skippy Posted March 25, 2009 ID:67230 Share Posted March 25, 2009 My AVG can't contain the virus; also tried to download Malwarebytes software, but it will not open after instalation. (I made sure that the AVG resident shield was de-activated, and the program was closed).Here is my HJT log:Logfile of Trend Micro HijackThis v2.0.0 (BETA)Scan saved at 10:44:24 PM, on 3/24/2009Platform: Windows XP SP3 (WinNT 5.01.2600)Boot mode: NormalRunning processes:C:\WINDOWS\System32\smss.exeC:\WINDOWS\system32\winlogon.exeC:\WINDOWS\system32\services.exeC:\WINDOWS\system32\lsass.exeC:\WINDOWS\system32\svchost.exeC:\WINDOWS\System32\svchost.exeC:\WINDOWS\System32\WLTRYSVC.EXEC:\WINDOWS\System32\bcmwltry.exeC:\WINDOWS\system32\spoolsv.exeC:\WINDOWS\System32\svchost.exeC:\WINDOWS\System32\svchost.exeC:\WINDOWS\system32\svchost.exeC:\WINDOWS\Explorer.EXEC:\WINDOWS\system32\ctfmon.exeC:\Program Files\Synaptics\SynTP\SynTPEnh.exeC:\WINDOWS\system32\WLTRAY.exeC:\WINDOWS\stsystra.exeC:\Program Files\Digital Line Detect\DLG.exeC:\Program Files\ATI Technologies\ATI.ACE\CLI.EXEC:\Program Files\ATI Technologies\ATI.ACE\cli.exeC:\PROGRA~1\AVG\AVG8\avgwdsvc.exeC:\PROGRA~1\AVG\AVG8\avgrsx.exeC:\PROGRA~1\AVG\AVG8\avgnsx.exeC:\PROGRA~1\AVG\AVG8\avgemc.exeC:\Program Files\AVG\AVG8\avgcsrvx.exeC:\Program Files\Internet Explorer\IEXPLORE.EXEC:\Program Files\Internet Explorer\Iexplore.exeC:\Program Files\HiJackThis_v2.exeR0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant = R0 - HKLM\Software\Microsoft\Internet Explorer\Search,CustomizeSearch = O2 - BHO: HP Print Enhancer - {0347C33E-8762-4905-BF09-768834316C61} - C:\Program Files\HP\Digital Imaging\Smart Web Printing\hpswp_printenhancer.dllO2 - BHO: WormRadar.com IESiteBlocker.NavFilter - {3CA2F312-6F6E-4B53-A66E-4E65E497C8C0} - C:\Program Files\AVG\AVG8\avgssie.dllO2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.5.0_06\bin\ssv.dllO2 - BHO: HP Smart BHO Class - {FFFFFFFF-CF4E-4F2B-BDC2-0E72E116A856} - C:\Program Files\HP\Digital Imaging\Smart Web Printing\hpswp_BHO.dllO4 - HKLM\..\Run: [synTPEnh] C:\Program Files\Synaptics\SynTP\SynTPEnh.exeO4 - HKLM\..\Run: [broadcom Wireless Manager UI] C:\WINDOWS\system32\WLTRAY.exeO4 - HKLM\..\Run: [sigmatelSysTrayApp] stsystra.exeO4 - HKLM\..\Run: [DVDLauncher] "C:\Program Files\CyberLink\PowerDVD\DVDLauncher.exe"O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottimeO4 - HKLM\..\Run: [ATICCC] "C:\Program Files\ATI Technologies\ATI.ACE\CLIStart.exe"O4 - HKLM\..\Run: [AVG8_TRAY] C:\PROGRA~1\AVG\AVG8\avgtray.exeO4 - HKLM\..\RunOnce: [Malwarebytes' Anti-Malware] C:\Program Files\Malwarebytes' Anti-Malware\mbamgui.exe /install /silentO4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exeO4 - Global Startup: Digital Line Detect.lnk = ?O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe (file missing)O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe (file missing)O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exeO9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exeO16 - DPF: {0CCA191D-13A6-4E29-B746-314DEE697D83} (Facebook Photo Uploader 5 Control) - http://upload.facebook.com/controls/2008.1...toUploader5.cabO16 - DPF: {406B5949-7190-4245-91A9-30A17DE16AD0} (Snapfish Activia) - http://photos.walmart.com/WalmartActivia.cabO16 - DPF: {5C6698D9-7BE4-4122-8EC5-291D84DBD4A0} (Facebook Photo Uploader 4 Control) - http://upload.facebook.com/controls/Facebo...toUploader3.cabO16 - DPF: {5F8469B4-B055-49DD-83F7-62B522420ECC} (Facebook Photo Uploader Control) - http://upload.facebook.com/controls/Facebo...otoUploader.cabO18 - Protocol: linkscanner - {F274614C-63F8-47D5-A4D1-FBDDE494F8D1} - C:\Program Files\AVG\AVG8\avgpp.dllO20 - Winlogon Notify: avgrsstarter - C:\WINDOWS\SYSTEM32\avgrsstx.dllO22 - SharedTaskScheduler: Browseui preloader - {438755C2-A8BA-11D1-B96B-00A0C90312E1} - C:\WINDOWS\system32\browseui.dllO22 - SharedTaskScheduler: Component Categories cache daemon - {8C7461EF-2B13-11d2-BE35-3078302C2030} - C:\WINDOWS\system32\browseui.dllO23 - Service: AVG Free8 E-mail Scanner (avg8emc) - AVG Technologies CZ, s.r.o. - C:\PROGRA~1\AVG\AVG8\avgemc.exeO23 - Service: AVG Free8 WatchDog (avg8wd) - AVG Technologies CZ, s.r.o. - C:\PROGRA~1\AVG\AVG8\avgwdsvc.exeO23 - Service: DSBrokerService - Unknown owner - C:\Program Files\DellSupport\brkrsvc.exeO23 - Service: Dell Wireless WLAN Tray Service (wltrysvc) - Unknown owner - C:\WINDOWS\System32\WLTRYSVC.EXE--End of file - 4655 bytesHELP! Link to post Share on other sites More sharing options...
skippy Posted March 25, 2009 Author ID:67363 Share Posted March 25, 2009 Ok, well...found some great advise on this link:http://www.malwarebytes.org/forums/index.php?showtopic=12709Turned out to be a 'CLB Rootkit' infection. Ran the RootRepeal scan, wiped the CLB driver, and was then finally able to install and run malwarebytes software. Found and eliminated 6 viruses and now it seems that I'm good to go! My symptoms were as follows:Symptoms of infection.1)MBAM will not install or run if already installed.2)Other security tools also will not install or run if already installed.3)Some installed security softwares that are able to still run will not update.4)Some wellknown security/vendor sites are inaccesible as they are being blocked.Just thought I'd share in case others were having similar issues.Anyone know where the virus might have come from? Anything I can do to just make sure it is really gone, and I'm good to go?Thanks! Link to post Share on other sites More sharing options...
Fatdcuk Posted March 25, 2009 ID:67367 Share Posted March 25, 2009 Hi ya,Glad to hear you have yanked the CLB driver If possible i would like to see the MBAM quick scan log after CLB was nuked!Lets have alooksee with another powerful diagnostic tool if there is any more infection components left.STEP 01Please visit this webpage for instructions for downloading ComboFix to your DESKTOP : how-to-use-combofixPlease ensure you read this guide carefully and install the Recovery Console first.NOTE!!: You must save and run ComboFix.exe on your DESKTOP and not from any other folder.Also, DO NOT click the mouse or launch any other applications while this is running or it may stall the programAdditional links to download the tool:ComboFix.exeComboFix.exeComboFix.exehttp://www.forospyware.com/sUBs/ComboFix.exe' rel="external nofollow">Note: The Windows Recovery Console will allow you to boot up into a special recovery (repair) mode. This allows us to more easily help you should your computer have a problem after an attempted removal of malware. It is a simple procedure that will only take a few moments of your time.Once installed, you should see a blue screen prompt that says:The Recovery Console was successfully installed.Please continue as follows:Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.Click Yes to allow ComboFix to continue scanning for malware.When the tool is finished, it will produce a report for you.Please post the C:\ComboFix.txt along with a new HijackThis log so we may continue cleaning the system. Link to post Share on other sites More sharing options...
skippy Posted March 25, 2009 Author ID:67375 Share Posted March 25, 2009 Great! Thanks for the help! I've done a bit more research, and it seems I may not be out of the woods quite yet...I'll post the MBAT log ASAP!Thanks again - Link to post Share on other sites More sharing options...
skippy Posted March 25, 2009 Author ID:67444 Share Posted March 25, 2009 Ok, here is my MBAM log...I'm about to go through the combofix procedure. Will post the logs asap.Malwarebytes' Anti-Malware 1.34Database version: 1897Windows 5.1.2600 Service Pack 33/25/2009 12:46:59 PMmbam-log-2009-03-25 (12-46-59).txtScan type: Quick ScanObjects scanned: 84572Time elapsed: 9 minute(s), 2 second(s)Memory Processes Infected: 0Memory Modules Infected: 0Registry Keys Infected: 1Registry Values Infected: 0Registry Data Items Infected: 0Folders Infected: 0Files Infected: 11Memory Processes Infected:(No malicious items detected)Memory Modules Infected:(No malicious items detected)Registry Keys Infected:HKEY_LOCAL_MACHINE\SOFTWARE\UAC (Rootkit.Trace) -> Quarantined and deleted successfully.Registry Values Infected:(No malicious items detected)Registry Data Items Infected:(No malicious items detected)Folders Infected:(No malicious items detected)Files Infected:C:\WINDOWS\system32\UACdpepdwer.dll (Trojan.TDSS) -> Quarantined and deleted successfully.C:\WINDOWS\system32\UACmqrtnlfm.dll (Trojan.TDSS) -> Quarantined and deleted successfully.C:\WINDOWS\system32\UACqerxrcbk.dll (Rootkit.TDSS) -> Quarantined and deleted successfully.C:\WINDOWS\system32\UACvmyqgdyl.dll (Rootkit.TDSS) -> Quarantined and deleted successfully.C:\WINDOWS\system32\UACymucbuje.dll (Trojan.TDSS) -> Quarantined and deleted successfully.C:\Documents and Settings\Mum\Local Settings\Temp\UAC1c52.tmp (Rootkit.TDSS) -> Quarantined and deleted successfully.C:\WINDOWS\system32\uacinit.dll (Trojan.Agent) -> Quarantined and deleted successfully.C:\WINDOWS\system32\UACjkswkpxw.log (Trojan.Agent) -> Quarantined and deleted successfully.C:\WINDOWS\system32\UACttpiqllo.dat (Trojan.Agent) -> Quarantined and deleted successfully.C:\WINDOWS\system32\UACxeoexjkb.dll (Trojan.Agent) -> Quarantined and deleted successfully.C:\WINDOWS\system32\drivers\UACkvpsrfvk.sys (Trojan.Agent) -> Quarantined and deleted successfully. Link to post Share on other sites More sharing options...
skippy Posted March 25, 2009 Author ID:67452 Share Posted March 25, 2009 Ok, here is the ComboFix log (first) and the HJT log (second).ComboFix 09-03-23.01 - Mum 2009-03-25 17:21:53.1 - NTFSx86Microsoft Windows XP Home Edition 5.1.2600.3.1252.1.1033.18.894.529 [GMT -4:00]Running from: c:\documents and settings\Mum\Desktop\ComboFix.exeAV: AVG Anti-Virus Free *On-access scanning disabled* (Updated) * Created a new restore point.((((((((((((((((((((((((((((((((((((((( Other Deletions ))))))))))))))))))))))))))))))))))))))))))))))))).c:\windows\wiaserviv.log.((((((((((((((((((((((((((((((((((((((( Drivers/Services ))))))))))))))))))))))))))))))))))))))))))))))))).-------\Service_UACd.sys((((((((((((((((((((((((( Files Created from 2009-02-25 to 2009-03-25 ))))))))))))))))))))))))))))))).2009-05-23 12:47 . 2009-03-24 21:30 <DIR> d--h----- C:\$AVG8.VAULT$2009-05-23 12:40 . 2009-03-25 12:51 <DIR> d-------- c:\windows\system32\drivers\Avg2009-05-23 12:40 . 2009-05-23 12:40 325,640 --a------ c:\windows\system32\drivers\avgldx86.sys2009-05-23 12:40 . 2009-05-23 12:40 107,912 --a------ c:\windows\system32\drivers\avgtdix.sys2009-05-23 12:40 . 2009-05-23 12:40 10,520 --a------ c:\windows\system32\avgrsstx.dll2009-05-23 12:39 . 2009-05-23 12:39 <DIR> d-------- c:\program files\AVG2009-05-23 12:39 . 2009-05-23 12:39 <DIR> d-------- c:\documents and settings\All Users\Application Data\avg82009-05-23 07:14 . 2009-05-23 07:14 0 --a------ C:\rollback.ini2009-05-22 22:34 . 2009-05-22 22:34 <DIR> d-------- c:\documents and settings\Mum\Application Data\MailFrontier2009-05-22 21:44 . 2009-03-25 12:06 1,896,749 --a------ c:\windows\system32\uactmp.db2009-03-25 12:36 . 2009-03-25 12:36 <DIR> d-------- c:\documents and settings\Mum\Application Data\Malwarebytes2009-03-24 20:35 . 2009-02-11 10:19 15,504 --a------ c:\windows\system32\drivers\mbam.sys2009-03-24 20:34 . 2009-03-25 12:36 <DIR> d-------- c:\program files\Malwarebytes' Anti-Malware2009-03-24 20:34 . 2009-03-24 20:34 <DIR> d-------- c:\documents and settings\All Users\Application Data\Malwarebytes2009-03-24 20:34 . 2009-02-11 10:19 38,496 --a------ c:\windows\system32\drivers\mbamswissarmy.sys2009-03-19 22:34 . 2009-03-19 22:34 414,144 --a------ c:\windows\system32\UACxwmipmap.db.(((((((((((((((((((((((((((((((((((((((( Find3M Report )))))))))))))))))))))))))))))))))))))))))))))))))))).2009-05-23 15:20 --------- d-----w c:\program files\Google2009-05-23 15:09 --------- d-----w c:\program files\HP2009-05-23 15:06 --------- d--h--w c:\program files\InstallShield Installation Information2009-05-23 15:06 --------- d-----w c:\program files\Pidgin2009-05-23 15:06 --------- d-----w c:\program files\Hasbro Interactive2009-05-23 12:13 --------- d-----w c:\documents and settings\All Users\Application Data\MailFrontier2009-05-23 02:36 --------- d-----w c:\documents and settings\Mum\Application Data\HPAppData2009-05-23 01:51 --------- d-----w c:\documents and settings\All Users\Application Data\Microsoft Help2009-03-25 03:12 --------- d-----w c:\program files\backups2009-03-25 03:09 4,738 ----a-w c:\program files\hijackthis.log2009-03-25 01:13 --------- d-----w c:\documents and settings\Dad\Application Data\HPAppData2009-02-12 12:50 --------- d-----w c:\documents and settings\Dad\Application Data\.purple2009-01-27 00:19 --------- d-----w c:\documents and settings\Mum\Application Data\.purple2007-10-25 00:42 13,411,824 ----a-w c:\program files\Google_Earth_BZXV.exe2007-09-02 04:30 1,308,216 ----a-w c:\program files\HiJackThis_v2.exe2008-07-10 22:54 32,768 --sha-w c:\windows\system32\config\systemprofile\Local Settings\History\History.IE5\MSHist012008071020080711\index.dat.((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))..*Note* empty entries & legit default entries are not shown REGEDIT4[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]"ctfmon.exe"="c:\windows\system32\ctfmon.exe" [2008-04-13 15360][HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]"SynTPEnh"="c:\program files\Synaptics\SynTP\SynTPEnh.exe" [2006-09-22 761947]"Broadcom Wireless Manager UI"="c:\windows\system32\WLTRAY.exe" [2005-12-19 1347584]"DVDLauncher"="c:\program files\CyberLink\PowerDVD\DVDLauncher.exe" [2005-12-09 49152]"QuickTime Task"="c:\program files\QuickTime\qttask.exe" [2007-08-22 98304]"ATICCC"="c:\program files\ATI Technologies\ATI.ACE\CLIStart.exe" [2006-05-10 90112]"AVG8_TRAY"="c:\progra~1\AVG\AVG8\avgtray.exe" [2009-05-23 1932568]"SigmatelSysTrayApp"="stsystra.exe" [2006-09-22 c:\windows\stsystra.exe]c:\documents and settings\Dad\Start Menu\Programs\Startup\OneNote 2007 Screen Clipper and Launcher.lnk - c:\program files\Microsoft Office\Office12\ONENOTEM.EXE [2007-12-07 101440]c:\documents and settings\Mum\Start Menu\Programs\Startup\OneNote 2007 Screen Clipper and Launcher.lnk - c:\program files\Microsoft Office\Office12\ONENOTEM.EXE [2007-12-07 101440]c:\documents and settings\All Users\Start Menu\Programs\Startup\Digital Line Detect.lnk - c:\program files\Digital Line Detect\DLG.exe [2007-08-22 24576][HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\avgrsstarter]2009-05-23 12:40 10520 c:\windows\system32\avgrsstx.dll[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\services]"Ati HotKey Poller"=2 (0x2)[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]"%windir%\\system32\\sessmgr.exe"="c:\\Program Files\\Microsoft Office\\Office12\\ONENOTE.EXE"="%windir%\\Network Diagnostic\\xpnetdiag.exe"="c:\\Program Files\\HP\\Digital Imaging\\bin\\hposid01.exe"="c:\\Program Files\\HP\\Digital Imaging\\bin\\hpiscnapp.exe"="c:\\Program Files\\HP\\Digital Imaging\\bin\\hpqkygrp.exe"="c:\\Program Files\\AVG\\AVG8\\avgemc.exe"="c:\\Program Files\\AVG\\AVG8\\avgupd.exe"="c:\\Program Files\\AVG\\AVG8\\avgnsx.exe"=R1 AvgLdx86;AVG Free AVI Loader Driver x86;c:\windows\system32\drivers\avgldx86.sys [2009-05-23 325640]R1 AvgTdiX;AVG Free8 Network Redirector;c:\windows\system32\drivers\avgtdix.sys [2009-05-23 107912]--- Other Services/Drivers In Memory ---*Deregistered* - ALG*Deregistered* - AudioSrv*Deregistered* - avg8emc*Deregistered* - avg8wd*Deregistered* - Browser*Deregistered* - CryptSvc*Deregistered* - DcomLaunch*Deregistered* - Dhcp*Deregistered* - Dnscache*Deregistered* - ERSvc*Deregistered* - EventSystem*Deregistered* - FastUserSwitchingCompatibility*Deregistered* - helpsvc*Deregistered* - ImapiService*Deregistered* - lanmanserver*Deregistered* - lanmanworkstation*Deregistered* - LmHosts*Deregistered* - Net Driver HPZ12*Deregistered* - Netman*Deregistered* - Nla*Deregistered* - Pml Driver HPZ12*Deregistered* - PolicyAgent*Deregistered* - ProtectedStorage*Deregistered* - RasMan*Deregistered* - RpcSs*Deregistered* - SamSs*Deregistered* - Schedule*Deregistered* - seclogon*Deregistered* - SENS*Deregistered* - SharedAccess*Deregistered* - ShellHWDetection*Deregistered* - Spooler*Deregistered* - srservice*Deregistered* - stisvc*Deregistered* - TapiSrv*Deregistered* - TermService*Deregistered* - Themes*Deregistered* - TrkWks*Deregistered* - w32time*Deregistered* - WebClient*Deregistered* - winmgmt*Deregistered* - wltrysvc*Deregistered* - WmiApSrv*Deregistered* - wscsvc*Deregistered* - wuauserv*Deregistered* - WZCSVC[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\svchost]HPZ12 REG_MULTI_SZ Pml Driver HPZ12 Net Driver HPZ12..------- Supplementary Scan -------.uStart Page = hxxp://www.google.com/.**************************************************************************catchme 0.3.1367 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.netRootkit scan 2009-03-25 17:27:34Windows 5.1.2600 Service Pack 3 NTFSscanning hidden processes ... scanning hidden autostart entries ... scanning hidden files ... scan completed successfullyhidden files: 0**************************************************************************.--------------------- DLLs Loaded Under Running Processes ---------------------- - - - - - - > 'winlogon.exe'(800)c:\windows\system32\Ati2evxx.dllc:\windows\System32\BCMLogon.dll- - - - - - - > 'Explorer.EXE'(236)c:\windows\system32\WPDShServiceObj.dllc:\windows\system32\PortableDeviceTypes.dllc:\windows\system32\PortableDeviceApi.dll.------------------------ Other Running Processes ------------------------.c:\windows\system32\WLTRYSVC.EXEc:\windows\system32\BCMWLTRY.EXEc:\progra~1\AVG\AVG8\avgwdsvc.exec:\program files\AVG\AVG8\avgrsx.exec:\progra~1\AVG\AVG8\avgnsx.exec:\progra~1\AVG\AVG8\avgemc.exec:\program files\AVG\AVG8\avgcsrvx.exec:\windows\system32\wscntfy.exec:\program files\AVG\AVG8\avgtray.exec:\program files\ATI Technologies\ATI.ACE\CLI.exec:\program files\ATI Technologies\ATI.ACE\CLI.exec:\windows\system32\wbem\wmiapsrv.exe.**************************************************************************.Completion time: 2009-03-25 17:29:45 - machine was rebootedComboFix-quarantined-files.txt 2009-03-25 21:29:42Pre-Run: 34,907,496,448 bytes freePost-Run: 35,363,422,208 bytes freeWindowsXP-KB310994-SP2-Home-BootDisk-ENU.exe[boot loader]timeout=2default=multi(0)disk(0)rdisk(0)partition(2)\WINDOWS[operating systems]c:\cmdcons\BOOTSECT.DAT="Microsoft Windows Recovery Console" /cmdconsmulti(0)disk(0)rdisk(0)partition(2)\WINDOWS="Microsoft Windows XP Home Edition" /noexecute=optin /fastdetect /usepmtimer191 --- E O F --- 2009-05-23 02:04:01Hijackthis Log:Logfile of Trend Micro HijackThis v2.0.0 (BETA)Scan saved at 5:31:54 PM, on 3/25/2009Platform: Windows XP SP3 (WinNT 5.01.2600)Boot mode: NormalRunning processes:C:\WINDOWS\System32\smss.exeC:\WINDOWS\system32\winlogon.exeC:\WINDOWS\system32\services.exeC:\WINDOWS\system32\lsass.exeC:\WINDOWS\system32\svchost.exeC:\WINDOWS\System32\svchost.exeC:\WINDOWS\System32\WLTRYSVC.EXEC:\WINDOWS\System32\bcmwltry.exeC:\WINDOWS\system32\spoolsv.exeC:\PROGRA~1\AVG\AVG8\avgwdsvc.exeC:\WINDOWS\System32\svchost.exeC:\WINDOWS\System32\svchost.exeC:\PROGRA~1\AVG\AVG8\avgrsx.exeC:\PROGRA~1\AVG\AVG8\avgnsx.exeC:\WINDOWS\system32\svchost.exeC:\PROGRA~1\AVG\AVG8\avgemc.exeC:\Program Files\AVG\AVG8\avgcsrvx.exeC:\WINDOWS\system32\wuauclt.exeC:\WINDOWS\system32\wscntfy.exeC:\Program Files\Synaptics\SynTP\SynTPEnh.exeC:\WINDOWS\system32\WLTRAY.exeC:\WINDOWS\stsystra.exeC:\Program Files\CyberLink\PowerDVD\DVDLauncher.exeC:\PROGRA~1\AVG\AVG8\avgtray.exeC:\Program Files\ATI Technologies\ATI.ACE\CLI.EXEC:\WINDOWS\system32\ctfmon.exeC:\Program Files\Digital Line Detect\DLG.exeC:\Program Files\ATI Technologies\ATI.ACE\cli.exeC:\WINDOWS\system32\notepad.exeC:\WINDOWS\explorer.exeC:\Program Files\Internet Explorer\IEXPLORE.EXEC:\Program Files\HiJackThis_v2.exeR1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157O2 - BHO: HP Print Enhancer - {0347C33E-8762-4905-BF09-768834316C61} - C:\Program Files\HP\Digital Imaging\Smart Web Printing\hpswp_printenhancer.dllO2 - BHO: WormRadar.com IESiteBlocker.NavFilter - {3CA2F312-6F6E-4B53-A66E-4E65E497C8C0} - C:\Program Files\AVG\AVG8\avgssie.dllO2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.5.0_06\bin\ssv.dllO2 - BHO: HP Smart BHO Class - {FFFFFFFF-CF4E-4F2B-BDC2-0E72E116A856} - C:\Program Files\HP\Digital Imaging\Smart Web Printing\hpswp_BHO.dllO4 - HKLM\..\Run: [synTPEnh] C:\Program Files\Synaptics\SynTP\SynTPEnh.exeO4 - HKLM\..\Run: [broadcom Wireless Manager UI] C:\WINDOWS\system32\WLTRAY.exeO4 - HKLM\..\Run: [sigmatelSysTrayApp] stsystra.exeO4 - HKLM\..\Run: [DVDLauncher] "C:\Program Files\CyberLink\PowerDVD\DVDLauncher.exe"O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottimeO4 - HKLM\..\Run: [ATICCC] "C:\Program Files\ATI Technologies\ATI.ACE\CLIStart.exe"O4 - HKLM\..