Jump to content

Recommended Posts

Dear Malwarebytes Forum:

I'm hoping someone has had this problem before and has been able to solve it.

Upon removal of the 'Zero Access' virus (no idea how I got it), I now have no internet connection. "Limited or No Connectivity" is the only thing I get and I have no idea why that should be.

I have posted the logs from DDS below. Thanks in advance for anything you can suggest -- I've been at it for several days now and am pulling my hair out. :angry2:

DDS.TXT

+++

.

DDS (Ver_2011-08-26.01) - NTFSx86

Internet Explorer: 8.0.6001.18702

Run by Dennis at 6:27:41 on 2011-12-31

Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.1406.993 [GMT -5:00]

.

.

============== Running Processes ===============

.

C:\WINDOWS\system32\Ati2evxx.exe

C:\WINDOWS\system32\svchost -k DcomLaunch

svchost.exe

C:\WINDOWS\System32\svchost.exe -k netsvcs

C:\WINDOWS\system32\Ati2evxx.exe

svchost.exe

C:\WINDOWS\system32\spoolsv.exe

C:\WINDOWS\Explorer.EXE

C:\Program Files\SigmaTel\C-Major Audio\WDM\stsystra.exe

C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe

C:\Program Files\Common Files\Java\Java Update\jusched.exe

C:\program files\real\realplayer\update\realsched.exe

C:\Program Files\ATI Technologies\ATI.ACE\Core-Static\MOM.EXE

C:\WINDOWS\system32\ctfmon.exe

C:\Program Files\Windows Desktop Search\WindowsSearch.exe

C:\Program Files\Microsoft Office\Office12\ONENOTEM.EXE

C:\WINDOWS\System32\svchost.exe -k HTTPFilter

C:\Program Files\Common Files\Microsoft Shared\VS7DEBUG\mdm.exe

C:\Program Files\ATI Technologies\ATI.ACE\Core-Static\ccc.exe

svchost.exe

C:\WINDOWS\system32\StacSV.exe

C:\WINDOWS\system32\svchost.exe -k imgsvc

C:\Program Files\Common Files\Authentium\AntiVirus5\vsedsps.exe

C:\Program Files\Yahoo!\SoftwareUpdate\YahooAUService.exe

C:\Program Files\Common Files\Authentium\AntiVirus5\vseamps.exe

C:\WINDOWS\system32\SearchIndexer.exe

C:\Program Files\Common Files\Authentium\AntiVirus5\vseqrts.exe

C:\Program Files\Yahoo!\Messenger\ymsgr_tray.exe

.

============== Pseudo HJT Report ===============

.

BHO: TmIEPlugInBHO Class: {1ca1377b-dc1d-4a52-9585-6e06050fac53} - c:\program files\trend micro\amsp\module\20004\1.5.1464\6.6.1079\TmIEPlg.dll

BHO: RealPlayer Download and Record Plugin for Internet Explorer: {3049c3e9-b461-4bc5-8870-4c09146192ca} - c:\documents and settings\all users\application data\real\realplayer\browserrecordplugin\ie\rpbrowserrecordplugin.dll

BHO: Windows Live ID Sign-in Helper: {9030d464-4c02-4abf-8ecc-5164760863c6} - c:\program files\common files\microsoft shared\windows live\WindowsLiveLogin.dll

BHO: TmBpIeBHO Class: {bbacbafd-fa5e-4079-8b33-00eb9f13d4ac} - c:\program files\trend micro\amsp\module\20002\6.5.1234\6.5.1234\TmBpIe32.dll

uRun: [<NO NAME>]

uRun: [startCCC] c:\program files\ati technologies\ati.ace\core-static\CLIStart.exe

uRun: [ctfmon.exe] c:\windows\system32\ctfmon.exe

uRun: [Google Update] "c:\documents and settings\dennis\local settings\application data\google\update\GoogleUpdate.exe" /c

uRun: [QuickTime Task] "c:\program files\quicktime\qttask.exe" -atboottime

uRun: [Messenger (Yahoo!)] "c:\program files\yahoo!\messenger\YahooMessenger.exe" -quiet

mRun: [sigmatelSysTrayApp] %ProgramFiles%\SigmaTel\C-Major Audio\WDM\stsystra.exe

mRun: [GrooveMonitor] "c:\program files\microsoft office\office12\GrooveMonitor.exe"

mRun: [sunJavaUpdateSched] "c:\program files\common files\java\java update\jusched.exe"

mRun: [Adobe ARM] "c:\program files\common files\adobe\arm\1.0\AdobeARM.exe"

mRun: [TkBellExe] "c:\program files\real\realplayer\update\realsched.exe" -osboot

mRun: [Hpppta] c:\program files\hewlett-packard\hp precisionscan\precisionscan\hpppta.exe /ICON

mRun: [Adobe Reader Speed Launcher] "c:\program files\adobe\reader 9.0\reader\Reader_sl.exe"

mRun: [QuickTime Task] "c:\program files\quicktime\qttask.exe" -atboottime

mRun: [APSDaemon] "c:\program files\common files\apple\apple application support\APSDaemon.exe"

StartupFolder: c:\docume~1\dennis\startm~1\programs\startup\onenot~1.lnk - c:\program files\microsoft office\office12\ONENOTEM.EXE

StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\window~1.lnk - c:\program files\windows desktop search\WindowsSearch.exe

mPolicies-system: ConsentPromptBehaviorAdmin = 5 (0x5)

mPolicies-system: ConsentPromptBehaviorUser = 3 (0x3)

IE: {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe

IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe

IE: {2670000A-7350-4f3c-8081-5663EE0C6C49} - {48E73304-E1D6-4330-914C-F5F514E3486C} - c:\progra~1\micros~2\office12\ONBttnIE.dll

