Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Google Redirect & Unable to Update Software


  • This topic is locked This topic is locked
11 replies to this topic

#1 fujymo

fujymo

  • Members
  • 6 posts
  • OFFLINE
  •  
  • Local time:08:56 AM

Posted 14 March 2012 - 07:08 PM

Hello and thanks in advance!!

This is my daughters computer and a few weeks ago everything on the computer was hidden. I managed to get malwarebytes on loaded and it found several items. Right now the computer is at times redirecting on google and not allowing software to be updated. It also had a free version of antivirus loaded which I have deleted and trying to load norton on the computer. The malware will not allow it to be installed.

Attached is the DDS and gemr.

I have copied the text and attached the files.

Thanks again.

Dean


DDS (Ver_2011-08-26.01) - NTFSx86
Internet Explorer: 7.0.5730.11 BrowserJavaVersion: 1.6.0_21
Run by mom at 19:05:19 on 2012-03-14
Microsoft Windows XP Home Edition 5.1.2600.3.1252.1.1033.18.1151.259 [GMT -4:00]
.
.
============== Running Processes ===============
.
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\system32\svchost -k DcomLaunch
svchost.exe
C:\WINDOWS\System32\svchost.exe -k netsvcs
C:\WINDOWS\system32\svchost.exe -k WudfServiceGroup
svchost.exe
svchost.exe
C:\WINDOWS\system32\spoolsv.exe
svchost.exe
C:\Program Files\comcasttb\ComcastSpywareScan\ComcastAntiSpyService.exe
C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
C:\Program Files\Bonjour\mDNSResponder.exe
C:\Program Files\Toshiba\Power Management\CeEPwrSvc.exe
C:\Program Files\TOSHIBA\ConfigFree\CFSvcs.exe
C:\WINDOWS\system32\DVDRAMSV.exe
C:\Program Files\CA\PPRT\bin\ITMRTSVC.exe
C:\Program Files\Java\jre6\bin\jqs.exe
C:\Program Files\Malwarebytes' Anti-Malware\mbamservice.exe
C:\WINDOWS\system32\svchost.exe -k imgsvc
c:\Toshiba\Ivp\Swupdate\swupdtmr.exe
C:\Program Files\Constant Guard Protection Suite\IDVaultSvc.exe
C:\WINDOWS\system32\wbem\wmiapsrv.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\TOSHIBA\E-KEY\CeEKey.exe
C:\Program Files\TOSHIBA\Power Management\CePMTray.exe
C:\Program Files\TOSHIBA\TouchPad\TPTray.exe
C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe
C:\WINDOWS\AGRSMMSG.exe
C:\Program Files\Apoint2K\Apoint.exe
C:\Program Files\EzButton\EzButton.EXE
C:\Program Files\TOSHIBA\Touch and Launch\PadExe.exe
C:\Program Files\TOSHIBA\ConfigFree\NDSTray.exe
C:\Program Files\Common Files\InstallShield\UpdateService\issch.exe
C:\WINDOWS\system32\dla\tfswctrl.exe
C:\Program Files\Common Files\Java\Java Update\jusched.exe
C:\Program Files\Malwarebytes' Anti-Malware\mbamgui.exe
C:\Program Files\SFT\GuardedID\gidd.exe
C:\Program Files\TOSHIBA\TOSCDSPD\toscdspd.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\comcasttb\ComcastSpywareScan\ComcastAntispy.exe
C:\Documents and Settings\All Users\Documents\Norton\{3A7FA539-8005-4603-87D2-SOS1-NSS-v5}\Norton_Download_Manager.exe
C:\Program Files\Constant Guard Protection Suite\IDVault.exe
C:\WINDOWS\System32\svchost.exe -k HTTPFilter
C:\Program Files\Apoint2K\Apntex.exe
C:\Program Files\Common Files\Java\Java Update\jucheck.exe
C:\WINDOWS\system32\wuauclt.exe
c:\progra~1\common~1\instal~1\update~1\isuspm.exe
C:\PROGRA~1\COMMON~1\INSTAL~1\UPDATE~1\agent.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\xfin_portal\CIDGlobalLight.exe
.
============== Pseudo HJT Report ===============
.
uStart Page = hxxp://xfinity.comcast.net/?cid=cgps02192012
uSearch Bar = hxxp://red.clientapps.yahoo.com/customize/ycomp/defaults/sb/*http://www.yahoo.com/search/ie.html
uSearch Page = hxxp://red.clientapps.yahoo.com/customize/ycomp/defaults/sp/*http://www.yahoo.com
uSearchURL,(Default) = hxxp://red.clientapps.yahoo.com/customize/ycomp/defaults/su/*http://www.yahoo.com
uURLSearchHooks: H - No File
BHO: Adobe PDF Reader Link Helper: {06849e9f-c8d7-4d59-b87d-784b7d6be0b3} - c:\program files\common files\adobe\acrobat\activex\AcroIEHelper.dll
BHO: XFINITY Toolbar: {4b9bcce8-a70b-402a-a7e1-db96831ee26f} - c:\program files\xfin_portal\comcastdx.dll
BHO: Spybot-S&D IE Protection: {53707962-6f74-2d53-2644-206d7942484f} - c:\program files\spybot - search & destroy\SDHelper.dll
BHO: DriveLetterAccess: {5ca3d70e-1895-11cf-8e15-001234567890} - c:\windows\system32\dla\tfswshx.dll
BHO: Constant Guard Protection Suite (COM): {b84cdbe7-1b46-494b-a188-01d4c52deb61} - c:\program files\constant guard protection suite\NativeBHO.dll
BHO: Updater For XFIN_PORTAL: {bb46be07-13eb-4c49-b0f0-fc78b9ea4983} - c:\program files\xfin_portal\auxi\comcastAu.dll
BHO: Java™ Plug-In 2 SSV Helper: {dbc80044-a445-435b-bc74-9c25c1c588a9} - c:\program files\java\jre6\bin\jp2ssv.dll
BHO: JQSIEStartDetectorImpl Class: {e7e6f031-17ce-4c07-bc86-eabfe594f69c} - c:\program files\java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll
TB: XFINITY Toolbar: {4b9bcce8-a70b-402a-a7e1-db96831ee26f} - c:\program files\xfin_portal\comcastdx.dll
TB: {4982D40A-C53B-4615-B15B-B5B5E98D167C} - No File
TB: Yahoo! Toolbar: {ef99bd32-c1fb-11d2-892f-0090271d4f88} -
TB: {5BED3930-2E9E-76D8-BACC-80DF2188D455} - No File
TB: {DD02A4EB-4AFD-4D60-99D8-E67F964CA813} - No File
uRun: [TOSCDSPD] c:\program files\toshiba\toscdspd\toscdspd.exe
uRun: [ctfmon.exe] c:\windows\system32\ctfmon.exe
uRun: [Sonic RecordNow!]
uRun: [Skype] "c:\program files\skype\phone\Skype.exe" /nosplash /minimized
uRun: [ComcastAntispyClient] "c:\program files\comcasttb\comcastspywarescan\ComcastAntispy.exe" /hide
uRun: [Norton Download Manager{3A7FA539-8005-4603-87D2-SOS1-NSS-v5}] c:\documents and settings\all users\documents\norton\{3a7fa539-8005-4603-87d2-sos1-nss-v5}\Norton_Download_Manager.exe /m
uRunOnce: [FlashPlayerUpdate] c:\windows\system32\macromed\flash\FlashUtil9f.exe
mRun: [CeEKEY] c:\program files\toshiba\e-key\CeEKey.exe
mRun: [CeEPOWER] c:\program files\toshiba\power management\CePMTray.exe
mRun: [TPNF] c:\program files\toshiba\touchpad\TPTray.exe
mRun: [ATIPTA] c:\program files\ati technologies\ati control panel\atiptaxx.exe
mRun: [AGRSMMSG] AGRSMMSG.exe
mRun: [Apoint] c:\program files\apoint2k\Apoint.exe
mRun: [EzButton] c:\program files\ezbutton\EzButton.EXE
mRun: [PadTouch] c:\program files\toshiba\touch and launch\PadExe.exe
mRun: [NDSTray.exe] NDSTray.exe
mRun: [CFSServ.exe] CFSServ.exe -NoClient
mRun: [Notebook Maximizer] c:\program files\notebook maximizer\maximizer_startup.exe
mRun: [ISUSPM Startup] c:\progra~1\common~1\instal~1\update~1\ISUSPM.exe -startup
mRun: [ISUSScheduler] "c:\program files\common files\installshield\updateservice\issch.exe" -start
mRun: [dla] c:\windows\system32\dla\tfswctrl.exe
mRun: [PinnacleDriverCheck] c:\windows\system32\PSDrvCheck.exe -CheckReg
mRun: [USB2Check] RUNDLL32.EXE "c:\windows\system32\PCLECoInst.dll",CheckUSBController
mRun: [Adobe Reader Speed Launcher] "c:\program files\adobe\reader 8.0\reader\Reader_sl.exe"
mRun: [KernelFaultCheck] %systemroot%\system32\dumprep 0 -k
mRun: [SunJavaUpdateSched] "c:\program files\common files\java\java update\jusched.exe"
mRun: [QuickTime Task] "c:\program files\quicktime\qttask.exe" -atboottime
mRun: [Malwarebytes' Anti-Malware] "c:\program files\malwarebytes' anti-malware\mbamgui.exe" /starttray
mRun: [GIDDesktop] c:\program files\sft\guardedid\gidd.exe /s
mRun: [AdobeAAMUpdater-1.0] "c:\program files\common files\adobe\oobe\pdapp\uwa\UpdaterStartupUtility.exe"
dRun: [dplaysvr] %APPDATA%\dplaysvr.exe
StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\consta~1.lnk - c:\program files\constant guard protection suite\IDVault.exe
mPolicies-system: NoDispSettingsPage = 0 (0x0)
IE: &AOL Toolbar search - c:\program files\aol toolbar\toolbar.dll/SEARCH.HTML
IE: &Search - ?p=ZJfox000
IE: &Yahoo! Search - file:///c:\program files\yahoo!\Common/ycsrch.htm
IE: E&xport to Microsoft Excel - c:\progra~1\micros~2\office10\EXCEL.EXE/3000
IE: Yahoo! &Dictionary - file:///c:\program files\yahoo!\Common/ycdict.htm
IE: Yahoo! &Maps - file:///c:\program files\yahoo!\Common/ycmap.htm
IE: Yahoo! &SMS - file:///c:\program files\yahoo!\Common/ycsms.htm
IE: { - c:\program files\messenger\msmsgs.exe
IE: {CD67F990-D8E9-11d2-98FE-00C0F0318AFE}
IE: {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe
IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe
IE: {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - {53707962-6F74-2D53-2644-206D7942484F} - c:\program files\spybot - search & destroy\SDHelper.dll
DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_21-windows-i586.cab
DPF: {8FFBE65D-2C9C-4669-84BD-5829DC0B603C} - hxxp://fpdownload.macromedia.com/get/flashplayer/current/ultrashim.cab
DPF: {CAFEEFAC-0014-0002-0005-ABCDEFFEDCBA} - hxxp://java.sun.com/products/plugin/autodl/jinstall-142-windows-i586.cab
DPF: {CAFEEFAC-0015-0000-0003-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.5.0/jinstall-1_5_0_03-windows-i586.cab
DPF: {CAFEEFAC-0015-0000-0006-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.5.0/jinstall-1_5_0_06-windows-i586.cab
DPF: {CAFEEFAC-0015-0000-0009-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.5.0/jinstall-1_5_0_09-windows-i586.cab
DPF: {CAFEEFAC-0015-0000-0010-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.5.0/jinstall-1_5_0_10-windows-i586.cab
DPF: {CAFEEFAC-0016-0000-0001-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_01-windows-i586.cab
DPF: {CAFEEFAC-0016-0000-0002-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_02-windows-i586.cab
DPF: {CAFEEFAC-0016-0000-0003-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_03-windows-i586.cab
DPF: {CAFEEFAC-0016-0000-0005-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_05-windows-i586.cab
DPF: {CAFEEFAC-0016-0000-0007-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_07-windows-i586.cab
DPF: {CAFEEFAC-0016-0000-0013-ABCDEFFEDCBA}
DPF: {CAFEEFAC-0016-0000-0021-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_21-windows-i586.cab
DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_21-windows-i586.cab
DPF: {CF40ACC5-E1BB-4AFF-AC72-04C2F616BCA7} - hxxp://wwwimages.adobe.com/www.adobe.com/products/acrobat/nos/gp.cab
DPF: {E5D419D6-A846-4514-9FAD-97E826C84822} - hxxp://fdl.msn.com/zone/datafiles/heartbeat.cab
DPF: {E7DBFB6C-113A-47CF-B278-F5C6AF4DE1BD} - hxxp://download.abacast.com/download/files/abasetup162.cab
TCP: DhcpNameServer = 75.75.75.75 75.75.76.76 192.168.1.1
TCP: Interfaces\{53BDD093-E69D-4519-A965-0327408B864E} : NameServer = 8.8.8.8,8.8.4.4
TCP: Interfaces\{53BDD093-E69D-4519-A965-0327408B864E} : DhcpNameServer = 75.75.75.75 75.75.76.76 192.168.1.1
Notify: GIDLogonXP - GIDLogonXP.dll
SSODL: WPDShServiceObj - {AAA288BA-9A4C-45B0-95D7-94D524869DB5} - c:\windows\system32\WPDShServiceObj.dll
SecurityProviders: msapsspc.dll, schannel.dll, digest.dll, msnsspc.dll, zwebauth.dll
mASetup: {9191979D-821C-4EA8-B021-2DA1D859A7C5}-3Reg - c:\program files\sft\guardedid\gidi.exe /v
Hosts: 94.63.147.16 www.google.com
Hosts: 94.63.147.17 www.bing.com
.
================= FIREFOX ===================
.
FF - ProfilePath - c:\documents and settings\mom\application data\mozilla\firefox\profiles\zqm59rzq.default\
FF - prefs.js: browser.search.defaulturl - hxxp://search.conduit.com/ResultsExt.aspx?ctid=CT2086743&SearchSource=3&q={searchTerms}
FF - prefs.js: browser.search.selectedEngine - Google
FF - prefs.js: browser.startup.homepage - hxxp://www.google.com/
FF - prefs.js: keyword.URL - hxxp://search.conduit.com/ResultsExt.aspx?ctid=CT2086743&q=
FF - prefs.js: network.proxy.http - 127.0.0.1
FF - prefs.js: network.proxy.http_port - 62545
FF - prefs.js: network.proxy.type - 4
FF - component: c:\documents and settings\mom\application data\mozilla\firefox\profiles\zqm59rzq.default\extensions\{4b9bcce8-a70b-402a-a7e1-db96831ee26f}\components\dtTransparency.dll
FF - component: c:\documents and settings\mom\application data\mozilla\firefox\profiles\zqm59rzq.default\extensions\{dd02a4eb-4afd-4d60-99d8-e67f964ca813}\components\FFExternalAlert.dll
FF - component: c:\documents and settings\mom\application data\mozilla\firefox\profiles\zqm59rzq.default\extensions\{dd02a4eb-4afd-4d60-99d8-e67f964ca813}\components\RadioWMPCore.dll
FF - plugin: c:\documents and settings\mom\application data\facebook\npfbplugin_1_0_1.dll
FF - plugin: c:\documents and settings\mom\application data\mozilla\firefox\profiles\zqm59rzq.default\extensions\{0c7e3f01-99e9-4095-9bdc-f84724960b57}\plugins\NPCpnMgr.dll
FF - plugin: c:\documents and settings\mom\application data\mozilla\firefox\profiles\zqm59rzq.default\extensions\moveplayer@movenetworks.com\platform\winnt_x86-msvc\plugins\npmnqmp071101000055.dll
FF - plugin: c:\program files\java\jre6\bin\new_plugin\npdeployJava1.dll
FF - plugin: c:\program files\mozilla firefox\plugins\NPcol308.dll
FF - plugin: c:\program files\mozilla firefox\plugins\npdeployJava1.dll
FF - plugin: c:\program files\mozilla firefox\plugins\npImgCtl.dll
FF - plugin: c:\program files\mozilla firefox\plugins\NpIpx32.dll
FF - plugin: c:\program files\mozilla firefox\plugins\npmozax.dll
FF - plugin: c:\program files\mozilla firefox\plugins\NPTURNMED.dll
FF - Ext: Default: {972ce4c6-7e08-4474-a285-3208198ce6fd} - c:\program files\mozilla firefox\extensions\{972ce4c6-7e08-4474-a285-3208198ce6fd}
FF - Ext: Java Console: {CAFEEFAC-0016-0000-0002-ABCDEFFEDCBA} - c:\program files\mozilla firefox\extensions\{CAFEEFAC-0016-0000-0002-ABCDEFFEDCBA}
FF - Ext: Java Console: {CAFEEFAC-0016-0000-0003-ABCDEFFEDCBA} - c:\program files\mozilla firefox\extensions\{CAFEEFAC-0016-0000-0003-ABCDEFFEDCBA}
FF - Ext: Java Console: {CAFEEFAC-0016-0000-0005-ABCDEFFEDCBA} - c:\program files\mozilla firefox\extensions\{CAFEEFAC-0016-0000-0005-ABCDEFFEDCBA}
FF - Ext: Java Console: {CAFEEFAC-0016-0000-0007-ABCDEFFEDCBA} - c:\program files\mozilla firefox\extensions\{CAFEEFAC-0016-0000-0007-ABCDEFFEDCBA}
FF - Ext: Java Console: {CAFEEFAC-0016-0000-0011-ABCDEFFEDCBA} - c:\program files\mozilla firefox\extensions\{CAFEEFAC-0016-0000-0011-ABCDEFFEDCBA}
FF - Ext: Java Console: {CAFEEFAC-0016-0000-0013-ABCDEFFEDCBA} - c:\program files\mozilla firefox\extensions\{CAFEEFAC-0016-0000-0013-ABCDEFFEDCBA}
FF - Ext: Java Console: {CAFEEFAC-0016-0000-0015-ABCDEFFEDCBA} - c:\program files\mozilla firefox\extensions\{CAFEEFAC-0016-0000-0015-ABCDEFFEDCBA}
FF - Ext: Java Console: {CAFEEFAC-0016-0000-0017-ABCDEFFEDCBA} - c:\program files\mozilla firefox\extensions\{CAFEEFAC-0016-0000-0017-ABCDEFFEDCBA}
FF - Ext: Java Console: {CAFEEFAC-0016-0000-0021-ABCDEFFEDCBA} - c:\program files\mozilla firefox\extensions\{CAFEEFAC-0016-0000-0021-ABCDEFFEDCBA}
FF - Ext: Move Media Player: moveplayer@movenetworks.com - %profile%\extensions\moveplayer@movenetworks.com
FF - Ext: Coupon Manager: {0C7E3F01-99E9-4095-9BDC-F84724960B57} - %profile%\extensions\{0C7E3F01-99E9-4095-9BDC-F84724960B57}
FF - Ext: Microsoft .NET Framework Assistant: {20a82645-c095-46ed-80e3-08825760534b} - %profile%\extensions\{20a82645-c095-46ed-80e3-08825760534b}
FF - Ext: PHPNukeEN Toolbar: {dd02a4eb-4afd-4d60-99d8-e67f964ca813} - %profile%\extensions\{dd02a4eb-4afd-4d60-99d8-e67f964ca813}
FF - Ext: XFINITYToolbar: {4b9bcce8-a70b-402a-a7e1-db96831ee26f} - %profile%\extensions\{4b9bcce8-a70b-402a-a7e1-db96831ee26f}
FF - Ext: Microsoft .NET Framework Assistant: {20a82645-c095-46ed-80e3-08825760534b} - c:\windows\microsoft.net\framework\v3.5\windows presentation foundation\DotNetAssistantExtension
FF - Ext: Java Quick Starter: jqs@sun.com - c:\program files\java\jre6\lib\deploy\jqs\ff
.
============= SERVICES / DRIVERS ===============
.
R1 GIDv2;GIDv2;c:\windows\system32\drivers\gidv2.sys [2012-2-19 25232]
R1 oreans32;oreans32;c:\windows\system32\drivers\oreans32.sys [2008-12-20 33824]
R2 AntiSpywareService;Comcast AntiSpyware;c:\program files\comcasttb\comcastspywarescan\ComcastAntiSpyService.exe [2009-6-17 616408]
R2 IDVaultSvc;CGPS Service;c:\program files\constant guard protection suite\IDVaultSvc.exe [2012-2-15 65096]
R2 MBAMService;MBAMService;c:\program files\malwarebytes' anti-malware\mbamservice.exe [2012-2-18 652360]
R3 MBAMProtector;MBAMProtector;c:\windows\system32\drivers\mbam.sys [2012-2-18 20464]
S2 AdobeActiveFileMonitor9.0;Adobe Active File Monitor V9;d:\kelsey\elements 9 organizer\photoshopelementsfileagent.exe --> d:\kelsey\elements 9 organizer\PhotoshopElementsFileAgent.exe [?]
S3 McComponentHostService;McAfee Security Scan Component Host Service;c:\program files\mcafee security scan\2.0.181\McCHSvc.exe [2010-1-15 227232]
S3 SydexFDD;Sydex Diskette Driver;c:\windows\system32\drivers\sydexfdd.sys --> c:\windows\system32\drivers\sydexfdd.sys [?]
.
=============== Created Last 30 ================
.
2012-03-02 00:34:12 205072 ----a-w- c:\windows\system32\drivers\tmcomm.sys
2012-02-29 01:39:36 -------- d-----w- C:\spoolerlogs
2012-02-20 04:05:07 -------- d-----w- c:\documents and settings\mom\application data\comcasttb
2012-02-20 03:17:43 -------- d-----w- c:\documents and settings\all users\application data\Norton
2012-02-20 02:45:07 -------- d-----w- c:\documents and settings\all users\application data\IsolatedStorage
2012-02-20 02:45:03 -------- d-----w- c:\documents and settings\mom\local settings\application data\ID Vault
2012-02-20 02:44:02 -------- d-----w- c:\documents and settings\mom\application data\ID Vault
2012-02-20 02:43:14 25232 ------w- c:\windows\system32\drivers\gidv2.sys
2012-02-20 02:43:08 -------- d-----w- c:\documents and settings\all users\GID
2012-02-20 02:43:03 -------- d-----w- c:\program files\SFT
2012-02-20 02:42:44 -------- d-----w- c:\documents and settings\mom\application data\CallingID
2012-02-20 02:42:30 -------- d-----w- c:\program files\comcasttb
2012-02-20 02:42:17 -------- d-----w- c:\program files\CA
2012-02-20 02:41:33 -------- d-----w- c:\documents and settings\mom\application data\xfin_portal
2012-02-20 02:41:28 -------- d-----w- c:\program files\xfin_portal
2012-02-20 02:41:15 -------- d-----w- c:\program files\Constant Guard Protection Suite
2012-02-20 02:40:45 -------- d-----w- c:\documents and settings\all users\application data\White Sky, Inc
2012-02-18 17:00:01 -------- d-----w- c:\documents and settings\mom\application data\PriceGong
2012-02-18 14:52:21 -------- d-----w- C:\7052d45f17328a2256
2012-02-18 04:29:04 -------- d-----w- c:\documents and settings\mom\application data\Malwarebytes
2012-02-18 04:28:46 -------- d-----w- c:\documents and settings\all users\application data\Malwarebytes
2012-02-18 04:28:41 20464 ----a-w- c:\windows\system32\drivers\mbam.sys
2012-02-18 04:28:41 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
2012-02-18 03:57:52 -------- d-----w- c:\documents and settings\mom\application data\6C408
2012-02-17 05:17:01 -------- d-----w- C:\6C408
2012-02-17 05:16:11 -------- d-----w- c:\program files\0871F
2012-02-17 05:15:28 -------- d-----w- c:\program files\LP
.
==================== Find3M ====================
.
2012-02-21 03:47:08 414368 ----a-w- c:\windows\system32\FlashPlayerCPLApp.cpl
.
=================== ROOTKIT ====================
.
Stealth MBR rootkit/Mebroot/Sinowal/TDL4 detector 0.4.2 by Gmer, http://www.gmer.net
Windows 5.1.2600
.
CreateFile("\\.\PHYSICALDRIVE0"): The process cannot access the file because it is being used by another process.
device: opened successfully
user: error reading MBR
.
Disk trace:
called modules: ntoskrnl.exe CLASSPNP.SYS disk.sys ACPI.sys hal.dll >>UNKNOWN [0x88A1449F]<<
_asm { PUSH EBP; MOV EBP, ESP; PUSH ECX; MOV EAX, [EBP+0x8]; CMP EAX, [0x88a1b738]; MOV EAX, [0x88a1b8ac]; PUSH EBX; PUSH ESI; MOV ESI, [EBP+0xc]; MOV EBX, [ESI+0x60]; PUSH EDI; JNZ 0x20; MOV [EBP+0x8], EAX; }
1 nt!IofCallDriver[0x804E13B9] -> \Device\Harddisk0\DR0[0x88B2BAB8]
3 CLASSPNP[0xBA108FD7] -> nt!IofCallDriver[0x804E13B9] -> \Device\0000007c[0x88B439E8]
5 ACPI[0xBA05F620] -> nt!IofCallDriver[0x804E13B9] -> [0x88B44940]
\Driver\atapi[0x88ABF7F0] -> IRP_MJ_CREATE -> 0x88A1449F
kernel: MBR read successfully
_asm { XOR AX, AX; MOV SS, AX; MOV SP, 0x7c00; STI ; PUSH AX; POP ES; PUSH AX; POP DS; CLD ; MOV SI, 0x7c1b; MOV DI, 0x61b; PUSH AX; PUSH DI; MOV CX, 0x1e5; REP MOVSB ; RETF ; MOV SI, 0x7be; MOV CL, 0x4; CMP [SI], CH; JL 0x2d; JNZ 0x3b; }
detected disk devices:
detected hooks:
\Driver\atapi DriverStartIo -> 0x88A142C6
user != kernel MBR !!!
Warning: possible TDL4 rootkit infection !
TDL4 rootkit infection detected ! Use: "mbr.exe -f" to fix.
.
============= FINISH: 19:08:34.76 ===============


