Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Department of Justice Virus


  • This topic is locked This topic is locked
21 replies to this topic

#1 J_Mot

J_Mot

  • Members
  • 32 posts
  • OFFLINE
  •  
  • Local time:08:06 PM

Posted 23 February 2013 - 05:29 PM

I downloaded the new DOJ virus yesterday on my work desktop Windows XP. I have read a lot on this forum about the virus and I have tried to get in to run Malwarebytes. But even in safe mode the virus blocks me from doing most things. However, I found as soon as I start in safemode I have 5-10 seconds before the virus blocks me. During that 5-10 seconds I can start Malwarebytes and once the virus starts to block me I can hit the reset button and the virus seems to go away allowing me to run Malwarebytes because the PC will not restart if Malwarebytes is running. Once I do a full scan Malwarebytes sees the Trojan and I have quarantined and deleted it but as soon as I delete the virus I get an Internet Problem message and it asks if I want to send or not. If I send or not the virus immediately rears its ugly head. But if I ignore the message I can continue on in the computer in safe-mode. Once I restart in regular mode the virus comes back again. I have no idea of what to try to do next. I am I completely out of ideas...HELP!!!
Thanks
 



BC AdBot (Login to Remove)

 


#2 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:08:06 PM

Posted 23 February 2013 - 08:26 PM


Hello J_Mot

Welcome to The Forums!!

Around here they call me Gringo and I'll be glad to help you with your malware problems.


Very Important --> Please read this post completely, I have spent my time to put together somethings for you to keep in mind while I am helping you to make things go easier, faster and smoother for both of us!

  • Please do not run any tools unless instructed to do so.
    • We ask you to run different tools in a specific order to ensure the malware is completely removed from your machine, and running any additional tools may detect false positives, interfere with our tools, or cause unforeseen damage or system instability.
  • Please do not attach logs or use code boxes, just copy and paste the text.
    • Due to the high volume of logs we receive it helps to receive everything in the same format, and code boxes make the logs very difficult to read. Also, attachments require us to download and open the reports when it is easier to just read the reports in your post.
  • Please read every post completely before doing anything.
    • Pay special attention to the NOTE: lines, these entries identify an individual issue or important step in the cleanup process.
  • Please provide feedback about your experience as we go.
    • A short statement describing how the computer is working helps us understand where to go next, for example: I am still getting redirected, the computer is running normally, etc. Please do not describe the computer as "the same", this requires the extra step of looking back at your previous post.
NOTE: At the top of your post, click on the "Follow This Topic" Button, make sure that the "Receive notification" box is checked and that it is set to "Instantly" - This will send you an e-mail as soon as I reply to your topic, allowing us to resolve the issue faster.

NOTE: Backup any files that cannot be replaced. Removing malware can be unpredictable and this step can save a lot of heartaches if things don't go as planed. You can put them on a CD/DVD, external drive or a pen drive, anywhere except on the computer.

NOTE: It is good practice to copy and paste the instructions into notepad and print them in case it is necessary for you to go offline during the cleanup process. To open notepad, navigate to Start Menu > All Programs > Accessories > Notepad. Please remember to copy the entire post so you do not miss any instructions.





I need to get some reports to get a base to start from so I need you to run these programs first.


-DeFogger-
  • Please download DeFogger to your desktop.

    Double click DeFogger to run the tool.
    • The application window will appear
    • Click the Disable button to disable your CD Emulation drivers
    • Click Yes to continue
    • A 'Finished!' message will appear
    • Click OK
    • DeFogger may ask you to reboot the machine, if it does - click OK
    Do not re-enable these drivers until otherwise instructed.

-Security Check-
  • Download Security Check by screen317 from here.
    • Save it to your Desktop.
    • Double click SecurityCheck.exe and follow the onscreen instructions inside of the black box.
    • A Notepad document should open automatically called checkup.txt; please post the contents of that document.
-Download DDS-
  • Please download DDS from one of the links below and save it to your desktop:

    dds_scr.gif
    Download DDS and save it to your desktop

    Link1
    Link2
    Link3
    • Double-Click on dds.scr and a command window will appear. This is normal.
    • Shortly after two logs will appear:
      • DDS.txt
      • Attach.txt
  • A window will open instructing you save & post the logs
  • Save the logs to a convenient place such as your desktop
  • Copy the contents of both logs & post in your next reply
information and logs
  • In your next post I need the following
    • both reports from DDS
      • report from security check
        • let me know of any problems you may have had
      Gringo



I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#3 J_Mot

J_Mot
  • Topic Starter

  • Members
  • 32 posts
  • OFFLINE
  •  
  • Local time:08:06 PM

Posted 24 February 2013 - 03:43 PM

Thanks for the help Gringo. Here are the logs I found.

 

