Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Infected with Maleware


  • Please log in to reply
5 replies to this topic

#1 WhightKnight

WhightKnight

  • Members
  • 54 posts
  • OFFLINE
  •  
  • Local time:10:29 AM

Posted 22 November 2013 - 07:24 PM

A program was recently downloaded on my computer and I believe that somehow maleware was simultaneously installed.

Issues include:

-slowed internet speeds

-popups

-redirected links

 

Any help would be greatly appriciated.

 

Thanks



BC AdBot (Login to Remove)

 


#2 Broni

Broni

    The Coolest BC Computer


  • BC Advisor
  • 42,758 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Daly City, CA
  • Local time:07:29 AM

Posted 22 November 2013 - 09:15 PM

You abandoned this topic in the past: http://www.bleepingcomputer.com/forums/t/495010/appcrash-errors-possibly-infected/

If it happens again I doubt you'll find anyone willing to help you out.

 

p22002970.gif Download Security Check from here or here and save it to your Desktop.

  • Double-click SecurityCheck.exe
  • Follow the onscreen instructions inside of the black box.
  • A Notepad document should open automatically called checkup.txt; please post the contents of that document.

NOTE 1. If one of your security applications (e.g., third-party firewall) requests permission to allow DIG.EXE access the Internet, allow it to do so.
NOTE 2 SecurityCheck may produce some false warning(s), so leave the results reading to me.

p22002970.gif Please download Farbar Service Scanner (FSS) and run it on the computer with the issue.
  • Make sure the following options are checked:
    • Internet Services
    • Windows Firewall
    • System Restore
    • Security Center/Action Center
    • Windows Update
    • Windows Defender
    • Other Services
  • Press "Scan".
  • It will create a log (FSS.txt) in the same directory the tool is run.
  • Please copy and paste the log to your reply.


p22002970.gif Please download MiniToolBox and run it.

Checkmark following boxes:
  • Report IE Proxy Settings
  • Report FF Proxy Settings
  • List content of Hosts
  • List IP configuration
  • List Winsock Entries
  • List last 10 Event Viewer log
  • List Installed Programs
  • List Devices (do NOT change any settings here)
  • List Users, Partitions and Memory size

Click Go and post the result.

p22002970.gif Download Malwarebytes' Anti-Malware (aka MBAM): https://www.bleepingcomputer.com/download/malwarebytes-anti-malware/ to your desktop.

* Double-click mbam-setup.exe and follow the prompts to install the program.
* At the end, be sure a checkmark is placed next to Update Malwarebytes' Anti-Malware and Launch Malwarebytes' Anti-Malware, then click Finish.
* If an update is found, it will download and install the latest version.
* Once the program has loaded, select Perform quick scan, then click Scan.
* When the scan is complete, click OK, then Show Results to view the results.
* Be sure that everything is checked, and click Remove Selected.
* When completed, a log will open in Notepad.
* Post the log back here.

Be sure to restart the computer.

The log can also be found here:
C:\Documents and Settings\Username\Application Data\Malwarebytes\Malwarebytes' Anti-Malware\Logs\log-date.txt
Or at C:\Program Files\Malwarebytes' Anti-Malware\Logs\log-date.txt

p22002970.gifDownload Malwarebytes Anti-Rootkit from HERE to your Desktop.
  • Unzip downloaded file.
  • Open the folder where the contents were unzipped and run mbar.exe
  • Follow the instructions in the wizard to update and allow the program to scan your computer for threats.
  • DO NOT click on the Cleanup button. Simply exit the program.
  • When done, please post the two logs produced they will be in the MBAR folder..... mbar-log-xxxxx.txt and system-log.txt


p22002970.gif Please download Rkill (courtesy of BleepingComputer.com) to your desktop.
There are 2 different versions. If one of them won't run then download and try to run the other one.
You only need to get one of these to run, not all of them. You may get warnings from your antivirus about this tool, ignore them or shutdown your antivirus.

rKill.exe: http://www.bleepingcomputer.com/download/rkill/dl/10/
iExplore.exe (renamed rKill.exe): http://www.bleepingcomputer.com/download/rkill/dl/11/

  • Double-click on the Rkill desktop icon to run the tool.
  • If using Vista or Windows 7 right-click on it and choose Run As Administrator.
  • A black DOS box will briefly flash and then disappear. This is normal and indicates the tool ran successfully.
  • If not, delete the file, then download and use the one provided in Link 2.
  • Do not reboot until instructed.
  • If the tool does not run from any of the links provided, please let me know.


If normal mode still doesn't work, run the tool from safe mode.

When the scan is done Notepad will open with rKill log.
Post it in your next reply.

NOTE. rKill.txt log will also be present on your desktop.

NOTE Do NOT wrap your logs in "quote" or "code" brackets.


My Website

My help doesn't cost a penny, but if you'd like to consider a donation, click DONATE

 


#3 WhightKnight

WhightKnight
  • Topic Starter

  • Members
  • 54 posts
  • OFFLINE
  •  
  • Local time:10:29 AM

Posted 23 November 2013 - 05:37 PM

Security Check didn't work. The following error popup displayed:
"The procedure entry point MigrateWinsockConfiguration could not be located in the dynamic link library MSWSOCK.dll."

 

Farbar also had that error, in addition to this error, but was still able to produce a log:

Error: The ordinal 1108 could not be located in the dynamic link library WSOCK32.dll.

 

Log:

Farbar Service Scanner Version: 23-11-2013
Ran by Administrator (administrator) on 23-11-2013 at 13:51:29
Running from "C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\I7KHJGYY"
Microsoft Windows XP Professional Service Pack 3 (X86)
Boot Mode: Normal
****************************************************************

Internet Services:
============

Connection Status:
==============
Localhost is accessible.
LAN connected.
Google IP is accessible.
Google.com is accessible.
Yahoo.com is accessible.

Windows Firewall:
=============
sharedaccess Service is not running. Checking service configuration:
Checking Start type: ATTENTION!=====> Unable to retrieve start type of sharedaccess. The value does not exist.
Checking ImagePath: ATTENTION!=====> Unable to retrieve ImagePath of sharedaccess. The value does not exist.
Checking ServiceDll: ATTENTION!=====> Unable to open sharedaccess registry key. The service key does not exist.
Checking LEGACY_sharedaccess: ATTENTION!=====> Unable to open LEGACY_sharedaccess\0000 registry key. The key does not exist.

Firewall Disabled Policy:
==================
"HKLM\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile" registry key does not exist.

System Restore:
============

System Restore Disabled Policy:
========================

Security Center:
============

wscsvc Service is not running. Checking service configuration:
Checking Start type: ATTENTION!=====> Unable to open wscsvc registry key. The service key does not exist.
Checking ImagePath: ATTENTION!=====> Unable to open wscsvc registry key. The service key does not exist.
Checking ServiceDll: ATTENTION!=====> Unable to open wscsvc registry key. The service key does not exist.
Checking LEGACY_wscsvc: ATTENTION!=====> Unable to open LEGACY_wscsvc\0000 registry key. The key does not exist.

Windows Update:
============
wuauserv Service is not running. Checking service configuration:
Checking Start type: ATTENTION!=====> Unable to open wuauserv registry key. The service key does not exist.
Checking ImagePath: ATTENTION!=====> Unable to open wuauserv registry key. The service key does not exist.
Checking ServiceDll: ATTENTION!=====> Unable to open wuauserv registry key. The service key does not exist.
Checking LEGACY_wuauserv: ATTENTION!=====> Unable to open LEGACY_wuauserv\0000 registry key. The key does not exist.

BITS Service is not running. Checking service configuration:
Checking Start type: ATTENTION!=====> Unable to open BITS registry key. The service key does not exist.
Checking ImagePath: ATTENTION!=====> Unable to open BITS registry key. The service key does not exist.
Checking ServiceDll: ATTENTION!=====> Unable to open BITS registry key. The service key does not exist.
Checking LEGACY_BITS: ATTENTION!=====> Unable to open LEGACY_BITS\0000 registry key. The key does not exist.

Windows Autoupdate Disabled Policy:
============================

Other Services:
==============
Checking Start type of SharedAccess: ATTENTION!=====> Unable to retrieve start type of SharedAccess. The value does not exist.
Checking ImagePath of SharedAccess: ATTENTION!=====> Unable to retrieve ImagePath of SharedAccess. The value does not exist.
Checking ServiceDll of SharedAccess: ATTENTION!=====> Unable to open SharedAccess registry key. The service key does not exist.
Checking Start type of PolicyAgent: ATTENTION!=====> Unable to open PolicyAgent registry key. The service key does not exist.
Checking ImagePath of PolicyAgent: ATTENTION!=====> Unable to open PolicyAgent registry key. The service key does not exist.
Checking Start type of RemoteAccess: ATTENTION!=====> Unable to open RemoteAccess registry key. The service key does not exist.
Checking ImagePath of RemoteAccess: ATTENTION!=====> Unable to open RemoteAccess registry key. The service key does not exist.
Checking ServiceDll of RemoteAccess: ATTENTION!=====> Unable to open RemoteAccess registry key. The service key does not exist.

