Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Fake.alert.gen/cc, Virtuemonde and perhaps other infections


  • This topic is locked This topic is locked
30 replies to this topic

#1 Delahelp

Delahelp

  • Members
  • 31 posts
  • OFFLINE
  •  
  • Local time:11:04 AM

Posted 10 January 2012 - 02:05 AM

Even after the two re-installs and wiping out all hardrives, once i download spy bot again the fake alerts, virtue monde are scanned in the bot search but never fixed.
http://www.bleepingcomputer.com/forums/topic388957.html/page__st__15 -- Summary of what has already been done,


DDS

.
DDS (Ver_2011-08-26.01) - NTFSx86
Internet Explorer: 8.0.7600.16385
Run by J.R at 1:38:51 on 2012-01-10
Microsoft Windows 7 Home Premium 6.1.7600.0.1252.2.1033.18.3003.2000 [GMT -5:00]
.
SP: Windows Defender *Enabled/Updated* {D68DDC3A-831F-4fae-9E44-DA132C1ACF46}
.
============== Running Processes ===============
.
C:\Windows\system32\wininit.exe
C:\Windows\system32\lsm.exe
C:\Windows\system32\svchost.exe -k DcomLaunch
C:\Windows\system32\svchost.exe -k RPCSS
C:\Windows\system32\sppsvc.exe
C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted
C:\Windows\system32\svchost.exe -k netsvcs
C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted
C:\Windows\system32\svchost.exe -k LocalService
C:\Windows\System32\svchost.exe -k NetworkService
C:\Windows\servicing\TrustedInstaller.exe
C:\Windows\System32\spoolsv.exe
C:\Windows\system32\svchost.exe -k LocalServiceNoNetwork
C:\Windows\system32\WUDFHost.exe
C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation
C:\Windows\System32\svchost.exe -k secsvcs
C:\Windows\system32\SearchIndexer.exe
C:\Windows\System32\svchost.exe -k LocalServicePeerNet
C:\Windows\system32\taskhost.exe
C:\Windows\system32\Dwm.exe
C:\Windows\Explorer.EXE
C:\Program Files\Windows Media Player\wmpnetwk.exe
C:\Windows\system32\wuauclt.exe
C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Windows\system32\vssvc.exe
C:\Windows\System32\svchost.exe -k swprv
C:\Windows\system32\DllHost.exe
C:\Windows\system32\DllHost.exe
C:\Windows\system32\conhost.exe
C:\Windows\system32\wbem\wmiprvse.exe
.
============== Pseudo HJT Report ===============
.
uStart Page = hxxp://www.google.ca/
BHO: Spybot-S&D IE Protection: {53707962-6f74-2d53-2644-206d7942484f} - c:\progra~1\spybot~1\SDHelper.dll
uRun: [SpybotSD TeaTimer] c:\program files\spybot - search & destroy\TeaTimer.exe
mPolicies-system: ConsentPromptBehaviorAdmin = 5 (0x5)
mPolicies-system: ConsentPromptBehaviorUser = 3 (0x3)
mPolicies-system: EnableUIADesktopToggle = 0 (0x0)
IE: {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - {53707962-6F74-2D53-2644-206D7942484F} - c:\progra~1\spybot~1\SDHelper.dll
TCP: DhcpNameServer = 64.71.255.198
TCP: Interfaces\{805BE7BF-758D-49C4-9942-F235C646E358} : DhcpNameServer = 64.71.255.198
.
============= SERVICES / DRIVERS ===============
.
R1 vwififlt;Virtual WiFi Filter Driver;c:\windows\system32\drivers\vwififlt.sys [2009-7-13 48128]
R3 RTL8167;Realtek 8167 NT Driver;c:\windows\system32\drivers\Rt86win7.sys [2009-6-10 139776]
R3 SrvHsfHDA;SrvHsfHDA;c:\windows\system32\drivers\VSTAZL3.SYS [2009-7-13 207360]
R3 SrvHsfV92;SrvHsfV92;c:\windows\system32\drivers\VSTDPV3.SYS [2009-7-13 980992]
R3 SrvHsfWinac;SrvHsfWinac;c:\windows\system32\drivers\VSTCNXT3.SYS [2009-7-13 661504]
S2 SBSDWSCService;SBSD Security Center Service;c:\program files\spybot - search & destroy\SDWinSec.exe [2012-1-10 1153368]
S3 b57nd60x;Broadcom NetXtreme Gigabit Ethernet - NDIS 6.0;c:\windows\system32\drivers\b57nd60x.sys [2009-7-13 229888]
.
=============== Created Last 30 ================
.
2012-01-10 09:11:29 -------- d-----w- c:\windows\Panther
2012-01-10 06:36:45 56200 ----a-w- c:\programdata\microsoft\windows defender\definition updates\{07c1201d-abfb-415f-92eb-59deea54a82d}\offreg.dll
2012-01-10 06:36:43 6823496 ----a-w- c:\programdata\microsoft\windows defender\definition updates\{07c1201d-abfb-415f-92eb-59deea54a82d}\mpengine.dll
2012-01-10 06:36:42 222080 ------w- c:\windows\system32\MpSigStub.exe
2012-01-10 06:26:52 -------- d-----w- c:\programdata\Spybot - Search & Destroy
2012-01-10 06:26:52 -------- d-----w- c:\program files\Spybot - Search & Destroy
2012-01-10 06:25:37 132608 ----a-w- c:\windows\system32\cabview.dll
.
==================== Find3M ====================
.
.
============= FINISH: 1:39:04.64 ===============


Someone please help, my life has been a total mess for the last week since this has happened. It will be most appreciated.

Attached Files


Edited by Delahelp, 10 January 2012 - 01:14 PM.


BC AdBot (Login to Remove)

 


#2 HelpBot

HelpBot

    Bleepin' Binary Bot


  • Bots
  • 12,697 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:12:04 PM

Posted 16 January 2012 - 02:10 AM

Hello and welcome to Bleeping Computer!

I am HelpBot: an automated program designed to help the Bleeping Computer Staff better assist you! This message contains very important information, so please read through all of it before doing anything.

We apologize for the delay in responding to your request for help. Here at Bleeping Computer we get overwhelmed at times, and we are trying our best to keep up. Please note that your topic was not intentionally overlooked. Our mission is to help everyone in need, but sometimes it takes just a little longer to get to every request for help. No one is ignored here.

To help Bleeping Computer better assist you please perform the following steps:

***************************************************

Posted Image In order to continue receiving help at BleepingComputer.com, YOU MUST tell me if you still need help or if your issue has already been resolved on your own or through another resource! To tell me this, please click on the following link and follow the instructions there.

CLICK THIS LINK >>> http://www.bleepingcomputer.com/logreply/437272 <<< CLICK THIS LINK



If you no longer need help, then all you needed to do was the previous instructions of telling me so. You can skip the rest of this post. If you do need help please continue with Step 2 below.

***************************************************

Posted Image If you still need help, I would like you to post a Reply to this topic (click the "Add Reply" button in the lower right hand of this page). In that reply, please include the following information:

  • If you have not done so already, include a clear description of the problems you're having, along with any steps you may have performed so far.
  • A new DDS and GMER log. For your convenience, you will find the instructions for generating these logs repeated at the bottom of this post.
    • Please do this even if you have previously posted logs for us.
    • If you were unable to produce the logs originally please try once more.
    • If you are unable to create a log please provide detailed information about your installed Windows Operating System including the Version, Edition and if it is a 32bit or a 64bit system.
    • If you are unsure about any of these characteristics just post what you can and we will guide you.
  • Please tell us if you have your original Windows CD/DVD available.
  • Upon completing the above steps and posting a reply, another staff member will review your topic and do their best to resolve your issues.

Thank you for your patience, and again sorry for the delay.

***************************************************

We need to see some information about what is happening in your machine. Please perform the following scan again:

  • Download DDS by sUBs from one of the following links if you no longer have it available. Save it to your desktop.
  • Double click on the DDS icon, allow it to run.
  • A small box will open, with an explanation about the tool. No input is needed, the scan is running.
  • Notepad will open with the results.
  • Follow the instructions that pop up for posting the results.
  • Close the program window, and delete the program from your desktop.
Please note: You may have to disable any script protection running if the scan fails to run. After downloading the tool, disconnect from the internet and disable all antivirus protection. Run the scan, enable your A/V and reconnect to the internet.

Information on A/V control HERE


We also need a new log from the GMER anti-rootkit Scanner.

Please note that if you are running a 64-bit version of Windows you will not be able to run GMER and you may skip this step.

Please first disable any CD emulation programs using the steps found in this topic:

Why we request you disable CD Emulation when receiving Malware Removal Advice


Then create another GMER log and post it as an attachment to the reply where you post your new DDS log. Instructions on how to properly create a GMER log can be found here:

How to create a GMER log


As I am just a silly little program running on the BleepingComputer.com servers, please do not send me private messages as I do not know how to read and reply to them! Thanks!

#3 sempai

sempai

    noypi


  • Malware Response Team
  • 5,288 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:3 stars and a sun
  • Local time:12:04 AM

Posted 17 January 2012 - 10:56 AM

Hello Delahelp and welcome to BC, sorry about the delay.


Download OTL by OldTimer from one of the links below:

Link 1
Link 2

  • Save it to your desktop.
  • Close all open windows on the Task Bar.
  • Double click the OTL icon to run the program (run as Administrator for Windows Vista/7).
  • Put a check mark on Scan All Users.
  • Click the Run Scan button and let it run uninterrupted.
  • It will create two reports namely OTL.txt (will be opened) and Extras.txt (will be minimized).
  • Post the contents of both reports when you reply.
  • Exit OTL.

~Semp

btn_donate_LG.gif
You can help me continue the fight against malware by making a donation, Thank you.

If I am helping you and I didn't reply within 48 hours... Please send me a private message.
Topics that are not replied within 5 days will be close. Please don't PM asking for support, post on the Forums instead.

Member of UNITE (Unified Network of Instructors and Trained Eliminators) 


#4 Delahelp

Delahelp
  • Topic Starter

  • Members
  • 31 posts
  • OFFLINE
  •  
  • Local time:11:04 AM

Posted 18 January 2012 - 12:07 PM

OTL logfile created on: 1/18/2012 12:03:23 PM - Run 1
OTL by OldTimer - Version 3.2.31.0 Folder = C:\Users\JR\Desktop
Home Premium Edition (Version = 6.1.7600) - Type = NTWorkstation
Internet Explorer (Version = 8.0.7600.16385)
Locale: 00000409 | Country: United States | Language: ENU | Date Format: M/d/yyyy

2.93 Gb Total Physical Memory | 2.61 Gb Available Physical Memory | 88.98% Memory free
5.86 Gb Paging File | 5.57 Gb Available in Paging File | 94.91% Paging File free
Paging file location(s): ?:\pagefile.sys [binary data]

%SystemDrive% = C: | %SystemRoot% = C:\Windows | %ProgramFiles% = C:\Program Files
Drive C: | 297.99 Gb Total Space | 286.91 Gb Free Space | 96.28% Space Free | Partition Type: NTFS

Computer Name: JR-PC | User Name: JR | Logged in as Administrator.
Boot Mode: SafeMode with Networking | Scan Mode: All users
Company Name Whitelist: Off | Skip Microsoft Files: Off | No Company Name Whitelist: On | File Age = 30 Days

========== Processes (SafeList) ==========

PRC - [2012/01/18 12:00:02 | 000,584,192 | ---- | M] (OldTimer Tools) -- C:\Users\JR\Desktop\OTL.exe
PRC - [2009/07/13 17:14:20 | 002,613,248 | ---- | M] (Microsoft Corporation) -- C:\Windows\explorer.exe


========== Modules (No Company Name) ==========


========== Win32 Services (SafeList) ==========

SRV - [2009/07/13 17:16:13 | 000,025,088 | ---- | M] (Microsoft Corporation) [On_Demand | Stopped] -- C:\Windows\System32\sensrsvc.dll -- (SensrSvc)
SRV - [2009/07/13 17:15:41 | 000,680,960 | ---- | M] (Microsoft Corporation) [Auto | Running] -- C:\Program Files\Windows Defender\MpSvc.dll -- (WinDefend)
SRV - [2009/01/26 15:31:10 | 001,153,368 | ---- | M] (Safer Networking Ltd.) [Auto | Stopped] -- C:\Program Files\Spybot - Search & Destroy\SDWinSec.exe -- (SBSDWSCService)


========== Driver Services (SafeList) ==========

DRV - [2009/07/13 14:02:46 | 001,096,704 | ---- | M] (Atheros Communications, Inc.) [Kernel | On_Demand | Running] -- C:\Windows\System32\drivers\athr.sys -- (athr)


========== Standard Registry (SafeList) ==========


========== Internet Explorer ==========







IE - HKU\S-1-5-21-284430335-1534815741-745137754-1000\SOFTWARE\Microsoft\Internet Explorer\Main,Start Page Redirect Cache = http://ca.msn.com/?rd=1
IE - HKU\S-1-5-21-284430335-1534815741-745137754-1000\SOFTWARE\Microsoft\Internet Explorer\Main,Start Page Redirect Cache AcceptLangs = en-us
IE - HKU\S-1-5-21-284430335-1534815741-745137754-1000\SOFTWARE\Microsoft\Internet Explorer\Main,Start Page Redirect Cache_TIMESTAMP = 1F 70 8D A5 A5 D0 CC 01 [binary data]
IE - HKU\S-1-5-21-284430335-1534815741-745137754-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings: "ProxyEnable" = 0




O1 HOSTS File: ([2009/06/10 13:39:37 | 000,000,824 | ---- | M]) - C:\Windows\System32\drivers\etc\hosts
O2 - BHO: (Spybot-S&D IE Protection) - {53707962-6F74-2D53-2644-206D7942484F} - C:\Program Files\Spybot - Search & Destroy\SDHelper.dll (Safer Networking Limited)
O4 - HKU\S-1-5-21-284430335-1534815741-745137754-1000..\Run: [SpybotSD TeaTimer] C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe (Safer-Networking Ltd.)
O4 - HKU\S-1-5-19..\RunOnce: [mctadmin] C:\Windows\System32\mctadmin.exe (Microsoft Corporation)
O4 - HKU\S-1-5-20..\RunOnce: [mctadmin] C:\Windows\System32\mctadmin.exe (Microsoft Corporation)
O6 - HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\System: ConsentPromptBehaviorAdmin = 5
O6 - HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\System: ConsentPromptBehaviorUser = 3
O9 - Extra 'Tools' menuitem : Spybot - Search & Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\Program Files\Spybot - Search & Destroy\SDHelper.dll (Safer Networking Limited)
O13 - gopher Prefix: missing
O17 - HKLM\System\CCS\Services\Tcpip\Parameters: DhcpNameServer = 64.71.255.198
O17 - HKLM\System\CCS\Services\Tcpip\Parameters\Interfaces\{31028C93-8782-4D0A-A937-4CCB4A741E81}: DhcpNameServer = 64.71.255.198
O20 - HKLM Winlogon: Shell - (explorer.exe) -C:\Windows\explorer.exe (Microsoft Corporation)
O20 - HKLM Winlogon: UserInit - (C:\Windows\system32\userinit.exe) -C:\Windows\System32\userinit.exe (Microsoft Corporation)
O20 - HKLM Winlogon: VMApplet - (SystemPropertiesPerformance.exe) -C:\Windows\System32\SystemPropertiesPerformance.exe (Microsoft Corporation)
O20 - HKLM Winlogon: VMApplet - (/pagefile) - File not found
O21 - SSODL: WebCheck - {E6FB5E20-DE35-11CF-9C87-00AA005127ED} - No CLSID value found.
O32 - HKLM CDRom: AutoRun - 1
O32 - AutoRun File - [2009/06/10 13:42:20 | 000,000,024 | ---- | M] () - C:\autoexec.bat -- [ NTFS ]
O34 - HKLM BootExecute: (autocheck autochk *)
O35 - HKLM\..comfile [open] -- "%1" %*
O35 - HKLM\..exefile [open] -- "%1" %*
O37 - HKLM\...com [@ = comfile] -- "%1" %*
O37 - HKLM\...exe [@ = exefile] -- "%1" %*

========== Files/Folders - Created Within 30 Days ==========

[2012/01/18 12:00:01 | 000,584,192 | ---- | C] (OldTimer Tools) -- C:\Users\JR\Desktop\OTL.exe
[2012/01/11 13:13:49 | 000,000,000 | ---D | C] -- C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Spybot - Search & Destroy
[2012/01/11 13:13:45 | 000,000,000 | ---D | C] -- C:\ProgramData\Spybot - Search & Destroy
[2012/01/11 13:13:45 | 000,000,000 | ---D | C] -- C:\Program Files\Spybot - Search & Destroy
[2012/01/11 13:13:08 | 016,409,960 | ---- | C] (Safer Networking Limited ) -- C:\Users\JR\Desktop\spybotsd162.exe
[2012/01/11 01:42:44 | 000,000,000 | R--D | C] -- C:\Users\JR\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup
[2012/01/11 01:42:44 | 000,000,000 | R--D | C] -- C:\Users\JR\Searches
[2012/01/11 01:42:44 | 000,000,000 | R--D | C] -- C:\Users\JR\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools
[2012/01/11 01:42:44 | 000,000,000 | -H-D | C] -- C:\Users\JR\Application Data\Microsoft\Internet Explorer\Quick Launch\User Pinned
[2012/01/11 01:42:34 | 000,000,000 | ---D | C] -- C:\Users\JR\AppData\Roaming\Identities
[2012/01/11 01:42:32 | 000,000,000 | R--D | C] -- C:\Users\JR\Contacts
[2012/01/11 01:42:25 | 000,000,000 | ---D | C] -- C:\Users\JR\AppData\Local\VirtualStore
[2012/01/11 01:42:23 | 000,000,000 | -HSD | C] -- C:\Users\JR\AppData\Local\Temporary Internet Files
[2012/01/11 01:42:23 | 000,000,000 | -HSD | C] -- C:\Users\JR\Templates
[2012/01/11 01:42:23 | 000,000,000 | -HSD | C] -- C:\Users\JR\Start Menu
[2012/01/11 01:42:23 | 000,000,000 | -HSD | C] -- C:\Users\JR\SendTo
[2012/01/11 01:42:23 | 000,000,000 | -HSD | C] -- C:\Users\JR\Recent
[2012/01/11 01:42:23 | 000,000,000 | -HSD | C] -- C:\Users\JR\PrintHood
[2012/01/11 01:42:23 | 000,000,000 | -HSD | C] -- C:\Users\JR\NetHood
[2012/01/11 01:42:23 | 000,000,000 | -HSD | C] -- C:\Users\JR\Documents\My Videos
[2012/01/11 01:42:23 | 000,000,000 | -HSD | C] -- C:\Users\JR\Documents\My Pictures
[2012/01/11 01:42:23 | 000,000,000 | -HSD | C] -- C:\Users\JR\Documents\My Music
[2012/01/11 01:42:23 | 000,000,000 | -HSD | C] -- C:\Users\JR\My Documents
[2012/01/11 01:42:23 | 000,000,000 | -HSD | C] -- C:\Users\JR\Local Settings
[2012/01/11 01:42:23 | 000,000,000 | -HSD | C] -- C:\Users\JR\AppData\Local\History
[2012/01/11 01:42:23 | 000,000,000 | -HSD | C] -- C:\Users\JR\Cookies
[2012/01/11 01:42:23 | 000,000,000 | -HSD | C] -- C:\Users\JR\Application Data
[2012/01/11 01:42:23 | 000,000,000 | -HSD | C] -- C:\Users\JR\AppData\Local\Application Data
[2012/01/11 01:42:22 | 000,000,000 | --SD | C] -- C:\Users\JR\AppData\Roaming\Microsoft
[2012/01/11 01:42:22 | 000,000,000 | R--D | C] -- C:\Users\JR\Videos
[2012/01/11 01:42:22 | 000,000,000 | R--D | C] -- C:\Users\JR\Saved Games
[2012/01/11 01:42:22 | 000,000,000 | R--D | C] -- C:\Users\JR\Pictures
[2012/01/11 01:42:22 | 000,000,000 | R--D | C] -- C:\Users\JR\Music
[2012/01/11 01:42:22 | 000,000,000 | R--D | C] -- C:\Users\JR\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance
[2012/01/11 01:42:22 | 000,000,000 | R--D | C] -- C:\Users\JR\Links
[2012/01/11 01:42:22 | 000,000,000 | R--D | C] -- C:\Users\JR\Favorites
[2012/01/11 01:42:22 | 000,000,000 | R--D | C] -- C:\Users\JR\Downloads
[2012/01/11 01:42:22 | 000,000,000 | R--D | C] -- C:\Users\JR\Documents
[2012/01/11 01:42:22 | 000,000,000 | R--D | C] -- C:\Users\JR\Desktop
[2012/01/11 01:42:22 | 000,000,000 | R--D | C] -- C:\Users\JR\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories
[2012/01/11 01:42:22 | 000,000,000 | -H-D | C] -- C:\Users\JR\AppData
[2012/01/11 01:42:22 | 000,000,000 | ---D | C] -- C:\Users\JR\AppData\Local\Temp
[2012/01/11 01:42:22 | 000,000,000 | ---D | C] -- C:\Users\JR\AppData\Local\Microsoft
[2012/01/11 01:42:22 | 000,000,000 | ---D | C] -- C:\Users\JR\AppData\Roaming\Media Center Programs
[2012/01/11 01:42:15 | 000,000,000 | -HSD | C] -- C:\Recovery
[2012/01/11 01:35:24 | 000,000,000 | ---D | C] -- C:\Windows\SoftwareDistribution
[2012/01/11 01:33:13 | 000,000,000 | ---D | C] -- C:\Windows\Prefetch
[2012/01/11 01:32:21 | 000,000,000 | -HSD | C] -- C:\System Volume Information
[2012/01/11 01:31:45 | 000,000,000 | ---D | C] -- C:\Windows\Panther

