Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

infected with ZeroAccess rootkit and more


  • This topic is locked This topic is locked
13 replies to this topic

#1 Byron 89

Byron 89

  • Members
  • 39 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Malaysia
  • Local time:02:46 AM

Posted 11 April 2013 - 07:02 PM

I was helped by Broni in my previous post and he directs me here.

Anyway, heres what i was instructed to do previously,

do a security check, use Farbar Service Scanner, use Mini Tool Box, and did a scan with Malwarebytes' Anti-Malware &  Malwarebytes Anti-Rootkit. I have post the logs and results from these on my previous topic.

 

I have been asked to link this previous topic that i made, http://www.bleepingcomputer.com/forums/t/491281/my-windows-hangs-a-lot-and-unknown-files-appearing/#entry3023356

 

 

 

Here's my log.txt for DDS and as instructed in the forum guide, I've attached the attach.txt

 

DDS (Ver_2012-11-20.01) - NTFS_x86
Internet Explorer: 8.0.6001.18882
Run by Vitalis at 7:43:50 on 2013-04-12
#Option MBR scan  is disabled.
Microsoft® Windows Vista™ Home Premium   6.0.6000.0.1252.60.1033.18.1023.295 [GMT 8:00]
.
.
============== Running Processes ================
.
C:\Windows\system32\wininit.exe
C:\Windows\system32\lsm.exe
C:\Windows\system32\AUDIODG.EXE
C:\Windows\system32\SLsvc.exe
C:\Program Files\Symantec\Symantec Endpoint Protection\Smc.exe
C:\Program Files\Common Files\Symantec Shared\ccSvcHst.exe
C:\Windows\System32\spoolsv.exe
C:\Windows\system32\Dwm.exe
C:\Windows\system32\taskeng.exe
C:\Windows\Explorer.EXE
C:\Program Files\Symantec\Symantec Endpoint Protection\SmcGui.exe
C:\ProgramData\DatacardService\HWDeviceService.exe
C:\Program Files\Intel\Intel Matrix Storage Manager\Iaantmon.exe
C:\Program Files\Canon\IJPLM\IJPLMSVC.EXE
c:\Program Files\Common Files\LightScribe\LSSrvc.exe
C:\ProgramData\DatacardService\DCSHelper.exe
C:\Program Files\Ralink\Common\RalinkRegistryWriter.exe
C:\Program Files\Symantec\Symantec Endpoint Protection\Rtvscan.exe
C:\Windows\system32\SearchIndexer.exe
C:\Windows\system32\DRIVERS\xaudio.exe
C:\Windows\system32\WUDFHost.exe
C:\Program Files\Yahoo!\SoftwareUpdate\YahooAUService.exe
C:\Windows\system32\taskeng.exe
C:\Windows\system32\conime.exe
C:\Program Files\Windows Defender\MSASCui.exe
C:\WINDOWS\RtHDVCpl.exe
C:\Program Files\Common Files\Symantec Shared\ccApp.exe
C:\Program Files\Ask.com\Updater\Updater.exe
C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe
C:\WINDOWS\ehome\ehtray.exe
C:\Program Files\Windows Media Player\wmpnscfg.exe
C:\Users\Vitalis\Desktop\1.exe
C:\Users\Vitalis\AppData\Local\Google\Update\GoogleUpdate.exe
C:\Users\Vitalis\qojad.exe
C:\Program Files\Microsoft Office\Office12\ONENOTEM.EXE
C:\Windows\ehome\ehmsas.exe
C:\Program Files\Windows Media Player\wmpnetwk.exe
C:\Users\Vitalis\AppData\Roaming\Maxis Broadband\ouc.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Internet Explorer\iexplore.exe
c:\Program Files\Hewlett-Packard\HP Health Check\hphc_service.exe
C:\Windows\system32\wuauclt.exe
C:\Windows\servicing\TrustedInstaller.exe
C:\Windows\system32\taskeng.exe
C:\Users\Vitalis\AppData\Local\Google\Update\GoogleUpdate.exe
C:\Windows\system32\Macromed\Flash\FlashUtil10d.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Windows\system32\SearchProtocolHost.exe
C:\Windows\system32\SearchFilterHost.exe
C:\Windows\system32\wbem\wmiprvse.exe
C:\Windows\system32\svchost.exe -k DcomLaunch
C:\Windows\system32\svchost.exe -k rpcss
C:\Windows\System32\svchost.exe -k secsvcs
C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted
C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted
C:\Windows\system32\svchost.exe -k netsvcs
C:\Windows\system32\svchost.exe -k GPSvcGroup
C:\Windows\system32\svchost.exe -k LocalService
C:\Windows\system32\svchost.exe -k NetworkService
C:\Windows\system32\svchost.exe -k LocalServiceNoNetwork
C:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted
C:\Windows\system32\svchost.exe -k imgsvc
C:\Windows\System32\svchost.exe -k WerSvcGroup
.
============== Pseudo HJT Report ===============
.
uStart Page = hxxp://www.symantec.com/enterprise/security_response/index.jsp
mStart Page = hxxp://www.symantec.com/enterprise/security_response/index.jsp
mSearch Page = hxxp://securityresponse.symantec.com/avcenter/fix_homepage/
mDefault_Page_URL = hxxp://securityresponse.symantec.com/avcenter/fix_homepage/
mDefault_Search_URL = hxxp://securityresponse.symantec.com/avcenter/fix_homepage/
uURLSearchHooks: UrlSearchHook Class: {00000000-6E41-4FD3-8538-502F5495E5FC} - c:\program files\ask.com\GenericAskToolbar.dll
uURLSearchHooks: <No Name>: {9CB65206-89C4-402c-BA80-02D8C59F9B1D} - c:\program files\asktbar\srchastt\1.bin\A5SRCHAS.DLL
BHO: &Yahoo! Toolbar Helper: {02478D38-C3F9-4efb-9B51-7695ECA05670} - c:\program files\yahoo!\companion\installs\cpn0\yt.dll
BHO: Adobe PDF Link Helper: {18DF081C-E8AD-4283-A596-FA578C2EBDC3} - c:\program files\common files\adobe\acrobat\activex\AcroIEHelperShim.dll
BHO: {602ADB0E-4AFF-4217-8AA1-95DAC4DFA408} - <orphaned>
BHO: Groove GFS Browser Helper: {72853161-30C5-4D22-B7F9-0BBC1D38A37E} - c:\program files\microsoft office\office12\GrooveShellExtensions.dll
BHO: SSVHelper Class: {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - c:\program files\java\jre1.6.0_01\bin\ssv.dll
BHO: Ask Search Assistant BHO: {9CB65201-89C4-402c-BA80-02D8C59F9B1D} - c:\program files\asktbar\srchastt\1.bin\A5SRCHAS.DLL
BHO: Ask Toolbar: {D4027C7F-154A-4066-A1AD-4243D8127440} - c:\program files\ask.com\GenericAskToolbar.dll
