Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Boot.Tidserv detection


  • This topic is locked This topic is locked
6 replies to this topic

#1 cmango

cmango

  • Members
  • 31 posts
  • OFFLINE
  •  
  • Local time:12:42 AM

Posted 04 May 2012 - 09:05 PM

Hi,

I have an HP Pavilion desktop from 2006 running XP that became infected with virus(es) so I installed Norton AV 2012 (not in Safe Mode though) and it could not fix the problem. I did a System Recovery (not from discs, but I guess a partition on one of my drives?), which I thought would kill ANYTHING, it deleted all my files of course, but when I loaded Norton AV 2012 back onto the computer, it again detected a Boot.Tidserv threat that it says it can not remove. The details are below:



Full Path: Not Available

On computers as of Not Available

Last Used 5/3/2012 at 9:03:34 PM

Startup Item No

Launched No

Unknown

Number of users in the Norton Community that have used this file: Unknown

Unknown

This file release is currently not known.

High

This file risk is high.

Threat Details

Threat type: Virus. Programs that infect other programs, files, or areas of a computer by inserting themselves or attaching themselves to that medium.

Suspicious Actions

Master boot record infection: Drive 0x80

Remove Failed

File Thumbprint - SHA:

Not Available

File Thumbprint - MD5:

Not Available



I tried Norton Power Eraser and downloaded the Backdoor.TidServ removal tool, but neither worked. I have done searches and read a few threads about Boot.Tidserv, but frankly I'm not familiar enough with computers to attempt anything drastic like deleting partitions or whatever. Can this virus actually attach itself to the system recovery partition? I would have thought that impossible, I mean System Recovery deletes EVERYTHING and brings the computer back to factory condition, complete with the desktop craplets from AOL & Blockbuster! Is it possible Norton AV is just detecting a ghost of a virus? If not, I guess at this point I will have to either trash the computer (I have a laptop), or take it to a professional (=$). Maybe I should spend the money on upgrading the machine to Windows 7. Would that finally get rid of Boot.Tidserv?



Thanks for any and all insight.

BC AdBot (Login to Remove)

 


#2 Broni

Broni

    The Coolest BC Computer


  • BC Advisor
  • 42,663 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Daly City, CA
  • Local time:10:42 PM

Posted 04 May 2012 - 09:43 PM

Welcome aboard Posted Image

Download Security Check from HERE, and save it to your Desktop.

* Double-click SecurityCheck.exe
* Follow the onscreen instructions inside of the black box.
* A Notepad document should open automatically called checkup.txt; please post the contents of that document.

=============================================================================

Please download Farbar Service Scanner (FSS) and run it on the computer with the issue.
  • Make sure the following options are checked:
    • Internet Services
    • Windows Firewall
    • System Restore
    • Security Center/Action Center
    • Windows Update
    • Windows Defender
  • Press "Scan".
  • It will create a log (FSS.txt) in the same directory the tool is run.
  • Please copy and paste the log to your reply.

====================================================================================

Please download MiniToolBox and run it.

Checkmark following boxes:
  • Report IE Proxy Settings
  • Report FF Proxy Settings
  • List content of Hosts
  • List IP configuration
  • List Winsock Entries
  • List last 10 Event Viewer log
  • List Installed Programs
  • List Devices (do NOT change any settings here)
  • List Users, Partitions and Memory size
Click Go and post the result.

=============================================================================

Download Malwarebytes' Anti-Malware (aka MBAM): https://www.bleepingcomputer.com/download/malwarebytes-anti-malware/ to your desktop.

* Double-click mbam-setup.exe and follow the prompts to install the program.
* At the end, be sure a checkmark is placed next to Update Malwarebytes' Anti-Malware and Launch Malwarebytes' Anti-Malware, then click Finish.
* If an update is found, it will download and install the latest version.
* Once the program has loaded, select Perform quick scan, then click Scan.
* When the scan is complete, click OK, then Show Results to view the results.
* Be sure that everything is checked, and click Remove Selected.
* When completed, a log will open in Notepad.
* Post the log back here.

Be sure to restart the computer.

The log can also be found here:
C:\Documents and Settings\Username\Application Data\Malwarebytes\Malwarebytes' Anti-Malware\Logs\log-date.txt
Or at C:\Program Files\Malwarebytes' Anti-Malware\Logs\log-date.txt

=============================================================================

Download aswMBR to your desktop.
Double click the aswMBR.exe to run it.
If you see this question: Would you like to download latest Avast! virus definitions?" say "Yes".
Click the "Scan" button to start scan.
On completion of the scan click "Save log", save it to your desktop and post in your next reply.

NOTE. aswMBR will create MBR.dat file on your desktop. This is a copy of your MBR. Do NOT delete it.

