PDA

View Full Version : help!



zazz666
2011-03-08, 01:56
my browser is redirecting me on some weird sites or ask me to download things when I click on a search result in Google

heres my DDS scan :

.
DDS (Ver_11-03-05.01) - NTFSx86
Run by Katherine Thomas at 19:45:19,98 on 2011-03-07
Internet Explorer: 8.0.6001.18702
Microsoft Windows XP Professionnel 5.1.2600.3.1252.2.1036.18.3070.2454 [GMT -5:00]
.
.
============== Running Processes ===============
.
C:\WINDOWS\system32\nvsvc32.exe
C:\WINDOWS\system32\svchost -k DcomLaunch
svchost.exe
C:\WINDOWS\System32\svchost.exe -k netsvcs
svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\vsnp2std.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Logitech\SetPoint II\SetpointII.exe
C:\Program Files\Fichiers communs\Logishrd\KHAL2\KHALMNPR.EXE
C:\Documents and Settings\Katherine Thomas\Local Settings\Apps\2.0\T9YXVD6A.WC9\MNKOXACO.OOW\curs..tion_eee711038731a406_0004.0000_efb506202a7c3b08\CurseClient.exe
C:\Program Files\APC\APC PowerChute Personal Edition\apcsystray.exe
C:\Program Files\APC\APC PowerChute Personal Edition\mainserv.exe
C:\WINDOWS\eHome\ehRecvr.exe
C:\WINDOWS\eHome\ehSched.exe
C:\WINDOWS\System32\svchost.exe -k HPZ12
C:\WINDOWS\System32\svchost.exe -k HPZ12
C:\WINDOWS\system32\svchost.exe -k imgsvc
C:\Program Files\Mozilla Firefox\firefox.exe
C:\Program Files\Mozilla Firefox\plugin-container.exe
C:\Documents and Settings\Katherine Thomas\Mes documents\Téléchargements\dds.com
.
============== Pseudo HJT Report ===============
.
uSearchMigratedDefaultURL = hxxp://www.google.com/search?q={searchTerms}&sourceid=ie7&rls=com.microsoft:en-US&ie=utf8&oe=utf8
uRun: [ctfmon.exe] c:\windows\system32\ctfmon.exe
mRun: [nwiz] c:\program files\nvidia corporation\nview\nwiz.exe /installquiet
mRun: [NvCplDaemon] RUNDLL32.EXE c:\windows\system32\NvCpl.dll,NvStartup
mRun: [snp2std] c:\windows\vsnp2std.exe
StartupFolder: c:\documents and settings\katherine thomas\menu démarrer\programmes\démarrage\CurseClientStartup.ccip
StartupFolder: c:\docume~1\kather~1\menudm~1\progra~1\dmarra~1\erunta~1.lnk - c:\program files\erunt\AUTOBACK.EXE
StartupFolder: c:\docume~1\alluse~1\menudm~1\progra~1\dmarra~1\apcups~1.lnk - c:\program files\apc\apc powerchute personal edition\Display.exe
StartupFolder: c:\docume~1\alluse~1\menudm~1\progra~1\dmarra~1\setpoi~1.lnk - c:\program files\logitech\setpoint ii\SetpointII.exe
DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} - hxxp://update.microsoft.com/windowsupdate/v6/V5Controls/en/x86/client/wuweb_site.cab?1252186750750
DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} - hxxp://update.microsoft.com/microsoftupdate/v6/V5Controls/en/x86/client/muweb_site.cab?1252186802984
SSODL: WPDShServiceObj - {AAA288BA-9A4C-45B0-95D7-94D524869DB5} - c:\windows\system32\WPDShServiceObj.dll
Hosts: 127.0.0.1 www.spywareinfo.com
.
================= FIREFOX ===================
.
FF - ProfilePath - c:\docume~1\kather~1\applic~1\mozilla\firefox\profiles\4pj8hsfe.default\
FF - prefs.js: browser.search.selectedEngine - Wowhead
FF - prefs.js: browser.startup.homepage - hxxp://www.google.com/
FF - plugin: c:\documents and settings\katherine thomas\application data\mozilla\firefox\profiles\4pj8hsfe.default\extensions\viascreensharing@sviesolutions.com\plugins\npViaScreenSharingPlugin.dll
FF - plugin: c:\program files\divx\divx plus web player\npdivx32.dll
FF - plugin: c:\program files\java\jre6\bin\new_plugin\npdeployJava1.dll
FF - Ext: Default: {972ce4c6-7e08-4474-a285-3208198ce6fd} - c:\program files\mozilla firefox\extensions\{972ce4c6-7e08-4474-a285-3208198ce6fd}
FF - Ext: Java Console: {CAFEEFAC-0016-0000-0021-ABCDEFFEDCBA} - c:\program files\mozilla firefox\extensions\{CAFEEFAC-0016-0000-0021-ABCDEFFEDCBA}
FF - Ext: United States English Spellchecker: en-US@dictionaries.addons.mozilla.org - %profile%\extensions\en-US@dictionaries.addons.mozilla.org
FF - Ext: Via ScreenSharing: ViaScreenSharing@sviesolutions.com - %profile%\extensions\ViaScreenSharing@sviesolutions.com
FF - Ext: Microsoft .NET Framework Assistant: {20a82645-c095-46ed-80e3-08825760534b} - c:\windows\microsoft.net\framework\v3.5\windows presentation foundation\DotNetAssistantExtension
.
============= SERVICES / DRIVERS ===============
.
R1 bcac;bcac;c:\windows\system32\bcac.sys [2010-2-24 74752]
R2 LBeepKE;LBeepKE;c:\windows\system32\drivers\LBeepKE.sys [2010-11-16 10384]
S2 McrdSvc;Media Center Extender Service;c:\windows\ehome\mcrdsvc.exe [2005-8-5 99328]
S3 FsUsbExDisk;FsUsbExDisk;c:\windows\system32\FsUsbExDisk.Sys [2009-9-5 36608]
.
=============== File Associations ===============
.
.scr=AutoCADScriptFile
.
=============== Created Last 30 ================
.
.
==================== Find3M ====================
.
2011-01-21 14:44:12 441344 ----a-w- c:\windows\system32\shimgvw.dll
2011-01-07 14:09:02 290048 ----a-w- c:\windows\system32\atmfd.dll
2010-12-31 14:04:24 1855104 ----a-w- c:\windows\system32\win32k.sys
2010-12-22 12:34:26 301568 ----a-w- c:\windows\system32\kerberos.dll
2010-12-20 23:53:04 916480 ----a-w- c:\windows\system32\wininet.dll
2010-12-20 23:53:04 43520 ----a-w- c:\windows\system32\licmgr10.dll
2010-12-20 23:53:04 1469440 ------w- c:\windows\system32\inetcpl.cpl
2010-12-20 17:26:04 736768 ----a-w- c:\windows\system32\lsasrv.dll
2010-12-20 12:55:26 385024 ----a-w- c:\windows\system32\html.iec
2010-12-09 15:15:19 743424 ----a-w- c:\windows\system32\ntdll.dll
2010-12-09 15:14:12 2029056 ----a-w- c:\windows\system32\ntkrnlpa.exe
2010-12-09 15:14:10 2150912 ----a-w- c:\windows\system32\ntoskrnl.exe
2010-12-09 14:30:35 33280 ----a-w- c:\windows\system32\csrsrv.dll
.
============= FINISH: 19:46:02,39 ===============


