Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

slow running programs and mystery outbound IPs in firewall logs


  • Please log in to reply
23 replies to this topic

#1 maryba

maryba

  • Members
  • 120 posts
  • OFFLINE
  •  
  • Local time:02:28 AM

Posted 12 November 2013 - 02:05 PM

When online, all program (browser and non-browser) execution becomes intermittently and exceptionally slow. On review of pfirewall.log, I see a high volume of outbound IPs, even if no browser is running.

 

This state occurs frequently but comes and goes. Just became noticeable within the past 2 weeks or so. 

 

Have scanned with MalwareBytes with no detections and have Avira running at all times. Windows XP, SP3.

 

Would greatly appreciate any suggestions or help.

 

 

Mike

 



BC AdBot (Login to Remove)

 


#2 nasdaq

nasdaq

  • Malware Response Team
  • 39,909 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Montreal, QC. Canada
  • Local time:04:28 AM

Posted 15 November 2013 - 10:22 AM

Hello, Welcome to BleepingComputer.
I'm nasdaq and will be helping you.

If you can please print this topic it will make it easier for you to follow the instructions and complete all of the necessary steps in the order listed.
===

Search and delete the AdWare, PUP (Potentially Unwanted Program) installed on your computer.

Please download AdwCleaner by Xplode onto your Desktop.
  • Close all open programs and internet browsers.
  • Double click on AdwCleaner.exe to run the tool.
  • Click the Scan button and wait for the process to complete.
  • Click the Report button and the report will open in Notepad.
IMPORTANT
  • If you click the Clean button all items listed in the report will be removed.
If you find some false positive items or programs that you wish to keep, Close the AdwCleaner windows.
  • Close all open programs and internet browsers.
  • Double click on AdwCleaner.exe to run the tool.
  • Click the Scan button and wait for the process to complete.
  • Check off the element(s) you wish to keep.
  • Click on the Clean button follow the prompts.
  • A log file will automatically open after the scan has finished.
  • Please post the content of that log file with your next answer.
  • You can find the log file at C:\AdwCleaner[Sn].txt (n is a number).
thisisujrt.gif Please download
Junkware Removal Tool to your Desktop.
  • Please close your security software to avoid potential conflicts.
  • Run the tool by double-clicking it. If you are using Windows Vista or 7, right-mouse click it and select Run as administrator.
  • The tool will open and start scanning your system.
  • Please be patient as this can take a while to complete, depending on your system's specifications.
  • On completion, a log (JRT.txt) is saved to your Desktop and will automatically open.
  • Please post the contents of JRT.txt into your reply.
===

Please download ComboFix from one of these locations:
Link 1
Link 2
IMPORTANT !!! Save ComboFix.exe to your Desktop
  • Disable your Anti-Virus and Anti-Spyware applications, usually via a right click on the System Tray icon. They may otherwise interfere with our tools.
  • Double click on ComboFix.exe & follow the prompts.
  • As part of it's process, ComboFix will check to see if the Microsoft Windows Recovery Console is installed. With malware infections being as they are today, it's strongly recommended to have this pre-installed on your machine before doing any malware removal. It will allow you to boot up into a special recovery/repair mode that will allow us to more easily help you should your computer have a problem after an attempted removal of malware.
  • Follow the prompts to allow ComboFix to download and install the Microsoft Windows Recovery Console, and when prompted, agree to the End-User License Agreement to install the Microsoft Windows Recovery Console.
  • Some Rookit infection may damage your boot sector. The Windows Recovery Console may be needed to restore it. Do not bypass this installation. You may regret it.
**Please note: If the Microsoft Windows Recovery Console is already installed, ComboFix will continue it's malware removal procedures.
RcAuto1.gif
Once the Microsoft Windows Recovery Console is installed using ComboFix, you should see the following message:
whatnext.png
Click on Yes, to continue scanning for malware.
When finished, it shall produce a log for you. Please include the C:\ComboFix.txt in your next reply.

Note: If you have difficulty properly disabling your protection programs, refer to this link --> http://www.bleepingcomputer.com/forums/topic114351.html

Do not mouse click ComboFix's window while it's running. That may cause it to stall

Note: If after running ComboFix you get this error message "Illegal operation attempted on a registry key that has been marked for deletion." when attempting to run a program all you need to do is restart the computer to reset the registry.
===

Please download and run this DDS Scanning Tool. Nothing will be deleted. It will just give me some additional information about your system.

Download DDS by sUBs from one of the following links, if you no longer have it available. Save it to your desktop.

1: DDS.scr (Not recommended if you use Chrome to download this .scr file. Use the other options.)
2: DDS.pif
3: DDS.COM

Double click on the DDS icon, allow it to run.
A small box will open, with an explanation about the tool. No input is needed, the scan is running.
Notepad will open with the results.
Follow the instructions that pop up for posting the results.
Please note: You may have to disable any script protection running if the scan fails to run.

dds_scr.gif

Please just paste the contents of the DDS.txt log in your next post. DO NOT attach the log.
===

Please paste the logs in your next reply, DO NOT ATTACH THEM
Let me know what problem persists.

#3 maryba

maryba
  • Topic Starter

  • Members
  • 120 posts
  • OFFLINE
  •  
  • Local time:02:28 AM

Posted 15 November 2013 - 11:26 PM

Logs as requested:

 

 

# AdwCleaner v3.012 - Report created 15/11/2013 at 20:55:14
# Updated 11/11/2013 by Xplode
# Operating System : Microsoft Windows XP Service Pack 3 (32 bits)
# Username : ADMIN - DELL_GX520
# Running from : C:\Documents and Settings\ADMIN\Desktop\adwcleaner.exe
# Option : Clean
 
***** [ Services ] *****
 
 
***** [ Files / Folders ] *****
 
[x] Not Deleted : C:\Documents and Settings\All Users\Application Data\NCH Software
[x] Not Deleted : C:\Program Files\NCH Software
[x] Not Deleted : C:\Documents and Settings\ADMIN\Application Data\NCH Software
[x] Not Deleted : C:\Documents and Settings\Administrator\Application Data\NCH Software
 
***** [ Shortcuts ] *****
 
 
***** [ Registry ] *****
 
Key Deleted : HKLM\SOFTWARE\Classes\AppID\WLXQuickTimeShellExt.DLL
Key Deleted : HKLM\SOFTWARE\Classes\AppID\{0A18A436-2A7A-49F3-A488-30538A2F6323}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{007EFBDF-8A5D-4930-97CC-A4B437CBA777}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{DE9028D0-5FFA-4E69-94E3-89EE8741F468}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{E7DF6BFF-55A5-4EB7-A673-4ED3E9456D39}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{03E2A1F3-4402-4121-8B35-733216D61217}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{9E3B11F6-4179-4603-A71B-A55F4BCB0BEC}
Key Deleted : HKLM\SOFTWARE\Classes\TypeLib\{9C049BA6-EA47-4AC3-AED6-A66D8DC9E1D8}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{95B7759C-8C7F-4BF1-B163-73684A933233}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{AE805869-2E5C-4ED4-8F7B-F1F7851A4497}
Value Deleted : HKCU\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser [{E7DF6BFF-55A5-4EB7-A673-4ED3E9456D39}]
Key Deleted : HKCU\Software\Conduit
Key Deleted : HKCU\Software\NCH Software
Key Deleted : HKCU\Software\Softonic
Key Deleted : HKCU\Software\YahooPartnerToolbar
Key Deleted : HKLM\Software\Conduit
Key Deleted : HKLM\Software\NCH Software
Key Deleted : HKLM\Software\VDownloader\OpenCandy
Key Deleted : HKLM\Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\08121C32A9C319F4CB0C11FF059552A4
 
***** [ Browsers ] *****
 
-\\ Internet Explorer v6.0.2900.5512
 
Setting Restored : HKLM\SOFTWARE\Microsoft\Internet Explorer\AboutURls [Tabs]
 
-\\ Mozilla Firefox v12.0 (en-US)
 
[ File : C:\Documents and Settings\ADMIN\Application Data\Mozilla\Firefox\Profiles\qj4idqyr.default\prefs.js ]
 
 
-\\ Google Chrome v
 
[ File : C:\Documents and Settings\ADMIN\Local Settings\Application Data\Google\Chrome\User Data\Default\preferences ]
 
 
*************************
 
AdwCleaner[R0].txt - [2913 octets] - [15/11/2013 20:50:10]
AdwCleaner[S0].txt - [2680 octets] - [15/11/2013 20:55:14]
 
########## EOF - C:\AdwCleaner\AdwCleaner[S0].txt - [2740 octets] ##########
 
 
 
 
 
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Junkware Removal Tool (JRT) by Thisisu
Version: 6.0.8 (11.05.2013:1)
OS: Microsoft Windows XP x86
Ran by ADMIN on Fri 11/15/2013 at 21:14:19.32
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
 
 
 
 
~~~ Services
 
 
 
~~~ Registry Values
 
 
 
~~~ Registry Keys
 
 
 
~~~ Files
 
Successfully deleted: [File] "C:\Program Files\mozilla firefox\plugins\npcouponprinter.dll"
Successfully deleted: [File] "C:\Program Files\mozilla firefox\plugins\npmozcouponprinter.dll"
 