GMER 1.0.15.15641 - http://www.gmer.net
Rootkit scan 2012-03-14 19:57:53
Windows 5.1.2600 Service Pack 3 Harddisk0\DR0 -> \Device\Ide\IdePort0 rev.
Running: jk2ohvf2.exe; Driver: C:\DOCUME~1\mom\LOCALS~1\Temp\pxtdipow.sys


---- Kernel code sections - GMER 1.0.15 ----

.text C:\WINDOWS\system32\drivers\oreans32.sys section is writeable [0xBA2D8280, 0x7B1C, 0xE8000020]

---- User code sections - GMER 1.0.15 ----

.text C:\Program Files\Internet Explorer\iexplore.exe[472] USER32.dll!DialogBoxParamW 7E4247AB 5 Bytes JMP 3E1DF4D9 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[472] USER32.dll!DialogBoxIndirectParamW 7E432072 5 Bytes JMP 3E3527F6 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[472] USER32.dll!MessageBoxIndirectA 7E43A082 5 Bytes JMP 3E352777 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[472] USER32.dll!DialogBoxParamA 7E43B144 5 Bytes JMP 3E3527BB C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[472] USER32.dll!MessageBoxExW 7E450838 5 Bytes JMP 3E352703 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[472] USER32.dll!MessageBoxExA 7E45085C 5 Bytes JMP 3E35273D C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[472] USER32.dll!DialogBoxIndirectParamA 7E456D7D 5 Bytes JMP 3E352831 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[472] USER32.dll!MessageBoxIndirectW 7E4664D5 5 Bytes JMP 3E20178A C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[472] ole32.dll!OleLoadFromStream 7752981B 5 Bytes JMP 3E3529F3 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\WINDOWS\System32\svchost.exe[988] kernel32.dll!WriteFile 7C810E27 5 Bytes JMP 0096000C
.text C:\WINDOWS\System32\svchost.exe[988] USER32.dll!GetCursorPos 7E42974E 5 Bytes JMP 0230000A
.text C:\WINDOWS\System32\svchost.exe[988] USER32.dll!WindowFromPoint 7E429766 5 Bytes JMP 0231000A
.text C:\WINDOWS\System32\svchost.exe[988] USER32.dll!GetForegroundWindow 7E429823 5 Bytes JMP 0282000A
.text C:\WINDOWS\System32\svchost.exe[988] ole32.dll!CoCreateInstance 774FF1AC 5 Bytes JMP 00E7000A

---- Devices - GMER 1.0.15 ----

Device \FileSystem\Udfs \UdfsCdRom tfsnifs.sys (Drive Letter Access Component/Sonic Solutions)
Device \FileSystem\Udfs \UdfsDisk tfsnifs.sys (Drive Letter Access Component/Sonic Solutions)
Device \Driver\atapi -> DriverStartIo \Device\Ide\IdePort0 8887E2C6
Device \Driver\atapi -> DriverStartIo \Device\Ide\IdeDeviceP0T0L0-3 8887E2C6
Device \Driver\atapi -> DriverStartIo \Device\Ide\IdePort1 8887E2C6
Device \Driver\atapi -> DriverStartIo \Device\Ide\IdeDeviceP1T0L0-e 8887E2C6

