Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

I have the Recycler Virus and perhaps a File Injecter Virus


  • This topic is locked This topic is locked
52 replies to this topic

#1 Vaneyk

Vaneyk

  • Members
  • 38 posts
  • OFFLINE
  •  
  • Local time:11:40 AM

Posted 12 January 2012 - 10:41 AM

Original post from 'Am I infected?' http://www.bleepingcomputer.com/forums/topic436391.html

I am running 64bit on this laptop so I skipped GMER.


DDS Log:

.
DDS (Ver_2011-08-26.01) - NTFSAMD64
Internet Explorer: 8.0.7601.17514 BrowserJavaVersion: 1.6.0_22
Run by B at 7:27:38 on 2012-01-12
Microsoft Windows 7 Home Premium 6.1.7601.1.1252.1.1033.18.6069.4584 [GMT -8:00]
.
SP: Windows Defender *Enabled/Outdated* {D68DDC3A-831F-4fae-9E44-DA132C1ACF46}
.
============== Running Processes ===============
.
C:\Windows\system32\wininit.exe
C:\Windows\system32\lsm.exe
C:\Windows\system32\svchost.exe -k DcomLaunch
C:\Windows\system32\svchost.exe -k RPCSS
C:\Windows\system32\atiesrxx.exe
C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted
C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted
C:\Windows\system32\svchost.exe -k netsvcs
C:\Windows\system32\svchost.exe -k LocalService
C:\Windows\system32\svchost.exe -k NetworkService
C:\Program Files (x86)\ASUS\ATK Package\ATK Hotkey\ASLDRSrv.exe
C:\Windows\system32\atieclxx.exe
C:\Windows\system32\WLANExt.exe
C:\Windows\system32\conhost.exe
C:\Program Files (x86)\ASUS\ATK Package\ATKGFNEX\GFNEXSrv.exe
C:\Windows\System32\spoolsv.exe
C:\Windows\system32\svchost.exe -k LocalServiceNoNetwork
C:\Program Files\SUPERAntiSpyware\SASCORE64.EXE
C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe
C:\Windows\system32\taskhost.exe
C:\Program Files (x86)\OpenVPN Technologies\OpenVPN Client\core\capiws.exe
C:\Program Files\Common Files\Intel\WirelessCommon\RegSrvc.exe
C:\Windows\system32\svchost.exe -k imgsvc
C:\Windows\system32\Dwm.exe
C:\Program Files\Intel\WiFi\bin\EvtEng.exe
C:\Windows\Explorer.EXE
C:\Windows\system32\taskeng.exe
C:\Program Files\P4G\BatteryLife.exe
C:\Windows\system32\wbem\wmiprvse.exe
C:\Windows\system32\WUDFHost.exe
C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation
C:\Windows\system32\wbem\unsecapp.exe
C:\Program Files\Realtek\Audio\HDA\RAVCpl64.exe
C:\Program Files (x86)\AmIcoSingLun\AmIcoSinglun64.exe
C:\Program Files\Common Files\Intel\WirelessCommon\iFrmewrk.exe
C:\Program Files (x86)\Steam\Steam.exe
C:\Program Files (x86)\OpenVPN Technologies\OpenVPN Client\core\ovpntray.exe
C:\Program Files (x86)\OpenOffice.org 3\program\soffice.exe
C:\Program Files (x86)\OpenOffice.org 3\program\soffice.bin
C:\Program Files (x86)\ASUS\ATK Package\ATKOSD2\ATKOSD2.exe
C:\Program Files (x86)\ASUS\ATK Package\ATK Media\DMedia.exe
C:\Program Files (x86)\ASUS\ATK Package\ATK Hotkey\HControlUser.exe
C:\Windows\system32\wbem\wmiprvse.exe
C:\Program Files (x86)\ASUS\ATK Package\ATK Hotkey\HControl.exe
C:\Windows\system32\wbem\unsecapp.exe
C:\Program Files (x86)\ASUS\ATK Package\ATK Hotkey\ATKOSD.exe
C:\Program Files (x86)\ASUS\ATK Package\ATK Hotkey\WDC.exe
C:\Program Files (x86)\ATI Technologies\ATI.ACE\Core-Static\MOM.exe
C:\Program Files (x86)\Malwarebytes' Anti-Malware\mbamgui.exe
C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe
C:\Windows\system32\SearchIndexer.exe
C:\Program Files (x86)\Common Files\Steam\SteamService.exe
C:\Program Files (x86)\ATI Technologies\ATI.ACE\Core-Static\CCC.exe
C:\Program Files (x86)\Mozilla Firefox\firefox.exe
C:\Program Files (x86)\Malwarebytes' Anti-Malware\mbamservice.exe
C:\Windows\System32\svchost.exe -k secsvcs
C:\Program Files (x86)\Mozilla Firefox\plugin-container.exe
C:\Program Files (x86)\Mozilla Firefox\plugin-container.exe
C:\Windows\system32\SearchProtocolHost.exe
C:\Windows\system32\SearchFilterHost.exe
C:\Windows\system32\DllHost.exe
C:\Windows\system32\DllHost.exe
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\conhost.exe
C:\Windows\SysWOW64\cscript.exe
.
============== Pseudo HJT Report ===============
.
uURLSearchHooks: H - No File
mWinlogon: Userinit=userinit.exe,
BHO: Adobe PDF Link Helper: {18df081c-e8ad-4283-a596-fa578c2ebdc3} - C:\Program Files (x86)\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelperShim.dll
BHO: Office Document Cache Handler: {b4f3a835-0e21-4959-ba22-42b3008e02ff} - C:\PROGRA~2\MIF5BA~1\Office14\URLREDIR.DLL
BHO: Java™ Plug-In 2 SSV Helper: {dbc80044-a445-435b-bc74-9c25c1c588a9} - C:\Program Files (x86)\Java\jre6\bin\jp2ssv.dll
uRun: [Steam] "C:\Program Files (x86)\Steam\steam.exe" -silent
mRun: [ATKOSD2] C:\Program Files (x86)\ASUS\ATK Package\ATKOSD2\ATKOSD2.exe
mRun: [ATKMEDIA] C:\Program Files (x86)\ASUS\ATK Package\ATK Media\DMedia.exe
mRun: [HControlUser] C:\Program Files (x86)\ASUS\ATK Package\ATK Hotkey\HControlUser.exe
mRun: [StartCCC] "C:\Program Files (x86)\ATI Technologies\ATI.ACE\Core-Static\CLIStart.exe" MSRun
mRun: [Adobe ARM] "C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\AdobeARM.exe"
mRun: [Malwarebytes' Anti-Malware] "C:\Program Files (x86)\Malwarebytes' Anti-Malware\mbamgui.exe" /starttray
mRun: [SunJavaUpdateSched] "C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe"
StartupFolder: C:\Users\B\AppData\Roaming\MICROS~1\Windows\STARTM~1\Programs\Startup\OPENOF~1.LNK - C:\Program Files (x86)\OpenOffice.org 3\program\quickstart.exe
StartupFolder: C:\PROGRA~3\MICROS~1\Windows\STARTM~1\Programs\Startup\OPENVP~1.LNK - C:\Program Files (x86)\OpenVPN Technologies\OpenVPN Client\core\ovpntray.exe
mPolicies-explorer: NoActiveDesktop = 1 (0x1)
mPolicies-system: ConsentPromptBehaviorAdmin = 5 (0x5)
mPolicies-system: ConsentPromptBehaviorUser = 3 (0x3)
mPolicies-system: EnableUIADesktopToggle = 0 (0x0)
IE: E&xport to Microsoft Excel - C:\PROGRA~2\MIF5BA~1\Office14\EXCEL.EXE/3000
DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_22-windows-i586.cab
DPF: {CAFEEFAC-0016-0000-0022-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_22-windows-i586.cab
DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_22-windows-i586.cab
TCP: DhcpNameServer = 192.168.1.1
TCP: Interfaces\{47A2ED3E-577F-4EA1-B47C-FB689D9B7E74} : DhcpNameServer = 192.168.1.1
TCP: Interfaces\{47A2ED3E-577F-4EA1-B47C-FB689D9B7E74}\3716E616D6A616E613 : DhcpNameServer = 8.8.8.8 8.8.4.4
TCP: Interfaces\{47A2ED3E-577F-4EA1-B47C-FB689D9B7E74}\77C616E6D21607 : DhcpNameServer = 50.23.239.24 208.67.222.222
TCP: Interfaces\{47A2ED3E-577F-4EA1-B47C-FB689D9B7E74}\84F6374756C696E676D264C40343 : DhcpNameServer = 10.10.10.1 203.121.130.39
TCP: Interfaces\{4E2B5512-3FC3-467E-8272-AE3A7703FE6A} : DhcpNameServer = 192.168.1.1
Filter: text/xml - {807573E5-5146-11D5-A672-00B0D022E945} - C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\MSOXMLMF.DLL
BHO-X64: Adobe PDF Link Helper: {18DF081C-E8AD-4283-A596-FA578C2EBDC3} - C:\Program Files (x86)\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelperShim.dll
BHO-X64: AcroIEHelperStub - No File
BHO-X64: Office Document Cache Handler: {B4F3A835-0E21-4959-BA22-42B3008E02FF} - C:\PROGRA~2\MIF5BA~1\Office14\URLREDIR.DLL
BHO-X64: URLRedirectionBHO - No File
BHO-X64: Java™ Plug-In 2 SSV Helper: {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Program Files (x86)\Java\jre6\bin\jp2ssv.dll
mRun-x64: [ATKOSD2] C:\Program Files (x86)\ASUS\ATK Package\ATKOSD2\ATKOSD2.exe
mRun-x64: [ATKMEDIA] C:\Program Files (x86)\ASUS\ATK Package\ATK Media\DMedia.exe
mRun-x64: [HControlUser] C:\Program Files (x86)\ASUS\ATK Package\ATK Hotkey\HControlUser.exe
mRun-x64: [StartCCC] "C:\Program Files (x86)\ATI Technologies\ATI.ACE\Core-Static\CLIStart.exe" MSRun
mRun-x64: [Adobe ARM] "C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\AdobeARM.exe"
mRun-x64: [Malwarebytes' Anti-Malware] "C:\Program Files (x86)\Malwarebytes' Anti-Malware\mbamgui.exe" /starttray
mRun-x64: [SunJavaUpdateSched] "C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe"
.
================= FIREFOX ===================
.
FF - ProfilePath - C:\Users\B\AppData\Roaming\Mozilla\Firefox\Profiles\9dlq2o0b.default\
FF - plugin: C:\PROGRA~2\MIF5BA~1\Office14\NPAUTHZ.DLL
FF - plugin: C:\PROGRA~2\MIF5BA~1\Office14\NPSPWRAP.DLL
FF - plugin: C:\Program Files (x86)\Adobe\Reader 10.0\Reader\AIR\nppdf32.dll
FF - plugin: C:\Program Files (x86)\Google\Update\1.3.21.65\npGoogleUpdate3.dll
FF - plugin: C:\Program Files (x86)\Google\Update\1.3.21.79\npGoogleUpdate3.dll
FF - plugin: C:\Program Files (x86)\Java\jre6\bin\new_plugin\npdeployJava1.dll
FF - plugin: C:\Program Files (x86)\Microsoft Silverlight\4.0.60831.0\npctrlui.dll
FF - plugin: C:\ProgramData\id Software\QuakeLive\npquakezero.dll
FF - plugin: C:\Windows\SysWOW64\Macromed\Flash\NPSWF32.dll
.
============= SERVICES / DRIVERS ===============
.
R1 SASDIFSV;SASDIFSV;C:\Program Files\SUPERAntiSpyware\sasdifsv64.sys [2011-7-22 14928]
R1 SASKUTIL;SASKUTIL;C:\Program Files\SUPERAntiSpyware\saskutil64.sys [2011-7-12 12368]
R1 vwififlt;Virtual WiFi Filter Driver;C:\Windows\system32\DRIVERS\vwififlt.sys --> C:\Windows\system32\DRIVERS\vwififlt.sys [?]
R2 !SASCORE;SAS Core Service;C:\Program Files\SUPERAntiSpyware\SASCore64.exe [2011-8-11 140672]
R2 AdobeARMservice;Adobe Acrobat Update Service;C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe [2011-6-6 64952]
R2 AMD External Events Utility;AMD External Events Utility;C:\Windows\system32\atiesrxx.exe --> C:\Windows\system32\atiesrxx.exe [?]
R2 ASMMAP64;ASMMAP64;C:\Program Files (x86)\ASUS\ATK Package\ATKGFNEX\ASMMAP64.sys [2009-7-2 15416]
R2 MBAMService;MBAMService;C:\Program Files (x86)\Malwarebytes' Anti-Malware\mbamservice.exe [2011-11-26 652872]
R2 OpenVPNAccessClient;OpenVPN Access Client;C:\Program Files (x86)\OpenVPN Technologies\OpenVPN Client\core\capiws.exe [2011-10-18 24064]
R2 TurboB;Turbo Boost UI Monitor driver;C:\Windows\system32\DRIVERS\TurboB.sys --> C:\Windows\system32\DRIVERS\TurboB.sys [?]
R3 L1C;NDIS Miniport Driver for Atheros AR813x/AR815x PCI-E Ethernet Controller (NDIS 6.20);C:\Windows\system32\DRIVERS\L1C62x64.sys --> C:\Windows\system32\DRIVERS\L1C62x64.sys [?]
R3 MBAMProtector;MBAMProtector;\??\C:\Windows\system32\drivers\mbam.sys --> C:\Windows\system32\drivers\mbam.sys [?]
R3 NETwNs64;___ Intel® Wireless WiFi Link 5000 Series Adapter Driver for Windows 7 - 64 Bit;C:\Windows\system32\DRIVERS\NETwNs64.sys --> C:\Windows\system32\DRIVERS\NETwNs64.sys [?]
R3 tapoas;TAP-Win32 Adapter OAS;C:\Windows\system32\DRIVERS\tapoas.sys --> C:\Windows\system32\DRIVERS\tapoas.sys [?]
R3 vwifimp;Microsoft Virtual WiFi Miniport Service;C:\Windows\system32\DRIVERS\vwifimp.sys --> C:\Windows\system32\DRIVERS\vwifimp.sys [?]
S2 clr_optimization_v4.0.30319_32;Microsoft .NET Framework NGEN v4.0.30319_X86;C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe [2010-3-18 130384]
S2 clr_optimization_v4.0.30319_64;Microsoft .NET Framework NGEN v4.0.30319_X64;C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe [2010-3-18 138576]
S2 gupdate;Google Update Service (gupdate);C:\Program Files (x86)\Google\Update\GoogleUpdate.exe [2011-9-27 136176]
S3 AmUStor;AM USB Stroage Driver;C:\Windows\system32\drivers\AmUStor.SYS --> C:\Windows\system32\drivers\AmUStor.SYS [?]
S3 gupdatem;Google Update Service (gupdatem);C:\Program Files (x86)\Google\Update\GoogleUpdate.exe [2011-9-27 136176]
S3 MyWiFiDHCPDNS;Wireless PAN DHCP Server;C:\Program Files\Intel\WiFi\bin\PanDhcpDns.exe [2010-10-19 340240]
S3 osppsvc;Office Software Protection Platform;C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE [2010-1-9 4925184]
S3 Revoflt;Revoflt;C:\Windows\system32\DRIVERS\revoflt.sys --> C:\Windows\system32\DRIVERS\revoflt.sys [?]
S3 TsUsbFlt;TsUsbFlt;C:\Windows\system32\drivers\tsusbflt.sys --> C:\Windows\system32\drivers\tsusbflt.sys [?]
S3 TsUsbGD;Remote Desktop Generic USB Device;C:\Windows\system32\drivers\TsUsbGD.sys --> C:\Windows\system32\drivers\TsUsbGD.sys [?]
S3 TurboBoost;TurboBoost;C:\Program Files\Intel\TurboBoost\TurboBoost.exe [2009-11-2 126352]
.
=============== Created Last 30 ================
.
2012-01-12 15:11:50 -------- d-----w- C:\Users\B\AppData\Local\Audible
2012-01-12 14:07:04 255352 ----a-w- C:\Windows\SysWow64\awrdscdc.ax
2012-01-12 14:07:01 499712 ------w- C:\Windows\SysWow64\msvcp71.dll
2012-01-12 14:07:01 348160 ------w- C:\Windows\SysWow64\msvcr71.dll
2012-01-12 14:07:01 24576 ------w- C:\Windows\SysWow64\msxml3a.dll
2012-01-12 14:07:01 1060864 ------w- C:\Windows\SysWow64\mfc71.dll
2012-01-12 14:03:05 -------- d-----w- C:\Program Files (x86)\Audible
2012-01-12 07:49:38 46592 ----a-w- C:\Users\B\AppData\Roaming\5B32.tmp
2012-01-12 07:49:37 21504 ----a-w- C:\Users\B\AppData\Roaming\56BE.tmp
2012-01-12 07:49:36 154704 ----a-w- C:\Users\B\AppData\Roaming\522B.tmp
2012-01-12 06:42:49 46592 ----a-w- C:\Users\B\AppData\Roaming\2ED1.tmp
2012-01-12 06:42:48 21504 ----a-w- C:\Users\B\AppData\Roaming\2A4E.tmp
2012-01-12 06:42:47 154704 ----a-w- C:\Users\B\AppData\Roaming\259B.tmp
2012-01-12 05:48:12 46592 ----a-w- C:\Users\B\AppData\Roaming\2D66.tmp
2012-01-12 05:48:11 21504 ----a-w- C:\Users\B\AppData\Roaming\28E3.tmp
2012-01-12 05:48:10 154704 ----a-w- C:\Users\B\AppData\Roaming\247F.tmp
2012-01-12 05:34:07 46592 ----a-w- C:\Users\B\AppData\Roaming\471A.tmp
2012-01-12 05:34:05 21504 ----a-w- C:\Users\B\AppData\Roaming\4239.tmp
2012-01-12 05:34:04 154704 ----a-w- C:\Users\B\AppData\Roaming\3CBC.tmp
2012-01-12 04:56:19 46592 ----a-w- C:\Users\B\AppData\Roaming\AE9F.tmp
2012-01-12 04:56:18 21504 ----a-w- C:\Users\B\AppData\Roaming\A932.tmp
2012-01-12 04:56:17 154704 ----a-w- C:\Users\B\AppData\Roaming\A4CD.tmp
2012-01-12 03:54:57 46592 ----a-w- C:\Users\B\AppData\Roaming\7DFA.tmp
2012-01-12 03:54:56 21504 ----a-w- C:\Users\B\AppData\Roaming\7986.tmp
2012-01-12 03:54:55 154704 ----a-w- C:\Users\B\AppData\Roaming\7503.tmp
2012-01-12 01:39:41 46592 ----a-w- C:\Users\B\AppData\Roaming\A82F.tmp
2012-01-12 01:39:40 21504 ----a-w- C:\Users\B\AppData\Roaming\A3BC.tmp
2012-01-12 01:39:39 154704 ----a-w- C:\Users\B\AppData\Roaming\9F48.tmp
2012-01-12 01:30:05 46592 ----a-w- C:\Users\B\AppData\Roaming\DEA7.tmp
2012-01-12 01:30:04 21504 ----a-w- C:\Users\B\AppData\Roaming\DA33.tmp
2012-01-12 01:30:03 154704 ----a-w- C:\Users\B\AppData\Roaming\D5CF.tmp
2012-01-11 19:39:35 154704 ----a-w- C:\Users\B\AppData\Roaming\F72A.tmp
2012-01-11 11:40:00 -------- d-----w- C:\Program Files (x86)\ESET
2012-01-11 10:14:59 -------- d-----w- C:\Users\B\AppData\Local\Norman Malware Cleaner
2012-01-10 12:27:33 -------- d-----w- C:\ProgramData\id Software
2012-01-09 09:39:11 193 ----a-w- C:\Users\B\AppData\Roaming\86FE.tmp
2012-01-09 00:10:01 193 ----a-w- C:\Users\B\AppData\Roaming\7189.tmp
2012-01-08 12:21:34 193 ----a-w- C:\Users\B\AppData\Roaming\D470.tmp
2012-01-08 09:38:51 32704 ----a-w- C:\Users\B\AppData\Roaming\DE55.tmp
2012-01-08 08:34:59 43992 ----a-w- C:\Program Files (x86)\Mozilla Firefox\mozutils.dll
2012-01-08 08:34:58 626688 ----a-w- C:\Program Files (x86)\Mozilla Firefox\msvcr80.dll
2012-01-08 08:34:58 548864 ----a-w- C:\Program Files (x86)\Mozilla Firefox\msvcp80.dll
2012-01-08 08:34:58 479232 ----a-w- C:\Program Files (x86)\Mozilla Firefox\msvcm80.dll
2012-01-03 04:54:26 0 ---ha-w- C:\Users\B\AppData\Local\BIT6676.tmp
2011-12-23 14:29:06 -------- d-----w- C:\Users\B\AppData\Roaming\SUPERAntiSpyware.com
2011-12-23 14:28:55 -------- d-----w- C:\Program Files\SUPERAntiSpyware
2011-12-23 14:28:54 -------- d-----w- C:\ProgramData\SUPERAntiSpyware.com
2011-12-23 13:56:43 25160 ----a-w- C:\Windows\System32\drivers\hitmanpro35.sys
2011-12-23 13:52:02 -------- d-----w- C:\ProgramData\Hitman Pro
2011-12-23 12:04:31 -------- d-----w- C:\ProgramData\PC Tools
2011-12-21 10:08:21 -------- d-----w- C:\Program Files (x86)\HMA! Pro VPN
2011-12-18 12:38:20 -------- d-----w- C:\Program Files (x86)\GOG.com
2011-12-18 06:20:15 -------- d-----w- C:\Users\B\AppData\Local\GOGDownloader
2011-12-17 18:25:24 -------- d-----w- C:\C#.NET
.
==================== Find3M ====================
.
2011-12-10 23:24:08 23152 ----a-w- C:\Windows\System32\drivers\mbam.sys
2011-11-30 15:19:02 472808 ----a-w- C:\Windows\SysWow64\deployJava1.dll
.
============= FINISH: 7:28:03.23 ===============

