Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Win32:Patched-ADQ [Trj]


  • This topic is locked This topic is locked
17 replies to this topic

#1 HarriJames

HarriJames

  • Members
  • 10 posts
  • OFFLINE
  •  
  • Local time:05:30 AM

Posted 23 February 2012 - 11:25 AM

.
DDS (Ver_2011-08-26.01) - NTFSx86
Internet Explorer: 6.0.2900.2180 BrowserJavaVersion: 1.6.0_27
Run by LORI at 22:22:38 on 2012-02-22
Microsoft Windows XP Home Edition 5.1.2600.2.1252.1.1033.18.1471.947 [GMT -8:00]
.
AV: avast! Antivirus *Enabled/Updated* {7591DB91-41F0-48A3-B128-1A293FD8233D}
.
============== Running Processes ===============
.
C:\WINDOWS\system32\svchost.exe -k DcomLaunch
svchost.exe
C:\WINDOWS\System32\svchost.exe -k netsvcs
svchost.exe
svchost.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\AVAST Software\Avast\AvastSvc.exe
C:\Program Files\AVAST Software\Avast\avastUI.exe
C:\Program Files\Malwarebytes' Anti-Malware\mbamgui.exe
C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
C:\WINDOWS\system32\ctfmon.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Java\jre6\bin\jqs.exe
C:\Program Files\Common Files\LightScribe\LSSrvc.exe
C:\Program Files\Malwarebytes' Anti-Malware\mbamservice.exe
C:\WINDOWS\system32\wuauclt.exe
.
============== Pseudo HJT Report ===============
.
uStart Page = hxxp://google.com/
uInternet Connection Wizard,ShellNext = iexplore
uInternet Settings,ProxyOverride = <local>
uSearchAssistant = hxxp://www.google.com/ie
uSearchURL,(Default) = hxxp://www.google.com/search?q=%s
BHO: AcroIEHlprObj Class: {06849e9f-c8d7-4d59-b87d-784b7d6be0b3} - c:\program files\adobe\acrobat 6.0\acrobat\activex\AcroIEHelper.dll
BHO: AVG Safe Search: {3ca2f312-6f6e-4b53-a66e-4e65e497c8c0} - c:\program files\avg\avg9\avgssie.dll
BHO: Spybot-S&D IE Protection: {53707962-6f74-2d53-2644-206d7942484f} - c:\progra~1\spybot~1\SDHelper.dll
BHO: {5C255C8A-E604-49b4-9D64-90988571CECB} - No File
BHO: Groove GFS Browser Helper: {72853161-30c5-4d22-b7f9-0bbc1d38a37e} - c:\progra~1\micros~3\office12\GRA8E1~1.DLL
BHO: Windows Live Sign-in Helper: {9030d464-4c02-4abf-8ecc-5164760863c6} - c:\program files\common files\microsoft shared\windows live\WindowsLiveLogin.dll
BHO: AcroIEToolbarHelper Class: {ae7cd045-e861-484f-8273-0445ee161910} - c:\program files\adobe\acrobat 6.0\acrobat\AcroIEFavClient.dll
BHO: Java™ Plug-In 2 SSV Helper: {dbc80044-a445-435b-bc74-9c25c1c588a9} - c:\program files\java\jre6\bin\jp2ssv.dll
BHO: JQSIEStartDetectorImpl Class: {e7e6f031-17ce-4c07-bc86-eabfe594f69c} - c:\program files\java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll
TB: Adobe PDF: {47833539-d0c5-4125-9fa8-0819e2eaac93} - c:\program files\adobe\acrobat 6.0\acrobat\AcroIEFavClient.dll
uRun: [SpybotSD TeaTimer] c:\program files\spybot - search & destroy\TeaTimer.exe
uRun: [ctfmon.exe] c:\windows\system32\ctfmon.exe
mRun: [avast] "c:\program files\avast software\avast\avastUI.exe" /nogui
mRun: [Malwarebytes' Anti-Malware] "c:\program files\malwarebytes' anti-malware\mbamgui.exe" /starttray
IE: E&xport to Microsoft Excel - c:\progra~1\micros~3\office12\EXCEL.EXE/3000
IE: Google Sidewiki... - c:\program files\google\google toolbar\component\GoogleToolbarDynamic_mui_en_D183CA64F05FDD98.dll/cmsidewiki.html
IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe
IE: {2670000A-7350-4f3c-8081-5663EE0C6C49} - {48E73304-E1D6-4330-914C-F5F514E3486C} - c:\progra~1\micros~3\office12\ONBttnIE.dll
IE: {92780B25-18CC-41C8-B9BE-3C9C571A8263} - {FF059E31-CC5A-4E2E-BF3B-96E929D65503} - c:\progra~1\micros~3\office12\REFIEBAR.DLL
IE: {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - {53707962-6F74-2D53-2644-206D7942484F} - c:\progra~1\spybot~1\SDHelper.dll
DPF: {6F15128C-E66A-490C-B848-5000B5ABEEAC} - hxxps://h20436.www2.hp.com/ediags/dex/secure/HPDEXAXO.cab
DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} - hxxp://download.macromedia.com/pub/shockwave/cabs/flash/swflash.cab
DPF: {E2883E8F-472F-4FB0-9522-AC9BF37916A7} - hxxp://platformdl.adobe.com/NOS/getPlusPlus/1.6/gp.cab
TCP: DhcpNameServer = 192.168.1.1
TCP: Interfaces\{E5CC911A-AAB5-4D22-A6C2-6E371D2F4E31} : DhcpNameServer = 192.168.1.1
Handler: grooveLocalGWS - {88FED34C-F0CA-4636-A375-3CB6248B04CD} - c:\progra~1\micros~3\office12\GR99D3~1.DLL
SEH: Groove GFS Stub Execution Hook: {b5a7f190-dda6-4420-b3ba-52453494e6cd} - c:\progra~1\micros~3\office12\GRA8E1~1.DLL
.
================= FIREFOX ===================
.
FF - ProfilePath - c:\documents and settings\lori\application data\mozilla\firefox\profiles\40pxd4n0.default\
FF - prefs.js: browser.startup.homepage - hxxp://google.com/
FF - prefs.js: network.proxy.http - 127.0.0.1
FF - prefs.js: network.proxy.http_port - 5555
FF - prefs.js: network.proxy.type - 0
.
============= SERVICES / DRIVERS ===============
.
R1 aswSnx;aswSnx;c:\windows\system32\drivers\aswSnx.sys [2012-2-9 435032]
R1 aswSP;aswSP;c:\windows\system32\drivers\aswSP.sys [2012-2-9 314456]
R2 aswFsBlk;aswFsBlk;c:\windows\system32\drivers\aswFsBlk.sys [2012-2-9 20568]
R2 avast! Antivirus;avast! Antivirus;c:\program files\avast software\avast\AvastSvc.exe [2012-2-9 44768]
R2 MBAMService;MBAMService;c:\program files\malwarebytes' anti-malware\mbamservice.exe [2012-2-10 652360]
R3 MBAMProtector;MBAMProtector;c:\windows\system32\drivers\mbam.sys [2012-2-10 20464]
S2 gupdate;Google Update Service (gupdate);c:\program files\google\update\GoogleUpdate.exe [2010-2-6 135664]
S3 gupdatem;Google Update Service (gupdatem);c:\program files\google\update\GoogleUpdate.exe [2010-2-6 135664]
.
=============== Created Last 30 ================
.
2012-02-23 05:13:05 831 ----a-w- c:\documents and settings\all users\application data\xxlnaaa.tmp
2012-02-23 05:11:59 830 ----a-w- c:\documents and settings\all users\application data\wxlnaaa.tmp
2012-02-23 04:53:02 870 ----a-w- c:\documents and settings\all users\application data\aylnaaa.tmp
2012-02-23 04:31:41 821 ----a-w- c:\documents and settings\all users\application data\yxlnaaa.tmp
2012-02-23 04:30:58 835 ----a-w- c:\documents and settings\all users\application data\zxlnaaa.tmp
2012-02-23 04:19:47 -------- d-----w- C:\ComboFix
2012-02-22 23:35:26 -------- d-sha-r- C:\cmdcons
2012-02-22 23:33:14 98816 ----a-w- c:\windows\sed.exe
2012-02-22 23:33:14 518144 ----a-w- c:\windows\SWREG.exe
2012-02-22 23:33:14 256000 ----a-w- c:\windows\PEV.exe
2012-02-22 23:33:14 208896 ----a-w- c:\windows\MBR.exe
2012-02-20 16:50:29 278528 ----a-w- c:\windows\system32\hpdj5600
2012-02-10 16:16:46 -------- d-----w- c:\documents and settings\lori\application data\Malwarebytes
2012-02-10 16:16:34 -------- d-----w- c:\documents and settings\all users\application data\Malwarebytes
2012-02-10 16:16:31 20464 ----a-w- c:\windows\system32\drivers\mbam.sys
2012-02-10 16:16:29 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
2012-02-10 00:59:12 435032 ----a-w- c:\windows\system32\drivers\aswSnx.sys
2012-02-10 00:58:54 41184 ----a-w- c:\windows\avastSS.scr
2012-02-10 00:58:40 -------- d-----w- c:\program files\AVAST Software
2012-02-10 00:58:40 -------- d-----w- c:\documents and settings\all users\application data\AVAST Software
2012-02-09 21:41:05 -------- d-----w- c:\program files\Support Tools
.
==================== Find3M ====================
.
2011-06-20 01:21:34 8192 ----a-w- c:\program files\SpyFlushregTemp.reg
.
============= FINISH: 22:26:02.57 ===============

Attached Files



BC AdBot (Login to Remove)

 


#2 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:06:30 AM

Posted 24 February 2012 - 02:08 AM

Hello and Welcome to the forums!

My name is Gringo and I'll be glad to help you with your computer problems.

Somethings to remember while we are working together.

  • Do not run any other tool untill instructed to do so!
  • please Do not Attach logs or put in code boxes.
  • Tell me about any problems that have occurred during the fix.
  • Tell me of any other symptoms you may be having as these can help also.
  • Do not run anything while running a fix.
  • Do not run any other tool untill instructed to do so!


Click on the Watch Topic Button and select Immediate Notification and click on proceed, this will help you to get notified faster when I have replied and make the cleaning process faster.

Please print out or make a copy in notpad of any instructions given, as sometimes it is necessary to go offline and you will lose access to them.

Run Combofix:

You may be asked to install or update the Recovery Console (Win XP Only) if this happens please allow it to do so (you will need to be connected to the internet for this)

Before you run Combofix I will need you to turn off any security software you have running, If you do not know how to do this you can find out >here< or >here<

Combofix may need to reboot your computer more than once to do its job this is normal.

You can download Combofix from one of these links.
Link 1
Link 2
Link 3
1. Close any open browsers or any other programs that are open.
2. Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.

Double click on combofix.exe & follow the prompts.
When finished, it will produce a report for you.

Note 1: Do not mouseclick combofix's window while it's running. That may cause it to stall

Note 2: If you recieve an error "Illegal operation attempted on a registery key that has been marked for deletion." Please restart the computer

"information and logs"

  • In your next post I need the following
  • Log from Combofix
  • let me know of any problems you may have had
  • How is the computer doing now?

Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#3 HarriJames

HarriJames
  • Topic Starter

  • Members
  • 10 posts
  • OFFLINE
  •  
  • Local time:05:30 AM

Posted 24 February 2012 - 12:09 PM

ComboFix 12-02-22.01 - LORI 02/24/2012 8:43.4.1 - x86
Microsoft Windows XP Home Edition 5.1.2600.2.1252.1.1033.18.1471.898 [GMT -8:00]
Running from: c:\documents and settings\LORI\Desktop\ComboFix.exe
AV: avast! Antivirus *Disabled/Updated* {7591DB91-41F0-48A3-B128-1A293FD8233D}
.
.
((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.
.
c:\documents and settings\All Users\Application Data\aylnaaa.tmp
c:\documents and settings\All Users\Application Data\glnnaaa.tmp
c:\documents and settings\All Users\Application Data\hlnnaaa.tmp
c:\documents and settings\All Users\Application Data\ilnnaaa.tmp
c:\documents and settings\All Users\Application Data\jlnnaaa.tmp
c:\documents and settings\All Users\Application Data\klnnaaa.tmp
c:\documents and settings\All Users\Application Data\ujhnaaa.tmp
c:\documents and settings\All Users\Application Data\yxlnaaa.tmp
c:\documents and settings\All Users\Application Data\zxlnaaa.tmp
c:\windows\TEMP\MPENGINE.DLL
c:\windows\TEMP\offreg.dll
c:\windows\WindowsUpdate.log
.
c:\windows\system32\winlogon.exe . . . is infected!!
.
c:\windows\system32\svchost.exe . . . is infected!!
.
c:\windows\explorer.exe . . . is infected!!
.
.
((((((((((((((((((((((((( Files Created from 2012-01-24 to 2012-02-24 )))))))))))))))))))))))))))))))
.
.
2012-02-20 16:50 . 2006-01-13 07:14 278528 ----a-w- c:\windows\system32\hpdj5600
2012-02-10 16:16 . 2012-02-10 16:16 -------- d-----w- c:\documents and settings\LORI\Application Data\Malwarebytes
2012-02-10 16:16 . 2012-02-10 16:16 -------- d-----w- c:\documents and settings\All Users\Application Data\Malwarebytes
2012-02-10 16:16 . 2011-12-10 23:24 20464 ----a-w- c:\windows\system32\drivers\mbam.sys
2012-02-10 16:16 . 2012-02-10 16:16 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
2012-02-10 00:59 . 2011-11-28 17:53 314456 ----a-w- c:\windows\system32\drivers\aswSP.sys
2012-02-10 00:59 . 2011-11-28 17:51 20568 ----a-w- c:\windows\system32\drivers\aswFsBlk.sys
2012-02-10 00:59 . 2011-11-28 17:53 435032 ----a-w- c:\windows\system32\drivers\aswSnx.sys
2012-02-10 00:59 . 2011-11-28 17:52 34392 ----a-w- c:\windows\system32\drivers\aswRdr.sys
2012-02-10 00:59 . 2011-11-28 17:52 52952 ----a-w- c:\windows\system32\drivers\aswTdi.sys
2012-02-10 00:59 . 2011-11-28 17:52 111320 ----a-w- c:\windows\system32\drivers\aswmon2.sys
2012-02-10 00:59 . 2011-11-28 17:51 105176 ----a-w- c:\windows\system32\drivers\aswmon.sys
2012-02-10 00:59 . 2011-11-28 17:48 30808 ----a-w- c:\windows\system32\drivers\aavmker4.sys
2012-02-10 00:58 . 2011-11-28 18:01 41184 ----a-w- c:\windows\avastSS.scr
2012-02-10 00:58 . 2011-11-28 18:01 199816 ----a-w- c:\windows\system32\aswBoot.exe
2012-02-10 00:58 . 2012-02-10 00:58 -------- d-----w- c:\program files\AVAST Software
2012-02-10 00:58 . 2012-02-10 00:58 -------- d-----w- c:\documents and settings\All Users\Application Data\AVAST Software
2012-02-09 22:18 . 2012-02-09 22:18 -------- d-----w- c:\documents and settings\Administrator\Local Settings\Application Data\Mozilla
2012-02-09 21:41 . 2012-02-09 21:41 -------- d-----w- c:\program files\Support Tools
.
.
.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2011-06-20 01:21 . 2010-03-12 00:01 8192 ----a-w- c:\program files\SpyFlushregTemp.reg
2011-12-01 20:10 . 2011-06-23 19:15 134104 ----a-w- c:\program files\mozilla firefox\components\browsercomps.dll
.
.
------- Sigcheck -------
Note: Unsigned files aren't necessarily malware.
.
[-] 2008-04-14 . ED0EF0A136DEC83DF69F04118870003E . 507904 . . [5.1.2600.5512] . . c:\windows\SoftwareDistribution\Download\9866fb57abdc0ea2f5d4e132d055ba4e\winlogon.exe
[-] 2004-08-04 . 400CA070C49E6007476A335C930E8428 . 539136 . . [5.1.2600.2180] . . c:\windows\system32\winlogon.exe
.
[-] 2008-04-14 . 27C6D03BCDB8CFEB96B716F3D8BE3E18 . 14336 . . [5.1.2600.5512] . . c:\windows\SoftwareDistribution\Download\9866fb57abdc0ea2f5d4e132d055ba4e\svchost.exe
[-] 2004-08-04 . 6EDC3D4644CDB50CCE75107EFA040816 . 39424 . . [5.1.2600.2180] . . c:\windows\system32\svchost.exe
.
[-] 2008-04-14 . 12896823FB95BFB3DC9B46BCAEDC9923 . 1033728 . . [6.00.2900.5512] . . c:\windows\SoftwareDistribution\Download\9866fb57abdc0ea2f5d4e132d055ba4e\explorer.exe
[7] 2007-06-13 . 7712DF0CDDE3A5AC89843E61CD5B3658 . 1033216 . . [6.00.2900.3156] . . c:\windows\SoftwareDistribution\Download\44d74c37f0595a363bcec5e9229d8564\sp2qfe\explorer.exe
[7] 2007-06-13 . 97BD6515465659FF8F3B7BE375B2EA87 . 1033216 . . [6.00.2900.3156] . . c:\windows\SoftwareDistribution\Download\44d74c37f0595a363bcec5e9229d8564\sp2gdr\explorer.exe
[-] 2004-08-04 . 4AD1CF7C9B775CD8C3040D96B00AA3C2 . 1057280 . . [6.00.2900.2180] . . c:\windows\explorer.exe
.
((((((((((((((((((((((((((((( SnapShot@2012-02-22_23.47.59 )))))))))))))))))))))))))))))))))))))))))
.
+ 2012-02-24 16:55 . 2012-02-24 16:55 16384 c:\windows\Temp\Perflib_Perfdata_66c.dat
+ 2012-02-24 16:28 . 2012-02-24 16:28 16384 c:\windows\Temp\Perflib_Perfdata_42c.dat
+ 2012-02-24 16:41 . 2012-02-24 16:42 32768 c:\windows\system32\config\systemprofile\Local Settings\History\History.IE5\MSHist012012022420120225\index.dat
+ 2012-02-23 04:12 . 2012-02-23 07:02 65536 c:\windows\system32\config\systemprofile\Local Settings\History\History.IE5\MSHist012012022220120223\index.dat
+ 2012-02-23 04:12 . 2012-02-23 04:12 81920 c:\windows\system32\config\systemprofile\Local Settings\History\History.IE5\MSHist012012021320120220\index.dat
+ 2012-02-23 04:11 . 2012-02-24 16:41 16384 c:\windows\system32\config\systemprofile\Cookies\index.dat
+ 2010-02-18 20:31 . 2012-02-24 01:11 35088 c:\windows\Installer\{90120000-0030-0000-0000-0000000FF1CE}\oisicon.exe
- 2010-02-18 20:31 . 2011-04-11 03:06 35088 c:\windows\Installer\{90120000-0030-0000-0000-0000000FF1CE}\oisicon.exe
- 2010-02-18 20:31 . 2011-04-11 03:06 18704 c:\windows\Installer\{90120000-0030-0000-0000-0000000FF1CE}\mspicons.exe
+ 2010-02-18 20:31 . 2012-02-24 01:11 18704 c:\windows\Installer\{90120000-0030-0000-0000-0000000FF1CE}\mspicons.exe
- 2010-02-18 20:31 . 2011-04-11 03:06 20240 c:\windows\Installer\{90120000-0030-0000-0000-0000000FF1CE}\cagicon.exe
+ 2010-02-18 20:31 . 2012-02-24 01:11 20240 c:\windows\Installer\{90120000-0030-0000-0000-0000000FF1CE}\cagicon.exe
- 2010-01-31 02:52 . 2012-02-17 00:11 131072 c:\windows\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\index.dat
+ 2010-01-31 02:52 . 2012-02-24 16:41 131072 c:\windows\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\index.dat
+ 2012-02-23 08:24 . 2012-02-24 01:12 245760 c:\windows\system32\config\systemprofile\Local Settings\History\History.IE5\MSHist012012022320120224\index.dat
+ 2010-01-31 02:52 . 2012-02-24 16:41 442368 c:\windows\system32\config\systemprofile\Local Settings\History\History.IE5\index.dat
+ 2010-02-18 20:31 . 2012-02-24 01:11 888080 c:\windows\Installer\{90120000-0030-0000-0000-0000000FF1CE}\wordicon.exe
- 2010-02-18 20:31 . 2011-04-11 03:06 888080 c:\windows\Installer\{90120000-0030-0000-0000-0000000FF1CE}\wordicon.exe
- 2010-02-18 20:31 . 2011-04-11 03:06 272648 c:\windows\Installer\{90120000-0030-0000-0000-0000000FF1CE}\pubs.exe
+ 2010-02-18 20:31 . 2012-02-24 01:11 272648 c:\windows\Installer\{90120000-0030-0000-0000-0000000FF1CE}\pubs.exe
+ 2010-02-18 20:31 . 2012-02-24 01:11 922384 c:\windows\Installer\{90120000-0030-0000-0000-0000000FF1CE}\pptico.exe
- 2010-02-18 20:31 . 2011-04-11 03:06 922384 c:\windows\Installer\{90120000-0030-0000-0000-0000000FF1CE}\pptico.exe
+ 2010-02-18 20:31 . 2012-02-24 01:11 845584 c:\windows\Installer\{90120000-0030-0000-0000-0000000FF1CE}\outicon.exe
- 2010-02-18 20:31 . 2011-04-11 03:06 845584 c:\windows\Installer\{90120000-0030-0000-0000-0000000FF1CE}\outicon.exe
+ 2010-02-18 20:31 . 2012-02-24 01:11 217864 c:\windows\Installer\{90120000-0030-0000-0000-0000000FF1CE}\misc.exe
- 2010-02-18 20:31 . 2011-04-11 03:06 217864 c:\windows\Installer\{90120000-0030-0000-0000-0000000FF1CE}\misc.exe
+ 2010-02-18 20:31 . 2012-02-24 01:11 184080 c:\windows\Installer\{90120000-0030-0000-0000-0000000FF1CE}\joticon.exe
- 2010-02-18 20:31 . 2011-04-11 03:06 184080 c:\windows\Installer\{90120000-0030-0000-0000-0000000FF1CE}\joticon.exe
+ 2010-02-18 20:31 . 2012-02-24 01:11 159504 c:\windows\Installer\{90120000-0030-0000-0000-0000000FF1CE}\inficon.exe
- 2010-02-18 20:31 . 2011-04-11 03:06 159504 c:\windows\Installer\{90120000-0030-0000-0000-0000000FF1CE}\inficon.exe
+ 2012-02-03 23:13 . 2012-02-03 23:13 4988928 c:\windows\Installer\1befcca.msp
- 2010-02-18 20:31 . 2011-04-11 03:06 1172240 c:\windows\Installer\{90120000-0030-0000-0000-0000000FF1CE}\xlicons.exe
+ 2010-02-18 20:31 . 2012-02-24 01:11 1172240 c:\windows\Installer\{90120000-0030-0000-0000-0000000FF1CE}\xlicons.exe
- 2010-02-18 20:31 . 2011-04-11 03:06 1165584 c:\windows\Installer\{90120000-0030-0000-0000-0000000FF1CE}\accicons.exe
+ 2010-02-18 20:31 . 2012-02-24 01:11 1165584 c:\windows\Installer\{90120000-0030-0000-0000-0000000FF1CE}\accicons.exe
+ 2006-09-15 23:25 . 2006-09-15 23:25 3611416 c:\windows\Installer\$PatchCache$\Managed\00002109030000000000000000F01FEC\12.0.4518\OUTLFLTR.DAT
+ 2010-02-08 04:35 . 2012-01-27 07:20 52550552 c:\windows\system32\MRT.exe
.
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shelliconoverlayidentifiers\00avast]
@="{472083B0-C522-11CF-8763-00608CC02F24}"
[HKEY_CLASSES_ROOT\CLSID\{472083B0-C522-11CF-8763-00608CC02F24}]
2011-11-28 18:01 122512 ----a-w- c:\program files\AVAST Software\Avast\ashShell.dll
.
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"SpybotSD TeaTimer"="c:\program files\Spybot - Search & Destroy\TeaTimer.exe" [2009-03-06 2260480]
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"avast"="c:\program files\AVAST Software\Avast\avastUI.exe" [2011-11-28 3744552]
"Malwarebytes' Anti-Malware"="c:\program files\Malwarebytes' Anti-Malware\mbamgui.exe" [2012-01-13 460872]
.
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]
"DisableNotifications"= 1 (0x1)
.
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"c:\\Program Files\\3CXPhone\\3CXPhone.exe"=
"c:\\Documents and Settings\\LORI\\Application Data\\mjusbsp\\magicJack.exe"=
.
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\GloballyOpenPorts\List]
"21438:TCP"= 21438:TCP:BitComet 21438 TCP
"21438:UDP"= 21438:UDP:BitComet 21438 UDP
.
R1 aswSnx;aswSnx;c:\windows\system32\drivers\aswSnx.sys [2/9/2012 4:59 PM 435032]
R1 aswSP;aswSP;c:\windows\system32\drivers\aswSP.sys [2/9/2012 4:59 PM 314456]
R2 aswFsBlk;aswFsBlk;c:\windows\system32\drivers\aswFsBlk.sys [2/9/2012 4:59 PM 20568]
R2 MBAMService;MBAMService;c:\program files\Malwarebytes' Anti-Malware\mbamservice.exe [2/10/2012 8:16 AM 652360]
R3 MBAMProtector;MBAMProtector;c:\windows\system32\drivers\mbam.sys [2/10/2012 8:16 AM 20464]
S2 gupdate;Google Update Service (gupdate);c:\program files\Google\Update\GoogleUpdate.exe [2/6/2010 9:02 PM 135664]
S3 gupdatem;Google Update Service (gupdatem);c:\program files\Google\Update\GoogleUpdate.exe [2/6/2010 9:02 PM 135664]
S3 pcouffin;VSO Software pcouffin;c:\windows\system32\drivers\pcouffin.sys [4/30/2010 3:26 PM 47360]
S4 sptd;sptd;c:\windows\system32\drivers\sptd.sys [7/7/2010 3:15 PM 697328]
.
Contents of the 'Scheduled Tasks' folder
.
2012-02-24 c:\windows\Tasks\GoogleUpdateTaskMachineCore.job
- c:\program files\Google\Update\GoogleUpdate.exe [2010-02-07 05:02]
.
2012-02-24 c:\windows\Tasks\GoogleUpdateTaskMachineUA.job
- c:\program files\Google\Update\GoogleUpdate.exe [2010-02-07 05:02]
.
.
------- Supplementary Scan -------
.
uStart Page = hxxp://google.com/
uInternet Connection Wizard,ShellNext = iexplore
uInternet Settings,ProxyOverride = <local>
uSearchAssistant = hxxp://www.google.com/ie
uSearchURL,(Default) = hxxp://www.google.com/search?q=%s
IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~3\Office12\EXCEL.EXE/3000
IE: Google Sidewiki... - c:\program files\Google\Google Toolbar\Component\GoogleToolbarDynamic_mui_en_D183CA64F05FDD98.dll/cmsidewiki.html
TCP: DhcpNameServer = 192.168.10.254
FF - ProfilePath - c:\documents and settings\LORI\Application Data\Mozilla\Firefox\Profiles\40pxd4n0.default\
FF - prefs.js: browser.startup.homepage - hxxp://google.com/
FF - prefs.js: network.proxy.http - 127.0.0.1
FF - prefs.js: network.proxy.http_port - 5555
FF - prefs.js: network.proxy.type - 0
.
.
**************************************************************************
.
catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2012-02-24 08:56
Windows 5.1.2600 Service Pack 2 NTFS
.
scanning hidden processes ...
.
scanning hidden autostart entries ...
.
scanning hidden files ...
.
scan completed successfully
hidden files: 0
.
**************************************************************************
.
------------------------ Other Running Processes ------------------------
.
c:\program files\AVAST Software\Avast\AvastSvc.exe
c:\program files\Java\jre6\bin\jqs.exe
c:\program files\Common Files\LightScribe\LSSrvc.exe
c:\windows\system32\wdfmgr.exe
c:\windows\system32\wscntfy.exe
.
**************************************************************************
.
Completion time: 2012-02-24 09:00:25 - machine was rebooted
ComboFix-quarantined-files.txt 2012-02-24 17:00
ComboFix2.txt 2012-02-23 04:33
ComboFix3.txt 2012-02-23 04:18
ComboFix4.txt 2012-02-22 23:51
.
Pre-Run: 144,409,358,336 bytes free
Post-Run: 144,466,911,232 bytes free
.
- - End Of File - - D850504632BD83B8BD8CB0A8D2E29BA0


The First time I ran ComboFix my system randomly rebooted. The computer is running a little bit faster today.

#4 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:06:30 AM

Posted 24 February 2012 - 12:33 PM

SystemLook:

Please download SystemLook from one of the links below and save it to your Desktop.