thx

Blade81
2011-03-09, 07:36
Hi,

Please download Malwarebytes' Anti-Malware (http://www.besttechie.net/tools/mbam-setup.exe) to your desktop.

Double-click mbam-setup.exe and follow the prompts to install the program.
At the end, be sure a checkmark is placed next to Update Malwarebytes' Anti-Malware and Launch Malwarebytes' Anti-Malware, then click Finish.
If an update is found, it will download and install the latest version.
Once the program has loaded, select Perform full scan, then click Scan.
When the scan is complete, click OK, then Show Results to view the results.
Be sure that everything is checked, and click Remove Selected.
When completed, a log will open in Notepad. Please save it to a convenient location. The log can also be found here: C:\Documents and Settings\Username\Application Data\Malwarebytes\Malwarebytes' Anti-Malware\Logs\log-date.txt
Please post contents of that file in your next reply.

zazz666
2011-03-09, 08:58
Malwarebytes' Anti-Malware 1.50.1.1100
www.malwarebytes.org

Version de la base de données: 5996

Windows 5.1.2600 Service Pack 3
Internet Explorer 8.0.6001.18702

2011-03-09 02:58:19
mbam-log-2011-03-09 (02-58-19).txt

Type d'examen: Examen complet (C:\|)
Elément(s) analysé(s): 204042
Temps écoulé: 33 minute(s), 28 seconde(s)

Processus mémoire infecté(s): 0
Module(s) mémoire infecté(s): 0
Clé(s) du Registre infectée(s): 2
Valeur(s) du Registre infectée(s): 0
Elément(s) de données du Registre infecté(s): 2
Dossier(s) infecté(s): 0
Fichier(s) infecté(s): 45

Processus mémoire infecté(s):
(Aucun élément nuisible détecté)

Module(s) mémoire infecté(s):
(Aucun élément nuisible détecté)

Clé(s) du Registre infectée(s):
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\bcac (Rootkit.Agent) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{506CD401-5203-4B27-BB5A-03C97758FD02} (Trojan.BHO) -> Quarantined and deleted successfully.

Valeur(s) du Registre infectée(s):
(Aucun élément nuisible détecté)

Elément(s) de données du Registre infecté(s):
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\AntiVirusDisableNotify (PUM.Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\FirewallDisableNotify (PUM.Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.

Dossier(s) infecté(s):
(Aucun élément nuisible détecté)

