Page 3 of 4 FirstFirst 1234 LastLast
Results 21 to 30 of 36

Thread: Need help with malware removal

  1. #21
    Emeritus
    Join Date
    Aug 2007
    Posts
    1,875

    Default

    One other problem I had with IExplorer has disappeared, and that is, it would not start properly, and I needed to register, which it could not do. That happened after a microsoft upgrade, after which I disabled the auto updates.
    Try uninstalling then reinstalling/upgrading Internet Explorer to the latest version (IE 8) to see if that fixes the problem.



    Step # 1: Run CFScript

    • Please open Notepad (Start -> Run -> type notepad in the Open field -> OK) and copy and paste the text present inside the code box below:

      Code:
      KILLALL::
      
      DirLook::
      
      c:\documents and settings\All Users\Application Data\gCkNc07000
      
      Registry::
      
      [-HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecAntiVirus]
      [-HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecFirewall]
      
      DDS::
      
      TB: {0B53EAC3-8D69-4B9E-9B19-A37C9A5676A7} - No File
    • Save this as CFScript.txt and change the "Save as type" to "All Files" and place it on your desktop.







      Note: This CFScript is for use on pluuf's computer only! Do not use it on your computer.

    • Referring to the screenshot above, drag CFScript.txt into ComboFix.exe.
    • ComboFix will now run a scan on your system. It may reboot your system when it finishes. This is normal.
    • When finished, it shall produce a log for you. Copy and paste the contents of the log in your next reply.


    CAUTION: Do not mouse-click ComboFix's window while it is running. That may cause it to stall.




    Step # 2: Download and Run TDSSKiller

    • Download TDSSKiller.exe and save it to your desktop.
    • Double-click TDSSKiller.exe to run it.
    • Under "Objects to scan" ensure both "Services and Drivers" and "Boot Sectors" are checked.
    • Click Start scan and allow it to scan for Malicious objects.
    • If malicious objects are found, the default action will be Cure, ensure Cure is selected then click Continue.
    • If suspicious objects are detected, the default action will be Skip, ensure Skip is selected then click Continue.
    • It may ask you to reboot the computer to complete the process. Click on Reboot Now and allow the computer to reboot.
    • A log will be created on your root (usually C: ) drive. The log is like UtilityName.Version_Date_Time_log.txt.
      for example, C:\TDSSKiller.2.4.1.2_20.04.2010_15.31.43_log.txt
    • If no reboot is required, click on Report. A log file should appear.
    • Please post the contents of the logfile in your next reply


    If TDSSKiller does not reboot your computer, please reboot it.

    Once it has booted back up, do the following:

    ---------------

    Run Batchfile

    Please copy (Ctrl+C) and paste (Ctrl+V) the following text in the codebox to Notepad. Save it as "All Files" and name it mbrlog.bat Please save it on your desktop.

    Code:
    @echo off
    mbr.exe -t
    start mbr.log
    del %0
    Double click mbrlog.bat. A window will open and close. This is normal.



    In your next post/reply, I need to see the following:

    1. The ComboFix Log that appears after Step 1 has been completed.
    2. The TDSSKiller Log
    3. The mrblog.bat log/results
    4. A fresh DDS Log taken after Step 2 has been completed.

    Use multiple posts if you can't fit all the logs into one post.
    Malware Removal University Master
    Member of ASAP & UNITE

  2. #22
    Junior Member
    Join Date
    Jan 2011
    Posts
    27

    Default

    I followed all the directions. Something called pev.cfxxe and pev.exe complined with software exceptions during the ComboFix stage and with TDSSKiller svchost had the same issue. :biggrinsmiley:

    I hope that was all. The logs will follow in subsequent posts. I will also wait with IE8 upgrade until this computer is clean. You are a master indeed.

  3. #23
    Junior Member
    Join Date
    Jan 2011
    Posts
    27

    Default

    ComboFix 11-01-20.04 - Robert Prinsen 21/01/2011 18:21:01.2.1 - x86
    Microsoft Windows XP Professional 5.1.2600.3.1252.44.1033.18.447.129 [GMT 0:00]
    Running from: c:\documents and settings\Robert Prinsen.TOSHA60RPP\Desktop\Pluuf.exe
    Command switches used :: c:\documents and settings\Robert Prinsen.TOSHA60RPP\Desktop\CFScript.txt
    AV: AntiVir Desktop *Disabled/Updated* {AD166499-45F9-482A-A743-FDD3350758C7}
    .
    PEV Error: AppFolder

    ((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
    .

    Infected copy of c:\windows\system32\Drivers\atapi.sys was found and disinfected
    Restored copy from - c:\windows\ERDNT\cache\atapi.sys

    .
    ((((((((((((((((((((((((( Files Created from 2010-12-21 to 2011-01-21 )))))))))))))))))))))))))))))))
    .

    2011-01-19 21:18 . 2011-01-19 21:18 -------- d-----w- c:\documents and settings\Robert Prinsen.TOSHA60RPP\Application Data\Avira
    2011-01-19 21:06 . 2010-12-13 08:40 61960 ----a-w- c:\windows\system32\drivers\avgntflt.sys
    2011-01-19 21:06 . 2010-12-13 08:40 135096 ----a-w- c:\windows\system32\drivers\avipbb.sys
    2011-01-19 21:06 . 2010-06-17 14:27 45416 ----a-w- c:\windows\system32\drivers\avgntdd.sys
    2011-01-19 21:06 . 2010-06-17 14:27 22360 ----a-w- c:\windows\system32\drivers\avgntmgr.sys
    2011-01-19 21:06 . 2011-01-19 21:06 -------- d-----w- c:\program files\Avira
    2011-01-19 21:06 . 2011-01-19 21:06 -------- d-----w- c:\documents and settings\All Users\Application Data\Avira
    2011-01-16 21:30 . 2011-01-16 21:30 -------- d-----w- c:\program files\ESET
    2011-01-16 19:48 . 2011-01-16 19:48 -------- d-----w- C:\KeepDeletedItems
    2011-01-16 16:11 . 2011-01-16 16:11 -------- d-----w- c:\documents and settings\Robert Prinsen.TOSHA60RPP\Application Data\Malwarebytes
    2011-01-16 16:11 . 2010-12-20 18:09 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
    2011-01-16 16:11 . 2011-01-16 16:11 -------- d-----w- c:\documents and settings\All Users\Application Data\Malwarebytes
    2011-01-16 16:11 . 2011-01-16 16:11 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
    2011-01-16 16:11 . 2010-12-20 18:08 20952 ----a-w- c:\windows\system32\drivers\mbam.sys
    2011-01-16 13:37 . 2011-01-16 13:37 -------- d-----w- c:\program files\ERUNT
    2011-01-12 23:09 . 2011-01-12 23:10 -------- d-----w- c:\documents and settings\NetworkService\Local Settings\Application Data\Adobe
    2011-01-12 20:38 . 2011-01-12 20:38 -------- d-----w- c:\documents and settings\Robert\Application Data\Apple Computer
    2011-01-12 20:38 . 2011-01-12 20:38 -------- d-----w- c:\documents and settings\Robert\Local Settings\Application Data\Apple Computer
    2011-01-09 04:16 . 2011-01-09 04:16 -------- d-----w- c:\windows\system32\wbem\Repository
    2011-01-09 03:38 . 2011-01-09 04:16 -------- d-----w- c:\documents and settings\All Users\Application Data\gCkNc07000

    .
    (((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
    .
    2010-11-29 17:38 . 2010-11-29 17:38 94208 ----a-w- c:\windows\system32\QuickTimeVR.qtx
    2010-11-29 17:38 . 2010-11-29 17:38 69632 ----a-w- c:\windows\system32\QuickTime.qts
    .