 
 
~~~ Folders
 
Successfully deleted: [Folder] "C:\Program Files\coupons"
 
 
 
 
 
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Scan was completed on Fri 11/15/2013 at 21:19:40.29
End of JRT log
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
 
 
 
 
 
 
ComboFix 13-11-15.01 - ADMIN 11/15/2013  21:27:03.7.2 - x86
Microsoft Windows XP Professional  5.1.2600.3.1252.1.1033.18.1014.517 [GMT -6:00]
Running from: c:\documents and settings\ADMIN\Desktop\ComboFix.exe
AV: Avira Desktop *Disabled/Updated* {AD166499-45F9-482A-A743-FDD3350758C7}
.
.
(((((((((((((((((((((((((((((((((((((((   Other Deletions   )))))))))))))))))))))))))))))))))))))))))))))))))
.
.
c:\windows\system32\FlashPlayerApp.exe
c:\windows\system64
c:\windows\system64\msvcp100.dll
c:\windows\system64\msvcr100.dll
c:\windows\winhelp.ini
C:\x
.
.
(((((((((((((((((((((((((   Files Created from 2013-10-16 to 2013-11-16  )))))))))))))))))))))))))))))))
.
.
2013-11-16 03:14 . 2013-11-16 03:14 -------- d-----w- c:\windows\ERUNT
2013-11-16 02:49 . 2013-11-16 02:55 -------- d-----w- C:\AdwCleaner
2013-10-30 00:36 . 2013-10-30 00:36 -------- d-----w- c:\windows\system32\LogFiles
2013-10-18 04:42 . 2013-10-18 04:56 -------- d-----w- c:\documents and settings\ADMIN\Application Data\vlc
2013-10-18 04:40 . 2013-10-18 04:40 -------- d-----w- c:\program files\VideoLAN
2013-10-18 03:04 . 2013-10-18 03:13 -------- d-----w- c:\documents and settings\ADMIN\.yawcam
2013-10-18 03:03 . 2013-10-18 03:03 -------- d-----w- c:\program files\Yawcam
2013-10-18 02:53 . 2013-10-18 02:53 -------- d-----w- c:\documents and settings\ADMIN\Local Settings\Application Data\Apps
2013-10-18 02:52 . 2013-10-18 13:29 -------- d-----w- c:\documents and settings\All Users\Application Data\webcamXP 5
2013-10-18 02:51 . 2013-10-18 02:52 -------- d-----w- c:\program files\webcamXP5
.
.
.
((((((((((((((((((((((((((((((((((((((((   Find3M Report   ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2013-10-07 11:02 . 2013-10-07 11:02 320512 ----a-w- c:\windows\system32\LiveWrapRTSP.dll
2013-09-02 14:02 . 2013-04-22 13:11 88840 ----a-w- c:\windows\system32\drivers\avgntflt.sys
2013-08-29 13:37 . 2013-04-22 13:11 136672 ----a-w- c:\windows\system32\drivers\avipbb.sys
2012-07-24 21:48 . 2013-09-01 00:56 970568 ----a-w- c:\program files\WinDirStatPortable_1.1.2.80_Rev_3.paf.exe
2011-12-29 00:28 . 2012-07-02 01:01 388608 ----a-w- c:\program files\HijackThis.exe
2010-01-27 05:11 . 2011-03-29 05:09 444283 ----a-w- c:\program files\Common Files\WinPcapNmap.exe
2012-10-24 23:44 . 2011-09-22 17:12 97208 ----a-w- c:\program files\mozilla firefox\components\browsercomps.dll
.
.
(((((((((((((((((((((((((((((((((((((   Reg Loading Points   ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown 
REGEDIT4
.
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"Dexpot"="c:\program files\Dexpot\dexpot.exe" [2009-06-04 1286144]
"H/PC Connection Agent"="c:\program files\Microsoft ActiveSync\Wcescomm.exe" [2006-11-13 1289000]
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"SoundMAXPnP"="c:\program files\Analog Devices\Core\smax4pnp.exe" [2004-10-14 1404928]
"avgnt"="c:\program files\Avira\AntiVir Desktop\avgnt.exe" [2013-08-29 347192]
.
[HKLM\~\startupfolder\C:^Documents and Settings^ADMIN^Start Menu^Programs^Startup^EvernoteClipper.lnk]
path=c:\documents and settings\ADMIN\Start Menu\Programs\Startup\EvernoteClipper.lnk
backup=c:\windows\pss\EvernoteClipper.lnkStartup
.
[HKLM\~\startupfolder\C:^Documents and Settings^ADMIN^Start Menu^Programs^Startup^OpenOffice.org 3.2.lnk]
path=c:\documents and settings\ADMIN\Start Menu\Programs\Startup\OpenOffice.org 3.2.lnk
backup=c:\windows\pss\OpenOffice.org 3.2.lnkStartup
.
[HKLM\~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^McAfee Security Scan Plus.lnk]
path=c:\documents and settings\All Users\Start Menu\Programs\Startup\McAfee Security Scan Plus.lnk
backup=c:\windows\pss\McAfee Security Scan Plus.lnkCommon Startup
.
[HKLM\~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^MediaTV Monitor.lnk]
path=c:\documents and settings\All Users\Start Menu\Programs\Startup\MediaTV Monitor.lnk
backup=c:\windows\pss\MediaTV Monitor.lnkCommon Startup
.
[HKLM\~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^Microsoft Office.lnk]
path=c:\documents and settings\All Users\Start Menu\Programs\Startup\Microsoft Office.lnk
backup=c:\windows\pss\Microsoft Office.lnkCommon Startup
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Adobe ARM]
2013-04-04 21:06 958576 ----a-w- c:\program files\Common Files\Adobe\ARM\1.0\AdobeARM.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Adobe Reader Speed Launcher]
2012-12-18 14:28 38112 ----a-w- c:\program files\Adobe\Reader 10.0\Reader\reader_sl.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\APSDaemon]
2011-11-02 05:25 59240 ----a-w- c:\program files\Common Files\Apple\Apple Application Support\APSDaemon.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\avgnt]
2013-08-29 13:36 347192 ----a-w- c:\program files\Avira\AntiVir Desktop\avgnt.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Google Update]
2011-06-06 10:01 136176 ----atw- c:\documents and settings\ADMIN\Local Settings\Application Data\Google\Update\GoogleUpdate.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\googletalk]
2007-01-01 21:22 3739648 ----a-w- c:\program files\Google\Google Talk\googletalk.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\igfxtray]
2006-03-23 22:17 94208 ----a-w- c:\windows\system32\igfxtray.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Malwarebytes' Anti-Malware (reboot)]
2013-04-04 20:50 887432 ----a-w- c:\program files\Malwarebytes' Anti-Malware\mbam.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\MSMSGS]
2008-04-14 10:42 1695232 ----a-w- c:\program files\Messenger\msmsgs.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Skype]
2012-07-13 19:33 17418928 ----a-r- c:\program files\Skype\Phone\Skype.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\SunJavaUpdateSched]
2012-07-03 15:04 252848 ----a-w- c:\program files\Common Files\Java\Java Update\jusched.exe
.
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"%windir%\\system32\\sessmgr.exe"=
"c:\\WINDOWS\\system32\\dpvsetup.exe"=
"c:\\programs - no installation needed\\ws_ftp\\ws_ftp95.exe"=
"c:\\xampp\\xampp\\apache\\bin\\httpd.exe"=
"c:\\xampp\\xampp\\mysql\\bin\\mysqld.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpiscnapp.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpqkygrp.exe"=
"c:\\xampp\\mysql\\bin\\mysqld.exe"=
"c:\\xampp\\apache\\bin\\httpd.exe"=
"c:\\Program Files\\Google\\Google Earth\\client\\googleearth.exe"=
"c:\\Documents and Settings\\ADMIN\\Application Data\\hlololol.exe"=
"c:\\Program Files\\Common Files\\Apple\\Apple Application Support\\WebKit2WebProcess.exe"=
"c:\\Documents and Settings\\ADMIN\\Desktop\\MedArc\\openmrs-standalone-1.8.3\\openmrs-standalone-1.8.3\\database\\bin\\mysqld.exe"=
"c:\\Program Files\\Google\\Google Talk\\googletalk.exe"=
"c:\\Documents and Settings\\ADMIN\\Local Settings\\Application Data\\Google\\Google Talk Plugin\\googletalkplugin.exe"=
"c:\\Program Files\\Windows Live\\Messenger\\wlcsdk.exe"=
"c:\\Program Files\\Windows Live\\Sync\\WindowsLiveSync.exe"=
"c:\\Program Files\\Skype\\Phone\\Skype.exe"=
"c:\\xampp\\MercuryMail\\mercury.exe"=
"c:\program files\Microsoft ActiveSync\rapimgr.exe"= c:\program files\Microsoft ActiveSync\rapimgr.exe:169.254.2.0/255.255.255.0:Enabled:ActiveSync RAPI Manager
"c:\program files\Microsoft ActiveSync\wcescomm.exe"= c:\program files\Microsoft ActiveSync\wcescomm.exe:169.254.2.0/255.255.255.0:Enabled:ActiveSync Connection Manager
"c:\program files\Microsoft ActiveSync\WCESMgr.exe"= c:\program files\Microsoft ActiveSync\WCESMgr.exe:169.254.2.0/255.255.255.0:Enabled:ActiveSync Application
"c:\\Program Files\\webcamXP5\\wLite.exe"=
"c:\\Program Files\\webcamXP5\\wService.exe"=
"c:\\WINDOWS\\system32\\javaw.exe"=
"c:\\Program Files\\VideoLAN\\VLC\\vlc.exe"=