File Check:
========
C:\WINDOWS\system32\dhcpcsvc.dll => MD5 is legit
C:\WINDOWS\system32\Drivers\afd.sys => MD5 is legit
C:\WINDOWS\system32\Drivers\netbt.sys => MD5 is legit
C:\WINDOWS\system32\Drivers\tcpip.sys => MD5 is legit
C:\WINDOWS\system32\Drivers\ipsec.sys => MD5 is legit
C:\WINDOWS\system32\dnsrslvr.dll => MD5 is legit
C:\WINDOWS\system32\ipnathlp.dll => MD5 is legit
C:\WINDOWS\system32\netman.dll => MD5 is legit
C:\WINDOWS\system32\wbem\WMIsvc.dll => MD5 is legit
C:\WINDOWS\system32\srsvc.dll => MD5 is legit
C:\WINDOWS\system32\Drivers\sr.sys => MD5 is legit
C:\WINDOWS\system32\wscsvc.dll => MD5 is legit
C:\WINDOWS\system32\wbem\WMIsvc.dll => MD5 is legit
C:\WINDOWS\system32\wuauserv.dll
[2010-04-14 08:58] - [2007-09-13 18:17] - 0025944 ____A (Microsoft Corporation) 365980DA5B43B397542429B0743E6226

C:\WINDOWS\system32\qmgr.dll => MD5 is legit
C:\WINDOWS\system32\es.dll => MD5 is legit
C:\WINDOWS\system32\cryptsvc.dll => MD5 is legit
C:\WINDOWS\system32\svchost.exe => MD5 is legit
C:\WINDOWS\system32\rpcss.dll => MD5 is legit
C:\WINDOWS\system32\services.exe => MD5 is legit

Extra List:
=======
Gpc(6) IPSec(4) NetBT(5) PSched(7) Tcpip(3)
0x0700000004000000010000000200000003000000050000000600000007000000
IpSec Tag value is correct.

**** End of log ****

 

MiniToolBox by Farbar  Version: 13-07-2013
Ran by Administrator (administrator) on 23-11-2013 at 15:03:23
Running from "C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\I7KHJGYY"
Microsoft Windows XP Professional Service Pack 3 (X86)
Boot Mode: Normal
***************************************************************************

========================= IE Proxy Settings: ==============================

Proxy is not enabled.
No Proxy Server is set.

========================= FF Proxy Settings: ==============================

========================= Hosts content: =================================

127.0.0.1       localhost

========================= IP Configuration: ================================

Broadcom NetLink ™ Gigabit Ethernet = Local Area Connection (Connected)
1394 Net Adapter = 1394 Connection (Connected)
Intel® PRO/Wireless 3945ABG Network Connection = Wireless Network Connection (Media disconnected)
The following helper DLL cannot be loaded: IFMON.DLL.
The following command was not found: int ip dump.

Windows IP Configuration

        Host Name . . . . . . . . . . . . : universi-d50536

        Primary Dns Suffix  . . . . . . . :

        Node Type . . . . . . . . . . . . : Hybrid

        IP Routing Enabled. . . . . . . . : No

        WINS Proxy Enabled. . . . . . . . : No

Ethernet adapter Wireless Network Connection:

        Media State . . . . . . . . . . . : Media disconnected

        Description . . . . . . . . . . . : Intel® PRO/Wireless 3945ABG Network Connection

        Physical Address. . . . . . . . . : 00-1B-77-CB-5C-5F

Ethernet adapter Local Area Connection:

        Connection-specific DNS Suffix  . :

        Description . . . . . . . . . . . : Broadcom NetLink ™ Gigabit Ethernet

        Physical Address. . . . . . . . . : 00-15-60-C9-B0-FB

        Dhcp Enabled. . . . . . . . . . . : Yes

        Autoconfiguration Enabled . . . . : Yes

        IP Address. . . . . . . . . . . . : 192.168.1.12

        Subnet Mask . . . . . . . . . . . : 255.255.255.0

        Default Gateway . . . . . . . . . : 192.168.1.1

        DHCP Server . . . . . . . . . . . : 192.168.1.1

        DNS Servers . . . . . . . . . . . : 192.168.1.1

        Lease Obtained. . . . . . . . . . : Saturday, November 23, 2013 2:58:57 PM

        Lease Expires . . . . . . . . . . : Sunday, November 24, 2013 2:58:57 PM

Pinging google.com [74.125.21.138] with 32 bytes of data:

Reply from 74.125.21.138: bytes=32 time=37ms TTL=43

Reply from 74.125.21.138: bytes=32 time=36ms TTL=43

Ping statistics for 74.125.21.138:

    Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),

Approximate round trip times in milli-seconds:

    Minimum = 36ms, Maximum = 37ms, Average = 36ms

Pinging yahoo.com [98.138.253.109] with 32 bytes of data:

Reply from 98.138.253.109: bytes=32 time=121ms TTL=47

Reply from 98.138.253.109: bytes=32 time=114ms TTL=47

Ping statistics for 98.138.253.109:

    Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),

Approximate round trip times in milli-seconds:

    Minimum = 114ms, Maximum = 121ms, Average = 117ms

Pinging 127.0.0.1 with 32 bytes of data:

Reply from 127.0.0.1: bytes=32 time<1ms TTL=64

Reply from 127.0.0.1: bytes=32 time<1ms TTL=64

Ping statistics for 127.0.0.1:

    Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),

Approximate round trip times in milli-seconds:

    Minimum = 0ms, Maximum = 0ms, Average = 0ms

===========================================================================
Interface List
0x1 ........................... MS TCP Loopback interface
0x3 ...00 1b 77 cb 5c 5f ...... Intel® PRO/Wireless 3945ABG Network Connection - Packet Scheduler Miniport
0x30002 ...00 15 60 c9 b0 fb ...... Broadcom NetLink ™ Gigabit Ethernet - Packet Scheduler Miniport
===========================================================================
===========================================================================
Active Routes:
Network Destination        Netmask          Gateway       Interface  Metric
          0.0.0.0          0.0.0.0      192.168.1.1    192.168.1.12   20
        127.0.0.0        255.0.0.0        127.0.0.1       127.0.0.1   1
      192.168.1.0    255.255.255.0     192.168.1.12    192.168.1.12   20
     192.168.1.12  255.255.255.255        127.0.0.1       127.0.0.1   20
    192.168.1.255  255.255.255.255     192.168.1.12    192.168.1.12   20
        224.0.0.0        240.0.0.0     192.168.1.12    192.168.1.12   20
  255.255.255.255  255.255.255.255     192.168.1.12    192.168.1.12   1
  255.255.255.255  255.255.255.255     192.168.1.12               3   1
Default Gateway:       192.168.1.1
===========================================================================
Persistent Routes:
  None
========================= Winsock entries =====================================

Catalog5 01 mswsock.dll [File Not found] (Microsoft Corporation)
ATTENTION: The LibraryPath should be "%SystemRoot%\System32\mswsock.dll"

Catalog5 02 C:\WINDOWS\system32\winrnr.dll [16896] (Microsoft Corporation)
Catalog5 03 mswsock.dll [File Not found] (Microsoft Corporation)
ATTENTION: The LibraryPath should be "%SystemRoot%\System32\mswsock.dll"

Catalog9 01 mswsock.dll [File not found] (Microsoft Corporation)
Catalog9 02 mswsock.dll [File not found] (Microsoft Corporation)
Catalog9 03 mswsock.dll [File not found] (Microsoft Corporation)
Catalog9 04 mswsock.dll [File not found] (Microsoft Corporation)
Catalog9 05 mswsock.dll [File not found] (Microsoft Corporation)
Catalog9 06 mswsock.dll [File not found] (Microsoft Corporation)
Catalog9 07 mswsock.dll [File not found] (Microsoft Corporation)
Catalog9 08 mswsock.dll [File not found] (Microsoft Corporation)
Catalog9 09 mswsock.dll [File not found] (Microsoft Corporation)
Catalog9 10 mswsock.dll [File not found] (Microsoft Corporation)
Catalog9 11 mswsock.dll [File not found] (Microsoft Corporation)
Catalog9 12 mswsock.dll [File not found] (Microsoft Corporation)
Catalog9 13 mswsock.dll [File not found] (Microsoft Corporation)
Catalog9 14 mswsock.dll [File not found] (Microsoft Corporation)
Catalog9 15 mswsock.dll [File not found] (Microsoft Corporation)
Catalog9 16 mswsock.dll [File not found] (Microsoft Corporation)
Catalog9 17 mswsock.dll [File not found] (Microsoft Corporation)
Catalog9 18 mswsock.dll [File not found] (Microsoft Corporation)
Catalog9 19 mswsock.dll [File not found] (Microsoft Corporation)

========================= Event log errors: ===============================

Application errors:
==================
Error: (11/04/2013 04:55:45 PM) (Source: CltMngSvc) (User: )
Description: CltMngSvcShutting down. (Error: 997)

Error: (10/30/2013 09:47:12 AM) (Source: .NET Runtime) (User: )
Description: Application: TWCApp.exe
Framework Version: v4.0.30319
Description: The process was terminated due to an unhandled exception.
Exception Info: System.NullReferenceException
Stack:
   at MS.Internal.Threading.ExceptionFilterHelper.TryCatchWhen(System.Object, System.Delegate, System.Object, Int32, System.Delegate)
   at System.Windows.Threading.Dispatcher.InvokeImpl(System.Windows.Threading.DispatcherPriority, System.TimeSpan, System.Delegate, System.Object, Int32)
   at MS.Win32.HwndSubclass.SubclassWndProc(IntPtr, Int32, IntPtr, IntPtr)
   at MS.Win32.UnsafeNativeMethods.CallWindowProc(IntPtr, IntPtr, Int32, IntPtr, IntPtr)
   at MS.Win32.HwndSubclass.DefWndProcWrapper(IntPtr, Int32, IntPtr, IntPtr)
   at MS.Win32.UnsafeNativeMethods.CallWindowProc(IntPtr, IntPtr, Int32, IntPtr, IntPtr)
   at MS.Win32.HwndSubclass.SubclassWndProc(IntPtr, Int32, IntPtr, IntPtr)
   at MS.Win32.UnsafeNativeMethods.CallWindowProc(IntPtr, IntPtr, Int32, IntPtr, IntPtr)
   at MS.Win32.HwndSubclass.DefWndProcWrapper(IntPtr, Int32, IntPtr, IntPtr)
   at MS.Win32.UnsafeNativeMethods.CallWindowProc(IntPtr, IntPtr, Int32, IntPtr, IntPtr)
   at MS.Win32.HwndSubclass.SubclassWndProc(IntPtr, Int32, IntPtr, IntPtr)
   at MS.Win32.UnsafeNativeMethods.DispatchMessage(System.Windows.Interop.MSG ByRef)
   at System.Windows.Threading.Dispatcher.PushFrameImpl(System.Windows.Threading.DispatcherFrame)
   at System.Windows.Threading.Dispatcher.PushFrame(System.Windows.Threading.DispatcherFrame)
   at System.Windows.Application.RunDispatcher(System.Object)
   at System.Windows.Application.RunInternal(System.Windows.Window)
   at System.Windows.Application.Run(System.Windows.Window)
   at DW.UI.App.Main()

Error: (10/29/2013 10:06:53 PM) (Source: Application Error) (User: )
Description: Faulting application iexplore.exe, version 8.0.6001.18702, faulting module mshtml.dll, version 8.0.6001.23532, fault address 0x00156186.
Processing media-specific event for [iexplore.exe!ws!]

Error: (10/26/2013 09:07:10 PM) (Source: Application Error) (User: )
Description: Faulting application iexplore.exe, version 8.0.6001.18702, faulting module mshtml.dll, version 8.0.6001.23532, fault address 0x000b99bc.
Processing media-specific event for [iexplore.exe!ws!]

Error: (06/22/2013 11:16:34 PM) (Source: Application Error) (User: )
Description: Faulting application Skype.exe, version 6.5.0.158, faulting module unknown, version 0.0.0.0, fault address 0x00000200.
Processing media-specific event for [Skype.exe!ws!]

Error: (06/16/2013 08:22:02 AM) (Source: Application Error) (User: )
Description: Faulting application iexplore.exe, version 8.0.6001.18702, faulting module kernel32.dll, version 5.1.2600.6293, fault address 0x00012fd3.
Processing media-specific event for [iexplore.exe!ws!]

Error: (06/16/2013 08:11:13 AM) (Source: Application Error) (User: )
Description: Faulting application iexplore.exe, version 8.0.6001.18702, faulting module mshtml.dll, version 8.0.6001.23501, fault address 0x002b96c0.
Processing media-specific event for [iexplore.exe!ws!]

Error: (06/14/2013 06:07:30 AM) (Source: Application Error) (User: )
Description: Faulting application iexplore.exe, version 8.0.6001.18702, faulting module kernel32.dll, version 5.1.2600.6293, fault address 0x00012fd3.
Processing media-specific event for [iexplore.exe!ws!]

Error: (06/14/2013 05:21:49 AM) (Source: Application Error) (User: )
Description: Faulting application iexplore.exe, version 8.0.6001.18702, faulting module mshtml.dll, version 8.0.6001.23501, fault address 0x002b96c0.
Processing media-specific event for [iexplore.exe!ws!]

Error: (06/13/2013 10:24:40 PM) (Source: crypt32) (User: )
Description: Failed extract of third-party root list from auto update cab at: <http://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab> with error: A required certificate is not within its validity period when verifying against the current system clock or the timestamp in the signed file.

System errors:
=============
Error: (11/23/2013 01:54:30 PM) (Source: Service Control Manager) (User: )
Description: The Skype C2C Service service terminated unexpectedly.  It has done this 1 time(s).

Error: (11/23/2013 01:39:54 PM) (Source: W32Time) (User: )
Description: The time provider NtpClient is configured to acquire time from one or more
time sources, however none of the sources are currently accessible.
No attempt to contact a source will be made for 15 minutes.
NtpClient has no source of accurate time.

Error: (11/23/2013 01:39:54 PM) (Source: W32Time) (User: )
Description: Time Provider NtpClient: An error occurred during DNS lookup of the manually
configured peer 'time.windows.com,0x1'. NtpClient will try the DNS lookup again in 15
minutes.
The error was: A socket operation was attempted to an unreachable host. (0x80072751)

Error: (11/23/2013 01:39:54 PM) (Source: W32Time) (User: )
Description: The time provider NtpClient is configured to acquire time from one or more
time sources, however none of the sources are currently accessible.
No attempt to contact a source will be made for 14 minutes.
NtpClient has no source of accurate time.

Error: (11/23/2013 01:39:54 PM) (Source: W32Time) (User: )
Description: Time Provider NtpClient: An error occurred during DNS lookup of the manually
configured peer 'time.windows.com,0x1'. NtpClient will try the DNS lookup again in 15
minutes.
The error was: A socket operation was attempted to an unreachable host. (0x80072751)

Error: (11/22/2013 06:20:50 PM) (Source: Service Control Manager) (User: )
Description: The Computer Browser service terminated with the following error:
%%1060

Error: (11/22/2013 06:20:50 PM) (Source: Service Control Manager) (User: )
Description: The Microsoft Antimalware Service service failed to start due to the following error:
%%1920

Error: (11/22/2013 05:32:48 PM) (Source: Service Control Manager) (User: )
Description: The Process Monitor service terminated unexpectedly.  It has done this 1 time(s).

Error: (11/22/2013 05:32:43 PM) (Source: Service Control Manager) (User: )
Description: The Skype C2C Service service terminated unexpectedly.  It has done this 1 time(s).

Error: (11/22/2013 05:32:41 PM) (Source: Service Control Manager) (User: )
Description: The Agere Modem Call Progress Audio service terminated unexpectedly.  It has done this 1 time(s).

Microsoft Office Sessions:
=========================

=========================== Installed Programs ============================

Adobe Acrobat XI Pro (Version: 11.0.05)
Adobe AIR (Version: 2.7.0.19480)
Adobe Download Assistant (Version: 1.2.3)
Adobe Flash Player 10 Plugin (Version: 10.3.181.26)
Adobe Flash Player 11 ActiveX (Version: 11.1.102.55)
Adobe Reader XI (11.0.02) (Version: 11.0.02)
CameraHelperMsi (Version: 13.00.1774.0)
CCleaner (Version: 3.26)
Coupon Printer for Windows (Version: 5.0.0.2)
Download Updater (AOL Inc.)
erLT (Version: 1.20.138.34)
ESET Online Scanner v3
Google Talk Plugin (Version: 4.9.1.16010)
Google Update Helper (Version: 1.3.21.165)
GoZone iSync (Version: 2.0.1)
Intel® Graphics Media Accelerator Driver
Itibiti RTC (Version: 0.0.1)
Logitech Vid HD (Version: 7.2 (7240))
Logitech Webcam Software (Version: 2.0)
LWS Facebook (Version: 13.00.1777.0)
LWS Gallery (Version: 13.00.1778.0)
LWS Help_main (Version: 13.00.1783.0)
LWS Launcher (Version: 13.00.1776.0)
LWS Motion Detection (Version: 13.00.1778.0)
LWS Pictures And Video (Version: 13.00.1778.0)
LWS Video Mask Maker (Version: 13.00.1774.0)
LWS VideoEffects (Version: 13.00.1774.0)
LWS Webcam Software (Version: 13.00.1774.0)
LWS WLM Plugin (Version: 1.00.1774.0)
LWS YouTube Plugin (Version: 13.00.1777.0)
Microsoft .NET Framework 1.1 Security Update (KB2698023)
Microsoft .NET Framework 1.1 Security Update (KB2833941)
Microsoft .NET Framework 1.1 Security Update (KB979906)
Microsoft .NET Framework 1.1 SP1 with KB886903 Hotfix (Version: 1.1.4322)
Microsoft .NET Framework 2.0 Service Pack 2 (Version: 2.2.30729)
Microsoft .NET Framework 3.0 Service Pack 2 (Version: 3.2.30729)
Microsoft .NET Framework 3.5 SP1
Microsoft .NET Framework 3.5 SP1 (Version: 3.5.30729)
Microsoft .NET Framework 4 Client Profile (Version: 4.0.30319)
Microsoft Application Error Reporting (Version: 12.0.6012.5000)
Microsoft Compression Client Pack 1.0 for Windows XP (Version: 1)
Microsoft Office 2007 Service Pack 3 (SP3)
Microsoft Office Access MUI (English) 2007 (Version: 12.0.6612.1000)
Microsoft Office Access Setup Metadata MUI (English) 2007 (Version: 12.0.6612.1000)
Microsoft Office Enterprise 2007 (Version: 12.0.6612.1000)
Microsoft Office Excel MUI (English) 2007 (Version: 12.0.6612.1000)
Microsoft Office File Validation Add-In (Version: 14.0.5130.5003)
Microsoft Office Groove MUI (English) 2007 (Version: 12.0.6612.1000)
Microsoft Office Groove Setup Metadata MUI (English) 2007 (Version: 12.0.6612.1000)
Microsoft Office InfoPath MUI (English) 2007 (Version: 12.0.6612.1000)
Microsoft Office OneNote MUI (English) 2007 (Version: 12.0.6612.1000)
Microsoft Office Outlook MUI (English) 2007 (Version: 12.0.6612.1000)
Microsoft Office PowerPoint MUI (English) 2007 (Version: 12.0.6612.1000)
Microsoft Office Proof (English) 2007 (Version: 12.0.6612.1000)
Microsoft Office Proof (French) 2007 (Version: 12.0.6612.1000)
Microsoft Office Proof (Spanish) 2007 (Version: 12.0.6612.1000)
Microsoft Office Proofing (English) 2007 (Version: 12.0.4518.1014)
Microsoft Office Proofing Tools 2007 Service Pack 3 (SP3)
Microsoft Office Publisher MUI (English) 2007 (Version: 12.0.6612.1000)
Microsoft Office Shared MUI (English) 2007 (Version: 12.0.6612.1000)
Microsoft Office Shared Setup Metadata MUI (English) 2007 (Version: 12.0.6612.1000)
Microsoft Office Word MUI (English) 2007 (Version: 12.0.6612.1000)
Microsoft Security Client (Version: 4.3.0219.0)
Microsoft Silverlight (Version: 5.1.20913.0)
Microsoft Software Update for Web Folders  (English) 12 (Version: 12.0.6612.1000)
Microsoft User-Mode Driver Framework Feature Pack 1.0
Microsoft VC9 runtime libraries (Version: 2.0.0)
Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729.17 (Version: 9.0.30729)
Mozilla Firefox 22.0 (x86 en-GB) (Version: 22.0)
Mozilla Maintenance Service (Version: 22.0)
MSXML 4.0 SP2 (KB936181) (Version: 4.20.9848.0)
MSXML 4.0 SP2 (KB954430) (Version: 4.20.9870.0)
MSXML 4.0 SP2 (KB973688) (Version: 4.20.9876.0)
MSXML 6 Service Pack 2 (KB973686) (Version: 6.20.2003.0)
OGA Notifier 2.0.0048.0 (Version: 2.0.0048.0)
Real Alternative 1.8.4 Lite (Version: 1.8.4)
Skype Click to Call (Version: 6.12.13601)
Skype™ 6.10 (Version: 6.10.104)
Software Update for Web Folders (Version: 9.60.6715.0)
Synaptics Pointing Device Driver (Version: 10.0.13.2)
Update for 2007 Microsoft Office System (KB967642)
Update for Microsoft .NET Framework 3.5 SP1 (KB963707) (Version: 1)
Update for Microsoft Office 2007 suites (KB2596620) 32-Bit Edition
Update for Microsoft Office 2007 suites (KB2767849) 32-Bit Edition
Update for Microsoft Office 2007 suites (KB2767916) 32-Bit Edition
Update for Microsoft Office Outlook 2007 (KB2687404) 32-Bit Edition
Update for Microsoft Office Outlook 2007 Junk Email Filter (KB2827325) 32-Bit Edition
Update for Windows Internet Explorer 7 (KB980182) (Version: 1)
Update for Windows Internet Explorer 8 (KB2598845) (Version: 1)
VLC media player 1.1.10 (Version: 1.1.10)
VoiceOver Kit (Version: 1.40.128.0)
Windows Genuine Advantage Notifications (KB905474) (Version: 1.9.0040.0)
Windows Genuine Advantage Validation Tool (KB892130)
Windows Genuine Advantage Validation Tool (KB892130) (Version: 1.7.0069.2)
Windows Internet Explorer 8 (Version: 20090308.140743)
Windows Management Framework Core
Windows Media Format 11 runtime
Windows Media Player 11
Windows Rights Management Client Backwards Compatibility SP2 (Version: 5.2.95)
Windows Rights Management Client with Service Pack 2 (Version: 5.2.95)
Windows XP Service Pack 3 (Version: 20080414.031525)

========================= Memory info: ===================================

Percentage of memory in use: 82%
Total physical RAM: 1015.36 MB
Available physical RAM: 181.72 MB
Total Pagefile: 2441.47 MB
Available Pagefile: 1816.39 MB
Total Virtual: 2047.88 MB
Available Virtual: 1970.08 MB

========================= Partitions: =====================================

1 Drive c: () (Fixed) (Total:74.52 GB) (Free:48.08 GB) NTFS

========================= Users: ========================================

User accounts for \\UNIVERSI-D50536

Administrator            ASPNET                   Guest                  
HelpAssistant            SUPPORT_388945a0       

**** End of log ****

 

 

Malwarebytes Anti-Malware (Trial) 1.75.0.1300
www.malwarebytes.org

Database version: v2013.11.23.08

Windows XP Service Pack 3 x86 NTFS
Internet Explorer 8.0.6001.18702
Administrator :: UNIVERSI-D50536 [administrator]

Protection: Enabled

11/23/2013 4:01:12 PM
mbam-log-2013-11-23 (16-01-12).txt

Scan type: Quick scan
Scan options enabled: Memory | Startup | Registry | File System | Heuristics/Extra | Heuristics/Shuriken | PUP | PUM
Scan options disabled: P2P
Objects scanned: 217274
Time elapsed: 15 minute(s), 58 second(s)

Memory Processes Detected: 5
C:\Program Files\BasicServe\basicstarter.exe (Adware.Korad) -> 3540 -> Delete on reboot.
C:\Program Files\BasicServe\basicstarter.exe (Adware.Korad) -> 1712 -> Delete on reboot.
C:\Program Files\Browsebeyond\updateBrowsebeyond.exe (PUP.Optional.Sambreel) -> 2704 -> Delete on reboot.
C:\Program Files\BasicServe\basicstarter.exe (PUP.Zwangi) -> 3540 -> Delete on reboot.
C:\Program Files\BasicServe\basicstarter.exe (PUP.Zwangi) -> 1712 -> Delete on reboot.

Memory Modules Detected: 2
C:\Program Files\BasicServe\basicserve.dll (PUP.Zwangi) -> Delete on reboot.
C:\Program Files\Browsebeyond\BrowsebeyondBHO.dll (PUP.Optional.Sambreel) -> Delete on reboot.

Registry Keys Detected: 22
HKLM\SYSTEM\CurrentControlSet\Services\BasicServe Service (Adware.Korad) -> Quarantined and deleted successfully.
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\GOOGLEUPDATE.EXE (Trojan.Agent) -> Quarantined and deleted successfully.
HKLM\SYSTEM\CurrentControlSet\Services\etadpug (Trojan.Agent) -> Delete on reboot.
HKCR\CLSID\{4AA46D49-459F-4358-B4D1-169048547C23} (PUP.Optional.BrowseFox.A) -> Quarantined and deleted successfully.
HKCU\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{47AE1BA9-0BD1-44F4-88AE-45F8F7B605EF} (PUP.Zwangi) -> Quarantined and deleted successfully.
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Settings\{74322BF9-DF26-493F-B0DA-6D2FC5E6429E} (PUP.Optional.BearshareTB.A) -> Quarantined and deleted successfully.
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{74322BF9-DF26-493F-B0DA-6D2FC5E6429E} (PUP.Optional.BearshareTB.A) -> Quarantined and deleted successfully.
HKCR\CLSID\{f04a89fa-d7e3-4fbd-9569-502b4cad4347} (PUP.Optional.Sambreel) -> Quarantined and deleted successfully.
HKCR\TypeLib\{81e4892a-7e59-408c-ad31-a913e05ab8a3} (PUP.Optional.Sambreel) -> Quarantined and deleted successfully.
HKCR\Interface\{39A85641-67C3-40B7-AE1F-F3D034B167A9} (PUP.Optional.Sambreel) -> Quarantined and deleted successfully.
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{F04A89FA-D7E3-4FBD-9569-502B4CAD4347} (PUP.Optional.Sambreel) -> Quarantined and deleted successfully.
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{F04A89FA-D7E3-4FBD-9569-502B4CAD4347} (PUP.Optional.Sambreel) -> Quarantined and deleted successfully.
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Browsebeyond (PUP.Optional.Sambreel) -> Quarantined and deleted successfully.
HKLM\SYSTEM\CurrentControlSet\Services\Update Browsebeyond (PUP.Optional.Sambreel) -> Quarantined and deleted successfully.
HKCU\Software\ConduitSearchScopes (PUP.Optional.Conduit.A) -> Quarantined and deleted successfully.
HKCU\Software\Datamngr (PUP.Optional.DataMngr.A) -> Quarantined and deleted successfully.
HKCU\Software\PriceGong (PUP.Optional.PriceGong.A) -> Quarantined and deleted successfully.
HKLM\SOFTWARE\BASICSERVE (PUP.Zwangi) -> Quarantined and deleted successfully.
HKLM\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\BASICSERVE (PUP.Zwangi) -> Quarantined and deleted successfully.
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_*202EETADPUG (Rootkit.0Access) -> Quarantined and deleted successfully.
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_BASICSERVE_SERVICE (PUP.Zwangi) -> Quarantined and deleted successfully.
HKLM\SYSTEM\CurrentControlSet\Services\BasicServe Service (PUP.Zwangi) -> Quarantined and deleted successfully.

Registry Values Detected: 3
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run|Google Update (Trojan.Agent) -> Data: "C:\Documents and Settings\Administrator\Local Settings\Application Data\Google\Update\GoogleUpdate.exe" /c -> Quarantined and deleted successfully.
HKLM\SOFTWARE\BasicServe|DllPath (PUP.Zwangi) -> Data: C:\Program Files\BasicServe\basicserve.dll -> Quarantined and deleted successfully.
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\BasicServe|DisplayName (PUP.Zwangi) -> Data: BasicServe 1.0 build 118 -> Quarantined and deleted successfully.

Registry Data Items Detected: 0
(No malicious items detected)

Folders Detected: 10
C:\Program Files\Browsebeyond (PUP.Optional.Sambreel) -> Delete on reboot.
C:\Documents and Settings\Administrator\Application Data\PriceGong (PUP.Optional.PriceGong.A) -> Quarantined and deleted successfully.
C:\Documents and Settings\Administrator\Application Data\PriceGong\Data (PUP.Optional.PriceGong.A) -> Quarantined and deleted successfully.
C:\Program Files\24x7Help (PUP.Optional.24x7.A) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Application Data\Conduit\IE (PUP.Optional.Conduit.A) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Application Data\Conduit\IE\CT3295941 (PUP.Optional.Conduit.A) -> Quarantined and deleted successfully.
C:\Program Files\Mozilla Firefox\browser\extensions\{740B3FD5-4483-469D-BE7F-8555B153BD04} (PUP.Optional.Zwangi.A) -> Quarantined and deleted successfully.
C:\Program Files\Mozilla Firefox\browser\extensions\{740B3FD5-4483-469D-BE7F-8555B153BD04}\chrome (PUP.Optional.Zwangi.A) -> Quarantined and deleted successfully.
C:\Program Files\Mozilla Firefox\browser\extensions\{740B3FD5-4483-469D-BE7F-8555B153BD04}\defaults (PUP.Optional.Zwangi.A) -> Quarantined and deleted successfully.
C:\Program Files\Mozilla Firefox\browser\extensions\{740B3FD5-4483-469D-BE7F-8555B153BD04}\defaults\preferences (PUP.Optional.Zwangi.A) -> Quarantined and deleted successfully.

Files Detected: 57
C:\Program Files\BasicServe\basicstarter.exe (Adware.Korad) -> Delete on reboot.
C:\Documents and Settings\Administrator\Local Settings\Application Data\Google\Desktop\Install\{2171273f-4015-e22d-0c9e-883c36136e3a}\❤≸⋙\Ⱒ☠⍨\ﯹ๛\{2171273f-4015-e22d-0c9e-883c36136e3a}\GoogleUpdate.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Administrator\Local Settings\Application Data\Google\Update\GoogleUpdate.exe (Trojan.Agent) -> Quarantined and deleted successfully.
c:\program files\google\desktop\install\{2171273f-4015-e22d-0c9e-883c36136e3a}\   \   \ﯹ๛\{2171273f-4015-e22d-0c9e-883c36136e3a}\googleupdate.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Application Data\BasicServe\basicserve118.exe (Adware.Korad) -> Quarantined and deleted successfully.
C:\Documents and Settings\Administrator\Local Settings\Temp\nsu66B.tmp\18.exe (Adware.Korad) -> Quarantined and deleted successfully.
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\4FRX81XJ\basicserve_bscsrvlink5[1].exe (Adware.Korad) -> Quarantined and deleted successfully.
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\RT1GMSP2\setup[1].exe (Adware.Linkular) -> Quarantined and deleted successfully.
C:\WINDOWS\assembly\GAC\Desktop.ini (Rootkit.0access) -> Delete on reboot.
C:\Documents and Settings\All Users\Application Data\BasicServe\basicserve118.exe (PUP.Zwangi) -> Quarantined and deleted successfully.
C:\Program Files\BasicServe\basicserve.dll (PUP.Zwangi) -> Delete on reboot.
C:\Documents and Settings\Administrator\Application Data\cglogs.dat (Malware.Trace) -> Quarantined and deleted successfully.
C:\Program Files\Browsebeyond\Browsebeyond.ico (PUP.Optional.Sambreel) -> Quarantined and deleted successfully.
C:\Program Files\Browsebeyond\BrowsebeyondBHO.dll (PUP.Optional.Sambreel) -> Quarantined and deleted successfully.
C:\Program Files\Browsebeyond\BrowsebeyondUninstall.exe (PUP.Optional.Sambreel) -> Quarantined and deleted successfully.
C:\Program Files\Browsebeyond\updateBrowsebeyond.exe (PUP.Optional.Sambreel) -> Delete on reboot.
C:\Program Files\Browsebeyond\updateBrowsebeyond.InstallState (PUP.Optional.Sambreel) -> Quarantined and deleted successfully.
C:\Program Files\BasicServe\basicstarter.exe (PUP.Zwangi) -> Delete on reboot.
C:\Documents and Settings\Administrator\Application Data\PriceGong\Data\1.txt (PUP.Optional.PriceGong.A) -> Quarantined and deleted successfully.
C:\Documents and Settings\Administrator\Application Data\PriceGong\Data\4436.txt (PUP.Optional.PriceGong.A) -> Quarantined and deleted successfully.
C:\Documents and Settings\Administrator\Application Data\PriceGong\Data\4489.txt (PUP.Optional.PriceGong.A) -> Quarantined and deleted successfully.
C:\Documents and Settings\Administrator\Application Data\PriceGong\Data\450.txt (PUP.Optional.PriceGong.A) -> Quarantined and deleted successfully.
C:\Documents and Settings\Administrator\Application Data\PriceGong\Data\67.txt (PUP.Optional.PriceGong.A) -> Quarantined and deleted successfully.
C:\Documents and Settings\Administrator\Application Data\PriceGong\Data\a.txt (PUP.Optional.PriceGong.A) -> Quarantined and deleted successfully.
C:\Documents and Settings\Administrator\Application Data\PriceGong\Data\b.txt (PUP.Optional.PriceGong.A) -> Quarantined and deleted successfully.
C:\Documents and Settings\Administrator\Application Data\PriceGong\Data\c.txt (PUP.Optional.PriceGong.A) -> Quarantined and deleted successfully.
C:\Documents and Settings\Administrator\Application Data\PriceGong\Data\d.txt (PUP.Optional.PriceGong.A) -> Quarantined and deleted successfully.
C:\Documents and Settings\Administrator\Application Data\PriceGong\Data\e.txt (PUP.Optional.PriceGong.A) -> Quarantined and deleted successfully.
C:\Documents and Settings\Administrator\Application Data\PriceGong\Data\f.txt (PUP.Optional.PriceGong.A) -> Quarantined and deleted successfully.
C:\Documents and Settings\Administrator\Application Data\PriceGong\Data\g.txt (PUP.Optional.PriceGong.A) -> Quarantined and deleted successfully.
C:\Documents and Settings\Administrator\Application Data\PriceGong\Data\h.txt (PUP.Optional.PriceGong.A) -> Quarantined and deleted successfully.
C:\Documents and Settings\Administrator\Application Data\PriceGong\Data\i.txt (PUP.Optional.PriceGong.A) -> Quarantined and deleted successfully.
C:\Documents and Settings\Administrator\Application Data\PriceGong\Data\j.txt (PUP.Optional.PriceGong.A) -> Quarantined and deleted successfully.
C:\Documents and Settings\Administrator\Application Data\PriceGong\Data\k.txt (PUP.Optional.PriceGong.A) -> Quarantined and deleted successfully.
C:\Documents and Settings\Administrator\Application Data\PriceGong\Data\l.txt (PUP.Optional.PriceGong.A) -> Quarantined and deleted successfully.
C:\Documents and Settings\Administrator\Application Data\PriceGong\Data\m.txt (PUP.Optional.PriceGong.A) -> Quarantined and deleted successfully.
C:\Documents and Settings\Administrator\Application Data\PriceGong\Data\mru.xml (PUP.Optional.PriceGong.A) -> Quarantined and deleted successfully.
C:\Documents and Settings\Administrator\Application Data\PriceGong\Data\n.txt (PUP.Optional.PriceGong.A) -> Quarantined and deleted successfully.
C:\Documents and Settings\Administrator\Application Data\PriceGong\Data\o.txt (PUP.Optional.PriceGong.A) -> Quarantined and deleted successfully.
C:\Documents and Settings\Administrator\Application Data\PriceGong\Data\p.txt (PUP.Optional.PriceGong.A) -> Quarantined and deleted successfully.
C:\Documents and Settings\Administrator\Application Data\PriceGong\Data\q.txt (PUP.Optional.PriceGong.A) -> Quarantined and deleted successfully.
C:\Documents and Settings\Administrator\Application Data\PriceGong\Data\r.txt (PUP.Optional.PriceGong.A) -> Quarantined and deleted successfully.
C:\Documents and Settings\Administrator\Application Data\PriceGong\Data\s.txt (PUP.Optional.PriceGong.A) -> Quarantined and deleted successfully.
C:\Documents and Settings\Administrator\Application Data\PriceGong\Data\t.txt (PUP.Optional.PriceGong.A) -> Quarantined and deleted successfully.
C:\Documents and Settings\Administrator\Application Data\PriceGong\Data\u.txt (PUP.Optional.PriceGong.A) -> Quarantined and deleted successfully.
C:\Documents and Settings\Administrator\Application Data\PriceGong\Data\v.txt (PUP.Optional.PriceGong.A) -> Quarantined and deleted successfully.
C:\Documents and Settings\Administrator\Application Data\PriceGong\Data\w.txt (PUP.Optional.PriceGong.A) -> Quarantined and deleted successfully.
C:\Documents and Settings\Administrator\Application Data\PriceGong\Data\wlu.txt (PUP.Optional.PriceGong.A) -> Quarantined and deleted successfully.
C:\Documents and Settings\Administrator\Application Data\PriceGong\Data\x.txt (PUP.Optional.PriceGong.A) -> Quarantined and deleted successfully.
C:\Documents and Settings\Administrator\Application Data\PriceGong\Data\y.txt (PUP.Optional.PriceGong.A) -> Quarantined and deleted successfully.
C:\Documents and Settings\Administrator\Application Data\PriceGong\Data\z.txt (PUP.Optional.PriceGong.A) -> Quarantined and deleted successfully.
C:\Program Files\24x7Help\24x7desk.dll (PUP.Optional.24x7.A) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Application Data\Conduit\IE\CT3295941\UninstallerUI.exe (PUP.Optional.Conduit.A) -> Quarantined and deleted successfully.
C:\Program Files\Mozilla Firefox\browser\extensions\{740B3FD5-4483-469D-BE7F-8555B153BD04}\chrome.manifest (PUP.Optional.Zwangi.A) -> Quarantined and deleted successfully.
C:\Program Files\Mozilla Firefox\browser\extensions\{740B3FD5-4483-469D-BE7F-8555B153BD04}\install.rdf (PUP.Optional.Zwangi.A) -> Quarantined and deleted successfully.
C:\Program Files\Mozilla Firefox\browser\extensions\{740B3FD5-4483-469D-BE7F-8555B153BD04}\chrome\basicserve.jar (PUP.Optional.Zwangi.A) -> Quarantined and deleted successfully.
C:\Program Files\Mozilla Firefox\browser\extensions\{740B3FD5-4483-469D-BE7F-8555B153BD04}\defaults\preferences\prefs.js (PUP.Optional.Zwangi.A) -> Quarantined and deleted successfully.

(end)

 

 

---------------------------------------
Malwarebytes Anti-Rootkit BETA 1.07.0.1007

© Malwarebytes Corporation 2011-2012

OS version: 5.1.2600 Windows XP Service Pack 3 x86

Account is Administrative

Internet Explorer version: 8.0.6001.18702

File system is: NTFS
Disk drives: C:\ DRIVE_FIXED
CPU speed: 1.994000 GHz
Memory total: 1064677376, free: 182427648

Downloaded database version: v2013.11.23.08
Canceled update
Initializing...
======================
------------ Kernel report ------------
     11/23/2013 15:07:38
------------ Loaded modules -----------
\WINDOWS\system32\ntkrnlpa.exe
\WINDOWS\system32\hal.dll
\WINDOWS\system32\KDCOM.DLL
\WINDOWS\system32\BOOTVID.dll
ACPI.sys
\WINDOWS\system32\DRIVERS\WMILIB.SYS
pci.sys
isapnp.sys
ohci1394.sys
\WINDOWS\system32\DRIVERS\1394BUS.SYS
compbatt.sys
\WINDOWS\system32\DRIVERS\BATTC.SYS
pciide.sys
\WINDOWS\system32\DRIVERS\PCIIDEX.SYS
pcmcia.sys
MountMgr.sys
ftdisk.sys
dmload.sys
dmio.sys
PartMgr.sys
ACPIEC.sys
\WINDOWS\system32\DRIVERS\OPRGHDLR.SYS
VolSnap.sys
atapi.sys
iaStor.sys
disk.sys
\WINDOWS\system32\DRIVERS\CLASSPNP.SYS
fltmgr.sys
sr.sys
MpFilter.sys
KSecDD.sys
WudfPf.sys
Ntfs.sys
NDIS.sys
Mup.sys
\SystemRoot\system32\DRIVERS\nic1394.sys
\SystemRoot\system32\DRIVERS\intelppm.sys
\SystemRoot\system32\DRIVERS\igxpmp32.sys
\SystemRoot\system32\DRIVERS\VIDEOPRT.SYS
\SystemRoot\system32\DRIVERS\HDAudBus.sys
\SystemRoot\system32\DRIVERS\NETw5x32.sys
\SystemRoot\system32\DRIVERS\usbuhci.sys
\SystemRoot\system32\DRIVERS\USBPORT.SYS
\SystemRoot\system32\DRIVERS\usbehci.sys
\SystemRoot\system32\DRIVERS\sdbus.sys
\SystemRoot\system32\DRIVERS\serial.sys
\SystemRoot\system32\DRIVERS\serenum.sys
\SystemRoot\system32\DRIVERS\parport.sys
\SystemRoot\system32\DRIVERS\i8042prt.sys
\SystemRoot\system32\DRIVERS\kbdclass.sys
\SystemRoot\system32\DRIVERS\SynTP.sys
\SystemRoot\system32\DRIVERS\USBD.SYS
\SystemRoot\system32\DRIVERS\mouclass.sys
\SystemRoot\system32\DRIVERS\cpqbttn.sys
\SystemRoot\system32\DRIVERS\HIDCLASS.SYS
\SystemRoot\system32\DRIVERS\HIDPARSE.SYS
\SystemRoot\system32\DRIVERS\CmBatt.sys
\SystemRoot\system32\DRIVERS\wmiacpi.sys
\SystemRoot\system32\DRIVERS\audstub.sys
\SystemRoot\system32\DRIVERS\rasl2tp.sys
\SystemRoot\system32\DRIVERS\ndistapi.sys
\SystemRoot\system32\DRIVERS\ndiswan.sys
\SystemRoot\system32\DRIVERS\raspppoe.sys
\SystemRoot\system32\DRIVERS\raspptp.sys
\SystemRoot\system32\DRIVERS\TDI.SYS
\SystemRoot\system32\DRIVERS\psched.sys
\SystemRoot\system32\DRIVERS\msgpc.sys
\SystemRoot\system32\DRIVERS\ptilink.sys
\SystemRoot\system32\DRIVERS\raspti.sys
\SystemRoot\system32\DRIVERS\rdpdr.sys
\SystemRoot\system32\DRIVERS\termdd.sys
\SystemRoot\system32\DRIVERS\swenum.sys
\SystemRoot\system32\DRIVERS\ks.sys
\SystemRoot\system32\DRIVERS\update.sys
\SystemRoot\system32\DRIVERS\mssmbios.sys
\SystemRoot\system32\DRIVERS\kbdhid.sys
\SystemRoot\System32\Drivers\NDProxy.SYS
\SystemRoot\system32\drivers\ADIHdAud.sys
\SystemRoot\system32\drivers\portcls.sys
\SystemRoot\system32\drivers\drmk.sys
\SystemRoot\system32\drivers\AEAudio.sys
\SystemRoot\system32\DRIVERS\usbhub.sys
\SystemRoot\System32\Drivers\Fs_Rec.SYS
\SystemRoot\System32\Drivers\Null.SYS
\SystemRoot\System32\Drivers\Beep.SYS
\SystemRoot\System32\drivers\vga.sys
\SystemRoot\System32\Drivers\mnmdd.SYS
\SystemRoot\System32\DRIVERS\RDPCDD.sys
\SystemRoot\System32\Drivers\Msfs.SYS
\SystemRoot\System32\Drivers\Npfs.SYS
\SystemRoot\system32\DRIVERS\rasacd.sys
\SystemRoot\system32\DRIVERS\ipsec.sys
\SystemRoot\system32\DRIVERS\tcpip.sys
\SystemRoot\system32\DRIVERS\netbt.sys
\SystemRoot\system32\DRIVERS\wanarp.sys
\SystemRoot\System32\drivers\afd.sys
\SystemRoot\system32\DRIVERS\netbios.sys
\SystemRoot\system32\DRIVERS\redbook.sys
\SystemRoot\system32\DRIVERS\arp1394.sys
\SystemRoot\system32\DRIVERS\rdbss.sys
\SystemRoot\system32\DRIVERS\mrxsmb.sys
\SystemRoot\system32\DRIVERS\imapi.sys
\SystemRoot\system32\DRIVERS\hidusb.sys
\SystemRoot\System32\Drivers\Fips.SYS
\SystemRoot\system32\DRIVERS\usbccgp.sys
\SystemRoot\system32\DRIVERS\usbprint.sys
\SystemRoot\system32\DRIVERS\mouhid.sys
\SystemRoot\system32\DRIVERS\lvuvc.sys
\SystemRoot\System32\Drivers\dump_iaStor.sys
\SystemRoot\System32\win32k.sys
\SystemRoot\System32\drivers\Dxapi.sys
\SystemRoot\System32\watchdog.sys
\SystemRoot\System32\drivers\dxg.sys
\SystemRoot\System32\drivers\dxgthk.sys
\SystemRoot\System32\igxpgd32.dll
\SystemRoot\System32\igxprd32.dll
\SystemRoot\System32\igxpdv32.DLL
\SystemRoot\System32\igxpdx32.DLL
\SystemRoot\System32\ATMFD.DLL
\SystemRoot\system32\DRIVERS\ndisuio.sys
\SystemRoot\system32\DRIVERS\rspndr.sys
\SystemRoot\system32\drivers\wdmaud.sys
\SystemRoot\system32\drivers\sysaudio.sys
\SystemRoot\System32\Drivers\ParVdm.SYS
\SystemRoot\system32\DRIVERS\srv.sys
\SystemRoot\system32\DRIVERS\secdrv.sys
\SystemRoot\system32\DRIVERS\LVPr2Mon.sys
\SystemRoot\System32\Drivers\HTTP.sys
\SystemRoot\system32\drivers\MSPQM.sys
\SystemRoot\system32\DRIVERS\b57xp32.sys
\SystemRoot\system32\drivers\kmixer.sys
\??\C:\WINDOWS\system32\drivers\mbamchameleon.sys
\??\C:\WINDOWS\system32\drivers\MBAMSwissArmy.sys
\WINDOWS\system32\ntdll.dll
----------- End -----------
Done!
<<<1>>>
Upper Device Name: \Device\Harddisk0\DR0
Upper Device Object: 0xffffffff864b9ab8
Upper Device Driver Name: \Driver\Disk\
Lower Device Name: \Device\Ide\IAAStorageDevice-0\
Lower Device Object: 0xffffffff864e3030
Lower Device Driver Name: \Driver\iaStor\
<<<2>>>
Physical Sector Size: 512
Drive: 0, DevicePointer: 0xffffffff864b9ab8, DeviceName: \Device\Harddisk0\DR0\, DriverName: \Driver\Disk\
--------- Disk Stack ------
DevicePointer: 0xffffffff86556e08, DeviceName: Unknown, DriverName: \Driver\PartMgr\
DevicePointer: 0xffffffff864b9ab8, DeviceName: \Device\Harddisk0\DR0\, DriverName: \Driver\Disk\
DevicePointer: 0xffffffff86561f18, DeviceName: \Device\00000084\, DriverName: \Driver\ACPI\
DevicePointer: 0xffffffff864e3030, DeviceName: \Device\Ide\IAAStorageDevice-0\, DriverName: \Driver\iaStor\
------------ End ----------
Alternate DeviceName: \Device\Harddisk0\DR0\, DriverName: \Driver\Disk\
Upper DeviceData: 0x0, 0x0, 0x0
Lower DeviceData: 0x0, 0x0, 0x0
<<<3>>>
Volume: C:
File system type: NTFS
SectorSize = 512, ClusterSize = 4096, MFTRecordSize = 1024, MFTIndexSize = 4096 bytes
<<<2>>>
<<<3>>>
Volume: C:
File system type: NTFS
SectorSize = 512, ClusterSize = 4096, MFTRecordSize = 1024, MFTIndexSize = 4096 bytes
Scanning drivers directory: C:\WINDOWS\SYSTEM32\drivers...
<<<2>>>
<<<3>>>
Volume: C:
File system type: NTFS
SectorSize = 512, ClusterSize = 4096, MFTRecordSize = 1024, MFTIndexSize = 4096 bytes
Done!
Drive 0
Scanning MBR on drive 0...
Inspecting partition table:
MBR Signature: 55AA
Disk Signature: 2439FC9

