nuley Posted March 5, 2010 Posted March 5, 2010 Dear friends Once again I have a nasty virus which starts off with a 'scan' running of alleged Antivirus 2010 Security and picks up various viruses. It then hijacks the internet browser and nothing works. Virgin pc security has picked up Trojan.win32.Fraudpack.anqq and Win32inject.anny. I noticed a Browser choice shortcut icon on the desktop and have removed the exe from system and bin, and that's how I've managed to finally get here as we've not been able to access internet for a couple of days. But I expect it will come back! Please could you advise what next? Thanks very much for your valued (as ever!) help. Nuley Quote
Starbuck Posted March 6, 2010 Posted March 6, 2010 Hi nuley Step 1 Download Combofix from any of the links below. You must rename it before saving it. Save it to your desktop. Link 1 Link 2 http://i266.photobucket.com/albums/ii277/sUBs_/combofix/CF_download_FF.gif http://i266.photobucket.com/albums/ii277/sUBs_/combofix/CF_download_rename.gif This is an example, you may rename ComboFix to anything you want. Disable your AntiVirus and AntiSpyware applications, usually via a right click on the System Tray icon. They may otherwise interfere with the running of ComboFix. For more information read: How To Temporarily Disable Your Anti-virus, Firewall And Anti-malware Programs Then: Double click on Combo-Fix.exe & follow the prompts. As part of it's process, ComboFix will check to see if the Microsoft Windows Recovery Console is installed. With malware infections being as they are today, it's strongly recommended to have this pre-installed on your machine before doing any malware removal. It will allow you to boot up into a special recovery/repair mode that will allow us to more easily help you should your computer have a problem after an attempted removal of malware. If running Vista, you may not see this screen Follow the prompts to allow ComboFix to download and install the Microsoft Windows Recovery Console, and when prompted, agree to the End-User License Agreement to install the Microsoft Windows Recovery Console. **Please note: If the Microsoft Windows Recovery Console is already installed, ComboFix will continue it's malware removal procedures. http://img.photobucket.com/albums/v706/ried7/RcAuto1.gif Once the Microsoft Windows Recovery Console is installed using ComboFix, you should see the following message: http://img.photobucket.com/albums/v706/ried7/whatnext.png Click on Yes, to continue scanning for malware. Note: Do not mouseclick combofix's window while it's running. That may cause it to stall When finished, it shall produce a log for you. Please include the C:\ComboFix.txt in your next reply. Thanks Quote Member of:UNITE
nuley Posted March 6, 2010 Author Posted March 6, 2010 Thanks very much for this. I've saved Combo-Fix.exe to desktop as an application but when I try to open it, a dialog box pops up asking what application I want to use to open it with, as it seems to think it's a file. I resaved it and double checked it was saved as an application, but same problem occured. What should I do? Thanks again nuley Quote
Starbuck Posted March 6, 2010 Posted March 6, 2010 Right, it would seem that the malware has effected files with an .exe extension. This is becoming quite common. You could try altering the combofix extension to .com ( it should still run) but failing that Try this: Please download exeHelper to your desktop. If your AV program throws up a warning about the program, ignore the warning. Some AV's flag this program because of how it works... that's all. Double-click on exeHelper.com to run the fix. A black window should pop up, press any key to close once the fix is completed. Post the contents of exehelperlog.txt ( Will be created in the directory where you ran exeHelper.com and should open at the end of the scan) Note : If the window shows a message that says "Error deleting file", please re-run the program before posting a log - and post the two logs together ( they will both be in the one file ). Thanks Quote Member of:UNITE
nuley Posted March 7, 2010 Author Posted March 7, 2010 Thanks for this, combo-fix.com ran OK so I didn't have to do the exeHelper stage. It did query how to open ie.exe but it seemed to go away when I cancelled it. Here's the log: ComboFix 10-03-06.06 - John 07/03/2010 9:48.3.1 - x86 Microsoft Windows XP Home Edition 5.1.2600.3.1252.1.1033.18.751.426 [GMT 0:00] Running from: c:\documents and settings\John\Desktop\Combo-Fix.com AV: PCguard Anti-Virus *On-access scanning disabled* (Updated) {5B5A3BD7-8573-4672-AEA8-C9BB713B6755} FW: PCguard Firewall *disabled* {80593BF4-D969-4EC5-ADAE-A22F2DFC7A22} . ((((((((((((((((((((((((((((((((((((((( Other Deletions ))))))))))))))))))))))))))))))))))))))))))))))))) . c:\documents and settings\John\Application Data\wiaserva.log c:\documents and settings\John\Local Settings\Application Data\{4D05995A-1EB2-4DC9-A2FE-7E263FB17580} c:\documents and settings\John\Local Settings\Application Data\{4D05995A-1EB2-4DC9-A2FE-7E263FB17580}\chrome.manifest c:\documents and settings\John\Local Settings\Application Data\{4D05995A-1EB2-4DC9-A2FE-7E263FB17580}\chrome\content\_cfg.js c:\documents and settings\John\Local Settings\Application Data\{4D05995A-1EB2-4DC9-A2FE-7E263FB17580}\chrome\content\overlay.xul c:\documents and settings\John\Local Settings\Application Data\{4D05995A-1EB2-4DC9-A2FE-7E263FB17580}\install.rdf c:\documents and settings\John\Local Settings\Temporary Internet Files\Bola8LY7.jpg c:\documents and settings\John\Local Settings\Temporary Internet Files\NxKmx1pj.jpg c:\documents and settings\John\Local Settings\Temporary Internet Files\x0BaMJ.jpg c:\documents and settings\John\Local Settings\Temporary Internet Files\Y35b1.jpg c:\windows\msasds.dll c:\windows\system32\lowsec c:\windows\system32\lowsec\local.ds c:\windows\system32\lowsec\user.ds c:\windows\umotuqoleziba.dll . ((((((((((((((((((((((((( Files Created from 2010-02-07 to 2010-03-07 ))))))))))))))))))))))))))))))) . 2010-03-07 09:48 . 2010-03-07 09:48 12568 ----a-w- c:\windows\system32\drivers\PROCEXP113.SYS 2010-03-05 17:01 . 2010-03-07 09:39 120 ----a-w- c:\windows\Bmimu.dat 2010-03-05 17:01 . 2010-03-07 09:39 0 ----a-w- c:\windows\Bxelanulamo.bin 2010-02-26 16:52 . 2010-02-26 17:09 -------- d-----w- c:\documents and settings\John\Local Settings\Application Data\Temp 2010-02-13 13:22 . 2010-02-13 13:22 58552 ---ha-w- c:\windows\system32\mlfcache.dat 2010-02-07 13:52 . 2010-02-07 13:52 -------- d-----w- c:\documents and settings\NetworkService\Local Settings\Application Data\Google 2010-02-07 13:47 . 2010-02-07 13:47 -------- d-----w- c:\documents and settings\LocalService\Local Settings\Application Data\Google . (((((((((((((((((((((((((((((((((((((((( Find3M Report )))))))))))))))))))))))))))))))))))))))))))))))))))) . 2010-03-07 10:04 . 2009-07-20 09:04 36078368 --sha-w- c:\windows\system32\drivers\fidbox.dat 2010-03-07 10:03 . 2009-07-20 09:03 631584 --sha-w- c:\windows\system32\drivers\fidbox2.dat 2010-03-07 10:01 . 2009-07-20 09:03 61256 --sha-w- c:\windows\system32\drivers\fidbox2.idx 2010-03-07 10:01 . 2009-07-20 09:04 485216 --sha-w- c:\windows\system32\drivers\fidbox.idx 2010-02-13 11:29 . 2009-07-19 12:48 -------- d-----w- c:\program files\iTunes 2010-02-07 13:46 . 2008-09-16 14:34 -------- d-----w- c:\program files\Google 2010-01-19 20:00 . 2009-04-02 16:09 -------- d-----w- c:\program files\Microsoft Silverlight 2010-01-13 19:49 . 2010-01-13 19:49 -------- d-----w- c:\program files\Disney 2009-12-31 16:50 . 2002-08-27 11:43 353792 ----a-w- c:\windows\system32\drivers\srv.sys 2009-12-21 19:14 . 2004-01-08 15:23 916480 ----a-w- c:\windows\system32\wininet.dll 2009-12-16 18:43 . 2002-08-27 11:58 343040 ----a-w- c:\windows\system32\mspaint.exe 2009-12-14 07:08 . 2002-08-27 11:43 33280 ----a-w- c:\windows\system32\csrsrv.dll 2009-12-08 19:27 . 2002-08-27 11:43 2189184 ------w- c:\windows\system32\ntoskrnl.exe 2009-12-08 18:43 . 2001-08-17 13:48 2066048 ------w- c:\windows\system32\ntkrnlpa.exe . ((((((((((((((((((((((((((((((((((((( Reg Loading Points )))))))))))))))))))))))))))))))))))))))))))))))))) . . *Note* empty entries & legit default entries are not shown REGEDIT4 [HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] "swg"="c:\program files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe" [2008-09-16 39408] [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] "HPDJ Taskbar Utility"="c:\windows\System32\spool\drivers\w32x86\3\hpztsb05.exe" [2002-07-04 188416] "VCSPlayer"="c:\program files\Virtual CD v4 SDK\system\vcsplay.exe" [2002-06-07 299008] "BJCFD"="c:\program files\BroadJump\Client Foundation\CFD.exe" [2003-01-27 376912] "Adobe Reader Speed Launcher"="c:\program files\Adobe\Reader 8.0\Reader\Reader_sl.exe" [2008-01-11 39792] "Broadbandadvisor.exe"="c:\program files\Virgin Broadband\advisor\Broadbandadvisor.exe" [2009-05-27 2303216] "QuickTime Task"="c:\program files\QuickTime\qttask.exe" [2009-11-10 417792] "iTunesHelper"="c:\program files\iTunes\iTunesHelper.exe" [2009-11-12 141600] [HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run] "CTFMON.EXE"="c:\windows\System32\CTFMON.EXE" [2008-04-14 15360] c:\documents and settings\All Users\Start Menu\Programs\Startup\ Digimax Viewer 2.1.lnk - c:\program files\Samsung\Digimax Viewer 2.1\STImgBrowser.exe [2006-5-16 634880] Microsoft Office.lnk - c:\program files\Microsoft Office\Office\OSA9.EXE [2000-1-21 65588] [HKEY_LOCAL_MACHINE\system\currentcontrolset\control\session manager] BootExecute REG_MULTI_SZ PDBoot.exe\0autocheck autochk * [HKEY_LOCAL_MACHINE\software\microsoft\security center] "AntiVirusOverride"=dword:00000001 "FirewallOverride"=dword:00000001 [HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile] "EnableFirewall"= 0 (0x0) "DisableNotifications"= 1 (0x1) [HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List] "%windir%\\system32\\sessmgr.exe"= "c:\\Program Files\\Real\\RealPlayer\\realplay.exe"= "c:\\Program Files\\Messenger\\msmsgs.exe"= "%windir%\\Network Diagnostic\\xpnetdiag.exe"= "c:\\Program Files\\Windows Live\\Sync\\WindowsLiveSync.exe"= "c:\\Program Files\\Bonjour\\mDNSResponder.exe"= "c:\\Program Files\\iTunes\\iTunes.exe"= R0 pavboot;pavboot;c:\windows\system32\drivers\pavboot.sys [03/01/2010 13:25 28552] R1 vcsmpdrv;vcsmpdrv;c:\windows\system32\drivers\vcsmpdrv.sys [17/03/2003 17:03 49232] R3 CVIAAUD;NEC VIA 3D Environmental Audio;c:\windows\system32\drivers\cviaaud.sys [01/01/1980 320864] R3 CVIAHALA;CVIAHALA;c:\windows\system32\drivers\cviahal.sys [01/01/1980 214688] R3 DUBE100B;D-Link DUB-E100 USB 2.0 Fast Ethernet Adapter;c:\windows\system32\drivers\DUBE100B.sys [28/04/2007 09:30 18560] R3 RadialpointSafeConnectDriver;RadialpointSafeConnectDriver;c:\program files\Virgin Broadband\PCguard\SafeConnect\Driver\platform_XP\SafeConnectDriver.sys [14/11/2008 17:28 161304] R3 RadialpointSafeConnectFilter;RadialpointSafeConnectFilter;c:\program files\Virgin Broadband\PCguard\SafeConnect\Driver\platform_XP\SafeConnectFilter.sys [14/11/2008 17:28 29720] R3 RadialpointSafeConnectShim;RadialpointSafeConnectShim;c:\program files\Virgin Broadband\PCguard\SafeConnect\Driver\platform_XP\SafeConnectShim.sys [14/11/2008 17:28 27376] S2 gupdate;Google Update Service (gupdate);c:\program files\Google\Update\GoogleUpdate.exe [07/02/2010 13:47 135664] S2 ImapiServiceCOMSysApp;IMAPI CD-Burning COM Service ImapiServiceCOMSysApp;c:\windows\system32\amr_cpli.exe srv --> c:\windows\system32\amr_cpli.exe srv [?] S3 V90drv;v90drv;c:\windows\system32\drivers\v90drv.sys [01/01/1980 1432836] . Contents of the 'Scheduled Tasks' folder 2009-12-18 c:\windows\Tasks\AppleSoftwareUpdate.job - c:\program files\Apple Software Update\SoftwareUpdate.exe [2008-07-30 11:34] 2010-03-07 c:\windows\Tasks\GoogleUpdateTaskMachineCore.job - c:\program files\Google\Update\GoogleUpdate.exe [2010-02-07 13:46] 2010-03-06 c:\windows\Tasks\GoogleUpdateTaskMachineUA.job - c:\program files\Google\Update\GoogleUpdate.exe [2010-02-07 13:46] . . ------- Supplementary Scan ------- . uStart Page = hxxp://www.virginmedia.com uInternet Connection Wizard,ShellNext = hxxp://www.microsoft.com uInternet Settings,ProxyOverride = <local>;*.local IE: Google Sidewiki... - c:\program files\Google\Google Toolbar\Component\GoogleToolbarDynamic_mui_en_96D6FF0C6D236BF8.dll/cmsidewiki.html IE: {{1D49B7D4-524D-4ac9-BC34-B4822CAE4BB1} - c:\apps\IECustom\script.htm DPF: Microsoft XML Parser for Java - http://file://c:\windows\Java\classes\xmldso.cab . - - - - ORPHANS REMOVED - - - - HKLM-Run-Dzirifigoreye - c:\windows\umotuqoleziba.dll ************************************************************************** catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, GMER - Rootkit Detector and Remover Rootkit scan 2010-03-07 10:03 Windows 5.1.2600 Service Pack 3 NTFS scanning hidden processes ... scanning hidden autostart entries ... scanning hidden files ... scan completed successfully hidden files: 0 ************************************************************************** . --------------------- LOCKED REGISTRY KEYS --------------------- [HKEY_USERS\S-1-5-21-4213343257-1473697035-1497813335-1005\Software\Microsoft\SystemCertificates\AddressBook*] @Allowed: (Read) (RestrictedCode) @Allowed: (Read) (RestrictedCode) @SACL= . --------------------- DLLs Loaded Under Running Processes --------------------- - - - - - - - > 'explorer.exe'(2540) c:\windows\system32\WININET.dll c:\windows\system32\ieframe.dll c:\windows\system32\webcheck.dll . ------------------------ Other Running Processes ------------------------ . c:\program files\Virgin Broadband\PCguard\Fws.exe c:\program files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe c:\program files\Bonjour\mDNSResponder.exe c:\program files\Raxco\PerfectDisk2008\PD91Agent.exe c:\program files\Microsoft\Search Enhancement Pack\SeaPort\SeaPort.exe c:\program files\Virtual CD v4 SDK\system\vcssecs.exe c:\program files\iPod\bin\iPodService.exe . ************************************************************************** . Completion time: 2010-03-07 10:13:22 - machine was rebooted ComboFix-quarantined-files.txt 2010-03-07 10:13 ComboFix2.txt 2010-01-01 13:52 Pre-Run: 16,883,298,304 bytes free Post-Run: 16,930,287,616 bytes free - - End Of File - - C929135BFCEEB6AADB2F16723CEF93D6 Thanks for your help! I really appreciate it. Nuley Quote
