Jump to content

Recommended Posts

Posted

Dear friends

 

Once again I have a nasty virus which starts off with a 'scan' running of alleged Antivirus 2010 Security and picks up various viruses. It then hijacks the internet browser and nothing works.

 

Virgin pc security has picked up Trojan.win32.Fraudpack.anqq and Win32inject.anny.

 

I noticed a Browser choice shortcut icon on the desktop and have removed the exe from system and bin, and that's how I've managed to finally get here as we've not been able to access internet for a couple of days.

 

But I expect it will come back! Please could you advise what next?

 

Thanks very much for your valued (as ever!) help.

 

Nuley

  • Replies 24
  • Created
  • Last Reply

Top Posters In This Topic

Posted

Hi nuley

 

Step 1

Download Combofix from any of the links below. You must rename it before saving it. Save it to your desktop.

 

Link 1

Link 2

 

http://i266.photobucket.com/albums/ii277/sUBs_/combofix/CF_download_FF.gif

 

 

http://i266.photobucket.com/albums/ii277/sUBs_/combofix/CF_download_rename.gif

 

This is an example, you may rename ComboFix to anything you want.

 

  • Disable your AntiVirus and AntiSpyware applications, usually via a right click on the System Tray icon. They may otherwise interfere with the running of ComboFix.
    For more information read:
    How To Temporarily Disable Your Anti-virus, Firewall And Anti-malware Programs
     
    Then:
     
    Double click on Combo-Fix.exe & follow the prompts.
     
  • As part of it's process, ComboFix will check to see if the Microsoft Windows Recovery Console is installed. With malware infections being as they are today, it's strongly recommended to have this pre-installed on your machine before doing any malware removal. It will allow you to boot up into a special recovery/repair mode that will allow us to more easily help you should your computer have a problem after an attempted removal of malware.
    If running Vista, you may not see this screen
     
  • Follow the prompts to allow ComboFix to download and install the Microsoft Windows Recovery Console, and when prompted, agree to the End-User License Agreement to install the Microsoft Windows Recovery Console.

**Please note: If the Microsoft Windows Recovery Console is already installed, ComboFix will continue it's malware removal procedures.

 

http://img.photobucket.com/albums/v706/ried7/RcAuto1.gif

 

Once the Microsoft Windows Recovery Console is installed using ComboFix, you should see the following message:

 

http://img.photobucket.com/albums/v706/ried7/whatnext.png

 

Click on Yes, to continue scanning for malware.

 

Note:

Do not mouseclick combofix's window while it's running. That may cause it to stall

 

When finished, it shall produce a log for you. Please include the C:\ComboFix.txt in your next reply.

 

 

Thanks

Member of:

UNITE

Posted

Thanks very much for this.

 

I've saved Combo-Fix.exe to desktop as an application but when I try to open it, a dialog box pops up asking what application I want to use to open it with, as it seems to think it's a file. I resaved it and double checked it was saved as an application, but same problem occured. What should I do?

 

Thanks again

nuley

Posted

Right, it would seem that the malware has effected files with an .exe extension.

This is becoming quite common.

You could try altering the combofix extension to .com ( it should still run) but failing that

 

Try this:

Please download exeHelper to your desktop.

If your AV program throws up a warning about the program, ignore the warning. Some AV's flag this program because of how it works... that's all.

  • Double-click on exeHelper.com to run the fix.
  • A black window should pop up, press any key to close once the fix is completed.
  • Post the contents of exehelperlog.txt ( Will be created in the directory where you ran exeHelper.com and should open at the end of the scan)

Note : If the window shows a message that says "Error deleting file", please re-run the program before posting a log - and post the two logs together ( they will both be in the one file ).

 

Thanks

Member of:

UNITE

Posted

Thanks for this, combo-fix.com ran OK so I didn't have to do the exeHelper stage. It did query how to open ie.exe but it seemed to go away when I cancelled it.

 

Here's the log:

 

ComboFix 10-03-06.06 - John 07/03/2010 9:48.3.1 - x86

Microsoft Windows XP Home Edition 5.1.2600.3.1252.1.1033.18.751.426 [GMT 0:00]

Running from: c:\documents and settings\John\Desktop\Combo-Fix.com

AV: PCguard Anti-Virus *On-access scanning disabled* (Updated) {5B5A3BD7-8573-4672-AEA8-C9BB713B6755}

FW: PCguard Firewall *disabled* {80593BF4-D969-4EC5-ADAE-A22F2DFC7A22}

.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))

.

c:\documents and settings\John\Application Data\wiaserva.log

c:\documents and settings\John\Local Settings\Application Data\{4D05995A-1EB2-4DC9-A2FE-7E263FB17580}

c:\documents and settings\John\Local Settings\Application Data\{4D05995A-1EB2-4DC9-A2FE-7E263FB17580}\chrome.manifest

c:\documents and settings\John\Local Settings\Application Data\{4D05995A-1EB2-4DC9-A2FE-7E263FB17580}\chrome\content\_cfg.js

c:\documents and settings\John\Local Settings\Application Data\{4D05995A-1EB2-4DC9-A2FE-7E263FB17580}\chrome\content\overlay.xul

c:\documents and settings\John\Local Settings\Application Data\{4D05995A-1EB2-4DC9-A2FE-7E263FB17580}\install.rdf

c:\documents and settings\John\Local Settings\Temporary Internet Files\Bola8LY7.jpg

c:\documents and settings\John\Local Settings\Temporary Internet Files\NxKmx1pj.jpg

c:\documents and settings\John\Local Settings\Temporary Internet Files\x0BaMJ.jpg

c:\documents and settings\John\Local Settings\Temporary Internet Files\Y35b1.jpg

c:\windows\msasds.dll

c:\windows\system32\lowsec

c:\windows\system32\lowsec\local.ds

c:\windows\system32\lowsec\user.ds

c:\windows\umotuqoleziba.dll

.

((((((((((((((((((((((((( Files Created from 2010-02-07 to 2010-03-07 )))))))))))))))))))))))))))))))

.

2010-03-07 09:48 . 2010-03-07 09:48 12568 ----a-w- c:\windows\system32\drivers\PROCEXP113.SYS

2010-03-05 17:01 . 2010-03-07 09:39 120 ----a-w- c:\windows\Bmimu.dat

2010-03-05 17:01 . 2010-03-07 09:39 0 ----a-w- c:\windows\Bxelanulamo.bin

2010-02-26 16:52 . 2010-02-26 17:09 -------- d-----w- c:\documents and settings\John\Local Settings\Application Data\Temp

2010-02-13 13:22 . 2010-02-13 13:22 58552 ---ha-w- c:\windows\system32\mlfcache.dat

2010-02-07 13:52 . 2010-02-07 13:52 -------- d-----w- c:\documents and settings\NetworkService\Local Settings\Application Data\Google

2010-02-07 13:47 . 2010-02-07 13:47 -------- d-----w- c:\documents and settings\LocalService\Local Settings\Application Data\Google

.

(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))

.

2010-03-07 10:04 . 2009-07-20 09:04 36078368 --sha-w- c:\windows\system32\drivers\fidbox.dat

2010-03-07 10:03 . 2009-07-20 09:03 631584 --sha-w- c:\windows\system32\drivers\fidbox2.dat

2010-03-07 10:01 . 2009-07-20 09:03 61256 --sha-w- c:\windows\system32\drivers\fidbox2.idx

2010-03-07 10:01 . 2009-07-20 09:04 485216 --sha-w- c:\windows\system32\drivers\fidbox.idx

2010-02-13 11:29 . 2009-07-19 12:48 -------- d-----w- c:\program files\iTunes

2010-02-07 13:46 . 2008-09-16 14:34 -------- d-----w- c:\program files\Google

2010-01-19 20:00 . 2009-04-02 16:09 -------- d-----w- c:\program files\Microsoft Silverlight

2010-01-13 19:49 . 2010-01-13 19:49 -------- d-----w- c:\program files\Disney

2009-12-31 16:50 . 2002-08-27 11:43 353792 ----a-w- c:\windows\system32\drivers\srv.sys

2009-12-21 19:14 . 2004-01-08 15:23 916480 ----a-w- c:\windows\system32\wininet.dll

2009-12-16 18:43 . 2002-08-27 11:58 343040 ----a-w- c:\windows\system32\mspaint.exe

2009-12-14 07:08 . 2002-08-27 11:43 33280 ----a-w- c:\windows\system32\csrsrv.dll

2009-12-08 19:27 . 2002-08-27 11:43 2189184 ------w- c:\windows\system32\ntoskrnl.exe

2009-12-08 18:43 . 2001-08-17 13:48 2066048 ------w- c:\windows\system32\ntkrnlpa.exe

.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))

.

