 2010-01-05 19:02 73728 ----a-w- d:\windows\system32\javacpl.cpl
2011-09-26 15:41 . 2010-03-18 15:09 611328 ----a-w- d:\windows\system32\uiautomationcore.dll
2011-09-26 15:41 . 2008-04-14 12:00 220160 ----a-w- d:\windows\system32\oleacc.dll
2011-09-26 15:41 . 2008-04-14 12:00 20480 ----a-w- d:\windows\system32\oleaccrc.dll
2011-09-09 09:12 . 2008-04-14 12:00 599040 ----a-w- d:\windows\system32\crypt32.dll
2011-09-06 13:20 . 2008-04-14 12:00 1858944 ----a-w- d:\windows\system32\win32k.sys
2011-08-22 23:48 . 2008-04-14 12:00 916480 ----a-w- d:\windows\system32\wininet.dll
2011-08-22 23:48 . 2008-04-14 12:00 43520 ----a-w- d:\windows\system32\licmgr10.dll
2011-08-22 23:48 . 2008-04-14 12:00 1469440 ----a-w- d:\windows\system32\inetcpl.cpl
2011-08-22 11:56 . 2008-04-14 12:00 385024 ----a-w- d:\windows\system32\html.iec
2011-08-17 13:49 . 2008-04-14 12:00 138496 ----a-w- d:\windows\system32\drivers\afd.sys
.
.
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4
.
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"PowerPanel Personal Edition User Interaction"="d:\program files\GEEK SQUAD UPS\pppeuser.exe" [2007-03-10 270336]
"swg"="d:\program files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe" [2011-02-12 39408]
"msnmsgr"="d:\program files\Windows Live\Messenger\msnmsgr.exe" [2010-04-17 3872080]
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"GEST"="=" [X]
"RTHDCPL"="RTHDCPL.EXE" [2008-07-23 16804864]
"SoundMan"="SOUNDMAN.EXE" [2008-06-18 77824]
"AlcWzrd"="ALCWZRD.EXE" [2008-06-19 2808832]
"JMB36X IDE Setup"="d:\windows\RaidTool\xInsIDE.exe" [2007-03-20 36864]
"36X Raid Configurer"="d:\windows\system32\xRaidSetup.exe" [2007-11-19 1966080]
"NvCplDaemon"="d:\windows\system32\NvCpl.dll" [2009-02-19 13680640]
"nwiz"="nwiz.exe" [2009-02-19 1657376]
"NvMediaCenter"="d:\windows\system32\NvMcTray.dll" [2009-02-19 86016]
"NeroFilterCheck"="d:\program files\Common Files\Ahead\Lib\NeroCheck.exe" [2008-07-14 570664]
"itype"="d:\program files\Microsoft IntelliType Pro\itype.exe" [2007-08-31 988584]
"Kernel and Hardware Abstraction Layer"="KHALMNPR.EXE" [2008-12-19 76304]
"Logitech Hardware Abstraction Layer"="KHALMNPR.EXE" [2008-12-19 76304]
"Logitech Utility"="Logi_MwX.Exe" [2003-12-17 19968]
"Trend Micro Titanium"="d:\program files\Trend Micro\Titanium\UIFramework\uiWinMgr.exe" [2011-02-17 1111568]
"Trend Micro Client Framework"="d:\program files\Trend Micro\UniClient\UiFrmWrk\UIWatchDog.exe" [2011-02-10 116752]
"SunJavaUpdateSched"="d:\program files\Common Files\Java\Java Update\jusched.exe" [2011-06-09 254696]
"Malwarebytes' Anti-Malware"="d:\program files\Malwarebytes' Anti-Malware\mbamgui.exe" [2011-08-31 449608]
"WinPatrol"="d:\program files\BillP Studios\WinPatrol\winpatrol.exe" [2011-05-15 325512]
.
d:\documents and settings\David Billo\Start Menu\Programs\Startup\
Product Registration.lnk - d:\program files\Common Files\LogiShared\eReg\SetPoint\eReg.exe [N/A]
.
d:\documents and settings\All Users\Start Menu\Programs\Startup\
Adobe Reader Speed Launch.lnk - d:\program files\Adobe\Acrobat 7.0\Reader\reader_sl.exe [2004-12-14 29696]
Logitech SetPoint.lnk - d:\program files\Logitech\SetPoint\SetPoint.exe [2009-8-10 809488]
Microsoft Office.lnk - d:\program files\Microsoft Office\Office10\OSA.EXE [2001-2-13 83360]
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\LBTWlgn]
2009-02-19 04:30 72208 ----a-w- d:\program files\Common Files\Logitech\Bluetooth\LBTWLgn.dll
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\WdfLoadGroup]
@=""
.
[HKEY_LOCAL_MACHINE\software\microsoft\security center]
"AntiVirusOverride"=dword:00000001
"FirewallOverride"=dword:00000001
.
[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\TrendAntiVirus]
"DisableMonitoring"=dword:00000001
.
[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\TrendFirewall]
"DisableMonitoring"=dword:00000001
.
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]
"EnableFirewall"= 0 (0x0)
"DisableNotifications"= 1 (0x1)
.
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"%windir%\\system32\\sessmgr.exe"=
"d:\\Program Files\\Messenger\\msmsgs.exe"=
"d:\\WINDOWS\\system32\\ftp.exe"=
"d:\\Program Files\\UltraVNC\\vncviewer.exe"=
"d:\\Program Files\\VideoLAN\\VLC\\vlc.exe"=
"d:\\Program Files\\Windows Live\\Messenger\\wlcsdk.exe"=
"d:\\Program Files\\Windows Live\\Messenger\\msnmsgr.exe"=
.
R2 GEST Service;GEST Service for program management.;d:\program files\GIGABYTE\EnergySaver\GSvr.exe [5/22/2009 6:15 PM 68136]
R2 NVIDIA Performance Driver Service;NVIDIA Performance Driver Service;d:\program files\NVIDIA Corporation\Performance Drivers\nvPDsvc.exe [12/11/2008 6:08 AM 3575808]
R2 tmevtmgr;tmevtmgr;d:\windows\system32\drivers\tmevtmgr.sys [11/17/2010 9:55 PM 64080]
R3 NmPar;PCI Parallel Port;d:\windows\system32\drivers\NmPar.sys [12/24/2008 4:40 AM 80256]
R3 tmcfw;Trend Micro Common Firewall Service;d:\windows\system32\drivers\TM_CFW.sys [11/17/2010 9:57 PM 341072]
S2 Amsp;Trend Micro Solution Platform;d:\program files\Trend Micro\AMSP\coreServiceShell.exe [11/17/2010 9:54 PM 188272]
S2 clr_optimization_v4.0.30319_32;Microsoft .NET Framework NGEN v4.0.30319_X86;d:\windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe [3/18/2010 1:16 PM 130384]
S2 gupdate;Google Update Service (gupdate);d:\program files\Google\Update\GoogleUpdate.exe [2/12/2011 4:19 PM 136176]
S3 gupdatem;Google Update Service (gupdatem);d:\program files\Google\Update\GoogleUpdate.exe [2/12/2011 4:19 PM 136176]
S3 WPFFontCache_v0400;Windows Presentation Foundation Font Cache 4.0.0.0;d:\windows\Microsoft.NET\Framework\v4.0.30319\WPF\WPFFontCache_v0400.exe [3/18/2010 1:16 PM 753504]
.
Contents of the 'Scheduled Tasks' folder
.
2011-11-10 d:\windows\Tasks\GoogleUpdateTaskMachineCore.job
- d:\program files\Google\Update\GoogleUpdate.exe [2011-02-12 21:18]
.
2011-11-10 d:\windows\Tasks\GoogleUpdateTaskMachineUA.job
- d:\program files\Google\Update\GoogleUpdate.exe [2011-02-12 21:18]
.
.
------- Supplementary Scan -------
.
uStart Page = hxxp://www.google.ca/ig?hl=en&source=iglk
IE: E&xport to Microsoft Excel - d:\progra~1\MICROS~3\Office10\EXCEL.EXE/3000
IE: Google Sidewiki... - d:\program files\Google\Google Toolbar\Component\GoogleToolbarDynamic_mui_en_E11712C84EA7E12B.dll/cmsidewiki.html
TCP: DhcpNameServer = 192.168.2.1 192.168.2.1
.
.
**************************************************************************
.
catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2011-11-10 11:36
Windows 5.1.2600 Service Pack 3 NTFS
.
scanning hidden processes ...
.
scanning hidden autostart entries ...
.
scanning hidden files ...
.
scan completed successfully
hidden files: 0
.
**************************************************************************
.
--------------------- DLLs Loaded Under Running Processes ---------------------
.
- - - - - - - > 'winlogon.exe'(1060)
d:\program files\common files\logitech\bluetooth\LBTWlgn.dll
d:\program files\common files\logitech\bluetooth\LBTServ.dll
.
- - - - - - - > 'explorer.exe'(3116)
d:\windows\system32\WININET.dll
d:\program files\BillP Studios\WinPatrol\PATROLPRO.DLL
d:\program files\Logitech\SetPoint\GameHook.dll
d:\program files\Logitech\SetPoint\lgscroll.dll
d:\windows\WinSxS\x86_Microsoft.VC80.CRT_1fc8b3b9a1e18e3b_8.0.50727.6195_x-ww_44262b86\MSVCR80.dll
d:\windows\system32\AcSignIcon.dll
d:\program files\Common Files\Autodesk Shared\AcSignCore16.dll
d:\windows\system32\msi.dll
d:\windows\system32\ieframe.dll
d:\windows\system32\webcheck.dll
d:\windows\system32\WPDShServiceObj.dll
d:\windows\system32\PortableDeviceTypes.dll
d:\windows\system32\PortableDeviceApi.dll
.
------------------------ Other Running Processes ------------------------
.
d:\windows\RTHDCPL.EXE
d:\windows\SOUNDMAN.EXE
d:\windows\system32\RUNDLL32.EXE
d:\windows\Logi_MwX.Exe
d:\program files\Microsoft IntelliType Pro\dpupdchk.exe
d:\windows\system32\crypserv.exe
d:\program files\Java\jre6\bin\jqs.exe
d:\program files\Common Files\Logishrd\KHAL2\KHALMNPR.EXE
d:\windows\system32\nvsvc32.exe
d:\program files\GEEK SQUAD UPS\ppped.exe
d:\program files\Windows Live\Contacts\wlcomm.exe
.
**************************************************************************
.
Completion time: 2011-11-10 11:37:56 - machine was rebooted
ComboFix-quarantined-files.txt 2011-11-10 16:37
.
Pre-Run: 35,347,496,960 bytes free
Post-Run: 35,570,630,656 bytes free
.
WindowsXP-KB310994-SP2-Pro-BootDisk-ENU.exe
[boot loader]
timeout=2
default=multi(0)disk(0)rdisk(0)partition(2)\WINDOWS
[operating systems]
c:\cmdcons\BOOTSECT.DAT="Microsoft Windows Recovery Console" /cmdcons
UnsupportedDebug="do not select this" /debug
multi(0)disk(0)rdisk(0)partition(2)\WINDOWS="Microsoft Windows XP Professional" /noexecute=optin /fastdetect
multi(0)disk(0)rdisk(0)partition(1)\WINNT="Microsoft Windows 2000 Professional" /fastdetect
.
- - End Of File - - 2AB35AAAECA01D837DF3CEFCFA34A082