Attached Files



BC AdBot (Login to Remove)

 


#2 HelpBot

HelpBot

    Bleepin' Binary Bot


  • Bots
  • 12,669 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:12:40 AM

Posted 18 January 2012 - 11:20 AM

Hello and welcome to Bleeping Computer!

I am HelpBot: an automated program designed to help the Bleeping Computer Staff better assist you! This message contains very important information, so please read through all of it before doing anything.

We apologize for the delay in responding to your request for help. Here at Bleeping Computer we get overwhelmed at times, and we are trying our best to keep up. Please note that your topic was not intentionally overlooked. Our mission is to help everyone in need, but sometimes it takes just a little longer to get to every request for help. No one is ignored here.

To help Bleeping Computer better assist you please perform the following steps:

***************************************************

Posted Image In order to continue receiving help at BleepingComputer.com, YOU MUST tell me if you still need help or if your issue has already been resolved on your own or through another resource! To tell me this, please click on the following link and follow the instructions there.

CLICK THIS LINK >>> http://www.bleepingcomputer.com/logreply/437682 <<< CLICK THIS LINK



If you no longer need help, then all you needed to do was the previous instructions of telling me so. You can skip the rest of this post. If you do need help please continue with Step 2 below.

***************************************************

Posted Image If you still need help, I would like you to post a Reply to this topic (click the "Add Reply" button in the lower right hand of this page). In that reply, please include the following information:

  • If you have not done so already, include a clear description of the problems you're having, along with any steps you may have performed so far.
  • A new DDS and GMER log. For your convenience, you will find the instructions for generating these logs repeated at the bottom of this post.
    • Please do this even if you have previously posted logs for us.
    • If you were unable to produce the logs originally please try once more.
    • If you are unable to create a log please provide detailed information about your installed Windows Operating System including the Version, Edition and if it is a 32bit or a 64bit system.
    • If you are unsure about any of these characteristics just post what you can and we will guide you.
  • Please tell us if you have your original Windows CD/DVD available.
  • Upon completing the above steps and posting a reply, another staff member will review your topic and do their best to resolve your issues.

Thank you for your patience, and again sorry for the delay.

***************************************************

We need to see some information about what is happening in your machine. Please perform the following scan again:

  • Download DDS by sUBs from one of the following links if you no longer have it available. Save it to your desktop.
  • Double click on the DDS icon, allow it to run.
  • A small box will open, with an explanation about the tool. No input is needed, the scan is running.
  • Notepad will open with the results.
  • Follow the instructions that pop up for posting the results.
  • Close the program window, and delete the program from your desktop.
Please note: You may have to disable any script protection running if the scan fails to run. After downloading the tool, disconnect from the internet and disable all antivirus protection. Run the scan, enable your A/V and reconnect to the internet.