========== Files - Modified Within 30 Days ==========

[2012/01/18 12:00:02 | 000,584,192 | ---- | M] (OldTimer Tools) -- C:\Users\JR\Desktop\OTL.exe
[2012/01/18 11:58:13 | 000,692,886 | ---- | M] () -- C:\Windows\System32\perfh00C.dat
[2012/01/18 11:58:13 | 000,691,932 | ---- | M] () -- C:\Windows\System32\perfh00A.dat
[2012/01/18 11:58:13 | 000,662,402 | ---- | M] () -- C:\Windows\System32\prfh0416.dat
[2012/01/18 11:58:13 | 000,615,122 | ---- | M] () -- C:\Windows\System32\perfh009.dat
[2012/01/18 11:58:13 | 000,133,632 | ---- | M] () -- C:\Windows\System32\perfc00A.dat
[2012/01/18 11:58:13 | 000,126,998 | ---- | M] () -- C:\Windows\System32\perfc00C.dat
[2012/01/18 11:58:13 | 000,124,850 | ---- | M] () -- C:\Windows\System32\prfc0416.dat
[2012/01/18 11:58:13 | 000,103,496 | ---- | M] () -- C:\Windows\System32\perfc009.dat
[2012/01/18 11:54:03 | 000,067,584 | --S- | M] () -- C:\Windows\bootstat.dat
[2012/01/18 11:53:58 | 2361,802,752 | -HS- | M] () -- C:\hiberfil.sys
[2012/01/11 13:13:49 | 000,001,240 | ---- | M] () -- C:\Users\JR\Application Data\Microsoft\Internet Explorer\Quick Launch\Spybot - Search & Destroy.lnk
[2012/01/11 13:13:49 | 000,001,216 | ---- | M] () -- C:\Users\JR\Desktop\Spybot - Search & Destroy.lnk
[2012/01/11 13:13:15 | 016,409,960 | ---- | M] (Safer Networking Limited ) -- C:\Users\JR\Desktop\spybotsd162.exe
[2012/01/11 13:11:51 | 000,001,407 | ---- | M] () -- C:\Users\JR\Application Data\Microsoft\Internet Explorer\Quick Launch\Launch Internet Explorer Browser.lnk
[2012/01/11 13:10:36 | 000,013,600 | -H-- | M] () -- C:\Windows\System32\7B296FB0-376B-497e-B012-9C450E1B7327-5P-1.C7483456-A289-439d-8115-601632D005A0
[2012/01/11 13:10:36 | 000,013,600 | -H-- | M] () -- C:\Windows\System32\7B296FB0-376B-497e-B012-9C450E1B7327-5P-0.C7483456-A289-439d-8115-601632D005A0
[2012/01/11 01:38:04 | 000,266,808 | ---- | M] () -- C:\Windows\System32\FNTCACHE.DAT
[2012/01/11 01:36:45 | 000,041,962 | ---- | M] () -- C:\Windows\System32\license.rtf
[2012/01/11 01:35:10 | 000,000,000 | -H-- | M] () -- C:\Windows\System32\drivers\Msft_User_WpdFs_01_09_00.Wdf

========== Files Created - No Company Name ==========

[2012/01/11 13:13:49 | 000,001,240 | ---- | C] () -- C:\Users\JR\Application Data\Microsoft\Internet Explorer\Quick Launch\Spybot - Search & Destroy.lnk
[2012/01/11 13:13:49 | 000,001,216 | ---- | C] () -- C:\Users\JR\Desktop\Spybot - Search & Destroy.lnk
[2012/01/11 13:11:51 | 000,001,407 | ---- | C] () -- C:\Users\JR\Application Data\Microsoft\Internet Explorer\Quick Launch\Launch Internet Explorer Browser.lnk
[2012/01/11 01:42:58 | 000,001,413 | ---- | C] () -- C:\Users\JR\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Internet Explorer.lnk
[2012/01/11 01:42:22 | 000,000,290 | ---- | C] () -- C:\Users\JR\Application Data\Microsoft\Internet Explorer\Quick Launch\Shows Desktop.lnk
[2012/01/11 01:42:22 | 000,000,272 | ---- | C] () -- C:\Users\JR\Application Data\Microsoft\Internet Explorer\Quick Launch\Window Switcher.lnk
[2012/01/11 01:36:39 | 000,001,345 | ---- | C] () -- C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Media Center.lnk
[2012/01/11 01:36:31 | 000,001,326 | ---- | C] () -- C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Windows DVD Maker.lnk
[2012/01/11 01:35:10 | 000,000,000 | -H-- | C] () -- C:\Windows\System32\drivers\Msft_User_WpdFs_01_09_00.Wdf
[2012/01/11 01:32:20 | 2361,802,752 | -HS- | C] () -- C:\hiberfil.sys
[2009/07/26 20:47:53 | 000,662,402 | ---- | C] () -- C:\Windows\System32\prfh0416.dat
[2009/07/26 20:47:53 | 000,323,154 | ---- | C] () -- C:\Windows\System32\prfi0416.dat
[2009/07/26 20:47:53 | 000,124,850 | ---- | C] () -- C:\Windows\System32\prfc0416.dat
[2009/07/26 20:47:53 | 000,038,536 | ---- | C] () -- C:\Windows\System32\prfd0416.dat
[2009/07/26 20:41:12 | 000,692,886 | ---- | C] () -- C:\Windows\System32\perfh00C.dat
[2009/07/26 20:41:12 | 000,344,522 | ---- | C] () -- C:\Windows\System32\perfi00C.dat
[2009/07/26 20:41:12 | 000,126,998 | ---- | C] () -- C:\Windows\System32\perfc00C.dat
[2009/07/26 20:41:12 | 000,038,160 | ---- | C] () -- C:\Windows\System32\perfd00C.dat
[2009/07/26 20:33:43 | 000,691,932 | ---- | C] () -- C:\Windows\System32\perfh00A.dat
[2009/07/26 20:33:43 | 000,341,432 | ---- | C] () -- C:\Windows\System32\perfi00A.dat
[2009/07/26 20:33:43 | 000,133,632 | ---- | C] () -- C:\Windows\System32\perfc00A.dat
[2009/07/26 20:33:43 | 000,041,390 | ---- | C] () -- C:\Windows\System32\perfd00A.dat
[2009/07/13 20:57:37 | 000,067,584 | --S- | C] () -- C:\Windows\bootstat.dat
[2009/07/13 20:33:53 | 000,266,808 | ---- | C] () -- C:\Windows\System32\FNTCACHE.DAT
[2009/07/13 18:05:48 | 000,615,122 | ---- | C] () -- C:\Windows\System32\perfh009.dat
[2009/07/13 18:05:48 | 000,291,294 | ---- | C] () -- C:\Windows\System32\perfi009.dat
[2009/07/13 18:05:48 | 000,103,496 | ---- | C] () -- C:\Windows\System32\perfc009.dat
[2009/07/13 18:05:48 | 000,031,548 | ---- | C] () -- C:\Windows\System32\perfd009.dat
[2009/07/13 18:05:05 | 000,000,741 | ---- | C] () -- C:\Windows\System32\NOISE.DAT
[2009/07/13 18:04:11 | 000,215,943 | ---- | C] () -- C:\Windows\System32\dssec.dat
[2009/07/13 15:55:01 | 000,043,131 | ---- | C] () -- C:\Windows\mib.bin
[2009/07/13 15:51:43 | 000,073,728 | ---- | C] () -- C:\Windows\System32\BthpanContextHandler.dll
[2009/07/13 15:42:10 | 000,064,000 | ---- | C] () -- C:\Windows\System32\BWContextHandler.dll
[2009/07/13 14:09:19 | 000,982,196 | ---- | C] () -- C:\Windows\System32\igkrng500.bin
[2009/07/13 14:09:19 | 000,417,344 | ---- | C] () -- C:\Windows\System32\igcompkrng500.bin
[2009/07/13 14:09:19 | 000,139,824 | ---- | C] () -- C:\Windows\System32\igfcg500.bin
[2009/07/13 14:09:19 | 000,097,448 | ---- | C] () -- C:\Windows\System32\igfcg500m.bin
[2009/06/10 13:26:10 | 000,673,088 | ---- | C] () -- C:\Windows\System32\mlang.dat