Fichier(s) infecté(s):
c:\WINDOWS\system32\bcac.sys (Rootkit.Agent) -> Delete on reboot.
c:\WINDOWS\system32\0b79f9de20962b6c4759e885ab5cb8b5.exe (Adware.BHO) -> Quarantined and deleted successfully.
c:\WINDOWS\system32\0d55469b25a5e5270beb54f6401ae6db.exe (Rogue.InternetSecurity210) -> Quarantined and deleted successfully.
c:\WINDOWS\system32\0fe8bee4e8bb381115240749e7b49801.exe (Adware.BHO) -> Quarantined and deleted successfully.
c:\WINDOWS\system32\32c667b5d40faeb719b9eaafd2089566.exe (Backdoor.Bot) -> Quarantined and deleted successfully.
c:\WINDOWS\system32\3eda37c5c24cb791c232e92d3bae5492.exe (Adware.BHO) -> Quarantined and deleted successfully.
c:\WINDOWS\system32\421500eb91e06ad0c6b19a341fde1f5b.exe (Adware.BHO) -> Quarantined and deleted successfully.
c:\WINDOWS\system32\c06d56f8049186cec22289b02a630fd1.exe (Trojan.Dropper) -> Quarantined and deleted successfully.
c:\WINDOWS\system32\c20b61f5595a263a0d2fee47acf3cd50.exe (Rogue.InternetSecurity210) -> Quarantined and deleted successfully.
c:\WINDOWS\system32\c2dfb4ab2cf0c3004d942c963a453c73.exe (Backdoor.Bot) -> Quarantined and deleted successfully.
c:\WINDOWS\system32\c6fc96e6125b7eb83da1e9f2f99bfe14.exe (Trojan.Agent) -> Quarantined and deleted successfully.
c:\WINDOWS\system32\447561b6a19dbe63f590d18d8b2291c3.exe (Backdoor.Bot) -> Quarantined and deleted successfully.
c:\WINDOWS\system32\d148d7ca938b33ae9375b37dc22b5381.exe (Trojan.Dropper) -> Quarantined and deleted successfully.
c:\WINDOWS\system32\d16e33b9df62920e23b31b569e04d89e.exe (Trojan.Agent) -> Quarantined and deleted successfully.
c:\WINDOWS\system32\f025c9cfea5991a6099567056b107540.exe (Adware.BHO) -> Quarantined and deleted successfully.
c:\WINDOWS\system32\f53f408e18d209047c0f4d614fc91bc8.exe (Trojan.Dropper) -> Quarantined and deleted successfully.
c:\WINDOWS\system32\f9749f2d5622aa8bf2403341a7b621d9.exe (Trojan.Dropper) -> Quarantined and deleted successfully.
c:\WINDOWS\system32\fbe3de11b3765cea61edc3670de3b8b5.exe (Backdoor.Bot) -> Quarantined and deleted successfully.
c:\WINDOWS\system32\gokop.log (Extension.Mismatch) -> Quarantined and deleted successfully.
c:\WINDOWS\system32\cef750edd3e95b9239d96dad934913ad.exe (Trojan.Agent) -> Quarantined and deleted successfully.
c:\WINDOWS\system32\e0df0d838f475852faa5ddbd3b2fa151.exe (Trojan.Dropper) -> Quarantined and deleted successfully.
c:\WINDOWS\system32\e4bca68d3a0c862d3455f3526c62c327.exe (Trojan.Agent) -> Quarantined and deleted successfully.
c:\WINDOWS\system32\e7a15662a5a3fb0732a3bad809de9914.exe (Adware.BHO) -> Quarantined and deleted successfully.
c:\WINDOWS\system32\9271c36f64a74724f9ea1fa6b78f00ba.exe (Adware.BHO) -> Quarantined and deleted successfully.
c:\WINDOWS\system32\95421e4028b78fa0bb0073648be1a1cf.exe (Backdoor.Bot) -> Quarantined and deleted successfully.
c:\WINDOWS\system32\9a59cb1076cbc73c95577516b8108331.exe (Backdoor.Bot) -> Quarantined and deleted successfully.
c:\WINDOWS\system32\9e060bada3cbf5268566ea632a9cac3e.exe (Backdoor.Bot) -> Quarantined and deleted successfully.
c:\WINDOWS\system32\a0a59e56e815c13dd3e80f8f4b4297c6.exe (Adware.BHO) -> Quarantined and deleted successfully.
c:\WINDOWS\system32\a4dda38e0aa34fabd9164ee829719d94.exe (Adware.BHO) -> Quarantined and deleted successfully.
c:\WINDOWS\system32\aa83e3b71bc9dd7c6ea9ef1e0ae1b40e.exe (Adware.BHO) -> Quarantined and deleted successfully.
c:\WINDOWS\system32\aba88b519a77981206c4384ee4936347.exe (Adware.BHO) -> Quarantined and deleted successfully.
c:\WINDOWS\system32\45e74b36a2496afafb90b8c07c358cb4.tmp (Worm.AutoRun) -> Quarantined and deleted successfully.
c:\WINDOWS\system32\517ff52e31098e655716bc2f15c926cd.exe (Trojan.Agent) -> Quarantined and deleted successfully.
c:\WINDOWS\system32\553560994361f45247d2b810bfe996b7.exe (Trojan.Dropper) -> Quarantined and deleted successfully.
c:\WINDOWS\system32\cbddc60d9f0d9d4bc08da2b77cfac21e.exe (Adware.BHO) -> Quarantined and deleted successfully.
c:\WINDOWS\system32\ccf9f6a49b4119331e318d3f7b28e5c9.exe (Backdoor.Bot) -> Quarantined and deleted successfully.
c:\WINDOWS\system32\babddf6a2b7b298e70e93c72660b5029.exe (Adware.BHO) -> Quarantined and deleted successfully.
c:\WINDOWS\system32\bfe86f63d9b99ee789e29d2a3c8a4f70.exe (Trojan.Agent) -> Quarantined and deleted successfully.
c:\WINDOWS\system32\ef58d361f5ffeb25cdd068c3d5fb123e.exe (Adware.BHO) -> Quarantined and deleted successfully.
c:\WINDOWS\system32\66687cdfa89e7cd5368d5045389195be.exe (Adware.BHO) -> Quarantined and deleted successfully.
c:\WINDOWS\system32\8139e24039ec41d52a543ef03063bba1.exe (Trojan.Agent) -> Quarantined and deleted successfully.
c:\WINDOWS\system32\8429e50fab3c89d9194af6b715e72ea0.exe (Trojan.Dropper) -> Quarantined and deleted successfully.
c:\WINDOWS\system32\8700e055dcc9fa8852df457cf3a605b6.exe (Trojan.Agent) -> Quarantined and deleted successfully.
c:\WINDOWS\system32\87ba79ac3a93255e1bea62f91486002f.exe (Rogue.InternetSecurity210) -> Quarantined and deleted successfully.
c:\WINDOWS\system32\8e8784d5127b53be6805af63f595253a.exe (Trojan.Dropper) -> Quarantined and deleted successfully.

Blade81
2011-03-09, 14:16
Hi


Please visit this webpage for download links, and instructions for running ComboFix tool:

http://www.bleepingcomputer.com/combofix/how-to-use-combofix

Please ensure you read this guide carefully first.

Please continue as follows:


Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix, link (http://www.bleepingcomputer.com/forums/topic114351.html)
Remember to re-enable them afterwards.


Click Yes to allow ComboFix to continue scanning for malware.


When the tool is finished, it will produce a report for you.

Please include the following reports for further review, and so we may continue cleansing the system:

C:\ComboFix.txt
New dds log.

A word of warning: Neither I nor sUBs are responsible for any damage you may have caused your machine by running ComboFix. This tool is not a toy and not for everyday use.