Information on A/V control HERE


We also need a new log from the GMER anti-rootkit Scanner.

Please note that if you are running a 64-bit version of Windows you will not be able to run GMER and you may skip this step.

Please first disable any CD emulation programs using the steps found in this topic:

Why we request you disable CD Emulation when receiving Malware Removal Advice


Then create another GMER log and post it as an attachment to the reply where you post your new DDS log. Instructions on how to properly create a GMER log can be found here:

How to create a GMER log


As I am just a silly little program running on the BleepingComputer.com servers, please do not send me private messages as I do not know how to read and reply to them! Thanks!

#3 Vaneyk

Vaneyk
  • Topic Starter

  • Members
  • 38 posts
  • OFFLINE
  •  
  • Local time:11:40 AM

Posted 19 January 2012 - 06:39 PM

Here's a link back to my original problem again http://www.bleepingcomputer.com/forums/topic436391.html I haven't done anything else about it since I made the first DDS log here.

I am running 64bit Windows 7 Home Premium.

I do not have the original Windows CD. However, I do have the Windows CD Key on the bottom of the laptop, so is there somewhere I can legitimately download an ISO of the Windows disc?

Here's the new DDS log:

.
DDS (Ver_2011-08-26.01) - NTFSAMD64
Internet Explorer: 8.0.7601.17514 BrowserJavaVersion: 1.6.0_22
Run by B at 15:30:58 on 2012-01-19
Microsoft Windows 7 Home Premium 6.1.7601.1.1252.1.1033.18.6069.4504 [GMT -8:00]
.
SP: Windows Defender *Enabled/Outdated* {D68DDC3A-831F-4fae-9E44-DA132C1ACF46}
.
============== Running Processes ===============
.
C:\Windows\system32\wininit.exe
C:\Windows\system32\lsm.exe
C:\Windows\system32\svchost.exe -k DcomLaunch
C:\Windows\system32\svchost.exe -k RPCSS
C:\Windows\system32\atiesrxx.exe
C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted
C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted
C:\Windows\system32\svchost.exe -k netsvcs
C:\Windows\system32\svchost.exe -k LocalService
C:\Windows\system32\svchost.exe -k NetworkService
C:\Windows\system32\atieclxx.exe
C:\Program Files (x86)\ASUS\ATK Package\ATK Hotkey\ASLDRSrv.exe
C:\Windows\system32\WLANExt.exe
C:\Windows\system32\conhost.exe
C:\Program Files (x86)\ASUS\ATK Package\ATKGFNEX\GFNEXSrv.exe
C:\Windows\System32\spoolsv.exe
C:\Windows\system32\svchost.exe -k LocalServiceNoNetwork
C:\Program Files\SUPERAntiSpyware\SASCORE64.EXE
C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe
C:\Program Files (x86)\OpenVPN Technologies\OpenVPN Client\core\capiws.exe
C:\Windows\system32\taskhost.exe
C:\Program Files\Common Files\Intel\WirelessCommon\RegSrvc.exe
C:\Windows\system32\svchost.exe -k imgsvc
C:\Windows\system32\Dwm.exe
C:\Windows\Explorer.EXE
C:\Program Files\Intel\WiFi\bin\EvtEng.exe
C:\Windows\system32\taskeng.exe
C:\Program Files\P4G\BatteryLife.exe
C:\Windows\system32\wbem\wmiprvse.exe
C:\Program Files (x86)\ASUS\ATK Package\ATK Hotkey\HControl.exe
C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation
C:\Windows\system32\wbem\wmiprvse.exe
C:\Program Files\Realtek\Audio\HDA\RAVCpl64.exe
C:\Program Files (x86)\AmIcoSingLun\AmIcoSinglun64.exe
C:\Program Files\Common Files\Intel\WirelessCommon\iFrmewrk.exe
C:\Program Files (x86)\Steam\Steam.exe
C:\Program Files (x86)\OpenVPN Technologies\OpenVPN Client\core\ovpntray.exe
C:\Program Files (x86)\OpenOffice.org 3\program\soffice.exe
C:\Program Files (x86)\OpenOffice.org 3\program\soffice.bin
C:\Program Files (x86)\ASUS\ATK Package\ATKOSD2\ATKOSD2.exe
C:\Program Files (x86)\ASUS\ATK Package\ATK Media\DMedia.exe
C:\Program Files (x86)\ASUS\ATK Package\ATK Hotkey\HControlUser.exe
C:\Program Files (x86)\ASUS\ATK Package\ATK Hotkey\ATKOSD.exe
C:\Program Files (x86)\ASUS\ATK Package\ATK Hotkey\WDC.exe
C:\Windows\system32\wbem\unsecapp.exe
C:\Program Files (x86)\Malwarebytes' Anti-Malware\mbamgui.exe
C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe
C:\Program Files (x86)\ATI Technologies\ATI.ACE\Core-Static\MOM.exe
C:\Program Files (x86)\ATI Technologies\ATI.ACE\Core-Static\CCC.exe
C:\Windows\system32\wbem\unsecapp.exe
C:\Windows\system32\SearchIndexer.exe
C:\Program Files (x86)\Common Files\Steam\SteamService.exe
C:\Program Files (x86)\HMA! Pro VPN\bin\HMA! Pro VPN.exe
C:\Program Files (x86)\Malwarebytes' Anti-Malware\mbamservice.exe
C:\Windows\System32\svchost.exe -k secsvcs
C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE
C:\Windows\splwow64.exe
C:\Program Files (x86)\HMA! Pro VPN\bin\openvpnserv.exe
C:\Program Files (x86)\HMA! Pro VPN\bin\openvpn.exe
C:\Windows\system32\conhost.exe
C:\Windows\system32\taskeng.exe
C:\Windows\system32\DllHost.exe
C:\Windows\system32\DllHost.exe
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\conhost.exe
C:\Windows\SysWOW64\cscript.exe
.
============== Pseudo HJT Report ===============
.
uURLSearchHooks: H - No File
mWinlogon: Userinit=userinit.exe,
BHO: Adobe PDF Link Helper: {18df081c-e8ad-4283-a596-fa578c2ebdc3} - C:\Program Files (x86)\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelperShim.dll
BHO: Office Document Cache Handler: {b4f3a835-0e21-4959-ba22-42b3008e02ff} - C:\PROGRA~2\MIF5BA~1\Office14\URLREDIR.DLL
BHO: Java™ Plug-In 2 SSV Helper: {dbc80044-a445-435b-bc74-9c25c1c588a9} - C:\Program Files (x86)\Java\jre6\bin\jp2ssv.dll
uRun: [Steam] "C:\Program Files (x86)\Steam\steam.exe" -silent
uRun: [userUserclass] rundll32.exe "C:\Users\B\AppData\Local\CatDBNetUsb\userUserclass.dll",Winmapnet AppUserTime
uRunOnce: [FlashPlayerUpdate] C:\Windows\SysWOW64\Macromed\Flash\FlashUtil10x_Plugin.exe -update plugin
mRun: [ATKOSD2] C:\Program Files (x86)\ASUS\ATK Package\ATKOSD2\ATKOSD2.exe
mRun: [ATKMEDIA] C:\Program Files (x86)\ASUS\ATK Package\ATK Media\DMedia.exe
mRun: [HControlUser] C:\Program Files (x86)\ASUS\ATK Package\ATK Hotkey\HControlUser.exe
mRun: [StartCCC] "C:\Program Files (x86)\ATI Technologies\ATI.ACE\Core-Static\CLIStart.exe" MSRun
mRun: [Adobe ARM] "C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\AdobeARM.exe"
mRun: [Malwarebytes' Anti-Malware] "C:\Program Files (x86)\Malwarebytes' Anti-Malware\mbamgui.exe" /starttray
mRun: [SunJavaUpdateSched] "C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe"
StartupFolder: C:\Users\B\AppData\Roaming\MICROS~1\Windows\STARTM~1\Programs\Startup\OPENOF~1.LNK - C:\Program Files (x86)\OpenOffice.org 3\program\quickstart.exe
StartupFolder: C:\PROGRA~3\MICROS~1\Windows\STARTM~1\Programs\Startup\OPENVP~1.LNK - C:\Program Files (x86)\OpenVPN Technologies\OpenVPN Client\core\ovpntray.exe
mPolicies-explorer: NoActiveDesktop = 1 (0x1)
mPolicies-system: ConsentPromptBehaviorAdmin = 5 (0x5)
mPolicies-system: ConsentPromptBehaviorUser = 3 (0x3)
mPolicies-system: EnableUIADesktopToggle = 0 (0x0)
IE: E&xport to Microsoft Excel - C:\PROGRA~2\MIF5BA~1\Office14\EXCEL.EXE/3000
DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_22-windows-i586.cab
DPF: {CAFEEFAC-0016-0000-0022-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_22-windows-i586.cab
DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_22-windows-i586.cab
TCP: DhcpNameServer = 192.168.1.1
TCP: Interfaces\{47A2ED3E-577F-4EA1-B47C-FB689D9B7E74} : DhcpNameServer = 192.168.1.1
TCP: Interfaces\{47A2ED3E-577F-4EA1-B47C-FB689D9B7E74}\3716E616D6A616E613 : DhcpNameServer = 8.8.8.8 8.8.4.4
TCP: Interfaces\{47A2ED3E-577F-4EA1-B47C-FB689D9B7E74}\77C616E6D21607 : DhcpNameServer = 50.23.239.24 208.67.222.222
TCP: Interfaces\{47A2ED3E-577F-4EA1-B47C-FB689D9B7E74}\84F6374756C696E676D264C40343 : DhcpNameServer = 10.10.10.1 203.121.130.39
TCP: Interfaces\{4E2B5512-3FC3-467E-8272-AE3A7703FE6A} : DhcpNameServer = 192.168.1.1
TCP: Interfaces\{896DCBF9-3A45-453B-B514-A7CE5A50D8BC} : DhcpNameServer = 208.67.222.222 208.67.220.220
Filter: text/xml - {807573E5-5146-11D5-A672-00B0D022E945} - C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\MSOXMLMF.DLL
BHO-X64: Adobe PDF Link Helper: {18DF081C-E8AD-4283-A596-FA578C2EBDC3} - C:\Program Files (x86)\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelperShim.dll
BHO-X64: AcroIEHelperStub - No File
BHO-X64: Office Document Cache Handler: {B4F3A835-0E21-4959-BA22-42B3008E02FF} - C:\PROGRA~2\MIF5BA~1\Office14\URLREDIR.DLL
BHO-X64: URLRedirectionBHO - No File
BHO-X64: Java™ Plug-In 2 SSV Helper: {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Program Files (x86)\Java\jre6\bin\jp2ssv.dll
mRun-x64: [ATKOSD2] C:\Program Files (x86)\ASUS\ATK Package\ATKOSD2\ATKOSD2.exe
mRun-x64: [ATKMEDIA] C:\Program Files (x86)\ASUS\ATK Package\ATK Media\DMedia.exe
mRun-x64: [HControlUser] C:\Program Files (x86)\ASUS\ATK Package\ATK Hotkey\HControlUser.exe
mRun-x64: [StartCCC] "C:\Program Files (x86)\ATI Technologies\ATI.ACE\Core-Static\CLIStart.exe" MSRun
mRun-x64: [Adobe ARM] "C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\AdobeARM.exe"
mRun-x64: [Malwarebytes' Anti-Malware] "C:\Program Files (x86)\Malwarebytes' Anti-Malware\mbamgui.exe" /starttray
mRun-x64: [SunJavaUpdateSched] "C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe"
.
================= FIREFOX ===================
.
FF - ProfilePath - C:\Users\B\AppData\Roaming\Mozilla\Firefox\Profiles\9dlq2o0b.default\
FF - prefs.js: network.proxy.type - 0
