Jump to content

Recommended Posts

I am new to your forums so I hope I am doing this right.

I got the "Windows XP Recovery" Virus a few days ago and have been trying to remove it ever since. I managed to unhide most of my files manually but will try Unhide as suggested in other posts. I tried running Malwarebytes from a thumb drive but it doesn't seem to pick up anything. Windows Security and Malwarebytes is still disabled when I try to run it from the desktop or from the program file. I cannot seem to run Windows Security from the thumb drive. Here is a copy of the OTL files you requested (I did not see an extras file and could not find the main program folder under the 'program files' folder on the "C" drive - where might it have gone?). How do you suggest I proceed from here?

------------------------------------------------

OTL logfile created on: 5/28/2011 3:09:38 PM - Run 2

OTL by OldTimer - Version 3.2.23.0 Folder = C:\Documents and Settings\MasterMind\Desktop

Windows XP Media Center Edition Service Pack 3 (Version = 5.1.2600) - Type = NTWorkstation

Internet Explorer (Version = 8.0.6001.18702)

Locale: 00000409 | Country: United States | Language: ENU | Date Format: M/d/yyyy

1014.07 Mb Total Physical Memory | 593.70 Mb Available Physical Memory | 58.55% Memory free

2.38 Gb Paging File | 2.12 Gb Available in Paging File | 89.01% Paging File free

Paging file location(s): C:\pagefile.sys 1524 3048 [binary data]

%SystemDrive% = C: | %SystemRoot% = C:\WINDOWS | %ProgramFiles% = C:\Program Files

Drive C: | 144.24 Gb Total Space | 119.38 Gb Free Space | 82.77% Space Free | Partition Type: NTFS

Computer Name: HAL9000 | User Name: MasterMind | Logged in as Administrator.

Boot Mode: Normal | Scan Mode: Current user

Company Name Whitelist: Off | Skip Microsoft Files: Off | No Company Name Whitelist: On | File Age = 30 Days

========== Processes (SafeList) ==========

PRC - C:\Documents and Settings\MasterMind\Desktop\OTL.exe (OldTimer Tools)

PRC - C:\Program Files\RCA Detective\RCADetective.exe (Audiovox Electronics Corp.)

PRC - C:\WINDOWS\explorer.exe (Microsoft Corporation)

PRC - C:\Program Files\Belkin\F5D7050v3\Belkinwcui.exe (Belkin)

PRC - C:\WINDOWS\system32\HPZipm12.exe (HP)

PRC - C:\Program Files\MUSICMATCH\Musicmatch Jukebox\mim.exe (Musicmatch, Inc.)

PRC - C:\Program Files\MUSICMATCH\Musicmatch Jukebox\MMDiag.exe (Musicmatch, Inc.)

PRC - C:\WINDOWS\stsystra.exe (SigmaTel, Inc.)

PRC - C:\Program Files\palmOne\Hotsync.exe (PalmSource, Inc)

PRC - C:\Program Files\QUICKENW\QWDLLS.EXE (Intuit)

========== Modules (SafeList) ==========

MOD - C:\Documents and Settings\MasterMind\Desktop\OTL.exe (OldTimer Tools)

MOD - C:\WINDOWS\WinSxS\x86_Microsoft.Windows.Common-Controls_6595b64144ccf1df_6.0.2600.6028_x-ww_61e65202\comctl32.dll (Microsoft Corporation)

========== Win32 Services (SafeList) ==========

SRV - (SupportSoft RemoteAssist) -- C:\Program Files\Common Files\SupportSoft\bin\ssrc.exe (SupportSoft, Inc.)

SRV - (Pml Driver HPZ12) -- C:\WINDOWS\system32\HPZipm12.exe (HP)

SRV - (DSBrokerService) -- C:\Program Files\DellSupport\brkrsvc.exe ()

========== Driver Services (SafeList) ==========

DRV - (RT73) -- C:\WINDOWS\system32\drivers\rt73.sys (Ralink Technology, Corp.)

DRV - (dsunidrv) -- C:\WINDOWS\system32\drivers\dsunidrv.sys (Gteko Ltd.)

DRV - (DSproct) -- C:\Program Files\DellSupport\GTAction\triggers\DSproct.sys (Gteko Ltd.)

DRV - (PalmUSBD) -- C:\WINDOWS\system32\drivers\PalmUSBD.sys (PalmSource, Inc.)

DRV - (ASCTRM) -- C:\WINDOWS\System32\drivers\asctrm.sys (Windows

Link to post
Share on other sites

post-32477-1261866970.gif

Logs will be closed if you haven't replied within 3 days

Please do not attach the scan results from Combofx. Use copy/paste.

DO NOT use any TOOLS such as Combofix, or HijackThis fixes without supervision.

Doing so could make your pc inoperatible and could require a full reinstall of your OS, losing all your programs and data.

Vista and Windows 7 users:

1. These tools MUST be run from the executable. (.exe) every time you run them

2. With Admin Rights (Right click, choose "Run as Administrator")

Stay with this topic until I give you the all clean post.

You might want to print these instructions out.

I suggest you do this:

XP Users

Double-click My Computer.

Click the Tools menu, and then click Folder Options.

Click the View tab.

Uncheck "Hide file extensions for known file types."

Under the "Hidden files" folder, select "Show hidden files and folders."

Uncheck "Hide protected operating system files."

Click Apply, and then click OK.

Vista Users

To enable the viewing of hidden and protected system files in Windows Vista please follow these steps:

Close all programs so that you are at your desktop.

Click on the Start button. This is the small round button with the Windows flag in the lower left corner.

Click on the Control Panel menu option.

When the control panel opens you can either be in Classic View or Control Panel Home view:

If you are in the Classic View do the following:

Double-click on the Folder Options icon.

Click on the View tab.

If you are in the Control Panel Home view do the following:

Click on the Appearance and Personalization link.

Click on Show Hidden Files or Folders.

Under the Hidden files and folders section select the radio button labeled Show hidden files and folders.

Remove the checkmark from the checkbox labeled Hide extensions for known file types.

Remove the checkmark from the checkbox labeled Hide protected operating system files.

Please do not delete anything unless instructed to.

Next:

Download ComboFix from one of these locations:

Link 1

Link 2 If using this link, Right Click and select Save As.

* IMPORTANT !!! Save ComboFix.exe to your Desktop

  • Disable your AntiVirus and AntiSpyware applications, usually via a right click on the System Tray icon. They may otherwise interfere with our tools. Note: If you are having difficulty properly disabling your protective programs, or are unsure as to what programs need to be disabled, please refer to the information available through this link : Protective Programs
  • Double click on ComboFix.exe & follow the prompts.
    Notes: Combofix will run without the Recovery Console installed. Skip the Recovery Console part if you're running Vista or Windows 7.
    Note: If you have SP3, use the SP2 package.
    If Vista or Windows 7, skip the Recovery Console part
  • As part of it's process, ComboFix will check to see if the Microsoft Windows Recovery Console is installed. With malware infections being as they are today, it's strongly recommended to have this pre-installed on your machine before doing any malware removal. It will allow you to boot up into a special recovery/repair mode that will allow us to more easily help you should your computer have a problem after an attempted removal of malware.
  • Follow the prompts to allow ComboFix to download and install the Microsoft Windows Recovery Console, and when prompted, agree to the End-User License Agreement to install the Microsoft Windows Recovery Console.

**Please note: If the Microsoft Windows Recovery Console is already installed, ComboFix will continue it's malware removal procedures.

RC1.png

Once the Microsoft Windows Recovery Console is installed using ComboFix, you should see the following message:

RC2-1.png

Click on Yes, to continue scanning for malware.

When finished, it shall produce a log for you. Please include the C:\ComboFix.txt using Copy / Paste in your next reply.

Notes:

1.Do not mouse-click Combofix's window while it is running. That may cause it to stall.

