Jump to content

Recommended Posts

I was recently hit with the virus that installs Antispyware Soft. I removed this virus as per the instructions found in these forums. Afterwards, I ran another quick scan of MB and found a few things that could only be removed on reboot. After reboot, I scanned again and all problems were removed except for one--a rootkit virus in my system drivers (under hidden items. It is called stoxfio and I cannot find information on it anywhere else. c:\windows\system32\drivers\stoxfio.sys). I did another reboot and it yet persisted. I also ran a full system scan with Avira Antivirus and it did pick it up and move it to quarantine. MB says that my system is clean, however, I still see the offending rootkit in my device manager and I continue to have google redirects (as well as Google Chrome not working at all. I can open the program but nothing ever loads beyond the browser itself)

Unfortunately I did not save the logs where MB DID see the problem before, so cannot duplicate it now that it cannot see it now. I still went ahead and followed the "I'm infected" instructions. All went smoothly until I tried to run GMER Rootkit Scanner. During the scan, I see it did pick up the same rootkit I noticed before. However before the scan could complete my computer restarted itself so I was unable to procur a log for this either. I was able to do all the other scans however. I have attached the ATTACH.txt and will now post the DDS log below.

DDS (Ver_10-03-17.01) - NTFSx86

Run by Andrea at 1:40:54.09 on Sun 05/16/2010

Internet Explorer: 6.0.2900.2180

Microsoft Windows XP Professional 5.1.2600.2.1252.1.1033.18.3070.2476 [GMT -5:00]

AV: AntiVir Desktop *On-access scanning enabled* (Updated) {AD166499-45F9-482A-A743-FDD3350758C7}

============== Running Processes ===============

C:\WINDOWS\system32\Ati2evxx.exe

C:\WINDOWS\system32\svchost -k DcomLaunch

svchost.exe

C:\WINDOWS\System32\svchost.exe -k netsvcs

svchost.exe

svchost.exe

C:\WINDOWS\system32\Ati2evxx.exe

C:\WINDOWS\system32\spoolsv.exe

C:\Program Files\Avira\AntiVir Desktop\sched.exe

C:\WINDOWS\Explorer.EXE

C:\WINDOWS\RTHDCPL.EXE

C:\Program Files\Avira\AntiVir Desktop\avgnt.exe

C:\Program Files\Google\Google Desktop Search\GoogleDesktop.exe

C:\Program Files\WiFiConnector\NintendoWFCReg.exe

C:\Program Files\Google\Google Desktop Search\GoogleDesktop.exe

C:\Program Files\ATI Technologies\ATI.ACE\Core-Static\MOM.exe

C:\Program Files\ATI Technologies\ATI.ACE\Core-Static\ccc.exe

C:\Program Files\Avira\AntiVir Desktop\avguard.exe

C:\Program Files\Gigabyte\EasySaver\ESSVR.EXE

C:\Program Files\LogMeIn Hamachi\hamachi-2.exe

C:\Program Files\Avira\AntiVir Desktop\avshadow.exe

C:\Program Files\LogMeIn\x86\RaMaint.exe

C:\Program Files\LogMeIn\x86\LogMeIn.exe

C:\Program Files\LogMeIn\x86\LMIGuardian.exe

C:\WINDOWS\system32\svchost.exe -k imgsvc

C:\Program Files\Canon\CAL\CALMAIN.exe

C:\WINDOWS\system32\wscntfy.exe

C:\WINDOWS\System32\svchost.exe -k HTTPFilter

C:\WINDOWS\system32\wuauclt.exe

C:\Program Files\Mozilla Firefox\firefox.exe

C:\Documents and Settings\Andrea\Desktop\dds.scr

============== Pseudo HJT Report ===============

uInternet Settings,ProxyServer = http=127.0.0.1:5555

uInternet Settings,ProxyOverride = <local>

uURLSearchHooks: DeviceVM Url Search Hook: {0063bf63-bfff-4b8f-9d26-4267df7f17dd} - c:\windows\system32\dvmurl.dll

BHO: AskBar BHO: {201f27d4-3704-41d6-89c1-aa35e39143ed} - c:\program files\askbardis\bar\bin\askBar.dll

BHO: Java Plug-In 2 SSV Helper: {dbc80044-a445-435b-bc74-9c25c1c588a9} - c:\program files\java\jre6\bin\jp2ssv.dll

TB: Foxit Toolbar: {3041d03e-fd4b-44e0-b742-2d9b88305f98} - c:\program files\askbardis\bar\bin\askBar.dll

uRun: [Google Update] "c:\documents and settings\andrea\local settings\application data\google\update\GoogleUpdate.exe" /c

uRun: [EA Core] "c:\program files\electronic arts\eadm\Core.exe" -silent

mRun: [RTHDCPL] RTHDCPL.EXE

mRun: [Alcmtr] ALCMTR.EXE

mRun: [GEST] m

Attach.zip

Link to post
Share on other sites

Hello Kender Bard! Welcome to MalwareBytes' Anti-Malware Forums!

My name is Borislav and I will be glad to help you solve your problems with malware. Before we begin, please note the following:

  • The process of cleaning your system may take some time, so please be patient.
  • Stay with the topic until I tell you that your system is clean. Missing symptoms does not mean that everything is okay.
  • Instructions that I give are for your system only!
  • If you don't know or can't understand something please ask.
  • Do not install or uninstall any software or hardware, while work on.

Step 1:

  • Launch Malwarebytes' Anti-Malware
  • Go to "Update" tab and select "Check for Updates". If an update is found, it will download and install the latest version.
  • Go to "Scanner" tab and select "Perform Quick Scan", then click Scan.
  • The scan may take some time to finish,so please be patient.
  • When the scan is complete, click OK, then Show Results to view the results.
  • Make sure that everything is checked, and click Remove Selected.
  • When disinfection is completed, a log will open in Notepad and you may be prompted to Restart.(See Extra Note)
  • The log is automatically saved by MBAM and can be viewed by clicking the Logs tab in MBAM.
  • Copy&Paste the entire report in your next reply.

Extra Note:

If MBAM encounters a file that is difficult to remove,you will be presented with 1 of 2 prompts,click OK to either and let MBAM proceed with the disinfection process,if asked to restart the computer,please do so immediatly.

Step 2:

Download RootRepeal Beta on your desktop.

  • Double click RootRepeal.exe to start the program
  • Click on the Report tab at the bottom of the program window
  • Click the Scan button
  • In the Select Scan dialog, check:

    • Drivers
    • Files
    • Processes
    • SSDT
    • Stealth Objects
    • Hidden Services

    [*]Click the OK button

    [*]In the next dialog, select all drives showing

    [*]Click OK to start the scan

    Note: The scan can take some time.
    DO NOT
    run any other programs while the scan is running

    [*]When the scan is complete, the Save Report button will become available

    [*]Click this and save the report to your Desktop as RootRepeal.txt

    [*]Go to File, then Exit to close the program

If the report is not too long, post the contents of RootRepeal.txt in your next reply. If the report is very long, it will not be complete if you post it, so please attach it to your reply instead.

In your next reply, please include these log(s) in this sequence:

  1. MalwareBytes' Anti-Malware log
  2. a new fresh DDS log only
  3. RootRepeal log

Link to post
Share on other sites

Hello Kender Bard! Welcome to MalwareBytes' Anti-Malware Forums!

My name is Borislav and I will be glad to help you solve your problems with malware. Before we begin, please note the following:

  • The process of cleaning your system may take some time, so please be patient.
  • Stay with the topic until I tell you that your system is clean. Missing symptoms does not mean that everything is okay.
  • Instructions that I give are for your system only!
  • If you don't know or can't understand something please ask.
  • Do not install or uninstall any software or hardware, while work on.

Step 1:

  • Launch Malwarebytes' Anti-Malware
  • Go to "Update" tab and select "Check for Updates". If an update is found, it will download and install the latest version.
  • Go to "Scanner" tab and select "Perform Quick Scan", then click Scan.
  • The scan may take some time to finish,so please be patient.
  • When the scan is complete, click OK, then Show Results to view the results.
  • Make sure that everything is checked, and click Remove Selected.
  • When disinfection is completed, a log will open in Notepad and you may be prompted to Restart.(See Extra Note)
  • The log is automatically saved by MBAM and can be viewed by clicking the Logs tab in MBAM.
  • Copy&Paste the entire report in your next reply.

Extra Note:

If MBAM encounters a file that is difficult to remove,you will be presented with 1 of 2 prompts,click OK to either and let MBAM proceed with the disinfection process,if asked to restart the computer,please do so immediatly.

Step 2:

Download RootRepeal Beta on your desktop.

  • Double click RootRepeal.exe to start the program
  • Click on the Report tab at the bottom of the program window
  • Click the Scan button
  • In the Select Scan dialog, check:

    • Drivers
    • Files
    • Processes
    • SSDT
    • Stealth Objects
    • Hidden Services

    [*]Click the OK button

    [*]In the next dialog, select all drives showing

    [*]Click OK to start the scan

    Note: The scan can take some time.
    DO NOT
    run any other programs while the scan is running

    [*]When the scan is complete, the Save Report button will become available

    [*]Click this and save the report to your Desktop as RootRepeal.txt

    [*]Go to File, then Exit to close the program

If the report is not too long, post the contents of RootRepeal.txt in your next reply. If the report is very long, it will not be complete if you post it, so please attach it to your reply instead.

In your next reply, please include these log(s) in this sequence:

  1. MalwareBytes' Anti-Malware log
  2. a new fresh DDS log only
  3. RootRepeal log

As a note, while scanning MBAM, Avira picked up on a couple bits of malware. I was

unsure if I should remove or ignore so I selected remove. They are listed below from my

Avira logs. While scanning RootRepeal Beta, the program ran into a critical error and shut

down before a log could be saved. My desktop temporarily lost all of its icons and then

they reappeared rearranged.

Begin scan in 'C:\WINDOWS\Temp\Aff.exe'

C:\WINDOWS\Temp\Aff.exe

[DETECTION] Is the TR/Genome.jszk Trojan

[NOTE] The registration entry

<HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run\M5T8

QL3YW3> was removed successfully.

[NOTE] The file was moved to the quarantine directory under the name

'4e46f971.qua'.

Begin scan in 'C:\WINDOWS\Temp\cptaah.exe'

C:\WINDOWS\Temp\cptaah.exe

[DETECTION] Is the TR/FraudPack.awjx Trojan

Beginning disinfection:

C:\WINDOWS\Temp\cptaah.exe

[DETECTION] Is the TR/FraudPack.awjx Trojan

[NOTE] The file was moved to the quarantine directory under the name

'4e74fc55.qua'.

Begin scan in 'C:\Documents and Settings\Andrea\Local Settings\Temporary Internet

Files\Content.IE5\1WEC6UVX\yptozgozmu[1].htm'

C:\Documents and Settings\Andrea\Local Settings\Temporary Internet

Files\Content.IE5\1WEC6UVX\yptozgozmu[1].htm

[DETECTION] Is the TR/FraudPack.awjx Trojan

[NOTE] The file was moved to the quarantine directory under the name

'4e74f9b0.qua'.

Malwarebytes' Anti-Malware 1.46

www.malwarebytes.org

Database version: 4107

Windows 5.1.2600 Service Pack 2

Internet Explorer 6.0.2900.2180

5/16/2010 3:43:52 PM

mbam-log-2010-05-16 (15-43-52).txt

Scan type: Quick scan

Objects scanned: 132885

Time elapsed: 6 minute(s), 34 second(s)

Memory Processes Infected: 0

Memory Modules Infected: 0

Registry Keys Infected: 0

Registry Values Infected: 0

Registry Data Items Infected: 0

Folders Infected: 0

Files Infected: 0

Memory Processes Infected:

(No malicious items detected)

Memory Modules Infected:

(No malicious items detected)

Registry Keys Infected:

(No malicious items detected)

Registry Values Infected:

(No malicious items detected)

Registry Data Items Infected:

(No malicious items detected)

Folders Infected:

(No malicious items detected)

Files Infected:

(No malicious items detected)

DDS (Ver_10-03-17.01) - NTFSx86

Run by Andrea at 16:01:03.70 on Sun 05/16/2010

Internet Explorer: 6.0.2900.2180

Microsoft Windows XP Professional 5.1.2600.2.1252.1.1033.18.3070.2264 [GMT

-5:00]

AV: AntiVir Desktop *On-access scanning enabled* (Updated)

{AD166499-45F9-482A-A743-FDD3350758C7}

============== Running Processes ===============

C:\WINDOWS\system32\Ati2evxx.exe

C:\WINDOWS\system32\svchost -k DcomLaunch

svchost.exe

C:\WINDOWS\System32\svchost.exe -k netsvcs

svchost.exe

svchost.exe

C:\WINDOWS\system32\Ati2evxx.exe

C:\WINDOWS\system32\spoolsv.exe

C:\Program Files\Avira\AntiVir Desktop\sched.exe

C:\WINDOWS\Explorer.EXE

C:\WINDOWS\RTHDCPL.EXE

C:\Program Files\Avira\AntiVir Desktop\avgnt.exe

C:\Program Files\Google\Google Desktop Search\GoogleDesktop.exe

C:\Program Files\WiFiConnector\NintendoWFCReg.exe

C:\Program Files\Google\Google Desktop Search\GoogleDesktop.exe

C:\Program Files\ATI Technologies\ATI.ACE\Core-Static\MOM.exe

C:\Program Files\ATI Technologies\ATI.ACE\Core-Static\ccc.exe

C:\Program Files\Avira\AntiVir Desktop\avguard.exe

C:\Program Files\Gigabyte\EasySaver\ESSVR.EXE

C:\Program Files\LogMeIn Hamachi\hamachi-2.exe

C:\Program Files\LogMeIn\x86\RaMaint.exe

C:\Program Files\Avira\AntiVir Desktop\avshadow.exe

C:\Program Files\LogMeIn\x86\LogMeIn.exe

C:\Program Files\LogMeIn\x86\LMIGuardian.exe

C:\WINDOWS\system32\svchost.exe -k imgsvc

C:\Program Files\Canon\CAL\CALMAIN.exe

C:\WINDOWS\system32\wscntfy.exe

C:\WINDOWS\System32\svchost.exe -k HTTPFilter

C:\Program Files\Mozilla Firefox\firefox.exe

C:\WINDOWS\system32\notepad.exe

C:\Documents and Settings\Andrea\Desktop\dds.scr

============== Pseudo HJT Report ===============

uInternet Settings,ProxyServer = http=127.0.0.1:5555

uInternet Settings,ProxyOverride = <local>

uURLSearchHooks: DeviceVM Url Search Hook:

{0063bf63-bfff-4b8f-9d26-4267df7f17dd} - c:\windows\system32\dvmurl.dll

BHO: AskBar BHO: {201f27d4-3704-41d6-89c1-aa35e39143ed} - c:\program

files\askbardis\bar\bin\askBar.dll

BHO: Java Plug-In 2 SSV Helper: {dbc80044-a445-435b-bc74-9c25c1c588a9} -

c:\program files\java\jre6\bin\jp2ssv.dll

TB: Foxit Toolbar: {3041d03e-fd4b-44e0-b742-2d9b88305f98} - c:\program

files\askbardis\bar\bin\askBar.dll

uRun: [Google Update] "c:\documents and settings\andrea\local settings\application

data\google\update\GoogleUpdate.exe" /c

uRun: [EA Core] "c:\program files\electronic arts\eadm\Core.exe" -silent

mRun: [RTHDCPL] RTHDCPL.EXE

mRun: [Alcmtr] ALCMTR.EXE

mRun: [GEST] m

Link to post
Share on other sites

**Note: If you need more detailed information, please visit the web page of ComboFix in BleepingComputer. **

Please note that these fixes are not instantaneous. Most infections require more than one round to properly eradicate.

Stay with me until given the 'all clear' even if symptoms diminish. Lack of symptoms does not always mean the job is complete.

Kindly follow my instructions and please do no fixing on your own or running of scanners unless requested by me or another helper.

Please download ComboFix from

Here or Here to your Desktop.

**Note: In the event you already have Combofix, this is a new version that I need you to download. It is important that it is saved and renamed following this process directly to your desktop**

  1. If you are using Firefox, make sure that your download settings are as follows:
    • Open Tools -> Options -> Main tab
    • Set to Always ask me where to Save the files.

[*]During the download, rename Combofix to Combo-Fix as follows:

CF_download_FF.gif

CF_download_rename.gif

[*]It is important you rename Combofix during the download, but not after.

[*]Please do not rename Combofix to other names, but only to the one indicated.

[*]Close any open browsers.

[*]Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.

-----------------------------------------------------------

  • Very Important! Temporarily disable your anti-virus, script blocking and any anti-malware real-time protection before performing a scan. They can interfere with ComboFix or remove some of its embedded files which may cause unpredictable results.
  • Click on this link to see a list of programs that should be disabled. The list is not all inclusive. If yours is not listed and you don't know how to disable it, please ask.

    -----------------------------------------------------------


  • Close any open browsers.
  • WARNING: Combofix will disconnect your machine from the Internet as soon as it starts
  • Please do not attempt to re-connect your machine back to the Internet until Combofix has completely finished.
  • If there is no internet connection after running Combofix, then restart your computer to restore back your connection.

-----------------------------------------------------------

[*]Double click on combo-Fix.exe & follow the prompts.

[*]When finished, it will produce a report for you.

[*]Please post the C:\Combo-Fix.txt for further review.

**Note: Do not mouseclick combo-fix's window while it's running. That may cause it to stall**

Link to post
Share on other sites

**Note: If you need more detailed information, please visit the web page of ComboFix in BleepingComputer. **

Please note that these fixes are not instantaneous. Most infections require more than one round to properly eradicate.

Stay with me until given the 'all clear' even if symptoms diminish. Lack of symptoms does not always mean the job is complete.

Kindly follow my instructions and please do no fixing on your own or running of scanners unless requested by me or another helper.

Please download ComboFix from

Here or Here to your Desktop.

**Note: In the event you already have Combofix, this is a new version that I need you to download. It is important that it is saved and renamed following this process directly to your desktop**

  1. If you are using Firefox, make sure that your download settings are as follows:
    • Open Tools -> Options -> Main tab
    • Set to Always ask me where to Save the files.

[*]During the download, rename Combofix to Combo-Fix as follows:

CF_download_FF.gif

CF_download_rename.gif

[*]It is important you rename Combofix during the download, but not after.

[*]Please do not rename Combofix to other names, but only to the one indicated.

[*]Close any open browsers.

[*]Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.

-----------------------------------------------------------

  • Very Important! Temporarily disable your anti-virus, script blocking and any anti-malware real-time protection before performing a scan. They can interfere with ComboFix or remove some of its embedded files which may cause unpredictable results.
  • Click on this link to see a list of programs that should be disabled. The list is not all inclusive. If yours is not listed and you don't know how to disable it, please ask.

    -----------------------------------------------------------


  • Close any open browsers.
  • WARNING: Combofix will disconnect your machine from the Internet as soon as it starts
  • Please do not attempt to re-connect your machine back to the Internet until Combofix has completely finished.
  • If there is no internet connection after running Combofix, then restart your computer to restore back your connection.

-----------------------------------------------------------

[*]Double click on combo-Fix.exe & follow the prompts.

[*]When finished, it will produce a report for you.

[*]Please post the C:\Combo-Fix.txt for further review.

**Note: Do not mouseclick combo-fix's window while it's running. That may cause it to stall**

ComboFix 10-05-16.01 - Andrea 05/16/2010 17:32:08.1.2 - x86

Microsoft Windows XP Professional 5.1.2600.2.1252.1.1033.18.3070.2602 [GMT -5:00]

Running from: c:\documents and settings\Andrea\Desktop\Combo-Fix.exe

AV: AntiVir Desktop *On-access scanning disabled* (Updated) {AD166499-45F9-482A-A743-FDD3350758C7}

.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))

.

Infected copy of c:\windows\system32\drivers\serial.sys was found and disinfected

Restored copy from - Kitty had a snack :)

.

((((((((((((((((((((((((( Files Created from 2010-04-16 to 2010-05-16 )))))))))))))))))))))))))))))))

.

2010-05-15 20:50 . 2010-05-15 20:50 388096 ----a-r- c:\documents and settings\Andrea\Application Data\Microsoft\Installer\{45A66726-69BC-466B-A7A4-12FCBA4883D7}\HiJackThis.exe

2010-05-15 20:50 . 2010-05-15 20:50 -------- d-----w- c:\program files\Trend Micro

2010-05-15 02:09 . 2010-05-15 02:16 -------- d-----w- c:\program files\Livestream Procaster

2010-05-15 01:03 . 2010-05-15 18:19 -------- d-----w- c:\windows\system32\NtmsData

2010-05-15 01:02 . 2010-05-15 01:02 -------- d-----w- c:\documents and settings\Andrea\Application Data\Avira

2010-05-14 23:10 . 2010-05-15 00:44 -------- d-----w- c:\program files\CCleaner

2010-05-14 22:08 . 2010-05-15 02:45 -------- d-----w- c:\documents and settings\Andrea\Local Settings\Application Data\Procaster

2010-05-14 21:01 . 2010-05-14 23:58 -------- d-----w- c:\documents and settings\Andrea\Local Settings\Application Data\woxofvksm

2010-05-14 21:00 . 2010-05-16 22:37 823808 ----a-w- c:\windows\system32\drivers\stoxfio.sys

2010-05-14 08:35 . 2010-05-14 08:35 -------- d-----w- c:\program files\SmartFTP Client

2010-05-12 20:38 . 2010-05-16 01:49 -------- d-----w- c:\program files\Steam

2010-05-11 20:09 . 2010-05-11 20:09 -------- d-----w- c:\documents and settings\Andrea\Local Settings\Application Data\Stardock

2010-05-11 20:08 . 2010-05-11 20:08 -------- d-----w- c:\program files\Common Files\Stardock

2010-05-11 19:55 . 2010-05-11 19:55 -------- d--h--w- c:\documents and settings\All Users\Application Data\{8227D5D4-E2F9-4B81-98FA-54E4E78F5238}

2010-05-11 19:55 . 2008-07-28 23:15 2405104 ----a-w- c:\documents and settings\All Users\Application Data\{8227D5D4-E2F9-4B81-98FA-54E4E78F5238}\SkinStudio.exe

2010-05-10 09:01 . 2010-05-10 09:01 -------- d-----w- c:\program files\Common Files\Java

2010-05-10 09:01 . 2010-05-10 09:01 503808 ----a-w- c:\documents and settings\Andrea\Application Data\Sun\Java\Deployment\SystemCache\6.0\54\1a209876-6255dad5-n\msvcp71.dll

2010-05-10 09:01 . 2010-05-10 09:01 499712 ----a-w- c:\documents and settings\Andrea\Application Data\Sun\Java\Deployment\SystemCache\6.0\54\1a209876-6255dad5-n\jmc.dll

2010-05-10 09:01 . 2010-05-10 09:01 348160 ----a-w- c:\documents and settings\Andrea\Application Data\Sun\Java\Deployment\SystemCache\6.0\54\1a209876-6255dad5-n\msvcr71.dll

2010-05-10 09:01 . 2010-05-10 09:01 61440 ----a-w- c:\documents and settings\Andrea\Application Data\Sun\Java\Deployment\SystemCache\6.0\17\6d0ad391-380e0b17-n\decora-sse.dll

2010-05-10 09:01 . 2010-05-10 09:01 12800 ----a-w- c:\documents and settings\Andrea\Application Data\Sun\Java\Deployment\SystemCache\6.0\17\6d0ad391-380e0b17-n\decora-d3d.dll

2010-05-10 09:01 . 2010-04-12 22:29 411368 ----a-w- c:\windows\system32\deployJava1.dll

2010-05-10 08:57 . 2010-05-10 08:57 -------- d-----w- c:\program files\LogMeIn Hamachi

2010-05-01 02:45 . 2010-05-01 02:45 -------- d-----w- c:\documents and settings\Andrea\Application Data\DVDVideoSoftIEHelpers

2010-04-27 06:38 . 2008-09-03 16:56 151552 ----a-w- c:\documents and settings\Andrea\Application Data\Mozilla\Firefox\Profiles\wvutj5mu.default\extensions\{7378B8C2-FC38-41b8-A8C9-875D1F5B0A24}\components\NativeComponent.dll

2010-04-27 06:38 . 2007-10-26 06:12 55296 ----a-w- c:\documents and settings\Andrea\Application Data\Mozilla\Firefox\Profiles\wvutj5mu.default\extensions\{7378B8C2-FC38-41b8-A8C9-875D1F5B0A24}\components\FFMpegBridge.dll

2010-04-27 06:38 . 2007-09-06 06:18 798720 ----a-w- c:\documents and settings\Andrea\Application Data\Mozilla\Firefox\Profiles\wvutj5mu.default\extensions\{7378B8C2-FC38-41b8-A8C9-875D1F5B0A24}\components\ImageMagicResize.dll

2010-04-27 06:38 . 2007-01-30 06:59 7165440 ----a-w- c:\documents and settings\Andrea\Application Data\Mozilla\Firefox\Profiles\wvutj5mu.default\extensions\{7378B8C2-FC38-41b8-A8C9-875D1F5B0A24}\components\avcodec-51.dll

2010-04-27 06:38 . 2007-01-30 06:59 490496 ----a-w- c:\documents and settings\Andrea\Application Data\Mozilla\Firefox\Profiles\wvutj5mu.default\extensions\{7378B8C2-FC38-41b8-A8C9-875D1F5B0A24}\components\avformat-51.dll

2010-04-27 06:38 . 2007-01-30 06:59 142848 ----a-w- c:\documents and settings\Andrea\Application Data\Mozilla\Firefox\Profiles\wvutj5mu.default\extensions\{7378B8C2-FC38-41b8-A8C9-875D1F5B0A24}\components\swscale-0.dll

2010-04-27 06:38 . 2007-01-30 06:59 19968 ----a-w- c:\documents and settings\Andrea\Application Data\Mozilla\Firefox\Profiles\wvutj5mu.default\extensions\{7378B8C2-FC38-41b8-A8C9-875D1F5B0A24}\components\avutil-49.dll

2010-04-27 06:38 . 2006-12-17 01:24 53248 ----a-w- c:\documents and settings\Andrea\Application Data\Mozilla\Firefox\Profiles\wvutj5mu.default\extensions\{7378B8C2-FC38-41b8-A8C9-875D1F5B0A24}\components\2kPrerequisite.dll

2010-04-27 06:38 . 2006-11-15 01:00 258048 ----a-w- c:\documents and settings\Andrea\Application Data\Mozilla\Firefox\Profiles\wvutj5mu.default\extensions\{7378B8C2-FC38-41b8-A8C9-875D1F5B0A24}\components\SDL.dll

2010-04-27 06:38 . 2003-02-21 09:42 348160 ----a-w- c:\documents and settings\Andrea\Application Data\Mozilla\Firefox\Profiles\wvutj5mu.default\extensions\{7378B8C2-FC38-41b8-A8C9-875D1F5B0A24}\components\msvcr71.dll

2010-04-22 20:27 . 2010-04-22 20:27 6725632 ----a-w- c:\documents and settings\All Users\Application Data\Intuit\Quicken\Inet\Common\patch\Update\181625-18178.dll

2010-04-22 20:26 . 2010-04-22 20:26 2904064 ----a-w- c:\documents and settings\All Users\Application Data\Intuit\Quicken\Inet\Common\patch\Update\18154-181625.dll

2010-04-22 20:26 . 2010-04-22 20:26 3616768 ----a-w- c:\documents and settings\All Users\Application Data\Intuit\Quicken\Inet\Common\patch\Update\181311-181414.dll

2010-04-22 20:25 . 2010-04-22 20:25 1536000 ----a-w- c:\documents and settings\All Users\Application Data\Intuit\Quicken\Inet\Common\patch\Update\181414-18154.dll

2010-04-22 20:25 . 2010-04-22 20:25 811008 ----a-w- c:\documents and settings\All Users\Application Data\Intuit\Quicken\Inet\Common\patch\Update\181212-181311.dll

2010-04-22 20:25 . 2010-04-22 20:25 245760 ----a-w- c:\documents and settings\All Users\Application Data\Intuit\Quicken\Inet\Common\patch\Update\QWPATCH.EXE

2010-04-22 20:25 . 2010-04-22 20:25 997 ----a-w- c:\documents and settings\All Users\Application Data\Intuit\Quicken\Inet\Common\patch\Update\rebase.cmd

2010-04-22 20:25 . 2010-04-22 20:25 223584 ----a-w- c:\documents and settings\All Users\Application Data\Intuit\Quicken\Inet\Common\patch\Update\patchw32.dll

2010-04-22 20:25 . 2010-04-22 20:25 1007616 ----a-w- c:\documents and settings\All Users\Application Data\Intuit\Quicken\Inet\Common\patch\Update\181129-181212.dll

.

(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))

.

2010-05-16 22:31 . 2009-09-24 02:39 16608 ----a-w- c:\windows\gdrv.sys

2010-05-16 22:25 . 2009-09-24 02:34 -------- d-----w- c:\program files\Trillian

2010-05-16 06:38 . 2009-09-24 04:50 -------- d-----w- c:\documents and settings\Andrea\Application Data\uTorrent

2010-05-16 06:36 . 2010-01-19 04:14 -------- d-----w- c:\program files\LogMeIn

2010-05-16 05:42 . 2009-10-11 04:40 -------- d-----w- c:\program files\DM Genie

2010-05-16 05:42 . 2009-10-11 04:16 6160 ----a-w- c:\windows\system32\gadmsysw.dll

2010-05-15 20:38 . 2009-12-20 04:12 2755896 ----a-w- c:\documents and settings\LocalService\Local Settings\Application Data\FontCache3.0.0.0.dat

2010-05-15 02:37 . 2009-10-17 03:14 -------- d-----w- c:\program files\SystemRequirementsLab

2010-05-15 00:01 . 2009-10-09 02:51 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware

2010-05-14 23:40 . 2009-09-24 04:50 -------- d-----w- c:\program files\uTorrent

2010-05-14 08:35 . 2010-03-30 06:27 -------- d-----w- c:\program files\SmartFTP Client 4.0 Setup Files

2010-05-10 09:01 . 2010-01-17 21:31 -------- d-----w- c:\program files\Java

2010-05-01 02:45 . 2009-09-29 07:09 -------- d-----w- c:\program files\Common Files\DVDVideoSoft

2010-04-29 20:39 . 2009-10-09 02:51 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys

2010-04-29 20:39 . 2009-10-09 02:51 20952 ----a-w- c:\windows\system32\drivers\mbam.sys

2010-04-26 05:22 . 2004-08-04 01:07 29392 ----a-w- c:\windows\system32\drivers\secdrv.sys

2010-04-22 20:29 . 2010-02-12 20:26 -------- d-----w- c:\program files\Quicken

2010-04-14 07:59 . 2010-04-14 07:59 14451728 ----a-w- c:\documents and settings\Andrea\Application Data\Barnes & Noble\DesktopReader\Updater\bndr_setup_2.1.1.2.exe

2010-04-12 00:05 . 2010-01-29 19:47 -------- d-----w- c:\documents and settings\Andrea\Application Data\U3

2010-04-07 03:12 . 2009-09-24 05:42 -------- d-----w- c:\program files\Mozilla Sunbird

2010-03-30 06:27 . 2010-03-30 06:27 -------- d-----w- c:\documents and settings\Andrea\Application Data\SmartFTP

2010-03-20 01:51 . 2009-09-24 02:40 -------- d--h--w- c:\program files\InstallShield Installation Information

2010-03-20 01:44 . 2010-03-20 01:44 0 ----a-w- c:\windows\PowerReg.dat

2010-03-01 15:05 . 2009-09-24 06:00 124784 ----a-w- c:\windows\system32\drivers\avipbb.sys

2010-02-22 21:57 . 2009-09-24 02:36 84320 ----a-w- c:\documents and settings\Andrea\Local Settings\Application Data\GDIPFONTCACHEV1.DAT

2010-02-16 19:24 . 2009-09-24 06:00 60936 ----a-w- c:\windows\system32\drivers\avgntflt.sys

2010-02-16 06:36 . 2010-02-16 06:36 98304 ----a-w- c:\windows\system32\CmdLineExt.dll

2010-02-13 22:04 . 2009-09-24 02:35 119808 ----a-w- c:\program files\mozilla firefox\components\GoogleDesktopMozilla.dll

.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))

.

.

*Note* empty entries & legit default entries are not shown

REGEDIT4

[HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{201f27d4-3704-41d6-89c1-aa35e39143ed}]

2008-11-18 17:58 333192 ----a-w- c:\program files\AskBarDis\bar\bin\askBar.dll

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Toolbar]

"{3041d03e-fd4b-44e0-b742-2d9b88305f98}"= "c:\program files\AskBarDis\bar\bin\askBar.dll" [2008-11-18 333192]

[HKEY_CLASSES_ROOT\clsid\{3041d03e-fd4b-44e0-b742-2d9b88305f98}]

[HKEY_CLASSES_ROOT\TypeLib\{4b1c1e16-6b34-430e-b074-5928eca4c150}]

[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Toolbar\Webbrowser]

"{3041D03E-FD4B-44E0-B742-2D9B88305F98}"= "c:\program files\AskBarDis\bar\bin\askBar.dll" [2008-11-18 333192]

[HKEY_CLASSES_ROOT\clsid\{3041d03e-fd4b-44e0-b742-2d9b88305f98}]

[HKEY_CLASSES_ROOT\TypeLib\{4b1c1e16-6b34-430e-b074-5928eca4c150}]

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]

"Google Update"="c:\documents and settings\Andrea\Local Settings\Application Data\Google\Update\GoogleUpdate.exe" [2009-09-28 133104]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]

"GEST"="m

Link to post
Share on other sites

Please upload this file in www.virustotal.com and copy/paste the resaults in your next reply:

c:\windows\system32\gadmsysw.dll

Antivirus Version Last Update Result

a-squared 4.5.0.50 2010.05.10 -

AhnLab-V3 2010.05.16.00 2010.05.15 -

AntiVir 8.2.1.242 2010.05.16 -

Antiy-AVL 2.0.3.7 2010.05.14 -

Authentium 5.2.0.5 2010.05.16 -

Avast 4.8.1351.0 2010.05.16 -

Avast5 5.0.332.0 2010.05.16 -

AVG 9.0.0.787 2010.05.16 -

BitDefender 7.2 2010.05.16 -

CAT-QuickHeal 10.00 2010.05.15 -

ClamAV 0.96.0.3-git 2010.05.16 -

Comodo 4859 2010.05.16 -

DrWeb 5.0.2.03300 2010.05.17 -

eSafe 7.0.17.0 2010.05.16 -

eTrust-Vet 35.2.7490 2010.05.15 -

F-Prot 4.5.1.85 2010.05.16 -

F-Secure 9.0.15370.0 2010.05.16 -

Fortinet 4.1.133.0 2010.05.16 -

GData 21 2010.05.16 -

Ikarus T3.1.1.84.0 2010.05.16 -

Jiangmin 13.0.900 2010.05.16 -

Kaspersky 7.0.0.125 2010.05.16 -

McAfee 5.400.0.1158 2010.05.17 -

McAfee-GW-Edition 2010.1 2010.05.16 -

Microsoft 1.5703 2010.05.17 -

NOD32 5118 2010.05.16 -

Norman 6.04.12 2010.05.16 -

nProtect 2010-05-16.01 2010.05.16 -

Panda 10.0.2.7 2010.05.16 -

PCTools 7.0.3.5 2010.05.16 -

Prevx 3.0 2010.05.17 -

Rising 22.47.06.04 2010.05.16 -

Sophos 4.53.0 2010.05.17 -

Sunbelt 6310 2010.05.16 -

Symantec 20101.1.0.89 2010.05.17 -

TheHacker 6.5.2.0.280 2010.05.14 -

TrendMicro 9.120.0.1004 2010.05.16 -

TrendMicro-HouseCall 9.120.0.1004 2010.05.17 -

VBA32 3.12.12.5 2010.05.14 -

ViRobot 2010.5.15.2318 2010.05.16 -

VirusBuster 5.0.27.0 2010.05.16 -

Additional information

File size: 6160 bytes

MD5...: d0e76f2a37ab8a7437a07e68af217a7a

SHA1..: d52937eaca99e7e9097dd01f43dbd7be137684a0

SHA256: 484afdf28e150ccd52e08d654d927bb1596cf606eada6c90c092f0b1f1c9add1

ssdeep: 192:BAkFLTT5XN1zAkFLTT5XN1zAkFLTT5XN1zAkFLTT5XN10:nFXPVFXPVFXPVF

XP0

PEiD..: -

PEInfo: -

RDS...: NSRL Reference Data Set

-

pdfid.: -

trid..: Unknown!

sigcheck:

publisher....: n/a

copyright....: n/a

product......: n/a

description..: n/a

original name: n/a

internal name: n/a

file version.: n/a

comments.....: n/a

signers......: -

signing date.: -

verified.....: Unsigned

Link to post
Share on other sites

Thanks!

Open Notepad and copy and paste the text in the code box below into it:

KillAll::

Driver::
stoxfio

Registry::
[-HKEY_LOCAL_MACHINE\System\ControlSet001\Services\stoxfio]

DDS::
uInternet Settings,ProxyServer = http=127.0.0.1:5555
uInternet Settings,ProxyOverride = <local>

Save the file to your desktop and name it CFScript.txt

Then drag the CFScript.txt into the ComboFix.exe as shown in the screenshot below.

CFScriptB-4.gif

This will start ComboFix again. It may ask to reboot. Post the contents of Combofix.txt in your next reply.

Note: These instructions and script were created specifically for this user. If you are not this user, do NOT follow these instructions or use this script as it could damage the workings of your system.

Link to post
Share on other sites

Thanks!

Open Notepad and copy and paste the text in the code box below into it:

KillAll::

Driver::
stoxfio

Registry::
[-HKEY_LOCAL_MACHINE\System\ControlSet001\Services\stoxfio]

DDS::
uInternet Settings,ProxyServer = http=127.0.0.1:5555
uInternet Settings,ProxyOverride = <local>

Save the file to your desktop and name it CFScript.txt

Then drag the CFScript.txt into the ComboFix.exe as shown in the screenshot below.

CFScriptB-4.gif

This will start ComboFix again. It may ask to reboot. Post the contents of Combofix.txt in your next reply.

Note: These instructions and script were created specifically for this user. If you are not this user, do NOT follow these instructions or use this script as it could damage the workings of your system.

I was unable to disable Avira Guardenable for this particular run because the avira umbrella icon was not in my system tray. So this was run with my antivirus enabled. My apologies.

ComboFix 10-05-16.01 - Andrea 05/16/2010 18:13:55.2.2 - x86

Microsoft Windows XP Professional 5.1.2600.2.1252.1.1033.18.3070.2558 [GMT -5:00]

Running from: c:\documents and settings\Andrea\Desktop\Combo-Fix.exe

Command switches used :: c:\documents and settings\Andrea\Desktop\CFscript.txt

AV: AntiVir Desktop *On-access scanning enabled* (Updated) {AD166499-45F9-482A-A743-FDD3350758C7}

.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))

.

.

((((((((((((((((((((((((((((((((((((((( Drivers/Services )))))))))))))))))))))))))))))))))))))))))))))))))

.

-------\Legacy_STOXFIO

-------\Service_stoxfio

((((((((((((((((((((((((( Files Created from 2010-04-16 to 2010-05-16 )))))))))))))))))))))))))))))))

.

2010-05-15 20:50 . 2010-05-15 20:50 388096 ----a-r- c:\documents and settings\Andrea\Application Data\Microsoft\Installer\{45A66726-69BC-466B-A7A4-12FCBA4883D7}\HiJackThis.exe

2010-05-15 20:50 . 2010-05-15 20:50 -------- d-----w- c:\program files\Trend Micro

2010-05-15 02:09 . 2010-05-15 02:16 -------- d-----w- c:\program files\Livestream Procaster

2010-05-15 01:03 . 2010-05-15 18:19 -------- d-----w- c:\windows\system32\NtmsData

2010-05-15 01:02 . 2010-05-15 01:02 -------- d-----w- c:\documents and settings\Andrea\Application Data\Avira

2010-05-14 23:10 . 2010-05-15 00:44 -------- d-----w- c:\program files\CCleaner

2010-05-14 22:08 . 2010-05-15 02:45 -------- d-----w- c:\documents and settings\Andrea\Local Settings\Application Data\Procaster

2010-05-14 21:01 . 2010-05-14 23:58 -------- d-----w- c:\documents and settings\Andrea\Local Settings\Application Data\woxofvksm

2010-05-14 21:00 . 2010-05-16 23:16 823808 ----a-w- c:\windows\system32\drivers\stoxfio.sys

2010-05-14 08:35 . 2010-05-14 08:35 -------- d-----w- c:\program files\SmartFTP Client

2010-05-12 20:38 . 2010-05-16 01:49 -------- d-----w- c:\program files\Steam

2010-05-11 20:09 . 2010-05-11 20:09 -------- d-----w- c:\documents and settings\Andrea\Local Settings\Application Data\Stardock

2010-05-11 20:08 . 2010-05-11 20:08 -------- d-----w- c:\program files\Common Files\Stardock

2010-05-11 19:55 . 2010-05-11 19:55 -------- d--h--w- c:\documents and settings\All Users\Application Data\{8227D5D4-E2F9-4B81-98FA-54E4E78F5238}

2010-05-11 19:55 . 2008-07-28 23:15 2405104 ----a-w- c:\documents and settings\All Users\Application Data\{8227D5D4-E2F9-4B81-98FA-54E4E78F5238}\SkinStudio.exe

2010-05-10 09:01 . 2010-05-10 09:01 -------- d-----w- c:\program files\Common Files\Java

2010-05-10 09:01 . 2010-05-10 09:01 503808 ----a-w- c:\documents and settings\Andrea\Application Data\Sun\Java\Deployment\SystemCache\6.0\54\1a209876-6255dad5-n\msvcp71.dll

2010-05-10 09:01 . 2010-05-10 09:01 499712 ----a-w- c:\documents and settings\Andrea\Application Data\Sun\Java\Deployment\SystemCache\6.0\54\1a209876-6255dad5-n\jmc.dll

2010-05-10 09:01 . 2010-05-10 09:01 348160 ----a-w- c:\documents and settings\Andrea\Application Data\Sun\Java\Deployment\SystemCache\6.0\54\1a209876-6255dad5-n\msvcr71.dll

2010-05-10 09:01 . 2010-05-10 09:01 61440 ----a-w- c:\documents and settings\Andrea\Application Data\Sun\Java\Deployment\SystemCache\6.0\17\6d0ad391-380e0b17-n\decora-sse.dll

2010-05-10 09:01 . 2010-05-10 09:01 12800 ----a-w- c:\documents and settings\Andrea\Application Data\Sun\Java\Deployment\SystemCache\6.0\17\6d0ad391-380e0b17-n\decora-d3d.dll

2010-05-10 09:01 . 2010-04-12 22:29 411368 ----a-w- c:\windows\system32\deployJava1.dll

2010-05-10 08:57 . 2010-05-10 08:57 -------- d-----w- c:\program files\LogMeIn Hamachi

2010-05-01 02:45 . 2010-05-01 02:45 -------- d-----w- c:\documents and settings\Andrea\Application Data\DVDVideoSoftIEHelpers

2010-04-27 06:38 . 2008-09-03 16:56 151552 ----a-w- c:\documents and settings\Andrea\Application Data\Mozilla\Firefox\Profiles\wvutj5mu.default\extensions\{7378B8C2-FC38-41b8-A8C9-875D1F5B0A24}\components\NativeComponent.dll

2010-04-27 06:38 . 2007-10-26 06:12 55296 ----a-w- c:\documents and settings\Andrea\Application Data\Mozilla\Firefox\Profiles\wvutj5mu.default\extensions\{7378B8C2-FC38-41b8-A8C9-875D1F5B0A24}\components\FFMpegBridge.dll

2010-04-27 06:38 . 2007-09-06 06:18 798720 ----a-w- c:\documents and settings\Andrea\Application Data\Mozilla\Firefox\Profiles\wvutj5mu.default\extensions\{7378B8C2-FC38-41b8-A8C9-875D1F5B0A24}\components\ImageMagicResize.dll

2010-04-27 06:38 . 2007-01-30 06:59 7165440 ----a-w- c:\documents and settings\Andrea\Application Data\Mozilla\Firefox\Profiles\wvutj5mu.default\extensions\{7378B8C2-FC38-41b8-A8C9-875D1F5B0A24}\components\avcodec-51.dll

2010-04-27 06:38 . 2007-01-30 06:59 490496 ----a-w- c:\documents and settings\Andrea\Application Data\Mozilla\Firefox\Profiles\wvutj5mu.default\extensions\{7378B8C2-FC38-41b8-A8C9-875D1F5B0A24}\components\avformat-51.dll

2010-04-27 06:38 . 2007-01-30 06:59 142848 ----a-w- c:\documents and settings\Andrea\Application Data\Mozilla\Firefox\Profiles\wvutj5mu.default\extensions\{7378B8C2-FC38-41b8-A8C9-875D1F5B0A24}\components\swscale-0.dll

2010-04-27 06:38 . 2007-01-30 06:59 19968 ----a-w- c:\documents and settings\Andrea\Application Data\Mozilla\Firefox\Profiles\wvutj5mu.default\extensions\{7378B8C2-FC38-41b8-A8C9-875D1F5B0A24}\components\avutil-49.dll

2010-04-27 06:38 . 2006-12-17 01:24 53248 ----a-w- c:\documents and settings\Andrea\Application Data\Mozilla\Firefox\Profiles\wvutj5mu.default\extensions\{7378B8C2-FC38-41b8-A8C9-875D1F5B0A24}\components\2kPrerequisite.dll

2010-04-27 06:38 . 2006-11-15 01:00 258048 ----a-w- c:\documents and settings\Andrea\Application Data\Mozilla\Firefox\Profiles\wvutj5mu.default\extensions\{7378B8C2-FC38-41b8-A8C9-875D1F5B0A24}\components\SDL.dll

2010-04-27 06:38 . 2003-02-21 09:42 348160 ----a-w- c:\documents and settings\Andrea\Application Data\Mozilla\Firefox\Profiles\wvutj5mu.default\extensions\{7378B8C2-FC38-41b8-A8C9-875D1F5B0A24}\components\msvcr71.dll

2010-04-22 20:27 . 2010-04-22 20:27 6725632 ----a-w- c:\documents and settings\All Users\Application Data\Intuit\Quicken\Inet\Common\patch\Update\181625-18178.dll

2010-04-22 20:26 . 2010-04-22 20:26 2904064 ----a-w- c:\documents and settings\All Users\Application Data\Intuit\Quicken\Inet\Common\patch\Update\18154-181625.dll

2010-04-22 20:26 . 2010-04-22 20:26 3616768 ----a-w- c:\documents and settings\All Users\Application Data\Intuit\Quicken\Inet\Common\patch\Update\181311-181414.dll