#4 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:03:59 AM

Posted 10 November 2011 - 04:17 PM

Greetings

Good That cleaned up some bad guys but I see some other stuff that we need to go after, so I want you to run this custom script for me.

:Run CFScript:

Open Notepad and copy/paste the text in the box into the window:

ClearJavaCache::

Save it to your desktop as CFScript.txt

Refering to the picture above, drag CFScript.txt into ComboFix.exe
Posted Image
This will let ComboFix run again.
Restart if you have to.
Save the produced logfile to your desktop.

Note: Do not mouseclick combofix's window whilst it's running. That may cause it to stall

"information and logs"

  • In your next post I need the following

  • report from Combofix
  • let me know of any problems you may have had
  • How is the computer doing now after running the script?

Gringo

I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#5 David Billo

David Billo
  • Topic Starter

  • Members
  • 37 posts
  • OFFLINE
  •  
  • Local time:03:59 AM

Posted 10 November 2011 - 04:54 PM

Same warning as before about Trend Micro running, but it doesn't appear in tray or taskmanager. I should mention that ComboFix downloaded a newer version and restarted itself, not sure how that impacted your script.

Computer is running normally. The numbered .exe is not longer running, but I still can't burn disks. When I try to run Nero, a popup says: " Windows cannot access the specified device, path, or file. You may not have the appropriate permissions to access the item."
Opening a blank disk using windows, and dragging files to it results in a Problem Copying message: "Windows encountered a problem when trying to copy this file. What do you want Windows to do?" (retry or cancel)

Oh yeah, I have a randomly named copy of GMER.exe on my desktop, left over from before, which I'm unable to delete.