.

*Note* empty entries & legit default entries are not shown

REGEDIT4

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]

"swg"="c:\program files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe" [2008-09-16 39408]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]

"HPDJ Taskbar Utility"="c:\windows\System32\spool\drivers\w32x86\3\hpztsb05.exe" [2002-07-04 188416]

"VCSPlayer"="c:\program files\Virtual CD v4 SDK\system\vcsplay.exe" [2002-06-07 299008]

"BJCFD"="c:\program files\BroadJump\Client Foundation\CFD.exe" [2003-01-27 376912]

"Adobe Reader Speed Launcher"="c:\program files\Adobe\Reader 8.0\Reader\Reader_sl.exe" [2008-01-11 39792]

"Broadbandadvisor.exe"="c:\program files\Virgin Broadband\advisor\Broadbandadvisor.exe" [2009-05-27 2303216]

"QuickTime Task"="c:\program files\QuickTime\qttask.exe" [2009-11-10 417792]

"iTunesHelper"="c:\program files\iTunes\iTunesHelper.exe" [2009-11-12 141600]

[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run]

"CTFMON.EXE"="c:\windows\System32\CTFMON.EXE" [2008-04-14 15360]

c:\documents and settings\All Users\Start Menu\Programs\Startup\

Digimax Viewer 2.1.lnk - c:\program files\Samsung\Digimax Viewer 2.1\STImgBrowser.exe [2006-5-16 634880]

Microsoft Office.lnk - c:\program files\Microsoft Office\Office\OSA9.EXE [2000-1-21 65588]

[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\session manager]

BootExecute REG_MULTI_SZ PDBoot.exe\0autocheck autochk *

[HKEY_LOCAL_MACHINE\software\microsoft\security center]

"AntiVirusOverride"=dword:00000001

"FirewallOverride"=dword:00000001

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]

"EnableFirewall"= 0 (0x0)

"DisableNotifications"= 1 (0x1)

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]

"%windir%\\system32\\sessmgr.exe"=

"c:\\Program Files\\Real\\RealPlayer\\realplay.exe"=

"c:\\Program Files\\Messenger\\msmsgs.exe"=

"%windir%\\Network Diagnostic\\xpnetdiag.exe"=

"c:\\Program Files\\Windows Live\\Sync\\WindowsLiveSync.exe"=

"c:\\Program Files\\Bonjour\\mDNSResponder.exe"=

"c:\\Program Files\\iTunes\\iTunes.exe"=

R0 pavboot;pavboot;c:\windows\system32\drivers\pavboot.sys [03/01/2010 13:25 28552]

R1 vcsmpdrv;vcsmpdrv;c:\windows\system32\drivers\vcsmpdrv.sys [17/03/2003 17:03 49232]

R3 CVIAAUD;NEC VIA 3D Environmental Audio;c:\windows\system32\drivers\cviaaud.sys [01/01/1980 320864]

R3 CVIAHALA;CVIAHALA;c:\windows\system32\drivers\cviahal.sys [01/01/1980 214688]

R3 DUBE100B;D-Link DUB-E100 USB 2.0 Fast Ethernet Adapter;c:\windows\system32\drivers\DUBE100B.sys [28/04/2007 09:30 18560]

R3 RadialpointSafeConnectDriver;RadialpointSafeConnectDriver;c:\program files\Virgin Broadband\PCguard\SafeConnect\Driver\platform_XP\SafeConnectDriver.sys [14/11/2008 17:28 161304]

R3 RadialpointSafeConnectFilter;RadialpointSafeConnectFilter;c:\program files\Virgin Broadband\PCguard\SafeConnect\Driver\platform_XP\SafeConnectFilter.sys [14/11/2008 17:28 29720]

R3 RadialpointSafeConnectShim;RadialpointSafeConnectShim;c:\program files\Virgin Broadband\PCguard\SafeConnect\Driver\platform_XP\SafeConnectShim.sys [14/11/2008 17:28 27376]

S2 gupdate;Google Update Service (gupdate);c:\program files\Google\Update\GoogleUpdate.exe [07/02/2010 13:47 135664]

S2 ImapiServiceCOMSysApp;IMAPI CD-Burning COM Service ImapiServiceCOMSysApp;c:\windows\system32\amr_cpli.exe srv --> c:\windows\system32\amr_cpli.exe srv [?]

S3 V90drv;v90drv;c:\windows\system32\drivers\v90drv.sys [01/01/1980 1432836]

.

Contents of the 'Scheduled Tasks' folder

2009-12-18 c:\windows\Tasks\AppleSoftwareUpdate.job

- c:\program files\Apple Software Update\SoftwareUpdate.exe [2008-07-30 11:34]

2010-03-07 c:\windows\Tasks\GoogleUpdateTaskMachineCore.job

- c:\program files\Google\Update\GoogleUpdate.exe [2010-02-07 13:46]

2010-03-06 c:\windows\Tasks\GoogleUpdateTaskMachineUA.job

- c:\program files\Google\Update\GoogleUpdate.exe [2010-02-07 13:46]

.

.

------- Supplementary Scan -------

.

uStart Page = hxxp://www.virginmedia.com

uInternet Connection Wizard,ShellNext = hxxp://www.microsoft.com

uInternet Settings,ProxyOverride = <local>;*.local

IE: Google Sidewiki... - c:\program files\Google\Google Toolbar\Component\GoogleToolbarDynamic_mui_en_96D6FF0C6D236BF8.dll/cmsidewiki.html

IE: {{1D49B7D4-524D-4ac9-BC34-B4822CAE4BB1} - c:\apps\IECustom\script.htm

DPF: Microsoft XML Parser for Java - http://file://c:\windows\Java\classes\xmldso.cab

.

- - - - ORPHANS REMOVED - - - -

HKLM-Run-Dzirifigoreye - c:\windows\umotuqoleziba.dll

 

**************************************************************************

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, GMER - Rootkit Detector and Remover

Rootkit scan 2010-03-07 10:03

Windows 5.1.2600 Service Pack 3 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully

hidden files: 0

**************************************************************************

.

--------------------- LOCKED REGISTRY KEYS ---------------------

[HKEY_USERS\S-1-5-21-4213343257-1473697035-1497813335-1005\Software\Microsoft\SystemCertificates\AddressBook*]

@Allowed: (Read) (RestrictedCode)

@Allowed: (Read) (RestrictedCode)

@SACL=

.

--------------------- DLLs Loaded Under Running Processes ---------------------

- - - - - - - > 'explorer.exe'(2540)

c:\windows\system32\WININET.dll

c:\windows\system32\ieframe.dll

c:\windows\system32\webcheck.dll

.

------------------------ Other Running Processes ------------------------

.

c:\program files\Virgin Broadband\PCguard\Fws.exe

c:\program files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe

c:\program files\Bonjour\mDNSResponder.exe

c:\program files\Raxco\PerfectDisk2008\PD91Agent.exe

c:\program files\Microsoft\Search Enhancement Pack\SeaPort\SeaPort.exe

c:\program files\Virtual CD v4 SDK\system\vcssecs.exe

c:\program files\iPod\bin\iPodService.exe

.

**************************************************************************

.

Completion time: 2010-03-07 10:13:22 - machine was rebooted

ComboFix-quarantined-files.txt 2010-03-07 10:13

ComboFix2.txt 2010-01-01 13:52

Pre-Run: 16,883,298,304 bytes free

Post-Run: 16,930,287,616 bytes free

- - End Of File - - C929135BFCEEB6AADB2F16723CEF93D6

 

Thanks for your help! I really appreciate it.

Nuley

Posted

Hi nuley,

 

Step 1

Let's grab a couple of flies for analysis.

 

Close any open browsers.

