Jump to content

Browser Hijack + Win32 Generic Host Process Errors - Help needed


Recommended Posts

Hello Malwarebytes, over the past few weeks I have been experiencing lots of problems which seem to be indicative of a browser hijack of some sort. I am running Windows XP Service Pack 3.

The first symptom I had was that Google Chrome (my original browser) would crash about every 20-30 minutes for no apparent reason.

Next came the "Win32 generic host process has encountered a problem and needs to close". When this would happen, many applications would stop working and eventually the system would freeze up.

At this point I only had Sophos Antivirus which is the free AV provided by my university.

I downloaded and ran Spybot S&D, SpywareBlaster, Ad-Aware, Browser Hijack Recover, CWShredder, Smitfraudfix, Winsockxpfix and lspfix.

Since I installed Ad-Aware, sometimes Ad-Watch Live! Alert pops up and says: "Ad-Watch Live! has blocked svchost.exe from connecting to a malicious website on the Internet".

After running scans with these and removing a lot of spyware/malware, I did not see the Win32 error as often. However, Google Chrome would no longer launch at all, but it would show up in the Task Manager process list. I have since switched to Mozilla Firefox as my browser.

Now in Firefox, tabs to advertising/unwanted websites launch by themselves if my browser is already open. Also, I get redirected to similar sites when clicking a link in Google.

Also, I thought my Generic Win32 host process errors had gone away, but I just got it again while I was typing this and I was forced to restart! However, sometimes my system does not freeze up after this error. This time I wasn't so lucky.

I just want to get the full story out there, I really appreciate anyone reading this and helping me out.

Anyway I have fully followed the instructions in the sticky and I will attach the logs from DDS/GMER. I ran Malwarebytes Anti-Malware, Defogger, DDS and GMER.

Here is the log from HijackThis:

Logfile of Trend Micro HijackThis v2.0.2

Scan saved at 2:21:22 PM, on 10/18/2010

Platform: Windows XP SP3 (WinNT 5.01.2600)

MSIE: Internet Explorer v8.00 (8.00.6001.18702)

Boot mode: Normal

Running processes:

C:\WINDOWS\System32\smss.exe

C:\WINDOWS\system32\winlogon.exe

C:\WINDOWS\system32\services.exe

C:\WINDOWS\system32\lsass.exe

C:\WINDOWS\system32\svchost.exe

C:\WINDOWS\System32\svchost.exe

C:\Program Files\Lavasoft\Ad-Aware\AAWService.exe

C:\WINDOWS\system32\spoolsv.exe

C:\WINDOWS\System32\svchost.exe

C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe

C:\Program Files\Bonjour\mDNSResponder.exe

C:\WINDOWS\system32\cisvc.exe

C:\Program Files\Java\jre6\bin\jqs.exe

C:\Program Files\Common Files\LightScribe\LSSrvc.exe

C:\Program Files\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE

C:\WINDOWS\System32\svchost.exe

C:\Program Files\NVIDIA Corporation\nTune\nTuneService.exe

C:\WINDOWS\system32\nvsvc32.exe

C:\WINDOWS\System32\svchost.exe

C:\Program Files\Sophos\Sophos Anti-Virus\SAVAdminService.exe

C:\Program Files\Sophos\AutoUpdate\ALsvc.exe

c:\Program Files\Microsoft SQL Server\90\Shared\sqlwriter.exe

C:\Program Files\Alcohol Soft\Alcohol 120\StarWind\StarWindServiceAE.exe

C:\WINDOWS\system32\wuauclt.exe

C:\WINDOWS\Explorer.EXE

C:\WINDOWS\system32\RUNDLL32.EXE

C:\Program Files\Adobe\Acrobat 8.0\Acrobat\Acrotray.exe

C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe

C:\Program Files\Sophos\AutoUpdate\ALMon.exe

C:\Program Files\Common Files\Macrovision Shared\FLEXnet Publisher\FNPLicensingService.exe

C:\Program Files\Lavasoft\Ad-Aware\AAWTray.exe

C:\Documents and Settings\Administrator\Desktop\dds.com

C:\WINDOWS\system32\cmd.exe

C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

C:\WINDOWS\system32\cmd.exe

C:\Documents and Settings\Administrator\Local Settings\Temp\1.tmp\SWREG.DAT

O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelper.dll

O2 - BHO: Sophos Web Content Scanner - {39EA7695-B3F2-4C44-A4BC-297ADA8FD235} - C:\Program Files\Sophos\Sophos Anti-Virus\SophosBHO.dll

O2 - BHO: Spybot-S&D IE Protection - {53707962-6F74-2D53-2644-206D7942484F} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll

O2 - BHO: Adobe PDF Conversion Toolbar Helper - {AE7CD045-E861-484f-8273-0445EE161910} - C:\Program Files\Adobe\Acrobat 8.0\Acrobat\AcroIEFavClient.dll

O2 - BHO: Java Plug-In 2 SSV Helper - {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Program Files\Java\jre6\bin\jp2ssv.dll

O2 - BHO: JQSIEStartDetectorImpl - {E7E6F031-17CE-4C07-BC86-EABFE594F69C} - C:\Program Files\Java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll

O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\system32\NvCpl.dll,NvStartup

O4 - HKLM\..\Run: [NvMediaCenter] RUNDLL32.EXE C:\WINDOWS\system32\NvMcTray.dll,NvTaskbarInit

O4 - HKLM\..\Run: [Acrobat Assistant 8.0] "C:\Program Files\Adobe\Acrobat 8.0\Acrobat\Acrotray.exe"

O4 - HKLM\..\Run: [Adobe ARM] "C:\Program Files\Common Files\Adobe\ARM\1.0\AdobeARM.exe"

O4 - HKCU\..\Run: [spybotSD TeaTimer] C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe

O4 - Global Startup: AutoUpdate Monitor.lnk = C:\Program Files\Sophos\AutoUpdate\ALMon.exe

O6 - HKCU\Software\Policies\Microsoft\Internet Explorer\Restrictions present

O6 - HKCU\Software\Policies\Microsoft\Internet Explorer\Control Panel present

O6 - HKLM\Software\Policies\Microsoft\Internet Explorer\Restrictions present

O6 - HKLM\Software\Policies\Microsoft\Internet Explorer\Control Panel present

O9 - Extra button: (no name) - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll

O9 - Extra 'Tools' menuitem: Spybot - Search & Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll

O10 - Unknown file in Winsock LSP: c:\windows\system32\nwprovau.dll

O16 - DPF: {05CA9FB0-3E3E-4B36-BF41-0E3A5CAA8CD8} (Office Genuine Advantage Validation Tool) - http://go.microsoft.com/fwlink/?linkid=58813

O16 - DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} (MUWebControl Class) - http://www.update.microsoft.com/microsoftu...b?1220408799921

O16 - DPF: {E2883E8F-472F-4FB0-9522-AC9BF37916A7} - http://platformdl.adobe.com/NOS/getPlusPlus/1.6/gp.cab

