Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Virus blocking internet connection


  • This topic is locked This topic is locked
2 replies to this topic

#1 techboy2009

techboy2009

  • Members
  • 5 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:08:18 PM

Posted 25 February 2012 - 02:10 PM

Greetings,

Keep getting this error message when I type out 'ipconfig /all' in command line interface: an internal error occurred the request is not supported. Here's some background info:
- About a month ago my friend was complaining of a very slow machine
- I logged into Safe Mode with Networking
- Downloaded and ran both Malwarebytes and Spybot Search & Destroy
- Found a bunch of stuff and cleaned them
- Restarted system, downloaded and updated Microsoft Security Essentials and ran it successfully
- Downloaded and purchased PC Cleaner Pro and ran it successfully
- Cleaned out all Temp folders
- Update Java and other out-of-date apps
- Ran Defrag

It seemed to solve her problems and her system was running very well and she was very happy.

Two days ago she complained that she no longer can get internet connection and none of her malware nor virus protections were working. So with no network connection to update her current software here's what i've done so far:
1) Downloaded SuperAntiVirus, Malwarebytes, and Spybot Search & Destory softwares from another computer, loaded it onto the infected computer and ran them in Safe mode. Found a ton of stuff like Trojans, HVCHOST-FAKE and other cookies but this did not fix it.
2) Loaded and ran ComboFix (without Windows Recovery Console). Did not fixt it.
3)Performed a chkdisk. Did not work
4) Followed these instructions from Microsoft (http://support.microsoft.com/kb/325356) but instead of using a Windows CD I copied the nettcpip.inf from a clean computer. This did not work.
5) I installed a new NIC card but of course it did not work since, I believe, some dumb virus is blocking the tcp/ip protocol

Please help and again I don't have a copy of the Windows XP CD so does anyone know if I can download a copy or do I have to order a copy from Microsoft? Is there another way to download and install Windows Recovery Console?

I'm still new so any help would be greatly appreciated!

Thanks in advance!

