Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Strange registry entries in Windows XP....possible atmlib.exe infection??


  • This topic is locked This topic is locked
6 replies to this topic

#1 notinfallible

notinfallible

  • Members
  • 118 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Everywhere and Nowhere
  • Local time:10:13 AM

Posted 31 January 2013 - 07:19 PM

Hello, I was directed here by Aussie Addict in a topic that I started earlier today in the Windows XP forum. Here is a link to that topic.... http://www.bleepingcomputer.com/forums/topic483699.html

I wanted to check the "run" and "runonce" part of my registry, when I noticed something that I have never seen before under "HKEY_CURRENT_USER".



"SYSTEM2544"
"SYSTEM52216"
"SYSTEM62455"


In the topic that I linked you to, you will find screenshots of the registry entries.

My computer hasn't really been running bad, but sometimes the Task Manager shows my shows my 100% and the fans will be running at full speed.

Here is the DDS log.

DDS (Ver_2012-11-20.01) - NTFS_x86
Internet Explorer: 8.0.6001.18702 BrowserJavaVersion: 10.11.2
Run by Owner at 18:03:25 on 2013-01-31
Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.2023.1412 [GMT -6:00]
.
AV: Avira Desktop *Enabled/Updated* {AD166499-45F9-482A-A743-FDD3350758C7}
.
============== Running Processes ================
.
C:\Program Files\Avira\AntiVir Desktop\sched.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\Avira\AntiVir Desktop\avgnt.exe
C:\Program Files\Avira\AntiVir Desktop\avguard.exe
C:\Program Files\Avira\AntiVir Desktop\avshadow.exe
C:\WINDOWS\System32\alg.exe
C:\Program Files\Yahoo!\Messenger\YahooMessenger.exe
C:\WINDOWS\system32\wbem\wmiprvse.exe
C:\Program Files\Yahoo!\Messenger\YahooMessenger.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\WINDOWS\system32\svchost.exe -k netsvcs
C:\WINDOWS\system32\svchost.exe -k NetworkService
C:\WINDOWS\system32\svchost.exe -k LocalService
.
============== Pseudo HJT Report ===============
.
uStart Page = hxxp://www.google.com/
uSearch Bar = hxxp://www.google.com/ie
uInternet Connection Wizard,ShellNext = iexplore
uProxyServer = socks=127.0.0.1:9050
mSearchAssistant = hxxp://www.google.com/ie
mRun: [avgnt] "c:\program files\avira\antivir desktop\avgnt.exe" /min
uPolicies-Explorer: NoDriveTypeAutoRun = dword:255
mPolicies-Windows\System: Allow-LogonScript-NetbiosDisabled = dword:1
mPolicies-Explorer: NoDriveTypeAutoRun = dword:145
IE: Translate this web page with Babylon - c:\program files\babylon\babylon-pro\utils\BabylonIEPI.dll/ActionTU.htm
IE: Translate with Babylon - c:\program files\babylon\babylon-pro\utils\BabylonIEPI.dll/Action.htm
.
INFO: HKCU has more than 50 listed domains.
If you wish to scan all of them, select the 'Force scan all domains' option.
.
.
INFO: HKLM has more than 50 listed domains.
If you wish to scan all of them, select the 'Force scan all domains' option.
.
TCP: NameServer = 192.168.1.1
TCP: Interfaces\{EFED29BF-38D1-49CA-A456-9C864DFA6977} : DHCPNameServer = 192.168.1.1
Notify: igfxcui - igfxdev.dll
SSODL: WPDShServiceObj - {AAA288BA-9A4C-45B0-95D7-94D524869DB5} - c:\windows\system32\WPDShServiceObj.dll
SEH: SABShellExecuteHook Class - {5AE067D3-9AFB-48E0-853A-EBB7F4A000DA} - c:\program files\superantispyware\SASSEH.DLL
Hosts: 127.0.0.1 www.spywareinfo.com
.
============= SERVICES / DRIVERS ===============
.
R1 avkmgr;avkmgr;c:\windows\system32\drivers\avkmgr.sys [2012-12-12 36552]
R1 SASDIFSV;SASDIFSV;c:\program files\superantispyware\sasdifsv.sys [2011-7-22 12880]
R1 SASKUTIL;SASKUTIL;c:\program files\superantispyware\SASKUTIL.SYS [2011-7-12 67664]
R2 AntiVirSchedulerService;Avira Scheduler;c:\program files\avira\antivir desktop\sched.exe [2012-12-12 85280]
R2 AntiVirService;Avira Real-Time Protection;c:\program files\avira\antivir desktop\avguard.exe [2012-12-12 109344]
R2 avgntflt;avgntflt;c:\windows\system32\drivers\avgntflt.sys [2012-12-12 83944]
R2 NPF;NetGroup Packet Filter Driver;c:\windows\system32\drivers\npf.sys [2012-12-15 35088]
S2 clr_optimization_v4.0.30319_32;Microsoft .NET Framework NGEN v4.0.30319_X86;c:\windows\microsoft.net\framework\v4.0.30319\mscorsvw.exe [2010-3-18 130384]
S3 cpudrv;cpudrv;c:\program files\systemrequirementslab\cpudrv.sys [2011-6-2 11336]
S3 mbamchameleon;mbamchameleon;c:\windows\system32\drivers\mbamchameleon.sys [2012-12-15 35144]
S3 WPFFontCache_v0400;Windows Presentation Foundation Font Cache 4.0.0.0;c:\windows\microsoft.net\framework\v4.0.30319\wpf\WPFFontCache_v0400.exe [2010-3-18 753504]
S4 !SASCORE;SAS Core Service;c:\program files\superantispyware\SASCore.exe [2012-7-11 116608]
S4 McrdSvc;Media Center Extender Service;c:\windows\ehome\mcrdsvc.exe [2005-8-5 99328]
.
=============== Created Last 30 ================
.
2013-01-22 14:41:19 -------- d-----w- c:\documents and settings\owner\local settings\application data\Sony
2013-01-22 14:38:19 33340 ------w- c:\windows\system32\dbmsqlgc.dll
2013-01-22 14:38:19 24576 ------w- c:\windows\system32\dbmsgnet.dll
2013-01-22 14:38:03 -------- d-----w- c:\program files\Microsoft SQL Server
2013-01-22 14:36:42 -------- d-----w- c:\program files\Sony
2013-01-22 14:36:14 -------- d-----w- c:\program files\Sony Setup
2013-01-20 05:04:12 -------- d-----w- c:\program files\FileASSASSIN
2013-01-20 02:42:29 -------- d-----w- c:\documents and settings\owner\application data\Foxit Software
2013-01-17 05:17:26 143872 ----a-w- c:\windows\system32\javacpl.cpl
2013-01-17 05:17:14 94112 ----a-w- c:\windows\system32\WindowsAccessBridge.dll
2013-01-11 18:27:12 -------- d-----w- c:\documents and settings\all users\application data\Protexis
2013-01-11 17:47:56 -------- d--h--w- c:\windows\PIF
2013-01-11 15:52:33 -------- d-----w- c:\documents and settings\owner\local settings\application data\Corel PaintShop Pro
2013-01-11 15:52:01 -------- d-----w- c:\program files\common files\Protexis
2013-01-11 15:52:01 -------- d-----w- c:\documents and settings\all users\application data\Corel
2013-01-11 13:44:52 -------- d-----w- c:\documents and settings\owner\local settings\application data\Apple Computer
2013-01-11 04:07:15 -------- d-----w- C:\Muhbleep Educational
2013-01-09 14:29:33 -------- d-----w- c:\windows\system32\syncdb
2013-01-08 07:58:55 -------- d-----w- c:\program files\Foxit Software
2013-01-07 05:08:59 -------- d-----w- C:\Intel
2013-01-07 05:07:32 -------- d-----w- c:\program files\SystemRequirementsLab
2013-01-06 18:16:08 -------- d-----w- c:\documents and settings\all users\CyberLink
2013-01-06 18:01:43 143360 ----a-w- c:\program files\internet explorer\plugins\npqtplugin7.dll
2013-01-05 23:59:26 -------- d-----w- c:\program files\PokerStars
.
==================== Find3M ====================
.
2013-01-20 03:40:35 697864 ----a-w- c:\windows\system32\FlashPlayerApp.exe
2013-01-20 03:40:34 74248 ----a-w- c:\windows\system32\FlashPlayerCPLApp.cpl
2013-01-17 05:17:05 859552 ----a-w- c:\windows\system32\npDeployJava1.dll
2013-01-12 09:30:33 780192 ----a-w- c:\windows\system32\deployJava1.dll
2012-12-27 10:52:51 409600 ----a-w- c:\windows\system32\wrap_oal.dll
2012-12-27 10:52:51 114688 ----a-w- c:\windows\system32\OpenAL32.dll
2012-12-16 12:23:59 290560 ----a-w- c:\windows\system32\atmfd.dll
2012-12-16 04:04:40 118784 ----a-w- c:\windows\dsdxirmv.exe
2012-12-15 08:12:53 35144 ----a-w- c:\windows\system32\drivers\mbamchameleon.sys
2012-12-15 06:52:57 96784 ----a-w- c:\windows\system32\packet.dll
2012-12-15 06:52:57 35088 ----a-w- c:\windows\system32\drivers\npf.sys
2012-12-15 06:52:57 281104 ----a-w- c:\windows\system32\wpcap.dll
2012-12-14 22:49:28 21104 ----a-w- c:\windows\system32\drivers\mbam.sys
2012-11-27 16:01:26 83944 ----a-w- c:\windows\system32\drivers\avgntflt.sys
2012-11-22 21:51:11 36552 ----a-w- c:\windows\system32\drivers\avkmgr.sys
2012-11-13 01:25:12 1866368 ----a-w- c:\windows\system32\win32k.sys
2012-11-06 02:01:39 1371648 ----a-w- c:\windows\system32\msxml6.dll
.
============= FINISH: 18:03:53.93 ===============