---- Registry - GMER 1.0.15 ----

Reg HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\854EEFB99D9E3B010BF18C3B9B1A1EE8@P_9}\0\b_\1\f\t\1.0}\xbd/0}\xa0o9}(\0X_9}H\6 02:\SOFTWARE\Microsoft\Windows\CurrentVersion\SideBySide\Installations\x86_Microsoft.VC80.CRT_1fc8b3b9a1e18e3b_8.0.50727.193_x-ww_68212ab8\doJ????@A?????????MZ?????????????
Reg HKLM\SOFTWARE\Classes\CLSID\{47629D4B-2AD3-4e50-B716-A66C15C63153}\InprocServer32
Reg HKLM\SOFTWARE\Classes\CLSID\{47629D4B-2AD3-4e50-B716-A66C15C63153}\InprocServer32@ThreadingModel Apartment
Reg HKLM\SOFTWARE\Classes\CLSID\{47629D4B-2AD3-4e50-B716-A66C15C63153}\InprocServer32@ C:\WINDOWS\system32\OLE32.DLL
Reg HKLM\SOFTWARE\Classes\CLSID\{47629D4B-2AD3-4e50-B716-A66C15C63153}\InprocServer32@cd042efbbd7f7af1647644e76e06692b 0xE2 0x63 0x26 0xF1 ...
Reg HKLM\SOFTWARE\Classes\CLSID\{50916EBD-EE64-DC4C-5763-A3CD28AA5762}\InProcServer32
Reg HKLM\SOFTWARE\Classes\CLSID\{50916EBD-EE64-DC4C-5763-A3CD28AA5762}\InProcServer32@oadfcdmnionfbmhalcokmiafilfojc 0x6A 0x61 0x65 0x6F ...
Reg HKLM\SOFTWARE\Classes\CLSID\{50916EBD-EE64-DC4C-5763-A3CD28AA5762}\InProcServer32@nadfibgpdoghkadachfhndepnpll 0x69 0x61 0x69 0x6F ...
Reg HKLM\SOFTWARE\Classes\CLSID\{5A647234-B666-9EBA-1391-6FC2E2873A9E}\Implemented Categories\{00021492-0000-0000-C000-000000000046}
Reg HKLM\SOFTWARE\Classes\CLSID\{5A647234-B666-9EBA-1391-6FC2E2873A9E}\InProcServer32@ %SystemRoot%\system32\SHELL32.dll
Reg HKLM\SOFTWARE\Classes\CLSID\{5A647234-B666-9EBA-1391-6FC2E2873A9E}\InProcServer32@ThreadingModel Apartment
Reg HKLM\SOFTWARE\Classes\CLSID\{604BB98A-A94F-4a5c-A67C-D8D3582C741C}\InprocServer32
Reg HKLM\SOFTWARE\Classes\CLSID\{604BB98A-A94F-4a5c-A67C-D8D3582C741C}\InprocServer32@ThreadingModel Apartment
Reg HKLM\SOFTWARE\Classes\CLSID\{604BB98A-A94F-4a5c-A67C-D8D3582C741C}\InprocServer32@ C:\WINDOWS\system32\OLE32.DLL
Reg HKLM\SOFTWARE\Classes\CLSID\{604BB98A-A94F-4a5c-A67C-D8D3582C741C}\InprocServer32@bca643cdc5c2726b20d2ecedcc62c59b 0x71 0x3B 0x04 0x66 ...
Reg HKLM\SOFTWARE\Classes\CLSID\{684373FB-9CD8-4e47-B990-5A4466C16034}\InprocServer32
Reg HKLM\SOFTWARE\Classes\CLSID\{684373FB-9CD8-4e47-B990-5A4466C16034}\InprocServer32@ThreadingModel Apartment
Reg HKLM\SOFTWARE\Classes\CLSID\{684373FB-9CD8-4e47-B990-5A4466C16034}\InprocServer32@ C:\WINDOWS\system32\OLE32.DLL
Reg HKLM\SOFTWARE\Classes\CLSID\{684373FB-9CD8-4e47-B990-5A4466C16034}\InprocServer32@2c81e34222e8052573023a60d06dd016 0x25 0xDA 0xEC 0x7E ...
Reg HKLM\SOFTWARE\Classes\CLSID\{74554CCD-F60F-4708-AD98-D0152D08C8B9}\InprocServer32
Reg HKLM\SOFTWARE\Classes\CLSID\{74554CCD-F60F-4708-AD98-D0152D08C8B9}\InprocServer32@ThreadingModel Apartment
Reg HKLM\SOFTWARE\Classes\CLSID\{74554CCD-F60F-4708-AD98-D0152D08C8B9}\InprocServer32@ C:\WINDOWS\system32\OLE32.DLL
Reg HKLM\SOFTWARE\Classes\CLSID\{74554CCD-F60F-4708-AD98-D0152D08C8B9}\InprocServer32@2582ae41fb52324423be06337561aa48 0x3E 0x1E 0x9E 0xE0 ...
Reg HKLM\SOFTWARE\Classes\CLSID\{7EB537F9-A916-4339-B91B-DED8E83632C0}\InprocServer32
Reg HKLM\SOFTWARE\Classes\CLSID\{7EB537F9-A916-4339-B91B-DED8E83632C0}\InprocServer32@ThreadingModel Apartment
Reg HKLM\SOFTWARE\Classes\CLSID\{7EB537F9-A916-4339-B91B-DED8E83632C0}\InprocServer32@ C:\WINDOWS\system32\OLE32.DLL
Reg HKLM\SOFTWARE\Classes\CLSID\{7EB537F9-A916-4339-B91B-DED8E83632C0}\InprocServer32@caaeda5fd7a9ed7697d9686d4b818472 0xF5 0x1D 0x4D 0x73 ...
Reg HKLM\SOFTWARE\Classes\CLSID\{948395E8-7A56-4fb1-843B-3E52D94DB145}\InprocServer32
Reg HKLM\SOFTWARE\Classes\CLSID\{948395E8-7A56-4fb1-843B-3E52D94DB145}\InprocServer32@ThreadingModel Apartment
Reg HKLM\SOFTWARE\Classes\CLSID\{948395E8-7A56-4fb1-843B-3E52D94DB145}\InprocServer32@ C:\WINDOWS\system32\OLE32.DLL
Reg HKLM\SOFTWARE\Classes\CLSID\{948395E8-7A56-4fb1-843B-3E52D94DB145}\InprocServer32@a4a1bcf2cc2b8bc3716b74b2b4522f5d 0xDF 0x20 0x58 0x62 ...
Reg HKLM\SOFTWARE\Classes\CLSID\{AC3ED30B-6F1A-4bfc-A4F6-2EBDCCD34C19}\InprocServer32
Reg HKLM\SOFTWARE\Classes\CLSID\{AC3ED30B-6F1A-4bfc-A4F6-2EBDCCD34C19}\InprocServer32@ThreadingModel Apartment
Reg HKLM\SOFTWARE\Classes\CLSID\{AC3ED30B-6F1A-4bfc-A4F6-2EBDCCD34C19}\InprocServer32@ C:\WINDOWS\system32\OLE32.DLL
Reg HKLM\SOFTWARE\Classes\CLSID\{AC3ED30B-6F1A-4bfc-A4F6-2EBDCCD34C19}\InprocServer32@4d370831d2c43cd13623e232fed27b7b 0x31 0x77 0xE1 0xBA ...
Reg HKLM\SOFTWARE\Classes\CLSID\{DE5654CA-EB84-4df9-915B-37E957082D6D}\InprocServer32
Reg HKLM\SOFTWARE\Classes\CLSID\{DE5654CA-EB84-4df9-915B-37E957082D6D}\InprocServer32@ThreadingModel Apartment
Reg HKLM\SOFTWARE\Classes\CLSID\{DE5654CA-EB84-4df9-915B-37E957082D6D}\InprocServer32@ C:\WINDOWS\system32\OLE32.DLL
Reg HKLM\SOFTWARE\Classes\CLSID\{DE5654CA-EB84-4df9-915B-37E957082D6D}\InprocServer32@1d68fe701cdea33e477eb204b76f993d 0x83 0x6C 0x56 0x8B ...
Reg HKLM\SOFTWARE\Classes\CLSID\{E39C35E8-7488-4926-92B2-2F94619AC1A5}\InprocServer32
Reg HKLM\SOFTWARE\Classes\CLSID\{E39C35E8-7488-4926-92B2-2F94619AC1A5}\InprocServer32@ThreadingModel Apartment
Reg HKLM\SOFTWARE\Classes\CLSID\{E39C35E8-7488-4926-92B2-2F94619AC1A5}\InprocServer32@ C:\WINDOWS\system32\OLE32.DLL
Reg HKLM\SOFTWARE\Classes\CLSID\{E39C35E8-7488-4926-92B2-2F94619AC1A5}\InprocServer32@1fac81b91d8e3c5aa4b0a51804d844a3 0xB2 0x46 0x9A 0xE2 ...
Reg HKLM\SOFTWARE\Classes\CLSID\{EACAFCE5-B0E2-4288-8073-C02FF9619B6F}\InprocServer32
Reg HKLM\SOFTWARE\Classes\CLSID\{EACAFCE5-B0E2-4288-8073-C02FF9619B6F}\InprocServer32@ThreadingModel Apartment
Reg HKLM\SOFTWARE\Classes\CLSID\{EACAFCE5-B0E2-4288-8073-C02FF9619B6F}\InprocServer32@ C:\WINDOWS\system32\OLE32.DLL
Reg HKLM\SOFTWARE\Classes\CLSID\{EACAFCE5-B0E2-4288-8073-C02FF9619B6F}\InprocServer32@f5f62a6129303efb32fbe080bb27835b 0x3D 0xCE 0xEA 0x26 ...
Reg HKLM\SOFTWARE\Classes\CLSID\{F8F02ADD-7366-4186-9488-C21CB8B3DCEC}\InprocServer32
Reg HKLM\SOFTWARE\Classes\CLSID\{F8F02ADD-7366-4186-9488-C21CB8B3DCEC}\InprocServer32@ThreadingModel Apartment
Reg HKLM\SOFTWARE\Classes\CLSID\{F8F02ADD-7366-4186-9488-C21CB8B3DCEC}\InprocServer32@ C:\WINDOWS\system32\OLE32.DLL
Reg HKLM\SOFTWARE\Classes\CLSID\{F8F02ADD-7366-4186-9488-C21CB8B3DCEC}\InprocServer32@fd4e2e1a3940b94dceb5a6a021f2e3c6 0xE3 0x0E 0x66 0xD5 ...
Reg HKLM\SOFTWARE\Classes\CLSID\{FEE45DE2-A467-4bf9-BF2D-1411304BCD84}\InprocServer32
Reg HKLM\SOFTWARE\Classes\CLSID\{FEE45DE2-A467-4bf9-BF2D-1411304BCD84}\InprocServer32@ThreadingModel Apartment
Reg HKLM\SOFTWARE\Classes\CLSID\{FEE45DE2-A467-4bf9-BF2D-1411304BCD84}\InprocServer32@ C:\WINDOWS\system32\OLE32.DLL
Reg HKLM\SOFTWARE\Classes\CLSID\{FEE45DE2-A467-4bf9-BF2D-1411304BCD84}\InprocServer32@8a8aec57dd6508a385616fbc86791ec2 0x05 0x73 0x21 0xDD ...

---- Disk sectors - GMER 1.0.15 ----

Disk \Device\Harddisk0\DR0 TDL4@MBR code has been found <-- ROOTKIT !!!
Disk \Device\Harddisk0\DR0 sector 00: rootkit-like behavior

---- EOF - GMER 1.0.15 ----

Attached Files

  • Attached File  dds.txt   19.49KB   0 downloads
  • Attached File  gmer.log   16.85KB   0 downloads


BC AdBot (Login to Remove)

 


#2 fireman4it

fireman4it

    Bleepin' Fireman


  • Malware Response Team
  • 13,505 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Greenup, Ill USA
  • Local time:08:56 AM

Posted 14 March 2012 - 10:07 PM

Hello fujymo,
  • Welcome to Bleeping Computer.
  • My name is fireman4it and I will be helping you with your Malware problem.

    Please take note of some guidelines for this fix:
  • Refrain from making any changes to your computer including installing/uninstall programs, deleting files, modifying the registry, and running scanners or tools.
  • If you do not understand any step(s) provided, please do not hesitate to ask before continuing.
  • Even if things appear to be better, it might not mean we are finished. Please continue to follow my instructions and reply back until I give you the "all clean".
  • In the upper right hand corner of the topic you will see a button called Watch Topic.I suggest you click it and select Immediate E-Mail notification and click on Proceed. This way you will be advised when we respond to your topic and facilitate the cleaning of your machine.

  • Finally, please reply using the ADD REPLY button in the lower right hand corner of your screen. Do not start a new topic. The logs that you post should be pasted directly into the reply, unless they do not fit into the post.


1.
Please download the TDSS Rootkit Removing Tool (TDSSKiller.exe) and save it to your Desktop. <-Important!!!
  • Double-click on TDSSKiller.exe to run the tool for known TDSS variants.
    Vista/Windows 7 users right-click and select Run As Administrator.
  • If TDSSKiller does not run, try renaming it.
  • To do this, right-click on TDSSKiller.exe, select Rename and give it a random name with the .com file extension (i.e. 123abc.com). If you do not see the file extension, please refer to How to change the file extension.
  • Click the Start Scan button.
  • Do not use the computer during the scan
  • If the scan completes with nothing found, click Close to exit.
  • If malicious objects are found, they will show in the Scan results - Select action for found objects and offer three options.
  • Ensure Cure (default) is selected, then click Continue > Reboot now to finish the cleaning process.
    Note: If Cure is not an option, Skip instead, do not choose Delete unless instructed.
  • A log file named TDSSKiller_version_date_time_log.txt (i.e. TDSSKiller.2.4.0.0_27.07.2010_09.o7.26_log.txt) will be created and saved to the root directory (usually Local Disk C:).
  • Copy and paste the contents of that file in your next reply.


2.
Install Recovery Console and Run ComboFix

This tool is not a toy. If used the wrong way you could trash your computer. Please use only under direction of a Helper. If you decide to do so anyway, please do not blame me or ComboFix.

Download Combofix from any of the links below, and save it to your desktop.

Link 1
Link 2
  • Close/disable all anti-virus and anti-malware programs so they do not interfere with the running of ComboFix. Refer to this page if you are not sure how.
  • Close any open windows, including this one.
  • Double click on ComboFix.exe & follow the prompts.
  • As part of it's process, ComboFix will check to see if the Microsoft Windows Recovery Console is installed. With malware infections being as they are today, it's strongly recommended to have this pre-installed on your machine before doing any malware removal. It will allow you to boot up into a special recovery/repair mode that will allow us to more easily help you should your computer have a problem after an attempted removal of malware.
  • If you did not have it installed, you will see the prompt below. Choose YES.
  • Posted Image
  • Follow the prompts to allow ComboFix to download and install the Microsoft Windows Recovery Console, and when prompted, agree to the End-User License Agreement to install the Microsoft Windows Recovery Console.
**Please note: If the Microsoft Windows Recovery Console is already installed, ComboFix will continue it's malware removal procedures.

Note:The Windows Recovery Console will allow you to boot up into a special recovery (repair) mode. This allows us to more easily help you
should your computer have a problem after an attempted removal of malware. It is a simple procedure that will only take a few moments of your time.

  • Once the Microsoft Windows Recovery Console is installed using ComboFix, you should see the following message:

    Posted Image
  • Click on Yes, to continue scanning for malware.
  • When finished, it will produce a report for you. Please post the contents of the log (C:\ComboFix.txt).
Leave your computer alone while ComboFix is running.
ComboFix will restart your computer if malware is found; allow it to do so.


Note: Please Do NOT mouseclick combofix's window while its running because it may cause it to stall.


Things to include in your next reply::
TdssKiller log
Combofix.txt
How is your machine running now?

" Extinguishing Malware from the world"

The Virus, Trojan, Spyware, and Malware Removal forum is very busy. If I'm helping you and I've not posted back within 24 hrs., send a PM with your topic link. Thank you.

ALL OTHER HELP REQUESTS VIA THE PM SYSTEM WILL BE IGNORED. The Forums are there for a reason!
Thanks-


  userbar_eis_500.gif

If I have helped you, consider making a donation to help me continue the fight against Malware! Just click btn_donate_LG.gif


#3 fujymo

fujymo
  • Topic Starter

  • Members
  • 6 posts
  • OFFLINE
  •  
  • Local time:08:56 AM

Posted 15 March 2012 - 04:52 PM

Fireman4it,

Thanks for the help. It has taken about 2 hours to complete the task but here it is. After the TDSSkiller the computer did an automatic update when it rebooted. When the computer came back up I did get a warning from malwarebytes the it had blocked access from a potentially dangerous website (ip address) Type: outgoing. I then ran combofix and when it rebooted I got to the forumn, the computer locked up and would not do anything. After two reboots it appears normal. I have not tried to update any software--Malwarebytes updated automatically on the last reboot. When I do go to ctrl alt del I am given very limited access with the ability to only see the task running on the desktop and the ablilty to end them.


Attached are the files you requested.

Thanks again.