\Run: [AVG8_TRAY] C:\PROGRA~1\AVG\AVG8\avgtray.exeO4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exeO4 - Startup: OneNote 2007 Screen Clipper and Launcher.lnk = C:\Program Files\Microsoft Office\Office12\ONENOTEM.EXEO4 - Global Startup: Digital Line Detect.lnk = ?O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe (file missing)O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe (file missing)O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exeO9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exeO16 - DPF: {0CCA191D-13A6-4E29-B746-314DEE697D83} (Facebook Photo Uploader 5 Control) - http://upload.facebook.com/controls/2008.1...toUploader5.cabO16 - DPF: {406B5949-7190-4245-91A9-30A17DE16AD0} (Snapfish Activia) - http://photos.walmart.com/WalmartActivia.cabO16 - DPF: {5C6698D9-7BE4-4122-8EC5-291D84DBD4A0} (Facebook Photo Uploader 4 Control) - http://upload.facebook.com/controls/Facebo...toUploader3.cabO16 - DPF: {5F8469B4-B055-49DD-83F7-62B522420ECC} (Facebook Photo Uploader Control) - http://upload.facebook.com/controls/Facebo...otoUploader.cabO18 - Protocol: linkscanner - {F274614C-63F8-47D5-A4D1-FBDDE494F8D1} - C:\Program Files\AVG\AVG8\avgpp.dllO20 - Winlogon Notify: avgrsstarter - C:\WINDOWS\SYSTEM32\avgrsstx.dllO22 - SharedTaskScheduler: Browseui preloader - {438755C2-A8BA-11D1-B96B-00A0C90312E1} - C:\WINDOWS\system32\browseui.dllO22 - SharedTaskScheduler: Component Categories cache daemon - {8C7461EF-2B13-11d2-BE35-3078302C2030} - C:\WINDOWS\system32\browseui.dllO23 - Service: AVG Free8 E-mail Scanner (avg8emc) - AVG Technologies CZ, s.r.o. - C:\PROGRA~1\AVG\AVG8\avgemc.exeO23 - Service: AVG Free8 WatchDog (avg8wd) - AVG Technologies CZ, s.r.o. - C:\PROGRA~1\AVG\AVG8\avgwdsvc.exeO23 - Service: DSBrokerService - Unknown owner - C:\Program Files\DellSupport\brkrsvc.exeO23 - Service: Dell Wireless WLAN Tray Service (wltrysvc) - Unknown owner - C:\WINDOWS\System32\WLTRYSVC.EXE--End of file - 5095 bytesThanks for any and all help!!! Link to post Share on other sites More sharing options...
Fatdcuk Posted March 25, 2009 ID:67492 Share Posted March 25, 2009 Ok looking a lot better,MBAM cleared house on what was left of CLB rootkit infection and now HJT log is looking good to go Link to post Share on other sites More sharing options...
skippy Posted March 25, 2009 Author ID:67515 Share Posted March 25, 2009 Great news! Thanks a million!Any advice on how I could prevent this from happening again? I'm thinking of switching browsers (currently I'm on IE7), and just using AVG anti-virus. Any other thoughts? Link to post Share on other sites More sharing options...
Fatdcuk Posted March 26, 2009 ID:67552 Share Posted March 26, 2009 Ok i must admit if i gave you my thoughts then would be long winded post that not to digest freindly lolBut anyhow i have borrowed this from my fellow Malware Researcher and it does provide some very excellent support information and suggestions Please read Prevention page with lots of info and tips how to prevent this in the future.And if you want to improve speed/system performance after malware removal, take a look here.Extra note: Make sure your programs are up to date - because older versions may contain Security Leaks. To find out what programs need to be updated, please run the Secunia Software Inspector Scan.Safe surfing Link to post Share on other sites More sharing options...
Recommended Posts