Jump to content

another can't get rid of files on reboot


Recommended Posts

Hey guys, you have saved my life before, and I am hoping for some good advice this time - Thanks in advance !

Malwarebytes got rid of most of the files related to the latest trojan / virus, but these two remain - says delete on reboot, but they don't delete.

The file changes name with each reboot, but the registry value issue remains the same.

Here is the last Malwarebytes log:

Malwarebytes' Anti-Malware 1.35

Database version: 1904

Windows 5.1.2600 Service Pack 3

3/31/2009 2:33:33 AM

mbam-log-2009-03-31 (02-33-33).txt

Scan type: Quick Scan

Objects scanned: 77778

Time elapsed: 5 minute(s), 34 second(s)

Memory Processes Infected: 0

Memory Modules Infected: 0

Registry Keys Infected: 0

Registry Values Infected: 1

Registry Data Items Infected: 0

Folders Infected: 0

Files Infected: 1

Memory Processes Infected:

(No malicious items detected)

Memory Modules Infected:

(No malicious items detected)

Registry Keys Infected:

(No malicious items detected)

Registry Values Infected:

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\byalunufuqoseje (Trojan.Agent) -> Delete on reboot.

Registry Data Items Infected:

(No malicious items detected)

Folders Infected:

(No malicious items detected)

Files Infected:

C:\WINDOWS\ucobemobel.dll (Trojan.Agent) -> Delete on reboot.

----------------------------------------------------------------------------------------

Here is the Hijack this log:

Logfile of Trend Micro HijackThis v2.0.2

Scan saved at 2:51:49 AM, on 3/31/2009

Platform: Windows XP SP3 (WinNT 5.01.2600)

MSIE: Internet Explorer v6.00 SP3 (6.00.2900.5512)

Boot mode: Normal

Running processes:

C:\WINDOWS\System32\smss.exe

C:\WINDOWS\system32\csrss.exe

C:\WINDOWS\system32\winlogon.exe

C:\WINDOWS\system32\services.exe

C:\WINDOWS\system32\lsass.exe

C:\WINDOWS\system32\svchost.exe

C:\WINDOWS\system32\svchost.exe

C:\WINDOWS\System32\svchost.exe

C:\WINDOWS\system32\svchost.exe

C:\WINDOWS\system32\svchost.exe

C:\WINDOWS\system32\spoolsv.exe

C:\WINDOWS\Explorer.EXE

C:\WINDOWS\ehome\ehtray.exe

C:\Program Files\Intel\Intel Matrix Storage Manager\iaanotif.exe

C:\WINDOWS\RTHDCPL.EXE

C:\WINDOWS\system32\rundll32.exe

C:\Program Files\HP\HP Software Update\HPwuSchd2.exe

C:\Program Files\Trend Micro\Internet Security\UfSeAgnt.exe

C:\WINDOWS\System32\spool\DRIVERS\W32X86\3\E_S4I2D1.EXE

C:\WINDOWS\system32\ctfmon.exe

C:\Program Files\Messenger\msmsgs.exe

C:\Program Files\HP\Digital Imaging\bin\hpqtra08.exe

C:\Program Files\Trend Micro\BM\TMBMSRV.exe

C:\WINDOWS\eHome\ehRecvr.exe

C:\WINDOWS\eHome\ehSched.exe

C:\Program Files\Intel\Intel Matrix Storage Manager\iaantmon.exe

C:\Program Files\Common Files\LightScribe\LSSrvc.exe

C:\Program Files\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE

C:\Program Files\Opera\Opera.exe

C:\WINDOWS\system32\nvsvc32.exe

C:\Program Files\Trend Micro\Internet Security\SfCtlCom.exe

C:\WINDOWS\system32\svchost.exe

C:\Program Files\Trend Micro\Internet Security\TmProxy.exe

C:\WINDOWS\ehome\mcrdsvc.exe

C:\Program Files\Intel\IntelDH\Intel® Quick Resume Technology\ELService.exe

C:\WINDOWS\eHome\ehmsas.exe

C:\WINDOWS\system32\dllhost.exe

C:\WINDOWS\System32\alg.exe

C:\WINDOWS\System32\svchost.exe

C:\HP\KBD\KBD.EXE

c:\windows\system\hpsysdrv.exe

C:\Program Files\Java\jre1.5.0_05\bin\jusched.exe

C:\Program Files\Common Files\InstallShield\UpdateService\issch.exe

C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

C:\WINDOWS\system32\wbem\wmiprvse.exe

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://*.trymedia.com (HKLM)

O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} (WUWebControl Class) - http://www.update.microsoft.com/windowsupd...b?1222132178296

O20 - Winlogon Notify: !SASWinLogon - C:\Program Files\SUPERAntiSpyware\SASWINLO.dll

O20 - Winlogon Notify: pbnnhtxk - C:\WINDOWS\SYSTEM32\tcosglx.dll

O23 - Service: Intel

Link to post
Share on other sites

  • Staff

Hi,

First of all, please update MalwareBytes, because the databaseversion is outdated.

  • Start MalwareBytes and click the Update tab. There click "Check for updates"
  • Once the updates are downloaded, perform a full scan again.
  • The scan may take some time to finish,so please be patient.
  • When the scan is complete, click OK, then Show Results to view the results.
  • Make sure that everything is checked, and click Remove Selected.
  • When disinfection is completed, a log will open in Notepad and you may be prompted to Restart.(See Extra Note)
  • The log is automatically saved by MBAM and can be viewed by clicking the Logs tab in MBAM.
  • Copy&Paste the entire report in your next reply along with a fresh HijackThis log, then we'll proceed from there with new steps.

Extra Note:

If MBAM encounters a file that is difficult to remove,you will be presented with 1 of 2 prompts,click OK to either and let MBAM proceed with the disinfection process,if asked to restart the computer,please do so immediatly.

Link to post
Share on other sites

Thank you for your speedy reply.

Seems this is showing up for a lot of people.

I updated Malwarebytes (funny I did that last night before the scan as well).

I did a full scan.

Here is the Malwarebytes log, followed by the new hijackthis log:

Thank you!

--------------------------------------------------------

Malwarebytes' Anti-Malware 1.35

Database version: 1923

Windows 5.1.2600 Service Pack 3

3/31/2009 8:35:51 AM

mbam-log-2009-03-31 (08-35-51).txt

Scan type: Full Scan (C:\|D:\|)

Objects scanned: 219155

Time elapsed: 56 minute(s), 29 second(s)

Memory Processes Infected: 0

Memory Modules Infected: 0

Registry Keys Infected: 0

Registry Values Infected: 1

Registry Data Items Infected: 0

Folders Infected: 0

Files Infected: 1

Memory Processes Infected:

(No malicious items detected)

Memory Modules Infected:

(No malicious items detected)

Registry Keys Infected:

(No malicious items detected)

Registry Values Infected:

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\byalunufuqoseje (Trojan.Agent) -> Delete on reboot.

Registry Data Items Infected:

(No malicious items detected)

Folders Infected:

(No malicious items detected)

Files Infected:

C:\WINDOWS\abeyurega.dll (Trojan.Agent) -> Delete on reboot.

--------------------------------------------------------------------------------

And here is the HijackThis log:

Logfile of Trend Micro HijackThis v2.0.2

Scan saved at 8:43:06 AM, on 3/31/2009

Platform: Windows XP SP3 (WinNT 5.01.2600)

MSIE: Internet Explorer v6.00 SP3 (6.00.2900.5512)

Boot mode: Normal

Running processes:

C:\WINDOWS\System32\smss.exe

C:\WINDOWS\system32\csrss.exe

C:\WINDOWS\system32\winlogon.exe

C:\WINDOWS\system32\services.exe

C:\WINDOWS\system32\lsass.exe

C:\WINDOWS\system32\svchost.exe

C:\WINDOWS\system32\svchost.exe

C:\WINDOWS\System32\svchost.exe

C:\WINDOWS\system32\svchost.exe

C:\WINDOWS\system32\svchost.exe

C:\WINDOWS\system32\spoolsv.exe

C:\WINDOWS\Explorer.EXE

C:\WINDOWS\ehome\ehtray.exe

C:\Program Files\Intel\Intel Matrix Storage Manager\iaanotif.exe

C:\WINDOWS\system32\rundll32.exe

C:\WINDOWS\RTHDCPL.EXE

C:\Program Files\HP\HP Software Update\HPwuSchd2.exe

C:\Program Files\Trend Micro\Internet Security\UfSeAgnt.exe

C:\WINDOWS\System32\spool\DRIVERS\W32X86\3\E_S4I2D1.EXE

C:\WINDOWS\system32\ctfmon.exe

C:\Program Files\Messenger\msmsgs.exe

C:\Program Files\HP\Digital Imaging\bin\hpqtra08.exe

C:\Program Files\Trend Micro\BM\TMBMSRV.exe

C:\WINDOWS\eHome\ehRecvr.exe

C:\WINDOWS\eHome\ehSched.exe

C:\Program Files\Intel\Intel Matrix Storage Manager\iaantmon.exe

C:\Program Files\Common Files\LightScribe\LSSrvc.exe

C:\Program Files\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE

C:\WINDOWS\system32\nvsvc32.exe

C:\Program Files\Trend Micro\Internet Security\SfCtlCom.exe

C:\WINDOWS\system32\svchost.exe

C:\Program Files\Trend Micro\Internet Security\TmProxy.exe

C:\WINDOWS\ehome\mcrdsvc.exe

C:\Program Files\Intel\IntelDH\Intel® Quick Resume Technology\ELService.exe

C:\WINDOWS\system32\dllhost.exe

C:\WINDOWS\System32\alg.exe

C:\WINDOWS\eHome\ehmsas.exe

C:\WINDOWS\System32\svchost.exe

C:\Program Files\Opera\Opera.exe

C:\WINDOWS\system32\wuauclt.exe

C:\HP\KBD\KBD.EXE

c:\windows\system\hpsysdrv.exe

C:\Program Files\Java\jre1.5.0_05\bin\jusched.exe

C:\Program Files\Common Files\InstallShield\UpdateService\issch.exe

C:\Program Files\Malwarebytes' Anti-Malware\mbam.exe

C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

C:\WINDOWS\system32\wbem\wmiprvse.exe

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://*.trymedia.com (HKLM)

O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} (WUWebControl Class) - http://www.update.microsoft.com/windowsupd...b?1222132178296

O20 - Winlogon Notify: !SASWinLogon - C:\Program Files\SUPERAntiSpyware\SASWINLO.dll

O20 - Winlogon Notify: pbnnhtxk - C:\WINDOWS\SYSTEM32\tcosglx.dll

O23 - Service: Intel

Link to post
Share on other sites

  • Staff

Hi,

* Start HijackThis, close all open windows leaving only HijackThis running. Place a check against each of the following:

O1 - Hosts: ::1 localhost

O1 - Hosts: 91.212.65.122 browser-security.microsoft.com

O1 - Hosts: 91.212.65.122 spyware-protector-2009.com

O1 - Hosts: 91.212.65.122 www.spyware-protector-2009.com

O1 - Hosts: 91.212.65.122 secure.spyware-protector-2009.com

O1 - Hosts: 91.212.65.122 knocker

O2 - BHO: (no name) - {D2DF7C4D-ACF8-403D-BE12-39D1B2B9F360} - c:\windows\system32\tcosglx.dll

O20 - Winlogon Notify: pbnnhtxk - C:\WINDOWS\SYSTEM32\tcosglx.dll

* Click on Fix Checked when finished and exit HijackThis.

Make sure your Internet Explorer is closed when you click Fix Checked!

Don't worry if some entries won't get fixed.

Then, * Please visit this webpage for instructions for downloading and running ComboFix:

http://www.bleepingcomputer.com/combofix/how-to-use-combofix

Post the log from ComboFix in your next reply.

Please make sure you disable ALL of your Antivirus/Antispyware/Firewall before running ComboFix..This because Security Software may see some components ComboFix uses (prep.com for example) as suspicious and blocks the tool, or even deletes it. Please visit HERE if you don't know how.

Link to post
Share on other sites

Thanks for all your help so far.

I did everything exactly as you told me. It was nerve wracking but it seemed to work out okay.

We'll see when I reboot.

I will paste the combofix log below:

When combofix finished, I got a pop up message that said:

To help protect your computer, windows has closed this program.

Name: Run a DLL as an APP

Publisher: Microsoft Corp

I also got some error messages about HP digital imaging. I don't use that anyway, so if it sticks, hopefully if i remove it from the startup, that message will go away, right? That is, if it persists.

Combofix Log:

ComboFix 09-03-31.01 - HP_Administrator 2009-03-31 17:52:25.1 - NTFSx86

Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.2046.1376 [GMT -4:00]

Running from: c:\documents and settings\HP_Administrator\Desktop\ComboFix.exe

AV: Trend Micro AntiVirus *On-access scanning disabled* (Updated)

* Created a new restore point

.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))

.

c:\windows\IE4 Error Log.txt

c:\windows\system32\tcosglx.dll

c:\windows\Tasks\At1.job

D:\Autorun.inf

.

((((((((((((((((((((((((((((((((((((((( Drivers/Services )))))))))))))))))))))))))))))))))))))))))))))))))

.

-------\Legacy_THAMEKDQ

-------\Service_thamekdq

((((((((((((((((((((((((( Files Created from 2009-02-28 to 2009-03-31 )))))))))))))))))))))))))))))))

.

2009-03-31 07:40 . 2009-03-31 07:40 <DIR> d-------- c:\documents and settings\NetworkService\Application Data\rsdatjoo

2009-03-31 07:38 . 2009-03-31 07:38 <DIR> d-------- c:\documents and settings\HP_Administrator\Application Data\rsdatjoo

2009-02-16 12:16 . 2009-02-16 12:49 <DIR> d-------- c:\documents and settings\All Users\Application Data\Spybot - Search & Destroy

2009-02-16 04:48 . 2009-03-31 02:26 <DIR> d-------- c:\program files\Malwarebytes' Anti-Malware

2009-02-16 04:48 . 2009-02-16 04:48 <DIR> d-------- c:\documents and settings\All Users\Application Data\Malwarebytes

2009-02-16 04:48 . 2009-03-26 16:49 38,496 --a------ c:\windows\system32\drivers\mbamswissarmy.sys

2009-02-16 04:48 . 2009-03-26 16:49 15,504 --a------ c:\windows\system32\drivers\mbam.sys

2009-02-15 02:00 . 2009-02-15 02:00 <DIR> d-------- c:\documents and settings\HP_Administrator\Application Data\Malwarebytes

2009-02-15 00:48 . 2009-02-15 00:48 <DIR> d-------- c:\documents and settings\All Users\Application Data\SUPERAntiSpyware.com

2009-02-15 00:46 . 2009-02-15 00:48 <DIR> d-------- c:\program files\SUPERAntiSpyware

2009-02-15 00:46 . 2009-02-15 00:46 <DIR> d-------- c:\program files\Common Files\Wise Installation Wizard

2009-02-15 00:46 . 2009-02-15 00:46 <DIR> d-------- c:\documents and settings\HP_Administrator\Application Data\SUPERAntiSpyware.com

2009-02-15 00:24 . 2009-03-31 16:56 <DIR> d-------- c:\program files\Spybot - Search & Destroy

2009-02-14 18:53 . 2009-02-14 18:53 16,384 --a------ c:\windows\DCEBoot.exe

.

(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))

.

2009-03-31 06:51 --------- d-----w c:\program files\Trend Micro

2009-03-19 00:15 --------- d-----w c:\program files\EarthLink TotalAccess

2009-03-06 02:17 36,368 ----a-w c:\windows\system32\drivers\tmpreflt.sys

2009-03-06 02:17 205,328 ----a-w c:\windows\system32\drivers\tmxpflt.sys

2009-03-06 02:17 1,195,512 ----a-w c:\windows\system32\drivers\vsapint.sys

2009-03-03 23:12 80,400 ----a-w c:\windows\system32\drivers\tmtdi.sys

2009-03-03 08:34 50,192 ----a-w c:\windows\system32\drivers\tmevtmgr.sys

2009-03-03 08:34 50,192 ----a-w c:\windows\system32\drivers\tmactmon.sys

2009-03-03 08:34 150,032 ----a-w c:\windows\system32\drivers\tmcomm.sys

2009-02-13 07:17 --------- d-----w c:\program files\Opera

2008-09-23 00:10 0 ----a-w c:\documents and settings\HP_Administrator\Application Data\wklnhst.dat

2008-12-13 22:59 67,696 ----a-w c:\program files\mozilla firefox\components\jar50.dll

2008-12-13 22:59 54,376 ----a-w c:\program files\mozilla firefox\components\jsd3250.dll

2008-12-13 22:59 34,952 ----a-w c:\program files\mozilla firefox\components\myspell.dll

2008-12-13 22:59 46,720 ----a-w c:\program files\mozilla firefox\components\spellchk.dll

2008-12-13 22:59 172,144 ----a-w c:\program files\mozilla firefox\components\xpinstal.dll

2006-08-01 19:15 22 --sha-w c:\windows\SMINST\HPCD.sys

.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))

.

.

*Note* empty entries & legit default entries are not shown

REGEDIT4

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]

"ctfmon.exe"="c:\windows\system32\ctfmon.exe" [2008-04-13 15360]

"MSMSGS"="c:\program files\Messenger\msmsgs.exe" [2008-04-13 1695232]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]

"ehTray"="c:\windows\ehome\ehtray.exe" [2005-08-06 64512]

"IAAnotif"="c:\program files\Intel\Intel Matrix Storage Manager\iaanotif.exe" [2005-10-12 139264]

"NvCplDaemon"="c:\windows\system32\NvCpl.dll" [2005-12-14 7323648]

"HPHUPD08"="c:\program files\HP\Digital Imaging\{33D6CC28-9F75-4d1b-A11D-98895B3A3729}\hphupd08.exe" [2005-06-02 49152]

"Recguard"="c:\windows\SMINST\RECGUARD.EXE" [2005-07-23 237568]

"HPBootOp"="c:\program files\Hewlett-Packard\HP Boot Optimizer\HPBootOp.exe" [2005-11-09 249856]

"HP Software Update"="c:\program files\HP\HP Software Update\HPwuSchd2.exe" [2005-05-12 49152]

"UfSeAgnt.exe"="c:\program files\Trend Micro\Internet Security\UfSeAgnt.exe" [2009-03-13 995528]

"EPSON Stylus C84 Series"="c:\windows\System32\spool\DRIVERS\W32X86\3\E_S4I2D1.EXE" [2003-05-27 99840]

"ISUSPM Startup"="c:\progra~1\COMMON~1\INSTAL~1\UPDATE~1\ISUSPM.exe" [2004-07-28 221184]

"Byalunufuqoseje"="c:\windows\umoyufom.dll" [2008-04-13 157184]

"nwiz"="nwiz.exe" [2005-12-14 c:\windows\system32\nwiz.exe]

"RTHDCPL"="RTHDCPL.EXE" [2006-01-11 c:\windows\RTHDCPL.EXE]

c:\documents and settings\Default User\Start Menu\Programs\Startup\

Pin.lnk - c:\hp\bin\CLOAKER.EXE [2006-03-07 27136]

c:\documents and settings\All Users\Start Menu\Programs\Startup\

Adobe Reader Speed Launch.lnk - c:\program files\Adobe\Acrobat 7.0\Reader\reader_sl.exe [2004-12-14 29696]

HP Digital Imaging Monitor.lnk - c:\program files\HP\Digital Imaging\bin\hpqtra08.exe [2005-05-12 282624]

[hkey_local_machine\software\microsoft\windows\currentversion\explorer\ShellExecuteHooks]

"{EDB0E980-90BD-11D4-8599-0008C7D3B6F8}"= "c:\program files\Qualcomm\Eudora\EuShlExt.dll" [2006-08-17 86016]

"{5AE067D3-9AFB-48E0-853A-EBB7F4A000DA}"= "c:\program files\SUPERAntiSpyware\SASSEH.DLL" [2008-05-13 77824]

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\!SASWinLogon]

2008-12-22 12:05 356352 c:\program files\SUPERAntiSpyware\SASWINLO.dll

[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\lsa]

Notification Packages REG_MULTI_SZ scecli capdmpi.dll

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\DISCover]

--a------ 2005-11-12 00:11 1064960 c:\program files\DISC\DISCover.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\DiscUpdateManager]

--a------ 2005-11-12 00:10 61440 c:\program files\DISC\DISCUpdateMgr.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\DMAScheduler]

--a------ 2005-11-01 13:01 90112 c:\program files\Sonic\DigitalMedia Plus\DigitalMedia Archive\DMAScheduler.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\IPInSightLAN 01]

--a------ 2005-08-10 21:10 380928 c:\program files\EarthLink TotalAccess\FastLane2\IPClient.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\IPInSightMonitor 01]

--a------ 2005-08-10 21:10 122880 c:\program files\EarthLink TotalAccess\FastLane2\ipmon32.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\RoxioDragToDisc]

--a------ 2005-02-03 20:14 1695744 c:\program files\Roxio\Easy Media Creator 7\Drag to Disc\DrgToDsc.exe

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\TrendAntiVirus]

"DisableMonitoring"=dword:00000001

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]

"EnableFirewall"= 0 (0x0)

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]

"%windir%\\system32\\sessmgr.exe"=

"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpqtra08.exe"=

"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpqste08.exe"=

"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpofxm08.exe"=

"c:\\Program Files\\HP\\Digital Imaging\\bin\\hposfx08.exe"=

"c:\\Program Files\\HP\\Digital Imaging\\bin\\hposid01.exe"=

"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpqscnvw.exe"=

"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpqkygrp.exe"=

"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpqCopy.exe"=

"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpfccopy.exe"=

"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpzwiz01.exe"=

"c:\\Program Files\\HP\\Digital Imaging\\Unload\\HpqPhUnl.exe"=

"c:\\Program Files\\HP\\Digital Imaging\\Unload\\HpqDIA.exe"=

"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpoews01.exe"=

"c:\\Program Files\\DISC\\DISCover.exe"=

"c:\\Program Files\\DISC\\DiscStreamHub.exe"=

"c:\\Program Files\\DISC\\myFTP.exe"=

"c:\\Program Files\\Updates from HP\\9972322\\Program\\Updates from HP.exe"=

"c:\\Program Files\\EarthLink TotalAccess\\TaskPanl.exe"=

"c:\\Program Files\\Opera\\Opera.exe"=

"c:\\Program Files\\Real\\RealPlayer\\realplay.exe"=

"%windir%\\Network Diagnostic\\xpnetdiag.exe"=

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\GloballyOpenPorts\List]

"8097:TCP"= 8097:TCP:EarthLink UHP Modem Support

R1 SASDIFSV;SASDIFSV;c:\program files\SUPERAntiSpyware\sasdifsv.sys [2009-01-15 8944]

R1 SASKUTIL;SASKUTIL;c:\program files\SUPERAntiSpyware\SASKUTIL.SYS [2009-01-15 55024]

R2 tmevtmgr;tmevtmgr;c:\windows\system32\drivers\tmevtmgr.sys [2008-09-17 50192]

R2 tmpreflt;tmpreflt;c:\windows\system32\drivers\tmpreflt.sys [2008-07-30 36368]

R2 TmProxy;Trend Micro Proxy Service;c:\program files\Trend Micro\Internet Security\TmProxy.exe [2008-09-17 677128]

R3 WN5301;LIteon Wireless PCI Network Adapter Service;c:\windows\system32\drivers\wn5301.sys [2006-03-07 468768]

S3 SASENUM;SASENUM;c:\program files\SUPERAntiSpyware\SASENUM.SYS [2009-01-15 7408]

.

- - - - ORPHANS REMOVED - - - -

BHO-{D2DF7C4D-ACF8-403D-BE12-39D1B2B9F360} - c:\windows\system32\tcosglx.dll

HKLM-Run-PCDrProfiler - (no file)

.

------- Supplementary Scan -------

.

uStart Page = hxxp://boston.com/

uDefault_Search_URL = hxxp://www.earthlink.net/partner/more/msie/button/search.html

mStart Page = hxxp://ie.redirect.hp.com/svs/rdr?TYPE=3&tp=iehome&locale=EN_US&c=Q106&bd=pavilion&pf=desktop

mSearch Bar = hxxp://ie.redirect.hp.com/svs/rdr?TYPE=3&tp=iesearch&locale=EN_US&c=Q106&bd=pavilion&pf=desktop

uInternet Connection Wizard,ShellNext = iexplore

IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~4\OFFICE11\EXCEL.EXE/3000

IE: EarthLink Google Search - c:\program files\EarthLink TotalAccess\Toolbar\Toolbar\SearchUI.dll/search.html

Trusted Zone: trymedia.com

.

**************************************************************************

catchme 0.3.1375 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net

Rootkit scan 2009-03-31 17:57:51

Windows 5.1.2600 Service Pack 3 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

**************************************************************************

.

--------------------- LOCKED REGISTRY KEYS ---------------------

[HKEY_USERS\S-1-5-21-3615286836-2541961959-4269752332-1008\Software\Microsoft\SystemCertificates\AddressBook*]

@Allowed: (Read) (RestrictedCode)

@Allowed: (Read) (RestrictedCode)

.

--------------------- DLLs Loaded Under Running Processes ---------------------

- - - - - - - > 'winlogon.exe'(920)

c:\program files\SUPERAntiSpyware\SASWINLO.dll

- - - - - - - > 'lsass.exe'(976)

c:\windows\capdmpi.dll

.

------------------------ Other Running Processes ------------------------

.

c:\windows\system32\rundll32.exe

c:\program files\Trend Micro\BM\TMBMSRV.exe

c:\windows\ehome\ehrecvr.exe

c:\windows\ehome\ehSched.exe

c:\program files\Intel\Intel Matrix Storage Manager\IAANTMon.exe

c:\program files\Common Files\LightScribe\LSSrvc.exe

c:\program files\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE

c:\windows\system32\nvsvc32.exe

c:\program files\Trend Micro\Internet Security\SfCtlCom.exe

c:\program files\Intel\IntelDH\Intel® Quick Resume Technology\ELService.exe

c:\windows\ehome\mcrdsvc.exe

c:\windows\system32\dllhost.exe

c:\windows\system32\wscntfy.exe

c:\windows\ehome\ehmsas.exe

c:\hp\KBD\kbd.exe

.

**************************************************************************

.

Completion time: 2009-03-31 18:07:42 - machine was rebooted

ComboFix-quarantined-files.txt 2009-03-31 22:06:23

Pre-Run: 247,265,021,952 bytes free

Post-Run: 248,449,126,400 bytes free

196 --- E O F --- 2009-03-14 18:21:25

Link to post
Share on other sites

  • Staff

Hi,

I also got some error messages about HP digital imaging. I don't use that anyway, so if it sticks, hopefully if i remove it from the startup, that message will go away, right?
Yes, just disable hphupd08.exe via msconfig > startup. It's not really required to startup with Windows anyway.

HP is known to cause error messages once in a while.

Let's deal with the rest now..

* Open notepad - don't use any other texteditor than notepad or the script will fail.

Copy/paste the text in the quotebox below into notepad:

File::

c:\windows\umoyufom.dll

Collect::[8]

c:\windows\capdmpi.dll

Registry::

[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\lsa]

"Notification Packages"=hex(7):73,63,65,63,6c,69,00,00

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]

"Byalunufuqoseje"=-

Save this as txtfile CFScript

Then drag the CFScript into ComboFix.exe as you see in the screenshot below.

CFScript.gif

This will start ComboFix again.

Then, please visit this site:

http://www.bleepingcomputer.com/submit-malware.php?channel=8

Where it says: "Browse to the file you want to submit", use the Browse button to navigate to the following file: C:\Qoobox\Quarantine\[8]-Submit_date_time.zip (date_time will be replaced with the date and time when this file was created)

Then click the "Send File" button below in order to upload it.

After reboot, (in case it asks to reboot), post the contents of Combofix.txt in your next reply.

Link to post
Share on other sites

Hi again -

I submitted the file for analysis.

Here is the newest combofix log:

ComboFix 09-03-31.01 - HP_Administrator 2009-03-31 18:49:30.2 - NTFSx86

Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.2046.1505 [GMT -4:00]

Running from: c:\documents and settings\HP_Administrator\Desktop\ComboFix.exe

Command switches used :: c:\documents and settings\HP_Administrator\Desktop\CFScript.txt

AV: Trend Micro AntiVirus *On-access scanning disabled* (Updated)

* Created a new restore point

FILE ::

c:\windows\umoyufom.dll

.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))

.

c:\windows\capdmpi.dll

c:\windows\umoyufom.dll

.

((((((((((((((((((((((((( Files Created from 2009-02-28 to 2009-03-31 )))))))))))))))))))))))))))))))

.

2009-03-31 07:40 . 2009-03-31 07:40 <DIR> d-------- c:\documents and settings\NetworkService\Application Data\rsdatjoo

2009-03-31 07:38 . 2009-03-31 07:38 <DIR> d-------- c:\documents and settings\HP_Administrator\Application Data\rsdatjoo

2009-02-16 12:16 . 2009-02-16 12:49 <DIR> d-------- c:\documents and settings\All Users\Application Data\Spybot - Search & Destroy

2009-02-16 04:48 . 2009-03-31 02:26 <DIR> d-------- c:\program files\Malwarebytes' Anti-Malware

2009-02-16 04:48 . 2009-02-16 04:48 <DIR> d-------- c:\documents and settings\All Users\Application Data\Malwarebytes

2009-02-16 04:48 . 2009-03-26 16:49 38,496 --a------ c:\windows\system32\drivers\mbamswissarmy.sys

2009-02-16 04:48 . 2009-03-26 16:49 15,504 --a------ c:\windows\system32\drivers\mbam.sys

2009-02-15 02:00 . 2009-02-15 02:00 <DIR> d-------- c:\documents and settings\HP_Administrator\Application Data\Malwarebytes

2009-02-15 00:48 . 2009-02-15 00:48 <DIR> d-------- c:\documents and settings\All Users\Application Data\SUPERAntiSpyware.com

2009-02-15 00:46 . 2009-02-15 00:48 <DIR> d-------- c:\program files\SUPERAntiSpyware

2009-02-15 00:46 . 2009-02-15 00:46 <DIR> d-------- c:\program files\Common Files\Wise Installation Wizard

2009-02-15 00:46 . 2009-02-15 00:46 <DIR> d-------- c:\documents and settings\HP_Administrator\Application Data\SUPERAntiSpyware.com

2009-02-15 00:24 . 2009-03-31 16:56 <DIR> d-------- c:\program files\Spybot - Search & Destroy

2009-02-14 18:53 . 2009-02-14 18:53 16,384 --a------ c:\windows\DCEBoot.exe

.

(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))

.

2009-03-31 06:51 --------- d-----w c:\program files\Trend Micro

2009-03-19 00:15 --------- d-----w c:\program files\EarthLink TotalAccess

2009-03-06 02:17 36,368 ----a-w c:\windows\system32\drivers\tmpreflt.sys

2009-03-06 02:17 205,328 ----a-w c:\windows\system32\drivers\tmxpflt.sys

2009-03-06 02:17 1,195,512 ----a-w c:\windows\system32\drivers\vsapint.sys

2009-03-03 23:12 80,400 ----a-w c:\windows\system32\drivers\tmtdi.sys

2009-03-03 08:34 50,192 ----a-w c:\windows\system32\drivers\tmevtmgr.sys

2009-03-03 08:34 50,192 ----a-w c:\windows\system32\drivers\tmactmon.sys

2009-03-03 08:34 150,032 ----a-w c:\windows\system32\drivers\tmcomm.sys

2009-02-13 07:17 --------- d-----w c:\program files\Opera

2008-09-23 00:10 0 ----a-w c:\documents and settings\HP_Administrator\Application Data\wklnhst.dat

2008-12-13 22:59 67,696 ----a-w c:\program files\mozilla firefox\components\jar50.dll

2008-12-13 22:59 54,376 ----a-w c:\program files\mozilla firefox\components\jsd3250.dll

2008-12-13 22:59 34,952 ----a-w c:\program files\mozilla firefox\components\myspell.dll

2008-12-13 22:59 46,720 ----a-w c:\program files\mozilla firefox\components\spellchk.dll

2008-12-13 22:59 172,144 ----a-w c:\program files\mozilla firefox\components\xpinstal.dll

2006-08-01 19:15 22 --sha-w c:\windows\SMINST\HPCD.sys

.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))

.

.

*Note* empty entries & legit default entries are not shown

REGEDIT4

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]

"ctfmon.exe"="c:\windows\system32\ctfmon.exe" [2008-04-13 15360]

"MSMSGS"="c:\program files\Messenger\msmsgs.exe" [2008-04-13 1695232]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]

"ehTray"="c:\windows\ehome\ehtray.exe" [2005-08-06 64512]

"IAAnotif"="c:\program files\Intel\Intel Matrix Storage Manager\iaanotif.exe" [2005-10-12 139264]

"NvCplDaemon"="c:\windows\system32\NvCpl.dll" [2005-12-14 7323648]

"HPHUPD08"="c:\program files\HP\Digital Imaging\{33D6CC28-9F75-4d1b-A11D-98895B3A3729}\hphupd08.exe" [2005-06-02 49152]

"Recguard"="c:\windows\SMINST\RECGUARD.EXE" [2005-07-23 237568]

"HPBootOp"="c:\program files\Hewlett-Packard\HP Boot Optimizer\HPBootOp.exe" [2005-11-09 249856]

"HP Software Update"="c:\program files\HP\HP Software Update\HPwuSchd2.exe" [2005-05-12 49152]

"UfSeAgnt.exe"="c:\program files\Trend Micro\Internet Security\UfSeAgnt.exe" [2009-03-13 995528]

"EPSON Stylus C84 Series"="c:\windows\System32\spool\DRIVERS\W32X86\3\E_S4I2D1.EXE" [2003-05-27 99840]

"ISUSPM Startup"="c:\progra~1\COMMON~1\INSTAL~1\UPDATE~1\ISUSPM.exe" [2004-07-28 221184]

"nwiz"="nwiz.exe" [2005-12-14 c:\windows\system32\nwiz.exe]

"RTHDCPL"="RTHDCPL.EXE" [2006-01-11 c:\windows\RTHDCPL.EXE]

c:\documents and settings\Default User\Start Menu\Programs\Startup\

Pin.lnk - c:\hp\bin\CLOAKER.EXE [2006-03-07 27136]

c:\documents and settings\All Users\Start Menu\Programs\Startup\

Adobe Reader Speed Launch.lnk - c:\program files\Adobe\Acrobat 7.0\Reader\reader_sl.exe [2004-12-14 29696]

HP Digital Imaging Monitor.lnk - c:\program files\HP\Digital Imaging\bin\hpqtra08.exe [2005-05-12 282624]

[hkey_local_machine\software\microsoft\windows\currentversion\explorer\ShellExecuteHooks]

"{EDB0E980-90BD-11D4-8599-0008C7D3B6F8}"= "c:\program files\Qualcomm\Eudora\EuShlExt.dll" [2006-08-17 86016]

"{5AE067D3-9AFB-48E0-853A-EBB7F4A000DA}"= "c:\program files\SUPERAntiSpyware\SASSEH.DLL" [2008-05-13 77824]

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\!SASWinLogon]

2008-12-22 12:05 356352 c:\program files\SUPERAntiSpyware\SASWINLO.dll

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\DISCover]

--a------ 2005-11-12 00:11 1064960 c:\program files\DISC\DISCover.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\DiscUpdateManager]

--a------ 2005-11-12 00:10 61440 c:\program files\DISC\DISCUpdateMgr.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\DMAScheduler]

--a------ 2005-11-01 13:01 90112 c:\program files\Sonic\DigitalMedia Plus\DigitalMedia Archive\DMAScheduler.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\IPInSightLAN 01]

--a------ 2005-08-10 21:10 380928 c:\program files\EarthLink TotalAccess\FastLane2\IPClient.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\IPInSightMonitor 01]

--a------ 2005-08-10 21:10 122880 c:\program files\EarthLink TotalAccess\FastLane2\ipmon32.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\RoxioDragToDisc]

--a------ 2005-02-03 20:14 1695744 c:\program files\Roxio\Easy Media Creator 7\Drag to Disc\DrgToDsc.exe

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\TrendAntiVirus]

"DisableMonitoring"=dword:00000001

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]

"%windir%\\system32\\sessmgr.exe"=

"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpqtra08.exe"=

"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpqste08.exe"=

"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpofxm08.exe"=

"c:\\Program Files\\HP\\Digital Imaging\\bin\\hposfx08.exe"=

"c:\\Program Files\\HP\\Digital Imaging\\bin\\hposid01.exe"=

"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpqscnvw.exe"=

"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpqkygrp.exe"=

"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpqCopy.exe"=

"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpfccopy.exe"=

"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpzwiz01.exe"=

"c:\\Program Files\\HP\\Digital Imaging\\Unload\\HpqPhUnl.exe"=

"c:\\Program Files\\HP\\Digital Imaging\\Unload\\HpqDIA.exe"=

"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpoews01.exe"=

"c:\\Program Files\\DISC\\DISCover.exe"=

"c:\\Program Files\\DISC\\DiscStreamHub.exe"=

"c:\\Program Files\\DISC\\myFTP.exe"=

"c:\\Program Files\\Updates from HP\\9972322\\Program\\Updates from HP.exe"=

"c:\\Program Files\\EarthLink TotalAccess\\TaskPanl.exe"=

"c:\\Program Files\\Opera\\Opera.exe"=

"c:\\Program Files\\Real\\RealPlayer\\realplay.exe"=

"%windir%\\Network Diagnostic\\xpnetdiag.exe"=

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\GloballyOpenPorts\List]

"8097:TCP"= 8097:TCP:EarthLink UHP Modem Support

R1 SASDIFSV;SASDIFSV;c:\program files\SUPERAntiSpyware\sasdifsv.sys [2009-01-15 8944]

R1 SASKUTIL;SASKUTIL;c:\program files\SUPERAntiSpyware\SASKUTIL.SYS [2009-01-15 55024]

R2 tmevtmgr;tmevtmgr;c:\windows\system32\drivers\tmevtmgr.sys [2008-09-17 50192]

R2 tmpreflt;tmpreflt;c:\windows\system32\drivers\tmpreflt.sys [2008-07-30 36368]

R2 TmProxy;Trend Micro Proxy Service;c:\program files\Trend Micro\Internet Security\TmProxy.exe [2008-09-17 677128]

R3 WN5301;LIteon Wireless PCI Network Adapter Service;c:\windows\system32\drivers\wn5301.sys [2006-03-07 468768]

S3 SASENUM;SASENUM;c:\program files\SUPERAntiSpyware\SASENUM.SYS [2009-01-15 7408]

.

.

------- Supplementary Scan -------

.

uStart Page = hxxp://boston.com/

uDefault_Search_URL = hxxp://www.earthlink.net/partner/more/msie/button/search.html

mStart Page = hxxp://ie.redirect.hp.com/svs/rdr?TYPE=3&tp=iehome&locale=EN_US&c=Q106&bd=pavilion&pf=desktop

mSearch Bar = hxxp://ie.redirect.hp.com/svs/rdr?TYPE=3&tp=iesearch&locale=EN_US&c=Q106&bd=pavilion&pf=desktop

uInternet Connection Wizard,ShellNext = iexplore

IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~4\OFFICE11\EXCEL.EXE/3000

IE: EarthLink Google Search - c:\program files\EarthLink TotalAccess\Toolbar\Toolbar\SearchUI.dll/search.html

Trusted Zone: trymedia.com

.

**************************************************************************

catchme 0.3.1375 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net

Rootkit scan 2009-03-31 18:52:58

Windows 5.1.2600 Service Pack 3 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

**************************************************************************

.

--------------------- LOCKED REGISTRY KEYS ---------------------

[HKEY_USERS\S-1-5-21-3615286836-2541961959-4269752332-1008\Software\Microsoft\SystemCertificates\AddressBook*]

@Allowed: (Read) (RestrictedCode)

@Allowed: (Read) (RestrictedCode)

.

--------------------- DLLs Loaded Under Running Processes ---------------------

- - - - - - - > 'winlogon.exe'(912)

c:\program files\SUPERAntiSpyware\SASWINLO.dll

.

------------------------ Other Running Processes ------------------------

.

c:\windows\system32\rundll32.exe

c:\program files\Trend Micro\BM\TMBMSRV.exe

c:\windows\ehome\ehrecvr.exe

c:\windows\ehome\ehSched.exe

c:\program files\Intel\Intel Matrix Storage Manager\IAANTMon.exe

c:\program files\Common Files\LightScribe\LSSrvc.exe

c:\program files\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE

c:\windows\system32\nvsvc32.exe

c:\program files\Trend Micro\Internet Security\SfCtlCom.exe

c:\windows\ehome\mcrdsvc.exe

c:\program files\Intel\IntelDH\Intel® Quick Resume Technology\ELService.exe

c:\windows\system32\dllhost.exe

c:\windows\system32\wscntfy.exe

c:\windows\ehome\ehmsas.exe

c:\hp\KBD\kbd.exe

.

**************************************************************************

.

Completion time: 2009-03-31 19:03:00 - machine was rebooted

ComboFix-quarantined-files.txt 2009-03-31 23:01:41

ComboFix2.txt 2009-03-31 22:07:43

Pre-Run: 248,402,190,336 bytes free

Post-Run: 248,389,976,064 bytes free

184 --- E O F --- 2009-03-14 18:21:25

Link to post
Share on other sites

I don't recognize those files.

I started to download some stuff to run a karpansky (?) online scan, and, midway, when I realized they don't clean up what they find, I aborted the download. Perhaps it is residue from that download?

I also downloaded and ran spybot.

Perhaps I should delete them? I haven't downloaded anything on purpose today besides what you've had me do.

I was looking for alternatives before I tried combofix, as it seemed so intimidating.

But honestly, you are terrific. Thank you so much !

If I can repay, let me know. My field is audio production and sound engineering - pro tools and such. Another gal in a male dominated field.

My latest scan came out clean. I can't believe I survived this virus!!

On another front, do you think buying and running malwarebytes on my system, along with trendmicro, would be effective? Would it have saved me from this situation? Would it slow things down a lot?

You made my day.

-Kali

Link to post
Share on other sites

very interesting -

they were both created at 7:38, right when I powered up the computer this morning -

Inside one rsdatjoo folder (the hp admin), is a file called profiles, and a folder called profiles, inside that, a folder called n3fr0tpj.default, and inside that we find: about 13 items, many with an extension .sqlite. permissions.squlite, places.sqlite, localstore.rdf, cookies.sqlite, formhistory.sqlite, webappsstore.sqlite, and some other small files.

Let me know if you would like me to list everything. There is also another folder inside called extensions, which is empty.

The other folder - network service, has profiles folder, then n3fr0tpj.default folder, and inside, just 2 things - urlclassifier3.sqlite, and XPC.mfl.

That does look mighty mysterious. Please let me know if you would like me to do something with these files and folders.

Thanks !

-Kali

c:\documents and settings\NetworkService\Application Data\rsdatjoo

c:\documents and settings\HP_Administrator\Application Data\rsdatjoo

Link to post
Share on other sites

  • Staff

Hi,

It looks like these folders are actually Firefox profile related folders. Did you install Firefox recently? Or tried to install it?

In anyway, they should be in a Mozilla Firefox subfolder, so it's not properly installed here anyway.

That's why I suggest you remove both folders.

Then, * Go to start > run and copy and paste next command in the field:

ComboFix /u

Make sure there's a space between Combofix and /

Then hit enter.

This will uninstall Combofix, delete its related folders and files, reset your clock settings, hide file extensions, hide the system/hidden files and resets System Restore again.

Let me know in your next reply how things are now.

Link to post
Share on other sites

Hi Mieke

I put both of those rsdatjoo into my recycle bin. fwiw, they came up on a search, but if i just went into my files and folders, those application data folders were hidden, as was the network services folder. I installed firefox a few months ago. As you probably know, I am an opera user. So those files seem suspicious to me.

I have deleted combo fix per your instructions.

Everything seems fine.

I have read all your blog posts about staying safe, and will heed.

This is the 3rd virus that I've gotten since september, which amazes me since I'm pretty cautious and I think pretty well protected. This is the first one that I've had to go to the message boards for help, though in september I did a complete recovery re-install for something similar to this one.

It seems that you don't sleep !! Thank you so much for your help.

-Kali

Link to post
Share on other sites

  • Staff
This is the 3rd virus that I've gotten since september, which amazes me since I'm pretty cautious and I think pretty well protected. This is the first one that I've had to go to the message boards for help, though in september I did a complete recovery re-install for something similar to this one.
Yes, unfortunately malware is lurking everywhere nowadays, that's why people should be extra careful.

Anyway, good to hear that everyhing is OK again and glad I could help :)

Link to post
Share on other sites

  • Staff

Since this issue appears resolved ... this Topic is closed.

If you need this topic reopened for continuations of existing problems, please request this by sending me a PM with the address of the thread. This applies only to the original topic starter.

Everyone else please begin a New Topic.

Link to post
Share on other sites

Guest
This topic is now closed to further replies.
  • Recently Browsing   0 members

    • No registered users viewing this page.
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.