Jump to content

Please Help MB cannot remove


Jticks

Recommended Posts

Thank you in advance for any help- I am stuck and

in desperate need of any advice.

I am Running a Dell Inspiron 9300 laptop with XP.

I tried to restore to earlier date and virus locked me out

with administator message. I tried safe mode and would not

let me. I am not a techie but would appreciate any other

suggestion to kill the virus located by Mbam.. below is my

log. thanks JP

Malwarebytes' Anti-Malware 1.41

Database version: 2775

Windows 5.1.2600 Service Pack 2

11/22/2009 8:49:34 AM

mbam-log-2009-11-22 (08-49-26).txt

Scan type: Quick Scan

Objects scanned: 127174

Time elapsed: 4 minute(s), 42 second(s)

Memory Processes Infected: 0

Memory Modules Infected: 0

Registry Keys Infected: 0

Registry Values Infected: 0

Registry Data Items Infected: 1

Folders Infected: 0

Files Infected: 4

Memory Processes Infected:

(No malicious items detected)

Memory Modules Infected:

(No malicious items detected)

Registry Keys Infected:

(No malicious items detected)

Registry Values Infected:

(No malicious items detected)

Registry Data Items Infected:

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\UpdatesDisableNotify (Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> No action taken.

Folders Infected:

(No malicious items detected)

Files Infected:

C:\WINDOWS\Temp\csrss.exe (Trojan.Agent) -> No action taken.

C:\WINDOWS\Temp\nsrbgxod.bak (Trojan.Agent) -> No action taken.

C:\Documents and Settings\Jonathan\Local Settings\Temp\nsrbgxod.bak (Trojan.Agent) -> No action taken.

C:\WINDOWS\Temp\taskmgr.exe (Trojan.Downloader) -> No action taken.

Link to post
Share on other sites

Hi Jticks, welcome to Malwarebytes :)

Please run Malwarebytes again and this time when it finds the threats please choose to remove them.

then......

Download ComboFix from one of these locations:

Link 1

Link 2

* IMPORTANT !!! Save ComboFix.exe to your Desktop

  • Disable your AntiVirus and AntiSpyware applications, usually via a right click on the System Tray icon. They may otherwise interfere with our tools
  • Double click on ComboFix.exe & follow the prompts.
  • As part of it's process, ComboFix will check to see if the Microsoft Windows Recovery Console is installed. With malware infections being as they are today, it's strongly recommended to have this pre-installed on your machine before doing any malware removal. It will allow you to boot up into a special recovery/repair mode that will allow us to more easily help you should your computer have a problem after an attempted removal of malware.
  • Follow the prompts to allow ComboFix to download and install the Microsoft Windows Recovery Console, and when prompted, agree to the End-User License Agreement to install the Microsoft Windows Recovery Console.

**Please note: If the Microsoft Windows Recovery Console is already installed, ComboFix will continue it's malware removal procedures.

RcAuto1.gif

Once the Microsoft Windows Recovery Console is installed using ComboFix, you should see the following message:

whatnext.png

Click on Yes, to continue scanning for malware.

When finished, it shall produce a log for you. Please include the C:\ComboFix.txt in your next reply.

Link to post
Share on other sites

Hi Jticks, welcome to Malwarebytes :)

Please run Malwarebytes again and this time when it finds the threats please choose to remove them.

then......

Download ComboFix from one of these locations:

Link 1

Link 2

* IMPORTANT !!! Save ComboFix.exe to your Desktop

  • Disable your AntiVirus and AntiSpyware applications, usually via a right click on the System Tray icon. They may otherwise interfere with our tools
  • Double click on ComboFix.exe & follow the prompts.
  • As part of it's process, ComboFix will check to see if the Microsoft Windows Recovery Console is installed. With malware infections being as they are today, it's strongly recommended to have this pre-installed on your machine before doing any malware removal. It will allow you to boot up into a special recovery/repair mode that will allow us to more easily help you should your computer have a problem after an attempted removal of malware.
  • Follow the prompts to allow ComboFix to download and install the Microsoft Windows Recovery Console, and when prompted, agree to the End-User License Agreement to install the Microsoft Windows Recovery Console.

**Please note: If the Microsoft Windows Recovery Console is already installed, ComboFix will continue it's malware removal procedures.

RcAuto1.gif

Once the Microsoft Windows Recovery Console is installed using ComboFix, you should see the following message:

whatnext.png

Click on Yes, to continue scanning for malware.

When finished, it shall produce a log for you. Please include the C:\ComboFix.txt in your next reply.

thanks for the reply and help... I cannot REMOVE the items. Once clicked it freezes..

Link to post
Share on other sites

You're welcome.

Thank you for letting me know.

Go ahead to the ComboFix step and let me know if it runs ok. If it does post the log here in a reply.

Thank you again for your help... Below is the log file after running combofix 2 times. After the first time I could not

locate the log file and it appeared to hang up after 30 min of preparing the log file. The text below is from the 2nd

run. Again thanks for your kind assistance. JP

-----------------------------------------

ComboFix 09-11-21.03 - Jonathan 11/22/2009 13:07.2.1 - x86

Microsoft Windows XP Professional 5.1.2600.2.1252.1.1033.18.1023.609 [GMT -6:00]

Running from: E:\ComboFix.exe

FW: Norton Internet Worm Protection *disabled* {990F9400-4CEE-43EA-A83A-D013ADD8EA6E}

.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))

.

.

---- Previous Run -------

.

c:\documents and settings\HelpAssistant.JONATHANWG1.001\ntuser.dll

c:\documents and settings\Jonathan\ntuser.dll

c:\documents and settings\Jonathan\Start Menu\Programs\Startup\scandisk.dll

c:\documents and settings\Jonathan\Start Menu\Programs\Startup\scandisk.lnk

c:\documents and settings\LocalService\Local Settings\Temporary Internet Files\CPV.stt

c:\documents and settings\NetworkService\ntuser.dll

c:\temp\1cb\syscheck.log

c:\temp\DIV55\xDb.log

c:\windows\kb913800.exe

c:\windows\system32\C\MTK63G.exe

c:\windows\system32\calc.dll

c:\windows\system32\config\systemprofile\ntuser.dll

c:\windows\system32\config\systemprofile\Start Menu\Programs\Startup\scandisk.dll

c:\windows\system32\config\systemprofile\Start Menu\Programs\Startup\scandisk.lnk

c:\windows\system32\Ijl11.dll

c:\windows\system32\ki3\RI2ES6i.exe

c:\windows\system32\kozeyizu.dll.tmp

c:\windows\system32\sawuzowu(2).dll

c:\windows\system32\tinuhagu.dll.tmp

c:\windows\system32\vogekomu.dll.tmp

c:\windows\system32\worayewu.dll.tmp

c:\windows\system32\wotunivo.dll.tmp

c:\windows\system32\yapafeju.dll.tmp

c:\windows\Temp\2958525059.exe

c:\windows\Temp\3909931309.exe

Infected copy of c:\windows\system32\drivers\atapi.sys was found and disinfected

Restored copy from - Kitty ate it :)

.

((((((((((((((((((((((((( Files Created from 2009-10-22 to 2009-11-22 )))))))))))))))))))))))))))))))

.

2009-11-22 19:07 . 2004-08-10 11:00 95360 -c--a-w- c:\windows\system32\dllcache\atapi.sys

2009-11-22 19:07 . 2004-08-10 11:00 95360 ----a-w- c:\windows\system32\drivers\atapi.sys

2009-11-22 14:26 . 2009-09-10 20:54 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys

2009-11-22 14:26 . 2009-11-22 14:26 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware

2009-11-22 14:26 . 2009-09-10 20:53 19160 ----a-w- c:\windows\system32\drivers\mbam.sys

2009-11-22 12:33 . 2009-11-22 12:33 -------- d-----w- c:\documents and settings\Jonathan\Application Data\IObit

2009-11-21 05:43 . 2009-11-21 05:43 -------- d-----w- c:\documents and settings\HelpAssistant.JONATHANWG1.001\Temp

2009-11-21 05:38 . 2009-10-26 12:26 72080 ----a-w- c:\documents and settings\HelpAssistant.JONATHANWG1.001\g2mdlhlpx.exe

2009-11-21 05:38 . 2009-11-21 05:38 -------- d-----w- c:\documents and settings\HelpAssistant.JONATHANWG1.001\Dr Delete

2009-11-21 05:38 . 2009-11-21 05:38 -------- d-----w- c:\documents and settings\HelpAssistant.JONATHANWG1.001\DoctorWeb

2009-11-21 05:34 . 2009-11-22 12:28 -------- d-----w- c:\documents and settings\HelpAssistant.JONATHANWG1.001\.housecall6.6

2009-11-21 05:34 . 2009-11-22 18:57 -------- d-----w- c:\documents and settings\HelpAssistant.JONATHANWG1.001

2009-11-21 05:31 . 2009-11-21 05:31 -------- d-----w- c:\windows\system32\wbem\Repository

2009-11-20 20:26 . 2009-11-22 12:32 -------- d-----w- c:\documents and settings\HelpAssistant.JONATHANWG1.000\UserData

2009-11-20 20:26 . 2009-11-20 20:26 -------- d-----w- c:\documents and settings\HelpAssistant.JONATHANWG1.000\Temp

2009-11-20 20:22 . 2009-11-20 20:22 -------- d-----w- c:\documents and settings\HelpAssistant.JONATHANWG1.000\Dr Delete

2009-11-20 20:22 . 2009-11-20 20:22 -------- d-----w- c:\documents and settings\HelpAssistant.JONATHANWG1.000\DoctorWeb

2009-11-20 20:19 . 2009-11-22 12:29 -------- d-----w- c:\documents and settings\HelpAssistant.JONATHANWG1.000\.housecall6.6

2009-11-20 20:19 . 2009-11-22 12:32 -------- d-s---w- c:\documents and settings\HelpAssistant.JONATHANWG1.000

2009-11-20 19:15 . 2009-11-22 12:32 -------- d-----w- c:\documents and settings\HelpAssistant.JONATHANWG1\UserData

2009-11-20 19:15 . 2009-11-20 19:15 -------- d-----w- c:\documents and settings\HelpAssistant.JONATHANWG1\Temp

2009-11-20 19:07 . 2009-11-20 19:07 -------- d-----w- c:\documents and settings\HelpAssistant.JONATHANWG1\Dr Delete

2009-11-20 19:07 . 2009-11-20 19:07 -------- d-----w- c:\documents and settings\HelpAssistant.JONATHANWG1\DoctorWeb

2009-11-20 19:03 . 2009-11-22 12:31 -------- d-----w- c:\documents and settings\HelpAssistant.JONATHANWG1\.housecall6.6

2009-11-20 19:03 . 2009-11-22 12:32 -------- d-s---w- c:\documents and settings\HelpAssistant.JONATHANWG1

2009-11-20 19:00 . 2009-11-22 12:31 -------- d-----w- c:\documents and settings\HelpAssistant\My Documents(2)

2009-11-20 18:56 . 2009-11-20 18:56 -------- d-----w- c:\documents and settings\HelpAssistant\Dr Delete

2009-11-20 18:56 . 2009-11-20 18:56 -------- d-----w- c:\documents and settings\HelpAssistant\DoctorWeb

2009-11-20 18:51 . 2009-11-22 12:31 -------- d-----w- c:\documents and settings\HelpAssistant\.housecall6.6

2009-11-20 18:51 . 2009-11-22 12:32 -------- d-s---w- c:\documents and settings\HelpAssistant

.

(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))

.

2009-11-22 12:39 . 2009-11-22 11:50 -------- d-----w- c:\documents and settings\All Users\Application Data\Lavasoft

2009-11-22 12:30 . 2009-09-17 11:18 -------- d-----w- c:\program files\ffdshow

2009-11-22 12:27 . 2007-01-25 02:46 -------- d-----w- c:\program files\Microsoft ActiveSync

2009-11-22 12:07 . 2009-11-22 12:07 -------- d-----w- c:\program files\IObit

2009-11-21 05:53 . 2008-10-20 18:16 -------- d-----w- c:\program files\Common Files\Apple

2009-11-21 05:38 . 2009-11-20 20:23 4904 ----a-w- c:\windows\system32\PerfStringBackup.TMP

2009-10-30 20:26 . 2007-09-09 04:16 38400 ----a-w- c:\windows\system32\hpz3l054.dll

2009-10-26 12:26 . 2007-05-06 11:03 72080 ----a-w- c:\documents and settings\Jonathan\g2mdlhlpx.exe

2009-10-08 12:52 . 2008-07-08 21:48 -------- d-----w- c:\documents and settings\Jonathan\Application Data\Skype

2009-10-08 12:47 . 2008-07-08 21:49 -------- d-----w- c:\documents and settings\Jonathan\Application Data\skypePM

2009-10-06 02:39 . 2009-10-06 02:39 -------- d-----w- c:\program files\CCleaner

2009-09-02 20:38 . 2009-09-02 20:37 1924440 ----a-w- c:\documents and settings\Jonathan\Application Data\Macromedia\Flash Player\www.macromedia.com\bin\fpupdatepl\fpupdatepl.exe

2009-08-31 13:41 . 2009-08-31 13:41 152576 ----a-w- c:\documents and settings\Jonathan\Application Data\Sun\Java\jre1.6.0_15\lzma.dll

2005-08-02 22:58 . 2008-12-08 23:52 293888 --sha-r- c:\windows\Sm9uYXRoYW4gUGFnZQ\command.exe

2005-07-29 22:24 . 2008-12-08 23:52 472 --sha-r- c:\windows\Sm9uYXRoYW4gUGFnZQ\mA6RsrlCsqb0o3IBtk.vbs

.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))

.

.

*Note* empty entries & legit default entries are not shown

REGEDIT4

[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Toolbar\Webbrowser]

"{6EDCCE69-14A2-4E9F-826B-DC523B82167E}"= "c:\program files\JetBrains\Omea Reader\IexploreOmeaW.dll" [2007-02-02 591360]

[HKEY_CLASSES_ROOT\clsid\{6edcce69-14a2-4e9f-826b-dc523b82167e}]

[HKEY_CLASSES_ROOT\IexploreOmea.Band.1]

[HKEY_CLASSES_ROOT\TypeLib\{633820F7-C04E-4152-B64F-1147B881F998}]

[HKEY_CLASSES_ROOT\IexploreOmea.Band]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]

"ehTray"="c:\windows\ehome\ehtray.exe" [2005-08-05 64512]

"IntelZeroConfig"="c:\program files\Intel\Wireless\bin\ZCfgSvc.exe" [2005-07-23 401408]

"IntelWireless"="c:\program files\Intel\Wireless\Bin\ifrmewrk.exe" [2005-07-23 385024]

"ATIPTA"="c:\program files\ATI Technologies\ATI Control Panel\atiptaxx.exe" [2005-08-06 344064]

"DLA"="c:\windows\System32\DLA\DLACTRLW.EXE" [2005-11-07 122940]

"forsinit"="c:\windows\sprscore.exe" [2007-04-22 724992]

"TkBellExe"="c:\program files\Common Files\Real\Update_OB\realsched.exe" [2009-02-23 185872]

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\IntelWireless]

2005-07-23 06:46 110592 ----a-w- c:\program files\Intel\Wireless\Bin\LgNotify.dll

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecFirewall]

"DisableMonitoring"=dword:00000001

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]

"EnableFirewall"= 0 (0x0)

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]

"%windir%\\system32\\sessmgr.exe"=

"%windir%\\Network Diagnostic\\xpnetdiag.exe"=

"c:\\Program Files\\Messenger\\msmsgs.exe"=

"c:\\Program Files\\eSignal\\winros.exe"=

"c:\\Program Files\\OEC\\Trader\\Trader.exe"=

"c:\\Program Files\\Bonjour\\mDNSResponder.exe"=

"c:\\Program Files\\Ventrilo\\Ventrilo.exe"=

"c:\\Program Files\\Skype\\Phone\\Skype.exe"=

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\GloballyOpenPorts\List]

"3389:TCP"= 3389:TCP:Remote Desktop

S1 drmkaudd;drmkaudd;c:\windows\system32\drivers\drmkaudd.sys --> c:\windows\system32\drivers\drmkaudd.sys [?]

S3 MBAMSwissArmy;MBAMSwissArmy;c:\windows\system32\drivers\mbamswissarmy.sys [11/22/2009 8:26 AM 38224]

S3 PTDWBus;Curitel PC Card Composite Device driver (UDP);c:\windows\system32\drivers\PTDWBus.sys [6/23/2007 8:21 AM 27392]

S3 PTDWMdm;Curitel PC Card Drivers (UDP);c:\windows\system32\drivers\PTDWMdm.sys [6/23/2007 8:21 AM 41728]

S3 PTDWVsp;Curitel PC Card Diagnostic Serial Port (UDP);c:\windows\system32\drivers\PTDWVsp.sys [6/23/2007 8:21 AM 39808]

S3 PWCTLDRV;The NECHostController Filter Driver;c:\windows\system32\drivers\PWCTLDRV.sys [6/23/2007 8:21 AM 5888]

--- Other Services/Drivers In Memory ---

*NewlyCreated* - CLASSPNP_2

*Deregistered* - CLASSPNP_2

.

Contents of the 'Scheduled Tasks' folder

2009-11-22 c:\windows\Tasks\User_Feed_Synchronization-{B697CC3E-95F1-4D18-9EF7-E05701EF1D2D}.job

- c:\windows\system32\msfeedssync.exe [2006-10-17 19:58]

.

.

------- Supplementary Scan -------

.

uStart Page = www.rbc.org/odb/odb.shtml

mWindow Title = Microsoft Internet Explorer provided by Comcast High-Speed Internet

uInternet Connection Wizard,ShellNext = hxxp://espn.go.com/motion/detect.html

uInternet Settings,ProxyOverride = *.local

IE: Add to Google Photos Screensa&ver - c:\windows\system32\GPhotos.scr/200

IE: Clip and Edit - c:\program files\JetBrains\Omea Reader\IexploreOmeaW.dll/1000

IE: Clip and Save - c:\program files\JetBrains\Omea Reader\IexploreOmeaW.dll/1001

IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~2\OFFICE11\EXCEL.EXE/3000

IE: Subscribe to Feed - c:\program files\JetBrains\Omea Reader\IexploreOmeaW.dll/1002

TCP: {570E0C3D-F910-4546-B892-A911C90EDDEA} = 83.149.115.182

DPF: {43F25BA2-C4AB-4327-924C-1ED6AF4A6BA1} - hxxp://www.webacall.com/activePhone.ocx

FF - ProfilePath - c:\documents and settings\Jonathan\Application Data\Mozilla\Firefox\Profiles\8jesdy4y.default\

FF - prefs.js: browser.search.selectedEngine - fefoo search

FF - prefs.js: browser.startup.homepage - hxxp://www.rbc.org/odb/odb.shtml

FF - plugin: c:\progra~1\MEADCO~1\npmeadax.dll

FF - plugin: c:\program files\Google\Picasa3\npPicasa3.dll

FF - plugin: c:\program files\Mozilla Firefox\plugins\np-mswmp.dll

FF - plugin: c:\program files\QuickTime\Plugins\npatgpc.dll

---- FIREFOX POLICIES ----

c:\program files\Mozilla Firefox\greprefs\security-prefs.js - pref("security.ssl3.rsa_seed_sha", true);

.

- - - - ORPHANS REMOVED - - - -

SharedTaskScheduler-{dd5f4041-9792-4931-887a-8e50946ef28b} - (no file)

**************************************************************************

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net

Rootkit scan 2009-11-22 13:13

Windows 5.1.2600 Service Pack 2 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully

hidden files: 0

**************************************************************************

Stealth MBR rootkit/Mebroot/Sinowal detector 0.3.7 by Gmer, http://www.gmer.net

device: opened successfully

user: MBR read successfully

called modules: ntkrnlpa.exe catchme.sys CLASSPNP.SYS disk.sys >>UNKNOWN [0x868FDF30]<<

kernel: MBR read successfully

detected MBR rootkit hooks:

\Driver\Disk -> CLASSPNP.SYS @ 0xf76cafc3

\Driver\ACPI -> ACPI.sys @ 0xf753dcb8

\Driver\atapi -> 0x868fdf30

IoDeviceObjectType -> DeleteProcedure -> ntkrnlpa.exe @ 0x80578c34

ParseProcedure -> ntkrnlpa.exe @ 0x80577896

\Device\Harddisk0\DR0 -> DeleteProcedure -> ntkrnlpa.exe @ 0x80578c34

ParseProcedure -> ntkrnlpa.exe @ 0x80577896

NDIS: Broadcom 440x 10/100 Integrated Controller -> SendCompleteHandler -> 0x8693a480

PacketIndicateHandler -> NDIS.sys @ 0xf739bb21

SendHandler -> NDIS.sys @ 0xf737987b

Warning: possible MBR rootkit infection !

copy of MBR has been found in sector 0x0DF8F900

malicious code @ sector 0x0DF8F903 !

PE file found in sector at 0x0DF8F919 !

MBR rootkit infection detected ! Use: "mbr.exe -f" to fix.

**************************************************************************

.

--------------------- DLLs Loaded Under Running Processes ---------------------

- - - - - - - > 'winlogon.exe'(700)

c:\windows\system32\Ati2evxx.dll

c:\program files\Intel\Wireless\Bin\LgNotify.dll

- - - - - - - > 'explorer.exe'(2632)

c:\windows\system32\WININET.dll

c:\windows\system32\ieframe.dll

c:\windows\system32\WPDShServiceObj.dll

c:\windows\system32\PortableDeviceTypes.dll

c:\windows\system32\PortableDeviceApi.dll

.

Completion time: 2009-11-22 13:15

ComboFix-quarantined-files.txt 2009-11-22 19:15

Pre-Run: 85,255,626,752 bytes free

Post-Run: 85,215,498,240 bytes free

- - End Of File - - F0347C78AE9BA426F528EEF7D5E254A9

Link to post
Share on other sites

Download GMER's MBR.exe to your desktop.

Double click on the MBR.exe file to run it. A log will be produced, MBR.log. Please open this log in Notepad and post its contents in your next reply.

1. Close any open browsers.

2. Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.

3. Open notepad and copy/paste the text in the quotebox below into it:

Folder::

c:\windows\Sm9uYXRoYW4gUGFnZQ

c:\documents and settings\Jonathan\Application Data\IObit

Save this as CFScript.txt, in the same location as ComboFix.exe

CFScriptB-4.gif

Refering to the picture above, drag CFScript into ComboFix.exe

When finished, it shall produce a log for you at C:\ComboFix.txt which I will require in your next reply.

Link to post
Share on other sites

Download GMER's MBR.exe to your desktop.

Double click on the MBR.exe file to run it. A log will be produced, MBR.log. Please open this log in Notepad and post its contents in your next reply.

1. Close any open browsers.

2. Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.

3. Open notepad and copy/paste the text in the quotebox below into it:

Save this as CFScript.txt, in the same location as ComboFix.exe

CFScriptB-4.gif

Refering to the picture above, drag CFScript into ComboFix.exe

When finished, it shall produce a log for you at C:\ComboFix.txt which I will require in your next reply.

[/quote

-----------------------------------------------------------

I am sorry-- I appreciate your patience. I am not very knowledgeable in understanding your instructions.

I ran the MBR link and got the following message delivered in notepad:

"Stealth MBR rootkit/Mebroot/Sinowal detector 0.3.7 by Gmer, http://www.gmer.net

device: opened successfully

user: MBR read successfully

kernel: MBR read successfully

detected MBR rootkit hooks:

\Driver\atapi -> 0x868fdf30

NDIS: Broadcom 440x 10/100 Integrated Controller -> SendCompleteHandler -> 0x8693a480

Warning: possible MBR rootkit infection !

copy of MBR has been found in sector 0x0DF8F900

malicious code @ sector 0x0DF8F903 !

PE file found in sector at 0x0DF8F919 !

MBR rootkit infection detected ! Use: "mbr.exe -f" to fix."

I then tried to follow the 2nd set of instructions but was uncertain what to do.

I found the folder named "c:\documents and settings\Jonathan\Application Data\IObit"

inside that folder was another folder named Advanced SystemCare and Backup inside that folder.

Am I supposed to paste the whole log from above into the folder named IObit?

I guess I don't understand "in the quotebox below into it"

thanks again for your patience and help.......

Link to post
Share on other sites

Sorry for my ineptness-- thanks again for staying with/helping me. I followed the

directions per your last post and here are the to logs..

---------

ComboFix 09-11-22.02 - Jonathan 11/22/2009 16:29.6.1 - x86

Microsoft Windows XP Professional 5.1.2600.2.1252.1.1033.18.1023.550 [GMT -6:00]

Running from: c:\documents and settings\Jonathan\Desktop\ComboFix.exe

Command switches used :: c:\documents and settings\Jonathan\Desktop\CFScript.txt

FW: Norton Internet Worm Protection *disabled* {990F9400-4CEE-43EA-A83A-D013ADD8EA6E}

.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))

.

c:\documents and settings\Jonathan\Application Data\IObit

c:\documents and settings\Jonathan\Application Data\IObit\Advanced SystemCare\Fav.ico

c:\documents and settings\Jonathan\Application Data\IObit\Advanced SystemCare\Ignore.ini

c:\documents and settings\Jonathan\Application Data\IObit\Advanced SystemCare\Main.ini

c:\windows\Sm9uYXRoYW4gUGFnZQ

c:\windows\Sm9uYXRoYW4gUGFnZQ\command.exe

c:\windows\Sm9uYXRoYW4gUGFnZQ\mA6RsrlCsqb0o3IBtk.vbs

.

((((((((((((((((((((((((( Files Created from 2009-10-22 to 2009-11-22 )))))))))))))))))))))))))))))))

.

2009-11-22 22:29 . 2004-08-10 11:00 95360 -c--a-w- c:\windows\system32\dllcache\atapi.sys

2009-11-22 22:29 . 2004-08-10 11:00 95360 ----a-w- c:\windows\system32\drivers\atapi.sys

2009-11-22 14:26 . 2009-09-10 20:54 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys

2009-11-22 14:26 . 2009-11-22 14:26 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware

2009-11-22 14:26 . 2009-09-10 20:53 19160 ----a-w- c:\windows\system32\drivers\mbam.sys

2009-11-21 05:43 . 2009-11-21 05:43 -------- d-----w- c:\documents and settings\HelpAssistant.JONATHANWG1.001\Temp

2009-11-21 05:38 . 2009-10-26 12:26 72080 ----a-w- c:\documents and settings\HelpAssistant.JONATHANWG1.001\g2mdlhlpx.exe

2009-11-21 05:38 . 2009-11-21 05:38 -------- d-----w- c:\documents and settings\HelpAssistant.JONATHANWG1.001\Dr Delete

2009-11-21 05:38 . 2009-11-21 05:38 -------- d-----w- c:\documents and settings\HelpAssistant.JONATHANWG1.001\DoctorWeb

2009-11-21 05:34 . 2009-11-22 12:28 -------- d-----w- c:\documents and settings\HelpAssistant.JONATHANWG1.001\.housecall6.6

2009-11-21 05:34 . 2009-11-22 22:23 -------- d-----w- c:\documents and settings\HelpAssistant.JONATHANWG1.001

2009-11-21 05:31 . 2009-11-21 05:31 -------- d-----w- c:\windows\system32\wbem\Repository

2009-11-20 20:26 . 2009-11-22 12:32 -------- d-----w- c:\documents and settings\HelpAssistant.JONATHANWG1.000\UserData

2009-11-20 20:26 . 2009-11-20 20:26 -------- d-----w- c:\documents and settings\HelpAssistant.JONATHANWG1.000\Temp

2009-11-20 20:22 . 2009-11-20 20:22 -------- d-----w- c:\documents and settings\HelpAssistant.JONATHANWG1.000\Dr Delete

2009-11-20 20:22 . 2009-11-20 20:22 -------- d-----w- c:\documents and settings\HelpAssistant.JONATHANWG1.000\DoctorWeb

2009-11-20 20:19 . 2009-11-22 12:29 -------- d-----w- c:\documents and settings\HelpAssistant.JONATHANWG1.000\.housecall6.6

2009-11-20 20:19 . 2009-11-22 12:32 -------- d-s---w- c:\documents and settings\HelpAssistant.JONATHANWG1.000

2009-11-20 19:15 . 2009-11-22 12:32 -------- d-----w- c:\documents and settings\HelpAssistant.JONATHANWG1\UserData

2009-11-20 19:15 . 2009-11-20 19:15 -------- d-----w- c:\documents and settings\HelpAssistant.JONATHANWG1\Temp

2009-11-20 19:07 . 2009-11-20 19:07 -------- d-----w- c:\documents and settings\HelpAssistant.JONATHANWG1\Dr Delete

2009-11-20 19:07 . 2009-11-20 19:07 -------- d-----w- c:\documents and settings\HelpAssistant.JONATHANWG1\DoctorWeb

2009-11-20 19:03 . 2009-11-22 12:31 -------- d-----w- c:\documents and settings\HelpAssistant.JONATHANWG1\.housecall6.6

2009-11-20 19:03 . 2009-11-22 12:32 -------- d-s---w- c:\documents and settings\HelpAssistant.JONATHANWG1

2009-11-20 19:00 . 2009-11-22 12:31 -------- d-----w- c:\documents and settings\HelpAssistant\My Documents(2)

2009-11-20 18:56 . 2009-11-20 18:56 -------- d-----w- c:\documents and settings\HelpAssistant\Dr Delete

2009-11-20 18:56 . 2009-11-20 18:56 -------- d-----w- c:\documents and settings\HelpAssistant\DoctorWeb

2009-11-20 18:51 . 2009-11-22 12:31 -------- d-----w- c:\documents and settings\HelpAssistant\.housecall6.6

2009-11-20 18:51 . 2009-11-22 12:32 -------- d-s---w- c:\documents and settings\HelpAssistant

.

(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))

.

2009-11-22 21:39 . 2009-05-29 11:55 -------- d-----w- c:\program files\TweakNow RegCleaner

2009-11-22 12:39 . 2009-11-22 11:50 -------- d-----w- c:\documents and settings\All Users\Application Data\Lavasoft

2009-11-22 12:30 . 2009-09-17 11:18 -------- d-----w- c:\program files\ffdshow

2009-11-22 12:27 . 2007-01-25 02:46 -------- d-----w- c:\program files\Microsoft ActiveSync

2009-11-22 12:07 . 2009-11-22 12:07 -------- d-----w- c:\program files\IObit

2009-11-21 05:53 . 2008-10-20 18:16 -------- d-----w- c:\program files\Common Files\Apple

2009-10-30 20:26 . 2007-09-09 04:16 38400 ----a-w- c:\windows\system32\hpz3l054.dll

2009-10-26 12:26 . 2007-05-06 11:03 72080 ----a-w- c:\documents and settings\Jonathan\g2mdlhlpx.exe

2009-10-08 12:52 . 2008-07-08 21:48 -------- d-----w- c:\documents and settings\Jonathan\Application Data\Skype

2009-10-08 12:47 . 2008-07-08 21:49 -------- d-----w- c:\documents and settings\Jonathan\Application Data\skypePM

2009-10-06 02:39 . 2009-10-06 02:39 -------- d-----w- c:\program files\CCleaner

2009-09-02 20:38 . 2009-09-02 20:37 1924440 ----a-w- c:\documents and settings\Jonathan\Application Data\Macromedia\Flash Player\www.macromedia.com\bin\fpupdatepl\fpupdatepl.exe

2009-08-31 13:41 . 2009-08-31 13:41 152576 ----a-w- c:\documents and settings\Jonathan\Application Data\Sun\Java\jre1.6.0_15\lzma.dll

.

((((((((((((((((((((((((((((( SnapShot@2009-11-22_18.56.57 )))))))))))))))))))))))))))))))))))))))))

.

+ 2009-11-22 22:23 . 2009-11-22 22:23 16384 c:\windows\Temp\Perflib_Perfdata_884.dat

.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))

.

.

*Note* empty entries & legit default entries are not shown

REGEDIT4

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]

"ehTray"="c:\windows\ehome\ehtray.exe" [2005-08-05 64512]

"IntelZeroConfig"="c:\program files\Intel\Wireless\bin\ZCfgSvc.exe" [2005-07-23 401408]

"IntelWireless"="c:\program files\Intel\Wireless\Bin\ifrmewrk.exe" [2005-07-23 385024]

"ATIPTA"="c:\program files\ATI Technologies\ATI Control Panel\atiptaxx.exe" [2005-08-06 344064]

"DLA"="c:\windows\System32\DLA\DLACTRLW.EXE" [2005-11-07 122940]

"forsinit"="c:\windows\sprscore.exe" [2007-04-22 724992]

"TkBellExe"="c:\program files\Common Files\Real\Update_OB\realsched.exe" [2009-02-23 185872]

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\IntelWireless]

2005-07-23 06:46 110592 ----a-w- c:\program files\Intel\Wireless\Bin\LgNotify.dll

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecFirewall]

"DisableMonitoring"=dword:00000001

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]

"EnableFirewall"= 0 (0x0)

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]

"%windir%\\system32\\sessmgr.exe"=

"%windir%\\Network Diagnostic\\xpnetdiag.exe"=

"c:\\Program Files\\Messenger\\msmsgs.exe"=

"c:\\Program Files\\eSignal\\winros.exe"=

"c:\\Program Files\\OEC\\Trader\\Trader.exe"=

"c:\\Program Files\\Bonjour\\mDNSResponder.exe"=

"c:\\Program Files\\Ventrilo\\Ventrilo.exe"=

"c:\\Program Files\\Skype\\Phone\\Skype.exe"=

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\GloballyOpenPorts\List]

"3389:TCP"= 3389:TCP:Remote Desktop

S1 drmkaudd;drmkaudd;c:\windows\system32\drivers\drmkaudd.sys --> c:\windows\system32\drivers\drmkaudd.sys [?]

S3 PTDWBus;Curitel PC Card Composite Device driver (UDP);c:\windows\system32\drivers\PTDWBus.sys [6/23/2007 8:21 AM 27392]

S3 PTDWMdm;Curitel PC Card Drivers (UDP);c:\windows\system32\drivers\PTDWMdm.sys [6/23/2007 8:21 AM 41728]

S3 PTDWVsp;Curitel PC Card Diagnostic Serial Port (UDP);c:\windows\system32\drivers\PTDWVsp.sys [6/23/2007 8:21 AM 39808]

S3 PWCTLDRV;The NECHostController Filter Driver;c:\windows\system32\drivers\PWCTLDRV.sys [6/23/2007 8:21 AM 5888]

--- Other Services/Drivers In Memory ---

*Deregistered* - CLASSPNP_2

.

Contents of the 'Scheduled Tasks' folder

2009-11-22 c:\windows\Tasks\User_Feed_Synchronization-{B697CC3E-95F1-4D18-9EF7-E05701EF1D2D}.job

- c:\windows\system32\msfeedssync.exe [2006-10-17 19:58]

.

.

------- Supplementary Scan -------

.

uStart Page = www.rbc.org/odb/odb.shtml

mWindow Title = Microsoft Internet Explorer provided by Comcast High-Speed Internet

uInternet Connection Wizard,ShellNext = hxxp://espn.go.com/motion/detect.html

uInternet Settings,ProxyOverride = *.local

IE: Add to Google Photos Screensa&ver - c:\windows\system32\GPhotos.scr/200

IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~2\OFFICE11\EXCEL.EXE/3000

TCP: {570E0C3D-F910-4546-B892-A911C90EDDEA} = 83.149.115.182

DPF: {43F25BA2-C4AB-4327-924C-1ED6AF4A6BA1} - hxxp://www.webacall.com/activePhone.ocx

FF - ProfilePath - c:\documents and settings\Jonathan\Application Data\Mozilla\Firefox\Profiles\8jesdy4y.default\

FF - prefs.js: browser.search.selectedEngine - fefoo search

FF - prefs.js: browser.startup.homepage - hxxp://www.rbc.org/odb/odb.shtml

FF - plugin: c:\progra~1\MEADCO~1\npmeadax.dll

FF - plugin: c:\program files\Google\Picasa3\npPicasa3.dll

FF - plugin: c:\program files\Mozilla Firefox\plugins\np-mswmp.dll

FF - plugin: c:\program files\QuickTime\Plugins\npatgpc.dll

---- FIREFOX POLICIES ----

c:\program files\Mozilla Firefox\greprefs\security-prefs.js - pref("security.ssl3.rsa_seed_sha", true);

.

- - - - ORPHANS REMOVED - - - -

WebBrowser-{6EDCCE69-14A2-4E9F-826B-DC523B82167E} - (no file)

**************************************************************************

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net

Rootkit scan 2009-11-22 16:39

Windows 5.1.2600 Service Pack 2 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully

hidden files: 0

**************************************************************************

Stealth MBR rootkit/Mebroot/Sinowal detector 0.3.7 by Gmer, http://www.gmer.net

device: opened successfully

user: MBR read successfully

called modules: ntkrnlpa.exe catchme.sys CLASSPNP.SYS disk.sys >>UNKNOWN [0x8690BF30]<<

kernel: MBR read successfully

detected MBR rootkit hooks:

\Driver\Disk -> CLASSPNP.SYS @ 0xf76bffc3

\Driver\ACPI -> ACPI.sys @ 0xf7532cb8

\Driver\atapi -> 0x8690bf30

IoDeviceObjectType -> DeleteProcedure -> ntkrnlpa.exe @ 0x80578c34

ParseProcedure -> ntkrnlpa.exe @ 0x80577896

\Device\Harddisk0\DR0 -> DeleteProcedure -> ntkrnlpa.exe @ 0x80578c34

ParseProcedure -> ntkrnlpa.exe @ 0x80577896

NDIS: Broadcom 440x 10/100 Integrated Controller -> SendCompleteHandler -> 0x86948480

PacketIndicateHandler -> NDIS.sys @ 0xf737eb21

SendHandler -> NDIS.sys @ 0xf735c87b

Warning: possible MBR rootkit infection !

copy of MBR has been found in sector 0x0DF8F900

malicious code @ sector 0x0DF8F903 !

PE file found in sector at 0x0DF8F919 !

MBR rootkit infection detected ! Use: "mbr.exe -f" to fix.

**************************************************************************

.

--------------------- DLLs Loaded Under Running Processes ---------------------

- - - - - - - > 'winlogon.exe'(692)

c:\windows\system32\Ati2evxx.dll

c:\program files\Intel\Wireless\Bin\LgNotify.dll

.

Completion time: 2009-11-22 16:41

ComboFix-quarantined-files.txt 2009-11-22 22:41

ComboFix2.txt 2009-11-22 21:18

ComboFix3.txt 2009-11-22 19:15

Pre-Run: 85,170,229,248 bytes free

Post-Run: 85,131,788,288 bytes free

- - End Of File - - 409898529B825C3E2474B09196BF4FA6

--------------------- MBR log

Stealth MBR rootkit/Mebroot/Sinowal detector 0.3.7 by Gmer, http://www.gmer.net

device: opened successfully

user: MBR read successfully

kernel: MBR read successfully

detected MBR rootkit hooks:

\Driver\atapi -> 0x868fdf30

NDIS: Broadcom 440x 10/100 Integrated Controller -> SendCompleteHandler -> 0x8693a480

Warning: possible MBR rootkit infection !

copy of MBR has been found in sector 0x0DF8F900

malicious code @ sector 0x0DF8F903 !

PE file found in sector at 0x0DF8F919 !

MBR rootkit infection detected ! Use: "mbr.exe -f" to fix.

Thanks again

Link to post
Share on other sites

thanks again for your patience and help. I followed both your instructions

and ran MB. MB didn't detect any virus. I then tried to open a Gmail

account thru Firefox and got 404 not found message. (internet has always

worked fine) I then tried to

use the restore feature in tools and got frozen out from picking ANY restore

dates - (non were available however I used 2 earlier dates less than 12 hours ago)

When I first got the MB virus found and undeleteable I then tired to restore to an earlier

date and got the "adminstrator block restore function message" I have posted the

log from MB. Is there any other suggestion that you could offer... thanks. JP

Malwarebytes' Anti-Malware 1.41

Database version: 2775

Windows 5.1.2600 Service Pack 2

11/22/2009 6:06:06 PM

mbam-log-2009-11-22 (18-06-06).txt

Scan type: Quick Scan

Objects scanned: 126929

Time elapsed: 6 minute(s), 13 second(s)

Memory Processes Infected: 0

Memory Modules Infected: 0

Registry Keys Infected: 0

Registry Values Infected: 0

Registry Data Items Infected: 0

Folders Infected: 0

Files Infected: 0

Memory Processes Infected:

(No malicious items detected)

Memory Modules Infected:

(No malicious items detected)

Registry Keys Infected:

(No malicious items detected)

Registry Values Infected:

(No malicious items detected)

Registry Data Items Infected:

(No malicious items detected)

Folders Infected:

(No malicious items detected)

Files Infected:

(No malicious items detected)

Link to post
Share on other sites

You're welcome.

  1. Download RootRepeal from the following location and save it to your desktop.

[*]Rar Mirrors - Only if you know what a RAR is and can extract it.

[*]Extract RootRepeal.exe from the archive.

[*]Open rootRepealDesktopIcon.png on your desktop.

[*]Click the reportTab.png tab.

[*]Click the btnScan.png button.

[*]Check all seven boxes: checkBoxes2.png

[*]Push Ok

[*]Check the box for your main system drive (Usually C:), and press Ok.

[*]Allow RootRepeal to run a scan of your system. This may take some time.

[*]Once the scan completes, push the saveReport.png button. Save the log to your desktop, using a distinctive name, such as RootRepeal.txt. Include this report in your next reply, please.

Link to post
Share on other sites

thanks again - I ran the RR and bleow is the log.. JP

ROOTREPEAL © AD, 2007-2009

==================================================

Scan Start Time: 2009/11/23 09:38

Program Version: Version 1.3.5.0

Windows Version: Windows XP Media Center Edition SP2

==================================================

Drivers

-------------------

Name: rootrepeal.sys

Image Path: C:\WINDOWS\system32\drivers\rootrepeal.sys

Address: 0xF6C69000 Size: 49152 File Visible: No Signed: -

Status: -

==EOF==

Link to post
Share on other sites

Run ESET Online Scan

  1. Hold down Control and click on the following link to open ESET OnlineScan in a new window.
    ESET OnlineScan
  2. Click the esetOnline.png button.
  3. For alternate browsers only: (Microsoft Internet Explorer users can skip these steps)

    1. Click on esetSmartInstall.png to download the ESET Smart Installer. Save it to your desktop.
    2. Double click on the esetSmartInstallDesktopIcon.png icon on your desktop.

    3. Check esetAcceptTerms.png
    4. Click the esetStart.png button.
    5. Accept any security warnings from your browser.
    6. Check esetScanArchives.png
    7. Push the Start button.
    8. ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this can take some time.
    9. When the scan completes, push esetListThreats.png
    10. Push esetExport.png, and save the file to your desktop using a unique name, such as ESETScan. Include the contents of this report in your next reply.
    11. Push the esetBack.png button.
    12. Push esetFinish.png

      You can refer to this animation by neomage if needed.
Link to post
Share on other sites

thanks again for your help and staying with me on this problem..

C:\Documents and Settings\HelpAssistant.JONATHANWG1.001\Local Settings\Temp\Av-test.txt Eicar test file

C:\Program Files\Common Files\wkkz\wkkzd\vocabulary Win32/TrojanDownloader.TSUpdate.J trojan

C:\Qoobox\Quarantine\C\WINDOWS\Sm9uYXRoYW4gUGFnZQ\mA6RsrlCsqb0o3IBtk.vbs.vir Win32/Adware.ISearch application

C:\Qoobox\Quarantine\C\WINDOWS\system32\kozeyizu.dll.tmp.vir a variant of Win32/Adware.Virtumonde.NDN application

C:\Qoobox\Quarantine\C\WINDOWS\system32\sawuzowu(2).dll.vir a variant of Win32/Kryptik.AYZ trojan

C:\Qoobox\Quarantine\C\WINDOWS\system32\tinuhagu.dll.tmp.vir a variant of Win32/Adware.Virtumonde.NDN application

C:\Qoobox\Quarantine\C\WINDOWS\system32\vogekomu.dll.tmp.vir a variant of Win32/Adware.SuperJuan.J application

C:\Qoobox\Quarantine\C\WINDOWS\system32\worayewu.dll.tmp.vir a variant of Win32/Adware.SuperJuan.J application

C:\Qoobox\Quarantine\C\WINDOWS\system32\wotunivo.dll.tmp.vir a variant of Win32/Adware.Virtumonde.NDN application

C:\Qoobox\Quarantine\C\WINDOWS\system32\yapafeju.dll.tmp.vir a variant of Win32/Adware.SuperJuan.J application

C:\Qoobox\Quarantine\C\WINDOWS\system32\drivers\atapi.sys.vir Win32/Olmarik.OF virus

C:\Qoobox\Quarantine\C\WINDOWS\system32\ki3\RI2ES6i.exe.vir Win32/Agent.ASJZ trojan

C:\System Volume Information\_restore{D848CFCE-F935-4410-8A16-D10F24ED38D7}\RP1\A0001199.vbs Win32/Adware.ISearch application

C:\WINDOWS\system32\mswunjernm.dll probably a variant of Win32/Spy.KeyLogger trojan

Link to post
Share on other sites

Download TFC by OldTimer to your desktop

  • Please double-click TFC.exe to run it. (Note: If you are running on Vista, right-click on the file and choose Run As Administrator).
  • It will close all programs when run, so make sure you have saved all your work before you begin.
  • Click the Start button to begin the process. Depending on how often you clean temp files, execution time should be anywhere from a few seconds to a minute or two. Let it run uninterrupted to completion.
  • Once it's finished it should reboot your machine. If it does not, please manually reboot the machine yourself to ensure a complete clean.

  • Download random's system information tool (RSIT) by random/random from here and save it to your desktop.
  • Double click on RSIT.exe to run RSIT.
  • Click Continue at the disclaimer screen.
  • Once it has finished, two logs will open. Please post the contents of both log.txt (<<will be maximized) and info.txt (<<will be minimized)

Link to post
Share on other sites

Thanks again for the continued help- Have a great Thanksgiving. JP

The 2 longs are below--

Logfile of random's system information tool 1.06 (written by random/random)

Run by Jonathan at 2009-11-25 17:20:17

Microsoft Windows XP Professional Service Pack 2

System drive C: has 82 GB (72%) free of 114 GB

Total RAM: 1023 MB (62% free)

Logfile of Trend Micro HijackThis v2.0.2

Scan saved at 5:20:21 PM, on 11/25/2009

Platform: Windows XP SP2 (WinNT 5.01.2600)

MSIE: Internet Explorer v7.00 (7.00.6000.16876)

Boot mode: Normal

Running processes:

C:\WINDOWS\System32\smss.exe

C:\WINDOWS\system32\winlogon.exe

C:\WINDOWS\system32\services.exe

C:\WINDOWS\system32\lsass.exe

C:\WINDOWS\system32\Ati2evxx.exe

C:\WINDOWS\system32\svchost.exe

C:\WINDOWS\System32\svchost.exe

C:\WINDOWS\system32\svchost.exe

C:\Program Files\Intel\Wireless\Bin\EvtEng.exe

C:\Program Files\Intel\Wireless\Bin\S24EvMon.exe

C:\Program Files\Intel\Wireless\Bin\WLKeeper.exe

C:\WINDOWS\system32\spoolsv.exe

C:\Program Files\Intel\Wireless\Bin\ZcfgSvc.exe

C:\WINDOWS\system32\Ati2evxx.exe

C:\WINDOWS\Explorer.EXE

C:\WINDOWS\system32\ctfmon.exe

C:\Program Files\Cisco Systems\VPN Client\cvpnd.exe

C:\WINDOWS\eHome\ehRecvr.exe

C:\WINDOWS\eHome\ehSched.exe

C:\Program Files\Java\jre6\bin\jqs.exe

C:\WINDOWS\system32\HPZipm12.exe

C:\Program Files\Intel\Wireless\Bin\RegSrvc.exe

C:\WINDOWS\system32\svchost.exe

C:\Program Files\Common Files\Symantec Shared\CCPD-LC\symlcsvc.exe

C:\WINDOWS\system32\wscntfy.exe

C:\WINDOWS\system32\dllhost.exe

C:\WINDOWS\system32\wuauclt.exe

C:\Program Files\Mozilla Firefox\firefox.exe

C:\Documents and Settings\Jonathan\My Documents\Downloads\RSIT.exe

C:\Program Files\Trend Micro\HijackThis\Jonathan.exe

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = www.rbc.org/odb/odb.shtml

R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157

R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896

R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896

R1 - HKCU\Software\Microsoft\Internet Connection Wizard,ShellNext = http://espn.go.com/motion/detect.html

O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelper.dll

O2 - BHO: Skype add-on (mastermind) - {22BF413B-C6D2-4d91-82A9-A0F997BA588C} - C:\Program Files\Skype\Toolbars\Internet Explorer\SkypeIEPlugin.dll

O2 - BHO: DriveLetterAccess - {5CA3D70E-1895-11CF-8E15-001234567890} - C:\WINDOWS\System32\DLA\DLASHX_W.DLL

O2 - BHO: del.icio.us Toolbar Helper - {7AA07AE6-01EF-44EC-93CA-9D7CD41CCDB6} - C:\Program Files\del.icio.us\Internet Explorer Buttons\dlcsIE.dll

O2 - BHO: Java Plug-In 2 SSV Helper - {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Program Files\Java\jre6\bin\jp2ssv.dll

O2 - BHO: JQSIEStartDetectorImpl - {E7E6F031-17CE-4C07-BC86-EABFE594F69C} - C:\Program Files\Java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll

O3 - Toolbar: del.icio.us - {981FE6A8-260C-4930-960F-C3BC82746CB0} - C:\Program Files\del.icio.us\Internet Explorer Buttons\dlcsIE.dll

O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime

O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe

O8 - Extra context menu item: Add to Google Photos Screensa&ver - res://C:\WINDOWS\system32\GPhotos.scr/200

O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\OFFICE11\EXCEL.EXE/3000

O9 - Extra button: Skype - {77BF5300-1474-4EC7-9980-D32B190E9B07} - C:\Program Files\Skype\Toolbars\Internet Explorer\SkypeIEPlugin.dll

O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\OFFICE11\REFIEBAR.DLL

O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe

O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe

O17 - HKLM\System\CCS\Services\Tcpip\..\{570E0C3D-F910-4546-B892-A911C90EDDEA}: NameServer = 83.149.115.182

O23 - Service: Ati HotKey Poller - ATI Technologies Inc. - C:\WINDOWS\system32\Ati2evxx.exe

O23 - Service: Cisco Systems, Inc. VPN Service (CVPND) - Cisco Systems, Inc. - C:\Program Files\Cisco Systems\VPN Client\cvpnd.exe

O23 - Service: EvtEng - Intel Corporation - C:\Program Files\Intel\Wireless\Bin\EvtEng.exe

O23 - Service: Google Updater Service (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe

O23 - Service: Java Quick Starter (JavaQuickStarterService) - Sun Microsystems, Inc. - C:\Program Files\Java\jre6\bin\jqs.exe

O23 - Service: Pml Driver HPZ12 - HP - C:\WINDOWS\system32\HPZipm12.exe

O23 - Service: RegSrvc - Intel Corporation - C:\Program Files\Intel\Wireless\Bin\RegSrvc.exe

O23 - Service: Spectrum24 Event Monitor (S24EventMonitor) - Intel Corporation - C:\Program Files\Intel\Wireless\Bin\S24EvMon.exe

O23 - Service: Symantec Core LC - Unknown owner - C:\Program Files\Common Files\Symantec Shared\CCPD-LC\symlcsvc.exe

O23 - Service: WLANKEEPER - Intel

Link to post
Share on other sites

Thank you, I hope you have a nice Thanksgiving as well.

Please go to Start > Control Panel > Add/Remove Programs and remove the following (if present):

Adobe Reader 8.1.2

J2SE Runtime Environment 5.0 Update 11

Java 2 Runtime Environment, SE v1.4.2_13

Java

Link to post
Share on other sites

Yes, the amount you have is normal.

Please download the OTM by OldTimer.

  • Save it to your desktop.
  • Please double-click OTM.exe to run it. (Note: If you are running on Vista, right-click on the file and choose Run As Administrator).
  • Copy the lines in the codebox below to the clipboard by highlighting ALL of them and pressing CTRL + C (or, after highlighting, right-click and choose Copy):
    :processes
    explorer.exe

    :Files
    C:\WINDOWS\system32\mswunjernm.dll
    C:\Program Files\Common Files\wkkz
    C:\Documents and Settings\HelpAssistant.JONATHANWG1.001\Local Settings\Temp\Av-test.txt

    :commands
    [purity]
    [emptytemp]
    [start explorer]


  • Return to OTM, right click in the "Paste Instructions for Items to be Moved" window (under the yellow bar) and choose Paste.
  • Click the red Moveit! button.
  • Copy everything in the Results window (under the green bar) to the clipboard by highlighting ALL of them and pressing CTRL + C (or, after highlighting, right-click and choose copy), and paste it in your next reply.
  • Close OTM3

Note: If a file or folder cannot be moved immediately you may be asked to reboot the machine to finish the move process. If you are asked to reboot the machine choose Yes. In this case, after the reboot, open Notepad (Start->All Programs->Accessories->Notepad), click File->Open, in the File Name box enter *.log and press the Enter key, navigate to the C:\_OTMoveIt\MovedFiles folder, and open the newest .log file present, and copy/paste the contents of that document back here in your next post.

