Jump to content

Multiple Infections: Search.Hijacker, Trojan.Zlob, DNSChanger


cps65

Recommended Posts

I have multiple infections on my computer. One or more of them prevents me from going to websites like malwarebytes.org so I can not update definitions. I have tried several free AV programs like AVG 9.0, Ad Aware, and Avast but get the best results from Malwarebytes. The problem is that once the infections have been cleaned I can not access the internet anymore with a browser or programs that use the net like Google Earth. How do I fix this? This is the log file from the scan:

Malwarebytes' Anti-Malware 1.50.1.1100

www.malwarebytes.org

Database version: 5363

Windows 5.1.2600 Service Pack 3

Internet Explorer 6.0.2900.5512

12/27/2010 12:46:08 PM

mbam-log-2010-12-27 (12-46-08).txt

Scan type: Full scan (C:\|)

Objects scanned: 201200

Time elapsed: 54 minute(s), 39 second(s)

Memory Processes Infected: 0

Memory Modules Infected: 0

Registry Keys Infected: 4

Registry Values Infected: 4

Registry Data Items Infected: 3

Folders Infected: 0

Files Infected: 2

Memory Processes Infected:

(No malicious items detected)

Memory Modules Infected:

(No malicious items detected)

Registry Keys Infected:

HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{DAED9266-8C28-4C1C-8B58-5C66EFF1D302} (Search.Hijacker) -> Quarantined and deleted successfully.

HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{9034A523-D068-4BE8-A284-9DF278BE776E} (Trojan.Zlob) -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Extensions\{9034A523-D068-4BE8-A284-9DF278BE776E} (Trojan.Zlob) -> Quarantined and deleted successfully.

HKEY_CURRENT_USER\SOFTWARE\Online Add-on (Trojan.Zlob) -> Quarantined and deleted successfully.

Registry Values Infected:

HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\Extensions\CmdMapping\{9034A523-D068-4BE8-A284-9DF278BE776E} (Trojan.Zlob) -> Value: {9034A523-D068-4BE8-A284-9DF278BE776E} -> Quarantined and deleted successfully.

HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\Extensions\CmdMapping\{9034A523-D068-4BE8-A284-9DF278BE776E} (Trojan.Zlob) -> Value: {9034A523-D068-4BE8-A284-9DF278BE776E} -> Quarantined and deleted successfully.

HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\New Windows\Allow\*.securewebinfo.com (Trojan.Zlob) -> Value: *.securewebinfo.com -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Services\del (Malware.Trace) -> Value: del -> Quarantined and deleted successfully.

Registry Data Items Infected:

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters\NameServer (Trojan.DNSChanger) -> Bad: (93.188.163.81,93.188.160.61) Good: () -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters\Interfaces\{AFBD6A06-A9D4-4152-96B2-8BA1CE2A79F0}\NameServer (Trojan.DNSChanger) -> Bad: (93.188.163.81,93.188.160.61) Good: () -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters\Interfaces\{FD58219A-69BA-486E-8C8F-E340B4BC30C5}\NameServer (Trojan.DNSChanger) -> Bad: (93.188.163.81,93.188.160.61) Good: () -> Quarantined and deleted successfully.

Folders Infected:

(No malicious items detected)

Files Infected:

c:\system volume information\_restore{dd79f995-fc47-45aa-b7f4-b463a4fc281b}\rp945\a0133490.dll (Rootkit.TDSS) -> Quarantined and deleted successfully.

c:\WINDOWS\system32\_id.dat (Malware.Trace) -> Quarantined and deleted successfully.

Link to post
Share on other sites

Hello cps65! Welcome to Malwarebytes' Anti-Malware Forums!

My name is Borislav and I will be glad to help you solve your problems with malware. Before we begin, please note the following:

  • The process of cleaning your system may take some time, so please be patient.
  • Follow my instructions step by step if there is a problem somewhere, stop and tell me.
  • Stay with the thread until I tell you that your system is clean. Missing symptoms does not mean that everything is okay.
  • Instructions that I give are for your system only!
  • If you don't know or can't understand something please ask.
  • Do not install or uninstall any software or hardware, while work on.
  • Keep me informed about any changes.

Download DDS and save it to your desktop from here or here or here.

Double click dds.scr to run the tool.

  • When done, DDS will open two (2) logs:
    1. DDS.txt
    2. Attach.txt

    [*]Save both reports to your desktop. Post them back to your topic.

Link to post
Share on other sites

Hello cps65! Welcome to Malwarebytes' Anti-Malware Forums!

My name is Borislav and I will be glad to help you solve your problems with malware. Before we begin, please note the following:

  • The process of cleaning your system may take some time, so please be patient.
  • Follow my instructions step by step if there is a problem somewhere, stop and tell me.
  • Stay with the thread until I tell you that your system is clean. Missing symptoms does not mean that everything is okay.
  • Instructions that I give are for your system only!
  • If you don't know or can't understand something please ask.
  • Do not install or uninstall any software or hardware, while work on.
  • Keep me informed about any changes.

Download DDS and save it to your desktop from here or here or here.

Double click dds.scr to run the tool.

  • When done, DDS will open two (2) logs:
    1. DDS.txt
    2. Attach.txt

    [*]Save both reports to your desktop. Post them back to your topic.

Link to post
Share on other sites

Borislav,

I have used Malwarebytes, before posting to this blog, and now can not use my computer to get on the internet. Should I restore my system and thereby reinstall the infections or can I save DDS to a flash drive from another computer and load it onto the computer I am having problems with the flash drive and post the reports back via the flash drive? Just trying to follow your instructions to the letter.

cps

Link to post
Share on other sites

**Note: If you need more detailed information, please visit the web page of ComboFix in BleepingComputer. **

Please note that these fixes are not instantaneous. Most infections require more than one round to properly eradicate.

Stay with me until given the 'all clear' even if symptoms diminish. Lack of symptoms does not always mean the job is complete.

Kindly follow my instructions and please do no fixing on your own or running of scanners unless requested by me or another helper.

Please download ComboFix from

Here or Here to your Desktop.

**Note: In the event you already have Combofix, this is a new version that I need you to download. It is important that it is saved and renamed following this process directly to your desktop**

  1. If you are using Firefox, make sure that your download settings are as follows:
    • Open Tools -> Options -> Main tab
    • Set to Always ask me where to Save the files.

[*]During the download, rename Combofix to Combo-Fix as follows:

CF_download_FF.gif

CF_download_rename.gif

[*]It is important you rename Combofix during the download, but not after.

[*]Please do not rename Combofix to other names, but only to the one indicated.

[*]Close any open browsers.

[*]Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.

-----------------------------------------------------------

  • Very Important! Temporarily disable your anti-virus, script blocking and any anti-malware real-time protection before performing a scan. They can interfere with ComboFix or remove some of its embedded files which may cause unpredictable results.
  • Click on this link to see a list of programs that should be disabled. The list is not all inclusive. If yours is not listed and you don't know how to disable it, please ask.

