Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

winrscmde


  • This topic is locked This topic is locked
28 replies to this topic

#1 adaco

adaco

  • Members
  • 18 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:11:43 PM

Posted 02 March 2013 - 08:10 PM

Can you please help me remove this trojan?  I've got 2 different logs I can provide; frst64 or OTL.  Or I will use something suggested by you guys.  ThanksAttached File  FRST.txt   33.43KB   2 downloadsAttached File  OTL.Txt   212.17KB   0 downloads



BC AdBot (Login to Remove)

 


#2 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:03:43 AM

Posted 02 March 2013 - 08:12 PM


Hello adaco

Welcome to The Forums!!

Around here they call me Gringo and I'll be glad to help you with your malware problems.


Very Important --> Please read this post completely, I have spent my time to put together somethings for you to keep in mind while I am helping you to make things go easier, faster and smoother for both of us!

  • Please do not run any tools unless instructed to do so.
    • We ask you to run different tools in a specific order to ensure the malware is completely removed from your machine, and running any additional tools may detect false positives, interfere with our tools, or cause unforeseen damage or system instability.
  • Please do not attach logs or use code boxes, just copy and paste the text.
    • Due to the high volume of logs we receive it helps to receive everything in the same format, and code boxes make the logs very difficult to read. Also, attachments require us to download and open the reports when it is easier to just read the reports in your post.
  • Please read every post completely before doing anything.
    • Pay special attention to the NOTE: lines, these entries identify an individual issue or important step in the cleanup process.
  • Please provide feedback about your experience as we go.
    • A short statement describing how the computer is working helps us understand where to go next, for example: I am still getting redirected, the computer is running normally, etc. Please do not describe the computer as "the same", this requires the extra step of looking back at your previous post.
NOTE: At the top of your post, click on the "Follow This Topic" Button, make sure that the "Receive notification" box is checked and that it is set to "Instantly" - This will send you an e-mail as soon as I reply to your topic, allowing us to resolve the issue faster.

NOTE: Backup any files that cannot be replaced. Removing malware can be unpredictable and this step can save a lot of heartaches if things don't go as planed. You can put them on a CD/DVD, external drive or a pen drive, anywhere except on the computer.

NOTE: It is good practice to copy and paste the instructions into notepad and print them in case it is necessary for you to go offline during the cleanup process. To open notepad, navigate to Start Menu > All Programs > Accessories > Notepad. Please remember to copy the entire post so you do not miss any instructions.




These are the programs I would like you to run next, if you have any problems with these just skip it and run the next one.

-Security Check-
  • Download Security Check by screen317 from here.
    • Save it to your Desktop.
    • Double click SecurityCheck.exe and follow the onscreen instructions inside of the black box.
    • A Notepad document should open automatically called checkup.txt; please post the contents of that document.
-AdwCleaner-
  • Please download AdwCleaner by Xplode onto your desktop.
    • Close all open programs and internet browsers.
    • Double click on AdwCleaner.exe to run the tool.
    • Click on Delete.
    • Confirm each time with Ok.
    • Your computer will be rebooted automatically. A text file will open after the restart.
    • Please post the content of that logfile with your next answer.
    • You can find the logfile at C:\AdwCleaner[S1].txt as well.
--RogueKiller--
  • Download & SAVE to your Desktop RogueKiller or from here
    • Quit all programs that you may have started.
    • Please disconnect any USB or external drives from the computer before you run this scan!
    • For Vista or Windows 7, right-click and select "Run as Administrator to start"
    • For Windows XP, double-click to start.
    • Wait until Prescan has finished ...
    • Then Click on "Scan" button
    • Wait until the Status box shows "Scan Finished"
    • click on "delete"
    • Wait until the Status box shows "Deleting Finished"
    • Click on "Report" and copy/paste the content of the Notepad into your next reply.
    • The log should be found in RKreport[1].txt on your Desktop
    • Exit/Close RogueKiller+
  • Gringo


I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#3 adaco

adaco
  • Topic Starter

  • Members
  • 18 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:11:43 PM

Posted 02 March 2013 - 08:41 PM

Thank u Gringo.
Here are results of security check, I'll post the other programs results momentarily.