2. ComboFix may reset a number of Internet Explorer's settings, including making I-E the default browser.

3. Combofix prevents autorun of ALL CD, floppy and USB devices to assist with malware removal & increase security. If this is an issue or makes it difficult for you -- please tell your helper.

4. CF disconnects your machine from the internet. The connection is automatically restored before CF completes its run. If CF runs into difficulty and terminates prematurely, the connection can be manually restored by restarting your machine.

Give it atleast 20-30 minutes to finish if needed.

Please do not attach the scan results from Combofx. Use copy/paste.

Also please describe how your computer behaves at the moment.

Link to post
Share on other sites

Thank you so much for the help! I had managed to get the computer running fairly well by the time I got these instructions but was not sure that the virus was completely removed. I had already made the changes recommended to the Folder Options settings and ran a program called unhide as well. I managed to get Malwarebytes running again by uninstalling it then reinstalling it - same with MS Security Essentials. Both scans had come up clean so I thought it (the virus) was gone. It looks like Combofix found some remnants however. I followed the instructions as directed and copied the requested log file below. Please let me know if there is anything else I need to do. I would like to re-enable autorun for the disk player and USB ports. if you could walk me through that proceedure it would be much appreciated as well.

Thanks again for all the help!

Icenine

---------------------------------------------------------------------------------------------------------------------------------------

ComboFix 11-06-02.02 - MasterMind 06/02/2011 23:51:52.1.2 - x86

Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.1014.452 [GMT -7:00]

Running from: c:\documents and settings\MasterMind\Desktop\ComboFix.exe

AV: Microsoft Security Essentials *Disabled/Updated* {BCF43643-A118-4432-AEDE-D861FCBCFCDF}

AV: Microsoft Security Essentials *Disabled/Updated* {EDB4FA23-53B8-4AFA-8C5D-99752CCA7095}

.

.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))

.

.

c:\documents and settings\MasterMind\Local Settings\Application Data\{9AA7E287-4023-4592-BB83-71ECF2E3BAC4}

c:\documents and settings\MasterMind\Local Settings\Application Data\{9AA7E287-4023-4592-BB83-71ECF2E3BAC4}\chrome\content\_cfg.js

c:\documents and settings\MasterMind\Local Settings\Application Data\{9AA7E287-4023-4592-BB83-71ECF2E3BAC4}\chrome\content\overlay.xul

c:\documents and settings\MasterMind\Local Settings\Application Data\{9AA7E287-4023-4592-BB83-71ECF2E3BAC4}\install.rdf

c:\documents and settings\MasterMind\WINDOWS

c:\windows\Downloaded Program Files\popcaploader.dll

c:\windows\Downloaded Program Files\popcaploader.inf

.

.

((((((((((((((((((((((((( Files Created from 2011-05-03 to 2011-06-03 )))))))))))))))))))))))))))))))

.

.

2011-06-02 10:23 . 2004-07-14 17:29 21723 ----a-w- c:\windows\system32\drivers\npapimon.sys

2011-06-02 10:23 . 2004-07-14 17:28 57401 ----a-w- c:\windows\ssdiag.exe

2011-06-02 10:23 . 2004-07-14 17:28 10906 ----a-w- c:\windows\system32\drivers\ssdiagn.sys

2011-06-02 10:18 . 2011-06-02 10:18 28752 ----a-w- c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{A614BEF5-78E5-431D-8B9F-2BAB6857416B}\MpKsl2ffdfb5a.sys

2011-06-01 17:33 . 2011-05-09 20:46 6962000 ----a-w- c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{A614BEF5-78E5-431D-8B9F-2BAB6857416B}\mpengine.dll

2011-05-31 08:56 . 2011-05-09 20:46 6962000 ----a-w- c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\Backup\mpengine.dll

2011-05-30 08:56 . 2011-05-30 08:56 -------- d-----w- c:\documents and settings\MasterMind\Local Settings\Application Data\Secunia PSI

2011-05-30 08:55 . 2011-05-30 08:55 -------- d-----w- c:\program files\Secunia

2011-05-30 08:49 . 2011-05-30 08:49 -------- d-----w- c:\windows\TempFBE817F1-43D1-A23A-2A46-70627B0A42C4-Signatures

2011-05-30 08:48 . 2011-05-30 08:49 -------- d-----w- c:\program files\Microsoft Security Client

2011-05-30 08:31 . 2011-05-09 20:46 6962000 ----a-w- c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\Updates\mpengine.dll

2011-05-30 07:16 . 2011-05-29 16:11 39984 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys

2011-05-30 07:16 . 2011-06-01 16:17 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware

2011-05-30 07:16 . 2011-05-29 16:11 22712 ----a-w- c:\windows\system32\drivers\mbam.sys

2011-05-26 22:24 . 2011-05-26 22:24 -------- d-----w- c:\program files\Common Files\iS3

2011-05-26 08:14 . 2011-05-26 08:14 -------- d-----w- c:\program files\Trend Micro

.

.

.

(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))

.

2011-06-02 10:16 . 2006-02-08 12:51 8552 ----a-w- c:\windows\system32\drivers\asctrm.sys

2011-06-02 10:16 . 2006-02-08 12:51 24576 ----a-w- c:\windows\system32\prefscpl.cpl

2011-03-07 05:33 . 2005-08-16 10:40 692736 ----a-w- c:\windows\system32\inetcomm.dll

2010-09-05 17:51 . 2010-09-05 17:51 441 ----a-w- c:\program files\0905201010511550.bat

2010-06-23 21:00 . 2010-06-23 21:00 441 ----a-w- c:\program files\0623201014002531.bat

2010-06-23 20:39 . 2010-06-23 20:39 441 ----a-w- c:\program files\0623201013394462.bat

.

.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))

.

.

*Note* empty entries & legit default entries are not shown

REGEDIT4

.

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]

"swg"="c:\program files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe" [2007-06-26 68856]

.

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]

"SigmatelSysTrayApp"="stsystra.exe" [2005-03-23 339968]

"MimBoot"="c:\progra~1\MUSICM~1\MUSICM~3\mimboot.exe" [2005-09-09 8192]

"IntelMeM"="c:\program files\Intel\Modem Event Monitor\IntelMEM.exe" [2003-09-04 221184]

"igfxtray"="c:\windows\system32\igfxtray.exe" [2005-10-15 94208]

"igfxpers"="c:\windows\system32\igfxpers.exe" [2005-10-15 114688]

"igfxhkcmd"="c:\windows\system32\hkcmd.exe" [2005-10-15 77824]

"HP Software Update"="c:\program files\HP\HP Software Update\HPWuSchd2.exe" [2007-05-08 54840]

"F5D7050v3"="c:\program files\Belkin\F5D7050v3\Belkinwcui.exe" [2007-10-31 1654784]

"ehTray"="c:\windows\ehome\ehtray.exe" [2005-09-29 67584]

"DVDLauncher"="c:\program files\CyberLink\PowerDVD\DVDLauncher.exe" [2005-02-23 53248]

"dla"="c:\windows\system32\dla\tfswctrl.exe" [2004-12-06 127035]

"MSC"="c:\program files\Microsoft Security Client\msseces.exe" [2010-11-30 997408]

"QuickTime Task"="c:\program files\QuickTime\qttask.exe" [2006-02-08 98304]

"Malwarebytes' Anti-Malware"="c:\program files\Malwarebytes' Anti-Malware\mbamgui.exe" [2011-05-29 449584]

"ssdiag"="c:\windows\ssdiag.exe" [2004-07-14 57401]

.

