Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Netbt.sys and repeated popups and redirects


  • This topic is locked This topic is locked
29 replies to this topic

#1 Need some help

Need some help

  • Members
  • 15 posts
  • OFFLINE
  •  
  • Local time:02:43 PM

Posted 19 December 2011 - 03:17 PM

Thanks in advance for any help you can provide.

I am trying to repair a laptop running Windows XP SP3. The computer has been running very slowly in addition to everytime I get onto the internet, it is redirected to another random site. Often, I also get a pop up to go along with the redirect. I've run Trend Micro Titanium antivirus and anti spyware tools, it has found and removed multiple viruses and malware threats. Additionally, I've run MalwareBytes, Spybot S&D, AdAware, HJT, and others (obviously not all simultaneously). I've tried running all those in safe mode, and I've had slight success. The browser is not hijacked very often anymore, but I still get those popups and the occasional redirect.

Here is the DDS log:

.
DDS (Ver_2011-08-26.01) - NTFSx86
Internet Explorer: 8.0.6001.18702
Run by Owner at 14:49:34 on 2011-12-19
.
============== Running Processes ===============
.
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe
C:\Program Files\hpq\HP Wireless Assistant\HP Wireless Assistant.exe
C:\Program Files\Hewlett-Packard\HP Quick Launch Buttons\QlbCtrl.exe
C:\Program Files\Common Files\Java\Java Update\jusched.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Trend Micro\AMSP\coreServiceShell.exe
C:\Program Files\Trend Micro\UniClient\UiFrmWrk\uiWatchDog.exe
C:\Program Files\Java\jre6\bin\jqs.exe
C:\Program Files\Trend Micro\AMSP\coreFrameworkHost.exe
C:\Program Files\Hewlett-Packard\Shared\hpqwmiex.exe
C:\WINDOWS\system32\wbem\wmiprvse.exe
C:\WINDOWS\System32\alg.exe
C:\PROGRA~1\hpq\Shared\HPQTOA~1.EXE
C:\WINDOWS\system32\NOTEPAD.EXE
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Lavasoft\Ad-Aware\AAWService.exe
C:\WINDOWS\System32\wbem\unsecapp.exe
C:\Program Files\Lavasoft\Ad-Aware\AAWTray.exe
C:\WINDOWS\System32\ping.exe
C:\Program Files\Lavasoft\Ad-Aware\Ad-Aware.exe
C:\WINDOWS\system32\taskmgr.exe
C:\Documents and Settings\Owner\Desktop\dds.scr
C:\WINDOWS\system32\wbem\wmiprvse.exe
C:\WINDOWS\System32\svchost.exe -k netsvcs
C:\WINDOWS\System32\svchost.exe -k NetworkService
C:\WINDOWS\System32\svchost.exe -k LocalService
C:\WINDOWS\System32\svchost.exe -k LocalService
.
============== Pseudo HJT Report ===============
.
uWindow Title = Internet Explorer, optimized for Bing and MSN
BHO: TmIEPlugInBHO Class: {1ca1377b-dc1d-4a52-9585-6e06050fac53} - c:\program files\trend micro\amsp\module\20004\2.0.1313\6.8.1072\TmIEPlg.dll
BHO: TSToolbarBHO: {43c6d902-a1c5-45c9-91f6-fd9e90337e18} - c:\program files\trend micro\titanium\uiframework\ToolbarIE.dll
BHO: TmBpIeBHO Class: {bbacbafd-fa5e-4079-8b33-00eb9f13d4ac} - c:\program files\trend micro\amsp\module\20002\7.0.1086\7.0.1086\TmBpIe32.dll
BHO: Java™ Plug-In 2 SSV Helper: {dbc80044-a445-435b-bc74-9c25c1c588a9} - c:\program files\java\jre6\bin\jp2ssv.dll
BHO: JQSIEStartDetectorImpl Class: {e7e6f031-17ce-4c07-bc86-eabfe594f69c} - c:\program files\java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll
TB: Trend Micro Toolbar: {ccac5586-44d7-4c43-b64a-f042461a97d2} - c:\program files\trend micro\titanium\uiframework\ToolbarIE.dll
EB: {32683183-48a0-441b-a342-7c2a440a9478} - No File
uRun: [ctfmon.exe] c:\windows\system32\ctfmon.exe
uRun: [MSMSGS] "c:\program files\messenger\msmsgs.exe" /background
mRun: [ATIPTA] "c:\program files\ati technologies\ati control panel\atiptaxx.exe"
mRun: [hpWirelessAssistant] c:\program files\hpq\hp wireless assistant\HP Wireless Assistant.exe
mRun: [QlbCtrl.exe] c:\program files\hewlett-packard\hp quick launch buttons\QlbCtrl.exe /Start
mRun: [SunJavaUpdateSched] "c:\program files\common files\java\java update\jusched.exe"
mRun: [Trend Micro Client Framework] "c:\program files\trend micro\uniclient\uifrmwrk\UIWatchDog.exe"
mRun: [Trend Micro Titanium] "c:\program files\trend micro\titanium\uiframework\uiWinMgr.exe" -set Silent "1" SplashURL ""
IE: {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe
IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe
LSP: mswsock.dll
DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_21-windows-i586.cab
DPF: {CAFEEFAC-0016-0000-0021-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_21-windows-i586.cab
DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_21-windows-i586.cab
DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} - hxxp://download.macromedia.com/pub/shockwave/cabs/flash/swflash.cab
TCP: Interfaces\{AECF9AE3-35A1-47B8-9B4A-73E1CE0931AD} : DhcpNameServer = 192.168.1.1
Handler: tmbp - {1A77E7DC-C9A0-4110-8A37-2F36BAE71ECF} - c:\program files\trend micro\amsp\module\20002\7.0.1086\7.0.1086\TmBpIe32.dll
Handler: tmpx - {0E526CB5-7446-41D1-A403-19BFE95E8C23} - c:\program files\trend micro\amsp\module\20004\2.0.1313\6.8.1072\TmIEPlg.dll
Handler: tmtb - {04EAF3FB-4BAC-4B5A-A37D-A1CF210A5A42} - c:\program files\trend micro\titanium\uiframework\ToolbarIE.dll
Handler: tmtbim - {0B37915C-8B98-4B9E-80D4-464D2C830D10} - c:\program files\trend micro\titanium\uiframework\ProToolbarIMRatingActiveX.dll
Notify: AtiExtEvent - Ati2evxx.dll
SSODL: WPDShServiceObj - {AAA288BA-9A4C-45B0-95D7-94D524869DB5} - c:\windows\system32\WPDShServiceObj.dll
Hosts: 127.0.0.1 www.spywareinfo.com
.
============= SERVICES / DRIVERS ===============
.
R? Amsp;Trend Micro Solution Platform
S? HSFHWATI;HSFHWATI
S? Lavasoft Ad-Aware Service;Lavasoft Ad-Aware Service
S? Lbd;Lbd
S? tmeext;tmeext
S? tmevtmgr;tmevtmgr
S? tmnciesc;tmnciesc
.
=============== Created Last 30 ================
.
2011-12-19 14:34:27 101720 ----a-w- c:\windows\system32\drivers\SBREDrv.sys
2011-12-19 14:15:29 64512 ----a-w- c:\windows\system32\drivers\Lbd.sys
2011-12-19 14:14:25 -------- d-----w- c:\program files\Lavasoft
2011-12-19 14:00:32 388096 ----a-r- c:\documents and settings\owner\application data\microsoft\installer\{45a66726-69bc-466b-a7a4-12fcba4883d7}\HiJackThis.exe
2011-12-19 13:43:01 -------- d-----w- c:\windows\pss
2011-12-19 01:28:13 22032 ----a-w- c:\windows\DCEBoot.exe
2011-12-19 00:59:10 84752 ----a-w- c:\windows\system32\drivers\tmeext.sys
2011-12-19 00:59:05 171280 ----a-w- c:\windows\system32\drivers\tmnciesc.sys
2011-12-19 00:58:58 92432 ----a-w- c:\windows\system32\drivers\tmtdi.sys
2011-12-19 00:58:30 81168 ----a-w- c:\windows\system32\drivers\tmactmon.sys
2011-12-19 00:58:30 68368 ----a-w- c:\windows\system32\drivers\tmevtmgr.sys
2011-12-19 00:58:30 205072 ----a-w- c:\windows\system32\drivers\tmcomm.sys
2011-12-18 22:23:44 -------- d-----w- c:\windows\system32\appmgmt
2011-12-18 00:38:30 -------- d-----w- c:\documents and settings\all users\application data\Spybot - Search & Destroy
2011-12-18 00:29:49 -------- d-----w- c:\program files\CCleaner
2011-12-18 00:26:58 -------- d-----w- c:\documents and settings\owner\local settings\application data\ConsumerSoft
2011-12-18 00:13:53 -------- d-----w- c:\documents and settings\owner\application data\GlarySoft
2011-12-18 00:10:09 -------- d-----w- c:\program files\Glary Utilities
2011-12-16 18:40:25 -------- d--h--w- c:\windows\system32\GroupPolicy
2011-12-16 18:35:43 -------- d-----w- C:\System Repair Programs
2011-12-15 23:39:13 102400 ----a-w- c:\windows\RegBootClean.exe
.
==================== Find3M ====================
.
2011-12-19 00:45:04 56 ----a-w- c:\windows\system32\SupportTool.exe.bat
2011-11-23 13:25:32 1859584 ----a-w- c:\windows\system32\win32k.sys
2011-11-04 19:20:51 916992 ----a-w- c:\windows\system32\wininet.dll
2011-11-04 19:20:51 43520 ----a-w- c:\windows\system32\licmgr10.dll
2011-11-04 19:20:51 1469440 ----a-w- c:\windows\system32\inetcpl.cpl
2011-11-04 11:23:59 385024 ----a-w- c:\windows\system32\html.iec
2011-11-01 16:07:10 1288704 ----a-w- c:\windows\system32\ole32.dll
2011-10-28 05:31:48 33280 ----a-w- c:\windows\system32\csrsrv.dll
2011-10-25 13:33:08 2192768 ----a-w- c:\windows\system32\ntoskrnl.exe
2011-10-25 12:52:03 2069376 ----a-w- c:\windows\system32\ntkrnlpa.exe
2011-10-18 17:42:04 73728 ----a-w- c:\windows\system32\javacpl.cpl
2011-10-18 17:42:00 423656 ----a-w- c:\windows\system32\deployJava1.dll
2011-10-18 11:13:22 186880 ----a-w- c:\windows\system32\encdec.dll
2011-10-13 19:28:23 414368 ----a-w- c:\windows\system32\FlashPlayerCPLApp.cpl
2011-10-10 14:22:41 692736 ----a-w- c:\windows\system32\inetcomm.dll
2011-09-28 07:06:50 599040 ----a-w- c:\windows\system32\crypt32.dll
2011-09-26 15:41:20 611328 ------w- c:\windows\system32\uiautomationcore.dll
2011-09-26 15:41:20 220160 ----a-w- c:\windows\system32\oleacc.dll
2011-09-26 15:41:14 20480 ----a-w- c:\windows\system32\oleaccrc.dll
.
============= FINISH: 14:52:10.87 ===============

Attached Files

  • Attached File  ark.txt   19.33KB   2 downloads


BC AdBot (Login to Remove)

 


#2 CatByte

CatByte

    bleepin' tiger


  • Malware Response Team
  • 14,664 posts
  • OFFLINE
  •  
  • Gender:Not Telling
  • Location:Canada
  • Local time:03:43 PM

Posted 21 December 2011 - 07:26 PM

Hi,

Please do the following:

Please download TDSSKiller.zip
  • Extract it to your desktop
  • Double click TDSSKiller.exe
  • Press Start Scan
    • Only if Malicious objects are found then ensure Cure is selected
    • Then click Continue > Reboot now
  • Copy and paste the log in your next reply
    • A copy of the log will be saved automatically to the root of the drive (typically C:\)


NEXT



Download ComboFix from one of the following locations:
Link 1
Link 2

VERY IMPORTANT !!! Save ComboFix.exe to your Desktop

* IMPORTANT - Disable your AntiVirus and AntiSpyware applications, usually via a right click on the System Tray icon. They may otherwise interfere with our tools. If you have difficulty properly disabling your protective programs, refer to this link here
  • Double click on ComboFix.exe & follow the prompts.
As part of it's process, ComboFix will check to see if the Microsoft Windows Recovery Console is installed. With malware infections being as they are today, it's strongly recommended to have this pre-installed on your machine before doing any malware removal. It will allow you to boot up into a special recovery/repair mode that will allow us to more easily help you should your computer have a problem after an attempted removal of malware.

  • Follow the prompts to allow ComboFix to download and install the Microsoft Windows Recovery Console, and when prompted, agree to the End-User License Agreement to install the Microsoft Windows Recovery Console.
**Please note: If the Microsoft Windows Recovery Console is already installed, ComboFix will continue it's malware removal procedures.

Posted Image

  • Once the Microsoft Windows Recovery Console is installed using ComboFix, you should see the following message:

Posted Image

  • Click on Yes, to continue scanning for malware.
When finished, it shall produce a log for you. Please include the C:\ComboFix.txt in your next reply.
Notes:
1. Do not mouse-click Combofix's window while it is running. That may cause it to stall.
2. Do not "re-run" Combofix. If you have a problem, reply back for further instructions.

Microsoft MVP - 2010, 2011, 2012, 2013, 2014, 2015


#3 Need some help

Need some help
  • Topic Starter

  • Members
  • 15 posts
  • OFFLINE
  •  
  • Local time:02:43 PM

Posted 22 December 2011 - 01:11 PM

I apparently am infected with Rootkit.ZeroAccess and am now not able to connect to the internet, so I was not able to download Windows Recovery Console, but I do have the XP CD, so I can access it there. I could be wrong, but I am assuming that this is a new infection because I have been able to connect to the internet before today, even after multiple reboots.

What (beyond the obvious) should I tell the computer's owner to do (or not to do) to avoid future infections of this kind?

Here are the logs:

TDSSKiller:

08:12:32.0531 0536 TDSS rootkit removing tool 2.6.23.0 Dec 13 2011 10:39:31
08:12:34.0562 0536 ============================================================
08:12:34.0562 0536 Current date / time: 2011/12/22 08:12:34.0562
08:12:34.0562 0536 SystemInfo:
08:12:34.0593 0536
08:12:34.0593 0536 OS Version: 5.1.2600 ServicePack: 3.0
08:12:34.0593 0536 Product type: Workstation
08:12:34.0593 0536 ComputerName: ROGER
08:12:34.0593 0536 UserName: Owner
08:12:34.0593 0536 Windows directory: C:\WINDOWS
08:12:34.0593 0536 System windows directory: C:\WINDOWS
08:12:34.0593 0536 Processor architecture: Intel x86
08:12:34.0593 0536 Number of processors: 1
08:12:34.0593 0536 Page size: 0x1000
08:12:34.0593 0536 Boot type: Normal boot
08:12:34.0593 0536 ============================================================
08:12:36.0828 0536 Initialize success
08:12:41.0343 1184 ============================================================
08:12:41.0343 1184 Scan started
08:12:41.0343 1184 Mode: Manual;
08:12:41.0343 1184 ============================================================
08:12:42.0484 1184 Abiosdsk - ok
08:12:42.0500 1184 abp480n5 - ok
08:12:42.0578 1184 ACPI (8fd99680a539792a30e97944fdaecf17) C:\WINDOWS\system32\DRIVERS\ACPI.sys
08:12:42.0578 1184 ACPI - ok
08:12:42.0625 1184 ACPIEC (9859c0f6936e723e4892d7141b1327d5) C:\WINDOWS\system32\DRIVERS\ACPIEC.sys
08:12:42.0625 1184 ACPIEC - ok
08:12:42.0640 1184 adpu160m - ok
08:12:42.0687 1184 aec (8bed39e3c35d6a489438b8141717a557) C:\WINDOWS\system32\drivers\aec.sys
08:12:42.0687 1184 aec - ok
08:12:42.0750 1184 AFD (1e44bc1e83d8fd2305f8d452db109cf9) C:\WINDOWS\System32\drivers\afd.sys
08:12:42.0750 1184 AFD - ok
08:12:42.0765 1184 Aha154x - ok
08:12:42.0781 1184 aic78u2 - ok
08:12:42.0812 1184 aic78xx - ok
08:12:42.0828 1184 AliIde - ok
08:12:42.0859 1184 amsint - ok
08:12:42.0890 1184 Arp1394 (b5b8a80875c1dededa8b02765642c32f) C:\WINDOWS\system32\DRIVERS\arp1394.sys
08:12:42.0890 1184 Arp1394 - ok
08:12:42.0906 1184 asc - ok
08:12:42.0921 1184 asc3350p - ok
08:12:42.0937 1184 asc3550 - ok
08:12:42.0984 1184 AsyncMac (b153affac761e7f5fcfa822b9c4e97bc) C:\WINDOWS\system32\DRIVERS\asyncmac.sys
08:12:42.0984 1184 AsyncMac - ok
08:12:43.0000 1184 atapi (9f3a2f5aa6875c72bf062c712cfa2674) C:\WINDOWS\system32\DRIVERS\atapi.sys
08:12:43.0000 1184 atapi - ok
08:12:43.0046 1184 Atdisk - ok
08:12:43.0218 1184 ati2mtag (d81980c64543ba5c39dd2a92dc1d2daf) C:\WINDOWS\system32\DRIVERS\ati2mtag.sys
08:12:43.0234 1184 ati2mtag - ok
08:12:43.0421 1184 Atmarpc (9916c1225104ba14794209cfa8012159) C:\WINDOWS\system32\DRIVERS\atmarpc.sys
08:12:43.0421 1184 Atmarpc - ok
08:12:43.0484 1184 audstub (d9f724aa26c010a217c97606b160ed68) C:\WINDOWS\system32\DRIVERS\audstub.sys
08:12:43.0484 1184 audstub - ok
08:12:43.0531 1184 BCM43XX (114234fafec7060392195170e1c4d45e) C:\WINDOWS\system32\DRIVERS\bcmwl5.sys
08:12:43.0546 1184 BCM43XX - ok
08:12:43.0593 1184 Beep (da1f27d85e0d1525f6621372e7b685e9) C:\WINDOWS\system32\drivers\Beep.sys
08:12:43.0593 1184 Beep - ok
08:12:43.0687 1184 CAMCAUD (c2ef37f09cfee9665e6cd7c0b0afb84f) C:\WINDOWS\system32\drivers\camc6aud.sys
08:12:43.0687 1184 CAMCAUD - ok
08:12:43.0718 1184 CAMCHALA (512df898de5c0654647acd5c82f0bd99) C:\WINDOWS\system32\drivers\camc6hal.sys
08:12:43.0734 1184 CAMCHALA - ok
08:12:43.0781 1184 cbidf2k (90a673fc8e12a79afbed2576f6a7aaf9) C:\WINDOWS\system32\drivers\cbidf2k.sys
08:12:43.0781 1184 cbidf2k - ok
08:12:43.0796 1184 cd20xrnt - ok
08:12:43.0843 1184 Cdaudio (c1b486a7658353d33a10cc15211a873b) C:\WINDOWS\system32\drivers\Cdaudio.sys
08:12:43.0843 1184 Cdaudio - ok
08:12:44.0015 1184 Cdfs (c885b02847f5d2fd45a24e219ed93b32) C:\WINDOWS\system32\drivers\Cdfs.sys
08:12:44.0015 1184 Cdfs - ok
08:12:44.0046 1184 Cdrom (1f4260cc5b42272d71f79e570a27a4fe) C:\WINDOWS\system32\DRIVERS\cdrom.sys
08:12:44.0046 1184 Cdrom - ok
08:12:44.0062 1184 Changer - ok
08:12:44.0140 1184 CmBatt (0f6c187d38d98f8df904589a5f94d411) C:\WINDOWS\system32\DRIVERS\CmBatt.sys
08:12:44.0140 1184 CmBatt - ok
08:12:44.0156 1184 CmdIde - ok
08:12:44.0187 1184 Compbatt (6e4c9f21f0fae8940661144f41b13203) C:\WINDOWS\system32\DRIVERS\compbatt.sys
08:12:44.0187 1184 Compbatt - ok
08:12:44.0218 1184 Cpqarray - ok
08:12:44.0250 1184 dac2w2k - ok
08:12:44.0265 1184 dac960nt - ok
08:12:44.0312 1184 Disk (044452051f3e02e7963599fc8f4f3e25) C:\WINDOWS\system32\DRIVERS\disk.sys
08:12:44.0312 1184 Disk - ok
08:12:44.0375 1184 dmboot (d992fe1274bde0f84ad826acae022a41) C:\WINDOWS\system32\drivers\dmboot.sys
08:12:44.0390 1184 dmboot - ok
08:12:44.0437 1184 dmio (7c824cf7bbde77d95c08005717a95f6f) C:\WINDOWS\system32\drivers\dmio.sys
08:12:44.0437 1184 dmio - ok
08:12:44.0468 1184 dmload (e9317282a63ca4d188c0df5e09c6ac5f) C:\WINDOWS\system32\drivers\dmload.sys
08:12:44.0468 1184 dmload - ok
08:12:44.0515 1184 DMusic (8a208dfcf89792a484e76c40e5f50b45) C:\WINDOWS\system32\drivers\DMusic.sys
08:12:44.0515 1184 DMusic - ok
08:12:44.0687 1184 dpti2o - ok
08:12:44.0718 1184 drmkaud (8f5fcff8e8848afac920905fbd9d33c8) C:\WINDOWS\system32\drivers\drmkaud.sys
08:12:44.0718 1184 drmkaud - ok
08:12:44.0781 1184 Fastfat (38d332a6d56af32635675f132548343e) C:\WINDOWS\system32\drivers\Fastfat.sys
08:12:44.0781 1184 Fastfat - ok
08:12:44.0843 1184 Fdc (92cdd60b6730b9f50f6a1a0c1f8cdc81) C:\WINDOWS\system32\drivers\Fdc.sys
08:12:44.0843 1184 Fdc - ok
08:12:44.0875 1184 Fips (d45926117eb9fa946a6af572fbe1caa3) C:\WINDOWS\system32\drivers\Fips.sys
08:12:44.0875 1184 Fips - ok
08:12:44.0890 1184 Flpydisk (9d27e7b80bfcdf1cdd9b555862d5e7f0) C:\WINDOWS\system32\drivers\Flpydisk.sys
08:12:44.0890 1184 Flpydisk - ok
08:12:44.0921 1184 FltMgr (b2cf4b0786f8212cb92ed2b50c6db6b0) C:\WINDOWS\system32\drivers\fltmgr.sys
08:12:44.0921 1184 FltMgr - ok
08:12:44.0937 1184 Fs_Rec (3e1e2bd4f39b0e2b7dc4f4d2bcc2779a) C:\WINDOWS\system32\drivers\Fs_Rec.sys
08:12:44.0937 1184 Fs_Rec - ok
08:12:44.0953 1184 Ftdisk (6ac26732762483366c3969c9e4d2259d) C:\WINDOWS\system32\DRIVERS\ftdisk.sys
08:12:44.0968 1184 Ftdisk - ok
08:12:44.0984 1184 Gpc (0a02c63c8b144bd8c86b103dee7c86a2) C:\WINDOWS\system32\DRIVERS\msgpc.sys
08:12:44.0984 1184 Gpc - ok
08:12:45.0015 1184 hpn - ok
08:12:45.0093 1184 HSFHWATI (14794f142befc962ab142584607a6631) C:\WINDOWS\system32\DRIVERS\HSFHWATI.sys
08:12:45.0093 1184 HSFHWATI - ok
08:12:45.0250 1184 HSF_DPV (0e44af3828111d4c3e73c33ac95226d8) C:\WINDOWS\system32\DRIVERS\HSF_DPV.sys
08:12:45.0281 1184 HSF_DPV - ok
08:12:45.0484 1184 HTTP (f80a415ef82cd06ffaf0d971528ead38) C:\WINDOWS\system32\Drivers\HTTP.sys
08:12:45.0500 1184 HTTP - ok
08:12:45.0515 1184 i2omgmt - ok
08:12:45.0531 1184 i2omp - ok
08:12:45.0593 1184 i8042prt (4a0b06aa8943c1e332520f7440c0aa30) C:\WINDOWS\system32\DRIVERS\i8042prt.sys
08:12:45.0593 1184 i8042prt - ok
08:12:45.0625 1184 Imapi (083a052659f5310dd8b6a6cb05edcf8e) C:\WINDOWS\system32\DRIVERS\imapi.sys
08:12:45.0625 1184 Imapi - ok
08:12:45.0656 1184 ini910u - ok
08:12:45.0671 1184 IntelIde - ok
08:12:45.0718 1184 ip6fw (3bb22519a194418d5fec05d800a19ad0) C:\WINDOWS\system32\drivers\ip6fw.sys
08:12:45.0718 1184 ip6fw - ok
08:12:45.0750 1184 IpFilterDriver (731f22ba402ee4b62748adaf6363c182) C:\WINDOWS\system32\DRIVERS\ipfltdrv.sys
08:12:45.0765 1184 IpFilterDriver - ok
08:12:45.0796 1184 IpInIp (b87ab476dcf76e72010632b5550955f5) C:\WINDOWS\system32\DRIVERS\ipinip.sys
08:12:45.0796 1184 IpInIp - ok
08:12:45.0843 1184 IpNat (cc748ea12c6effde940ee98098bf96bb) C:\WINDOWS\system32\DRIVERS\ipnat.sys
08:12:45.0859 1184 IpNat - ok
08:12:46.0015 1184 IPSec (23c74d75e36e7158768dd63d92789a91) C:\WINDOWS\system32\DRIVERS\ipsec.sys
08:12:46.0015 1184 IPSec - ok
08:12:46.0046 1184 IRENUM (c93c9ff7b04d772627a3646d89f7bf89) C:\WINDOWS\system32\DRIVERS\irenum.sys
08:12:46.0046 1184 IRENUM - ok
08:12:46.0093 1184 isapnp (05a299ec56e52649b1cf2fc52d20f2d7) C:\WINDOWS\system32\DRIVERS\isapnp.sys
08:12:46.0093 1184 isapnp - ok
08:12:46.0187 1184 Kbdclass (463c1ec80cd17420a542b7f36a36f128) C:\WINDOWS\system32\DRIVERS\kbdclass.sys
08:12:46.0187 1184 Kbdclass - ok
08:12:46.0218 1184 kmixer (692bcf44383d056aed41b045a323d378) C:\WINDOWS\system32\drivers\kmixer.sys
08:12:46.0234 1184 kmixer - ok
08:12:46.0265 1184 KSecDD (b467646c54cc746128904e1654c750c1) C:\WINDOWS\system32\drivers\KSecDD.sys
08:12:46.0265 1184 KSecDD - ok
08:12:46.0312 1184 Lbd (336abe8721cbc3110f1c6426da633417) C:\WINDOWS\system32\DRIVERS\Lbd.sys
08:12:46.0328 1184 Lbd - ok
08:12:46.0343 1184 lbrtfdc - ok
08:12:46.0406 1184 mdmxsdk (3c318b9cd391371bed62126581ee9961) C:\WINDOWS\system32\DRIVERS\mdmxsdk.sys
08:12:46.0406 1184 mdmxsdk - ok
08:12:46.0437 1184 mnmdd (4ae068242760a1fb6e1a44bf4e16afa6) C:\WINDOWS\system32\drivers\mnmdd.sys
08:12:46.0437 1184 mnmdd - ok
08:12:46.0484 1184 Modem (dfcbad3cec1c5f964962ae10e0bcc8e1) C:\WINDOWS\system32\drivers\Modem.sys
08:12:46.0484 1184 Modem - ok
08:12:46.0546 1184 Mouclass (35c9e97194c8cfb8430125f8dbc34d04) C:\WINDOWS\system32\DRIVERS\mouclass.sys
08:12:46.0546 1184 Mouclass - ok
08:12:46.0718 1184 MountMgr (a80b9a0bad1b73637dbcbba7df72d3fd) C:\WINDOWS\system32\drivers\MountMgr.sys
08:12:46.0718 1184 MountMgr - ok
08:12:46.0734 1184 mraid35x - ok
08:12:46.0765 1184 MRxDAV (11d42bb6206f33fbb3ba0288d3ef81bd) C:\WINDOWS\system32\DRIVERS\mrxdav.sys
08:12:46.0781 1184 MRxDAV - ok
08:12:46.0843 1184 MRxSmb (7d304a5eb4344ebeeab53a2fe3ffb9f0) C:\WINDOWS\system32\DRIVERS\mrxsmb.sys
08:12:46.0859 1184 MRxSmb - ok
08:12:46.0875 1184 Msfs (c941ea2454ba8350021d774daf0f1027) C:\WINDOWS\system32\drivers\Msfs.sys
08:12:46.0875 1184 Msfs - ok
08:12:46.0921 1184 MSKSSRV (d1575e71568f4d9e14ca56b7b0453bf1) C:\WINDOWS\system32\drivers\MSKSSRV.sys
08:12:46.0921 1184 MSKSSRV - ok
08:12:46.0953 1184 MSPCLOCK (325bb26842fc7ccc1fcce2c457317f3e) C:\WINDOWS\system32\drivers\MSPCLOCK.sys
08:12:46.0953 1184 MSPCLOCK - ok
08:12:46.0968 1184 MSPQM (bad59648ba099da4a17680b39730cb3d) C:\WINDOWS\system32\drivers\MSPQM.sys
08:12:46.0968 1184 MSPQM - ok
08:12:47.0015 1184 mssmbios (af5f4f3f14a8ea2c26de30f7a1e17136) C:\WINDOWS\system32\DRIVERS\mssmbios.sys
08:12:47.0015 1184 mssmbios - ok
08:12:47.0062 1184 Mup (de6a75f5c270e756c5508d94b6cf68f5) C:\WINDOWS\system32\drivers\Mup.sys
08:12:47.0062 1184 Mup - ok
08:12:47.0093 1184 NDIS (1df7f42665c94b825322fae71721130d) C:\WINDOWS\system32\drivers\NDIS.sys
08:12:47.0109 1184 NDIS - ok