    -----------------------------------------------------------


  • Close any open browsers.
  • WARNING: Combofix will disconnect your machine from the Internet as soon as it starts
  • Please do not attempt to re-connect your machine back to the Internet until Combofix has completely finished.
  • If there is no internet connection after running Combofix, then restart your computer to restore back your connection.

-----------------------------------------------------------

[*]Double click on combo-Fix.exe & follow the prompts.

[*]When finished, it will produce a report for you.

[*]Please post the C:\Combo-Fix.txt for further review.

**Note: Do not mouseclick combo-fix's window while it's running. That may cause it to stall**

Link to post
Share on other sites

I ran Combo-Fix but as it was starting it informed me that I do not have 'Windows Restore Console' and asked if I wanted to download it. I clicked no because that computer will not conect to the internet. It then informed me that some serious problems would not be fixed. It went through about 65 or so steps and then deleted 3 or 4 files from c:\Windows\System32. Then I got the blue screen of death and it rebooted. It did not create C:\Combo-Fix.txt. It did create C:\Qoobox with several subdirectories but none of them have any .txt files. There is a file called C:\Qoobox\Quarantine\Catchme.log that is a text file. What should I do now?

Link to post
Share on other sites

Open Notepad and copy and paste the text in the code box below into it:

Folder::
c:\documents and settings\All Users\Application Data\pFpJi0630

Save the file to your desktop and name it CFScript.txt

Then drag the CFScript.txt into the ComboFix.exe as shown in the screenshot below.

CFScriptBAC0ALQ-4.gif

This will start ComboFix again. It may ask to reboot. Post the contents of Combofix.txt in your next reply.

Note: These instructions and script were created specifically for this user. If you are not this user, do NOT follow these instructions or use this script as it could damage the workings of your system.

Link to post
Share on other sites

ComboFix 10-12-26.01 - A1 12/29/2010 16:28:39.3.1 - x86

Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.510.235 [GMT -5:00]

Running from: c:\documents and settings\A1\Desktop\Combo-Fix.exe

Command switches used :: c:\documents and settings\A1\Desktop\cfscript.txt

.

((((((((((((((((((((((((( Files Created from 2010-11-28 to 2010-12-29 )))))))))))))))))))))))))))))))

.

2010-12-27 23:57 . 2010-12-27 23:57 -------- d-----w- c:\documents and settings\Administrator\Application Data\Malwarebytes

2010-12-27 21:46 . 2010-12-27 21:46 -------- d-----w- c:\windows\system32\wbem\Repository

2010-12-27 16:45 . 2010-12-27 16:45 -------- d-----w- c:\documents and settings\A1\Application Data\Malwarebytes

2010-12-27 16:44 . 2010-12-27 16:44 -------- d-----w- c:\documents and settings\All Users\Application Data\Malwarebytes

2010-12-27 16:44 . 2010-12-29 15:59 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware

2010-12-26 21:03 . 2010-12-28 03:03 -------- d-----w- c:\documents and settings\All Users\Application Data\SecTaskMan

2010-12-26 15:10 . 2010-12-27 23:49 -------- d-----w- c:\documents and settings\All Users\Application Data\Lavasoft

2010-12-25 21:57 . 2010-12-25 21:57 -------- d-----w- C:\kleaner.tmp

2010-12-25 19:01 . 2010-12-25 19:01 -------- d-----w- c:\program files\Alwil Software

2010-12-25 19:01 . 2010-12-25 19:01 -------- d-----w- c:\documents and settings\All Users\Application Data\Alwil Software

2010-12-15 12:40 . 2010-11-02 15:17 40960 -c----w- c:\windows\system32\dllcache\ndproxy.sys

2010-12-15 12:39 . 2010-10-11 14:59 45568 -c----w- c:\windows\system32\dllcache\wab.exe

2010-12-11 14:35 . 2010-12-11 15:42 -------- d-----w- c:\documents and settings\All Users\Application Data\pFpJi06301

.

(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))

.

2010-12-26 14:28 . 2007-09-06 19:53 8832 ----a-w- c:\windows\system32\drivers\wmiacpi.sys

2010-11-18 18:12 . 2007-07-17 20:34 81920 ----a-w- c:\windows\system32\isign32.dll

2010-11-05 05:05 . 2004-08-04 12:00 667136 ----a-w- c:\windows\system32\wininet.dll

2010-11-05 05:05 . 2004-08-04 12:00 61952 ----a-w- c:\windows\system32\tdc.ocx

2010-11-05 05:05 . 2004-08-04 12:00 81920 ----a-w- c:\windows\system32\ieencode.dll

2010-11-03 12:59 . 2004-08-04 12:00 369664 ----a-w- c:\windows\system32\html.iec

2010-11-02 15:17 . 2004-08-04 12:00 40960 ----a-w- c:\windows\system32\drivers\ndproxy.sys

2010-10-28 13:13 . 2004-08-04 12:00 290048 ----a-w- c:\windows\system32\atmfd.dll

2010-10-26 13:25 . 2004-08-04 12:00 1853312 ----a-w- c:\windows\system32\win32k.sys

.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))

.

.

*Note* empty entries & legit default entries are not shown

REGEDIT4

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]

"Google Update"="c:\documents and settings\A1\Local Settings\Application Data\Google\Update\GoogleUpdate.exe" [2009-06-30 133104]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]

"ATIPTA"="c:\program files\ATI Technologies\ATI Control Panel\atiptaxx.exe" [2005-12-02 344064]

"SynTPEnh"="c:\program files\Synaptics\SynTP\SynTPEnh.exe" [2007-06-08 827392]

"snpstd"="c:\windows\vsnpstd.exe" [2004-06-10 286720]

c:\documents and settings\All Users\Start Menu\Programs\Startup\

HP Digital Imaging Monitor.lnk - c:\program files\HP\Digital Imaging\bin\hpqtra08.exe [2009-11-18 275072]

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]

"EnableFirewall"= 0 (0x0)

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]

"%windir%\\system32\\sessmgr.exe"=

"c:\\Program Files\\ActiveFax\\Client\\ActFaxClient.exe"=

"c:\\Program Files\\Acronis\\TrueImageWorkstation\\TrueImage.exe"=

"%windir%\\Network Diagnostic\\xpnetdiag.exe"=

"c:\program files\Microsoft ActiveSync\rapimgr.exe"= c:\program files\Microsoft ActiveSync\rapimgr.exe:169.254.2.0/255.255.255.0:Enabled:ActiveSync RAPI Manager

"c:\program files\Microsoft ActiveSync\wcescomm.exe"= c:\program files\Microsoft ActiveSync\wcescomm.exe:169.254.2.0/255.255.255.0:Enabled:ActiveSync Connection Manager