"c:\\Program Files\\NetMeeting\\conf.exe"=
.
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\GloballyOpenPorts\List]
"3389:TCP"= 3389:TCP:@xpsp2res.dll,-22009
"26675:TCP"= 26675:TCP:169.254.2.0/255.255.255.0:Enabled:ActiveSync Service
.
R1 avkmgr;avkmgr;c:\windows\system32\drivers\avkmgr.sys [4/22/2013 7:11 AM 37352]
R2 AntiVirSchedulerService;Avira Scheduler;c:\program files\Avira\AntiVir Desktop\sched.exe [4/22/2013 7:11 AM 84024]
R2 npf;NetGroup Packet Filter Driver;c:\windows\system32\drivers\npf.sys [1/26/2010 8:09 PM 50704]
S0 cerc6;cerc6; [x]
S2 SkypeUpdate;Skype Updater;c:\program files\Skype\Updater\Updater.exe [7/13/2012 1:28 PM 160944]
S3 A193_ADS;VideoXpress V2 Analog Capture;c:\windows\system32\drivers\A193_ADS.sys [12/22/2010 10:08 PM 277888]
S3 wxpSvc;webcamXP Service;c:\program files\webcamXP5\wService.exe [10/15/2013 3:17 PM 5212992]
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\svchost]
HPZ12 REG_MULTI_SZ   Pml Driver HPZ12 Net Driver HPZ12
.
Contents of the 'Scheduled Tasks' folder
.
2013-11-16 c:\windows\Tasks\GoogleUpdateTaskMachineCore.job
- c:\program files\Google\Update\GoogleUpdate.exe [2011-03-30 22:51]
.
2013-11-16 c:\windows\Tasks\GoogleUpdateTaskMachineUA.job
- c:\program files\Google\Update\GoogleUpdate.exe [2011-03-30 22:51]
.
2013-11-15 c:\windows\Tasks\GoogleUpdateTaskUserS-1-5-21-382435906-1983232911-3557363581-1003Core.job
- c:\documents and settings\ADMIN\Local Settings\Application Data\Google\Update\GoogleUpdate.exe [2011-06-29 10:01]
.
2013-11-16 c:\windows\Tasks\GoogleUpdateTaskUserS-1-5-21-382435906-1983232911-3557363581-1003UA.job
- c:\documents and settings\ADMIN\Local Settings\Application Data\Google\Update\GoogleUpdate.exe [2011-06-29 10:01]
.
2013-08-29 c:\windows\Tasks\WavePadReminder.job
- c:\program files\NCH Software\WavePad\wavepad.exe [2013-04-21 23:18]
.
.
------- Supplementary Scan -------
.
uStart Page = https://yahoo.com/
IE: Add to Google Photos Screensa&ver - c:\windows\system32\GPhotos.scr/200
IE: Clip Image - c:\program files\Evernote\Evernote\\EvernoteIERes\Clip.html?clipAction=4
IE: Clip selection - c:\program files\Evernote\Evernote\\EvernoteIERes\Clip.html?clipAction=3
IE: Clip this page - c:\program files\Evernote\Evernote\\EvernoteIERes\Clip.html?clipAction=1
IE: Clip URL - c:\program files\Evernote\Evernote\\EvernoteIERes\Clip.html?clipAction=0
IE: New Note - c:\program files\Evernote\Evernote\\EvernoteIERes\NewNote.html
TCP: DhcpNameServer = 192.168.15.1
FF - ProfilePath - c:\documents and settings\ADMIN\Application Data\Mozilla\Firefox\Profiles\qj4idqyr.default\
FF - prefs.js: browser.startup.homepage - hxxp://yahoo.com
.
- - - - ORPHANS REMOVED - - - -
.
MSConfigStartUp-msnmsgr - c:\program files\Windows Live\Messenger\msnmsgr.exe
MSConfigStartUp-ROC_ROC_NT - c:\program files\AVG Secure Search\ROC_ROC_NT.exe
AddRemove-Coupon Printer for Windows5.0.0.1 - c:\program files\Coupons\uninstall.exe
.
.
.
**************************************************************************
.
catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2013-11-15 21:47
Windows 5.1.2600 Service Pack 3 NTFS
.
scanning hidden processes ...  
.
scanning hidden autostart entries ... 
.
scanning hidden files ...  
.
scan completed successfully
hidden files: 0
.
**************************************************************************
.
[HKEY_LOCAL_MACHINE\System\ControlSet001\Services\wxpSvc]
"ImagePath"="c:\program files\webcamXP5\wService.exe /startedbyscm:5053B757-40E35B3B-webcamSRV"
.
Completion time: 2013-11-15  21:51:09
ComboFix-quarantined-files.txt  2013-11-16 03:51
.
Pre-Run: 3,856,019,456 bytes free
Post-Run: 4,928,892,928 bytes free
.
- - End Of File - - 053D28983B6279598977D431715DBC27
8F558EB6672622401DA993E1E865C861
 
 
 
 
 
DDS (Ver_2012-11-20.01) - NTFS_x86 
Internet Explorer: 6.0.2900.5512  BrowserJavaVersion: 10.9.2
Run by ADMIN at 22:00:24 on 2013-11-15
Microsoft Windows XP Professional  5.1.2600.3.1252.1.1033.18.1014.470 [GMT -6:00]
.
AV: Avira Desktop *Disabled/Updated* {AD166499-45F9-482A-A743-FDD3350758C7}
.
============== Running Processes ================
.
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Avira\AntiVir Desktop\sched.exe
C:\Program Files\Analog Devices\Core\smax4pnp.exe
C:\Program Files\Avira\AntiVir Desktop\avgnt.exe
C:\Program Files\Dexpot\dexpot.exe
C:\Program Files\Avira\AntiVir Desktop\avguard.exe
C:\Program Files\Microsoft ActiveSync\Wcescomm.exe
C:\Program Files\CDBurnerXP\NMSAccessU.exe
C:\WINDOWS\System32\StkASv2K.exe
C:\Program Files\Avira\AntiVir Desktop\avshadow.exe
C:\WINDOWS\System32\alg.exe
C:\WINDOWS\system32\wscntfy.exe
C:\Program Files\Safari\Safari.exe
C:\WINDOWS\explorer.exe
C:\WINDOWS\system32\wbem\wmiprvse.exe
C:\WINDOWS\system32\svchost.exe -k DcomLaunch
C:\WINDOWS\system32\svchost.exe -k rpcss
C:\WINDOWS\System32\svchost.exe -k netsvcs
C:\WINDOWS\system32\svchost.exe -k NetworkService
C:\WINDOWS\system32\svchost.exe -k LocalService
C:\WINDOWS\System32\svchost.exe -k HPZ12
C:\WINDOWS\System32\svchost.exe -k HPZ12
C:\WINDOWS\system32\svchost.exe -k imgsvc
.
============== Pseudo HJT Report ===============
.
uStart Page = hxxps://yahoo.com/
BHO: Adobe PDF Link Helper: {18DF081C-E8AD-4283-A596-FA578C2EBDC3} - c:\program files\common files\adobe\acrobat\activex\AcroIEHelperShim.dll
BHO: {5C255C8A-E604-49b4-9D64-90988571CECB} - <orphaned>
BHO: Search Helper: {6EBF7485-159F-4bff-A14F-B9E3AAC4465B} - c:\program files\microsoft\search enhancement pack\search helper\SearchHelper.dll
BHO: Java™ Plug-In SSV Helper: {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - c:\program files\java\jre7\bin\ssv.dll
BHO: Windows Live Sign-in Helper: {9030D464-4C02-4ABF-8ECC-5164760863C6} - c:\program files\common files\microsoft shared\windows live\WindowsLiveLogin.dll
BHO: Evernote extension: {92EF2EAD-A7CE-4424-B0DB-499CF856608E} - c:\program files\evernote\evernote\EvernoteIE.dll
BHO: Java™ Plug-In 2 SSV Helper: {DBC80044-A445-435b-BC74-9C25C1C588A9} - c:\program files\java\jre7\bin\jp2ssv.dll
BHO: Windows Live Toolbar Helper: {E15A8DC0-8516-42A1-81EA-DC94EC1ACF10} - c:\program files\windows live\toolbar\wltcore.dll
BHO: JQSIEStartDetectorImpl Class: {E7E6F031-17CE-4C07-BC86-EABFE594F69C} - 
TB: &Windows Live Toolbar: {21FA44EF-376D-4D53-9B0F-8A89D3229068} - c:\program files\windows live\toolbar\wltcore.dll
TB: &Windows Live Toolbar: {21FA44EF-376D-4D53-9B0F-8A89D3229068} - c:\program files\windows live\toolbar\wltcore.dll
uRun: [Dexpot] c:\program files\dexpot\dexpot.exe
uRun: [H/PC Connection Agent] "c:\program files\microsoft activesync\Wcescomm.exe"
mRun: [SoundMAXPnP] c:\program files\analog devices\core\smax4pnp.exe
mRun: [avgnt] "c:\program files\avira\antivir desktop\avgnt.exe" /min
uPolicies-Explorer: NoDriveTypeAutoRun = dword:323
uPolicies-Explorer: NoDriveAutoRun = dword:67108863
uPolicies-Explorer: NoDrives = dword:0
mPolicies-Explorer: NoDriveAutoRun = dword:67108863
mPolicies-Explorer: NoDriveTypeAutoRun = dword:323
mPolicies-Explorer: NoDrives = dword:0
mPolicies-System: LegalNoticeCaption = ?S
mPolicies-Explorer: NoDriveTypeAutoRun = dword:323
mPolicies-Explorer: NoDriveAutoRun = dword:67108863
IE: Add to Google Photos Screensa&ver - c:\windows\system32\GPhotos.scr/200
IE: Clip Image - c:\program files\evernote\evernote\\evernoteieres\Clip.html?clipAction=4
IE: Clip selection - c:\program files\evernote\evernote\\evernoteieres\Clip.html?clipAction=3
IE: Clip this page - c:\program files\evernote\evernote\\evernoteieres\Clip.html?clipAction=1
IE: Clip URL - c:\program files\evernote\evernote\\evernoteieres\Clip.html?clipAction=0
IE: New Note - c:\program files\evernote\evernote\\evernoteieres\NewNote.html
IE: {219C3416-8CB2-491a-A3C7-D9FCDDC9D600} - {5F7B1267-94A9-47F5-98DB-E99415F33AEC} - c:\program files\windows live\writer\WriterBrowserExtension.dll
IE: {2EAF5BB1-070F-11D3-9307-00C04FAE2D4F} - {2EAF5BB0-070F-11D3-9307-00C04FAE2D4F} - c:\program files\microsoft activesync\INetRepl.dll