Download Mirror #1
Download Mirror #2

  • Double-click SystemLook.exe to run it.
  • Copy the content of the following codebox into the main textfield:
:filefind
explorer.ex*
svchost.ex*
winlogon.ex*
  • Click the Look button to start the scan.
  • When finished, a notepad window will open with the results of the scan. Please post this log in your next reply.
Note: The log can also be found on your Desktop entitled SystemLook.txt
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#5 HarriJames

HarriJames
  • Topic Starter

  • Members
  • 10 posts
  • OFFLINE
  •  
  • Local time:05:30 AM

Posted 24 February 2012 - 01:52 PM

SystemLook 30.07.11 by jpshortstuff
Log created at 10:47 on 24/02/2012 by LORI
Administrator - Elevation successful

========== filefind ==========

Searching for "explorer.ex*"
C:\WINDOWS\explorer.exe --a---- 1057280 bytes [12:00 04/08/2004] [12:00 04/08/2004] 4AD1CF7C9B775CD8C3040D96B00AA3C2
C:\WINDOWS\Prefetch\EXPLORER.EXE-082F38A9.pf --a---- 66884 bytes [16:59 24/02/2012] [16:59 24/02/2012] E4DA660EF5E2ECF6A3B2C455629DF913
C:\WINDOWS\SoftwareDistribution\Download\44d74c37f0595a363bcec5e9229d8564\sp2gdr\explorer.exe --a---- 1033216 bytes [10:23 13/06/2007] [10:23 13/06/2007] 97BD6515465659FF8F3B7BE375B2EA87
C:\WINDOWS\SoftwareDistribution\Download\44d74c37f0595a363bcec5e9229d8564\sp2qfe\explorer.exe --a---- 1033216 bytes [11:26 13/06/2007] [11:26 13/06/2007] 7712DF0CDDE3A5AC89843E61CD5B3658
C:\WINDOWS\SoftwareDistribution\Download\9866fb57abdc0ea2f5d4e132d055ba4e\explorer.exe --a---- 1033728 bytes [00:12 14/04/2008] [00:12 14/04/2008] 12896823FB95BFB3DC9B46BCAEDC9923

Searching for "svchost.ex*"
C:\Program Files\Malwarebytes' Anti-Malware\Chameleon\svchost.exe --a---- 182856 bytes [16:16 10/02/2012] [22:53 13/01/2012] 63EEC8A8B221AB79045E776E5F592868
C:\WINDOWS\pchealth\ERRORREP\UserDumps\svchost.exe.20120103-010253-00.mdmp --a--c- 153765 bytes [01:02 03/01/2012] [01:02 03/01/2012] 25C11773D57FBFBC1E56285F8351766B
C:\WINDOWS\Prefetch\SVCHOST.EXE-3530F672.pf --a---- 45014 bytes [15:48 30/11/2011] [09:39 23/02/2012] 7749FC551E9DE9280C73E5165986AA24
C:\WINDOWS\SoftwareDistribution\Download\9866fb57abdc0ea2f5d4e132d055ba4e\svchost.exe --a---- 14336 bytes [00:12 14/04/2008] [00:12 14/04/2008] 27C6D03BCDB8CFEB96B716F3D8BE3E18
C:\WINDOWS\system32\svchost.exe --a---- 39424 bytes [12:00 04/08/2004] [12:00 04/08/2004] 6EDC3D4644CDB50CCE75107EFA040816

Searching for "winlogon.ex*"
C:\Program Files\Malwarebytes' Anti-Malware\Chameleon\winlogon.exe --a---- 182856 bytes [16:16 10/02/2012] [22:53 13/01/2012] 63EEC8A8B221AB79045E776E5F592868
C:\WINDOWS\SoftwareDistribution\Download\9866fb57abdc0ea2f5d4e132d055ba4e\winlogon.exe --a---- 507904 bytes [00:12 14/04/2008] [00:12 14/04/2008] ED0EF0A136DEC83DF69F04118870003E
C:\WINDOWS\system32\winlogon.exe --a---- 539136 bytes [12:00 04/08/2004] [12:00 04/08/2004] 400CA070C49E6007476A335C930E8428

-= EOF =-

#6 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:06:30 AM

Posted 24 February 2012 - 02:06 PM

Blitzblank.

Download BlitzBlank and save it to your desktop. Open Blitzblank.exe

  • Click OK at the warning (and take note of it, this is a VERY powerful tool!).
  • Click the Script tab and copy/paste the following text there:
CopyFile:
C:\WINDOWS\SoftwareDistribution\Download\9866fb57abdc0ea2f5d4e132d055ba4e\explorer.exe C:\WINDOWS\explorer.exe
C:\WINDOWS\SoftwareDistribution\Download\9866fb57abdc0ea2f5d4e132d055ba4e\svchost.exe C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\SoftwareDistribution\Download\9866fb57abdc0ea2f5d4e132d055ba4e\winlogon.exe C:\WINDOWS\system32\winlogon.exe
  • Click Execute Now. Your computer will need to reboot in order to replace the files.
  • When done, post me the report created by Blitzblank. you can find it at the root of the drive Normaly C:\

I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#7 HarriJames

HarriJames
  • Topic Starter

  • Members
  • 10 posts
  • OFFLINE
  •  
  • Local time:05:30 AM

Posted 24 February 2012 - 02:20 PM

BlitzBlank 1.0.0.32

File/Registry Modification Engine native application
CopyFileOnReboot: sourceFile = "\??\c:\windows\softwaredistribution\download\9866fb57abdc0ea2f5d4e132d055ba4e\explorer.exe", destinationFile = "\??\c:\windows\explorer.exe"CopyFileOnReboot: sourceFile = "\??\c:\windows\softwaredistribution\download\9866fb57abdc0ea2f5d4e132d055ba4e\svchost.exe", destinationFile = "\??\c:\windows\system32\svchost.exe"CopyFileOnReboot: sourceFile = "\??\c:\windows\softwaredistribution\download\9866fb57abdc0ea2f5d4e132d055ba4e\winlogon.exe", destinationFile = "\??\c:\windows\system32\winlogon.exe"

#8 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:06:30 AM

Posted 24 February 2012 - 02:27 PM

Hello


now I would like you to rerun combofix for me now and send me the report


Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#9 HarriJames

HarriJames
  • Topic Starter

  • Members
  • 10 posts
  • OFFLINE
  •  
  • Local time:05:30 AM

Posted 24 February 2012 - 02:47 PM

Hello,

ComboFix 12-02-22.01 - LORI 02/24/2012 11:32:55.5.1 - x86
Microsoft Windows XP Home Edition 5.1.2600.2.1252.1.1033.18.1471.1013 [GMT -8:00]
Running from: c:\documents and settings\LORI\Desktop\ComboFix.exe
AV: avast! Antivirus *Disabled/Updated* {7591DB91-41F0-48A3-B128-1A293FD8233D}
.
.
((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.
.
c:\documents and settings\All Users\Application Data\glnnaaa.tmp
c:\documents and settings\All Users\Application Data\hlnnaaa.tmp
c:\documents and settings\All Users\Application Data\ilnnaaa.tmp
c:\documents and settings\All Users\Application Data\jlnnaaa.tmp
c:\documents and settings\All Users\Application Data\klnnaaa.tmp
.
.
((((((((((((((((((((((((( Files Created from 2012-01-24 to 2012-02-24 )))))))))))))))))))))))))))))))
.
.
2012-02-20 16:50 . 2006-01-13 07:14 278528 ----a-w- c:\windows\system32\hpdj5600
2012-02-10 16:16 . 2012-02-10 16:16 -------- d-----w- c:\documents and settings\LORI\Application Data\Malwarebytes
2012-02-10 16:16 . 2012-02-10 16:16 -------- d-----w- c:\documents and settings\All Users\Application Data\Malwarebytes
2012-02-10 16:16 . 2011-12-10 23:24 20464 ----a-w- c:\windows\system32\drivers\mbam.sys
2012-02-10 16:16 . 2012-02-10 16:16 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
2012-02-10 00:59 . 2011-11-28 17:53 314456 ----a-w- c:\windows\system32\drivers\aswSP.sys
2012-02-10 00:59 . 2011-11-28 17:51 20568 ----a-w- c:\windows\system32\drivers\aswFsBlk.sys
2012-02-10 00:59 . 2011-11-28 17:53 435032 ----a-w- c:\windows\system32\drivers\aswSnx.sys
2012-02-10 00:59 . 2011-11-28 17:52 34392 ----a-w- c:\windows\system32\drivers\aswRdr.sys
2012-02-10 00:59 . 2011-11-28 17:52 52952 ----a-w- c:\windows\system32\drivers\aswTdi.sys
2012-02-10 00:59 . 2011-11-28 17:52 111320 ----a-w- c:\windows\system32\drivers\aswmon2.sys
2012-02-10 00:59 . 2011-11-28 17:51 105176 ----a-w- c:\windows\system32\drivers\aswmon.sys
2012-02-10 00:59 . 2011-11-28 17:48 30808 ----a-w- c:\windows\system32\drivers\aavmker4.sys
2012-02-10 00:58 . 2011-11-28 18:01 41184 ----a-w- c:\windows\avastSS.scr
2012-02-10 00:58 . 2011-11-28 18:01 199816 ----a-w- c:\windows\system32\aswBoot.exe
2012-02-10 00:58 . 2012-02-10 00:58 -------- d-----w- c:\program files\AVAST Software
2012-02-10 00:58 . 2012-02-10 00:58 -------- d-----w- c:\documents and settings\All Users\Application Data\AVAST Software
2012-02-09 22:18 . 2012-02-09 22:18 -------- d-----w- c:\documents and settings\Administrator\Local Settings\Application Data\Mozilla
2012-02-09 21:41 . 2012-02-09 21:41 -------- d-----w- c:\program files\Support Tools
.
.
.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2012-02-24 19:11 . 2004-08-04 12:00 507904 ----a-w- c:\windows\system32\winlogon.exe
2012-02-24 19:11 . 2004-08-04 12:00 14336 ----a-w- c:\windows\system32\svchost.exe
2012-02-24 19:11 . 2004-08-04 12:00 1033728 ----a-w- c:\windows\explorer.exe
2011-06-20 01:21 . 2010-03-12 00:01 8192 ----a-w- c:\program files\SpyFlushregTemp.reg
2011-12-01 20:10 . 2011-06-23 19:15 134104 ----a-w- c:\program files\mozilla firefox\components\browsercomps.dll
.
.
------- Sigcheck -------
Note: Unsigned files aren't necessarily malware.
.
[-] 2012-02-24 . ED0EF0A136DEC83DF69F04118870003E . 507904 . . [5.1.2600.5512] . . c:\windows\system32\winlogon.exe
[-] 2008-04-14 . ED0EF0A136DEC83DF69F04118870003E . 507904 . . [5.1.2600.5512] . . c:\windows\SoftwareDistribution\Download\9866fb57abdc0ea2f5d4e132d055ba4e\winlogon.exe
.
[-] 2012-02-24 . 27C6D03BCDB8CFEB96B716F3D8BE3E18 . 14336 . . [5.1.2600.5512] . . c:\windows\system32\svchost.exe
[-] 2008-04-14 . 27C6D03BCDB8CFEB96B716F3D8BE3E18 . 14336 . . [5.1.2600.5512] . . c:\windows\SoftwareDistribution\Download\9866fb57abdc0ea2f5d4e132d055ba4e\svchost.exe
.
[-] 2012-02-24 . 12896823FB95BFB3DC9B46BCAEDC9923 . 1033728 . . [6.00.2900.5512] . . c:\windows\explorer.exe
[-] 2008-04-14 . 12896823FB95BFB3DC9B46BCAEDC9923 . 1033728 . . [6.00.2900.5512] . . c:\windows\SoftwareDistribution\Download\9866fb57abdc0ea2f5d4e132d055ba4e\explorer.exe
[7] 2007-06-13 . 7712DF0CDDE3A5AC89843E61CD5B3658 . 1033216 . . [6.00.2900.3156] . . c:\windows\SoftwareDistribution\Download\44d74c37f0595a363bcec5e9229d8564\sp2qfe\explorer.exe
[7] 2007-06-13 . 97BD6515465659FF8F3B7BE375B2EA87 . 1033216 . . [6.00.2900.3156] . . c:\windows\SoftwareDistribution\Download\44d74c37f0595a363bcec5e9229d8564\sp2gdr\explorer.exe
.
((((((((((((((((((((((((((((( SnapShot@2012-02-22_23.47.59 )))))))))))))))))))))))))))))))))))))))))
.
+ 2012-02-24 19:12 . 2012-02-24 19:12 16384 c:\windows\Temp\Perflib_Perfdata_294.dat
+ 2012-02-24 16:41 . 2012-02-24 19:10 49152 c:\windows\system32\config\systemprofile\Local Settings\History\History.IE5\MSHist012012022420120225\index.dat
+ 2012-02-23 04:12 . 2012-02-23 07:02 65536 c:\windows\system32\config\systemprofile\Local Settings\History\History.IE5\MSHist012012022220120223\index.dat
+ 2012-02-23 04:12 . 2012-02-23 04:12 81920 c:\windows\system32\config\systemprofile\Local Settings\History\History.IE5\MSHist012012021320120220\index.dat
+ 2012-02-24 18:48 . 2012-02-24 19:10 16384 c:\windows\system32\config\systemprofile\Cookies\index.dat
+ 2010-02-18 20:31 . 2012-02-24 01:11 35088 c:\windows\Installer\{90120000-0030-0000-0000-0000000FF1CE}\oisicon.exe
- 2010-02-18 20:31 . 2011-04-11 03:06 35088 c:\windows\Installer\{90120000-0030-0000-0000-0000000FF1CE}\oisicon.exe
- 2010-02-18 20:31 . 2011-04-11 03:06 18704 c:\windows\Installer\{90120000-0030-0000-0000-0000000FF1CE}\mspicons.exe
+ 2010-02-18 20:31 . 2012-02-24 01:11 18704 c:\windows\Installer\{90120000-0030-0000-0000-0000000FF1CE}\mspicons.exe
- 2010-02-18 20:31 . 2011-04-11 03:06 20240 c:\windows\Installer\{90120000-0030-0000-0000-0000000FF1CE}\cagicon.exe
+ 2010-02-18 20:31 . 2012-02-24 01:11 20240 c:\windows\Installer\{90120000-0030-0000-0000-0000000FF1CE}\cagicon.exe
+ 2010-01-31 02:52 . 2012-02-24 19:10 131072 c:\windows\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\index.dat
- 2010-01-31 02:52 . 2012-02-17 00:11 131072 c:\windows\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\index.dat
+ 2012-02-23 08:24 . 2012-02-24 01:12 245760 c:\windows\system32\config\systemprofile\Local Settings\History\History.IE5\MSHist012012022320120224\index.dat
+ 2010-01-31 02:52 . 2012-02-24 19:10 442368 c:\windows\system32\config\systemprofile\Local Settings\History\History.IE5\index.dat
+ 2010-02-18 20:31 . 2012-02-24 01:11 888080 c:\windows\Installer\{90120000-0030-0000-0000-0000000FF1CE}\wordicon.exe
- 2010-02-18 20:31 . 2011-04-11 03:06 888080 c:\windows\Installer\{90120000-0030-0000-0000-0000000FF1CE}\wordicon.exe
- 2010-02-18 20:31 . 2011-04-11 03:06 272648 c:\windows\Installer\{90120000-0030-0000-0000-0000000FF1CE}\pubs.exe
+ 2010-02-18 20:31 . 2012-02-24 01:11 272648 c:\windows\Installer\{90120000-0030-0000-0000-0000000FF1CE}\pubs.exe
- 2010-02-18 20:31 . 2011-04-11 03:06 922384 c:\windows\Installer\{90120000-0030-0000-0000-0000000FF1CE}\pptico.exe
+ 2010-02-18 20:31 . 2012-02-24 01:11 922384 c:\windows\Installer\{90120000-0030-0000-0000-0000000FF1CE}\pptico.exe
- 2010-02-18 20:31 . 2011-04-11 03:06 845584 c:\windows\Installer\{90120000-0030-0000-0000-0000000FF1CE}\outicon.exe
+ 2010-02-18 20:31 . 2012-02-24 01:11 845584 c:\windows\Installer\{90120000-0030-0000-0000-0000000FF1CE}\outicon.exe
- 2010-02-18 20:31 . 2011-04-11 03:06 217864 c:\windows\Installer\{90120000-0030-0000-0000-0000000FF1CE}\misc.exe
+ 2010-02-18 20:31 . 2012-02-24 01:11 217864 c:\windows\Installer\{90120000-0030-0000-0000-0000000FF1CE}\misc.exe
- 2010-02-18 20:31 . 2011-04-11 03:06 184080 c:\windows\Installer\{90120000-0030-0000-0000-0000000FF1CE}\joticon.exe
+ 2010-02-18 20:31 . 2012-02-24 01:11 184080 c:\windows\Installer\{90120000-0030-0000-0000-0000000FF1CE}\joticon.exe
+ 2010-02-18 20:31 . 2012-02-24 01:11 159504 c:\windows\Installer\{90120000-0030-0000-0000-0000000FF1CE}\inficon.exe
- 2010-02-18 20:31 . 2011-04-11 03:06 159504 c:\windows\Installer\{90120000-0030-0000-0000-0000000FF1CE}\inficon.exe
+ 2012-02-03 23:13 . 2012-02-03 23:13 4988928 c:\windows\Installer\1befcca.msp
+ 2010-02-18 20:31 . 2012-02-24 01:11 1172240 c:\windows\Installer\{90120000-0030-0000-0000-0000000FF1CE}\xlicons.exe
- 2010-02-18 20:31 . 2011-04-11 03:06 1172240 c:\windows\Installer\{90120000-0030-0000-0000-0000000FF1CE}\xlicons.exe
- 2010-02-18 20:31 . 2011-04-11 03:06 1165584 c:\windows\Installer\{90120000-0030-0000-0000-0000000FF1CE}\accicons.exe
+ 2010-02-18 20:31 . 2012-02-24 01:11 1165584 c:\windows\Installer\{90120000-0030-0000-0000-0000000FF1CE}\accicons.exe
+ 2006-09-15 23:25 . 2006-09-15 23:25 3611416 c:\windows\Installer\$PatchCache$\Managed\00002109030000000000000000F01FEC\12.0.4518\OUTLFLTR.DAT
+ 2010-02-08 04:35 . 2012-01-27 07:20 52550552 c:\windows\system32\MRT.exe
.
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shelliconoverlayidentifiers\00avast]
@="{472083B0-C522-11CF-8763-00608CC02F24}"
[HKEY_CLASSES_ROOT\CLSID\{472083B0-C522-11CF-8763-00608CC02F24}]
2011-11-28 18:01 122512 ----a-w- c:\program files\AVAST Software\Avast\ashShell.dll
.
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"SpybotSD TeaTimer"="c:\program files\Spybot - Search & Destroy\TeaTimer.exe" [2009-03-06 2260480]
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"avast"="c:\program files\AVAST Software\Avast\avastUI.exe" [2011-11-28 3744552]
"Malwarebytes' Anti-Malware"="c:\program files\Malwarebytes' Anti-Malware\mbamgui.exe" [2012-01-13 460872]
.
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]
"DisableNotifications"= 1 (0x1)
.
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"c:\\Program Files\\3CXPhone\\3CXPhone.exe"=
"c:\\Documents and Settings\\LORI\\Application Data\\mjusbsp\\magicJack.exe"=
.
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\GloballyOpenPorts\List]
"21438:TCP"= 21438:TCP:BitComet 21438 TCP
"21438:UDP"= 21438:UDP:BitComet 21438 UDP
.
R1 aswSnx;aswSnx;c:\windows\system32\drivers\aswSnx.sys [2/9/2012 4:59 PM 435032]
R1 aswSP;aswSP;c:\windows\system32\drivers\aswSP.sys [2/9/2012 4:59 PM 314456]
R2 aswFsBlk;aswFsBlk;c:\windows\system32\drivers\aswFsBlk.sys [2/9/2012 4:59 PM 20568]
R2 MBAMService;MBAMService;c:\program files\Malwarebytes' Anti-Malware\mbamservice.exe [2/10/2012 8:16 AM 652360]
R3 MBAMProtector;MBAMProtector;c:\windows\system32\drivers\mbam.sys [2/10/2012 8:16 AM 20464]
S2 gupdate;Google Update Service (gupdate);c:\program files\Google\Update\GoogleUpdate.exe [2/6/2010 9:02 PM 135664]
S3 gupdatem;Google Update Service (gupdatem);c:\program files\Google\Update\GoogleUpdate.exe [2/6/2010 9:02 PM 135664]
S3 pcouffin;VSO Software pcouffin;c:\windows\system32\drivers\pcouffin.sys [4/30/2010 3:26 PM 47360]
S4 sptd;sptd;c:\windows\system32\drivers\sptd.sys [7/7/2010 3:15 PM 697328]
.
Contents of the 'Scheduled Tasks' folder
.
2012-02-24 c:\windows\Tasks\GoogleUpdateTaskMachineCore.job
- c:\program files\Google\Update\GoogleUpdate.exe [2010-02-07 05:02]
.
2012-02-24 c:\windows\Tasks\GoogleUpdateTaskMachineUA.job
- c:\program files\Google\Update\GoogleUpdate.exe [2010-02-07 05:02]
.
.
------- Supplementary Scan -------
.
uStart Page = hxxp://google.com/
uInternet Connection Wizard,ShellNext = iexplore
uInternet Settings,ProxyOverride = <local>
uSearchAssistant = hxxp://www.google.com/ie
uSearchURL,(Default) = hxxp://www.google.com/search?q=%s
IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~3\Office12\EXCEL.EXE/3000
IE: Google Sidewiki... - c:\program files\Google\Google Toolbar\Component\GoogleToolbarDynamic_mui_en_D183CA64F05FDD98.dll/cmsidewiki.html
TCP: DhcpNameServer = 192.168.10.254
FF - ProfilePath - c:\documents and settings\LORI\Application Data\Mozilla\Firefox\Profiles\40pxd4n0.default\
FF - prefs.js: browser.startup.homepage - hxxp://google.com/
FF - prefs.js: network.proxy.http - 127.0.0.1
FF - prefs.js: network.proxy.http_port - 5555
FF - prefs.js: network.proxy.type - 0
.
.
**************************************************************************
.
catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2012-02-24 11:41
Windows 5.1.2600 Service Pack 2 NTFS
.
scanning hidden processes ...
.
scanning hidden autostart entries ...
.
scanning hidden files ...
.
scan completed successfully
hidden files: 0
.
**************************************************************************
.
Completion time: 2012-02-24 11:44:43
ComboFix-quarantined-files.txt 2012-02-24 19:44
ComboFix2.txt 2012-02-24 17:00
ComboFix3.txt 2012-02-23 04:33
ComboFix4.txt 2012-02-23 04:18
ComboFix5.txt 2012-02-24 19:31
.
Pre-Run: 144,353,198,080 bytes free
Post-Run: 144,339,804,160 bytes free
.
- - End Of File - - 58B0947B5FF5E7A8BDA9B350BDE6D2C1