FF - plugin: C:\PROGRA~2\MIF5BA~1\Office14\NPAUTHZ.DLL
FF - plugin: C:\PROGRA~2\MIF5BA~1\Office14\NPSPWRAP.DLL
FF - plugin: C:\Program Files (x86)\Adobe\Reader 10.0\Reader\AIR\nppdf32.dll
FF - plugin: C:\Program Files (x86)\Google\Update\1.3.21.65\npGoogleUpdate3.dll
FF - plugin: C:\Program Files (x86)\Google\Update\1.3.21.79\npGoogleUpdate3.dll
FF - plugin: C:\Program Files (x86)\Java\jre6\bin\new_plugin\npdeployJava1.dll
FF - plugin: C:\Program Files (x86)\Microsoft Silverlight\4.0.60831.0\npctrlui.dll
FF - plugin: C:\ProgramData\id Software\QuakeLive\npquakezero.dll
FF - plugin: C:\Windows\SysWOW64\Macromed\Flash\NPSWF32.dll
.
============= SERVICES / DRIVERS ===============
.
R1 SASDIFSV;SASDIFSV;C:\Program Files\SUPERAntiSpyware\sasdifsv64.sys [2011-7-22 14928]
R1 SASKUTIL;SASKUTIL;C:\Program Files\SUPERAntiSpyware\saskutil64.sys [2011-7-12 12368]
R1 vwififlt;Virtual WiFi Filter Driver;C:\Windows\system32\DRIVERS\vwififlt.sys --> C:\Windows\system32\DRIVERS\vwififlt.sys [?]
R2 !SASCORE;SAS Core Service;C:\Program Files\SUPERAntiSpyware\SASCore64.exe [2011-8-11 140672]
R2 AdobeARMservice;Adobe Acrobat Update Service;C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe [2011-6-6 64952]
R2 AMD External Events Utility;AMD External Events Utility;C:\Windows\system32\atiesrxx.exe --> C:\Windows\system32\atiesrxx.exe [?]
R2 ASMMAP64;ASMMAP64;C:\Program Files (x86)\ASUS\ATK Package\ATKGFNEX\ASMMAP64.sys [2009-7-2 15416]
R2 MBAMService;MBAMService;C:\Program Files (x86)\Malwarebytes' Anti-Malware\mbamservice.exe [2011-11-26 652872]
R2 OpenVPNAccessClient;OpenVPN Access Client;C:\Program Files (x86)\OpenVPN Technologies\OpenVPN Client\core\capiws.exe [2011-10-18 24064]
R2 TurboB;Turbo Boost UI Monitor driver;C:\Windows\system32\DRIVERS\TurboB.sys --> C:\Windows\system32\DRIVERS\TurboB.sys [?]
R3 L1C;NDIS Miniport Driver for Atheros AR813x/AR815x PCI-E Ethernet Controller (NDIS 6.20);C:\Windows\system32\DRIVERS\L1C62x64.sys --> C:\Windows\system32\DRIVERS\L1C62x64.sys [?]
R3 MBAMProtector;MBAMProtector;\??\C:\Windows\system32\drivers\mbam.sys --> C:\Windows\system32\drivers\mbam.sys [?]
R3 NETwNs64;___ Intel® Wireless WiFi Link 5000 Series Adapter Driver for Windows 7 - 64 Bit;C:\Windows\system32\DRIVERS\NETwNs64.sys --> C:\Windows\system32\DRIVERS\NETwNs64.sys [?]
R3 osppsvc;Office Software Protection Platform;C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE [2010-1-9 4925184]
R3 tapoas;TAP-Win32 Adapter OAS;C:\Windows\system32\DRIVERS\tapoas.sys --> C:\Windows\system32\DRIVERS\tapoas.sys [?]
R3 vwifimp;Microsoft Virtual WiFi Miniport Service;C:\Windows\system32\DRIVERS\vwifimp.sys --> C:\Windows\system32\DRIVERS\vwifimp.sys [?]
S2 clr_optimization_v4.0.30319_32;Microsoft .NET Framework NGEN v4.0.30319_X86;C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe [2010-3-18 130384]
S2 clr_optimization_v4.0.30319_64;Microsoft .NET Framework NGEN v4.0.30319_X64;C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe [2010-3-18 138576]
S2 gupdate;Google Update Service (gupdate);C:\Program Files (x86)\Google\Update\GoogleUpdate.exe [2011-9-27 136176]
S3 AmUStor;AM USB Stroage Driver;C:\Windows\system32\drivers\AmUStor.SYS --> C:\Windows\system32\drivers\AmUStor.SYS [?]
S3 gupdatem;Google Update Service (gupdatem);C:\Program Files (x86)\Google\Update\GoogleUpdate.exe [2011-9-27 136176]
S3 MyWiFiDHCPDNS;Wireless PAN DHCP Server;C:\Program Files\Intel\WiFi\bin\PanDhcpDns.exe [2010-10-19 340240]
S3 Revoflt;Revoflt;C:\Windows\system32\DRIVERS\revoflt.sys --> C:\Windows\system32\DRIVERS\revoflt.sys [?]
S3 TsUsbFlt;TsUsbFlt;C:\Windows\system32\drivers\tsusbflt.sys --> C:\Windows\system32\drivers\tsusbflt.sys [?]
S3 TsUsbGD;Remote Desktop Generic USB Device;C:\Windows\system32\drivers\TsUsbGD.sys --> C:\Windows\system32\drivers\TsUsbGD.sys [?]
S3 TurboBoost;TurboBoost;C:\Program Files\Intel\TurboBoost\TurboBoost.exe [2009-11-2 126352]
.
=============== Created Last 30 ================
.
2012-01-19 14:19:29 112832 ----a-w- C:\ProgramData\Microsoft\VCExpress\10.0\1033\ResourceCache.dll
2012-01-19 14:18:35 -------- d-----w- C:\Program Files (x86)\Common Files\Merge Modules
2012-01-19 10:52:17 -------- d-----w- C:\Dev-Cpp
2012-01-16 12:59:02 -------- d-----w- C:\Users\B\AppData\Local\CatDBNetUsb
2012-01-12 15:11:50 -------- d-----w- C:\Users\B\AppData\Local\Audible
2012-01-12 14:07:04 255352 ----a-w- C:\Windows\SysWow64\awrdscdc.ax
2012-01-12 14:07:01 499712 ------w- C:\Windows\SysWow64\msvcp71.dll
2012-01-12 14:07:01 348160 ------w- C:\Windows\SysWow64\msvcr71.dll
2012-01-12 14:07:01 24576 ------w- C:\Windows\SysWow64\msxml3a.dll
2012-01-12 14:07:01 1060864 ------w- C:\Windows\SysWow64\mfc71.dll
2012-01-12 14:03:05 -------- d-----w- C:\Program Files (x86)\Audible
2012-01-12 07:49:38 46592 ----a-w- C:\Users\B\AppData\Roaming\5B32.tmp
2012-01-12 07:49:37 21504 ----a-w- C:\Users\B\AppData\Roaming\56BE.tmp
2012-01-12 07:49:36 154704 ----a-w- C:\Users\B\AppData\Roaming\522B.tmp
2012-01-12 06:42:49 46592 ----a-w- C:\Users\B\AppData\Roaming\2ED1.tmp
2012-01-12 06:42:48 21504 ----a-w- C:\Users\B\AppData\Roaming\2A4E.tmp
2012-01-12 06:42:47 154704 ----a-w- C:\Users\B\AppData\Roaming\259B.tmp
2012-01-12 05:48:12 46592 ----a-w- C:\Users\B\AppData\Roaming\2D66.tmp
2012-01-12 05:48:11 21504 ----a-w- C:\Users\B\AppData\Roaming\28E3.tmp
2012-01-12 05:48:10 154704 ----a-w- C:\Users\B\AppData\Roaming\247F.tmp
2012-01-12 05:34:07 46592 ----a-w- C:\Users\B\AppData\Roaming\471A.tmp
2012-01-12 05:34:05 21504 ----a-w- C:\Users\B\AppData\Roaming\4239.tmp
2012-01-12 05:34:04 154704 ----a-w- C:\Users\B\AppData\Roaming\3CBC.tmp
2012-01-12 04:56:19 46592 ----a-w- C:\Users\B\AppData\Roaming\AE9F.tmp
2012-01-12 04:56:18 21504 ----a-w- C:\Users\B\AppData\Roaming\A932.tmp
2012-01-12 04:56:17 154704 ----a-w- C:\Users\B\AppData\Roaming\A4CD.tmp
2012-01-12 03:54:57 46592 ----a-w- C:\Users\B\AppData\Roaming\7DFA.tmp
2012-01-12 03:54:56 21504 ----a-w- C:\Users\B\AppData\Roaming\7986.tmp
2012-01-12 03:54:55 154704 ----a-w- C:\Users\B\AppData\Roaming\7503.tmp
2012-01-12 01:39:41 46592 ----a-w- C:\Users\B\AppData\Roaming\A82F.tmp
2012-01-12 01:39:40 21504 ----a-w- C:\Users\B\AppData\Roaming\A3BC.tmp
2012-01-12 01:39:39 154704 ----a-w- C:\Users\B\AppData\Roaming\9F48.tmp
2012-01-12 01:30:05 46592 ----a-w- C:\Users\B\AppData\Roaming\DEA7.tmp
2012-01-12 01:30:04 21504 ----a-w- C:\Users\B\AppData\Roaming\DA33.tmp
2012-01-12 01:30:03 154704 ----a-w- C:\Users\B\AppData\Roaming\D5CF.tmp
2012-01-11 19:39:35 154704 ----a-w- C:\Users\B\AppData\Roaming\F72A.tmp
2012-01-11 11:40:00 -------- d-----w- C:\Program Files (x86)\ESET
2012-01-11 10:14:59 -------- d-----w- C:\Users\B\AppData\Local\Norman Malware Cleaner
2012-01-10 12:27:33 -------- d-----w- C:\ProgramData\id Software
2012-01-09 09:39:11 193 ----a-w- C:\Users\B\AppData\Roaming\86FE.tmp
2012-01-09 00:10:01 193 ----a-w- C:\Users\B\AppData\Roaming\7189.tmp
2012-01-08 12:21:34 193 ----a-w- C:\Users\B\AppData\Roaming\D470.tmp
2012-01-08 09:38:51 32704 ----a-w- C:\Users\B\AppData\Roaming\DE55.tmp
2012-01-08 08:34:59 43992 ----a-w- C:\Program Files (x86)\Mozilla Firefox\mozutils.dll
2012-01-08 08:34:58 626688 ----a-w- C:\Program Files (x86)\Mozilla Firefox\msvcr80.dll
2012-01-08 08:34:58 548864 ----a-w- C:\Program Files (x86)\Mozilla Firefox\msvcp80.dll
2012-01-08 08:34:58 479232 ----a-w- C:\Program Files (x86)\Mozilla Firefox\msvcm80.dll
2012-01-03 04:54:26 0 ---ha-w- C:\Users\B\AppData\Local\BIT6676.tmp
2011-12-23 14:29:06 -------- d-----w- C:\Users\B\AppData\Roaming\SUPERAntiSpyware.com
2011-12-23 14:28:55 -------- d-----w- C:\Program Files\SUPERAntiSpyware
2011-12-23 14:28:54 -------- d-----w- C:\ProgramData\SUPERAntiSpyware.com
2011-12-23 13:56:43 25160 ----a-w- C:\Windows\System32\drivers\hitmanpro35.sys
2011-12-23 13:52:02 -------- d-----w- C:\ProgramData\Hitman Pro
2011-12-23 12:04:31 -------- d-----w- C:\ProgramData\PC Tools
2011-12-21 10:08:21 -------- d-----w- C:\Program Files (x86)\HMA! Pro VPN
.
==================== Find3M ====================
.
2011-12-10 23:24:08 23152 ----a-w- C:\Windows\System32\drivers\mbam.sys
2011-11-30 15:19:02 472808 ----a-w- C:\Windows\SysWow64\deployJava1.dll
.
============= FINISH: 15:31:24.05 ===============

Attached Files



#4 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:04:40 AM

Posted 19 January 2012 - 08:15 PM

Hi,

Welcome to Bleeping Computer. My name is m0le and I will be helping you with your log.
  • Please subscribe to this topic, if you haven't already. Click the Watch This Topic button at the top on the right.

  • Please avoid installing/uninstalling or updating any programs and attempting any unsupervised fixes or scans. This can make helping you impossible.

  • Please reply to this post so I know you are there.
The forum is busy and we need to have replies as soon as possible. If I haven't had a reply after 3 days I will bump the topic and if you do not reply by the following day after that then I will close the topic.

----------------------------------------------

Please run aswMBR

Please download aswMBR ( 511KB ) to your desktop.
  • Double click the aswMBR.exe icon to run it
  • Click the Scan button to start the scan
  • On completion of the scan, click the save log button, save it to your desktop and post it in your next reply.


