Jump to content

Need Assistance with Stolen.data and Malware.trace


FredG53

Recommended Posts

Something has locked my random folders all over my computer and I cannot access them. Any help you can offer would be really appreciated.

Thanks

DDS (Ver_10-12-12.02) - NTFS_AMD64

Run by fred at 6:55:45.51 on Tue 12/21/2010

Internet Explorer: 8.0.7600.16385

Microsoft Windows 7 Ultimate 6.1.7600.0.1252.1.1033.18.16381.11498 [GMT -6:00]

AV: Microsoft Security Essentials *Enabled/Updated* {BF5CEBDC-F2D3-7540-343C-F0CE11FD6E66}

SP: Microsoft Security Essentials *Enabled/Updated* {043D0A38-D4E9-7ACE-0E8C-CBBC6A7A24DB}

SP: Windows Defender *Disabled/Updated* {D68DDC3A-831F-4fae-9E44-DA132C1ACF46}

============== Running Processes ===============

C:Windowssystem32wininit.exe

C:Windowssystem32lsm.exe

C:Windowssystem32svchost.exe -k DcomLaunch

C:Windowssystem32svchost.exe -k RPCSS

C:Program FilesMicrosoft Security EssentialsMsMpEng.exe

C:WindowsSystem32svchost.exe -k LocalServiceNetworkRestricted

C:WindowsSystem32svchost.exe -k LocalSystemNetworkRestricted

C:Windowssystem32svchost.exe -k netsvcs

C:Windowssystem32svchost.exe -k LocalService

C:Windowssystem32WUDFHost.exe

C:Windowssystem32WUDFHost.exe

C:Windowssystem32svchost.exe -k NetworkService

C:WindowsSystem32spoolsv.exe

C:Windowssystem32svchost.exe -k LocalServiceNoNetwork

C:Program Files (x86)Common FilesAppleMobile Device SupportAppleMobileDeviceService.exe

C:Program Files (x86)BonjourmDNSResponder.exe

C:Windowssystem32svchost.exe -k LocalServiceAndNoImpersonation

C:Program FilesMicrosoft SQL ServerMSSQL10.SQLEXPRESSMSSQLBinnsqlservr.exe

C:WindowsSysWOW64PnkBstrA.exe

C:Program FilesMicrosoft SQL Server90Sharedsqlwriter.exe

C:Windowssystem32svchost.exe -k imgsvc

C:Program Files (x86)Spybot - Search & DestroySDWinSec.exe

C:Windowssystem32svchost.exe -k NetworkServiceNetworkRestricted

C:Windowssystem32taskhost.exe

C:Windowssystem32Dwm.exe

C:WindowsExplorer.EXE

C:Program FilesLogitechGamePanel SoftwareLCD ManagerLCDMon.exe

C:Program FilesLogitechGamePanel SoftwareG-series SoftwareLGDCore.exe

C:Program FilesMicrosoft Security Essentialsmsseces.exe

C:Program Files (x86)Microsoft OfficeOffice14MSOSYNC.EXE

C:Program Files (x86)Spybot - Search & DestroyTeaTimer.exe

C:Program FilesLogitechGamePanel SoftwareAppletsLCDCountdown.exe

C:Program FilesLogitechGamePanel SoftwareAppletsLCDClock.exe

C:Program FilesLogitechGamePanel SoftwareAppletsLCDPop3.exe

C:Program FilesLogitechGamePanel SoftwareAppletsLCDRSS.exe

C:Program FilesLogitechGamePanel SoftwareAppletsColorOnlyLCDPictureViewer.exe

C:Program FilesLogitechGamePanel SoftwareAppletsLCDMedia.exe

C:Program FilesLogitechGamePanel SoftwareAppletsColorOnlyLCDMovieViewer.exe

C:Program FilesLogitechGamePanel SoftwareAppletsColorOnlyLCDYT.exe

C:Program Files (x86)Elaborate BytesVirtualCloneDriveVCDDaemon.exe

C:WindowsSamsungPanelMgrSSMMgr.exe

C:WindowsSamsungPanelMgrcaller64.exe

C:Windowstwain_32SamsungCLX3170Scan2Pc.exe

C:Program Files (x86)iTunesiTunesHelper.exe

C:Program FilesiPodbiniPodService.exe

C:Windowssystem32SearchIndexer.exe

C:Program FilesWindows Media Playerwmpnetwk.exe

C:Program Files (x86)Malwarebytes' Anti-Malwarembam.exe

C:Program FilesWindows Media PlayerWMPSideShowGadget.exe

C:Program Files (x86)Windows Media Playerwmplayer.exe

C:Windowssystem32taskmgr.exe

C:Windowssystem32taskhost.exe

C:Program Files (x86)NeroUpdateNASvc.exe

C:Windowssystem32svchost.exe -k SDRSVC

C:Program FilesCommon FilesMicrosoft SharedOfficeSoftwareProtectionPlatformOSPPSVC.EXE

C:Program Files (x86)Internet Exploreriexplore.exe

C:Program Files (x86)Internet Exploreriexplore.exe

C:Windowssystem32systempropertiesprotection.exe

C:Windowssplwow64.exe

C:Program Files (x86)Internet Exploreriexplore.exe

C:Program Files (x86)Internet Exploreriexplore.exe

C:Program Files (x86)Internet Exploreriexplore.exe

C:Program Files (x86)Internet Exploreriexplore.exe

C:Program Files (x86)Internet Exploreriexplore.exe

C:Windowssystem32SearchProtocolHost.exe

C:Windowssystem32SearchFilterHost.exe

C:UsersfredDesktopDefogger.exe

C:Windowssystem32conhost.exe

C:UsersfredDesktopdds.scr

C:Windowssystem32conhost.exe

C:Windowssystem32wbemwmiprvse.exe

============== Pseudo HJT Report ===============

uStart Page = hxxp://www.google.com/ig

uInternet Settings,ProxyOverride = *.local

uURLSearchHooks: Zynga Toolbar: {7b13ec3e-999a-4b70-b9cb-2617b8323822} - C:Program Files (x86)ZyngatbZyn1.dll

mURLSearchHooks: Zynga Toolbar: {7b13ec3e-999a-4b70-b9cb-2617b8323822} - C:Program Files (x86)ZyngatbZyn1.dll

mWinlogon: Userinit=userinit.exe,

BHO: Adobe PDF Link Helper: {18df081c-e8ad-4283-a596-fa578c2ebdc3} - C:Program Files (x86)Common FilesAdobeAcrobatActiveXAcroIEHelperShim.dll

BHO: Spybot-S&D IE Protection: {53707962-6f74-2d53-2644-206d7942484f} - C:PROGRA~2SPYBOT~1SDHelper.dll

BHO: Groove GFS Browser Helper: {72853161-30c5-4d22-b7f9-0bbc1d38a37e} - C:PROGRA~2MICROS~1Office14GROOVEEX.DLL

BHO: Zynga Toolbar: {7b13ec3e-999a-4b70-b9cb-2617b8323822} - C:Program Files (x86)ZyngatbZyn1.dll

BHO: Adobe PDF Conversion Toolbar Helper: {ae7cd045-e861-484f-8273-0445ee161910} - C:Program Files (x86)Common FilesAdobeAcrobatActiveXAcroIEFavClient.dll

BHO: Office Document Cache Handler: {b4f3a835-0e21-4959-ba22-42b3008e02ff} - C:PROGRA~2MICROS~1Office14URLREDIR.DLL

BHO: Microsoft Web Test Recorder 10.0 Helper: {dda57003-0068-4ed2-9d32-4d1ec707d94d} - C:Program Files (x86)Microsoft Visual Studio 10.0Common7IDEPrivateAssembliesMicrosoft.VisualStudio.QualityTools.RecorderB

arBHO100.dll

BHO: SmartSelect Class: {f4971ee7-daa0-4053-9964-665d8ee6a077} - C:Program Files (x86)Common FilesAdobeAcrobatActiveXAcroIEFavClient.dll

TB: Zynga Toolbar: {7b13ec3e-999a-4b70-b9cb-2617b8323822} - C:Program Files (x86)ZyngatbZyn1.dll

TB: Adobe PDF: {47833539-d0c5-4125-9fa8-0819e2eaac93} - C:Program Files (x86)Common FilesAdobeAcrobatActiveXAcroIEFavClient.dll

