Page 2 of 2 FirstFirst 12
Results 11 to 19 of 19

Thread: Virtumonde

  1. #11
    Junior Member
    Join Date
    Nov 2008
    Posts
    26

    Default

    Spybot doesn't find anything.

  2. #12
    Security Expert: Emeritus
    Join Date
    Oct 2006
    Location
    Finland
    Posts
    29,374

    Default

    Glad to hear

    Still problems?
    Microsoft MVP Consumer Security 2008-2011

    Member of ASAP and UNITE since 2006

  3. #13
    Junior Member
    Join Date
    Nov 2008
    Posts
    26

    Default

    Nope! Thanks for having the patience to help impatient people like me!

  4. #14
    Security Expert: Emeritus
    Join Date
    Oct 2006
    Location
    Finland
    Posts
    29,374

    Default

    Then let's clean a bit leftovers.

    We need first to disable TeaTimer that it doesn't interfere with fixes. You can re-enable it when you're clean again:

    1. Run Spybot-S&D in Advanced Mode.
    2. If it is not already set to do this Go to the Mode menu select "Advanced Mode"
    3. On the left hand side, Click on Tools
    4. Then click on the Resident Icon in the List
    5. Uncheck "Resident TeaTimer" and OK any prompts.
    6. Restart your computer.

    Open notepad and copy/paste the text in the codebox below into it:

    Code:
    Registry::
    
    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows]
    "AppInit_DLLS"="avgrsstx.dll"
    Save this as "CFScript"

    Then drag the CFScript into ComboFix.exe as you see in the screenshot below.



    This will start ComboFix again. After reboot, (in case it asks to reboot), post the contents of Combofix.txt in your next reply together with a new HijackThis log.

    Combofix should never take more that 20 minutes including the reboot if malware is detected.
    If it does, open Task Manager then Processes tab (press ctrl, alt and del at the same time) and end any processes of findstr, find, sed or swreg, then combofix should continue.
    If that happened we want to know, and also what process you had to end.
    Microsoft MVP Consumer Security 2008-2011

    Member of ASAP and UNITE since 2006

  5. #15
    Junior Member
    Join Date
    Nov 2008
    Posts
    26

    Default

    After Combofix tried to reboot the computer for the first time, I got the blue screen that said failed to boot properly. I then selected Boot Normally (default), Combofix restarted itself and a message box saying Windows has recovered from an unexpected shutdown:

    Problem signature:
    Problem Event Name: BlueScreen
    OS Version: 6.0.6001.2.1.0.256.1
    Locale ID: 1033

    Additional information about the problem:
    BCCode: 93
    BCP1: 0000052C
    BCP2: 00000000
    BCP3: 00000000
    BCP4: 00000000
    OS Version: 6_0_6001
    Service Pack: 1_0
    Product: 256_1

    Files that help describe the problem:
    C:\Windows\Minidump\Mini120308-01.dmp
    C:\Users\MySweetBunny\AppData\Local\Temp\WER-53539-0.sysdata.xml
    C:\Users\MySweetBunny\AppData\Local\Temp\WER45C6.tmp.version.txt

    --------------------------------------------------------------------------
    It still managed to make a log:


    ComboFix 08-12-01.03 - MySweetBunny 2008-12-03 6:28:38.2 - NTFSx86
    Microsoft® Windows Vista™ Ultimate 6.0.6001.1.1252.1.1033.18.1409 [GMT -6:00]
    Running from: c:\users\MySweetBunny\Desktop\ComboFix.exe
    Command switches used :: c:\users\MySweetBunny\Desktop\CFScript.txt
    * Created a new restore point
    .

    ((((((((((((((((((((((((( Files Created from 2008-11-03 to 2008-12-03 )))))))))))))))))))))))))))))))
    .

    2008-11-30 10:54 . 2008-11-30 10:55 <DIR> d-------- C:\rsit
    2008-11-29 21:56 . 2008-11-29 21:56 <DIR> d-------- c:\users\MySweetBunny\AppData\Roaming\Malwarebytes
    2008-11-29 21:56 . 2008-11-29 21:56 <DIR> d-------- c:\users\All Users\Malwarebytes
    2008-11-29 21:56 . 2008-11-29 21:56 <DIR> d-------- c:\programdata\Malwarebytes
    2008-11-29 21:56 . 2008-11-29 21:56 <DIR> d-------- c:\program files\Malwarebytes' Anti-Malware
    2008-11-29 21:56 . 2008-10-22 16:10 38,496 --a------ c:\windows\System32\drivers\mbamswissarmy.sys
    2008-11-29 21:56 . 2008-10-22 16:10 15,504 --a------ c:\windows\System32\drivers\mbam.sys
    2008-11-27 07:10 . 2008-10-20 23:25 1,645,568 --a------ c:\windows\System32\connect.dll
    2008-11-27 07:10 . 2008-08-27 21:40 712,704 --a------ c:\windows\System32\WindowsCodecs.dll
    2008-11-27 07:10 . 2008-08-27 21:40 425,472 --a------ c:\windows\System32\PhotoMetadataHandler.dll
    2008-11-27 07:10 . 2008-08-27 21:40 347,136 --a------ c:\windows\System32\WindowsCodecsExt.dll
    2008-11-27 07:10 . 2008-10-21 21:57 241,152 --a------ c:\windows\System32\PortableDeviceApi.dll
    2008-11-26 08:26 . 2008-11-26 08:26 <DIR> d-------- c:\program files\Trend Micro
    2008-11-24 23:57 . 2008-11-27 13:03 <DIR> d--h----- C:\$AVG8.VAULT$
    2008-11-17 14:05 . 2008-10-16 15:13 1,809,944 --a------ c:\windows\System32\wuaueng.dll
    2008-11-17 14:05 . 2008-10-16 14:56 1,524,736 --a------ c:\windows\System32\wucltux.dll
    2008-11-17 14:05 . 2008-10-16 15:12 561,688 --a------ c:\windows\System32\wuapi.dll
    2008-11-17 14:05 . 2008-10-16 14:08 162,064 --a------ c:\windows\System32\wuwebv.dll
    2008-11-17 14:05 . 2008-10-16 14:55 83,456 --a------ c:\windows\System32\wudriver.dll
    2008-11-17 14:05 . 2008-10-16 15:09 51,224 --a------ c:\windows\System32\wuauclt.exe
    2008-11-17 14:05 . 2008-10-16 15:09 43,544 --a------ c:\windows\System32\wups2.dll
    2008-11-17 14:05 . 2008-10-16 15:08 34,328 --a------ c:\windows\System32\wups.dll
    2008-11-17 14:05 . 2008-10-16 13:56 31,232 --a------ c:\windows\System32\wuapp.exe
    2008-11-13 19:52 . 2008-11-13 19:52 192 --a------ c:\windows\cdplayer.ini
    2008-11-13 07:28 . 2008-12-03 06:34 32,536 --a------ c:\users\All Users\nvModes.dat
    2008-11-13 07:28 . 2008-12-03 06:34 32,536 --a------ c:\programdata\nvModes.dat
    2008-11-11 15:24 . 2008-09-09 21:40 1,334,272 --a------ c:\windows\System32\msxml6.dll
    2008-11-11 15:24 . 2008-09-04 23:14 1,191,936 --a------ c:\windows\System32\msxml3.dll
    2008-11-11 15:24 . 2008-08-26 19:05 212,480 --a------ c:\windows\System32\drivers\mrxsmb10.sys
    2008-11-06 19:51 . 2008-11-06 19:51 <DIR> d-------- C:\PFiles
    2008-11-03 01:02 . 2008-12-03 06:23 <DIR> d-------- c:\windows\System32\drivers\Avg
    2008-11-03 01:02 . 2008-11-03 01:02 97,928 --a------ c:\windows\System32\drivers\avgldx86.sys
    2008-11-03 01:02 . 2008-11-03 01:02 69,128 --a------ c:\windows\System32\drivers\avgwfpx.sys
    2008-11-03 01:02 . 2008-11-03 01:02 10,520 --a------ c:\windows\System32\avgrsstx.dll
    2008-11-03 01:01 . 2008-11-03 01:01 <DIR> d-------- c:\program files\AVG