Then Combofix

Please download ComboFix from one of these locations:* IMPORTANT !!! Save ComboFix.exe to your Desktop making sure you rename it comfix.exe
  • Disable your AntiVirus and AntiSpyware applications including Firewalls, usually via a right click on the System Tray icon. They may otherwise interfere with our tools. (Click on this link to see a list of programs that should be disabled. The list is not all inclusive.)
  • Double click on Comfix.exe & follow the prompts.
  • As part of it's process, ComboFix will check to see if the Microsoft Windows Recovery Console is installed. With malware infections being as they are today, it's strongly recommended to have this pre-installed on your machine before doing any malware removal. It will allow you to boot up into a special recovery/repair mode that will allow us to more easily help you should your computer have a problem after an attempted removal of malware.
  • Follow the prompts to allow ComboFix to download and install the Microsoft Windows Recovery Console, and when prompted, agree to the End-User License Agreement to install the Microsoft Windows Recovery Console.
**Please note: If the Microsoft Windows Recovery Console is already installed, ComboFix will continue it's malware removal procedures.

Posted Image


Once the Microsoft Windows Recovery Console is installed using ComboFix, you should see the following message:

Posted Image


Click on Yes, to continue scanning for malware.

When finished, it shall produce a log for you. Please include the C:\ComboFix.txt in your next reply.
Posted Image
m0le is a proud member of UNITE

#5 Vaneyk

Vaneyk
  • Topic Starter

  • Members
  • 38 posts
  • OFFLINE
  •  
  • Local time:11:40 AM

Posted 20 January 2012 - 12:41 PM

Problem!

Posting this from my other laptop because, after running ComboFix (I followed all the steps to the letter) I can no longer run any programs on that computer. I get the error "Illegal operation attempted on a registry key that has been marked for deletion." This is happening on everything from notepad to firefox. With Firefox and one or two other programs it pops up another message after I hit OK on the first saying "Can't open this item" and asking if I want to remove it. I am not doing a thing with it until I hear back from you.

ComboFix did create a restore point, I haven't tried to use it yet. Probably locked out of that as well. Please advise as soon as possible.

#6 Vaneyk

Vaneyk
  • Topic Starter

  • Members
  • 38 posts
  • OFFLINE
  •  
  • Local time:11:40 AM

Posted 20 January 2012 - 06:45 PM

Okay, still nothing will run on that computer but I realized this morning that I could get the logs off with a USB stick, so here they are. Also, as I said in my first post, this other laptop, my two external drives, a USB stick and my camera memory stick are all infected, what are the steps for cleaning the rest of them?

aswMMR:


aswMBR version 0.9.9.1297 Copyright© 2011 AVAST Software
Run date: 2012-01-20 09:11:13
-----------------------------
09:11:13.192 OS Version: Windows x64 6.1.7601 Service Pack 1
09:11:13.192 Number of processors: 8 586 0x1E05
09:11:13.193 ComputerName: B-PC UserName: B
09:11:15.071 Initialize success
09:17:56.452 Disk 0 \Device\Harddisk0\DR0 -> \Device\Ide\IAAStorageDevice-1
09:17:56.461 Disk 0 Vendor: ST964032 0002 Size: 610480MB BusType: 3
09:17:56.466 Disk 1 (boot) \Device\Harddisk1\DR1 -> \Device\Ide\IAAStorageDevice-2
09:17:56.471 Disk 1 Vendor: ST950056 SD26 Size: 476940MB BusType: 3
09:17:56.478 Disk 1 MBR read successfully
09:17:56.483 Disk 1 MBR scan
09:17:56.487 Disk 1 Windows 7 default MBR code
09:17:56.493 Disk 1 Partition 1 80 (A) 07 HPFS/NTFS NTFS 100 MB offset 2048
09:17:56.499 Disk 1 Partition 2 00 07 HPFS/NTFS NTFS 476838 MB offset 206848
09:17:56.505 Service scanning
09:17:57.521 Modules scanning
09:17:57.531 Disk 1 trace - called modules:
09:17:57.543 ntoskrnl.exe CLASSPNP.SYS disk.sys ACPI.sys iaStor.sys hal.dll
09:17:57.552 1 nt!IofCallDriver -> \Device\Harddisk1\DR1[0xfffffa8006694060]
09:17:57.559 3 CLASSPNP.SYS[fffff8800185143f] -> nt!IofCallDriver -> [0xfffffa80063bfa40]
09:17:57.564 5 ACPI.sys[fffff88000ee37a1] -> nt!IofCallDriver -> \Device\Ide\IAAStorageDevice-2[0xfffffa80063c0050]
09:17:57.571 Scan finished successfully
09:18:16.606 Disk 1 MBR has been saved successfully to "C:\Users\B\Desktop\MBR.dat"
09:18:16.612 The log file has been saved successfully to "C:\Users\B\Desktop\aswMBR.txt"


ComboFix:

ComboFix 12-01-19.02 - B 01/20/2012 9:20.1.8 - x64
Microsoft Windows 7 Home Premium 6.1.7601.1.1252.1.1033.18.6069.4006 [GMT -8:00]
Running from: c:\users\B\Desktop\comfix.exe
SP: Windows Defender *Disabled/Outdated* {D68DDC3A-831F-4fae-9E44-DA132C1ACF46}
* Created a new restore point
.
.
((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.
.
c:\users\B\AppData\Local\CatDBNetUsb\userUserclass.dll
c:\users\B\AppData\Roaming\247F.tmp
c:\users\B\AppData\Roaming\259B.tmp
c:\users\B\AppData\Roaming\28E3.tmp
c:\users\B\AppData\Roaming\2A4E.tmp
c:\users\B\AppData\Roaming\2D66.tmp
c:\users\B\AppData\Roaming\2ED1.tmp
c:\users\B\AppData\Roaming\3CBC.tmp
c:\users\B\AppData\Roaming\4239.tmp
c:\users\B\AppData\Roaming\471A.tmp
c:\users\B\AppData\Roaming\522B.tmp
c:\users\B\AppData\Roaming\56BE.tmp
c:\users\B\AppData\Roaming\5B32.tmp
c:\users\B\AppData\Roaming\7189.tmp
c:\users\B\AppData\Roaming\7503.tmp
c:\users\B\AppData\Roaming\7986.tmp
c:\users\B\AppData\Roaming\7DFA.tmp
c:\users\B\AppData\Roaming\86FE.tmp
c:\users\B\AppData\Roaming\9F48.tmp
c:\users\B\AppData\Roaming\A3BC.tmp
c:\users\B\AppData\Roaming\A4CD.tmp
c:\users\B\AppData\Roaming\A82F.tmp
c:\users\B\AppData\Roaming\A932.tmp
c:\users\B\AppData\Roaming\AE9F.tmp
c:\users\B\AppData\Roaming\D470.tmp
c:\users\B\AppData\Roaming\D5CF.tmp
c:\users\B\AppData\Roaming\DA33.tmp
c:\users\B\AppData\Roaming\DE55.tmp
c:\users\B\AppData\Roaming\DEA7.tmp
c:\users\B\AppData\Roaming\F72A.tmp
.
.
((((((((((((((((((((((((( Files Created from 2011-12-20 to 2012-01-20 )))))))))))))))))))))))))))))))
.
.
2012-01-20 17:24 . 2012-01-20 17:24 -------- d-----w- c:\users\Default\AppData\Local\temp
2012-01-19 14:19 . 2012-01-19 14:19 112832 ----a-w- c:\programdata\Microsoft\VCExpress\10.0\1033\ResourceCache.dll
2012-01-19 14:18 . 2012-01-19 14:18 -------- d-----w- c:\program files (x86)\Common Files\Merge Modules
2012-01-19 10:52 . 2012-01-19 10:52 -------- d-----w- C:\Dev-Cpp
2012-01-16 12:59 . 2012-01-20 17:23 -------- d-----w- c:\users\B\AppData\Local\CatDBNetUsb
2012-01-12 15:11 . 2012-01-12 15:13 -------- d-----w- c:\users\B\AppData\Local\Audible
2012-01-12 14:07 . 2012-01-12 14:07 255352 ----a-w- c:\windows\SysWow64\awrdscdc.ax
2012-01-12 14:07 . 2003-03-19 05:20 1060864 ------w- c:\windows\SysWow64\mfc71.dll
2012-01-12 14:07 . 2003-03-19 04:14 499712 ------w- c:\windows\SysWow64\msvcp71.dll
2012-01-12 14:07 . 2003-02-21 12:42 348160 ------w- c:\windows\SysWow64\msvcr71.dll
2012-01-12 14:07 . 2001-08-18 06:43 24576 ------w- c:\windows\SysWow64\msxml3a.dll
2012-01-12 14:03 . 2012-01-12 14:07 -------- d-----w- c:\program files (x86)\Audible
2012-01-11 11:40 . 2012-01-11 11:40 -------- d-----w- c:\program files (x86)\ESET
2012-01-11 10:14 . 2012-01-11 10:14 -------- d-----w- c:\users\B\AppData\Local\Norman Malware Cleaner
2012-01-10 12:27 . 2012-01-10 12:27 -------- d-----w- c:\programdata\id Software
2012-01-08 08:34 . 2012-01-08 08:34 43992 ----a-w- c:\program files (x86)\Mozilla Firefox\mozutils.dll
2012-01-08 08:34 . 2012-01-08 08:34 479232 ----a-w- c:\program files (x86)\Mozilla Firefox\msvcm80.dll
2012-01-08 08:34 . 2012-01-08 08:34 626688 ----a-w- c:\program files (x86)\Mozilla Firefox\msvcr80.dll
2012-01-08 08:34 . 2012-01-08 08:34 548864 ----a-w- c:\program files (x86)\Mozilla Firefox\msvcp80.dll
2012-01-03 04:54 . 2012-01-03 04:54 0 ---ha-w- c:\users\B\AppData\Local\BIT6676.tmp
2011-12-23 14:29 . 2011-12-23 14:29 -------- d-----w- c:\users\B\AppData\Roaming\SUPERAntiSpyware.com
2011-12-23 14:28 . 2011-12-23 14:29 -------- d-----w- c:\program files\SUPERAntiSpyware
2011-12-23 14:28 . 2011-12-23 14:28 -------- d-----w- c:\programdata\SUPERAntiSpyware.com
2011-12-23 13:56 . 2011-12-23 13:56 25160 ----a-w- c:\windows\system32\drivers\hitmanpro35.sys
2011-12-23 13:52 . 2011-12-23 13:52 -------- d-----w- c:\programdata\Hitman Pro
2011-12-23 12:04 . 2011-12-23 15:00 -------- d-----w- c:\programdata\PC Tools
.
.
.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2011-12-10 23:24 . 2011-11-27 04:20 23152 ----a-w- c:\windows\system32\drivers\mbam.sys
2011-11-30 15:19 . 2011-11-30 15:19 472808 ----a-w- c:\windows\SysWow64\deployJava1.dll
2011-11-12 07:10 . 2011-11-12 07:10 0 ---ha-w- c:\users\B\AppData\Local\BIT7774.tmp
.
.
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4
.
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"Steam"="c:\program files (x86)\Steam\steam.exe" [2011-09-28 1242448]
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run]
"ATKOSD2"="c:\program files (x86)\ASUS\ATK Package\ATKOSD2\ATKOSD2.exe" [2009-10-27 6998656]
"ATKMEDIA"="c:\program files (x86)\ASUS\ATK Package\ATK Media\DMedia.exe" [2009-08-20 170624]
"HControlUser"="c:\program files (x86)\ASUS\ATK Package\ATK Hotkey\HControlUser.exe" [2009-06-19 105016]
"StartCCC"="c:\program files (x86)\ATI Technologies\ATI.ACE\Core-Static\CLIStart.exe" [2009-12-17 98304]
"Adobe ARM"="c:\program files (x86)\Common Files\Adobe\ARM\1.0\AdobeARM.exe" [2011-06-06 937920]
"Malwarebytes' Anti-Malware"="c:\program files (x86)\Malwarebytes' Anti-Malware\mbamgui.exe" [2011-12-25 460872]
"SunJavaUpdateSched"="c:\program files (x86)\Common Files\Java\Java Update\jusched.exe" [2010-05-14 248552]
.
c:\users\B\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\
OpenOffice.org 3.3.lnk - c:\program files (x86)\OpenOffice.org 3\program\quickstart.exe [2010-12-13 1198592]
.
c:\programdata\Microsoft\Windows\Start Menu\Programs\Startup\
OpenVPN Connect.lnk - c:\program files (x86)\OpenVPN Technologies\OpenVPN Client\core\ovpntray.exe [2011-10-18 55296]
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\system]
"ConsentPromptBehaviorAdmin"= 5 (0x5)
"ConsentPromptBehaviorUser"= 3 (0x3)
"EnableUIADesktopToggle"= 0 (0x0)
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\!SASCORE]
@=""
.
R2 clr_optimization_v4.0.30319_32;Microsoft .NET Framework NGEN v4.0.30319_X86;c:\windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe [2010-03-18 130384]
R2 clr_optimization_v4.0.30319_64;Microsoft .NET Framework NGEN v4.0.30319_X64;c:\windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe [2010-03-18 138576]
R2 gupdate;Google Update Service (gupdate);c:\program files (x86)\Google\Update\GoogleUpdate.exe [2011-09-28 136176]
R2 MBAMService;MBAMService;c:\program files (x86)\Malwarebytes' Anti-Malware\mbamservice.exe [2011-12-25 652872]
R3 AmUStor;AM USB Stroage Driver;c:\windows\system32\drivers\AmUStor.SYS [x]
R3 gupdatem;Google Update Service (gupdatem);c:\program files (x86)\Google\Update\GoogleUpdate.exe [2011-09-28 136176]
R3 MBAMProtector;MBAMProtector;c:\windows\system32\drivers\mbam.sys [x]
R3 MyWiFiDHCPDNS;Wireless PAN DHCP Server;c:\program files\Intel\WiFi\bin\PanDhcpDns.exe [2010-10-19 340240]
R3 osppsvc;Office Software Protection Platform;c:\program files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE [2010-01-10 4925184]
R3 Revoflt;Revoflt;c:\windows\system32\DRIVERS\revoflt.sys [x]
R3 TsUsbFlt;TsUsbFlt;c:\windows\system32\drivers\tsusbflt.sys [x]
R3 TsUsbGD;Remote Desktop Generic USB Device;c:\windows\system32\drivers\TsUsbGD.sys [x]
R3 TurboBoost;TurboBoost;c:\program files\Intel\TurboBoost\TurboBoost.exe [2009-11-02 126352]
S1 SASDIFSV;SASDIFSV;c:\program files\SUPERAntiSpyware\SASDIFSV64.SYS [2011-07-22 14928]
S1 SASKUTIL;SASKUTIL;c:\program files\SUPERAntiSpyware\SASKUTIL64.SYS [2011-07-12 12368]
S1 vwififlt;Virtual WiFi Filter Driver;c:\windows\system32\DRIVERS\vwififlt.sys [x]
S2 !SASCORE;SAS Core Service;c:\program files\SUPERAntiSpyware\SASCORE64.EXE [2011-08-11 140672]
S2 AdobeARMservice;Adobe Acrobat Update Service;c:\program files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe [2011-06-06 64952]
S2 AMD External Events Utility;AMD External Events Utility;c:\windows\system32\atiesrxx.exe [x]
S2 ASMMAP64;ASMMAP64;c:\program files (x86)\ASUS\ATK Package\ATKGFNEX\ASMMAP64.sys [2009-07-03 15416]
S2 OpenVPNAccessClient;OpenVPN Access Client;c:\program files (x86)\OpenVPN Technologies\OpenVPN Client\core\capiws.exe [2011-10-19 24064]
S2 TurboB;Turbo Boost UI Monitor driver;c:\windows\system32\DRIVERS\TurboB.sys [x]
S3 L1C;NDIS Miniport Driver for Atheros AR813x/AR815x PCI-E Ethernet Controller (NDIS 6.20);c:\windows\system32\DRIVERS\L1C62x64.sys [x]
S3 NETwNs64;___ Intel® Wireless WiFi Link 5000 Series Adapter Driver for Windows 7 - 64 Bit;c:\windows\system32\DRIVERS\NETwNs64.sys [x]
S3 tapoas;TAP-Win32 Adapter OAS;c:\windows\system32\DRIVERS\tapoas.sys [x]
S3 vwifimp;Microsoft Virtual WiFi Miniport Service;c:\windows\system32\DRIVERS\vwifimp.sys [x]
.
.
Contents of the 'Scheduled Tasks' folder
.
2012-01-20 c:\windows\Tasks\GoogleUpdateTaskMachineCore.job
- c:\program files (x86)\Google\Update\GoogleUpdate.exe [2011-09-28 07:15]
.
2012-01-20 c:\windows\Tasks\GoogleUpdateTaskMachineUA.job
- c:\program files (x86)\Google\Update\GoogleUpdate.exe [2011-09-28 07:15]
.
.
--------- x86-64 -----------
.
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"RtHDVCpl"="c:\program files\Realtek\Audio\HDA\RAVCpl64.exe" [2010-03-17 10134560]
"AmIcoSinglun64"="c:\program files (x86)\AmIcoSingLun\AmIcoSinglun64.exe" [2010-05-03 324096]
"IntelWireless"="c:\program files\Common Files\Intel\WirelessCommon\iFrmewrk.exe" [2010-10-19 1931024]
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows]
"LoadAppInit_DLLs"=0x0
.
------- Supplementary Scan -------
.
uLocal Page = c:\windows\system32\blank.htm
mLocal Page = c:\windows\SysWOW64\blank.htm
IE: E&xport to Microsoft Excel - c:\progra~2\MIF5BA~1\Office14\EXCEL.EXE/3000
TCP: DhcpNameServer = 192.168.1.1
FF - ProfilePath - c:\users\B\AppData\Roaming\Mozilla\Firefox\Profiles\9dlq2o0b.default\
FF - prefs.js: network.proxy.type - 0
.
- - - - ORPHANS REMOVED - - - -
.
Wow6432Node-HKCU-Run-userUserclass - c:\users\B\AppData\Local\CatDBNetUsb\userUserclass.dll
BHO-{F9E4A054-E9B1-4BC3-83A3-76A1AE736170} - c:\program files (x86)\Hotspot Shield\HssIE\HssIE_64.dll
.
.
.
--------------------- LOCKED REGISTRY KEYS ---------------------
.
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\PCW\Security]
@Denied: (Full) (Everyone)
.
------------------------ Other Running Processes ------------------------
.
c:\program files (x86)\ASUS\ATK Package\ATK Hotkey\ASLDRSrv.exe
c:\program files (x86)\ASUS\ATK Package\ATKGFNEX\GFNEXSrv.exe
c:\program files (x86)\ASUS\ATK Package\ATK Hotkey\HControl.exe
.
**************************************************************************
.
Completion time: 2012-01-20 09:27:24 - machine was rebooted
ComboFix-quarantined-files.txt 2012-01-20 17:27
.
Pre-Run: 335,491,006,464 bytes free
Post-Run: 335,417,716,736 bytes free
.
- - End Of File - - 4C7C4310A90DF2653C486D1FBD3EE1C7