    (((((((((((((((((((((((((((((((((((((((((((( Look )))))))))))))))))))))))))))))))))))))))))))))))))))))))))
    .
    ---- Directory of c:\documents and settings\All Users\Application Data\gCkNc07000 ----

    2011-01-09 03:38 . 2011-01-09 04:02 94 ----a-w- c:\documents and settings\All Users\Application Data\gCkNc07000\gCkNc07000


    ((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
    .
    .
    *Note* empty entries & legit default entries are not shown
    REGEDIT4

    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
    "SynTPLpr"="c:\program files\Synaptics\SynTP\SynTPLpr.exe" [2004-04-22 98304]
    "SynTPEnh"="c:\program files\Synaptics\SynTP\SynTPEnh.exe" [2004-04-22 507904]
    "AGRSMMSG"="AGRSMMSG.exe" [2004-02-20 88363]
    "THotkey"="c:\program files\Toshiba\Toshiba Applet\thotkey.exe" [2004-08-16 430080]
    "TPSMain"="TPSMain.exe" [2004-08-11 266240]
    "NDSTray.exe"="NDSTray.exe" [BU]
    "SmoothView"="c:\program files\TOSHIBA\TOSHIBA Zooming Utility\SmoothView.exe" [2004-04-27 118784]
    "PadTouch"="c:\program files\TOSHIBA\PadTouch\PadExe.exe" [2004-02-12 1019904]
    "Adobe Reader Speed Launcher"="c:\program files\Adobe\Reader 9.0\Reader\Reader_sl.exe" [2009-12-22 35760]
    "Adobe ARM"="c:\program files\Common Files\Adobe\ARM\1.0\AdobeARM.exe" [2009-12-11 948672]
    "QuickTime Task"="c:\program files\QuickTime\QTTask.exe" [2010-11-29 421888]
    "iTunesHelper"="c:\program files\iTunes\iTunesHelper.exe" [2010-12-13 421160]
    "avgnt"="c:\program files\Avira\AntiVir Desktop\avgnt.exe" [2010-12-13 281768]

    [HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring]
    "DisableMonitoring"=dword:00000001

    [HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]
    "EnableFirewall"= 0 (0x0)

    [HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
    "%windir%\\system32\\sessmgr.exe"=
    "%windir%\\Network Diagnostic\\xpnetdiag.exe"=
    "c:\\Program Files\\Bonjour\\mDNSResponder.exe"=
    "c:\\Program Files\\iTunes\\iTunes.exe"=

    R0 atiide;atiide;c:\windows\system32\drivers\atiide.sys [24/08/2004 09:52 5632]
    R2 AntiVirSchedulerService;Avira AntiVir Scheduler;c:\program files\Avira\AntiVir Desktop\sched.exe [19/01/2011 21:06 135336]
    R2 ns80503;ns80503;c:\windows\system32\ns80503.sys [18/02/2009 23:50 42296]
    R2 nsverctl;NetScaler SSL VPN Version Control;c:\program files\NetScaler\NetScaler Secure Remote Access\nsverctl.exe [18/02/2009 23:50 53248]
    R3 Net6IM;Net6;c:\windows\system32\drivers\net6im51.sys [18/02/2009 23:50 43640]
    R3 WPC54GSv1;Linksys Wireless Notebook Adapter WPC54GSv1 Driver;c:\windows\system32\drivers\WPC54GSv1.SYS [30/11/2006 22:54 610816]
    S3 EraserUtilRebootDrv;EraserUtilRebootDrv;\??\c:\program files\Common Files\Symantec Shared\EENGINE\EraserUtilRebootDrv.sys --> c:\program files\Common Files\Symantec Shared\EENGINE\EraserUtilRebootDrv.sys [?]
    .
    .
    ------- Supplementary Scan -------
    .
    uStart Page = hxxp://oudebekenden.forum2go.nl/
    uInternet Settings,ProxyOverride = 127.0.0.1;*.local
    IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~2\OFFICE11\EXCEL.EXE/3000
    DPF: Microsoft XML Parser for Java - file:///C:/WINDOWS/Java/classes/xmldso.cab
    DPF: {04897B74-BBBE-46E5-9550-5C487F39C2E4} - hxxp://support.informatica.com/atlas/19227/applets/SiebelAx_OutBound_mail.cab
    DPF: {8C244272-1DC1-4CE7-9C6C-FABCA09EB543} - hxxp://support.informatica.com/atlas/19227/applets/SiebelAx_Desktop_Integration.cab
    DPF: {93A85BE8-6137-4E48-BBC8-E78E27035DB0} - hxxp://support.informatica.com/atlas/19227/applets/SiebelAx_HI_Client.cab
    .

    **************************************************************************

    catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
    Rootkit scan 2011-01-21 18:43
    Windows 5.1.2600 Service Pack 3 NTFS

    scanning hidden processes ...

    scanning hidden autostart entries ...

    scanning hidden files ...

    scan completed successfully
    hidden files: 0

    **************************************************************************
    .
    --------------------- DLLs Loaded Under Running Processes ---------------------

    - - - - - - - > 'winlogon.exe'(688)
    c:\windows\system32\WININET.dll
    c:\windows\system32\Ati2evxx.dll

    - - - - - - - > 'lsass.exe'(748)
    c:\windows\system32\WININET.dll

    - - - - - - - > 'explorer.exe'(2372)
    c:\windows\system32\WININET.dll
    c:\program files\iTunes\iTunesMiniPlayer.dll
    c:\program files\iTunes\iTunesMiniPlayer.Resources\en.lproj\iTunesMiniPlayerLocalized.dll
    c:\program files\iTunes\iTunesMiniPlayer.Resources\iTunesMiniPlayer.dll
    c:\windows\system32\ieframe.dll
    c:\windows\system32\WPDShServiceObj.dll
    c:\windows\system32\TPwrCfg.DLL
    c:\windows\system32\TPwrReg.dll
    c:\windows\system32\TPSTrace.DLL
    c:\windows\system32\PortableDeviceTypes.dll
    c:\windows\system32\PortableDeviceApi.dll
    .
    ------------------------ Other Running Processes ------------------------
    .
    c:\windows\system32\ACS.exe
    c:\program files\Avira\AntiVir Desktop\avguard.exe
    c:\program files\Bonjour\mDNSResponder.exe
    c:\program files\TOSHIBA\ConfigFree\CFSvcs.exe
    c:\program files\Avira\AntiVir Desktop\avshadow.exe
    c:\program files\iPod\bin\iPodService.exe
    c:\program files\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE
    c:\program files\Linksys\Wireless-G Notebook Adapter\NICServ.exe
    c:\windows\system32\wscntfy.exe
    c:\windows\AGRSMMSG.exe
    c:\windows\system32\TPSMain.exe
    c:\program files\TOSHIBA\ConfigFree\NDSTray.exe
    c:\windows\system32\TPSBattM.exe
    .
    **************************************************************************
    .
    Completion time: 2011-01-21 18:51:13 - machine was rebooted
    ComboFix-quarantined-files.txt 2011-01-21 18:51

    Pre-Run: 40,361,074,688 bytes free
    Post-Run: 40,381,181,952 bytes free

    WindowsXP-KB310994-SP2-Pro-BootDisk-ENU.exe
    [boot loader]
    timeout=2
    default=multi(0)disk(0)rdisk(0)partition(1)\WINDOWS
    [operating systems]
    c:\cmdcons\BOOTSECT.DAT="Microsoft Windows Recovery Console" /cmdcons
    UnsupportedDebug="do not select this" /debug
    multi(0)disk(0)rdisk(0)partition(1)\WINDOWS="Microsoft Windows XP Professional" /noexecute=optin /fastdetect

    - - End Of File - - 8FD429B37E3BF1C26547E0A38CBA6B67

  4. #24
    Junior Member
    Join Date
    Jan 2011
    Posts
    27

    Default

    2011/01/21 19:01:31.0625 TDSS rootkit removing tool 2.4.14.0 Jan 18 2011 09:33:51
    2011/01/21 19:01:31.0625 ================================================================================
    2011/01/21 19:01:31.0625 SystemInfo:
    2011/01/21 19:01:31.0625
    2011/01/21 19:01:31.0625 OS Version: 5.1.2600 ServicePack: 3.0
    2011/01/21 19:01:31.0625 Product type: Workstation
    2011/01/21 19:01:31.0625 ComputerName: TOSHA60RPP
    2011/01/21 19:01:31.0625 UserName: Robert Prinsen
    2011/01/21 19:01:31.0625 Windows directory: C:\WINDOWS
    2011/01/21 19:01:31.0625 System windows directory: C:\WINDOWS
    2011/01/21 19:01:31.0625 Processor architecture: Intel x86
    2011/01/21 19:01:31.0625 Number of processors: 1
    2011/01/21 19:01:31.0625 Page size: 0x1000
    2011/01/21 19:01:31.0625 Boot type: Normal boot
    2011/01/21 19:01:31.0625 ================================================================================
    2011/01/21 19:01:32.0140 Initialize success
    2011/01/21 19:02:03.0828 ================================================================================
    2011/01/21 19:02:03.0828 Scan started
    2011/01/21 19:02:03.0828 Mode: Manual;
    2011/01/21 19:02:03.0828 ================================================================================
    2011/01/21 19:02:05.0078 ACPI (8fd99680a539792a30e97944fdaecf17) C:\WINDOWS\system32\DRIVERS\ACPI.sys
    2011/01/21 19:02:05.0203 ACPIEC (9859c0f6936e723e4892d7141b1327d5) C:\WINDOWS\system32\DRIVERS\ACPIEC.sys
    2011/01/21 19:02:05.0406 aec (8bed39e3c35d6a489438b8141717a557) C:\WINDOWS\system32\drivers\aec.sys
    2011/01/21 19:02:05.0656 AFD (7e775010ef291da96ad17ca4b17137d7) C:\WINDOWS\System32\drivers\afd.sys
    2011/01/21 19:02:05.0875 AgereSoftModem (052343cd49c8da20c48958cfe73c7d44) C:\WINDOWS\system32\DRIVERS\AGRSM.sys
    2011/01/21 19:02:06.0296 ALCXSENS (ba88534a3ceb6161e7432438b9ea4f54) C:\WINDOWS\system32\drivers\ALCXSENS.SYS
    2011/01/21 19:02:06.0515 ALCXWDM (69cbb79ccccb7ab08f5e00109e9703bd) C:\WINDOWS\system32\drivers\ALCXWDM.SYS
    2011/01/21 19:02:06.0765 AR5211 (466708ae500e11cfa56483ee7fb9ad11) C:\WINDOWS\system32\DRIVERS\ar5211.sys
    2011/01/21 19:02:07.0015 Arp1394 (b5b8a80875c1dededa8b02765642c32f) C:\WINDOWS\system32\DRIVERS\arp1394.sys
    2011/01/21 19:02:07.0296 AsyncMac (b153affac761e7f5fcfa822b9c4e97bc) C:\WINDOWS\system32\DRIVERS\asyncmac.sys
    2011/01/21 19:02:07.0421 atapi (9f3a2f5aa6875c72bf062c712cfa2674) C:\WINDOWS\system32\DRIVERS\atapi.sys
    2011/01/21 19:02:07.0625 ati2mtag (dcd26b36ce305b718e2f1c56c19df668) C:\WINDOWS\system32\DRIVERS\ati2mtag.sys
    2011/01/21 19:02:07.0890 atiide (899c9f94ed5ec5eff71aa6e17a084419) C:\WINDOWS\system32\DRIVERS\atiide.sys
    2011/01/21 19:02:08.0015 Atmarpc (9916c1225104ba14794209cfa8012159) C:\WINDOWS\system32\DRIVERS\atmarpc.sys
    2011/01/21 19:02:08.0171 audstub (d9f724aa26c010a217c97606b160ed68) C:\WINDOWS\system32\DRIVERS\audstub.sys
    2011/01/21 19:02:08.0500 avgio (0b497c79824f8e1bf22fa6aacd3de3a0) C:\Program Files\Avira\AntiVir Desktop\avgio.sys
    2011/01/21 19:02:08.0703 avgntflt (47b879406246ffdced59e18d331a0e7d) C:\WINDOWS\system32\DRIVERS\avgntflt.sys
    2011/01/21 19:02:08.0828 avipbb (da39805e2bad99d37fce9477dd94e7f2) C:\WINDOWS\system32\DRIVERS\avipbb.sys
    2011/01/21 19:02:08.0984 BCM43XX (e7debb46b9ef1f28932e533be4a3d1a9) C:\WINDOWS\system32\DRIVERS\bcmwl5.sys
    2011/01/21 19:02:09.0187 Beep (da1f27d85e0d1525f6621372e7b685e9) C:\WINDOWS\system32\drivers\Beep.sys
    2011/01/21 19:02:09.0375 caboagp (906fcf0d1dc5b573015bbd21ef54bd88) C:\WINDOWS\system32\DRIVERS\atisgkaf.sys
    2011/01/21 19:02:09.0500 cbidf2k (90a673fc8e12a79afbed2576f6a7aaf9) C:\WINDOWS\system32\drivers\cbidf2k.sys
    2011/01/21 19:02:09.0609 CBTNDIS5 (181b4a19965024a2afa01fa2102b2a2d) C:\WINDOWS\system32\CBTNDIS5.SYS
    2011/01/21 19:02:09.0859 Cdaudio (c1b486a7658353d33a10cc15211a873b) C:\WINDOWS\system32\drivers\Cdaudio.sys
    2011/01/21 19:02:09.0984 Cdfs (c885b02847f5d2fd45a24e219ed93b32) C:\WINDOWS\system32\drivers\Cdfs.sys
    2011/01/21 19:02:10.0156 Cdrom (1f4260cc5b42272d71f79e570a27a4fe) C:\WINDOWS\system32\DRIVERS\cdrom.sys
    2011/01/21 19:02:10.0453 CmBatt (0f6c187d38d98f8df904589a5f94d411) C:\WINDOWS\system32\DRIVERS\CmBatt.sys
    2011/01/21 19:02:10.0609 Compbatt (6e4c9f21f0fae8940661144f41b13203) C:\WINDOWS\system32\DRIVERS\compbatt.sys
    2011/01/21 19:02:11.0093 Disk (044452051f3e02e7963599fc8f4f3e25) C:\WINDOWS\system32\DRIVERS\disk.sys
    2011/01/21 19:02:11.0343 dmboot (d992fe1274bde0f84ad826acae022a41) C:\WINDOWS\system32\drivers\dmboot.sys
    2011/01/21 19:02:11.0515 dmio (7c824cf7bbde77d95c08005717a95f6f) C:\WINDOWS\system32\drivers\dmio.sys
    2011/01/21 19:02:11.0640 dmload (e9317282a63ca4d188c0df5e09c6ac5f) C:\WINDOWS\system32\drivers\dmload.sys
    2011/01/21 19:02:11.0828 DMusic (8a208dfcf89792a484e76c40e5f50b45) C:\WINDOWS\system32\drivers\DMusic.sys
    2011/01/21 19:02:12.0000 drmkaud (8f5fcff8e8848afac920905fbd9d33c8) C:\WINDOWS\system32\drivers\drmkaud.sys
    2011/01/21 19:02:12.0250 Fastfat (38d332a6d56af32635675f132548343e) C:\WINDOWS\system32\drivers\Fastfat.sys
    2011/01/21 19:02:12.0390 Fdc (92cdd60b6730b9f50f6a1a0c1f8cdc81) C:\WINDOWS\system32\drivers\Fdc.sys
    2011/01/21 19:02:12.0562 Fips (d45926117eb9fa946a6af572fbe1caa3) C:\WINDOWS\system32\drivers\Fips.sys
    2011/01/21 19:02:12.0656 Flpydisk (9d27e7b80bfcdf1cdd9b555862d5e7f0) C:\WINDOWS\system32\drivers\Flpydisk.sys
    2011/01/21 19:02:12.0781 FltMgr (b2cf4b0786f8212cb92ed2b50c6db6b0) C:\WINDOWS\system32\drivers\fltmgr.sys
    2011/01/21 19:02:12.0937 Fs_Rec (3e1e2bd4f39b0e2b7dc4f4d2bcc2779a) C:\WINDOWS\system32\drivers\Fs_Rec.sys
    2011/01/21 19:02:13.0140 Ftdisk (6ac26732762483366c3969c9e4d2259d) C:\WINDOWS\system32\DRIVERS\ftdisk.sys
    2011/01/21 19:02:13.0281 GEARAspiWDM (8182ff89c65e4d38b2de4bb0fb18564e) C:\WINDOWS\system32\Drivers\GEARAspiWDM.sys
    2011/01/21 19:02:13.0390 Gpc (0a02c63c8b144bd8c86b103dee7c86a2) C:\WINDOWS\system32\DRIVERS\msgpc.sys
    2011/01/21 19:02:13.0515 HidUsb (ccf82c5ec8a7326c3066de870c06daf1) C:\WINDOWS\system32\DRIVERS\hidusb.sys
    2011/01/21 19:02:13.0703 HTTP (f6aacf5bce2893e0c1754afeb672e5c9) C:\WINDOWS\system32\Drivers\HTTP.sys
    2011/01/21 19:02:14.0031 i8042prt (4a0b06aa8943c1e332520f7440c0aa30) C:\WINDOWS\system32\DRIVERS\i8042prt.sys
    2011/01/21 19:02:14.0156 Imapi (083a052659f5310dd8b6a6cb05edcf8e) C:\WINDOWS\system32\DRIVERS\imapi.sys
    2011/01/21 19:02:14.0375 intelppm (8c953733d8f36eb2133f5bb58808b66b) C:\WINDOWS\system32\DRIVERS\intelppm.sys
    2011/01/21 19:02:14.0515 Ip6Fw (3bb22519a194418d5fec05d800a19ad0) C:\WINDOWS\system32\drivers\ip6fw.sys
    2011/01/21 19:02:14.0718 IpFilterDriver (731f22ba402ee4b62748adaf6363c182) C:\WINDOWS\system32\DRIVERS\ipfltdrv.sys
    2011/01/21 19:02:14.0843 IpInIp (b87ab476dcf76e72010632b5550955f5) C:\WINDOWS\system32\DRIVERS\ipinip.sys
    2011/01/21 19:02:14.0953 IpNat (cc748ea12c6effde940ee98098bf96bb) C:\WINDOWS\system32\DRIVERS\ipnat.sys
    2011/01/21 19:02:15.0093 IPSec (23c74d75e36e7158768dd63d92789a91) C:\WINDOWS\system32\DRIVERS\ipsec.sys
    2011/01/21 19:02:15.0296 irda (aca5e7b54409f9cb5eed97ed0c81120e) C:\WINDOWS\system32\DRIVERS\irda.sys
    2011/01/21 19:02:15.0406 IRENUM (c93c9ff7b04d772627a3646d89f7bf89) C:\WINDOWS\system32\DRIVERS\irenum.sys
    2011/01/21 19:02:15.0546 isapnp (05a299ec56e52649b1cf2fc52d20f2d7) C:\WINDOWS\system32\DRIVERS\isapnp.sys
    2011/01/21 19:02:15.0656 Kbdclass (463c1ec80cd17420a542b7f36a36f128) C:\WINDOWS\system32\DRIVERS\kbdclass.sys
    2011/01/21 19:02:15.0812 kmixer (692bcf44383d056aed41b045a323d378) C:\WINDOWS\system32\drivers\kmixer.sys
    2011/01/21 19:02:15.0984 KSecDD (b467646c54cc746128904e1654c750c1) C:\WINDOWS\system32\drivers\KSecDD.sys
    2011/01/21 19:02:16.0187 MDC8021X (8fee53c104223973ed9919936d9cd156) C:\WINDOWS\system32\DRIVERS\mdc8021x.sys
    2011/01/21 19:02:16.0312 mnmdd (4ae068242760a1fb6e1a44bf4e16afa6) C:\WINDOWS\system32\drivers\mnmdd.sys
    2011/01/21 19:02:16.0546 Modem (dfcbad3cec1c5f964962ae10e0bcc8e1) C:\WINDOWS\system32\drivers\Modem.sys
    2011/01/21 19:02:16.0687 motmodem (fe80c18ba448ddd76b7bead9eb203d37) C:\WINDOWS\system32\DRIVERS\motmodem.sys
    2011/01/21 19:02:16.0796 Mouclass (35c9e97194c8cfb8430125f8dbc34d04) C:\WINDOWS\system32\DRIVERS\mouclass.sys
    2011/01/21 19:02:16.0984 mouhid (b1c303e17fb9d46e87a98e4ba6769685) C:\WINDOWS\system32\DRIVERS\mouhid.sys
    2011/01/21 19:02:17.0171 MountMgr (a80b9a0bad1b73637dbcbba7df72d3fd) C:\WINDOWS\system32\drivers\MountMgr.sys
    2011/01/21 19:02:17.0390 MRxDAV (11d42bb6206f33fbb3ba0288d3ef81bd) C:\WINDOWS\system32\DRIVERS\mrxdav.sys
    2011/01/21 19:02:17.0609 MRxSmb (60ae98742484e7ab80c3c1450e708148) C:\WINDOWS\system32\DRIVERS\mrxsmb.sys
    2011/01/21 19:02:17.0859 Msfs (c941ea2454ba8350021d774daf0f1027) C:\WINDOWS\system32\drivers\Msfs.sys
    2011/01/21 19:02:18.0000 MSKSSRV (d1575e71568f4d9e14ca56b7b0453bf1) C:\WINDOWS\system32\drivers\MSKSSRV.sys
    2011/01/21 19:02:18.0109 MSPCLOCK (325bb26842fc7ccc1fcce2c457317f3e) C:\WINDOWS\system32\drivers\MSPCLOCK.sys
    2011/01/21 19:02:18.0187 MSPQM (bad59648ba099da4a17680b39730cb3d) C:\WINDOWS\system32\drivers\MSPQM.sys
    2011/01/21 19:02:18.0312 mssmbios (af5f4f3f14a8ea2c26de30f7a1e17136) C:\WINDOWS\system32\DRIVERS\mssmbios.sys
    2011/01/21 19:02:18.0531 Mup (2f625d11385b1a94360bfc70aaefdee1) C:\WINDOWS\system32\drivers\Mup.sys
    2011/01/21 19:02:18.0703 NDIS (1df7f42665c94b825322fae71721130d) C:\WINDOWS\system32\drivers\NDIS.sys
    2011/01/21 19:02:18.0843 NdisTapi (1ab3d00c991ab086e69db84b6c0ed78f) C:\WINDOWS\system32\DRIVERS\ndistapi.sys
    2011/01/21 19:02:18.0984 Ndisuio (f927a4434c5028758a842943ef1a3849) C:\WINDOWS\system32\DRIVERS\ndisuio.sys
    2011/01/21 19:02:19.0093 NdisWan (edc1531a49c80614b2cfda43ca8659ab) C:\WINDOWS\system32\DRIVERS\ndiswan.sys
    2011/01/21 19:02:19.0218 NDProxy (6215023940cfd3702b46abc304e1d45a) C:\WINDOWS\system32\drivers\NDProxy.sys
    2011/01/21 19:02:19.0328 Net6IM (f42afe4959fcb0bab7b0745493fcbb0c) C:\WINDOWS\system32\DRIVERS\net6im51.sys
    2011/01/21 19:02:19.0468 NetBIOS (5d81cf9a2f1a3a756b66cf684911cdf0) C:\WINDOWS\system32\DRIVERS\netbios.sys
    2011/01/21 19:02:19.0671 NetBT (74b2b2f5bea5e9a3dc021d685551bd3d) C:\WINDOWS\system32\DRIVERS\netbt.sys
    2011/01/21 19:02:19.0812 Netdevio (1265eb253ed4ebe4acb3bd5f548ff796) C:\WINDOWS\system32\DRIVERS\netdevio.sys
    2011/01/21 19:02:19.0968 NIC1394 (e9e47cfb2d461fa0fc75b7a74c6383ea) C:\WINDOWS\system32\DRIVERS\nic1394.sys
    2011/01/21 19:02:20.0109 Npfs (3182d64ae053d6fb034f44b6def8034a) C:\WINDOWS\system32\drivers\Npfs.sys
    2011/01/21 19:02:20.0296 ns80503 (6f97413b4709d8c4a5bd4a5a453f5f59) C:\WINDOWS\system32\ns80503.sys
    2011/01/21 19:02:20.0421 Ntfs (78a08dd6a8d65e697c18e1db01c5cdca) C:\WINDOWS\system32\drivers\Ntfs.sys
    2011/01/21 19:02:20.0578 Null (73c1e1f395918bc2c6dd67af7591a3ad) C:\WINDOWS\system32\drivers\Null.sys
    2011/01/21 19:02:20.0703 NwlnkFlt (b305f3fad35083837ef46a0bbce2fc57) C:\WINDOWS\system32\DRIVERS\nwlnkflt.sys
    2011/01/21 19:02:20.0890 NwlnkFwd (c99b3415198d1aab7227f2c88fd664b9) C:\WINDOWS\system32\DRIVERS\nwlnkfwd.sys
    2011/01/21 19:02:21.0031 odysseyIM4 (7af6ec0ea4261ecf7da084103be31ea8) C:\WINDOWS\system32\DRIVERS\odysseyIM4.sys
    2011/01/21 19:02:21.0187 ohci1394 (ca33832df41afb202ee7aeb05145922f) C:\WINDOWS\system32\DRIVERS\ohci1394.sys
    2011/01/21 19:02:21.0312 Parport (5575faf8f97ce5e713d108c2a58d7c7c) C:\WINDOWS\system32\DRIVERS\parport.sys
    2011/01/21 19:02:21.0500 PartMgr (beb3ba25197665d82ec7065b724171c6) C:\WINDOWS\system32\drivers\PartMgr.sys
    2011/01/21 19:02:21.0609 ParVdm (70e98b3fd8e963a6a46a2e6247e0bea1) C:\WINDOWS\system32\drivers\ParVdm.sys
    2011/01/21 19:02:21.0765 PCI (a219903ccf74233761d92bef471a07b1) C:\WINDOWS\system32\DRIVERS\pci.sys
    2011/01/21 19:02:21.0921 PCIIde (ccf5f451bb1a5a2a522a76e670000ff0) C:\WINDOWS\system32\DRIVERS\pciide.sys
    2011/01/21 19:02:22.0125 Pcmcia (9e89ef60e9ee05e3f2eef2da7397f1c1) C:\WINDOWS\system32\DRIVERS\pcmcia.sys
    2011/01/21 19:02:22.0625 PptpMiniport (efeec01b1d3cf84f16ddd24d9d9d8f99) C:\WINDOWS\system32\DRIVERS\raspptp.sys
    2011/01/21 19:02:22.0859 PSched (09298ec810b07e5d582cb3a3f9255424) C:\WINDOWS\system32\DRIVERS\psched.sys
    2011/01/21 19:02:22.0953 Ptilink (80d317bd1c3dbc5d4fe7b1678c60cadd) C:\WINDOWS\system32\DRIVERS\ptilink.sys
    2011/01/21 19:02:23.0359 RasAcd (fe0d99d6f31e4fad8159f690d68ded9c) C:\WINDOWS\system32\DRIVERS\rasacd.sys
    2011/01/21 19:02:23.0500 Rasirda (0207d26ddf796a193ccd9f83047bb5fc) C:\WINDOWS\system32\DRIVERS\rasirda.sys
    2011/01/21 19:02:23.0625 Rasl2tp (11b4a627bc9614b885c4969bfa5ff8a6) C:\WINDOWS\system32\DRIVERS\rasl2tp.sys
    2011/01/21 19:02:23.0843 RasPppoe (5bc962f2654137c9909c3d4603587dee) C:\WINDOWS\system32\DRIVERS\raspppoe.sys
    2011/01/21 19:02:23.0984 Raspti (fdbb1d60066fcfbb7452fd8f9829b242) C:\WINDOWS\system32\DRIVERS\raspti.sys
    2011/01/21 19:02:24.0203 Rdbss (7ad224ad1a1437fe28d89cf22b17780a) C:\WINDOWS\system32\DRIVERS\rdbss.sys
    2011/01/21 19:02:24.0265 RDPCDD (4912d5b403614ce99c28420f75353332) C:\WINDOWS\system32\DRIVERS\RDPCDD.sys
    2011/01/21 19:02:24.0453 rdpdr (15cabd0f7c00c47c70124907916af3f1) C:\WINDOWS\system32\DRIVERS\rdpdr.sys
    2011/01/21 19:02:24.0640 RDPWD (6728e45b66f93c08f11de2e316fc70dd) C:\WINDOWS\system32\drivers\RDPWD.sys
    2011/01/21 19:02:24.0781 redbook (f828dd7e1419b6653894a8f97a0094c5) C:\WINDOWS\system32\DRIVERS\redbook.sys
    2011/01/21 19:02:25.0000 RTL8023 (d88f6c53b637abe4c23de29db40a9f05) C:\WINDOWS\system32\DRIVERS\Rtlnic51.sys
    2011/01/21 19:02:25.0156 RTL8023xp (cf84b1f0e8b14d4120aaf9cf35cbb265) C:\WINDOWS\system32\DRIVERS\Rtnicxp.sys
    2011/01/21 19:02:25.0281 rtl8139 (d507c1400284176573224903819ffda3) C:\WINDOWS\system32\DRIVERS\RTL8139.SYS
    2011/01/21 19:02:25.0437 Secdrv (90a3935d05b494a5a39d37e71f09a677) C:\WINDOWS\system32\DRIVERS\secdrv.sys
    2011/01/21 19:02:25.0640 Serial (cca207a8896d4c6a0c9ce29a4ae411a7) C:\WINDOWS\system32\drivers\Serial.sys
    2011/01/21 19:02:25.0828 Sfloppy (8e6b8c671615d126fdc553d1e2de5562) C:\WINDOWS\system32\drivers\Sfloppy.sys
    2011/01/21 19:02:26.0031 SMCIRDA (f5fec5b4b985fbf81927844e75dd5bd1) C:\WINDOWS\system32\DRIVERS\smcirda.sys
    2011/01/21 19:02:26.0203 splitter (ab8b92451ecb048a4d1de7c3ffcb4a9f) C:\WINDOWS\system32\drivers\splitter.sys
    2011/01/21 19:02:26.0406 sr (76bb022c2fb6902fd5bdd4f78fc13a5d) C:\WINDOWS\system32\DRIVERS\sr.sys
    2011/01/21 19:02:26.0593 Srv (3bb03f2ba89d2be417206c373d2af17c) C:\WINDOWS\system32\DRIVERS\srv.sys
    2011/01/21 19:02:26.0718 ssmdrv (a36ee93698802cd899f98bfd553d8185) C:\WINDOWS\system32\DRIVERS\ssmdrv.sys
    2011/01/21 19:02:26.0828 swenum (3941d127aef12e93addf6fe6ee027e0f) C:\WINDOWS\system32\DRIVERS\swenum.sys
    2011/01/21 19:02:26.0968 swmidi (8ce882bcc6cf8a62f2b2323d95cb3d01) C:\WINDOWS\system32\drivers\swmidi.sys
    2011/01/21 19:02:27.0531 SynTP (36460e94bbb8c1a1a1c22e45a28fb955) C:\WINDOWS\system32\DRIVERS\SynTP.sys
    2011/01/21 19:02:27.0640 sysaudio (8b83f3ed0f1688b4958f77cd6d2bf290) C:\WINDOWS\system32\drivers\sysaudio.sys
    2011/01/21 19:02:27.0921 Tcpip (9aefa14bd6b182d61e3119fa5f436d3d) C:\WINDOWS\system32\DRIVERS\tcpip.sys
    2011/01/21 19:02:28.0093 TDPIPE (6471a66807f5e104e4885f5b67349397) C:\WINDOWS\system32\drivers\TDPIPE.sys
    2011/01/21 19:02:28.0171 TDTCP (c56b6d0402371cf3700eb322ef3aaf61) C:\WINDOWS\system32\drivers\TDTCP.sys
    2011/01/21 19:02:28.0359 TermDD (88155247177638048422893737429d9e) C:\WINDOWS\system32\DRIVERS\termdd.sys
    2011/01/21 19:02:28.0609 TVALD (7420b0c35be9d7e9651ceb1456948c87) C:\WINDOWS\system32\DRIVERS\NBSMI.sys
    2011/01/21 19:02:28.0765 Udfs (5787b80c2e3c5e2f56c2a233d91fa2c9) C:\WINDOWS\system32\drivers\Udfs.sys
    2011/01/21 19:02:28.0968 Update (402ddc88356b1bac0ee3dd1580c76a31) C:\WINDOWS\system32\DRIVERS\update.sys
    2011/01/21 19:02:29.0187 USBAAPL (5c2bdc152bbab34f36473deaf7713f22) C:\WINDOWS\system32\Drivers\usbaapl.sys
    2011/01/21 19:02:29.0328 usbccgp (173f317ce0db8e21322e71b7e60a27e8) C:\WINDOWS\system32\DRIVERS\usbccgp.sys
    2011/01/21 19:02:29.0453 usbehci (65dcf09d0e37d4c6b11b5b0b76d470a7) C:\WINDOWS\system32\DRIVERS\usbehci.sys
    2011/01/21 19:02:29.0546 usbhub (1ab3cdde553b6e064d2e754efe20285c) C:\WINDOWS\system32\DRIVERS\usbhub.sys
    2011/01/21 19:02:29.0718 usbohci (0daecce65366ea32b162f85f07c6753b) C:\WINDOWS\system32\DRIVERS\usbohci.sys
    2011/01/21 19:02:29.0875 usbprint (a717c8721046828520c9edf31288fc00) C:\WINDOWS\system32\DRIVERS\usbprint.sys
    2011/01/21 19:02:30.0000 USBSTOR (a32426d9b14a089eaa1d922e0c5801a9) C:\WINDOWS\system32\DRIVERS\USBSTOR.SYS
    2011/01/21 19:02:30.0125 VgaSave (0d3a8fafceacd8b7625cd549757a7df1) C:\WINDOWS\System32\drivers\vga.sys
    2011/01/21 19:02:30.0359 VolSnap (4c8fcb5cc53aab716d810740fe59d025) C:\WINDOWS\system32\drivers\VolSnap.sys
    2011/01/21 19:02:30.0546 Wanarp (e20b95baedb550f32dd489265c1da1f6) C:\WINDOWS\system32\DRIVERS\wanarp.sys
    2011/01/21 19:02:30.0671 Wdf01000 (fd47474bd21794508af449d9d91af6e6) C:\WINDOWS\system32\DRIVERS\Wdf01000.sys
    2011/01/21 19:02:30.0890 wdmaud (6768acf64b18196494413695f0c3a00f) C:\WINDOWS\system32\drivers\wdmaud.sys
    2011/01/21 19:02:31.0203 WPC54GSv1 (e679fe7890c366f3418963e289d273cf) C:\WINDOWS\system32\DRIVERS\WPC54GSv1.SYS
    2011/01/21 19:02:31.0468 WudfPf (f15feafffbb3644ccc80c5da584e6311) C:\WINDOWS\system32\DRIVERS\WudfPf.sys
    2011/01/21 19:02:31.0640 WudfRd (28b524262bce6de1f7ef9f510ba3985b) C:\WINDOWS\system32\DRIVERS\wudfrd.sys
    2011/01/21 19:02:31.0812 \HardDisk0 - detected Rootkit.Win32.TDSS.tdl4 (0)
    2011/01/21 19:02:31.0828 ================================================================================
    2011/01/21 19:02:31.0828 Scan finished
    2011/01/21 19:02:31.0828 ================================================================================
    2011/01/21 19:02:31.0875 Detected object count: 1
    2011/01/21 19:02:59.0078 \HardDisk0 - will be cured after reboot
    2011/01/21 19:02:59.0078 Rootkit.Win32.TDSS.tdl4(\HardDisk0) - User select action: Cure
    2011/01/21 19:03:28.0765 Deinitialize success

  5. #25
    Junior Member
    Join Date
    Jan 2011
    Posts
    27

    Default

    Stealth MBR rootkit/Mebroot/Sinowal/TDL4 detector 0.4.2 by Gmer, http://www.gmer.net
    Windows 5.1.2600 Disk: TOSHIBA_MK8032GAX rev.AD002D -> Harddisk0\DR0 -> \Device\Ide\IdeDeviceP0T0L0-3

    device: opened successfully
    user: MBR read successfully

    Disk trace:
    called modules: ntoskrnl.exe CLASSPNP.SYS disk.sys ACPI.sys hal.dll atapi.sys atiide.sys PCIIDEX.SYS
    C:\WINDOWS\system32\drivers\atiide.sys ATI Technologies Inc. ATI IDE BUS Master Controller Driver
    1 nt!IofCallDriver[0x804E37C5] -> \Device\Harddisk0\DR0[0x85376AB8]
    3 CLASSPNP[0xF7808FD7] -> nt!IofCallDriver[0x804E37C5] -> \Device\00000086[0x8536CF18]
    5 ACPI[0xF775F620] -> nt!IofCallDriver[0x804E37C5] -> \Device\Ide\IdeDeviceP0T0L0-3[0x85341B58]
    kernel: MBR read successfully
    user & kernel MBR OK

  6. #26
    Emeritus
    Join Date
    Aug 2007
    Posts
    1,875

    Default

    Reconfigure Windows XP to show hidden files:
    To enable the viewing of Hidden files follow these steps:

    • Close all programs so that you are at your desktop.
    • Double-click on the My Computer icon.
    • Select the Tools menu and click Folder Options.
    • After the new window appears select the View tab.
    • Put a checkmark in the checkbox labeled Display the contents of system folders.
    • Under the Hidden files and folders section select the radio button labeled Show hidden files and folders.
    • Remove the checkmark from the checkbox labeled Hide file extensions for known file types.
    • Remove the checkmark from the checkbox labeled Hide protected operating system files.
    • Press the Apply button and then the OK button and shutdown My Computer.
    • Now your computer is configured to show all hidden files.


    Be sure to re-hide your files once you are finished cleaning your computer.


    Delete the following folder, if found:

    c:\documents and settings\All Users\Application Data\gCkNc07000



    Step # 1 Update Java

    Your Java is out of date. Older versions have vulnerabilities that malware can use to infect your system.

    Please follow these steps to remove older version Java components and update.

    Updating Java:
    • Download the latest version of Java Runtime Environment (JRE) 6u23.
    • Click on the link to download Windows Offline Installation and save to your desktop. Do NOT use the Sun Download Manager.
    • Close any programs you may have running - especially your web browser.
    • Go to Start > Control Panel double-click on Add/Remove programs and remove all older versions of Java.
    • Remove the following old versions of Java:

    • Java 2 Runtime Environment, SE v1.4.2_05

    • Click the Remove or Change/Remove button.
    • Repeat as many times as necessary to remove each Java versions.
    • Reboot your computer once all Java components are removed.
    • From your desktop double-click on the download to install the newest version.




    Step # 2: Download and Run ATF Cleaner
    Download ATF (Atribune Temp File) Cleaner© by Atribune to your desktop.

    Double-click ATF Cleaner.exe to open it.

    Under Main choose:
    Windows Temp
    Current User Temp
    All Users Temp
    Temporary Internet Files
    Prefetch
    Java Cache

    *The other boxes are optional*
    Then click the Empty Selected button.

    Firefox:
    Click Firefox at the top and choose: Select All
    Click the Empty Selected button.
    NOTE: If you would like to keep your saved passwords, please click NO at the prompt.

    Opera:
    Click Opera at the top and choose: Select All
    Click the Empty Selected button.
    NOTE: If you would like to keep your saved passwords, please click NO at the prompt.

    Click Exit on the Main menu to close the program.



    Step # 3 Run Malwarebytes' Anti-Malware
    • Launch Malwarebytes' Anti-Malware.
    • Before running a scan, click the Update tab, next click Check for Updates to download any updates, if available.
    • Next click the Scanner tab and select Perform Quick Scan, then click Scan.
    • When the scan is complete, click OK, then Show Results to view the results.
    • Be sure that everything is checked, and click Remove Selected.
    • When completed, a log will open in Notepad. Please save it to a convenient location.
    • You can also access the log by doing the following:
    • Click on the Malwarebytes' Anti-Malware icon to launch the program.
    • Click on the Logs tab.
    • Click on the log at the bottom of those listed to highlight it.
    • Click Open.



    In your next post/reply, I need to see the following:

    1. The MalwareBytes' Log
    2. A fresh DDS Log
    Malware Removal University Master
    Member of ASAP & UNITE

  7. #27
    Junior Member
    Join Date
    Jan 2011
    Posts
    27

    Default

    Thank you for improving my system so tremendously.

    I removed the directory c:\documents and settings\All Users\Application Data\gCkNc07000
    I deinstalled Java 1.4 and reinstalled the latest version 1.6.23
    I ran the ATF Cleaner and MalWareBytes and DDS

    There are two MalWareBytes logs, one I ran on the 16th, and one today, The one of today shows entries I changed in the Security Center, as the warnings keep popping up.

    The logs will be added in subsequent postings.

  8. #28
    Junior Member
    Join Date
    Jan 2011
    Posts
    27

    Default

    Looking at DDS, the following entries puzzle me.

    S3 cpuz132;cpuz132;\??\c:\docume~1\robert~1.tos\locals~1\temp\cpuz132\cpuz132_x32.sys --> c:\docume~1\robert~1.tos\locals~1\temp\cpuz132\cpuz132_x32.sys [?]
    S3 EraserUtilRebootDrv;EraserUtilRebootDrv;\??\c:\program files\common files\symantec shared\eengine\eraserutilrebootdrv.sys --> c:\program files\common files\symantec shared\eengine\EraserUtilRebootDrv.sys [?]

    And these, created when most of this entered my system.

    2011-01-09 04:16:30 -------- d-----w- c:\windows\system32\wbem\repository\FS
    2011-01-09 04:16:30 -------- d-----w- c:\windows\system32\wbem\Repository

  9. #29
    Junior Member
    Join Date
    Jan 2011
    Posts
    27

    Default

    DDS


    DDS (Ver_10-12-12.02) - NTFSx86
    Run by Robert Prinsen at 15:30:42.17 on 22/01/2011
    Internet Explorer: 7.0.5730.13
    Microsoft Windows XP Professional 5.1.2600.3.1252.44.1033.18.447.215 [GMT 0:00]

    AV: AntiVir Desktop *Enabled/Updated* {AD166499-45F9-482A-A743-FDD3350758C7}

    ============== Running Processes ===============

    C:\WINDOWS\system32\svchost -k DcomLaunch
    svchost.exe
    C:\WINDOWS\System32\svchost.exe -k netsvcs
    C:\WINDOWS\system32\ACS.exe
    svchost.exe
    svchost.exe
    C:\WINDOWS\system32\spoolsv.exe
    C:\Program Files\Avira\AntiVir Desktop\sched.exe
    svchost.exe
    C:\Program Files\Avira\AntiVir Desktop\avguard.exe
    C:\Program Files\Bonjour\mDNSResponder.exe
    C:\Program Files\TOSHIBA\ConfigFree\CFSvcs.exe
    C:\Program Files\Avira\AntiVir Desktop\avshadow.exe
    C:\WINDOWS\System32\svchost.exe -k eapsvcs
    C:\WINDOWS\System32\svchost.exe -k HTTPFilter
    C:\Program Files\iPod\bin\iPodService.exe
    C:\Program Files\Java\jre6\bin\jqs.exe
    C:\Program Files\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE
    C:\Program Files\Linksys\Wireless-G Notebook Adapter\NICServ.exe
    C:\Program Files\NetScaler\NetScaler Secure Remote Access\nsverctl.exe
    C:\WINDOWS\System32\dmadmin.exe
    C:\WINDOWS\Explorer.EXE
    C:\Program Files\Synaptics\SynTP\SynTPLpr.exe
    C:\Program Files\Synaptics\SynTP\SynTPEnh.exe
    C:\WINDOWS\AGRSMMSG.exe
    C:\Program Files\Toshiba\Toshiba Applet\thotkey.exe
    C:\WINDOWS\system32\TPSMain.exe
    C:\Program Files\TOSHIBA\ConfigFree\NDSTray.exe
    C:\Program Files\TOSHIBA\TOSHIBA Zooming Utility\SmoothView.exe
    C:\Program Files\TOSHIBA\PadTouch\PadExe.exe
    C:\Program Files\iTunes\iTunesHelper.exe
    C:\Program Files\Avira\AntiVir Desktop\avgnt.exe
    C:\WINDOWS\system32\TPSBattM.exe
    C:\Program Files\Common Files\Java\Java Update\jusched.exe
    C:\WINDOWS\system32\ctfmon.exe
    C:\WINDOWS\system32\taskmgr.exe
    C:\Program Files\Internet Explorer\iexplore.exe
    C:\Documents and Settings\Robert Prinsen.TOSHA60RPP\Desktop\dds.scr

    ============== Pseudo HJT Report ===============

    uStart Page = hxxp://oudebekenden.forum2go.nl/
    uInternet Settings,ProxyOverride = 127.0.0.1;*.local
    BHO: Adobe PDF Link Helper: {18df081c-e8ad-4283-a596-fa578c2ebdc3} - c:\program files\common

    files\adobe\acrobat\activex\AcroIEHelperShim.dll
    BHO: Java(tm) Plug-In 2 SSV Helper: {dbc80044-a445-435b-bc74-9c25c1c588a9} - c:\program files\java\jre6\bin\jp2ssv.dll
    BHO: JQSIEStartDetectorImpl Class: {e7e6f031-17ce-4c07-bc86-eabfe594f69c} - c:\program files\java\jre6

    \lib\deploy\jqs\ie\jqs_plugin.dll
    uRun: [ctfmon.exe] c:\windows\system32\ctfmon.exe
    mRun: [SynTPLpr] c:\program files\synaptics\syntp\SynTPLpr.exe
    mRun: [SynTPEnh] c:\program files\synaptics\syntp\SynTPEnh.exe
    mRun: [AGRSMMSG] AGRSMMSG.exe
    mRun: [THotkey] c:\program files\toshiba\toshiba applet\thotkey.exe
    mRun: [TPSMain] TPSMain.exe
    mRun: [NDSTray.exe] NDSTray.exe
    mRun: [SmoothView] c:\program files\toshiba\toshiba zooming utility\SmoothView.exe
    mRun: [PadTouch] "c:\program files\toshiba\padtouch\PadExe.exe
    mRun: [Adobe Reader Speed Launcher] "c:\program files\adobe\reader 9.0\reader\Reader_sl.exe"
    mRun: [Adobe ARM] "c:\program files\common files\adobe\arm\1.0\AdobeARM.exe"
    mRun: [QuickTime Task] "c:\program files\quicktime\QTTask.exe" -atboottime
    mRun: [iTunesHelper] "c:\program files\itunes\iTunesHelper.exe"
    mRun: [avgnt] "c:\program files\avira\antivir desktop\avgnt.exe" /min
    mRun: [SunJavaUpdateSched] "c:\program files\common files\java\java update\jusched.exe"
    IE: E&xport to Microsoft Excel - c:\progra~1\micros~2\office11\EXCEL.EXE/3000
    IE: {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe
    IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe
    IE: {92780B25-18CC-41C8-B9BE-3C9C571A8263} - {FF059E31-CC5A-4E2E-BF3B-96E929D65503} - c:\progra~1\micros~2\office11

    \REFIEBAR.DLL
    DPF: Microsoft XML Parser for Java - file:///C:/WINDOWS/Java/classes/xmldso.cab
    DPF: {04897B74-BBBE-46E5-9550-5C487F39C2E4} - hxxp://support.informatica.com/atlas/19227/applets/SiebelAx_OutBound_mail.cab
    DPF: {7530BFB8-7293-4D34-9923-61A11451AFC5} - hxxp://download.eset.com/special/eos/OnlineScanner.cab
    DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_23-windows-i586.cab
    DPF: {8C244272-1DC1-4CE7-9C6C-FABCA09EB543} -

    hxxp://support.informatica.com/atlas/19227/applets/SiebelAx_Desktop_Integration.cab
    DPF: {93A85BE8-6137-4E48-BBC8-E78E27035DB0} - hxxp://support.informatica.com/atlas/19227/applets/SiebelAx_HI_Client.cab
    DPF: {CAFEEFAC-0016-0000-0023-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_23-windows-i586.cab
    DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_23-windows-i586.cab
    DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} - hxxp://fpdownload2.macromedia.com/get/shockwave/cabs/flash/swflash.cab
    DPF: {E2883E8F-472F-4FB0-9522-AC9BF37916A7} - hxxp://platformdl.adobe.com/NOS/getPlusPlus/1.6/gp.cab
    Notify: AtiExtEvent - Ati2evxx.dll
    SSODL: WPDShServiceObj - {AAA288BA-9A4C-45B0-95D7-94D524869DB5} - c:\windows\system32\WPDShServiceObj.dll

    ============= SERVICES / DRIVERS ===============

    R0 atiide;atiide;c:\windows\system32\drivers\atiide.sys [2004-8-24 5632]
    R1 avgio;avgio;c:\program files\avira\antivir desktop\avgio.sys [2011-1-19 11608]
    R2 AntiVirSchedulerService;Avira AntiVir Scheduler;c:\program files\avira\antivir desktop\sched.exe [2011-1-19 135336]
    R2 AntiVirService;Avira AntiVir Guard;c:\program files\avira\antivir desktop\avguard.exe [2011-1-19 267944]
    R2 avgntflt;avgntflt;c:\windows\system32\drivers\avgntflt.sys [2011-1-19 61960]
    R2 ns80503;ns80503;c:\windows\system32\ns80503.sys [2009-2-18 42296]
    R2 nsverctl;NetScaler SSL VPN Version Control;c:\program files\netscaler\netscaler secure remote access\nsverctl.exe [2009-2

    -18 53248]
    R3 Net6IM;Net6;c:\windows\system32\drivers\net6im51.sys [2009-2-18 43640]
    R3 WPC54GSv1;Linksys Wireless Notebook Adapter WPC54GSv1 Driver;c:\windows\system32\drivers\WPC54GSv1.SYS [2006-11-30 610816]
    S3 cpuz132;cpuz132;\??\c:\docume~1\robert~1.tos\locals~1\temp\cpuz132\cpuz132_x32.sys --> c:\docume~1\robert~1.tos\locals~1

    \temp\cpuz132\cpuz132_x32.sys [?]
    S3 EraserUtilRebootDrv;EraserUtilRebootDrv;\??\c:\program files\common files\symantec shared\eengine\eraserutilrebootdrv.sys

    --> c:\program files\common files\symantec shared\eengine\EraserUtilRebootDrv.sys [?]

    =============== Created Last 30 ================

    2011-01-22 14:18:11 73728 ----a-w- c:\windows\system32\javacpl.cpl
    2011-01-22 14:18:11 472808 ----a-w- c:\windows\system32\deployJava1.dll
    2011-01-21 22:46:45 -------- d-----w- c:\program files\Spybot - Search & Destroy
    2011-01-21 22:46:45 -------- d-----w- c:\docume~1\alluse~1\applic~1\Spybot - Search & Destroy
    2011-01-21 18:06:32 -------- d-sha-r- C:\cmdcons
    2011-01-20 22:02:22 89088 ----a-w- c:\windows\MBR.exe
    2011-01-20 22:02:22 256512 ----a-w- c:\windows\PEV.exe
    2011-01-20 22:02:22 161792 ----a-w- c:\windows\SWREG.exe
    2011-01-20 22:02:21 98816 ----a-w- c:\windows\sed.exe
    2011-01-19 21:18:11 -------- d-----w- c:\docume~1\robert~1.tos\applic~1\Avira
    2011-01-19 21:06:50 61960 ----a-w- c:\windows\system32\drivers\avgntflt.sys
    2011-01-19 21:06:45 -------- d-----w- c:\program files\Avira
    2011-01-19 21:06:45 -------- d-----w- c:\docume~1\alluse~1\applic~1\Avira
    2011-01-16 21:30:00 -------- d-----w- c:\program files\ESET
    2011-01-16 19:48:23 -------- d-----w- C:\KeepDeletedItems
    2011-01-16 16:11:24 -------- d-----w- c:\docume~1\robert~1.tos\applic~1\Malwarebytes
    2011-01-16 16:11:14 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
    2011-01-16 16:11:13 -------- d-----w- c:\docume~1\alluse~1\applic~1\Malwarebytes
    2011-01-16 16:11:10 20952 ----a-w- c:\windows\system32\drivers\mbam.sys
    2011-01-16 16:11:10 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
    2011-01-09 04:16:30 -------- d-----w- c:\windows\system32\wbem\repository\FS
    2011-01-09 04:16:30 -------- d-----w- c:\windows\system32\wbem\Repository

    ==================== Find3M ====================

    2010-11-29 17:38:30 94208 ----a-w- c:\windows\system32\QuickTimeVR.qtx
    2010-11-29 17:38:30 69632 ----a-w- c:\windows\system32\QuickTime.qts

    ============= FINISH: 15:31:59.14 ===============

  10. #30
    Junior Member
    Join Date
    Jan 2011
    Posts
    27

    Default

    mbam log 16 jan.

    Malwarebytes' Anti-Malware 1.50.1.1100
    www.malwarebytes.org

    Database version: 5363

    Windows 5.1.2600 Service Pack 3
    Internet Explorer 7.0.5730.13

    16/01/2011 17:44:54
    mbam-log-2011-01-16 (17-44-54).txt

    Scan type: Full scan (C:\|)
    Objects scanned: 360202
    Time elapsed: 1 hour(s), 20 minute(s), 37 second(s)

    Memory Processes Infected: 0
    Memory Modules Infected: 0
    Registry Keys Infected: 0
    Registry Values Infected: 0
    Registry Data Items Infected: 3
    Folders Infected: 0
    Files Infected: 1

    Memory Processes Infected:
    (No malicious items detected)

    Memory Modules Infected:
    (No malicious items detected)

    Registry Keys Infected:
    (No malicious items detected)

    Registry Values Infected:
    (No malicious items detected)

    Registry Data Items Infected:
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\AntiVirusDisableNotify (PUM.Disabled.SecurityCenter) -> Bad:

    (1) Good: (0) -> Quarantined and deleted successfully.
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\FirewallDisableNotify (PUM.Disabled.SecurityCenter) -> Bad: (1)

    Good: (0) -> Quarantined and deleted successfully.
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\UpdatesDisableNotify (PUM.Disabled.SecurityCenter) -> Bad: (1)

    Good: (0) -> Quarantined and deleted successfully.

    Folders Infected:
    (No malicious items detected)

    Files Infected:
    c:\WINDOWS\cpu.exe (Backdoor.Bot) -> Quarantined and deleted successfully.

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •