Jump to content

Security Tool (and various other virus'/trojans) continue RETURNING after "removal"


Recommended Posts

Thank you sincerely in advance for any and all assistance you might be able to give!

I am running windows XP with avast! for anti virus, ZoneAlarm firewall, and Malwarebytes' Anti-Malware. (If I've left anything out please let me know!)

I recently became infected with the 'Security Tool' as well as various others (trojan.vundo, rogue.multiple, trojan.dropper, disabled.security). Symptoms included being redirected, unable to access genuine antivirus resources/webpages, blank/black desktop, the inability to run most programs on the computer, and constant fake notifications from the tools tray from security tool.

I *thought* I nipped the problem in the bud by following some online guides for both removal using mbam AND manual methods - however, even though the system is not completely unusable as it was at first, the stuff keeps returning within a few hours of removal. I was told that this indicates these things are hidden elsewhere in the system that mbam and myself are not picking up, causing it to reinstall itself over and over again. This makes sense and fits with the symptoms I'm currently experiencing - however I'm not advanced enough to figure it out on my own.

Please note: The mbam scan will run, find the 'disabled.security' thing (or multiple infections/bad files), appear to clean them up, but find it with every scan still - even after deleting the quarantined files. In addition, if I run this scan again in an hour, there will again be another 10 or so infections it finds instead of the one it shows currently.

Following are the latest mbam and HJT logs just run on the system which was then rebooted:

MBAM LOG:

Malwarebytes' Anti-Malware 1.41

Database version: 2941

Windows 5.1.2600 Service Pack 2

10/11/2009 12:09:13 PM

mbam-log-2009-10-11 (12-09-13).txt

Scan type: Quick Scan

Objects scanned: 103930

Time elapsed: 10 minute(s), 46 second(s)

Memory Processes Infected: 0

Memory Modules Infected: 0

Registry Keys Infected: 0

Registry Values Infected: 0

Registry Data Items Infected: 1

Folders Infected: 0

Files Infected: 0

Memory Processes Infected:

(No malicious items detected)

Memory Modules Infected:

(No malicious items detected)

Registry Keys Infected:

(No malicious items detected)

Registry Values Infected:

(No malicious items detected)

Registry Data Items Infected:

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\UpdatesDisableNotify (Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.

Folders Infected:

(No malicious items detected)

Files Infected:

(No malicious items detected)

HJT LOG:

Logfile of Trend Micro HijackThis v2.0.2

Scan saved at 12:21:05 PM, on 10/11/2009

Platform: Windows XP SP2 (WinNT 5.01.2600)

MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)

Boot mode: Normal

Running processes:

C:\WINDOWS\System32\smss.exe

C:\WINDOWS\system32\winlogon.exe

C:\WINDOWS\system32\services.exe

C:\WINDOWS\system32\lsass.exe

C:\WINDOWS\system32\svchost.exe

C:\WINDOWS\System32\svchost.exe

C:\WINDOWS\system32\ZoneLabs\vsmon.exe

C:\WINDOWS\Explorer.EXE

C:\Program Files\Alwil Software\Avast4\aswUpdSv.exe

C:\Program Files\Alwil Software\Avast4\ashServ.exe

C:\WINDOWS\system32\spoolsv.exe

C:\Program Files\Common Files\ArcSoft\Connection Service\Bin\ACService.exe

C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe

C:\Program Files\Bonjour\mDNSResponder.exe

C:\Program Files\Java\jre6\bin\jqs.exe

c:\Program Files\Microsoft SQL Server\90\Shared\sqlwriter.exe

C:\WINDOWS\System32\PAStiSvc.exe

C:\WINDOWS\system32\svchost.exe

C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe

C:\Program Files\Analog Devices\Core\smax4pnp.exe

C:\Program Files\McAfee\SpamKiller\MSKDetct.exe

C:\Program Files\Common Files\Real\Update_OB\realsched.exe

C:\Program Files\Java\jre6\bin\jusched.exe

C:\WINDOWS\system32\hkcmd.exe

C:\WINDOWS\system32\igfxpers.exe

C:\PROGRA~1\EPSONS~1\EVENTM~1\EEventManager.exe

C:\PROGRA~1\ALWILS~1\Avast4\ashDisp.exe

C:\Program Files\Zone Labs\ZoneAlarm\zlclient.exe

C:\WINDOWS\system32\ctfmon.exe

C:\WINDOWS\System32\spool\DRIVERS\W32X86\3\E_FATIFIA.EXE

C:\Program Files\Digital Line Detect\DLG.exe

C:\PROGRA~1\Yahoo!\MESSEN~1\ymsgr_tray.exe

C:\Program Files\Alwil Software\Avast4\ashWebSv.exe

C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.yahoo.com/

R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://www.yahoo.com

R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.yahoo.com

R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = *.local

O2 - BHO: (no name) - {02478D38-C3F9-4efb-9B51-7695ECA05670} - (no file)

O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 6.0\Reader\ActiveX\AcroIEHelper.dll

O2 - BHO: DriveLetterAccess - {5CA3D70E-1895-11CF-8E15-001234567890} - C:\WINDOWS\System32\DLA\DLASHX_W.DLL

O2 - BHO: Java Plug-In 2 SSV Helper - {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Program Files\Java\jre6\bin\jp2ssv.dll

O2 - BHO: JQSIEStartDetectorImpl - {E7E6F031-17CE-4C07-BC86-EABFE594F69C} - C:\Program Files\Java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll

O2 - BHO: EpsonToolBandKicker Class - {E99421FB-68DD-40F0-B4AC-B7027CAE2F1A} - C:\Program Files\EPSON\EPSON Web-To-Page\EPSON Web-To-Page.dll

O3 - Toolbar: EPSON Web-To-Page - {EE5D279F-081B-4404-994D-C6B60AAEBA6D} - C:\Program Files\EPSON\EPSON Web-To-Page\EPSON Web-To-Page.dll

O4 - HKLM\..\Run: [soundMAXPnP] C:\Program Files\Analog Devices\Core\smax4pnp.exe

O4 - HKLM\..\Run: [iSUSPM Startup] "C:\Program Files\Common Files\InstallShield\UpdateService\isuspm.exe" -startup

O4 - HKLM\..\Run: [iSUSScheduler] "C:\Program Files\Common Files\InstallShield\UpdateService\issch.exe" -start

O4 - HKLM\..\Run: [MSKDetectorExe] C:\Program Files\McAfee\SpamKiller\MSKDetct.exe /uninstall

O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Common Files\Real\Update_OB\realsched.exe" -osboot

O4 - HKLM\..\Run: [sunJavaUpdateSched] "C:\Program Files\Java\jre6\bin\jusched.exe"

O4 - HKLM\..\Run: [igfxtray] C:\WINDOWS\system32\igfxtray.exe

O4 - HKLM\..\Run: [igfxhkcmd] C:\WINDOWS\system32\hkcmd.exe

O4 - HKLM\..\Run: [igfxpers] C:\WINDOWS\system32\igfxpers.exe

O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\QTTask.exe" -atboottime

O4 - HKLM\..\Run: [EEventManager] C:\PROGRA~1\EPSONS~1\EVENTM~1\EEventManager.exe

O4 - HKLM\..\Run: [ArcSoft Connection Service] C:\Program Files\Common Files\ArcSoft\Connection Service\Bin\ACDaemon.exe

O4 - HKLM\..\Run: [avast!] C:\PROGRA~1\ALWILS~1\Avast4\ashDisp.exe

O4 - HKLM\..\Run: [Malwarebytes Anti-Malware (reboot)] "C:\Program Files\Malwarebytes' Anti-Malware\mbam.exe" /runcleanupscript

O4 - HKLM\..\Run: [ZoneAlarm Client] "C:\Program Files\Zone Labs\ZoneAlarm\zlclient.exe"

O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe

O4 - HKCU\..\Run: [Yahoo! Pager] "C:\PROGRA~1\Yahoo!\MESSEN~1\YAHOOM~1.EXE" -quiet

O4 - HKCU\..\Run: [EPSON NX510 Series] C:\WINDOWS\System32\spool\DRIVERS\W32X86\3\E_FATIFIA.EXE /FU "C:\WINDOWS\TEMP\E_S94.tmp" /EF "HKCU"

O4 - S-1-5-18 Startup: Epson all-in-one Registration.lnk = ? (User 'SYSTEM')

O4 - .DEFAULT Startup: Epson all-in-one Registration.lnk = ? (User 'Default user')

O4 - Startup: Epson all-in-one Registration.lnk = ?

O4 - Global Startup: Digital Line Detect.lnk = ?

O8 - Extra context menu item: Download All by FlashGet - C:\Program Files\FlashGet\jc_all.htm

O8 - Extra context menu item: Download using FlashGet - C:\Program Files\FlashGet\jc_link.htm

O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MI1933~1\Office12\EXCEL.EXE/3000

O8 - Extra context menu item: Lookup on Merriam Webster - file://C:\Program Files\ieSpell\Merriam Webster.HTM

O8 - Extra context menu item: Lookup on Wikipedia - file://C:\Program Files\ieSpell\wikipedia.HTM

O9 - Extra button: Real.com - {CD67F990-D8E9-11d2-98FE-00C0F0318AFE} - C:\WINDOWS\system32\Shdocvw.dll

O9 - Extra button: FlashGet - {D6E814A0-E0C5-11d4-8D29-0050BA6940E3} - C:\PROGRA~1\FlashGet\flashget.exe (file missing)

O9 - Extra 'Tools' menuitem: &FlashGet - {D6E814A0-E0C5-11d4-8D29-0050BA6940E3} - C:\PROGRA~1\FlashGet\flashget.exe (file missing)

O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe

O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe

O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe

O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe

O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} (WUWebControl Class) - http://update.microsoft.com/windowsupdate/...b?1146495978781

O16 - DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} (MUWebControl Class) - http://www.update.microsoft.com/microsoftu...b?1189473567156

O16 - DPF: {DF780F87-FF2B-4DF8-92D0-73DB16A1543A} (PopCapLoader Object) - http://download.games.yahoo.com/games/web_...aploader_v6.cab

O20 - AppInit_DLLs: matumiga.dll c:\windows\system32\yetuheke.dll

O21 - SSODL: liwifolog - {df3718c8-8bc8-4c78-b507-15c1c3c48c18} - c:\windows\system32\yetuheke.dll (file missing)

