Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Search engine redirector/ping.exe taking up system resources


  • This topic is locked This topic is locked
10 replies to this topic

#1 snowcat22

snowcat22

  • Members
  • 5 posts
  • OFFLINE
  •  
  • Local time:07:18 AM

Posted 18 January 2012 - 05:20 PM

Attached File  attach.txt   13.98KB   1 downloadsFirst noticed the search engine redirector and random web pages opening in the browser (FireFox). Then poor performance due to ping.exe taking close to 100% of available resources. It also randomly shuts down and occasionally freezes. I had malware previously which was removed by malwarebytes in safe mode. I've tried several tools, and nothing seems to be able to remove this. I have a full license to McAfee running as well.

The GMER log may not be complete because the computer restarts when GMER finishes *shrug*, but I think everything you need is there.

.
DDS (Ver_2011-08-26.01) - NTFSx86
Internet Explorer: 8.0.6001.18702 BrowserJavaVersion: 1.6.0_30
Run by Ken at 10:43:41 on 2012-01-18
Microsoft Windows XP Home Edition 5.1.2600.3.1252.1.1033.18.3071.2231 [GMT -6:00]
.
AV: McAfee VirusScan *Enabled/Updated* {84B5EE75-6421-4CDE-A33A-DD43BA9FAD83}
FW: McAfee Personal Firewall *Enabled*
.
============== Running Processes ===============
.
F:\WINDOWS\system32\Ati2evxx.exe
F:\WINDOWS\system32\svchost -k DcomLaunch
svchost.exe
F:\WINDOWS\System32\svchost.exe -k netsvcs
svchost.exe
F:\WINDOWS\system32\Ati2evxx.exe
svchost.exe
F:\WINDOWS\system32\spoolsv.exe
F:\Program Files\Creative\Shared Files\CTAudSvc.exe
F:\WINDOWS\Explorer.EXE
svchost.exe
F:\Program Files\Java\jre6\bin\jqs.exe
F:\Program Files\Alias\Maya7.0\docs\wrapper.exe
F:\Program Files\McAfee\SiteAdvisor\McSACore.exe
F:\Program Files\Common Files\McAfee\McSvcHost\McSvHost.exe
F:\Program Files\Common Files\McAfee\SystemCore\mfevtps.exe
F:\WINDOWS\system32\svchost.exe -k imgsvc
F:\WINDOWS\system32\MsPMSPSv.exe
F:\Program Files\Common Files\McAfee\SystemCore\mfefire.exe
F:\WINDOWS\system32\SearchIndexer.exe
F:\Program Files\Alias\Maya7.0\docs\jre\bin\java.exe
F:\WINDOWS\SOUNDMAN.EXE
F:\Program Files\McAfee.com\Agent\mcagent.exe
F:\WINDOWS\system32\CTHELPER.EXE
F:\Program Files\ATI Technologies\ATI.ACE\Core-Static\MOM.exe
F:\Program Files\Common Files\Java\Java Update\jusched.exe
F:\WINDOWS\system32\ctfmon.exe
F:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe
F:\Program Files\DNA\btdna.exe
F:\Program Files\Messenger\msmsgs.exe
F:\Program Files\Common Files\Nero\Lib\NMIndexStoreSvr.exe
F:\Program Files\Common Files\Nero\Lib\NMIndexingService.exe
F:\Program Files\Windows Desktop Search\WindowsSearch.exe
F:\Program Files\ATI Technologies\ATI.ACE\Core-Static\ccc.exe
F:\Program Files\Mozilla Firefox\firefox.exe
F:\Program Files\Common Files\McAfee\SystemCore\mcshield.exe
.
============== Pseudo HJT Report ===============
.
uStart Page = hxxp://www.yahoo.com/
uSearch Page = hxxp://www.google.com
uSearch Bar = hxxp://www.google.com/ie
uSearchAssistant = hxxp://www.google.com/ie
uSearchURL,(Default) = hxxp://www.google.com/search?q=%s
mSearchAssistant = hxxp://www.google.com/ie
BHO: {02478D38-C3F9-4efb-9B51-7695ECA05670} - No File
BHO: Adobe PDF Reader Link Helper: {06849e9f-c8d7-4d59-b87d-784b7d6be0b3} - f:\program files\common files\adobe\acrobat\activex\AcroIEHelper.dll
BHO: McAfee Phishing Filter: {27b4851a-3207-45a2-b947-be8afe6163ab} - f:\progra~1\mcafee\msk\mskapbho.dll
BHO: Java™ Plug-In SSV Helper: {761497bb-d6f0-462c-b6eb-d4daf1d92d43} - f:\program files\java\jre6\bin\ssv.dll
BHO: scriptproxy: {7db2d5a0-7241-4e79-b68d-6309f01c5231} - f:\program files\common files\mcafee\systemcore\ScriptSn.20100527180125.dll
BHO: Google Toolbar Helper: {aa58ed58-01dd-4d91-8333-cf10577473f7} - f:\program files\google\googletoolbar2.dll
BHO: Google Toolbar Notifier BHO: {af69de43-7d58-4638-b6fa-ce66b5ad205d} - f:\program files\google\googletoolbarnotifier\5.6.5612.1312\swg.dll
BHO: McAfee SiteAdvisor BHO: {b164e929-a1b6-4a06-b104-2cd0e90a88ff} - f:\progra~1\mcafee\sitead~1\mcieplg.dll
BHO: Java™ Plug-In 2 SSV Helper: {dbc80044-a445-435b-bc74-9c25c1c588a9} - f:\program files\java\jre6\bin\jp2ssv.dll
BHO: JQSIEStartDetectorImpl Class: {e7e6f031-17ce-4c07-bc86-eabfe594f69c} - f:\program files\java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll
TB: {84938242-5C5B-4A55-B6B9-A1507543B418} - No File
TB: &Google: {2318c2b1-4965-11d4-9b18-009027a5cd4f} - f:\program files\google\googletoolbar2.dll
TB: McAfee SiteAdvisor Toolbar: {0ebbbe48-bad4-4b4c-8e5a-516abecae064} - f:\progra~1\mcafee\sitead~1\mcieplg.dll
TB: {EF99BD32-C1FB-11D2-892F-0090271D4F88} - No File
uRun: [ctfmon.exe] f:\windows\system32\ctfmon.exe
uRun: [igndlm.exe] f:\program files\download manager\DLM.exe /windowsstart /startifwork
uRun: [swg] "f:\program files\google\googletoolbarnotifier\GoogleToolbarNotifier.exe"
uRun: [EA Core] "f:\program files\electronic arts\eadm\Core.exe" -silent
uRun: [BitTorrent DNA] "f:\program files\dna\btdna.exe"
uRun: [MSMSGS] "f:\program files\messenger\msmsgs.exe" /background
uRun: [IndxStoreSvr_{79662E04-7C6C-4d9f-84C7-88D8A56B10AA}] "f:\program files\common files\nero\lib\NMIndexStoreSvr.exe" ASO-616B5711-6DAE-4795-A05F-39A1E5104020
mRun: [CTxfiHlp] CTXFIHLP.EXE
mRun: [SoundMan] SOUNDMAN.EXE
mRun: [AlcWzrd] ALCWZRD.EXE
mRun: [Alcmtr] ALCMTR.EXE
mRun: [NeroFilterCheck] f:\program files\common files\nero\lib\NeroCheck.exe
mRun: [mcui_exe] "f:\program files\mcafee.com\agent\mcagent.exe" /runkey
mRun: [StartCCC] "f:\program files\ati technologies\ati.ace\core-static\CLIStart.exe" MSRun
mRun: [QuickTime Task] "f:\program files\quicktime\qttask.exe" -atboottime
mRun: [CTHelper] CTHELPER.EXE
mRun: [SunJavaUpdateSched] "f:\program files\common files\java\java update\jusched.exe"
mRun: [Adobe Reader Speed Launcher] "f:\program files\adobe\reader 8.0\reader\Reader_sl.exe"
mRun: [Adobe ARM] "f:\program files\common files\adobe\arm\1.0\AdobeARM.exe"
dRun: [DWQueuedReporting] "f:\progra~1\common~1\micros~1\dw\dwtrig20.exe" -t
dRunOnce: [SetDefaultMIDI] MIDIDEF.EXE /s:'Creative SoundFont Synthesizer' /w:'SB Audigy'
dRunOnce: [tscuninstall] %systemroot%\system32\tscupgrd.exe
dRunOnce: [CTAutoUpdate] "f:\program files\creative\shared files\software update\AutoUpdate.exe" /RunFromInstaller
StartupFolder: f:\docume~1\ken\startm~1\programs\startup\adobeg~1.lnk - f:\program files\common files\adobe\calibration\Adobe Gamma Loader.exe
StartupFolder: f:\docume~1\alluse~1\startm~1\programs\startup\raidma~1.lnk - f:\program files\ite\ite it8212 ata raid controller\RaidMgr.exe
StartupFolder: f:\docume~1\alluse~1\startm~1\programs\startup\tabuse~1.lnk - c:\windows\system32\wtablet\TabUserW.exe
StartupFolder: f:\docume~1\alluse~1\startm~1\programs\startup\window~1.lnk - f:\program files\windows desktop search\WindowsSearch.exe
uPolicies-explorer: <NO NAME> =
IE: E&xport to Microsoft Excel - c:\progra~1\micros~2\office11\EXCEL.EXE/3000
IE: {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe
IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - f:\program files\messenger\msmsgs.exe
IE: {92780B25-18CC-41C8-B9BE-3C9C571A8263} - {FF059E31-CC5A-4E2E-BF3B-96E929D65503} - c:\progra~1\micros~2\office11\REFIEBAR.DLL
LSP: mswsock.dll
DPF: {02BF25D5-8C17-4B23-BC80-D3488ABDDC6B} - hxxp://a1540.g.akamai.net/7/1540/52/20061205/qtinstall.info.apple.com/qtactivex/qtplugin.cab
DPF: {0A5FD7C5-A45C-49FC-ADB5-9952547D5715} - hxxp://www.creative.com/su/ocx/15026/CTSUEng.cab
DPF: {17492023-C23A-453E-A040-C7C580BBF700} - hxxp://go.microsoft.com/fwlink/?linkid=39204
DPF: {39B0684F-D7BF-4743-B050-FDC3F48F7E3B} - hxxp://www.fileplanet.com/fpdlmgr/cabs/FPDC_2.3.6.108.cab
DPF: {48DD0448-9209-4F81-9F6D-D83562940134} - hxxp://lads.myspace.com/upload/MySpaceUploader1006.cab
DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} - hxxp://update.microsoft.com/windowsupdate/v6/V5Controls/en/x86/client/wuweb_site.cab?1215649392015
DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} - hxxp://update.microsoft.com/microsoftupdate/v6/V5Controls/en/x86/client/muweb_site.cab?1168633646281
DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_30-windows-i586.cab
DPF: {A8F2B9BD-A6A0-486A-9744-18920D898429} - hxxp://www.sibelius.com/download/software/win/ActiveXPlugin.cab
DPF: {CAFEEFAC-0016-0000-0000-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0-windows-i586.cab
DPF: {CAFEEFAC-0016-0000-0001-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_01-windows-i586.cab
DPF: {CAFEEFAC-0016-0000-0002-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_02-windows-i586.cab
DPF: {CAFEEFAC-0016-0000-0003-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_03-windows-i586.cab
DPF: {CAFEEFAC-0016-0000-0005-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_05-windows-i586.cab
DPF: {CAFEEFAC-0016-0000-0007-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_07-windows-i586.cab
DPF: {CAFEEFAC-0016-0000-0030-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_30-windows-i586.cab
DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_30-windows-i586.cab
DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} - hxxp://fpdownload.macromedia.com/get/shockwave/cabs/flash/swflash.cab
DPF: {E2883E8F-472F-4FB0-9522-AC9BF37916A7} - hxxp://platformdl.adobe.com/NOS/getPlusPlus/1.6/gp.cab
DPF: {F6ACF75C-C32C-447B-9BEF-46B766368D29} - hxxp://ccfiles.creative.com/Web/softwareupdate/su2/ocx/15109/CTPID.cab
TCP: DhcpNameServer = 10.0.0.1
TCP: Interfaces\{6E966C64-3E1D-457F-B416-1CE04D481B17} : DhcpNameServer = 10.0.0.1
Handler: sacore - {5513F07E-936B-4E52-9B00-067394E91CC5} - f:\progra~1\mcafee\sitead~1\McIEPlg.dll
Notify: AtiExtEvent - Ati2evxx.dll
SSODL: WPDShServiceObj - {AAA288BA-9A4C-45B0-95D7-94D524869DB5} - f:\windows\system32\WPDShServiceObj.dll
SSODL: eitheror - {2016a466-91a2-43c6-97d8-2fd380f065ef} - No File
STS: {2016a466-91a2-43c6-97d8-2fd380f065ef} - No File
SEH: Microsoft AntiMalware ShellExecuteHook: {091eb208-39dd-417d-a5dd-7e2c2d8fb9cb} - f:\progra~1\wifd1f~1\MpShHook.dll
SEH: Eudora's Shell Extension: {edb0e980-90bd-11d4-8599-0008c7d3b6f8} - c:\program files\qualcomm\eudora\EuShlExt.dll
SEH: Windows Desktop Search Namespace Manager: {56f9679e-7826-4c84-81f3-532071a8bcc5} - f:\program files\windows desktop search\MSNLNamespaceMgr.dll
.
================= FIREFOX ===================
.
FF - ProfilePath - f:\documents and settings\ken\application data\mozilla\firefox\profiles\s9070ris.default\
FF - component: f:\documents and settings\all users\application data\real\realplayer\browserrecordplugin\firefox\ext\components\nprpffbrowserrecordext.dll
FF - component: f:\documents and settings\all users\application data\real\realplayer\browserrecordplugin\firefox\ext\components\nprpffbrowserrecordlegacyext.dll
FF - component: f:\program files\mcafee\siteadvisor\components\McFFPlg.dll
FF - plugin: f:\program files\download manager\npfpdlm.dll
FF - plugin: f:\program files\java\jre6\bin\new_plugin\npdeployJava1.dll
FF - plugin: f:\program files\mozilla firefox\plugins\npdeployJava1.dll
.
============= SERVICES / DRIVERS ===============
.
R0 iteraid;ITERAID_Service_Install;f:\windows\system32\drivers\iteraid.sys [2004-6-24 24971]
R0 mfehidk;McAfee Inc. mfehidk;f:\windows\system32\drivers\mfehidk.sys [2007-2-23 385536]
R1 mfetdi2k;McAfee Inc. mfetdi2k;f:\windows\system32\drivers\mfetdi2k.sys [2010-5-9 82952]
R2 McAfee SiteAdvisor Service;McAfee SiteAdvisor Service;f:\program files\mcafee\siteadvisor\McSACore.exe [2008-9-3 206096]
R2 McMPFSvc;McAfee Personal Firewall;f:\program files\common files\mcafee\mcsvchost\McSvHost.exe [2010-5-9 271480]
R2 McNaiAnn;McAfee VirusScan Announcer;f:\program files\common files\mcafee\mcsvchost\McSvHost.exe [2010-5-9 271480]
R2 McProxy;McAfee Proxy Service;f:\program files\common files\mcafee\mcsvchost\McSvHost.exe [2010-5-9 271480]
R2 McShield;McShield;f:\program files\common files\mcafee\systemcore\mcshield.exe [2010-5-9 170144]
R2 mfefire;McAfee Firewall Core Service;f:\program files\common files\mcafee\systemcore\mfefire.exe [2010-5-9 188136]
R2 mfevtp;McAfee Validation Trust Protection Service;f:\program files\common files\mcafee\systemcore\mfevtps.exe [2010-5-9 141792]
R3 cfwids;McAfee Inc. cfwids;f:\windows\system32\drivers\cfwids.sys [2010-5-9 55456]
R3 COMMONFX.SYS;COMMONFX.SYS;f:\windows\system32\drivers\COMMONFX.sys [2009-6-23 99352]
R3 CTAUDFX.SYS;CTAUDFX.SYS;f:\windows\system32\drivers\CTAUDFX.sys [2009-6-23 555032]
R3 CTSBLFX.SYS;CTSBLFX.SYS;f:\windows\system32\drivers\CTSBLFX.sys [2009-6-23 566296]
R3 mfeavfk;McAfee Inc. mfeavfk;f:\windows\system32\drivers\mfeavfk.sys [2007-2-23 152320]
R3 mfebopk;McAfee Inc. mfebopk;f:\windows\system32\drivers\mfebopk.sys [2007-2-23 51688]
R3 mfefirek;McAfee Inc. mfefirek;f:\windows\system32\drivers\mfefirek.sys [2010-5-9 312616]
R3 mfendiskmp;mfendiskmp;f:\windows\system32\drivers\mfendisk.sys [2010-5-9 88480]
S0 ymmfguqt;ymmfguqt;f:\windows\system32\drivers\qdwlsnim.sys --> f:\windows\system32\drivers\qdwlsnim.sys [?]
S3 bfastfao;bfastfao;f:\docume~1\ken\locals~1\temp\bfastfao.sys [2004-5-3 31744]
S3 COMMONFX;COMMONFX;f:\windows\system32\drivers\COMMONFX.sys [2009-6-23 99352]
S3 Creative Audio Engine Licensing Service;Creative Audio Engine Licensing Service;f:\program files\common files\creative labs shared\service\CTAELicensing.exe [2011-4-28 79360]
S3 CTAUDFX;CTAUDFX;f:\windows\system32\drivers\CTAUDFX.sys [2009-6-23 555032]
S3 CTERFXFX.SYS;CTERFXFX.SYS;f:\windows\system32\drivers\CTERFXFX.sys [2009-6-23 100888]
S3 CTERFXFX;CTERFXFX;f:\windows\system32\drivers\CTERFXFX.sys [2009-6-23 100888]
S3 CTSBLFX;CTSBLFX;f:\windows\system32\drivers\CTSBLFX.sys [2009-6-23 566296]
S3 MBAMSwissArmy;MBAMSwissArmy;f:\windows\system32\drivers\mbamswissarmy.sys [2012-1-15 40776]
S3 mfendisk;McAfee Core NDIS Intermediate Filter;f:\windows\system32\drivers\mfendisk.sys [2010-5-9 88480]
S3 mferkdet;McAfee Inc. mferkdet;f:\windows\system32\drivers\mferkdet.sys [2010-5-9 83496]
S3 mferkdk;McAfee Inc. mferkdk;f:\windows\system32\drivers\mferkdk.sys [2007-2-23 34248]
S3 mfesmfk;McAfee Inc. mfesmfk;f:\windows\system32\drivers\mfesmfk.sys [2007-2-23 40552]
S3 XDva090;XDva090;\??\f:\windows\system32\xdva090.sys --> f:\windows\system32\XDva090.sys [?]
.
=============== Created Last 30 ================
.
2012-01-15 23:15:51 40776 ----a-w- f:\windows\system32\drivers\mbamswissarmy.sys
2011-12-24 22:00:51 23624 ----a-w- f:\windows\system32\drivers\hitmanpro36.sys
2011-12-24 22:00:03 -------- d-----w- f:\documents and settings\all users\application data\HitmanPro
.
==================== Find3M ====================
.
2011-12-10 21:24:06 20464 ----a-w- f:\windows\system32\drivers\mbam.sys
2011-11-25 04:23:37 1880 ----a-w- f:\windows\AUTOLNCH.REG
2011-11-23 13:25:32 1859584 ----a-w- f:\windows\system32\win32k.sys
2011-11-17 00:01:48 414368 ----a-w- f:\windows\system32\FlashPlayerCPLApp.cpl
2011-11-15 20:29:56 222080 ------w- f:\windows\system32\MpSigStub.exe
2011-11-10 11:54:13 472808 ----a-w- f:\windows\system32\deployJava1.dll
2011-11-10 09:27:10 73728 ----a-w- f:\windows\system32\javacpl.cpl
2011-11-04 19:20:51 916992 ----a-w- f:\windows\system32\wininet.dll
2011-11-04 19:20:51 43520 ------w- f:\windows\system32\licmgr10.dll
2011-11-04 19:20:51 1469440 ------w- f:\windows\system32\inetcpl.cpl
2011-11-04 11:23:59 385024 ------w- f:\windows\system32\html.iec
2011-11-01 16:07:10 1288704 ----a-w- f:\windows\system32\ole32.dll
2011-10-28 05:31:48 33280 ----a-w- f:\windows\system32\csrsrv.dll
2011-10-25 13:37:08 2148864 ----a-w- f:\windows\system32\ntoskrnl.exe
2011-10-25 12:52:02 2027008 ----a-w- f:\windows\system32\ntkrnlpa.exe
.
============= FINISH: 10:46:22.73 ===============

Attached Files

  • Attached File  ark.txt   137.83KB   1 downloads


BC AdBot (Login to Remove)

 


#2 RPMcMurphy

RPMcMurphy

    Bleeping *^#@%~


  • Malware Response Team
  • 3,970 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:09:18 AM

Posted 21 January 2012 - 12:07 PM

Hello and welcome. Please follow these guidelines while we work on your PC:
  • Malware removal is a sometimes lengthy and tedious process. Please stick with the thread until Ive given you the All clear. Absence of symptoms does not mean your machine is clean!
  • Please do not run any scans or install/uninstall any applications without being directed to do so.
  • Please note that the forum is very busy and if I don't hear from you within five days this thread will be closed.
Posted Image Download ComboFix from one of the following locations:
Link 1
Link 2

VERY IMPORTANT !!! Save ComboFix.exe to your Desktop

* IMPORTANT - Disable your AntiVirus and AntiSpyware applications, usually via a right click on the System Tray icon. They may otherwise interfere with our tools. If you have difficulty properly disabling your protective programs, refer to this link
  • Double click on ComboFix.exe & follow the prompts.
As part of it's process, ComboFix will check to see if the Microsoft Windows Recovery Console is installed. With malware infections being as they are today, it's strongly recommended to have this pre-installed on your machine before doing any malware removal. It will allow you to boot up into a special recovery/repair mode that will allow us to more easily help you should your computer have a problem after an attempted removal of malware.