Results of screen317's Security Check version 0.99.60
Windows 7 x64 (UAC is enabled)
Out of date service pack!!
Internet Explorer 9
``````````````Antivirus/Firewall Check:``````````````
Windows Firewall Enabled!
Norton Security Suite
WMI entry may not exist for antivirus; attempting automatic update.
`````````Anti-malware/Other Utilities Check:`````````
Java 7 Update 15
Adobe Reader XI
Google Chrome 24.0.1312.57
Google Chrome 25.0.1364.97
Google Chrome CommonDotNET.dll..
Google Chrome IdVaultCore.dll..
Google Chrome IdVaultCore.XmlSerializers.dll.
Google Chrome Microsoft.mshtml.dll.
````````Process Check: objlist.exe by Laurent````````
Norton ccSvcHst.exe
`````````````````System Health check`````````````````
Total Fragmentation on Drive C: 7%
````````````````````End of Log``````````````````````

#4 adaco

adaco
  • Topic Starter

  • Members
  • 18 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:11:43 PM

Posted 02 March 2013 - 08:49 PM

# AdwCleaner v2.113 - Logfile created 03/02/2013 at 17:45:27
# Updated 23/02/2013 by Xplode
# Operating system : Windows 7 Home Premium (64 bits)
# User : Adaco - OFFICE
# Boot Mode : Normal
# Running from : C:\Users\Adaco\Desktop\FixThis\adwcleaner.exe
# Option [Delete]


***** [Services] *****


***** [Files / Folders] *****


***** [Registry] *****

Key Deleted : HKLM\SOFTWARE\Microsoft\Internet Explorer\Extension Compatibility\{2EECD738-5844-4A99-B4B6-146BF802613B}
Key Deleted : HKLM\SOFTWARE\Microsoft\Internet Explorer\Extension Compatibility\{97F2FF5B-260C-4CCF-834A-2DDA4E29E39E}
Key Deleted : HKLM\SOFTWARE\Microsoft\Internet Explorer\Extension Compatibility\{98889811-442D-49DD-99D7-DC866BE87DBC}

***** [Internet Browsers] *****

-\\ Internet Explorer v9.0.8112.16464

[OK] Registry is clean.

-\\ Google Chrome v25.0.1364.97

File : C:\Users\Adaco\AppData\Local\Google\Chrome\User Data\Default\Preferences

[OK] File is clean.

*************************

AdwCleaner[R1].txt - [1131 octets] - [02/03/2013 17:43:21]
AdwCleaner[S1].txt - [1068 octets] - [02/03/2013 17:45:27]

########## EOF - C:\AdwCleaner[S1].txt - [1128 octets] ##########

#5 adaco

adaco
  • Topic Starter

  • Members
  • 18 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:11:43 PM

Posted 02 March 2013 - 08:58 PM

RogueKiller V8.5.2 [Feb 23 2013] by Tigzy
mail : tigzyRK<at>gmail<dot>com
Feedback : http://www.geekstogo.com/forum/files/file/413-roguekiller/
Website : http://tigzy.geekstogo.com/roguekiller.php
Blog : http://tigzyrk.blogspot.com/

Operating System : Windows 7 (6.1.7600 ) 64 bits version
Started in : Normal mode
User : Adaco [Admin rights]
Mode : Remove -- Date : 03/02/2013 17:53:08
| ARK || FAK || MBR |

¤¤¤ Bad processes : 1 ¤¤¤
[SVCHOST] svchost.exe -- C:\Windows\\svchost.exe [x] -> KILLED [TermProc]

¤¤¤ Registry Entries : 3 ¤¤¤
[HJ SMENU] HKCU\[...]\Advanced : Start_TrackProgs (0) -> REPLACED (1)
[HJ DESK] HKLM\[...]\NewStartPanel : {59031a47-3f72-44a7-89c5-5595fe6b30ee} (1) -> REPLACED (0)
[HJ DESK] HKLM\[...]\NewStartPanel : {20D04FE0-3AEA-1069-A2D8-08002B30309D} (1) -> REPLACED (0)

¤¤¤ Particular Files / Folders: ¤¤¤

¤¤¤ Driver : [NOT LOADED] ¤¤¤

¤¤¤ HOSTS File: ¤¤¤
--> C:\Windows\system32\drivers\etc\hosts



¤¤¤ MBR Check: ¤¤¤

+++++ PhysicalDrive0: QUANTUM FIREBALLlct20 30 ATA Device +++++
--- User ---
[MBR] 0ee6d366e8b5ccc6ef54e7d2e05527ca
[BSP] 9c612066d86b0b6419bbd4e3867cd5ca : Windows XP MBR Code
Partition table:
0 - [ACTIVE] NTFS (0x07) [VISIBLE] Offset (sectors): 63 | Size: 28623 Mo
User = LL1 ... OK!
User = LL2 ... OK!

+++++ PhysicalDrive1: Hitachi HDS721050CLA SCSI Disk Device +++++
--- User ---
[MBR] bb7468a5792b5d2fa69f6a2a9a064245
[BSP] 8b48b168373262961c1fbe2f8dce28ec : Windows 7/8 MBR Code
Partition table:
0 - [ACTIVE] NTFS (0x07) [VISIBLE] Offset (sectors): 63 | Size: 476929 Mo
User = LL1 ... OK!
Error reading LL2 MBR!

Finished : << RKreport[2]_D_03022013_02d1753.txt >>
RKreport[1]_S_03022013_02d1751.txt ; RKreport[2]_D_03022013_02d1753.txt



Thanks again for helping me. I guess I should have mentioned that the problems I've been experiencing are Norton pop-up saying "high cpu usage-winrscmde", and the occational blue screen, and random restarts. I also have not been able to update windows 7 service pack, it errors every time. This has been happening for months. I just formatted the hard drive and reloaded win7 a couple months ago only to have this happen again.

#6 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:03:43 AM

Posted 02 March 2013 - 09:35 PM


Hello adaco

I Would like you to do the following.

Please print out or make a copy in notepad of any instructions given, as sometimes it is necessary to go offline and you will lose access to them.

Run Combofix:

You may be asked to install or update the Recovery Console (Win XP Only) if this happens please allow it to do so (you will need to be connected to the internet for this)

Before you run Combofix I will need you to turn off any security software you have running, If you do not know how to do this you can find out >here< or >here<

Combofix may need to reboot your computer more than once to do its job this is normal.

You can download Combofix from one of these links. I want you to save it to the desktop and run it from there.1. Close any open browsers or any other programs that are open.
2. Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.

Double click on combofix.exe & follow the prompts.
When finished, it will produce a report for you.

Note 1: Do not mouseclick combofix's window while it's running. That may cause it to stall

Note 2: If you receive an error "Illegal operation attempted on a registry key that has been marked for deletion." Please restart the computer

"information and logs"
  • In your next post I need the following
  • Log from Combofix
  • let me know of any problems you may have had
  • How is the computer doing now?

  • Gringo




I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#7 adaco

adaco
  • Topic Starter

  • Members
  • 18 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:11:43 PM

Posted 02 March 2013 - 10:45 PM

ComboFix 13-03-02.01 - Adaco 03/02/2013 19:06:58.1.2 - x64
Microsoft Windows 7 Home Premium 6.1.7600.0.1252.1.1033.18.4096.2521 [GMT -8:00]
Running from: c:\users\Adaco\Downloads\ComboFix.exe
AV: Norton Security Suite *Disabled/Updated* {63DF5164-9100-186D-2187-8DC619EFD8BF}
FW: Norton Security Suite *Disabled* {5BE4D041-DB6F-1935-0AD8-24F3E73C9FC4}
SP: Norton Security Suite *Enabled/Updated* {D8BEB080-B73A-17E3-1B37-B6B462689202}
SP: Windows Defender *Disabled/Updated* {D68DDC3A-831F-4fae-9E44-DA132C1ACF46}
.
.
((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.
.
c:\users\Adaco\AppData\Local\Temp\7zS06B6\HPSLPSVC64.DLL
c:\windows\svchost.exe
.
.
((((((((((((((((((((((((((((((((((((((( Drivers/Services )))))))))))))))))))))))))))))))))))))))))))))))))
.
.
-------\Service_HPSLPSVC
.
.
((((((((((((((((((((((((( Files Created from 2013-02-03 to 2013-03-03 )))))))))))))))))))))))))))))))
.
.
2013-03-03 03:18 . 2013-03-03 03:18 -------- d-----w- c:\users\Default\AppData\Local\temp
2013-03-03 00:22 . 2013-03-03 00:22 -------- d-----w- C:\FRST
2013-03-02 20:15 . 2013-03-02 20:15 -------- d-----w- c:\programdata\HP
2013-03-01 15:34 . 2013-03-01 15:33 95648 ----a-w- c:\windows\SysWow64\WindowsAccessBridge-32.dll
2013-03-01 15:33 . 2013-03-01 15:33 -------- d-----w- c:\program files (x86)\Java
2013-02-28 18:37 . 2013-02-28 18:37 -------- d-----w- c:\program files\Java
2013-02-26 16:44 . 2013-02-28 15:27 -------- d-----w- c:\users\Adaco\AppData\Roaming\IDM
2013-02-26 16:44 . 2013-02-26 16:44 -------- d-----w- c:\programdata\IDM
2013-02-26 16:43 . 2013-02-28 15:28 -------- d-----w- c:\program files (x86)\Internet Download Manager
2013-02-15 18:22 . 2012-10-09 01:00 776864 ----a-w- c:\windows\system32\drivers\N360x64\1402000.013\srtsp64.sys
2013-02-15 18:22 . 2012-10-04 01:40 1133216 ----a-w- c:\windows\system32\drivers\N360x64\1402000.013\symefa64.sys
2013-02-15 18:22 . 2012-10-04 01:40 493216 ----a-w- c:\windows\system32\drivers\N360x64\1402000.013\symds64.sys
2013-02-15 18:22 . 2012-10-04 01:19 168096 ----a-w- c:\windows\system32\drivers\N360x64\1402000.013\ccsetx64.sys