My Website

p4433470.gif

My help doesn't cost a penny, but if you'd like to consider a donation, click p22001735.gif


 


#3 cmango

cmango
  • Topic Starter

  • Members
  • 31 posts
  • OFFLINE
  •  
  • Local time:12:42 AM

Posted 05 May 2012 - 11:21 AM

Thanks Broni! :)
I downloaded and executed everything you suggested and posted results below. I put the .dat file in My Documents, do you want me to post it?
=============================================================================
Security Check:

Results of screen317's Security Check version 0.99.24
Windows XP Service Pack 3 x86
Internet Explorer 8
``````````````````````````````
Antivirus/Firewall Check:

Windows Firewall Enabled!
Norton AntiVirus
Antivirus up to date!
```````````````````````````````
Anti-malware/Other Utilities Check:

Java™ 6 Update 32
````````````````````````````````
Process Check:
objlist.exe by Laurent

Norton ccSvcHst.exe
``````````End of Log````````````

=============================================================================
FSS:

Farbar Service Scanner Version: 30-04-2012 01
Ran by HP_Administrator (administrator) on 05-05-2012 at 10:24:59
Running from "C:\Documents and Settings\HP_Administrator.DESKTOP\Local Settings\Temporary Internet Files\Content.IE5\DVWMJBZP"
Microsoft Windows XP Professional Service Pack 3 (X86)
Boot Mode: Normal
****************************************************************

Internet Services:
============

Connection Status:
==============
Localhost is accessible.
LAN connected.
Google IP is accessible.
Yahoo IP is accessible.


Windows Firewall:
=============

Firewall Disabled Policy:
==================


System Restore:
============

System Restore Disabled Policy:
========================


Security Center:
============

Windows Update:
============

Windows Autoupdate Disabled Policy:
============================


File Check:
========
C:\WINDOWS\system32\dhcpcsvc.dll => MD5 is legit
C:\WINDOWS\system32\Drivers\afd.sys => MD5 is legit
C:\WINDOWS\system32\Drivers\netbt.sys => MD5 is legit
C:\WINDOWS\system32\Drivers\tcpip.sys => MD5 is legit
C:\WINDOWS\system32\Drivers\ipsec.sys => MD5 is legit
C:\WINDOWS\system32\dnsrslvr.dll => MD5 is legit
C:\WINDOWS\system32\ipnathlp.dll => MD5 is legit
C:\WINDOWS\system32\netman.dll => MD5 is legit
C:\WINDOWS\system32\wbem\WMIsvc.dll => MD5 is legit
C:\WINDOWS\system32\srsvc.dll => MD5 is legit
C:\WINDOWS\system32\Drivers\sr.sys => MD5 is legit
C:\WINDOWS\system32\wscsvc.dll => MD5 is legit
C:\WINDOWS\system32\wbem\WMIsvc.dll => MD5 is legit
C:\WINDOWS\system32\wuauserv.dll => MD5 is legit
C:\WINDOWS\system32\qmgr.dll => MD5 is legit
C:\WINDOWS\system32\es.dll => MD5 is legit
C:\WINDOWS\system32\cryptsvc.dll => MD5 is legit
C:\WINDOWS\system32\svchost.exe => MD5 is legit
C:\WINDOWS\system32\rpcss.dll => MD5 is legit
C:\WINDOWS\system32\services.exe => MD5 is legit

Extra List:
=======
Gpc(6) IPSec(4) NetBT(5) PSched(7) SYMTDI(8) Tcpip(3)
0x080000000400000001000000020000000300000008000000050000000600000007000000
IpSec Tag value is correct.

**** End of log ****
=============================================================================
Mini Tool Box:

MiniToolBox by Farbar Version: 18-01-2012
Ran by HP_Administrator (administrator) on 05-05-2012 at 10:28:21
Microsoft Windows XP Professional Service Pack 3 (X86)
Boot Mode: Normal
***************************************************************************

========================= IE Proxy Settings: ==============================

Proxy is not enabled.
No Proxy Server is set.
========================= Hosts content: =================================


127.0.0.1 localhost

========================= IP Configuration: ================================

Intel® PRO/100 VE Network Connection = Local Area Connection (Connected)
1394 Net Adapter = 1394 Connection (Connected)


# ----------------------------------
# Interface IP Configuration
# ----------------------------------
pushd interface ip


# Interface IP Configuration for "Local Area Connection"

set address name="Local Area Connection" source=dhcp
set dns name="Local Area Connection" source=dhcp register=PRIMARY
set wins name="Local Area Connection" source=dhcp


popd
# End of interface IP configuration




Windows IP Configuration



Host Name . . . . . . . . . . . . : Desktop

Primary Dns Suffix . . . . . . . :

Node Type . . . . . . . . . . . . : Unknown

IP Routing Enabled. . . . . . . . : No

WINS Proxy Enabled. . . . . . . . : No

DNS Suffix Search List. . . . . . : domain_not_set.invalid



Ethernet adapter Local Area Connection:



Connection-specific DNS Suffix . : domain_not_set.invalid

Description . . . . . . . . . . . : Intel® PRO/100 VE Network Connection

Physical Address. . . . . . . . . : 00-15-F2-82-62-A1

Dhcp Enabled. . . . . . . . . . . : Yes

Autoconfiguration Enabled . . . . : Yes

IP Address. . . . . . . . . . . . : 192.168.1.67

Subnet Mask . . . . . . . . . . . : 255.255.255.0

Default Gateway . . . . . . . . . : 192.168.1.1

DHCP Server . . . . . . . . . . . : 192.168.1.1

DNS Servers . . . . . . . . . . . : 192.168.1.1

71.243.0.12

Lease Obtained. . . . . . . . . . : Saturday, May 05, 2012 10:28:16 AM

Lease Expires . . . . . . . . . . : Sunday, May 06, 2012 10:28:16 AM

Server: dslmodem.domain
Address: 192.168.1.1

Name: google.com
Addresses: 173.194.43.7, 173.194.43.6, 173.194.43.9, 173.194.43.3
173.194.43.4, 173.194.43.0, 173.194.43.8, 173.194.43.5, 173.194.43.14
173.194.43.2, 173.194.43.1



Pinging google.com [173.194.43.7] with 32 bytes of data:



Reply from 173.194.43.7: bytes=32 time=54ms TTL=54

Reply from 173.194.43.7: bytes=32 time=54ms TTL=54



Ping statistics for 173.194.43.7:

Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),

Approximate round trip times in milli-seconds:

Minimum = 54ms, Maximum = 54ms, Average = 54ms

Server: dslmodem.domain
Address: 192.168.1.1

Name: yahoo.com
Addresses: 209.191.122.70, 72.30.38.140, 98.139.183.24



Pinging yahoo.com [209.191.122.70] with 32 bytes of data:



Reply from 209.191.122.70: bytes=32 time=113ms TTL=56

Reply from 209.191.122.70: bytes=32 time=112ms TTL=56



Ping statistics for 209.191.122.70:

Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),

Approximate round trip times in milli-seconds:

Minimum = 112ms, Maximum = 113ms, Average = 112ms

Server: dslmodem.domain
Address: 192.168.1.1

Name: bleepingcomputer.com
Address: 208.43.87.2



Pinging bleepingcomputer.com [208.43.87.2] with 32 bytes of data:



Reply from 208.43.87.2: Destination host unreachable.

Reply from 208.43.87.2: Destination host unreachable.



Ping statistics for 208.43.87.2:

Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),

Approximate round trip times in milli-seconds:

Minimum = 0ms, Maximum = 0ms, Average = 0ms



Pinging 127.0.0.1 with 32 bytes of data:



Reply from 127.0.0.1: bytes=32 time<1ms TTL=128

Reply from 127.0.0.1: bytes=32 time<1ms TTL=128



Ping statistics for 127.0.0.1:

Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),

Approximate round trip times in milli-seconds:

Minimum = 0ms, Maximum = 0ms, Average = 0ms

===========================================================================
Interface List
0x1 ........................... MS TCP Loopback interface
0x2 ...00 15 f2 82 62 a1 ...... Intel® PRO/100 VE Network Connection - Packet Scheduler Miniport
===========================================================================
===========================================================================
Active Routes:
Network Destination Netmask Gateway Interface Metric
0.0.0.0 0.0.0.0 192.168.1.1 192.168.1.67 20
127.0.0.0 255.0.0.0 127.0.0.1 127.0.0.1 1
192.168.1.0 255.255.255.0 192.168.1.67 192.168.1.67 20
192.168.1.67 255.255.255.255 127.0.0.1 127.0.0.1 20
192.168.1.255 255.255.255.255 192.168.1.67 192.168.1.67 20
224.0.0.0 240.0.0.0 192.168.1.67 192.168.1.67 20
255.255.255.255 255.255.255.255 192.168.1.67 192.168.1.67 1
Default Gateway: 192.168.1.1
===========================================================================
Persistent Routes:
None
========================= Winsock entries =====================================