08:12:47.0140 1184 NdisTapi (0109c4f3850dfbab279542515386ae22) C:\WINDOWS\system32\DRIVERS\ndistapi.sys
08:12:47.0140 1184 NdisTapi - ok
08:12:47.0296 1184 Ndisuio (f927a4434c5028758a842943ef1a3849) C:\WINDOWS\system32\DRIVERS\ndisuio.sys
08:12:47.0296 1184 Ndisuio - ok
08:12:47.0312 1184 NdisWan (edc1531a49c80614b2cfda43ca8659ab) C:\WINDOWS\system32\DRIVERS\ndiswan.sys
08:12:47.0328 1184 NdisWan - ok
08:12:47.0375 1184 NDProxy (9282bd12dfb069d3889eb3fcc1000a9b) C:\WINDOWS\system32\drivers\NDProxy.sys
08:12:47.0375 1184 NDProxy - ok
08:12:47.0390 1184 NetBIOS (5d81cf9a2f1a3a756b66cf684911cdf0) C:\WINDOWS\system32\DRIVERS\netbios.sys
08:12:47.0390 1184 NetBIOS - ok
08:12:47.0406 1184 NetBT - ok
08:12:47.0484 1184 NIC1394 (e9e47cfb2d461fa0fc75b7a74c6383ea) C:\WINDOWS\system32\DRIVERS\nic1394.sys
08:12:47.0484 1184 NIC1394 - ok
08:12:47.0515 1184 Npfs (3182d64ae053d6fb034f44b6def8034a) C:\WINDOWS\system32\drivers\Npfs.sys
08:12:47.0515 1184 Npfs - ok
08:12:47.0562 1184 Ntfs (78a08dd6a8d65e697c18e1db01c5cdca) C:\WINDOWS\system32\drivers\Ntfs.sys
08:12:47.0578 1184 Ntfs - ok
08:12:47.0640 1184 Null (73c1e1f395918bc2c6dd67af7591a3ad) C:\WINDOWS\system32\drivers\Null.sys
08:12:47.0640 1184 Null - ok
08:12:47.0687 1184 NwlnkFlt (b305f3fad35083837ef46a0bbce2fc57) C:\WINDOWS\system32\DRIVERS\nwlnkflt.sys
08:12:47.0687 1184 NwlnkFlt - ok
08:12:47.0703 1184 NwlnkFwd (c99b3415198d1aab7227f2c88fd664b9) C:\WINDOWS\system32\DRIVERS\nwlnkfwd.sys
08:12:47.0703 1184 NwlnkFwd - ok
08:12:47.0734 1184 ohci1394 (ca33832df41afb202ee7aeb05145922f) C:\WINDOWS\system32\DRIVERS\ohci1394.sys
08:12:47.0750 1184 ohci1394 - ok
08:12:47.0781 1184 Parport (5575faf8f97ce5e713d108c2a58d7c7c) C:\WINDOWS\system32\drivers\Parport.sys
08:12:47.0781 1184 Parport - ok
08:12:47.0953 1184 PartMgr (beb3ba25197665d82ec7065b724171c6) C:\WINDOWS\system32\drivers\PartMgr.sys
08:12:47.0953 1184 PartMgr - ok
08:12:47.0984 1184 ParVdm (70e98b3fd8e963a6a46a2e6247e0bea1) C:\WINDOWS\system32\drivers\ParVdm.sys
08:12:47.0984 1184 ParVdm - ok
08:12:48.0015 1184 PCI (a219903ccf74233761d92bef471a07b1) C:\WINDOWS\system32\DRIVERS\pci.sys
08:12:48.0031 1184 PCI - ok
08:12:48.0046 1184 PCIDump - ok
08:12:48.0062 1184 PCIIde (ccf5f451bb1a5a2a522a76e670000ff0) C:\WINDOWS\system32\DRIVERS\pciide.sys
08:12:48.0062 1184 PCIIde - ok
08:12:48.0078 1184 Pcmcia (9e89ef60e9ee05e3f2eef2da7397f1c1) C:\WINDOWS\system32\DRIVERS\pcmcia.sys
08:12:48.0093 1184 Pcmcia - ok
08:12:48.0109 1184 PDCOMP - ok
08:12:48.0125 1184 PDFRAME - ok
08:12:48.0140 1184 PDRELI - ok
08:12:48.0171 1184 PDRFRAME - ok
08:12:48.0187 1184 perc2 - ok
08:12:48.0203 1184 perc2hib - ok
08:12:48.0281 1184 PptpMiniport (efeec01b1d3cf84f16ddd24d9d9d8f99) C:\WINDOWS\system32\DRIVERS\raspptp.sys
08:12:48.0281 1184 PptpMiniport - ok
08:12:48.0296 1184 Processor (a32bebaf723557681bfc6bd93e98bd26) C:\WINDOWS\system32\DRIVERS\processr.sys
08:12:48.0312 1184 Processor - ok
08:12:48.0328 1184 PSched (09298ec810b07e5d582cb3a3f9255424) C:\WINDOWS\system32\DRIVERS\psched.sys
08:12:48.0328 1184 PSched - ok
08:12:48.0359 1184 Ptilink (80d317bd1c3dbc5d4fe7b1678c60cadd) C:\WINDOWS\system32\DRIVERS\ptilink.sys
08:12:48.0359 1184 Ptilink - ok
08:12:48.0375 1184 ql1080 - ok
08:12:48.0390 1184 Ql10wnt - ok
08:12:48.0406 1184 ql12160 - ok
08:12:48.0437 1184 ql1240 - ok
08:12:48.0453 1184 ql1280 - ok
08:12:48.0468 1184 RasAcd (fe0d99d6f31e4fad8159f690d68ded9c) C:\WINDOWS\system32\DRIVERS\rasacd.sys
08:12:48.0468 1184 RasAcd - ok
08:12:48.0500 1184 Rasl2tp (11b4a627bc9614b885c4969bfa5ff8a6) C:\WINDOWS\system32\DRIVERS\rasl2tp.sys
08:12:48.0500 1184 Rasl2tp - ok
08:12:48.0531 1184 RasPppoe (5bc962f2654137c9909c3d4603587dee) C:\WINDOWS\system32\DRIVERS\raspppoe.sys
08:12:48.0531 1184 RasPppoe - ok
08:12:48.0546 1184 Raspti (fdbb1d60066fcfbb7452fd8f9829b242) C:\WINDOWS\system32\DRIVERS\raspti.sys
08:12:48.0546 1184 Raspti - ok
08:12:48.0578 1184 Rdbss (7ad224ad1a1437fe28d89cf22b17780a) C:\WINDOWS\system32\DRIVERS\rdbss.sys
08:12:48.0578 1184 Rdbss - ok
08:12:48.0609 1184 RDPCDD (4912d5b403614ce99c28420f75353332) C:\WINDOWS\system32\DRIVERS\RDPCDD.sys
08:12:48.0609 1184 RDPCDD - ok
08:12:48.0640 1184 rdpdr (15cabd0f7c00c47c70124907916af3f1) C:\WINDOWS\system32\DRIVERS\rdpdr.sys
08:12:48.0656 1184 rdpdr - ok
08:12:48.0703 1184 RDPWD (fc105dd312ed64eb66bff111e8ec6eac) C:\WINDOWS\system32\drivers\RDPWD.sys
08:12:48.0703 1184 RDPWD - ok
08:12:48.0750 1184 redbook (f828dd7e1419b6653894a8f97a0094c5) C:\WINDOWS\system32\DRIVERS\redbook.sys
08:12:48.0765 1184 redbook - ok
08:12:48.0875 1184 RTL8023xp (7889e3981e0a5d347e037abd467d53a5) C:\WINDOWS\system32\DRIVERS\Rtnicxp.sys
08:12:48.0875 1184 RTL8023xp - ok
08:12:49.0015 1184 rtl8139 (d507c1400284176573224903819ffda3) C:\WINDOWS\system32\DRIVERS\RTL8139.SYS
08:12:49.0015 1184 rtl8139 - ok
08:12:49.0093 1184 sdbus (8d04819a3ce51b9eb47e5689b44d43c4) C:\WINDOWS\system32\DRIVERS\sdbus.sys
08:12:49.0093 1184 sdbus - ok
08:12:49.0140 1184 Secdrv (90a3935d05b494a5a39d37e71f09a677) C:\WINDOWS\system32\DRIVERS\secdrv.sys
08:12:49.0140 1184 Secdrv - ok
08:12:49.0187 1184 Serial (cca207a8896d4c6a0c9ce29a4ae411a7) C:\WINDOWS\system32\drivers\Serial.sys
08:12:49.0187 1184 Serial - ok
08:12:49.0218 1184 Sfloppy (8e6b8c671615d126fdc553d1e2de5562) C:\WINDOWS\system32\drivers\Sfloppy.sys
08:12:49.0218 1184 Sfloppy - ok
08:12:49.0250 1184 Simbad - ok
08:12:49.0265 1184 Sparrow - ok
08:12:49.0296 1184 splitter (ab8b92451ecb048a4d1de7c3ffcb4a9f) C:\WINDOWS\system32\drivers\splitter.sys
08:12:49.0296 1184 splitter - ok
08:12:49.0328 1184 sr (76bb022c2fb6902fd5bdd4f78fc13a5d) C:\WINDOWS\system32\DRIVERS\sr.sys
08:12:49.0328 1184 sr - ok
08:12:49.0406 1184 Srv (47ddfc2f003f7f9f0592c6874962a2e7) C:\WINDOWS\system32\DRIVERS\srv.sys
08:12:49.0421 1184 Srv - ok
08:12:49.0484 1184 swenum (3941d127aef12e93addf6fe6ee027e0f) C:\WINDOWS\system32\DRIVERS\swenum.sys
08:12:49.0484 1184 swenum - ok
08:12:49.0500 1184 swmidi (8ce882bcc6cf8a62f2b2323d95cb3d01) C:\WINDOWS\system32\drivers\swmidi.sys
08:12:49.0515 1184 swmidi - ok
08:12:49.0531 1184 symc810 - ok
08:12:49.0562 1184 symc8xx - ok
08:12:49.0578 1184 sym_hi - ok
08:12:49.0593 1184 sym_u3 - ok
08:12:49.0609 1184 sysaudio (8b83f3ed0f1688b4958f77cd6d2bf290) C:\WINDOWS\system32\drivers\sysaudio.sys
08:12:49.0609 1184 sysaudio - ok
08:12:49.0687 1184 Tcpip (9aefa14bd6b182d61e3119fa5f436d3d) C:\WINDOWS\system32\DRIVERS\tcpip.sys
08:12:49.0703 1184 Tcpip - ok
08:12:49.0812 1184 TDPIPE (6471a66807f5e104e4885f5b67349397) C:\WINDOWS\system32\drivers\TDPIPE.sys
08:12:49.0812 1184 TDPIPE - ok
08:12:49.0843 1184 TDTCP (c56b6d0402371cf3700eb322ef3aaf61) C:\WINDOWS\system32\drivers\TDTCP.sys
08:12:49.0843 1184 TDTCP - ok
08:12:49.0890 1184 TermDD (88155247177638048422893737429d9e) C:\WINDOWS\system32\DRIVERS\termdd.sys
08:12:49.0890 1184 TermDD - ok
08:12:49.0984 1184 tifm21 (9179e07503630d6fb2e4162ff0196191) C:\WINDOWS\system32\drivers\tifm21.sys
08:12:49.0984 1184 tifm21 - ok
08:12:50.0046 1184 tmactmon (e8e528896ff2595cfada88749cd72ef8) C:\WINDOWS\system32\DRIVERS\tmactmon.sys
08:12:50.0046 1184 tmactmon - ok
08:12:50.0140 1184 tmcomm (1837512d4aab862bd297a2ef035fba14) C:\WINDOWS\system32\DRIVERS\tmcomm.sys
08:12:50.0156 1184 tmcomm - ok
08:12:50.0234 1184 tmeext (12755ab9039a91bf170c537d0c16a51b) C:\WINDOWS\system32\DRIVERS\tmeext.sys
08:12:50.0234 1184 tmeext - ok
08:12:50.0281 1184 tmevtmgr (dbac510d1c7cc66b7a78eb2264f3072e) C:\WINDOWS\system32\DRIVERS\tmevtmgr.sys
08:12:50.0281 1184 tmevtmgr - ok
08:12:50.0390 1184 tmnciesc (2e078184034a179c47787f87f238d5ba) C:\WINDOWS\system32\DRIVERS\tmnciesc.sys
08:12:50.0390 1184 tmnciesc - ok
08:12:50.0421 1184 tmtdi (a6e20b094a8d3e3f46d10bbe7e1ebb82) C:\WINDOWS\system32\DRIVERS\tmtdi.sys
08:12:50.0421 1184 tmtdi - ok
08:12:50.0437 1184 TosIde - ok
08:12:50.0500 1184 Udfs (5787b80c2e3c5e2f56c2a233d91fa2c9) C:\WINDOWS\system32\drivers\Udfs.sys
08:12:50.0500 1184 Udfs - ok
08:12:50.0531 1184 ultra - ok
08:12:50.0593 1184 Update (402ddc88356b1bac0ee3dd1580c76a31) C:\WINDOWS\system32\DRIVERS\update.sys
08:12:50.0609 1184 Update - ok
08:12:50.0640 1184 usbehci (65dcf09d0e37d4c6b11b5b0b76d470a7) C:\WINDOWS\system32\DRIVERS\usbehci.sys
08:12:50.0640 1184 usbehci - ok
08:12:50.0656 1184 usbhub (1ab3cdde553b6e064d2e754efe20285c) C:\WINDOWS\system32\DRIVERS\usbhub.sys
08:12:50.0656 1184 usbhub - ok
08:12:50.0687 1184 usbohci (0daecce65366ea32b162f85f07c6753b) C:\WINDOWS\system32\DRIVERS\usbohci.sys
08:12:50.0687 1184 usbohci - ok
08:12:50.0703 1184 VgaSave (0d3a8fafceacd8b7625cd549757a7df1) C:\WINDOWS\System32\drivers\vga.sys
08:12:50.0703 1184 VgaSave - ok
08:12:50.0734 1184 ViaIde - ok
08:12:50.0750 1184 VolSnap (4c8fcb5cc53aab716d810740fe59d025) C:\WINDOWS\system32\drivers\VolSnap.sys
08:12:50.0750 1184 VolSnap - ok
08:12:50.0781 1184 Wanarp (e20b95baedb550f32dd489265c1da1f6) C:\WINDOWS\system32\DRIVERS\wanarp.sys
08:12:50.0781 1184 Wanarp - ok
08:12:50.0796 1184 WDICA - ok
08:12:50.0843 1184 wdmaud (6768acf64b18196494413695f0c3a00f) C:\WINDOWS\system32\drivers\wdmaud.sys
08:12:50.0843 1184 wdmaud - ok
08:12:50.0984 1184 winachsf (214bc3ad84907ad6ad655ac5465f449a) C:\WINDOWS\system32\DRIVERS\HSF_CNXT.sys
08:12:51.0000 1184 winachsf - ok
08:12:51.0218 1184 WmiAcpi (c42584fd66ce9e17403aebca199f7bdb) C:\WINDOWS\system32\DRIVERS\wmiacpi.sys
08:12:51.0218 1184 WmiAcpi - ok
08:12:51.0312 1184 WudfPf (f15feafffbb3644ccc80c5da584e6311) C:\WINDOWS\system32\DRIVERS\WudfPf.sys
08:12:51.0312 1184 WudfPf - ok
08:12:51.0343 1184 WudfRd (28b524262bce6de1f7ef9f510ba3985b) C:\WINDOWS\system32\DRIVERS\wudfrd.sys
08:12:51.0343 1184 WudfRd - ok
08:12:51.0406 1184 MBR (0x1B8) (8f558eb6672622401da993e1e865c861) \Device\Harddisk0\DR0
08:12:51.0593 1184 \Device\Harddisk0\DR0 - ok
08:12:51.0625 1184 Boot (0x1200) (34fcfbe7db3a2897e0e08e161de38e97) \Device\Harddisk0\DR0\Partition0
08:12:51.0625 1184 \Device\Harddisk0\DR0\Partition0 - ok
08:12:51.0625 1184 Boot (0x1200) (bfa45f6d89db451a0683dafaf999d362) \Device\Harddisk0\DR0\Partition1
08:12:51.0625 1184 \Device\Harddisk0\DR0\Partition1 - ok
08:12:51.0640 1184 ============================================================
08:12:51.0640 1184 Scan finished
08:12:51.0640 1184 ============================================================
08:12:51.0640 1172 Detected object count: 0
08:12:51.0640 1172 Actual detected object count: 0
08:12:56.0375 0532 Deinitialize success