2013-02-15 18:22 . 2012-07-28 03:05 224416 ----a-r- c:\windows\system32\drivers\N360x64\1402000.013\ironx64.sys
2013-02-15 18:22 . 2012-07-23 01:34 432800 ----a-r- c:\windows\system32\drivers\N360x64\1402000.013\symnets.sys
2013-02-15 18:22 . 2012-06-21 02:45 23448 ----a-r- c:\windows\system32\drivers\N360x64\1402000.013\symelam.sys
2013-02-15 18:22 . 2012-05-25 05:36 37496 ----a-r- c:\windows\system32\drivers\N360x64\1402000.013\srtspx64.sys
2013-02-15 18:17 . 2013-02-15 18:17 -------- d-----w- c:\program files (x86)\Common Files\Symantec Shared
2013-02-15 17:20 . 2013-02-15 17:20 -------- d-----w- c:\program files\Symantec
2013-02-15 17:20 . 2013-02-15 17:20 177312 ----a-w- c:\windows\system32\drivers\SYMEVENT64x86.SYS
2013-02-15 17:19 . 2013-02-15 17:19 -------- d-----w- c:\program files (x86)\Norton Security Suite
2013-02-15 17:16 . 2013-02-15 17:16 -------- d-----w- c:\program files (x86)\KeyCryptSDK
2013-02-15 17:16 . 2013-01-06 04:39 26448 ----a-w- c:\windows\system32\drivers\KeyCrypt64.sys
2013-02-15 17:16 . 2013-02-15 17:16 -------- d-----w- c:\windows\SysWow64\ZALSDK_uninst
2013-02-15 17:16 . 2013-01-06 04:39 7369552 ----a-w- c:\windows\SysWow64\ZALSDKCore.dll
2013-02-15 17:16 . 2013-02-15 17:16 45968 ----a-w- c:\windows\system32\drivers\AntiLog64.sys
2013-02-15 17:16 . 2013-02-15 17:16 -------- d-----w- c:\users\Adaco\AppData\Local\Zemana
2013-02-15 11:02 . 2013-01-09 01:10 996352 ----a-w- c:\program files\Common Files\Microsoft Shared\VGX\VGX.dll
2013-02-15 11:02 . 2013-01-08 22:01 768000 ----a-w- c:\program files (x86)\Common Files\Microsoft Shared\VGX\VGX.dll
2013-02-15 08:57 . 2013-02-28 23:01 -------- d-----w- c:\program files (x86)\Common Files\Java
2013-02-15 08:57 . 2013-02-15 08:56 782240 ----a-w- c:\windows\SysWow64\deployJava1.dll
2013-02-15 08:57 . 2013-03-01 15:33 861088 ----a-w- c:\windows\SysWow64\npDeployJava1.dll
2013-02-15 08:55 . 2013-02-15 08:55 -------- d-----w- c:\programdata\McAfee
2013-02-15 08:50 . 2013-02-15 08:50 -------- d-----w- c:\program files (x86)\Google
2013-02-15 08:50 . 2013-02-15 08:51 -------- d-----w- c:\users\Adaco\AppData\Local\Google
2013-02-15 08:50 . 2013-02-15 08:50 -------- d-----w- c:\users\Adaco\AppData\Local\Apps
2013-02-15 08:50 . 2013-02-15 08:50 -------- d-----w- c:\users\Adaco\AppData\Local\Deployment
2013-02-12 06:34 . 2013-01-08 05:32 9161176 ----a-w- c:\programdata\Microsoft\Windows Defender\Definition Updates\{3D21978F-2A0E-48D1-BC37-6EE644107AAE}\mpengine.dll
2013-02-07 18:47 . 2013-02-07 19:02 -------- d-----w- c:\programdata\Cisco Systems
.
.
.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2013-02-27 16:29 . 2012-12-31 22:18 71024 ----a-w- c:\windows\SysWow64\FlashPlayerCPLApp.cpl
2013-02-27 16:29 . 2012-12-31 22:18 691568 ----a-w- c:\windows\SysWow64\FlashPlayerApp.exe
2013-02-15 11:04 . 2012-12-31 21:59 70004024 ----a-w- c:\windows\system32\MRT.exe
2013-01-17 09:28 . 2012-12-31 02:45 273840 ------w- c:\windows\system32\MpSigStub.exe
2013-01-04 04:43 . 2013-02-15 02:18 44032 ----a-w- c:\windows\apppatch\acwow64.dll
2012-12-31 02:25 . 2012-12-31 02:25 74752 ----a-w- c:\windows\SysWow64\RegisterIEPKEYs.exe
2012-12-31 02:25 . 2012-12-31 02:25 161792 ----a-w- c:\windows\SysWow64\msls31.dll
2012-12-31 02:25 . 2012-12-31 02:25 91648 ----a-w- c:\windows\system32\SetIEInstalledDate.exe
2012-12-31 02:25 . 2012-12-31 02:25 89088 ----a-w- c:\windows\system32\RegisterIEPKEYs.exe
2012-12-31 02:25 . 2012-12-31 02:25 89088 ----a-w- c:\windows\system32\ie4uinit.exe
2012-12-31 02:25 . 2012-12-31 02:25 86528 ----a-w- c:\windows\SysWow64\iesysprep.dll
2012-12-31 02:25 . 2012-12-31 02:25 85504 ----a-w- c:\windows\system32\iesetup.dll
2012-12-31 02:25 . 2012-12-31 02:25 82432 ----a-w- c:\windows\system32\icardie.dll
2012-12-31 02:25 . 2012-12-31 02:25 76800 ----a-w- c:\windows\SysWow64\SetIEInstalledDate.exe
2012-12-31 02:25 . 2012-12-31 02:25 76800 ----a-w- c:\windows\system32\tdc.ocx
2012-12-31 02:25 . 2012-12-31 02:25 74752 ----a-w- c:\windows\SysWow64\iesetup.dll
2012-12-31 02:25 . 2012-12-31 02:25 65024 ----a-w- c:\windows\system32\pngfilt.dll
2012-12-31 02:25 . 2012-12-31 02:25 63488 ----a-w- c:\windows\SysWow64\tdc.ocx
2012-12-31 02:25 . 2012-12-31 02:25 55296 ----a-w- c:\windows\system32\msfeedsbs.dll
2012-12-31 02:25 . 2012-12-31 02:25 534528 ----a-w- c:\windows\system32\ieapfltr.dll
2012-12-31 02:25 . 2012-12-31 02:25 49664 ----a-w- c:\windows\system32\imgutil.dll
2012-12-31 02:25 . 2012-12-31 02:25 48640 ----a-w- c:\windows\SysWow64\mshtmler.dll
2012-12-31 02:25 . 2012-12-31 02:25 48640 ----a-w- c:\windows\system32\mshtmler.dll
2012-12-31 02:25 . 2012-12-31 02:25 452608 ----a-w- c:\windows\system32\dxtmsft.dll
2012-12-31 02:25 . 2012-12-31 02:25 448512 ----a-w- c:\windows\system32\html.iec
2012-12-31 02:25 . 2012-12-31 02:25 403248 ----a-w- c:\windows\system32\iedkcs32.dll
2012-12-31 02:25 . 2012-12-31 02:25 39936 ----a-w- c:\windows\system32\iernonce.dll
2012-12-31 02:25 . 2012-12-31 02:25 3695416 ----a-w- c:\windows\system32\ieapfltr.dat
2012-12-31 02:25 . 2012-12-31 02:25 367104 ----a-w- c:\windows\SysWow64\html.iec
2012-12-31 02:25 . 2012-12-31 02:25 35840 ----a-w- c:\windows\SysWow64\imgutil.dll
2012-12-31 02:25 . 2012-12-31 02:25 30720 ----a-w- c:\windows\system32\licmgr10.dll
2012-12-31 02:25 . 2012-12-31 02:25 282112 ----a-w- c:\windows\system32\dxtrans.dll
2012-12-31 02:25 . 2012-12-31 02:25 267776 ----a-w- c:\windows\system32\ieaksie.dll
2012-12-31 02:25 . 2012-12-31 02:25 249344 ----a-w- c:\windows\system32\webcheck.dll
2012-12-31 02:25 . 2012-12-31 02:25 23552 ----a-w- c:\windows\SysWow64\licmgr10.dll
2012-12-31 02:25 . 2012-12-31 02:25 222208 ----a-w- c:\windows\system32\msls31.dll
2012-12-31 02:25 . 2012-12-31 02:25 197120 ----a-w- c:\windows\system32\msrating.dll
2012-12-31 02:25 . 2012-12-31 02:25 165888 ----a-w- c:\windows\system32\iexpress.exe
2012-12-31 02:25 . 2012-12-31 02:25 163840 ----a-w- c:\windows\system32\ieakui.dll
2012-12-31 02:25 . 2012-12-31 02:25 160256 ----a-w- c:\windows\system32\wextract.exe
2012-12-31 02:25 . 2012-12-31 02:25 160256 ----a-w- c:\windows\system32\ieakeng.dll
2012-12-31 02:25 . 2012-12-31 02:25 152064 ----a-w- c:\windows\SysWow64\wextract.exe
2012-12-31 02:25 . 2012-12-31 02:25 150528 ----a-w- c:\windows\SysWow64\iexpress.exe
2012-12-31 02:25 . 2012-12-31 02:25 149504 ----a-w- c:\windows\system32\occache.dll
2012-12-31 02:25 . 2012-12-31 02:25 145920 ----a-w- c:\windows\system32\iepeers.dll
2012-12-31 02:25 . 2012-12-31 02:25 135168 ----a-w- c:\windows\system32\IEAdvpack.dll
2012-12-31 02:25 . 2012-12-31 02:25 12288 ----a-w- c:\windows\system32\mshta.exe
2012-12-31 02:25 . 2012-12-31 02:25 11776 ----a-w- c:\windows\SysWow64\mshta.exe
2012-12-31 02:25 . 2012-12-31 02:25 114176 ----a-w- c:\windows\system32\admparse.dll
2012-12-31 02:25 . 2012-12-31 02:25 111616 ----a-w- c:\windows\system32\iesysprep.dll
2012-12-31 02:25 . 2012-12-31 02:25 110592 ----a-w- c:\windows\SysWow64\IEAdvpack.dll
2012-12-31 02:25 . 2012-12-31 02:25 10752 ----a-w- c:\windows\system32\msfeedssync.exe
2012-12-31 02:25 . 2012-12-31 02:25 103936 ----a-w- c:\windows\system32\inseng.dll
2012-12-31 02:25 . 2012-12-31 02:25 101888 ----a-w- c:\windows\SysWow64\admparse.dll
2012-12-31 02:24 . 2012-12-31 02:24 982912 ----a-w- c:\windows\system32\drivers\dxgkrnl.sys
2012-12-31 02:24 . 2012-12-31 02:24 662528 ----a-w- c:\windows\system32\XpsPrint.dll
2012-12-31 02:24 . 2012-12-31 02:24 470016 ----a-w- c:\windows\system32\XpsGdiConverter.dll
2012-12-31 02:24 . 2012-12-31 02:24 442880 ----a-w- c:\windows\SysWow64\XpsPrint.dll
2012-12-31 02:24 . 2012-12-31 02:24 4068864 ----a-w- c:\windows\system32\mf.dll
2012-12-31 02:24 . 2012-12-31 02:24 3181568 ----a-w- c:\windows\SysWow64\mf.dll
2012-12-31 02:24 . 2012-12-31 02:24 283648 ----a-w- c:\windows\SysWow64\XpsGdiConverter.dll
2012-12-31 02:24 . 2012-12-31 02:24 265088 ----a-w- c:\windows\system32\drivers\dxgmms1.sys
2012-12-31 02:24 . 2012-12-31 02:24 257024 ----a-w- c:\windows\system32\mfreadwrite.dll
2012-12-31 02:24 . 2012-12-31 02:24 229888 ----a-w- c:\windows\system32\XpsRasterService.dll
2012-12-31 02:24 . 2012-12-31 02:24 206848 ----a-w- c:\windows\system32\mfps.dll