ComboFix 11-11-10.03 - David Billo 11/10/2011 16:37:14.2.2 - x86
Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.2046.1458 [GMT -5:00]
Running from: d:\documents and settings\David Billo\Desktop\ComboFix.exe
Command switches used :: d:\documents and settings\David Billo\Desktop\CFScript.txt
AV: Trend Micro Titanium Internet Security *Enabled/Updated* {7D2296BC-32CC-4519-917E-52E652474AF5}
FW: Trend Micro Firewall Booster *Enabled* {3E790E9E-6A5D-4303-A7F9-185EC20F3EB6}
.
.
((((((((((((((((((((((((( Files Created from 2011-10-10 to 2011-11-10 )))))))))))))))))))))))))))))))
.
.
2011-11-10 18:03 . 2011-11-10 18:03 -------- d--h--w- d:\windows\PIF
2011-11-10 16:29 . 2008-04-14 12:00 62976 -c--a-w- d:\windows\system32\dllcache\cdrom.sys
2011-11-10 16:29 . 2008-04-14 12:00 62976 ----a-w- d:\windows\system32\drivers\cdrom.sys
2011-11-08 19:29 . 2011-11-08 19:29 -------- d-----w- d:\documents and settings\David Billo\Application Data\WinPatrol
2011-11-08 19:29 . 2011-11-08 19:29 -------- d-----w- d:\program files\BillP Studios
2011-11-08 19:29 . 2011-11-08 19:29 -------- d-----w- d:\documents and settings\All Users\Application Data\InstallMate
2011-10-19 16:54 . 2011-11-10 16:34 -------- d-sh--w- d:\documents and settings\David Billo\Local Settings\Application Data\85b031d8
2011-10-19 15:07 . 2011-11-10 16:07 -------- d-----w- d:\program files\JDownloader
2011-10-19 15:03 . 2011-10-19 15:03 -------- d-----w- d:\program files\Common Files\Java
.
.
.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2011-11-10 16:35 . 2009-05-22 23:14 16608 ----a-w- d:\windows\gdrv.sys
2011-10-13 14:32 . 2011-05-17 17:03 414368 ----a-w- d:\windows\system32\FlashPlayerCPLApp.cpl
2011-10-10 14:22 . 2009-05-22 23:08 692736 ----a-w- d:\windows\system32\inetcomm.dll
2011-10-03 18:38 . 2011-03-05 16:13 102400 ----a-w- d:\windows\RegBootClean.exe
2011-10-03 09:06 . 2010-05-02 20:56 472808 ----a-w- d:\windows\system32\deployJava1.dll
2011-10-03 06:37 . 2010-01-05 19:02 73728 ----a-w- d:\windows\system32\javacpl.cpl
2011-09-26 15:41 . 2010-03-18 15:09 611328 ----a-w- d:\windows\system32\uiautomationcore.dll
2011-09-26 15:41 . 2008-04-14 12:00 220160 ----a-w- d:\windows\system32\oleacc.dll
2011-09-26 15:41 . 2008-04-14 12:00 20480 ----a-w- d:\windows\system32\oleaccrc.dll
2011-09-09 09:12 . 2008-04-14 12:00 599040 ----a-w- d:\windows\system32\crypt32.dll
2011-09-06 13:20 . 2008-04-14 12:00 1858944 ----a-w- d:\windows\system32\win32k.sys
2011-08-22 23:48 . 2008-04-14 12:00 916480 ----a-w- d:\windows\system32\wininet.dll
2011-08-22 23:48 . 2008-04-14 12:00 43520 ----a-w- d:\windows\system32\licmgr10.dll
2011-08-22 23:48 . 2008-04-14 12:00 1469440 ----a-w- d:\windows\system32\inetcpl.cpl
2011-08-22 11:56 . 2008-04-14 12:00 385024 ----a-w- d:\windows\system32\html.iec
2011-08-17 13:49 . 2008-04-14 12:00 138496 ----a-w- d:\windows\system32\drivers\afd.sys
.
.
((((((((((((((((((((((((((((( SnapShot@2011-11-10_16.36.03 )))))))))))))))))))))))))))))))))))))))))
.
- 2008-04-14 12:00 . 2011-11-07 15:59 87218 d:\windows\system32\perfc009.dat
+ 2008-04-14 12:00 . 2011-11-10 16:40 87218 d:\windows\system32\perfc009.dat
+ 2008-04-14 12:00 . 2011-11-10 16:40 504356 d:\windows\system32\perfh009.dat
- 2008-04-14 12:00 . 2011-11-07 15:59 504356 d:\windows\system32\perfh009.dat
.
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4
.
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"PowerPanel Personal Edition User Interaction"="d:\program files\GEEK SQUAD UPS\pppeuser.exe" [2007-03-10 270336]
"swg"="d:\program files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe" [2011-02-12 39408]
"msnmsgr"="d:\program files\Windows Live\Messenger\msnmsgr.exe" [2010-04-17 3872080]
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"GEST"="=" [X]
"RTHDCPL"="RTHDCPL.EXE" [2008-07-23 16804864]
"SoundMan"="SOUNDMAN.EXE" [2008-06-18 77824]
"AlcWzrd"="ALCWZRD.EXE" [2008-06-19 2808832]
"JMB36X IDE Setup"="d:\windows\RaidTool\xInsIDE.exe" [2007-03-20 36864]
"36X Raid Configurer"="d:\windows\system32\xRaidSetup.exe" [2007-11-19 1966080]
"NvCplDaemon"="d:\windows\system32\NvCpl.dll" [2009-02-19 13680640]
"nwiz"="nwiz.exe" [2009-02-19 1657376]
"NvMediaCenter"="d:\windows\system32\NvMcTray.dll" [2009-02-19 86016]
"NeroFilterCheck"="d:\program files\Common Files\Ahead\Lib\NeroCheck.exe" [2008-07-14 570664]
"itype"="d:\program files\Microsoft IntelliType Pro\itype.exe" [2007-08-31 988584]
"Kernel and Hardware Abstraction Layer"="KHALMNPR.EXE" [2008-12-19 76304]
"Logitech Hardware Abstraction Layer"="KHALMNPR.EXE" [2008-12-19 76304]
"Logitech Utility"="Logi_MwX.Exe" [2003-12-17 19968]
"Trend Micro Titanium"="d:\program files\Trend Micro\Titanium\UIFramework\uiWinMgr.exe" [2011-02-17 1111568]
"Trend Micro Client Framework"="d:\program files\Trend Micro\UniClient\UiFrmWrk\UIWatchDog.exe" [2011-02-10 116752]
"SunJavaUpdateSched"="d:\program files\Common Files\Java\Java Update\jusched.exe" [2011-06-09 254696]
"Malwarebytes' Anti-Malware"="d:\program files\Malwarebytes' Anti-Malware\mbamgui.exe" [2011-08-31 449608]