Partition information:

    Partition 0 type is Primary (0x7)
    Partition is ACTIVE.
    Partition starts at LBA: 63  Numsec = 156280257
    Partition file system is NTFS
    Partition is bootable

    Partition 1 type is Empty (0x0)
    Partition is NOT ACTIVE.
    Partition starts at LBA: 0  Numsec = 0

    Partition 2 type is Empty (0x0)
    Partition is NOT ACTIVE.
    Partition starts at LBA: 0  Numsec = 0

    Partition 3 type is Empty (0x0)
    Partition is NOT ACTIVE.
    Partition starts at LBA: 0  Numsec = 0

Disk Size: 80026361856 bytes
Sector size: 512 bytes

Scanning physical sectors of unpartitioned space on drive 0 (1-62-156281488-156301488)...
Done!
Infected: C:\Documents and Settings\Administrator\Local Settings\Application Data\Google\Desktop\Install\{2171273f-4015-e22d-0c9e-883c36136e3a}\❤≸⋙\Ⱒ☠⍨\ﯹ๛\{2171273f-4015-e22d-0c9e-883c36136e3a}\GoogleUpdate.exe --> [Trojan.0Access]
Infected: HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\GOOGLEUPDATE.EXE --> [Trojan.0Access]
Infected: HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run|Google Update^❤ --> [Trojan.0Access]
Infected: c:\program files\google\desktop\install\{2171273f-4015-e22d-0c9e-883c36136e3a}\   \   \ﯹ๛\{2171273f-4015-e22d-0c9e-883c36136e3a}\googleupdate.exe --> [Trojan.0Access]
Infected: HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\etadpug --> [Trojan.0Access]
Read File: File "C:\Documents and Settings\Administrator\Cookies\index.dat" is compressed (flags = 1)
Read File: File "C:\Documents and Settings\Administrator\IECompatCache\index.dat" is compressed (flags = 1)
Read File: File "C:\Documents and Settings\Administrator\IETldCache\index.dat" is compressed (flags = 1)
Read File: File "C:\Documents and Settings\NetworkService\Cookies\index.dat" is compressed (flags = 1)
Infected: C:\WINDOWS\assembly\GAC\Desktop.ini --> [Rootkit.0access]
Read File: File "C:\Documents and Settings\Administrator\Local Settings\History\History.IE5\index.dat" is compressed (flags = 1)
Read File: File "C:\Documents and Settings\NetworkService\Local Settings\History\History.IE5\index.dat" is compressed (flags = 1)
Infected: C:\Documents and Settings\Administrator\Application Data\cglogs.dat --> [Malware.Trace]
Infected: HKLM\SYSTEM\CURRENTCONTROLSET\ENUM\ROOT\LEGACY_*202EETADPUG --> [Rootkit.0Access]
Infected: C:\Documents and Settings\Administrator\Local Settings\Application Data\Google\Desktop\Install\{2171273f-4015-e22d-0c9e-883c36136e3a}\❤≸⋙ --> [Trojan.0Access]
Infected: C:\Documents and Settings\Administrator\Local Settings\Application Data\Google\Desktop\Install\{2171273f-4015-e22d-0c9e-883c36136e3a}\❤≸⋙\Ⱒ☠⍨ --> [Trojan.0Access]
Infected: C:\Documents and Settings\Administrator\Local Settings\Application Data\Google\Desktop\Install\{2171273f-4015-e22d-0c9e-883c36136e3a}\❤≸⋙\Ⱒ☠⍨\ﯹ๛ --> [Trojan.0Access]
Infected: C:\Documents and Settings\Administrator\Local Settings\Application Data\Google\Desktop\Install\{2171273f-4015-e22d-0c9e-883c36136e3a}\❤≸⋙\Ⱒ☠⍨\ﯹ๛\{2171273f-4015-e22d-0c9e-883c36136e3a} --> [Trojan.0Access]
Infected: C:\Documents and Settings\Administrator\Local Settings\Application Data\Google\Desktop\Install\{2171273f-4015-e22d-0c9e-883c36136e3a}\❤≸⋙\Ⱒ☠⍨\ﯹ๛\{2171273f-4015-e22d-0c9e-883c36136e3a}\@ --> [Trojan.0Access]
Infected: C:\Documents and Settings\Administrator\Local Settings\Application Data\Google\Desktop\Install\{2171273f-4015-e22d-0c9e-883c36136e3a}\❤≸⋙\Ⱒ☠⍨\ﯹ๛\{2171273f-4015-e22d-0c9e-883c36136e3a}\L --> [Trojan.0Access]
Infected: C:\Documents and Settings\Administrator\Local Settings\Application Data\Google\Desktop\Install\{2171273f-4015-e22d-0c9e-883c36136e3a}\❤≸⋙\Ⱒ☠⍨\ﯹ๛\{2171273f-4015-e22d-0c9e-883c36136e3a}\U --> [Trojan.0Access]
Infected: C:\Documents and Settings\Administrator\Local Settings\Application Data\Google\Desktop\Install\{2171273f-4015-e22d-0c9e-883c36136e3a} --> [Trojan.0Access]
Infected: c:\program files\google\desktop\install\{2171273f-4015-e22d-0c9e-883c36136e3a}\    --> [Trojan.0Access]
Infected: c:\program files\google\desktop\install\{2171273f-4015-e22d-0c9e-883c36136e3a}\   \    --> [Trojan.0Access]
Infected: c:\program files\google\desktop\install\{2171273f-4015-e22d-0c9e-883c36136e3a}\   \   \ﯹ๛ --> [Trojan.0Access]
Infected: c:\program files\google\desktop\install\{2171273f-4015-e22d-0c9e-883c36136e3a}\   \   \ﯹ๛\{2171273f-4015-e22d-0c9e-883c36136e3a} --> [Trojan.0Access]
Infected: c:\program files\google\desktop\install\{2171273f-4015-e22d-0c9e-883c36136e3a}\   \   \ﯹ๛\{2171273f-4015-e22d-0c9e-883c36136e3a}\@ --> [Trojan.0Access]
Infected: c:\program files\google\desktop\install\{2171273f-4015-e22d-0c9e-883c36136e3a}\   \   \ﯹ๛\{2171273f-4015-e22d-0c9e-883c36136e3a}\l --> [Trojan.0Access]
Infected: c:\program files\google\desktop\install\{2171273f-4015-e22d-0c9e-883c36136e3a}\   \   \ﯹ๛\{2171273f-4015-e22d-0c9e-883c36136e3a}\l\00000004.@ --> [Trojan.0Access]
Infected: c:\program files\google\desktop\install\{2171273f-4015-e22d-0c9e-883c36136e3a}\   \   \ﯹ๛\{2171273f-4015-e22d-0c9e-883c36136e3a}\l\201d3dde --> [Trojan.0Access]
Infected: c:\program files\google\desktop\install\{2171273f-4015-e22d-0c9e-883c36136e3a}\   \   \ﯹ๛\{2171273f-4015-e22d-0c9e-883c36136e3a}\l\76603ac3 --> [Trojan.0Access]
Infected: c:\program files\google\desktop\install\{2171273f-4015-e22d-0c9e-883c36136e3a}\   \   \ﯹ๛\{2171273f-4015-e22d-0c9e-883c36136e3a}\u --> [Trojan.0Access]
Infected: c:\program files\google\desktop\install\{2171273f-4015-e22d-0c9e-883c36136e3a}\   \   \ﯹ๛\{2171273f-4015-e22d-0c9e-883c36136e3a}\u\00000004.@ --> [Trojan.0Access]
Infected: c:\program files\google\desktop\install\{2171273f-4015-e22d-0c9e-883c36136e3a}\   \   \ﯹ๛\{2171273f-4015-e22d-0c9e-883c36136e3a}\u\00000008.@ --> [Trojan.0Access]
Infected: c:\program files\google\desktop\install\{2171273f-4015-e22d-0c9e-883c36136e3a}\   \   \ﯹ๛\{2171273f-4015-e22d-0c9e-883c36136e3a}\u\000000cb.@ --> [Trojan.0Access]
Infected: c:\program files\google\desktop\install\{2171273f-4015-e22d-0c9e-883c36136e3a}\   \   \ﯹ๛\{2171273f-4015-e22d-0c9e-883c36136e3a}\u\80000000.@ --> [Trojan.0Access]
Infected: c:\program files\google\desktop\install\{2171273f-4015-e22d-0c9e-883c36136e3a}\   \   \ﯹ๛\{2171273f-4015-e22d-0c9e-883c36136e3a}\u\80000032.@ --> [Trojan.0Access]
Infected: C:\Program Files\Google\Desktop\Install\{2171273f-4015-e22d-0c9e-883c36136e3a} --> [Trojan.0Access]
Scan finished
=======================================

Removal queue found; removal started
Removing C:\Documents and Settings\All Users\Application Data\Malwarebytes' Anti-Malware (portable)\MBR_0_i.mbam...
Removing C:\Documents and Settings\All Users\Application Data\Malwarebytes' Anti-Malware (portable)\Bootstrap_0_0_63_i.mbam...
Removing C:\Documents and Settings\All Users\Application Data\Malwarebytes' Anti-Malware (portable)\MBR_0_r.mbam...
Removal finished

 

Rkill 2.6.2 by Lawrence Abrams (Grinler)
http://www.bleepingcomputer.com/
Copyright 2008-2013 BleepingComputer.com
More Information about Rkill can be found at this link:
 http://www.bleepingcomputer.com/forums/topic308364.html

Program started at: 11/23/2013 03:56:04 PM in x86 mode.
Windows Version: Microsoft Windows XP Service Pack 3

Checking for Windows services to stop:

 * No malware services found to stop.

Checking for processes to terminate:

 * C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\is-LL8C6.tmp\mbam-setup-1.75.0.1300[1].tmp (PID: 2920) [T-HEUR]

1 proccess terminated!

Checking Registry for malware related settings:

 * No issues found in the Registry.

Resetting .EXE, .COM, & .BAT associations in the Windows Registry.

Performing miscellaneous checks:

 * ALERT: ZEROACCESS rootkit symptoms found!

     * C:\Documents and Settings\Administrator\Local Settings\Application Data\Google\Desktop\Install\{2171273f-4015-e22d-0c9e-883c36136e3a}\ [ZA Dir]
     * C:\Documents and Settings\Administrator\Local Settings\Application Data\Google\Desktop\Install\{2171273f-4015-e22d-0c9e-883c36136e3a}\❤≸⋙\ [ZA Dir]
     * C:\Documents and Settings\Administrator\Local Settings\Application Data\Google\Desktop\Install\{2171273f-4015-e22d-0c9e-883c36136e3a}\❤≸⋙\Ⱒ☠⍨\ [ZA Dir]
     * C:\Documents and Settings\Administrator\Local Settings\Application Data\Google\Desktop\Install\{2171273f-4015-e22d-0c9e-883c36136e3a}\❤≸⋙\Ⱒ☠⍨\ﯹ๛\ [ZA Dir]
     * C:\Documents and Settings\Administrator\Local Settings\Application Data\Google\Desktop\Install\{2171273f-4015-e22d-0c9e-883c36136e3a}\❤≸⋙\Ⱒ☠⍨\ﯹ๛\{2171273f-4015-e22d-0c9e-883c36136e3a}\ [ZA Dir]
     * C:\Program Files\Google\Desktop\Install\{2171273f-4015-e22d-0c9e-883c36136e3a}\ [ZA Dir]
     * C:\Program Files\Google\Desktop\Install\{2171273f-4015-e22d-0c9e-883c36136e3a}\   \ [ZA Dir]
     * C:\Program Files\Google\Desktop\Install\{2171273f-4015-e22d-0c9e-883c36136e3a}\   \   \ [ZA Dir]
     * C:\Program Files\Google\Desktop\Install\{2171273f-4015-e22d-0c9e-883c36136e3a}\   \   \ﯹ๛\ [ZA Dir]
     * C:\Program Files\Google\Desktop\Install\{2171273f-4015-e22d-0c9e-883c36136e3a}\   \   \ﯹ๛\{2171273f-4015-e22d-0c9e-883c36136e3a}\ [ZA Dir]
     * C:\WINDOWS\assembly\GAC\Desktop.ini [ZA File]

 * ALERT: ZEROACCESS Reparse Point/Junction found!

     * C:\Program Files\Microsoft Security Client\Backup => c:\windows\system32\config\ [Dir]
     * C:\Program Files\Microsoft Security Client\DbgHelp.dll => c:\windows\system32\config [File]
     * C:\Program Files\Microsoft Security Client\Drivers => c:\windows\system32\config\ [Dir]
     * C:\Program Files\Microsoft Security Client\en-us => c:\windows\system32\config\ [Dir]
     * C:\Program Files\Microsoft Security Client\EppManifest.dll => c:\windows\system32\config [File]
     * C:\Program Files\Microsoft Security Client\LegitLib.dll => c:\windows\system32\config [File]
     * C:\Program Files\Microsoft Security Client\MpAsDesc.dll => c:\windows\system32\config [File]
     * C:\Program Files\Microsoft Security Client\MpClient.dll => c:\windows\system32\config [File]
     * C:\Program Files\Microsoft Security Client\MpCmdRun.exe => c:\windows\system32\config [File]
     * C:\Program Files\Microsoft Security Client\MpCommu.dll => c:\windows\system32\config [File]
     * C:\Program Files\Microsoft Security Client\mpevmsg.dll => c:\windows\system32\config [File]
     * C:\Program Files\Microsoft Security Client\MpOAv.dll => c:\windows\system32\config [File]
     * C:\Program Files\Microsoft Security Client\MpRTP.dll => c:\windows\system32\config [File]
     * C:\Program Files\Microsoft Security Client\MpSvc.dll => c:\windows\system32\config [File]
     * C:\Program Files\Microsoft Security Client\MsMpCom.dll => c:\windows\system32\config [File]
     * C:\Program Files\Microsoft Security Client\MsMpEng.exe => c:\windows\system32\config [File]
     * C:\Program Files\Microsoft Security Client\MsMpLics.dll => c:\windows\system32\config [File]
     * C:\Program Files\Microsoft Security Client\MsMpRes.dll => c:\windows\system32\config [File]
     * C:\Program Files\Microsoft Security Client\msseces.exe => c:\windows\system32\config [File]
     * C:\Program Files\Microsoft Security Client\MsseWat.dll => c:\windows\system32\config [File]
     * C:\Program Files\Microsoft Security Client\Setup.exe => c:\windows\system32\config [File]
     * C:\Program Files\Microsoft Security Client\SetupRes.dll => c:\windows\system32\config [File]
     * C:\Program Files\Microsoft Security Client\shellext.dll => c:\windows\system32\config [File]
     * C:\Program Files\Microsoft Security Client\sqmapi.dll => c:\windows\system32\config [File]
     * C:\Program Files\Microsoft Security Client\SymSrv.dll => c:\windows\system32\config [File]
     * C:\Program Files\Microsoft Security Client\SymSrv.yes => c:\windows\system32\config [File]

 * Reparse Point/Junctions Found (Most likely legitimate)!

     * C:\WINDOWS\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a => C:\WINDOWS\WinSxS\x86_System.EnterpriseServices_b03f5f7f11d50a3a_4.0.0.0_x-ww_29b51492 [Dir]

Checking Windows Service Integrity:

 * BITS [Missing Service]
 * PolicyAgent [Missing Service]
 * RemoteAccess [Missing Service]
 * wscsvc [Missing Service]
 * wuauserv [Missing Service]

 * SharedAccess [Missing ImagePath]

Searching for Missing Digital Signatures:

 * C:\WINDOWS\System32\drivers\mqac.sys : 91,776 : 06/22/2009 05:30 AM : 9229e191fe206628be17d1e67a5faed9 [NoSig]
 +-> C:\WINDOWS\ServicePackFiles\i386\mqac.sys : 92,544 : 04/13/2008 11:09 PM : 70c14f5cca5cf73f8a645c73a01d8726 [Pos Repl]
 +-> C:\WINDOWS\system32\dllcache\mqac.sys : 91,776 : 06/22/2009 05:30 AM : 9229e191fe206628be17d1e67a5faed9 [Pos Repl]

Checking HOSTS File:

 * HOSTS file entries found:

  127.0.0.1       localhost

Program finished at: 11/23/2013 04:00:06 PM
Execution time: 0 hours(s), 4 minute(s), and 2 seconds(s)

 

 

 

 

 

 


Edited by WhightKnight, 23 November 2013 - 05:38 PM.


#4 Broni

Broni

    The Coolest BC Computer


  • BC Advisor
  • 42,758 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Daly City, CA
  • Local time:07:29 AM

Posted 23 November 2013 - 05:55 PM

You're infected with ZeroAccess rootkit.

It'll require elevated help.

 

Please follow the instructions in THIS GUIDE starting at Step 6. If you cannot complete a step, skip it and continue.

Once the proper logs are created, then make a NEW TOPIC and post it HERE. Please include a description of your computer issues, what you have done to resolve them, and a link to this topic.

If you can produce at least some of the logs, then please create the new topic and explain what happens when you try to create the log(s) that you couldn't get. If you cannot produce any of the logs, then still post the topic and explain that you followed the Prep. Guide, were unable to create the logs, and describe what happens when you try to create the logs.

It would be helpful if you post a note here once you have completed the steps in the guide and have started your topic in malware removal. Good luck and be patient.

If HelpBot replies to your topic, PLEASE follow Step One so it will report your topic to the team members.


My Website

My help doesn't cost a penny, but if you'd like to consider a donation, click DONATE

 


#5 WhightKnight

WhightKnight
  • Topic Starter

  • Members
  • 54 posts
  • OFFLINE
  •  
  • Local time:10:29 AM

Posted 23 November 2013 - 07:39 PM

I have completed the steps you mentioned.
Here is my new thread:

http://www.bleepingcomputer.com/forums/t/515196/infected-with-zeroaccess-rootkit/

 

 

Thanks for the help.

Sorry for never responding to my other thread and saying all problems were resolved.



#6 Broni

Broni

    The Coolest BC Computer


  • BC Advisor
  • 42,758 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Daly City, CA
  • Local time:07:29 AM

Posted 23 November 2013 - 07:49 PM

p22003888.gif


My Website

My help doesn't cost a penny, but if you'd like to consider a donation, click DONATE

 





0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users