<P dir=ltr>

Attached Files


Edited by notinfallible, 31 January 2013 - 07:20 PM.

The most important thing in communication is to hear what isn't being said.

BC AdBot (Login to Remove)

 


#2 nasdaq

nasdaq

  • Malware Response Team
  • 40,461 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Montreal, QC. Canada
  • Local time:11:13 AM

Posted 02 February 2013 - 11:29 AM

Hello, Welcome to BleepingComputer.
I'm nasdaq and will be helping you.

If you can please print this topic it will make it easier for you to follow the instructions and complete all of the necessary steps.
===

Please download ComboFix from one of these locations:

Link 1
Link 2

* IMPORTANT !!! Save ComboFix.exe to your Desktop

  • Disable your Anti-Virus and Anti-Spyware applications, usually via a right click on the System Tray icon. They may otherwise interfere with our tools
  • Close any open browsers, and all other programs working. Make sure you save your file if working on a document.
  • Do not install any other programs until this if fixed.[/b]
  • Double click on ComboFix.exe & follow the prompts.
  • As part of it's process, ComboFix will check to see if the Microsoft Windows Recovery Console is installed. With malware infections being as they are today, it's strongly recommended to have this pre-installed on your machine before doing any malware removal. It will allow you to boot up into a special recovery/repair mode that will allow us to more easily help you should your computer have a problem after an attempted removal of malware.
  • Follow the prompts to allow ComboFix to download and install the Microsoft Windows Recovery Console, and when prompted, agree to the End-User License Agreement to install the Microsoft Windows Recovery Console.
  • Some Rookit infection may damage your boot sector. The Windows Recovery Console may be needed to restore it. Do not bypass this installation. You may regret it.

**Please note: If the Microsoft Windows Recovery Console is already installed, ComboFix will continue it's malware removal procedures.

Posted Image


Once the Microsoft Windows Recovery Console is installed using ComboFix, you should see the following message:

Posted Image

Click on Yes, to continue scanning for malware.

When finished, it shall produce a log for you. Please include the C:\ComboFix.txt in your next reply.

Note: If you have difficulty properly disabling your protection programs, refer to this link --> http://www.bleepingcomputer.com/forums/topic114351.html

Do not mouse click ComboFix's window while it's running. That may cause it to stall

Note: If after running ComboFix you get this error message "Illegal operation attempted on a registry key that has been marked for deletion." when attempting to run a program all you need to do is restart the computer to reset the registry.
===

Third party programs if not up to date can be the cause of infiltration an infection.

Please run this security check for my review.

Download Security Check by screen317 from here.
  • Save it to your Desktop.
  • Double click SecurityCheck.exe and follow the onscreen instructions inside of the black box.
  • A Notepad document should open automatically called checkup.txt; please post the contents of that document.
===

Please download AdwCleaner by Xplode onto your Desktop.
  • Double click on AdwCleaner.exe to run the tool.
  • Click on Search.
  • A log file will automatically open after the scan has finished.
  • Please post the content of that log file with your next answer.
  • You can find the log file at C:\AdwCleaner[Rn].txt (n is a number).
===

Lets have a look at the content of these keys.

Please download SystemLook from one of the links below and save it to your Desktop.
Download Mirror #1
Download Mirror #2


If your operating system is 64 bit download this tool:
SystemLook_x64.exe
  • Double-click SystemLook.exe to run it.
  • Copy and paste the content of the following bold text into the main textfield:


    :reg
    HKEY_CURRENT_USER\SYSTEM2544 /sub
    HKEY_CURRENT_USER\SYSTEM52216 /sub
    HKEY_CURRENT_USER\SYSTEM62455 /sub

  • Click the Look button to start the scan.
  • When finished, a notepad window will open with the results of the scan. Please post this log in your next reply.
Note: The log can also be found on your Desktop entitled SystemLook.txt

Please post the logs and let me know if the problem persists.

#3 notinfallible

notinfallible
  • Topic Starter

  • Members
  • 118 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Everywhere and Nowhere
  • Local time:10:13 AM

Posted 02 February 2013 - 03:43 PM

Thank for your help!

Those three registry entries are still present.

Here are the requested logs.....