2010-04-22 20:25 . 2010-04-22 20:25 1536000 ----a-w- c:\documents and settings\All Users\Application Data\Intuit\Quicken\Inet\Common\patch\Update\181414-18154.dll

2010-04-22 20:25 . 2010-04-22 20:25 811008 ----a-w- c:\documents and settings\All Users\Application Data\Intuit\Quicken\Inet\Common\patch\Update\181212-181311.dll

2010-04-22 20:25 . 2010-04-22 20:25 245760 ----a-w- c:\documents and settings\All Users\Application Data\Intuit\Quicken\Inet\Common\patch\Update\QWPATCH.EXE

2010-04-22 20:25 . 2010-04-22 20:25 997 ----a-w- c:\documents and settings\All Users\Application Data\Intuit\Quicken\Inet\Common\patch\Update\rebase.cmd

2010-04-22 20:25 . 2010-04-22 20:25 223584 ----a-w- c:\documents and settings\All Users\Application Data\Intuit\Quicken\Inet\Common\patch\Update\patchw32.dll

2010-04-22 20:25 . 2010-04-22 20:25 1007616 ----a-w- c:\documents and settings\All Users\Application Data\Intuit\Quicken\Inet\Common\patch\Update\181129-181212.dll

.

(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))

.

2010-05-16 23:17 . 2009-09-24 02:39 16608 ----a-w- c:\windows\gdrv.sys

2010-05-16 23:11 . 2009-09-24 02:34 -------- d-----w- c:\program files\Trillian

2010-05-16 06:38 . 2009-09-24 04:50 -------- d-----w- c:\documents and settings\Andrea\Application Data\uTorrent

2010-05-16 06:36 . 2010-01-19 04:14 -------- d-----w- c:\program files\LogMeIn

2010-05-16 05:42 . 2009-10-11 04:40 -------- d-----w- c:\program files\DM Genie

2010-05-16 05:42 . 2009-10-11 04:16 6160 ----a-w- c:\windows\system32\gadmsysw.dll

2010-05-15 20:38 . 2009-12-20 04:12 2755896 ----a-w- c:\documents and settings\LocalService\Local Settings\Application Data\FontCache3.0.0.0.dat

2010-05-15 02:37 . 2009-10-17 03:14 -------- d-----w- c:\program files\SystemRequirementsLab

2010-05-15 00:01 . 2009-10-09 02:51 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware

2010-05-14 23:40 . 2009-09-24 04:50 -------- d-----w- c:\program files\uTorrent

2010-05-14 08:35 . 2010-03-30 06:27 -------- d-----w- c:\program files\SmartFTP Client 4.0 Setup Files

2010-05-10 09:01 . 2010-01-17 21:31 -------- d-----w- c:\program files\Java

2010-05-01 02:45 . 2009-09-29 07:09 -------- d-----w- c:\program files\Common Files\DVDVideoSoft

2010-04-29 20:39 . 2009-10-09 02:51 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys

2010-04-29 20:39 . 2009-10-09 02:51 20952 ----a-w- c:\windows\system32\drivers\mbam.sys

2010-04-26 05:22 . 2004-08-04 01:07 29392 ----a-w- c:\windows\system32\drivers\secdrv.sys

2010-04-22 20:29 . 2010-02-12 20:26 -------- d-----w- c:\program files\Quicken

2010-04-14 07:59 . 2010-04-14 07:59 14451728 ----a-w- c:\documents and settings\Andrea\Application Data\Barnes & Noble\DesktopReader\Updater\bndr_setup_2.1.1.2.exe

2010-04-12 00:05 . 2010-01-29 19:47 -------- d-----w- c:\documents and settings\Andrea\Application Data\U3

2010-04-07 03:12 . 2009-09-24 05:42 -------- d-----w- c:\program files\Mozilla Sunbird

2010-03-30 06:27 . 2010-03-30 06:27 -------- d-----w- c:\documents and settings\Andrea\Application Data\SmartFTP

2010-03-20 01:51 . 2009-09-24 02:40 -------- d--h--w- c:\program files\InstallShield Installation Information

2010-03-20 01:44 . 2010-03-20 01:44 0 ----a-w- c:\windows\PowerReg.dat

2010-03-01 15:05 . 2009-09-24 06:00 124784 ----a-w- c:\windows\system32\drivers\avipbb.sys

2010-02-22 21:57 . 2009-09-24 02:36 84320 ----a-w- c:\documents and settings\Andrea\Local Settings\Application Data\GDIPFONTCACHEV1.DAT

2010-02-16 19:24 . 2009-09-24 06:00 60936 ----a-w- c:\windows\system32\drivers\avgntflt.sys

2010-02-16 06:36 . 2010-02-16 06:36 98304 ----a-w- c:\windows\system32\CmdLineExt.dll

2010-02-13 22:04 . 2009-09-24 02:35 119808 ----a-w- c:\program files\mozilla firefox\components\GoogleDesktopMozilla.dll

.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))

.

.

*Note* empty entries & legit default entries are not shown

REGEDIT4

[HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{201f27d4-3704-41d6-89c1-aa35e39143ed}]

2008-11-18 17:58 333192 ----a-w- c:\program files\AskBarDis\bar\bin\askBar.dll

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Toolbar]

"{3041d03e-fd4b-44e0-b742-2d9b88305f98}"= "c:\program files\AskBarDis\bar\bin\askBar.dll" [2008-11-18 333192]

[HKEY_CLASSES_ROOT\clsid\{3041d03e-fd4b-44e0-b742-2d9b88305f98}]

[HKEY_CLASSES_ROOT\TypeLib\{4b1c1e16-6b34-430e-b074-5928eca4c150}]

[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Toolbar\Webbrowser]

"{3041D03E-FD4B-44E0-B742-2D9B88305F98}"= "c:\program files\AskBarDis\bar\bin\askBar.dll" [2008-11-18 333192]

[HKEY_CLASSES_ROOT\clsid\{3041d03e-fd4b-44e0-b742-2d9b88305f98}]

[HKEY_CLASSES_ROOT\TypeLib\{4b1c1e16-6b34-430e-b074-5928eca4c150}]

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]

"Google Update"="c:\documents and settings\Andrea\Local Settings\Application Data\Google\Update\GoogleUpdate.exe" [2009-09-28 133104]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]

"GEST"="m

Link to post
Share on other sites

Good work! :)

Last steps:

Step 1:

* Go to start > run and copy and paste next command in the field:

ComboFix /uninstall

Make sure there's a space between Combofix and /

Then hit enter.

This will uninstall Combofix, delete its related folders and files, reset your clock settings, hide file extensions, hide the system/hidden files and resets System Restore again.

Step 2:

Please manually delete DDS, RootRepeal and GMER.

Step 3:

Some malware preventions:

http://miekiemoes.blogspot.com/2008/02/how...nt-malware.html

Safe surfing! :)

Link to post
Share on other sites

Guest
This topic is now closed to further replies.
  • Recently Browsing   0 members

    • No registered users viewing this page.
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.