ComboFix:

ComboFix 11-12-22.01 - Owner 12/22/2011 8:49.1.1 - x86
Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.510.256 [GMT -5:00]
Running from: c:\documents and settings\Owner\Desktop\ComboFix.exe
AV: Lavasoft Ad-Watch Live! Anti-Virus *Enabled/Updated* {A1C4F2E0-7FDE-4917-AFAE-013EFC3EDE33}
AV: Trend Micro Titanium Maximum Security 2012 *Disabled/Updated* {7D2296BC-32CC-4519-917E-52E652474AF5}
.
.
((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.
.
c:\documents and settings\All Users\Application Data\TEMP
c:\windows\$NtUninstallKB5747$
c:\windows\$NtUninstallKB5747$\3932552214\@
c:\windows\$NtUninstallKB5747$\3932552214\bckfg.tmp
c:\windows\$NtUninstallKB5747$\3932552214\cfg.ini
c:\windows\$NtUninstallKB5747$\3932552214\Desktop.ini
c:\windows\$NtUninstallKB5747$\3932552214\keywords
c:\windows\$NtUninstallKB5747$\3932552214\kwrd.dll
c:\windows\$NtUninstallKB5747$\3932552214\L\cwnyazxr
c:\windows\$NtUninstallKB5747$\3932552214\lsflt7.ver
c:\windows\$NtUninstallKB5747$\3932552214\U\00000001.@
c:\windows\$NtUninstallKB5747$\3932552214\U\00000002.@
c:\windows\$NtUninstallKB5747$\3932552214\U\00000004.@
c:\windows\$NtUninstallKB5747$\3932552214\U\80000000.@
c:\windows\$NtUninstallKB5747$\3932552214\U\80000004.@
c:\windows\$NtUninstallKB5747$\3932552214\U\80000032.@
c:\windows\$NtUninstallKB5747$\4267122360
c:\windows\system32\oobe\isperror
c:\windows\system32\oobe\isperror\ispcnerr.htm
c:\windows\system32\oobe\isperror\ispdtone.htm
c:\windows\system32\oobe\isperror\isphdshk.htm
c:\windows\system32\oobe\isperror\ispins.htm
c:\windows\system32\oobe\isperror\ispnoanw.htm
c:\windows\system32\oobe\isperror\isppberr.htm
c:\windows\system32\oobe\isperror\ispphbsy.htm
c:\windows\system32\oobe\isperror\ispsbusy.htm
D:\Autorun.inf
.
.
((((((((((((((((((((((((( Files Created from 2011-11-22 to 2011-12-22 )))))))))))))))))))))))))))))))
.
.
2011-12-20 00:34 . 2011-12-19 14:34 16432 ----a-w- c:\windows\system32\lsdelete.exe
2011-12-19 20:28 . 2011-12-20 00:57 -------- d-----w- c:\program files\Spybot - Search & Destroy
2011-12-19 14:34 . 2011-12-19 14:34 101720 ----a-w- c:\windows\system32\drivers\SBREDrv.sys
2011-12-19 14:15 . 2011-11-03 17:06 64512 ----a-w- c:\windows\system32\drivers\Lbd.sys
2011-12-19 14:15 . 2011-12-19 14:15 -------- dc----w- c:\windows\system32\DRVSTORE
2011-12-19 14:14 . 2011-12-19 14:14 -------- d-----w- c:\program files\Lavasoft
2011-12-19 14:14 . 2011-12-19 14:15 -------- d-----w- c:\documents and settings\All Users\Application Data\Lavasoft
2011-12-19 14:00 . 2011-12-19 14:00 388096 ----a-r- c:\documents and settings\Owner\Application Data\Microsoft\Installer\{45A66726-69BC-466B-A7A4-12FCBA4883D7}\HiJackThis.exe
2011-12-19 01:28 . 2011-12-19 01:55 22032 ----a-w- c:\windows\DCEBoot.exe
2011-12-19 00:59 . 2011-12-18 23:47 84752 ----a-w- c:\windows\system32\drivers\tmeext.sys
2011-12-19 00:59 . 2011-12-18 23:47 171280 ----a-w- c:\windows\system32\drivers\tmnciesc.sys
2011-12-19 00:58 . 2011-12-18 23:47 92432 ----a-w- c:\windows\system32\drivers\tmtdi.sys
2011-12-19 00:58 . 2011-12-18 23:47 68368 ----a-w- c:\windows\system32\drivers\tmevtmgr.sys
2011-12-19 00:58 . 2011-12-18 23:47 81168 ----a-w- c:\windows\system32\drivers\tmactmon.sys
2011-12-19 00:58 . 2011-12-18 23:47 205072 ----a-w- c:\windows\system32\drivers\tmcomm.sys
2011-12-18 00:38 . 2011-12-21 12:41 -------- d-----w- c:\documents and settings\All Users\Application Data\Spybot - Search & Destroy
2011-12-18 00:29 . 2011-12-18 00:30 -------- d-----w- c:\program files\CCleaner
2011-12-18 00:26 . 2011-12-18 00:26 -------- d-----w- c:\documents and settings\Owner\Local Settings\Application Data\ConsumerSoft
2011-12-18 00:13 . 2011-12-18 00:13 -------- d-----w- c:\documents and settings\Owner\Application Data\GlarySoft
2011-12-18 00:10 . 2011-12-18 00:10 -------- d-----w- c:\program files\Glary Utilities
2011-12-16 18:40 . 2011-12-16 18:40 -------- d--h--w- c:\windows\system32\GroupPolicy
2011-12-16 18:35 . 2011-12-18 00:38 -------- d-----w- C:\System Repair Programs
2011-12-16 17:00 . 2011-12-16 17:00 -------- d-----w- c:\documents and settings\Administrator
2011-12-16 13:17 . 2011-12-16 13:17 -------- d-sh--w- c:\documents and settings\NetworkService\PrivacIE
2011-12-15 23:39 . 2011-12-16 19:14 102400 ----a-w- c:\windows\RegBootClean.exe
.
.
.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2011-12-19 00:45 . 2011-10-14 17:53 56 ----a-w- c:\windows\system32\SupportTool.exe.bat
2011-11-23 13:25 . 2003-03-31 12:00 1859584 ----a-w- c:\windows\system32\win32k.sys
2011-11-04 19:20 . 2003-03-31 12:00 916992 ----a-w- c:\windows\system32\wininet.dll
2011-11-04 19:20 . 2003-03-31 12:00 43520 ----a-w- c:\windows\system32\licmgr10.dll
2011-11-04 19:20 . 2003-03-31 12:00 1469440 ----a-w- c:\windows\system32\inetcpl.cpl
2011-11-04 11:23 . 2011-10-13 18:24 385024 ----a-w- c:\windows\system32\html.iec
2011-11-01 16:07 . 2003-03-31 12:00 1288704 ----a-w- c:\windows\system32\ole32.dll
2011-10-28 05:31 . 2003-03-31 12:00 33280 ----a-w- c:\windows\system32\csrsrv.dll
2011-10-25 13:33 . 2003-03-31 12:00 2192768 ----a-w- c:\windows\system32\ntoskrnl.exe
2011-10-25 12:52 . 2002-08-29 01:04 2069376 ----a-w- c:\windows\system32\ntkrnlpa.exe
2011-10-18 17:42 . 2011-10-18 17:43 73728 ----a-w- c:\windows\system32\javacpl.cpl
2011-10-18 17:42 . 2011-10-18 17:43 423656 ----a-w- c:\windows\system32\deployJava1.dll
2011-10-18 11:13 . 2003-03-31 12:00 186880 ----a-w- c:\windows\system32\encdec.dll
2011-10-13 19:28 . 2011-10-13 17:35 414368 ----a-w- c:\windows\system32\FlashPlayerCPLApp.cpl
2011-10-10 14:22 . 2011-10-13 17:25 692736 ----a-w- c:\windows\system32\inetcomm.dll
2011-09-28 07:06 . 2003-03-31 12:00 599040 ----a-w- c:\windows\system32\crypt32.dll
2011-09-26 15:41 . 2011-09-26 15:41 611328 ------w- c:\windows\system32\uiautomationcore.dll
2011-09-26 15:41 . 2003-03-31 12:00 220160 ----a-w- c:\windows\system32\oleacc.dll
2011-09-26 15:41 . 2003-03-31 12:00 20480 ----a-w- c:\windows\system32\oleaccrc.dll
.
.
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4
.
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"SpybotSD TeaTimer"="c:\program files\Spybot - Search & Destroy\TeaTimer.exe" [2009-03-05 2260480]
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"ATIPTA"="c:\program files\ATI Technologies\ATI Control Panel\atiptaxx.exe" [2005-12-02 344064]
"hpWirelessAssistant"="c:\program files\hpq\HP Wireless Assistant\HP Wireless Assistant.exe" [2005-12-13 507904]
"QlbCtrl.exe"="c:\program files\Hewlett-Packard\HP Quick Launch Buttons\QlbCtrl.exe" [2007-10-19 202032]
"SunJavaUpdateSched"="c:\program files\Common Files\Java\Java Update\jusched.exe" [2010-05-14 248552]
"Trend Micro Client Framework"="c:\program files\Trend Micro\UniClient\UiFrmWrk\UIWatchDog.exe" [2011-12-18 129304]
"Trend Micro Titanium"="c:\program files\Trend Micro\Titanium\UIFramework\uiWinMgr.exe" [2011-10-05 1300672]
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\Lavasoft Ad-Aware Service]
@="Service"
.
[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\TrendAntiVirus]
"DisableMonitoring"=dword:00000001
.
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]
"EnableFirewall"= 0 (0x0)
"DisableNotifications"= 1 (0x1)
.
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"c:\\Documents and Settings\\Owner\\Desktop\\Downloads\\amddriverdownloader.exe"=
"c:\\WINDOWS\\Network Diagnostic\\xpnetdiag.exe"=
"c:\\WINDOWS\\system32\\sessmgr.exe"=
.
R0 Lbd;Lbd;c:\windows\system32\drivers\Lbd.sys [12/19/2011 9:15 AM 64512]
R1 tmeext;tmeext;c:\windows\system32\drivers\tmeext.sys [12/18/2011 7:59 PM 84752]
R1 tmevtmgr;tmevtmgr;c:\windows\system32\drivers\tmevtmgr.sys [12/18/2011 7:58 PM 68368]
R2 Amsp;Trend Micro Solution Platform;c:\program files\Trend Micro\AMSP\coreServiceShell.exe [12/18/2011 7:42 PM 200632]
R2 tmnciesc;tmnciesc;c:\windows\system32\drivers\tmnciesc.sys [12/18/2011 7:59 PM 171280]
R3 HSFHWATI;HSFHWATI;c:\windows\system32\drivers\HSFHWATI.sys [8/22/2005 1:06 PM 231424]
S2 Lavasoft Ad-Aware Service;Lavasoft Ad-Aware Service;c:\program files\Lavasoft\Ad-Aware\AAWService.exe [11/3/2011 12:06 PM 2152152]
S3 Lavasoft Kernexplorer;Lavasoft helper driver;c:\program files\Lavasoft\Ad-Aware\kernexplorer.sys [11/3/2011 12:06 PM 15232]
.
Contents of the 'Scheduled Tasks' folder
.
2011-12-22 c:\windows\Tasks\Ad-Aware Update (Weekly).job
- c:\program files\Lavasoft\Ad-Aware\Ad-AwareAdmin.exe [2011-11-03 17:06]
.
2011-12-22 c:\windows\Tasks\GlaryInitialize.job
- c:\program files\Glary Utilities\initialize.exe [2011-12-18 14:50]
.
2011-12-21 c:\windows\Tasks\Windows Codec Update Service.job
- c:\program files\Essentials Codec Pack\WECPUpdate.exe [2011-07-14 08:31]
.
- - - - ORPHANS REMOVED - - - -
.
SafeBoot-Wdf01000.sys
.
.
.
**************************************************************************
.
catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2011-12-22 09:17
Windows 5.1.2600 Service Pack 3 NTFS
.
scanning hidden processes ...
.
scanning hidden autostart entries ...
.
scanning hidden files ...
.
.
c:\windows\system32\rp_rules.dat 44 bytes
c:\windows\system32\rp_stats.dat 64 bytes
.
scan completed successfully
hidden files: 2
.
**************************************************************************
.
--------------------- LOCKED REGISTRY KEYS ---------------------
.
[HKEY_USERS\.Default\Software\Microsoft\Internet Explorer\User Preferences]
@Denied: (2) (LocalSystem)
"88D7D0879DAB32E14DE5B3A805A34F98AFF34F5977"=hex:01,00,00,00,d0,8c,9d,df,01,15,
d1,11,8c,7a,00,c0,4f,c2,97,eb,01,00,00,00,01,d9,67,cd,f6,35,bb,43,ba,e1,17,\
"2D53CFFC5C1A3DD2E97B7979AC2A92BD59BC839E81"=hex:01,00,00,00,d0,8c,9d,df,01,15,
d1,11,8c,7a,00,c0,4f,c2,97,eb,01,00,00,00,01,d9,67,cd,f6,35,bb,43,ba,e1,17,\
.
--------------------- DLLs Loaded Under Running Processes ---------------------
.
- - - - - - - > 'winlogon.exe'(744)
c:\windows\system32\Ati2evxx.dll
.
- - - - - - - > 'explorer.exe'(2832)
c:\windows\system32\WININET.dll
c:\windows\system32\ieframe.dll
c:\windows\system32\webcheck.dll
c:\windows\system32\WPDShServiceObj.dll
c:\windows\system32\PortableDeviceTypes.dll
c:\windows\system32\PortableDeviceApi.dll
.
------------------------ Other Running Processes ------------------------
.
c:\windows\system32\Ati2evxx.exe
c:\windows\system32\Ati2evxx.exe
c:\program files\Java\jre6\bin\jqs.exe
c:\program files\Trend Micro\AMSP\coreFrameworkHost.exe
c:\program files\Trend Micro\UniClient\UiFrmWrk\uiSeAgnt.exe
c:\program files\Hewlett-Packard\Shared\hpqwmiex.exe
c:\windows\System32\wbem\unsecapp.exe
c:\progra~1\hpq\Shared\HPQTOA~1.EXE
c:\windows\system32\wscntfy.exe
.
**************************************************************************
.
Completion time: 2011-12-22 09:25:51 - machine was rebooted
ComboFix-quarantined-files.txt 2011-12-22 14:25
.
Pre-Run: 50,256,670,720 bytes free
Post-Run: 50,517,581,824 bytes free
.
- - End Of File - - 2A62CCFD60036D23AB09888E3769DD1A

#4 CatByte

CatByte

    bleepin' tiger


  • Malware Response Team
  • 14,664 posts
  • OFFLINE
  •  
  • Gender:Not Telling
  • Location:Canada
  • Local time:03:43 PM

Posted 22 December 2011 - 01:31 PM

Hi,

I think it is the removal of this malware that breaks the internet, but rather that, than allow this infection to backdoor your machine, possibly compromising your personal information.

Hopefully this is something we can remedy without too much trouble


Please download the following to USB and transfer to the machine without the connection to see what service is disrupted:

Please download Farbar Service Scanner and run it on the computer with the issue.
  • Press "Scan".
  • It will create a log (FSS.txt) in the same directory the tool is run.
  • Please copy and paste the log to your reply.

Microsoft MVP - 2010, 2011, 2012, 2013, 2014, 2015


#5 Need some help

Need some help
  • Topic Starter

  • Members
  • 15 posts
  • OFFLINE
  •  
  • Local time:02:43 PM

Posted 22 December 2011 - 01:36 PM

Here is the FSS Log:

Farbar Service Scanner
Ran by Owner (administrator) on 22-12-2011 at 13:35:35
Microsoft Windows XP Professional Service Pack 3 (X86)
********************************************************

Internet Services:
=================
Dhcp Service is not running. Checking service configuration:
The start type of Dhcp service is OK.
The ImagePath of Dhcp service is OK.
The ServiceDll of Dhcp service is OK.

NetBt Service is not running. Checking service configuration:
The start type of NetBt service is OK.
The ImagePath of NetBt service is OK.


Connection Status:
=================
Localhost is accessible.
There is no connection to network.
Attempt to access Google IP returned error: Google IP is unreachable
Attempt to access Yahoo IP returend error: Yahoo IP is unreachable


File Check:
==========
C:\WINDOWS\system32\dhcpcsvc.dll => MD5 is legit
C:\WINDOWS\system32\Drivers\afd.sys => MD5 is legit
Attention! C:\WINDOWS\system32\Drivers\netbt.sys is missing.
C:\WINDOWS\system32\Drivers\tcpip.sys => MD5 is legit
C:\WINDOWS\system32\Drivers\ipsec.sys => MD5 is legit
C:\WINDOWS\system32\dnsrslvr.dll => MD5 is legit
C:\WINDOWS\system32\svchost.exe => MD5 is legit
C:\WINDOWS\system32\rpcss.dll => MD5 is legit
C:\WINDOWS\system32\services.exe => MD5 is legit

**** End of log ****

#6 CatByte

CatByte

    bleepin' tiger


  • Malware Response Team
  • 14,664 posts
  • OFFLINE
  •  
  • Gender:Not Telling
  • Location:Canada
  • Local time:03:43 PM

Posted 22 December 2011 - 01:39 PM

Please re-run Farbar Service Scanner

type the following into the search window

netbt.sys

Click the "search Files" button

post the content of the FSS.txt in your next reply

Microsoft MVP - 2010, 2011, 2012, 2013, 2014, 2015


#7 Need some help

Need some help
  • Topic Starter

  • Members
  • 15 posts
  • OFFLINE
  •  
  • Local time:02:43 PM

Posted 22 December 2011 - 01:42 PM

Thanks for the quick replies.

Here is the second scan, per your request:

Farbar Service Scanner
Ran by Owner (administrator) on 22-12-2011 at 13:40:35
Microsoft Windows XP Service Pack 3 (X86)

************************************************
================== Search: "netbt.sys" ===================

C:\WINDOWS\ServicePackFiles\i386\netbt.sys
[2011-10-13 13:22] - [2008-04-13 14:21] - 0162816 ____N (Microsoft Corporation) 74B2B2F5BEA5E9A3DC021D685551BD3D

C:\WINDOWS\$NtServicePackUninstall$\netbt.sys
[2011-10-14 12:22] - [2004-08-03 22:14] - 0162816 ____C (Microsoft Corporation) 0C80E410CD2F47134407EE7DD19CC86B

====== End Of Search ======

#8 CatByte

CatByte

    bleepin' tiger


  • Malware Response Team
  • 14,664 posts
  • OFFLINE
  •  
  • Gender:Not Telling
  • Location:Canada
  • Local time:03:43 PM

Posted 22 December 2011 - 01:44 PM

Hi,

Please do the following:

  • Very Important! Temporarily disable your anti-virus, script blocking and any anti-malware real-time protection before following the steps below.
  • They can interfere with ComboFix or remove some of its embedded files which may cause "unpredictable results".
Copy/paste the text inside the Codebox below into notepad:

Here's how to do that:
Click Start > Run type Notepad click OK.
This will open an empty notepad file:

Copy all the text inside of the code box - Press Ctrl+C (or right click on the highlighted section and choose 'copy')

FCopy::
C:\WINDOWS\ServicePackFiles\i386\netbt.sys | C:\WINDOWS\system32\Drivers\netbt.sys



Now paste the copied text into the open notepad - press CTRL+V (or right click and choose 'paste')

Save this file to your desktop, Save this as "CFScript"


Here's how to do that:

1.Click File;
2.Click Save As... Change the directory to your desktop;
3.Change the Save as type to "All Files";
4.Type in the file name: CFScript
5.Click Save ...