EB: Web Test Recorder 10.0: {5802d092-1784-4908-8cdb-99b6842d353d} - mscoree.dll

uRun: [OfficeSyncProcess] "C:Program Files (x86)Microsoft OfficeOffice14MSOSYNC.EXE"

uRun: [winlogon.exe] C:UsersfredAppDataRoamingMicrosoftSystemServiceswinlogon.exe

uRun: [spybotSD TeaTimer] C:Program Files (x86)Spybot - Search & DestroyTeaTimer.exe

mRun: [VirtualCloneDrive] "C:Program Files (x86)Elaborate BytesVirtualCloneDriveVCDDaemon.exe" /s

mRun: [bCSSync] "C:Program Files (x86)Microsoft OfficeOffice14BCSSync.exe" /DelayServices

mRun: [samsung PanelMgr] C:WindowsSamsungPanelMgrSSMMgr.exe /autorun

mRun: [Adobe Reader Speed Launcher] "C:Program Files (x86)AdobeReader 9.0ReaderReader_sl.exe"

mRun: [3170 Scan2PC] "C:Windowstwain_32SamsungCLX3170Scan2Pc.exe"

mRun: [iTunesHelper] "C:Program Files (x86)iTunesiTunesHelper.exe"

mRun: [<NO NAME>]

dRun: [uO8KTAT1GY] C:WindowsTEMPQts.exe

mPolicies-explorer: NoActiveDesktop = 1 (0x1)

mPolicies-explorer: NoActiveDesktopChanges = 1 (0x1)

mPolicies-system: ConsentPromptBehaviorAdmin = 0 (0x0)

mPolicies-system: ConsentPromptBehaviorUser = 3 (0x3)

mPolicies-system: EnableLUA = 0 (0x0)

mPolicies-system: EnableUIADesktopToggle = 0 (0x0)

mPolicies-system: PromptOnSecureDesktop = 0 (0x0)

mPolicies-system: EnableLinkedConnections = 1 (0x1)

IE: Append Link Target to Existing PDF - C:Program Files (x86)Common FilesAdobeAcrobatActiveXAcroIEFavClient.dll/AcroIEAppendSelLinks.html

IE: Append to Existing PDF - C:Program Files (x86)Common FilesAdobeAcrobatActiveXAcroIEFavClient.dll/AcroIEAppend.html

IE: Convert Link Target to Adobe PDF - C:Program Files (x86)Common FilesAdobeAcrobatActiveXAcroIEFavClient.dll/AcroIECaptureSelLinks.html

IE: Convert to Adobe PDF - C:Program Files (x86)Common FilesAdobeAcrobatActiveXAcroIEFavClient.dll/AcroIECapture.html

IE: E&xport to Microsoft Excel - C:PROGRA~2MICROS~1Office14EXCEL.EXE/3000

IE: Se&nd to OneNote - C:PROGRA~2MICROS~1Office14ONBttnIE.dll/105

IE: {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - {CAFEEFAC-0015-0000-0000-ABCDEFFEDCBC} - C:Program Files (x86)Javajre1.5.0binnpjpi150.dll

IE: {2670000A-7350-4f3c-8081-5663EE0C6C49} - {48E73304-E1D6-4330-914C-F5F514E3486C} - C:Program Files (x86)Microsoft OfficeOffice14ONBttnIE.dll

IE: {789FE86F-6FC4-46A1-9849-EDE0DB0C95CA} - {FFFDC614-B694-4AE6-AB38-5D6374584B52} - C:Program Files (x86)Microsoft OfficeOffice14ONBttnIELinkedNotes.dll

IE: {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - {53707962-6F74-2D53-2644-206D7942484F} - C:PROGRA~2SPYBOT~1SDHelper.dll

Trusted Zone: blank

DPF: {4871A87A-BFDD-4106-8153-FFDE2BAC2967} - hxxp://dlm.tools.akamai.com/dlmanager/versions/activex/dlm-activex-2.2.5.4.cab

DPF: {8100D56A-5661-482C-BEE8-AFECE305D968} - hxxp://upload.facebook.com/controls/2009.07.28_v5.5.8.1/FacebookPhotoUploader55.cab

DPF: {82774781-8F4E-11D1-AB1C-0000F8773BF0} - hxxps://transfers.ds.microsoft.com/FTM/TransferSource/grTransferCtrl.cab

DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://javadl-esd.sun.com/update/1.5.0/jinstall-1_5_0-windows-i586.cab

DPF: {CAFEEFAC-0015-0000-0000-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.5.0/jinstall-1_5_0-windows-i586.cab

DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} - hxxp://fpdownload2.macromedia.com/get/shockwave/cabs/flash/swflash.cab

Filter: text/xml - {807573E5-5146-11D5-A672-00B0D022E945} - C:Program Files (x86)Common Filesmicrosoft sharedOFFICE14MSOXMLMF.DLL

SEH: Groove GFS Stub Execution Hook: {b5a7f190-dda6-4420-b3ba-52453494e6cd} - C:PROGRA~2MICROS~1Office14GROOVEEX.DLL

BHO-X64: Groove GFS Browser Helper: {72853161-30C5-4D22-B7F9-0BBC1D38A37E} - C:PROGRA~1MICROS~2Office14GROOVEEX.DLL

BHO-X64: Office Document Cache Handler: {B4F3A835-0E21-4959-BA22-42B3008E02FF} - C:PROGRA~1MICROS~2Office14URLREDIR.DLL

BHO-X64: URLRedirectionBHO - No File

TB-X64: {7B13EC3E-999A-4B70-B9CB-2617B8323822} - No File

TB-X64: {47833539-D0C5-4125-9FA8-0819E2EAAC93} - No File

mRun-x64: [Launch LgDeviceAgent] "C:Program FilesLogitechGamePanel SoftwareLgDevAgt.exe"

mRun-x64: [Launch LCDMon] "C:Program FilesLogitechGamePanel SoftwareLCD ManagerLCDMon.exe"

mRun-x64: [Launch LGDCore] "C:Program FilesLogitechGamePanel SoftwareG-series SoftwareLGDCore.exe" /SHOWHIDE

mRun-x64: [MSSE] "C:Program FilesMicrosoft Security Essentialsmsseces.exe" -hide -runkey

SEH-X64: Groove GFS Stub Execution Hook: {B5A7F190-DDA6-4420-B3BA-52453494E6CD} - C:PROGRA~1MICROS~2Office14GROOVEEX.DLL

================= FIREFOX ===================

FF - ProfilePath - C:UsersfredAppDataRoamingMozillaFirefoxProfileslecvszsj.default

FF - component: C:UsersfredAppDataRoamingMozillaFirefoxProfileslecvszsj.defaultextensio

ns{7b13ec3e-999a-4b70-b9cb-2617b8323822}componentsFFExternalAlert.dll

FF - component: C:UsersfredAppDataRoamingMozillaFirefoxProfileslecvszsj.defaultextensio

ns{7b13ec3e-999a-4b70-b9cb-2617b8323822}componentsRadioWMPCore.dll

FF - plugin: C:PROGRA~2MICROS~1Office14NPAUTHZ.DLL

FF - plugin: C:PROGRA~2MICROS~1Office14NPSPWRAP.DLL

FF - plugin: C:Program Files (x86)CanonZoomBrowser EXProgramNPCIG.dll

FF - plugin: C:Program Files (x86)Javajre1.5.0binNPJPI150.dll

FF - plugin: C:Program Files (x86)Mozilla FirefoxpluginsnpicaN.dll

FF - Ext: Default: {972ce4c6-7e08-4474-a285-3208198ce6fd} - C:Program Files (x86)Mozilla Firefoxextensions{972ce4c6-7e08-4474-a285-3208198ce6fd}

FF - Ext: Zynga Toolbar: {7b13ec3e-999a-4b70-b9cb-2617b8323822} - %profile%extensions{7b13ec3e-999a-4b70-b9cb-2617b8323822}

============= SERVICES / DRIVERS ===============

R1 MpFilter;Microsoft Malware Protection Driver;C:WindowsSystem32driversMpFilter.sys [2010-3-25 173984]

R1 Pd71HiFi.sys;Service for Prodigy 7.1 HiFi EWDM;C:WindowsSystem32driversPd71HiFi.sys [2009-10-29 52320]

R2 NAUpdate;Nero Update;C:Program Files (x86)NeroUpdateNASvc.exe [2010-3-25 490280]