Catalog5 01 C:\Windows\System32\mswsock.dll [245248] (Microsoft Corporation)
Catalog5 02 C:\Windows\System32\winrnr.dll [16896] (Microsoft Corporation)
Catalog5 03 C:\Windows\System32\mswsock.dll [245248] (Microsoft Corporation)
Catalog9 01 C:\Windows\system32\mswsock.dll [245248] (Microsoft Corporation)
Catalog9 02 C:\Windows\system32\mswsock.dll [245248] (Microsoft Corporation)
Catalog9 03 C:\Windows\system32\mswsock.dll [245248] (Microsoft Corporation)
Catalog9 04 C:\Windows\system32\rsvpsp.dll [92672] (Microsoft Corporation)
Catalog9 05 C:\Windows\system32\rsvpsp.dll [92672] (Microsoft Corporation)
Catalog9 06 C:\Windows\system32\mswsock.dll [245248] (Microsoft Corporation)
Catalog9 07 C:\Windows\system32\mswsock.dll [245248] (Microsoft Corporation)
Catalog9 08 C:\Windows\system32\mswsock.dll [245248] (Microsoft Corporation)
Catalog9 09 C:\Windows\system32\mswsock.dll [245248] (Microsoft Corporation)
Catalog9 10 C:\Windows\system32\mswsock.dll [245248] (Microsoft Corporation)
Catalog9 11 C:\Windows\system32\mswsock.dll [245248] (Microsoft Corporation)
Catalog9 12 C:\Windows\system32\mswsock.dll [245248] (Microsoft Corporation)
Catalog9 13 C:\Windows\system32\mswsock.dll [245248] (Microsoft Corporation)
Catalog9 14 C:\Windows\system32\mswsock.dll [245248] (Microsoft Corporation)
Catalog9 15 C:\Windows\system32\mswsock.dll [245248] (Microsoft Corporation)
Catalog9 16 C:\Windows\system32\mswsock.dll [245248] (Microsoft Corporation)
Catalog9 17 C:\Windows\system32\mswsock.dll [245248] (Microsoft Corporation)

========================= Event log errors: ===============================

Application errors:
==================
Error: (05/04/2012 07:49:06 PM) (Source: nview_info) (User: )
Description: NVIEW : dwwin: Mutex Recovery Code - after process e8 detached, mutex recovered. NView (and Mutexes) are now enabled again.

Error: (05/04/2012 07:49:00 PM) (Source: Application Hang) (User: )
Description: Fault bucket 1180947459.

Error: (05/04/2012 07:48:45 PM) (Source: nview_info) (User: )
Description: NVIEW : Explorer: Mutex Recovery on THREAD_DETACH! - Info:PID:720, TID:e04, Name:C:\WINDOWS\Explorer.EXE - NView (and Mutexes) are now enabled again.

Error: (05/04/2012 07:48:45 PM) (Source: Application Hang) (User: )
Description: Hanging application iexplore.exe, version 8.0.6001.18702, hang module hungapp, version 0.0.0.0, hang address 0x00000000.

Error: (05/04/2012 07:36:15 PM) (Source: nview_info) (User: )
Description: NVIEW : rundll32: Mutex Recovery Code - App iexplore has been disabled in our persistent table

Error: (05/04/2012 07:36:05 PM) (Source: nview_info) (User: )
Description: NVIEW : iexplore: Mutex Recovery Code - Process e8 has been kicked out and added to table

Error: (05/04/2012 07:36:05 PM) (Source: nview_info) (User: )
Description: NVIEW : iexplore: Mutex Recovery Code - leaving recovery code.

Error: (05/04/2012 07:36:05 PM) (Source: nview_info) (User: )
Description: NVIEW : iexplore: SEVERE nView Mutex Error - NOT recoverable. NView (and Mutexes) have been disabled for the time being while process e8 is active.

Error: (05/04/2012 07:34:05 PM) (Source: nview_info) (User: )
Description: NVIEW : iexplore: Entered Mutex Recovery Code. NView (and Mutexes) are not enabled.

Error: (05/04/2012 07:34:05 PM) (Source: nview_info) (User: )
Description: NVIEW : iexplore: Mutex Recovery Code - mutex still stuck - PID:e8 now has a back count of:1.


System errors:
=============
Error: (05/04/2012 06:36:32 PM) (Source: Service Control Manager) (User: )
Description: The following boot-start or system-start driver(s) failed to load:
IntelIde
ViaIde

Error: (05/04/2012 06:36:23 PM) (Source: SideBySide) (User: )
Description: Generate Activation Context failed for C:\Program Files\Logitech\SetPoint\SetPoint.exe.
Reference error message: The operation completed successfully.
.

Error: (05/04/2012 06:36:23 PM) (Source: SideBySide) (User: )
Description: Resolve Partial Assembly failed for Microsoft.VC80.CRT.
Reference error message: The referenced assembly is not installed on your system.
.

Error: (05/04/2012 06:36:23 PM) (Source: SideBySide) (User: )
Description: Dependent Assembly Microsoft.VC80.CRT could not be found and Last Error was The referenced assembly is not installed on your system.

Error: (05/04/2012 06:31:44 PM) (Source: Service Control Manager) (User: )
Description: The following boot-start or system-start driver(s) failed to load:
IntelIde
ViaIde

Error: (05/04/2012 06:31:34 PM) (Source: SideBySide) (User: )
Description: Generate Activation Context failed for C:\Program Files\Logitech\SetPoint\SetPoint.exe.
Reference error message: The operation completed successfully.
.

Error: (05/04/2012 06:31:34 PM) (Source: SideBySide) (User: )
Description: Resolve Partial Assembly failed for Microsoft.VC80.CRT.
Reference error message: The referenced assembly is not installed on your system.
.

