Jump to content

Recommended Posts

My computer has a persistent infection that MB's Anti-Malware and Avira have not been able to find. Anti-malware is continually blocking access to "potentially malicious websites", even when the browser is not running. I am including detailed information (A-M log file, ark.txt, DDS.txt and attach.txt) in the hopes that someone can help. Many thanks!

The most recent Malwarebytes' Anti-Malware log file:

03:23:56 (null) MESSAGE Protection started successfully

03:24:17 Owner MESSAGE IP Protection started successfully

03:26:12 Owner IP-BLOCK 91.212.226.67

03:26:15 Owner IP-BLOCK 91.212.226.67

03:26:21 Owner IP-BLOCK 91.212.226.67

03:31:11 Owner IP-BLOCK 85.12.46.159

03:31:14 Owner IP-BLOCK 85.12.46.159

03:31:20 Owner IP-BLOCK 85.12.46.159

03:31:32 Owner IP-BLOCK 85.12.46.158

03:31:35 Owner IP-BLOCK 85.12.46.158

03:31:41 Owner IP-BLOCK 85.12.46.158

03:31:54 Owner IP-BLOCK 91.212.226.178

03:31:57 Owner IP-BLOCK 91.212.226.178

03:32:03 Owner IP-BLOCK 91.212.226.178

03:32:15 Owner IP-BLOCK 91.212.226.130

03:32:18 Owner IP-BLOCK 91.212.226.130

03:32:24 Owner IP-BLOCK 91.212.226.130

03:32:36 Owner IP-BLOCK 85.12.46.159

03:32:39 Owner IP-BLOCK 85.12.46.159

03:32:45 Owner IP-BLOCK 85.12.46.159

03:33:10 Owner IP-BLOCK 94.228.209.200

03:33:13 Owner IP-BLOCK 94.228.209.200

03:33:19 Owner IP-BLOCK 94.228.209.200

03:34:10 Owner IP-BLOCK 94.228.209.200

03:34:13 Owner IP-BLOCK 94.228.209.200

03:34:19 Owner IP-BLOCK 94.228.209.200

03:36:33 Owner IP-BLOCK 91.212.226.59

03:36:36 Owner IP-BLOCK 91.212.226.59

03:36:42 Owner IP-BLOCK 91.212.226.59

03:41:31 Owner IP-BLOCK 94.228.209.200

03:41:34 Owner IP-BLOCK 94.228.209.200

03:41:40 Owner IP-BLOCK 94.228.209.200

03:46:54 Owner IP-BLOCK 195.170.178.55

03:46:57 Owner IP-BLOCK 195.170.178.55

03:47:03 Owner IP-BLOCK 195.170.178.55

03:57:15 Owner IP-BLOCK 91.212.226.59

03:57:19 Owner IP-BLOCK 91.212.226.59

03:57:25 Owner IP-BLOCK 91.212.226.59

03:57:52 Owner IP-BLOCK 94.228.209.200

03:57:55 Owner IP-BLOCK 94.228.209.200

03:58:01 Owner IP-BLOCK 94.228.209.200

04:09:13 Owner IP-BLOCK 94.228.209.200

04:09:16 Owner IP-BLOCK 94.228.209.200

04:09:22 Owner IP-BLOCK 94.228.209.200

04:30:34 Owner IP-BLOCK 94.228.209.200

04:30:37 Owner IP-BLOCK 94.228.209.200

04:30:43 Owner IP-BLOCK 94.228.209.200

04:47:55 Owner IP-BLOCK 94.228.209.200

04:47:58 Owner IP-BLOCK 94.228.209.200

04:48:04 Owner IP-BLOCK 94.228.209.200

05:01:16 Owner IP-BLOCK 94.228.209.200

05:01:19 Owner IP-BLOCK 94.228.209.200

05:01:25 Owner IP-BLOCK 94.228.209.200

05:14:37 Owner IP-BLOCK 94.228.209.200

05:14:40 Owner IP-BLOCK 94.228.209.200

05:14:46 Owner IP-BLOCK 94.228.209.200

05:27:58 Owner IP-BLOCK 94.228.209.200

05:28:01 Owner IP-BLOCK 94.228.209.200

05:28:07 Owner IP-BLOCK 94.228.209.200

05:48:19 Owner IP-BLOCK 94.228.209.200

05:48:22 Owner IP-BLOCK 94.228.209.200

05:48:28 Owner IP-BLOCK 94.228.209.200

06:18:40 Owner IP-BLOCK 94.228.209.200

06:18:43 Owner IP-BLOCK 94.228.209.200

06:18:50 Owner IP-BLOCK 94.228.209.200

06:49:02 Owner IP-BLOCK 94.228.209.200

06:49:05 Owner IP-BLOCK 94.228.209.200

06:49:11 Owner IP-BLOCK 94.228.209.200

07:06:23 Owner IP-BLOCK 94.228.209.200

07:06:26 Owner IP-BLOCK 94.228.209.200

07:06:32 Owner IP-BLOCK 94.228.209.200

07:30:45 Owner IP-BLOCK 94.228.209.200

07:30:48 Owner IP-BLOCK 94.228.209.200

07:30:54 Owner IP-BLOCK 94.228.209.200

07:52:06 Owner IP-BLOCK 94.228.209.200

07:52:09 Owner IP-BLOCK 94.228.209.200

07:52:15 Owner IP-BLOCK 94.228.209.200

08:08:16 Owner IP-BLOCK 91.212.226.67

08:08:19 Owner IP-BLOCK 91.212.226.67

08:08:25 Owner IP-BLOCK 91.212.226.67

08:18:37 Owner IP-BLOCK 91.212.226.59

08:18:40 Owner IP-BLOCK 91.212.226.59

08:18:46 Owner IP-BLOCK 91.212.226.59

08:26:27 Owner IP-BLOCK 94.228.209.200

08:26:30 Owner IP-BLOCK 94.228.209.200

08:26:36 Owner IP-BLOCK 94.228.209.200

08:28:59 Owner IP-BLOCK 195.170.178.55

08:29:02 Owner IP-BLOCK 195.170.178.55

08:29:08 Owner IP-BLOCK 195.170.178.55

08:39:21 Owner IP-BLOCK 91.212.226.59

08:39:24 Owner IP-BLOCK 91.212.226.59

08:39:30 Owner IP-BLOCK 91.212.226.59

08:52:48 Owner IP-BLOCK 94.228.209.200

08:52:52 Owner IP-BLOCK 94.228.209.200

08:52:58 Owner IP-BLOCK 94.228.209.200

09:18:10 Owner IP-BLOCK 94.228.209.200

09:18:13 Owner IP-BLOCK 94.228.209.200

09:18:19 Owner IP-BLOCK 94.228.209.200

09:42:31 Owner IP-BLOCK 94.228.209.200

09:42:34 Owner IP-BLOCK 94.228.209.200

09:42:40 Owner IP-BLOCK 94.228.209.200

10:11:52 Owner IP-BLOCK 94.228.209.200

10:11:55 Owner IP-BLOCK 94.228.209.200

10:12:01 Owner IP-BLOCK 94.228.209.200

ark.txt

GMER 1.0.15.15281 - http://www.gmer.net

Rootkit scan 2010-06-05 10:10:58

Windows 5.1.2600 Service Pack 3

Running: rloyeji3.exe; Driver: C:\DOCUME~1\Owner\LOCALS~1\Temp\kftciaog.sys

---- System - GMER 1.0.15 ----

SSDT B98CB2BE ZwCreateKey

SSDT B98CB2B4 ZwCreateThread

SSDT B98CB2C3 ZwDeleteKey

SSDT B98CB2CD ZwDeleteValueKey

SSDT B98CB2D2 ZwLoadKey

SSDT B98CB2A0 ZwOpenProcess

SSDT B98CB2A5 ZwOpenThread

SSDT B98CB2DC ZwReplaceKey

SSDT B98CB2D7 ZwRestoreKey

SSDT B98CB2C8 ZwSetValueKey

---- User code sections - GMER 1.0.15 ----

.text C:\Program Files\Internet Explorer\iexplore.exe[116] ntdll.dll!NtProtectVirtualMemory 7C90D6EE 5 Bytes JMP 00A3000A

.text C:\Program Files\Internet Explorer\iexplore.exe[116] ntdll.dll!NtWriteVirtualMemory 7C90DFAE 5 Bytes JMP 00D5000A

.text C:\Program Files\Internet Explorer\iexplore.exe[116] ntdll.dll!KiUserExceptionDispatcher 7C90E47C 5 Bytes JMP 00A2000C

.text C:\Program Files\Internet Explorer\iexplore.exe[116] USER32.dll!DialogBoxParamW 7E4247AB 5 Bytes JMP 3E215505 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)

.text C:\Program Files\Internet Explorer\iexplore.exe[116] USER32.dll!CreateWindowExW 7E42D0A3 5 Bytes JMP 3E2EDAC4 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)

.text C:\Program Files\Internet Explorer\iexplore.exe[116] USER32.dll!DialogBoxIndirectParamW 7E432072 5 Bytes JMP 3E3E473F C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)

.text C:\Program Files\Internet Explorer\iexplore.exe[116] USER32.dll!MessageBoxIndirectA 7E43A082 5 Bytes JMP 3E3E4671 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)

.text C:\Program Files\Internet Explorer\iexplore.exe[116] USER32.dll!DialogBoxParamA 7E43B144 5 Bytes JMP 3E3E46DC C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)

.text C:\Program Files\Internet Explorer\iexplore.exe[116] USER32.dll!MessageBoxExW 7E450838 5 Bytes JMP 3E3E4542 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)

.text C:\Program Files\Internet Explorer\iexplore.exe[116] USER32.dll!MessageBoxExA 7E45085C 5 Bytes JMP 3E3E45A4 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)

.text C:\Program Files\Internet Explorer\iexplore.exe[116] USER32.dll!DialogBoxIndirectParamA 7E456D7D 5 Bytes JMP 3E3E47A2 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)

.text C:\Program Files\Internet Explorer\iexplore.exe[116] USER32.dll!MessageBoxIndirectW 7E4664D5 5 Bytes JMP 3E3E4606 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)

.text C:\WINDOWS\Explorer.EXE[120] ntdll.dll!NtProtectVirtualMemory 7C90D6EE 5 Bytes JMP 00B7000A

.text C:\WINDOWS\Explorer.EXE[120] ntdll.dll!NtWriteVirtualMemory 7C90DFAE 5 Bytes JMP 00BD000A

.text C:\WINDOWS\Explorer.EXE[120] ntdll.dll!KiUserExceptionDispatcher 7C90E47C 5 Bytes JMP 00B6000C

.text C:\WINDOWS\System32\svchost.exe[1044] ntdll.dll!NtProtectVirtualMemory 7C90D6EE 5 Bytes JMP 0092000A