Edited by Vaneyk, 20 January 2012 - 06:47 PM.


#7 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:04:40 AM

Posted 21 January 2012 - 05:37 AM

Reboot the machine if the "Illegal operation attempted on a registry key that has been marked for deletion." is showing and that will clear it.

Then please plug in the two external drives, the memory stick and the camera stick. Or as many as you can in the above order do if you don't have a hub, and rerun Combofix. If you need to run it twice or three times then attach the other logs and make sure I know what each of them had plugged in when you post.
Posted Image
m0le is a proud member of UNITE

#8 Vaneyk

Vaneyk
  • Topic Starter

  • Members
  • 38 posts
  • OFFLINE
  •  
  • Local time:11:40 AM

Posted 21 January 2012 - 06:03 AM

[Edit: You replied as I was typing this, I'll work on the external drives now]

Update after the PMs I sent you. You can ignore my questions from previous posts, all my concerns are consolidated into this one now.

So, restarting the computer fixed the "registry key marked for deletion" problem. The virus seems to be gone from this computer, but the only real symptom I had noticed on this (as opposed to the external memory which had folders turned into shortcuts or made inaccessible) was a hidden "RECYCLER" folder in C: (which is now gone) so I can't really tell if everything is back to normal. There is still a hidden "$recycle.bin" folder in C: but if I'm not mistaken that's Windows' legitimate Recycle Bin.

When I wasn't able to run any programs after using ComboFix I figured that the computer was seriously damaged and just wanted to try to get the logs posted in case they would help, and since I had no other way of doing it I used a USB stick that was infected with the Recycler virus to get them off. Maybe that was dumb, but I was a little panicky. Anyway, it did not bring back the RECYCLER folder, but I don't know what sort of gestation period this virus has so should I run something like DDS again to check if it is really clean?

Finally, what should I do with the other infected laptop (which I have so far done nothing to try to fix), should I post a DDS with it to this same thread once this first laptop is clean? And then how do I clean the external drives?

Thanks again.

Edited by Vaneyk, 21 January 2012 - 06:04 AM.


#9 Vaneyk

Vaneyk
  • Topic Starter

  • Members
  • 38 posts
  • OFFLINE
  •  
  • Local time:11:40 AM

Posted 21 January 2012 - 06:36 AM

Don't have a hub but I had enough USB ports. This log was with 2 WD external hard drives (F: & D:), 1 USB stick (G:), and 1 camera stick (H:) plugged in. After running ComboFix they all still have the RECYCLER folder and the legitimate folders turned into shortcuts.