BHO: SingleInstance Class: {FDAD4DA1-61A2-4FD8-9C17-86F7AC245081} - c:\program files\yahoo!\companion\installs\cpn\YTSingleInstance.dll
BHO: Ask Toolbar BHO: {FE063DB1-4EC0-403e-8DD8-394C54984B2C} - c:\program files\asktbar\bar\1.bin\ASKTBAR.DLL
TB: Ask Toolbar: {FE063DB9-4EC0-403E-8DD8-394C54984B2C} - c:\program files\asktbar\bar\1.bin\ASKTBAR.DLL
TB: Ask Toolbar: {D4027C7F-154A-4066-A1AD-4243D8127440} - c:\program files\ask.com\GenericAskToolbar.dll
TB: Yahoo! Toolbar: {EF99BD32-C1FB-11D2-892F-0090271D4F88} - c:\program files\yahoo!\companion\installs\cpn0\yt.dll
TB: Ask Toolbar: {FE063DB9-4EC0-403e-8DD8-394C54984B2C} - c:\program files\asktbar\bar\1.bin\ASKTBAR.DLL
TB: Ask Toolbar: {D4027C7F-154A-4066-A1AD-4243D8127440} - c:\program files\ask.com\GenericAskToolbar.dll
uRun: [ehTray.exe] c:\windows\ehome\ehTray.exe
uRun: [HW_OPENEYE_OUC_Maxis Broadband] "c:\program files\maxis broadband\updatedog\ouc.exe"
uRun: [img] H:\IMG.exe /g
uRun: [ums] H:\ums.exe /f
uRun: [lisa PENTING] H:\lisa PENTING.exe /d
uRun: [Elemen 3] H:\Elemen 3.exe /v
uRun: [WMPNSCFG] c:\program files\windows media player\WMPNSCFG.exe
uRun: [1] c:\users\vitalis\desktop\1.exe /p
uRun: [Google Update] "c:\users\vitalis\appdata\local\google\update\GoogleUpdate.exe" /c
uRun: [saihuu] c:\users\vitalis\saihuu.exe /k
uRun: [qojad] c:\users\vitalis\qojad.exe /w
mRun: [Windows Defender] c:\program files\windows defender\MSASCui.exe -hide
mRun: [RtHDVCpl] RtHDVCpl.exe
mRun: [ccApp] "c:\program files\common files\symantec shared\ccApp.exe"
mRun: [Yahoo Messenger] <no file>
StartupFolder: c:\users\vitalis\appdata\roaming\micros~1\windows\startm~1\programs\startup\onenot~1.lnk - c:\program files\microsoft office\office12\ONENOTEM.EXE
uPolicies-Explorer: NoDriveTypeAutoRun = dword:149
uPolicies-Explorer: HideClock = dword:0
uPolicies-Explorer: NoDriveAutoRun = dword:0
IE: E&xport to Microsoft Excel - c:\progra~1\micros~3\office12\EXCEL.EXE/3000
IE: {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - {CAFEEFAC-0016-0000-0001-ABCDEFFEDCBC} - c:\program files\java\jre1.6.0_01\bin\ssv.dll
IE: {2670000A-7350-4f3c-8081-5663EE0C6C49} - {48E73304-E1D6-4330-914C-F5F514E3486C} - c:\program files\microsoft office\office12\ONBttnIE.dll
IE: {92780B25-18CC-41C8-B9BE-3C9C571A8263} - {FF059E31-CC5A-4E2E-BF3B-96E929D65503}
DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_01-windows-i586.cab
DPF: {CAFEEFAC-0016-0000-0001-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_01-windows-i586.cab
DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_01-windows-i586.cab
TCP: NameServer = 192.168.1.1
TCP: Interfaces\{BBCB7F03-D065-46A8-B915-6CE945F4A7AC} : DHCPNameServer = 192.168.1.1
TCP: Interfaces\{F5A70F13-BB44-44C7-91A3-955C61A46484} : DHCPNameServer = 58.71.136.10 58.71.132.10
Handler: grooveLocalGWS - {88FED34C-F0CA-4636-A375-3CB6248B04CD} - c:\program files\microsoft office\office12\GrooveSystemServices.dll
SEH: Groove GFS Stub Execution Hook - {B5A7F190-DDA6-4420-B3BA-52453494E6CD} - c:\program files\microsoft office\office12\GrooveShellExtensions.dll
LSA: Security Packages =  kerberos msv1_0 schannel wdigest tspkg
.
============= SERVICES / DRIVERS ===============
.
R2 HWDeviceService.exe;HWDeviceService.exe;c:\programdata\datacardservice\HWDeviceService.exe [2011-3-14 271712]
R2 RalinkRegistryWriter;Ralink Registry Writer;c:\program files\ralink\common\RalinkRegistryWriter.exe [2009-12-15 75040]
R3 EraserUtilRebootDrv;EraserUtilRebootDrv;c:\program files\common files\symantec shared\eengine\EraserUtilRebootDrv.sys [2010-9-24 102448]
R3 huawei_enumerator;huawei_enumerator;c:\windows\system32\drivers\ew_jubusenum.sys [2012-6-9 73216]
S3 COH_Mon;COH_Mon;c:\windows\system32\drivers\COH_Mon.sys [2007-5-29 23888]
S3 ewusbnet;HUAWEI USB-NDIS miniport;c:\windows\system32\drivers\ewusbnet.sys [2012-6-9 235392]
S3 netr28u;RT2870 USB Wireless LAN Card Driver for Vista;c:\windows\system32\drivers\netr28u.sys [2009-12-15 710144]
S3 VST_DPV;VST_DPV;c:\windows\system32\drivers\VSTDPV3.SYS [2006-11-2 987648]
S3 VSTHWBS2;VSTHWBS2;c:\windows\system32\drivers\VSTBS23.SYS [2006-11-2 251904]
.
=============== Created Last 30 ================
.
2013-04-11 13:02:56 32768 ----a-w- c:\users\vitalis\nunun.exe
2013-04-11 12:07:21 32768 ----a-w- c:\users\vitalis\susus.exe
2013-04-11 12:06:50 32768 ----a-w- c:\users\vitalis\qoqoq.exe
2013-04-11 12:06:37 245760 --sh--r- c:\users\vitalis\qojad.exe
2013-04-11 11:46:37 -------- d-----w- c:\users\vitalis\appdata\roaming\Malwarebytes
2013-04-11 11:46:16 -------- d-----w- c:\programdata\Malwarebytes
2013-04-11 11:46:13 22856 ----a-w- c:\windows\system32\drivers\mbam.sys
2013-04-11 11:46:13 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
2013-04-11 11:45:20 32768 ----a-w- c:\users\vitalis\jejej.exe
2013-04-10 12:50:39 0 ----a-w- c:\users\vitalis\qaqaq.exe
.
==================== Find3M  ====================
.
2013-04-11 13:03:29 245760 ----a-w- c:\users\vitalis\runme.exe
2013-02-25 09:32:50 114688 ----a-w- c:\users\vitalis\kiikik.exe
2013-02-25 09:30:56 114688 ----a-w- c:\users\vitalis\buubub.exe
2013-02-25 09:30:24 126976 --sh--r- c:\users\vitalis\saihuu.exe
2013-02-25 01:00:30 86016 ----a-w- c:\users\vitalis\muamum.exe
2013-02-24 07:38:52 0 ----a-w- c:\users\vitalis\jajaj.exe
2013-02-24 05:42:00 0 ----a-w- c:\users\vitalis\kekek.exe
2013-01-16 17:28:58 232336 ------w- c:\windows\system32\MpSigStub.exe
.
============= FINISH:  7:51:21.16 ===============
 

Attached Files


Edited by Byron 89, 11 April 2013 - 07:18 PM.


