Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

internet crime complaint center


  • This topic is locked This topic is locked
25 replies to this topic

#1 jasonTHX

jasonTHX

  • Members
  • 44 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Vermont
  • Local time:08:04 PM

Posted 15 January 2013 - 12:00 AM

I am infected with the "internet crime complaint center" ransomware I guess. I have a Windows XP SP3 PC that is unable to even reboot to safe mode without having the infection show that nasty screen. Normally this PC runs Avira free Antivirus. I have Malwarebytes too and this PC's internt runs through a Cisco router.

I was going to try the: Remove the FBI MoneyPak Ransomware or the Reveton Trojan By Lawrence Abrams and I have searched the forums for help but I am unable to see how to get past the "FBI" screen to begin to try anything.

Help would be appreciated. Thanks in advance.

BC AdBot (Login to Remove)

 


#2 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,773 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:08:04 PM

Posted 15 January 2013 - 11:33 AM

Try this please. You will need a USB drive.

Download http://unetbootin.sourceforge.net/unetbootin-xpud-windows-latest.exe & http://noahdfear.net/downloads/bootable/xPUD/xpud-0.9.2.iso to the desktop of your clean computer
  • Insert your USB drive
  • Press Start > My Computer > right click your USB drive > choose Format > Quick format
  • Double click the unetbootin-xpud-windows-387.exe that you just downloaded
  • Press Run[/b then OK
  • Select the DiskImage option then click the browse button located on the right side of the textbox field.
  • Browse to and select the xpud-0.9.2.iso file you downloaded
  • Verify the correct drive letter is selected for your USB device then click OK
  • It will install a little bootable OS on your USB device
  • Once the files have been written to the device you will be prompted to reboot ~ do not reboot and instead just Exit the UNetbootin interface
  • After it has completed do not choose to reboot the clean computer simply close the installer
  • Next download http://noahdfear.net/downloads/driver.sh to your USB
  • Remove the USB and insert it in the sick computer
  • Boot the Sick computer
  • Press F12 and choose to boot from the USB
  • Follow the prompts
  • A Welcome to xPUD screen will appear
  • Press File
  • Expand mnt
  • sda1,2...usually corresponds to your HDD
  • sdb1 is likely your USB
  • Click on the folder that represents your USB drive (sdb1 ?)
  • Confirm that you see driver.sh that you downloaded there
  • Press Tool at the top
  • Choose Open Terminal
  • Type bash driver.sh
  • Press Enter
  • After it has finished a report will be located on your USB drive named report.txt
  • Remove the USB drive and insert back in your working computer and navigate to report.txt

    Please note - all text entries are case sensitive
Copy and paste the [b]report.txt for my review
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#3 jasonTHX

jasonTHX
  • Topic Starter

  • Members
  • 44 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Vermont
  • Local time:08:04 PM

Posted 15 January 2013 - 01:25 PM

Thanks for the prompt response gringo.

I have run into a couple of issues.
First, I cannot •Double click the unetbootin-xpud-windows-387.exe that you just downloaded •Press Run[/b then OK, I just double click and press run. OK?
Second, •Press F12 and choose to boot from the USB, for me it is F9 to get to the boot menu, F12 does a network boot. OK?

Third, I am able to boot from the USB, get to the Welcome screen and file menu. I do not "see" the USB (sdb1) under the File System/mnt dir. All I see is sda1. It looks like my HDD file system.

So I can't find the driver.sh and use it.

Edited by jasonTHX, 15 January 2013 - 02:55 PM.


#4 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,773 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:08:04 PM

Posted 15 January 2013 - 04:20 PM

Hello


Third, I am able to boot from the USB, get to the Welcome screen and file menu. I do not "see" the USB (sdb1) under the File System/mnt dir. All I see is sda1. It looks like my HDD file system.

you are doing very well!! when you get to this point remove the USB and then put it back in - it will show up
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#5 jasonTHX

jasonTHX
  • Topic Starter

  • Members
  • 44 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Vermont
  • Local time:08:04 PM

Posted 15 January 2013 - 05:10 PM

Excellent, I saw the device removal messages unmounting and such and after a while /mnt/sdb1 mounted. !

here is the report.

Tue Jan 15 16:59:56 UTC 2013
Driver report for /mnt/sda1/WINDOWS/system32/drivers
73709547a3b136de4fcfde3ef78c1b8f PnkBstrK.sys has NO Company Name!