ComboFix 12-01-19.02 - B 01/21/2012 3:17.2.8 - x64
Microsoft Windows 7 Home Premium 6.1.7601.1.1252.1.1033.18.6069.4590 [GMT -8:00]
Running from: c:\users\B\Desktop\comfix.exe
SP: Windows Defender *Disabled/Outdated* {D68DDC3A-831F-4fae-9E44-DA132C1ACF46}
.
.
((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.
.
D:\autorun.inf
F:\Autorun.inf
.
.
((((((((((((((((((((((((( Files Created from 2011-12-21 to 2012-01-21 )))))))))))))))))))))))))))))))
.
.
2012-01-19 14:19 . 2012-01-19 14:19 112832 ----a-w- c:\programdata\Microsoft\VCExpress\10.0\1033\ResourceCache.dll
2012-01-19 14:18 . 2012-01-19 14:18 -------- d-----w- c:\program files (x86)\Common Files\Merge Modules
2012-01-19 10:52 . 2012-01-19 10:52 -------- d-----w- C:\Dev-Cpp
2012-01-16 12:59 . 2012-01-20 17:23 -------- d-----w- c:\users\B\AppData\Local\CatDBNetUsb
2012-01-12 15:11 . 2012-01-12 15:13 -------- d-----w- c:\users\B\AppData\Local\Audible
2012-01-12 14:07 . 2012-01-12 14:07 255352 ----a-w- c:\windows\SysWow64\awrdscdc.ax
2012-01-12 14:07 . 2003-03-19 05:20 1060864 ------w- c:\windows\SysWow64\mfc71.dll
2012-01-12 14:07 . 2003-03-19 04:14 499712 ------w- c:\windows\SysWow64\msvcp71.dll
2012-01-12 14:07 . 2003-02-21 12:42 348160 ------w- c:\windows\SysWow64\msvcr71.dll
2012-01-12 14:07 . 2001-08-18 06:43 24576 ------w- c:\windows\SysWow64\msxml3a.dll
2012-01-12 14:03 . 2012-01-12 14:07 -------- d-----w- c:\program files (x86)\Audible
2012-01-11 11:40 . 2012-01-11 11:40 -------- d-----w- c:\program files (x86)\ESET
2012-01-11 10:14 . 2012-01-11 10:14 -------- d-----w- c:\users\B\AppData\Local\Norman Malware Cleaner
2012-01-10 12:27 . 2012-01-10 12:27 -------- d-----w- c:\programdata\id Software
2012-01-08 08:34 . 2012-01-08 08:34 43992 ----a-w- c:\program files (x86)\Mozilla Firefox\mozutils.dll
2012-01-08 08:34 . 2012-01-08 08:34 479232 ----a-w- c:\program files (x86)\Mozilla Firefox\msvcm80.dll
2012-01-08 08:34 . 2012-01-08 08:34 626688 ----a-w- c:\program files (x86)\Mozilla Firefox\msvcr80.dll
2012-01-08 08:34 . 2012-01-08 08:34 548864 ----a-w- c:\program files (x86)\Mozilla Firefox\msvcp80.dll
2012-01-03 04:54 . 2012-01-03 04:54 0 ---ha-w- c:\users\B\AppData\Local\BIT6676.tmp
2011-12-23 14:29 . 2011-12-23 14:29 -------- d-----w- c:\users\B\AppData\Roaming\SUPERAntiSpyware.com
2011-12-23 14:28 . 2011-12-23 14:29 -------- d-----w- c:\program files\SUPERAntiSpyware
2011-12-23 14:28 . 2011-12-23 14:28 -------- d-----w- c:\programdata\SUPERAntiSpyware.com
2011-12-23 13:56 . 2011-12-23 13:56 25160 ----a-w- c:\windows\system32\drivers\hitmanpro35.sys
2011-12-23 13:52 . 2011-12-23 13:52 -------- d-----w- c:\programdata\Hitman Pro
2011-12-23 12:04 . 2011-12-23 15:00 -------- d-----w- c:\programdata\PC Tools
.
.
.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2011-12-10 23:24 . 2011-11-27 04:20 23152 ----a-w- c:\windows\system32\drivers\mbam.sys
2011-11-30 15:19 . 2011-11-30 15:19 472808 ----a-w- c:\windows\SysWow64\deployJava1.dll
2011-11-12 07:10 . 2011-11-12 07:10 0 ---ha-w- c:\users\B\AppData\Local\BIT7774.tmp
.
.
((((((((((((((((((((((((((((( SnapShot@2012-01-20_17.25.16 )))))))))))))))))))))))))))))))))))))))))
.
+ 2010-11-21 03:09 . 2012-01-21 10:28 32210 c:\windows\system32\wdi\ShutdownPerformanceDiagnostics_SystemData.bin
+ 2009-07-14 05:10 . 2012-01-21 10:28 36342 c:\windows\system32\wdi\BootPerformanceDiagnostics_SystemData.bin
+ 2011-09-28 07:03 . 2012-01-21 11:04 16384 c:\windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Windows\Cookies\index.dat
- 2011-09-28 07:03 . 2012-01-20 17:12 16384 c:\windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Windows\Cookies\index.dat
+ 2011-09-28 07:03 . 2012-01-21 11:04 16384 c:\windows\ServiceProfiles\LocalService\AppData\Local\Microsoft\Windows\History\History.IE5\index.dat
- 2011-09-28 07:03 . 2012-01-20 17:12 16384 c:\windows\ServiceProfiles\LocalService\AppData\Local\Microsoft\Windows\History\History.IE5\index.dat
+ 2011-09-28 06:27 . 2012-01-21 10:28 5046 c:\windows\system32\wdi\{86432a0b-3c7d-4ddf-a89c-172faa90485d}\S-1-5-21-1193429028-2443450886-452781850-1000_UserData.bin
- 2012-01-20 17:25 . 2012-01-20 17:25 2048 c:\windows\ServiceProfiles\LocalService\AppData\Local\lastalive1.dat
+ 2012-01-21 11:22 . 2012-01-21 11:22 2048 c:\windows\ServiceProfiles\LocalService\AppData\Local\lastalive1.dat
+ 2012-01-21 11:22 . 2012-01-21 11:22 2048 c:\windows\ServiceProfiles\LocalService\AppData\Local\lastalive0.dat
- 2012-01-20 17:25 . 2012-01-20 17:25 2048 c:\windows\ServiceProfiles\LocalService\AppData\Local\lastalive0.dat
- 2009-07-14 02:36 . 2012-01-16 16:00 659818 c:\windows\system32\perfh009.dat
+ 2009-07-14 02:36 . 2012-01-21 11:15 659818 c:\windows\system32\perfh009.dat
+ 2009-07-14 02:36 . 2012-01-21 11:15 120714 c:\windows\system32\perfc009.dat
- 2009-07-14 02:36 . 2012-01-16 16:00 120714 c:\windows\system32\perfc009.dat
- 2009-07-14 05:01 . 2012-01-20 17:24 297708 c:\windows\ServiceProfiles\LocalService\AppData\Local\FontCache-System.dat
+ 2009-07-14 05:01 . 2012-01-21 11:21 297708 c:\windows\ServiceProfiles\LocalService\AppData\Local\FontCache-System.dat
+ 2011-09-28 08:48 . 2012-01-21 11:21 3987720 c:\windows\ServiceProfiles\LocalService\AppData\Local\FontCache-S-1-5-21-1193429028-2443450886-452781850-1000-8192.dat
- 2011-09-28 08:48 . 2012-01-20 17:24 3987720 c:\windows\ServiceProfiles\LocalService\AppData\Local\FontCache-S-1-5-21-1193429028-2443450886-452781850-1000-8192.dat
.
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4
.
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"Steam"="c:\program files (x86)\Steam\steam.exe" [2011-09-28 1242448]
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run]
"ATKOSD2"="c:\program files (x86)\ASUS\ATK Package\ATKOSD2\ATKOSD2.exe" [2009-10-27 6998656]
"ATKMEDIA"="c:\program files (x86)\ASUS\ATK Package\ATK Media\DMedia.exe" [2009-08-20 170624]
"HControlUser"="c:\program files (x86)\ASUS\ATK Package\ATK Hotkey\HControlUser.exe" [2009-06-19 105016]
"StartCCC"="c:\program files (x86)\ATI Technologies\ATI.ACE\Core-Static\CLIStart.exe" [2009-12-17 98304]
"Adobe ARM"="c:\program files (x86)\Common Files\Adobe\ARM\1.0\AdobeARM.exe" [2011-06-06 937920]
"Malwarebytes' Anti-Malware"="c:\program files (x86)\Malwarebytes' Anti-Malware\mbamgui.exe" [2011-12-25 460872]
"SunJavaUpdateSched"="c:\program files (x86)\Common Files\Java\Java Update\jusched.exe" [2010-05-14 248552]
.
c:\users\B\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\
OpenOffice.org 3.3.lnk - c:\program files (x86)\OpenOffice.org 3\program\quickstart.exe [2010-12-13 1198592]
.
c:\programdata\Microsoft\Windows\Start Menu\Programs\Startup\
OpenVPN Connect.lnk - c:\program files (x86)\OpenVPN Technologies\OpenVPN Client\core\ovpntray.exe [2011-10-18 55296]
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\system]
"ConsentPromptBehaviorAdmin"= 5 (0x5)
"ConsentPromptBehaviorUser"= 3 (0x3)
"EnableUIADesktopToggle"= 0 (0x0)
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\!SASCORE]
@=""
.
R2 clr_optimization_v4.0.30319_32;Microsoft .NET Framework NGEN v4.0.30319_X86;c:\windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe [2010-03-18 130384]
R2 clr_optimization_v4.0.30319_64;Microsoft .NET Framework NGEN v4.0.30319_X64;c:\windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe [2010-03-18 138576]
R2 gupdate;Google Update Service (gupdate);c:\program files (x86)\Google\Update\GoogleUpdate.exe [2011-09-28 136176]
R2 MBAMService;MBAMService;c:\program files (x86)\Malwarebytes' Anti-Malware\mbamservice.exe [2011-12-25 652872]
R3 gupdatem;Google Update Service (gupdatem);c:\program files (x86)\Google\Update\GoogleUpdate.exe [2011-09-28 136176]
R3 MBAMProtector;MBAMProtector;c:\windows\system32\drivers\mbam.sys [x]
R3 MyWiFiDHCPDNS;Wireless PAN DHCP Server;c:\program files\Intel\WiFi\bin\PanDhcpDns.exe [2010-10-19 340240]
R3 osppsvc;Office Software Protection Platform;c:\program files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE [2010-01-10 4925184]
R3 Revoflt;Revoflt;c:\windows\system32\DRIVERS\revoflt.sys [x]
R3 TsUsbFlt;TsUsbFlt;c:\windows\system32\drivers\tsusbflt.sys [x]
R3 TsUsbGD;Remote Desktop Generic USB Device;c:\windows\system32\drivers\TsUsbGD.sys [x]
R3 TurboBoost;TurboBoost;c:\program files\Intel\TurboBoost\TurboBoost.exe [2009-11-02 126352]
S1 SASDIFSV;SASDIFSV;c:\program files\SUPERAntiSpyware\SASDIFSV64.SYS [2011-07-22 14928]
S1 SASKUTIL;SASKUTIL;c:\program files\SUPERAntiSpyware\SASKUTIL64.SYS [2011-07-12 12368]
S1 vwififlt;Virtual WiFi Filter Driver;c:\windows\system32\DRIVERS\vwififlt.sys [x]
S2 !SASCORE;SAS Core Service;c:\program files\SUPERAntiSpyware\SASCORE64.EXE [2011-08-11 140672]
S2 AdobeARMservice;Adobe Acrobat Update Service;c:\program files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe [2011-06-06 64952]
S2 AMD External Events Utility;AMD External Events Utility;c:\windows\system32\atiesrxx.exe [x]
S2 ASMMAP64;ASMMAP64;c:\program files (x86)\ASUS\ATK Package\ATKGFNEX\ASMMAP64.sys [2009-07-03 15416]
S2 OpenVPNAccessClient;OpenVPN Access Client;c:\program files (x86)\OpenVPN Technologies\OpenVPN Client\core\capiws.exe [2011-10-19 24064]
S2 TurboB;Turbo Boost UI Monitor driver;c:\windows\system32\DRIVERS\TurboB.sys [x]
S3 AmUStor;AM USB Stroage Driver;c:\windows\system32\drivers\AmUStor.SYS [x]
S3 L1C;NDIS Miniport Driver for Atheros AR813x/AR815x PCI-E Ethernet Controller (NDIS 6.20);c:\windows\system32\DRIVERS\L1C62x64.sys [x]
S3 NETwNs64;___ Intel® Wireless WiFi Link 5000 Series Adapter Driver for Windows 7 - 64 Bit;c:\windows\system32\DRIVERS\NETwNs64.sys [x]
S3 tapoas;TAP-Win32 Adapter OAS;c:\windows\system32\DRIVERS\tapoas.sys [x]
S3 vwifimp;Microsoft Virtual WiFi Miniport Service;c:\windows\system32\DRIVERS\vwifimp.sys [x]
.
.
Contents of the 'Scheduled Tasks' folder
.
2012-01-21 c:\windows\Tasks\GoogleUpdateTaskMachineCore.job
- c:\program files (x86)\Google\Update\GoogleUpdate.exe [2011-09-28 07:15]
.
2012-01-21 c:\windows\Tasks\GoogleUpdateTaskMachineUA.job
- c:\program files (x86)\Google\Update\GoogleUpdate.exe [2011-09-28 07:15]
.
.
--------- x86-64 -----------
.
.
[HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{F9E4A054-E9B1-4BC3-83A3-76A1AE736170}]
c:\program files (x86)\Hotspot Shield\HssIE\HssIE_64.dll [BU]
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"RtHDVCpl"="c:\program files\Realtek\Audio\HDA\RAVCpl64.exe" [2010-03-17 10134560]
"AmIcoSinglun64"="c:\program files (x86)\AmIcoSingLun\AmIcoSinglun64.exe" [2010-05-03 324096]
"IntelWireless"="c:\program files\Common Files\Intel\WirelessCommon\iFrmewrk.exe" [2010-10-19 1931024]
.
------- Supplementary Scan -------
.
uLocal Page = c:\windows\system32\blank.htm
mLocal Page = c:\windows\SysWOW64\blank.htm
IE: E&xport to Microsoft Excel - c:\progra~2\MIF5BA~1\Office14\EXCEL.EXE/3000
TCP: DhcpNameServer = 192.168.1.1
FF - ProfilePath - c:\users\B\AppData\Roaming\Mozilla\Firefox\Profiles\9dlq2o0b.default\
FF - prefs.js: network.proxy.type - 0
.
.
--------------------- LOCKED REGISTRY KEYS ---------------------
.
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\PCW\Security]
@Denied: (Full) (Everyone)
.
------------------------ Other Running Processes ------------------------
.
c:\program files (x86)\ASUS\ATK Package\ATK Hotkey\ASLDRSrv.exe
c:\program files (x86)\ASUS\ATK Package\ATKGFNEX\GFNEXSrv.exe
c:\program files (x86)\ASUS\ATK Package\ATK Hotkey\HControl.exe
.
**************************************************************************
.
Completion time: 2012-01-21 03:24:00 - machine was rebooted
ComboFix-quarantined-files.txt 2012-01-21 11:24
ComboFix2.txt 2012-01-20 17:27
.
Pre-Run: 336,210,935,808 bytes free
Post-Run: 335,882,645,504 bytes free
.
- - End Of File - - 7CA75CD02CB1CD8C74D56C85BE9AB81D



#10 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:04:40 AM

Posted 21 January 2012 - 08:32 AM

The log shows that Combofix just removed the autorun file - as it does. The PC looks like it's clear as are all the external devices.