ComboFix 13-02-02.05 - Owner 02/02/2013 14:20:56.1.2 - x86
Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.2023.1507 [GMT -6:00]
Running from: c:\documents and settings\Owner\Desktop\ComboFix.exe
AV: Avira Desktop *Enabled/Updated* {AD166499-45F9-482A-A743-FDD3350758C7}
.
.
((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.
.
c:\documents and settings\Administrator\WINDOWS
c:\documents and settings\All Users\Application Data\TEMP
c:\documents and settings\Default User\WINDOWS
c:\documents and settings\Owner\WINDOWS
c:\windows\system32\config\systemprofile\WINDOWS
c:\windows\system32\drivers\npf.sys
c:\windows\system32\Packet.dll
c:\windows\system32\URTTemp
c:\windows\system32\URTTemp\fusion.dll
c:\windows\system32\URTTemp\mscoree.dll
c:\windows\system32\URTTemp\mscoree.dll.local
c:\windows\system32\URTTemp\mscorsn.dll
c:\windows\system32\URTTemp\mscorwks.dll
c:\windows\system32\URTTemp\msvcr71.dll
c:\windows\system32\URTTemp\regtlib.exe
c:\windows\system32\wpcap.dll
c:\windows\wallpg.exe
D:\Autorun.inf
.
Infected copy of c:\windows\system32\drivers\ntfs.sys was found and disinfected
Restored copy from - c:\windows\ServicePackFiles\i386\ntfs.sys
.
.
((((((((((((((((((((((((((((((((((((((( Drivers/Services )))))))))))))))))))))))))))))))))))))))))))))))))
.
.
-------\Legacy_NPF
-------\Service_NPF
.
.
((((((((((((((((((((((((( Files Created from 2013-01-02 to 2013-02-02 )))))))))))))))))))))))))))))))
.
.
2013-01-28 19:07 . 2013-01-28 19:07 -------- d-sh--w- c:\documents and settings\LocalService\IETldCache
2013-01-22 14:44 . 2013-01-26 09:23 -------- d-----w- c:\documents and settings\Owner\Application Data\Publish Providers
2013-01-22 14:41 . 2013-01-22 14:41 -------- d-----w- c:\documents and settings\Owner\Local Settings\Application Data\Sony
2013-01-22 14:38 . 2002-12-17 22:23 33340 ------w- c:\windows\system32\dbmsqlgc.dll
2013-01-22 14:38 . 2002-10-20 20:05 24576 ------w- c:\windows\system32\dbmsgnet.dll
2013-01-22 14:38 . 2013-01-22 14:38 -------- d-----w- c:\program files\Microsoft SQL Server
2013-01-22 14:37 . 2013-01-28 12:06 -------- d-----w- c:\documents and settings\Owner\Application Data\Sony
2013-01-22 14:36 . 2013-01-22 14:37 -------- d-----w- c:\documents and settings\All Users\Application Data\Sony
2013-01-22 14:36 . 2013-01-22 14:36 -------- d-----w- c:\program files\Sony
2013-01-22 14:36 . 2013-01-22 14:36 -------- d-----w- c:\program files\Sony Setup
2013-01-20 05:04 . 2013-01-20 05:04 -------- d-----w- c:\program files\FileASSASSIN
2013-01-20 02:42 . 2013-01-20 02:42 -------- d-----w- c:\documents and settings\Owner\Application Data\Foxit Software
2013-01-18 20:44 . 2013-01-18 20:44 -------- d-----w- c:\documents and settings\Owner\Application Data\Apple Computer
2013-01-17 05:17 . 2013-01-17 05:17 143872 ----a-w- c:\windows\system32\javacpl.cpl
2013-01-17 05:17 . 2013-01-17 05:17 94112 ----a-w- c:\windows\system32\WindowsAccessBridge.dll
2013-01-11 18:27 . 2013-01-11 18:29 -------- d-----w- c:\documents and settings\All Users\Application Data\Protexis
2013-01-11 18:27 . 2013-01-11 18:27 -------- d-----w- c:\documents and settings\Owner\Application Data\Corel
2013-01-11 17:47 . 2013-01-11 17:47 -------- d--h--w- c:\windows\PIF
2013-01-11 15:52 . 2013-01-11 15:52 -------- d-----w- c:\documents and settings\Owner\Application Data\Ulead Systems
2013-01-11 15:52 . 2013-01-11 15:52 -------- d-----w- c:\documents and settings\Owner\Local Settings\Application Data\Corel PaintShop Pro
2013-01-11 15:52 . 2013-01-11 15:52 -------- d-----w- c:\program files\Common Files\Protexis
2013-01-11 15:52 . 2013-01-11 15:52 -------- d-----w- c:\documents and settings\All Users\Application Data\Corel
2013-01-11 13:44 . 2013-01-11 13:44 -------- d-----w- c:\documents and settings\Owner\Local Settings\Application Data\Apple Computer
2013-01-11 05:24 . 2013-01-11 05:24 -------- d-----w- c:\documents and settings\All Users\Application Data\Yahoo!
2013-01-11 04:07 . 2013-01-31 23:59 -------- d-----w- C:\Muhbleep Educational
2013-01-09 14:29 . 2013-01-09 14:29 -------- d-----w- c:\windows\system32\syncdb
2013-01-08 07:58 . 2013-01-08 07:58 -------- d-----w- c:\program files\Foxit Software
2013-01-07 05:08 . 2013-01-07 05:08 -------- d-----w- C:\Intel
2013-01-07 05:07 . 2013-01-07 05:07 -------- d-----w- c:\program files\SystemRequirementsLab
2013-01-06 22:33 . 2013-01-06 22:33 -------- d-----w- c:\program files\Common Files\Adobe AIR
2013-01-06 22:27 . 2013-01-09 14:31 -------- d-----w- c:\program files\Common Files\Adobe
2013-01-06 18:16 . 2013-01-06 18:16 -------- d-----w- c:\documents and settings\All Users\CyberLink
2013-01-06 18:14 . 2013-01-06 18:15 -------- d-----w- c:\documents and settings\Owner\Application Data\CyberLink
2013-01-06 18:01 . 2013-01-06 19:41 143360 ----a-w- c:\program files\Internet Explorer\PLUGINS\npqtplugin7.dll
2013-01-06 18:01 . 2013-01-06 18:01 -------- d-----w- c:\program files\QuickTime
2013-01-05 23:59 . 2013-01-17 11:05 -------- d-----w- c:\program files\PokerStars
.
.