"c:\program files\Microsoft ActiveSync\WCESMgr.exe"= c:\program files\Microsoft ActiveSync\WCESMgr.exe:169.254.2.0/255.255.255.0:Enabled:ActiveSync Application

"c:\\Program Files\\Jeyo\\JMC_WindowsMobile\\JMC_WM.exe"=

"c:\\Documents and Settings\\A1\\Local Settings\\Application Data\\Google\\Chrome\\Application\\chrome.exe"=

"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpqtra08.exe"=

"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpqste08.exe"=

"c:\\Program Files\\HP\\Digital Imaging\\bin\\hposid01.exe"=

"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpqkygrp.exe"=

"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpqcopy2.exe"=

"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpfcCopy.exe"=

"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpoews01.exe"=

"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpiscnapp.exe"=

"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpqgplgtupl.exe"=

"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpqgpc01.exe"=

"c:\\Program Files\\Google\\Google Earth\\client\\googleearth.exe"=

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\GloballyOpenPorts\List]

"26675:TCP"= 26675:TCP:169.254.2.0/255.255.255.0:Enabled:ActiveSync Service

R0 m5289;m5289;c:\windows\system32\drivers\m5289.sys [7/17/2007 4:31 PM 51840]

R0 uliagpkx;ULi AGP Bus Filter Driver;c:\windows\system32\drivers\AGPKX.SYS [7/17/2007 4:31 PM 44928]

R3 HSFHWATI;HSFHWATI;c:\windows\system32\drivers\HSFHWATI.sys [8/22/2005 1:06 PM 231424]

S2 ALIEHCD;ULi PCI to USB Enhanced Host Controller;c:\windows\system32\drivers\AliEhci.sys [7/17/2007 4:32 PM 83596]

S2 gupdate1ca2a3f11d69624;Google Update Service (gupdate1ca2a3f11d69624);c:\program files\Google\Update\GoogleUpdate.exe [8/31/2009 8:29 AM 133104]

S2 Mlgpib;Mlgpib;c:\windows\system32\drivers\MLGPIB.sys [5/6/1999 3:55 AM 13824]

S3 aliroothub;USB 2.0 Root Hub;c:\windows\system32\drivers\AliRtHub.sys [7/17/2007 4:32 PM 5331]

S3 AVG Security Toolbar Service;AVG Security Toolbar Service;c:\program files\AVG\AVG9\Toolbar\ToolbarBroker.exe --> c:\program files\AVG\AVG9\Toolbar\ToolbarBroker.exe [?]

S3 ip100xp;IC Plus IP100 10/100 Fast Ethernet Adapter NT Driver;c:\windows\system32\drivers\ipfnd51.sys [7/17/2007 4:16 PM 26752]

S3 m4cxwxp;NDIS5.1 Miniport Driver for D-Link DGE-530T Gigabit Ethernet Adapter;c:\windows\system32\drivers\m4cxwxp.sys [7/18/2007 3:54 PM 171264]

S3 ML751;MLUSB.sys - Driver for Microlink 751;c:\windows\system32\drivers\mlusb.sys [12/11/2003 4:27 AM 11497]

S3 SkLaggProtocol;Link Aggregation Protocol (LAGG) Support;c:\windows\system32\DRIVERS\sklagg.sys --> c:\windows\system32\DRIVERS\sklagg.sys [?]

S3 TridVid;TM5600 TV Service;c:\windows\system32\drivers\TridVid.sys [8/9/2008 11:37 AM 230528]

S3 TridVidx86;Trident TVMaster TM6000 Analog plus Digital Video Service x86;c:\windows\system32\drivers\TridVidx86.sys [7/31/2007 10:12 AM 163456]

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\svchost]

HPZ12 REG_MULTI_SZ Pml Driver HPZ12 Net Driver HPZ12

HPService REG_MULTI_SZ HPSLPSVC

hpdevmgmt REG_MULTI_SZ hpqcxs08 hpqddsvc

.

Contents of the 'Scheduled Tasks' folder

2008-09-08 c:\windows\Tasks\AppleSoftwareUpdate.job

- c:\program files\Apple Software Update\SoftwareUpdate.exe [2007-06-03 17:42]

2010-12-29 c:\windows\Tasks\Google Software Updater.job

- c:\program files\Google\Common\Google Updater\GoogleUpdaterService.exe [2009-08-31 22:08]

2010-12-29 c:\windows\Tasks\GoogleUpdateTaskMachineCore.job

- c:\program files\Google\Update\GoogleUpdate.exe [2009-08-31 13:29]

2010-12-29 c:\windows\Tasks\GoogleUpdateTaskMachineUA.job

- c:\program files\Google\Update\GoogleUpdate.exe [2009-08-31 13:29]

2010-12-29 c:\windows\Tasks\GoogleUpdateTaskUserS-1-5-21-842925246-1957994488-725345543-1003Core.job

- c:\documents and settings\A1\Local Settings\Application Data\Google\Update\GoogleUpdate.exe [2009-07-08 11:19]

2010-12-29 c:\windows\Tasks\GoogleUpdateTaskUserS-1-5-21-842925246-1957994488-725345543-1003UA.job

- c:\documents and settings\A1\Local Settings\Application Data\Google\Update\GoogleUpdate.exe [2009-07-08 11:19]

.

.

------- Supplementary Scan -------

.

uStart Page = hxxp://www.yahoo.com/

IE: Convert link target to Adobe PDF - c:\program files\Adobe\Acrobat 7.0\Acrobat\AcroIEFavClient.dll/AcroIECapture.html

IE: Convert link target to existing PDF - c:\program files\Adobe\Acrobat 7.0\Acrobat\AcroIEFavClient.dll/AcroIEAppend.html

IE: Convert selected links to Adobe PDF - c:\program files\Adobe\Acrobat 7.0\Acrobat\AcroIEFavClient.dll/AcroIECaptureSelLinks.html

IE: Convert selected links to existing PDF - c:\program files\Adobe\Acrobat 7.0\Acrobat\AcroIEFavClient.dll/AcroIEAppendSelLinks.html

IE: Convert selection to Adobe PDF - c:\program files\Adobe\Acrobat 7.0\Acrobat\AcroIEFavClient.dll/AcroIECapture.html

IE: Convert selection to existing PDF - c:\program files\Adobe\Acrobat 7.0\Acrobat\AcroIEFavClient.dll/AcroIEAppend.html

IE: Convert to Adobe PDF - c:\program files\Adobe\Acrobat 7.0\Acrobat\AcroIEFavClient.dll/AcroIECapture.html

IE: Convert to existing PDF - c:\program files\Adobe\Acrobat 7.0\Acrobat\AcroIEFavClient.dll/AcroIEAppend.html

IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~2\OFFICE11\EXCEL.EXE/3000

Handler: avgsecuritytoolbar - {F2DDE6B2-9684-4A55-86D4-E255E237B77C} -

.

**************************************************************************

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net

Rootkit scan 2010-12-29 16:33

Windows 5.1.2600 Service Pack 3 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully

hidden files: 0

**************************************************************************

.

--------------------- LOCKED REGISTRY KEYS ---------------------

[HKEY_USERS\S-1-5-21-842925246-1957994488-725345543-1003\Software\Microsoft\Windows Mobile Disc\S*a*m*s*u*n*g* *B*l*a*c*k*J*a*c*k*"!\CriticalAppInstall\ActiveSync]

"Name"="ActiveSync"

"DisplayName"="Microsoft ActiveSync"

"Param1"="ActiveSync"

"Type"="wellknown"

"Order"=dword:00000000

"State"=dword:0000000b

[HKEY_USERS\S-1-5-21-842925246-1957994488-725345543-1003\Software\Microsoft\Windows Mobile Disc\S*a*m*s*u*n*g* *B*l*a*c*k*J*a*c*k*"!\CriticalAppInstall\IESettings]

"Name"="IESettings"

"Type"="IESettings"

"Order"=dword:00000003

"State"=dword:0000000b

[HKEY_USERS\S-1-5-21-842925246-1957994488-725345543-1003\Software\Microsoft\Windows Mobile Disc\S*a*m*s*u*n*g* *B*l*a*c*k*J*a*c*k*"!\CriticalAppInstall\MediaFiles]

"Name"="MediaFiles"

"Type"="MediaFiles"

"Order"=dword:00000002

"State"=dword:0000000b

[HKEY_USERS\S-1-5-21-842925246-1957994488-725345543-1003\Software\Microsoft\Windows Mobile Disc\S*a*m*s*u*n*g* *B*l*a*c*k*J*a*c*k*"!\CriticalAppInstall\NPW]

"Name"="NPW"

"Param1"="NPW"

"Type"="wellknown"

"Order"=dword:00000001

"State"=dword:0000000b

.

--------------------- DLLs Loaded Under Running Processes ---------------------

- - - - - - - > 'winlogon.exe'(928)

c:\windows\system32\Ati2evxx.dll

- - - - - - - > 'explorer.exe'(3684)

c:\windows\system32\WPDShServiceObj.dll

c:\windows\system32\PortableDeviceTypes.dll

c:\windows\system32\PortableDeviceApi.dll

.

Completion time: 2010-12-29 16:36:06

ComboFix-quarantined-files.txt 2010-12-29 21:35

ComboFix2.txt 2010-12-29 18:05

Pre-Run: 52,468,940,800 bytes free

Post-Run: 52,453,220,352 bytes free

- - End Of File - - A6C5CE48783644BFAD79E026153A4639

Link to post
Share on other sites

You script was not activated. Change the name to: CFScript

Would this have been caused by not having the restore console, or do the c, f and s really need to be capitalized? I just dragged the restore console icon onto the ComboFix icon the first time.

ComboFix 10-12-26.01 - A1 12/29/2010 16:57:36.4.1 - x86

Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.510.213 [GMT -5:00]

Running from: c:\documents and settings\A1\Desktop\Combo-Fix.exe

Command switches used :: c:\documents and settings\A1\Desktop\CFScript.txt

.

((((((((((((((((((((((((( Files Created from 2010-11-28 to 2010-12-29 )))))))))))))))))))))))))))))))

.

2010-12-27 23:57 . 2010-12-27 23:57 -------- d-----w- c:\documents and settings\Administrator\Application Data\Malwarebytes

2010-12-27 21:46 . 2010-12-27 21:46 -------- d-----w- c:\windows\system32\wbem\Repository

2010-12-27 16:45 . 2010-12-27 16:45 -------- d-----w- c:\documents and settings\A1\Application Data\Malwarebytes

2010-12-27 16:44 . 2010-12-27 16:44 -------- d-----w- c:\documents and settings\All Users\Application Data\Malwarebytes

2010-12-27 16:44 . 2010-12-29 15:59 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware

2010-12-26 21:03 . 2010-12-28 03:03 -------- d-----w- c:\documents and settings\All Users\Application Data\SecTaskMan

2010-12-26 15:10 . 2010-12-27 23:49 -------- d-----w- c:\documents and settings\All Users\Application Data\Lavasoft

2010-12-25 21:57 . 2010-12-25 21:57 -------- d-----w- C:\kleaner.tmp

2010-12-25 19:01 . 2010-12-25 19:01 -------- d-----w- c:\program files\Alwil Software

2010-12-25 19:01 . 2010-12-25 19:01 -------- d-----w- c:\documents and settings\All Users\Application Data\Alwil Software

2010-12-15 12:40 . 2010-11-02 15:17 40960 -c----w- c:\windows\system32\dllcache\ndproxy.sys

2010-12-15 12:39 . 2010-10-11 14:59 45568 -c----w- c:\windows\system32\dllcache\wab.exe

2010-12-11 14:35 . 2010-12-11 15:42 -------- d-----w- c:\documents and settings\All Users\Application Data\pFpJi06301

.

(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))

.

2010-12-26 14:28 . 2007-09-06 19:53 8832 ----a-w- c:\windows\system32\drivers\wmiacpi.sys

2010-11-18 18:12 . 2007-07-17 20:34 81920 ----a-w- c:\windows\system32\isign32.dll

2010-11-05 05:05 . 2004-08-04 12:00 667136 ----a-w- c:\windows\system32\wininet.dll

2010-11-05 05:05 . 2004-08-04 12:00 61952 ----a-w- c:\windows\system32\tdc.ocx

2010-11-05 05:05 . 2004-08-04 12:00 81920 ----a-w- c:\windows\system32\ieencode.dll

2010-11-03 12:59 . 2004-08-04 12:00 369664 ----a-w- c:\windows\system32\html.iec

2010-11-02 15:17 . 2004-08-04 12:00 40960 ----a-w- c:\windows\system32\drivers\ndproxy.sys

2010-10-28 13:13 . 2004-08-04 12:00 290048 ----a-w- c:\windows\system32\atmfd.dll

2010-10-26 13:25 . 2004-08-04 12:00 1853312 ----a-w- c:\windows\system32\win32k.sys

.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))

.

.