#10 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:06:30 AM

Posted 24 February 2012 - 03:12 PM

Greetings

I want you to run these next,

tdsskiller:

Please read carefully and follow these steps.
  • Download TDSSKiller and save it to your Desktop.
  • doubleclick on TDSSKiller.exe to run the application, then on Start Scan.
  • If an infected file is detected, the default action will be Cure, click on Continue.
  • If a suspicious file is detected, the default action will be Skip, click on Continue.
  • It may ask you to reboot the computer to complete the process. Click on Reboot Now.
  • If no reboot is require, click on Report. A log file should appear. Please copy and paste the contents of that file here.
  • If a reboot is required, the report can also be found in your root directory, (usually C:\ folder) in the form of "TDSSKiller.[Version]_[Date]_[Time]_log.txt". Please copy and paste the contents of that file here.

Please download aswMBR to your desktop.
  • Double click the aswMBR.exe icon to run it
  • it will ask to download extra definitions - ALLOW IT
  • Click the Scan button to start the scan
  • On completion of the scan, click the save log button, save it to your desktop and post it in your next reply.

If you have any problems running either one come back and let me know

please reply with the reports from TDSSKiller and aswMBR

Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#11 HarriJames

HarriJames
  • Topic Starter

  • Members
  • 10 posts
  • OFFLINE
  •  
  • Local time:05:30 AM

Posted 24 February 2012 - 03:47 PM

12:21:04.0343 2820 TDSS rootkit removing tool 2.7.14.0 Feb 22 2012 16:54:49
12:21:04.0703 2820 ============================================================
12:21:04.0703 2820 Current date / time: 2012/02/24 12:21:04.0703
12:21:04.0703 2820 SystemInfo:
12:21:04.0703 2820
12:21:04.0703 2820 OS Version: 5.1.2600 ServicePack: 2.0
12:21:04.0703 2820 Product type: Workstation
12:21:04.0703 2820 ComputerName: LORI-513E4B4E73
12:21:04.0703 2820 UserName: LORI
12:21:04.0703 2820 Windows directory: C:\WINDOWS
12:21:04.0703 2820 System windows directory: C:\WINDOWS
12:21:04.0703 2820 Processor architecture: Intel x86
12:21:04.0703 2820 Number of processors: 1
12:21:04.0703 2820 Page size: 0x1000
12:21:04.0703 2820 Boot type: Normal boot
12:21:04.0703 2820 ============================================================
12:21:05.0187 2820 Drive \Device\Harddisk0\DR0 - Size: 0x25433D6000 (149.05 Gb), SectorSize: 0x200, Cylinders: 0x4C01, SectorsPerTrack: 0x3F, TracksPerCylinder: 0xFF, Type 'K0', Flags 0x00000050
12:21:05.0281 2820 \Device\Harddisk0\DR0:
12:21:05.0281 2820 MBR used
12:21:05.0281 2820 \Device\Harddisk0\DR0\Partition0: MBR, Type 0x7, StartLBA 0x3F, BlocksNum 0x12A14BC1
12:21:05.0312 2820 Initialize success
12:21:05.0312 2820 ============================================================
12:21:20.0062 2204 ============================================================
12:21:20.0062 2204 Scan started
12:21:20.0062 2204 Mode: Manual;
12:21:20.0062 2204 ============================================================
12:21:20.0375 2204 Aavmker4 (b6de0336f9f4b687b4ff57939f7b657a) C:\WINDOWS\system32\drivers\Aavmker4.sys
12:21:20.0375 2204 Aavmker4 - ok
12:21:20.0421 2204 Abiosdsk - ok
12:21:20.0468 2204 abp480n5 - ok
12:21:20.0562 2204 ACPI (a10c7534f7223f4a73a948967d00e69b) C:\WINDOWS\system32\DRIVERS\ACPI.sys
12:21:20.0562 2204 ACPI - ok
12:21:20.0625 2204 ACPIEC (9859c0f6936e723e4892d7141b1327d5) C:\WINDOWS\system32\drivers\ACPIEC.sys
12:21:20.0640 2204 ACPIEC - ok
12:21:20.0671 2204 adpu160m - ok
12:21:20.0734 2204 aec (841f385c6cfaf66b58fbd898722bb4f0) C:\WINDOWS\system32\drivers\aec.sys
12:21:20.0734 2204 aec - ok
12:21:20.0796 2204 AFD (55e6e1c51b6d30e54335750955453702) C:\WINDOWS\System32\drivers\afd.sys
12:21:20.0796 2204 AFD - ok
12:21:20.0843 2204 Aha154x - ok
12:21:20.0890 2204 aic78u2 - ok
12:21:20.0921 2204 aic78xx - ok
12:21:20.0968 2204 AliIde - ok
12:21:21.0015 2204 AmdK7 (680ad1c1bb16239e28d8f33a54a7a3c7) C:\WINDOWS\system32\DRIVERS\amdk7.sys
12:21:21.0015 2204 AmdK7 - ok
12:21:21.0046 2204 amsint - ok
12:21:21.0109 2204 AN983 (116bff96077a4a724e0aab800525ceb5) C:\WINDOWS\system32\DRIVERS\AN983.sys
12:21:21.0109 2204 AN983 - ok
12:21:21.0140 2204 asc - ok
12:21:21.0171 2204 asc3350p - ok
12:21:21.0203 2204 asc3550 - ok
12:21:21.0296 2204 aswFsBlk (054df24c92b55427e0757cfff160e4f2) C:\WINDOWS\system32\drivers\aswFsBlk.sys
12:21:21.0296 2204 aswFsBlk - ok
12:21:21.0359 2204 aswMon2 (ef0e9ad83380724bd6fbbb51d2d0f5b8) C:\WINDOWS\system32\drivers\aswMon2.sys
12:21:21.0359 2204 aswMon2 - ok
12:21:21.0421 2204 aswRdr (352d5a48ebab35a7693b048679304831) C:\WINDOWS\system32\drivers\aswRdr.sys
12:21:21.0421 2204 aswRdr - ok
12:21:21.0484 2204 aswSnx (8d34d2b24297e27d93e847319abfdec4) C:\WINDOWS\system32\drivers\aswSnx.sys
12:21:21.0500 2204 aswSnx - ok
12:21:21.0546 2204 aswSP (010012597333da1f46c3243f33f8409e) C:\WINDOWS\system32\drivers\aswSP.sys
12:21:21.0546 2204 aswSP - ok
12:21:21.0625 2204 aswTdi (f9f84364416658e9786235904d448d37) C:\WINDOWS\system32\drivers\aswTdi.sys
12:21:21.0625 2204 aswTdi - ok
12:21:21.0687 2204 AsyncMac (02000abf34af4c218c35d257024807d6) C:\WINDOWS\system32\DRIVERS\asyncmac.sys
12:21:21.0687 2204 AsyncMac - ok
12:21:21.0750 2204 atapi (cdfe4411a69c224bd1d11b2da92dac51) C:\WINDOWS\system32\DRIVERS\atapi.sys
12:21:21.0750 2204 atapi - ok
12:21:21.0812 2204 Atdisk - ok
12:21:21.0890 2204 Atmarpc (ec88da854ab7d7752ec8be11a741bb7f) C:\WINDOWS\system32\DRIVERS\atmarpc.sys
12:21:21.0890 2204 Atmarpc - ok
12:21:21.0953 2204 audstub (d9f724aa26c010a217c97606b160ed68) C:\WINDOWS\system32\DRIVERS\audstub.sys
12:21:21.0953 2204 audstub - ok
12:21:22.0031 2204 Beep (da1f27d85e0d1525f6621372e7b685e9) C:\WINDOWS\system32\drivers\Beep.sys
12:21:22.0031 2204 Beep - ok
12:21:22.0078 2204 CA561 - ok
12:21:22.0203 2204 catchme - ok
12:21:22.0281 2204 cbidf2k (90a673fc8e12a79afbed2576f6a7aaf9) C:\WINDOWS\system32\drivers\cbidf2k.sys
12:21:22.0281 2204 cbidf2k - ok
12:21:22.0375 2204 CCDECODE (6163ed60b684bab19d3352ab22fc48b2) C:\WINDOWS\system32\DRIVERS\CCDECODE.sys
12:21:22.0375 2204 CCDECODE - ok
12:21:22.0421 2204 cd20xrnt - ok
12:21:22.0468 2204 Cdaudio (c1b486a7658353d33a10cc15211a873b) C:\WINDOWS\system32\drivers\Cdaudio.sys
12:21:22.0468 2204 Cdaudio - ok
12:21:22.0531 2204 Cdfs (cd7d5152df32b47f4e36f710b35aae02) C:\WINDOWS\system32\drivers\Cdfs.sys
12:21:22.0546 2204 Cdfs - ok
12:21:22.0593 2204 Cdrom (af9c19b3100fe010496b1a27181fbf72) C:\WINDOWS\system32\DRIVERS\cdrom.sys
12:21:22.0593 2204 Cdrom - ok
12:21:22.0625 2204 Changer - ok
12:21:22.0671 2204 CmdIde - ok
12:21:22.0718 2204 Cpqarray - ok
12:21:22.0765 2204 dac2w2k - ok
12:21:22.0796 2204 dac960nt - ok
12:21:22.0875 2204 Disk (00ca44e4534865f8a3b64f7c0984bff0) C:\WINDOWS\system32\DRIVERS\disk.sys
12:21:22.0875 2204 Disk - ok
12:21:22.0984 2204 dmboot (c0fbb516e06e243f0cf31f597e7ebf7d) C:\WINDOWS\system32\drivers\dmboot.sys
12:21:22.0984 2204 dmboot - ok
12:21:23.0062 2204 dmio (f5e7b358a732d09f4bcf2824b88b9e28) C:\WINDOWS\system32\drivers\dmio.sys
12:21:23.0062 2204 dmio - ok
12:21:23.0125 2204 dmload (e9317282a63ca4d188c0df5e09c6ac5f) C:\WINDOWS\system32\drivers\dmload.sys
12:21:23.0125 2204 dmload - ok
12:21:23.0187 2204 DMusic (a6f881284ac1150e37d9ae47ff601267) C:\WINDOWS\system32\drivers\DMusic.sys
12:21:23.0187 2204 DMusic - ok
12:21:23.0218 2204 dpti2o - ok
12:21:23.0281 2204 drmkaud (1ed4dbbae9f5d558dbba4cc450e3eb2e) C:\WINDOWS\system32\drivers\drmkaud.sys
12:21:23.0281 2204 drmkaud - ok
12:21:23.0359 2204 Fastfat (3117f595e9615e04f05a54fc15a03b20) C:\WINDOWS\system32\drivers\Fastfat.sys
12:21:23.0359 2204 Fastfat - ok
12:21:23.0390 2204 Fdc (ced2e8396a8838e59d8fd529c680e02c) C:\WINDOWS\system32\drivers\Fdc.sys
12:21:23.0390 2204 Fdc - ok
12:21:23.0453 2204 Fips (e153ab8a11de5452bcf5ac7652dbf3ed) C:\WINDOWS\system32\drivers\Fips.sys
12:21:23.0453 2204 Fips - ok
12:21:23.0500 2204 Flpydisk (0dd1de43115b93f4d85e889d7a86f548) C:\WINDOWS\system32\drivers\Flpydisk.sys
12:21:23.0500 2204 Flpydisk - ok
12:21:23.0578 2204 FltMgr (157754f0df355a9e0a6f54721914f9c6) C:\WINDOWS\system32\DRIVERS\fltMgr.sys
12:21:23.0578 2204 FltMgr - ok
12:21:23.0640 2204 Fs_Rec (3e1e2bd4f39b0e2b7dc4f4d2bcc2779a) C:\WINDOWS\system32\drivers\Fs_Rec.sys
12:21:23.0640 2204 Fs_Rec - ok
12:21:23.0703 2204 Ftdisk (6ac26732762483366c3969c9e4d2259d) C:\WINDOWS\system32\DRIVERS\ftdisk.sys
12:21:23.0703 2204 Ftdisk - ok
12:21:23.0765 2204 GEARAspiWDM (df6e37b27a9a1a498c6d9f29995b7a03) C:\WINDOWS\system32\DRIVERS\GEARAspiWDM.sys
12:21:23.0765 2204 GEARAspiWDM - ok
12:21:23.0828 2204 Gpc (c0f1d4a21de5a415df8170616703debf) C:\WINDOWS\system32\DRIVERS\msgpc.sys
12:21:23.0828 2204 Gpc - ok
12:21:23.0906 2204 hidusb (1de6783b918f540149aa69943bdfeba8) C:\WINDOWS\system32\DRIVERS\hidusb.sys
12:21:23.0906 2204 hidusb - ok
12:21:23.0937 2204 hpn - ok
12:21:24.0000 2204 HTTP (c19b522a9ae0bbc3293397f3055e80a1) C:\WINDOWS\system32\Drivers\HTTP.sys
12:21:24.0000 2204 HTTP - ok
12:21:24.0046 2204 i2omgmt - ok
12:21:24.0062 2204 i2omp - ok
12:21:24.0125 2204 i8042prt (5502b58eef7486ee6f93f3f164dcb808) C:\WINDOWS\system32\DRIVERS\i8042prt.sys
12:21:24.0140 2204 i8042prt - ok
12:21:24.0203 2204 Imapi (f8aa320c6a0409c0380e5d8a99d76ec6) C:\WINDOWS\system32\DRIVERS\imapi.sys
12:21:24.0203 2204 Imapi - ok
12:21:24.0250 2204 ini910u - ok
12:21:24.0281 2204 IntelIde - ok
12:21:24.0328 2204 Ip6Fw (4448006b6bc60e6c027932cfc38d6855) C:\WINDOWS\system32\DRIVERS\Ip6Fw.sys
12:21:24.0328 2204 Ip6Fw - ok
12:21:24.0390 2204 IpFilterDriver (731f22ba402ee4b62748adaf6363c182) C:\WINDOWS\system32\DRIVERS\ipfltdrv.sys
12:21:24.0406 2204 IpFilterDriver - ok
12:21:24.0453 2204 IpInIp (e1ec7f5da720b640cd8fb8424f1b14bb) C:\WINDOWS\system32\DRIVERS\ipinip.sys
12:21:24.0453 2204 IpInIp - ok
12:21:24.0531 2204 IpNat (b5a8e215ac29d24d60b4d1250ef05ace) C:\WINDOWS\system32\DRIVERS\ipnat.sys
12:21:24.0531 2204 IpNat - ok
12:21:24.0578 2204 IPSec (64537aa5c003a6afeee1df819062d0d1) C:\WINDOWS\system32\DRIVERS\ipsec.sys
12:21:24.0578 2204 IPSec - ok
12:21:24.0625 2204 IRENUM (50708daa1b1cbb7d6ac1cf8f56a24410) C:\WINDOWS\system32\DRIVERS\irenum.sys
12:21:24.0625 2204 IRENUM - ok
12:21:24.0734 2204 isapnp (e504f706ccb699c2596e9a3da1596e87) C:\WINDOWS\system32\DRIVERS\isapnp.sys
12:21:24.0734 2204 isapnp - ok
12:21:24.0812 2204 Kbdclass (ebdee8a2ee5393890a1acee971c4c246) C:\WINDOWS\system32\DRIVERS\kbdclass.sys
12:21:24.0812 2204 Kbdclass - ok
12:21:24.0890 2204 kbdhid (e182fa8e49e8ee41b4adc53093f3c7e6) C:\WINDOWS\system32\DRIVERS\kbdhid.sys
12:21:24.0890 2204 kbdhid - ok
12:21:24.0968 2204 kmixer (d93cad07c5683db066b0b2d2d3790ead) C:\WINDOWS\system32\drivers\kmixer.sys
12:21:24.0968 2204 kmixer - ok
12:21:25.0031 2204 KSecDD (674d3e5a593475915dc6643317192403) C:\WINDOWS\system32\drivers\KSecDD.sys
12:21:25.0031 2204 KSecDD - ok
12:21:25.0093 2204 lbrtfdc - ok
12:21:25.0171 2204 MBAMProtector (b7ca8cc3f978201856b6ab82f40953c3) C:\WINDOWS\system32\drivers\mbam.sys
12:21:25.0171 2204 MBAMProtector - ok
12:21:25.0234 2204 mnmdd (4ae068242760a1fb6e1a44bf4e16afa6) C:\WINDOWS\system32\drivers\mnmdd.sys
12:21:25.0234 2204 mnmdd - ok
12:21:25.0296 2204 Modem (6fc6f9d7acc36dca9b914565a3aeda05) C:\WINDOWS\system32\drivers\Modem.sys
12:21:25.0296 2204 Modem - ok
12:21:25.0375 2204 Mouclass (34e1f0031153e491910e12551400192c) C:\WINDOWS\system32\DRIVERS\mouclass.sys
12:21:25.0375 2204 Mouclass - ok
12:21:25.0437 2204 mouhid (b1c303e17fb9d46e87a98e4ba6769685) C:\WINDOWS\system32\DRIVERS\mouhid.sys
12:21:25.0437 2204 mouhid - ok
12:21:25.0500 2204 MountMgr (65653f3b4477f3c63e68a9659f85ee2e) C:\WINDOWS\system32\drivers\MountMgr.sys
12:21:25.0500 2204 MountMgr - ok
12:21:25.0531 2204 mraid35x - ok
12:21:25.0593 2204 MRxDAV (46edcc8f2db2f322c24f48785cb46366) C:\WINDOWS\system32\DRIVERS\mrxdav.sys
12:21:25.0593 2204 MRxDAV - ok
12:21:25.0656 2204 MRxSmb (6f2d483b97b395544e59749c47963c6a) C:\WINDOWS\system32\DRIVERS\mrxsmb.sys
12:21:25.0671 2204 MRxSmb - ok
12:21:25.0718 2204 Msfs (561b3a4333ca2dbdba28b5b956822519) C:\WINDOWS\system32\drivers\Msfs.sys
12:21:25.0734 2204 Msfs - ok
12:21:25.0796 2204 MSKSSRV (ae431a8dd3c1d0d0610cdbac16057ad0) C:\WINDOWS\system32\drivers\MSKSSRV.sys
12:21:25.0796 2204 MSKSSRV - ok
12:21:25.0859 2204 MSPCLOCK (13e75fef9dfeb08eeded9d0246e1f448) C:\WINDOWS\system32\drivers\MSPCLOCK.sys
12:21:25.0859 2204 MSPCLOCK - ok
12:21:25.0937 2204 MSPQM (1988a33ff19242576c3d0ef9ce785da7) C:\WINDOWS\system32\drivers\MSPQM.sys
12:21:25.0937 2204 MSPQM - ok
12:21:26.0000 2204 mssmbios (469541f8bfd2b32659d5d463a6714bce) C:\WINDOWS\system32\DRIVERS\mssmbios.sys
12:21:26.0000 2204 mssmbios - ok
12:21:26.0062 2204 MSTEE (bf13612142995096ab084f2db7f40f77) C:\WINDOWS\system32\drivers\MSTEE.sys
12:21:26.0062 2204 MSTEE - ok
12:21:26.0140 2204 Mup (82035e0f41c2dd05ae41d27fe6cf7de1) C:\WINDOWS\system32\drivers\Mup.sys
12:21:26.0140 2204 Mup - ok
12:21:26.0218 2204 NABTSFEC (5c8dc6429c43dc6177c1fa5b76290d1a) C:\WINDOWS\system32\DRIVERS\NABTSFEC.sys
12:21:26.0218 2204 NABTSFEC - ok
12:21:26.0296 2204 NDIS (558635d3af1c7546d26067d5d9b6959e) C:\WINDOWS\system32\drivers\NDIS.sys
12:21:26.0296 2204 NDIS - ok
12:21:26.0359 2204 NdisIP (520ce427a8b298f54112857bcf6bde15) C:\WINDOWS\system32\DRIVERS\NdisIP.sys
12:21:26.0359 2204 NdisIP - ok
12:21:26.0421 2204 NdisTapi (08d43bbdacdf23f34d79e44ed35c1b4c) C:\WINDOWS\system32\DRIVERS\ndistapi.sys
12:21:26.0421 2204 NdisTapi - ok
12:21:26.0484 2204 Ndisuio (34d6cd56409da9a7ed573e1c90a308bf) C:\WINDOWS\system32\DRIVERS\ndisuio.sys
12:21:26.0484 2204 Ndisuio - ok
12:21:26.0546 2204 NdisWan (0b90e255a9490166ab368cd55a529893) C:\WINDOWS\system32\DRIVERS\ndiswan.sys
12:21:26.0546 2204 NdisWan - ok
12:21:26.0625 2204 NDProxy (59fc3fb44d2669bc144fd87826bb571f) C:\WINDOWS\system32\drivers\NDProxy.sys
12:21:26.0625 2204 NDProxy - ok
12:21:26.0671 2204 NetBIOS (3a2aca8fc1d7786902ca434998d7ceb4) C:\WINDOWS\system32\DRIVERS\netbios.sys
12:21:26.0671 2204 NetBIOS - ok
12:21:26.0734 2204 NetBT (0c80e410cd2f47134407ee7dd19cc86b) C:\WINDOWS\system32\DRIVERS\netbt.sys
12:21:26.0734 2204 NetBT - ok
12:21:26.0812 2204 Npfs (4f601bcb8f64ea3ac0994f98fed03f8e) C:\WINDOWS\system32\drivers\Npfs.sys
12:21:26.0828 2204 Npfs - ok
12:21:26.0890 2204 Ntfs (b78be402c3f63dd55521f73876951cdd) C:\WINDOWS\system32\drivers\Ntfs.sys
12:21:26.0906 2204 Ntfs - ok
12:21:26.0984 2204 NTIDrvr (5535174933a08bb8f1cee26dffb930e4) C:\WINDOWS\system32\DRIVERS\NTIDrvr.sys
12:21:26.0984 2204 NTIDrvr - ok
12:21:27.0046 2204 Null (73c1e1f395918bc2c6dd67af7591a3ad) C:\WINDOWS\system32\drivers\Null.sys
12:21:27.0046 2204 Null - ok
12:21:27.0156 2204 nv (2b298519edbfcf451d43e0f1e8f1006d) C:\WINDOWS\system32\DRIVERS\nv4_mini.sys
12:21:27.0187 2204 nv - ok
12:21:27.0250 2204 nvatabus (46deed4c6c5fa765f9a2c723be60348d) C:\WINDOWS\system32\DRIVERS\nvatabus.sys
12:21:27.0250 2204 nvatabus - ok
12:21:27.0296 2204 nvax (47b3852808dd579a463fce7085b77413) C:\WINDOWS\system32\drivers\nvax.sys
12:21:27.0312 2204 nvax - ok
12:21:27.0359 2204 NVENETFD (23297b3c2ff3510e2e760714fc6f094e) C:\WINDOWS\system32\DRIVERS\NVENETFD.sys
12:21:27.0359 2204 NVENETFD - ok
12:21:27.0421 2204 nvnetbus (bcc3722a2db99ad6f367344997c26654) C:\WINDOWS\system32\DRIVERS\nvnetbus.sys
12:21:27.0421 2204 nvnetbus - ok
12:21:27.0484 2204 nvnforce (adbcba116496229a163193bbe0bb28ce) C:\WINDOWS\system32\drivers\nvapu.sys
12:21:27.0500 2204 nvnforce - ok
12:21:27.0562 2204 nv_agp (3194e2f6c9000c39dcf9d0580754f714) C:\WINDOWS\system32\DRIVERS\nv_agp.sys
12:21:27.0562 2204 nv_agp - ok
12:21:27.0609 2204 NwlnkFlt (b305f3fad35083837ef46a0bbce2fc57) C:\WINDOWS\system32\DRIVERS\nwlnkflt.sys
12:21:27.0609 2204 NwlnkFlt - ok
12:21:27.0671 2204 NwlnkFwd (c99b3415198d1aab7227f2c88fd664b9) C:\WINDOWS\system32\DRIVERS\nwlnkfwd.sys
12:21:27.0671 2204 NwlnkFwd - ok
12:21:27.0765 2204 Parport (29744eb4ce659dfe3b4122deb45bc478) C:\WINDOWS\system32\DRIVERS\parport.sys
12:21:27.0765 2204 Parport - ok
12:21:27.0843 2204 PartMgr (3334430c29dc338092f79c38ef7b4cd0) C:\WINDOWS\system32\drivers\PartMgr.sys
12:21:27.0843 2204 PartMgr - ok
12:21:27.0937 2204 ParVdm (70e98b3fd8e963a6a46a2e6247e0bea1) C:\WINDOWS\system32\drivers\ParVdm.sys
12:21:27.0937 2204 ParVdm - ok
12:21:28.0031 2204 PCI (8086d9979234b603ad5bc2f5d890b234) C:\WINDOWS\system32\DRIVERS\pci.sys
12:21:28.0031 2204 PCI - ok
12:21:28.0078 2204 PCIDump - ok
12:21:28.0125 2204 PCIIde (ccf5f451bb1a5a2a522a76e670000ff0) C:\WINDOWS\system32\DRIVERS\pciide.sys
12:21:28.0125 2204 PCIIde - ok
12:21:28.0218 2204 Pcmcia (82a087207decec8456fbe8537947d579) C:\WINDOWS\system32\drivers\Pcmcia.sys
12:21:28.0234 2204 Pcmcia - ok
12:21:28.0328 2204 pcouffin (5b6c11de7e839c05248ced8825470fef) C:\WINDOWS\system32\Drivers\pcouffin.sys
12:21:28.0328 2204 pcouffin - ok
12:21:28.0390 2204 PDCOMP - ok
12:21:28.0421 2204 PDFRAME - ok
12:21:28.0453 2204 PDRELI - ok
12:21:28.0500 2204 PDRFRAME - ok
12:21:28.0531 2204 perc2 - ok
12:21:28.0562 2204 perc2hib - ok
12:21:28.0656 2204 PptpMiniport (1c5cc65aac0783c344f16353e60b72ac) C:\WINDOWS\system32\DRIVERS\raspptp.sys
12:21:28.0656 2204 PptpMiniport - ok
12:21:28.0734 2204 PSched (48671f327553dcf1d27f6197f622a668) C:\WINDOWS\system32\DRIVERS\psched.sys
12:21:28.0734 2204 PSched - ok
12:21:28.0796 2204 Ptilink (80d317bd1c3dbc5d4fe7b1678c60cadd) C:\WINDOWS\system32\DRIVERS\ptilink.sys
12:21:28.0796 2204 Ptilink - ok
12:21:28.0859 2204 PxHelp20 (d86b4a68565e444d76457f14172c875a) C:\WINDOWS\system32\Drivers\PxHelp20.sys
12:21:28.0859 2204 PxHelp20 - ok
12:21:28.0921 2204 ql1080 - ok
12:21:28.0953 2204 Ql10wnt - ok
12:21:28.0968 2204 ql12160 - ok
12:21:29.0000 2204 ql1240 - ok
12:21:29.0031 2204 ql1280 - ok
12:21:29.0078 2204 RasAcd (fe0d99d6f31e4fad8159f690d68ded9c) C:\WINDOWS\system32\DRIVERS\rasacd.sys
12:21:29.0078 2204 RasAcd - ok
12:21:29.0140 2204 Rasl2tp (98faeb4a4dcf812ba1c6fca4aa3e115c) C:\WINDOWS\system32\DRIVERS\rasl2tp.sys
12:21:29.0140 2204 Rasl2tp - ok
12:21:29.0218 2204 RasPppoe (7306eeed8895454cbed4669be9f79faa) C:\WINDOWS\system32\DRIVERS\raspppoe.sys
12:21:29.0218 2204 RasPppoe - ok
12:21:29.0281 2204 Raspti (fdbb1d60066fcfbb7452fd8f9829b242) C:\WINDOWS\system32\DRIVERS\raspti.sys
12:21:29.0281 2204 Raspti - ok
12:21:29.0343 2204 Rdbss (29d66245adba878fff574cd66abd2884) C:\WINDOWS\system32\DRIVERS\rdbss.sys
12:21:29.0343 2204 Rdbss - ok
12:21:29.0390 2204 RDPCDD (4912d5b403614ce99c28420f75353332) C:\WINDOWS\system32\DRIVERS\RDPCDD.sys
12:21:29.0406 2204 RDPCDD - ok
12:21:29.0468 2204 RDPWD (d4f5643d7714ef499ae9527fdcd50894) C:\WINDOWS\system32\drivers\RDPWD.sys
12:21:29.0468 2204 RDPWD - ok
12:21:29.0562 2204 redbook (b31b4588e4086d8d84adbf9845c2402b) C:\WINDOWS\system32\DRIVERS\redbook.sys
12:21:29.0562 2204 redbook - ok
12:21:29.0671 2204 Secdrv (d26e26ea516450af9d072635c60387f4) C:\WINDOWS\system32\DRIVERS\secdrv.sys
12:21:29.0671 2204 Secdrv - ok
12:21:29.0765 2204 serenum (a2d868aeeff612e70e213c451a70cafb) C:\WINDOWS\system32\DRIVERS\serenum.sys
12:21:29.0765 2204 serenum - ok
12:21:29.0859 2204 Serial (cd9404d115a00d249f70a371b46d5a26) C:\WINDOWS\system32\DRIVERS\serial.sys
12:21:29.0859 2204 Serial - ok
12:21:29.0937 2204 Sfloppy (0d13b6df6e9e101013a7afb0ce629fe0) C:\WINDOWS\system32\drivers\Sfloppy.sys
12:21:29.0937 2204 Sfloppy - ok
12:21:29.0984 2204 Simbad - ok
12:21:30.0046 2204 SLIP (5caeed86821fa2c6139e32e9e05ccdc9) C:\WINDOWS\system32\DRIVERS\SLIP.sys
12:21:30.0046 2204 SLIP - ok
12:21:30.0093 2204 Sparrow - ok
12:21:30.0125 2204 SPLITCAM - ok
12:21:30.0187 2204 splitter (8e186b8f23295d1e42c573b82b80d548) C:\WINDOWS\system32\drivers\splitter.sys
12:21:30.0187 2204 splitter - ok
12:21:30.0281 2204 sptd (c4bb8a12843d9cbb65f5ff617f389bbd) C:\WINDOWS\System32\Drivers\sptd.sys
12:21:30.0296 2204 sptd - ok
12:21:30.0359 2204 sr (e41b6d037d6cd08461470af04500dc24) C:\WINDOWS\system32\DRIVERS\sr.sys
12:21:30.0359 2204 sr - ok
12:21:30.0437 2204 Srv (ab9c79ed12d65e800aaad3d72a04792f) C:\WINDOWS\system32\DRIVERS\srv.sys
12:21:30.0437 2204 Srv - ok
12:21:30.0500 2204 streamip (284c57df5dc7abca656bc2b96a667afb) C:\WINDOWS\system32\DRIVERS\StreamIP.sys
12:21:30.0515 2204 streamip - ok
12:21:30.0578 2204 swenum (03c1bae4766e2450219d20b993d6e046) C:\WINDOWS\system32\DRIVERS\swenum.sys
12:21:30.0578 2204 swenum - ok
12:21:30.0640 2204 swmidi (94abc808fc4b6d7d2bbf42b85e25bb4d) C:\WINDOWS\system32\drivers\swmidi.sys
12:21:30.0640 2204 swmidi - ok
12:21:30.0671 2204 symc810 - ok
12:21:30.0687 2204 symc8xx - ok
12:21:30.0718 2204 sym_hi - ok
12:21:30.0750 2204 sym_u3 - ok
12:21:30.0812 2204 sysaudio (650ad082d46bac0e64c9c0e0928492fd) C:\WINDOWS\system32\drivers\sysaudio.sys
12:21:30.0812 2204 sysaudio - ok
12:21:30.0906 2204 Tcpip (2a5554fc5b1e04e131230e3ce035c3f9) C:\WINDOWS\system32\DRIVERS\tcpip.sys
12:21:30.0906 2204 Tcpip - ok
12:21:30.0968 2204 TDPIPE (38d437cf2d98965f239b0abcd66dcb0f) C:\WINDOWS\system32\drivers\TDPIPE.sys
12:21:30.0968 2204 TDPIPE - ok
12:21:31.0031 2204 TDTCP (ed0580af02502d00ad8c4c066b156be9) C:\WINDOWS\system32\drivers\TDTCP.sys
12:21:31.0031 2204 TDTCP - ok
12:21:31.0093 2204 TermDD (a540a99c281d933f3d69d55e48727f47) C:\WINDOWS\system32\DRIVERS\termdd.sys
12:21:31.0093 2204 TermDD - ok
12:21:31.0140 2204 TosIde - ok
12:21:31.0218 2204 Udfs (12f70256f140cd7d52c58c7048fde657) C:\WINDOWS\system32\drivers\Udfs.sys
12:21:31.0218 2204 Udfs - ok
12:21:31.0250 2204 ultra - ok
12:21:31.0328 2204 Update (aff2e5045961bbc0a602bb6f95eb1345) C:\WINDOWS\system32\DRIVERS\update.sys
12:21:31.0328 2204 Update - ok
12:21:31.0406 2204 usbaudio (45a0d14b26c35497ad93bce7e15c9941) C:\WINDOWS\system32\drivers\usbaudio.sys
12:21:31.0406 2204 usbaudio - ok
12:21:31.0468 2204 usbccgp (bffd9f120cc63bcbaa3d840f3eef9f79) C:\WINDOWS\system32\DRIVERS\usbccgp.sys
12:21:31.0468 2204 usbccgp - ok
12:21:31.0531 2204 usbehci (15e993ba2f6946b2bfbbfcd30398621e) C:\WINDOWS\system32\DRIVERS\usbehci.sys
12:21:31.0531 2204 usbehci - ok
12:21:31.0578 2204 usbhub (c72f40947f92cea56a8fb532edf025f1) C:\WINDOWS\system32\DRIVERS\usbhub.sys
12:21:31.0578 2204 usbhub - ok
12:21:31.0656 2204 usbohci (bdfe799a8531bad8a5a985821fe78760) C:\WINDOWS\system32\DRIVERS\usbohci.sys
12:21:31.0656 2204 usbohci - ok
12:21:31.0703 2204 usbprint (a42369b7cd8886cd7c70f33da6fcbcf5) C:\WINDOWS\system32\DRIVERS\usbprint.sys
12:21:31.0703 2204 usbprint - ok
12:21:31.0781 2204 usbscan (a6bc71402f4f7dd5b77fd7f4a8ddba85) C:\WINDOWS\system32\DRIVERS\usbscan.sys
12:21:31.0781 2204 usbscan - ok
12:21:31.0875 2204 usbstor (6cd7b22193718f1d17a47a1cd6d37e75) C:\WINDOWS\system32\DRIVERS\USBSTOR.SYS
12:21:31.0875 2204 usbstor - ok
12:21:31.0937 2204 VgaSave (8a60edd72b4ea5aea8202daf0e427925) C:\WINDOWS\System32\drivers\vga.sys
12:21:31.0937 2204 VgaSave - ok
12:21:32.0000 2204 ViaIde - ok
12:21:32.0078 2204 VolSnap (ee4660083deba849ff6c485d944b379b) C:\WINDOWS\system32\drivers\VolSnap.sys
12:21:32.0093 2204 VolSnap - ok
12:21:32.0171 2204 Wanarp (984ef0b9788abf89974cfed4bfbaacbc) C:\WINDOWS\system32\DRIVERS\wanarp.sys
12:21:32.0171 2204 Wanarp - ok
12:21:32.0203 2204 WDICA - ok
12:21:32.0250 2204 wdmaud (2797f33ebf50466020c430ee4f037933) C:\WINDOWS\system32\drivers\wdmaud.sys
12:21:32.0250 2204 wdmaud - ok
12:21:32.0359 2204 WS2IFSL (6abe6e225adb5a751622a9cc3bc19ce8) C:\WINDOWS\System32\drivers\ws2ifsl.sys
12:21:32.0359 2204 WS2IFSL - ok
12:21:32.0437 2204 WSTCODEC (d5842484f05e12121c511aa93f6439ec) C:\WINDOWS\system32\DRIVERS\WSTCODEC.SYS
12:21:32.0437 2204 WSTCODEC - ok
12:21:32.0515 2204 MBR (0x1B8) (8f558eb6672622401da993e1e865c861) \Device\Harddisk0\DR0
12:21:32.0656 2204 \Device\Harddisk0\DR0 - ok
12:21:32.0671 2204 Boot (0x1200) (752082a47b47f024dc6fd153d242f944) \Device\Harddisk0\DR0\Partition0
12:21:32.0671 2204 \Device\Harddisk0\DR0\Partition0 - ok
12:21:32.0687 2204 ============================================================
12:21:32.0687 2204 Scan finished
12:21:32.0687 2204 ============================================================
12:21:32.0703 1576 Detected object count: 0
12:21:32.0703 1576 Actual detected object count: 0
12:28:42.0703 1288 Deinitialize success