zazz666
2011-03-10, 00:30
ComboFix 11-03-09.01 - Katherine Thomas 2011-03-09 18:10:55.3.2 - x86
Microsoft Windows XP Professionnel 5.1.2600.3.1252.2.1036.18.3070.2487 [GMT -5:00]
Lancé depuis: c:\documents and settings\Katherine Thomas\Bureau\ComboFix.exe
.
.
(((((((((((((((((((((((((((((((((((( Autres suppressions ))))))))))))))))))))))))))))))))))))))))))))))))
.
.
c:\windows\system32\AutoRun.inf
.
.
((((((((((((((((((((((((((((( Fichiers créés du 2011-02-09 au 2011-03-09 ))))))))))))))))))))))))))))))))))))
.
.
2011-03-09 07:17 . 2010-12-20 23:09 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2011-03-09 07:16 . 2011-03-09 07:17 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
2011-03-09 07:16 . 2010-12-20 23:08 20952 ----a-w- c:\windows\system32\drivers\mbam.sys
2011-03-08 00:42 . 2011-03-08 00:42 -------- d-----w- c:\program files\ERUNT
.
.
(((((((((((((((((((((((((((((((((( Compte-rendu de Find3M ))))))))))))))))))))))))))))))))))))))))))))))))
.
2011-02-04 22:48 . 2004-08-10 12:00 456192 ----a-w- c:\windows\system32\encdec.dll
2011-02-04 22:48 . 2004-08-10 12:00 291840 ----a-w- c:\windows\system32\sbe.dll
2011-02-02 07:59 . 2009-09-05 19:09 2067456 ----a-w- c:\windows\system32\mstscax.dll
2011-01-27 11:57 . 2009-09-05 19:09 677888 ----a-w- c:\windows\system32\mstsc.exe
2011-01-21 14:44 . 2004-08-10 12:00 441344 ----a-w- c:\windows\system32\shimgvw.dll
2011-01-07 14:09 . 2004-08-10 12:00 290048 ----a-w- c:\windows\system32\atmfd.dll
2010-12-31 14:04 . 2004-08-10 12:00 1855104 ----a-w- c:\windows\system32\win32k.sys
2010-12-22 12:34 . 2004-08-10 12:00 301568 ----a-w- c:\windows\system32\kerberos.dll
2010-12-20 23:53 . 2004-08-10 12:00 916480 ----a-w- c:\windows\system32\wininet.dll
2010-12-20 23:53 . 2004-08-10 12:00 43520 ----a-w- c:\windows\system32\licmgr10.dll
2010-12-20 23:53 . 2004-08-10 12:00 1469440 ------w- c:\windows\system32\inetcpl.cpl
2010-12-20 17:26 . 2004-08-10 12:00 736768 ----a-w- c:\windows\system32\lsasrv.dll
2010-12-20 12:55 . 2004-08-10 12:00 385024 ----a-w- c:\windows\system32\html.iec
2009-12-16 02:12 . 2009-12-11 02:12 119312 -c--a-w- c:\program files\mozilla firefox\components\deffdaefeab.dll
.
.
((((((((((((((((((((((((((((((((( Points de chargement Reg ))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* les éléments vides & les éléments initiaux légitimes ne sont pas listés
REGEDIT4
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"nwiz"="c:\program files\NVIDIA Corporation\nView\nwiz.exe" [2010-08-26 1753192]
"NvCplDaemon"="c:\windows\system32\NvCpl.dll" [2010-10-16 13851752]
"snp2std"="c:\windows\vsnp2std.exe" [2006-09-15 675840]
.
c:\documents and settings\Katherine Thomas\Menu D‚marrer\Programmes\D‚marrage\
CurseClientStartup.ccip [2010-7-23 0]
ERUNT AutoBackup.lnk - c:\program files\ERUNT\AUTOBACK.EXE [2005-10-20 38912]
.
c:\documents and settings\All Users\Menu D‚marrer\Programmes\D‚marrage\
APC UPS Status.lnk - c:\program files\APC\APC PowerChute Personal Edition\Display.exe [2009-9-5 221247]
SetPointII.lnk - c:\program files\Logitech\SetPoint II\SetpointII.exe [2009-7-21 323584]
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\WdfLoadGroup]
@=""
.
[HKLM\~\startupfolder\C:^Documents and Settings^All Users^Menu Démarrer^Programmes^Démarrage^CurseClientStartup.lnk]
path=c:\documents and settings\All Users\Menu Démarrer\Programmes\Démarrage\CurseClientStartup.lnk
backup=c:\windows\pss\CurseClientStartup.lnkCommon Startup
.
[HKLM\~\startupfolder\C:^Documents and Settings^Katherine Thomas^Menu Démarrer^Programmes^Démarrage^CurseClientStartup.ccip]
path=c:\documents and settings\Katherine Thomas\Menu Démarrer\Programmes\Démarrage\CurseClientStartup.ccip
backup=c:\windows\pss\CurseClientStartup.ccipStartup
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\DAEMON Tools Lite]
2009-10-30 11:57 369200 ----a-w- c:\program files\DAEMON Tools Lite\DTLite.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\snp2std]
2006-09-15 17:21 675840 -c--a-w- c:\windows\vsnp2std.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\tsnp2std]
2006-11-02 18:04 258048 ----a-w- c:\windows\tsnp2std.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\security center]
"AntiVirusOverride"=dword:00000001
.
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"c:\\Program Files\\Windows Live\\Messenger\\wlcsdk.exe"=
"c:\\Program Files\\Windows Live\\Messenger\\msnmsgr.exe"=
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"c:\\Program Files\\World of Warcraft\\WoW-3.2.0-enUS-downloader.exe"=
"c:\\Program Files\\World of Warcraft\\Launcher.exe"=
"c:\\Program Files\\World of Warcraft\\WoW-3.2.0.10192-to-3.2.0.10314-enUS-downloader.exe"=
"c:\\Program Files\\World of Warcraft\\WoW-3.2.0.10314-to-3.2.2.10482-enUS-downloader.exe"=
"c:\\WINDOWS\\system32\\sessmgr.exe"=
"c:\\Program Files\\World of Warcraft\\WoW-3.2.2.10482-to-3.2.2.10505-enUS-downloader.exe"=
"c:\\Program Files\\Messenger\\msmsgs.exe"=
"c:\\Documents and Settings\\Katherine Thomas\\Mes documents\\Mes fichiers reçus\\utorrent.exe"=
"c:\\WINDOWS\\system32\\dpvsetup.exe"=
"\\\\adannis-pc\\StarCraft II\\StarCraft II.exe"=
"c:\\Program Files\\World of Warcraft\\Blizzard Downloader.exe"=
"c:\\Documents and Settings\\Katherine Thomas\\Local Settings\\Apps\\2.0\\T9YXVD6A.WC9\\MNKOXACO.OOW\\curs..tion_eee711038731a406_0004.0000_efb506202a7c3b08\\CurseClient.exe"=
.
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\GloballyOpenPorts\List]
"6112:TCP"= 6112:TCP:Blizzard Downloader: 6112
"3724:TCP"= 3724:TCP:Blizzard Downloader: 3724
.
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\IcmpSettings]
"AllowInboundEchoRequest"= 1 (0x1)
.
R2 LBeepKE;LBeepKE;c:\windows\system32\drivers\LBeepKE.sys [2010-11-16 10384]
S3 FsUsbExDisk;FsUsbExDisk;c:\windows\system32\FsUsbExDisk.Sys [2009-09-05 36608]
S4 sptd;sptd;c:\windows\system32\drivers\sptd.sys [2009-11-26 691696]
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\svchost]
HPZ12 REG_MULTI_SZ Pml Driver HPZ12 Net Driver HPZ12
.
.
------- Examen supplémentaire -------
.
uSearchMigratedDefaultURL = hxxp://www.google.com/search?q={searchTerms}&sourceid=ie7&rls=com.microsoft:en-US&ie=utf8&oe=utf8
FF - ProfilePath - c:\documents and settings\Katherine Thomas\Application Data\Mozilla\Firefox\Profiles\4pj8hsfe.default\
FF - prefs.js: browser.search.selectedEngine - Wowhead
FF - prefs.js: browser.startup.homepage - hxxp://www.google.com/
FF - Ext: Default: {972ce4c6-7e08-4474-a285-3208198ce6fd} - c:\program files\Mozilla Firefox\extensions\{972ce4c6-7e08-4474-a285-3208198ce6fd}
FF - Ext: Java Console: {CAFEEFAC-0016-0000-0021-ABCDEFFEDCBA} - c:\program files\Mozilla Firefox\extensions\{CAFEEFAC-0016-0000-0021-ABCDEFFEDCBA}
FF - Ext: United States English Spellchecker: en-US@dictionaries.addons.mozilla.org - %profile%\extensions\en-US@dictionaries.addons.mozilla.org
FF - Ext: Via ScreenSharing: ViaScreenSharing@sviesolutions.com - %profile%\extensions\ViaScreenSharing@sviesolutions.com
FF - Ext: Microsoft .NET Framework Assistant: {20a82645-c095-46ed-80e3-08825760534b} - c:\windows\Microsoft.NET\Framework\v3.5\Windows Presentation Foundation\DotNetAssistantExtension
.
.
------- Associations de fichier -------
.
.scr=AutoCADScriptFile
.
.
**************************************************************************
.
catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2011-03-09 18:15
Windows 5.1.2600 Service Pack 3 NTFS
.
Recherche de processus cachés ...
.
Recherche d'éléments en démarrage automatique cachés ...
.
Recherche de fichiers cachés ...
.
Scan terminé avec succès
Fichiers cachés: 0
.
**************************************************************************
.
--------------------- CLES DE REGISTRE BLOQUEES ---------------------
.
[HKEY_LOCAL_MACHINE\software\Microsoft\Windows\CurrentVersion\Installer\UserData\LocalSystem\Components\•€|ÿÿÿÿ"•€|þ»Ñw*]
"C040311900063D11C8EF10054038389C"="C?\\WINDOWS\\system32\\FM20ENU.DLL"
.
Heure de fin: 2011-03-09 18:16:52
ComboFix-quarantined-files.txt 2011-03-09 23:16
.
Avant-CF: 216*782*819*328 octets libres
Après-CF: 216*781*615*104 octets libres
.
- - End Of File - - 6DCF4785148156C47E0E1AE275C9165A