We need a final mop-up and then we'll start on the second machine. Please scan with the online ESET program

I'd like us to scan your machine with ESET OnlineScan
  • Hold down Control and click on the following link to open ESET OnlineScan in a new window.
    ESET OnlineScan
  • Click the Posted Image button.
  • For alternate browsers only: (Microsoft Internet Explorer users can skip these steps)
    • Click on Posted Image to download the ESET Smart Installer. Save it to your desktop.
    • Double click on the Posted Image icon on your desktop.
  • Check Posted Image
  • Click the Posted Image button.
  • Accept any security warnings from your browser.
  • Under scan settings, check Posted Image and check Remove found threats
  • Click Advanced settings and select the following:
    • Scan potentially unwanted applications
    • Scan for potentially unsafe applications
    • Enable Anti-Stealth technology
  • ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this can take some time.
  • Copy and paste the resulting log in your next reply
If no log is generated that means nothing was found. Please let me know if this happens.
Posted Image
m0le is a proud member of UNITE

#11 Vaneyk

Vaneyk
  • Topic Starter

  • Members
  • 38 posts
  • OFFLINE
  •  
  • Local time:11:40 AM

Posted 21 January 2012 - 09:41 AM

Okay, running ESET (27 threats so far). Last time it took 6 hours to finish, so I may not have the log until tomorrow sometime. In the meantime (and only if you have a chance, I know you keep very busy here and I appreciate that you do this for free) I was curious about a couple things...

1st, I had noticed that ComboFix removed Autorun from the two externals but I couldn't find any reference to the drives with the USB stick and camera stick. How can you tell they're clean (aside from the symptoms which I guess ComboFix doesn't treat)? Is it because ComboFix didn't have to delete anything or is there something about them in the log that is harder for the untrained eye to see?

2nd, at least two coworkers have this virus too (not sure if one of us had it first or if it was the school/print shop computers). One has it at least on a USB stick and the other at least on a Camera memory stick. After you help with my devices I think I want to get ahold of theirs as well and help them clear them. Unfortunately, I don't think I'd realistically be able to clean all the school computers or the print shop computers and though I've been trying to just transfer through email since this virus appeared, I know at some point I'll have to use flash drives for large files or if the internet is down. What I want to know is if there's anything I can put on the USB memory that can reliably protect against it. Also I'd appreciate it if you could point me towards a reliable and cheap (ideally free) active anti-virus that really has a good chance of preventing stuff like this.

Thanks!

#12 Vaneyk

Vaneyk
  • Topic Starter

  • Members
  • 38 posts
  • OFFLINE
  •  
  • Local time:11:40 AM

Posted 21 January 2012 - 06:30 PM

Log:


C:\Qoobox\Quarantine\C\Users\B\AppData\Local\CatDBNetUsb\userUserclass.dll.vir probably a variant of Win32/Sefnit.CD trojan cleaned by deleting - quarantined
C:\Qoobox\Quarantine\C\Users\B\AppData\Roaming\247F.tmp.vir Win32/SpamTool.Tedroo.AT trojan cleaned by deleting - quarantined
C:\Qoobox\Quarantine\C\Users\B\AppData\Roaming\259B.tmp.vir Win32/SpamTool.Tedroo.AT trojan cleaned by deleting - quarantined
C:\Qoobox\Quarantine\C\Users\B\AppData\Roaming\28E3.tmp.vir a variant of Win32/Kryptik.YNU trojan cleaned by deleting - quarantined
C:\Qoobox\Quarantine\C\Users\B\AppData\Roaming\2A4E.tmp.vir a variant of Win32/Kryptik.YNU trojan cleaned by deleting - quarantined
C:\Qoobox\Quarantine\C\Users\B\AppData\Roaming\2D66.tmp.vir a variant of Win32/Kryptik.YNU trojan cleaned by deleting - quarantined
C:\Qoobox\Quarantine\C\Users\B\AppData\Roaming\2ED1.tmp.vir a variant of Win32/Kryptik.YNU trojan cleaned by deleting - quarantined
C:\Qoobox\Quarantine\C\Users\B\AppData\Roaming\3CBC.tmp.vir Win32/SpamTool.Tedroo.AT trojan cleaned by deleting - quarantined
C:\Qoobox\Quarantine\C\Users\B\AppData\Roaming\4239.tmp.vir a variant of Win32/Kryptik.YNU trojan cleaned by deleting - quarantined
C:\Qoobox\Quarantine\C\Users\B\AppData\Roaming\471A.tmp.vir a variant of Win32/Kryptik.YNU trojan cleaned by deleting - quarantined
C:\Qoobox\Quarantine\C\Users\B\AppData\Roaming\522B.tmp.vir Win32/SpamTool.Tedroo.AT trojan cleaned by deleting - quarantined
C:\Qoobox\Quarantine\C\Users\B\AppData\Roaming\56BE.tmp.vir a variant of Win32/Kryptik.YTG trojan cleaned by deleting - quarantined
C:\Qoobox\Quarantine\C\Users\B\AppData\Roaming\5B32.tmp.vir a variant of Win32/Kryptik.YTG trojan cleaned by deleting - quarantined
C:\Qoobox\Quarantine\C\Users\B\AppData\Roaming\7503.tmp.vir Win32/SpamTool.Tedroo.AT trojan cleaned by deleting - quarantined
C:\Qoobox\Quarantine\C\Users\B\AppData\Roaming\7986.tmp.vir a variant of Win32/Kryptik.YNU trojan cleaned by deleting - quarantined
C:\Qoobox\Quarantine\C\Users\B\AppData\Roaming\7DFA.tmp.vir a variant of Win32/Kryptik.YNU trojan cleaned by deleting - quarantined
C:\Qoobox\Quarantine\C\Users\B\AppData\Roaming\9F48.tmp.vir Win32/SpamTool.Tedroo.AT trojan cleaned by deleting - quarantined
C:\Qoobox\Quarantine\C\Users\B\AppData\Roaming\A3BC.tmp.vir a variant of Win32/Kryptik.YNU trojan cleaned by deleting - quarantined
C:\Qoobox\Quarantine\C\Users\B\AppData\Roaming\A4CD.tmp.vir Win32/SpamTool.Tedroo.AT trojan cleaned by deleting - quarantined
C:\Qoobox\Quarantine\C\Users\B\AppData\Roaming\A82F.tmp.vir a variant of Win32/Kryptik.YNU trojan cleaned by deleting - quarantined
C:\Qoobox\Quarantine\C\Users\B\AppData\Roaming\A932.tmp.vir a variant of Win32/Kryptik.YNU trojan cleaned by deleting - quarantined
C:\Qoobox\Quarantine\C\Users\B\AppData\Roaming\AE9F.tmp.vir a variant of Win32/Kryptik.YNU trojan cleaned by deleting - quarantined
C:\Qoobox\Quarantine\C\Users\B\AppData\Roaming\D5CF.tmp.vir Win32/SpamTool.Tedroo.AT trojan cleaned by deleting - quarantined
C:\Qoobox\Quarantine\C\Users\B\AppData\Roaming\DA33.tmp.vir a variant of Win32/Kryptik.YNU trojan cleaned by deleting - quarantined
C:\Qoobox\Quarantine\C\Users\B\AppData\Roaming\DEA7.tmp.vir a variant of Win32/Kryptik.YNU trojan cleaned by deleting - quarantined
C:\Qoobox\Quarantine\C\Users\B\AppData\Roaming\F72A.tmp.vir Win32/SpamTool.Tedroo.AT trojan cleaned by deleting - quarantined
C:\Users\B\Desktop\Virus Tools\installer_eset_online_scanner.exe Win32/Toggle application deleted - quarantined
D:\.Trashes.lnk Win32/Dorkbot.D worm cleaned by deleting - quarantined
D:\.Spotlight-V100.lnk Win32/Dorkbot.D worm cleaned by deleting - quarantined
D:\System Volume Information.lnk Win32/Dorkbot.D worm cleaned by deleting - quarantined
D:\WD stuff.lnk Win32/Dorkbot.D worm cleaned by deleting - quarantined
D:\Digi Pics.lnk Win32/Dorkbot.D worm cleaned by deleting - quarantined
D:\LIFAKIN'S MUSIC.lnk Win32/Dorkbot.D worm cleaned by deleting - quarantined
D:\Pictures and Junk.lnk Win32/Dorkbot.D worm cleaned by deleting - quarantined
D:\Old Schoolwork.lnk Win32/Dorkbot.D worm cleaned by deleting - quarantined
D:\ORLY and misc.lnk Win32/Dorkbot.D worm cleaned by deleting - quarantined
D:\Recycled.lnk Win32/Dorkbot.D worm cleaned by deleting - quarantined
D:\$RECYCLE.BIN.lnk Win32/Dorkbot.D worm cleaned by deleting - quarantined

#13 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:04:40 AM

Posted 21 January 2012 - 09:15 PM

1st How can you tell they're clean (aside from the symptoms which I guess ComboFix doesn't treat)? Is it because ComboFix didn't have to delete anything?


Yes, that's it. A clean drive will just show in the log as deleting the .inf file.

2nd, What I want to know is if there's anything I can put on the USB memory that can reliably protect against it.



You could use Flash Disinfector, a tool made by Combofix's developer. This runs as a stand alone tool on each system. Instructions below:

Please download Flash_Disinfector.exe by sUBs and save it to your desktop.
  • Double-click Flash_Disinfector.exe to run it and follow any prompts that may appear.
  • The utility may ask you to insert your flash drive and/or other removable drives. Please do so and allow the utility to clean up those drives as well.
  • Hold down the Shift key when inserting the drive until Windows detects it to keep autorun.inf from executing if it is present.
  • Wait until it has finished scanning and then exit the program.
  • Reboot your computer when done.
Note: As part of its routine, Flash_Disinfector will create a hidden folder named autorun.inf in each partition and every USB drive that was plugged in when you ran it. Do not delete this folder...it will help protect your drives from future infection by keeping the autorun file from being installed on the root drive and running other malicious files.


However, as this is a work network you might want to take a look at Panda's Autorun Vaccine here


Also I'd appreciate it if you could point me towards a reliable and cheap (ideally free) active anti-virus that really has a good chance of preventing stuff like this.


When we've cleaned the machine I will post a last list of things including my recommendations.


To the log:

C:\Qoobox\Quarantine\C\Users\B\AppData\Local\CatDBNetUsb\userUserclass.dll.vir probably a variant of Win32/Sefnit.CD trojan cleaned by deleting - quarantined

Qoobox is Combofix's quarantine folder so these are already dead when ESET removed them.


C:\Users\B\Desktop\Virus Tools\installer_eset_online_scanner.exe Win32/Toggle application deleted - quarantined

ESET deleted it's own installer.


D:\.Trashes.lnk Win32/Dorkbot.D worm cleaned by deleting - quarantined

Dorkbot is a worm that spreads through removeable devices. It's very easy to spread in places where removeable media is plugged in and out of a large number of machines. It also creates the .inf file that Combofix deletes to avoid the autorun of USB devices.

The important thing about this worm is this information from ESET:

The worm gathers information related to the following services:

AlertPay
AOL
Bebo
BigString
DynDns
Facebook

The following information is collected:

login user names for certain applications/services
login passwords for certain applications/services


If these sites are accessible and used by you and your co-workers then they need to be changed on a known clean machine.


Can you let me know how the machine we are dealing with is running now?
Posted Image
m0le is a proud member of UNITE

#14 Vaneyk

Vaneyk
  • Topic Starter

  • Members
  • 38 posts
  • OFFLINE
  •  
  • Local time:11:40 AM

Posted 22 January 2012 - 05:39 AM

Status right now:

Laptop #1 C: - No more Recycler folder (only symptom I ever saw)

External HD #1 D: - Still has Recycler folder, Legitimate folders are still hidden (hidden to where I have to uncheck "hide protected operating system files"), All the shortcuts that the virus had replaced the folders with have been deleted now.

External HD #2 F: - Recycler folder still exists but all the other folders are visible and the shortcuts have been deleted.

USB stick G: - Recycler folder exists, the folders are still hidden, and the shortcuts are still there.

Camera SD Card H: - Same as USB stick

#15 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:04:40 AM

Posted 22 January 2012 - 05:46 AM

Okay, let's make sure by cleaning the external drives individually. Run the Flash Disinfector on the first machine, as shown above and then let me know the status.
Posted Image
m0le is a proud member of UNITE




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users