Error: (05/04/2012 06:31:34 PM) (Source: SideBySide) (User: )
Description: Dependent Assembly Microsoft.VC80.CRT could not be found and Last Error was The referenced assembly is not installed on your system.

Error: (05/04/2012 06:11:32 PM) (Source: SideBySide) (User: )
Description: Generate Activation Context failed for C:\Program Files\Logitech\SetPoint\SetPoint.exe.
Reference error message: The operation completed successfully.
.

Error: (05/04/2012 06:11:32 PM) (Source: SideBySide) (User: )
Description: Resolve Partial Assembly failed for Microsoft.VC80.CRT.
Reference error message: The referenced assembly is not installed on your system.
.


Microsoft Office Sessions:
=========================
Error: (05/04/2012 07:49:06 PM) (Source: nview_info)(User: )
Description: NVIEW : dwwin: Mutex Recovery Code - after process e8 detached, mutex recovered. NView (and Mutexes) are now enabled again.

Error: (05/04/2012 07:49:00 PM) (Source: Application Hang)(User: )
Description: 1180947459

Error: (05/04/2012 07:48:45 PM) (Source: nview_info)(User: )
Description: NVIEW : Explorer: Mutex Recovery on THREAD_DETACH! - Info:PID:720, TID:e04, Name:C:\WINDOWS\Explorer.EXE - NView (and Mutexes) are now enabled again.

Error: (05/04/2012 07:48:45 PM) (Source: Application Hang)(User: )
Description: iexplore.exe8.0.6001.18702hungapp0.0.0.000000000

Error: (05/04/2012 07:36:15 PM) (Source: nview_info)(User: )
Description: NVIEW : rundll32: Mutex Recovery Code - App iexplore has been disabled in our persistent table

Error: (05/04/2012 07:36:05 PM) (Source: nview_info)(User: )
Description: NVIEW : iexplore: Mutex Recovery Code - Process e8 has been kicked out and added to table

Error: (05/04/2012 07:36:05 PM) (Source: nview_info)(User: )
Description: NVIEW : iexplore: Mutex Recovery Code - leaving recovery code.

Error: (05/04/2012 07:36:05 PM) (Source: nview_info)(User: )
Description: NVIEW : iexplore: SEVERE nView Mutex Error - NOT recoverable. NView (and Mutexes) have been disabled for the time being while process e8 is active.

Error: (05/04/2012 07:34:05 PM) (Source: nview_info)(User: )
Description: NVIEW : iexplore: Entered Mutex Recovery Code. NView (and Mutexes) are not enabled.

Error: (05/04/2012 07:34:05 PM) (Source: nview_info)(User: )
Description: NVIEW : iexplore: Mutex Recovery Code - mutex still stuck - PID:e8 now has a back count of:1.