BC AdBot (Login to Remove)

 


#2 Byron 89

Byron 89
  • Topic Starter

  • Members
  • 39 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Malaysia
  • Local time:02:46 AM

Posted 11 April 2013 - 07:07 PM

My computer became slow. During startup, the library windows automatically open itself. A lot of unknown files appearing. It even infected my flashdrives with .exe files.



#3 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:02:46 PM

Posted 11 April 2013 - 08:15 PM


Hello Byron 89

I would like to welcome you to the Malware Removal section of the forum.

Around here they call me Gringo and I will be glad to help you with your malware problems.


Very Important --> Please read this post completely, I have spent my time to put together somethings for you to keep in mind while I am helping you to make things go easier, faster and smoother for both of us!

  • Please do not run any tools unless instructed to do so.
    • We ask you to run different tools in a specific order to ensure the malware is completely removed from your machine, and running any additional tools may detect false positives, interfere with our tools, or cause unforeseen damage or system instability.
  • Please do not attach logs or use code boxes, just copy and paste the text.
    • Due to the high volume of logs we receive it helps to receive everything in the same format, and code boxes make the logs very difficult to read. Also, attachments require us to download and open the reports when it is easier to just read the reports in your post.
  • Please read every post completely before doing anything.
    • Pay special attention to the NOTE: lines, these entries identify an individual issue or important step in the cleanup process.
  • Please provide feedback about your experience as we go.
    • A short statement describing how the computer is working helps us understand where to go next, for example: I am still getting redirected, the computer is running normally, etc. Please do not describe the computer as "the same", this requires the extra step of looking back at your previous post.
NOTE: At the top of your post, click on the "Follow This Topic" Button, make sure that the "Receive notification" box is checked and that it is set to "Instantly" - This will send you an e-mail as soon as I reply to your topic, allowing us to resolve the issue faster.

NOTE: Backup any files that cannot be replaced. Removing malware can be unpredictable and this step can save a lot of heartaches if things don't go as planed. You can put them on a CD/DVD, external drive or a pen drive, anywhere except on the computer.

NOTE: It is good practice to copy and paste the instructions into notepad and print them in case it is necessary for you to go offline during the cleanup process. To open notepad, navigate to Start Menu > All Programs > Accessories > Notepad. Please remember to copy the entire post so you do not miss any instructions.




These are the programs I would like you to run next, if you have any problems with these just skip it and run the next one.

-Security Check-
  • Download Security Check by screen317 from here.
    • Save it to your Desktop.
    • Double click SecurityCheck.exe and follow the onscreen instructions inside of the black box.
    • A Notepad document should open automatically called checkup.txt; please post the contents of that document.
-AdwCleaner-
  • Please download AdwCleaner by Xplode onto your desktop.
    • Close all open programs and internet browsers.
    • Double click on AdwCleaner.exe to run the tool.
    • Click on Delete.
    • Confirm each time with Ok.
    • Your computer will be rebooted automatically. A text file will open after the restart.
    • Please post the content of that logfile with your next answer.
    • You can find the logfile at C:\AdwCleaner[S1].txt as well.
--RogueKiller--
  • Download & SAVE to your Desktop RogueKiller for 32bit or Roguekiller for 64bit
    • Quit all programs that you may have started.
    • Please disconnect any USB or external drives from the computer before you run this scan!
    • For Vista or Windows 7, right-click and select "Run as Administrator to start"
    • For Windows XP, double-click to start.
    • Wait until Prescan has finished ...
    • Then Click on "Scan" button
    • Wait until the Status box shows "Scan Finished"
    • click on "delete"
    • Wait until the Status box shows "Deleting Finished"
    • Click on "Report" and copy/paste the content of the Notepad into your next reply.
    • The log should be found in RKreport[1].txt on your Desktop
    • Exit/Close RogueKiller+
  • Gringo




I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#4 Byron 89

Byron 89
  • Topic Starter

  • Members
  • 39 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Malaysia
  • Local time:02:46 AM

Posted 12 April 2013 - 02:39 AM

Hello Gringo, nice to meet you.

 

here's the result from security check

 