    .
    (((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
    .
    2008-11-30 15:58 --------- d-----w c:\program files\Eusing Free Registry Cleaner
    2008-11-23 02:37 --------- d-----w c:\program files\Spybot - Search & Destroy
    2008-11-19 14:16 --------- d-----w c:\users\MySweetBunny\AppData\Roaming\SPORE
    2008-11-16 12:34 --------- d-----w c:\programdata\NVIDIA
    2008-11-15 14:43 --------- d-----w c:\program files\DivX
    2008-11-15 12:30 --------- d-----w c:\program files\Rhapsody
    2008-11-13 13:30 --------- d-----w c:\program files\Common Files\Wise Installation Wizard
    2008-11-13 13:30 --------- d-----w c:\program files\AGEIA Technologies
    2008-11-11 23:00 --------- d--h--w c:\program files\InstallShield Installation Information
    2008-11-03 07:01 --------- d-----w c:\programdata\avg8
    2008-11-03 03:31 --------- d-----w c:\program files\CONEXANT
    2008-11-03 03:28 --------- d-----w c:\programdata\Ulead Systems
    2008-11-03 03:28 --------- d-----w c:\program files\InterVideo
    2008-11-03 03:28 --------- d-----w c:\program files\Common Files\Ulead Systems
    2008-11-03 03:19 --------- d-----w c:\program files\Toshiba
    2008-11-03 03:15 --------- d-----w c:\program files\Windows Live
    2008-11-03 00:49 --------- d-----w c:\program files\Microsoft Works
    2008-11-03 00:42 --------- d-----w c:\program files\Common Files\logishrd
    2008-11-03 00:41 --------- d-----w c:\programdata\Logishrd
    2008-11-03 00:34 --------- d-----w c:\programdata\Microsoft Help
    2008-10-22 18:42 7,610,144 ----a-w c:\windows\system32\drivers\nvlddmkm.sys
    2008-10-22 18:42 4,160 ----a-w c:\windows\system32\drivers\nvBridge.kmd
    2008-10-21 13:01 --------- d-----w c:\programdata\SecTaskMan
    2008-10-20 22:00 57,688 ----a-w c:\users\MySweetBunny\AppData\Roaming\nvModes.dat
    2008-10-20 12:43 --------- d-----w c:\program files\Microsoft Games
    2008-10-19 21:20 --------- d-----w c:\users\MySweetBunny\AppData\Roaming\Uniblue
    2008-10-16 08:10 --------- d-----w c:\program files\Windows Mail
    2008-10-13 16:35 --------- d-----w c:\program files\CycloDSEvolution Tools
    2008-10-12 11:26 --------- d-----w c:\program files\RogueSynapse
    2008-10-10 01:38 --------- d-----w c:\program files\Yahoo!
    2008-06-18 19:15 174 --sha-w c:\program files\desktop.ini
    2007-05-12 23:20 262,144 ----a-w c:\programdata\ntuser.dat
    2008-08-26 20:49 2,713 --sh--w c:\windows\System32\barijatu.exe
    .