Close/disable all anti virus, firewall and anti malware programs so they do not interfere with the running of ComboFix:

 

Open Notepad - it must be Notepad, not Wordpad.

Copy the text below in the code box by highlighting all the text and pressing Ctrl+C

http://extremetechsupport.com/forum/malware-infection-removal/9323-nasty-virus.html#post63781

Collect::
c:\windows\Bmimu.dat
c:\windows\Bxelanulamo.bin

File::
c:\windows\system32\mlfcache.dat

Go to the Notepad window and click Edit >> Paste

Then click File >> Save

Name the file "CFScript.txt" (including the quotes)

Save the file to your Desktop

 

The main ComboFix.exe program should be on your Desktop

Drag the file you just created... CFScript.txt and drop it on the main ComboFix.exe icon

as below.

http://i275.photobucket.com/albums/jj285/Bleeping/Combofix/cf.gif

 

Now please wait for ComboFix to finish running.

When Combofix has completed, a box will appear asking you to submit files for further analysis.

Please ensure you are connected to the internet and click OK.

 

http://img.photobucket.com/albums/v708/starbuck50/new/cfsub.png

 

In the event that the upload site may be offline, you will see the following message ...

 

http://img.photobucket.com/albums/v708/starbuck50/new/cfsub2.png

 

You can manually submit the files by navigating to:

 

C:\CF-Submit.htm

 

and double clicking to submit the files.

 

Note: ComboFix's log shall pop up only after the upload routine has finished running.

 

Step 2

I'd still recommend running 'exeHelper', it'll help to correct a few things on your system:

 

Please download exeHelper to your desktop.

If your AV program throws up a warning about the program, ignore the warning. Some AV's flag this program because of how it works... that's all.

  • Double-click on exeHelper.com to run the fix.
  • A black window should pop up, press any key to close once the fix is completed.
  • Post the contents of exehelperlog.txt ( Will be created in the directory where you ran exeHelper.com and should open at the end of the scan)

Note : If the window shows a message that says "Error deleting file", please re-run the program before posting a log - and post the two logs together ( they will both be in the one file ).

 

Step 3

  • Download OTL to your desktop.
    if you have problems, try this download link:
    OTL
  • Double click on the icon to run it. Make sure all other windows are closed and to let it run uninterrupted.
  • When the window appears, underneath Output at the top change it to Minimal Output.
  • Check the boxes beside LOP Check and Purity Check

.

 

.

http://img.photobucket.com/albums/v708/starbuck50/new/newOtl2.png


    Now copy the lines in the codebox below.
    netsvcs
    msconfig
    %SYSTEMDRIVE%\*.exe
    /md5start
    eventlog.dll
    scecli.dll
    netlogon.dll
    cngaudit.dll
    sceclt.dll
    ntelogon.dll
    logevent.dll
    iaStor.sys
    nvstor.sys
    atapi.sys
    IdeChnDr.sys
    viasraid.sys
    AGP440.sys
    vaxscsi.sys
    nvatabus.sys
    viamraid.sys
    nvata.sys
    nvgts.sys
    iastorv.sys
    ViPrt.sys
    eNetHook.dll
    ahcix86.sys
    KR10N.sys
    nvstor32.sys
    ahcix86s.sys
    nvrd32.sys
    symmpi.sys
    adp3132.sys
    /md5stop
    %systemroot%\*. /mp /s
    %systemroot%\system32\*.dll /lockedfiles
    %systemroot%\Tasks\*.job /lockedfiles
    %systemroot%\system32\drivers\*.sys /lockedfiles
    CREATERESTOREPOINT
    

  • right click in the Custom Scans/Fixes window (under the blue bar) and choose Paste.
     
    http://img.photobucket.com/albums/v708/starbuck50/new%20forum/scan-fix.png
    .
  • Click the Run Scan button.
     
    http://img.photobucket.com/albums/v708/starbuck50/runscan.png
     
  • Do not change any settings unless otherwise told to do so. The scan wont take long.
  • When the scan completes, it will open two notepad windows. OTL.Txt and Extras.Txt. These are saved in the same location as OTL.
  • Please copy (Edit->Select All, Edit->Copy) the contents of these files, one at a time, and post them with your next reply.

 

In your next reply, please submit:

New combofix.txt

exehelperlog.txt

Both reports from OTL. (if they are too big to post, feel free to add them as attachments.)

 

 

Thanks.

Member of:

UNITE

Posted

Dear Starbuck

 

Thanks very much for this - it wasn't nearly as difficult as I'd feared!

 

The logs are below:

 

ComboFix 10-03-06.06 - John 07/03/2010 9:48.3.1 - x86

Microsoft Windows XP Home Edition 5.1.2600.3.1252.1.1033.18.751.426 [GMT 0:00]

Running from: c:\documents and settings\John\Desktop\Combo-Fix.com

AV: PCguard Anti-Virus *On-access scanning disabled* (Updated) {5B5A3BD7-8573-4672-AEA8-C9BB713B6755}

FW: PCguard Firewall *disabled* {80593BF4-D969-4EC5-ADAE-A22F2DFC7A22}

.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))

.

c:\documents and settings\John\Application Data\wiaserva.log

c:\documents and settings\John\Local Settings\Application Data\{4D05995A-1EB2-4DC9-A2FE-7E263FB17580}

c:\documents and settings\John\Local Settings\Application Data\{4D05995A-1EB2-4DC9-A2FE-7E263FB17580}\chrome.manifest

c:\documents and settings\John\Local Settings\Application Data\{4D05995A-1EB2-4DC9-A2FE-7E263FB17580}\chrome\content\_cfg.js

c:\documents and settings\John\Local Settings\Application Data\{4D05995A-1EB2-4DC9-A2FE-7E263FB17580}\chrome\content\overlay.xul

c:\documents and settings\John\Local Settings\Application Data\{4D05995A-1EB2-4DC9-A2FE-7E263FB17580}\install.rdf

c:\documents and settings\John\Local Settings\Temporary Internet Files\Bola8LY7.jpg

c:\documents and settings\John\Local Settings\Temporary Internet Files\NxKmx1pj.jpg

c:\documents and settings\John\Local Settings\Temporary Internet Files\x0BaMJ.jpg

c:\documents and settings\John\Local Settings\Temporary Internet Files\Y35b1.jpg

c:\windows\msasds.dll

c:\windows\system32\lowsec

c:\windows\system32\lowsec\local.ds

c:\windows\system32\lowsec\user.ds

c:\windows\umotuqoleziba.dll

.

((((((((((((((((((((((((( Files Created from 2010-02-07 to 2010-03-07 )))))))))))))))))))))))))))))))

.

2010-03-07 09:48 . 2010-03-07 09:48 12568 ----a-w- c:\windows\system32\drivers\PROCEXP113.SYS

2010-03-05 17:01 . 2010-03-07 09:39 120 ----a-w- c:\windows\Bmimu.dat

2010-03-05 17:01 . 2010-03-07 09:39 0 ----a-w- c:\windows\Bxelanulamo.bin

2010-02-26 16:52 . 2010-02-26 17:09 -------- d-----w- c:\documents and settings\John\Local Settings\Application Data\Temp

2010-02-13 13:22 . 2010-02-13 13:22 58552 ---ha-w- c:\windows\system32\mlfcache.dat

2010-02-07 13:52 . 2010-02-07 13:52 -------- d-----w- c:\documents and settings\NetworkService\Local Settings\Application Data\Google

2010-02-07 13:47 . 2010-02-07 13:47 -------- d-----w- c:\documents and settings\LocalService\Local Settings\Application Data\Google

.

(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))

.