< End of report >

OTL Extras logfile created on: 1/18/2012 12:03:23 PM - Run 1
OTL by OldTimer - Version 3.2.31.0 Folder = C:\Users\JR\Desktop
Home Premium Edition (Version = 6.1.7600) - Type = NTWorkstation
Internet Explorer (Version = 8.0.7600.16385)
Locale: 00000409 | Country: United States | Language: ENU | Date Format: M/d/yyyy

2.93 Gb Total Physical Memory | 2.61 Gb Available Physical Memory | 88.98% Memory free
5.86 Gb Paging File | 5.57 Gb Available in Paging File | 94.91% Paging File free
Paging file location(s): ?:\pagefile.sys [binary data]

%SystemDrive% = C: | %SystemRoot% = C:\Windows | %ProgramFiles% = C:\Program Files
Drive C: | 297.99 Gb Total Space | 286.91 Gb Free Space | 96.28% Space Free | Partition Type: NTFS

Computer Name: JR-PC | User Name: JR | Logged in as Administrator.
Boot Mode: SafeMode with Networking | Scan Mode: All users
Company Name Whitelist: Off | Skip Microsoft Files: Off | No Company Name Whitelist: On | File Age = 30 Days

========== Extra Registry (SafeList) ==========


========== File Associations ==========

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\<extension>]
.cpl [@ = cplfile] -- C:\Windows\System32\control.exe (Microsoft Corporation)
.hlp [@ = hlpfile] -- C:\Windows\winhlp32.exe (Microsoft Corporation)

========== Shell Spawning ==========

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\<key>\shell\[command]\command]
batfile [open] -- "%1" %*
cmdfile [open] -- "%1" %*
comfile [open] -- "%1" %*
cplfile [cplopen] -- %SystemRoot%\System32\control.exe "%1",%* (Microsoft Corporation)
exefile [open] -- "%1" %*
helpfile [open] -- Reg Error: Key error.
hlpfile [open] -- %SystemRoot%\winhlp32.exe %1 (Microsoft Corporation)
htmlfile [edit] -- Reg Error: Key error.
htmlfile [print] -- rundll32.exe %windir%\system32\mshtml.dll,PrintHTML "%1"
inffile [install] -- %SystemRoot%\System32\InfDefaultInstall.exe "%1" (Microsoft Corporation)
piffile [open] -- "%1" %*
regfile [merge] -- Reg Error: Key error.
scrfile [config] -- "%1"
scrfile [install] -- rundll32.exe desk.cpl,InstallScreenSaver %l
scrfile [open] -- "%1" /S
txtfile [edit] -- Reg Error: Key error.
Unknown [openas] -- %SystemRoot%\system32\rundll32.exe %SystemRoot%\system32\shell32.dll,OpenAs_RunDLL %1
Directory [cmd] -- cmd.exe /s /k pushd "%V" (Microsoft Corporation)
Directory [find] -- %SystemRoot%\Explorer.exe (Microsoft Corporation)
Folder [open] -- %SystemRoot%\Explorer.exe (Microsoft Corporation)
Folder [explore] -- Reg Error: Value error.
Drive [find] -- %SystemRoot%\Explorer.exe (Microsoft Corporation)

========== Security Center Settings ==========

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center]
"cval" = 0

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Svc]
"VistaSp1" = Reg Error: Unknown registry data type -- File not found
"AntiVirusOverride" = 0
"AntiSpywareOverride" = 0
"FirewallOverride" = 0

========== Firewall Settings ==========

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile]
"DisableNotifications" = 0
"EnableFirewall" = 1

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile]
"DisableNotifications" = 0
"EnableFirewall" = 1

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\PublicProfile]
"DisableNotifications" = 0
"EnableFirewall" = 1

========== Authorized Applications List ==========


========== HKEY_LOCAL_MACHINE Uninstall List ==========

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall]
"{B4092C6D-E886-4CB2-BA68-FE5A88D31DE6}_is1" = Spybot - Search & Destroy

========== Last 10 Event Log Errors ==========

[ System Events ]
Error - 1/18/2012 3:55:00 PM | Computer Name = JR-PC | Source = Service Control Manager | ID = 7001
Description = The Computer Browser service depends on the Server service which failed
to start because of the following error: %%1068

Error - 1/18/2012 3:55:00 PM | Computer Name = JR-PC | Source = Service Control Manager | ID = 7001
Description = The Computer Browser service depends on the Server service which failed
to start because of the following error: %%1068

Error - 1/18/2012 3:57:02 PM | Computer Name = JR-PC | Source = Service Control Manager | ID = 7001
Description = The Computer Browser service depends on the Server service which failed
to start because of the following error: %%1068

Error - 1/18/2012 3:57:02 PM | Computer Name = JR-PC | Source = Service Control Manager | ID = 7001
Description = The Computer Browser service depends on the Server service which failed
to start because of the following error: %%1068

Error - 1/18/2012 3:57:02 PM | Computer Name = JR-PC | Source = Service Control Manager | ID = 7001
Description = The Computer Browser service depends on the Server service which failed
to start because of the following error: %%1068

Error - 1/18/2012 4:02:02 PM | Computer Name = JR-PC | Source = Service Control Manager | ID = 7001
Description = The Computer Browser service depends on the Server service which failed
to start because of the following error: %%1068

Error - 1/18/2012 4:02:02 PM | Computer Name = JR-PC | Source = Service Control Manager | ID = 7001
Description = The Computer Browser service depends on the Server service which failed
to start because of the following error: %%1068

Error - 1/18/2012 4:02:02 PM | Computer Name = JR-PC | Source = Service Control Manager | ID = 7001
Description = The Computer Browser service depends on the Server service which failed
to start because of the following error: %%1068

Error - 1/18/2012 4:04:10 PM | Computer Name = JR-PC | Source = Service Control Manager | ID = 7001
Description = The Computer Browser service depends on the Server service which failed
to start because of the following error: %%1068

Error - 1/18/2012 4:04:10 PM | Computer Name = JR-PC | Source = Service Control Manager | ID = 7001
Description = The Computer Browser service depends on the Server service which failed
to start because of the following error: %%1068


< End of report >

#5 sempai

sempai

    noypi


  • Malware Response Team
  • 5,288 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:3 stars and a sun
  • Local time:12:04 AM

Posted 18 January 2012 - 08:09 PM

Hi Delahelp,

Are you using a router?


:step1: We need to disable Spybot S&D's "TeaTimer"
TeaTimer works by preventing ANY changes to the system. It will attempt to undo any fixes we run, because it blocks these fixes from running.

In order to safeguard your system from problems that can be brought on by a half finished fix, we need to disable TeaTimer. We can reenable it when we're done if you like.
  • Open SpyBot Search and Destroy by going to Start -> All Programs -> Spybot Search and Destroy -> Spybot Search and Destroy.
  • If prompted with a legal dialog, accept the warning.
  • Click Posted Image and then on "Advanced Mode"
    Posted Image
  • You may be presented with a warning dialog. If so, press Posted Image
  • Click on Posted Image
  • Click on Posted Image
  • Uncheck this checkbox:
    Posted Image
  • Close/Exit Spybot Search and Destroy


:step2: Please use Internet Explorer to perform a BitDefender Quickscan
  • Click on START SCANNER.
  • Click on FREE SCAN NOW. Please wait as it might take some time to load.
  • It will then ask you to install the add-on "qsax.cab" (Just above the page under the Internet Explorer toolbar). Please allow it to be installed.
  • Click the FREE SCAN NOW button once again to start the add-on installation.
  • Click "Install" and accept the "End User Software License Agreement" when prompted and then click OK.
  • it will now begin scanning, please let it run uninterrupted.
  • Click on View report once completed.
  • A notepad will pop-up containing the report.
  • Please post the entire contents of that report when you reply.
Note: For Windows Vista/7 users, you will need to to right-click on Internet Explorer icon in the Start Menu or Quick Launch Bar on the Taskbar and select Run as Administrator from the context menu.

~Semp

btn_donate_LG.gif
You can help me continue the fight against malware by making a donation, Thank you.

If I am helping you and I didn't reply within 48 hours... Please send me a private message.
Topics that are not replied within 5 days will be close. Please don't PM asking for support, post on the Forums instead.

Member of UNITE (Unified Network of Instructors and Trained Eliminators) 


#6 Delahelp

Delahelp
  • Topic Starter

  • Members
  • 31 posts
  • OFFLINE
  •  
  • Local time:11:04 AM

Posted 18 January 2012 - 08:58 PM

Yes I am using a router and for some reason bit defender isn't working. Is it because I am working in safe mode?

#7 sempai

sempai

    noypi


  • Malware Response Team
  • 5,288 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:3 stars and a sun
  • Local time:12:04 AM

Posted 18 January 2012 - 09:06 PM

Please try it in normal mode.

~Semp

btn_donate_LG.gif
You can help me continue the fight against malware by making a donation, Thank you.

If I am helping you and I didn't reply within 48 hours... Please send me a private message.
Topics that are not replied within 5 days will be close. Please don't PM asking for support, post on the Forums instead.

Member of UNITE (Unified Network of Instructors and Trained Eliminators) 


#8 Delahelp

Delahelp
  • Topic Starter

  • Members
  • 31 posts
  • OFFLINE
  •  
  • Local time:11:04 AM

Posted 19 January 2012 - 09:57 PM

I updated the IE then it started working. Here are the results.