9859c0f6936e723e4892d7141b1327d5 acpiec.sys
Microsoft Corporation

8fd99680a539792a30e97944fdaecf17 acpi.sys
Microsoft Corporation

8bed39e3c35d6a489438b8141717a557 aec.sys
Microsoft Corporation

1e44bc1e83d8fd2305f8d452db109cf9 afd.sys
Microsoft Corporation

d7701d7e72243286cc88c9973d891057 amdk6.sys
Microsoft Corporation

8fce268cdbdd83b23419d1f35f42c7b1 amdk7.sys
Microsoft Corporation

b5b8a80875c1dededa8b02765642c32f arp1394.sys
Microsoft Corporation

b153affac761e7f5fcfa822b9c4e97bc asyncmac.sys
Microsoft Corporation

9f3a2f5aa6875c72bf062c712cfa2674 atapi.sys
Microsoft Corporation

f2bbe37dd1db66789593a11399aa9514 ati2mtag.sys
ATI Technologies

591a9eabb5ef5168e435c2f18b05dd76 AtiHdmi.sys
ATI

924971a182e07463765ef9fa8876f24f AtihdXP3.sys
Advanced Micro Devices

9916c1225104ba14794209cfa8012159 atmarpc.sys
Microsoft Corporation

39a0a59180f19946374275745b21aeba atmepvc.sys
Microsoft Corporation

ae76348a2605fb197fa8ff1d6f547836 atmlane.sys
Microsoft Corporation

e7ef69b38d17ba01f914ae8f66216a38 atmuni.sys
Microsoft Corporation

d9f724aa26c010a217c97606b160ed68 audstub.sys
Microsoft Corporation

d5541f0afb767e85fc412fc609d96a74 avgntflt.sys
Avira Gmb

7d967a682d4694df7fa57d63a2db01fe avipbb.sys
Avira Gmb

53e56450da16a1a7f0d002f511113f67 avkmgr.sys
Avira Gmb

61f8f3126d39a7eb2775fb1505469ee3 bdasup.sys
Microsoft Corporation

da1f27d85e0d1525f6621372e7b685e9 beep.sys
Microsoft Corporation

f934d1b230f84e1d19dd00ac5a7a83ed bridge.sys
Microsoft Corporation

662bfd909447dd9cc15b1a1c366583b4 bthport.sys
Microsoft Corporation

90a673fc8e12a79afbed2576f6a7aaf9 cbidf2k.sys
Microsoft Corporation

fdc06e2ada8c468ebb161624e03976cf ccdecode.sys
Microsoft Corporation

c1b486a7658353d33a10cc15211a873b cdaudio.sys
Microsoft Corporation

c885b02847f5d2fd45a24e219ed93b32 cdfs.sys
Microsoft Corporation

1f4260cc5b42272d71f79e570a27a4fe cdrom.sys
Microsoft Corporation

b562592b7f5759c99e179ca467ecfb4c cinemst2.sys
Ravisent Technologies

fe47dd8fe6d7768ff94ebec6c74b2719 classpnp.sys
Microsoft Corporation

9624293e55ad405415862b504ca95b73 cpqdap01.sys
Compaq Computer Corp

f50d9bdbb25cce075e514dc07472a22f crusoe.sys
Microsoft Corporation

e65e2353a5d74ea89971cb918eeeb2f6 diskdump.sys
Microsoft Corporation

044452051f3e02e7963599fc8f4f3e25 disk.sys
Microsoft Corporation

d992fe1274bde0f84ad826acae022a41 dmboot.sys
Microsoft Corp

7c824cf7bbde77d95c08005717a95f6f dmio.sys
Microsoft Corp

e9317282a63ca4d188c0df5e09c6ac5f dmload.sys
Microsoft Corp

8a208dfcf89792a484e76c40e5f50b45 DMusic.sys
Microsoft Corporation

8f5fcff8e8848afac920905fbd9d33c8 drmkaud.sys
Microsoft Corporation

6cb08593487f5701d2d2254e693eafce drmk.sys
Microsoft Corporation

fe97d0343acfdebdd578fc67cc91fa87 dxapi.sys
Microsoft Corporation

ac7280566a7bb85cb3291f04ddc1198e dxg.sys
Microsoft Corporation

a73f5d6705b1d820c19b18782e176efd dxgthk.sys
Microsoft Corporation

6de32a9123ef60f9d423e9163af0e305 e1e5132.sys
Intel Corporation

38d332a6d56af32635675f132548343e fastfat.sys
Microsoft Corporation

92cdd60b6730b9f50f6a1a0c1f8cdc81 fdc.sys
Microsoft Corporation

d45926117eb9fa946a6af572fbe1caa3 fips.sys
Microsoft Corporation

9d27e7b80bfcdf1cdd9b555862d5e7f0 flpydisk.sys
Microsoft Corporation

b2cf4b0786f8212cb92ed2b50c6db6b0 fltMgr.sys
Microsoft Corporation

3e1e2bd4f39b0e2b7dc4f4d2bcc2779a fs_rec.sys
Microsoft Corporation

455f778ee14368468560bd7cb8c854d0 fsvga.sys
Microsoft Corporation

6ac26732762483366c3969c9e4d2259d ftdisk.sys
Microsoft Corporation

573c7d0a32852b48f3058cfd8026f511 hdaudbus.sys
Windows Server DDK provider

d0fc694df051bc65946db616f20d1168 HECI.sys
Intel Corporation

1af592532532a402ed7c060f6954004f hidclass.sys
Microsoft Corporation

96eccf28fdbf1b2cc12725818a63628d hidparse.sys
Microsoft Corporation

ccf82c5ec8a7326c3066de870c06daf1 hidusb.sys
Microsoft Corporation

f80a415ef82cd06ffaf0d971528ead38 http.sys
Microsoft Corporation

4a0b06aa8943c1e332520f7440c0aa30 i8042prt.sys
Microsoft Corporation

083a052659f5310dd8b6a6cb05edcf8e imapi.sys
Microsoft Corporation

8c953733d8f36eb2133f5bb58808b66b intelppm.sys
Microsoft Corporation

3bb22519a194418d5fec05d800a19ad0 ip6fw.sys
Microsoft Corporation

731f22ba402ee4b62748adaf6363c182 ipfltdrv.sys
Microsoft Corporation

b87ab476dcf76e72010632b5550955f5 ipinip.sys
Microsoft Corporation

cc748ea12c6effde940ee98098bf96bb ipnat.sys
Microsoft Corporation

23c74d75e36e7158768dd63d92789a91 ipsec.sys
Microsoft Corporation

c93c9ff7b04d772627a3646d89f7bf89 irenum.sys
Microsoft Corporation

05a299ec56e52649b1cf2fc52d20f2d7 isapnp.sys
Microsoft Corporation

463c1ec80cd17420a542b7f36a36f128 kbdclass.sys
Microsoft Corporation

9ef487a186dea361aa06913a75b3fa99 kbdhid.sys
Microsoft Corporation

692bcf44383d056aed41b045a323d378 kmixer.sys
Microsoft Corporation

b467646c54cc746128904e1654c750c1 ksecdd.sys
Microsoft Corporation

0753515f78df7f271a5e61c20bcd36a1 ks.sys
Microsoft Corporation

629cabb0421668c9d3d402a3c3d77e14 mbam.sys
Malwarebytes Corporation

d1f8be91ed4ddb671d42e473e3fe71ab mcd.sys
Microsoft Corporation

a7da20ab18a1bdae28b0f349e57da0d1 mf.sys
Microsoft Corporation

4ae068242760a1fb6e1a44bf4e16afa6 mnmdd.sys
Microsoft Corporation

dfcbad3cec1c5f964962ae10e0bcc8e1 modem.sys
Microsoft Corporation

35c9e97194c8cfb8430125f8dbc34d04 mouclass.sys
Microsoft Corporation

b1c303e17fb9d46e87a98e4ba6769685 mouhid.sys
Microsoft Corporation

a80b9a0bad1b73637dbcbba7df72d3fd mountmgr.sys
Microsoft Corporation

83eff7b976ae24f1a496ca94a8a19919 mpe.sys
Microsoft Corporation

70c14f5cca5cf73f8a645c73a01d8726 mqac.sys
Microsoft Corporation

11d42bb6206f33fbb3ba0288d3ef81bd mrxdav.sys
Microsoft Corporation

7d304a5eb4344ebeeab53a2fe3ffb9f0 mrxsmb.sys
Microsoft Corporation

8575d788395c4d6378d98d1ed7cdadb9 msdv.sys
Microsoft Corporation

c941ea2454ba8350021d774daf0f1027 msfs.sys
Microsoft Corporation

0a02c63c8b144bd8c86b103dee7c86a2 msgpc.sys
Microsoft Corporation

d1575e71568f4d9e14ca56b7b0453bf1 MSKSSRV.sys
Microsoft Corporation

325bb26842fc7ccc1fcce2c457317f3e MSPCLOCK.sys
Microsoft Corporation

bad59648ba099da4a17680b39730cb3d MSPQM.sys
Microsoft Corporation

af5f4f3f14a8ea2c26de30f7a1e17136 mssmbios.sys
Microsoft Corporation

d5059366b361f0e1124753447af08aa2 mstee.sys
Microsoft Corporation

de6a75f5c270e756c5508d94b6cf68f5 mup.sys
Microsoft Corporation

ac31b352ce5e92704056d409834beb74 nabtsfec.sys
Microsoft Corporation

abd7629cf2796250f315c1dd0b6cf7a0 ndisip.sys
Microsoft Corporation

1df7f42665c94b825322fae71721130d ndis.sys
Microsoft Corporation

0109c4f3850dfbab279542515386ae22 ndistapi.sys
Microsoft Corporation

f927a4434c5028758a842943ef1a3849 ndisuio.sys
Microsoft Corporation

edc1531a49c80614b2cfda43ca8659ab ndiswan.sys
Microsoft Corporation

9282bd12dfb069d3889eb3fcc1000a9b ndproxy.sys
Microsoft Corporation

5d81cf9a2f1a3a756b66cf684911cdf0 netbios.sys
Microsoft Corporation

74b2b2f5bea5e9a3dc021d685551bd3d netbt.sys
Microsoft Corporation

e9e47cfb2d461fa0fc75b7a74c6383ea nic1394.sys
Microsoft Corporation

be984d604d91c217355cdd3737aad25d nikedrv.sys
Diamond Multimedia Systems

1e421a6bcf2203cc61b821ada9de878b nmnt.sys
Microsoft Corporation

3182d64ae053d6fb034f44b6def8034a npfs.sys
Microsoft Corporation

78a08dd6a8d65e697c18e1db01c5cdca ntfs.sys
Microsoft Corporation

73c1e1f395918bc2c6dd67af7591a3ad null.sys
Microsoft Corporation

b305f3fad35083837ef46a0bbce2fc57 nwlnkflt.sys
Microsoft Corporation

c99b3415198d1aab7227f2c88fd664b9 nwlnkfwd.sys
Microsoft Corporation

8b8b1be2dba4025da6786c645f77f123 nwlnkipx.sys
Microsoft Corporation

