Jump to content

MBAM fails for trojan.agent uacinit.dll removal


Recommended Posts

Malwarebytes Anti-Malware has failed to remove a trojan.agent infection of a file named 'uacinit.dll' and I need help to resolve. The infected computer is off the network so I am using another computer to compose this.

I have run MBAM and a number of items were quarantined and removed. But, the one mentioned above remains. It either comes back after restart or causes MBAM to hang. I had to rename MBAM 'test' in order to get it to run.

Other info: My Norton Internet Security is somehow disabled and will only scan a few thousand items and then reports back that all is fine. Some of the file names it reports scanning are not actually on the hard drive.

I have used a flash drive to transfer files, etc. to the infected computer from the good one. This drive has an external switch which 'locks' it (to prevent anything being written to it, I presume). But, I am concerned that if i try to write the MBAM and HijackThis log files to it to transfer them to this computer, I might infect both computers. Is this a concern or can I read/write with no worry?

From reading some previous topics here, it seems this can be fixed. I hope you can help. Thanks in advance

Link to post
Share on other sites

  • Root Admin

Please download ComboFix from Here or Here to your Desktop.

**Note: In the event you already have Combofix, this is a new version that I need you to download. It is important that it is saved and renamed following this process directly to your desktop**

  1. If you are using Firefox, make sure that your download settings are as follows:
    • Tools->Options->Main tab
    • Set to "Always ask me where to Save the files".

[*]During the download, rename Combofix to Combo-Fix as follows:

CF_download_FF.gif

CF_download_rename.gif

[*]It is important you rename Combofix during the download, but not after.

[*]Please do not rename Combofix to other names, but only to the one indicated.

[*]Close any open browsers.

[*]Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.

-----------------------------------------------------------

  • Very Important! Temporarily disable your anti-virus, script blocking and any anti-malware real-time protection before performing a scan. They can interfere with ComboFix or remove some of its embedded files which may cause "unpredictable results".
  • Click on this link to see a list of programs that should be disabled. The list is not all inclusive. If yours is not listed and you don't know how to disable it, please ask.

    -----------------------------------------------------------


  • Close any open browsers.
  • WARNING: Combofix will disconnect your machine from the Internet as soon as it starts
  • Please do not attempt to re-connect your machine back to the Internet until Combofix has completely finished.
  • If there is no internet connection after running Combofix, then restart your computer to restore back your connection.

-----------------------------------------------------------

[*]Double click on combo-Fix.exe & follow the prompts.

[*]When finished, it will produce a report for you.

[*]Please post the "C:\Combo-Fix.txt" along with a new HijackThis log for further review.

**Note: Do not mouseclick combo-fix's window while it's running. That may cause it to stall**

If you still cannot get this to run, try booting into Safe Mode, and run it there.

To boot into Safe Mode, tap F8 after BIOS, and just before the Windows logo appears. A list of options will appear, select "Safe Mode."

If this doesn't work either, try the same method (above method), but name Combofix.exe to iexplore.exe instead, or winlogon.exe..

This because It also happens in some cases that malware blocks EVERY process except for what is in its own whitelist, so this whitelist also includes system important processes such as iexplore.exe, explorer.exe, winlogon.exe...

Link to post
Share on other sites

Malwarebytes Anti-Malware has failed to remove a trojan.agent infection of a file named 'uacinit.dll' and I need help to resolve. The infected computer is off the network so I am using another computer to compose this.

I have run MBAM and a number of items were quarantined and removed. But, the one mentioned above remains. It either comes back after restart or causes MBAM to hang. I had to rename MBAM 'test' in order to get it to run.

Other info: My Norton Internet Security is somehow disabled and will only scan a few thousand items and then reports back that all is fine. Some of the file names it reports scanning are not actually on the hard drive.

I have used a flash drive to transfer files, etc. to the infected computer from the good one. This drive has an external switch which 'locks' it (to prevent anything being written to it, I presume). But, I am concerned that if i try to write the MBAM and HijackThis log files to it to transfer them to this computer, I might infect both computers. Is this a concern or can I read/write with no worry?

From reading some previous topics here, it seems this can be fixed. I hope you can help. Thanks in advance

sorry, I'm having trouble using the reply page. I am doing the scans you requested now. In the meantime, can you address my concerns about using a flash drive on an infected computer? thanks

Link to post
Share on other sites

sorry, I'm having trouble using the reply page. I am doing the scans you requested now. In the meantime, can you address my concerns about using a flash drive on an infected computer? thanks

combofix is requesting that a recovery console be installed but that i need an active internet connection. its window also says that it is trying to create a system restore. the computer if off any network, so how do i deal with that? and i have turned off 'system restore' function in windows. do i need to re-enable that?

Link to post
Share on other sites

i replied 'no download' to the combofix dialog box regarding the recovery console installation. it ran anyway saying it would not attempt to repair any serious problems. i have that log and a hijackthis log run after the combofix run. i will post them but would still like to know if it is SAFE to write to a flash drive from an infected computer and then use that flash drive in an clean computer. (as i mentioned before, the infected computer is not on a network and this is being sent from a different pc). thanks

Link to post
Share on other sites

  • Root Admin

Yes the thread is still valid and live, but if you take a look at my post count I'm quite busy. We get hundreds of requests for help almost daily so you need to try to be patient please.

To answer your question about the flash drive. No it is not safe and depending on what type of infection you could easily transfer an infection to a clean system. Make sure that the clean system is running up to date continuous protection Anti-Virus and has ALL the latest Microsoft Security Updates and that will help to greatly reduce the risk.

If you can please update to MBAM 1.41 and install and scan with that.

Then if the Internet connection is still down, try the following to fix it.

Click on START - RUN and copy / paste the entry below into the run line and click OK

CMD /C NETSH FIREWALL RESET

Click on START - RUN and copy / paste the entry below into the run line and click OK

CMD /C NETSH int ip reset c:\resetlog.txt

Link to post
Share on other sites

Sorry. Yes, I am still here. And an apology for my earlier anxious post. I didn't mean to offend.

The infected computer is off the network by my choice. I am concerned at keeping it online with a connection to the internet. I guess I'll just have to take a chance and and try to go online based on your response to my previous query about a flash drive. (relatedly, as an aside, is there a way to scan a wireless router, modem, etc for infections?)

What has been done so far:

Based on your original reply:

I ran MBAM (v 1.40) several times which removed some stuff but left the trojan.agent uacinit.dll problem. i will post the last log (and previous ones if you like).

I ran hijackthis and have a log to post.

I ran Combofix but since I did not have a recovery console installed, it said it might not attempt to fix some serious problems. I have the log for that.

Combofix seemed to reenable my antivirus program so I ran that and it found and removed Packed.Generic.200 and Trojan.metajuan problems.

I ran hijackthis again and have a log.

Next Steps:

I would like to install a recovery console and rerun combofix but I have an old windows installation disk that is not compatable with service pack 2. I need to find a newer windows install disk.

I will download and run MBAM 1.41 as you request.

Many thanks for your help and patience.

Link to post
Share on other sites

OK. Here are the logs. there is the combofix log from some time ago, the latest mbam 1.41 (showing nothing) and a new hijackthis log run after the last mbam 1.41

i went online and downloaded mbam 1.41, updated it and ran it. it found trojan.agent and rootkit.tdss. (this seems strange because these things removed with a prior scan with mbam 1.40. don't know why they seem to have returned.

let me know what to do next.

Malwarebytes' Anti-Malware 1.41

Database version: 2803

Windows 5.1.2600 Service Pack 2

9/15/2009 12:36:11 PM

mbam-log-2009-09-15 (12-36-11).txt

Scan type: Full Scan (C:\|D:\|)

Objects scanned: 189454

Time elapsed: 1 hour(s), 29 minute(s), 46 second(s)

Memory Processes Infected: 0

Memory Modules Infected: 0

Registry Keys Infected: 0

Registry Values Infected: 0

Registry Data Items Infected: 0

Folders Infected: 0

Files Infected: 0

Memory Processes Infected:

(No malicious items detected)

Memory Modules Infected:

(No malicious items detected)

Registry Keys Infected:

(No malicious items detected)

Registry Values Infected:

(No malicious items detected)

Registry Data Items Infected:

(No malicious items detected)

Folders Infected:

(No malicious items detected)

Files Infected:

(No malicious items detected)

Logfile of Trend Micro HijackThis v2.0.2

Scan saved at 8:33:37 PM, on 9/15/2009

Platform: Windows XP SP2 (WinNT 5.01.2600)

MSIE: Internet Explorer v8.00 (8.00.6001.18702)

Boot mode: Normal

Running processes:

C:\WINDOWS\System32\smss.exe

C:\WINDOWS\system32\winlogon.exe

C:\WINDOWS\system32\services.exe

C:\WINDOWS\system32\lsass.exe

C:\WINDOWS\system32\Ati2evxx.exe

C:\WINDOWS\system32\svchost.exe

C:\WINDOWS\System32\svchost.exe

C:\WINDOWS\system32\svchost.exe

C:\Program Files\Common Files\Symantec Shared\ccSvcHst.exe

C:\Program Files\Common Files\Symantec Shared\AppCore\AppSvc32.exe

C:\WINDOWS\system32\Ati2evxx.exe

C:\WINDOWS\Explorer.EXE

C:\WINDOWS\system32\spoolsv.exe

C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe

C:\Program Files\Symantec\LiveUpdate\ALUSchedulerSvc.exe

C:\Program Files\Bonjour\mDNSResponder.exe

C:\Program Files\Dell\Bluetooth Software\bin\btwdins.exe

C:\Program Files\Common Files\Intuit\Update Service\IntuitUpdateService.exe

C:\Program Files\Java\jre6\bin\jqs.exe

C:\PROGRA~1\NORTON~2\NORTON~2\NPROTECT.EXE

C:\PROGRA~1\NORTON~2\NORTON~2\SPEEDD~1\NOPDB.EXE

C:\WINDOWS\System32\svchost.exe

C:\Program Files\Common Files\Symantec Shared\CCPD-LC\symlcsvc.exe

C:\WINDOWS\System32\wltrysvc.exe

C:\WINDOWS\System32\bcmwltry.exe

C:\Program Files\Yahoo!\SoftwareUpdate\YahooAUService.exe

C:\Program Files\Dell\QuickSet\Quickset.exe

C:\WINDOWS\BCMSMMSG.exe

C:\Program Files\Apoint\Apoint.exe

C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe

C:\Program Files\MusicMatch\MusicMatch Jukebox\mmtask.exe

C:\Program Files\MUSICMATCH\MUSICMATCH Jukebox\mm_tray.exe

C:\Program Files\Common Files\Real\Update_OB\realsched.exe

C:\WINDOWS\system32\dla\tfswctrl.exe

C:\Program Files\Common Files\Dell\EUSW\Support.exe

C:\Program Files\Norton SystemWorks\Password Manager\AcctMgr.exe

C:\Program Files\ScanSoft\OmniPageSE2.0\OpwareSE2.exe

C:\Program Files\Common Files\Symantec Shared\ccApp.exe

C:\WINDOWS\system32\WDBtnMgr.exe

C:\Program Files\Linksys Wireless-G Print Server\PSDiagnosticM.exe

C:\Program Files\Apoint\Apntex.exe

C:\Program Files\iTunes\iTunesHelper.exe

C:\Program Files\Java\jre6\bin\jusched.exe

C:\Program Files\Messenger\msmsgs.exe

C:\Program Files\Dell\Support\Alert\bin\NotifyAlert.exe

C:\WINDOWS\system32\ctfmon.exe

C:\Program Files\Audible\Bin\AudibleDownloadHelper.exe

C:\Program Files\Dell\Bluetooth Software\BTTray.exe

C:\Program Files\WinZip\WZQKPICK.EXE

C:\Program Files\Sierra Imaging\Image Expert\IXApplet.exe

C:\Program Files\Verizon Wireless\V CAST Music\V CAST Music Monitor.exe

C:\Program Files\iPod\bin\iPodService.exe

C:\WINDOWS\system32\wuauclt.exe

C:\WINDOWS\System32\wbem\wmiapsrv.exe

C:\PROGRA~1\Yahoo!\MESSEN~1\ymsgr_tray.exe

C:\Program Files\Common Files\Real\Update_OB\realevent.exe

C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.yahoo.com/

R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157

R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896

R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896

R1 - HKCU\Software\Microsoft\Internet Connection Wizard,ShellNext = http://windowsupdate.microsoft.com/

R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = *.local

R3 - URLSearchHook: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\PROGRA~1\Yahoo!\Companion\Installs\cpn\yt.dll

O2 - BHO: &Yahoo! Toolbar Helper - {02478D38-C3F9-4efb-9B51-7695ECA05670} - C:\PROGRA~1\Yahoo!\Companion\Installs\cpn\yt.dll

O3 - Toolbar: Easy-WebPrint - {327C2873-E90D-4c37-AA9D-10AC9BABA46C} - C:\Program Files\Canon\Easy-WebPrint\Toolband.dll

O3 - Toolbar: Show Norton Toolbar - {90222687-F593-4738-B738-FBEE9C7B26DF} - C:\Program Files\Common Files\Symantec Shared\coShared\Browser\1.0\UIBHO.dll

O3 - Toolbar: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\PROGRA~1\Yahoo!\Companion\Installs\cpn\yt.dll

O4 - HKLM\..\Run: [Dell QuickSet] C:\Program Files\Dell\QuickSet\Quickset.exe

O4 - HKLM\..\Run: [bCMSMMSG] BCMSMMSG.exe

O4 - HKLM\..\Run: [Apoint] C:\Program Files\Apoint\Apoint.exe

O4 - HKLM\..\Run: [ATIPTA] C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe

O4 - HKLM\..\Run: [mmtask] c:\Program Files\MusicMatch\MusicMatch Jukebox\mmtask.exe

O4 - HKLM\..\Run: [MMTray] C:\Program Files\MUSICMATCH\MUSICMATCH Jukebox\mm_tray.exe

O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Common Files\Real\Update_OB\realsched.exe" -osboot

O4 - HKLM\..\Run: [dla] C:\WINDOWS\system32\dla\tfswctrl.exe

O4 - HKLM\..\Run: [storageGuard] "C:\Program Files\Common Files\Sonic\Update Manager\sgtray.exe" /r

O4 - HKLM\..\Run: [DwlClient] C:\Program Files\Common Files\Dell\EUSW\Support.exe

O4 - HKLM\..\Run: [AcctMgr] C:\Program Files\Norton SystemWorks\Password Manager\AcctMgr.exe /startup

O4 - HKLM\..\Run: [OpwareSE2] "C:\Program Files\ScanSoft\OmniPageSE2.0\OpwareSE2.exe"

O4 - HKLM\..\Run: [ccApp] "C:\Program Files\Common Files\Symantec Shared\ccApp.exe"

O4 - HKLM\..\Run: [osCheck] "C:\Program Files\Norton Internet Security\osCheck.exe"

O4 - HKLM\..\Run: [WD Button Manager] WDBtnMgr.exe

O4 - HKLM\..\Run: [PSDiagnosticM] "C:\Program Files\Linksys Wireless-G Print Server\PSDiagnosticM.exe"

O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime

O4 - HKLM\..\Run: [iTunesHelper] "C:\Program Files\iTunes\iTunesHelper.exe"

O4 - HKLM\..\Run: [symantec PIF AlertEng] "C:\Program Files\Common Files\Symantec Shared\PIF\{B8E1DD85-8582-4c61-B58F-2F227FCA9A08}\PIFSvc.exe" /a /m "C:\Program Files\Common Files\Symantec Shared\PIF\{B8E1DD85-8582-4c61-B58F-2F227FCA9A08}\AlertEng.dll"

O4 - HKLM\..\Run: [sunJavaUpdateSched] "C:\Program Files\Java\jre6\bin\jusched.exe"

O4 - HKLM\..\Run: [Malwarebytes Anti-Malware (reboot)] "C:\Program Files\Malwarebytes' Anti-Malware\mbam.exe" /runcleanupscript

O4 - HKCU\..\Run: [MSMSGS] "C:\Program Files\Messenger\msmsgs.exe" /background

O4 - HKCU\..\Run: [RealPlayer] "C:\Program Files\Real\RealOne Player\realplay.exe" /RunUPGToolCommandReBoot

O4 - HKCU\..\Run: [Messenger (Yahoo!)] "C:\PROGRA~1\Yahoo!\MESSEN~1\YAHOOM~1.EXE" -quiet

O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe

O4 - HKUS\S-1-5-18\..\Run: [symantec NetDriver Warning] C:\PROGRA~1\SYMNET~1\SNDWarn.exe (User 'SYSTEM')

O4 - HKUS\S-1-5-18\..\Run: [ALUAlert] C:\Program Files\Symantec\LiveUpdate\ALUNotify.exe (User 'SYSTEM')

O4 - HKUS\.DEFAULT\..\Run: [symantec NetDriver Warning] C:\PROGRA~1\SYMNET~1\SNDWarn.exe (User 'Default user')

O4 - S-1-5-18 Startup: Camio Viewer.lnk = C:\Program Files\Sierra Imaging\Image Expert\IXApplet.exe (User 'SYSTEM')

O4 - S-1-5-18 Startup: V CAST Music Monitor.lnk = C:\Program Files\Verizon Wireless\V CAST Music\V CAST Music Monitor.exe (User 'SYSTEM')

O4 - .DEFAULT Startup: Camio Viewer.lnk = C:\Program Files\Sierra Imaging\Image Expert\IXApplet.exe (User 'Default user')

O4 - .DEFAULT Startup: V CAST Music Monitor.lnk = C:\Program Files\Verizon Wireless\V CAST Music\V CAST Music Monitor.exe (User 'Default user')

O4 - Startup: Camio Viewer.lnk = C:\Program Files\Sierra Imaging\Image Expert\IXApplet.exe

O4 - Startup: V CAST Music Monitor.lnk = C:\Program Files\Verizon Wireless\V CAST Music\V CAST Music Monitor.exe

O4 - Global Startup: Adobe Reader Speed Launch.lnk = C:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe

O4 - Global Startup: Audible Download Manager.lnk = C:\Program Files\Audible\Bin\AudibleDownloadHelper.exe

O4 - Global Startup: BTTray.lnk = ?

O4 - Global Startup: WinZip Quick Pick.lnk = C:\Program Files\WinZip\WZQKPICK.EXE

O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\OFFICE11\EXCEL.EXE/3000

O8 - Extra context menu item: Easy-WebPrint Add To Print List - res://C:\Program Files\Canon\Easy-WebPrint\Resource.dll/RC_AddToList.html

O8 - Extra context menu item: Easy-WebPrint High Speed Print - res://C:\Program Files\Canon\Easy-WebPrint\Resource.dll/RC_HSPrint.html

O8 - Extra context menu item: Easy-WebPrint Preview - res://C:\Program Files\Canon\Easy-WebPrint\Resource.dll/RC_Preview.html

O8 - Extra context menu item: Easy-WebPrint Print - res://C:\Program Files\Canon\Easy-WebPrint\Resource.dll/RC_Print.html

O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\OFFICE11\REFIEBAR.DLL

O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe

O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe

O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe

O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe

O9 - Extra button: PDFill PDF Editor - {FB858B22-55E2-413f-87F5-30ADC5552151} - C:\Program Files\PlotSoft\PDFill\DownloadPDF.exe

O16 - DPF: {2DFF31F9-7893-4922-AF66-C9A1EB4EBB31} (Rhapsody Player Engine) - http://forms.real.com/real/player/download...ne_Inst_Win.cab

O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} (WUWebControl Class) - http://update.microsoft.com/windowsupdate/...b?1156016043611

O16 - DPF: {6A344D34-5231-452A-8A57-D064AC9B7862} (Symantec Download Manager) - https://webdl.symantec.com/activex/symdlmgr.cab

O23 - Service: Apple Mobile Device - Apple, Inc. - C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe

O23 - Service: Ati HotKey Poller - ATI Technologies Inc. - C:\WINDOWS\system32\Ati2evxx.exe

O23 - Service: Automatic LiveUpdate Scheduler - Symantec Corporation - C:\Program Files\Symantec\LiveUpdate\ALUSchedulerSvc.exe

O23 - Service: Bonjour Service - Apple Inc. - C:\Program Files\Bonjour\mDNSResponder.exe

O23 - Service: Bluetooth Service (btwdins) - WIDCOMM Inc. - C:\Program Files\Dell\Bluetooth Software\bin\btwdins.exe

O23 - Service: Symantec Event Manager (ccEvtMgr) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccSvcHst.exe

O23 - Service: Symantec Settings Manager (ccSetMgr) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccSvcHst.exe

O23 - Service: Symantec Lic NetConnect service (CLTNetCnService) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccSvcHst.exe

O23 - Service: COM Host (comHost) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\VAScanner\comHost.exe

O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe

O23 - Service: Intuit Update Service (IntuitUpdateService) - Intuit Inc. - C:\Program Files\Common Files\Intuit\Update Service\IntuitUpdateService.exe

O23 - Service: iPod Service - Apple Inc. - C:\Program Files\iPod\bin\iPodService.exe

O23 - Service: Symantec IS Password Validation (ISPwdSvc) - Symantec Corporation - C:\Program Files\Norton Internet Security\isPwdSvc.exe

O23 - Service: Java Quick Starter (JavaQuickStarterService) - Sun Microsystems, Inc. - C:\Program Files\Java\jre6\bin\jqs.exe

O23 - Service: LiveUpdate - Symantec Corporation - C:\PROGRA~1\Symantec\LIVEUP~1\LUCOMS~1.EXE

O23 - Service: LiveUpdate Notice Service Ex (LiveUpdate Notice Ex) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccSvcHst.exe

O23 - Service: LiveUpdate Notice Service - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\PIF\{B8E1DD85-8582-4c61-B58F-2F227FCA9A08}\PIFSvc.exe

O23 - Service: Norton Unerase Protection (NProtectService) - Symantec Corporation - C:\PROGRA~1\NORTON~2\NORTON~2\NPROTECT.EXE

O23 - Service: Speed Disk service - Symantec Corporation - C:\PROGRA~1\NORTON~2\NORTON~2\SPEEDD~1\NOPDB.EXE

O23 - Service: Symantec Core LC - Unknown owner - C:\Program Files\Common Files\Symantec Shared\CCPD-LC\symlcsvc.exe

O23 - Service: Symantec AppCore Service (SymAppCore) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\AppCore\AppSvc32.exe

O23 - Service: WLTRYSVC - Unknown owner - C:\WINDOWS\System32\wltrysvc.exe

O23 - Service: Yahoo! Updater (YahooAUService) - Yahoo! Inc. - C:\Program Files\Yahoo!\SoftwareUpdate\YahooAUService.exe

--

End of file - 12675 bytes

ComboFix 09-09-09.07 - phil 09/10/2009 18:02.1.1 - NTFSx86

Running from: c:\documents and settings\phil\Desktop\Combo-Fix.exe

AV: Norton Internet Security *On-access scanning disabled* (Updated) {E10A9785-9598-4754-B552-92431C1C35F8}

FW: Norton Internet Security *disabled* {7C21A4C9-F61F-4AC4-B722-A6E19C16F220}

* Created a new restore point

WARNING -THIS MACHINE DOES NOT HAVE THE RECOVERY CONSOLE INSTALLED !!

.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))

.

C:\-1260744873

c:\recycler\NPROTECT

c:\recycler\NPROTECT\00000000.DAT

c:\recycler\NPROTECT\00000001.DAT

c:\recycler\NPROTECT\00000002

c:\recycler\NPROTECT\00000003

c:\recycler\NPROTECT\00000004

c:\recycler\NPROTECT\00000005

c:\recycler\NPROTECT\00000006

c:\recycler\NPROTECT\00000007

c:\recycler\NPROTECT\00000009

c:\recycler\NPROTECT\00000011

c:\recycler\NPROTECT\00000012

c:\recycler\NPROTECT\00000013

c:\recycler\NPROTECT\00000014

c:\recycler\NPROTECT\00000016

c:\recycler\NPROTECT\00000017

c:\recycler\NPROTECT\00000020.DAT

c:\recycler\NPROTECT\00000021

c:\recycler\NPROTECT\00000022

c:\recycler\NPROTECT\00000023

c:\recycler\NPROTECT\00000024

c:\recycler\NPROTECT\00000025

c:\recycler\NPROTECT\00000026

c:\recycler\NPROTECT\00000027

c:\recycler\NPROTECT\00000029

c:\recycler\NPROTECT\00000030.DAT

c:\recycler\NPROTECT\00000031

c:\recycler\NPROTECT\00000032

c:\recycler\NPROTECT\00000033

c:\recycler\NPROTECT\00000034

c:\recycler\NPROTECT\00000035

c:\recycler\NPROTECT\00000036

c:\recycler\NPROTECT\00000037

c:\recycler\NPROTECT\00000038

c:\recycler\NPROTECT\00000039

c:\recycler\NPROTECT\00000040

c:\recycler\NPROTECT\00000041

c:\recycler\NPROTECT\00000042

c:\recycler\NPROTECT\00000043

c:\recycler\NPROTECT\00000044

c:\recycler\NPROTECT\00000045

c:\recycler\NPROTECT\00000046

c:\recycler\NPROTECT\00000047

c:\recycler\NPROTECT\00000048

c:\recycler\NPROTECT\00000051

c:\recycler\NPROTECT\00000052

c:\recycler\NPROTECT\00000053

c:\recycler\NPROTECT\00000055

c:\recycler\NPROTECT\00000056

c:\recycler\NPROTECT\00000057

c:\recycler\NPROTECT\00000058

c:\recycler\NPROTECT\00000059

c:\recycler\NPROTECT\00000060

c:\recycler\NPROTECT\00000061

c:\recycler\NPROTECT\00000062

c:\recycler\NPROTECT\00000063

c:\recycler\NPROTECT\00000064

c:\recycler\NPROTECT\00000066

c:\recycler\NPROTECT\00000067

c:\recycler\NPROTECT\00000068

c:\recycler\NPROTECT\00000069

c:\recycler\NPROTECT\00000072

c:\recycler\NPROTECT\00000073

c:\recycler\NPROTECT\00000074

c:\recycler\NPROTECT\00000075

c:\recycler\NPROTECT\00000077

c:\recycler\NPROTECT\00000079

c:\recycler\NPROTECT\00000080

c:\recycler\NPROTECT\00000081

c:\recycler\NPROTECT\00000082

c:\recycler\NPROTECT\00000083

c:\recycler\NPROTECT\00000084

c:\recycler\NPROTECT\00000086

c:\recycler\NPROTECT\00000087

c:\recycler\NPROTECT\00000088

c:\recycler\NPROTECT\00000090

c:\recycler\NPROTECT\00000091

c:\recycler\NPROTECT\00000092

c:\recycler\NPROTECT\00000093

c:\recycler\NPROTECT\00000095

c:\recycler\NPROTECT\00000096

c:\recycler\NPROTECT\00000097

c:\recycler\NPROTECT\00000098

c:\recycler\NPROTECT\00000099

c:\recycler\NPROTECT\00000100

c:\recycler\NPROTECT\00000102

c:\recycler\NPROTECT\00000103

c:\recycler\NPROTECT\00000104

c:\recycler\NPROTECT\00000105

c:\recycler\NPROTECT\00000106

c:\recycler\NPROTECT\00000108

c:\recycler\NPROTECT\00000109

c:\recycler\NPROTECT\00000110

c:\recycler\NPROTECT\00000111

c:\recycler\NPROTECT\00000112

c:\recycler\NPROTECT\00000113

c:\recycler\NPROTECT\00000114

c:\recycler\NPROTECT\00000115

c:\recycler\NPROTECT\00000116

c:\recycler\NPROTECT\00000117

c:\recycler\NPROTECT\00000121

c:\recycler\NPROTECT\00000122.dat

c:\recycler\NPROTECT\00000123.dat

c:\recycler\NPROTECT\00000124

c:\recycler\NPROTECT\00000125

c:\recycler\NPROTECT\00000126

c:\recycler\NPROTECT\00000127

c:\recycler\NPROTECT\00000128

c:\recycler\NPROTECT\00000129

c:\recycler\NPROTECT\00000130

c:\recycler\NPROTECT\00000131

c:\recycler\NPROTECT\00000133

c:\recycler\NPROTECT\00000135.dat

c:\recycler\NPROTECT\00000137

c:\recycler\NPROTECT\00000138.bat

c:\recycler\NPROTECT\00000139

c:\recycler\NPROTECT\00000140

c:\recycler\NPROTECT\00000141

c:\recycler\NPROTECT\00000142

c:\recycler\NPROTECT\00000143

c:\recycler\NPROTECT\00000144

c:\recycler\NPROTECT\00000146

c:\recycler\NPROTECT\00000147

c:\recycler\NPROTECT\00000149

c:\recycler\NPROTECT\00000150

c:\recycler\NPROTECT\00000151

c:\recycler\NPROTECT\00000154

c:\recycler\NPROTECT\00000155

c:\recycler\NPROTECT\00000156

c:\recycler\NPROTECT\00000157

c:\recycler\NPROTECT\00000158

c:\recycler\NPROTECT\00000159

c:\recycler\NPROTECT\00000160

c:\recycler\NPROTECT\00000162

c:\recycler\NPROTECT\00000163

c:\recycler\NPROTECT\00000164

c:\recycler\NPROTECT\00000165

c:\recycler\NPROTECT\00000166

c:\recycler\NPROTECT\00000167

c:\recycler\NPROTECT\00000168

c:\recycler\NPROTECT\00000169

c:\recycler\NPROTECT\00000170

c:\recycler\NPROTECT\00000171

c:\recycler\NPROTECT\00000172

c:\recycler\NPROTECT\00000173

c:\recycler\NPROTECT\00000174

c:\recycler\NPROTECT\00000175

c:\recycler\NPROTECT\00000176

c:\recycler\NPROTECT\00000177

c:\recycler\NPROTECT\00000178

c:\recycler\NPROTECT\00000179

c:\recycler\NPROTECT\00000180

c:\recycler\NPROTECT\00000181

c:\recycler\NPROTECT\00000183

c:\recycler\NPROTECT\00000184

c:\recycler\NPROTECT\00000185

c:\recycler\NPROTECT\00000186

c:\recycler\NPROTECT\00000189

c:\recycler\NPROTECT\00000192.SYS

c:\recycler\NPROTECT\00000193

c:\recycler\NPROTECT\00000194

c:\recycler\NPROTECT\00000195

c:\recycler\NPROTECT\00000196

c:\recycler\NPROTECT\00000197

c:\recycler\NPROTECT\00000198

c:\recycler\NPROTECT\00000199

c:\recycler\NPROTECT\00000200

c:\recycler\NPROTECT\00000201

c:\recycler\NPROTECT\00000202

c:\recycler\NPROTECT\00000203.dat

c:\recycler\NPROTECT\00000204

c:\recycler\NPROTECT\00000205.bad

c:\recycler\NPROTECT\00000206

c:\recycler\NPROTECT\00000207

c:\recycler\NPROTECT\00000208

c:\recycler\NPROTECT\00000209

c:\recycler\NPROTECT\00000210

c:\recycler\NPROTECT\00000216

c:\recycler\NPROTECT\00000218.md5

c:\recycler\NPROTECT\NPROTECT.LOG

c:\windows\system32\drivers\fad.sys

c:\windows\system32\drivers\UACwmhqklmnfo.sys

c:\windows\system32\system

c:\windows\system32\system\msxml4.dll

c:\windows\system32\system\msxml4r.dll

c:\windows\system32\uacinit.dll

c:\windows\system32\UACnoukvmkpkk.dll

c:\windows\system32\UACpwwgqhvuiu.dll

c:\windows\system32\UACrnjpvqqynx.dll

c:\windows\system32\UACubkjdtqklt.dat

c:\windows\system32\UACwjotalaicp.dll

c:\windows\system32\wscsvc32.exe

.

((((((((((((((((((((((((((((((((((((((( Drivers/Services )))))))))))))))))))))))))))))))))))))))))))))))))

.

-------\Service_UACd.sys

-------\Legacy_UACd.sys

((((((((((((((((((((((((( Files Created from 2009-08-10 to 2009-09-10 )))))))))))))))))))))))))))))))

.

2009-09-08 18:02 . 2009-09-08 18:02 -------- d-----w- c:\program files\Trend Micro

2009-09-07 01:03 . 2009-09-07 01:03 -------- d-----w- c:\documents and settings\phil\Application Data\Malwarebytes

2009-09-07 01:00 . 2009-08-03 17:36 38160 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys

2009-09-07 01:00 . 2009-09-07 01:02 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware

2009-09-07 01:00 . 2009-09-07 01:00 -------- d-----w- c:\documents and settings\All Users\Application Data\Malwarebytes

2009-09-07 01:00 . 2009-08-03 17:36 19096 ----a-w- c:\windows\system32\drivers\mbam.sys

2009-08-25 20:56 . 2009-08-25 20:56 -------- d-----w- c:\windows\system32\XPSViewer

2009-08-25 20:56 . 2009-08-25 20:56 -------- d-----w- c:\program files\MSBuild

2009-08-25 20:56 . 2009-08-25 20:56 -------- d-----w- c:\program files\Reference Assemblies

2009-08-25 20:54 . 2008-07-06 12:06 89088 -c----w- c:\windows\system32\dllcache\filterpipelineprintproc.dll

2009-08-25 20:54 . 2008-07-06 12:06 117760 ------w- c:\windows\system32\prntvpt.dll

2009-08-25 20:54 . 2008-07-06 10:50 597504 -c----w- c:\windows\system32\dllcache\printfilterpipelinesvc.exe

2009-08-25 20:54 . 2008-07-06 12:06 575488 -c----w- c:\windows\system32\dllcache\xpsshhdr.dll

2009-08-25 20:54 . 2008-07-06 12:06 575488 ------w- c:\windows\system32\xpsshhdr.dll

2009-08-25 20:54 . 2008-07-06 12:06 1676288 -c----w- c:\windows\system32\dllcache\xpssvcs.dll

2009-08-25 20:54 . 2008-07-06 12:06 1676288 ------w- c:\windows\system32\xpssvcs.dll

2009-08-25 20:54 . 2009-08-25 20:55 -------- d-----w- C:\66b41c15ca8c7d686e66f55fe2fe3c

2009-08-25 20:53 . 2009-08-25 21:19 -------- d-----w- c:\windows\SxsCaPendDel

2009-08-25 20:45 . 2009-08-25 20:45 -------- d-----w- c:\program files\MSXML 6.0

2009-08-19 21:52 . 2009-08-19 21:52 -------- d-----w- c:\program files\MSXML 4.0

2009-08-18 13:48 . 2009-01-09 18:33 1848608 ----a-w- c:\windows\system32\acXMLParser.dll

2009-08-18 13:48 . 2009-01-09 18:33 3523872 ----a-w- c:\windows\system32\cdintf300.dll

2009-08-18 13:46 . 2009-08-18 13:56 -------- d-----w- c:\program files\Quicken

2009-08-18 13:03 . 2009-08-18 13:05 -------- d-----w- c:\documents and settings\All Users\Application Data\NortonInstaller

2009-08-18 12:58 . 2009-08-18 12:58 -------- d-----w- c:\documents and settings\All Users\Symantec Temporary Files

.

(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))

.

2009-09-10 22:20 . 2006-08-19 19:09 -------- d-----w- c:\program files\Common Files\Symantec Shared

2009-09-06 07:34 . 2006-08-19 19:09 -------- d-----w- c:\documents and settings\All Users\Application Data\Symantec

2009-09-02 13:01 . 2008-08-03 20:14 512 ----a-w- C:\drmHeader.bin

2009-08-25 22:04 . 2006-08-19 22:22 65664 ----a-w- c:\documents and settings\phil\Local Settings\Application Data\GDIPFONTCACHEV1.DAT

2009-08-24 00:30 . 2006-08-20 00:53 -------- d-----w- c:\program files\Norton SystemWorks

2009-08-18 13:49 . 2009-04-12 01:54 -------- d-----w- c:\program files\Common Files\AnswerWorks 5.0

2009-08-18 13:49 . 2006-08-19 17:30 -------- d--h--w- c:\program files\InstallShield Installation Information

2009-08-05 09:11 . 2006-08-19 18:18 204800 ----a-w- c:\windows\system32\mswebdvd.dll

2009-07-17 18:55 . 2003-07-16 16:18 58880 ----a-w- c:\windows\system32\atl.dll

2009-07-15 12:25 . 2006-09-05 10:49 -------- d-----w- c:\documents and settings\phil\Application Data\Canon

2009-07-14 03:43 . 2004-08-04 07:56 286208 ----a-w- c:\windows\system32\wmpdxm.dll

2009-07-03 17:09 . 2006-06-23 15:33 915456 ----a-w- c:\windows\system32\wininet.dll

2009-06-25 18:36 . 2003-07-16 16:29 471552 ----a-w- c:\windows\system32\mqutil.dll

2009-06-25 18:36 . 2003-07-16 16:29 48640 ----a-w- c:\windows\system32\mqupgrd.dll

2009-06-25 18:36 . 2003-07-16 16:29 186880 ----a-w- c:\windows\system32\mqtrig.dll

2009-06-25 18:36 . 2003-07-16 16:29 517120 ----a-w- c:\windows\system32\mqsnap.dll

2009-06-25 18:36 . 2003-07-16 16:29 95744 ----a-w- c:\windows\system32\mqsec.dll

2009-06-25 18:36 . 2003-07-16 16:29 177152 ----a-w- c:\windows\system32\mqrt.dll

2009-06-25 18:36 . 2003-07-16 16:29 123392 ----a-w- c:\windows\system32\mqrtdep.dll

2009-06-25 18:36 . 2003-07-16 16:29 661504 ----a-w- c:\windows\system32\mqqm.dll

2009-06-25 18:36 . 2003-07-16 16:29 225280 ----a-w- c:\windows\system32\mqoa.dll

2009-06-25 18:36 . 2003-07-16 16:28 47104 ----a-w- c:\windows\system32\mqdscli.dll

2009-06-25 18:36 . 2003-07-16 16:28 16896 ----a-w- c:\windows\system32\mqise.dll

2009-06-25 18:36 . 2003-07-16 16:28 138240 ----a-w- c:\windows\system32\mqad.dll

2009-06-25 08:44 . 2005-06-15 17:50 298496 ----a-w- c:\windows\system32\kerberos.dll

2009-06-25 08:44 . 2003-07-16 16:44 59392 ----a-w- c:\windows\system32\wdigest.dll

2009-06-25 08:44 . 2003-07-16 16:38 56320 ----a-w- c:\windows\system32\secur32.dll

2009-06-25 08:44 . 2003-07-16 16:37 168448 ----a-w- c:\windows\system32\schannel.dll

2009-06-25 08:44 . 2003-07-16 16:31 133632 ----a-w- c:\windows\system32\msv1_0.dll

2009-06-25 08:44 . 2003-07-16 16:26 724480 ----a-w- c:\windows\system32\lsasrv.dll

2009-06-22 11:49 . 2003-07-16 16:29 117248 ----a-w- c:\windows\system32\mqtgsvc.exe

2009-06-22 11:49 . 2003-07-16 16:28 19968 ----a-w- c:\windows\system32\mqbkup.exe

2009-06-22 11:49 . 2003-07-16 16:29 4608 ----a-w- c:\windows\system32\mqsvc.exe

2009-06-22 11:48 . 2003-07-16 16:28 91776 ----a-w- c:\windows\system32\drivers\mqac.sys

2009-06-22 11:34 . 2003-07-16 16:26 92544 ----a-w- c:\windows\system32\drivers\ksecdd.sys

2009-06-16 14:55 . 2003-07-16 16:41 119808 ----a-w- c:\windows\system32\t2embed.dll

2009-06-16 14:55 . 2003-07-16 16:22 82432 ----a-w- c:\windows\system32\fontsub.dll

.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))

.

.

*Note* empty entries & legit default entries are not shown

REGEDIT4

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]

"MSMSGS"="c:\program files\Messenger\msmsgs.exe" [2004-10-13 1694208]

"RealPlayer"="c:\program files\Real\RealOne Player\realplay.exe" [2006-08-19 1003520]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]

"Dell QuickSet"="c:\program files\Dell\QuickSet\Quickset.exe" [2003-06-20 368640]

"Apoint"="c:\program files\Apoint\Apoint.exe" [2003-08-21 151552]

"ATIPTA"="c:\program files\ATI Technologies\ATI Control Panel\atiptaxx.exe" [2003-07-29 335872]

"mmtask"="c:\program files\MusicMatch\MusicMatch Jukebox\mmtask.exe" [2003-10-06 53248]

"MMTray"="c:\program files\MUSICMATCH\MUSICMATCH Jukebox\mm_tray.exe" [2003-10-06 118784]

"TkBellExe"="c:\program files\Common Files\Real\Update_OB\realsched.exe" [2006-08-19 151597]

"dla"="c:\windows\system32\dla\tfswctrl.exe" [2003-08-06 114741]

"StorageGuard"="c:\program files\Common Files\Sonic\Update Manager\sgtray.exe" [2003-02-13 155648]

"DwlClient"="c:\program files\Common Files\Dell\EUSW\Support.exe" [2003-10-07 294912]

"AcctMgr"="c:\program files\Norton SystemWorks\Password Manager\AcctMgr.exe" [2004-08-18 586896]

"OpwareSE2"="c:\program files\ScanSoft\OmniPageSE2.0\OpwareSE2.exe" [2003-05-08 49152]

"ccApp"="c:\program files\Common Files\Symantec Shared\ccApp.exe" [2007-01-10 115816]

"osCheck"="c:\program files\Norton Internet Security\osCheck.exe" [2006-09-06 26248]

"PSDiagnosticM"="c:\program files\Linksys Wireless-G Print Server\PSDiagnosticM.exe" [2007-02-27 315392]

"QuickTime Task"="c:\program files\QuickTime\qttask.exe" [2008-02-01 385024]

"iTunesHelper"="c:\program files\iTunes\iTunesHelper.exe" [2008-02-19 267048]

"Symantec PIF AlertEng"="c:\program files\Common Files\Symantec Shared\PIF\{B8E1DD85-8582-4c61-B58F-2F227FCA9A08}\PIFSvc.exe" [2008-01-29 583048]

"SunJavaUpdateSched"="c:\program files\Java\jre6\bin\jusched.exe" [2008-11-30 136600]

"BCMSMMSG"="BCMSMMSG.exe" - c:\windows\BCMSMMSG.exe [2003-08-29 122880]

"WD Button Manager"="WDBtnMgr.exe" - c:\windows\system32\WDBtnMgr.exe [2007-07-01 339968]

[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run]

"Symantec NetDriver Warning"="c:\progra~1\SYMNET~1\SNDWarn.exe" [2004-10-29 218232]

"ALUAlert"="c:\program files\Symantec\LiveUpdate\ALUNotify.exe" [2006-09-02 100032]

c:\documents and settings\phil\Start Menu\Programs\Startup\

Camio Viewer.lnk - c:\program files\Sierra Imaging\Image Expert\IXApplet.exe [2007-2-4 103424]

V CAST Music Monitor.lnk - c:\program files\Verizon Wireless\V CAST Music\V CAST Music Monitor.exe [2005-11-30 327680]

c:\documents and settings\All Users\Start Menu\Programs\Startup\

Adobe Reader Speed Launch.lnk - c:\program files\Adobe\Acrobat 7.0\Reader\reader_sl.exe [2005-9-23 29696]

Audible Download Manager.lnk - c:\program files\Audible\Bin\AudibleDownloadHelper.exe [2007-12-26 1697112]

BTTray.lnk - c:\program files\Dell\Bluetooth Software\BTTray.exe [2003-7-2 393277]

WinZip Quick Pick.lnk - c:\program files\WinZip\WZQKPICK.EXE [2006-8-26 118784]

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring]

"DisableMonitoring"=dword:00000001

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecAntiVirus]

"DisableMonitoring"=dword:00000001

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecFirewall]

"DisableMonitoring"=dword:00000001

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]

"EnableFirewall"= 0 (0x0)

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]

"%windir%\\system32\\sessmgr.exe"=

"%windir%\\Network Diagnostic\\xpnetdiag.exe"=

"c:\\Program Files\\Bonjour\\mDNSResponder.exe"=

"c:\\Program Files\\iTunes\\iTunes.exe"=

"c:\\Program Files\\Yahoo!\\Messenger\\YahooMessenger.exe"=

R2 HPFECP12;HPFECP12;c:\windows\system32\drivers\HPFecp12.sys [4/9/1999 8:26 AM 52800]

R2 NProtectService;Norton Unerase Protection;c:\progra~1\NORTON~2\NORTON~2\NPROTECT.EXE [11/24/2003 12:49 PM 81920]

R3 EraserUtilRebootDrv;EraserUtilRebootDrv;c:\program files\Common Files\Symantec Shared\EENGINE\EraserUtilRebootDrv.sys [9/5/2009 3:08 PM 102448]

R3 lknuhst;Linksys Network USB Host Controller;c:\windows\system32\drivers\lknuhst.sys [3/9/2008 2:16 PM 11136]

R3 LKNUHUB;Linksys Network USB Root Hub;c:\windows\system32\drivers\lknuhub.sys [3/9/2008 2:16 PM 37248]

R3 OZSCR;O2Micro SmartCardBus Smartcard Reader;c:\windows\system32\drivers\ozscr.sys [8/19/2006 2:28 PM 92550]

S2 IntuitUpdateService;Intuit Update Service;c:\program files\Common Files\Intuit\Update Service\IntuitUpdateService.exe [10/10/2008 5:45 AM 13088]

S3 LKNUCMP;Linksys Network USB Composite Device;c:\windows\system32\drivers\lknucmp.sys [3/9/2008 2:16 PM 11648]

--- Other Services/Drivers In Memory ---

*NewlyCreated* - COMHOST

[HKEY_LOCAL_MACHINE\software\microsoft\active setup\installed components\>{60B49E34-C7CC-11D0-8953-00A0C90347FF}]

"c:\windows\system32\rundll32.exe" "c:\windows\system32\iedkcs32.dll",BrandIEActiveSetup SIGNUP

.

Contents of the 'Scheduled Tasks' folder

2009-09-07 c:\windows\Tasks\AppleSoftwareUpdate.job

- c:\program files\Apple Software Update\SoftwareUpdate.exe [2007-08-29 17:34]

2009-09-06 c:\windows\Tasks\Norton Internet Security - Run Full System Scan - phil.job

- c:\progra~1\NORTON~1\NORTON~1\Navw32.exe [2006-09-07 05:38]

2009-09-04 c:\windows\Tasks\Norton SystemWorks One Button Checkup.job

- c:\program files\Norton SystemWorks\OBC.exe [2003-12-16 19:04]

2009-09-10 c:\windows\Tasks\Symantec Drmc.job

- c:\program files\Common Files\Symantec Shared\SymDrmc.exe [2003-09-10 08:48]

2009-09-10 c:\windows\Tasks\WGASetup.job

- c:\windows\system32\KB905474\wgasetup.exe [2009-05-12 02:18]

.

.

------- Supplementary Scan -------

.

uStart Page = hxxp://www.yahoo.com/

mStart Page = hxxp://www.google.com

uInternet Settings,ProxyOverride = *.local

IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~2\OFFICE11\EXCEL.EXE/3000

IE: Easy-WebPrint Add To Print List - c:\program files\Canon\Easy-WebPrint\Resource.dll/RC_AddToList.html

IE: Easy-WebPrint High Speed Print - c:\program files\Canon\Easy-WebPrint\Resource.dll/RC_HSPrint.html

IE: Easy-WebPrint Preview - c:\program files\Canon\Easy-WebPrint\Resource.dll/RC_Preview.html

IE: Easy-WebPrint Print - c:\program files\Canon\Easy-WebPrint\Resource.dll/RC_Print.html

Trusted Zone: turbotax.com

.

**************************************************************************

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net

Rootkit scan 2009-09-10 18:24

Windows 5.1.2600 Service Pack 2 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully

hidden files: 0

**************************************************************************

.

--------------------- LOCKED REGISTRY KEYS ---------------------

[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{19114156-8E9A-4D4E-9EE9-17A0E48D3BBB}]

@Denied: (A 2) (Everyone)

@="FlashBroker"

"LocalizedString"="@c:\\WINDOWS\\system32\\Macromed\\Flash\\FlashUtil10c.exe,-101"

[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{19114156-8E9A-4D4E-9EE9-17A0E48D3BBB}\Elevation]

"Enabled"=dword:00000001

[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{19114156-8E9A-4D4E-9EE9-17A0E48D3BBB}\LocalServer32]

@="c:\\WINDOWS\\system32\\Macromed\\Flash\\FlashUtil10c.exe"

[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{19114156-8E9A-4D4E-9EE9-17A0E48D3BBB}\TypeLib]

@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"

[HKEY_LOCAL_MACHINE\software\Classes\Interface\{1D4C8A81-B7AC-460A-8C23-98713C41D6B3}]

@Denied: (A 2) (Everyone)

@="IFlashBroker3"

[HKEY_LOCAL_MACHINE\software\Classes\Interface\{1D4C8A81-B7AC-460A-8C23-98713C41D6B3}\ProxyStubClsid32]

@="{00020424-0000-0000-C000-000000000046}"

[HKEY_LOCAL_MACHINE\software\Classes\Interface\{1D4C8A81-B7AC-460A-8C23-98713C41D6B3}\TypeLib]

@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"

"Version"="1.0"

.

--------------------- DLLs Loaded Under Running Processes ---------------------

- - - - - - - > 'winlogon.exe'(696)

c:\windows\system32\Ati2evxx.dll

c:\windows\system32\msv1_0.dll

- - - - - - - > 'explorer.exe'(532)

c:\windows\system32\WININET.dll

c:\program files\ScanSoft\OmniPageSE2.0\ophookSE2.dll

c:\windows\system32\ieframe.dll

c:\windows\system32\webcheck.dll

c:\windows\system32\WPDShServiceObj.dll

c:\windows\System32\btncopy.dll

c:\windows\system32\PortableDeviceTypes.dll

c:\windows\system32\PortableDeviceApi.dll

.

------------------------ Other Running Processes ------------------------

.

SystemRoot\System32\smss.exe [608]

??\c:\windows\system32\csrss.exe [664]

??\c:\windows\system32\winlogon.exe [696]

c:\windows\system32\services.exe [740]

c:\windows\system32\lsass.exe [752]

c:\windows\system32\Ati2evxx.exe [948]

c:\windows\system32\svchost.exe [976]

c:\windows\system32\svchost.exe [1068]

c:\windows\System32\svchost.exe [1108]

c:\windows\system32\svchost.exe [1152]

c:\windows\System32\svchost.exe [1260]

c:\windows\system32\svchost.exe [1288]

c:\program files\Common Files\Symantec Shared\ccSvcHst.exe [1356]

c:\windows\system32\Ati2evxx.exe [1528]

c:\program files\Common Files\Symantec Shared\AppCore\AppSvc32.exe [1840]

c:\windows\system32\spoolsv.exe [380]

c:\windows\system32\CF3736.exe [460]

c:\windows\System32\SCardSvr.exe [600]

c:\windows\System32\svchost.exe [1244]

c:\program files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe [1536]

c:\program files\Symantec\LiveUpdate\ALUSchedulerSvc.exe [1720]

c:\program files\Dell\QuickSet\Quickset.exe [1800]

c:\windows\BCMSMMSG.exe [1820]

c:\program files\Apoint\Apoint.exe [1836]

c:\program files\ATI Technologies\ATI Control Panel\atiptaxx.exe [1864]

c:\program files\MusicMatch\MusicMatch Jukebox\mmtask.exe [1888]

c:\program files\MUSICMATCH\MUSICMATCH Jukebox\mm_tray.exe [1900]

c:\program files\Common Files\Real\Update_OB\realsched.exe [1904]

c:\windows\system32\dla\tfswctrl.exe [1064]

c:\program files\Common Files\Dell\EUSW\Support.exe [1940]

c:\program files\Norton SystemWorks\Password Manager\AcctMgr.exe [2012]

c:\program files\ScanSoft\OmniPageSE2.0\OpwareSE2.exe [2020]

c:\program files\Common Files\Symantec Shared\ccApp.exe [2032]

c:\windows\system32\WDBtnMgr.exe [2052]

c:\program files\Bonjour\mDNSResponder.exe [2144]

c:\program files\Apoint\Apntex.exe [2204]

c:\program files\iTunes\iTunesHelper.exe [2212]

c:\program files\Java\jre6\bin\jusched.exe [2260]

c:\program files\Messenger\msmsgs.exe [2276]

c:\progra~1\Yahoo!\MESSEN~1\YAHOOM~1.EXE [2292]

c:\program files\Dell\Support\Alert\bin\NotifyAlert.exe [2300]

c:\program files\Dell\Bluetooth Software\bin\btwdins.exe [2316]

c:\program files\Java\jre6\bin\jqs.exe [2420]

c:\progra~1\NORTON~2\NORTON~2\NPROTECT.EXE [2484]

c:\progra~1\NORTON~2\NORTON~2\SPEEDD~1\NOPDB.EXE [2524]

c:\windows\System32\svchost.exe [2572]

c:\program files\Common Files\Symantec Shared\CCPD-LC\symlcsvc.exe [2592]

c:\program files\Audible\Bin\AudibleDownloadHelper.exe [2692]

c:\windows\System32\wltrysvc.exe [2704]

c:\program files\Dell\Bluetooth Software\BTTray.exe [2708]

c:\program files\WinZip\WZQKPICK.EXE [2792]

c:\windows\System32\bcmwltry.exe [2804]

c:\program files\Yahoo!\SoftwareUpdate\YahooAUService.exe [2824]

c:\program files\Sierra Imaging\Image Expert\IXApplet.exe [2860]

c:\program files\Verizon Wireless\V CAST Music\V CAST Music Monitor.exe [2896]

c:\windows\system32\wbem\wmiprvse.exe [3688]

c:\windows\system32\wbem\wmiprvse.exe [3764]

c:\program files\iPod\bin\iPodService.exe [3752]

c:\windows\System32\wbem\wmiapsrv.exe [3940]

c:\windows\system32\wuauclt.exe [1660]

c:\windows\System32\alg.exe [880]

c:\windows\explorer.exe [532]

c:\combo-fix\catchme.cfxxe [428]

.

**************************************************************************

.

Completion time: 2009-09-10 18:30 - machine was rebooted

ComboFix-quarantined-files.txt 2009-09-10 22:30

Pre-Run: 12,736,557,056 bytes free

Post-Run: 16,255,135,744 bytes free

484 --- E O F --- 2009-09-04 19:41

Link to post
Share on other sites

  • Root Admin

Version 1.40 of MBAM was not able to remove all of the TDSS and was updated in 1.41 to deal with it.

Please run the following to remove any tools that might have been used during the scanning and cleaning of your system.

STEP A

Uninstall ComboFix.exe

  • Click
    START
    then
    RUN

  • Now type
    Combofix /u
    (if you renamed Combofix.exe use that name instead)
    in the runbox and click OK. Note the
    space
    between the
    X
    and the
    /U
    , it needs to be there.

  • CF_Cleanup.png


  • When shown the disclaimer, Select "2"

Remove this folder C:\QooBox if the uninstall instructions don't work and delete Combofix.exe AND check your system time and reset if needed

    Download and install CCleaner
  • CCleaner
  • Double-click on the downloaded file "ccsetup223_slim.exe" and install the application.
  • Keep the default installation folder "C:\Program Files\CCleaner"
  • Click finish when done and close ALL PROGRAMS
  • Start the CCleaner program.
  • Click on Registry and Uncheck Registry Integrity so that it does not run (basically the very top, uncheck it)
  • Click on Options - Advanced and Uncheck "Only delete files in Windows Temp folders older than 48 hours"
  • Click back to Cleaner and under SYSTEM uncheck the Memory Dumps and Windows Log Files
  • Click on Run Cleaner button on the bottom right side of the program.
  • Click OK to any prompts

Please temporarily disable your current Anti-Virus in order to run this Online AV scanner.

Run Eset NOD32 Online AntiVirus

Note: You will need to use Internet Explorer for this scan.

  • Tick the box next to YES, I accept the Terms of Use.
  • Click Start
  • When asked, allow the activex control to install
  • Disable your current Antivirus software. You can usually do this with its Notfication Tray icon near the clock.
  • Click Start
  • Make sure that the option "Remove found threats" is Un-checked, and the option "Scan unwanted applications" is checked
  • Click Scan
  • Wait for the scan to finish
  • Re-enable your Anvirisus software.
  • A logfile is created and located at C:\Program Files\EsetOnlineScanner\log.txt. Please include this on your post.

Link to post
Share on other sites

I will do these.

But, there seems to be an additional problem. After I posted the logs, i ran MBAM 1.41 again. It found no threats. BUT, while it was running, my antivirus program automatically detected an active 'threat' and requested a restart to complete repair. I did this. I found it strange that MBAM did not detect a problem, so I am running a full scan again. It is now running very slowly. There is a process (ccSvcHst.exe) that is using a lot of memory and cpu as seen in the windows task manager. (I have seen this behavior from time to time).

I will wait for this scan to complete and then do the tasks you list, unless there is something else to try.

Link to post
Share on other sites

  • Root Admin

That is part of your Symantec Anti-Virus and is normal. It may have been doing updates which slows the computer down while it does that as they're often big downloads.

C:\Program Files\Common Files\Symantec Shared\ccSvcHst.exe

C:\Program Files\Common Files\Symantec Shared\AppCore\AppSvc32.exe

Make sure you temporarily disable your Symantec AV when you run the NOD32 scan and then post back that log please.

Link to post
Share on other sites

new problems?

I mentioned in my last post that i was running an antivirus scan. Though slow, it ran and found 'virusblast'. after a restart, I ran MBAM again (same version and definition set as before) and it now finds something new called rogue.multiple and roguepcvirusless in a registry key and registry values. (I am posting from a different computer and can not post the logs, but I will if you need).

The computer has not been online except to post the previous logs and post to this topic. I'm a bit hesitant to go online and perform your scans especially since they require me to disable virus protection. Should I still do this? Or is there something else?

Link to post
Share on other sites

  • Root Admin

Have your current AV quarantine it. But it needs an update too so regardless you need to get the PC back online in order to get updates and do the other scans as well. Updates to AV and other scanners are done daily and some hourly so using old stuff is not good enough.

Please complete the scans as requested.

Link to post
Share on other sites

Okay. Several cycles of MBAM, my AV and computer restarts finally produced a series of 'clean' scans.

The automatic combifix removal did not work (a dialog box said something like program not found), so I manually discarded it and the folder you mentioned.

I ran cccleaner and ran the online scan you suggested. Here is that log:

ESETSmartInstaller@High as CAB hook log:

OnlineScanner.ocx - registred OK

# version=6

# IEXPLORE.EXE=8.00.6001.18702 (longhorn_ie8_rtm(wmbla).090308-0339)

# OnlineScanner.ocx=1.0.0.6050

# api_version=3.0.2

# EOSSerial=057595faf885a844af71727d95eb60c4

# end=finished

# remove_checked=false

# archives_checked=false

# unwanted_checked=true

# unsafe_checked=false

# antistealth_checked=true

# utc_time=2009-09-18 01:25:39

# local_time=2009-09-17 09:25:39 (-0500, Eastern Daylight Time)

# country="United States"

# lang=1033

# osver=5.1.2600 NT Service Pack 2

# compatibility_mode=3586 38 80 23 375292719691184

# scanned=128365

# found=0

# cleaned=0

# scan_time=4749

What's next?

Link to post
Share on other sites

  • Root Admin

Well I'd like to see one last MBAM log please.

Update and Scan with Malwarebytes' Anti-Malware

  • Start MalwareBytes AntiMalware (Vista users must Right click and choose RunAs Admin)
  • Please DO NOT run MBAM in Safe Mode unless requested to, you MUST run it in normal Windows mode.
    • Update Malwarebytes' Anti-Malware
    • Select the Update tab
    • Click Update

    [*]When the update is complete, select the Scanner tab

    [*]Select Perform quick scan, then click Scan.

    [*]When the scan is complete, click OK, then Show Results to view the results.

    [*]Be sure that everything is checked, and click Remove Selected.

    [*]When completed, a log will open in Notepad. please copy and paste the log into your next reply

    • If you accidently close it, the log file is saved here and will be named like this:
    • C:\Documents and Settings\Username\Application Data\Malwarebytes\Malwarebytes' Anti-Malware\Logs\mbam-log-date (time).txt

Then post back the MBAM log

Link to post
Share on other sites

Here is the last MBAM log from yesterday after my post:

Malwarebytes' Anti-Malware 1.41

Database version: 2815

Windows 5.1.2600 Service Pack 2

9/17/2009 11:37:32 PM

mbam-log-2009-09-17 (23-37-32).txt

Scan type: Full Scan (C:\|D:\|)

Objects scanned: 203618

Time elapsed: 1 hour(s), 32 minute(s), 49 second(s)

Memory Processes Infected: 0

Memory Modules Infected: 0

Registry Keys Infected: 0

Registry Values Infected: 0

Registry Data Items Infected: 0

Folders Infected: 0

Files Infected: 0

Memory Processes Infected:

(No malicious items detected)

Memory Modules Infected:

(No malicious items detected)

Registry Keys Infected:

(No malicious items detected)

Registry Values Infected:

(No malicious items detected)

Registry Data Items Infected:

(No malicious items detected)

Folders Infected:

(No malicious items detected)

Files Infected:

(No malicious items detected)

Everything seems to be operating OK so far. There was an external hard drive that had been connected but is now shut off. Can I just reconnect that and scan it with MBAM, or is there a better way to do that?

Link to post
Share on other sites

  • Root Admin

MBAM is not really designed for that type of scanning as it's not in an active area of the system. Make sure you Anti-Virus is up to date and then connect it and do a FULL scan with your AV

Please run the following to remove any tools that might have been used during the scanning and cleaning of your system.

STEP A

Uninstall ComboFix.exe

  • Click
    START
    then
    RUN

  • Now type
    Combofix /u
    (if you renamed Combofix.exe use that name instead)
    in the runbox and click OK. Note the
    space
    between the
    X
    and the
    /U
    , it needs to be there.

  • CF_Cleanup.png


  • When shown the disclaimer, Select "2"

Remove this folder C:\QooBox if the uninstall instructions don't work and delete Combofix.exe AND check your system time and reset if needed

Great, all looks good now.

I'll close your post soon so that other don't post into it and leave you with this information and suggestions.

So how did I get infected in the first place?

At this time your system appears to be clean. Nothing else in the logs indicates that you are still infected.

Now that you appear to be clean, please follow these simple steps in order to keep your computer clean and secure:

Remove all but the most recent Restore Point on Windows XP

You should
Create a New Restore Point
to prevent possible reinfection from an old one.

Some of the malware you picked up could have been saved in System Restore.

Since this is a protected directory your tools cannot access to delete these files, they sometimes can reinfect your system if you accidentally use an old restore point.

Setting a new restore point AFTER cleaning your system will help prevent this and enable your computer to
"roll-back"
to a clean working state.

The easiest and safest way to do this is

:
  • Go to
    Start
    >
    Programs
    >
    Accessories
    >
    System Tools
    and click "
    System Restore
    ".

  • If the shortcut is missing you can also click on
    START
    >
    RUN
    > and type in
    %SystemRoot%\system32\restore\rstrui.exe
    and click OK

  • Choose the radio button marked "
    Create a Restore Point
    " on the first screen then click "
    Next
    ".

  • Give the new Restore Point a name, then click "
    Create
    ".

  • The new point will be stamped with the current date and time. Keep a log of this so you can find it easily should you need to use System Restore.

  • Then use the
    Disk Cleanup
    to remove all but the most recently created Restore Point.

  • Go to
    Start
    >
    Run
    and type:
    Cleanmgr.exe

  • Select the drive where Windows is installed and click "
    Ok
    ". Disk Cleanup will scan your files for several minutes, then open.

  • Click the "
    More Options
    " tab, then click the "
    Clean up
    " button under System Restore.

  • Click Ok. You will be prompted with "
    Are you sure you want to delete all but the most recent restore point?
    "

  • Click
    Yes
    , then click Ok.

  • Click
    Yes
    again when prompted with "
    Are you sure you want to perform these actions?
    "

  • Disk Cleanup will remove the files and close automatically.

  • On the
    Disk Cleanup
    tab, if the
    System Restore: Obsolete Data Stores
    entry is available remove them also.

  • These are files that were created before Windows was reformatted or reinstalled. They are obsolete and you can delete them.

selectdrivecleanup.pngselectdrivecleanup1.png

Additional information

Microsoft KB article: How to turn off and turn on System Restore in Windows XP

Bert Kinney's site: All about Windows System Restore

Here are some free programs I recommend that could help you improve your computer's security.

Install SpyWare Blaster

Download it from here

Find here the tutorial on how to use Spyware Blaster here

Install WinPatrol

Download it from here

Here you can find information about how WinPatrol works here

Install FireTrust SiteHound

You can find information and download it from here

Install hpHosts

Download it from here

hpHosts is a community managed and maintained hosts file that allows an additional layer of protection against access to ad,

tracking and malicious websites. This prevents your computer from connecting to these untrusted sites

by redirecting them to 127.0.0.1 which is your own local computer.

hpHosts Support Forum

Update your Antivirus programs and other security products regularly to avoid new threats that could infect your system.

You can use one of these sites to check if any updates are needed for your pc.

Secunia Software Inspector

F-secure Health Check

Visit Microsoft often to get the latest updates for your computer.

http://www.update.microsoft.com

Note 1: If you are running Windows XP SP2, you should upgrade to SP3.

Note 2: Users of Norton Internet Security 2008 should uninstall the software before they install Service Pack 3.

The security suite can then be reinstalled afterwards.

The windows firewall is not sufficient to protect your system. It doesn't monitor outgoing traffic and this is a must.

I recommend Online Armor Free

A little outdated but good reading on how to prevent Malware

Keep safe online and happy surfing.

Since this issue is resolved I will close the thread to prevent others from posting into it. If you need assistance please start your own topic and someone will be happy to assist you.

The fixes and advice in this thread are for this machine only. Do not apply to your machine unless you Fully Understand how these programs work and what you're doing. Please start a thread of your own and someone will be happy to help you, just follow the Pre-Hijackthis instructions found here before posting Pre- HJT Post Instructions

Also don't forget that we offer FREE assistance with General PC questions and repair here PC Help

If you're pleased with the product Malwarebytes and the service provided you, please let your friends, family, and co-workers know. http://www.malwarebytes.org

Link to post
Share on other sites

Guest
This topic is now closed to further replies.
 Share

  • Recently Browsing   0 members

    • No registered users viewing this page.
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.