.
DDS (Ver_11-03-05.01) - NTFSx86
Run by Katherine Thomas at 18:26:27,68 on 2011-03-09
Internet Explorer: 8.0.6001.18702
Microsoft Windows XP Professionnel 5.1.2600.3.1252.2.1036.18.3070.2429 [GMT -5:00]
.
.
============== Running Processes ===============
.
C:\WINDOWS\system32\nvsvc32.exe
C:\WINDOWS\system32\svchost -k DcomLaunch
svchost.exe
C:\WINDOWS\System32\svchost.exe -k netsvcs
svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\APC\APC PowerChute Personal Edition\mainserv.exe
C:\WINDOWS\System32\svchost.exe -k HPZ12
C:\WINDOWS\System32\svchost.exe -k HPZ12
C:\WINDOWS\system32\svchost.exe -k imgsvc
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Logitech\SetPoint II\SetpointII.exe
C:\Program Files\Fichiers communs\Logishrd\KHAL2\KHALMNPR.EXE
C:\Documents and Settings\Katherine Thomas\Local Settings\Apps\2.0\T9YXVD6A.WC9\MNKOXACO.OOW\curs..tion_eee711038731a406_0004.0000_efb506202a7c3b08\CurseClient.exe
C:\Program Files\APC\APC PowerChute Personal Edition\apcsystray.exe
C:\WINDOWS\system32\notepad.exe
C:\WINDOWS\explorer.exe
C:\Program Files\Mozilla Firefox\firefox.exe
C:\Program Files\Mozilla Firefox\plugin-container.exe
C:\Documents and Settings\Katherine Thomas\Mes documents\Téléchargements\dds.com
.
============== Pseudo HJT Report ===============
.
uSearchMigratedDefaultURL = hxxp://www.google.com/search?q={searchTerms}&sourceid=ie7&rls=com.microsoft:en-US&ie=utf8&oe=utf8
mRun: [nwiz] c:\program files\nvidia corporation\nview\nwiz.exe /installquiet
mRun: [NvCplDaemon] RUNDLL32.EXE c:\windows\system32\NvCpl.dll,NvStartup
mRun: [snp2std] c:\windows\vsnp2std.exe
StartupFolder: c:\documents and settings\katherine thomas\menu démarrer\programmes\démarrage\CurseClientStartup.ccip
StartupFolder: c:\docume~1\kather~1\menudm~1\progra~1\dmarra~1\erunta~1.lnk - c:\program files\erunt\AUTOBACK.EXE
StartupFolder: c:\docume~1\alluse~1\menudm~1\progra~1\dmarra~1\apcups~1.lnk - c:\program files\apc\apc powerchute personal edition\Display.exe
StartupFolder: c:\docume~1\alluse~1\menudm~1\progra~1\dmarra~1\setpoi~1.lnk - c:\program files\logitech\setpoint ii\SetpointII.exe
DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} - hxxp://update.microsoft.com/windowsupdate/v6/V5Controls/en/x86/client/wuweb_site.cab?1252186750750
DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} - hxxp://update.microsoft.com/microsoftupdate/v6/V5Controls/en/x86/client/muweb_site.cab?1252186802984
SSODL: WPDShServiceObj - {AAA288BA-9A4C-45B0-95D7-94D524869DB5} - c:\windows\system32\WPDShServiceObj.dll
.
================= FIREFOX ===================
.
FF - ProfilePath - c:\docume~1\kather~1\applic~1\mozilla\firefox\profiles\4pj8hsfe.default\
FF - prefs.js: browser.search.selectedEngine - Wowhead
FF - prefs.js: browser.startup.homepage - hxxp://www.google.com/
FF - plugin: c:\documents and settings\katherine thomas\application data\mozilla\firefox\profiles\4pj8hsfe.default\extensions\viascreensharing@sviesolutions.com\plugins\npViaScreenSharingPlugin.dll
FF - plugin: c:\program files\divx\divx plus web player\npdivx32.dll
FF - plugin: c:\program files\mozilla firefox\plugins\npdeployJava1.dll
FF - Ext: Default: {972ce4c6-7e08-4474-a285-3208198ce6fd} - c:\program files\mozilla firefox\extensions\{972ce4c6-7e08-4474-a285-3208198ce6fd}
FF - Ext: Java Console: {CAFEEFAC-0016-0000-0021-ABCDEFFEDCBA} - c:\program files\mozilla firefox\extensions\{CAFEEFAC-0016-0000-0021-ABCDEFFEDCBA}
FF - Ext: United States English Spellchecker: en-US@dictionaries.addons.mozilla.org - %profile%\extensions\en-US@dictionaries.addons.mozilla.org
FF - Ext: Via ScreenSharing: ViaScreenSharing@sviesolutions.com - %profile%\extensions\ViaScreenSharing@sviesolutions.com
FF - Ext: Microsoft .NET Framework Assistant: {20a82645-c095-46ed-80e3-08825760534b} - c:\windows\microsoft.net\framework\v3.5\windows presentation foundation\DotNetAssistantExtension
.
============= SERVICES / DRIVERS ===============
.
R2 LBeepKE;LBeepKE;c:\windows\system32\drivers\LBeepKE.sys [2010-11-16 10384]
S2 McrdSvc;Media Center Extender Service;c:\windows\ehome\mcrdsvc.exe [2005-8-5 99328]
S3 FsUsbExDisk;FsUsbExDisk;c:\windows\system32\FsUsbExDisk.Sys [2009-9-5 36608]
UnknownUnknown bcac;bcac; [x]
.
=============== File Associations ===============
.
.scr=AutoCADScriptFile
.
=============== Created Last 30 ================
.
2011-03-09 07:17:01 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2011-03-09 07:16:56 20952 ----a-w- c:\windows\system32\drivers\mbam.sys
2011-03-09 07:16:56 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
.
==================== Find3M ====================
.
2011-02-04 22:48:32 456192 ----a-w- c:\windows\system32\encdec.dll
2011-02-04 22:48:30 291840 ----a-w- c:\windows\system32\sbe.dll
2011-02-02 07:59:09 2067456 ----a-w- c:\windows\system32\mstscax.dll
2011-01-27 11:57:06 677888 ----a-w- c:\windows\system32\mstsc.exe
2011-01-21 14:44:12 441344 ----a-w- c:\windows\system32\shimgvw.dll
2011-01-07 14:09:02 290048 ----a-w- c:\windows\system32\atmfd.dll
2010-12-31 14:04:24 1855104 ----a-w- c:\windows\system32\win32k.sys
2010-12-22 12:34:26 301568 ----a-w- c:\windows\system32\kerberos.dll
2010-12-20 23:53:04 916480 ----a-w- c:\windows\system32\wininet.dll
2010-12-20 23:53:04 43520 ----a-w- c:\windows\system32\licmgr10.dll
2010-12-20 23:53:04 1469440 ------w- c:\windows\system32\inetcpl.cpl
2010-12-20 17:26:04 736768 ----a-w- c:\windows\system32\lsasrv.dll
2010-12-20 12:55:26 385024 ----a-w- c:\windows\system32\html.iec
.
============= FINISH: 18:26:52,59 ===============