Techboy2011

Desktop specs: Windows XP, SP3, Intel Pentium 4 2.80 GHz, 500MB RAM

ComboFix 12-02-24.02 - User 02/24/2012 15:58:37.1.2 - x86
Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.502.155 [GMT -8:00]
Running from: c:\documents and settings\Administrator\Desktop\ComboFix.exe
AV: McAfee Anti-Virus and Anti-Spyware *Disabled/Updated* {84B5EE75-6421-4CDE-A33A-DD43BA9FAD83}
AV: Microsoft Security Essentials *Disabled/Outdated* {EDB4FA23-53B8-4AFA-8C5D-99752CCA7095}
AV: PC Cleaner Pro *Disabled/Updated* {737A8864-C2D9-4337-B49A-B5E35815B9BB}
FW: McAfee Firewall *Enabled* {94894B63-8C7F-4050-BDA4-813CA00DA3E8}
.
WARNING -THIS MACHINE DOES NOT HAVE THE RECOVERY CONSOLE INSTALLED !!
.
.
((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.
.
c:\documents and settings\All Users\Application Data\6ds0e8Qn.exe
c:\documents and settings\User\WINDOWS
c:\windows\$NtUninstallKB53428$
c:\windows\$NtUninstallKB53428$\3961921218
c:\windows\system32\logs
c:\windows\system32\logs\Settings.dat
.
c:\windows\system32\drivers\afd.sys was missing
Restored copy from - c:\windows\system32\dllcache\afd.sys
.
c:\windows\system32\drivers\netbt.sys was missing
Restored copy from - c:\windows\ServicePackFiles\i386\netbt.sys
.
c:\windows\system32\drivers\cdrom.sys was missing
Restored copy from - c:\windows\ServicePackFiles\i386\cdrom.sys
.
c:\windows\system32\drivers\i8042prt.sys was missing
Restored copy from - c:\windows\ServicePackFiles\i386\i8042prt.sys
.
c:\windows\system32\drivers\ipsec.sys was missing
Restored copy from - c:\windows\ServicePackFiles\i386\ipsec.sys
.
.
((((((((((((((((((((((((( Files Created from 2012-01-25 to 2012-02-25 )))))))))))))))))))))))))))))))
.
.
2012-02-25 00:10 . 2012-02-25 00:10 29904 ----a-w- c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{8CE1978D-DCCB-4C30-B0CD-90A94A16A9DB}\MpKsla24632cd.sys
2012-02-25 00:10 . 2012-02-25 00:10 56200 ----a-w- c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{8CE1978D-DCCB-4C30-B0CD-90A94A16A9DB}\offreg.dll
2012-02-25 00:08 . 2008-04-13 19:19 75264 -c--a-w- c:\windows\system32\dllcache\ipsec.sys
2012-02-25 00:08 . 2008-04-13 19:19 75264 ----a-w- c:\windows\system32\drivers\ipsec.sys
2012-02-25 00:08 . 2008-04-13 19:18 52480 -c--a-w- c:\windows\system32\dllcache\i8042prt.sys
2012-02-25 00:08 . 2008-04-13 19:18 52480 ----a-w- c:\windows\system32\drivers\i8042prt.sys
2012-02-25 00:08 . 2008-04-13 18:40 62976 -c--a-w- c:\windows\system32\dllcache\cdrom.sys
2012-02-25 00:08 . 2008-04-13 18:40 62976 ----a-w- c:\windows\system32\drivers\cdrom.sys
2012-02-25 00:08 . 2008-04-13 19:21 162816 -c--a-w- c:\windows\system32\dllcache\netbt.sys
2012-02-25 00:08 . 2008-04-13 19:21 162816 ----a-w- c:\windows\system32\drivers\netbt.sys
2012-02-25 00:08 . 2011-08-17 13:49 138496 -c--a-w- c:\windows\system32\dllcache\afd.sys
2012-02-25 00:08 . 2011-08-17 13:49 138496 ----a-w- c:\windows\system32\drivers\afd.sys
2012-02-24 14:34 . 2012-02-21 19:12 84146 ----a-w- c:\windows\system32\FQqK0.com
2012-02-24 08:23 . 2012-01-17 12:39 6557240 ----a-w- c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{8CE1978D-DCCB-4C30-B0CD-90A94A16A9DB}\mpengine.dll
2012-02-24 08:22 . 2012-02-24 08:22 -------- d-----w- c:\windows\system32\wbem\Repository
2012-02-24 07:42 . 2012-02-24 07:42 -------- d--h--w- c:\documents and settings\All Users\Application Data\Common Files
2012-02-24 07:41 . 2012-02-24 07:41 -------- d-----w- c:\documents and settings\All Users\Application Data\MFAData
2012-02-24 07:39 . 2011-09-10 02:23 2469760 ----a-w- c:\windows\system32\BootMan.exe