IE: {2EAF5BB2-070F-11D3-9307-00C04FAE2D4F} - {2EAF5BB0-070F-11D3-9307-00C04FAE2D4F} - c:\program files\microsoft activesync\INetRepl.dll
IE: {A95fe080-8f5d-11d2-a20b-00aa003c157a} - c:\program files\evernote\evernote\\evernoteieres\AddNote.html
IE: {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe
IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe
DPF: {E2883E8F-472F-4FB0-9522-AC9BF37916A7} - hxxp://platformdl.adobe.com/NOS/getPlusPlus/1.6/gp.cab
TCP: NameServer = 192.168.15.1
TCP: Interfaces\{74344527-37CC-4E06-AE03-95A902FE9028} : DHCPNameServer = 192.168.15.1
Handler: skype4com - {FFC8B962-9B40-4DFF-9458-1830C7DD7F5D} - c:\program files\common files\skype\Skype4COM.dll
Notify: igfxcui - igfxdev.dll
.
================= FIREFOX ===================
.
FF - ProfilePath - c:\documents and settings\admin\application data\mozilla\firefox\profiles\qj4idqyr.default\
FF - prefs.js: browser.startup.homepage - hxxp://yahoo.com
.
============= SERVICES / DRIVERS ===============
.
R1 avkmgr;avkmgr;c:\windows\system32\drivers\avkmgr.sys [2013-4-22 37352]
R2 AntiVirSchedulerService;Avira Scheduler;c:\program files\avira\antivir desktop\sched.exe [2013-4-22 84024]
R2 AntiVirService;Avira Real-Time Protection;c:\program files\avira\antivir desktop\avguard.exe [2013-4-22 108088]
R2 avgntflt;avgntflt;c:\windows\system32\drivers\avgntflt.sys [2013-4-22 88840]
R2 fssfltr;FssFltr;c:\windows\system32\drivers\fssfltr_tdi.sys [2012-12-25 54760]
R2 npf;NetGroup Packet Filter Driver;c:\windows\system32\drivers\npf.sys [2010-1-26 50704]
S0 cerc6;cerc6; [x]
S2 clr_optimization_v4.0.30319_32;Microsoft .NET Framework NGEN v4.0.30319_X86;c:\windows\microsoft.net\framework\v4.0.30319\mscorsvw.exe [2010-3-18 130384]
S2 SkypeUpdate;Skype Updater;c:\program files\skype\updater\Updater.exe [2012-7-13 160944]
S3 A193_ADS;VideoXpress V2 Analog Capture;c:\windows\system32\drivers\A193_ADS.sys [2010-12-22 277888]
S3 rt2870;INTELLINET 802.11n USB Wireless LAN Card Driver;c:\windows\system32\drivers\rt2870.sys [2013-5-20 619136]
S3 WPFFontCache_v0400;Windows Presentation Foundation Font Cache 4.0.0.0;c:\windows\microsoft.net\framework\v4.0.30319\wpf\WPFFontCache_v0400.exe [2010-3-18 753504]
S3 wxpSvc;webcamXP Service;c:\program files\webcamxp5\wService.exe [2013-10-15 5212992]
S4 fsssvc;Windows Live Family Safety Service;c:\program files\windows live\family safety\fsssvc.exe [2010-4-28 704872]
.
=============== Created Last 30 ================
.
2013-11-16 03:23:08 98816 ----a-w- c:\windows\sed.exe
2013-11-16 03:23:08 256000 ----a-w- c:\windows\PEV.exe
2013-11-16 03:23:08 208896 ----a-w- c:\windows\MBR.exe
2013-11-16 03:14:16 -------- d-----w- c:\windows\ERUNT
2013-11-16 02:49:55 -------- d-----w- C:\AdwCleaner
2013-10-30 00:36:23 -------- d-----w- c:\windows\system32\LogFiles
2013-10-18 04:40:15 -------- d-----w- c:\program files\VideoLAN
2013-10-18 03:04:13 -------- d-----w- c:\documents and settings\admin\.yawcam
2013-10-18 03:03:02 -------- d-----w- c:\program files\Yawcam
2013-10-18 02:53:34 -------- d-----w- c:\documents and settings\admin\local settings\application data\Apps
2013-10-18 02:52:49 -------- d-----w- c:\documents and settings\all users\application data\webcamXP 5
2013-10-18 02:51:36 -------- d-----w- c:\program files\webcamXP5
.
==================== Find3M  ====================
.
2013-10-07 11:02:18 320512 ----a-w- c:\windows\system32\LiveWrapRTSP.dll
2013-09-02 14:02:46 88840 ----a-w- c:\windows\system32\drivers\avgntflt.sys
2012-07-24 21:48:34 970568 ----a-w- c:\program files\WinDirStatPortable_1.1.2.80_Rev_3.paf.exe
2011-12-29 00:28:41 388608 ----a-w- c:\program files\HijackThis.exe
2010-01-27 05:11:08 444283 ----a-w- c:\program files\common files\WinPcapNmap.exe
.
============= FINISH: 22:00:36.67 ===============
 
 
 
 
 
 
------ end of requested logs ------ 
 
 
Mike
 


#4 nasdaq

nasdaq

  • Malware Response Team
  • 39,909 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Montreal, QC. Canada
  • Local time:04:28 AM

Posted 16 November 2013 - 08:55 AM

Your logs are clean. Is the issue persisting?

Please run this security check for my review.

Download Security Check by screen317 from here.
  • Save it to your Desktop.
  • Double click SecurityCheck.exe and follow the onscreen instructions inside of the black box.
  • A Notepad document should open automatically called checkup.txt; please post the contents of that document.
===

#5 maryba

maryba
  • Topic Starter

  • Members
  • 120 posts
  • OFFLINE
  •  
  • Local time:02:28 AM

Posted 16 November 2013 - 12:10 PM

--- Contents of checkup.txt ---

 UNSUPPORTED OPERATING SYSTEM! ABORTED!

--- End of contents of checkup.txt ---

 

This can't be right..... can it? I am XP, SP3.

 

Re original issue persistence: I would say that generally, the delays have either diminished or possibly disappeared. Will use browsers and other local programs to further evaluate - yet today. By time you have responded to this posting I should have a better idea as to status.

 

But I've been checking C:\WINDOWS\pfirewall.log and see that there still seems to be a lot of what I interpret as unwarranted outbound traffic. Is this something to look into? I can't help but think I may have a zombie on my hands. As I understand it, Windows firewall doesn't screen outbound traffic. Any firewall package recommendations? 

 

Thanks in advance for your continuing help.



#6 nasdaq

nasdaq

  • Malware Response Team
  • 39,909 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Montreal, QC. Canada
  • Local time:04:28 AM

Posted 16 November 2013 - 02:38 PM

--- Contents of checkup.txt ---
UNSUPPORTED OPERATING SYSTEM! ABORTED!
--- End of contents of checkup.txt ---


Restart the computer if not already done and re execute the tool. It should work.

===

Please scan your machine with ESET OnlineScan
  • Hold down Control and click on the following link to open ESET OnlineScan in a new window.
    ESET OnlineScan
  • Click the esetonlinebtn.png button.
  • For alternate browsers only: (Microsoft Internet Explorer users can skip these steps)
    • Click on esetsmartinstaller_enu.exe to download the ESET Smart Installer.
      Save it to your Desktop.
    • Double click on the esetsmartinstaller_enu.png to download the ESET Smart Installer. icon on your Desktop.
  • Check "YES, I accept the Terms of Use."
  • Click the Start button.
  • Accept any security warnings from your browser.
  • Under scan settings, check "Scan Archives" and "Remove found threats"
  • Click Advanced settings and select the following:
    • Scan potentially unwanted applications
    • Scan for potentially unsafe applications
    • Enable Anti-Stealth technology
  • ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this can take some time.
  • When the scan completes, click List Threats
  • Click Export, and save the file to your desktop using a unique name, such as ESETScan. Include the contents of this report in your next reply.
  • Click the Back button.
  • Click the Finish button.


#7 maryba

maryba
  • Topic Starter

  • Members
  • 120 posts
  • OFFLINE
  •  
  • Local time:02:28 AM

Posted 17 November 2013 - 08:20 AM

 Results of screen317's Security Check version 0.99.77  
 Windows XP Service Pack 3 x86   
 Internet Explorer 6 Out of date! 
``````````````Antivirus/Firewall Check:`````````````` 
 Windows Firewall Enabled!  
Avira Desktop   
 Antivirus up to date!  
`````````Anti-malware/Other Utilities Check:````````` 
 Malwarebytes Anti-Malware version 1.75.0.1300  
 CCleaner     
 JavaFX 2.1.1    
 Java 7 Update 9  
 Java version out of Date! 
 Adobe Flash Player 11.3.300.270  
 Adobe Reader 10.1.6 Adobe Reader out of Date!  
 Mozilla Firefox 12.0 Firefox out of Date!  
````````Process Check: objlist.exe by Laurent````````  
 Avira Antivir avgnt.exe 
 Avira Antivir avguard.exe 
`````````````````System Health check````````````````` 
 Total Fragmentation on Drive C:: 27% Defragment your hard drive soon! (Do NOT defrag if SSD!)
````````````````````End of Log`````````````````````` 
 