.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2013-01-20 03:40 . 2012-12-18 11:18 697864 ----a-w- c:\windows\system32\FlashPlayerApp.exe
2013-01-20 03:40 . 2012-12-18 11:18 74248 ----a-w- c:\windows\system32\FlashPlayerCPLApp.cpl
2013-01-17 05:17 . 2012-12-13 00:47 859552 ----a-w- c:\windows\system32\npDeployJava1.dll
2013-01-12 09:30 . 2012-12-13 00:47 780192 ----a-w- c:\windows\system32\deployJava1.dll
2012-12-27 10:52 . 2012-12-12 20:29 409600 ----a-w- c:\windows\system32\wrap_oal.dll
2012-12-27 10:52 . 2012-12-12 20:29 114688 ----a-w- c:\windows\system32\OpenAL32.dll
2012-12-16 12:23 . 2004-10-28 00:51 290560 ----a-w- c:\windows\system32\atmfd.dll
2012-12-16 04:04 . 2012-12-16 03:19 118784 ----a-w- c:\windows\dsdxirmv.exe
2012-12-15 08:12 . 2012-12-15 08:12 35144 ----a-w- c:\windows\system32\drivers\mbamchameleon.sys
2012-12-14 22:49 . 2012-12-12 12:49 21104 ----a-w- c:\windows\system32\drivers\mbam.sys
2012-11-27 16:01 . 2012-12-12 19:49 83944 ----a-w- c:\windows\system32\drivers\avgntflt.sys
2012-11-22 21:51 . 2012-12-12 19:49 36552 ----a-w- c:\windows\system32\drivers\avkmgr.sys
2012-11-22 21:50 . 2012-12-12 19:49 134336 ----a-w- c:\windows\system32\drivers\avipbb.sys
2012-11-13 01:25 . 2004-10-28 00:52 1866368 ----a-w- c:\windows\system32\win32k.sys
2012-11-06 02:01 . 2008-04-14 00:12 1371648 ----a-w- c:\windows\system32\msxml6.dll
.
.
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"avgnt"="c:\program files\Avira\AntiVir Desktop\avgnt.exe" [2012-12-04 384800]
.
[hkey_local_machine\software\microsoft\windows\currentversion\explorer\ShellExecuteHooks]
"{5AE067D3-9AFB-48E0-853A-EBB7F4A000DA}"= "c:\program files\SUPERAntiSpyware\SASSEH.DLL" [2011-07-19 113024]
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\!SASCORE]
@=""
.
[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecAntiVirus]
"DisableMonitoring"=dword:00000001
.
[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecFirewall]
"DisableMonitoring"=dword:00000001
.
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"c:\\WINDOWS\\system32\\sessmgr.exe"=
"c:\\Program Files\\Yahoo!\\Messenger\\YahooMessenger.exe"=
"c:\\Program Files\\uTorrent\\uTorrent.exe"=
"c:\\Program Files\\Winamp\\winamp.exe"=
"c:\\Program Files\\Cakewalk\\Shared Utilities\\VstScan.exe"=
"c:\\Program Files\\Image-Line\\FL Studio 10\\FL.exe"=
"c:\\Program Files\\Image-Line\\FL Studio 10\\FL (extended memory).exe"=
.
R1 avkmgr;avkmgr;c:\windows\system32\drivers\avkmgr.sys [12/12/2012 1:49 PM 36552]
R1 SASDIFSV;SASDIFSV;c:\program files\SUPERAntiSpyware\sasdifsv.sys [7/22/2011 10:27 AM 12880]
R1 SASKUTIL;SASKUTIL;c:\program files\SUPERAntiSpyware\SASKUTIL.SYS [7/12/2011 3:55 PM 67664]
R2 AntiVirSchedulerService;Avira Scheduler;c:\program files\Avira\AntiVir Desktop\sched.exe [12/12/2012 1:49 PM 85280]
S3 cpudrv;cpudrv;c:\program files\SystemRequirementsLab\cpudrv.sys [6/2/2011 11:08 AM 11336]
S3 mbamchameleon;mbamchameleon;c:\windows\system32\drivers\mbamchameleon.sys [12/15/2012 2:12 AM 35144]
S4 !SASCORE;SAS Core Service;c:\program files\SUPERAntiSpyware\SASCore.exe [7/11/2012 12:54 PM 116608]
.
--- Other Services/Drivers In Memory ---
.
*NewlyCreated* - WS2IFSL
.
.
------- Supplementary Scan -------
.
uStart Page = hxxp://www.google.com/
uInternet Connection Wizard,ShellNext = iexplore
uInternet Settings,ProxyServer = socks=127.0.0.1:9050
IE: Translate this web page with Babylon - c:\program files\Babylon\Babylon-Pro\Utils\BabylonIEPI.dll/ActionTU.htm
IE: Translate with Babylon - c:\program files\Babylon\Babylon-Pro\Utils\BabylonIEPI.dll/Action.htm
TCP: DhcpNameServer = 192.168.1.1
.
.
**************************************************************************
.
catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2013-02-02 14:27
Windows 5.1.2600 Service Pack 3 NTFS
.
scanning hidden processes ...
.
scanning hidden autostart entries ...
.
scanning hidden files ...
.
scan completed successfully
hidden files: 0
.
**************************************************************************
.
--------------------- LOCKED REGISTRY KEYS ---------------------
.
[HKEY_USERS\S-1-5-21-2812816725-259085315-3698690733-1006\Software\Image-Line\FL Studio 10\Devices\MIDI output\"!n*À*]
"Port"="-1"
"Sync"="0"
.
[HKEY_USERS\S-1-5-21-2812816725-259085315-3698690733-1006\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.*png*Öš|¾ZÉeú]
@Class="Shell"
@Allowed: (Read) (RestrictedCode)
@Allowed: (Read) (RestrictedCode)
.
[HKEY_USERS\S-1-5-21-2812816725-259085315-3698690733-1006\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.*png*Öš|¾ZÉeú\OpenWithList]
@Class="Shell"
"a"="Corel PaintShop Pro.exe"
"MRUList"="a"
.
[HKEY_USERS\S-1-5-21-2812816725-259085315-3698690733-1006\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.*png*Öš|¾Z³½Û]
@Class="Shell"
@Allowed: (Read) (RestrictedCode)
@Allowed: (Read) (RestrictedCode)
.
[HKEY_USERS\S-1-5-21-2812816725-259085315-3698690733-1006\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.*png*Öš|¾Z³½Û\OpenWithList]
@Class="Shell"
"a"="Corel PaintShop Pro.exe"
"MRUList"="a"
.
[HKEY_USERS\S-1-5-21-2812816725-259085315-3698690733-1006\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.*jp2*Öš|¾Zby!]
@Class="Shell"
@Allowed: (Read) (RestrictedCode)
@Allowed: (Read) (RestrictedCode)
.
[HKEY_USERS\S-1-5-21-2812816725-259085315-3698690733-1006\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.*jp2*Öš|¾Zby!\OpenWithList]
@Class="Shell"
"a"="Corel PaintShop Pro.exe"
"MRUList"="a"
.
[HKEY_USERS\S-1-5-21-2812816725-259085315-3698690733-1006\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.*jpg*Öš|¾ZÄ+4£]
@Class="Shell"
@Allowed: (Read) (RestrictedCode)
@Allowed: (Read) (RestrictedCode)
.
[HKEY_USERS\S-1-5-21-2812816725-259085315-3698690733-1006\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.*jpg*Öš|¾ZÄ+4£\OpenWithList]
@Class="Shell"
"a"="Corel PaintShop Pro.exe"
"MRUList"="a"
.
[HKEY_USERS\S-1-5-21-2812816725-259085315-3698690733-1006\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.*jpg*Öš|¾ZúJx']
@Class="Shell"
@Allowed: (Read) (RestrictedCode)
@Allowed: (Read) (RestrictedCode)
.
[HKEY_USERS\S-1-5-21-2812816725-259085315-3698690733-1006\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.*jpg*Öš|¾ZúJx'\OpenWithList]
@Class="Shell"
"a"="Corel PaintShop Pro.exe"
"MRUList"="a"
.
[HKEY_USERS\S-1-5-21-2812816725-259085315-3698690733-1006\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.*jpg*Öš|¾ZñÀ1¦]
@Class="Shell"
@Allowed: (Read) (RestrictedCode)
@Allowed: (Read) (RestrictedCode)
.
[HKEY_USERS\S-1-5-21-2812816725-259085315-3698690733-1006\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.*jpg*Öš|¾ZñÀ1¦\OpenWithList]
@Class="Shell"
"a"="Corel PaintShop Pro.exe"
"MRUList"="a"
.
[HKEY_USERS\S-1-5-21-2812816725-259085315-3698690733-1006\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.*jpg*Öš|¾Zø#s¿_]
@Class="Shell"
@Allowed: (Read) (RestrictedCode)
@Allowed: (Read) (RestrictedCode)
.
[HKEY_USERS\S-1-5-21-2812816725-259085315-3698690733-1006\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.*jpg*Öš|¾Zø#s¿_\OpenWithList]
@Class="Shell"
"a"="Corel PaintShop Pro.exe"
"MRUList"="a"
.
[HKEY_USERS\S-1-5-21-2812816725-259085315-3698690733-1006\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.*jpg*Öš|¾Zøsu¿_]
@Class="Shell"
@Allowed: (Read) (RestrictedCode)
@Allowed: (Read) (RestrictedCode)
.
[HKEY_USERS\S-1-5-21-2812816725-259085315-3698690733-1006\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.*jpg*Öš|¾Zøsu¿_\OpenWithList]
@Class="Shell"
"a"="Corel PaintShop Pro.exe"
"MRUList"="a"
.
[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}]
@Denied: (A 2) (Everyone)
@="FlashBroker"
"LocalizedString"="@c:\\WINDOWS\\system32\\Macromed\\Flash\\FlashUtil32_11_5_502_146_ActiveX.exe,-101"
.
[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\Elevation]
"Enabled"=dword:00000001
.
[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\LocalServer32]
@="c:\\WINDOWS\\system32\\Macromed\\Flash\\FlashUtil32_11_5_502_146_ActiveX.exe"
.
[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\TypeLib]
@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"
.
[HKEY_LOCAL_MACHINE\software\Classes\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}]
@Denied: (A 2) (Everyone)
@="IFlashBroker5"
.
[HKEY_LOCAL_MACHINE\software\Classes\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}\ProxyStubClsid32]
@="{00020424-0000-0000-C000-000000000046}"
.
[HKEY_LOCAL_MACHINE\software\Classes\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}\TypeLib]
@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"
"Version"="1.0"
.
[HKEY_LOCAL_MACHINE\software\Classes\VideoLAN.VLCPlugin.*1*]
@="?????????????????? v1"
.
[HKEY_LOCAL_MACHINE\software\Classes\VideoLAN.VLCPlugin.*1*\CLSID]
@="{E23FE9C6-778E-49D4-B537-38FCDE4887D8}"
.
[HKEY_LOCAL_MACHINE\software\Classes\VideoLAN.VLCPlugin.*2*]
@="?????????????????? v2"
.
[HKEY_LOCAL_MACHINE\software\Classes\VideoLAN.VLCPlugin.*2*\CLSID]
@="{9BE31822-FDAD-461B-AD51-BE1D1C159921}"
.
--------------------- DLLs Loaded Under Running Processes ---------------------
.
- - - - - - - > 'explorer.exe'(200)
c:\windows\system32\WININET.dll
c:\windows\system32\ieframe.dll
c:\windows\system32\webcheck.dll
c:\windows\system32\WPDShServiceObj.dll
c:\windows\system32\PortableDeviceTypes.dll
c:\windows\system32\PortableDeviceApi.dll
.
------------------------ Other Running Processes ------------------------
.
c:\program files\Avira\AntiVir Desktop\avguard.exe
c:\program files\Avira\AntiVir Desktop\avshadow.exe
.
**************************************************************************
.
Completion time: 2013-02-02 14:31:11 - machine was rebooted
ComboFix-quarantined-files.txt 2013-02-02 20:31
.
Pre-Run: 61,826,072,576 bytes free
Post-Run: 61,651,582,976 bytes free
.
WindowsXP-KB310994-SP2-Pro-BootDisk-ENU.exe
[boot loader]
timeout=2
default=multi(0)disk(0)rdisk(0)partition(1)\WINDOWS
[operating systems]
c:\cmdcons\BOOTSECT.DAT="Microsoft Windows Recovery Console" /cmdcons
UnsupportedDebug="do not select this" /debug
multi(0)disk(0)rdisk(0)partition(1)\WINDOWS="Windows XP Media Center Edition" /noexecute=optin /fastdetect
[spybotsd]
timeout.old=30
.
- - End Of File - - BFB37F5226485B452B5F746539EB13EE