Link to post
Share on other sites

thanks again hope you had a nice Thanksgiving... I ran the removal program

as instructed and the log is below... JP

All processes killed

========== PROCESSES ==========

No active process named explorer.exe was found!

========== FILES ==========

File/Folder C:\WINDOWS\system32\mswunjernm.dll not found.

C:\Program Files\Common Files\wkkz\wkkzd folder moved successfully.

C:\Program Files\Common Files\wkkz folder moved successfully.

File/Folder C:\Documents and Settings\HelpAssistant.JONATHANWG1.001\Local Settings\Temp\Av-test.txt not found.

========== COMMANDS ==========

[EMPTYTEMP]

User: Administrator

->Temporary Internet Files folder emptied: 0 bytes

User: All Users

User: Default User

->Temp folder emptied: 0 bytes

->Temporary Internet Files folder emptied: 0 bytes

User: ellen

->Temp folder emptied: 0 bytes

->Temporary Internet Files folder emptied: 0 bytes

User: HelpAssistant

->Java cache emptied: 0 bytes

->FireFox cache emptied: 0 bytes

User: HelpAssistant.JONATHANWG1

->Temp folder emptied: 0 bytes

->Temporary Internet Files folder emptied: 0 bytes

->Java cache emptied: 0 bytes

->FireFox cache emptied: 0 bytes

User: HelpAssistant.JONATHANWG1.000

->Temp folder emptied: 0 bytes

->Temporary Internet Files folder emptied: 0 bytes

->Java cache emptied: 0 bytes

->FireFox cache emptied: 0 bytes

User: HelpAssistant.JONATHANWG1.001

->Temp folder emptied: 0 bytes

->Temporary Internet Files folder emptied: 0 bytes

->Java cache emptied: 0 bytes

->FireFox cache emptied: 0 bytes

User: Jonathan

->Temp folder emptied: 6219962 bytes

->Temporary Internet Files folder emptied: 9731845 bytes

->Java cache emptied: 13898531 bytes

->FireFox cache emptied: 95902703 bytes

User: LocalService

->Temp folder emptied: 0 bytes

->Temporary Internet Files folder emptied: 33170 bytes

User: NetworkService

->Temp folder emptied: 0 bytes

->Temporary Internet Files folder emptied: 0 bytes

%systemdrive% .tmp files removed: 0 bytes

%systemroot% .tmp files removed: 0 bytes

%systemroot%\System32 .tmp files removed: 0 bytes

Windows Temp folder emptied: 0 bytes

%systemroot%\system32\config\systemprofile\Local Settings\Temp folder emptied: 0 bytes

%systemroot%\system32\config\systemprofile\Local Settings\Temporary Internet Files folder emptied: 0 bytes

RecycleBin emptied: 11632624 bytes

Total Files Cleaned = 131.05 mb

OTM by OldTimer - Version 3.1.2.0 log created on 11292009_094137

Files moved on Reboot...

Registry entries deleted on Reboot...

Link to post
Share on other sites

Hi JP, I had a great Thanksgiving, how was yours?

Your log looks clean, Great Job :thumbsup:

Follow these steps to uninstall Combofix and tools used in the removal of malware

  • Click START then RUN
  • Now type Combofix /u in the runbox and click OK. Note the space between the X and the U, it needs to be there.
    CF_Cleanup.png

Now for some cleanup..

Please download OTC and save it to Desktop.

  • Please make sure you are connecting to the Internet
  • Double-click OTC.exe
  • Click the CleanUp! button.
  • Select Yes when the "Begin cleanup Process?" prompt appears.
  • If you are prompted to Reboot during the cleanup, select Yes

Set a New Restore Point to prevent possible reinfection from an old one. Some of the malware you picked up could have been saved in System Restore. Since System Restore is a protected directory, your tools can not access it to delete these bad files which sometimes can reinfect your system. Setting a new restore point AFTER cleaning your system will help prevent this and enable your computer to "roll-back" to a clean working state.

The easiest and safest way to do this is:

  • Go to Start > Programs > Accessories > System Tools and click "System Restore".
  • Choose the radio button marked "Create a Restore Point" on the first screen then click "Next". Give the R.P. a name then click "Create". The new point will be stamped with the current date and time. Keep a log of this so you can find it easily should you need to use System Restore.
  • Then go to Start > Run and type: Cleanmgr
  • Click "OK".
  • Click the "More Options" Tab.
  • Click "Clean Up" in the System Restore section to remove all previous restore points except the newly created one.

  • Make your Internet Explorer more secure - This can be done by following these simple instructions:
    1. From within Internet Explorer click on the Tools menu and then click on Options.
    2. Click once on the Security tab
    3. Click once on the Internet icon so it becomes highlighted.
    4. Click once on the Custom Level button.

      1. Change the Download signed ActiveX controls to Prompt
      2. Change the Download unsigned ActiveX controls to Disable
      3. Change the Initialize and script ActiveX controls not marked as safe to Disable
      4. Change the Installation of desktop items to Prompt
      5. Change the Launching programs and files in an IFRAME to Prompt
      6. Change the Navigate sub-frames across different domains to Prompt
      7. When all these settings have been made, click on the OK button.
      8. If it prompts you as to whether or not you want to save the settings, press the Yes button.

  • Next press the Apply button and then the OK to exit the Internet Properties page.




    • Use an AntiVirus Software - It is very important that your computer has an anti-virus software running on your machine. This alone can save you a lot of trouble with malware in the future.
    • Update your AntiVirus Software - It is imperitive that you update your Antivirus software at least once a week (Even more if you wish). If you do not update your antivirus software then it will not be able to catch any of the new variants that may come out.
    • Use a Firewall - I can not stress how important it is that you use a Firewall on your computer. Without a firewall your computer is succeptible to being hacked and taken over. I am very serious about this and see it happen almost every day with my clients. Simply using a Firewall in its default configuration can lower your risk greatly.
      No Firewall Onboard
      You don't seem to have a firewall program installed. Using a firewall will allow you to allow/deny access for applications that want to go online. Select one of these, or another of your choice:

    [*]Visit Microsoft's Windows Update Site Frequently - It is important that you visit http://www.windowsupdate.com regularly. This will ensure your computer has always the latest security updates available installed on your computer. If there are new updates to install, install them immediately, reboot your computer, and revisit the site until there are no more critical updates.

    [*]Install SpywareBlaster - SpywareBlaster will add a large list of programs and sites into your Internet Explorer settings that will protect you from running and downloading known malicious programs.

    [*]Install SpywareGuard - SpywareGuard offers realtime protection from spyware installation attempts. Make sure you are only running one real-time anti-spyware protection program or there will be a conflict.

    [*]Update all these programs regularly - Make sure you update all the programs I have listed regularly. Without regular updates you WILL NOT be protected when new malicious programs are released.

Follow this list and your potential for being infected again will reduce dramatically.

here are some additional utilities that will enhance your safety

  • McAfee Site Advisor <= McAfee Site Advisor protects your browser against malicious sites and warns you when you go to one.
  • MVPS Hosts file <= The MVPS Hosts file replaces your current HOSTS file with one containing well know ad sites etc. Basically, this prevents your computer from connecting to those sites by redirecting them to 127.0.0.1 which is your local computer
  • Malwarebytes' Anti-Malware - which you already have.
  • SUPER AntiSpyware - A Free AntiSpyware scanner that has great detection ratings.

Link to post
Share on other sites

Guest
This topic is now closed to further replies.
  • Recently Browsing   0 members

    • No registered users viewing this page.
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.