2012-12-31 02:24 . 2012-12-31 02:24 196608 ----a-w- c:\windows\SysWow64\mfreadwrite.dll
2012-12-31 02:24 . 2012-12-31 02:24 1888256 ----a-w- c:\windows\system32\WMVDECOD.DLL
2012-12-31 02:24 . 2012-12-31 02:24 1863680 ----a-w- c:\windows\system32\ExplorerFrame.dll
2012-12-31 02:24 . 2012-12-31 02:24 1619456 ----a-w- c:\windows\SysWow64\WMVDECOD.DLL
2012-12-31 02:24 . 2012-12-31 02:24 1495040 ----a-w- c:\windows\SysWow64\ExplorerFrame.dll
2012-12-31 02:24 . 2012-12-31 02:24 144384 ----a-w- c:\windows\system32\cdd.dll
2012-12-31 02:24 . 2012-12-31 02:24 135168 ----a-w- c:\windows\SysWow64\XpsRasterService.dll
2012-12-31 02:24 . 2012-12-31 02:24 1133568 ----a-w- c:\windows\system32\FntCache.dll
2012-12-16 16:52 . 2012-12-31 21:54 46080 ----a-w- c:\windows\system32\atmlib.dll
2012-12-16 14:40 . 2012-12-31 21:54 367616 ----a-w- c:\windows\system32\atmfd.dll
2012-12-16 14:25 . 2012-12-31 21:54 295424 ----a-w- c:\windows\SysWow64\atmfd.dll
2012-12-16 14:25 . 2012-12-31 21:54 34304 ----a-w- c:\windows\SysWow64\atmlib.dll
.
.
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run]
"SunJavaUpdateSched"="c:\program files (x86)\Common Files\Java\Java Update\jusched.exe" [2012-07-03 252848]
.
c:\programdata\Microsoft\Windows\Start Menu\Programs\Startup\
Constant Guard.lnk - c:\program files (x86)\Constant Guard Protection Suite\IDVault.exe [2013-1-14 3982376]
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\system]
"ConsentPromptBehaviorAdmin"= 5 (0x5)
"ConsentPromptBehaviorUser"= 3 (0x3)
"EnableUIADesktopToggle"= 0 (0x0)
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\windows]
"LoadAppInit_DLLs"=1 (0x1)
"AppInit_DLLs"=c:\progra~2\KEYCRY~1\KeyCrypt32(2).dll
.
R2 clr_optimization_v4.0.30319_64;Microsoft .NET Framework NGEN v4.0.30319_X64;c:\windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe [2010-03-18 138576]
R3 WatAdminSvc;Windows Activation Technologies Service;c:\windows\system32\Wat\WatAdminSvc.exe [2012-12-31 1255736]
S0 SymDS;Symantec Data Store;c:\windows\system32\drivers\N360x64\1402000.013\SYMDS64.SYS [2012-10-04 493216]
S0 SymEFA;Symantec Extended File Attributes;c:\windows\system32\drivers\N360x64\1402000.013\SYMEFA64.SYS [2012-10-04 1133216]
S1 AntiLog32;AntiLog32;c:\windows\system32\drivers\AntiLog64.sys [2013-02-15 45968]
S1 BHDrvx64;BHDrvx64;c:\programdata\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\N360_20.1.0.24\Definitions\BASHDefs\20130208.001\BHDrvx64.sys [2013-02-08 1388120]
S1 ccSet_N360;Norton Security Suite Settings Manager;c:\windows\system32\drivers\N360x64\1402000.013\ccSetx64.sys [2012-10-04 168096]
S1 IDSVia64;IDSVia64;c:\programdata\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\N360_20.1.0.24\Definitions\IPSDefs\20130301.002\IDSvia64.sys [2013-02-14 513184]
S1 SymIRON;Symantec Iron Driver;c:\windows\system32\drivers\N360x64\1402000.013\Ironx64.SYS [2012-07-28 224416]
S1 SymNetS;Symantec Network Security WFP Driver;c:\windows\System32\Drivers\N360x64\1402000.013\SYMNETS.SYS [2012-07-23 432800]
S2 IDVaultSvc;CGPS Service;c:\program files (x86)\Constant Guard Protection Suite\IDVaultSvc.exe [2013-01-14 66600]
S2 N360;Norton Security Suite;c:\program files (x86)\Norton Security Suite\Engine\20.2.0.19\ccSvcHst.exe [2012-10-11 143928]
S2 NPF;NetGroup Packet Filter Driver;c:\windows\system32\drivers\npf.sys [2010-06-25 35344]
S3 EraserUtilRebootDrv;EraserUtilRebootDrv;c:\program files (x86)\Common Files\Symantec Shared\EENGINE\EraserUtilRebootDrv.sys [2013-02-15 138912]
S3 keycrypt;keycrypt;c:\windows\system32\DRIVERS\KeyCrypt64.sys [2013-01-06 26448]
.
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\active setup\installed components\{8A69D345-D564-463c-AFF1-A69D9E530F96}]
2013-02-27 16:29 1629648 ----a-w- c:\program files (x86)\Google\Chrome\Application\25.0.1364.97\Installer\chrmstp.exe
.
Contents of the 'Scheduled Tasks' folder
.
2013-03-03 c:\windows\Tasks\Adobe Flash Player Updater.job
- c:\windows\SysWOW64\Macromed\Flash\FlashPlayerUpdateService.exe [2012-12-31 16:29]
.
2013-03-03 c:\windows\Tasks\GoogleUpdateTaskMachineCore.job
- c:\program files (x86)\Google\Update\GoogleUpdate.exe [2013-02-15 08:50]
.
2013-03-03 c:\windows\Tasks\GoogleUpdateTaskMachineUA.job
- c:\program files (x86)\Google\Update\GoogleUpdate.exe [2013-02-15 08:50]
.
.
--------- X64 Entries -----------
.
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows]
"AppInit_DLLs"=c:\progra~2\KEYCRY~1\KeyCrypt64(2).dll
.
------- Supplementary Scan -------
.
uLocal Page = c:\windows\system32\blank.htm
uStart Page = hxxp://www.google.com/
mLocal Page = c:\windows\SysWOW64\blank.htm
Trusted Zone: cyanna.com\ed2go.login
Trusted Zone: ltwtechnology.com\www
TCP: DhcpNameServer = 192.168.1.1
.
.
[HKEY_LOCAL_MACHINE\system\ControlSet001\services\N360]
"ImagePath"="\"c:\program files (x86)\Norton Security Suite\Engine\20.2.0.19\ccSvcHst.exe\" /s \"N360\" /m \"c:\program files (x86)\Norton Security Suite\Engine\20.2.0.19\diMaster.dll\" /prefetch:1"
.
--------------------- LOCKED REGISTRY KEYS ---------------------
.
[HKEY_USERS\S-1-5-21-3211685755-2750508449-3725178494-1000_Classes\Wow6432Node\CLSID\{5ED60779-4DE2-4E07-B862-974CA4FF2E9C}]
@Denied: (Full) (Everyone)
@Allowed: (Read) (RestrictedCode)
"scansk"=hex(0):fd,d7,fd,28,57,b3,e8,1b,a2,65,1f,f3,16,ce,57,db,ac,40,2a,80,86,
58,1c,d0,83,3b,59,9a,8d,55,be,d6,e2,5c,51,35,80,41,8c,4a,00,00,00,00,00,00,\
.
[HKEY_USERS\S-1-5-21-3211685755-2750508449-3725178494-1000_Classes\Wow6432Node\CLSID\{7b5d91d7-6bd2-4404-ab11-d9f8f4caf5f4}]
@Denied: (Full) (Everyone)
@Allowed: (Read) (RestrictedCode)
"Model"=dword:0000002c
"Therad"=dword:00000022
"MData"=hex(0):2b,8f,78,29,5a,0c,ce,ec,48,d4,68,e5,9f,6a,96,3e,ab,de,c5,81,26,
38,95,44,c3,4d,9e,47,61,a7,8f,c3,2b,be,a1,85,54,a0,50,ee,c3,78,1c,29,16,64,\
.
[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}]
@Denied: (A 2) (Everyone)
@="FlashBroker"
"LocalizedString"="@c:\\Windows\\system32\\Macromed\\Flash\\FlashUtil64_11_6_602_171_ActiveX.exe,-101"
.
[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\Elevation]
"Enabled"=dword:00000001
.
[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\LocalServer32]
@="c:\\Windows\\system32\\Macromed\\Flash\\FlashUtil64_11_6_602_171_ActiveX.exe"
.
[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\TypeLib]
@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"
.
[HKEY_LOCAL_MACHINE\software\Classes\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}]
@Denied: (A 2) (Everyone)
@="IFlashBroker5"
.
[HKEY_LOCAL_MACHINE\software\Classes\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}\ProxyStubClsid32]
@="{00020424-0000-0000-C000-000000000046}"
.
[HKEY_LOCAL_MACHINE\software\Classes\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}\TypeLib]
@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"
"Version"="1.0"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}]
@Denied: (A 2) (Everyone)
@="FlashBroker"
"LocalizedString"="@c:\\Windows\\SysWOW64\\Macromed\\Flash\\FlashUtil32_11_6_602_171_ActiveX.exe,-101"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\Elevation]
"Enabled"=dword:00000001
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\LocalServer32]
@="c:\\Windows\\SysWOW64\\Macromed\\Flash\\FlashUtil32_11_6_602_171_ActiveX.exe"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\TypeLib]
@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}]
@Denied: (A 2) (Everyone)
@="Shockwave Flash Object"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\InprocServer32]
@="c:\\Windows\\SysWOW64\\Macromed\\Flash\\Flash32_11_6_602_171.ocx"
"ThreadingModel"="Apartment"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\MiscStatus]
@="0"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\ProgID]
@="ShockwaveFlash.ShockwaveFlash.11"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\ToolboxBitmap32]
@="c:\\Windows\\SysWOW64\\Macromed\\Flash\\Flash32_11_6_602_171.ocx, 1"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\TypeLib]
@="{D27CDB6B-AE6D-11cf-96B8-444553540000}"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\Version]
@="1.0"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\VersionIndependentProgID]
@="ShockwaveFlash.ShockwaveFlash"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}]