56d34a67c05e94e16377c60609741ff8 nwlnknb.sys
Microsoft Corporation

c0bb7d1615e1acbdc99757f6ceaf8cf0 nwlnkspx.sys
Microsoft Corporation

36b9b950e3d2e100970a48d8bad86740 nwrdr.sys
Microsoft Corporation

4bb30ddc53ebc76895e38694580cdfe9 oprghdlr.sys
Microsoft Corporation

c90018bafdc7098619a4a95b046b30f3 p3.sys
Microsoft Corporation

5575faf8f97ce5e713d108c2a58d7c7c parport.sys
Microsoft Corporation

beb3ba25197665d82ec7065b724171c6 partmgr.sys
Microsoft Corporation

70e98b3fd8e963a6a46a2e6247e0bea1 parvdm.sys
Microsoft Corporation

ccf5f451bb1a5a2a522a76e670000ff0 pciide.sys
Microsoft Corporation

52e60f29221d0d1ac16737e8dbf7c3e9 pciidex.sys
Microsoft Corporation

a219903ccf74233761d92bef471a07b1 pci.sys
Microsoft Corporation

9e89ef60e9ee05e3f2eef2da7397f1c1 pcmcia.sys
Microsoft Corporation

73709547a3b136de4fcfde3ef78c1b8f PnkBstrK.sys

e82a496c3961efc6828b508c310ce98f portcls.sys
Microsoft Corporation

a32bebaf723557681bfc6bd93e98bd26 processr.sys
Microsoft Corporation

09298ec810b07e5d582cb3a3f9255424 psched.sys
Microsoft Corporation

80d317bd1c3dbc5d4fe7b1678c60cadd ptilink.sys
Parallel Technologies

fe0d99d6f31e4fad8159f690d68ded9c rasacd.sys
Microsoft Corporation

11b4a627bc9614b885c4969bfa5ff8a6 rasl2tp.sys
Microsoft Corporation

5bc962f2654137c9909c3d4603587dee raspppoe.sys
Microsoft Corporation

efeec01b1d3cf84f16ddd24d9d9d8f99 raspptp.sys
Microsoft Corporation

fdbb1d60066fcfbb7452fd8f9829b242 raspti.sys
Microsoft Corporation

01524cd237223b18adbb48f70083f101 rawwan.sys
Microsoft Corporation

7ad224ad1a1437fe28d89cf22b17780a rdbss.sys
Microsoft Corporation

4912d5b403614ce99c28420f75353332 rdpcdd.sys
Microsoft Corporation

15cabd0f7c00c47c70124907916af3f1 rdpdr.sys
Microsoft Corporation

43af5212bd8fb5ba6eed9754358bd8f7 rdpwd.sys
Microsoft Corporation

f828dd7e1419b6653894a8f97a0094c5 redbook.sys
Microsoft Corporation

a56fe08ec7473e8580a390bb1081cdd7 rio8drv.sys
Diamond Multimedia Systems

0a854df84c77a0be205bfeab2ae4f0ec riodrv.sys
Diamond Multimedia Systems

96f7a9a7bf0c9c0440a967440065d33c rmcast.sys
Microsoft Corporation

601844cbcf617ff8c868130ca5b2039d rndismp.sys
Microsoft Corporation

d8b0b4ade32574b2d9c5cc34dc0dbbe7 rootmdm.sys
Microsoft Corporation

06b0e8d608ab69643b14a1f95f7feab3 RtkHDAud.sys
Realtek Semiconductor

76c465f570e90c28942d52ccb2580a10 scsiport.sys
Microsoft Corporation

8d04819a3ce51b9eb47e5689b44d43c4 sdbus.sys
Microsoft Corporation

90a3935d05b494a5a39d37e71f09a677 secdrv.sys
Macrovision Corporation

0f29512ccd6bead730039fb4bd2c85ce serenum.sys
Microsoft Corporation

cca207a8896d4c6a0c9ce29a4ae411a7 serial.sys
Microsoft Corporation

0fa803c64df0914b41f807ea276bf2a6 sffdisk.sys
Microsoft Corporation

d66d22d76878bf3483a6be30183fb648 sffp_mmc.sys
Microsoft Corporation

c17c331e435ed8737525c86a7557b3ac sffp_sd.sys
Microsoft Corporation

8e6b8c671615d126fdc553d1e2de5562 sfloppy.sys
Microsoft Corporation

1ffc44d6787ec1ea9a2b1440a90fa5c1 slip.sys
Microsoft Corporation

017daecf0ed3aa731313433601ec40fa smclib.sys
Microsoft Corporation

489703624dac94ed943c2abda022a1cd sonydcam.sys
Microsoft Corporation

ab8b92451ecb048a4d1de7c3ffcb4a9f splitter.sys
Microsoft Corporation

76bb022c2fb6902fd5bdd4f78fc13a5d sr.sys
Microsoft Corporation

47ddfc2f003f7f9f0592c6874962a2e7 srv.sys
Microsoft Corporation

a36ee93698802cd899f98bfd553d8185 ssmdrv.sys
Avira Gmb

a9f9fd0212e572b84edb9eb661f6bc04 streamip.sys
Microsoft Corporation

3e5d89099ded9e86e5639f411693218f stream.sys
Microsoft Corporation

3941d127aef12e93addf6fe6ee027e0f swenum.sys
Microsoft Corporation

8ce882bcc6cf8a62f2b2323d95cb3d01 swmidi.sys
Microsoft Corporation

8b83f3ed0f1688b4958f77cd6d2bf290 sysaudio.sys
Microsoft Corporation

fd6093e3decd925f1cffc8a0dd539d72 tape.sys
Microsoft Corporation

4e53bbcc4be37d7a4bd6ef1098c89ff7 tcpip6.sys
Microsoft Corporation

9aefa14bd6b182d61e3119fa5f436d3d tcpip.sys
Microsoft Corporation

0539d5e53587f82d1b4fd74c5be205cf tdi.sys
Microsoft Corporation

6471a66807f5e104e4885f5b67349397 tdpipe.sys
Microsoft Corporation

c56b6d0402371cf3700eb322ef3aaf61 tdtcp.sys
Microsoft Corporation

88155247177638048422893737429d9e termdd.sys
Microsoft Corporation

699450901c5ccfd82357cbc531cedd23 tosdvd.sys
Microsoft Corporation

d74a8ec75305f1d3cfde7c7fc1bd62a9 tsbvcap.sys
Toshiba Corporation

8f861eda21c05857eb8197300a92501c tunmp.sys
Microsoft Corporation

5787b80c2e3c5e2f56c2a233d91fa2c9 udfs.sys
Microsoft Corporation

402ddc88356b1bac0ee3dd1580c76a31 update.sys
Microsoft Corporation

bee793d4a059caea55d6ac20e19b3a8f usb8023.sys
Microsoft Corporation

ce97845d2e3f0d274b8bac1ed07c6149 usbcamd2.sys
Microsoft Corporation

1c1a47b40c23358245aa8d0443b6935e usbcamd.sys
Microsoft Corporation

173f317ce0db8e21322e71b7e60a27e8 usbccgp.sys
Microsoft Corporation

596eb39b50d6ebd9b734dc4ae0544693 usbd.sys
Microsoft Corporation

65dcf09d0e37d4c6b11b5b0b76d470a7 usbehci.sys
Microsoft Corporation

1ab3cdde553b6e064d2e754efe20285c usbhub.sys
Microsoft Corporation

290913dc4f1125e5a82de52579a44c43 usbintel.sys
Microsoft Corporation

791912e524cc2cc6f50b5f2b52d1eb71 usbport.sys
Microsoft Corporation

26496f9dee2d787fc3e61ad54821ffe6 usbuhci.sys
Microsoft Corporation

55e01061c74a8cefff58dc36114a8d3f vdmindvd.sys
Ravisent Technologies

0d3a8fafceacd8b7625cd549757a7df1 vga.sys
Microsoft Corporation

e28726b72c46821a28830e077d39a55b videoprt.sys
Microsoft Corporation

4c8fcb5cc53aab716d810740fe59d025 volsnap.sys
Microsoft Corporation

e20b95baedb550f32dd489265c1da1f6 wanarp.sys
Microsoft Corporation

6768acf64b18196494413695f0c3a00f wdmaud.sys
Microsoft Corporation

c42584fd66ce9e17403aebca199f7bdb wmiacpi.sys
Microsoft Corporation

2f31b7f954bed437f2c75026c65caf7b wmilib.sys
Microsoft Corporation

cf4def1bf66f06964dc0d91844239104 wpdusb.sys
Microsoft Corporation

6abe6e225adb5a751622a9cc3bc19ce8 ws2ifsl.sys
Microsoft Corporation

233cdd1c06942115802eb7ce6669e099 wstcodec.sys
Microsoft Corporation

f15feafffbb3644ccc80c5da584e6311 WudfPf.sys
Microsoft Corporation

28b524262bce6de1f7ef9f510ba3985b WudfRd.sys
Microsoft Corporation


#6 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,773 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:08:04 PM

Posted 15 January 2013 - 05:24 PM

Download http://noahdfear.net/downloads/rst.sh to the USB drive
  • Boot the Sick computer with the USB drive again
  • Press File
  • Expand mnt
  • Expand your USB (sdb1)
  • Confirm that you see rst.sh that you downloaded there
  • Press Tool at the top
  • Choose Open Terminal
  • Type bash rst.sh
  • Press Enter
  • After it has finished a report will be located at sdb1 named enum.log
  • Plug that USB back into the clean computer and open it

Please note: If you have an ethernet connection you can access the internet by way of xPUD (Firefox). You can perform all these steps on your sick computer. When you download the download will reside in the Download folder. It can be found under the File tab also. You can similarly access our thread by way of this OS too so you can send the logs that way.

Please also note - all text entries are case sensitive

Copy and paste the enum.log for my review
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#7 jasonTHX

jasonTHX
  • Topic Starter

  • Members
  • 44 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Vermont
  • Local time:08:04 PM

Posted 15 January 2013 - 05:49 PM

OK, here it is.

19.3M Jan 15 11:57 /mnt/sda1/WINDOWS/system32/config/software
4.8M Jan 15 17:29 /mnt/sda1/WINDOWS/system32/config/system

