Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

redirect problem


  • This topic is locked This topic is locked
9 replies to this topic

#1 mdbrickell

mdbrickell

  • Members
  • 5 posts
  • OFFLINE
  •  
  • Local time:01:51 PM

Posted 26 December 2011 - 07:50 PM

Attached File  ark.txt   56.39KB   3 downloads

Attached File  attach.txt   15.09KB   2 downloads
cant attach dds file

BC AdBot (Login to Remove)

 


#2 HelpBot

HelpBot

    Bleepin' Binary Bot


  • Bots
  • 12,600 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:03:51 PM

Posted 01 January 2012 - 07:55 PM

Hello and welcome to Bleeping Computer!

I am HelpBot: an automated program designed to help the Bleeping Computer Staff better assist you! This message contains very important information, so please read through all of it before doing anything.

We apologize for the delay in responding to your request for help. Here at Bleeping Computer we get overwhelmed at times, and we are trying our best to keep up. Please note that your topic was not intentionally overlooked. Our mission is to help everyone in need, but sometimes it takes just a little longer to get to every request for help. No one is ignored here.

To help Bleeping Computer better assist you please perform the following steps:

***************************************************

Posted Image In order to continue receiving help at BleepingComputer.com, YOU MUST tell me if you still need help or if your issue has already been resolved on your own or through another resource! To tell me this, please click on the following link and follow the instructions there.

CLICK THIS LINK >>> http://www.bleepingcomputer.com/logreply/434640 <<< CLICK THIS LINK



If you no longer need help, then all you needed to do was the previous instructions of telling me so. You can skip the rest of this post. If you do need help please continue with Step 2 below.

***************************************************

Posted Image If you still need help, I would like you to post a Reply to this topic (click the "Add Reply" button in the lower right hand of this page). In that reply, please include the following information:

  • If you have not done so already, include a clear description of the problems you're having, along with any steps you may have performed so far.
  • A new DDS and GMER log. For your convenience, you will find the instructions for generating these logs repeated at the bottom of this post.
    • Please do this even if you have previously posted logs for us.
    • If you were unable to produce the logs originally please try once more.
    • If you are unable to create a log please provide detailed information about your installed Windows Operating System including the Version, Edition and if it is a 32bit or a 64bit system.
    • If you are unsure about any of these characteristics just post what you can and we will guide you.
  • Please tell us if you have your original Windows CD/DVD available.
  • Upon completing the above steps and posting a reply, another staff member will review your topic and do their best to resolve your issues.

Thank you for your patience, and again sorry for the delay.

***************************************************

We need to see some information about what is happening in your machine. Please perform the following scan again:

  • Download DDS by sUBs from one of the following links if you no longer have it available. Save it to your desktop.
  • Double click on the DDS icon, allow it to run.
  • A small box will open, with an explanation about the tool. No input is needed, the scan is running.
  • Notepad will open with the results.
  • Follow the instructions that pop up for posting the results.
  • Close the program window, and delete the program from your desktop.
Please note: You may have to disable any script protection running if the scan fails to run. After downloading the tool, disconnect from the internet and disable all antivirus protection. Run the scan, enable your A/V and reconnect to the internet.

Information on A/V control HERE


We also need a new log from the GMER anti-rootkit Scanner.

Please note that if you are running a 64-bit version of Windows you will not be able to run GMER and you may skip this step.

Please first disable any CD emulation programs using the steps found in this topic:

Why we request you disable CD Emulation when receiving Malware Removal Advice


Then create another GMER log and post it as an attachment to the reply where you post your new DDS log. Instructions on how to properly create a GMER log can be found here:

How to create a GMER log


As I am just a silly little program running on the BleepingComputer.com servers, please do not send me private messages as I do not know how to read and reply to them! Thanks!

#3 myrti

myrti

    Sillyberry


  • Malware Study Hall Admin
  • 33,768 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:At home
  • Local time:09:51 PM

Posted 03 January 2012 - 04:07 AM

Hi,

please post the DDS file in your next reply instead of attaching it.

regards myrti

is that a bird?  a plane? nooo it's the flying blueberry!

If I have been helping you and haven't replied in 2 days, feel free to shoot me a PM! Please don't send help request via PM, unless I am already helping you. Use the forums!

 

Follow BleepingComputer on: Facebook | Twitter | Google+


#4 mdbrickell

mdbrickell
  • Topic Starter

  • Members
  • 5 posts
  • OFFLINE
  •  
  • Local time:01:51 PM

Posted 04 January 2012 - 01:33 PM

Here it is thanks
.
DDS (Ver_2011-08-26.01) - NTFSx86
Internet Explorer: 7.0.5730.13
Run by me at 12:29:00 on 2012-01-04
Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.1015.331 [GMT -6:00]
.
AV: Microsoft Security Essentials *Enabled/Updated* {EDB4FA23-53B8-4AFA-8C5D-99752CCA7095}
.
============== Running Processes ===============
.
C:\WINDOWS\system32\svchost -k DcomLaunch
svchost.exe
c:\Program Files\Microsoft Security Client\Antimalware\MsMpEng.exe
C:\WINDOWS\system32\svchost.exe -k WudfServiceGroup
C:\WINDOWS\system32\svchost.exe -k netsvcs
svchost.exe
C:\WINDOWS\System32\wltrysvc.exe
C:\WINDOWS\System32\bcmwltry.exe
C:\WINDOWS\system32\spoolsv.exe
svchost.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\SUPERAntiSpyware\SASCORE.EXE
C:\Program Files\Java\jre6\bin\jqs.exe
C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe
C:\WINDOWS\System32\spool\DRIVERS\W32X86\3\lxdnserv.exe
C:\WINDOWS\system32\lxdncoms.exe
C:\Program Files\Malwarebytes' Anti-Malware\mbamservice.exe
svchost.exe
C:\Program Files\Yahoo!\SoftwareUpdate\YahooAUService.exe
c:\WINDOWS\system32\ZuneBusEnum.exe
C:\Program Files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe
C:\Program Files\Microsoft Security Client\msseces.exe
C:\Program Files\Malwarebytes' Anti-Malware\mbamgui.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
C:\Documents and Settings\me\Local Settings\Application Data\Google\Chrome\Application\chrome.exe
C:\Documents and Settings\me\Local Settings\Application Data\Google\Chrome\Application\chrome.exe
C:\Documents and Settings\me\Local Settings\Application Data\Google\Chrome\Application\chrome.exe
C:\Documents and Settings\me\Local Settings\Application Data\Google\Chrome\Application\chrome.exe
C:\Documents and Settings\me\Local Settings\Application Data\Google\Chrome\Application\chrome.exe
C:\Documents and Settings\me\Local Settings\Application Data\Google\Chrome\Application\chrome.exe
C:\Documents and Settings\me\Local Settings\Application Data\Google\Chrome\Application\chrome.exe
C:\Documents and Settings\me\Local Settings\Application Data\Google\Chrome\Application\chrome.exe
.
============== Pseudo HJT Report ===============
.
uStart Page = hxxp://www.newser.com/
uDefault_Page_URL = hxxp://www.yahoo.com/?fr=fp-yie8
uWindow Title = Windows Internet Explorer provided by Yahoo!
uURLSearchHooks: H - No File
uURLSearchHooks: H - No File
BHO: Adobe PDF Link Helper: {18df081c-e8ad-4283-a596-fa578c2ebdc3} - c:\program files\common files\adobe\acrobat\activex\AcroIEHelperShim.dll
BHO: RealPlayer Download and Record Plugin for Internet Explorer: {3049c3e9-b461-4bc5-8870-4c09146192ca} - c:\documents and settings\all users\application data\real\realplayer\browserrecordplugin\ie\rpbrowserrecordplugin.dll
BHO: Java™ Plug-In 2 SSV Helper: {dbc80044-a445-435b-bc74-9c25c1c588a9} - c:\program files\java\jre6\bin\jp2ssv.dll
BHO: JQSIEStartDetectorImpl Class: {e7e6f031-17ce-4c07-bc86-eabfe594f69c} - c:\program files\java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll
uRun: [ctfmon.exe] c:\windows\system32\ctfmon.exe
uRun: [SUPERAntiSpyware] c:\program files\superantispyware\SUPERAntiSpyware.exe
mRun: [MSC] "c:\program files\microsoft security client\msseces.exe" -hide -runkey
mRun: [Malwarebytes' Anti-Malware] "c:\program files\malwarebytes' anti-malware\mbamgui.exe" /starttray
dRun: [DWQueuedReporting] "c:\progra~1\common~1\micros~1\dw\dwtrig20.exe" -t
dRunOnce: [FlashPlayerUpdate] c:\windows\system32\macromed\flash\FlashUtil10u_ActiveX.exe -update activex
uPolicies-explorer: NoWindowsUpdate = 0 (0x0)
IE: Google Sidewiki... - c:\program files\google\google toolbar\component\GoogleToolbarDynamic_mui_en_70C5B381380DB17F.dll/cmsidewiki.html
IE: {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe
IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe
IE: {2670000A-7350-4f3c-8081-5663EE0C6C49} - {48E73304-E1D6-4330-914C-F5F514E3486C} - c:\progra~1\micros~2\office12\ONBttnIE.dll
IE: {3437D640-C91A-458f-89F5-B9095EA4C28B} - {04F93351-81D2-4484-9982-0D55DEFFFAE6}
IE: {92780B25-18CC-41C8-B9BE-3C9C571A8263} - {FF059E31-CC5A-4E2E-BF3B-96E929D65503} - c:\progra~1\micros~2\office12\REFIEBAR.DLL
LSP: mswsock.dll
DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_29-windows-i586.cab
DPF: {8FFBE65D-2C9C-4669-84BD-5829DC0B603C} - hxxp://fpdownload.macromedia.com/get/flashplayer/current/polarbear/ultrashim.cab
DPF: {CAFEEFAC-0016-0000-0029-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_29-windows-i586.cab
DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_29-windows-i586.cab
DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} - hxxp://fpdownload2.macromedia.com/get/shockwave/cabs/flash/swflash.cab
TCP: DhcpNameServer = 68.105.28.11 68.105.29.11 68.105.28.12 192.168.1.1 68.105.28.11 68.105.29.11 68.105.28.12
TCP: Interfaces\{C8CFE286-168D-4937-9F5F-08F01D612830} : NameServer = 208.67.222.222,208.67.220.220
TCP: Interfaces\{C8CFE286-168D-4937-9F5F-08F01D612830} : DhcpNameServer = 68.105.28.11 68.105.29.11 68.105.28.12 192.168.1.1 68.105.28.11 68.105.29.11 68.105.28.12
Notify: !SASWinLogon - c:\program files\superantispyware\SASWINLO.DLL
Notify: igfxcui - igfxdev.dll
SSODL: WPDShServiceObj - {AAA288BA-9A4C-45B0-95D7-94D524869DB5} - c:\windows\system32\WPDShServiceObj.dll
SEH: SABShellExecuteHook Class: {5ae067d3-9afb-48e0-853a-ebb7f4a000da} - c:\program files\superantispyware\SASSEH.DLL
mASetup: {A509B1FF-37FF-4bFF-8CFF-4F3A747040FF} - c:\windows\system32\rundll32.exe c:\windows\system32\advpack.dll,launchinfsectionex c:\program files\internet explorer\clrtour.inf,DefaultInstall.ResetTour,,12
.
============= SERVICES / DRIVERS ===============
.
R1 MpFilter;Microsoft Malware Protection Driver;c:\windows\system32\drivers\MpFilter.sys [2011-4-18 165648]
R1 MpKsl092753fc;MpKsl092753fc;c:\documents and settings\all users\application data\microsoft\microsoft antimalware\definition updates\{389eb6ed-bf3d-4f24-b176-0c18fdd39ff0}\MpKsl092753fc.sys [2012-1-4 29904]
R1 SASDIFSV;SASDIFSV;c:\program files\superantispyware\sasdifsv.sys [2011-7-22 12880]
R1 SASKUTIL;SASKUTIL;c:\program files\superantispyware\SASKUTIL.SYS [2011-7-12 67664]
R2 !SASCORE;SAS Core Service;c:\program files\superantispyware\SASCore.exe [2011-8-11 116608]
R2 lxdn_device;lxdn_device;c:\windows\system32\lxdncoms.exe -service --> c:\windows\system32\lxdncoms.exe -service [?]
R2 lxdnCATSCustConnectService;lxdnCATSCustConnectService;c:\windows\system32\spool\drivers\w32x86\3\lxdnserv.exe [2009-6-4 98984]
R2 MBAMService;MBAMService;c:\program files\malwarebytes' anti-malware\mbamservice.exe [2011-10-3 652872]
R3 MBAMProtector;MBAMProtector;c:\windows\system32\drivers\mbam.sys [2011-10-3 20464]
S1 MpKsl14d91a25;MpKsl14d91a25;\??\c:\documents and settings\all users\application data\microsoft\microsoft antimalware\definition updates\{f12f0f73-51ef-452c-bded-d834ada29a63}\mpksl14d91a25.sys --> c:\documents and settings\all users\application data\microsoft\microsoft antimalware\definition updates\{f12f0f73-51ef-452c-bded-d834ada29a63}\MpKsl14d91a25.sys [?]
S1 MpKsle8233c3e;MpKsle8233c3e;\??\c:\documents and settings\all users\application data\microsoft\microsoft antimalware\definition updates\{3be3c678-f4a9-4ea3-88f9-0ded70220c6b}\mpksle8233c3e.sys --> c:\documents and settings\all users\application data\microsoft\microsoft antimalware\definition updates\{3be3c678-f4a9-4ea3-88f9-0ded70220c6b}\MpKsle8233c3e.sys [?]
S1 MpKslf2e69d92;MpKslf2e69d92;\??\c:\documents and settings\all users\application data\microsoft\microsoft antimalware\definition updates\{dd349b75-26c9-4be9-a50f-baf96327be29}\mpkslf2e69d92.sys --> c:\documents and settings\all users\application data\microsoft\microsoft antimalware\definition updates\{dd349b75-26c9-4be9-a50f-baf96327be29}\MpKslf2e69d92.sys [?]
S2 gupdate;Google Update Service (gupdate);c:\program files\google\update\GoogleUpdate.exe [2010-9-12 135664]
S3 cpuz134;cpuz134;\??\c:\docume~1\me\locals~1\temp\cpuz134\cpuz134_x32.sys --> c:\docume~1\me\locals~1\temp\cpuz134\cpuz134_x32.sys [?]
S3 gupdatem;Google Update Service (gupdatem);c:\program files\google\update\GoogleUpdate.exe [2010-9-12 135664]
S3 hitmanpro35;Hitman Pro 3.5 Support Driver;c:\windows\system32\drivers\hitmanpro35.sys [2011-9-28 23624]
S3 NPF;WinPcap Packet Driver (NPF);c:\windows\system32\drivers\npf.sys [2011-12-13 50704]
.
=============== Created Last 30 ================
.
2012-01-04 17:00:47 52480 -c--a-w- c:\windows\system32\dllcache\i8042prt.sys
2012-01-04 17:00:47 52480 ----a-w- c:\windows\system32\drivers\i8042prt.sys
2012-01-04 16:51:18 29904 ----a-w- c:\documents and settings\all users\application data\microsoft\microsoft antimalware\definition updates\{389eb6ed-bf3d-4f24-b176-0c18fdd39ff0}\MpKsl092753fc.sys
2012-01-04 16:51:13 56200 ----a-w- c:\documents and settings\all users\application data\microsoft\microsoft antimalware\definition updates\{389eb6ed-bf3d-4f24-b176-0c18fdd39ff0}\offreg.dll
2012-01-04 15:30:48 -------- d-----w- c:\documents and settings\me\application data\SUPERAntiSpyware.com
2012-01-04 15:29:51 -------- d-----w- c:\program files\SUPERAntiSpyware
2012-01-02 20:16:58 -------- d-----w- c:\documents and settings\me\application data\ingpool23
2012-01-02 15:00:54 6823496 ----a-w- c:\documents and settings\all users\application data\microsoft\microsoft antimalware\definition updates\{389eb6ed-bf3d-4f24-b176-0c18fdd39ff0}\mpengine.dll
2011-12-30 14:09:53 6823496 ----a-w- c:\documents and settings\all users\application data\microsoft\microsoft antimalware\definition updates\backup\mpengine.dll
2011-12-27 01:36:14 -------- d-----w- c:\program files\CCleaner
2011-12-27 01:36:07 -------- d-----w- c:\documents and settings\me\local settings\application data\TOPO! Explorer
2011-12-24 12:55:26 -------- d-----w- c:\program files\Microsoft Security Client
2011-12-24 03:09:56 -------- d-----w- c:\program files\common files\TerraGo
2011-12-24 03:09:50 -------- d-----w- c:\program files\TerraGo Technologies
2011-12-13 23:49:43 -------- d-----w- c:\program files\VS Revo Group
2011-12-13 17:10:08 -------- d-----w- c:\documents and settings\all users\application data\PC Tools
2011-12-13 17:07:42 -------- d-----w- c:\program files\common files\Wise Installation Wizard
2011-12-13 15:29:00 50704 ------w- c:\windows\system32\drivers\npf.sys
2011-12-13 15:29:00 281104 ------w- c:\windows\system32\wpcap.dll
2011-12-13 15:28:59 100880 ------w- c:\windows\system32\Packet.dll
.
==================== Find3M ====================
.
2011-12-10 21:24:06 20464 ----a-w- c:\windows\system32\drivers\mbam.sys
2011-11-15 20:29:56 222080 ------w- c:\windows\system32\MpSigStub.exe
2011-09-29 07:59:49 14042824 ------w- c:\program files\Firefox Setup 7.0.exe
2011-09-28 19:42:23 8068864 ------w- c:\program files\mseinstall.exe
.
============= FINISH: 12:30:13.06 ===============

#5 myrti

myrti

    Sillyberry


  • Malware Study Hall Admin
  • 33,768 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:At home
  • Local time:09:51 PM

Posted 04 January 2012 - 01:52 PM

Hi,

One or more of the identified infections is a backdoor trojan.

This allows hackers to remotely control your computer, steal critical system information and download and execute files.

I would counsel you to disconnect this PC from the Internet immediately. If you do any banking or other financial transactions on the PC or if it should contain any other sensitive information, please get to a known clean computer and change all passwords where applicable, and it would be wise to contact those same financial institutions to apprise them of your situation.

Though the trojan has been identified and can be killed, because of it's backdoor functionality, your PC is very likely compromised and there is no way to be sure your computer can ever again be trusted. Many experts in the security community believe that once infected with this type of trojan, the best course of action would be a reformat and reinstall of the OS. Please read these for more information:

How Do I Handle Possible Identify Theft, Internet Fraud and CC Fraud?
When Should I Format, How Should I Reinstall

We can still clean this machine but I can't guarantee that it will be 100% secure afterwards. Let me know what you decide to do.

If you choose to clean please do the following:
Please download ComboFix from one of these locations:

Link 1
Link 2

* IMPORTANT !!! Save ComboFix.exe to your Desktop
  • Temporarily disable isable your AntiVirus and AntiSpyware applications. They may otherwise interfere with our tools
    Usually this can be done via a right click on the System Tray icon, check this tutorial for disabling the most common security programs: Link

  • Double click on ComboFix.exe & follow the prompts.
  • As part of it's process, ComboFix will check to see if the Microsoft Windows Recovery Console is installed. With malware infections being as they are today, it's strongly recommended to have this pre-installed on your machine before doing any malware removal. It will allow you to boot up into a special recovery/repair mode that will allow us to more easily help you should your computer have a problem after an attempted removal of malware.
  • Follow the prompts to allow ComboFix to download and install the Microsoft Windows Recovery Console, and when prompted, agree to the End-User License Agreement to install the Microsoft Windows Recovery Console.
**Please note: If the Microsoft Windows Recovery Console is already installed, ComboFix will continue it's malware removal procedures.

Posted Image


Once the Microsoft Windows Recovery Console is installed using ComboFix, you should see the following message:

Posted Image


Click on Yes, to continue scanning for malware.

When finished, it will produce a log for you. Please include the C:\ComboFix.txt in your next reply.

This tool is not a toy and not for everyday use.
ComboFix SHOULD NOT be used unless requested by a forum helper


If you need help, see this link:
http://www.bleepingcomputer.com/combofix/how-to-use-combofix

is that a bird?  a plane? nooo it's the flying blueberry!

If I have been helping you and haven't replied in 2 days, feel free to shoot me a PM! Please don't send help request via PM, unless I am already helping you. Use the forums!

 

Follow BleepingComputer on: Facebook | Twitter | Google+


#6 mdbrickell

mdbrickell
  • Topic Starter

  • Members
  • 5 posts
  • OFFLINE
  •  
  • Local time:01:51 PM

Posted 04 January 2012 - 05:02 PM

Here is the log for combofix. Thanks


ComboFix 12-01-04.03 - me 01/04/2012 15:34:06.1.1 - x86
Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.1015.660 [GMT -6:00]
Running from: c:\documents and settings\me\My Documents\Downloads\ComboFix.exe
AV: Microsoft Security Essentials *Disabled/Updated* {EDB4FA23-53B8-4AFA-8C5D-99752CCA7095}
.
.
((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.
.
c:\documents and settings\All Users\Application Data\024172w4j476q610s050s5dyu3c1
c:\documents and settings\All Users\Application Data\lirxfx1g3jaq1eks4cqe4b563k4h
c:\documents and settings\All Users\Application Data\TEMP
c:\documents and settings\All Users\SPL19.tmp
c:\documents and settings\All Users\SPL2F.tmp
c:\documents and settings\All Users\SPL3.tmp
c:\documents and settings\All Users\SPL4.tmp
c:\documents and settings\All Users\SPL9.tmp
c:\documents and settings\me\Application Data\Adobe\plugs
c:\documents and settings\me\Application Data\Adobe\shed
c:\documents and settings\me\Templates\024172w4j476q610s050s5dyu3c1
c:\documents and settings\me\Templates\lirxfx1g3jaq1eks4cqe4b563k4h
C:\install.exe
c:\windows\$NtUninstallKB14169$
c:\windows\$NtUninstallKB14169$\1341618350\@
c:\windows\$NtUninstallKB14169$\1341618350\bckfg.tmp
c:\windows\$NtUninstallKB14169$\1341618350\cfg.ini
c:\windows\$NtUninstallKB14169$\1341618350\Desktop.ini
c:\windows\$NtUninstallKB14169$\1341618350\keywords
c:\windows\$NtUninstallKB14169$\1341618350\kwrd.dll
c:\windows\$NtUninstallKB14169$\1341618350\L\eelxjgqs
c:\windows\$NtUninstallKB14169$\1341618350\lsflt7.ver
c:\windows\$NtUninstallKB14169$\1341618350\U\00000001.@
c:\windows\$NtUninstallKB14169$\1341618350\U\00000002.@
c:\windows\$NtUninstallKB14169$\1341618350\U\00000004.@
c:\windows\$NtUninstallKB14169$\1341618350\U\80000000.@
c:\windows\$NtUninstallKB14169$\1341618350\U\80000004.@
c:\windows\$NtUninstallKB14169$\1341618350\U\80000032.@
c:\windows\$NtUninstallKB14169$\2239682621
c:\windows\$NtUninstallKB14169$\381079101
c:\windows\$NtUninstallKB51366$
c:\windows\$NtUninstallKB51366$\1341618350\@
c:\windows\$NtUninstallKB51366$\1341618350\bckfg.tmp
c:\windows\$NtUninstallKB51366$\1341618350\cfg.ini
c:\windows\$NtUninstallKB51366$\1341618350\Desktop.ini
c:\windows\$NtUninstallKB51366$\1341618350\keywords
c:\windows\$NtUninstallKB51366$\1341618350\kwrd.dll
c:\windows\$NtUninstallKB51366$\1341618350\L\eelxjgqs
c:\windows\$NtUninstallKB51366$\1341618350\lsflt7.ver
c:\windows\$NtUninstallKB51366$\1341618350\U\00000001.@
c:\windows\$NtUninstallKB51366$\1341618350\U\00000002.@
c:\windows\$NtUninstallKB51366$\1341618350\U\80000000.@
c:\windows\$NtUninstallKB51366$\1341618350\U\80000032.@
c:\windows\$NtUninstallKB51366$\1919335825
c:\windows\system32\cnmE4.tmp
c:\windows\system32\drivers\npf.sys
c:\windows\system32\Packet.dll
c:\windows\system32\SET275.tmp
c:\windows\system32\SET277.tmp
c:\windows\system32\SET285.tmp
c:\windows\system32\SET2A4.tmp
c:\windows\system32\wpcap.dll
.
c:\windows\system32\drivers\i8042prt.sys was missing
Restored copy from - c:\windows\system32\dllcache\i8042prt.sys
.
.
((((((((((((((((((((((((((((((((((((((( Drivers/Services )))))))))))))))))))))))))))))))))))))))))))))))))
.
.
-------\Legacy_NPF
-------\Service_NPF
.
.
((((((((((((((((((((((((( Files Created from 2011-12-04 to 2012-01-04 )))))))))))))))))))))))))))))))
.
.
2012-01-04 21:45 . 2012-01-04 21:45 56200 ----a-w- c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{389EB6ED-BF3D-4F24-B176-0C18FDD39FF0}\offreg.dll
2012-01-04 21:43 . 2008-04-13 20:18 52480 -c--a-w- c:\windows\system32\dllcache\i8042prt.sys
2012-01-04 15:30 . 2012-01-04 15:30 -------- d-----w- c:\documents and settings\me\Application Data\SUPERAntiSpyware.com
2012-01-04 15:29 . 2012-01-04 15:30 -------- d-----w- c:\program files\SUPERAntiSpyware
2012-01-02 20:16 . 2012-01-02 20:17 -------- d-----w- c:\documents and settings\me\Application Data\ingpool23
2012-01-02 15:00 . 2011-11-30 08:21 6823496 ----a-w- c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{389EB6ED-BF3D-4F24-B176-0C18FDD39FF0}\mpengine.dll
2011-12-30 14:09 . 2011-11-30 08:21 6823496 ----a-w- c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\Backup\mpengine.dll
2011-12-27 01:36 . 2011-12-27 01:36 -------- d-----w- c:\program files\CCleaner
2011-12-27 01:36 . 2011-12-27 01:36 -------- d-----w- c:\documents and settings\me\Local Settings\Application Data\TOPO! Explorer
2011-12-24 12:55 . 2011-12-27 01:36 -------- d-----w- c:\program files\Microsoft Security Client
2011-12-24 03:09 . 2011-12-27 01:34 -------- d-----w- c:\program files\Common Files\TerraGo
2011-12-24 03:09 . 2011-12-24 03:09 -------- d-----w- c:\program files\TerraGo Technologies
2011-12-16 17:15 . 2011-12-16 17:15 -------- d-sh--w- c:\documents and settings\NetworkService\PrivacIE
2011-12-16 16:50 . 2011-12-16 16:50 -------- d-----w- c:\program files\Common Files\Adobe AIR
2011-12-14 17:09 . 2011-12-14 17:09 -------- d-----w- c:\documents and settings\NetworkService\Local Settings\Application Data\Apple Computer
2011-12-13 23:49 . 2011-12-13 23:49 -------- d-----w- c:\program files\VS Revo Group
2011-12-13 17:10 . 2011-12-13 18:55 -------- d-----w- c:\documents and settings\All Users\Application Data\PC Tools
2011-12-13 17:07 . 2011-12-13 17:07 -------- d-----w- c:\program files\Common Files\Wise Installation Wizard
2011-12-13 04:45 . 2011-12-13 04:45 -------- d-----w- c:\documents and settings\Administrator\Local Settings\Application Data\Mozilla
.
.
.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2011-12-10 21:24 . 2011-10-03 12:49 20464 ----a-w- c:\windows\system32\drivers\mbam.sys
2011-11-15 20:29 . 2011-04-13 22:02 222080 ------w- c:\windows\system32\MpSigStub.exe
2011-09-29 07:59 . 2011-09-29 07:59 14042824 ------w- c:\program files\Firefox Setup 7.0.exe
2011-09-28 19:42 . 2011-09-28 19:41 8068864 ------w- c:\program files\mseinstall.exe
.
.
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4
.
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"SUPERAntiSpyware"="c:\program files\SUPERAntiSpyware\SUPERAntiSpyware.exe" [2011-12-09 4616064]
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"MSC"="c:\program files\Microsoft Security Client\msseces.exe" [2011-06-15 997920]
"Malwarebytes' Anti-Malware"="c:\program files\Malwarebytes' Anti-Malware\mbamgui.exe" [2011-12-24 460872]
.
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run]
"DWQueuedReporting"="c:\progra~1\COMMON~1\MICROS~1\DW\dwtrig20.exe" [2008-11-04 435096]
.
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\RunOnce]
"FlashPlayerUpdate"="c:\windows\system32\Macromed\Flash\FlashUtil10u_ActiveX.exe" [2011-08-03 243360]
.
[hkey_local_machine\software\microsoft\windows\currentversion\explorer\ShellExecuteHooks]
"{5AE067D3-9AFB-48E0-853A-EBB7F4A000DA}"= "c:\program files\SUPERAntiSpyware\SASSEH.DLL" [2011-07-19 113024]
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\!SASWinLogon]
2011-05-04 17:54 551296 ----a-w- c:\program files\SUPERAntiSpyware\SASWINLO.DLL
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\!SASCORE]
@=""
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\MSIServer]
@="Service"
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\MsMpSvc]
@="Service"
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\Wdf01000.sys]
@="Driver"
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\WudfSvc]
@="Service"
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Adobe ARM]
2011-06-06 18:55 937920 ------w- c:\program files\Common Files\Adobe\ARM\1.0\AdobeARM.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\APSDaemon]
2011-09-27 13:22 59240 ------w- c:\program files\Common Files\Apple\Apple Application Support\APSDaemon.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Google Update]
2011-10-21 21:42 136176 -----tw- c:\documents and settings\me\Local Settings\Application Data\Google\Update\GoogleUpdate.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\swg]
2008-07-15 04:10 68856 ------w- c:\program files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\security center]
"AntiVirusOverride"=dword:00000001
"FirewallOverride"=dword:00000001
.
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=
"c:\\Program Files\\Windows Media Player\\wmplayer.exe"=
.
R1 SASDIFSV;SASDIFSV;c:\program files\SUPERAntiSpyware\sasdifsv.sys [7/22/2011 10:27 AM 12880]
R1 SASKUTIL;SASKUTIL;c:\program files\SUPERAntiSpyware\SASKUTIL.SYS [7/12/2011 3:55 PM 67664]
R2 !SASCORE;SAS Core Service;c:\program files\SUPERAntiSpyware\SASCore.exe [8/11/2011 5:38 PM 116608]
R2 lxdn_device;lxdn_device;c:\windows\system32\lxdncoms.exe -service --> c:\windows\system32\lxdncoms.exe -service [?]
R2 lxdnCATSCustConnectService;lxdnCATSCustConnectService;c:\windows\system32\spool\drivers\w32x86\3\lxdnserv.exe [6/4/2009 6:55 PM 98984]
R2 MBAMService;MBAMService;c:\program files\Malwarebytes' Anti-Malware\mbamservice.exe [10/3/2011 6:49 AM 652872]
R3 MBAMProtector;MBAMProtector;c:\windows\system32\drivers\mbam.sys [10/3/2011 6:49 AM 20464]
S1 MpKsl14d91a25;MpKsl14d91a25;\??\c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{F12F0F73-51EF-452C-BDED-D834ADA29A63}\MpKsl14d91a25.sys --> c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{F12F0F73-51EF-452C-BDED-D834ADA29A63}\MpKsl14d91a25.sys [?]
S1 MpKsle8233c3e;MpKsle8233c3e;\??\c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{3BE3C678-F4A9-4EA3-88F9-0DED70220C6B}\MpKsle8233c3e.sys --> c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{3BE3C678-F4A9-4EA3-88F9-0DED70220C6B}\MpKsle8233c3e.sys [?]
S1 MpKslf2e69d92;MpKslf2e69d92;\??\c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{DD349B75-26C9-4BE9-A50F-BAF96327BE29}\MpKslf2e69d92.sys --> c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{DD349B75-26C9-4BE9-A50F-BAF96327BE29}\MpKslf2e69d92.sys [?]
S2 gupdate;Google Update Service (gupdate);c:\program files\Google\Update\GoogleUpdate.exe [9/12/2010 7:11 PM 135664]
S3 cpuz134;cpuz134;\??\c:\docume~1\me\LOCALS~1\Temp\cpuz134\cpuz134_x32.sys --> c:\docume~1\me\LOCALS~1\Temp\cpuz134\cpuz134_x32.sys [?]
S3 gupdatem;Google Update Service (gupdatem);c:\program files\Google\Update\GoogleUpdate.exe [9/12/2010 7:11 PM 135664]
S3 hitmanpro35;Hitman Pro 3.5 Support Driver;c:\windows\system32\drivers\hitmanpro35.sys [9/28/2011 1:58 AM 23624]
.
[HKEY_LOCAL_MACHINE\software\microsoft\active setup\installed components\{A509B1FF-37FF-4bFF-8CFF-4F3A747040FF}]
2008-12-20 23:15 124928 ----a-w- c:\windows\system32\advpack.dll
.
Contents of the 'Scheduled Tasks' folder
.
2012-01-04 c:\windows\Tasks\AppleSoftwareUpdate.job
- c:\program files\Apple Software Update\SoftwareUpdate.exe [2011-06-01 22:57]
.
2012-01-04 c:\windows\Tasks\Google Software Updater.job
- c:\program files\Google\Common\Google Updater\GoogleUpdaterService.exe [2008-07-15 15:59]
.
2012-01-04 c:\windows\Tasks\GoogleUpdateTaskMachineCore.job
- c:\program files\Google\Update\GoogleUpdate.exe [2010-09-13 01:11]
.
2012-01-04 c:\windows\Tasks\GoogleUpdateTaskMachineUA.job
- c:\program files\Google\Update\GoogleUpdate.exe [2010-09-13 01:11]
.
2012-01-04 c:\windows\Tasks\GoogleUpdateTaskUserS-1-5-21-436374069-492894223-725345543-1003Core.job
- c:\documents and settings\me\Local Settings\Application Data\Google\Update\GoogleUpdate.exe [2011-12-15 21:42]
.
2012-01-04 c:\windows\Tasks\GoogleUpdateTaskUserS-1-5-21-436374069-492894223-725345543-1003UA.job
- c:\documents and settings\me\Local Settings\Application Data\Google\Update\GoogleUpdate.exe [2011-12-15 21:42]
.
2012-01-04 c:\windows\Tasks\MP Scheduled Scan.job
- c:\program files\Microsoft Security Client\Antimalware\MpCmdRun.exe [2011-04-27 21:39]
.
.
------- Supplementary Scan -------
.
uStart Page = hxxp://www.newser.com/
IE: Google Sidewiki... - c:\program files\Google\Google Toolbar\Component\GoogleToolbarDynamic_mui_en_70C5B381380DB17F.dll/cmsidewiki.html
TCP: DhcpNameServer = 68.105.28.11 68.105.29.11 68.105.28.12 192.168.1.1 68.105.28.11 68.105.29.11 68.105.28.12
TCP: Interfaces\{C8CFE286-168D-4937-9F5F-08F01D612830}: NameServer = 208.67.222.222,208.67.220.220
.
- - - - ORPHANS REMOVED - - - -
.
Toolbar-Locked - (no file)
Notify-ckpNotify - (no file)
SafeBoot-18880487.sys
SafeBoot-WudfPf
SafeBoot-WudfRd
MSConfigStartUp-TkBellExe - c:\program files\real\realplayer\update\realsched.exe
.
.
.
**************************************************************************
.
catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2012-01-04 15:46
Windows 5.1.2600 Service Pack 3 NTFS
.
scanning hidden processes ...
.
scanning hidden autostart entries ...
.
scanning hidden files ...
.
scan completed successfully
hidden files: 0
.
**************************************************************************
.
[HKEY_LOCAL_MACHINE\System\ControlSet003\Services\.avgtdix]
"ImagePath"="\*"
.
--------------------- LOCKED REGISTRY KEYS ---------------------
.
[HKEY_USERS\.Default\Software\Microsoft\Internet Explorer\User Preferences]
@Denied: (2) (LocalSystem)
"88D7D0879DAB32E14DE5B3A805A34F98AFF34F5977"=hex:01,00,00,00,d0,8c,9d,df,01,15,
d1,11,8c,7a,00,c0,4f,c2,97,eb,01,00,00,00,9b,06,2a,34,87,02,c2,41,8a,19,a4,\
"2D53CFFC5C1A3DD2E97B7979AC2A92BD59BC839E81"=hex:01,00,00,00,d0,8c,9d,df,01,15,
d1,11,8c,7a,00,c0,4f,c2,97,eb,01,00,00,00,9b,06,2a,34,87,02,c2,41,8a,19,a4,\
.
--------------------- DLLs Loaded Under Running Processes ---------------------
.
- - - - - - - > 'winlogon.exe'(652)
c:\program files\SUPERAntiSpyware\SASWINLO.DLL
c:\windows\System32\BCMLogon.dll
.
- - - - - - - > 'explorer.exe'(3704)
c:\windows\system32\WPDShServiceObj.dll
c:\windows\system32\PortableDeviceTypes.dll
c:\windows\system32\PortableDeviceApi.dll
.
------------------------ Other Running Processes ------------------------
.
c:\program files\Microsoft Security Client\Antimalware\MsMpEng.exe
c:\windows\System32\wltrysvc.exe
c:\windows\System32\bcmwltry.exe
c:\program files\Java\jre6\bin\jqs.exe
c:\program files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe
c:\windows\system32\lxdncoms.exe
c:\program files\Yahoo!\SoftwareUpdate\YahooAUService.exe
c:\windows\system32\ZuneBusEnum.exe
c:\program files\Common Files\LogiShrd\LVCOMSER\LVComSer.exe
c:\\?\c:\windows\system32\WBEM\WMIADAP.EXE
.
**************************************************************************
.
Completion time: 2012-01-04 15:51:00 - machine was rebooted
ComboFix-quarantined-files.txt 2012-01-04 21:50
.
Pre-Run: 21,076,746,240 bytes free
Post-Run: 21,864,566,784 bytes free
.
WindowsXP-KB310994-SP2-Pro-BootDisk-ENU.exe
[boot loader]
timeout=2
default=multi(0)disk(0)rdisk(0)partition(1)\WINDOWS
[operating systems]
c:\cmdcons\BOOTSECT.DAT="Microsoft Windows Recovery Console" /cmdcons
UnsupportedDebug="do not select this" /debug
multi(0)disk(0)rdisk(0)partition(1)\WINDOWS="Microsoft Windows XP Professional" /noexecute=optin /fastdetect
.
- - End Of File - - C1474A5E6D498469993F2F14E9F28AAF

#7 myrti

myrti

    Sillyberry


  • Malware Study Hall Admin
  • 33,768 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:At home
  • Local time:09:51 PM

Posted 04 January 2012 - 05:22 PM

Hi,

that looks promising, how is the PC doing?

regards myrti

is that a bird?  a plane? nooo it's the flying blueberry!

If I have been helping you and haven't replied in 2 days, feel free to shoot me a PM! Please don't send help request via PM, unless I am already helping you. Use the forums!

 

Follow BleepingComputer on: Facebook | Twitter | Google+


#8 mdbrickell

mdbrickell
  • Topic Starter

  • Members
  • 5 posts
  • OFFLINE
  •  
  • Local time:01:51 PM

Posted 04 January 2012 - 05:35 PM

Seems to be doing good. I have noticed a couple of times when I rebooted the keyboard had a problem and I had to uninstall and reinstall it.

Thanks again.

#9 myrti

myrti

    Sillyberry


  • Malware Study Hall Admin
  • 33,768 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:At home
  • Local time:09:51 PM

Posted 04 January 2012 - 05:39 PM

Is that still happening after the ComboFix run?

regards myrti

is that a bird?  a plane? nooo it's the flying blueberry!

If I have been helping you and haven't replied in 2 days, feel free to shoot me a PM! Please don't send help request via PM, unless I am already helping you. Use the forums!

 

Follow BleepingComputer on: Facebook | Twitter | Google+


#10 myrti

myrti

    Sillyberry


  • Malware Study Hall Admin
  • 33,768 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:At home
  • Local time:09:51 PM

Posted 12 January 2012 - 09:00 AM

Due to the lack of feedback, this topic is now closed.In the event you still have problems, please send me or any Moderator a Private Message and ask them to reopen this topic within the next 5 days. Please include a link to your topic in the Private Message. Thank you.

is that a bird?  a plane? nooo it's the flying blueberry!

If I have been helping you and haven't replied in 2 days, feel free to shoot me a PM! Please don't send help request via PM, unless I am already helping you. Use the forums!

 

Follow BleepingComputer on: Facebook | Twitter | Google+





0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users