O17 - HKLM\System\CCS\Services\Tcpip\..\{02924DFA-149C-4B1A-AF3C-1F581350806F}: NameServer = 128.97.10.7,128.97.10.2

O17 - HKLM\System\CS1\Services\Tcpip\..\{02924DFA-149C-4B1A-AF3C-1F581350806F}: NameServer = 128.97.10.7,128.97.10.2

O17 - HKLM\System\CS2\Services\Tcpip\..\{02924DFA-149C-4B1A-AF3C-1F581350806F}: NameServer = 128.97.10.2,128.97.10.7

O17 - HKLM\System\CS3\Services\Tcpip\..\{02924DFA-149C-4B1A-AF3C-1F581350806F}: NameServer = 128.97.10.7,128.97.10.2

O18 - Protocol: skype4com - {FFC8B962-9B40-4DFF-9458-1830C7DD7F5D} - C:\PROGRA~1\COMMON~1\Skype\SKYPE4~1.DLL

O20 - AppInit_DLLs: C:\PROGRA~1\Sophos\SOPHOS~1\SOPHOS~1.DLL

O23 - Service: Apple Mobile Device - Apple Inc. - C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe

O23 - Service: Bonjour Service - Apple Inc. - C:\Program Files\Bonjour\mDNSResponder.exe

O23 - Service: SW Distributed TS Coordinator Service (CoordinatorServiceHost) - Dassault Syst

Link to post
Share on other sites

Hello Charles in Charge! Welcome to Malwarebytes' Anti-Malware Forums!

My name is Borislav and I will be glad to help you solve your problems with malware. Before we begin, please note the following:

  • The process of cleaning your system may take some time, so please be patient.
  • Follow my instructions step by step if there is a problem somewhere, stop and tell me.
  • Stay with the thread until I tell you that your system is clean. Missing symptoms does not mean that everything is okay.
  • Instructions that I give are for your system only!
  • If you don't know or can't understand something please ask.
  • Do not install or uninstall any software or hardware, while work on.
  • Keep me informed about any changes.

Step 1

I see you are running Teatimer.

I suggest you to disable it because it can interfere with the changes you'll make on your system.

When everything is done and your log is clean again, you can enable it again.

If teatimer gives you a warning afterwards that some changes were made, allow this instead of blocking it.

How to disable TeaTimer <== click me for instructions.

After you disabled Teatimer, download ResetTeaTimer.exe to your desktop.

Then run ResetTeaTimer.exe.

This will only take a few seconds.

Step 2

Please, uninstall the following applications:

  1. Adobe Reader 8.2.0

You can read, how to do this here:

Step 3

Please go into the Control Panel, Add/Remove and for now remove ALL versions of JAVA

Then run this tool to help cleanup any left over Java

Your Java is out of date. Older versions have vulnerabilities that malware can use to infect your system.

Please download JavaRa and unzip it to your desktop.

***Please close any instances of Internet Explorer (or other web browser) before continuing!***

  • Double-click on JavaRa.exe to start the program.
  • From the drop-down menu, choose English and click on Select.
  • JavaRa will open; click on Remove Older Versions to remove the older versions of Java installed on your computer.
  • Click Yes when prompted. When JavaRa is done, a notice will appear that a logfile has been produced. Click OK.
  • A logfile will pop up. Please save it to a convenient location and post it back when you reply
    Then look for the following Java folders and if found delete them.
    C:\Program Files\Java
    C:\Program Files\Common Files\Java
    C:\Windows\Sun
    C:\Documents and Settings\All Users\Application Data\Java
    C:\Documents and Settings\All Users\Application Data\Sun\Java
    C:\Documents and Settings\username\Application Data\Java
    C:\Documents and Settings\username\Application Data\Sun\Java

Step 4

**Note: If you need more detailed information, please visit the web page of ComboFix in BleepingComputer. **

Please note that these fixes are not instantaneous. Most infections require more than one round to properly eradicate.

Stay with me until given the 'all clear' even if symptoms diminish. Lack of symptoms does not always mean the job is complete.

Kindly follow my instructions and please do no fixing on your own or running of scanners unless requested by me or another helper.

Please download ComboFix from

Here or Here to your Desktop.

**Note: In the event you already have Combofix, this is a new version that I need you to download. It is important that it is saved and renamed following this process directly to your desktop**

  1. If you are using Firefox, make sure that your download settings are as follows:
    • Open Tools -> Options -> Main tab
    • Set to Always ask me where to Save the files.

[*]During the download, rename Combofix to Combo-Fix as follows:

CF_download_FF.gif

CF_download_rename.gif

[*]It is important you rename Combofix during the download, but not after.

[*]Please do not rename Combofix to other names, but only to the one indicated.

[*]Close any open browsers.

[*]Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.

-----------------------------------------------------------

  • Very Important! Temporarily disable your anti-virus, script blocking and any anti-malware real-time protection before performing a scan. They can interfere with ComboFix or remove some of its embedded files which may cause unpredictable results.
  • Click on this link to see a list of programs that should be disabled. The list is not all inclusive. If yours is not listed and you don't know how to disable it, please ask.

    -----------------------------------------------------------


  • Close any open browsers.
  • WARNING: Combofix will disconnect your machine from the Internet as soon as it starts
  • Please do not attempt to re-connect your machine back to the Internet until Combofix has completely finished.
  • If there is no internet connection after running Combofix, then restart your computer to restore back your connection.

-----------------------------------------------------------

[*]Double click on combo-Fix.exe & follow the prompts.

[*]When finished, it will produce a report for you.

[*]Please post the C:\Combo-Fix.txt for further review.

**Note: Do not mouseclick combo-fix's window while it's running. That may cause it to stall**

In your next reply, please include these log(s):

  1. JavaRa log
  2. ComboFix log

Link to post
Share on other sites

Hello Borislav, thanks for your assistance!

I disabled TeaTimer and ran ResetTeaTimer.exe

I uninstalled Adobe Acrobat 8.2.0

I removed all versions of Java and ran JavaRa (log included) and manually deleted the remaining folders.

I downloaded/renamed Combofix.exe to Combo-Fix.exe

Before running Combo Fix, I disabled Sophos protection, Ad-Aware AdWatch, and SpywareBlaster protection.

I ran ComboFix and the computer rebooted a total of 2 times.

Here is the JavaRa log:

JavaRa 1.16 Removal Log.

Report follows after line.

------------------------------------

The JavaRa removal process was started on Tue Oct 19 15:37:51 2010

Found and removed: C:\Documents and Settings\Administrator\Application Data\Sun\Java\jre1.6.0_12

Found and removed: C:\Documents and Settings\Administrator\Application Data\Sun\Java\jre1.6.0_13

Found and removed: C:\Documents and Settings\Administrator\Application Data\Sun\Java\jre1.6.0_15

Found and removed: C:\Documents and Settings\Administrator\Application Data\Sun\Java\jre1.6.0_17

Found and removed: C:\Documents and Settings\Administrator\Application Data\Sun\Java\jre1.6.0_19

Found and removed: Software\JavaSoft\Java2D\1.5.0_07

Found and removed: SOFTWARE\Classes\CLSID\{CAFEEFAC-0016-0000-0005-ABCDEFFEDCBA}

Found and removed: SOFTWARE\Classes\CLSID\{CAFEEFAC-0016-0000-0005-ABCDEFFEDCBB}

Found and removed: SOFTWARE\Classes\CLSID\{CAFEEFAC-0016-0000-0005-ABCDEFFEDCBC}

Found and removed: SOFTWARE\Microsoft\Active Setup\Installed Components\{08B0E5C0-4FCB-11CF-AAA5-00401C608500}

JavaRa 1.16 Removal Log.