Blade81
2011-03-10, 06:32
Hi,

Open notepad and copy/paste the text in the quotebox below into it:



Driver::
bcac



Save this as
CFScript

A word of warning: Neither I nor sUBs are responsible for any damage you may have caused your machine. This tool is not a toy and not for everyday use.

http://img.photobucket.com/albums/v666/sUBs/CFScriptB-4.gif

Close all browser windows and refering to the picture above, drag CFScript into ComboFix.exe
Then post the resultant log. Does it still redirect?

zazz666
2011-03-10, 22:01
Combo fix asked me to install an update, I taught it worth mentioning.

After the reboot, I had to reinstall curse client for wow's addons, so I'm wondering if the program is a back door for malware and other viruses.

redirecting troubles seems over

ComboFix 11-03-09.05 - Katherine Thomas 2011-03-10 15:20:17.4.2 - x86
Microsoft Windows XP Professionnel 5.1.2600.3.1252.2.1036.18.3070.2565 [GMT -5:00]
Lancé depuis: c:\documents and settings\Katherine Thomas\Bureau\ComboFix.exe
Commutateurs utilisés :: c:\documents and settings\Katherine Thomas\Bureau\CFScript.txt
.
.
(((((((((((((((((((((((((((((((((((( Autres suppressions ))))))))))))))))))))))))))))))))))))))))))))))))
.
.
.
((((((((((((((((((((((((((((((((((((((( Pilotes/Services )))))))))))))))))))))))))))))))))))))))))))))))))
.
.
-------\Legacy_BCAC
.
.
((((((((((((((((((((((((((((( Fichiers créés du 2011-02-10 au 2011-03-10 ))))))))))))))))))))))))))))))))))))
.
.
2011-03-09 07:17 . 2010-12-20 23:09 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2011-03-09 07:16 . 2011-03-09 07:17 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
2011-03-09 07:16 . 2010-12-20 23:08 20952 ----a-w- c:\windows\system32\drivers\mbam.sys
2011-03-08 00:42 . 2011-03-08 00:42 -------- d-----w- c:\program files\ERUNT
.
.
(((((((((((((((((((((((((((((((((( Compte-rendu de Find3M ))))))))))))))))))))))))))))))))))))))))))))))))
.
2011-02-04 22:48 . 2004-08-10 12:00 456192 ----a-w- c:\windows\system32\encdec.dll
2011-02-04 22:48 . 2004-08-10 12:00 291840 ----a-w- c:\windows\system32\sbe.dll
2011-02-02 07:59 . 2009-09-05 19:09 2067456 ----a-w- c:\windows\system32\mstscax.dll
2011-01-27 11:57 . 2009-09-05 19:09 677888 ----a-w- c:\windows\system32\mstsc.exe
2011-01-21 14:44 . 2004-08-10 12:00 441344 ----a-w- c:\windows\system32\shimgvw.dll
2011-01-07 14:09 . 2004-08-10 12:00 290048 ----a-w- c:\windows\system32\atmfd.dll
2010-12-31 14:04 . 2004-08-10 12:00 1855104 ----a-w- c:\windows\system32\win32k.sys
2010-12-22 12:34 . 2004-08-10 12:00 301568 ----a-w- c:\windows\system32\kerberos.dll
2010-12-20 23:53 . 2004-08-10 12:00 916480 ----a-w- c:\windows\system32\wininet.dll
2010-12-20 23:53 . 2004-08-10 12:00 43520 ----a-w- c:\windows\system32\licmgr10.dll
2010-12-20 23:53 . 2004-08-10 12:00 1469440 ------w- c:\windows\system32\inetcpl.cpl
2010-12-20 17:26 . 2004-08-10 12:00 736768 ----a-w- c:\windows\system32\lsasrv.dll
2010-12-20 12:55 . 2004-08-10 12:00 385024 ----a-w- c:\windows\system32\html.iec
2009-12-16 02:12 . 2009-12-11 02:12 119312 -c--a-w- c:\program files\mozilla firefox\components\deffdaefeab.dll
.
.
((((((((((((((((((((((((((((((((( Points de chargement Reg ))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* les éléments vides & les éléments initiaux légitimes ne sont pas listés
REGEDIT4
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"nwiz"="c:\program files\NVIDIA Corporation\nView\nwiz.exe" [2010-08-26 1753192]
"NvCplDaemon"="c:\windows\system32\NvCpl.dll" [2010-10-16 13851752]
"snp2std"="c:\windows\vsnp2std.exe" [2006-09-15 675840]
.
c:\documents and settings\Katherine Thomas\Menu D‚marrer\Programmes\D‚marrage\
CurseClientStartup.ccip [2010-7-23 0]
ERUNT AutoBackup.lnk - c:\program files\ERUNT\AUTOBACK.EXE [2005-10-20 38912]
.
c:\documents and settings\All Users\Menu D‚marrer\Programmes\D‚marrage\
APC UPS Status.lnk - c:\program files\APC\APC PowerChute Personal Edition\Display.exe [2009-9-5 221247]
SetPointII.lnk - c:\program files\Logitech\SetPoint II\SetpointII.exe [2009-7-21 323584]
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\WdfLoadGroup]
@=""
.
[HKLM\~\startupfolder\C:^Documents and Settings^All Users^Menu Démarrer^Programmes^Démarrage^CurseClientStartup.lnk]
path=c:\documents and settings\All Users\Menu Démarrer\Programmes\Démarrage\CurseClientStartup.lnk
backup=c:\windows\pss\CurseClientStartup.lnkCommon Startup
.
[HKLM\~\startupfolder\C:^Documents and Settings^Katherine Thomas^Menu Démarrer^Programmes^Démarrage^CurseClientStartup.ccip]
path=c:\documents and settings\Katherine Thomas\Menu Démarrer\Programmes\Démarrage\CurseClientStartup.ccip
backup=c:\windows\pss\CurseClientStartup.ccipStartup
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\DAEMON Tools Lite]
2009-10-30 11:57 369200 ----a-w- c:\program files\DAEMON Tools Lite\DTLite.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\snp2std]
2006-09-15 17:21 675840 -c--a-w- c:\windows\vsnp2std.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\tsnp2std]
2006-11-02 18:04 258048 ----a-w- c:\windows\tsnp2std.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\security center]
"AntiVirusOverride"=dword:00000001
.
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"c:\\Program Files\\Windows Live\\Messenger\\wlcsdk.exe"=
"c:\\Program Files\\Windows Live\\Messenger\\msnmsgr.exe"=
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"c:\\Program Files\\World of Warcraft\\WoW-3.2.0-enUS-downloader.exe"=
"c:\\Program Files\\World of Warcraft\\Launcher.exe"=
"c:\\Program Files\\World of Warcraft\\WoW-3.2.0.10192-to-3.2.0.10314-enUS-downloader.exe"=
"c:\\Program Files\\World of Warcraft\\WoW-3.2.0.10314-to-3.2.2.10482-enUS-downloader.exe"=
"c:\\WINDOWS\\system32\\sessmgr.exe"=
"c:\\Program Files\\World of Warcraft\\WoW-3.2.2.10482-to-3.2.2.10505-enUS-downloader.exe"=
"c:\\Program Files\\Messenger\\msmsgs.exe"=
"c:\\Documents and Settings\\Katherine Thomas\\Mes documents\\Mes fichiers reçus\\utorrent.exe"=
"c:\\WINDOWS\\system32\\dpvsetup.exe"=
"\\\\adannis-pc\\StarCraft II\\StarCraft II.exe"=
"c:\\Program Files\\World of Warcraft\\Blizzard Downloader.exe"=
"c:\\Documents and Settings\\Katherine Thomas\\Local Settings\\Apps\\2.0\\T9YXVD6A.WC9\\MNKOXACO.OOW\\curs..tion_eee711038731a406_0004.0000_efb506202a7c3b08\\CurseClient.exe"=
.
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\GloballyOpenPorts\List]
"6112:TCP"= 6112:TCP:Blizzard Downloader: 6112
"3724:TCP"= 3724:TCP:Blizzard Downloader: 3724
.
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\IcmpSettings]
"AllowInboundEchoRequest"= 1 (0x1)
.
R2 LBeepKE;LBeepKE;c:\windows\system32\drivers\LBeepKE.sys [2010-11-16 10384]
S3 FsUsbExDisk;FsUsbExDisk;c:\windows\system32\FsUsbExDisk.Sys [2009-09-05 36608]
S4 sptd;sptd;c:\windows\system32\drivers\sptd.sys [2009-11-26 691696]
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\svchost]
HPZ12 REG_MULTI_SZ Pml Driver HPZ12 Net Driver HPZ12
.
.
------- Examen supplémentaire -------
.
uSearchMigratedDefaultURL = hxxp://www.google.com/search?q={searchTerms}&sourceid=ie7&rls=com.microsoft:en-US&ie=utf8&oe=utf8
FF - ProfilePath - c:\documents and settings\Katherine Thomas\Application Data\Mozilla\Firefox\Profiles\4pj8hsfe.default\
FF - prefs.js: browser.search.selectedEngine - Wowhead
FF - prefs.js: browser.startup.homepage - hxxp://www.google.com/
FF - Ext: Default: {972ce4c6-7e08-4474-a285-3208198ce6fd} - c:\program files\Mozilla Firefox\extensions\{972ce4c6-7e08-4474-a285-3208198ce6fd}
FF - Ext: Java Console: {CAFEEFAC-0016-0000-0021-ABCDEFFEDCBA} - c:\program files\Mozilla Firefox\extensions\{CAFEEFAC-0016-0000-0021-ABCDEFFEDCBA}
FF - Ext: United States English Spellchecker: en-US@dictionaries.addons.mozilla.org - %profile%\extensions\en-US@dictionaries.addons.mozilla.org
FF - Ext: Via ScreenSharing: ViaScreenSharing@sviesolutions.com - %profile%\extensions\ViaScreenSharing@sviesolutions.com
FF - Ext: Microsoft .NET Framework Assistant: {20a82645-c095-46ed-80e3-08825760534b} - c:\windows\Microsoft.NET\Framework\v3.5\Windows Presentation Foundation\DotNetAssistantExtension
.
.
**************************************************************************
.
catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2011-03-10 15:26
Windows 5.1.2600 Service Pack 3 NTFS
.
Recherche de processus cachés ...
.
Recherche d'éléments en démarrage automatique cachés ...
.
Recherche de fichiers cachés ...
.
Scan terminé avec succès
Fichiers cachés: 0
.
**************************************************************************
.
--------------------- CLES DE REGISTRE BLOQUEES ---------------------
.
[HKEY_LOCAL_MACHINE\software\Microsoft\Windows\CurrentVersion\Installer\UserData\LocalSystem\Components\•€|ÿÿÿÿ"•€|þ»Ñw*]
"C040311900063D11C8EF10054038389C"="C?\\WINDOWS\\system32\\FM20ENU.DLL"
.
--------------------- DLLs chargées dans les processus actifs ---------------------
.
- - - - - - - > 'explorer.exe'(3912)
c:\progra~1\WINDOW~3\wmpband.dll
c:\windows\system32\webcheck.dll
c:\windows\system32\WPDShServiceObj.dll
c:\windows\system32\PortableDeviceTypes.dll
c:\windows\system32\PortableDeviceApi.dll
c:\windows\system32\eappprxy.dll
.
------------------------ Autres processus actifs ------------------------
.
c:\windows\system32\nvsvc32.exe
c:\program files\APC\APC PowerChute Personal Edition\mainserv.exe
c:\program files\Fichiers communs\Logishrd\KHAL2\KHALMNPR.EXE
c:\windows\Microsoft.NET\Framework\v2.0.50727\dfsvc.exe
c:\program files\APC\APC PowerChute Personal Edition\apcsystray.exe
.
**************************************************************************
.
Heure de fin: 2011-03-10 15:28:42 - La machine a redémarré
ComboFix-quarantined-files.txt 2011-03-10 20:28
ComboFix2.txt 2011-03-09 23:16
.
Avant-CF: 216*876*544*000 octets libres
Après-CF: 216*721*199*104 octets libres
.
- - End Of File - - 1EDEB3F2F0A6090FAC44420BEEA14D75

