Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Kaspersky - NOtifications


  • This topic is locked This topic is locked
14 replies to this topic

#1 Madmah

Madmah

  • Members
  • 40 posts
  • OFFLINE
  •  
  • Local time:10:42 PM

Posted 03 January 2013 - 01:23 AM

Dear All,

Finally am re directed to this web page.

Let me once again explain my PC issues.

MY OS is WIN XP SP2. Am using licensed version of Kaspersky Internet Security 2011.

Past a month, my kaspersky shows a message: Your computer security is at risk. Detected legal software that can be used by criminals to harm your computer or personal data.And when i click fix it now there is no response.

When i do a fullscan, it shows no threats. But the notification is still there.

As directed by on one of your moderator, tried MBAM, ASWMBR -- no virus but the notification of Kaspersky remains.

As directed, i tried DDS download, and here with attaching the log. Am pasting below the dds.text

DDS (Ver_2012-11-20.01) - NTFS_x86
Internet Explorer: 6.0.2900.2180
Run by login at 11:53:06 on 2013-01-03
Microsoft Windows XP Professional 5.1.2600.2.1252.1.1033.18.3253.2485 [GMT 5.5:30]
.
AV: Kaspersky Internet Security *Enabled/Updated* {2C4D4BC6-0793-4956-A9F9-E252435469C0}
FW: Kaspersky Internet Security *Enabled*
.
============== Running Processes ================
.
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\SUPERAntiSpyware\SASCORE.EXE
C:\Program Files\Kaspersky Lab\Kaspersky Internet Security 2011\avp.exe
C:\Documents and Settings\All Users\Application Data\DatacardService\DCService.exe
C:\Program Files\Intel\Intel® Management Engine Components\LMS\LMS.exe
C:\Program Files\Intel\Intel® Management Engine Components\UNS\UNS.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\RTHDCPL.EXE
C:\WINDOWS\system32\igfxtray.exe
C:\WINDOWS\system32\hkcmd.exe
C:\WINDOWS\system32\igfxpers.exe
C:\Program Files\CyberLink\Power2Go\CLMLSvc.exe
C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe
C:\Program Files\Common Files\Real\Update_OB\realsched.exe
C:\Program Files\Kaspersky Lab\Kaspersky Internet Security 2011\avp.exe
C:\Program Files\ScanSoft\PaperPort\pptd40nt.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Messenger\msmsgs.exe
C:\WINDOWS\system32\CNAB4RPK.EXE
C:\Documents and Settings\All Users\Start Menu\Programs\Startup\ESET-phase2.exe
C:\Program Files\WordWeb\wweb32.exe
C:\Program Files\Microsoft Office\Office12\OUTLOOK.EXE
C:\WINDOWS\System32\alg.exe
C:\DOCUME~1\login\LOCALS~1\Temp\ESET-2288\7za.exe
C:\Program Files\Mozilla Firefox\firefox.exe
C:\Program Files\Kaspersky Lab\Kaspersky Internet Security 2011\avp.exe
C:\WINDOWS\system32\wbem\wmiprvse.exe
C:\WINDOWS\System32\svchost.exe -k netsvcs
C:\WINDOWS\system32\svchost.exe -k NetworkService
C:\WINDOWS\system32\svchost.exe -k LocalService
C:\WINDOWS\system32\svchost.exe -k imgsvc
.
============== Pseudo HJT Report ===============
.
uStart Page = hxxp://isearch.babylon.com/?affID=117380&tt=4712_4&babsrc=HP_ss&mntrId=a8728f43000000000000e069952efbd9
uDefault_Search_URL = hxxp://www.google.com/ie
mStart Page = hxxp://home.allgameshome.com/
uInternet Connection Wizard,ShellNext = iexplore
uSearchAssistant = hxxp://www.google.com/ie
uSearchURL,(Default) = hxxp://www.google.com/search?q=%s
BHO: Adobe PDF Link Helper: {18DF081C-E8AD-4283-A596-FA578C2EBDC3} - c:\program files\common files\adobe\acrobat\activex\AcroIEHelperShim.dll
BHO: RealPlayer Download and Record Plugin for Internet Explorer: {3049C3E9-B461-4BC5-8870-4C09146192CA} - c:\program files\real\realplayer\rpbrowserrecordplugin.dll
BHO: IEVkbdBHO Class: {59273AB4-E7D3-40F9-A1A8-6FA9CCA1862C} - c:\program files\kaspersky lab\kaspersky internet security 2011\ievkbd.dll
BHO: Groove GFS Browser Helper: {72853161-30C5-4D22-B7F9-0BBC1D38A37E} - c:\program files\microsoft office\office12\GrooveShellExtensions.dll
BHO: FilterBHO Class: {E33CF602-D945-461A-83F0-819F76A199F8} - c:\program files\kaspersky lab\kaspersky internet security 2011\klwtbbho.dll
uRun: [ctfmon.exe] c:\windows\system32\ctfmon.exe
uRun: [Google Update] "c:\documents and settings\login\local settings\application data\google\update\GoogleUpdate.exe" /c
uRun: [MSMSGS] "c:\program files\messenger\msmsgs.exe" /background
uRun: [Media Finder] "c:\program files\media finder\Media Finder.exe" /opentotray
mRun: [RTHDCPL] RTHDCPL.EXE
mRun: [IgfxTray] c:\windows\system32\igfxtray.exe
mRun: [HotKeysCmds] c:\windows\system32\hkcmd.exe
mRun: [Persistence] c:\windows\system32\igfxpers.exe
mRun: [CLMLServer] "c:\program files\cyberlink\power2go\CLMLSvc.exe"
mRun: [UpdateP2GoShortCut] "c:\program files\cyberlink\power2go\muitransfer\muistartmenu.exe" "c:\program files\cyberlink\power2go" updatewithcreateonce "software\cyberlink\power2go\6.0"
mRun: [UpdatePSTShortCut] "c:\program files\cyberlink\dvd suite\muitransfer\muistartmenu.exe" "c:\program files\cyberlink\dvd suite" updatewithcreateonce "software\cyberlink\PowerStarter"
mRun: [GrooveMonitor] "c:\program files\microsoft office\office12\GrooveMonitor.exe"
mRun: [TkBellExe] "c:\program files\common files\real\update_ob\realsched.exe" -osboot
mRun: [AVP] "c:\program files\kaspersky lab\kaspersky internet security 2011\avp.exe"
mRun: [SSBkgdUpdate] "c:\program files\common files\scansoft shared\ssbkgdupdate\SSBkgdupdate.exe" -Embedding -boot
mRun: [PaperPort PTD] "c:\program files\scansoft\paperport\pptd40nt.exe"
mRun: [IndexSearch] "c:\program files\scansoft\paperport\IndexSearch.exe"
mRun: [PPort11reminder] "c:\program files\scansoft\paperport\ereg\ereg.exe" -r "c:\documents and settings\all users\application data\scansoft\paperport\11\config\ereg\Ereg.ini"
mRun: [Adobe Reader Speed Launcher] "c:\program files\adobe\reader 9.0\reader\Reader_sl.exe"
mRun: [Adobe ARM] "c:\program files\common files\adobe\arm\1.0\AdobeARM.exe"
mRun: [APSDaemon] "c:\program files\common files\apple\apple application support\APSDaemon.exe"
mRun: [QuickTime Task] "c:\program files\quicktime\qttask.exe" -atboottime
StartupFolder: c:\docume~1\login\startm~1\programs\startup\onenot~1.lnk - c:\program files\microsoft office\office12\ONENOTEM.EXE
StartupFolder: c:\docume~1\login\startm~1\programs\startup\wordweb.lnk - c:\program files\wordweb\wweb32.exe
StartupFolder: c:\documents and settings\all users\start menu\programs\startup\ESET-phase2.exe
uPolicies-Explorer: NoDriveTypeAutoRun = dword:145
mPolicies-Explorer: NoDriveTypeAutoRun = dword:60
mPolicies-Explorer: NoDriveTypeAutoRun = dword:145
IE: Add to Anti-Banner - c:\program files\kaspersky lab\kaspersky internet security 2011\ie_banner_deny.htm
IE: Add to Google Photos Screensa&ver - c:\windows\system32\GPhotos.scr/200
IE: Download with &Media Finder - c:\program files\media finder\hook.html
IE: E&xport to Microsoft Excel - c:\progra~1\micros~2\office12\EXCEL.EXE/3000
IE: {2670000A-7350-4f3c-8081-5663EE0C6C49} - {48E73304-E1D6-4330-914C-F5F514E3486C} - c:\program files\microsoft office\office12\ONBttnIE.dll
IE: {4248FE82-7FCB-46AC-B270-339F08212110} - {4248FE82-7FCB-46AC-B270-339F08212110} - c:\program files\kaspersky lab\kaspersky internet security 2011\klwtbbho.dll
IE: {92780B25-18CC-41C8-B9BE-3C9C571A8263} - {FF059E31-CC5A-4E2E-BF3B-96E929D65503}
IE: {CCF151D8-D089-449F-A5A4-D9909053F20F} - {CCF151D8-D089-449F-A5A4-D9909053F20F} - c:\program files\kaspersky lab\kaspersky internet security 2011\klwtbbho.dll
IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe
DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} - hxxp://download.macromedia.com/pub/shockwave/cabs/flash/swflash.cab
DPF: {E2883E8F-472F-4FB0-9522-AC9BF37916A7} - hxxp://platformdl.adobe.com/NOS/getPlusPlus/1.6/gp.cab
TCP: Interfaces\{3DB86AAA-DBF5-4CF8-981B-B6F79E33540A} : NameServer = 218.248.255.147,218.248.255.146
Handler: grooveLocalGWS - {88FED34C-F0CA-4636-A375-3CB6248B04CD} - c:\program files\microsoft office\office12\GrooveSystemServices.dll
Notify: !SASWinLogon - c:\program files\superantispyware\SASWINLO.DLL
Notify: igfxcui - igfxdev.dll
Notify: klogon - c:\windows\system32\klogon.dll
AppInit_DLLs= c:\progra~1\kasper~1\kasper~1\mzvkbd3.dll, c:\progra~1\kasper~1\kasper~1\kloehk.dll
SEH: Groove GFS Stub Execution Hook - {B5A7F190-DDA6-4420-B3BA-52453494E6CD} - c:\program files\microsoft office\office12\GrooveShellExtensions.dll
SEH: SABShellExecuteHook Class - {5AE067D3-9AFB-48E0-853A-EBB7F4A000DA} - c:\program files\superantispyware\SASSEH.DLL
.
================= FIREFOX ===================
.
FF - ProfilePath - c:\documents and settings\login\application data\mozilla\firefox\profiles\pbl6l24x.default-1353903428484\
FF - prefs.js: browser.startup.homepage - www.google.com
FF - plugin: c:\documents and settings\login\local settings\application data\google\update\1.3.21.123\npGoogleUpdate3.dll
FF - plugin: c:\program files\adobe\reader 9.0\reader\air\nppdf32.dll
FF - plugin: c:\program files\google\picasa3\npPicasa3.dll
FF - plugin: c:\program files\mozilla firefox\plugins\nppopcaploader.dll
FF - plugin: c:\windows\system32\macromed\flash\NPSWF32_11_5_502_135.dll
FF - ExtSQL: 2012-11-25 14:46; gencrawler@some.com; c:\documents and settings\login\application data\mozilla\extensions\{ec8030f7-c20a-464f-9b0e-13a3a9e97384}\gencrawler@some.com
.
============= SERVICES / DRIVERS ===============
.
R0 KL1;kl1;c:\windows\system32\drivers\kl1.sys [2010-6-9 132184]
R1 kl2;kl2;c:\windows\system32\drivers\kl2.sys [2010-6-9 11352]
R1 KLIF;Kaspersky Lab Driver;c:\windows\system32\drivers\klif.sys [2011-4-30 475736]
R1 SASDIFSV;SASDIFSV;c:\program files\superantispyware\sasdifsv.sys [2011-7-22 12880]
R1 SASKUTIL;SASKUTIL;c:\program files\superantispyware\SASKUTIL.SYS [2011-7-13 67664]
R2 !SASCORE;SAS Core Service;c:\program files\superantispyware\SASCore.exe [2011-8-12 116608]
R2 AVP;Kaspersky Anti-Virus Service;c:\program files\kaspersky lab\kaspersky internet security 2011\avp.exe [2010-7-1 352976]
R2 DCService.exe;DCService.exe;c:\documents and settings\all users\application data\datacardservice\DCService.exe [2010-5-8 229376]
R2 UNS;Intel® Management & Security Application User Notification Service;c:\program files\intel\intel® management engine components\uns\UNS.exe [2011-3-23 2320920]
R3 e1kexpress;Intel® PRO/1000 PCI Express Network Connection Driver K;c:\windows\system32\drivers\e1k5132.sys [2011-3-23 168616]
R3 huawei_enumerator;huawei_enumerator;c:\windows\system32\drivers\ew_jubusenum.sys [2012-4-19 63616]
R3 IntcDAud;Intel® Display Audio;c:\windows\system32\drivers\IntcDAud.sys [2011-3-23 235520]
R3 klim5;Kaspersky Anti-Virus NDIS Filter;c:\windows\system32\drivers\klim5.sys [2010-5-7 32856]
R3 klmouflt;Kaspersky Lab KLMOUFLT;c:\windows\system32\drivers\klmouflt.sys [2009-11-2 19472]
S1 SBRE;SBRE;\??\c:\windows\system32\drivers\sbredrv.sys --> c:\windows\system32\drivers\SBREdrv.sys [?]
S2 arowonriiw;arowonriiw;"c:\docume~1\login\locals~1\temp\dat347.tmp.exe" --service --> c:\docume~1\login\locals~1\temp\DAT347.tmp.exe [?]
S2 auffjuttqdaoyo;auffjuttqdaoyo;"c:\docume~1\login\locals~1\temp\dat1b6.tmp.exe" --service --> c:\docume~1\login\locals~1\temp\DAT1B6.tmp.exe [?]
S2 axejgnkl;axejgnkl;"c:\docume~1\login\locals~1\temp\dat3c7.tmp.exe" --service --> c:\docume~1\login\locals~1\temp\DAT3C7.tmp.exe [?]
S2 ayoou05eeutn;C-DillaSrv;c:\windows\system32\kogiga.exe --> c:\windows\system32\kogiga.exe [?]
S2 biuaheplqfoeu;biuaheplqfoeu;"c:\docume~1\login\locals~1\temp\dat70.tmp.exe" --service --> c:\docume~1\login\locals~1\temp\DAT70.tmp.exe [?]
S2 bprsqtyuvnn;bprsqtyuvnn;"c:\docume~1\login\locals~1\temp\datb1.tmp.exe" --service --> c:\docume~1\login\locals~1\temp\DATB1.tmp.exe [?]
S2 bpwcqvruzdbr;bpwcqvruzdbr;"c:\docume~1\login\locals~1\temp\dat579.tmp.exe" --service --> c:\docume~1\login\locals~1\temp\DAT579.tmp.exe [?]
S2 cmyxdjtg;cmyxdjtg;"c:\docume~1\login\locals~1\temp\dat3a5.tmp.exe" --service --> c:\docume~1\login\locals~1\temp\DAT3A5.tmp.exe [?]
S2 ealqvrouxwr;ealqvrouxwr;"c:\docume~1\login\locals~1\temp\dat240.tmp.exe" --service --> c:\docume~1\login\locals~1\temp\DAT240.tmp.exe [?]
S2 ekocbxmdedsgjxm;ekocbxmdedsgjxm;"c:\docume~1\login\locals~1\temp\dat5c5.tmp.exe" --service --> c:\docume~1\login\locals~1\temp\DAT5C5.tmp.exe [?]
S2 fdgsvstls;fdgsvstls;"c:\docume~1\login\locals~1\temp\dat44a.tmp.exe" --service --> c:\docume~1\login\locals~1\temp\DAT44A.tmp.exe [?]
S2 ffcrdzggyir;ffcrdzggyir;"c:\docume~1\login\locals~1\temp\dat187.tmp.exe" --service --> c:\docume~1\login\locals~1\temp\DAT187.tmp.exe [?]
S2 ffxhjhwzwvell;ffxhjhwzwvell;"c:\docume~1\login\locals~1\temp\dat2b9.tmp.exe" --service --> c:\docume~1\login\locals~1\temp\DAT2B9.tmp.exe [?]
S2 fuwurgueij;fuwurgueij;"c:\docume~1\login\locals~1\temp\datee.tmp.exe" --service --> c:\docume~1\login\locals~1\temp\DATEE.tmp.exe [?]
S2 giarohqralcjum;giarohqralcjum;"c:\docume~1\login\locals~1\temp\date9.tmp.exe" --service --> c:\docume~1\login\locals~1\temp\DATE9.tmp.exe [?]
S2 gsrakuclyntoqn;gsrakuclyntoqn;"c:\docume~1\login\locals~1\temp\dat1ed.tmp.exe" --service --> c:\docume~1\login\locals~1\temp\DAT1ED.tmp.exe [?]
S2 hgysozsupk;hgysozsupk;"c:\docume~1\login\locals~1\temp\dat55a.tmp.exe" --service --> c:\docume~1\login\locals~1\temp\DAT55A.tmp.exe [?]
S2 hqnxnsutk;hqnxnsutk;"c:\docume~1\login\locals~1\temp\dat20d.tmp.exe" --service --> c:\docume~1\login\locals~1\temp\DAT20D.tmp.exe [?]
S2 ikivllnwtceanv;ikivllnwtceanv;"c:\docume~1\login\locals~1\temp\dat468.tmp.exe" --service --> c:\docume~1\login\locals~1\temp\DAT468.tmp.exe [?]
S2 jfcbchoottt;jfcbchoottt;"c:\docume~1\login\locals~1\temp\dat30.tmp.exe" --service --> c:\docume~1\login\locals~1\temp\DAT30.tmp.exe [?]
S2 jftzwvcvdcdirg;jftzwvcvdcdirg;"c:\docume~1\login\locals~1\temp\dat45e.tmp.exe" --service --> c:\docume~1\login\locals~1\temp\DAT45E.tmp.exe [?]
S2 jgapervgrz;jgapervgrz;"c:\docume~1\login\locals~1\temp\dat41e.tmp.exe" --service --> c:\docume~1\login\locals~1\temp\DAT41E.tmp.exe [?]
S2 kslrswht;kslrswht;"c:\docume~1\login\locals~1\temp\dat47b.tmp.exe" --service --> c:\docume~1\login\locals~1\temp\DAT47B.tmp.exe [?]
S2 kvwlogdim;kvwlogdim;"c:\docume~1\login\locals~1\temp\dat122.tmp.exe" --service --> c:\docume~1\login\locals~1\temp\DAT122.tmp.exe [?]
S2 lkkppdxfluvyx;lkkppdxfluvyx;"c:\docume~1\login\locals~1\temp\dat3fb.tmp.exe" --service --> c:\docume~1\login\locals~1\temp\DAT3FB.tmp.exe [?]
S2 lnfvikkjqc;lnfvikkjqc;"c:\docume~1\login\locals~1\temp\dat22.tmp.exe" --service --> c:\docume~1\login\locals~1\temp\DAT22.tmp.exe [?]
S2 lvnfdblwva;lvnfdblwva;"c:\docume~1\login\locals~1\temp\dat13d.tmp.exe" --service --> c:\docume~1\login\locals~1\temp\DAT13D.tmp.exe [?]
S2 muzoekon;muzoekon;"c:\docume~1\login\locals~1\temp\datce.tmp.exe" --service --> c:\docume~1\login\locals~1\temp\DATCE.tmp.exe [?]
S2 ovyniurxcd;ovyniurxcd;"c:\docume~1\login\locals~1\temp\dat258.tmp.exe" --service --> c:\docume~1\login\locals~1\temp\DAT258.tmp.exe [?]
S2 qbbolirxdkuc;qbbolirxdkuc;"c:\docume~1\login\locals~1\temp\dat637.tmp.exe" --service --> c:\docume~1\login\locals~1\temp\DAT637.tmp.exe [?]
S2 rofmfssttpamio;rofmfssttpamio;"c:\docume~1\login\locals~1\temp\datcc.tmp.exe" --service --> c:\docume~1\login\locals~1\temp\DATCC.tmp.exe [?]
S2 rsrvdpnx;rsrvdpnx;"c:\docume~1\login\locals~1\temp\datfe.tmp.exe" --service --> c:\docume~1\login\locals~1\temp\DATFE.tmp.exe [?]
S2 rzkuizwetyne;rzkuizwetyne;"c:\docume~1\login\locals~1\temp\dat71.tmp.exe" --service --> c:\docume~1\login\locals~1\temp\DAT71.tmp.exe [?]
S2 sglksyuffihcqij;sglksyuffihcqij;"c:\docume~1\login\locals~1\temp\dat164.tmp.exe" --service --> c:\docume~1\login\locals~1\temp\DAT164.tmp.exe [?]
S2 vikbgkozuhcdtdu;vikbgkozuhcdtdu;"c:\docume~1\login\locals~1\temp\datb2.tmp.exe" --service --> c:\docume~1\login\locals~1\temp\DATB2.tmp.exe [?]
S2 vnbzugtzfygahnv;vnbzugtzfygahnv;"c:\docume~1\login\locals~1\temp\dat166.tmp.exe" --service --> c:\docume~1\login\locals~1\temp\DAT166.tmp.exe [?]
S2 vpiykajr;vpiykajr;"c:\docume~1\login\locals~1\temp\dat1c8.tmp.exe" --service --> c:\docume~1\login\locals~1\temp\DAT1C8.tmp.exe [?]
S2 wajsnoakussetj;wajsnoakussetj;"c:\docume~1\login\locals~1\temp\data1.tmp.exe" --service --> c:\docume~1\login\locals~1\temp\DATA1.tmp.exe [?]
S2 winlpedgenpjc;winlpedgenpjc;"c:\docume~1\login\locals~1\temp\dat5d9.tmp.exe" --service --> c:\docume~1\login\locals~1\temp\DAT5D9.tmp.exe [?]
S2 wldtxahe;wldtxahe;"c:\docume~1\login\locals~1\temp\dat8bc.tmp.exe" --service --> c:\docume~1\login\locals~1\temp\DAT8BC.tmp.exe [?]
S2 xrmmgmfzlt;xrmmgmfzlt;"c:\docume~1\login\locals~1\temp\datb6.tmp.exe" --service --> c:\docume~1\login\locals~1\temp\DATB6.tmp.exe [?]
S2 xzixaxmah;xzixaxmah;"c:\docume~1\login\locals~1\temp\dat89.tmp.exe" --service --> c:\docume~1\login\locals~1\temp\DAT89.tmp.exe [?]
S2 ynkjladtrvdaalo;ynkjladtrvdaalo;"c:\docume~1\login\locals~1\temp\dat366.tmp.exe" --service --> c:\docume~1\login\locals~1\temp\DAT366.tmp.exe [?]
S2 zffelxtmybjaqvx;zffelxtmybjaqvx;"c:\docume~1\login\locals~1\temp\dat2a7.tmp.exe" --service --> c:\docume~1\login\locals~1\temp\DAT2A7.tmp.exe [?]
S2 zrdriiizg;zrdriiizg;"c:\docume~1\login\locals~1\temp\dat5fe.tmp.exe" --service --> c:\docume~1\login\locals~1\temp\DAT5FE.tmp.exe [?]
S3 Ambfilt;Ambfilt;c:\windows\system32\drivers\Ambfilt.sys [2011-3-23 1691480]
S3 ew_hwusbdev;Huawei MobileBroadband USB PNP Device;c:\windows\system32\drivers\ew_hwusbdev.sys [2012-4-19 101504]
.
=============== Created Last 30 ================
.
.
==================== Find3M ====================
.
2012-12-14 11:19:28 21104 ----a-w- c:\windows\system32\drivers\mbam.sys
2012-12-12 13:26:46 73656 ----a-w- c:\windows\system32\FlashPlayerCPLApp.cpl
2012-12-12 13:26:46 697272 ----a-w- c:\windows\system32\FlashPlayerApp.exe
.
============= FINISH: 11:54:25.25 ===============


Awaiting for your reply,

Madmah

Attached Files


Edited by Madmah, 03 January 2013 - 01:27 AM.


BC AdBot (Login to Remove)

 


#2 fireman4it

fireman4it

    Bleepin' Fireman


  • Malware Response Team
  • 13,505 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Greenup, Ill USA
  • Local time:10:42 PM

Posted 03 January 2013 - 10:59 AM

HelloMadmah,
  • Welcome to Bleeping Computer.
  • My name is fireman4it and I will be helping you with your Malware problem.

    Please take note of some guidelines for this fix:
  • Refrain from making any changes to your computer including installing/uninstall programs, deleting files, modifying the registry, and running scanners or tools.
  • If you do not understand any step(s) provided, please do not hesitate to ask before continuing.
  • Even if things appear to be better, it might not mean we are finished. Please continue to follow my instructions and reply back until I give you the "all clean".
  • In the upper right hand corner of the topic you will see a button called Watch Topic.I suggest you click it and select Immediate E-Mail notification and click on Proceed. This way you will be advised when we respond to your topic and facilitate the cleaning of your machine.

  • Finally, please reply using the ADD REPLY button in the lower right hand corner of your screen. Do not start a new topic. The logs that you post should be pasted directly into the reply, unless they do not fit into the post.
  • I will be analyzing your log. I will get back to you with instructions.


1.
Please download the latest version of TDSSKiller from here and save it to your Desktop.
  • Doubleclick on TDSSKiller.exe to run the application, then click on Change parameters.
    Posted Image
  • Put a checkmark beside loaded modules.
    Posted Image
  • A reboot will be needed to apply the changes. Do it.
  • TDSSKiller will launch automatically after the reboot. Also your computer may seem very slow and unusable. This is normal. Give it enough time to load your background programs.
  • Then click on Change parameters in TDSSKiller.
  • Check all boxes then click OK.
    Posted Image
  • Click the Start Scan button.
    Posted Image
  • The scan should take no longer than 2 minutes.
  • If a suspicious object is detected, the default action will be Skip, click on Continue.
    Posted Image
  • If malicious objects are found, they will show in the Scan results - Select action for found objects and offer three options.
    Ensure Cure (default) is selected, then click Continue > Reboot now to finish the cleaning process.
    Posted Image
    Note: If Cure is not available, please choose Skip instead, do not choose Delete unless instructed.
  • A report will be created in your root directory, (usually C:\ folder) in the form of "TDSSKiller.[Version]_[Date]_[Time]_log.txt". Please copy and paste the contents of that file here.


2.
Install Recovery Console and Run ComboFix

This tool is not a toy. If used the wrong way you could trash your computer. Please use only under direction of a Helper. If you decide to do so anyway, please do not blame me or ComboFix.

Download Combofix from any of the links below, and save it to your desktop.

Link 1
Link 2
  • Close/disable all anti-virus and anti-malware programs so they do not interfere with the running of ComboFix. Refer to this page if you are not sure how.
  • Close any open windows, including this one.
  • Double click on ComboFix.exe & follow the prompts.
  • As part of it's process, ComboFix will check to see if the Microsoft Windows Recovery Console is installed. With malware infections being as they are today, it's strongly recommended to have this pre-installed on your machine before doing any malware removal. It will allow you to boot up into a special recovery/repair mode that will allow us to more easily help you should your computer have a problem after an attempted removal of malware.
  • If you did not have it installed, you will see the prompt below. Choose YES.
  • Posted Image
  • Follow the prompts to allow ComboFix to download and install the Microsoft Windows Recovery Console, and when prompted, agree to the End-User License Agreement to install the Microsoft Windows Recovery Console.
**Please note: If the Microsoft Windows Recovery Console is already installed, ComboFix will continue it's malware removal procedures.

Note:The Windows Recovery Console will allow you to boot up into a special recovery (repair) mode. This allows us to more easily help you
should your computer have a problem after an attempted removal of malware. It is a simple procedure that will only take a few moments of your time.

  • Once the Microsoft Windows Recovery Console is installed using ComboFix, you should see the following message:

    Posted Image
  • Click on Yes, to continue scanning for malware.
  • When finished, it will produce a report for you. Please post the contents of the log (C:\ComboFix.txt).
Leave your computer alone while ComboFix is running.
ComboFix will restart your computer if malware is found; allow it to do so.


Note: Please Do NOT mouseclick combofix's window while its running because it may cause it to stall.


Things to include in your next reply::
Tdsskiller log
Combofix.txt
How is your machine running now?

" Extinguishing Malware from the world"

The Virus, Trojan, Spyware, and Malware Removal forum is very busy. If I'm helping you and I've not posted back within 24 hrs., send a PM with your topic link. Thank you.

ALL OTHER HELP REQUESTS VIA THE PM SYSTEM WILL BE IGNORED. The Forums are there for a reason!
Thanks-


  userbar_eis_500.gif

If I have helped you, consider making a donation to help me continue the fight against Malware! Just click btn_donate_LG.gif


#3 nasdaq

nasdaq

  • Malware Response Team
  • 39,246 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Montreal, QC. Canada
  • Local time:11:42 PM

Posted 03 January 2013 - 11:12 AM

Sorry duplicate post.

Edited by nasdaq, 03 January 2013 - 11:13 AM.


#4 Madmah

Madmah
  • Topic Starter

  • Members
  • 40 posts
  • OFFLINE
  •  
  • Local time:10:42 PM

Posted 05 January 2013 - 04:16 AM

Please find the atatched TDS REPORT:

ThankS

Attached Files



#5 fireman4it

fireman4it

    Bleepin' Fireman


  • Malware Response Team
  • 13,505 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Greenup, Ill USA
  • Local time:10:42 PM

Posted 05 January 2013 - 12:13 PM

Hello,
Thanks for the Tdss log. Now for the Combofix log and how the machine is running after running Combofix.?

" Extinguishing Malware from the world"

The Virus, Trojan, Spyware, and Malware Removal forum is very busy. If I'm helping you and I've not posted back within 24 hrs., send a PM with your topic link. Thank you.

ALL OTHER HELP REQUESTS VIA THE PM SYSTEM WILL BE IGNORED. The Forums are there for a reason!
Thanks-


  userbar_eis_500.gif

If I have helped you, consider making a donation to help me continue the fight against Malware! Just click btn_donate_LG.gif


#6 fireman4it

fireman4it

    Bleepin' Fireman


  • Malware Response Team
  • 13,505 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Greenup, Ill USA
  • Local time:10:42 PM

Posted 07 January 2013 - 11:43 AM

Hello.

Are you still there?

If you are please follow the instructions in my previous post.

If you still need help, follow the instructions I have given in my response. If you have since had your problem solved, we would appreciate you letting us know so we can close the topic.

Please reply back telling us so. If you don't reply within 3-5 days the topic will need to be closed.

Thanks for understanding :)

With Regards,
fireman4it

" Extinguishing Malware from the world"

The Virus, Trojan, Spyware, and Malware Removal forum is very busy. If I'm helping you and I've not posted back within 24 hrs., send a PM with your topic link. Thank you.

ALL OTHER HELP REQUESTS VIA THE PM SYSTEM WILL BE IGNORED. The Forums are there for a reason!
Thanks-


  userbar_eis_500.gif

If I have helped you, consider making a donation to help me continue the fight against Malware! Just click btn_donate_LG.gif


#7 Madmah

Madmah
  • Topic Starter

  • Members
  • 40 posts
  • OFFLINE
  •  
  • Local time:10:42 PM

Posted 07 January 2013 - 11:14 PM

Dear Fireman,

I was out of town for a short while. Regret for delay in replying.

Am not much confident in running Combo Fix after reading the warning. Since its my office computer, i dont want to take risk.

Let me know if any alternate suggestion is there.

Thank You

Regards,

Madmah

#8 fireman4it

fireman4it

    Bleepin' Fireman


  • Malware Response Team
  • 13,505 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Greenup, Ill USA
  • Local time:10:42 PM

Posted 08 January 2013 - 01:46 PM

Hello,

The warning is there not to use it at your own risk. This is done because you could run it delete any back ups by accident then we would never be able to fix it. That is why the warning is there. I am a trained expert in Combofix. The owner and maker of Combofix is also a member here at BC and I can get a hold of him if something out of the ordinary would happen. Even though this rarely occurs.

" Extinguishing Malware from the world"

The Virus, Trojan, Spyware, and Malware Removal forum is very busy. If I'm helping you and I've not posted back within 24 hrs., send a PM with your topic link. Thank you.

ALL OTHER HELP REQUESTS VIA THE PM SYSTEM WILL BE IGNORED. The Forums are there for a reason!
Thanks-


  userbar_eis_500.gif

If I have helped you, consider making a donation to help me continue the fight against Malware! Just click btn_donate_LG.gif


#9 Madmah

Madmah
  • Topic Starter

  • Members
  • 40 posts
  • OFFLINE
  •  
  • Local time:10:42 PM

Posted 09 January 2013 - 02:01 AM

Dear Fireman,

Thank you for your kind email.
You gave me confidence to run the combofix. Please tell me how to turn off my Kaspersky, when Combo is running so that its function is not interupted. Or should i run in safe mode without turning off Kaspersky.

Thank you so much for understanding.

Regards,

Madmah

#10 fireman4it

fireman4it

    Bleepin' Fireman


  • Malware Response Team
  • 13,505 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Greenup, Ill USA
  • Local time:10:42 PM

Posted 09 January 2013 - 01:30 PM

My link

Edited by fireman4it, 09 January 2013 - 01:32 PM.

" Extinguishing Malware from the world"

The Virus, Trojan, Spyware, and Malware Removal forum is very busy. If I'm helping you and I've not posted back within 24 hrs., send a PM with your topic link. Thank you.

ALL OTHER HELP REQUESTS VIA THE PM SYSTEM WILL BE IGNORED. The Forums are there for a reason!
Thanks-


  userbar_eis_500.gif

If I have helped you, consider making a donation to help me continue the fight against Malware! Just click btn_donate_LG.gif


#11 Madmah

Madmah
  • Topic Starter

  • Members
  • 40 posts
  • OFFLINE
  •  
  • Local time:10:42 PM

Posted 10 January 2013 - 12:05 AM

Dear Fireman,

You made out my day.. Thank you so much... Thank you so much.. you gave me the confidence to run combo fix. I was staring at the monitor until the scan got over. After the system reboot, i checked my kaspersky, the warning went away and it said " Database are uptodate, NO active threats" . Thank you so so much. :clapping:

Please check my below combo report and tell me what was the issue..

ComboFix 13-01-08.01 - login 01/10/2013 10:20:24.1.4 - x86
Microsoft Windows XP Professional 5.1.2600.2.1252.1.1033.18.3253.2643 [GMT 5.5:30]
Running from: c:\documents and settings\login\Desktop\ComboFix.exe
AV: Kaspersky Internet Security *Disabled/Updated* {2C4D4BC6-0793-4956-A9F9-E252435469C0}
FW: Kaspersky Internet Security *Disabled* {2C4D4BC6-0793-4956-A9F9-E252435469C0}
.
.
((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.
.
c:\documents and settings\All Users\Application Data\TEMP
c:\documents and settings\All Users\Application Data\TEMP\{1FBF6C24-C1FD-4101-A42B-0C564F9E8E79}\PostBuild.exe
c:\documents and settings\All Users\Application Data\TEMP\{40BF1E83-20EB-11D8-97C5-0009C5020658}\PostBuild.exe
c:\documents and settings\All Users\Application Data\TEMP\{5DB1DF0C-AABC-4362-8A6D-CEFDFB036E41}\PostBuild.exe
c:\documents and settings\All Users\Start Menu\Programs\Startup\ESET-phase2.exe
c:\documents and settings\login\Application Data\A11b677LMF.txt
c:\documents and settings\login\Application Data\JnDh7he71E.txt
c:\documents and settings\login\Application Data\PropMgrAsync
c:\documents and settings\login\Application Data\PropMgrAsync\PropMgrAsync.cfg
c:\documents and settings\login\Application Data\PropMgrAsync\PropMgrAsync.log
c:\windows\system\WINSPOOL.DRV
c:\windows\system32\msvcrt2.dll
c:\windows\wininit.ini
.
Infected copy of c:\windows\system32\msgsvc.dll was found and disinfected
Restored copy from - c:\system volume information\_restore{07CFF24B-C89C-4E54-85CB-57B71F8F439E}\RP96\A0131739.dll
.
.
((((((((((((((((((((((((( Files Created from 2012-12-10 to 2013-01-10 )))))))))))))))))))))))))))))))
.
.
.
.
.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2013-01-09 07:27 . 2012-09-15 03:43 697864 ----a-w- c:\windows\system32\FlashPlayerApp.exe
2013-01-09 07:27 . 2011-06-17 07:14 74248 ----a-w- c:\windows\system32\FlashPlayerCPLApp.cpl
2012-12-14 11:19 . 2012-07-14 05:35 21104 ----a-w- c:\windows\system32\drivers\mbam.sys
2012-12-05 04:28 . 2012-12-05 04:28 262112 ----a-w- c:\program files\mozilla firefox\components\browsercomps.dll
.
.
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"RTHDCPL"="RTHDCPL.EXE" [2010-05-07 19523616]
"IgfxTray"="c:\windows\system32\igfxtray.exe" [2010-06-11 136216]
"HotKeysCmds"="c:\windows\system32\hkcmd.exe" [2010-06-11 170008]
"Persistence"="c:\windows\system32\igfxpers.exe" [2010-06-11 145432]
"CLMLServer"="c:\program files\CyberLink\Power2Go\CLMLSvc.exe" [2009-12-15 103720]
"UpdateP2GoShortCut"="c:\program files\CyberLink\Power2Go\MUITransfer\MUIStartMenu.exe" [2009-05-19 222504]
"UpdatePSTShortCut"="c:\program files\CyberLink\DVD Suite\MUITransfer\MUIStartMenu.exe" [2010-04-20 222504]
"GrooveMonitor"="c:\program files\Microsoft Office\Office12\GrooveMonitor.exe" [2006-10-26 31016]
"TkBellExe"="c:\program files\Common Files\Real\Update_OB\realsched.exe" [2011-03-23 185896]
"AVP"="c:\program files\Kaspersky Lab\Kaspersky Internet Security 2011\avp.exe" [2011-04-30 352976]
"SSBkgdUpdate"="c:\program files\Common Files\Scansoft Shared\SSBkgdUpdate\SSBkgdupdate.exe" [2006-10-25 210472]
"PaperPort PTD"="c:\program files\ScanSoft\PaperPort\pptd40nt.exe" [2007-10-11 29984]
"IndexSearch"="c:\program files\ScanSoft\PaperPort\IndexSearch.exe" [2007-10-11 46368]
"PPort11reminder"="c:\program files\ScanSoft\PaperPort\Ereg\Ereg.exe" [2007-08-31 328992]
"Adobe Reader Speed Launcher"="c:\program files\Adobe\Reader 9.0\Reader\Reader_sl.exe" [2012-07-31 38872]
"Adobe ARM"="c:\program files\Common Files\Adobe\ARM\1.0\AdobeARM.exe" [2012-07-11 919008]
"APSDaemon"="c:\program files\Common Files\Apple\Apple Application Support\APSDaemon.exe" [2012-02-20 59240]
"QuickTime Task"="c:\program files\QuickTime\qttask.exe" [2012-04-18 421888]
.
c:\documents and settings\login\Start Menu\Programs\Startup\
OneNote 2007 Screen Clipper and Launcher.lnk - c:\program files\Microsoft Office\Office12\ONENOTEM.EXE [2006-10-26 98632]
WordWeb.lnk - c:\program files\WordWeb\wweb32.exe [2011-3-23 44384]
.
[hkey_local_machine\software\microsoft\windows\currentversion\explorer\ShellExecuteHooks]
"{5AE067D3-9AFB-48E0-853A-EBB7F4A000DA}"= "c:\program files\SUPERAntiSpyware\SASSEH.DLL" [2011-07-19 113024]
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\!SASWinLogon]
2011-05-04 17:54 551296 ----a-w- c:\program files\SUPERAntiSpyware\SASWINLO.DLL
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\!SASCORE]
@=""
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\Wdf01000.sys]
@="Driver"
.
[HKEY_LOCAL_MACHINE\software\microsoft\security center]
"AntiVirusOverride"=dword:00000001
.
[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\KasperskyAntiVirus]
"DisableMonitoring"=dword:00000001
.
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=
"c:\\Program Files\\Microsoft Office\\Office12\\OUTLOOK.EXE"=
"c:\\Program Files\\Microsoft Office\\Office12\\GROOVE.EXE"=
"c:\\Program Files\\Microsoft Office\\Office12\\ONENOTE.EXE"=
"c:\\WINDOWS\\system32\\CNAB4RPK.EXE"=
"c:\\Program Files\\Common Files\\Apple\\Apple Application Support\\WebKit2WebProcess.exe"=
.
R1 kl2;kl2;c:\windows\system32\drivers\kl2.sys [6/9/2010 5:43 PM 11352]
R1 SASDIFSV;SASDIFSV;c:\program files\SUPERAntiSpyware\sasdifsv.sys [7/22/2011 9:57 PM 12880]
R1 SASKUTIL;SASKUTIL;c:\program files\SUPERAntiSpyware\SASKUTIL.SYS [7/13/2011 3:25 AM 67664]
R2 !SASCORE;SAS Core Service;c:\program files\SUPERAntiSpyware\SASCore.exe [8/12/2011 5:08 AM 116608]
R2 DCService.exe;DCService.exe;c:\documents and settings\All Users\Application Data\DatacardService\DCService.exe [5/8/2010 5:18 PM 229376]
R2 UNS;Intel® Management & Security Application User Notification Service;c:\program files\Intel\Intel® Management Engine Components\UNS\UNS.exe [3/23/2011 6:35 PM 2320920]
R3 e1kexpress;Intel® PRO/1000 PCI Express Network Connection Driver K;c:\windows\system32\drivers\e1k5132.sys [3/23/2011 6:34 PM 168616]
R3 huawei_enumerator;huawei_enumerator;c:\windows\system32\drivers\ew_jubusenum.sys [4/19/2012 9:26 PM 63616]
R3 IntcDAud;Intel® Display Audio;c:\windows\system32\drivers\IntcDAud.sys [3/23/2011 6:39 PM 235520]
R3 klim5;Kaspersky Anti-Virus NDIS Filter;c:\windows\system32\drivers\klim5.sys [5/7/2010 12:06 PM 32856]
R3 klmouflt;Kaspersky Lab KLMOUFLT;c:\windows\system32\drivers\klmouflt.sys [11/2/2009 8:27 PM 19472]
S1 SBRE;SBRE;\??\c:\windows\system32\drivers\SBREdrv.sys --> c:\windows\system32\drivers\SBREdrv.sys [?]
S2 arowonriiw;arowonriiw;"c:\docume~1\login\LOCALS~1\Temp\DAT347.tmp.exe" --SERVICE --> c:\docume~1\login\LOCALS~1\Temp\DAT347.tmp.exe [?]
S2 auffjuttqdaoyo;auffjuttqdaoyo;"c:\docume~1\login\LOCALS~1\Temp\DAT1B6.tmp.exe" --SERVICE --> c:\docume~1\login\LOCALS~1\Temp\DAT1B6.tmp.exe [?]
S2 axejgnkl;axejgnkl;"c:\docume~1\login\LOCALS~1\Temp\DAT3C7.tmp.exe" --SERVICE --> c:\docume~1\login\LOCALS~1\Temp\DAT3C7.tmp.exe [?]
S2 ayoou05eeutn;C-DillaSrv;c:\windows\system32\kogiga.exe --> c:\windows\system32\kogiga.exe [?]
S2 biuaheplqfoeu;biuaheplqfoeu;"c:\docume~1\login\LOCALS~1\Temp\DAT70.tmp.exe" --SERVICE --> c:\docume~1\login\LOCALS~1\Temp\DAT70.tmp.exe [?]
S2 bprsqtyuvnn;bprsqtyuvnn;"c:\docume~1\login\LOCALS~1\Temp\DATB1.tmp.exe" --SERVICE --> c:\docume~1\login\LOCALS~1\Temp\DATB1.tmp.exe [?]
S2 bpwcqvruzdbr;bpwcqvruzdbr;"c:\docume~1\login\LOCALS~1\Temp\DAT579.tmp.exe" --SERVICE --> c:\docume~1\login\LOCALS~1\Temp\DAT579.tmp.exe [?]
S2 cmyxdjtg;cmyxdjtg;"c:\docume~1\login\LOCALS~1\Temp\DAT3A5.tmp.exe" --SERVICE --> c:\docume~1\login\LOCALS~1\Temp\DAT3A5.tmp.exe [?]
S2 ealqvrouxwr;ealqvrouxwr;"c:\docume~1\login\LOCALS~1\Temp\DAT240.tmp.exe" --SERVICE --> c:\docume~1\login\LOCALS~1\Temp\DAT240.tmp.exe [?]
S2 ekocbxmdedsgjxm;ekocbxmdedsgjxm;"c:\docume~1\login\LOCALS~1\Temp\DAT5C5.tmp.exe" --SERVICE --> c:\docume~1\login\LOCALS~1\Temp\DAT5C5.tmp.exe [?]
S2 fdgsvstls;fdgsvstls;"c:\docume~1\login\LOCALS~1\Temp\DAT44A.tmp.exe" --SERVICE --> c:\docume~1\login\LOCALS~1\Temp\DAT44A.tmp.exe [?]
S2 ffcrdzggyir;ffcrdzggyir;"c:\docume~1\login\LOCALS~1\Temp\DAT187.tmp.exe" --SERVICE --> c:\docume~1\login\LOCALS~1\Temp\DAT187.tmp.exe [?]
S2 ffxhjhwzwvell;ffxhjhwzwvell;"c:\docume~1\login\LOCALS~1\Temp\DAT2B9.tmp.exe" --SERVICE --> c:\docume~1\login\LOCALS~1\Temp\DAT2B9.tmp.exe [?]
S2 fuwurgueij;fuwurgueij;"c:\docume~1\login\LOCALS~1\Temp\DATEE.tmp.exe" --SERVICE --> c:\docume~1\login\LOCALS~1\Temp\DATEE.tmp.exe [?]
S2 giarohqralcjum;giarohqralcjum;"c:\docume~1\login\LOCALS~1\Temp\DATE9.tmp.exe" --SERVICE --> c:\docume~1\login\LOCALS~1\Temp\DATE9.tmp.exe [?]
S2 gsrakuclyntoqn;gsrakuclyntoqn;"c:\docume~1\login\LOCALS~1\Temp\DAT1ED.tmp.exe" --SERVICE --> c:\docume~1\login\LOCALS~1\Temp\DAT1ED.tmp.exe [?]
S2 hgysozsupk;hgysozsupk;"c:\docume~1\login\LOCALS~1\Temp\DAT55A.tmp.exe" --SERVICE --> c:\docume~1\login\LOCALS~1\Temp\DAT55A.tmp.exe [?]
S2 hqnxnsutk;hqnxnsutk;"c:\docume~1\login\LOCALS~1\Temp\DAT20D.tmp.exe" --SERVICE --> c:\docume~1\login\LOCALS~1\Temp\DAT20D.tmp.exe [?]
S2 ikivllnwtceanv;ikivllnwtceanv;"c:\docume~1\login\LOCALS~1\Temp\DAT468.tmp.exe" --SERVICE --> c:\docume~1\login\LOCALS~1\Temp\DAT468.tmp.exe [?]
S2 jfcbchoottt;jfcbchoottt;"c:\docume~1\login\LOCALS~1\Temp\DAT30.tmp.exe" --SERVICE --> c:\docume~1\login\LOCALS~1\Temp\DAT30.tmp.exe [?]
S2 jftzwvcvdcdirg;jftzwvcvdcdirg;"c:\docume~1\login\LOCALS~1\Temp\DAT45E.tmp.exe" --SERVICE --> c:\docume~1\login\LOCALS~1\Temp\DAT45E.tmp.exe [?]
S2 jgapervgrz;jgapervgrz;"c:\docume~1\login\LOCALS~1\Temp\DAT41E.tmp.exe" --SERVICE --> c:\docume~1\login\LOCALS~1\Temp\DAT41E.tmp.exe [?]
S2 kslrswht;kslrswht;"c:\docume~1\login\LOCALS~1\Temp\DAT47B.tmp.exe" --SERVICE --> c:\docume~1\login\LOCALS~1\Temp\DAT47B.tmp.exe [?]
S2 kvwlogdim;kvwlogdim;"c:\docume~1\login\LOCALS~1\Temp\DAT122.tmp.exe" --SERVICE --> c:\docume~1\login\LOCALS~1\Temp\DAT122.tmp.exe [?]
S2 lkkppdxfluvyx;lkkppdxfluvyx;"c:\docume~1\login\LOCALS~1\Temp\DAT3FB.tmp.exe" --SERVICE --> c:\docume~1\login\LOCALS~1\Temp\DAT3FB.tmp.exe [?]
S2 lnfvikkjqc;lnfvikkjqc;"c:\docume~1\login\LOCALS~1\Temp\DAT22.tmp.exe" --SERVICE --> c:\docume~1\login\LOCALS~1\Temp\DAT22.tmp.exe [?]
S2 lvnfdblwva;lvnfdblwva;"c:\docume~1\login\LOCALS~1\Temp\DAT13D.tmp.exe" --SERVICE --> c:\docume~1\login\LOCALS~1\Temp\DAT13D.tmp.exe [?]
S2 muzoekon;muzoekon;"c:\docume~1\login\LOCALS~1\Temp\DATCE.tmp.exe" --SERVICE --> c:\docume~1\login\LOCALS~1\Temp\DATCE.tmp.exe [?]
S2 ovyniurxcd;ovyniurxcd;"c:\docume~1\login\LOCALS~1\Temp\DAT258.tmp.exe" --SERVICE --> c:\docume~1\login\LOCALS~1\Temp\DAT258.tmp.exe [?]
S2 qbbolirxdkuc;qbbolirxdkuc;"c:\docume~1\login\LOCALS~1\Temp\DAT637.tmp.exe" --SERVICE --> c:\docume~1\login\LOCALS~1\Temp\DAT637.tmp.exe [?]
S2 rofmfssttpamio;rofmfssttpamio;"c:\docume~1\login\LOCALS~1\Temp\DATCC.tmp.exe" --SERVICE --> c:\docume~1\login\LOCALS~1\Temp\DATCC.tmp.exe [?]
S2 rsrvdpnx;rsrvdpnx;"c:\docume~1\login\LOCALS~1\Temp\DATFE.tmp.exe" --SERVICE --> c:\docume~1\login\LOCALS~1\Temp\DATFE.tmp.exe [?]
S2 rzkuizwetyne;rzkuizwetyne;"c:\docume~1\login\LOCALS~1\Temp\DAT71.tmp.exe" --SERVICE --> c:\docume~1\login\LOCALS~1\Temp\DAT71.tmp.exe [?]
S2 sglksyuffihcqij;sglksyuffihcqij;"c:\docume~1\login\LOCALS~1\Temp\DAT164.tmp.exe" --SERVICE --> c:\docume~1\login\LOCALS~1\Temp\DAT164.tmp.exe [?]
S2 vikbgkozuhcdtdu;vikbgkozuhcdtdu;"c:\docume~1\login\LOCALS~1\Temp\DATB2.tmp.exe" --SERVICE --> c:\docume~1\login\LOCALS~1\Temp\DATB2.tmp.exe [?]
S2 vnbzugtzfygahnv;vnbzugtzfygahnv;"c:\docume~1\login\LOCALS~1\Temp\DAT166.tmp.exe" --SERVICE --> c:\docume~1\login\LOCALS~1\Temp\DAT166.tmp.exe [?]
S2 vpiykajr;vpiykajr;"c:\docume~1\login\LOCALS~1\Temp\DAT1C8.tmp.exe" --SERVICE --> c:\docume~1\login\LOCALS~1\Temp\DAT1C8.tmp.exe [?]
S2 wajsnoakussetj;wajsnoakussetj;"c:\docume~1\login\LOCALS~1\Temp\DATA1.tmp.exe" --SERVICE --> c:\docume~1\login\LOCALS~1\Temp\DATA1.tmp.exe [?]
S2 winlpedgenpjc;winlpedgenpjc;"c:\docume~1\login\LOCALS~1\Temp\DAT5D9.tmp.exe" --SERVICE --> c:\docume~1\login\LOCALS~1\Temp\DAT5D9.tmp.exe [?]
S2 wldtxahe;wldtxahe;"c:\docume~1\login\LOCALS~1\Temp\DAT8BC.tmp.exe" --SERVICE --> c:\docume~1\login\LOCALS~1\Temp\DAT8BC.tmp.exe [?]
S2 xrmmgmfzlt;xrmmgmfzlt;"c:\docume~1\login\LOCALS~1\Temp\DATB6.tmp.exe" --SERVICE --> c:\docume~1\login\LOCALS~1\Temp\DATB6.tmp.exe [?]
S2 xzixaxmah;xzixaxmah;"c:\docume~1\login\LOCALS~1\Temp\DAT89.tmp.exe" --SERVICE --> c:\docume~1\login\LOCALS~1\Temp\DAT89.tmp.exe [?]
S2 ynkjladtrvdaalo;ynkjladtrvdaalo;"c:\docume~1\login\LOCALS~1\Temp\DAT366.tmp.exe" --SERVICE --> c:\docume~1\login\LOCALS~1\Temp\DAT366.tmp.exe [?]
S2 zffelxtmybjaqvx;zffelxtmybjaqvx;"c:\docume~1\login\LOCALS~1\Temp\DAT2A7.tmp.exe" --SERVICE --> c:\docume~1\login\LOCALS~1\Temp\DAT2A7.tmp.exe [?]
S2 zrdriiizg;zrdriiizg;"c:\docume~1\login\LOCALS~1\Temp\DAT5FE.tmp.exe" --SERVICE --> c:\docume~1\login\LOCALS~1\Temp\DAT5FE.tmp.exe [?]
S3 Ambfilt;Ambfilt;c:\windows\system32\drivers\Ambfilt.sys [3/23/2011 6:36 PM 1691480]
S3 ew_hwusbdev;Huawei MobileBroadband USB PNP Device;c:\windows\system32\drivers\ew_hwusbdev.sys [4/19/2012 9:26 PM 101504]
.
Contents of the 'Scheduled Tasks' folder
.
2013-01-10 c:\windows\Tasks\Adobe Flash Player Updater.job
- c:\windows\system32\Macromed\Flash\FlashPlayerUpdateService.exe [2012-09-15 07:27]
.
2013-01-09 c:\windows\Tasks\GoogleUpdateTaskUserS-1-5-21-1292428093-1123561945-839522115-1004Core.job
- c:\documents and settings\login\Local Settings\Application Data\Google\Update\GoogleUpdate.exe [2011-03-23 13:34]
.
2013-01-10 c:\windows\Tasks\GoogleUpdateTaskUserS-1-5-21-1292428093-1123561945-839522115-1004UA.job
- c:\documents and settings\login\Local Settings\Application Data\Google\Update\GoogleUpdate.exe [2011-03-23 13:34]
.
2013-01-08 c:\windows\Tasks\ReclaimerUpdateFiles_login.job
- c:\documents and settings\login\Application Data\Real\Update\UpgradeHelper\RealPlayer\10.30\agent\rnupgagent.exe [2012-12-20 11:34]
.
2013-01-07 c:\windows\Tasks\ReclaimerUpdateXML_login.job
- c:\documents and settings\login\Application Data\Real\Update\UpgradeHelper\RealPlayer\10.30\agent\rnupgagent.exe [2012-12-20 11:34]
.
2013-01-10 c:\windows\Tasks\RNUpgradeHelperLogonPrompt_login.job
- c:\documents and settings\login\Application Data\Real\Update\UpgradeHelper\RealPlayer\10.30\agent\rnupgagent.exe [2012-12-20 11:34]
.
.
------- Supplementary Scan -------
.
uStart Page = hxxp://isearch.babylon.com/?affID=117380&tt=4712_4&babsrc=HP_ss&mntrId=a8728f43000000000000e069952efbd9
uDefault_Search_URL = hxxp://www.google.com/ie
mStart Page = hxxp://home.allgameshome.com/
uInternet Connection Wizard,ShellNext = iexplore
uSearchAssistant = hxxp://www.google.com/ie
uSearchURL,(Default) = hxxp://www.google.com/search?q=%s
IE: Add to Anti-Banner - c:\program files\Kaspersky Lab\Kaspersky Internet Security 2011\ie_banner_deny.htm
IE: Add to Google Photos Screensa&ver - c:\windows\system32\GPhotos.scr/200
IE: Download with &Media Finder - c:\program files\Media Finder\hook.html
IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~2\Office12\EXCEL.EXE/3000
TCP: Interfaces\{3DB86AAA-DBF5-4CF8-981B-B6F79E33540A}: NameServer = 218.248.255.147,218.248.255.146
FF - ProfilePath - c:\documents and settings\login\Application Data\Mozilla\Firefox\Profiles\pbl6l24x.default-1353903428484\
FF - prefs.js: browser.startup.homepage - www.google.com
FF - ExtSQL: 2012-11-25 14:46; gencrawler@some.com; c:\documents and settings\login\Application Data\Mozilla\Extensions\{ec8030f7-c20a-464f-9b0e-13a3a9e97384}\gencrawler@some.com
.
- - - - ORPHANS REMOVED - - - -
.
HKCU-Run-Media Finder - c:\program files\Media Finder\Media Finder.exe
SafeBoot-50604896.sys
.
.
.
**************************************************************************
.
catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2013-01-10 10:26
Windows 5.1.2600 Service Pack 2 NTFS
.
scanning hidden processes ...
.
scanning hidden autostart entries ...
.
scanning hidden files ...
.
scan completed successfully
hidden files: 0
.
**************************************************************************
.
--------------------- LOCKED REGISTRY KEYS ---------------------
.
[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}]
@Denied: (A 2) (Everyone)
@="FlashBroker"
"LocalizedString"="@c:\\WINDOWS\\system32\\Macromed\\Flash\\FlashUtil32_11_5_502_146_ActiveX.exe,-101"
.
[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\Elevation]
"Enabled"=dword:00000001
.
[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\LocalServer32]
@="c:\\WINDOWS\\system32\\Macromed\\Flash\\FlashUtil32_11_5_502_146_ActiveX.exe"
.
[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\TypeLib]
@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"
.
[HKEY_LOCAL_MACHINE\software\Classes\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}]
@Denied: (A 2) (Everyone)
@="IFlashBroker5"
.
[HKEY_LOCAL_MACHINE\software\Classes\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}\ProxyStubClsid32]
@="{00020424-0000-0000-C000-000000000046}"
.
[HKEY_LOCAL_MACHINE\software\Classes\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}\TypeLib]
@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"
"Version"="1.0"
.
--------------------- DLLs Loaded Under Running Processes ---------------------
.
- - - - - - - > 'winlogon.exe'(1120)
c:\program files\SUPERAntiSpyware\SASWINLO.DLL
.
------------------------ Other Running Processes ------------------------
.
c:\program files\Intel\Intel® Management Engine Components\LMS\LMS.exe
c:\windows\RTHDCPL.EXE
c:\windows\system32\CNAB4RPK.EXE
.
**************************************************************************
.
Completion time: 2013-01-10 10:28:39 - machine was rebooted
ComboFix-quarantined-files.txt 2013-01-10 04:58
.
Pre-Run: 36,391,768,064 bytes free
Post-Run: 37,126,934,528 bytes free
.
WindowsXP-KB310994-SP2-Pro-BootDisk-ENU.exe
[boot loader]
timeout=2
default=multi(0)disk(0)rdisk(0)partition(1)\WINDOWS
[operating systems]
c:\cmdcons\BOOTSECT.DAT="Microsoft Windows Recovery Console" /cmdcons
UnsupportedDebug="do not select this" /debug
multi(0)disk(0)rdisk(0)partition(1)\WINDOWS="Microsoft Windows XP Professional" /noexecute=optin /fastdetect
.
- - End Of File - - DB65DAFE620BC135062B008BEC4949D7


Thank you once again whole heartedly.. God bless your family and you...

Regards,

Madmah

#12 fireman4it

fireman4it

    Bleepin' Fireman


  • Malware Response Team
  • 13,505 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Greenup, Ill USA
  • Local time:10:42 PM

Posted 10 January 2013 - 11:28 AM

Hello,

I'm glad to hear things are better. However we still have some work to do before we can declare your machine clean.

1.
We need to run a CFScript.

1. Close any open browsers.

2. Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.

3. Open notepad and copy/paste the text in the codebox below into it:

File::
c:\windows\system32\kogiga.exe

DDS::
uStart Page = hxxp://isearch.babylon.com/?affID=117380&tt=4712_4&babsrc=HP_ss&mntrId=a8728f43000000000000e069952efbd9
mStart Page = hxxp://home.allgameshome.com/
uInternet Connection Wizard,ShellNext = iexplore
IE: Download with &Media Finder - c:\program files\Media Finder\hook.html

Firefox::
FF - ProfilePath - c:\documents and settings\login\Application Data\Mozilla\Firefox\Profiles\pbl6l24x.default-1353903428484\
FF - ExtSQL: 2012-11-25 14:46; gencrawler@some.com; c:\documents and settings\login\Application Data\Mozilla\Extensions\{ec8030f7-c20a-464f-9b0e-13a3a9e97384}\gencrawler@some.com

Drivers::
arowonriiw
auffjuttqdaoyo
axejgnkl
ayoou05eeutn
biuaheplqfoeu
bprsqtyuvnn 
bpwcqvruzdbr
cmyxdjtg
ealqvrouxwr
ekocbxmdedsgjxm
fdgsvstls
ffcrdzggyir
ffxhjhwzwvell
fuwurgueij
giarohqralcjum
gsrakuclyntoqn
hgysozsupk
hqnxnsutk
ikivllnwtceanv
jfcbchoottt
jftzwvcvdcdirg
jgapervgrz
kslrswht
kvwlogdim
lkkppdxfluvyx
lnfvikkjqc
lvnfdblwva
muzoekon
ovyniurxcd
qbbolirxdkuc
rofmfssttpamio
rsrvdpnx
rzkuizwetyne
sglksyuffihcqij
vikbgkozuhcdtdu
vnbzugtzfygahnv
vpiykajr
wajsnoakussetj
winlpedgenpjc
wldtxahe
xrmmgmfzlt
xzixaxmah
ynkjladtrvdaalo
zffelxtmybjaqvx
zrdriiizg
SBRE

Registry::
[HKEY_LOCAL_MACHINE\software\microsoft\security center]
"AntiVirusOverride"=-
[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\KasperskyAntiVirus]
"DisableMonitoring"=-

Reglockdel::
[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}]
[HKEY_LOCAL_MACHINE\software\Classes\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}]



Save this as CFScript.txt, in the same location as ComboFix.exe


Posted Image

Refering to the picture above, drag CFScript into ComboFix.exe

When finished, it shall produce a log for you at C:\ComboFix.txt which I will require in your next reply.


2.
Please download Malwarebytes Anti-Malware and save it to your desktop.
  • Important!! When you save the mbam-setup file, rename it to something random (such as 123abc.exe) before beginning the download.
Malwarebytes may "make changes to your registry" as part of its disinfection routine. If using other security programs that detect registry changes (ie Spybot's Teatimer), they may interfere or alert you. Temporarily disable such programs or permit them to allow the changes.

  • Make sure you are connected to the Internet and double-click on the renamed file to install the application.
    For instructions with screenshots, please refer to this Guide.
  • When the installation begins, follow the prompts and do not make any changes to default settings.
  • Malwarebytes will automatically start and you will be asked to update the program before performing a scan.
  • If an update is found, the program will automatically update itself. Press the OK button and continue.
  • If you encounter any problems while downloading the definition updates, manually download them from here and just double-click on mbam-rules.exe to install.
  • Under the Scanner tab, make sure the "Perform Quick Scan" option is selected.
  • Click on the Scan button.
  • When finished, a message box will say "The scan completed successfully. Click 'Show Results' to display all objects found".
  • Click OK to close the message box, then click the Show Results button to see a list of any malware that was found.
  • Make sure that everything is checked and then click Remove Selected.
  • When removal is completed, a log report will open in Notepad.
  • The log is automatically saved and can be viewed by clicking the Logs tab.
  • Copy and paste the contents of that report in your next reply. Be sure to post the complete log to include the top portion which shows the database version and your operating system.
  • Exit Malwarebytes when done.
Note: If Malwarebytes encounters a file that is difficult to remove, you will be asked to reboot your computer so it can proceed with the disinfection process. If asked to restart the computer, please do so immediately. Failure to reboot normally will prevent Malwarebytes from removing all the malware.

3.
Download AdwCleaner
  • Double click on AdwCleaner.exe to run the tool.
    ***Note: Windows Vista and Windows 7 users:
    Right click in the adwCleaner.exe and select
    Posted Image
  • Click the Search button.
  • A logfile will automatically open after the scan has finished.
  • Please post the content of that logfile in your next reply.
  • Or you can find the logfile at C:\AdwCleaner[R1].txt.

Things to include in your next reply::
Combofix.txt
MBAM log
AdwCleaner log
How is your machine running now?

" Extinguishing Malware from the world"

The Virus, Trojan, Spyware, and Malware Removal forum is very busy. If I'm helping you and I've not posted back within 24 hrs., send a PM with your topic link. Thank you.

ALL OTHER HELP REQUESTS VIA THE PM SYSTEM WILL BE IGNORED. The Forums are there for a reason!
Thanks-


  userbar_eis_500.gif

If I have helped you, consider making a donation to help me continue the fight against Malware! Just click btn_donate_LG.gif


#13 Madmah

Madmah
  • Topic Starter

  • Members
  • 40 posts
  • OFFLINE
  •  
  • Local time:10:42 PM

Posted 12 January 2013 - 05:35 AM

Dear Mr. fireman,

Greetings!

We have a local Holiday (Pongal) at our place. Hence am out of town, will be back by Thursday. Shall sent you the reports after that.

Thank You

Regards,

Madmah

#14 fireman4it

fireman4it

    Bleepin' Fireman


  • Malware Response Team
  • 13,505 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Greenup, Ill USA
  • Local time:10:42 PM

Posted 18 January 2013 - 12:59 PM

Hello.

Are you still there?

If you are please follow the instructions in my previous post.

If you still need help, follow the instructions I have given in my response. If you have since had your problem solved, we would appreciate you letting us know so we can close the topic.

Please reply back telling us so. If you don't reply within 3-5 days the topic will need to be closed.

Thanks for understanding :)

With Regards,
fireman4it

" Extinguishing Malware from the world"

The Virus, Trojan, Spyware, and Malware Removal forum is very busy. If I'm helping you and I've not posted back within 24 hrs., send a PM with your topic link. Thank you.

ALL OTHER HELP REQUESTS VIA THE PM SYSTEM WILL BE IGNORED. The Forums are there for a reason!
Thanks-


  userbar_eis_500.gif

If I have helped you, consider making a donation to help me continue the fight against Malware! Just click btn_donate_LG.gif


#15 fireman4it

fireman4it

    Bleepin' Fireman


  • Malware Response Team
  • 13,505 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Greenup, Ill USA
  • Local time:10:42 PM

Posted 20 January 2013 - 11:31 AM

Due to the lack of feedback, this topic is now closed.In the event you still have problems, please send me or any Moderator a Private Message and ask them to reopen this topic within the next 5 days. Please include a link to your topic in the Private Message. Thank you.

" Extinguishing Malware from the world"

The Virus, Trojan, Spyware, and Malware Removal forum is very busy. If I'm helping you and I've not posted back within 24 hrs., send a PM with your topic link. Thank you.

ALL OTHER HELP REQUESTS VIA THE PM SYSTEM WILL BE IGNORED. The Forums are there for a reason!
Thanks-


  userbar_eis_500.gif

If I have helped you, consider making a donation to help me continue the fight against Malware! Just click btn_donate_LG.gif





0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users