Report follows after line.

------------------------------------

The JavaRa removal process was started on Tue Oct 19 15:38:18 2010

------------------------------------

Finished reporting.

Here is the ComboFix log:

ComboFix 10-10-18.03 - Administrator 10/19/2010 16:19:14.1.2 - x86

Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.1983.1470 [GMT -7:00]

Running from: c:\documents and settings\Administrator\Desktop\Combo-Fix.exe

AV: Sophos Anti-Virus *On-access scanning disabled* (Updated) {3F13C776-3CBE-4DE9-8BF6-09E5183CA2BD}

.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))

.

c:\windows\system32\tmp.reg

Infected copy of c:\windows\system32\drivers\disk.sys was found and disinfected

Restored copy from - Kitty had a snack :)

.

((((((((((((((((((((((((((((((((((((((( Drivers/Services )))))))))))))))))))))))))))))))))))))))))))))))))

.

-------\Legacy_NPF

((((((((((((((((((((((((( Files Created from 2010-09-19 to 2010-10-19 )))))))))))))))))))))))))))))))

.

2010-10-18 19:27 . 2010-10-18 19:27 -------- d-----w- c:\program files\Trend Micro

2010-10-18 19:11 . 2010-10-18 19:11 -------- d-----w- c:\documents and settings\Administrator\Application Data\Malwarebytes

2010-10-18 19:03 . 2010-10-18 19:03 -------- d-----w- c:\documents and settings\All Users\Application Data\Malwarebytes

2010-10-18 19:03 . 2010-04-29 22:39 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys

2010-10-18 19:03 . 2010-10-18 19:03 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware

2010-10-18 19:03 . 2010-04-29 22:39 20952 ----a-w- c:\windows\system32\drivers\mbam.sys

2010-10-16 03:33 . 2010-08-12 12:15 15880 ----a-w- c:\windows\system32\lsdelete.exe

2010-10-15 23:11 . 2010-08-12 12:15 64288 ----a-w- c:\windows\system32\drivers\Lbd.sys

2010-10-15 23:11 . 2010-10-15 23:11 95024 ----a-w- c:\windows\system32\drivers\SBREDrv.sys

2010-10-15 23:08 . 2010-10-15 23:08 -------- d-----w- c:\documents and settings\Administrator\Local Settings\Application Data\Sunbelt Software

2010-10-15 23:07 . 2010-10-15 23:07 -------- dc-h--w- c:\documents and settings\All Users\Application Data\{ECC164E0-3133-4C70-A831-F08DB2940F70}

2010-10-15 23:07 . 2010-10-15 23:07 -------- d-----w- c:\program files\Lavasoft

2010-10-15 22:52 . 2010-10-15 22:58 -------- d-----w- c:\program files\Browser Hijack Recover

2010-10-15 01:38 . 2010-10-15 01:41 -------- d-----w- c:\documents and settings\All Users\Application Data\DivX

2010-09-30 20:36 . 2010-10-15 22:37 -------- d-----w- c:\program files\SpywareBlaster

2010-09-30 20:26 . 2010-09-30 20:26 -------- d-----w- C:\ERDNT

2010-09-30 00:10 . 2010-09-30 00:19 -------- d-----w- c:\documents and settings\All Users\Application Data\Lavasoft

2010-09-29 21:49 . 2010-09-30 20:28 -------- d-----w- c:\program files\Spybot - Search & Destroy

2010-09-29 21:49 . 2010-09-30 00:05 -------- d-----w- c:\documents and settings\All Users\Application Data\Spybot - Search & Destroy

2010-09-29 21:32 . 2010-09-29 22:08 -------- d-----w- C:\Temp

.

(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))

.

.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))

.

.

*Note* empty entries & legit default entries are not shown

REGEDIT4

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]

"NvCplDaemon"="c:\windows\system32\NvCpl.dll" [2007-10-04 8491008]

"NvMediaCenter"="c:\windows\system32\NvMcTray.dll" [2007-10-04 81920]

"Acrobat Assistant 8.0"="c:\program files\Adobe\Acrobat 8.0\Acrobat\Acrotray.exe" [2008-10-15 623992]

c:\documents and settings\All Users\Start Menu\Programs\Startup\

AutoUpdate Monitor.lnk - c:\program files\Sophos\AutoUpdate\ALMon.exe [2010-9-13 245760]

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\Lavasoft Ad-Aware Service]

@="Service"

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\SAVService]

@="service"

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SophosAntiVirus]

"DisableMonitoring"=dword:00000001

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]

"%windir%\\system32\\sessmgr.exe"=

"c:\\Program Files\\D-Link\\PC Agent\\NICA.exe"=

"%windir%\\Network Diagnostic\\xpnetdiag.exe"=

"c:\\Program Files\\Bonjour\\mDNSResponder.exe"=

"c:\\Program Files\\iTunes\\iTunes.exe"=

"c:\\Program Files\\WinSCP\\WinSCP.exe"=

"c:\\Program Files\\Skype\\Plugin Manager\\skypePM.exe"=

"c:\\Program Files\\Skype\\Phone\\Skype.exe"=

"c:\\Documents and Settings\\Administrator\\Desktop\\utorrent.exe"=

"c:\\Program Files\\Microsoft Office\\Office12\\OUTLOOK.EXE"=

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\GloballyOpenPorts\List]

"1036:TCP"= 1036:TCP:Akamai NetSession Interface

"5000:UDP"= 5000:UDP:Akamai NetSession Interface

R0 Lbd;Lbd;c:\windows\system32\drivers\Lbd.sys [10/15/2010 4:11 PM 64288]

R1 SAVOnAccessControl;SAVOnAccessControl;c:\windows\system32\drivers\savonaccesscontrol.sys [9/13/2010 2:08 PM 111232]

R1 SAVOnAccessFilter;SAVOnAccessFilter;c:\windows\system32\drivers\savonaccessfilter.sys [9/13/2010 1:57 PM 38912]

R2 Akamai;Akamai NetSession Interface;c:\windows\System32\svchost.exe -k Akamai [8/4/2004 5:00 AM 14336]

R2 SAVAdminService;Sophos Anti-Virus status reporter;c:\program files\Sophos\Sophos Anti-Virus\SAVAdminService.exe [9/13/2010 1:59 PM 80936]

R2 SAVService;Sophos Anti-Virus;c:\program files\Sophos\Sophos Anti-Virus\SavService.exe [9/13/2010 1:59 PM 98304]

R3 m4cxw2k3;NDIS5.1 Miniport Driver for D-Link PCI Express Ethernet Controller;c:\windows\system32\drivers\m4cxw2k3.sys [2/15/2007 8:04 AM 250752]