==== Installed Programs ======================
.
Adobe Flash Player 11 ActiveX
Adobe Reader XI (11.0.02)
AiO_Scan
CCleaner
D-Link Corporation Control Program
D-Link DFE-530TX+
Enterprise
Google Talk Plugin
Hotfix for Windows XP (KB2779562)
Hotfix for Windows XP (KB952287)
HP PSC & Officejet 5.3.B Corporate Edition
Java 7 Update 10
Java Auto Updater
Malwarebytes Anti-Malware version 1.70.0.1100
Microsoft Application Error Reporting
Microsoft Office 2007 Service Pack 3 (SP3)
Microsoft Office Access MUI (English) 2007
Microsoft Office Access Setup Metadata MUI (English) 2007
Microsoft Office Enterprise 2007
Microsoft Office Excel MUI (English) 2007
Microsoft Office File Validation Add-In
Microsoft Office Groove MUI (English) 2007
Microsoft Office Groove Setup Metadata MUI (English) 2007
Microsoft Office InfoPath MUI (English) 2007
Microsoft Office OneNote MUI (English) 2007
Microsoft Office Outlook MUI (English) 2007
Microsoft Office PowerPoint MUI (English) 2007
Microsoft Office Proof (English) 2007
Microsoft Office Proof (French) 2007
Microsoft Office Proof (Spanish) 2007
Microsoft Office Proofing (English) 2007
Microsoft Office Proofing Tools 2007 Service Pack 3 (SP3)
Microsoft Office Publisher MUI (English) 2007
Microsoft Office Shared MUI (English) 2007
Microsoft Office Shared Setup Metadata MUI (English) 2007
Microsoft Office Word MUI (English) 2007
Microsoft Security Client
Microsoft Security Essentials
Microsoft Silverlight
Microsoft Software Update for Web Folders  (English) 12
MSN
MSXML 4.0 SP2 (KB954430)
MSXML 4.0 SP2 (KB973688)
Nero 8 Essentials
neroxml
QFolder
RealDownloader
RealNetworks - Microsoft Visual C++ 2008 Runtime
RealNetworks - Microsoft Visual C++ 2010 Runtime
RealPlayer
REALTEK GbE & FE Ethernet PCI NIC Driver
RealUpgrade 1.1
Scan
Security Update for Microsoft Office 2007 suites (KB2596615) 32-Bit Edition
Security Update for Microsoft Office 2007 suites (KB2596672) 32-Bit Edition
Security Update for Microsoft Office 2007 suites (KB2596744) 32-Bit Edition
Security Update for Microsoft Office 2007 suites (KB2596754) 32-Bit Edition
Security Update for Microsoft Office 2007 suites (KB2596785) 32-Bit Edition
Security Update for Microsoft Office 2007 suites (KB2596792) 32-Bit Edition
Security Update for Microsoft Office 2007 suites (KB2596871) 32-Bit Edition
Security Update for Microsoft Office 2007 suites (KB2597969) 32-Bit Edition
Security Update for Microsoft Office 2007 suites (KB2687311) 32-Bit Edition
Security Update for Microsoft Office 2007 suites (KB2687439) 32-Bit Edition
Security Update for Microsoft Office 2007 suites (KB2687441) 32-Bit Edition
Security Update for Microsoft Office 2007 suites (KB2687499) 32-Bit Edition
Security Update for Microsoft Office 2007 suites (KB2760416) 32-Bit Edition
Security Update for Microsoft Office Excel 2007 (KB2687307) 32-Bit Edition
Security Update for Microsoft Office InfoPath 2007 (KB2687440) 32-Bit Edition
Security Update for Microsoft Office PowerPoint 2007 (KB2596764) 32-Bit Edition
Security Update for Microsoft Office PowerPoint 2007 (KB2596912) 32-Bit Edition
Security Update for Microsoft Office Publisher 2007 (KB2596705) 32-Bit Edition
Security Update for Microsoft Office Word 2007 (KB2760421) 32-Bit Edition
Security Update for Microsoft Windows (KB2564958)
Security Update for Windows Internet Explorer 8 (KB2510531)
Security Update for Windows Internet Explorer 8 (KB2544521)
Security Update for Windows Internet Explorer 8 (KB2618444)
Security Update for Windows Internet Explorer 8 (KB2744842)
Security Update for Windows Internet Explorer 8 (KB2761465)
Security Update for Windows Internet Explorer 8 (KB2792100)
Security Update for Windows Internet Explorer 8 (KB2797052)
Security Update for Windows Internet Explorer 8 (KB2799329)
Security Update for Windows Internet Explorer 8 (KB982381)
Security Update for Windows Media Player (KB2378111)
Security Update for Windows Media Player (KB952069)
Security Update for Windows Media Player (KB954155)
Security Update for Windows Media Player (KB973540)
Security Update for Windows Media Player (KB975558)
Security Update for Windows Media Player (KB978695)
Security Update for Windows XP (KB2115168)
Security Update for Windows XP (KB2229593)
Security Update for Windows XP (KB2296011)
Security Update for Windows XP (KB2347290)
Security Update for Windows XP (KB2360937)
Security Update for Windows XP (KB2387149)
Security Update for Windows XP (KB2393802)
Security Update for Windows XP (KB2419632)
Security Update for Windows XP (KB2423089)
Security Update for Windows XP (KB2440591)
Security Update for Windows XP (KB2443105)
Security Update for Windows XP (KB2476490)
Security Update for Windows XP (KB2478960)
Security Update for Windows XP (KB2478971)
Security Update for Windows XP (KB2479943)
Security Update for Windows XP (KB2481109)
Security Update for Windows XP (KB2483185)
Security Update for Windows XP (KB2485663)
Security Update for Windows XP (KB2506212)
Security Update for Windows XP (KB2507938)
Security Update for Windows XP (KB2508429)
Security Update for Windows XP (KB2509553)
Security Update for Windows XP (KB2510581)
Security Update for Windows XP (KB2535512)
Security Update for Windows XP (KB2536276-v2)
Security Update for Windows XP (KB2544521)
Security Update for Windows XP (KB2544893-v2)
Security Update for Windows XP (KB2566454)
Security Update for Windows XP (KB2570947)
Security Update for Windows XP (KB2584146)
Security Update for Windows XP (KB2585542)
Security Update for Windows XP (KB2592799)
Security Update for Windows XP (KB2598479)
Security Update for Windows XP (KB2603381)
Security Update for Windows XP (KB2618451)
Security Update for Windows XP (KB2619339)
Security Update for Windows XP (KB2620712)
Security Update for Windows XP (KB2624667)
Security Update for Windows XP (KB2631813)
Security Update for Windows XP (KB2646524)
Security Update for Windows XP (KB2653956)
Security Update for Windows XP (KB2655992)
Security Update for Windows XP (KB2659262)
Security Update for Windows XP (KB2661637)
Security Update for Windows XP (KB2676562)
Security Update for Windows XP (KB2686509)
Security Update for Windows XP (KB2691442)
Security Update for Windows XP (KB2698365)
Security Update for Windows XP (KB2705219-v2)
Security Update for Windows XP (KB2712808)
Security Update for Windows XP (KB2719985)
Security Update for Windows XP (KB2723135-v2)
Security Update for Windows XP (KB2724197)
Security Update for Windows XP (KB2727528)
Security Update for Windows XP (KB2753842-v2)
Security Update for Windows XP (KB2757638)
Security Update for Windows XP (KB2758857)
Security Update for Windows XP (KB2761465)
Security Update for Windows XP (KB2770660)
Security Update for Windows XP (KB2778344)
Security Update for Windows XP (KB2779030)
Security Update for Windows XP (KB2780091)
Security Update for Windows XP (KB2799494)
Security Update for Windows XP (KB2802968)
Security Update for Windows XP (KB923561)
Security Update for Windows XP (KB941569)
Security Update for Windows XP (KB946648)
Security Update for Windows XP (KB950762)
Security Update for Windows XP (KB950974)
Security Update for Windows XP (KB951376-v2)
Security Update for Windows XP (KB952004)
Security Update for Windows XP (KB952954)
Security Update for Windows XP (KB956572)
Security Update for Windows XP (KB956744)
Security Update for Windows XP (KB956802)
Security Update for Windows XP (KB956844)
Security Update for Windows XP (KB959426)
Security Update for Windows XP (KB960803)
Security Update for Windows XP (KB960859)
Security Update for Windows XP (KB969059)
Security Update for Windows XP (KB970430)
Security Update for Windows XP (KB971657)
Security Update for Windows XP (KB972270)
Security Update for Windows XP (KB973507)
Security Update for Windows XP (KB973869)
Security Update for Windows XP (KB973904)
Security Update for Windows XP (KB974112)
Security Update for Windows XP (KB974318)
Security Update for Windows XP (KB974392)
Security Update for Windows XP (KB974571)
Security Update for Windows XP (KB975025)
Security Update for Windows XP (KB975467)
Security Update for Windows XP (KB975560)
Security Update for Windows XP (KB975713)
Security Update for Windows XP (KB977816)
Security Update for Windows XP (KB977914)
Security Update for Windows XP (KB978338)
Security Update for Windows XP (KB978542)
Security Update for Windows XP (KB978706)
Security Update for Windows XP (KB979309)
Security Update for Windows XP (KB979482)
Security Update for Windows XP (KB979687)
Security Update for Windows XP (KB981322)
Security Update for Windows XP (KB981997)
Security Update for Windows XP (KB982132)
Security Update for Windows XP (KB982665)
Update for 2007 Microsoft Office System (KB967642)
Update for Microsoft Office 2007 suites (KB2596620) 32-Bit Edition
Update for Microsoft Office 2007 suites (KB2596660) 32-Bit Edition
Update for Microsoft Office 2007 suites (KB2596802) 32-Bit Edition
Update for Microsoft Office 2007 suites (KB2596848) 32-Bit Edition
Update for Microsoft Office 2007 suites (KB2767916) 32-Bit Edition
Update for Microsoft Office Outlook 2007 (KB2687404) 32-Bit Edition
Update for Microsoft Office Outlook 2007 Junk Email Filter (KB2767848) 32-Bit Edition
Update for Windows Internet Explorer 8 (KB2598845)
Update for Windows XP (KB2345886)
Update for Windows XP (KB2467659)
Update for Windows XP (KB2661254-v2)
Update for Windows XP (KB2736233)
Update for Windows XP (KB2749655)
Update for Windows XP (KB898461)
Update for Windows XP (KB951978)
Update for Windows XP (KB955759)
Update for Windows XP (KB968389)
Update for Windows XP (KB971029)
Update for Windows XP (KB973815)
VCRedistSetup
VIA Rhine-Family Fast-Ethernet Adapter
VLC media player 2.0.5
WebFldrs XP
Windows Genuine Advantage Validation Tool (KB892130)
Windows Internet Explorer 8
Windows Media Format Runtime
WinRAR 4.20 (32-bit)
.
==== End Of File ===========================
 

 