    ((((((((((((((((((((((((((((( snapshot@2008-11-27_ 7.07.01.49 )))))))))))))))))))))))))))))))))))))))))
    .
    - 2008-11-27 13:03:03 1,572,864 --sha-w c:\windows\ServiceProfiles\LocalService\ntuser.dat
    + 2008-12-03 12:34:28 1,572,864 --sha-w c:\windows\ServiceProfiles\LocalService\ntuser.dat
    - 2008-11-27 13:03:03 1,572,864 --sha-w c:\windows\ServiceProfiles\NetworkService\ntuser.dat
    + 2008-12-03 12:34:28 1,572,864 --sha-w c:\windows\ServiceProfiles\NetworkService\ntuser.dat
    - 2008-11-27 11:50:24 16,384 --sha-w c:\windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5\index.dat
    + 2008-11-28 09:00:24 16,384 --sha-w c:\windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5\index.dat
    - 2008-11-27 11:50:24 32,768 --sha-w c:\windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\index.dat
    + 2008-11-28 09:00:24 32,768 --sha-w c:\windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\index.dat
    - 2008-11-27 11:50:24 32,768 --sha-w c:\windows\System32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\index.dat
    + 2008-11-28 09:00:24 32,768 --sha-w c:\windows\System32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\index.dat
    - 2008-11-27 12:58:05 262,144 ----a-w c:\windows\System32\config\systemprofile\ntuser.dat
    + 2008-12-03 12:28:19 262,144 ----a-w c:\windows\System32\config\systemprofile\ntuser.dat
    + 2008-10-05 03:16:26 235,936 ----a-r c:\windows\System32\Macromed\Flash\FlashUtil10a.exe
    - 2008-09-07 10:05:05 74,649 ----a-w c:\windows\System32\Macromed\Flash\uninstall_activeX.exe
    + 2008-12-02 13:04:43 88,590 ----a-w c:\windows\System32\Macromed\Flash\uninstall_activeX.exe
    - 2008-11-27 12:47:56 101,350 ----a-w c:\windows\System32\perfc009.dat
    + 2008-12-03 12:26:51 101,350 ----a-w c:\windows\System32\perfc009.dat
    - 2008-11-27 12:47:57 595,684 ----a-w c:\windows\System32\perfh009.dat
    + 2008-12-03 12:26:51 595,684 ----a-w c:\windows\System32\perfh009.dat
    - 2008-11-24 17:41:24 6,553,600 ----a-w c:\windows\System32\SMI\Store\Machine\schema.dat
    + 2008-11-28 09:06:38 6,553,600 ----a-w c:\windows\System32\SMI\Store\Machine\schema.dat
    - 2008-11-27 12:43:37 15,178 ----a-w c:\windows\System32\WDI\{86432a0b-3c7d-4ddf-a89c-172faa90485d}\S-1-5-21-522854213-1344089828-1915909241-1000_UserData.bin
    + 2008-12-03 12:23:39 15,698 ----a-w c:\windows\System32\WDI\{86432a0b-3c7d-4ddf-a89c-172faa90485d}\S-1-5-21-522854213-1344089828-1915909241-1000_UserData.bin
    - 2008-11-27 12:43:37 66,738 ----a-w c:\windows\System32\WDI\BootPerformanceDiagnostics_SystemData.bin
    + 2008-12-03 12:23:39 66,856 ----a-w c:\windows\System32\WDI\BootPerformanceDiagnostics_SystemData.bin
    - 2008-11-26 14:20:45 68,140 ----a-w c:\windows\System32\WDI\ShutdownPerformanceDiagnostics_SystemData.bin
    + 2008-12-03 12:23:37 68,488 ----a-w c:\windows\System32\WDI\ShutdownPerformanceDiagnostics_SystemData.bin
    - 2008-11-17 20:06:06 159,320,031 ----a-w c:\windows\winsxs\ManifestCache\6.0.6001.18000_001c50b5_blobs.bin
    + 2008-11-27 13:10:02 161,979,562 ----a-w c:\windows\winsxs\ManifestCache\6.0.6001.18000_001c50b5_blobs.bin
    + 2008-10-21 05:16:20 1,645,568 ----a-w c:\windows\winsxs\x86_microsoft-windows-getconnectedwizards_31bf3856ad364e35_6.0.6000.16766_none_62ed735b99bf2599\connect.dll
    + 2008-10-21 05:06:53 1,645,568 ----a-w c:\windows\winsxs\x86_microsoft-windows-getconnectedwizards_31bf3856ad364e35_6.0.6000.20940_none_6386b028b2d1f29e\connect.dll
    + 2008-10-21 05:25:17 1,645,568 ----a-w c:\windows\winsxs\x86_microsoft-windows-getconnectedwizards_31bf3856ad364e35_6.0.6001.18159_none_64e182cb96dae69e\connect.dll
    + 2008-10-21 05:21:42 1,645,568 ----a-w c:\windows\winsxs\x86_microsoft-windows-getconnectedwizards_31bf3856ad364e35_6.0.6001.22291_none_6537dd96b0202b74\connect.dll
    + 2008-08-28 03:24:50 425,472 ----a-w c:\windows\winsxs\x86_microsoft-windows-photometadatahandler_31bf3856ad364e35_6.0.6000.16740_none_c85de4f0e87e1001\PhotoMetadataHandler.dll
    + 2008-08-28 03:21:23 425,472 ----a-w c:\windows\winsxs\x86_microsoft-windows-photometadatahandler_31bf3856ad364e35_6.0.6000.20905_none_c917c4c40176bbe1\PhotoMetadataHandler.dll
    + 2008-08-28 03:40:09 425,472 ----a-w c:\windows\winsxs\x86_microsoft-windows-photometadatahandler_31bf3856ad364e35_6.0.6001.18131_none_ca4ff3cce59b9e58\PhotoMetadataHandler.dll
    + 2008-08-28 03:37:44 425,472 ----a-w c:\windows\winsxs\x86_microsoft-windows-photometadatahandler_31bf3856ad364e35_6.0.6001.22253_none_cac5f153fec7a8b2\PhotoMetadataHandler.dll
    + 2008-08-28 03:24:51 712,192 ----a-w c:\windows\winsxs\x86_microsoft-windows-windowscodec_31bf3856ad364e35_6.0.6000.16740_none_94703b0aa417f9f5\WindowsCodecs.dll
    + 2008-08-28 03:22:04 712,704 ----a-w c:\windows\winsxs\x86_microsoft-windows-windowscodec_31bf3856ad364e35_6.0.6000.20905_none_952a1addbd10a5d5\WindowsCodecs.dll
    + 2008-08-28 03:40:11 712,704 ----a-w c:\windows\winsxs\x86_microsoft-windows-windowscodec_31bf3856ad364e35_6.0.6001.18131_none_966249e6a135884c\WindowsCodecs.dll
    + 2008-08-28 03:37:46 712,704 ----a-w c:\windows\winsxs\x86_microsoft-windows-windowscodec_31bf3856ad364e35_6.0.6001.22253_none_96d8476dba6192a6\WindowsCodecs.dll
    + 2008-08-28 03:24:51 347,136 ----a-w c:\windows\winsxs\x86_microsoft-windows-windowscodecext_31bf3856ad364e35_6.0.6000.16740_none_91804ffcbb9f565c\WindowsCodecsExt.dll
    + 2008-08-28 03:22:04 347,648 ----a-w c:\windows\winsxs\x86_microsoft-windows-windowscodecext_31bf3856ad364e35_6.0.6000.20905_none_923a2fcfd498023c\WindowsCodecsExt.dll
    + 2008-08-28 03:40:11 347,136 ----a-w c:\windows\winsxs\x86_microsoft-windows-windowscodecext_31bf3856ad364e35_6.0.6001.18131_none_93725ed8b8bce4b3\WindowsCodecsExt.dll
    + 2008-08-28 03:37:46 347,648 ----a-w c:\windows\winsxs\x86_microsoft-windows-windowscodecext_31bf3856ad364e35_6.0.6001.22253_none_93e85c5fd1e8ef0d\WindowsCodecsExt.dll
    + 2008-10-22 03:43:51 241,152 ----a-w c:\windows\winsxs\x86_microsoft-windows-wpd-portabledeviceapi_31bf3856ad364e35_6.0.6000.16767_none_48e0ac03ef0db56a\PortableDeviceApi.dll
    + 2008-10-22 03:43:51 95,232 ----a-w c:\windows\winsxs\x86_microsoft-windows-wpd-portabledeviceapi_31bf3856ad364e35_6.0.6000.16767_none_48e0ac03ef0db56a\PortableDeviceClassExtension.dll
    + 2008-10-22 03:43:51 160,768 ----a-w c:\windows\winsxs\x86_microsoft-windows-wpd-portabledeviceapi_31bf3856ad364e35_6.0.6000.16767_none_48e0ac03ef0db56a\PortableDeviceTypes.dll
    + 2008-10-22 03:39:42 241,152 ----a-w c:\windows\winsxs\x86_microsoft-windows-wpd-portabledeviceapi_31bf3856ad364e35_6.0.6000.20941_none_4979e8d10820826f\PortableDeviceApi.dll
    + 2008-10-22 03:39:42 95,232 ----a-w c:\windows\winsxs\x86_microsoft-windows-wpd-portabledeviceapi_31bf3856ad364e35_6.0.6000.20941_none_4979e8d10820826f\PortableDeviceClassExtension.dll
    + 2008-10-22 03:39:42 160,768 ----a-w c:\windows\winsxs\x86_microsoft-windows-wpd-portabledeviceapi_31bf3856ad364e35_6.0.6000.20941_none_4979e8d10820826f\PortableDeviceTypes.dll
    + 2008-10-22 03:57:30 241,152 ----a-w c:\windows\winsxs\x86_microsoft-windows-wpd-portabledeviceapi_31bf3856ad364e35_6.0.6001.18160_none_4abfe8a3ec3a94fa\PortableDeviceApi.dll
    + 2008-01-19 07:36:07 94,720 ----a-w c:\windows\winsxs\x86_microsoft-windows-wpd-portabledeviceapi_31bf3856ad364e35_6.0.6001.18160_none_4abfe8a3ec3a94fa\PortableDeviceClassExtension.dll
    + 2008-01-19 07:36:07 160,768 ----a-w c:\windows\winsxs\x86_microsoft-windows-wpd-portabledeviceapi_31bf3856ad364e35_6.0.6001.18160_none_4abfe8a3ec3a94fa\PortableDeviceTypes.dll
    + 2008-10-22 03:34:55 241,152 ----a-w c:\windows\winsxs\x86_microsoft-windows-wpd-portabledeviceapi_31bf3856ad364e35_6.0.6001.22292_none_4b2b163f056ebb45\PortableDeviceApi.dll
    + 2008-10-22 03:34:55 94,720 ----a-w c:\windows\winsxs\x86_microsoft-windows-wpd-portabledeviceapi_31bf3856ad364e35_6.0.6001.22292_none_4b2b163f056ebb45\PortableDeviceClassExtension.dll
    + 2008-10-22 03:34:55 160,768 ----a-w c:\windows\winsxs\x86_microsoft-windows-wpd-portabledeviceapi_31bf3856ad364e35_6.0.6001.22292_none_4b2b163f056ebb45\PortableDeviceTypes.dll
    .
    -- Snapshot reset to current date --
    .
    ((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
    .
    .
    *Note* empty entries & legit default entries are not shown
    REGEDIT4

    [HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shelliconoverlayidentifiers\UEAFOverlay]
    @="{F2F31467-B1AC-4df0-AE79-FD5FA085E22B}"
    [HKEY_CLASSES_ROOT\CLSID\{F2F31467-B1AC-4df0-AE79-FD5FA085E22B}]
    2006-12-03 18:03 2854912 --a------ c:\program files\Protector Suite QL\farchns.dll

    [HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shelliconoverlayidentifiers\UEAFOverlayOpen]
    @="{A3E208F7-0E3A-4182-A7A6-B169D5D691AA}"
    [HKEY_CLASSES_ROOT\CLSID\{A3E208F7-0E3A-4182-A7A6-B169D5D691AA}]
    2006-12-03 18:03 2854912 --a------ c:\program files\Protector Suite QL\farchns.dll

    [HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
    "EA Core"="c:\program files\Electronic Arts\EADM\Core.exe" [2008-07-21 2752512]

    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
    "AVG8_TRAY"="c:\progra~1\AVG\AVG8\avgtray.exe" [2008-11-27 1261336]
    "NvCplDaemon"="c:\windows\system32\NvCpl.dll" [2008-10-22 13675040]
    "NvMediaCenter"="c:\windows\system32\NvMcTray.dll" [2008-10-22 92704]

    [HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\system]
    "EnableLUA"= 0 (0x0)
    "DisableCAD"= 1 (0x1)
    "EnableUIADesktopToggle"= 0 (0x0)

    [HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\psfus]
    2006-12-03 17:50 90112 c:\windows\System32\psqlpwd.dll

    [HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\windows]
    "AppInit_DLLs"=avgrsstx.dll

    [HKEY_LOCAL_MACHINE\system\currentcontrolset\control\lsa]
    Notification Packages REG_MULTI_SZ scecli psqlpwd

    [HKLM\~\startupfolder\C:^ProgramData^Microsoft^Windows^Start Menu^Programs^Startup^Adobe Reader Speed Launch.lnk]
    backup=c:\windows\pss\Adobe Reader Speed Launch.lnk.CommonStartup
    backupExtension=.CommonStartup

    [HKLM\~\startupfolder\C:^ProgramData^Microsoft^Windows^Start Menu^Programs^Startup^ymetray.lnk]
    backup=c:\windows\pss\ymetray.lnk.CommonStartup
    backupExtension=.CommonStartup

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\00TCrdMain]
    --a------ 2006-12-15 17:59 530552 c:\program files\Toshiba\FlashCards\TCrdMain.exe

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\HSON]
    --a------ 2006-12-07 18:49 55416 c:\program files\Toshiba\TBS\HSON.exe

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\PINGER]
    --a------ 2006-07-20 14:45 151552 c:\toshiba\IVP\ISM\pinger.exe

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\SmoothView]
    --a------ 2006-12-11 19:45 448632 c:\program files\Toshiba\SmoothView\SmoothView.exe

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\TPwrMain]
    --a------ 2006-12-20 01:16 411768 c:\program files\Toshiba\Power Saver\TPwrMain.exe

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\updateMgr]
    -ra------ 2006-03-30 15:45 313472 c:\program files\Adobe\Acrobat 7.0\Reader\AdobeUpdateManager.exe