Posted Image
  • Referring to the screenshot above, drag CFScript.txt into ComboFix.exe.
  • ComboFix may request an update; please allow it.
  • ComboFix will now run a scan on your system. It may reboot your system when it finishes. This is normal.
  • When finished, it shall produce a log for you.
  • Copy and paste the contents of the log in your next reply.

CAUTION: Do not mouse-click ComboFix's window while it is running. That may cause it to stall.


Let me know if you can now connect

if not > please run a fresh scan with Farbar Service Scanner

Microsoft MVP - 2010, 2011, 2012, 2013, 2014, 2015


#9 Need some help

Need some help
  • Topic Starter

  • Members
  • 15 posts
  • OFFLINE
  •  
  • Local time:02:43 PM

Posted 22 December 2011 - 02:05 PM

Here is the ComboFix log. I was still unable to connect to the internet afterwards, so I ran FSS again and pasted the log here, as well.

Note: ComboFix keeps saying that AdAware is running, but it is not.



ComboFix 11-12-22.01 - Owner 12/22/2011 13:50:26.3.1 - x86
Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.510.265 [GMT -5:00]
Running from: c:\documents and settings\Owner\Desktop\ComboFix.exe
Command switches used :: c:\documents and settings\Owner\Desktop\CFScript.txt
AV: Lavasoft Ad-Watch Live! Anti-Virus *Enabled/Updated* {A1C4F2E0-7FDE-4917-AFAE-013EFC3EDE33}
AV: Trend Micro Titanium Maximum Security 2012 *Disabled/Updated* {7D2296BC-32CC-4519-917E-52E652474AF5}
.
.
((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.
.
.
--------------- FCopy ---------------
.
c:\windows\ServicePackFiles\i386\netbt.sys --> c:\windows\system32\Drivers\netbt.sys
.
((((((((((((((((((((((((( Files Created from 2011-11-22 to 2011-12-22 )))))))))))))))))))))))))))))))
.
.
2011-12-22 18:50 . 2008-04-13 19:21 162816 -c--a-w- c:\windows\system32\dllcache\netbt.sys
2011-12-22 18:50 . 2008-04-13 19:21 162816 ----a-w- c:\windows\system32\drivers\netbt.sys
2011-12-22 18:08 . 2008-04-13 19:45 26368 -c--a-w- c:\windows\system32\dllcache\usbstor.sys
2011-12-20 00:34 . 2011-12-19 14:34 16432 ----a-w- c:\windows\system32\lsdelete.exe
2011-12-19 20:28 . 2011-12-20 00:57 -------- d-----w- c:\program files\Spybot - Search & Destroy
2011-12-19 14:34 . 2011-12-19 14:34 101720 ----a-w- c:\windows\system32\drivers\SBREDrv.sys
2011-12-19 14:15 . 2011-11-03 17:06 64512 ----a-w- c:\windows\system32\drivers\Lbd.sys
2011-12-19 14:15 . 2011-12-19 14:15 -------- dc----w- c:\windows\system32\DRVSTORE
2011-12-19 14:14 . 2011-12-19 14:14 -------- d-----w- c:\program files\Lavasoft
2011-12-19 14:14 . 2011-12-19 14:15 -------- d-----w- c:\documents and settings\All Users\Application Data\Lavasoft
2011-12-19 14:00 . 2011-12-19 14:00 388096 ----a-r- c:\documents and settings\Owner\Application Data\Microsoft\Installer\{45A66726-69BC-466B-A7A4-12FCBA4883D7}\HiJackThis.exe
2011-12-19 01:28 . 2011-12-19 01:55 22032 ----a-w- c:\windows\DCEBoot.exe
2011-12-19 00:59 . 2011-12-18 23:47 84752 ----a-w- c:\windows\system32\drivers\tmeext.sys
2011-12-19 00:59 . 2011-12-18 23:47 171280 ----a-w- c:\windows\system32\drivers\tmnciesc.sys
2011-12-19 00:58 . 2011-12-18 23:47 92432 ----a-w- c:\windows\system32\drivers\tmtdi.sys
2011-12-19 00:58 . 2011-12-18 23:47 68368 ----a-w- c:\windows\system32\drivers\tmevtmgr.sys
2011-12-19 00:58 . 2011-12-18 23:47 81168 ----a-w- c:\windows\system32\drivers\tmactmon.sys
2011-12-19 00:58 . 2011-12-18 23:47 205072 ----a-w- c:\windows\system32\drivers\tmcomm.sys
2011-12-18 00:38 . 2011-12-21 12:41 -------- d-----w- c:\documents and settings\All Users\Application Data\Spybot - Search & Destroy
2011-12-18 00:29 . 2011-12-18 00:30 -------- d-----w- c:\program files\CCleaner
2011-12-18 00:26 . 2011-12-18 00:26 -------- d-----w- c:\documents and settings\Owner\Local Settings\Application Data\ConsumerSoft
2011-12-18 00:13 . 2011-12-18 00:13 -------- d-----w- c:\documents and settings\Owner\Application Data\GlarySoft
2011-12-18 00:10 . 2011-12-18 00:10 -------- d-----w- c:\program files\Glary Utilities
2011-12-16 18:40 . 2011-12-16 18:40 -------- d--h--w- c:\windows\system32\GroupPolicy
2011-12-16 18:35 . 2011-12-18 00:38 -------- d-----w- C:\System Repair Programs
2011-12-16 17:00 . 2011-12-16 17:00 -------- d-----w- c:\documents and settings\Administrator
2011-12-16 13:17 . 2011-12-16 13:17 -------- d-sh--w- c:\documents and settings\NetworkService\PrivacIE
2011-12-15 23:39 . 2011-12-16 19:14 102400 ----a-w- c:\windows\RegBootClean.exe
.
.
.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2011-12-19 00:45 . 2011-10-14 17:53 56 ----a-w- c:\windows\system32\SupportTool.exe.bat
2011-11-23 13:25 . 2003-03-31 12:00 1859584 ----a-w- c:\windows\system32\win32k.sys
2011-11-04 19:20 . 2003-03-31 12:00 916992 ----a-w- c:\windows\system32\wininet.dll
2011-11-04 19:20 . 2003-03-31 12:00 43520 ----a-w- c:\windows\system32\licmgr10.dll
2011-11-04 19:20 . 2003-03-31 12:00 1469440 ----a-w- c:\windows\system32\inetcpl.cpl
2011-11-04 11:23 . 2011-10-13 18:24 385024 ----a-w- c:\windows\system32\html.iec
2011-11-01 16:07 . 2003-03-31 12:00 1288704 ----a-w- c:\windows\system32\ole32.dll
2011-10-28 05:31 . 2003-03-31 12:00 33280 ----a-w- c:\windows\system32\csrsrv.dll
2011-10-25 13:33 . 2003-03-31 12:00 2192768 ----a-w- c:\windows\system32\ntoskrnl.exe
2011-10-25 12:52 . 2002-08-29 01:04 2069376 ----a-w- c:\windows\system32\ntkrnlpa.exe
2011-10-18 17:42 . 2011-10-18 17:43 73728 ----a-w- c:\windows\system32\javacpl.cpl
2011-10-18 17:42 . 2011-10-18 17:43 423656 ----a-w- c:\windows\system32\deployJava1.dll
2011-10-18 11:13 . 2003-03-31 12:00 186880 ----a-w- c:\windows\system32\encdec.dll
2011-10-13 19:28 . 2011-10-13 17:35 414368 ----a-w- c:\windows\system32\FlashPlayerCPLApp.cpl
2011-10-10 14:22 . 2011-10-13 17:25 692736 ----a-w- c:\windows\system32\inetcomm.dll
2011-09-28 07:06 . 2003-03-31 12:00 599040 ----a-w- c:\windows\system32\crypt32.dll
2011-09-26 15:41 . 2011-09-26 15:41 611328 ------w- c:\windows\system32\uiautomationcore.dll
2011-09-26 15:41 . 2003-03-31 12:00 220160 ----a-w- c:\windows\system32\oleacc.dll
2011-09-26 15:41 . 2003-03-31 12:00 20480 ----a-w- c:\windows\system32\oleaccrc.dll
.
.
((((((((((((((((((((((((((((( SnapShot@2011-12-22_14.17.14 )))))))))))))))))))))))))))))))))))))))))
.
- 2003-03-31 12:00 . 2011-12-22 14:19 44146 c:\windows\system32\perfc009.dat
+ 2003-03-31 12:00 . 2011-12-22 14:22 44146 c:\windows\system32\perfc009.dat
+ 2011-12-22 18:08 . 2008-04-13 19:45 26368 c:\windows\system32\drivers\USBSTOR.SYS
+ 2003-03-31 12:00 . 2011-12-22 14:22 323584 c:\windows\system32\perfh009.dat
- 2003-03-31 12:00 . 2011-12-22 14:19 323584 c:\windows\system32\perfh009.dat
.
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4
.
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"SpybotSD TeaTimer"="c:\program files\Spybot - Search & Destroy\TeaTimer.exe" [2009-03-05 2260480]
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"ATIPTA"="c:\program files\ATI Technologies\ATI Control Panel\atiptaxx.exe" [2005-12-02 344064]
"hpWirelessAssistant"="c:\program files\hpq\HP Wireless Assistant\HP Wireless Assistant.exe" [2005-12-13 507904]
"QlbCtrl.exe"="c:\program files\Hewlett-Packard\HP Quick Launch Buttons\QlbCtrl.exe" [2007-10-19 202032]
"SunJavaUpdateSched"="c:\program files\Common Files\Java\Java Update\jusched.exe" [2010-05-14 248552]
"Trend Micro Client Framework"="c:\program files\Trend Micro\UniClient\UiFrmWrk\UIWatchDog.exe" [2011-12-18 129304]
"Trend Micro Titanium"="c:\program files\Trend Micro\Titanium\UIFramework\uiWinMgr.exe" [2011-10-05 1300672]
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\Lavasoft Ad-Aware Service]
@="Service"
.
[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\TrendAntiVirus]
"DisableMonitoring"=dword:00000001
.
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]
"EnableFirewall"= 0 (0x0)
"DisableNotifications"= 1 (0x1)
.
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"c:\\Documents and Settings\\Owner\\Desktop\\Downloads\\amddriverdownloader.exe"=
"c:\\WINDOWS\\Network Diagnostic\\xpnetdiag.exe"=
"c:\\WINDOWS\\system32\\sessmgr.exe"=
.
R0 Lbd;Lbd;c:\windows\system32\drivers\Lbd.sys [12/19/2011 9:15 AM 64512]
R1 tmeext;tmeext;c:\windows\system32\drivers\tmeext.sys [12/18/2011 7:59 PM 84752]
R1 tmevtmgr;tmevtmgr;c:\windows\system32\drivers\tmevtmgr.sys [12/18/2011 7:58 PM 68368]
R2 tmnciesc;tmnciesc;c:\windows\system32\drivers\tmnciesc.sys [12/18/2011 7:59 PM 171280]
R3 HSFHWATI;HSFHWATI;c:\windows\system32\drivers\HSFHWATI.sys [8/22/2005 1:06 PM 231424]
S2 Amsp;Trend Micro Solution Platform;c:\program files\Trend Micro\AMSP\coreServiceShell.exe [12/18/2011 7:42 PM 200632]
S2 Lavasoft Ad-Aware Service;Lavasoft Ad-Aware Service;c:\program files\Lavasoft\Ad-Aware\AAWService.exe [11/3/2011 12:06 PM 2152152]
S3 Lavasoft Kernexplorer;Lavasoft helper driver;c:\program files\Lavasoft\Ad-Aware\kernexplorer.sys [11/3/2011 12:06 PM 15232]
.
--- Other Services/Drivers In Memory ---
.
*NewlyCreated* - 92699439
*Deregistered* - 92699439
.
Contents of the 'Scheduled Tasks' folder
.
2011-12-22 c:\windows\Tasks\Ad-Aware Update (Weekly).job
- c:\program files\Lavasoft\Ad-Aware\Ad-AwareAdmin.exe [2011-11-03 17:06]
.
2011-12-22 c:\windows\Tasks\GlaryInitialize.job
- c:\program files\Glary Utilities\initialize.exe [2011-12-18 14:50]
.
2011-12-22 c:\windows\Tasks\Windows Codec Update Service.job
- c:\program files\Essentials Codec Pack\WECPUpdate.exe [2011-07-14 08:31]
.
.
**************************************************************************
.
catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2011-12-22 13:57
Windows 5.1.2600 Service Pack 3 NTFS
.
scanning hidden processes ...
.
scanning hidden autostart entries ...
.
scanning hidden files ...
.
scan completed successfully
hidden files: 0
.
**************************************************************************
.
--------------------- LOCKED REGISTRY KEYS ---------------------
.
[HKEY_USERS\.Default\Software\Microsoft\Internet Explorer\User Preferences]
@Denied: (2) (LocalSystem)
"88D7D0879DAB32E14DE5B3A805A34F98AFF34F5977"=hex:01,00,00,00,d0,8c,9d,df,01,15,
d1,11,8c,7a,00,c0,4f,c2,97,eb,01,00,00,00,01,d9,67,cd,f6,35,bb,43,ba,e1,17,\
"2D53CFFC5C1A3DD2E97B7979AC2A92BD59BC839E81"=hex:01,00,00,00,d0,8c,9d,df,01,15,
d1,11,8c,7a,00,c0,4f,c2,97,eb,01,00,00,00,01,d9,67,cd,f6,35,bb,43,ba,e1,17,\
.
--------------------- DLLs Loaded Under Running Processes ---------------------
.
- - - - - - - > 'winlogon.exe'(744)
c:\windows\system32\Ati2evxx.dll
.
- - - - - - - > 'explorer.exe'(404)
c:\windows\system32\WININET.dll
c:\windows\system32\ieframe.dll
c:\windows\system32\webcheck.dll
c:\windows\system32\WPDShServiceObj.dll
c:\windows\system32\PortableDeviceTypes.dll
c:\windows\system32\PortableDeviceApi.dll
.
Completion time: 2011-12-22 13:59:15
ComboFix-quarantined-files.txt 2011-12-22 18:59
ComboFix2.txt 2011-12-22 18:31
ComboFix3.txt 2011-12-22 14:25
.
Pre-Run: 50,545,238,016 bytes free
Post-Run: 50,531,102,720 bytes free
.
- - End Of File - - E525EED803B0FA79F46099DC1EE55A54