2012-02-24 07:39 . 2011-07-29 21:54 86408 ----a-w- c:\windows\system32\setupempdrv03.exe
2012-02-24 07:39 . 2011-07-29 21:54 8456 ----a-w- c:\windows\system32\EuGdiDrv.sys
2012-02-24 07:39 . 2011-07-29 21:54 13192 ----a-w- c:\windows\system32\epmntdrv.sys
2012-02-24 07:39 . 2011-07-29 21:54 19840 ----a-w- c:\windows\system32\EuEpmGdi.dll
2012-02-24 07:38 . 2012-02-24 07:38 -------- d-----w- c:\program files\EASEUS
2012-02-24 07:02 . 2012-02-24 07:02 -------- d-----w- c:\documents and settings\Administrator\Application Data\Windows Search
2012-02-24 06:13 . 2012-02-24 06:27 -------- d-----w- c:\documents and settings\All Users\Application Data\Spybot - Search & Destroy
2012-02-24 06:13 . 2012-02-24 06:13 -------- d-----w- c:\program files\Spybot - Search & Destroy
2012-02-24 06:12 . 2012-02-24 06:12 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
2012-02-24 06:12 . 2011-12-10 23:24 20464 ----a-w- c:\windows\system32\drivers\mbam.sys
2012-02-24 04:59 . 2012-02-24 04:59 -------- d-----w- c:\documents and settings\Administrator\Application Data\SUPERAntiSpyware.com
2012-02-24 04:58 . 2012-02-24 04:59 -------- d-----w- c:\program files\SUPERAntiSpyware
2012-02-24 04:58 . 2012-02-24 04:58 -------- d-----w- c:\documents and settings\All Users\Application Data\SUPERAntiSpyware.com
2012-02-24 03:25 . 2004-08-04 06:31 20992 -c--a-w- c:\windows\system32\dllcache\rtl8139.sys
2012-02-24 03:25 . 2004-08-04 06:31 20992 ----a-w- c:\windows\system32\drivers\RTL8139.sys
2012-02-22 08:36 . 2012-02-22 08:36 -------- d-sh--w- c:\documents and settings\NetworkService\PrivacIE
2012-02-22 08:36 . 2012-02-22 08:36 -------- d-----w- c:\documents and settings\NetworkService\Local Settings\Application Data\Yahoo
2012-02-22 08:36 . 2012-02-22 08:36 -------- d-----w- c:\documents and settings\NetworkService\Application Data\Yahoo!
2012-02-22 08:08 . 2012-02-22 08:08 -------- d-----w- c:\documents and settings\NetworkService\Local Settings\Application Data\PCHealth
2012-02-22 07:43 . 2012-02-22 07:43 -------- d-----w- C:\PC Cleaners
2012-02-22 07:43 . 2012-02-22 07:43 -------- d-----w- C:\PCPro
2012-02-05 17:06 . 2012-02-21 04:42 0 --sha-w- c:\windows\system32\dds_trash_log.cmd
2012-01-27 19:34 . 2012-01-17 12:39 6557240 ----a-w- c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\Backup\mpengine.dll
.
.
.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2012-01-21 22:50 . 2012-01-21 22:47 5276432 ----a-w- c:\program files\PC_Pro_Installer.exe
2012-01-21 22:50 . 2010-02-11 22:50 5276432 ----a-w- c:\windows\uninst.exe
2012-01-21 21:49 . 2012-01-21 21:49 8068864 ----a-w- c:\program files\mseinstall.exe
.
.
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4
.
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"YSearchProtection"="c:\program files\Yahoo!\Search Protection\YspService.exe" [2010-04-01 243000]
"cdloader"="c:\documents and settings\User\Application Data\mjusbsp\cdloader2.exe" [2011-08-23 50592]
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"DLCCCATS"="c:\windows\System32\spool\DRIVERS\W32X86\3\DLCCtime.dll" [2006-02-24 73728]
"CanonMyPrinter"="c:\program files\Canon\MyPrinter\BJMyPrt.exe" [2009-07-27 1983816]
"MSC"="c:\program files\Microsoft Security Client\msseces.exe" [2011-06-15 997920]
.
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run]
"DWQueuedReporting"="c:\progra~1\COMMON~1\MICROS~1\DW\dwtrig20.exe" [2007-02-26 437160]
.
[hkey_local_machine\software\microsoft\windows\currentversion\explorer\ShellExecuteHooks]
"{56F9679E-7826-4C84-81F3-532071A8BCC5}"= "c:\program files\Windows Desktop Search\MSNLNamespaceMgr.dll" [2009-05-25 304128]