R3 NVHDA;Service for NVIDIA HDMI Audio Driver;c:\windows\system32\drivers\nvhda32.sys [9/2/2008 2:49 PM 26272]

S3 CoordinatorServiceHost;SW Distributed TS Coordinator Service;c:\program files\SolidWorks Corp\SolidWorks\swScheduler\DTSCoordinatorService.exe [10/15/2009 6:51 AM 87336]

S3 DualCoreCenter;DualCoreCenter;c:\program files\MSI\DualCoreCenter\NTGLM7X.sys [9/2/2008 3:02 PM 28160]

S3 Lavasoft Ad-Aware Service;Lavasoft Ad-Aware Service;c:\program files\Lavasoft\Ad-Aware\AAWService.exe [8/12/2010 5:15 AM 1357464]

S3 OLYMRYE;OLYMRYE;c:\windows\system32\olymrye.sys [2/21/2003 11:51 AM 7424]

S3 RushTopDevice2;RushTopDevice2;c:\program files\MSI\DualCoreCenter\RushTop.sys [9/2/2008 3:02 PM 51200]

S4 msvsmon80;Visual Studio 2005 Remote Debugger;c:\program files\Microsoft Visual Studio 8\Common7\IDE\Remote Debugger\x86\msvsmon.exe [9/23/2005 7:01 AM 2799808]

S4 SophosBootDriver;SophosBootDriver;c:\windows\system32\drivers\SophosBootDriver.sys [9/13/2010 2:08 PM 14976]

S4 sptd;sptd;c:\windows\system32\drivers\sptd.sys [9/2/2008 6:40 PM 721904]

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\svchost]

HPZ12 REG_MULTI_SZ Pml Driver HPZ12 Net Driver HPZ12

Akamai REG_MULTI_SZ Akamai

.

Contents of the 'Scheduled Tasks' folder

2010-10-19 c:\windows\Tasks\Ad-Aware Update (Weekly).job

- c:\program files\Lavasoft\Ad-Aware\Ad-AwareAdmin.exe [2010-08-12 23:11]

2010-10-18 c:\windows\Tasks\GoogleUpdateTaskUserS-1-5-21-861567501-1383384898-839522115-500Core.job

- c:\documents and settings\Administrator\Local Settings\Application Data\Google\Update\GoogleUpdate.exe [2009-11-03 18:15]

2010-10-19 c:\windows\Tasks\GoogleUpdateTaskUserS-1-5-21-861567501-1383384898-839522115-500UA.job

- c:\documents and settings\Administrator\Local Settings\Application Data\Google\Update\GoogleUpdate.exe [2009-11-03 18:15]

.

.

------- Supplementary Scan -------

.

mWindow Title =

IE: Append to existing PDF - c:\program files\Adobe\Acrobat 8.0\Acrobat\AcroIEFavClient.dll/AcroIEAppend.html

IE: Convert link target to Adobe PDF - c:\program files\Adobe\Acrobat 8.0\Acrobat\AcroIEFavClient.dll/AcroIECapture.html

IE: Convert link target to existing PDF - c:\program files\Adobe\Acrobat 8.0\Acrobat\AcroIEFavClient.dll/AcroIEAppend.html

IE: Convert selected links to Adobe PDF - c:\program files\Adobe\Acrobat 8.0\Acrobat\AcroIEFavClient.dll/AcroIECaptureSelLinks.html

IE: Convert selected links to existing PDF - c:\program files\Adobe\Acrobat 8.0\Acrobat\AcroIEFavClient.dll/AcroIEAppendSelLinks.html

IE: Convert selection to Adobe PDF - c:\program files\Adobe\Acrobat 8.0\Acrobat\AcroIEFavClient.dll/AcroIECapture.html

IE: Convert selection to existing PDF - c:\program files\Adobe\Acrobat 8.0\Acrobat\AcroIEFavClient.dll/AcroIEAppend.html

IE: Convert to Adobe PDF - c:\program files\Adobe\Acrobat 8.0\Acrobat\AcroIEFavClient.dll/AcroIECapture.html

TCP: {02924DFA-149C-4B1A-AF3C-1F581350806F} = 128.97.10.7,128.97.10.2

FF - ProfilePath - c:\documents and settings\Administrator\Application Data\Mozilla\Firefox\Profiles\hum6neyd.default\

FF - prefs.js: browser.startup.homepage - hxxp://www.google.com

FF - component: c:\program files\Mozilla Firefox\extensions\{B13721C7-F507-4982-B2E5-502A71474FED}\components\NPComponent.dll

FF - plugin: c:\documents and settings\Administrator\Local Settings\Application Data\Google\Update\1.2.183.29\npGoogleOneClick8.dll

FF - plugin: c:\program files\DivX\DivX Plus Web Player\npdivx32.dll

FF - plugin: c:\program files\Mozilla Firefox\plugins\NPcol400.dll

FF - plugin: c:\program files\Mozilla Firefox\plugins\npdeployJava1.dll

FF - HiddenExtension: Microsoft .NET Framework Assistant: {20a82645-c095-46ed-80e3-08825760534b} - c:\windows\Microsoft.NET\Framework\v3.5\Windows Presentation Foundation\DotNetAssistantExtension\

---- FIREFOX POLICIES ----

c:\program files\Mozilla Firefox\greprefs\all.js - pref("network.IDN.whitelist.xn--mgbaam7a8h", true);

c:\program files\Mozilla Firefox\greprefs\all.js - pref("network.IDN.whitelist.xn--mgberp4a5d4ar", true);

.

.

------- File Associations -------

.

.scr=AutoCADScriptFile

.

- - - - ORPHANS REMOVED - - - -

HKLM-Run-D-Link PC Agent - (no file)

AddRemove-{7B63B2922B174135AFC0E1377DD81EC2} - c:\program files\DivX\DivXCodecUninstall.exe

.

--------------------- LOCKED REGISTRY KEYS ---------------------

[HKEY_USERS\S-1-5-21-861567501-1383384898-839522115-500\Software\Microsoft\Internet Explorer\User Preferences]

@Denied: (2) (Administrator)

"88D7D0879DAB32E14DE5B3A805A34F98AFF34F5977"=hex:01,00,00,00,d0,8c,9d,df,01,15,

d1,11,8c,7a,00,c0,4f,c2,97,eb,01,00,00,00,78,06,a0,18,47,2c,bc,4b,8b,e3,8a,\

"2D53CFFC5C1A3DD2E97B7979AC2A92BD59BC839E81"=hex:01,00,00,00,d0,8c,9d,df,01,15,

d1,11,8c,7a,00,c0,4f,c2,97,eb,01,00,00,00,78,06,a0,18,47,2c,bc,4b,8b,e3,8a,\

[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{A483C63A-CDBC-426E-BF93-872502E8144E}]

@Denied: (A 2) (Everyone)

@="FlashBroker"

"LocalizedString"="@c:\\WINDOWS\\system32\\Macromed\\Flash\\FlashUtil10i_ActiveX.exe,-101"

[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{A483C63A-CDBC-426E-BF93-872502E8144E}\Elevation]

"Enabled"=dword:00000001

[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{A483C63A-CDBC-426E-BF93-872502E8144E}\LocalServer32]

@="c:\\WINDOWS\\system32\\Macromed\\Flash\\FlashUtil10i_ActiveX.exe"

[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{A483C63A-CDBC-426E-BF93-872502E8144E}\TypeLib]

@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"

[HKEY_LOCAL_MACHINE\software\Classes\Interface\{E3F2C3CB-5EB8-4A04-B22C-7E3B4B6AF30F}]

@Denied: (A 2) (Everyone)

@="IFlashBroker4"

[HKEY_LOCAL_MACHINE\software\Classes\Interface\{E3F2C3CB-5EB8-4A04-B22C-7E3B4B6AF30F}\ProxyStubClsid32]

@="{00020424-0000-0000-C000-000000000046}"

[HKEY_LOCAL_MACHINE\software\Classes\Interface\{E3F2C3CB-5EB8-4A04-B22C-7E3B4B6AF30F}\TypeLib]

@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"

"Version"="1.0"

.

--------------------- DLLs Loaded Under Running Processes ---------------------

- - - - - - - > 'explorer.exe'(4008)

c:\windows\system32\WININET.dll

c:\windows\system32\msi.dll

c:\windows\system32\ieframe.dll

c:\windows\system32\webcheck.dll

c:\windows\system32\WPDShServiceObj.dll

c:\program files\WinSCP\DragExt.dll

c:\windows\system32\PortableDeviceTypes.dll

c:\windows\system32\PortableDeviceApi.dll

.

------------------------ Other Running Processes ------------------------

.

c:\program files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe

c:\program files\Bonjour\mDNSResponder.exe

c:\program files\Common Files\LightScribe\LSSrvc.exe

c:\program files\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE

c:\program files\Microsoft SQL Server\MSSQL.1\MSSQL\Binn\sqlservr.exe

c:\program files\NVIDIA Corporation\nTune\nTuneService.exe

c:\windows\system32\nvsvc32.exe

c:\program files\Sophos\AutoUpdate\ALsvc.exe

c:\program files\Microsoft SQL Server\90\Shared\sqlbrowser.exe

c:\program files\Microsoft SQL Server\90\Shared\sqlwriter.exe

c:\program files\Alcohol Soft\Alcohol 120\StarWind\StarWindServiceAE.exe

c:\windows\system32\wscntfy.exe

c:\windows\system32\RUNDLL32.EXE

c:\program files\Common Files\Macrovision Shared\FLEXnet Publisher\FNPLicensingService.exe

.

**************************************************************************

.

Completion time: 2010-10-19 16:40:34 - machine was rebooted

ComboFix-quarantined-files.txt 2010-10-19 23:40

Pre-Run: 270,505,979,904 bytes free

Post-Run: 270,791,016,448 bytes free

WindowsXP-KB310994-SP2-Pro-BootDisk-ENU.exe

[boot loader]

timeout=2

default=multi(0)disk(0)rdisk(0)partition(1)\WINDOWS

[operating systems]

c:\cmdcons\BOOTSECT.DAT="Microsoft Windows Recovery Console" /cmdcons

UnsupportedDebug="do not select this" /debug

multi(0)disk(0)rdisk(0)partition(1)\WINDOWS="Microsoft Windows XP Professional" /noexecute=optin /fastdetect

- - End Of File - - 1F5BD77CEF0D88981AA7FCF9DB9250E4

Please advise me for what I should do next. Thank you again!

-Charles in Charge

Link to post
Share on other sites

The full scan by Sophos detected 2 items:

1. Adware/PUA NirCmd - Sophos gives me the option to Authorize or Clean up

2. Virus/Spyware Mal/TDSSRt-A - Sophos gives me the option to Clean up

the second item has the filename: A0416385.sys

and is located in: C:\System Volume Information\_restore{BB5419E1-CAA6-4DFC-8C87-57DD9A069138}\RP603

I just noticed my Sophos quarantine already had these:

Virus/Spyware Troj/TDL3Mem-A - Sophos gives me no options

Suspicious behavior HIPS/RegMod-016 c:\WINDOWS\regedit.exe

Suspicious behavior HIPS/ProcMod-002 c:\WINDOWS\system32\cmd.exe

Sophos only gives me the option to authorize the last 2 items

Thanks.

Link to post
Share on other sites

I don't think anything was detected.

For regedit.exe:

www.virustotal.com says:

File name:

regedit.exe

Submission date:

2010-10-25 00:34:07 (UTC)

Current status:

queued (#6) queued (#6) analysing finished

Result:

0/ 43 (0.0%)

VT Community

not reviewed

Safety score: -

Compact

Print results

Antivirus Version Last Update Result

AhnLab-V3 2010.10.24.02 2010.10.24 -

AntiVir 7.10.13.28 2010.10.24 -

Antiy-AVL 2.0.3.7 2010.10.24 -

Authentium 5.2.0.5 2010.10.24 -

Avast 4.8.1351.0 2010.10.24 -

Avast5 5.0.594.0 2010.10.24 -

AVG 9.0.0.851 2010.10.25 -

BitDefender 7.2 2010.10.25 -

CAT-QuickHeal 11.00 2010.10.22 -

ClamAV 0.96.2.0-git 2010.10.25 -

Comodo 6497 2010.10.25 -

DrWeb 5.0.2.03300 2010.10.25 -

Emsisoft 5.0.0.50 2010.10.24 -

eSafe 7.0.17.0 2010.10.24 -

eTrust-Vet 36.1.7929 2010.10.22 -

F-Prot 4.6.2.117 2010.10.24 -

F-Secure 9.0.16160.0 2010.10.24 -

Fortinet 4.2.249.0 2010.10.24 -

GData 21 2010.10.25 -

Ikarus T3.1.1.90.0 2010.10.24 -

Jiangmin 13.0.900 2010.10.24 -

K7AntiVirus 9.66.2813 2010.10.22 -

Kaspersky 7.0.0.125 2010.10.25 -

McAfee 5.400.0.1158 2010.10.25 -

McAfee-GW-Edition 2010.1C 2010.10.24 -

Microsoft 1.6301 2010.10.24 -

NOD32 5560 2010.10.24 -

Norman 6.06.10 2010.10.24 -

nProtect 2010-10-24.01 2010.10.24 -

Panda 10.0.2.7 2010.10.24 -

PCTools 7.0.3.5 2010.10.25 -

Prevx 3.0 2010.10.25 -

Rising 22.70.05.00 2010.10.24 -

Sophos 4.58.0 2010.10.24 -

Sunbelt 7133 2010.10.24 -

SUPERAntiSpyware 4.40.0.1006 2010.10.25 -

Symantec 20101.2.0.161 2010.10.25 -

TheHacker 6.7.0.1.065 2010.10.25 -

TrendMicro 9.120.0.1004 2010.10.24 -

TrendMicro-HouseCall 9.120.0.1004 2010.10.25 -

VBA32 3.12.14.1 2010.10.22 -

ViRobot 2010.10.24.4110 2010.10.24 -

VirusBuster 12.70.2.0 2010.10.24 -

Additional information

Show all

MD5 : 058710b720282ca82b909912d3ef28db

SHA1 : 48f4612efeb713a5860726fdb999ceceff07557d

SHA256: 97535e75ca6a77e6bcb81216b0fb383024709539727fd656df6afd33a50cad04

ssdeep: 3072:NtkaZgxktEdSja2qLckP+4AnrIKvOBI+huG0TG0uvJb9w:NtkqxrqLckP+xn0YOBI+AG0T

