Jump to content

spyware.onlinegames and trojan vundo...


Recommended Posts

I got these logs repeatedly the past few days after scanning because my computer was running slow and my linksys adapter box kept freezing. This is the one i just recently did and the second reply to this post is the one that i did before this scan. Any help or idea's on how to get rid of these? I can delete them off with malware but then they pop back up either a few hours later or the next day adn everything starts freezing again.. any help would be appreciated

Malwarebytes' Anti-Malware 1.37

Database version: 2182

Windows 5.1.2600 Service Pack 2

5/29/2009 4:18:09 PM

mbam-log-2009-05-29 (16-18-09).txt

Scan type: Full Scan (C:\|)

Objects scanned: 118720

Time elapsed: 12 minute(s), 6 second(s)

Memory Processes Infected: 0

Memory Modules Infected: 0

Registry Keys Infected: 1

Registry Values Infected: 0

Registry Data Items Infected: 0

Folders Infected: 0

Files Infected: 0

Memory Processes Infected:

(No malicious items detected)

Memory Modules Infected:

(No malicious items detected)

Registry Keys Infected:

HKEY_LOCAL_MACHINE\SOFTWARE\AGprotect (Malware.Trace) -> Quarantined and deleted successfully.

Registry Values Infected:

(No malicious items detected)

Registry Data Items Infected:

(No malicious items detected)

Folders Infected:

(No malicious items detected)

Files Infected:

(No malicious items detected)

Link to post
Share on other sites

Malwarebytes' Anti-Malware 1.37

Database version: 2182

Windows 5.1.2600 Service Pack 2

5/27/2009 6:52:23 PM

mbam-log-2009-05-27 (18-52-23).txt

Scan type: Full Scan (C:\|)

Objects scanned: 103094

Time elapsed: 10 minute(s), 30 second(s)

Memory Processes Infected: 3

Memory Modules Infected: 4

Registry Keys Infected: 13

Registry Values Infected: 4

Registry Data Items Infected: 1

Folders Infected: 2

Files Infected: 220

Memory Processes Infected:

C:\WINDOWS\dhcp\svchost.exe (Trojan.Agent) -> Unloaded process successfully.

C:\WINDOWS\system32\sopidkc.exe (Backdoor.Bot) -> Unloaded process successfully.

C:\WINDOWS\system32\avast!Antivirus.exe (Trojan.Agent) -> Unloaded process successfully.

Memory Modules Infected:

C:\WINDOWS\system32\__c0091381.dat (Trojan.Vundo) -> Delete on reboot.

C:\WINDOWS\system32\afmain0.dll (Spyware.OnlineGames) -> Delete on reboot.

C:\WINDOWS\system32\nmdfgds0.dll (Spyware.OnLineGames) -> Delete on reboot.

C:\WINDOWS\system32\mkfght0.dll (Spyware.OnlineGames) -> Delete on reboot.

Registry Keys Infected:

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\__c0091381 (Trojan.Vundo) -> Delete on reboot.

HKEY_CLASSES_ROOT\CLSID\{bb4c402f-882a-4526-8c08-51278ea437c1} (Spyware.OnlineGames) -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\dhcpsrv (Trojan.Agent) -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\dhcpsrv (Trojan.Agent) -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\dhcpsrv (Trojan.Agent) -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\msncache (Trojan.Agent) -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\msncache (Trojan.Agent) -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\msncache (Trojan.Agent) -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\sopidkc (Backdoor.Bot) -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\sopidkc (Backdoor.Bot) -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\sopidkc (Backdoor.Bot) -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SOFTWARE\AGprotect (Malware.Trace) -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\avast!Antivirus (Trojan.Agent) -> Quarantined and deleted successfully.

Registry Values Infected:

HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ertyuop (Spyware.OnlineGames) -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ShellExecuteHooks\{bb4c402f-882a-4526-8c08-51278ea437c1} (Spyware.OnlineGames) -> Quarantined and deleted successfully.

HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kava (Spyware.OnlineGames) -> Quarantined and deleted successfully.

HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cdoosoft (Trojan.Agent) -> Quarantined and deleted successfully.

Registry Data Items Infected:

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Folder\Hidden\SHOWALL\CheckedValue (Hijack.System.Hidden) -> Bad: (0) Good: (1) -> Quarantined and deleted successfully.

Folders Infected:

C:\RECYCLER\S-1-5-21-0243636035-3055115376-381863306-1556 (Backdoor.Bot) -> Quarantined and deleted successfully.

C:\Program Files\ThunMail (Spyware.OnlineGamer) -> Quarantined and deleted successfully.

Files Infected:

C:\WINDOWS\system32\__c0091381.dat (Trojan.Vundo) -> Delete on reboot.

C:\WINDOWS\system32\rttrwq.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\afmain0.dll (Spyware.OnlineGames) -> Delete on reboot.

c:\hcpjmkup.exe (Trojan.Vundo) -> Quarantined and deleted successfully.

c:\il0byu3h.com (Spyware.OnlineGames) -> Quarantined and deleted successfully.

c:\vbfq.exe (Trojan.Vundo) -> Quarantined and deleted successfully.

c:\documents and settings\tony montana\reader_s.exe (Trojan.Backdoor) -> Quarantined and deleted successfully.

c:\documents and settings\tony montana\local settings\Temp\to7c0.exe (Trojan.WinWebSec) -> Quarantined and deleted successfully.

c:\documents and settings\tony montana\local settings\Temp\32n21.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.

c:\documents and settings\tony montana\local settings\Temp\32n1.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.

c:\documents and settings\tony montana\local settings\Temp\32n10.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.

c:\documents and settings\tony montana\local settings\Temp\32n11.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.

c:\documents and settings\tony montana\local settings\Temp\32n12.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.

c:\documents and settings\tony montana\local settings\Temp\32n13.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.

c:\documents and settings\tony montana\local settings\Temp\32n14.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.

c:\documents and settings\tony montana\local settings\Temp\32n15.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.

c:\documents and settings\tony montana\local settings\Temp\32n16.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.

c:\documents and settings\tony montana\local settings\Temp\32n17.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.

c:\documents and settings\tony montana\local settings\Temp\32n18.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.

c:\documents and settings\tony montana\local settings\Temp\32n19.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.

c:\documents and settings\tony montana\local settings\Temp\32n1A.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.

c:\documents and settings\tony montana\local settings\Temp\32n1B.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.

c:\documents and settings\tony montana\local settings\Temp\32n1C.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.

c:\documents and settings\tony montana\local settings\Temp\32n1D.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.

c:\documents and settings\tony montana\local settings\Temp\32n1E.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.

c:\documents and settings\tony montana\local settings\Temp\32n1F.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.

c:\documents and settings\tony montana\local settings\Temp\32n2.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.

c:\documents and settings\tony montana\local settings\Temp\32n20.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.

c:\documents and settings\tony montana\local settings\Temp\zjhufhdfe.exe (Trojan.WinWebSec) -> Quarantined and deleted successfully.

c:\documents and settings\tony montana\local settings\Temp\_A00F5305F7.exe (Trojan.Vundo) -> Quarantined and deleted successfully.

c:\documents and settings\tony montana\local settings\Temp\_A00F58EB6D.exe (Trojan.Vundo) -> Quarantined and deleted successfully.

c:\documents and settings\tony montana\local settings\Temp\32n22.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.

c:\documents and settings\tony montana\local settings\Temp\32n23.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.

c:\documents and settings\tony montana\local settings\Temp\32n24.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.

c:\documents and settings\tony montana\local settings\Temp\32n25.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.

c:\documents and settings\tony montana\local settings\Temp\32n26.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.

c:\documents and settings\tony montana\local settings\Temp\32n27.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.

c:\documents and settings\tony montana\local settings\Temp\32n28.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.

c:\documents and settings\tony montana\local settings\Temp\32n3.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.

c:\documents and settings\tony montana\local settings\Temp\32n4.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.

c:\documents and settings\tony montana\local settings\Temp\32n5.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.

c:\documents and settings\tony montana\local settings\Temp\32n6.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.

c:\documents and settings\tony montana\local settings\Temp\32n7.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.

c:\documents and settings\tony montana\local settings\Temp\32n8.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.

c:\documents and settings\tony montana\local settings\Temp\32n9.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.

c:\documents and settings\tony montana\local settings\Temp\32nA.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.

c:\documents and settings\tony montana\local settings\Temp\32nB.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.

c:\documents and settings\tony montana\local settings\Temp\32nC.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.

c:\documents and settings\tony montana\local settings\Temp\32nD.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.

c:\documents and settings\tony montana\local settings\Temp\32nE.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.

c:\documents and settings\tony montana\local settings\Temp\32nF.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.

c:\documents and settings\tony montana\local settings\Temp\153.exe (Trojan.Agent) -> Quarantined and deleted successfully.

c:\documents and settings\tony montana\local settings\Temp\wtinii.exe (Trojan.WinWebSec) -> Quarantined and deleted successfully.

c:\documents and settings\tony montana\local settings\temporary internet files\Content.IE5\G5A3O5AV\zz[1].exe (Trojan.Downloader) -> Quarantined and deleted successfully.

c:\RECYCLER\s-1-5-21-0243636035-3055115376-381863306-1556\pqlmq.exe (Trojan.Agent) -> Quarantined and deleted successfully.

c:\system volume information\_restore{9f110f4d-d970-4810-ad9b-03149289b717}\RP10\A0000775.com (Spyware.OnlineGames) -> Quarantined and deleted successfully.

c:\system volume information\_restore{9f110f4d-d970-4810-ad9b-03149289b717}\RP11\A0000831.com (Spyware.OnlineGames) -> Quarantined and deleted successfully.

c:\system volume information\_restore{9f110f4d-d970-4810-ad9b-03149289b717}\RP12\A0000841.com (Spyware.OnlineGames) -> Quarantined and deleted successfully.

c:\system volume information\_restore{9f110f4d-d970-4810-ad9b-03149289b717}\RP12\A0000860.com (Spyware.OnlineGames) -> Quarantined and deleted successfully.

c:\system volume information\_restore{9f110f4d-d970-4810-ad9b-03149289b717}\RP12\A0000869.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.

c:\system volume information\_restore{9f110f4d-d970-4810-ad9b-03149289b717}\RP12\A0000882.com (Spyware.OnlineGames) -> Quarantined and deleted successfully.

c:\system volume information\_restore{9f110f4d-d970-4810-ad9b-03149289b717}\RP12\A0000891.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.

c:\system volume information\_restore{9f110f4d-d970-4810-ad9b-03149289b717}\RP12\A0000908.com (Spyware.OnlineGames) -> Quarantined and deleted successfully.

c:\system volume information\_restore{9f110f4d-d970-4810-ad9b-03149289b717}\RP12\A0000915.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.

c:\system volume information\_restore{9f110f4d-d970-4810-ad9b-03149289b717}\RP12\A0000928.com (Spyware.OnlineGames) -> Quarantined and deleted successfully.

c:\system volume information\_restore{9f110f4d-d970-4810-ad9b-03149289b717}\RP12\A0000937.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.

c:\system volume information\_restore{9f110f4d-d970-4810-ad9b-03149289b717}\RP12\A0001019.com (Spyware.OnlineGames) -> Quarantined and deleted successfully.

c:\system volume information\_restore{9f110f4d-d970-4810-ad9b-03149289b717}\RP12\A0001025.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.

c:\system volume information\_restore{9f110f4d-d970-4810-ad9b-03149289b717}\RP12\A0002019.com (Spyware.OnlineGames) -> Quarantined and deleted successfully.

c:\system volume information\_restore{9f110f4d-d970-4810-ad9b-03149289b717}\RP12\A0002038.com (Spyware.OnlineGames) -> Quarantined and deleted successfully.

c:\system volume information\_restore{9f110f4d-d970-4810-ad9b-03149289b717}\RP13\A0002071.com (Spyware.OnlineGames) -> Quarantined and deleted successfully.

c:\system volume information\_restore{9f110f4d-d970-4810-ad9b-03149289b717}\RP13\A0002127.com (Spyware.OnlineGames) -> Quarantined and deleted successfully.

c:\system volume information\_restore{9f110f4d-d970-4810-ad9b-03149289b717}\RP13\A0002131.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.

c:\system volume information\_restore{9f110f4d-d970-4810-ad9b-03149289b717}\RP13\A0002190.com (Spyware.OnlineGames) -> Quarantined and deleted successfully.

c:\system volume information\_restore{9f110f4d-d970-4810-ad9b-03149289b717}\RP13\A0002225.com (Spyware.OnlineGames) -> Quarantined and deleted successfully.

c:\system volume information\_restore{9f110f4d-d970-4810-ad9b-03149289b717}\RP13\A0003227.com (Spyware.OnlineGames) -> Quarantined and deleted successfully.