O22 - SharedTaskScheduler: gahurihor - {df3718c8-8bc8-4c78-b507-15c1c3c48c18} - c:\windows\system32\yetuheke.dll (file missing)

O23 - Service: ArcSoft Connect Daemon (ACDaemon) - ArcSoft Inc. - C:\Program Files\Common Files\ArcSoft\Connection Service\Bin\ACService.exe

O23 - Service: Apple Mobile Device - Apple, Inc. - C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe

O23 - Service: avast! iAVS4 Control Service (aswUpdSv) - ALWIL Software - C:\Program Files\Alwil Software\Avast4\aswUpdSv.exe

O23 - Service: avast! Antivirus - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashServ.exe

O23 - Service: avast! Mail Scanner - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe

O23 - Service: avast! Web Scanner - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashWebSv.exe

O23 - Service: Bonjour Service - Apple Inc. - C:\Program Files\Bonjour\mDNSResponder.exe

O23 - Service: DSBrokerService - Unknown owner - C:\Program Files\DellSupport\brkrsvc.exe

O23 - Service: GameConsoleService - WildTangent, Inc. - C:\Program Files\WildTangent\Apps\Dell Game Console\GameConsoleService.exe

O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe

O23 - Service: Java Quick Starter (JavaQuickStarterService) - Sun Microsystems, Inc. - C:\Program Files\Java\jre6\bin\jqs.exe

O23 - Service: Logitech Process Monitor (LVPrcSrv) - Unknown owner - c:\program files\common files\logitech\lvmvfm\LVPrcSrv.exe (file missing)

O23 - Service: Intel NCS NetService (NetSvc) - Intel® Corporation - C:\Program Files\Intel\PROSetWired\NCS\Sync\NetSvc.exe

O23 - Service: nProtect GameGuard Service (npggsvc) - Unknown owner - C:\WINDOWS\system32\GameMon.des.exe (file missing)

O23 - Service: STI Simulator - Unknown owner - C:\WINDOWS\System32\PAStiSvc.exe

O23 - Service: TrueVector Internet Monitor (vsmon) - Check Point Software Technologies LTD - C:\WINDOWS\system32\ZoneLabs\vsmon.exe

--

End of file - 9051 bytes

Link to post
Share on other sites

  • Root Admin

Hello and welcome to Malwarebytes. Please run the following and post back the log.

Please download ComboFix from Here or Here to your Desktop.

**Note: In the event you already have Combofix, this is a new version that I need you to download. It is important that it is saved and renamed following this process directly to your desktop**

  1. If you are using Firefox, make sure that your download settings are as follows:
    • Tools->Options->Main tab
    • Set to "Always ask me where to Save the files".

[*]During the download, rename Combofix to Combo-Fix as follows:

CF_download_FF.gif

CF_download_rename.gif

[*]It is important you rename Combofix during the download, but not after.

[*]Please do not rename Combofix to other names, but only to the one indicated.

[*]Close any open browsers.

[*]Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.

-----------------------------------------------------------

  • Very Important! Temporarily disable your anti-virus, script blocking and any anti-malware real-time protection before performing a scan. They can interfere with ComboFix or remove some of its embedded files which may cause "unpredictable results".
  • Click on this link to see a list of programs that should be disabled. The list is not all inclusive. If yours is not listed and you don't know how to disable it, please ask.

    -----------------------------------------------------------


  • Close any open browsers.
  • WARNING: Combofix will disconnect your machine from the Internet as soon as it starts
  • Please do not attempt to re-connect your machine back to the Internet until Combofix has completely finished.
  • If there is no internet connection after running Combofix, then restart your computer to restore back your connection.

-----------------------------------------------------------

[*]Double click on combo-Fix.exe & follow the prompts.

[*]When finished, it will produce a report for you.

[*]Please post the "C:\Combo-Fix.txt" along with a new HijackThis log for further review.

**Note: Do not mouseclick combo-fix's window while it's running. That may cause it to stall**

If you still cannot get this to run, try booting into Safe Mode, and run it there.

To boot into Safe Mode, tap F8 after BIOS, and just before the Windows logo appears. A list of options will appear, select "Safe Mode."

If this doesn't work either, try the same method (above method), but name Combofix.exe to iexplore.exe instead, or winlogon.exe..

This because It also happens in some cases that malware blocks EVERY process except for what is in its own whitelist, so this whitelist also includes system important processes such as iexplore.exe, explorer.exe, winlogon.exe...

Link to post
Share on other sites

Thank you for your time.

I disabled the firewall and avast, started combo-fix, and then a few minutes into it they both activated again. This caused combo-fix to stall so I had to shut it down and redo the process. The second time they remained disabled and combo-fix finished. Not sure if this makes a difference or not, but just in case. Below are the new logs.

COMBO-FIX LOG

ComboFix 09-10-12.03 - Family 10/13/2009 7:02.3.1 - NTFSx86

Running from: c:\documents and settings\Family\Desktop\Combo-Fix.exe

AV: avast! antivirus 4.8.1356 [VPS 091012-0] *On-access scanning disabled* (Updated) {7591DB91-41F0-48A3-B128-1A293FD8233D}

FW: ZoneAlarm Firewall *disabled* {829BDA32-94B3-44F4-8446-F8FCFF809F8B}

.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))

.

c:\windows\Installer\11505f.msi

c:\windows\Installer\115060.msp

c:\windows\Installer\115061.msp

c:\windows\Installer\115062.msp

c:\windows\Installer\115063.msp

c:\windows\Installer\115064.msp

c:\windows\Installer\115065.msp

c:\windows\Installer\115066.msp

c:\windows\Installer\115067.msp

c:\windows\Installer\115068.msp

c:\windows\Installer\7e86a.msp

c:\windows\system32\kihipapo.dll

c:\windows\system32\sotugulu.dll

c:\windows\system32\vatavude.dll

c:\windows\system32\wefojuho.dll

.

---- Previous Run -------

.

c:\documents and settings\All Users\Application Data\08154220\08154220.exe

c:\temp\0c2\tmpFF.log

c:\temp\brr\tmpZTF.log

c:\windows\Downloaded Program Files\popcaploader.inf

c:\windows\Installer\12a8bc.msp

c:\windows\Installer\12a8bd.msp

c:\windows\Installer\12a8be.msp

c:\windows\Installer\12a8bf.msp

c:\windows\Installer\12a8c0.msp

c:\windows\Installer\12a8c1.msp

c:\windows\Installer\12a8c2.msp

c:\windows\Installer\12a8c3.msp

c:\windows\Installer\12a8c4.msp

c:\windows\Installer\12a8c5.msp

c:\windows\Installer\162b915.msp

c:\windows\Installer\16439e9.msp

c:\windows\Installer\16439ea.msp

c:\windows\Installer\16439eb.msp

c:\windows\Installer\16439ec.msp

c:\windows\Installer\16439ed.msp

c:\windows\Installer\16439ee.msp

c:\windows\Installer\16439ef.msp

c:\windows\Installer\16439f0.msp

c:\windows\Installer\16439f1.msp

c:\windows\Installer\1873d3.msp

c:\windows\Installer\1c34758.msp

c:\windows\Installer\1c50a94.msp

c:\windows\Installer\1c50a95.msp

c:\windows\Installer\1c50a96.msp

c:\windows\Installer\1c50a97.msp

c:\windows\Installer\1c50a98.msp

c:\windows\Installer\1c50a99.msp

c:\windows\Installer\1c50a9a.msp

c:\windows\Installer\1c50a9b.msp

c:\windows\Installer\1c50a9c.msp

c:\windows\Installer\1c890eb.msp

c:\windows\Installer\1ca2131.msp

c:\windows\Installer\1ca2132.msp

c:\windows\Installer\1ca2133.msp

c:\windows\Installer\1ca2134.msp

c:\windows\Installer\1ca2135.msp

c:\windows\Installer\1ca2136.msp

c:\windows\Installer\1ca2137.msp

c:\windows\Installer\1ca2138.msp

c:\windows\Installer\1ca2139.msp

c:\windows\Installer\1da411e.msp

c:\windows\Installer\1e5e306.msp

c:\windows\Installer\1f0671.msp

c:\windows\Installer\1faed7f.msp

c:\windows\Installer\204bb25.msp

c:\windows\Installer\204bb26.msp

c:\windows\Installer\204bb27.msp

c:\windows\Installer\204bb28.msp

c:\windows\Installer\204bb29.msp

c:\windows\Installer\204bb2a.msp

c:\windows\Installer\204bb2b.msp

c:\windows\Installer\204bb2c.msp

c:\windows\Installer\204bb2d.msp

c:\windows\Installer\2070ff.msp

c:\windows\Installer\207100.msp

c:\windows\Installer\207101.msp

c:\windows\Installer\207102.msp

c:\windows\Installer\207103.msp

c:\windows\Installer\207104.msp

c:\windows\Installer\207105.msp

c:\windows\Installer\207106.msp

c:\windows\Installer\207107.msp

c:\windows\Installer\20901e.msp

c:\windows\Installer\21e5fb.msp

c:\windows\Installer\21e5fc.msp

c:\windows\Installer\21e5fd.msp

c:\windows\Installer\21e5fe.msp

c:\windows\Installer\21e5ff.msp

c:\windows\Installer\21e600.msp

c:\windows\Installer\21e601.msp

c:\windows\Installer\21e602.msp

c:\windows\Installer\21e603.msp

c:\windows\Installer\22025b2.msp

c:\windows\Installer\221a3e.msi

c:\windows\Installer\29137cd.msp

c:\windows\Installer\292eadd.msp

c:\windows\Installer\292eade.msp

c:\windows\Installer\292eadf.msp

c:\windows\Installer\292eae0.msp

c:\windows\Installer\292eae1.msp

c:\windows\Installer\292eae2.msp

c:\windows\Installer\292eae3.msp

c:\windows\Installer\292eae4.msp

c:\windows\Installer\292eae5.msp

c:\windows\Installer\2ab232d.msp

c:\windows\Installer\2ac9b96.msp

c:\windows\Installer\2ac9b97.msp

c:\windows\Installer\2ac9b98.msp

c:\windows\Installer\2ac9b99.msp

c:\windows\Installer\2ac9b9a.msp

c:\windows\Installer\2ac9b9b.msp

c:\windows\Installer\2ac9b9c.msp

c:\windows\Installer\2ac9b9d.msp

c:\windows\Installer\2ac9b9e.msp

c:\windows\Installer\2bf8409.msp

c:\windows\Installer\2f92b50.msp

c:\windows\Installer\2fdbf7f.msp

c:\windows\Installer\2fdbf80.msp

c:\windows\Installer\2fdbf81.msp

c:\windows\Installer\2fdbf82.msp

c:\windows\Installer\2fdbf83.msp

c:\windows\Installer\2fdbf84.msp

c:\windows\Installer\2fdbf85.msp

c:\windows\Installer\2fdbf86.msp

c:\windows\Installer\2fdbf87.msp

c:\windows\Installer\332fbd9.msp

c:\windows\Installer\3346afa.msp

c:\windows\Installer\334f1de.msp

c:\windows\Installer\334f1df.msp

c:\windows\Installer\334f1e0.msp

c:\windows\Installer\334f1e1.msp

c:\windows\Installer\334f1e2.msp

c:\windows\Installer\334f1e3.msp

c:\windows\Installer\334f1e4.msp

c:\windows\Installer\334f1e5.msp

c:\windows\Installer\334f1e6.msp

c:\windows\Installer\339f272.msp

c:\windows\Installer\339f273.msp

c:\windows\Installer\339f274.msp

c:\windows\Installer\339f275.msp

c:\windows\Installer\339f276.msp

c:\windows\Installer\339f277.msp

c:\windows\Installer\339f278.msp

c:\windows\Installer\339f279.msp

c:\windows\Installer\339f27a.msp

c:\windows\Installer\33dfffb.msp

c:\windows\Installer\33f2d4.msp

c:\windows\Installer\33f7df1.msp

c:\windows\Installer\33f7df2.msp

c:\windows\Installer\33f7df3.msp

c:\windows\Installer\33f7df4.msp

c:\windows\Installer\33f7df5.msp

c:\windows\Installer\33f7df6.msp

c:\windows\Installer\33f7df7.msp

c:\windows\Installer\33f7df8.msp

c:\windows\Installer\33f7df9.msp

c:\windows\Installer\3465df2.msp

c:\windows\Installer\349bc50.msp

c:\windows\Installer\34bd686.msp

c:\windows\Installer\34bd687.msp

c:\windows\Installer\34bd688.msp

c:\windows\Installer\34bd689.msp

c:\windows\Installer\34bd68a.msp

c:\windows\Installer\34bd68b.msp

c:\windows\Installer\34bd68c.msp

c:\windows\Installer\34bd68d.msp

c:\windows\Installer\34bd68e.msp

c:\windows\Installer\34fdc4e.msp

c:\windows\Installer\356b3c.msp

c:\windows\Installer\356b3d.msp

c:\windows\Installer\356b3e.msp

c:\windows\Installer\356b3f.msp

c:\windows\Installer\356b40.msp

c:\windows\Installer\356b41.msp

c:\windows\Installer\356b42.msp

c:\windows\Installer\356b43.msp

c:\windows\Installer\356b44.msp

c:\windows\Installer\39a6f9d.msp

c:\windows\Installer\39a8122.msp

c:\windows\Installer\3a0acba.msp

c:\windows\Installer\3a0acbb.msp

c:\windows\Installer\3a0acbc.msp

c:\windows\Installer\3a0acbd.msp

c:\windows\Installer\3a0acbe.msp

c:\windows\Installer\3a0acbf.msp

c:\windows\Installer\3a0acc0.msp

c:\windows\Installer\3a0acc1.msp

c:\windows\Installer\3a0acc2.msp

c:\windows\Installer\3a6ea9f.msp

c:\windows\Installer\3a86a4b.msp

c:\windows\Installer\3a86a4c.msp

c:\windows\Installer\3a86a4d.msp

c:\windows\Installer\3a86a4e.msp

c:\windows\Installer\3a86a4f.msp

c:\windows\Installer\3a86a50.msp

c:\windows\Installer\3a86a51.msp

c:\windows\Installer\3a86a52.msp

c:\windows\Installer\3a86a53.msp

c:\windows\Installer\3b70d4c.msp

c:\windows\Installer\3b8b8fa.msp

c:\windows\Installer\3b8b8fb.msp

c:\windows\Installer\3b8b8fc.msp

c:\windows\Installer\3b8b8fd.msp

c:\windows\Installer\3b8b8fe.msp

c:\windows\Installer\3b8b8ff.msp

c:\windows\Installer\3b8b900.msp

c:\windows\Installer\3b8b901.msp

c:\windows\Installer\3b8b902.msp

c:\windows\Installer\3e0c850.msp

c:\windows\Installer\4025ff.msp

c:\windows\Installer\41e1d8.msp

c:\windows\Installer\41e89ab.msp

c:\windows\Installer\421a573.msp

c:\windows\Installer\421a574.msp

c:\windows\Installer\421a575.msp

c:\windows\Installer\421a576.msp

c:\windows\Installer\421a577.msp

c:\windows\Installer\421a578.msp

c:\windows\Installer\421a579.msp

c:\windows\Installer\421a57a.msp

c:\windows\Installer\421a57b.msp

c:\windows\Installer\4399ca.msp

c:\windows\Installer\4399cb.msp

c:\windows\Installer\4399cc.msp

c:\windows\Installer\4399cd.msp

c:\windows\Installer\4399ce.msp

c:\windows\Installer\4399cf.msp

c:\windows\Installer\4399d0.msp

c:\windows\Installer\4399d1.msp

c:\windows\Installer\4399d2.msp

c:\windows\Installer\43d2de8.msp

c:\windows\Installer\44133e1.msp

c:\windows\Installer\44133e2.msp

c:\windows\Installer\44133e3.msp

c:\windows\Installer\44133e4.msp

c:\windows\Installer\44133e5.msp

c:\windows\Installer\44133e6.msp

c:\windows\Installer\44133e7.msp

c:\windows\Installer\44133e8.msp

c:\windows\Installer\44133e9.msp

c:\windows\Installer\49622.msp

c:\windows\Installer\49d7677.msp

c:\windows\Installer\49eee72.msp

c:\windows\Installer\49eee73.msp

c:\windows\Installer\49eee74.msp

c:\windows\Installer\49eee75.msp

c:\windows\Installer\49eee76.msp

c:\windows\Installer\49eee77.msp

c:\windows\Installer\49eee78.msp

c:\windows\Installer\49eee79.msp

c:\windows\Installer\49eee7a.msp

c:\windows\Installer\4d6338d.msp

c:\windows\Installer\4df5582.msp

c:\windows\Installer\4df5583.msp

c:\windows\Installer\4df5584.msp

c:\windows\Installer\4df5585.msp

c:\windows\Installer\4df5586.msp

c:\windows\Installer\4df5587.msp

c:\windows\Installer\4df5588.msp

c:\windows\Installer\4df5589.msp

c:\windows\Installer\4df558a.msp

c:\windows\Installer\4e7333c.msp

c:\windows\Installer\4e8b162.msp

c:\windows\Installer\4e8b163.msp

c:\windows\Installer\4e8b164.msp

c:\windows\Installer\4e8b165.msp

c:\windows\Installer\4e8b166.msp

c:\windows\Installer\4e8b167.msp

c:\windows\Installer\4e8b168.msp

c:\windows\Installer\4e8b169.msp

c:\windows\Installer\4e8b16a.msp

c:\windows\Installer\54216f0.msp

c:\windows\Installer\54ed36.msp

c:\windows\Installer\568319.msp

c:\windows\Installer\56831a.msp

c:\windows\Installer\56831b.msp

c:\windows\Installer\56831c.msp

c:\windows\Installer\56831d.msp

c:\windows\Installer\56831e.msp

c:\windows\Installer\56831f.msp

c:\windows\Installer\568320.msp

c:\windows\Installer\568321.msp

c:\windows\Installer\5a5108.msp

c:\windows\Installer\5b23b9.msp

c:\windows\Installer\5c97cc.msp

c:\windows\Installer\5c97cd.msp

c:\windows\Installer\5c97ce.msp

c:\windows\Installer\5c97cf.msp

c:\windows\Installer\5c97d0.msp

c:\windows\Installer\5c97d1.msp

c:\windows\Installer\5c97d2.msp

c:\windows\Installer\5c97d3.msp

c:\windows\Installer\5c97d4.msp

c:\windows\Installer\61a25e9.msp

c:\windows\Installer\6218c24.msp

c:\windows\Installer\6218c25.msp

c:\windows\Installer\6218c26.msp

c:\windows\Installer\6218c27.msp

c:\windows\Installer\6218c28.msp

c:\windows\Installer\6218c29.msp

c:\windows\Installer\6218c2a.msp

c:\windows\Installer\6218c2b.msp

c:\windows\Installer\6218c2c.msp

c:\windows\Installer\719545.msp

c:\windows\Installer\731f41.msp

c:\windows\Installer\731f42.msp

c:\windows\Installer\731f43.msp

c:\windows\Installer\731f44.msp

c:\windows\Installer\731f45.msp

c:\windows\Installer\731f46.msp

c:\windows\Installer\731f47.msp

c:\windows\Installer\731f48.msp

c:\windows\Installer\731f49.msp

c:\windows\Installer\745bc.msp

c:\windows\Installer\7986ab0.msp

c:\windows\Installer\79d81fa.msp

c:\windows\Installer\79d81fb.msp

c:\windows\Installer\79d81fc.msp

c:\windows\Installer\79d81fd.msp

c:\windows\Installer\79d81fe.msp

c:\windows\Installer\79d81ff.msp

c:\windows\Installer\79d8200.msp

c:\windows\Installer\79d8201.msp

c:\windows\Installer\79d8202.msp

c:\windows\Installer\820d675.msp

c:\windows\Installer\8227c17.msp

c:\windows\Installer\8227c18.msp

c:\windows\Installer\8227c19.msp

c:\windows\Installer\8227c1a.msp

c:\windows\Installer\8227c1b.msp

c:\windows\Installer\8227c1c.msp

c:\windows\Installer\8227c1d.msp

c:\windows\Installer\8227c1e.msp

c:\windows\Installer\8227c1f.msp

c:\windows\Installer\8243a8.msp

c:\windows\Installer\880143.msp

c:\windows\Installer\880144.msp

c:\windows\Installer\880145.msp

c:\windows\Installer\880146.msp

c:\windows\Installer\880147.msp

c:\windows\Installer\880148.msp

c:\windows\Installer\880149.msp

c:\windows\Installer\88014a.msp

c:\windows\Installer\88014b.msp

c:\windows\Installer\8ad9b7.msp

c:\windows\Installer\8c3cd2.msp

c:\windows\Installer\8c3cd3.msp

c:\windows\Installer\8c3cd4.msp

c:\windows\Installer\8c3cd5.msp

c:\windows\Installer\8c3cd6.msp

c:\windows\Installer\8c3cd7.msp

c:\windows\Installer\8c3cd8.msp

c:\windows\Installer\8c3cd9.msp

c:\windows\Installer\8c3cda.msp

c:\windows\Installer\98c395f.msp

c:\windows\Installer\98f4856.msp

c:\windows\Installer\98f4857.msp

c:\windows\Installer\98f4858.msp

c:\windows\Installer\98f4859.msp

c:\windows\Installer\98f485a.msp

c:\windows\Installer\98f485b.msp

c:\windows\Installer\98f485c.msp

c:\windows\Installer\98f485d.msp

c:\windows\Installer\98f485e.msp

c:\windows\Installer\9e8e62a.msp

c:\windows\Installer\9ea7084.msp

c:\windows\Installer\9ea7085.msp

c:\windows\Installer\9ea7086.msp

c:\windows\Installer\9ea7087.msp

c:\windows\Installer\9ea7088.msp

c:\windows\Installer\9ea7089.msp

c:\windows\Installer\9ea708a.msp

c:\windows\Installer\9ea708b.msp

c:\windows\Installer\9ea708c.msp

c:\windows\Installer\9ff69f.msp

c:\windows\Installer\a93ae1.msp

c:\windows\Installer\a93ae2.msp

c:\windows\Installer\a93ae3.msp

c:\windows\Installer\a93ae4.msp

c:\windows\Installer\a93ae5.msp

c:\windows\Installer\a93ae6.msp

c:\windows\Installer\a93ae7.msp

c:\windows\Installer\a93ae8.msp

c:\windows\Installer\a93ae9.msp

c:\windows\Installer\cbc170.msp

c:\windows\Installer\cd6369.msp

c:\windows\Installer\cd636a.msp

c:\windows\Installer\cd636b.msp

c:\windows\Installer\cd636c.msp

c:\windows\Installer\cd636d.msp

c:\windows\Installer\cd636e.msp

c:\windows\Installer\cd636f.msp

c:\windows\Installer\cd6370.msp

c:\windows\Installer\cd6371.msp

c:\windows\Installer\cf46be.msp

c:\windows\Installer\d09cf8.msp

c:\windows\Installer\d09cf9.msp

c:\windows\Installer\d09cfa.msp

c:\windows\Installer\d09cfb.msp

c:\windows\Installer\d09cfc.msp

c:\windows\Installer\d09cfd.msp

c:\windows\Installer\d09cfe.msp

c:\windows\Installer\d09cff.msp

c:\windows\Installer\d09d00.msp

c:\windows\system32\diperede.dll

c:\windows\system32\kodesalo.dll

c:\windows\system32\mizifaru.dll

.

((((((((((((((((((((((((( Files Created from 2009-09-13 to 2009-10-13 )))))))))))))))))))))))))))))))

.

2009-10-10 22:42 . 2009-10-10 22:42 4212 ---ha-w- c:\windows\system32\zllictbl.dat

2009-10-10 22:41 . 2009-02-16 04:10 69000 ----a-w- c:\windows\system32\zlcomm.dll

2009-10-10 22:41 . 2009-02-16 04:10 103816 ----a-w- c:\windows\system32\zlcommdb.dll

2009-10-10 22:41 . 2009-02-16 04:10 1221512 ----a-w- c:\windows\system32\zpeng25.dll

2009-10-10 22:41 . 2009-10-10 22:42 -------- d-----w- c:\windows\system32\ZoneLabs

2009-10-10 22:41 . 2009-10-10 22:41 -------- d-----w- c:\program files\Zone Labs

2009-10-10 22:40 . 2009-10-13 10:52 -------- d-----w- c:\windows\Internet Logs

2009-10-10 21:16 . 2009-10-10 21:15 411368 ----a-w- c:\windows\system32\deploytk.dll

2009-10-10 18:32 . 2009-09-10 18:54 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys

2009-10-10 18:32 . 2009-10-10 19:56 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware

2009-10-10 18:32 . 2009-09-10 18:53 19160 ----a-w- c:\windows\system32\drivers\mbam.sys

2009-10-10 18:16 . 2009-10-10 18:16 -------- d-----w- c:\documents and settings\Administrator\Local Settings\Application Data\Mozilla

2009-10-10 17:57 . 2009-10-10 17:57 4045528 ----a-w- c:\program files\something.exe

2009-10-10 15:14 . 2009-10-10 18:47 -------- d-----w- c:\documents and settings\All Users\Application Data\Malwarebytes

2009-10-10 00:10 . 2009-10-10 20:49 -------- d-----w- c:\documents and settings\All Users\Application Data\Lavasoft

2009-10-09 19:39 . 2009-09-15 10:54 23152 ----a-w- c:\windows\system32\drivers\aswRdr.sys

2009-10-09 19:39 . 2009-09-15 10:54 52368 ----a-w- c:\windows\system32\drivers\aswTdi.sys

2009-10-09 19:39 . 2009-09-15 10:53 27408 ----a-w- c:\windows\system32\drivers\aavmker4.sys

2009-10-09 19:39 . 2009-09-15 10:53 97480 ----a-w- c:\windows\system32\AvastSS.scr

2009-10-09 19:39 . 2009-09-15 10:56 94160 ----a-w- c:\windows\system32\drivers\aswmon2.sys

2009-10-09 19:39 . 2009-09-15 10:55 114768 ----a-w- c:\windows\system32\drivers\aswSP.sys

2009-10-09 19:39 . 2009-09-15 10:55 20560 ----a-w- c:\windows\system32\drivers\aswFsBlk.sys

2009-10-09 19:39 . 2009-09-15 10:56 93424 ----a-w- c:\windows\system32\drivers\aswmon.sys

2009-10-09 19:39 . 2009-09-15 10:59 1279968 ----a-w- c:\windows\system32\aswBoot.exe

2009-09-20 02:09 . 2009-10-09 18:53 -------- d-----w- c:\documents and settings\Family\Local Settings\Application Data\Yahoo!

2009-09-19 14:37 . 2009-09-26 15:06 45 ----a-w- c:\documents and settings\Family\jagex_runescape_preferences2.dat

2009-09-19 14:36 . 2009-09-26 15:06 38 ----a-w- c:\documents and settings\Family\jagex_runescape_preferences.dat

2009-09-18 13:27 . 2009-09-18 13:27 -------- d-----w- c:\documents and settings\Family\Application Data\Epson

2009-09-18 12:36 . 2009-09-18 12:36 -------- d-----w- c:\documents and settings\Family\Application Data\Leadertech

2009-09-18 12:34 . 2009-09-18 12:34 -------- d-----w- c:\documents and settings\Family\Local Settings\Application Data\ArcSoft

2009-09-18 12:34 . 2009-09-23 18:17 -------- d--h--w- c:\documents and settings\All Users\Application Data\ArcSoft

2009-09-18 12:33 . 2009-09-18 12:33 -------- d-----w- c:\program files\ArcSoft

2009-09-18 12:33 . 2009-09-18 12:33 -------- d-----w- c:\program files\Common Files\ArcSoft

2009-09-18 12:32 . 2009-09-18 12:34 -------- d-----w- c:\documents and settings\Family\Application Data\ArcSoft

2009-09-18 12:28 . 2004-08-04 03:08 31616 ----a-w- c:\windows\system32\drivers\usbccgp.sys

2009-09-18 12:28 . 2004-08-04 03:08 31616 ----a-w- c:\windows\system32\dllcache\usbccgp.sys

2009-09-18 12:24 . 2009-09-18 12:25 -------- d-----w- c:\program files\Epson Software

2009-09-18 12:24 . 2008-11-12 02:00 79360 ----a-w- c:\windows\system32\E_FD4BFIA.DLL

2009-09-18 12:24 . 2008-11-12 02:00 93696 ----a-w- c:\windows\system32\E_FLBFIA.DLL

2009-09-18 12:23 . 2009-09-18 12:29 -------- d-----w- c:\documents and settings\All Users\Application Data\EPSON

2009-09-18 12:23 . 2006-08-25 00:00 9216 ----a-w- c:\windows\system32\escdev.dll

2009-09-18 12:23 . 2008-11-17 04:00 342016 ----a-w- c:\windows\system32\eswiaud.dll

2009-09-18 12:22 . 2009-09-18 12:35 -------- d-----w- c:\program files\epson

.

(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))

.

2009-10-11 20:45 . 2006-05-01 21:12 -------- d-----w- c:\documents and settings\Family\Application Data\AdobeUM

2009-10-10 22:58 . 2006-11-11 07:13 -------- d-----w- c:\program files\Bots

2009-10-10 21:14 . 2006-04-24 13:10 -------- d-----w- c:\program files\Java

2009-10-10 18:47 . 2009-10-10 18:47 -------- d-----w- c:\documents and settings\Administrator\Application Data\Malwarebytes

2009-10-10 18:47 . 2009-10-10 18:47 -------- d-----w- c:\documents and settings\Administrator\Application Data\Symantec

2009-10-10 18:47 . 2009-10-10 18:47 -------- d-----w- c:\documents and settings\Administrator\Application Data\AOL

2009-10-10 18:47 . 2009-10-10 18:47 -------- d-----w- c:\documents and settings\Family\Application Data\Malwarebytes

2009-10-09 18:54 . 2006-10-06 19:21 -------- d-----w- c:\program files\Spybot - Search & Destroy

2009-10-09 18:43 . 2006-05-01 17:51 -------- d-----w- c:\program files\Yahoo!