R2 SBSDWSCService;SBSD Security Center Service;C:Program Files (x86)Spybot - Search & DestroySDWinSec.exe [2010-11-27 1153368]

R2 SSPORT;SSPORT;C:WindowsSystem32driversSSPORT.SYS [2010-5-26 11576]

R3 LGBusEnum;Logitech GamePanel Virtual Bus Enumerator Driver;C:WindowsSystem32driversLGBusEnum.sys [2009-11-23 22408]

R3 LGPBTDD;LGPBTDD.sys Display Driver;C:WindowsSystem32driversLGPBTDD.sys [2009-7-1 30728]

R3 LGVirHid;Logitech Gamepanel Virtual HID Device Driver;C:WindowsSystem32driversLGVirHid.sys [2009-11-23 16008]

R3 MpNWMon;Microsoft Malware Protection Network Driver;C:WindowsSystem32driversMpNWMon.sys [2010-3-25 40832]

R3 osppsvc;Office Software Protection Platform;C:Program FilesCommon FilesMicrosoft SharedOfficeSoftwareProtectionPlatformOSPPSVC.EXE [2010-1-9 4925184]

R3 Pd71HiFiWdm.sys;Service for Prodigy 7.1 HiFi WDM;C:WindowsSystem32driversPd71HiFiWdm.sys [2009-10-29 43616]

S2 clr_optimization_v4.0.30319_32;Microsoft .NET Framework NGEN v4.0.30319_X86;C:WindowsMicrosoft.NETFrameworkv4.0.30319mscorsvw.exe [2010-3-18 130384]

S2 clr_optimization_v4.0.30319_64;Microsoft .NET Framework NGEN v4.0.30319_X64;C:WindowsMicrosoft.NETFramework64v4.0.30319mscorsvw.exe [2010-3-18 138576]

S3 Adobe Version Cue CS4;Adobe Version Cue CS4;C:Program Files (x86)Common FilesAdobeAdobe Version Cue CS4ServerbinVersionCueCS4.exe [2008-8-15 288112]

S3 Envy24HFS;ICE Envy24 Family Audio Controller WDM 64 bit;C:WindowsSystem32driversEnvy24HF.sys [2007-3-15 150016]

S3 FLEXnet Licensing Service 64;FLEXnet Licensing Service 64;C:Program FilesCommon FilesMacrovision SharedFLEXnet PublisherFNPLicensingService64.exe [2010-11-25 1038088]

S3 Microsoft SharePoint Workspace Audit Service;Microsoft SharePoint Workspace Audit Service;C:Program Files (x86)Microsoft OfficeOffice14GROOVE.EXE [2010-3-25 30969208]

S3 USBAAPL64;Apple Mobile USB Driver;C:WindowsSystem32driversusbaapl64.sys [2010-9-28 51712]

S3 VSPerfDrv100;Performance Tools Driver 10.0;C:Program Files (x86)Microsoft Visual Studio 10.0Team ToolsPerformance Toolsx64VSPerfDrv100.sys [2010-3-17 68440]

S3 WatAdminSvc;Windows Activation Technologies Service;C:WindowsSystem32WatWatAdminSvc.exe [2010-5-25 1255736]

S4 MSSQLServerADHelper100;SQL Active Directory Helper Service;C:Program FilesMicrosoft SQL Server100Sharedsqladhlp.exe [2009-7-22 61976]

S4 RsFx0103;RsFx0103 Driver;C:WindowsSystem32driversRsFx0103.sys [2009-3-30 311656]

S4 SQLAgent$SQLEXPRESS;SQL Server Agent (SQLEXPRESS);C:Program FilesMicrosoft SQL ServerMSSQL10.SQLEXPRESSMSSQLBinnSQLAGENT.EXE [2010-9-17 430424]

=============== Created Last 30 ================

2010-12-21 06:11:44 -------- d-----w- C:UsersfredAppDataRoamingMalwarebytes

2010-12-21 06:11:40 38224 ----a-w- C:WindowsSysWow64driversmbamswissarmy.sys

2010-12-21 06:11:40 -------- d-----w- C:PROGRA~3Malwarebytes

2010-12-21 06:11:37 24152 ----a-w- C:WindowsSystem32driversmbam.sys

2010-12-21 06:11:37 -------- d-----w- C:Program Files (x86)Malwarebytes' Anti-Malware

2010-12-21 06:02:20 8199504 ----a-w- C:PROGRA~3MicrosoftMicrosoft AntimalwareDefinition Updates{0C2912E1-C178-4689-8F4B-1863278B726A}mpengine.dll

2010-12-09 06:05:58 539968 ----a-w- C:PROGRA~3MicrosofteHomePackagesMCESpotlightMCESpotlight-2SpotlightResources.dll

2010-11-27 14:51:10 -------- d-----w- C:Program Files (x86)Spybot - Search & Destroy

2010-11-27 14:51:10 -------- d-----w- C:PROGRA~3Spybot - Search & Destroy

2010-11-26 17:28:46 52568 ----a-r- C:WindowsSystem32AdobePDF.dll

2010-11-26 17:28:46 24416 ----a-r- C:WindowsSystem32AdobePDFUI.dll

2010-11-26 17:26:28 103792 ----a-w- C:Program Files (x86)Mozilla Firefoxpluginsnppdf32.dll

2010-11-26 05:29:05 72536 ----a-w- C:WindowsSysWow64perf-MSSQL$SQLEXPRESS-sqlctr10.2.4000.0.dll

2010-11-26 05:29:05 108376 ----a-w- C:WindowsSystem32perf-MSSQL$SQLEXPRESS-sqlctr10.2.4000.0.dll

2010-11-26 05:29:05 105816 ----a-w- C:WindowsSystem32SQSRVRES.DLL

2010-11-26 02:09:05 -------- d-----w- C:WindowsSysWow64spool

2010-11-26 02:05:13 -------- d-----w- C:Program FilesCommon FilesMacrovision Shared

2010-11-26 02:01:36 -------- d-----w- C:Program Files (x86)Common FilesMacrovision Shared

2010-11-25 13:36:21 558080 ----a-w- C:UsersfredAppDataRoamingMicrosoftSystemServiceswinlogon.exe

2010-11-25 05:55:21 -------- d-----w- C:UsersfredAppDataRoamingXilisoft Corporation

2010-11-25 05:49:33 -------- d-----w- C:UsersfredAppDataRoamingXilisoft

2010-11-25 05:49:22 -------- d-----w- C:PROGRA~3Xilisoft

2010-11-25 05:45:12 -------- d-----w- C:Program Files (x86)Xilisoft

2010-11-24 03:42:17 7680 ----a-w- C:Program FilesInternet Exploreriecompat.dll

2010-11-24 03:42:17 7680 ----a-w- C:Program Files (x86)Internet Exploreriecompat.dll

==================== Find3M ====================

2010-11-26 17:41:23 86584 ----a-w- C:WindowsSystem32driversadfs.sys

2010-11-04 06:35:53 1194496 ----a-w- C:WindowsSystem32wininet.dll

2010-11-04 06:31:34 57856 ----a-w- C:WindowsSystem32licmgr10.dll

2010-11-04 05:52:17 978944 ----a-w- C:WindowsSysWow64wininet.dll

2010-11-04 05:48:36 44544 ----a-w- C:WindowsSysWow64licmgr10.dll

2010-11-04 05:16:14 482816 ----a-w- C:WindowsSystem32html.iec

2010-11-04 04:41:26 386048 ----a-w- C:WindowsSysWow64html.iec

2010-11-04 04:35:37 1638912 ----a-w- C:WindowsSystem32mshtml.tlb

2010-11-04 04:08:54 1638912 ----a-w- C:WindowsSysWow64mshtml.tlb

2010-11-04 03:50:28 1580368 ----a-w- C:WindowsSystem32LogiLDA.DLL

2010-11-02 05:18:17 524288 ----a-w- C:WindowsSystem32wmicmiplugin.dll

2010-11-02 05:17:38 473600 ----a-w- C:WindowsSystem32taskcomp.dll

2010-11-02 05:17:38 1169408 ----a-w- C:WindowsSystem32taskschd.dll

2010-11-02 05:16:53 1114624 ----a-w- C:WindowsSystem32schedsvc.dll

2010-11-02 05:10:47 464384 ----a-w- C:WindowsSystem32taskeng.exe

2010-11-02 05:10:32 285696 ----a-w- C:WindowsSystem32schtasks.exe

2010-11-02 04:40:36 496128 ----a-w- C:WindowsSysWow64taskschd.dll

2010-11-02 04:40:36 305152 ----a-w- C:WindowsSysWow64taskcomp.dll

2010-11-02 04:34:44 192000 ----a-w- C:WindowsSysWow64taskeng.exe

2010-11-02 04:34:33 179712 ----a-w- C:WindowsSysWow64schtasks.exe

2010-10-27 05:06:22 2048 ----a-w- C:WindowsSystem32tzres.dll

2010-10-27 04:32:36 2048 ----a-w- C:WindowsSysWow64tzres.dll

2010-10-20 05:20:01 46080 ----a-w- C:WindowsSystem32atmlib.dll

2010-10-20 04:54:18 34304 ----a-w- C:WindowsSysWow64atmlib.dll

2010-10-20 03:09:15 3124224 ----a-w- C:WindowsSystem32win32k.sys

2010-10-20 03:05:46 367104 ----a-w- C:WindowsSystem32atmfd.dll

2010-10-20 02:58:41 294400 ----a-w- C:WindowsSysWow64atmfd.dll

2010-10-19 20:51:33 270720 ------w- C:WindowsSystem32MpSigStub.exe

2010-10-16 05:23:13 112000 ----a-w- C:WindowsSystem32consent.exe

2010-10-16 05:19:41 395776 ----a-w- C:WindowsSystem32webio.dll

2010-10-16 04:36:10 314368 ----a-w- C:WindowsSysWow64webio.dll

2010-09-28 21:44:52 51712 ----a-w- C:WindowsSystem32driversusbaapl64.sys

2010-09-28 21:44:52 4184352 ----a-w- C:WindowsSystem32usbaaplrc.dll

2010-09-26 16:11:29 14 ----a-w- C:WindowsSysWow64systeminfo3.dll

2010-09-26 16:06:45 93696 ----a-w- C:UsersfredAppDataRoamingezpinst.exe

2010-09-26 16:06:45 82048 ----a-w- C:WindowsSystem32driverspcouffin.sys

2010-09-26 16:06:45 82048 ----a-w- C:UsersfredAppDataRoamingpcouffin.sys

============= FINISH: 6:56:01.83 ===============

Now I am finding that I am being locked out of network drives and local folders. Its telling me I dont have permission to access them. I am a local admin on the PC

Attach.zip

ark.zip

Link to post
Share on other sites

:)

Please don't attach the scan results, use Copy/Paste

DO NOT use any TOOLS such as Combofix or HijackThis fixes without supervision.

Doing so could make your pc inoperatible and could require a full reinstall of your OS, losing all your programs and data.

Vista and Windows 7 users:

1. These tools MUST be run from the executable. (.exe) every time you run them

2. With Admin Rights (Right click, choose "Run as Administrator")

Stay with this topic until I give you the all clean post.

You might want to print these instructions out.

Note: Close all browsers before running ATF Cleaner: IE, FireFox, etc.

Please download ATF Cleaner by Atribune.

Download - ATF Cleaner

Link to post
Share on other sites

Thank you for your help!

GooredFix by jpshortstuff (03.07.10.1)

Log created at 13:41 on 23/12/2010 (fred)

Firefox version 3.6.13 (en-US)

========== GooredScan ==========

========== GooredLog ==========

C:\Program Files (x86)\Mozilla Firefox\extensions\

{972ce4c6-7e08-4474-a285-3208198ce6fd} [00:56 26/05/2010]

C:\Users\fred\Application Data\Mozilla\Firefox\Profiles\lecvszsj.default\extensions\

{7b13ec3e-999a-4b70-b9cb-2617b8323822} [03:58 23/07/2010]

[HKEY_LOCAL_MACHINE\Software\Mozilla\Firefox\Extensions]

(Key not found)

---------- Old Logs ----------

GooredFix[19.35.29_23-12-2010].txt

GooredFix[19.41.35_23-12-2010].txt

-=E.O.F=-

tdskiller found nothing.

I rebooted and Microsoft Security Essentials Alert came up and detected the following

VirTool:Win32/VBInject.gen!DG

It tells me that the issue is in D:\Windows\Microsoft.Net\Framework\v2.0.50727\vbc.exe

I have asked it to remove this in the past but it comes back every time.

Link to post
Share on other sites

Thank you for your help! These come back after a reboot.

Malwarebytes' Anti-Malware 1.50.1.1100

www.malwarebytes.org

Database version: 5363

Windows 6.1.7600

Internet Explorer 8.0.7600.16385

12/24/2010 7:26:51 AM

mbam-log-2010-12-24 (07-26-51).txt

Scan type: Full scan (C:\|S:\|)

Objects scanned: 405411

Time elapsed: 49 minute(s), 34 second(s)

Memory Processes Infected: 0

Memory Modules Infected: 0

Registry Keys Infected: 1

Registry Values Infected: 0

Registry Data Items Infected: 0

Folders Infected: 0

Files Infected: 1

Memory Processes Infected:

(No malicious items detected)

Memory Modules Infected:

(No malicious items detected)

Registry Keys Infected:

HKEY_CURRENT_USER\Software\VB and VBA Program Settings\SrvID (Malware.Trace) -> Quarantined and deleted successfully.

Registry Values Infected:

(No malicious items detected)

Registry Data Items Infected:

(No malicious items detected)

Folders Infected:

(No malicious items detected)

Files Infected:

c:\Users\fred\AppData\Roaming\data.dat (Stolen.Data) -> Quarantined and deleted successfully.

Link to post
Share on other sites

Vista and Windows 7 users:

1. These tools MUST be run from the executable. (.exe) every time you run them

2. With Admin Rights (Right click, choose "Run as Administrator")

Download ComboFix from one of these locations:

Link 1

Link 2 If using this link, Right Click and select Save As.

* IMPORTANT !!! Save ComboFix.exe to your Desktop

  • Disable your AntiVirus and AntiSpyware applications, usually via a right click on the System Tray icon. They may otherwise interfere with our tools. Note: If you are having difficulty properly disabling your protective programs, or are unsure as to what programs need to be disabled, please refer to the information available through this link : Protective Programs
  • Double click on ComboFix.exe & follow the prompts.
    Notes: Combofix will run without the Recovery Console installed. Skip the Recovery Console part if you're running Vista or Windows 7.
    Note: If you have SP3, use the SP2 package.
    If Vista or Windows 7, skip the Recovery Console part
  • As part of it's process, ComboFix will check to see if the Microsoft Windows Recovery Console is installed. With malware infections being as they are today, it's strongly recommended to have this pre-installed on your machine before doing any malware removal. It will allow you to boot up into a special recovery/repair mode that will allow us to more easily help you should your computer have a problem after an attempted removal of malware.
  • Follow the prompts to allow ComboFix to download and install the Microsoft Windows Recovery Console, and when prompted, agree to the End-User License Agreement to install the Microsoft Windows Recovery Console.

**Please note: If the Microsoft Windows Recovery Console is already installed, ComboFix will continue it's malware removal procedures.

RC1.png

Once the Microsoft Windows Recovery Console is installed using ComboFix, you should see the following message:

RC2-1.png

Click on Yes, to continue scanning for malware.

When finished, it shall produce a log for you. Please include the C:\ComboFix.txt using Copy / Paste in your next reply.

Notes:

1.Do not mouse-click Combofix's window while it is running. That may cause it to stall.

2. ComboFix may reset a number of Internet Explorer's settings, including making I-E the default browser.

3. Combofix prevents autorun of ALL CD, floppy and USB devices to assist with malware removal & increase security. If this is an issue or makes it difficult for you -- please tell your helper.

4. CF disconnects your machine from the internet. The connection is automatically restored before CF completes its run. If CF runs into difficulty and terminates prematurely, the connection can be manually restored by restarting your machine.

Give it atleast 20-30 minutes to finish if needed.

Please do not attach the scan results from Combofx. Use copy/paste.

Also please describe how your computer behaves at the moment.

Link to post
Share on other sites

ComboFix 10-12-25.03 - fred 12/26/2010 10:40:09.1.8 - x64

Microsoft Windows 7 Ultimate 6.1.7600.0.1252.1.1033.18.16381.13712 [GMT -6:00]

Running from: c:\users\fred\Desktop\ComboFix.exe

AV: Microsoft Security Essentials *Disabled/Updated* {BF5CEBDC-F2D3-7540-343C-F0CE11FD6E66}

SP: Microsoft Security Essentials *Disabled/Updated* {043D0A38-D4E9-7ACE-0E8C-CBBC6A7A24DB}

SP: Windows Defender *Disabled/Updated* {D68DDC3A-831F-4fae-9E44-DA132C1ACF46}

.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))

.

c:\users\fred\g2mdlhlpx.exe

.

((((((((((((((((((((((((( Files Created from 2010-11-26 to 2010-12-26 )))))))))))))))))))))))))))))))

.

2010-12-26 16:43 . 2010-12-26 16:43 -------- d-----w- c:\users\Default\AppData\Local\temp

2010-12-26 14:16 . 2010-11-10 05:35 8199504 ----a-w- c:\programdata\Microsoft\Microsoft Antimalware\Definition Updates\{977B4AB6-625A-4E72-BEE3-0781AC949E09}\mpengine.dll

2010-12-24 07:05 . 2010-12-24 07:05 709456 ----a-w- c:\windows\isRS-000.tmp

2010-12-23 20:49 . 2010-12-23 20:50 -------- d-----w- c:\users\fred\AppData\Local\Adobe

2010-12-23 19:55 . 2010-12-23 19:55 -------- d-----w- c:\users\fred\AppData\Local\Apple

2010-12-23 19:55 . 2010-12-23 19:55 -------- d-----w- c:\users\fred\AppData\Local\Apple Computer

2010-12-21 06:11 . 2010-12-21 06:11 -------- d-----w- c:\users\fred\AppData\Roaming\Malwarebytes

2010-12-21 06:11 . 2010-12-21 06:11 -------- d-----w- c:\programdata\Malwarebytes

2010-12-21 06:11 . 2010-12-21 00:09 38224 ----a-w- c:\windows\SysWow64\drivers\mbamswissarmy.sys

2010-12-21 06:11 . 2010-12-24 07:07 -------- d-----w- c:\program files (x86)\Malwarebytes' Anti-Malware

2010-12-09 06:05 . 2010-12-09 06:05 539968 ----a-w- c:\programdata\Microsoft\eHome\Packages\MCESpotlight\MCESpotlight-2\SpotlightResources.dll

2010-11-27 14:51 . 2010-11-27 15:53 -------- d-----w- c:\programdata\Spybot - Search & Destroy

2010-11-27 14:51 . 2010-11-27 14:54 -------- d-----w- c:\program files (x86)\Spybot - Search & Destroy

2010-11-26 17:16 . 2010-11-26 17:54 -------- d-----w- c:\programdata\FLEXnet

.

(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))

.

2010-11-26 17:41 . 2008-08-14 13:57 86584 ----a-w- c:\windows\SysWow64\drivers\adfs.sys

2010-11-13 21:46 . 2010-11-13 21:46 737072 ----a-w- c:\programdata\Microsoft\eHome\Packages\SportsV2\SportsTemplateCore\Microsoft.MediaCenter.Sports.UI.dll

2010-11-13 21:46 . 2010-11-13 21:46 4277016 ----a-w- c:\programdata\Microsoft\eHome\Packages\MCEClientUX\UpdateableMarkup\markup.dll

2010-11-13 21:46 . 2010-11-13 21:46 42776 ----a-w- c:\programdata\Microsoft\eHome\Packages\MCEClientUX\dSM\StartResources.dll

2010-11-13 21:46 . 2010-11-13 21:46 588096 ----a-w- c:\programdata\Microsoft\eHome\Packages\MCESpotlight\MCESpotlight\SpotlightResources.dll

2010-11-10 05:35 . 2010-11-14 01:27 8199504 ----a-w- c:\programdata\Microsoft\Microsoft Antimalware\Definition Updates\Backup\mpengine.dll

2010-11-09 00:45 . 2010-11-25 13:36 558080 ----a-w- c:\users\fred\AppData\Roaming\Microsoft\System\Services\winlogon.exe

2010-10-08 00:12 . 2010-11-12 06:32 8006480 ----a-w- c:\programdata\Microsoft\Windows Defender\Definition Updates\{BC560CC4-3907-47D2-805B-D06109E6C73F}\mpengine.dll

2010-10-04 20:03 . 2010-05-29 03:58 2478624 ----a-w- c:\programdata\Microsoft\VisualStudio\10.0\1033\ResourceCache.dll

.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))

.

.

*Note* empty entries & legit default entries are not shown

REGEDIT4

[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\URLSearchHooks]

"{7b13ec3e-999a-4b70-b9cb-2617b8323822}"= "c:\program files (x86)\Zynga\tbZyn1.dll" [2010-12-06 2735200]

[HKEY_CLASSES_ROOT\clsid\{7b13ec3e-999a-4b70-b9cb-2617b8323822}]

[HKEY_LOCAL_MACHINE\Wow6432Node\~\Browser Helper Objects\{7b13ec3e-999a-4b70-b9cb-2617b8323822}]

2010-12-06 07:12 2735200 ----a-w- c:\program files (x86)\Zynga\tbZyn1.dll

[HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Toolbar]

"{7b13ec3e-999a-4b70-b9cb-2617b8323822}"= "c:\program files (x86)\Zynga\tbZyn1.dll" [2010-12-06 2735200]

[HKEY_CLASSES_ROOT\clsid\{7b13ec3e-999a-4b70-b9cb-2617b8323822}]

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]

"OfficeSyncProcess"="c:\program files (x86)\Microsoft Office\Office14\MSOSYNC.EXE" [2010-03-16 718208]

"winlogon.exe"="c:\users\fred\AppData\Roaming\Microsoft\System\Services\winlogon.exe" [2010-11-09 558080]

"SpybotSD TeaTimer"="c:\program files (x86)\Spybot - Search & Destroy\TeaTimer.exe" [2009-03-05 2260480]

[HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run]

"VirtualCloneDrive"="c:\program files (x86)\Elaborate Bytes\VirtualCloneDrive\VCDDaemon.exe" [2009-06-17 85160]

"BCSSync"="c:\program files (x86)\Microsoft Office\Office14\BCSSync.exe" [2010-03-13 91520]

"Samsung PanelMgr"="c:\windows\Samsung\PanelMgr\SSMMgr.exe" [2009-12-09 606208]

"Adobe Reader Speed Launcher"="c:\program files (x86)\Adobe\Reader 9.0\Reader\Reader_sl.exe" [2010-04-04 36272]

"3170 Scan2PC"="c:\windows\twain_32\Samsung\CLX3170\Scan2Pc.exe" [2009-06-12 503808]

"iTunesHelper"="c:\program files (x86)\iTunes\iTunesHelper.exe" [2010-11-11 421160]

"Malwarebytes' Anti-Malware (reboot)"="c:\program files (x86)\Malwarebytes' Anti-Malware\mbam.exe" [2010-12-21 963976]

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\system]

"ConsentPromptBehaviorAdmin"= 0 (0x0)

"ConsentPromptBehaviorUser"= 3 (0x3)

"EnableLUA"= 0 (0x0)

"EnableUIADesktopToggle"= 0 (0x0)

"PromptOnSecureDesktop"= 0 (0x0)

"EnableLinkedConnections"= 1 (0x1)

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\MsMpSvc]

@="Service"

R2 clr_optimization_v4.0.30319_32;Microsoft .NET Framework NGEN v4.0.30319_X86;c:\windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe [2010-03-18 130384]

R2 clr_optimization_v4.0.30319_64;Microsoft .NET Framework NGEN v4.0.30319_X64;c:\windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe [2010-03-18 138576]

R3 Adobe Version Cue CS4;Adobe Version Cue CS4;c:\program files (x86)\Common Files\Adobe\Adobe Version Cue CS4\Server\bin\VersionCueCS4.exe [2010-11-26 288112]

R3 Envy24HFS;ICE Envy24 Family Audio Controller WDM 64 bit;c:\windows\system32\drivers\Envy24HF.sys [2007-03-15 150016]

R3 FLEXnet Licensing Service 64;FLEXnet Licensing Service 64;c:\program files\Common Files\Macrovision Shared\FLEXnet Publisher\FNPLicensingService64.exe [2010-11-26 1038088]

R3 Microsoft SharePoint Workspace Audit Service;Microsoft SharePoint Workspace Audit Service;c:\program files (x86)\Microsoft Office\Office14\GROOVE.EXE [2010-03-25 30969208]

R3 osppsvc;Office Software Protection Platform;c:\program files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE [2010-01-10 4925184]

R3 USBAAPL64;Apple Mobile USB Driver;c:\windows\system32\Drivers\usbaapl64.sys [2010-09-28 51712]

R3 VSPerfDrv100;Performance Tools Driver 10.0;c:\program files (x86)\Microsoft Visual Studio 10.0\Team Tools\Performance Tools\x64\VSPerfDrv100.sys [2010-03-18 68440]

R3 WatAdminSvc;Windows Activation Technologies Service;c:\windows\system32\Wat\WatAdminSvc.exe [2010-05-26 1255736]

R4 MSSQLServerADHelper100;SQL Active Directory Helper Service;c:\program files\Microsoft SQL Server\100\Shared\SQLADHLP.EXE [2009-07-22 61976]

R4 RsFx0103;RsFx0103 Driver;c:\windows\system32\DRIVERS\RsFx0103.sys [2009-03-30 311656]

R4 SQLAgent$SQLEXPRESS;SQL Server Agent (SQLEXPRESS);c:\program files\Microsoft SQL Server\MSSQL10.SQLEXPRESS\MSSQL\Binn\SQLAGENT.EXE [2010-09-17 430424]

S1 Pd71HiFi.sys;Service for Prodigy 7.1 HiFi EWDM;c:\windows\system32\DRIVERS\Pd71HiFi.sys [2010-05-26 52320]

S2 NAUpdate;Nero Update;c:\program files (x86)\Nero\Update\NASvc.exe [2010-03-25 490280]

S2 SBSDWSCService;SBSD Security Center Service;c:\program files (x86)\Spybot - Search & Destroy\SDWinSec.exe [2009-01-26 1153368]

S2 SSPORT;SSPORT;c:\windows\system32\Drivers\SSPORT.sys [2007-08-14 11576]

S3 LGBusEnum;Logitech GamePanel Virtual Bus Enumerator Driver;c:\windows\system32\drivers\LGBusEnum.sys [2009-11-23 22408]

S3 LGPBTDD;LGPBTDD.sys Display Driver;c:\windows\system32\Drivers\LGPBTDD.sys [2009-07-01 30728]

S3 LGVirHid;Logitech Gamepanel Virtual HID Device Driver;c:\windows\system32\drivers\LGVirHid.sys [2009-11-23 16008]

S3 MpNWMon;Microsoft Malware Protection Network Driver;c:\windows\system32\DRIVERS\MpNWMon.sys [2010-03-26 40832]

S3 Pd71HiFiWdm.sys;Service for Prodigy 7.1 HiFi WDM;c:\windows\system32\DRIVERS\Pd71HiFiWdm.sys [2010-05-26 43616]

.

--------- x86-64 -----------

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]

"Launch LgDeviceAgent"="c:\program files\Logitech\GamePanel Software\LgDevAgt.exe" [2010-02-18 415816]

"Launch LCDMon"="c:\program files\Logitech\GamePanel Software\LCD Manager\LCDMon.exe" [2010-02-18 2093128]

"Launch LGDCore"="c:\program files\Logitech\GamePanel Software\G-series Software\LGDCore.exe" [2010-02-18 4271688]

"MSSE"="c:\program files\Microsoft Security Essentials\msseces.exe" [2010-09-15 1448568]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows]

"LoadAppInit_DLLs"=0x0

.

------- Supplementary Scan -------

.

uLocal Page = c:\windows\system32\blank.htm

uStart Page = hxxp://www.google.com/ig

mLocal Page = c:\windows\SysWOW64\blank.htm

uInternet Settings,ProxyOverride = *.local

IE: Append Link Target to Existing PDF - c:\program files (x86)\Common Files\Adobe\Acrobat\ActiveX\AcroIEFavClient.dll/AcroIEAppendSelLinks.html

IE: Append to Existing PDF - c:\program files (x86)\Common Files\Adobe\Acrobat\ActiveX\AcroIEFavClient.dll/AcroIEAppend.html

IE: Convert Link Target to Adobe PDF - c:\program files (x86)\Common Files\Adobe\Acrobat\ActiveX\AcroIEFavClient.dll/AcroIECaptureSelLinks.html

IE: Convert to Adobe PDF - c:\program files (x86)\Common Files\Adobe\Acrobat\ActiveX\AcroIEFavClient.dll/AcroIECapture.html

IE: E&xport to Microsoft Excel - c:\progra~2\MICROS~1\Office14\EXCEL.EXE/3000

IE: Se&nd to OneNote - c:\progra~2\MICROS~1\Office14\ONBttnIE.dll/105

Trusted Zone: blank

Filter: text/xml - {807573E5-5146-11D5-A672-00B0D022E945} - c:\program files (x86)\Common Files\microsoft shared\OFFICE14\MSOXMLMF.DLL

FF - ProfilePath - c:\users\fred\AppData\Roaming\Mozilla\Firefox\Profiles\lecvszsj.default\

FF - Ext: Default: {972ce4c6-7e08-4474-a285-3208198ce6fd} - c:\program files (x86)\Mozilla Firefox\extensions\{972ce4c6-7e08-4474-a285-3208198ce6fd}

FF - Ext: Zynga Toolbar: {7b13ec3e-999a-4b70-b9cb-2617b8323822} - %profile%\extensions\{7b13ec3e-999a-4b70-b9cb-2617b8323822}

.

- - - - ORPHANS REMOVED - - - -

WebBrowser-{7B13EC3E-999A-4B70-B9CB-2617B8323822} - (no file)

.

--------------------- LOCKED REGISTRY KEYS ---------------------

[HKEY_USERS\.Default\Software\Microsoft\Internet Explorer\User Preferences]

@Denied: (2) (LocalSystem)

"88D7D0879DAB32E14DE5B3A805A34F98AFF34F5977"=hex:01,00,00,00,d0,8c,9d,df,01,15,

d1,11,8c,7a,00,c0,4f,c2,97,eb,01,00,00,00,68,98,d9,5f,a4,4f,dd,4c,94,fe,19,\

"2D53CFFC5C1A3DD2E97B7979AC2A92BD59BC839E81"=hex:01,00,00,00,d0,8c,9d,df,01,15,

d1,11,8c,7a,00,c0,4f,c2,97,eb,01,00,00,00,68,98,d9,5f,a4,4f,dd,4c,94,fe,19,\

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{A483C63A-CDBC-426E-BF93-872502E8144E}]

@Denied: (A 2) (Everyone)

@="FlashBroker"

"LocalizedString"="@c:\\Windows\\SysWOW64\\Macromed\\Flash\\FlashUtil10i_ActiveX.exe,-101"

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{A483C63A-CDBC-426E-BF93-872502E8144E}\Elevation]

"Enabled"=dword:00000001

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{A483C63A-CDBC-426E-BF93-872502E8144E}\LocalServer32]

@="c:\\Windows\\SysWOW64\\Macromed\\Flash\\FlashUtil10i_ActiveX.exe"

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{A483C63A-CDBC-426E-BF93-872502E8144E}\TypeLib]

@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}]

@Denied: (A 2) (Everyone)

@="Shockwave Flash Object"

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\InprocServer32]

@="c:\\Windows\\SysWOW64\\Macromed\\Flash\\Flash10i.ocx"

"ThreadingModel"="Apartment"

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\MiscStatus]

@="0"

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\ProgID]

@="ShockwaveFlash.ShockwaveFlash.10"

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\ToolboxBitmap32]

@="c:\\Windows\\SysWOW64\\Macromed\\Flash\\Flash10i.ocx, 1"

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\TypeLib]

@="{D27CDB6B-AE6D-11cf-96B8-444553540000}"

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\Version]

@="1.0"

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\VersionIndependentProgID]

@="ShockwaveFlash.ShockwaveFlash"

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}]

@Denied: (A 2) (Everyone)

@="Macromedia Flash Factory Object"

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\InprocServer32]

@="c:\\Windows\\SysWOW64\\Macromed\\Flash\\Flash10i.ocx"

"ThreadingModel"="Apartment"

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\ProgID]

@="FlashFactory.FlashFactory.1"

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\ToolboxBitmap32]

@="c:\\Windows\\SysWOW64\\Macromed\\Flash\\Flash10i.ocx, 1"

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\TypeLib]

@="{D27CDB6B-AE6D-11cf-96B8-444553540000}"

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\Version]

@="1.0"

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\VersionIndependentProgID]

@="FlashFactory.FlashFactory"

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{E3F2C3CB-5EB8-4A04-B22C-7E3B4B6AF30F}]

@Denied: (A 2) (Everyone)

@="IFlashBroker4"

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{E3F2C3CB-5EB8-4A04-B22C-7E3B4B6AF30F}\ProxyStubClsid32]

@="{00020424-0000-0000-C000-000000000046}"

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{E3F2C3CB-5EB8-4A04-B22C-7E3B4B6AF30F}\TypeLib]

@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"

"Version"="1.0"

[HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Office\Common\Smart Tag\Actions\{B7EFF951-E52F-45CC-9EF7-57124F2177CC}]

@Denied: (A) (Everyone)

"Solution"="{15727DE6-F92D-4E46-ACB4-0E2C58B31A18}"

[HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Schema Library\ActionsPane3]

@Denied: (A) (Everyone)

[HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Schema Library\ActionsPane3\0]

"Key"="ActionsPane3"

"Location"="c:\\Program Files (x86)\\Common Files\\Microsoft Shared\\VSTO\\ActionsPane3.xsd"

[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\PCW\Security]

@Denied: (Full) (Everyone)

.

Completion time: 2010-12-26 11:59:24

ComboFix-quarantined-files.txt 2010-12-26 17:59

Pre-Run: 1,389,372,923,904 bytes free

Post-Run: 1,389,305,344,000 bytes free

- - End Of File - - 793D108975B158369647A78CE5B27098

Link to post
Share on other sites

Please go to http://www.virustotal.com/, click on Browse, and upload the following file for analysis:

C:\Windows\Microsoft.Net\Framework\v2.0.50727\vbc.exe

Then click Submit. Allow the file to be scanned, and then please copy and paste the results here for me to see.

If virustotal is too busy you can try these.

http://virusscan.jotti.org

http://www.kaspersky.com/scanforvirus.html

Link to post
Share on other sites

virustotal said:

File name: vbc.exe

Submission date: 2010-12-27 13:44:13 (UTC)

Current status: queued (#3) queued (#3) analysing finished

Result: 0/ 41 (0.0%)

MD5 : aeec0405a1c587562275ab20cc6e3521

SHA1 : 750d74424e8fca55094bbcd264970da6e59ddc09

SHA256: 6b2a3715c52c33b1f4d6523d673e3cdc9b5bc4ef8ac4b8b3211a0149f30c1200

ssdeep: 24576:tyCOPKsZLtrXcwtM9D+/K+R+YF+gOlB3g+friZZ1:ICcVZLtrsC/qY7OL3g+f6Z

File size : 1169224 bytes

First seen: 2010-05-04 00:51:17

Last seen : 2010-12-27 13:44:13

TrID:

Win32 Executable Generic (68.0%)

Generic Win/DOS Executable (15.9%)

DOS Executable Generic (15.9%)

Autodesk FLIC Image File (extensions: flc, fli, cel) (0.0%)

sigcheck:

publisher....: Microsoft Corporation

copyright....: © Microsoft Corporation. All rights reserved.

product......: Microsoft_ Visual Studio_ 2005

description..: Visual Basic Command Line Compiler

original name: vbc.exe

internal name: vbc.exe

file version.: 8.0.50727.4927

comments.....: n/a

signers......: Microsoft Corporation

Microsoft Code Signing PCA

Microsoft Root Authority

signing date.: 11:11 04/06/2009

verified.....: -

PEInfo: PE structure information

[[ basic data ]]

entrypointaddress: 0x7851A

timedatestamp....: 0x4A275F77 (Thu Jun 04 05:45:27 2009)

machinetype......: 0x14c (I386)

[[ 3 section(s) ]]

name, viradd, virsiz, rawdsiz, ntropy, md5

.text, 0x1000, 0xE5F4C, 0xE6000, 6.53, 8cdcd2ed5af5e1b03bc85a81e00cdf8b

.data, 0xE7000, 0x9604, 0x8E00, 1.95, 59bae1748c73d70d1171415cfcf63f78

.rsrc, 0xF1000, 0x2CC30, 0x2CE00, 3.41, 83656754ac81fb020e5ef889c5c7df45

[[ 9 import(s) ]]

mscoree.dll: LoadLibraryShim, GetCORSystemDirectory, StrongNameFreeBuffer, StrongNameErrorInfo, StrongNameTokenFromPublicKey, CorBindToCurrentRuntime, GetRealProcAddress

ole32.dll: CoCreateInstance, CoTaskMemRealloc, CoTaskMemAlloc, CoTaskMemFree, CoUninitialize, CoInitializeEx, CoGetClassObject, IIDFromString, StringFromGUID2, CoCreateGuid

OLEAUT32.dll: -, -, -, -, -, -, -, -, -, -, -, -, -, -, -, -, -, -, -, -, -, -, -, -, -, -, -, -, -, -

USER32.dll: UnregisterClassA

SHLWAPI.dll: PathIsUNCW, PathRemoveFileSpecW, PathAppendW, PathIsURLW

PSAPI.DLL: GetModuleFileNameExW

MSVCR80.dll: strcat_s, vsprintf_s, _purecall, atof, strncat_s, iswspace, exit, _resetstkoflw, printf, wcscat_s, qsort, _ui64tow_s, _i64tow_s, memmove, _CxxThrowException, _ultow_s, _vscwprintf, _mktime64, wcspbrk, _CIfmod, floor, wcsncmp, bsearch, _local_unwind4, _isnan, _CIpow, _wcsicmp, _wmakepath_s, _wtol, _access_s, _waccess_s, _swab, _stricmp, _strnicmp, strncpy, _amsg_exit, __wgetmainargs, _cexit, _exit, _XcptFilter, __winitenv, _initterm, _initterm_e, _configthreadlocale, __setusermatherr, _adjust_fdiv, __p__commode, __p__fmode, _encode_pointer, __set_app_type, _except_handler4_common, _unlock, __dllonexit, _lock, _onexit, _decode_pointer, _terminate@@YAXXZ, _invoke_watson, _controlfp_s, _crt_debugger_hook, __type_info_dtor_internal_method@type_info@@QAEXXZ, wcschr, wcscpy_s, iswalpha, _wcsnicmp, __2@YAPAXI@Z, ___U@YAPAXI@Z, _wcstoi64, _recalloc, wcsncpy_s, free, malloc, _wsplitpath_s, memcpy, wcstoul, _errno, fclose, _open_osfhandle, _fdopen, fwrite, wcsftime, fwprintf, fputws, memset, __iob_func, fgetws, wcsrchr, _time64, _localtime64, memcpy_s, _wtoi, _itow_s, isspace, _wcslwr_s, wcstok_s, _vsnwprintf_s, ___V@YAXPAX@Z, __3@YAXPAX@Z, _ecvt_s

ADVAPI32.dll: RegCloseKey, CryptGetHashParam, CryptReleaseContext, CryptDestroyHash, CryptCreateHash, CryptAcquireContextA, RegQueryValueExA, RegOpenKeyExA, CryptHashData

KERNEL32.dll: GetLocaleInfoA, SetFilePointer, CreateFileMappingA, ReadFile, GetProcessHeap, CreateFileA, DeleteFileA, GetFullPathNameA, FindNextFileA, FindFirstFileA, GetFileSize, GetShortPathNameA, GetFileTime, SetLastError, CreateToolhelp32Snapshot, Module32FirstW, Module32NextW, ReadProcessMemory, OpenThread, CompareFileTime, VirtualFree, VirtualAlloc, GetSystemInfo, HeapReAlloc, HeapDestroy, HeapCreate, LockResource, IsDebuggerPresent, DuplicateHandle, GetCurrentProcessId, GetCurrentThreadId, GetThreadLocale, SetEvent, ReleaseMutex, UnmapViewOfFile, MapViewOfFile, HeapAlloc, lstrlenA, HeapFree, GetCommandLineW, GetCommandLineA, LoadResource, SizeofResource, GetACP, InterlockedDecrement, InterlockedIncrement, LeaveCriticalSection, EnterCriticalSection, AreFileApisANSI, MultiByteToWideChar, IsValidCodePage, GetFileType, GetSystemDefaultLangID, TerminateProcess, GetCurrentProcess, WideCharToMultiByte, WriteFile, GetVersionExA, CloseHandle, DeleteCriticalSection, InitializeCriticalSection, GetUserDefaultLCID, GetSystemDefaultLCID, ConvertDefaultLocale, GetConsoleOutputCP, FindClose, RaiseException, InterlockedExchange, GetLastError, GetProcAddress, FreeLibrary, LocalAlloc, LocalFree, GetStdHandle, GetConsoleScreenBufferInfo, LoadLibraryA, Sleep, InterlockedCompareExchange, SetUnhandledExceptionFilter, QueryPerformanceCounter, GetTickCount, GetSystemTimeAsFileTime, UnhandledExceptionFilter, WaitForSingleObject, GetModuleFileNameA

ExifTool:

file metadata

CharacterSet: Unicode

CodeSize: 942080

CompanyName: Microsoft Corporation

EntryPoint: 0x7851a

FileDescription: Visual Basic Command Line Compiler

FileFlagsMask: 0x003f

FileOS: Win32

FileSize: 1142 kB

FileSubtype: 0

FileType: Win32 EXE

FileVersion: 8.0.50727.4927

FileVersionNumber: 8.0.50727.4927

ImageVersion: 8.0

InitializedDataSize: 222720

InternalName: vbc.exe

LanguageCode: English (U.S.)

