Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Ping.exe and fake anti-virus trouble


  • This topic is locked This topic is locked
108 replies to this topic

#1 Passion4Muzik

Passion4Muzik

  • Members
  • 152 posts
  • OFFLINE
  •  
  • Local time:03:38 PM

Posted 20 December 2011 - 11:21 PM

I am using a gateway computer that isn't infected to type. My issue started when I was browsing with an IBM Thinkpad and I got the fake anti-virus (the sort of thing I've gotten before). I immeditely went to proceses and noticed something called ping.exe that was using a lot of memory. I would end the process and it would reappear a few seconds later. I ran malware bytes but it didn't find anything. I ran Norton Power Eraser and it found something and required a reboot. After a reboot, I still had the infection. I tried system restore and it froze every time and did not complete. I tried registry cleaners that didn't solve the issue. I posted here and after trying more things on the Thinkpad, simultaneously the gateway computer became infected (it seems it was a website I visited) and after a scan, a system restore and updating vulnerable programs that got exploited, the gateway computer is fine, but, I became unable to connect to the internet on the Thinkpad. The computer at first had limited to no connectivity. After trying a few things it now is constantly acquiring network address. When I try to repair, it says it is unable to be done because my i.p. address cant be renewed. When I try to renew the i.p. address through cmd, there is a message that there is a problem with rpc. I received more instruction here to run Security Check, Malware bytes, GMER and Super Anti-Spyware. I was able to do so by saving those programs to a flash drive on the gateway and then running them on the Thinkpad. I have attached the gmer log. DDS freezes every time I try to use it, so I do not have a log. I was also instructed to post a link to the other topic I was receiving help in.

Original topic: http://www.bleepingcomputer.com/forums/topic431553.html


GMER 1.0.15.15641 - http://www.gmer.net
Rootkit scan 2011-12-16 14:59:02
Windows 5.1.2600 Service Pack 3 Harddisk0\DR0 -> \Device\Ide\IdeDeviceP0T0L0-3 HTS424040M9AT00 rev.MA2IA75A
Running: qmquzd01.exe; Driver: C:\DOCUME~1\Muzik\LOCALS~1\Temp\kgxdraoc.sys


---- System - GMER 1.0.15 ----

SSDT \??\C:\Program Files\SUPERAntiSpyware\SASKUTIL.SYS (SASKUTIL.SYS/SUPERAdBlocker.com and SUPERAntiSpyware.com) ZwTerminateProcess [0xF0C11640]

---- Devices - GMER 1.0.15 ----

Device \FileSystem\Udfs \UdfsCdRom tfsnifs.sys (Drive Letter Access Component/Sonic Solutions)
Device \FileSystem\Udfs \UdfsDisk tfsnifs.sys (Drive Letter Access Component/Sonic Solutions)
Device \FileSystem\Fastfat \Fat EF96FD20

AttachedDevice \FileSystem\Fastfat \Fat fltmgr.sys (Microsoft Filesystem Filter Manager/Microsoft Corporation)

---- Files - GMER 1.0.15 ----

File C:\WINDOWS\$NtUninstallKB20396$\2194984312 0 bytes
File C:\WINDOWS\$NtUninstallKB20396$\2194984312\@ 2048 bytes
File C:\WINDOWS\$NtUninstallKB20396$\2194984312\bckfg.tmp 851 bytes
File C:\WINDOWS\$NtUninstallKB20396$\2194984312\cfg.ini 208 bytes
File C:\WINDOWS\$NtUninstallKB20396$\2194984312\Desktop.ini 4608 bytes
File C:\WINDOWS\$NtUninstallKB20396$\2194984312\keywords 128 bytes
File C:\WINDOWS\$NtUninstallKB20396$\2194984312\kwrd.dll 223744 bytes
File C:\WINDOWS\$NtUninstallKB20396$\2194984312\L 0 bytes
File C:\WINDOWS\$NtUninstallKB20396$\2194984312\L\mfwcsudd 138496 bytes
File C:\WINDOWS\$NtUninstallKB20396$\2194984312\lsflt7.ver 5176 bytes
File C:\WINDOWS\$NtUninstallKB20396$\2194984312\U 0 bytes
File C:\WINDOWS\$NtUninstallKB20396$\2194984312\U\00000001.@ 2048 bytes
File C:\WINDOWS\$NtUninstallKB20396$\2194984312\U\00000002.@ 224768 bytes
File C:\WINDOWS\$NtUninstallKB20396$\2194984312\U\00000004.@ 1024 bytes
File C:\WINDOWS\$NtUninstallKB20396$\2194984312\U\80000000.@ 1024 bytes
File C:\WINDOWS\$NtUninstallKB20396$\2194984312\U\80000004.@ 12800 bytes
File C:\WINDOWS\$NtUninstallKB20396$\2194984312\U\80000032.@ 98304 bytes
File C:\WINDOWS\$NtUninstallKB20396$\3219675692 0 bytes

---- EOF - GMER 1.0.15 ----




BC AdBot (Login to Remove)

 


#2 HelpBot

HelpBot

    Bleepin' Binary Bot


  • Bots
  • 12,600 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:04:38 PM

Posted 27 December 2011 - 02:10 PM

Hello and welcome to Bleeping Computer!

I am HelpBot: an automated program designed to help the Bleeping Computer Staff better assist you! This message contains very important information, so please read through all of it before doing anything.

We apologize for the delay in responding to your request for help. Here at Bleeping Computer we get overwhelmed at times, and we are trying our best to keep up. Please note that your topic was not intentionally overlooked. Our mission is to help everyone in need, but sometimes it takes just a little longer to get to every request for help. No one is ignored here.

To help Bleeping Computer better assist you please perform the following steps:

***************************************************

Posted Image In order to continue receiving help at BleepingComputer.com, YOU MUST tell me if you still need help or if your issue has already been resolved on your own or through another resource! To tell me this, please click on the following link and follow the instructions there.

CLICK THIS LINK >>> http://www.bleepingcomputer.com/logreply/433686 <<< CLICK THIS LINK



If you no longer need help, then all you needed to do was the previous instructions of telling me so. You can skip the rest of this post. If you do need help please continue with Step 2 below.