 
 
 
--- eset scan threat list ---

C:\Documents and Settings\ADMIN\Desktop\program installers\FreeSoundRecorder.exe Win32/OpenCandy application cleaned by deleting - quarantined
C:\Documents and Settings\ADMIN\Desktop\program installers\mobile programming - SB2 beta build 1 by RHBROMS.zip a variant of Android/Agent.CX trojan deleted - quarantined
C:\Documents and Settings\ADMIN\Desktop\program installers\soundforge-setup.exe Win32/DownloadAdmin.G application cleaned by deleting - quarantined
C:\Documents and Settings\ADMIN\Desktop\program installers\firewalls\firewall - ashampoo_firewall_free_1.20_sm.exe a variant of Win32/Toolbar.Conduit.B application cleaned by deleting - quarantined
C:\Documents and Settings\ADMIN\Desktop\program installers\from sourceforge\4kvideodownloader_2.5.exe Win32/OpenCandy application cleaned by deleting - quarantined
C:\Documents and Settings\ADMIN\Desktop\program installers\from sourceforge\SweetHome3D-3.7-windows-oc.exe Win32/OpenCandy application cleaned by deleting - quarantined
C:\Documents and Settings\ADMIN\Desktop\program installers\webcam\ManyCamSetup.exe multiple threats cleaned by deleting - quarantined
C:\Documents and Settings\ADMIN\Desktop\tools\avira_free_antivirus_en.exe a variant of Win32/Bundled.Toolbar.Ask application deleted - quarantined
C:\Documents and Settings\ADMIN\Desktop\tools\downloaded - review\dexpot installers\dexpot_161_r2121.exe Win32/OpenCandy application cleaned by deleting - quarantined
C:\Documents and Settings\All Users\Documents\1 web tools\1web tools\gbook16.zip PHP/Obfuscated.F application deleted - quarantined
C:\Documents and Settings\All Users\Documents\1 web tools\1web tools\mboard13.zip PHP/Obfuscated.F application deleted - quarantined
C:\Program Files\Avira\AntiVir Desktop\apnic.dll a variant of Win32/Bundled.Toolbar.Ask application cleaned by deleting (after the next restart) - quarantined
C:\Program Files\Avira\AntiVir Desktop\apntoolbarinstaller.exe a variant of Win32/Bundled.Toolbar.Ask application cleaned by deleting (after the next restart) - quarantined
C:\Program Files\Avira\AntiVir Desktop\Offercast_AVIRAV7_.exe a variant of Win32/Bundled.Toolbar.Ask.D application cleaned by deleting (after the next restart) - quarantined
 

--- end of eset scan threat list --- 

 

 

 

Mike

====



#8 nasdaq

nasdaq

  • Malware Response Team
  • 39,909 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Montreal, QC. Canada
  • Local time:04:28 AM

Posted 17 November 2013 - 08:52 AM

Secure your system by updating 3rd party programs.

Your version of Java is outdated and needs to be updated to take advantage of fixes that have eliminated security vulnerabilities.
Latest version is Java JRE 7u45 was released on Oct. 15. 2013.

Be careful not to install malware posing as Java update!
Important read this blog.
http://blog.trendmicro.com/trendlabs-security-intelligence/malware-poses-as-an-update-for-java-0-day-fix/

Quoted from the page.
"In light of the recent events surrounding Java, users must seriously consider their use of Java. Do they really need it? If yes, make sure that users follow the steps we recommended and get the security update directly from the official oracle website." at:
http://www.oracle.com/technetwork/java/javase/downloads/index.html

How to disable Java in your browsers
http://www.infoworld.com/t/web-browsers/how-disable-java-in-your-browsers-210882

You can manually check your present version and update as recommended.
https://www.java.com/en/download/installed.jsp

If present remove the old version(s) of Java using the Add/Remove Programs applet.

Java 7 Update 9

Note
Java security update installs Ask Toolbar by default -- a single click in a multi-step installer.
http://www.benedelman.org/images/iac-jan13/ask-iac-011613-small.png
I suggest that your un-check the box "Install the Ask Toolbar" before proceeding.
===

Get the latest version of the Adobe Reader.
http://get.adobe.com/reader/
Before your download I suggest you unckeck the box on the top right "Yes, install McAfee Security Scan Plus - optional" this is not required if you are not a McAfee subscriber. While the installation is in progress you can also deny the installation of any other programs that may be suggested.

When installed remove your old version of the Reader using the Add/Remove Programs applet if present.
<<<>>>

If all is well:

Time for some housekeeping
  • The following will implement some cleanup procedures as well as reset System Restore points:
  • Click Start > Run and copy/paste the following bold text into the Run box and click OK:
  • ComboFix /Uninstall
===


Please consider using these ideas to help secure your computer. While there is no way to guarantee safety when you use a computer, these steps will make it much less likely that you will need to endure another infection. While we really like to help people, we would rather help you protect yourself so that you won't need that help in the future.

Please either enable Automatic Updates under Start -> Control Panel -> Automatic Updates or get into the habit of checking Windows Update regularly. They usually have security updates every month. You can set Windows to notify you of Updates so that you can choose, but only do this if you believe you are able to understand which ones are needed. This is a crucial security measure.

Having an effective antivirus is a must for everyone.
In addition to many excellent commercial products there are plenty of good free antivirus programs available. I can recommend:

If you are satisfied with your current protection programs you can ignore the instructions on Antivirus or Firewall listed below.In addition to an antivirus I recommend using a firewall. A software firewall is a software program that helps screen out hackers, viruses, and worms that try to reach your computer over the Internet. I can recommend one of the following free products:Please note: Many installer offer third-party downloads that are installed automatically when you do not uncheck certain checkboxes. While most of the time not being malicious you usually do not want these on your computer. Be careful during the installation process and you will avoid seeing tons of new unwanted toolbars in your favorite web browser.

Please consider installing and running some of the following programs; they are either free or have free versions of commercial programs:

Malwarebytes Anti-Malware (MBAM)
The free version of MBAM can be used to scan the system for traces of malware. Scanning your system regularly will make it harder for malware to reside on your system.
A tutorial on using MBAM can be found here.
Please Note: Only the paid for version has real time capabilities.

SpywareBlaster
A tutorial on using SpywareBlaster to prevent malware from ever installing on your computer may be found here.

Please keep these programs up-to-date and run them whenever you suspect a problem to prevent malware problems. A number of programs have resident protection and it is a good idea to run the resident protection of one of each type of program to maintain protection. However, it is important to run only one resident program of each type since they can conflict and become less effective. That means only one antivirus, firewall and scanning anti-spyware program at a time. Passive protectors, like SpywareBlaster can be run with any of them.

Note that there are a lot of rogue programs out there that want to scare you into giving them your money and some malware actually claims to be security programs. If you get a popup for a security program that you did not install yourself, do NOT click on it and ask for help immediately. It is very important to run an antivirus and firewall, but you can't always rely on reviews and ads for information. Ask in a security forum that you trust if you are not sure. If you are unsure and looking for anti-spyware programs, you can find out if it is a rogue here:A similar category of programs is now called "scareware." Scareware programs are active infections that will pop-up on your computer and tell you that you are infected. If you look closely, it will usually have a name that looks like it might be legitimate, but it is NOT one of the programs you installed. It tells you to click and install it right away. If you click on any part of it, including the 'X' to close it, you may actually help it infect your computer further. Keeping protection updated and running resident protection can help prevent these infections. If it happens anyway, get offline as quickly as you can. Pull the internet connection cable or shut down the computer if you have to. Contact someone to help by using another computer if possible. These programs are also sometimes called 'rogues', but they are different than the older version of rogues mentioned above.

Please keep your programs up to date. This applies to Java, Adobe Flashplayer, Adobe Reader and your Internet Browsers in particular. Vulnerabilities in these programs are often exploited in order to install malware on your PC. Visiting a prepared web page suffices to infect your system.

In general Firefox, Opera and Google Chrome are considered to be more secure than Internet Explorer. In addition there are many useful addons that can protect you from possible risks:
  • WOT will warn you when you try to visit sites with poor reputation. The reputation is based on user ratings and is usually very accurate.
  • Script Blocker can help blocking many attempts to infect your system via malicious websites by only allowing scripts at sites you trust.
  • NoScript is a popular Firefox addon,
  • ScriptNo a popular Google Chrome addon.
For much more useful information, please also read Tony Klein's excellent article: How did I get infected in the first place

Hopefully these steps will help to keep you error free. If you run into more difficulty, we will certainly do what we can to help.
===

#9 maryba

maryba
  • Topic Starter

  • Members
  • 120 posts
  • OFFLINE
  •  
  • Local time:02:28 AM

Posted 17 November 2013 - 08:40 PM

Hi nasdaq, 

 

Since your last post didn't directly respond to my previous post of the ESET log/results and the Security Check run - which ran just fine after a warm reboot thank you very much - I'm wondering if you have any comment on those results.

 

I'm curious if you have found any one or a set of detections that were causing my slow-running browsers and other local applications. And if anything detected was the source of what looked like to me heavy outbound internet traffic.

 

I do feel that all applications are running more normally - no hangups or great long pauses before a webpage becomes active again. So it appears that you have given me the tools to clear up the problems I was having.

 

I do have a further question.: it happens that I have another exact same PC on a LAN with this computer we've just fixed. It is experiencing the same problems I was having on this PC, very slow browser performance. Would it be appropriate to apply the same set of tools we've just used - and should I stay in touch with you during my running the tools? For that matter, can I? Can you work on a second problem computer while still on the original post?

 

Also, thanks very much for the tips and suggestions in your last post - it's stuff I knew I needed. I will implement as many of them as I can.

 

Thanks again for your help. Past and future, if applicable.

 

 

Mike



#10 nasdaq

nasdaq

  • Malware Response Team
  • 39,909 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Montreal, QC. Canada
  • Local time:04:28 AM

Posted 18 November 2013 - 08:42 AM

The security Check log I covered at the beginning of post No. 8.
===

Most of the time by looking at the log we do not see any malicious items.
It's only by running the tools that we can clean what we do not see.

The main thing is to clean as much as we can using the tools we know about.

===

I do have a further question.: it happens that I have another exact same PC on a LAN with this computer we've just fixed. It is experiencing the same problems I was having on this PC, very slow browser performance. Would it be appropriate to apply the same set of tools we've just used - and should I stay in touch with you during my running the tools? For that matter, can I? Can you work on a second problem computer while still on the original post?


If the PC as the XP operating systems you can proceed with running the tools I suggested in post no 2.
Start a new topic and post the logs.
When done post the URL of the new topic here and I will expedite the matter.
We do no work on two different computer on the same topic.

===

If all is well with this computer.

Time for some housekeeping
  • The following will implement some cleanup procedures as well as reset System Restore points:
  • Click Start > Run and copy/paste the following bold text into the Run box and click OK:
  • ComboFix /Uninstall
===


Please consider using these ideas to help secure your computer. While there is no way to guarantee safety when you use a computer, these steps will make it much less likely that you will need to endure another infection. While we really like to help people, we would rather help you protect yourself so that you won't need that help in the future.

Please either enable Automatic Updates under Start -> Control Panel -> Automatic Updates or get into the habit of checking Windows Update regularly. They usually have security updates every month. You can set Windows to notify you of Updates so that you can choose, but only do this if you believe you are able to understand which ones are needed. This is a crucial security measure.

Having an effective antivirus is a must for everyone.
In addition to many excellent commercial products there are plenty of good free antivirus programs available. I can recommend:

If you are satisfied with your current protection programs you can ignore the instructions on Antivirus or Firewall listed below.In addition to an antivirus I recommend using a firewall. A software firewall is a software program that helps screen out hackers, viruses, and worms that try to reach your computer over the Internet. I can recommend one of the following free products:Please note: Many installer offer third-party downloads that are installed automatically when you do not uncheck certain checkboxes. While most of the time not being malicious you usually do not want these on your computer. Be careful during the installation process and you will avoid seeing tons of new unwanted toolbars in your favorite web browser.

Please consider installing and running some of the following programs; they are either free or have free versions of commercial programs:

Malwarebytes Anti-Malware (MBAM)
The free version of MBAM can be used to scan the system for traces of malware. Scanning your system regularly will make it harder for malware to reside on your system.
A tutorial on using MBAM can be found here.
Please Note: Only the paid for version has real time capabilities.

SpywareBlaster
A tutorial on using SpywareBlaster to prevent malware from ever installing on your computer may be found here.

Please keep these programs up-to-date and run them whenever you suspect a problem to prevent malware problems. A number of programs have resident protection and it is a good idea to run the resident protection of one of each type of program to maintain protection. However, it is important to run only one resident program of each type since they can conflict and become less effective. That means only one antivirus, firewall and scanning anti-spyware program at a time. Passive protectors, like SpywareBlaster can be run with any of them.

Note that there are a lot of rogue programs out there that want to scare you into giving them your money and some malware actually claims to be security programs. If you get a popup for a security program that you did not install yourself, do NOT click on it and ask for help immediately. It is very important to run an antivirus and firewall, but you can't always rely on reviews and ads for information. Ask in a security forum that you trust if you are not sure. If you are unsure and looking for anti-spyware programs, you can find out if it is a rogue here:A similar category of programs is now called "scareware." Scareware programs are active infections that will pop-up on your computer and tell you that you are infected. If you look closely, it will usually have a name that looks like it might be legitimate, but it is NOT one of the programs you installed. It tells you to click and install it right away. If you click on any part of it, including the 'X' to close it, you may actually help it infect your computer further. Keeping protection updated and running resident protection can help prevent these infections. If it happens anyway, get offline as quickly as you can. Pull the internet connection cable or shut down the computer if you have to. Contact someone to help by using another computer if possible. These programs are also sometimes called 'rogues', but they are different than the older version of rogues mentioned above.

Please keep your programs up to date. This applies to Java, Adobe Flashplayer, Adobe Reader and your Internet Browsers in particular. Vulnerabilities in these programs are often exploited in order to install malware on your PC. Visiting a prepared web page suffices to infect your system.

In general Firefox, Opera and Google Chrome are considered to be more secure than Internet Explorer. In addition there are many useful addons that can protect you from possible risks:
  • WOT will warn you when you try to visit sites with poor reputation. The reputation is based on user ratings and is usually very accurate.
  • Script Blocker can help blocking many attempts to infect your system via malicious websites by only allowing scripts at sites you trust.
  • NoScript is a popular Firefox addon,
  • ScriptNo a popular Google Chrome addon.
For much more useful information, please also read Tony Klein's excellent article: How did I get infected in the first place

Hopefully these steps will help to keep you error free. If you run into more difficulty, we will certainly do what we can to help.
===

#11 maryba

maryba
  • Topic Starter

  • Members
  • 120 posts
  • OFFLINE
  •  
  • Local time:02:28 AM

Posted 19 November 2013 - 08:26 PM

nasdaq, 

 

While some browser and OS speed performance has improved considerably, I still experience intermittent delays in program startups, most typically any of the 4 different browsers that I can test - but also even starting up an Excel workbook, a session of Windows Explorer, Outlook Express, etc.

 

And, I still see what I interpret as large volumes of unwarranted outbound traffic in pfirewall.log. I don't think that activity has diminished since I first posted.

 

Got any more tools in your bag?

 

 

Mike



#12 nasdaq

nasdaq

  • Malware Response Team
  • 39,909 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Montreal, QC. Canada
  • Local time:04:28 AM

Posted 20 November 2013 - 09:25 AM


Lets continue.

--RogueKiller--
  • Download & SAVE to your Desktop RogueKiller for 32bit or Roguekiller for 64bit
  • Quit all programs that you may have started.
  • Please disconnect any USB or external drives from the computer before you run this scan!
  • For Vista or Windows 7, right-click and select "Run as Administrator to start"
  • For Windows XP, double-click to start.
  • Wait until Prescan has finished ...
  • Then Click on "Scan" button
  • Wait until the Status box shows "Scan Finished"
  • click on "delete"
  • Wait until the Status box shows "Deleting Finished"
  • Click on "Report" and copy/paste the content of the Notepad into your next reply.
  • The log should be found in RKreport[1].txt on your Desktop
  • Exit/Close RogueKiller+
==============

#13 maryba

maryba
  • Topic Starter

  • Members
  • 120 posts
  • OFFLINE
  •  
  • Local time:02:28 AM

Posted 23 November 2013 - 10:25 PM

RogueKiller V8.7.8 [Nov 14 2013] by Tigzy
mail : tigzyRK<at>gmail<dot>com
 
Operating System : Windows XP (5.1.2600 Service Pack 3) 32 bits version
Started in : Normal mode
User : ADMIN [Admin rights]
Mode : Remove -- Date : 11/23/2013 21:20:35
| ARK || FAK || MBR |
 