*Note* empty entries & legit default entries are not shown

REGEDIT4

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]

"Google Update"="c:\documents and settings\A1\Local Settings\Application Data\Google\Update\GoogleUpdate.exe" [2009-06-30 133104]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]

"ATIPTA"="c:\program files\ATI Technologies\ATI Control Panel\atiptaxx.exe" [2005-12-02 344064]

"SynTPEnh"="c:\program files\Synaptics\SynTP\SynTPEnh.exe" [2007-06-08 827392]

"snpstd"="c:\windows\vsnpstd.exe" [2004-06-10 286720]

c:\documents and settings\All Users\Start Menu\Programs\Startup\

HP Digital Imaging Monitor.lnk - c:\program files\HP\Digital Imaging\bin\hpqtra08.exe [2009-11-18 275072]

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]

"EnableFirewall"= 0 (0x0)

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]

"%windir%\\system32\\sessmgr.exe"=

"c:\\Program Files\\ActiveFax\\Client\\ActFaxClient.exe"=

"c:\\Program Files\\Acronis\\TrueImageWorkstation\\TrueImage.exe"=

"%windir%\\Network Diagnostic\\xpnetdiag.exe"=

"c:\program files\Microsoft ActiveSync\rapimgr.exe"= c:\program files\Microsoft ActiveSync\rapimgr.exe:169.254.2.0/255.255.255.0:Enabled:ActiveSync RAPI Manager

"c:\program files\Microsoft ActiveSync\wcescomm.exe"= c:\program files\Microsoft ActiveSync\wcescomm.exe:169.254.2.0/255.255.255.0:Enabled:ActiveSync Connection Manager

"c:\program files\Microsoft ActiveSync\WCESMgr.exe"= c:\program files\Microsoft ActiveSync\WCESMgr.exe:169.254.2.0/255.255.255.0:Enabled:ActiveSync Application

"c:\\Program Files\\Jeyo\\JMC_WindowsMobile\\JMC_WM.exe"=

"c:\\Documents and Settings\\A1\\Local Settings\\Application Data\\Google\\Chrome\\Application\\chrome.exe"=

"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpqtra08.exe"=

"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpqste08.exe"=

"c:\\Program Files\\HP\\Digital Imaging\\bin\\hposid01.exe"=

"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpqkygrp.exe"=

"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpqcopy2.exe"=

"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpfcCopy.exe"=

"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpoews01.exe"=

"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpiscnapp.exe"=

"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpqgplgtupl.exe"=

"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpqgpc01.exe"=

"c:\\Program Files\\Google\\Google Earth\\client\\googleearth.exe"=

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\GloballyOpenPorts\List]

"26675:TCP"= 26675:TCP:169.254.2.0/255.255.255.0:Enabled:ActiveSync Service

R0 m5289;m5289;c:\windows\system32\drivers\m5289.sys [7/17/2007 4:31 PM 51840]

R0 uliagpkx;ULi AGP Bus Filter Driver;c:\windows\system32\drivers\AGPKX.SYS [7/17/2007 4:31 PM 44928]

R3 HSFHWATI;HSFHWATI;c:\windows\system32\drivers\HSFHWATI.sys [8/22/2005 1:06 PM 231424]

S2 ALIEHCD;ULi PCI to USB Enhanced Host Controller;c:\windows\system32\drivers\AliEhci.sys [7/17/2007 4:32 PM 83596]

S2 gupdate1ca2a3f11d69624;Google Update Service (gupdate1ca2a3f11d69624);c:\program files\Google\Update\GoogleUpdate.exe [8/31/2009 8:29 AM 133104]

S2 Mlgpib;Mlgpib;c:\windows\system32\drivers\MLGPIB.sys [5/6/1999 3:55 AM 13824]

S3 aliroothub;USB 2.0 Root Hub;c:\windows\system32\drivers\AliRtHub.sys [7/17/2007 4:32 PM 5331]

S3 AVG Security Toolbar Service;AVG Security Toolbar Service;c:\program files\AVG\AVG9\Toolbar\ToolbarBroker.exe --> c:\program files\AVG\AVG9\Toolbar\ToolbarBroker.exe [?]

S3 ip100xp;IC Plus IP100 10/100 Fast Ethernet Adapter NT Driver;c:\windows\system32\drivers\ipfnd51.sys [7/17/2007 4:16 PM 26752]

S3 m4cxwxp;NDIS5.1 Miniport Driver for D-Link DGE-530T Gigabit Ethernet Adapter;c:\windows\system32\drivers\m4cxwxp.sys [7/18/2007 3:54 PM 171264]

S3 ML751;MLUSB.sys - Driver for Microlink 751;c:\windows\system32\drivers\mlusb.sys [12/11/2003 4:27 AM 11497]

S3 SkLaggProtocol;Link Aggregation Protocol (LAGG) Support;c:\windows\system32\DRIVERS\sklagg.sys --> c:\windows\system32\DRIVERS\sklagg.sys [?]

S3 TridVid;TM5600 TV Service;c:\windows\system32\drivers\TridVid.sys [8/9/2008 11:37 AM 230528]

S3 TridVidx86;Trident TVMaster TM6000 Analog plus Digital Video Service x86;c:\windows\system32\drivers\TridVidx86.sys [7/31/2007 10:12 AM 163456]

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\svchost]

HPZ12 REG_MULTI_SZ Pml Driver HPZ12 Net Driver HPZ12

HPService REG_MULTI_SZ HPSLPSVC

hpdevmgmt REG_MULTI_SZ hpqcxs08 hpqddsvc

.

Contents of the 'Scheduled Tasks' folder

2008-09-08 c:\windows\Tasks\AppleSoftwareUpdate.job

- c:\program files\Apple Software Update\SoftwareUpdate.exe [2007-06-03 17:42]

2010-12-29 c:\windows\Tasks\Google Software Updater.job

- c:\program files\Google\Common\Google Updater\GoogleUpdaterService.exe [2009-08-31 22:08]

2010-12-29 c:\windows\Tasks\GoogleUpdateTaskMachineCore.job

- c:\program files\Google\Update\GoogleUpdate.exe [2009-08-31 13:29]

2010-12-29 c:\windows\Tasks\GoogleUpdateTaskMachineUA.job

- c:\program files\Google\Update\GoogleUpdate.exe [2009-08-31 13:29]

2010-12-29 c:\windows\Tasks\GoogleUpdateTaskUserS-1-5-21-842925246-1957994488-725345543-1003Core.job

- c:\documents and settings\A1\Local Settings\Application Data\Google\Update\GoogleUpdate.exe [2009-07-08 11:19]

2010-12-29 c:\windows\Tasks\GoogleUpdateTaskUserS-1-5-21-842925246-1957994488-725345543-1003UA.job

- c:\documents and settings\A1\Local Settings\Application Data\Google\Update\GoogleUpdate.exe [2009-07-08 11:19]

.

.