17.6M Oct 14 18:13 /sda1/~/RP44/~SOFTWARE
18.6M Nov 14 07:33 /sda1/~/RP63/~SOFTWARE
17.4M Oct 12 19:50 /sda1/~/RP38/~SOFTWARE
17.4M Oct 12 19:50 /sda1/~/RP39/~SOFTWARE
17.5M Oct 12 19:58 /sda1/~/RP40/~SOFTWARE
17.5M Oct 13 20:22 /sda1/~/RP41/~SOFTWARE
17.6M Oct 14 17:54 /sda1/~/RP43/~SOFTWARE
17.6M Oct 14 18:18 /sda1/~/RP45/~SOFTWARE
17.6M Oct 17 22:31 /sda1/~/RP46/~SOFTWARE
17.6M Oct 19 01:35 /sda1/~/RP47/~SOFTWARE
17.6M Oct 20 09:59 /sda1/~/RP48/~SOFTWARE
17.7M Oct 21 23:48 /sda1/~/RP49/~SOFTWARE
18.0M Oct 22 03:28 /sda1/~/RP50/~SOFTWARE
18.4M Oct 23 16:15 /sda1/~/RP51/~SOFTWARE
18.4M Oct 26 09:33 /sda1/~/RP52/~SOFTWARE
18.4M Oct 28 19:16 /sda1/~/RP53/~SOFTWARE
18.4M Oct 30 09:47 /sda1/~/RP54/~SOFTWARE
18.4M Oct 31 17:32 /sda1/~/RP55/~SOFTWARE
18.4M Nov 2 10:05 /sda1/~/RP56/~SOFTWARE
18.4M Nov 6 14:04 /sda1/~/RP57/~SOFTWARE
18.4M Nov 6 21:03 /sda1/~/RP58/~SOFTWARE
18.4M Nov 6 21:03 /sda1/~/RP59/~SOFTWARE
18.5M Nov 6 21:23 /sda1/~/RP60/~SOFTWARE
18.5M Nov 8 01:04 /sda1/~/RP61/~SOFTWARE
18.6M Nov 9 17:43 /sda1/~/RP62/~SOFTWARE
18.6M Nov 15 16:57 /sda1/~/RP64/~SOFTWARE
19.0M Nov 20 17:47 /sda1/~/RP65/~SOFTWARE
19.0M Nov 23 21:26 /sda1/~/RP66/~SOFTWARE
19.0M Nov 26 21:13 /sda1/~/RP67/~SOFTWARE
19.0M Nov 28 14:18 /sda1/~/RP68/~SOFTWARE
19.0M Dec 3 23:30 /sda1/~/RP69/~SOFTWARE
19.0M Dec 6 17:31 /sda1/~/RP70/~SOFTWARE
19.0M Dec 7 19:33 /sda1/~/RP71/~SOFTWARE
19.0M Dec 10 10:42 /sda1/~/RP72/~SOFTWARE
19.0M Dec 12 12:45 /sda1/~/RP73/~SOFTWARE
19.0M Dec 13 13:50 /sda1/~/RP74/~SOFTWARE
19.0M Dec 14 11:09 /sda1/~/RP75/~SOFTWARE
19.0M Dec 16 06:01 /sda1/~/RP76/~SOFTWARE
19.0M Dec 19 11:01 /sda1/~/RP77/~SOFTWARE
19.0M Dec 21 00:01 /sda1/~/RP78/~SOFTWARE
19.0M Dec 23 21:42 /sda1/~/RP79/~SOFTWARE
19.0M Dec 25 22:56 /sda1/~/RP80/~SOFTWARE
19.0M Dec 29 11:12 /sda1/~/RP81/~SOFTWARE
19.0M Dec 31 05:42 /sda1/~/RP82/~SOFTWARE
19.0M Dec 31 18:19 /sda1/~/RP83/~SOFTWARE
19.0M Dec 31 22:31 /sda1/~/RP84/~SOFTWARE
19.0M Jan 1 17:06 /sda1/~/RP85/~SOFTWARE
19.0M Jan 3 10:35 /sda1/~/RP86/~SOFTWARE
19.0M Jan 4 01:22 /sda1/~/RP87/~SOFTWARE
19.0M Jan 5 14:42 /sda1/~/RP88/~SOFTWARE
19.0M Jan 9 18:27 /sda1/~/RP89/~SOFTWARE
19.1M Jan 11 12:32 /sda1/~/RP90/~SOFTWARE
19.1M Jan 12 16:48 /sda1/~/RP91/~SOFTWARE
4.5M Oct 14 18:13 /sda1/~/RP44/~SYSTEM
4.6M Nov 14 07:33 /sda1/~/RP63/~SYSTEM
4.5M Oct 12 19:50 /sda1/~/RP38/~SYSTEM
4.5M Oct 12 19:50 /sda1/~/RP39/~SYSTEM
4.5M Oct 12 19:58 /sda1/~/RP40/~SYSTEM
4.5M Oct 13 20:22 /sda1/~/RP41/~SYSTEM
4.5M Oct 14 17:54 /sda1/~/RP43/~SYSTEM
4.5M Oct 14 18:18 /sda1/~/RP45/~SYSTEM
4.5M Oct 17 22:31 /sda1/~/RP46/~SYSTEM
4.5M Oct 19 01:35 /sda1/~/RP47/~SYSTEM
4.5M Oct 20 09:59 /sda1/~/RP48/~SYSTEM
4.7M Oct 21 23:48 /sda1/~/RP49/~SYSTEM
4.6M Oct 22 03:28 /sda1/~/RP50/~SYSTEM
4.6M Oct 23 16:15 /sda1/~/RP51/~SYSTEM
4.6M Oct 26 09:33 /sda1/~/RP52/~SYSTEM
4.6M Oct 28 19:16 /sda1/~/RP53/~SYSTEM
4.6M Oct 30 09:47 /sda1/~/RP54/~SYSTEM
4.6M Oct 31 17:32 /sda1/~/RP55/~SYSTEM
4.6M Nov 2 10:05 /sda1/~/RP56/~SYSTEM
4.6M Nov 6 14:04 /sda1/~/RP57/~SYSTEM
4.6M Nov 6 21:03 /sda1/~/RP58/~SYSTEM
4.6M Nov 6 21:03 /sda1/~/RP59/~SYSTEM
4.6M Nov 6 21:23 /sda1/~/RP60/~SYSTEM
4.6M Nov 8 01:04 /sda1/~/RP61/~SYSTEM
4.6M Nov 9 17:43 /sda1/~/RP62/~SYSTEM
4.6M Nov 15 16:57 /sda1/~/RP64/~SYSTEM
4.6M Nov 20 17:47 /sda1/~/RP65/~SYSTEM
4.6M Nov 23 21:26 /sda1/~/RP66/~SYSTEM
4.6M Nov 26 21:13 /sda1/~/RP67/~SYSTEM
4.6M Nov 28 14:18 /sda1/~/RP68/~SYSTEM
4.6M Dec 3 23:30 /sda1/~/RP69/~SYSTEM
4.6M Dec 6 17:31 /sda1/~/RP70/~SYSTEM
4.6M Dec 7 19:33 /sda1/~/RP71/~SYSTEM
4.6M Dec 10 10:42 /sda1/~/RP72/~SYSTEM
4.6M Dec 12 12:45 /sda1/~/RP73/~SYSTEM
4.6M Dec 13 13:50 /sda1/~/RP74/~SYSTEM
4.6M Dec 14 11:09 /sda1/~/RP75/~SYSTEM
4.6M Dec 16 06:01 /sda1/~/RP76/~SYSTEM
4.6M Dec 19 11:01 /sda1/~/RP77/~SYSTEM
4.6M Dec 21 00:01 /sda1/~/RP78/~SYSTEM
4.6M Dec 23 21:42 /sda1/~/RP79/~SYSTEM
4.6M Dec 25 22:56 /sda1/~/RP80/~SYSTEM
4.6M Dec 29 11:12 /sda1/~/RP81/~SYSTEM
4.6M Dec 31 05:42 /sda1/~/RP82/~SYSTEM
4.6M Dec 31 18:19 /sda1/~/RP83/~SYSTEM
4.6M Dec 31 22:31 /sda1/~/RP84/~SYSTEM
4.6M Jan 1 17:06 /sda1/~/RP85/~SYSTEM
4.6M Jan 3 10:35 /sda1/~/RP86/~SYSTEM
4.6M Jan 4 01:22 /sda1/~/RP87/~SYSTEM
4.6M Jan 5 14:42 /sda1/~/RP88/~SYSTEM
4.6M Jan 9 18:27 /sda1/~/RP89/~SYSTEM
4.6M Jan 11 12:32 /sda1/~/RP90/~SYSTEM
4.6M Jan 12 16:48 /sda1/~/RP91/~SYSTEM


#8 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,773 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:08:04 PM

Posted 15 January 2013 - 06:01 PM

Let's see if there is an available registry backup we can use to help get your computer booting properly
  • Boot the Sick computer with the USB drive again
  • Press File
  • Expand mnt
  • Expand your USB (sdb1)
  • Press Tool at the top
  • Choose Open Terminal
  • Type bash rst.sh -r
  • Type 85
  • Press Enter
  • After it has finished a report will be located at sdb1 named restore.log
  • Please try to boot into normal Windows now and indicate if you were successful

Please note - all text entries are case sensitive

Copy and paste the restore.log from your USB drive for my review
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#9 jasonTHX

jasonTHX
  • Topic Starter

  • Members
  • 44 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Vermont
  • Local time:08:04 PM

Posted 15 January 2013 - 06:17 PM

do I use ENTER between these two commands?

•Type bash rst.sh -r

•Type 85


OK I found that I should press Enter and did. Here is the log,

SOFTWARE hive restored from RP85
SYSTEM hive restored from RP85
SECURITY hive restored from RP85
SAM hive restored from RP85


Yes! success! I booted to Safe Mode w/ networking. :clapping:

Edited by jasonTHX, 15 January 2013 - 07:09 PM.


#10 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,773 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:08:04 PM

Posted 15 January 2013 - 08:55 PM

Hello


These are the programs I would like you to run next, if you have any problems with these just skip it and run the next one.


-AdwCleaner-

  • Please download AdwCleaner by Xplode onto your desktop.
  • Close all open programs and internet browsers.
  • Double click on AdwCleaner.exe to run the tool.
  • Click on Delete.
  • Confirm each time with Ok.
  • Your computer will be rebooted automatically. A text file will open after the restart.
  • Please post the content of that logfile with your next answer.
  • You can find the logfile at C:\AdwCleaner[S1].txt as well.

--RogueKiller--

  • Download & SAVE to your Desktop RogueKiller or from here
  • Quit all programs that you may have started.
  • Please disconnect any USB or external drives from the computer before you run this scan!
  • For Vista or Windows 7, right-click and select "Run as Administrator to start"
  • For Windows XP, double-click to start.
  • Wait until Prescan has finished ...
  • Then Click on "Scan" button
  • Wait until the Status box shows "Scan Finished"
  • click on "delete"
  • Wait until the Status box shows "Deleting Finished"
  • Click on "Report" and copy/paste the content of the Notepad into your next reply.
  • The log should be found in RKreport[1].txt on your Desktop
  • Exit/Close RogueKiller+

Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#11 jasonTHX

jasonTHX
  • Topic Starter

  • Members
  • 44 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Vermont
  • Local time:08:04 PM

Posted 15 January 2013 - 09:15 PM

Both programs run.

btw, should I be doing any of this in safe mode?