***************************************************

Posted Image If you still need help, I would like you to post a Reply to this topic (click the "Add Reply" button in the lower right hand of this page). In that reply, please include the following information:

  • If you have not done so already, include a clear description of the problems you're having, along with any steps you may have performed so far.
  • A new DDS and GMER log. For your convenience, you will find the instructions for generating these logs repeated at the bottom of this post.
    • Please do this even if you have previously posted logs for us.
    • If you were unable to produce the logs originally please try once more.
    • If you are unable to create a log please provide detailed information about your installed Windows Operating System including the Version, Edition and if it is a 32bit or a 64bit system.
    • If you are unsure about any of these characteristics just post what you can and we will guide you.
  • Please tell us if you have your original Windows CD/DVD available.
  • Upon completing the above steps and posting a reply, another staff member will review your topic and do their best to resolve your issues.

Thank you for your patience, and again sorry for the delay.

***************************************************

We need to see some information about what is happening in your machine. Please perform the following scan again:

  • Download DDS by sUBs from one of the following links if you no longer have it available. Save it to your desktop.
  • Double click on the DDS icon, allow it to run.
  • A small box will open, with an explanation about the tool. No input is needed, the scan is running.
  • Notepad will open with the results.
  • Follow the instructions that pop up for posting the results.
  • Close the program window, and delete the program from your desktop.
Please note: You may have to disable any script protection running if the scan fails to run. After downloading the tool, disconnect from the internet and disable all antivirus protection. Run the scan, enable your A/V and reconnect to the internet.

Information on A/V control HERE


We also need a new log from the GMER anti-rootkit Scanner.

Please note that if you are running a 64-bit version of Windows you will not be able to run GMER and you may skip this step.

Please first disable any CD emulation programs using the steps found in this topic:

Why we request you disable CD Emulation when receiving Malware Removal Advice


Then create another GMER log and post it as an attachment to the reply where you post your new DDS log. Instructions on how to properly create a GMER log can be found here:

How to create a GMER log


As I am just a silly little program running on the BleepingComputer.com servers, please do not send me private messages as I do not know how to read and reply to them! Thanks!

#3 Passion4Muzik

Passion4Muzik
  • Topic Starter

  • Members
  • 152 posts
  • OFFLINE
  •  
  • Local time:03:38 PM

Posted 27 December 2011 - 08:31 PM

I do not have any Windows discs available.

I am using a gateway computer that isn't infected to type. My issue started when I was browsing with an IBM Thinkpad and I got the fake anti-virus (the sort of thing I've gotten before). I immeditely went to proceses and noticed something called ping.exe that was using a lot of memory. I would end the process and it would reappear a few seconds later. I ran malware bytes but it didn't find anything. I ran Norton Power Eraser and it found something and required a reboot. After a reboot, I still had the infection. I tried system restore and it froze every time and did not complete. I tried registry cleaners that didn't solve the issue. I posted here and after trying more things on the Thinkpad, simultaneously the gateway computer became infected (it seems it was a website I visited) and after a scan, a system restore and updating vulnerable programs that got exploited, the gateway computer is fine, but, I became unable to connect to the internet on the Thinkpad. The computer at first had limited to no connectivity. After trying a few things it now is constantly acquiring network address. When I try to repair, it says it is unable to be done because my i.p. address cant be renewed. When I try to renew the i.p. address through cmd, there is a message that there is a problem with rpc. I received more instruction here to run Security Check, Malware bytes, GMER and Super Anti-Spyware. I was able to do so by saving those programs to a flash drive on the gateway and then running them on the Thinkpad. I have attached the gmer log. DDS freezes every time I try to use it, so I do not have a log. I was also instructed to post a link to the other topic I was receiving help in.

Original topic: http://www.bleepingcomputer.com/forums/topic431553.html


GMER 1.0.15.15641 - http://www.gmer.net
Rootkit scan 2011-12-28 10:00:18
Windows 5.1.2600 Service Pack 3 Harddisk0\DR0 -> \Device\Ide\IdeDeviceP0T0L0-3 HTS424040M9AT00 rev.MA2IA75A
Running: qmquzd01.exe; Driver: C:\DOCUME~1\Muzik\LOCALS~1\Temp\kgxdraoc.sys


---- Devices - GMER 1.0.15 ----

Device \FileSystem\Udfs \UdfsCdRom tfsnifs.sys (Drive Letter Access Component/Sonic Solutions)
Device \FileSystem\Udfs \UdfsDisk tfsnifs.sys (Drive Letter Access Component/Sonic Solutions)
Device \FileSystem\Fastfat \Fat EEB43D20

AttachedDevice \FileSystem\Fastfat \Fat fltmgr.sys (Microsoft Filesystem Filter Manager/Microsoft Corporation)

---- Files - GMER 1.0.15 ----

File C:\WINDOWS\$NtUninstallKB20396$\2194984312 0 bytes
File C:\WINDOWS\$NtUninstallKB20396$\2194984312\@ 2048 bytes
File C:\WINDOWS\$NtUninstallKB20396$\2194984312\bckfg.tmp 851 bytes
File C:\WINDOWS\$NtUninstallKB20396$\2194984312\cfg.ini 208 bytes
File C:\WINDOWS\$NtUninstallKB20396$\2194984312\Desktop.ini 4608 bytes
File C:\WINDOWS\$NtUninstallKB20396$\2194984312\keywords 128 bytes
File C:\WINDOWS\$NtUninstallKB20396$\2194984312\kwrd.dll 223744 bytes
File C:\WINDOWS\$NtUninstallKB20396$\2194984312\L 0 bytes
File C:\WINDOWS\$NtUninstallKB20396$\2194984312\L\mfwcsudd 138496 bytes
File C:\WINDOWS\$NtUninstallKB20396$\2194984312\lsflt7.ver 5176 bytes
File C:\WINDOWS\$NtUninstallKB20396$\2194984312\U 0 bytes
File C:\WINDOWS\$NtUninstallKB20396$\2194984312\U\00000001.@ 2048 bytes
File C:\WINDOWS\$NtUninstallKB20396$\2194984312\U\00000002.@ 224768 bytes
File C:\WINDOWS\$NtUninstallKB20396$\2194984312\U\00000004.@ 1024 bytes
File C:\WINDOWS\$NtUninstallKB20396$\2194984312\U\80000000.@ 1024 bytes
File C:\WINDOWS\$NtUninstallKB20396$\2194984312\U\80000004.@ 12800 bytes
File C:\WINDOWS\$NtUninstallKB20396$\2194984312\U\80000032.@ 98304 bytes
File C:\WINDOWS\$NtUninstallKB20396$\3219675692 0 bytes

---- EOF - GMER 1.0.15 ----

Edited by Passion4Muzik, 28 December 2011 - 11:31 AM.


#4 CatByte

CatByte

    bleepin' tiger


  • Malware Response Team
  • 14,664 posts
  • OFFLINE
  •  
  • Gender:Not Telling
  • Location:Canada
  • Local time:04:38 PM

Posted 28 December 2011 - 08:38 PM

Hi,

Please do the following:

Download ComboFix from one of the following locations:
Link 1
Link 2

VERY IMPORTANT !!! Save ComboFix.exe to your Desktop

* IMPORTANT - Disable your AntiVirus and AntiSpyware applications, usually via a right click on the System Tray icon. They may otherwise interfere with our tools. If you have difficulty properly disabling your protective programs, refer to this link here
  • Double click on ComboFix.exe & follow the prompts.
As part of it's process, ComboFix will check to see if the Microsoft Windows Recovery Console is installed. With malware infections being as they are today, it's strongly recommended to have this pre-installed on your machine before doing any malware removal. It will allow you to boot up into a special recovery/repair mode that will allow us to more easily help you should your computer have a problem after an attempted removal of malware.

  • Follow the prompts to allow ComboFix to download and install the Microsoft Windows Recovery Console, and when prompted, agree to the End-User License Agreement to install the Microsoft Windows Recovery Console.
**Please note: If the Microsoft Windows Recovery Console is already installed, ComboFix will continue it's malware removal procedures.

Posted Image

  • Once the Microsoft Windows Recovery Console is installed using ComboFix, you should see the following message:

Posted Image

  • Click on Yes, to continue scanning for malware.
When finished, it shall produce a log for you. Please include the C:\ComboFix.txt in your next reply.
Notes:
1. Do not mouse-click Combofix's window while it is running. That may cause it to stall.
2. Do not "re-run" Combofix. If you have a problem, reply back for further instructions.

Microsoft MVP - 2010, 2011, 2012, 2013, 2014, 2015


#5 Passion4Muzik

Passion4Muzik
  • Topic Starter

  • Members
  • 152 posts
  • OFFLINE
  •  
  • Local time:03:38 PM

Posted 30 December 2011 - 10:47 AM

When I first run ComboFix, I get a message stating: combofix has detected the following scanners to be active: Spyware Docor with Anti-virus. I do not know what that is and did a search that went over three hours without finding a progam with that name. I continued with the ComboFix can.

Since not being able to connect to the internet is the issue I'm having, the Windows Recovery Console was unable to be installed on the computer. I continued with the scan.

It took hours to get the message: You are infected with a Rootkit.ZeroAccess! It has inserted itself into the tcp/ip stac. This is a particularly difficult infection. If for any reason that you're unable to connect to the internet after running ComboFix. REboot once and see if that fixes it. If it's not fixed, run ComboFix one more time.

I pressed "ok" and after a few minutes I got another message stating: Rootkit is detected, be patient as this may take some moments. I pressed "ok" and got the previous message. I pressed "ok" again, got another message, but when I pressed "ok" the last time, my computer froze. I waited a few hours to see if anything would change but it did not.

When I rebooted Windows SEcurity center icon showed up in task bar when it had previously not being doing so. When I opened it, my firewall was disabled and I am unable to enable it. I get a message stating: Windows Firewall settings cannot be displayed because the associated service is not running. Do you want to start the Windows Firewall/Internet Connection Sharing (ICS) service? If I press yes, a message states: Windows cannot start the Windows Firewall/Internet Connection Sharing (ICS) service. Also in the Windows Security Center, under "Virus Protection" it says "Spyware Doctor with AntiVirus reports that it is up to date and virus scanning is on. Antivirus software helps protect your computer against viruses and other security threats."

I rebooted again and ran ComboFix and got to the "rootkit detected" messages again and I did not press "ok". The messages alternated by themselves and when the last message showed up it did not go away, but the time on my computer kept going so I knew my computer wasn't frozen. After hours and hours nothing still changed, but the time kept going so I went to bed. When I woke up this morning I saw that the time stopped on the computer at around 3 a.m. I tried ComboFix again in safe mode with networking and it froze again.



#6 CatByte

CatByte

    bleepin' tiger


  • Malware Response Team
  • 14,664 posts
  • OFFLINE
  •  
  • Gender:Not Telling
  • Location:Canada
  • Local time:04:38 PM

Posted 30 December 2011 - 11:06 AM

Ok,

making progress

try running combofix once more by starting it with this command:

Press the WinKey + R to open a run box:

Copy/paste the following text into the open run box > Click OK

ComboFix /nombr

Microsoft MVP - 2010, 2011, 2012, 2013, 2014, 2015


#7 Passion4Muzik

Passion4Muzik
  • Topic Starter

  • Members
  • 152 posts
  • OFFLINE
  •  
  • Local time:03:38 PM

Posted 30 December 2011 - 02:03 PM

Should it be run in safe mode with networking, safe mode, or regular mode? Does it matter? When I get the messages with "ok", should I press okay or leave it alone?

#8 CatByte

CatByte

    bleepin' tiger


  • Malware Response Team
  • 14,664 posts
  • OFFLINE
  •  
  • Gender:Not Telling
  • Location:Canada
  • Local time:04:38 PM

Posted 30 December 2011 - 06:02 PM

try it in normal mode with the /nombr switch

if it still wont run, try it in safe mode with networking,

Hit OK every time a window appears and you have that option

To Enter Safemode
  • Go to Start> Shut off your Computer> Restart
  • As the computer starts to boot-up, Tap the F8 KEY repeatedly,
  • this will bring up a menu.
  • Use the Up and Down Arrow Keys to scroll up to Safemode with networking
  • Then press the Enter Key on your Keyboard
  • go into your usual account