LegalCopyright: Microsoft Corporation. All rights reserved.

LinkerVersion: 8.0

MIMEType: application/octet-stream

MachineType: Intel 386 or later, and compatibles

OSVersion: 5.0

ObjectFileType: Executable application

OriginalFilename: vbc.exe

PEType: PE32

ProductName: Microsoft Visual Studio 2005

ProductVersion: 8.0.50727.4927

ProductVersionNumber: 8.0.50727.4927

Subsystem: Windows command line

SubsystemVersion: 4.0

TimeStamp: 2009:06:04 07:45:27+02:00

UninitializedDataSize: 0

VT Community

1

User:Anonymous

Reputation:1 credits

Comment date:2010-12-19 06:56:31 (UTC)

this is 100% a Trojan!!!!

Connect to the Internet

Tags: Malware, NetworkWorm,

http://virusscan.jotti.org

Filename: svchost.exe

Status: Scan finished. 0 out of 19 scanners reported malware.

The last scanner listed said

The size of a file exceeds 1024 Kb

Link to post
Share on other sites

virustotal said:

File name: vbc.exe

Submission date: 2010-12-27 13:44:13 (UTC)

Current status: queued (#3) queued (#3) analysing finished

Result: 0/ 41 (0.0%)

All I can tell you about vbc.exe is out of 41 scanners, none found it bad.

http://www.eset.eu/online-scanner

Go here to run an online scannner from ESET.

Click the green ESET Online Scanner button.

Read the End User License Agreement and check the box: YES, I accept the Terms of Use.

Click on the Start button next to it.

You may receive an alert on the address bar that "This site might require the following ActiveX control...Click here to install...". Click on that alert and then click Insall ActiveX component.

A new window will appear asking "Do you want to install this software?"".

Answer Yes to download and install the ActiveX controls that allows the scan to run.

Click Start.

Check Remove found threats and Scan potentially unwanted applications.

Click Scan to begin.

If offered the option to get information or buy software. Just close the window.

Wait for the scan to finish

Use notepad to open the logfile located at C:\Program Files\EsetOnlineScanner\log.txt

Copy and paste that log as a reply to this topic.

Link to post
Share on other sites

ESETSmartInstaller@High as CAB hook log:

OnlineScanner64.ocx - registred OK

OnlineScanner.ocx - registred OK

# version=7

# iexplore.exe=8.00.7600.16385 (win7_rtm.090713-1255)

# OnlineScanner.ocx=1.0.0.6419

# api_version=3.0.2

# EOSSerial=292bf564e2ea0246b3bc62e05346e29d

# end=finished

# remove_checked=true

# archives_checked=false

# unwanted_checked=true

# unsafe_checked=false

# antistealth_checked=true

# utc_time=2010-12-27 06:59:07

# local_time=2010-12-27 12:59:07 (-0600, Central Standard Time (Mexico))

# country="United States"

# lang=9

# osver=6.1.7600 NT

# compatibility_mode=5891 16776573 100 100 0 22980662 0 0

# compatibility_mode=8192 67108863 100 0 0 0 0 0

# scanned=262512

# found=3

# cleaned=3

# scan_time=3463

C:\Users\fred\AppData\Roaming\Microsoft\System\Services\winlogon.exe a variant of MSIL/Injector.BI trojan (cleaned by deleting - quarantined) 00000000000000000000000000000000 C

S:\bt\GFI.LANguard.Network.Security.Scanner.v9.0.20081118.Incl.Keymaker-AGAiN\Keygen.exe a variant of Win32/Keygen.AF application (cleaned by deleting - quarantined) 00000000000000000000000000000000 C

S:\Software\EXE\Xilisoft iPhone Software Suite 2.1.39.1103\x-iphone-software-suite.exe NSIS/TrojanDownloader.FakeAlert.DK.Gen trojan (deleted - quarantined) 00000000000000000000000000000000 C

Link to post
Share on other sites

Good job thumbup.gif

The following will implement some cleanup procedures as well as reset System Restore points:

For XP:

  • Click START run
  • Now type ComboFix /Uninstall in the runbox and click OK. Note the space between the X and the U, it needs to be there.

For Vista / Windows 7

  • Click START Search
  • Now type ComboFix /Uninstall in the runbox and click OK. Note the space between the X and the U, it needs to be there.

If you used DeFogger

To re-enable your Emulation drivers, double click DeFogger to run the tool.

  • The application window will appear
  • Click the Re-enable button to re-enable your CD Emulation drivers
  • Click Yes to continue
  • A 'Finished!' message will appear
  • Click OK
  • DeFogger will now ask to reboot the machine - click OK

IMPORTANT! If you receive an error message while running DeFogger, please post the log defogger_enable which will appear on your desktop.

Your Emulation drivers are now re-enabled.

Here's my usual all clean post

To be on the safe side, I would also change all my passwords.

This infection appears to have been cleaned, but as the malware could be configured to run any program a remote attacker requires, it's impossible to be 100% sure that any machine is clean.

Log looks good :lol:

  • Make your Internet Explorer more secure - This can be done by following these simple instructions:
    1. From within Internet Explorer click on the Tools menu and then click on Options.
    2. Click once on the Security tab
    3. Click once on the Internet icon so it becomes highlighted.
    4. Click once on the Custom Level button.
    5. Change the Download signed ActiveX controls to Prompt
    6. Change the Download unsigned ActiveX controls to Disable
    7. Change the Initialize and script ActiveX controls not marked as safe to Disable
    8. Change the Installation of desktop items to Prompt
    9. Change the Launching programs and files in an IFRAME to Prompt
    10. Change the Navigate sub-frames across different domains to Prompt
    11. When all these settings have been made, click on the OK button.
    12. If it prompts you as to whether or not you want to save the settings, press the Yes button.
    13. Next press the Apply button and then the OK to exit the Internet Properties page.

    [*]Update your AntiVirus Software - It is imperative that you update your Antivirus software at least once a week

    (Even more if you wish). If you do not update your antivirus software then it will not be able to catch any of the new variants that may come out.

    [*]Use a Firewall - I can not stress how important it is that you use a Firewall on your computer.

    Without a firewall your computer is succeptible to being hacked and taken over.

    I am very serious about this and see it happen almost every day with my clients.

    Simply using a Firewall in its default configuration can lower your risk greatly.

    [*] WOT , Web of Trust, As 'Googling' is such an integral part of internet life, this free browser add on warns you about risky websites that try to scam visitors, deliver malware or send spam. It is especially helpful when browsing or searching in unfamiliar territory. WOT's color-coded icons show you ratings for 21 million websites, helping you avoid the dangerous sites:

    Green to go

    Yellow for caution

    Red to stop

    WOT has an addon available for both Firefox and IE.

    [*]Visit Microsoft's Windows Update Site Frequently - It is important that you visit http://www.windowsupdate.com regularly.

    This will ensure your computer has always the latest security updates available installed on your computer.

    If there are new updates to install, install them immediately, reboot your computer, and revisit the site

    until there are no more critical updates.

Only run one Anti-Virus and Firewall program.

I would suggest you read:

PC Safety and Security--What Do I Need?.

How to Prevent Malware:

Link to post
Share on other sites

Guest
This topic is now closed to further replies.
  • Recently Browsing   0 members

    • No registered users viewing this page.
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.