IE: {92780B25-18CC-41C8-B9BE-3C9C571A8263} - {FF059E31-CC5A-4E2E-BF3B-96E929D65503} - c:\progra~1\micros~2\office12\REFIEBAR.DLL

DPF: {6824D897-F7E1-4E41-B84B-B1D3FA4BF1BD} - hxxp://utilities.pcpitstop.com/Exterminate2/pcpitstopAntiVirus.dll

DPF: {7530BFB8-7293-4D34-9923-61A11451AFC5} - hxxp://download.eset.com/special/eos/OnlineScanner.cab

DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_23-windows-i586.cab

DPF: {CAFEEFAC-0016-0000-0023-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_23-windows-i586.cab

DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_23-windows-i586.cab

DPF: {E2883E8F-472F-4FB0-9522-AC9BF37916A7} - hxxp://platformdl.adobe.com/NOS/getPlusPlus/1.6/gp.cab

TCP: DhcpNameServer = 10.0.0.1

TCP: Interfaces\{DF87B325-EBC8-4B16-BA6B-BDF342BF8EC3} : DhcpNameServer = 10.0.0.1

Handler: grooveLocalGWS - {88FED34C-F0CA-4636-A375-3CB6248B04CD} - c:\program files\microsoft office\office12\GrooveSystemServices.dll

Handler: tmbp - {1A77E7DC-C9A0-4110-8A37-2F36BAE71ECF} -

Handler: tmtbim - {0B37915C-8B98-4B9E-80D4-464D2C830D10} -

Notify: !SASWinLogon - c:\program files\superantispyware\SASWINLO.DLL

Notify: AtiExtEvent - Ati2evxx.dll

AppInit_DLLs: c:\progra~1\agnitum\outpos~1\wl_hook.dll

SSODL: WPDShServiceObj - {AAA288BA-9A4C-45B0-95D7-94D524869DB5} - c:\windows\system32\WPDShServiceObj.dll

SEH: Groove GFS Stub Execution Hook: {b5a7f190-dda6-4420-b3ba-52453494e6cd} - c:\program files\microsoft office\office12\GrooveShellExtensions.dll

SEH: Windows Desktop Search Namespace Manager: {56f9679e-7826-4c84-81f3-532071a8bcc5} - c:\program files\windows desktop search\MSNLNamespaceMgr.dll

SEH: SABShellExecuteHook Class: {5ae067d3-9afb-48e0-853a-ebb7f4a000da} - c:\program files\superantispyware\SASSEH.DLL

.

============= SERVICES / DRIVERS ===============

.

R1 SASDIFSV;SASDIFSV;c:\program files\superantispyware\sasdifsv.sys [2011-7-22 12880]

R1 SASKUTIL;SASKUTIL;c:\program files\superantispyware\SASKUTIL.SYS [2011-7-12 67664]

R2 vseamps;vseamps;c:\program files\common files\authentium\antivirus5\vseamps.exe [2010-4-8 117288]

R2 vsedsps;vsedsps;c:\program files\common files\authentium\antivirus5\vsedsps.exe [2010-4-8 117288]

R2 vseqrts;vseqrts;c:\program files\common files\authentium\antivirus5\vseqrts.exe [2010-4-8 154152]

S0 Lbd;Lbd;c:\windows\system32\drivers\lbd.sys --> c:\windows\system32\drivers\Lbd.sys [?]

S0 rvieme;rvieme;c:\windows\system32\drivers\gqmhyfv.sys --> c:\windows\system32\drivers\gqmhyfv.sys [?]

S0 teqlmbs;teqlmbs;c:\windows\system32\drivers\rrffymjj.sys --> c:\windows\system32\drivers\rrffymjj.sys [?]

S1 MpKsl2d7155ba;MpKsl2d7155ba;\??\c:\documents and settings\all users\application data\microsoft\microsoft antimalware\definition updates\{f558d217-bfe6-49ca-b355-4f875aaa619a}\mpksl2d7155ba.sys --> c:\documents and settings\all users\application data\microsoft\microsoft antimalware\definition updates\{f558d217-bfe6-49ca-b355-4f875aaa619a}\MpKsl2d7155ba.sys [?]

S1 MpKsl38e5746a;MpKsl38e5746a;\??\c:\documents and settings\all users\application data\microsoft\microsoft antimalware\definition updates\{251de65f-7233-44e8-b45b-1267e23a0ef9}\mpksl38e5746a.sys --> c:\documents and settings\all users\application data\microsoft\microsoft antimalware\definition updates\{251de65f-7233-44e8-b45b-1267e23a0ef9}\MpKsl38e5746a.sys [?]

S1 MpKsl470a019a;MpKsl470a019a;\??\c:\documents and settings\all users\application data\microsoft\microsoft antimalware\definition updates\{daecf1d8-1e7f-4fa1-8095-3479427a8bba}\mpksl470a019a.sys --> c:\documents and settings\all users\application data\microsoft\microsoft antimalware\definition updates\{daecf1d8-1e7f-4fa1-8095-3479427a8bba}\MpKsl470a019a.sys [?]

S1 MpKsl809289e4;MpKsl809289e4;\??\c:\documents and settings\all users\application data\microsoft\microsoft antimalware\definition updates\{0f5a331c-ec1c-4594-896a-4be1a2150d56}\mpksl809289e4.sys --> c:\documents and settings\all users\application data\microsoft\microsoft antimalware\definition updates\{0f5a331c-ec1c-4594-896a-4be1a2150d56}\MpKsl809289e4.sys [?]

S1 MpKsl8fe9ba4c;MpKsl8fe9ba4c;\??\c:\documents and settings\all users\application data\microsoft\microsoft antimalware\definition updates\{d074a15d-b66e-4c43-bd84-818fa319f9e3}\mpksl8fe9ba4c.sys --> c:\documents and settings\all users\application data\microsoft\microsoft antimalware\definition updates\{d074a15d-b66e-4c43-bd84-818fa319f9e3}\MpKsl8fe9ba4c.sys [?]