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Windows Defender]
    --a------ 2008-01-19 01:38 1008184 c:\program files\Windows Defender\MSASCui.exe

    [HKEY_LOCAL_MACHINE\software\microsoft\security center]
    "UpdatesDisableNotify"=dword:00000001

    [HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\McAfeeAntiSpyware]
    "DisableMonitoring"=dword:00000001

    [HKEY_LOCAL_MACHINE\software\microsoft\security center\Svc]
    "AntiSpywareOverride"=dword:00000001

    [HKEY_LOCAL_MACHINE\software\microsoft\security center\Svc\S-1-5-21-522854213-1344089828-1915909241-1000]
    "EnableNotificationsRef"=dword:00000001

    [HKLM\~\services\sharedaccess\parameters\firewallpolicy\FirewallRules]
    "{24433AC1-4A33-4813-95CD-5E93ACE2457C}"= UDP:c:\program files\Common Files\McAfee\MNA\McNASvc.exe:McAfee Network Agent
    "{4C376BCA-BDCF-46A9-AA0E-D5FEAFFC6A3B}"= UDP:c:\program files\Yahoo!\Yahoo! Music Jukebox\YahooMusicEngine.exe:Yahoo! Music Jukebox
    "{06B53753-3FEE-44AD-A1DF-9A77DCDC9FBE}"= TCP:c:\program files\Yahoo!\Yahoo! Music Jukebox\YahooMusicEngine.exe:Yahoo! Music Jukebox
    "{834D088C-B39E-4191-8CEB-5B9AEEDD716A}"= UDP:c:\program files\Microsoft Office\Office12\ONENOTE.EXE:Microsoft Office OneNote
    "{9B3BAC9F-1CEA-43C4-97A8-9EE86F9F5D7F}"= TCP:c:\program files\Microsoft Office\Office12\ONENOTE.EXE:Microsoft Office OneNote
    "TCP Query User{215A4379-103F-4718-A62C-CC24EC976F94}c:\\program files\\warcraft iii\\war3.exe"= UDP:c:\program files\warcraft iii\war3.exe:Warcraft III
    "UDP Query User{1094E7CB-7547-44F0-8321-2AB93BBAF4E0}c:\\program files\\warcraft iii\\war3.exe"= TCP:c:\program files\warcraft iii\war3.exe:Warcraft III
    "{EDDE538C-CB7E-46BD-B2A2-3F104892FDD0}"= UDP:c:\program files\Warcraft III\Warcraft III.exe:Warcraft III
    "{BBB64935-7997-4206-941A-3FB63D6C2F0D}"= TCP:c:\program files\Warcraft III\Warcraft III.exe:Warcraft III
    "{51497833-D061-4DE5-8F5D-CFE72B7481B8}"= UDP:c:\program files\Warcraft III\Frozen Throne.exe:Warcraft III - The Frozen Throne
    "{41E3449C-5415-4CDB-8CF8-46E72AF4CD73}"= TCP:c:\program files\Warcraft III\Frozen Throne.exe:Warcraft III - The Frozen Throne
    "{385D3138-883D-46A1-870D-062310DE70E4}"= UDP:c:\program files\Common Files\AOL\Loader\aolload.exe:AOL Loader
    "{BD5FD5A2-CE32-4F5B-A820-0CA9A2428E74}"= TCP:c:\program files\Common Files\AOL\Loader\aolload.exe:AOL Loader
    "TCP Query User{D45DCB1E-954A-4E05-91E1-54466C89027D}c:\\program files\\internet explorer\\iexplore.exe"= UDP:c:\program files\internet explorer\iexplore.exe:Internet Explorer
    "UDP Query User{CB203017-6857-4924-A4CF-1936BBEDA04F}c:\\program files\\internet explorer\\iexplore.exe"= TCP:c:\program files\internet explorer\iexplore.exe:Internet Explorer
    "{1044FF6C-0566-4364-9EAD-B4FE5AD1C0B1}"= UDP:c:\users\Public\World of Warcraft\WoW-2.2.0.7272-to-2.2.2.7318-enUS-downloader.exe:Blizzard Downloader
    "{8AFDEBFF-72F0-449E-AC43-9F71357B5CA4}"= TCP:c:\users\Public\World of Warcraft\WoW-2.2.0.7272-to-2.2.2.7318-enUS-downloader.exe:Blizzard Downloader
    "TCP Query User{09A750E8-0CD5-4BCD-B46F-AB70D3243FF9}c:\\program files\\microsoft games\\dungeon siege\\dungeonsiege.exe"= UDP:c:\program files\microsoft games\dungeon siege\dungeonsiege.exe:Dungeon Siege Game Executable
    "UDP Query User{22C50DBA-6BCD-4B2F-9BD3-A1D138C25B84}c:\\program files\\microsoft games\\dungeon siege\\dungeonsiege.exe"= TCP:c:\program files\microsoft games\dungeon siege\dungeonsiege.exe:Dungeon Siege Game Executable
    "{D66E58B8-D0AB-4A81-836F-371959BA4E36}"= UDP:c:\users\Public\World of Warcraft\BackgroundDownloader.exe:Blizzard Downloader
    "{2F0D43A7-2BCE-4BB0-9548-A9A89D75628B}"= TCP:c:\users\Public\World of Warcraft\BackgroundDownloader.exe:Blizzard Downloader
    "{BA80ABFE-C0C5-4998-AE8D-5B37198C6616}"= UDP:3724:Blizzard Downloader: 3724
    "{5C847171-3D8E-498C-8C30-6F9466B35312}"= c:\program files\Windows Live\Messenger\livecall.exe:Windows Live Messenger (Phone)
    "{915DA043-1705-4430-8206-DAF14654519A}"= UDP:c:\program files\Unreal Tournament 3\Binaries\UT3.exe:Unreal Tournament 3
    "{023115A5-35E0-4717-BF80-8295669B4BB6}"= TCP:c:\program files\Unreal Tournament 3\Binaries\UT3.exe:Unreal Tournament 3
    "{CEDB1986-6431-4F1E-BCDE-6B4B689E75C2}"= UDP:c:\program files\Diablo II\Diablo II.exe:Diablo II - Lord of Destruction
    "{EC48C02A-0DFA-4340-9EDA-992B5F1415F7}"= TCP:c:\program files\Diablo II\Diablo II.exe:Diablo II - Lord of Destruction
    "{FEEA2694-E6A8-4982-ACF8-FF5DB3919AB9}"= c:\program files\Windows Live\Messenger\livecall.exe:Windows Live Messenger (Phone)
    "TCP Query User{2A8E0A2D-3112-4090-95E6-3AF552173AE8}c:\\program files\\electronic arts\\eadm\\core.exe"= UDP:c:\program files\electronic arts\eadm\core.exe:EA Download Manager
    "UDP Query User{DB2C6395-07E1-414E-BA32-B05996098362}c:\\program files\\electronic arts\\eadm\\core.exe"= TCP:c:\program files\electronic arts\eadm\core.exe:EA Download Manager
    "{BC051E9C-7A05-435E-ACE4-3E0E771A3235}"= UDP:c:\program files\Diablo II\Diablo II.exe:Diablo II - Lord of Destruction
    "{909E6A5E-2403-4963-9E2D-DB1E2FBD87ED}"= TCP:c:\program files\Diablo II\Diablo II.exe:Diablo II - Lord of Destruction
    "{10DF9718-7B7B-4AB0-9D18-18C34F5C73B0}"= c:\program files\AVG\AVG8\avgemc.exe:avgemc.exe
    "{0C6A328F-13CF-42FF-81A5-04F20F00EF64}"= c:\program files\AVG\AVG8\avgupd.exe:avgupd.exe
    "TCP Query User{C70EB7AE-2E3F-4B54-A95F-BB9B4CA23C84}c:\\users\\mysweetbunny\\appdata\\roaming\\macromedia\\flash player\\www.macromedia.com\\bin\\octoshape\\octoshape.exe"= UDP:c:\users\mysweetbunny\appdata\roaming\macromedia\flash player\http://www.macromedia.com\bin\octosh...:octoshape.exe
    "UDP Query User{C3CFD078-12AC-4403-95BC-256F04F294C4}c:\\users\\mysweetbunny\\appdata\\roaming\\macromedia\\flash player\\www.macromedia.com\\bin\\octoshape\\octoshape.exe"= TCP:c:\users\mysweetbunny\appdata\roaming\macromedia\flash player\http://www.macromedia.com\bin\octosh...:octoshape.exe
    "{DB332564-5F30-4D05-BA24-D8BA2B8FCA9A}"= UDP:c:\windows\explorer.exe:Explorer
    "{1D025813-91A0-4D30-AE13-617F26972088}"= TCP:c:\windows\explorer.exe:Explorer
    "{79750498-5B32-4498-AA3A-4C682458E5AA}"= UDP:c:\windows\explorer.exe:Explorer
    "{964FD7A6-D8D8-41D1-AF89-9906319B235A}"= TCP:c:\windows\explorer.exe:Explorer
    "{87E3F3FF-BA4E-496C-9259-84E20CCAE35F}"= UDP:c:\windows\System32\dwm.exe:Dwm
    "{FE32EF8A-6BAF-427D-927A-590B4EB5EDA1}"= TCP:c:\windows\System32\dwm.exe:Dwm
    "{9BF926F0-91FE-453A-A4DF-C112D31A8291}"= UDP:c:\windows\System32\LogonUI.exe:LogonUI
    "{8E58035B-4F38-4156-8755-2FECBA39C564}"= TCP:c:\windows\System32\LogonUI.exe:LogonUI
    "{41CFC8FF-9348-4673-8A33-BE8F453C2AF3}"= UDP:c:\windows\System32\wininit.exe:wininit
    "{2ED6E9CE-7FED-4E19-81EA-1C78EF86A230}"= TCP:c:\windows\System32\wininit.exe:wininit
    "{9A009F5E-75D5-46C8-BCCA-B9DB5B757401}"= UDP:c:\windows\System32\wininit.exe:wininit
    "{C98C61CE-1B81-4DFA-8D97-94FA9A99B58E}"= TCP:c:\windows\System32\wininit.exe:wininit
    "{50386947-031D-4406-9DEB-E056E944A695}"= UDP:c:\program files\AVG\AVG8\avgrsx.exe:avgrsx
    "{E07582D9-9E52-4F58-B48B-778E684E7281}"= TCP:c:\program files\AVG\AVG8\avgrsx.exe:avgrsx
    "{56F653CE-E784-4A2B-8D2D-3A60B5A4B52E}"= UDP:c:\unreal\System\Unreal.exe:Unreal
    "{ECF67E69-67EB-479C-A397-A55E75190A4D}"= TCP:c:\unreal\System\Unreal.exe:Unreal

    [HKLM\~\services\sharedaccess\parameters\firewallpolicy\StandardProfile\AuthorizedApplications\List]
    "c:\\TOSHIBA\\ivp\\NetInt\\Netint.exe"= c:\toshiba\ivp\NetInt\Netint.exe:*:Enabled:NIE - Toshiba Software Upgrades Engine
    "c:\\TOSHIBA\\Ivp\\ISM\\pinger.exe"= c:\toshiba\Ivp\ISM\pinger.exe:*:Enabled:Toshiba Software Upgrades Pinger

    R1 AvgLdx86;AVG Free AVI Loader Driver x86;c:\windows\system32\Drivers\avgldx86.sys [2008-11-03 97928]
    R2 avg8emc;AVG Free8 E-mail Scanner;c:\progra~1\AVG\AVG8\avgemc.exe [2008-11-03 875288]
    R2 avg8wd;AVG Free8 WatchDog;c:\progra~1\AVG\AVG8\avgwdsvc.exe [2008-11-03 231704]
    R3 AvgWfpX;AVG Free8 Firewall Driver x86;c:\windows\system32\Drivers\avgwfpx.sys [2008-11-03 69128]
    R3 BoiHwsetup;Access 32bits INT15 routine;c:\windows\system32\drivers\BoiHwSetup.sys [2006-10-12 7680]
    R3 qkbfiltr;Keyboard Filter Driver;c:\windows\system32\DRIVERS\qkbfiltr.sys [2006-11-20 33792]

    [HKEY_LOCAL_MACHINE\software\microsoft\active setup\installed components\{7070D8E0-650A-46b3-B03C-9497582E6A74}]
    %SystemRoot%\system32\soundschemes.exe /AddRegistration

    [HKEY_LOCAL_MACHINE\software\microsoft\active setup\installed components\{B3688A53-AB2A-4b1d-8CEF-8F93D8C51C24}]
    %SystemRoot%\system32\soundschemes2.exe /AddRegistration
    .
    Contents of the 'Scheduled Tasks' folder

    2008-12-03 c:\windows\Tasks\User_Feed_Synchronization-{CBFF64F7-E5DB-4768-BE6B-B5411FE092C3}.job
    - c:\windows\system32\msfeedssync.exe [2008-01-19 01:33]
    .

    **************************************************************************

    catchme 0.3.1367 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
    Rootkit scan 2008-12-03 06:34:31
    Windows 6.0.6001 Service Pack 1 NTFS

    scanning hidden processes ...

    scanning hidden autostart entries ...

    scanning hidden files ...


    **************************************************************************
    .
    --------------------- DLLs Loaded Under Running Processes ---------------------

    - - - - - - - > 'lsass.exe'(680)
    c:\windows\system32\psqlpwd.dll
    c:\program files\Protector Suite QL\homefus2.dll
    c:\program files\Protector Suite QL\infra.dll

    - - - - - - - > 'Explorer.exe'(3960)
    c:\program files\Protector Suite QL\farchns.dll
    c:\program files\Protector Suite QL\infra.dll
    .
    ------------------------ Other Running Processes ------------------------
    .
    c:\windows\System32\nvvsvc.exe
    c:\windows\System32\audiodg.exe
    c:\windows\System32\rundll32.exe
    c:\program files\Protector Suite QL\upeksvr.exe
    c:\program files\Lavasoft\Ad-Aware\aawservice.exe
    c:\windows\System32\WerFault.exe
    c:\program files\AVG\AVG8\avgtray.exe
    c:\windows\System32\rundll32.exe
    c:\combofix\hidec.exe
    c:\program files\Toshiba\ConfigFree\CFSvcs.exe
    c:\toshiba\IVP\swupdate\swupdtmr.exe
    c:\windows\System32\TODDSrv.exe
    c:\program files\Toshiba\Power Saver\TosCoSrv.exe
    c:\windows\System32\drivers\XAudio.exe
    c:\progra~1\AVG\AVG8\avgrsx.exe
    c:\combofix\Catchme.tmp
    .
    **************************************************************************
    .
    Completion time: 2008-12-03 6:41:10 - machine was rebooted [MySweetBunny]
    ComboFix-quarantined-files.txt 2008-12-03 12:39:52
    ComboFix2.txt 2008-11-27 13:08:47

    Pre-Run: 81,527,230,464 bytes free
    Post-Run: 81,426,911,232 bytes free

    314 --- E O F --- 2008-12-01 17:18:30


    --------------------------------------------------------------------------

    Logfile of Trend Micro HijackThis v2.0.2
    Scan saved at 6:47:59 AM, on 12/3/2008
    Platform: Windows Vista SP1 (WinNT 6.00.1905)
    MSIE: Internet Explorer v7.00 (7.00.6001.18000)
    Boot mode: Normal

    Running processes:
    C:\Windows\system32\Dwm.exe
    C:\Windows\system32\taskeng.exe
    C:\Windows\System32\WerFault.exe
    C:\Windows\System32\rundll32.exe
    C:\Program Files\Electronic Arts\EADM\Core.exe
    C:\Windows\Explorer.exe
    C:\Windows\system32\notepad.exe
    C:\Program Files\Internet Explorer\iexplore.exe
    C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
    R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Local Page =
    R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Local Page =
    R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName =
    O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 7.0\ActiveX\AcroIEHelper.dll
    O2 - BHO: WormRadar.com IESiteBlocker.NavFilter - {3CA2F312-6F6E-4B53-A66E-4E65E497C8C0} - C:\Program Files\AVG\AVG8\avgssie.dll
    O2 - BHO: Spybot-S&D IE Protection - {53707962-6F74-2D53-2644-206D7942484F} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
    O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.6.0\bin\ssv.dll
    O2 - BHO: AVG Security Toolbar - {A057A204-BACC-4D26-9990-79A187E2698E} - C:\PROGRA~1\AVG\AVG8\AVGTOO~1.DLL
    O3 - Toolbar: (no name) - {0BF43445-2F28-4351-9252-17FE6E806AA0} - (no file)
    O3 - Toolbar: AVG Security Toolbar - {A057A204-BACC-4D26-9990-79A187E2698E} - C:\PROGRA~1\AVG\AVG8\AVGTOO~1.DLL
    O4 - HKLM\..\Run: [AVG8_TRAY] C:\PROGRA~1\AVG\AVG8\avgtray.exe
    O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\Windows\system32\NvCpl.dll,NvStartup
    O4 - HKLM\..\Run: [NvMediaCenter] RUNDLL32.EXE C:\Windows\system32\NvMcTray.dll,NvTaskbarInit
    O4 - HKCU\..\Run: [EA Core] C:\Program Files\Electronic Arts\EADM\Core.exe -silent
    O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~4\Office12\EXCEL.EXE/3000
    O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0\bin\ssv.dll
    O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0\bin\ssv.dll
    O9 - Extra button: (no name) - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
    O9 - Extra 'Tools' menuitem: Spybot - Search & Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
    O13 - Gopher Prefix:
    O16 - DPF: {02BF25D5-8C17-4B23-BC80-D3488ABDDC6B} - http://a1540.g.akamai.net/7/1540/52/...x/qtplugin.cab
    O18 - Protocol: linkscanner - {F274614C-63F8-47D5-A4D1-FBDDE494F8D1} - C:\Program Files\AVG\AVG8\avgpp.dll
    O20 - AppInit_DLLs: avgrsstx.dll
    O23 - Service: Lavasoft Ad-Aware Service (aawservice) - Lavasoft - C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe
    O23 - Service: AVG Free8 E-mail Scanner (avg8emc) - AVG Technologies CZ, s.r.o. - C:\PROGRA~1\AVG\AVG8\avgemc.exe
    O23 - Service: AVG Free8 WatchDog (avg8wd) - AVG Technologies CZ, s.r.o. - C:\PROGRA~1\AVG\AVG8\avgwdsvc.exe
    O23 - Service: ConfigFree Service (CFSvcs) - TOSHIBA CORPORATION - C:\Program Files\TOSHIBA\ConfigFree\CFSvcs.exe
    O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
    O23 - Service: NVIDIA Display Driver Service (nvsvc) - NVIDIA Corporation - C:\Windows\system32\nvvsvc.exe
    O23 - Service: Swupdtmr - Unknown owner - c:\Toshiba\IVP\swupdate\swupdtmr.exe
    O23 - Service: TOSHIBA Optical Disc Drive Service (TODDSrv) - TOSHIBA Corporation - C:\Windows\system32\TODDSrv.exe
    O23 - Service: TOSHIBA Power Saver (TosCoSrv) - TOSHIBA Corporation - C:\Program Files\Toshiba\Power Saver\TosCoSrv.exe
    O23 - Service: XAudioService - Conexant Systems, Inc. - C:\Windows\system32\DRIVERS\xaudio.exe

    --
    End of file - 4453 bytes

  6. #16
    Security Expert: Emeritus
    Join Date
    Oct 2006
    Location
    Finland
    Posts
    29,374

    Default

    That happens sometimes.