15:28:29.0234 0644 TDSS rootkit removing tool 2.7.20.0 Mar 9 2012 17:10:43
15:28:29.0687 0644 ============================================================
15:28:29.0687 0644 Current date / time: 2012/03/15 15:28:29.0687
15:28:29.0687 0644 SystemInfo:
15:28:29.0687 0644
15:28:29.0687 0644 OS Version: 5.1.2600 ServicePack: 3.0
15:28:29.0687 0644 Product type: Workstation
15:28:29.0687 0644 ComputerName: HOME
15:28:29.0687 0644 UserName: mom
15:28:29.0687 0644 Windows directory: C:\WINDOWS
15:28:29.0687 0644 System windows directory: C:\WINDOWS
15:28:29.0687 0644 Processor architecture: Intel x86
15:28:29.0687 0644 Number of processors: 2
15:28:29.0687 0644 Page size: 0x1000
15:28:29.0687 0644 Boot type: Normal boot
15:28:29.0687 0644 ============================================================
15:28:33.0718 0644 Drive \Device\Harddisk0\DR0 - Size: 0x12A1F16000 (74.53 Gb), SectorSize: 0x200, Cylinders: 0x2601, SectorsPerTrack: 0x3F, TracksPerCylinder: 0xFF, Type 'K0', Flags 0x00000054
15:28:33.0734 0644 \Device\Harddisk0\DR0:
15:28:33.0734 0644 MBR used
15:28:33.0734 0644 \Device\Harddisk0\DR0\Partition0: MBR, Type 0x7, StartLBA 0x3F, BlocksNum 0x950E482
15:28:33.0781 0644 Initialize success
15:28:33.0781 0644 ============================================================
15:28:43.0765 3464 ============================================================
15:28:43.0765 3464 Scan started
15:28:43.0765 3464 Mode: Manual;
15:28:43.0765 3464 ============================================================
15:28:44.0328 3464 Abiosdsk - ok
15:28:44.0421 3464 abp480n5 - ok
15:28:44.0531 3464 ACPI (8fd99680a539792a30e97944fdaecf17) C:\WINDOWS\system32\DRIVERS\ACPI.sys
15:28:44.0531 3464 ACPI - ok
15:28:44.0656 3464 ACPIEC (9859c0f6936e723e4892d7141b1327d5) C:\WINDOWS\system32\DRIVERS\ACPIEC.sys
15:28:44.0656 3464 ACPIEC - ok
15:28:44.0687 3464 adpu160m - ok
15:28:44.0781 3464 aec (8bed39e3c35d6a489438b8141717a557) C:\WINDOWS\system32\drivers\aec.sys
15:28:44.0781 3464 aec - ok
15:28:44.0890 3464 AFD (1e44bc1e83d8fd2305f8d452db109cf9) C:\WINDOWS\System32\drivers\afd.sys
15:28:44.0906 3464 AFD - ok
15:28:45.0093 3464 AgereSoftModem (052343cd49c8da20c48958cfe73c7d44) C:\WINDOWS\system32\DRIVERS\AGRSM.sys
15:28:45.0140 3464 AgereSoftModem - ok
15:28:45.0359 3464 Aha154x - ok
15:28:45.0421 3464 aic78u2 - ok
15:28:45.0468 3464 aic78xx - ok
15:28:45.0609 3464 ALCXSENS (ba88534a3ceb6161e7432438b9ea4f54) C:\WINDOWS\system32\drivers\ALCXSENS.SYS
15:28:45.0625 3464 ALCXSENS - ok
15:28:46.0140 3464 ALCXWDM (744cd5d2a92c34513c34e855cd651988) C:\WINDOWS\system32\drivers\ALCXWDM.SYS
15:28:46.0296 3464 ALCXWDM - ok
15:28:46.0531 3464 AliIde - ok
15:28:46.0562 3464 amsint - ok
15:28:46.0671 3464 ApfiltrService (3ed81e8b4709d13e5a38db2d8e792b28) C:\WINDOWS\system32\DRIVERS\Apfiltr.sys
15:28:46.0687 3464 ApfiltrService - ok
15:28:46.0828 3464 AR5211 (466708ae500e11cfa56483ee7fb9ad11) C:\WINDOWS\system32\DRIVERS\ar5211.sys
15:28:46.0859 3464 AR5211 - ok
15:28:46.0953 3464 Arp1394 (b5b8a80875c1dededa8b02765642c32f) C:\WINDOWS\system32\DRIVERS\arp1394.sys
15:28:46.0953 3464 Arp1394 - ok
15:28:46.0984 3464 ASAPIW2k - ok
15:28:47.0015 3464 asc - ok
15:28:47.0078 3464 asc3350p - ok
15:28:47.0125 3464 asc3550 - ok
15:28:47.0250 3464 AsyncMac (b153affac761e7f5fcfa822b9c4e97bc) C:\WINDOWS\system32\DRIVERS\asyncmac.sys
15:28:47.0250 3464 AsyncMac - ok
15:28:47.0312 3464 atapi (9f3a2f5aa6875c72bf062c712cfa2674) C:\WINDOWS\system32\DRIVERS\atapi.sys
15:28:47.0312 3464 atapi - ok
15:28:47.0359 3464 Atdisk - ok
15:28:47.0515 3464 ati2mtag (4938ad74de9088f70922fabf86912eee) C:\WINDOWS\system32\DRIVERS\ati2mtag.sys
15:28:47.0546 3464 ati2mtag - ok
15:28:47.0812 3464 Atmarpc (9916c1225104ba14794209cfa8012159) C:\WINDOWS\system32\DRIVERS\atmarpc.sys
15:28:47.0828 3464 Atmarpc - ok
15:28:47.0921 3464 audstub (d9f724aa26c010a217c97606b160ed68) C:\WINDOWS\system32\DRIVERS\audstub.sys
15:28:47.0921 3464 audstub - ok
15:28:48.0046 3464 Beep (da1f27d85e0d1525f6621372e7b685e9) C:\WINDOWS\system32\drivers\Beep.sys
15:28:48.0046 3464 Beep - ok
15:28:48.0125 3464 caboagp (10d5fb74ee18ea49c30daaa203c0e0ec) C:\WINDOWS\system32\DRIVERS\atisgkaf.sys
15:28:48.0125 3464 caboagp - ok
15:28:48.0234 3464 cbidf2k (90a673fc8e12a79afbed2576f6a7aaf9) C:\WINDOWS\system32\drivers\cbidf2k.sys
15:28:48.0234 3464 cbidf2k - ok
15:28:48.0328 3464 CCDECODE (0be5aef125be881c4f854c554f2b025c) C:\WINDOWS\system32\DRIVERS\CCDECODE.sys
15:28:48.0328 3464 CCDECODE - ok
15:28:48.0359 3464 cd20xrnt - ok
15:28:48.0406 3464 Cdaudio (c1b486a7658353d33a10cc15211a873b) C:\WINDOWS\system32\drivers\Cdaudio.sys
15:28:48.0421 3464 Cdaudio - ok
15:28:48.0500 3464 Cdfs (c885b02847f5d2fd45a24e219ed93b32) C:\WINDOWS\system32\drivers\Cdfs.sys
15:28:48.0500 3464 Cdfs - ok
15:28:48.0640 3464 Cdr4_xp (c3e76b0c05ebf7261abfb08d9e75822e) C:\WINDOWS\system32\drivers\Cdr4_xp.sys
15:28:48.0640 3464 Cdr4_xp - ok
15:28:48.0875 3464 Cdralw2k (17590dfe29e02842a6e3a463e443d1b9) C:\WINDOWS\system32\drivers\Cdralw2k.sys
15:28:48.0875 3464 Cdralw2k - ok
15:28:48.0953 3464 Cdrom (1f4260cc5b42272d71f79e570a27a4fe) C:\WINDOWS\system32\DRIVERS\cdrom.sys
15:28:48.0968 3464 Cdrom - ok
15:28:49.0031 3464 Changer - ok
15:28:49.0109 3464 CmBatt (0f6c187d38d98f8df904589a5f94d411) C:\WINDOWS\system32\DRIVERS\CmBatt.sys
15:28:49.0109 3464 CmBatt - ok
15:28:49.0140 3464 CmdIde - ok
15:28:49.0187 3464 Compbatt (6e4c9f21f0fae8940661144f41b13203) C:\WINDOWS\system32\DRIVERS\compbatt.sys
15:28:49.0187 3464 Compbatt - ok
15:28:49.0265 3464 Cpqarray - ok
15:28:49.0328 3464 dac2w2k - ok
15:28:49.0359 3464 dac960nt - ok
15:28:49.0500 3464 DCamUSBEMPIA (5118ea8a2f55fa4d4295516500b78229) C:\WINDOWS\system32\DRIVERS\emDevice.sys
15:28:49.0500 3464 DCamUSBEMPIA - ok
15:28:49.0609 3464 Disk (044452051f3e02e7963599fc8f4f3e25) C:\WINDOWS\system32\DRIVERS\disk.sys
15:28:49.0609 3464 Disk - ok
15:28:49.0718 3464 DKbFltr (e73b3a5337ea55c2bae2a1a0caf7a728) C:\WINDOWS\system32\Drivers\DKbFltr.sys
15:28:49.0718 3464 DKbFltr - ok
15:28:49.0921 3464 dmboot (d992fe1274bde0f84ad826acae022a41) C:\WINDOWS\system32\drivers\dmboot.sys
15:28:49.0937 3464 dmboot - ok
15:28:50.0000 3464 dmio (7c824cf7bbde77d95c08005717a95f6f) C:\WINDOWS\system32\drivers\dmio.sys
15:28:50.0015 3464 dmio - ok
15:28:50.0093 3464 dmload (e9317282a63ca4d188c0df5e09c6ac5f) C:\WINDOWS\system32\drivers\dmload.sys
15:28:50.0093 3464 dmload - ok
15:28:50.0328 3464 DMusic (8a208dfcf89792a484e76c40e5f50b45) C:\WINDOWS\system32\drivers\DMusic.sys
15:28:50.0328 3464 DMusic - ok
15:28:50.0406 3464 dpti2o - ok
15:28:50.0453 3464 drmkaud (8f5fcff8e8848afac920905fbd9d33c8) C:\WINDOWS\system32\drivers\drmkaud.sys
15:28:50.0468 3464 drmkaud - ok
15:28:50.0562 3464 drvmcdb (f41619ae216b51d68dda163805eefaa9) C:\WINDOWS\system32\drivers\drvmcdb.sys
15:28:50.0578 3464 drvmcdb - ok
15:28:50.0640 3464 drvnddm (2ff629c1c443e25d0149b9dfb77e43a8) C:\WINDOWS\system32\drivers\drvnddm.sys
15:28:50.0640 3464 drvnddm - ok
15:28:50.0765 3464 emAudio (ffa45148a2d5d05dbb3c0997e579fc9c) C:\WINDOWS\system32\drivers\emAudio.sys
15:28:50.0765 3464 emAudio - ok
15:28:50.0843 3464 EMSCR (6428a1ce5abe3e71a97dfdda0a19546f) C:\WINDOWS\system32\DRIVERS\EMS7SK.sys
15:28:50.0859 3464 EMSCR - ok
15:28:50.0937 3464 EPOWER (0b07768ae046f9ed6a75e5bc75660828) C:\WINDOWS\system32\Drivers\hkdrv.sys
15:28:50.0937 3464 EPOWER - ok
15:28:51.0031 3464 ESDCR (772127b385dec14b13325d9efcc0ac14) C:\WINDOWS\system32\DRIVERS\ESD7SK.sys
15:28:51.0031 3464 ESDCR - ok
15:28:51.0156 3464 ESMCR (472ea4e9734147f8ada93c4ab944b958) C:\WINDOWS\system32\DRIVERS\ESM7SK.sys
15:28:51.0171 3464 ESMCR - ok
15:28:51.0453 3464 Fastfat (38d332a6d56af32635675f132548343e) C:\WINDOWS\system32\drivers\Fastfat.sys
15:28:51.0468 3464 Fastfat - ok
15:28:51.0531 3464 Fdc (92cdd60b6730b9f50f6a1a0c1f8cdc81) C:\WINDOWS\system32\drivers\Fdc.sys
15:28:51.0531 3464 Fdc - ok
15:28:51.0640 3464 FiltUSBEMPIA (6f87e4706f59463b74bc4fad0f67338f) C:\WINDOWS\system32\DRIVERS\emFilter.sys
15:28:51.0640 3464 FiltUSBEMPIA - ok
15:28:51.0703 3464 Fips (d45926117eb9fa946a6af572fbe1caa3) C:\WINDOWS\system32\drivers\Fips.sys
15:28:51.0703 3464 Fips - ok
15:28:51.0750 3464 Flpydisk (9d27e7b80bfcdf1cdd9b555862d5e7f0) C:\WINDOWS\system32\drivers\Flpydisk.sys
15:28:51.0750 3464 Flpydisk - ok
15:28:51.0828 3464 FltMgr (b2cf4b0786f8212cb92ed2b50c6db6b0) C:\WINDOWS\system32\drivers\fltmgr.sys
15:28:51.0828 3464 FltMgr - ok
15:28:51.0968 3464 Fs_Rec (3e1e2bd4f39b0e2b7dc4f4d2bcc2779a) C:\WINDOWS\system32\drivers\Fs_Rec.sys
15:28:51.0968 3464 Fs_Rec - ok
15:28:52.0078 3464 Ftdisk (6ac26732762483366c3969c9e4d2259d) C:\WINDOWS\system32\DRIVERS\ftdisk.sys
15:28:52.0078 3464 Ftdisk - ok
15:28:52.0140 3464 GEARAspiWDM (ab8a6a87d9d7255c3884d5b9541a6e80) C:\WINDOWS\system32\Drivers\GEARAspiWDM.sys
15:28:52.0140 3464 GEARAspiWDM - ok
15:28:52.0265 3464 GIDv2 (20f6c49e2c410fcd32d781f521579bf5) C:\WINDOWS\system32\drivers\GIDv2.sys
15:28:52.0265 3464 GIDv2 - ok
15:28:52.0515 3464 giveio (77ebf3e9386daa51551af429052d88d0) C:\WINDOWS\system32\drivers\giveio.sys
15:28:52.0515 3464 giveio - ok
15:28:52.0656 3464 Gpc (0a02c63c8b144bd8c86b103dee7c86a2) C:\WINDOWS\system32\DRIVERS\msgpc.sys
15:28:52.0656 3464 Gpc - ok
15:28:52.0734 3464 HidUsb (ccf82c5ec8a7326c3066de870c06daf1) C:\WINDOWS\system32\DRIVERS\hidusb.sys
15:28:52.0734 3464 HidUsb - ok
15:28:52.0796 3464 hpn - ok
15:28:52.0984 3464 HTTP (f80a415ef82cd06ffaf0d971528ead38) C:\WINDOWS\system32\Drivers\HTTP.sys
15:28:53.0000 3464 HTTP - ok
15:28:53.0062 3464 i2omgmt - ok
15:28:53.0109 3464 i2omp - ok
15:28:53.0156 3464 i8042prt (4a0b06aa8943c1e332520f7440c0aa30) C:\WINDOWS\system32\DRIVERS\i8042prt.sys
15:28:53.0156 3464 i8042prt - ok
15:28:53.0328 3464 Imapi (083a052659f5310dd8b6a6cb05edcf8e) C:\WINDOWS\system32\DRIVERS\imapi.sys
15:28:53.0328 3464 Imapi - ok
15:28:53.0390 3464 ini910u - ok
15:28:53.0453 3464 IntelIde - ok
15:28:53.0500 3464 intelppm (8c953733d8f36eb2133f5bb58808b66b) C:\WINDOWS\system32\DRIVERS\intelppm.sys
15:28:53.0500 3464 intelppm - ok
15:28:53.0578 3464 Ip6Fw (3bb22519a194418d5fec05d800a19ad0) C:\WINDOWS\system32\drivers\ip6fw.sys
15:28:53.0578 3464 Ip6Fw - ok
15:28:53.0953 3464 IpFilterDriver (731f22ba402ee4b62748adaf6363c182) C:\WINDOWS\system32\DRIVERS\ipfltdrv.sys
15:28:53.0953 3464 IpFilterDriver - ok
15:28:54.0046 3464 IpInIp (b87ab476dcf76e72010632b5550955f5) C:\WINDOWS\system32\DRIVERS\ipinip.sys
15:28:54.0046 3464 IpInIp - ok
15:28:54.0093 3464 IpNat (cc748ea12c6effde940ee98098bf96bb) C:\WINDOWS\system32\DRIVERS\ipnat.sys
15:28:54.0093 3464 IpNat - ok
15:28:54.0156 3464 IPSec (23c74d75e36e7158768dd63d92789a91) C:\WINDOWS\system32\DRIVERS\ipsec.sys
15:28:54.0156 3464 IPSec - ok
15:28:54.0218 3464 irda (aca5e7b54409f9cb5eed97ed0c81120e) C:\WINDOWS\system32\DRIVERS\irda.sys
15:28:54.0218 3464 irda - ok
15:28:54.0281 3464 IRENUM (c93c9ff7b04d772627a3646d89f7bf89) C:\WINDOWS\system32\DRIVERS\irenum.sys
15:28:54.0281 3464 IRENUM - ok
15:28:54.0406 3464 isapnp (05a299ec56e52649b1cf2fc52d20f2d7) C:\WINDOWS\system32\DRIVERS\isapnp.sys
15:28:54.0421 3464 isapnp - ok
15:28:54.0531 3464 JL2005C (78648c0450b9af8d1bbc5fd86dec1642) C:\WINDOWS\system32\Drivers\jl2005c.sys
15:28:54.0546 3464 JL2005C - ok
15:28:54.0609 3464 Kbdclass (463c1ec80cd17420a542b7f36a36f128) C:\WINDOWS\system32\DRIVERS\kbdclass.sys
15:28:54.0609 3464 Kbdclass - ok
15:28:54.0671 3464 kmixer (692bcf44383d056aed41b045a323d378) C:\WINDOWS\system32\drivers\kmixer.sys
15:28:54.0687 3464 kmixer - ok
15:28:55.0015 3464 KSecDD (b467646c54cc746128904e1654c750c1) C:\WINDOWS\system32\drivers\KSecDD.sys
15:28:55.0015 3464 KSecDD - ok
15:28:55.0062 3464 lbrtfdc - ok
15:28:55.0218 3464 MarvinBus (269c14d512b74cc28d2812ff7d1eb066) C:\WINDOWS\system32\DRIVERS\MarvinBus.sys
15:28:55.0218 3464 MarvinBus - ok
15:28:55.0312 3464 MBAMProtector (b7ca8cc3f978201856b6ab82f40953c3) C:\WINDOWS\system32\drivers\mbam.sys
15:28:55.0312 3464 MBAMProtector - ok
15:28:55.0406 3464 MDC8021X (8fee53c104223973ed9919936d9cd156) C:\WINDOWS\system32\DRIVERS\mdc8021x.sys
15:28:55.0406 3464 MDC8021X - ok
15:28:55.0468 3464 meiudf (6a75fd0b5f008d711dc44d9693e8d632) C:\WINDOWS\system32\Drivers\meiudf.sys
15:28:55.0468 3464 meiudf - ok
15:28:55.0625 3464 mnmdd (4ae068242760a1fb6e1a44bf4e16afa6) C:\WINDOWS\system32\drivers\mnmdd.sys
15:28:55.0625 3464 mnmdd - ok
15:28:55.0734 3464 Modem (dfcbad3cec1c5f964962ae10e0bcc8e1) C:\WINDOWS\system32\drivers\Modem.sys
15:28:55.0734 3464 Modem - ok
15:28:55.0796 3464 Mouclass (35c9e97194c8cfb8430125f8dbc34d04) C:\WINDOWS\system32\DRIVERS\mouclass.sys
15:28:55.0796 3464 Mouclass - ok
15:28:55.0890 3464 mouhid (b1c303e17fb9d46e87a98e4ba6769685) C:\WINDOWS\system32\DRIVERS\mouhid.sys
15:28:55.0890 3464 mouhid - ok
15:28:56.0093 3464 MountMgr (a80b9a0bad1b73637dbcbba7df72d3fd) C:\WINDOWS\system32\drivers\MountMgr.sys
15:28:56.0093 3464 MountMgr - ok
15:28:56.0140 3464 mraid35x - ok
15:28:56.0234 3464 MRxDAV (11d42bb6206f33fbb3ba0288d3ef81bd) C:\WINDOWS\system32\DRIVERS\mrxdav.sys
15:28:56.0234 3464 MRxDAV - ok
15:28:56.0375 3464 MRxSmb (7d304a5eb4344ebeeab53a2fe3ffb9f0) C:\WINDOWS\system32\DRIVERS\mrxsmb.sys
15:28:56.0406 3464 MRxSmb - ok
15:28:56.0484 3464 Msfs (c941ea2454ba8350021d774daf0f1027) C:\WINDOWS\system32\drivers\Msfs.sys
15:28:56.0484 3464 Msfs - ok
15:28:56.0562 3464 MSKSSRV (d1575e71568f4d9e14ca56b7b0453bf1) C:\WINDOWS\system32\drivers\MSKSSRV.sys
15:28:56.0562 3464 MSKSSRV - ok
15:28:56.0625 3464 MSPCLOCK (325bb26842fc7ccc1fcce2c457317f3e) C:\WINDOWS\system32\drivers\MSPCLOCK.sys
15:28:56.0625 3464 MSPCLOCK - ok
15:28:56.0687 3464 MSPQM (bad59648ba099da4a17680b39730cb3d) C:\WINDOWS\system32\drivers\MSPQM.sys
15:28:56.0703 3464 MSPQM - ok
15:28:56.0734 3464 mssmbios (af5f4f3f14a8ea2c26de30f7a1e17136) C:\WINDOWS\system32\DRIVERS\mssmbios.sys
15:28:56.0734 3464 mssmbios - ok
15:28:56.0828 3464 MSTEE (e53736a9e30c45fa9e7b5eac55056d1d) C:\WINDOWS\system32\drivers\MSTEE.sys
15:28:56.0828 3464 MSTEE - ok
15:28:56.0890 3464 Mup (de6a75f5c270e756c5508d94b6cf68f5) C:\WINDOWS\system32\drivers\Mup.sys
15:28:56.0890 3464 Mup - ok
15:28:57.0125 3464 NABTSFEC (5b50f1b2a2ed47d560577b221da734db) C:\WINDOWS\system32\DRIVERS\NABTSFEC.sys
15:28:57.0140 3464 NABTSFEC - ok
15:28:57.0218 3464 NDIS (1df7f42665c94b825322fae71721130d) C:\WINDOWS\system32\drivers\NDIS.sys
15:28:57.0218 3464 NDIS - ok
15:28:57.0281 3464 NdisIP (7ff1f1fd8609c149aa432f95a8163d97) C:\WINDOWS\system32\DRIVERS\NdisIP.sys
15:28:57.0281 3464 NdisIP - ok
15:28:57.0343 3464 NdisTapi (0109c4f3850dfbab279542515386ae22) C:\WINDOWS\system32\DRIVERS\ndistapi.sys
15:28:57.0343 3464 NdisTapi - ok
15:28:57.0421 3464 Ndisuio (f927a4434c5028758a842943ef1a3849) C:\WINDOWS\system32\DRIVERS\ndisuio.sys
15:28:57.0421 3464 Ndisuio - ok
15:28:57.0484 3464 NdisWan (edc1531a49c80614b2cfda43ca8659ab) C:\WINDOWS\system32\DRIVERS\ndiswan.sys
15:28:57.0484 3464 NdisWan - ok
