Jump to content

Rogue Antivirus


Judy Lee

Recommended Posts

As instructed on your What Do I Do Now Page, I completed the following steps:

I downloaded Defogger. When I tried to run it, I received the message:

C:\Documents and Settings\Judy\Desktop\Defogger.exe is not a valid Win32 application.

I downloaded dds.scr. When I tried to run it, I received the message:

C:\Documents and Settings\Judy\Desktop\dds.scr is not a valid Win32 application.

I downloaded GMER, made the changes in the right panel which you suggested, and ran it. It ran for about 30 minutes, and then I got the blue screen stating "A problem has been encountered, and windows is shutting down to prevent damage to your system."

The computer rebooted. I started GMER again, and tried to save the few lines of information on the screen, but the program froze and I got (Not responding) message. I had to kill the program through Task Manager.

Now I find that every action (mouse click) is taking several minutes to acknowledge. I had to force shutdown. On reboot, I was able to get online and send the following log to my main computer.

Here is the MBAM log:

Malwarebytes' Anti-Malware 1.46

www.malwarebytes.org

Database version: 4635

Windows 5.1.2600 Service Pack 3

Internet Explorer 8.0.6001.18702

9/17/2010 10:11:26 AM

mbam-log-2010-09-17 (10-11-26).txt

Scan type: Full scan (C:\|D:\|E:\|)

Objects scanned: 264903

Time elapsed: 1 hour(s), 18 minute(s), 30 second(s)

Memory Processes Infected: 0

Memory Modules Infected: 0

Registry Keys Infected: 0

Registry Values Infected: 0

Registry Data Items Infected: 0

Folders Infected: 0

Files Infected: 1

Memory Processes Infected:

(No malicious items detected)

Memory Modules Infected:

(No malicious items detected)

Registry Keys Infected:

(No malicious items detected)

Registry Values Infected:

(No malicious items detected)

Registry Data Items Infected:

(No malicious items detected)

Folders Infected:

(No malicious items detected)

Files Infected:

C:\WINDOWS\system32\us?rinit.exe (Rogue.Antivirus2010) -> Quarantined and deleted successfully.

Thank you for your help. I greatly appreciate it.

Judy Lee

Link to post
Share on other sites

Hi,

Please download ComboFix from: Here to your Desktop.

**Note:**In the event you already have Combofix, this is a new version that I need you to download. It is important that it is saved and renamed following this process directly to your desktop**

  1. If you are using Firefox, make sure that your download settings are as follows:
    • Tools->Options->Main tab
    • Set to "Always ask me where to Save the files".

[*]During the download, rename Combofix to the name provided in the image below:

Cfix_explorer.exe.jpg

[*]It is important you rename Combofix during the download, but not after.

[*]Please do not rename Combofix to other names, but only to the one indicated.

[*]Close any open browsers.

[*]Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.

  • Very Important! Temporarily disable your anti-virus, script blocking and any anti-malware real-time protection before performing a scan. They can interfere with ComboFix or remove some of its embedded files which may cause "unpredictable results".
  • Click on this link to see a list of programs that should be disabled. The list is not all inclusive. If yours is not listed and you don't know how to disable it, please ask.
  • Close any open browsers.

[*]Double click on the renamed version of ComboFix.exe & follow the prompts.

[*]When finished, it will produce a report for you.

[*]Please post the ComboFix log which can be found in the root drive (usually the C: Drive) for further review.

**Note: Do not mouseclick ComboFix's window while it's running. That may cause it to stall**

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

If you can't run the renamed version of ComboFix, then please try running it in Safe Mode. You can reboot your computer in Safe Mode by doing the following :

  • Restart your computer
  • After hearing your computer beep once during startup, but before the Windows icon appears, tap the F8 key continually;
  • Instead of Windows loading as normal, the Advanced Options Menu should appear;
  • Select the first option, to run Windows in Safe Mode, then press Enter.
  • Choose your usual account.

Link to post
Share on other sites

Following is my ComboFix log:

ComboFix 10-09-22.02 - Judy 09/22/2010 15:14:21.7.2 - x86

Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.1014.520 [GMT -4:00]

Running from: c:\documents and settings\Judy\Desktop\ComboFix.exe

AV: AVG Anti-Virus Free *On-access scanning disabled* (Updated) {17DDD097-36FF-435F-9E1B-52D74245D6BF}

FW: ZoneAlarm Firewall *disabled* {829BDA32-94B3-44F4-8446-F8FCFF809F8B}

.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))

.

c:\documents and settings\All Users\Application Data\.wtav

c:\documents and settings\Judy\Local Settings\Application Data\{4C5E87FD-822C-40E8-8014-6E99B894CBCB}

c:\documents and settings\Judy\Local Settings\Application Data\{4C5E87FD-822C-40E8-8014-6E99B894CBCB}\chrome.manifest

c:\documents and settings\Judy\Local Settings\Application Data\{4C5E87FD-822C-40E8-8014-6E99B894CBCB}\chrome\content\_cfg.js

c:\documents and settings\Judy\Local Settings\Application Data\{4C5E87FD-822C-40E8-8014-6E99B894CBCB}\chrome\content\overlay.xul

c:\documents and settings\Judy\Local Settings\Application Data\{4C5E87FD-822C-40E8-8014-6E99B894CBCB}\install.rdf

c:\documents and settings\Judy\Local Settings\Application Data\Windows Server

c:\documents and settings\Judy\Local Settings\Application Data\Windows Server\flags.ini

c:\documents and settings\Judy\Local Settings\Application Data\Windows Server\uses32.dat

c:\documents and settings\LocalService\Local Settings\Application Data\Windows Server

c:\documents and settings\NetworkService\Local Settings\Application Data\Windows Server

C:\feed.txt

c:\windows\system32\ESQULzxspectrum

c:\windows\system32\fsc.txt

c:\windows\system32\ide.txt

c:\windows\system32\klgd.bmp

c:\windows\system32\lrg.txt

c:\windows\system32\qks.txt

c:\windows\system32\USRINI~1.EXE

c:\windows\system32\xef.txt

Infected copy of c:\windows\system32\drivers\iaStor.sys was found and disinfected

Restored copy from - Kitty had a snack :P

.

((((((((((((((((((((((((( Files Created from 2010-08-22 to 2010-09-22 )))))))))))))))))))))))))))))))

.

2010-09-15 01:29 . 2010-09-15 01:30 -------- d-----w- c:\documents and settings\Judy\Application Data\MSNInstaller

2010-09-08 17:17 . 2010-09-11 03:04 188496 ----a-w- c:\documents and settings\Judy\Local Settings\Application Data\prvlcl.dat

2010-08-31 16:11 . 2010-08-31 16:11 3401880 ----a-w- c:\documents and settings\Judy\Application Data\Mozilla\plugins\npgtpo3dautoplugin.dll

2010-08-31 15:55 . 2010-08-31 15:55 275096 ----a-w- c:\documents and settings\Judy\Application Data\Mozilla\plugins\npgoogletalk.dll

2010-08-31 15:39 . 2010-08-31 15:39 3734536 ----a-w- c:\documents and settings\Judy\Application Data\Mozilla\plugins\Google Talk Plugin Extras\d3dx9_36.dll

2010-08-25 00:21 . 2010-08-25 00:21 -------- d-----w- c:\windows\system32\Adobe

.

