Jump to content

Hard to get rid of Malware


Recommended Posts

Tough to get rid of for a non profit I am helping. The system look better but not sure if I am out of the woods. I would appreciate any feed back. Thanks.

Logfile of Trend Micro HijackThis v2.0.2

Scan saved at 8:25:21 PM, on 4/2/2009

Platform: Windows XP SP3 (WinNT 5.01.2600)

MSIE: Internet Explorer v7.00 (7.00.6000.16791)

Boot mode: Normal

Running processes:

C:\WINDOWS\System32\smss.exe

C:\WINDOWS\system32\winlogon.exe

C:\WINDOWS\system32\services.exe

C:\WINDOWS\system32\lsass.exe

C:\WINDOWS\system32\svchost.exe

C:\Program Files\Windows Defender\MsMpEng.exe

C:\WINDOWS\System32\svchost.exe

C:\WINDOWS\system32\spoolsv.exe

C:\Program Files\Avira\AntiVir Desktop\sched.exe

C:\Program Files\Avira\AntiVir Desktop\avguard.exe

C:\WINDOWS\System32\svchost.exe

C:\WINDOWS\System32\svchost.exe

C:\WINDOWS\System32\svchost.exe

C:\WINDOWS\system32\wuauclt.exe

C:\WINDOWS\Explorer.EXE

C:\WINDOWS\Logi_MwX.Exe

C:\Program Files\Avira\AntiVir Desktop\avgnt.exe

C:\WINDOWS\system32\ctfmon.exe

C:\WINDOWS\system32\devldr32.exe

C:\WINDOWS\System32\svchost.exe

C:\Program Files\Internet Explorer\IEXPLORE.EXE

C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157

R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896

R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896

R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157

O2 - BHO: (no name) - {02478D38-C3F9-4efb-9B51-7695ECA05670} - (no file)

O4 - HKLM\..\Run: [Logitech Utility] Logi_MwX.Exe

O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime

O4 - HKLM\..\Run: [JobHisInit] C:\Program Files\RMClient\JobHisInit.exe

O4 - HKLM\..\Run: [MplSetUp] C:\Program Files\RMClient\MplSetUp.exe

O4 - HKLM\..\Run: [avgnt] "C:\Program Files\Avira\AntiVir Desktop\avgnt.exe" /min

O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe

O4 - HKUS\S-1-5-18\..\Run: [Windows Update Utility] \\?\globalroot\systemroot\system32\vfhr.exe (User 'SYSTEM')

O4 - HKUS\S-1-5-18\..\Run: [nDler2] \\?\globalroot\systemroot\system32\nDler2.exe (User 'SYSTEM')

O4 - HKUS\.DEFAULT\..\Run: [Windows Update Utility] \\?\globalroot\systemroot\system32\vfhr.exe (User 'Default user')

O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office10\OSA.EXE

O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\OFFICE11\EXCEL.EXE/3000

O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\WINDOWS\system32\msjava.dll

O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\WINDOWS\system32\msjava.dll

O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\OFFICE11\REFIEBAR.DLL

O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe

O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe

O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe

O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe

O10 - Unknown file in Winsock LSP: c:\windows\system32\nwprovau.dll

O16 - DPF: {02BF25D5-8C17-4B23-BC80-D3488ABDDC6B} (QuickTime Object) - http://appldnld.apple.com.edgesuite.net/co...ex/qtplugin.cab

O16 - DPF: {5F8469B4-B055-49DD-83F7-62B522420ECC} (Facebook Photo Uploader Control) - http://upload.facebook.com/controls/Facebo...otoUploader.cab

O16 - DPF: {6CB5E471-C305-11D3-99A8-000086395495} - http://toolbar.google.com/data/en/big/1.1....g/GoogleNav.cab

O16 - DPF: {72D59B9C-1E59-4958-803A-ABDEE2D4CFA6} - http://download.divx.com/player/DivXPlayerInstaller.exe

O16 - DPF: {8EDAD21C-3584-4E66-A8AB-EB0E5584767D} - http://toolbar.google.com/data/GoogleActivate.cab

O16 - DPF: {B8BE5E93-A60C-4D26-A2DC-220313175592} (ZoneIntro Class) - http://cdn2.zone.msn.com/binFramework/v10/...ro.cab53083.cab

O17 - HKLM\System\CCS\Services\Tcpip\..\{F25F7A54-E240-4A6D-9FEB-E40FB042199A}: NameServer = 192.168.1.100

O23 - Service: Avira AntiVir Scheduler (AntiVirSchedulerService) - Avira GmbH - C:\Program Files\Avira\AntiVir Desktop\sched.exe

O23 - Service: Avira AntiVir Guard (AntiVirService) - Avira GmbH - C:\Program Files\Avira\AntiVir Desktop\avguard.exe

O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe

--

End of file - 4757 bytes

Link to post
Share on other sites

ComboFix 09-04-01.01 - Maureen 2009-04-02 20:42:24.4 - NTFSx86

Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.512.230 [GMT -7:00]

Running from: c:\documents and settings\Maureen\Desktop\ComboFix.exe

AV: AntiVir Desktop *On-access scanning disabled* (Updated)

* Created a new restore point

.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))

.

Infected copy of c:\windows\system32\drivers\ndis.sys was found and disinfected

Restored copy from - c:\windows\$NtServicePackUninstall$\ndis.sys

.

((((((((((((((((((((((((((((((((((((((( Drivers/Services )))))))))))))))))))))))))))))))))))))))))))))))))

.

-------\Legacy_BOTDRV

-------\Service_botdrv

-------\Service_restore

((((((((((((((((((((((((( Files Created from 2009-03-03 to 2009-04-03 )))))))))))))))))))))))))))))))

.

2009-04-02 20:25 . 2009-04-02 20:25 <DIR> d-------- c:\program files\Trend Micro

2009-04-02 20:19 . 2008-04-13 10:39 14,592 --a------ c:\windows\system32\drivers\kbdhid.sys

2009-04-02 20:19 . 2008-04-13 10:39 14,592 --a--c--- c:\windows\system32\dllcache\kbdhid.sys

2009-03-31 17:32 . 2009-03-31 17:32 <DIR> d-------- c:\windows\system32\KB905474

2009-03-31 17:32 . 2009-03-10 22:26 1,403,264 --a------ c:\windows\system32\KB905474\wganotifypackageinner.exe

2009-03-31 17:32 . 2009-03-10 22:18 453,512 --a------ c:\windows\system32\KB905474\wgasetup.exe

2009-03-31 17:32 . 2009-02-09 18:51 12,490 --a------ c:\windows\system32\KB905474\wga_eula.txt

2009-03-30 18:16 . 2009-03-30 18:16 <DIR> d-------- c:\program files\Avira

2009-03-30 18:16 . 2009-03-30 18:16 <DIR> d-------- c:\documents and settings\All Users\Application Data\Avira

2009-03-30 18:16 . 2009-02-13 11:31 55,640 --a------ c:\windows\system32\drivers\avgntflt.sys

2009-03-30 18:10 . 2009-03-30 18:10 <DIR> d-------- c:\documents and settings\Maureen\Application Data\Yahoo!

2009-03-30 18:09 . 2009-03-31 17:12 <DIR> d-------- c:\program files\Yahoo!

2009-03-30 18:09 . 2009-03-30 18:10 <DIR> d-------- c:\program files\CCleaner

2009-03-30 14:32 . 2009-03-30 14:32 <DIR> d-------- c:\windows\rwko

2009-03-30 14:32 . 2009-03-31 10:58 <DIR> d-------- c:\program files\Common Files\rwko

2009-03-30 14:23 . 2009-03-30 14:23 <DIR> d-------- C:\81e9e0e57f42cfe07c73

2009-03-30 02:24 . 2009-03-30 02:24 97,792 --a------ c:\windows\system32\krbclick1.exe

2009-03-28 17:01 . 2009-03-28 17:01 <DIR> d-------- c:\documents and settings\Administrator.C600636-A\Application Data\Malwarebytes

2009-03-28 15:32 . 2009-03-28 15:32 <DIR> d-------- c:\program files\Malwarebytes' Anti-Malware

2009-03-28 15:32 . 2009-03-28 15:32 <DIR> d-------- c:\documents and settings\Maureen\Application Data\Malwarebytes

2009-03-28 15:32 . 2009-03-30 18:20 <DIR> d-------- c:\documents and settings\Maureen\Application Data\digifast

2009-03-28 15:32 . 2009-03-28 15:32 <DIR> d-------- c:\documents and settings\All Users\Application Data\Malwarebytes

2009-03-28 15:32 . 2009-03-26 16:49 38,496 --a------ c:\windows\system32\drivers\mbamswissarmy.sys

2009-03-28 15:32 . 2009-03-26 16:49 15,504 --a------ c:\windows\system32\drivers\mbam.sys

2009-03-25 15:06 . 2009-03-25 15:06 2 --a------ C:\675582153

2009-03-24 16:10 . 2009-03-30 14:53 <DIR> d-------- c:\documents and settings\Maureen\Application Data\Messenger

2009-03-24 12:09 . 2009-03-24 12:09 465,874 --a------ c:\windows\system32\config\systemprofile\Application Data\psvrr.exe

2009-03-23 20:22 . 2009-03-23 20:22 477,266 --a------ c:\windows\system32\vfhr.exe

2009-03-23 16:22 . 2009-03-23 16:22 47,616 --a------ c:\windows\system32\ptch238120.exe

2009-03-23 12:02 . 2005-08-09 16:46 819,200 --a------ c:\windows\system32\rpnvdd2.rra

2009-03-23 12:02 . 2005-08-09 16:46 339,968 --a------ c:\windows\system32\rpnvd95.rra

2009-03-23 12:02 . 2005-02-04 09:08 57,344 --a------ c:\windows\system32\rpnve41.rra

2009-03-23 12:02 . 2000-06-08 13:41 53,248 --a------ c:\windows\system32\mfc497a.rra

2009-03-23 10:54 . 2005-04-07 09:01 59,904 --a------ c:\windows\system32\RIC53HX.EXE

2009-03-23 10:54 . 2005-06-10 02:35 36,864 --a------ c:\windows\system32\RIC53HPI.DLL

2009-03-23 10:52 . 2009-03-30 18:13 <DIR> d-------- c:\windows\NAVITEMP

2009-03-23 10:52 . 2009-03-30 18:13 <DIR> d-------- c:\program files\RMClient

2009-03-23 10:52 . 2009-03-23 10:52 <DIR> d-------- c:\program files\Common Files\RDPrint

2009-03-23 10:42 . 2009-03-30 14:51 <DIR> d-------- c:\documents and settings\Maureen\Application Data\Twain

2009-03-18 22:32 . 2009-03-18 21:41 229,376 --a------ c:\windows\system32\config\systemprofile\Application Data\psvr32.exe

2009-03-18 14:36 . 2009-03-18 14:36 <DIR> d-------- c:\program files\Avery

.

(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))

.

2009-04-03 03:46 182,912 ----a-w c:\windows\system32\drivers\ndis.sys

2009-04-01 00:01 --------- d-----w c:\program files\Microsoft Money 2005

2009-04-01 00:01 --------- d-----w c:\program files\Google

2009-04-01 00:00 --------- d-----w c:\program files\Lavasoft

2009-04-01 00:00 --------- d-----w c:\program files\Common Files\Adobe

2009-03-30 20:50 --------- d-----w c:\program files\Common

2009-03-23 17:52 --------- d--h--w c:\program files\InstallShield Installation Information

2009-03-23 17:52 --------- d-----w c:\program files\Common Files\InstallShield

2003-08-27 22:19 36,963 ----a-r c:\program files\Common Files\SM1updtr.dll

2004-05-14 23:30 12,125 --sha-w c:\windows\system32\Cvx1j.exe

2004-05-03 00:42 8,020 --sha-w c:\windows\system32\UltBua.exe

.

((((((((((((((((((((((((((((( SnapShot@2009-03-30_14.31.45.04 )))))))))))))))))))))))))))))))))))))))))

.

- 2004-08-04 06:14:28 182,656 -c----w c:\windows\$NtServicePackUninstall$\ndis.sys

+ 2004-08-04 06:14:28 182,912 -c----w c:\windows\$NtServicePackUninstall$\ndis.sys

+ 2009-03-30 21:32:52 2,320 ----a-w c:\windows\rwko\rwko.dat

- 2009-03-25 22:06:37 182,656 -c--a-w c:\windows\system32\dllcache\ndis.sys

+ 2008-04-13 19:20:37 182,656 -c--a-w c:\windows\system32\dllcache\ndis.sys

+ 2009-02-13 18:17:49 45,416 ----a-w c:\windows\system32\drivers\avgntdd.sys

+ 2009-02-13 18:29:11 22,360 ----a-w c:\windows\system32\drivers\avgntmgr.sys

+ 2009-02-13 21:22:54 95,576 ----a-w c:\windows\system32\drivers\avipbb.sys

+ 2009-02-13 18:50:02 28,376 ----a-w c:\windows\system32\drivers\ssmdrv.sys

+ 2008-07-29 15:05:06 161,784 ----a-w c:\windows\WinSxS\x86_Microsoft.VC90.ATL_1fc8b3b9a1e18e3b_9.0.30729.1_x-ww_d01483b2\atl90.dll

+ 2008-07-29 10:54:08 225,280 ----a-w c:\windows\WinSxS\x86_Microsoft.VC90.CRT_1fc8b3b9a1e18e3b_9.0.30729.1_x-ww_6f74963e\msvcm90.dll

+ 2008-07-29 15:05:08 572,928 ----a-w c:\windows\WinSxS\x86_Microsoft.VC90.CRT_1fc8b3b9a1e18e3b_9.0.30729.1_x-ww_6f74963e\msvcp90.dll

+ 2008-07-29 15:05:08 655,872 ----a-w c:\windows\WinSxS\x86_Microsoft.VC90.CRT_1fc8b3b9a1e18e3b_9.0.30729.1_x-ww_6f74963e\msvcr90.dll

+ 2008-07-29 15:05:08 3,768,312 ----a-w c:\windows\WinSxS\x86_Microsoft.VC90.MFC_1fc8b3b9a1e18e3b_9.0.30729.1_x-ww_405b0943\mfc90.dll

+ 2008-07-29 15:05:10 3,783,672 ----a-w c:\windows\WinSxS\x86_Microsoft.VC90.MFC_1fc8b3b9a1e18e3b_9.0.30729.1_x-ww_405b0943\mfc90u.dll

+ 2008-07-29 13:07:42 59,904 ----a-w c:\windows\WinSxS\x86_Microsoft.VC90.MFC_1fc8b3b9a1e18e3b_9.0.30729.1_x-ww_405b0943\mfcm90.dll

+ 2008-07-29 13:07:42 59,904 ----a-w c:\windows\WinSxS\x86_Microsoft.VC90.MFC_1fc8b3b9a1e18e3b_9.0.30729.1_x-ww_405b0943\mfcm90u.dll

+ 2008-07-29 15:05:06 38,912 ----a-w c:\windows\WinSxS\x86_Microsoft.VC90.MFCLOC_1fc8b3b9a1e18e3b_9.0.30729.1_x-ww_b0db7d03\mfc90chs.dll

+ 2008-07-29 15:05:06 39,936 ----a-w c:\windows\WinSxS\x86_Microsoft.VC90.MFCLOC_1fc8b3b9a1e18e3b_9.0.30729.1_x-ww_b0db7d03\mfc90cht.dll

+ 2008-07-29 15:05:08 66,560 ----a-w c:\windows\WinSxS\x86_Microsoft.VC90.MFCLOC_1fc8b3b9a1e18e3b_9.0.30729.1_x-ww_b0db7d03\mfc90deu.dll

+ 2008-07-29 15:05:08 56,832 ----a-w c:\windows\WinSxS\x86_Microsoft.VC90.MFCLOC_1fc8b3b9a1e18e3b_9.0.30729.1_x-ww_b0db7d03\mfc90enu.dll

+ 2008-07-29 15:05:06 65,024 ----a-w c:\windows\WinSxS\x86_Microsoft.VC90.MFCLOC_1fc8b3b9a1e18e3b_9.0.30729.1_x-ww_b0db7d03\mfc90esn.dll

+ 2008-07-29 15:05:08 65,024 ----a-w c:\windows\WinSxS\x86_Microsoft.VC90.MFCLOC_1fc8b3b9a1e18e3b_9.0.30729.1_x-ww_b0db7d03\mfc90esp.dll

+ 2008-07-29 15:05:06 66,048 ----a-w c:\windows\WinSxS\x86_Microsoft.VC90.MFCLOC_1fc8b3b9a1e18e3b_9.0.30729.1_x-ww_b0db7d03\mfc90fra.dll

+ 2008-07-29 15:05:08 64,512 ----a-w c:\windows\WinSxS\x86_Microsoft.VC90.MFCLOC_1fc8b3b9a1e18e3b_9.0.30729.1_x-ww_b0db7d03\mfc90ita.dll

+ 2008-07-29 15:05:08 46,592 ----a-w c:\windows\WinSxS\x86_Microsoft.VC90.MFCLOC_1fc8b3b9a1e18e3b_9.0.30729.1_x-ww_b0db7d03\mfc90jpn.dll

+ 2008-07-29 15:05:08 46,080 ----a-w c:\windows\WinSxS\x86_Microsoft.VC90.MFCLOC_1fc8b3b9a1e18e3b_9.0.30729.1_x-ww_b0db7d03\mfc90kor.dll

+ 2008-07-29 15:05:08 62,976 ----a-w c:\windows\WinSxS\x86_Microsoft.VC90.MFCLOC_1fc8b3b9a1e18e3b_9.0.30729.1_x-ww_b0db7d03\mfc90rus.dll

+ 2007-11-07 09:19:20 54,272 ----a-w c:\windows\WinSxS\x86_Microsoft.VC90.OpenMP_1fc8b3b9a1e18e3b_9.0.21022.8_x-ww_ecc42bd1\vcomp90.dll

.

-- Snapshot reset to current date --

.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))

.

.

*Note* empty entries & legit default entries are not shown

REGEDIT4

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]

"ctfmon.exe"="c:\windows\system32\ctfmon.exe" [2008-04-13 15360]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]

"QuickTime Task"="c:\program files\QuickTime\qttask.exe" [2008-05-27 413696]

"JobHisInit"="c:\program files\RMClient\JobHisInit.exe" [2005-08-01 151552]

"MplSetUp"="c:\program files\RMClient\MplSetUp.exe" [2000-11-04 40960]

"avgnt"="c:\program files\Avira\AntiVir Desktop\avgnt.exe" [2009-03-02 209153]

"Logitech Utility"="Logi_MwX.Exe" [2003-03-04 c:\windows\LOGI_MWX.EXE]

[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run]

"Windows Update Utility"="\\?\globalroot\systemroot\system32\vfhr.exe" [?]

"nDler2"="\\?\globalroot\systemroot\system32\nDler2.exe" [?]

c:\documents and settings\All Users\Start Menu\Programs\Startup\

Microsoft Office.lnk - c:\program files\Microsoft Office\Office10\OSA.EXE [2001-02-13 83360]

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\drivers32]

"VIDC.I263"= i263_32.drv

"aux"= ctwdm32.dll

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\QuickTime Task]

--a------ 2008-05-27 10:50 413696 c:\program files\QuickTime\QTTask.exe

[HKEY_LOCAL_MACHINE\software\microsoft\security center]

"AntiVirusOverride"=dword:00000001

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]

"%windir%\\system32\\sessmgr.exe"=

"c:\\Program Files\\Messenger\\msmsgs.exe"=

"%windir%\\Network Diagnostic\\xpnetdiag.exe"=

"c:\\WINDOWS\\system32\\config\\systemprofile\\Application Data\\psvr32.exe"=

"c:\\Program Files\\Windows Defender\\MSASCui.exe"=

"c:\\Program Files\\Microsoft Office\\OFFICE11\\OUTLOOK.EXE"=

"c:\\WINDOWS\\system32\\usmt\\migwiz.exe"=

R2 AntiVirSchedulerService;Avira AntiVir Scheduler;c:\program files\Avira\AntiVir Desktop\sched.exe [2009-03-30 108289]

R2 WinDefend;Windows Defender;c:\program files\Windows Defender\MsMpEng.exe [2006-11-03 13592]

R3 hpusbfd;Hewlett-Packard USB Filter Class;c:\windows\system32\drivers\hpusbfd.sys [2003-02-04 7552]

S1 238a835a;238a835a;c:\windows\system32\drivers\238a835a.sys --> c:\windows\system32\drivers\238a835a.sys [?]

S3 AWINDIS5;AWINDIS5 Protocol Driver;c:\windows\system32\AWINDIS5.SYS [2006-09-06 16194]

S3 MBAMSwissArmy;MBAMSwissArmy;c:\windows\system32\drivers\mbamswissarmy.sys [2009-03-28 38496]

S3 NETGEAR_WG311_SERVICE;NETGEAR WG311 Wireless PCI Adapter Service;c:\windows\system32\drivers\wg311nd5.sys [2006-09-06 344448]

[HKEY_CURRENT_USER\software\microsoft\windows\currentversion\explorer\mountpoints2\{4016b2c3-3dcc-11db-938e-0002b3613615}]

\Shell\AutoRun\command - G:\LaunchU3.exe

[HKEY_CURRENT_USER\software\microsoft\windows\currentversion\explorer\mountpoints2\{6bf11c83-f523-11dc-94a2-00095b97f94e}]

\Shell\AutoRun\command - G:\LaunchU3.exe -a

.

Contents of the 'Scheduled Tasks' folder

2009-04-03 c:\windows\Tasks\A9509ADB918F0C07.job

- c:\progra~1\itch2\peak inter safe.exe []

2009-03-20 c:\windows\Tasks\AppleSoftwareUpdate.job

- c:\program files\Apple Software Update\SoftwareUpdate.exe [2008-04-11 17:57]

2009-04-03 c:\windows\Tasks\MP Scheduled Scan.job

- c:\program files\Windows Defender\MpCmdRun.exe [2006-11-03 18:20]

2009-04-03 c:\windows\Tasks\Symantec NetDetect.job

- c:\program files\Symantec\LiveUpdate\NDETECT.EXE []

2009-04-03 c:\windows\Tasks\WGASetup.job

- c:\windows\system32\KB905474\wgasetup.exe [2009-03-10 22:18]

.

.

------- Supplementary Scan -------

.

uStart Page = hxxp://www.google.com/

uSearchMigratedDefaultURL = hxxp://www.google.com/search?q={searchTerms}&sourceid=ie7&rls=com.microsoft:en-US&ie=utf8&oe=utf8

mSearch Bar =

uSearchURL,(Default) = hxxp://www.google.com/search?q=%s

IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~2\OFFICE11\EXCEL.EXE/3000

TCP: {F25F7A54-E240-4A6D-9FEB-E40FB042199A} = 192.168.1.100

DPF: DirectAnimation Java Classes - file://c:\windows\Java\classes\dajava.cab

DPF: Microsoft XML Parser for Java - file://c:\windows\Java\classes\xmldso.cab

DPF: {72D59B9C-1E59-4958-803A-ABDEE2D4CFA6} - hxxp://download.divx.com/player/DivXPlayerInstaller.exe

.

.

------- File Associations -------

.

inffile=c:\windows\system32\dllcache\notepad.exe %1

inifile=c:\windows\system32\dllcache\notepad.exe %1

.

**************************************************************************

catchme 0.3.1375 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net

Rootkit scan 2009-04-02 20:50:33

Windows 5.1.2600 Service Pack 3 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully

hidden files: 0

**************************************************************************

.

------------------------ Other Running Processes ------------------------

.

c:\program files\Avira\AntiVir Desktop\avguard.exe

c:\windows\system32\devldr32.exe

.

**************************************************************************

.

Completion time: 2009-04-02 20:55:40 - machine was rebooted [Maureen]

ComboFix-quarantined-files.txt 2009-04-03 03:55:36

ComboFix2.txt 2009-03-31 23:57:34

ComboFix3.txt 2009-03-30 21:34:20

Pre-Run: 26,856,230,912 bytes free

Post-Run: 26,841,726,976 bytes free

208 --- E O F --- 2009-04-03 03:20:39

Link to post
Share on other sites

  • Root Admin

Hello Heavus,

You've been here before so you should already know that we do not want you running Combofix or similar tools without being requested to do so.

Some user won't help you if you do that, and you can also potentially make our job more difficult. Some helpers have a specific pattern they like to follow and this can mess that up.

You could also easily run it and have it remove the entire system32 folder and then the box would need a complete reinstall of Windows.

STEP 01

With all other applications closed (Taskbar empty), open HijackThis again

and run Do a system scan only and place a check mark on the following items.

  • O4 - HKUS\S-1-5-18\..\Run: [Windows Update Utility] \\?\globalroot\systemroot\system32\vfhr.exe (User 'SYSTEM')
  • O4 - HKUS\S-1-5-18\..\Run: [nDler2] \\?\globalroot\systemroot\system32\nDler2.exe (User 'SYSTEM')
  • O4 - HKUS\.DEFAULT\..\Run: [Windows Update Utility] \\?\globalroot\systemroot\system32\vfhr.exe (User 'Default user')
    Then Quit All Browsers including the one you're reading this in now.
    Then click on Fix checked and then quit HJT

STEP 02

Download but do not yet run ComboFix

If you have a previous version of Combofix.exe, delete it and download a fresh copy.

Download it to your DESKTOP - it MUST run from the Desktop

download.bleepingcomputer.com/sUBs/ComboFix.exe

subs.geekstogo.com/ComboFix.exe

Using your mouse, Highlight and then Right-click | Copy the entire contents of the Code box below, including blank lines

KILLALL::

Driver::
238a835a

File::
c:\windows\system32\drivers\238a835a.sys

Open a new Notepad session (Do not use a Word Processor or WordPad). Click "Format" and be certain that Word Wrap is not enabled. Right-click | Paste the Code box contents from above into Notepad. Click File, Save as..., and set the location to your Desktop, and enter (including quotation marks) as the filename: "CFscript.txt" .

Using your mouse, drag the new file CFscript.txt and drop it on the Combo-Fix.exe icon as shown:

CFScript.gif

  • Important: Have no other programs running. Your Task Bar should be clear of any program entries including your Browser.
  • Disconnect from the Internet.
  • Disable your Antivirus software. If it has Script Blocking features, please disable these as well.
  • A window may open with a series of Disclaimers. Accept the Disclaimers to start the fix.
  • It may identify that Recovery Console is not installed. Please accept when asked if you wish it to be installed.
    When the scan completes Notepad will open with with your results log open. Do a File, Exit.

A caution - Do not run Combofix more than once. Do not touch your mouse/keyboard until the scan has completed, as this may cause the process to stall or your computer to lock. The scan will temporarily disable your desktop, and if interrupted may leave your desktop disabled. If this occurs, please reboot to restore the desktop. Even when ComboFix appears to be doing nothing, look at your Drive light. If it is flashing, Combofix is still at work.

Post back the Combofix log on your next reply.

STEP 03

Please download to your Desktop: Dr.Web CureIt

  • After the file has downloaded, disable your current Anti-Virus and disconnect from the Internet
  • Doubleclick the drweb-cureit.exe file, then click the Start button, then the OK button to perform an Express Scan.
  • This will scan the files currently running in memory and when something is found, click the yes button when it asks you if you want to cure it.
  • Once the short scan has finished, Click on the Complete scan radio button.
  • Then click on the Settings menu on top, the select Change Settings or press the F9 key. You can also change the Language
  • Choose the Scanning tab and I recomend leaving the Heuristic analysis enabled (this can lead to False Positives though)
  • On the File types tab ensure you select All files
  • Click on the Actions tab and set the following:
    • Objects Infected objects = Cure, Incurable objects = Move, Suspicious objects = Report
    • Infected packages Archive = Move, E-mails = Report, Containers = Move
    • Malware Adware = Move, Dialers = Move, Jokes = Move, Riskware = Move, Hacktools = Move
    • Do not change the Rename extension - default is: #??
    • Leave the default save path for Moved files here: %USERPROFILE%\DoctorWeb\Quarantine\
    • Leave prompt on Action checked

    [*]On the Log file tab leave the Log to file checked.

    [*]Leave the log file path alone: %USERPROFILE%\DoctorWeb\CureIt.log

    [*]Log mode = Append

    [*]Encoding = ANSI

    [*]Details Leave Names of file packers and Statistics checked.

    [*]Limit log file size = 2048 KB and leave the check mark on the Maximum log file size.

    [*]On the General tab leave the Scan Priority on High

    [*]Click the Apply button at the bottom, and then the OK button.

    [*]On the right side under the Dr Web Anti-Virus Logo you will see 3 little buttons. Click the left VCR style Start button.

    [*]In this mode it will scan Boot sectors of all disks, All removable media, and all local drives

    [*]The more files and folders you have the longer the scan will take. On large drives it can take hours to complete.

    [*]When the Cure option is selected, an additional context menu will open. Select the necessary action of the program, if the curing fails.

    [*]Click 'Yes to all' if it asks if you want to cure/move the files.

    [*]This will move it to the %USERPROFILE%\DoctorWeb\Quarantine\ folder if it can't be cured. (in this case we need samples)

    [*]After selecting, in the Dr.Web CureIt menu on top, click file and choose save report list

    [*]Save the report to your Desktop. The report will be called DrWeb.csv

    [*]Close Dr.Web Cureit.

    [*]Reboot your computer!! Because it could be possible that files in use will be moved/deleted during reboot.

    [*]After reboot, post the contents of the log from Dr.Web you saved previously to your Desktop in your next reply with a new hijackthis log.

    drweb.jpg

Link to post
Share on other sites

ComboFix 09-04-01.01 - Maureen 2009-04-02 23:20:36.5 - NTFSx86

Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.512.254 [GMT -7:00]

Running from: c:\documents and settings\Maureen\Desktop\ComboFix.exe

Command switches used :: c:\documents and settings\Maureen\Desktop\CFscript.txt

AV: AntiVir Desktop *On-access scanning disabled* (Updated)

* Created a new restore point

FILE ::

c:\windows\system32\drivers\238a835a.sys

.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))

.

.

((((((((((((((((((((((((((((((((((((((( Drivers/Services )))))))))))))))))))))))))))))))))))))))))))))))))

.

-------\Service_238a835a

((((((((((((((((((((((((( Files Created from 2009-03-03 to 2009-04-03 )))))))))))))))))))))))))))))))

.

2009-04-02 22:39 . 2009-04-02 22:39 <DIR> d-------- c:\windows\system32\Dell

2009-04-02 22:39 . 2009-04-02 22:39 <DIR> d-------- c:\program files\Dell

2009-04-02 20:25 . 2009-04-02 20:25 <DIR> d-------- c:\program files\Trend Micro

2009-04-02 20:19 . 2008-04-13 10:39 14,592 --a------ c:\windows\system32\drivers\kbdhid.sys

2009-04-02 20:19 . 2008-04-13 10:39 14,592 --a--c--- c:\windows\system32\dllcache\kbdhid.sys

2009-03-31 17:32 . 2009-03-31 17:32 <DIR> d-------- c:\windows\system32\KB905474

2009-03-31 17:32 . 2009-03-10 22:26 1,403,264 --a------ c:\windows\system32\KB905474\wganotifypackageinner.exe

2009-03-31 17:32 . 2009-03-10 22:18 453,512 --a------ c:\windows\system32\KB905474\wgasetup.exe

2009-03-31 17:32 . 2009-02-09 18:51 12,490 --a------ c:\windows\system32\KB905474\wga_eula.txt

2009-03-30 18:16 . 2009-03-30 18:16 <DIR> d-------- c:\program files\Avira

2009-03-30 18:16 . 2009-03-30 18:16 <DIR> d-------- c:\documents and settings\All Users\Application Data\Avira

2009-03-30 18:16 . 2009-02-13 11:31 55,640 --a------ c:\windows\system32\drivers\avgntflt.sys

2009-03-30 18:10 . 2009-03-30 18:10 <DIR> d-------- c:\documents and settings\Maureen\Application Data\Yahoo!

2009-03-30 18:09 . 2009-03-31 17:12 <DIR> d-------- c:\program files\Yahoo!

2009-03-30 18:09 . 2009-03-30 18:10 <DIR> d-------- c:\program files\CCleaner

2009-03-30 14:32 . 2009-03-30 14:32 <DIR> d-------- c:\windows\rwko

2009-03-30 14:32 . 2009-03-31 10:58 <DIR> d-------- c:\program files\Common Files\rwko

2009-03-30 14:23 . 2009-03-30 14:23 <DIR> d-------- C:\81e9e0e57f42cfe07c73

2009-03-28 17:01 . 2009-03-28 17:01 <DIR> d-------- c:\documents and settings\Administrator.C600636-A\Application Data\Malwarebytes

2009-03-28 15:32 . 2009-03-28 15:32 <DIR> d-------- c:\program files\Malwarebytes' Anti-Malware

2009-03-28 15:32 . 2009-03-28 15:32 <DIR> d-------- c:\documents and settings\Maureen\Application Data\Malwarebytes

2009-03-28 15:32 . 2009-03-28 15:32 <DIR> d-------- c:\documents and settings\All Users\Application Data\Malwarebytes

2009-03-28 15:32 . 2009-03-26 16:49 38,496 --a------ c:\windows\system32\drivers\mbamswissarmy.sys

2009-03-28 15:32 . 2009-03-26 16:49 15,504 --a------ c:\windows\system32\drivers\mbam.sys

2009-03-25 15:06 . 2009-03-25 15:06 2 --a------ C:\675582153

2009-03-24 16:10 . 2009-03-30 14:53 <DIR> d-------- c:\documents and settings\Maureen\Application Data\Messenger

2009-03-23 20:22 . 2009-03-23 20:22 477,266 --a------ c:\windows\system32\vfhr.exe

2009-03-23 16:22 . 2009-03-23 16:22 47,616 --a------ c:\windows\system32\ptch238120.exe

2009-03-23 12:02 . 2005-08-09 16:46 819,200 --a------ c:\windows\system32\rpnvdd2.rra

2009-03-23 12:02 . 2005-08-09 16:46 339,968 --a------ c:\windows\system32\rpnvd95.rra

2009-03-23 12:02 . 2005-02-04 09:08 57,344 --a------ c:\windows\system32\rpnve41.rra

2009-03-23 12:02 . 2000-06-08 13:41 53,248 --a------ c:\windows\system32\mfc497a.rra

2009-03-23 10:54 . 2005-04-07 09:01 59,904 --a------ c:\windows\system32\RIC53HX.EXE

2009-03-23 10:54 . 2005-06-10 02:35 36,864 --a------ c:\windows\system32\RIC53HPI.DLL

2009-03-23 10:52 . 2009-03-30 18:13 <DIR> d-------- c:\windows\NAVITEMP

2009-03-23 10:52 . 2009-03-30 18:13 <DIR> d-------- c:\program files\RMClient

2009-03-23 10:52 . 2009-03-23 10:52 <DIR> d-------- c:\program files\Common Files\RDPrint

2009-03-23 10:42 . 2009-03-30 14:51 <DIR> d-------- c:\documents and settings\Maureen\Application Data\Twain

2009-03-18 14:36 . 2009-03-18 14:36 <DIR> d-------- c:\program files\Avery

.

(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))

.

2009-04-03 03:46 182,912 ----a-w c:\windows\system32\drivers\ndis.sys

2009-04-01 00:01 --------- d-----w c:\program files\Microsoft Money 2005

2009-04-01 00:01 --------- d-----w c:\program files\Google

2009-04-01 00:00 --------- d-----w c:\program files\Lavasoft

2009-04-01 00:00 --------- d-----w c:\program files\Common Files\Adobe

2009-03-30 20:50 --------- d-----w c:\program files\Common

2009-03-23 17:52 --------- d--h--w c:\program files\InstallShield Installation Information

2009-03-23 17:52 --------- d-----w c:\program files\Common Files\InstallShield

2003-08-27 22:19 36,963 ----a-r c:\program files\Common Files\SM1updtr.dll

2004-05-14 23:30 12,125 --sha-w c:\windows\system32\Cvx1j.exe

2004-05-03 00:42 8,020 --sha-w c:\windows\system32\UltBua.exe

.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))

.

.

*Note* empty entries & legit default entries are not shown

REGEDIT4

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]

"ctfmon.exe"="c:\windows\system32\ctfmon.exe" [2008-04-13 15360]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]

"QuickTime Task"="c:\program files\QuickTime\qttask.exe" [2008-05-27 413696]

"JobHisInit"="c:\program files\RMClient\JobHisInit.exe" [2005-08-01 151552]

"MplSetUp"="c:\program files\RMClient\MplSetUp.exe" [2000-11-04 40960]

"avgnt"="c:\program files\Avira\AntiVir Desktop\avgnt.exe" [2009-03-02 209153]

"Logitech Utility"="Logi_MwX.Exe" [2003-03-04 c:\windows\LOGI_MWX.EXE]

c:\documents and settings\All Users\Start Menu\Programs\Startup\

Microsoft Office.lnk - c:\program files\Microsoft Office\Office10\OSA.EXE [2001-02-13 83360]

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\drivers32]

"VIDC.I263"= i263_32.drv

"aux"= ctwdm32.dll

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\QuickTime Task]

--a------ 2008-05-27 10:50 413696 c:\program files\QuickTime\QTTask.exe

[HKEY_LOCAL_MACHINE\software\microsoft\security center]

"AntiVirusOverride"=dword:00000001

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]

"%windir%\\system32\\sessmgr.exe"=

"c:\\Program Files\\Messenger\\msmsgs.exe"=

"%windir%\\Network Diagnostic\\xpnetdiag.exe"=

"c:\\Program Files\\Windows Defender\\MSASCui.exe"=

"c:\\Program Files\\Microsoft Office\\OFFICE11\\OUTLOOK.EXE"=

"c:\\WINDOWS\\system32\\usmt\\migwiz.exe"=

R2 AntiVirSchedulerService;Avira AntiVir Scheduler;c:\program files\Avira\AntiVir Desktop\sched.exe [2009-03-30 108289]

R2 WinDefend;Windows Defender;c:\program files\Windows Defender\MsMpEng.exe [2006-11-03 13592]

R3 hpusbfd;Hewlett-Packard USB Filter Class;c:\windows\system32\drivers\hpusbfd.sys [2003-02-04 7552]

S3 AWINDIS5;AWINDIS5 Protocol Driver;c:\windows\system32\AWINDIS5.SYS [2006-09-06 16194]

S3 NETGEAR_WG311_SERVICE;NETGEAR WG311 Wireless PCI Adapter Service;c:\windows\system32\drivers\wg311nd5.sys [2006-09-06 344448]

[HKEY_CURRENT_USER\software\microsoft\windows\currentversion\explorer\mountpoints2\{4016b2c3-3dcc-11db-938e-0002b3613615}]

\Shell\AutoRun\command - G:\LaunchU3.exe

[HKEY_CURRENT_USER\software\microsoft\windows\currentversion\explorer\mountpoints2\{6bf11c83-f523-11dc-94a2-00095b97f94e}]

\Shell\AutoRun\command - G:\LaunchU3.exe -a

.

Contents of the 'Scheduled Tasks' folder

2009-04-03 c:\windows\Tasks\A9509ADB918F0C07.job

- c:\progra~1\itch2\peak inter safe.exe []

2009-03-20 c:\windows\Tasks\AppleSoftwareUpdate.job

- c:\program files\Apple Software Update\SoftwareUpdate.exe [2008-04-11 17:57]

2009-04-03 c:\windows\Tasks\MP Scheduled Scan.job

- c:\program files\Windows Defender\MpCmdRun.exe [2006-11-03 18:20]

2009-04-03 c:\windows\Tasks\Symantec NetDetect.job

- c:\program files\Symantec\LiveUpdate\NDETECT.EXE []

2009-04-03 c:\windows\Tasks\WGASetup.job

- c:\windows\system32\KB905474\wgasetup.exe [2009-03-10 22:18]

.

.

------- Supplementary Scan -------

.

uStart Page = hxxp://www.google.com/

uSearchMigratedDefaultURL = hxxp://www.google.com/search?q={searchTerms}&sourceid=ie7&rls=com.microsoft:en-US&ie=utf8&oe=utf8

mSearch Bar =

uSearchURL,(Default) = hxxp://www.google.com/search?q=%s

IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~2\OFFICE11\EXCEL.EXE/3000

TCP: {F25F7A54-E240-4A6D-9FEB-E40FB042199A} = 192.168.1.100

DPF: DirectAnimation Java Classes - file://c:\windows\Java\classes\dajava.cab

DPF: Microsoft XML Parser for Java - file://c:\windows\Java\classes\xmldso.cab

DPF: {72D59B9C-1E59-4958-803A-ABDEE2D4CFA6} - hxxp://download.divx.com/player/DivXPlayerInstaller.exe

.

**************************************************************************

catchme 0.3.1375 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net

Rootkit scan 2009-04-02 23:28:26

Windows 5.1.2600 Service Pack 3 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully

hidden files: 0

**************************************************************************

.

------------------------ Other Running Processes ------------------------

.

c:\program files\Avira\AntiVir Desktop\avguard.exe

c:\windows\system32\devldr32.exe

.

**************************************************************************

.

Completion time: 2009-04-02 23:32:57 - machine was rebooted

ComboFix-quarantined-files.txt 2009-04-03 06:32:53

ComboFix2.txt 2009-04-03 03:55:42

ComboFix3.txt 2009-03-31 23:57:34

ComboFix4.txt 2009-03-30 21:34:20

Pre-Run: 26,828,738,560 bytes free

Post-Run: 26,808,651,776 bytes free

160 --- E O F --- 2009-04-03 03:20:39

Link to post
Share on other sites

Advanced,

Sorry to take so long betting back on this. It just finished, was paused waiting for my input.

ComboFix.exe/data002\32788R22FWJFW\c.bat;C:\Documents and Settings\Administrator.C600636-A\Desktop\ComboFix.exe/data002;Probably BATCH.Virus;;

ComboFix.exe/data002\32788R22FWJFW\psexec.cfexe;C:\Documents and Settings\Administrator.C600636-A\Desktop\ComboFix.exe/data002;Program.PsExec.171;;

data002;C:\Documents and Settings\Administrator.C600636-A\Desktop;Archive contains infected objects;;

ComboFix.exe;C:\Documents and Settings\Administrator.C600636-A\Desktop;Container contains infected objects;Moved.;

ComboFix.exe/data002\32788R22FWJFW\c.bat;C:\Documents and Settings\Maureen\Desktop\ComboFix.exe/data002;Probably BATCH.Virus;;

ComboFix.exe/data002\32788R22FWJFW\psexec.cfexe;C:\Documents and Settings\Maureen\Desktop\ComboFix.exe/data002;Program.PsExec.171;;

data002;C:\Documents and Settings\Maureen\Desktop;Archive contains infected objects;;

ComboFix.exe;C:\Documents and Settings\Maureen\Desktop;Container contains infected objects;Moved.;

ndis.sys.vir;C:\Qoobox\Quarantine\C\WINDOWS\system32\drivers;Trojan.NtRootKit.2670;Deleted.;

A0068795.bat;C:\System Volume Information\_restore{CEB701B5-D78E-48C8-B460-CD183A0FBEB1}\RP540;Probably BATCH.Virus;;

A0069871.bat;C:\System Volume Information\_restore{CEB701B5-D78E-48C8-B460-CD183A0FBEB1}\RP541;Probably BATCH.Virus;;

A0069873.EXE;C:\System Volume Information\_restore{CEB701B5-D78E-48C8-B460-CD183A0FBEB1}\RP541;Program.PsExec.170;Moved.;

A0070563.exe;C:\System Volume Information\_restore{CEB701B5-D78E-48C8-B460-CD183A0FBEB1}\RP541;Trojan.Fakealert.4140;Deleted.;

A0070577.exe;C:\System Volume Information\_restore{CEB701B5-D78E-48C8-B460-CD183A0FBEB1}\RP541;Trojan.Fakealert.4140;Deleted.;

A0070580.exe;C:\System Volume Information\_restore{CEB701B5-D78E-48C8-B460-CD183A0FBEB1}\RP541;Trojan.Fakealert.4140;Deleted.;

A0070582.exe;C:\System Volume Information\_restore{CEB701B5-D78E-48C8-B460-CD183A0FBEB1}\RP541;Trojan.Fakealert.4140;Deleted.;

A0071907.exe;C:\System Volume Information\_restore{CEB701B5-D78E-48C8-B460-CD183A0FBEB1}\RP543;Dialer.Siggen.121;Deleted.;

A0071908.exe;C:\System Volume Information\_restore{CEB701B5-D78E-48C8-B460-CD183A0FBEB1}\RP543;Trojan.MulDrop.30699;Deleted.;

A0071910.exe;C:\System Volume Information\_restore{CEB701B5-D78E-48C8-B460-CD183A0FBEB1}\RP543;Trojan.DownLoader.5289;Deleted.;

A0071911.exe;C:\System Volume Information\_restore{CEB701B5-D78E-48C8-B460-CD183A0FBEB1}\RP543;Adware.TargetServer;Moved.;

A0071912.exe;C:\System Volume Information\_restore{CEB701B5-D78E-48C8-B460-CD183A0FBEB1}\RP543;Adware.TargetServer;Moved.;

A0071913.dll;C:\System Volume Information\_restore{CEB701B5-D78E-48C8-B460-CD183A0FBEB1}\RP543;Adware.TargetServer;Moved.;

A0071914.dll;C:\System Volume Information\_restore{CEB701B5-D78E-48C8-B460-CD183A0FBEB1}\RP543;Trojan.Virtumod.1654;Deleted.;

A0071915.dll;C:\System Volume Information\_restore{CEB701B5-D78E-48C8-B460-CD183A0FBEB1}\RP543;Trojan.Virtumod.1654;Deleted.;

A0071916.exe;C:\System Volume Information\_restore{CEB701B5-D78E-48C8-B460-CD183A0FBEB1}\RP543;Trojan.Inject.5089;Deleted.;

A0071917.dll;C:\System Volume Information\_restore{CEB701B5-D78E-48C8-B460-CD183A0FBEB1}\RP543;Trojan.Virtumod.1654;Deleted.;

A0071918.dll;C:\System Volume Information\_restore{CEB701B5-D78E-48C8-B460-CD183A0FBEB1}\RP543;Trojan.MulDrop.1565;Deleted.;

A0071920.dll;C:\System Volume Information\_restore{CEB701B5-D78E-48C8-B460-CD183A0FBEB1}\RP543;Trojan.Virtumod.1654;Deleted.;

A0071921.exe;C:\System Volume Information\_restore{CEB701B5-D78E-48C8-B460-CD183A0FBEB1}\RP543;Trojan.DownLoad.28462;Deleted.;

A0071922.dll;C:\System Volume Information\_restore{CEB701B5-D78E-48C8-B460-CD183A0FBEB1}\RP543;Trojan.Virtumod.1654;Deleted.;

A0071923.dll;C:\System Volume Information\_restore{CEB701B5-D78E-48C8-B460-CD183A0FBEB1}\RP543;Trojan.Virtumod.1654;Deleted.;

A0071925.dll;C:\System Volume Information\_restore{CEB701B5-D78E-48C8-B460-CD183A0FBEB1}\RP543;Trojan.Virtumod.1654;Deleted.;

A0071926.dll;C:\System Volume Information\_restore{CEB701B5-D78E-48C8-B460-CD183A0FBEB1}\RP543;Trojan.Virtumod.1654;Deleted.;

A0071929.dll;C:\System Volume Information\_restore{CEB701B5-D78E-48C8-B460-CD183A0FBEB1}\RP543;Trojan.Virtumod.1654;Deleted.;

A0071947.bat;C:\System Volume Information\_restore{CEB701B5-D78E-48C8-B460-CD183A0FBEB1}\RP543;Probably BATCH.Virus;;

A0071949.EXE;C:\System Volume Information\_restore{CEB701B5-D78E-48C8-B460-CD183A0FBEB1}\RP543;Program.PsExec.170;Moved.;

A0075950.exe/data002\32788R22FWJFW\c.bat;C:\System Volume Information\_restore{CEB701B5-D78E-48C8-B460-CD183A0FBEB1}\RP548\A0075950.exe/data002;Probably BATCH.Virus;;

A0075950.exe/data002\32788R22FWJFW\psexec.cfexe;C:\System Volume Information\_restore{CEB701B5-D78E-48C8-B460-CD183A0FBEB1}\RP548\A0075950.exe/data002;Program.PsExec.171;;

data002;C:\System Volume Information\_restore{CEB701B5-D78E-48C8-B460-CD183A0FBEB1}\RP548;Archive contains infected objects;;

A0075950.exe;C:\System Volume Information\_restore{CEB701B5-D78E-48C8-B460-CD183A0FBEB1}\RP548;Container contains infected objects;Moved.;

A0075958.bat;C:\System Volume Information\_restore{CEB701B5-D78E-48C8-B460-CD183A0FBEB1}\RP548;Probably BATCH.Virus;;

A0076057.bat;C:\System Volume Information\_restore{CEB701B5-D78E-48C8-B460-CD183A0FBEB1}\RP548;Probably BATCH.Virus;;

A0076076.exe/data002\32788R22FWJFW\c.bat;C:\System Volume Information\_restore{CEB701B5-D78E-48C8-B460-CD183A0FBEB1}\RP549\A0076076.exe/data002;Probably BATCH.Virus;;

A0076076.exe/data002\32788R22FWJFW\psexec.cfexe;C:\System Volume Information\_restore{CEB701B5-D78E-48C8-B460-CD183A0FBEB1}\RP549\A0076076.exe/data002;Program.PsExec.171;;

data002;C:\System Volume Information\_restore{CEB701B5-D78E-48C8-B460-CD183A0FBEB1}\RP549;Archive contains infected objects;;

A0076076.exe;C:\System Volume Information\_restore{CEB701B5-D78E-48C8-B460-CD183A0FBEB1}\RP549;Container contains infected objects;Moved.;

A0076091.sys;C:\System Volume Information\_restore{CEB701B5-D78E-48C8-B460-CD183A0FBEB1}\RP549;Trojan.NtRootKit.2670;Deleted.;

A0076106.bat;C:\System Volume Information\_restore{CEB701B5-D78E-48C8-B460-CD183A0FBEB1}\RP549;Probably BATCH.Virus;;

A0076108.EXE;C:\System Volume Information\_restore{CEB701B5-D78E-48C8-B460-CD183A0FBEB1}\RP549;Program.PsExec.170;Moved.;

A0076162.exe;C:\System Volume Information\_restore{CEB701B5-D78E-48C8-B460-CD183A0FBEB1}\RP549;Program.3Proxy.25;Moved.;

A0076163.exe\Documents and Settings\User\Desktop\AutoIt\autodl2\proxy\3proxy.exe;C:\System Volume Information\_restore{CEB701B5-D78E-48C8-B460-CD183A0FBEB1}\RP549\A0076163.exe;Program.3Proxy.25;;

A0076163.exe;C:\System Volume Information\_restore{CEB701B5-D78E-48C8-B460-CD183A0FBEB1}\RP549;Container contains infected objects;Moved.;

A0076168.exe/data002\32788R22FWJFW\c.bat;C:\System Volume Information\_restore{CEB701B5-D78E-48C8-B460-CD183A0FBEB1}\RP550\A0076168.exe/data002;Probably BATCH.Virus;;

A0076168.exe/data002\32788R22FWJFW\psexec.cfexe;C:\System Volume Information\_restore{CEB701B5-D78E-48C8-B460-CD183A0FBEB1}\RP550\A0076168.exe/data002;Program.PsExec.171;;

data002;C:\System Volume Information\_restore{CEB701B5-D78E-48C8-B460-CD183A0FBEB1}\RP550;Archive contains infected objects;;

A0076168.exe;C:\System Volume Information\_restore{CEB701B5-D78E-48C8-B460-CD183A0FBEB1}\RP550;Container contains infected objects;Moved.;

A0076194.bat;C:\System Volume Information\_restore{CEB701B5-D78E-48C8-B460-CD183A0FBEB1}\RP550;Probably BATCH.Virus;;

A0076196.EXE;C:\System Volume Information\_restore{CEB701B5-D78E-48C8-B460-CD183A0FBEB1}\RP550;Program.PsExec.170;Moved.;

A0076249.exe/data002\32788R22FWJFW\c.bat;C:\System Volume Information\_restore{CEB701B5-D78E-48C8-B460-CD183A0FBEB1}\RP550\A0076249.exe/data002;Probably BATCH.Virus;;

A0076249.exe/data002\32788R22FWJFW\psexec.cfexe;C:\System Volume Information\_restore{CEB701B5-D78E-48C8-B460-CD183A0FBEB1}\RP550\A0076249.exe/data002;Program.PsExec.171;;

data002;C:\System Volume Information\_restore{CEB701B5-D78E-48C8-B460-CD183A0FBEB1}\RP550;Archive contains infected objects;;

A0076249.exe;C:\System Volume Information\_restore{CEB701B5-D78E-48C8-B460-CD183A0FBEB1}\RP550;Container contains infected objects;Moved.;

A0076250.exe/data002\32788R22FWJFW\c.bat;C:\System Volume Information\_restore{CEB701B5-D78E-48C8-B460-CD183A0FBEB1}\RP550\A0076250.exe/data002;Probably BATCH.Virus;;

A0076250.exe/data002\32788R22FWJFW\psexec.cfexe;C:\System Volume Information\_restore{CEB701B5-D78E-48C8-B460-CD183A0FBEB1}\RP550\A0076250.exe/data002;Program.PsExec.171;;

data002;C:\System Volume Information\_restore{CEB701B5-D78E-48C8-B460-CD183A0FBEB1}\RP550;Archive contains infected objects;;

A0076250.exe;C:\System Volume Information\_restore{CEB701B5-D78E-48C8-B460-CD183A0FBEB1}\RP550;Container contains infected objects;Moved.;

wmplayer.exe\data008;C:\WINDOWS\RegisteredPackages\{DD90D410-1823-43EB-9A16-A2331BF08799}$BACKUP$\System\wmplayer.exe;BackDoor.Generic.665;;

wmplayer.exe\data009;C:\WINDOWS\RegisteredPackages\{DD90D410-1823-43EB-9A16-A2331BF08799}$BACKUP$\System\wmplayer.exe;Trojan.MulDrop.1027;;

wmplayer.exe;C:\WINDOWS\RegisteredPackages\{DD90D410-1823-43EB-9A16-A2331BF08799}$BACKUP$\System;Archive contains infected objects;Moved.;

ptch238120.exe;C:\WINDOWS\system32;Trojan.Virtumod.1636;Deleted.;

vfhr.exe;C:\WINDOWS\system32;Win32.HLLW.Autohit.7089;Incurable.Moved.;

Link to post
Share on other sites

  • Root Admin

Okay, let's try this now.

Remove all but the most recent Restore Point on Windows XP

You should
Create a New Restore Point
to prevent possible reinfection from an old one.

Some of the malware you picked up could have been saved in System Restore.

Since this is a protected directory your tools cannot access to delete these files, they sometimes can reinfect your system if you accidentally use an old restore point.

Setting a new restore point AFTER cleaning your system will help prevent this and enable your computer to
"roll-back"
to a clean working state.

The easiest and safest way to do this is

:
  • Go to
    Start
    >
    Programs
    >
    Accessories
    >
    System Tools
    and click "
    System Restore
    ".
  • If the shortcut is missing you can also click on
    START
    >
    RUN
    > and type in
    %SystemRoot%\system32\restore\rstrui.exe
    and click OK

  • Choose the radio button marked "
    Create a Restore Point
    " on the first screen then click "
    Next
    ".

  • Give the new Restore Point a name, then click "
    Create
    ".

  • The new point will be stamped with the current date and time. Keep a log of this so you can find it easily should you need to use System Restore.

  • Then use the
    Disk Cleanup
    to remove all but the most recently created Restore Point.
  • Go to
    Start
    >
    Run
    and type:
    Cleanmgr.exe

  • Select the drive where Windows is installed and click "
    Ok
    ". Disk Cleanup will scan your files for several minutes, then open.

  • Click the "
    More Options
    " tab, then click the "
    Clean up
    " button under System Restore.

  • Click Ok. You will be prompted with "
    Are you sure you want to delete all but the most recent restore point?
    "

  • Click
    Yes
    , then click Ok.

  • Click
    Yes
    again when prompted with "
    Are you sure you want to perform these actions?
    "

  • Disk Cleanup will remove the files and close automatically.

  • On the
    Disk Cleanup
    tab, if the
    System Restore: Obsolete Data Stores
    entry is available remove them also.

  • These are files that were created before Windows was reformatted or reinstalled. They are obsolete and you can delete them.

selectdrivecleanup.pngselectdrivecleanup1.png

Additional information

Microsoft KB article: How to turn off and turn on System Restore in Windows XP

Bert Kinney's site: All about Windows System Restore

Then run the following.

Please run the following to remove any tools that might have been used during the scaning and cleaning of your system.

STEP 1

Uninstall ComboFix.exe

(you may have to download a new copy if Dr Web removed it which it looks like it might have.)
  • Click
    START
    then
    RUN
  • Now type
    Combofix /u
    (if you renamed Combofix.exe use that name instead)
    in the runbox and click OK. Note the
    space
    between the
    X
    and the
    /U
    , it needs to be there.

  • CF_Cleanup.png


  • When shown the disclaimer, Select "2"

Remove this folder C:\QooBox if the uninstall instructions don't work and delete Combofix.exe

STEP 2

Uninstall GMER

Click on
START - RUN
and type in or copy/paste
%windir%\gmer_uninstall.cmd
to remove GMER.

STEP 3

Uninstall other tools

Please
Download
OTMoveIt3
by Old Timer
and save it to your
Desktop
.
  • Double-click
    OTMoveIt3.exe
    to run it.
  • While connected to the Internet, Click on the green
    CleanUp!
    button and it will populate a list of items to clean from your system that we used or may have used.

  • It should ask if you want to clean up, select Yes and allow the system to clean up these items.

    NOW
    please reboot your computer to finish the cleanup process

Then update MBAM and scan again please.

Update and Scan with Malwarebytes' Anti-Malware

  • Start MalwareBytes AntiMalware (Vista users must Right click and choose RunAs Admin)
  • Please DO NOT run MBAM in Safe Mode unless requested to, you MUST run it in normal Windows mode.
    • Update Malwarebytes' Anti-Malware
    • Select the Update tab
    • Click Update

    [*]When the update is complete, select the Scanner tab

    [*]Select Perform quick scan, then click Scan.

    [*]When the scan is complete, click OK, then Show Results to view the results.

    [*]Be sure that everything is checked, and click Remove Selected.

    [*]When completed, a log will open in Notepad. please copy and paste the log into your next reply

    • If you accidently close it, the log file is saved here and will be named like this:
    • C:\Documents and Settings\Username\Application Data\Malwarebytes\Malwarebytes' Anti-Malware\Logs\mbam-log-date (time).txt

Then post back the MBAM log and a new Hijackthis log.

Link to post
Share on other sites

Malwarebytes' Anti-Malware 1.35

Database version: 1939

Windows 5.1.2600 Service Pack 3

4/4/2009 7:37:49 AM

mbam-log-2009-04-04 (07-37-49).txt

Scan type: Quick Scan

Objects scanned: 75699

Time elapsed: 6 minute(s), 35 second(s)

Memory Processes Infected: 0

Memory Modules Infected: 0

Registry Keys Infected: 0

Registry Values Infected: 0

Registry Data Items Infected: 0

Folders Infected: 0

Files Infected: 0

Memory Processes Infected:

(No malicious items detected)

Memory Modules Infected:

(No malicious items detected)

Registry Keys Infected:

(No malicious items detected)

Registry Values Infected:

(No malicious items detected)

Registry Data Items Infected:

(No malicious items detected)

Folders Infected:

(No malicious items detected)

Files Infected:

(No malicious items detected)

Link to post
Share on other sites

Advanced,

Here is the latest MBAM and HiJack This after the suggested activities. Thanks.

Malwarebytes' Anti-Malware 1.35

Database version: 1939

Windows 5.1.2600 Service Pack 3

4/4/2009 8:20:12 AM

mbam-log-2009-04-04 (08-20-12).txt

Scan type: Quick Scan

Objects scanned: 75789

Time elapsed: 7 minute(s), 32 second(s)

Memory Processes Infected: 0

Memory Modules Infected: 0

Registry Keys Infected: 0

Registry Values Infected: 0

Registry Data Items Infected: 0

Folders Infected: 0

Files Infected: 0

Memory Processes Infected:

(No malicious items detected)

Memory Modules Infected:

(No malicious items detected)

Registry Keys Infected:

(No malicious items detected)

Registry Values Infected:

(No malicious items detected)

Registry Data Items Infected:

(No malicious items detected)

Folders Infected:

(No malicious items detected)

Files Infected:

(No malicious items detected)

HIJACK

Logfile of Trend Micro HijackThis v2.0.2

Scan saved at 9:00:06 AM, on 4/4/2009

Platform: Windows XP SP3 (WinNT 5.01.2600)

MSIE: Internet Explorer v7.00 (7.00.6000.16791)

Boot mode: Normal

Running processes:

C:\WINDOWS\System32\smss.exe

C:\WINDOWS\system32\winlogon.exe

C:\WINDOWS\system32\services.exe

C:\WINDOWS\system32\lsass.exe

C:\WINDOWS\system32\svchost.exe

C:\Program Files\Windows Defender\MsMpEng.exe

C:\WINDOWS\System32\svchost.exe

C:\WINDOWS\system32\spoolsv.exe

C:\Program Files\Avira\AntiVir Desktop\sched.exe

C:\Program Files\Avira\AntiVir Desktop\avguard.exe

C:\WINDOWS\System32\svchost.exe

C:\WINDOWS\Explorer.EXE

C:\WINDOWS\Logi_MwX.Exe

C:\Program Files\Avira\AntiVir Desktop\avgnt.exe

C:\WINDOWS\system32\ctfmon.exe

C:\WINDOWS\system32\devldr32.exe

C:\WINDOWS\System32\svchost.exe

C:\Program Files\Internet Explorer\IEXPLORE.EXE

C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157

R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896

R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896

R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157

O2 - BHO: (no name) - {02478D38-C3F9-4efb-9B51-7695ECA05670} - (no file)

O4 - HKLM\..\Run: [Logitech Utility] Logi_MwX.Exe

O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime

O4 - HKLM\..\Run: [JobHisInit] C:\Program Files\RMClient\JobHisInit.exe

O4 - HKLM\..\Run: [MplSetUp] C:\Program Files\RMClient\MplSetUp.exe

O4 - HKLM\..\Run: [avgnt] "C:\Program Files\Avira\AntiVir Desktop\avgnt.exe" /min

O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe

O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office10\OSA.EXE

O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\OFFICE11\EXCEL.EXE/3000

O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\WINDOWS\system32\msjava.dll

O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\WINDOWS\system32\msjava.dll

O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\OFFICE11\REFIEBAR.DLL

O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe

O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe

O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe

O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe

O10 - Unknown file in Winsock LSP: c:\windows\system32\nwprovau.dll

O16 - DPF: {01A88BB1-1174-41EC-ACCB-963509EAE56B} (SysProWmi Class) - http://support.dell.com/systemprofiler/SysPro.CAB

O16 - DPF: {02BF25D5-8C17-4B23-BC80-D3488ABDDC6B} (QuickTime Object) - http://appldnld.apple.com.edgesuite.net/co...ex/qtplugin.cab

O16 - DPF: {5F8469B4-B055-49DD-83F7-62B522420ECC} (Facebook Photo Uploader Control) - http://upload.facebook.com/controls/Facebo...otoUploader.cab

O16 - DPF: {6CB5E471-C305-11D3-99A8-000086395495} - http://toolbar.google.com/data/en/big/1.1....g/GoogleNav.cab

O16 - DPF: {72D59B9C-1E59-4958-803A-ABDEE2D4CFA6} - http://download.divx.com/player/DivXPlayerInstaller.exe

O16 - DPF: {8EDAD21C-3584-4E66-A8AB-EB0E5584767D} - http://toolbar.google.com/data/GoogleActivate.cab

O16 - DPF: {B8BE5E93-A60C-4D26-A2DC-220313175592} (ZoneIntro Class) - http://cdn2.zone.msn.com/binFramework/v10/...ro.cab53083.cab

O17 - HKLM\System\CCS\Services\Tcpip\..\{F25F7A54-E240-4A6D-9FEB-E40FB042199A}: NameServer = 192.168.1.100

O23 - Service: Avira AntiVir Scheduler (AntiVirSchedulerService) - Avira GmbH - C:\Program Files\Avira\AntiVir Desktop\sched.exe

O23 - Service: Avira AntiVir Guard (AntiVirService) - Avira GmbH - C:\Program Files\Avira\AntiVir Desktop\avguard.exe

O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe

--

End of file - 4448 bytes

Link to post
Share on other sites

Ran a Virus Scan Afterward. Here are three files found.

C:\Documents and Settings\Maureen\DoctorWeb\Quarantine\A0071911.exe

[DETECTION] Is the TR/Dldr.TSUpdate.P Trojan

C:\Documents and Settings\Maureen\DoctorWeb\Quarantine\A0071912.exe

[DETECTION] Is the TR/Dldr.TSUpdate.F Trojan

C:\Documents and Settings\Maureen\DoctorWeb\Quarantine\A0071913.dll

[DETECTION] Contains recognition pattern of the ADSPY/Maxim adware or spyware

FULL FILE BELOW

Avira AntiVir Personal

Report file date: 2009-04-04 09:50

Scanning for 1339172 virus strains and unwanted programs.

Licensee : Avira AntiVir Personal - FREE Antivirus

Serial number : 0000149996-ADJIE-0000001

Platform : Windows XP

Windows version : (Service Pack 3) [5.1.2600]

Boot mode : Normally booted

Username : SYSTEM

Computer name : MAUREEN

Version information:

BUILD.DAT : 9.0.0.387 17962 Bytes 2009-03-24 11:04:00

AVSCAN.EXE : 9.0.3.3 464641 Bytes 2009-02-24 19:13:26

AVSCAN.DLL : 9.0.3.0 40705 Bytes 2009-02-27 17:58:24

LUKE.DLL : 9.0.3.2 209665 Bytes 2009-02-20 18:35:49

LUKERES.DLL : 9.0.2.0 12033 Bytes 2009-02-27 17:58:52

ANTIVIR0.VDF : 7.1.0.0 15603712 Bytes 2008-10-27 19:30:36

ANTIVIR1.VDF : 7.1.2.12 3336192 Bytes 2009-02-11 03:33:26

ANTIVIR2.VDF : 7.1.3.0 1330176 Bytes 2009-04-01 16:03:09

ANTIVIR3.VDF : 7.1.3.13 57344 Bytes 2009-04-03 16:03:09

Engineversion : 8.2.0.138

AEVDF.DLL : 8.1.1.0 106868 Bytes 2009-01-28 00:36:42

AESCRIPT.DLL : 8.1.1.73 373114 Bytes 2009-04-04 16:03:15

AESCN.DLL : 8.1.1.10 127348 Bytes 2009-04-04 16:03:15

AERDL.DLL : 8.1.1.3 438645 Bytes 2008-10-30 01:24:41

AEPACK.DLL : 8.1.3.12 397687 Bytes 2009-04-04 16:03:14

AEOFFICE.DLL : 8.1.0.36 196987 Bytes 2009-02-27 03:01:56

AEHEUR.DLL : 8.1.0.114 1700214 Bytes 2009-04-04 16:03:13

AEHELP.DLL : 8.1.2.2 119158 Bytes 2009-02-27 03:01:56

AEGEN.DLL : 8.1.1.33 340340 Bytes 2009-04-04 16:03:11

AEEMU.DLL : 8.1.0.9 393588 Bytes 2008-10-09 21:32:40

AECORE.DLL : 8.1.6.7 176502 Bytes 2009-04-04 16:03:10

AEBB.DLL : 8.1.0.3 53618 Bytes 2008-10-09 21:32:40

AVWINLL.DLL : 9.0.0.3 18177 Bytes 2008-12-12 15:47:59

AVPREF.DLL : 9.0.0.1 43777 Bytes 2008-12-05 17:32:15

AVREP.DLL : 8.0.0.3 155905 Bytes 2009-01-20 21:34:28

AVREG.DLL : 9.0.0.0 36609 Bytes 2008-12-05 17:32:09

AVARKT.DLL : 9.0.0.1 292609 Bytes 2009-02-09 14:52:24

AVEVTLOG.DLL : 9.0.0.7 167169 Bytes 2009-01-30 17:37:08

SQLITE3.DLL : 3.6.1.0 326401 Bytes 2009-01-28 22:03:49

SMTPLIB.DLL : 9.2.0.25 28417 Bytes 2009-02-02 15:21:33

NETNT.DLL : 9.0.0.0 11521 Bytes 2008-12-05 17:32:10

RCIMAGE.DLL : 9.0.0.21 2438401 Bytes 2009-02-09 18:45:45

RCTEXT.DLL : 9.0.35.0 87297 Bytes 2009-03-11 22:55:12

Configuration settings for the scan:

Jobname.............................: Complete system scan

Configuration file..................: c:\program files\avira\antivir desktop\sysscan.avp

Logging.............................: low

Primary action......................: interactive

Secondary action....................: ignore

Scan master boot sector.............: on

Scan boot sector....................: on

Boot sectors........................: C:,

Process scan........................: on

Scan registry.......................: on

Search for rootkits.................: on

Integrity checking of system files..: off

Scan all files......................: All files

Scan archives.......................: on

Recursion depth.....................: 20

Smart extensions....................: on

Macro heuristic.....................: on

File heuristic......................: medium

Start of the scan: 2009-04-04 09:50

Starting search for hidden objects.

'47507' objects were checked, '0' hidden objects were found.

The scan of running processes will be started

Scan process 'avscan.exe' - '1' Module(s) have been scanned

Scan process 'avcenter.exe' - '1' Module(s) have been scanned

Scan process 'iexplore.exe' - '1' Module(s) have been scanned

Scan process 'svchost.exe' - '1' Module(s) have been scanned

Scan process 'devldr32.exe' - '1' Module(s) have been scanned

Scan process 'ctfmon.exe' - '1' Module(s) have been scanned

Scan process 'avgnt.exe' - '1' Module(s) have been scanned

Scan process 'LOGI_MWX.EXE' - '1' Module(s) have been scanned

Scan process 'explorer.exe' - '1' Module(s) have been scanned

Scan process 'alg.exe' - '1' Module(s) have been scanned

Scan process 'svchost.exe' - '1' Module(s) have been scanned

Scan process 'avguard.exe' - '1' Module(s) have been scanned

Scan process 'sched.exe' - '1' Module(s) have been scanned

Scan process 'spoolsv.exe' - '1' Module(s) have been scanned

Scan process 'svchost.exe' - '1' Module(s) have been scanned

Scan process 'svchost.exe' - '1' Module(s) have been scanned

Scan process 'svchost.exe' - '1' Module(s) have been scanned

Scan process 'MsMpEng.exe' - '1' Module(s) have been scanned

Scan process 'svchost.exe' - '1' Module(s) have been scanned

Scan process 'svchost.exe' - '1' Module(s) have been scanned

Scan process 'lsass.exe' - '1' Module(s) have been scanned

Scan process 'services.exe' - '1' Module(s) have been scanned

Scan process 'winlogon.exe' - '1' Module(s) have been scanned

Scan process 'csrss.exe' - '1' Module(s) have been scanned

Scan process 'smss.exe' - '1' Module(s) have been scanned

25 processes with 25 modules were scanned

Starting master boot sector scan:

Start scanning boot sectors:

Starting to scan executable files (registry).

The registry was scanned ( '58' files ).

Starting the file scan:

Begin scan in 'C:\'

C:\pagefile.sys

[WARNING] The file could not be opened!

[NOTE] This file is a Windows system file.

[NOTE] This file cannot be opened for scanning.

C:\Documents and Settings\Maureen\DoctorWeb\Quarantine\A0071911.exe

[DETECTION] Is the TR/Dldr.TSUpdate.P Trojan

C:\Documents and Settings\Maureen\DoctorWeb\Quarantine\A0071912.exe

[DETECTION] Is the TR/Dldr.TSUpdate.F Trojan

C:\Documents and Settings\Maureen\DoctorWeb\Quarantine\A0071913.dll

[DETECTION] Contains recognition pattern of the ADSPY/Maxim adware or spyware

Beginning disinfection:

C:\Documents and Settings\Maureen\DoctorWeb\Quarantine\A0071911.exe

[DETECTION] Is the TR/Dldr.TSUpdate.P Trojan

[NOTE] The file was moved to '4a07b0b5.qua'!

C:\Documents and Settings\Maureen\DoctorWeb\Quarantine\A0071912.exe

[DETECTION] Is the TR/Dldr.TSUpdate.F Trojan

[NOTE] The file was moved to '4b6e9bfe.qua'!

C:\Documents and Settings\Maureen\DoctorWeb\Quarantine\A0071913.dll

[DETECTION] Contains recognition pattern of the ADSPY/Maxim adware or spyware

[NOTE] The file was moved to '4b61a346.qua'!

End of the scan: 2009-04-04 12:09

Used time: 56:23 Minute(s)

The scan has been done completely.

5016 Scanned directories

252225 Files were scanned

3 Viruses and/or unwanted programs were found

0 Files were classified as suspicious

0 files were deleted

0 Viruses and unwanted programs were repaired

3 Files were moved to quarantine

0 Files were renamed

1 Files cannot be scanned

252221 Files not concerned

6543 Archives were scanned

1 Warnings

4 Notes

47507 Objects were scanned with rootkit scan

0 Hidden objects were found

Link to post
Share on other sites

  • Root Admin

That's all normal and okay. It just found stuff that had already been removed and put in Quarantine.

You can delete the Dr Web file and this folder now.: C:\Documents and Settings\Maureen\DoctorWeb\

Unless there is something else it looks good to me.

Great, all looks good now.

I'll close your post soon so that other don't post into it and leave you with this information and suggestions.

So how did I get infected in the first place?

At this time your system appears to be clean. Nothing else in the logs indicates that you are still infected.

Now that you appear to be clean, please follow these simple steps in order to keep your computer clean and secure:

Remove all but the most recent Restore Point on Windows XP

You should
Create a New Restore Point
to prevent possible reinfection from an old one.

Some of the malware you picked up could have been saved in System Restore.

Since this is a protected directory your tools cannot access to delete these files, they sometimes can reinfect your system if you accidentally use an old restore point.

Setting a new restore point AFTER cleaning your system will help prevent this and enable your computer to
"roll-back"
to a clean working state.

The easiest and safest way to do this is

:
  • Go to
    Start
    >
    Programs
    >
    Accessories
    >
    System Tools
    and click "
    System Restore
    ".
  • If the shortcut is missing you can also click on
    START
    >
    RUN
    > and type in
    %SystemRoot%\system32\restore\rstrui.exe
    and click OK

  • Choose the radio button marked "
    Create a Restore Point
    " on the first screen then click "
    Next
    ".

  • Give the new Restore Point a name, then click "
    Create
    ".

  • The new point will be stamped with the current date and time. Keep a log of this so you can find it easily should you need to use System Restore.

  • Then use the
    Disk Cleanup
    to remove all but the most recently created Restore Point.
  • Go to
    Start
    >
    Run
    and type:
    Cleanmgr.exe

  • Select the drive where Windows is installed and click "
    Ok
    ". Disk Cleanup will scan your files for several minutes, then open.

  • Click the "
    More Options
    " tab, then click the "
    Clean up
    " button under System Restore.

  • Click Ok. You will be prompted with "
    Are you sure you want to delete all but the most recent restore point?
    "

  • Click
    Yes
    , then click Ok.

  • Click
    Yes
    again when prompted with "
    Are you sure you want to perform these actions?
    "

  • Disk Cleanup will remove the files and close automatically.

  • On the
    Disk Cleanup
    tab, if the
    System Restore: Obsolete Data Stores
    entry is available remove them also.

  • These are files that were created before Windows was reformatted or reinstalled. They are obsolete and you can delete them.

selectdrivecleanup.pngselectdrivecleanup1.png

Additional information

Microsoft KB article: How to turn off and turn on System Restore in Windows XP

Bert Kinney's site: All about Windows System Restore

Here are some free programs I recommend that could help you improve your computer's security.

Install SpyWare Blaster

Download it from here

Find here the tutorial on how to use Spyware Blaster here

Install WinPatrol

Download it from here

Here you can find information about how WinPatrol works here

Install FireTrust SiteHound

You can find information and download it from here

Install hpHosts

Download it from here

hpHosts is a community managed and maintained hosts file that allows an additional layer of protection against access to ad,

tracking and malicious websites. This prevents your computer from connecting to these untrusted sites

by redirecting them to 127.0.0.1 which is your own local computer.

hpHosts Support Forum

Update your Antivirus programs and other security products regularly to avoid new threats that could infect your system.

You can use one of these sites to check if any updates are needed for your pc.

Secunia Software Inspector

F-secure Health Check

Visit Microsoft often to get the latest updates for your computer.

http://www.update.microsoft.com

Note 1: If you are running Windows XP SP2, you should upgrade to SP3.

Note 2: Users of Norton Internet Security 2008 should uninstall the software before they install Service Pack 3.

The security suite can then be reinstalled afterwards.

The windows firewall is not sufficient to protect your system. It doesn't monitor outgoing traffic and this is a must.

I recommend Online Armor Free

A little outdated but good reading on how to prevent Malware

Keep safe online and happy surfing.

Since this issue is resolved I will close the thread to prevent others from posting into it. If you need assistance please start your own topic and someone will be happy to assist you.

The fixes and advice in this thread are for this machine only. Do not apply to your machine unless you Fully Understand how these programs work and what you're doing. Please start a thread of your own and someone will be happy to help you, just follow the Pre-Hijackthis instructions found here before posting Pre- HJT Post Instructions

Also don't forget that we offer FREE assistance with General PC questions and repair here PC Help

If you're pleased with the product Malwarebytes and the service provided you, please let your friends, family, and co-workers know. http://www.malwarebytes.org

Link to post
Share on other sites

Guest
This topic is now closed to further replies.
 Share

  • Recently Browsing   0 members

    No registered users viewing this page.

Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.