"WinPatrol"="d:\program files\BillP Studios\WinPatrol\winpatrol.exe" [2011-05-15 325512]
.
d:\documents and settings\David Billo\Start Menu\Programs\Startup\
Product Registration.lnk - d:\program files\Common Files\LogiShared\eReg\SetPoint\eReg.exe [N/A]
.
d:\documents and settings\All Users\Start Menu\Programs\Startup\
Adobe Reader Speed Launch.lnk - d:\program files\Adobe\Acrobat 7.0\Reader\reader_sl.exe [2004-12-14 29696]
Logitech SetPoint.lnk - d:\program files\Logitech\SetPoint\SetPoint.exe [2009-8-10 809488]
Microsoft Office.lnk - d:\program files\Microsoft Office\Office10\OSA.EXE [2001-2-13 83360]
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\LBTWlgn]
2009-02-19 04:30 72208 ----a-w- d:\program files\Common Files\Logitech\Bluetooth\LBTWLgn.dll
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\WdfLoadGroup]
@=""
.
[HKEY_LOCAL_MACHINE\software\microsoft\security center]
"AntiVirusOverride"=dword:00000001
"FirewallOverride"=dword:00000001
.
[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\TrendAntiVirus]
"DisableMonitoring"=dword:00000001
.
[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\TrendFirewall]
"DisableMonitoring"=dword:00000001
.
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]
"EnableFirewall"= 0 (0x0)
"DisableNotifications"= 1 (0x1)
.
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"%windir%\\system32\\sessmgr.exe"=
"d:\\Program Files\\Messenger\\msmsgs.exe"=
"d:\\WINDOWS\\system32\\ftp.exe"=
"d:\\Program Files\\UltraVNC\\vncviewer.exe"=
"d:\\Program Files\\VideoLAN\\VLC\\vlc.exe"=
"d:\\Program Files\\Windows Live\\Messenger\\wlcsdk.exe"=
"d:\\Program Files\\Windows Live\\Messenger\\msnmsgr.exe"=
.
R2 GEST Service;GEST Service for program management.;d:\program files\GIGABYTE\EnergySaver\GSvr.exe [5/22/2009 6:15 PM 68136]
R2 NVIDIA Performance Driver Service;NVIDIA Performance Driver Service;d:\program files\NVIDIA Corporation\Performance Drivers\nvPDsvc.exe [12/11/2008 6:08 AM 3575808]
R2 tmevtmgr;tmevtmgr;d:\windows\system32\drivers\tmevtmgr.sys [11/17/2010 9:55 PM 64080]
R3 NmPar;PCI Parallel Port;d:\windows\system32\drivers\NmPar.sys [12/24/2008 4:40 AM 80256]
R3 tmcfw;Trend Micro Common Firewall Service;d:\windows\system32\drivers\TM_CFW.sys [11/17/2010 9:57 PM 341072]
S2 Amsp;Trend Micro Solution Platform;d:\program files\Trend Micro\AMSP\coreServiceShell.exe [11/17/2010 9:54 PM 188272]
S2 clr_optimization_v4.0.30319_32;Microsoft .NET Framework NGEN v4.0.30319_X86;d:\windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe [3/18/2010 1:16 PM 130384]
S2 gupdate;Google Update Service (gupdate);d:\program files\Google\Update\GoogleUpdate.exe [2/12/2011 4:19 PM 136176]
S3 gupdatem;Google Update Service (gupdatem);d:\program files\Google\Update\GoogleUpdate.exe [2/12/2011 4:19 PM 136176]
S3 WPFFontCache_v0400;Windows Presentation Foundation Font Cache 4.0.0.0;d:\windows\Microsoft.NET\Framework\v4.0.30319\WPF\WPFFontCache_v0400.exe [3/18/2010 1:16 PM 753504]
.
Contents of the 'Scheduled Tasks' folder
.
2011-11-10 d:\windows\Tasks\GoogleUpdateTaskMachineCore.job
- d:\program files\Google\Update\GoogleUpdate.exe [2011-02-12 21:18]
.
2011-11-10 d:\windows\Tasks\GoogleUpdateTaskMachineUA.job
- d:\program files\Google\Update\GoogleUpdate.exe [2011-02-12 21:18]
.
.
------- Supplementary Scan -------
.
uStart Page = hxxp://www.google.ca/ig?hl=en&source=iglk
IE: E&xport to Microsoft Excel - d:\progra~1\MICROS~3\Office10\EXCEL.EXE/3000
IE: Google Sidewiki... - d:\program files\Google\Google Toolbar\Component\GoogleToolbarDynamic_mui_en_E11712C84EA7E12B.dll/cmsidewiki.html
TCP: DhcpNameServer = 192.168.2.1 192.168.2.1
.
.
**************************************************************************
.
catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2011-11-10 16:40
Windows 5.1.2600 Service Pack 3 NTFS
.
scanning hidden processes ...
.
scanning hidden autostart entries ...
.
scanning hidden files ...
.
scan completed successfully
hidden files: 0
.
**************************************************************************
.
--------------------- DLLs Loaded Under Running Processes ---------------------
.
- - - - - - - > 'winlogon.exe'(1060)
d:\program files\common files\logitech\bluetooth\LBTWlgn.dll
d:\program files\common files\logitech\bluetooth\LBTServ.dll
.
- - - - - - - > 'explorer.exe'(832)
d:\windows\system32\WININET.dll
d:\program files\Logitech\SetPoint\GameHook.dll
d:\program files\Logitech\SetPoint\lgscroll.dll
d:\windows\WinSxS\x86_Microsoft.VC80.CRT_1fc8b3b9a1e18e3b_8.0.50727.6195_x-ww_44262b86\MSVCR80.dll
d:\windows\system32\AcSignIcon.dll
d:\program files\Common Files\Autodesk Shared\AcSignCore16.dll
d:\windows\system32\ieframe.dll
d:\windows\system32\msi.dll
d:\windows\system32\webcheck.dll
d:\windows\system32\WPDShServiceObj.dll
d:\windows\system32\PortableDeviceTypes.dll
d:\windows\system32\PortableDeviceApi.dll
.
Completion time: 2011-11-10 16:40:53
ComboFix-quarantined-files.txt 2011-11-10 21:40
ComboFix2.txt 2011-11-10 16:37
.
Pre-Run: 34,161,836,032 bytes free
Post-Run: 34,146,381,824 bytes free
.
- - End Of File - - 78EC1B3790459F4988C4BC4A99B9AF4E