¤¤¤ Bad processes : 0 ¤¤¤
 
¤¤¤ Registry Entries : 7 ¤¤¤
[HJ POL][PUM] HKLM\[...]\System : DisableRegistryTools (0) -> DELETED
[HJ SMENU][PUM] HKCU\[...]\Advanced : Start_ShowUser (0) -> REPLACED (1)
[HJ SMENU][PUM] HKCU\[...]\Advanced : Start_ShowMyGames (0) -> REPLACED (1)
[HJ SMENU][PUM] HKCU\[...]\Advanced : Start_ShowPrinters (0) -> REPLACED (1)
[HJ SMENU][PUM] HKCU\[...]\Advanced : Start_ShowSetProgramAccessAndDefaults (0) -> REPLACED (1)
[HJ DESK][PUM] HKCU\[...]\ClassicStartMenu : {20D04FE0-3AEA-1069-A2D8-08002B30309D} (1) -> REPLACED (0)
[HJ DESK][PUM] HKLM\[...]\NewStartPanel : {20D04FE0-3AEA-1069-A2D8-08002B30309D} (1) -> REPLACED (0)
 
¤¤¤ Scheduled tasks : 0 ¤¤¤
 
¤¤¤ Startup Entries : 0 ¤¤¤
 
¤¤¤ Web browsers : 0 ¤¤¤
 
¤¤¤ Particular Files / Folders: ¤¤¤
 
¤¤¤ Driver : [LOADED] ¤¤¤
[Address] SSDT[25] : NtClose @ 0x805BC4EC -> HOOKED (Unknown @ 0xF7C412B4)
[Address] SSDT[41] : NtCreateKey @ 0x80623786 -> HOOKED (Unknown @ 0xF7C4126E)
[Address] SSDT[50] : NtCreateSection @ 0x805AB3AE -> HOOKED (Unknown @ 0xF7C412BE)
[Address] SSDT[53] : NtCreateThread @ 0x805D0FD4 -> HOOKED (Unknown @ 0xF7C41264)
[Address] SSDT[63] : NtDeleteKey @ 0x80623C16 -> HOOKED (Unknown @ 0xF7C41273)
[Address] SSDT[65] : NtDeleteValueKey @ 0x80623DE6 -> HOOKED (Unknown @ 0xF7C4127D)
[Address] SSDT[68] : NtDuplicateObject @ 0x805BDFC4 -> HOOKED (Unknown @ 0xF7C412AF)
[Address] SSDT[98] : NtLoadKey @ 0x80625982 -> HOOKED (Unknown @ 0xF7C41282)
[Address] SSDT[122] : NtOpenProcess @ 0x805CB3FC -> HOOKED (Unknown @ 0xF7C41250)
[Address] SSDT[128] : NtOpenThread @ 0x805CB688 -> HOOKED (Unknown @ 0xF7C41255)
[Address] SSDT[177] : NtQueryValueKey @ 0x806219BE -> HOOKED (Unknown @ 0xF7C412D7)
[Address] SSDT[193] : NtReplaceKey @ 0x80625832 -> HOOKED (Unknown @ 0xF7C4128C)
[Address] SSDT[200] : NtRequestWaitReplyPort @ 0x805A2D5A -> HOOKED (Unknown @ 0xF7C412C8)
[Address] SSDT[204] : NtRestoreKey @ 0x8062513E -> HOOKED (Unknown @ 0xF7C41287)
[Address] SSDT[213] : NtSetContextThread @ 0x805D16F6 -> HOOKED (Unknown @ 0xF7C412C3)
[Address] SSDT[237] : NtSetSecurityObject @ 0x805C05EA -> HOOKED (Unknown @ 0xF7C412CD)
[Address] SSDT[247] : NtSetValueKey @ 0x80621D0C -> HOOKED (Unknown @ 0xF7C41278)
[Address] SSDT[255] : NtSystemDebugControl @ 0x8061776E -> HOOKED (Unknown @ 0xF7C412D2)
[Address] SSDT[257] : NtTerminateProcess @ 0x805D299E -> HOOKED (Unknown @ 0xF7C4125F)
[Address] Shadow SSDT[549] : NtUserSetWindowsHookEx -> HOOKED (Unknown @ 0xF7C412E6)
[Address] Shadow SSDT[552] : NtUserSetWinEventHook -> HOOKED (Unknown @ 0xF7C412EB)
 
¤¤¤ External Hives: ¤¤¤
 
¤¤¤ Infection :  ¤¤¤
 
¤¤¤ HOSTS File: ¤¤¤
--> %SystemRoot%\System32\drivers\etc\hosts
 
 
127.0.0.1       localhost
 
 
¤¤¤ MBR Check: ¤¤¤
 
+++++ PhysicalDrive0: (\\.\PHYSICALDRIVE0 @ IDE) HDS728080PLA380 +++++
--- User ---
[MBR] 7a9c447988e169332e12696ec8b18580
[BSP] fe54eed320a0a11f500dc796ce4039d3 : Windows XP MBR Code
Partition table:
0 - [ACTIVE] NTFS (0x07) [VISIBLE] Offset (sectors): 2048 | Size: 76291 Mo
User = LL1 ... OK!
User = LL2 ... OK!
 
Finished : << RKreport[0]_D_11232013_212035.txt >>
RKreport[0]_S_11232013_211850.txt


#14 maryba

maryba
  • Topic Starter

  • Members
  • 120 posts
  • OFFLINE
  •  
  • Local time:02:28 AM

Posted 23 November 2013 - 10:31 PM

Just noticed: two report files were produced. Didn't check to see if they are duplicates but report file names were slightly different.

RKreport[0]_S_11232013_211850.txt 

RKreport[0]_D_11232013_212035.txt

 

So I'm (re)posting both of them here.

 

 

RKreport[0]_S_11232013_211850.txt 

 

RogueKiller V8.7.8 [Nov 14 2013] by Tigzy
mail : tigzyRK<at>gmail<dot>com
 
Operating System : Windows XP (5.1.2600 Service Pack 3) 32 bits version
Started in : Normal mode
User : ADMIN [Admin rights]
Mode : Scan -- Date : 11/23/2013 21:18:50
| ARK || FAK || MBR |
 
¤¤¤ Bad processes : 0 ¤¤¤
 
¤¤¤ Registry Entries : 7 ¤¤¤
[HJ POL][PUM] HKLM\[...]\System : DisableRegistryTools (0) -> FOUND
[HJ SMENU][PUM] HKCU\[...]\Advanced : Start_ShowUser (0) -> FOUND
[HJ SMENU][PUM] HKCU\[...]\Advanced : Start_ShowMyGames (0) -> FOUND
[HJ SMENU][PUM] HKCU\[...]\Advanced : Start_ShowPrinters (0) -> FOUND
[HJ SMENU][PUM] HKCU\[...]\Advanced : Start_ShowSetProgramAccessAndDefaults (0) -> FOUND
[HJ DESK][PUM] HKCU\[...]\ClassicStartMenu : {20D04FE0-3AEA-1069-A2D8-08002B30309D} (1) -> FOUND
[HJ DESK][PUM] HKLM\[...]\NewStartPanel : {20D04FE0-3AEA-1069-A2D8-08002B30309D} (1) -> FOUND
 
¤¤¤ Scheduled tasks : 0 ¤¤¤
 
¤¤¤ Startup Entries : 0 ¤¤¤
 
¤¤¤ Web browsers : 0 ¤¤¤
 
¤¤¤ Particular Files / Folders: ¤¤¤
 
¤¤¤ Driver : [LOADED] ¤¤¤
[Address] SSDT[25] : NtClose @ 0x805BC4EC -> HOOKED (Unknown @ 0xF7C412B4)
[Address] SSDT[41] : NtCreateKey @ 0x80623786 -> HOOKED (Unknown @ 0xF7C4126E)
[Address] SSDT[50] : NtCreateSection @ 0x805AB3AE -> HOOKED (Unknown @ 0xF7C412BE)
[Address] SSDT[53] : NtCreateThread @ 0x805D0FD4 -> HOOKED (Unknown @ 0xF7C41264)
[Address] SSDT[63] : NtDeleteKey @ 0x80623C16 -> HOOKED (Unknown @ 0xF7C41273)
[Address] SSDT[65] : NtDeleteValueKey @ 0x80623DE6 -> HOOKED (Unknown @ 0xF7C4127D)
[Address] SSDT[68] : NtDuplicateObject @ 0x805BDFC4 -> HOOKED (Unknown @ 0xF7C412AF)
[Address] SSDT[98] : NtLoadKey @ 0x80625982 -> HOOKED (Unknown @ 0xF7C41282)
[Address] SSDT[122] : NtOpenProcess @ 0x805CB3FC -> HOOKED (Unknown @ 0xF7C41250)
[Address] SSDT[128] : NtOpenThread @ 0x805CB688 -> HOOKED (Unknown @ 0xF7C41255)
[Address] SSDT[177] : NtQueryValueKey @ 0x806219BE -> HOOKED (Unknown @ 0xF7C412D7)
[Address] SSDT[193] : NtReplaceKey @ 0x80625832 -> HOOKED (Unknown @ 0xF7C4128C)
[Address] SSDT[200] : NtRequestWaitReplyPort @ 0x805A2D5A -> HOOKED (Unknown @ 0xF7C412C8)
[Address] SSDT[204] : NtRestoreKey @ 0x8062513E -> HOOKED (Unknown @ 0xF7C41287)
[Address] SSDT[213] : NtSetContextThread @ 0x805D16F6 -> HOOKED (Unknown @ 0xF7C412C3)
[Address] SSDT[237] : NtSetSecurityObject @ 0x805C05EA -> HOOKED (Unknown @ 0xF7C412CD)
[Address] SSDT[247] : NtSetValueKey @ 0x80621D0C -> HOOKED (Unknown @ 0xF7C41278)
[Address] SSDT[255] : NtSystemDebugControl @ 0x8061776E -> HOOKED (Unknown @ 0xF7C412D2)
[Address] SSDT[257] : NtTerminateProcess @ 0x805D299E -> HOOKED (Unknown @ 0xF7C4125F)
[Address] Shadow SSDT[549] : NtUserSetWindowsHookEx -> HOOKED (Unknown @ 0xF7C412E6)
[Address] Shadow SSDT[552] : NtUserSetWinEventHook -> HOOKED (Unknown @ 0xF7C412EB)
 