  • Follow the prompts to allow ComboFix to download and install the Microsoft Windows Recovery Console, and when prompted, agree to the End-User License Agreement to install the Microsoft Windows Recovery Console.
**Please note: If the Microsoft Windows Recovery Console is already installed, ComboFix will continue it's malware removal procedures.

Posted Image

  • Once the Microsoft Windows Recovery Console is installed using ComboFix, you should see the following message:

Posted Image

  • Click on Yes, to continue scanning for malware.
When finished, it shall produce a log for you. Please include the C:\ComboFix.txt in your next reply.
Notes:
1. Do not mouse-click Combofix's window while it is running. That may cause it to stall.
2. Do not "re-run" Combofix. If you have a problem, reply back for further instructions.


Please include the following in your next post:
  • ComboFix log

Threads are closed after 5 days of inactivity.

ASAP & UNITE Member


The help you receive here is free. If you wish to show your appreciation, then you may btn_donate_SM.gif


#3 snowcat22

snowcat22
  • Topic Starter

  • Members
  • 5 posts
  • OFFLINE
  •  
  • Local time:07:18 AM

Posted 21 January 2012 - 05:52 PM

Thanks! I haven't tried it extensively, but seems to be fixed so far. I got a lot of corrupt file errors, but I don't think that is related to the rootkit, this drive needs to be reformatted badly... (Internet seems to be working OK).