I am still unable to connect to the internet. Here is the log from FSS:

Farbar Service Scanner
Ran by Owner (administrator) on 22-12-2011 at 14:01:56
Microsoft Windows XP Professional Service Pack 3 (X86)
********************************************************

Internet Services:
=================
Dhcp Service is not running. Checking service configuration:
The start type of Dhcp service is OK.
The ImagePath of Dhcp service is OK.
The ServiceDll of Dhcp service is OK.

NetBt Service is not running. Checking service configuration:
The start type of NetBt service is OK.
The ImagePath of NetBt service is OK.


Connection Status:
=================
Localhost is accessible.
There is no connection to network.
Attempt to access Google IP returned error: Google IP is unreachable
Attempt to access Yahoo IP returend error: Yahoo IP is unreachable


File Check:
==========
C:\WINDOWS\system32\dhcpcsvc.dll => MD5 is legit
C:\WINDOWS\system32\Drivers\afd.sys => MD5 is legit
C:\WINDOWS\system32\Drivers\netbt.sys => MD5 is legit
C:\WINDOWS\system32\Drivers\tcpip.sys => MD5 is legit
C:\WINDOWS\system32\Drivers\ipsec.sys => MD5 is legit
C:\WINDOWS\system32\dnsrslvr.dll => MD5 is legit
C:\WINDOWS\system32\svchost.exe => MD5 is legit
C:\WINDOWS\system32\rpcss.dll => MD5 is legit
C:\WINDOWS\system32\services.exe => MD5 is legit

**** End of log ****

#10 Need some help

Need some help
  • Topic Starter

  • Members
  • 15 posts
  • OFFLINE
  •  
  • Local time:02:43 PM

Posted 22 December 2011 - 02:21 PM

A little update:

After 2 reboots, I now have internet access, but the computer is running so incredibly slowly that I've been waiting now nearly 15 min for the browser to open., but there is data transferring.

#11 Need some help

Need some help
  • Topic Starter

  • Members
  • 15 posts
  • OFFLINE
  •  
  • Local time:02:43 PM

Posted 22 December 2011 - 02:22 PM

Ok, definitely have internet access now, but the computer is still dragging.

#12 CatByte

CatByte

    bleepin' tiger


  • Malware Response Team
  • 14,664 posts
  • OFFLINE
  •  
  • Gender:Not Telling
  • Location:Canada
  • Local time:03:43 PM

Posted 22 December 2011 - 02:35 PM

Hi,

Please run the following:

  • Go to Start > Run > type: cmd
  • Press OK or Hit Enter.
  • At the command prompt, type or copy/paste: ipconfig /flushdns (note the space between ..g /f it needs to be there)
  • Hit Enter.
  • You will get a confirmation that the flush was successful.
  • Close the command box.


NEXT


Download TFC to your desktop
Mirror
  • Close any open windows.
  • Double click the TFC icon to run the program
  • TFC will close all open programs itself in order to run,
  • Click the Start button to begin the process.
  • Allow TFC to run uninterrupted.
  • The program should not take long to finish it's job
  • Once its finished it should automatically reboot your machine,
  • if it doesn't, manually reboot to ensure a complete clean


NEXT



let's make sure there are no leftovers


  • Please open your MalwareBytes AntiMalware Program
  • Click the Update Tab and search for updates
  • If an update is found, it will download and install the latest version.
  • Once the program has loaded, select "Perform Quick Scan", then click Scan.
  • The scan may take some time to finish, so please be patient.
  • When the scan is complete, click OK, then Show Results to view the results.
  • Make sure that everything is checked, and click Remove Selected. <-- very important
  • When disinfection is completed, a log will open in Notepad and you may be prompted to Restart. (See Extra Note)
  • The log is automatically saved by MBAM and can be viewed by clicking the Logs tab in MBAM.
  • Copy&Paste the entire report in your next reply.

Extra Note:If MBAM encounters a file that is difficult to remove, you will be presented with 1 of 2 prompts, click OK to either and let MBAM proceed with the disinfection process, if asked to restart the computer, please do so immediately.



NEXT


Go here to run an online scanner from ESET.
  • Turn off the real time scanner of any existing antivirus program while performing the online scan
  • Tick the box next to YES, I accept the Terms of Use.
  • Click Start
  • When asked, allow the activeX control to install
  • Click Start
  • Make sure that the option Remove found threats is unticked and the Scan Archives option is ticked.
  • Click on Advanced Settings, ensure the options Scan for potentially unwanted applications, Scan for potentially unsafe applications, and Enable Anti-Stealth Technology are ticked.
  • Click Scan
  • Wait for the scan to finish
  • When the scan completes, press the LIST OF THREATS FOUND button
  • Press EXPORT TO TEXT FILE , name the file ESETSCAN and save it to your desktop
  • Include the contents of this report in your next reply.
  • Press the BACK button.
  • Press Finish

Microsoft MVP - 2010, 2011, 2012, 2013, 2014, 2015


#13 CatByte

CatByte

    bleepin' tiger


  • Malware Response Team
  • 14,664 posts
  • OFFLINE
  •  
  • Gender:Not Telling
  • Location:Canada
  • Local time:03:43 PM

Posted 22 December 2011 - 03:02 PM

Hi,

I need to ask you what tools you ran exactly

something removed netbt.sys

we are trying to find out what tool this might have been

did you run any other tools prior to running TDSSKiller and ComboFix today

Are you able to tell when exactly you lost the internet connection?

If you can check the logs of the tools you ran, look for the removal of netbt.sys

thanks

Microsoft MVP - 2010, 2011, 2012, 2013, 2014, 2015


#14 Need some help

Need some help
  • Topic Starter

  • Members
  • 15 posts
  • OFFLINE
  •  
  • Local time:02:43 PM

Posted 22 December 2011 - 03:11 PM

I will do a more thorough check to see the specific program that caused the removal of netbt.sys, but here are the programs I ran before today:

  • TrendMicro Titanium antivirus (full scan)
  • MalwareBytes
  • Glary Utilities Registry Cleaner Module
  • CCleaner
  • HJT
  • Spybot S&D
  • Ad-Aware

I did all of these multiple times in both safe mode and not. The TM Antivirus is the only one that would not run in safe mode.

The internet worked the last time I used the infected computer, which was on Wednesday morning. I had not touched it since then until a few hours ago. This is not my computer, so I can't be 100% positive that it wasn't touched, but I don't believe so. Assuming nobody messed with it, I would guess that I lost the internet connection this afternoon after I ran TDSSkiller the first time (not that that had anything to do with it), around 1pm EST.

Note: ESET scan is almost complete and I will post the log as soon as it is done. Mbam found nothing.

Edited by Need some help, 22 December 2011 - 03:16 PM.


#15 CatByte

CatByte

    bleepin' tiger


  • Malware Response Team
  • 14,664 posts
  • OFFLINE
  •  
  • Gender:Not Telling
  • Location:Canada
  • Local time:03:43 PM

Posted 22 December 2011 - 03:16 PM

OK thanks,

Edited by CatByte, 22 December 2011 - 03:17 PM.

Microsoft MVP - 2010, 2011, 2012, 2013, 2014, 2015





0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users