 Results of screen317's Security Check version 0.99.62 
 Windows Vista  x86 (UAC is enabled) 
 [/b]
 Internet Explorer 8 Out of date!
``````````````Antivirus/Firewall Check:``````````````
 Windows Firewall Enabled! 
 WMI entry may not exist for antivirus; attempting automatic update.
`````````Anti-malware/Other Utilities Check:`````````
 Malwarebytes Anti-Malware version 1.75.0.1300 
 Java™ SE Runtime Environment 6 Update 1
 Java version out of Date!
 Adobe Flash Player 10 Flash Player out of Date!
  Adobe Flash Player  10.1.82.76 Flash Player out of Date! 
 Adobe Reader 9 Adobe Reader out of Date!
 Google Chrome 25.0.1364.97 
 Google Chrome 26.0.1410.64 
````````Process Check: objlist.exe by Laurent```````` 
 Norton ccSvcHst.exe
 Windows Defender MSASCui.exe
 Windows Defender MSASCui.exe  
`````````````````System Health check`````````````````
 Total Fragmentation on Drive C: 1 %
````````````````````End of Log``````````````````````
 



#5 Byron 89

Byron 89
  • Topic Starter

  • Members
  • 39 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Malaysia
  • Local time:02:46 AM

Posted 12 April 2013 - 02:48 AM

here's the AdwCleaner result.

 

# AdwCleaner v2.200 - Logfile created 04/12/2013 at 15:43:11
# Updated 02/04/2013 by Xplode
# Operating system : Windows Vista ™ Home Premium  (32 bits)
# User : Vitalis - VITALIS-PC
# Boot Mode : Normal
# Running from : C:\Users\Vitalis\Desktop\adwcleaner.exe
# Option [Delete]


***** [Services] *****


***** [Files / Folders] *****

Folder Deleted : C:\Program Files\Ask.com
Folder Deleted : C:\Program Files\AskTBar
Folder Deleted : C:\Users\Vitalis\AppData\Local\AskToolbar
Folder Deleted : C:\Users\Vitalis\AppData\LocalLow\AskToolbar
Folder Deleted : C:\Windows\Installer\{86D4B82A-ABED-442A-BE86-96357B70F4FE}

***** [Registry] *****

Key Deleted : HKCU\Software\APN
Key Deleted : HKCU\Software\AppDataLow\AskBarDis
Key Deleted : HKCU\Software\AppDataLow\AskToolbarInfo
Key Deleted : HKCU\Software\AppDataLow\Software\AskToolbar
Key Deleted : HKCU\Software\Ask.com
Key Deleted : HKCU\Software\AskToolbar
Key Deleted : HKCU\Software\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{A5AA24EA-11B8-4113-95AE-9ED71DEAF12A}
Key Deleted : HKCU\Software\Microsoft\Internet Explorer\SearchScopes\{171DEBEB-C3D4-40B7-AC73-056A5EBA4A7E}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{02478D38-C3F9-4EFB-9B51-7695ECA05670}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{9CB65201-89C4-402C-BA80-02D8C59F9B1D}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{D4027C7F-154A-4066-A1AD-4243D8127440}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{EF99BD32-C1FB-11D2-892F-0090271D4F88}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{FE063DB1-4EC0-403E-8DD8-394C54984B2C}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{FE063DB9-4EC0-403E-8DD8-394C54984B2C}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{02478D38-C3F9-4EFB-9B51-7695ECA05670}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{9CB65201-89C4-402C-BA80-02D8C59F9B1D}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{9CB65206-89C4-402C-BA80-02D8C59F9B1D}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{D4027C7F-154A-4066-A1AD-4243D8127440}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{EF99BD32-C1FB-11D2-892F-0090271D4F88}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{FE063DB1-4EC0-403E-8DD8-394C54984B2C}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{FE063DB9-4EC0-403E-8DD8-394C54984B2C}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Uninstall\{79A765E1-C399-405B-85AF-466F52E918B0}
Key Deleted : HKLM\Software\APN
Key Deleted : HKLM\Software\AskToolbar
Key Deleted : HKLM\SOFTWARE\Classes\AppID\{9B0CB95C-933A-4B8C-B6D4-EDCD19A43874}
Key Deleted : HKLM\SOFTWARE\Classes\AppID\GenericAskToolbar.DLL
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{00000000-6E41-4FD3-8538-502F5495E5FC}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{02478D38-C3F9-4EFB-9B51-7695ECA05670}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{147A976F-EEE1-4377-8EA7-4716E4CDD239}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{9AFB8248-617F-460D-9366-D71CDEDA3179}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{9CB65201-89C4-402C-BA80-02D8C59F9B1D}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{9CB65206-89C4-402C-BA80-02D8C59F9B1D}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{D4027C7F-154A-4066-A1AD-4243D8127440}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{EF99BD32-C1FB-11D2-892F-0090271D4F88}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{FE063DB1-4EC0-403E-8DD8-394C54984B2C}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{FE063DB9-4EC0-403E-8DD8-394C54984B2C}
Key Deleted : HKLM\SOFTWARE\Classes\IMsiDe1egate.Application.1
Key Deleted : HKLM\Software\Classes\Installer\Features\A28B4D68DEBAA244EB686953B7074FEF
Key Deleted : HKLM\Software\Classes\Installer\Products\A28B4D68DEBAA244EB686953B7074FEF
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{3F607E46-0D3C-4442-B1DE-DE7FA4768F5C}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{6C434537-053E-486D-B62A-160059D9D456}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{91CF619A-4686-4CA4-9232-3B2E6B63AA92}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{AC71B60E-94C9-4EDE-BA46-E146747BB67E}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{FE0273D1-99DF-4AC0-87D5-1371C6271785}
Key Deleted : HKLM\SOFTWARE\Classes\S
Key Deleted : HKLM\SOFTWARE\Classes\TypeLib\{2996F0E7-292B-4CAE-893F-47B8B1C05B56}
Key Deleted : HKLM\SOFTWARE\Classes\TypeLib\{93E3D79C-0786-48FF-9329-93BC9F6DC2B3}
Key Deleted : HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{A5AA24EA-11B8-4113-95AE-9ED71DEAF12A}
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{02478D38-C3F9-4EFB-9B51-7695ECA05670}
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{9CB65201-89C4-402C-BA80-02D8C59F9B1D}
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{D4027C7F-154A-4066-A1AD-4243D8127440}
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{FE063DB1-4EC0-403E-8DD8-394C54984B2C}
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{02478D38-C3F9-4EFB-9B51-7695ECA05670}
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{EF99BD32-C1FB-11D2-892F-0090271D4F88}