@Denied: (A 2) (Everyone)
@="Macromedia Flash Factory Object"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\InprocServer32]
@="c:\\Windows\\SysWOW64\\Macromed\\Flash\\Flash32_11_6_602_171.ocx"
"ThreadingModel"="Apartment"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\ProgID]
@="FlashFactory.FlashFactory.1"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\ToolboxBitmap32]
@="c:\\Windows\\SysWOW64\\Macromed\\Flash\\Flash32_11_6_602_171.ocx, 1"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\TypeLib]
@="{D27CDB6B-AE6D-11cf-96B8-444553540000}"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\Version]
@="1.0"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\VersionIndependentProgID]
@="FlashFactory.FlashFactory"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}]
@Denied: (A 2) (Everyone)
@="IFlashBroker5"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}\ProxyStubClsid32]
@="{00020424-0000-0000-C000-000000000046}"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}\TypeLib]
@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"
"Version"="1.0"
.
[HKEY_LOCAL_MACHINE\system\ControlSet001\Control\PCW\Security]
@Denied: (Full) (Everyone)
.
------------------------ Other Running Processes ------------------------
.
c:\\.\globalroot\systemroot\svchost.exe
.
**************************************************************************
.
Completion time: 2013-03-02 19:42:59 - machine was rebooted
ComboFix-quarantined-files.txt 2013-03-03 03:42
.
Pre-Run: 138,567,118,848 bytes free
Post-Run: 139,559,526,400 bytes free
.
- - End Of File - - 44BB8C91ACF4A72F286BA1D1DD09FE15

Just finished...I'll keep my fingers crossed that the first pass did the job.

#8 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:03:43 AM

Posted 02 March 2013 - 10:49 PM



Hello adaco


It is a little harder than that but we will get it soon


TDSSKiller

Please download the latest version of TDSSKiller from here and save it to your Desktop.
  • Doubleclick on TDSSKiller.exe to run the application, then click on Change parameters.
  • Put a checkmark beside loaded modules.
  • A reboot will be needed to apply the changes. Do it.
  • TDSSKiller will launch automatically after the reboot. Also your computer may seem very slow and unusable. This is normal. Give it enough time to load your background programs.
  • Then click on Change parameters in TDSSKiller.
  • Check all boxes then click OK.
  • Click the Start Scan button.
  • The scan should take no longer than 2 minutes.
  • If a suspicious object is detected, the default action will be Skip, click on Continue.
  • If malicious objects are found, they will show in the Scan results
  • Ensure Cure (default) is selected, then click Continue > Reboot now to finish the cleaning process.
    Note: If Cure is not available, please choose Skip instead, do not choose Delete unless instructed.
  • A report will be created in your root directory, (usually C:\ folder) in the form of "TDSSKiller.[Version]_[Date]_[Time]_log.txt". Please copy and paste the contents of that file here.

    Note** this report can be very long - so if the website gives you an error saying it is to long you may attache it

    If the forum still complains about it being to long send me everything that is at the end of the report after where it says

    ==================
    Scan finished
    ==================
  • and I will see if I want to see the whole report

    Malwarebytes Anti-Rootkit

    1.Download Malwarebytes Anti-Rootkit
    2.Unzip the contents to a folder in a convenient location.
    3.Open the folder where the contents were unzipped and run mbar.exe
    4.Follow the instructions in the wizard to update and allow the program to scan your computer for threats.
    5.Click on the Cleanup button to remove any threats and reboot if prompted to do so.
    6.Wait while the system shuts down and the cleanup process is performed.
    7.Perform another scan with Malwarebytes Anti-Rootkit to verify that no threats remain. If they do, then click Cleanup once more and repeat the process.
    8.If no additional threats were found, verify that your system is now running normally, making sure that the following items are functional:
    • •Internet access
      •Windows Update
      •Windows Firewall
    9.If there are additional problems with your system, such as any of those listed above or other system issues, then run the 'fixdamage' tool included with Malwarebytes Anti-Rootkit and reboot.
    10.Verify that your system is now functioning normally.

    If you have any problems running either one come back and let me know

    please reply with the reports from TDSSKiller and MBAR

    Gringo







I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#9 adaco

adaco
  • Topic Starter

  • Members
  • 18 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:11:43 PM

Posted 02 March 2013 - 11:10 PM

19:56:41.0362 3392 TDSS rootkit removing tool 2.8.16.0 Feb 11 2013 18:50:42
19:56:43.0370 3392 ============================================================
19:56:43.0370 3392 Current date / time: 2013/03/02 19:56:43.0370
19:56:43.0370 3392 SystemInfo:
19:56:43.0370 3392
19:56:43.0370 3392 OS Version: 6.1.7600 ServicePack: 0.0
19:56:43.0370 3392 Product type: Workstation
19:56:43.0370 3392 ComputerName: OFFICE
19:56:43.0370 3392 UserName: Adaco
19:56:43.0370 3392 Windows directory: C:\Windows
19:56:43.0370 3392 System windows directory: C:\Windows
19:56:43.0370 3392 Running under WOW64
19:56:43.0370 3392 Processor architecture: Intel x64
19:56:43.0370 3392 Number of processors: 2
19:56:43.0370 3392 Page size: 0x1000
19:56:43.0370 3392 Boot type: Normal boot
19:56:43.0370 3392 ============================================================
19:56:51.0836 3392 Drive \Device\Harddisk0\DR0 - Size: 0x6FD187E00 (27.95 Gb), SectorSize: 0x200, Cylinders: 0xF25, SectorsPerTrack: 0x3F, TracksPerCylinder: 0xF0, Type 'K0', Flags 0x00000040
19:56:51.0836 3392 Drive \Device\Harddisk1\DR1 - Size: 0x7470AFDE00 (465.76 Gb), SectorSize: 0x200, Cylinders: 0xFC59, SectorsPerTrack: 0x3F, TracksPerCylinder: 0xF0, Type 'K0', Flags 0x00000040
19:56:51.0876 3392 ============================================================
19:56:51.0876 3392 \Device\Harddisk0\DR0:
19:56:51.0876 3392 MBR partitions:
19:56:51.0876 3392 \Device\Harddisk0\DR0\Partition1: MBR, Type 0x7, StartLBA 0x3F, BlocksNum 0x37E7911
19:56:51.0876 3392 \Device\Harddisk1\DR1:
19:56:51.0876 3392 MBR partitions:
19:56:51.0876 3392 \Device\Harddisk1\DR1\Partition1: MBR, Type 0x7, StartLBA 0x3F, BlocksNum 0x3A380D41
19:56:51.0876 3392 ============================================================
19:56:51.0886 3392 C: <-> \Device\Harddisk1\DR1\Partition1
19:56:51.0926 3392 E: <-> \Device\Harddisk0\DR0\Partition1
19:56:51.0926 3392 ============================================================
19:56:51.0926 3392 Initialize success
19:56:51.0926 3392 ============================================================
19:57:04.0970 4364 Deinitialize success

#10 adaco

adaco
  • Topic Starter

  • Members
  • 18 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:11:43 PM

Posted 02 March 2013 - 11:15 PM

20:02:10.0559 3556 Detected object count: 2
20:02:10.0559 3556 Actual detected object count: 2
20:03:31.0362 3556 \Device\Harddisk1\DR1\# - copied to quarantine
20:03:31.0422 3556 \Device\Harddisk1\DR1 - copied to quarantine
20:03:31.0771 3556 \Device\Harddisk1\DR1\TDLFS\cmd.dll - copied to quarantine
20:03:31.0804 3556 \Device\Harddisk1\DR1\TDLFS\cmd64.dll - copied to quarantine
20:03:32.0034 3556 \Device\Harddisk1\DR1\TDLFS\sub.dll - copied to quarantine
20:03:32.0044 3556 \Device\Harddisk1\DR1\TDLFS\subx.dll - copied to quarantine
20:03:32.0264 3556 \Device\Harddisk1\DR1\TDLFS\drv32 - copied to quarantine
20:03:32.0394 3556 \Device\Harddisk1\DR1\TDLFS\drv64 - copied to quarantine
20:03:32.0434 3556 \Device\Harddisk1\DR1\TDLFS\servers.dat - copied to quarantine
20:03:32.0434 3556 \Device\Harddisk1\DR1\TDLFS\config.ini - copied to quarantine
20:03:32.0434 3556 \Device\Harddisk1\DR1\TDLFS\ldr16 - copied to quarantine
20:03:32.0454 3556 \Device\Harddisk1\DR1\TDLFS\ldr32 - copied to quarantine
20:03:32.0474 3556 \Device\Harddisk1\DR1\TDLFS\ldr64 - copied to quarantine
20:03:32.0484 3556 \Device\Harddisk1\DR1\TDLFS\s - copied to quarantine
20:03:32.0494 3556 \Device\Harddisk1\DR1\TDLFS\ldrm - copied to quarantine
20:03:32.0494 3556 \Device\Harddisk1\DR1\TDLFS\u - copied to quarantine
20:03:32.0734 3556 \Device\Harddisk1\DR1\TDLFS\ph.dll - copied to quarantine
20:03:32.0814 3556 \Device\Harddisk1\DR1 ( Rootkit.Boot.Pihar.c ) - will be cured on reboot
20:03:32.0824 3556 \Device\Harddisk1\DR1 - ok
20:03:32.0894 3556 \Device\Harddisk1\DR1 ( Rootkit.Boot.Pihar.c ) - User select action: Cure
20:03:32.0904 3556 \Device\Harddisk1\DR1 ( TDSS File System ) - skipped by user
20:03:32.0904 3556 \Device\Harddisk1\DR1 ( TDSS File System ) - User select action: Skip
20:03:51.0278 3124 Deinitialize success

20:07:51.0144 2924 Scan finished
20:07:51.0144 2924 ============================================================
20:07:51.0159 3796 Detected object count: 1
20:07:51.0159 3796 Actual detected object count: 1
20:07:57.0072 3796 \Device\Harddisk1\DR1 ( TDSS File System ) - skipped by user
20:07:57.0072 3796 \Device\Harddisk1\DR1 ( TDSS File System ) - User select action: Skip

#11 adaco

adaco
  • Topic Starter

  • Members
  • 18 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:11:43 PM

Posted 02 March 2013 - 11:48 PM

Malwarebytes Anti-Rootkit BETA 1.01.0.1021
www.malwarebytes.org

Database version: v2013.03.03.01

Windows 7 x64 NTFS
Internet Explorer 9.0.8112.16421
Adaco :: OFFICE [administrator]

3/2/2013 8:26:10 PM
mbar-log-2013-03-02 (20-26-10).txt

Scan type: Quick scan
Scan options enabled: Memory | Startup | Registry | File System | Heuristics/Extra | Heuristics/Shuriken | PUP | PUM | P2P
Scan options disabled:
Objects scanned: 26151
Time elapsed: 8 minute(s), 39 second(s)

Memory Processes Detected: 0
(No malicious items detected)

Memory Modules Detected: 0
(No malicious items detected)

Registry Keys Detected: 0
(No malicious items detected)

Registry Values Detected: 0
(No malicious items detected)

Registry Data Items Detected: 0
(No malicious items detected)

Folders Detected: 0
(No malicious items detected)

Files Detected: 1
c:\Windows\svchost.exe (Trojan.Agent) -> Delete on reboot.

(end)


After second scan, nothing was detected. I'm gonna try to update win7's service pack.
By the way, what do u suggest to use for antivirus software?

#12 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:03:43 AM

Posted 02 March 2013 - 11:53 PM


Hello adaco

At this time I would like you to run this script for me and it is a good time to check out the computer to see if there is anything else that needs to be addressed.

:Run CFScript:

Please start by opening Notepad and copy/paste the text in the box into the window:
 ClearJavaCache:: 
Save it to your desktop as CFScript.txt

Referring to the picture above, drag CFScript.txt into ComboFix.exe
CFScriptB-4.gif
This will let ComboFix run again.
Restart if you have to.
Save the produced logfile to your desktop.

Note: Do not mouseclick combofix's window whilst it's running. That may cause it to stall

Note 2: If you receive an error "Illegal operation attempted on a registry key that has been marked for deletion." Please restart the computer

"information and logs"
  • In your next post I need the following
    • report from Combofix
    • let me know of any problems you may have had
    • How is the computer doing now after running the script?
Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#13 adaco

adaco
  • Topic Starter

  • Members
  • 18 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:11:43 PM

Posted 03 March 2013 - 12:28 AM

ComboFix 13-03-02.01 - Adaco 03/02/2013 21:16:53.2.2 - x64
Microsoft Windows 7 Home Premium 6.1.7600.0.1252.1.1033.18.4096.2814 [GMT -8:00]
Running from: c:\users\Adaco\Downloads\ComboFix.exe
Command switches used :: c:\users\Adaco\Desktop\CFScript.txt
AV: Norton Security Suite *Disabled/Updated* {63DF5164-9100-186D-2187-8DC619EFD8BF}
FW: Norton Security Suite *Enabled* {5BE4D041-DB6F-1935-0AD8-24F3E73C9FC4}
SP: Norton Security Suite *Enabled/Updated* {D8BEB080-B73A-17E3-1B37-B6B462689202}
SP: Windows Defender *Disabled/Updated* {D68DDC3A-831F-4fae-9E44-DA132C1ACF46}
.
.
((((((((((((((((((((((((( Files Created from 2013-02-03 to 2013-03-03 )))))))))))))))))))))))))))))))
.
.
2013-03-03 05:22 . 2013-03-03 05:22 -------- d-----w- c:\users\Default\AppData\Local\temp
2013-03-03 04:17 . 2013-03-03 04:17 -------- d-----w- c:\programdata\Malwarebytes
2013-03-03 04:03 . 2013-03-03 04:03 -------- d-----w- C:\TDSSKiller_Quarantine
2013-03-03 00:22 . 2013-03-03 00:22 -------- d-----w- C:\FRST
2013-03-02 20:15 . 2013-03-02 20:15 -------- d-----w- c:\programdata\HP
2013-03-01 15:34 . 2013-03-01 15:33 95648 ----a-w- c:\windows\SysWow64\WindowsAccessBridge-32.dll
2013-03-01 15:33 . 2013-03-01 15:33 -------- d-----w- c:\program files (x86)\Java
2013-02-28 18:37 . 2013-02-28 18:37 -------- d-----w- c:\program files\Java
2013-02-26 16:44 . 2013-02-28 15:27 -------- d-----w- c:\users\Adaco\AppData\Roaming\IDM
2013-02-26 16:44 . 2013-02-26 16:44 -------- d-----w- c:\programdata\IDM
2013-02-26 16:43 . 2013-02-28 15:28 -------- d-----w- c:\program files (x86)\Internet Download Manager
2013-02-15 18:22 . 2012-10-09 01:00 776864 ----a-w- c:\windows\system32\drivers\N360x64\1402000.013\srtsp64.sys
2013-02-15 18:22 . 2012-10-04 01:40 1133216 ----a-w- c:\windows\system32\drivers\N360x64\1402000.013\symefa64.sys
2013-02-15 18:22 . 2012-10-04 01:40 493216 ----a-w- c:\windows\system32\drivers\N360x64\1402000.013\symds64.sys
2013-02-15 18:22 . 2012-10-04 01:19 168096 ----a-w- c:\windows\system32\drivers\N360x64\1402000.013\ccsetx64.sys
2013-02-15 18:22 . 2012-07-28 03:05 224416 ----a-r- c:\windows\system32\drivers\N360x64\1402000.013\ironx64.sys
2013-02-15 18:22 . 2012-07-23 01:34 432800 ----a-r- c:\windows\system32\drivers\N360x64\1402000.013\symnets.sys
2013-02-15 18:22 . 2012-06-21 02:45 23448 ----a-r- c:\windows\system32\drivers\N360x64\1402000.013\symelam.sys
2013-02-15 18:22 . 2012-05-25 05:36 37496 ----a-r- c:\windows\system32\drivers\N360x64\1402000.013\srtspx64.sys
2013-02-15 18:17 . 2013-02-15 18:17 -------- d-----w- c:\program files (x86)\Common Files\Symantec Shared
2013-02-15 17:20 . 2013-02-15 17:20 -------- d-----w- c:\program files\Symantec
2013-02-15 17:20 . 2013-02-15 17:20 177312 ----a-w- c:\windows\system32\drivers\SYMEVENT64x86.SYS
2013-02-15 17:19 . 2013-02-15 17:19 -------- d-----w- c:\program files (x86)\Norton Security Suite
2013-02-15 17:16 . 2013-02-15 17:16 -------- d-----w- c:\program files (x86)\KeyCryptSDK
2013-02-15 17:16 . 2013-01-06 04:39 26448 ----a-w- c:\windows\system32\drivers\KeyCrypt64.sys
2013-02-15 17:16 . 2013-02-15 17:16 -------- d-----w- c:\windows\SysWow64\ZALSDK_uninst
2013-02-15 17:16 . 2013-01-06 04:39 7369552 ----a-w- c:\windows\SysWow64\ZALSDKCore.dll
2013-02-15 17:16 . 2013-02-15 17:16 45968 ----a-w- c:\windows\system32\drivers\AntiLog64.sys
2013-02-15 17:16 . 2013-02-15 17:16 -------- d-----w- c:\users\Adaco\AppData\Local\Zemana
2013-02-15 11:02 . 2013-01-09 01:10 996352 ----a-w- c:\program files\Common Files\Microsoft Shared\VGX\VGX.dll
2013-02-15 11:02 . 2013-01-08 22:01 768000 ----a-w- c:\program files (x86)\Common Files\Microsoft Shared\VGX\VGX.dll
2013-02-15 08:57 . 2013-02-28 23:01 -------- d-----w- c:\program files (x86)\Common Files\Java
2013-02-15 08:57 . 2013-02-15 08:56 782240 ----a-w- c:\windows\SysWow64\deployJava1.dll
2013-02-15 08:57 . 2013-03-01 15:33 861088 ----a-w- c:\windows\SysWow64\npDeployJava1.dll
2013-02-15 08:55 . 2013-02-15 08:55 -------- d-----w- c:\programdata\McAfee
2013-02-15 08:50 . 2013-02-15 08:50 -------- d-----w- c:\program files (x86)\Google
2013-02-15 08:50 . 2013-02-15 08:51 -------- d-----w- c:\users\Adaco\AppData\Local\Google
2013-02-15 08:50 . 2013-02-15 08:50 -------- d-----w- c:\users\Adaco\AppData\Local\Apps
2013-02-15 08:50 . 2013-02-15 08:50 -------- d-----w- c:\users\Adaco\AppData\Local\Deployment
2013-02-12 06:34 . 2013-01-08 05:32 9161176 ----a-w- c:\programdata\Microsoft\Windows Defender\Definition Updates\{3D21978F-2A0E-48D1-BC37-6EE644107AAE}\mpengine.dll
2013-02-07 18:47 . 2013-02-07 19:02 -------- d-----w- c:\programdata\Cisco Systems
.
.
.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2013-02-27 16:29 . 2012-12-31 22:18 71024 ----a-w- c:\windows\SysWow64\FlashPlayerCPLApp.cpl
2013-02-27 16:29 . 2012-12-31 22:18 691568 ----a-w- c:\windows\SysWow64\FlashPlayerApp.exe
2013-02-15 11:04 . 2012-12-31 21:59 70004024 ----a-w- c:\windows\system32\MRT.exe
2013-01-17 09:28 . 2012-12-31 02:45 273840 ------w- c:\windows\system32\MpSigStub.exe
2013-01-04 04:43 . 2013-02-15 02:18 44032 ----a-w- c:\windows\apppatch\acwow64.dll
2012-12-31 02:25 . 2012-12-31 02:25 74752 ----a-w- c:\windows\SysWow64\RegisterIEPKEYs.exe
2012-12-31 02:25 . 2012-12-31 02:25 161792 ----a-w- c:\windows\SysWow64\msls31.dll
2012-12-31 02:25 . 2012-12-31 02:25 91648 ----a-w- c:\windows\system32\SetIEInstalledDate.exe
2012-12-31 02:25 . 2012-12-31 02:25 89088 ----a-w- c:\windows\system32\RegisterIEPKEYs.exe
2012-12-31 02:25 . 2012-12-31 02:25 89088 ----a-w- c:\windows\system32\ie4uinit.exe
2012-12-31 02:25 . 2012-12-31 02:25 86528 ----a-w- c:\windows\SysWow64\iesysprep.dll
2012-12-31 02:25 . 2012-12-31 02:25 85504 ----a-w- c:\windows\system32\iesetup.dll
2012-12-31 02:25 . 2012-12-31 02:25 82432 ----a-w- c:\windows\system32\icardie.dll
2012-12-31 02:25 . 2012-12-31 02:25 76800 ----a-w- c:\windows\SysWow64\SetIEInstalledDate.exe
2012-12-31 02:25 . 2012-12-31 02:25 76800 ----a-w- c:\windows\system32\tdc.ocx
2012-12-31 02:25 . 2012-12-31 02:25 74752 ----a-w- c:\windows\SysWow64\iesetup.dll
2012-12-31 02:25 . 2012-12-31 02:25 65024 ----a-w- c:\windows\system32\pngfilt.dll
2012-12-31 02:25 . 2012-12-31 02:25 63488 ----a-w- c:\windows\SysWow64\tdc.ocx
2012-12-31 02:25 . 2012-12-31 02:25 55296 ----a-w- c:\windows\system32\msfeedsbs.dll
2012-12-31 02:25 . 2012-12-31 02:25 534528 ----a-w- c:\windows\system32\ieapfltr.dll
2012-12-31 02:25 . 2012-12-31 02:25 49664 ----a-w- c:\windows\system32\imgutil.dll
2012-12-31 02:25 . 2012-12-31 02:25 48640 ----a-w- c:\windows\SysWow64\mshtmler.dll
2012-12-31 02:25 . 2012-12-31 02:25 48640 ----a-w- c:\windows\system32\mshtmler.dll
2012-12-31 02:25 . 2012-12-31 02:25 452608 ----a-w- c:\windows\system32\dxtmsft.dll
2012-12-31 02:25 . 2012-12-31 02:25 448512 ----a-w- c:\windows\system32\html.iec
2012-12-31 02:25 . 2012-12-31 02:25 403248 ----a-w- c:\windows\system32\iedkcs32.dll
2012-12-31 02:25 . 2012-12-31 02:25 39936 ----a-w- c:\windows\system32\iernonce.dll
2012-12-31 02:25 . 2012-12-31 02:25 3695416 ----a-w- c:\windows\system32\ieapfltr.dat
2012-12-31 02:25 . 2012-12-31 02:25 367104 ----a-w- c:\windows\SysWow64\html.iec
2012-12-31 02:25 . 2012-12-31 02:25 35840 ----a-w- c:\windows\SysWow64\imgutil.dll
2012-12-31 02:25 . 2012-12-31 02:25 30720 ----a-w- c:\windows\system32\licmgr10.dll
2012-12-31 02:25 . 2012-12-31 02:25 282112 ----a-w- c:\windows\system32\dxtrans.dll
2012-12-31 02:25 . 2012-12-31 02:25 267776 ----a-w- c:\windows\system32\ieaksie.dll
2012-12-31 02:25 . 2012-12-31 02:25 249344 ----a-w- c:\windows\system32\webcheck.dll
2012-12-31 02:25 . 2012-12-31 02:25 23552 ----a-w- c:\windows\SysWow64\licmgr10.dll
2012-12-31 02:25 . 2012-12-31 02:25 222208 ----a-w- c:\windows\system32\msls31.dll
2012-12-31 02:25 . 2012-12-31 02:25 197120 ----a-w- c:\windows\system32\msrating.dll
2012-12-31 02:25 . 2012-12-31 02:25 165888 ----a-w- c:\windows\system32\iexpress.exe
2012-12-31 02:25 . 2012-12-31 02:25 163840 ----a-w- c:\windows\system32\ieakui.dll
2012-12-31 02:25 . 2012-12-31 02:25 160256 ----a-w- c:\windows\system32\wextract.exe
2012-12-31 02:25 . 2012-12-31 02:25 160256 ----a-w- c:\windows\system32\ieakeng.dll
2012-12-31 02:25 . 2012-12-31 02:25 152064 ----a-w- c:\windows\SysWow64\wextract.exe
2012-12-31 02:25 . 2012-12-31 02:25 150528 ----a-w- c:\windows\SysWow64\iexpress.exe
2012-12-31 02:25 . 2012-12-31 02:25 149504 ----a-w- c:\windows\system32\occache.dll
2012-12-31 02:25 . 2012-12-31 02:25 145920 ----a-w- c:\windows\system32\iepeers.dll
2012-12-31 02:25 . 2012-12-31 02:25 135168 ----a-w- c:\windows\system32\IEAdvpack.dll
2012-12-31 02:25 . 2012-12-31 02:25 12288 ----a-w- c:\windows\system32\mshta.exe
2012-12-31 02:25 . 2012-12-31 02:25 11776 ----a-w- c:\windows\SysWow64\mshta.exe
2012-12-31 02:25 . 2012-12-31 02:25 114176 ----a-w- c:\windows\system32\admparse.dll
2012-12-31 02:25 . 2012-12-31 02:25 111616 ----a-w- c:\windows\system32\iesysprep.dll
2012-12-31 02:25 . 2012-12-31 02:25 110592 ----a-w- c:\windows\SysWow64\IEAdvpack.dll
2012-12-31 02:25 . 2012-12-31 02:25 10752 ----a-w- c:\windows\system32\msfeedssync.exe
2012-12-31 02:25 . 2012-12-31 02:25 103936 ----a-w- c:\windows\system32\inseng.dll
2012-12-31 02:25 . 2012-12-31 02:25 101888 ----a-w- c:\windows\SysWow64\admparse.dll
2012-12-31 02:24 . 2012-12-31 02:24 982912 ----a-w- c:\windows\system32\drivers\dxgkrnl.sys
2012-12-31 02:24 . 2012-12-31 02:24 662528 ----a-w- c:\windows\system32\XpsPrint.dll
2012-12-31 02:24 . 2012-12-31 02:24 470016 ----a-w- c:\windows\system32\XpsGdiConverter.dll
2012-12-31 02:24 . 2012-12-31 02:24 442880 ----a-w- c:\windows\SysWow64\XpsPrint.dll
2012-12-31 02:24 . 2012-12-31 02:24 4068864 ----a-w- c:\windows\system32\mf.dll
2012-12-31 02:24 . 2012-12-31 02:24 3181568 ----a-w- c:\windows\SysWow64\mf.dll
2012-12-31 02:24 . 2012-12-31 02:24 283648 ----a-w- c:\windows\SysWow64\XpsGdiConverter.dll
2012-12-31 02:24 . 2012-12-31 02:24 265088 ----a-w- c:\windows\system32\drivers\dxgmms1.sys
2012-12-31 02:24 . 2012-12-31 02:24 257024 ----a-w- c:\windows\system32\mfreadwrite.dll
2012-12-31 02:24 . 2012-12-31 02:24 229888 ----a-w- c:\windows\system32\XpsRasterService.dll
2012-12-31 02:24 . 2012-12-31 02:24 206848 ----a-w- c:\windows\system32\mfps.dll
2012-12-31 02:24 . 2012-12-31 02:24 196608 ----a-w- c:\windows\SysWow64\mfreadwrite.dll
2012-12-31 02:24 . 2012-12-31 02:24 1888256 ----a-w- c:\windows\system32\WMVDECOD.DLL
2012-12-31 02:24 . 2012-12-31 02:24 1863680 ----a-w- c:\windows\system32\ExplorerFrame.dll
2012-12-31 02:24 . 2012-12-31 02:24 1619456 ----a-w- c:\windows\SysWow64\WMVDECOD.DLL
2012-12-31 02:24 . 2012-12-31 02:24 1495040 ----a-w- c:\windows\SysWow64\ExplorerFrame.dll
2012-12-31 02:24 . 2012-12-31 02:24 144384 ----a-w- c:\windows\system32\cdd.dll
2012-12-31 02:24 . 2012-12-31 02:24 135168 ----a-w- c:\windows\SysWow64\XpsRasterService.dll
2012-12-31 02:24 . 2012-12-31 02:24 1133568 ----a-w- c:\windows\system32\FntCache.dll
2012-12-16 16:52 . 2012-12-31 21:54 46080 ----a-w- c:\windows\system32\atmlib.dll
2012-12-16 14:40 . 2012-12-31 21:54 367616 ----a-w- c:\windows\system32\atmfd.dll
2012-12-16 14:25 . 2012-12-31 21:54 295424 ----a-w- c:\windows\SysWow64\atmfd.dll
2012-12-16 14:25 . 2012-12-31 21:54 34304 ----a-w- c:\windows\SysWow64\atmlib.dll
.
.
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run]
"SunJavaUpdateSched"="c:\program files (x86)\Common Files\Java\Java Update\jusched.exe" [2012-07-03 252848]
.
c:\programdata\Microsoft\Windows\Start Menu\Programs\Startup\
Constant Guard.lnk - c:\program files (x86)\Constant Guard Protection Suite\IDVault.exe [2013-1-14 3982376]
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\system]
"ConsentPromptBehaviorAdmin"= 5 (0x5)
"ConsentPromptBehaviorUser"= 3 (0x3)
"EnableUIADesktopToggle"= 0 (0x0)
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\windows]
"LoadAppInit_DLLs"=1 (0x1)
"AppInit_DLLs"=c:\progra~2\KEYCRY~1\KeyCrypt32(2).dll
.
R2 clr_optimization_v4.0.30319_64;Microsoft .NET Framework NGEN v4.0.30319_X64;c:\windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe [2010-03-18 138576]
R3 WatAdminSvc;Windows Activation Technologies Service;c:\windows\system32\Wat\WatAdminSvc.exe [2012-12-31 1255736]
S0 SymDS;Symantec Data Store;c:\windows\system32\drivers\N360x64\1402000.013\SYMDS64.SYS [2012-10-04 493216]
S0 SymEFA;Symantec Extended File Attributes;c:\windows\system32\drivers\N360x64\1402000.013\SYMEFA64.SYS [2012-10-04 1133216]
S1 AntiLog32;AntiLog32;c:\windows\system32\drivers\AntiLog64.sys [2013-02-15 45968]
S1 BHDrvx64;BHDrvx64;c:\programdata\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\N360_20.1.0.24\Definitions\BASHDefs\20130208.001\BHDrvx64.sys [2013-02-08 1388120]
S1 ccSet_N360;Norton Security Suite Settings Manager;c:\windows\system32\drivers\N360x64\1402000.013\ccSetx64.sys [2012-10-04 168096]