c:\system volume information\_restore{9f110f4d-d970-4810-ad9b-03149289b717}\RP14\A0003240.com (Spyware.OnlineGames) -> Quarantined and deleted successfully.

c:\system volume information\_restore{9f110f4d-d970-4810-ad9b-03149289b717}\RP15\A0003337.com (Spyware.OnlineGames) -> Quarantined and deleted successfully.

c:\system volume information\_restore{9f110f4d-d970-4810-ad9b-03149289b717}\RP15\A0003372.com (Spyware.OnlineGames) -> Quarantined and deleted successfully.

c:\system volume information\_restore{9f110f4d-d970-4810-ad9b-03149289b717}\RP15\A0003403.com (Spyware.OnlineGames) -> Quarantined and deleted successfully.

c:\system volume information\_restore{9f110f4d-d970-4810-ad9b-03149289b717}\RP16\A0003513.com (Spyware.OnlineGames) -> Quarantined and deleted successfully.

c:\system volume information\_restore{9f110f4d-d970-4810-ad9b-03149289b717}\RP17\A0003519.com (Spyware.OnlineGames) -> Quarantined and deleted successfully.

c:\system volume information\_restore{9f110f4d-d970-4810-ad9b-03149289b717}\RP18\A0003523.com (Spyware.OnlineGames) -> Quarantined and deleted successfully.

c:\system volume information\_restore{9f110f4d-d970-4810-ad9b-03149289b717}\RP19\A0003529.com (Spyware.OnlineGames) -> Quarantined and deleted successfully.

c:\system volume information\_restore{9f110f4d-d970-4810-ad9b-03149289b717}\RP20\A0003540.com (Spyware.OnlineGames) -> Quarantined and deleted successfully.

c:\system volume information\_restore{9f110f4d-d970-4810-ad9b-03149289b717}\RP20\A0003632.com (Spyware.OnlineGames) -> Quarantined and deleted successfully.

c:\system volume information\_restore{9f110f4d-d970-4810-ad9b-03149289b717}\RP20\A0003638.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.

c:\system volume information\_restore{9f110f4d-d970-4810-ad9b-03149289b717}\RP20\A0003715.com (Spyware.OnlineGames) -> Quarantined and deleted successfully.

c:\system volume information\_restore{9f110f4d-d970-4810-ad9b-03149289b717}\RP21\A0003767.com (Spyware.OnlineGames) -> Quarantined and deleted successfully.

c:\system volume information\_restore{9f110f4d-d970-4810-ad9b-03149289b717}\RP21\A0003824.com (Spyware.OnlineGames) -> Quarantined and deleted successfully.

c:\system volume information\_restore{9f110f4d-d970-4810-ad9b-03149289b717}\RP21\A0003833.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.

c:\system volume information\_restore{9f110f4d-d970-4810-ad9b-03149289b717}\RP22\A0003872.com (Spyware.OnlineGames) -> Quarantined and deleted successfully.

c:\system volume information\_restore{9f110f4d-d970-4810-ad9b-03149289b717}\RP22\A0003950.com (Spyware.OnlineGames) -> Quarantined and deleted successfully.

c:\system volume information\_restore{9f110f4d-d970-4810-ad9b-03149289b717}\RP22\A0003962.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.

c:\system volume information\_restore{9f110f4d-d970-4810-ad9b-03149289b717}\RP23\A0004067.com (Spyware.OnlineGames) -> Quarantined and deleted successfully.

c:\system volume information\_restore{9f110f4d-d970-4810-ad9b-03149289b717}\RP23\A0004096.com (Spyware.OnlineGames) -> Quarantined and deleted successfully.

c:\system volume information\_restore{9f110f4d-d970-4810-ad9b-03149289b717}\RP23\A0004120.com (Spyware.OnlineGames) -> Quarantined and deleted successfully.

c:\system volume information\_restore{9f110f4d-d970-4810-ad9b-03149289b717}\RP23\A0004125.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.

c:\system volume information\_restore{9f110f4d-d970-4810-ad9b-03149289b717}\RP23\A0004173.com (Spyware.OnlineGames) -> Quarantined and deleted successfully.

c:\system volume information\_restore{9f110f4d-d970-4810-ad9b-03149289b717}\RP23\A0004223.com (Spyware.OnlineGames) -> Quarantined and deleted successfully.

c:\system volume information\_restore{9f110f4d-d970-4810-ad9b-03149289b717}\RP23\A0004255.com (Spyware.OnlineGames) -> Quarantined and deleted successfully.

c:\system volume information\_restore{9f110f4d-d970-4810-ad9b-03149289b717}\RP23\A0004259.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.

c:\system volume information\_restore{9f110f4d-d970-4810-ad9b-03149289b717}\RP23\A0004288.com (Spyware.OnlineGames) -> Quarantined and deleted successfully.

c:\system volume information\_restore{9f110f4d-d970-4810-ad9b-03149289b717}\RP23\A0005331.com (Spyware.OnlineGames) -> Quarantined and deleted successfully.

c:\system volume information\_restore{9f110f4d-d970-4810-ad9b-03149289b717}\RP23\A0005336.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.

c:\system volume information\_restore{9f110f4d-d970-4810-ad9b-03149289b717}\RP23\A0006329.com (Spyware.OnlineGames) -> Quarantined and deleted successfully.

c:\system volume information\_restore{9f110f4d-d970-4810-ad9b-03149289b717}\RP24\A0006345.com (Spyware.OnlineGames) -> Quarantined and deleted successfully.

c:\system volume information\_restore{9f110f4d-d970-4810-ad9b-03149289b717}\RP25\A0006360.com (Spyware.OnlineGames) -> Quarantined and deleted successfully.

c:\system volume information\_restore{9f110f4d-d970-4810-ad9b-03149289b717}\RP25\A0006425.com (Spyware.OnlineGames) -> Quarantined and deleted successfully.

c:\system volume information\_restore{9f110f4d-d970-4810-ad9b-03149289b717}\RP25\A0007423.com (Spyware.OnlineGames) -> Quarantined and deleted successfully.

c:\system volume information\_restore{9f110f4d-d970-4810-ad9b-03149289b717}\RP25\A0007433.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.

c:\system volume information\_restore{9f110f4d-d970-4810-ad9b-03149289b717}\RP27\A0007591.com (Spyware.OnlineGames) -> Quarantined and deleted successfully.

c:\system volume information\_restore{9f110f4d-d970-4810-ad9b-03149289b717}\RP27\A0007600.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.

c:\system volume information\_restore{9f110f4d-d970-4810-ad9b-03149289b717}\RP27\A0008732.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.

c:\system volume information\_restore{9f110f4d-d970-4810-ad9b-03149289b717}\RP27\A0007636.com (Spyware.OnlineGames) -> Quarantined and deleted successfully.

c:\system volume information\_restore{9f110f4d-d970-4810-ad9b-03149289b717}\RP27\A0007684.com (Spyware.OnlineGames) -> Quarantined and deleted successfully.

c:\system volume information\_restore{9f110f4d-d970-4810-ad9b-03149289b717}\RP27\A0007690.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.

c:\system volume information\_restore{9f110f4d-d970-4810-ad9b-03149289b717}\RP27\A0008724.com (Spyware.OnlineGames) -> Quarantined and deleted successfully.

c:\system volume information\_restore{9f110f4d-d970-4810-ad9b-03149289b717}\RP27\A0009729.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.

c:\system volume information\_restore{9f110f4d-d970-4810-ad9b-03149289b717}\RP27\A0009735.com (Spyware.OnlineGames) -> Quarantined and deleted successfully.

c:\system volume information\_restore{9f110f4d-d970-4810-ad9b-03149289b717}\RP27\A0009808.com (Spyware.OnlineGames) -> Quarantined and deleted successfully.

c:\system volume information\_restore{9f110f4d-d970-4810-ad9b-03149289b717}\RP27\A0009758.com (Spyware.OnlineGames) -> Quarantined and deleted successfully.

c:\system volume information\_restore{9f110f4d-d970-4810-ad9b-03149289b717}\RP28\A0009863.com (Spyware.OnlineGames) -> Quarantined and deleted successfully.

c:\system volume information\_restore{9f110f4d-d970-4810-ad9b-03149289b717}\RP28\A0009974.com (Spyware.OnlineGames) -> Quarantined and deleted successfully.

c:\system volume information\_restore{9f110f4d-d970-4810-ad9b-03149289b717}\RP28\A0010017.com (Spyware.OnlineGames) -> Quarantined and deleted successfully.

c:\system volume information\_restore{9f110f4d-d970-4810-ad9b-03149289b717}\RP28\A0010025.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.

c:\system volume information\_restore{9f110f4d-d970-4810-ad9b-03149289b717}\RP28\A0010071.com (Spyware.OnlineGames) -> Quarantined and deleted successfully.

c:\system volume information\_restore{9f110f4d-d970-4810-ad9b-03149289b717}\RP28\A0010133.com (Spyware.OnlineGames) -> Quarantined and deleted successfully.

c:\system volume information\_restore{9f110f4d-d970-4810-ad9b-03149289b717}\RP29\A0010164.com (Spyware.OnlineGames) -> Quarantined and deleted successfully.

c:\system volume information\_restore{9f110f4d-d970-4810-ad9b-03149289b717}\RP29\A0010208.com (Spyware.OnlineGames) -> Quarantined and deleted successfully.

c:\system volume information\_restore{9f110f4d-d970-4810-ad9b-03149289b717}\RP29\A0011223.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.

c:\system volume information\_restore{9f110f4d-d970-4810-ad9b-03149289b717}\RP29\A0012245.com (Spyware.OnlineGames) -> Quarantined and deleted successfully.

c:\system volume information\_restore{9f110f4d-d970-4810-ad9b-03149289b717}\RP29\A0012250.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.

c:\system volume information\_restore{9f110f4d-d970-4810-ad9b-03149289b717}\RP29\A0011245.com (Spyware.OnlineGames) -> Quarantined and deleted successfully.

c:\system volume information\_restore{9f110f4d-d970-4810-ad9b-03149289b717}\RP29\A0012311.com (Spyware.OnlineGames) -> Quarantined and deleted successfully.

c:\system volume information\_restore{9f110f4d-d970-4810-ad9b-03149289b717}\RP29\A0012278.com (Spyware.OnlineGames) -> Quarantined and deleted successfully.

c:\system volume information\_restore{9f110f4d-d970-4810-ad9b-03149289b717}\RP29\A0012347.com (Spyware.OnlineGames) -> Quarantined and deleted successfully.

c:\system volume information\_restore{9f110f4d-d970-4810-ad9b-03149289b717}\RP29\A0012386.com (Spyware.OnlineGames) -> Quarantined and deleted successfully.

c:\system volume information\_restore{9f110f4d-d970-4810-ad9b-03149289b717}\RP29\A0012420.com (Spyware.OnlineGames) -> Quarantined and deleted successfully.

c:\system volume information\_restore{9f110f4d-d970-4810-ad9b-03149289b717}\RP29\A0012447.com (Spyware.OnlineGames) -> Quarantined and deleted successfully.

c:\system volume information\_restore{9f110f4d-d970-4810-ad9b-03149289b717}\RP29\A0013490.com (Spyware.OnlineGames) -> Quarantined and deleted successfully.

c:\system volume information\_restore{9f110f4d-d970-4810-ad9b-03149289b717}\RP29\A0014565.com (Spyware.OnlineGames) -> Quarantined and deleted successfully.

c:\system volume information\_restore{9f110f4d-d970-4810-ad9b-03149289b717}\RP29\A0014598.com (Spyware.OnlineGames) -> Quarantined and deleted successfully.

c:\system volume information\_restore{9f110f4d-d970-4810-ad9b-03149289b717}\RP29\A0014640.com (Spyware.OnlineGames) -> Quarantined and deleted successfully.

c:\system volume information\_restore{9f110f4d-d970-4810-ad9b-03149289b717}\RP29\A0014644.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.

c:\system volume information\_restore{9f110f4d-d970-4810-ad9b-03149289b717}\RP29\A0014661.com (Spyware.OnlineGames) -> Quarantined and deleted successfully.

c:\system volume information\_restore{9f110f4d-d970-4810-ad9b-03149289b717}\RP29\A0014691.com (Spyware.OnlineGames) -> Quarantined and deleted successfully.

c:\system volume information\_restore{9f110f4d-d970-4810-ad9b-03149289b717}\RP29\A0014727.com (Spyware.OnlineGames) -> Quarantined and deleted successfully.

c:\system volume information\_restore{9f110f4d-d970-4810-ad9b-03149289b717}\RP29\A0014733.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.

c:\system volume information\_restore{9f110f4d-d970-4810-ad9b-03149289b717}\RP29\A0014756.com (Spyware.OnlineGames) -> Quarantined and deleted successfully.

c:\system volume information\_restore{9f110f4d-d970-4810-ad9b-03149289b717}\RP29\A0014805.com (Spyware.OnlineGames) -> Quarantined and deleted successfully.

c:\system volume information\_restore{9f110f4d-d970-4810-ad9b-03149289b717}\RP29\A0014813.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.

c:\system volume information\_restore{9f110f4d-d970-4810-ad9b-03149289b717}\RP29\A0015860.com (Spyware.OnlineGames) -> Quarantined and deleted successfully.

c:\system volume information\_restore{9f110f4d-d970-4810-ad9b-03149289b717}\RP29\A0016889.com (Spyware.OnlineGames) -> Quarantined and deleted successfully.

c:\system volume information\_restore{9f110f4d-d970-4810-ad9b-03149289b717}\RP29\A0016936.com (Spyware.OnlineGames) -> Quarantined and deleted successfully.

c:\system volume information\_restore{9f110f4d-d970-4810-ad9b-03149289b717}\RP29\A0016974.com (Spyware.OnlineGames) -> Quarantined and deleted successfully.

c:\system volume information\_restore{9f110f4d-d970-4810-ad9b-03149289b717}\RP29\A0016978.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.

c:\system volume information\_restore{9f110f4d-d970-4810-ad9b-03149289b717}\RP29\A0018020.com (Spyware.OnlineGames) -> Quarantined and deleted successfully.

c:\system volume information\_restore{9f110f4d-d970-4810-ad9b-03149289b717}\RP29\A0021044.com (Spyware.OnlineGames) -> Quarantined and deleted successfully.

c:\system volume information\_restore{9f110f4d-d970-4810-ad9b-03149289b717}\RP29\A0021052.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.

c:\system volume information\_restore{9f110f4d-d970-4810-ad9b-03149289b717}\RP31\A0021132.com (Spyware.OnlineGames) -> Quarantined and deleted successfully.

c:\system volume information\_restore{9f110f4d-d970-4810-ad9b-03149289b717}\RP31\A0021158.com (Spyware.OnlineGames) -> Quarantined and deleted successfully.

c:\system volume information\_restore{9f110f4d-d970-4810-ad9b-03149289b717}\RP31\A0021185.com (Spyware.OnlineGames) -> Quarantined and deleted successfully.

c:\system volume information\_restore{9f110f4d-d970-4810-ad9b-03149289b717}\RP31\A0021196.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.

c:\system volume information\_restore{9f110f4d-d970-4810-ad9b-03149289b717}\RP31\A0022218.com (Spyware.OnlineGames) -> Quarantined and deleted successfully.

c:\system volume information\_restore{9f110f4d-d970-4810-ad9b-03149289b717}\RP31\A0022254.com (Spyware.OnlineGames) -> Quarantined and deleted successfully.

c:\system volume information\_restore{9f110f4d-d970-4810-ad9b-03149289b717}\RP31\A0022260.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.

c:\system volume information\_restore{9f110f4d-d970-4810-ad9b-03149289b717}\RP31\A0022294.com (Spyware.OnlineGames) -> Quarantined and deleted successfully.

c:\system volume information\_restore{9f110f4d-d970-4810-ad9b-03149289b717}\RP31\A0022300.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.

c:\system volume information\_restore{9f110f4d-d970-4810-ad9b-03149289b717}\RP31\A0023332.com (Spyware.OnlineGames) -> Quarantined and deleted successfully.

c:\system volume information\_restore{9f110f4d-d970-4810-ad9b-03149289b717}\RP31\A0022335.com (Spyware.OnlineGames) -> Quarantined and deleted successfully.

c:\system volume information\_restore{9f110f4d-d970-4810-ad9b-03149289b717}\RP31\A0022345.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.

c:\system volume information\_restore{9f110f4d-d970-4810-ad9b-03149289b717}\RP31\A0023362.com (Spyware.OnlineGames) -> Quarantined and deleted successfully.

c:\system volume information\_restore{9f110f4d-d970-4810-ad9b-03149289b717}\RP31\A0023368.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.

c:\system volume information\_restore{9f110f4d-d970-4810-ad9b-03149289b717}\RP31\A0024359.com (Spyware.OnlineGames) -> Quarantined and deleted successfully.

c:\system volume information\_restore{9f110f4d-d970-4810-ad9b-03149289b717}\RP31\A0024368.dll (Backdoor.Bot) -> Quarantined and deleted successfully.

c:\system volume information\_restore{9f110f4d-d970-4810-ad9b-03149289b717}\RP31\A0025360.com (Spyware.OnlineGames) -> Quarantined and deleted successfully.

c:\system volume information\_restore{9f110f4d-d970-4810-ad9b-03149289b717}\RP31\A0025366.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.

c:\system volume information\_restore{9f110f4d-d970-4810-ad9b-03149289b717}\RP31\A0026372.dll (Backdoor.Bot) -> Quarantined and deleted successfully.

c:\system volume information\_restore{9f110f4d-d970-4810-ad9b-03149289b717}\RP31\A0026403.com (Spyware.OnlineGames) -> Quarantined and deleted successfully.

c:\WINDOWS\system32\SYSDLL.exe (Trojan.Proxy) -> Quarantined and deleted successfully.

c:\WINDOWS\system32\reader_s.exe (Trojan.Backdoor) -> Quarantined and deleted successfully.

c:\WINDOWS\system32\yhafd78auhd.dll (Trojan.FakeAlert) -> Quarantined and deleted successfully.

c:\WINDOWS\system32\__c00C0A24.dat (Trojan.Vundo) -> Quarantined and deleted successfully.

c:\RECYCLER\s-1-5-21-0243636035-3055115376-381863306-1556\Desktop.ini (Backdoor.Bot) -> Quarantined and deleted successfully.

c:\program files\ThunMail\testabd.dll (Spyware.OnlineGamer) -> Quarantined and deleted successfully.

c:\program files\ThunMail\testabd.exe (Spyware.OnlineGamer) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\kavo0.dll (Spyware.OnlineGames) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\kavo.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.

C:\WINDOWS\sysguard.exe (Trojan.Agent) -> Quarantined and deleted successfully.

C:\WINDOWS\dhcp\svchost.exe (Trojan.Agent) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\a.exe (Trojan.Agent) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\msncache.dll (Trojan.Agent) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\olhrwef.exe (Trojan.Agent) -> Quarantined and deleted successfully.

C:\WINDOWS\ld08.exe (Worm.Koobface) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\6to4v32.dll (Trojan.Agent) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\comsa32.sys (Trojan.Agent) -> Quarantined and deleted successfully.

c:\WINDOWS\system32\dncyool64.sys (Trojan.Agent) -> Quarantined and deleted successfully.

c:\WINDOWS\system32\dpcxool64.sys (Trojan.Agent) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\FInstall.sys (Backdoor.Bot) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\sopidkc.exe (Backdoor.Bot) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\tpszxyd.sys (Backdoor.Bot) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\tpsaxyd.exe (Backdoor.Bot) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\wtukd32.exe (Backdoor.Bot) -> Quarantined and deleted successfully.

c:\WINDOWS\system32\afmain1.dll (Trojan.Agent) -> Delete on reboot.

c:\WINDOWS\system32\afmain2.dll (Trojan.Agent) -> Quarantined and deleted successfully.

c:\WINDOWS\system32\afmain3.dll (Trojan.Agent) -> Quarantined and deleted successfully.

c:\WINDOWS\system32\afmain4.dll (Trojan.Agent) -> Quarantined and deleted successfully.

c:\WINDOWS\system32\afmain5.dll (Trojan.Agent) -> Quarantined and deleted successfully.

c:\documents and settings\tony montana\local settings\Temp\BN45.tmp (Trojan.Agent) -> Quarantined and deleted successfully.

c:\documents and settings\tony montana\local settings\Temp\BN46.tmp (Trojan.Agent) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\sft.res (Malware.Trace) -> Quarantined and deleted successfully.

c:\WINDOWS\system32\nmdfgds0.dll (Spyware.OnLineGames) -> Delete on reboot.

c:\WINDOWS\system32\nmdfgds1.dll (Spyware.OnLineGames) -> Delete on reboot.

c:\WINDOWS\system32\nmdfgds2.dll (Spyware.OnLineGames) -> Quarantined and deleted successfully.

c:\WINDOWS\system32\mkfght0.dll (Spyware.OnlineGames) -> Delete on reboot.

c:\WINDOWS\system32\mkfght1.dll (Spyware.OnlineGames) -> Quarantined and deleted successfully.

C:\WINDOWS\AhnRpta.exe (Trojan.Backdoor) -> Delete on reboot.

C:\WINDOWS\system32\sysloc\sysloc.dll (Trojan.BHO) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\avast!Antivirus.exe (Trojan.Agent) -> Quarantined and deleted successfully.

Link to post
Share on other sites

this is a log i just took 3 mins ago after being gone all day and then updating my malware bytes.. any help or idea's on what to do?

Malwarebytes' Anti-Malware 1.37

Database version: 2193

Windows 5.1.2600 Service Pack 2

5/29/2009 6:27:49 PM

mbam-log-2009-05-29 (18-27-44).txt

Scan type: Full Scan (C:\|)

Objects scanned: 120003

Time elapsed: 12 minute(s), 52 second(s)

Memory Processes Infected: 0

Memory Modules Infected: 0

Registry Keys Infected: 1

Registry Values Infected: 0

Registry Data Items Infected: 0

Folders Infected: 0

Files Infected: 33

Memory Processes Infected:

(No malicious items detected)

Memory Modules Infected:

(No malicious items detected)

Registry Keys Infected:

HKEY_LOCAL_MACHINE\SOFTWARE\AGprotect (Malware.Trace) -> No action taken.

Registry Values Infected:

(No malicious items detected)

Registry Data Items Infected:

(No malicious items detected)

Folders Infected:

(No malicious items detected)

Files Infected:

c:\2a.exe (Spyware.OnlineGames) -> No action taken.

c:\documents and settings\tony montana\local settings\Temp\~TM3A.tmp (Trojan.Agent) -> No action taken.

c:\documents and settings\tony montana\local settings\Temp\~TM5.tmp (Trojan.Agent) -> No action taken.

c:\documents and settings\tony montana\local settings\Temp\dfjfseretjfftuqwbdvder36.log (Trojan.Downloader) -> No action taken.

c:\documents and settings\tony montana\local settings\Temp\dfjfseretjfftuqwbdvder44.exe (Trojan.Downloader) -> No action taken.

c:\system volume information\_restore{9f110f4d-d970-4810-ad9b-03149289b717}\RP29\A0016972.exe (Spyware.OnlineGames) -> No action taken.

c:\system volume information\_restore{9f110f4d-d970-4810-ad9b-03149289b717}\RP29\A0016980.exe (Spyware.OnlineGames) -> No action taken.

c:\system volume information\_restore{9f110f4d-d970-4810-ad9b-03149289b717}\RP29\A0018011.exe (Spyware.OnlineGames) -> No action taken.

c:\system volume information\_restore{9f110f4d-d970-4810-ad9b-03149289b717}\RP29\A0018018.exe (Spyware.OnlineGames) -> No action taken.

c:\system volume information\_restore{9f110f4d-d970-4810-ad9b-03149289b717}\RP29\A0018019.dll (Spyware.OnlineGames) -> No action taken.

c:\system volume information\_restore{9f110f4d-d970-4810-ad9b-03149289b717}\RP29\A0018005.dll (Spyware.OnlineGames) -> No action taken.

c:\system volume information\_restore{9f110f4d-d970-4810-ad9b-03149289b717}\RP31\A0026367.sys (Trojan.Downloader) -> No action taken.

c:\system volume information\_restore{9f110f4d-d970-4810-ad9b-03149289b717}\RP31\A0026407.exe (Spyware.OnlineGames) -> No action taken.

c:\system volume information\_restore{9f110f4d-d970-4810-ad9b-03149289b717}\RP31\A0026421.dll (Spyware.OnlineGames) -> No action taken.

c:\system volume information\_restore{9f110f4d-d970-4810-ad9b-03149289b717}\RP31\A0026512.exe (Spyware.OnlineGames) -> No action taken.

c:\system volume information\_restore{9f110f4d-d970-4810-ad9b-03149289b717}\RP31\A0026534.dll (Spyware.OnlineGames) -> No action taken.

c:\system volume information\_restore{9f110f4d-d970-4810-ad9b-03149289b717}\RP31\A0026539.exe (Spyware.OnlineGames) -> No action taken.

c:\system volume information\_restore{9f110f4d-d970-4810-ad9b-03149289b717}\RP31\A0026554.dll (Spyware.OnlineGames) -> No action taken.

c:\system volume information\_restore{9f110f4d-d970-4810-ad9b-03149289b717}\RP31\A0026559.exe (Trojan.Agent) -> No action taken.

c:\system volume information\_restore{9f110f4d-d970-4810-ad9b-03149289b717}\RP31\A0026560.exe (Spyware.OnlineGames) -> No action taken.

c:\system volume information\_restore{9f110f4d-d970-4810-ad9b-03149289b717}\RP31\A0026567.exe (Trojan.Downloader) -> No action taken.

c:\system volume information\_restore{9f110f4d-d970-4810-ad9b-03149289b717}\RP31\A0026570.exe (Worm.Koobface) -> No action taken.

c:\system volume information\_restore{9f110f4d-d970-4810-ad9b-03149289b717}\RP31\A0026588.dll (Spyware.OnlineGames) -> No action taken.

c:\system volume information\_restore{9f110f4d-d970-4810-ad9b-03149289b717}\RP31\A0026594.exe (Spyware.OnlineGames) -> No action taken.

c:\system volume information\_restore{9f110f4d-d970-4810-ad9b-03149289b717}\RP31\A0026598.exe (Worm.Koobface) -> No action taken.

c:\system volume information\_restore{9f110f4d-d970-4810-ad9b-03149289b717}\RP31\A0026612.exe (Spyware.OnlineGames) -> No action taken.

c:\system volume information\_restore{9f110f4d-d970-4810-ad9b-03149289b717}\RP31\A0026742.exe (Spyware.OnlineGames) -> No action taken.

c:\system volume information\_restore{9f110f4d-d970-4810-ad9b-03149289b717}\RP31\A0026751.dll (Spyware.OnlineGames) -> No action taken.

c:\system volume information\_restore{9f110f4d-d970-4810-ad9b-03149289b717}\RP31\A0026607.dll (Spyware.OnlineGames) -> No action taken.

c:\system volume information\_restore{9f110f4d-d970-4810-ad9b-03149289b717}\RP32\A0026910.sys (Rootkit.Agent) -> No action taken.

c:\WINDOWS\system32\wbem\proquota.exe (Trojan.Agent) -> No action taken.

c:\WINDOWS\Temp\t4m0_516032836014.bk.old (Trojan.Downloader) -> No action taken.

C:\WINDOWS\system32\jhxm32.dll (Trojan.BHO) -> No action taken.

Link to post
Share on other sites

  • Root Admin

Please visit this webpage for instructions for downloading ComboFix to your
DESKTOP
:
how-to-use-combofix

Please ensure you read this guide carefully and install the Recovery Console first.

NOTE!!:

You must save and run
ComboFix.exe
on your DESKTOP and not from any other folder.

Also,
DO NOT
click the mouse or launch any other applications while this is running or it may stall the program

Additional links to download the tool:

Note:

The
Windows Recovery Console
will allow you to boot up into a special recovery (repair) mode. This allows us to more easily help you should your computer have a problem after an attempted removal of malware. It is a simple procedure that will only take a few moments of your time.

Once installed, you should see a blue screen prompt that says:

The Recovery Console was successfully installed.

Please continue as follows:
  • Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.
  • Click
    Yes
    to allow ComboFix to continue scanning for malware.

  • When the tool is finished, it will produce a report for you.

  • Please post the
    C:\ComboFix.txt
    along with a
    new HijackThis log
    so we may continue cleaning the system.

Link to post
Share on other sites

ok i ran this.. and when it restarted on its own. i got a bug that i had a few weeks ago where window's loaded adn then would shut down and go back to a screen saying window's shut down out of no where pick one of these options safe mode, sm networks, command prompt or last known good config or start up normal. i hit normal and it did the same thing 2 times.. then i hit last known config and got back to window's and heres the log that it gave me. It also completely changed my desktop from what it used to look like... Not sure if it deleted somethign that changed my background or what but here is the log...

omboFix 09-05-29.01 - Tony Montana 05/29/2009 20:27.1 - NTFSx86

Microsoft Windows XP Professional 5.1.2600.2.1252.1.1033.18.1023.731 [GMT -4:00]

Running from: c:\documents and settings\Tony Montana\Desktop\ComboFix.exe

.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))

.

C:\3.cmd

C:\Autorun.inf

c:\documents and settings\LocalService\Application Data\691447002.exe

C:\lad.bat

C:\n68mqcra.exe

C:\q9.cmd

c:\windows\IE4 Error Log.txt

c:\windows\Install.txt

c:\windows\system32\_000110_.tmp.dll

c:\windows\system32\certstore.dat

c:\windows\system32\e1000msg.dll

c:\windows\system32\Iasv32.dll

c:\windows\system32\Install.txt

c:\windows\system32\sysloc

c:\windows\Temp\3962002088.exe

C:\xh319r9b.bat

C:\yhh.bat

I:\2a.exe

I:\3.cmd

I:\Autorun.inf

I:\lad.bat

I:\n68mqcra.exe

I:\q9.cmd

I:\xh319r9b.bat

I:\yhh.bat

c:\windows\system32\proquota.exe was missing

Restored copy from - c:\system volume information\_restore{9F110F4D-D970-4810-AD9B-03149289B717}\RP31\A0023393.exe

Infected copy of c:\windows\system32\drivers\ndis.sys was found and disinfected

Restored copy from - The cat ate it :P

.

((((((((((((((((((((((((((((((((((((((( Drivers/Services )))))))))))))))))))))))))))))))))))))))))))))))))

.

-------\Legacy_avast!antivirus

-------\Legacy_dhcpsrv

-------\Legacy_ias

-------\Legacy_NPF

-------\Service_ias

((((((((((((((((((((((((( Files Created from 2009-04-28 to 2009-05-30 )))))))))))))))))))))))))))))))

.

2009-05-30 00:29 . 2004-08-10 05:00 50176 ----a-w c:\windows\system32\proquota.exe

2009-05-29 06:04 . 2009-05-29 06:05 117760 ----a-w c:\documents and settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\SDDLLS\UIREPAIR.DLL

2009-05-29 06:04 . 2009-05-29 06:04 -------- d-----w c:\documents and settings\Administrator\Application Data\SUPERAntiSpyware.com

2009-05-29 06:01 . 2009-05-29 06:01 -------- d-----w c:\documents and settings\Administrator\Application Data\Malwarebytes

2009-05-29 05:58 . 2009-05-29 05:58 -------- d-----w c:\documents and settings\All Users\Application Data\SUPERAntiSpyware.com

2009-05-29 05:58 . 2009-05-29 18:48 -------- d-----w c:\documents and settings\Tony Montana\Application Data\SUPERAntiSpyware.com

2009-05-29 05:58 . 2009-05-29 18:48 -------- d-----w c:\program files\SUPERAntiSpyware

2009-05-27 22:39 . 2009-05-26 17:20 40160 ----a-w c:\windows\system32\drivers\mbamswissarmy.sys

2009-05-27 22:39 . 2009-05-27 22:39 -------- d-----w c:\program files\Malwarebytes' Anti-Malware

2009-05-27 22:39 . 2009-05-26 17:19 19096 ----a-w c:\windows\system32\drivers\mbam.sys

2009-05-27 13:47 . 2009-05-27 22:41 -------- d-s---w c:\windows\system32\config\systemprofile\UserData

2009-05-27 05:48 . 2009-05-27 05:48 123904 ----a-w c:\windows\system32\cdmr.dll

2009-05-27 05:48 . 2009-05-27 05:48 123904 ----a-w c:\windows\system32\ativcox.dll

2009-05-27 05:48 . 2009-05-27 05:48 -------- d-----w c:\documents and settings\LocalService\Local Settings\Application Data\Adobe

2009-05-27 05:37 . 2009-05-27 05:37 -------- d-----w c:\documents and settings\Tony Montana\Application Data\Malwarebytes

2009-05-27 05:37 . 2009-05-27 05:37 -------- d-----w c:\documents and settings\All Users\Application Data\Malwarebytes

2009-05-27 05:15 . 2009-05-27 22:52 -------- d-----w c:\windows\dhcp

2009-05-24 01:48 . 2009-05-24 01:49 -------- d-----w c:\documents and settings\Tony Montana\Application Data\Ventrilo

2009-05-24 01:48 . 2009-05-24 01:48 -------- d-----w c:\program files\Ventrilo

2009-05-24 01:47 . 2009-05-29 18:48 -------- d-----w c:\program files\Common Files\Wise Installation Wizard

2009-05-24 00:06 . 2009-05-24 00:09 -------- dc----w c:\windows\system32\DRVSTORE

2009-05-24 00:06 . 2009-05-24 00:09 -------- d-----w c:\program files\CACE Technologies

2009-05-23 20:06 . 2009-05-23 20:06 -------- d-----w c:\documents and settings\Tony Montana\Application Data\Viewpoint

2009-05-23 17:41 . 2009-05-23 17:41 0 ----a-w c:\windows\nsreg.dat

2009-05-23 17:41 . 2009-05-23 17:41 -------- d-----w c:\documents and settings\Tony Montana\Local Settings\Application Data\Mozilla

2009-05-22 21:44 . 2009-05-24 00:35 -------- d-----w c:\program files\Cain

2009-05-22 05:10 . 2009-05-26 21:53 -------- d-----w c:\documents and settings\Tony Montana\Tracing

2009-05-22 05:00 . 2009-05-22 05:00 -------- d-----w c:\program files\Common Files\Windows Live

2009-05-22 04:52 . 2005-02-25 03:35 22752 ----a-w c:\windows\system32\spupdsvc.exe

2009-05-22 04:52 . 2009-05-22 04:52 -------- d--h--w c:\windows\$hf_mig$

2009-05-21 23:21 . 2009-05-21 23:21 -------- d-----w c:\documents and settings\Tony Montana\Application Data\Aim

2009-05-21 23:20 . 2009-05-22 04:51 -------- d-----w c:\program files\Viewpoint

2009-05-21 23:20 . 2009-05-21 23:20 -------- d-----w c:\documents and settings\All Users\Application Data\Viewpoint

2009-05-21 23:20 . 2009-05-21 23:20 -------- d-----w c:\program files\AOD

2009-05-21 23:20 . 2009-05-21 23:21 -------- d-----w c:\program files\AIM

2009-05-21 03:45 . 2005-12-18 14:30 6400 ----a-w c:\windows\system32\drivers\splitter.sys

2009-05-21 03:45 . 2005-12-18 14:30 82944 ----a-w c:\windows\system32\drivers\wdmaud.sys

2009-05-21 03:45 . 2005-12-18 14:30 52864 ----a-w c:\windows\system32\drivers\DMusic.sys

2009-05-21 03:45 . 2005-12-18 14:30 54272 ----a-w c:\windows\system32\drivers\swmidi.sys

2009-05-21 03:45 . 2005-12-18 14:30 142464 ----a-w c:\windows\system32\drivers\aec.sys

2009-05-21 03:45 . 2005-12-18 14:30 171776 ----a-w c:\windows\system32\drivers\kmixer.sys

2009-05-21 03:45 . 2005-12-18 14:30 2944 ----a-w c:\windows\system32\drivers\drmkaud.sys

2009-05-21 03:45 . 2005-12-18 14:30 60800 ----a-w c:\windows\system32\drivers\sysaudio.sys

2009-05-21 03:44 . 2009-05-21 03:44 -------- d-----w c:\program files\Realtek

2009-05-21 03:44 . 2004-07-29 20:31 8845312 ----a-w c:\windows\RTLCPL.EXE

2009-05-21 03:44 . 2004-07-29 17:04 2216128 ----a-w c:\windows\system32\drivers\RtkHDAud.sys

2009-05-21 03:44 . 2004-07-28 22:34 2551808 ----a-w c:\windows\ALCWZRD.EXE

2009-05-21 03:44 . 2004-07-28 21:40 77824 ----a-w c:\windows\SOUNDMAN.EXE

2009-05-21 03:44 . 2004-07-20 14:22 57344 ----a-w c:\windows\ALCMTR.EXE

2009-05-21 03:44 . 2004-06-28 22:50 192512 ----a-w c:\windows\system32\RTCOMDLL.dll

2009-05-21 03:44 . 2004-02-27 14:10 156160 ----a-w c:\windows\system32\RTLCPAPI.dll

2009-05-21 03:42 . 2005-12-18 14:30 60288 ----a-w c:\windows\system32\drivers\drmk.sys

2009-05-21 02:42 . 2000-12-05 20:18 3952 ----a-r c:\windows\system32\drivers\DMICall.sys

2009-05-21 02:35 . 2009-05-21 02:35 -------- d-----w c:\documents and settings\Tony Montana\Application Data\InstallShield

2009-05-21 02:31 . 2009-05-21 02:31 -------- d-----w c:\program files\Common Files\Sony Shared

2009-05-21 02:31 . 2009-05-21 02:31 -------- d-----w c:\documents and settings\Tony Montana\Application Data\Sony Corporation

2009-05-21 01:48 . 2005-12-18 14:30 5504 ----a-w c:\windows\system32\drivers\MSTEE.sys

2009-05-21 01:48 . 2005-12-18 14:30 10880 ----a-w c:\windows\system32\drivers\NdisIP.sys

2009-05-21 01:48 . 2005-12-18 14:30 15360 ----a-w c:\windows\system32\drivers\StreamIP.sys

2009-05-21 01:48 . 2005-12-18 14:30 11136 ----a-w c:\windows\system32\drivers\SLIP.sys

2009-05-21 01:48 . 2005-12-18 14:30 19328 ----a-w c:\windows\system32\drivers\WSTCODEC.SYS

2009-05-21 01:48 . 2005-12-18 14:30 85376 ----a-w c:\windows\system32\drivers\NABTSFEC.sys

2009-05-21 01:48 . 2005-12-18 14:30 17024 ----a-w c:\windows\system32\drivers\CCDECODE.sys

2009-05-21 01:48 . 2005-12-18 14:30 7552 ----a-w c:\windows\system32\drivers\MSKSSRV.sys

2009-05-21 01:48 . 2005-12-18 14:30 4992 ----a-w c:\windows\system32\drivers\MSPQM.sys

2009-05-21 01:47 . 2005-12-18 14:30 5376 ----a-w c:\windows\system32\drivers\MSPCLOCK.sys

2009-05-21 01:47 . 2009-05-21 01:47 -------- d-----w c:\documents and settings\LocalService\Application Data\DivX

2009-05-21 01:47 . 2005-12-18 14:30 53760 ----a-w c:\windows\system32\vfwwdm32.dll

2009-05-21 01:47 . 2005-12-18 14:30 4096 ----a-w c:\windows\system32\ksuser.dll

2009-05-21 01:47 . 2004-10-03 17:49 65536 ----a-w c:\windows\system32\TVRating.dll

2009-05-21 01:47 . 2004-10-03 17:48 788736 ----a-w c:\windows\system32\drivers\smrt.sys

2009-05-20 22:19 . 2008-10-16 18:09 43544 ----a-w c:\windows\system32\wups2.dll

2009-05-20 22:17 . 2009-05-20 22:17 -------- d-s---w c:\documents and settings\Tony Montana\UserData

2009-05-20 22:01 . 2009-05-20 22:17 -------- d-----w c:\program files\CamStudio

2009-05-20 21:55 . 2009-05-20 21:55 -------- d-----w c:\documents and settings\Tony Montana\Local Settings\Application Data\Yahoo

2009-05-20 21:54 . 2009-05-20 21:54 -------- d-----w c:\documents and settings\Tony Montana\Application Data\Yahoo!

2009-05-20 21:51 . 2009-05-20 21:55 -------- d-----w c:\documents and settings\All Users\Application Data\Yahoo!

2009-05-20 21:51 . 2009-05-13 19:32 607472 ----a-w c:\documents and settings\All Users\Application Data\Yahoo!\YUpdater\yupdater.exe

2009-05-20 21:51 . 2009-05-20 21:56 -------- d-----w c:\program files\Yahoo!

2009-05-20 21:50 . 2009-05-21 03:47 -------- d-----w c:\windows\system32\Lang

2009-05-20 21:32 . 2009-05-22 05:10 43528 ----a-w c:\documents and settings\Tony Montana\Local Settings\Application Data\GDIPFONTCACHEV1.DAT

2009-05-20 20:02 . 2009-05-23 06:08 152576 ----a-w c:\documents and settings\Tony Montana\Application Data\Sun\Java\jre1.6.0_13\lzma.dll

2009-05-20 19:45 . 2005-02-01 22:18 17992 ----a-w c:\windows\system32\bcm42rly.sys

2009-05-20 19:45 . 2004-05-26 18:54 15781 ----a-w c:\windows\system32\drivers\mdc8021x.sys

2009-05-20 19:45 . 2003-10-13 19:30 94208 ----a-w c:\windows\system32\GTW32N50.dll

2009-05-20 19:45 . 2003-09-26 02:15 15872 ----a-w c:\windows\system32\GTNDIS5.sys

2009-05-20 19:45 . 2003-11-21 02:03 651264 ----a-w c:\windows\system32\libeay32.dll

2009-05-20 19:45 . 2003-11-21 02:03 147456 ----a-w c:\windows\system32\ssleay32.dll

2009-05-20 19:45 . 2003-11-21 02:03 479232 ----a-w c:\windows\system32\AegisE5.dll

2009-05-20 19:45 . 2009-05-20 19:45 -------- d-----w c:\program files\Linksys Wireless-G USB Wireless Network Monitor

2009-05-20 19:44 . 2009-05-20 19:44 -------- d-----w C:\Linksys Driver

2009-05-20 19:33 . 2009-05-20 19:33 1915520 ----a-w c:\documents and settings\Tony Montana\Application Data\Macromedia\Flash Player\www.macromedia.com\bin\fpupdateax\fpupdateax.exe

2009-05-20 17:24 . 2004-10-15 23:18 502272 ----a-r c:\windows\system32\winlogon.exe

2009-05-20 17:16 . 2003-08-29 14:26 125952 ----a-w c:\windows\system32\drivers\e1000325.sys

2009-05-20 17:16 . 2003-07-28 10:55 24064 ----a-w c:\windows\system32\IntelNic.dll

2009-05-20 17:16 . 2003-03-03 20:26 118784 ----a-w c:\windows\system32\Prounstl.exe

2009-05-20 17:14 . 2009-05-20 17:14 -------- d-----w c:\program files\Intel

2009-05-20 17:05 . 2009-05-21 03:44 -------- d--h--w c:\program files\InstallShield Installation Information

2009-05-20 17:05 . 2009-05-21 02:32 -------- d-----w c:\program files\Common Files\InstallShield

2009-05-20 17:05 . 2009-05-30 00:29 -------- d-----w c:\windows\system32\DllCache

2009-05-20 07:34 . 2009-05-20 07:37 -------- d-----w c:\program files\AlienGUIse

2009-05-20 07:34 . 2009-05-20 07:34 -------- d-----w c:\program files\Common Files\Stardock

2009-05-20 07:34 . 2003-02-27 02:27 36864 ----a-w c:\windows\system32\wbsys.dll

2009-05-20 07:10 . 2003-06-18 21:31 17920 ----a-w c:\windows\system32\mdimon.dll

2009-05-20 07:09 . 2009-05-20 07:09 -------- d-----w c:\program files\Microsoft.NET

2009-05-20 07:09 . 2009-05-20 07:09 -------- d-----w c:\program files\Microsoft ActiveSync

2009-05-20 07:09 . 2009-05-20 07:09 -------- d-----w c:\windows\SHELLNEW

.

(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))

.

2009-05-30 00:24 . 2004-08-10 05:00 182912 ----a-w c:\windows\system32\drivers\ndis.sys

2009-05-23 06:10 . 2009-05-20 06:35 -------- d-----w c:\program files\Java

2009-05-21 04:19 . 2009-05-20 06:38 -------- d-----w c:\program files\Common Files\Adobe

2009-05-21 02:32 . 2009-05-21 02:32 -------- d-----w c:\documents and settings\All Users\Application Data\Sony Corporation

2009-05-21 02:32 . 2009-05-21 02:31 -------- d-----w c:\program files\Sony

2009-05-20 22:10 . 2009-05-20 06:30 86811 ----a-w c:\windows\pchealth\helpctr\OfflineCache\index.dat

2009-05-20 17:11 . 2009-05-20 17:11 -------- d-----w c:\program files\ATI Technologies

2009-05-20 06:57 . 2009-05-20 06:57 -------- d-----w c:\program files\UltraISO

2009-05-20 06:57 . 2009-05-20 06:57 -------- d-----w c:\program files\Common Files\EZB Systems

2009-05-20 06:56 . 2009-05-20 06:56 -------- d-----w c:\documents and settings\Tony Montana\Application Data\Media Player Classic

2009-05-20 06:55 . 2009-05-20 06:55 -------- d-----w c:\program files\K-Lite Codec Pack

2009-05-20 06:38 . 2009-05-20 06:38 -------- d-----w c:\program files\Common Files\Adobe AIR

2009-05-20 06:27 . 2009-05-20 06:27 21640 ----a-w c:\windows\system32\emptyregdb.dat

2009-05-20 06:26 . 2009-05-20 06:26 -------- d-----w c:\program files\Windows Plus

2009-03-09 09:19 . 2009-05-20 06:35 410984 ----a-w c:\windows\system32\deploytk.dll

.

------- Sigcheck -------

[-] 2005-12-18 17:30 359040 27A5959C94EE173A063CA06BD14F021A c:\windows\system32\drivers\tcpip.sys

[-] 2004-10-15 23:18 502272 6E8CA4FCB30282F216F5DB9DD58A5F81 c:\windows\system32\winlogon.exe

[-] 2004-11-28 21:36 8704 AB3D62010AF342203FFA60C2D94DBC68 c:\windows\system32\sfcfiles.dll

.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))

.

.

*Note* empty entries & legit default entries are not shown

REGEDIT4

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]

"ehTray"="c:\windows\ehome\ehtray.exe" [2004-08-10 59392]

"ATIPTA"="c:\program files\ATI Technologies\ATI Control Panel\atiptaxx.exe" [2004-09-29 344064]

"Adobe Reader Speed Launcher"="c:\program files\Adobe\Reader 9.0\Reader\Reader_sl.exe" [2009-02-27 35696]

"SunJavaUpdateSched"="c:\program files\Java\jre6\bin\jusched.exe" [2009-03-09 148888]

"SoundMan"="SOUNDMAN.EXE" - c:\windows\SOUNDMAN.EXE [2004-07-28 77824]

"AlcWzrd"="ALCWZRD.EXE" - c:\windows\ALCWZRD.EXE [2004-07-28 2551808]

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\WB]

2001-12-21 03:34 24576 ----a-w c:\program files\AlienGUIse\fastload.dll

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\windows]

"AppInit_DLLs"=c:\windows\system32\wbsys.dll

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]

"%windir%\\system32\\sessmgr.exe"=

"c:\\Program Files\\Yahoo!\\Messenger\\YahooMessenger.exe"=

"c:\\Program Files\\AIM\\aim.exe"=

"c:\\Program Files\\Ventrilo\\Ventrilo.exe"=

R2 WUSB54GSSVC;WUSB54GSSVC;c:\program files\Linksys Wireless-G USB Wireless Network Monitor\WLService.exe [5/20/2009 3:45 PM 41025]

S3 AVPsys;AVPsys;\??\c:\windows\system32\drivers\cdaudio.sys --> c:\windows\system32\drivers\cdaudio.sys [?]

.

.

------- Supplementary Scan -------

.

uStart Page = hxxp://www.altavista.com/

IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~1\OFFICE11\EXCEL.EXE/3000

.

**************************************************************************

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net

Rootkit scan 2009-05-29 20:33

Windows 5.1.2600 Service Pack 2 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully

hidden files: 0

**************************************************************************

.

--------------------- LOCKED REGISTRY KEYS ---------------------

[HKEY_USERS\S-1-5-21-1004336348-287218729-839522115-1003\Software\Microsoft\Windows\CurrentVersion\Explorer\CLSID]

@Denied: (Full) (LocalSystem)

.

--------------------- DLLs Loaded Under Running Processes ---------------------

- - - - - - - > 'winlogon.exe'(920)

c:\program files\AlienGUIse\fastload.dll

.

------------------------ Other Running Processes ------------------------

.

c:\windows\ehome\ehRecvr.exe

c:\windows\ehome\ehSched.exe

c:\program files\Java\jre6\bin\jqs.exe

c:\program files\Linksys Wireless-G USB Wireless Network Monitor\WUSB54GS.exe

c:\windows\system32\dllhost.exe

c:\windows\system32\wscntfy.exe

c:\windows\ehome\ehmsas.exe

.

**************************************************************************

.

Completion time: 2009-05-30 20:34 - machine was rebooted

ComboFix-quarantined-files.txt 2009-05-30 00:34

Pre-Run: 5,545,422,848 bytes free

Post-Run: 6,570,070,016 bytes free

WindowsXP-KB310994-SP2-Pro-BootDisk-ENU.exe

[boot loader]

timeout=2

default=multi(0)disk(0)rdisk(0)partition(2)\WINDOWS

[operating systems]

i:\cmdcons\BOOTSECT.DAT="Microsoft Windows Recovery Console" /cmdcons

multi(0)disk(0)rdisk(0)partition(2)\WINDOWS="Windows XP Media Center Edition" /noexecute=optin /fastdetect

248

Link to post
Share on other sites

  • Root Admin

STEP 01

Download but do not yet run ComboFix

If you have a previous version of Combofix.exe, delete it and download a fresh copy.

Download it to your DESKTOP - it MUST run from the Desktop

download.bleepingcomputer.com/sUBs/ComboFix.exe

subs.geekstogo.com/ComboFix.exe

Using your mouse, Highlight and then Right-click | Copy the entire contents of the Code box below, including blank lines

KILLALL::

AtJob::

Driver::
AVPsys

File::
c:\windows\system32\drivers\cdaudio.sys

RegLock::
[HKEY_USERS\S-1-5-21-1004336348-287218729-839522115-1003\Software\Microsoft\Windows\CurrentVersion\Explorer\CLSID]

Open a new Notepad session (Do not use a Word Processor or WordPad). Click "Format" and be certain that Word Wrap is not enabled. Right-click | Paste the Code box contents from above into Notepad. Click File, Save as..., and set the location to your Desktop, and enter (including quotation marks) as the filename: "CFscript.txt" .

Using your mouse, drag the new file CFscript.txt and drop it on the Combo-Fix.exe icon as shown:

CFScript.gif

  • Important: Have no other programs running. Your Task Bar should be clear of any program entries including your Browser.
  • Disconnect from the Internet.
  • Disable your Antivirus software. If it has Script Blocking features, please disable these as well.
  • A window may open with a series of Disclaimers. Accept the Disclaimers to start the fix.
  • It may identify that Recovery Console is not installed. Please accept when asked if you wish it to be installed.
    When the scan completes Notepad will open with with your results log open. Do a File, Exit.

A caution - Do not run Combofix more than once. Do not touch your mouse/keyboard until the scan has completed, as this may cause the process to stall or your computer to lock. The scan will temporarily disable your desktop, and if interrupted may leave your desktop disabled. If this occurs, please reboot to restore the desktop. Even when ComboFix appears to be doing nothing, look at your Drive light. If it is flashing, Combofix is still at work.

Post back the Combofix log on your next reply.

STEP 02

Update and Scan with Malwarebytes' Anti-Malware

  • Start MalwareBytes AntiMalware (Vista users must Right click and choose RunAs Admin)
  • Please DO NOT run MBAM in Safe Mode unless requested to, you MUST run it in normal Windows mode.
    • Update Malwarebytes' Anti-Malware
    • Select the Update tab
    • Click Update

    [*]When the update is complete, select the Scanner tab

    [*]Select Perform quick scan, then click Scan.

    [*]When the scan is complete, click OK, then Show Results to view the results.

    [*]Be sure that everything is checked, and click Remove Selected.

    [*]When completed, a log will open in Notepad. please copy and paste the log into your next reply

    • If you accidently close it, the log file is saved here and will be named like this:
    • C:\Documents and Settings\Username\Application Data\Malwarebytes\Malwarebytes' Anti-Malware\Logs\mbam-log-date (time).txt

Then post back the MBAM log and a new Hijackthis log.

Link to post
Share on other sites

heres the new combofix log first and then the malware bytes second....Nothing detected in the malware bytes scan... am i clean or does it just need to wait a few more hours until its back to the way it was.. btw also had a question about my harddrive.. When i had a crash a few weeks ago i got a friend to reinstall window's he partioned out my hardrive into 2 different parts so far one for window's and then a backup drive for files in case i crash again... Can i transfer any viruses or spyware into that drive or would it be totally clean?

ComboFix 09-05-29.01 - Tony Montana 05/29/2009 20:56.2 - NTFSx86

Microsoft Windows XP Professional 5.1.2600.2.1252.1.1033.18.1023.750 [GMT -4:00]

Running from: c:\documents and settings\Tony Montana\Desktop\ComboFix.exe

Command switches used :: c:\documents and settings\Tony Montana\Desktop\CFscript.txt

FILE ::

"c:\windows\system32\drivers\cdaudio.sys"

.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))

.

.

((((((((((((((((((((((((((((((((((((((( Drivers/Services )))))))))))))))))))))))))))))))))))))))))))))))))

.

-------\Legacy_avast!antivirus

-------\Legacy_dhcpsrv

-------\Legacy_ias

-------\Legacy_NPF

-------\Service_AVPsys

((((((((((((((((((((((((( Files Created from 2009-04-28 to 2009-05-30 )))))))))))))))))))))))))))))))

.

2009-05-29 06:04 . 2009-05-29 06:05 117760 ----a-w c:\documents and settings\Administrator\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\SDDLLS\UIREPAIR.DLL

2009-05-29 06:04 . 2009-05-29 06:04 -------- d-----w c:\documents and settings\Administrator\Application Data\SUPERAntiSpyware.com

2009-05-29 06:01 . 2009-05-29 06:01 -------- d-----w c:\documents and settings\Administrator\Application Data\Malwarebytes

2009-05-29 05:58 . 2009-05-29 05:58 -------- d-----w c:\documents and settings\All Users\Application Data\SUPERAntiSpyware.com

2009-05-29 05:58 . 2009-05-29 18:48 -------- d-----w c:\documents and settings\Tony Montana\Application Data\SUPERAntiSpyware.com

2009-05-29 05:58 . 2009-05-29 18:48 -------- d-----w c:\program files\SUPERAntiSpyware

2009-05-27 22:39 . 2009-05-26 17:20 40160 ----a-w c:\windows\system32\drivers\mbamswissarmy.sys

2009-05-27 22:39 . 2009-05-27 22:39 -------- d-----w c:\program files\Malwarebytes' Anti-Malware

2009-05-27 22:39 . 2009-05-26 17:19 19096 ----a-w c:\windows\system32\drivers\mbam.sys

2009-05-27 13:47 . 2009-05-27 22:41 -------- d-s---w c:\windows\system32\config\systemprofile\UserData

2009-05-27 05:48 . 2009-05-27 05:48 123904 ----a-w c:\windows\system32\cdmr.dll

2009-05-27 05:48 . 2009-05-27 05:48 123904 ----a-w c:\windows\system32\ativcox.dll

2009-05-27 05:48 . 2009-05-27 05:48 -------- d-----w c:\documents and settings\LocalService\Local Settings\Application Data\Adobe

2009-05-27 05:37 . 2009-05-27 05:37 -------- d-----w c:\documents and settings\Tony Montana\Application Data\Malwarebytes

2009-05-27 05:37 . 2009-05-27 05:37 -------- d-----w c:\documents and settings\All Users\Application Data\Malwarebytes

2009-05-27 05:15 . 2009-05-27 22:52 -------- d-----w c:\windows\dhcp

2009-05-24 01:48 . 2009-05-24 01:49 -------- d-----w c:\documents and settings\Tony Montana\Application Data\Ventrilo

2009-05-24 01:48 . 2009-05-24 01:48 -------- d-----w c:\program files\Ventrilo

2009-05-24 01:47 . 2009-05-29 18:48 -------- d-----w c:\program files\Common Files\Wise Installation Wizard

2009-05-24 00:06 . 2009-05-24 00:09 -------- dc----w c:\windows\system32\DRVSTORE

2009-05-24 00:06 . 2009-05-24 00:09 -------- d-----w c:\program files\CACE Technologies

2009-05-23 20:06 . 2009-05-23 20:06 -------- d-----w c:\documents and settings\Tony Montana\Application Data\Viewpoint

2009-05-23 17:41 . 2009-05-23 17:41 0 ----a-w c:\windows\nsreg.dat

2009-05-23 17:41 . 2009-05-23 17:41 -------- d-----w c:\documents and settings\Tony Montana\Local Settings\Application Data\Mozilla

2009-05-22 21:44 . 2009-05-24 00:35 -------- d-----w c:\program files\Cain

2009-05-22 05:10 . 2009-05-26 21:53 -------- d-----w c:\documents and settings\Tony Montana\Tracing

2009-05-22 05:00 . 2009-05-22 05:00 -------- d-----w c:\program files\Common Files\Windows Live

2009-05-22 04:52 . 2005-02-25 03:35 22752 ----a-w c:\windows\system32\spupdsvc.exe

2009-05-22 04:52 . 2009-05-22 04:52 -------- d--h--w c:\windows\$hf_mig$

2009-05-21 23:21 . 2009-05-21 23:21 -------- d-----w c:\documents and settings\Tony Montana\Application Data\Aim

2009-05-21 23:20 . 2009-05-22 04:51 -------- d-----w c:\program files\Viewpoint

2009-05-21 23:20 . 2009-05-21 23:20 -------- d-----w c:\documents and settings\All Users\Application Data\Viewpoint

2009-05-21 23:20 . 2009-05-21 23:20 -------- d-----w c:\program files\AOD

2009-05-21 23:20 . 2009-05-21 23:21 -------- d-----w c:\program files\AIM

2009-05-21 03:45 . 2005-12-18 14:30 6400 ----a-w c:\windows\system32\drivers\splitter.sys

2009-05-21 03:45 . 2005-12-18 14:30 82944 ----a-w c:\windows\system32\drivers\wdmaud.sys

2009-05-21 03:45 . 2005-12-18 14:30 52864 ----a-w c:\windows\system32\drivers\DMusic.sys

2009-05-21 03:45 . 2005-12-18 14:30 54272 ----a-w c:\windows\system32\drivers\swmidi.sys

2009-05-21 03:45 . 2005-12-18 14:30 142464 ----a-w c:\windows\system32\drivers\aec.sys

2009-05-21 03:45 . 2005-12-18 14:30 171776 ----a-w c:\windows\system32\drivers\kmixer.sys

2009-05-21 03:45 . 2005-12-18 14:30 2944 ----a-w c:\windows\system32\drivers\drmkaud.sys

2009-05-21 03:45 . 2005-12-18 14:30 60800 ----a-w c:\windows\system32\drivers\sysaudio.sys

2009-05-21 03:44 . 2009-05-21 03:44 -------- d-----w c:\program files\Realtek

2009-05-21 03:44 . 2004-07-29 20:31 8845312 ----a-w c:\windows\RTLCPL.EXE

2009-05-21 03:44 . 2004-07-29 17:04 2216128 ----a-w c:\windows\system32\drivers\RtkHDAud.sys

2009-05-21 03:44 . 2004-07-28 22:34 2551808 ----a-w c:\windows\ALCWZRD.EXE

2009-05-21 03:44 . 2004-07-28 21:40 77824 ----a-w c:\windows\SOUNDMAN.EXE

2009-05-21 03:44 . 2004-07-20 14:22 57344 ----a-w c:\windows\ALCMTR.EXE

2009-05-21 03:44 . 2004-06-28 22:50 192512 ----a-w c:\windows\system32\RTCOMDLL.dll

2009-05-21 03:44 . 2004-02-27 14:10 156160 ----a-w c:\windows\system32\RTLCPAPI.dll

2009-05-21 03:42 . 2005-12-18 14:30 60288 ----a-w c:\windows\system32\drivers\drmk.sys

2009-05-21 02:42 . 2000-12-05 20:18 3952 ----a-r c:\windows\system32\drivers\DMICall.sys

2009-05-21 02:35 . 2009-05-21 02:35 -------- d-----w c:\documents and settings\Tony Montana\Application Data\InstallShield

2009-05-21 02:31 . 2009-05-21 02:31 -------- d-----w c:\program files\Common Files\Sony Shared

2009-05-21 02:31 . 2009-05-21 02:31 -------- d-----w c:\documents and settings\Tony Montana\Application Data\Sony Corporation

2009-05-21 01:48 . 2005-12-18 14:30 5504 ----a-w c:\windows\system32\drivers\MSTEE.sys

2009-05-21 01:48 . 2005-12-18 14:30 10880 ----a-w c:\windows\system32\drivers\NdisIP.sys

2009-05-21 01:48 . 2005-12-18 14:30 15360 ----a-w c:\windows\system32\drivers\StreamIP.sys

2009-05-21 01:48 . 2005-12-18 14:30 11136 ----a-w c:\windows\system32\drivers\SLIP.sys

2009-05-21 01:48 . 2005-12-18 14:30 19328 ----a-w c:\windows\system32\drivers\WSTCODEC.SYS

2009-05-21 01:48 . 2005-12-18 14:30 85376 ----a-w c:\windows\system32\drivers\NABTSFEC.sys

2009-05-21 01:48 . 2005-12-18 14:30 17024 ----a-w c:\windows\system32\drivers\CCDECODE.sys

2009-05-21 01:48 . 2005-12-18 14:30 7552 ----a-w c:\windows\system32\drivers\MSKSSRV.sys

2009-05-21 01:48 . 2005-12-18 14:30 4992 ----a-w c:\windows\system32\drivers\MSPQM.sys

2009-05-21 01:47 . 2005-12-18 14:30 5376 ----a-w c:\windows\system32\drivers\MSPCLOCK.sys

2009-05-21 01:47 . 2009-05-21 01:47 -------- d-----w c:\documents and settings\LocalService\Application Data\DivX

2009-05-21 01:47 . 2005-12-18 14:30 53760 ----a-w c:\windows\system32\vfwwdm32.dll

2009-05-21 01:47 . 2005-12-18 14:30 4096 ----a-w c:\windows\system32\ksuser.dll

2009-05-21 01:47 . 2004-10-03 17:49 65536 ----a-w c:\windows\system32\TVRating.dll

2009-05-21 01:47 . 2004-10-03 17:48 788736 ----a-w c:\windows\system32\drivers\smrt.sys

2009-05-20 22:19 . 2008-10-16 18:09 43544 ----a-w c:\windows\system32\wups2.dll

2009-05-20 22:17 . 2009-05-20 22:17 -------- d-s---w c:\documents and settings\Tony Montana\UserData

2009-05-20 22:01 . 2009-05-20 22:17 -------- d-----w c:\program files\CamStudio

2009-05-20 21:55 . 2009-05-20 21:55 -------- d-----w c:\documents and settings\Tony Montana\Local Settings\Application Data\Yahoo

2009-05-20 21:54 . 2009-05-20 21:54 -------- d-----w c:\documents and settings\Tony Montana\Application Data\Yahoo!

2009-05-20 21:51 . 2009-05-20 21:55 -------- d-----w c:\documents and settings\All Users\Application Data\Yahoo!

2009-05-20 21:51 . 2009-05-13 19:32 607472 ----a-w c:\documents and settings\All Users\Application Data\Yahoo!\YUpdater\yupdater.exe

2009-05-20 21:51 . 2009-05-20 21:56 -------- d-----w c:\program files\Yahoo!

2009-05-20 21:50 . 2009-05-21 03:47 -------- d-----w c:\windows\system32\Lang

2009-05-20 21:32 . 2009-05-22 05:10 43528 ----a-w c:\documents and settings\Tony Montana\Local Settings\Application Data\GDIPFONTCACHEV1.DAT

2009-05-20 20:02 . 2009-05-23 06:08 152576 ----a-w c:\documents and settings\Tony Montana\Application Data\Sun\Java\jre1.6.0_13\lzma.dll

2009-05-20 19:45 . 2005-02-01 22:18 17992 ----a-w c:\windows\system32\bcm42rly.sys

2009-05-20 19:45 . 2004-05-26 18:54 15781 ----a-w c:\windows\system32\drivers\mdc8021x.sys

2009-05-20 19:45 . 2003-10-13 19:30 94208 ----a-w c:\windows\system32\GTW32N50.dll

2009-05-20 19:45 . 2003-09-26 02:15 15872 ----a-w c:\windows\system32\GTNDIS5.sys

2009-05-20 19:45 . 2003-11-21 02:03 651264 ----a-w c:\windows\system32\libeay32.dll

2009-05-20 19:45 . 2003-11-21 02:03 147456 ----a-w c:\windows\system32\ssleay32.dll

2009-05-20 19:45 . 2003-11-21 02:03 479232 ----a-w c:\windows\system32\AegisE5.dll

2009-05-20 19:45 . 2009-05-20 19:45 -------- d-----w c:\program files\Linksys Wireless-G USB Wireless Network Monitor

2009-05-20 19:44 . 2009-05-20 19:44 -------- d-----w C:\Linksys Driver

2009-05-20 19:33 . 2009-05-20 19:33 1915520 ----a-w c:\documents and settings\Tony Montana\Application Data\Macromedia\Flash Player\www.macromedia.com\bin\fpupdateax\fpupdateax.exe

2009-05-20 17:24 . 2004-10-15 23:18 502272 ----a-r c:\windows\system32\winlogon.exe

2009-05-20 17:16 . 2003-08-29 14:26 125952 ----a-w c:\windows\system32\drivers\e1000325.sys

2009-05-20 17:16 . 2003-07-28 10:55 24064 ----a-w c:\windows\system32\IntelNic.dll

2009-05-20 17:16 . 2003-03-03 20:26 118784 ----a-w c:\windows\system32\Prounstl.exe

2009-05-20 17:14 . 2009-05-20 17:14 -------- d-----w c:\program files\Intel

2009-05-20 17:05 . 2009-05-21 03:44 -------- d--h--w c:\program files\InstallShield Installation Information

2009-05-20 17:05 . 2009-05-21 02:32 -------- d-----w c:\program files\Common Files\InstallShield

2009-05-20 17:05 . 2009-05-30 00:29 -------- d-----w c:\windows\system32\DllCache

2009-05-20 07:34 . 2009-05-20 07:37 -------- d-----w c:\program files\AlienGUIse

2009-05-20 07:34 . 2009-05-20 07:34 -------- d-----w c:\program files\Common Files\Stardock

2009-05-20 07:34 . 2003-02-27 02:27 36864 ----a-w c:\windows\system32\wbsys.dll

2009-05-20 07:10 . 2003-06-18 21:31 17920 ----a-w c:\windows\system32\mdimon.dll

2009-05-20 07:09 . 2009-05-20 07:09 -------- d-----w c:\program files\Microsoft.NET

2009-05-20 07:09 . 2009-05-20 07:09 -------- d-----w c:\program files\Microsoft ActiveSync

2009-05-20 07:09 . 2009-05-20 07:09 -------- d-----w c:\windows\SHELLNEW

.

(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))

.

2009-05-30 00:24 . 2004-08-10 05:00 182912 ----a-w c:\windows\system32\drivers\ndis.sys

2009-05-23 06:10 . 2009-05-20 06:35 -------- d-----w c:\program files\Java

2009-05-21 04:19 . 2009-05-20 06:38 -------- d-----w c:\program files\Common Files\Adobe

2009-05-21 02:32 . 2009-05-21 02:32 -------- d-----w c:\documents and settings\All Users\Application Data\Sony Corporation

2009-05-21 02:32 . 2009-05-21 02:31 -------- d-----w c:\program files\Sony

2009-05-20 22:10 . 2009-05-20 06:30 86811 ----a-w c:\windows\pchealth\helpctr\OfflineCache\index.dat

2009-05-20 17:11 . 2009-05-20 17:11 -------- d-----w c:\program files\ATI Technologies

2009-05-20 06:57 . 2009-05-20 06:57 -------- d-----w c:\program files\UltraISO

2009-05-20 06:57 . 2009-05-20 06:57 -------- d-----w c:\program files\Common Files\EZB Systems

2009-05-20 06:56 . 2009-05-20 06:56 -------- d-----w c:\documents and settings\Tony Montana\Application Data\Media Player Classic

2009-05-20 06:55 . 2009-05-20 06:55 -------- d-----w c:\program files\K-Lite Codec Pack

2009-05-20 06:38 . 2009-05-20 06:38 -------- d-----w c:\program files\Common Files\Adobe AIR

2009-05-20 06:27 . 2009-05-20 06:27 21640 ----a-w c:\windows\system32\emptyregdb.dat

2009-05-20 06:26 . 2009-05-20 06:26 -------- d-----w c:\program files\Windows Plus

2009-03-09 09:19 . 2009-05-20 06:35 410984 ----a-w c:\windows\system32\deploytk.dll

.

------- Sigcheck -------

[-] 2005-12-18 17:30 359040 27A5959C94EE173A063CA06BD14F021A c:\windows\system32\drivers\tcpip.sys

[-] 2004-10-15 23:18 502272 6E8CA4FCB30282F216F5DB9DD58A5F81 c:\windows\system32\winlogon.exe

[-] 2004-11-28 21:36 8704 AB3D62010AF342203FFA60C2D94DBC68 c:\windows\system32\sfcfiles.dll

.

((((((((((((((((((((((((((((( SnapShot@2009-05-30_00.33.08 )))))))))))))))))))))))))))))))))))))))))

.

+ 2009-05-30 00:58 . 2009-05-30 00:58 16384 c:\windows\temp\Perflib_Perfdata_668.dat

.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))

.

.

*Note* empty entries & legit default entries are not shown

REGEDIT4

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]

"ehTray"="c:\windows\ehome\ehtray.exe" [2004-08-10 59392]

"ATIPTA"="c:\program files\ATI Technologies\ATI Control Panel\atiptaxx.exe" [2004-09-29 344064]

"Adobe Reader Speed Launcher"="c:\program files\Adobe\Reader 9.0\Reader\Reader_sl.exe" [2009-02-27 35696]

"SunJavaUpdateSched"="c:\program files\Java\jre6\bin\jusched.exe" [2009-03-09 148888]

"SoundMan"="SOUNDMAN.EXE" - c:\windows\SOUNDMAN.EXE [2004-07-28 77824]

"AlcWzrd"="ALCWZRD.EXE" - c:\windows\ALCWZRD.EXE [2004-07-28 2551808]

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\WB]

2001-12-21 03:34 24576 ----a-w c:\program files\AlienGUIse\fastload.dll

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\windows]

"AppInit_DLLs"=c:\windows\system32\wbsys.dll

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]

"%windir%\\system32\\sessmgr.exe"=

"c:\\Program Files\\Yahoo!\\Messenger\\YahooMessenger.exe"=

"c:\\Program Files\\AIM\\aim.exe"=

"c:\\Program Files\\Ventrilo\\Ventrilo.exe"=

R2 WUSB54GSSVC;WUSB54GSSVC;c:\program files\Linksys Wireless-G USB Wireless Network Monitor\WLService.exe [5/20/2009 3:45 PM 41025]

--- Other Services/Drivers In Memory ---

*NewlyCreated* - gtndis5

.

- - - - ORPHANS REMOVED - - - -

SafeBoot-procexp90.Sys

.

------- Supplementary Scan -------

.

uStart Page = hxxp://www.altavista.com/

IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~1\OFFICE11\EXCEL.EXE/3000

.

**************************************************************************

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net

Rootkit scan 2009-05-29 20:58

Windows 5.1.2600 Service Pack 2 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully

hidden files: 0

**************************************************************************

.

--------------------- DLLs Loaded Under Running Processes ---------------------

- - - - - - - > 'winlogon.exe'(768)

c:\program files\AlienGUIse\fastload.dll

.

------------------------ Other Running Processes ------------------------

.

c:\windows\ehome\ehRecvr.exe

c:\windows\ehome\ehSched.exe

c:\program files\Java\jre6\bin\jqs.exe

c:\program files\Linksys Wireless-G USB Wireless Network Monitor\WUSB54GS.exe

c:\windows\system32\dllhost.exe

c:\windows\system32\wscntfy.exe

c:\windows\ehome\ehmsas.exe

.

**************************************************************************

.

Completion time: 2009-05-30 20:59 - machine was rebooted

ComboFix-quarantined-files.txt 2009-05-30 00:59

ComboFix2.txt 2009-05-30 00:34

Pre-Run: 6,598,774,784 bytes free

Post-Run: 6,589,579,264 bytes free

218

Malwarebytes' Anti-Malware 1.37

Database version: 2195

Windows 5.1.2600 Service Pack 2

5/29/2009 9:04:45 PM

mbam-log-2009-05-29 (21-04-45).txt

Scan type: Quick Scan

Objects scanned: 82247

Time elapsed: 1 minute(s), 40 second(s)

Memory Processes Infected: 0

Memory Modules Infected: 0

Registry Keys Infected: 0

Registry Values Infected: 0

Registry Data Items Infected: 0

Folders Infected: 0

Files Infected: 0

Memory Processes Infected:

(No malicious items detected)

Memory Modules Infected:

(No malicious items detected)

Registry Keys Infected:

(No malicious items detected)

Registry Values Infected:

(No malicious items detected)

Registry Data Items Infected:

(No malicious items detected)

Folders Infected:

(No malicious items detected)

Files Infected:

(No malicious items detected)

Link to post
Share on other sites

  • Root Admin

Please run the following to remove any tools that might have been used during the scaning and cleaning of your system.

STEP A

Uninstall ComboFix.exe

  • Click
    START
    then
    RUN
  • Now type
    Combofix /u
    (if you renamed Combofix.exe use that name instead)
    in the runbox and click OK. Note the
    space
    between the
    X
    and the
    /U
    , it needs to be there.

  • CF_Cleanup.png


  • When shown the disclaimer, Select "2"

Remove this folder C:\QooBox if the uninstall instructions don't work and delete Combofix.exe AND check your system time and reset if needed

STEP B

Uninstall other tools

Please
Download
OTMoveIt3
by Old Timer
and save it to your
Desktop
.
  • Double-click
    OTMoveIt3.exe
    to run it.
  • While connected to the Internet, Click on the green
    CleanUp!
    button and it will populate a list of items to clean from your system that we used or may have used.

  • It should ask if you want to clean up, select Yes and allow the system to clean up these items.

    NOW
    please reboot your computer to finish the cleanup process

Remove all but the most recent Restore Point on Windows XP

You should
Create a New Restore Point
to prevent possible reinfection from an old one.

Some of the malware you picked up could have been saved in System Restore.

Since this is a protected directory your tools cannot access to delete these files, they sometimes can reinfect your system if you accidentally use an old restore point.

Setting a new restore point AFTER cleaning your system will help prevent this and enable your computer to
"roll-back"
to a clean working state.

The easiest and safest way to do this is

:
  • Go to
    Start
    >
    Programs
    >
    Accessories
    >
    System Tools
    and click "
    System Restore
    ".
  • If the shortcut is missing you can also click on
    START
    >
    RUN
    > and type in
    %SystemRoot%\system32\restore\rstrui.exe
    and click OK

  • Choose the radio button marked "
    Create a Restore Point
    " on the first screen then click "
    Next
    ".

  • Give the new Restore Point a name, then click "
    Create
    ".

  • The new point will be stamped with the current date and time. Keep a log of this so you can find it easily should you need to use System Restore.

  • Then use the
    Disk Cleanup
    to remove all but the most recently created Restore Point.
  • Go to
    Start
    >
    Run
    and type:
    Cleanmgr.exe

  • Select the drive where Windows is installed and click "
    Ok
    ". Disk Cleanup will scan your files for several minutes, then open.

  • Click the "
    More Options
    " tab, then click the "
    Clean up
    " button under System Restore.

  • Click Ok. You will be prompted with "
    Are you sure you want to delete all but the most recent restore point?
    "

  • Click
    Yes
    , then click Ok.

  • Click
    Yes
    again when prompted with "
    Are you sure you want to perform these actions?
    "

  • Disk Cleanup will remove the files and close automatically.

  • On the
    Disk Cleanup
    tab, if the
    System Restore: Obsolete Data Stores
    entry is available remove them also.

  • These are files that were created before Windows was reformatted or reinstalled. They are obsolete and you can delete them.

selectdrivecleanup.pngselectdrivecleanup1.png

Additional information

Microsoft KB article: How to turn off and turn on System Restore in Windows XP

Bert Kinney's site: All about Windows System Restore

Please download to your Desktop: Dr.Web CureIt

  • After the file has downloaded, disable your current Anti-Virus and disconnect from the Internet
  • Doubleclick the drweb-cureit.exe file, then click the Start button, then the OK button to perform an Express Scan.
  • This will scan the files currently running in memory and when something is found, click the yes button when it asks you if you want to cure it.
  • Once the short scan has finished, Click on the Complete scan radio button.
  • Then click on the Settings menu on top, the select Change Settings or press the F9 key. You can also change the Language
  • Choose the Scanning tab and I recomend leaving the Heuristic analysis enabled (this can lead to False Positives though)
  • On the File types tab ensure you select All files
  • Click on the Actions tab and set the following:
    • Objects Infected objects = Cure, Incurable objects = Move, Suspicious objects = Report
    • Infected packages Archive = Move, E-mails = Report, Containers = Move
    • Malware Adware = Move, Dialers = Move, Jokes = Move, Riskware = Move, Hacktools = Move
    • Do not change the Rename extension - default is: #??
    • Leave the default save path for Moved files here: %USERPROFILE%\DoctorWeb\Quarantine\
    • Leave prompt on Action checked

    [*]On the Log file tab leave the Log to file checked.

    [*]Leave the log file path alone: %USERPROFILE%\DoctorWeb\CureIt.log

    [*]Log mode = Append

    [*]Encoding = ANSI

    [*]Details Leave Names of file packers and Statistics checked.

    [*]Limit log file size = 2048 KB and leave the check mark on the Maximum log file size.

    [*]On the General tab leave the Scan Priority on High

    [*]Click the Apply button at the bottom, and then the OK button.

    [*]On the right side under the Dr Web Anti-Virus Logo you will see 3 little buttons. Click the left VCR style Start button.

    [*]In this mode it will scan Boot sectors of all disks, All removable media, and all local drives

    [*]The more files and folders you have the longer the scan will take. On large drives it can take hours to complete.

    [*]When the Cure option is selected, an additional context menu will open. Select the necessary action of the program, if the curing fails.

    [*]Click 'Yes to all' if it asks if you want to cure/move the files.

    [*]This will move it to the %USERPROFILE%\DoctorWeb\Quarantine\ folder if it can't be cured. (in this case we need samples)

    [*]After selecting, in the Dr.Web CureIt menu on top, click file and choose save report list

    [*]Save the report to your Desktop. The report will be called DrWeb.csv

    [*]Close Dr.Web Cureit.

    [*]Reboot your computer!! Because it could be possible that files in use will be moved/deleted during reboot.

    [*]After reboot, post the contents of the log from Dr.Web you saved previously to your Desktop in your next reply with a new hijackthis log.

    drweb.jpg

Unplug your Computer MODEM and ROUTER and SHUT DOWN the PC for about 3 minutes and then turn them back on.

Go into your Router and make sure you have a password set on the Admin to access it.

Link to post
Share on other sites

Ok done that here's the log

x.bat;C:\;Trojan.MulDrop.14428;Deleted.;

A0000017.bat;C:\System Volume Information\_restore{9F110F4D-D970-4810-AD9B-03149289B717}\RP2;Trojan.MulDrop.14428;Deleted.;

x.bat;I:\;Trojan.MulDrop.14428;Deleted.;

A0000793.bat;I:\System Volume Information\_restore{73D3F90F-8EE8-4060-8ED7-D9FEF46954D6}\RP10;Trojan.MulDrop.14428;Deleted.;

A0000029.bat;I:\System Volume Information\_restore{73D3F90F-8EE8-4060-8ED7-D9FEF46954D6}\RP2;Trojan.MulDrop.14428;Deleted.;

A0000042.bat;I:\System Volume Information\_restore{73D3F90F-8EE8-4060-8ED7-D9FEF46954D6}\RP2;Trojan.MulDrop.14428;Deleted.;

A0000053.bat;I:\System Volume Information\_restore{73D3F90F-8EE8-4060-8ED7-D9FEF46954D6}\RP3;Trojan.MulDrop.14428;Deleted.;

A0000110.bat;I:\System Volume Information\_restore{73D3F90F-8EE8-4060-8ED7-D9FEF46954D6}\RP3;Trojan.MulDrop.14428;Deleted.;

A0000120.bat;I:\System Volume Information\_restore{73D3F90F-8EE8-4060-8ED7-D9FEF46954D6}\RP4;Trojan.MulDrop.14428;Deleted.;

A0000172.bat;I:\System Volume Information\_restore{73D3F90F-8EE8-4060-8ED7-D9FEF46954D6}\RP4;Trojan.MulDrop.14428;Deleted.;

A0000229.bat;I:\System Volume Information\_restore{73D3F90F-8EE8-4060-8ED7-D9FEF46954D6}\RP5;Trojan.MulDrop.14428;Deleted.;

A0000249.bat;I:\System Volume Information\_restore{73D3F90F-8EE8-4060-8ED7-D9FEF46954D6}\RP5;Trojan.MulDrop.14428;Deleted.;

A0000262.bat;I:\System Volume Information\_restore{73D3F90F-8EE8-4060-8ED7-D9FEF46954D6}\RP5;Trojan.MulDrop.14428;Deleted.;

A0000271.bat;I:\System Volume Information\_restore{73D3F90F-8EE8-4060-8ED7-D9FEF46954D6}\RP5;Trojan.MulDrop.14428;Deleted.;

A0000415.bat;I:\System Volume Information\_restore{73D3F90F-8EE8-4060-8ED7-D9FEF46954D6}\RP6;Trojan.MulDrop.14428;Deleted.;

A0000502.bat;I:\System Volume Information\_restore{73D3F90F-8EE8-4060-8ED7-D9FEF46954D6}\RP8;Trojan.MulDrop.14428;Deleted.;

A0000513.bat;I:\System Volume Information\_restore{73D3F90F-8EE8-4060-8ED7-D9FEF46954D6}\RP9;Trojan.MulDrop.14428;Deleted.;

A0000533.bat;I:\System Volume Information\_restore{73D3F90F-8EE8-4060-8ED7-D9FEF46954D6}\RP9;Trojan.MulDrop.14428;Deleted.;

A0000542.bat;I:\System Volume Information\_restore{73D3F90F-8EE8-4060-8ED7-D9FEF46954D6}\RP9;Trojan.MulDrop.14428;Deleted.;

A0000018.bat;I:\System Volume Information\_restore{9F110F4D-D970-4810-AD9B-03149289B717}\RP2;Trojan.MulDrop.14428;Deleted.;

Link to post
Share on other sites

  • Root Admin

I don't see how Dr Web was able to find stuff in System Restore if you had cleaned it as shown above.

Was there an issue cleaning the System Restore?

Anyways... all looks clean now. Maybe try disabling the System Restore and then Re-enabling it again to clean it out, and then create a new restore point for this new state.

Great, all looks good now.

I'll close your post soon so that other don't post into it and leave you with this information and suggestions.

So how did I get infected in the first place?

At this time your system appears to be clean. Nothing else in the logs indicates that you are still infected.

Now that you appear to be clean, please follow these simple steps in order to keep your computer clean and secure:

Remove all but the most recent Restore Point on Windows XP

You should
Create a New Restore Point
to prevent possible reinfection from an old one.

Some of the malware you picked up could have been saved in System Restore.

Since this is a protected directory your tools cannot access to delete these files, they sometimes can reinfect your system if you accidentally use an old restore point.

Setting a new restore point AFTER cleaning your system will help prevent this and enable your computer to
"roll-back"
to a clean working state.

The easiest and safest way to do this is

:
  • Go to
    Start
    >
    Programs
    >
    Accessories
    >
    System Tools
    and click "
    System Restore
    ".
  • If the shortcut is missing you can also click on
    START
    >
    RUN
    > and type in
    %SystemRoot%\system32\restore\rstrui.exe
    and click OK

  • Choose the radio button marked "
    Create a Restore Point
    " on the first screen then click "
    Next
    ".

  • Give the new Restore Point a name, then click "
    Create
    ".

  • The new point will be stamped with the current date and time. Keep a log of this so you can find it easily should you need to use System Restore.

  • Then use the
    Disk Cleanup
    to remove all but the most recently created Restore Point.
  • Go to
    Start
    >
    Run
    and type:
    Cleanmgr.exe

  • Select the drive where Windows is installed and click "
    Ok
    ". Disk Cleanup will scan your files for several minutes, then open.

  • Click the "
    More Options
    " tab, then click the "
    Clean up
    " button under System Restore.

  • Click Ok. You will be prompted with "
    Are you sure you want to delete all but the most recent restore point?
    "

  • Click
    Yes
    , then click Ok.

  • Click
    Yes
    again when prompted with "
    Are you sure you want to perform these actions?
    "

  • Disk Cleanup will remove the files and close automatically.

  • On the
    Disk Cleanup
    tab, if the
    System Restore: Obsolete Data Stores
    entry is available remove them also.

  • These are files that were created before Windows was reformatted or reinstalled. They are obsolete and you can delete them.

selectdrivecleanup.pngselectdrivecleanup1.png

Additional information

Microsoft KB article: How to turn off and turn on System Restore in Windows XP

Bert Kinney's site: All about Windows System Restore

Here are some free programs I recommend that could help you improve your computer's security.

Install SpyWare Blaster

Download it from here

Find here the tutorial on how to use Spyware Blaster here

Install WinPatrol

Download it from here

Here you can find information about how WinPatrol works here

Install FireTrust SiteHound

You can find information and download it from here

Install hpHosts

Download it from here

hpHosts is a community managed and maintained hosts file that allows an additional layer of protection against access to ad,

tracking and malicious websites. This prevents your computer from connecting to these untrusted sites

by redirecting them to 127.0.0.1 which is your own local computer.

hpHosts Support Forum

Update your Antivirus programs and other security products regularly to avoid new threats that could infect your system.

You can use one of these sites to check if any updates are needed for your pc.

Secunia Software Inspector

F-secure Health Check

Visit Microsoft often to get the latest updates for your computer.

http://www.update.microsoft.com

Note 1: If you are running Windows XP SP2, you should upgrade to SP3.

Note 2: Users of Norton Internet Security 2008 should uninstall the software before they install Service Pack 3.

The security suite can then be reinstalled afterwards.

The windows firewall is not sufficient to protect your system. It doesn't monitor outgoing traffic and this is a must.

I recommend Online Armor Free

A little outdated but good reading on how to prevent Malware

Keep safe online and happy surfing.

Since this issue is resolved I will close the thread to prevent others from posting into it. If you need assistance please start your own topic and someone will be happy to assist you.

The fixes and advice in this thread are for this machine only. Do not apply to your machine unless you Fully Understand how these programs work and what you're doing. Please start a thread of your own and someone will be happy to help you, just follow the Pre-Hijackthis instructions found here before posting Pre- HJT Post Instructions

Also don't forget that we offer FREE assistance with General PC questions and repair here PC Help

If you're pleased with the product Malwarebytes and the service provided you, please let your friends, family, and co-workers know. http://www.malwarebytes.org

Link to post
Share on other sites

Guest
This topic is now closed to further replies.
 Share

  • Recently Browsing   0 members

    • No registered users viewing this page.
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.