    Looks like it worked like it should anyway.

    Still some issues or are you ready for final instructions?
    Microsoft MVP Consumer Security 2008-2011

    Member of ASAP and UNITE since 2006

  7. #17
    Junior Member
    Join Date
    Nov 2008
    Posts
    26

    Default

    No issues, AVG ran an autoscan and moved the quarantined files Combofix found in the Qoobox directory to it's own quarantine folder.

  8. #18
    Security Expert: Emeritus
    Join Date
    Oct 2006
    Location
    Finland
    Posts
    29,374

    Default

    Now that you are clean, please follow these simple steps in order to keep your computer clean and secure:

    Please download JavaRa and unzip it to your desktop.

    ***Please close any instances of Internet Explorer before continuing!***

    • Double-click on JavaRa.exe to start the program.
    • From the drop-down menu, choose English and click on Select.
    • JavaRa will open; click on Remove Older Versions to remove the older versions of Java installed on your computer.
    • Click Yes when prompted. When JavaRa is done, a notice will appear that a logfile has been produced. Click OK.
    • A logfile will pop up. Please save it to a convenient location.


    Then download and install Java Runtime Environment (JRE) 6 Update 11.

    Looking over your log, it seems you don't have any evidence of a third party firewall.

    As the term conveys, a firewall is an extra layer of security installed onto computers, which restricts access to systems from the outside world. Firewalls protect against hackers and malicious intruders. I want you to download a free firewall NOW from one of these excellent vendors:

    1) Comodo (Uncheck during installation "Install COMODO Antivirus (Recommended)"!, "Install Comodo SafeSurf..", Make Comodo my default search provider" and "Make Comodo Search my homepage")
    2) Online Armor
    3) PC Tools
    4) Sunbelt/Kerio
    5) ZoneAlarm (uncheck ZoneAlarm Spy Blocker during installation if you choose this one)

    If you are using the built-in Windows XP firewall, it is not recommended as it does not block outgoing connections. This means that any malware on your computer is free to "phone home" for more instructions. Simply put, Windows XP contains a mediocre firewall. This firewall is NO replacement for a dedicated software solution. Remember to use only one firewall at the same time.

    Now lets uninstall ComboFix:

    • Click START then RUN
    • Now type Combofix /u in the runbox and click OK


    Next we remove all used tools.

    You can delete rsit and c:\rsit folder

    Please download OTCleanIt and save it to desktop.
    • Double-click OTCleanIt.exe.
    • Click the CleanUp! button.
    • Select Yes when the "Begin cleanup Process?" prompt appears.
    • If you are prompted to Reboot during the cleanup, select Yes.
    • The tool will delete itself once it finishes, if not delete it by yourself.


    Note: If you receive a warning from your firewall or other security programs regarding OTCleanIt attempting to contact the internet, please allow it to do so.

    • Disable and Enable System Restore. - If you are using Windows Vista then you should disable and re-enable system restore to make sure there are no infected files found in a restore point.

      You can find instructions on how to enable and re-enable system restore here:

      Windows Vista System Restore Guide


    Re-enable system restore with instructions from tutorial above

    • Make your Internet Explorer more secure - This can be done by following these simple instructions:
    • From within Internet Explorer click on the Tools menu and then click on Options.
    • Click once on the Security tab
    • Click once on the Internet icon so it becomes highlighted.
    • Click once on the Custom Level button.
    • Change the Download signed ActiveX controls to Prompt
    • Change the Download unsigned ActiveX controls to Disable
    • Change the Initialize and script ActiveX controls not marked as safe to Disable
    • Change the Installation of desktop items to Prompt
    • Change the Launching programs and files in an IFRAME to Prompt
    • Change the Navigate sub-frames across different domains to Prompt
    • When all these settings have been made, click on the OK button.
    • If it prompts you as to whether or not you want to save the settings, press the Yes button.
    • Next press the Apply button and then the OK to exit the Internet Properties page.


    • Update your AntiVirus Software and keep your other programs up-to-date Update your Antivirus programs and other security products regularly to avoid new threats that could infect your system.
      You can use one of these sites to check if any updates are needed for your pc.
      Secunia Software Inspector
      F-secure Health Check
    • Visit Microsoft's Windows Update Site Frequently - It is important that you visit http://www.windowsupdate.com regularly. This will ensure your computer has always the latest security updates available installed on your computer. If there are new updates to install, install them immediately, reboot your computer, and revisit the site until there are no more critical updates.
    • Install SpywareBlaster - SpywareBlaster will added a large list of programs and sites into your Internet Explorer settings that will protect you from running and downloading known malicious programs.

      A tutorial on installing & using this product can be found here:

      Using SpywareBlaster to protect your computer from Spyware and Malware

    • Update all these programs regularly - Make sure you update all the programs I have listed regularly. Without regular updates you WILL NOT be protected when new malicious programs are released.
    Follow this list and your potential for being infected again will reduce dramatically.

    Here are some additional utilities that will enhance your safety



    Stand Up and Be Counted ---> Malware Complaints <--- where you can make difference!

    The site offers people who have been (or are) victims of malware the opportunity to document their story and, in that way, launch a complaint against the malware and the makers of the malware.

    Also, please read this great article by Tony Klein So How Did I Get Infected In First Place

    Happy surfing and stay clean!
    Microsoft MVP Consumer Security 2008-2011

    Member of ASAP and UNITE since 2006

  9. #19
    Security Expert: Emeritus
    Join Date
    Oct 2006
    Location
    Finland
    Posts
    29,374

    Default

    Since this issue appears to be resolved ... this Topic has been closed. Glad I could help.

    Note: If it has been five days or more since your last post, and the helper assisting you posted a response to that post to which you did not reply, your topic will not be reopened. At that point, if you still require help, please start a new topic and include a fresh HijackThis log and a link to your previous thread.

    If it has been less than five days since your last response and you need the thread re-opened, please send me or your helper a private message (pm). A valid, working link to the closed topic is required.
    Microsoft MVP Consumer Security 2008-2011

    Member of ASAP and UNITE since 2006

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •