Jump to content

fsharproj redirect virus infection


Recommended Posts

Please let me know how to remove this recurring and difficult infection

My DDS log:

.

DDS (Ver_2011-06-12.02) - NTFSx86

Internet Explorer: 8.0.6001.18702 BrowserJavaVersion: 1.6.0_26

Run by user at 13:36:12 on 2011-06-16

Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.2047.1371 [GMT -4:00]

.

.

============== Running Processes ===============

.

C:\WINDOWS\system32\svchost -k DcomLaunch

svchost.exe

C:\WINDOWS\System32\svchost.exe -k netsvcs

C:\WINDOWS\system32\svchost.exe -k WudfServiceGroup

svchost.exe

svchost.exe

C:\WINDOWS\system32\spoolsv.exe

svchost.exe

C:\Program Files\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe

C:\Program Files\Bonjour\mDNSResponder.exe

C:\WINDOWS\system32\inetsrv\inetinfo.exe

C:\Program Files\Java\jre6\bin\jqs.exe

C:\Program Files\Common Files\LightScribe\LSSrvc.exe

C:\Program Files\Common Files\Microsoft Shared\VS7Debug\mdm.exe

C:\WINDOWS\system32\svchost.exe -k imgsvc

C:\Program Files\Canon\CAL\CALMAIN.exe

C:\Program Files\iPod\bin\iPodService.exe

C:\WINDOWS\Explorer.EXE

C:\WINDOWS\SOUNDMAN.EXE

C:\Program Files\iTunes\iTunesHelper.exe

C:\Program Files\Common Files\Java\Java Update\jusched.exe

C:\WINDOWS\system32\ctfmon.exe

C:\Program Files\SlySoft\AnyDVD\AnyDVDtray.exe

C:\Program Files\Sony Ericsson\Sony Ericsson PC Companion\PCCompanion.exe

C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe

C:\WINDOWS\system32\taskmgr.exe

C:\Program Files\Sony Ericsson\Sony Ericsson PC Companion\PCCompanionInfo.exe

C:\Program Files\Mozilla Firefox\firefox.exe

.

============== Pseudo HJT Report ===============

.

uStart Page = hxxp://www.google.com/

uInternet Settings,ProxyOverride = *.local

uURLSearchHooks: H - No File

BHO: {00d40175-80af-4c99-a130-e6758f4f2fdd} - c:\windows\system32\atrace32.dll

BHO: {00ea909b-7c00-43f4-8d86-60487970cd58} - c:\windows\system32\atrace32.dll

BHO: {01a802eb-80af-4c99-a130-e6758f4f2fdd} - c:\windows\system32\atrace32.dll

BHO: {02478D38-C3F9-4efb-9B51-7695ECA05670} - No File

BHO: Adobe PDF Link Helper: {18df081c-e8ad-4283-a596-fa578c2ebdc3} - c:\program files\common files\adobe\acrobat\activex\AcroIEHelperShim.dll

BHO: Spybot-S&D IE Protection: {53707962-6f74-2d53-2644-206d7942484f} - c:\progra~1\spybot~1\SDHelper.dll

BHO: {5C255C8A-E604-49b4-9D64-90988571CECB} - No File

BHO: Windows Live Sign-in Helper: {9030d464-4c02-4abf-8ecc-5164760863c6} - c:\program files\common files\microsoft shared\windows live\WindowsLiveLogin.dll

BHO: Java Plug-In 2 SSV Helper: {dbc80044-a445-435b-bc74-9c25c1c588a9} - c:\program files\java\jre6\bin\jp2ssv.dll

BHO: JQSIEStartDetectorImpl Class: {e7e6f031-17ce-4c07-bc86-eabfe594f69c} - c:\program files\java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll

TB: {EF99BD32-C1FB-11D2-892F-0090271D4F88} - No File

uRun: [ctfmon.exe] c:\windows\system32\ctfmon.exe

uRun: [AnyDVD] c:\program files\slysoft\anydvd\AnyDVDtray.exe

uRun: [sony Ericsson PC Companion] "c:\program files\sony ericsson\sony ericsson pc companion\PCCompanion.exe" /Background

uRun: [spybotSD TeaTimer] c:\program files\spybot - search & destroy\TeaTimer.exe

mRun: [iMJPMIG8.1] "c:\windows\ime\imjp8_1\IMJPMIG.EXE" /Spoil /RemAdvDef /Migration32

mRun: [PHIME2002ASync] c:\windows\system32\ime\tintlgnt\TINTSETP.EXE /SYNC

mRun: [PHIME2002A] c:\windows\system32\ime\tintlgnt\TINTSETP.EXE /IMEName

mRun: [soundMan] SOUNDMAN.EXE

mRun: [NeroFilterCheck] c:\windows\system32\NeroCheck.exe

mRun: [Adobe Reader Speed Launcher] "c:\program files\adobe\reader 9.0\reader\Reader_sl.exe"

mRun: [Adobe ARM] "c:\program files\common files\adobe\arm\1.0\AdobeARM.exe"

mRun: [QuickTime Task] "c:\program files\quicktime\QTTask.exe" -atboottime

mRun: [iTunesHelper] "c:\program files\itunes\iTunesHelper.exe"

mRun: [sunJavaUpdateSched] "c:\program files\common files\java\java update\jusched.exe"

dRunOnce: [_nltide_3] rundll32 advpack.dll,LaunchINFSectionEx nLite.inf,C,,4,N

StartupFolder: c:\docume~1\user\startm~1\programs\startup\taskmg~1.lnk - c:\windows\system32\taskmgr.exe

StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\micros~1.lnk - c:\program files\microsoft office\office10\OSA.EXE

mPolicies-system: DisableCAD = 1 (0x1)

IE: {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe

IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe

IE: {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - {53707962-6F74-2D53-2644-206D7942484F} - c:\progra~1\spybot~1\SDHelper.dll

Trusted Zone: aol.com\free

DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_26-windows-i586.cab

DPF: {CAFEEFAC-0016-0000-0026-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_26-windows-i586.cab

DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_26-windows-i586.cab

TCP: DhcpNameServer = 192.168.1.254

TCP: Interfaces\{FBBD956C-7558-4137-B753-F689E2EF7419} : DhcpNameServer = 192.168.1.254

Handler: skype4com - {FFC8B962-9B40-4DFF-9458-1830C7DD7F5D} - c:\progra~1\common~1\skype\SKYPE4~1.DLL

SSODL: WPDShServiceObj - {AAA288BA-9A4C-45B0-95D7-94D524869DB5} - c:\windows\system32\WPDShServiceObj.dll

Hosts: 127.0.0.1 www.spywareinfo.com

.

================= FIREFOX ===================

.

FF - ProfilePath - c:\documents and settings\user\application data\mozilla\firefox\profiles\egjwi365.default\

FF - prefs.js: browser.startup.homepage - hxxp://www.google.com

FF - prefs.js: network.proxy.type - 0

FF - plugin: c:\program files\java\jre6\bin\new_plugin\npdeployJava1.dll

FF - plugin: c:\program files\microsoft silverlight\4.0.60310.0\npctrlui.dll

FF - plugin: c:\program files\mozilla firefox\plugins\npdeployJava1.dll

FF - plugin: c:\program files\sony\media go\npmediago.dll

.

---- FIREFOX POLICIES ----

FF - user.js: yahoo.ytff.general.dontshowhpoffer - true

============= SERVICES / DRIVERS ===============

.

R0 Si3112r;Silicon Image SiI 3512 SATARaid Controller;c:\windows\system32\drivers\SI3112r.sys [2010-6-11 110128]

R0 Si3124;Si3124;c:\windows\system32\drivers\si3124.sys [2010-6-11 76208]

R3 seehcri;Sony Ericsson seehcri Device Driver;c:\windows\system32\drivers\seehcri.sys [2010-9-5 27632]

S3 MBAMSwissArmy;MBAMSwissArmy;c:\windows\system32\drivers\mbamswissarmy.sys [2010-6-14 39984]

S3 s1018bus;Sony Ericsson Device 1018 driver (WDM);c:\windows\system32\drivers\s1018bus.sys [2010-9-5 86824]

S3 s1018mdfl;Sony Ericsson Device 1018 USB WMC Modem Filter;c:\windows\system32\drivers\s1018mdfl.sys [2010-9-5 15016]

S3 s1018mdm;Sony Ericsson Device 1018 USB WMC Modem Driver;c:\windows\system32\drivers\s1018mdm.sys [2010-9-5 114728]

S3 s1018mgmt;Sony Ericsson Device 1018 USB WMC Device Management Drivers (WDM);c:\windows\system32\drivers\s1018mgmt.sys [2010-9-5 106208]

S3 s1018nd5;Sony Ericsson Device 1018 USB Ethernet Emulation (NDIS);c:\windows\system32\drivers\s1018nd5.sys [2010-9-5 26024]

S3 s1018obex;Sony Ericsson Device 1018 USB WMC OBEX Interface;c:\windows\system32\drivers\s1018obex.sys [2010-9-5 104744]

S3 s1018unic;Sony Ericsson Device 1018 USB Ethernet Emulation (WDM);c:\windows\system32\drivers\s1018unic.sys [2010-9-5 109864]

S3 Sony Ericsson PCCompanion;Sony Ericsson PCCompanion;c:\program files\sony ericsson\sony ericsson pc companion\PCCService.exe [2011-4-13 152064]

.

=============== Created Last 30 ================

.

2011-06-14 21:14:01 0 ---ha-w- c:\documents and settings\user\nwtlfurqwj.tmp

2011-06-13 13:47:59 -------- d-----w- c:\program files\Rhinoceros

2011-06-12 14:17:48 368128 ----a-w- c:\windows\system32\atrace32.dll

.

==================== Find3M ====================

.

2011-06-16 01:02:12 404640 ----a-w- c:\windows\system32\FlashPlayerCPLApp.cpl

2011-05-29 13:11:30 39984 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys

2011-05-29 13:11:20 22712 ----a-w- c:\windows\system32\drivers\mbam.sys

2011-05-04 08:52:22 472808 ----a-w- c:\windows\system32\deployJava1.dll

2011-05-04 06:25:49 73728 ----a-w- c:\windows\system32\javacpl.cpl

2011-04-16 21:40:14 229224 ------w- c:\windows\system32\drivers\VMM.sys

2011-03-25 13:54:31 117752 ------w- c:\windows\system32\drivers\AnyDVD.sys

.

============= FINISH: 13:36:43.63 ===============

attach.zip

Edited by AdvancedSetup
real name changed to user
Link to post
Share on other sites

:welcome:

Logs will be closed if you haven't replied within 3 days

Please don't attach the scans / logs from these scans, use "copy/paste".

DO NOT use any TOOLS such as Combofix or HijackThis fixes without supervision.

Doing so could make your pc inoperatible and could require a full reinstall of your OS, losing all your programs and data.

Vista and Windows 7 users:

1. These tools MUST be run from the executable. (.exe) every time you run them

2. With Admin Rights (Right click, choose "Run as Administrator")

Stay with this topic until I give you the all clean post.

You might want to print these instructions out.

Note: Close all browsers before running ATF Cleaner: IE, FireFox, etc.

Please download ATF Cleaner by Atribune.

Download - ATF Cleaner

Link to post
Share on other sites

I ran ATF Cleaner with all selected - under "main" some files were removed but under "Firefox" it replied with "no files were removed" after cleaning - I imagine this is because either CCleaner deleted whatever was supposed to be under "Firefox" or because my Firefox options were already set to delete everything when I close the program.

I had run CCleaner first with all options and programs selected as well as cleaned up the registry, then ran ATF Cleaner, then ran GooredFix and then ran TDSKiller. I checked Firefox options to make sure no proxy server was listed, flushed my DNS cache, ran Spybot and now running Mbam. I even ran ESET online scanner today and it found and deleted multiple copies of "Win32/TrojanDownloader.Tracur.F trojan" and "Win32/TrojanDownloader.Tracur.F trojan". I have done all this before but still get the redirect in both Firefox and IE. Right after the redirect I usually see the "fsharproj" registry key reappear. I have deleted it many times now and it keeps coming back. So I suspect the problem is much deeper.

As requested, here is my TDSKiller log:

2011/06/17 19:24:21.0999 4072 TDSS rootkit removing tool 2.5.5.0 Jun 16 2011 15:25:15

2011/06/17 19:24:24.0012 4072 ================================================================================

2011/06/17 19:24:24.0012 4072 SystemInfo:

2011/06/17 19:24:24.0012 4072

2011/06/17 19:24:24.0012 4072 OS Version: 5.1.2600 ServicePack: 3.0

2011/06/17 19:24:24.0012 4072 Product type: Workstation

2011/06/17 19:24:24.0012 4072 ComputerName: KEVIN

2011/06/17 19:24:24.0012 4072 UserName: Kevin 000

2011/06/17 19:24:24.0012 4072 Windows directory: C:\WINDOWS

2011/06/17 19:24:24.0012 4072 System windows directory: C:\WINDOWS

2011/06/17 19:24:24.0012 4072 Processor architecture: Intel x86

2011/06/17 19:24:24.0012 4072 Number of processors: 1

2011/06/17 19:24:24.0012 4072 Page size: 0x1000

2011/06/17 19:24:24.0012 4072 Boot type: Normal boot

2011/06/17 19:24:24.0012 4072 ================================================================================

2011/06/17 19:24:24.0552 4072 Initialize success

2011/06/17 19:24:27.0767 0180 ================================================================================

2011/06/17 19:24:27.0767 0180 Scan started

2011/06/17 19:24:27.0767 0180 Mode: Manual;

2011/06/17 19:24:27.0767 0180 ================================================================================

2011/06/17 19:24:28.0358 0180 ACPI (8fd99680a539792a30e97944fdaecf17) C:\WINDOWS\system32\DRIVERS\ACPI.sys

2011/06/17 19:24:28.0508 0180 ACPIEC (9859c0f6936e723e4892d7141b1327d5) C:\WINDOWS\system32\drivers\ACPIEC.sys

2011/06/17 19:24:28.0768 0180 aec (8bed39e3c35d6a489438b8141717a557) C:\WINDOWS\system32\drivers\aec.sys

2011/06/17 19:24:28.0889 0180 AFD (355556d9e580915118cd7ef736653a89) C:\WINDOWS\System32\drivers\afd.sys

2011/06/17 19:24:29.0439 0180 ALCXWDM (f5d4d3899e16e1f75398297844386226) C:\WINDOWS\system32\drivers\ALCXWDM.SYS

2011/06/17 19:24:29.0630 0180 AmdK7 (8fce268cdbdd83b23419d1f35f42c7b1) C:\WINDOWS\system32\DRIVERS\amdk7.sys

2011/06/17 19:24:29.0850 0180 AnyDVD (133b7b6d6a3ec9e46fbe742ee1516c37) C:\WINDOWS\system32\Drivers\AnyDVD.sys

2011/06/17 19:24:30.0220 0180 AsyncMac (b153affac761e7f5fcfa822b9c4e97bc) C:\WINDOWS\system32\DRIVERS\asyncmac.sys

2011/06/17 19:24:30.0341 0180 atapi (9f3a2f5aa6875c72bf062c712cfa2674) C:\WINDOWS\system32\DRIVERS\atapi.sys

2011/06/17 19:24:30.0611 0180 Atmarpc (9916c1225104ba14794209cfa8012159) C:\WINDOWS\system32\DRIVERS\atmarpc.sys

2011/06/17 19:24:30.0751 0180 audstub (d9f724aa26c010a217c97606b160ed68) C:\WINDOWS\system32\DRIVERS\audstub.sys

2011/06/17 19:24:30.0931 0180 Beep (da1f27d85e0d1525f6621372e7b685e9) C:\WINDOWS\system32\drivers\Beep.sys

2011/06/17 19:24:31.0172 0180 cbidf2k (90a673fc8e12a79afbed2576f6a7aaf9) C:\WINDOWS\system32\drivers\cbidf2k.sys

2011/06/17 19:24:31.0302 0180 CCDECODE (0be5aef125be881c4f854c554f2b025c) C:\WINDOWS\system32\DRIVERS\CCDECODE.sys

2011/06/17 19:24:31.0562 0180 Cdaudio (c1b486a7658353d33a10cc15211a873b) C:\WINDOWS\system32\drivers\Cdaudio.sys

2011/06/17 19:24:31.0723 0180 Cdfs (c885b02847f5d2fd45a24e219ed93b32) C:\WINDOWS\system32\drivers\Cdfs.sys

2011/06/17 19:24:31.0863 0180 Cdrom (1f4260cc5b42272d71f79e570a27a4fe) C:\WINDOWS\system32\DRIVERS\cdrom.sys

2011/06/17 19:24:32.0944 0180 Disk (044452051f3e02e7963599fc8f4f3e25) C:\WINDOWS\system32\DRIVERS\disk.sys

2011/06/17 19:24:33.0135 0180 dmboot (d992fe1274bde0f84ad826acae022a41) C:\WINDOWS\system32\drivers\dmboot.sys

2011/06/17 19:24:33.0255 0180 dmio (7c824cf7bbde77d95c08005717a95f6f) C:\WINDOWS\system32\drivers\dmio.sys

2011/06/17 19:24:33.0315 0180 dmload (e9317282a63ca4d188c0df5e09c6ac5f) C:\WINDOWS\system32\drivers\dmload.sys

2011/06/17 19:24:33.0395 0180 DMusic (8a208dfcf89792a484e76c40e5f50b45) C:\WINDOWS\system32\drivers\DMusic.sys

2011/06/17 19:24:33.0555 0180 dot4 (3e4b043f8bc6be1d4820cc6c9c500306) C:\WINDOWS\system32\DRIVERS\Dot4.sys

2011/06/17 19:24:33.0705 0180 Dot4Print (77ce63a8a34ae23d9fe4c7896d1debe7) C:\WINDOWS\system32\DRIVERS\Dot4Prt.sys

2011/06/17 19:24:33.0826 0180 Dot4Scan (bd05306428da63369692477ddc0f6f5f) C:\WINDOWS\system32\DRIVERS\Dot4Scan.sys

2011/06/17 19:24:33.0956 0180 dot4usb (6ec3af6bb5b30e488a0c559921f012e1) C:\WINDOWS\system32\DRIVERS\dot4usb.sys

2011/06/17 19:24:34.0236 0180 drmkaud (8f5fcff8e8848afac920905fbd9d33c8) C:\WINDOWS\system32\drivers\drmkaud.sys

2011/06/17 19:24:34.0416 0180 ElbyCDIO (d71233d7ccc2e64f8715a20428d5a33b) C:\WINDOWS\system32\Drivers\ElbyCDIO.sys

2011/06/17 19:24:34.0657 0180 Fastfat (38d332a6d56af32635675f132548343e) C:\WINDOWS\system32\drivers\Fastfat.sys

2011/06/17 19:24:34.0847 0180 Fdc (92cdd60b6730b9f50f6a1a0c1f8cdc81) C:\WINDOWS\system32\DRIVERS\fdc.sys

2011/06/17 19:24:34.0977 0180 Fips (d45926117eb9fa946a6af572fbe1caa3) C:\WINDOWS\system32\drivers\Fips.sys

2011/06/17 19:24:35.0107 0180 Flpydisk (9d27e7b80bfcdf1cdd9b555862d5e7f0) C:\WINDOWS\system32\DRIVERS\flpydisk.sys

2011/06/17 19:24:35.0258 0180 FltMgr (b2cf4b0786f8212cb92ed2b50c6db6b0) C:\WINDOWS\system32\DRIVERS\fltMgr.sys

2011/06/17 19:24:35.0408 0180 Fs_Rec (3e1e2bd4f39b0e2b7dc4f4d2bcc2779a) C:\WINDOWS\system32\drivers\Fs_Rec.sys

2011/06/17 19:24:35.0538 0180 Ftdisk (6ac26732762483366c3969c9e4d2259d) C:\WINDOWS\system32\DRIVERS\ftdisk.sys

2011/06/17 19:24:35.0658 0180 GEARAspiWDM (8182ff89c65e4d38b2de4bb0fb18564e) C:\WINDOWS\system32\DRIVERS\GEARAspiWDM.sys

2011/06/17 19:24:35.0808 0180 Gpc (0a02c63c8b144bd8c86b103dee7c86a2) C:\WINDOWS\system32\DRIVERS\msgpc.sys

2011/06/17 19:24:35.0999 0180 HCF_MSFT (4236e014632f4163f53ebb717f41594c) C:\WINDOWS\system32\DRIVERS\HCF_MSFT.sys

2011/06/17 19:24:36.0239 0180 HTTP (f80a415ef82cd06ffaf0d971528ead38) C:\WINDOWS\system32\Drivers\HTTP.sys

2011/06/17 19:24:36.0429 0180 i8042prt (4a0b06aa8943c1e332520f7440c0aa30) C:\WINDOWS\system32\DRIVERS\i8042prt.sys

2011/06/17 19:24:36.0650 0180 Imapi (083a052659f5310dd8b6a6cb05edcf8e) C:\WINDOWS\system32\DRIVERS\imapi.sys

2011/06/17 19:24:37.0140 0180 Ip6Fw (3bb22519a194418d5fec05d800a19ad0) C:\WINDOWS\system32\DRIVERS\Ip6Fw.sys

2011/06/17 19:24:37.0271 0180 IpFilterDriver (731f22ba402ee4b62748adaf6363c182) C:\WINDOWS\system32\DRIVERS\ipfltdrv.sys

2011/06/17 19:24:37.0401 0180 IpInIp (b87ab476dcf76e72010632b5550955f5) C:\WINDOWS\system32\DRIVERS\ipinip.sys

2011/06/17 19:24:37.0521 0180 IpNat (cc748ea12c6effde940ee98098bf96bb) C:\WINDOWS\system32\DRIVERS\ipnat.sys

2011/06/17 19:24:37.0701 0180 IPSec (23c74d75e36e7158768dd63d92789a91) C:\WINDOWS\system32\DRIVERS\ipsec.sys

2011/06/17 19:24:37.0841 0180 IRENUM (c93c9ff7b04d772627a3646d89f7bf89) C:\WINDOWS\system32\DRIVERS\irenum.sys

2011/06/17 19:24:38.0002 0180 isapnp (05a299ec56e52649b1cf2fc52d20f2d7) C:\WINDOWS\system32\DRIVERS\isapnp.sys

2011/06/17 19:24:38.0152 0180 Kbdclass (463c1ec80cd17420a542b7f36a36f128) C:\WINDOWS\system32\DRIVERS\kbdclass.sys

2011/06/17 19:24:38.0292 0180 kmixer (692bcf44383d056aed41b045a323d378) C:\WINDOWS\system32\drivers\kmixer.sys

2011/06/17 19:24:38.0452 0180 KSecDD (b467646c54cc746128904e1654c750c1) C:\WINDOWS\system32\drivers\KSecDD.sys

2011/06/17 19:24:38.0873 0180 LVUSBSta (9e9306063ecd8aa91b3fb76678d3cee2) C:\WINDOWS\system32\drivers\LVUSBSta.sys

2011/06/17 19:24:38.0993 0180 MBAMSwissArmy (b309912717c29fc67e1ba4730a82b6dd) C:\WINDOWS\system32\drivers\mbamswissarmy.sys

2011/06/17 19:24:39.0203 0180 mnmdd (4ae068242760a1fb6e1a44bf4e16afa6) C:\WINDOWS\system32\drivers\mnmdd.sys

2011/06/17 19:24:39.0374 0180 Modem (dfcbad3cec1c5f964962ae10e0bcc8e1) C:\WINDOWS\system32\drivers\Modem.sys

2011/06/17 19:24:39.0504 0180 Mouclass (35c9e97194c8cfb8430125f8dbc34d04) C:\WINDOWS\system32\DRIVERS\mouclass.sys

2011/06/17 19:24:39.0664 0180 MountMgr (a80b9a0bad1b73637dbcbba7df72d3fd) C:\WINDOWS\system32\drivers\MountMgr.sys

2011/06/17 19:24:39.0824 0180 MRxDAV (11d42bb6206f33fbb3ba0288d3ef81bd) C:\WINDOWS\system32\DRIVERS\mrxdav.sys

2011/06/17 19:24:39.0944 0180 MRxSmb (0dc719e9b15e902346e87e9dcd5751fa) C:\WINDOWS\system32\DRIVERS\mrxsmb.sys

2011/06/17 19:24:40.0115 0180 Msfs (c941ea2454ba8350021d774daf0f1027) C:\WINDOWS\system32\drivers\Msfs.sys

2011/06/17 19:24:40.0325 0180 MSKSSRV (d1575e71568f4d9e14ca56b7b0453bf1) C:\WINDOWS\system32\drivers\MSKSSRV.sys

2011/06/17 19:24:40.0445 0180 MSPCLOCK (325bb26842fc7ccc1fcce2c457317f3e) C:\WINDOWS\system32\drivers\MSPCLOCK.sys

2011/06/17 19:24:40.0535 0180 MSPQM (bad59648ba099da4a17680b39730cb3d) C:\WINDOWS\system32\drivers\MSPQM.sys

2011/06/17 19:24:40.0625 0180 mssmbios (af5f4f3f14a8ea2c26de30f7a1e17136) C:\WINDOWS\system32\DRIVERS\mssmbios.sys

2011/06/17 19:24:40.0726 0180 MSTEE (e53736a9e30c45fa9e7b5eac55056d1d) C:\WINDOWS\system32\drivers\MSTEE.sys

2011/06/17 19:24:40.0846 0180 Mup (de6a75f5c270e756c5508d94b6cf68f5) C:\WINDOWS\system32\drivers\Mup.sys

2011/06/17 19:24:40.0946 0180 NABTSFEC (5b50f1b2a2ed47d560577b221da734db) C:\WINDOWS\system32\DRIVERS\NABTSFEC.sys

2011/06/17 19:24:41.0146 0180 NDIS (1df7f42665c94b825322fae71721130d) C:\WINDOWS\system32\drivers\NDIS.sys

2011/06/17 19:24:41.0266 0180 NdisIP (7ff1f1fd8609c149aa432f95a8163d97) C:\WINDOWS\system32\DRIVERS\NdisIP.sys

2011/06/17 19:24:41.0376 0180 NdisTapi (1ab3d00c991ab086e69db84b6c0ed78f) C:\WINDOWS\system32\DRIVERS\ndistapi.sys

2011/06/17 19:24:41.0487 0180 Ndisuio (f927a4434c5028758a842943ef1a3849) C:\WINDOWS\system32\DRIVERS\ndisuio.sys

2011/06/17 19:24:41.0617 0180 NdisWan (edc1531a49c80614b2cfda43ca8659ab) C:\WINDOWS\system32\DRIVERS\ndiswan.sys

2011/06/17 19:24:41.0747 0180 NDProxy (9282bd12dfb069d3889eb3fcc1000a9b) C:\WINDOWS\system32\drivers\NDProxy.sys

2011/06/17 19:24:41.0857 0180 NetBIOS (5d81cf9a2f1a3a756b66cf684911cdf0) C:\WINDOWS\system32\DRIVERS\netbios.sys

2011/06/17 19:24:41.0997 0180 NetBT (74b2b2f5bea5e9a3dc021d685551bd3d) C:\WINDOWS\system32\DRIVERS\netbt.sys

2011/06/17 19:24:42.0378 0180 Npfs (3182d64ae053d6fb034f44b6def8034a) C:\WINDOWS\system32\drivers\Npfs.sys

2011/06/17 19:24:42.0538 0180 Ntfs (78a08dd6a8d65e697c18e1db01c5cdca) C:\WINDOWS\system32\drivers\Ntfs.sys

2011/06/17 19:24:42.0789 0180 Null (73c1e1f395918bc2c6dd67af7591a3ad) C:\WINDOWS\system32\drivers\Null.sys

2011/06/17 19:24:42.0959 0180 nv (2b298519edbfcf451d43e0f1e8f1006d) C:\WINDOWS\system32\DRIVERS\nv4_mini.sys

2011/06/17 19:24:43.0079 0180 NwlnkFlt (b305f3fad35083837ef46a0bbce2fc57) C:\WINDOWS\system32\DRIVERS\nwlnkflt.sys

2011/06/17 19:24:43.0169 0180 NwlnkFwd (c99b3415198d1aab7227f2c88fd664b9) C:\WINDOWS\system32\DRIVERS\nwlnkfwd.sys

2011/06/17 19:24:43.0239 0180 Parport (5575faf8f97ce5e713d108c2a58d7c7c) C:\WINDOWS\system32\DRIVERS\parport.sys

2011/06/17 19:24:43.0359 0180 PartMgr (beb3ba25197665d82ec7065b724171c6) C:\WINDOWS\system32\drivers\PartMgr.sys

2011/06/17 19:24:43.0459 0180 ParVdm (70e98b3fd8e963a6a46a2e6247e0bea1) C:\WINDOWS\system32\drivers\ParVdm.sys

2011/06/17 19:24:43.0520 0180 PCI (a219903ccf74233761d92bef471a07b1) C:\WINDOWS\system32\DRIVERS\pci.sys

2011/06/17 19:24:43.0770 0180 PCIIde (ccf5f451bb1a5a2a522a76e670000ff0) C:\WINDOWS\system32\drivers\PCIIde.sys

2011/06/17 19:24:43.0910 0180 Pcmcia (9e89ef60e9ee05e3f2eef2da7397f1c1) C:\WINDOWS\system32\drivers\Pcmcia.sys

2011/06/17 19:24:45.0022 0180 PID_PEPI (0da6c5e0c8da6cebe52daacfe7ae9de6) C:\WINDOWS\system32\DRIVERS\LV302V32.SYS

2011/06/17 19:24:45.0142 0180 PnP680r (a1d7a9214b71ebbb6f31cb84aac15525) C:\WINDOWS\system32\DRIVERS\pnp680r.sys

2011/06/17 19:24:45.0302 0180 PptpMiniport (efeec01b1d3cf84f16ddd24d9d9d8f99) C:\WINDOWS\system32\DRIVERS\raspptp.sys

2011/06/17 19:24:45.0482 0180 PSched (09298ec810b07e5d582cb3a3f9255424) C:\WINDOWS\system32\DRIVERS\psched.sys

2011/06/17 19:24:45.0613 0180 Ptilink (80d317bd1c3dbc5d4fe7b1678c60cadd) C:\WINDOWS\system32\DRIVERS\ptilink.sys

2011/06/17 19:24:46.0253 0180 RasAcd (fe0d99d6f31e4fad8159f690d68ded9c) C:\WINDOWS\system32\DRIVERS\rasacd.sys

2011/06/17 19:24:46.0444 0180 Rasl2tp (11b4a627bc9614b885c4969bfa5ff8a6) C:\WINDOWS\system32\DRIVERS\rasl2tp.sys

2011/06/17 19:24:46.0564 0180 RasPppoe (5bc962f2654137c9909c3d4603587dee) C:\WINDOWS\system32\DRIVERS\raspppoe.sys

2011/06/17 19:24:46.0724 0180 Raspti (fdbb1d60066fcfbb7452fd8f9829b242) C:\WINDOWS\system32\DRIVERS\raspti.sys

2011/06/17 19:24:46.0854 0180 Rdbss (7ad224ad1a1437fe28d89cf22b17780a) C:\WINDOWS\system32\DRIVERS\rdbss.sys

2011/06/17 19:24:46.0985 0180 RDPCDD (4912d5b403614ce99c28420f75353332) C:\WINDOWS\system32\DRIVERS\RDPCDD.sys

2011/06/17 19:24:47.0135 0180 rdpdr (15cabd0f7c00c47c70124907916af3f1) C:\WINDOWS\system32\DRIVERS\rdpdr.sys

2011/06/17 19:24:47.0325 0180 RDPWD (6728e45b66f93c08f11de2e316fc70dd) C:\WINDOWS\system32\drivers\RDPWD.sys

2011/06/17 19:24:47.0435 0180 redbook (f828dd7e1419b6653894a8f97a0094c5) C:\WINDOWS\system32\DRIVERS\redbook.sys

2011/06/17 19:24:47.0766 0180 s1018bus (1c5c2cb892553d2cf3f45a4bb323fcd6) C:\WINDOWS\system32\DRIVERS\s1018bus.sys

2011/06/17 19:24:47.0856 0180 s1018mdfl (38f5ea219593f19b6b3a1b9c169e3b61) C:\WINDOWS\system32\DRIVERS\s1018mdfl.sys

2011/06/17 19:24:47.0926 0180 s1018mdm (666af6b64fc7df92d3ca4819ea91631d) C:\WINDOWS\system32\DRIVERS\s1018mdm.sys

2011/06/17 19:24:48.0026 0180 s1018mgmt (f4ceda6e2ddff2af8bd745615a7ca9c0) C:\WINDOWS\system32\DRIVERS\s1018mgmt.sys

2011/06/17 19:24:48.0096 0180 s1018nd5 (3622d9ff2253dcbe885b10736609a4ca) C:\WINDOWS\system32\DRIVERS\s1018nd5.sys

2011/06/17 19:24:48.0186 0180 s1018obex (49431efda842b474531c29ffae9f5d09) C:\WINDOWS\system32\DRIVERS\s1018obex.sys

2011/06/17 19:24:48.0296 0180 s1018unic (ac6b514cb4474f4c867d7cdc9cd54f05) C:\WINDOWS\system32\DRIVERS\s1018unic.sys

2011/06/17 19:24:48.0497 0180 Secdrv (90a3935d05b494a5a39d37e71f09a677) C:\WINDOWS\system32\DRIVERS\secdrv.sys

2011/06/17 19:24:48.0667 0180 seehcri (e5b56569a9f79b70314fede6c953641e) C:\WINDOWS\system32\DRIVERS\seehcri.sys

2011/06/17 19:24:48.0797 0180 serenum (0f29512ccd6bead730039fb4bd2c85ce) C:\WINDOWS\system32\DRIVERS\serenum.sys

2011/06/17 19:24:48.0917 0180 Serial (cca207a8896d4c6a0c9ce29a4ae411a7) C:\WINDOWS\system32\DRIVERS\serial.sys

2011/06/17 19:24:49.0178 0180 Sfloppy (8e6b8c671615d126fdc553d1e2de5562) C:\WINDOWS\system32\drivers\Sfloppy.sys

2011/06/17 19:24:49.0378 0180 Si3112 (2525f35d0a0e94bb0ca7b4b68117b453) C:\WINDOWS\system32\drivers\Si3112.sys

2011/06/17 19:24:49.0448 0180 Si3112r (ec2b7c23fb561a52904571439ddbab78) C:\WINDOWS\system32\DRIVERS\SI3112r.sys

2011/06/17 19:24:49.0538 0180 Si3114r5 (87d406c592327ded095ff314427a4fa7) C:\WINDOWS\system32\drivers\Si3114r5.sys

2011/06/17 19:24:49.0608 0180 Si3124 (505c167be0bc7173c9095ca9b7b346d9) C:\WINDOWS\system32\drivers\Si3124.sys

2011/06/17 19:24:49.0708 0180 Si3132 (0b9b5c6df6226497ef4819b6e1b2efd5) C:\WINDOWS\system32\drivers\Si3132.sys

2011/06/17 19:24:49.0809 0180 Si3132r5 (f6dd3f9474afd65acd4861f57d40b8ab) C:\WINDOWS\system32\drivers\Si3132r5.sys

2011/06/17 19:24:49.0879 0180 SiFilter (ab668c54e365c98f775c8024660c9719) C:\WINDOWS\system32\DRIVERS\SiWinAcc.sys

2011/06/17 19:24:50.0019 0180 SISAGP (61ca562def09a782d26b3e7edec5369a) C:\WINDOWS\system32\DRIVERS\SISAGPX.sys

2011/06/17 19:24:50.0089 0180 SiSide (b4485881bd8aed9b157a2e6cf43c2d51) C:\WINDOWS\system32\DRIVERS\siside.sys

2011/06/17 19:24:50.0249 0180 SISNIC (8204c49cde112f7b9c2f15707fe2cc5a) C:\WINDOWS\system32\DRIVERS\sisnic.sys

2011/06/17 19:24:50.0379 0180 SLIP (866d538ebe33709a5c9f5c62b73b7d14) C:\WINDOWS\system32\DRIVERS\SLIP.sys

2011/06/17 19:24:50.0730 0180 splitter (ab8b92451ecb048a4d1de7c3ffcb4a9f) C:\WINDOWS\system32\drivers\splitter.sys

2011/06/17 19:24:50.0890 0180 sr (76bb022c2fb6902fd5bdd4f78fc13a5d) C:\WINDOWS\system32\DRIVERS\sr.sys

2011/06/17 19:24:51.0080 0180 Srv (47ddfc2f003f7f9f0592c6874962a2e7) C:\WINDOWS\system32\DRIVERS\srv.sys

2011/06/17 19:24:51.0291 0180 streamip (77813007ba6265c4b6098187e6ed79d2) C:\WINDOWS\system32\DRIVERS\StreamIP.sys

2011/06/17 19:24:51.0411 0180 swenum (3941d127aef12e93addf6fe6ee027e0f) C:\WINDOWS\system32\DRIVERS\swenum.sys

2011/06/17 19:24:51.0541 0180 swmidi (8ce882bcc6cf8a62f2b2323d95cb3d01) C:\WINDOWS\system32\drivers\swmidi.sys

2011/06/17 19:24:52.0122 0180 sysaudio (8b83f3ed0f1688b4958f77cd6d2bf290) C:\WINDOWS\system32\drivers\sysaudio.sys

2011/06/17 19:24:52.0362 0180 Tcpip (9aefa14bd6b182d61e3119fa5f436d3d) C:\WINDOWS\system32\DRIVERS\tcpip.sys

2011/06/17 19:24:52.0452 0180 TDPIPE (6471a66807f5e104e4885f5b67349397) C:\WINDOWS\system32\drivers\TDPIPE.sys

2011/06/17 19:24:52.0512 0180 TDTCP (c56b6d0402371cf3700eb322ef3aaf61) C:\WINDOWS\system32\drivers\TDTCP.sys

2011/06/17 19:24:52.0623 0180 TermDD (88155247177638048422893737429d9e) C:\WINDOWS\system32\DRIVERS\termdd.sys

2011/06/17 19:24:53.0063 0180 Udfs (5787b80c2e3c5e2f56c2a233d91fa2c9) C:\WINDOWS\system32\drivers\Udfs.sys

2011/06/17 19:24:53.0324 0180 Update (402ddc88356b1bac0ee3dd1580c76a31) C:\WINDOWS\system32\DRIVERS\update.sys

2011/06/17 19:24:53.0564 0180 usbaudio (e919708db44ed8543a7c017953148330) C:\WINDOWS\system32\drivers\usbaudio.sys

2011/06/17 19:24:53.0634 0180 usbccgp (173f317ce0db8e21322e71b7e60a27e8) C:\WINDOWS\system32\DRIVERS\usbccgp.sys

2011/06/17 19:24:53.0724 0180 usbehci (65dcf09d0e37d4c6b11b5b0b76d470a7) C:\WINDOWS\system32\DRIVERS\usbehci.sys

2011/06/17 19:24:53.0774 0180 usbhub (1ab3cdde553b6e064d2e754efe20285c) C:\WINDOWS\system32\DRIVERS\usbhub.sys

2011/06/17 19:24:53.0854 0180 usbohci (0daecce65366ea32b162f85f07c6753b) C:\WINDOWS\system32\DRIVERS\usbohci.sys

2011/06/17 19:24:54.0005 0180 usbscan (a0b8cf9deb1184fbdd20784a58fa75d4) C:\WINDOWS\system32\DRIVERS\usbscan.sys

2011/06/17 19:24:54.0085 0180 USBSTOR (a32426d9b14a089eaa1d922e0c5801a9) C:\WINDOWS\system32\DRIVERS\USBSTOR.SYS

2011/06/17 19:24:54.0185 0180 VgaSave (0d3a8fafceacd8b7625cd549757a7df1) C:\WINDOWS\System32\drivers\vga.sys

2011/06/17 19:24:54.0445 0180 vmm (817da66b1b889fad1dbf669e0e2f3228) C:\WINDOWS\system32\Drivers\vmm.sys

2011/06/17 19:24:54.0505 0180 VolSnap (4c8fcb5cc53aab716d810740fe59d025) C:\WINDOWS\system32\drivers\VolSnap.sys

2011/06/17 19:24:54.0575 0180 VPCNetS2 (2abe8281db609d8bb1bd1b2f93800d5f) C:\WINDOWS\system32\DRIVERS\VMNetSrv.sys

2011/06/17 19:24:54.0746 0180 Wanarp (e20b95baedb550f32dd489265c1da1f6) C:\WINDOWS\system32\DRIVERS\wanarp.sys

2011/06/17 19:24:54.0956 0180 wdmaud (6768acf64b18196494413695f0c3a00f) C:\WINDOWS\system32\drivers\wdmaud.sys

2011/06/17 19:24:55.0527 0180 WpdUsb (cf4def1bf66f06964dc0d91844239104) C:\WINDOWS\system32\DRIVERS\wpdusb.sys

2011/06/17 19:24:55.0757 0180 WSTCODEC (c98b39829c2bbd34e454150633c62c78) C:\WINDOWS\system32\DRIVERS\WSTCODEC.SYS

2011/06/17 19:24:55.0937 0180 WudfPf (f15feafffbb3644ccc80c5da584e6311) C:\WINDOWS\system32\DRIVERS\WudfPf.sys

2011/06/17 19:24:56.0078 0180 WudfRd (28b524262bce6de1f7ef9f510ba3985b) C:\WINDOWS\system32\DRIVERS\wudfrd.sys

2011/06/17 19:24:56.0418 0180 MBR (0x1B8) (8f558eb6672622401da993e1e865c861) \Device\Harddisk0\DR0

2011/06/17 19:24:57.0199 0180 ================================================================================

2011/06/17 19:24:57.0199 0180 Scan finished

2011/06/17 19:24:57.0199 0180 ================================================================================

2011/06/17 19:24:57.0259 1244 Detected object count: 0

2011/06/17 19:24:57.0259 1244 Actual detected object count: 0

Link to post
Share on other sites

Vista and Windows 7 users:

1. These tools MUST be run from the executable. (.exe) every time you run them

2. With Admin Rights (Right click, choose "Run as Administrator")

Download ComboFix from one of these locations:

Link 1

Link 2 If using this link, Right Click and select Save As.

* IMPORTANT !!! Save ComboFix.exe to your Desktop

  • Disable your AntiVirus and AntiSpyware applications, usually via a right click on the System Tray icon. They may otherwise interfere with our tools. Note: If you are having difficulty properly disabling your protective programs, or are unsure as to what programs need to be disabled, please refer to the information available through this link : Protective Programs
  • Double click on ComboFix.exe & follow the prompts.
    Notes: Combofix will run without the Recovery Console installed. Skip the Recovery Console part if you're running Vista or Windows 7.
    Note: If you have XP SP3, use the XP SP2 package.
    If Vista or Windows 7, skip the Recovery Console part
  • As part of it's process, ComboFix will check to see if the Microsoft Windows Recovery Console is installed. With malware infections being as they are today, it's strongly recommended to have this pre-installed on your machine before doing any malware removal. It will allow you to boot up into a special recovery/repair mode that will allow us to more easily help you should your computer have a problem after an attempted removal of malware.
  • Follow the prompts to allow ComboFix to download and install the Microsoft Windows Recovery Console, and when prompted, agree to the End-User License Agreement to install the Microsoft Windows Recovery Console.

**Please note: If the Microsoft Windows Recovery Console is already installed, ComboFix will continue it's malware removal procedures.

RC1.png

Once the Microsoft Windows Recovery Console is installed using ComboFix, you should see the following message:

RC2-1.png

Click on Yes, to continue scanning for malware.

When finished, it shall produce a log for you. Please include the C:\ComboFix.txt using Copy / Paste in your next reply.

Notes:

1.Do not mouse-click Combofix's window while it is running. That may cause it to stall.

2. ComboFix may reset a number of Internet Explorer's settings, including making I-E the default browser.

3. Combofix prevents autorun of ALL CD, floppy and USB devices to assist with malware removal & increase security. If this is an issue or makes it difficult for you -- please tell your helper.

4. CF disconnects your machine from the internet. The connection is automatically restored before CF completes its run. If CF runs into difficulty and terminates prematurely, the connection can be manually restored by restarting your machine.

Give it atleast 20-30 minutes to finish if needed.

Please do not attach the scan results from Combofx. Use copy/paste.

Also please describe how your computer behaves at the moment.

Link to post
Share on other sites

I've done several searches with both Firefox and IE, so far so good, no redirects. If I'm finally free of this infection, is there any way to secure my computer won't get this again? Now I'm paranoid about searching the internet.

Here is the ComboFix log. I already had Windows Recovery Console installed so the installation it did I suppose was an update.

ComboFix 11-06-17.04 - Kevin 000 06/17/2011 20:32:36.1.1 - x86

Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.2047.1420 [GMT -4:00]

Running from: c:\documents and settings\Kevin 000\Desktop\ComboFix.exe

.

.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))

.

.

c:\documents and settings\Kevin 000\Favorites\Thumbs.db

c:\documents and settings\Kevin User\Application Data\Mozilla\Firefox\Profiles\5bdlj7a1.default\extensions\{f123029d-95a8-4698-9d58-5533a68b2426}

c:\documents and settings\Kevin User\Application Data\Mozilla\Firefox\Profiles\5bdlj7a1.default\extensions\{f123029d-95a8-4698-9d58-5533a68b2426}\chrome.manifest

c:\documents and settings\Kevin User\Application Data\Mozilla\Firefox\Profiles\5bdlj7a1.default\extensions\{f123029d-95a8-4698-9d58-5533a68b2426}\chrome\xulcache.jar

c:\documents and settings\Kevin User\Application Data\Mozilla\Firefox\Profiles\5bdlj7a1.default\extensions\{f123029d-95a8-4698-9d58-5533a68b2426}\defaults\preferences\xulcache.js

c:\documents and settings\Kevin User\Application Data\Mozilla\Firefox\Profiles\5bdlj7a1.default\extensions\{f123029d-95a8-4698-9d58-5533a68b2426}\install.rdf

c:\documents and settings\Kevin User\Application Data\Mozilla\Firefox\Profiles\7sh805tf.default\extensions\{f123029d-95a8-4698-9d58-5533a68b2426}

c:\documents and settings\Kevin User\Application Data\Mozilla\Firefox\Profiles\7sh805tf.default\extensions\{f123029d-95a8-4698-9d58-5533a68b2426}\chrome.manifest

c:\documents and settings\Kevin User\Application Data\Mozilla\Firefox\Profiles\7sh805tf.default\extensions\{f123029d-95a8-4698-9d58-5533a68b2426}\chrome\xulcache.jar

c:\documents and settings\Kevin User\Application Data\Mozilla\Firefox\Profiles\7sh805tf.default\extensions\{f123029d-95a8-4698-9d58-5533a68b2426}\defaults\preferences\xulcache.js

c:\documents and settings\Kevin User\Application Data\Mozilla\Firefox\Profiles\7sh805tf.default\extensions\{f123029d-95a8-4698-9d58-5533a68b2426}\install.rdf

c:\documents and settings\Kevin User\Favorites\Thumbs.db

c:\documents and settings\Kevin User\WINDOWS

c:\windows\system32\Cache

.

.

((((((((((((((((((((((((( Files Created from 2011-05-18 to 2011-06-18 )))))))))))))))))))))))))))))))

.

.

2011-06-17 15:08 . 2011-06-17 15:08 -------- d-----w- c:\program files\ESET

2011-06-16 17:42 . 2011-06-16 17:42 -------- d-----w- c:\program files\7-Zip

2011-06-14 21:14 . 2011-06-14 21:14 0 ---ha-w- c:\documents and settings\Kevin 000\nwtlfurqwj.tmp

2011-06-14 19:59 . 2011-06-14 19:59 -------- d-----w- c:\program files\Common Files\Java

2011-06-13 13:47 . 2011-06-13 17:14 -------- d-----w- c:\program files\Rhinoceros

2011-06-13 13:46 . 2011-06-13 13:46 0 ---ha-w- c:\documents and settings\Kevin User\nwtlfurqwj.tmp

2011-06-09 21:05 . 2011-06-09 21:05 121464 ----a-w- c:\windows\system32\drivers\AnyDVD.sys

2011-06-07 16:35 . 2011-06-07 16:35 103864 ----a-w- c:\program files\Mozilla Firefox\plugins\nppdf32.dll

2011-06-07 16:35 . 2011-06-07 16:35 103864 ----a-w- c:\program files\Internet Explorer\Plugins\nppdf32.dll

2011-05-30 22:44 . 2011-05-30 22:44 164880 ---ha-w- c:\documents and settings\Kevin User\Application Data\Microsoft\Virtual PC\VPCKeyboard.dll

2011-05-28 15:04 . 2011-05-28 15:04 -------- d-----w- c:\documents and settings\Kevin User\Local Settings\Application Data\Help

.

.

.

(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))

.

2011-06-16 01:02 . 2011-05-16 18:09 404640 ----a-w- c:\windows\system32\FlashPlayerCPLApp.cpl

2011-05-30 23:06 . 2011-05-15 00:13 164880 ---ha-w- c:\documents and settings\Kevin 000\Application Data\Microsoft\Virtual PC\VPCKeyboard.dll

2011-05-29 13:11 . 2010-06-14 13:46 39984 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys

2011-05-29 13:11 . 2010-06-14 13:45 22712 ----a-w- c:\windows\system32\drivers\mbam.sys

2011-05-04 08:52 . 2010-06-14 14:26 472808 ----a-w- c:\windows\system32\deployJava1.dll

2011-05-04 06:25 . 2010-06-20 21:32 73728 ----a-w- c:\windows\system32\javacpl.cpl

2011-05-02 15:31 . 2010-06-13 01:33 692736 ----a-w- c:\windows\system32\inetcomm.dll

2011-04-29 16:19 . 2008-04-14 04:47 456320 ----a-w- c:\windows\system32\drivers\mrxsmb.sys

2011-04-25 16:11 . 2008-04-14 09:42 916480 ----a-w- c:\windows\system32\wininet.dll

2011-04-25 16:11 . 2008-04-14 09:42 1469440 ------w- c:\windows\system32\inetcpl.cpl

2011-04-25 16:11 . 2008-04-14 09:41 43520 ----a-w- c:\windows\system32\licmgr10.dll

2011-04-25 12:01 . 2008-04-14 04:07 385024 ------w- c:\windows\system32\html.iec

2011-04-21 13:37 . 2008-04-14 04:47 105472 ----a-w- c:\windows\system32\drivers\mup.sys

2011-04-16 21:40 . 2011-04-16 21:40 229224 ------w- c:\windows\system32\drivers\VMM.sys

2011-05-15 00:13 . 2011-05-15 00:13 142296 ------w- c:\program files\mozilla firefox\components\browsercomps.dll

.

.

------- Sigcheck -------

Note: Unsigned files aren't necessarily malware.

.

[-] 2010-06-12 . 362BC5AF8EAF712832C58CC13AE05750 . 1614848 . . [5.1.2600.5512] . . c:\windows\system32\sfcfiles.dll

.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))

.

.

*Note* empty entries & legit default entries are not shown

REGEDIT4

.

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]

"AnyDVD"="c:\program files\SlySoft\AnyDVD\AnyDVDtray.exe" [2011-06-17 5140088]

"Sony Ericsson PC Companion"="c:\program files\Sony Ericsson\Sony Ericsson PC Companion\PCCompanion.exe" [2011-05-23 431616]

"SpybotSD TeaTimer"="c:\program files\Spybot - Search & Destroy\TeaTimer.exe" [2009-03-05 2260480]

.

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]

"IMJPMIG8.1"="c:\windows\IME\imjp8_1\IMJPMIG.EXE" [2008-04-14 208952]

"PHIME2002ASync"="c:\windows\system32\IME\TINTLGNT\TINTSETP.EXE" [2008-04-14 455168]

"PHIME2002A"="c:\windows\system32\IME\TINTLGNT\TINTSETP.EXE" [2008-04-14 455168]

"SoundMan"="SOUNDMAN.EXE" [2004-12-22 77824]

"NeroFilterCheck"="c:\windows\system32\NeroCheck.exe" [2006-01-12 155648]

"Adobe Reader Speed Launcher"="c:\program files\Adobe\Reader 9.0\Reader\Reader_sl.exe" [2011-06-08 37296]

"Adobe ARM"="c:\program files\Common Files\Adobe\ARM\1.0\AdobeARM.exe" [2011-03-30 937920]

"iTunesHelper"="c:\program files\iTunes\iTunesHelper.exe" [2011-03-07 421160]

"SunJavaUpdateSched"="c:\program files\Common Files\Java\Java Update\jusched.exe" [2011-04-08 254696]

.

[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\RunOnce]

"_nltide_3"="advpack.dll" [2009-03-08 128512]

.

c:\documents and settings\Kevin User\Start Menu\Programs\Startup\

Shortcut to AnyDVD.exe.lnk - c:\program files\SlySoft\AnyDVD\AnyDVD.exe [2011-6-17 93816]

Shortcut to taskmgr.exe.lnk - c:\windows\system32\taskmgr.exe [2008-4-14 135680]

.

c:\documents and settings\Kevin 000\Start Menu\Programs\Startup\

taskmgr.exe.lnk - c:\windows\system32\taskmgr.exe [2008-4-14 135680]

.

c:\documents and settings\All Users\Start Menu\Programs\Startup\

Microsoft Office.lnk - c:\program files\Microsoft Office\Office10\OSA.EXE [2001-2-13 83360]

.

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\system]

"DisableCAD"= 1 (0x1)

.

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]

"%windir%\\Network Diagnostic\\xpnetdiag.exe"=

"%windir%\\system32\\sessmgr.exe"=

"c:\\Program Files\\Skype\\Plugin Manager\\skypePM.exe"=

"c:\\Program Files\\Yahoo!\\Messenger\\YahooMessenger.exe"=

"c:\\Program Files\\Sony Ericsson\\Update Service\\Update Service.exe"=

"c:\\Program Files\\Skype\\Phone\\Skype.exe"=

"c:\\Program Files\\Windows Live\\Messenger\\wlcsdk.exe"=

"c:\\Program Files\\Windows Live\\Messenger\\msnmsgr.exe"=

"c:\\Program Files\\iTunes\\iTunes.exe"=

"c:\\Program Files\\Bonjour\\mDNSResponder.exe"=

.

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\GloballyOpenPorts\List]

"20:TCP"= 20:TCP:*:Disabled:FTP DATA -- CUSTOM

"2400:TCP"= 2400:TCP:FTP -- TRANSFER

"3389:TCP"= 3389:TCP:@xpsp2res.dll,-22009

.

R0 Si3112r;Silicon Image SiI 3512 SATARaid Controller;c:\windows\system32\drivers\SI3112r.sys [6/11/2010 10:10 PM 110128]

R0 Si3124;Si3124;c:\windows\system32\drivers\si3124.sys [6/11/2010 10:10 PM 76208]

R3 seehcri;Sony Ericsson seehcri Device Driver;c:\windows\system32\drivers\seehcri.sys [9/5/2010 1:59 PM 27632]

S3 s1018bus;Sony Ericsson Device 1018 driver (WDM);c:\windows\system32\drivers\s1018bus.sys [9/5/2010 11:25 AM 86824]

S3 s1018mdfl;Sony Ericsson Device 1018 USB WMC Modem Filter;c:\windows\system32\drivers\s1018mdfl.sys [9/5/2010 11:25 AM 15016]

S3 s1018mdm;Sony Ericsson Device 1018 USB WMC Modem Driver;c:\windows\system32\drivers\s1018mdm.sys [9/5/2010 11:25 AM 114728]

S3 s1018mgmt;Sony Ericsson Device 1018 USB WMC Device Management Drivers (WDM);c:\windows\system32\drivers\s1018mgmt.sys [9/5/2010 11:25 AM 106208]

S3 s1018nd5;Sony Ericsson Device 1018 USB Ethernet Emulation (NDIS);c:\windows\system32\drivers\s1018nd5.sys [9/5/2010 11:25 AM 26024]

S3 s1018obex;Sony Ericsson Device 1018 USB WMC OBEX Interface;c:\windows\system32\drivers\s1018obex.sys [9/5/2010 11:25 AM 104744]

S3 s1018unic;Sony Ericsson Device 1018 USB Ethernet Emulation (WDM);c:\windows\system32\drivers\s1018unic.sys [9/5/2010 11:25 AM 109864]

S3 Sony Ericsson PCCompanion;Sony Ericsson PCCompanion;c:\program files\Sony Ericsson\Sony Ericsson PC Companion\PCCService.exe [4/13/2011 7:33 PM 152064]

.

--- Other Services/Drivers In Memory ---

.

*NewlyCreated* - 55204337

*Deregistered* - 55204337

*Deregistered* - MBAMSwissArmy

.

Contents of the 'Scheduled Tasks' folder

.

2011-06-17 c:\windows\Tasks\Differential Backup.job

- c:\windows\system32\ntbackup.exe [2008-04-14 09:42]

.

2011-06-10 c:\windows\Tasks\Full Monthly Backup.job

- c:\windows\system32\ntbackup.exe [2008-04-14 09:42]

.

2011-06-18 c:\windows\Tasks\User_Feed_Synchronization-{5B567386-B05B-4C3E-9DB0-6585B45B5769}.job

- c:\windows\system32\msfeedssync.exe [2009-03-08 08:31]

.

2011-06-18 c:\windows\Tasks\User_Feed_Synchronization-{F3C8B403-A44A-482E-B712-EB615BCE52D9}.job

- c:\windows\system32\msfeedssync.exe [2009-03-08 08:31]

.

.

------- Supplementary Scan -------

.

uStart Page = hxxp://www.google.com/

uInternet Settings,ProxyOverride = *.local

Trusted Zone: aol.com\free

TCP: DhcpNameServer = 192.168.1.254

FF - ProfilePath - c:\documents and settings\Kevin 000\Application Data\Mozilla\Firefox\Profiles\egjwi365.default\

FF - prefs.js: browser.startup.homepage - hxxp://www.google.com

FF - prefs.js: network.proxy.type - 0

FF - user.js: yahoo.ytff.general.dontshowhpoffer - true

.

- - - - ORPHANS REMOVED - - - -

.

BHO-{0075484D-7C00-43F4-8D86-60487970CD58} - (no file)

BHO-{00D40175-80AF-4C99-A130-E6758F4F2FDd} - (no file)

BHO-{00EA909B-7C00-43F4-8D86-60487970CD58} - (no file)

BHO-{01A802EB-80AF-4C99-A130-E6758F4F2FDd} - (no file)

.

.

.

**************************************************************************

.

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net

Rootkit scan 2011-06-17 20:37

Windows 5.1.2600 Service Pack 3 NTFS

.

scanning hidden processes ...

.

scanning hidden autostart entries ...

.

scanning hidden files ...

.

scan completed successfully

hidden files: 0

.

**************************************************************************

.

Completion time: 2011-06-17 20:39:16

ComboFix-quarantined-files.txt 2011-06-18 00:39

.

Pre-Run: 432,127,713,280 bytes free

Post-Run: 432,081,330,176 bytes free

.

WindowsXP-KB310994-SP2-Pro-BootDisk-ENU.exe

[boot loader]

timeout=2

default=multi(0)disk(0)rdisk(0)partition(1)\WINDOWS

[operating systems]

c:\cmdcons\BOOTSECT.DAT="Microsoft Windows Recovery Console" /cmdcons

UnsupportedDebug="do not select this" /debug

multi(0)disk(0)rdisk(0)partition(1)\WINDOWS="Microsoft Windows XP Professional" /noexecute=optin /fastdetect

.

- - End Of File - - 197E4807270E05151DDAFAE09BCDB06E

Link to post
Share on other sites

Delete these two files if listed

c:\documents and settings\Kevin 000\nwtlfurqwj.tmp

c:\documents and settings\Kevin User\nwtlfurqwj.tmp

After the above:

Good job thumbup.gif

The following will implement some cleanup procedures as well as reset System Restore points:

For XP:

  • Click START run
  • Now type ComboFix /Uninstall in the runbox and click OK. Note the space between the X and the /, it needs to be there.

For Vista / Windows 7

  • Click START Search
  • Now type ComboFix /Uninstall in the runbox and click OK. Note the space between the X and the /, it needs to be there.

If you used DeFogger

To re-enable your Emulation drivers, double click DeFogger to run the tool.

  • The application window will appear
  • Click the Re-enable button to re-enable your CD Emulation drivers
  • Click Yes to continue
  • A 'Finished!' message will appear
  • Click OK
  • DeFogger will now ask to reboot the machine - click OK

IMPORTANT! If you receive an error message while running DeFogger, please post the log defogger_enable which will appear on your desktop.

Your Emulation drivers are now re-enabled.

Here's my usual all clean post

To be on the safe side, I would also change all my passwords.

This infection appears to have been cleaned, but as the malware could be configured to run any program a remote attacker requires, it's impossible to be 100% sure that any machine is clean.

Log looks good :D

  • Make your Internet Explorer more secure - This can be done by following these simple instructions:
    1. From within Internet Explorer click on the Tools menu and then click on Options.
    2. Click once on the Security tab
    3. Click once on the Internet icon so it becomes highlighted.
    4. Click once on the Custom Level button.
    5. Change the Download signed ActiveX controls to Prompt
    6. Change the Download unsigned ActiveX controls to Disable
    7. Change the Initialize and script ActiveX controls not marked as safe to Disable
    8. Change the Installation of desktop items to Prompt
    9. Change the Launching programs and files in an IFRAME to Prompt
    10. Change the Navigate sub-frames across different domains to Prompt
    11. When all these settings have been made, click on the OK button.
    12. If it prompts you as to whether or not you want to save the settings, press the Yes button.
    13. Next press the Apply button and then the OK to exit the Internet Properties page.

    [*]Update your AntiVirus Software - It is imperative that you update your Antivirus software at least once a week

    (Even more if you wish). If you do not update your antivirus software then it will not be able to catch any of the new variants that may come out.

    [*]Use a Firewall - I can not stress how important it is that you use a Firewall on your computer.

    Without a firewall your computer is succeptible to being hacked and taken over.

    I am very serious about this and see it happen almost every day with my clients.

    Simply using a Firewall in its default configuration can lower your risk greatly.

    [*]Using a secure browser plugin M86 SecureBrowsing makes it safe to search, surf and socialize online. This free browser plug-in displays security icons next to links on search engines and social networking sites like Facebook, Twitter and LinkedIn, so you'll know which pages are safe and which ones to avoid.

Link to post
Share on other sites

Thanks, for all your help. I will go through your list of suggestions. I'm running the Eset online scanner now and its still finding "JS/Agent.NDB.trojan Win32/TrojanDownloader.Tracur.F trojan". This same tool had already cleaned up a bunch of those. Is there a tool to find and remove this Tracur thing permanently or am I going to have to keep scanning?

I used to have Zone Alarm firewall, great product but would not work on my XP machine after they made some program changes. I've been trying to find something that works well with XP SP3. Any suggestions?

Link to post
Share on other sites

On the first Eset Online Scanner run there were 54 infected files, on the second run only 12 were spotted and I believe those were mostly all quarantined files that had not been deleted from the first run. I thought I selected the option to delete quarantined files. I deleted the quarantined group on a subsequent run. My most recent run on all drives shows NO infections so I think I'm completely clear now. I have also updated and run both Spybot and then Mbam. Both show no problems or infections. Now I'm looking for some firewall 30 day trials.

Here is a copy of one of the first Eset reports:

C:\Documents and Settings\User 000\Application Data\Mozilla\Firefox\Profiles\70zkf0hy.default\extensions\{f123029d-95a8-4698-9d58-5533a68b2426}\chrome.manifest Win32/TrojanDownloader.Tracur.F trojan cleaned by deleting - quarantined

C:\Documents and Settings\User 000\Application Data\Mozilla\Firefox\Profiles\70zkf0hy.default\extensions\{f123029d-95a8-4698-9d58-5533a68b2426}\chrome\xulcache.jar JS/Agent.NDB trojan deleted - quarantined

C:\Documents and Settings\User 000\Application Data\Mozilla\Firefox\Profiles\egjwi365.default\extensions\{f123029d-95a8-4698-9d58-5533a68b2426}\chrome.manifest Win32/TrojanDownloader.Tracur.F trojan cleaned by deleting - quarantined

C:\Documents and Settings\User 000\Application Data\Mozilla\Firefox\Profiles\egjwi365.default\extensions\{f123029d-95a8-4698-9d58-5533a68b2426}\chrome\xulcache.jar JS/Agent.NDB trojan deleted - quarantined

C:\Documents and Settings\User 000\Desktop\GooredFix Backups\C\Documents and Settings\User 000\Application Data\Mozilla\Firefox\Profiles\70zkf0hy.default\extensions\{8151581a-bab2-4829-acb3-ad977b5cc614}\chrome.manifest Win32/TrojanDownloader.Tracur.F trojan cleaned by deleting - quarantined

C:\Documents and Settings\User 000\Desktop\GooredFix Backups\C\Documents and Settings\User 000\Application Data\Mozilla\Firefox\Profiles\70zkf0hy.default\extensions\{8151581a-bab2-4829-acb3-ad977b5cc614}\chrome\xulcache.jar JS/Agent.NDB trojan deleted - quarantined

C:\Documents and Settings\User 000\Desktop\GooredFix Backups\C\Documents and Settings\User 000\Application Data\Mozilla\Firefox\Profiles\70zkf0hy.default\extensions\{81687237-d1d2-4b8a-871e-1f4e0a503e8e}\chrome.manifest Win32/TrojanDownloader.Tracur.F trojan cleaned by deleting - quarantined

C:\Documents and Settings\User 000\Desktop\GooredFix Backups\C\Documents and Settings\User 000\Application Data\Mozilla\Firefox\Profiles\70zkf0hy.default\extensions\{81687237-d1d2-4b8a-871e-1f4e0a503e8e}\chrome\xulcache.jar JS/Agent.NDB trojan deleted - quarantined

C:\Documents and Settings\User 000\Desktop\GooredFix Backups\C\Documents and Settings\User 000\Application Data\Mozilla\Firefox\Profiles\70zkf0hy.default\extensions\{8c4276bf-e0f1-4e28-8b59-4c74464e61bf}\chrome.manifest Win32/TrojanDownloader.Tracur.F trojan cleaned by deleting - quarantined

C:\Documents and Settings\User 000\Desktop\GooredFix Backups\C\Documents and Settings\User 000\Application Data\Mozilla\Firefox\Profiles\70zkf0hy.default\extensions\{8c4276bf-e0f1-4e28-8b59-4c74464e61bf}\chrome\xulcache.jar JS/Agent.NDB trojan deleted - quarantined

C:\Documents and Settings\User 000\Desktop\GooredFix Backups\C\Documents and Settings\User 000\Application Data\Mozilla\Firefox\Profiles\egjwi365.default\extensions\{8151581a-bab2-4829-acb3-ad977b5cc614}\chrome.manifest Win32/TrojanDownloader.Tracur.F trojan cleaned by deleting - quarantined

C:\Documents and Settings\User 000\Desktop\GooredFix Backups\C\Documents and Settings\User 000\Application Data\Mozilla\Firefox\Profiles\egjwi365.default\extensions\{8151581a-bab2-4829-acb3-ad977b5cc614}\chrome\xulcache.jar JS/Agent.NDB trojan deleted - quarantined

C:\Documents and Settings\User 000\Desktop\GooredFix Backups\C\Documents and Settings\User 000\Application Data\Mozilla\Firefox\Profiles\egjwi365.default\extensions\{81687237-d1d2-4b8a-871e-1f4e0a503e8e}\chrome.manifest Win32/TrojanDownloader.Tracur.F trojan cleaned by deleting - quarantined

C:\Documents and Settings\User 000\Desktop\GooredFix Backups\C\Documents and Settings\User 000\Application Data\Mozilla\Firefox\Profiles\egjwi365.default\extensions\{81687237-d1d2-4b8a-871e-1f4e0a503e8e}\chrome\xulcache.jar JS/Agent.NDB trojan deleted - quarantined

C:\Documents and Settings\User 000\Desktop\GooredFix Backups\C\Documents and Settings\User 000\Application Data\Mozilla\Firefox\Profiles\egjwi365.default\extensions\{8c4276bf-e0f1-4e28-8b59-4c74464e61bf}\chrome.manifest Win32/TrojanDownloader.Tracur.F trojan cleaned by deleting - quarantined

C:\Documents and Settings\User 000\Desktop\GooredFix Backups\C\Documents and Settings\User 000\Application Data\Mozilla\Firefox\Profiles\egjwi365.default\extensions\{8c4276bf-e0f1-4e28-8b59-4c74464e61bf}\chrome\xulcache.jar JS/Agent.NDB trojan deleted - quarantined

C:\Documents and Settings\User 2\Application Data\Mozilla\Firefox\Profiles\5bdlj7a1.default\extensions\{8151581a-bab2-4829-acb3-ad977b5cc614}\chrome.manifest Win32/TrojanDownloader.Tracur.F trojan cleaned by deleting - quarantined

C:\Documents and Settings\User 2\Application Data\Mozilla\Firefox\Profiles\5bdlj7a1.default\extensions\{8151581a-bab2-4829-acb3-ad977b5cc614}\chrome\xulcache.jar JS/Agent.NDB trojan deleted - quarantined

C:\Documents and Settings\User 2\Application Data\Mozilla\Firefox\Profiles\5bdlj7a1.default\extensions\{81687237-d1d2-4b8a-871e-1f4e0a503e8e}\chrome.manifest Win32/TrojanDownloader.Tracur.F trojan cleaned by deleting - quarantined

C:\Documents and Settings\User 2\Application Data\Mozilla\Firefox\Profiles\5bdlj7a1.default\extensions\{81687237-d1d2-4b8a-871e-1f4e0a503e8e}\chrome\xulcache.jar JS/Agent.NDB trojan deleted - quarantined

C:\Documents and Settings\User 2\Application Data\Mozilla\Firefox\Profiles\5bdlj7a1.default\extensions\{8c4276bf-e0f1-4e28-8b59-4c74464e61bf}\chrome.manifest Win32/TrojanDownloader.Tracur.F trojan cleaned by deleting - quarantined

C:\Documents and Settings\User 2\Application Data\Mozilla\Firefox\Profiles\5bdlj7a1.default\extensions\{8c4276bf-e0f1-4e28-8b59-4c74464e61bf}\chrome\xulcache.jar JS/Agent.NDB trojan deleted - quarantined

C:\Documents and Settings\User 2\Application Data\Mozilla\Firefox\Profiles\5bdlj7a1.default\extensions\{c04eaf6c-4823-4f53-9fec-f6839dcaf4db}\chrome.manifest Win32/TrojanDownloader.Tracur.F trojan cleaned by deleting - quarantined

C:\Documents and Settings\User 2\Application Data\Mozilla\Firefox\Profiles\5bdlj7a1.default\extensions\{c04eaf6c-4823-4f53-9fec-f6839dcaf4db}\chrome\xulcache.jar JS/Agent.NDB trojan deleted - quarantined

C:\Documents and Settings\User 2\Application Data\Mozilla\Firefox\Profiles\5bdlj7a1.default\extensions\{c8cc1583-fa2e-4d12-a85d-616b4f27e804}\chrome.manifest Win32/TrojanDownloader.Tracur.F trojan cleaned by deleting - quarantined

C:\Documents and Settings\User 2\Application Data\Mozilla\Firefox\Profiles\5bdlj7a1.default\extensions\{c8cc1583-fa2e-4d12-a85d-616b4f27e804}\chrome\xulcache.jar JS/Agent.NDB trojan deleted - quarantined

C:\Documents and Settings\User 2\Application Data\Mozilla\Firefox\Profiles\5bdlj7a1.default\extensions\{d601cbc4-84ac-4c4c-8127-8f8b45157245}\chrome.manifest Win32/TrojanDownloader.Tracur.F trojan cleaned by deleting - quarantined

C:\Documents and Settings\User 2\Application Data\Mozilla\Firefox\Profiles\5bdlj7a1.default\extensions\{d601cbc4-84ac-4c4c-8127-8f8b45157245}\chrome\xulcache.jar JS/Agent.NDB trojan deleted - quarantined

C:\Documents and Settings\User 2\Application Data\Mozilla\Firefox\Profiles\5bdlj7a1.default\extensions\{eada44b9-09c6-455c-bdc4-394c28c61ad1}\chrome.manifest Win32/TrojanDownloader.Tracur.F trojan cleaned by deleting - quarantined

C:\Documents and Settings\User 2\Application Data\Mozilla\Firefox\Profiles\5bdlj7a1.default\extensions\{eada44b9-09c6-455c-bdc4-394c28c61ad1}\chrome\xulcache.jar JS/Agent.NDB trojan deleted - quarantined

C:\Documents and Settings\User 2\Application Data\Mozilla\Firefox\Profiles\5bdlj7a1.default\extensions\{f123029d-95a8-4698-9d58-5533a68b2426}\chrome.manifest Win32/TrojanDownloader.Tracur.F trojan cleaned by deleting - quarantined

C:\Documents and Settings\User 2\Application Data\Mozilla\Firefox\Profiles\5bdlj7a1.default\extensions\{f123029d-95a8-4698-9d58-5533a68b2426}\chrome\xulcache.jar JS/Agent.NDB trojan deleted - quarantined

C:\Documents and Settings\User 2\Application Data\Mozilla\Firefox\Profiles\7sh805tf.default\extensions\{8151581a-bab2-4829-acb3-ad977b5cc614}\chrome.manifest Win32/TrojanDownloader.Tracur.F trojan cleaned by deleting - quarantined

C:\Documents and Settings\User 2\Application Data\Mozilla\Firefox\Profiles\7sh805tf.default\extensions\{8151581a-bab2-4829-acb3-ad977b5cc614}\chrome\xulcache.jar JS/Agent.NDB trojan deleted - quarantined

C:\Documents and Settings\User 2\Application Data\Mozilla\Firefox\Profiles\7sh805tf.default\extensions\{81687237-d1d2-4b8a-871e-1f4e0a503e8e}\chrome.manifest Win32/TrojanDownloader.Tracur.F trojan cleaned by deleting - quarantined

C:\Documents and Settings\User 2\Application Data\Mozilla\Firefox\Profiles\7sh805tf.default\extensions\{81687237-d1d2-4b8a-871e-1f4e0a503e8e}\chrome\xulcache.jar JS/Agent.NDB trojan deleted - quarantined

C:\Documents and Settings\User 2\Application Data\Mozilla\Firefox\Profiles\7sh805tf.default\extensions\{8c4276bf-e0f1-4e28-8b59-4c74464e61bf}\chrome.manifest Win32/TrojanDownloader.Tracur.F trojan cleaned by deleting - quarantined

C:\Documents and Settings\User 2\Application Data\Mozilla\Firefox\Profiles\7sh805tf.default\extensions\{8c4276bf-e0f1-4e28-8b59-4c74464e61bf}\chrome\xulcache.jar JS/Agent.NDB trojan deleted - quarantined

C:\Documents and Settings\User 2\Application Data\Mozilla\Firefox\Profiles\7sh805tf.default\extensions\{c04eaf6c-4823-4f53-9fec-f6839dcaf4db}\chrome.manifest Win32/TrojanDownloader.Tracur.F trojan cleaned by deleting - quarantined

C:\Documents and Settings\User 2\Application Data\Mozilla\Firefox\Profiles\7sh805tf.default\extensions\{c04eaf6c-4823-4f53-9fec-f6839dcaf4db}\chrome\xulcache.jar JS/Agent.NDB trojan deleted - quarantined

C:\Documents and Settings\User 2\Application Data\Mozilla\Firefox\Profiles\7sh805tf.default\extensions\{c8cc1583-fa2e-4d12-a85d-616b4f27e804}\chrome.manifest Win32/TrojanDownloader.Tracur.F trojan cleaned by deleting - quarantined

C:\Documents and Settings\User 2\Application Data\Mozilla\Firefox\Profiles\7sh805tf.default\extensions\{c8cc1583-fa2e-4d12-a85d-616b4f27e804}\chrome\xulcache.jar JS/Agent.NDB trojan deleted - quarantined

C:\Documents and Settings\User 2\Application Data\Mozilla\Firefox\Profiles\7sh805tf.default\extensions\{d601cbc4-84ac-4c4c-8127-8f8b45157245}\chrome.manifest Win32/TrojanDownloader.Tracur.F trojan cleaned by deleting - quarantined

C:\Documents and Settings\User 2\Application Data\Mozilla\Firefox\Profiles\7sh805tf.default\extensions\{d601cbc4-84ac-4c4c-8127-8f8b45157245}\chrome\xulcache.jar JS/Agent.NDB trojan deleted - quarantined

C:\Documents and Settings\User 2\Application Data\Mozilla\Firefox\Profiles\7sh805tf.default\extensions\{eada44b9-09c6-455c-bdc4-394c28c61ad1}\chrome.manifest Win32/TrojanDownloader.Tracur.F trojan cleaned by deleting - quarantined

C:\Documents and Settings\User 2\Application Data\Mozilla\Firefox\Profiles\7sh805tf.default\extensions\{eada44b9-09c6-455c-bdc4-394c28c61ad1}\chrome\xulcache.jar JS/Agent.NDB trojan deleted - quarantined

C:\Documents and Settings\User 2\Application Data\Mozilla\Firefox\Profiles\7sh805tf.default\extensions\{f123029d-95a8-4698-9d58-5533a68b2426}\chrome.manifest Win32/TrojanDownloader.Tracur.F trojan cleaned by deleting - quarantined

C:\Documents and Settings\User 2\Application Data\Mozilla\Firefox\Profiles\7sh805tf.default\extensions\{f123029d-95a8-4698-9d58-5533a68b2426}\chrome\xulcache.jar JS/Agent.NDB trojan deleted - quarantined

C:\Documents and Settings\User 2\My Documents\School\Schoolname\ICND1\ClassUtils\tftpd32.333\tftpd32.exe a variant of Win32/TFTPD32.A application cleaned by deleting - quarantined

C:\Documents and Settings\User 2\My Documents\School\Schoolname\ICND2\Tftpd32-3.29-setup.exe a variant of Win32/TFTPD32.A application deleted - quarantined

C:\Documents and Settings\User 2\My Documents\School\Schoolname\ICND2\tftpd32.323.zip a variant of Win32/TFTPD32.A application deleted - quarantined

C:\WINDOWS\system32\atrace32.dll a variant of Win32/Kryptik.NHY trojan cleaned by deleting (after the next restart) - quarantined

D:\Downloads\Nero\Nero 7 Ultra Full\Nero-7.10.1.0_all_update.exe Win32/Toolbar.AskSBar application deleted - quarantined

D:\Downloads\Nero\package 1\Nero-6.6.1.15d_wch.exe Win32/Toolbar.AskSBar application deleted - quarantined

Link to post
Share on other sites

Well I'm on the 30 day trial for Eset. Very expensive for a subscription. I'll try one of the free ones afterward. I'm looking for imaging software so next time I'll just drop a clean image on the drive and be done with it.

Thanks for all your help. I've done all the cleanup; run Spybot and ESET; wiped the free space on all drives with File Shredder and I have the registered version of Mbam now. After multiple scans with each, no problems are showing and no more redirects so I guess I'm good.

I'll consider the issue closed from here. Again, thanks very much for all your help.

Link to post
Share on other sites

Guest
This topic is now closed to further replies.
 Share

  • Recently Browsing   0 members

    • No registered users viewing this page.
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.