=========================== Installed Programs ============================

1500 (Version: 50.0.206.000)
1500_Help (Version: 50.0.206.000)
1500Trb (Version: 50.0.206.000)
Adobe Reader 7.0 (Version: 7.0.0)
Agere Systems PCI-SV92PP Soft Modem
AiO_Scan (Version: 50.0.206.000)
AiO_Scan_CDA (Version: 50.0.214.000)
AiOSoftware (Version: 50.0.206.000)
AiOSoftwareNPI (Version: 50.0.214.000)
bluegears b-Enspirer
BufferChm (Version: 53.0.13.000)
CameraDrivers (Version: 5.0.0.290)
CameraDrivers (Version: 5.0.0.328)
CP_AtenaShokunin1Config (Version: 53.0.13.000)
CP_CalendarTemplates1 (Version: 53.0.13.000)
cp_LightScribeConfig (Version: 53.0.24.000)
cp_LightScribePlugin (Version: 53.0.24.000)
CP_Package_Basic1 (Version: 53.0.13.000)
CP_Package_Variety1 (Version: 53.0.13.000)
CP_Package_Variety2 (Version: 53.0.13.000)
CP_Package_Variety3 (Version: 53.0.13.000)
CP_Panorama1Config (Version: 53.0.13.000)
CueTour (Version: 53.0.13.000)
Destinations (Version: 53.0.13.000)
DeviceManagementQFolder (Version: 1.00.0000)
DocProc (Version: 5.2.0.0)
DocumentViewer (Version: 53.0.13.000)
DocumentViewerQFolder (Version: 1.00.0000)
Fax (Version: 50.0.206.000)
Fax_CDA (Version: 50.0.214.000)
High Definition Audio Driver Package - KB888111 (Version: 20040219.000000)
HP Boot Optimizer (Version: 2.0.5.1)
HP Deskjet Printer Preload (Version: 10.1.0)
HP DigitalMedia Archive (Version: 1.2)
HP Document Viewer 5.3 (Version: 5.3)
HP Image Zone 5.3 (Version: 5.3)
HP Image Zone for Media Center PC
HP Imaging Device Functions 5.3 (Version: 5.3)
HP Multimedia Keyboard Software
HP Photosmart 330,380,420,470,7800,8000,8200 Series (Version: 8.1)
HP Photosmart Cameras 5.0 (Version: 5.0)
HP PSC & OfficeJet 5.3.A
HP PSC & OfficeJet 5.3.B
HP Solution Center & Imaging Support Tools 5.3 (Version: 5.3)
HP Update (Version: 5.003.001.001)
HPProductAssistant (Version: 53.0.13.000)
HpSdpAppCoreApp (Version: 3.00.0000)
InstantShareAlert (Version: 1.00.0000)
InstantShareDevices (Version: 53.0.13.000)
Intel Matrix Storage Manager
Intel® PRO Network Connections Drivers
InterVideo WinDVD Player
InterVideo WinDVD Player (Version: 5.0-B11.896)
J2SE Runtime Environment 5.0 Update 5 (Version: 1.5.0.50)
Java Auto Updater (Version: 2.0.7.1)
Java™ 6 Update 32 (Version: 6.0.320)
LightScribe 1.4.52.1 (Version: 1.4.52.1)
Microsoft .NET Framework 1.0 Hotfix (KB2572066)
Microsoft .NET Framework 1.1 (Version: 1.1.4322)
Microsoft .NET Framework 1.1 Security Update (KB2656353)
Microsoft .NET Framework 1.1 Security Update (KB979906)
Microsoft Away Mode (Version: 6.0.0160.0)
Microsoft Works (Version: 08.04.0623)
MSXML 4.0 SP2 (KB954430) (Version: 4.20.9870.0)
MSXML 4.0 SP2 (KB973688) (Version: 4.20.9876.0)
muvee autoProducer 4.5 (Version: 4.50.050)
muvee autoProducer unPlugged 1.2 (Version: 1.20.100)
NewCopy (Version: 50.0.206.000)
NewCopy_CDA (Version: 50.0.214.000)
Norton AntiVirus (Version: 19.7.0.9)
NVIDIA Drivers
Otto
PanoStandAlone (Version: 53.0.13.000)
PC-Doctor 5 for Windows (Version: 5.00.3187.03)
PhotoGallery (Version: 53.0.13.000)
ProductContext (Version: 50.0.206.000)
PS2
PSPrinters08 (Version: 8.01.0000)
PSTAPlugin (Version: 8.01.0000)
Python 2.2 pywin32 extensions (build 203)
Python 2.2.3 (Version: 2.2.3)
RandMap (Version: 53.0.13.000)
Readme (Version: 50.0.214.000)
RealPlayer
Realtek High Definition Audio Driver
Remove IntelliMover Demo
Scan (Version: 5.2.0.0)
ScannerCopy (Version: 5.2.0.0)
SkinsHP1 (Version: 53.0.13.000)
SolutionCenter (Version: 50.0.152.000)
Sonic Express Labeler (Version: 2.1.0)
Sonic MyDVD Plus (Version: 6.2.0)
Sonic RecordNow Audio (Version: 2.0.4)
Sonic RecordNow Copy (Version: 2.0.4)
Sonic RecordNow Data (Version: 2.0.4)
Sonic Update Manager (Version: 3.0.0)
Sonic_PrimoSDK (Version: 53.0.13.000)
Status (Version: 53.0.13.000)
TrayApp (Version: 53.0.13.000)
Unload (Version: 5.0.0)
Update for Windows Internet Explorer 8 (KB2598845) (Version: 1)
Update for Windows Media Player 10 (KB913800)
Update for Windows XP (KB2345886) (Version: 1)
Update for Windows XP (KB2467659) (Version: 1)
Update for Windows XP (KB2641690) (Version: 1)
Update for Windows XP (KB951978) (Version: 1)
Update for Windows XP (KB955759) (Version: 1)
Update for Windows XP (KB967715) (Version: 1)
Update for Windows XP (KB968389) (Version: 1)
Update for Windows XP (KB971029) (Version: 1)
Update for Windows XP (KB973687) (Version: 1)
Update for Windows XP (KB973815) (Version: 1)
Update Rollup 2 for Windows XP Media Center Edition 2005
Updates from HP (remove only)
WebFldrs XP (Version: 9.50.7523)
WebReg (Version: 53.0.13.000)
Windows Genuine Advantage Validation Tool (KB892130)
Windows Genuine Advantage Validation Tool (KB892130) (Version: 1.7.0069.2)
Windows Internet Explorer 8 (Version: 20090308.140743)
Windows Media Format Runtime
Windows XP Media Center Edition 2005 KB2502898
Windows XP Media Center Edition 2005 KB2619340
Windows XP Media Center Edition 2005 KB2628259
Windows XP Media Center Edition 2005 KB908250
Windows XP Media Center Edition 2005 KB973768
Windows XP Service Pack 3 (Version: 20080414.031525)

========================= Devices: ================================


========================= Memory info: ===================================

Percentage of memory in use: 29%
Total physical RAM: 2046.39 MB
Available physical RAM: 1446.81 MB
Total Pagefile: 3937.32 MB
Available Pagefile: 3468.82 MB
Total Virtual: 2047.88 MB
Available Virtual: 1966.99 MB