"{5AE067D3-9AFB-48E0-853A-EBB7F4A000DA}"= "c:\program files\SUPERAntiSpyware\SASSEH.DLL" [2011-07-19 113024]
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\!SASWinLogon]
2011-05-04 17:54 551296 ----a-w- c:\program files\SUPERAntiSpyware\SASWINLO.DLL
.
[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\session manager]
BootExecute REG_MULTI_SZ autocheck autochk *\0cdasnative
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\MCODS]
@=""
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\MsMpSvc]
@="Service"
.
[HKLM\~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^Windows Search.lnk]
path=c:\documents and settings\All Users\Start Menu\Programs\Startup\Windows Search.lnk
backup=c:\windows\pss\Windows Search.lnkCommon Startup
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Adobe Reader Speed Launcher]
2007-05-11 10:06 40048 ----a-w- c:\program files\Adobe\Reader 8.0\Reader\reader_sl.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\cdloader]
2011-08-23 20:03 50592 ----a-w- c:\documents and settings\User\Application Data\mjusbsp\cdloader2.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\ehTray]
2005-08-05 20:56 64512 ----a-w- c:\windows\ehome\ehtray.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\IDTSysTrayApp]
2007-09-06 04:24 405504 ----a-w- c:\windows\sttray.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\igfxhkcmd]
2005-10-14 21:46 77824 ----a-w- c:\windows\system32\hkcmd.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\igfxpers]
2005-10-14 21:50 114688 ----a-w- c:\windows\system32\igfxpers.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\igfxtray]
2005-10-14 21:49 94208 ----a-w- c:\windows\system32\igfxtray.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Malwarebytes' Anti-Malware]
2012-01-13 22:53 460872 ----a-w- c:\program files\Malwarebytes' Anti-Malware\mbamgui.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\MSMSGS]
2008-04-14 00:12 1695232 ------w- c:\program files\Messenger\msmsgs.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\SunJavaUpdateSched]
2009-04-19 23:19 148888 ----a-w- c:\program files\Java\jre6\bin\jusched.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\services]
"YahooAUService"=2 (0x2)
.
[HKEY_LOCAL_MACHINE\software\microsoft\security center]
"AntiVirusOverride"=dword:00000001
"FirewallOverride"=dword:00000001
.
[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\McAfeeAntiVirus]
"DisableMonitoring"=dword:00000001
.
[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\McAfeeFirewall]
"DisableMonitoring"=dword:00000001
.
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]
"EnableFirewall"= 0 (0x0)
"DisableNotifications"= 1 (0x1)
.
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"c:\\Program Files\\Messenger\\msmsgs.exe"=
"c:\\WINDOWS\\system32\\dlcccoms.exe"=
"c:\\Documents and Settings\\User\\Application Data\\mjusbsp\\magicJack.exe"=
.
R1 MpKsla24632cd;MpKsla24632cd;c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{8CE1978D-DCCB-4C30-B0CD-90A94A16A9DB}\MpKsla24632cd.sys [2/24/2012 4:10 PM 29904]
R1 SASDIFSV;SASDIFSV;c:\program files\SUPERAntiSpyware\sasdifsv.sys [7/22/2011 8:27 AM 12880]
R1 SASKUTIL;SASKUTIL;c:\program files\SUPERAntiSpyware\SASKUTIL.SYS [7/12/2011 1:55 PM 67664]
R2 MBAMService;MBAMService;c:\program files\Malwarebytes' Anti-Malware\mbamservice.exe [2/23/2012 10:12 PM 652360]
R3 MBAMProtector;MBAMProtector;c:\windows\system32\drivers\mbam.sys [2/23/2012 10:12 PM 20464]