 Results of screen317's Security Check version 0.99.59 
 Windows XP Service Pack 3 x86  
 Internet Explorer 8 
``````````````Antivirus/Firewall Check:``````````````
 Windows Security Center service is not running! This report may not be accurate!
 Microsoft Security Essentials   
`````````Anti-malware/Other Utilities Check:`````````
 Malwarebytes Anti-Malware version 1.70.0.1100 
 CCleaner    
 Java 7 Update 10 
 Java version out of Date!
 Adobe Reader XI 
````````Process Check: objlist.exe by Laurent```````` 
`````````````````System Health check`````````````````
 Total Fragmentation on Drive C:: 19% Defragment your hard drive soon! (Do NOT defrag if SSD!)
````````````````````End of Log``````````````````````
 

 

 

DDS (Ver_2012-11-20.01) - NTFS_x86 NETWORK
Internet Explorer: 8.0.6001.18702  BrowserJavaVersion: 10.10.2
Run by Administrator at 14:05:05 on 2013-02-24
.
============== Running Processes ================
.
c:\Program Files\Microsoft Security Client\MsMpEng.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\Malwarebytes' Anti-Malware\mbam.exe
C:\WINDOWS\system32\ctfmon.exe
C:\WINDOWS\system32\ctfmon.exe
C:\WINDOWS\system32\svchost.exe -k netsvcs
C:\WINDOWS\system32\svchost.exe -k NetworkService
C:\WINDOWS\system32\svchost.exe -k LocalService
.
============== Pseudo HJT Report ===============
.
BHO: Adobe PDF Link Helper: {18DF081C-E8AD-4283-A596-FA578C2EBDC3} - c:\program files\common files\adobe\acrobat\activex\AcroIEHelperShim.dll
BHO: RealNetworks Download and Record Plugin for Internet Explorer: {3049C3E9-B461-4BC5-8870-4C09146192CA} - c:\documents and settings\all users\application data\realnetworks\realdownloader\browserplugins\ie\rndlbrowserrecordplugin.dll
BHO: Groove GFS Browser Helper: {72853161-30C5-4D22-B7F9-0BBC1D38A37E} - c:\program files\microsoft office\office12\GrooveShellExtensions.dll
BHO: Java™ Plug-In SSV Helper: {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - c:\program files\java\jre7\bin\ssv.dll
BHO: Java™ Plug-In 2 SSV Helper: {DBC80044-A445-435b-BC74-9C25C1C588A9} - c:\program files\java\jre7\bin\jp2ssv.dll
uRun: [ctfmon.exe] c:\windows\system32\ctfmon.exe
uRunOnce: [NeroHomeFirstStart] "c:\program files\common files\nero\lib\NMFirstStart.exe"
mRun: [VTTimer] VTTimer.exe
mRun: [VTTrayp] VTtrayp.exe
mRun: [SunJavaUpdateSched] "c:\program files\common files\java\java update\jusched.exe"
mRun: [Adobe ARM] "c:\program files\common files\adobe\arm\1.0\AdobeARM.exe"
mRun: [NeroFilterCheck] c:\program files\common files\nero\lib\NeroCheck.exe
mRun: [NBKeyScan] "c:\program files\nero\nero8\nero backitup\NBKeyScan.exe"
mRun: [GrooveMonitor] "c:\program files\microsoft office\office12\GrooveMonitor.exe"
mRun: [MSC] "c:\program files\microsoft security client\msseces.exe" -hide -runkey
mRun: [TkBellExe] "c:\program files\real\realplayer\update\realsched.exe"  -osboot
uPolicies-Explorer: NoDriveTypeAutoRun = dword:145
mPolicies-Explorer: NoDriveTypeAutoRun = dword:145
IE: {2670000A-7350-4f3c-8081-5663EE0C6C49} - {48E73304-E1D6-4330-914C-F5F514E3486C} - c:\program files\microsoft office\office12\ONBttnIE.dll
IE: {92780B25-18CC-41C8-B9BE-3C9C571A8263} - {FF059E31-CC5A-4E2E-BF3B-96E929D65503}
IE: {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe
IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe
DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} - hxxp://www.update.microsoft.com/windowsupdate/v6/V5Controls/en/x86/client/wuweb_site.cab?1357228069062
DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} - hxxp://www.update.microsoft.com/microsoftupdate/v6/V5Controls/en/x86/client/muweb_site.cab?1357235661875
TCP: Interfaces\{5306E716-C3D3-4C71-B516-4E41DB4D7B9A} : NameServer = 207.230.75.34,207.230.75.60
Handler: grooveLocalGWS - {88FED34C-F0CA-4636-A375-3CB6248B04CD} - c:\program files\microsoft office\office12\GrooveSystemServices.dll
SEH: Groove GFS Stub Execution Hook - {B5A7F190-DDA6-4420-B3BA-52453494E6CD} - c:\program files\microsoft office\office12\GrooveShellExtensions.dll
.
============= SERVICES / DRIVERS ===============
.
R? A2DDA;A2 Direct Disk Access Support Driver
R? angzvdss;angzvdss
R? eiolknvv;eiolknvv
R? MBAMSwissArmy;MBAMSwissArmy
R? MpFilter;Microsoft Malware Protection Driver
R? RealNetworks Downloader Resolver Service;RealNetworks Downloader Resolver Service
R? rlumyxnv;rlumyxnv
R? SkLaggProtocol;Marvell Link Aggregation Protocol
R? SkVlanProtocol;Marvell VLAN Protocol
R? vgddalvu;vgddalvu
S? xfilt;VIA SATA IDE Hot-plug Driver
.
=============== Created Last 30 ================
.
2013-02-24 18:18:39 40776 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2013-02-24 18:16:42 60872 ----a-w- c:\documents and settings\all users\application data\microsoft\microsoft antimalware\definition updates\{a1ad6276-0857-425d-973b-5cc282db6e9d}\offreg.dll
2013-02-23 04:54:33 43600 ----a-w- c:\windows\system32\drivers\zwauwzth.sys
2013-02-23 04:44:24 -------- d-----w- c:\documents and settings\all users\application data\Norton
2013-02-23 04:44:24 -------- d-----w- c:\documents and settings\administrator\local settings\application data\NPE
2013-02-23 03:55:56 -------- d-----w- c:\documents and settings\administrator\local settings\application data\Adobe
2013-02-22 23:14:02 -------- d-sh--w- c:\documents and settings\administrator\PrivacIE
2013-02-22 23:13:30 -------- d-----w- c:\documents and settings\administrator\application data\Malwarebytes
2013-02-22 13:59:06 6954968 ----a-w- c:\documents and settings\all users\application data\microsoft\microsoft antimalware\definition updates\{a1ad6276-0857-425d-973b-5cc282db6e9d}\mpengine.dll
2013-02-20 15:10:38 6954968 ----a-w- c:\documents and settings\all users\application data\microsoft\microsoft antimalware\definition updates\backup\mpengine.dll
2013-02-07 05:12:15 0 ----a-w- c:\program files\GUM6F.tmp
2013-02-05 14:35:42 180000 ----a-w- c:\program files\kss12.0.1.117mlg_en-ru_ru-ru_fr-ru_de-ru.exe
2013-01-28 17:18:05 1517376 ----a-w- c:\program files\wrar420.exe
.
==================== Find3M  ====================
.
2013-02-08 12:54:55 74096 ----a-w- c:\windows\system32\FlashPlayerCPLApp.cpl
2013-02-08 12:54:55 697712 ----a-w- c:\windows\system32\FlashPlayerApp.exe
2013-01-30 10:53:21 232336 ------w- c:\windows\system32\MpSigStub.exe
2013-01-26 03:55:44 552448 ----a-w- c:\windows\system32\oleaut32.dll
2013-01-25 14:36:29 499712 ----a-w- c:\windows\system32\msvcp71.dll
2013-01-25 14:36:29 348160 ----a-w- c:\windows\system32\msvcr71.dll
2013-01-25 14:30:32 765104 ----a-w- c:\program files\RealPlayer.exe
2013-01-18 21:12:38 11088872 ----a-w- c:\program files\mseinstall.exe
2013-01-07 01:16:02 2193024 ----a-w- c:\windows\system32\ntoskrnl.exe
2013-01-07 00:36:58 2069760 ----a-w- c:\windows\system32\ntkrnlpa.exe
2013-01-04 01:20:00 1867264 ----a-w- c:\windows\system32\win32k.sys
2013-01-03 15:30:27 93640 ----a-w- c:\windows\system32\WindowsAccessBridge.dll
2013-01-03 15:30:26 859072 ----a-w- c:\windows\system32\npDeployJava1.dll
2013-01-03 15:30:26 779704 ----a-w- c:\windows\system32\deployJava1.dll
2013-01-03 15:30:26 143872 ----a-w- c:\windows\system32\javacpl.cpl
2013-01-02 06:49:10 148992 ----a-w- c:\windows\system32\mpg2splt.ax
2013-01-02 06:49:10 1292288 ----a-w- c:\windows\system32\quartz.dll
2012-12-26 20:16:29 916480 ----a-w- c:\windows\system32\wininet.dll
2012-12-26 20:16:28 43520 ------w- c:\windows\system32\licmgr10.dll
2012-12-26 20:16:28 1469440 ------w- c:\windows\system32\inetcpl.cpl
2012-12-24 06:40:59 385024 ------w- c:\windows\system32\html.iec
2012-12-16 12:23:59 290560 ----a-w- c:\windows\system32\atmfd.dll
2012-12-14 21:49:28 21104 ----a-w- c:\windows\system32\drivers\mbam.sys
.
============= FINISH: 14:05:56.43 ===============
 

 

 

defogger_disable by jpshortstuff (23.02.10.1)
Log created at 15:32 on 24/02/2013 (Administrator)

Checking for autostart values...
HKCU\~\Run values retrieved.
HKLM\~\Run values retrieved.

Checking for services/drivers...


-=E.O.F=-

 

 

 



#4 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:08:06 PM

Posted 24 February 2013 - 03:50 PM


Hello J_Mot


These are the programs I would like you to run next, if you have any problems with these just skip it and move on to the next one.


-AdwCleaner-
  • Please download AdwCleaner by Xplode onto your desktop.
    • Close all open programs and internet browsers.
    • Double click on AdwCleaner.exe to run the tool.
    • Click on Delete.
    • Confirm each time with Ok.
    • Your computer will be rebooted automatically. A text file will open after the restart.
    • Please post the content of that logfile with your next answer.
    • You can find the logfile at C:\AdwCleaner[S1].txt as well.
--RogueKiller--
  • Download & SAVE to your Desktop RogueKiller or from here
    • Quit all programs that you may have started.
    • Please disconnect any USB or external drives from the computer before you run this scan!
    • For Vista or Windows 7, right-click and select "Run as Administrator to start"
    • For Windows XP, double-click to start.
    • Wait until Prescan has finished ...
    • Then Click on "Scan" button
    • Wait until the Status box shows "Scan Finished"
    • click on "delete"
    • Wait until the Status box shows "Deleting Finished"
    • Click on "Report" and copy/paste the content of the Notepad into your next reply.
    • The log should be found in RKreport[1].txt on your Desktop
    • Exit/Close RogueKiller+
  • Gringo




I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#5 J_Mot

J_Mot
  • Topic Starter

  • Members
  • 32 posts
  • OFFLINE
  •  
  • Local time:08:06 PM

Posted 24 February 2013 - 05:49 PM

I can not close all programs because the virus will block me. The only way I can run anything is to have Malwarebytes open in the safe made.The program is not running just opened. Should I run these programs with malwarebytes open or do you have any other ideas?



#6 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:08:06 PM

Posted 24 February 2013 - 05:58 PM

that is fine run it the way you need to



gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#7 J_Mot

J_Mot
  • Topic Starter

  • Members
  • 32 posts
  • OFFLINE
  •  
  • Local time:08:06 PM

Posted 24 February 2013 - 07:17 PM

Ran the programs. Ran RougueKiller 3 times, didn't know it finished the first 2 times. Attaching all the reports

 

# AdwCleaner v2.113 - Logfile created 02/24/2013 at 18:43:15
# Updated 23/02/2013 by Xplode
# Operating system : Microsoft Windows XP Service Pack 3 (32 bits)
# User : Administrator - SANDERS-DESKTOP
# Boot Mode : Safe mode with networking
# Running from : E:\adwcleaner.exe
# Option [Search]


***** [Services] *****


***** [Files / Folders] *****


***** [Registry] *****


***** [Internet Browsers] *****

-\\ Internet Explorer v8.0.6001.18702

[OK] Registry is clean.

*************************

AdwCleaner[R1].txt - [527 octets] - [24/02/2013 18:43:15]

########## EOF - C:\AdwCleaner[R1].txt - [586 octets] ##########

 

 

 

# AdwCleaner v2.113 - Logfile created 02/24/2013 at 18:44:38
# Updated 23/02/2013 by Xplode
# Operating system : Microsoft Windows XP Service Pack 3 (32 bits)
# User : Administrator - SANDERS-DESKTOP
# Boot Mode : Safe mode with networking
# Running from : E:\adwcleaner.exe
# Option [Delete]


***** [Services] *****


***** [Files / Folders] *****


***** [Registry] *****


***** [Internet Browsers] *****

-\\ Internet Explorer v8.0.6001.18702

[OK] Registry is clean.

*************************

AdwCleaner[R1].txt - [654 octets] - [24/02/2013 18:43:15]
AdwCleaner[S1].txt - [586 octets] - [24/02/2013 18:44:38]

########## EOF - C:\AdwCleaner[S1].txt - [645 octets] ##########

 

 

RogueKiller V8.5.2 [Feb 23 2013] by Tigzy
mail : tigzyRK<at>gmail<dot>com
Feedback : http://www.geekstogo.com/forum/files/file/413-roguekiller/
Website : http://tigzy.geekstogo.com/roguekiller.php
Blog : http://tigzyrk.blogspot.com/

Operating System : Windows XP (5.1.2600 Service Pack 3) 32 bits version
Started in : Safe mode with network support
User : Administrator [Admin rights]
Mode : Scan -- Date : 02/24/2013 18:55:07
| ARK || FAK || MBR |

¤¤¤ Bad processes : 0 ¤¤¤

¤¤¤ Registry Entries : 8 ¤¤¤
[STARTUP][Rans.Gendarm] runctf.lnk @Administrator : C:\WINDOWS\system32\rundll32.exe|c:\docume~1\sanders\2117531.dll,M1N1 -> FOUND
[DNS] HKLM\[...]\ControlSet001\Services\Tcpip\Interfaces\{5306E716-C3D3-4C71-B516-4E41DB4D7B9A} : NameServer (207.230.75.34,207.230.75.60) -> FOUND
[DNS] HKLM\[...]\ControlSet002\Services\Tcpip\Interfaces\{5306E716-C3D3-4C71-B516-4E41DB4D7B9A} : NameServer (207.230.75.34,207.230.75.60) -> FOUND
[DNS] HKLM\[...]\ControlSet003\Services\Tcpip\Interfaces\{5306E716-C3D3-4C71-B516-4E41DB4D7B9A} : NameServer (207.230.75.34,207.230.75.60) -> FOUND
[HJ DESK] HKLM\[...]\NewStartPanel : {20D04FE0-3AEA-1069-A2D8-08002B30309D} (1) -> FOUND
[HJ DLL][ROGUE ST] HKLM\[...]\ControlSet001\Services\winmgmt\Parameters : ServiceDll (C:\Documents and Settings\Sanders\2117531.dll) [-] -> FOUND
[HJ DLL][ROGUE ST] HKLM\[...]\ControlSet002\Services\winmgmt\Parameters : ServiceDll (C:\Documents and Settings\Sanders\2117531.dll) [-] -> FOUND
[HJ DLL][ROGUE ST] HKLM\[...]\ControlSet003\Services\winmgmt\Parameters : ServiceDll (C:\Documents and Settings\Sanders\2117531.dll) [-] -> FOUND

¤¤¤ Particular Files / Folders: ¤¤¤
[ZeroAccess][FOLDER] U : C:\RECYCLER\S-1-5-18\$6be615644ef01c74f29aab7391eb15bc\U --> FOUND
[ZeroAccess][FOLDER] U : C:\RECYCLER\S-1-5-21-1417001333-1220945662-1801674531-1004\$6be615644ef01c74f29aab7391eb15bc\U --> FOUND
[ZeroAccess][FOLDER] L : C:\RECYCLER\S-1-5-18\$6be615644ef01c74f29aab7391eb15bc\L --> FOUND
[ZeroAccess][FOLDER] L : C:\RECYCLER\S-1-5-21-1417001333-1220945662-1801674531-1004\$6be615644ef01c74f29aab7391eb15bc\L --> FOUND

¤¤¤ Driver : [NOT LOADED] ¤¤¤

¤¤¤ Infection : ZeroAccess|Rans.Gendarm ¤¤¤

¤¤¤ HOSTS File: ¤¤¤
--> C:\WINDOWS\system32\drivers\etc\hosts

127.0.0.1       localhost


¤¤¤ MBR Check: ¤¤¤

+++++ PhysicalDrive0:  +++++
--- User ---
[MBR] 623fa659f739f7ce623bc6d4290f202e
[BSP] b3471129ef5f01c26e619f41d58bebb3 : Windows XP MBR Code
Partition table:
0 - [ACTIVE] NTFS (0x07) [VISIBLE] Offset (sectors): 63 | Size: 476929 Mo
User = LL1 ... OK!
User = LL2 ... OK!

+++++ PhysicalDrive1:  +++++
--- User ---
[MBR] 741608d92d0d514c3ab62573bb9a9cef
[BSP] a83a24340e59ea8cbbf2d8eaa19e98b0 : Windows XP MBR Code
Partition table:
0 - [ACTIVE] FAT32-LBA (0x0c) [VISIBLE] Offset (sectors): 63 | Size: 7701 Mo
User = LL1 ... OK!
Error reading LL2 MBR!

Finished : << RKreport[1]_S_02242013_02d1855.txt >>
RKreport[1]_S_02242013_02d1855.txt

 

 

 

RogueKiller V8.5.2 [Feb 23 2013] by Tigzy
mail : tigzyRK<at>gmail<dot>com
Feedback : http://www.geekstogo.com/forum/files/file/413-roguekiller/
Website : http://tigzy.geekstogo.com/roguekiller.php
Blog : http://tigzyrk.blogspot.com/

Operating System : Windows XP (5.1.2600 Service Pack 3) 32 bits version
Started in : Safe mode with network support
User : Administrator [Admin rights]
Mode : Scan -- Date : 02/24/2013 19:01:24
| ARK || FAK || MBR |

¤¤¤ Bad processes : 0 ¤¤¤

¤¤¤ Registry Entries : 4 ¤¤¤
[STARTUP][Rans.Gendarm] runctf.lnk @Administrator : C:\WINDOWS\system32\rundll32.exe|c:\docume~1\sanders\2117531.dll,M1N1 -> FOUND
[DNS] HKLM\[...]\ControlSet001\Services\Tcpip\Interfaces\{5306E716-C3D3-4C71-B516-4E41DB4D7B9A} : NameServer (207.230.75.34,207.230.75.60) -> FOUND
[DNS] HKLM\[...]\ControlSet002\Services\Tcpip\Interfaces\{5306E716-C3D3-4C71-B516-4E41DB4D7B9A} : NameServer (207.230.75.34,207.230.75.60) -> FOUND
[DNS] HKLM\[...]\ControlSet003\Services\Tcpip\Interfaces\{5306E716-C3D3-4C71-B516-4E41DB4D7B9A} : NameServer (207.230.75.34,207.230.75.60) -> FOUND

¤¤¤ Particular Files / Folders: ¤¤¤

¤¤¤ Driver : [NOT LOADED] ¤¤¤

¤¤¤ Infection : Rans.Gendarm ¤¤¤

¤¤¤ HOSTS File: ¤¤¤
--> C:\WINDOWS\system32\drivers\etc\hosts

127.0.0.1       localhost


¤¤¤ MBR Check: ¤¤¤

+++++ PhysicalDrive0: WDC WD5000AAKX-00ERMA0 +++++
--- User ---
[MBR] 623fa659f739f7ce623bc6d4290f202e
[BSP] b3471129ef5f01c26e619f41d58bebb3 : Windows XP MBR Code
Partition table:
0 - [ACTIVE] NTFS (0x07) [VISIBLE] Offset (sectors): 63 | Size: 476929 Mo
User = LL1 ... OK!
User = LL2 ... OK!

+++++ PhysicalDrive1: hp v165w USB Device +++++
--- User ---
[MBR] 741608d92d0d514c3ab62573bb9a9cef
[BSP] a83a24340e59ea8cbbf2d8eaa19e98b0 : Windows XP MBR Code
Partition table:
0 - [ACTIVE] FAT32-LBA (0x0c) [VISIBLE] Offset (sectors): 63 | Size: 7701 Mo
User = LL1 ... OK!
Error reading LL2 MBR!

Finished : << RKreport[2]_S_02242013_02d1901.txt >>
RKreport[1]_S_02242013_02d1855.txt ; RKreport[2]_S_02242013_02d1901.txt

 

 

 

RogueKiller V8.5.2 [Feb 23 2013] by Tigzy
mail : tigzyRK<at>gmail<dot>com
Feedback : http://www.geekstogo.com/forum/files/file/413-roguekiller/
Website : http://tigzy.geekstogo.com/roguekiller.php
Blog : http://tigzyrk.blogspot.com/

Operating System : Windows XP (5.1.2600 Service Pack 3) 32 bits version
Started in : Safe mode with network support
User : Administrator [Admin rights]
Mode : Remove -- Date : 02/24/2013 19:02:07
| ARK || FAK || MBR |

¤¤¤ Bad processes : 0 ¤¤¤

¤¤¤ Registry Entries : 4 ¤¤¤
[STARTUP][Rans.Gendarm] runctf.lnk @Administrator : C:\WINDOWS\system32\rundll32.exe|c:\docume~1\sanders\2117531.dll,M1N1 -> DELETED
[DNS] HKLM\[...]\ControlSet001\Services\Tcpip\Interfaces\{5306E716-C3D3-4C71-B516-4E41DB4D7B9A} : NameServer (207.230.75.34,207.230.75.60) -> NOT REMOVED, USE DNSFIX
[DNS] HKLM\[...]\ControlSet002\Services\Tcpip\Interfaces\{5306E716-C3D3-4C71-B516-4E41DB4D7B9A} : NameServer (207.230.75.34,207.230.75.60) -> NOT REMOVED, USE DNSFIX
[DNS] HKLM\[...]\ControlSet003\Services\Tcpip\Interfaces\{5306E716-C3D3-4C71-B516-4E41DB4D7B9A} : NameServer (207.230.75.34,207.230.75.60) -> NOT REMOVED, USE DNSFIX

¤¤¤ Particular Files / Folders: ¤¤¤

¤¤¤ Driver : [NOT LOADED] ¤¤¤

¤¤¤ Infection : Rans.Gendarm ¤¤¤

¤¤¤ HOSTS File: ¤¤¤
--> C:\WINDOWS\system32\drivers\etc\hosts

127.0.0.1       localhost


¤¤¤ MBR Check: ¤¤¤

+++++ PhysicalDrive0: WDC WD5000AAKX-00ERMA0 +++++
--- User ---
[MBR] 623fa659f739f7ce623bc6d4290f202e
[BSP] b3471129ef5f01c26e619f41d58bebb3 : Windows XP MBR Code
Partition table:
0 - [ACTIVE] NTFS (0x07) [VISIBLE] Offset (sectors): 63 | Size: 476929 Mo
User = LL1 ... OK!
User = LL2 ... OK!

+++++ PhysicalDrive1: hp v165w USB Device +++++
--- User ---
[MBR] 741608d92d0d514c3ab62573bb9a9cef
[BSP] a83a24340e59ea8cbbf2d8eaa19e98b0 : Windows XP MBR Code
Partition table:
0 - [ACTIVE] FAT32-LBA (0x0c) [VISIBLE] Offset (sectors): 63 | Size: 7701 Mo
User = LL1 ... OK!
Error reading LL2 MBR!

Finished : << RKreport[3]_D_02242013_02d1902.txt >>
RKreport[1]_S_02242013_02d1855.txt ; RKreport[2]_S_02242013_02d1901.txt ; RKreport[3]_D_02242013_02d1902.txt



#8 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:08:06 PM

Posted 24 February 2013 - 08:33 PM


Hello J_Mot

I Would like you to do the following.

Please print out or make a copy in notepad of any instructions given, as sometimes it is necessary to go offline and you will lose access to them.

Run Combofix:

You may be asked to install or update the Recovery Console (Win XP Only) if this happens please allow it to do so (you will need to be connected to the internet for this)

Before you run Combofix I will need you to turn off any security software you have running, If you do not know how to do this you can find out >here< or >here<

Combofix may need to reboot your computer more than once to do its job this is normal.

You can download Combofix from one of these links. I want you to save it to the desktop and run it from there.1. Close any open browsers or any other programs that are open.
2. Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.

Double click on combofix.exe & follow the prompts.
When finished, it will produce a report for you.

Note 1: Do not mouseclick combofix's window while it's running. That may cause it to stall

Note 2: If you receive an error "Illegal operation attempted on a registry key that has been marked for deletion." Please restart the computer

"information and logs"
  • In your next post I need the following
  • Log from Combofix
  • let me know of any problems you may have had
  • How is the computer doing now?

  • Gringo



I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#9 J_Mot

J_Mot
  • Topic Starter

  • Members
  • 32 posts
  • OFFLINE
  •  
  • Local time:08:06 PM

Posted 24 February 2013 - 11:13 PM

I ran ComboFix in safe mode. All seemed to work fine. Restarted the computer in Normal mode when finished and no sign of the virus. I had the computer disconnected from the internet and in safe mode when I ran ComboFix. Should I run it again in Normal mode with internet access? Or just leave it be? Anyway, looks like we are on the right track if not totally fixed!! Log to follow:

 

ComboFix 13-02-24.01 - Administrator 02/24/2013  22:53:20.1.1 - x86 NETWORK
Microsoft Windows XP Home Edition  5.1.2600.3.1252.1.1033.18.1279.1007 [GMT -5:00]
Running from: E:\ComboFix.exe
AV: Microsoft Security Essentials *Disabled/Updated* {EDB4FA23-53B8-4AFA-8C5D-99752CCA7095}
.
WARNING -THIS MACHINE DOES NOT HAVE THE RECOVERY CONSOLE INSTALLED !!
.
.
(((((((((((((((((((((((((((((((((((((((   Other Deletions   )))))))))))))))))))))))))))))))))))))))))))))))))
.
.
c:\documents and settings\All Users\Application Data\1357112.pad
c:\documents and settings\Sanders\2117531.dll
.
.
(((((((((((((((((((((((((   Files Created from 2013-01-25 to 2013-02-25  )))))))))))))))))))))))))))))))
.
.
2013-02-25 03:49 . 2013-02-25 03:49 60872 ----a-w- c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{A1AD6276-0857-425D-973B-5CC282DB6E9D}\offreg.dll
2013-02-23 04:54 . 2013-02-23 04:54 43600 ----a-w- c:\windows\system32\drivers\zwauwzth.sys
2013-02-23 04:52 . 2013-02-23 04:54 -------- d-----w- c:\documents and settings\Sanders\Local Settings\Application Data\NPE
2013-02-23 04:44 . 2013-02-23 04:44 -------- d-----w- c:\documents and settings\All Users\Application Data\Norton
2013-02-22 23:12 . 2013-02-24 19:04 -------- d-----w- c:\documents and settings\Administrator
2013-02-22 13:59 . 2013-02-08 00:45 6954968 ----a-w- c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{A1AD6276-0857-425D-973B-5CC282DB6E9D}\mpengine.dll
2013-02-20 15:10 . 2013-02-08 00:45 6954968 ----a-w- c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\Backup\mpengine.dll
2013-02-19 20:05 . 2013-02-19 20:05 -------- d-----w- c:\program files\Microsoft Silverlight
2013-02-07 05:12 . 2013-02-07 05:12 0 ----a-w- c:\program files\GUM6F.tmp
2013-02-05 14:35 . 2013-02-05 14:35 180000 ----a-w- c:\program files\kss12.0.1.117mlg_en-ru_ru-ru_fr-ru_de-ru.exe
2013-01-28 17:18 . 2013-01-28 17:18 1517376 ----a-w- c:\program files\wrar420.exe
.
.
.
((((((((((((((((((((((((((((((((((((((((   Find3M Report   ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2013-02-08 12:54 . 2013-01-03 15:45 697712 ----a-w- c:\windows\system32\FlashPlayerApp.exe
2013-02-08 12:54 . 2013-01-03 15:45 74096 ----a-w- c:\windows\system32\FlashPlayerCPLApp.cpl
2013-01-30 10:53 . 2013-01-03 17:32 232336 ------w- c:\windows\system32\MpSigStub.exe
2013-01-26 03:55 . 2008-04-14 12:00 552448 ----a-w- c:\windows\system32\oleaut32.dll
2013-01-25 14:36 . 2013-01-25 14:36 499712 ----a-w- c:\windows\system32\msvcp71.dll
2013-01-25 14:36 . 2013-01-25 14:36 348160 ----a-w- c:\windows\system32\msvcr71.dll
2013-01-25 14:30 . 2013-01-25 14:30 765104 ----a-w- c:\program files\RealPlayer.exe
2013-01-18 21:12 . 2013-01-18 21:12 11088872 ----a-w- c:\program files\mseinstall.exe
2013-01-07 01:16 . 2008-04-14 12:00 2193024 ----a-w- c:\windows\system32\ntoskrnl.exe
2013-01-07 00:36 . 2008-04-14 00:01 2069760 ----a-w- c:\windows\system32\ntkrnlpa.exe
2013-01-04 01:20 . 2008-04-14 12:00 1867264 ----a-w- c:\windows\system32\win32k.sys
2013-01-03 15:30 . 2013-01-03 15:30 93640 ----a-w- c:\windows\system32\WindowsAccessBridge.dll
2013-01-03 15:30 . 2013-01-03 15:30 859072 ----a-w- c:\windows\system32\npDeployJava1.dll
2013-01-03 15:30 . 2013-01-03 15:30 779704 ----a-w- c:\windows\system32\deployJava1.dll
2013-01-03 15:30 . 2013-01-03 15:30 143872 ----a-w- c:\windows\system32\javacpl.cpl
2013-01-02 06:49 . 2008-04-14 12:00 148992 ----a-w- c:\windows\system32\mpg2splt.ax
2013-01-02 06:49 . 2008-04-14 12:00 1292288 ----a-w- c:\windows\system32\quartz.dll
2012-12-26 20:16 . 2008-04-14 12:00 916480 ----a-w- c:\windows\system32\wininet.dll
2012-12-26 20:16 . 2008-04-14 12:00 43520 ------w- c:\windows\system32\licmgr10.dll
2012-12-26 20:16 . 2008-04-14 12:00 1469440 ------w- c:\windows\system32\inetcpl.cpl
2012-12-24 06:40 . 2008-04-14 12:00 385024 ------w- c:\windows\system32\html.iec
2012-12-16 12:23 . 2008-04-14 12:00 290560 ----a-w- c:\windows\system32\atmfd.dll
2012-12-14 21:49 . 2013-01-03 16:42 21104 ----a-w- c:\windows\system32\drivers\mbam.sys
.
.
(((((((((((((((((((((((((((((((((((((   Reg Loading Points   ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"VTTimer"="VTTimer.exe" [2006-09-14 53248]
"VTTrayp"="VTtrayp.exe" [2007-04-25 176128]
"SunJavaUpdateSched"="c:\program files\Common Files\Java\Java Update\jusched.exe" [2012-07-03 252848]
"Adobe ARM"="c:\program files\Common Files\Adobe\ARM\1.0\AdobeARM.exe" [2012-12-03 946352]
"NeroFilterCheck"="c:\program files\Common Files\Nero\Lib\NeroCheck.exe" [2008-03-25 570664]
"NBKeyScan"="c:\program files\Nero\Nero8\Nero BackItUp\NBKeyScan.exe" [2008-02-18 2221352]
"GrooveMonitor"="c:\program files\Microsoft Office\Office12\GrooveMonitor.exe" [2009-02-26 30040]
"MSC"="c:\program files\Microsoft Security Client\msseces.exe" [2012-09-12 947176]
"TkBellExe"="c:\program files\Real\RealPlayer\update\realsched.exe" [2013-01-25 295072]
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\MsMpSvc]
@="Service"
.
S1 A2DDA;A2 Direct Disk Access Support Driver;c:\documents and settings\All Users\Desktop\Run\a2ddax86.sys [2/23/2013 12:12 PM 17904]
S1 eiolknvv;eiolknvv;\??\c:\windows\system32\drivers\eiolknvv.sys --> c:\windows\system32\drivers\eiolknvv.sys [?]
S1 rlumyxnv;rlumyxnv;\??\c:\windows\system32\drivers\rlumyxnv.sys --> c:\windows\system32\drivers\rlumyxnv.sys [?]
S1 vgddalvu;vgddalvu;\??\c:\windows\system32\drivers\vgddalvu.sys --> c:\windows\system32\drivers\vgddalvu.sys [?]
S2 RealNetworks Downloader Resolver Service;RealNetworks Downloader Resolver Service;c:\program files\RealNetworks\RealDownloader\rndlresolversvc.exe [11/29/2012 8:31 PM 38608]
S3 SkLaggProtocol;Marvell Link Aggregation Protocol;c:\windows\system32\drivers\yk51x32l.sys [12/14/2007 10:10 AM 57344]
S3 SkVlanProtocol;Marvell VLAN Protocol;c:\windows\system32\drivers\yk51x32v.sys [11/23/2007 10:10 AM 20992]
.
Contents of the 'Scheduled Tasks' folder
.
2013-02-22 c:\windows\Tasks\Adobe Flash Player Updater.job
- c:\windows\system32\Macromed\Flash\FlashPlayerUpdateService.exe [2013-01-03 12:54]
.
2013-02-22 c:\windows\Tasks\GoogleUpdateTaskUserS-1-5-21-1417001333-1220945662-1801674531-1004Core.job
- c:\documents and settings\Sanders\Local Settings\Application Data\Google\Update\GoogleUpdate.exe [2013-01-22 18:07]
.
2013-02-23 c:\windows\Tasks\GoogleUpdateTaskUserS-1-5-21-1417001333-1220945662-1801674531-1004UA.job
- c:\documents and settings\Sanders\Local Settings\Application Data\Google\Update\GoogleUpdate.exe [2013-01-22 18:07]
.
2013-02-24 c:\windows\Tasks\Microsoft Antimalware Scheduled Scan.job
- c:\program files\Microsoft Security Client\MpCmdRun.exe [2012-09-12 22:25]
.
2013-02-24 c:\windows\Tasks\MpIdleTask.job
- c:\program files\Microsoft Security Client\MpCmdRun.exe [2012-09-12 22:25]
.
2013-02-17 c:\windows\Tasks\RealDownloaderDownloaderScheduledTaskS-1-5-21-1417001333-1220945662-1801674531-1004.job
- c:\program files\RealNetworks\RealDownloader\recordingmanager.exe [2012-11-30 01:33]
.
2013-02-23 c:\windows\Tasks\RealDownloaderRealUpgradeLogonTaskS-1-5-21-1417001333-1220945662-1801674531-1004.job
- c:\program files\RealNetworks\RealDownloader\realupgrade.exe [2012-11-30 01:31]
.
2013-02-22 c:\windows\Tasks\RealDownloaderRealUpgradeScheduledTaskS-1-5-21-1417001333-1220945662-1801674531-1004.job
- c:\program files\RealNetworks\RealDownloader\realupgrade.exe [2012-11-30 01:31]
.
2013-02-23 c:\windows\Tasks\RealPlayerRealUpgradeLogonTaskS-1-5-21-1417001333-1220945662-1801674531-1004.job
- c:\program files\Real\RealUpgrade\realupgrade.exe [2012-11-30 20:30]
.
2013-02-22 c:\windows\Tasks\RealPlayerRealUpgradeScheduledTaskS-1-5-21-1417001333-1220945662-1801674531-1004.job
- c:\program files\Real\RealUpgrade\realupgrade.exe [2012-11-30 20:30]
.
.
------- Supplementary Scan -------
.
IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~3\Office12\EXCEL.EXE/3000
TCP: Interfaces\{5306E716-C3D3-4C71-B516-4E41DB4D7B9A}: NameServer = 207.230.75.34,207.230.75.60
.
- - - - ORPHANS REMOVED - - - -
.
SafeBoot-47514810.sys
.
.
.
**************************************************************************
.
catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2013-02-24 22:57
Windows 5.1.2600 Service Pack 3 NTFS
.
scanning hidden processes ... 
.
scanning hidden autostart entries ...
.
scanning hidden files ... 
.
scan completed successfully
hidden files: 0
.
**************************************************************************
.
--------------------- LOCKED REGISTRY KEYS ---------------------
.
[HKEY_USERS\S-1-5-21-1417001333-1220945662-1801674531-500\Software\Microsoft\Internet Explorer\User Preferences]
@Denied: (2) (Administrator)
"88D7D0879DAB32E14DE5B3A805A34F98AFF34F5977"=hex:01,00,00,00,d0,8c,9d,df,01,15,
   d1,11,8c,7a,00,c0,4f,c2,97,eb,01,00,00,00,90,c3,83,0d,88,cc,da,4d,a3,1d,c7,\
"2D53CFFC5C1A3DD2E97B7979AC2A92BD59BC839E81"=hex:01,00,00,00,d0,8c,9d,df,01,15,
   d1,11,8c,7a,00,c0,4f,c2,97,eb,01,00,00,00,90,c3,83,0d,88,cc,da,4d,a3,1d,c7,\
.
[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}]
@Denied: (A 2) (Everyone)
@="FlashBroker"
"LocalizedString"="@c:\\WINDOWS\\system32\\Macromed\\Flash\\FlashUtil32_11_5_502_149_ActiveX.exe,-101"
.
[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\Elevation]
"Enabled"=dword:00000001
.
[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\LocalServer32]
@="c:\\WINDOWS\\system32\\Macromed\\Flash\\FlashUtil32_11_5_502_149_ActiveX.exe"
.
[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\TypeLib]
@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"
.
[HKEY_LOCAL_MACHINE\software\Classes\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}]
@Denied: (A 2) (Everyone)
@="IFlashBroker5"
.
[HKEY_LOCAL_MACHINE\software\Classes\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}\ProxyStubClsid32]
@="{00020424-0000-0000-C000-000000000046}"
.
[HKEY_LOCAL_MACHINE\software\Classes\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}\TypeLib]
@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"
"Version"="1.0"
.
[HKEY_LOCAL_MACHINE\software\Classes\VideoLAN.VLCPlugin.*1*]
@="?????????????????? v1"
.
[HKEY_LOCAL_MACHINE\software\Classes\VideoLAN.VLCPlugin.*1*\CLSID]
@="{E23FE9C6-778E-49D4-B537-38FCDE4887D8}"
.
[HKEY_LOCAL_MACHINE\software\Classes\VideoLAN.VLCPlugin.*2*]
@="?????????????????? v2"
.
[HKEY_LOCAL_MACHINE\software\Classes\VideoLAN.VLCPlugin.*2*\CLSID]
@="{9BE31822-FDAD-461B-AD51-BE1D1C159921}"
.
Completion time: 2013-02-24  22:58:24
ComboFix-quarantined-files.txt  2013-02-25 03:58
.
Pre-Run: 486,474,604,544 bytes free
Post-Run: 486,487,142,400 bytes free
.
- - End Of File - - E761019744F88DA447C6B6746FAB3381
 



#10 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:08:06 PM

Posted 24 February 2013 - 11:53 PM


Hello J_Mot

At this time I would like you to run this script for me and it is a good time to check out the computer to see if there is anything else that needs to be addressed.

:Run CFScript:

Please start by opening Notepad and copy/paste the text in the box into the window:
ClearJavaCache::

File::
c:\windows\system32\drivers\zwauwzth.sys

Driver::
eiolknvv
rlumyxnv
vgddalvu
Save it to your desktop as CFScript.txt

Referring to the picture above, drag CFScript.txt into ComboFix.exe
CFScriptB-4.gif
This will let ComboFix run again.
Restart if you have to.
Save the produced logfile to your desktop.

Note: Do not mouseclick combofix's window whilst it's running. That may cause it to stall

Note 2: If you receive an error "Illegal operation attempted on a registry key that has been marked for deletion." Please restart the computer

"information and logs"
  • In your next post I need the following
    • report from Combofix
      • let me know of any problems you may have had
        • How is the computer doing now after running the script?
      Gringo

I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#11 J_Mot

J_Mot
  • Topic Starter

  • Members
  • 32 posts
  • OFFLINE
  •  
  • Local time:08:06 PM

Posted 25 February 2013 - 12:31 PM

Ran the program without any issue. Here is the log:

 

ComboFix 13-02-24.01 - Sanders 02/25/2013  12:15:49.2.1 - x86
Microsoft Windows XP Home Edition  5.1.2600.3.1252.1.1033.18.1279.817 [GMT -5:00]
Running from: c:\documents and settings\Sanders\Desktop\ComboFix.exe
Command switches used :: c:\documents and settings\Sanders\Desktop\CFScript.txt
AV: Microsoft Security Essentials *Disabled/Updated* {EDB4FA23-53B8-4AFA-8C5D-99752CCA7095}
.
FILE ::
"c:\windows\system32\drivers\zwauwzth.sys"
.
.
(((((((((((((((((((((((((((((((((((((((   Other Deletions   )))))))))))))))))))))))))))))))))))))))))))))))))
.
.
c:\windows\system32\drivers\zwauwzth.sys
.
.
(((((((((((((((((((((((((((((((((((((((   Drivers/Services   )))))))))))))))))))))))))))))))))))))))))))))))))
.
.
-------\Service_eiolknvv
-------\Service_rlumyxnv
-------\Service_vgddalvu
.
.
(((((((((((((((((((((((((   Files Created from 2013-01-25 to 2013-02-25  )))))))))))))))))))))))))))))))
.
.
2013-02-25 17:22 . 2013-02-25 17:22 60872 ----a-w- c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{D0B55296-8A36-4465-855A-17B67AB7AF17}\offreg.dll
2013-02-25 13:26 . 2013-02-08 00:45 6954968 ----a-w- c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{D0B55296-8A36-4465-855A-17B67AB7AF17}\mpengine.dll
2013-02-23 04:52 . 2013-02-23 04:54 -------- d-----w- c:\documents and settings\Sanders\Local Settings\Application Data\NPE
2013-02-23 04:44 . 2013-02-23 04:44 -------- d-----w- c:\documents and settings\All Users\Application Data\Norton
2013-02-22 23:12 . 2013-02-24 19:04 -------- d-----w- c:\documents and settings\Administrator
2013-02-22 13:59 . 2013-02-08 00:45 6954968 ----a-w- c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\Backup\mpengine.dll
2013-02-19 20:05 . 2013-02-19 20:05 -------- d-----w- c:\program files\Microsoft Silverlight
2013-02-07 05:12 . 2013-02-07 05:12 0 ----a-w- c:\program files\GUM6F.tmp
2013-02-05 14:35 . 2013-02-05 14:35 180000 ----a-w- c:\program files\kss12.0.1.117mlg_en-ru_ru-ru_fr-ru_de-ru.exe
2013-01-28 17:18 . 2013-01-28 17:18 1517376 ----a-w- c:\program files\wrar420.exe
.
.
.
((((((((((((((((((((((((((((((((((((((((   Find3M Report   ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2013-02-08 12:54 . 2013-01-03 15:45 697712 ----a-w- c:\windows\system32\FlashPlayerApp.exe
2013-02-08 12:54 . 2013-01-03 15:45 74096 ----a-w- c:\windows\system32\FlashPlayerCPLApp.cpl
2013-01-30 10:53 . 2013-01-03 17:32 232336 ------w- c:\windows\system32\MpSigStub.exe
2013-01-26 03:55 . 2008-04-14 12:00 552448 ----a-w- c:\windows\system32\oleaut32.dll
2013-01-25 14:36 . 2013-01-25 14:36 499712 ----a-w- c:\windows\system32\msvcp71.dll
2013-01-25 14:36 . 2013-01-25 14:36 348160 ----a-w- c:\windows\system32\msvcr71.dll
2013-01-25 14:30 . 2013-01-25 14:30 765104 ----a-w- c:\program files\RealPlayer.exe
2013-01-18 21:12 . 2013-01-18 21:12 11088872 ----a-w- c:\program files\mseinstall.exe
2013-01-07 01:16 . 2008-04-14 12:00 2193024 ----a-w- c:\windows\system32\ntoskrnl.exe
2013-01-07 00:36 . 2008-04-14 00:01 2069760 ----a-w- c:\windows\system32\ntkrnlpa.exe
2013-01-04 01:20 . 2008-04-14 12:00 1867264 ----a-w- c:\windows\system32\win32k.sys
2013-01-03 15:30 . 2013-01-03 15:30 93640 ----a-w- c:\windows\system32\WindowsAccessBridge.dll
2013-01-03 15:30 . 2013-01-03 15:30 859072 ----a-w- c:\windows\system32\npDeployJava1.dll
2013-01-03 15:30 . 2013-01-03 15:30 779704 ----a-w- c:\windows\system32\deployJava1.dll
2013-01-03 15:30 . 2013-01-03 15:30 143872 ----a-w- c:\windows\system32\javacpl.cpl
2013-01-02 06:49 . 2008-04-14 12:00 148992 ----a-w- c:\windows\system32\mpg2splt.ax
2013-01-02 06:49 . 2008-04-14 12:00 1292288 ----a-w- c:\windows\system32\quartz.dll
2012-12-26 20:16 . 2008-04-14 12:00 916480 ----a-w- c:\windows\system32\wininet.dll
2012-12-26 20:16 . 2008-04-14 12:00 43520 ------w- c:\windows\system32\licmgr10.dll
2012-12-26 20:16 . 2008-04-14 12:00 1469440 ------w- c:\windows\system32\inetcpl.cpl
2012-12-24 06:40 . 2008-04-14 12:00 385024 ------w- c:\windows\system32\html.iec
2012-12-16 12:23 . 2008-04-14 12:00 290560 ----a-w- c:\windows\system32\atmfd.dll
2012-12-14 21:49 . 2013-01-03 16:42 21104 ----a-w- c:\windows\system32\drivers\mbam.sys
.
.
(((((((((((((((((((((((((((((((((((((   Reg Loading Points   ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4
.
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"IndxStoreSvr_{79662E04-7C6C-4d9f-84C7-88D8A56B10AA}"="c:\program files\Common Files\Nero\Lib\NMIndexStoreSvr.exe" [2008-02-28 1828136]
"LogMeIn Cubby"="c:\documents and settings\Sanders\Application Data\cubby\cubby.exe" [2013-02-04 4753720]
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"VTTimer"="VTTimer.exe" [2006-09-14 53248]
"VTTrayp"="VTtrayp.exe" [2007-04-25 176128]
"SunJavaUpdateSched"="c:\program files\Common Files\Java\Java Update\jusched.exe" [2012-07-03 252848]
"Adobe ARM"="c:\program files\Common Files\Adobe\ARM\1.0\AdobeARM.exe" [2012-12-03 946352]
"NeroFilterCheck"="c:\program files\Common Files\Nero\Lib\NeroCheck.exe" [2008-03-25 570664]
"NBKeyScan"="c:\program files\Nero\Nero8\Nero BackItUp\NBKeyScan.exe" [2008-02-18 2221352]
"GrooveMonitor"="c:\program files\Microsoft Office\Office12\GrooveMonitor.exe" [2009-02-26 30040]
"MSC"="c:\program files\Microsoft Security Client\msseces.exe" [2012-09-12 947176]
"TkBellExe"="c:\program files\Real\RealPlayer\update\realsched.exe" [2013-01-25 295072]
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\MsMpSvc]
@="Service"
.
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=
"c:\\Documents and Settings\\Sanders\\Local Settings\\Application Data\\Google\\Google Talk Plugin\\googletalkplugin.exe"=
.
R2 RealNetworks Downloader Resolver Service;RealNetworks Downloader Resolver Service;c:\program files\RealNetworks\RealDownloader\rndlresolversvc.exe [11/29/2012 8:31 PM 38608]
S1 A2DDA;A2 Direct Disk Access Support Driver;\??\c:\documents and settings\All Users\Desktop\Run\a2ddax86.sys --> c:\documents and settings\All Users\Desktop\Run\a2ddax86.sys [?]
S3 SkLaggProtocol;Marvell Link Aggregation Protocol;c:\windows\system32\drivers\yk51x32l.sys [12/14/2007 10:10 AM 57344]
S3 SkVlanProtocol;Marvell VLAN Protocol;c:\windows\system32\drivers\yk51x32v.sys [11/23/2007 10:10 AM 20992]
.
Contents of the 'Scheduled Tasks' folder
.
2013-02-25 c:\windows\Tasks\Adobe Flash Player Updater.job
- c:\windows\system32\Macromed\Flash\FlashPlayerUpdateService.exe [2013-01-03 12:54]
.
2013-02-22 c:\windows\Tasks\GoogleUpdateTaskUserS-1-5-21-1417001333-1220945662-1801674531-1004Core.job
- c:\documents and settings\Sanders\Local Settings\Application Data\Google\Update\GoogleUpdate.exe [2013-01-22 18:07]
.
2013-02-25 c:\windows\Tasks\GoogleUpdateTaskUserS-1-5-21-1417001333-1220945662-1801674531-1004UA.job
- c:\documents and settings\Sanders\Local Settings\Application Data\Google\Update\GoogleUpdate.exe [2013-01-22 18:07]
.
2013-02-25 c:\windows\Tasks\Microsoft Antimalware Scheduled Scan.job
- c:\program files\Microsoft Security Client\MpCmdRun.exe [2012-09-12 22:25]
.
2013-02-25 c:\windows\Tasks\MpIdleTask.job
- c:\program files\Microsoft Security Client\MpCmdRun.exe [2012-09-12 22:25]
.
2013-02-17 c:\windows\Tasks\RealDownloaderDownloaderScheduledTaskS-1-5-21-1417001333-1220945662-1801674531-1004.job
- c:\program files\RealNetworks\RealDownloader\recordingmanager.exe [2012-11-30 01:33]
.
2013-02-25 c:\windows\Tasks\RealDownloaderRealUpgradeLogonTaskS-1-5-21-1417001333-1220945662-1801674531-1004.job
- c:\program files\RealNetworks\RealDownloader\realupgrade.exe [2012-11-30 01:31]
.
2013-02-22 c:\windows\Tasks\RealDownloaderRealUpgradeScheduledTaskS-1-5-21-1417001333-1220945662-1801674531-1004.job
- c:\program files\RealNetworks\RealDownloader\realupgrade.exe [2012-11-30 01:31]
.
2013-02-25 c:\windows\Tasks\RealPlayerRealUpgradeLogonTaskS-1-5-21-1417001333-1220945662-1801674531-1004.job
- c:\program files\Real\RealUpgrade\realupgrade.exe [2012-11-30 20:30]
.
2013-02-25 c:\windows\Tasks\RealPlayerRealUpgradeScheduledTaskS-1-5-21-1417001333-1220945662-1801674531-1004.job
- c:\program files\Real\RealUpgrade\realupgrade.exe [2012-11-30 20:30]