[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run]

"DWQueuedReporting"="c:\progra~1\COMMON~1\MICROS~1\DW\dwtrig20.exe" [2008-11-04 435096]

.

c:\documents and settings\MasterMind\Start Menu\Programs\Startup\

OneNote 2007 Screen Clipper and Launcher.lnk - c:\program files\Microsoft Office\Office12\ONENOTEM.EXE [2009-2-26 97680]

RCA Detective.lnk - c:\program files\RCA Detective\RCADetective.exe [2010-8-17 942592]

.

c:\documents and settings\All Users\Start Menu\Programs\Startup\

Adobe Gamma Loader.lnk - c:\program files\Common Files\Adobe\Calibration\Adobe Gamma Loader.exe [2006-4-28 113664]

Adobe Reader Speed Launch.lnk - c:\program files\Adobe\Acrobat 7.0\Reader\reader_sl.exe [2008-4-23 29696]

Billminder.lnk - c:\program files\QUICKENW\BILLMIND.EXE [2007-2-5 36864]

HotSync Manager.lnk - c:\program files\palmOne\Hotsync.exe [2004-6-9 471040]

HP Digital Imaging Monitor.lnk - c:\program files\HP\Digital Imaging\bin\hpqtra08.exe [2004-11-4 258048]

HP Image Zone Fast Start.lnk - c:\program files\HP\Digital Imaging\bin\hpqthb08.exe [2004-11-4 53248]

Quicken Startup.lnk - c:\program files\QUICKENW\QWDLLS.EXE [2007-2-5 36864]

.

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\MCODS]

@=""

.

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\MsMpSvc]

@="Service"

.

[HKEY_LOCAL_MACHINE\software\microsoft\security center]

"AntiVirusOverride"=dword:00000001

.

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]

"%windir%\\system32\\sessmgr.exe"=

"c:\\Program Files\\Messenger\\msmsgs.exe"=

"c:\\Program Files\\HP\\HP Software Update\\HPWUCli.exe"=

"%windir%\\Network Diagnostic\\xpnetdiag.exe"=

"c:\\Program Files\\Microsoft Office\\Office12\\ONENOTE.EXE"=

"c:\\Program Files\\Google\\Google Earth\\client\\googleearth.exe"=

"c:\\Program Files\\Google\\Google Earth\\plugin\\geplugin.exe"=

.

R1 MpKsl2ffdfb5a;MpKsl2ffdfb5a;c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{A614BEF5-78E5-431D-8B9F-2BAB6857416B}\MpKsl2ffdfb5a.sys [6/2/2011 3:18 AM 28752]

R2 MBAMService;MBAMService;c:\program files\Malwarebytes' Anti-Malware\mbamservice.exe [5/30/2011 12:16 AM 366640]

R3 MBAMProtector;MBAMProtector;c:\windows\system32\drivers\mbam.sys [5/30/2011 12:16 AM 22712]

S2 gupdate1c98f3482e7ada4;Google Update Service (gupdate1c98f3482e7ada4);c:\program files\Google\Update\GoogleUpdate.exe [2/14/2009 11:13 PM 133104]

S3 gupdatem;Google Update Service (gupdatem);c:\program files\Google\Update\GoogleUpdate.exe [2/14/2009 11:13 PM 133104]

.

--- Other Services/Drivers In Memory ---

.

*NewlyCreated* - ASCTRM

*NewlyCreated* - MPKSL2FFDFB5A

.

Contents of the 'Scheduled Tasks' folder

.

2011-06-03 c:\windows\Tasks\Google Software Updater.job

- c:\program files\Google\Common\Google Updater\GoogleUpdaterService.exe [2007-04-01 21:11]

.

2011-06-02 c:\windows\Tasks\GoogleUpdateTaskMachineCore.job

- c:\program files\Google\Update\GoogleUpdate.exe [2009-02-15 06:13]

.

2011-06-03 c:\windows\Tasks\GoogleUpdateTaskMachineUA.job

- c:\program files\Google\Update\GoogleUpdate.exe [2009-02-15 06:13]

.

2011-06-02 c:\windows\Tasks\MP Scheduled Scan.job

- c:\program files\Microsoft Security Client\Antimalware\MpCmdRun.exe [2010-11-11 19:26]

.

.

------- Supplementary Scan -------

.

uSearchMigratedDefaultURL = hxxp://www.google.com/search?q={searchTerms}&sourceid=ie7&rls=com.microsoft:en-US&ie=utf8&oe=utf8

uStart Page = hxxp://www.myqwest.com/

uInternet Connection Wizard,ShellNext = iexplore

uInternet Settings,ProxyOverride = <local>

uSearchAssistant = hxxp://www.google.com/ie

uSearchURL,(Default) = hxxp://www.google.com/search?q=%s

Trusted Zone: internet

Trusted Zone: mcafee.com

TCP: DhcpNameServer = 192.168.0.1 205.171.3.65

.

- - - - ORPHANS REMOVED - - - -

.

Toolbar-Locked - (no file)

Notify-TPSvc - TPSvc.dll

AddRemove-RCA Detective

Link to post
Share on other sites

http://www.bleepingcomputer.com/forums/topic400439.html

Be sure to post in your topic at BC that you're being helped.

Do you know what these batch files are?

2010-09-05 17:51 . 2010-09-05 17:51 441 ----a-w- c:\program files\0905201010511550.bat

2010-06-23 21:00 . 2010-06-23 21:00 441 ----a-w- c:\program files\0623201014002531.bat

2010-06-23 20:39 . 2010-06-23 20:39 441 ----a-w- c:\program files\0623201013394462.bat

Link to post
Share on other sites

Copy/paste the text in the Codebox below into notepad:

Here's how to do that:

Click Start > Run type Notepad click OK.

This will open an empty notepad file:

Take your mouse, and place your cursor at the beginning of the text in the box below, then click and hold the left mouse button, while pulling your mouse over the text. This should highlight the text. Now release the left mouse button. Now, with the cursor over the highlighted text, right click the mouse for options, and select 'copy'. Now over the empty Notepad box, right click your mouse again, and select 'paste' and you will have copied and pasted the text.

KillAll::

File::
c:\program files\0905201010511550.bat
c:\program files\0623201014002531.bat
c:\program files\0623201013394462.bat

Save this file to your desktop, Save this as "CFScript"

Here's how to do that:

1.Click File;

2.Click Save As... Change the directory to your desktop;

3.Change the Save as type to "All Files";

4.Type in the file name: CFScript

5.Click Save ...

CFScriptB-4.gif

Drag CFScript.txt into ComboFix.exe

Then post the results log using Copy / Paste

Also please describe how your computer behaves at the moment.

Link to post
Share on other sites

I did as you instructed, the log file appears below. I did have trouble getting combofix to run. It kept locking up, control-alt-delete did not work so I had to hard boot the computer to get it back. I finaly re-downloaded Combofix, added your script as instructed and ran a sucessful scan. The computer seems to be running normally now but I still see those batch files listed.

---------------------------------------------------------------------------------------------------------------------------------------

ComboFix 11-06-08.04 - MasterMind 06/09/2011 0:57.2.2 - x86

Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.1014.490 [GMT -7:00]

Running from: c:\documents and settings\MasterMind\Desktop\ComboFix.exe

AV: Microsoft Security Essentials *Disabled/Updated* {BCF43643-A118-4432-AEDE-D861FCBCFCDF}

AV: Microsoft Security Essentials *Disabled/Updated* {EDB4FA23-53B8-4AFA-8C5D-99752CCA7095}

.

.

((((((((((((((((((((((((( Files Created from 2011-05-09 to 2011-06-09 )))))))))))))))))))))))))))))))

.

.

2011-06-08 07:40 . 2011-06-08 07:40 28752 ----a-w- c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{190F1419-6E23-49B2-9958-C612856B26E2}\MpKsl2fe21f64.sys

2011-06-08 07:38 . 2011-05-09 20:46 6962000 ----a-w- c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{190F1419-6E23-49B2-9958-C612856B26E2}\mpengine.dll

2011-06-02 10:23 . 2004-07-14 17:29 21723 ----a-w- c:\windows\system32\drivers\npapimon.sys

2011-06-02 10:23 . 2004-07-14 17:28 57401 ----a-w- c:\windows\ssdiag.exe

2011-06-02 10:23 . 2004-07-14 17:28 10906 ----a-w- c:\windows\system32\drivers\ssdiagn.sys

2011-05-31 08:56 . 2011-05-09 20:46 6962000 ----a-w- c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\Backup\mpengine.dll

2011-05-30 08:56 . 2011-05-30 08:56 -------- d-----w- c:\documents and settings\MasterMind\Local Settings\Application Data\Secunia PSI

2011-05-30 08:55 . 2011-05-30 08:55 -------- d-----w- c:\program files\Secunia

2011-05-30 08:49 . 2011-05-30 08:49 -------- d-----w- c:\windows\TempFBE817F1-43D1-A23A-2A46-70627B0A42C4-Signatures

2011-05-30 08:48 . 2011-05-30 08:49 -------- d-----w- c:\program files\Microsoft Security Client

2011-05-30 08:31 . 2011-05-09 20:46 6962000 ----a-w- c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\Updates\mpengine.dll

2011-05-30 07:16 . 2011-05-29 16:11 39984 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys

2011-05-30 07:16 . 2011-06-01 16:17 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware

2011-05-30 07:16 . 2011-05-29 16:11 22712 ----a-w- c:\windows\system32\drivers\mbam.sys

2011-05-26 22:24 . 2011-05-26 22:24 -------- d-----w- c:\program files\Common Files\iS3

2011-05-26 08:14 . 2011-05-26 08:14 -------- d-----w- c:\program files\Trend Micro

.

.

.

(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))

.

2011-06-02 10:16 . 2006-02-08 12:51 8552 ----a-w- c:\windows\system32\drivers\asctrm.sys

2011-06-02 10:16 . 2006-02-08 12:51 24576 ----a-w- c:\windows\system32\prefscpl.cpl

2010-09-05 17:51 . 2010-09-05 17:51 441 ----a-w- c:\program files\0905201010511550.bat

2010-06-23 21:00 . 2010-06-23 21:00 441 ----a-w- c:\program files\0623201014002531.bat

2010-06-23 20:39 . 2010-06-23 20:39 441 ----a-w- c:\program files\0623201013394462.bat

.

.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))

.

.

*Note* empty entries & legit default entries are not shown

REGEDIT4

.

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]

"swg"="c:\program files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe" [2007-06-26 68856]

.

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]

"SigmatelSysTrayApp"="stsystra.exe" [2005-03-23 339968]

"MimBoot"="c:\progra~1\MUSICM~1\MUSICM~3\mimboot.exe" [2005-09-09 8192]

"IntelMeM"="c:\program files\Intel\Modem Event Monitor\IntelMEM.exe" [2003-09-04 221184]

"igfxtray"="c:\windows\system32\igfxtray.exe" [2005-10-15 94208]

"igfxpers"="c:\windows\system32\igfxpers.exe" [2005-10-15 114688]

"igfxhkcmd"="c:\windows\system32\hkcmd.exe" [2005-10-15 77824]

"HP Software Update"="c:\program files\HP\HP Software Update\HPWuSchd2.exe" [2007-05-08 54840]

"F5D7050v3"="c:\program files\Belkin\F5D7050v3\Belkinwcui.exe" [2007-10-31 1654784]

"ehTray"="c:\windows\ehome\ehtray.exe" [2005-09-29 67584]

"DVDLauncher"="c:\program files\CyberLink\PowerDVD\DVDLauncher.exe" [2005-02-23 53248]

"dla"="c:\windows\system32\dla\tfswctrl.exe" [2004-12-06 127035]

"MSC"="c:\program files\Microsoft Security Client\msseces.exe" [2010-11-30 997408]

"QuickTime Task"="c:\program files\QuickTime\qttask.exe" [2006-02-08 98304]

"Malwarebytes' Anti-Malware"="c:\program files\Malwarebytes' Anti-Malware\mbamgui.exe" [2011-05-29 449584]

"ssdiag"="c:\windows\ssdiag.exe" [2004-07-14 57401]

.

[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run]

"DWQueuedReporting"="c:\progra~1\COMMON~1\MICROS~1\DW\dwtrig20.exe" [2008-11-04 435096]

.

c:\documents and settings\MasterMind\Start Menu\Programs\Startup\

OneNote 2007 Screen Clipper and Launcher.lnk - c:\program files\Microsoft Office\Office12\ONENOTEM.EXE [2009-2-26 97680]

RCA Detective.lnk - c:\program files\RCA Detective\RCADetective.exe [2010-8-17 942592]

.

c:\documents and settings\All Users\Start Menu\Programs\Startup\

Adobe Gamma Loader.lnk - c:\program files\Common Files\Adobe\Calibration\Adobe Gamma Loader.exe [2006-4-28 113664]

Adobe Reader Speed Launch.lnk - c:\program files\Adobe\Acrobat 7.0\Reader\reader_sl.exe [2008-4-23 29696]

Billminder.lnk - c:\program files\QUICKENW\BILLMIND.EXE [2007-2-5 36864]

HotSync Manager.lnk - c:\program files\palmOne\Hotsync.exe [2004-6-9 471040]

HP Digital Imaging Monitor.lnk - c:\program files\HP\Digital Imaging\bin\hpqtra08.exe [2004-11-4 258048]

HP Image Zone Fast Start.lnk - c:\program files\HP\Digital Imaging\bin\hpqthb08.exe [2004-11-4 53248]

Quicken Startup.lnk - c:\program files\QUICKENW\QWDLLS.EXE [2007-2-5 36864]

.

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\MCODS]

@=""

.

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\MsMpSvc]

@="Service"

.

[HKEY_LOCAL_MACHINE\software\microsoft\security center]

"AntiVirusOverride"=dword:00000001

.

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]

"%windir%\\system32\\sessmgr.exe"=

"c:\\Program Files\\Messenger\\msmsgs.exe"=

"c:\\Program Files\\HP\\HP Software Update\\HPWUCli.exe"=

"%windir%\\Network Diagnostic\\xpnetdiag.exe"=

"c:\\Program Files\\Microsoft Office\\Office12\\ONENOTE.EXE"=

"c:\\Program Files\\Google\\Google Earth\\client\\googleearth.exe"=

"c:\\Program Files\\Google\\Google Earth\\plugin\\geplugin.exe"=

.

R1 MpKsl2fe21f64;MpKsl2fe21f64;c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{190F1419-6E23-49B2-9958-C612856B26E2}\MpKsl2fe21f64.sys [6/8/2011 12:40 AM 28752]

R2 MBAMService;MBAMService;c:\program files\Malwarebytes' Anti-Malware\mbamservice.exe [5/30/2011 12:16 AM 366640]

R3 MBAMProtector;MBAMProtector;c:\windows\system32\drivers\mbam.sys [5/30/2011 12:16 AM 22712]

S2 gupdate1c98f3482e7ada4;Google Update Service (gupdate1c98f3482e7ada4);c:\program files\Google\Update\GoogleUpdate.exe [2/14/2009 11:13 PM 133104]

S3 gupdatem;Google Update Service (gupdatem);c:\program files\Google\Update\GoogleUpdate.exe [2/14/2009 11:13 PM 133104]

.

Contents of the 'Scheduled Tasks' folder

.

2011-06-09 c:\windows\Tasks\Google Software Updater.job

- c:\program files\Google\Common\Google Updater\GoogleUpdaterService.exe [2007-04-01 21:11]

.

2011-06-09 c:\windows\Tasks\GoogleUpdateTaskMachineCore.job

- c:\program files\Google\Update\GoogleUpdate.exe [2009-02-15 06:13]

.

2011-06-09 c:\windows\Tasks\GoogleUpdateTaskMachineUA.job

- c:\program files\Google\Update\GoogleUpdate.exe [2009-02-15 06:13]

.

2011-06-09 c:\windows\Tasks\MP Scheduled Scan.job

- c:\program files\Microsoft Security Client\Antimalware\MpCmdRun.exe [2010-11-11 19:26]

.

.

------- Supplementary Scan -------

.

uSearchMigratedDefaultURL = hxxp://www.google.com/search?q={searchTerms}&sourceid=ie7&rls=com.microsoft:en-US&ie=utf8&oe=utf8

uStart Page = hxxp://www.myqwest.com/

uInternet Connection Wizard,ShellNext = iexplore

uInternet Settings,ProxyOverride = <local>

uSearchAssistant = hxxp://www.google.com/ie

uSearchURL,(Default) = hxxp://www.google.com/search?q=%s

Trusted Zone: internet

Trusted Zone: mcafee.com

TCP: DhcpNameServer = 192.168.0.1 205.171.3.65

.

.

**************************************************************************

.

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net

Rootkit scan 2011-06-09 01:05

Windows 5.1.2600 Service Pack 3 NTFS

.

scanning hidden processes ...

.

scanning hidden autostart entries ...

.

scanning hidden files ...

.

scan completed successfully

hidden files: 0

.

**************************************************************************

.

--------------------- DLLs Loaded Under Running Processes ---------------------

.

- - - - - - - > 'explorer.exe'(2676)

c:\windows\system32\WININET.dll

c:\progra~1\WINDOW~3\wmpband.dll

c:\windows\system32\ieframe.dll

c:\windows\system32\webcheck.dll

c:\windows\system32\WPDShServiceObj.dll

c:\windows\system32\PortableDeviceTypes.dll

c:\windows\system32\PortableDeviceApi.dll

.

Completion time: 2011-06-09 01:07:11

ComboFix-quarantined-files.txt 2011-06-09 08:07

ComboFix2.txt 2011-06-03 07:02

.

Pre-Run: 124,827,045,888 bytes free

Post-Run: 124,827,148,288 bytes free

.

- - End Of File - - BC173F90A10DA0F778B3F298FCAD7708

Link to post
Share on other sites

Please go to http://www.virustotal.com/, click on Browse, and upload the following file for analysis:

c:\program files\0905201010511550.bat

Then click Submit. Allow the file to be scanned, and then please copy and paste the results here for me to see.

If virustotal is too busy you can try these.

http://virusscan.jotti.org

http://www.kaspersky.com/scanforvirus.html

Link to post
Share on other sites

I relised after my last post that I made an error. ComboFix would run on its own but when I inserted your script the lock up would occur when I tried to run the scan. It would start the scan but freeze a short time later. Below is the log file you asked for. Would you like me to run the other two?

---------------------------------------------------------------------------------------------------------------------------------------

0 VT Community user(s) with a total of 0 reputation credit(s) say(s) this sample is goodware. 0 VT Community user(s) with a total of 0 reputation credit(s) say(s) this sample is malware.

File name: 0905201010511550.bat

Submission date: 2011-06-10 08:28:25 (UTC)

Current status: queued (#33) queued (#33) analysing finished

Result: 0/ 42 (0.0%)

VT Community

not reviewed

Safety score: -

Compact Print results Antivirus Version Last Update Result

AhnLab-V3 2011.06.10.01 2011.06.10 -

AntiVir 7.11.9.135 2011.06.10 -

Antiy-AVL 2.0.3.7 2011.06.10 -

Avast 4.8.1351.0 2011.06.10 -

Avast5 5.0.677.0 2011.06.10 -

AVG 10.0.0.1190 2011.06.09 -

BitDefender 7.2 2011.06.10 -

CAT-QuickHeal 11.00 2011.06.10 -

ClamAV 0.97.0.0 2011.06.10 -

Commtouch 5.3.2.6 2011.06.10 -

Comodo 9012 2011.06.10 -

DrWeb 5.0.2.03300 2011.06.10 -

Emsisoft 5.1.0.8 2011.06.10 -

eSafe 7.0.17.0 2011.06.09 -

eTrust-Vet 36.1.8378 2011.06.09 -

F-Prot 4.6.2.117 2011.06.09 -

Fortinet 4.2.257.0 2011.06.10 -

GData 22 2011.06.10 -

Ikarus T3.1.1.104.0 2011.06.10 -

Jiangmin 13.0.900 2011.06.09 -

K7AntiVirus 9.105.4792 2011.06.09 -

Kaspersky 9.0.0.837 2011.06.10 -

McAfee 5.400.0.1158 2011.06.10 -

McAfee-GW-Edition 2010.1D 2011.06.10 -

Microsoft 1.6903 2011.06.10 -

NOD32 6194 2011.06.10 -

Norman 6.07.10 2011.06.09 -

nProtect 2011-06-10.01 2011.06.10 -

Panda 10.0.3.5 2011.06.09 -

PCTools 7.0.3.5 2011.06.09 -

Prevx 3.0 2011.06.10 -

Rising 23.61.02.11 2011.06.09 -

Sophos 4.66.0 2011.06.10 -

SUPERAntiSpyware 4.40.0.1006 2011.06.10 -

Symantec 20111.1.0.186 2011.06.10 -

TheHacker 6.7.0.1.227 2011.06.10 -

TrendMicro 9.200.0.1012 2011.06.10 -

TrendMicro-HouseCall 9.200.0.1012 2011.06.10 -

VBA32 3.12.16.1 2011.06.10 -

VIPRE 9540 2011.06.10 -

ViRobot 2011.6.10.4503 2011.06.10 -

VirusBuster 14.0.74.0 2011.06.09 -

Additional informationShow all

MD5 : 46425c07c5b4cf2c231713c1246b2fda

SHA1 : 5c90c4fc89f6088645fa84b9e419f28a69d81dcd

SHA256: 619ce205fe35d2da3c935084ebc0dff120b3d0449ace30d2e18507fbecd345c5

ssdeep: 12:Sd982Tv5IJZYVmCFc23ModxF1BQ982Dq/V5IJZe+6ANR9n:a982Tv50cl/xF1m982Dq950P6

ANv

File size : 441 bytes

First seen: 2011-06-10 08:28:25

Last seen : 2011-06-10 08:28:25

TrID:

Unknown!

sigcheck:

publisher....: n/a

copyright....: n/a

product......: n/a

description..: n/a

original name: n/a

internal name: n/a

file version.: n/a

comments.....: n/a

signers......: -

signing date.: -

verified.....: Unsigned

VT Community

0

This file has never been reviewed by any VT Community member. Be the first one to comment on it!

VirusTotal Team

Link to post
Share on other sites

I went ahead and ran the other batch files. Here are the results:

-------------------------------------------

0 VT Community user(s) with a total of 0 reputation credit(s) say(s) this sample is goodware. 0 VT Community user(s) with a total of 0 reputation credit(s) say(s) this sample is malware.

File name: 0623201013394462.bat

Submission date: 2011-06-10 08:41:09 (UTC)

Current status: queued (#33) queued (#33) analysing finished

Result: 0/ 42 (0.0%)

VT Community

not reviewed

Safety score: -

Compact Print results Antivirus Version Last Update Result

AhnLab-V3 2011.06.10.01 2011.06.10 -

AntiVir 7.11.9.135 2011.06.10 -

Antiy-AVL 2.0.3.7 2011.06.10 -

Avast 4.8.1351.0 2011.06.10 -

Avast5 5.0.677.0 2011.06.10 -

AVG 10.0.0.1190 2011.06.09 -

BitDefender 7.2 2011.06.10 -

CAT-QuickHeal 11.00 2011.06.10 -

ClamAV 0.97.0.0 2011.06.10 -

Commtouch 5.3.2.6 2011.06.10 -

Comodo 9012 2011.06.10 -

DrWeb 5.0.2.03300 2011.06.10 -

eSafe 7.0.17.0 2011.06.09 -

eTrust-Vet 36.1.8378 2011.06.09 -

F-Prot 4.6.2.117 2011.06.09 -

F-Secure 9.0.16440.0 2011.06.10 -

Fortinet 4.2.257.0 2011.06.10 -

GData 22 2011.06.10 -

Ikarus T3.1.1.104.0 2011.06.10 -

Jiangmin 13.0.900 2011.06.09 -

K7AntiVirus 9.105.4792 2011.06.09 -

Kaspersky 9.0.0.837 2011.06.10 -

McAfee 5.400.0.1158 2011.06.10 -

McAfee-GW-Edition 2010.1D 2011.06.10 -

Microsoft 1.6903 2011.06.10 -

NOD32 6194 2011.06.10 -

Norman 6.07.10 2011.06.09 -

nProtect 2011-06-10.01 2011.06.10 -

Panda 10.0.3.5 2011.06.09 -

PCTools 7.0.3.5 2011.06.09 -

Prevx 3.0 2011.06.10 -

Rising 23.61.02.11 2011.06.09 -

Sophos 4.66.0 2011.06.10 -

SUPERAntiSpyware 4.40.0.1006 2011.06.10 -

Symantec 20111.1.0.186 2011.06.10 -

TheHacker 6.7.0.1.227 2011.06.10 -

TrendMicro 9.200.0.1012 2011.06.10 -

TrendMicro-HouseCall 9.200.0.1012 2011.06.10 -

VBA32 3.12.16.1 2011.06.10 -

VIPRE 9540 2011.06.10 -

ViRobot 2011.6.10.4503 2011.06.10 -

VirusBuster 14.0.74.0 2011.06.09 -

Additional informationShow all

MD5 : 774906476e9cf9fd997a065c2e49ff3b

SHA1 : b0425757e946751dc0a48040891e89fd2808d11d

SHA256: 926587ffffd0bb50d02b0ea5a15332f49274d4550bd97bfeb5c544aecc295027

ssdeep: 12:Sd982Tv5IJZYVmCFc23ModxF1BQ982Dq/V5IJZe+6AWDUSn:a982Tv50cl/xF1m982Dq950P

6AWDUS

File size : 441 bytes

First seen: 2011-06-10 08:41:09

Last seen : 2011-06-10 08:41:09

TrID:

Unknown!

sigcheck:

publisher....: n/a

copyright....: n/a

product......: n/a

description..: n/a

original name: n/a

internal name: n/a

file version.: n/a

comments.....: n/a

signers......: -

signing date.: -

verified.....: Unsigned

VT Community

0

This file has never been reviewed by any VT Community member. Be the first one to comment on it!

VirusTotal Team

----------------------------------------------------

0 VT Community user(s) with a total of 0 reputation credit(s) say(s) this sample is goodware. 0 VT Community user(s) with a total of 0 reputation credit(s) say(s) this sample is malware.

File name: 0623201014002531.bat

Submission date: 2011-06-10 08:46:32 (UTC)

Current status: queued (#32) queued (#32) analysing finished

Result: 0/ 42 (0.0%)

VT Community

not reviewed

Safety score: -

Compact Print results Antivirus Version Last Update Result

AhnLab-V3 2011.06.10.01 2011.06.10 -

AntiVir 7.11.9.135 2011.06.10 -

Antiy-AVL 2.0.3.7 2011.06.10 -

Avast 4.8.1351.0 2011.06.10 -

Avast5 5.0.677.0 2011.06.10 -

AVG 10.0.0.1190 2011.06.09 -

BitDefender 7.2 2011.06.10 -

CAT-QuickHeal 11.00 2011.06.10 -

ClamAV 0.97.0.0 2011.06.10 -

Commtouch 5.3.2.6 2011.06.10 -

Comodo 9012 2011.06.10 -

DrWeb 5.0.2.03300 2011.06.10 -

eSafe 7.0.17.0 2011.06.09 -

eTrust-Vet 36.1.8379 2011.06.10 -

F-Prot 4.6.2.117 2011.06.09 -

F-Secure 9.0.16440.0 2011.06.10 -

Fortinet 4.2.257.0 2011.06.10 -

GData 22 2011.06.10 -

Ikarus T3.1.1.104.0 2011.06.10 -

Jiangmin 13.0.900 2011.06.09 -

K7AntiVirus 9.105.4792 2011.06.09 -

Kaspersky 9.0.0.837 2011.06.10 -

McAfee 5.400.0.1158 2011.06.10 -

McAfee-GW-Edition 2010.1D 2011.06.10 -

Microsoft 1.6903 2011.06.10 -

NOD32 6194 2011.06.10 -

Norman 6.07.10 2011.06.09 -

nProtect 2011-06-10.01 2011.06.10 -

Panda 10.0.3.5 2011.06.09 -

PCTools 7.0.3.5 2011.06.09 -

Prevx 3.0 2011.06.10 -

Rising 23.61.02.11 2011.06.09 -

Sophos 4.66.0 2011.06.10 -

SUPERAntiSpyware 4.40.0.1006 2011.06.10 -

Symantec 20111.1.0.186 2011.06.10 -

TheHacker 6.7.0.1.227 2011.06.10 -

TrendMicro 9.200.0.1012 2011.06.10 -

TrendMicro-HouseCall 9.200.0.1012 2011.06.10 -

VBA32 3.12.16.1 2011.06.10 -

VIPRE 9540 2011.06.10 -

ViRobot 2011.6.10.4503 2011.06.10 -

VirusBuster 14.0.74.0 2011.06.09 -

Additional informationShow all

MD5 : 1d424aad3905b70bdc4ee9b4cf7164c4

SHA1 : 07f988d04cdd2462e4dcff5a936038d1dafac23b

SHA256: 298f4c188b1d03b20a28a0ac15344ff76179d685f36f0498496cc48294b70b13

ssdeep: 12:Sd982Tv5IJZYVmCFc23ModxF1BQ982Dq/V5IJZe+6AWDjEhyn:a982Tv50cl/xF1m982Dq95

0P6AWD4hy

File size : 441 bytes

First seen: 2011-06-10 08:46:32

Last seen : 2011-06-10 08:46:32

TrID:

Unknown!

sigcheck:

publisher....: n/a

copyright....: n/a

product......: n/a

description..: n/a

original name: n/a

internal name: n/a

file version.: n/a

comments.....: n/a

signers......: -

signing date.: -

verified.....: Unsigned

VT Community

0

This file has never been reviewed by any VT Community member. Be the first one to comment on it!

VirusTotal Team

------------------------------------

End Post

Link to post
Share on other sites

They don't look bad so for now we'll leave them alone.

I would like to collect copies of them.

Lets do this:

Copy/paste the text in the Codebox below into notepad:

Here's how to do that:

Click Start > Run type Notepad click OK.

This will open an empty notepad file:

Take your mouse, and place your cursor at the beginning of the text in the box below, then click and hold the left mouse button, while pulling your mouse over the text. This should highlight the text. Now release the left mouse button. Now, with the cursor over the highlighted text, right click the mouse for options, and select 'copy'. Now over the empty Notepad box, right click your mouse again, and select 'paste' and you will have copied and pasted the text.

http://forums.malwarebytes.org/index.php?app=forums&module=post&section=post&do=reply_post&f=7&t=85791

Suspect::
c:\program files\0905201010511550.bat
c:\program files\0623201014002531.bat
c:\program files\0623201013394462.bat

Save this file to your desktop, Save this as "CFScript"

Here's how to do that:

1.Click File;

2.Click Save As... Change the directory to your desktop;

3.Change the Save as type to "All Files";

4.Type in the file name: CFScript

5.Click Save ...

CFScriptB-4.gif

Drag CFScript.txt into ComboFix.exe

Then post the results log using Copy / Paste

Also please describe how your computer behaves at the moment.

Link to post
Share on other sites

Here is the latest log file.

-------------------------------------------------------------------------------------------------

ComboFix 11-06-10.09 - MasterMind 06/10/2011 21:10:03.3.2 - x86

Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.1014.422 [GMT -7:00]

Running from: c:\documents and settings\MasterMind\Desktop\ComboFix.exe

Command switches used :: c:\documents and settings\MasterMind\Desktop\CFScript.txt

AV: Microsoft Security Essentials *Disabled/Updated* {BCF43643-A118-4432-AEDE-D861FCBCFCDF}

AV: Microsoft Security Essentials *Disabled/Updated* {EDB4FA23-53B8-4AFA-8C5D-99752CCA7095}

.

file zipped: c:\program files\0623201013394462.bat

file zipped: c:\program files\0623201014002531.bat

file zipped: c:\program files\0905201010511550.bat

.

.

((((((((((((((((((((((((( Files Created from 2011-05-11 to 2011-06-11 )))))))))))))))))))))))))))))))

.

.

2011-06-10 08:33 . 2011-06-10 08:33 28752 ----a-w- c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{D096C37C-B2C0-4FFE-968D-B6B0EB170094}\MpKslb1fa5614.sys

2011-06-10 08:32 . 2011-05-09 20:46 6962000 ----a-w- c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{D096C37C-B2C0-4FFE-968D-B6B0EB170094}\mpengine.dll

2011-06-02 10:23 . 2004-07-14 17:29 21723 ----a-w- c:\windows\system32\drivers\npapimon.sys

2011-06-02 10:23 . 2004-07-14 17:28 57401 ----a-w- c:\windows\ssdiag.exe

2011-06-02 10:23 . 2004-07-14 17:28 10906 ----a-w- c:\windows\system32\drivers\ssdiagn.sys

2011-05-31 08:56 . 2011-05-09 20:46 6962000 ----a-w- c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\Backup\mpengine.dll

2011-05-30 08:56 . 2011-05-30 08:56 -------- d-----w- c:\documents and settings\MasterMind\Local Settings\Application Data\Secunia PSI

2011-05-30 08:55 . 2011-05-30 08:55 -------- d-----w- c:\program files\Secunia

2011-05-30 08:49 . 2011-05-30 08:49 -------- d-----w- c:\windows\TempFBE817F1-43D1-A23A-2A46-70627B0A42C4-Signatures

2011-05-30 08:48 . 2011-05-30 08:49 -------- d-----w- c:\program files\Microsoft Security Client

2011-05-30 08:31 . 2011-05-09 20:46 6962000 ----a-w- c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\Updates\mpengine.dll

2011-05-30 07:16 . 2011-05-29 16:11 39984 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys

2011-05-30 07:16 . 2011-06-01 16:17 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware

2011-05-30 07:16 . 2011-05-29 16:11 22712 ----a-w- c:\windows\system32\drivers\mbam.sys

2011-05-26 22:24 . 2011-05-26 22:24 -------- d-----w- c:\program files\Common Files\iS3

2011-05-26 08:14 . 2011-05-26 08:14 -------- d-----w- c:\program files\Trend Micro

.

.

.

(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))

.

2011-06-02 10:16 . 2006-02-08 12:51 8552 ----a-w- c:\windows\system32\drivers\asctrm.sys

2011-06-02 10:16 . 2006-02-08 12:51 24576 ----a-w- c:\windows\system32\prefscpl.cpl

2010-09-05 17:51 . 2010-09-05 17:51 441 ----a-w- c:\program files\0905201010511550.bat

2010-06-23 21:00 . 2010-06-23 21:00 441 ----a-w- c:\program files\0623201014002531.bat

2010-06-23 20:39 . 2010-06-23 20:39 441 ----a-w- c:\program files\0623201013394462.bat

.

.

((((((((((((((((((((((((((((( SnapShot@2011-06-03_06.59.19 )))))))))))))))))))))))))))))))))))))))))

.

.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))

.

.

*Note* empty entries & legit default entries are not shown

REGEDIT4

.

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]

"swg"="c:\program files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe" [2007-06-26 68856]

.

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]

"SigmatelSysTrayApp"="stsystra.exe" [2005-03-23 339968]

"MimBoot"="c:\progra~1\MUSICM~1\MUSICM~3\mimboot.exe" [2005-09-09 8192]

"IntelMeM"="c:\program files\Intel\Modem Event Monitor\IntelMEM.exe" [2003-09-04 221184]

"igfxtray"="c:\windows\system32\igfxtray.exe" [2005-10-15 94208]

"igfxpers"="c:\windows\system32\igfxpers.exe" [2005-10-15 114688]

"igfxhkcmd"="c:\windows\system32\hkcmd.exe" [2005-10-15 77824]

"HP Software Update"="c:\program files\HP\HP Software Update\HPWuSchd2.exe" [2007-05-08 54840]

"F5D7050v3"="c:\program files\Belkin\F5D7050v3\Belkinwcui.exe" [2007-10-31 1654784]

"ehTray"="c:\windows\ehome\ehtray.exe" [2005-09-29 67584]

"DVDLauncher"="c:\program files\CyberLink\PowerDVD\DVDLauncher.exe" [2005-02-23 53248]

"dla"="c:\windows\system32\dla\tfswctrl.exe" [2004-12-06 127035]

"MSC"="c:\program files\Microsoft Security Client\msseces.exe" [2010-11-30 997408]

"QuickTime Task"="c:\program files\QuickTime\qttask.exe" [2006-02-08 98304]

"Malwarebytes' Anti-Malware"="c:\program files\Malwarebytes' Anti-Malware\mbamgui.exe" [2011-05-29 449584]

"ssdiag"="c:\windows\ssdiag.exe" [2004-07-14 57401]

.

[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run]

"DWQueuedReporting"="c:\progra~1\COMMON~1\MICROS~1\DW\dwtrig20.exe" [2008-11-04 435096]

.

c:\documents and settings\MasterMind\Start Menu\Programs\Startup\

OneNote 2007 Screen Clipper and Launcher.lnk - c:\program files\Microsoft Office\Office12\ONENOTEM.EXE [2009-2-26 97680]

RCA Detective.lnk - c:\program files\RCA Detective\RCADetective.exe [2010-8-17 942592]

.

c:\documents and settings\All Users\Start Menu\Programs\Startup\

Adobe Gamma Loader.lnk - c:\program files\Common Files\Adobe\Calibration\Adobe Gamma Loader.exe [2006-4-28 113664]

Adobe Reader Speed Launch.lnk - c:\program files\Adobe\Acrobat 7.0\Reader\reader_sl.exe [2008-4-23 29696]

Billminder.lnk - c:\program files\QUICKENW\BILLMIND.EXE [2007-2-5 36864]

HotSync Manager.lnk - c:\program files\palmOne\Hotsync.exe [2004-6-9 471040]

HP Digital Imaging Monitor.lnk - c:\program files\HP\Digital Imaging\bin\hpqtra08.exe [2004-11-4 258048]

HP Image Zone Fast Start.lnk - c:\program files\HP\Digital Imaging\bin\hpqthb08.exe [2004-11-4 53248]

Quicken Startup.lnk - c:\program files\QUICKENW\QWDLLS.EXE [2007-2-5 36864]

.

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\MCODS]

@=""

.

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\MsMpSvc]

@="Service"

.

[HKEY_LOCAL_MACHINE\software\microsoft\security center]

"AntiVirusOverride"=dword:00000001

.

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]

"%windir%\\system32\\sessmgr.exe"=

"c:\\Program Files\\Messenger\\msmsgs.exe"=

"c:\\Program Files\\HP\\HP Software Update\\HPWUCli.exe"=

"%windir%\\Network Diagnostic\\xpnetdiag.exe"=

"c:\\Program Files\\Microsoft Office\\Office12\\ONENOTE.EXE"=

"c:\\Program Files\\Google\\Google Earth\\client\\googleearth.exe"=

"c:\\Program Files\\Google\\Google Earth\\plugin\\geplugin.exe"=

.

R1 MpKsl2fe21f64;MpKsl2fe21f64;\??\c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{190F1419-6E23-49B2-9958-C612856B26E2}\MpKsl2fe21f64.sys --> c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{190F1419-6E23-49B2-9958-C612856B26E2}\MpKsl2fe21f64.sys [?]

R1 MpKslb1fa5614;MpKslb1fa5614;c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{D096C37C-B2C0-4FFE-968D-B6B0EB170094}\MpKslb1fa5614.sys [6/10/2011 1:33 AM 28752]

R2 MBAMService;MBAMService;c:\program files\Malwarebytes' Anti-Malware\mbamservice.exe [5/30/2011 12:16 AM 366640]

R3 MBAMProtector;MBAMProtector;c:\windows\system32\drivers\mbam.sys [5/30/2011 12:16 AM 22712]

S2 gupdate1c98f3482e7ada4;Google Update Service (gupdate1c98f3482e7ada4);c:\program files\Google\Update\GoogleUpdate.exe [2/14/2009 11:13 PM 133104]

S3 gupdatem;Google Update Service (gupdatem);c:\program files\Google\Update\GoogleUpdate.exe [2/14/2009 11:13 PM 133104]

.

--- Other Services/Drivers In Memory ---

.

*NewlyCreated* - MPKSL1F55ECB2

*NewlyCreated* - MPKSLB1FA5614

*Deregistered* - MpKsl1f55ecb2

.

Contents of the 'Scheduled Tasks' folder

.

2011-06-11 c:\windows\Tasks\Google Software Updater.job

- c:\program files\Google\Common\Google Updater\GoogleUpdaterService.exe [2007-04-01 21:11]

.

2011-06-10 c:\windows\Tasks\GoogleUpdateTaskMachineCore.job

- c:\program files\Google\Update\GoogleUpdate.exe [2009-02-15 06:13]

.

2011-06-11 c:\windows\Tasks\GoogleUpdateTaskMachineUA.job

- c:\program files\Google\Update\GoogleUpdate.exe [2009-02-15 06:13]

.

2011-06-10 c:\windows\Tasks\MP Scheduled Scan.job

- c:\program files\Microsoft Security Client\Antimalware\MpCmdRun.exe [2010-11-11 19:26]

.

.

------- Supplementary Scan -------

.

uSearchMigratedDefaultURL = hxxp://www.google.com/search?q={searchTerms}&sourceid=ie7&rls=com.microsoft:en-US&ie=utf8&oe=utf8

uStart Page = hxxp://www.myqwest.com/

uInternet Connection Wizard,ShellNext = iexplore

uInternet Settings,ProxyOverride = <local>

uSearchAssistant = hxxp://www.google.com/ie

uSearchURL,(Default) = hxxp://www.google.com/search?q=%s

Trusted Zone: internet

Trusted Zone: mcafee.com

TCP: DhcpNameServer = 192.168.0.1 205.171.3.65

.

.

**************************************************************************

.

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net

Rootkit scan 2011-06-10 21:17

Windows 5.1.2600 Service Pack 3 NTFS

.

scanning hidden processes ...

.

scanning hidden autostart entries ...

.

scanning hidden files ...

.

scan completed successfully

hidden files: 0

.

**************************************************************************

.

--------------------- DLLs Loaded Under Running Processes ---------------------

.

- - - - - - - > 'explorer.exe'(2412)

c:\windows\system32\WININET.dll

c:\progra~1\WINDOW~3\wmpband.dll

c:\windows\system32\ieframe.dll

c:\windows\system32\webcheck.dll

c:\windows\system32\WPDShServiceObj.dll

c:\windows\system32\PortableDeviceTypes.dll

c:\windows\system32\PortableDeviceApi.dll

.

Completion time: 2011-06-10 21:19:00

ComboFix-quarantined-files.txt 2011-06-11 04:18

ComboFix2.txt 2011-06-09 08:07

ComboFix3.txt 2011-06-03 07:02

.

Pre-Run: 124,738,473,984 bytes free

Post-Run: 124,734,423,040 bytes free

.

- - End Of File - - 7A0C4B5C1DAC12B3829801AC21C358E0

Upload was successful

Link to post
Share on other sites

I'll let you know if I hear anything about those files if they're bad.

For now, just leave them as is.

The following will implement some cleanup procedures as well as reset System Restore points:

For XP:

  • Click START run
  • Now type ComboFix /Uninstall in the runbox and click OK. Note the space between the X and the /, it needs to be there.

For Vista / Windows 7

  • Click START Search
  • Now type ComboFix /Uninstall in the runbox and click OK. Note the space between the X and the /, it needs to be there.

If you used DeFogger

To re-enable your Emulation drivers, double click DeFogger to run the tool.

  • The application window will appear
  • Click the Re-enable button to re-enable your CD Emulation drivers
  • Click Yes to continue
  • A 'Finished!' message will appear
  • Click OK
  • DeFogger will now ask to reboot the machine - click OK

IMPORTANT! If you receive an error message while running DeFogger, please post the log defogger_enable which will appear on your desktop.

Your Emulation drivers are now re-enabled.

Here's my usual all clean post

To be on the safe side, I would also change all my passwords.

This infection appears to have been cleaned, but as the malware could be configured to run any program a remote attacker requires, it's impossible to be 100% sure that any machine is clean.

Log looks good :D

  • Make your Internet Explorer more secure - This can be done by following these simple instructions:
    1. From within Internet Explorer click on the Tools menu and then click on Options.
    2. Click once on the Security tab
    3. Click once on the Internet icon so it becomes highlighted.
    4. Click once on the Custom Level button.
    5. Change the Download signed ActiveX controls to Prompt
    6. Change the Download unsigned ActiveX controls to Disable
    7. Change the Initialize and script ActiveX controls not marked as safe to Disable
    8. Change the Installation of desktop items to Prompt
    9. Change the Launching programs and files in an IFRAME to Prompt
    10. Change the Navigate sub-frames across different domains to Prompt
    11. When all these settings have been made, click on the OK button.
    12. If it prompts you as to whether or not you want to save the settings, press the Yes button.
    13. Next press the Apply button and then the OK to exit the Internet Properties page.

    [*]Update your AntiVirus Software - It is imperative that you update your Antivirus software at least once a week

    (Even more if you wish). If you do not update your antivirus software then it will not be able to catch any of the new variants that may come out.

    [*]Use a Firewall - I can not stress how important it is that you use a Firewall on your computer.

    Without a firewall your computer is succeptible to being hacked and taken over.

    I am very serious about this and see it happen almost every day with my clients.

    Simply using a Firewall in its default configuration can lower your risk greatly.

    [*]Using a secure browser plugin M86 SecureBrowsing makes it safe to search, surf and socialize online. This free browser plug-in displays security icons next to links on search engines and social networking sites like Facebook, Twitter and LinkedIn, so you'll know which pages are safe and which ones to avoid.

Link to post
Share on other sites

Thank you for all your help. I had already implemented most of your security suggestions except for M86. I did download that and am running it now. I do run Microsoft Security Essentials in parallel with Malwarebytes. MS Security scans nightly and Malwarebytes scans weekly. Thanks again for your willingness to help.

Link to post
Share on other sites

Guest
This topic is now closed to further replies.
  • Recently Browsing   0 members

    • No registered users viewing this page.
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.