S3 ADM8511;ADMtek ADM8511/AN986 USB To Fast Ethernet Converter;c:\windows\system32\drivers\ADM8511.SYS [4/17/2009 10:28 AM 20160]
S3 CDASPROT;CyberDefender AntiSpyware 2010;\??\c:\program files\CyberDefender\CDAntiSpyware\cdasprot.sys --> c:\program files\CyberDefender\CDAntiSpyware\cdasprot.sys [?]
.
--- Other Services/Drivers In Memory ---
.
*NewlyCreated* - MPKSLA24632CD
.
Contents of the 'Scheduled Tasks' folder
.
2012-02-24 c:\windows\Tasks\At1.job
- c:\windows\system32\FQqK0.com [2012-02-24 19:12]
.
2012-02-24 c:\windows\Tasks\At10.job
- c:\windows\system32\FQqK0.com_ [2012-02-21 19:12]
.
2012-02-24 c:\windows\Tasks\At11.job
- c:\windows\system32\FQqK0.com [2012-02-24 19:12]
.
2012-02-24 c:\windows\Tasks\At12.job
- c:\windows\system32\FQqK0.com_ [2012-02-21 19:12]
.
2012-02-24 c:\windows\Tasks\At13.job
- c:\windows\system32\FQqK0.com [2012-02-24 19:12]
.
2012-02-24 c:\windows\Tasks\At14.job
- c:\windows\system32\FQqK0.com_ [2012-02-21 19:12]
.
2012-02-24 c:\windows\Tasks\At15.job
- c:\windows\system32\FQqK0.com [2012-02-24 19:12]
.
2012-02-24 c:\windows\Tasks\At16.job
- c:\windows\system32\FQqK0.com_ [2012-02-21 19:12]
.
2012-02-24 c:\windows\Tasks\At17.job
- c:\windows\system32\FQqK0.com [2012-02-24 19:12]
.
2012-02-24 c:\windows\Tasks\At18.job
- c:\windows\system32\FQqK0.com_ [2012-02-21 19:12]
.
2012-02-24 c:\windows\Tasks\At19.job
- c:\windows\system32\FQqK0.com [2012-02-24 19:12]
.
2012-02-24 c:\windows\Tasks\At2.job
- c:\windows\system32\FQqK0.com_ [2012-02-21 19:12]
.
2012-02-24 c:\windows\Tasks\At20.job
- c:\windows\system32\FQqK0.com_ [2012-02-21 19:12]
.
2012-02-24 c:\windows\Tasks\At21.job
- c:\windows\system32\FQqK0.com [2012-02-24 19:12]
.
2012-02-24 c:\windows\Tasks\At22.job
- c:\windows\system32\FQqK0.com_ [2012-02-21 19:12]
.
2012-02-23 c:\windows\Tasks\At23.job
- c:\windows\system32\FQqK0.com [2012-02-24 19:12]
.
2012-02-23 c:\windows\Tasks\At24.job
- c:\windows\system32\FQqK0.com_ [2012-02-21 19:12]
.
2012-02-22 c:\windows\Tasks\At25.job
- c:\windows\system32\FQqK0.com [2012-02-24 19:12]
.
2012-02-22 c:\windows\Tasks\At26.job
- c:\windows\system32\FQqK0.com_ [2012-02-21 19:12]
.
2012-02-24 c:\windows\Tasks\At27.job
- c:\windows\system32\FQqK0.com [2012-02-24 19:12]
.
2012-02-24 c:\windows\Tasks\At28.job
- c:\windows\system32\FQqK0.com_ [2012-02-21 19:12]
.
2012-02-22 c:\windows\Tasks\At29.job
- c:\windows\system32\FQqK0.com [2012-02-24 19:12]
.
2012-02-22 c:\windows\Tasks\At3.job
- c:\windows\system32\FQqK0.com [2012-02-24 19:12]
.
2012-02-22 c:\windows\Tasks\At30.job
- c:\windows\system32\FQqK0.com_ [2012-02-21 19:12]
.
2012-02-22 c:\windows\Tasks\At31.job
- c:\windows\system32\FQqK0.com [2012-02-24 19:12]
.
2012-02-22 c:\windows\Tasks\At32.job
- c:\windows\system32\FQqK0.com_ [2012-02-21 19:12]
.
2012-02-23 c:\windows\Tasks\At33.job
- c:\windows\system32\FQqK0.com [2012-02-24 19:12]
.
2012-02-23 c:\windows\Tasks\At34.job
- c:\windows\system32\FQqK0.com_ [2012-02-21 19:12]
.
2012-02-23 c:\windows\Tasks\At35.job
- c:\windows\system32\FQqK0.com [2012-02-24 19:12]
.
2012-02-23 c:\windows\Tasks\At36.job
- c:\windows\system32\FQqK0.com_ [2012-02-21 19:12]
.
2012-02-23 c:\windows\Tasks\At37.job
- c:\windows\system32\FQqK0.com [2012-02-24 19:12]
.
2012-02-23 c:\windows\Tasks\At38.job
- c:\windows\system32\FQqK0.com_ [2012-02-21 19:12]
.
2012-02-24 c:\windows\Tasks\At39.job
- c:\windows\system32\FQqK0.com [2012-02-24 19:12]
.
2012-02-22 c:\windows\Tasks\At4.job
- c:\windows\system32\FQqK0.com_ [2012-02-21 19:12]
.
2012-02-24 c:\windows\Tasks\At40.job
- c:\windows\system32\FQqK0.com_ [2012-02-21 19:12]
.
2012-02-23 c:\windows\Tasks\At41.job
- c:\windows\system32\FQqK0.com [2012-02-24 19:12]
.
2012-02-23 c:\windows\Tasks\At42.job
- c:\windows\system32\FQqK0.com_ [2012-02-21 19:12]
.
2012-02-22 c:\windows\Tasks\At43.job
- c:\windows\system32\FQqK0.com [2012-02-24 19:12]
.
2012-02-22 c:\windows\Tasks\At44.job
- c:\windows\system32\FQqK0.com_ [2012-02-21 19:12]
.
2012-02-22 c:\windows\Tasks\At45.job
- c:\windows\system32\FQqK0.com [2012-02-24 19:12]
.
2012-02-22 c:\windows\Tasks\At46.job
- c:\windows\system32\FQqK0.com_ [2012-02-21 19:12]
.
2012-02-22 c:\windows\Tasks\At47.job
- c:\windows\system32\FQqK0.com [2012-02-24 19:12]
.
2012-02-22 c:\windows\Tasks\At48.job
- c:\windows\system32\FQqK0.com_ [2012-02-21 19:12]
.
2012-02-24 c:\windows\Tasks\At5.job
- c:\windows\system32\FQqK0.com [2012-02-24 19:12]
.
2012-02-24 c:\windows\Tasks\At6.job
- c:\windows\system32\FQqK0.com_ [2012-02-21 19:12]
.
2012-02-24 c:\windows\Tasks\At7.job
- c:\windows\system32\FQqK0.com [2012-02-24 19:12]
.
2012-02-24 c:\windows\Tasks\At8.job
- c:\windows\system32\FQqK0.com_ [2012-02-21 19:12]
.
2012-02-24 c:\windows\Tasks\At9.job
- c:\windows\system32\FQqK0.com [2012-02-24 19:12]
.
2012-02-25 c:\windows\Tasks\MP Scheduled Scan.job
- c:\program files\Microsoft Security Client\Antimalware\MpCmdRun.exe [2011-04-27 23:39]
.
.
------- Supplementary Scan -------
.
uStart Page = hxxp://www.yahoo.com/
uSearchURL,(Default) = hxxp://us.rd.yahoo.com/customize/ycomp/defaults/su/*http://www.yahoo.com
IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~2\OFFICE11\EXCEL.EXE/3000
Trusted Zone: internet
Trusted Zone: maficjack.com\my
Trusted Zone: mcafee.com
Trusted Zone: talk4free.com\reg
.
- - - - ORPHANS REMOVED - - - -
.
WebBrowser-{A26503FE-B3B8-4910-A9DC-9CBD25C6B8D6} - (no file)
Notify-NavLogon - (no file)
MSConfigStartUp-CyberDefender AntiSpyware 2010 - c:\program files\CyberDefender\CDAntiSpyware\CDAS.exe
AddRemove-Nero - Custom Installation - c:\program files\Ahead\nero\uninstall.exe
.
.
.
**************************************************************************
.
catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2012-02-24 16:10
Windows 5.1.2600 Service Pack 3 NTFS
.
scanning hidden processes ...
.
scanning hidden autostart entries ...
.
HKLM\Software\Microsoft\Windows\CurrentVersion\Run
DLCCCATS = rundll32 c:\windows\System32\spool\DRIVERS\W32X86\3\DLCCtime.dll,_RunDLLEntry@16???????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????
.
scanning hidden files ...
.
scan completed successfully
hidden files: 0
.
**************************************************************************
.
--------------------- DLLs Loaded Under Running Processes ---------------------
.
- - - - - - - > 'winlogon.exe'(480)
c:\program files\SUPERAntiSpyware\SASWINLO.DLL
c:\windows\system32\WININET.dll
.
- - - - - - - > 'explorer.exe'(2088)
c:\windows\system32\WININET.dll
c:\windows\system32\ieframe.dll
c:\windows\system32\webcheck.dll
.
------------------------ Other Running Processes ------------------------
.
c:\program files\Microsoft Security Client\Antimalware\MsMpEng.exe
c:\windows\system32\dlcccoms.exe
c:\windows\eHome\ehRecvr.exe
c:\windows\eHome\ehSched.exe
c:\program files\Java\jre6\bin\jqs.exe
c:\windows\system32\SearchIndexer.exe
c:\windows\system32\dllhost.exe
.
**************************************************************************
.
Completion time: 2012-02-24 16:15:48 - machine was rebooted
ComboFix-quarantined-files.txt 2012-02-25 00:15
.
Pre-Run: 57,397,219,328 bytes free
Post-Run: 57,430,323,200 bytes free
.
- - End Of File - - 5CC6BC7BCE21EBEFF7B1B0E35D5164DC


SUPERAntiSpyware Scan Log
http://www.superantispyware.com

Generated 02/23/2012 at 09:55 PM

Application Version : 5.0.1134

Core Rules Database Version : 7848
Trace Rules Database Version: 5660

Scan type : Complete Scan
Total Scan Time : 00:55:01

Operating System Information
Windows XP Professional 32-bit, Service Pack 3 (Build 5.01.2600)
Administrator

Memory items scanned : 273
Memory threats detected : 0
Registry items scanned : 34646
Registry threats detected : 2
File items scanned : 68511
File threats detected : 66

Adware.CouponBar
HKCR\CLSID\{5BED3930-2E9E-76D8-BACC-80DF2188D455}
HKLM\Software\Classes\CLSID\{5BED3930-2E9E-76D8-BACC-80DF2188D455}

Adware.Tracking Cookie
C:\Documents and Settings\Administrator\Cookies\Y6RDFDG4.txt [ /atdmt.com ]
C:\Documents and Settings\Administrator\Cookies\1EN72WGO.txt [ /2o7.net ]
C:\Documents and Settings\Administrator\Cookies\5XARROFS.txt [ /gostats.com ]
C:\Documents and Settings\Administrator\Cookies\NMOAPXJP.txt [ /interclick.com ]
C:\Documents and Settings\Administrator\Cookies\PKISKXBC.txt [ /doubleclick.net ]
C:\Documents and Settings\Administrator\Cookies\H80Y3OSF.txt [ /fastclick.net ]
C:\Documents and Settings\Administrator\Cookies\CXCEJYMA.txt [ /ad.yieldmanager.com ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\COX20LUV.txt [ Cookie:system@zedo.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\6N4X4K3U.txt [ Cookie:system@technoratimedia.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\BW9FKU7I.txt [ Cookie:system@imagesrv.adition.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\N1W4WYY0.txt [ Cookie:system@adfarm1.adition.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\JB344C06.txt [ Cookie:system@media6degrees.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\XUN53ZE6.txt [ Cookie:system@collective-media.net/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\EVWO87NG.txt [ Cookie:system@media.adfrontiers.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\3LF44KAO.txt [ Cookie:system@revsci.net/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\5NP3L3HO.txt [ Cookie:system@adbrite.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\2OE57X2M.txt [ Cookie:system@questionmarket.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\IUBC612H.txt [ Cookie:system@ox-d.matchflowmedia.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\WLF2CCY7.txt [ Cookie:system@tacoda.at.atwola.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\XMWRTZTN.txt [ Cookie:system@pro-market.net/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\YDGS54B5.txt [ Cookie:system@burstnet.com/ ]
C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\Cookies\C9Y3G949.txt [ Cookie:system@ad.yieldmanager.com/ ]
m1.2mdn.net [ C:\DOCUMENTS AND SETTINGS\GUEST\APPLICATION DATA\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\XJ5JNNJG ]
msntest.serving-sys.com [ C:\DOCUMENTS AND SETTINGS\GUEST\APPLICATION DATA\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\XJ5JNNJG ]
udn.specificclick.net [ C:\DOCUMENTS AND SETTINGS\GUEST\APPLICATION DATA\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\XJ5JNNJG ]
ad.insightexpressai.com [ C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\APPLICATION DATA\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\MTCTUY4B ]
art.aim4media.com [ C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\APPLICATION DATA\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\MTCTUY4B ]
cdn.eyewonder.com [ C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\APPLICATION DATA\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\MTCTUY4B ]
cdn.fondnessmedia.com [ C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\APPLICATION DATA\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\MTCTUY4B ]
cdn.tremormedia.com [ C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\APPLICATION DATA\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\MTCTUY4B ]
content.yieldmanager.edgesuite.net [ C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\APPLICATION DATA\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\MTCTUY4B ]
convoad.technoratimedia.net [ C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\APPLICATION DATA\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\MTCTUY4B ]
crackle.com [ C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\APPLICATION DATA\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\MTCTUY4B ]
ec.atdmt.com [ C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\APPLICATION DATA\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\MTCTUY4B ]
files.youporn.com [ C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\APPLICATION DATA\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\MTCTUY4B ]
fr.pornhub.com [ C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\APPLICATION DATA\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\MTCTUY4B ]
i.adultswim.com [ C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\APPLICATION DATA\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\MTCTUY4B ]
inline.admedia.com [ C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\APPLICATION DATA\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\MTCTUY4B ]
macromedia.com [ C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\APPLICATION DATA\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\MTCTUY4B ]
media.kyte.tv [ C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\APPLICATION DATA\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\MTCTUY4B ]
media.mtvnservices.com [ C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\APPLICATION DATA\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\MTCTUY4B ]
media1.break.com [ C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\APPLICATION DATA\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\MTCTUY4B ]
objects.tremormedia.com [ C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\APPLICATION DATA\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\MTCTUY4B ]
s0.2mdn.net [ C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\APPLICATION DATA\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\MTCTUY4B ]
secure-us.imrworldwide.com [ C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\APPLICATION DATA\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\MTCTUY4B ]
sftrack.searchforce.net [ C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\APPLICATION DATA\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\MTCTUY4B ]
stat.easydate.biz [ C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\APPLICATION DATA\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\MTCTUY4B ]
stat.ed.cupidplc.com [ C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\APPLICATION DATA\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\MTCTUY4B ]
tag.2bluemedia.hiro.tv [ C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\APPLICATION DATA\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\MTCTUY4B ]
tag.mediashakers.hiro.tv [ C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\APPLICATION DATA\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\MTCTUY4B ]
www.baronsmedia.com [ C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\APPLICATION DATA\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\MTCTUY4B ]
www.goodcholesterolcount.com [ C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\APPLICATION DATA\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\MTCTUY4B ]
www.pornhub.com [ C:\DOCUMENTS AND SETTINGS\NETWORKSERVICE\APPLICATION DATA\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\MTCTUY4B ]
cdn2.baronsmedia.com [ C:\DOCUMENTS AND SETTINGS\USER\APPLICATION DATA\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\C9BCHZXX ]
content.yieldmanager.edgesuite.net [ C:\DOCUMENTS AND SETTINGS\USER\APPLICATION DATA\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\C9BCHZXX ]
core.insightexpressai.com [ C:\DOCUMENTS AND SETTINGS\USER\APPLICATION DATA\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\C9BCHZXX ]
crackle.com [ C:\DOCUMENTS AND SETTINGS\USER\APPLICATION DATA\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\C9BCHZXX ]
media.heavy.com [ C:\DOCUMENTS AND SETTINGS\USER\APPLICATION DATA\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\C9BCHZXX ]
media1.break.com [ C:\DOCUMENTS AND SETTINGS\USER\APPLICATION DATA\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\C9BCHZXX ]
tag.mediashakers.hiro.tv [ C:\DOCUMENTS AND SETTINGS\USER\APPLICATION DATA\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\C9BCHZXX ]
C:\DOCUMENTS AND SETTINGS\USER\LOCAL SETTINGS\TEMP\COOKIES\USER@CONTENT.YIELDMANAGER[1].TXT [ /CONTENT.YIELDMANAGER ]
C:\DOCUMENTS AND SETTINGS\USER\LOCAL SETTINGS\TEMP\COOKIES\USER@AD.WSOD[2].TXT [ /AD.WSOD ]
C:\DOCUMENTS AND SETTINGS\USER\LOCAL SETTINGS\TEMP\COOKIES\USER@STATSE.WEBTRENDSLIVE[1].TXT [ /STATSE.WEBTRENDSLIVE ]
C:\DOCUMENTS AND SETTINGS\USER\LOCAL SETTINGS\TEMP\COOKIES\USER@YIELDMANAGER[1].TXT [ /YIELDMANAGER ]