S1 MpKsld8a82ed5;MpKsld8a82ed5;\??\c:\documents and settings\all users\application data\microsoft\microsoft antimalware\definition updates\{4d6cd320-c070-4584-9aad-776b4406832e}\mpksld8a82ed5.sys --> c:\documents and settings\all users\application data\microsoft\microsoft antimalware\definition updates\{4d6cd320-c070-4584-9aad-776b4406832e}\MpKsld8a82ed5.sys [?]

S1 MpKslf57f8483;MpKslf57f8483;\??\c:\documents and settings\all users\application data\microsoft\microsoft antimalware\definition updates\{56b62d81-4c5c-4d34-8a42-65ae003ac76d}\mpkslf57f8483.sys --> c:\documents and settings\all users\application data\microsoft\microsoft antimalware\definition updates\{56b62d81-4c5c-4d34-8a42-65ae003ac76d}\MpKslf57f8483.sys [?]

S3 esihdrv;esihdrv;\??\c:\docume~1\jason\locals~1\temp\esihdrv.sys --> c:\docume~1\jason\locals~1\temp\esihdrv.sys [?]

S3 kvnet;Kerio Virtual Network Adapter;c:\windows\system32\drivers\kvnet.sys [2009-3-23 36912]

S3 kwflower;Kerio WinRoute Firewall Driver - Lower Layer;c:\windows\system32\drivers\kwflower.sys --> c:\windows\system32\drivers\kwflower.sys [?]

S3 Lavasoft Kernexplorer;Lavasoft helper driver;\??\c:\program files\lavasoft\ad-aware\kernexplorer.sys --> c:\program files\lavasoft\ad-aware\KernExplorer.sys [?]

S3 netfilter;Netfilter;c:\windows\system32\drivers\netfilter.sys --> c:\windows\system32\drivers\netfilter.sys [?]

S3 Revoflt;Revoflt;c:\windows\system32\drivers\revoflt.sys [2011-9-7 27064]

.

=============== Created Last 30 ================

.

2011-12-27 13:24:19 -------- d-----w- c:\program files\Tweaking.com

2011-12-27 12:38:17 -------- d-----w- c:\program files\HitmanPro

2011-12-27 12:36:02 -------- d-----w- c:\documents and settings\all users\application data\HitmanPro

2011-12-24 01:49:39 -------- d-----w- c:\documents and settings\all users\application data\Hitman Pro

2011-12-22 07:29:08 -------- d-----w- c:\windows\system32\wbem\repository\FS

2011-12-22 07:29:08 -------- d-----w- c:\windows\system32\wbem\Repository

2011-12-22 04:03:52 -------- d-----w- c:\program files\SUPERAntiSpyware

2011-12-22 00:47:58 -------- d-----w- c:\program files\Xirrus

2011-12-22 00:47:20 -------- d-----w- c:\documents and settings\dennis\local settings\application data\Downloaded Installations

2011-12-21 07:55:13 -------- d-----w- C:\RECYCLER(2)

2011-12-21 07:16:46 62976 -c--a-w- c:\windows\system32\dllcache\cdrom.sys

2011-12-21 07:16:46 62976 ----a-w- c:\windows\system32\drivers\cdrom.sys

2011-12-21 06:59:22 -------- d-sha-r- C:\cmdcons

2011-12-21 06:56:17 98816 ----a-w- c:\windows\sed.exe

2011-12-21 06:56:17 518144 ----a-w- c:\windows\SWREG.exe

2011-12-21 06:56:17 256000 ----a-w- c:\windows\PEV.exe

2011-12-21 06:56:17 208896 ----a-w- c:\windows\MBR.exe

2011-12-21 06:01:39 253096 ----a-w- c:\windows\system32\drivers\pctgntdi.sys

2011-12-21 06:00:48 17848 ----a-w- c:\windows\system32\drivers\pctBTFix.sys

2011-12-21 05:59:52 -------- d-----w- c:\program files\PC Tools

2011-12-21 05:52:42 660992 ----a-w- c:\windows\system32\drivers\pctEFA.sys

2011-12-21 05:52:42 341656 ----a-w- c:\windows\system32\drivers\pctDS.sys

2011-12-21 05:52:11 331880 ----a-w- c:\windows\system32\drivers\PCTCore.sys

2011-12-21 05:52:11 162584 ----a-w- c:\windows\system32\drivers\PCTAppEvent.sys

2011-12-21 05:50:20 -------- d-----w- c:\documents and settings\dennis\application data\TestApp

2011-12-14 13:31:24 -------- d-----w- c:\program files\common files\Bitdefender

2011-12-13 07:40:42 -------- d-----w- C:\found.001

2011-12-12 20:06:44 200976 ----a-w- c:\windows\system32\drivers\tmcomm.sys

2011-12-12 16:41:31 -------- d-----w- c:\program files\ESET

2011-12-11 05:31:20 -------- d-----w- c:\documents and settings\dennis\application data\AVG

2011-12-10 20:50:03 -------- d-----w- c:\documents and settings\dennis\application data\AVG2012

2011-12-10 20:05:04 -------- d-----w- c:\documents and settings\all users\application data\AVG2012

2011-12-07 11:14:40 -------- d-----w- c:\documents and settings\all users\application data\WRData

2011-12-03 13:56:18 -------- d-----w- c:\documents and settings\dennis\application data\SUPERAntiSpyware.com

2011-12-03 13:55:37 -------- d-----w- c:\documents and settings\all users\application data\SUPERAntiSpyware.com

2011-12-03 13:41:42 -------- d-----w- c:\documents and settings\dennis\application data\Media Finder

2011-12-03 13:40:29 -------- d-----w- c:\documents and settings\dennis\local settings\application data\Babylon

2011-12-03 13:40:27 -------- d-----w- c:\documents and settings\all users\application data\Babylon

2011-12-03 13:40:26 -------- d-----w- c:\documents and settings\dennis\application data\Babylon

2011-12-02 13:46:50 -------- d-----w- c:\documents and settings\dennis\application data\f-secure

2011-12-02 13:46:25 -------- d-----w- c:\documents and settings\all users\application data\F-Secure

.