¤¤¤ External Hives: ¤¤¤
 
¤¤¤ Infection :  ¤¤¤
 
¤¤¤ HOSTS File: ¤¤¤
--> %SystemRoot%\System32\drivers\etc\hosts
 
 
127.0.0.1       localhost
 
 
¤¤¤ MBR Check: ¤¤¤
 
+++++ PhysicalDrive0: (\\.\PHYSICALDRIVE0 @ IDE) HDS728080PLA380 +++++
--- User ---
[MBR] 7a9c447988e169332e12696ec8b18580
[BSP] fe54eed320a0a11f500dc796ce4039d3 : Windows XP MBR Code
Partition table:
0 - [ACTIVE] NTFS (0x07) [VISIBLE] Offset (sectors): 2048 | Size: 76291 Mo
User = LL1 ... OK!
User = LL2 ... OK!
 
Finished : << RKreport[0]_S_11232013_211850.txt >>
 
 
 
 

 

 

 

RKreport[0]_D_11232013_212035.txt

RogueKiller V8.7.8 [Nov 14 2013] by Tigzy
mail : tigzyRK<at>gmail<dot>com
 
Operating System : Windows XP (5.1.2600 Service Pack 3) 32 bits version
Started in : Normal mode
User : ADMIN [Admin rights]
Mode : Remove -- Date : 11/23/2013 21:20:35
| ARK || FAK || MBR |
 
¤¤¤ Bad processes : 0 ¤¤¤
 
¤¤¤ Registry Entries : 7 ¤¤¤
[HJ POL][PUM] HKLM\[...]\System : DisableRegistryTools (0) -> DELETED
[HJ SMENU][PUM] HKCU\[...]\Advanced : Start_ShowUser (0) -> REPLACED (1)
[HJ SMENU][PUM] HKCU\[...]\Advanced : Start_ShowMyGames (0) -> REPLACED (1)
[HJ SMENU][PUM] HKCU\[...]\Advanced : Start_ShowPrinters (0) -> REPLACED (1)
[HJ SMENU][PUM] HKCU\[...]\Advanced : Start_ShowSetProgramAccessAndDefaults (0) -> REPLACED (1)
[HJ DESK][PUM] HKCU\[...]\ClassicStartMenu : {20D04FE0-3AEA-1069-A2D8-08002B30309D} (1) -> REPLACED (0)
[HJ DESK][PUM] HKLM\[...]\NewStartPanel : {20D04FE0-3AEA-1069-A2D8-08002B30309D} (1) -> REPLACED (0)
 
¤¤¤ Scheduled tasks : 0 ¤¤¤
 
¤¤¤ Startup Entries : 0 ¤¤¤
 
¤¤¤ Web browsers : 0 ¤¤¤
 
¤¤¤ Particular Files / Folders: ¤¤¤
 
¤¤¤ Driver : [LOADED] ¤¤¤
[Address] SSDT[25] : NtClose @ 0x805BC4EC -> HOOKED (Unknown @ 0xF7C412B4)
[Address] SSDT[41] : NtCreateKey @ 0x80623786 -> HOOKED (Unknown @ 0xF7C4126E)
[Address] SSDT[50] : NtCreateSection @ 0x805AB3AE -> HOOKED (Unknown @ 0xF7C412BE)
[Address] SSDT[53] : NtCreateThread @ 0x805D0FD4 -> HOOKED (Unknown @ 0xF7C41264)
[Address] SSDT[63] : NtDeleteKey @ 0x80623C16 -> HOOKED (Unknown @ 0xF7C41273)
[Address] SSDT[65] : NtDeleteValueKey @ 0x80623DE6 -> HOOKED (Unknown @ 0xF7C4127D)
[Address] SSDT[68] : NtDuplicateObject @ 0x805BDFC4 -> HOOKED (Unknown @ 0xF7C412AF)
[Address] SSDT[98] : NtLoadKey @ 0x80625982 -> HOOKED (Unknown @ 0xF7C41282)
[Address] SSDT[122] : NtOpenProcess @ 0x805CB3FC -> HOOKED (Unknown @ 0xF7C41250)
[Address] SSDT[128] : NtOpenThread @ 0x805CB688 -> HOOKED (Unknown @ 0xF7C41255)
[Address] SSDT[177] : NtQueryValueKey @ 0x806219BE -> HOOKED (Unknown @ 0xF7C412D7)
[Address] SSDT[193] : NtReplaceKey @ 0x80625832 -> HOOKED (Unknown @ 0xF7C4128C)
[Address] SSDT[200] : NtRequestWaitReplyPort @ 0x805A2D5A -> HOOKED (Unknown @ 0xF7C412C8)
[Address] SSDT[204] : NtRestoreKey @ 0x8062513E -> HOOKED (Unknown @ 0xF7C41287)
[Address] SSDT[213] : NtSetContextThread @ 0x805D16F6 -> HOOKED (Unknown @ 0xF7C412C3)
[Address] SSDT[237] : NtSetSecurityObject @ 0x805C05EA -> HOOKED (Unknown @ 0xF7C412CD)
[Address] SSDT[247] : NtSetValueKey @ 0x80621D0C -> HOOKED (Unknown @ 0xF7C41278)
[Address] SSDT[255] : NtSystemDebugControl @ 0x8061776E -> HOOKED (Unknown @ 0xF7C412D2)
[Address] SSDT[257] : NtTerminateProcess @ 0x805D299E -> HOOKED (Unknown @ 0xF7C4125F)
[Address] Shadow SSDT[549] : NtUserSetWindowsHookEx -> HOOKED (Unknown @ 0xF7C412E6)
[Address] Shadow SSDT[552] : NtUserSetWinEventHook -> HOOKED (Unknown @ 0xF7C412EB)
 
¤¤¤ External Hives: ¤¤¤
 
¤¤¤ Infection :  ¤¤¤
 
¤¤¤ HOSTS File: ¤¤¤
--> %SystemRoot%\System32\drivers\etc\hosts
 
 
127.0.0.1       localhost
 
 
¤¤¤ MBR Check: ¤¤¤
 
+++++ PhysicalDrive0: (\\.\PHYSICALDRIVE0 @ IDE) HDS728080PLA380 +++++
--- User ---
[MBR] 7a9c447988e169332e12696ec8b18580
[BSP] fe54eed320a0a11f500dc796ce4039d3 : Windows XP MBR Code
Partition table:
0 - [ACTIVE] NTFS (0x07) [VISIBLE] Offset (sectors): 2048 | Size: 76291 Mo
User = LL1 ... OK!
User = LL2 ... OK!
 
Finished : << RKreport[0]_D_11232013_212035.txt >>
RKreport[0]_S_11232013_211850.txt
 
 
============
Hope this doesn't confuse the issue.
 
 
Mike
 
 


#15 nasdaq

nasdaq

  • Malware Response Team
  • 39,909 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Montreal, QC. Canada
  • Local time:04:28 AM

Posted 24 November 2013 - 10:42 AM


If still having difficulties please run this tool.

Read carefully and follow these steps.
  • Download TDSSKiller and save it to your Desktop.
  • Double-click on TDSSKiller.exe to run the application.
    tdss1.png
  • Click Change parameters
    settings20121003115955.png
  • Check the boxes next to Verify Driver Digital Signature and Detect TDLFS file system, then click OK
    tdss3.png
  • Click on the Start Scan button to begin the scan and wait for it to finish.
    NOTE: Do not use the computer during the scan!
  • During the scan it will look similar to the image below:
    tdss4.jpg
  • When it finishes, you will either see a report that no threats were found like below:
    tdss5.jpg
    If no threats are found at this point, just click the Report selection on the top right of the form to generate a log. A log file report will pop which you can just close since the report file is already saved.
  • If any infection or suspected items are found, you will see a window similar to below:
    tdss7.jpg
    • If you have files that are shown to fail signature check do not take any action on these. Make sure you select Skip. I will tell you what to do with these later. They may not be issues at all.
    • If Suspicious objects are detected, the default action will be Skip. Leave the default set to Skip.
    • If Malicious objects are detected, they will show in the Scan results. TDSSKiller automatically selects an action (Cure or Delete) for malicious objects
    • Make sure that Cure is selected. Important! - If Cure is not available, please choose Skip instead. Do not choose Delete unless instructed to do so.
  • Click Continue to apply selected actions.
  • A reboot may be required to complete disinfection. A window like the below will appear:
    tdss6.jpg
    Reboot immediately if TDSSKiller states that one is needed.
  • Whether an infection is found or not, a log file should have already been created on your C: drive (or whatever drive you boot from) in the root folder named something like TDSSKiller.2.1.1_27.12.2009_14.17.04_log.txt which is based on the program version # and date and time run.
  • Paste the log to your next reply, DO NOT ATTACH IT.





0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users