Jump to content

MBAM Antispyware/HijackThis blocked


Recommended Posts

Hi, I was doing a few installs a few days ago and everything seemed fine--Until my brother went on the computer and noticed something unususal in IE whenever he clicks on a result in google it redirects you to some other search engine. I didnt notice it because I Use Opera Browser and it seems the Virus or whatever it is doesnt effect some browsers after I found out I did everything in every way that i knew of to try and delete this thing However some dont find the spyware and some automatically shutdown and become unusable until a reinstall in donw this goes for malware bytes and hijack this but only when it is scanning the system.Acces is onlyways denied until reinstall takes place.

Before I Posted this topic I noticed that someone else had the same thing happen to them so i read it and i downloaded Win32kDiag and it has managed to scan the system but it kinda too long so i chked what was happening and found out that acces was being denied to certain parts of the computer.

Here is the Log File Please Help and Reply ASAP

Log file is located at: C:\Documents and Settings\Bijay\Desktop\Win32kDiag.txt

WARNING: Could not get backup privileges!

Searching 'C:\WINDOWS'...

Found mount point : C:\WINDOWS\addins\addins

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\Config\Config

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\Connection Wizard\Connection Wizard

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\Debug\UserMode\UserMode

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\ftpcache\ftpcache

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\ime\chsime\applets\applets

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\ime\CHTIME\Applets\Applets

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\ime\imejp\applets\applets

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\ime\imejp98\imejp98

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\ime\imjp8_1\applets\applets

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\ime\imkr6_1\applets\applets

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\ime\imkr6_1\dicts\dicts

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\ime\shared\res\res

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\Installer\$PatchCache$\Managed\D7314F9862C648A4DB8BE2A5B47BE100\1.0.0\1.0.0

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\java\classes\classes

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\java\trustlib\trustlib

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\msapps\msinfo\msinfo

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\mui\mui

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\pchealth\ERRORREP\QHEADLES\QHEADLES

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\pchealth\ERRORREP\QSIGNOFF\QSIGNOFF

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\pchealth\ERRORREP\UserDumps\UserDumps

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\pchealth\helpctr\BATCH\BATCH

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\pchealth\helpctr\Config\CheckPoint\CheckPoint

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\pchealth\helpctr\HelpFiles\HelpFiles

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\pchealth\helpctr\InstalledSKUs\InstalledSKUs

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\pchealth\helpctr\System\DFS\DFS

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\pchealth\helpctr\System\News\News

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\pchealth\helpctr\System_OEM\System_OEM

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\pchealth\helpctr\Temp\Temp

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\Registration\CRMLog\CRMLog

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\SoftwareDistribution\Download\Download

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\SoftwareDistribution\EventCache\EventCache

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\SoftwareDistribution\SelfUpdate\SelfUpdate

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\Sun\Java\Deployment\Deployment

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\system32\1025\1025

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\system32\1028\1028

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\system32\1031\1031

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\system32\1037\1037

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\system32\1041\1041

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\system32\1042\1042

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\system32\1054\1054

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\system32\2052\2052

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\system32\3076\3076

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\system32\3com_dmi\3com_dmi

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\system32\Adobe\update\update

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\system32\config\systemprofile\Application Data\Microsoft\Media Player\Media Player

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\system32\config\systemprofile\Application Data\Microsoft\SystemCertificates\My\Certificates\Certificates

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\system32\config\systemprofile\Application Data\Microsoft\SystemCertificates\My\CRLs\CRLs

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\system32\config\systemprofile\Application Data\Microsoft\SystemCertificates\My\CTLs\CTLs

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\system32\config\systemprofile\Desktop\Desktop

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\system32\config\systemprofile\Favorites\Favorites

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\system32\config\systemprofile\Local Settings\Temp\Temp

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\system32\config\systemprofile\My Documents\My Documents

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\system32\config\systemprofile\NetHood\NetHood

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\system32\config\systemprofile\PrintHood\PrintHood

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\system32\config\systemprofile\Recent\Recent

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\system32\dhcp\dhcp

Mount point destination : \Device\__max++>\^

Cannot access: C:\WINDOWS\system32\drivers\af0b032a.sys

[1] 2009-08-30 14:15:41 92800 C:\WINDOWS\system32\drivers\af0b032a.sys ()

Found mount point : C:\WINDOWS\system32\drivers\disdn\disdn

Mount point destination : \Device\__max++>\^

Cannot access: C:\WINDOWS\system32\dumprep.exe

[1] 2004-08-04 00:56:50 10752 C:\WINDOWS\system32\dllcache\dumprep.exe (Microsoft Corporation)

[1] 2004-08-04 00:56:50 10752 C:\WINDOWS\system32\dumprep.exe ()

Cannot access: C:\WINDOWS\system32\eventlog.dll

[1] 2004-08-04 00:56:44 55808 C:\WINDOWS\system32\dllcache\eventlog.dll (Microsoft Corporation)

[1] 2004-08-04 00:56:44 62976 C:\WINDOWS\system32\eventlog.dll ()

[2] 2004-08-04 00:56:44 55808 C:\WINDOWS\system32\logevent.dll (Microsoft Corporation)

Found mount point : C:\WINDOWS\system32\export\export

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\system32\IME\CINTLGNT\CINTLGNT

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\system32\IME\PINTLGNT\PINTLGNT

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\system32\IME\TINTLGNT\TINTLGNT

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\system32\inetsrv\inetsrv

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\system32\LogFiles\WUDF\WUDF

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\system32\mui\dispspec\dispspec

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\system32\oobe\html\ispsgnup\ispsgnup

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\system32\oobe\html\oemcust\oemcust

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\system32\oobe\html\oemhw\oemhw

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\system32\oobe\html\oemreg\oemreg

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\system32\oobe\sample\sample

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\system32\ShellExt\ShellExt

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\system32\spool\PRINTERS\PRINTERS

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\system32\wbem\mof\bad\bad

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\system32\wbem\mof\good\good

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\system32\wbem\snmp\snmp

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\system32\wins\wins

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\system32\xircom\xircom

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\Temp\Temp

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\WinSxS\InstallTemp\InstallTemp

Mount point destination : \Device\__max++>\^

Finished!

Thank you

Link to post
Share on other sites

Hi, itidakimas :angry:

Welcome.

Please follow these steps:

Step 1

Open a command prompt. (Start->Run, type CMD and click OK) At the prompt copy and paste the following and press Enter after each line:

Copy C:\WINDOWS\system32\dllcache\dumprep.exe C:\

Copy C:\WINDOWS\system32\dllcache\eventlog.dll C:\

Exit

Step 2

Click on Start->Run, copy and paste the following command into the "Run" box (including the quotation marks), and click OK. When it's finished, there will be a log called Win32kDiag.txt on your desktop. Please open it with notepad and post the contents here in your next reply.

"%userprofile%\desktop\win32kdiag.exe" -f -r

Step 3

1. Please download The Avenger by Swandog46 to your Desktop.

  • Right click on the Avenger.zip folder and select "Extract All..."
  • Follow the prompts and extract the avenger folder to your desktop

2. Copy all the text contained in the code box below to your Clipboard by highlighting it and pressing (Ctrl+C):

Begin copying here:
Files to move:
C:\eventlog.dll | C:\WINDOWS\system32\eventlog.dll
C:\dumprep.exe | C:\WINDOWS\system32\dumprep.exe

Note: the above code was created specifically for this user. If you are not this user, do NOT follow these directions as they could damage the workings of your system.

3. Now, open the avenger folder and start The Avenger program by clicking on its icon.

  • Right click on the window under Input script here:, and select Paste.
  • You can also click on this window and press (Ctrl+V) to paste the contents of the clipboard.
  • Click on Execute
  • Answer "Yes" twice when prompted.

4. The Avenger will automatically do the following:

[*]It will Restart your computer. ( In cases where the code to execute contains "Drivers to Delete", The Avenger will actually restart your system twice.)

[*]On reboot, it will briefly open a black command window on your desktop, this is normal.

[*]After the restart, it creates a log file that should open with the results of Avenger

Link to post
Share on other sites

JSntgRvr,- Thanks A Lot!!!--

I have done basically everything you told me to do and hopefully I have done them right!!!

Here are the reports.

Log file is located at: C:\Documents and Settings\Bijay\Desktop\Win32kDiag.txt

Removing all found mount points.

Attempting to reset file permissions.

WARNING: Could not get backup privileges!

Searching 'C:\WINDOWS'...

Found mount point : C:\WINDOWS\addins\addins

Mount point destination : \Device\__max++>\^

Removing mount point : C:\WINDOWS\addins\addins

Found mount point : C:\WINDOWS\Config\Config

Mount point destination : \Device\__max++>\^

Removing mount point : C:\WINDOWS\Config\Config

Found mount point : C:\WINDOWS\Connection Wizard\Connection Wizard

Mount point destination : \Device\__max++>\^

Removing mount point : C:\WINDOWS\Connection Wizard\Connection Wizard

Found mount point : C:\WINDOWS\Debug\UserMode\UserMode

Mount point destination : \Device\__max++>\^

Removing mount point : C:\WINDOWS\Debug\UserMode\UserMode

Found mount point : C:\WINDOWS\ftpcache\ftpcache

Mount point destination : \Device\__max++>\^

Removing mount point : C:\WINDOWS\ftpcache\ftpcache

Found mount point : C:\WINDOWS\ime\chsime\applets\applets

Mount point destination : \Device\__max++>\^

Removing mount point : C:\WINDOWS\ime\chsime\applets\applets

Found mount point : C:\WINDOWS\ime\CHTIME\Applets\Applets

Mount point destination : \Device\__max++>\^

Removing mount point : C:\WINDOWS\ime\CHTIME\Applets\Applets

Found mount point : C:\WINDOWS\ime\imejp\applets\applets

Mount point destination : \Device\__max++>\^

Removing mount point : C:\WINDOWS\ime\imejp\applets\applets

Found mount point : C:\WINDOWS\ime\imejp98\imejp98

Mount point destination : \Device\__max++>\^

Removing mount point : C:\WINDOWS\ime\imejp98\imejp98

Found mount point : C:\WINDOWS\ime\imjp8_1\applets\applets

Mount point destination : \Device\__max++>\^

Removing mount point : C:\WINDOWS\ime\imjp8_1\applets\applets

Found mount point : C:\WINDOWS\ime\imkr6_1\applets\applets

Mount point destination : \Device\__max++>\^

Removing mount point : C:\WINDOWS\ime\imkr6_1\applets\applets

Found mount point : C:\WINDOWS\ime\imkr6_1\dicts\dicts

Mount point destination : \Device\__max++>\^

Removing mount point : C:\WINDOWS\ime\imkr6_1\dicts\dicts

Found mount point : C:\WINDOWS\ime\shared\res\res

Mount point destination : \Device\__max++>\^

Removing mount point : C:\WINDOWS\ime\shared\res\res

Found mount point : C:\WINDOWS\Installer\$PatchCache$\Managed\D7314F9862C648A4DB8BE2A5B47BE100\1.0.0\1.0.0

Mount point destination : \Device\__max++>\^

Removing mount point : C:\WINDOWS\Installer\$PatchCache$\Managed\D7314F9862C648A4DB8BE2A5B47BE100\1.0.0\1.0.0

Found mount point : C:\WINDOWS\java\classes\classes

Mount point destination : \Device\__max++>\^

Removing mount point : C:\WINDOWS\java\classes\classes

Found mount point : C:\WINDOWS\java\trustlib\trustlib

Mount point destination : \Device\__max++>\^

Removing mount point : C:\WINDOWS\java\trustlib\trustlib

Found mount point : C:\WINDOWS\msapps\msinfo\msinfo

Mount point destination : \Device\__max++>\^

Removing mount point : C:\WINDOWS\msapps\msinfo\msinfo

Found mount point : C:\WINDOWS\mui\mui

Mount point destination : \Device\__max++>\^

Removing mount point : C:\WINDOWS\mui\mui

Found mount point : C:\WINDOWS\pchealth\ERRORREP\QHEADLES\QHEADLES

Mount point destination : \Device\__max++>\^

Removing mount point : C:\WINDOWS\pchealth\ERRORREP\QHEADLES\QHEADLES

Found mount point : C:\WINDOWS\pchealth\ERRORREP\QSIGNOFF\QSIGNOFF

Mount point destination : \Device\__max++>\^

Removing mount point : C:\WINDOWS\pchealth\ERRORREP\QSIGNOFF\QSIGNOFF

Found mount point : C:\WINDOWS\pchealth\ERRORREP\UserDumps\UserDumps

Mount point destination : \Device\__max++>\^

Removing mount point : C:\WINDOWS\pchealth\ERRORREP\UserDumps\UserDumps

Found mount point : C:\WINDOWS\pchealth\helpctr\BATCH\BATCH

Mount point destination : \Device\__max++>\^

Removing mount point : C:\WINDOWS\pchealth\helpctr\BATCH\BATCH

Found mount point : C:\WINDOWS\pchealth\helpctr\Config\CheckPoint\CheckPoint

Mount point destination : \Device\__max++>\^

Removing mount point : C:\WINDOWS\pchealth\helpctr\Config\CheckPoint\CheckPoint

Found mount point : C:\WINDOWS\pchealth\helpctr\HelpFiles\HelpFiles

Mount point destination : \Device\__max++>\^

Removing mount point : C:\WINDOWS\pchealth\helpctr\HelpFiles\HelpFiles

Found mount point : C:\WINDOWS\pchealth\helpctr\InstalledSKUs\InstalledSKUs

Mount point destination : \Device\__max++>\^

Removing mount point : C:\WINDOWS\pchealth\helpctr\InstalledSKUs\InstalledSKUs

Found mount point : C:\WINDOWS\pchealth\helpctr\System\DFS\DFS

Mount point destination : \Device\__max++>\^

Removing mount point : C:\WINDOWS\pchealth\helpctr\System\DFS\DFS

Found mount point : C:\WINDOWS\pchealth\helpctr\System\News\News

Mount point destination : \Device\__max++>\^

Removing mount point : C:\WINDOWS\pchealth\helpctr\System\News\News

Found mount point : C:\WINDOWS\pchealth\helpctr\System_OEM\System_OEM

Mount point destination : \Device\__max++>\^

Removing mount point : C:\WINDOWS\pchealth\helpctr\System_OEM\System_OEM

Found mount point : C:\WINDOWS\pchealth\helpctr\Temp\Temp

Mount point destination : \Device\__max++>\^

Removing mount point : C:\WINDOWS\pchealth\helpctr\Temp\Temp

Found mount point : C:\WINDOWS\Registration\CRMLog\CRMLog

Mount point destination : \Device\__max++>\^

Removing mount point : C:\WINDOWS\Registration\CRMLog\CRMLog

Found mount point : C:\WINDOWS\SoftwareDistribution\Download\Download

Mount point destination : \Device\__max++>\^

Removing mount point : C:\WINDOWS\SoftwareDistribution\Download\Download

Found mount point : C:\WINDOWS\SoftwareDistribution\EventCache\EventCache

Mount point destination : \Device\__max++>\^

Removing mount point : C:\WINDOWS\SoftwareDistribution\EventCache\EventCache

Found mount point : C:\WINDOWS\SoftwareDistribution\SelfUpdate\SelfUpdate

Mount point destination : \Device\__max++>\^

Removing mount point : C:\WINDOWS\SoftwareDistribution\SelfUpdate\SelfUpdate

Found mount point : C:\WINDOWS\Sun\Java\Deployment\Deployment

Mount point destination : \Device\__max++>\^

Removing mount point : C:\WINDOWS\Sun\Java\Deployment\Deployment

Found mount point : C:\WINDOWS\system32\1025\1025

Mount point destination : \Device\__max++>\^

Removing mount point : C:\WINDOWS\system32\1025\1025

Found mount point : C:\WINDOWS\system32\1028\1028

Mount point destination : \Device\__max++>\^

Removing mount point : C:\WINDOWS\system32\1028\1028

Found mount point : C:\WINDOWS\system32\1031\1031

Mount point destination : \Device\__max++>\^

Removing mount point : C:\WINDOWS\system32\1031\1031

Found mount point : C:\WINDOWS\system32\1037\1037

Mount point destination : \Device\__max++>\^

Removing mount point : C:\WINDOWS\system32\1037\1037

Found mount point : C:\WINDOWS\system32\1041\1041

Mount point destination : \Device\__max++>\^

Removing mount point : C:\WINDOWS\system32\1041\1041

Found mount point : C:\WINDOWS\system32\1042\1042

Mount point destination : \Device\__max++>\^

Removing mount point : C:\WINDOWS\system32\1042\1042

Found mount point : C:\WINDOWS\system32\1054\1054

Mount point destination : \Device\__max++>\^

Removing mount point : C:\WINDOWS\system32\1054\1054

Found mount point : C:\WINDOWS\system32\2052\2052

Mount point destination : \Device\__max++>\^

Removing mount point : C:\WINDOWS\system32\2052\2052

Found mount point : C:\WINDOWS\system32\3076\3076

Mount point destination : \Device\__max++>\^

Removing mount point : C:\WINDOWS\system32\3076\3076

Found mount point : C:\WINDOWS\system32\3com_dmi\3com_dmi

Mount point destination : \Device\__max++>\^

Removing mount point : C:\WINDOWS\system32\3com_dmi\3com_dmi

Found mount point : C:\WINDOWS\system32\Adobe\update\update

Mount point destination : \Device\__max++>\^

Removing mount point : C:\WINDOWS\system32\Adobe\update\update

Found mount point : C:\WINDOWS\system32\config\systemprofile\Application Data\Microsoft\Media Player\Media Player

Mount point destination : \Device\__max++>\^

Removing mount point : C:\WINDOWS\system32\config\systemprofile\Application Data\Microsoft\Media Player\Media Player

Found mount point : C:\WINDOWS\system32\config\systemprofile\Application Data\Microsoft\SystemCertificates\My\Certificates\Certificates

Mount point destination : \Device\__max++>\^

Removing mount point : C:\WINDOWS\system32\config\systemprofile\Application Data\Microsoft\SystemCertificates\My\Certificates\Certificates

Found mount point : C:\WINDOWS\system32\config\systemprofile\Application Data\Microsoft\SystemCertificates\My\CRLs\CRLs

Mount point destination : \Device\__max++>\^

Removing mount point : C:\WINDOWS\system32\config\systemprofile\Application Data\Microsoft\SystemCertificates\My\CRLs\CRLs

Found mount point : C:\WINDOWS\system32\config\systemprofile\Application Data\Microsoft\SystemCertificates\My\CTLs\CTLs

Mount point destination : \Device\__max++>\^

Removing mount point : C:\WINDOWS\system32\config\systemprofile\Application Data\Microsoft\SystemCertificates\My\CTLs\CTLs

Found mount point : C:\WINDOWS\system32\config\systemprofile\Desktop\Desktop

Mount point destination : \Device\__max++>\^

Removing mount point : C:\WINDOWS\system32\config\systemprofile\Desktop\Desktop

Found mount point : C:\WINDOWS\system32\config\systemprofile\Favorites\Favorites

Mount point destination : \Device\__max++>\^

Removing mount point : C:\WINDOWS\system32\config\systemprofile\Favorites\Favorites

Found mount point : C:\WINDOWS\system32\config\systemprofile\Local Settings\Temp\Temp

Mount point destination : \Device\__max++>\^

Removing mount point : C:\WINDOWS\system32\config\systemprofile\Local Settings\Temp\Temp

Found mount point : C:\WINDOWS\system32\config\systemprofile\My Documents\My Documents

Mount point destination : \Device\__max++>\^

Removing mount point : C:\WINDOWS\system32\config\systemprofile\My Documents\My Documents

Found mount point : C:\WINDOWS\system32\config\systemprofile\NetHood\NetHood

Mount point destination : \Device\__max++>\^

Removing mount point : C:\WINDOWS\system32\config\systemprofile\NetHood\NetHood

Found mount point : C:\WINDOWS\system32\config\systemprofile\PrintHood\PrintHood

Mount point destination : \Device\__max++>\^

Removing mount point : C:\WINDOWS\system32\config\systemprofile\PrintHood\PrintHood

Found mount point : C:\WINDOWS\system32\config\systemprofile\Recent\Recent

Mount point destination : \Device\__max++>\^

Removing mount point : C:\WINDOWS\system32\config\systemprofile\Recent\Recent

Found mount point : C:\WINDOWS\system32\dhcp\dhcp

Mount point destination : \Device\__max++>\^

Removing mount point : C:\WINDOWS\system32\dhcp\dhcp

Cannot access: C:\WINDOWS\system32\drivers\af0b032a.sys

Attempting to restore permissions of : C:\WINDOWS\system32\drivers\af0b032a.sys

[1] 2009-08-30 19:57:08 92800 C:\WINDOWS\system32\drivers\af0b032a.sys ()

Found mount point : C:\WINDOWS\system32\drivers\disdn\disdn

Mount point destination : \Device\__max++>\^

Removing mount point : C:\WINDOWS\system32\drivers\disdn\disdn

Cannot access: C:\WINDOWS\system32\dumprep.exe

Attempting to restore permissions of : C:\WINDOWS\system32\dumprep.exe

[1] 2004-08-04 00:56:50 10752 C:\WINDOWS\system32\dllcache\dumprep.exe (Microsoft Corporation)

[1] 2004-08-04 00:56:50 10752 C:\WINDOWS\system32\dumprep.exe (Microsoft Corporation)

Cannot access: C:\WINDOWS\system32\eventlog.dll

Attempting to restore permissions of : C:\WINDOWS\system32\eventlog.dll

[1] 2004-08-04 00:56:44 55808 C:\WINDOWS\system32\dllcache\eventlog.dll (Microsoft Corporation)

[1] 2004-08-04 00:56:44 62976 C:\WINDOWS\system32\eventlog.dll ()

[2] 2004-08-04 00:56:44 55808 C:\WINDOWS\system32\logevent.dll (Microsoft Corporation)

Found mount point : C:\WINDOWS\system32\export\export

Mount point destination : \Device\__max++>\^

Removing mount point : C:\WINDOWS\system32\export\export

Found mount point : C:\WINDOWS\system32\IME\CINTLGNT\CINTLGNT

Mount point destination : \Device\__max++>\^

Removing mount point : C:\WINDOWS\system32\IME\CINTLGNT\CINTLGNT

Found mount point : C:\WINDOWS\system32\IME\PINTLGNT\PINTLGNT

Mount point destination : \Device\__max++>\^

Removing mount point : C:\WINDOWS\system32\IME\PINTLGNT\PINTLGNT

Found mount point : C:\WINDOWS\system32\IME\TINTLGNT\TINTLGNT

Mount point destination : \Device\__max++>\^

Removing mount point : C:\WINDOWS\system32\IME\TINTLGNT\TINTLGNT

Found mount point : C:\WINDOWS\system32\inetsrv\inetsrv

Mount point destination : \Device\__max++>\^

Removing mount point : C:\WINDOWS\system32\inetsrv\inetsrv

Found mount point : C:\WINDOWS\system32\LogFiles\WUDF\WUDF

Mount point destination : \Device\__max++>\^

Removing mount point : C:\WINDOWS\system32\LogFiles\WUDF\WUDF

Found mount point : C:\WINDOWS\system32\mui\dispspec\dispspec

Mount point destination : \Device\__max++>\^

Removing mount point : C:\WINDOWS\system32\mui\dispspec\dispspec

Found mount point : C:\WINDOWS\system32\oobe\html\ispsgnup\ispsgnup

Mount point destination : \Device\__max++>\^

Removing mount point : C:\WINDOWS\system32\oobe\html\ispsgnup\ispsgnup

Found mount point : C:\WINDOWS\system32\oobe\html\oemcust\oemcust

Mount point destination : \Device\__max++>\^

Removing mount point : C:\WINDOWS\system32\oobe\html\oemcust\oemcust

Found mount point : C:\WINDOWS\system32\oobe\html\oemhw\oemhw

Mount point destination : \Device\__max++>\^

Removing mount point : C:\WINDOWS\system32\oobe\html\oemhw\oemhw

Found mount point : C:\WINDOWS\system32\oobe\html\oemreg\oemreg

Mount point destination : \Device\__max++>\^

Removing mount point : C:\WINDOWS\system32\oobe\html\oemreg\oemreg

Found mount point : C:\WINDOWS\system32\oobe\sample\sample

Mount point destination : \Device\__max++>\^

Removing mount point : C:\WINDOWS\system32\oobe\sample\sample

Found mount point : C:\WINDOWS\system32\ShellExt\ShellExt

Mount point destination : \Device\__max++>\^

Removing mount point : C:\WINDOWS\system32\ShellExt\ShellExt

Found mount point : C:\WINDOWS\system32\spool\PRINTERS\PRINTERS

Mount point destination : \Device\__max++>\^

Removing mount point : C:\WINDOWS\system32\spool\PRINTERS\PRINTERS

Found mount point : C:\WINDOWS\system32\wbem\mof\bad\bad

Mount point destination : \Device\__max++>\^

Removing mount point : C:\WINDOWS\system32\wbem\mof\bad\bad

Found mount point : C:\WINDOWS\system32\wbem\mof\good\good

Mount point destination : \Device\__max++>\^

Removing mount point : C:\WINDOWS\system32\wbem\mof\good\good

Found mount point : C:\WINDOWS\system32\wbem\snmp\snmp

Mount point destination : \Device\__max++>\^

Removing mount point : C:\WINDOWS\system32\wbem\snmp\snmp

Found mount point : C:\WINDOWS\system32\wins\wins

Mount point destination : \Device\__max++>\^

Removing mount point : C:\WINDOWS\system32\wins\wins

Found mount point : C:\WINDOWS\system32\xircom\xircom

Mount point destination : \Device\__max++>\^

Removing mount point : C:\WINDOWS\system32\xircom\xircom

Found mount point : C:\WINDOWS\Temp\Temp

Mount point destination : \Device\__max++>\^

Removing mount point : C:\WINDOWS\Temp\Temp

Found mount point : C:\WINDOWS\WinSxS\InstallTemp\InstallTemp

Mount point destination : \Device\__max++>\^

Removing mount point : C:\WINDOWS\WinSxS\InstallTemp\InstallTemp

Finished!

Link to post
Share on other sites

Heres the Second Report :)

Logfile of The Avenger Version 2.0, © by Swandog46

http://swandog46.geekstogo.com

Platform: Windows XP

*******************

Script file opened successfully.

Script file read successfully.

Backups directory opened successfully at C:\Avenger

*******************

Beginning to process script file:

Rootkit scan active.

No rootkits found!

File move operation "C:\eventlog.dll|C:\WINDOWS\system32\eventlog.dll" completed successfully.

File move operation "C:\dumprep.exe|C:\WINDOWS\system32\dumprep.exe" completed successfully.

Completed script processing.

*******************

Finished! Terminate.

Logfile of The Avenger Version 2.0, © by Swandog46

http://swandog46.geekstogo.com

Platform: Windows XP

*******************

Error: Script file not found!

Could not open script file! Status: 0xc0000034 (STATUS_OBJECT_NAME_NOT_FOUND)

--> the object does not exist

Abort!

Link to post
Share on other sites

Heres the 3rd Log :)

Malwarebytes' Anti-Malware 1.40

Database version: 2719

Windows 5.1.2600 Service Pack 2

30/08/2009 20:42:20

mbam-log-2009-08-30 (20-42-20).txt

Scan type: Quick Scan

Objects scanned: 90802

Time elapsed: 10 minute(s), 51 second(s)

Memory Processes Infected: 1

Memory Modules Infected: 1

Registry Keys Infected: 35

Registry Values Infected: 3

Registry Data Items Infected: 3

Folders Infected: 0

Files Infected: 19

Memory Processes Infected:

C:\Documents and Settings\Bijay\Local Settings\Temp\a.exe (Trojan.FakeAlert) -> Unloaded process successfully.

Memory Modules Infected:

C:\WINDOWS\system32\pmnNDWNF.dll (Trojan.Vundo) -> Delete on reboot.

Registry Keys Infected:

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{f53bafe5-ce7a-4e95-95ac-a3912efd3739} (Trojan.Vundo.H) -> Delete on reboot.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\pmnndwnf (Trojan.Vundo.H) -> Delete on reboot.

HKEY_CLASSES_ROOT\CLSID\{f53bafe5-ce7a-4e95-95ac-a3912efd3739} (Trojan.Vundo.H) -> Delete on reboot.

HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{f53bafe5-ce7a-4e95-95ac-a3912efd3739} (Trojan.Vundo) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\Interface\{2e9937fc-cf2f-4f56-af54-5a6a3dd375cc} (Adware.MyWebSearch) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\Interface\{741de825-a6f0-4497-9aa6-8023cf9b0fff} (Adware.MyWebSearch) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\Interface\{cf54be1c-9359-4395-8533-1657cf209cfe} (Adware.MyWebSearch) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\CLSID\{147a976f-eee1-4377-8ea7-4716e4cdd239} (Adware.MyWebSearch) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\CLSID\{a4730ebe-43a6-443e-9776-36915d323ad3} (Adware.MyWebSearch) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\Typelib\{d518921a-4a03-425e-9873-b9a71756821e} (Adware.MyWebSearch) -> Quarantined and deleted successfully.

HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{56256a51-b582-467e-b8d4-7786eda79ae0} (Trojan.Vundo) -> Quarantined and deleted successfully.

HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{00a6faf1-072e-44cf-8957-5838f569a31d} (Adware.MyWebSearch) -> Quarantined and deleted successfully.

HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{07b18ea1-a523-4961-b6bb-170de4475cca} (Adware.MyWebSearch) -> Quarantined and deleted successfully.

HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{07b18ea9-a523-4961-b6bb-170de4475cca} (Adware.MyWebSearch) -> Quarantined and deleted successfully.

HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{07b18eab-a523-4961-b6bb-170de4475cca} (Adware.MyWebSearch) -> Quarantined and deleted successfully.

HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{1d4db7d2-6ec9-47a3-bd87-1e41684e07bb} (Adware.MyWebSearch) -> Quarantined and deleted successfully.

HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{3dc201fb-e9c9-499c-a11f-23c360d7c3f8} (Adware.MyWebSearch) -> Quarantined and deleted successfully.

HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{9ff05104-b030-46fc-94b8-81276e4e27df} (Adware.MyWebSearch) -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Code Store Database\Distribution Units\{1d4db7d2-6ec9-47a3-bd87-1e41684e07bb} (Adware.MyWebSearch) -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{59c7fc09-1c83-4648-b3e6-003d2bbc7481} (Adware.MyWebSearch) -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{68af847f-6e91-45dd-9b68-d6a12c30e5d7} (Adware.MyWebSearch) -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{9170b96c-28d4-4626-8358-27e6caeef907} (Adware.MyWebSearch) -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{d1a71fa0-ff48-48dd-9b6d-7a13a3e42127} (Adware.MyWebSearch) -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{ddb1968e-ead6-40fd-8dae-ff14757f60c7} (Adware.MyWebSearch) -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{f138d901-86f0-4383-99b6-9cdd406036da} (Adware.MyWebSearch) -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{56256a51-b582-467e-b8d4-7786eda79ae0} (Trojan.Vundo) -> Quarantined and deleted successfully.

HKEY_CURRENT_USER\SOFTWARE\Monopod (Trojan.FakeAlert) -> Quarantined and deleted successfully.

HKEY_CURRENT_USER\SOFTWARE\MyWebSearch (Adware.MyWebSearch) -> Quarantined and deleted successfully.

HKEY_CURRENT_USER\SOFTWARE\NordBull (Malware.Trace) -> Quarantined and deleted successfully.

HKEY_CURRENT_USER\SOFTWARE\XML (Trojan.FakeAlert) -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SOFTWARE\Fun Web Products (Adware.MyWebSearch) -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SOFTWARE\FunWebProducts (Adware.MyWebSearch) -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\RunDll32Policy\f3ScrCtr.dll (Adware.MyWay) -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Multimedia\WMPlayer\Schemes\f3pss (Adware.MyWebSearch) -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SOFTWARE\MyWebSearch (Adware.MyWebSearch) -> Quarantined and deleted successfully.

Registry Values Infected:

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ShellExecuteHooks\{f53bafe5-ce7a-4e95-95ac-a3912efd3739} (Trojan.Vundo) -> Delete on reboot.

HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Monopod (Trojan.FakeAlert) -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dvinizufazemizu (Trojan.Agent) -> Delete on reboot.

Registry Data Items Infected:

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\LSA\Notification Packages (Trojan.Vundo.H) -> Data: wmerol.dll -> Delete on reboot.

HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\wuauserv\ImagePath (Hijack.WindowsUpdates) -> Bad: (%fystemroot%\system32\svchost.exe -k netsvcs) Good: (%SystemRoot%\System32\svchost.exe -k netsvcs) -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\BITS\ImagePath (Hijack.WindowsUpdates) -> Bad: (%fystemRoot%\system32\svchost.exe -k netsvcs) Good: (%SystemRoot%\System32\svchost.exe -k netsvcs) -> Quarantined and deleted successfully.

Folders Infected:

(No malicious items detected)

Files Infected:

C:\WINDOWS\system32\pmnNDWNF.dll (Trojan.Vundo.H) -> Delete on reboot.

C:\WINDOWS\wmerol.dll (Trojan.Vundo.H) -> Delete on reboot.

C:\Documents and Settings\Bijay\Local Settings\Temp\a.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\urqoOIYP(2).dll (Trojan.Vundo) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\rqRLebBs(2).dll (Trojan.Vundo) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\tuvSmjIb(2).dll (Trojan.Vundo) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\jkkJButR.dll (Trojan.Vundo) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\gxvxcrsfqjroiehqyxispwmtamhkgqongxcss.dll (Trojan.Agent) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\wvUmmJcc(2).dll (Trojan.Vundo) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\yayyYQIA(2).dll (Trojan.Vundo) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\vtUnlKDT(2).dll (Trojan.Vundo) -> Quarantined and deleted successfully.

C:\Documents and Settings\Bijay\Application Data\wiaserva.log (Malware.Trace) -> Quarantined and deleted successfully.

C:\Documents and Settings\Bijay\Start Menu\Programs\Startup\rncsys32.exe (Trojan.Agent) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\~.exe (Backdoor.Bot) -> Quarantined and deleted successfully.

C:\WINDOWS\Tasks\{5B57CF47-0BFA-43c6-ACF9-3B3653DCADBA}.job (Trojan.FakeAlert) -> Quarantined and deleted successfully.

C:\WINDOWS\Tasks\{BB65B0FB-5712-401b-B616-E69AC55E2757}.job (Trojan.Downloader) -> Quarantined and deleted successfully.

C:\WINDOWS\idaqizevaxikufik.dll (Trojan.Agent) -> Delete on reboot.

C:\WINDOWS\system32\gxvxcpuxxfowprcvnmauypivoavsrgsxlxbny.dll (Trojan.Agent) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\drivers\gxvxcwfoepxuejbxdpkpmibfalnbeecbrqyta.sys (Trojan.Agent) -> Quarantined and deleted successfully.

Link to post
Share on other sites

Heres the Last and Final Log Report :)

ComboFix 09-08-30.01 - Bijay 30/08/2009 20:55.1.1 - NTFSx86

Microsoft Windows XP Home Edition 5.1.2600.2.1252.1.1033.18.191.84 [GMT 1:00]

Running from: c:\documents and settings\Bijay\Desktop\Combo-Fix.exe

.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))

.

c:\documents and settings\Administrator\Local Settings\Application Data\{830A155E-60DE-4088-86CA-7556C4876BB5}

c:\documents and settings\Administrator\Local Settings\Application Data\{830A155E-60DE-4088-86CA-7556C4876BB5}\chrome.manifest

c:\documents and settings\Administrator\Local Settings\Application Data\{830A155E-60DE-4088-86CA-7556C4876BB5}\chrome\content\_cfg.js

c:\documents and settings\Administrator\Local Settings\Application Data\{830A155E-60DE-4088-86CA-7556C4876BB5}\chrome\content\overlay.xul

c:\documents and settings\Administrator\Local Settings\Application Data\{830A155E-60DE-4088-86CA-7556C4876BB5}\install.rdf

c:\windows\autorun.inf

c:\windows\emaburuy.dll

c:\windows\evamakulad.dll

c:\windows\Installer\4acdf6.msi

c:\windows\iticoxewugo.dll

c:\windows\izuzuzifowa.dll

c:\windows\system32\drivers\af0b032a.sys

c:\windows\system32\gxvxccount

c:\windows\twain_16.dll

c:\windows\ujukalegetekola.dll

c:\windows\uniwidumuhifopa.dll

c:\windows\uruxewugona.dll

c:\windows\usalezelag.dll

D:\autorun.inf

.

((((((((((((((((((((((((((((((((((((((( Drivers/Services )))))))))))))))))))))))))))))))))))))))))))))))))

.

-------\Legacy_{79007602-0cdb-4405-9dbf-1257bb3226ed}

-------\Legacy_{79007602-0cdb-4405-9dbf-1257bb3226ee}

-------\Service_af0b032a

((((((((((((((((((((((((( Files Created from 2009-07-28 to 2009-08-30 )))))))))))))))))))))))))))))))

.

2009-08-30 12:47 . 2009-08-30 12:47 -------- d-----w- c:\program files\Trend Micro

2009-08-30 12:31 . 2009-08-03 12:36 38160 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys

2009-08-30 12:30 . 2009-08-30 19:15 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware

2009-08-30 12:30 . 2009-08-03 12:36 19096 ----a-w- c:\windows\system32\drivers\mbam.sys

2009-08-30 06:31 . 2009-08-30 17:08 120 ----a-w- c:\windows\Udoxeqo.dat

2009-08-29 22:03 . 2009-08-29 22:03 -------- d-----w- c:\documents and settings\Bijay\Application Data\Malwarebytes

2009-08-29 22:02 . 2009-08-29 22:02 -------- d-----w- c:\documents and settings\All Users\Application Data\Malwarebytes

2009-08-29 20:48 . 2009-08-29 20:48 -------- d-----w- c:\documents and settings\Bijay\Local Settings\Application Data\{575D8F52-A73C-497A-B343-6FE5FCA2AB50}

2009-08-29 15:37 . 2009-08-29 15:37 64 ----a-w- c:\documents and settings\Bijay\Application Data\Mozilla\Firefox\Profiles\457ac5wk.default\extensions\dvscontextmenuy@dvdvideosoft.com

2009-08-28 10:56 . 2009-08-28 10:56 -------- d-----w- c:\program files\Burn4Free Toolbar

2009-08-28 10:56 . 2009-08-28 10:56 -------- d-----w- c:\program files\UNO - Undercover

2009-08-19 21:10 . 2004-08-03 22:08 31616 -c--a-w- c:\windows\system32\dllcache\usbccgp.sys

2009-08-19 21:10 . 2004-08-03 22:08 31616 ----a-w- c:\windows\system32\drivers\usbccgp.sys

2009-08-19 21:08 . 2009-08-19 21:08 -------- d-----w- c:\documents and settings\All Users\Application Data\BVRP Software

2009-08-19 21:08 . 2009-08-19 21:08 -------- d-----w- c:\documents and settings\Bijay\Local Settings\Application Data\Sony Ericsson

2009-08-19 21:07 . 2008-01-09 10:28 27632 ----a-w- c:\windows\system32\drivers\seehcri.sys

2009-08-19 21:07 . 2003-03-31 12:00 4736 ----a-w- c:\windows\system32\drivers\usbd.sys

2009-08-19 21:07 . 2004-08-03 22:08 57600 ----a-w- c:\windows\system32\drivers\usbhub.sys

2009-08-19 21:02 . 2009-08-19 21:03 -------- d-----w- c:\windows\system32\drivers\UMDF

2009-08-19 21:02 . 2009-08-19 21:02 -------- d-----w- c:\windows\system32\LogFiles

2009-08-19 21:02 . 2006-09-16 00:05 23856 ----a-w- c:\windows\system32\spupdsvc.exe

2009-08-16 10:05 . 2009-08-16 10:05 -------- d-----w- c:\program files\VS Revo Group

2009-08-11 13:13 . 2009-08-11 13:13 -------- d-----w- c:\documents and settings\Bijay\Application Data\UNOUndercover

2009-08-11 13:12 . 2009-08-11 13:12 -------- d-----w- c:\documents and settings\Bijay\Application Data\SpinTop

2009-08-10 20:32 . 2009-08-20 17:36 -------- d-----w- c:\program files\Call of Duty

2009-08-10 20:24 . 2009-08-10 20:24 -------- d-----w- c:\documents and settings\NetworkService\Application Data\Xfire

2009-08-07 14:38 . 2009-08-27 17:25 -------- d-----w- c:\documents and settings\Bijay\Application Data\dvdcss

.

(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))

.

2009-08-29 15:37 . 2009-05-17 09:35 -------- d-----w- c:\program files\Common Files\DVDVideoSoft

2009-08-29 11:13 . 2009-04-19 17:34 -------- d---a-w- c:\documents and settings\All Users\Application Data\TEMP

2009-08-29 10:39 . 2009-05-20 14:39 -------- d-----w- c:\documents and settings\Bijay\Application Data\MegauploadToolbar

2009-08-28 14:02 . 2009-04-19 20:36 -------- d-----w- c:\program files\CLE

2009-08-28 14:02 . 2009-04-26 08:36 -------- d-----w- c:\documents and settings\All Users\Application Data\EmailNotifier

2009-08-28 10:56 . 2009-05-14 18:12 -------- d-----w- c:\program files\Unity

2009-08-23 11:51 . 2009-04-27 08:13 -------- d-----w- c:\documents and settings\All Users\Application Data\Messenger Plus!

2009-08-16 10:04 . 2009-06-04 18:02 -------- d-----w- c:\program files\Opera 10 Beta

2009-08-10 20:39 . 2004-07-17 10:36 12528 ----a-w- c:\windows\system32\drivers\secdrv.sys

2009-08-07 09:11 . 2009-04-26 08:36 -------- d--h--w- c:\program files\InstallShield Installation Information

2009-08-01 12:33 . 2009-04-26 08:36 -------- d-----w- c:\documents and settings\All Users\Application Data\Megaupload

2009-07-22 10:06 . 2009-07-19 10:37 -------- d-----w- c:\program files\Nokia

2009-07-22 10:06 . 2009-07-19 10:37 -------- d-----w- c:\program files\PC Connectivity Solution

2009-07-22 10:06 . 2009-04-19 21:20 -------- d-----w- c:\program files\DIFX

2009-07-22 10:06 . 2009-07-19 10:39 -------- d-----w- c:\documents and settings\Bijay\Application Data\Nokia

2009-07-19 10:41 . 2009-07-19 10:39 -------- d-----w- c:\documents and settings\Bijay\Application Data\PC Suite

2009-07-19 10:40 . 2009-07-19 10:40 0 ---ha-w- c:\windows\system32\drivers\Msft_Kernel_ccdcmb_01007.Wdf

2009-07-19 10:40 . 2009-07-19 10:40 0 ---ha-w- c:\windows\system32\drivers\MsftWdf_Kernel_01007_Coinstaller_Critical.Wdf

2009-07-19 10:39 . 2009-07-19 10:39 -------- d-----w- c:\documents and settings\All Users\Application Data\PC Suite

2009-07-19 10:35 . 2009-07-19 10:35 -------- d-----w- c:\documents and settings\All Users\Application Data\Installations

2009-07-19 10:33 . 2009-07-19 10:33 -------- d-----w- c:\program files\Sony Ericsson

2009-07-19 10:33 . 2009-07-19 10:33 -------- d-----w- c:\documents and settings\All Users\Application Data\Sony Ericsson

2009-06-18 08:42 . 2009-04-18 22:58 3160 ----a-w- c:\windows\system32\d3d9caps.dat

2009-06-13 15:26 . 2009-06-13 15:26 107888 ----a-w- c:\windows\system32\CmdLineExt.dll

2009-06-11 05:37 . 2009-06-11 05:37 152576 ----a-w- c:\documents and settings\Bijay\Application Data\Sun\Java\jre1.6.0_14\lzma.dll

2009-05-01 21:02 . 2009-05-01 21:02 1044480 ----a-w- c:\program files\mozilla firefox\plugins\libdivx.dll

2009-05-01 21:02 . 2009-05-01 21:02 200704 ----a-w- c:\program files\mozilla firefox\plugins\ssldivx.dll

.

------- Sigcheck -------

[-] 2008-04-21 12:06 1580544 32272BF10467C8ACF1F83138C61D541E c:\windows\system32\sfcfiles.dll

.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))

.

.

*Note* empty entries & legit default entries are not shown

REGEDIT4

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]

"UserFaultCheck"="c:\windows\system32\dumprep 0 -u" [X]

"SiSPower"="SiSPower.dll" - c:\windows\system32\SiSPower.dll [2005-02-16 49152]

"SoundMan"="SOUNDMAN.EXE" - c:\windows\SOUNDMAN.EXE [2005-01-20 77824]

[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run]

"CTFMON.EXE"="c:\windows\system32\CTFMON.EXE" [2004-08-03 15360]

[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\RunOnce]

"nltide_2"="shell32" [X]

[HKLM\~\startupfolder\c:^documents and settings^bijay^start menu^programs^startup^rncsys32.exe]

path=c:\documents and settings\Bijay\Start Menu\Programs\Startup\rncsys32.exe

backup=c:\windows\pss\rncsys32.exeStartup

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]

"%windir%\\system32\\sessmgr.exe"=

"c:\\Program Files\\DNA\\btdna.exe"=

"c:\\Program Files\\BitTorrent\\bittorrent.exe"=

"c:\\Program Files\\Windows Live\\Messenger\\wlcsdk.exe"=

"c:\\Program Files\\Windows Live\\Messenger\\msnmsgr.exe"=

R2 omsi download service;Sony Ericsson OMSI download service;c:\program files\Sony Ericsson\Sony Ericsson PC Suite\SupServ.exe [19/08/2009 22:05 90112]

R3 seehcri;Sony Ericsson seehcri Device Driver;c:\windows\system32\drivers\seehcri.sys [19/08/2009 22:07 27632]

S0 ngrcqb;ngrcqb;c:\windows\system32\drivers\pukq.sys --> c:\windows\system32\drivers\pukq.sys [?]

.

Contents of the 'Scheduled Tasks' folder

2009-07-17 c:\windows\Tasks\GoogleUpdateTaskUserS-1-5-21-527237240-706699826-725345543-1004Core.job

- c:\documents and settings\Bijay\Local Settings\Application Data\Google\Update\GoogleUpdate.exe [2009-04-26 19:33]

2009-08-30 c:\windows\Tasks\GoogleUpdateTaskUserS-1-5-21-527237240-706699826-725345543-1004UA.job

- c:\documents and settings\Bijay\Local Settings\Application Data\Google\Update\GoogleUpdate.exe [2009-04-26 19:33]

.

- - - - ORPHANS REMOVED - - - -

BHO-{eb5cee80-030a-4ed8-8e20-454e9c68380f} - c:\program files\Bandoo\Plugins\IE\ieplugin.dll

WebBrowser-{4F11ACBB-393F-4C86-A214-FF3D0D155CC3} - (no file)

.

------- Supplementary Scan -------

.

uStart Page = hxxp://www.google.co.uk/

IE: Download Link Using Mega Manager... - c:\program files\Megaupload\Mega Manager\mm_file.htm

IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~2\OFFICE11\EXCEL.EXE/3000

IE: save youtube video as mp3 - c:\program files\Common Files\DVDVideoSoft\Dll\IEContextMenuY.dll/scriptY2MP3.htm

DPF: {8100d56a-5661-482c-bee8-afece305d968} - hxxp://upload.facebook.com/controls/2009.07.28_v5.5.8.1/FacebookPhotoUploader55.cab

FF - ProfilePath - c:\documents and settings\Bijay\Application Data\Mozilla\Firefox\Profiles\457ac5wk.default\

FF - prefs.js: browser.startup.homepage - hxxp://www.google.com/

FF - prefs.js: browser.search.selectedEngine - Web Search

FF - prefs.js: keyword.URL - hxxp://www.searchqu.com/web?src=ffb&q=

FF - plugin: c:\documents and settings\Bijay\Local Settings\Application Data\Google\Update\1.2.183.7\npGoogleOneClick8.dll

FF - plugin: c:\program files\Opera 10 Beta\program\plugins\npdsplay.dll

FF - plugin: c:\program files\Opera 10 Beta\program\plugins\npwmsdrm.dll

FF - plugin: c:\program files\Unity\WebPlayer\loader\npUnity3D32.dll

FF - HiddenExtension: XUL Cache: {575D8F52-A73C-497A-B343-6FE5FCA2AB50} - c:\documents and settings\Bijay\Local Settings\Application Data\{575D8F52-A73C-497A-B343-6FE5FCA2AB50}

.

**************************************************************************

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net

Rootkit scan 2009-08-30 21:03

Windows 5.1.2600 Service Pack 2 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully

hidden files: 0

**************************************************************************

.

--------------------- DLLs Loaded Under Running Processes ---------------------

- - - - - - - > 'explorer.exe'(1524)

c:\windows\system32\WPDShServiceObj.dll

c:\windows\system32\PortableDeviceTypes.dll

c:\windows\system32\PortableDeviceApi.dll

.

------------------------ Other Running Processes ------------------------

.

c:\program files\Java\jre6\bin\jqs.exe

c:\windows\system32\wscntfy.exe

.

**************************************************************************

.

Completion time: 2009-08-30 21:07 - machine was rebooted

ComboFix-quarantined-files.txt 2009-08-30 20:07

Pre-Run: 21,132,582,912 bytes free

Post-Run: 21,099,335,680 bytes free

WindowsXP-KB310994-SP2-Home-BootDisk-ENU.exe

[boot loader]

timeout=2

default=multi(0)disk(0)rdisk(0)partition(1)\WINDOWS

[operating systems]

c:\cmdcons\BOOTSECT.DAT="Microsoft Windows Recovery Console" /cmdcons

multi(0)disk(0)rdisk(0)partition(1)\WINDOWS="Microsoft Windows XP Home Edition" /noexecute=optin /fastdetect

Current=5 Default=5 Failed=4 LastKnownGood=6 Sets=3,4,5,6

183

Link to post
Share on other sites

Oh yh and After the First Rebbot I had my computer fail to turn on for like 4 times then when it finally turned on it said windows has recovered from a Serious Error---I was worried Sick- That I Messed up the PC but I followed on with your Instructions and It hasnt happened to me after- so i frgt to tell you Sorry :) Have I Messed up my pc??

Link to post
Share on other sites

Oh yeah I need a Antivirus Software- which doesnt slow down the computer so its back to being a slug again Please If you have any recomendations for Softwares needed to protect my computer Please Post Links oh yeah and a file scanner to scan files for threats before i open them... After Your ALL CLEAR is given is it okay to remove the files downloaded to the pc desktop?

Link to post
Share on other sites

Hi, itidakimas :)

Try AVAST as an antivirus.

  • Copy the entire contents of the Quote Box below to Notepad.
  • Name the file as CFScript.txt
  • Change the Save as Type to All Files
  • and Save it on the desktop

File::
c:\windows\Udoxeqo.dat
c:\documents and settings\Bijay\Start Menu\Programs\Startup\rncsys32.exe
c:\windows\pss\rncsys32.exeStartup
c:\windows\system32\drivers\pukq.sys

Driver::
ngrcqb

Registry::
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\RunOnce]
"nltide_2"=-

CFScriptB-4.gif

Once saved, referring to the picture above, drag CFScript.txt into ComboFix.exe, and post back the resulting report.

Lets scan for remnants:

Please do an online scan with Kaspersky WebScanner

Kaspersky online scanner uses JAVA tecnology to perform the scan. If you do not have the latest JAVA version, follow the instrutions below under Upgrading Java, to download and install the latest vesion.

  1. Read through the requirements and privacy statement and click on Accept button.
  2. It will start downloading and installing the scanner and virus definitions. You will be prompted to install an application from Kaspersky. Click Run.
  3. When the downloads have finished, click on Settings.
  4. Make sure the following is checked.
    • Spyware, Adware, Dialers, and other potentially dangerous programs
      Archives
      Mail databases

[*]Click on My Computer under Scan.

[*]Once the scan is complete, it will display the results. Click on View Scan Report.

[*]You will see a list of infected items there. Click on Save Report As....

[*]Save this report to a convenient place. Change the Files of type to Text file (.txt) before clicking on the Save button.

[*]Please post this log in your next reply.

Attention! Kaspersky Online Scanner 7.0 may fail to start if another anti-virus program is already installed and running on your computer. Please deactivate the anti-virus software installed on your computer prior to starting Kaspersky Online Scanner 7.0.

Upgrading Java:

  • Download the latest version of Java SE Runtime Environment (JRE)JRE 6 Update 15.
  • Click the "Download" button to the right.
  • Select your Platform and check the box that says: "I agree to the Java SE Runtime Environment 6 License Agreement.".
  • Click on Continue.
  • Click on the link to download Windows Offline Installation (jre-6u15-windows-i586.exe) and save it to your desktop. Do NOT use the Sun Download Manager..
  • Close any programs you may have running - especially your web browser.
  • Go to Start > Control Panel, double-click on Add/Remove programs and remove all older versions of Java.
  • Check any item with Java Runtime Environment (JRE or J2SE) in the name.
  • Click the Remove or Change/Remove button.
  • Repeat as many times as necessary to remove each Java version.
  • Reboot your computer once all Java components are removed.
  • Then from your desktop double-click on the download to install the newest version.(Vista users, right click on the jre-6u15-windows-i586.exe and select "Run as an Administrator.")

Link to post
Share on other sites

Heres the First Log that you asked for-:( sorry for the very late reply...The Scan took 4 hours to run and one of my family members slosed the application after it had finished/ I was out just for 5mins and that happened then the scan froze up on me at 72% so i had to do it all over again now here I am at about 1:30 in the morning sending you the logs.

Heres the First Log.

ComboFix 09-08-30.01 - Bijay 30/08/2009 23:18.2.1 - NTFSx86

Microsoft Windows XP Home Edition 5.1.2600.2.1252.1.1033.18.191.70 [GMT 1:00]

Running from: c:\documents and settings\Bijay\Desktop\Combo-Fix.exe

Command switches used :: c:\documents and settings\Bijay\Desktop\CFScript.txt

FILE ::

"c:\documents and settings\Bijay\Start Menu\Programs\Startup\rncsys32.exe"

"c:\windows\pss\rncsys32.exeStartup"

"c:\windows\system32\drivers\pukq.sys"

"c:\windows\Udoxeqo.dat"

.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))

.

c:\windows\pss\rncsys32.exeStartup

c:\windows\Udoxeqo.dat

.

((((((((((((((((((((((((((((((((((((((( Drivers/Services )))))))))))))))))))))))))))))))))))))))))))))))))

.

-------\Service_ngrcqb

((((((((((((((((((((((((( Files Created from 2009-07-28 to 2009-08-30 )))))))))))))))))))))))))))))))

.

2009-08-30 12:47 . 2009-08-30 12:47 -------- d-----w- c:\program files\Trend Micro

2009-08-30 12:31 . 2009-08-03 12:36 38160 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys

2009-08-30 12:30 . 2009-08-30 19:15 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware

2009-08-30 12:30 . 2009-08-03 12:36 19096 ----a-w- c:\windows\system32\drivers\mbam.sys

2009-08-29 22:03 . 2009-08-29 22:03 -------- d-----w- c:\documents and settings\Bijay\Application Data\Malwarebytes

2009-08-29 22:02 . 2009-08-29 22:02 -------- d-----w- c:\documents and settings\All Users\Application Data\Malwarebytes

2009-08-29 20:48 . 2009-08-29 20:48 -------- d-----w- c:\documents and settings\Bijay\Local Settings\Application Data\{575D8F52-A73C-497A-B343-6FE5FCA2AB50}

2009-08-29 15:37 . 2009-08-29 15:37 64 ----a-w- c:\documents and settings\Bijay\Application Data\Mozilla\Firefox\Profiles\457ac5wk.default\extensions\dvscontextmenuy@dvdvideosoft.com

2009-08-28 10:56 . 2009-08-28 10:56 -------- d-----w- c:\program files\Burn4Free Toolbar

2009-08-28 10:56 . 2009-08-28 10:56 -------- d-----w- c:\program files\UNO - Undercover

2009-08-19 21:10 . 2004-08-03 22:08 31616 -c--a-w- c:\windows\system32\dllcache\usbccgp.sys

2009-08-19 21:10 . 2004-08-03 22:08 31616 ----a-w- c:\windows\system32\drivers\usbccgp.sys

2009-08-19 21:08 . 2009-08-19 21:08 -------- d-----w- c:\documents and settings\All Users\Application Data\BVRP Software

2009-08-19 21:08 . 2009-08-19 21:08 -------- d-----w- c:\documents and settings\Bijay\Local Settings\Application Data\Sony Ericsson

2009-08-19 21:07 . 2008-01-09 10:28 27632 ----a-w- c:\windows\system32\drivers\seehcri.sys

2009-08-19 21:07 . 2003-03-31 12:00 4736 ----a-w- c:\windows\system32\drivers\usbd.sys

2009-08-19 21:07 . 2004-08-03 22:08 57600 ----a-w- c:\windows\system32\drivers\usbhub.sys

2009-08-19 21:02 . 2009-08-19 21:03 -------- d-----w- c:\windows\system32\drivers\UMDF

2009-08-19 21:02 . 2009-08-19 21:02 -------- d-----w- c:\windows\system32\LogFiles

2009-08-19 21:02 . 2006-09-16 00:05 23856 ----a-w- c:\windows\system32\spupdsvc.exe

2009-08-16 10:05 . 2009-08-16 10:05 -------- d-----w- c:\program files\VS Revo Group

2009-08-11 13:13 . 2009-08-11 13:13 -------- d-----w- c:\documents and settings\Bijay\Application Data\UNOUndercover

2009-08-11 13:12 . 2009-08-11 13:12 -------- d-----w- c:\documents and settings\Bijay\Application Data\SpinTop

2009-08-10 20:32 . 2009-08-20 17:36 -------- d-----w- c:\program files\Call of Duty

2009-08-10 20:24 . 2009-08-10 20:24 -------- d-----w- c:\documents and settings\NetworkService\Application Data\Xfire

2009-08-07 14:38 . 2009-08-27 17:25 -------- d-----w- c:\documents and settings\Bijay\Application Data\dvdcss

.

(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))

.

2009-08-29 15:37 . 2009-05-17 09:35 -------- d-----w- c:\program files\Common Files\DVDVideoSoft

2009-08-29 11:13 . 2009-04-19 17:34 -------- d---a-w- c:\documents and settings\All Users\Application Data\TEMP

2009-08-29 10:39 . 2009-05-20 14:39 -------- d-----w- c:\documents and settings\Bijay\Application Data\MegauploadToolbar

2009-08-28 14:02 . 2009-04-19 20:36 -------- d-----w- c:\program files\CLE

2009-08-28 14:02 . 2009-04-26 08:36 -------- d-----w- c:\documents and settings\All Users\Application Data\EmailNotifier

2009-08-28 10:56 . 2009-05-14 18:12 -------- d-----w- c:\program files\Unity

2009-08-23 11:51 . 2009-04-27 08:13 -------- d-----w- c:\documents and settings\All Users\Application Data\Messenger Plus!

2009-08-16 10:04 . 2009-06-04 18:02 -------- d-----w- c:\program files\Opera 10 Beta

2009-08-10 20:39 . 2004-07-17 10:36 12528 ----a-w- c:\windows\system32\drivers\secdrv.sys

2009-08-07 09:11 . 2009-04-26 08:36 -------- d--h--w- c:\program files\InstallShield Installation Information

2009-08-01 12:33 . 2009-04-26 08:36 -------- d-----w- c:\documents and settings\All Users\Application Data\Megaupload

2009-07-22 10:06 . 2009-07-19 10:37 -------- d-----w- c:\program files\Nokia

2009-07-22 10:06 . 2009-07-19 10:37 -------- d-----w- c:\program files\PC Connectivity Solution

2009-07-22 10:06 . 2009-04-19 21:20 -------- d-----w- c:\program files\DIFX

2009-07-22 10:06 . 2009-07-19 10:39 -------- d-----w- c:\documents and settings\Bijay\Application Data\Nokia

2009-07-19 10:41 . 2009-07-19 10:39 -------- d-----w- c:\documents and settings\Bijay\Application Data\PC Suite

2009-07-19 10:40 . 2009-07-19 10:40 0 ---ha-w- c:\windows\system32\drivers\Msft_Kernel_ccdcmb_01007.Wdf

2009-07-19 10:40 . 2009-07-19 10:40 0 ---ha-w- c:\windows\system32\drivers\MsftWdf_Kernel_01007_Coinstaller_Critical.Wdf

2009-07-19 10:39 . 2009-07-19 10:39 -------- d-----w- c:\documents and settings\All Users\Application Data\PC Suite

2009-07-19 10:35 . 2009-07-19 10:35 -------- d-----w- c:\documents and settings\All Users\Application Data\Installations

2009-07-19 10:33 . 2009-07-19 10:33 -------- d-----w- c:\program files\Sony Ericsson

2009-07-19 10:33 . 2009-07-19 10:33 -------- d-----w- c:\documents and settings\All Users\Application Data\Sony Ericsson

2009-06-18 08:42 . 2009-04-18 22:58 3160 ----a-w- c:\windows\system32\d3d9caps.dat

2009-06-13 15:26 . 2009-06-13 15:26 107888 ----a-w- c:\windows\system32\CmdLineExt.dll

2009-06-11 05:37 . 2009-06-11 05:37 152576 ----a-w- c:\documents and settings\Bijay\Application Data\Sun\Java\jre1.6.0_14\lzma.dll

2009-05-01 21:02 . 2009-05-01 21:02 1044480 ----a-w- c:\program files\mozilla firefox\plugins\libdivx.dll

2009-05-01 21:02 . 2009-05-01 21:02 200704 ----a-w- c:\program files\mozilla firefox\plugins\ssldivx.dll

.

------- Sigcheck -------

[-] 2008-04-21 12:06 1580544 32272BF10467C8ACF1F83138C61D541E c:\windows\system32\sfcfiles.dll

.

((((((((((((((((((((((((((((( SnapShot@2009-08-30_20.03.19 )))))))))))))))))))))))))))))))))))))))))

.

+ 2009-08-30 22:25 . 2009-08-30 22:25 16384 c:\windows\temp\Perflib_Perfdata_748.dat

- 2009-08-30 20:03 . 2009-08-30 20:03 16384 c:\windows\temp\Perflib_Perfdata_748.dat

.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))

.

.

*Note* empty entries & legit default entries are not shown

REGEDIT4

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]

"UserFaultCheck"="c:\windows\system32\dumprep 0 -u" [X]

"SiSPower"="SiSPower.dll" - c:\windows\system32\SiSPower.dll [2005-02-16 49152]

"SoundMan"="SOUNDMAN.EXE" - c:\windows\SOUNDMAN.EXE [2005-01-20 77824]

[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run]

"CTFMON.EXE"="c:\windows\system32\CTFMON.EXE" [2004-08-03 15360]

[HKLM\~\startupfolder\c:^documents and settings^bijay^start menu^programs^startup^rncsys32.exe]

path=c:\documents and settings\Bijay\Start Menu\Programs\Startup\rncsys32.exe

backup=c:\windows\pss\rncsys32.exeStartup

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]

"%windir%\\system32\\sessmgr.exe"=

"c:\\Program Files\\DNA\\btdna.exe"=

"c:\\Program Files\\BitTorrent\\bittorrent.exe"=

"c:\\Program Files\\Windows Live\\Messenger\\wlcsdk.exe"=

"c:\\Program Files\\Windows Live\\Messenger\\msnmsgr.exe"=

R2 omsi download service;Sony Ericsson OMSI download service;c:\program files\Sony Ericsson\Sony Ericsson PC Suite\SupServ.exe [19/08/2009 22:05 90112]

R3 seehcri;Sony Ericsson seehcri Device Driver;c:\windows\system32\drivers\seehcri.sys [19/08/2009 22:07 27632]

.

Contents of the 'Scheduled Tasks' folder

2009-07-17 c:\windows\Tasks\GoogleUpdateTaskUserS-1-5-21-527237240-706699826-725345543-1004Core.job

- c:\documents and settings\Bijay\Local Settings\Application Data\Google\Update\GoogleUpdate.exe [2009-04-26 19:33]

2009-08-30 c:\windows\Tasks\GoogleUpdateTaskUserS-1-5-21-527237240-706699826-725345543-1004UA.job

- c:\documents and settings\Bijay\Local Settings\Application Data\Google\Update\GoogleUpdate.exe [2009-04-26 19:33]

.

.

------- Supplementary Scan -------

.

uStart Page = hxxp://www.google.co.uk/

IE: Download Link Using Mega Manager... - c:\program files\Megaupload\Mega Manager\mm_file.htm

IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~2\OFFICE11\EXCEL.EXE/3000

IE: save youtube video as mp3 - c:\program files\Common Files\DVDVideoSoft\Dll\IEContextMenuY.dll/scriptY2MP3.htm

DPF: {8100d56a-5661-482c-bee8-afece305d968} - hxxp://upload.facebook.com/controls/2009.07.28_v5.5.8.1/FacebookPhotoUploader55.cab

FF - ProfilePath - c:\documents and settings\Bijay\Application Data\Mozilla\Firefox\Profiles\457ac5wk.default\

FF - prefs.js: browser.startup.homepage - hxxp://www.google.com/

FF - prefs.js: browser.search.selectedEngine - Web Search

FF - prefs.js: keyword.URL - hxxp://www.searchqu.com/web?src=ffb&q=

FF - plugin: c:\documents and settings\Bijay\Local Settings\Application Data\Google\Update\1.2.183.7\npGoogleOneClick8.dll

FF - plugin: c:\program files\Opera 10 Beta\program\plugins\npdsplay.dll

FF - plugin: c:\program files\Opera 10 Beta\program\plugins\npwmsdrm.dll

FF - plugin: c:\program files\Unity\WebPlayer\loader\npUnity3D32.dll

FF - HiddenExtension: XUL Cache: {575D8F52-A73C-497A-B343-6FE5FCA2AB50} - c:\documents and settings\Bijay\Local Settings\Application Data\{575D8F52-A73C-497A-B343-6FE5FCA2AB50}

.

**************************************************************************

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net

Rootkit scan 2009-08-30 23:25

Windows 5.1.2600 Service Pack 2 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully

hidden files: 0

**************************************************************************

.

--------------------- DLLs Loaded Under Running Processes ---------------------

- - - - - - - > 'explorer.exe'(1212)

c:\windows\system32\WPDShServiceObj.dll

c:\windows\system32\PortableDeviceTypes.dll

c:\windows\system32\PortableDeviceApi.dll

.

------------------------ Other Running Processes ------------------------

.

c:\program files\Java\jre6\bin\jqs.exe

c:\windows\system32\wscntfy.exe

.

**************************************************************************

.

Completion time: 2009-08-30 23:29 - machine was rebooted

ComboFix-quarantined-files.txt 2009-08-30 22:29

ComboFix2.txt 2009-08-30 20:07

Pre-Run: 21,076,037,632 bytes free

Post-Run: 21,044,785,152 bytes free

Current=5 Default=5 Failed=4 LastKnownGood=6 Sets=3,4,5,6

162

Link to post
Share on other sites

This KasperSky Online Scanner is the one that took blimming 4 hours!!!

Anyway Heres the log

KASPERSKY ONLINE SCANNER 7.0: scan report

Tuesday, September 1, 2009

Operating system: Microsoft Windows XP Home Edition Service Pack 2 (build 2600)

Kaspersky Online Scanner version: 7.0.26.13

Last database update: Monday, August 31, 2009 20:00:51

Records in database: 2732297

Scan settings

scan using the following database extended

Scan archives yes

Scan e-mail databases yes

Scan area My Computer

A:\

C:\

D:\

E:\

Scan statistics

Objects scanned 47974

Threats found 7

Infected objects found 20

Suspicious objects found 0

Scan duration 04:09:41

File name Threat Threats count

C:\Documents and Settings\Bijay\My Documents\Mobile\EFS Media Builder.rar Infected: Trojan.Win32.Genome.uyt 1

C:\Program Files\Outlook Express\wab.exe.tmp Infected: Backdoor.Win32.Bredolab.ly 1

C:\Qoobox\Quarantine\C\WINDOWS\system32\drivers\af0b032a.sys.vir Infected: Trojan.Win32.Agent.coan 1

C:\Qoobox\Quarantine\C\WINDOWS\system32\drivers\_af0b032a_.sys.zip Infected: Trojan.Win32.Agent.coan 2

C:\System Volume Information\_restore{B7C03CB2-DDC9-4DAC-A2AE-93B428D192DF}\RP1\A0000012.exe Infected: not-a-virus:Monitor.Win32.Ardamax.o 2

C:\System Volume Information\_restore{B7C03CB2-DDC9-4DAC-A2AE-93B428D192DF}\RP1\A0000012.exe Infected: not-a-virus:Monitor.Win32.Ardamax.r 3

C:\System Volume Information\_restore{B7C03CB2-DDC9-4DAC-A2AE-93B428D192DF}\RP1\A0000012.exe Infected: Trojan-Spy.Win32.Ardamax.t 1

C:\System Volume Information\_restore{B7C03CB2-DDC9-4DAC-A2AE-93B428D192DF}\RP1\A0000055.sys Infected: Trojan.Win32.Agent.coan 1

D:\Backup\Bijay\Downloads\All_In_1\Ardamax Keylogger.exe Infected: not-a-virus:Monitor.Win32.Ardamax.o 2

D:\Backup\Bijay\Downloads\All_In_1\Ardamax Keylogger.exe Infected: not-a-virus:Monitor.Win32.Ardamax.r 3

D:\Backup\Bijay\Downloads\All_In_1\Ardamax Keylogger.exe Infected: Trojan-Spy.Win32.Ardamax.t 1

D:\Backup\Bijay\Games\Games 1\Mario The Last Castle\Mario TLCastle.exe Infected: Constructor.Win32.Agent.kf 1

D:\Backup\Bijay\Mobile\EFS Media Builder.rar Infected: Trojan.Win32.Genome.uyt 1

Selected area has been scanned.

Link to post
Share on other sites

Do you recognize this?:

C:\Documents and Settings\Bijay\My Documents\Mobile\EFS Media Builder.rar

There are backups in drive D:\ also.

I do recognise it. Its a Software for Editing Mobile Systems and adding New Softwares to Mobiles... I Used it On My Lg Viewty Phone to add more themes to the phone because you only get 4 dull themes in the phone and there is no other way to get more themes without using homebrew software....Does It Have A Virus??? If So I dont mind Getting Rid Of it

Link to post
Share on other sites

Hi, itidakimas :)

What I read wasn't good. You will be better off without it.

  • Copy the entire contents of the Quote Box below to Notepad.
  • Name the file as CFScript.txt
  • Change the Save as Type to All Files
  • and Save it on the desktop

File::
C:\Documents and Settings\Bijay\My Documents\Mobile\EFS Media Builder.rar
C:\Program Files\Outlook Express\wab.exe.tmp
D:\Backup\Bijay\Downloads\All_In_1\Ardamax Keylogger.exe
D:\Backup\Bijay\Downloads\All_In_1\Ardamax Keylogger.exe
D:\Backup\Bijay\Downloads\All_In_1\Ardamax Keylogger.exe
D:\Backup\Bijay\Games\Games 1\Mario The Last Castle\Mario TLCastle.exe
D:\Backup\Bijay\Mobile\EFS Media Builder.rar

CFScriptB-4.gif

Once saved, referring to the picture above, drag CFScript.txt into ComboFix.exe, and post back the resulting report.

Link to post
Share on other sites

Here it is...by the way it said there was and update so i updated and also it uploaded malware to the net for further analysis anyway heres the log report.

ComboFix 09-08-31.03 - Bijay 01/09/2009 14:05.3.1 - NTFSx86

Microsoft Windows XP Home Edition 5.1.2600.2.1252.1.1033.18.191.90 [GMT 1:00]

Running from: c:\documents and settings\Bijay\Desktop\Combo-Fix.exe

Command switches used :: c:\documents and settings\Bijay\Desktop\CFScript.txt

FILE ::

"c:\documents and settings\Bijay\My Documents\Mobile\EFS Media Builder.rar"

"c:\program files\Outlook Express\wab.exe.tmp"

"d:\backup\Bijay\Downloads\All_In_1\Ardamax Keylogger.exe"

"d:\backup\Bijay\Games\Games 1\Mario The Last Castle\Mario TLCastle.exe"

"d:\backup\Bijay\Mobile\EFS Media Builder.rar"

.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))

.

c:\documents and settings\Bijay\My Documents\Mobile\EFS Media Builder.rar

c:\program files\Outlook Express\wab.exe.tmp

d:\backup\Bijay\Downloads\All_In_1\Ardamax Keylogger.exe

d:\backup\Bijay\Games\Games 1\Mario The Last Castle\Mario TLCastle.exe

d:\backup\Bijay\Mobile\EFS Media Builder.rar

.

((((((((((((((((((((((((( Files Created from 2009-08-01 to 2009-09-01 )))))))))))))))))))))))))))))))

.

2009-08-31 08:25 . 2009-08-31 08:25 -------- d-----w- c:\program files\Java

2009-08-31 08:07 . 2009-08-31 08:09 -------- d-----w- c:\documents and settings\Bijay\.SunDownloadManager

2009-08-30 12:47 . 2009-08-30 12:47 -------- d-----w- c:\program files\Trend Micro

2009-08-30 12:31 . 2009-08-03 12:36 38160 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys

2009-08-30 12:30 . 2009-08-30 19:15 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware

2009-08-30 12:30 . 2009-08-03 12:36 19096 ----a-w- c:\windows\system32\drivers\mbam.sys

2009-08-29 22:03 . 2009-08-29 22:03 -------- d-----w- c:\documents and settings\Bijay\Application Data\Malwarebytes

2009-08-29 22:02 . 2009-08-29 22:02 -------- d-----w- c:\documents and settings\All Users\Application Data\Malwarebytes

2009-08-29 20:48 . 2009-08-29 20:48 -------- d-----w- c:\documents and settings\Bijay\Local Settings\Application Data\{575D8F52-A73C-497A-B343-6FE5FCA2AB50}

2009-08-29 15:37 . 2009-08-29 15:37 64 ----a-w- c:\documents and settings\Bijay\Application Data\Mozilla\Firefox\Profiles\457ac5wk.default\extensions\dvscontextmenuy@dvdvideosoft.com

2009-08-28 10:56 . 2009-08-28 10:56 -------- d-----w- c:\program files\Burn4Free Toolbar

2009-08-28 10:56 . 2009-08-28 10:56 -------- d-----w- c:\program files\UNO - Undercover

2009-08-19 21:10 . 2004-08-03 22:08 31616 -c--a-w- c:\windows\system32\dllcache\usbccgp.sys

2009-08-19 21:10 . 2004-08-03 22:08 31616 ----a-w- c:\windows\system32\drivers\usbccgp.sys

2009-08-19 21:08 . 2009-08-19 21:08 -------- d-----w- c:\documents and settings\All Users\Application Data\BVRP Software

2009-08-19 21:08 . 2009-08-19 21:08 -------- d-----w- c:\documents and settings\Bijay\Local Settings\Application Data\Sony Ericsson

2009-08-19 21:07 . 2008-01-09 10:28 27632 ----a-w- c:\windows\system32\drivers\seehcri.sys

2009-08-19 21:07 . 2003-03-31 12:00 4736 ----a-w- c:\windows\system32\drivers\usbd.sys

2009-08-19 21:07 . 2004-08-03 22:08 57600 ----a-w- c:\windows\system32\drivers\usbhub.sys

2009-08-19 21:02 . 2009-08-19 21:03 -------- d-----w- c:\windows\system32\drivers\UMDF

2009-08-19 21:02 . 2009-08-19 21:02 -------- d-----w- c:\windows\system32\LogFiles

2009-08-19 21:02 . 2006-09-16 00:05 23856 ----a-w- c:\windows\system32\spupdsvc.exe

2009-08-16 10:05 . 2009-08-16 10:05 -------- d-----w- c:\program files\VS Revo Group

2009-08-11 13:13 . 2009-08-11 13:13 -------- d-----w- c:\documents and settings\Bijay\Application Data\UNOUndercover

2009-08-11 13:12 . 2009-08-11 13:12 -------- d-----w- c:\documents and settings\Bijay\Application Data\SpinTop

2009-08-10 20:32 . 2009-08-20 17:36 -------- d-----w- c:\program files\Call of Duty

2009-08-10 20:24 . 2009-08-10 20:24 -------- d-----w- c:\documents and settings\NetworkService\Application Data\Xfire

2009-08-07 14:38 . 2009-08-27 17:25 -------- d-----w- c:\documents and settings\Bijay\Application Data\dvdcss

.

(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))

.

2009-08-31 08:26 . 2009-05-28 10:39 411368 ----a-w- c:\windows\system32\deploytk.dll

2009-08-29 15:37 . 2009-05-17 09:35 -------- d-----w- c:\program files\Common Files\DVDVideoSoft

2009-08-29 11:13 . 2009-04-19 17:34 -------- d---a-w- c:\documents and settings\All Users\Application Data\TEMP

2009-08-29 10:39 . 2009-05-20 14:39 -------- d-----w- c:\documents and settings\Bijay\Application Data\MegauploadToolbar

2009-08-28 14:02 . 2009-04-19 20:36 -------- d-----w- c:\program files\CLE

2009-08-28 14:02 . 2009-04-26 08:36 -------- d-----w- c:\documents and settings\All Users\Application Data\EmailNotifier

2009-08-28 10:56 . 2009-05-14 18:12 -------- d-----w- c:\program files\Unity

2009-08-23 11:51 . 2009-04-27 08:13 -------- d-----w- c:\documents and settings\All Users\Application Data\Messenger Plus!

2009-08-16 10:04 . 2009-06-04 18:02 -------- d-----w- c:\program files\Opera 10 Beta

2009-08-10 20:39 . 2004-07-17 10:36 12528 ----a-w- c:\windows\system32\drivers\secdrv.sys

2009-08-07 09:11 . 2009-04-26 08:36 -------- d--h--w- c:\program files\InstallShield Installation Information

2009-08-01 12:33 . 2009-04-26 08:36 -------- d-----w- c:\documents and settings\All Users\Application Data\Megaupload

2009-07-22 10:06 . 2009-07-19 10:37 -------- d-----w- c:\program files\Nokia

2009-07-22 10:06 . 2009-07-19 10:37 -------- d-----w- c:\program files\PC Connectivity Solution

2009-07-22 10:06 . 2009-04-19 21:20 -------- d-----w- c:\program files\DIFX

2009-07-22 10:06 . 2009-07-19 10:39 -------- d-----w- c:\documents and settings\Bijay\Application Data\Nokia

2009-07-19 10:41 . 2009-07-19 10:39 -------- d-----w- c:\documents and settings\Bijay\Application Data\PC Suite

2009-07-19 10:40 . 2009-07-19 10:40 0 ---ha-w- c:\windows\system32\drivers\Msft_Kernel_ccdcmb_01007.Wdf

2009-07-19 10:40 . 2009-07-19 10:40 0 ---ha-w- c:\windows\system32\drivers\MsftWdf_Kernel_01007_Coinstaller_Critical.Wdf

2009-07-19 10:39 . 2009-07-19 10:39 -------- d-----w- c:\documents and settings\All Users\Application Data\PC Suite

2009-07-19 10:35 . 2009-07-19 10:35 -------- d-----w- c:\documents and settings\All Users\Application Data\Installations

2009-07-19 10:33 . 2009-07-19 10:33 -------- d-----w- c:\program files\Sony Ericsson

2009-07-19 10:33 . 2009-07-19 10:33 -------- d-----w- c:\documents and settings\All Users\Application Data\Sony Ericsson

2009-06-18 08:42 . 2009-04-18 22:58 3160 ----a-w- c:\windows\system32\d3d9caps.dat

2009-06-13 15:26 . 2009-06-13 15:26 107888 ----a-w- c:\windows\system32\CmdLineExt.dll

2009-06-11 05:37 . 2009-06-11 05:37 152576 ----a-w- c:\documents and settings\Bijay\Application Data\Sun\Java\jre1.6.0_14\lzma.dll

2009-05-01 21:02 . 2009-05-01 21:02 1044480 ----a-w- c:\program files\mozilla firefox\plugins\libdivx.dll

2009-05-01 21:02 . 2009-05-01 21:02 200704 ----a-w- c:\program files\mozilla firefox\plugins\ssldivx.dll

.

------- Sigcheck -------

[-] 2008-04-21 12:06 1580544 32272BF10467C8ACF1F83138C61D541E c:\windows\system32\sfcfiles.dll

.

((((((((((((((((((((((((((((( SnapShot@2009-08-30_20.03.19 )))))))))))))))))))))))))))))))))))))))))

.

+ 2009-08-31 08:26 . 2009-08-31 08:26 149280 c:\windows\system32\javaws.exe

+ 2009-08-31 08:26 . 2009-08-31 08:26 145184 c:\windows\system32\javaw.exe

+ 2009-08-31 08:26 . 2009-08-31 08:26 145184 c:\windows\system32\java.exe

+ 2009-08-31 08:25 . 2009-08-31 08:26 1757696 c:\windows\Installer\57d77.msi

.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))

.

.

*Note* empty entries & legit default entries are not shown

REGEDIT4

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]

"UserFaultCheck"="c:\windows\system32\dumprep 0 -u" [X]

"SunJavaUpdateSched"="c:\program files\Java\jre6\bin\jusched.exe" [2009-08-31 149280]

"SiSPower"="SiSPower.dll" - c:\windows\system32\SiSPower.dll [2005-02-16 49152]

"SoundMan"="SOUNDMAN.EXE" - c:\windows\SOUNDMAN.EXE [2005-01-20 77824]

[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run]

"CTFMON.EXE"="c:\windows\system32\CTFMON.EXE" [2004-08-03 15360]

[HKLM\~\startupfolder\c:^documents and settings^bijay^start menu^programs^startup^rncsys32.exe]

path=c:\documents and settings\Bijay\Start Menu\Programs\Startup\rncsys32.exe

backup=c:\windows\pss\rncsys32.exeStartup

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]

"%windir%\\system32\\sessmgr.exe"=

"c:\\Program Files\\DNA\\btdna.exe"=

"c:\\Program Files\\BitTorrent\\bittorrent.exe"=

"c:\\Program Files\\Windows Live\\Messenger\\wlcsdk.exe"=

"c:\\Program Files\\Windows Live\\Messenger\\msnmsgr.exe"=

R2 omsi download service;Sony Ericsson OMSI download service;c:\program files\Sony Ericsson\Sony Ericsson PC Suite\SupServ.exe [19/08/2009 22:05 90112]

R3 seehcri;Sony Ericsson seehcri Device Driver;c:\windows\system32\drivers\seehcri.sys [19/08/2009 22:07 27632]

.

Contents of the 'Scheduled Tasks' folder

2009-07-17 c:\windows\Tasks\GoogleUpdateTaskUserS-1-5-21-527237240-706699826-725345543-1004Core.job

- c:\documents and settings\Bijay\Local Settings\Application Data\Google\Update\GoogleUpdate.exe [2009-04-26 19:33]

2009-09-01 c:\windows\Tasks\GoogleUpdateTaskUserS-1-5-21-527237240-706699826-725345543-1004UA.job

- c:\documents and settings\Bijay\Local Settings\Application Data\Google\Update\GoogleUpdate.exe [2009-04-26 19:33]

.

.

------- Supplementary Scan -------

.

uStart Page = hxxp://www.google.co.uk/

IE: Download Link Using Mega Manager... - c:\program files\Megaupload\Mega Manager\mm_file.htm

IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~2\OFFICE11\EXCEL.EXE/3000

IE: save youtube video as mp3 - c:\program files\Common Files\DVDVideoSoft\Dll\IEContextMenuY.dll/scriptY2MP3.htm

DPF: {8100d56a-5661-482c-bee8-afece305d968} - hxxp://upload.facebook.com/controls/2009.07.28_v5.5.8.1/FacebookPhotoUploader55.cab

FF - ProfilePath - c:\documents and settings\Bijay\Application Data\Mozilla\Firefox\Profiles\457ac5wk.default\

FF - prefs.js: browser.startup.homepage - hxxp://www.google.com/

FF - prefs.js: browser.search.selectedEngine - Web Search

FF - prefs.js: keyword.URL - hxxp://www.searchqu.com/web?src=ffb&q=

FF - plugin: c:\documents and settings\Bijay\Local Settings\Application Data\Google\Update\1.2.183.7\npGoogleOneClick8.dll

FF - plugin: c:\program files\Opera 10 Beta\program\plugins\npdsplay.dll

FF - plugin: c:\program files\Opera 10 Beta\program\plugins\npwmsdrm.dll

FF - plugin: c:\program files\Unity\WebPlayer\loader\npUnity3D32.dll

FF - HiddenExtension: XUL Cache: {575D8F52-A73C-497A-B343-6FE5FCA2AB50} - c:\documents and settings\Bijay\Local Settings\Application Data\{575D8F52-A73C-497A-B343-6FE5FCA2AB50}

.

**************************************************************************

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net

Rootkit scan 2009-09-01 14:11

Windows 5.1.2600 Service Pack 2 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully

hidden files: 0

**************************************************************************

.

Completion time: 2009-09-01 14:15

ComboFix-quarantined-files.txt 2009-09-01 13:14

ComboFix2.txt 2009-08-30 22:29

ComboFix3.txt 2009-08-30 20:07

Pre-Run: 20,038,430,720 bytes free

Post-Run: 20,140,384,256 bytes free

Current=5 Default=5 Failed=4 LastKnownGood=6 Sets=3,4,5,6

157

Link to post
Share on other sites

Hi, itidakimas :)

All seems clear.

Reset and Re-enable your System Restore to remove bad files that have been backed up by Windows. The files in System Restore are protected to prevent any programmes changing them. This is the only way to clean these files: (You will lose all previous restore points which are likely to be infected.)

To reset your restore points, please note that you will need to log into your computer with an account which has full administrator access. You will know if the account has administrator access because you will be able to see the System Restore tab. If the tab is missing, you are logged in under a limited account.

(Windows XP)

1. Turn off System Restore.

On the Desktop, right-click My Computer.

Click Properties.

Click the System Restore tab.

Check Turn off System Restore.

Click Apply, and then click OK.

2. Reboot.

3. Turn ON System Restore.

On the Desktop, right-click My Computer.

Click Properties.

Click the System Restore tab.

UN-Check *Turn off System Restore*.

Click Apply, and then click OK..

Since the tools we used to scan the computer, as well as tools to delete files and folders, are no longer needed, they should be removed, as well as the folders created by these tools.

Follow these steps to uninstall Combofix

  • Click START then RUN
  • Now type (Copy and Paste) "c:\documents and settings\Bijay\Desktop\Combo-Fix.exe" /u in the runbox (including the quotation marks) and click OK. Note the space between the " and the /u, it needs to be there.

Create a Restore point (If the above process fails to do so):

  1. Click Start, point to All Programs, point to Accessories, point to System Tools, and then click System Restore.
  2. In the System Restore dialog box, click Create a restore point, and then click Next.
  3. Type a description for your restore point, such as "After Cleanup", then click Create.

The following is a list of free tools and utilities that I like to suggest to people. This list is full of great tools and utilities to help you understand how you got infected and how to keep from getting infected again.

  1. Spybot Search & Destroy - A useful tool which can search and annhilate bad files that make it onto your system. Now with an Immunize section that will help prevent future infections.
  2. AdAware - Another very powerful tool which searches and kills bad files that infect your system. AdAware and Spybot Search & Destroy compliment each other very well.
  3. SpywareBlaster - Great prevention tool to keep bad files from installing on your system.
  4. ZonedOut + IE-SpyAd - puts over 5000 sites in your restricted zone so you'll be protected when you visit innocent-looking sites that aren't actually innocent at all.
  5. ATF! - Cleans temporary files from IE and Windows, empties the recycle bin and more. Great tool to help speed up your computer and knock out those bad files that like to reside in the temp folders.
  6. Windows Updates - It is very important to make sure that both Internet Explorer and Windows are kept current with the latest critical security patches from Microsoft. To do this just start Internet Explorer and select Tools > Windows Update, and follow the online instructions from there.
  7. Google Toolbar - Free google toolbar that allows you to use the powerful Google search engine from the bar, but also blocks pop up windows.
  8. Trillian or Miranda-IM - These are Malware free Instant Messenger programs which allow you to connect to multiple IM services in one program! (AOL, Yahoo, ICQ, IRC, MSN)
  9. ERUNT (Emergency Recovery Utility NT) allows you to keep a complete backup of your registry and restore it when needed. The standard registry backup options that come with Windows back up most of the registry but not all of it. ERUNT however creates a complete backup set, including the Security hive and user related sections. ERUNT is easy to use and since it creates a full backup, there are no options or choices other than to select the location of the backup files. The backup set includes a small executable that will launch the registry restore if needed.
  10. Recovery Console - Recent trends appear to indicate that future infections will include attacks to the boot sector of the computer. The installation of the Recovery Console in the computer will be our only defense against this threat. For more information and steps to install the Recovery Console see This Article. Should you need assistance in installing the Recovery Console, please do not hesitate to ask.

To find out more information about how you got infected in the first place and some great guidelines to follow to prevent future infections you can read this article by Miekiemoes.

Best wishes! wavey.gif

Link to post
Share on other sites

Flash Drive Disinfector

Download Flash_Disinfector.exe by sUBs from here and save it to your desktop.

  • Double-click Flash_Disinfector.exe to run it and follow any prompts that may appear.
  • The utility may ask you to insert your flash drive and/or other removable drives including your mobile phone. Please do so and allow the utility to clean up those drives as well.
  • Wait until it has finished scanning and then exit the program.
  • Reboot your computer when done.
    Note: Flash_Disinfector will create a hidden folder named autorun.inf in each partition and every USB drive plugged in when you run it. Don't delete this folder...it will help protect your drives from future infection.

Link to post
Share on other sites

 Share

  • Recently Browsing   0 members

    • No registered users viewing this page.
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.