15:28:57.0562 3464 NDProxy (9282bd12dfb069d3889eb3fcc1000a9b) C:\WINDOWS\system32\drivers\NDProxy.sys
15:28:57.0562 3464 NDProxy - ok
15:28:57.0687 3464 NetBIOS (5d81cf9a2f1a3a756b66cf684911cdf0) C:\WINDOWS\system32\DRIVERS\netbios.sys
15:28:57.0687 3464 NetBIOS - ok
15:28:57.0750 3464 NetBT (74b2b2f5bea5e9a3dc021d685551bd3d) C:\WINDOWS\system32\DRIVERS\netbt.sys
15:28:57.0750 3464 NetBT - ok
15:28:57.0859 3464 Netdevio (1265eb253ed4ebe4acb3bd5f548ff796) C:\WINDOWS\system32\DRIVERS\netdevio.sys
15:28:57.0859 3464 Netdevio - ok
15:28:58.0250 3464 NIC1394 (e9e47cfb2d461fa0fc75b7a74c6383ea) C:\WINDOWS\system32\DRIVERS\nic1394.sys
15:28:58.0250 3464 NIC1394 - ok
15:28:58.0312 3464 Npfs (3182d64ae053d6fb034f44b6def8034a) C:\WINDOWS\system32\drivers\Npfs.sys
15:28:58.0312 3464 Npfs - ok
15:28:58.0421 3464 Ntfs (78a08dd6a8d65e697c18e1db01c5cdca) C:\WINDOWS\system32\drivers\Ntfs.sys
15:28:58.0453 3464 Ntfs - ok
15:28:58.0546 3464 Null (73c1e1f395918bc2c6dd67af7591a3ad) C:\WINDOWS\system32\drivers\Null.sys
15:28:58.0546 3464 Null - ok
15:28:58.0656 3464 NwlnkFlt (b305f3fad35083837ef46a0bbce2fc57) C:\WINDOWS\system32\DRIVERS\nwlnkflt.sys
15:28:58.0656 3464 NwlnkFlt - ok
15:28:58.0718 3464 NwlnkFwd (c99b3415198d1aab7227f2c88fd664b9) C:\WINDOWS\system32\DRIVERS\nwlnkfwd.sys
15:28:58.0718 3464 NwlnkFwd - ok
15:28:58.0796 3464 ohci1394 (ca33832df41afb202ee7aeb05145922f) C:\WINDOWS\system32\DRIVERS\ohci1394.sys
15:28:58.0796 3464 ohci1394 - ok
15:28:59.0156 3464 oreans32 (b99575d16f887883b821d372ff292c20) C:\WINDOWS\system32\drivers\oreans32.sys
15:28:59.0156 3464 oreans32 - ok
15:28:59.0250 3464 Parport (5575faf8f97ce5e713d108c2a58d7c7c) C:\WINDOWS\system32\DRIVERS\parport.sys
15:28:59.0250 3464 Parport - ok
15:28:59.0312 3464 PartMgr (beb3ba25197665d82ec7065b724171c6) C:\WINDOWS\system32\drivers\PartMgr.sys
15:28:59.0312 3464 PartMgr - ok
15:28:59.0406 3464 ParVdm (70e98b3fd8e963a6a46a2e6247e0bea1) C:\WINDOWS\system32\drivers\ParVdm.sys
15:28:59.0406 3464 ParVdm - ok
15:28:59.0484 3464 PCI (a219903ccf74233761d92bef471a07b1) C:\WINDOWS\system32\DRIVERS\pci.sys
15:28:59.0500 3464 PCI - ok
15:28:59.0546 3464 PCIDump - ok
15:28:59.0671 3464 PCIIde (ccf5f451bb1a5a2a522a76e670000ff0) C:\WINDOWS\system32\DRIVERS\pciide.sys
15:28:59.0671 3464 PCIIde - ok
15:28:59.0734 3464 Pcmcia (9e89ef60e9ee05e3f2eef2da7397f1c1) C:\WINDOWS\system32\DRIVERS\pcmcia.sys
15:28:59.0750 3464 Pcmcia - ok
15:28:59.0781 3464 PDCOMP - ok
15:28:59.0812 3464 PDFRAME - ok
15:28:59.0859 3464 PDRELI - ok
15:28:59.0906 3464 PDRFRAME - ok
15:28:59.0937 3464 perc2 - ok
15:29:00.0046 3464 perc2hib - ok
15:29:00.0171 3464 pfc (6c1618a07b49e3873582b6449e744088) C:\WINDOWS\system32\drivers\pfc.sys
15:29:00.0171 3464 pfc - ok
15:29:00.0343 3464 PptpMiniport (efeec01b1d3cf84f16ddd24d9d9d8f99) C:\WINDOWS\system32\DRIVERS\raspptp.sys
15:29:00.0359 3464 PptpMiniport - ok
15:29:00.0484 3464 PSched (09298ec810b07e5d582cb3a3f9255424) C:\WINDOWS\system32\DRIVERS\psched.sys
15:29:00.0500 3464 PSched - ok
15:29:00.0531 3464 Ptilink (80d317bd1c3dbc5d4fe7b1678c60cadd) C:\WINDOWS\system32\DRIVERS\ptilink.sys
15:29:00.0546 3464 Ptilink - ok
15:29:00.0625 3464 PxHelp20 (e42e3433dbb4cffe8fdd91eab29aea8e) C:\WINDOWS\system32\Drivers\PxHelp20.sys
15:29:00.0625 3464 PxHelp20 - ok
15:29:00.0718 3464 ql1080 - ok
15:29:00.0765 3464 Ql10wnt - ok
15:29:00.0796 3464 ql12160 - ok
15:29:00.0843 3464 ql1240 - ok
15:29:00.0859 3464 ql1280 - ok
15:29:00.0937 3464 RasAcd (fe0d99d6f31e4fad8159f690d68ded9c) C:\WINDOWS\system32\DRIVERS\rasacd.sys
15:29:00.0953 3464 RasAcd - ok
15:29:01.0015 3464 Rasirda (0207d26ddf796a193ccd9f83047bb5fc) C:\WINDOWS\system32\DRIVERS\rasirda.sys
15:29:01.0015 3464 Rasirda - ok
15:29:01.0078 3464 Rasl2tp (11b4a627bc9614b885c4969bfa5ff8a6) C:\WINDOWS\system32\DRIVERS\rasl2tp.sys
15:29:01.0078 3464 Rasl2tp - ok
15:29:01.0140 3464 RasPppoe (5bc962f2654137c9909c3d4603587dee) C:\WINDOWS\system32\DRIVERS\raspppoe.sys
15:29:01.0140 3464 RasPppoe - ok
15:29:01.0171 3464 Raspti (fdbb1d60066fcfbb7452fd8f9829b242) C:\WINDOWS\system32\DRIVERS\raspti.sys
15:29:01.0171 3464 Raspti - ok
15:29:01.0265 3464 Rdbss (7ad224ad1a1437fe28d89cf22b17780a) C:\WINDOWS\system32\DRIVERS\rdbss.sys
15:29:01.0265 3464 Rdbss - ok
15:29:01.0343 3464 RDPCDD (4912d5b403614ce99c28420f75353332) C:\WINDOWS\system32\DRIVERS\RDPCDD.sys
15:29:01.0343 3464 RDPCDD - ok
15:29:01.0484 3464 RDPWD (fc105dd312ed64eb66bff111e8ec6eac) C:\WINDOWS\system32\drivers\RDPWD.sys
15:29:01.0484 3464 RDPWD - ok
15:29:01.0609 3464 redbook (f828dd7e1419b6653894a8f97a0094c5) C:\WINDOWS\system32\DRIVERS\redbook.sys
15:29:01.0609 3464 redbook - ok
15:29:01.0968 3464 RTL8023 (29f9879a1fd386f7251ae9fdadb2cbf1) C:\WINDOWS\system32\DRIVERS\Rtlnic51.sys
15:29:01.0968 3464 RTL8023 - ok
15:29:02.0015 3464 rtl8139 (d507c1400284176573224903819ffda3) C:\WINDOWS\system32\DRIVERS\RTL8139.SYS
15:29:02.0015 3464 rtl8139 - ok
15:29:02.0109 3464 ScanUSBEMPIA (f5a633609777c212ec5ff19927fc5955) C:\WINDOWS\system32\DRIVERS\emScan.sys
15:29:02.0109 3464 ScanUSBEMPIA - ok
15:29:02.0234 3464 sdbus (8d04819a3ce51b9eb47e5689b44d43c4) C:\WINDOWS\system32\DRIVERS\sdbus.sys
15:29:02.0250 3464 sdbus - ok
15:29:02.0343 3464 Secdrv (90a3935d05b494a5a39d37e71f09a677) C:\WINDOWS\system32\DRIVERS\secdrv.sys
15:29:02.0359 3464 Secdrv - ok
15:29:02.0515 3464 Ser2pl (b490ad520257dda26c1d587a71e527b5) C:\WINDOWS\system32\DRIVERS\ser2pl.sys
15:29:02.0515 3464 Ser2pl - ok
15:29:02.0609 3464 Serenum (0f29512ccd6bead730039fb4bd2c85ce) C:\WINDOWS\system32\DRIVERS\serenum.sys
15:29:02.0609 3464 Serenum - ok
15:29:02.0718 3464 Serial (cca207a8896d4c6a0c9ce29a4ae411a7) C:\WINDOWS\system32\drivers\Serial.sys
15:29:02.0718 3464 Serial - ok
15:29:03.0046 3464 Sfloppy (8e6b8c671615d126fdc553d1e2de5562) C:\WINDOWS\system32\drivers\Sfloppy.sys
15:29:03.0046 3464 Sfloppy - ok
15:29:03.0125 3464 Simbad - ok
15:29:03.0187 3464 SLIP (866d538ebe33709a5c9f5c62b73b7d14) C:\WINDOWS\system32\DRIVERS\SLIP.sys
15:29:03.0187 3464 SLIP - ok
15:29:03.0328 3464 SMCIRDA (707647a1aa0edb6cbef61b0c75c28ed3) C:\WINDOWS\system32\DRIVERS\smcirda.sys
15:29:03.0328 3464 SMCIRDA - ok
15:29:03.0406 3464 SONYPVU1 (a1eceeaa5c5e74b2499eb51d38185b84) C:\WINDOWS\system32\DRIVERS\SONYPVU1.SYS
15:29:03.0406 3464 SONYPVU1 - ok
15:29:03.0500 3464 Sparrow - ok
15:29:03.0640 3464 splitter (ab8b92451ecb048a4d1de7c3ffcb4a9f) C:\WINDOWS\system32\drivers\splitter.sys
15:29:03.0640 3464 splitter - ok
15:29:03.0796 3464 sr (76bb022c2fb6902fd5bdd4f78fc13a5d) C:\WINDOWS\system32\DRIVERS\sr.sys
15:29:03.0796 3464 sr - ok
15:29:04.0140 3464 Srv (0f6aefad3641a657e18081f52d0c15af) C:\WINDOWS\system32\DRIVERS\srv.sys
15:29:04.0156 3464 Srv - ok
15:29:04.0234 3464 SrvcEKIOMngr (3b01a9316255cdd17f9c8e79aa573406) C:\WINDOWS\system32\Drivers\EKIoMngr.sys
15:29:04.0234 3464 SrvcEKIOMngr - ok
15:29:04.0328 3464 SrvcEPECioctl (0a4f36c355e49d3a92d80e6b7c443bae) C:\WINDOWS\system32\Drivers\ECioctl.sys
15:29:04.0328 3464 SrvcEPECioctl - ok
15:29:04.0375 3464 SrvcEPIOMngr (c996c839a3261cab5409c61e5702b620) C:\WINDOWS\system32\Drivers\EPIoMngr.sys
15:29:04.0390 3464 SrvcEPIOMngr - ok
15:29:04.0453 3464 SrvcSSIOMngr (79b7af340d55861df1d69e7bac975fcc) C:\WINDOWS\system32\Drivers\SSIoMngr.sys
15:29:04.0453 3464 SrvcSSIOMngr - ok
15:29:04.0578 3464 SrvcTPIOMngr (cbc0be9758bace83fc9ac25f4cca20e7) C:\WINDOWS\system32\Drivers\TPIoMngr.sys
15:29:04.0593 3464 SrvcTPIOMngr - ok
15:29:04.0671 3464 sscdbhk5 (1cbd1b58a32de97899f5290b05f856db) C:\WINDOWS\system32\drivers\sscdbhk5.sys
15:29:04.0671 3464 sscdbhk5 - ok
15:29:05.0328 3464 ssrtln (7fb07ac152d7a87e66204860002bd9a4) C:\WINDOWS\system32\drivers\ssrtln.sys
15:29:05.0328 3464 ssrtln - ok
15:29:05.0421 3464 streamip (77813007ba6265c4b6098187e6ed79d2) C:\WINDOWS\system32\DRIVERS\StreamIP.sys
15:29:05.0437 3464 streamip - ok
15:29:05.0468 3464 swenum (3941d127aef12e93addf6fe6ee027e0f) C:\WINDOWS\system32\DRIVERS\swenum.sys
15:29:05.0484 3464 swenum - ok
15:29:05.0531 3464 swmidi (8ce882bcc6cf8a62f2b2323d95cb3d01) C:\WINDOWS\system32\drivers\swmidi.sys
15:29:05.0546 3464 swmidi - ok
15:29:05.0656 3464 SydexFDD - ok
15:29:05.0703 3464 symc810 - ok
15:29:05.0718 3464 symc8xx - ok
15:29:05.0765 3464 sym_hi - ok
15:29:05.0812 3464 sym_u3 - ok
15:29:05.0875 3464 sysaudio (8b83f3ed0f1688b4958f77cd6d2bf290) C:\WINDOWS\system32\drivers\sysaudio.sys
15:29:05.0875 3464 sysaudio - ok
15:29:06.0078 3464 TBiosDrv (eeca2b57545e7b7be949b5e70e31444f) C:\WINDOWS\system32\drivers\TBiosDrv.sys
15:29:06.0078 3464 TBiosDrv - ok
15:29:06.0468 3464 Tcpip (9aefa14bd6b182d61e3119fa5f436d3d) C:\WINDOWS\system32\DRIVERS\tcpip.sys
15:29:06.0484 3464 Tcpip - ok
15:29:06.0656 3464 TDPIPE (6471a66807f5e104e4885f5b67349397) C:\WINDOWS\system32\drivers\TDPIPE.sys
15:29:06.0656 3464 TDPIPE - ok
15:29:07.0062 3464 TDTCP (c56b6d0402371cf3700eb322ef3aaf61) C:\WINDOWS\system32\drivers\TDTCP.sys
15:29:07.0078 3464 TDTCP - ok
15:29:07.0265 3464 TermDD (88155247177638048422893737429d9e) C:\WINDOWS\system32\DRIVERS\termdd.sys
15:29:07.0281 3464 TermDD - ok
15:29:07.0484 3464 tfsnboio (2da3ca4022abb0802de7eeda574e78d6) C:\WINDOWS\system32\dla\tfsnboio.sys
15:29:07.0484 3464 tfsnboio - ok
15:29:07.0609 3464 tfsncofs (c8d6928759b77701c21dc90ad61197f2) C:\WINDOWS\system32\dla\tfsncofs.sys
15:29:07.0609 3464 tfsncofs - ok
15:29:07.0718 3464 tfsndrct (bacdef5510fa643683cddca418e49446) C:\WINDOWS\system32\dla\tfsndrct.sys
15:29:07.0718 3464 tfsndrct - ok
15:29:07.0828 3464 tfsndres (3fc9f390fac563c3d3910d540adbd408) C:\WINDOWS\system32\dla\tfsndres.sys
15:29:07.0828 3464 tfsndres - ok
15:29:07.0906 3464 tfsnifs (6aef3ec0b64689536891a9b96e9d7b82) C:\WINDOWS\system32\dla\tfsnifs.sys
15:29:07.0906 3464 tfsnifs - ok
15:29:07.0953 3464 tfsnopio (7239873a72dd456f6e74e6987cdb9687) C:\WINDOWS\system32\dla\tfsnopio.sys
15:29:07.0953 3464 tfsnopio - ok
15:29:08.0015 3464 tfsnpool (b78631e3593ddd76a4a8ba7cb8e32302) C:\WINDOWS\system32\dla\tfsnpool.sys
15:29:08.0015 3464 tfsnpool - ok
15:29:08.0078 3464 tfsnudf (9e8b4abb93e5784fc4e5d3202566cc7a) C:\WINDOWS\system32\dla\tfsnudf.sys
15:29:08.0093 3464 tfsnudf - ok
15:29:08.0343 3464 tfsnudfa (056fa0a11ba4cd688e1e40e48ffee921) C:\WINDOWS\system32\dla\tfsnudfa.sys
15:29:08.0359 3464 tfsnudfa - ok
15:29:08.0421 3464 TosIde - ok
15:29:08.0546 3464 Udfs (5787b80c2e3c5e2f56c2a233d91fa2c9) C:\WINDOWS\system32\drivers\Udfs.sys
15:29:08.0546 3464 Udfs - ok
15:29:08.0593 3464 ultra - ok
15:29:08.0890 3464 Update (402ddc88356b1bac0ee3dd1580c76a31) C:\WINDOWS\system32\DRIVERS\update.sys
15:29:08.0984 3464 Update - ok
15:29:09.0578 3464 USBAAPL (c1ca131f4e3ed63d6bc89a35ffad4cda) C:\WINDOWS\system32\Drivers\usbaapl.sys
15:29:09.0578 3464 USBAAPL - ok
15:29:09.0796 3464 usbccgp (173f317ce0db8e21322e71b7e60a27e8) C:\WINDOWS\system32\DRIVERS\usbccgp.sys
15:29:09.0796 3464 usbccgp - ok
15:29:09.0843 3464 usbehci (65dcf09d0e37d4c6b11b5b0b76d470a7) C:\WINDOWS\system32\DRIVERS\usbehci.sys
15:29:09.0843 3464 usbehci - ok
15:29:09.0906 3464 usbhub (1ab3cdde553b6e064d2e754efe20285c) C:\WINDOWS\system32\DRIVERS\usbhub.sys
15:29:09.0906 3464 usbhub - ok
15:29:09.0953 3464 usbohci (0daecce65366ea32b162f85f07c6753b) C:\WINDOWS\system32\DRIVERS\usbohci.sys
15:29:09.0953 3464 usbohci - ok
15:29:10.0015 3464 usbprint (a717c8721046828520c9edf31288fc00) C:\WINDOWS\system32\DRIVERS\usbprint.sys
15:29:10.0015 3464 usbprint - ok
15:29:10.0375 3464 usbscan (a0b8cf9deb1184fbdd20784a58fa75d4) C:\WINDOWS\system32\DRIVERS\usbscan.sys
15:29:10.0375 3464 usbscan - ok
15:29:10.0437 3464 USBSTOR (a32426d9b14a089eaa1d922e0c5801a9) C:\WINDOWS\system32\DRIVERS\USBSTOR.SYS
15:29:10.0437 3464 USBSTOR - ok
15:29:10.0515 3464 VgaSave (0d3a8fafceacd8b7625cd549757a7df1) C:\WINDOWS\System32\drivers\vga.sys
15:29:10.0515 3464 VgaSave - ok
15:29:10.0562 3464 ViaIde - ok
15:29:10.0625 3464 VolSnap (4c8fcb5cc53aab716d810740fe59d025) C:\WINDOWS\system32\drivers\VolSnap.sys
15:29:10.0625 3464 VolSnap - ok
15:29:10.0703 3464 Wanarp (e20b95baedb550f32dd489265c1da1f6) C:\WINDOWS\system32\DRIVERS\wanarp.sys
15:29:10.0718 3464 Wanarp - ok
15:29:10.0750 3464 wanatw - ok
15:29:10.0828 3464 WDICA - ok
15:29:10.0937 3464 wdmaud (6768acf64b18196494413695f0c3a00f) C:\WINDOWS\system32\drivers\wdmaud.sys
15:29:10.0937 3464 wdmaud - ok
15:29:11.0281 3464 WpdUsb (cf4def1bf66f06964dc0d91844239104) C:\WINDOWS\system32\DRIVERS\wpdusb.sys
15:29:11.0281 3464 WpdUsb - ok
15:29:11.0359 3464 WS2IFSL (6abe6e225adb5a751622a9cc3bc19ce8) C:\WINDOWS\System32\drivers\ws2ifsl.sys
15:29:11.0359 3464 WS2IFSL - ok
15:29:11.0421 3464 WSTCODEC (c98b39829c2bbd34e454150633c62c78) C:\WINDOWS\system32\DRIVERS\WSTCODEC.SYS
15:29:11.0437 3464 WSTCODEC - ok
15:29:11.0671 3464 WudfPf (f15feafffbb3644ccc80c5da584e6311) C:\WINDOWS\system32\DRIVERS\WudfPf.sys
15:29:11.0671 3464 WudfPf - ok
15:29:11.0937 3464 WudfRd (28b524262bce6de1f7ef9f510ba3985b) C:\WINDOWS\system32\DRIVERS\wudfrd.sys
15:29:11.0953 3464 WudfRd - ok
15:29:12.0062 3464 MBR (0x1B8) (f380f416b6f18b4a10f665a6364aba49) \Device\Harddisk0\DR0
15:29:12.0093 3464 \Device\Harddisk0\DR0 ( Rootkit.Boot.Pihar.b ) - infected
15:29:12.0093 3464 \Device\Harddisk0\DR0 - detected Rootkit.Boot.Pihar.b (0)
15:29:12.0109 3464 Boot (0x1200) (d0327704508cf48cf112125edcc9d924) \Device\Harddisk0\DR0\Partition0
15:29:12.0125 3464 \Device\Harddisk0\DR0\Partition0 - ok
15:29:12.0125 3464 ============================================================
15:29:12.0125 3464 Scan finished
15:29:12.0125 3464 ============================================================
15:29:12.0171 3388 Detected object count: 1
15:29:12.0171 3388 Actual detected object count: 1
15:29:58.0171 3388 \Device\Harddisk0\DR0\# - copied to quarantine
15:29:58.0171 3388 \Device\Harddisk0\DR0 - copied to quarantine
15:29:58.0296 3388 \Device\Harddisk0\DR0\TDLFS\phm - copied to quarantine
15:29:58.0328 3388 \Device\Harddisk0\DR0\TDLFS\ph.dll - copied to quarantine
15:29:58.0328 3388 \Device\Harddisk0\DR0\TDLFS\phx.dll - copied to quarantine
15:29:58.0359 3388 \Device\Harddisk0\DR0\TDLFS\sub.dll - copied to quarantine
15:29:58.0359 3388 \Device\Harddisk0\DR0\TDLFS\subx.dll - copied to quarantine
15:29:58.0375 3388 \Device\Harddisk0\DR0\TDLFS\phd - copied to quarantine
15:29:58.0437 3388 \Device\Harddisk0\DR0\TDLFS\phdx - copied to quarantine
15:29:58.0453 3388 \Device\Harddisk0\DR0\TDLFS\phdata - copied to quarantine
15:29:58.0453 3388 \Device\Harddisk0\DR0\TDLFS\phs - copied to quarantine
15:29:58.0453 3388 \Device\Harddisk0\DR0\TDLFS\phld - copied to quarantine
15:29:58.0453 3388 \Device\Harddisk0\DR0\TDLFS\phln - copied to quarantine
15:29:58.0468 3388 \Device\Harddisk0\DR0\TDLFS\phlx - copied to quarantine
15:29:58.0515 3388 \Device\Harddisk0\DR0 ( Rootkit.Boot.Pihar.b ) - will be cured on reboot
15:29:58.0515 3388 \Device\Harddisk0\DR0 - ok
15:29:58.0515 3388 \Device\Harddisk0\DR0 ( Rootkit.Boot.Pihar.b ) - User select action: Cure
15:30:19.0546 3456 Deinitialize success



ComboFix 12-03-15.03 - mom 03/15/2012 15:58:40.1.2 - x86
Microsoft Windows XP Home Edition 5.1.2600.3.1252.1.1033.18.1151.494 [GMT -4:00]
Running from: c:\documents and settings\mom\Desktop\ComboFix.exe
.
.
((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.
.
c:\documents and settings\All Users\Application Data\~iQQDP4zKozHfNv
c:\documents and settings\All Users\Application Data\~iQQDP4zKozHfNvr
c:\documents and settings\All Users\Application Data\~pceI0pM0jn86cu
c:\documents and settings\All Users\Application Data\~pceI0pM0jn86cur
c:\documents and settings\All Users\Application Data\iQQDP4zKozHfNv
c:\documents and settings\All Users\Application Data\pceI0pM0jn86cu
c:\documents and settings\dad\WINDOWS
c:\documents and settings\Default User\WINDOWS
c:\documents and settings\mom\Application Data\PriceGong
c:\documents and settings\mom\Application Data\PriceGong\Data\1.txt
c:\documents and settings\mom\Application Data\PriceGong\Data\2229.txt
c:\documents and settings\mom\Application Data\PriceGong\Data\a.txt
c:\documents and settings\mom\Application Data\PriceGong\Data\b.txt
c:\documents and settings\mom\Application Data\PriceGong\Data\c.txt
c:\documents and settings\mom\Application Data\PriceGong\Data\d.txt
c:\documents and settings\mom\Application Data\PriceGong\Data\e.txt
c:\documents and settings\mom\Application Data\PriceGong\Data\f.txt
c:\documents and settings\mom\Application Data\PriceGong\Data\g.txt
c:\documents and settings\mom\Application Data\PriceGong\Data\h.txt
c:\documents and settings\mom\Application Data\PriceGong\Data\i.txt
c:\documents and settings\mom\Application Data\PriceGong\Data\j.txt
c:\documents and settings\mom\Application Data\PriceGong\Data\k.txt
c:\documents and settings\mom\Application Data\PriceGong\Data\l.txt
c:\documents and settings\mom\Application Data\PriceGong\Data\m.txt
c:\documents and settings\mom\Application Data\PriceGong\Data\n.txt
c:\documents and settings\mom\Application Data\PriceGong\Data\o.txt
c:\documents and settings\mom\Application Data\PriceGong\Data\p.txt
c:\documents and settings\mom\Application Data\PriceGong\Data\q.txt
c:\documents and settings\mom\Application Data\PriceGong\Data\r.txt
c:\documents and settings\mom\Application Data\PriceGong\Data\s.txt
c:\documents and settings\mom\Application Data\PriceGong\Data\t.txt
c:\documents and settings\mom\Application Data\PriceGong\Data\u.txt
c:\documents and settings\mom\Application Data\PriceGong\Data\v.txt
c:\documents and settings\mom\Application Data\PriceGong\Data\w.txt
c:\documents and settings\mom\Application Data\PriceGong\Data\wlu.txt
c:\documents and settings\mom\Application Data\PriceGong\Data\x.txt
c:\documents and settings\mom\Application Data\PriceGong\Data\y.txt
c:\documents and settings\mom\Application Data\PriceGong\Data\z.txt
c:\documents and settings\mom\Desktop\System Check.lnk
c:\documents and settings\mom\Start Menu\Programs\System Check
c:\documents and settings\mom\Start Menu\Programs\System Check\System Check.lnk
c:\documents and settings\mom\Start Menu\Programs\System Check\Uninstall System Check.lnk
c:\documents and settings\mom\WINDOWS
c:\program files\Conference
c:\program files\Conference\Conference.db
c:\program files\Conference\Conference.dll
c:\program files\Conference\Conference.exe
c:\program files\Conference\Conference.ini
c:\program files\Conference\Conference.key
c:\program files\Conference\Languages\de.xml
c:\program files\Conference\Languages\en.xml
c:\program files\Conference\Languages\es.xml
c:\program files\Conference\Languages\fr.xml
c:\program files\Conference\Languages\hu.xml
c:\program files\Conference\Languages\pl.xml
c:\program files\Conference\Languages\pt.xml
c:\program files\Conference\Languages\ru.xml
c:\program files\Conference\Languages\ua.xml
c:\program files\LP
c:\windows\dasetup.log
c:\windows\EventSystem.log
c:\windows\iun6002.exe
c:\windows\system32\BSTIEPrintCtl1.dll
c:\windows\system32\config\systemprofile\WINDOWS
c:\windows\system32\drivers\etc\hosts.ics
.
.
((((((((((((((((((((((((((((((((((((((( Drivers/Services )))))))))))))))))))))))))))))))))))))))))))))))))
.
.
-------\Legacy_MYWEBSEARCHSERVICE
-------\Legacy_NPF
.
.
((((((((((((((((((((((((( Files Created from 2012-02-15 to 2012-03-15 )))))))))))))))))))))))))))))))
.
.
2012-03-15 19:29 . 2012-03-15 19:29 -------- d-----w- C:\TDSSKiller_Quarantine
2012-03-02 00:34 . 2012-03-02 00:34 205072 ----a-w- c:\windows\system32\drivers\tmcomm.sys
2012-02-29 01:39 . 2012-02-29 01:39 -------- d-----w- C:\spoolerlogs
2012-02-25 03:33 . 2012-02-25 03:33 -------- d-----w- c:\program files\Common Files\Adobe AIR
2012-02-20 23:34 . 2012-02-20 23:34 -------- d-----w- c:\documents and settings\LocalService\Application Data\ID Vault
2012-02-20 04:05 . 2012-02-20 04:05 -------- d-----w- c:\documents and settings\mom\Application Data\comcasttb
2012-02-20 03:17 . 2012-03-14 23:21 -------- d-----w- c:\documents and settings\All Users\Application Data\Norton
2012-02-20 02:45 . 2012-02-20 02:45 -------- d-----w- c:\documents and settings\All Users\Application Data\IsolatedStorage
2012-02-20 02:45 . 2012-02-23 00:01 -------- d-----w- c:\documents and settings\mom\Local Settings\Application Data\ID Vault
2012-02-20 02:44 . 2012-03-01 20:14 -------- d-----w- c:\documents and settings\mom\Application Data\ID Vault
2012-02-20 02:43 . 2011-07-05 15:24 25232 ------w- c:\windows\system32\drivers\gidv2.sys
2012-02-20 02:43 . 2012-02-20 02:43 -------- d-----w- c:\documents and settings\All Users\GID
2012-02-20 02:43 . 2012-02-20 02:43 -------- d-----w- c:\program files\SFT
2012-02-20 02:42 . 2012-03-15 00:15 -------- d-----w- c:\documents and settings\mom\Application Data\CallingID
2012-02-20 02:42 . 2012-02-20 02:42 -------- d-----w- c:\program files\comcasttb
2012-02-20 02:42 . 2012-02-20 02:42 -------- d-----w- c:\program files\CA
2012-02-20 02:41 . 2012-02-20 04:06 -------- d-----w- c:\documents and settings\mom\Application Data\xfin_portal
2012-02-20 02:41 . 2012-02-20 02:42 -------- d-----w- c:\program files\xfin_portal
2012-02-20 02:41 . 2012-02-20 02:44 -------- d-----w- c:\program files\Constant Guard Protection Suite
2012-02-20 02:40 . 2012-02-20 02:40 -------- d-----w- c:\documents and settings\All Users\Application Data\White Sky, Inc
2012-02-18 14:52 . 2012-02-18 14:53 -------- d-----w- C:\7052d45f17328a2256
2012-02-18 04:29 . 2012-02-18 04:29 -------- d-----w- c:\documents and settings\mom\Application Data\Malwarebytes
2012-02-18 04:28 . 2012-02-18 04:28 -------- d-----w- c:\documents and settings\All Users\Application Data\Malwarebytes
2012-02-18 04:28 . 2012-02-18 04:29 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
2012-02-18 04:28 . 2011-12-10 20:24 20464 ----a-w- c:\windows\system32\drivers\mbam.sys
2012-02-18 03:57 . 2012-03-01 01:49 -------- d-----w- c:\documents and settings\mom\Application Data\6C408
2012-02-17 05:17 . 2012-02-17 05:17 -------- d-----w- C:\6C408
2012-02-17 05:16 . 2012-03-01 01:49 -------- d-----w- c:\program files\0871F
.
.
.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2012-02-21 03:47 . 2002-01-02 03:09 414368 ----a-w- c:\windows\system32\FlashPlayerCPLApp.cpl
2000-06-05 22:47 . 2007-03-06 21:39 32768 -c--a-w- c:\program files\mozilla firefox\plugins\AppSub32.dll
.
.
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4
.
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"TOSCDSPD"="c:\program files\TOSHIBA\TOSCDSPD\toscdspd.exe" [2003-09-05 65536]
"ComcastAntispyClient"="c:\program files\comcasttb\ComcastSpywareScan\ComcastAntispy.exe" [2009-08-19 1589208]
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"CFSServ.exe"="CFSServ.exe -NoClient" [X]
"CeEKEY"="c:\program files\TOSHIBA\E-KEY\CeEKey.exe" [2004-06-14 638976]
"CeEPOWER"="c:\program files\TOSHIBA\Power Management\CePMTray.exe" [2004-08-20 135168]
"TPNF"="c:\program files\TOSHIBA\TouchPad\TPTray.exe" [2004-03-15 53248]
"ATIPTA"="c:\program files\ATI Technologies\ATI Control Panel\atiptaxx.exe" [2004-04-22 335872]
"AGRSMMSG"="AGRSMMSG.exe" [2004-02-20 88363]
"Apoint"="c:\program files\Apoint2K\Apoint.exe" [2003-10-30 192512]
"EzButton"="c:\program files\EzButton\EzButton.EXE" [2004-05-14 712704]
"PadTouch"="c:\program files\TOSHIBA\Touch and Launch\PadExe.exe" [2004-02-03 1089589]
"NDSTray.exe"="NDSTray.exe" [BU]
"Notebook Maximizer"="c:\program files\Notebook Maximizer\maximizer_startup.exe" [2006-05-04 40960]
"ISUSPM Startup"="c:\progra~1\COMMON~1\INSTAL~1\UPDATE~1\ISUSPM.exe" [2004-07-27 221184]
"ISUSScheduler"="c:\program files\Common Files\InstallShield\UpdateService\issch.exe" [2004-07-27 81920]
"dla"="c:\windows\system32\dla\tfswctrl.exe" [2005-01-14 122939]
"USB2Check"="c:\windows\system32\PCLECoInst.dll" [2005-12-21 73728]
"Adobe Reader Speed Launcher"="c:\program files\Adobe\Reader 8.0\Reader\Reader_sl.exe" [2008-10-15 39792]
"SunJavaUpdateSched"="c:\program files\Common Files\Java\Java Update\jusched.exe" [2010-05-14 248552]
"QuickTime Task"="c:\program files\QuickTime\qttask.exe" [2009-01-05 413696]
"Malwarebytes' Anti-Malware"="c:\program files\Malwarebytes' Anti-Malware\mbamgui.exe" [2012-01-13 460872]
"GIDDesktop"="c:\program files\SFT\GuardedID\gidd.exe" [2011-07-05 395528]
"AdobeAAMUpdater-1.0"="c:\program files\Common Files\Adobe\OOBE\PDApp\UWA\UpdaterStartupUtility.exe" [2010-07-29 497648]
.
c:\documents and settings\All Users\Start Menu\Programs\Startup\
Constant Guard.lnk - c:\program files\Constant Guard Protection Suite\IDVault.exe [2012-2-15 4720200]
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\GIDLogonXP]
2011-07-05 15:25 53528 ----a-w- c:\windows\system32\GIDLogonXP.dll
.
[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\securityproviders]
SecurityProviders msapsspc.dll, schannel.dll, digest.dll, msnsspc.dll, zwebauth.dll
.
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=
"c:\\Program Files\\Lavasoft\\Ad-Aware SE Personal\\Ad-Aware.exe"=
"c:\\Toshiba\\Ivp\\Swupdate\\swupdate.exe"=
"c:\\Program Files\\Messenger\\msmsgs.exe"=
"c:\\WINDOWS\\system32\\dpnsvr.exe"=
"c:\\Program Files\\Abacast\\Abaclient.exe"=
"c:\\Program Files\\Windows Media Player\\mplayer2.exe"=
"c:\\Program Files\\QuickTime\\QuickTimePlayer.exe"=
"c:\\Program Files\\Windows Media Player\\wmplayer.exe"=
"c:\\Program Files\\Mozilla Firefox\\firefox.exe"=
"c:\\WINDOWS\\system32\\mmc.exe"=
"c:\\WINDOWS\\Network Diagnostic\\xpnetdiag.exe"=
"c:\\Program Files\\Real\\RealPlayer\\realplay.exe"=
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"c:\\Program Files\\Bonjour\\mDNSResponder.exe"=
"c:\\Program Files\\iTunes\\iTunes.exe"=
.
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\GloballyOpenPorts\List]
"3389:TCP"= 3389:TCP:@xpsp2res.dll,-22009
"86:TCP"= 86:TCP:BroadCam Web Server
.
R1 GIDv2;GIDv2;c:\windows\system32\drivers\gidv2.sys [02/19/2012 10:43 PM 25232]
R1 oreans32;oreans32;c:\windows\system32\drivers\oreans32.sys [12/20/2008 3:58 AM 33824]
R2 AntiSpywareService;Comcast AntiSpyware;c:\program files\comcasttb\ComcastSpywareScan\ComcastAntiSpyService.exe [06/17/2009 1:49 PM 616408]
R2 IDVaultSvc;CGPS Service;c:\program files\Constant Guard Protection Suite\IDVaultSvc.exe [02/15/2012 5:26 PM 65096]
R2 MBAMService;MBAMService;c:\program files\Malwarebytes' Anti-Malware\mbamservice.exe [02/18/2012 12:28 AM 652360]
R3 MBAMProtector;MBAMProtector;c:\windows\system32\drivers\mbam.sys [02/18/2012 12:28 AM 20464]
S2 AdobeActiveFileMonitor9.0;Adobe Active File Monitor V9;d:\kelsey\Elements 9 Organizer\PhotoshopElementsFileAgent.exe --> d:\kelsey\Elements 9 Organizer\PhotoshopElementsFileAgent.exe [?]
S3 McComponentHostService;McAfee Security Scan Component Host Service;c:\program files\McAfee Security Scan\2.0.181\McCHSvc.exe [01/15/2010 8:49 AM 227232]
S3 SydexFDD;Sydex Diskette Driver;c:\windows\system32\drivers\sydexfdd.sys --> c:\windows\system32\drivers\sydexfdd.sys [?]
.
[HKEY_LOCAL_MACHINE\software\microsoft\active setup\installed components\{9191979D-821C-4EA8-B021-2DA1D859A7C5}-3Reg]
2011-07-05 15:26 435976 ----a-w- c:\program files\SFT\GuardedID\GIDI.exe
.
Contents of the 'Scheduled Tasks' folder
.
2012-02-25 c:\windows\Tasks\AdobeAAMUpdater-1.0-HOME-mom.job
- c:\program files\Common Files\Adobe\OOBE\PDApp\UWA\updaterstartuputility.exe [2010-07-29 06:25]
.
.
------- Supplementary Scan -------
.
uStart Page = hxxp://xfinity.comcast.net/?cid=cgps02192012
uSearchURL,(Default) = hxxp://red.clientapps.yahoo.com/customize/ycomp/defaults/su/*http://www.yahoo.com
IE: &AOL Toolbar search - c:\program files\AOL Toolbar\toolbar.dll/SEARCH.HTML
IE: &Yahoo! Search - file:///c:\program files\Yahoo!\Common/ycsrch.htm
IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~2\Office10\EXCEL.EXE/3000
IE: Yahoo! &Dictionary - file:///c:\program files\Yahoo!\Common/ycdict.htm
IE: Yahoo! &Maps - file:///c:\program files\Yahoo!\Common/ycmap.htm
IE: Yahoo! &SMS - file:///c:\program files\Yahoo!\Common/ycsms.htm
IE: { - c:\program files\Messenger\msmsgs.exe
TCP: DhcpNameServer = 75.75.75.75 75.75.76.76 192.168.1.1
TCP: Interfaces\{53BDD093-E69D-4519-A965-0327408B864E}: NameServer = 8.8.8.8,8.8.4.4
FF - ProfilePath - c:\documents and settings\mom\Application Data\Mozilla\Firefox\Profiles\zqm59rzq.default\
FF - prefs.js: browser.search.defaulturl - hxxp://search.conduit.com/ResultsExt.aspx?ctid=CT2086743&SearchSource=3&q={searchTerms}
FF - prefs.js: browser.search.selectedEngine - Google
FF - prefs.js: browser.startup.homepage - hxxp://www.google.com/
FF - prefs.js: keyword.URL - hxxp://search.conduit.com/ResultsExt.aspx?ctid=CT2086743&q=
FF - prefs.js: network.proxy.http - 127.0.0.1
FF - prefs.js: network.proxy.http_port - 62545
FF - prefs.js: network.proxy.type - 4
FF - Ext: Default: {972ce4c6-7e08-4474-a285-3208198ce6fd} - c:\program files\Mozilla Firefox\extensions\{972ce4c6-7e08-4474-a285-3208198ce6fd}
FF - Ext: Java Console: {CAFEEFAC-0016-0000-0002-ABCDEFFEDCBA} - c:\program files\Mozilla Firefox\extensions\{CAFEEFAC-0016-0000-0002-ABCDEFFEDCBA}
FF - Ext: Java Console: {CAFEEFAC-0016-0000-0003-ABCDEFFEDCBA} - c:\program files\Mozilla Firefox\extensions\{CAFEEFAC-0016-0000-0003-ABCDEFFEDCBA}
FF - Ext: Java Console: {CAFEEFAC-0016-0000-0005-ABCDEFFEDCBA} - c:\program files\Mozilla Firefox\extensions\{CAFEEFAC-0016-0000-0005-ABCDEFFEDCBA}
FF - Ext: Java Console: {CAFEEFAC-0016-0000-0007-ABCDEFFEDCBA} - c:\program files\Mozilla Firefox\extensions\{CAFEEFAC-0016-0000-0007-ABCDEFFEDCBA}
FF - Ext: Java Console: {CAFEEFAC-0016-0000-0011-ABCDEFFEDCBA} - c:\program files\Mozilla Firefox\extensions\{CAFEEFAC-0016-0000-0011-ABCDEFFEDCBA}
FF - Ext: Java Console: {CAFEEFAC-0016-0000-0013-ABCDEFFEDCBA} - c:\program files\Mozilla Firefox\extensions\{CAFEEFAC-0016-0000-0013-ABCDEFFEDCBA}
FF - Ext: Java Console: {CAFEEFAC-0016-0000-0015-ABCDEFFEDCBA} - c:\program files\Mozilla Firefox\extensions\{CAFEEFAC-0016-0000-0015-ABCDEFFEDCBA}
FF - Ext: Java Console: {CAFEEFAC-0016-0000-0017-ABCDEFFEDCBA} - c:\program files\Mozilla Firefox\extensions\{CAFEEFAC-0016-0000-0017-ABCDEFFEDCBA}
FF - Ext: Java Console: {CAFEEFAC-0016-0000-0021-ABCDEFFEDCBA} - c:\program files\Mozilla Firefox\extensions\{CAFEEFAC-0016-0000-0021-ABCDEFFEDCBA}
FF - Ext: Move Media Player: moveplayer@movenetworks.com - %profile%\extensions\moveplayer@movenetworks.com
FF - Ext: Coupon Manager: {0C7E3F01-99E9-4095-9BDC-F84724960B57} - %profile%\extensions\{0C7E3F01-99E9-4095-9BDC-F84724960B57}
FF - Ext: Microsoft .NET Framework Assistant: {20a82645-c095-46ed-80e3-08825760534b} - %profile%\extensions\{20a82645-c095-46ed-80e3-08825760534b}
FF - Ext: PHPNukeEN Toolbar: {dd02a4eb-4afd-4d60-99d8-e67f964ca813} - %profile%\extensions\{dd02a4eb-4afd-4d60-99d8-e67f964ca813}
FF - Ext: XFINITYToolbar: {4b9bcce8-a70b-402a-a7e1-db96831ee26f} - %profile%\extensions\{4b9bcce8-a70b-402a-a7e1-db96831ee26f}
FF - Ext: Microsoft .NET Framework Assistant: {20a82645-c095-46ed-80e3-08825760534b} - c:\windows\Microsoft.NET\Framework\v3.5\Windows Presentation Foundation\DotNetAssistantExtension
FF - Ext: Java Quick Starter: jqs@sun.com - c:\program files\Java\jre6\lib\deploy\jqs\ff
.
- - - - ORPHANS REMOVED - - - -
.
WebBrowser-{DD02A4EB-4AFD-4D60-99D8-E67F964CA813} - (no file)
HKCU-Run-Sonic RecordNow! - (no file)
HKCU-Run-Skype - c:\program files\Skype\Phone\Skype.exe
HKLM-Run-PinnacleDriverCheck - c:\windows\system32\PSDrvCheck.exe
HKU-Default-Run-dplaysvr - c:\documents and settings\mom\Application Data\dplaysvr.exe
AddRemove-Comp - c:\windows\iun6002.exe
AddRemove-Math 7 Teaching Textbook - c:\docume~1\dad\Desktop\uninst.exe
AddRemove-Notebook_Maximizer - c:\windows\iun6002.exe
AddRemove-ShockwaveFlash - c:\windows\system32\Macromed\Flash\UninstFl.exe
AddRemove-Video Conference - c:\program files\Conference\Conference.exe
.
.
.
**************************************************************************
.
catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2012-03-15 16:26
Windows 5.1.2600 Service Pack 3 NTFS
.
scanning hidden processes ...
.
scanning hidden autostart entries ...
.
scanning hidden files ...
.
scan completed successfully
hidden files: 0
.
**************************************************************************
.
Stealth MBR rootkit/Mebroot/Sinowal/TDL4 detector 0.4.2 by Gmer, http://www.gmer.net
Windows 5.1.2600
.
CreateFile("\\.\PHYSICALDRIVE0"): The process cannot access the file because it is being used by another process.
device: opened successfully
user: error reading MBR
kernel: MBR read successfully
user != kernel MBR !!!
.
**************************************************************************
.
--------------------- LOCKED REGISTRY KEYS ---------------------
.
[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{50916EBD-EE64-DC4C-5763-A3CD28AA5762}\InProcServer32*]
"oadfcdmnionfbmhalcokmiafilfojc"=hex:6a,61,65,6f,68,6f,62,62,65,6c,6c,69,6e,61,
67,64,6d,61,6a,63,00,00
"nadfibgpdoghkadachfhndepnpll"=hex:69,61,69,6f,6e,65,65,6c,70,70,61,66,70,65,
62,67,69,63,00,00
.
--------------------- DLLs Loaded Under Running Processes ---------------------
.
- - - - - - - > 'winlogon.exe'(628)
c:\windows\system32\GIDLogonXP.dll
c:\windows\system32\GIDHookLogon.dll
c:\windows\system32\GIDBIN1.dll
c:\windows\system32\WININET.dll
c:\program files\CA\PPRT\bin\CACheck.dll
c:\program files\CA\PPRT\bin\CAHook.dll
c:\program files\CA\PPRT\bin\CAServer.dll
.
- - - - - - - > 'explorer.exe'(3844)
c:\windows\system32\WININET.dll
c:\program files\CA\PPRT\bin\CACheck.dll
c:\program files\CA\PPRT\bin\CAHook.dll
c:\program files\CA\PPRT\bin\CAServer.dll
c:\windows\system32\GIDHook.dll
c:\windows\system32\GIDBIN1.dll
c:\windows\system32\EasyHook32.dll
c:\windows\system32\msi.dll
c:\windows\system32\ieframe.dll
c:\windows\system32\WPDShServiceObj.dll
c:\program files\ArcSoft\Software Suite\PhotoImpression\share\pihook.dll
c:\windows\system32\PortableDeviceTypes.dll
c:\windows\system32\PortableDeviceApi.dll
.
------------------------ Other Running Processes ------------------------
.
c:\windows\system32\Ati2evxx.exe
c:\program files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
c:\program files\Bonjour\mDNSResponder.exe
c:\program files\Toshiba\Power Management\CeEPwrSvc.exe
c:\program files\TOSHIBA\ConfigFree\CFSvcs.exe
c:\windows\system32\DVDRAMSV.exe
c:\windows\Microsoft.NET\Framework\v3.0\WPF\PresentationFontCache.exe
c:\program files\CA\PPRT\bin\ITMRTSVC.exe
c:\program files\Java\jre6\bin\jqs.exe
c:\toshiba\Ivp\Swupdate\swupdtmr.exe
c:\windows\system32\wbem\wmiapsrv.exe
c:\windows\system32\wscntfy.exe
c:\windows\AGRSMMSG.exe
c:\program files\TOSHIBA\ConfigFree\NDSTray.exe
c:\program files\Apoint2K\Apntex.exe
c:\program files\Common Files\Java\Java Update\jucheck.exe
.
**************************************************************************
.
Completion time: 2012-03-15 16:36:49 - machine was rebooted
ComboFix-quarantined-files.txt 2012-03-15 20:36
.
Pre-Run: 1,430,728,704 bytes free
Post-Run: 2,010,963,968 bytes free
.
WindowsXP-KB310994-SP2-Home-BootDisk-ENU.exe
[boot loader]
timeout=2
default=multi(0)disk(0)rdisk(0)partition(1)\WINDOWS
[operating systems]
c:\cmdcons\BOOTSECT.DAT="Microsoft Windows Recovery Console" /cmdcons
UnsupportedDebug="do not select this" /debug
multi(0)disk(0)rdisk(0)partition(1)\WINDOWS="Microsoft Windows XP Home Edition" /noexecute=optin /fastdetect
.
- - End Of File - - DDB479A4AE82AE2351F0DDB3EACC5ABB

#4 fireman4it

fireman4it

    Bleepin' Fireman


  • Malware Response Team
  • 13,505 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Greenup, Ill USA
  • Local time:08:56 AM

Posted 15 March 2012 - 10:11 PM

How is the computer running now?

" Extinguishing Malware from the world"

The Virus, Trojan, Spyware, and Malware Removal forum is very busy. If I'm helping you and I've not posted back within 24 hrs., send a PM with your topic link. Thank you.

ALL OTHER HELP REQUESTS VIA THE PM SYSTEM WILL BE IGNORED. The Forums are there for a reason!
Thanks-


  userbar_eis_500.gif

If I have helped you, consider making a donation to help me continue the fight against Malware! Just click btn_donate_LG.gif


#5 fujymo

fujymo
  • Topic Starter

  • Members
  • 6 posts
  • OFFLINE
  •  
  • Local time:08:56 AM

Posted 15 March 2012 - 10:27 PM

IT appears to be better. It does not appear to be redirecting. I have not tried to update anything because I did not want to do anything out of step. If you give the go ahead I will try to do the updates that need to be done.

#6 fireman4it

fireman4it

    Bleepin' Fireman


  • Malware Response Team
  • 13,505 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Greenup, Ill USA
  • Local time:08:56 AM

Posted 15 March 2012 - 10:33 PM

Hello,


Lets run a couple other scanners to make sure no leftovers.

1.
Please download Malwarebytes Anti-Malware and save it to your desktop.
  • Important!! When you save the mbam-setup file, rename it to something random (such as 123abc.exe) before beginning the download.
Malwarebytes may "make changes to your registry" as part of its disinfection routine. If using other security programs that detect registry changes (ie Spybot's Teatimer), they may interfere or alert you. Temporarily disable such programs or permit them to allow the changes.

  • Make sure you are connected to the Internet and double-click on the renamed file to install the application.
    For instructions with screenshots, please refer to this Guide.
  • When the installation begins, follow the prompts and do not make any changes to default settings.
  • Malwarebytes will automatically start and you will be asked to update the program before performing a scan.
  • If an update is found, the program will automatically update itself. Press the OK button and continue.
  • If you encounter any problems while downloading the definition updates, manually download them from here and just double-click on mbam-rules.exe to install.
  • Under the Scanner tab, make sure the "Perform Quick Scan" option is selected.
  • Click on the Scan button.
  • When finished, a message box will say "The scan completed successfully. Click 'Show Results' to display all objects found".
  • Click OK to close the message box, then click the Show Results button to see a list of any malware that was found.
  • Make sure that everything is checked and then click Remove Selected.
  • When removal is completed, a log report will open in Notepad.
  • The log is automatically saved and can be viewed by clicking the Logs tab.
  • Copy and paste the contents of that report in your next reply. Be sure to post the complete log to include the top portion which shows the database version and your operating system.
  • Exit Malwarebytes when done.
Note: If Malwarebytes encounters a file that is difficult to remove, you will be asked to reboot your computer so it can proceed with the disinfection process. If asked to restart the computer, please do so immediately. Failure to reboot normally will prevent Malwarebytes from removing all the malware.


2.
I'd like us to scan your machine with ESET OnlineScan
  • Hold down Control and click on this link to open ESET OnlineScan in a new window.
  • Click the Posted Image button.
  • For alternate browsers only: (Microsoft Internet Explorer users can skip these steps)
    • Click on esetsmartinstaller_enu.exe to download the ESET Smart Installer. Save it to your desktop.
    • Double click on the Posted Image
      icon on your desktop.
  • Check "YES, I accept the Terms of Use."
  • Click the Start button.
  • Accept any security warnings from your browser.
  • Under scan settings, check "Scan Archives" and "Remove found threats"
  • Click Advanced settings and select the following:
    • Scan potentially unwanted applications
    • Scan for potentially unsafe applications
    • Enable Anti-Stealth technology
  • ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this can take some time.
  • When the scan completes, click List Threats
  • Click Export, and save the file to your desktop using a unique name, such as ESETScan. Include the contents of this report in your next reply.
  • Click the Back button.
  • Click the Finish button.

Things to include in your next reply::
MBAM log
Eset log
How is your machine running now?

" Extinguishing Malware from the world"

The Virus, Trojan, Spyware, and Malware Removal forum is very busy. If I'm helping you and I've not posted back within 24 hrs., send a PM with your topic link. Thank you.

ALL OTHER HELP REQUESTS VIA THE PM SYSTEM WILL BE IGNORED. The Forums are there for a reason!
Thanks-


  userbar_eis_500.gif

If I have helped you, consider making a donation to help me continue the fight against Malware! Just click btn_donate_LG.gif


#7 fujymo

fujymo
  • Topic Starter

  • Members
  • 6 posts
  • OFFLINE
  •  
  • Local time:08:56 AM

Posted 16 March 2012 - 09:58 PM

Hello,

I attempted to post a minute ago but not sure i might of hit the wrong button. I have run malwarebytes and it appears to have come up clean. it has stopped a potentially malicious website IP address on the boot-up. Windows did perform an automatic update on the last reboot. ESET is currently running and we are at 1:35 at 68%. It ahs found 2 infected files that is JAVA/Trojandownloader.Agent.NBN.trojan. I wil post te log when completed. The computer is running extremely slow at this point.

Dean

Malwarebytes rotecction log

2012/03/16 20:57:46 -0400 HOME mom MESSAGE Starting protection
2012/03/16 20:58:05 -0400 HOME mom MESSAGE Protection started successfully
2012/03/16 20:58:08 -0400 HOME mom MESSAGE Starting IP protection
2012/03/16 21:00:03 -0400 HOME mom MESSAGE IP Protection started successfully
2012/03/16 21:00:12 -0400 HOME mom IP-BLOCK 174.137.132.45 (Type: outgoing)
2012/03/16 21:00:15 -0400 HOME mom IP-BLOCK 174.137.132.45 (Type: outgoing)
2012/03/16 21:00:21 -0400 HOME mom IP-BLOCK 174.137.132.45 (Type: outgoing)
2012/03/16 21:00:34 -0400 HOME mom IP-BLOCK 174.137.132.45 (Type: outgoing)
2012/03/16 21:00:38 -0400 HOME mom IP-BLOCK 174.137.132.45 (Type: outgoing)
2012/03/16 21:00:43 -0400 HOME mom IP-BLOCK 174.137.132.45 (Type: outgoing)

www.malwarebytes.org

Database version: v2012.03.15.07

Windows XP Service Pack 3 x86 NTFS
Internet Explorer 7.0.5730.11
mom :: HOME [limited]

Protection: Enabled

03/16/2012 6:14:07 PM
mbam-log-2012-03-16 (18-14-07).txt

Scan type: Quick scan
Scan options enabled: Memory | Startup | Registry | File System | Heuristics/Extra | Heuristics/Shuriken | PUP | PUM
Scan options disabled: P2P
Objects scanned: 216680
Time elapsed: 57 minute(s), 14 second(s)

Memory Processes Detected: 0
(No malicious items detected)

Memory Modules Detected: 0
(No malicious items detected)

Registry Keys Detected: 0
(No malicious items detected)

Registry Values Detected: 0
(No malicious items detected)

Registry Data Items Detected: 0
(No malicious items detected)

Folders Detected: 0
(No malicious items detected)

Files Detected: 0
(No malicious items detected)

(end)

#8 fujymo

fujymo
  • Topic Starter

  • Members
  • 6 posts
  • OFFLINE
  •  
  • Local time:08:56 AM

Posted 17 March 2012 - 11:59 AM

I could not find where I could export on ESET. I had to run the program 3 times. It would lock up and force a hard restart. I finally ran it through Mozilla instead of Explorer. I could not find where it would allow me to export the list so I did a capture of the screen to show the 19 items Eset Captured. It is asking if I should delete the quarantined files. Is that what I am supposed to do at this point? Malawarebytes did stop another website attack on the last reboot.

Posted Image

Edited by fujymo, 17 March 2012 - 12:06 PM.


#9 fireman4it

fireman4it

    Bleepin' Fireman


  • Malware Response Team
  • 13,505 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Greenup, Ill USA
  • Local time:08:56 AM

Posted 18 March 2012 - 01:43 PM

Hello,

Yes go ahead and delete those quarantined files. How is the machine running?


174.137.132.45

This is webair.com
Do you know anything about this website?

Edited by fireman4it, 18 March 2012 - 01:46 PM.

" Extinguishing Malware from the world"

The Virus, Trojan, Spyware, and Malware Removal forum is very busy. If I'm helping you and I've not posted back within 24 hrs., send a PM with your topic link. Thank you.

ALL OTHER HELP REQUESTS VIA THE PM SYSTEM WILL BE IGNORED. The Forums are there for a reason!
Thanks-


  userbar_eis_500.gif

If I have helped you, consider making a donation to help me continue the fight against Malware! Just click btn_donate_LG.gif


#10 fujymo

fujymo
  • Topic Starter

  • Members
  • 6 posts
  • OFFLINE
  •  
  • Local time:08:56 AM

Posted 18 March 2012 - 07:09 PM

The files have been deleted and the computer seems to be working as close to normal as could be expected. I did have to reboot and it does not appear ihave been getting that warning of a website attack. As far as webair.com -- I have never done business with them. No sure who the are.

#11 fireman4it

fireman4it

    Bleepin' Fireman


  • Malware Response Team
  • 13,505 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Greenup, Ill USA
  • Local time:08:56 AM

Posted 18 March 2012 - 08:16 PM

Hello, fujymo.
Congratulations! You now appear clean! :cool:


Uninstall Combofix
  • Make sure that Combofix.exe that you downloaded is on your Desktop but Do not run it!
    o *If it is not on your Desktop, the below will not work.
  • Click on Posted Image then Run....
  • Now copy & paste the green bolded text in the run-box and click OK.

    ComboFix /Uninstall

    Posted Image

    <Notice the space between the "x" and "/".> <--- It needs to be there
    Windows Vista users: Press the Windows Key + R to bring the Run... Command and then from there you can add in the Combofix /Uninstall

  • Please advise if this step is missed for any reason as it performs some important actions:
    "This will uninstall Combofix, delete its related folders and files, reset your clock settings, hide file extensions, hide the system/hidden files and resets System Restore again.
    It also makes a clean Restore Point and flashes all the old restore points in order to prevent possible reinfection from an old one through system restore".




Are things running okay? Do you have any more questions?

System Still Slow?
You may wish to try StartupLite. Simply download this tool to your desktop and run it. It will explain any optional auto-start programs on your system, and offer the option to stop these programs from starting at startup. This will result in fewer programs running when you boot your system, and should improve preformance.
If that does not work, you can try the steps mentioned in Slow Computer/browser? Check Here First; It May Not Be Malware.

We Need to Clean Up Our Mess
  • Download OTC by OldTimer and save it to your desktop.
  • Double click Posted Image icon to start the program. If you are using Vista, please right-click and choose run as administrator
  • Then Click the big Posted Image button.
  • You will get a prompt saying "Being Cleanup Process". Please select Yes.
  • Restart your computer when prompted.




One of the most common questions found when cleaning malware is "how did my machine get infected?"

There are a variety of reasons, but the most common ones are that you are not practicing Safe Internet, you are not running the proper security software or that your computer's security settings are set too low.

Below I have outlined a series of categories that outline how you can increase the security of your computer to help reduce the chance of being infected again in the future.

Do not use P2P programs
Peer-to-peer or file-sharing programs (such as uTorrent, Limewire and Bitorrent) are probably the primary route of infection nowadays. These programs allow file sharing between users as the name(s) suggest. It is almost impossible to know whether the file youre downloading through P2P programs is safe.

It is therefore possible to be infected by downloading infected files via peer-to-peer programs and so I recommend that you do not use these programs. Should you wish to use them, they must be used with extreme care. Some further reading on this subject, along with included links, are as follows: "File-Sharing, otherwise known as Peer To Peer" and "Risks of File-Sharing Technology."

In addition, P2P programs facilitate cyber crime and help distribute pirated software, movies and other illegal material.

Practice Safe Internet
Another one of the main reasons people get infected in the first place is that they are not practicing Safe Internet. You practice Safe Internet when you educate yourself on how to properly use the Internet through the use of security tools and good practice. Knowing how you can get infected and what types of files and sites to avoid will be the most crucial step in keeping your computer malware free. The reality is that the majority of people who are infected with malware are ones who click on things they shouldn't be clicking on. Whether these things are files or sites it doesn't really matter. If something is out to get you, and you click on it, it most likely will.

Below are a list of simple precautions to take to keep your computer clean and running securely:
  • If you receive an attachment from someone you do not know, DO NOT OPEN IT! Simple as that. Opening attachments from people you do not know is a very common method for viruses or worms to infect your computer.
  • If you receive an attachment and it ends with a .exe, .com, .bat, or .pif do not open the attachment unless you know for a fact that it is clean. For the casual computer user, you will almost never receive a valid attachment of this type.
  • If you receive an attachment from someone you know, and it looks suspicious, then it probably is. The email could be from someone you know who is themselves infected with malware which is trying to infect everyone in their address book. A key thing to look out for here is: does the email sound as though its from the person you know? Often, the email may simply have a web link or a Run this file to make your PC run fast message in it.
  • If you are browsing the Internet and a popup appears saying that you are infected, ignore it!. These are, as far as I am concerned, scams that are being used to scare you into purchasing a piece of software. For an example of these types of pop-ups, or Foistware, you should read this article: Foistware, And how to avoid it.
    There are also programs that disguise themselves as Anti-Spyware or security products but are instead scams. Removal instructions for a lot of these "rogues" can be found here.
  • Another tactic to fool you on the web is when a site displays a popup that looks like a normal Windows message or alert. When you click on them, though, they instead bring you to another site that is trying to push a product on you, or will download a file to your PC without your knowledge. You can check to see if it's a real alert by right-clicking on the window. If there is a menu that comes up saying Add to Favorites... you know it's a fake. DO NOT click on these windows, instead close them by finding the open window on your http://en.wikipedia.org/wiki/Taskbar#Screenshots '>Taskbar, right click and chose close.
  • Do not visit pornographic websites. I know this may bother some of you, but the fact is that a large amount of malware is pushed through these types of sites. I am not saying all adult sites do this, but a lot do, as this can often form part of their funding.
  • When using an Instant Messaging program be cautious about clicking on links people send to you. It is not uncommon for infections to send a message to everyone in the infected person's contact list that contains a link to an infection. Instead when you receive a message that contains a link you should message back to the person asking if it is legit.
  • Stay away from Warez and Crack sites! As with Peer-2-Peer programs, in addition to the obvious copyright issues, the downloads from these sites are typically overrun with infections.
  • Be careful of what you download off of web sites and Peer-2-Peer networks. Some sites disguise malware as legitimate software to trick you into installing them and Peer-2-Peer networks are crawling with it. If you want to download files from a site, and are not sure if they are legitimate, you can use tools such as BitDefender Traffic Light, Norton Safe Web, or McAfee SiteAdvisor to look up info on the site and stay protected against malicious sites. Please be sure to only choose and install one of those tool bars.
  • DO NOT INSTALL any software without first reading the End User License Agreement, otherwise known as the EULA. A tactic that some developers use is to offer their software for free, but have spyware and other programs you do not want bundled with it. This is where they make their money. By reading the agreement there is a good chance you can spot this and not install the software.
    Sometimes even legitimate programs will try to bundle extra, unwanted, software with the program you want - this is done to raise money for the program. Be sure to untick any boxes which may indicate that other programs will be downloaded.

Keep Windows up-to-date
Microsoft continually releases security and stability updates for its supported operating systems and you should always apply these to help keep your PC secure.

  • Windows XP users
    You should visit Windows Update to check for the latest updates to your system. The latest service pack (SP3) can be obtained directly from Microsoft here.
  • Windows Vista users
    You should run the Windows Update program from your start menu to access the latest updates to your operating system (information can be found here). The latest service pack (SP2) can be obtained directly from Microsoft here.
  • Windows 7 users
    You should run the Windows Update program from your start menu to access the latest updates to your operating system (information can be found here). The latest service pack (SP1) can be obtained directly from Microsoft here


Keep your browser secure
Most modern browsers have come on in leaps and bounds with their inbuilt, default security. The best way to keep your browser secure nowadays is simply to keep it up-to-date.

The latest versions of the three common browsers can be found below:

Use an AntiVirus Software
It is very important that your computer has an up-to-date anti-virus software on it which has a real-time agent running. This alone can save you a lot of trouble with malware in the future.
See this link for a listing of some online & their stand-alone antivirus programs: Virus, Spyware, and Malware Protection and Removal Resources, a couple of free Anti-Virus programs you may be interested in are Microsoft Security Essentials and Avast.

It is imperative that you update your Antivirus software at least once a week (even more if you wish). If you do not update your antivirus software then it will not be able to catch any of the new variants that may come out. If you use a commercial antivirus program you must make sure you keep renewing your subscription. Otherwise, once your subscription runs out, you may not be able to update the programs virus definitions.

Use a Firewall
I can not stress how important it is that you use a Firewall on your computer. Without a firewall your computer is susceptible to being hacked and taken over. Simply using a Firewall in its default configuration can lower your risk greatly.

All versions of Windows starting from XP have an in-built firewall. With Windows XP this firewall will protect you from incoming traffic (i.e. hackers). Starting with Windows Vista, the firewall was beefed up to also protect you against outgoing traffic (i.e. malicious programs installed on your machine should be blocked from sending data, such as your bank details and passwords, out).

In addition, if you connect to the internet via a router, this will normally have a firewall in-built.

Some people will recommend installing a different firewall (instead of the Windows built one), this is personal choice, but the message is to definitely have one! For a tutorial on Firewalls and a listing of some available ones see this link: Understanding and Using Firewalls

Install an Anti-Malware program
Recommended, and free, Anti-Malware programs are Malwarebytes Anti-Malware and SuperAntiSpyware.

You should regularly (perhaps once a week) scan your computer with an Anti-Malware program just as you would with an antivirus software.

Make sure your applications have all of their updates
It is also possible for other programs on your computer to have security vulnerability that can allow malware to infect you. Therefore, it is very important to check for the latest versions of commonly installed applications that are regularly patched to fix vulnerabilities (such as Adobe Reader and Java). You can check these by visiting Secunia Software Inspector.

Follow this list and your potential for being infected again will reduce dramatically.

" Extinguishing Malware from the world"

The Virus, Trojan, Spyware, and Malware Removal forum is very busy. If I'm helping you and I've not posted back within 24 hrs., send a PM with your topic link. Thank you.

ALL OTHER HELP REQUESTS VIA THE PM SYSTEM WILL BE IGNORED. The Forums are there for a reason!
Thanks-


  userbar_eis_500.gif

If I have helped you, consider making a donation to help me continue the fight against Malware! Just click btn_donate_LG.gif


#12 fireman4it

fireman4it

    Bleepin' Fireman


  • Malware Response Team
  • 13,505 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Greenup, Ill USA
  • Local time:08:56 AM

Posted 21 March 2012 - 07:31 PM

It appears that this issue is resolved, therefore I am closing the topic. If that is not the case and you need or wish to continue with this topic, please send me or any Moderator a Personal Message (PM) that you would like this topic re-opened.

" Extinguishing Malware from the world"

The Virus, Trojan, Spyware, and Malware Removal forum is very busy. If I'm helping you and I've not posted back within 24 hrs., send a PM with your topic link. Thank you.

ALL OTHER HELP REQUESTS VIA THE PM SYSTEM WILL BE IGNORED. The Forums are there for a reason!
Thanks-


  userbar_eis_500.gif

If I have helped you, consider making a donation to help me continue the fight against Malware! Just click btn_donate_LG.gif





0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users