.text C:\WINDOWS\System32\svchost.exe[1044] ntdll.dll!NtWriteVirtualMemory 7C90DFAE 5 Bytes JMP 0093000A

.text C:\WINDOWS\System32\svchost.exe[1044] ntdll.dll!KiUserExceptionDispatcher 7C90E47C 5 Bytes JMP 0091000C

.text C:\WINDOWS\System32\svchost.exe[1044] USER32.dll!GetCursorPos 7E42974E 5 Bytes JMP 017F000A

.text C:\WINDOWS\System32\svchost.exe[1044] ole32.dll!CoCreateInstance 7750057E 5 Bytes JMP 00E1000A

.text C:\Program Files\Internet Explorer\iexplore.exe[2876] ntdll.dll!NtProtectVirtualMemory 7C90D6EE 5 Bytes JMP 00A3000A

.text C:\Program Files\Internet Explorer\iexplore.exe[2876] ntdll.dll!NtWriteVirtualMemory 7C90DFAE 5 Bytes JMP 00D5000A

.text C:\Program Files\Internet Explorer\iexplore.exe[2876] ntdll.dll!KiUserExceptionDispatcher 7C90E47C 5 Bytes JMP 00A2000C

.text C:\Program Files\Internet Explorer\iexplore.exe[2876] USER32.dll!DialogBoxParamW 7E4247AB 5 Bytes JMP 3E215505 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)

.text C:\Program Files\Internet Explorer\iexplore.exe[2876] USER32.dll!SetWindowsHookExW 7E42820F 5 Bytes JMP 3E2E9A75 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)

.text C:\Program Files\Internet Explorer\iexplore.exe[2876] USER32.dll!CallNextHookEx 7E42B3C6 5 Bytes JMP 3E2DD101 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)

.text C:\Program Files\Internet Explorer\iexplore.exe[2876] USER32.dll!CreateWindowExW 7E42D0A3 5 Bytes JMP 3E2EDAC4 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)

.text C:\Program Files\Internet Explorer\iexplore.exe[2876] USER32.dll!UnhookWindowsHookEx 7E42D5F3 5 Bytes JMP 3E25466E C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)

.text C:\Program Files\Internet Explorer\iexplore.exe[2876] USER32.dll!DialogBoxIndirectParamW 7E432072 5 Bytes JMP 3E3E473F C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)

.text C:\Program Files\Internet Explorer\iexplore.exe[2876] USER32.dll!MessageBoxIndirectA 7E43A082 5 Bytes JMP 3E3E4671 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)

.text C:\Program Files\Internet Explorer\iexplore.exe[2876] USER32.dll!DialogBoxParamA 7E43B144 5 Bytes JMP 3E3E46DC C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)

.text C:\Program Files\Internet Explorer\iexplore.exe[2876] USER32.dll!MessageBoxExW 7E450838 5 Bytes JMP 3E3E4542 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)

.text C:\Program Files\Internet Explorer\iexplore.exe[2876] USER32.dll!MessageBoxExA 7E45085C 5 Bytes JMP 3E3E45A4 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)

.text C:\Program Files\Internet Explorer\iexplore.exe[2876] USER32.dll!DialogBoxIndirectParamA 7E456D7D 5 Bytes JMP 3E3E47A2 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)

.text C:\Program Files\Internet Explorer\iexplore.exe[2876] USER32.dll!MessageBoxIndirectW 7E4664D5 5 Bytes JMP 3E3E4606 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)

.text C:\Program Files\Internet Explorer\iexplore.exe[2876] ole32.dll!CoCreateInstance 7750057E 5 Bytes JMP 3E2EDB20 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)

.text C:\Program Files\Internet Explorer\iexplore.exe[2876] ole32.dll!OleLoadFromStream 77529C85 5 Bytes JMP 3E3E4AA7 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)

---- EOF - GMER 1.0.15 ----

DDS.txt

DDS (Ver_10-03-17.01) - NTFSx86

Run by Owner at 3:33:22.75 on Sat 06/05/2010

Internet Explorer: 8.0.6001.18702

Microsoft Windows XP Home Edition 5.1.2600.3.1252.1.1033.18.1534.970 [GMT -4:00]

AV: AntiVir Desktop *On-access scanning enabled* (Updated) {AD166499-45F9-482A-A743-FDD3350758C7}

============== Running Processes ===============

C:\WINDOWS\system32\svchost -k DcomLaunch

svchost.exe

C:\WINDOWS\System32\svchost.exe -k netsvcs

svchost.exe

svchost.exe

C:\WINDOWS\system32\spoolsv.exe

C:\Program Files\Avira\AntiVir Desktop\sched.exe

svchost.exe

C:\WINDOWS\Explorer.EXE

C:\Program Files\Avira\AntiVir Desktop\avguard.exe

C:\Program Files\Java\jre6\bin\jqs.exe

C:\Program Files\Malwarebytes' Anti-Malware\mbamservice.exe

C:\Program Files\Avira\AntiVir Desktop\avshadow.exe

C:\Program Files\Network Associates\Common Framework\UdaterUI.exe

C:\Program Files\Common Files\Real\Update_OB\realsched.exe

C:\Program Files\Malwarebytes' Anti-Malware\mbamgui.exe

C:\Program Files\Avira\AntiVir Desktop\avgnt.exe

C:\Program Files\Logitech\Desktop Messenger\8876480\Program\LogitechDesktopMessenger.exe

C:\WINDOWS\system32\ctfmon.exe

C:\Program Files\Network Associates\Common Framework\McTray.exe

C:\Program Files\OpenOffice.org 3\program\soffice.exe

C:\Program Files\Logitech\MouseWare\system\em_exec.exe

C:\Program Files\Network Associates\Common Framework\FrameworkService.exe

C:\Program Files\OpenOffice.org 3\program\soffice.bin

C:\Program Files\Internet Explorer\iexplore.exe

C:\Program Files\Internet Explorer\iexplore.exe

C:\Program Files\Internet Explorer\iexplore.exe

C:\Documents and Settings\Owner\Desktop\dds.scr

============== Pseudo HJT Report ===============

uStart Page = about:blank

uSearch Page = hxxp://www.google.com

uSearch Bar = hxxp://www.google.com/ie

uSearchMigratedDefaultURL = hxxp://www.google.com/search?q={searchTerms}&sourceid=ie7&rls=com.microsoft:en-US&ie=utf8&oe=utf8

uInternet Settings,ProxyOverride = localhost

uSearchAssistant = hxxp://www.google.com/ie

uSearchURL,(Default) = hxxp://www.google.com/search?q=%s

mSearchAssistant = hxxp://www.google.com/ie

BHO: Adobe PDF Reader Link Helper: {06849e9f-c8d7-4d59-b87d-784b7d6be0b3} - c:\program files\common files\adobe\acrobat\activex\AcroIEHelper.dll

BHO: Java Plug-In 2 SSV Helper: {dbc80044-a445-435b-bc74-9c25c1c588a9} - c:\program files\java\jre6\bin\jp2ssv.dll

BHO: JQSIEStartDetectorImpl Class: {e7e6f031-17ce-4c07-bc86-eabfe594f69c} - c:\program files\java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll

TB: Yahoo! Toolbar: {ef99bd32-c1fb-11d2-892f-0090271d4f88} -

EB: {32683183-48a0-441b-a342-7c2a440a9478} - No File

uRun: [LDM] c:\program files\logitech\desktop messenger\8876480\program\LogitechDesktopMessenger.exe

uRun: [ctfmon.exe] c:\windows\system32\ctfmon.exe

mRun: [QuickTime Task] "c:\program files\quicktime\qttask.exe" -atboottime

mRun: [Logitech Utility] LOGI_MWX.EXE

mRun: [McAfeeUpdaterUI] "c:\program files\network associates\common framework\UdaterUI.exe" /StartedFromRunKey

mRun: [WinampAgent] c:\program files\winamp\winampa.exe

mRun: [Adobe Reader Speed Launcher] "c:\program files\adobe\reader 8.0\reader\Reader_sl.exe"

mRun: [TkBellExe] "c:\program files\common files\real\update_ob\realsched.exe" -osboot

mRun: [sunJavaUpdateSched] "c:\program files\common files\java\java update\jusched.exe"

mRun: [Malwarebytes' Anti-Malware] "c:\program files\malwarebytes' anti-malware\mbamgui.exe" /starttray

mRun: [avgnt] "c:\program files\avira\antivir desktop\avgnt.exe" /min

StartupFolder: c:\docume~1\owner\startm~1\programs\startup\openof~1.lnk - c:\program files\openoffice.org 3\program\quickstart.exe

IE: {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe

IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe

Trusted Zone: com\swiftview

Trusted Zone: mris.com

Trusted Zone: ss3.swiftsend.com\loandocs

Trusted Zone: swiftsend.com\docs

Trusted Zone: swiftsend.com\loandocs

Trusted Zone: swiftsend2.com\docs

Trusted Zone: swiftsend2.com\loandocs

Trusted Zone: swiftview.com\www

DPF: {166B1BCA-3F9C-11CF-8075-444553540000} - hxxp://download.macromedia.com/pub/shockwave/cabs/director/sw.cab

DPF: {17492023-C23A-453E-A040-C7C580BBF700} - hxxp://go.microsoft.com/fwlink/?linkid=39204

DPF: {5ED80217-570B-4DA9-BF44-BE107C0EC166} - hxxp://cdn.scan.safety.live.com/resource/download/scanner/wlscbase8460.cab

DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_18-windows-i586.cab

DPF: {C7DB51B4-BCF7-4923-8874-7F1A0DC92277} - hxxp://office.microsoft.com/officeupdate/content/opuc4.cab

DPF: {CAFEEFAC-0014-0002-0000-ABCDEFFEDCBA} - hxxp://java.sun.com/products/plugin/autodl/jinstall-142-windows-i586.cab

DPF: {CAFEEFAC-0016-0000-0018-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_18-windows-i586.cab

DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_18-windows-i586.cab

DPF: {CF40ACC5-E1BB-4AFF-AC72-04C2F616BCA7} - hxxp://www.adobe.com/products/acrobat/nos/gp.cab

DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} - hxxp://fpdownload.macromedia.com/get/flashplayer/current/swflash.cab

TCP: interfaces = 10.140.10.41,10.140.10.40

Handler: bwfile-8876480 - {9462A756-7B47-47BC-8C80-C34B9B80B32B} - c:\program files\logitech\desktop messenger\8876480\program\GAPlugProtocol-8876480.dll

Handler: cdo - {CD00020A-8B95-11D1-82DB-00C04FB1625D} - c:\program files\common files\microsoft shared\web folders\PKMCDO.DLL

Notify: igfxcui - igfxsrvc.dll

SSODL: WPDShServiceObj - {AAA288BA-9A4C-45B0-95D7-94D524869DB5} - c:\windows\system32\WPDShServiceObj.dll