Edited by David Billo, 10 November 2011 - 05:05 PM.


#6 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:03:59 AM

Posted 10 November 2011 - 05:14 PM

Hello

Please do the following:

Step One
Please download Junction.zip and save it to your desktop.
Unzip it and extract junction.exe to your C:\ drive.

Step Two
Now copy (Ctrl +C) and paste (Ctrl +V) the text inside the code box below into Notepad.

@ECHO OFF
cd c:\
junction -s c:\>log.txt
start log.txt
del %0
Save it to your desktop as File name: junc.bat
Save as type: All Files

Step Three
Double click junc.bat to run it. A log will be presented. Copy and paste or attach the content of the log in your next reply.

Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#7 David Billo

David Billo
  • Topic Starter

  • Members
  • 37 posts
  • OFFLINE
  •  
  • Local time:03:59 AM

Posted 10 November 2011 - 05:22 PM

Junction v1.06 - Windows junction creator and reparse point viewer
Copyright © 2000-2010 Mark Russinovich
Sysinternals - www.sysinternals.com


Failed to open \\?\c:\\System Volume Information: Access is denied.


...

...

...

...

...No reparse points found.

#8 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:03:59 AM

Posted 10 November 2011 - 06:06 PM

These logs are looking alot better. But we still have some work to do.

Please print out these instructions, or copy them to a Notepad file. It will make it easier for you to follow the instructions and complete all of the necessary steps..

uninstall some programs

1. click on start
2. then go to settings
3. after that you need control panel
4. look for the icon add/remove programs
click on the following programs

Adobe Reader 7.0

and click on remove

Update Adobe Reader

Recently there have been vunerabilities detected in older versions of Adobe Reader. It is strongly suggested that you update to the current version.

You can download it from http://www.adobe.com/products/acrobat/readstep2.html
After installing the latest Adobe Reader, uninstall all previous versions.
If you already have Adobe Photoshop® Album Starter Edition installed or do not wish to have it installed UNcheck the box which says Also Download Adobe Photoshop® Album Starter Edition.

If you don't like Adobe Reader (53 MB), you can download Foxit PDF Reader(7 MB) from here. It's a much smaller file to download and uses a lot less resources than Adobe Reader.

Note: When installing FoxitReader, be carefull not to install anything to do with AskBar.
[/list]

TFC(Temp File Cleaner):

  • Please download TFC to your desktop,
  • Save any unsaved work. TFC will close all open application windows.
  • Double-click TFC.exe to run the program.
  • If prompted, click "Yes" to reboot.
Note: Save your work. TFC will automatically close any open programs, let it run uninterrupted. It shouldn't take longer take a couple of minutes, and may only take a few seconds. Only if needed will you be prompted to reboot.

: Malwarebytes' Anti-Malware :

  • I would like you to rerun MBAM
  • Double-click mbam icon
  • go to the update tab at the top
  • click on check for updates
  • If an update is found, it will download and install the latest version.
  • Once the program has loaded, select Perform quick scan, then click Scan.
  • When the scan is complete, click OK, then Show Results to view the results.
  • Be sure that everything is Checked (ticked) except items in the C:\System Volume Information folder and click on Remove Selected.
  • When completed, a log will open in Notepad. please copy and paste the log into your next reply
  • If you accidently close it, the log file is saved here and will be named like this:
  • C:\Documents and Settings\Username\Application Data\Malwarebytes\Malwarebytes' Anti-Malware\Logs\mbam-log-date (time).txt

Note: If MBAM encounters a file that is difficult to remove, you will be presented with 1 of 2 prompts.
Click OK to either and let MBAM proceed with the disinfection process.
If asked to restart the computer, please do so immediately. Failure to reboot will prevent MBAM from removing all the malware.


Download HijackThis

  • Go Here to download HijackThis Installer
  • Save HijackThis Installer to your desktop.
  • Double-click on the HijackThis Installer icon on your desktop. (Vista and Win 7 right click and run as admin)
  • By default it will install to C:\Program Files\Trend Micro\HijackThis .
  • Click on Install.
  • It will create a HijackThis icon on the desktop.
  • Once installed it will launch Hijackthis.
  • Click on the Do a system scan and save a logfile button. It will scan and the log should open in notepad.
  • Click on Edit > Select All then click on Edit > Copy to copy the entire contents of the log.
  • Come back here to this thread and Paste the log in your next reply.
  • DO NOT use the AnalyseThis button its findings are dangerous if misinterpreted.
  • DO NOT have Hijackthis fix anything yet. Most of what it finds will be harmless or even required.

If you have problems running Hijackthis.

sometimes we have to run it like this To run HijackThis as an administrator,
rightclick HijackThis.exe (located: C:\Program Files\Trend Micro\HiJackThis\HiJackThis.exe)
and select to run as administrator

"information and logs"

  • In your next post I need the following

  • Log From MBAM
  • report from Hijackthis
  • let me know of any problems you may have had
  • How is the computer doing now?

Gringo

I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#9 David Billo

David Billo
  • Topic Starter

  • Members
  • 37 posts
  • OFFLINE
  •  
  • Local time:03:59 AM

Posted 10 November 2011 - 07:07 PM

Uninstalled Adobe Reader 7.0 and updated to X.
Ran TFC

Could not run MBAM as it seemed to be pooched by rootkit, so reinstalled, updated, and ran the quick scan. There was no "Show Results" button to press...only "Main Menu", "Purchase", and "Register". Report log was clean, however, and is pasted below:

Malwarebytes' Anti-Malware 1.51.2.1300
www.malwarebytes.org

Database version: 8135

Windows 5.1.2600 Service Pack 3
Internet Explorer 8.0.6001.18702

11/10/2011 6:40:48 PM
mbam-log-2011-11-10 (18-40-48).txt

Scan type: Quick scan
Objects scanned: 167516
Time elapsed: 1 minute(s), 50 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 0

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
(No malicious items detected)

Similarly, I could not update or install HiJackThis to the default location D:Program Files\...
Error message was "The Installer has insufficient priveleges to modify this file: D:\Program Files\Trend Micro\HiJackThis\HiJackThis.exe." Didn't work running as Administrator either, so installed to C:\Program Files\... just fine and ran it there:

Logfile of Trend Micro HijackThis v2.0.4
Scan saved at 6:53:35 PM, on 11/10/2011
Platform: Windows XP SP3 (WinNT 5.01.2600)
MSIE: Internet Explorer v8.00 (8.00.6001.18702)
Boot mode: Normal

Running processes:
D:\WINDOWS\System32\smss.exe
D:\WINDOWS\system32\winlogon.exe
D:\WINDOWS\system32\services.exe
D:\WINDOWS\system32\lsass.exe
D:\WINDOWS\system32\svchost.exe
D:\WINDOWS\System32\svchost.exe
D:\WINDOWS\system32\spoolsv.exe
D:\WINDOWS\Explorer.EXE
D:\WINDOWS\RTHDCPL.EXE
D:\WINDOWS\SOUNDMAN.EXE
D:\WINDOWS\system32\RUNDLL32.EXE
D:\Program Files\Microsoft IntelliType Pro\itype.exe
D:\WINDOWS\Logi_MwX.Exe
D:\Program Files\Common Files\Java\Java Update\jusched.exe
D:\Program Files\Microsoft IntelliType Pro\dpupdchk.exe
D:\Program Files\GEEK SQUAD UPS\pppeuser.exe
D:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe
D:\Program Files\Windows Live\Messenger\msnmsgr.exe
D:\WINDOWS\system32\ctfmon.exe
D:\Program Files\Logitech\SetPoint\SetPoint.exe
D:\Program Files\Common Files\Logishrd\KHAL2\KHALMNPR.EXE
D:\WINDOWS\system32\crypserv.exe
D:\Program Files\GIGABYTE\EnergySaver\GSvr.exe
D:\Program Files\Java\jre6\bin\jqs.exe
D:\Program Files\NVIDIA Corporation\Performance Drivers\nvPDsvc.exe
D:\WINDOWS\system32\nvsvc32.exe
D:\Program Files\GEEK SQUAD UPS\ppped.exe
D:\WINDOWS\system32\svchost.exe
D:\Program Files\Windows Live\Contacts\wlcomm.exe
D:\WINDOWS\System32\svchost.exe
D:\Program Files\Internet Explorer\iexplore.exe
D:\Program Files\Internet Explorer\iexplore.exe
D:\WINDOWS\system32\msiexec.exe
C:\Program Files\Trend Micro\HiJackThis\HiJackThis.exe

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.google.ca/ig?hl=en&source=iglk
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
R3 - URLSearchHook: DeviceVM Url Search Hook - {0063BF63-BFFF-4B8F-9D26-4267DF7F17DD} - D:\WINDOWS\system32\dvmurl.dll
R3 - URLSearchHook: (no name) - {472734EA-242A-422b-ADF8-83D1E48CC825} - (no file)
O2 - BHO: AcroIEHelperStub - {18DF081C-E8AD-4283-A596-FA578C2EBDC3} - D:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelperShim.dll
O2 - BHO: Trend Micro NSC BHO - {1CA1377B-DC1D-4A52-9585-6E06050FAC53} - D:\Program Files\Trend Micro\AMSP\Module\20004\1.5.1504\6.6.1088\TmIEPlg.dll
O2 - BHO: (no name) - {5C255C8A-E604-49b4-9D64-90988571CECB} - (no file)
O2 - BHO: Windows Live Sign-in Helper - {9030D464-4C02-4ABF-8ECC-5164760863C6} - D:\Program Files\Common Files\Microsoft Shared\Windows Live\WindowsLiveLogin.dll
O2 - BHO: Google Toolbar Helper - {AA58ED58-01DD-4d91-8333-CF10577473F7} - D:\Program Files\Google\Google Toolbar\GoogleToolbar_32.dll
O2 - BHO: Google Toolbar Notifier BHO - {AF69DE43-7D58-4638-B6FA-CE66B5AD205D} - D:\Program Files\Google\GoogleToolbarNotifier\5.7.6406.1642\swg.dll
O2 - BHO: TmBpIeBHO - {BBACBAFD-FA5E-4079-8B33-00EB9F13D4AC} - D:\Program Files\Trend Micro\AMSP\Module\20002\6.6.1010\6.6.1010\TmBpIe32.dll
O2 - BHO: Java™ Plug-In 2 SSV Helper - {DBC80044-A445-435b-BC74-9C25C1C588A9} - D:\Program Files\Java\jre6\bin\jp2ssv.dll
O2 - BHO: JQSIEStartDetectorImpl - {E7E6F031-17CE-4C07-BC86-EABFE594F69C} - D:\Program Files\Java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll
O3 - Toolbar: Google Toolbar - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - D:\Program Files\Google\Google Toolbar\GoogleToolbar_32.dll
O4 - HKLM\..\Run: [RTHDCPL] RTHDCPL.EXE
O4 - HKLM\..\Run: [SoundMan] SOUNDMAN.EXE
O4 - HKLM\..\Run: [AlcWzrd] ALCWZRD.EXE
O4 - HKLM\..\Run: [GEST] =
O4 - HKLM\..\Run: [JMB36X IDE Setup] D:\WINDOWS\RaidTool\xInsIDE.exe
O4 - HKLM\..\Run: [36X Raid Configurer] D:\WINDOWS\system32\xRaidSetup.exe boot
O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE D:\WINDOWS\system32\NvCpl.dll,NvStartup
O4 - HKLM\..\Run: [nwiz] nwiz.exe /install
O4 - HKLM\..\Run: [NvMediaCenter] RUNDLL32.EXE D:\WINDOWS\system32\NvMcTray.dll,NvTaskbarInit
O4 - HKLM\..\Run: [NeroFilterCheck] D:\Program Files\Common Files\Ahead\Lib\NeroCheck.exe
O4 - HKLM\..\Run: [itype] "D:\Program Files\Microsoft IntelliType Pro\itype.exe"
O4 - HKLM\..\Run: [Kernel and Hardware Abstraction Layer] KHALMNPR.EXE
O4 - HKLM\..\Run: [Logitech Hardware Abstraction Layer] KHALMNPR.EXE
O4 - HKLM\..\Run: [Logitech Utility] Logi_MwX.Exe
O4 - HKLM\..\Run: [Trend Micro Titanium] "D:\Program Files\Trend Micro\Titanium\UIFramework\uiWinMgr.exe" -set Silent "1" SplashURL ""
O4 - HKLM\..\Run: [Trend Micro Client Framework] "D:\Program Files\Trend Micro\UniClient\UiFrmWrk\UIWatchDog.exe"
O4 - HKLM\..\Run: [SunJavaUpdateSched] "D:\Program Files\Common Files\Java\Java Update\jusched.exe"
O4 - HKLM\..\Run: [WinPatrol] D:\Program Files\BillP Studios\WinPatrol\winpatrol.exe -expressboot
O4 - HKLM\..\Run: [Adobe ARM] "D:\Program Files\Common Files\Adobe\ARM\1.0\AdobeARM.exe"
O4 - HKLM\..\RunOnce: [Malwarebytes' Anti-Malware] D:\Program Files\Malwarebytes' Anti-Malware\mbamgui.exe /install /silent
O4 - HKCU\..\Run: [PowerPanel Personal Edition User Interaction] "D:\Program Files\GEEK SQUAD UPS\pppeuser.exe"
O4 - HKCU\..\Run: [swg] "D:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe"
O4 - HKCU\..\Run: [msnmsgr] "D:\Program Files\Windows Live\Messenger\msnmsgr.exe" /background
O4 - HKCU\..\Run: [ctfmon.exe] D:\WINDOWS\system32\ctfmon.exe
O4 - Startup: Product Registration.lnk = D:\Program Files\Common Files\LogiShared\eReg\SetPoint\eReg.exe
O4 - Global Startup: Logitech SetPoint.lnk = D:\Program Files\Logitech\SetPoint\SetPoint.exe
O4 - Global Startup: Microsoft Office.lnk = D:\Program Files\Microsoft Office\Office10\OSA.EXE
O8 - Extra context menu item: E&xport to Microsoft Excel - res://D:\PROGRA~1\MICROS~3\Office10\EXCEL.EXE/3000
O8 - Extra context menu item: Google Sidewiki... - res://D:\Program Files\Google\Google Toolbar\Component\GoogleToolbarDynamic_mui_en_E11712C84EA7E12B.dll/cmsidewiki.html
O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - D:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - D:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - D:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - D:\Program Files\Messenger\msmsgs.exe
O16 - DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} (Shockwave Flash Object) - http://fpdownload2.macromedia.com/get/shockwave/cabs/flash/swflash.cab
O16 - DPF: {E2883E8F-472F-4FB0-9522-AC9BF37916A7} - http://platformdl.adobe.com/NOS/getPlusPlus/1.6/gp.cab
O18 - Protocol: tmbp - {1A77E7DC-C9A0-4110-8A37-2F36BAE71ECF} - D:\Program Files\Trend Micro\AMSP\Module\20002\6.6.1010\6.6.1010\TmBpIe32.dll
O18 - Protocol: tmpx - {0E526CB5-7446-41D1-A403-19BFE95E8C23} - D:\Program Files\Trend Micro\AMSP\Module\20004\1.5.1504\6.6.1088\TmIEPlg.dll
O22 - SharedTaskScheduler: Browseui preloader - {438755C2-A8BA-11D1-B96B-00A0C90312E1} - D:\WINDOWS\system32\browseui.dll
O22 - SharedTaskScheduler: Component Categories cache daemon - {8C7461EF-2B13-11d2-BE35-3078302C2030} - D:\WINDOWS\system32\browseui.dll
O23 - Service: Trend Micro Solution Platform (Amsp) - Unknown owner - D:\Program Files\Trend Micro\AMSP\coreServiceShell.exe
O23 - Service: Crypkey License - CrypKey (Canada) Ltd. - D:\WINDOWS\SYSTEM32\crypserv.exe
O23 - Service: GEST Service for program management. (GEST Service) - Unknown owner - D:\Program Files\GIGABYTE\EnergySaver\GSvr.exe
O23 - Service: Google Update Service (gupdate) (gupdate) - Google Inc. - D:\Program Files\Google\Update\GoogleUpdate.exe
O23 - Service: Google Update Service (gupdatem) (gupdatem) - Google Inc. - D:\Program Files\Google\Update\GoogleUpdate.exe
O23 - Service: Google Software Updater (gusvc) - Google - D:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
O23 - Service: Java Quick Starter (JavaQuickStarterService) - Sun Microsystems, Inc. - D:\Program Files\Java\jre6\bin\jqs.exe
O23 - Service: Logitech Bluetooth Service (LBTServ) - Logitech, Inc. - D:\Program Files\Common Files\Logitech\Bluetooth\LBTServ.exe
O23 - Service: NMIndexingService - Nero AG - D:\Program Files\Common Files\Ahead\Lib\NMIndexingService.exe
O23 - Service: NVIDIA Performance Driver Service - Unknown owner - D:\Program Files\NVIDIA Corporation\Performance Drivers\nvPDsvc.exe
O23 - Service: NVIDIA Display Driver Service (NVSvc) - NVIDIA Corporation - D:\WINDOWS\system32\nvsvc32.exe
O23 - Service: GEEK SQUAD POWER MANAGEMENT Service (ppped) - Unknown owner - D:\Program Files\GEEK SQUAD UPS\ppped.exe

--
End of file - 9059 bytes

I should point out that XP is installed on D: and there is a copy of Win2K on C: which I never use.

Still no Trend Micro icon in tray, can't run Nero or burn disks.

#10 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:03:59 AM

Posted 10 November 2011 - 08:48 PM

Hello

Please do the following:

Step One
Please download Junction.zip and save it to your desktop.
Unzip it and extract junction.exe to your C:\ drive.

Step Two
Now copy (Ctrl +C) and paste (Ctrl +V) the text inside the code box below into Notepad.

@ECHO OFF
cd c:\
junction -s c:\>log.txt
start log.txt
del %0
Save it to your desktop as File name: junc.bat
Save as type: All Files

Step Three
Double click junc.bat to run it. A log will be presented. Copy and paste or attach the content of the log in your next reply.

Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#11 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:03:59 AM

Posted 13 November 2011 - 01:43 AM

Hello

48 Hour bump

It has been more than 48 hours since my last post.

  • do you still need help with this?
  • do you need more time?
  • are you having problems following my instructions?
  • if after 48hrs you have not replied to this thread then it will have to be closed!

Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#12 David Billo

David Billo
  • Topic Starter

  • Members
  • 37 posts
  • OFFLINE
  •  
  • Local time:03:59 AM

Posted 13 November 2011 - 07:40 PM

Sorry, Gringo! I've been out of town over the weekend and didn't catch that reply. I'll run Junction first thing Monday.

#13 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:03:59 AM

Posted 13 November 2011 - 08:34 PM

No problem and thanks for letting me know


gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#14 David Billo

David Billo
  • Topic Starter

  • Members
  • 37 posts
  • OFFLINE
  •  
  • Local time:03:59 AM

Posted 14 November 2011 - 11:53 AM

Running junction.exe this time, I realized that I didn't follow your instructions exactly the first time you had me run it...I had extracted it to my desktop, rather than the root of C:. This time, did it as instructed, and the resulting log.txt file is completely blank...nothing whatsoever to copy and paste here. Is that what is supposed to happen?

#15 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:03:59 AM

Posted 14 November 2011 - 01:14 PM

Hello

1. make sure junction.exe is on the C drive

2.click on start

3. click on run

4. type CMD into the run box and click on OK

5. copy and paste thes line into the CMD window


cd c:\
junction -s c:\>log.txt
start log.txt

6. wait about 5 min untill the report popsup

7.copy and paste this report here

gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users