Jump to content

mbam/hijack won't run, blue screen, redirecting links


Recommended Posts

A few weeks ago, i was hit with the SystemSecurity2009 virus, i got help from another website, but apparently i didn't delete all of it.

A few days ago I was infected with the Windows Antivirus Pro virus. I was able to delete some of it's files manually, but it's still there. It pops up with a fake window saying i need to buy the software.

I believe that the windows antivirus and the systemsecurity2009 have combined (not literally).

I can't open any software that will remove any type of spyware adware malware virus trojan, anything. That includes Malwarebytes and HijackThis. I am still able to run the installers, and the programs run, but they close about 5 seconds in. If i want to open them again, i get this message: Windows cannot access the specified device, path, or file. You may not have the appropriate permissions to access the item. Even by renaming any of the .exe files, i still get the same message.

Apart from that i get other error messages, like one about a viewpointmgr, and one that says: version CleanX-II. C:\PROGRA~1\Symantec\S32EVNT1.DLL. An installable Virtual Device Driver failed Dll initialization. Choose 'Close' to terminate the application. Apart from that, i usually a window saying that content advisor has blocked a web page, and it asks me to put my password in so i can see it.

Last but not least, i once a day at least, i get this blue screen error:

2009-08-28203516.jpg

I have read other posts that talk about the same things (mbam won't open, etc.) and followed their steps, but nothing has worked so far. I use this laptop everyday for all purposes, and since of monday 8/31, it will be for studies mostly since im going back to college. I hope i can get help. please!

One last thing, i have an external hard drive connected by usb to my laptop. i doubt that it's infected, but i thought i should mention it.

Link to post
Share on other sites

After looking at another page here in the forum, i saw that another person had the same problems, or a few rather, of the ones i had. One procedure he was told to do was run Win32kDiag.exe. I followed suit and was able to run it when i renamed it to iexplorer.exe. It produced a log file. I thought to show it and see if it'll help:

Log file is located at: C:\Documents and Settings\Llennnn\Desktop\Win32kDiag.txt

WARNING: Could not get backup privileges!

Searching 'C:\WINDOWS'...

Found mount point : C:\WINDOWS\$hf_mig$\KB942615\KB942615

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\$hf_mig$\KB943460\KB943460

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\$hf_mig$\KB944533\KB944533

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\$hf_mig$\KB956744\KB956744

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\$hf_mig$\KB960859\KB960859

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\$hf_mig$\KB961371\KB961371

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\$hf_mig$\KB961371-v2\KB961371-v2

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\$hf_mig$\KB971557\KB971557

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\$hf_mig$\KB971633\KB971633

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\$hf_mig$\KB971657\KB971657

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\$hf_mig$\KB973346\KB973346

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\$hf_mig$\KB973354\KB973354

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\$hf_mig$\KB973507\KB973507

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\$hf_mig$\KB973815\KB973815

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\$hf_mig$\KB973869\KB973869

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\$hf_mig$\{29F8DDC1-9487-49b8-B27E-3E0C3C1298FF}

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\assembly\NativeImages_v2.0.50727_32\Temp\ZAP108.tmp\ZAP108.tmp

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\assembly\NativeImages_v2.0.50727_32\Temp\ZAP18A.tmp\ZAP18A.tmp

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\assembly\NativeImages_v2.0.50727_32\Temp\ZAP26D.tmp\ZAP26D.tmp

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\assembly\NativeImages_v2.0.50727_32\Temp\ZAP28.tmp\ZAP28.tmp

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\assembly\NativeImages_v2.0.50727_32\Temp\ZAP295.tmp\ZAP295.tmp

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\assembly\NativeImages_v2.0.50727_32\Temp\ZAP2EA.tmp\ZAP2EA.tmp

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\assembly\NativeImages_v2.0.50727_32\Temp\ZAP348.tmp\ZAP348.tmp

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\assembly\NativeImages_v2.0.50727_32\Temp\ZAP3B9.tmp\ZAP3B9.tmp

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\assembly\NativeImages_v2.0.50727_32\Temp\ZAP3BA.tmp\ZAP3BA.tmp

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\assembly\NativeImages_v2.0.50727_32\Temp\ZAP3BB.tmp\ZAP3BB.tmp

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\assembly\NativeImages_v2.0.50727_32\Temp\ZAP3E6.tmp\ZAP3E6.tmp

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\assembly\NativeImages_v2.0.50727_32\Temp\ZAP53.tmp\ZAP53.tmp

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\assembly\NativeImages_v2.0.50727_32\Temp\ZAPC.tmp\ZAPC.tmp

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\assembly\NativeImages_v2.0.50727_32\Temp\ZAPE7.tmp\ZAPE7.tmp

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\assembly\temp\temp

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\assembly\tmp\tmp

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\Config\Config

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\Connection Wizard\Connection Wizard

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\Debug\UserMode\UserMode

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\Debug\WPD\WPD

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\Help\SBSI\Training\WXPPer\Cbz\Cbz

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\Help\SBSI\Training\WXPPer\Lib\Lib

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\Help\SBSI\Training\WXPPer\Wave\Wave

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\ime\imejp\applets\applets

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\ime\imejp98\imejp98

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\inf\IEM\0409\0409

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\Installer\$PatchCache$\Managed\0DC1503A46F231838AD88BCDDC8E8F7C\3.2.30729\3.2.30729

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\Installer\$PatchCache$\Managed\DC3BF90CC0D3D2F398A9A6D1762F70F3\2.2.30729\2.2.30729

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\java\classes\classes

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\java\trustlib\trustlib

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\Microsoft.NET\Framework\v1.1.4322\Temporary ASP.NET Files\Bind Logs\Bind Logs

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\Temporary ASP.NET Files\Temporary ASP.NET Files

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\Minidump\Minidump

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\msapps\msinfo\msinfo

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\msdownld.tmp\msdownld.tmp

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\mui\mui

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\occache\occache

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\pchealth\ERRORREP\QHEADLES\QHEADLES

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\pchealth\ERRORREP\QSIGNOFF\QSIGNOFF

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\pchealth\helpctr\BATCH\BATCH

Mount point destination : \Device\__max++>\^

Cannot access: C:\WINDOWS\pchealth\helpctr\binaries\helpsvc.exe

[1] 2008-04-13 20:12:21 744448 C:\WINDOWS\pchealth\helpctr\binaries\helpsvc.exe ()

[1] 2008-04-13 20:12:21 744448 C:\WINDOWS\ServicePackFiles\i386\helpsvc.exe (Microsoft Corporation)

[1] 2008-04-13 20:12:21 744448 C:\WINDOWS\system32\dllcache\helpsvc.exe (Microsoft Corporation)

Found mount point : C:\WINDOWS\pchealth\helpctr\Config\CheckPoint\CheckPoint

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\pchealth\helpctr\Config\News\News

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\pchealth\helpctr\HelpFiles\HelpFiles

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\pchealth\helpctr\InstalledSKUs\InstalledSKUs

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\pchealth\helpctr\System\DFS\DFS

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\pchealth\helpctr\Temp\Temp

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\PIF\PIF

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\Registration\CRMLog\CRMLog

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\security\logs\logs

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\SoftwareDistribution\AuthCabs\Downloaded\Downloaded

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\SoftwareDistribution\Download\07a96de176867bc25b7dc839d22b07e2\backup\backup

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\SoftwareDistribution\Download\0dd0244816ffb4b094c1caba4c3b1178\backup\backup

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\SoftwareDistribution\Download\40fc5c00ee89ac515590995374843d78\backup\backup

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\SoftwareDistribution\Download\6913c676e5d33978934caa46c49fdc75\backup\backup

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\SoftwareDistribution\Download\b7f0b2892b21211a5630518d058f48d9\backup\backup

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\SoftwareDistribution\Download\cfb5c33fcc73ed7dcd60250b085691a5\backup\backup

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\SoftwareDistribution\Download\d48a3b967ba5709df048e8f2a49cf8a6\backup\backup

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\SoftwareDistribution\Download\fa2ebe7f385da369070f93700f340c57\backup\backup

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\Sun\Java\Deployment\Deployment

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\system32\1025\1025

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\system32\1028\1028

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\system32\1031\1031

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\system32\1037\1037

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\system32\1041\1041

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\system32\1042\1042

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\system32\1054\1054

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\system32\2052\2052

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\system32\3076\3076

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\system32\3com_dmi\3com_dmi

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\system32\config\systemprofile\Application Data\Identities\{A2D18F0A-A73D-4174-B402-64127818E88A}\{A2D18F0A-A73D-4174-B402-64127818E88A}

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\system32\config\systemprofile\Application Data\InterTrust\ReceiptRepository\ReceiptRepository

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\system32\config\systemprofile\Application Data\InterVideo\WinDVD\5.0\Bookmark\Bookmark

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\system32\config\systemprofile\Application Data\Microsoft\Credentials\Credentials

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\system32\config\systemprofile\Application Data\Microsoft\Crypto\RSA\RSA

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\system32\config\systemprofile\Application Data\Microsoft\Media Player\Media Player

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\system32\config\systemprofile\Application Data\Microsoft\MMC\MMC

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\system32\config\systemprofile\Application Data\Microsoft\SystemCertificates\My\Certificates\Certificates

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\system32\config\systemprofile\Application Data\Microsoft\SystemCertificates\My\CRLs\CRLs

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\system32\config\systemprofile\Application Data\Microsoft\SystemCertificates\My\CTLs\CTLs

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\system32\config\systemprofile\Application Data\Sun\Java\Deployment\javaws\cache\cache

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\system32\config\systemprofile\Application Data\toshiba\pcdiag\v3.0\Logs\Logs

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\system32\config\systemprofile\Application Data\You've Got Pictures Screensaver\PictureDir\PictureDir

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\system32\config\systemprofile\Local Settings\Application Data\Microsoft\CD Burning\CD Burning

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\system32\config\systemprofile\Local Settings\Application Data\Microsoft\Credentials\Credentials

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\system32\config\systemprofile\Local Settings\Application Data\Microsoft\OFFICE\OFFICE

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\system32\config\systemprofile\My Documents\My eBooks\My eBooks

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\system32\config\systemprofile\NetHood\NetHood

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\system32\config\systemprofile\PrintHood\PrintHood

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\system32\config\systemprofile\WINDOWS\system\system

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\system32\dhcp\dhcp

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\system32\drivers\disdn\disdn

Mount point destination : \Device\__max++>\^

Cannot access: C:\WINDOWS\system32\eventlog.dll

[1] 2008-04-13 20:11:53 56320 C:\WINDOWS\ServicePackFiles\i386\eventlog.dll (Microsoft Corporation)

[1] 2008-04-13 20:11:53 62976 C:\WINDOWS\system32\eventlog.dll ()

[2] 2008-04-13 20:11:53 56320 C:\WINDOWS\system32\logevent.dll (Microsoft Corporation)

Found mount point : C:\WINDOWS\system32\export\export

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\system32\inetsrv\inetsrv

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\system32\LogFiles\LogFiles

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\system32\Microsoft\Crypto\RSA\MachineKeys\MachineKeys

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\system32\mui\dispspec\dispspec

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\system32\oobe\html\ispsgnup\ispsgnup

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\system32\oobe\html\oemcust\oemcust

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\system32\oobe\html\oemhw\oemhw

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\system32\oobe\html\oemreg\oemreg

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\system32\oobe\sample\sample

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\system32\ShellExt\ShellExt

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\system32\spool\drivers\w32x86\3\temp\temp

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\system32\spool\PRINTERS\PRINTERS

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\system32\wbem\Logs\Logs

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\system32\wbem\mof\bad\bad

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\system32\wbem\mof\good\good

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\system32\wbem\snmp\snmp

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\system32\wins\wins

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\system32\xircom\xircom

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\WBEM\WBEM

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\WinSxS\InstallTemp\InstallTemp

Mount point destination : \Device\__max++>\^

Finished!

Link to post
Share on other sites

  1. Download The Avenger2 by SwanDog46.
  2. Unzip avenger.exe to your desktop.
  3. Copy the text in the following codebox by selecting all of it, and pressing (<Control> + C) or by right clicking and selecting "Copy"
    Files to move:
    C:\WINDOWS\system32\logevent.dll | C:\WINDOWS\system32\eventlog.dll


  4. Now start The Avenger2 by double clicking avenger.exe on your desktop.
  5. Read the prompt that appears, and press OK.
  6. Paste the script into the textbox that appears, using (<Control> + V) or by right clicking and choosing "Paste".
  7. Press the "Execute" button.
  8. You will be presented with 2 confirmation prompts. Select yes on each. Your system will reboot.
    Note: It is possible that Avenger will reboot your system TWICE.
  9. Upon reboot, a command prompt window will appear on your screen for a few seconds, and then Avenger's log will open. Please paste that log here in your next post.

-----------

After posting the Avenger log, please check if mbam.exe is able to run. If you get an access denied error, you shall need to re-install MBAM. I will need to see an MBAM log

Link to post
Share on other sites

I ran Avenger and it worked fine. Here is the log:

Logfile of The Avenger Version 2.0, © by Swandog46

http://swandog46.geekstogo.com

Platform: Windows XP

*******************

Script file opened successfully.

Script file read successfully.

Backups directory opened successfully at C:\Avenger

*******************

Beginning to process script file:

Rootkit scan active.

No rootkits found!

File move operation "C:\WINDOWS\system32\logevent.dll|C:\WINDOWS\system32\eventlog.dll" completed successfully.

Completed script processing.

*******************

Finished! Terminate.

As you told me, after avenger ran, i tried to see if malwarebytes would work this time, so i got a new copy, but it didn't let me reinstall it so i renamed it. When it was installed, i clicked on mbam.exe and my computer crashed and brought me to the blue screen error i posted as a pic above. When i tried to restart my computer, it would freeze activity right before the user sign in appeared or even during the sign in. After many times of restarting it on normal mode and as last known good configuration, i was able to log in again, but i was presented with 2 errors. The first one appeared right as the user sign in loaded:

2009-08-29102616.jpg

The second happened when i logged in (i had to break the pics up because my phone couldn't get the full message without the words getting distorted):

2009-08-29102738.jpg2009-08-29102752.jpg2009-08-29102803.jpg

Also im still not able to run Malwarebytes, but instead of it saying i don't have permission, it just doesn't open.

Link to post
Share on other sites

i tried doing that a while ago when i saw it on another post, but it still did not work. However, i tried using Fr33.exe with HijackThis and SUPERAntiSpyware, and it worked on both.

i have the log from HijackThis, but im still running the scan from SUPERAntiSpyware, so i don't want to disturb it. I am using my phone now to update on the situation. As soon as the scan is done i will post the HijackThis log.

Link to post
Share on other sites

Still no luck with mbam.exe

I am still able to run all other anti-malware (HijackThis, SUPERAntiSpyware) though.

I ran HijackThis again, and here is the log it produced:

Logfile of Trend Micro HijackThis v2.0.2

Scan saved at 12:39:24 PM, on 8/29/2009

Platform: Windows XP SP3 (WinNT 5.01.2600)

MSIE: Internet Explorer v6.00 SP3 (6.00.2900.5512)

Boot mode: Normal

Running processes:

C:\WINDOWS\System32\smss.exe

C:\WINDOWS\system32\winlogon.exe

C:\WINDOWS\system32\services.exe

C:\WINDOWS\system32\lsass.exe

C:\WINDOWS\system32\Ati2evxx.exe

C:\WINDOWS\system32\svchost.exe

C:\WINDOWS\System32\svchost.exe

C:\WINDOWS\system32\spoolsv.exe

C:\Program Files\Viewpoint\Common\ViewpointService.exe

C:\WINDOWS\Explorer.EXE

C:\Program Files\Unlocker\UnlockerAssistant.exe

C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe

C:\Program Files\Mozilla Firefox\firefox.exe

C:\Program Files\Trend Micro\HijackThis\hijackthis.exe

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar = http://www.yahoo.com/search/ie.html

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = about:blank

R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://www.toshiba.com

R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Bar = http://us.rd.yahoo.com/customize/ie/defaul...rch/search.html

R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = local

R3 - URLSearchHook: (no name) - CFBFAE00-17A6-11D0-99CB-00C04FD64497} - (no file)

O2 - BHO: WormRadar.com IESiteBlocker.NavFilter - {3CA2F312-6F6E-4B53-A66E-4E65E497C8C0} - (no file)

O3 - Toolbar: (no name) - {CCC7A320-B3CA-4199-B1A6-9F516DD69829} - (no file)

O4 - HKLM\..\Run: [QuickTime Task] "C:\PROGRAM FILES\QUICKTIME\QTTASK.EXE" -atboottime

O4 - HKLM\..\Run: [KernelFaultCheck] %systemroot%\system32\dumprep 0 -k

O4 - HKLM\..\Run: [unlockerAssistant] "C:\Program Files\Unlocker\UnlockerAssistant.exe"

O4 - HKLM\..\Run: [userFaultCheck] %systemroot%\system32\dumprep 0 -u

O4 - HKLM\..\RunOnce: [Malwarebytes' Anti-Malware] C:\Program Files\Malwarebytes' Anti-Malware\mbamgui.exe /install /silent

O4 - HKCU\..\Run: [sUPERAntiSpyware] C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe

O4 - HKUS\S-1-5-21-1246564856-3580204921-2958543816-1006\..\Run: [sUPERAntiSpyware] C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe (User '?')

O4 - HKUS\S-1-5-21-1246564856-3580204921-2958543816-1006\..\Run: [Aim6] (User '?')

O4 - HKUS\S-1-5-18\..\Run: [DWQueuedReporting] "C:\PROGRA~1\COMMON~1\MICROS~1\DW\dwtrig20.exe" -t (User '?')

O4 - HKUS\S-1-5-18\..\RunOnce: [RunNarrator] Narrator.exe (User '?')

O4 - HKUS\.DEFAULT\..\Run: [DWQueuedReporting] "C:\PROGRA~1\COMMON~1\MICROS~1\DW\dwtrig20.exe" -t (User 'Default user')

O4 - HKUS\.DEFAULT\..\RunOnce: [RunNarrator] Narrator.exe (User 'Default user')

O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_07\bin\ssv.dll

O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_07\bin\ssv.dll

O9 - Extra button: (no name) - {CD67F990-D8E9-11d2-98FE-00C0F0318AFE} - (no file)

O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe

O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe

O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe

O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe

O10 - Unknown file in Winsock LSP: c:\windows\system32\nwprovau.dll

O14 - IERESET.INF: START_PAGE_URL=http://www.toshiba.com

O16 - DPF: {5ED80217-570B-4DA9-BF44-BE107C0EC166} (Windows Live Safety Center Base Module) - http://cdn.scan.onecare.live.com/resource/...lscbase4009.cab

O20 - Winlogon Notify: !SASWinLogon - C:\Program Files\SUPERAntiSpyware\SASWINLO.dll

O20 - Winlogon Notify: sstqp - C:\WINDOWS\

O23 - Service: AntipyProex (AntipPro2009_100) - Unknown owner - C:\WINDOWS\svchast.exe (file missing)

O23 - Service: Ati HotKey Poller - Unknown owner - C:\WINDOWS\system32\Ati2evxx.exe

O23 - Service: iPod Service - Apple Inc. - C:\Program Files\iPod\bin\iPodService.exe

O23 - Service: Viewpoint Manager Service - Viewpoint Corporation - C:\Program Files\Viewpoint\Common\ViewpointService.exe

--

End of file - 4413 bytes

Link to post
Share on other sites

Do a HijackThis scan & place a check next to these items and select "Fix checked":

R3 - URLSearchHook: (no name) - CFBFAE00-17A6-11D0-99CB-00C04FD64497} - (no file)

O3 - Toolbar: (no name) - {CCC7A320-B3CA-4199-B1A6-9F516DD69829} - (no file)

O4 - HKLM\..\Run: [userFaultCheck] %systemroot%\system32\dumprep 0 -u

O4 - HKLM\..\RunOnce: [Malwarebytes' Anti-Malware] C:\Program Files\Malwarebytes' Anti-Malware\mbamgui.exe /install /silent

O4 - HKUS\S-1-5-21-1246564856-3580204921-2958543816-1006\..\Run: [Aim6] (User '?')

O9 - Extra button: (no name) - {CD67F990-D8E9-11d2-98FE-00C0F0318AFE} - (no file)

O20 - Winlogon Notify: sstqp - C:\WINDOWS\

O23 - Service: AntipyProex (AntipPro2009_100) - Unknown owner - C:\WINDOWS\svchast.exe (file missing)

Ignore any prompts for a reboot

---------------

Please visit this webpage for instructions for downloading and running ComboFix:

http://www.bleepingcomputer.com/combofix/how-to-use-combofix

Post the log from ComboFix when you've accomplished that.

Link to post
Share on other sites

First, i was not able to find:

O4 - HKLM\..\RunOnce: [Malwarebytes' Anti-Malware] C:\Program Files\Malwarebytes' Anti-Malware\mbamgui.exe /install /silent

Instead there was this:

O4 - HKLM\..\Run: [Malwarebytes' Anti-Malware] "C:\Program Files\Malwarebytes' Anti-Malware\mbamgui.exe" /starttray

Also at first i couldn't run ComboFix.exe, so i renamed it to winlogoff.exe. It ran. Here is the log:

ComboFix 09-08-28.06 - Llennnn 08/29/2009 13:24.1.2 - NTFSx86

* Created a new restore point

.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))

.

c:\recycler\S-1-5-21-3140416192-3415037583-14666274-1003

c:\windows\Fonts\mlog

c:\windows\Installer\132ac3d.msp

c:\windows\Installer\1c45d5b.msp

c:\windows\Installer\1c45d61.msp

c:\windows\Installer\2ca3b.msp

c:\windows\Installer\2ca41.msp

c:\windows\Installer\545075.msi

c:\windows\Installer\87534f.msi

c:\windows\ppp3.dat

c:\windows\system32\acpsyedo.ini

c:\windows\system32\adfskpih.ini

c:\windows\system32\afuepkdf.ini

c:\windows\system32\ajxtdkej.ini

c:\windows\system32\alscttta.ini

c:\windows\system32\aobkhlbn.ini

c:\windows\system32\apmxvnyd.ini

c:\windows\system32\asbludsc.ini

c:\windows\system32\bbifnqxl.ini

c:\windows\system32\bdlcenrb.ini

c:\windows\system32\bennuar.old

c:\windows\system32\bgsolehl.ini

c:\windows\system32\bincd32.dat

c:\windows\system32\blhiqagi.ini

c:\windows\system32\bykmyfae.ini

c:\windows\system32\cbuwdtqj.ini

c:\windows\system32\coliscrm.ini

c:\windows\system32\colylmgp.ini

c:\windows\system32\config\systemprofile\Start Menu\Programs\Windows Antivirus Pro

c:\windows\system32\cucqbfpt.ini

c:\windows\system32\djglluei.ini

c:\windows\system32\dlbbunpq.ini

c:\windows\system32\dnsjxipf.ini

c:\windows\system32\dopygxdh.ini

c:\windows\system32\dowtnqqu.ini

c:\windows\system32\drivers\kbiwkmopxmtnkp.sys

c:\windows\system32\drivers\UAClxwbdweyli.sys

c:\windows\system32\drivers\vsfoceapuxxbkp.sys

c:\windows\system32\dtvhmemm.ini

c:\windows\system32\ecakrgnr.ini

c:\windows\system32\emmachil.ini

c:\windows\system32\esirevms.ini

c:\windows\system32\extxpxaw.ini

c:\windows\system32\feuuwxvp.ini

c:\windows\system32\figndppt.ini

c:\windows\system32\fjdrirwh.ini

c:\windows\system32\fmioudlc.ini

c:\windows\system32\fqrkkepm.ini

c:\windows\system32\ftnaqxha.ini

c:\windows\system32\fybjfcdw.ini

c:\windows\system32\fyhmqdwg.ini

c:\windows\system32\gdbffedj.ini

c:\windows\system32\gevopimx.ini

c:\windows\system32\geyekrbutxvdxj.dat

c:\windows\system32\geyekrnyjomlct.dat

c:\windows\system32\geyekrviwtxtuf.dat

c:\windows\system32\gqmscgck.ini

c:\windows\system32\gryfcutr.ini

c:\windows\system32\gxighhfm.ini

c:\windows\system32\hbbbwdmv.ini

c:\windows\system32\hhsydrrd.ini

c:\windows\system32\hjpakegm.ini

c:\windows\system32\hmcwmghw.ini

c:\windows\system32\hqiinvuy.ini

c:\windows\system32\hwdueael.ini

c:\windows\system32\ijulspnr.ini

c:\windows\system32\ijyngmva.ini

c:\windows\system32\inkdqjso.ini

c:\windows\system32\iunwvqof.ini

c:\windows\system32\iwwrarsb.ini

c:\windows\system32\jalxitcr.ini

c:\windows\system32\jetrhjlp.ini

c:\windows\system32\jhwmrfum.ini

c:\windows\system32\jrujpehr.ini

c:\windows\system32\jubwblmk.ini

c:\windows\system32\judoimcm.ini

c:\windows\system32\jveeartx.ini

c:\windows\system32\jyhglwqn.ini

c:\windows\system32\kbiwkmamdbsiwe.dll

c:\windows\system32\kbiwkmqsdpgxot.dat

c:\windows\system32\kbiwkmxtuevhpf.dat

c:\windows\system32\kbiwkmygypcetr.dll

c:\windows\system32\kepijqmp.ini

c:\windows\system32\kkroqkkx.ini

c:\windows\system32\kljfnscw.ini

c:\windows\system32\komvbulf.ini

c:\windows\system32\kpikircm.ini

c:\windows\system32\krfpyiyb.ini

c:\windows\system32\lecxkyio.ini

c:\windows\system32\lekkkvyb.ini

c:\windows\system32\llxhpqyr.ini

c:\windows\system32\lqlkhvrm.ini

c:\windows\system32\lsprst7.dll

c:\windows\system32\mddljglq.ini

c:\windows\system32\mdjygrsq.ini

c:\windows\system32\mhnrybvo.ini

c:\windows\system32\mjrdsfdy.ini

c:\windows\system32\mkhhksem.ini

c:\windows\system32\modlhohm.ini

c:\windows\system32\mqgnlqks.ini

c:\windows\system32\msutfobj.ini

c:\windows\system32\mtlqtrpi.ini

c:\windows\system32\mvexvjbx.ini

c:\windows\system32\nauymnxr.ini

c:\windows\system32\nefewgyf.ini

c:\windows\system32\nguwahsx.ini

c:\windows\system32\nhygqiup.ini

c:\windows\system32\nipxuuoh.ini

c:\windows\system32\nnhbsuxh.ini

c:\windows\system32\ntaplomd.ini

c:\windows\system32\nwxycreg.ini

c:\windows\system32\omhcdvpr.ini

c:\windows\system32\oqwnwvjx.ini

c:\windows\system32\owxyvdao.ini

c:\windows\system32\oxtdouiv.ini

c:\windows\system32\pcfbcvjh.ini

c:\windows\system32\pllijimc.ini

c:\windows\system32\pnpohusk.ini

c:\windows\system32\posguegb.ini

c:\windows\system32\ppnejcwk.ini

c:\windows\system32\psxnuqvp.ini

c:\windows\system32\qeymlvdy.ini

c:\windows\system32\qgwhuynp.ini

c:\windows\system32\qotdfvxk.ini

c:\windows\system32\qsxbjurm.ini

c:\windows\system32\quqdwaww.ini

c:\windows\system32\rkwlgsle.ini

c:\windows\system32\rlhmnrdj.ini

c:\windows\system32\rlwcstas.ini

c:\windows\system32\rndmccpk.ini

c:\windows\system32\rneugsbb.ini

c:\windows\system32\rqxypece.ini

c:\windows\system32\sainuypj.ini

c:\windows\system32\savxgmho.ini

c:\windows\system32\seuqwoqx.ini

c:\windows\system32\sltgxshc.ini

c:\windows\system32\sonhelp.htm

c:\windows\system32\ssleavnu.ini

c:\windows\system32\swldubtl.ini

c:\windows\system32\syiihnph.ini

c:\windows\system32\sysnet.dat

c:\windows\system32\taagvtns.ini

c:\windows\system32\tfgjjhbq.ini

c:\windows\system32\tmnditup.ini

c:\windows\system32\trjekapx.ini

c:\windows\system32\tumsmhfw.ini

c:\windows\system32\UACdrelyapnuq.dll

c:\windows\system32\UAChwewsnmsvbneolwev.db

c:\windows\system32\uacinit.dll

c:\windows\system32\UACkvdbetpwsf.dat

c:\windows\system32\UACltimsyisma.dll

c:\windows\system32\UACqjkyirjfmh.dll

c:\windows\system32\UACtoqexodqsl.db

c:\windows\system32\UACwxngwushpe.dll

c:\windows\system32\ubltcsro.ini

c:\windows\system32\ufiyfuyf.ini

c:\windows\system32\ukfygnhk.ini

c:\windows\system32\unftcwfc.ini

c:\windows\system32\urutbusn.ini

c:\windows\system32\vlionscr.ini

c:\windows\system32\vqcnaqkd.ini

c:\windows\system32\vsfocempdiesxb.dll

c:\windows\system32\vsfocephesjaxo.dat

c:\windows\system32\vsfocernivkrty.dll

c:\windows\system32\vsfocewfhweaxi.dat

c:\windows\system32\vxgoeosh.ini

c:\windows\system32\wdrhwhwg.ini

c:\windows\system32\wenyifvy.ini

c:\windows\system32\wjwadkls.ini

c:\windows\system32\wohuiocu.ini

c:\windows\system32\wvtimnsu.ini

c:\windows\system32\wwcxryud.ini

c:\windows\system32\xassmths.ini

c:\windows\system32\xdueqpdf.ini

c:\windows\system32\xrwwedpl.ini

c:\windows\system32\xtwukkio.ini

c:\windows\system32\xwllmndy.ini

c:\windows\system32\ycventla.ini

c:\windows\system32\ygasengd.ini

c:\windows\system32\ygtjohsm.ini

c:\windows\system32\yqkbkcrg.ini

c:\windows\system32\ytqieyna.ini

c:\windows\twain_16.dll

.

((((((((((((((((((((((((((((((((((((((( Drivers/Services )))))))))))))))))))))))))))))))))))))))))))))))))

.

-------\Service_kbiwkmqqmkjolw

-------\Legacy_kbiwkmqqmkjolw

-------\Service_UACd.sys

-------\Legacy_UACd.sys

-------\Service_vsfocejpibeett

-------\Legacy_vsfocejpibeett

-------\Legacy_NPF

-------\Legacy_{79007602-0CDB-4405-9DBF-1257BB3226ED}

-------\Legacy_{79007602-0CDB-4405-9DBF-1257BB3226EE}

((((((((((((((((((((((((( Files Created from 2009-07-28 to 2009-08-29 )))))))))))))))))))))))))))))))

.

2009-08-29 16:47 . 2009-08-29 17:24 -------- d-----w- c:\program files\Spybot - Search & Destroy

2009-08-29 16:43 . 2009-08-03 17:36 38160 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys

2009-08-29 16:43 . 2009-08-03 17:36 19096 ----a-w- c:\windows\system32\drivers\mbam.sys

2009-08-29 14:02 . 2009-08-29 16:50 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware

2009-08-29 00:57 . 2009-08-29 00:57 -------- d-----w- c:\program files\Trend Micro

2009-08-29 00:10 . 2009-08-29 17:15 -------- dcs---w- C:\ComboFix

2009-08-27 18:10 . 2009-08-27 18:10 -------- dc----w- C:\spoolerlogs

2009-08-23 02:14 . 2009-08-23 02:14 -------- d-----w- c:\windows\system32\XPSViewer

2009-08-23 02:13 . 2009-08-23 02:13 -------- d-----w- c:\program files\MSBuild

2009-08-23 02:13 . 2009-08-23 02:13 -------- d-----w- c:\program files\Reference Assemblies

2009-08-23 02:12 . 2008-07-06 12:06 89088 -c----w- c:\windows\system32\dllcache\filterpipelineprintproc.dll

2009-08-23 02:12 . 2008-07-06 12:06 575488 -c----w- c:\windows\system32\dllcache\xpsshhdr.dll

2009-08-23 02:12 . 2008-07-06 12:06 575488 ------w- c:\windows\system32\xpsshhdr.dll

2009-08-23 02:12 . 2008-07-06 12:06 1676288 -c----w- c:\windows\system32\dllcache\xpssvcs.dll

2009-08-23 02:12 . 2008-07-06 12:06 1676288 ------w- c:\windows\system32\xpssvcs.dll

2009-08-23 02:12 . 2008-07-06 12:06 117760 ------w- c:\windows\system32\prntvpt.dll

2009-08-23 02:12 . 2008-07-06 10:50 597504 -c----w- c:\windows\system32\dllcache\printfilterpipelinesvc.exe

2009-08-21 00:19 . 2009-08-21 00:19 -------- d-----w- c:\documents and settings\Administrator\Application Data\X-Setup Pro

2009-08-20 06:22 . 2009-08-29 03:10 -------- d-----w- c:\program files\Sophos

2009-08-19 03:41 . 2009-08-19 03:42 -------- d-----w- c:\program files\Unlocker

2009-08-08 05:53 . 2009-08-08 05:53 -------- d-----w- c:\documents and settings\All Users\Application Data\acccore

.

(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))

.

2009-08-29 17:39 . 2009-07-18 17:03 117760 ----a-w- c:\documents and settings\Llennnn\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\SDDLLS\UIREPAIR.DLL

2009-08-29 17:05 . 2009-07-18 14:07 -------- d-----w- c:\documents and settings\All Users\Application Data\Spybot - Search & Destroy

2009-08-29 16:54 . 2004-08-10 21:42 -------- d-----w- c:\program files\Common Files\Real

2009-08-29 16:54 . 2008-08-01 04:32 -------- d-----w- c:\program files\Common Files\DVDVideoSoft

2009-08-29 16:53 . 2007-05-13 20:43 -------- d-----w- c:\documents and settings\All Users\Application Data\Viewpoint

2009-08-29 16:53 . 2006-08-15 21:37 -------- d-----w- c:\program files\WMR11

2009-08-29 16:32 . 2009-07-18 17:03 -------- d-----w- c:\program files\SUPERAntiSpyware

2009-08-29 03:15 . 2008-03-09 20:44 -------- d-----w- c:\program files\Steam

2009-08-29 03:09 . 2004-08-10 22:09 -------- d-----w- c:\program files\Sonic

2009-08-29 03:08 . 2007-11-22 12:44 -------- d-----w- c:\documents and settings\Llennnn\Application Data\Move Networks

2009-08-29 03:07 . 2008-12-18 05:33 -------- d--h--w- c:\program files\InstallJammer Registry

2009-08-29 03:07 . 2009-05-29 02:37 -------- d-----w- c:\documents and settings\Llennnn\Application Data\FMZilla

2009-08-29 03:06 . 2009-05-09 20:57 -------- d-----w- c:\program files\Exact Audio Copy

2009-08-29 03:02 . 2007-08-16 23:24 -------- d-----w- c:\program files\Common Files\Apple

2009-08-29 03:01 . 2009-05-18 02:46 -------- d-----w- c:\documents and settings\Llennnn\Application Data\Amazon

2009-08-29 03:01 . 2009-05-18 02:42 -------- d-----w- c:\program files\Amazon

2009-08-27 18:54 . 2009-07-18 17:03 65024 ----a-r- c:\documents and settings\Llennnn\Application Data\Microsoft\Installer\{CDDCBBF1-2703-46BC-938B-BCC81A1EEAAA}\IconCDDCBBF15.exe

2009-08-27 18:54 . 2009-07-18 17:03 18944 ----a-r- c:\documents and settings\Llennnn\Application Data\Microsoft\Installer\{CDDCBBF1-2703-46BC-938B-BCC81A1EEAAA}\IconCDDCBBF13.exe

2009-08-23 13:10 . 2008-12-29 12:34 -------- d-----w- c:\program files\BonkEnc

2009-08-23 07:40 . 2006-09-01 04:02 53096 -c--a-w- c:\windows\system32\GDIPFONTCACHEV1.DAT

2009-08-08 05:57 . 2007-04-30 05:52 -------- d-----w- c:\program files\AIM6

2009-08-08 05:52 . 2006-01-09 03:42 -------- d-----w- c:\documents and settings\All Users\Application Data\AOL Downloads

2009-08-07 10:21 . 2008-11-14 04:47 -------- d-----w- c:\documents and settings\Llennnn\Application Data\BitTorrent

2009-07-18 17:03 . 2009-07-18 17:03 -------- d-----w- c:\documents and settings\All Users\Application Data\SUPERAntiSpyware.com

2009-07-18 17:03 . 2009-07-18 17:03 -------- d-----w- c:\documents and settings\Llennnn\Application Data\SUPERAntiSpyware.com

2009-07-18 15:51 . 2009-07-14 23:24 -------- d-----w- c:\documents and settings\All Users\Application Data\18086874

2009-07-18 14:59 . 2009-07-18 14:59 -------- d-----w- c:\documents and settings\Administrator\Application Data\Malwarebytes

2009-07-18 14:02 . 2009-07-18 14:02 -------- dc----w- c:\documents and settings\All Users\Application Data\{EF63305C-BAD7-4144-9208-D65528260864}

2009-07-18 13:34 . 2008-08-13 14:05 -------- d-----w- c:\program files\AVG

2009-07-18 03:38 . 2009-07-18 03:38 -------- d-----w- c:\documents and settings\All Users\Application Data\F-Secure

2009-07-17 04:19 . 2009-03-26 04:24 -------- d---a-w- c:\documents and settings\All Users\Application Data\TEMP

2009-07-17 03:12 . 2009-07-17 03:12 -------- d-----w- c:\program files\X-Setup Pro

2009-07-17 03:12 . 2009-07-17 03:12 -------- d-----w- c:\documents and settings\Llennnn\Application Data\X-Setup Pro

2009-07-17 03:12 . 2009-07-17 03:12 -------- d-----w- c:\documents and settings\All Users\Application Data\X-Setup Pro

2009-07-16 03:33 . 2009-07-16 03:33 -------- d-----w- c:\program files\Common Files\Wise Installation Wizard

2009-07-15 01:02 . 2009-07-15 01:02 7168 ----a-w- c:\windows\system32\drivers\utqxnjcy.sys

2009-07-14 03:43 . 2004-08-09 23:28 286208 ----a-w- c:\windows\system32\wmpdxm.dll

2009-07-04 17:14 . 2009-07-04 17:14 -------- d-----w- c:\program files\AskBarDis

2009-07-04 17:14 . 2009-07-04 17:14 -------- d-----w- c:\documents and settings\Llennnn\Application Data\Foxit

2009-07-04 17:14 . 2009-07-04 17:14 -------- d-----w- c:\program files\Foxit Software

2009-06-26 16:50 . 2004-08-09 23:28 666624 ----a-w- c:\windows\system32\wininet.dll

2009-06-26 16:50 . 2004-08-09 23:27 81920 ----a-w- c:\windows\system32\ieencode.dll

2009-06-16 06:35 . 2009-06-16 06:35 97144 ----a-w- c:\documents and settings\Llennnn\Application Data\Move Networks\ie_bin\MovePlayerUpgrade.exe

2009-06-12 05:14 . 2009-06-12 05:14 75048 ----a-w- c:\documents and settings\All Users\Application Data\Apple Computer\Installer Cache\iTunes 8.2.0.23\SetupAdmin.exe

.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))

.

.

*Note* empty entries & legit default entries are not shown

REGEDIT4

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]

"SUPERAntiSpyware"="c:\program files\SUPERAntiSpyware\SUPERAntiSpyware.exe" [2009-08-21 1830128]

"SpybotSD TeaTimer"="c:\program files\Spybot - Search & Destroy\TeaTimer.exe" [2009-03-05 2260480]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]

"QuickTime Task"="c:\program files\QUICKTIME\QTTASK.EXE" [2009-05-26 413696]

"UnlockerAssistant"="c:\program files\Unlocker\UnlockerAssistant.exe" [2008-05-02 15872]

"Malwarebytes' Anti-Malware"="c:\program files\Malwarebytes' Anti-Malware\mbamgui.exe" [2009-08-03 419088]

[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run]

"DWQueuedReporting"="c:\progra~1\COMMON~1\MICROS~1\DW\dwtrig20.exe" [2007-08-24 437160]

[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\RunOnce]

"RunNarrator"="Narrator.exe" - c:\windows\system32\narrator.exe [2008-04-14 53760]

[hkey_local_machine\software\microsoft\windows\currentversion\explorer\ShellExecuteHooks]

"{5AE067D3-9AFB-48E0-853A-EBB7F4A000DA}"= "c:\program files\SUPERAntiSpyware\SASSEH.DLL" [2008-05-13 77824]

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\!SASWinLogon]

2008-12-22 16:05 356352 ----a-w- c:\program files\SUPERAntiSpyware\SASWINLO.dll

[HKLM\~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^RAMASST.lnk]

backup=c:\windows\pss\RAMASST.lnkCommon Startup

HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\18086874

HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\6c4087b0

HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\EzButton

HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\PhotoShow Deluxe Media Manager

HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Run

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run-]

"QuickTime Task"="c:\program files\QUICKTIME\QTTASK.EXE" -atboottime

"LtMoh"=c:\program files\ltmoh\Ltmoh.exe

"AGRSMMSG"=AGRSMMSG.exe

[HKEY_LOCAL_MACHINE\software\microsoft\security center]

"AntiVirusOverride"=dword:00000001

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring]

"DisableMonitoring"=dword:00000001

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecAntiVirus]

"DisableMonitoring"=dword:00000001

R1 SASDIFSV;SASDIFSV;c:\program files\SUPERAntiSpyware\sasdifsv.sys [6/23/2009 11:01 AM 9968]

R1 SASKUTIL;SASKUTIL;c:\program files\SUPERAntiSpyware\SASKUTIL.SYS [6/23/2009 11:01 AM 74480]

R2 MBAMService;MBAMService;c:\program files\Malwarebytes' Anti-Malware\mbamservice.exe [8/29/2009 12:43 PM 232720]

R2 NwSapAgent;SAP Agent;c:\windows\system32\svchost.exe -k netsvcs [8/9/2004 7:28 PM 14336]

R3 MBAMProtector;MBAMProtector;c:\windows\system32\drivers\mbam.sys [8/29/2009 12:43 PM 19096]

R3 SASENUM;SASENUM;c:\program files\SUPERAntiSpyware\SASENUM.SYS [6/23/2009 11:01 AM 7408]

S2 AntipPro2009_100;AntipyProex;c:\windows\svchast.exe --> c:\windows\svchast.exe [?]

S2 Viewpoint Manager Service;Viewpoint Manager Service;"c:\program files\Viewpoint\Common\ViewpointService.exe" --> c:\program files\Viewpoint\Common\ViewpointService.exe [?]

S3 F-Secure Standalone Minifilter;F-Secure Standalone Minifilter;\??\c:\docume~1\Llennnn\LOCALS~1\Temp\OnlineScanner\Anti-Virus\fsgk.sys --> c:\docume~1\Llennnn\LOCALS~1\Temp\OnlineScanner\Anti-Virus\fsgk.sys [?]

S3 MEMSWEEP2;MEMSWEEP2;\??\c:\windows\system32\1.tmp --> c:\windows\system32\1.tmp [?]

S3 PL-40R;CASIO USB MIDI;c:\windows\system32\drivers\pl40rwdm.sys [11/25/2006 3:57 PM 18048]

.

Contents of the 'Scheduled Tasks' folder

.

- - - - ORPHANS REMOVED - - - -

MSConfigStartUp-winupdate - (no file)

.

------- Supplementary Scan -------

.

uStart Page = about:blank

mSearch Bar = hxxp://us.rd.yahoo.com/customize/ie/defaults/sb/msgr7/*http://www.yahoo.com/ext/search/search.html

uInternet Settings,ProxyOverride = local

IE: &AOL Toolbar search

FF - ProfilePath - c:\documents and settings\Llennnn\Application Data\Mozilla\Firefox\Profiles\2lrnzsdz.default\

FF - prefs.js: browser.startup.homepage - yahoo.com

FF - plugin: c:\program files\Mozilla Firefox\plugins\npbittorrent.dll

FF - plugin: c:\program files\Mozilla Firefox\plugins\npFoxitReaderPlugin.dll

---- FIREFOX POLICIES ----

c:\program files\Mozilla Firefox\greprefs\all.js - pref("media.enforce_same_site_origin", false);

c:\program files\Mozilla Firefox\greprefs\all.js - pref("media.cache_size", 51200);

c:\program files\Mozilla Firefox\greprefs\all.js - pref("media.ogg.enabled", true);

c:\program files\Mozilla Firefox\greprefs\all.js - pref("media.wave.enabled", true);

c:\program files\Mozilla Firefox\greprefs\all.js - pref("media.autoplay.enabled", true);

c:\program files\Mozilla Firefox\greprefs\all.js - pref("browser.urlbar.autocomplete.enabled", true);

c:\program files\Mozilla Firefox\greprefs\all.js - pref("capability.policy.mailnews.*.wholeText", "noAccess");

c:\program files\Mozilla Firefox\greprefs\all.js - pref("dom.storage.default_quota", 5120);

c:\program files\Mozilla Firefox\greprefs\all.js - pref("content.sink.event_probe_rate", 3);

c:\program files\Mozilla Firefox\greprefs\all.js - pref("network.http.prompt-temp-redirect", true);

c:\program files\Mozilla Firefox\greprefs\all.js - pref("layout.css.dpi", -1);

c:\program files\Mozilla Firefox\greprefs\all.js - pref("layout.css.devPixelsPerPx", -1);

c:\program files\Mozilla Firefox\greprefs\all.js - pref("gestures.enable_single_finger_input", true);

c:\program files\Mozilla Firefox\greprefs\all.js - pref("dom.max_chrome_script_run_time", 0);

c:\program files\Mozilla Firefox\greprefs\all.js - pref("network.tcp.sendbuffer", 131072);

c:\program files\Mozilla Firefox\greprefs\all.js - pref("geo.enabled", true);

c:\program files\Mozilla Firefox\greprefs\security-prefs.js - pref("security.remember_cert_checkbox_default_setting", true);

c:\program files\Mozilla Firefox\defaults\pref\firefox-branding.js - pref("browser.search.param.yahoo-fr", "moz35");

c:\program files\Mozilla Firefox\defaults\pref\firefox-branding.js - pref("browser.search.param.yahoo-fr-cjkt", "moz35");

c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("extensions.blocklist.level", 2);

c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("browser.urlbar.restrict.typed", "~");

c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("browser.urlbar.default.behavior", 0);

c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("privacy.clearOnShutdown.history", true);

c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("privacy.clearOnShutdown.formdata", true);

c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("privacy.clearOnShutdown.passwords", false);

c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("privacy.clearOnShutdown.downloads", true);

c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("privacy.clearOnShutdown.cookies", true);

c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("privacy.clearOnShutdown.cache", true);

c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("privacy.clearOnShutdown.sessions", true);

c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("privacy.clearOnShutdown.offlineApps", false);

c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("privacy.clearOnShutdown.siteSettings", false);

c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("privacy.cpd.history", true);

c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("privacy.cpd.formdata", true);

c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("privacy.cpd.passwords", false);

c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("privacy.cpd.downloads", true);

c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("privacy.cpd.cookies", true);

c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("privacy.cpd.cache", true);

c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("privacy.cpd.sessions", true);

c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("privacy.cpd.offlineApps", false);

c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("privacy.cpd.siteSettings", false);

c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("privacy.sanitize.migrateFx3Prefs", false);

c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("browser.ssl_override_behavior", 2);

c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("security.alternate_certificate_error_page", "certerror");

c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("browser.privatebrowsing.autostart", false);

c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("browser.privatebrowsing.dont_prompt_on_enter", false);

c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("geo.wifi.uri", "https://www.google.com/loc/json");

.

**************************************************************************

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net

Rootkit scan 2009-08-29 13:39

Windows 5.1.2600 Service Pack 3 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully

hidden files: 0

**************************************************************************

[HKEY_LOCAL_MACHINE\System\ControlSet002\Services\MEMSWEEP2]

"ImagePath"="\??\c:\windows\system32\1.tmp"

.

--------------------- LOCKED REGISTRY KEYS ---------------------

[HKEY_USERS\S-1-5-21-1246564856-3580204921-2958543816-1006\Software\Microsoft\SystemCertificates\AddressBook*]

@Allowed: (Read) (RestrictedCode)

@Allowed: (Read) (RestrictedCode)

[HKEY_USERS\S-1-5-21-1246564856-3580204921-2958543816-1006\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved\{8A63CE13-C766-E3C1-4F65-16B91397ABEF}*]

@Allowed: (Read) (RestrictedCode)

@Allowed: (Read) (RestrictedCode)

"abogneoookockgifhifjfnhhfnjdcldapm"=hex:61,61,00,00

"bbogneoookockgifhimjinimnocciljmjmab"=hex:61,61,00,00

.

--------------------- DLLs Loaded Under Running Processes ---------------------

- - - - - - - > 'winlogon.exe'(600)

c:\program files\SUPERAntiSpyware\SASWINLO.dll

- - - - - - - > 'explorer.exe'(1612)

c:\windows\system32\WPDShServiceObj.dll

c:\windows\system32\PortableDeviceTypes.dll

c:\windows\system32\PortableDeviceApi.dll

.

------------------------ Other Running Processes ------------------------

.

c:\windows\system32\ati2evxx.exe

.

**************************************************************************

.

Completion time: 2009-08-29 13:52 - machine was rebooted

ComboFix-quarantined-files.txt 2009-08-29 17:52

Pre-Run: 30,154,588,160 bytes free

Post-Run: 30,051,909,632 bytes free

WindowsXP-KB310994-SP2-Home-BootDisk-ENU.exe

[boot loader]

timeout=2

default=multi(0)disk(0)rdisk(0)partition(1)\WINDOWS

[operating systems]

c:\cmdcons\BOOTSECT.DAT="Microsoft Windows Recovery Console" /cmdcons

multi(0)disk(0)rdisk(0)partition(1)\WINDOWS="Microsoft Windows XP Home Edition" /noexecute=optin /fastdetect /noguiboot

Current=2 Default=2 Failed=1 LastKnownGood=5 Sets=1,2,3,4,5

432 --- E O F --- 2009-08-29 17:44

Link to post
Share on other sites

That's one ugly looking log. Where have you been surfing and what have you been downloading onto this poor machine? :)

---------------

Open NOTEPAD and copy/paste the text in the quotebox below into it:

http://www.malwarebytes.org/forums/index.php?showtopic=22949&st=0entry116803
FOLDER::
c:\documents and settings\All Users\Application Data\18086874
c:\documents and settings\All Users\Application Data\{EF63305C-BAD7-4144-9208-D65528260864}
FILE::
c:\windows\system32\drivers\utqxnjcy.sys
c:\windows\system32\1.tmp
REGISTRY::
[-HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\18086874]
[-HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\6c4087b0]
DRIVER::
AntipPro2009_100
MEMSWEEP2
FIXCSET::

Save this as "CFScript"

CFScriptB-4.gif

Referring to the picture above, drag CFScript.txt into ComboFix.exe

When finished, it shall produce a log for you, C:\ComboFix.txt. Post that log in your next reply.

---------------

Using Internet Explorer, visit http://www.kaspersky.com/service?chapter=161739400

Vista users right click on the Internet Explorer shortcut, and choose Run As Administrator.

**Note**

To optimize scanning time and produce a more sensible report for review:

  • Close any open programs
  • Turn off the real time scanner of any existing antivirus program while performing the online scan.

Click Accept, when prompted to download and install the program files and database of malware definitions.

  • Click Run at the Security prompt.
  • The program will then begin downloading and installing and will also update the database.
  • Please be patient as this can take several minutes.
  • Once the update is complete, click on My Computer under the green Scan bar to the left to start the scan.
  • Once the scan is complete, it will display if your system has been infected. It does not provide an option to clean/disinfect. We only require a report from it.
  • Do NOT be alarmed by what you see in the report. Many of the finds have likely been quarantined.
  • Click View scan report at the bottom.
  • Click the Save Report As... button.
  • Click the Save as Text button to save the file to your desktop so that you may post it in your next reply.

---------------

In your next post, please include fresh logs from:

  1. Online scan
  2. ComboFix's log

Please provide details of any problems you encountered whilst performing the above steps & update us on how the computer behaves now

Link to post
Share on other sites

In response to your question of what i download onto my computer, i am a fiend for mp3s. That means that i will go into even the most unsafe russian websites for a copy of a song. That being said, i do try to avoid conflict by keeping my anti-malware up to date, run it from time to time and have a safe browsing session (for most of the time).

As for the logs, here is the ComboFix log:

ComboFix 09-08-28.06 - Llennnn 08/29/2009 14:29.2.2 - NTFSx86

Microsoft Windows XP Home Edition 5.1.2600.3.1252.1.1033.18.447.284 [GMT -4:00]

Running from: c:\documents and settings\Llennnn\Desktop\winlogoff.exe

Command switches used :: c:\documents and settings\Llennnn\Desktop\CFScript.txt

AV: *On-access scanning disabled* (Outdated) {E10A9785-9598-4754-B552-92431C1C35F8}

AV: AVG Anti-Virus Free *On-access scanning disabled* (Outdated) {17DDD097-36FF-435F-9E1B-52D74245D6BF}

FW: COMODO Firewall Pro *enabled* {043803A3-4F86-4ef6-AFC5-F6E02A79969B}

FILE ::

"c:\windows\system32\1.tmp"

"c:\windows\system32\drivers\utqxnjcy.sys"

.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))

.

c:\documents and settings\All Users\Application Data\{EF63305C-BAD7-4144-9208-D65528260864}

c:\windows\system32\drivers\utqxnjcy.sys

.

((((((((((((((((((((((((((((((((((((((( Drivers/Services )))))))))))))))))))))))))))))))))))))))))))))))))

.

-------\Legacy_MEMSWEEP2

-------\Service_MEMSWEEP2

((((((((((((((((((((((((( Files Created from 2009-07-28 to 2009-08-29 )))))))))))))))))))))))))))))))

.

2009-08-29 16:47 . 2009-08-29 17:24 -------- d-----w- c:\program files\Spybot - Search & Destroy

2009-08-29 16:43 . 2009-08-03 17:36 38160 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys

2009-08-29 16:43 . 2009-08-03 17:36 19096 ----a-w- c:\windows\system32\drivers\mbam.sys

2009-08-29 14:02 . 2009-08-29 18:01 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware

2009-08-29 00:57 . 2009-08-29 00:57 -------- d-----w- c:\program files\Trend Micro

2009-08-29 00:10 . 2009-08-29 17:15 -------- dcs---w- C:\ComboFix

2009-08-27 18:10 . 2009-08-27 18:10 -------- dc----w- C:\spoolerlogs

2009-08-23 02:14 . 2009-08-23 02:14 -------- d-----w- c:\windows\system32\XPSViewer

2009-08-23 02:13 . 2009-08-23 02:13 -------- d-----w- c:\program files\MSBuild

2009-08-23 02:13 . 2009-08-23 02:13 -------- d-----w- c:\program files\Reference Assemblies

2009-08-23 02:12 . 2008-07-06 12:06 89088 -c----w- c:\windows\system32\dllcache\filterpipelineprintproc.dll

2009-08-23 02:12 . 2008-07-06 12:06 575488 -c----w- c:\windows\system32\dllcache\xpsshhdr.dll

2009-08-23 02:12 . 2008-07-06 12:06 575488 ------w- c:\windows\system32\xpsshhdr.dll

2009-08-23 02:12 . 2008-07-06 12:06 1676288 -c----w- c:\windows\system32\dllcache\xpssvcs.dll

2009-08-23 02:12 . 2008-07-06 12:06 1676288 ------w- c:\windows\system32\xpssvcs.dll

2009-08-23 02:12 . 2008-07-06 12:06 117760 ------w- c:\windows\system32\prntvpt.dll

2009-08-23 02:12 . 2008-07-06 10:50 597504 -c----w- c:\windows\system32\dllcache\printfilterpipelinesvc.exe

2009-08-21 00:19 . 2009-08-21 00:19 -------- d-----w- c:\documents and settings\Administrator\Application Data\X-Setup Pro

2009-08-20 06:22 . 2009-08-29 03:10 -------- d-----w- c:\program files\Sophos

2009-08-19 03:41 . 2009-08-19 03:42 -------- d-----w- c:\program files\Unlocker

2009-08-08 05:53 . 2009-08-08 05:53 -------- d-----w- c:\documents and settings\All Users\Application Data\acccore

.

(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))

.

2009-08-29 18:43 . 2009-07-18 17:03 117760 ----a-w- c:\documents and settings\Llennnn\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\SDDLLS\UIREPAIR.DLL

2009-08-29 17:05 . 2009-07-18 14:07 -------- d-----w- c:\documents and settings\All Users\Application Data\Spybot - Search & Destroy

2009-08-29 16:54 . 2004-08-10 21:42 -------- d-----w- c:\program files\Common Files\Real

2009-08-29 16:54 . 2008-08-01 04:32 -------- d-----w- c:\program files\Common Files\DVDVideoSoft

2009-08-29 16:53 . 2007-05-13 20:43 -------- d-----w- c:\documents and settings\All Users\Application Data\Viewpoint

2009-08-29 16:53 . 2006-08-15 21:37 -------- d-----w- c:\program files\WMR11

2009-08-29 16:32 . 2009-07-18 17:03 -------- d-----w- c:\program files\SUPERAntiSpyware

2009-08-29 03:15 . 2008-03-09 20:44 -------- d-----w- c:\program files\Steam

2009-08-29 03:09 . 2004-08-10 22:09 -------- d-----w- c:\program files\Sonic

2009-08-29 03:08 . 2007-11-22 12:44 -------- d-----w- c:\documents and settings\Llennnn\Application Data\Move Networks

2009-08-29 03:07 . 2008-12-18 05:33 -------- d--h--w- c:\program files\InstallJammer Registry

2009-08-29 03:07 . 2009-05-29 02:37 -------- d-----w- c:\documents and settings\Llennnn\Application Data\FMZilla

2009-08-29 03:06 . 2009-05-09 20:57 -------- d-----w- c:\program files\Exact Audio Copy

2009-08-29 03:02 . 2007-08-16 23:24 -------- d-----w- c:\program files\Common Files\Apple

2009-08-29 03:01 . 2009-05-18 02:46 -------- d-----w- c:\documents and settings\Llennnn\Application Data\Amazon

2009-08-29 03:01 . 2009-05-18 02:42 -------- d-----w- c:\program files\Amazon

2009-08-27 18:54 . 2009-07-18 17:03 65024 ----a-r- c:\documents and settings\Llennnn\Application Data\Microsoft\Installer\{CDDCBBF1-2703-46BC-938B-BCC81A1EEAAA}\IconCDDCBBF15.exe

2009-08-27 18:54 . 2009-07-18 17:03 18944 ----a-r- c:\documents and settings\Llennnn\Application Data\Microsoft\Installer\{CDDCBBF1-2703-46BC-938B-BCC81A1EEAAA}\IconCDDCBBF13.exe

2009-08-23 13:10 . 2008-12-29 12:34 -------- d-----w- c:\program files\BonkEnc

2009-08-23 07:40 . 2006-09-01 04:02 53096 -c--a-w- c:\windows\system32\GDIPFONTCACHEV1.DAT

2009-08-08 05:57 . 2007-04-30 05:52 -------- d-----w- c:\program files\AIM6

2009-08-08 05:52 . 2006-01-09 03:42 -------- d-----w- c:\documents and settings\All Users\Application Data\AOL Downloads

2009-08-07 10:21 . 2008-11-14 04:47 -------- d-----w- c:\documents and settings\Llennnn\Application Data\BitTorrent

2009-07-18 17:03 . 2009-07-18 17:03 -------- d-----w- c:\documents and settings\All Users\Application Data\SUPERAntiSpyware.com

2009-07-18 17:03 . 2009-07-18 17:03 -------- d-----w- c:\documents and settings\Llennnn\Application Data\SUPERAntiSpyware.com

2009-07-18 14:59 . 2009-07-18 14:59 -------- d-----w- c:\documents and settings\Administrator\Application Data\Malwarebytes

2009-07-18 13:34 . 2008-08-13 14:05 -------- d-----w- c:\program files\AVG

2009-07-18 03:38 . 2009-07-18 03:38 -------- d-----w- c:\documents and settings\All Users\Application Data\F-Secure

2009-07-17 04:19 . 2009-03-26 04:24 -------- d---a-w- c:\documents and settings\All Users\Application Data\TEMP

2009-07-17 03:12 . 2009-07-17 03:12 -------- d-----w- c:\program files\X-Setup Pro

2009-07-17 03:12 . 2009-07-17 03:12 -------- d-----w- c:\documents and settings\Llennnn\Application Data\X-Setup Pro

2009-07-17 03:12 . 2009-07-17 03:12 -------- d-----w- c:\documents and settings\All Users\Application Data\X-Setup Pro

2009-07-16 03:33 . 2009-07-16 03:33 -------- d-----w- c:\program files\Common Files\Wise Installation Wizard

2009-07-14 03:43 . 2004-08-09 23:28 286208 ----a-w- c:\windows\system32\wmpdxm.dll

2009-07-04 17:14 . 2009-07-04 17:14 -------- d-----w- c:\program files\AskBarDis

2009-07-04 17:14 . 2009-07-04 17:14 -------- d-----w- c:\documents and settings\Llennnn\Application Data\Foxit

2009-07-04 17:14 . 2009-07-04 17:14 -------- d-----w- c:\program files\Foxit Software

2009-06-26 16:50 . 2004-08-09 23:28 666624 ------w- c:\windows\system32\wininet.dll

2009-06-26 16:50 . 2004-08-09 23:27 81920 ----a-w- c:\windows\system32\ieencode.dll

2009-06-16 06:35 . 2009-06-16 06:35 97144 ----a-w- c:\documents and settings\Llennnn\Application Data\Move Networks\ie_bin\MovePlayerUpgrade.exe

2009-06-12 05:14 . 2009-06-12 05:14 75048 ----a-w- c:\documents and settings\All Users\Application Data\Apple Computer\Installer Cache\iTunes 8.2.0.23\SetupAdmin.exe

.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))

.

.

*Note* empty entries & legit default entries are not shown

REGEDIT4

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]

"SUPERAntiSpyware"="c:\program files\SUPERAntiSpyware\SUPERAntiSpyware.exe" [2009-08-21 1830128]

"SpybotSD TeaTimer"="c:\program files\Spybot - Search & Destroy\TeaTimer.exe" [2009-03-05 2260480]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]

"QuickTime Task"="c:\program files\QUICKTIME\QTTASK.EXE" [2009-05-26 413696]

"UnlockerAssistant"="c:\program files\Unlocker\UnlockerAssistant.exe" [2008-05-02 15872]

"Malwarebytes' Anti-Malware"="c:\program files\Malwarebytes' Anti-Malware\mbamgui.exe" [2009-08-03 419088]

[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run]

"DWQueuedReporting"="c:\progra~1\COMMON~1\MICROS~1\DW\dwtrig20.exe" [2007-08-24 437160]

[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\RunOnce]

"RunNarrator"="Narrator.exe" - c:\windows\system32\narrator.exe [2008-04-14 53760]

[hkey_local_machine\software\microsoft\windows\currentversion\explorer\ShellExecuteHooks]

"{5AE067D3-9AFB-48E0-853A-EBB7F4A000DA}"= "c:\program files\SUPERAntiSpyware\SASSEH.DLL" [2008-05-13 77824]

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\!SASWinLogon]

2008-12-22 16:05 356352 ----a-w- c:\program files\SUPERAntiSpyware\SASWINLO.dll

[HKLM\~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^RAMASST.lnk]

backup=c:\windows\pss\RAMASST.lnkCommon Startup

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run-]

"QuickTime Task"="c:\program files\QUICKTIME\QTTASK.EXE" -atboottime

"LtMoh"=c:\program files\ltmoh\Ltmoh.exe

"AGRSMMSG"=AGRSMMSG.exe

[HKEY_LOCAL_MACHINE\software\microsoft\security center]

"AntiVirusOverride"=dword:00000001

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring]

"DisableMonitoring"=dword:00000001

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecAntiVirus]

"DisableMonitoring"=dword:00000001

R1 SASDIFSV;SASDIFSV;c:\program files\SUPERAntiSpyware\sasdifsv.sys [6/23/2009 11:01 AM 9968]

R1 SASKUTIL;SASKUTIL;c:\program files\SUPERAntiSpyware\SASKUTIL.SYS [6/23/2009 11:01 AM 74480]

R2 MBAMService;MBAMService;c:\program files\Malwarebytes' Anti-Malware\mbamservice.exe [8/29/2009 12:43 PM 232720]

R2 NwSapAgent;SAP Agent;c:\windows\system32\svchost.exe -k netsvcs [8/9/2004 7:28 PM 14336]

R3 MBAMProtector;MBAMProtector;c:\windows\system32\drivers\mbam.sys [8/29/2009 12:43 PM 19096]

R3 SASENUM;SASENUM;c:\program files\SUPERAntiSpyware\SASENUM.SYS [6/23/2009 11:01 AM 7408]

S2 Viewpoint Manager Service;Viewpoint Manager Service;"c:\program files\Viewpoint\Common\ViewpointService.exe" --> c:\program files\Viewpoint\Common\ViewpointService.exe [?]

S3 F-Secure Standalone Minifilter;F-Secure Standalone Minifilter;\??\c:\docume~1\Llennnn\LOCALS~1\Temp\OnlineScanner\Anti-Virus\fsgk.sys --> c:\docume~1\Llennnn\LOCALS~1\Temp\OnlineScanner\Anti-Virus\fsgk.sys [?]

S3 PL-40R;CASIO USB MIDI;c:\windows\system32\drivers\pl40rwdm.sys [11/25/2006 3:57 PM 18048]

.

.

------- Supplementary Scan -------

.

uStart Page = about:blank

mSearch Bar = hxxp://us.rd.yahoo.com/customize/ie/defaults/sb/msgr7/*http://www.yahoo.com/ext/search/search.html

uInternet Settings,ProxyOverride = local

IE: &AOL Toolbar search

FF - ProfilePath - c:\documents and settings\Llennnn\Application Data\Mozilla\Firefox\Profiles\2lrnzsdz.default\

FF - prefs.js: browser.startup.homepage - yahoo.com

FF - plugin: c:\program files\Mozilla Firefox\plugins\npbittorrent.dll

FF - plugin: c:\program files\Mozilla Firefox\plugins\npFoxitReaderPlugin.dll

---- FIREFOX POLICIES ----

c:\program files\Mozilla Firefox\greprefs\all.js - pref("media.enforce_same_site_origin", false);

c:\program files\Mozilla Firefox\greprefs\all.js - pref("media.cache_size", 51200);

c:\program files\Mozilla Firefox\greprefs\all.js - pref("media.ogg.enabled", true);

c:\program files\Mozilla Firefox\greprefs\all.js - pref("media.wave.enabled", true);

c:\program files\Mozilla Firefox\greprefs\all.js - pref("media.autoplay.enabled", true);

c:\program files\Mozilla Firefox\greprefs\all.js - pref("browser.urlbar.autocomplete.enabled", true);

c:\program files\Mozilla Firefox\greprefs\all.js - pref("capability.policy.mailnews.*.wholeText", "noAccess");

c:\program files\Mozilla Firefox\greprefs\all.js - pref("dom.storage.default_quota", 5120);

c:\program files\Mozilla Firefox\greprefs\all.js - pref("content.sink.event_probe_rate", 3);

c:\program files\Mozilla Firefox\greprefs\all.js - pref("network.http.prompt-temp-redirect", true);

c:\program files\Mozilla Firefox\greprefs\all.js - pref("layout.css.dpi", -1);

c:\program files\Mozilla Firefox\greprefs\all.js - pref("layout.css.devPixelsPerPx", -1);

c:\program files\Mozilla Firefox\greprefs\all.js - pref("gestures.enable_single_finger_input", true);

c:\program files\Mozilla Firefox\greprefs\all.js - pref("dom.max_chrome_script_run_time", 0);

c:\program files\Mozilla Firefox\greprefs\all.js - pref("network.tcp.sendbuffer", 131072);

c:\program files\Mozilla Firefox\greprefs\all.js - pref("geo.enabled", true);

c:\program files\Mozilla Firefox\greprefs\security-prefs.js - pref("security.remember_cert_checkbox_default_setting", true);

c:\program files\Mozilla Firefox\defaults\pref\firefox-branding.js - pref("browser.search.param.yahoo-fr", "moz35");

c:\program files\Mozilla Firefox\defaults\pref\firefox-branding.js - pref("browser.search.param.yahoo-fr-cjkt", "moz35");

c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("extensions.blocklist.level", 2);

c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("browser.urlbar.restrict.typed", "~");

c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("browser.urlbar.default.behavior", 0);

c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("privacy.clearOnShutdown.history", true);

c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("privacy.clearOnShutdown.formdata", true);

c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("privacy.clearOnShutdown.passwords", false);

c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("privacy.clearOnShutdown.downloads", true);

c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("privacy.clearOnShutdown.cookies", true);

c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("privacy.clearOnShutdown.cache", true);

c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("privacy.clearOnShutdown.sessions", true);

c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("privacy.clearOnShutdown.offlineApps", false);

c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("privacy.clearOnShutdown.siteSettings", false);

c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("privacy.cpd.history", true);

c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("privacy.cpd.formdata", true);

c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("privacy.cpd.passwords", false);

c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("privacy.cpd.downloads", true);

c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("privacy.cpd.cookies", true);

c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("privacy.cpd.cache", true);

c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("privacy.cpd.sessions", true);

c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("privacy.cpd.offlineApps", false);

c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("privacy.cpd.siteSettings", false);

c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("privacy.sanitize.migrateFx3Prefs", false);

c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("browser.ssl_override_behavior", 2);

c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("security.alternate_certificate_error_page", "certerror");

c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("browser.privatebrowsing.autostart", false);

c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("browser.privatebrowsing.dont_prompt_on_enter", false);

c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("geo.wifi.uri", "https://www.google.com/loc/json");

.

**************************************************************************

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net

Rootkit scan 2009-08-29 14:43

Windows 5.1.2600 Service Pack 3 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully

hidden files: 0

**************************************************************************

.

--------------------- LOCKED REGISTRY KEYS ---------------------

[HKEY_USERS\S-1-5-21-1246564856-3580204921-2958543816-1006\Software\Microsoft\SystemCertificates\AddressBook*]

@Allowed: (Read) (RestrictedCode)

@Allowed: (Read) (RestrictedCode)

[HKEY_USERS\S-1-5-21-1246564856-3580204921-2958543816-1006\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved\{8A63CE13-C766-E3C1-4F65-16B91397ABEF}*]

@Allowed: (Read) (RestrictedCode)

@Allowed: (Read) (RestrictedCode)

"abogneoookockgifhifjfnhhfnjdcldapm"=hex:61,61,00,00

"bbogneoookockgifhimjinimnocciljmjmab"=hex:61,61,00,00

.

--------------------- DLLs Loaded Under Running Processes ---------------------

- - - - - - - > 'winlogon.exe'(600)

c:\program files\SUPERAntiSpyware\SASWINLO.dll

- - - - - - - > 'explorer.exe'(1300)

c:\windows\system32\WPDShServiceObj.dll

c:\windows\system32\PortableDeviceTypes.dll

c:\windows\system32\PortableDeviceApi.dll

.

------------------------ Other Running Processes ------------------------

.

c:\windows\system32\ati2evxx.exe

.

**************************************************************************

.

Completion time: 2009-08-29 14:53 - machine was rebooted

ComboFix-quarantined-files.txt 2009-08-29 18:53

ComboFix2.txt 2009-08-29 17:52

Pre-Run: 30,038,781,952 bytes free

Post-Run: 30,017,515,520 bytes free

229 --- E O F --- 2009-08-29 17:44

Kaspersky's Online Scanner gave me nothing but a headache, because it was quite possibly the longest online scanner in the world. 1 hour and 34 minutes for 70% scanned? The worst part it's that about 70-something-%, it told me there was an unresponsive script, and then it froze. So an hour and change went to waste there.

Regarding the laptop's functionality, it seems like all traces of both SystemSecurity2009 and Windows Antivirus Pro are gone.. though im still worried that there might be something hidden (since that's how it appeared last time i ran anti-malware software for SystemSecurity2009). Malwarebytes is operational now. I ran a quick scan and it told me it found no errors, here is the log (kinda pointless but w.e):

Malwarebytes' Anti-Malware 1.40

Database version: 2713

Windows 5.1.2600 Service Pack 3

8/29/2009 5:25:22 PM

mbam-log-2009-08-29 (17-25-22).txt

Scan type: Quick Scan

Objects scanned: 94287

Time elapsed: 5 minute(s), 59 second(s)

Memory Processes Infected: 0

Memory Modules Infected: 0

Registry Keys Infected: 0

Registry Values Infected: 0

Registry Data Items Infected: 0

Folders Infected: 0

Files Infected: 0

Memory Processes Infected:

(No malicious items detected)

Memory Modules Infected:

(No malicious items detected)

Registry Keys Infected:

(No malicious items detected)

Registry Values Infected:

(No malicious items detected)

Registry Data Items Infected:

(No malicious items detected)

Folders Infected:

(No malicious items detected)

Files Infected:

(No malicious items detected)

Link to post
Share on other sites

Ok i take back what i said, it's been 37 minutes and progress is at 0%!! That's not acceptable. It's insane. I'll take my chances with what's been accomplished with your help sUBs. You really did help me a lot. Thank You. The files you have given me have ceased the viruses, so for all intents and purposes, my laptop is clean again. One thing though, what do you recommend i do to strengthen my laptop's security against malware?

Link to post
Share on other sites

Kindly follow these simple steps in order to keep your computer clean and secure:

  1. Uninstall ComboFix ... do not skip this step
    This process will perform some post cleanup measures.
    Do this by going to to Start > Run & typing in ComboFix /u
  2. ANTIVIRUS SOFTWARE
    It is imperative that you update your Antivirus software at least once a week (Even more if you wish). If you do not update your antivirus software then it will not be able to catch any of the new variants that may come out.
  3. Microsoft Windows Updatehttp://www.windowsupdate.com
    Visit regularly. This will ensure your computer always has the latest security updates. If there are new updates to install, install them immediately, reboot your computer, and revisit the site until there are no more critical updates.
  4. http://www.mozilla.org/products/firefox/ - Firefox - Use this alternate browser. Whilst Internet Explorer is not a bad browser, almost every exploit crafted is targeted to take advantage of an IE weakness.
  5. http://java.com/en/index.jsp - Sun's Java - It's much more secure than Microsoft's Java Virtual Machine.
  6. http://www.aumha.org/downloads/erunt-setup.exe - ERUNT - A useful freeware utility for users of Windows 2000/XP. It's made up of two parts - ERUNT & NTREGOPT.
    ERUNT will create daily complete backups of your computer's Registry. Whilst System Restore does the same thing, a corrupt registry file may prevent Windows from booting & this effectively renders disables System Restore. With ERUNT, you're able to restore the damaged Registry.
    NTREGOPT works by recreating each registry hive "from scratch", thus removing any slack space that may be left from previously modified or deleted keys. In other words, it compacts the Registry to a small size which allows Windows to load & perform faster.

To find out more information about how you got infected in the first place and some great guidelines to follow to prevent future infections you can read this article by Tony Klein - http://computercops.biz/postlite7736-.html

After doing all these, your system will be optimised against future threats.

.

Have a safe & happy computing day. wave.gif

Kindly respond to this thread once more so we can mark this thread as resolved.

Link to post
Share on other sites

Ok so i did everything except uninstall ComboFix. Everytime i run ComboFix /u from Run... i get this error message: Windows cannot find 'ComboFix'. Make sure you typed the name correctly, and then try again. To search for a file, click the Start button, and then click Search.

Link to post
Share on other sites

Ok that worked. God i feel like such a retard! I should have known that was the way i had to write the syntax, and also that i had renamed ComboFix to winlogoff, hey good job spotting that one!

Well everything seems fine now, but today as i resumed my normal activities, i noticed that my java on firefox is now acting strange. For instance, if i click on this rapidshare link (don't worry its safe): http://rapidshare.com/files/12456439/Hallu...P_-1995-PTP.rar, it jumps the gun and clicks on free user and brings me to a page that says:

Error

You want to download the following file:

http://rapidshare.com/files/12456439/Hallu...P_-1995-PTP.rar | 61999 KB

The download cannot be provided. Please check, if your browser supports Javascript.

Now usually, what happens is that one puts the url in the browser bar, and it loads to a screen that let's you choose either free user or premium user. Now after all the fixing we done, it just runs by itself to free user, skips the time you have to wait until the download link is available, and tells me the error aforementioned.

This not only happens with Rapidshare, but also with Megaupload and maybe other sites, i just haven't had the time to check, but i don't need to if those are not working. I tried to fix it by reinstalling Java and Firefox, but it's still going on. I don't want to continue bugging you but it was working before we ran all those scripts and anti-malware software.

Link to post
Share on other sites

  • 2 weeks later...

Does this happen only with FireFox? Or does it affect Internet Explorer as well?

I tried to fix it by reinstalling Java and Firefox, but it's still going on. I

When you mentioned re-installing FireFox, does this entail the removal of this folder > c:\documents and settings\Llennnn\Application Data\Mozilla\Firefox\Profiles\2lrnzsdz.default\

Have you tried creating a new FF user profile? http://support.mozilla.com/en-US/kb/Managing+profiles

Link to post
Share on other sites

Guest
This topic is now closed to further replies.
  • Recently Browsing   0 members

    • No registered users viewing this page.
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.