Here are the logs.

# AdwCleaner v2.105 - Logfile created 01/15/2013 at 21:03:17
# Updated 08/01/2013 by Xplode
# Operating system : Microsoft Windows XP Service Pack 3 (32 bits)
# User : Joey - DC7700
# Boot Mode : Safe mode with networking
# Running from : C:\Documents and Settings\Joey\Desktop\adwcleaner.exe
# Option [Delete]


***** [Services] *****


***** [Files / Folders] *****


***** [Registry] *****

Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{EEE6C35C-6118-11DC-9C72-001320C79847}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{EEE6C35B-6118-11DC-9C72-001320C79847}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{EEE6C35C-6118-11DC-9C72-001320C79847}
Key Deleted : HKCU\Software\SweetIM
Key Deleted : HKLM\Software\SweetIM
Value Deleted : HKCU\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser [{EEE6C35B-6118-11DC-9C72-001320C79847}]

***** [Internet Browsers] *****

-\\ Internet Explorer v8.0.6001.18702

[OK] Registry is clean.

*************************

AdwCleaner[S1].txt - [1074 octets] - [15/01/2013 21:03:17]

########## EOF - C:\AdwCleaner[S1].txt - [1134 octets] ##########


RogueKiller V8.4.3 [Jan 10 2013] by Tigzy
mail : tigzyRK<at>gmail<dot>com
Feedback : http://www.geekstogo.com/forum/files/file/413-roguekiller/
Website : http://tigzy.geekstogo.com/roguekiller.php
Blog : http://tigzyrk.blogspot.com/

Operating System : Windows XP (5.1.2600 Service Pack 3) 32 bits version
Started in : Normal mode
User : Joey [Admin rights]
Mode : Scan -- Date : 01/15/2013 21:08:50

¤¤¤ Bad processes : 0 ¤¤¤

¤¤¤ Registry Entries : 4 ¤¤¤
[HJPOL] HKCU\[...]\System : DisableTaskMgr (1) -> FOUND
[HJ SMENU] HKCU\[...]\Advanced : Start_ShowRecentDocs (0) -> FOUND
[HJ DESK] HKLM\[...]\NewStartPanel : {20D04FE0-3AEA-1069-A2D8-08002B30309D} (1) -> FOUND
[HJ] HKCU\[...]\Command Processor : AutoRun ("C:\Documents and Settings\Joey\Local Settings\Application Data\unzhaza.exe") -> FOUND

¤¤¤ Particular Files / Folders: ¤¤¤

¤¤¤ Driver : [LOADED] ¤¤¤
SSDT[25] : NtClose @ 0x8056F8D7 -> HOOKED (Unknown @ 0xF7A7FA74)
SSDT[41] : NtCreateKey @ 0x80578ABE -> HOOKED (Unknown @ 0xF7A7FA2E)
SSDT[50] : NtCreateSection @ 0x8056DB66 -> HOOKED (Unknown @ 0xF7A7FA7E)
SSDT[53] : NtCreateThread @ 0x80584D41 -> HOOKED (Unknown @ 0xF7A7FA24)
SSDT[63] : NtDeleteKey @ 0x80599777 -> HOOKED (Unknown @ 0xF7A7FA33)
SSDT[65] : NtDeleteValueKey @ 0x80598396 -> HOOKED (Unknown @ 0xF7A7FA3D)
SSDT[68] : NtDuplicateObject @ 0x8057F195 -> HOOKED (Unknown @ 0xF7A7FA6F)
SSDT[98] : NtLoadKey @ 0x805D5235 -> HOOKED (Unknown @ 0xF7A7FA42)
SSDT[122] : NtOpenProcess @ 0x8057F942 -> HOOKED (Unknown @ 0xF7A7FA10)
SSDT[128] : NtOpenThread @ 0x805E4817 -> HOOKED (Unknown @ 0xF7A7FA15)
SSDT[177] : NtQueryValueKey @ 0x80572F19 -> HOOKED (Unknown @ 0xF7A7FA97)
SSDT[193] : NtReplaceKey @ 0x806571D6 -> HOOKED (Unknown @ 0xF7A7FA4C)
SSDT[200] : NtRequestWaitReplyPort @ 0x8057D143 -> HOOKED (Unknown @ 0xF7A7FA88)
SSDT[204] : NtRestoreKey @ 0x80656D6D -> HOOKED (Unknown @ 0xF7A7FA47)
SSDT[213] : NtSetContextThread @ 0x8063628D -> HOOKED (Unknown @ 0xF7A7FA83)
SSDT[237] : NtSetSecurityObject @ 0x8059DDD3 -> HOOKED (Unknown @ 0xF7A7FA8D)
SSDT[247] : NtSetValueKey @ 0x80580090 -> HOOKED (Unknown @ 0xF7A7FA38)
SSDT[255] : NtSystemDebugControl @ 0x80651AA1 -> HOOKED (Unknown @ 0xF7A7FA92)
SSDT[257] : NtTerminateProcess @ 0x8058E8B9 -> HOOKED (Unknown @ 0xF7A7FA1F)
S_SSDT[549] : NtUserSetWindowsHookEx -> HOOKED (Unknown @ 0xF7A7FAA6)
S_SSDT[552] : NtUserSetWinEventHook -> HOOKED (Unknown @ 0xF7A7FAAB)

¤¤¤ HOSTS File: ¤¤¤
--> C:\WINDOWS\system32\drivers\etc\hosts

127.0.0.1 localhost


¤¤¤ MBR Check: ¤¤¤

+++++ PhysicalDrive0: WDC WD4000YR-01PLB0 +++++
--- User ---
[MBR] 12a9c552bc8e8349bd4d7e098620858e
[BSP] 9c4711ceb9e1e43365dd6698b71e5b97 : Windows XP MBR Code
Partition table:
0 - [ACTIVE] NTFS (0x07) [VISIBLE] Offset (sectors): 63 | Size: 381543 Mo
User = LL1 ... OK!
User = LL2 ... OK!

Finished : << RKreport[1]_S_01152013_02d2108.txt >>
RKreport[1]_S_01152013_02d2108.txt





#12 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,773 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:08:04 PM

Posted 15 January 2013 - 09:42 PM

Hello

run in normal mode if possible and how are things doing now - are you able to go into normal mode yet?

I Would like you to do the following.

Please print out or make a copy in notepad of any instructions given, as sometimes it is necessary to go offline and you will lose access to them.

Run Combofix:

You may be asked to install or update the Recovery Console (Win XP Only) if this happens please allow it to do so (you will need to be connected to the internet for this)

Before you run Combofix I will need you to turn off any security software you have running, If you do not know how to do this you can find out >here< or >here<

Combofix may need to reboot your computer more than once to do its job this is normal.

You can download Combofix from one of these links. I want you to save it to the desktop and run it from there.
Link 1
Link 2
Link 3
1. Close any open browsers or any other programs that are open.
2. Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.

Double click on combofix.exe & follow the prompts.
When finished, it will produce a report for you.

Note 1: Do not mouseclick combofix's window while it's running. That may cause it to stall

Note 2: If you receive an error "Illegal operation attempted on a registry key that has been marked for deletion." Please restart the computer

"information and logs"

  • In your next post I need the following
  • Log from Combofix
  • let me know of any problems you may have had
  • How is the computer doing now?

Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#13 jasonTHX

jasonTHX
  • Topic Starter

  • Members
  • 44 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Vermont
  • Local time:08:04 PM

Posted 15 January 2013 - 10:20 PM

here is the log.

ComboFix 13-01-15.02 - Joey 01/15/2013 21:58:57.1.2 - x86
Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.3327.2917 [GMT -5:00]
Running from: c:\documents and settings\Joey\Desktop\ComboFix.exe
AV: Avira Desktop *Disabled/Updated* {AD166499-45F9-482A-A743-FDD3350758C7}
* Created a new restore point
.
.
((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.
.
c:\documents and settings\Administrator\Application Data\unzhaza.exe
c:\documents and settings\Administrator\Local Settings\Application Data\unzhaza.exe
c:\documents and settings\All Users\Application Data\unzhaza.exe
c:\documents and settings\Joey\Application Data\unzhaza.exe
c:\documents and settings\Joey\Local Settings\Application Data\unzhaza.exe
C:\Install.exe
.
.
((((((((((((((((((((((((( Files Created from 2012-12-16 to 2013-01-16 )))))))))))))))))))))))))))))))
.
.
2013-01-14 22:02 . 2013-01-14 22:03 -------- d-----w- c:\documents and settings\Administrator
2013-01-14 13:58 . 2013-01-14 14:07 -------- d---a-w- C:\Kaspersky Rescue Disk 10.0
2012-12-31 23:04 . 2012-12-31 23:04 -------- d-----w- c:\documents and settings\Joey\Local Settings\Application Data\Identities
2012-12-31 22:32 . 2012-12-31 22:32 -------- d-----w- c:\documents and settings\Joey\Local Settings\Application Data\CrashRpt
2012-12-31 22:31 . 2012-12-31 22:31 138056 ----a-w- c:\windows\system32\drivers\PnkBstrK.sys
2012-12-31 22:31 . 2012-12-31 22:31 138056 ----a-w- c:\documents and settings\Joey\Application Data\PnkBstrK.sys
2012-12-31 22:31 . 2012-12-31 22:31 -------- d-----w- c:\program files\Microsoft Chart Controls
2012-12-31 22:31 . 2012-12-31 22:31 189248 ----a-w- c:\windows\system32\PnkBstrB.exe
2012-12-31 22:31 . 2012-12-31 22:31 189248 ----a-w- c:\windows\system32\PnkBstrB.ex0
2012-12-31 22:31 . 2012-12-31 22:31 76888 ----a-w- c:\windows\system32\PnkBstrA.exe
2012-12-31 18:19 . 2012-12-31 18:19 -------- d-----w- c:\documents and settings\All Users\Application Data\Age of Empires 3
2012-12-29 11:13 . 2012-12-29 11:14 -------- d-----w- c:\documents and settings\Joey\Local Settings\Application Data\ArmA 2
.
.
.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2012-12-18 16:56 . 2012-09-27 23:30 73656 ----a-w- c:\windows\system32\FlashPlayerCPLApp.cpl
2012-12-18 16:56 . 2012-09-27 23:30 697272 ----a-w- c:\windows\system32\FlashPlayerApp.exe
2012-12-16 12:23 . 2008-08-21 12:00 290560 ----a-w- c:\windows\system32\atmfd.dll
2012-12-14 21:49 . 2012-11-09 12:26 21104 ----a-w- c:\windows\system32\drivers\mbam.sys
2012-11-13 01:25 . 2008-08-21 12:00 1866368 ----a-w- c:\windows\system32\win32k.sys
2012-11-06 02:01 . 2008-08-21 12:00 1371648 ----a-w- c:\windows\system32\msxml6.dll
2012-11-02 02:02 . 2008-08-21 12:00 375296 ----a-w- c:\windows\system32\dpnet.dll
2012-11-01 12:17 . 2008-08-21 12:00 916992 ----a-w- c:\windows\system32\wininet.dll
2012-11-01 12:17 . 2008-08-21 12:00 43520 ------w- c:\windows\system32\licmgr10.dll
2012-11-01 12:17 . 2008-08-21 12:00 1469440 ------w- c:\windows\system32\inetcpl.cpl
2012-11-01 00:35 . 2008-08-21 12:00 385024 ------w- c:\windows\system32\html.iec
2012-10-31 20:25 . 2012-10-31 20:25 107888 ----a-w- c:\windows\system32\CmdLineExt.dll
.
.
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"RTHDCPL"="RTHDCPL.EXE" [2008-06-13 16871936]
"Adobe ARM"="c:\program files\Common Files\Adobe\ARM\1.0\AdobeARM.exe" [2012-07-27 919008]
"StartCCC"="c:\program files\ATI Technologies\ATI.ACE\Core-Static\CLIStart.exe" [2008-08-01 61440]
"SunJavaUpdateSched"="c:\program files\Common Files\Java\Java Update\jusched.exe" [2012-07-03 252848]
"avgnt"="c:\program files\Avira\AntiVir Desktop\avgnt.exe" [2012-09-08 348664]
.
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"%windir%\\system32\\sessmgr.exe"=
"c:\\WINDOWS\\system32\\msiexec.exe"=
"c:\\Games\\Stardock Games\\Sins of a Solar Empire - Trinity\\Sins of a Solar Empire.exe"=
"c:\\Games\\Stardock Games\\Sins of a Solar Empire - Trinity\\Sins of a Solar Empire Entrenchment.exe"=
"c:\\Games\\Stardock Games\\Sins of a Solar Empire - Trinity\\Sins of a Solar Empire Diplomacy.exe"=
"c:\\Program Files\\Steam\\Steam.exe"=
"c:\\Program Files\\Steam\\steamapps\\common\\borderlands\\Binaries\\Borderlands.exe"=
"c:\\Program Files\\ooVoo\\ooVoo.exe"=
"c:\\Program Files\\Steam\\steamapps\\common\\Age Of Empires Online\\Spartan.exe"=
"c:\\Program Files\\Steam\\steamapps\\common\\Empire Total War\\Empire.exe"=
"c:\\Program Files\\Steam\\steamapps\\common\\Rome Total War Gold\\RomeTW.exe"=
"c:\\Program Files\\Steam\\steamapps\\common\\Rome Total War Gold\\RomeTW-BI.exe"=
"c:\\Program Files\\Steam\\steamapps\\common\\Medieval II Total War\\Launcher.exe"=
"c:\\Program Files\\Steam\\steamapps\\common\\napoleon total war\\Napoleon.exe"=
"c:\\Program Files\\Steam\\steamapps\\common\\Titan Quest\\Titan Quest.exe"=
"c:\\Program Files\\Skype\\Phone\\Skype.exe"=
"c:\\Program Files\\Steam\\steamapps\\common\\company of heroes\\RelicDownloader\\RelicDownloader.exe"=
"c:\\Program Files\\Steam\\steamapps\\common\\Titan Quest Immortal Throne\\Tqit.exe"=
"c:\\Program Files\\Steam\\steamapps\\common\\dino d-day\\dinodday.exe"=
"c:\\Program Files\\Steam\\steamapps\\common\\Age Of Empires Online\\AOEOnline.exe"=
"c:\\Program Files\\Steam\\steamapps\\common\\company of heroes\\RelicCOH.exe"=
"c:\\Program Files\\Steam\\steamapps\\common\\total war battles shogun\\twbattles.exe"=
"c:\\Program Files\\Steam\\steamapps\\common\\PlanetSide 2\\LaunchPad.exe"=
"c:\\Program Files\\Steam\\steamapps\\common\\Total War SHOGUN 2\\Shogun2.exe"=
"c:\\Program Files\\Steam\\steamapps\\common\\Total War SHOGUN 2\\data\\encyclopedia\\how_to_play.html"=
"c:\\Program Files\\Steam\\steamapps\\common\\Total War SHOGUN 2\\benchmarks\\benchmark_current_settings.bat"=
"c:\\Program Files\\Steam\\steamapps\\common\\Total War SHOGUN 2\\benchmarks\\benchmark_specify_properties.bat"=
"c:\\Program Files\\Steam\\steamapps\\common\\Borderlands 2\\Binaries\\Win32\\Borderlands2.exe"=
"c:\\Program Files\\Steam\\steamapps\\common\\left 4 dead 2\\left4dead2.exe"=
"c:\\Program Files\\Steam\\steamapps\\common\\Borderlands 2\\Binaries\\Win32\\Launcher.exe"=
"c:\\Program Files\\Steam\\steamapps\\common\\IronFront\\Ironfront.exe"=
"c:\\Program Files\\Steam\\steamapps\\common\\Dead Island\\DeadIslandGame.exe"=
"c:\\Program Files\\Steam\\steamapps\\common\\RedOrchestra2Beta\\Binaries\\Win32\\ROGame.exe"=
"c:\\Program Files\\Steam\\steamapps\\common\\Air Conflicts Secret Wars\\ACSW.exe"=
"c:\\Program Files\\Steam\\steamapps\\common\\Air Conflicts Secret Wars\\Configure.exe"=
"c:\\Program Files\\Steam\\steamapps\\common\\Red Orchestra 2\\Binaries\\Win32\\ROGame.exe"=
"c:\\Program Files\\Steam\\steamapps\\common\\Endless Space\\EndlessSpace.exe"=
"c:\\Program Files\\Steam\\steamapps\\common\\arma 2 operation arrowhead\\Expansion\\beta\\Arma2OA.exe"=
"c:\\Program Files\\Steam\\steamapps\\common\\Arma 2\\arma2.exe"=
"c:\\Program Files\\Steam\\steamapps\\common\\arma 2 operation arrowhead\\ArmA2OA.exe"=
"c:\\Program Files\\Steam\\steamapps\\common\\arma 2 operation arrowhead\\BEsetup\\Setup_BattlEyeARMA2OA.exe"=
"c:\\Program Files\\Steam\\steamapps\\common\\Age Of Empires 3\\bin\\age3.exe"=
"c:\\Program Files\\Steam\\steamapps\\common\\Age Of Empires 3\\bin\\age3x.exe"=
"c:\\Program Files\\Steam\\steamapps\\common\\Age Of Empires 3\\bin\\age3y.exe"=
"c:\\WINDOWS\\system32\\PnkBstrA.exe"=
"c:\\WINDOWS\\system32\\PnkBstrB.exe"=
.
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\GloballyOpenPorts\List]
"443:TCP"= 443:TCP:*:Disabled:ooVoo TCP port 443
"443:UDP"= 443:UDP:*:Disabled:ooVoo UDP port 443
"37674:TCP"= 37674:TCP:*:Disabled:ooVoo TCP port 37674
"37674:UDP"= 37674:UDP:*:Disabled:ooVoo UDP port 37674
"37675:UDP"= 37675:UDP:*:Disabled:ooVoo UDP port 37675
.
R1 avkmgr;avkmgr;c:\windows\system32\drivers\avkmgr.sys [10/21/2012 6:35 PM 36000]
R2 AntiVirSchedulerService;Avira Scheduler;c:\program files\Avira\AntiVir Desktop\sched.exe [10/21/2012 6:35 PM 86224]
S2 SkypeUpdate;Skype Updater;c:\program files\Skype\Updater\Updater.exe [7/13/2012 12:28 PM 160944]
S3 AtiHDAudioService;ATI Function Driver for HD Audio Service;c:\windows\system32\drivers\AtihdXP3.sys [9/24/2012 8:15 PM 103040]
.
--- Other Services/Drivers In Memory ---
.
*NewlyCreated* - TRUESIGHT
*Deregistered* - TrueSight
.
.
------- Supplementary Scan -------
.
uStart Page = hxxp://www.google.com/
IE: Google Sidewiki... - c:\program files\Google\Google Toolbar\Component\GoogleToolbarDynamic_mui_en_6CE5017F567343CA.dll/cmsidewiki.html
Trusted Zone: clonewarsadventures.com
Trusted Zone: freerealms.com
Trusted Zone: soe.com
Trusted Zone: sony.com
TCP: DhcpNameServer = 75.75.75.75 75.75.76.76
.
- - - - ORPHANS REMOVED - - - -
.
AddRemove-BattlEye for A2 - c:\program files\Steam\steamapps\common\Arma 2BattlEye\UnInstallBE.exe
.
.
.
**************************************************************************
.
catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2013-01-15 22:05
Windows 5.1.2600 Service Pack 3 NTFS
.
scanning hidden processes ...
.
scanning hidden autostart entries ...
.
scanning hidden files ...
.
scan completed successfully
hidden files: 0
.
**************************************************************************
.
--------------------- LOCKED REGISTRY KEYS ---------------------
.
[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}]
@Denied: (A 2) (Everyone)
@="FlashBroker"
"LocalizedString"="@c:\\WINDOWS\\system32\\Macromed\\Flash\\FlashUtil32_11_5_502_135_ActiveX.exe,-101"
.
[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\Elevation]
"Enabled"=dword:00000001
.
[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\LocalServer32]
@="c:\\WINDOWS\\system32\\Macromed\\Flash\\FlashUtil32_11_5_502_135_ActiveX.exe"
.
[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\TypeLib]
@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"
.
[HKEY_LOCAL_MACHINE\software\Classes\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}]
@Denied: (A 2) (Everyone)
@="IFlashBroker5"
.
[HKEY_LOCAL_MACHINE\software\Classes\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}\ProxyStubClsid32]
@="{00020424-0000-0000-C000-000000000046}"
.
[HKEY_LOCAL_MACHINE\software\Classes\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}\TypeLib]
@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"
"Version"="1.0"
.
--------------------- DLLs Loaded Under Running Processes ---------------------
.
- - - - - - - > 'winlogon.exe'(724)
c:\windows\system32\Ati2evxx.dll
.
Completion time: 2013-01-15 22:06:09
ComboFix-quarantined-files.txt 2013-01-16 03:06
.
Pre-Run: 127,019,110,400 bytes free
Post-Run: 131,867,545,600 bytes free
.
WindowsXP-KB310994-SP2-Pro-BootDisk-ENU.exe
[boot loader]
timeout=2
default=multi(0)disk(0)rdisk(0)partition(1)\WINDOWS
[operating systems]
c:\cmdcons\BOOTSECT.DAT="Microsoft Windows Recovery Console" /cmdcons
UnsupportedDebug="do not select this" /debug
multi(0)disk(0)rdisk(0)partition(1)\WINDOWS="Microsoft Windows XP Professional" /noexecute=optin /fastdetect
.
- - End Of File - - FFB01AC5367E8B4C076CE9EBF69854EC


•let me know of any problems you may have had
•How is the computer doing now?

I haven't done much other than what you have been instructing me to. The PC is booted normally, the MS windows updates downloaded but I did not install them. I am using the sick PC to reply. So, it looks good to me.

I am worried about passwords and having this PC highjacked (I read online that this maybe possible with this type of infection). I will change those once I am all clean.

Anything else we need to do?

#14 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,773 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:08:04 PM

Posted 15 January 2013 - 10:34 PM

Greetings

At this time I would like you to run this script for me and it is a good time to check out the computer to see if there is anything else that needs to be addressed.

:Run CFScript:

Open Notepad and copy/paste the text in the box into the window:

ClearJavaCache::

Save it to your desktop as CFScript.txt

Refering to the picture above, drag CFScript.txt into ComboFix.exe
Posted Image
This will let ComboFix run again.
Restart if you have to.
Save the produced logfile to your desktop.

Note: Do not mouseclick combofix's window whilst it's running. That may cause it to stall

Note 2: If you recieve an error "Illegal operation attempted on a registery key that has been marked for deletion." Please restart the computer

"information and logs"

  • In your next post I need the following

  • report from Combofix
  • let me know of any problems you may have had
  • How is the computer doing now after running the script?

Gringo

I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#15 jasonTHX

jasonTHX
  • Topic Starter

  • Members
  • 44 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Vermont
  • Local time:08:04 PM

Posted 15 January 2013 - 11:08 PM

OK, here is the report.

ComboFix 13-01-15.02 - Joey 01/15/2013 22:56:08.2.2 - x86
Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.3327.2635 [GMT -5:00]
Running from: c:\documents and settings\Joey\Desktop\ComboFix.exe
Command switches used :: c:\documents and settings\Joey\Desktop\CFScript.txt
AV: Avira Desktop *Disabled/Updated* {AD166499-45F9-482A-A743-FDD3350758C7}
.
.
((((((((((((((((((((((((( Files Created from 2012-12-16 to 2013-01-16 )))))))))))))))))))))))))))))))
.
.
2013-01-14 22:02 . 2013-01-14 22:03 -------- d-----w- c:\documents and settings\Administrator
2013-01-14 13:58 . 2013-01-14 14:07 -------- d---a-w- C:\Kaspersky Rescue Disk 10.0
2012-12-31 23:04 . 2012-12-31 23:04 -------- d-----w- c:\documents and settings\Joey\Local Settings\Application Data\Identities
2012-12-31 22:32 . 2012-12-31 22:32 -------- d-----w- c:\documents and settings\Joey\Local Settings\Application Data\CrashRpt
2012-12-31 22:31 . 2012-12-31 22:31 138056 ----a-w- c:\windows\system32\drivers\PnkBstrK.sys
2012-12-31 22:31 . 2012-12-31 22:31 138056 ----a-w- c:\documents and settings\Joey\Application Data\PnkBstrK.sys
2012-12-31 22:31 . 2012-12-31 22:31 -------- d-----w- c:\program files\Microsoft Chart Controls
2012-12-31 22:31 . 2012-12-31 22:31 189248 ----a-w- c:\windows\system32\PnkBstrB.exe
2012-12-31 22:31 . 2012-12-31 22:31 189248 ----a-w- c:\windows\system32\PnkBstrB.ex0
2012-12-31 22:31 . 2012-12-31 22:31 76888 ----a-w- c:\windows\system32\PnkBstrA.exe
2012-12-31 18:19 . 2012-12-31 18:19 -------- d-----w- c:\documents and settings\All Users\Application Data\Age of Empires 3
2012-12-29 11:13 . 2012-12-29 11:14 -------- d-----w- c:\documents and settings\Joey\Local Settings\Application Data\ArmA 2
.
.
.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2012-12-18 16:56 . 2012-09-27 23:30 73656 ----a-w- c:\windows\system32\FlashPlayerCPLApp.cpl
2012-12-18 16:56 . 2012-09-27 23:30 697272 ----a-w- c:\windows\system32\FlashPlayerApp.exe
2012-12-16 12:23 . 2008-08-21 12:00 290560 ----a-w- c:\windows\system32\atmfd.dll
2012-12-14 21:49 . 2012-11-09 12:26 21104 ----a-w- c:\windows\system32\drivers\mbam.sys
2012-11-13 01:25 . 2008-08-21 12:00 1866368 ----a-w- c:\windows\system32\win32k.sys
2012-11-06 02:01 . 2008-08-21 12:00 1371648 ----a-w- c:\windows\system32\msxml6.dll
2012-11-02 02:02 . 2008-08-21 12:00 375296 ----a-w- c:\windows\system32\dpnet.dll
2012-11-01 12:17 . 2008-08-21 12:00 916992 ----a-w- c:\windows\system32\wininet.dll
2012-11-01 12:17 . 2008-08-21 12:00 43520 ------w- c:\windows\system32\licmgr10.dll
2012-11-01 12:17 . 2008-08-21 12:00 1469440 ------w- c:\windows\system32\inetcpl.cpl
2012-11-01 00:35 . 2008-08-21 12:00 385024 ------w- c:\windows\system32\html.iec
2012-10-31 20:25 . 2012-10-31 20:25 107888 ----a-w- c:\windows\system32\CmdLineExt.dll
.
.
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"RTHDCPL"="RTHDCPL.EXE" [2008-06-13 16871936]
"Adobe ARM"="c:\program files\Common Files\Adobe\ARM\1.0\AdobeARM.exe" [2012-07-27 919008]
"StartCCC"="c:\program files\ATI Technologies\ATI.ACE\Core-Static\CLIStart.exe" [2008-08-01 61440]
"SunJavaUpdateSched"="c:\program files\Common Files\Java\Java Update\jusched.exe" [2012-07-03 252848]
"avgnt"="c:\program files\Avira\AntiVir Desktop\avgnt.exe" [2012-09-08 348664]
.
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"%windir%\\system32\\sessmgr.exe"=
"c:\\WINDOWS\\system32\\msiexec.exe"=
"c:\\Games\\Stardock Games\\Sins of a Solar Empire - Trinity\\Sins of a Solar Empire.exe"=
"c:\\Games\\Stardock Games\\Sins of a Solar Empire - Trinity\\Sins of a Solar Empire Entrenchment.exe"=
"c:\\Games\\Stardock Games\\Sins of a Solar Empire - Trinity\\Sins of a Solar Empire Diplomacy.exe"=
"c:\\Program Files\\Steam\\Steam.exe"=
"c:\\Program Files\\Steam\\steamapps\\common\\borderlands\\Binaries\\Borderlands.exe"=
"c:\\Program Files\\ooVoo\\ooVoo.exe"=
"c:\\Program Files\\Steam\\steamapps\\common\\Age Of Empires Online\\Spartan.exe"=
"c:\\Program Files\\Steam\\steamapps\\common\\Empire Total War\\Empire.exe"=
"c:\\Program Files\\Steam\\steamapps\\common\\Rome Total War Gold\\RomeTW.exe"=
"c:\\Program Files\\Steam\\steamapps\\common\\Rome Total War Gold\\RomeTW-BI.exe"=
"c:\\Program Files\\Steam\\steamapps\\common\\Medieval II Total War\\Launcher.exe"=
"c:\\Program Files\\Steam\\steamapps\\common\\napoleon total war\\Napoleon.exe"=
"c:\\Program Files\\Steam\\steamapps\\common\\Titan Quest\\Titan Quest.exe"=
"c:\\Program Files\\Skype\\Phone\\Skype.exe"=
"c:\\Program Files\\Steam\\steamapps\\common\\company of heroes\\RelicDownloader\\RelicDownloader.exe"=
"c:\\Program Files\\Steam\\steamapps\\common\\Titan Quest Immortal Throne\\Tqit.exe"=
"c:\\Program Files\\Steam\\steamapps\\common\\dino d-day\\dinodday.exe"=
"c:\\Program Files\\Steam\\steamapps\\common\\Age Of Empires Online\\AOEOnline.exe"=
"c:\\Program Files\\Steam\\steamapps\\common\\company of heroes\\RelicCOH.exe"=
"c:\\Program Files\\Steam\\steamapps\\common\\total war battles shogun\\twbattles.exe"=
"c:\\Program Files\\Steam\\steamapps\\common\\PlanetSide 2\\LaunchPad.exe"=
"c:\\Program Files\\Steam\\steamapps\\common\\Total War SHOGUN 2\\Shogun2.exe"=
"c:\\Program Files\\Steam\\steamapps\\common\\Total War SHOGUN 2\\data\\encyclopedia\\how_to_play.html"=
"c:\\Program Files\\Steam\\steamapps\\common\\Total War SHOGUN 2\\benchmarks\\benchmark_current_settings.bat"=
"c:\\Program Files\\Steam\\steamapps\\common\\Total War SHOGUN 2\\benchmarks\\benchmark_specify_properties.bat"=
"c:\\Program Files\\Steam\\steamapps\\common\\Borderlands 2\\Binaries\\Win32\\Borderlands2.exe"=
"c:\\Program Files\\Steam\\steamapps\\common\\left 4 dead 2\\left4dead2.exe"=
"c:\\Program Files\\Steam\\steamapps\\common\\Borderlands 2\\Binaries\\Win32\\Launcher.exe"=
"c:\\Program Files\\Steam\\steamapps\\common\\IronFront\\Ironfront.exe"=
"c:\\Program Files\\Steam\\steamapps\\common\\Dead Island\\DeadIslandGame.exe"=
"c:\\Program Files\\Steam\\steamapps\\common\\RedOrchestra2Beta\\Binaries\\Win32\\ROGame.exe"=
"c:\\Program Files\\Steam\\steamapps\\common\\Air Conflicts Secret Wars\\ACSW.exe"=
"c:\\Program Files\\Steam\\steamapps\\common\\Air Conflicts Secret Wars\\Configure.exe"=
"c:\\Program Files\\Steam\\steamapps\\common\\Red Orchestra 2\\Binaries\\Win32\\ROGame.exe"=
"c:\\Program Files\\Steam\\steamapps\\common\\Endless Space\\EndlessSpace.exe"=
"c:\\Program Files\\Steam\\steamapps\\common\\arma 2 operation arrowhead\\Expansion\\beta\\Arma2OA.exe"=
"c:\\Program Files\\Steam\\steamapps\\common\\Arma 2\\arma2.exe"=
"c:\\Program Files\\Steam\\steamapps\\common\\arma 2 operation arrowhead\\ArmA2OA.exe"=
"c:\\Program Files\\Steam\\steamapps\\common\\arma 2 operation arrowhead\\BEsetup\\Setup_BattlEyeARMA2OA.exe"=
"c:\\Program Files\\Steam\\steamapps\\common\\Age Of Empires 3\\bin\\age3.exe"=
"c:\\Program Files\\Steam\\steamapps\\common\\Age Of Empires 3\\bin\\age3x.exe"=
"c:\\Program Files\\Steam\\steamapps\\common\\Age Of Empires 3\\bin\\age3y.exe"=
"c:\\WINDOWS\\system32\\PnkBstrA.exe"=
"c:\\WINDOWS\\system32\\PnkBstrB.exe"=
.
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\GloballyOpenPorts\List]
"443:TCP"= 443:TCP:*:Disabled:ooVoo TCP port 443
"443:UDP"= 443:UDP:*:Disabled:ooVoo UDP port 443
"37674:TCP"= 37674:TCP:*:Disabled:ooVoo TCP port 37674
"37674:UDP"= 37674:UDP:*:Disabled:ooVoo UDP port 37674
"37675:UDP"= 37675:UDP:*:Disabled:ooVoo UDP port 37675
.
R1 avkmgr;avkmgr;c:\windows\system32\drivers\avkmgr.sys [10/21/2012 6:35 PM 36000]
R2 AntiVirSchedulerService;Avira Scheduler;c:\program files\Avira\AntiVir Desktop\sched.exe [10/21/2012 6:35 PM 86224]
S2 SkypeUpdate;Skype Updater;c:\program files\Skype\Updater\Updater.exe [7/13/2012 12:28 PM 160944]
S3 AtiHDAudioService;ATI Function Driver for HD Audio Service;c:\windows\system32\drivers\AtihdXP3.sys [9/24/2012 8:15 PM 103040]
.
--- Other Services/Drivers In Memory ---
.
*NewlyCreated* - TRUESIGHT
*Deregistered* - TrueSight
.
.
------- Supplementary Scan -------
.
uStart Page = hxxp://www.google.com/
IE: Google Sidewiki... - c:\program files\Google\Google Toolbar\Component\GoogleToolbarDynamic_mui_en_6CE5017F567343CA.dll/cmsidewiki.html
Trusted Zone: clonewarsadventures.com
Trusted Zone: freerealms.com
Trusted Zone: soe.com
Trusted Zone: sony.com
TCP: DhcpNameServer = 75.75.75.75 75.75.76.76
.
.
**************************************************************************
.
catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2013-01-15 23:00
Windows 5.1.2600 Service Pack 3 NTFS
.
scanning hidden processes ...
.
scanning hidden autostart entries ...
.
scanning hidden files ...
.
scan completed successfully
hidden files: 0
.
**************************************************************************
.
--------------------- LOCKED REGISTRY KEYS ---------------------
.
[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}]
@Denied: (A 2) (Everyone)
@="FlashBroker"
"LocalizedString"="@c:\\WINDOWS\\system32\\Macromed\\Flash\\FlashUtil32_11_5_502_135_ActiveX.exe,-101"
.
[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\Elevation]
"Enabled"=dword:00000001
.
[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\LocalServer32]
@="c:\\WINDOWS\\system32\\Macromed\\Flash\\FlashUtil32_11_5_502_135_ActiveX.exe"
.
[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\TypeLib]
@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"
.
[HKEY_LOCAL_MACHINE\software\Classes\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}]
@Denied: (A 2) (Everyone)
@="IFlashBroker5"
.
[HKEY_LOCAL_MACHINE\software\Classes\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}\ProxyStubClsid32]
@="{00020424-0000-0000-C000-000000000046}"
.
[HKEY_LOCAL_MACHINE\software\Classes\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}\TypeLib]
@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"
"Version"="1.0"
.
--------------------- DLLs Loaded Under Running Processes ---------------------
.
- - - - - - - > 'winlogon.exe'(724)
c:\windows\system32\Ati2evxx.dll
.
- - - - - - - > 'explorer.exe'(3396)
c:\windows\system32\WININET.dll
c:\windows\system32\ieframe.dll
c:\windows\system32\webcheck.dll
c:\windows\system32\WPDShServiceObj.dll
c:\windows\system32\PortableDeviceTypes.dll
c:\windows\system32\PortableDeviceApi.dll
.
Completion time: 2013-01-15 23:01:00
ComboFix-quarantined-files.txt 2013-01-16 04:00
ComboFix2.txt 2013-01-16 03:06
.
Pre-Run: 131,865,509,888 bytes free
Post-Run: 131,864,076,288 bytes free
.
- - End Of File - - 346EDA627A2809940F7CBA13A61D9123


Things seem to be fine. I am only using IE and running instructed programs in normal boot. What's next? (I'll continue in the AM.)




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users