ComboFix 12-01-21.02 - Ken 01/21/2012 16:07:43.1.2 - x86
Microsoft Windows XP Home Edition 5.1.2600.3.1252.1.1033.18.3071.2427 [GMT -6:00]
Running from: f:\documents and settings\Ken\Desktop\ComboFix.exe
AV: McAfee VirusScan *Disabled/Updated* {84B5EE75-6421-4CDE-A33A-DD43BA9FAD83}
FW: McAfee Personal Firewall *Enabled* {94894B63-8C7F-4050-BDA4-813CA00DA3E8}
* Created a new restore point
.
.
((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.
.
f:\documents and settings\All Users\Start Menu\Programs\Startup\TabUserW.exe.lnk
f:\documents and settings\Ken\Desktop\Internet Explorer.lnk
f:\documents and settings\Ken\Local Settings\Application Data\assembly\tmp
f:\documents and settings\Ken\My Documents\~WRL0004.tmp
f:\documents and settings\Ken\WINDOWS
f:\windows\$NtUninstallKB11235$\2955582409\@
f:\windows\$NtUninstallKB11235$\2955582409\bckfg.tmp
f:\windows\$NtUninstallKB11235$\2955582409\cfg.ini
f:\windows\$NtUninstallKB11235$\2955582409\Desktop.ini
f:\windows\$NtUninstallKB11235$\2955582409\keywords
f:\windows\$NtUninstallKB11235$\2955582409\kwrd.dll
f:\windows\$NtUninstallKB11235$\2955582409\L\snzqhzsw
f:\windows\$NtUninstallKB11235$\2955582409\lsflt7.ver
f:\windows\$NtUninstallKB11235$\2955582409\U\00000001.@
f:\windows\$NtUninstallKB11235$\2955582409\U\00000002.@
f:\windows\$NtUninstallKB11235$\2955582409\U\00000004.@
f:\windows\$NtUninstallKB11235$\2955582409\U\80000000.@
f:\windows\$NtUninstallKB11235$\2955582409\U\80000004.@
f:\windows\$NtUninstallKB11235$\2955582409\U\80000032.@
f:\windows\$NtUninstallKB11235$\761465530
f:\windows\EventSystem.log
f:\windows\$NtUninstallKB11235$ . . . . Failed to delete
.
.
((((((((((((((((((((((((((((((((((((((( Drivers/Services )))))))))))))))))))))))))))))))))))))))))))))))))
.
.
-------\Legacy_6TO4
-------\Service_6to4
.
.
((((((((((((((((((((((((( Files Created from 2011-12-21 to 2012-01-21 )))))))))))))))))))))))))))))))
.
.
2012-01-15 23:15 . 2012-01-15 23:16 40776 ----a-w- f:\windows\system32\drivers\mbamswissarmy.sys
2011-12-24 22:00 . 2011-12-24 22:21 23624 ----a-w- f:\windows\system32\drivers\hitmanpro36.sys
2011-12-24 22:00 . 2011-12-24 22:11 -------- d-----w- f:\documents and settings\All Users\Application Data\HitmanPro
.
.
.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2011-12-10 21:24 . 2011-11-08 03:40 20464 ----a-w- f:\windows\system32\drivers\mbam.sys
2011-11-25 04:23 . 2007-02-19 00:37 1880 ----a-w- f:\windows\AUTOLNCH.REG
2011-11-23 13:25 . 2004-08-04 12:00 1859584 ----a-w- f:\windows\system32\win32k.sys
2011-11-21 10:47 . 2011-12-16 23:26 6823496 ----a-w- f:\documents and settings\All Users\Application Data\Microsoft\Windows Defender\Definition Updates\{6EDCFA28-AFDD-4681-B174-133DF01BCB49}\mpengine.dll
2011-11-21 10:47 . 2007-02-24 23:10 6823496 ----a-w- f:\documents and settings\All Users\Application Data\Microsoft\Windows Defender\Definition Updates\Backup\mpengine.dll
2011-11-17 00:01 . 2011-05-19 22:59 414368 ----a-w- f:\windows\system32\FlashPlayerCPLApp.cpl
2011-11-15 20:29 . 2009-10-02 23:17 222080 ------w- f:\windows\system32\MpSigStub.exe
2011-11-10 11:54 . 2010-05-09 03:31 472808 ----a-w- f:\windows\system32\deployJava1.dll
2011-11-10 09:27 . 2010-01-28 00:16 73728 ----a-w- f:\windows\system32\javacpl.cpl
2011-11-04 19:20 . 2004-08-04 12:00 916992 ----a-w- f:\windows\system32\wininet.dll
2011-11-04 19:20 . 2004-08-04 12:00 43520 ------w- f:\windows\system32\licmgr10.dll
2011-11-04 19:20 . 2004-08-04 12:00 1469440 ------w- f:\windows\system32\inetcpl.cpl
2011-11-04 11:23 . 2004-08-04 12:00 385024 ------w- f:\windows\system32\html.iec
2011-11-01 16:07 . 2004-08-04 12:00 1288704 ----a-w- f:\windows\system32\ole32.dll
2011-10-28 05:31 . 2004-08-04 12:00 33280 ----a-w- f:\windows\system32\csrsrv.dll
2011-10-25 13:37 . 2004-08-04 12:00 2148864 ----a-w- f:\windows\system32\ntoskrnl.exe
2011-10-25 12:52 . 2004-08-03 22:59 2027008 ----a-w- f:\windows\system32\ntkrnlpa.exe
2011-12-18 20:33 . 2011-12-18 20:33 134104 ----a-w- f:\program files\mozilla firefox\components\browsercomps.dll
2010-04-14 17:29 . 2010-05-27 23:01 24376 ----a-w- f:\program files\mozilla firefox\components\Scriptff.dll
.
.
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4
.
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"igndlm.exe"="f:\program files\Download Manager\DLM.exe" [2007-03-05 1103480]
"swg"="f:\program files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe" [2008-07-29 68856]
"BitTorrent DNA"="f:\program files\DNA\btdna.exe" [2009-11-12 323392]
"IndxStoreSvr_{79662E04-7C6C-4d9f-84C7-88D8A56B10AA}"="f:\program files\Common Files\Nero\Lib\NMIndexStoreSvr.exe" [2008-06-24 1840424]
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"CTxfiHlp"="CTXFIHLP.EXE" [2006-08-11 18944]
"SoundMan"="SOUNDMAN.EXE" [2005-09-21 86016]
"AlcWzrd"="ALCWZRD.EXE" [2005-09-21 2807808]
"NeroFilterCheck"="f:\program files\Common Files\Nero\Lib\NeroCheck.exe" [2008-07-09 570664]
"mcui_exe"="f:\program files\McAfee.com\Agent\mcagent.exe" [2010-04-02 1180976]
"StartCCC"="f:\program files\ATI Technologies\ATI.ACE\Core-Static\CLIStart.exe" [2010-02-11 61440]
"QuickTime Task"="f:\program files\QuickTime\qttask.exe" [2010-11-29 421888]
"CTHelper"="CTHELPER.EXE" [2009-06-23 19456]
"SunJavaUpdateSched"="f:\program files\Common Files\Java\Java Update\jusched.exe" [2011-06-09 254696]
"Adobe Reader Speed Launcher"="f:\program files\Adobe\Reader 8.0\Reader\Reader_sl.exe" [2011-08-31 40368]
"Adobe ARM"="f:\program files\Common Files\Adobe\ARM\1.0\AdobeARM.exe" [2011-03-30 937920]
.
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run]
"DWQueuedReporting"="f:\progra~1\COMMON~1\MICROS~1\DW\dwtrig20.exe" [2007-03-23 39264]
.
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\RunOnce]
"SetDefaultMIDI"="MIDIDEF.EXE" [2009-06-23 28672]
"tscuninstall"="f:\windows\system32\tscupgrd.exe" [2004-08-04 44544]
"CTAutoUpdate"="f:\program files\Creative\Shared Files\Software Update\AutoUpdate.exe" [2009-01-15 430968]
.
f:\documents and settings\Ken\Start Menu\Programs\Startup\
Adobe Gamma.lnk - f:\program files\Common Files\Adobe\Calibration\Adobe Gamma Loader.exe [2005-3-16 113664]
.
f:\documents and settings\All Users\Start Menu\Programs\Startup\
RAID Manager.lnk - f:\program files\ITE\ITE IT8212 ATA RAID Controller\RaidMgr.exe [N/A]
Windows Search.lnk - f:\program files\Windows Desktop Search\WindowsSearch.exe [2008-5-26 123904]
.
[hkey_local_machine\software\microsoft\windows\currentversion\explorer\ShellExecuteHooks]
"{EDB0E980-90BD-11D4-8599-0008C7D3B6F8}"= "c:\program files\Qualcomm\Eudora\EuShlExt.dll" [2005-11-14 86016]
"{56F9679E-7826-4C84-81F3-532071A8BCC5}"= "f:\program files\Windows Desktop Search\MSNLNamespaceMgr.dll" [2009-05-25 304128]
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\drivers32]
"midi3"=xgusb.cpl
"midi4"=xgusb.cpl
.
[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\session manager]
BootExecute REG_MULTI_SZ autocheck autochk /r \??\f:\0autocheck autochk *\0sprestrt
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\mcmscsvc]
@=""
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\MCODS]
@=""
.
[HKEY_LOCAL_MACHINE\software\microsoft\security center]
"AntiVirusOverride"=dword:00000001
"FirewallOverride"=dword:00000001
.
[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\McAfeeAntiVirus]
"DisableMonitoring"=dword:00000001
.
[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\McAfeeFirewall]
"DisableMonitoring"=dword:00000001
.
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]
"EnableFirewall"= 0 (0x0)
"DisableNotifications"= 1 (0x1)