Hosts: 91.206.201.8 winsecurepro.com

Hosts: 91.206.201.8 www.winsecurepro.com

============= SERVICES / DRIVERS ===============

R1 avgio;avgio;c:\program files\avira\antivir desktop\avgio.sys [2010-6-4 11608]

R2 AntiVirSchedulerService;Avira AntiVir Scheduler;c:\program files\avira\antivir desktop\sched.exe [2010-6-4 135336]

R2 AntiVirService;Avira AntiVir Guard;c:\program files\avira\antivir desktop\avguard.exe [2010-6-4 267432]

R2 avgntflt;avgntflt;c:\windows\system32\drivers\avgntflt.sys [2010-6-4 60936]

R2 MBAMService;MBAMService;c:\program files\malwarebytes' anti-malware\mbamservice.exe [2010-1-12 303952]

R2 McAfeeFramework;McAfee Framework Service;c:\program files\network associates\common framework\FrameworkService.exe [2005-6-15 103744]

R3 MBAMProtector;MBAMProtector;c:\windows\system32\drivers\mbam.sys [2010-1-12 20824]

=============== Created Last 30 ================

2010-06-05 07:28:10 0 ----a-w- c:\documents and settings\owner\defogger_reenable

2010-06-04 09:15:43 0 d-----w- c:\docume~1\owner\applic~1\Avira

2010-06-04 09:08:37 60936 ----a-w- c:\windows\system32\drivers\avgntflt.sys

2010-06-04 09:08:36 0 d-----w- c:\program files\Avira

2010-06-04 09:08:36 0 d-----w- c:\docume~1\alluse~1\applic~1\Avira

2010-06-02 11:19:30 0 d-----w- c:\windows\system32\wbem\Repository

2010-06-02 02:42:56 711168 ----a-w- c:\windows\isRS-000.tmp

2010-05-21 23:15:38 0 d-----w- c:\docume~1\owner\applic~1\OpenOffice.org

2010-05-20 22:36:57 0 d-----w- c:\program files\JRE

2010-05-20 22:36:48 0 d-----w- c:\program files\OpenOffice.org 3

==================== Find3M ====================

2010-03-10 06:15:52 420352 ----a-w- c:\windows\system32\vbscript.dll

2008-08-19 19:57:31 32768 --sha-w- c:\windows\system32\config\systemprofile\local settings\history\history.ie5\mshist012008081920080820\index.dat

============= FINISH: 3:35:55.85 ===============

Attach.zip

Link to post
Share on other sites

Hello realgm! Welcome to MalwareBytes' Anti-Malware Forums!

My name is Borislav and I will be glad to help you solve your problems with malware. Before we begin, please note the following:

  • The process of cleaning your system may take some time, so please be patient.
  • Stay with the topic until I tell you that your system is clean. Missing symptoms does not mean that everything is okay.
  • Instructions that I give are for your system only!
  • If you don't know or can't understand something please ask.
  • Do not install or uninstall any software or hardware, while work on.

Step 1

Please, uninstall the following applications:

  1. Adobe Acrobat and Reader 8.1.2 Security Update 1 (KB403742)
  2. Adobe Reader 8.1.2
  3. Adobe Reader 8.1.2 Security Update 1 (KB403742)

You can read, how to this here:

Step 2

Please go into the Control Panel, Add/Remove and for now remove ALL versions of JAVA

Then run this tool to help cleanup any left over Java

Your Java is out of date. Older versions have vulnerabilities that malware can use to infect your system.

Please download JavaRa and unzip it to your desktop.

***Please close any instances of Internet Explorer (or other web browser) before continuing!***

  • Double-click on JavaRa.exe to start the program.
  • From the drop-down menu, choose English and click on Select.
  • JavaRa will open; click on Remove Older Versions to remove the older versions of Java installed on your computer.
  • Click Yes when prompted. When JavaRa is done, a notice will appear that a logfile has been produced. Click OK.
  • A logfile will pop up. Please save it to a convenient location and post it back when you reply
    Then look for the following Java folders and if found delete them.
    C:\Program Files\Java
    C:\Program Files\Common Files\Java
    C:\Windows\Sun
    C:\Documents and Settings\All Users\Application Data\Java
    C:\Documents and Settings\All Users\Application Data\Sun\Java
    C:\Documents and Settings\username\Application Data\Java
    C:\Documents and Settings\username\Application Data\Sun\Java

Step 3

I also see you have Viewpoint installed...

Viewpoint Manager is considered as foistware instead of malware since it is installed without users approval but doesn't spy or do anything "bad". This will change from what we know in 2006 read this article: http://www.clickz.com/news/article.php/3561546

I suggest you remove the program now. Go to Start > Settings > Control Panel > Add/Remove Programs and remove the following programs if present.


  • Viewpoint
  • Viewpoint Manager
  • Viewpoint Media Player

Step 4

  • Launch Malwarebytes' Anti-Malware
  • Go to "Update" tab and select "Check for Updates". If an update is found, it will download and install the latest version.
  • Go to "Scanner" tab and select "Perform Quick Scan", then click Scan.
  • The scan may take some time to finish,so please be patient.
  • When the scan is complete, click OK, then Show Results to view the results.
  • Make sure that everything is checked, and click Remove Selected.
  • When disinfection is completed, a log will open in Notepad and you may be prompted to Restart.(See Extra Note)
  • The log is automatically saved by MBAM and can be viewed by clicking the Logs tab in MBAM.
  • Copy&Paste the entire report in your next reply.

Extra Note:

If MBAM encounters a file that is difficult to remove,you will be presented with 1 of 2 prompts,click OK to either and let MBAM proceed with the disinfection process,if asked to restart the computer,please do so immediatly.

In your next reply, please include these log(s) in this sequence:

  1. JavaRa log
  2. MalwareBytes' Anti-Malware log
  3. a new fresh DDS log only

Link to post
Share on other sites

Here are the logs you asked me to post, Borislav. Thank you for your help!

JavaRa 1.15 Removal Log.

Report follows after line.

------------------------------------

The JavaRa removal process was started on Sat Jun 05 15:08:08 2010

Found and removed: SOFTWARE\Classes\JavaPlugin.142

------------------------------------

Finished reporting.

MBAM log

03:23:56 (null) MESSAGE Protection started successfully

03:24:17 Owner MESSAGE IP Protection started successfully

03:26:12 Owner IP-BLOCK 91.212.226.67

03:26:15 Owner IP-BLOCK 91.212.226.67

03:26:21 Owner IP-BLOCK 91.212.226.67

03:31:11 Owner IP-BLOCK 85.12.46.159

03:31:14 Owner IP-BLOCK 85.12.46.159

03:31:20 Owner IP-BLOCK 85.12.46.159

03:31:32 Owner IP-BLOCK 85.12.46.158

03:31:35 Owner IP-BLOCK 85.12.46.158

03:31:41 Owner IP-BLOCK 85.12.46.158

03:31:54 Owner IP-BLOCK 91.212.226.178

03:31:57 Owner IP-BLOCK 91.212.226.178

03:32:03 Owner IP-BLOCK 91.212.226.178

03:32:15 Owner IP-BLOCK 91.212.226.130

03:32:18 Owner IP-BLOCK 91.212.226.130

03:32:24 Owner IP-BLOCK 91.212.226.130

03:32:36 Owner IP-BLOCK 85.12.46.159

03:32:39 Owner IP-BLOCK 85.12.46.159

03:32:45 Owner IP-BLOCK 85.12.46.159

03:33:10 Owner IP-BLOCK 94.228.209.200

03:33:13 Owner IP-BLOCK 94.228.209.200

03:33:19 Owner IP-BLOCK 94.228.209.200

03:34:10 Owner IP-BLOCK 94.228.209.200

03:34:13 Owner IP-BLOCK 94.228.209.200

03:34:19 Owner IP-BLOCK 94.228.209.200

03:36:33 Owner IP-BLOCK 91.212.226.59

03:36:36 Owner IP-BLOCK 91.212.226.59

03:36:42 Owner IP-BLOCK 91.212.226.59

03:41:31 Owner IP-BLOCK 94.228.209.200

03:41:34 Owner IP-BLOCK 94.228.209.200

03:41:40 Owner IP-BLOCK 94.228.209.200

03:46:54 Owner IP-BLOCK 195.170.178.55

03:46:57 Owner IP-BLOCK 195.170.178.55

03:47:03 Owner IP-BLOCK 195.170.178.55

03:57:15 Owner IP-BLOCK 91.212.226.59

03:57:19 Owner IP-BLOCK 91.212.226.59

03:57:25 Owner IP-BLOCK 91.212.226.59

03:57:52 Owner IP-BLOCK 94.228.209.200

03:57:55 Owner IP-BLOCK 94.228.209.200

03:58:01 Owner IP-BLOCK 94.228.209.200

04:09:13 Owner IP-BLOCK 94.228.209.200

04:09:16 Owner IP-BLOCK 94.228.209.200

04:09:22 Owner IP-BLOCK 94.228.209.200

04:30:34 Owner IP-BLOCK 94.228.209.200

04:30:37 Owner IP-BLOCK 94.228.209.200

04:30:43 Owner IP-BLOCK 94.228.209.200

04:47:55 Owner IP-BLOCK 94.228.209.200

04:47:58 Owner IP-BLOCK 94.228.209.200

04:48:04 Owner IP-BLOCK 94.228.209.200

05:01:16 Owner IP-BLOCK 94.228.209.200

05:01:19 Owner IP-BLOCK 94.228.209.200

05:01:25 Owner IP-BLOCK 94.228.209.200

05:14:37 Owner IP-BLOCK 94.228.209.200

05:14:40 Owner IP-BLOCK 94.228.209.200

05:14:46 Owner IP-BLOCK 94.228.209.200

05:27:58 Owner IP-BLOCK 94.228.209.200

05:28:01 Owner IP-BLOCK 94.228.209.200

05:28:07 Owner IP-BLOCK 94.228.209.200

05:48:19 Owner IP-BLOCK 94.228.209.200

05:48:22 Owner IP-BLOCK 94.228.209.200

05:48:28 Owner IP-BLOCK 94.228.209.200

06:18:40 Owner IP-BLOCK 94.228.209.200

06:18:43 Owner IP-BLOCK 94.228.209.200

06:18:50 Owner IP-BLOCK 94.228.209.200

06:49:02 Owner IP-BLOCK 94.228.209.200

06:49:05 Owner IP-BLOCK 94.228.209.200

06:49:11 Owner IP-BLOCK 94.228.209.200

07:06:23 Owner IP-BLOCK 94.228.209.200

07:06:26 Owner IP-BLOCK 94.228.209.200

07:06:32 Owner IP-BLOCK 94.228.209.200

07:30:45 Owner IP-BLOCK 94.228.209.200

07:30:48 Owner IP-BLOCK 94.228.209.200

07:30:54 Owner IP-BLOCK 94.228.209.200

07:52:06 Owner IP-BLOCK 94.228.209.200

07:52:09 Owner IP-BLOCK 94.228.209.200

07:52:15 Owner IP-BLOCK 94.228.209.200

08:08:16 Owner IP-BLOCK 91.212.226.67

08:08:19 Owner IP-BLOCK 91.212.226.67

08:08:25 Owner IP-BLOCK 91.212.226.67

08:18:37 Owner IP-BLOCK 91.212.226.59

08:18:40 Owner IP-BLOCK 91.212.226.59

08:18:46 Owner IP-BLOCK 91.212.226.59

08:26:27 Owner IP-BLOCK 94.228.209.200

08:26:30 Owner IP-BLOCK 94.228.209.200

08:26:36 Owner IP-BLOCK 94.228.209.200

08:28:59 Owner IP-BLOCK 195.170.178.55

08:29:02 Owner IP-BLOCK 195.170.178.55

08:29:08 Owner IP-BLOCK 195.170.178.55

08:39:21 Owner IP-BLOCK 91.212.226.59

08:39:24 Owner IP-BLOCK 91.212.226.59

08:39:30 Owner IP-BLOCK 91.212.226.59

08:52:48 Owner IP-BLOCK 94.228.209.200

08:52:52 Owner IP-BLOCK 94.228.209.200

08:52:58 Owner IP-BLOCK 94.228.209.200

09:18:10 Owner IP-BLOCK 94.228.209.200

09:18:13 Owner IP-BLOCK 94.228.209.200

09:18:19 Owner IP-BLOCK 94.228.209.200

09:42:31 Owner IP-BLOCK 94.228.209.200

09:42:34 Owner IP-BLOCK 94.228.209.200

09:42:40 Owner IP-BLOCK 94.228.209.200

10:11:52 Owner IP-BLOCK 94.228.209.200

10:11:55 Owner IP-BLOCK 94.228.209.200

10:12:01 Owner IP-BLOCK 94.228.209.200

10:35:13 Owner IP-BLOCK 94.228.209.200

10:35:16 Owner IP-BLOCK 94.228.209.200

10:35:22 Owner IP-BLOCK 94.228.209.200

10:48:34 Owner IP-BLOCK 94.228.209.200

10:48:37 Owner IP-BLOCK 94.228.209.200

10:48:43 Owner IP-BLOCK 94.228.209.200

10:49:52 Owner IP-BLOCK 91.212.226.67

10:49:55 Owner IP-BLOCK 91.212.226.67

10:50:01 Owner IP-BLOCK 91.212.226.67

11:00:13 Owner IP-BLOCK 91.212.226.59

11:00:16 Owner IP-BLOCK 91.212.226.59

11:00:22 Owner IP-BLOCK 91.212.226.59

11:10:34 Owner IP-BLOCK 195.170.178.55

11:10:37 Owner IP-BLOCK 195.170.178.55

11:10:43 Owner IP-BLOCK 195.170.178.55

11:14:55 Owner IP-BLOCK 94.228.209.200

11:14:58 Owner IP-BLOCK 94.228.209.200

11:15:04 Owner IP-BLOCK 94.228.209.200

11:20:55 Owner IP-BLOCK 91.212.226.59

11:20:58 Owner IP-BLOCK 91.212.226.59

11:21:04 Owner IP-BLOCK 91.212.226.59

11:41:16 Owner IP-BLOCK 94.228.209.200

11:41:19 Owner IP-BLOCK 94.228.209.200

11:41:25 Owner IP-BLOCK 94.228.209.200

11:55:37 Owner IP-BLOCK 94.228.209.200

11:55:40 Owner IP-BLOCK 94.228.209.200

11:55:46 Owner IP-BLOCK 94.228.209.200

12:25:58 Owner IP-BLOCK 94.228.209.200

12:26:01 Owner IP-BLOCK 94.228.209.200

12:26:07 Owner IP-BLOCK 94.228.209.200

12:32:19 Owner IP-BLOCK 94.228.209.200

12:32:22 Owner IP-BLOCK 94.228.209.200

12:32:28 Owner IP-BLOCK 94.228.209.200

13:02:40 Owner IP-BLOCK 94.228.209.200

13:02:43 Owner IP-BLOCK 94.228.209.200

13:02:49 Owner IP-BLOCK 94.228.209.200

13:22:01 Owner IP-BLOCK 94.228.209.200

13:22:04 Owner IP-BLOCK 94.228.209.200

13:22:10 Owner IP-BLOCK 94.228.209.200

13:29:22 Owner IP-BLOCK 94.228.209.200

13:29:25 Owner IP-BLOCK 94.228.209.200

13:29:31 Owner IP-BLOCK 94.228.209.200

13:36:29 Owner IP-BLOCK 91.212.226.67

13:36:32 Owner IP-BLOCK 91.212.226.67

13:36:38 Owner IP-BLOCK 91.212.226.67

13:39:43 Owner IP-BLOCK 94.228.209.200

13:39:46 Owner IP-BLOCK 94.228.209.200

13:39:52 Owner IP-BLOCK 94.228.209.200

13:46:50 Owner IP-BLOCK 91.212.226.59

13:46:53 Owner IP-BLOCK 91.212.226.59

13:46:59 Owner IP-BLOCK 91.212.226.59

13:51:04 Owner IP-BLOCK 94.228.209.200

13:51:07 Owner IP-BLOCK 94.228.209.200

13:51:13 Owner IP-BLOCK 94.228.209.200

13:57:11 Owner IP-BLOCK 195.170.178.55

13:57:14 Owner IP-BLOCK 195.170.178.55

13:57:20 Owner IP-BLOCK 195.170.178.55

14:07:32 Owner IP-BLOCK 91.212.226.59

14:07:35 Owner IP-BLOCK 91.212.226.59

14:07:41 Owner IP-BLOCK 91.212.226.59

14:09:25 Owner IP-BLOCK 94.228.209.200

14:09:28 Owner IP-BLOCK 94.228.209.200

14:09:34 Owner IP-BLOCK 94.228.209.200

14:38:46 Owner IP-BLOCK 94.228.209.200

14:38:49 Owner IP-BLOCK 94.228.209.200

14:38:55 Owner IP-BLOCK 94.228.209.200

15:00:44 (null) MESSAGE Protection started successfully

15:00:55 Owner MESSAGE IP Protection started successfully

15:02:09 Owner IP-BLOCK 85.12.46.159

15:02:12 Owner IP-BLOCK 85.12.46.159

15:02:18 Owner IP-BLOCK 85.12.46.159

15:02:30 Owner IP-BLOCK 85.12.46.158

15:02:33 Owner IP-BLOCK 85.12.46.158

15:02:39 Owner IP-BLOCK 85.12.46.158

15:02:51 Owner IP-BLOCK 91.212.226.178

15:02:54 Owner IP-BLOCK 91.212.226.178

15:03:00 Owner IP-BLOCK 91.212.226.178

15:03:12 Owner IP-BLOCK 91.212.226.130

15:03:15 Owner IP-BLOCK 91.212.226.130

15:03:21 Owner IP-BLOCK 91.212.226.130

15:03:33 Owner IP-BLOCK 85.12.46.159

15:03:36 Owner IP-BLOCK 85.12.46.159

15:03:42 Owner IP-BLOCK 85.12.46.159

15:09:55 Owner IP-BLOCK 94.228.209.200

15:09:58 Owner IP-BLOCK 94.228.209.200

15:10:04 Owner IP-BLOCK 94.228.209.200

15:10:55 Owner IP-BLOCK 94.228.209.200

15:10:58 Owner IP-BLOCK 94.228.209.200

15:11:04 Owner IP-BLOCK 94.228.209.200

15:16:12 Owner MESSAGE IP Protection stopped

15:16:54 Owner MESSAGE Database updated successfully

15:16:59 Owner MESSAGE IP Protection started successfully

15:25:16 Owner IP-BLOCK 94.228.209.200

15:25:19 Owner IP-BLOCK 94.228.209.200

15:25:25 Owner IP-BLOCK 94.228.209.200

15:45:37 Owner IP-BLOCK 94.228.209.200

15:45:40 Owner IP-BLOCK 94.228.209.200

15:45:46 Owner IP-BLOCK 94.228.209.200

16:02:58 Owner IP-BLOCK 94.228.209.200

16:03:01 Owner IP-BLOCK 94.228.209.200

16:03:07 Owner IP-BLOCK 94.228.209.200

fresh DDS log

DDS (Ver_10-03-17.01) - NTFSx86

Run by Owner at 16:05:19.42 on Sat 06/05/2010

Internet Explorer: 8.0.6001.18702

Microsoft Windows XP Home Edition 5.1.2600.3.1252.1.1033.18.1534.916 [GMT -4:00]

AV: AntiVir Desktop *On-access scanning enabled* (Updated) {AD166499-45F9-482A-A743-FDD3350758C7}

============== Running Processes ===============

C:\WINDOWS\system32\svchost -k DcomLaunch

svchost.exe

C:\WINDOWS\System32\svchost.exe -k netsvcs

svchost.exe

svchost.exe

C:\WINDOWS\system32\spoolsv.exe

C:\Program Files\Avira\AntiVir Desktop\sched.exe

svchost.exe

C:\Program Files\Avira\AntiVir Desktop\avguard.exe

C:\Program Files\Malwarebytes' Anti-Malware\mbamservice.exe

C:\Program Files\Network Associates\Common Framework\FrameworkService.exe

C:\Program Files\Avira\AntiVir Desktop\avshadow.exe

C:\WINDOWS\Explorer.EXE

C:\Program Files\Network Associates\Common Framework\UdaterUI.exe

C:\Program Files\Common Files\Real\Update_OB\realsched.exe

C:\Program Files\Malwarebytes' Anti-Malware\mbamgui.exe

C:\Program Files\Avira\AntiVir Desktop\avgnt.exe

C:\Program Files\Logitech\Desktop Messenger\8876480\Program\LogitechDesktopMessenger.exe

C:\WINDOWS\system32\ctfmon.exe

C:\Program Files\Network Associates\Common Framework\McTray.exe

C:\Program Files\OpenOffice.org 3\program\soffice.exe

C:\Program Files\Logitech\MouseWare\system\em_exec.exe

C:\Program Files\OpenOffice.org 3\program\soffice.bin

C:\Program Files\Internet Explorer\iexplore.exe

C:\Program Files\Internet Explorer\iexplore.exe

C:\Documents and Settings\Owner\Desktop\dds.scr

============== Pseudo HJT Report ===============

uStart Page = about:blank

uSearch Page = hxxp://www.google.com

uSearch Bar = hxxp://www.google.com/ie

uSearchMigratedDefaultURL = hxxp://www.google.com/search?q={searchTerms}&sourceid=ie7&rls=com.microsoft:en-US&ie=utf8&oe=utf8

uInternet Settings,ProxyOverride = localhost

uSearchAssistant = hxxp://www.google.com/ie

uSearchURL,(Default) = hxxp://www.google.com/search?q=%s

mSearchAssistant = hxxp://www.google.com/ie

TB: Yahoo! Toolbar: {ef99bd32-c1fb-11d2-892f-0090271d4f88} -

EB: {32683183-48a0-441b-a342-7c2a440a9478} - No File

uRun: [LDM] c:\program files\logitech\desktop messenger\8876480\program\LogitechDesktopMessenger.exe

uRun: [ctfmon.exe] c:\windows\system32\ctfmon.exe

mRun: [QuickTime Task] "c:\program files\quicktime\qttask.exe" -atboottime

mRun: [Logitech Utility] LOGI_MWX.EXE

mRun: [McAfeeUpdaterUI] "c:\program files\network associates\common framework\UdaterUI.exe" /StartedFromRunKey

mRun: [WinampAgent] c:\program files\winamp\winampa.exe

mRun: [TkBellExe] "c:\program files\common files\real\update_ob\realsched.exe" -osboot

mRun: [Malwarebytes' Anti-Malware] "c:\program files\malwarebytes' anti-malware\mbamgui.exe" /starttray

mRun: [avgnt] "c:\program files\avira\antivir desktop\avgnt.exe" /min

StartupFolder: c:\docume~1\owner\startm~1\programs\startup\openof~1.lnk - c:\program files\openoffice.org 3\program\quickstart.exe

IE: {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe

IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe

Trusted Zone: com\swiftview

Trusted Zone: mris.com

Trusted Zone: ss3.swiftsend.com\loandocs

Trusted Zone: swiftsend.com\docs

Trusted Zone: swiftsend.com\loandocs

Trusted Zone: swiftsend2.com\docs

Trusted Zone: swiftsend2.com\loandocs

Trusted Zone: swiftview.com\www

DPF: {166B1BCA-3F9C-11CF-8075-444553540000} - hxxp://download.macromedia.com/pub/shockwave/cabs/director/sw.cab

DPF: {17492023-C23A-453E-A040-C7C580BBF700} - hxxp://go.microsoft.com/fwlink/?linkid=39204

DPF: {5ED80217-570B-4DA9-BF44-BE107C0EC166} - hxxp://cdn.scan.safety.live.com/resource/download/scanner/wlscbase8460.cab

DPF: {C7DB51B4-BCF7-4923-8874-7F1A0DC92277} - hxxp://office.microsoft.com/officeupdate/content/opuc4.cab

DPF: {CF40ACC5-E1BB-4AFF-AC72-04C2F616BCA7} - hxxp://www.adobe.com/products/acrobat/nos/gp.cab

DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} - hxxp://fpdownload.macromedia.com/get/flashplayer/current/swflash.cab

TCP: interfaces = 10.140.10.41,10.140.10.40

Handler: bwfile-8876480 - {9462A756-7B47-47BC-8C80-C34B9B80B32B} - c:\program files\logitech\desktop messenger\8876480\program\GAPlugProtocol-8876480.dll

Handler: cdo - {CD00020A-8B95-11D1-82DB-00C04FB1625D} - c:\program files\common files\microsoft shared\web folders\PKMCDO.DLL

Notify: igfxcui - igfxsrvc.dll

SSODL: WPDShServiceObj - {AAA288BA-9A4C-45B0-95D7-94D524869DB5} - c:\windows\system32\WPDShServiceObj.dll

Hosts: 91.206.201.8 winsecurepro.com

Hosts: 91.206.201.8 www.winsecurepro.com

============= SERVICES / DRIVERS ===============

R1 avgio;avgio;c:\program files\avira\antivir desktop\avgio.sys [2010-6-4 11608]

R2 AntiVirSchedulerService;Avira AntiVir Scheduler;c:\program files\avira\antivir desktop\sched.exe [2010-6-4 135336]

R2 AntiVirService;Avira AntiVir Guard;c:\program files\avira\antivir desktop\avguard.exe [2010-6-4 267432]

R2 avgntflt;avgntflt;c:\windows\system32\drivers\avgntflt.sys [2010-6-4 60936]

R2 MBAMService;MBAMService;c:\program files\malwarebytes' anti-malware\mbamservice.exe [2010-1-12 303952]

R2 McAfeeFramework;McAfee Framework Service;c:\program files\network associates\common framework\FrameworkService.exe [2005-6-15 103744]

R3 MBAMProtector;MBAMProtector;c:\windows\system32\drivers\mbam.sys [2010-1-12 20824]

=============== Created Last 30 ================

2010-06-05 07:28:10 0 ----a-w- c:\documents and settings\owner\defogger_reenable

2010-06-04 09:15:43 0 d-----w- c:\docume~1\owner\applic~1\Avira

2010-06-04 09:08:37 60936 ----a-w- c:\windows\system32\drivers\avgntflt.sys

2010-06-04 09:08:36 0 d-----w- c:\program files\Avira

2010-06-04 09:08:36 0 d-----w- c:\docume~1\alluse~1\applic~1\Avira

2010-06-02 11:19:30 0 d-----w- c:\windows\system32\wbem\Repository

2010-06-02 02:42:56 711168 ----a-w- c:\windows\isRS-000.tmp

2010-05-21 23:15:38 0 d-----w- c:\docume~1\owner\applic~1\OpenOffice.org

2010-05-20 22:36:57 0 d-----w- c:\program files\JRE

2010-05-20 22:36:48 0 d-----w- c:\program files\OpenOffice.org 3

==================== Find3M ====================

2010-03-10 06:15:52 420352 ----a-w- c:\windows\system32\vbscript.dll

2008-08-19 19:57:31 32768 --sha-w- c:\windows\system32\config\systemprofile\local settings\history\history.ie5\mshist012008081920080820\index.dat

============= FINISH: 16:07:36.75 ===============

Link to post
Share on other sites

I don't want your Protection log, so I already told you:

  • Launch Malwarebytes' Anti-Malware
  • Go to "Update" tab and select "Check for Updates". If an update is found, it will download and install the latest version.
  • Go to "Scanner" tab and select "Perform Quick Scan", then click Scan.
  • The scan may take some time to finish,so please be patient.
  • When the scan is complete, click OK, then Show Results to view the results.
  • Make sure that everything is checked, and click Remove Selected.
  • When disinfection is completed, a log will open in Notepad and you may be prompted to Restart.(See Extra Note)
  • The log is automatically saved by MBAM and can be viewed by clicking the Logs tab in MBAM.
  • Copy&Paste the entire report in your next reply.

Extra Note:

If MBAM encounters a file that is difficult to remove,you will be presented with 1 of 2 prompts,click OK to either and let MBAM proceed with the disinfection process,if asked to restart the computer,please do so immediatly.

Then post a new fresh DDS log.

Link to post
Share on other sites

Oops. My bad. Here is the MBAB log and a fresh DDS log.

MBAB LOG

Malwarebytes' Anti-Malware 1.45

www.malwarebytes.org

Database version: 4170

Windows 5.1.2600 Service Pack 3

Internet Explorer 8.0.6001.18702

6/5/2010 4:04:29 PM

mbam-log-2010-06-05 (16-04-29).txt

Scan type: Quick scan

Objects scanned: 211458

Time elapsed: 47 minute(s), 29 second(s)

Memory Processes Infected: 0

Memory Modules Infected: 0

Registry Keys Infected: 0

Registry Values Infected: 0

Registry Data Items Infected: 0

Folders Infected: 0

Files Infected: 0

Memory Processes Infected:

(No malicious items detected)

Memory Modules Infected:

(No malicious items detected)

Registry Keys Infected:

(No malicious items detected)

Registry Values Infected:

(No malicious items detected)

Registry Data Items Infected:

(No malicious items detected)

Folders Infected:

(No malicious items detected)

Files Infected:

(No malicious items detected)

FRESH DDS LOG

DDS (Ver_10-03-17.01) - NTFSx86

Run by Owner at 16:26:44.09 on Sat 06/05/2010

Internet Explorer: 8.0.6001.18702

Microsoft Windows XP Home Edition 5.1.2600.3.1252.1.1033.18.1534.887 [GMT -4:00]

AV: AntiVir Desktop *On-access scanning enabled* (Updated) {AD166499-45F9-482A-A743-FDD3350758C7}

============== Running Processes ===============

C:\WINDOWS\system32\svchost -k DcomLaunch

svchost.exe

C:\WINDOWS\System32\svchost.exe -k netsvcs

svchost.exe

svchost.exe

C:\WINDOWS\system32\spoolsv.exe

C:\Program Files\Avira\AntiVir Desktop\sched.exe

svchost.exe

C:\Program Files\Avira\AntiVir Desktop\avguard.exe

C:\Program Files\Malwarebytes' Anti-Malware\mbamservice.exe

C:\Program Files\Network Associates\Common Framework\FrameworkService.exe

C:\Program Files\Avira\AntiVir Desktop\avshadow.exe

C:\WINDOWS\Explorer.EXE

C:\Program Files\Network Associates\Common Framework\UdaterUI.exe

C:\Program Files\Common Files\Real\Update_OB\realsched.exe

C:\Program Files\Malwarebytes' Anti-Malware\mbamgui.exe

C:\Program Files\Avira\AntiVir Desktop\avgnt.exe

C:\Program Files\Logitech\Desktop Messenger\8876480\Program\LogitechDesktopMessenger.exe

C:\WINDOWS\system32\ctfmon.exe

C:\Program Files\Network Associates\Common Framework\McTray.exe

C:\Program Files\OpenOffice.org 3\program\soffice.exe

C:\Program Files\Logitech\MouseWare\system\em_exec.exe

C:\Program Files\OpenOffice.org 3\program\soffice.bin

C:\Program Files\Internet Explorer\iexplore.exe

C:\Program Files\Internet Explorer\iexplore.exe

C:\Program Files\Internet Explorer\iexplore.exe

C:\Documents and Settings\Owner\Desktop\dds.scr

============== Pseudo HJT Report ===============

uStart Page = about:blank

uSearch Page = hxxp://www.google.com

uSearch Bar = hxxp://www.google.com/ie

uSearchMigratedDefaultURL = hxxp://www.google.com/search?q={searchTerms}&sourceid=ie7&rls=com.microsoft:en-US&ie=utf8&oe=utf8

uInternet Settings,ProxyOverride = localhost

uSearchAssistant = hxxp://www.google.com/ie

uSearchURL,(Default) = hxxp://www.google.com/search?q=%s

mSearchAssistant = hxxp://www.google.com/ie

TB: Yahoo! Toolbar: {ef99bd32-c1fb-11d2-892f-0090271d4f88} -

EB: {32683183-48a0-441b-a342-7c2a440a9478} - No File

uRun: [LDM] c:\program files\logitech\desktop messenger\8876480\program\LogitechDesktopMessenger.exe

uRun: [ctfmon.exe] c:\windows\system32\ctfmon.exe

mRun: [QuickTime Task] "c:\program files\quicktime\qttask.exe" -atboottime

mRun: [Logitech Utility] LOGI_MWX.EXE

mRun: [McAfeeUpdaterUI] "c:\program files\network associates\common framework\UdaterUI.exe" /StartedFromRunKey

mRun: [WinampAgent] c:\program files\winamp\winampa.exe

mRun: [TkBellExe] "c:\program files\common files\real\update_ob\realsched.exe" -osboot

mRun: [Malwarebytes' Anti-Malware] "c:\program files\malwarebytes' anti-malware\mbamgui.exe" /starttray

mRun: [avgnt] "c:\program files\avira\antivir desktop\avgnt.exe" /min

StartupFolder: c:\docume~1\owner\startm~1\programs\startup\openof~1.lnk - c:\program files\openoffice.org 3\program\quickstart.exe

IE: {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe

IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe

Trusted Zone: com\swiftview

Trusted Zone: mris.com

Trusted Zone: ss3.swiftsend.com\loandocs

Trusted Zone: swiftsend.com\docs

Trusted Zone: swiftsend.com\loandocs

Trusted Zone: swiftsend2.com\docs

Trusted Zone: swiftsend2.com\loandocs

Trusted Zone: swiftview.com\www

DPF: {166B1BCA-3F9C-11CF-8075-444553540000} - hxxp://download.macromedia.com/pub/shockwave/cabs/director/sw.cab

DPF: {17492023-C23A-453E-A040-C7C580BBF700} - hxxp://go.microsoft.com/fwlink/?linkid=39204

DPF: {5ED80217-570B-4DA9-BF44-BE107C0EC166} - hxxp://cdn.scan.safety.live.com/resource/download/scanner/wlscbase8460.cab

DPF: {C7DB51B4-BCF7-4923-8874-7F1A0DC92277} - hxxp://office.microsoft.com/officeupdate/content/opuc4.cab

DPF: {CF40ACC5-E1BB-4AFF-AC72-04C2F616BCA7} - hxxp://www.adobe.com/products/acrobat/nos/gp.cab

DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} - hxxp://fpdownload.macromedia.com/get/flashplayer/current/swflash.cab

TCP: interfaces = 10.140.10.41,10.140.10.40

Handler: bwfile-8876480 - {9462A756-7B47-47BC-8C80-C34B9B80B32B} - c:\program files\logitech\desktop messenger\8876480\program\GAPlugProtocol-8876480.dll

Handler: cdo - {CD00020A-8B95-11D1-82DB-00C04FB1625D} - c:\program files\common files\microsoft shared\web folders\PKMCDO.DLL

Notify: igfxcui - igfxsrvc.dll

SSODL: WPDShServiceObj - {AAA288BA-9A4C-45B0-95D7-94D524869DB5} - c:\windows\system32\WPDShServiceObj.dll

Hosts: 91.206.201.8 winsecurepro.com

Hosts: 91.206.201.8 www.winsecurepro.com

============= SERVICES / DRIVERS ===============

R1 avgio;avgio;c:\program files\avira\antivir desktop\avgio.sys [2010-6-4 11608]

R2 AntiVirSchedulerService;Avira AntiVir Scheduler;c:\program files\avira\antivir desktop\sched.exe [2010-6-4 135336]

R2 AntiVirService;Avira AntiVir Guard;c:\program files\avira\antivir desktop\avguard.exe [2010-6-4 267432]

R2 avgntflt;avgntflt;c:\windows\system32\drivers\avgntflt.sys [2010-6-4 60936]

R2 MBAMService;MBAMService;c:\program files\malwarebytes' anti-malware\mbamservice.exe [2010-1-12 303952]

R2 McAfeeFramework;McAfee Framework Service;c:\program files\network associates\common framework\FrameworkService.exe [2005-6-15 103744]

R3 MBAMProtector;MBAMProtector;c:\windows\system32\drivers\mbam.sys [2010-1-12 20824]

=============== Created Last 30 ================

2010-06-05 07:28:10 0 ----a-w- c:\documents and settings\owner\defogger_reenable

2010-06-04 09:15:43 0 d-----w- c:\docume~1\owner\applic~1\Avira

2010-06-04 09:08:37 60936 ----a-w- c:\windows\system32\drivers\avgntflt.sys

2010-06-04 09:08:36 0 d-----w- c:\program files\Avira

2010-06-04 09:08:36 0 d-----w- c:\docume~1\alluse~1\applic~1\Avira

2010-06-02 11:19:30 0 d-----w- c:\windows\system32\wbem\Repository

2010-06-02 02:42:56 711168 ----a-w- c:\windows\isRS-000.tmp

2010-05-21 23:15:38 0 d-----w- c:\docume~1\owner\applic~1\OpenOffice.org

2010-05-20 22:36:57 0 d-----w- c:\program files\JRE

2010-05-20 22:36:48 0 d-----w- c:\program files\OpenOffice.org 3

==================== Find3M ====================

2010-03-10 06:15:52 420352 ----a-w- c:\windows\system32\vbscript.dll

2008-08-19 19:57:31 32768 --sha-w- c:\windows\system32\config\systemprofile\local settings\history\history.ie5\mshist012008081920080820\index.dat

============= FINISH: 16:28:27.93 ===============

Link to post
Share on other sites

**Note: If you need more detailed information, please visit the web page of ComboFix in BleepingComputer. **

Please note that these fixes are not instantaneous. Most infections require more than one round to properly eradicate.

Stay with me until given the 'all clear' even if symptoms diminish. Lack of symptoms does not always mean the job is complete.

Kindly follow my instructions and please do no fixing on your own or running of scanners unless requested by me or another helper.

Please download ComboFix from

Here or Here to your Desktop.

**Note: In the event you already have Combofix, this is a new version that I need you to download. It is important that it is saved and renamed following this process directly to your desktop**

  1. If you are using Firefox, make sure that your download settings are as follows:
    • Open Tools -> Options -> Main tab
    • Set to Always ask me where to Save the files.

[*]During the download, rename Combofix to Combo-Fix as follows:

CF_download_FF.gif

CF_download_rename.gif

[*]It is important you rename Combofix during the download, but not after.

[*]Please do not rename Combofix to other names, but only to the one indicated.

[*]Close any open browsers.

[*]Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.

-----------------------------------------------------------

  • Very Important! Temporarily disable your anti-virus, script blocking and any anti-malware real-time protection before performing a scan. They can interfere with ComboFix or remove some of its embedded files which may cause unpredictable results.
  • Click on this link to see a list of programs that should be disabled. The list is not all inclusive. If yours is not listed and you don't know how to disable it, please ask.

    -----------------------------------------------------------


  • Close any open browsers.
  • WARNING: Combofix will disconnect your machine from the Internet as soon as it starts
  • Please do not attempt to re-connect your machine back to the Internet until Combofix has completely finished.
  • If there is no internet connection after running Combofix, then restart your computer to restore back your connection.

-----------------------------------------------------------

[*]Double click on combo-Fix.exe & follow the prompts.

[*]When finished, it will produce a report for you.

[*]Please post the C:\Combo-Fix.txt for further review.

**Note: Do not mouseclick combo-fix's window while it's running. That may cause it to stall**

Link to post
Share on other sites

Borislav, I somehow missed the prompt to rename ComboFix at download and ended up running the program twice. When I ran it the first time, as ComboFix.exe, the report included these lines:

Infected copy of c:\windows\system32\drivers\intelppm.sys was found and disinfected

Restored copy from - Kitty had a snack :P

Then I downloaded ComboFix again, this time renaming it Combo-Fix.exe. The report that follows is from the second scanning.

ComboFix 10-06-05.01 - Owner 06/05/2010 20:13:14.2.1 - x86

Microsoft Windows XP Home Edition 5.1.2600.3.1252.1.1033.18.1534.1082 [GMT -4:00]

Running from: c:\documents and settings\Owner\Desktop\Combo-Fix.exe

AV: AntiVir Desktop *On-access scanning disabled* (Updated) {AD166499-45F9-482A-A743-FDD3350758C7}

.

((((((((((((((((((((((((( Files Created from 2010-05-06 to 2010-06-06 )))))))))))))))))))))))))))))))

.

2010-06-04 09:15 . 2010-06-04 09:15 -------- d-----w- c:\documents and settings\Owner\Application Data\Avira

2010-06-04 09:08 . 2010-03-01 14:05 124784 ----a-w- c:\windows\system32\drivers\avipbb.sys

2010-06-04 09:08 . 2010-02-16 18:24 60936 ----a-w- c:\windows\system32\drivers\avgntflt.sys

2010-06-04 09:08 . 2009-05-11 16:49 45416 ----a-w- c:\windows\system32\drivers\avgntdd.sys

2010-06-04 09:08 . 2009-05-11 16:49 22360 ----a-w- c:\windows\system32\drivers\avgntmgr.sys

2010-06-04 09:08 . 2010-06-04 09:08 -------- d-----w- c:\program files\Avira

2010-06-04 09:08 . 2010-06-04 09:08 -------- d-----w- c:\documents and settings\All Users\Application Data\Avira

2010-06-03 23:57 . 2010-06-04 01:26 -------- d---a-w- c:\documents and settings\All Users\Application Data\TEMP

2010-06-02 11:19 . 2010-06-02 11:19 -------- d-----w- c:\windows\system32\wbem\Repository

2010-06-02 01:42 . 2010-06-02 01:42 -------- d-----w- c:\documents and settings\Administrator.GLEN-DMNNKZ5CLS\IETldCache

2010-06-02 01:41 . 2010-06-02 11:18 -------- d-----w- c:\documents and settings\Administrator.GLEN-DMNNKZ5CLS\Local Settings\Application Data\Microsoft

2010-06-02 01:41 . 2010-06-02 11:19 -------- d-s---w- c:\documents and settings\Administrator.GLEN-DMNNKZ5CLS

2010-05-21 23:15 . 2010-05-21 23:15 1 ----a-w- c:\documents and settings\Owner\Application Data\OpenOffice.org\3\user\uno_packages\cache\stamp.sys

2010-05-21 23:15 . 2010-05-21 23:15 -------- d-----w- c:\documents and settings\Owner\Application Data\OpenOffice.org

2010-05-20 22:36 . 2010-05-20 22:36 -------- d-----w- c:\program files\JRE

2010-05-20 22:36 . 2010-05-20 22:36 -------- d-----w- c:\program files\OpenOffice.org 3

.

(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))

.

2010-06-05 18:59 . 2004-12-12 10:15 -------- d-----w- c:\program files\Common Files\Adobe

2010-06-03 22:27 . 2005-01-29 00:08 -------- d-----w- c:\program files\AWS

2010-06-03 22:19 . 2007-05-30 15:26 -------- d-----w- c:\documents and settings\All Users\Application Data\AOL

2010-06-03 22:17 . 2004-11-11 22:05 -------- d--h--w- c:\program files\InstallShield Installation Information

2010-06-03 22:17 . 2009-03-11 23:03 -------- d-----w- c:\program files\REFN

2010-06-02 12:17 . 2004-12-24 19:22 -------- d-----w- c:\program files\Lavasoft

2010-06-02 12:17 . 2008-02-13 10:11 -------- d-----w- c:\documents and settings\All Users\Application Data\Lavasoft

2010-06-02 11:23 . 2004-12-12 08:18 49368 -c--a-w- c:\documents and settings\Owner\Local Settings\Application Data\GDIPFONTCACHEV1.DAT

2010-06-02 11:20 . 2009-12-27 19:19 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware

2010-06-02 02:42 . 2010-06-02 02:42 711168 ----a-w- c:\windows\isRS-000.tmp

2010-05-12 22:51 . 2005-05-08 11:47 -------- d-----w- c:\program files\Bible

2010-04-29 00:53 . 2005-06-15 19:58 -------- d-----w- c:\program files\Common Files\Network Associates

2010-04-29 00:53 . 2005-06-15 19:57 -------- d-----w- c:\program files\Network Associates

2010-04-29 00:53 . 2005-06-15 19:57 -------- d-----w- c:\documents and settings\All Users\Application Data\Network Associates

2010-03-30 04:46 . 2010-01-13 00:15 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys

2010-03-30 04:45 . 2010-01-13 00:15 20824 ----a-w- c:\windows\system32\drivers\mbam.sys

2010-03-10 06:15 . 2003-07-16 20:49 420352 ----a-w- c:\windows\system32\vbscript.dll

.

((((((((((((((((((((((((((((((((((((((((((((( AWF ))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

.

2007-10-11 00:51 . 2007-10-11 00:51 39792 c:\program files\Adobe\Reader 8.0\Reader\bak\Reader_sl.exe

2003-10-07 14:48 . 2003-10-07 14:48 147514 c:\program files\Common Files\Network Associates\TalkBack\bak\TBMon.exe

2004-11-11 22:36 . 2003-08-27 00:47 204800 c:\program files\Dell\Media Experience\bak\PCMService.exe

2007-02-19 08:36 . 2007-02-19 08:36 67128 c:\program files\Logitech\Desktop Messenger\8876480\Program\bak\LogitechDesktopMessenger.exe

2008-02-13 09:02 . 2008-02-13 09:02 67128 c:\program files\Logitech\Desktop Messenger\8876480\Program\LogitechDesktopMessenger.exe

2005-06-15 19:57 . 2005-08-31 20:50 139320 c:\program files\Network Associates\Common Framework\bak\UpdaterUI.exe

2004-12-28 00:53 . 2004-12-28 00:53 98304 c:\program files\QuickTime\bak\qttask.exe

2004-12-20 18:41 . 2004-12-20 18:41 33792 c:\program files\Winamp\bak\winampa.exe

2003-07-16 20:26 . 2004-08-04 07:56 15360 c:\windows\system32\bak\ctfmon.exe

2003-07-16 20:26 . 2008-04-14 00:12 15360 c:\windows\system32\ctfmon.exe

2004-11-11 22:22 . 2005-10-19 12:59 126976 c:\windows\system32\bak\hkcmd.exe

2004-11-11 22:22 . 2005-10-19 12:59 155648 c:\windows\system32\bak\igfxtray.exe

.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))

.

.

*Note* empty entries & legit default entries are not shown

REGEDIT4

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]

"LDM"="c:\program files\Logitech\Desktop Messenger\8876480\Program\LogitechDesktopMessenger.exe" [2008-02-13 67128]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]

"QuickTime Task"="c:\program files\QuickTime\qttask.exe" [N/A]

"Logitech Utility"="LOGI_MWX.EXE" [2003-12-17 19968]

"McAfeeUpdaterUI"="c:\program files\Network Associates\Common Framework\UdaterUI.exe" [2007-10-25 136512]

"WinampAgent"="c:\program files\Winamp\winampa.exe" [N/A]

"TkBellExe"="c:\program files\Common Files\Real\Update_OB\realsched.exe" [2009-09-23 198160]

"Malwarebytes' Anti-Malware"="c:\program files\Malwarebytes' Anti-Malware\mbamgui.exe" [2010-03-30 437584]

"avgnt"="c:\program files\Avira\AntiVir Desktop\avgnt.exe" [2010-03-02 282792]

c:\documents and settings\Owner\Start Menu\Programs\Startup\

OpenOffice.org 3.2.lnk - c:\program files\OpenOffice.org 3\program\quickstart.exe [2009-12-15 384000]

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]

"%windir%\\system32\\sessmgr.exe"=

"c:\\Program Files\\Real\\RealPlayer\\realplay.exe"=

"c:\\Program Files\\Windows Media Player\\wmplayer.exe"=

"c:\\Program Files\\Network Associates\\Common Framework\\FrameworkService.exe"=

"c:\\Program Files\\Logitech\\Desktop Messenger\\8876480\\Program\\LogitechDesktopMessenger.exe"=

"%windir%\\Network Diagnostic\\xpnetdiag.exe"=

R2 AntiVirSchedulerService;Avira AntiVir Scheduler;c:\program files\Avira\AntiVir Desktop\sched.exe [6/4/2010 5:08 AM 135336]

R2 MBAMService;MBAMService;c:\program files\Malwarebytes' Anti-Malware\mbamservice.exe [1/12/2010 8:16 PM 303952]

R3 MBAMProtector;MBAMProtector;c:\windows\system32\drivers\mbam.sys [1/12/2010 8:15 PM 20824]

.

.

------- Supplementary Scan -------

.

uStart Page = about:blank

uSearchMigratedDefaultURL = hxxp://www.google.com/search?q={searchTerms}&sourceid=ie7&rls=com.microsoft:en-US&ie=utf8&oe=utf8

uInternet Settings,ProxyOverride = localhost

uSearchAssistant = hxxp://www.google.com/ie

uSearchURL,(Default) = hxxp://www.google.com/search?q=%s

Trusted Zone: com\swiftview

Trusted Zone: mris.com

Trusted Zone: ss3.swiftsend.com\loandocs

Trusted Zone: swiftsend.com\docs

Trusted Zone: swiftsend.com\loandocs

Trusted Zone: swiftsend2.com\docs

Trusted Zone: swiftsend2.com\loandocs

Trusted Zone: swiftview.com\www

TCP: interfaces = 10.140.10.41,10.140.10.40

Handler: bwfile-8876480 - {9462A756-7B47-47BC-8C80-C34B9B80B32B} - c:\program files\Logitech\Desktop Messenger\8876480\Program\GAPlugProtocol-8876480.dll

.

**************************************************************************

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net

Rootkit scan 2010-06-05 20:21

Windows 5.1.2600 Service Pack 3 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully

hidden files: 0

**************************************************************************

.

--------------------- DLLs Loaded Under Running Processes ---------------------

- - - - - - - > 'explorer.exe'(380)

c:\windows\system32\WININET.dll

c:\program files\Logitech\MouseWare\System\LgWndHk.dll

c:\windows\system32\ieframe.dll

c:\program files\Common Files\Logitech\Scrolling\LgMsgHk.dll

c:\windows\system32\webcheck.dll

c:\windows\system32\WPDShServiceObj.dll

c:\windows\system32\PortableDeviceTypes.dll

c:\windows\system32\PortableDeviceApi.dll

.

Completion time: 2010-06-05 20:25:17

ComboFix-quarantined-files.txt 2010-06-06 00:25

ComboFix2.txt 2010-06-05 21:17

Pre-Run: 24,869,793,792 bytes free

Post-Run: 24,835,018,752 bytes free

- - End Of File - - E9BE555C0F75347D7EB230EA4AA3ACE1

Link to post
Share on other sites

Thank you!

Open Notepad and copy and paste the text in the code box below into it:

KillAll::

AWF::
c:\program files\Adobe\Reader 8.0\Reader\bak\Reader_sl.exe
c:\program files\Common Files\Network Associates\TalkBack\bak\TBMon.exe
c:\program files\Dell\Media Experience\bak\PCMService.exe
c:\program files\Logitech\Desktop Messenger\8876480\Program\bak\LogitechDesktopMessenger.exe
c:\program files\Logitech\Desktop Messenger\8876480\Program\LogitechDesktopMessenger.exe
c:\program files\Network Associates\Common Framework\bak\UpdaterUI.exe
c:\program files\QuickTime\bak\qttask.exe
c:\program files\Winamp\bak\winampa.exe
c:\windows\system32\bak\ctfmon.exe
c:\windows\system32\ctfmon.exe
c:\windows\system32\bak\hkcmd.exe
c:\windows\system32\bak\igfxtray.exe

Save the file to your desktop and name it CFScript.txt

Then drag the CFScript.txt into the ComboFix.exe as shown in the screenshot below.

CFScriptB-4.gif

This will start ComboFix again. It may ask to reboot. Post the contents of Combofix.txt in your next reply.

Note: These instructions and script were created specifically for this user. If you are not this user, do NOT follow these instructions or use this script as it could damage the workings of your system.

Link to post
Share on other sites

CFScript.txt proceedure finished. Results below.

ComboFix 10-06-05.02 - Owner 06/06/2010 7:50.3.1 - x86

Microsoft Windows XP Home Edition 5.1.2600.3.1252.1.1033.18.1534.1100 [GMT -4:00]

Running from: c:\documents and settings\Owner\Desktop\Combo-Fix.exe

Command switches used :: c:\documents and settings\Owner\Desktop\CFScript.txt

AV: AntiVir Desktop *On-access scanning disabled* (Updated) {AD166499-45F9-482A-A743-FDD3350758C7}

.

((((((((((((((((((((((((( Files Created from 2010-05-06 to 2010-06-06 )))))))))))))))))))))))))))))))

.

2010-06-04 09:15 . 2010-06-04 09:15 -------- d-----w- c:\documents and settings\Owner\Application Data\Avira

2010-06-04 09:08 . 2010-03-01 14:05 124784 ----a-w- c:\windows\system32\drivers\avipbb.sys

2010-06-04 09:08 . 2010-02-16 18:24 60936 ----a-w- c:\windows\system32\drivers\avgntflt.sys

2010-06-04 09:08 . 2009-05-11 16:49 45416 ----a-w- c:\windows\system32\drivers\avgntdd.sys

2010-06-04 09:08 . 2009-05-11 16:49 22360 ----a-w- c:\windows\system32\drivers\avgntmgr.sys

2010-06-04 09:08 . 2010-06-04 09:08 -------- d-----w- c:\program files\Avira

2010-06-04 09:08 . 2010-06-04 09:08 -------- d-----w- c:\documents and settings\All Users\Application Data\Avira

2010-06-03 23:57 . 2010-06-04 01:26 -------- d---a-w- c:\documents and settings\All Users\Application Data\TEMP

2010-06-02 11:19 . 2010-06-02 11:19 -------- d-----w- c:\windows\system32\wbem\Repository

2010-06-02 01:42 . 2010-06-02 01:42 -------- d-----w- c:\documents and settings\Administrator.GLEN-DMNNKZ5CLS\IETldCache

2010-06-02 01:41 . 2010-06-02 11:18 -------- d-----w- c:\documents and settings\Administrator.GLEN-DMNNKZ5CLS\Local Settings\Application Data\Microsoft

2010-06-02 01:41 . 2010-06-02 11:19 -------- d-s---w- c:\documents and settings\Administrator.GLEN-DMNNKZ5CLS

2010-05-21 23:15 . 2010-05-21 23:15 -------- d-----w- c:\documents and settings\Owner\Application Data\OpenOffice.org

2010-05-20 22:36 . 2010-05-20 22:36 -------- d-----w- c:\program files\JRE

2010-05-20 22:36 . 2010-05-20 22:36 -------- d-----w- c:\program files\OpenOffice.org 3

.

(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))

.

2010-06-06 11:59 . 2005-09-20 22:08 -------- d-----w- c:\program files\Winamp

2010-06-06 11:59 . 2004-12-28 00:53 -------- d-----w- c:\program files\QuickTime

2010-06-05 18:59 . 2004-12-12 10:15 -------- d-----w- c:\program files\Common Files\Adobe

2010-06-03 22:27 . 2005-01-29 00:08 -------- d-----w- c:\program files\AWS

2010-06-03 22:19 . 2007-05-30 15:26 -------- d-----w- c:\documents and settings\All Users\Application Data\AOL

2010-06-03 22:17 . 2004-11-11 22:05 -------- d--h--w- c:\program files\InstallShield Installation Information

2010-06-03 22:17 . 2009-03-11 23:03 -------- d-----w- c:\program files\REFN

2010-06-02 12:17 . 2004-12-24 19:22 -------- d-----w- c:\program files\Lavasoft

2010-06-02 12:17 . 2008-02-13 10:11 -------- d-----w- c:\documents and settings\All Users\Application Data\Lavasoft

2010-06-02 11:23 . 2004-12-12 08:18 49368 -c--a-w- c:\documents and settings\Owner\Local Settings\Application Data\GDIPFONTCACHEV1.DAT

2010-06-02 11:20 . 2009-12-27 19:19 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware

2010-06-02 02:42 . 2010-06-02 02:42 711168 ----a-w- c:\windows\isRS-000.tmp

2010-05-21 23:15 . 2010-05-21 23:15 1 ----a-w- c:\documents and settings\Owner\Application Data\OpenOffice.org\3\user\uno_packages\cache\stamp.sys

2010-05-12 22:51 . 2005-05-08 11:47 -------- d-----w- c:\program files\Bible

2010-04-29 00:53 . 2005-06-15 19:58 -------- d-----w- c:\program files\Common Files\Network Associates

2010-04-29 00:53 . 2005-06-15 19:57 -------- d-----w- c:\program files\Network Associates

2010-04-29 00:53 . 2005-06-15 19:57 -------- d-----w- c:\documents and settings\All Users\Application Data\Network Associates

2010-03-30 04:46 . 2010-01-13 00:15 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys

2010-03-30 04:45 . 2010-01-13 00:15 20824 ----a-w- c:\windows\system32\drivers\mbam.sys

2010-03-10 06:15 . 2003-07-16 20:49 420352 ----a-w- c:\windows\system32\vbscript.dll

.

((((((((((((((((((((((((((((((((((((((((((((( AWF ))))))))))))))))))))))))))))))))))))))))))))))))))))))))))

.

2007-02-19 08:36 . 2007-02-19 08:36 67128 c:\program files\Logitech\Desktop Messenger\8876480\Program\bak\LogitechDesktopMessenger.exe

2008-02-13 09:02 . 2008-02-13 09:02 67128 c:\program files\Logitech\Desktop Messenger\8876480\Program\LogitechDesktopMessenger.exe

.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))

.

.

*Note* empty entries & legit default entries are not shown

REGEDIT4

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]

"LDM"="c:\program files\Logitech\Desktop Messenger\8876480\Program\LogitechDesktopMessenger.exe" [2008-02-13 67128]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]

"QuickTime Task"="c:\program files\QuickTime\qttask.exe" [2004-12-28 98304]

"Logitech Utility"="LOGI_MWX.EXE" [2003-12-17 19968]

"McAfeeUpdaterUI"="c:\program files\Network Associates\Common Framework\UdaterUI.exe" [2007-10-25 136512]

"WinampAgent"="c:\program files\Winamp\winampa.exe" [2004-12-20 33792]

"TkBellExe"="c:\program files\Common Files\Real\Update_OB\realsched.exe" [2009-09-23 198160]

"Malwarebytes' Anti-Malware"="c:\program files\Malwarebytes' Anti-Malware\mbamgui.exe" [2010-03-30 437584]

"avgnt"="c:\program files\Avira\AntiVir Desktop\avgnt.exe" [2010-03-02 282792]

c:\documents and settings\Owner\Start Menu\Programs\Startup\

OpenOffice.org 3.2.lnk - c:\program files\OpenOffice.org 3\program\quickstart.exe [2009-12-15 384000]

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]

"%windir%\\system32\\sessmgr.exe"=

"c:\\Program Files\\Real\\RealPlayer\\realplay.exe"=

"c:\\Program Files\\Windows Media Player\\wmplayer.exe"=

"c:\\Program Files\\Network Associates\\Common Framework\\FrameworkService.exe"=

"c:\\Program Files\\Logitech\\Desktop Messenger\\8876480\\Program\\LogitechDesktopMessenger.exe"=

"%windir%\\Network Diagnostic\\xpnetdiag.exe"=

R2 AntiVirSchedulerService;Avira AntiVir Scheduler;c:\program files\Avira\AntiVir Desktop\sched.exe [6/4/2010 5:08 AM 135336]

R2 MBAMService;MBAMService;c:\program files\Malwarebytes' Anti-Malware\mbamservice.exe [1/12/2010 8:16 PM 303952]

R3 MBAMProtector;MBAMProtector;c:\windows\system32\drivers\mbam.sys [1/12/2010 8:15 PM 20824]

.

.

------- Supplementary Scan -------

.

uStart Page = about:blank

uSearchMigratedDefaultURL = hxxp://www.google.com/search?q={searchTerms}&sourceid=ie7&rls=com.microsoft:en-US&ie=utf8&oe=utf8

uInternet Settings,ProxyOverride = localhost

uSearchAssistant = hxxp://www.google.com/ie

uSearchURL,(Default) = hxxp://www.google.com/search?q=%s

TCP: interfaces = 10.140.10.41,10.140.10.40

Handler: bwfile-8876480 - {9462A756-7B47-47BC-8C80-C34B9B80B32B} - c:\program files\Logitech\Desktop Messenger\8876480\Program\GAPlugProtocol-8876480.dll

.

**************************************************************************

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net

Rootkit scan 2010-06-06 07:58

Windows 5.1.2600 Service Pack 3 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully

hidden files: 0

**************************************************************************

.

--------------------- DLLs Loaded Under Running Processes ---------------------

- - - - - - - > 'explorer.exe'(2276)

c:\windows\system32\WININET.dll

c:\program files\Logitech\MouseWare\System\LgWndHk.dll

c:\program files\Common Files\Logitech\Scrolling\LgMsgHk.dll

c:\windows\system32\ieframe.dll

c:\windows\system32\webcheck.dll

c:\windows\system32\WPDShServiceObj.dll

c:\windows\system32\PortableDeviceTypes.dll

c:\windows\system32\PortableDeviceApi.dll

.

------------------------ Other Running Processes ------------------------

.

c:\program files\Avira\AntiVir Desktop\avguard.exe

c:\program files\Network Associates\Common Framework\FrameworkService.exe

c:\program files\Avira\AntiVir Desktop\avshadow.exe

c:\program files\Network Associates\Common Framework\naPrdMgr.exe

c:\program files\Network Associates\Common Framework\McTray.exe

c:\program files\Logitech\MouseWare\system\em_exec.exe

c:\program files\OpenOffice.org 3\program\soffice.exe

c:\program files\OpenOffice.org 3\program\soffice.bin

c:\program files\Network Associates\Common Framework\McScript_InUse.exe

.

**************************************************************************

.

Completion time: 2010-06-06 08:08:57 - machine was rebooted

ComboFix-quarantined-files.txt 2010-06-06 12:08

ComboFix2.txt 2010-06-06 00:25

ComboFix3.txt 2010-06-05 21:17

Pre-Run: 24,834,416,640 bytes free

Post-Run: 24,805,437,440 bytes free

- - End Of File - - A3203706FC32417EBAEE03B57BFE39E9

Link to post
Share on other sites

Good work! :P

Last steps:

Step 1

* Go to start > run and copy and paste next command in the field:

ComboFix /uninstall

Make sure there's a space between Combofix and /

Then hit enter.

This will uninstall Combofix, delete its related folders and files, reset your clock settings, hide file extensions, hide the system/hidden files and resets System Restore again.

Step 2

Please manually delete DDS, JavaRa and GMER.

Step 3

Please download and install the latest version of Adobe Reader from:

www.adobe.com

About Java:

www.java.com/en

Step 4

To enable CD Emulation programs using DeFogger please perform these steps:

  1. Please download DeFogger to your desktop.
  2. Once downloaded, double-click on the DeFogger icon to start the tool.
  3. The application window will now appear. You should now click on the Enable button to enable your CD Emulation drivers
  4. When it prompts you whether or not you want to continue, please click on the Yes button to continue
  5. When the program has completed you will see a Finished! message. Click on the OK button to exit the program.
  6. If CD Emulation programs are present and have been enabled, DeFogger will now ask you to reboot the machine. Please allow it to do so by clicking on the OK button.

Step 5

Some malware preventions:

http://miekiemoes.blogspot.com/2008/02/how...nt-malware.html

Safe surfing! :)

Link to post
Share on other sites

I made a donation via PayPal, Borislav, but the confirmation information mentioned a Donations Coordinator: ****, and showed ***** as the recipient of the donation. Is that correct? Will the donation get to you with that information?

Link to post
Share on other sites

Guest
This topic is now closed to further replies.
  • Recently Browsing   0 members

    • No registered users viewing this page.
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.