Results of screen317's Security Check version 0.99.57
Windows XP Service Pack 3 x86
Internet Explorer 8
``````````````Antivirus/Firewall Check:``````````````
Windows Firewall Enabled!
Please wait while WMIC compiles updated MOF files.d
i
s
p
l
a
y
N
a
m
e
ECHO is off.
A
v
i
r
a
ECHO is off.
D
e
s
k
t
o
p
ECHO is off.
Antivirus up to date!
`````````Anti-malware/Other Utilities Check:`````````
Spybot - Search & Destroy
SUPERAntiSpyware
Malwarebytes Anti-Malware version 1.70.0.1100
CCleaner
Java 7 Update 11
````````Process Check: objlist.exe by Laurent````````
Avira Antivir avgnt.exe
Avira Antivir avguard.exe
`````````````````System Health check`````````````````
Total Fragmentation on Drive C:: 0%
````````````````````End of Log``````````````````````


# AdwCleaner v2.109 - Logfile created 02/02/2013 at 14:37:08
# Updated 26/01/2013 by Xplode
# Operating system : Microsoft Windows XP Service Pack 3 (32 bits)
# User : Owner - YOUR-1F482D957D
# Boot Mode : Normal
# Running from : C:\Documents and Settings\Owner\Desktop\adwcleaner.exe
# Option [Search]


***** [Services] *****


***** [Files / Folders] *****


***** [Registry] *****

Key Found : HKCU\Software\Microsoft\Internet Explorer\MenuExt\Translate this web page with Babylon
Key Found : HKCU\Software\Microsoft\Internet Explorer\MenuExt\Translate with Babylon
Key Found : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{F72841F0-4EF1-4DF5-BCE5-B3AC8ACF5478}
Key Found : HKLM\SOFTWARE\Classes\AppID\{B16632F1-24E0-4D99-A68D-70BFB6447C48}
Key Found : HKLM\SOFTWARE\Classes\AppID\BabylonIEPI.DLL
Key Found : HKLM\SOFTWARE\Classes\AxMetaStream.MetaStreamCtl
Key Found : HKLM\SOFTWARE\Classes\AxMetaStream.MetaStreamCtl.1
Key Found : HKLM\SOFTWARE\Classes\AxMetaStream.MetaStreamCtlSecondary
Key Found : HKLM\SOFTWARE\Classes\AxMetaStream.MetaStreamCtlSecondary.1
Key Found : HKLM\SOFTWARE\Classes\Prod.cap
Key Found : HKLM\SOFTWARE\Google\Chrome\Extensions\dhkplhfnhceodhffomolpfigojocbpcb
Key Found : HKLM\SOFTWARE\Microsoft\Active Setup\Installed Components\{03F998B2-0E00-11D3-A498-00104B6EB52E}
Key Found : HKLM\SOFTWARE\Microsoft\Active Setup\Installed Components\{1B00725B-C455-4DE6-BFB6-AD540AD427CD}
Key Found : HKLM\Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\0FF2AEFF45EEA0A48A4B33C1973B6094
Key Found : HKLM\Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\305B09CE8C53A214DB58887F62F25536
Key Found : HKLM\Software\Viewpoint

***** [Internet Browsers] *****

-\\ Internet Explorer v8.0.6001.18702

[OK] Registry is clean.

*************************

AdwCleaner[R1].txt - [1889 octets] - [02/02/2013 14:37:08]

########## EOF - C:\AdwCleaner[R1].txt - [1949 octets] ##########


SystemLook 30.07.11 by jpshortstuff
Log created at 14:39 on 02/02/2013 by Owner
Administrator - Elevation successful

========== reg ==========

[HKEY_CURRENT_USER\SYSTEM2544]
(No values found)


[HKEY_CURRENT_USER\SYSTEM52216]
(No values found)


[HKEY_CURRENT_USER\SYSTEM62455]
(No values found)


-= EOF =-

Edited by notinfallible, 02 February 2013 - 06:09 PM.

The most important thing in communication is to hear what isn't being said.

#4 nasdaq

nasdaq

  • Malware Response Team
  • 40,461 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Montreal, QC. Canada
  • Local time:11:13 AM

Posted 03 February 2013 - 09:49 AM

Secure your system by updating 3rd party programs.

Your version of Java is outdated and needs to be updated to take advantage of fixes that have eliminated security vulnerabilities.

Be careful not to install malware posing as Java update!
Important read this blog.
http://blog.trendmicro.com/trendlabs-security-intelligence/malware-poses-as-an-update-for-java-0-day-fix/

Quoted from the page.
"In light of the recent events surrounding Java, users must seriously consider their use of Java. Do they really need it? If yes, make sure that users follow the steps we recommended and get the security update directly from the official oracle website." at:
http://www.oracle.com/technetwork/java/javase/downloads/index.html

How to disable Java in your browsers
http://www.infoworld.com/t/web-browsers/how-disable-java-in-your-browsers-210882

You can manually check your present version and update as recommended.
https://www.java.com/en/download/installed.jsp

If present remove the old version(s) of Java using the Add/Remove Programs applet.


Java 7 Update 11


Java 7 update 10 introduced important new security controls
You can read about it here.
http://nakedsecurity.sophos.com/2012/12/19/java-7-update-10-introduces-important-new-security-controls/

Note
Java security update installs Ask Toolbar by default -- a single click in a multi-step installer.
http://www.benedelman.org/images/iac-jan13/ask-iac-011613-small.png
I suggest that your un-check the box "Install the Ask Toolbar" before proceeding.
===

  • Close all open programs and internet browsers.
  • Double click on AdwCleaner.exe to run the tool.
  • Click on Delete.
  • Everything that was found will be deleted.
  • Follow the prompts to reboot the computer. A text file will open after the restart.
  • Please post the content of that log file with your next answer.
  • You can find the log file at C:\AdwCleaner[Sn].txt (n is a number)..
===


Open notepad and copy/paste the text in the quote box below into it:

Registry::
[-HKEY_CURRENT_USER\SYSTEM2544]
[-HKEY_CURRENT_USER\SYSTEM52216]
[-HKEY_CURRENT_USER\SYSTEM62455]

ClearJavaCache::


Save this as CFScript.txt on your desktop.

Posted Image

Referring to the picture above, drag CFScript into ComboFix.exe
Then post the resultant log.

Let me know what problem persists.

#5 notinfallible

notinfallible
  • Topic Starter

  • Members
  • 118 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Everywhere and Nowhere
  • Local time:10:13 AM

Posted 03 February 2013 - 06:49 PM

Thanks again for your help!

The registry entries are now gone!

Here are the requested logs.....

# AdwCleaner v2.109 - Logfile created 02/03/2013 at 17:29:42
# Updated 26/01/2013 by Xplode
# Operating system : Microsoft Windows XP Service Pack 3 (32 bits)
# User : Owner - YOUR-1F482D957D
# Boot Mode : Normal
# Running from : C:\Documents and Settings\Owner\Desktop\adwcleaner.exe
# Option [Delete]


***** [Services] *****


***** [Files / Folders] *****


***** [Registry] *****

Key Deleted : HKCU\Software\Microsoft\Internet Explorer\MenuExt\Translate this web page with Babylon
Key Deleted : HKCU\Software\Microsoft\Internet Explorer\MenuExt\Translate with Babylon
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{F72841F0-4EF1-4DF5-BCE5-B3AC8ACF5478}
Key Deleted : HKLM\SOFTWARE\Classes\AppID\{B16632F1-24E0-4D99-A68D-70BFB6447C48}
Key Deleted : HKLM\SOFTWARE\Classes\AppID\BabylonIEPI.DLL
Key Deleted : HKLM\SOFTWARE\Classes\AxMetaStream.MetaStreamCtl
Key Deleted : HKLM\SOFTWARE\Classes\AxMetaStream.MetaStreamCtl.1
Key Deleted : HKLM\SOFTWARE\Classes\AxMetaStream.MetaStreamCtlSecondary
Key Deleted : HKLM\SOFTWARE\Classes\AxMetaStream.MetaStreamCtlSecondary.1
Key Deleted : HKLM\SOFTWARE\Classes\Prod.cap
Key Deleted : HKLM\SOFTWARE\Google\Chrome\Extensions\dhkplhfnhceodhffomolpfigojocbpcb
Key Deleted : HKLM\SOFTWARE\Microsoft\Active Setup\Installed Components\{03F998B2-0E00-11D3-A498-00104B6EB52E}
Key Deleted : HKLM\SOFTWARE\Microsoft\Active Setup\Installed Components\{1B00725B-C455-4DE6-BFB6-AD540AD427CD}
Key Deleted : HKLM\Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\0FF2AEFF45EEA0A48A4B33C1973B6094
Key Deleted : HKLM\Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\305B09CE8C53A214DB58887F62F25536
Key Deleted : HKLM\Software\Viewpoint

***** [Internet Browsers] *****

-\\ Internet Explorer v8.0.6001.18702

[OK] Registry is clean.

*************************

AdwCleaner[R1].txt - [2018 octets] - [02/02/2013 14:37:08]
AdwCleaner[S1].txt - [1981 octets] - [03/02/2013 17:29:42]

########## EOF - C:\AdwCleaner[S1].txt - [2041 octets] ##########

ComboFix 13-02-02.05 - Owner 02/03/2013 17:36:37.2.2 - x86
Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.2023.1512 [GMT -6:00]
Running from: c:\documents and settings\Owner\Desktop\ComboFix.exe
Command switches used :: c:\documents and settings\Owner\Desktop\CFScript.txt
AV: Avira Desktop *Enabled/Updated* {AD166499-45F9-482A-A743-FDD3350758C7}
.
.
((((((((((((((((((((((((( Files Created from 2013-01-03 to 2013-02-03 )))))))))))))))))))))))))))))))
.
.
2013-01-28 19:07 . 2013-01-28 19:07 -------- d-sh--w- c:\documents and settings\LocalService\IETldCache
2013-01-22 14:44 . 2013-01-26 09:23 -------- d-----w- c:\documents and settings\Owner\Application Data\Publish Providers
2013-01-22 14:41 . 2013-01-22 14:41 -------- d-----w- c:\documents and settings\Owner\Local Settings\Application Data\Sony
2013-01-22 14:38 . 2002-12-17 22:23 33340 ------w- c:\windows\system32\dbmsqlgc.dll
2013-01-22 14:38 . 2002-10-20 20:05 24576 ------w- c:\windows\system32\dbmsgnet.dll
2013-01-22 14:38 . 2013-01-22 14:38 -------- d-----w- c:\program files\Microsoft SQL Server
2013-01-22 14:37 . 2013-01-28 12:06 -------- d-----w- c:\documents and settings\Owner\Application Data\Sony
2013-01-22 14:36 . 2013-01-22 14:37 -------- d-----w- c:\documents and settings\All Users\Application Data\Sony
2013-01-22 14:36 . 2013-01-22 14:36 -------- d-----w- c:\program files\Sony
2013-01-22 14:36 . 2013-01-22 14:36 -------- d-----w- c:\program files\Sony Setup
2013-01-20 05:04 . 2013-01-20 05:04 -------- d-----w- c:\program files\FileASSASSIN
2013-01-20 02:42 . 2013-01-20 02:42 -------- d-----w- c:\documents and settings\Owner\Application Data\Foxit Software
2013-01-18 20:44 . 2013-01-18 20:44 -------- d-----w- c:\documents and settings\Owner\Application Data\Apple Computer
2013-01-11 18:27 . 2013-01-11 18:29 -------- d-----w- c:\documents and settings\All Users\Application Data\Protexis
2013-01-11 18:27 . 2013-01-11 18:27 -------- d-----w- c:\documents and settings\Owner\Application Data\Corel
2013-01-11 17:47 . 2013-01-11 17:47 -------- d--h--w- c:\windows\PIF
2013-01-11 15:52 . 2013-01-11 15:52 -------- d-----w- c:\documents and settings\Owner\Application Data\Ulead Systems
2013-01-11 15:52 . 2013-01-11 15:52 -------- d-----w- c:\documents and settings\Owner\Local Settings\Application Data\Corel PaintShop Pro
2013-01-11 15:52 . 2013-01-11 15:52 -------- d-----w- c:\program files\Common Files\Protexis
2013-01-11 15:52 . 2013-01-11 15:52 -------- d-----w- c:\documents and settings\All Users\Application Data\Corel
2013-01-11 13:44 . 2013-01-11 13:44 -------- d-----w- c:\documents and settings\Owner\Local Settings\Application Data\Apple Computer
2013-01-11 05:24 . 2013-01-11 05:24 -------- d-----w- c:\documents and settings\All Users\Application Data\Yahoo!
2013-01-11 04:07 . 2013-01-31 23:59 -------- d-----w- C:\Muhbleep Educational
2013-01-09 14:29 . 2013-01-09 14:29 -------- d-----w- c:\windows\system32\syncdb
2013-01-08 07:58 . 2013-01-08 07:58 -------- d-----w- c:\program files\Foxit Software
2013-01-07 05:08 . 2013-01-07 05:08 -------- d-----w- C:\Intel
2013-01-07 05:07 . 2013-01-07 05:07 -------- d-----w- c:\program files\SystemRequirementsLab
2013-01-06 22:33 . 2013-01-06 22:33 -------- d-----w- c:\program files\Common Files\Adobe AIR
2013-01-06 22:27 . 2013-01-09 14:31 -------- d-----w- c:\program files\Common Files\Adobe
2013-01-06 18:16 . 2013-01-06 18:16 -------- d-----w- c:\documents and settings\All Users\CyberLink
2013-01-06 18:14 . 2013-01-06 18:15 -------- d-----w- c:\documents and settings\Owner\Application Data\CyberLink
2013-01-06 18:01 . 2013-01-06 19:41 143360 ----a-w- c:\program files\Internet Explorer\PLUGINS\npqtplugin7.dll
2013-01-06 18:01 . 2013-01-06 18:01 -------- d-----w- c:\program files\QuickTime
2013-01-05 23:59 . 2013-01-17 11:05 -------- d-----w- c:\program files\PokerStars
.
.
.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2013-01-20 03:40 . 2012-12-18 11:18 697864 ----a-w- c:\windows\system32\FlashPlayerApp.exe
2013-01-20 03:40 . 2012-12-18 11:18 74248 ----a-w- c:\windows\system32\FlashPlayerCPLApp.cpl
2013-01-17 05:17 . 2012-12-13 00:47 859552 ----a-w- c:\windows\system32\npDeployJava1.dll
2013-01-17 05:17 . 2012-12-13 00:47 780192 ----a-w- c:\windows\system32\deployJava1.dll
2012-12-27 10:52 . 2012-12-12 20:29 409600 ----a-w- c:\windows\system32\wrap_oal.dll
2012-12-27 10:52 . 2012-12-12 20:29 114688 ----a-w- c:\windows\system32\OpenAL32.dll
2012-12-16 12:23 . 2004-10-28 00:51 290560 ----a-w- c:\windows\system32\atmfd.dll
2012-12-16 04:04 . 2012-12-16 03:19 118784 ----a-w- c:\windows\dsdxirmv.exe
2012-12-15 08:12 . 2012-12-15 08:12 35144 ----a-w- c:\windows\system32\drivers\mbamchameleon.sys
2012-12-14 22:49 . 2012-12-12 12:49 21104 ----a-w- c:\windows\system32\drivers\mbam.sys
2012-11-27 16:01 . 2012-12-12 19:49 83944 ----a-w- c:\windows\system32\drivers\avgntflt.sys
2012-11-22 21:51 . 2012-12-12 19:49 36552 ----a-w- c:\windows\system32\drivers\avkmgr.sys
2012-11-22 21:50 . 2012-12-12 19:49 134336 ----a-w- c:\windows\system32\drivers\avipbb.sys
2012-11-13 01:25 . 2004-10-28 00:52 1866368 ----a-w- c:\windows\system32\win32k.sys
2012-11-06 02:01 . 2008-04-14 00:12 1371648 ----a-w- c:\windows\system32\msxml6.dll
.
.
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"avgnt"="c:\program files\Avira\AntiVir Desktop\avgnt.exe" [2012-12-04 384800]
.
[hkey_local_machine\software\microsoft\windows\currentversion\explorer\ShellExecuteHooks]
"{5AE067D3-9AFB-48E0-853A-EBB7F4A000DA}"= "c:\program files\SUPERAntiSpyware\SASSEH.DLL" [2011-07-19 113024]
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\!SASCORE]
@=""
.
[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecAntiVirus]
"DisableMonitoring"=dword:00000001
.
[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecFirewall]
"DisableMonitoring"=dword:00000001
.
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"c:\\WINDOWS\\system32\\sessmgr.exe"=
"c:\\Program Files\\Yahoo!\\Messenger\\YahooMessenger.exe"=
"c:\\Program Files\\uTorrent\\uTorrent.exe"=
"c:\\Program Files\\Winamp\\winamp.exe"=
"c:\\Program Files\\Cakewalk\\Shared Utilities\\VstScan.exe"=
"c:\\Program Files\\Image-Line\\FL Studio 10\\FL.exe"=
"c:\\Program Files\\Image-Line\\FL Studio 10\\FL (extended memory).exe"=
.
R1 avkmgr;avkmgr;c:\windows\system32\drivers\avkmgr.sys [12/12/2012 1:49 PM 36552]
R1 SASDIFSV;SASDIFSV;c:\program files\SUPERAntiSpyware\sasdifsv.sys [7/22/2011 10:27 AM 12880]
R1 SASKUTIL;SASKUTIL;c:\program files\SUPERAntiSpyware\SASKUTIL.SYS [7/12/2011 3:55 PM 67664]
R2 AntiVirSchedulerService;Avira Scheduler;c:\program files\Avira\AntiVir Desktop\sched.exe [12/12/2012 1:49 PM 85280]
S3 cpudrv;cpudrv;c:\program files\SystemRequirementsLab\cpudrv.sys [6/2/2011 11:08 AM 11336]
S3 mbamchameleon;mbamchameleon;c:\windows\system32\drivers\mbamchameleon.sys [12/15/2012 2:12 AM 35144]
S4 !SASCORE;SAS Core Service;c:\program files\SUPERAntiSpyware\SASCore.exe [7/11/2012 12:54 PM 116608]
.
.
------- Supplementary Scan -------
.
uStart Page = hxxp://www.google.com/
uInternet Connection Wizard,ShellNext = iexplore
uInternet Settings,ProxyServer = socks=127.0.0.1:9050
TCP: DhcpNameServer = 192.168.1.1
.
.
**************************************************************************
.
catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2013-02-03 17:44
Windows 5.1.2600 Service Pack 3 NTFS
.
scanning hidden processes ...
.
scanning hidden autostart entries ...
.
scanning hidden files ...
.
scan completed successfully
hidden files: 0
.
**************************************************************************
.
--------------------- LOCKED REGISTRY KEYS ---------------------
.
[HKEY_USERS\S-1-5-21-2812816725-259085315-3698690733-1006\Software\Image-Line\FL Studio 10\Devices\MIDI output\"!n**]
"Port"="-1"
"Sync"="0"
.
[HKEY_USERS\S-1-5-21-2812816725-259085315-3698690733-1006\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.*png*֚|Ze]
@Class="Shell"
@Allowed: (Read) (RestrictedCode)
@Allowed: (Read) (RestrictedCode)
.
[HKEY_USERS\S-1-5-21-2812816725-259085315-3698690733-1006\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.*png*֚|Ze\OpenWithList]
@Class="Shell"
"a"="Corel PaintShop Pro.exe"
"MRUList"="a"
.
[HKEY_USERS\S-1-5-21-2812816725-259085315-3698690733-1006\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.*png*֚|Z]
@Class="Shell"
@Allowed: (Read) (RestrictedCode)
@Allowed: (Read) (RestrictedCode)
.
[HKEY_USERS\S-1-5-21-2812816725-259085315-3698690733-1006\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.*png*֚|Z\OpenWithList]
@Class="Shell"
"a"="Corel PaintShop Pro.exe"
"MRUList"="a"
.
[HKEY_USERS\S-1-5-21-2812816725-259085315-3698690733-1006\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.*jp2*֚|Zby!]
@Class="Shell"
@Allowed: (Read) (RestrictedCode)
@Allowed: (Read) (RestrictedCode)
.
[HKEY_USERS\S-1-5-21-2812816725-259085315-3698690733-1006\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.*jp2*֚|Zby!\OpenWithList]
@Class="Shell"
"a"="Corel PaintShop Pro.exe"
"MRUList"="a"
.
[HKEY_USERS\S-1-5-21-2812816725-259085315-3698690733-1006\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.*jpg*֚|Z+4]
@Class="Shell"
@Allowed: (Read) (RestrictedCode)
@Allowed: (Read) (RestrictedCode)
.
[HKEY_USERS\S-1-5-21-2812816725-259085315-3698690733-1006\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.*jpg*֚|Z+4\OpenWithList]
@Class="Shell"
"a"="Corel PaintShop Pro.exe"
"MRUList"="a"
.
[HKEY_USERS\S-1-5-21-2812816725-259085315-3698690733-1006\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.*jpg*֚|ZJx]
@Class="Shell"
@Allowed: (Read) (RestrictedCode)
@Allowed: (Read) (RestrictedCode)
.
[HKEY_USERS\S-1-5-21-2812816725-259085315-3698690733-1006\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.*jpg*֚|ZJx\OpenWithList]
@Class="Shell"
"a"="Corel PaintShop Pro.exe"
"MRUList"="a"
.
[HKEY_USERS\S-1-5-21-2812816725-259085315-3698690733-1006\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.*jpg*֚|Z1]
@Class="Shell"
@Allowed: (Read) (RestrictedCode)
@Allowed: (Read) (RestrictedCode)
.
[HKEY_USERS\S-1-5-21-2812816725-259085315-3698690733-1006\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.*jpg*֚|Z1\OpenWithList]
@Class="Shell"
"a"="Corel PaintShop Pro.exe"
"MRUList"="a"
.
[HKEY_USERS\S-1-5-21-2812816725-259085315-3698690733-1006\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.*jpg*֚|Z#s_]
@Class="Shell"
@Allowed: (Read) (RestrictedCode)
@Allowed: (Read) (RestrictedCode)
.
[HKEY_USERS\S-1-5-21-2812816725-259085315-3698690733-1006\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.*jpg*֚|Z#s_\OpenWithList]
@Class="Shell"
"a"="Corel PaintShop Pro.exe"
"MRUList"="a"
.
[HKEY_USERS\S-1-5-21-2812816725-259085315-3698690733-1006\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.*jpg*֚|Zsu_]
@Class="Shell"
@Allowed: (Read) (RestrictedCode)
@Allowed: (Read) (RestrictedCode)
.
[HKEY_USERS\S-1-5-21-2812816725-259085315-3698690733-1006\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.*jpg*֚|Zsu_\OpenWithList]
@Class="Shell"
"a"="Corel PaintShop Pro.exe"
"MRUList"="a"
.
[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}]
@Denied: (A 2) (Everyone)
@="FlashBroker"
"LocalizedString"="@c:\\WINDOWS\\system32\\Macromed\\Flash\\FlashUtil32_11_5_502_146_ActiveX.exe,-101"
.
[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\Elevation]
"Enabled"=dword:00000001
.
[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\LocalServer32]
@="c:\\WINDOWS\\system32\\Macromed\\Flash\\FlashUtil32_11_5_502_146_ActiveX.exe"
.
[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\TypeLib]
@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"
.
[HKEY_LOCAL_MACHINE\software\Classes\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}]
@Denied: (A 2) (Everyone)
@="IFlashBroker5"
.
[HKEY_LOCAL_MACHINE\software\Classes\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}\ProxyStubClsid32]
@="{00020424-0000-0000-C000-000000000046}"
.
[HKEY_LOCAL_MACHINE\software\Classes\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}\TypeLib]
@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"
"Version"="1.0"
.
[HKEY_LOCAL_MACHINE\software\Classes\VideoLAN.VLCPlugin.*1*]
@="?????????????????? v1"
.
[HKEY_LOCAL_MACHINE\software\Classes\VideoLAN.VLCPlugin.*1*\CLSID]
@="{E23FE9C6-778E-49D4-B537-38FCDE4887D8}"
.
[HKEY_LOCAL_MACHINE\software\Classes\VideoLAN.VLCPlugin.*2*]
@="?????????????????? v2"
.
[HKEY_LOCAL_MACHINE\software\Classes\VideoLAN.VLCPlugin.*2*\CLSID]
@="{9BE31822-FDAD-461B-AD51-BE1D1C159921}"
.
--------------------- DLLs Loaded Under Running Processes ---------------------
.
- - - - - - - > 'explorer.exe'(1572)
c:\windows\system32\WININET.dll
c:\windows\system32\ieframe.dll
c:\windows\system32\webcheck.dll
c:\windows\system32\WPDShServiceObj.dll
c:\windows\system32\PortableDeviceTypes.dll
c:\windows\system32\PortableDeviceApi.dll
.
Completion time: 2013-02-03 17:46:45
ComboFix-quarantined-files.txt 2013-02-03 23:46
ComboFix2.txt 2013-02-02 20:31
.
Pre-Run: 61,741,137,920 bytes free
Post-Run: 61,736,497,152 bytes free
.
- - End Of File - - F54EE4E2F1E7BCFC09B3611B251542D5



The most important thing in communication is to hear what isn't being said.

#6 nasdaq

nasdaq

  • Malware Response Team
  • 40,461 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Montreal, QC. Canada
  • Local time:11:13 AM

Posted 04 February 2013 - 08:24 AM

If all is well:

Time for some housekeeping

The following will implement some cleanup procedures as well as reset System Restore points:

Click Start > Run and copy/paste the following bold text into the Run box and click OK:

ComboFix /Uninstall
===

To remove AdwCleaner.

Please double click on AdwCleaner.exe to run the tool.
Click on Uninstall.
Confirm with Yes.

If you decide to keep the AdwCleaner tool make sure delete your version and download the latest before running it.

Delete the other tools we used.
You can Keep the DDS tool as most forum will ask to see a log before suggesting a fix.

Surf Safely, and Think Prevention!
===

#7 notinfallible

notinfallible
  • Topic Starter

  • Members
  • 118 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Everywhere and Nowhere
  • Local time:10:13 AM

Posted 05 February 2013 - 11:42 PM

Thank you for all your help!
The most important thing in communication is to hear what isn't being said.




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users