(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))

.

2010-09-22 19:11 . 2010-05-05 05:41 824696 ----a-w- c:\documents and settings\LocalService\Local Settings\Application Data\FontCache3.0.0.0.dat

2010-09-22 18:08 . 2009-03-21 02:50 664 ----a-w- c:\windows\system32\d3d9caps.dat

2010-09-19 23:48 . 2010-04-21 22:16 1 ----a-w- c:\documents and settings\Judy\Application Data\OpenOffice.org\3\user\uno_packages\cache\stamp.sys

2010-09-07 01:21 . 2005-10-13 01:07 874240 ----a-w- c:\windows\system32\drivers\iaStor.sys

2010-09-04 08:57 . 2009-03-21 17:18 46 ----a-w- c:\documents and settings\Judy\jagex_runescape_preferences.dat

2010-09-04 08:30 . 2009-09-03 23:42 99 ----a-w- c:\documents and settings\Judy\jagex_runescape_preferences2.dat

2010-08-07 06:00 . 2010-08-07 06:00 0 ----a-w- c:\documents and settings\Judy\jagex__preferences3.dat

2010-08-01 23:33 . 2010-08-01 23:33 99664 ----a-w- c:\windows\Internet Logs\vsmon_2nd_2010_08_01_16_34_26_small.dmp.zip

2010-08-01 20:34 . 2010-08-01 23:28 2096640 ----a-w- c:\windows\Internet Logs\xDB3B.tmp

2010-08-01 20:34 . 2010-08-01 23:28 1187840 ----a-w- c:\windows\Internet Logs\xDB3A.tmp

2010-07-27 21:36 . 2009-05-23 13:30 243024 ----a-w- c:\windows\system32\drivers\avgtdix.sys

2010-07-27 21:36 . 2010-07-27 21:36 12536 ----a-w- c:\windows\system32\avgrsstx.dll

2010-07-27 21:34 . 2009-05-23 13:30 216400 ----a-w- c:\windows\system32\drivers\avgldx86.sys

2010-07-14 23:37 . 2009-06-02 22:25 16 ----a-w- c:\windows\popcinfot.dat

2010-07-09 03:23 . 2006-09-12 06:39 79456 -c--a-w- c:\documents and settings\Administrator\Local Settings\Application Data\GDIPFONTCACHEV1.DAT

2010-07-08 12:39 . 2010-07-08 12:39 128886 ----a-w- c:\windows\Internet Logs\vsmon_2nd_2010_07_08_08_34_29_small.dmp.zip

2010-07-08 12:34 . 2010-07-08 12:34 2077696 ----a-w- c:\windows\Internet Logs\xDB39.tmp

2010-07-08 12:31 . 2009-11-02 01:28 17183057 ----a-w- c:\windows\Internet Logs\tvDebug.Zip

2010-07-08 05:31 . 2010-07-08 12:33 2077696 ----a-w- c:\windows\Internet Logs\xDB38.tmp

2010-06-27 18:13 . 2010-06-27 18:17 2062848 ----a-w- c:\windows\Internet Logs\xDB37.tmp

2010-06-27 17:57 . 2010-06-27 18:04 2062848 ----a-w- c:\windows\Internet Logs\xDB36.tmp

2010-06-26 04:21 . 2010-06-26 04:48 2059264 ----a-w- c:\windows\Internet Logs\xDB35.tmp

2010-06-25 09:52 . 2010-06-25 17:40 2054144 ----a-w- c:\windows\Internet Logs\xDB34.tmp

2008-01-05 21:56 . 2009-03-08 05:52 22 -csha-w- c:\windows\SMINST\HPCD.SYS

.

<pre>
c:\program files\AIM6\aim6 .exe
c:\program files\AVG\AVG9\avgtray .exe
c:\program files\Common Files\Java\Java Update\jusched .exe
c:\program files\HPQ\HP Wireless Assistant\HP Wireless Assistant .exe
c:\program files\iTunes\iTunesHelper .exe
c:\program files\QuickTime\QTTask .exe
c:\program files\Spybot - Search & Destroy\TeaTimer .exe
c:\program files\Synaptics\SynTP\SynTPEnh .exe
c:\windows\SMINST\RecGuard .exe
</pre>

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))

.

.

*Note* empty entries & legit default entries are not shown

REGEDIT4

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]

"SpybotSD TeaTimer"="c:\program files\Spybot - Search & Destroy\TeaTimer.exe" [N/A]

"Aim6"="c:\program files\AIM6\aim6 .exe" [2009-05-19 49968]

"Google Update"="c:\documents and settings\Judy\Local Settings\Application Data\Google\Update\GoogleUpdate.exe" [2009-03-23 133104]

"WMPNSCFG"="c:\program files\Windows Media Player\WMPNSCFG.exe" [N/A]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]

"hpWirelessAssistant"="c:\program files\hpq\HP Wireless Assistant\HP Wireless Assistant.exe" [N/A]

"ZoneAlarm Client"="c:\program files\Zone Labs\ZoneAlarm\zlclient.exe" [2009-02-16 981384]

"AVG9_TRAY"="c:\progra~1\AVG\AVG9\avgtray.exe" [N/A]

"iTunesHelper"="c:\program files\iTunes\iTunesHelper.exe" [2009-05-30 292136]

[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\RunOnce]

"SWHelper"="c:\windows\system32\Macromed\Shockwave 10\PostUpdate.exe" [2010-08-16 53248]

c:\documents and settings\Judy\Start Menu\Programs\Startup\

CurseClientStartup.ccip [2009-12-16 0]

ERUNT AutoBackup.lnk - c:\program files\ERUNT\AUTOBACK.EXE [2005-10-20 38912]

OpenOffice.org 3.2.lnk - c:\program files\OpenOffice.org 3\program\quickstart.exe [2009-12-15 384000]

Secunia PSI.lnk - c:\program files\Secunia\PSI\psi.exe [2009-8-21 900816]

c:\documents and settings\All Users\Start Menu\Programs\Startup\

Adobe Reader Speed Launch.lnk - c:\program files\Adobe\Acrobat 7.0\Reader\reader_sl.exe [2005-9-23 29696]

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\avgrsstarter]

2010-07-27 21:36 12536 ----a-w- c:\windows\system32\avgrsstx.dll

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\windows]

"RequireSignedAppInit_DLLs"=1 (0x1)

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\Lavasoft Ad-Aware Service]

@=""

HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\QuickTime Task

HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\SunJavaUpdateSched

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\CTFMON.EXE]

[N/A]

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecFirewall]

"DisableMonitoring"=dword:00000001

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\ZoneLabsFirewall]