Microsoft MVP - 2010, 2011, 2012, 2013, 2014, 2015


#9 Passion4Muzik

Passion4Muzik
  • Topic Starter

  • Members
  • 152 posts
  • OFFLINE
  •  
  • Local time:03:38 PM

Posted 30 December 2011 - 10:30 PM

ComboFix 11-12-29.01 - Muzik 12/30/2011 20:19:50.1.1 - x86
Microsoft Windows XP Home Edition 5.1.2600.3.1252.1.1033.18.246.70 [GMT -6:00]
Running from: F:\ComboFix.exe
Command switches used :: /nombr
AV: Bitdefender Antivirus *Disabled/Outdated* {6C4BB89C-B0ED-4F41-A29C-4373888923BB}
AV: Spyware Doctor with AntiVirus *Enabled/Updated* {D3C23B96-C9DC-477F-8EF1-69AF17A6EFF6}
FW: Bitdefender Firewall *Disabled* {4055920F-2E99-48A8-A270-4243D2B8F242}
.
.
((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.
.
c:\documents and settings\All Users\Application Data\TEMP
c:\documents and settings\LocalService\Local Settings\Temporary Internet Files\CPV.stt
c:\documents and settings\Muzik\Application Data\Adobe\plugs
c:\documents and settings\Muzik\Application Data\Adobe\shed
c:\documents and settings\Muzik\Local Settings\Application Data\dflv.exe
c:\documents and settings\Muzik\Local Settings\Application Data\oxad.exe
c:\documents and settings\Muzik\Local Settings\Application Data\pmkj.exe
c:\documents and settings\Muzik\Local Settings\Application Data\puxy.exe
c:\documents and settings\Muzik\Start Menu\Programs\Defragmenter
c:\documents and settings\Muzik\Templates\670628q6f302w247t331k5hme2m7
c:\program files\Common Files\fnts~1
c:\windows\{2521BB91-29B1-4d7e-9137-AC9875D77735}
c:\windows\regedit.com
c:\windows\system32\
c:\windows\system32\11478.exe
c:\windows\system32\15724.exe
c:\windows\system32\16827.exe
c:\windows\system32\18467.exe
c:\windows\system32\19169.exe
c:\windows\system32\23281.exe
c:\windows\system32\24464.exe
c:\windows\system32\26500.exe
c:\windows\system32\26962.exe
c:\windows\system32\28145.exe
c:\windows\system32\29358.exe
c:\windows\system32\5705.exe
c:\windows\system32\6334.exe
c:\windows\system32\pwdmon.dll
c:\windows\system32\SET71.tmp
c:\windows\system32\SET73.tmp
c:\windows\system32\SET78.tmp
c:\windows\system32\SET7F.tmp
c:\windows\system32\SET81.tmp
c:\windows\system32\SET88.tmp
c:\windows\system32\SET89.tmp
c:\windows\system32\SET8A.tmp
c:\windows\system32\SET8D.tmp
c:\windows\system32\SETF4.tmp
c:\windows\system32\stem32~1
c:\windows\system32\win32x.exe
.
Infected copy of c:\windows\system32\drivers\atapi.sys was found and disinfected
Restored copy from - The cat found it :)
c:\windows\system32\drivers\afd.sys was missing
Restored copy from - c:\windows\system32\dllcache\afd.sys
.
.
((((((((((((((((((((((((( Files Created from 2011-11-28 to 2011-12-31 )))))))))))))))))))))))))))))))
.
.
2011-12-31 02:41 . 2008-04-13 19:19 138112 ----a-w- c:\windows\system32\drivers\afd.sys
2011-12-31 02:41 . 2008-04-13 19:19 138112 ----a-w- c:\windows\system32\dllcache\afd.sys
2011-12-30 16:26 . 2001-08-18 04:36 7168 ----a-w- c:\windows\system32\dllcache\EXCH_snprfdll.dll
2011-12-30 16:26 . 2001-08-18 04:36 12288 ----a-w- c:\windows\system32\dllcache\EXCH_smtpctrs.dll
2011-12-30 16:25 . 2001-08-18 04:36 26112 ----a-w- c:\windows\system32\dllcache\EXCH_seos.dll
2011-12-30 16:25 . 2001-08-18 04:36 57856 ----a-w- c:\windows\system32\dllcache\EXCH_scripto.dll
2011-12-30 16:24 . 2001-08-18 04:36 23040 ----a-w- c:\windows\system32\dllcache\EXCH_regtrace.exe
2011-12-30 16:23 . 2001-08-18 04:36 38912 ----a-w- c:\windows\system32\dllcache\EXCH_ntfsdrv.dll
2011-12-30 16:21 . 2001-08-17 20:00 2944 ----a-w- c:\windows\system32\dllcache\msmpu401.sys
2011-12-30 16:21 . 2008-04-13 18:54 22016 ----a-w- c:\windows\system32\dllcache\msircomm.sys
2011-12-30 16:21 . 2001-08-18 12:00 98304 ----a-w- c:\windows\system32\dllcache\msir3jp.dll
2011-12-30 16:21 . 2001-08-17 20:02 35200 ----a-w- c:\windows\system32\dllcache\msgame.sys
2011-12-30 16:21 . 2001-08-17 19:48 6016 ----a-w- c:\windows\system32\dllcache\msfsio.sys
2011-12-30 16:21 . 2008-04-13 18:46 51200 ----a-w- c:\windows\system32\dllcache\msdv.sys
2011-12-30 16:21 . 2008-04-13 18:46 15232 ----a-w- c:\windows\system32\dllcache\mpe.sys
2011-12-30 16:21 . 2001-08-17 19:57 16128 ----a-w- c:\windows\system32\dllcache\modemcsa.sys
2011-12-30 16:19 . 2008-04-14 00:09 6144 ----a-w- c:\windows\system32\dllcache\kbd106.dll
2011-12-30 16:18 . 2008-04-14 00:11 702845 ----a-w- c:\windows\system32\dllcache\i81xdnt5.dll
2011-12-30 16:17 . 2001-08-17 19:51 17408 ----a-w- c:\windows\system32\dllcache\gpr400.sys
2011-12-30 16:16 . 2001-08-17 19:50 144896 ----a-w- c:\windows\system32\dllcache\epcfw2k.sys
2011-12-30 16:15 . 2001-08-18 04:36 65622 ----a-w- c:\windows\system32\dllcache\digiasyn.dll
2011-12-30 16:14 . 2001-08-18 12:00 1677824 ----a-w- c:\windows\system32\dllcache\chsbrkr.dll
2011-12-30 16:13 . 2001-08-17 19:12 60416 ----a-w- c:\windows\system32\dllcache\brserwdm.sys
2011-12-30 16:12 . 2001-08-18 04:36 5632 ----a-w- c:\windows\system32\dllcache\EXCH_adsiisex.dll
2011-12-30 16:11 . 2001-08-23 15:26 13107200 ----a-w- c:\windows\system32\oembios.bin
2011-12-30 13:37 . 2008-04-13 18:40 96512 ----a-w- c:\windows\system32\drivers\atapi.sys
2011-12-16 13:21 . 2011-12-16 13:21 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
2011-12-16 13:21 . 2011-08-31 23:00 22216 ----a-w- c:\windows\system32\drivers\mbam.sys
2011-12-16 12:32 . 2011-12-16 12:32 -------- d-----w- c:\documents and settings\Muzik\Application Data\SUPERAntiSpyware.com
2011-12-16 12:31 . 2011-12-16 12:32 -------- d-----w- c:\program files\SUPERAntiSpyware
2011-12-16 12:31 . 2011-12-16 12:31 -------- d-----w- c:\documents and settings\All Users\Application Data\SUPERAntiSpyware.com
2011-12-11 12:27 . 2011-12-11 10:53 -------- d-----w- C:\Temp
2011-12-11 06:14 . 2011-12-14 02:48 -------- d-----w- c:\program files\Eusing Free Registry Cleaner
2011-12-10 22:52 . 2011-12-11 00:07 -------- d-----w- c:\documents and settings\Clean
2011-12-10 17:56 . 2011-12-10 17:56 -------- d-----w- c:\documents and settings\NetworkService\Application Data\IEPro
2011-12-09 19:25 . 2011-12-09 19:25 -------- d-sh--w- c:\documents and settings\NetworkService\PrivacIE
.
.
.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2011-11-01 13:00 . 2011-11-01 13:00 1409 ----a-w- c:\windows\QTFont.for
2011-10-18 07:39 . 1980-01-01 08:00 162816 ----a-w- c:\windows\system32\drivers\netbt.sys
2011-10-10 14:22 . 2003-02-21 17:26 692736 ----a-w- c:\windows\system32\inetcomm.dll
.
.
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"NUSB3MON"="c:\program files\Renesas Electronics\USB 3.0 Host Controller Driver\Application\nusb3mon.exe" [2010-11-17 113288]
.
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\RunOnce]
"FlashPlayerUpdate"="c:\windows\system32\Macromed\Flash\FlashUtil10t_ActiveX.exe" [2011-06-19 240288]
.
[hkey_local_machine\software\microsoft\windows\currentversion\explorer\ShellExecuteHooks]
"{5AE067D3-9AFB-48E0-853A-EBB7F4A000DA}"= "c:\program files\SUPERAntiSpyware\SASSEH.DLL" [2011-07-19 113024]
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\!SASWinLogon]
2011-05-04 17:54 551296 ----a-w- c:\program files\SUPERAntiSpyware\SASWINLO.DLL
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\QConGina]
2004-08-18 11:30 258048 ----a-w- c:\windows\system32\QConGina.dll
.
[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\session manager]
BootExecute REG_MULTI_SZ autocheck msln\0autocheck autochk *
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\!SASCORE]
@=""
.
[HKLM\~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^Digital Line Detect.lnk]
backup=c:\windows\pss\Digital Line Detect.lnkCommon Startup
.
[HKLM\~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^Icatch(VI) SnapDetect.lnk]
backup=c:\windows\pss\Icatch(VI) SnapDetect.lnkCommon Startup
HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\B Register C:
HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\B Register C:\Program Files
HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\B Register c:\program files\DivX
HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\B Register c:\program files\DivX\DivX Plus Player
HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\B Register c:\program files\DivX\DivX Plus Player\DPXPlugins
HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\B Register c:\program files\DivX\DivX Plus Player\DSEPlugins
HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\BDAgent
HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\BitDefender Antiphishing Helper
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\KernelFaultCheck]
c:\windows\system32\dumprep 0 -k [X]
HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\mjc
HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\mwir
HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\NAV CfgWiz
HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Sakora
HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Security Protection
HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\SfKg6wIP
HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\SpeedRunner
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\UserFaultCheck]
c:\windows\system32\dumprep 0 -u [X]
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Adobe ARM]
2011-03-30 17:29 937920 ----a-w- c:\program files\Common Files\Adobe\ARM\1.0\AdobeARM.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Adobe Reader Speed Launcher]
2011-01-30 15:45 35736 -c--a-w- c:\program files\Adobe\Reader 10.0\Reader\reader_sl.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\B Register c:\program files\DivX\DivX Plus Player\DPXPlugins\DPXBannerAdPlugin.dll]
2010-11-12 00:34 86016 ----a-w- c:\program files\DivX\DivX Plus Player\DPXPlugins\DPXBannerAdPlugin.dll
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\B Register c:\program files\DivX\DivX Plus Player\DPXPlugins\DPXDFXAudioPlugin.dll]
2010-06-29 19:13 155136 ----a-w- c:\program files\DivX\DivX Plus Player\DPXPlugins\DPXDFXAudioPlugin.dll
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\B Register c:\program files\DivX\DivX Plus Player\DPXPlugins\DPXDownloadManagerPlugin.dll]
2010-11-12 00:34 63488 ----a-w- c:\program files\DivX\DivX Plus Player\DPXPlugins\DPXDownloadManagerPlugin.dll
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\B Register c:\program files\DivX\DivX Plus Player\DPXPlugins\DPXMediaManagerPlugin.dll]
2010-11-12 00:34 319488 ----a-w- c:\program files\DivX\DivX Plus Player\DPXPlugins\DPXMediaManagerPlugin.dll
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\B Register c:\program files\DivX\DivX Plus Player\DPXPlugins\DPXPlayerPlugin.dll]
2010-11-12 00:34 1089536 ----a-w- c:\program files\DivX\DivX Plus Player\DPXPlugins\DPXPlayerPlugin.dll
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\B Register c:\program files\DivX\DivX Plus Player\DSEPlugins\DivXPlaybackModule.dll]
2010-11-12 00:19 1966080 ----a-w- c:\program files\DivX\DivX Plus Player\DSEPlugins\DivXPlaybackModule.dll
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\BMMLREF]
2004-07-29 09:37 20480 -c--a-w- c:\program files\ThinkPad\Utilities\BMMLREF.EXE
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\BMMMONWND]
2004-07-29 09:37 395776 -c--a-w- c:\progra~1\ThinkPad\UTILIT~1\BATINFEX.DLL
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\DivXUpdate]
2010-09-16 20:04 1164584 ----a-w- c:\program files\DivX\DivX Update\DivXUpdate.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\dla]
2004-09-02 09:05 127035 -c--a-w- c:\windows\system32\dla\tfswctrl.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\EZEJMNAP]
2003-12-25 10:04 208896 -c--a-w- c:\progra~1\ThinkPad\UTILIT~1\EzEjMnAp.Exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\HotKeysCmds]
2004-07-30 18:59 118784 ----a-w- c:\windows\system32\hkcmd.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\ibmmessages]
2004-07-22 10:01 442368 -c--a-w- c:\program files\IBM\Messages By IBM\ibmmessages.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\IBMPRC]
2004-03-19 20:12 90112 -c--a-w- c:\ibmtools\utils\ibmprc.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\IgfxTray]
2004-07-30 19:03 155648 ----a-w- c:\windows\system32\igfxtray.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Messenger (Yahoo!)]
2010-06-01 15:17 5252408 ----a-w- c:\progra~1\Yahoo!\MESSEN~1\YahooMessenger.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\MSMSGS]
2008-04-14 00:12 1695232 ----a-w- c:\program files\Messenger\msmsgs.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Pando]
2010-08-20 14:23 4954008 ----a-w- c:\program files\Pando Networks\Pando\pando.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\QCWLIcon]
2004-08-18 11:30 81920 -c--a-w- c:\progra~1\ThinkPad\CONNEC~1\QCWLICON.EXE
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\QuickTime Task]
2006-03-11 05:57 155648 ----a-w- c:\program files\QuickTime\qttask.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\S3TRAY2]
2001-10-12 07:32 69632 ----a-w- c:\windows\system32\S3Tray2.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\SSC_UserPrompt]
2004-08-06 01:23 218240 -c--a-w- c:\program files\Common Files\Symantec Shared\Security Center\UsrPrmpt.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\SunJavaUpdateSched]
2008-06-10 11:27 144784 -c--a-w- c:\program files\Java\jre1.6.0_07\bin\jusched.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\TkBellExe]
2009-03-25 18:31 198160 ----a-w- c:\program files\Common Files\Real\Update_OB\realsched.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\TP4EX]
2002-09-04 09:05 53248 ----a-w- c:\windows\system32\TP4EX.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\TPHOTKEY]
2004-08-07 03:26 94208 -c--a-w- c:\progra~1\ThinkPad\PkgMgr\HOTKEY\TPHKMGR.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\TrackPointSrv]
2003-11-13 11:12 94208 ----a-w- c:\windows\system32\tp4serv.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\UC_Start]
2004-06-25 23:39 36864 -c--a-w- c:\program files\IBM\Updater\ucstartup.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\UpdateManager]
2003-08-19 09:01 110592 -c--a-w- c:\program files\Common Files\Sonic\Update Manager\sgtray.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Yahoo! Pager]
2010-06-01 15:17 5252408 ----a-w- c:\program files\Yahoo!\Messenger\YahooMessenger.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\services]
"LIVESRV"=2 (0x2)
"ccPwdSvc"=3 (0x3)
"ccEvtMgr"=2 (0x2)
.
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]
"EnableFirewall"= 0 (0x0)
"DisableNotifications"= 1 (0x1)
.
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%ProgramFiles%\\IBM\\Updater\\jre\\bin\\javaw.exe"=
"%ProgramFiles%\\IBM\\Updater\\jre\\bin\\java.exe"=
"%windir%\\system32\\sessmgr.exe"=
"c:\\Program Files\\IBM\\Updater\\jre\\bin\\java.exe"=
"c:\\Program Files\\IBM\\Updater\\jre\\bin\\javaw.exe"=
"c:\\Program Files\\Messenger\\msmsgs.exe"=
"c:\\Program Files\\Common Files\\AOL\\Loader\\aolload.exe"=
"c:\\Program Files\\Yahoo!\\Messenger\\YahooMessenger.exe"=
"c:\\Program Files\\AIM6\\aim6.exe"=
"c:\\Program Files\\IBM\\Updater\\ucsmb.exe"=
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"c:\\Program Files\\IEPro\\MiniDM.exe"=
"c:\\WINDOWS\\system32\\dpvsetup.exe"=
"c:\\Program Files\\Pando Networks\\Pando\\Pando.exe"=
.
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\GloballyOpenPorts\List]
"56701:TCP"= 56701:TCP:Pando
"56701:UDP"= 56701:UDP:Pando
.
R1 SASDIFSV;SASDIFSV;c:\program files\SUPERAntiSpyware\sasdifsv.sys [7/22/2011 10:27 AM 12880]
R1 SASKUTIL;SASKUTIL;c:\program files\SUPERAntiSpyware\SASKUTIL.SYS [7/12/2011 3:55 PM 67664]
R1 TPPWR;TPPWR;c:\windows\system32\drivers\TPPWR.SYS [9/8/2005 12:42 PM 16384]
S0 SMR210;Symantec SMR Utility Service 2.1.0;c:\windows\system32\drivers\SMR210.SYS --> c:\windows\system32\drivers\SMR210.SYS [?]
S1 SABKUTIL;SABKUTIL;\??\c:\program files\SuperAdBlocker.com\Super Ad Blocker\SABKUTIL.sys --> c:\program files\SuperAdBlocker.com\Super Ad Blocker\SABKUTIL.sys [?]
S3 MBAMSwissArmy;MBAMSwissArmy;\??\c:\windows\system32\drivers\mbamswissarmy.sys --> c:\windows\system32\drivers\mbamswissarmy.sys [?]
S3 QCNDISIF;QCNDISIF;c:\windows\system32\drivers\qcndisif.sys [9/8/2005 12:39 PM 12288]
S3 Tp4Track;IBM PS/2 TrackPoint Driver;c:\windows\system32\drivers\tp4track.sys [11/13/2003 5:12 AM 13904]
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\svchost]
xmlpros REG_MULTI_SZ XMLProvS
.
Contents of the 'Scheduled Tasks' folder
.
.
------- Supplementary Scan -------
.
uStart Page = about:blank
mSearch Bar = hxxp://us.rd.yahoo.com/customize/ie/defaults/sb/msgr8/*http://www.yahoo.com/ext/search/search.html
Trusted Zone: televisionwithoutpity.com\forums
TCP: DhcpNameServer = 24.217.0.5 24.217.201.67 68.113.206.10
DPF: {D71F9A27-723E-4B8B-B428-B725E47CBA3E} - hxxp://imikimi.com/download/imikimi_plugin.cab
FF - ProfilePath - c:\documents and settings\Muzik\Application Data\Mozilla\Firefox\Profiles\0qziu42i.default\
FF - prefs.js: browser.startup.homepage - www.yahoo.com
FF - prefs.js: network.proxy.type - 4
FF - Ext: Default: {972ce4c6-7e08-4474-a285-3208198ce6fd} - c:\program files\Mozilla Firefox\extensions\{972ce4c6-7e08-4474-a285-3208198ce6fd}
FF - Ext: Microsoft .NET Framework Assistant: {20a82645-c095-46ed-80e3-08825760534b} - %profile%\extensions\{20a82645-c095-46ed-80e3-08825760534b}
FF - Ext: Yahoo! Toolbar: {635abd67-4fe9-1b23-4f01-e679fa7484c1} - %profile%\extensions\{635abd67-4fe9-1b23-4f01-e679fa7484c1}
FF - Ext: RealPlayer Browser Record Plugin: {ABDE892B-13A8-4d1b-88E6-365A6E755758} - c:\program files\Real\RealPlayer\browserrecord
FF - Ext: Microsoft .NET Framework Assistant: {20a82645-c095-46ed-80e3-08825760534b} - c:\windows\Microsoft.NET\Framework\v3.5\Windows Presentation Foundation\DotNetAssistantExtension
FF - Ext: XULRunner: {EB339A29-B883-4148-8F27-8C29D185B397} - c:\documents and settings\Muzik\Local Settings\Application Data\{EB339A29-B883-4148-8F27-8C29D185B397}
FF - user.js: yahoo.ytff.general.dontshowhpoffer - true
- - - - ORPHANS REMOVED - - - -
.
BHO-{633AAF91-7DD6-4638-A05E-89991D45478E} - (no file)
BHO-{A2659833-2AFF-7520-FF49-09A297EF4FC2} - (no file)
Notify-xmlproservice - xmlrpw32.dll
Notify-xmlrpw32 - xmlrpw32.dll
SafeBoot-08203005.sys
SafeBoot-57165910.sys
SafeBoot-71391059.sys
SafeBoot-83588412.sys
SafeBoot-93776077.sys
MSConfigStartUp-Nativemapaudio - c:\documents and settings\Muzik\Local Settings\Application Data\CdMousemon2\Nativemapaudio.dll
MSConfigStartUp-Rjago - c:\windows\ohatalajo.dll
MSConfigStartUp-smss32 - (no file)
.
.
.
**************************************************************************
.
catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2011-12-30 20:57
Windows 5.1.2600 Service Pack 3 NTFS
.
scanning hidden processes ...
.
scanning hidden autostart entries ...
.
scanning hidden files ...
.
scan completed successfully
hidden files: 0
.
**************************************************************************
.
--------------------- DLLs Loaded Under Running Processes ---------------------
.
- - - - - - - > 'winlogon.exe'(500)
c:\program files\SUPERAntiSpyware\SASWINLO.DLL
c:\windows\system32\WININET.dll
.
- - - - - - - > 'explorer.exe'(1820)
c:\windows\system32\WININET.dll
c:\windows\system32\webcheck.dll
c:\windows\system32\IEFRAME.dll
c:\windows\system32\WPDShServiceObj.dll
c:\windows\system32\PortableDeviceTypes.dll
c:\windows\system32\PortableDeviceApi.dll
.
------------------------ Other Running Processes ------------------------
.
c:\program files\SUPERAntiSpyware\SASCORE.EXE
c:\windows\Microsoft.NET\Framework\v3.0\Windows Communication Foundation\SMSvcHost.exe
c:\windows\system32\wscntfy.exe
.
**************************************************************************
.
Completion time: 2011-12-30 21:07:12 - machine was rebooted
ComboFix-quarantined-files.txt 2011-12-31 03:07
.
Pre-Run: 6,245,359,616 bytes free
Post-Run: 6,973,767,680 bytes free
.
- - End Of File - - FAEE8D43813F25955044E97862A40F40

#10 CatByte

CatByte

    bleepin' tiger


  • Malware Response Team
  • 14,664 posts
  • OFFLINE
  •  
  • Gender:Not Telling
  • Location:Canada
  • Local time:04:38 PM

Posted 30 December 2011 - 10:42 PM

Hi

Please run the following:

Please download GooredFix from one of the locations below and save it to your Desktop
Download Mirror #1
Download Mirror #2
  • Ensure all Firefox windows are closed.
  • To run the tool, double-click it
  • When prompted to run the scan, click Yes.
  • GooredFix will check for infections, and then a log will appear. Please post the contents of that log in your next reply (it can also be found on your desktop, called GooredFix.txt).


NEXT


  • Please open your MalwareBytes AntiMalware Program
  • Click the Update Tab and search for updates
  • If an update is found, it will download and install the latest version.
  • Once the program has loaded, select "Perform Quick Scan", then click Scan.
  • The scan may take some time to finish, so please be patient.
  • When the scan is complete, click OK, then Show Results to view the results.
  • Make sure that everything is checked, and click Remove Selected. <-- very important
  • When disinfection is completed, a log will open in Notepad and you may be prompted to Restart. (See Extra Note)
  • The log is automatically saved by MBAM and can be viewed by clicking the Logs tab in MBAM.
  • Copy&Paste the entire report in your next reply.

Extra Note:If MBAM encounters a file that is difficult to remove, you will be presented with 1 of 2 prompts, click OK to either and let MBAM proceed with the disinfection process, if asked to restart the computer, please do so immediately.



NEXT


Go here to run an online scanner from ESET.
  • Turn off the real time scanner of any existing antivirus program while performing the online scan
  • Tick the box next to YES, I accept the Terms of Use.
  • Click Start
  • When asked, allow the activeX control to install
  • Click Start
  • Make sure that the option Remove found threats is unticked and the Scan Archives option is ticked.
  • Click on Advanced Settings, ensure the options Scan for potentially unwanted applications, Scan for potentially unsafe applications, and Enable Anti-Stealth Technology are ticked.
  • Click Scan
  • Wait for the scan to finish
  • When the scan completes, press the LIST OF THREATS FOUND button
  • Press EXPORT TO TEXT FILE , name the file ESETSCAN and save it to your desktop
  • Include the contents of this report in your next reply.
  • Press the BACK button.
  • Press Finish

Microsoft MVP - 2010, 2011, 2012, 2013, 2014, 2015


#11 Passion4Muzik

Passion4Muzik
  • Topic Starter

  • Members
  • 152 posts
  • OFFLINE
  •  
  • Local time:03:38 PM

Posted 31 December 2011 - 12:39 AM

Here are the logs from GooredFix and Malwarebytes (which was outdated by 121 days since I can't connect to the internet for the update). I can't run the ESET scanner because I can't connect to the internet.

GooredFix by jpshortstuff (03.07.10.1)
Log created at 22:43 on 30/12/2011 (Muzik)
Firefox version 3.0.19 (en-US)

========== GooredScan ==========

Deleting HKEY_LOCAL_MACHINE\Software\Mozilla\Firefox\Extensions\\{EB339A29-B883-4148-8F27-8C29D185B397} -> Success!
Deleting C:\Documents and Settings\Muzik\Local Settings\Application Data\{EB339A29-B883-4148-8F27-8C29D185B397} -> Success!

========== GooredLog ==========

C:\Program Files\Mozilla Firefox\extensions\
{972ce4c6-7e08-4474-a285-3208198ce6fd} [08:12 09/08/2008]

C:\Documents and Settings\Muzik\Application Data\Mozilla\Firefox\Profiles\0qziu42i.default\extensions\
{20a82645-c095-46ed-80e3-08825760534b} [15:01 28/05/2010]
{635abd67-4fe9-1b23-4f01-e679fa7484c1} [02:21 07/06/2010]

[HKEY_LOCAL_MACHINE\Software\Mozilla\Firefox\Extensions]
"{ABDE892B-13A8-4d1b-88E6-365A6E755758}"="C:\Program Files\Real\RealPlayer\browserrecord" [18:32 25/03/2009]
"{20a82645-c095-46ed-80e3-08825760534b}"="c:\WINDOWS\Microsoft.NET\Framework\v3.5\Windows Presentation Foundation\DotNetAssistantExtension\" [08:13 21/08/2009]

-=E.O.F=-




Malwarebytes' Anti-Malware 1.51.2.1300
www.malwarebytes.org

Database version: 7622

Windows 5.1.2600 Service Pack 3
Internet Explorer 8.0.6001.18702

12/30/2011 11:13:04 PM
mbam-log-2011-12-30 (23-13-04).txt

Scan type: Quick scan
Objects scanned: 238758
Time elapsed: 26 minute(s), 26 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 0

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
(No malicious items detected)




#12 CatByte

CatByte

    bleepin' tiger


  • Malware Response Team
  • 14,664 posts
  • OFFLINE
  •  
  • Gender:Not Telling
  • Location:Canada
  • Local time:04:38 PM

Posted 31 December 2011 - 01:22 AM

Oh, my apologies, I misread your post and thought you had a connection

please run the following:


Please download Farbar Service Scanner and run it on the computer with the issue.
  • Make sure the following options are checked:
    • Internet Services
    • Windows Firewall
    • System Restore
  • Press "Scan".
  • It will create a log (FSS.txt) in the same directory the tool is run.
  • Please copy and paste the log to your reply.

Microsoft MVP - 2010, 2011, 2012, 2013, 2014, 2015


#13 Passion4Muzik

Passion4Muzik
  • Topic Starter

  • Members
  • 152 posts
  • OFFLINE
  •  
  • Local time:03:38 PM

Posted 31 December 2011 - 07:36 AM

Farbar Service Scanner
Ran by Muzik (administrator) on 31-12-2011 at 00:48:13
Microsoft Windows XP Home Edition Service Pack 3 (X86)
Boot Mode: Normal
****************************************************************

Internet Services:
============
Dhcp Service is not running. Checking service configuration:
The start type of Dhcp service is OK.
The ImagePath of Dhcp service is OK.
The ServiceDll of Dhcp service is OK.

afd Service is not running. Checking service configuration:
Checking Start type: Attention! Unable to retrieve start type of afd. The value does not exist.
Checking ImagePath: Attention! Unable to retrieve ImagePath of afd. The value does not exist.


Connection Status:
==============
Localhost is blocked.
There is no connection to network.
Attempt to access Google IP returned error: Other errors
Attempt to access Yahoo IP returend error: Other errors


Windows Firewall:
=============
sharedaccess Service is not running. Checking service configuration:
The start type of sharedaccess service is OK.
The ImagePath of sharedaccess service is OK.
The ServiceDll of sharedaccess service is OK.


Firewall Disabled Policy:
==================
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile]
"EnableFirewall"=DWORD:0
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile]
"EnableFirewall"=DWORD:0


System Restore:
============

System Restore Disabled Policy:
========================


File Check:
========
C:\windows\system32\dhcpcsvc.dll => MD5 is legit
C:\windows\system32\Drivers\afd.sys => MD5 is legit
C:\windows\system32\Drivers\netbt.sys => MD5 is legit
C:\windows\system32\Drivers\tcpip.sys => MD5 is legit
C:\windows\system32\Drivers\ipsec.sys => MD5 is legit
C:\windows\system32\dnsrslvr.dll => MD5 is legit
C:\windows\system32\ipnathlp.dll => MD5 is legit
C:\windows\system32\netman.dll => MD5 is legit
C:\windows\system32\wbem\WMIsvc.dll => MD5 is legit
C:\windows\system32\srsvc.dll => MD5 is legit
C:\windows\system32\Drivers\sr.sys => MD5 is legit
C:\windows\system32\svchost.exe => MD5 is legit
C:\windows\system32\rpcss.dll => MD5 is legit
C:\windows\system32\services.exe => MD5 is legit

Extra List:
=======
AegisP(10) Gpc(7) IPSec(5) NetBT(6) NwlnkIpx(3) NwlnkNb(12) PSched(8) s24trans(9) Tcpip(4) Tcpip6(2)
0x0C0000000100000005000000040000000B000000060000000700000008000000090000000A00000002000000030000000C000000

**** End of log ****



#14 CatByte

CatByte

    bleepin' tiger


  • Malware Response Team
  • 14,664 posts
  • OFFLINE
  •  
  • Gender:Not Telling
  • Location:Canada
  • Local time:04:38 PM

Posted 31 December 2011 - 11:02 AM

Hi

Please re-run Farbar Service Scanner

type the following into the search window:

afd

Now press the "export service" button

post the resulting log

Microsoft MVP - 2010, 2011, 2012, 2013, 2014, 2015


#15 Passion4Muzik

Passion4Muzik
  • Topic Starter

  • Members
  • 152 posts
  • OFFLINE
  •  
  • Local time:03:38 PM

Posted 31 December 2011 - 12:06 PM

Windows Registry Editor Version 5.00

[HKEY_LOCAL_MACHINE\System\CurrentControlSet\services\afd]

[HKEY_LOCAL_MACHINE\System\CurrentControlSet\services\afd\Parameters]

[HKEY_LOCAL_MACHINE\System\CurrentControlSet\services\afd\Enum]
"0"="Root\\LEGACY_AFD\\0000"
"Count"=dword:00000001
"NextInstance"=dword:00000001
"INITSTARTFAILED"=dword:00000001

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_afd]
"NextInstance"=dword:00000001

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_afd\0000]
"Service"="AFD"
"Legacy"=dword:00000001
"ConfigFlags"=dword:00000000
"Class"="LegacyDriver"
"ClassGUID"="{8ECC055D-047F-11D1-A537-0000F8753ED1}"
"DeviceDesc"="AFD Networking Support Environment"
"Capabilities"=dword:00000000
"Driver"="{8ECC055D-047F-11D1-A537-0000F8753ED1}\\0001"

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_afd\0000\LogConf]








0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users