==================== Find3M ====================

.

2011-12-04 03:19:32 414368 ----a-w- c:\windows\system32\FlashPlayerCPLApp.cpl

2011-11-23 00:43:02 70536 ----a-w- c:\windows\system32\drivers\pctplsg.sys

2011-11-23 00:42:40 185560 ----a-w- c:\windows\system32\drivers\PCTSD.sys

2011-10-24 19:29:02 94208 ----a-w- c:\windows\system32\QuickTimeVR.qtx

2011-10-24 19:29:02 69632 ----a-w- c:\windows\system32\QuickTime.qts

2011-10-10 14:22:41 692736 ----a-w- c:\windows\system32\inetcomm.dll

.

============= FINISH: 6:28:39.28 ===============

Link to post
Share on other sites

post-32477-1261866970.gif

If need be, Download the tools needed to a flash drive or other USB device, and transfer them to the infected computer.

DO NOT use any TOOLS such as Combofix, or HijackThis fixes without supervision.

Doing so could make your pc inoperatible and could require a full reinstall of your OS, losing all your programs and data.

Vista and Windows 7 users:

1. These tools MUST be run from the executable. (.exe) every time you run them

2. With Admin Rights (Right click, choose "Run as Administrator")

Stay with this topic until I give you the all clean post.

You might want to print these instructions out.

I suggest you do this:

Download Combofix from any of the links below but rename it to iexplore.exe before saving it to your desktop.

If need be, Download the tools needed to a flash drive or other USB device, and transfer them to the infected computer.

Note:

If combofix (iexplore.exe) won't run from the desktop, try running it from the USB device.

Link 1

Link 2 If using this link, Right Click and select Save As.

* IMPORTANT !!! Save iexplore.exe to your Desktop

Double click on the iexplore.exe ComboFix.exe & follow the prompts.

Be sure to download any updates.

  • When finished, it will produce a report for you.
  • Please post the C:\ComboFix.txt so we can continue cleaning the system.

  • Disable your AntiVirus and AntiSpyware applications, usually via a right click on the System Tray icon. They may otherwise interfere with our tools. Note: If you are having difficulty properly disabling your protective programs, or are unsure as to what programs need to be disabled, please refer to the information available through this link : Protective Programs
  • Double click on ComboFix.exe & follow the prompts.
    Notes: Combofix will run without the Recovery Console installed. Skip the Recovery Console part if you're running Vista or Windows 7.
    Note: If you have SP3, use the SP2 package.
    If Vista or Windows 7, skip the Recovery Console part
  • As part of it's process, ComboFix will check to see if the Microsoft Windows Recovery Console is installed. With malware infections being as they are today, it's strongly recommended to have this pre-installed on your machine before doing any malware removal. It will allow you to boot up into a special recovery/repair mode that will allow us to more easily help you should your computer have a problem after an attempted removal of malware.
  • Follow the prompts to allow ComboFix to download and install the Microsoft Windows Recovery Console, and when prompted, agree to the End-User License Agreement to install the Microsoft Windows Recovery Console.

**Please note: If the Microsoft Windows Recovery Console is already installed, ComboFix will continue it's malware removal procedures.

RC1.png

Once the Microsoft Windows Recovery Console is installed using ComboFix, you should see the following message:

RC2-1.png

Click on Yes, to continue scanning for malware.

When finished, it shall produce a log for you. Please include the C:\ComboFix.txt using Copy / Paste in your next reply.

Notes:

1.Do not mouse-click Combofix's window while it is running. That may cause it to stall.

2. ComboFix may reset a number of Internet Explorer's settings, including making I-E the default browser.

3. Combofix prevents autorun of ALL CD, floppy and USB devices to assist with malware removal & increase security. If this is an issue or makes it difficult for you -- please tell your helper.

4. CF disconnects your machine from the internet. The connection is automatically restored before CF completes its run. If CF runs into difficulty and terminates prematurely, the connection can be manually restored by restarting your machine.

Give it atleast 20-30 minutes to finish if needed.

Please do not attach the scan results from Combofx. Use copy/paste.

Also please describe how your computer behaves at the moment.

Link to post
Share on other sites

post-32477-1261866970.gif

If need be, Download the tools needed to a flash drive or other USB device, and transfer them to the infected computer.

DO NOT use any TOOLS such as Combofix, or HijackThis fixes without supervision.

Doing so could make your pc inoperatible and could require a full reinstall of your OS, losing all your programs and data.

Vista and Windows 7 users:

1. These tools MUST be run from the executable. (.exe) every time you run them

2. With Admin Rights (Right click, choose "Run as Administrator")

Stay with this topic until I give you the all clean post.

You might want to print these instructions out.

I suggest you do this:

Download Combofix from any of the links below but rename it to iexplore.exe before saving it to your desktop.

If need be, Download the tools needed to a flash drive or other USB device, and transfer them to the infected computer.

Note:

If combofix (iexplore.exe) won't run from the desktop, try running it from the USB device.

Link 1

Link 2 If using this link, Right Click and select Save As.

* IMPORTANT !!! Save iexplore.exe to your Desktop

Double click on the iexplore.exe ComboFix.exe & follow the prompts.

Be sure to download any updates.

  • When finished, it will produce a report for you.
  • Please post the C:\ComboFix.txt so we can continue cleaning the system.

  • Disable your AntiVirus and AntiSpyware applications, usually via a right click on the System Tray icon. They may otherwise interfere with our tools. Note: If you are having difficulty properly disabling your protective programs, or are unsure as to what programs need to be disabled, please refer to the information available through this link : Protective Programs
  • Double click on ComboFix.exe & follow the prompts.
    Notes: Combofix will run without the Recovery Console installed. Skip the Recovery Console part if you're running Vista or Windows 7.
    Note: If you have SP3, use the SP2 package.
    If Vista or Windows 7, skip the Recovery Console part
  • As part of it's process, ComboFix will check to see if the Microsoft Windows Recovery Console is installed. With malware infections being as they are today, it's strongly recommended to have this pre-installed on your machine before doing any malware removal. It will allow you to boot up into a special recovery/repair mode that will allow us to more easily help you should your computer have a problem after an attempted removal of malware.
  • Follow the prompts to allow ComboFix to download and install the Microsoft Windows Recovery Console, and when prompted, agree to the End-User License Agreement to install the Microsoft Windows Recovery Console.

**Please note: If the Microsoft Windows Recovery Console is already installed, ComboFix will continue it's malware removal procedures.

RC1.png

Once the Microsoft Windows Recovery Console is installed using ComboFix, you should see the following message:

RC2-1.png

Click on Yes, to continue scanning for malware.

When finished, it shall produce a log for you. Please include the C:\ComboFix.txt using Copy / Paste in your next reply.

Notes:

1.Do not mouse-click Combofix's window while it is running. That may cause it to stall.

2. ComboFix may reset a number of Internet Explorer's settings, including making I-E the default browser.

3. Combofix prevents autorun of ALL CD, floppy and USB devices to assist with malware removal & increase security. If this is an issue or makes it difficult for you -- please tell your helper.

4. CF disconnects your machine from the internet. The connection is automatically restored before CF completes its run. If CF runs into difficulty and terminates prematurely, the connection can be manually restored by restarting your machine.

Give it atleast 20-30 minutes to finish if needed.

Please do not attach the scan results from Combofx. Use copy/paste.

Also please describe how your computer behaves at the moment.

Thank you for the speedy reply. You have no idea how much I appreciate your response. Here is the ComboFix Log you requested:

ComboFix 12-01-03.08 - Dennis 01/04/2012 8:24.1.1 - x86

Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.1406.1049 [GMT -5:00]

Running from: E:\iexplore.exe.exe

.

.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))

.

.

C:\RECYCLER(2)

c:\recycler(2)\S-1-5-21-1757981266-920026266-839522115-1003(2)\INFO2

.

c:\windows\system32\drivers\afd.sys was missing

Restored copy from - c:\windows\system32\dllcache\afd.sys

.

.

((((((((((((((((((((((((( Files Created from 2011-12-04 to 2012-01-04 )))))))))))))))))))))))))))))))

.

.

2012-01-04 13:31 . 2011-08-17 13:49 138496 -c--a-w- c:\windows\system32\dllcache\afd.sys

2012-01-04 13:31 . 2011-08-17 13:49 138496 ----a-w- c:\windows\system32\drivers\afd.sys

2011-12-27 13:30 . 2011-12-29 04:19 181064 ----a-w- c:\windows\PSEXESVC.EXE

2011-12-27 13:24 . 2011-12-27 13:24 -------- d-----w- c:\program files\Tweaking.com

2011-12-27 12:38 . 2011-12-27 12:40 -------- d-----w- c:\program files\HitmanPro

2011-12-27 12:36 . 2011-12-27 12:36 -------- d-----w- c:\documents and settings\All Users\Application Data\HitmanPro

2011-12-24 01:49 . 2011-12-24 01:49 -------- d-----w- c:\documents and settings\All Users\Application Data\Hitman Pro

2011-12-23 03:10 . 2011-12-23 03:10 -------- d-----w- c:\documents and settings\jason\Application Data\SUPERAntiSpyware.com

2011-12-23 03:06 . 2011-12-23 03:06 -------- d-----w- c:\documents and settings\jason\Local Settings\Application Data\Mozilla

2011-12-22 07:29 . 2011-12-28 13:35 -------- d-----w- c:\windows\system32\wbem\Repository

2011-12-22 04:03 . 2011-12-22 04:05 -------- d-----w- c:\program files\SUPERAntiSpyware

2011-12-22 00:47 . 2011-12-22 00:47 -------- d-----w- c:\program files\Xirrus

2011-12-22 00:47 . 2011-12-22 00:47 -------- d-----w- c:\documents and settings\Dennis\Local Settings\Application Data\Downloaded Installations

2011-12-21 07:16 . 2008-04-13 19:40 62976 -c--a-w- c:\windows\system32\dllcache\cdrom.sys

2011-12-21 07:16 . 2008-04-13 19:40 62976 ----a-w- c:\windows\system32\drivers\cdrom.sys

2011-12-21 06:01 . 2011-11-23 00:38 253096 ----a-w- c:\windows\system32\drivers\pctgntdi.sys

2011-12-21 06:00 . 2011-11-23 00:41 17848 ----a-w- c:\windows\system32\drivers\pctBTFix.sys

2011-12-21 05:59 . 2011-12-21 08:01 -------- d-----w- c:\program files\PC Tools

2011-12-21 05:52 . 2011-10-07 22:52 660992 ----a-w- c:\windows\system32\drivers\pctEFA.sys

2011-12-21 05:52 . 2011-10-07 22:52 341656 ----a-w- c:\windows\system32\drivers\pctDS.sys

2011-12-21 05:52 . 2011-11-14 20:12 331880 ----a-w- c:\windows\system32\drivers\PCTCore.sys

2011-12-21 05:52 . 2011-11-14 20:12 162584 ----a-w- c:\windows\system32\drivers\PCTAppEvent.sys

2011-12-21 05:50 . 2011-12-21 05:50 -------- d-----w- c:\documents and settings\Dennis\Application Data\TestApp

2011-12-14 13:31 . 2011-12-14 13:31 -------- d-----w- c:\program files\Common Files\Bitdefender

2011-12-13 07:40 . 2011-12-13 07:40 -------- d-----w- C:\found.001

2011-12-12 20:06 . 2011-06-21 04:09 200976 ----a-w- c:\windows\system32\drivers\tmcomm.sys

2011-12-12 16:41 . 2011-12-12 16:41 -------- d-----w- c:\program files\ESET

2011-12-11 05:31 . 2011-12-11 05:31 -------- d-----w- c:\documents and settings\Dennis\Application Data\AVG

2011-12-10 20:05 . 2011-12-13 07:43 -------- d-----w- c:\documents and settings\All Users\Application Data\AVG2012

2011-12-07 11:14 . 2011-12-10 21:10 -------- d-----w- c:\documents and settings\All Users\Application Data\WRData

.

.

.

(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))

.

2011-12-04 03:19 . 2011-05-17 16:42 414368 ----a-w- c:\windows\system32\FlashPlayerCPLApp.cpl

2011-11-23 00:43 . 2011-04-28 10:48 70536 ----a-w- c:\windows\system32\drivers\pctplsg.sys

2011-11-23 00:42 . 2011-04-28 10:49 185560 ----a-w- c:\windows\system32\drivers\PCTSD.sys

2011-10-24 19:29 . 2011-10-24 19:29 94208 ----a-w- c:\windows\system32\QuickTimeVR.qtx

2011-10-24 19:29 . 2011-10-24 19:29 69632 ----a-w- c:\windows\system32\QuickTime.qts

2011-10-10 14:22 . 2010-09-13 19:38 692736 ----a-w- c:\windows\system32\inetcomm.dll

2011-11-21 04:04 . 2011-12-03 16:59 134104 ----a-w- c:\program files\mozilla firefox\components\browsercomps.dll

.

.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))

.

.

*Note* empty entries & legit default entries are not shown

REGEDIT4

.

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]

"StartCCC"="c:\program files\ATI Technologies\ATI.ACE\Core-Static\CLIStart.exe" [2006-11-10 90112]

"QuickTime Task"="c:\program files\QuickTime\qttask.exe" [2011-10-24 421888]

"Messenger (Yahoo!)"="c:\program files\Yahoo!\Messenger\YahooMessenger.exe" [2011-11-24 6497592]

.

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]

"SigmatelSysTrayApp"="c:\program files\SigmaTel\C-Major Audio\WDM\stsystra.exe" [2007-05-10 405504]

"GrooveMonitor"="c:\program files\Microsoft Office\Office12\GrooveMonitor.exe" [2009-02-26 30040]

"SunJavaUpdateSched"="c:\program files\Common Files\Java\Java Update\jusched.exe" [2011-04-08 254696]

"Adobe ARM"="c:\program files\Common Files\Adobe\ARM\1.0\AdobeARM.exe" [2011-03-30 937920]

"TkBellExe"="c:\program files\real\realplayer\update\realsched.exe" [2011-07-15 273544]

"Hpppta"="c:\program files\Hewlett-Packard\HP PrecisionScan\PrecisionScan\hpppta.exe" [2000-02-10 98304]

"Adobe Reader Speed Launcher"="c:\program files\Adobe\Reader 9.0\Reader\Reader_sl.exe" [2011-09-07 37296]

"QuickTime Task"="c:\program files\QuickTime\qttask.exe" [2011-10-24 421888]

"APSDaemon"="c:\program files\Common Files\Apple\Apple Application Support\APSDaemon.exe" [2011-09-27 59240]

.

c:\documents and settings\Dennis\Start Menu\Programs\Startup\

OneNote 2007 Screen Clipper and Launcher.lnk - c:\program files\Microsoft Office\Office12\ONENOTEM.EXE [2009-2-26 97680]

.

c:\documents and settings\jason\Start Menu\Programs\Startup\

OneNote 2007 Screen Clipper and Launcher.lnk - c:\program files\Microsoft Office\Office12\ONENOTEM.EXE [2009-2-26 97680]

.

c:\documents and settings\All Users\Start Menu\Programs\Startup\

Windows Search.lnk - c:\program files\Windows Desktop Search\WindowsSearch.exe [2008-5-26 123904]

.

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\system]

"ConsentPromptBehaviorAdmin"= 5 (0x5)

"ConsentPromptBehaviorUser"= 3 (0x3)

.

[hkey_local_machine\software\microsoft\windows\currentversion\explorer\ShellExecuteHooks]

"{56F9679E-7826-4C84-81F3-532071A8BCC5}"= "c:\program files\Windows Desktop Search\MSNLNamespaceMgr.dll" [2009-05-25 304128]

"{5AE067D3-9AFB-48E0-853A-EBB7F4A000DA}"= "c:\program files\SUPERAntiSpyware\SASSEH.DLL" [2011-07-19 113024]

.

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\!SASWinLogon]

2011-05-04 17:54 551296 ----a-w- c:\program files\SUPERAntiSpyware\SASWINLO.DLL

.

[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\session manager]

BootExecute REG_MULTI_SZ autocheck autochk *\0aswBoot.exe /A:* /L:1033 /heur:100 /RA:ask /pup /archives /IA:0 /KBD:2 /dir:C:\Program

.

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run-]

"Adobe Reader Speed Launcher"="c:\program files\Adobe\Reader 9.0\Reader\Reader_sl.exe"

"QuickTime Task"="c:\program files\QuickTime\qttask.exe" -atboottime

.

[HKEY_LOCAL_MACHINE\software\microsoft\security center]

"AntiVirusOverride"=dword:00000001

"FirewallOverride"=dword:00000001

.

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\TrendAntiVirus]

"DisableMonitoring"=dword:00000001

.

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]

"EnableFirewall"= 0 (0x0)

"DisableNotifications"= 1 (0x1)

.

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]

"c:\\Program Files\\Microsoft Office\\Office12\\OUTLOOK.EXE"=

"c:\\Program Files\\Microsoft Office\\Office12\\GROOVE.EXE"=

"c:\\Program Files\\Microsoft Office\\Office12\\ONENOTE.EXE"=

"%windir%\\Network Diagnostic\\xpnetdiag.exe"=

"c:\\Program Files\\Bonjour\\mDNSResponder.exe"=

"c:\\Program Files\\Yahoo!\\Messenger\\YahooMessenger.exe"=

"c:\\Documents and Settings\\Dennis\\Local Settings\\Application Data\\Google\\Google Talk Plugin\\googletalkplugin.exe"=

"c:\\Documents and Settings\\jason\\Local Settings\\Application Data\\Google\\Google Talk Plugin\\googletalkplugin.exe"=

"c:\\Program Files\\Messenger\\msmsgs.exe"=

"c:\\WINDOWS\\system32\\dpvsetup.exe"=

"c:\\WINDOWS\\system32\\sessmgr.exe"=

"c:\\Program Files\\Common Files\\Apple\\Apple Application Support\\WebKit2WebProcess.exe"=

.

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\GloballyOpenPorts\List]

"3389:TCP"= 3389:TCP:*:Disabled:@xpsp2res.dll,-22009

.

R1 SASDIFSV;SASDIFSV;c:\program files\SUPERAntiSpyware\sasdifsv.sys [7/22/2011 11:27 AM 12880]

R1 SASKUTIL;SASKUTIL;c:\program files\SUPERAntiSpyware\SASKUTIL.SYS [7/12/2011 4:55 PM 67664]

R2 vseamps;vseamps;c:\program files\Common Files\Authentium\AntiVirus5\vseamps.exe [4/8/2010 3:46 PM 117288]

R2 vsedsps;vsedsps;c:\program files\Common Files\Authentium\AntiVirus5\vsedsps.exe [4/8/2010 3:46 PM 117288]

R2 vseqrts;vseqrts;c:\program files\Common Files\Authentium\AntiVirus5\vseqrts.exe [4/8/2010 3:46 PM 154152]

S0 Lbd;Lbd;c:\windows\system32\DRIVERS\Lbd.sys --> c:\windows\system32\DRIVERS\Lbd.sys [?]

S0 rvieme;rvieme;c:\windows\system32\drivers\gqmhyfv.sys --> c:\windows\system32\drivers\gqmhyfv.sys [?]

S0 teqlmbs;teqlmbs;c:\windows\system32\drivers\rrffymjj.sys --> c:\windows\system32\drivers\rrffymjj.sys [?]

S1 MpKsl2d7155ba;MpKsl2d7155ba;\??\c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{F558D217-BFE6-49CA-B355-4F875AAA619A}\MpKsl2d7155ba.sys --> c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{F558D217-BFE6-49CA-B355-4F875AAA619A}\MpKsl2d7155ba.sys [?]

S1 MpKsl38e5746a;MpKsl38e5746a;\??\c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{251DE65F-7233-44E8-B45B-1267E23A0EF9}\MpKsl38e5746a.sys --> c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{251DE65F-7233-44E8-B45B-1267E23A0EF9}\MpKsl38e5746a.sys [?]

S1 MpKsl470a019a;MpKsl470a019a;\??\c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{DAECF1D8-1E7F-4FA1-8095-3479427A8BBA}\MpKsl470a019a.sys --> c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{DAECF1D8-1E7F-4FA1-8095-3479427A8BBA}\MpKsl470a019a.sys [?]

S1 MpKsl809289e4;MpKsl809289e4;\??\c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{0F5A331C-EC1C-4594-896A-4BE1A2150D56}\MpKsl809289e4.sys --> c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{0F5A331C-EC1C-4594-896A-4BE1A2150D56}\MpKsl809289e4.sys [?]

S1 MpKsl8fe9ba4c;MpKsl8fe9ba4c;\??\c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{D074A15D-B66E-4C43-BD84-818FA319F9E3}\MpKsl8fe9ba4c.sys --> c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{D074A15D-B66E-4C43-BD84-818FA319F9E3}\MpKsl8fe9ba4c.sys [?]

S1 MpKsld8a82ed5;MpKsld8a82ed5;\??\c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{4D6CD320-C070-4584-9AAD-776B4406832E}\MpKsld8a82ed5.sys --> c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{4D6CD320-C070-4584-9AAD-776B4406832E}\MpKsld8a82ed5.sys [?]

S1 MpKslf57f8483;MpKslf57f8483;\??\c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{56B62D81-4C5C-4D34-8A42-65AE003AC76D}\MpKslf57f8483.sys --> c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{56B62D81-4C5C-4D34-8A42-65AE003AC76D}\MpKslf57f8483.sys [?]

S3 esihdrv;esihdrv;\??\c:\docume~1\jason\LOCALS~1\Temp\esihdrv.sys --> c:\docume~1\jason\LOCALS~1\Temp\esihdrv.sys [?]

S3 kvnet;Kerio Virtual Network Adapter;c:\windows\system32\drivers\kvnet.sys [3/23/2009 9:25 AM 36912]

S3 kwflower;Kerio WinRoute Firewall Driver - Lower Layer;c:\windows\system32\DRIVERS\kwflower.sys --> c:\windows\system32\DRIVERS\kwflower.sys [?]

S3 Lavasoft Kernexplorer;Lavasoft helper driver;\??\c:\program files\Lavasoft\Ad-Aware\KernExplorer.sys --> c:\program files\Lavasoft\Ad-Aware\KernExplorer.sys [?]

S3 netfilter;Netfilter;c:\windows\system32\DRIVERS\netfilter.sys --> c:\windows\system32\DRIVERS\netfilter.sys [?]