QuickScan 32-bit v0.9.9.103
---------------------------
Scan date: Thu Jan 19 19:02:04 2012
Machine ID: 424177CF



No infection found.
-------------------



Processes
---------
Microsoft® Windows® Operating System 2220 C:\Program Files\Windows Media Player\wmpnetwk.exe
Microsoft® Windows® Operating System 1476 C:\Windows\explorer.exe
Microsoft® Windows® Operating System 356 C:\Windows\System32\csrss.exe
Microsoft® Windows® Operating System 408 C:\Windows\System32\csrss.exe
Microsoft® Windows® Operating System 496 C:\Windows\System32\lsm.exe
Microsoft® Windows® Operating System 456 C:\Windows\System32\services.exe
Microsoft® Windows® Operating System 264 C:\Windows\System32\smss.exe
Microsoft® Windows® Operating System 3616 C:\Windows\System32\sppsvc.exe
Microsoft® Windows® Operating System 1692 C:\Windows\System32\wbem\WmiPrvSE.exe
Microsoft® Windows® Operating System 2644 C:\Windows\System32\wbem\WmiPrvSE.exe
Microsoft® Windows® Operating System 400 C:\Windows\System32\wininit.exe
Microsoft® Windows® Operating System 504 C:\Windows\System32\winlogon.exe
Microsoft® Windows® Operating System 1816 C:\Windows\System32\WUDFHost.exe
Spybot - Search & Destroy 1528 C:\Program Files\Spybot - Search & Destroy\SDWinSec.exe
Windows® Internet Explorer 2064 C:\Program Files\Internet Explorer\iexplore.exe
Windows® Internet Explorer 780 C:\Program Files\Internet Explorer\iexplore.exe
Windows® Search 3056 C:\Windows\System32\SearchFilterHost.exe
Windows® Search 2008 C:\Windows\System32\SearchProtocolHost.exe
Windows® Search 3092 C:\Windows\System32\SearchProtocolHost.exe
(verified) Microsoft® Windows® Operating System 1012 C:\Windows\servicing\TrustedInstaller.exe
(verified) Microsoft® Windows® Operating System 1884 C:\Windows\System32\dwm.exe
(verified) Microsoft® Windows® Operating System 488 C:\Windows\System32\lsass.exe
(verified) Microsoft® Windows® Operating System 1260 C:\Windows\System32\spoolsv.exe
(verified) Microsoft® Windows® Operating System 864 C:\Windows\System32\svchost.exe
(verified) Microsoft® Windows® Operating System 840 C:\Windows\System32\svchost.exe
(verified) Microsoft® Windows® Operating System 788 C:\Windows\System32\svchost.exe
(verified) Microsoft® Windows® Operating System 700 C:\Windows\System32\svchost.exe
(verified) Microsoft® Windows® Operating System 624 C:\Windows\System32\svchost.exe
(verified) Microsoft® Windows® Operating System 2292 C:\Windows\System32\svchost.exe
(verified) Microsoft® Windows® Operating System 2412 C:\Windows\System32\svchost.exe
(verified) Microsoft® Windows® Operating System 1288 C:\Windows\System32\svchost.exe
(verified) Microsoft® Windows® Operating System 1124 C:\Windows\System32\svchost.exe
(verified) Microsoft® Windows® Operating System 3448 C:\Windows\System32\svchost.exe
(verified) Microsoft® Windows® Operating System 1032 C:\Windows\System32\svchost.exe
(verified) Microsoft® Windows® Operating System 3652 C:\Windows\System32\svchost.exe
(verified) Microsoft® Windows® Operating System 1504 C:\Windows\System32\taskhost.exe
(verified) Windows® Search 412 C:\Windows\System32\SearchIndexer.exe


Network activity
----------------
Process iexplore.exe (2064) connected on port 80 (HTTP) --> 65.55.17.78
Process iexplore.exe (2064) connected on port 80 (HTTP) --> 65.55.17.78
Process iexplore.exe (2064) connected on port 80 (HTTP) --> 207.46.140.46
Process iexplore.exe (2064) connected on port 80 (HTTP) --> 207.46.140.46
Process iexplore.exe (2064) connected on port 80 (HTTP) --> 64.4.21.39
Process iexplore.exe (2064) connected on port 80 (HTTP) --> 64.4.21.39
Process iexplore.exe (2064) connected on port 80 (HTTP) --> 65.55.5.233
Process iexplore.exe (2064) connected on port 80 (HTTP) --> 65.55.5.233
Process iexplore.exe (2064) connected on port 80 (HTTP) --> 65.55.5.233
Process iexplore.exe (2064) connected on port 80 (HTTP) --> 70.37.131.11
Process iexplore.exe (2064) connected on port 80 (HTTP) --> 70.37.131.11
Process iexplore.exe (2064) connected on port 80 (HTTP) --> 184.25.75.120
Process iexplore.exe (2064) connected on port 80 (HTTP) --> 66.185.85.162
Process iexplore.exe (2064) connected on port 80 (HTTP) --> 66.185.85.162
Process iexplore.exe (2064) connected on port 80 (HTTP) --> 66.185.85.162
Process iexplore.exe (2064) connected on port 80 (HTTP) --> 64.236.101.12
Process iexplore.exe (2064) connected on port 80 (HTTP) --> 64.236.101.12
Process iexplore.exe (2064) connected on port 80 (HTTP) --> 66.185.85.162
Process iexplore.exe (2064) connected on port 80 (HTTP) --> 66.185.85.162
Process iexplore.exe (2064) connected on port 80 (HTTP) --> 66.185.85.162
Process iexplore.exe (2064) connected on port 443 (HTTP over SSL) --> 74.125.226.57
Process iexplore.exe (2064) connected on port 80 (HTTP) --> 66.185.85.177
Process iexplore.exe (2064) connected on port 80 (HTTP) --> 74.125.226.57
Process iexplore.exe (2064) connected on port 80 (HTTP) --> 74.125.226.57
Process iexplore.exe (2064) connected on port 80 (HTTP) --> 74.125.226.57
Process iexplore.exe (2064) connected on port 80 (HTTP) --> 81.95.148.66
Process iexplore.exe (2064) connected on port 443 (HTTP over SSL) --> 74.125.226.38
Process iexplore.exe (2064) connected on port 443 (HTTP over SSL) --> 74.125.226.38
Process iexplore.exe (2064) connected on port 80 (HTTP) --> 66.235.143.118
Process iexplore.exe (2064) connected on port 443 (HTTP over SSL) --> 74.125.226.79
Process iexplore.exe (2064) connected on port 443 (HTTP over SSL) --> 74.125.226.79
Process iexplore.exe (2064) connected on port 80 (HTTP) --> 184.24.147.55
Process iexplore.exe (2064) connected on port 80 (HTTP) --> 184.24.147.55
Process iexplore.exe (2064) connected on port 80 (HTTP) --> 69.171.229.15
Process iexplore.exe (2064) connected on port 80 (HTTP) --> 69.171.229.15
Process iexplore.exe (2064) connected on port 80 (HTTP) --> 69.171.229.15
Process iexplore.exe (2064) connected on port 443 (HTTP over SSL) --> 74.125.226.63
Process iexplore.exe (2064) connected on port 443 (HTTP over SSL) --> 74.125.226.63
Process iexplore.exe (2064) connected on port 80 (HTTP) --> 66.185.85.192
Process iexplore.exe (2064) connected on port 80 (HTTP) --> 66.185.85.192
Process iexplore.exe (2064) connected on port 80 (HTTP) --> 66.185.85.192
Process iexplore.exe (2064) connected on port 80 (HTTP) --> 64.210.100.27
Process iexplore.exe (2064) connected on port 80 (HTTP) --> 64.210.100.27
Process iexplore.exe (2064) connected on port 80 (HTTP) --> 64.210.100.27
Process iexplore.exe (2064) connected on port 80 (HTTP) --> 64.210.100.27
Process iexplore.exe (2064) connected on port 80 (HTTP) --> 64.210.100.27
Process iexplore.exe (2064) connected on port 80 (HTTP) --> 199.68.156.31
Process iexplore.exe (2064) connected on port 80 (HTTP) --> 199.68.156.83
Process iexplore.exe (2064) connected on port 80 (HTTP) --> 216.137.33.147
Process iexplore.exe (2064) connected on port 80 (HTTP) --> 216.137.33.147
Process iexplore.exe (2064) connected on port 443 (HTTP over SSL) --> 184.25.77.177
Process iexplore.exe (2064) connected on port 443 (HTTP over SSL) --> 184.25.77.177
Process iexplore.exe (2064) connected on port 443 (HTTP over SSL) --> 72.14.204.95
Process iexplore.exe (2064) connected on port 443 (HTTP over SSL) --> 72.14.204.95
Process iexplore.exe (2064) connected on port 80 (HTTP) --> 74.125.226.45
Process iexplore.exe (2064) connected on port 80 (HTTP) --> 74.125.226.45

Process wininit.exe (400) listens on ports: 49152 (RPC)
Process services.exe (456) listens on ports: 49156 (RPC)
Process lsass.exe (488) listens on ports: 49155 (RPC)
Process svchost.exe (700) listens on ports: 135 (RPC)
Process svchost.exe (788) listens on ports: 49153 (RPC)
Process svchost.exe (864) listens on ports: 49154 (RPC)
Process wmpnetwk.exe (2220) listens on ports: 554 (RTSP)


Autoruns and critical files
---------------------------
(verified) Microsoft® Windows® Operating System c:\windows\system32\userinit.exe


Browser plugins
---------------
BitDefender QuickScan C:\Windows\Downloaded Program Files\qsax.dll
Windows® Internet Explorer C:\Windows\system32\IEFRAME.dll
(verified) Microsoft® Windows® Operating System C:\Windows\system32\mswsock.dll
(verified) Microsoft® Windows® Operating System C:\Windows\system32\napinsp.dll
(verified) Microsoft® Windows® Operating System C:\Windows\System32\nlaapi.dll
(verified) Microsoft® Windows® Operating System C:\Windows\system32\pnrpnsp.dll
(verified) Microsoft® Windows® Operating System C:\Windows\System32\winrnr.dll


Scan
----
MD5: a1659e4d08fe8d0f0bc61960d8c0369e C:\Program Files\Internet Explorer\ieproxy.dll
MD5: 4d0bad6e0b9a5e650fe37a05f33bf288 C:\Program Files\Internet Explorer\IEShims.dll
MD5: 904e13ba41af2e353a32cf351ca53639 C:\Program Files\Internet Explorer\iexplore.exe
MD5: 2c20fa0f6d6825342a1529b2846e0c4f C:\Program Files\Internet Explorer\sqmapi.dll
MD5: 089b5f924e96ba9c40e4e4522bf43770 c:\program files\windows defender\mprtp.dll
MD5: a2a7672947e230ac22b83a8b65403c3f C:\Program Files\Windows Media Player\WMPMediaSharing.dll
MD5: 77fbd400984cf72ba0fc4b3489d65f74 C:\Program Files\Windows Media Player\wmpnetwk.exe
MD5: b8f613ac24cc3c706029e602e2d5ddbf C:\Windows\Downloaded Program Files\qsax.dll
MD5: 15bc38a7492befe831966adb477cf76f C:\Windows\explorer.exe
MD5: 8b794ae6d5c7d42092804bc39a2eb8f6 C:\Windows\system32\AEPIC.dll
MD5: fabfc817547eabb19b74849cef410622 C:\Windows\system32\authui.dll
MD5: 9a595df601070da78c40481120dd2c06 C:\Windows\system32\basesrv.DLL
MD5: f45ed8c4f9af862cd9992849b5203c11 C:\Windows\system32\bitsigd.dll
MD5: 704a8b68374e6309b8d67f997fd3034b c:\windows\system32\bitsperf.dll
MD5: 9092668daf4061898fd3f2c19d8c7f85 C:\Windows\system32\CLUSAPI.DLL
MD5: 50ba656134f78af64e4dd3c8b6fefd7e C:\Windows\system32\cngaudit.dll
MD5: 10de24cccd418c31107813682eb73542 C:\Windows\system32\CSRSRV.dll
MD5: 342271f6142e7c70805b8a81e1ba5f5c C:\Windows\System32\csrss.exe
MD5: 7c5567a00456f3a3a07800ebb3f351c4 C:\Windows\system32\d2d1.dll
MD5: c5f549970ac071ea452e58b6422c94fa C:\Windows\system32\d3d10_1.dll
MD5: 029e2a480ce2020df097e535a2311712 C:\Windows\system32\d3d10_1core.dll
MD5: 990a58a0b01720e419b55efc5ff387f8 C:\Windows\System32\dhcpcore6.dll
MD5: 100103c6535c66265267f5eea5f5846e C:\Windows\System32\dnsext.dll
MD5: 76bab0c824e2d05b940c4dd40a9b08bf C:\Windows\system32\DRIVERS\athr.sys
MD5: c94b6c3cc628179cb9b9061c19888b99 C:\Windows\System32\drivers\dxgkrnl.sys
MD5: 7dfd48e24479b68b258d8770121155a0 C:\Windows\system32\DRIVERS\Rt86win7.sys
MD5: b5665baa2120b8a54e22e9cd07c05106 C:\Windows\System32\DRIVERS\srvnet.sys
MD5: 7abbdc3b08950992d218fa1e52d52a96 C:\Windows\System32\drivers\UMDF\WpdFs.dll
MD5: e00fdfaff025e94f9821153750c35a6d C:\Windows\system32\DRIVERS\VSTAZL3.SYS
MD5: bc0c7ea89194c299f051c24119000e17 C:\Windows\system32\DRIVERS\VSTCNXT3.SYS
MD5: ceb4e3b6890e1e42dca6694d9e59e1a0 C:\Windows\system32\DRIVERS\VSTDPV3.SYS
MD5: ee29fcc244c8033e2f748d863dcbf378 C:\Windows\System32\drt.dll
MD5: aa3b91b70e79bce70ad3b190789b9574 C:\Windows\System32\drttransport.dll
MD5: 60cc965a89e2072ebd26d63d5e1e1d18 C:\Windows\system32\dwmcore.dll
MD5: c0523fe101a30e3821604fe1ca1740d7 C:\Windows\system32\DWrite.dll
MD5: 4312debdacbe338f0b90e7f08e7672be C:\Windows\System32\Dxtmsft.dll
MD5: ca493a92da9880b6f1a89c3dbd54ba5b C:\Windows\System32\Dxtrans.dll
MD5: 496c56361f57c2ca54931ebbc7d6c2cf C:\Windows\system32\eapphost.dll
MD5: 91f434ff6606ed9bdc6a05d651b69553 C:\Windows\system32\efslsaext.dll
MD5: 8444a7364d6877922049e99bf4b78c5c C:\Windows\system32\elscore.dll
MD5: 02a2ed8497f437ea200df3aced255afe C:\Windows\system32\ElsLad.dll
MD5: 8898c95862d03d16b2a06db4db6bb6b2 C:\Windows\system32\explorerframe.dll
MD5: f34cfada6c48daa41b996d24c7d8d3ca C:\Windows\system32\fdPnp.dll
MD5: 674611721264013db169ec12afc9c3b6 C:\Windows\system32\fdssdp.dll
MD5: de6f4b7e62fde776f3de8e5fb5a05c48 C:\Windows\system32\fdwsd.dll
MD5: 151258fc2ec8c48bdf8a53350ae0a676 c:\windows\system32\fntcache.dll
MD5: c87f28a34b3840f4b40011d170b1a159 C:\Windows\system32\FVECERTS.dll
MD5: d5cc5113671ac70993a5b46923212f16 C:\Windows\System32\FXSMON.DLL
MD5: 7a01a8d7c11861322a801afe32e5effa C:\Windows\system32\hgprint.dll
MD5: 9dc23acf360aea7df55ad7a8d3fbf4e6 C:\Windows\System32\IdListen.dll
MD5: ee9d715af1b928982f417238b9914484 C:\Windows\System32\ieapfltr.dll
MD5: 691e93028b8723e05b4a637be77380dd C:\Windows\system32\IEFRAME.dll
MD5: 1416ab557be700fa117323b6b8f32882 C:\Windows\system32\iertutil.dll
MD5: 274e38af453fa9e079b1d5a85f5f0921 C:\Windows\system32\IEUI.dll
MD5: c351f62a539d8725f7ef3216a3cd6b3b C:\Windows\system32\igd10umd32.dll
MD5: 68563ac389f92ee79f1c714288ba1dce C:\Windows\system32\ImgUtil.dll
MD5: 258a532cffaad910b5b14f27dcd7bfb3 C:\Windows\System32\inetpp.dll
MD5: 82586704868e3abb382cae303b41e8b7 C:\Windows\System32\jscript9.dll
MD5: 4605f7ee9805f7e1c98d6c959dd2949c C:\Windows\SYSTEM32\kernel32.dll
MD5: af75dba674e55221b7a055b0a4345f16 C:\Windows\system32\keyiso.dll
MD5: c1585eaa67c37a05bf6f93726fafc069 c:\windows\system32\l2gpstore.dll
MD5: 55ca01ba19d0006c8f2639b6c045e08b c:\windows\system32\lmhsvc.dll
MD5: 724a74ba9b5832a91562d2ac393e540b C:\Windows\System32\localspl.dll
MD5: 4bc5b6d0b7ba1b92c9610a7eb1bad8ab C:\Windows\system32\lsasrv.dll
MD5: 398dc10274c0cb861338cfc56e727c9f C:\Windows\System32\lsm.exe
MD5: 0f0ee7de3436e6f8f0e19dacac7b5730 C:\Windows\System32\mf.dll
MD5: f5777c29e38e4bf12c6f93a0b2f1b2d7 C:\Windows\system32\MSASN1.dll
MD5: 66c0aee61d1c5c35bf1b4642a153b114 C:\Windows\system32\MSHTML.dll
MD5: 35aae2e841aa1a949775168e119482c9 C:\Windows\system32\msls31.dll
MD5: 25fc9e3237d9dc8f7511af13e70c49bc C:\Windows\System32\msmpeg2enc.dll
MD5: 387a8a473ecc5ba02cf453277c1f3274 c:\windows\system32\mspatcha.dll
MD5: c90878913df3dc504790282043db5f4c C:\Windows\system32\msprivs.DLL
MD5: 32aaeabff6299834e5d38c3a442ccf36 C:\Windows\system32\mssph.dll
MD5: 0ce7a0ffbba93810384b6794c6901f4c C:\Windows\system32\MSSRCH.DLL
MD5: f40388a19f3be3cec25656ce07392877 C:\Windows\system32\msv1_0.DLL
MD5: 5f610783fbf01f9885d80a1db1a2f220 C:\Windows\system32\NCI.dll
MD5: a4cc7227a452c4909f9499d91b184364 C:\Windows\system32\NCObjAPI.DLL
MD5: 3f2deafc463d75611cb9c5e36a8ccf15 c:\windows\system32\ncsi.dll
MD5: f7fe730ce31b54145dee1f1482bccdd7 C:\Windows\system32\ndiscapCfg.dll
MD5: 6dcfaec6d1334aa6cdf8961db4633cbf C:\Windows\system32\negoexts.DLL
MD5: c5b5ccdbf8ed1475240313ed88234e3f C:\Windows\system32\netcfgx.dll
MD5: c1ae600c554a0ebc6cd211541fa6815f C:\Windows\system32\netjoin.dll
MD5: eaa75d9000b71f10eec04d2ae6c60e81 C:\Windows\system32\netlogon.DLL
MD5: 61b33014f2d2a4f9553f6ef64fb82e31 C:\Windows\System32\NLSData000c.dll
MD5: 420db712b24607220c11fc08a9f9371c C:\Windows\System32\NLSData0416.dll
MD5: ac7d0114246661b1e29a0939039157c5 C:\Windows\System32\NLSLexicons000c.dll
MD5: 16707ec5fd029a4415b138796f0981ce c:\windows\system32\nrpsrv.DLL
MD5: ba387e955e890c8a88306d9b8d06bf17 c:\windows\system32\nsisvc.dll
MD5: 08df1b8c9c0754a7069e80a986373f52 C:\Windows\System32\P2P.dll
MD5: 1b0ec94520cab89a9ce1b2da405166af C:\Windows\System32\P2PCOLLAB.dll
MD5: 1372e8e8fd066002131e3d509275e697 c:\windows\system32\P2PGRAPH.dll
MD5: 7e82616bee76bf5eaa5b30f681414e21 C:\Windows\system32\perftrack.dll
MD5: 37cc990d4e2cdfae12ac47f6b620fc13 C:\Windows\system32\pku2u.DLL
MD5: 2862a3819bbc9757dd27bac41a4e0a3e C:\Windows\System32\pnidui.dll
MD5: 81490fdae27f0082e5cc2dc78dca96fa C:\Windows\System32\portabledeviceclassextension.dll
MD5: c693e642acfbdd76433af6be3c3eee6f C:\Windows\System32\portabledeviceconnectapi.dll
MD5: dda6cfd632dcb8d9c72ada58799bf776 C:\Windows\System32\PrintIsolationProxy.dll
MD5: 7ffd52d73352806969d424ef327d10a7 C:\Windows\system32\radardt.dll
MD5: 761a3a4038c1fd4f5795427907c28484 C:\Windows\system32\rascfg.dll
MD5: 9015ee5171bcb15653da27024bd27128 C:\Windows\system32\RESUTILS.DLL
MD5: 4bef53964dc519550ee030253fc1e25e C:\Windows\system32\SAMSRV.dll
MD5: 26073302daea83cc5b944c546d6b47d2 C:\Windows\system32\scecli.DLL
MD5: 1c9cdbdf895a556e66aebfd93a36b536 C:\Windows\system32\SCESRV.dll
MD5: 3369d021265e369d57317d61fa86dd79 C:\Windows\system32\scext.dll
MD5: 8a674f9ab20b4937357bf6f5a0938ebf C:\Windows\System32\SearchFilterHost.exe
MD5: 5f1b6a9c35d3d5ca72d6d6fdef9747d6 C:\Windows\System32\services.exe
MD5: 16742790895960690237a5143cedec8b C:\Windows\System32\smss.exe
MD5: 4b9e4ce667df26ada061aa81e9aa841d C:\Windows\system32\SPFILEQ.dll
MD5: dbd10464e7246c9e722025debc093d01 C:\Windows\system32\spool\PRTPROCS\W32X86\winprint.dll
MD5: 629181c26a78eb66b0b4e774e5ac2882 C:\Windows\System32\SPOOLSS.DLL
MD5: 58e1354d5cf82e33af9a1cd1e31c9ed7 C:\Windows\system32\sppobjs.dll
MD5: 4c287f9069fedbd791178876ee9de536 C:\Windows\System32\sppsvc.exe
MD5: 57d56901ba1b27ee1eee94497f3db41d C:\Windows\system32\sppwinob.dll
MD5: 2f94e3709f029512a1bd8f6c108d7b62 C:\Windows\system32\SSCORE.DLL
MD5: 54c5eb1fd11027fb23bc4f79146ce159 C:\Windows\system32\SspiSrv.dll
MD5: 364455805e64882844ee9acb72522830 C:\Windows\system32\sxssrv.DLL
MD5: 8c7fe6b9559204765849bff308764fa5 C:\Windows\System32\SyncCenter.dll
MD5: 04105c8da62353589c29bdaeb8d88bd8 c:\windows\system32\sysmain.dll
MD5: ba51ffe170c5b3ae8ec4f5bd2581a29e C:\Windows\system32\SYSNTFY.dll
MD5: 0d4e8439ad3159a335fa720e043ea22e C:\Windows\system32\taskcomp.dll
MD5: eafc149cd3bd78c443e31bb157841197 C:\Windows\system32\tbs.dll
MD5: a6ab92debe2d8f08d3452d09fbaf73ae C:\Windows\system32\tcpipcfg.dll
MD5: b390c1d825c7687493bede237c6c2f25 C:\Windows\System32\tcpmon.dll
MD5: a739793f1a4f04b66e2444e90ae9e694 C:\Windows\system32\tspkg.DLL
MD5: 7222995615bf93b628dcea4bd6ccacf7 C:\Windows\system32\UBPM.dll
MD5: 230ea9abbc3432cde388f4891e76e867 C:\Windows\system32\udhisapi.dll
MD5: 91da0906b27adc98b7cc9d17f6f8227c C:\Windows\system32\umb.dll
MD5: 814638f572f497d96b17bf254113d9a4 C:\Windows\system32\urlmon.dll
MD5: 923cdd30092db73ec4a0ebcddd16c686 C:\Windows\System32\usbmon.dll
MD5: a12829e9974f57e9b5dbfea7c93190f6 C:\Windows\system32\UXINIT.dll
MD5: 5e7a2cf7719161c5e6c0e47d67ad45ae C:\Windows\system32\vbscript.dll
MD5: e530a15e1dc33ef3d84322586284da2e C:\Windows\system32\wbem\cimwin32.dll
MD5: 5ae88135c6a86fcd67ba16afbb1c8389 C:\Windows\system32\wbem\esscli.dll
MD5: a1d74cfad4f32d5341e2023611a8cb93 C:\Windows\system32\wbem\mofd.dll
MD5: f148865e4ac4f715e322ea06e6e21d84 C:\Windows\system32\wbem\ncprov.dll
MD5: 371e3b05894549113d07cd3081ed55ef C:\Windows\system32\wbem\repdrvfs.dll
MD5: 801211dcfd6414ffa48bca661a76c6fa C:\Windows\system32\wbem\wbemcore.dll
MD5: b350509b6c9296529bc464c60feeaef1 C:\Windows\system32\wbem\wbemess.dll
MD5: 0e7441be4d8c31c7f94d4e09af8339c8 C:\Windows\system32\wbem\wmidcprv.dll
MD5: 43be3b9ca431f88e049928dc45c4365c C:\Windows\system32\wbem\wmipcima.dll
MD5: 60386a010e5961a05855340946538844 C:\Windows\system32\wbem\wmiprov.dll
MD5: b8f4a6990a6295159792b4ad189d460d C:\Windows\system32\wbem\wmiprvsd.dll
MD5: 7790b77fe1e5ee47dcc66247095bb4c9 C:\Windows\system32\wbengine.exe
MD5: 23d5ae191d918bb82fd8027e1ba869d4 C:\Windows\system32\wdiasqmmodule.dll
MD5: 4262220b609ad082ce66914172597a96 C:\Windows\system32\webservices.dll
MD5: 9a6dedbe309aa0ce2c31ee6799b38e4f C:\Windows\System32\werconcpl.dll
MD5: 2873dfe622f4a3929d93f7bc85ade13e c:\windows\system32\wevtsvc.dll
MD5: 019c372b1a9da73a22d0d35a4d40f5c9 C:\Windows\system32\wfapigp.dll
MD5: e0fe1259d88a89493098d9269144fd5f C:\Windows\system32\wiarpc.dll
MD5: 2f998e1fca7749e836fdfafe88de9237 C:\Windows\System32\win32spl.dll
MD5: 02f98b5c0e397ad06124d84428cf8f1a C:\Windows\system32\WININET.dll
MD5: b5c5dcad3899512020d135600129d665 C:\Windows\System32\wininit.exe
MD5: 8ec6a4ab12b8f3759e21f8e3a388f2cf C:\Windows\System32\winlogon.exe
MD5: 827e4f75901ca3f990b1487d3301841e C:\Windows\system32\winsrv.DLL
MD5: 81e1423a5d3f0f350307b537d33599fc c:\windows\system32\WLANMSM.DLL
MD5: 20c06a50dfc097e134bc6fa8444ca9bc c:\windows\system32\WLANSEC.dll
MD5: 749f9795f01c35eebe100a87d82b9681 c:\windows\system32\wlgpclnt.dll
MD5: 633c2c060cf857099f6c4f8d75c952b1 C:\Windows\system32\wls0wndh.dll
MD5: de76461d3e5ebe1c762967d21c17b8c0 C:\Windows\system32\wmdrmdev.dll
MD5: 3d7dd3c29daf738624de918f666f70fa C:\Windows\system32\wmp.dll
MD5: b315c62e9046bcb58137a49625b6e253 C:\Windows\system32\wmploc.dll
MD5: ab303e17cd72b3a65ae0e5cda80307f0 C:\Windows\system32\wmpmde.dll
MD5: d412b1b72c5ab020218e9a047d90ca05 C:\Windows\system32\WMsgAPI.dll
MD5: 7fd5532c142db6c9cc47aa4dcf71fdec C:\Windows\System32\wscui.cpl
MD5: 206eccf79765e9f3fc6cca04114ee058 C:\Windows\system32\wsdapi.dll
MD5: a8eb761de499242becf153b2b34f020e C:\Windows\System32\WSDMon.dll
MD5: 596371a825c6abb55e436b6f0966a24f C:\Windows\System32\wsnmp32.dll
MD5: dd4400813589985677a363f8a589cd02 C:\Windows\system32\wuapi.dll
MD5: a33408cc036f9c08142b11be5e93f0a1 c:\windows\system32\wuaueng.dll
MD5: c6e7ab7e798167095987ebccb76df61b C:\Windows\System32\WUDFHost.exe
MD5: 688975cea9add749e339168a2841205a c:\windows\system32\WUDFPlatform.dll
MD5: 390261f19400ba8f7c318cd3dc0ee242 C:\Windows\system32\WUDFx.dll
MD5: a1842b9f3d657cf16fb88d40f3552147 C:\Windows\winsxs\x86_microsoft-windows-servicingstack_31bf3856ad364e35_6.1.7600.16385_none_0935b76c289e0fd5\cbscore.dll
MD5: 4ccf86aad1b67168fb51a477307ec288 C:\Windows\winsxs\x86_microsoft-windows-servicingstack_31bf3856ad364e35_6.1.7600.16385_none_0935b76c289e0fd5\DrUpdate.dll
MD5: 9b0e6a2c9f12ae8361185a87f87b8dec C:\Windows\winsxs\x86_microsoft-windows-servicingstack_31bf3856ad364e35_6.1.7600.16385_none_0935b76c289e0fd5\drvstore.dll
MD5: 88568d52f3c438dd6af5ee73ebb91fe3 C:\Windows\winsxs\x86_microsoft-windows-servicingstack_31bf3856ad364e35_6.1.7600.16385_none_0935b76c289e0fd5\wcp.dll
MD5: a62cfd071e03081b5c6fa46bc305e4f6 C:\Windows\winsxs\x86_microsoft-windows-servicingstack_31bf3856ad364e35_6.1.7600.16385_none_0935b76c289e0fd5\wrpint.dll


No file uploaded.

Scan finished - communication took 1 sec
Total traffic - 0.01 MB sent, 0.86 KB recvd
Scanned 818 files and modules - 29 seconds

==============================================================================

Edited by Delahelp, 19 January 2012 - 10:07 PM.


#9 sempai

sempai

    noypi


  • Malware Response Team
  • 5,288 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:3 stars and a sun
  • Local time:12:04 AM

Posted 19 January 2012 - 10:15 PM

The scan found nothing, let's run Combofix.


Download Combofix (by Subs) from any of the links below, make sure that you save it to your desktop.

Link 1
Link 2

  • It's important to temporary disable your anti-virus and anti-malware programs so they do not interfere with the running of ComboFix. See HERE
  • Close any open windows, including this one.
  • Double click on ComboFix.exe & follow the prompts.
  • ComboFix will check to see if the Microsoft Windows Recovery Console is installed.

*It's strongly recommended to have this pre-installed on your machine before doing any malware removal.
*The Windows Recovery Console will allow you to boot up into a special recovery (repair) mode.
*This allows us to more easily help you should your computer have a problem after an attempted removal of malware.

  • If the Microsoft Windows Recovery Console is already installed, ComboFix will continue it's malware removal procedures. If you did not have it installed, you will see the prompt below. Choose YES.

Posted Image


  • Follow the prompts to allow ComboFix to download and install the Microsoft Windows Recovery Console.
  • When prompted, agree to the End-User License Agreement to install the Microsoft Windows Recovery Console.
  • Once the Microsoft Windows Recovery Console is installed using ComboFix, you should see the following message:

Posted Image


  • Click on Yes, to continue scanning for malware.
  • When finished, it will produce a report for you. Please post the contents of the log (C:\ComboFix.txt).

Important notes:

  • Leave your computer alone while ComboFix is running.
  • ComboFix will restart your computer if malware is found; allow it to do so.
  • ComboFix may reset a number of Internet Explorer's settings, including making I-E the default browser.
  • Please do not mouseclick combofix's window while its running because it may call it to stall.
  • ComboFix SHOULD NOT be used unless requested by a forum helper. See HERE.


~Semp

btn_donate_LG.gif
You can help me continue the fight against malware by making a donation, Thank you.

If I am helping you and I didn't reply within 48 hours... Please send me a private message.
Topics that are not replied within 5 days will be close. Please don't PM asking for support, post on the Forums instead.

Member of UNITE (Unified Network of Instructors and Trained Eliminators) 


#10 Delahelp

Delahelp
  • Topic Starter

  • Members
  • 31 posts
  • OFFLINE
  •  
  • Local time:11:04 AM

Posted 20 January 2012 - 09:21 PM

ComboFix 12-01-19.02 - JR 01/20/2012 18:14:20.1.2 - x86
Microsoft Windows 7 Home Premium 6.1.7600.0.1252.1.1033.18.3003.2214 [GMT -8:00]
Running from: c:\users\JR\Desktop\ComboFix.exe
SP: Windows Defender *Enabled/Outdated* {D68DDC3A-831F-4fae-9E44-DA132C1ACF46}
.
.
((((((((((((((((((((((((( Files Created from 2011-12-21 to 2012-01-21 )))))))))))))))))))))))))))))))
.
.
2012-01-21 02:18 . 2012-01-21 02:18 -------- d-----w- c:\users\Default\AppData\Local\temp
2012-01-11 21:13 . 2012-01-11 21:27 -------- d-----w- c:\programdata\Spybot - Search & Destroy
2012-01-11 21:13 . 2012-01-11 21:14 -------- d-----w- c:\program files\Spybot - Search & Destroy
2012-01-11 09:43 . 2012-01-21 02:16 -------- d-----w- c:\windows\system32\wbem\Performance
2012-01-11 09:42 . 2012-01-11 09:42 -------- d-----w- c:\users\JR
2012-01-11 09:42 . 2012-01-11 09:42 -------- d-----w- C:\Recovery
2012-01-11 09:31 . 2012-01-11 09:42 -------- d-----w- c:\windows\Panther
.
.
.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
.
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\system]
"ConsentPromptBehaviorAdmin"= 5 (0x5)
"ConsentPromptBehaviorUser"= 3 (0x3)
"EnableUIADesktopToggle"= 0 (0x0)
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\drivers32]
"aux1"=wdmaud.drv
.
S1 vwififlt;Virtual WiFi Filter Driver;c:\windows\system32\DRIVERS\vwififlt.sys [2009-07-13 48128]
S2 SBSDWSCService;SBSD Security Center Service;c:\program files\Spybot - Search & Destroy\SDWinSec.exe [2009-01-26 1153368]
S3 RTL8167;Realtek 8167 NT Driver;c:\windows\system32\DRIVERS\Rt86win7.sys [2009-07-13 139776]
S3 SrvHsfHDA;SrvHsfHDA;c:\windows\system32\DRIVERS\VSTAZL3.SYS [2009-07-13 207360]
S3 SrvHsfV92;SrvHsfV92;c:\windows\system32\DRIVERS\VSTDPV3.SYS [2009-07-13 980992]
S3 SrvHsfWinac;SrvHsfWinac;c:\windows\system32\DRIVERS\VSTCNXT3.SYS [2009-07-13 661504]
.
.
.
------- Supplementary Scan -------
.
TCP: DhcpNameServer = 64.71.255.198
.
.
--------------------- LOCKED REGISTRY KEYS ---------------------
.
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0000\AllUserSettings]
@Denied: (A) (Users)
@Denied: (A) (Everyone)
@Allowed: (B 1 2 3 4 5) (S-1-5-20)
"BlindDial"=dword:00000000
.
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\PCW\Security]
@Denied: (Full) (Everyone)
.
Completion time: 2012-01-20 18:20:13
ComboFix-quarantined-files.txt 2012-01-21 02:20
.
Pre-Run: 306,906,316,800 bytes free
Post-Run: 306,868,379,648 bytes free
.
- - End Of File - - 7D5EEBFA8A5820F8C39EADE6B3DF6E9B

#11 sempai

sempai

    noypi


  • Malware Response Team
  • 5,288 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:3 stars and a sun
  • Local time:12:04 AM

Posted 20 January 2012 - 10:40 PM

Hi,

Let's try to run a scan again with Spybot S&D and see if it still reports those infections, post the scan log when you reply.

~Semp

btn_donate_LG.gif
You can help me continue the fight against malware by making a donation, Thank you.

If I am helping you and I didn't reply within 48 hours... Please send me a private message.
Topics that are not replied within 5 days will be close. Please don't PM asking for support, post on the Forums instead.

Member of UNITE (Unified Network of Instructors and Trained Eliminators) 


#12 Delahelp

Delahelp
  • Topic Starter

  • Members
  • 31 posts
  • OFFLINE
  •  
  • Local time:11:04 AM

Posted 21 January 2012 - 07:23 PM

It doesn't report infections, it goes pass them. For instance on the bottom of Spybot you can see what and where its searching and for some reason it can search fake alert and the viruses because I see the names/files that spybot is searching through but it doesn't report the infection but simply searches over them.

#13 sempai

sempai

    noypi


  • Malware Response Team
  • 5,288 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:3 stars and a sun
  • Local time:12:04 AM

Posted 21 January 2012 - 07:40 PM

Can you give me the file names and file paths please.

~Semp

btn_donate_LG.gif
You can help me continue the fight against malware by making a donation, Thank you.

If I am helping you and I didn't reply within 48 hours... Please send me a private message.
Topics that are not replied within 5 days will be close. Please don't PM asking for support, post on the Forums instead.

Member of UNITE (Unified Network of Instructors and Trained Eliminators) 


#14 Delahelp

Delahelp
  • Topic Starter

  • Members
  • 31 posts
  • OFFLINE
  •  
  • Local time:11:04 AM

Posted 22 January 2012 - 06:48 PM

I can give you the file names but the paths i don't know. It just gives the number of files it has gone through. Please bear with me because the scan was fast so the names might not be accurate.

-iphone Spyware (there was a bunch of them)
-Fakealert.gen
-fakealert.cc
-Win32.fakealert
-hacker
-win32.fraudpack
-fraud.controlcenter
-Fraudsercuritytool
-Virtrumonde
-Virtrumonde.dll
-Virtrumonde.sci
-Virtrumonde.SDN
-Smithfraud-c
-Smithfraud-c generic
-Win32.fraudload
-some trojan stuff

That was just the ones I was able to write down when the scan was going through. Spybot searches these but does not report them.

#15 sempai

sempai

    noypi


  • Malware Response Team
  • 5,288 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:3 stars and a sun
  • Local time:12:04 AM

Posted 22 January 2012 - 10:18 PM

Hi,

It is really hard to tell without a complete info, can you create a snap shot? I have a strong feeling that these are just part of the back-up created by Spybot.

Please run Spybot > click on Recovery > and Purge all the back-ups listed there. Please note that in the case of false detection... the deleted items will no longer be recovered. Then run a scan again and see if these items still exist.

~Semp

btn_donate_LG.gif
You can help me continue the fight against malware by making a donation, Thank you.

If I am helping you and I didn't reply within 48 hours... Please send me a private message.
Topics that are not replied within 5 days will be close. Please don't PM asking for support, post on the Forums instead.

Member of UNITE (Unified Network of Instructors and Trained Eliminators) 





0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users