2009-10-09 18:43 . 2006-05-12 22:51 -------- d-----w- c:\program files\Common Files\Scanner

2009-10-09 18:39 . 2006-11-14 23:26 -------- d-----w- c:\program files\Common Files\Logitech

2009-10-09 18:31 . 2009-09-08 04:30 -------- d-----w- c:\documents and settings\All Users\Application Data\Electronic Arts

2009-10-09 18:27 . 2006-10-06 19:02 -------- d-----w- c:\documents and settings\Family\Application Data\Lavasoft

2009-10-09 11:40 . 2006-05-01 00:49 104 --sh--r- c:\windows\system32\49C531336C.sys

2009-10-09 11:40 . 2006-05-01 00:49 7520 --sha-w- c:\windows\system32\KGyGaAvL.sys

2009-10-01 03:27 . 2007-07-15 13:58 -------- d-----w- c:\documents and settings\Family\Application Data\gtk-2.0

2009-09-19 01:53 . 2008-06-10 22:14 -------- d-----w- c:\documents and settings\All Users\Application Data\NeoEdge Networks

2009-09-18 12:36 . 2006-04-24 13:14 -------- d--h--w- c:\program files\InstallShield Installation Information

2009-09-18 12:27 . 2009-09-18 12:27 -------- d-----w- c:\documents and settings\Family\Application Data\InstallShield

2009-09-12 17:47 . 2009-09-12 17:39 1227 ----a-w- c:\windows\checkip.dat

2009-09-08 11:40 . 2008-04-21 00:23 -------- d-----w- c:\program files\Microsoft SQL Server

2009-08-05 09:11 . 2004-08-10 17:51 204800 ----a-w- c:\windows\system32\mswebdvd.dll

2009-07-29 04:53 . 2004-08-10 17:51 119808 ----a-w- c:\windows\system32\t2embed.dll

2009-07-29 04:53 . 2004-08-10 17:51 82432 ----a-w- c:\windows\system32\fontsub.dll

2009-07-17 18:55 . 2004-08-10 17:50 58880 ----a-w- c:\windows\system32\atl.dll

2008-04-11 17:50 . 2008-04-11 17:50 0 -c--a-w- c:\program files\temp01

2006-09-10 15:18 . 2006-05-06 16:09 88 --sh--r- c:\windows\system32\6C3331C549.sys

2009-07-10 13:23 . 2009-07-10 13:23 88576 --sha-w- c:\windows\system32\dugigidu.dll

2009-07-09 13:16 . 2009-07-09 13:16 116736 --sha-w- c:\windows\system32\honumudi.dll.tmp

2009-07-10 01:24 . 2009-07-10 01:24 51712 --sha-w- c:\windows\system32\jabihoju.dll

2009-07-09 13:16 . 2009-07-09 13:16 116736 --sha-w- c:\windows\system32\kekuveka.dll.tmp

2009-07-13 09:24 . 2009-07-13 09:24 51200 --sha-w- c:\windows\system32\kowewohe.dll

2009-07-09 13:22 . 2009-07-09 13:22 172544 --sha-w- c:\windows\system32\lewemafa.dll

2009-07-09 13:22 . 2009-07-09 13:22 88576 --sha-w- c:\windows\system32\lihiyufi.dll

2009-07-10 01:25 . 2009-07-10 01:25 51712 --sha-w- c:\windows\system32\matumiga.dll.tmp

2009-07-09 13:22 . 2009-07-09 13:22 60416 --sha-w- c:\windows\system32\nawajepu.dll

2009-07-09 13:16 . 2009-07-09 13:16 116736 -csha-w- c:\windows\system32\pizakuma.dll.tmp

2009-07-13 09:26 . 2009-07-13 09:26 51200 --sha-w- c:\windows\system32\riwumagu.dll

2009-07-10 01:24 . 2009-07-10 01:24 88576 --sha-w- c:\windows\system32\tajokigu.dll

2009-07-13 09:24 . 2009-07-13 09:24 1011655 --sha-w- c:\windows\system32\zotovebu.exe

.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))

.

.

*Note* empty entries & legit default entries are not shown

REGEDIT4

[HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{c1f33e18-d653-4b7a-b61f-38dc232c49d8}]

2009-07-13 09:26 51200 --sha-w- c:\windows\system32\riwumagu.dll

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]

"SoundMAXPnP"="c:\program files\Analog Devices\Core\smax4pnp.exe" [2004-10-15 1404928]

"ISUSPM Startup"="c:\program files\Common Files\InstallShield\UpdateService\isuspm.exe" [2005-06-10 249856]

"ISUSScheduler"="c:\program files\Common Files\InstallShield\UpdateService\issch.exe" [2005-06-10 81920]

"MSKDetectorExe"="c:\program files\McAfee\SpamKiller\MSKDetct.exe" [2005-08-12 1121792]

"TkBellExe"="c:\program files\Common Files\Real\Update_OB\realsched.exe" [2006-11-04 185896]

"SunJavaUpdateSched"="c:\program files\Java\jre6\bin\jusched.exe" [2009-10-10 149280]

"igfxtray"="c:\windows\system32\igfxtray.exe" [2005-09-20 94208]

"igfxhkcmd"="c:\windows\system32\hkcmd.exe" [2005-09-20 77824]

"igfxpers"="c:\windows\system32\igfxpers.exe" [2005-09-20 114688]

"QuickTime Task"="c:\program files\QuickTime\QTTask.exe" [2008-03-29 413696]

"EEventManager"="c:\progra~1\EPSONS~1\EVENTM~1\EEventManager.exe" [2009-01-12 669520]

"ArcSoft Connection Service"="c:\program files\Common Files\ArcSoft\Connection Service\Bin\ACDaemon.exe" [2009-07-10 195072]

"avast!"="c:\progra~1\ALWILS~1\Avast4\ashDisp.exe" [2009-09-15 81000]

"Malwarebytes Anti-Malware (reboot)"="c:\program files\Malwarebytes' Anti-Malware\mbam.exe" [2009-09-10 1312080]

"ZoneAlarm Client"="c:\program files\Zone Labs\ZoneAlarm\zlclient.exe" [2009-02-16 981384]

c:\documents and settings\All Users\Start Menu\Programs\Startup\

Digital Line Detect.lnk - c:\program files\Digital Line Detect\DLG.exe [2006-4-24 24576]

[HKLM\~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^Logitech Desktop Messenger.lnk]

path=c:\documents and settings\All Users\Start Menu\Programs\Startup\Logitech Desktop Messenger.lnk

backup=c:\windows\pss\Logitech Desktop Messenger.lnkCommon Startup

[HKEY_LOCAL_MACHINE\software\microsoft\security center]

"UpdatesDisableNotify"=dword:00000001

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\ZoneLabsFirewall]

"DisableMonitoring"=dword:00000001

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]

"EnableFirewall"= 0 (0x0)

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]

"c:\\Program Files\\Bots\\bots.dat"=

"c:\\Program Files\\Yahoo!\\Messenger\\YahooMessenger.exe"=

"c:\\Program Files\\LimeWire\\LimeWire.exe"=

"c:\\Program Files\\Yahoo!\\Messenger\\YServer.exe"=

"c:\\Program Files\\Common Files\\AOL\\Loader\\aolload.exe"=

"c:\\Program Files\\Common Files\\AOL\\1146501289\\ee\\aolsoftware.exe"=

"c:\\Program Files\\Bonjour\\mDNSResponder.exe"=

"c:\\Program Files\\McAfee\\SpamKiller\\MSKDetct.exe"=

R1 aswSP;avast! Self Protection;c:\windows\system32\drivers\aswSP.sys [10/9/2009 3:39 PM 114768]

R2 aswFsBlk;aswFsBlk;c:\windows\system32\drivers\aswFsBlk.sys [10/9/2009 3:39 PM 20560]

S3 FGCWL;FGCWL;\??\c:\program files\Fortres Grand\Virtual Sandbox 1.0\FGCWL.sys --> c:\program files\Fortres Grand\Virtual Sandbox 1.0\FGCWL.sys [?]

S3 PAC207;Webcam Basic;c:\windows\system32\DRIVERS\pfc027.sys --> c:\windows\system32\DRIVERS\pfc027.sys [?]

.

Contents of the 'Scheduled Tasks' folder

2009-09-28 c:\windows\Tasks\AppleSoftwareUpdate.job

- c:\program files\Apple Software Update\SoftwareUpdate.exe [2007-08-29 18:57]

2009-10-12 c:\windows\Tasks\Disk Cleanup.job

- c:\windows\system32\cleanmgr.exe [2004-08-10 10:00]

.

.

------- Supplementary Scan -------

.

uStart Page = hxxp://www.yahoo.com/

uSearchMigratedDefaultURL = hxxp://www.google.com/search?q={searchTerms}&sourceid=ie7&rls=com.microsoft:en-US&ie=utf8&oe=utf8

mStart Page = hxxp://www.yahoo.com

uInternet Settings,ProxyOverride = *.local

uSearchURL,(Default) = hxxp://www.google.com/keyword/%s

IE: Download All by FlashGet - c:\program files\FlashGet\jc_all.htm

IE: Download using FlashGet - c:\program files\FlashGet\jc_link.htm

IE: E&xport to Microsoft Excel - c:\progra~1\MI1933~1\Office12\EXCEL.EXE/3000

IE: Lookup on Merriam Webster - file://c:\program files\ieSpell\Merriam Webster.HTM

IE: Lookup on Wikipedia - file://c:\program files\ieSpell\wikipedia.HTM

Trusted Zone: yahoo.com

Trusted Zone: musicmatch.com\online

DPF: Microsoft XML Parser for Java - file:///C:/WINDOWS/Java/classes/xmldso.cab

FF - ProfilePath - c:\documents and settings\Family\Application Data\Mozilla\Firefox\Profiles\7mmvcqmx.default\

FF - prefs.js: browser.startup.homepage - hxxp://www.yahoo.com/

FF - plugin: c:\documents and settings\Family\Application Data\Mozilla\Firefox\Profiles\7mmvcqmx.default\extensions\moveplayer@movenetworks.com\platform\WINNT_x86-msvc\plugins\npmnqmp07076007.dll

FF - plugin: c:\progra~1\Yahoo!\Common\npyaxmpb.dll

.

- - - - ORPHANS REMOVED - - - -

HKLM-Run-dudejuril - c:\windows\system32\mizifaru.dll

HKLM-Run-08154220 - c:\docume~1\ALLUSE~1\APPLIC~1\08154220\08154220.exe

HKLM-Run-bitufugoli - matumiga.dll

SharedTaskScheduler-{df3718c8-8bc8-4c78-b507-15c1c3c48c18} - c:\windows\system32\yetuheke.dll

SharedTaskScheduler-{80337a5f-edff-44dc-a87d-d74d3435a901} - c:\windows\system32\mizifaru.dll

SSODL-liwifolog-{df3718c8-8bc8-4c78-b507-15c1c3c48c18} - c:\windows\system32\yetuheke.dll

SSODL-mirumerig-{80337a5f-edff-44dc-a87d-d74d3435a901} - c:\windows\system32\mizifaru.dll

**************************************************************************

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net

Rootkit scan 2009-10-13 07:29

Windows 5.1.2600 Service Pack 2 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully

hidden files: 0

**************************************************************************

[HKEY_LOCAL_MACHINE\System\ControlSet001\Services\npggsvc]

"ImagePath"="c:\windows\system32\GameMon.des -service"

.

--------------------- LOCKED REGISTRY KEYS ---------------------

[HKEY_USERS\S-1-5-21-3916042557-2250566534-1493674001-1006\Software\SecuROM\License information*]

"datasecu"=hex:e1,9c,7f,48,9c,75,04,af,f1,45,48,22,a6,b6,59,b0,47,48,87,8c,5a,

e9,b4,33,22,f4,47,73,65,a8,06,eb,17,67,b4,2b,25,6d,1b,0a,87,9e,41,48,62,51,\

"rkeysecu"=hex:de,b6,88,f1,4a,ef,9e,a7,7b,a7,e0,ef,c4,ac,6c,b4

.

Completion time: 2009-10-13 7:38

ComboFix-quarantined-files.txt 2009-10-13 11:37

ComboFix2.txt 2007-07-31 19:33

Pre-Run: 27,930,783,744 bytes free

Post-Run: 27,829,805,056 bytes free

614 --- E O F --- 2009-10-13 10:57

HJT LOG:

Logfile of Trend Micro HijackThis v2.0.2

Scan saved at 5:10:24 PM, on 10/13/2009

Platform: Windows XP SP2 (WinNT 5.01.2600)

MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)

Boot mode: Normal

Running processes:

C:\WINDOWS\System32\smss.exe

C:\WINDOWS\system32\winlogon.exe

C:\WINDOWS\system32\services.exe

C:\WINDOWS\system32\lsass.exe

C:\WINDOWS\system32\svchost.exe

C:\WINDOWS\System32\svchost.exe

C:\WINDOWS\system32\ZoneLabs\vsmon.exe

C:\WINDOWS\Explorer.EXE

C:\Program Files\Alwil Software\Avast4\aswUpdSv.exe

C:\Program Files\Alwil Software\Avast4\ashServ.exe

C:\WINDOWS\system32\spoolsv.exe

C:\Program Files\Common Files\ArcSoft\Connection Service\Bin\ACService.exe

C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe

C:\Program Files\Bonjour\mDNSResponder.exe

C:\Program Files\Java\jre6\bin\jqs.exe

c:\Program Files\Microsoft SQL Server\90\Shared\sqlwriter.exe

C:\WINDOWS\System32\PAStiSvc.exe

C:\WINDOWS\system32\svchost.exe

C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe

C:\Program Files\Analog Devices\Core\smax4pnp.exe

C:\Program Files\McAfee\SpamKiller\MSKDetct.exe

C:\Program Files\Common Files\Real\Update_OB\realsched.exe

C:\Program Files\Java\jre6\bin\jusched.exe

C:\WINDOWS\system32\hkcmd.exe

C:\WINDOWS\system32\igfxpers.exe

C:\PROGRA~1\EPSONS~1\EVENTM~1\EEventManager.exe

C:\Program Files\Common Files\ArcSoft\Connection Service\Bin\ACDaemon.exe

C:\PROGRA~1\ALWILS~1\Avast4\ashDisp.exe

C:\Program Files\Zone Labs\ZoneAlarm\zlclient.exe

C:\Program Files\Digital Line Detect\DLG.exe

C:\PROGRA~1\Yahoo!\MESSEN~1\ymsgr_tray.exe

C:\Program Files\Alwil Software\Avast4\ashWebSv.exe

C:\WINDOWS\system32\wuauclt.exe

C:\Program Files\Mozilla Firefox\firefox.exe

C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.yahoo.com/

R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157

R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896

R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896

R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.yahoo.com

R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = *.local

O2 - BHO: (no name) - {02478D38-C3F9-4efb-9B51-7695ECA05670} - (no file)

O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 6.0\Reader\ActiveX\AcroIEHelper.dll

O2 - BHO: DriveLetterAccess - {5CA3D70E-1895-11CF-8E15-001234567890} - C:\WINDOWS\System32\DLA\DLASHX_W.DLL

O2 - BHO: (no name) - {c1f33e18-d653-4b7a-b61f-38dc232c49d8} - riwumagu.dll (file missing)

O2 - BHO: Java Plug-In 2 SSV Helper - {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Program Files\Java\jre6\bin\jp2ssv.dll

O2 - BHO: JQSIEStartDetectorImpl - {E7E6F031-17CE-4C07-BC86-EABFE594F69C} - C:\Program Files\Java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll

O2 - BHO: EpsonToolBandKicker Class - {E99421FB-68DD-40F0-B4AC-B7027CAE2F1A} - C:\Program Files\EPSON\EPSON Web-To-Page\EPSON Web-To-Page.dll

O3 - Toolbar: EPSON Web-To-Page - {EE5D279F-081B-4404-994D-C6B60AAEBA6D} - C:\Program Files\EPSON\EPSON Web-To-Page\EPSON Web-To-Page.dll

O4 - HKLM\..\Run: [soundMAXPnP] C:\Program Files\Analog Devices\Core\smax4pnp.exe

O4 - HKLM\..\Run: [iSUSPM Startup] "C:\Program Files\Common Files\InstallShield\UpdateService\isuspm.exe" -startup

O4 - HKLM\..\Run: [iSUSScheduler] "C:\Program Files\Common Files\InstallShield\UpdateService\issch.exe" -start

O4 - HKLM\..\Run: [MSKDetectorExe] C:\Program Files\McAfee\SpamKiller\MSKDetct.exe /uninstall

O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Common Files\Real\Update_OB\realsched.exe" -osboot

O4 - HKLM\..\Run: [sunJavaUpdateSched] "C:\Program Files\Java\jre6\bin\jusched.exe"

O4 - HKLM\..\Run: [igfxtray] C:\WINDOWS\system32\igfxtray.exe

O4 - HKLM\..\Run: [igfxhkcmd] C:\WINDOWS\system32\hkcmd.exe

O4 - HKLM\..\Run: [igfxpers] C:\WINDOWS\system32\igfxpers.exe

O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\QTTask.exe" -atboottime

O4 - HKLM\..\Run: [EEventManager] C:\PROGRA~1\EPSONS~1\EVENTM~1\EEventManager.exe

O4 - HKLM\..\Run: [ArcSoft Connection Service] C:\Program Files\Common Files\ArcSoft\Connection Service\Bin\ACDaemon.exe

O4 - HKLM\..\Run: [avast!] C:\PROGRA~1\ALWILS~1\Avast4\ashDisp.exe

O4 - HKLM\..\Run: [Malwarebytes Anti-Malware (reboot)] "C:\Program Files\Malwarebytes' Anti-Malware\mbam.exe" /runcleanupscript

O4 - HKLM\..\Run: [ZoneAlarm Client] "C:\Program Files\Zone Labs\ZoneAlarm\zlclient.exe"

O4 - HKCU\..\Run: [Yahoo! Pager] "C:\PROGRA~1\Yahoo!\MESSEN~1\YAHOOM~1.EXE" -quiet

O4 - S-1-5-18 Startup: Epson all-in-one Registration.lnk = ? (User 'SYSTEM')

O4 - .DEFAULT Startup: Epson all-in-one Registration.lnk = ? (User 'Default user')

O4 - Startup: Epson all-in-one Registration.lnk = ?

O4 - Global Startup: Digital Line Detect.lnk = ?

O8 - Extra context menu item: Download All by FlashGet - C:\Program Files\FlashGet\jc_all.htm

O8 - Extra context menu item: Download using FlashGet - C:\Program Files\FlashGet\jc_link.htm

O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MI1933~1\Office12\EXCEL.EXE/3000

O8 - Extra context menu item: Lookup on Merriam Webster - file://C:\Program Files\ieSpell\Merriam Webster.HTM

O8 - Extra context menu item: Lookup on Wikipedia - file://C:\Program Files\ieSpell\wikipedia.HTM

O9 - Extra button: Real.com - {CD67F990-D8E9-11d2-98FE-00C0F0318AFE} - C:\WINDOWS\system32\Shdocvw.dll

O9 - Extra button: FlashGet - {D6E814A0-E0C5-11d4-8D29-0050BA6940E3} - C:\PROGRA~1\FlashGet\flashget.exe (file missing)

O9 - Extra 'Tools' menuitem: &FlashGet - {D6E814A0-E0C5-11d4-8D29-0050BA6940E3} - C:\PROGRA~1\FlashGet\flashget.exe (file missing)

O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe

O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe

O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe

O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe

O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} (WUWebControl Class) - http://update.microsoft.com/windowsupdate/...b?1146495978781

O16 - DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} (MUWebControl Class) - http://www.update.microsoft.com/microsoftu...b?1189473567156

O23 - Service: ArcSoft Connect Daemon (ACDaemon) - ArcSoft Inc. - C:\Program Files\Common Files\ArcSoft\Connection Service\Bin\ACService.exe

O23 - Service: Apple Mobile Device - Apple, Inc. - C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe

O23 - Service: avast! iAVS4 Control Service (aswUpdSv) - ALWIL Software - C:\Program Files\Alwil Software\Avast4\aswUpdSv.exe

O23 - Service: avast! Antivirus - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashServ.exe

O23 - Service: avast! Mail Scanner - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe

O23 - Service: avast! Web Scanner - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashWebSv.exe

O23 - Service: Bonjour Service - Apple Inc. - C:\Program Files\Bonjour\mDNSResponder.exe

O23 - Service: DSBrokerService - Unknown owner - C:\Program Files\DellSupport\brkrsvc.exe

O23 - Service: GameConsoleService - WildTangent, Inc. - C:\Program Files\WildTangent\Apps\Dell Game Console\GameConsoleService.exe

O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe

O23 - Service: Java Quick Starter (JavaQuickStarterService) - Sun Microsystems, Inc. - C:\Program Files\Java\jre6\bin\jqs.exe

O23 - Service: Logitech Process Monitor (LVPrcSrv) - Unknown owner - c:\program files\common files\logitech\lvmvfm\LVPrcSrv.exe (file missing)

O23 - Service: Intel NCS NetService (NetSvc) - Intel® Corporation - C:\Program Files\Intel\PROSetWired\NCS\Sync\NetSvc.exe

O23 - Service: nProtect GameGuard Service (npggsvc) - Unknown owner - C:\WINDOWS\system32\GameMon.des.exe (file missing)

O23 - Service: STI Simulator - Unknown owner - C:\WINDOWS\System32\PAStiSvc.exe

O23 - Service: TrueVector Internet Monitor (vsmon) - Check Point Software Technologies LTD - C:\WINDOWS\system32\ZoneLabs\vsmon.exe

--

End of file - 8784 bytes

Link to post
Share on other sites

Full scan of malwarebytes after the above steps revealed another rogue security:

Malwarebytes' Anti-Malware 1.41

Database version: 2955

Windows 5.1.2600 Service Pack 2

10/14/2009 1:36:39 AM

mbam-log-2009-10-14 (01-36-39).txt

Scan type: Full Scan (C:\|D:\|)

Objects scanned: 248275

Time elapsed: 3 hour(s), 4 minute(s), 14 second(s)

Memory Processes Infected: 0

Memory Modules Infected: 0

Registry Keys Infected: 0

Registry Values Infected: 0

Registry Data Items Infected: 0

Folders Infected: 0

Files Infected: 1

Memory Processes Infected:

(No malicious items detected)

Memory Modules Infected:

(No malicious items detected)

Registry Keys Infected:

(No malicious items detected)

Registry Values Infected:

(No malicious items detected)

Registry Data Items Infected:

(No malicious items detected)

Folders Infected:

(No malicious items detected)

Files Infected:

C:\QooBox\Quarantine\C\Documents and Settings\All Users\Application Data\08154220\08154220.exe.vir (Rogue.SecurityTool) -> Quarantined and deleted successfully.

Link to post
Share on other sites

  • Root Admin

STEP 01

With all other applications closed (Taskbar empty), open HijackThis again

and run Do a system scan only and place a check mark on the following items.

  • R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = *.local
  • O2 - BHO: (no name) - {02478D38-C3F9-4efb-9B51-7695ECA05670} - (no file)
  • O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 6.0\Reader\ActiveX\AcroIEHelper.dll
  • O2 - BHO: DriveLetterAccess - {5CA3D70E-1895-11CF-8E15-001234567890} - C:\WINDOWS\System32\DLA\DLASHX_W.DLL
  • O2 - BHO: (no name) - {c1f33e18-d653-4b7a-b61f-38dc232c49d8} - riwumagu.dll (file missing)
  • O2 - BHO: Java
Link to post
Share on other sites

STEP 1 - followed and completed successfully

STEP 2 - followed and completed successfully

STEP 3 - followed - combofix successfully ran, then rebooted the computer. it then stalled for hours saying it was generating a log. i assume this is because upon reboot the startup programs were reactivated and caused it to stall. so, i did not get a log. i have not run it again, so please advise what i should do from here. as i said, it appeared that it was done doing it's thing and only stalled after rebooting, but this has left me with no log to post.

STEP 4 - followed and completed successfully

Thank you, I will await your advice from this point. I did a quick scan with malwarebytes today which came up clean. I then did a full scan that picked up 4 infections with the trojan.vundo still. Log follows.

Malwarebytes' Anti-Malware 1.41

Database version: 2967

Windows 5.1.2600 Service Pack 2

10/15/2009 3:46:00 PM

mbam-log-2009-10-15 (15-46-00).txt

Scan type: Full Scan (C:\|D:\|)

Objects scanned: 240915

Time elapsed: 1 hour(s), 53 minute(s), 35 second(s)

Memory Processes Infected: 0

Memory Modules Infected: 0

Registry Keys Infected: 0

Registry Values Infected: 0

Registry Data Items Infected: 0

Folders Infected: 0

Files Infected: 4

Memory Processes Infected:

(No malicious items detected)

Memory Modules Infected:

(No malicious items detected)

Registry Keys Infected:

(No malicious items detected)

Registry Values Infected:

(No malicious items detected)

Registry Data Items Infected:

(No malicious items detected)

Folders Infected:

(No malicious items detected)

Files Infected:

C:\System Volume Information\_restore{202550A8-7A33-4BCA-9586-051D24DDBF8F}\RP944\A0195539.dll (Trojan.Vundo) -> Quarantined and deleted successfully.

C:\System Volume Information\_restore{202550A8-7A33-4BCA-9586-051D24DDBF8F}\RP945\A0195747.dll (Trojan.Vundo) -> Quarantined and deleted successfully.

C:\System Volume Information\_restore{202550A8-7A33-4BCA-9586-051D24DDBF8F}\RP946\A0195956.dll (Trojan.Vundo) -> Quarantined and deleted successfully.

C:\System Volume Information\_restore{202550A8-7A33-4BCA-9586-051D24DDBF8F}\RP947\A0196327.dll (Trojan.Vundo) -> Quarantined and deleted successfully.

Link to post
Share on other sites

  • Root Admin

Please run the following scanner.

nod32scanner.jpg

Please temporarily
disable
your current Anti-Virus in order to run this Online Scanner.

Using Internet Explorer:

  • Vista and Windows 7
    users need to right-click on the IE icon in the Start Menu or Quick Launch Bar on the Taskbar and select
    "Run as Administrator"
    from the context menu.

  • Click
    here
    to run the Eset Online Scanner using Internet Explorer.

  • Click on the
    ESET Online Scanner
    button.

  • Click on the checkbox
    Yes, I accpet the Terms of Use
    and click on the Start button.

  • By default the ActiveX installer will be blocked by Internet Explorer. You should see a yellow banner at the top of the Window.

  • Click the top of the Window and select "Run ActiveX
    C
    ontrol" and then click the
    Run
    button on the next dialog box.

  • Click the
    Retry
    button if prompted to resend the request to load and run the ActiveX control from ESET

  • Make sure you
    Uncheck
    the
    Remove found threats
    checkbox in case we need you to submit a copy of any files found.

  • Click on the
    Advanced settings
    selection in the middle and place a checkmark on the following items

  • Scan for potentially unwanted applications

  • Scan for potentially unsafe applications

  • Enable Anti-Stealth technology

  • Under Current scan targets: click the Change... item and make sure it's set to Local drives and the Operating memory

  • Then click on the Start button and it will start downloading signature database files to update the program
  • Once the database files are downloaded it should automatically start scanning your system for threats.
  • When the scanner is done please click on the List of found threats and click on Export to text file...
  • Save the file as NOD32_SCAN.TXT to your Desktop
  • Click the << Back button. For now do not uninstall the program or delete the quarantine files, just click the Finish button.
  • The next screen is advertisement to purchase the product. You can just close that window for now.
  • If we need to run the program later on it can be ran from here: C:\Program Files\ESET\ESET Online Scanner\OnlineScannerApp.exe
  • Open the file you saved to your Desktop as NOD32_SCAN.TXT and select all and copy/paste it back on your next reply

Using Another Browser

  • Please click
    here
    to launch the application which installs and launches ESET Online Scanner in a separate window.

  • You will first need to save the file to your Desktop and double-click on it to run it.
    Vista and Windows 7
    users need to right-click and choose
    "Run as Administrator"

  • You will should be prompted with "
    Do you want to run this file?
    ", click on the Run button.

  • Click on the checkbox
    Yes, I accpet the Terms of Use
    and click on the Start button.

  • The program will download further files to use with the scanner and allow you to change options.

  • Make sure you
    Uncheck
    the
    Remove found threats
    checkbox in case we need you to submit a copy of any files found.

  • Click on the
    Advanced settings
    selection in the middle and place a checkmark on the following items

  • Scan for potentially unwanted applications

  • Scan for potentially unsafe applications

  • Enable Anti-Stealth technology

  • Under Current scan targets: click the Change... item and make sure it's set to Local drives and the Operating memory

  • Then click on the Start button and it will start downloading signature database files to update the program
  • Once the database files are downloaded it should automatically start scanning your system for threats.
  • When the scanner is done please click on the List of found threats and click on Export to text file...
  • Save the file as NOD32_SCAN.TXT to your Desktop
  • Click the << Back button. For now do not uninstall the program or delete the quarantine files, just click the Finish button.
  • The next screen is advertisement to purchase the product. You can just close that window for now.
  • If we need to run the program later on it can be ran from here: C:\Program Files\ESET\ESET Online Scanner\OnlineScannerApp.exe
  • Open the file you saved to your Desktop as NOD32_SCAN.TXT and select all and copy/paste it back on your next reply

Link to post
Share on other sites

I just realized I didn't post the JavaRa log, so I'll post it for you to look over now.

NOD32 log follows also:

JavaRa Log:

JavaRa 1.15 Removal Log.

Report follows after line.

------------------------------------

The JavaRa removal process was started on Thu Oct 15 12:05:05 2009

Found and removed: C:\Program Files\Java\j2re1.4.2_03

Found and removed: C:\Program Files\Java\jre1.6.0_03

Found and removed: Software\JavaSoft\Java2D\1.5.0_08

Found and removed: Software\JavaSoft\Java2D\1.5.0_09

Found and removed: Software\JavaSoft\Java2D\1.5.0_10

Found and removed: Software\JavaSoft\Java2D\1.5.0_11

Found and removed: SOFTWARE\Classes\JavaPlugin.150_08

Found and removed: SOFTWARE\Classes\JavaPlugin.150_09

Found and removed: SOFTWARE\Classes\JavaPlugin.150_10

Found and removed: SOFTWARE\Classes\JavaWebStart.isInstalled.1.5.0.0

Found and removed: SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\8A0F841731866D117AB7000B0D410203

Found and removed: SOFTWARE\Classes\JavaPlugin.142_03

Found and removed: Software\Classes\JavaPlugin.160_01

Found and removed: SOFTWARE\Microsoft\Active Setup\Installed Components\{08B0E5C0-4FCB-11CF-AAA5-00401C608500}

Found and removed: SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders\\C:\Program Files\Java\jre1.6.0_03\

Found and removed: SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders\\C:\Program Files\Java\jre1.6.0_05\

------------------------------------

Finished reporting.

NOD32_SCAN.TXT

C:\Program Files\Dell Games\Cute Knight\kishi.exe a variant of Win32/Adware.XPAntivirus application

C:\QooBox\Quarantine\C\WINDOWS\system32\diperede.dll.vir a variant of Win32/Adware.SuperJuan.F application

C:\QooBox\Quarantine\C\WINDOWS\system32\dugigidu.dll.vir a variant of Win32/Adware.Virtumonde.NFT application

C:\QooBox\Quarantine\C\WINDOWS\system32\kodesalo.dll.vir a variant of Win32/Adware.SuperJuan.F application

C:\QooBox\Quarantine\C\WINDOWS\system32\mizifaru.dll.vir a variant of Win32/Adware.Virtumonde.NFT application

C:\QooBox\Quarantine\C\WINDOWS\system32\sotugulu.dll.vir a variant of Win32/AntiAV.NCZ trojan

C:\QooBox\Quarantine\C\WINDOWS\system32\vatavude.dll.vir a variant of Win32/AntiAV.NCZ trojan

C:\QooBox\Quarantine\C\WINDOWS\system32\wefojuho.dll.vir a variant of Win32/AntiAV.NCZ trojan

C:\System Volume Information\_restore{202550A8-7A33-4BCA-9586-051D24DDBF8F}\RP944\A0195527.dll a variant of Win32/Adware.Virtumonde.NFT application

C:\System Volume Information\_restore{202550A8-7A33-4BCA-9586-051D24DDBF8F}\RP944\A0195528.dll a variant of Win32/AntiAV.NCZ trojan

C:\System Volume Information\_restore{202550A8-7A33-4BCA-9586-051D24DDBF8F}\RP944\A0195536.dll a variant of Win32/Adware.SuperJuan.F application

C:\System Volume Information\_restore{202550A8-7A33-4BCA-9586-051D24DDBF8F}\RP944\A0195537.dll a variant of Win32/Adware.SuperJuan.F application

C:\System Volume Information\_restore{202550A8-7A33-4BCA-9586-051D24DDBF8F}\RP945\A0195735.dll a variant of Win32/Adware.Virtumonde.NFT application

C:\System Volume Information\_restore{202550A8-7A33-4BCA-9586-051D24DDBF8F}\RP945\A0195736.dll a variant of Win32/AntiAV.NCZ trojan

C:\System Volume Information\_restore{202550A8-7A33-4BCA-9586-051D24DDBF8F}\RP945\A0195744.dll a variant of Win32/Adware.SuperJuan.F application

C:\System Volume Information\_restore{202550A8-7A33-4BCA-9586-051D24DDBF8F}\RP945\A0195745.dll a variant of Win32/Adware.SuperJuan.F application

C:\System Volume Information\_restore{202550A8-7A33-4BCA-9586-051D24DDBF8F}\RP946\A0195944.dll a variant of Win32/Adware.Virtumonde.NFT application

C:\System Volume Information\_restore{202550A8-7A33-4BCA-9586-051D24DDBF8F}\RP946\A0195945.dll a variant of Win32/AntiAV.NCZ trojan

C:\System Volume Information\_restore{202550A8-7A33-4BCA-9586-051D24DDBF8F}\RP946\A0195953.dll a variant of Win32/Adware.SuperJuan.F application

C:\System Volume Information\_restore{202550A8-7A33-4BCA-9586-051D24DDBF8F}\RP946\A0195954.dll a variant of Win32/Adware.SuperJuan.F application

C:\System Volume Information\_restore{202550A8-7A33-4BCA-9586-051D24DDBF8F}\RP947\A0196315.dll a variant of Win32/Adware.Virtumonde.NFT application

C:\System Volume Information\_restore{202550A8-7A33-4BCA-9586-051D24DDBF8F}\RP947\A0196316.dll a variant of Win32/AntiAV.NCZ trojan

C:\System Volume Information\_restore{202550A8-7A33-4BCA-9586-051D24DDBF8F}\RP947\A0196324.dll a variant of Win32/Adware.SuperJuan.F application

C:\System Volume Information\_restore{202550A8-7A33-4BCA-9586-051D24DDBF8F}\RP947\A0196325.dll a variant of Win32/Adware.SuperJuan.F application

C:\System Volume Information\_restore{202550A8-7A33-4BCA-9586-051D24DDBF8F}\RP950\A0199058.dll a variant of Win32/Adware.SuperJuan.F application

C:\System Volume Information\_restore{202550A8-7A33-4BCA-9586-051D24DDBF8F}\RP952\A0200377.dll a variant of Win32/AntiAV.NCZ trojan

C:\System Volume Information\_restore{202550A8-7A33-4BCA-9586-051D24DDBF8F}\RP952\A0200378.dll a variant of Win32/AntiAV.NCZ trojan

C:\System Volume Information\_restore{202550A8-7A33-4BCA-9586-051D24DDBF8F}\RP952\A0200379.dll a variant of Win32/AntiAV.NCZ trojan

C:\System Volume Information\_restore{202550A8-7A33-4BCA-9586-051D24DDBF8F}\RP953\A0202442.dll a variant of Win32/Adware.Virtumonde.NFT application

Link to post
Share on other sites

Apologies, I was away from the computer the majority of the weekend. :)

Please download the following tool to your desktop and run it. When asked to reboot please do.

http://oldtimer.geekstogo.com/OTC.exe

Check

Uninstall the ESET scanner now.

Check

How is the computer running now? Much better, it seems back to its old self again.

Are there still any signs of an infection? Not that I can see.

So the things in the NOD32_SCAN.TXT are of no concern then? I figured out the QooBox listings are the quarantined files, but are the others ok as well?

Thank you so much for your assistance. Do you guys accept donations or anything?

Further advice on better recommendations concerning my antivirus, firewall, and etc. would be welcomed as well.

Link to post
Share on other sites

  • Root Admin

Avast is a good AV product. There is no product that can stop everything on any given day as new stuff comes out every day.

No we don't accept donations but if you really want to spend the money you can buy the registered version of MBAM which comes with lifetime updates and protection module for file and IP to help protect you from getting infected in the first place.

Great, all looks good now.

I'll close your post soon so that other don't post into it and leave you with this information and suggestions.

So how did I get infected in the first place?

At this time your system appears to be clean. Nothing else in the logs indicates that you are still infected.

Now that you appear to be clean, please follow these simple steps in order to keep your computer clean and secure:

Remove all but the most recent Restore Point on Windows XP

You should
Create a New Restore Point
to prevent possible reinfection from an old one.

Some of the malware you picked up could have been saved in System Restore.

Since this is a protected directory your tools cannot access to delete these files, they sometimes can reinfect your system if you accidentally use an old restore point.

Setting a new restore point AFTER cleaning your system will help prevent this and enable your computer to
"roll-back"
to a clean working state.

The easiest and safest way to do this is

:
  • Go to
    Start
    >
    Programs
    >
    Accessories
    >
    System Tools
    and click "
    System Restore
    ".

  • If the shortcut is missing you can also click on
    START
    >
    RUN
    > and type in
    %SystemRoot%\system32\restore\rstrui.exe
    and click OK

  • Choose the radio button marked "
    Create a Restore Point
    " on the first screen then click "
    Next
    ".

  • Give the new Restore Point a name, then click "
    Create
    ".

  • The new point will be stamped with the current date and time. Keep a log of this so you can find it easily should you need to use System Restore.

  • Then use the
    Disk Cleanup
    to remove all but the most recently created Restore Point.

  • Go to
    Start
    >
    Run
    and type:
    Cleanmgr.exe

  • Select the drive where Windows is installed and click "
    Ok
    ". Disk Cleanup will scan your files for several minutes, then open.

  • Click the "
    More Options
    " tab, then click the "
    Clean up
    " button under System Restore.

  • Click Ok. You will be prompted with "
    Are you sure you want to delete all but the most recent restore point?
    "

  • Click
    Yes
    , then click Ok.

  • Click
    Yes
    again when prompted with "
    Are you sure you want to perform these actions?
    "

  • Disk Cleanup will remove the files and close automatically.

  • On the
    Disk Cleanup
    tab, if the
    System Restore: Obsolete Data Stores
    entry is available remove them also.

  • These are files that were created before Windows was reformatted or reinstalled. They are obsolete and you can delete them.

selectdrivecleanup.pngselectdrivecleanup1.png

Additional information

Microsoft KB article: How to turn off and turn on System Restore in Windows XP

Bert Kinney's site: All about Windows System Restore

Here are some free programs I recommend that could help you improve your computer's security.

Install SpyWare Blaster

Download it from here

Find here the tutorial on how to use Spyware Blaster here

Install WinPatrol

Download it from here

Here you can find information about how WinPatrol works here

Install FireTrust SiteHound

You can find information and download it from here

Install hpHosts

Download it from here

hpHosts is a community managed and maintained hosts file that allows an additional layer of protection against access to ad,

tracking and malicious websites. This prevents your computer from connecting to these untrusted sites

by redirecting them to 127.0.0.1 which is your own local computer.

hpHosts Support Forum

Update your Antivirus programs and other security products regularly to avoid new threats that could infect your system.

You can use one of these sites to check if any updates are needed for your pc.

Secunia Software Inspector

F-secure Health Check

Visit Microsoft often to get the latest updates for your computer.

http://www.update.microsoft.com

Note 1: If you are running Windows XP SP2, you should upgrade to SP3.

Note 2: Users of Norton Internet Security 2008 should uninstall the software before they install Service Pack 3.

The security suite can then be reinstalled afterwards.

The windows firewall is not sufficient to protect your system. It doesn't monitor outgoing traffic and this is a must.

I recommend Online Armor Free

A little outdated but good reading on how to prevent Malware

Keep safe online and happy surfing.

Since this issue is resolved I will close the thread to prevent others from posting into it. If you need assistance please start your own topic and someone will be happy to assist you.

The fixes and advice in this thread are for this machine only. Do not apply to your machine unless you Fully Understand how these programs work and what you're doing. Please start a thread of your own and someone will be happy to help you, just follow the Pre-Hijackthis instructions found here before posting Pre- HJT Post Instructions

Also don't forget that we offer FREE assistance with General PC questions and repair here PC Help

If you're pleased with the product Malwarebytes and the service provided you, please let your friends, family, and co-workers know. http://www.malwarebytes.org

Link to post
Share on other sites

Guest
This topic is now closed to further replies.
 Share

  • Recently Browsing   0 members

    • No registered users viewing this page.
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.