G0

File size : 146432 bytes

First seen: 2009-02-12 04:39:45

Last seen : 2010-10-25 00:34:07

TrID:

Win32 Executable MS Visual C++ (generic) (53.1%)

Windows Screen Saver (18.4%)

Win32 Executable Generic (12.0%)

Win32 Dynamic Link Library (generic) (10.6%)

Generic Win/DOS Executable (2.8%)

sigcheck:

publisher....: Microsoft Corporation

copyright....: © Microsoft Corporation. All rights reserved.

product......: Microsoft_ Windows_ Operating System

description..: Registry Editor

original name: REGEDIT.EXE

internal name: REGEDIT

file version.: 5.1.2600.5512 (xpsp.080413-2111)

comments.....: n/a

signers......: -

signing date.: -

verified.....: Unsigned

PEInfo: PE structure information

[[ basic data ]]

entrypointaddress: 0x1691E

timedatestamp....: 0x48025214 (Sun Apr 13 18:33:56 2008)

machinetype......: 0x14c (I386)

[[ 3 section(s) ]]

name, viradd, virsiz, rawdsiz, ntropy, md5

.text, 0x1000, 0x17902, 0x17A00, 6.37, 8d566c1e457741cced3b34f6d18c225d

.data, 0x19000, 0x40DA0, 0x400, 1.20, def7edb164ce2210badeb06959cdaa48

.rsrc, 0x5A000, 0xB8B0, 0xBA00, 3.68, 55c800dc56999ec2683a54271953b1b7

[[ 14 import(s) ]]

msvcrt.dll: __p__commode, _adjust_fdiv, __p__fmode, _initterm, __getmainargs, _acmdln, __set_app_type, _except_handler3, __setusermatherr, _controlfp, exit, _XcptFilter, _exit, _c_exit, swprintf, iswprint, wcsncpy, wcslen, wcscat, wcscpy, _purecall, iswctype, wcscmp, wcschr, wcsncmp, wcsrchr, _cexit, memmove

ADVAPI32.dll: RegQueryValueExA, RegOpenKeyExA, InitializeSecurityDescriptor, RegDeleteValueW, InitializeAcl, SetSecurityDescriptorDacl, SetSecurityDescriptorSacl, SetSecurityDescriptorOwner, SetSecurityDescriptorGroup, GetInheritanceSourceW, LookupAccountSidW, GetSidSubAuthorityCount, GetSidSubAuthority, GetSecurityDescriptorControl, GetSecurityDescriptorOwner, GetSecurityDescriptorGroup, GetSecurityDescriptorDacl, GetSecurityDescriptorSacl, SetSecurityInfo, SetNamedSecurityInfoW, GetNamedSecurityInfoW, MapGenericMask, RegSetValueExA, RegSetValueW, RegFlushKey, RegSaveKeyW, RegRestoreKeyW, RegConnectRegistryW, RegQueryValueExW, RegCloseKey, RegOpenKeyW, RegSetValueExW, RegCreateKeyW, RegEnumValueW, RegEnumKeyW, AdjustTokenPrivileges, LookupPrivilegeValueW, OpenProcessToken, RegUnLoadKeyW, RegLoadKeyW, RegOpenKeyExW, RegQueryInfoKeyW, RegDeleteKeyW

KERNEL32.dll: ReadFile, DeleteFileW, WriteFile, WideCharToMultiByte, CreateFileW, OutputDebugStringW, GetLastError, SetFilePointer, GetFileSize, SearchPathW, GetTimeFormatW, GetDateFormatW, GetSystemDefaultLCID, FileTimeToSystemTime, FileTimeToLocalFileTime, FreeLibrary, LoadLibraryW, MulDiv, lstrcpynW, QueryPerformanceCounter, GetTickCount, GetCurrentThreadId, GetCurrentProcessId, GetSystemTimeAsFileTime, TerminateProcess, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetModuleHandleA, GetStartupInfoA, MultiByteToWideChar, lstrcmpW, FormatMessageW, GetThreadLocale, GetModuleHandleW, ExitProcess, GetCommandLineW, GetProcessHeap, lstrcatW, LocalAlloc, GetCurrentProcess, CloseHandle, LocalFree, GetComputerNameW, lstrcmpiW, lstrlenW, lstrcpyW, LocalReAlloc, GlobalAlloc, GlobalLock, GlobalUnlock, GetProcAddress, LoadLibraryA

GDI32.dll: GetStockObject, SetAbortProc, StartDocW, StartPage, SetViewportOrgEx, EndPage, EndDoc, AbortDoc, DeleteDC, CreateBitmap, CreatePatternBrush, PatBlt, ExcludeClipRect, SelectClipRgn, DeleteObject, SetBkColor, SetTextColor, ExtTextOutW, GetDeviceCaps, CreateFontIndirectW, SelectObject, GetTextMetricsW

USER32.dll: SendDlgItemMessageW, SetDlgItemTextW, SetWindowLongW, DefWindowProcW, ReleaseDC, GetDC, SetScrollInfo, wsprintfW, DestroyCaret, ReleaseCapture, KillTimer, SetCaretPos, ScrollWindowEx, ShowCaret, HideCaret, InvalidateRect, CloseClipboard, SetClipboardData, EmptyClipboard, OpenClipboard, GetClipboardData, WinHelpW, EndDialog, GetWindowLongW, EndPaint, BeginPaint, CreateCaret, SetTimer, SetCapture, SetFocus, CharLowerW, GetDlgItem, DestroyMenu, TrackPopupMenuEx, IsClipboardFormatAvailable, EnableMenuItem, GetSubMenu, LoadMenuW, GetKeyState, RegisterClassW, LoadCursorW, RegisterClipboardFormatW, CheckRadioButton, SendMessageW, GetWindowTextW, GetParent, GetDlgItemTextW, IsDlgButtonChecked, GetDlgCtrlID, CallWindowProcW, GetWindowTextLengthW, GetDlgItemInt, PostQuitMessage, GetWindowPlacement, SetWindowTextW, EnableWindow, GetWindowRect, DrawMenuBar, InsertMenuItemW, DeleteMenu, SetMenuItemInfoW, GetMenu, GetMenuItemInfoW, EndDeferWindowPos, DeferWindowPos, BeginDeferWindowPos, IsIconic, DestroyIcon, LoadImageW, GetSysColor, SetCursor, ShowCursor, ShowWindow, SetWindowPlacement, CreateWindowExW, GetProcessDefaultLayout, GetMessageW, ScreenToClient, SetCursorPos, DispatchMessageW, ClientToScreen, GetDesktopWindow, LoadIconW, PostMessageW, SetMenuDefaultItem, InsertMenuW, GetMenuItemID, CheckMenuItem, UpdateWindow, RegisterClassExW, CharNextW, GetClientRect, DestroyWindow, CreateDialogParamW, CheckDlgButton, DrawAnimatedRects, IntersectRect, ModifyMenuW, GetMessagePos, TranslateMessage, TranslateAcceleratorW, LoadAcceleratorsW, SetForegroundWindow, GetLastActivePopup, BringWindowToTop, FindWindowW, LoadStringW, GetWindow, IsDialogMessageW, PeekMessageW, MessageBoxW, CharUpperBuffW, CharUpperW, IsCharAlphaNumericW, GetSystemMetrics, MoveWindow, MapWindowPoints, DialogBoxParamW, SetWindowPos, MessageBeep