.
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=
"f:\\WINDOWS\\system32\\usmt\\migwiz.exe"=
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"f:\\Program Files\\DNA\\btdna.exe"=
"f:\\Program Files\\Common Files\\McAfee\\McSvcHost\\McSvHost.exe"=
.
R0 iteraid;ITERAID_Service_Install;f:\windows\system32\drivers\iteraid.sys [6/24/2004 8:23 AM 24971]
R1 mfetdi2k;McAfee Inc. mfetdi2k;f:\windows\system32\drivers\mfetdi2k.sys [5/9/2010 4:23 PM 82952]
R2 McAfee SiteAdvisor Service;McAfee SiteAdvisor Service;f:\program files\McAfee\SiteAdvisor\McSACore.exe [9/3/2008 6:08 PM 206096]
R2 McMPFSvc;McAfee Personal Firewall;"f:\program files\Common Files\Mcafee\McSvcHost\McSvHost.exe" /McCoreSvc [5/9/2010 4:22 PM 271480]
R2 McNaiAnn;McAfee VirusScan Announcer;"f:\program files\Common Files\McAfee\McSvcHost\McSvHost.exe" /McCoreSvc [5/9/2010 4:22 PM 271480]
R2 mfefire;McAfee Firewall Core Service;f:\program files\Common Files\McAfee\SystemCore\mfefire.exe [5/9/2010 4:23 PM 188136]
R2 mfevtp;McAfee Validation Trust Protection Service;f:\program files\Common Files\McAfee\SystemCore\mfevtps.exe [5/9/2010 4:23 PM 141792]
R3 cfwids;McAfee Inc. cfwids;f:\windows\system32\drivers\cfwids.sys [5/9/2010 4:23 PM 55456]
R3 COMMONFX.SYS;COMMONFX.SYS;f:\windows\system32\drivers\COMMONFX.sys [6/23/2009 1:34 PM 99352]
R3 CTAUDFX.SYS;CTAUDFX.SYS;f:\windows\system32\drivers\CTAUDFX.sys [6/23/2009 1:34 PM 555032]
R3 CTSBLFX.SYS;CTSBLFX.SYS;f:\windows\system32\drivers\CTSBLFX.sys [6/23/2009 1:34 PM 566296]
R3 mfefirek;McAfee Inc. mfefirek;f:\windows\system32\drivers\mfefirek.sys [5/9/2010 4:23 PM 312616]
R3 mfendiskmp;mfendiskmp;f:\windows\system32\drivers\mfendisk.sys [5/9/2010 4:23 PM 88480]
S0 ymmfguqt;ymmfguqt;f:\windows\system32\drivers\qdwlsnim.sys --> f:\windows\system32\drivers\qdwlsnim.sys [?]
S3 bfastfao;bfastfao;\??\f:\docume~1\Ken\LOCALS~1\Temp\bfastfao.sys --> f:\docume~1\Ken\LOCALS~1\Temp\bfastfao.sys [?]
S3 COMMONFX;COMMONFX;f:\windows\system32\drivers\COMMONFX.sys [6/23/2009 1:34 PM 99352]
S3 Creative Audio Engine Licensing Service;Creative Audio Engine Licensing Service;f:\program files\Common Files\Creative Labs Shared\Service\CTAELicensing.exe [4/28/2011 6:16 PM 79360]
S3 CTAUDFX;CTAUDFX;f:\windows\system32\drivers\CTAUDFX.sys [6/23/2009 1:34 PM 555032]
S3 CTERFXFX.SYS;CTERFXFX.SYS;f:\windows\system32\drivers\CTERFXFX.sys [6/23/2009 1:35 PM 100888]
S3 CTERFXFX;CTERFXFX;f:\windows\system32\drivers\CTERFXFX.sys [6/23/2009 1:35 PM 100888]
S3 CTSBLFX;CTSBLFX;f:\windows\system32\drivers\CTSBLFX.sys [6/23/2009 1:34 PM 566296]
S3 MBAMSwissArmy;MBAMSwissArmy;f:\windows\system32\drivers\mbamswissarmy.sys [1/15/2012 5:15 PM 40776]
S3 mfendisk;McAfee Core NDIS Intermediate Filter;f:\windows\system32\drivers\mfendisk.sys [5/9/2010 4:23 PM 88480]
S3 mferkdet;McAfee Inc. mferkdet;f:\windows\system32\drivers\mferkdet.sys [5/9/2010 4:23 PM 83496]
S3 XDva090;XDva090;\??\f:\windows\system32\XDva090.sys --> f:\windows\system32\XDva090.sys [?]
.
--- Other Services/Drivers In Memory ---
.
*Deregistered* - mfeavfk01
.
Contents of the 'Scheduled Tasks' folder
.
2011-09-02 f:\windows\Tasks\AppleSoftwareUpdate.job
- f:\program files\Apple Software Update\SoftwareUpdate.exe [2008-07-30 18:34]
.
2011-12-17 f:\windows\Tasks\MP Scheduled Scan.job
- f:\program files\Windows Defender\MpCmdRun.exe [2006-11-04 00:20]
.
.
------- Supplementary Scan -------
.
uStart Page = hxxp://www.yahoo.com/
uSearchAssistant = hxxp://www.google.com/ie
uSearchURL,(Default) = hxxp://www.google.com/search?q=%s
IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~2\OFFICE11\EXCEL.EXE/3000
TCP: DhcpNameServer = 10.0.0.1
FF - ProfilePath - f:\documents and settings\Ken\Application Data\Mozilla\Firefox\Profiles\s9070ris.default\
.
- - - - ORPHANS REMOVED - - - -
.
HKCU-Run-EA Core - f:\program files\Electronic Arts\EADM\Core.exe
SafeBoot-WinDefend
.
.
.
**************************************************************************
.
catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2012-01-21 16:32
Windows 5.1.2600 Service Pack 3 NTFS
.
scanning hidden processes ...
.
scanning hidden autostart entries ...
.
HKLM\Software\Microsoft\Windows\CurrentVersion\Run
CTxfiHlp = CTXFIHLP.EXE?
CTHelper = CTHELPER.EXE?
.
scanning hidden files ...
.
scan completed successfully
hidden files: 0
.
**************************************************************************
.
--------------------- LOCKED REGISTRY KEYS ---------------------
.
[HKEY_USERS\S-1-5-21-57989841-1993962763-682003330-1004\Software\SecuROM\!CAUTION! NEVER A OR CHANGE ANY KEY*]
"??"=hex:84,77,72,c2,05,70,02,47,2d,80,1d,75,04,6a,1e,80,46,7c,fd,4b,26,a2,6a,
60,96,02,f7,2c,64,e5,a1,e2,cf,ad,c6,a2,bf,80,23,e5,eb,81,8f,5f,ef,b5,43,61,\
"??"=hex:6e,0a,b8,19,e7,17,68,c3,f9,f3,e2,72,da,cc,28,6b
.
[HKEY_USERS\S-1-5-21-57989841-1993962763-682003330-1004\Software\SecuROM\License information*]
"datasecu"=hex:74,f2,00,03,7d,87,46,73,76,a5,df,08,be,ea,43,b6,1e,e6,e5,c7,f7,
e2,1c,fa,80,10,7c,cc,60,1b,57,f4,4a,ec,32,be,06,35,2c,dd,3d,c2,f9,88,9f,ed,\
"rkeysecu"=hex:cb,bd,f2,61,5a,4e,c6,95,f2,29,8b,82,ba,6b,3d,44
.
[HKEY_LOCAL_MACHINE\software\Microsoft\Windows\CurrentVersion\Installer\UserData\LocalSystem\Components\ؕ||A~*]
"91A14B995DF7C0B42ABAA16065968F3A"="f:\\Program Files\\Alias\\Maya7.0\\presets\\Ashli\\"
.
--------------------- DLLs Loaded Under Running Processes ---------------------
.
- - - - - - - > 'winlogon.exe'(1068)
f:\windows\system32\Ati2evxx.dll
.
- - - - - - - > 'explorer.exe'(1804)
f:\windows\system32\WININET.dll
f:\program files\McAfee\SiteAdvisor\saHook.dll
f:\program files\Windows Desktop Search\deskbar.dll
f:\program files\Windows Desktop Search\en-us\dbres.dll.mui
f:\program files\Windows Desktop Search\dbres.dll
f:\program files\Windows Desktop Search\wordwheel.dll
f:\program files\Windows Desktop Search\en-us\msnlExtRes.dll.mui
f:\program files\Windows Desktop Search\msnlExtRes.dll
f:\windows\system32\ieframe.dll
f:\windows\system32\webcheck.dll
f:\windows\system32\WPDShServiceObj.dll
f:\windows\system32\PortableDeviceTypes.dll
f:\windows\system32\PortableDeviceApi.dll
.
------------------------ Other Running Processes ------------------------
.
f:\windows\system32\Ati2evxx.exe
f:\windows\system32\Ati2evxx.exe
f:\program files\Creative\Shared Files\CTAudSvc.exe
f:\program files\Java\jre6\bin\jqs.exe
f:\program files\Alias\Maya7.0\docs\wrapper.exe
f:\windows\system32\MsPMSPSv.exe
f:\program files\Common Files\McAfee\SystemCore\mcshield.exe
f:\windows\system32\SearchIndexer.exe
f:\program files\Alias\Maya7.0\docs\jre\bin\java.exe
f:\windows\SOUNDMAN.EXE
f:\program files\ATI Technologies\ATI.ACE\Core-Static\MOM.exe
f:\program files\Common Files\Nero\Lib\NMIndexingService.exe
f:\program files\ATI Technologies\ATI.ACE\Core-Static\ccc.exe
f:\windows\system32\SearchProtocolHost.exe
f:\windows\system32\SearchFilterHost.exe
.
**************************************************************************
.
Completion time: 2012-01-21 16:42:15 - machine was rebooted
ComboFix-quarantined-files.txt 2012-01-21 22:42
.
Pre-Run: 195,155,316,736 bytes free
Post-Run: 197,077,512,192 bytes free
.
WindowsXP-KB310994-SP2-Home-BootDisk-ENU.exe
[boot loader]
timeout=2
default=multi(0)disk(0)rdisk(0)partition(1)\WINDOWS
[operating systems]
c:\cmdcons\BOOTSECT.DAT="Microsoft Windows Recovery Console" /cmdcons
UnsupportedDebug="do not select this" /debug
multi(0)disk(0)rdisk(0)partition(1)\WINDOWS="Microsoft Windows XP Home Edition" /noexecute=optin /fastdetect
.
- - End Of File - - DF639B0EE957ED7D5CAEC314E1BB9529

Attached Files

  • Attached File  log.txt   15.57KB   0 downloads


#4 RPMcMurphy

RPMcMurphy

    Bleeping *^#@%~


  • Malware Response Team
  • 3,970 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:09:18 AM

Posted 21 January 2012 - 07:12 PM

Hi,

That was a good start, but we still have work to do. Please do this next:

Posted Image Please download Junction.zip and save it.
  • Unzip it and put junction.exe in the Windows directory (C:\Windows).
  • Go to Start > Run or press the Windows key + r Copy and paste the following command in the run box and click OK:

    cmd /c junction -s c:\ >log.txt&log.txt& del log.txt
  • A command window opens starting to scan the system. Wait until a log file opens. Copy and paste or attach the content of it.
Posted Image You have this program installed, Malwarebytes' Anti-Malware (MBAM). Please update it and run a scan.

Open MBAM
  • Click the Update tab
  • Click Check for Updates
  • If an update is found, it will download and install the latest version.
  • The program will close to update and reopen.
  • Once the program has loaded, select "Perform Full Scan", then click Scan.
  • The scan may take some time to finish,so please be patient.
  • When the scan is complete, click OK, then Show Results to view the results.
  • Uncheck any entries from C:\System Volume Information or C:\Qoobox
  • Make sure that everything else is checked, and click Remove Selected.
  • When disinfection is completed, a log will open in Notepad and you may be prompted to Restart.(See Extra Note)
  • The log is automatically saved by MBAM and can be viewed by clicking the Logs tab in MBAM.
  • Copy&Paste the entire report in your next reply.
Extra Note:
If MBAM encounters a file that is difficult to remove,you will be presented with 1 of 2 prompts,click OK to either and let MBAM proceed with the disinfection process,if asked to restart the computer,please do so immediately.

Please include the following in your next post:
  • Junction log
  • MBAM log

Threads are closed after 5 days of inactivity.

ASAP & UNITE Member


The help you receive here is free. If you wish to show your appreciation, then you may btn_donate_SM.gif


#5 snowcat22

snowcat22
  • Topic Starter

  • Members
  • 5 posts
  • OFFLINE
  •  
  • Local time:07:18 AM

Posted 22 January 2012 - 11:16 AM

OK, here we go. It wouldn't let me run chkdsk before, and it suddenly worked. So I hope it was OK to do, it ran after the junction and MBAM logs.

Ken




Junction v1.06 - Windows junction creator and reparse point viewer
Copyright © 2000-2010 Mark Russinovich
Sysinternals - www.sysinternals.com


Failed to open \\?\f:\\pagefile.sys: The process cannot access the file because it is being used by another process.


...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

..
Failed to open \\?\f:\\Documents and Settings\NetworkService\Cookies\3PSVI3BX.txt: The file or directory is corrupted and unreadable.



Failed to open \\?\f:\\Documents and Settings\NetworkService\Cookies\57IPXBN3.txt: The file or directory is corrupted and unreadable.



Failed to open \\?\f:\\Documents and Settings\NetworkService\Cookies\6JOXDR3R.txt: The file or directory is corrupted and unreadable.



Failed to open \\?\f:\\Documents and Settings\NetworkService\Cookies\9W2BYOR6.txt: The file or directory is corrupted and unreadable.



Failed to open \\?\f:\\Documents and Settings\NetworkService\Cookies\DRZ8LE7Q.txt: The file or directory is corrupted and unreadable.



Failed to open \\?\f:\\Documents and Settings\NetworkService\Cookies\HYIY0W1L.txt: The file or directory is corrupted and unreadable.



Failed to open \\?\f:\\Documents and Settings\NetworkService\Cookies\JJ11JWYS.txt: The file or directory is corrupted and unreadable.



Failed to open \\?\f:\\Documents and Settings\NetworkService\Cookies\MAGXE5OR.txt: The file or directory is corrupted and unreadable.



Failed to open \\?\f:\\Documents and Settings\NetworkService\Cookies\VNY3VKFN.txt: The file or directory is corrupted and unreadable.



Failed to open \\?\f:\\Documents and Settings\NetworkService\Cookies\YLKFN0KF.txt: The file or directory is corrupted and unreadable.


.
Failed to open \\?\f:\\Documents and Settings\NetworkService\Local Settings\Temporary Internet Files\Content.IE5\CJNPZQ32\b_blue-square-media_com[7]: The file or directory is corrupted and unreadable.



Failed to open \\?\f:\\Documents and Settings\NetworkService\Local Settings\Temporary Internet Files\Content.IE5\CJNPZQ32\pixel[2]: The file or directory is corrupted and unreadable.



Failed to open \\?\f:\\Documents and Settings\NetworkService\Local Settings\Temporary Internet Files\Content.IE5\FCDLRJ8V\b_blue-square-media_com[2]: The file or directory is corrupted and unreadable.



Failed to open \\?\f:\\Documents and Settings\NetworkService\Local Settings\Temporary Internet Files\Content.IE5\HOSPNTY3\ros[1]: The file or directory is corrupted and unreadable.



Failed to open \\?\f:\\Documents and Settings\NetworkService\Local Settings\Temporary Internet Files\Content.IE5\PA4PTBAP\collect[1]: The file or directory is corrupted and unreadable.



Failed to open \\?\f:\\Documents and Settings\NetworkService\Local Settings\Temporary Internet Files\Content.IE5\ZEK2XQMU\fpi[2].htm: The file or directory is corrupted and unreadable.



Failed to open \\?\f:\\Documents and Settings\NetworkService\Local Settings\Temporary Internet Files\Content.IE5\ZEK2XQMU\Homepage;dcopt=ist;tile=1;sz=728x90;ord=2609020246[1]: The file or directory is corrupted and unreadable.




...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...
Failed to open \\?\f:\\Qoobox\BackEnv: Access is denied.




...

...

...

...

...

...

...

...

\\?\f:\\WINDOWS\assembly\GAC_32\System.EnterpriseServices\2.0.0.0__b03f5f7f11d50a3a: JUNCTION
Print Name : F:\WINDOWS\WinSxS\x86_System.EnterpriseServices_b03f5f7f11d50a3a_2.0.0.0_x-ww_7d5f3790
Substitute Name: F:\WINDOWS\WinSxS\x86_System.EnterpriseServices_b03f5f7f11d50a3a_2.0.0.0_x-ww_7d5f3790

.\\?\f:\\WINDOWS\assembly\GAC_MSIL\CCC\2.0.0.0__90ba9c70f846762e: JUNCTION
Print Name : F:\WINDOWS\WinSxS\MSIL_CCC_90ba9c70f846762e_2.0.0.0_x-ww_c7ed2bb0
Substitute Name: F:\WINDOWS\WinSxS\MSIL_CCC_90ba9c70f846762e_2.0.0.0_x-ww_c7ed2bb0

\\?\f:\\WINDOWS\assembly\GAC_MSIL\CLI\2.0.0.0__90ba9c70f846762e: JUNCTION
Print Name : F:\WINDOWS\WinSxS\MSIL_CLI_90ba9c70f846762e_2.0.0.0_x-ww_42656733
Substitute Name: F:\WINDOWS\WinSxS\MSIL_CLI_90ba9c70f846762e_2.0.0.0_x-ww_42656733

\\?\f:\\WINDOWS\assembly\GAC_MSIL\IEExecRemote\2.0.0.0__b03f5f7f11d50a3a: JUNCTION
Print Name : F:\WINDOWS\WinSxS\MSIL_IEExecRemote_b03f5f7f11d50a3a_2.0.0.0_x-ww_6e57c34e
Substitute Name: F:\WINDOWS\WinSxS\MSIL_IEExecRemote_b03f5f7f11d50a3a_2.0.0.0_x-ww_6e57c34e

\\?\f:\\WINDOWS\assembly\GAC_MSIL\LOG\2.0.3693.42530__90ba9c70f846762e: JUNCTION
Print Name : F:\WINDOWS\WinSxS\MSIL_LOG_90ba9c70f846762e_2.0.3693.42530_x-ww_47e32df4
Substitute Name: F:\WINDOWS\WinSxS\MSIL_LOG_90ba9c70f846762e_2.0.3693.42530_x-ww_47e32df4

.\\?\f:\\WINDOWS\assembly\GAC_MSIL\MOM\2.0.0.0__90ba9c70f846762e: JUNCTION
Print Name : F:\WINDOWS\WinSxS\MSIL_MOM_90ba9c70f846762e_2.0.0.0_x-ww_a60193a8
Substitute Name: F:\WINDOWS\WinSxS\MSIL_MOM_90ba9c70f846762e_2.0.0.0_x-ww_a60193a8

.

...

...

...

...

...

...

...

...

...

...

...

.
Failed to open \\?\f:\\WINDOWS\Temp\hsperfdata_SYSTEM\784: Access is denied.


..


Malwarebytes Anti-Malware 1.60.0.1800
www.malwarebytes.org

Database version: v2012.01.22.01

Windows XP Service Pack 3 x86 NTFS
Internet Explorer 8.0.6001.18702
Ken :: MARION [administrator]

1/21/2012 7:59:46 PM
mbam-log-2012-01-21 (19-59-46).txt

Scan type: Full scan
Scan options enabled: Memory | Startup | Registry | File System | Heuristics/Extra | Heuristics/Shuriken | PUP | PUM
Scan options disabled: P2P
Objects scanned: 458978
Time elapsed: 5 hour(s), 54 minute(s), 26 second(s)

Memory Processes Detected: 0
(No malicious items detected)

Memory Modules Detected: 0
(No malicious items detected)

Registry Keys Detected: 0
(No malicious items detected)

Registry Values Detected: 0
(No malicious items detected)

Registry Data Items Detected: 0
(No malicious items detected)

Folders Detected: 0
(No malicious items detected)

Files Detected: 0
(No malicious items detected)

(end)

#6 RPMcMurphy

RPMcMurphy

    Bleeping *^#@%~


  • Malware Response Team
  • 3,970 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:09:18 AM

Posted 22 January 2012 - 11:59 AM

snowcat22

How is your computer running now? Please do this next:

Posted Image Your Java is out of date. Older versions have vulnerabilities that malware can use to infect your system.
Please follow these steps to remove older version Java components and update.
  • Go to Start > Settings > Control Panel, double-click on Add/Remove Programs and remove all older versions of Java.
  • Check (highlight) any item with Java Runtime Environment (JRE or J2SE or Java™ 6) in the name.
  • Click the Remove or Change/Remove button.
  • Repeat as many times as necessary to remove each Java version.
  • Reboot your computer once all Java components are removed.
  • Go to this page to download the latest version. Press the download button under JRE and follow the prompts. Accept the agreement and choose the Windows x86 offline option.
  • Run the insatller you just downloaded
Posted Image Please go to here to run an online scan with ESET.
    • Turn off the real time scanner of any existing antivirus program while performing the online scan
    • Tick the box next to YES, I accept the Terms of Use.
    • Click Start
    • When asked, allow the activex control to install
    • Click Start
    • Make sure that the option Remove found threats is unticked, and the option Scan unwanted applications is checked
    • Click on Advanced Settings and ensure these options are ticked:
    • Scan for potentially unwanted applications
    • Scan for potentially unsafe applications
    • Enable Anti-Stealth Technology
  • Click Scan
  • Wait for the scan to finish
  • If any threats were found, click the 'List of found threats' , then click Export to text file....
  • Save it to your desktop, then please copy and paste that log as a reply to this topic.
Please include the following in your next post:
  • How is the computer running now?
  • ESET log

Threads are closed after 5 days of inactivity.

ASAP & UNITE Member


The help you receive here is free. If you wish to show your appreciation, then you may btn_donate_SM.gif


#7 snowcat22

snowcat22
  • Topic Starter

  • Members
  • 5 posts
  • OFFLINE
  •  
  • Local time:07:18 AM

Posted 22 January 2012 - 04:16 PM

The computer has been running MUCH better since ComboFix. I didn't realize how bad it actually was, even with ping.exe not running.

Found another one though :(



F:\System Volume Information\_restore{C4B841D3-FC12-401E-A2B6-3CCC2D8E97A6}\RP9\A0013754.dll Win32/Sirefef.DA trojan

#8 RPMcMurphy

RPMcMurphy

    Bleeping *^#@%~


  • Malware Response Team
  • 3,970 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:09:18 AM

Posted 22 January 2012 - 04:21 PM

snowcat22

That one is nothing to worry about - it's in your system restore cache and will be removed when we uninstall ComboFix. All I have left for you is some very important cleanup:

Posted Image Your Adobe reader needs to be updated. Please visit Adobe's site and grab the newest version. Be sure to watch for and uncheck any boxes offering to install other software.

Posted Image Uninstall ComboFix
  • Press the Windows key + R on your keyboard or click Start -> Run. Copy and past the following text into the run box that opens and press OK:
    Combofix /Uninstall
Posted Image

Posted Image Delete the following tools along with any other logs you saved from our work:
  • DDS
  • GMER
  • Junction
Posted Image Download TFC to your desktop
  • Close any open windows.
  • Double click the TFC icon to run the program
  • TFC will close all open programs itself in order to run,
  • Click the Start button to begin the process.
  • Allow TFC to run uninterrupted.
  • The program should not take long to finish it's job
  • Once its finished it should automatically reboot your machine,
  • if it doesn't, manually reboot to ensure a complete clean
Posted Image Finally, I'd like to make a couple of suggestions to help you stay clean in the future:
  • Restart any anti-malware programs that we disabled while we were cleaning your machine.
  • Keep your antivirus application and MBAM current and updated. Scan with them at least weekly.
  • Please read this post for some helpful information.
Please post once more so I know you are all set and I can mark this thread resolved. Good luck and stay safe!

Threads are closed after 5 days of inactivity.

ASAP & UNITE Member


The help you receive here is free. If you wish to show your appreciation, then you may btn_donate_SM.gif


#9 snowcat22

snowcat22
  • Topic Starter

  • Members
  • 5 posts
  • OFFLINE
  •  
  • Local time:07:18 AM

Posted 22 January 2012 - 05:21 PM

Thank you for your help, I greatly appreciate it!

Everything seems good!

Ken

#10 RPMcMurphy

RPMcMurphy

    Bleeping *^#@%~


  • Malware Response Team
  • 3,970 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:09:18 AM

Posted 22 January 2012 - 05:28 PM

You're welcome, Ken. Take care.

Threads are closed after 5 days of inactivity.

ASAP & UNITE Member


The help you receive here is free. If you wish to show your appreciation, then you may btn_donate_SM.gif


#11 RPMcMurphy

RPMcMurphy

    Bleeping *^#@%~


  • Malware Response Team
  • 3,970 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:09:18 AM

Posted 23 January 2012 - 05:38 PM

It appears that this issue is resolved, therefore I am closing the topic. If that is not the case and you need or wish to continue with this topic, please send me or any Moderator a Personal Message (PM) that you would like this topic re-opened.

Threads are closed after 5 days of inactivity.

ASAP & UNITE Member


The help you receive here is free. If you wish to show your appreciation, then you may btn_donate_SM.gif





0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users