2010-03-07 10:04 . 2009-07-20 09:04 36078368 --sha-w- c:\windows\system32\drivers\fidbox.dat

2010-03-07 10:03 . 2009-07-20 09:03 631584 --sha-w- c:\windows\system32\drivers\fidbox2.dat

2010-03-07 10:01 . 2009-07-20 09:03 61256 --sha-w- c:\windows\system32\drivers\fidbox2.idx

2010-03-07 10:01 . 2009-07-20 09:04 485216 --sha-w- c:\windows\system32\drivers\fidbox.idx

2010-02-13 11:29 . 2009-07-19 12:48 -------- d-----w- c:\program files\iTunes

2010-02-07 13:46 . 2008-09-16 14:34 -------- d-----w- c:\program files\Google

2010-01-19 20:00 . 2009-04-02 16:09 -------- d-----w- c:\program files\Microsoft Silverlight

2010-01-13 19:49 . 2010-01-13 19:49 -------- d-----w- c:\program files\Disney

2009-12-31 16:50 . 2002-08-27 11:43 353792 ----a-w- c:\windows\system32\drivers\srv.sys

2009-12-21 19:14 . 2004-01-08 15:23 916480 ----a-w- c:\windows\system32\wininet.dll

2009-12-16 18:43 . 2002-08-27 11:58 343040 ----a-w- c:\windows\system32\mspaint.exe

2009-12-14 07:08 . 2002-08-27 11:43 33280 ----a-w- c:\windows\system32\csrsrv.dll

2009-12-08 19:27 . 2002-08-27 11:43 2189184 ------w- c:\windows\system32\ntoskrnl.exe

2009-12-08 18:43 . 2001-08-17 13:48 2066048 ------w- c:\windows\system32\ntkrnlpa.exe

.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))

.

.

*Note* empty entries & legit default entries are not shown

REGEDIT4

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]

"swg"="c:\program files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe" [2008-09-16 39408]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]

"HPDJ Taskbar Utility"="c:\windows\System32\spool\drivers\w32x86\3\hpztsb05.exe" [2002-07-04 188416]

"VCSPlayer"="c:\program files\Virtual CD v4 SDK\system\vcsplay.exe" [2002-06-07 299008]

"BJCFD"="c:\program files\BroadJump\Client Foundation\CFD.exe" [2003-01-27 376912]

"Adobe Reader Speed Launcher"="c:\program files\Adobe\Reader 8.0\Reader\Reader_sl.exe" [2008-01-11 39792]

"Broadbandadvisor.exe"="c:\program files\Virgin Broadband\advisor\Broadbandadvisor.exe" [2009-05-27 2303216]

"QuickTime Task"="c:\program files\QuickTime\qttask.exe" [2009-11-10 417792]

"iTunesHelper"="c:\program files\iTunes\iTunesHelper.exe" [2009-11-12 141600]

[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run]

"CTFMON.EXE"="c:\windows\System32\CTFMON.EXE" [2008-04-14 15360]

c:\documents and settings\All Users\Start Menu\Programs\Startup\

Digimax Viewer 2.1.lnk - c:\program files\Samsung\Digimax Viewer 2.1\STImgBrowser.exe [2006-5-16 634880]

Microsoft Office.lnk - c:\program files\Microsoft Office\Office\OSA9.EXE [2000-1-21 65588]

[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\session manager]

BootExecute REG_MULTI_SZ PDBoot.exe\0autocheck autochk *

[HKEY_LOCAL_MACHINE\software\microsoft\security center]

"AntiVirusOverride"=dword:00000001

"FirewallOverride"=dword:00000001

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]

"EnableFirewall"= 0 (0x0)

"DisableNotifications"= 1 (0x1)

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]

"%windir%\\system32\\sessmgr.exe"=

"c:\\Program Files\\Real\\RealPlayer\\realplay.exe"=

"c:\\Program Files\\Messenger\\msmsgs.exe"=

"%windir%\\Network Diagnostic\\xpnetdiag.exe"=

"c:\\Program Files\\Windows Live\\Sync\\WindowsLiveSync.exe"=

"c:\\Program Files\\Bonjour\\mDNSResponder.exe"=

"c:\\Program Files\\iTunes\\iTunes.exe"=

R0 pavboot;pavboot;c:\windows\system32\drivers\pavboot.sys [03/01/2010 13:25 28552]

R1 vcsmpdrv;vcsmpdrv;c:\windows\system32\drivers\vcsmpdrv.sys [17/03/2003 17:03 49232]

R3 CVIAAUD;NEC VIA 3D Environmental Audio;c:\windows\system32\drivers\cviaaud.sys [01/01/1980 320864]

R3 CVIAHALA;CVIAHALA;c:\windows\system32\drivers\cviahal.sys [01/01/1980 214688]

R3 DUBE100B;D-Link DUB-E100 USB 2.0 Fast Ethernet Adapter;c:\windows\system32\drivers\DUBE100B.sys [28/04/2007 09:30 18560]

R3 RadialpointSafeConnectDriver;RadialpointSafeConnectDriver;c:\program files\Virgin Broadband\PCguard\SafeConnect\Driver\platform_XP\SafeConnectDriver.sys [14/11/2008 17:28 161304]

R3 RadialpointSafeConnectFilter;RadialpointSafeConnectFilter;c:\program files\Virgin Broadband\PCguard\SafeConnect\Driver\platform_XP\SafeConnectFilter.sys [14/11/2008 17:28 29720]

R3 RadialpointSafeConnectShim;RadialpointSafeConnectShim;c:\program files\Virgin Broadband\PCguard\SafeConnect\Driver\platform_XP\SafeConnectShim.sys [14/11/2008 17:28 27376]

S2 gupdate;Google Update Service (gupdate);c:\program files\Google\Update\GoogleUpdate.exe [07/02/2010 13:47 135664]

S2 ImapiServiceCOMSysApp;IMAPI CD-Burning COM Service ImapiServiceCOMSysApp;c:\windows\system32\amr_cpli.exe srv --> c:\windows\system32\amr_cpli.exe srv [?]

S3 V90drv;v90drv;c:\windows\system32\drivers\v90drv.sys [01/01/1980 1432836]

.

Contents of the 'Scheduled Tasks' folder

2009-12-18 c:\windows\Tasks\AppleSoftwareUpdate.job

- c:\program files\Apple Software Update\SoftwareUpdate.exe [2008-07-30 11:34]

2010-03-07 c:\windows\Tasks\GoogleUpdateTaskMachineCore.job

- c:\program files\Google\Update\GoogleUpdate.exe [2010-02-07 13:46]

2010-03-06 c:\windows\Tasks\GoogleUpdateTaskMachineUA.job

- c:\program files\Google\Update\GoogleUpdate.exe [2010-02-07 13:46]

.

.

------- Supplementary Scan -------

.

uStart Page = hxxp://www.virginmedia.com

uInternet Connection Wizard,ShellNext = hxxp://www.microsoft.com

uInternet Settings,ProxyOverride = <local>;*.local

IE: Google Sidewiki... - c:\program files\Google\Google Toolbar\Component\GoogleToolbarDynamic_mui_en_96D6FF0C6D236BF8.dll/cmsidewiki.html

IE: {{1D49B7D4-524D-4ac9-BC34-B4822CAE4BB1} - c:\apps\IECustom\script.htm

DPF: Microsoft XML Parser for Java - http://file://c:\windows\Java\classes\xmldso.cab

.

- - - - ORPHANS REMOVED - - - -

HKLM-Run-Dzirifigoreye - c:\windows\umotuqoleziba.dll

 

**************************************************************************

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, GMER - Rootkit Detector and Remover

Rootkit scan 2010-03-07 10:03

Windows 5.1.2600 Service Pack 3 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully

hidden files: 0

**************************************************************************

.

--------------------- LOCKED REGISTRY KEYS ---------------------

[HKEY_USERS\S-1-5-21-4213343257-1473697035-1497813335-1005\Software\Microsoft\SystemCertificates\AddressBook*]

@Allowed: (Read) (RestrictedCode)

@Allowed: (Read) (RestrictedCode)

@SACL=

.

--------------------- DLLs Loaded Under Running Processes ---------------------

- - - - - - - > 'explorer.exe'(2540)

c:\windows\system32\WININET.dll

c:\windows\system32\ieframe.dll

c:\windows\system32\webcheck.dll

.

------------------------ Other Running Processes ------------------------

.

c:\program files\Virgin Broadband\PCguard\Fws.exe

c:\program files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe

c:\program files\Bonjour\mDNSResponder.exe

c:\program files\Raxco\PerfectDisk2008\PD91Agent.exe

c:\program files\Microsoft\Search Enhancement Pack\SeaPort\SeaPort.exe

c:\program files\Virtual CD v4 SDK\system\vcssecs.exe

c:\program files\iPod\bin\iPodService.exe

.

**************************************************************************

.

Completion time: 2010-03-07 10:13:22 - machine was rebooted

ComboFix-quarantined-files.txt 2010-03-07 10:13

ComboFix2.txt 2010-01-01 13:52

Pre-Run: 16,883,298,304 bytes free

Post-Run: 16,930,287,616 bytes free

- - End Of File - - C929135BFCEEB6AADB2F16723CEF93D6

 

 

Now the exehelper:

 

exeHelper by Raktor

Build 20091220

Run at 21:36:17 on 03/09/10

Now searching...

Checking for numerical processes...

Checking for sysguard processes...

Checking for bad processes...

Checking for bad files...

Checking for bad registry entries...

Resetting filetype association for .exe

Resetting filetype association for .com

Resetting userinit and shell values...

Resetting policies...

--Finished--

 

And the OTL ones were too long so they are attached.

 

Thanks again for guiding me through all this so smoothly!

 

Yours very gratefully

Nuley

OTL.Txt

Extras.Txt

Posted

Hi nuley

 

look at the headers from the 2 combofix.txts:

 

ComboFix 10-03-06.06 - John 07/03/2010 9:48.3.1 - x86

 

ComboFix 10-03-06.06 - John 07/03/2010 9:48.3.1 - x86

you posted the first one twice.

Have a look here:

C:\ComboFix.txt

this one should be the latest one.

I just need to check that the fix ran ok.

 

Thanks.

Member of:

UNITE

Posted

Sorry, I'm such a twit!

 

Here it is, I think:

 

ComboFix 10-03-09.04 - John 09/03/2010 21:15:59.4.1 - x86

Microsoft Windows XP Home Edition 5.1.2600.3.1252.1.1033.18.751.450 [GMT 0:00]

Running from: c:\documents and settings\John\Desktop\Combo-Fix.exe

Command switches used :: c:\documents and settings\John\Desktop\CFScript.txt

AV: PCguard Anti-Virus *On-access scanning disabled* (Updated) {5B5A3BD7-8573-4672-AEA8-C9BB713B6755}

FW: PCguard Firewall *disabled* {80593BF4-D969-4EC5-ADAE-A22F2DFC7A22}

FILE ::

"c:\windows\system32\mlfcache.dat"

file zipped: c:\windows\Bmimu.dat

file zipped: c:\windows\Bxelanulamo.bin

.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))

.

c:\windows\Bmimu.dat

c:\windows\Bxelanulamo.bin

c:\windows\system32\mlfcache.dat

.

((((((((((((((((((((((((( Files Created from 2010-02-09 to 2010-03-09 )))))))))))))))))))))))))))))))

.

2010-03-02 13:31 . 2010-02-12 10:03 293376 ------w- c:\windows\system32\browserchoice.exe

2010-02-26 16:52 . 2010-02-26 17:09 -------- d-----w- c:\documents and settings\John\Local Settings\Application Data\Temp

.

(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))

.

2010-03-09 21:27 . 2009-07-20 09:04 36266528 --sha-w- c:\windows\system32\drivers\fidbox.dat

2010-03-09 21:26 . 2009-07-20 09:03 642080 --sha-w- c:\windows\system32\drivers\fidbox2.dat

2010-03-09 21:15 . 2010-03-09 21:15 12568 ----a-w- c:\windows\system32\drivers\PROCEXP113.SYS

2010-03-09 11:38 . 2009-07-20 09:03 61760 --sha-w- c:\windows\system32\drivers\fidbox2.idx

2010-03-09 11:38 . 2009-07-20 09:04 486728 --sha-w- c:\windows\system32\drivers\fidbox.idx

2010-02-13 11:29 . 2009-07-19 12:48 -------- d-----w- c:\program files\iTunes

2010-02-07 13:46 . 2008-09-16 14:34 -------- d-----w- c:\program files\Google

2010-01-19 20:00 . 2009-04-02 16:09 -------- d-----w- c:\program files\Microsoft Silverlight

2010-01-13 19:49 . 2010-01-13 19:49 -------- d-----w- c:\program files\Disney

2009-12-31 16:50 . 2002-08-27 11:43 353792 ----a-w- c:\windows\system32\drivers\srv.sys

2009-12-21 19:14 . 2004-01-08 15:23 916480 ------w- c:\windows\system32\wininet.dll

2009-12-16 18:43 . 2002-08-27 11:58 343040 ----a-w- c:\windows\system32\mspaint.exe

2009-12-14 07:08 . 2002-08-27 11:43 33280 ----a-w- c:\windows\system32\csrsrv.dll

.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))

.

.

*Note* empty entries & legit default entries are not shown

REGEDIT4

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]

"swg"="c:\program files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe" [2008-09-16 39408]

"BrowserChoice"="c:\windows\system32\browserchoice.exe" [2010-02-12 293376]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]

"HPDJ Taskbar Utility"="c:\windows\System32\spool\drivers\w32x86\3\hpztsb05.exe" [2002-07-04 188416]

"VCSPlayer"="c:\program files\Virtual CD v4 SDK\system\vcsplay.exe" [2002-06-07 299008]

"BJCFD"="c:\program files\BroadJump\Client Foundation\CFD.exe" [2003-01-27 376912]

"Adobe Reader Speed Launcher"="c:\program files\Adobe\Reader 8.0\Reader\Reader_sl.exe" [2008-01-11 39792]

"Broadbandadvisor.exe"="c:\program files\Virgin Broadband\advisor\Broadbandadvisor.exe" [2009-05-27 2303216]

"QuickTime Task"="c:\program files\QuickTime\qttask.exe" [2009-11-10 417792]

"iTunesHelper"="c:\program files\iTunes\iTunesHelper.exe" [2009-11-12 141600]

[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run]

"CTFMON.EXE"="c:\windows\System32\CTFMON.EXE" [2008-04-14 15360]

c:\documents and settings\All Users\Start Menu\Programs\Startup\

Digimax Viewer 2.1.lnk - c:\program files\Samsung\Digimax Viewer 2.1\STImgBrowser.exe [2006-5-16 634880]

Microsoft Office.lnk - c:\program files\Microsoft Office\Office\OSA9.EXE [2000-1-21 65588]

[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\session manager]

BootExecute REG_MULTI_SZ PDBoot.exe\0autocheck autochk *

[HKEY_LOCAL_MACHINE\software\microsoft\security center]

"AntiVirusOverride"=dword:00000001

"FirewallOverride"=dword:00000001

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]

"EnableFirewall"= 0 (0x0)

"DisableNotifications"= 1 (0x1)

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]

"%windir%\\system32\\sessmgr.exe"=

"c:\\Program Files\\Real\\RealPlayer\\realplay.exe"=

"c:\\Program Files\\Messenger\\msmsgs.exe"=

"%windir%\\Network Diagnostic\\xpnetdiag.exe"=

"c:\\Program Files\\Windows Live\\Sync\\WindowsLiveSync.exe"=

"c:\\Program Files\\Bonjour\\mDNSResponder.exe"=

"c:\\Program Files\\iTunes\\iTunes.exe"=

R0 pavboot;pavboot;c:\windows\system32\drivers\pavboot.sys [03/01/2010 13:25 28552]

R3 CVIAAUD;NEC VIA 3D Environmental Audio;c:\windows\system32\drivers\cviaaud.sys [01/01/1980 320864]

R3 CVIAHALA;CVIAHALA;c:\windows\system32\drivers\cviahal.sys [01/01/1980 214688]

R3 DUBE100B;D-Link DUB-E100 USB 2.0 Fast Ethernet Adapter;c:\windows\system32\drivers\DUBE100B.sys [28/04/2007 09:30 18560]

R3 RadialpointSafeConnectDriver;RadialpointSafeConnectDriver;c:\program files\Virgin Broadband\PCguard\SafeConnect\Driver\platform_XP\SafeConnectDriver.sys [14/11/2008 17:28 161304]

R3 RadialpointSafeConnectFilter;RadialpointSafeConnectFilter;c:\program files\Virgin Broadband\PCguard\SafeConnect\Driver\platform_XP\SafeConnectFilter.sys [14/11/2008 17:28 29720]

R3 RadialpointSafeConnectShim;RadialpointSafeConnectShim;c:\program files\Virgin Broadband\PCguard\SafeConnect\Driver\platform_XP\SafeConnectShim.sys [14/11/2008 17:28 27376]

.

Contents of the 'Scheduled Tasks' folder

2009-12-18 c:\windows\Tasks\AppleSoftwareUpdate.job

- c:\program files\Apple Software Update\SoftwareUpdate.exe [2008-07-30 11:34]

2010-03-09 c:\windows\Tasks\GoogleUpdateTaskMachineCore.job

- c:\program files\Google\Update\GoogleUpdate.exe [2010-02-07 13:46]

2010-03-09 c:\windows\Tasks\GoogleUpdateTaskMachineUA.job

- c:\program files\Google\Update\GoogleUpdate.exe [2010-02-07 13:46]

.

.

------- Supplementary Scan -------

.

uStart Page = hxxp://www.virginmedia.com

uInternet Connection Wizard,ShellNext = hxxp://www.microsoft.com

uInternet Settings,ProxyOverride = <local>;*.local

IE: Google Sidewiki... - c:\program files\Google\Google Toolbar\Component\GoogleToolbarDynamic_mui_en_96D6FF0C6D236BF8.dll/cmsidewiki.html

IE: {{1D49B7D4-524D-4ac9-BC34-B4822CAE4BB1} - c:\apps\IECustom\script.htm

DPF: Microsoft XML Parser for Java - http://file://c:\windows\Java\classes\xmldso.cab

.

**************************************************************************

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, GMER - Rootkit Detector and Remover

Rootkit scan 2010-03-09 21:27

Windows 5.1.2600 Service Pack 3 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully

hidden files: 0

**************************************************************************

.

--------------------- LOCKED REGISTRY KEYS ---------------------

[HKEY_USERS\S-1-5-21-4213343257-1473697035-1497813335-1005\Software\Microsoft\SystemCertificates\AddressBook*]

@Allowed: (Read) (RestrictedCode)

@Allowed: (Read) (RestrictedCode)

@SACL=

.

Completion time: 2010-03-09 21:31:44

ComboFix-quarantined-files.txt 2010-03-09 21:31

ComboFix2.txt 2010-03-07 10:13

ComboFix3.txt 2010-01-01 13:52

Pre-Run: 16,868,933,632 bytes free

Post-Run: 16,826,376,192 bytes free

- - End Of File - - CB5B15A07CF760C29B9EAFE2B380FC83

Upload was successful

 

Thanks very much

Nuley

Posted

Hi Starbuck

 

Do you want me to do this again? I did it and posted them previously as attachments as they wouldn't fit.

 

Cheers

Nuley

Posted

Dear Starbuck

 

Did you get a chance to look through the logs? My pc is working well so I'm hoping all is well!

 

Many thanks

Nuley

Posted

Hi nuley

 

Really sorry about that, it went clean out of my head.

My apologies.

 

Step 1

Double click on OTL.exe to run it.

Copy the lines in the codebox below. (make sure that :Otl is on the first line )

:Otl
O15 - HKCU\..Trusted Domains:   ([]msn in My Computer)
O16 - DPF: {0000000A-9980-0010-8000-00AA00389B71} http://codecs.microsoft.com/codecs/i386/wmsp9dmo.cab (Reg Error: Key error.)
O16 - DPF: {8FFBE65D-2C9C-4669-84BD-5829DC0B603C} http://fpdownload.macromedia.com/get/flashplayer/current/polarbear/ultrashim.cab (Reg Error: Key error.)
O16 - DPF: {FFFFFFFF-CACE-BABE-BABE-00AA0055595A} http://www.trueswitch.com/hotmail-uk/TrueInstallHotmailUK.exe (Reg Error: Key error.)
O16 - DPF: Microsoft XML Parser for Java file://C:\WINDOWS\Java\classes\xmldso.cab (Reg Error: Key error.)
[2009/07/20 09:03:17 | 000,000,040 | ---- | M] ()(C:\WINDOWS\System32\????????????????????????????????????g) -- C:\WINDOWS\System32\㩃停潲牧浡䘠汩獥噜物楧牂慯扤湡層䍐畧牡層慓敦潃湮捥屴潃普杩塜楖睥挮湯楦g
[2009/07/20 09:03:17 | 000,000,040 | ---- | C] ()(C:\WINDOWS\System32\????????????????????????????????????g) -- C:\WINDOWS\System32\㩃停潲牧浡䘠汩獥噜物楧牂慯扤湡層䍐畧牡層慓敦潃湮捥屴潃普杩塜楖睥挮湯楦g

:commands
[emptytemp]
[purity]
[EMPTYFLASH]

  • Return to OTL,
  • right click in the Custom Scans/Fixes window (under the blue bar) and choose Paste.
     
    http://img.photobucket.com/albums/v708/starbuck50/new%20forum/scan-fix.png
     
  • Click the red Run Fix button.
     
    http://img.photobucket.com/albums/v708/starbuck50/runfixbutton.png
     
  • OTL will reboot your system once the fix has completed.
  • After the reboot, you may need to double click OTL to launch the program and retrieve the log.

 

Copy and paste the contents of the OTL log that comes up after the fix in your next reply.

 

if you lose the report, there will be a copy here:

C:\_OTL\MovedFiles

 

Step 2

Malwarebytes Anti Malware:

 

Please update MBAM and run another scan:

Start MBAM

Click on the Update tab >> click Search for Updates

If it says that MBAM needs to close to update it... let it close and then restart it.

On restart >> click the Scan button.

 

Don't forget:

  • When the scan is finished, a message box will say "The scan completed successfully. Click 'Show Results' to display all objects found".
  • Click OK to close the message box and continue with the removal process.
  • Back at the main Scanner screen, click on the Show Results button to see a list of any malware that was found.
  • Make sure that everything is checked, and click Remove Selected.
  • When removal is completed, a log report will open in Notepad and you may be prompted to restart your computer. (see Note below)
  • The log is automatically saved and can be viewed by clicking the Logs tab in MBAM.
  • Copy and paste the contents of that report in your next reply and exit MBAM.

Note: If MBAM encounters a file that is difficult to remove, you will be presented with 1 of 2 prompts. Click OK to either and let MBAM proceed with the disinfection process. If asked to restart the computer, please do so immediately. Failure to reboot will prevent MBAM from removing all the malware.

 

In your next reply, please submit:

Fix report from OTL

MBAM scan report

 

 

Thanks.

Member of:

UNITE

Posted

Dear Starbuck

 

Thanks for this and all your help so far; sorry it's taken a while, it's been a hell of a week! Here are the two logs, OTL and MBAM:

 

All processes killed

========== OTL ==========

Registry value HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\\ deleted successfully.

Starting removal of ActiveX control {0000000A-9980-0010-8000-00AA00389B71}

C:\WINDOWS\Downloaded Program Files\wmsp9dmo.inf moved successfully.

Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Code Store Database\Distribution Units\{0000000A-9980-0010-8000-00AA00389B71}\ deleted successfully.

Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0000000A-9980-0010-8000-00AA00389B71}\ not found.

Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{0000000A-9980-0010-8000-00AA00389B71}\ not found.

Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0000000A-9980-0010-8000-00AA00389B71}\ not found.

Starting removal of ActiveX control {8FFBE65D-2C9C-4669-84BD-5829DC0B603C}

C:\WINDOWS\Downloaded Program Files\erma.inf moved successfully.

Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Code Store Database\Distribution Units\{8FFBE65D-2C9C-4669-84BD-5829DC0B603C}\ deleted successfully.

Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{8FFBE65D-2C9C-4669-84BD-5829DC0B603C}\ not found.

Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{8FFBE65D-2C9C-4669-84BD-5829DC0B603C}\ not found.

Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{8FFBE65D-2C9C-4669-84BD-5829DC0B603C}\ not found.

Starting removal of ActiveX control {FFFFFFFF-CACE-BABE-BABE-00AA0055595A}

Registry error reading value HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Code Store Database\Distribution Units\{FFFFFFFF-CACE-BABE-BABE-00AA0055595A}\DownloadInformation\\INF .

Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Code Store Database\Distribution Units\{FFFFFFFF-CACE-BABE-BABE-00AA0055595A}\ deleted successfully.

Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{FFFFFFFF-CACE-BABE-BABE-00AA0055595A}\ not found.

Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{FFFFFFFF-CACE-BABE-BABE-00AA0055595A}\ not found.

Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{FFFFFFFF-CACE-BABE-BABE-00AA0055595A}\ not found.

File oft XML Parser for Java http://file://C:\WINDOWS\Java\classes\xmldso.cab not found.

Starting removal of ActiveX control Microsoft XML Parser for Java

Registry error reading value HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Code Store Database\Distribution Units\Microsoft XML Parser for Java\DownloadInformation\\INF .

Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Code Store Database\Distribution Units\Microsoft XML Parser for Java\ deleted successfully.

Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\Microsoft XML Parser for Java\ not found.

C:\WINDOWS\system32\㩃停潲牧浡䘠汩獥噜物楧牂慯扤湡層䍐畧牡層慓敦潃湮捥屴潃普杩塜楖睥挮湯楦g moved successfully.

File C:\WINDOWS\System32\㩃停潲牧浡䘠汩獥噜物楧牂慯扤湡層䍐畧牡層慓敦潃湮捥屴潃普杩塜楖睥挮湯楦g not found.

========== COMMANDS ==========

 

[EMPTYTEMP]

 

User: All Users

 

User: Default User

->Temp folder emptied: 0 bytes

->Temporary Internet Files folder emptied: 33170 bytes

 

User: John

->Temp folder emptied: 3921 bytes

->Temporary Internet Files folder emptied: 68902880 bytes

->Flash cache emptied: 23558 bytes

 

User: LocalService

->Temp folder emptied: 0 bytes

->Temporary Internet Files folder emptied: 49286 bytes

 

User: NetworkService

->Temp folder emptied: 0 bytes

->Temporary Internet Files folder emptied: 534537 bytes

 

User: Owner

->Temp folder emptied: 0 bytes

->Temporary Internet Files folder emptied: 67 bytes

 

%systemdrive% .tmp files removed: 0 bytes

%systemroot% .tmp files removed: 39097 bytes

%systemroot%\System32 .tmp files removed: 2577 bytes

%systemroot%\System32\dllcache .tmp files removed: 0 bytes

%systemroot%\System32\drivers .tmp files removed: 0 bytes

Windows Temp folder emptied: 6236 bytes

%systemroot%\system32\config\systemprofile\Local Settings\Temp folder emptied: 0 bytes

%systemroot%\system32\config\systemprofile\Local Settings\Temporary Internet Files folder emptied: 26348765 bytes

RecycleBin emptied: 0 bytes

 

Total Files Cleaned = 91.00 mb

 

 

[EMPTYFLASH]

 

User: All Users

 

User: Default User

 

User: John

->Flash cache emptied: 0 bytes

 

User: LocalService

 

User: NetworkService

 

User: Owner

 

Total Flash Files Cleaned = 0.00 mb

 

 

OTL by OldTimer - Version 3.1.35.0 log created on 03272010_172153

Files\Folders moved on Reboot...

Registry entries deleted on Reboot...

 

 

-----------------------------------------------

 

Malwarebytes' Anti-Malware 1.44

Database version: 3921

Windows 5.1.2600 Service Pack 3

Internet Explorer 8.0.6001.18702

27/03/2010 17:45:47

mbam-log-2010-03-27 (17-45-47).txt

Scan type: Quick Scan

Objects scanned: 126983

Time elapsed: 6 minute(s), 22 second(s)

Memory Processes Infected: 0

Memory Modules Infected: 0

Registry Keys Infected: 10

Registry Values Infected: 0

Registry Data Items Infected: 0

Folders Infected: 0

Files Infected: 0

Memory Processes Infected:

(No malicious items detected)

Memory Modules Infected:

(No malicious items detected)

Registry Keys Infected:

HKEY_USERS\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\{19127ad2-394b-70f5-c650-b97867baa1f7} (Backdoor.Bot) -> Quarantined and deleted successfully.

HKEY_USERS\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\{43bf8cd1-c5d5-2230-7bb2-98f22c2b7dc6} (Backdoor.Bot) -> Quarantined and deleted successfully.

HKEY_USERS\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\{494e6cec-7483-a4ee-0938-895519a84bc7} (Backdoor.Bot) -> Quarantined and deleted successfully.

HKEY_USERS\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\{3446af26-b8d7-199b-4cfc-6fd764ca5c9f} (Backdoor.Bot) -> Quarantined and deleted successfully.

HKEY_USERS\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\{4776c4dc-e894-7c06-2148-5d73cef5f905} (Backdoor.Bot) -> Quarantined and deleted successfully.

HKEY_USERS\S-1-5-18\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\{19127ad2-394b-70f5-c650-b97867baa1f7} (Backdoor.Bot) -> Quarantined and deleted successfully.

HKEY_USERS\S-1-5-18\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\{43bf8cd1-c5d5-2230-7bb2-98f22c2b7dc6} (Backdoor.Bot) -> Quarantined and deleted successfully.

HKEY_USERS\S-1-5-18\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\{494e6cec-7483-a4ee-0938-895519a84bc7} (Backdoor.Bot) -> Quarantined and deleted successfully.

HKEY_USERS\S-1-5-18\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\{3446af26-b8d7-199b-4cfc-6fd764ca5c9f} (Backdoor.Bot) -> Quarantined and deleted successfully.

HKEY_USERS\S-1-5-18\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\{4776c4dc-e894-7c06-2148-5d73cef5f905} (Backdoor.Bot) -> Quarantined and deleted successfully.

Registry Values Infected:

(No malicious items detected)

Registry Data Items Infected:

(No malicious items detected)

Folders Infected:

(No malicious items detected)

Files Infected:

(No malicious items detected)

 

Many thanks

Nuley

Posted

Hi nuley

 

Let's see what an online scan gives us:

 

I'd like you to do an ESET OnlineScan

  • Hold down Control and click on the following link to open ESET OnlineScan in a new window.
    ESET OnlineScan
     
  • Click the http://billy-oneal.com/Canned%20Speeches/speechimages/eset/esetOnline.png button.
     
  • For alternate browsers only: (Microsoft Internet Explorer users can skip these steps)
    • Click on http://billy-oneal.com/Canned%20Speeches/speechimages/eset/esetSmartInstall.png to download the ESET Smart Installer.
      Save it to your desktop.
    • Double click on the http://billy-oneal.com/Canned%20Speeches/speechimages/eset/esetSmartInstallDesktopIcon.png icon on your desktop.

    [*]Check http://billy-oneal.com/Canned%20Speeches/speechimages/eset/esetAcceptTerms.png

    [*]Click the http://billy-oneal.com/Canned%20Speeches/speechimages/eset/esetStart.png button.

    [*]Accept any security warnings from your browser.

    [*]Check http://billy-oneal.com/Canned%20Speeches/speechimages/eset/esetScanArchives.png

    [*]Click the Start button.

    [*]ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this can take some time.

    [*]When the scan completes, push http://billy-oneal.com/Canned%20Speeches/speechimages/eset/esetListThreats.png

    [*]Click http://billy-oneal.com/Canned%20Speeches/speechimages/eset/esetExport.png, and save the file to your desktop using a unique name, such as ESETScan.

    Include the contents of this report in your next reply.

    [*]Click the http://billy-oneal.com/Canned%20Speeches/speechimages/eset/esetBack.png button.

    [*]Click http://billy-oneal.com/Canned%20Speeches/speechimages/eset/esetFinish.png

A log file will be saved here: C:\Program Files\ESET\ESET Online Scanner\log.txt

Member of:

UNITE

Posted
Antivirus 2010, this is the virus that had found the path to my computer some days back. I had Norton in my family PC but this was of no use after the attack. I tried to update Norton but it didn't allow me to connect to the Internet. None of my drives were working jsut the images of my files and folders were created. I could take it no more and just connected it to my Laptop and just got everything scanned and removed. I was a little tensed but got it sorted out in the end.
Posted

Dear Starbuck

 

Thanks for your advice.