Key Deleted : HKLM\Software\Microsoft\Windows\CurrentVersion\Installer\UpgradeCodes\F928123A039649549966D4C29D35B1C9
Key Deleted : HKLM\Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\0CFE535C35F99574E8340BFA75BF92C2
Key Deleted : HKLM\Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\120DFADEB50841F408F04D2A278F9509
Key Deleted : HKLM\Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\261F213D1F55267499B1F87D0CC3BCF7
Key Deleted : HKLM\Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\741B4ADF27276464790022C965AB6DA8
Key Deleted : HKLM\Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\7DE196B10195F5647A2B21B761F3DE01
Key Deleted : HKLM\Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\9D4F5849367142E4685ED8C25E44C5ED
Key Deleted : HKLM\Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\A5875B04372C19545BEB90D4D606C472
Key Deleted : HKLM\Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\A876D9E80B896EC44A8620248CC79296
Key Deleted : HKLM\Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\B5BAE2ED018083A4C8DA86D6E3F4B024
Key Deleted : HKLM\Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\B66FFAB725B92594C986DE826A867888
Key Deleted : HKLM\Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\A28B4D68DEBAA244EB686953B7074FEF
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{86D4B82A-ABED-442A-BE86-96357B70F4FE}
Value Deleted : HKCU\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser [{D4027C7F-154A-4066-A1AD-4243D8127440}]
Value Deleted : HKCU\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser [{FE063DB9-4EC0-403E-8DD8-394C54984B2C}]
Value Deleted : HKCU\Software\Microsoft\Internet Explorer\URLSearchHooks [{00000000-6E41-4FD3-8538-502F5495E5FC}]
Value Deleted : HKCU\Software\Microsoft\Internet Explorer\URLSearchHooks [{9CB65206-89C4-402C-BA80-02D8C59F9B1D}]
Value Deleted : HKLM\SOFTWARE\Microsoft\Internet Explorer\Toolbar [{D4027C7F-154A-4066-A1AD-4243D8127440}]
Value Deleted : HKLM\SOFTWARE\Microsoft\Internet Explorer\Toolbar [{EF99BD32-C1FB-11D2-892F-0090271D4F88}]
Value Deleted : HKLM\SOFTWARE\Microsoft\Internet Explorer\Toolbar [{FE063DB9-4EC0-403E-8DD8-394C54984B2C}]
Value Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run [ApnUpdater]

***** [Internet Browsers] *****

-\\ Internet Explorer v8.0.6001.18882

[OK] Registry is clean.

-\\ Google Chrome v26.0.1410.64

File : C:\Users\Vitalis\AppData\Local\Google\Chrome\User Data\Default\Preferences

[OK] File is clean.

*************************

AdwCleaner[S1].txt - [8407 octets] - [12/04/2013 15:43:11]

########## EOF - C:\AdwCleaner[S1].txt - [8467 octets] ##########



#6 Byron 89

Byron 89
  • Topic Starter

  • Members
  • 39 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Malaysia
  • Local time:02:46 AM

Posted 12 April 2013 - 02:58 AM

And finally, the rogue killer's result

 

RogueKiller V8.5.4 [Mar 18 2013] by Tigzy
mail : tigzyRK<at>gmail<dot>com
Feedback : http://www.geekstogo.com/forum/files/file/413-roguekiller/
Website : http://tigzy.geekstogo.com/roguekiller.php
Blog : http://tigzyrk.blogspot.com/

Operating System : Windows Vista (6.0.6000 ) 32 bits version
Started in : Normal mode
User : Vitalis [Admin rights]
Mode : Remove -- Date : 04/12/2013 15:56:53
| ARK || FAK || MBR |

¤¤¤ Bad processes : 3 ¤¤¤
[ROGUE ST] 1.exe -- C:\Users\Vitalis\Desktop\1.exe [-] -> KILLED [TermProc]
[SUSP PATH] qojad.exe -- C:\Users\Vitalis\qojad.exe [-] -> KILLED [TermProc]
[SUSP PATH] ouc.exe -- C:\Users\Vitalis\AppData\Roaming\Maxis Broadband\ouc.exe [-] -> KILLED [TermProc]

¤¤¤ Registry Entries : 8 ¤¤¤
[RUN][ROGUE ST] HKCU\[...]\Run : 1 (C:\Users\Vitalis\Desktop\1.exe /m) -> DELETED
[RUN][SUSP PATH] HKCU\[...]\Run : saihuu (C:\Users\Vitalis\saihuu.exe /k) [-] -> DELETED
[RUN][SUSP PATH] HKCU\[...]\Run : qojad (C:\Users\Vitalis\qojad.exe /r) [-] -> DELETED
[HJPOL] HKCU\[...]\System : DisableTaskMgr (0) -> DELETED
[HJPOL] HKCU\[...]\System : DisableRegistryTools (0) -> DELETED
[HJPOL] HKLM\[...]\System : DisableTaskMgr (0) -> DELETED
[HJ DESK] HKLM\[...]\NewStartPanel : {59031a47-3f72-44a7-89c5-5595fe6b30ee} (1) -> REPLACED (0)
[HJ DESK] HKLM\[...]\NewStartPanel : {20D04FE0-3AEA-1069-A2D8-08002B30309D} (1) -> REPLACED (0)

¤¤¤ Particular Files / Folders: ¤¤¤

¤¤¤ Driver : [LOADED] ¤¤¤
SSDT[13] : NtAlertResumeThread @ 0x82A1E73B -> HOOKED (Unknown @ 0x8B39D7C0)
SSDT[14] : NtAlertThread @ 0x82A1E6E3 -> HOOKED (Unknown @ 0x8B39B920)
SSDT[18] : NtAllocateVirtualMemory @ 0x829D686F -> HOOKED (Unknown @ 0x8B3A2CB8)
SSDT[54] : NtConnectPort @ 0x829BF589 -> HOOKED (Unknown @ 0x935DED70)
SSDT[67] : NtCreateMutant @ 0x82A91472 -> HOOKED (Unknown @ 0x8B39D530)
SSDT[78] : NtCreateThread @ 0x82A13351 -> HOOKED (Unknown @ 0x8B39EBF0)
SSDT[147] : NtFreeVirtualMemory @ 0x828BF238 -> HOOKED (Unknown @ 0x8B3F7EF0)
SSDT[156] : NtImpersonateAnonymousToken @ 0x82A4F2F7 -> HOOKED (Unknown @ 0x8B39D620)
SSDT[158] : NtImpersonateThread @ 0x82A23869 -> HOOKED (Unknown @ 0x8B39D700)
SSDT[177] : NtMapViewOfSection @ 0x829D175A -> HOOKED (Unknown @ 0x8B3F7DF0)
SSDT[184] : NtOpenEvent @ 0x82A88779 -> HOOKED (Unknown @ 0x8B39D450)
SSDT[195] : NtOpenProcessToken @ 0x82A42160 -> HOOKED (Unknown @ 0x8B39EB30)
SSDT[202] : NtOpenThreadToken @ 0x82A4234F -> HOOKED (Unknown @ 0x8B3A1880)
SSDT[216] : NtQueryDefaultLocale @ 0x82A80190 -> HOOKED (\SystemRoot\SYSTEM32\Drivers\SysPlant.sys @ 0x932CD880)
SSDT[281] : NtResumeThread @ 0x82A1E544 -> HOOKED (Unknown @ 0x8B3DF008)
SSDT[293] : NtSetContextThread @ 0x82A1C05F -> HOOKED (Unknown @ 0x8B3A17A0)
SSDT[309] : NtSetInformationProcess @ 0x82A17095 -> HOOKED (Unknown @ 0x8B3A1970)
SSDT[310] : NtSetInformationThread @ 0x82A197F7 -> HOOKED (Unknown @ 0x8B39BC28)
SSDT[334] : NtSuspendProcess @ 0x82A1E627 -> HOOKED (Unknown @ 0x8B39D370)
SSDT[335] : NtSuspendThread @ 0x82A1E45B -> HOOKED (Unknown @ 0x8B39BA68)
SSDT[338] : NtTerminateProcess @ 0x82A1C457 -> HOOKED (Unknown @ 0x8B3A1708)
SSDT[339] : NtTerminateThread @ 0x82A1C8AB -> HOOKED (Unknown @ 0x8B39BB48)
SSDT[352] : NtUnmapViewOfSection @ 0x829E2128 -> HOOKED (Unknown @ 0x8B3A1A60)
SSDT[362] : NtWriteVirtualMemory @ 0x829D8569 -> HOOKED (Unknown @ 0x8B3F7FC0)
SSDT[389] : NtCreateUserProcess @ 0x82A23983 -> HOOKED (\SystemRoot\SYSTEM32\Drivers\SysPlant.sys @ 0x932CD7D0)

¤¤¤ HOSTS File: ¤¤¤
--> C:\Windows\system32\drivers\etc\hosts

127.0.0.1       localhost
::1             localhost