S3 Revoflt;Revoflt;c:\windows\system32\drivers\revoflt.sys [9/7/2011 1:34 PM 27064]

.

Contents of the 'Scheduled Tasks' folder

.

2012-01-03 c:\windows\Tasks\AppleSoftwareUpdate.job

- c:\program files\Apple Software Update\SoftwareUpdate.exe [2011-06-01 21:57]

.

2012-01-04 c:\windows\Tasks\GoogleUpdateTaskUserS-1-5-21-1757981266-920026266-839522115-1003Core.job

- c:\documents and settings\Dennis\Local Settings\Application Data\Google\Update\GoogleUpdate.exe [2010-11-13 11:51]

.

2012-01-04 c:\windows\Tasks\GoogleUpdateTaskUserS-1-5-21-1757981266-920026266-839522115-1003UA.job

- c:\documents and settings\Dennis\Local Settings\Application Data\Google\Update\GoogleUpdate.exe [2010-11-13 11:51]

.

2012-01-03 c:\windows\Tasks\GoogleUpdateTaskUserS-1-5-21-1757981266-920026266-839522115-1005Core.job

- c:\documents and settings\jason\Local Settings\Application Data\Google\Update\GoogleUpdate.exe [2010-09-15 07:54]

.

2012-01-04 c:\windows\Tasks\GoogleUpdateTaskUserS-1-5-21-1757981266-920026266-839522115-1005UA.job

- c:\documents and settings\jason\Local Settings\Application Data\Google\Update\GoogleUpdate.exe [2010-09-15 07:54]

.

2012-01-04 c:\windows\Tasks\RealUpgradeLogonTaskS-1-5-21-1757981266-920026266-839522115-1003.job

- c:\program files\Real\RealUpgrade\realupgrade.exe [2011-03-29 14:47]

.

2012-01-04 c:\windows\Tasks\RealUpgradeLogonTaskS-1-5-21-1757981266-920026266-839522115-1005.job

- c:\program files\Real\RealUpgrade\realupgrade.exe [2011-03-29 14:47]

.

2012-01-03 c:\windows\Tasks\RealUpgradeScheduledTaskS-1-5-21-1757981266-920026266-839522115-1003.job

- c:\program files\Real\RealUpgrade\realupgrade.exe [2011-03-29 14:47]

.

2011-12-23 c:\windows\Tasks\RealUpgradeScheduledTaskS-1-5-21-1757981266-920026266-839522115-1005.job

- c:\program files\Real\RealUpgrade\realupgrade.exe [2011-03-29 14:47]

.

.

------- Supplementary Scan -------

.

TCP: DhcpNameServer = 10.0.0.1

.

- - - - ORPHANS REMOVED - - - -

.

Toolbar-Locked - (no file)

ShellIconOverlayIdentifiers-{33C9E362-3EDA-4930-8AFE-5DA39A8BB77A} - (no file)

.

.

.

**************************************************************************

.

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net

Rootkit scan 2012-01-04 09:35

Windows 5.1.2600 Service Pack 3 NTFS

.

scanning hidden processes ...

.

scanning hidden autostart entries ...

.

scanning hidden files ...

.

scan completed successfully

hidden files: 0

.

**************************************************************************

.

--------------------- DLLs Loaded Under Running Processes ---------------------

.

- - - - - - - > 'winlogon.exe'(524)

c:\program files\SUPERAntiSpyware\SASWINLO.DLL

c:\windows\system32\WININET.dll

c:\windows\system32\Ati2evxx.dll

.

- - - - - - - > 'explorer.exe'(3184)

c:\windows\system32\WININET.dll

c:\windows\WinSxS\x86_Microsoft.VC80.CRT_1fc8b3b9a1e18e3b_8.0.50727.6195_x-ww_44262b86\MSVCR80.dll

c:\windows\system32\ieframe.dll

c:\windows\system32\webcheck.dll

c:\windows\system32\WPDShServiceObj.dll

c:\windows\system32\PortableDeviceTypes.dll

c:\windows\system32\PortableDeviceApi.dll

.

------------------------ Other Running Processes ------------------------

.

c:\windows\system32\Ati2evxx.exe

c:\windows\system32\Ati2evxx.exe

c:\program files\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe

c:\program files\Bonjour\mDNSResponder.exe

c:\program files\Common Files\Microsoft Shared\VS7DEBUG\mdm.exe

c:\windows\system32\StacSV.exe

c:\windows\system32\SearchIndexer.exe

c:\program files\Yahoo!\SoftwareUpdate\YahooAUService.exe

c:\program files\Windows Media Player\wmpnetwk.exe

c:\program files\ATI Technologies\ATI.ACE\Core-Static\MOM.EXE

c:\program files\ATI Technologies\ATI.ACE\Core-Static\ccc.exe

c:\program files\Yahoo!\Messenger\ymsgr_tray.exe

c:\windows\system32\msiexec.exe

c:\progra~1\COMMON~1\MICROS~1\DW\DW20.EXE

.

**************************************************************************

.

Completion time: 2012-01-04 09:43:01 - machine was rebooted

ComboFix-quarantined-files.txt 2012-01-04 14:42

ComboFix2.txt 2011-12-21 07:23

.

Pre-Run: 188,068,507,648 bytes free

Post-Run: 188,029,792,256 bytes free

.

- - End Of File - - DD17513BB4154F6F89406EE8BAAB9822

Link to post
Share on other sites

Due to the lack of feedback this topic is closed to prevent others from posting here. If you need this topic reopened, please send a Private Message to any one of the moderating team members. Please include a link to this thread with your request. This applies only to the originator of this thread.

Other members who need assistance please start your own topic in a new thread. Thanks!

Link to post
Share on other sites

Guest
This topic is now closed to further replies.
  • Recently Browsing   0 members

    • No registered users viewing this page.
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.