S1 IDSVia64;IDSVia64;c:\programdata\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\N360_20.1.0.24\Definitions\IPSDefs\20130301.002\IDSvia64.sys [2013-02-14 513184]
S1 SymIRON;Symantec Iron Driver;c:\windows\system32\drivers\N360x64\1402000.013\Ironx64.SYS [2012-07-28 224416]
S1 SymNetS;Symantec Network Security WFP Driver;c:\windows\System32\Drivers\N360x64\1402000.013\SYMNETS.SYS [2012-07-23 432800]
S2 IDVaultSvc;CGPS Service;c:\program files (x86)\Constant Guard Protection Suite\IDVaultSvc.exe [2013-01-14 66600]
S2 N360;Norton Security Suite;c:\program files (x86)\Norton Security Suite\Engine\20.2.0.19\ccSvcHst.exe [2012-10-11 143928]
S2 NPF;NetGroup Packet Filter Driver;c:\windows\system32\drivers\npf.sys [2010-06-25 35344]
S3 EraserUtilRebootDrv;EraserUtilRebootDrv;c:\program files (x86)\Common Files\Symantec Shared\EENGINE\EraserUtilRebootDrv.sys [2013-02-15 138912]
S3 keycrypt;keycrypt;c:\windows\system32\DRIVERS\KeyCrypt64.sys [2013-01-06 26448]
.
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\active setup\installed components\{8A69D345-D564-463c-AFF1-A69D9E530F96}]
2013-02-27 16:29 1629648 ----a-w- c:\program files (x86)\Google\Chrome\Application\25.0.1364.97\Installer\chrmstp.exe
.
Contents of the 'Scheduled Tasks' folder
.
2013-03-03 c:\windows\Tasks\Adobe Flash Player Updater.job
- c:\windows\SysWOW64\Macromed\Flash\FlashPlayerUpdateService.exe [2012-12-31 16:29]
.
2013-03-03 c:\windows\Tasks\GoogleUpdateTaskMachineCore.job
- c:\program files (x86)\Google\Update\GoogleUpdate.exe [2013-02-15 08:50]
.
2013-03-03 c:\windows\Tasks\GoogleUpdateTaskMachineUA.job
- c:\program files (x86)\Google\Update\GoogleUpdate.exe [2013-02-15 08:50]
.
.
--------- X64 Entries -----------
.
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows]
"AppInit_DLLs"=c:\progra~2\KEYCRY~1\KeyCrypt64(2).dll
.
------- Supplementary Scan -------
.
uLocal Page = c:\windows\system32\blank.htm
uStart Page = hxxp://www.google.com/
mLocal Page = c:\windows\SysWOW64\blank.htm
Trusted Zone: cyanna.com\ed2go.login
Trusted Zone: ltwtechnology.com\www
TCP: DhcpNameServer = 192.168.1.1
.
- - - - ORPHANS REMOVED - - - -
.
SafeBoot-24100766.sys
SafeBoot-33140786.sys
.
.
.
[HKEY_LOCAL_MACHINE\system\ControlSet001\services\N360]
"ImagePath"="\"c:\program files (x86)\Norton Security Suite\Engine\20.2.0.19\ccSvcHst.exe\" /s \"N360\" /m \"c:\program files (x86)\Norton Security Suite\Engine\20.2.0.19\diMaster.dll\" /prefetch:1"
.
--------------------- LOCKED REGISTRY KEYS ---------------------
.
[HKEY_USERS\S-1-5-21-3211685755-2750508449-3725178494-1000_Classes\Wow6432Node\CLSID\{5ED60779-4DE2-4E07-B862-974CA4FF2E9C}]
@Denied: (Full) (Everyone)
@Allowed: (Read) (RestrictedCode)
"scansk"=hex(0):fd,d7,fd,28,57,b3,e8,1b,a2,65,1f,f3,16,ce,57,db,ac,40,2a,80,86,
58,1c,d0,83,3b,59,9a,8d,55,be,d6,e2,5c,51,35,80,41,8c,4a,00,00,00,00,00,00,\
.
[HKEY_USERS\S-1-5-21-3211685755-2750508449-3725178494-1000_Classes\Wow6432Node\CLSID\{7b5d91d7-6bd2-4404-ab11-d9f8f4caf5f4}]
@Denied: (Full) (Everyone)
@Allowed: (Read) (RestrictedCode)
"Model"=dword:0000002c
"Therad"=dword:00000022
"MData"=hex(0):2b,8f,78,29,5a,0c,ce,ec,48,d4,68,e5,9f,6a,96,3e,ab,de,c5,81,26,
38,95,44,c3,4d,9e,47,61,a7,8f,c3,2b,be,a1,85,54,a0,50,ee,c3,78,1c,29,16,64,\
.
[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}]
@Denied: (A 2) (Everyone)
@="FlashBroker"
"LocalizedString"="@c:\\Windows\\system32\\Macromed\\Flash\\FlashUtil64_11_6_602_171_ActiveX.exe,-101"
.
[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\Elevation]
"Enabled"=dword:00000001
.
[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\LocalServer32]
@="c:\\Windows\\system32\\Macromed\\Flash\\FlashUtil64_11_6_602_171_ActiveX.exe"
.
[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\TypeLib]
@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"
.
[HKEY_LOCAL_MACHINE\software\Classes\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}]
@Denied: (A 2) (Everyone)
@="IFlashBroker5"
.
[HKEY_LOCAL_MACHINE\software\Classes\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}\ProxyStubClsid32]
@="{00020424-0000-0000-C000-000000000046}"
.
[HKEY_LOCAL_MACHINE\software\Classes\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}\TypeLib]
@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"
"Version"="1.0"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}]
@Denied: (A 2) (Everyone)
@="FlashBroker"
"LocalizedString"="@c:\\Windows\\SysWOW64\\Macromed\\Flash\\FlashUtil32_11_6_602_171_ActiveX.exe,-101"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\Elevation]
"Enabled"=dword:00000001
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\LocalServer32]
@="c:\\Windows\\SysWOW64\\Macromed\\Flash\\FlashUtil32_11_6_602_171_ActiveX.exe"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\TypeLib]
@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}]
@Denied: (A 2) (Everyone)
@="Shockwave Flash Object"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\InprocServer32]
@="c:\\Windows\\SysWOW64\\Macromed\\Flash\\Flash32_11_6_602_171.ocx"
"ThreadingModel"="Apartment"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\MiscStatus]
@="0"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\ProgID]
@="ShockwaveFlash.ShockwaveFlash.11"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\ToolboxBitmap32]
@="c:\\Windows\\SysWOW64\\Macromed\\Flash\\Flash32_11_6_602_171.ocx, 1"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\TypeLib]
@="{D27CDB6B-AE6D-11cf-96B8-444553540000}"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\Version]
@="1.0"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\VersionIndependentProgID]
@="ShockwaveFlash.ShockwaveFlash"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}]
@Denied: (A 2) (Everyone)
@="Macromedia Flash Factory Object"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\InprocServer32]
@="c:\\Windows\\SysWOW64\\Macromed\\Flash\\Flash32_11_6_602_171.ocx"
"ThreadingModel"="Apartment"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\ProgID]
@="FlashFactory.FlashFactory.1"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\ToolboxBitmap32]
@="c:\\Windows\\SysWOW64\\Macromed\\Flash\\Flash32_11_6_602_171.ocx, 1"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\TypeLib]
@="{D27CDB6B-AE6D-11cf-96B8-444553540000}"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\Version]
@="1.0"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\VersionIndependentProgID]
@="FlashFactory.FlashFactory"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}]
@Denied: (A 2) (Everyone)
@="IFlashBroker5"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}\ProxyStubClsid32]
@="{00020424-0000-0000-C000-000000000046}"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}\TypeLib]
@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"
"Version"="1.0"
.
[HKEY_LOCAL_MACHINE\system\ControlSet001\Control\PCW\Security]
@Denied: (Full) (Everyone)
.
Completion time: 2013-03-02 21:24:48
ComboFix-quarantined-files.txt 2013-03-03 05:24
ComboFix2.txt 2013-03-03 03:43
.
Pre-Run: 140,668,887,040 bytes free
Post-Run: 140,467,146,752 bytes free
.
- - End Of File - - 9E74D1C1E53603AC7F8E238669D59196


Seems to be running fine. I was able to open Norton's main colsole window, I havn't been able to do that for awhile.
Recommendations for day-to-day pc security?

#14 adaco

adaco
  • Topic Starter

  • Members
  • 18 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:11:43 PM

Posted 03 March 2013 - 12:31 AM

I was also having issues opening a java console window to my internet CCNA class for online labs. Hopefully I can do that now.

#15 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:03:43 AM

Posted 03 March 2013 - 06:50 AM


Hello adaco


I have taken the CCNA myself a few years back

I would like to see a report that combofix makes.

extra combofix report
C:\Qoobox\Add-Remove Programs.txt
  • push the "windows key" + "R" (between the "Ctrl" button and "Alt" Button)
  • please copy and past the following into the box
    • click ok
  • copy and paste the report into this topic for me to review

    Gringo



I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users