.
.
------- Supplementary Scan -------
.
uStart Page = hxxp://www.yahoo.com/
IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~3\Office12\EXCEL.EXE/3000
TCP: Interfaces\{5306E716-C3D3-4C71-B516-4E41DB4D7B9A}: NameServer = 207.230.75.34,207.230.75.60
.
.
**************************************************************************
.
catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2013-02-25 12:22
Windows 5.1.2600 Service Pack 3 NTFS
.
scanning hidden processes ... 
.
scanning hidden autostart entries ...
.
scanning hidden files ... 
.
scan completed successfully
hidden files: 0
.
**************************************************************************
.
--------------------- LOCKED REGISTRY KEYS ---------------------
.
[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}]
@Denied: (A 2) (Everyone)
@="FlashBroker"
"LocalizedString"="@c:\\WINDOWS\\system32\\Macromed\\Flash\\FlashUtil32_11_5_502_149_ActiveX.exe,-101"
.
[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\Elevation]
"Enabled"=dword:00000001
.
[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\LocalServer32]
@="c:\\WINDOWS\\system32\\Macromed\\Flash\\FlashUtil32_11_5_502_149_ActiveX.exe"
.
[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\TypeLib]
@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"
.
[HKEY_LOCAL_MACHINE\software\Classes\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}]
@Denied: (A 2) (Everyone)
@="IFlashBroker5"
.
[HKEY_LOCAL_MACHINE\software\Classes\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}\ProxyStubClsid32]
@="{00020424-0000-0000-C000-000000000046}"
.
[HKEY_LOCAL_MACHINE\software\Classes\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}\TypeLib]
@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"
"Version"="1.0"
.
[HKEY_LOCAL_MACHINE\software\Classes\VideoLAN.VLCPlugin.*1*]
@="?????????????????? v1"
.
[HKEY_LOCAL_MACHINE\software\Classes\VideoLAN.VLCPlugin.*1*\CLSID]
@="{E23FE9C6-778E-49D4-B537-38FCDE4887D8}"
.
[HKEY_LOCAL_MACHINE\software\Classes\VideoLAN.VLCPlugin.*2*]
@="?????????????????? v2"
.
[HKEY_LOCAL_MACHINE\software\Classes\VideoLAN.VLCPlugin.*2*\CLSID]
@="{9BE31822-FDAD-461B-AD51-BE1D1C159921}"
.
--------------------- DLLs Loaded Under Running Processes ---------------------
.
- - - - - - - > 'explorer.exe'(2768)
c:\windows\system32\WININET.dll
c:\windows\WinSxS\x86_Microsoft.VC80.CRT_1fc8b3b9a1e18e3b_8.0.50727.762_x-ww_6b128700\MSVCR80.dll
c:\windows\system32\ieframe.dll
c:\windows\system32\webcheck.dll
.
------------------------ Other Running Processes ------------------------
.
c:\program files\Microsoft Security Client\MsMpEng.exe
c:\program files\Java\jre7\bin\jqs.exe
c:\program files\Nero\Nero8\Nero BackItUp\NBService.exe
c:\windows\system32\VTTimer.exe
c:\windows\system32\IoctlSvc.exe
c:\windows\system32\HPZipm12.exe
c:\windows\system32\wdfmgr.exe
c:\program files\Common Files\Nero\Lib\NMIndexingService.exe
c:\windows\system32\wscntfy.exe
.
**************************************************************************
.
Completion time: 2013-02-25  12:24:24 - machine was rebooted
ComboFix-quarantined-files.txt  2013-02-25 17:24
ComboFix2.txt  2013-02-25 03:58
.
Pre-Run: 486,296,731,648 bytes free
Post-Run: 486,334,476,288 bytes free
.
WindowsXP-KB310994-SP2-Home-BootDisk-ENU.exe
[boot loader]
timeout=2
default=multi(0)disk(0)rdisk(0)partition(1)\WINDOWS
[operating systems]
c:\cmdcons\BOOTSECT.DAT="Microsoft Windows Recovery Console" /cmdcons
UnsupportedDebug="do not select this" /debug
multi(0)disk(0)rdisk(0)partition(1)\WINDOWS="Microsoft Windows XP Home Edition" /noexecute=optin /fastdetect
.
- - End Of File - - 0BADC3B23F76EA66CAED704DADAF1445
 



#12 J_Mot

J_Mot
  • Topic Starter

  • Members
  • 32 posts
  • OFFLINE
  •  
  • Local time:08:06 PM

Posted 25 February 2013 - 12:34 PM

Been on the computer all morning and it seems to be back in tip top shape. Thanks for your help!!



#13 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:08:06 PM

Posted 25 February 2013 - 01:10 PM


Hello

These logs are looking allot better. But we still have some work to do.

Please print out these instructions, or copy them to a Notepad file. It will make it easier for you to follow the instructions and complete all of the necessary steps..

uninstall some programs

NOTE** Because of the cleanup process some of the programs I have listed may not be in add/remove anymore this is fine just move to the next item on the list.

You can remove these programs using add/remove or you can use the free uninstaller from Revo (Revo does allot better of a job)
  • Programs to remove

    • Java 7 Update 10

Please download and install Revo Uninstaller Free
  • Double click Revo Uninstaller to run it.
  • From the list of programs double click on The Program to remove
  • When prompted if you want to uninstall click Yes.
  • Be sure the Moderate option is selected then click Next.
  • The program will run, If prompted again click Yes
  • when the built-in uninstaller is finished click on Next.
  • Once the program has searched for leftovers click Next.
  • Check/tick the bolded items only on the list then click Delete
  • when prompted click on Yes and then on next.
  • put a check on any folders that are found and select delete
  • when prompted select yes then on next
  • Once done click Finish.
  • .


    Clean Out Temp Files
    • This small application you may want to keep and use once a week to keep the computer clean.

      Download CCleaner from here http://www.ccleaner.com/
      • Run the installer to install the application.
      • When it gives you the option to install Yahoo toolbar uncheck the box next to it.
      • Run CCleaner. default settings are fine
      • Click Run Cleaner.
      • Close CCleaner.
: Malwarebytes' Anti-Malware :

I see that you have MBAM installed - That is great!! and at this time I would like you to update it and run me a quick scan
  • Double-click mbam icon
  • go to the update tab at the top
  • click on check for updates
  • If an update is found, it will download and install the latest version.
  • Once the program has loaded, select Perform quick scan, then click Scan.
  • When the scan is complete, click OK, then Show Results to view the results.
  • Be sure that everything is Checked (ticked) except items in the C:\System Volume Information folder and click on Remove Selected.
  • When completed, a log will open in Notepad. please copy and paste the log into your next reply
    • If you accidentally close it, the log file is saved here and will be named like this:
    • C:\Documents and Settings\Username\Application Data\Malwarebytes\Malwarebytes' Anti-Malware\Logs\mbam-log-date (time).txt
  • Note: If MBAM encounters a file that is difficult to remove, you will be presented with 1 of 2 prompts.
    Click OK to either and let MBAM proceed with the disinfection process.
    If asked to restart the computer, please do so immediately. Failure to reboot will prevent MBAM from removing all the malware.


    Download HijackThis
    • Go Here to download HijackThis program
    • Save HijackThis to your desktop.
    • Right Click on Hijackthis and select "Run as Admin" (XP users just need to double click to run)
    • Click on "Do A system scan and save a logfile" (if you do not see "Do A system scan and save a logfile" then click on main menu)
    • copy and paste hijackthis report into the topic
    "information and logs"
    • In your next post I need the following
      • Log From MBAM
      • report from Hijackthis
      • let me know of any problems you may have had
      • How is the computer doing now?
    Gringo








I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#14 J_Mot

J_Mot
  • Topic Starter

  • Members
  • 32 posts
  • OFFLINE
  •  
  • Local time:08:06 PM

Posted 25 February 2013 - 09:59 PM

Been out of the office since my last post. I will run all the above programs first thing in the morning and let you know. Thanks again for your help!



#15 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:08:06 PM

Posted 25 February 2013 - 10:03 PM

No problem
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users