¤¤¤ MBR Check: ¤¤¤

+++++ PhysicalDrive0: ST3320820AS +++++
--- User ---
[MBR] cd88282f30f1e416db33a080c42b9b6e
[BSP] cbe1a3892920c024e3e7b9efc684338e : MBR Code unknown
Partition table:
0 - [ACTIVE] NTFS (0x07) [VISIBLE] Offset (sectors): 63 | Size: 195578 Mo
1 - [XXXXXX] NTFS (0x07) [VISIBLE] Offset (sectors): 400545792 | Size: 99999 Mo
2 - [XXXXXX] NTFS (0x07) [VISIBLE] Offset (sectors): 605345265 | Size: 9664 Mo
User = LL1 ... OK!
User = LL2 ... OK!

Finished : << RKreport[2]_D_04122013_02d1556.txt >>
RKreport[1]_S_04122013_02d1556.txt ; RKreport[2]_D_04122013_02d1556.txt



#7 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:02:46 PM

Posted 12 April 2013 - 03:03 AM


Hello Byron 89

I Would like you to do the following.

Please print out or make a copy in notepad of any instructions given, as sometimes it is necessary to go offline and you will lose access to them.

Run Combofix:

You may be asked to install or update the Recovery Console (Win XP Only) if this happens please allow it to do so (you will need to be connected to the internet for this)

Before you run Combofix I will need you to turn off any security software you have running, If you do not know how to do this you can find out >here< or >here<

Combofix may need to reboot your computer more than once to do its job this is normal.

You can download Combofix from one of these links. I want you to save it to the desktop and run it from there.1. Close any open browsers or any other programs that are open.
2. Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.

Double click on combofix.exe & follow the prompts.
When finished, it will produce a report for you.

Note 1: Do not mouseclick combofix's window while it's running. That may cause it to stall

Note 2: If you receive an error "Illegal operation attempted on a registry key that has been marked for deletion." Please restart the computer

"information and logs"
  • In your next post I need the following
  • Log from Combofix
  • let me know of any problems you may have had

  • How is the computer doing now?

  • Gringo




I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#8 Byron 89

Byron 89
  • Topic Starter

  • Members
  • 39 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Malaysia
  • Local time:02:46 AM

Posted 12 April 2013 - 05:14 AM

As of now, the library folder has stop opening by itself, theres no weird folder appearing in my flash drive now, as I reconnect it. I still find it weird that i cannot surf using google chrome though, it's either going extremely slow or has been blocked or something.

The weird folder in my program menu still exist, it contains name such as 'aveyond' and 'bud redhead'

 

anyway, the combofix ran smoothly, although it did took some time to get it finish doing its job.

 

So, heres the result for the combofix.

 

 

 

ComboFix 13-04-11.01 - Vitalis 12/04/2013  16:20:11.1.2 - x86
Microsoft® Windows Vista™ Home Premium   6.0.6000.0.1252.60.1033.18.1023.286 [GMT 8:00]
Running from: c:\users\Vitalis\Desktop\ComboFix.exe
.
.
(((((((((((((((((((((((((((((((((((((((   Other Deletions   )))))))))))))))))))))))))))))))))))))))))))))))))
.
.
c:\users\Vitalis\buubub.exe
c:\users\Vitalis\jajaj.exe
c:\users\Vitalis\jejej.exe
c:\users\Vitalis\jujuj.exe
c:\users\Vitalis\kekek.exe
c:\users\Vitalis\kiikik.exe
c:\users\Vitalis\muamum.exe
c:\users\Vitalis\nenen.exe
c:\users\Vitalis\nunun.exe
c:\users\Vitalis\qaqaq.exe
c:\users\Vitalis\qojad.exe
c:\users\Vitalis\qoqoq.exe
c:\users\Vitalis\runme.exe
c:\users\Vitalis\saihuu.exe
c:\users\Vitalis\susus.exe
c:\windows\system32\14_43260.dll
c:\windows\system32\28_83260.dll
.
.
(((((((((((((((((((((((((   Files Created from 2013-03-12 to 2013-04-12  )))))))))))))))))))))))))))))))
.
.
2013-04-12 07:15 . 2013-02-18 19:58 6954968 ----a-w- c:\programdata\Microsoft\Windows Defender\Definition Updates\{08B015AD-29BB-4126-91B3-A1EAE9C5134B}\mpengine.dll
2013-04-11 11:46 . 2013-04-11 11:46 -------- d-----w- c:\users\Vitalis\AppData\Roaming\Malwarebytes
2013-04-11 11:46 . 2013-04-11 11:46 -------- d-----w- c:\programdata\Malwarebytes
2013-04-11 11:46 . 2013-04-11 11:46 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
2013-04-11 11:46 . 2013-04-04 06:50 22856 ----a-w- c:\windows\system32\drivers\mbam.sys
.
.
.
((((((((((((((((((((((((((((((((((((((((   Find3M Report   ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2013-01-16 17:28 . 2009-12-17 11:00 232336 ------w- c:\windows\system32\MpSigStub.exe
.
.
(((((((((((((((((((((((((((((((((((((   Reg Loading Points   ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4
.
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"ehTray.exe"="c:\windows\ehome\ehTray.exe" [2006-11-02 125440]
"HW_OPENEYE_OUC_Maxis Broadband"="c:\program files\Maxis Broadband\UpdateDog\ouc.exe" [2009-07-27 110592]
"WMPNSCFG"="c:\program files\Windows Media Player\WMPNSCFG.exe" [2006-11-02 201728]
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"RtHDVCpl"="RtHDVCpl.exe" [2007-10-25 4702208]
"ccApp"="c:\program files\Common Files\Symantec Shared\ccApp.exe" [2008-01-31 115560]
"GrooveMonitor"="c:\program files\Microsoft Office\Office12\GrooveMonitor.exe" [2009-02-26 30040]
.
c:\users\Vitalis\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\
OneNote 2007 Screen Clipper and Launcher.lnk - c:\program files\Microsoft Office\Office12\ONENOTEM.EXE [2009-2-26 97680]
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\ccEvtMgr]
@="Service"
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\ccSetMgr]
@="Service"
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\Symantec Antivirus]
@="Service"
.
[HKLM\~\startupfolder\C:^ProgramData^Microsoft^Windows^Start Menu^Programs^Startup^Adobe Gamma Loader.lnk]
path=c:\programdata\Microsoft\Windows\Start Menu\Programs\Startup\Adobe Gamma Loader.lnk
backup=c:\windows\pss\Adobe Gamma Loader.lnk.CommonStartup
backupExtension=.CommonStartup
.
[HKLM\~\startupfolder\C:^ProgramData^Microsoft^Windows^Start Menu^Programs^Startup^Ralink Wireless Utility.lnk]
path=c:\programdata\Microsoft\Windows\Start Menu\Programs\Startup\Ralink Wireless Utility.lnk
backup=c:\windows\pss\Ralink Wireless Utility.lnk.CommonStartup
backupExtension=.CommonStartup
.
[HKLM\~\startupfolder\C:^Users^Vitalis^AppData^Roaming^Microsoft^Windows^Start Menu^Programs^Startup^OneNote 2007 Screen Clipper and Launcher.lnk]