========================= Partitions: =====================================

1 Drive c: (HP_PAVILION) (Fixed) (Total:224.37 GB) (Free:158.27 GB) NTFS
2 Drive d: (HP_RECOVERY) (Fixed) (Total:8.5 GB) (Free:1.04 GB) FAT32

========================= Users: ========================================

User accounts for \\DESKTOP

Administrator Guest HelpAssistant
HP_Administrator SUPPORT_388945a0 SUPPORT_fddfa904


**** End of log ****
=============================================================================
MBAM:

Malwarebytes Anti-Malware 1.61.0.1400
www.malwarebytes.org

Database version: v2012.05.05.06

Windows XP Service Pack 3 x86 NTFS
Internet Explorer 8.0.6001.18702
HP_Administrator :: DESKTOP [administrator]

5/5/2012 10:34:48 AM
mbam-log-2012-05-05 (10-34-48).txt

Scan type: Quick scan
Scan options enabled: Memory | Startup | Registry | File System | Heuristics/Extra | Heuristics/Shuriken | PUP | PUM
Scan options disabled: P2P
Objects scanned: 360005
Time elapsed: 29 minute(s), 32 second(s)

Memory Processes Detected: 0
(No malicious items detected)

Memory Modules Detected: 0
(No malicious items detected)

Registry Keys Detected: 0
(No malicious items detected)

Registry Values Detected: 0
(No malicious items detected)

Registry Data Items Detected: 1
HKLM\SOFTWARE\Microsoft\Security Center|FirewallDisableNotify (PUM.Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> Quarantined and repaired successfully.

Folders Detected: 0
(No malicious items detected)

Files Detected: 16
C:\Documents and Settings\HP_Administrator.MangoDesktop\Local Settings\Temp\9D97.tmp (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Administrator.MangoDesktop\Local Settings\Temp\A316.tmp (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Administrator.MangoDesktop\Local Settings\Temp\ppddfcfux.exxe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Administrator.MangoDesktop\Local Settings\Temp\w32rim_mem.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Administrator.MangoDesktop\Local Settings\Temp\wrfwe_di.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\Documents and Settings\Administrator\winlogon.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\Documents and Settings\Default User\winlogon.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Administrator.MangoDesktop\winlogon.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\config\systemprofile\winlogon.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\uid.tmp (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Administrator.MangoDesktop\Local Settings\Temp\dfbleep.exe (Malware.Trace) -> Quarantined and deleted successfully.
C:\Documents and Settings\Administrator\uidsave.dat (Malware.Trace) -> Quarantined and deleted successfully.
C:\Documents and Settings\Default User\uidsave.dat (Malware.Trace) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Administrator.DESKTOP\uidsave.dat (Malware.Trace) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Administrator.MangoDesktop\uidsave.dat (Malware.Trace) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\config\systemprofile\uidsave.dat (Malware.Trace) -> Quarantined and deleted successfully.

(end)
=========================================================================================================================

aswMBR:

aswMBR version 0.9.9.1665 Copyright© 2011 AVAST Software
Run date: 2012-05-05 11:14:12
-----------------------------
11:14:12.937 OS Version: Windows 5.1.2600 Service Pack 3
11:14:12.937 Number of processors: 2 586 0x602
11:14:12.937 ComputerName: DESKTOP UserName:
11:14:14.031 Initialize success
11:24:15.875 AVAST engine defs: 12050500
11:24:30.656 Disk 0 (boot) \Device\Harddisk0\DR0 -> \Device\Ide\IAAStorageDevice-0
11:24:30.656 Disk 0 Vendor: SAMSUNG_ VT10 Size: 238475MB BusType: 3
11:24:30.671 Disk 0 MBR read successfully
11:24:30.687 Disk 0 MBR scan
11:24:30.703 Disk 0 unknown MBR code
11:24:30.703 Disk 0 Partition 1 00 0C FAT32 LBA RECOVERY 8714 MB offset 63
11:24:30.718 Disk 0 Partition 2 80 (A) 07 HPFS/NTFS NTFS 229749 MB offset 17848215
11:24:30.750 Disk 0 Partition 3 00 17 Hidd HPFS/NTFS NTFS 10 MB offset 488376000
11:24:30.750 Disk 0 Partition 3 **INFECTED** MBR:Alureon-K [Rtk]
11:24:30.750 Disk 0 scanning sectors +488397152
11:24:30.859 Disk 0 scanning C:\WINDOWS\system32\drivers
11:24:43.171 Service scanning
11:24:57.625 Modules scanning
11:25:02.593 Disk 0 trace - called modules:
11:25:02.609 ntkrnlpa.exe CLASSPNP.SYS disk.sys iaStor.sys hal.dll
11:25:02.609 1 nt!IofCallDriver -> \Device\Harddisk0\DR0[0x8a58dab8]
11:25:02.609 3 CLASSPNP.SYS[ba118fd7] -> nt!IofCallDriver -> \Device\Ide\IAAStorageDevice-0[0x8a590030]
11:25:03.375 AVAST engine scan C:\WINDOWS
11:25:33.000 AVAST engine scan C:\WINDOWS\system32
11:28:12.859 AVAST engine scan C:\WINDOWS\system32\drivers
11:28:33.375 AVAST engine scan C:\Documents and Settings\HP_Administrator.DESKTOP
11:29:14.046 AVAST engine scan C:\Documents and Settings\All Users
11:29:14.171 File: C:\Documents and Settings\All Users\Application Data\388cLdcK.exe **INFECTED** Win32:IRCBot-EPZ [Trj]
11:30:51.828 Scan finished successfully
11:33:47.203 Disk 0 MBR has been saved successfully to "C:\Documents and Settings\HP_Administrator.DESKTOP\My Documents\MBR.dat"
11:33:47.203 The log file has been saved successfully to "C:\Documents and Settings\HP_Administrator.DESKTOP\My Documents\aswMBR.txt"

#4 Broni

Broni

    The Coolest BC Computer


  • BC Advisor
  • 42,663 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Daly City, CA
  • Local time:10:42 PM

Posted 05 May 2012 - 11:47 AM

You have a rootkited partition there. More advanced tools will be needed to deal with your issue.

Please follow the instructions in ==>This Guide<== starting at Step 6. If you cannot complete a step, skip it and continue.

Once the proper logs are created, then make a NEW TOPIC and post it ==>HERE<== Please include a description of your computer issues, what you have done to resolve them, and a link to this topic.

If you can produce at least some of the logs, then please create the new topic and explain what happens when you try to create the log(s) that you couldn't get. If you cannot produce any of the logs, then still post the topic and explain that you followed the Prep. Guide, were unable to create the logs, and describe what happens when you try to create the logs.

It would be helpful if you post a note here once you have completed the steps in the guide and have started your topic in malware removal. Good luck and be patient.

If HelpBot replies to your topic, PLEASE follow Step One so it will report your topic to the team members.

You may want to post aswMBR log as well.

My Website

p4433470.gif

My help doesn't cost a penny, but if you'd like to consider a donation, click p22001735.gif


 


#5 cmango

cmango
  • Topic Starter

  • Members
  • 31 posts
  • OFFLINE
  •  
  • Local time:12:42 AM

Posted 05 May 2012 - 05:05 PM

Thank you Broni- great help, very concise.
I posted in the "Virus, Trojan, Syware, Malware Removal Logs" forum as you suggested. I used the same title as this thread.

Here is the aswMBR log:

Mod Edit: Removed log data from AII topic, OP posted anew in Malware Removal logs, with log properly posted there - Hamluis.

Edited by hamluis, 05 May 2012 - 05:25 PM.
Removed dupe log data - Hamluis.


#6 Broni

Broni

    The Coolest BC Computer


  • BC Advisor
  • 42,663 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Daly City, CA
  • Local time:10:42 PM

Posted 05 May 2012 - 05:20 PM

No logs in this forum please.

My Website

p4433470.gif

My help doesn't cost a penny, but if you'd like to consider a donation, click p22001735.gif


 


#7 hamluis

hamluis

    Moderator


  • Moderator
  • 55,405 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Killeen, TX
  • Local time:12:42 AM

Posted 05 May 2012 - 05:28 PM

Malware Removal Log topic at http://www.bleepingcomputer.com/forums/topic452586.html/page__p__2689539#entry2689539 .

Now that you have properly posted a malware log topic, you should NOT make further changes to your computer (install/uninstall programs, use special fix tools, delete files, edit the registry, etc) unless advised by a MRT Team member, nor should you ask for help elsewhere. Doing so can result in system changes which may not show in the log you already posted. Further, any modifications you make on your own may cause confusion for the helper assisting you and could complicate the malware removal process which would extend the time it takes to clean your computer.

From this point on, the MRT Team should be the only members that you take advice from, until they have verified your log as clean.

Please be patient. It may take a while to get a response because the MRT Team members are EXTREMELY busy working logs posted before yours. They are volunteers who will help you out as soon as possible. Once you have made your post and are waiting, please DO NOT make another reply until it has been responded to by a member of the MRT Team. Generally the staff checks the forum for postings that have 0 replies as this makes it easier for them to identify those who have not been helped. If you post another response there will be 1 reply. A team member, looking for a new log to work may assume another MRT Team member is already assisting you and not open the thread to respond.

It may take several days to get a response but your log will be reviewed and answered as soon as possible. I advise checking your topic once a day for responses as the e-mail notification system is unreliable.

If HelpBot replies to your topic, PLEASE follow Step One so it will report your topic to the team members.

To avoid confusion, I am closing this topic.

Louis




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users