------- Supplementary Scan -------

.

uStart Page = hxxp://www.yahoo.com/

IE: Convert link target to Adobe PDF - c:\program files\Adobe\Acrobat 7.0\Acrobat\AcroIEFavClient.dll/AcroIECapture.html

IE: Convert link target to existing PDF - c:\program files\Adobe\Acrobat 7.0\Acrobat\AcroIEFavClient.dll/AcroIEAppend.html

IE: Convert selected links to Adobe PDF - c:\program files\Adobe\Acrobat 7.0\Acrobat\AcroIEFavClient.dll/AcroIECaptureSelLinks.html

IE: Convert selected links to existing PDF - c:\program files\Adobe\Acrobat 7.0\Acrobat\AcroIEFavClient.dll/AcroIEAppendSelLinks.html

IE: Convert selection to Adobe PDF - c:\program files\Adobe\Acrobat 7.0\Acrobat\AcroIEFavClient.dll/AcroIECapture.html

IE: Convert selection to existing PDF - c:\program files\Adobe\Acrobat 7.0\Acrobat\AcroIEFavClient.dll/AcroIEAppend.html

IE: Convert to Adobe PDF - c:\program files\Adobe\Acrobat 7.0\Acrobat\AcroIEFavClient.dll/AcroIECapture.html

IE: Convert to existing PDF - c:\program files\Adobe\Acrobat 7.0\Acrobat\AcroIEFavClient.dll/AcroIEAppend.html

IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~2\OFFICE11\EXCEL.EXE/3000

Handler: avgsecuritytoolbar - {F2DDE6B2-9684-4A55-86D4-E255E237B77C} -

.

**************************************************************************

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net

Rootkit scan 2010-12-29 17:02

Windows 5.1.2600 Service Pack 3 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully

hidden files: 0

**************************************************************************

.

--------------------- LOCKED REGISTRY KEYS ---------------------

[HKEY_USERS\S-1-5-21-842925246-1957994488-725345543-1003\Software\Microsoft\Windows Mobile Disc\S*a*m*s*u*n*g* *B*l*a*c*k*J*a*c*k*"!\CriticalAppInstall\ActiveSync]

"Name"="ActiveSync"

"DisplayName"="Microsoft ActiveSync"

"Param1"="ActiveSync"

"Type"="wellknown"

"Order"=dword:00000000

"State"=dword:0000000b

[HKEY_USERS\S-1-5-21-842925246-1957994488-725345543-1003\Software\Microsoft\Windows Mobile Disc\S*a*m*s*u*n*g* *B*l*a*c*k*J*a*c*k*"!\CriticalAppInstall\IESettings]

"Name"="IESettings"

"Type"="IESettings"

"Order"=dword:00000003

"State"=dword:0000000b

[HKEY_USERS\S-1-5-21-842925246-1957994488-725345543-1003\Software\Microsoft\Windows Mobile Disc\S*a*m*s*u*n*g* *B*l*a*c*k*J*a*c*k*"!\CriticalAppInstall\MediaFiles]

"Name"="MediaFiles"

"Type"="MediaFiles"

"Order"=dword:00000002

"State"=dword:0000000b

[HKEY_USERS\S-1-5-21-842925246-1957994488-725345543-1003\Software\Microsoft\Windows Mobile Disc\S*a*m*s*u*n*g* *B*l*a*c*k*J*a*c*k*"!\CriticalAppInstall\NPW]

"Name"="NPW"

"Param1"="NPW"

"Type"="wellknown"

"Order"=dword:00000001

"State"=dword:0000000b

.

--------------------- DLLs Loaded Under Running Processes ---------------------

- - - - - - - > 'winlogon.exe'(928)

c:\windows\system32\Ati2evxx.dll

- - - - - - - > 'explorer.exe'(2552)

c:\windows\system32\WPDShServiceObj.dll

c:\windows\system32\PortableDeviceTypes.dll

c:\windows\system32\PortableDeviceApi.dll

.

Completion time: 2010-12-29 17:04:49

ComboFix-quarantined-files.txt 2010-12-29 22:04

ComboFix2.txt 2010-12-29 21:36

ComboFix3.txt 2010-12-29 18:05

Pre-Run: 52,464,517,120 bytes free

Post-Run: 52,449,050,624 bytes free

- - End Of File - - CDD37D972F33218C38130FE23B537DBC

Link to post
Share on other sites

When I ran ComboFix the last two times I dragged the CFScript.txt icon onto the ComboFix icon as directed with the Windows Restore Console icon (I assumed this is how you wanted me to do it the picture in the post above was not there.) Should I run the Windows Restore Console and perminately install it on my computer?

Link to post
Share on other sites

Re-ran Combofix.

ComboFix 10-12-26.01 - A1 12/30/2010 10:16:47.5.1 - x86

Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.510.255 [GMT -5:00]

Running from: c:\documents and settings\A1\Desktop\Combo-Fix.exe

Command switches used :: c:\documents and settings\A1\Desktop\CFScript.txt

.

((((((((((((((((((((((((( Files Created from 2010-11-28 to 2010-12-30 )))))))))))))))))))))))))))))))

.

2010-12-27 23:57 . 2010-12-27 23:57 -------- d-----w- c:\documents and settings\Administrator\Application Data\Malwarebytes

2010-12-27 21:46 . 2010-12-27 21:46 -------- d-----w- c:\windows\system32\wbem\Repository

2010-12-27 16:45 . 2010-12-27 16:45 -------- d-----w- c:\documents and settings\A1\Application Data\Malwarebytes

2010-12-27 16:44 . 2010-12-27 16:44 -------- d-----w- c:\documents and settings\All Users\Application Data\Malwarebytes

2010-12-27 16:44 . 2010-12-29 15:59 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware

2010-12-26 21:03 . 2010-12-28 03:03 -------- d-----w- c:\documents and settings\All Users\Application Data\SecTaskMan

2010-12-26 15:10 . 2010-12-27 23:49 -------- d-----w- c:\documents and settings\All Users\Application Data\Lavasoft

2010-12-25 21:57 . 2010-12-25 21:57 -------- d-----w- C:\kleaner.tmp

2010-12-25 19:01 . 2010-12-25 19:01 -------- d-----w- c:\program files\Alwil Software

2010-12-25 19:01 . 2010-12-25 19:01 -------- d-----w- c:\documents and settings\All Users\Application Data\Alwil Software

2010-12-15 12:40 . 2010-11-02 15:17 40960 -c----w- c:\windows\system32\dllcache\ndproxy.sys

2010-12-15 12:39 . 2010-10-11 14:59 45568 -c----w- c:\windows\system32\dllcache\wab.exe

.

(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))

.

2010-12-26 14:28 . 2007-09-06 19:53 8832 ----a-w- c:\windows\system32\drivers\wmiacpi.sys

2010-11-18 18:12 . 2007-07-17 20:34 81920 ----a-w- c:\windows\system32\isign32.dll

2010-11-05 05:05 . 2004-08-04 12:00 667136 ----a-w- c:\windows\system32\wininet.dll

2010-11-05 05:05 . 2004-08-04 12:00 61952 ----a-w- c:\windows\system32\tdc.ocx

2010-11-05 05:05 . 2004-08-04 12:00 81920 ----a-w- c:\windows\system32\ieencode.dll

2010-11-03 12:59 . 2004-08-04 12:00 369664 ----a-w- c:\windows\system32\html.iec

2010-11-02 15:17 . 2004-08-04 12:00 40960 ----a-w- c:\windows\system32\drivers\ndproxy.sys

2010-10-28 13:13 . 2004-08-04 12:00 290048 ----a-w- c:\windows\system32\atmfd.dll

2010-10-26 13:25 . 2004-08-04 12:00 1853312 ----a-w- c:\windows\system32\win32k.sys

.