Starbuck Posted March 7, 2010 Posted March 7, 2010 Hi nuley, Step 1 Let's grab a couple of flies for analysis. Close any open browsers. Close/disable all anti virus, firewall and anti malware programs so they do not interfere with the running of ComboFix: Open Notepad - it must be Notepad, not Wordpad. Copy the text below in the code box by highlighting all the text and pressing Ctrl+C http://extremetechsupport.com/forum/malware-infection-removal/9323-nasty-virus.html#post63781 Collect:: c:\windows\Bmimu.dat c:\windows\Bxelanulamo.bin File:: c:\windows\system32\mlfcache.dat Go to the Notepad window and click Edit >> Paste Then click File >> Save Name the file "CFScript.txt" (including the quotes) Save the file to your Desktop The main ComboFix.exe program should be on your Desktop Drag the file you just created... CFScript.txt and drop it on the main ComboFix.exe icon as below. http://i275.photobucket.com/albums/jj285/Bleeping/Combofix/cf.gif Now please wait for ComboFix to finish running. When Combofix has completed, a box will appear asking you to submit files for further analysis. Please ensure you are connected to the internet and click OK. http://img.photobucket.com/albums/v708/starbuck50/new/cfsub.png In the event that the upload site may be offline, you will see the following message ... http://img.photobucket.com/albums/v708/starbuck50/new/cfsub2.png You can manually submit the files by navigating to: C:\CF-Submit.htm and double clicking to submit the files. Note: ComboFix's log shall pop up only after the upload routine has finished running. Step 2 I'd still recommend running 'exeHelper', it'll help to correct a few things on your system: Please download exeHelper to your desktop. If your AV program throws up a warning about the program, ignore the warning. Some AV's flag this program because of how it works... that's all. Double-click on exeHelper.com to run the fix. A black window should pop up, press any key to close once the fix is completed. Post the contents of exehelperlog.txt ( Will be created in the directory where you ran exeHelper.com and should open at the end of the scan) Note : If the window shows a message that says "Error deleting file", please re-run the program before posting a log - and post the two logs together ( they will both be in the one file ). Step 3 Download OTL to your desktop. if you have problems, try this download link: OTL Double click on the icon to run it. Make sure all other windows are closed and to let it run uninterrupted. When the window appears, underneath Output at the top change it to Minimal Output. Check the boxes beside LOP Check and Purity Check. . http://img.photobucket.com/albums/v708/starbuck50/new/newOtl2.png Now copy the lines in the codebox below. netsvcs msconfig %SYSTEMDRIVE%\*.exe /md5start eventlog.dll scecli.dll netlogon.dll cngaudit.dll sceclt.dll ntelogon.dll logevent.dll iaStor.sys nvstor.sys atapi.sys IdeChnDr.sys viasraid.sys AGP440.sys vaxscsi.sys nvatabus.sys viamraid.sys nvata.sys nvgts.sys iastorv.sys ViPrt.sys eNetHook.dll ahcix86.sys KR10N.sys nvstor32.sys ahcix86s.sys nvrd32.sys symmpi.sys adp3132.sys /md5stop %systemroot%\*. /mp /s %systemroot%\system32\*.dll /lockedfiles %systemroot%\Tasks\*.job /lockedfiles %systemroot%\system32\drivers\*.sys /lockedfiles CREATERESTOREPOINT right click in the Custom Scans/Fixes window (under the blue bar) and choose Paste. http://img.photobucket.com/albums/v708/starbuck50/new%20forum/scan-fix.png . Click the Run Scan button. http://img.photobucket.com/albums/v708/starbuck50/runscan.png Do not change any settings unless otherwise told to do so. The scan wont take long. When the scan completes, it will open two notepad windows. OTL.Txt and Extras.Txt. These are saved in the same location as OTL. Please copy (Edit->Select All, Edit->Copy) the contents of these files, one at a time, and post them with your next reply. In your next reply, please submit: New combofix.txt exehelperlog.txt Both reports from OTL. (if they are too big to post, feel free to add them as attachments.) Thanks. Quote Member of:UNITE
nuley Posted March 9, 2010 Author Posted March 9, 2010 Dear Starbuck Thanks very much for this - it wasn't nearly as difficult as I'd feared! The logs are below: ComboFix 10-03-06.06 - John 07/03/2010 9:48.3.1 - x86 Microsoft Windows XP Home Edition 5.1.2600.3.1252.1.1033.18.751.426 [GMT 0:00] Running from: c:\documents and settings\John\Desktop\Combo-Fix.com AV: PCguard Anti-Virus *On-access scanning disabled* (Updated) {5B5A3BD7-8573-4672-AEA8-C9BB713B6755} FW: PCguard Firewall *disabled* {80593BF4-D969-4EC5-ADAE-A22F2DFC7A22} . ((((((((((((((((((((((((((((((((((((((( Other Deletions ))))))))))))))))))))))))))))))))))))))))))))))))) . c:\documents and settings\John\Application Data\wiaserva.log c:\documents and settings\John\Local Settings\Application Data\{4D05995A-1EB2-4DC9-A2FE-7E263FB17580} c:\documents and settings\John\Local Settings\Application Data\{4D05995A-1EB2-4DC9-A2FE-7E263FB17580}\chrome.manifest c:\documents and settings\John\Local Settings\Application Data\{4D05995A-1EB2-4DC9-A2FE-7E263FB17580}\chrome\content\_cfg.js c:\documents and settings\John\Local Settings\Application Data\{4D05995A-1EB2-4DC9-A2FE-7E263FB17580}\chrome\content\overlay.xul c:\documents and settings\John\Local Settings\Application Data\{4D05995A-1EB2-4DC9-A2FE-7E263FB17580}\install.rdf c:\documents and settings\John\Local Settings\Temporary Internet Files\Bola8LY7.jpg c:\documents and settings\John\Local Settings\Temporary Internet Files\NxKmx1pj.jpg c:\documents and settings\John\Local Settings\Temporary Internet Files\x0BaMJ.jpg c:\documents and settings\John\Local Settings\Temporary Internet Files\Y35b1.jpg c:\windows\msasds.dll c:\windows\system32\lowsec c:\windows\system32\lowsec\local.ds c:\windows\system32\lowsec\user.ds c:\windows\umotuqoleziba.dll . ((((((((((((((((((((((((( Files Created from 2010-02-07 to 2010-03-07 ))))))))))))))))))))))))))))))) . 2010-03-07 09:48 . 2010-03-07 09:48 12568 ----a-w- c:\windows\system32\drivers\PROCEXP113.SYS 2010-03-05 17:01 . 2010-03-07 09:39 120 ----a-w- c:\windows\Bmimu.dat 2010-03-05 17:01 . 2010-03-07 09:39 0 ----a-w- c:\windows\Bxelanulamo.bin 2010-02-26 16:52 . 2010-02-26 17:09 -------- d-----w- c:\documents and settings\John\Local Settings\Application Data\Temp 2010-02-13 13:22 . 2010-02-13 13:22 58552 ---ha-w- c:\windows\system32\mlfcache.dat 2010-02-07 13:52 . 2010-02-07 13:52 -------- d-----w- c:\documents and settings\NetworkService\Local Settings\Application Data\Google 2010-02-07 13:47 . 2010-02-07 13:47 -------- d-----w- c:\documents and settings\LocalService\Local Settings\Application Data\Google . (((((((((((((((((((((((((((((((((((((((( Find3M Report )))))))))))))))))))))))))))))))))))))))))))))))))))) . 2010-03-07 10:04 . 2009-07-20 09:04 36078368 --sha-w- c:\windows\system32\drivers\fidbox.dat 2010-03-07 10:03 . 2009-07-20 09:03 631584 --sha-w- c:\windows\system32\drivers\fidbox2.dat 2010-03-07 10:01 . 2009-07-20 09:03 61256 --sha-w- c:\windows\system32\drivers\fidbox2.idx 2010-03-07 10:01 . 2009-07-20 09:04 485216 --sha-w- c:\windows\system32\drivers\fidbox.idx 2010-02-13 11:29 . 2009-07-19 12:48 -------- d-----w- c:\program files\iTunes 2010-02-07 13:46 . 2008-09-16 14:34 -------- d-----w- c:\program files\Google 2010-01-19 20:00 . 2009-04-02 16:09 -------- d-----w- c:\program files\Microsoft Silverlight 2010-01-13 19:49 . 2010-01-13 19:49 -------- d-----w- c:\program files\Disney 2009-12-31 16:50 . 2002-08-27 11:43 353792 ----a-w- c:\windows\system32\drivers\srv.sys 2009-12-21 19:14 . 2004-01-08 15:23 916480 ----a-w- c:\windows\system32\wininet.dll 2009-12-16 18:43 . 2002-08-27 11:58 343040 ----a-w- c:\windows\system32\mspaint.exe 2009-12-14 07:08 . 2002-08-27 11:43 33280 ----a-w- c:\windows\system32\csrsrv.dll 2009-12-08 19:27 . 2002-08-27 11:43 2189184 ------w- c:\windows\system32\ntoskrnl.exe 2009-12-08 18:43 . 2001-08-17 13:48 2066048 ------w- c:\windows\system32\ntkrnlpa.exe . ((((((((((((((((((((((((((((((((((((( Reg Loading Points )))))))))))))))))))))))))))))))))))))))))))))))))) . . *Note* empty entries & legit default entries are not shown REGEDIT4 [HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] "swg"="c:\program files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe" [2008-09-16 39408] [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] "HPDJ Taskbar Utility"="c:\windows\System32\spool\drivers\w32x86\3\hpztsb05.exe" [2002-07-04 188416] "VCSPlayer"="c:\program files\Virtual CD v4 SDK\system\vcsplay.exe" [2002-06-07 299008] "BJCFD"="c:\program files\BroadJump\Client Foundation\CFD.exe" [2003-01-27 376912] "Adobe Reader Speed Launcher"="c:\program files\Adobe\Reader 8.0\Reader\Reader_sl.exe" [2008-01-11 39792] "Broadbandadvisor.exe"="c:\program files\Virgin Broadband\advisor\Broadbandadvisor.exe" [2009-05-27 2303216] "QuickTime Task"="c:\program files\QuickTime\qttask.exe" [2009-11-10 417792] "iTunesHelper"="c:\program files\iTunes\iTunesHelper.exe" [2009-11-12 141600] [HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run] "CTFMON.EXE"="c:\windows\System32\CTFMON.EXE" [2008-04-14 15360] c:\documents and settings\All Users\Start Menu\Programs\Startup\ Digimax Viewer 2.1.lnk - c:\program files\Samsung\Digimax Viewer 2.1\STImgBrowser.exe [2006-5-16 634880] Microsoft Office.lnk - c:\program files\Microsoft Office\Office\OSA9.EXE [2000-1-21 65588] [HKEY_LOCAL_MACHINE\system\currentcontrolset\control\session manager] BootExecute REG_MULTI_SZ PDBoot.exe\0autocheck autochk * [HKEY_LOCAL_MACHINE\software\microsoft\security center] "AntiVirusOverride"=dword:00000001 "FirewallOverride"=dword:00000001 [HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile] "EnableFirewall"= 0 (0x0) "DisableNotifications"= 1 (0x1) [HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List] "%windir%\\system32\\sessmgr.exe"= "c:\\Program Files\\Real\\RealPlayer\\realplay.exe"= "c:\\Program Files\\Messenger\\msmsgs.exe"= "%windir%\\Network Diagnostic\\xpnetdiag.exe"= "c:\\Program Files\\Windows Live\\Sync\\WindowsLiveSync.exe"= "c:\\Program Files\\Bonjour\\mDNSResponder.exe"= "c:\\Program Files\\iTunes\\iTunes.exe"= R0 pavboot;pavboot;c:\windows\system32\drivers\pavboot.sys [03/01/2010 13:25 28552] R1 vcsmpdrv;vcsmpdrv;c:\windows\system32\drivers\vcsmpdrv.sys [17/03/2003 17:03 49232] R3 CVIAAUD;NEC VIA 3D Environmental Audio;c:\windows\system32\drivers\cviaaud.sys [01/01/1980 320864] R3 CVIAHALA;CVIAHALA;c:\windows\system32\drivers\cviahal.sys [01/01/1980 214688] R3 DUBE100B;D-Link DUB-E100 USB 2.0 Fast Ethernet Adapter;c:\windows\system32\drivers\DUBE100B.sys [28/04/2007 09:30 18560] R3 RadialpointSafeConnectDriver;RadialpointSafeConnectDriver;c:\program files\Virgin Broadband\PCguard\SafeConnect\Driver\platform_XP\SafeConnectDriver.sys [14/11/2008 17:28 161304] R3 RadialpointSafeConnectFilter;RadialpointSafeConnectFilter;c:\program files\Virgin Broadband\PCguard\SafeConnect\Driver\platform_XP\SafeConnectFilter.sys [14/11/2008 17:28 29720] R3 RadialpointSafeConnectShim;RadialpointSafeConnectShim;c:\program files\Virgin Broadband\PCguard\SafeConnect\Driver\platform_XP\SafeConnectShim.sys [14/11/2008 17:28 27376] S2 gupdate;Google Update Service (gupdate);c:\program files\Google\Update\GoogleUpdate.exe [07/02/2010 13:47 135664] S2 ImapiServiceCOMSysApp;IMAPI CD-Burning COM Service ImapiServiceCOMSysApp;c:\windows\system32\amr_cpli.exe srv --> c:\windows\system32\amr_cpli.exe srv [?] S3 V90drv;v90drv;c:\windows\system32\drivers\v90drv.sys [01/01/1980 1432836] . Contents of the 'Scheduled Tasks' folder 2009-12-18 c:\windows\Tasks\AppleSoftwareUpdate.job - c:\program files\Apple Software Update\SoftwareUpdate.exe [2008-07-30 11:34] 2010-03-07 c:\windows\Tasks\GoogleUpdateTaskMachineCore.job - c:\program files\Google\Update\GoogleUpdate.exe [2010-02-07 13:46] 2010-03-06 c:\windows\Tasks\GoogleUpdateTaskMachineUA.job - c:\program files\Google\Update\GoogleUpdate.exe [2010-02-07 13:46] . . ------- Supplementary Scan ------- . uStart Page = hxxp://www.virginmedia.com uInternet Connection Wizard,ShellNext = hxxp://www.microsoft.com uInternet Settings,ProxyOverride = <local>;*.local IE: Google Sidewiki... - c:\program files\Google\Google Toolbar\Component\GoogleToolbarDynamic_mui_en_96D6FF0C6D236BF8.dll/cmsidewiki.html IE: {{1D49B7D4-524D-4ac9-BC34-B4822CAE4BB1} - c:\apps\IECustom\script.htm DPF: Microsoft XML Parser for Java - http://file://c:\windows\Java\classes\xmldso.cab . - - - - ORPHANS REMOVED - - - - HKLM-Run-Dzirifigoreye - c:\windows\umotuqoleziba.dll ************************************************************************** catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, GMER - Rootkit Detector and Remover Rootkit scan 2010-03-07 10:03 Windows 5.1.2600 Service Pack 3 NTFS scanning hidden processes ... scanning hidden autostart entries ... scanning hidden files ... scan completed successfully hidden files: 0 ************************************************************************** . --------------------- LOCKED REGISTRY KEYS --------------------- [HKEY_USERS\S-1-5-21-4213343257-1473697035-1497813335-1005\Software\Microsoft\SystemCertificates\AddressBook*] @Allowed: (Read) (RestrictedCode) @Allowed: (Read) (RestrictedCode) @SACL= . --------------------- DLLs Loaded Under Running Processes --------------------- - - - - - - - > 'explorer.exe'(2540) c:\windows\system32\WININET.dll c:\windows\system32\ieframe.dll c:\windows\system32\webcheck.dll . ------------------------ Other Running Processes ------------------------ . c:\program files\Virgin Broadband\PCguard\Fws.exe c:\program files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe c:\program files\Bonjour\mDNSResponder.exe c:\program files\Raxco\PerfectDisk2008\PD91Agent.exe c:\program files\Microsoft\Search Enhancement Pack\SeaPort\SeaPort.exe c:\program files\Virtual CD v4 SDK\system\vcssecs.exe c:\program files\iPod\bin\iPodService.exe . ************************************************************************** . Completion time: 2010-03-07 10:13:22 - machine was rebooted ComboFix-quarantined-files.txt 2010-03-07 10:13 ComboFix2.txt 2010-01-01 13:52 Pre-Run: 16,883,298,304 bytes free Post-Run: 16,930,287,616 bytes free - - End Of File - - C929135BFCEEB6AADB2F16723CEF93D6 Now the exehelper: exeHelper by Raktor Build 20091220 Run at 21:36:17 on 03/09/10 Now searching... Checking for numerical processes... Checking for sysguard processes... Checking for bad processes... Checking for bad files... Checking for bad registry entries... Resetting filetype association for .exe Resetting filetype association for .com Resetting userinit and shell values... Resetting policies... --Finished-- And the OTL ones were too long so they are attached. Thanks again for guiding me through all this so smoothly! Yours very gratefully NuleyOTL.TxtExtras.Txt Quote
Starbuck Posted March 9, 2010 Posted March 9, 2010 Hi nuley look at the headers from the 2 combofix.txts: ComboFix 10-03-06.06 - John 07/03/2010 9:48.3.1 - x86 ComboFix 10-03-06.06 - John 07/03/2010 9:48.3.1 - x86 you posted the first one twice. Have a look here: C:\ComboFix.txt this one should be the latest one. I just need to check that the fix ran ok. Thanks. Quote Member of:UNITE
nuley Posted March 11, 2010 Author Posted March 11, 2010 Sorry, I'm such a twit! Here it is, I think: ComboFix 10-03-09.04 - John 09/03/2010 21:15:59.4.1 - x86 Microsoft Windows XP Home Edition 5.1.2600.3.1252.1.1033.18.751.450 [GMT 0:00] Running from: c:\documents and settings\John\Desktop\Combo-Fix.exe Command switches used :: c:\documents and settings\John\Desktop\CFScript.txt AV: PCguard Anti-Virus *On-access scanning disabled* (Updated) {5B5A3BD7-8573-4672-AEA8-C9BB713B6755} FW: PCguard Firewall *disabled* {80593BF4-D969-4EC5-ADAE-A22F2DFC7A22} FILE :: "c:\windows\system32\mlfcache.dat" file zipped: c:\windows\Bmimu.dat file zipped: c:\windows\Bxelanulamo.bin . ((((((((((((((((((((((((((((((((((((((( Other Deletions ))))))))))))))))))))))))))))))))))))))))))))))))) . c:\windows\Bmimu.dat c:\windows\Bxelanulamo.bin c:\windows\system32\mlfcache.dat . ((((((((((((((((((((((((( Files Created from 2010-02-09 to 2010-03-09 ))))))))))))))))))))))))))))))) . 2010-03-02 13:31 . 2010-02-12 10:03 293376 ------w- c:\windows\system32\browserchoice.exe 2010-02-26 16:52 . 2010-02-26 17:09 -------- d-----w- c:\documents and settings\John\Local Settings\Application Data\Temp . (((((((((((((((((((((((((((((((((((((((( Find3M Report )))))))))))))))))))))))))))))))))))))))))))))))))))) . 2010-03-09 21:27 . 2009-07-20 09:04 36266528 --sha-w- c:\windows\system32\drivers\fidbox.dat 2010-03-09 21:26 . 2009-07-20 09:03 642080 --sha-w- c:\windows\system32\drivers\fidbox2.dat 2010-03-09 21:15 . 2010-03-09 21:15 12568 ----a-w- c:\windows\system32\drivers\PROCEXP113.SYS 2010-03-09 11:38 . 2009-07-20 09:03 61760 --sha-w- c:\windows\system32\drivers\fidbox2.idx 2010-03-09 11:38 . 2009-07-20 09:04 486728 --sha-w- c:\windows\system32\drivers\fidbox.idx 2010-02-13 11:29 . 2009-07-19 12:48 -------- d-----w- c:\program files\iTunes 2010-02-07 13:46 . 2008-09-16 14:34 -------- d-----w- c:\program files\Google 2010-01-19 20:00 . 2009-04-02 16:09 -------- d-----w- c:\program files\Microsoft Silverlight 2010-01-13 19:49 . 2010-01-13 19:49 -------- d-----w- c:\program files\Disney 2009-12-31 16:50 . 2002-08-27 11:43 353792 ----a-w- c:\windows\system32\drivers\srv.sys 2009-12-21 19:14 . 2004-01-08 15:23 916480 ------w- c:\windows\system32\wininet.dll 2009-12-16 18:43 . 2002-08-27 11:58 343040 ----a-w- c:\windows\system32\mspaint.exe 2009-12-14 07:08 . 2002-08-27 11:43 33280 ----a-w- c:\windows\system32\csrsrv.dll . ((((((((((((((((((((((((((((((((((((( Reg Loading Points )))))))))))))))))))))))))))))))))))))))))))))))))) . . *Note* empty entries & legit default entries are not shown REGEDIT4 [HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] "swg"="c:\program files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe" [2008-09-16 39408] "BrowserChoice"="c:\windows\system32\browserchoice.exe" [2010-02-12 293376] [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] "HPDJ Taskbar Utility"="c:\windows\System32\spool\drivers\w32x86\3\hpztsb05.exe" [2002-07-04 188416] "VCSPlayer"="c:\program files\Virtual CD v4 SDK\system\vcsplay.exe" [2002-06-07 299008] "BJCFD"="c:\program files\BroadJump\Client Foundation\CFD.exe" [2003-01-27 376912] "Adobe Reader Speed Launcher"="c:\program files\Adobe\Reader 8.0\Reader\Reader_sl.exe" [2008-01-11 39792] "Broadbandadvisor.exe"="c:\program files\Virgin Broadband\advisor\Broadbandadvisor.exe" [2009-05-27 2303216] "QuickTime Task"="c:\program files\QuickTime\qttask.exe" [2009-11-10 417792] "iTunesHelper"="c:\program files\iTunes\iTunesHelper.exe" [2009-11-12 141600] [HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run] "CTFMON.EXE"="c:\windows\System32\CTFMON.EXE" [2008-04-14 15360] c:\documents and settings\All Users\Start Menu\Programs\Startup\ Digimax Viewer 2.1.lnk - c:\program files\Samsung\Digimax Viewer 2.1\STImgBrowser.exe [2006-5-16 634880] Microsoft Office.lnk - c:\program files\Microsoft Office\Office\OSA9.EXE [2000-1-21 65588] [HKEY_LOCAL_MACHINE\system\currentcontrolset\control\session manager] BootExecute REG_MULTI_SZ PDBoot.exe\0autocheck autochk * [HKEY_LOCAL_MACHINE\software\microsoft\security center] "AntiVirusOverride"=dword:00000001 "FirewallOverride"=dword:00000001 [HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile] "EnableFirewall"= 0 (0x0) "DisableNotifications"= 1 (0x1) [HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List] "%windir%\\system32\\sessmgr.exe"= "c:\\Program Files\\Real\\RealPlayer\\realplay.exe"= "c:\\Program Files\\Messenger\\msmsgs.exe"= "%windir%\\Network Diagnostic\\xpnetdiag.exe"= "c:\\Program Files\\Windows Live\\Sync\\WindowsLiveSync.exe"= "c:\\Program Files\\Bonjour\\mDNSResponder.exe"= "c:\\Program Files\\iTunes\\iTunes.exe"= R0 pavboot;pavboot;c:\windows\system32\drivers\pavboot.sys [03/01/2010 13:25 28552] R3 CVIAAUD;NEC VIA 3D Environmental Audio;c:\windows\system32\drivers\cviaaud.sys [01/01/1980 320864] R3 CVIAHALA;CVIAHALA;c:\windows\system32\drivers\cviahal.sys [01/01/1980 214688] R3 DUBE100B;D-Link DUB-E100 USB 2.0 Fast Ethernet Adapter;c:\windows\system32\drivers\DUBE100B.sys [28/04/2007 09:30 18560] R3 RadialpointSafeConnectDriver;RadialpointSafeConnectDriver;c:\program files\Virgin Broadband\PCguard\SafeConnect\Driver\platform_XP\SafeConnectDriver.sys [14/11/2008 17:28 161304] R3 RadialpointSafeConnectFilter;RadialpointSafeConnectFilter;c:\program files\Virgin Broadband\PCguard\SafeConnect\Driver\platform_XP\SafeConnectFilter.sys [14/11/2008 17:28 29720] R3 RadialpointSafeConnectShim;RadialpointSafeConnectShim;c:\program files\Virgin Broadband\PCguard\SafeConnect\Driver\platform_XP\SafeConnectShim.sys [14/11/2008 17:28 27376] . Contents of the 'Scheduled Tasks' folder 2009-12-18 c:\windows\Tasks\AppleSoftwareUpdate.job - c:\program files\Apple Software Update\SoftwareUpdate.exe [2008-07-30 11:34] 2010-03-09 c:\windows\Tasks\GoogleUpdateTaskMachineCore.job - c:\program files\Google\Update\GoogleUpdate.exe [2010-02-07 13:46] 2010-03-09 c:\windows\Tasks\GoogleUpdateTaskMachineUA.job - c:\program files\Google\Update\GoogleUpdate.exe [2010-02-07 13:46] . . ------- Supplementary Scan ------- . uStart Page = hxxp://www.virginmedia.com uInternet Connection Wizard,ShellNext = hxxp://www.microsoft.com uInternet Settings,ProxyOverride = <local>;*.local IE: Google Sidewiki... - c:\program files\Google\Google Toolbar\Component\GoogleToolbarDynamic_mui_en_96D6FF0C6D236BF8.dll/cmsidewiki.html IE: {{1D49B7D4-524D-4ac9-BC34-B4822CAE4BB1} - c:\apps\IECustom\script.htm DPF: Microsoft XML Parser for Java - http://file://c:\windows\Java\classes\xmldso.cab . ************************************************************************** catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, GMER - Rootkit Detector and Remover Rootkit scan 2010-03-09 21:27 Windows 5.1.2600 Service Pack 3 NTFS scanning hidden processes ... scanning hidden autostart entries ... scanning hidden files ... scan completed successfully hidden files: 0 ************************************************************************** . --------------------- LOCKED REGISTRY KEYS --------------------- [HKEY_USERS\S-1-5-21-4213343257-1473697035-1497813335-1005\Software\Microsoft\SystemCertificates\AddressBook*] @Allowed: (Read) (RestrictedCode) @Allowed: (Read) (RestrictedCode) @SACL= . Completion time: 2010-03-09 21:31:44 ComboFix-quarantined-files.txt 2010-03-09 21:31 ComboFix2.txt 2010-03-07 10:13 ComboFix3.txt 2010-01-01 13:52 Pre-Run: 16,868,933,632 bytes free Post-Run: 16,826,376,192 bytes free - - End Of File - - CB5B15A07CF760C29B9EAFE2B380FC83 Upload was successful Thanks very much Nuley Quote
Starbuck Posted March 11, 2010 Posted March 11, 2010 Hi nuley Thanks for that. Can you follow the instructions given earlier to download OTL and let me have the reports. Thanks Quote Member of:UNITE
nuley Posted March 11, 2010 Author Posted March 11, 2010 Hi Starbuck Do you want me to do this again? I did it and posted them previously as attachments as they wouldn't fit. Cheers Nuley Quote
Starbuck Posted March 11, 2010 Posted March 11, 2010 Sorry, i missed them :confused: I'll have a look through them now. Quote Member of:UNITE
nuley Posted March 19, 2010 Author Posted March 19, 2010 Dear Starbuck Did you get a chance to look through the logs? My pc is working well so I'm hoping all is well! Many thanks Nuley Quote
Starbuck Posted March 19, 2010 Posted March 19, 2010 Hi nuley Really sorry about that, it went clean out of my head. My apologies. Step 1 Double click on OTL.exe to run it. Copy the lines in the codebox below. (make sure that :Otl is on the first line ) :Otl O15 - HKCU\..Trusted Domains: ([]msn in My Computer) O16 - DPF: {0000000A-9980-0010-8000-00AA00389B71} http://codecs.microsoft.com/codecs/i386/wmsp9dmo.cab (Reg Error: Key error.) O16 - DPF: {8FFBE65D-2C9C-4669-84BD-5829DC0B603C} http://fpdownload.macromedia.com/get/flashplayer/current/polarbear/ultrashim.cab (Reg Error: Key error.) O16 - DPF: {FFFFFFFF-CACE-BABE-BABE-00AA0055595A} http://www.trueswitch.com/hotmail-uk/TrueInstallHotmailUK.exe (Reg Error: Key error.) O16 - DPF: Microsoft XML Parser for Java file://C:\WINDOWS\Java\classes\xmldso.cab (Reg Error: Key error.) [2009/07/20 09:03:17 | 000,000,040 | ---- | M] ()(C:\WINDOWS\System32\????????????????????????????????????g) -- C:\WINDOWS\System32\㩃停潲牧浡䘠汩獥噜物楧牂慯扤湡層䍐畧牡層慓敦潃湮捥屴潃普杩塜楖睥挮湯楦g [2009/07/20 09:03:17 | 000,000,040 | ---- | C] ()(C:\WINDOWS\System32\????????????????????????????????????g) -- C:\WINDOWS\System32\㩃停潲牧浡䘠汩獥噜物楧牂慯扤湡層䍐畧牡層慓敦潃湮捥屴潃普杩塜楖睥挮湯楦g :commands [emptytemp] [purity] [EMPTYFLASH] Return to OTL, right click in the Custom Scans/Fixes window (under the blue bar) and choose Paste. http://img.photobucket.com/albums/v708/starbuck50/new%20forum/scan-fix.png Click the red Run Fix button. http://img.photobucket.com/albums/v708/starbuck50/runfixbutton.png OTL will reboot your system once the fix has completed. After the reboot, you may need to double click OTL to launch the program and retrieve the log. Copy and paste the contents of the OTL log that comes up after the fix in your next reply. if you lose the report, there will be a copy here: C:\_OTL\MovedFiles Step 2 Malwarebytes Anti Malware: Please update MBAM and run another scan: Start MBAM Click on the Update tab >> click Search for Updates If it says that MBAM needs to close to update it... let it close and then restart it. On restart >> click the Scan button. Don't forget: When the scan is finished, a message box will say "The scan completed successfully. Click 'Show Results' to display all objects found". Click OK to close the message box and continue with the removal process. Back at the main Scanner screen, click on the Show Results button to see a list of any malware that was found. Make sure that everything is checked, and click Remove Selected. When removal is completed, a log report will open in Notepad and you may be prompted to restart your computer. (see Note below) The log is automatically saved and can be viewed by clicking the Logs tab in MBAM. Copy and paste the contents of that report in your next reply and exit MBAM.Note: If MBAM encounters a file that is difficult to remove, you will be presented with 1 of 2 prompts. Click OK to either and let MBAM proceed with the disinfection process. If asked to restart the computer, please do so immediately. Failure to reboot will prevent MBAM from removing all the malware. In your next reply, please submit: Fix report from OTL MBAM scan report Thanks. Quote Member of:UNITE
nuley Posted March 27, 2010 Author Posted March 27, 2010 Dear Starbuck Thanks for this and all your help so far; sorry it's taken a while, it's been a hell of a week! Here are the two logs, OTL and MBAM: All processes killed ========== OTL ========== Registry value HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\\ deleted successfully. Starting removal of ActiveX control {0000000A-9980-0010-8000-00AA00389B71} C:\WINDOWS\Downloaded Program Files\wmsp9dmo.inf moved successfully. Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Code Store Database\Distribution Units\{0000000A-9980-0010-8000-00AA00389B71}\ deleted successfully. Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0000000A-9980-0010-8000-00AA00389B71}\ not found. Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{0000000A-9980-0010-8000-00AA00389B71}\ not found. Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0000000A-9980-0010-8000-00AA00389B71}\ not found. Starting removal of ActiveX control {8FFBE65D-2C9C-4669-84BD-5829DC0B603C} C:\WINDOWS\Downloaded Program Files\erma.inf moved successfully. Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Code Store Database\Distribution Units\{8FFBE65D-2C9C-4669-84BD-5829DC0B603C}\ deleted successfully. Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{8FFBE65D-2C9C-4669-84BD-5829DC0B603C}\ not found. Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{8FFBE65D-2C9C-4669-84BD-5829DC0B603C}\ not found. Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{8FFBE65D-2C9C-4669-84BD-5829DC0B603C}\ not found. Starting removal of ActiveX control {FFFFFFFF-CACE-BABE-BABE-00AA0055595A} Registry error reading value HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Code Store Database\Distribution Units\{FFFFFFFF-CACE-BABE-BABE-00AA0055595A}\DownloadInformation\\INF . Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Code Store Database\Distribution Units\{FFFFFFFF-CACE-BABE-BABE-00AA0055595A}\ deleted successfully. Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{FFFFFFFF-CACE-BABE-BABE-00AA0055595A}\ not found. Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{FFFFFFFF-CACE-BABE-BABE-00AA0055595A}\ not found. Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{FFFFFFFF-CACE-BABE-BABE-00AA0055595A}\ not found. File oft XML Parser for Java http://file://C:\WINDOWS\Java\classes\xmldso.cab not found. Starting removal of ActiveX control Microsoft XML Parser for Java Registry error reading value HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Code Store Database\Distribution Units\Microsoft XML Parser for Java\DownloadInformation\\INF . Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Code Store Database\Distribution Units\Microsoft XML Parser for Java\ deleted successfully. Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\Microsoft XML Parser for Java\ not found. C:\WINDOWS\system32\㩃停潲牧浡䘠汩獥噜物楧牂慯扤湡層䍐畧牡層慓敦潃湮捥屴潃普杩塜楖睥挮湯楦g moved successfully. File C:\WINDOWS\System32\㩃停潲牧浡䘠汩獥噜物楧牂慯扤湡層䍐畧牡層慓敦潃湮捥屴潃普杩塜楖睥挮湯楦g not found. ========== COMMANDS ========== [EMPTYTEMP] User: All Users User: Default User ->Temp folder emptied: 0 bytes ->Temporary Internet Files folder emptied: 33170 bytes User: John ->Temp folder emptied: 3921 bytes ->Temporary Internet Files folder emptied: 68902880 bytes ->Flash cache emptied: 23558 bytes User: LocalService ->Temp folder emptied: 0 bytes ->Temporary Internet Files folder emptied: 49286 bytes User: NetworkService ->Temp folder emptied: 0 bytes ->Temporary Internet Files folder emptied: 534537 bytes User: Owner ->Temp folder emptied: 0 bytes ->Temporary Internet Files folder emptied: 67 bytes %systemdrive% .tmp files removed: 0 bytes %systemroot% .tmp files removed: 39097 bytes %systemroot%\System32 .tmp files removed: 2577 bytes %systemroot%\System32\dllcache .tmp files removed: 0 bytes %systemroot%\System32\drivers .tmp files removed: 0 bytes Windows Temp folder emptied: 6236 bytes %systemroot%\system32\config\systemprofile\Local Settings\Temp folder emptied: 0 bytes %systemroot%\system32\config\systemprofile\Local Settings\Temporary Internet Files folder emptied: 26348765 bytes RecycleBin emptied: 0 bytes Total Files Cleaned = 91.00 mb [EMPTYFLASH] User: All Users User: Default User User: John ->Flash cache emptied: 0 bytes User: LocalService User: NetworkService User: Owner Total Flash Files Cleaned = 0.00 mb OTL by OldTimer - Version 3.1.35.0 log created on 03272010_172153 Files\Folders moved on Reboot... Registry entries deleted on Reboot... ----------------------------------------------- Malwarebytes' Anti-Malware 1.44 Database version: 3921 Windows 5.1.2600 Service Pack 3 Internet Explorer 8.0.6001.18702 27/03/2010 17:45:47 mbam-log-2010-03-27 (17-45-47).txt Scan type: Quick Scan Objects scanned: 126983 Time elapsed: 6 minute(s), 22 second(s) Memory Processes Infected: 0 Memory Modules Infected: 0 Registry Keys Infected: 10 Registry Values Infected: 0 Registry Data Items Infected: 0 Folders Infected: 0 Files Infected: 0 Memory Processes Infected: (No malicious items detected) Memory Modules Infected: (No malicious items detected) Registry Keys Infected: HKEY_USERS\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\{19127ad2-394b-70f5-c650-b97867baa1f7} (Backdoor.Bot) -> Quarantined and deleted successfully. HKEY_USERS\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\{43bf8cd1-c5d5-2230-7bb2-98f22c2b7dc6} (Backdoor.Bot) -> Quarantined and deleted successfully. HKEY_USERS\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\{494e6cec-7483-a4ee-0938-895519a84bc7} (Backdoor.Bot) -> Quarantined and deleted successfully. HKEY_USERS\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\{3446af26-b8d7-199b-4cfc-6fd764ca5c9f} (Backdoor.Bot) -> Quarantined and deleted successfully. HKEY_USERS\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\{4776c4dc-e894-7c06-2148-5d73cef5f905} (Backdoor.Bot) -> Quarantined and deleted successfully. HKEY_USERS\S-1-5-18\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\{19127ad2-394b-70f5-c650-b97867baa1f7} (Backdoor.Bot) -> Quarantined and deleted successfully. HKEY_USERS\S-1-5-18\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\{43bf8cd1-c5d5-2230-7bb2-98f22c2b7dc6} (Backdoor.Bot) -> Quarantined and deleted successfully. HKEY_USERS\S-1-5-18\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\{494e6cec-7483-a4ee-0938-895519a84bc7} (Backdoor.Bot) -> Quarantined and deleted successfully. HKEY_USERS\S-1-5-18\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\{3446af26-b8d7-199b-4cfc-6fd764ca5c9f} (Backdoor.Bot) -> Quarantined and deleted successfully. HKEY_USERS\S-1-5-18\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\{4776c4dc-e894-7c06-2148-5d73cef5f905} (Backdoor.Bot) -> Quarantined and deleted successfully. Registry Values Infected: (No malicious items detected) Registry Data Items Infected: (No malicious items detected) Folders Infected: (No malicious items detected) Files Infected: (No malicious items detected) Many thanks Nuley Quote
Starbuck Posted March 27, 2010 Posted March 27, 2010 Hi nuley Let's see what an online scan gives us: I'd like you to do an ESET OnlineScanHold down Control and click on the following link to open ESET OnlineScan in a new window. ESET OnlineScan Click the http://billy-oneal.com/Canned%20Speeches/speechimages/eset/esetOnline.png button. For alternate browsers only: (Microsoft Internet Explorer users can skip these steps) Click on http://billy-oneal.com/Canned%20Speeches/speechimages/eset/esetSmartInstall.png to download the ESET Smart Installer. Save it to your desktop. Double click on the http://billy-oneal.com/Canned%20Speeches/speechimages/eset/esetSmartInstallDesktopIcon.png icon on your desktop. [*]Check http://billy-oneal.com/Canned%20Speeches/speechimages/eset/esetAcceptTerms.png [*]Click the http://billy-oneal.com/Canned%20Speeches/speechimages/eset/esetStart.png button. [*]Accept any security warnings from your browser. [*]Check http://billy-oneal.com/Canned%20Speeches/speechimages/eset/esetScanArchives.png [*]Click the Start button. [*]ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this can take some time. [*]When the scan completes, push http://billy-oneal.com/Canned%20Speeches/speechimages/eset/esetListThreats.png [*]Click http://billy-oneal.com/Canned%20Speeches/speechimages/eset/esetExport.png, and save the file to your desktop using a unique name, such as ESETScan. Include the contents of this report in your next reply. [*]Click the http://billy-oneal.com/Canned%20Speeches/speechimages/eset/esetBack.png button. [*]Click http://billy-oneal.com/Canned%20Speeches/speechimages/eset/esetFinish.png A log file will be saved here: C:\Program Files\ESET\ESET Online Scanner\log.txt Quote Member of:UNITE
jstmarsh Posted April 1, 2010 Posted April 1, 2010 Antivirus 2010, this is the virus that had found the path to my computer some days back. I had Norton in my family PC but this was of no use after the attack. I tried to update Norton but it didn't allow me to connect to the Internet. None of my drives were working jsut the images of my files and folders were created. I could take it no more and just connected it to my Laptop and just got everything scanned and removed. I was a little tensed but got it sorted out in the end. Quote
nuley Posted April 1, 2010 Author Posted April 1, 2010 Dear Starbuck Thanks for your advice. It looks like there's still dodgy stuff lurking in the C drive! Here's the Eset scan: C:\Qoobox\Quarantine\C\WINDOWS\msasds.dll.vir Win32/Cimag.BY trojan cleaned by deleting - quarantined C:\Qoobox\Quarantine\C\WINDOWS\umotuqoleziba.dll.vir a variant of Win32/Kryptik.CWI trojan cleaned by deleting - quarantined C:\System Volume Information\_restore{1450A557-4027-4F57-AFFC-65B5F7AFB22A}\RP3\A0001713.EXE probably unknown NewHeur_PE virus deleted - quarantined C:\System Volume Information\_restore{1450A557-4027-4F57-AFFC-65B5F7AFB22A}\RP35\A0007822.dll Win32/Cimag.BY trojan cleaned by deleting - quarantined C:\System Volume Information\_restore{1450A557-4027-4F57-AFFC-65B5F7AFB22A}\RP35\A0007825.dll a variant of Win32/Kryptik.CWI trojan cleaned by deleting - quarantined Thanks very much again for everything you've advised so far. And Happy Easter! Nuley Quote
Starbuck Posted April 2, 2010 Posted April 2, 2010 Hi nuley, Happy Easter to you. Actually that doesn't look too bad. C:\Qoobox\Quarantine\C\WINDOWS\msasds.dll.vir Win32/Cimag.BY trojan cleaned by deleting - quarantined C:\Qoobox\Quarantine\C\WINDOWS\umotuqoleziba.dll.v ir a variant of Win32/Kryptik.CWI trojan cleaned by deleting - quarantined These are files that Combofix has already removed. (qoobox, is the name of the CF quarantine folder) C:\System Volume Information\_restore{1450A557-4027-4F57-AFFC-65B5F7AFB22A}\RP3\A0001713.EXE probably unknown NewHeur_PE virus deleted - quarantined C:\System Volume Information\_restore{1450A557-4027-4F57-AFFC-65B5F7AFB22A}\RP35\A0007822.dll Win32/Cimag.BY trojan cleaned by deleting - quarantined C:\System Volume Information\_restore{1450A557-4027-4F57-AFFC-65B5F7AFB22A}\RP35\A0007825.dll a variant of Win32/Kryptik.CWI trojan cleaned by deleting - quarantined These are infected restore points, which we would have expected after an infection like this. We clear all the restore points when we finish the cleaning process anyway. ( so these would have been removed at the end) There is now a newer version of MBAM. Let's get that updated and run a scan with the new version.... if that comes back clean, we can finish off. Please update MBAM and run another scan: Start MBAM Click on the Update tab http://img.photobucket.com/albums/v708/starbuck50/mbam1.png Click Check for Updates http://img.photobucket.com/albums/v708/starbuck50/mbam2.png If it says that MBAM needs to close to update it... let it close and then restart it. Then click the Scan button. Don't forget: When the scan is finished, a message box will say "The scan completed successfully. Click 'Show Results' to display all objects found". Click OK to close the message box and continue with the removal process. Back at the main Scanner screen, click on the Show Results button to see a list of any malware that was found. Make sure that everything is checked, and click Remove Selected. When removal is completed, a log report will open in Notepad and you may be prompted to restart your computer. (see Note below) The log is automatically saved and can be viewed by clicking the Logs tab in MBAM. Copy and paste the contents of that report in your next reply and exit MBAM.Note: If MBAM encounters a file that is difficult to remove, you will be presented with 1 of 2 prompts. Click OK to either and let MBAM proceed with the disinfection process. If asked to restart the computer, please do so immediately. Failure to reboot will prevent MBAM from removing all the malware. Thanks. Quote Member of:UNITE
nuley Posted April 4, 2010 Author Posted April 4, 2010 Dear Starbuck Thanks for this. MBAM hasn't deleted anything so fingers crossed it's all been removed... Here's the log: Malwarebytes' Anti-Malware 1.45 Malwarebytes Database version: 3930 Windows 5.1.2600 Service Pack 3 Internet Explorer 8.0.6001.18702 04/04/2010 12:28:25 mbam-log-2010-04-04 (12-28-25).txt Scan type: Quick scan Objects scanned: 109211 Time elapsed: 7 minute(s), 47 second(s) Memory Processes Infected: 0 Memory Modules Infected: 0 Registry Keys Infected: 0 Registry Values Infected: 0 Registry Data Items Infected: 0 Folders Infected: 0 Files Infected: 0 Memory Processes Infected: (No malicious items detected) Memory Modules Infected: (No malicious items detected) Registry Keys Infected: (No malicious items detected) Registry Values Infected: (No malicious items detected) Registry Data Items Infected: (No malicious items detected) Folders Infected: (No malicious items detected) Files Infected: (No malicious items detected) Thanks again Nuley Quote
Starbuck Posted April 4, 2010 Posted April 4, 2010 Hi nuley, Did you update MBAM? Malwarebytes' Anti-Malware 1.45 Malwarebytes Database version: 3930 This morning i ran an update and the present Database Version is 3952 Which means it's been updated 22 times since you updated it. Please try again so that we have an up to date scan report. If this comes back all clear, we can start to finish off. Thanks. Quote Member of:UNITE
nuley Posted April 11, 2010 Author Posted April 11, 2010 Hi Starbuck I had updated MBAM, but I've done it again and it's already now version 3978 so I guess they just update it very frequently! Here's the new log and again it's all clear: Malwarebytes' Anti-Malware 1.45 Malwarebytes Database version: 3978 Windows 5.1.2600 Service Pack 3 Internet Explorer 8.0.6001.18702 11/04/2010 20:34:19 mbam-log-2010-04-11 (20-34-19).txt Scan type: Quick scan Objects scanned: 111066 Time elapsed: 6 minute(s), 39 second(s) Memory Processes Infected: 0 Memory Modules Infected: 0 Registry Keys Infected: 0 Registry Values Infected: 0 Registry Data Items Infected: 0 Folders Infected: 0 Files Infected: 0 Memory Processes Infected: (No malicious items detected) Memory Modules Infected: (No malicious items detected) Registry Keys Infected: (No malicious items detected) Registry Values Infected: (No malicious items detected) Registry Data Items Infected: (No malicious items detected) Folders Infected: (No malicious items detected) Files Infected: (No malicious items detected) So it's looking good finally! Thanks very much Nuley Quote
Starbuck Posted April 20, 2010 Posted April 20, 2010 Hi nuley I apologise for the delay in response to your repy. I've been away. If everything is still running fine, we'll remove the programs we downloaded and finish off. Step 1 Please double-click OTL.exe to run it. You should see a CleanUp! button, press that button, http://img.photobucket.com/albums/v708/starbuck50/cleanupbutton.png This will remove any programs we have asked you to download along with there associated folders.. plus itself. Note: MBAM will not be removed Step 2 Now you should Set a New Restore Point to prevent possible reinfection from an old one. Some of the malware you picked up could have been saved in System Restore. Since System Restore is a protected directory, your tools can not access it to delete these bad files which sometimes can reinfect your system. Setting a new restore point AFTER cleaning your system will help prevent this and enable your computer to "roll-back" to a clean working state. The easiest and safest way to do this is: Go to Start > Programs > Accessories > System Tools and click "System Restore". Choose the radio button marked "Create a Restore Point" on the first screen then click "Next". Give the Restore Point a name then click "Create". The new point will be stamped with the current date and time. Keep a log of this so you can find it easily should you need to use System Restore. Then go to Start > Run and type: Cleanmgr Click "OK". Select the drive for cleaning then click OK (usually 'C' drive) Click the "More Options" Tab. Click "Clean Up" in the System Restore section to remove all previous restore points except the newly created one. Quote Member of:UNITE
nuley Posted April 22, 2010 Author Posted April 22, 2010 Dear Starbuck Thanks very much for this and all your help. I've done as requested and everything has gone, except there is still a Combo-Fix icon on the desktop. It isn't the little red roaring lion logo which has disappeared, but it is Combo-Fix. In Properties it says it's an MS-DOS application. How should I get rid of this? my 6-year-old son nearly ran it last week so I'll be pleased when it's gone! Very many thanks Nuley Quote
Starbuck Posted April 22, 2010 Posted April 22, 2010 Hi nuley If anything does get left behind, just right click on it and then select 'delete'. Empty your recycle bin once completed. There's no harm in removing any leftover icons.... they're not needed now. Quote Member of:UNITE
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.