path=c:\users\Vitalis\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\OneNote 2007 Screen Clipper and Launcher.lnk
backup=c:\windows\pss\OneNote 2007 Screen Clipper and Launcher.lnk.Startup
backupExtension=.Startup
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Adobe Reader Speed Launcher]
2008-06-11 18:38 34672 ----a-w- c:\program files\Adobe\Reader 9.0\Reader\reader_sl.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\BgMonitor_{79662E04-7C6C-4d9f-84C7-88D8A56B10AA}]
2007-03-12 05:49 153136 ----a-w- c:\program files\Common Files\Ahead\Lib\NMBgMonitor.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Google Update]
2009-12-15 11:26 135664 ----atw- c:\users\Vitalis\AppData\Local\Google\Update\GoogleUpdate.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\GrooveMonitor]
2009-02-26 10:36 30040 ----a-w- c:\program files\Microsoft Office\Office12\GrooveMonitor.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\HP Software Update]
2007-05-09 00:24 54840 ----a-w- c:\program files\HP\HP Software Update\hpwuSchd2.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\IAAnotif]
2007-07-13 00:36 178712 ----a-w- c:\program files\Intel\Intel Matrix Storage Manager\IAAnotif.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Messenger (Yahoo!)]
2009-11-10 07:39 5244216 ----a-w- c:\progra~1\Yahoo!\MESSEN~1\YahooMessenger.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\NeroFilterCheck]
2007-03-09 10:53 153136 ----a-w- c:\program files\Common Files\Ahead\Lib\NeroCheck.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\NvCplDaemon]
2007-08-27 18:59 8473120 ----a-w- c:\windows\System32\nvcpl.dll
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\NvMediaCenter]
2007-08-27 18:59 81920 ----a-w- c:\windows\System32\nvmctray.dll
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\NvSvc]
2007-08-27 18:59 86016 ----a-w- c:\windows\System32\nvsvc.dll
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\OpwareSE4]
2007-02-04 04:02 79400 ----a-w- c:\program files\ScanSoft\OmniPageSE4\OpWareSE4.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\OsdMaestro]
2007-02-15 11:59 118784 ----a-w- c:\program files\Hewlett-Packard\On-Screen OSD Indicator\OSD.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Search Protection]
2009-02-23 13:05 111856 ----a-w- c:\program files\Yahoo!\Search Protection\SearchProtection.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Sidebar]
2009-12-18 07:08 1232896 ----a-w- c:\program files\Windows Sidebar\sidebar.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\SoloSchedule]
2009-10-15 11:12 303104 ----a-w- c:\srnmic~1\SOLOCFG.EXE
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\SoloSentry]
2009-10-15 11:11 77824 ----a-w- c:\srnmic~1\SOLOSENT.EXE
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\SoloSysCheck]
2009-10-16 04:30 237568 ----a-w- c:\srnmic~1\SYSCHECK.COM
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\SSBkgdUpdate]
2006-10-25 01:03 210472 ----a-w- c:\program files\Common Files\ScanSoft Shared\SSBkgdUpdate\SSBkgdUpdate.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\SunJavaUpdateReg]
2007-04-07 10:56 54936 ----a-w- c:\windows\System32\jureg.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\YSearchProtection]
2009-02-23 13:05 111856 ----a-w- c:\program files\Yahoo!\Search Protection\SearchProtection.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\security center]
"AntiVirusOverride"=dword:00000001
.
[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring]
"DisableMonitoring"=dword:00000001
.
[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecAntiVirus]
"DisableMonitoring"=dword:00000001
.
[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecFirewall]
"DisableMonitoring"=dword:00000001
.
--- Other Services/Drivers In Memory ---
.
*NewlyCreated* - TRUESIGHT
*Deregistered* - TrueSight
.
Contents of the 'Scheduled Tasks' folder
.
2013-02-24 c:\windows\Tasks\GoogleUpdateTaskUserS-1-5-21-2987056062-1661573142-4132035048-1000Core.job
- c:\users\Vitalis\AppData\Local\Google\Update\GoogleUpdate.exe [2009-12-15 11:26]
.
2013-04-12 c:\windows\Tasks\GoogleUpdateTaskUserS-1-5-21-2987056062-1661573142-4132035048-1000UA.job
- c:\users\Vitalis\AppData\Local\Google\Update\GoogleUpdate.exe [2009-12-15 11:26]
.
2013-04-12 c:\windows\Tasks\User_Feed_Synchronization-{61FF882E-9863-44AA-8C5D-0CC99722F158}.job
- c:\windows\system32\msfeedssync.exe [2010-09-20 04:56]
.
.
------- Supplementary Scan -------
.
uStart Page = hxxp://www.symantec.com/enterprise/security_response/index.jsp
mStart Page = hxxp://www.symantec.com/enterprise/security_response/index.jsp
IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~3\Office12\EXCEL.EXE/3000
TCP: DhcpNameServer = 192.168.1.1
.
- - - - ORPHANS REMOVED - - - -
.
HKCU-Run-IMG - H:\IMG.exe
HKCU-Run-ums - H:\ums.exe
HKCU-Run-lisa PENTING - H:\lisa PENTING.exe
HKCU-Run-Elemen 3 - H:\Elemen 3.exe
SafeBoot-Symantec Antvirus
MSConfigStartUp-FEBv3 - c:\rom\P-43553JIYW-8374322329-0909090987-120\sys32s.exe
MSConfigStartUp-HP Health Check Scheduler - [ProgramFilesFolder]Hewlett-Packard\HP Health Check\HPHC_Scheduler.exe
MSConfigStartUp-hpsysdrv - c:\hp\support\hpsysdrv.exe
MSConfigStartUp-igkcomka - c:\users\Vitalis\igkcomka.exe
MSConfigStartUp-KBD - c:\hp\KBD\KbdStub.EXE
AddRemove-After The End_is1 - c:\program files\After The End\ReflexiveArcade\unins000.exe
AddRemove-Aveyond_is1 - c:\program files\Aveyond\ReflexiveArcade\unins000.exe
AddRemove-Bud Redhead - The Time Chase_is1 - c:\program files\Bud Redhead\ReflexiveArcade\unins000.exe
AddRemove-Captain BubbleBeards Treasure_is1 - c:\program files\Captain BubbleBeards Treasure\ReflexiveArcade\unins000.exe
AddRemove-Chicken Chase_is1 - c:\program files\Chicken Chase\ReflexiveArcade\unins000.exe
AddRemove-Delicious Deluxe_is1 - c:\program files\Delicious Deluxe\ReflexiveArcade\unins000.exe
AddRemove-Devastation Zone Troopers_is1 - c:\program files\Devastation Zone Troopers\ReflexiveArcade\unins000.exe
AddRemove-Diner Dash Flo On The Go_is1 - c:\program files\Diner Dash Flo On The Go\ReflexiveArcade\unins000.exe
AddRemove-Dream Day Wedding_is1 - c:\program files\Dream Day Wedding\ReflexiveArcade\unins000.exe
AddRemove-Escape From Paradise_is1 - c:\program files\Escape From Paradise\ReflexiveArcade\unins000.exe