aswMBR version 0.9.9.1618 Copyright© 2011 AVAST Software
Run date: 2012-02-24 12:31:36
-----------------------------
12:31:36.531 OS Version: Windows 5.1.2600 Service Pack 2
12:31:36.531 Number of processors: 1 586 0xA00
12:31:36.546 ComputerName: LORI-513E4B4E73 UserName: LORI
12:31:37.109 Initialize success
12:31:37.203 AVAST engine defs: 12022401
12:31:45.281 Disk 0 (boot) \Device\Harddisk0\DR0 -> \Device\00000059
12:31:45.281 Disk 0 Vendor: ST3160021A 8.01 Size: 152627MB BusType: 3
12:31:45.312 Disk 0 MBR read successfully
12:31:45.312 Disk 0 MBR scan
12:31:45.312 Disk 0 Windows XP default MBR code
12:31:45.312 Disk 0 Partition 1 80 (A) 07 HPFS/NTFS NTFS 152617 MB offset 63
12:31:45.328 Disk 0 scanning sectors +312560640
12:31:45.406 Disk 0 scanning C:\WINDOWS\system32\drivers
12:31:56.937 Service scanning
12:32:11.718 Modules scanning
12:32:27.203 Disk 0 trace - called modules:
12:32:27.218 ntoskrnl.exe catchme.sys CLASSPNP.SYS disk.sys ACPI.sys hal.dll nvatabus.sys
12:32:27.218 1 nt!IofCallDriver -> \Device\Harddisk0\DR0[0x89819ab8]
12:32:27.734 3 CLASSPNP.SYS[f763805b] -> nt!IofCallDriver -> \Device\0000005c[0x89760598]
12:32:27.734 5 ACPI.sys[f75ae620] -> nt!IofCallDriver -> \Device\00000059[0x8982d6e8]
12:32:28.218 AVAST engine scan C:\WINDOWS
12:32:41.812 AVAST engine scan C:\WINDOWS\system32
12:35:34.859 AVAST engine scan C:\WINDOWS\system32\drivers
12:35:58.593 AVAST engine scan C:\Documents and Settings\LORI
12:40:15.843 AVAST engine scan C:\Documents and Settings\All Users
12:42:02.906 Scan finished successfully
12:45:08.937 Disk 0 MBR has been saved successfully to "C:\Documents and Settings\LORI\Desktop\MBR.dat"
12:45:08.937 The log file has been saved successfully to "C:\Documents and Settings\LORI\Desktop\aswMBR.txt"



Thanks!this was a world of help!

#12 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:06:30 AM

Posted 24 February 2012 - 03:55 PM

Greetings

At this time I would like you to run this script for me and it is a good time to check out the computer to see if there is anything else that needs to be addressed.

:Run CFScript:

Open Notepad and copy/paste the text in the box into the window:

ClearJavaCache::

Firefox::
FF - ProfilePath - c:\documents and settings\LORI\Application Data\Mozilla\Firefox\Profiles\40pxd4n0.default\
FF - prefs.js: network.proxy.http - 127.0.0.1
FF - prefs.js: network.proxy.http_port - 5555

Save it to your desktop as CFScript.txt

Refering to the picture above, drag CFScript.txt into ComboFix.exe
Posted Image
This will let ComboFix run again.
Restart if you have to.
Save the produced logfile to your desktop.

Note: Do not mouseclick combofix's window whilst it's running. That may cause it to stall

Note 2: If you recieve an error "Illegal operation attempted on a registery key that has been marked for deletion." Please restart the computer

"information and logs"

  • In your next post I need the following

  • report from Combofix
  • let me know of any problems you may have had
  • How is the computer doing now after running the script?

Gringo

I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#13 HarriJames

HarriJames
  • Topic Starter

  • Members
  • 10 posts
  • OFFLINE
  •  
  • Local time:05:30 AM

Posted 24 February 2012 - 04:19 PM

ComboFix 12-02-22.01 - LORI 02/24/2012 13:03:38.6.1 - x86
Microsoft Windows XP Home Edition 5.1.2600.2.1252.1.1033.18.1471.847 [GMT -8:00]
Running from: c:\documents and settings\LORI\Desktop\ComboFix.exe
Command switches used :: c:\documents and settings\LORI\Desktop\CFScript.txt
AV: avast! Antivirus *Disabled/Updated* {7591DB91-41F0-48A3-B128-1A293FD8233D}
.
.
((((((((((((((((((((((((( Files Created from 2012-01-24 to 2012-02-24 )))))))))))))))))))))))))))))))
.
.
2012-02-20 16:50 . 2006-01-13 07:14 278528 ----a-w- c:\windows\system32\hpdj5600
2012-02-10 16:16 . 2012-02-10 16:16 -------- d-----w- c:\documents and settings\LORI\Application Data\Malwarebytes
2012-02-10 16:16 . 2012-02-10 16:16 -------- d-----w- c:\documents and settings\All Users\Application Data\Malwarebytes
2012-02-10 16:16 . 2011-12-10 23:24 20464 ----a-w- c:\windows\system32\drivers\mbam.sys
2012-02-10 16:16 . 2012-02-10 16:16 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
2012-02-10 00:59 . 2011-11-28 17:53 314456 ----a-w- c:\windows\system32\drivers\aswSP.sys
2012-02-10 00:59 . 2011-11-28 17:51 20568 ----a-w- c:\windows\system32\drivers\aswFsBlk.sys
2012-02-10 00:59 . 2011-11-28 17:53 435032 ----a-w- c:\windows\system32\drivers\aswSnx.sys
2012-02-10 00:59 . 2011-11-28 17:52 34392 ----a-w- c:\windows\system32\drivers\aswRdr.sys
2012-02-10 00:59 . 2011-11-28 17:52 52952 ----a-w- c:\windows\system32\drivers\aswTdi.sys
2012-02-10 00:59 . 2011-11-28 17:52 111320 ----a-w- c:\windows\system32\drivers\aswmon2.sys
2012-02-10 00:59 . 2011-11-28 17:51 105176 ----a-w- c:\windows\system32\drivers\aswmon.sys
2012-02-10 00:59 . 2011-11-28 17:48 30808 ----a-w- c:\windows\system32\drivers\aavmker4.sys
2012-02-10 00:58 . 2011-11-28 18:01 41184 ----a-w- c:\windows\avastSS.scr
2012-02-10 00:58 . 2011-11-28 18:01 199816 ----a-w- c:\windows\system32\aswBoot.exe
2012-02-10 00:58 . 2012-02-10 00:58 -------- d-----w- c:\program files\AVAST Software
2012-02-10 00:58 . 2012-02-10 00:58 -------- d-----w- c:\documents and settings\All Users\Application Data\AVAST Software
2012-02-09 22:18 . 2012-02-09 22:18 -------- d-----w- c:\documents and settings\Administrator\Local Settings\Application Data\Mozilla
2012-02-09 21:41 . 2012-02-09 21:41 -------- d-----w- c:\program files\Support Tools
.
.
.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2012-02-24 19:11 . 2004-08-04 12:00 507904 ----a-w- c:\windows\system32\winlogon.exe
2012-02-24 19:11 . 2004-08-04 12:00 14336 ----a-w- c:\windows\system32\svchost.exe
2012-02-24 19:11 . 2004-08-04 12:00 1033728 ----a-w- c:\windows\explorer.exe
2011-06-20 01:21 . 2010-03-12 00:01 8192 ----a-w- c:\program files\SpyFlushregTemp.reg
2011-12-01 20:10 . 2011-06-23 19:15 134104 ----a-w- c:\program files\mozilla firefox\components\browsercomps.dll
.
.
------- Sigcheck -------
Note: Unsigned files aren't necessarily malware.
.
[-] 2012-02-24 . ED0EF0A136DEC83DF69F04118870003E . 507904 . . [5.1.2600.5512] . . c:\windows\system32\winlogon.exe
[-] 2008-04-14 . ED0EF0A136DEC83DF69F04118870003E . 507904 . . [5.1.2600.5512] . . c:\windows\SoftwareDistribution\Download\9866fb57abdc0ea2f5d4e132d055ba4e\winlogon.exe
.
[-] 2012-02-24 . 27C6D03BCDB8CFEB96B716F3D8BE3E18 . 14336 . . [5.1.2600.5512] . . c:\windows\system32\svchost.exe
[-] 2008-04-14 . 27C6D03BCDB8CFEB96B716F3D8BE3E18 . 14336 . . [5.1.2600.5512] . . c:\windows\SoftwareDistribution\Download\9866fb57abdc0ea2f5d4e132d055ba4e\svchost.exe
.
[-] 2012-02-24 . 12896823FB95BFB3DC9B46BCAEDC9923 . 1033728 . . [6.00.2900.5512] . . c:\windows\explorer.exe
[-] 2008-04-14 . 12896823FB95BFB3DC9B46BCAEDC9923 . 1033728 . . [6.00.2900.5512] . . c:\windows\SoftwareDistribution\Download\9866fb57abdc0ea2f5d4e132d055ba4e\explorer.exe
[7] 2007-06-13 . 7712DF0CDDE3A5AC89843E61CD5B3658 . 1033216 . . [6.00.2900.3156] . . c:\windows\SoftwareDistribution\Download\44d74c37f0595a363bcec5e9229d8564\sp2qfe\explorer.exe
[7] 2007-06-13 . 97BD6515465659FF8F3B7BE375B2EA87 . 1033216 . . [6.00.2900.3156] . . c:\windows\SoftwareDistribution\Download\44d74c37f0595a363bcec5e9229d8564\sp2gdr\explorer.exe
.
((((((((((((((((((((((((((((( SnapShot@2012-02-22_23.47.59 )))))))))))))))))))))))))))))))))))))))))
.
+ 2012-02-24 19:12 . 2012-02-24 19:12 16384 c:\windows\Temp\Perflib_Perfdata_294.dat
+ 2012-02-24 16:41 . 2012-02-24 19:10 49152 c:\windows\system32\config\systemprofile\Local Settings\History\History.IE5\MSHist012012022420120225\index.dat
+ 2012-02-23 04:12 . 2012-02-23 07:02 65536 c:\windows\system32\config\systemprofile\Local Settings\History\History.IE5\MSHist012012022220120223\index.dat
+ 2012-02-23 04:12 . 2012-02-23 04:12 81920 c:\windows\system32\config\systemprofile\Local Settings\History\History.IE5\MSHist012012021320120220\index.dat
+ 2010-02-18 20:31 . 2012-02-24 01:11 35088 c:\windows\Installer\{90120000-0030-0000-0000-0000000FF1CE}\oisicon.exe
- 2010-02-18 20:31 . 2011-04-11 03:06 35088 c:\windows\Installer\{90120000-0030-0000-0000-0000000FF1CE}\oisicon.exe
+ 2010-02-18 20:31 . 2012-02-24 01:11 18704 c:\windows\Installer\{90120000-0030-0000-0000-0000000FF1CE}\mspicons.exe
- 2010-02-18 20:31 . 2011-04-11 03:06 18704 c:\windows\Installer\{90120000-0030-0000-0000-0000000FF1CE}\mspicons.exe
- 2010-02-18 20:31 . 2011-04-11 03:06 20240 c:\windows\Installer\{90120000-0030-0000-0000-0000000FF1CE}\cagicon.exe
+ 2010-02-18 20:31 . 2012-02-24 01:11 20240 c:\windows\Installer\{90120000-0030-0000-0000-0000000FF1CE}\cagicon.exe
+ 2010-01-31 02:52 . 2012-02-24 19:10 131072 c:\windows\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\index.dat
- 2010-01-31 02:52 . 2012-02-17 00:11 131072 c:\windows\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\index.dat
+ 2012-02-23 08:24 . 2012-02-24 01:12 245760 c:\windows\system32\config\systemprofile\Local Settings\History\History.IE5\MSHist012012022320120224\index.dat
+ 2010-01-31 02:52 . 2012-02-24 19:10 442368 c:\windows\system32\config\systemprofile\Local Settings\History\History.IE5\index.dat
+ 2010-02-18 20:31 . 2012-02-24 01:11 888080 c:\windows\Installer\{90120000-0030-0000-0000-0000000FF1CE}\wordicon.exe
- 2010-02-18 20:31 . 2011-04-11 03:06 888080 c:\windows\Installer\{90120000-0030-0000-0000-0000000FF1CE}\wordicon.exe
+ 2010-02-18 20:31 . 2012-02-24 01:11 272648 c:\windows\Installer\{90120000-0030-0000-0000-0000000FF1CE}\pubs.exe
- 2010-02-18 20:31 . 2011-04-11 03:06 272648 c:\windows\Installer\{90120000-0030-0000-0000-0000000FF1CE}\pubs.exe
+ 2010-02-18 20:31 . 2012-02-24 01:11 922384 c:\windows\Installer\{90120000-0030-0000-0000-0000000FF1CE}\pptico.exe
- 2010-02-18 20:31 . 2011-04-11 03:06 922384 c:\windows\Installer\{90120000-0030-0000-0000-0000000FF1CE}\pptico.exe
+ 2010-02-18 20:31 . 2012-02-24 01:11 845584 c:\windows\Installer\{90120000-0030-0000-0000-0000000FF1CE}\outicon.exe
- 2010-02-18 20:31 . 2011-04-11 03:06 845584 c:\windows\Installer\{90120000-0030-0000-0000-0000000FF1CE}\outicon.exe
- 2010-02-18 20:31 . 2011-04-11 03:06 217864 c:\windows\Installer\{90120000-0030-0000-0000-0000000FF1CE}\misc.exe
+ 2010-02-18 20:31 . 2012-02-24 01:11 217864 c:\windows\Installer\{90120000-0030-0000-0000-0000000FF1CE}\misc.exe
- 2010-02-18 20:31 . 2011-04-11 03:06 184080 c:\windows\Installer\{90120000-0030-0000-0000-0000000FF1CE}\joticon.exe
+ 2010-02-18 20:31 . 2012-02-24 01:11 184080 c:\windows\Installer\{90120000-0030-0000-0000-0000000FF1CE}\joticon.exe
- 2010-02-18 20:31 . 2011-04-11 03:06 159504 c:\windows\Installer\{90120000-0030-0000-0000-0000000FF1CE}\inficon.exe
+ 2010-02-18 20:31 . 2012-02-24 01:11 159504 c:\windows\Installer\{90120000-0030-0000-0000-0000000FF1CE}\inficon.exe
+ 2012-02-03 23:13 . 2012-02-03 23:13 4988928 c:\windows\Installer\1befcca.msp
+ 2010-02-18 20:31 . 2012-02-24 01:11 1172240 c:\windows\Installer\{90120000-0030-0000-0000-0000000FF1CE}\xlicons.exe
- 2010-02-18 20:31 . 2011-04-11 03:06 1172240 c:\windows\Installer\{90120000-0030-0000-0000-0000000FF1CE}\xlicons.exe
- 2010-02-18 20:31 . 2011-04-11 03:06 1165584 c:\windows\Installer\{90120000-0030-0000-0000-0000000FF1CE}\accicons.exe
+ 2010-02-18 20:31 . 2012-02-24 01:11 1165584 c:\windows\Installer\{90120000-0030-0000-0000-0000000FF1CE}\accicons.exe
+ 2006-09-15 23:25 . 2006-09-15 23:25 3611416 c:\windows\Installer\$PatchCache$\Managed\00002109030000000000000000F01FEC\12.0.4518\OUTLFLTR.DAT
+ 2010-02-08 04:35 . 2012-01-27 07:20 52550552 c:\windows\system32\MRT.exe
.
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shelliconoverlayidentifiers\00avast]
@="{472083B0-C522-11CF-8763-00608CC02F24}"
[HKEY_CLASSES_ROOT\CLSID\{472083B0-C522-11CF-8763-00608CC02F24}]
2011-11-28 18:01 122512 ----a-w- c:\program files\AVAST Software\Avast\ashShell.dll
.
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"SpybotSD TeaTimer"="c:\program files\Spybot - Search & Destroy\TeaTimer.exe" [2009-03-06 2260480]
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"avast"="c:\program files\AVAST Software\Avast\avastUI.exe" [2011-11-28 3744552]
"Malwarebytes' Anti-Malware"="c:\program files\Malwarebytes' Anti-Malware\mbamgui.exe" [2012-01-13 460872]
.
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]
"DisableNotifications"= 1 (0x1)
.
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"c:\\Program Files\\3CXPhone\\3CXPhone.exe"=
"c:\\Documents and Settings\\LORI\\Application Data\\mjusbsp\\magicJack.exe"=
.
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\GloballyOpenPorts\List]
"21438:TCP"= 21438:TCP:BitComet 21438 TCP
"21438:UDP"= 21438:UDP:BitComet 21438 UDP
.
R1 aswSnx;aswSnx;c:\windows\system32\drivers\aswSnx.sys [2/9/2012 4:59 PM 435032]
R1 aswSP;aswSP;c:\windows\system32\drivers\aswSP.sys [2/9/2012 4:59 PM 314456]
R2 aswFsBlk;aswFsBlk;c:\windows\system32\drivers\aswFsBlk.sys [2/9/2012 4:59 PM 20568]
R2 MBAMService;MBAMService;c:\program files\Malwarebytes' Anti-Malware\mbamservice.exe [2/10/2012 8:16 AM 652360]
R3 MBAMProtector;MBAMProtector;c:\windows\system32\drivers\mbam.sys [2/10/2012 8:16 AM 20464]
S2 gupdate;Google Update Service (gupdate);c:\program files\Google\Update\GoogleUpdate.exe [2/6/2010 9:02 PM 135664]
S3 gupdatem;Google Update Service (gupdatem);c:\program files\Google\Update\GoogleUpdate.exe [2/6/2010 9:02 PM 135664]
S3 pcouffin;VSO Software pcouffin;c:\windows\system32\drivers\pcouffin.sys [4/30/2010 3:26 PM 47360]
S4 sptd;sptd;c:\windows\system32\drivers\sptd.sys [7/7/2010 3:15 PM 697328]
.
--- Other Services/Drivers In Memory ---
.
*NewlyCreated* - 77641324
*Deregistered* - 77641324
*Deregistered* - aswMBR
.
Contents of the 'Scheduled Tasks' folder
.
2012-02-24 c:\windows\Tasks\GoogleUpdateTaskMachineCore.job
- c:\program files\Google\Update\GoogleUpdate.exe [2010-02-07 05:02]
.
2012-02-24 c:\windows\Tasks\GoogleUpdateTaskMachineUA.job
- c:\program files\Google\Update\GoogleUpdate.exe [2010-02-07 05:02]
.
.
------- Supplementary Scan -------
.
uStart Page = hxxp://google.com/
uInternet Connection Wizard,ShellNext = iexplore
uInternet Settings,ProxyOverride = <local>
uSearchAssistant = hxxp://www.google.com/ie
uSearchURL,(Default) = hxxp://www.google.com/search?q=%s
IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~3\Office12\EXCEL.EXE/3000
IE: Google Sidewiki... - c:\program files\Google\Google Toolbar\Component\GoogleToolbarDynamic_mui_en_D183CA64F05FDD98.dll/cmsidewiki.html
TCP: DhcpNameServer = 192.168.10.254
FF - ProfilePath - c:\documents and settings\LORI\Application Data\Mozilla\Firefox\Profiles\40pxd4n0.default\
FF - prefs.js: browser.startup.homepage - hxxp://google.com/
FF - prefs.js: network.proxy.type - 0
.
.
**************************************************************************
.
catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2012-02-24 13:12
Windows 5.1.2600 Service Pack 2 NTFS
.
scanning hidden processes ...
.
scanning hidden autostart entries ...
.
scanning hidden files ...
.
scan completed successfully
hidden files: 0
.
**************************************************************************
.
Completion time: 2012-02-24 13:17:02
ComboFix-quarantined-files.txt 2012-02-24 21:16
ComboFix2.txt 2012-02-24 19:44
ComboFix3.txt 2012-02-24 17:00
ComboFix4.txt 2012-02-23 04:33
ComboFix5.txt 2012-02-24 21:01
.
Pre-Run: 144,327,131,136 bytes free
Post-Run: 144,318,496,768 bytes free
.
- - End Of File - - B11240DF3BD57FB43DA314A1EE90E19F