 

It looks like there's still dodgy stuff lurking in the C drive! Here's the Eset scan:

 

C:\Qoobox\Quarantine\C\WINDOWS\msasds.dll.vir Win32/Cimag.BY trojan cleaned by deleting - quarantined

C:\Qoobox\Quarantine\C\WINDOWS\umotuqoleziba.dll.vir a variant of Win32/Kryptik.CWI trojan cleaned by deleting - quarantined

C:\System Volume Information\_restore{1450A557-4027-4F57-AFFC-65B5F7AFB22A}\RP3\A0001713.EXE probably unknown NewHeur_PE virus deleted - quarantined

C:\System Volume Information\_restore{1450A557-4027-4F57-AFFC-65B5F7AFB22A}\RP35\A0007822.dll Win32/Cimag.BY trojan cleaned by deleting - quarantined

C:\System Volume Information\_restore{1450A557-4027-4F57-AFFC-65B5F7AFB22A}\RP35\A0007825.dll a variant of Win32/Kryptik.CWI trojan cleaned by deleting - quarantined

 

Thanks very much again for everything you've advised so far.

 

And Happy Easter!

Nuley

Posted

Hi nuley,

 

Happy Easter to you.

 

Actually that doesn't look too bad.

 

C:\Qoobox\Quarantine\C\WINDOWS\msasds.dll.vir Win32/Cimag.BY trojan cleaned by deleting - quarantined

C:\Qoobox\Quarantine\C\WINDOWS\umotuqoleziba.dll.v ir a variant of Win32/Kryptik.CWI trojan cleaned by deleting - quarantined

These are files that Combofix has already removed. (qoobox, is the name of the CF quarantine folder)

 

C:\System Volume Information\_restore{1450A557-4027-4F57-AFFC-65B5F7AFB22A}\RP3\A0001713.EXE probably unknown NewHeur_PE virus deleted - quarantined

C:\System Volume Information\_restore{1450A557-4027-4F57-AFFC-65B5F7AFB22A}\RP35\A0007822.dll Win32/Cimag.BY trojan cleaned by deleting - quarantined

C:\System Volume Information\_restore{1450A557-4027-4F57-AFFC-65B5F7AFB22A}\RP35\A0007825.dll a variant of Win32/Kryptik.CWI trojan cleaned by deleting - quarantined

These are infected restore points, which we would have expected after an infection like this.

We clear all the restore points when we finish the cleaning process anyway. ( so these would have been removed at the end)

 

There is now a newer version of MBAM.

Let's get that updated and run a scan with the new version.... if that comes back clean, we can finish off.

 

Please update MBAM and run another scan:

Start MBAM

Click on the Update tab

 

http://img.photobucket.com/albums/v708/starbuck50/mbam1.png

 

Click Check for Updates

 

http://img.photobucket.com/albums/v708/starbuck50/mbam2.png

 

If it says that MBAM needs to close to update it... let it close and then restart it.

Then click the Scan button.

 

Don't forget:

  • When the scan is finished, a message box will say "The scan completed successfully. Click 'Show Results' to display all objects found".
  • Click OK to close the message box and continue with the removal process.
  • Back at the main Scanner screen, click on the Show Results button to see a list of any malware that was found.
  • Make sure that everything is checked, and click Remove Selected.
  • When removal is completed, a log report will open in Notepad and you may be prompted to restart your computer. (see Note below)
  • The log is automatically saved and can be viewed by clicking the Logs tab in MBAM.
  • Copy and paste the contents of that report in your next reply and exit MBAM.

Note: If MBAM encounters a file that is difficult to remove, you will be presented with 1 of 2 prompts. Click OK to either and let MBAM proceed with the disinfection process. If asked to restart the computer, please do so immediately. Failure to reboot will prevent MBAM from removing all the malware.

 

Thanks.

Member of:

UNITE

Posted

Dear Starbuck

 

Thanks for this. MBAM hasn't deleted anything so fingers crossed it's all been removed...

 

Here's the log:

 

Malwarebytes' Anti-Malware 1.45

Malwarebytes

Database version: 3930

Windows 5.1.2600 Service Pack 3

Internet Explorer 8.0.6001.18702

04/04/2010 12:28:25

mbam-log-2010-04-04 (12-28-25).txt

Scan type: Quick scan

Objects scanned: 109211

Time elapsed: 7 minute(s), 47 second(s)

Memory Processes Infected: 0

Memory Modules Infected: 0

Registry Keys Infected: 0

Registry Values Infected: 0

Registry Data Items Infected: 0

Folders Infected: 0

Files Infected: 0

Memory Processes Infected:

(No malicious items detected)

Memory Modules Infected:

(No malicious items detected)

Registry Keys Infected:

(No malicious items detected)

Registry Values Infected:

(No malicious items detected)

Registry Data Items Infected:

(No malicious items detected)

Folders Infected:

(No malicious items detected)

Files Infected:

(No malicious items detected)

 

Thanks again

Nuley

Posted

Hi nuley,

 

Did you update MBAM?

 

Malwarebytes' Anti-Malware 1.45

Malwarebytes

Database version: 3930

This morning i ran an update and the present Database Version is 3952

Which means it's been updated 22 times since you updated it.

Please try again so that we have an up to date scan report.

If this comes back all clear, we can start to finish off.

 

Thanks.

Member of:

UNITE

Posted

Hi Starbuck

 

I had updated MBAM, but I've done it again and it's already now version 3978 so I guess they just update it very frequently! Here's the new log and again it's all clear:

 

Malwarebytes' Anti-Malware 1.45

Malwarebytes

Database version: 3978

Windows 5.1.2600 Service Pack 3

Internet Explorer 8.0.6001.18702

11/04/2010 20:34:19

mbam-log-2010-04-11 (20-34-19).txt

Scan type: Quick scan

Objects scanned: 111066

Time elapsed: 6 minute(s), 39 second(s)

Memory Processes Infected: 0

Memory Modules Infected: 0

Registry Keys Infected: 0

Registry Values Infected: 0

Registry Data Items Infected: 0

Folders Infected: 0

Files Infected: 0

Memory Processes Infected:

(No malicious items detected)

Memory Modules Infected:

(No malicious items detected)

Registry Keys Infected:

(No malicious items detected)

Registry Values Infected:

(No malicious items detected)

Registry Data Items Infected:

(No malicious items detected)

Folders Infected:

(No malicious items detected)

Files Infected:

(No malicious items detected)

 

So it's looking good finally!

 

Thanks very much

Nuley

  • 2 weeks later...
Posted

Hi nuley

 

I apologise for the delay in response to your repy.

I've been away.

 

If everything is still running fine, we'll remove the programs we downloaded and finish off.

 

Step 1

  • Please double-click OTL.exe to run it.
  • You should see a CleanUp! button, press that button,
     
    http://img.photobucket.com/albums/v708/starbuck50/cleanupbutton.png
     
  • This will remove any programs we have asked you to download along with there associated folders.. plus itself.

 

Note:

MBAM will not be removed

 

Step 2

Now you should Set a New Restore Point to prevent possible reinfection from an old one. Some of the malware you picked up could have been saved in System Restore. Since System Restore is a protected directory, your tools can not access it to delete these bad files which sometimes can reinfect your system. Setting a new restore point AFTER cleaning your system will help prevent this and enable your computer to "roll-back" to a clean working state.

 

The easiest and safest way to do this is:

  • Go to Start > Programs > Accessories > System Tools and click "System Restore".
  • Choose the radio button marked "Create a Restore Point" on the first screen then click "Next". Give the Restore Point a name then click "Create". The new point will be stamped with the current date and time. Keep a log of this so you can find it easily should you need to use System Restore.
  • Then go to Start > Run and type: Cleanmgr
  • Click "OK".
  • Select the drive for cleaning then click OK (usually 'C' drive)
  • Click the "More Options" Tab.
  • Click "Clean Up" in the System Restore section to remove all previous restore points except the newly created one.

Member of:

UNITE

Posted

Dear Starbuck

 

Thanks very much for this and all your help. I've done as requested and everything has gone, except there is still a Combo-Fix icon on the desktop. It isn't the little red roaring lion logo which has disappeared, but it is Combo-Fix. In Properties it says it's an MS-DOS application.

 

How should I get rid of this? my 6-year-old son nearly ran it last week so I'll be pleased when it's gone!

 

Very many thanks

Nuley

Posted

Hi nuley

 

If anything does get left behind, just right click on it and then select 'delete'.

Empty your recycle bin once completed.

There's no harm in removing any leftover icons.... they're not needed now.

Member of:

UNITE

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.


×
×
  • Create New...