Trojan.Dropper/SVCHost-Fake
C:\PROGRAM FILES\MALWAREBYTES' ANTI-MALWARE\CHAMELEON\SVCHOST.EXE

Trojan.Agent/Gen-Nullo[Short]
C:\SYSTEM VOLUME INFORMATION\_RESTORE{718CF65B-F961-46ED-85BB-8B39A861CE66}\RP625\A0064627.EXE

Edit: Moved topic from XP to the more appropriate forum. ~ Animal

Attached Files



BC AdBot (Login to Remove)

 


#2 myrti

myrti

    Sillyberry


  • Malware Study Hall Admin
  • 33,768 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:At home
  • Local time:06:18 AM

Posted 29 February 2012 - 03:55 AM

Hello and welcome to Bleeping Computer

We apologize for the delay in responding to your request for help. Here at Bleeping Computer we get overwhelmed at times, and we are trying our best to keep up. Please note that your topic was not intentionally overlooked. Our mission is to help everyone in need, but sometimes it takes just a little longer to get to every request for help. No one is ignored here.

If you have since resolved the original problem you were having, we would appreciate you letting us know. If not please perform the following steps below so we can have a look at the current condition of your machine.
If you are unable to create a log because your computer cannot start up successfully please provide detailed information about the Windows version you are using: What we in particular need to know is version, edition and if it is a 32bit or a 64bit system. [/b]
If you are unsure about any of these caracteristics, just let us know and we'll help you figuring it out. Please also tell us if you have your Windows CD/DVD handy.


Please include a clear description of the problems you're having, along with any steps you may have performed so far.

Please refrain from running tools or applying updates other than those we suggest while we are cleaning up your computer. The reason for this is so we know what is going on with the machine at any time. Some programs can interfere with others and hamper the recovery process.

Even if you have already provided information about your PC, we need a new log to see what has changed since you originally posted your problem.
We need to create an OTL Report
  • Please download OTL from one of the following mirrors:
  • Save it to your desktop.
  • Double click on the Posted Image icon on your desktop.
  • Click the "Scan All Users" checkbox.
  • In the custom scan box paste the following:
    msconfig
    safebootminimal
    activex
    drivers32
    netsvcs
    %SYSTEMDRIVE%\*.exe
    /md5start
    explorer.exe
    winlogon.exe
    wininit.exe
    hlp.dat
    /md5stop
  • Push the Posted Image button.
  • Two reports will open, copy and paste them in a reply here:
    • OTL.txt <-- Will be opened
    • Extra.txt<--Will be minimized

In the upper right hand corner of the topic you will see a button called Watch Topic.I suggest you click it and select Immediate E-Mail notification and click on Proceed. This way you will be advised when we respond to your topic and facilitate the cleaning of your machine.

After 5 days if a topic is not replied to we assume it has been abandoned and it is closed.

regards myrti

is that a bird?  a plane? nooo it's the flying blueberry!

If I have been helping you and haven't replied in 2 days, feel free to shoot me a PM! Please don't send help request via PM, unless I am already helping you. Use the forums!

 

Follow BleepingComputer on: Facebook | Twitter | Google+


#3 myrti

myrti

    Sillyberry


  • Malware Study Hall Admin
  • 33,768 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:At home
  • Local time:06:18 AM

Posted 04 March 2012 - 03:27 PM

Due to the lack of feedback, this topic is now closed.In the event you still have problems, please send me or any Moderator a Private Message and ask them to reopen this topic within the next 5 days. Please include a link to your topic in the Private Message. Thank you.

is that a bird?  a plane? nooo it's the flying blueberry!

If I have been helping you and haven't replied in 2 days, feel free to shoot me a PM! Please don't send help request via PM, unless I am already helping you. Use the forums!

 

Follow BleepingComputer on: Facebook | Twitter | Google+





0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users