((((((((((((((((((((((((((((( SnapShot@2010-12-29_21.33.57 )))))))))))))))))))))))))))))))))))))))))

.

+ 2010-12-30 15:01 . 2010-12-30 15:01 16384 c:\windows\Temp\Perflib_Perfdata_250.dat

.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))

.

.

*Note* empty entries & legit default entries are not shown

REGEDIT4

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]

"Google Update"="c:\documents and settings\A1\Local Settings\Application Data\Google\Update\GoogleUpdate.exe" [2009-06-30 133104]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]

"ATIPTA"="c:\program files\ATI Technologies\ATI Control Panel\atiptaxx.exe" [2005-12-02 344064]

"SynTPEnh"="c:\program files\Synaptics\SynTP\SynTPEnh.exe" [2007-06-08 827392]

"snpstd"="c:\windows\vsnpstd.exe" [2004-06-10 286720]

c:\documents and settings\All Users\Start Menu\Programs\Startup\

HP Digital Imaging Monitor.lnk - c:\program files\HP\Digital Imaging\bin\hpqtra08.exe [2009-11-18 275072]

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]

"EnableFirewall"= 0 (0x0)

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]

"%windir%\\system32\\sessmgr.exe"=

"c:\\Program Files\\ActiveFax\\Client\\ActFaxClient.exe"=

"c:\\Program Files\\Acronis\\TrueImageWorkstation\\TrueImage.exe"=

"%windir%\\Network Diagnostic\\xpnetdiag.exe"=

"c:\program files\Microsoft ActiveSync\rapimgr.exe"= c:\program files\Microsoft ActiveSync\rapimgr.exe:169.254.2.0/255.255.255.0:Enabled:ActiveSync RAPI Manager

"c:\program files\Microsoft ActiveSync\wcescomm.exe"= c:\program files\Microsoft ActiveSync\wcescomm.exe:169.254.2.0/255.255.255.0:Enabled:ActiveSync Connection Manager

"c:\program files\Microsoft ActiveSync\WCESMgr.exe"= c:\program files\Microsoft ActiveSync\WCESMgr.exe:169.254.2.0/255.255.255.0:Enabled:ActiveSync Application

"c:\\Program Files\\Jeyo\\JMC_WindowsMobile\\JMC_WM.exe"=

"c:\\Documents and Settings\\A1\\Local Settings\\Application Data\\Google\\Chrome\\Application\\chrome.exe"=

"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpqtra08.exe"=

"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpqste08.exe"=

"c:\\Program Files\\HP\\Digital Imaging\\bin\\hposid01.exe"=

"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpqkygrp.exe"=

"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpqcopy2.exe"=

"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpfcCopy.exe"=

"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpoews01.exe"=

"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpiscnapp.exe"=

"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpqgplgtupl.exe"=

"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpqgpc01.exe"=

"c:\\Program Files\\Google\\Google Earth\\client\\googleearth.exe"=

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\GloballyOpenPorts\List]

"26675:TCP"= 26675:TCP:169.254.2.0/255.255.255.0:Enabled:ActiveSync Service

R0 m5289;m5289;c:\windows\system32\drivers\m5289.sys [7/17/2007 4:31 PM 51840]

R0 uliagpkx;ULi AGP Bus Filter Driver;c:\windows\system32\drivers\AGPKX.SYS [7/17/2007 4:31 PM 44928]

R3 HSFHWATI;HSFHWATI;c:\windows\system32\drivers\HSFHWATI.sys [8/22/2005 1:06 PM 231424]

S2 ALIEHCD;ULi PCI to USB Enhanced Host Controller;c:\windows\system32\drivers\AliEhci.sys [7/17/2007 4:32 PM 83596]

S2 gupdate1ca2a3f11d69624;Google Update Service (gupdate1ca2a3f11d69624);c:\program files\Google\Update\GoogleUpdate.exe [8/31/2009 8:29 AM 133104]

S2 Mlgpib;Mlgpib;c:\windows\system32\drivers\MLGPIB.sys [5/6/1999 3:55 AM 13824]

S3 aliroothub;USB 2.0 Root Hub;c:\windows\system32\drivers\AliRtHub.sys [7/17/2007 4:32 PM 5331]

S3 AVG Security Toolbar Service;AVG Security Toolbar Service;c:\program files\AVG\AVG9\Toolbar\ToolbarBroker.exe --> c:\program files\AVG\AVG9\Toolbar\ToolbarBroker.exe [?]

S3 ip100xp;IC Plus IP100 10/100 Fast Ethernet Adapter NT Driver;c:\windows\system32\drivers\ipfnd51.sys [7/17/2007 4:16 PM 26752]

S3 m4cxwxp;NDIS5.1 Miniport Driver for D-Link DGE-530T Gigabit Ethernet Adapter;c:\windows\system32\drivers\m4cxwxp.sys [7/18/2007 3:54 PM 171264]

S3 ML751;MLUSB.sys - Driver for Microlink 751;c:\windows\system32\drivers\mlusb.sys [12/11/2003 4:27 AM 11497]

S3 SkLaggProtocol;Link Aggregation Protocol (LAGG) Support;c:\windows\system32\DRIVERS\sklagg.sys --> c:\windows\system32\DRIVERS\sklagg.sys [?]

S3 TridVid;TM5600 TV Service;c:\windows\system32\drivers\TridVid.sys [8/9/2008 11:37 AM 230528]

S3 TridVidx86;Trident TVMaster TM6000 Analog plus Digital Video Service x86;c:\windows\system32\drivers\TridVidx86.sys [7/31/2007 10:12 AM 163456]

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\svchost]

HPZ12 REG_MULTI_SZ Pml Driver HPZ12 Net Driver HPZ12

HPService REG_MULTI_SZ HPSLPSVC

hpdevmgmt REG_MULTI_SZ hpqcxs08 hpqddsvc

.

Contents of the 'Scheduled Tasks' folder

2008-09-08 c:\windows\Tasks\AppleSoftwareUpdate.job

- c:\program files\Apple Software Update\SoftwareUpdate.exe [2007-06-03 17:42]

2010-12-30 c:\windows\Tasks\Google Software Updater.job

- c:\program files\Google\Common\Google Updater\GoogleUpdaterService.exe [2009-08-31 22:08]

2010-12-30 c:\windows\Tasks\GoogleUpdateTaskMachineCore.job

- c:\program files\Google\Update\GoogleUpdate.exe [2009-08-31 13:29]

2010-12-29 c:\windows\Tasks\GoogleUpdateTaskMachineUA.job

- c:\program files\Google\Update\GoogleUpdate.exe [2009-08-31 13:29]

2010-12-29 c:\windows\Tasks\GoogleUpdateTaskUserS-1-5-21-842925246-1957994488-725345543-1003Core.job

- c:\documents and settings\A1\Local Settings\Application Data\Google\Update\GoogleUpdate.exe [2009-07-08 11:19]

2010-12-29 c:\windows\Tasks\GoogleUpdateTaskUserS-1-5-21-842925246-1957994488-725345543-1003UA.job

- c:\documents and settings\A1\Local Settings\Application Data\Google\Update\GoogleUpdate.exe [2009-07-08 11:19]

.