COMCTL32.dll: -, -, -, -, InitCommonControlsEx, -, -, ImageList_SetBkColor, ImageList_Create, ImageList_Destroy, -, -, ImageList_ReplaceIcon, -, -, -, -, CreateStatusWindowW

comdlg32.dll: GetOpenFileNameW, GetSaveFileNameW, PrintDlgExW

SHELL32.dll: ShellAboutW, DragQueryFileW, DragFinish

AUTHZ.dll: AuthzInitializeContextFromSid, AuthzAccessCheck, AuthzFreeContext, AuthzFreeResourceManager, AuthzInitializeResourceManager

ACLUI.dll: -

ole32.dll: CoCreateInstance, CoUninitialize, CoInitializeEx, ReleaseStgMedium

ulib.dll: _Resize@DSTRING@@UAEEK@Z, _Initialize@ARRAY@@QAEEKK@Z, _NewBuf@DSTRING@@UAEEK@Z, __1DSTRING@@UAE@XZ, __1OBJECT@@UAE@XZ, __0OBJECT@@IAE@XZ, _Compare@OBJECT@@UBEJPBV1@@Z, __0DSTRING@@QAE@XZ, _Initialize@WSTRING@@QAEEPBV1@KK@Z, _Strcat@WSTRING@@QAEEPBV1@@Z, __0ARRAY@@QAE@XZ, _Initialize@WSTRING@@QAEEPBGK@Z

clb.dll: ClbAddData, ClbSetColumnWidths

ntdll.dll: RtlFreeHeap, RtlAllocateHeap

ExifTool:

file metadata

CharacterSet: Unicode

CodeSize: 96768

CompanyName: Microsoft Corporation

EntryPoint: 0x1691e

FileDescription: Registry Editor

FileFlagsMask: 0x003f

FileOS: Windows NT 32-bit

FileSize: 143 kB

FileSubtype: 0

FileType: Win32 EXE

FileVersion: 5.1.2600.5512 (xpsp.080413-2111)

FileVersionNumber: 5.1.2600.5512

ImageVersion: 5.1

InitializedDataSize: 313344

InternalName: REGEDIT

LanguageCode: English (U.S.)

LegalCopyright: Microsoft Corporation. All rights reserved.

LinkerVersion: 7.1

MIMEType: application/octet-stream

MachineType: Intel 386 or later, and compatibles

OSVersion: 5.1

ObjectFileType: Executable application

OriginalFilename: REGEDIT.EXE

PEType: PE32

ProductName: Microsoft Windows Operating System

ProductVersion: 5.1.2600.5512

ProductVersionNumber: 5.1.2600.5512

Subsystem: Windows GUI

SubsystemVersion: 4.0

TimeStamp: 2008:04:13 20:33:56+02:00

UninitializedDataSize: 0

For cmd.exe, www.virustotal.com says:

File name:

cmd.exe

Submission date:

2010-10-25 00:38:07 (UTC)

Current status:

queued (#7) queued (#7) analysing finished

Result:

0/ 43 (0.0%)

VT Community

goodware

Safety score: 100.0%

Compact

Print results

Antivirus Version Last Update Result

AhnLab-V3 2010.10.24.02 2010.10.24 -

AntiVir 7.10.13.28 2010.10.24 -

Antiy-AVL 2.0.3.7 2010.10.24 -

Authentium 5.2.0.5 2010.10.24 -

Avast 4.8.1351.0 2010.10.24 -

Avast5 5.0.594.0 2010.10.24 -

AVG 9.0.0.851 2010.10.25 -

BitDefender 7.2 2010.10.25 -

CAT-QuickHeal 11.00 2010.10.22 -

ClamAV 0.96.2.0-git 2010.10.25 -

Comodo 6497 2010.10.25 -

DrWeb 5.0.2.03300 2010.10.25 -

Emsisoft 5.0.0.50 2010.10.24 -

eSafe 7.0.17.0 2010.10.24 -

eTrust-Vet 36.1.7929 2010.10.22 -

F-Prot 4.6.2.117 2010.10.24 -

F-Secure 9.0.16160.0 2010.10.24 -

Fortinet 4.2.249.0 2010.10.24 -

GData 21 2010.10.25 -

Ikarus T3.1.1.90.0 2010.10.24 -

Jiangmin 13.0.900 2010.10.24 -

K7AntiVirus 9.66.2813 2010.10.22 -

Kaspersky 7.0.0.125 2010.10.25 -

McAfee 5.400.0.1158 2010.10.25 -

McAfee-GW-Edition 2010.1C 2010.10.24 -

Microsoft 1.6301 2010.10.24 -

NOD32 5560 2010.10.24 -

Norman 6.06.10 2010.10.24 -

nProtect 2010-10-24.01 2010.10.24 -

Panda 10.0.2.7 2010.10.24 -

PCTools 7.0.3.5 2010.10.25 -

Prevx 3.0 2010.10.25 -

Rising 22.70.05.00 2010.10.24 -

Sophos 4.58.0 2010.10.24 -

Sunbelt 7133 2010.10.24 -

SUPERAntiSpyware 4.40.0.1006 2010.10.25 -

Symantec 20101.2.0.161 2010.10.25 -

TheHacker 6.7.0.1.065 2010.10.25 -

TrendMicro 9.120.0.1004 2010.10.24 -

TrendMicro-HouseCall 9.120.0.1004 2010.10.25 -

VBA32 3.12.14.1 2010.10.22 -

ViRobot 2010.10.24.4110 2010.10.24 -

VirusBuster 12.70.2.0 2010.10.24 -

Additional information

Show all

MD5 : 6d778e0f95447e6546553eeea709d03c

SHA1 : 811a005cf787c6ccbe0d9f1c36c1d49a9cb71fd1

SHA256: 62abed7d45040381bbced97ea7b6c697b418448fd3322fd4bfb2bbfdb6155eb4

ssdeep: 3072:PhRx1q315oF8opcnD1hOOrWGzN2lcR2u8JnxIJU+e3sFFCcll3H3rH3XD7Inm+Fj:VUF5o

XpcFb5DRsNxIJU

File size : 389120 bytes

First seen: 2009-02-12 13:13:25

Last seen : 2010-10-25 00:38:07

TrID:

Win32 Executable MS Visual C++ (generic) (65.2%)

Win32 Executable Generic (14.7%)

Win32 Dynamic Link Library (generic) (13.1%)

Generic Win/DOS Executable (3.4%)

DOS Executable Generic (3.4%)

sigcheck:

publisher....: Microsoft Corporation

copyright....: © Microsoft Corporation. All rights reserved.

product......: Microsoft_ Windows_ Operating System

description..: Windows Command Processor

original name: Cmd.Exe

internal name: cmd

file version.: 5.1.2600.5512 (xpsp.080413-2111)

comments.....: n/a

signers......: -

signing date.: -

verified.....: Unsigned

PEInfo: PE structure information

[[ basic data ]]

entrypointaddress: 0x5046

timedatestamp....: 0x48025BAF (Sun Apr 13 19:14:55 2008)

machinetype......: 0x14c (I386)

[[ 3 section(s) ]]

name, viradd, virsiz, rawdsiz, ntropy, md5

.text, 0x1000, 0x1F620, 0x1F800, 6.58, 67557095d2941262a733cea0bc7ab480

.data, 0x21000, 0x1CA24, 0x1CA00, 0.17, ac08e12c2ca9c0b872b354378edde336

.rsrc, 0x3E000, 0x228A0, 0x22A00, 3.83, 1586a8d471cd77b625c608210b6f5e5f

[[ 3 import(s) ]]

KERNEL32.dll: FlushConsoleInputBuffer, LoadLibraryA, InterlockedExchange, FreeLibrary, LocalAlloc, GetVDMCurrentDirectories, CmdBatNotification, GetModuleHandleA, SetUnhandledExceptionFilter, UnhandledExceptionFilter, GetCurrentProcess, GetSystemTimeAsFileTime, GetCurrentProcessId, GetTickCount, QueryPerformanceCounter, GetThreadLocale, GetDiskFreeSpaceExW, CompareFileTime, RemoveDirectoryW, GetCurrentDirectoryW, SetCurrentDirectoryW, TerminateProcess, WaitForSingleObject, GetExitCodeProcess, CopyFileW, SetFileAttributesW, DeleteFileW, SetFileTime, CreateDirectoryW, FillConsoleOutputAttribute, SetConsoleTextAttribute, ScrollConsoleScreenBufferW, FormatMessageW, DuplicateHandle, FlushFileBuffers, HeapReAlloc, HeapSize, GetFileAttributesExW, LocalFree, GetDriveTypeW, InitializeCriticalSection, SetConsoleCtrlHandler, GetWindowsDirectoryW, GetConsoleTitleW, GetModuleFileNameW, GetVersion, EnterCriticalSection, LeaveCriticalSection, ExpandEnvironmentStringsW, SearchPathW, WriteFile, GetVolumeInformationW, SetLastError, MoveFileW, SetConsoleTitleW, MoveFileExW, GetBinaryTypeW, GetFileAttributesW, GetCurrentThreadId, CreateProcessW, LoadLibraryW, ReadProcessMemory, SetErrorMode, GetConsoleMode, SetConsoleMode, VirtualAlloc, VirtualFree, SetEnvironmentVariableW, GetEnvironmentVariableW, GetCommandLineW, GetEnvironmentStringsW, GetLocalTime, GetTimeFormatW, FileTimeToLocalFileTime, GetDateFormatW, GetLastError, CloseHandle, SetThreadLocale, GetProcAddress, GetModuleHandleW, SetFilePointer, lstrcmpW, lstrcmpiW, HeapAlloc, GetProcessHeap, HeapFree, MultiByteToWideChar, ReadFile, WriteConsoleW, FillConsoleOutputCharacterW, SetConsoleCursorPosition, ReadConsoleW, GetConsoleScreenBufferInfo, GetStdHandle, GetFileType, VirtualQuery, RaiseException, GetCPInfo, GetConsoleOutputCP, WideCharToMultiByte, GetFileSize, CreateFileW, FindClose, FindNextFileW, FindFirstFileW, GetFullPathNameW, GetUserDefaultLCID, GetLocaleInfoW, SetLocalTime, SystemTimeToFileTime, GetSystemTime, FileTimeToSystemTime

msvcrt.dll: __p__fmode, __p__commode, _adjust_fdiv, __setusermatherr, _initterm, __getmainargs, __initenv, _cexit, _XcptFilter, _exit, _c_exit, calloc, _wcslwr, qsort, _vsnwprintf, wcsstr, _dup2, _dup, _open_osfhandle, _close, swscanf, _ultoa, _pipe, _seh_longjmp_unwind, _setmode, wcsncmp, iswxdigit, fflush, exit, _wtol, time, srand, __set_app_type, wcsrchr, malloc, free, wcstoul, _errno, iswalpha, printf, rand, swprintf, _iob, fprintf, towlower, realloc, setlocale, _snwprintf, wcscat, _wcsupr, wcsncpy, _wpopen, fgets, _pclose, memmove, wcschr, iswspace, _tell, longjmp, wcscmp, _wcsnicmp, _wcsicmp, wcstol, iswdigit, _getch, _get_osfhandle, _controlfp, _setjmp3, _except_handler3, wcscpy, wcslen, wcsspn, towupper

USER32.dll: GetUserObjectInformationW, GetThreadDesktop, MessageBeep, GetProcessWindowStation

ExifTool:

file metadata

CharacterSet: Unicode

CodeSize: 129024

CompanyName: Microsoft Corporation

EntryPoint: 0x5046

FileDescription: Windows Command Processor

FileFlagsMask: 0x003f

FileOS: Windows NT 32-bit

FileSize: 380 kB

FileSubtype: 0

FileType: Win32 EXE

FileVersion: 5.1.2600.5512 (xpsp.080413-2111)

FileVersionNumber: 5.1.2600.5512

ImageVersion: 5.1

InitializedDataSize: 259584

InternalName: cmd

LanguageCode: English (U.S.)

LegalCopyright: Microsoft Corporation. All rights reserved.

LinkerVersion: 7.1

MIMEType: application/octet-stream

MachineType: Intel 386 or later, and compatibles

OSVersion: 5.1

ObjectFileType: Executable application

OriginalFilename: Cmd.Exe

PEType: PE32

ProductName: Microsoft Windows Operating System

ProductVersion: 5.1.2600.5512

ProductVersionNumber: 5.1.2600.5512

Subsystem: Windows command line

SubsystemVersion: 4.0

TimeStamp: 2008:04:13 21:14:55+02:00

UninitializedDataSize: 0

Link to post
Share on other sites

  • 2 weeks later...

Due to the lack of feedback this topic is closed to prevent others from posting here. If you need this topic reopened, please send a Private Message to any one of the moderating team members. Please include a link to this thread with your request. This applies only to the originator of this thread.

Other members who need assistance please start your own topic in a new thread. Thanks!

Link to post
Share on other sites

Guest
This topic is now closed to further replies.
  • Recently Browsing   0 members

    • No registered users viewing this page.
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.