"DisableMonitoring"=dword:00000001

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]

"EnableFirewall"= 0 (0x0)

"DisableNotifications"= 1 (0x1)

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]

"%windir%\\system32\\sessmgr.exe"=

"c:\\WINDOWS\\system32\\mqsvc.exe"=

"%windir%\\Network Diagnostic\\xpnetdiag.exe"=

"c:\\Program Files\\Ventrilo\\Ventrilo.exe"=

"c:\\Program Files\\World of Warcraft\\Launcher.exe"=

"c:\\Program Files\\Common Files\\AOL\\Loader\\aolload.exe"=

"c:\\Program Files\\Mozilla Firefox\\firefox.exe"=

"c:\\Program Files\\Windows Live\\Messenger\\wlcsdk.exe"=

"c:\\Program Files\\Windows Live\\Messenger\\msnmsgr.exe"=

"c:\\Program Files\\World of Warcraft\\BackgroundDownloader.exe"=

"c:\\Program Files\\World of Warcraft\\WoW-3.1.3.9947-to-3.2.0.10192-enUS-downloader.exe"=

"c:\\Program Files\\World of Warcraft\\WoW-3.2.0.10192-to-3.2.0.10314-enUS-downloader.exe"=

"c:\\Program Files\\Messenger\\msmsgs.exe"=

"c:\\Program Files\\Kodak\\Kodak EasyShare software\\bin\\EasyShare.exe"=

"c:\\Documents and Settings\\Judy\\Local Settings\\Application Data\\Google\\Google Talk Plugin\\googletalkplugin.dll"=

"c:\\Documents and Settings\\Judy\\Local Settings\\Application Data\\Google\\Google Talk Plugin\\googletalkplugin.exe"=

"c:\\Program Files\\AVG\\AVG9\\avgemc.exe"=

"c:\\Program Files\\AVG\\AVG9\\avgupd.exe"=

"c:\\Program Files\\AVG\\AVG9\\avgnsx.exe"=

"c:\\Program Files\\iTunes\\iTunes.exe"=

"c:\\Program Files\\Bonjour\\mDNSResponder.exe"=

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\GloballyOpenPorts\List]

"3724:TCP"= 3724:TCP:Blizzard Downloader: 3724

R1 AvgLdx86;AVG Free AVI Loader Driver x86;c:\windows\system32\drivers\avgldx86.sys [5/23/2009 9:30 AM 216400]

R1 AvgTdiX;AVG Free8 Network Redirector;c:\windows\system32\drivers\avgtdix.sys [5/23/2009 9:30 AM 243024]

R2 avg9emc;AVG Free E-mail Scanner;c:\program files\AVG\AVG9\avgemc.exe [7/27/2010 5:34 PM 921952]

R2 avg9wd;AVG Free WatchDog;c:\program files\AVG\AVG9\avgwdsvc.exe [7/27/2010 5:36 PM 308136]

R3 5U870CAP_VID_1262&PID_25FD;HP Pavilion Webcam ;c:\windows\system32\drivers\5U870CAP.sys [6/6/2006 4:39 PM 61952]

S0 fkdl;fkdl;c:\windows\system32\drivers\ndwagps.sys --> c:\windows\system32\drivers\ndwagps.sys [?]

S0 ldebjscv;ldebjscv;c:\windows\system32\drivers\lftitk.sys --> c:\windows\system32\drivers\lftitk.sys [?]

S3 PSI;PSI;c:\windows\system32\drivers\psi_mf.sys [6/17/2009 8:20 AM 12648]

S3 SandraAgentSrv;SiSoftware Deployment Agent Service;c:\program files\SiSoftware\SiSoftware Sandra Lite 2010\RpcAgentSrv.exe [5/31/2010 5:26 PM 93336]

S3 xboxdrv;xboxdrv;\??\c:\windows\system32\xboxdrv.sys --> c:\windows\system32\xboxdrv.sys [?]

[HKEY_LOCAL_MACHINE\software\microsoft\active setup\installed components\{11522865-037B-4E24-99D6-B43A3782302F}]

uaihv27.dll [N/A]

[HKEY_LOCAL_MACHINE\software\microsoft\active setup\installed components\{1DFC0CB0-CE09-4E94-BD01-91C2E9D2A7CA}]

zzir.dll [N/A]

[HKEY_LOCAL_MACHINE\software\microsoft\active setup\installed components\{77D30FCF-771E-4EF4-9DCD-69056CA0B517}]

dfmcd21.dll [N/A]

[HKEY_LOCAL_MACHINE\software\microsoft\active setup\installed components\{7D94FE9D-0031-4911-9D51-2A24CB88120C}]

wokxgism8.dll [N/A]

.

Contents of the 'Scheduled Tasks' folder

2010-09-19 c:\windows\Tasks\GoogleUpdateTaskUserS-1-5-21-550649503-4093617429-2617151104-1005Core.job

- c:\documents and settings\Judy\Local Settings\Application Data\Google\Update\GoogleUpdate.exe [2009-03-23 03:37]

2010-09-22 c:\windows\Tasks\GoogleUpdateTaskUserS-1-5-21-550649503-4093617429-2617151104-1005UA.job

- c:\documents and settings\Judy\Local Settings\Application Data\Google\Update\GoogleUpdate.exe [2009-03-23 03:37]

.

.

------- Supplementary Scan -------

.

uStart Page = hxxp://www.google.com/

uInternet Connection Wizard,ShellNext = hxxp://www.hp.com/go/notebookaccessories

uInternet Settings,ProxyOverride = *.local

IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~4\OFFICE11\EXCEL.EXE/3000

TCP: {4D908843-2D1F-43AF-BC92-EC2AFCB524B7} = 208.67.220.220,208.67.222.222

FF - ProfilePath - c:\documents and settings\Judy\Application Data\Mozilla\Firefox\Profiles\yklwuwgl.default\

FF - prefs.js: browser.startup.homepage - hxxp://www.google.com/

FF - prefs.js: keyword.URL - hxxp://us.yhs.search.yahoo.com/avg/search?fr=yhs-avg&type=yahoo_avg_hs2-tb-web_us&p=

FF - component: c:\program files\AVG\AVG9\Firefox\components\avgssff.dll

FF - plugin: c:\documents and settings\Judy\Application Data\Mozilla\plugins\npgoogletalk.dll

FF - plugin: c:\documents and settings\Judy\Application Data\Mozilla\plugins\npgtpo3dautoplugin.dll

FF - plugin: c:\documents and settings\Judy\Local Settings\Application Data\Google\Update\1.2.183.29\npGoogleOneClick8.dll

FF - HiddenExtension: Microsoft .NET Framework Assistant: {20a82645-c095-46ed-80e3-08825760534b} - c:\windows\Microsoft.NET\Framework\v3.5\Windows Presentation Foundation\DotNetAssistantExtension\

---- FIREFOX POLICIES ----

c:\program files\Mozilla Firefox\greprefs\all.js - pref("network.IDN.whitelist.xn--mgbaam7a8h", true);

c:\program files\Mozilla Firefox\greprefs\all.js - pref("network.IDN.whitelist.xn--mgberp4a5d4ar", true);

c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("dom.ipc.plugins.enabled", false);

.

- - - - ORPHANS REMOVED - - - -

WebBrowser-{CCC7A320-B3CA-4199-B1A6-9F516DD69829} - (no file)

**************************************************************************

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net

Rootkit scan 2010-09-22 15:26

Windows 5.1.2600 Service Pack 3 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

c:\docume~1\Judy\LOCALS~1\Temp\catchme.dll

scan completed successfully

hidden files: 1

**************************************************************************

.

--------------------- LOCKED REGISTRY KEYS ---------------------

[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{A483C63A-CDBC-426E-BF93-872502E8144E}]

@Denied: (A 2) (Everyone)

@="FlashBroker"

"LocalizedString"="@c:\\WINDOWS\\system32\\Macromed\\Flash\\FlashUtil10h_ActiveX.exe,-101"

[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{A483C63A-CDBC-426E-BF93-872502E8144E}\Elevation]

"Enabled"=dword:00000001

[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{A483C63A-CDBC-426E-BF93-872502E8144E}\LocalServer32]

@="c:\\WINDOWS\\system32\\Macromed\\Flash\\FlashUtil10h_ActiveX.exe"

[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{A483C63A-CDBC-426E-BF93-872502E8144E}\TypeLib]

@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"

[HKEY_LOCAL_MACHINE\software\Classes\Interface\{E3F2C3CB-5EB8-4A04-B22C-7E3B4B6AF30F}]

@Denied: (A 2) (Everyone)

@="IFlashBroker4"

[HKEY_LOCAL_MACHINE\software\Classes\Interface\{E3F2C3CB-5EB8-4A04-B22C-7E3B4B6AF30F}\ProxyStubClsid32]

@="{00020424-0000-0000-C000-000000000046}"

[HKEY_LOCAL_MACHINE\software\Classes\Interface\{E3F2C3CB-5EB8-4A04-B22C-7E3B4B6AF30F}\TypeLib]

@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"

"Version"="1.0"

.

Completion time: 2010-09-22 15:28:55

ComboFix-quarantined-files.txt 2010-09-22 19:28

Pre-Run: 25,470,263,296 bytes free

Post-Run: 25,666,981,888 bytes free

WindowsXP-KB310994-SP2-Pro-BootDisk-ENU.exe

[boot loader]

timeout=2

default=multi(0)disk(0)rdisk(0)partition(1)\WINDOWS

[operating systems]

c:\cmdcons\BOOTSECT.DAT="Microsoft Windows Recovery Console" /cmdcons

UnsupportedDebug="do not select this" /debug

multi(0)disk(0)rdisk(0)partition(1)\WINDOWS="Windows XP Media Center Edition" /noexecute=optin /fastdetect

Current=5 Default=5 Failed=4 LastKnownGood=6 Sets=1,4,5,6

- - End Of File - - 646072914A550F7EC76F822533FA5EA5

Thank you very much for your time and generosity.

Link to post
Share on other sites

Hi,

1. Close any open browsers.

2. Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.

3. Open notepad and copy/paste the text in the codebox below into it:

http://forums.malwarebytes.org/index.php?showtopic=63056

Collect::
c:\windows\system32\drivers\ndwagps.sys
c:\windows\system32\drivers\lftitk.sys
c:\windows\system32\xboxdrv.sys

Driver::
fkdl
ldebjscv
xboxdrv

Registry::
[-HKEY_LOCAL_MACHINE\software\microsoft\active setup\installed components\{11522865-037B-4E24-99D6-B43A3782302F}]
[-HKEY_LOCAL_MACHINE\software\microsoft\active setup\installed components\{1DFC0CB0-CE09-4E94-BD01-91C2E9D2A7CA}]
[-HKEY_LOCAL_MACHINE\software\microsoft\active setup\installed components\{77D30FCF-771E-4EF4-9DCD-69056CA0B517}]
[-HKEY_LOCAL_MACHINE\software\microsoft\active setup\installed components\{7D94FE9D-0031-4911-9D51-2A24CB88120C}]

RenV::
c:\program files\AIM6\aim6 .exe
c:\program files\AVG\AVG9\avgtray .exe
c:\program files\Common Files\Java\Java Update\jusched .exe
c:\program files\HPQ\HP Wireless Assistant\HP Wireless Assistant .exe
c:\program files\iTunes\iTunesHelper .exe
c:\program files\QuickTime\QTTask .exe
c:\program files\Spybot - Search & Destroy\TeaTimer .exe
c:\program files\Synaptics\SynTP\SynTPEnh .exe
c:\windows\SMINST\RecGuard .exe

KillAll::

Save this as CFScript.txt, in the same location as ComboFix.exe

CFScriptB-4.gif

Refering to the picture above, drag CFScript into ComboFix.exe

When finished, it shall produce a log for you at C:\ComboFix.txt which I will require in your next reply.

Link to post
Share on other sites

The resulting log follows...

ComboFix 10-09-22.02 - Judy 09/22/2010 20:26:54.8.2 - x86

Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.1014.437 [GMT -4:00]

Running from: c:\documents and settings\Judy\Desktop\ComboFix.exe

Command switches used :: c:\documents and settings\Judy\Desktop\CFScript.txt

AV: AVG Anti-Virus Free *On-access scanning disabled* (Updated) {17DDD097-36FF-435F-9E1B-52D74245D6BF}

FW: ZoneAlarm Firewall *enabled* {829BDA32-94B3-44F4-8446-F8FCFF809F8B}

.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))

.

.

((((((((((((((((((((((((((((((((((((((( Drivers/Services )))))))))))))))))))))))))))))))))))))))))))))))))

.

-------\Service_fkdl

-------\Service_ldebjscv

-------\Service_xboxdrv

((((((((((((((((((((((((( Files Created from 2010-08-23 to 2010-09-23 )))))))))))))))))))))))))))))))

.

2010-09-15 01:29 . 2010-09-15 01:30 -------- d-----w- c:\documents and settings\Judy\Application Data\MSNInstaller

2010-09-08 17:17 . 2010-09-11 03:04 188496 ----a-w- c:\documents and settings\Judy\Local Settings\Application Data\prvlcl.dat

2010-08-25 00:21 . 2010-08-25 00:21 -------- d-----w- c:\windows\system32\Adobe

.

(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))

.

2010-09-23 00:35 . 2009-03-22 07:08 -------- d-----w- c:\program files\Spybot - Search & Destroy

2010-09-23 00:26 . 2010-05-19 13:26 -------- d-----w- c:\program files\QuickTime

2010-09-23 00:26 . 2009-10-26 06:34 -------- d-----w- c:\program files\iTunes

2010-09-23 00:26 . 2009-06-19 03:06 -------- d-----w- c:\program files\AIM6

2010-09-22 19:11 . 2010-05-05 05:41 824696 ----a-w- c:\documents and settings\LocalService\Local Settings\Application Data\FontCache3.0.0.0.dat

2010-09-22 18:08 . 2009-03-21 02:50 664 ----a-w- c:\windows\system32\d3d9caps.dat

2010-09-19 23:48 . 2010-04-21 22:16 1 ----a-w- c:\documents and settings\Judy\Application Data\OpenOffice.org\3\user\uno_packages\cache\stamp.sys

2010-09-07 01:21 . 2005-10-13 01:07 874240 ----a-w- c:\windows\system32\drivers\iaStor.sys

2010-09-04 08:57 . 2009-03-21 17:18 46 ----a-w- c:\documents and settings\Judy\jagex_runescape_preferences.dat

2010-09-04 08:30 . 2009-09-03 23:42 99 ----a-w- c:\documents and settings\Judy\jagex_runescape_preferences2.dat

2010-08-31 16:11 . 2010-08-31 16:11 3401880 ----a-w- c:\documents and settings\Judy\Application Data\Mozilla\plugins\npgtpo3dautoplugin.dll

2010-08-31 15:55 . 2010-08-31 15:55 275096 ----a-w- c:\documents and settings\Judy\Application Data\Mozilla\plugins\npgoogletalk.dll

2010-08-31 15:39 . 2010-08-31 15:39 3734536 ----a-w- c:\documents and settings\Judy\Application Data\Mozilla\plugins\Google Talk Plugin Extras\d3dx9_36.dll

2010-08-07 06:00 . 2010-08-07 06:00 0 ----a-w- c:\documents and settings\Judy\jagex__preferences3.dat

2010-08-01 23:33 . 2010-08-01 23:33 99664 ----a-w- c:\windows\Internet Logs\vsmon_2nd_2010_08_01_16_34_26_small.dmp.zip

2010-08-01 20:34 . 2010-08-01 23:28 2096640 ----a-w- c:\windows\Internet Logs\xDB3B.tmp

2010-08-01 20:34 . 2010-08-01 23:28 1187840 ----a-w- c:\windows\Internet Logs\xDB3A.tmp

2010-07-27 21:36 . 2009-05-23 13:30 243024 ----a-w- c:\windows\system32\drivers\avgtdix.sys

2010-07-27 21:36 . 2010-07-27 21:36 12536 ----a-w- c:\windows\system32\avgrsstx.dll

2010-07-27 21:34 . 2009-05-23 13:30 216400 ----a-w- c:\windows\system32\drivers\avgldx86.sys

2010-07-14 23:37 . 2009-06-02 22:25 16 ----a-w- c:\windows\popcinfot.dat

2010-07-09 03:23 . 2006-09-12 06:39 79456 -c--a-w- c:\documents and settings\Administrator\Local Settings\Application Data\GDIPFONTCACHEV1.DAT

2010-07-08 12:39 . 2010-07-08 12:39 128886 ----a-w- c:\windows\Internet Logs\vsmon_2nd_2010_07_08_08_34_29_small.dmp.zip

2010-07-08 12:34 . 2010-07-08 12:34 2077696 ----a-w- c:\windows\Internet Logs\xDB39.tmp

2010-07-08 12:31 . 2009-11-02 01:28 17183057 ----a-w- c:\windows\Internet Logs\tvDebug.Zip

2010-07-08 05:31 . 2010-07-08 12:33 2077696 ----a-w- c:\windows\Internet Logs\xDB38.tmp

2010-06-27 18:13 . 2010-06-27 18:17 2062848 ----a-w- c:\windows\Internet Logs\xDB37.tmp

2010-06-27 17:57 . 2010-06-27 18:04 2062848 ----a-w- c:\windows\Internet Logs\xDB36.tmp

2010-06-26 04:21 . 2010-06-26 04:48 2059264 ----a-w- c:\windows\Internet Logs\xDB35.tmp

2010-06-25 09:52 . 2010-06-25 17:40 2054144 ----a-w- c:\windows\Internet Logs\xDB34.tmp

2008-01-05 21:56 . 2009-03-08 05:52 22 -csha-w- c:\windows\SMINST\HPCD.SYS

.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))

.

.

*Note* empty entries & legit default entries are not shown

REGEDIT4

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]

"SpybotSD TeaTimer"="c:\program files\Spybot - Search & Destroy\TeaTimer.exe" [2009-03-05 2260480]

"Google Update"="c:\documents and settings\Judy\Local Settings\Application Data\Google\Update\GoogleUpdate.exe" [2009-03-23 133104]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]

"hpWirelessAssistant"="c:\program files\hpq\HP Wireless Assistant\HP Wireless Assistant.exe" [2006-05-04 458752]

"ZoneAlarm Client"="c:\program files\Zone Labs\ZoneAlarm\zlclient.exe" [2009-02-16 981384]

"AVG9_TRAY"="c:\progra~1\AVG\AVG9\avgtray.exe" [2010-04-21 2064736]

"iTunesHelper"="c:\program files\iTunes\iTunesHelper.exe" [2009-05-30 292136]

[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\RunOnce]

"SWHelper"="c:\windows\system32\Macromed\Shockwave 10\PostUpdate.exe" [2010-08-16 53248]

c:\documents and settings\Judy\Start Menu\Programs\Startup\

CurseClientStartup.ccip [2009-12-16 0]

ERUNT AutoBackup.lnk - c:\program files\ERUNT\AUTOBACK.EXE [2005-10-20 38912]

OpenOffice.org 3.2.lnk - c:\program files\OpenOffice.org 3\program\quickstart.exe [2009-12-15 384000]

Secunia PSI.lnk - c:\program files\Secunia\PSI\psi.exe [2009-8-21 900816]

c:\documents and settings\All Users\Start Menu\Programs\Startup\

Adobe Reader Speed Launch.lnk - c:\program files\Adobe\Acrobat 7.0\Reader\reader_sl.exe [2005-9-23 29696]

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\avgrsstarter]

2010-07-27 21:36 12536 ----a-w- c:\windows\system32\avgrsstx.dll

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\windows]

"RequireSignedAppInit_DLLs"=1 (0x1)

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\Lavasoft Ad-Aware Service]

@=""

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecFirewall]

"DisableMonitoring"=dword:00000001

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\ZoneLabsFirewall]

"DisableMonitoring"=dword:00000001

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]

"EnableFirewall"= 0 (0x0)

"DisableNotifications"= 1 (0x1)

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]

"%windir%\\system32\\sessmgr.exe"=

"c:\\WINDOWS\\system32\\mqsvc.exe"=

"%windir%\\Network Diagnostic\\xpnetdiag.exe"=

"c:\\Program Files\\Ventrilo\\Ventrilo.exe"=

"c:\\Program Files\\World of Warcraft\\Launcher.exe"=

"c:\\Program Files\\Common Files\\AOL\\Loader\\aolload.exe"=

"c:\\Program Files\\Mozilla Firefox\\firefox.exe"=

"c:\\Program Files\\Windows Live\\Messenger\\wlcsdk.exe"=

"c:\\Program Files\\Windows Live\\Messenger\\msnmsgr.exe"=

"c:\\Program Files\\World of Warcraft\\BackgroundDownloader.exe"=

"c:\\Program Files\\World of Warcraft\\WoW-3.1.3.9947-to-3.2.0.10192-enUS-downloader.exe"=

"c:\\Program Files\\World of Warcraft\\WoW-3.2.0.10192-to-3.2.0.10314-enUS-downloader.exe"=

"c:\\Program Files\\Messenger\\msmsgs.exe"=

"c:\\Program Files\\Kodak\\Kodak EasyShare software\\bin\\EasyShare.exe"=

"c:\\Documents and Settings\\Judy\\Local Settings\\Application Data\\Google\\Google Talk Plugin\\googletalkplugin.dll"=

"c:\\Documents and Settings\\Judy\\Local Settings\\Application Data\\Google\\Google Talk Plugin\\googletalkplugin.exe"=

"c:\\Program Files\\AVG\\AVG9\\avgemc.exe"=

"c:\\Program Files\\AVG\\AVG9\\avgupd.exe"=

"c:\\Program Files\\AVG\\AVG9\\avgnsx.exe"=

"c:\\Program Files\\iTunes\\iTunes.exe"=

"c:\\Program Files\\Bonjour\\mDNSResponder.exe"=

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\GloballyOpenPorts\List]

"3724:TCP"= 3724:TCP:Blizzard Downloader: 3724

R1 AvgLdx86;AVG Free AVI Loader Driver x86;c:\windows\system32\drivers\avgldx86.sys [5/23/2009 9:30 AM 216400]

R1 AvgTdiX;AVG Free8 Network Redirector;c:\windows\system32\drivers\avgtdix.sys [5/23/2009 9:30 AM 243024]

R2 avg9emc;AVG Free E-mail Scanner;c:\program files\AVG\AVG9\avgemc.exe [7/27/2010 5:34 PM 921952]

R2 avg9wd;AVG Free WatchDog;c:\program files\AVG\AVG9\avgwdsvc.exe [7/27/2010 5:36 PM 308136]

R3 5U870CAP_VID_1262&PID_25FD;HP Pavilion Webcam ;c:\windows\system32\drivers\5U870CAP.sys [6/6/2006 4:39 PM 61952]

S3 PSI;PSI;c:\windows\system32\drivers\psi_mf.sys [6/17/2009 8:20 AM 12648]

S3 SandraAgentSrv;SiSoftware Deployment Agent Service;c:\program files\SiSoftware\SiSoftware Sandra Lite 2010\RpcAgentSrv.exe [5/31/2010 5:26 PM 93336]

.

Contents of the 'Scheduled Tasks' folder

2010-09-19 c:\windows\Tasks\GoogleUpdateTaskUserS-1-5-21-550649503-4093617429-2617151104-1005Core.job

- c:\documents and settings\Judy\Local Settings\Application Data\Google\Update\GoogleUpdate.exe [2009-03-23 03:37]

2010-09-23 c:\windows\Tasks\GoogleUpdateTaskUserS-1-5-21-550649503-4093617429-2617151104-1005UA.job

- c:\documents and settings\Judy\Local Settings\Application Data\Google\Update\GoogleUpdate.exe [2009-03-23 03:37]

.

.

------- Supplementary Scan -------

.

uStart Page = hxxp://www.google.com/

uInternet Connection Wizard,ShellNext = hxxp://www.hp.com/go/notebookaccessories

uInternet Settings,ProxyOverride = *.local

IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~4\OFFICE11\EXCEL.EXE/3000

TCP: {4D908843-2D1F-43AF-BC92-EC2AFCB524B7} = 208.67.220.220,208.67.222.222

FF - ProfilePath - c:\documents and settings\Judy\Application Data\Mozilla\Firefox\Profiles\yklwuwgl.default\

FF - prefs.js: browser.startup.homepage - hxxp://www.google.com/

FF - prefs.js: keyword.URL - hxxp://us.yhs.search.yahoo.com/avg/search?fr=yhs-avg&type=yahoo_avg_hs2-tb-web_us&p=

FF - component: c:\program files\AVG\AVG9\Firefox\components\avgssff.dll

FF - plugin: c:\documents and settings\Judy\Application Data\Mozilla\plugins\npgoogletalk.dll

FF - plugin: c:\documents and settings\Judy\Application Data\Mozilla\plugins\npgtpo3dautoplugin.dll

FF - plugin: c:\documents and settings\Judy\Local Settings\Application Data\Google\Update\1.2.183.29\npGoogleOneClick8.dll

FF - HiddenExtension: Microsoft .NET Framework Assistant: {20a82645-c095-46ed-80e3-08825760534b} - c:\windows\Microsoft.NET\Framework\v3.5\Windows Presentation Foundation\DotNetAssistantExtension\

---- FIREFOX POLICIES ----

c:\program files\Mozilla Firefox\greprefs\all.js - pref("network.IDN.whitelist.xn--mgbaam7a8h", true);

c:\program files\Mozilla Firefox\greprefs\all.js - pref("network.IDN.whitelist.xn--mgberp4a5d4ar", true);

c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("dom.ipc.plugins.enabled", false);

.

- - - - ORPHANS REMOVED - - - -

BHO-{51771A02-F117-4917-A014-02DB9095F856} - (no file)

BHO-{68AB17B4-DE31-4DC1-A700-301A4F04C340} - (no file)

HKCU-Run-Aim6 - c:\program files\AIM6\aim6 .exe

HKCU-Run-WMPNSCFG - c:\program files\Windows Media Player\WMPNSCFG.exe

**************************************************************************

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net

Rootkit scan 2010-09-22 20:36

Windows 5.1.2600 Service Pack 3 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully

hidden files: 0

**************************************************************************

.

--------------------- LOCKED REGISTRY KEYS ---------------------

[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{A483C63A-CDBC-426E-BF93-872502E8144E}]

@Denied: (A 2) (Everyone)

@="FlashBroker"

"LocalizedString"="@c:\\WINDOWS\\system32\\Macromed\\Flash\\FlashUtil10h_ActiveX.exe,-101"

[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{A483C63A-CDBC-426E-BF93-872502E8144E}\Elevation]

"Enabled"=dword:00000001

[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{A483C63A-CDBC-426E-BF93-872502E8144E}\LocalServer32]

@="c:\\WINDOWS\\system32\\Macromed\\Flash\\FlashUtil10h_ActiveX.exe"

[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{A483C63A-CDBC-426E-BF93-872502E8144E}\TypeLib]

@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"

[HKEY_LOCAL_MACHINE\software\Classes\Interface\{E3F2C3CB-5EB8-4A04-B22C-7E3B4B6AF30F}]

@Denied: (A 2) (Everyone)

@="IFlashBroker4"

[HKEY_LOCAL_MACHINE\software\Classes\Interface\{E3F2C3CB-5EB8-4A04-B22C-7E3B4B6AF30F}\ProxyStubClsid32]

@="{00020424-0000-0000-C000-000000000046}"

[HKEY_LOCAL_MACHINE\software\Classes\Interface\{E3F2C3CB-5EB8-4A04-B22C-7E3B4B6AF30F}\TypeLib]

@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"

"Version"="1.0"

.

--------------------- DLLs Loaded Under Running Processes ---------------------

- - - - - - - > 'explorer.exe'(3412)

c:\windows\system32\WININET.dll

c:\windows\system32\ieframe.dll

c:\windows\WinSxS\x86_Microsoft.VC80.CRT_1fc8b3b9a1e18e3b_8.0.50727.4053_x-ww_e6967989\MSVCR80.dll

c:\windows\system32\mshtml.dll

c:\windows\system32\msls31.dll

c:\windows\system32\webcheck.dll

c:\windows\system32\WPDShServiceObj.dll

c:\windows\system32\PortableDeviceTypes.dll

c:\windows\system32\PortableDeviceApi.dll

.

------------------------ Other Running Processes ------------------------

.

c:\program files\AVG\AVG9\avgchsvx.exe

c:\program files\AVG\AVG9\avgrsx.exe

c:\program files\AVG\AVG9\avgcsrvx.exe

c:\windows\system32\msdtc.exe

c:\windows\eHome\ehRecvr.exe

c:\windows\eHome\ehSched.exe

c:\program files\Java\jre6\bin\jqs.exe

c:\program files\Common Files\LightScribe\LSSrvc.exe

c:\windows\system32\locator.exe

c:\program files\AVG\AVG9\avgnsx.exe

c:\windows\system32\mqsvc.exe

c:\program files\AVG\AVG9\avgcsrvx.exe

c:\windows\system32\mqtgsvc.exe

c:\windows\system32\dllhost.exe

c:\program files\Kodak\Kodak EasyShare software\bin\EasyShare.exe

c:\program files\OpenOffice.org 3\program\soffice.exe

c:\program files\OpenOffice.org 3\program\soffice.bin

c:\program files\iPod\bin\iPodService.exe

.

**************************************************************************

.

Completion time: 2010-09-22 20:49:18 - machine was rebooted

ComboFix-quarantined-files.txt 2010-09-23 00:49

ComboFix2.txt 2010-09-22 19:28

Pre-Run: 25,344,815,104 bytes free

Post-Run: 25,215,246,336 bytes free

Current=5 Default=5 Failed=4 LastKnownGood=6 Sets=1,2,3,4,5,6

- - End Of File - - EE224B7F9DFB3D314A16014D7B6D2D46

Thank you very much.

Link to post
Share on other sites

Hi,

Download TFC to your desktop

  • Open the file and close any other windows.
  • It will close all programs itself when run, make sure to let it run uninterrupted.
  • Click the Start button to begin the process. The program should not take long to finish its job
  • Once its finished it should reboot your machine, if not, do this yourself to ensure a complete clean

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Start Malwarebytes' Anti-Malware

  • Once the program has loaded, click the "Update" tab and click the "Check For updates" button.
  • Once the updates were downloaded, click the "Scanner" tab, select "Perform Quick Scan", then click Scan.
  • The scan may take some time to finish,so please be patient.
  • When the scan is complete, click OK, then Show Results to view the results.
  • Make sure that everything is checked, and click Remove Selected.
  • When disinfection is completed, a log will open in Notepad and you may be prompted to Restart.(See Extra Note)
  • The log is automatically saved by MBAM and can be viewed by clicking the Logs tab in MBAM.
  • Copy&Paste the entire report in your next reply.

Extra Note:

If MBAM encounters a file that is difficult to remove,you will be presented with 1 of 2 prompts,click OK to either and let MBAM proceed with the disinfection process,if asked to restart the computer,please do so immediatly.

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

I'd like us to scan your machine with ESET OnlineScan

  1. Hold down Control and click on the following link to open ESET OnlineScan in a new window.
    ESET OnlineScan
  2. Click the esetOnline.png button.
  3. For alternate browsers only: (Microsoft Internet Explorer users can skip these steps)

    1. Click on esetSmartInstall.png to download the ESET Smart Installer. Save it to your desktop.
    2. Double click on the esetSmartInstallDesktopIcon.png icon on your desktop.

    3. Check esetAcceptTerms.png
    4. Click the esetStart.png button.
    5. Accept any security warnings from your browser.
    6. Check esetScanArchives.png
    7. Push the Start button.
    8. ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this can take some time.
    9. When the scan completes, push esetListThreats.png
    10. Push esetExport.png, and save the file to your desktop using a unique name, such as ESETScan. Include the contents of this report in your next reply.
    11. Push the esetBack.png button.
    12. Push esetFinish.png

Link to post
Share on other sites

I ran TFC as instructed.

I updated and ran Malwarebytes as instructed. The log follows:

Malwarebytes' Anti-Malware 1.46

www.malwarebytes.org

Database version: 4676

Windows 5.1.2600 Service Pack 3

Internet Explorer 8.0.6001.18702

9/23/2010 1:39:48 PM

mbam-log-2010-09-23 (13-39-48).txt

Scan type: Quick scan

Objects scanned: 152429

Time elapsed: 9 minute(s), 50 second(s)

Memory Processes Infected: 0

Memory Modules Infected: 0

Registry Keys Infected: 1

Registry Values Infected: 0

Registry Data Items Infected: 0

Folders Infected: 0

Files Infected: 0

Memory Processes Infected:

(No malicious items detected)

Memory Modules Infected:

(No malicious items detected)

Registry Keys Infected:

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{68ab17b4-de31-4dc1-a700-301a4f04c340} (Password.Stealer) -> Quarantined and deleted successfully.

Registry Values Infected:

(No malicious items detected)

Registry Data Items Infected:

(No malicious items detected)

Folders Infected:

(No malicious items detected)

Files Infected:

(No malicious items detected)

I ran ESET as instructed. It found 8 items. The log follows:

C:\Qoobox\Quarantine\C\Documents and Settings\Judy\Local Settings\Application Data\{4C5E87FD-822C-40E8-8014-6E99B894CBCB}\chrome\content\overlay.xul.vir probably a variant of Win32/Agent.NVQFFQI trojan cleaned by deleting - quarantined

C:\Qoobox\Quarantine\C\WINDOWS\system32\USRINI~1.EXE.vir a variant of Win32/Kryptik.GUK trojan cleaned by deleting - quarantined

C:\Qoobox\Quarantine\C\WINDOWS\system32\Drivers\iaStor.sys.vir Win32/Olmarik.UI trojan cleaned - quarantined

C:\System Volume Information\_restore{3A579F61-82CF-4117-919A-DB7B394CD5BC}\RP27\A0031820.bat BAT/Agent.NFC trojan cleaned by deleting - quarantined

C:\WINDOWS\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\71E603SB\INSTALL[1] Win32/Adware.Antivirus2010 application cleaned by deleting - quarantined

C:\WINDOWS\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\BXSO478J\default[1] Win32/Adware.Antivirus2010 application cleaned by deleting - quarantined

C:\WINDOWS\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\BXSO478J\dialog_attack[1] Win32/Adware.Antivirus2010 application cleaned by deleting - quarantined

C:\WINDOWS\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\ON38ZRXW\script[1] Win32/Adware.Antivirus2010 application cleaned by deleting - quarantined

Again, many thanks for your time and consideration.

Judy Lee

Link to post
Share on other sites

Hi,

Your logs appear to be clean now. There is only a bit of cleanup that we will deal with in this post, as well as prevention from future infections. :)

Remove Combofix now that we're done with it.

  • Please press the Windows Key and R on your keyboard. This will bring up the Run... command.
  • Now type in Combofix /Uninstall in the runbox and click OK. (Notice the space between the "x" and "/")
    CF_Uninstall-1.jpg
  • Please follow the prompts to uninstall Combofix.
  • You will then recieve a message saying Combofix was uninstalled successfully once it's done uninstalling itself.

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

  • Download OTC to your desktop and run it
  • A list of tool components used in the Cleanup of malware will be downloaded.
  • If your Firewall or Real Time protection attempts to block OTC to reach the Internet, please allow the application to do so.
  • Click Yes to begin the Cleanup process and remove these components, including this application.
  • You will be asked to reboot the machine to finish the Cleanup process. If you are asked to reboot the machine choose Yes.

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Keep a backup of your important files

Now, more than ever, it's especially important to protect your digital files and memories. This article is full of good information on alternatives for home backup solutions.

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Make proper use of your anti-virus and firewall

You should keep your anti-virus and firewall guard enabled at all times, don't shut them off unless there's a specific reason to do so.

Also, regularly performing a full system scan with your anti-virus program is a good idea to make sure nothing has slipped through your protection. Once every two weeks works well for many people. You can set the scan to run during a time when you don't plan to use the computer and just leave it to complete on its own.

Keep in mind that anti-virus programs are far from perfect. They don't protect you against every piece of malware that's out there, so don't trust them blindly. If an anti-virus reports a file as 'clean' then it's doesn't necessarily has to mean it is.

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Keep all your software updated

It is important to keep up on system updates from Microsoft by regularly checking their website at: http://windowsupdate.microsoft.com/, as these patch critical security vulnerabilities and help to keep you safe.

It's also important to keep programs up to date so that malware doesn't exploit any old security flaws. FileHippo Update Checker is an extremely helpful program that will tell you which of your programs need to be updated. Java and Adobe Reader are two of the main security vulnerabilities. You can find the latest version of Java here, you will want the Java SE Runtime Environment (JRE) one. You can find the latest version of Adobe Reader here.

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Use a safer web browser

Internet Explorer is not the most secure tool for browsing the web. It has been known to be very susceptible to infection, and there are a couple good free alternatives: Firefox and Opera. Both are excellent faster, safer, more powerful and functional free alternatives to Internet Explorer. It's definitely worth the short period of adjustment to start using one of these. If you wish to continue using Internet Explorer, it would be a good idea to follow the tutorial here which will help you to make IE much safer.

If you decide to use the Firefox browser, the McAfee SiteAdvisor add-on will nicely help to enhance your security. This add-on tells you whether the sites you are about to visit are safe or not. A must if you do a lot of Googling.

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Some other security programs

It is wise these days to have a few security programs installed and running on your machine except from just an anti-virus and a firewall. I will list some of them.

  • A good anti-spyware program installed on your pc is very important to help remove any spyware that may have gotten on your computer. I highly recommend Malwarebytes' Anti-Malware.
  • SpywareBlaster to help prevent spyware from installing in the first place.
  • MVPS Hosts file replaces your current HOSTS file with one containing well known ad sites and other bad sites. This prevents your computer from connecting to those sites in the future.

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Be careful

Having security programs installed is very helpful to you, but none of them have the gift of human thought. The best way to make sure you don't get infected is to exercise common sense. Be careful of what websites you visit - if a site looks suspicious, trust your instincts and get out of there. Be careful of what attachments you open in emails and files you download from websites - check them over carefully to make sure that you know what you're getting.

Using peer-to-peer programs (eg: LimeWire, BitTorrent, uTorrent, Kazaa) or downloading cracks and keygens is something else to avoid. These are the most common way to get infected. Malware writers use these programs to spread infections as it is the easiest way for them. The majority of infections we see in the Malware Removal forum are due to people using p2p programs to download cracks/keygens/warez. These are not only illegal, but will always contain some form of malware. You have no way of verifying that the things you download are legitimate or that they don't contain malware. Even with an up to date anti-virus and firewall, some of these things will still infect you. It is highly recommend that you uninstall all peer-to-peer programs. It just isn't worth it.

Other common ways of getting infected are dis-reputable sites forcing you to download and install a codec. Or viruses using Instant Messaging programs (Windows Live Messenger, MSN Messenger, AIM) to send a file claiming it to be "photos" from a friend, only for it to turn out to be a virus.

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Slow computer?

If your computer begins to slow down in the future for no particular reason, your first step should not be to come to the malware forum. As your computer ages and is used, it's parts wear, files and programs accumulate, and its performance can decrease. To restore your computer's performance to its best possible level, follow the steps in this page written by malware expert Miekiemoes.

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

I'll leave this thread open for a couple days in case you come across any lingering problems that need fixing, then I'll close it up. If you need it reopened for any reason just shoot me a PM. It's been a pleasure working with you, now best of luck!

Cheers,

Gammo :)

Link to post
Share on other sites

Again many thanks for your time and expertise.

I followed the clean up routines to the letter. To be honest, that last scan by ESET finding 8 items had me kinda scared.

I have read that the pay-version of Malwarebytes provides extra security against these sorts of infections, and that sounds like a good idea since this laptop is shared by my 2 teenage sons.

Can you explain what I would be getting with the pay-version of Malwarebytes that I'm not getting on the free one?

Would I need to purchase it for each computer? Or is the license issued for my use of each of my computers?

Truly ... you guys/gals totally ROCK!

Hugs,

Judy Lee

:)

Link to post
Share on other sites

Hi,

You're welcome. Glad I could help. :)

Can you explain what I would be getting with the pay-version of Malwarebytes that I'm not getting on the free one?

Activating the full version unlocks real-time protection, scheduled scanning, and scheduled updating.

Would I need to purchase it for each computer?

Yes, but it is a "lifetime license". You don't have to renew it each year.

Link to post
Share on other sites

  • 3 weeks later...

Glad we could help. :o

If you need this topic reopened, please send a Private Message to any one of the moderating team members. Please include a link to this thread with your request. This applies only to the originator of this thread.

Other members who need assistance please start your own topic in a new thread. Thanks!

Link to post
Share on other sites

Guest
This topic is now closed to further replies.
  • Recently Browsing   0 members

    • No registered users viewing this page.
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.