.

------- Supplementary Scan -------

.

uStart Page = hxxp://www.yahoo.com/

IE: Convert link target to Adobe PDF - c:\program files\Adobe\Acrobat 7.0\Acrobat\AcroIEFavClient.dll/AcroIECapture.html

IE: Convert link target to existing PDF - c:\program files\Adobe\Acrobat 7.0\Acrobat\AcroIEFavClient.dll/AcroIEAppend.html

IE: Convert selected links to Adobe PDF - c:\program files\Adobe\Acrobat 7.0\Acrobat\AcroIEFavClient.dll/AcroIECaptureSelLinks.html

IE: Convert selected links to existing PDF - c:\program files\Adobe\Acrobat 7.0\Acrobat\AcroIEFavClient.dll/AcroIEAppendSelLinks.html

IE: Convert selection to Adobe PDF - c:\program files\Adobe\Acrobat 7.0\Acrobat\AcroIEFavClient.dll/AcroIECapture.html

IE: Convert selection to existing PDF - c:\program files\Adobe\Acrobat 7.0\Acrobat\AcroIEFavClient.dll/AcroIEAppend.html

IE: Convert to Adobe PDF - c:\program files\Adobe\Acrobat 7.0\Acrobat\AcroIEFavClient.dll/AcroIECapture.html

IE: Convert to existing PDF - c:\program files\Adobe\Acrobat 7.0\Acrobat\AcroIEFavClient.dll/AcroIEAppend.html

IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~2\OFFICE11\EXCEL.EXE/3000

Handler: avgsecuritytoolbar - {F2DDE6B2-9684-4A55-86D4-E255E237B77C} -

.

**************************************************************************

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net

Rootkit scan 2010-12-30 10:22

Windows 5.1.2600 Service Pack 3 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully

hidden files: 0

**************************************************************************

.

--------------------- LOCKED REGISTRY KEYS ---------------------

[HKEY_USERS\S-1-5-21-842925246-1957994488-725345543-1003\Software\Microsoft\Windows Mobile Disc\S*a*m*s*u*n*g* *B*l*a*c*k*J*a*c*k*"!\CriticalAppInstall\ActiveSync]

"Name"="ActiveSync"

"DisplayName"="Microsoft ActiveSync"

"Param1"="ActiveSync"

"Type"="wellknown"

"Order"=dword:00000000

"State"=dword:0000000b

[HKEY_USERS\S-1-5-21-842925246-1957994488-725345543-1003\Software\Microsoft\Windows Mobile Disc\S*a*m*s*u*n*g* *B*l*a*c*k*J*a*c*k*"!\CriticalAppInstall\IESettings]

"Name"="IESettings"

"Type"="IESettings"

"Order"=dword:00000003

"State"=dword:0000000b

[HKEY_USERS\S-1-5-21-842925246-1957994488-725345543-1003\Software\Microsoft\Windows Mobile Disc\S*a*m*s*u*n*g* *B*l*a*c*k*J*a*c*k*"!\CriticalAppInstall\MediaFiles]

"Name"="MediaFiles"

"Type"="MediaFiles"

"Order"=dword:00000002

"State"=dword:0000000b

[HKEY_USERS\S-1-5-21-842925246-1957994488-725345543-1003\Software\Microsoft\Windows Mobile Disc\S*a*m*s*u*n*g* *B*l*a*c*k*J*a*c*k*"!\CriticalAppInstall\NPW]

"Name"="NPW"

"Param1"="NPW"

"Type"="wellknown"

"Order"=dword:00000001

"State"=dword:0000000b

.

--------------------- DLLs Loaded Under Running Processes ---------------------

- - - - - - - > 'winlogon.exe'(900)

c:\windows\system32\Ati2evxx.dll

- - - - - - - > 'explorer.exe'(948)

c:\windows\system32\WPDShServiceObj.dll

c:\windows\system32\PortableDeviceTypes.dll

c:\windows\system32\PortableDeviceApi.dll

.

Completion time: 2010-12-30 10:24:33

ComboFix-quarantined-files.txt 2010-12-30 15:24

ComboFix2.txt 2010-12-29 22:04

ComboFix3.txt 2010-12-29 21:36

ComboFix4.txt 2010-12-29 18:05

Pre-Run: 52,458,807,296 bytes free

Post-Run: 52,442,693,632 bytes free

- - End Of File - - 12D3C65295AECB50CDCE9B472A959E87

Link to post
Share on other sites

Awesome! :)

  • Launch Malwarebytes' Anti-Malware
  • Go to "Update" tab and select "Check for Updates". If an update is found, it will download and install the latest version.
  • Go to "Scanner" tab and select "Perform Quick Scan", then click Scan.
  • The scan may take some time to finish,so please be patient.
  • When the scan is complete, click OK, then Show Results to view the results.
  • Make sure that everything is checked, and click Remove Selected.
  • When disinfection is completed, a log will open in Notepad and you may be prompted to Restart.(See Extra Note)
  • The log is automatically saved by MBAM and can be viewed by clicking the Logs tab in MBAM.
  • Copy&Paste the entire report in your next reply.

Extra Note:

If MBAM encounters a file that is difficult to remove,you will be presented with 1 of 2 prompts,click OK to either and let MBAM proceed with the disinfection process,if asked to restart the computer,please do so immediatly.

Link to post
Share on other sites

Thank you very much! :welcome::):angry:

Last steps:

Step 1

  1. Go to Start => Run... and copy & paste next command in the field:
    ComboFix /uninstall


  2. Then hit Enter button.

This procedure will do the following:

  • Uninstall ComboFix
  • Delete its related folders and files
  • Reset your clock settings
  • Hide file extensions
  • Hide the system/hidden files
  • Resets System Restore again

P.S.: Make sure there's a space between ComboFix and /uninstall

Step 2

Please manually delete DDS.

Step 3

Keep your software up-to-date:

http://www.bleepingcomputer.com/tutorials/tutorial174.html

Some malware preventions:

http://forums.malwarebytes.org/index.php?showtopic=9365

Safe surfing! :angry:

Link to post
Share on other sites

Guest
This topic is now closed to further replies.
  • Recently Browsing   0 members

    • No registered users viewing this page.
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.