AddRemove-Fairy Godmother Tycoon_is1 - c:\program files\Fairy Godmother Tycoon\ReflexiveArcade\unins000.exe
AddRemove-Feeding Frenzy 2_is1 - c:\program files\Feeding Frenzy 2\ReflexiveArcade\unins000.exe
AddRemove-Flower Shop Big City Break_is1 - c:\program files\Flower Shop Big City Break\ReflexiveArcade\unins000.exe
AddRemove-GameSpy Arcade - c:\progra~1\GAMESP~1\UNWISE.EXE
AddRemove-Grimms Hatchery_is1 - c:\program files\Grimms Hatchery\ReflexiveArcade\unins000.exe
AddRemove-Happy Hour_is1 - c:\program files\Happy Hour\ReflexiveArcade\unins000.exe
AddRemove-KBD - c:\hp\KBD\Install.exe
AddRemove-Magic Academy_is1 - c:\program files\Magic Academy\ReflexiveArcade\unins000.exe
AddRemove-Master of Defense_is1 - c:\program files\Master of Defense\ReflexiveArcade\unins000.exe
AddRemove-Mystic Inn_is1 - c:\program files\Mystic Inn\ReflexiveArcade\unins000.exe
AddRemove-Nanny Mania_is1 - c:\program files\Nanny Mania\ReflexiveArcade\unins000.exe
AddRemove-Sallys Salon_is1 - c:\program files\Sallys Salon\ReflexiveArcade\unins000.exe
AddRemove-Snapshot Adventures_is1 - c:\program files\Snapshot Adventures\ReflexiveArcade\unins000.exe
AddRemove-Snowy Lunch Rush_is1 - c:\program files\Snowy Lunch Rush\ReflexiveArcade\unins000.exe
AddRemove-Sudoku Maya Gold_is1 - c:\program files\Sudoku Maya Gold\ReflexiveArcade\unins000.exe
AddRemove-Sushi Frenzy_is1 - c:\program files\Sushi Frenzy\ReflexiveArcade\unins000.exe
AddRemove-Tradewinds 2_is1 - c:\program files\Tradewinds 2\ReflexiveArcade\unins000.exe
AddRemove-Virtual Villagers 2_is1 - c:\program files\Virtual Villagers 2\ReflexiveArcade\unins000.exe
AddRemove-Virtual Villagers_is1 - c:\program files\Virtual Villagers\ReflexiveArcade\unins000.exe
.
.
.
**************************************************************************
.
catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2013-04-12 16:31
Windows 6.0.6000  NTFS
.
scanning hidden processes ... 
.
scanning hidden autostart entries ...
.
scanning hidden files ... 
.
scan completed successfully
hidden files: 0
.
**************************************************************************
.
--------------------- LOCKED REGISTRY KEYS ---------------------
.
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0000\AllUserSettings]
@Denied: (A) (Users)
@Denied: (A) (Everyone)
@Allowed: (B 1 2 3 4 5) (S-1-5-20)
"BlindDial"=dword:00000000
.
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0001\AllUserSettings]
@Denied: (A) (Users)
@Denied: (A) (Everyone)
@Allowed: (B 1 2 3 4 5) (S-1-5-20)
"BlindDial"=dword:00000000
.
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0002\AllUserSettings]
@Denied: (A) (Users)
@Denied: (A) (Everyone)
@Allowed: (B 1 2 3 4 5) (S-1-5-20)
"BlindDial"=dword:00000000
.
Completion time: 2013-04-12  16:35:01
ComboFix-quarantined-files.txt  2013-04-12 08:34
.
Pre-Run: 16,138,899,456 bytes free
Post-Run: 17,442,156,544 bytes free
.
- - End Of File - - 3535D3804FB193FD89BB673ABB340491
 



#9 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:02:46 PM

Posted 12 April 2013 - 06:48 AM


Hello Byron 89

We need to reset Chrome back to defaults to completely clear out what is going on.

We can keep the bookmarks by exporting them - Export Bookmarks


Then I need you to go Google Sync and sign into your account

scroll down untill you see the "Stop and Clear" button and click on button

At the prompt click on "Ok"

Now we need to uninstall chrome

I want you to uninstall Chrome and if asked about user data or settings then remove this also

restart the computer and reinstall chrome, You can download The latest version from here - Google Chrome

After you have Chrome reinstalled please check things out and let me know how it is doing.

Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#10 Byron 89

Byron 89
  • Topic Starter

  • Members
  • 39 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Malaysia
  • Local time:02:46 AM

Posted 13 April 2013 - 11:36 AM

hello gringo, sorry for the late reply. My computer is looking pretty good now I think. Just made some backups and installing new windows and my old files is free from any threats now iI think.



#11 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:02:46 PM

Posted 14 April 2013 - 09:05 AM


Hello Byron 89

At this time I would like you to run this script for me and it is a good time to check out the computer to see if there is anything else that needs to be addressed.

:Run CFScript:

Please start by opening Notepad and copy/paste the text in the box into the window:
ClearJavaCache::


 
Save it to your desktop as CFScript.txt

Referring to the picture above, drag CFScript.txt into ComboFix.exe
CFScriptB-4.gif
This will let ComboFix run again.
Restart if you have to.
Save the produced logfile to your desktop.

Note: Do not mouseclick combofix's window whilst it's running. That may cause it to stall

Note 2: If you receive an error "Illegal operation attempted on a registry key that has been marked for deletion." Please restart the computer

"information and logs"
  • In your next post I need the following
    • report from Combofix
    • let me know of any problems you may have had
    • How is the computer doing now after running the script?
Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#12 Byron 89

Byron 89
  • Topic Starter

  • Members
  • 39 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Malaysia
  • Local time:02:46 AM

Posted 15 April 2013 - 08:22 AM

Aww mann.. I've just returned that computer to my friend. It was hers actually.. 

 

I thought it was fixed.. It already ran smoothly without comodo internet security detecting any threats..

 

Did i made a mistake by returning it too soon? :(



#13 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:02:46 PM

Posted 15 April 2013 - 02:16 PM

yes it is way to soon - if anything strange starts to happen bring it back here



gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#14 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:02:46 PM

Posted 19 April 2013 - 09:51 PM

It appears that this issue is resolved, therefore I am closing the topic. If that is not the case and you need or wish to continue with this topic, please send me or any Moderator a Personal Message (PM) that you would like this topic re-opened.
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users