#14 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:06:30 AM

Posted 24 February 2012 - 05:04 PM

These logs are looking allot better. But we still have some work to do.

Please print out these instructions, or copy them to a Notepad file. It will make it easier for you to follow the instructions and complete all of the necessary steps..

uninstall some programs

NOTE** Because of the cleanup process some of the programs I have listed may not be in add/remove anymore this is fine just move to the next item on the list.

You can remove these programs using add/remove or you can use the free uninstaller from Revo (Revo does allot better of a job)

Programs to remove

Java™ 6 Update 27 [/list]


  • Please download and install Revo Uninstaller Free
  • Double click Revo Uninstaller to run it.
  • From the list of programs double click on The Program to remove
  • When prompted if you want to uninstall click Yes.
  • Be sure the Moderate option is selected then click Next.
  • The program will run, If prompted again click Yes
  • when the built-in uninstaller is finished click on Next.
  • Once the program has searched for leftovers click Next.
  • Check/tick the bolded items only on the list then click Delete
  • when prompted click on Yes and then on next.
  • put a check on any folders that are found and select delete
  • when prompted select yes then on next
  • Once done click Finish.
.



Install Java:

Please go here to install Java

  • click on the Free Java Download Button
  • click on Agree and start Free download
  • click on Run
  • click on run again
  • click on install
  • when install is complete click on close

TFC(Temp File Cleaner):

  • Please download TFC to your desktop,
  • Save any unsaved work. TFC will close all open application windows.
  • Double-click TFC.exe to run the program.
  • If prompted, click "Yes" to reboot.
Note: Save your work. TFC will automatically close any open programs, let it run uninterrupted. It shouldn't take longer take a couple of minutes, and may only take a few seconds. Only if needed will you be prompted to reboot.

: Malwarebytes' Anti-Malware :

  • I would like you to rerun MBAM
  • Double-click mbam icon
  • go to the update tab at the top
  • click on check for updates
  • If an update is found, it will download and install the latest version.
  • Once the program has loaded, select Perform quick scan, then click Scan.
  • When the scan is complete, click OK, then Show Results to view the results.
  • Be sure that everything is Checked (ticked) except items in the C:\System Volume Information folder and click on Remove Selected.
  • When completed, a log will open in Notepad. please copy and paste the log into your next reply
  • If you accidentally close it, the log file is saved here and will be named like this:
  • C:\Documents and Settings\Username\Application Data\Malwarebytes\Malwarebytes' Anti-Malware\Logs\mbam-log-date (time).txt

Note: If MBAM encounters a file that is difficult to remove, you will be presented with 1 of 2 prompts.
Click OK to either and let MBAM proceed with the disinfection process.
If asked to restart the computer, please do so immediately. Failure to reboot will prevent MBAM from removing all the malware.


Download HijackThis

If you have any problems running Hijackthis see NOTE** below (Host file not read, blank notepad ...)

  • Go Here to download HijackThis Installer
  • Save HijackThis Installer to your desktop.
  • Double-click on the HijackThis Installer icon on your desktop. (Vista and Win 7 right click and run as admin)
  • By default it will install to C:\Program Files\Trend Micro\HijackThis .
  • Click on Install.
  • It will create a HijackThis icon on the desktop.
  • Once installed it will launch Hijackthis.
  • Click on the Do a system scan and save a log file button. It will scan and the log should open in notepad.
  • Click on Edit > Select All then click on Edit > Copy to copy the entire contents of the log.
  • Come back here to this thread and Paste the log in your next reply.
  • DO NOT use the Analyze This button its findings are dangerous if misinterpreted.
  • DO NOT have Hijackthis fix anything yet. Most of what it finds will be harmless or even required.

NOTE**
sometimes we have to run it like this To run HijackThis as an administrator, right-click HijackThis.exe
(located: C:\Program Files\Trend Micro\HiJackThis\HiJackThis.exe)<--32bit
(located: C:\Program Files(86)\Trend Micro\HiJackThis\HiJackThis.exe)<--64bit
and select to run as administrator

"information and logs"

  • In your next post I need the following

  • Log From MBAM
  • report from Hijackthis
  • let me know of any problems you may have had
  • How is the computer doing now?

Gringo

I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#15 HarriJames

HarriJames
  • Topic Starter

  • Members
  • 10 posts
  • OFFLINE
  •  
  • Local time:05:30 AM

Posted 24 February 2012 - 06:59 PM

Malwarebytes Anti-Malware 1.60.1.1000
www.malwarebytes.org

Database version: v2012.02.24.04

Windows XP Service Pack 2 x86 NTFS
Internet Explorer 6.0.2900.2180
LORI :: LORI-513E4B4E73 [administrator]

Protection: Enabled

2/24/2012 2:39:17 PM
mbam-log-2012-02-24 (14-39-17).txt

Scan type: Full scan
Scan options enabled: Memory | Startup | Registry | File System | Heuristics/Extra | Heuristics/Shuriken | PUP | PUM
Scan options disabled: P2P
Objects scanned: 216630
Time elapsed: 1 hour(s), 1 minute(s), 38 second(s)

Memory Processes Detected: 0
(No malicious items detected)

Memory Modules Detected: 0
(No malicious items detected)

Registry Keys Detected: 0
(No malicious items detected)

Registry Values Detected: 0
(No malicious items detected)

Registry Data Items Detected: 0
(No malicious items detected)

Folders Detected: 0
(No malicious items detected)

Files Detected: 0
(No malicious items detected)

(end)


Logfile of Trend Micro HijackThis v2.0.4
Scan saved at 3:56:40 PM, on 2/24/2012
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\AVAST Software\Avast\AvastSvc.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\AVAST Software\Avast\avastUI.exe
C:\Program Files\Malwarebytes' Anti-Malware\mbamgui.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Common Files\Java\Java Update\jusched.exe
C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
C:\Program Files\Java\jre6\bin\jqs.exe
C:\Program Files\Common Files\LightScribe\LSSrvc.exe
C:\Program Files\Malwarebytes' Anti-Malware\mbamservice.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\notepad.exe
C:\Program Files\Google\Chrome\Application\chrome.exe
C:\Program Files\Google\Chrome\Application\chrome.exe
C:\Program Files\Google\Chrome\Application\chrome.exe
C:\Program Files\Google\Chrome\Application\chrome.exe
C:\WINDOWS\system32\msiexec.exe
C:\Program Files\Trend Micro\HiJackThis\HiJackThis.exe

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://google.com/
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Local Page =
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Local Page =
O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 6.0\Acrobat\ActiveX\AcroIEHelper.dll
O2 - BHO: WormRadar.com IESiteBlocker.NavFilter - {3CA2F312-6F6E-4B53-A66E-4E65E497C8C0} - C:\Program Files\AVG\AVG9\avgssie.dll (file missing)
O2 - BHO: Spybot-S&D IE Protection - {53707962-6F74-2D53-2644-206D7942484F} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O2 - BHO: (no name) - {5C255C8A-E604-49b4-9D64-90988571CECB} - (no file)
O2 - BHO: Groove GFS Browser Helper - {72853161-30C5-4D22-B7F9-0BBC1D38A37E} - C:\PROGRA~1\MICROS~3\Office12\GRA8E1~1.DLL
O2 - BHO: Java™ Plug-In SSV Helper - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre6\bin\ssv.dll
O2 - BHO: Windows Live Sign-in Helper - {9030D464-4C02-4ABF-8ECC-5164760863C6} - C:\Program Files\Common Files\Microsoft Shared\Windows Live\WindowsLiveLogin.dll
O2 - BHO: AcroIEToolbarHelper Class - {AE7CD045-E861-484f-8273-0445EE161910} - C:\Program Files\Adobe\Acrobat 6.0\Acrobat\AcroIEFavClient.dll
O2 - BHO: Java™ Plug-In 2 SSV Helper - {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Program Files\Java\jre6\bin\jp2ssv.dll
O2 - BHO: JQSIEStartDetectorImpl - {E7E6F031-17CE-4C07-BC86-EABFE594F69C} - C:\Program Files\Java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll
O3 - Toolbar: Adobe PDF - {47833539-D0C5-4125-9FA8-0819E2EAAC93} - C:\Program Files\Adobe\Acrobat 6.0\Acrobat\AcroIEFavClient.dll
O4 - HKLM\..\Run: [avast] "C:\Program Files\AVAST Software\Avast\avastUI.exe" /nogui
O4 - HKLM\..\Run: [Malwarebytes' Anti-Malware] "C:\Program Files\Malwarebytes' Anti-Malware\mbamgui.exe" /starttray
O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Common Files\Java\Java Update\jusched.exe"
O4 - HKCU\..\Run: [SpybotSD TeaTimer] C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~3\Office12\EXCEL.EXE/3000
O8 - Extra context menu item: Google Sidewiki... - res://C:\Program Files\Google\Google Toolbar\Component\GoogleToolbarDynamic_mui_en_D183CA64F05FDD98.dll/cmsidewiki.html
O9 - Extra button: Send to OneNote - {2670000A-7350-4f3c-8081-5663EE0C6C49} - C:\PROGRA~1\MICROS~3\Office12\ONBttnIE.dll
O9 - Extra 'Tools' menuitem: S&end to OneNote - {2670000A-7350-4f3c-8081-5663EE0C6C49} - C:\PROGRA~1\MICROS~3\Office12\ONBttnIE.dll
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~3\Office12\REFIEBAR.DLL
O9 - Extra button: (no name) - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O9 - Extra 'Tools' menuitem: Spybot - Search & Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O16 - DPF: {6F15128C-E66A-490C-B848-5000B5ABEEAC} (HP Download Manager) - https://h20436.www2.hp.com/ediags/dex/secure/HPDEXAXO.cab
O16 - DPF: {E2883E8F-472F-4FB0-9522-AC9BF37916A7} - http://platformdl.adobe.com/NOS/getPlusPlus/1.6/gp.cab
O18 - Protocol: grooveLocalGWS - {88FED34C-F0CA-4636-A375-3CB6248B04CD} - C:\PROGRA~1\MICROS~3\Office12\GR99D3~1.DLL
O22 - SharedTaskScheduler: Browseui preloader - {438755C2-A8BA-11D1-B96B-00A0C90312E1} - C:\WINDOWS\system32\browseui.dll
O22 - SharedTaskScheduler: Component Categories cache daemon - {8C7461EF-2B13-11d2-BE35-3078302C2030} - C:\WINDOWS\system32\browseui.dll
O23 - Service: avast! Antivirus - AVAST Software - C:\Program Files\AVAST Software\Avast\AvastSvc.exe
O23 - Service: Google Update Service (gupdate) (gupdate) - Google Inc. - C:\Program Files\Google\Update\GoogleUpdate.exe
O23 - Service: Google Update Service (gupdatem) (gupdatem) - Google Inc. - C:\Program Files\Google\Update\GoogleUpdate.exe
O23 - Service: Java Quick Starter (JavaQuickStarterService) - Sun Microsystems, Inc. - C:\Program Files\Java\jre6\bin\jqs.exe
O23 - Service: LightScribeService Direct Disc Labeling Service (LightScribeService) - Hewlett-Packard Company - C:\Program Files\Common Files\LightScribe\LSSrvc.exe
O23 - Service: MBAMService - Malwarebytes Corporation - C:\Program Files\Malwarebytes' Anti-Malware\mbamservice.exe

--
End of file - 6213 bytes




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users