Blade81
2011-03-11, 18:31
After the reboot, I had to reinstall curse client for wow's addons, so I'm wondering if the program is a back door for malware and other viruses.
It should be ok if downloaded from official source.


Are you still noticing any problems? If not, it's time to secure your system to prevent against further intrusions.


THESE STEPS ARE VERY IMPORTANT

Let's reset system restore
Reset and Re-enable your System Restore to remove infected files that have been backed up by Windows. The files in System Restore are protected to prevent any programs changing those files. This is the only way to clean these files: You will lose all previous restore points which are likely to be infected. Please note you need Administrator Access to do clean the restore points.

1. Turn off System Restore.
On the Desktop, right-click My Computer.
Click Properties.
Click the System Restore tab.
Check Turn off System Restore.
Click Apply, and then click OK.

2. Reboot.

3. Turn ON System Restore.
On the Desktop, right-click My Computer.
Click Properties.
Click the System Restore tab.
UN-Check *Turn off System Restore*.
Click Apply, and then click OK.
NOTE: only do this ONCE,NOT on a regular basis


Now lets uninstall ComboFix:

Click START then RUN
Now copy-paste Combofix /uninstall in the runbox and click OK



UPDATING WINDOWS AND INTERNET EXPLORER

IMPORTANT: You Need to Update Windows and Internet Explorer to protect your computer from the malware that is around on the Internet. Please go to the windows update site (http://windowsupdate.microsoft.com/) to get the critical updates.

If you are running Microsoft Office, or any portion thereof, go to the Microsoft's Office Update site and make sure you have at least all the critical updates installed (Free) Microsoft Office Update.


Make your Internet Explorer more secure

This can be done by following these simple instructions:
From within Internet Explorer click on the Tools menu and then click on Options.
Click once on the Security tab
Click once on the Internet icon so it becomes highlighted.
Click once on the Custom Level button.
Change the Download signed ActiveX controls to Prompt
Change the Download unsigned ActiveX controls to Disable
Change the Initialize and script ActiveX controls not marked as safe to Disable
Change the Installation of desktop items to Prompt
Change the Launching programs and files in an IFRAME to Prompt
Change the Navigate sub-frames across different domains to Prompt
When all these settings have been made, click on the OK button.
If it prompts you as to whether or not you want to save the settings, press the Yes button.
Next press the Apply button and then the OK to exit the Internet Properties page.



The following are recommended third party programs that are designed to keep your computer clean. A link as well as a brief description is included with each item.


hosts file:
Every version of windows has a hosts file as part of them. In a very basic sense, they are used to locate webpages. We can customize a hosts file so that it blocks certain webpages. However, it can slow down certain computers. This is why using a hosts file is optional!!
Download it here (http://www.mvps.org/winhelp2002/hosts.htm). Make sure you read the instructions on how to install the hosts file. There is a good tutorial here (http://www.bleepingcomputer.com/forums/tutorial51.html)
If you decide to download the hosts file, the slowdown problems can usually be avoided by following these steps:
Click the start button (at the lower left hand corner of your screen) Click run In the dialog box, type services.msc hit enter, then locate dns client Highlight it, then double-click it. On the dropdown box, change the setting from automatic to manual. Click ok
Download and run Secunia Personal Software Inspector (PSI) (http://secunia.com/vulnerability_scanning/personal/) and fix its findings.
Get Anti Virus Software and keep it updated - Most AVs will update automatically, but if not I would recommend making updating the AV the first job every time the PC is connected to the internet. An AV that is using defs that are seven days old is not going to be much protection. If you do not update your anti virus software then it will not be able to catch any of the new variants that may come out. Good free antivirus programs are:
Antivir (http://free-av.com/en/download/1/download_avira_antivir_personal__free_antivirus.html)
Avast! (http://www.avast.com/eng/download-avast-home.html)
Good commercial ones are from:
Kaspersky (http://www.kaspersky.com/homeuser) and
ESET (http://www.eset.com/products/index.php)
Use a Firewall - I can not stress how important it is that you use a Firewall on your computer. Without a firewall your computer is susceptible to being hacked and taken over. Simply using a Firewall in its default configuration can lower your risk greatly. For more info, check this (http://www.bleepingcomputer.com/forums/tutorial60.html) webpage out.
If you don't have a 3rd party firewall or a router behind NAT then I recommend getting one. I recommend either Online Armor Free (http://www.tallemu.com/free-firewall-protection-software.html) or Comodo Firewall Pro (http://www.personalfirewall.comodo.com/download_firewall.html#fw3.0) (If you choose Comodo: Uncheck during installation Install Comodo HopSurf.., Make Comodo my default search provider and Make Comodo Search my homepage and install firewall ONLY!). Both providers have support forums that help with configuration related questions.



Just a final reminder for you. I am trying to stress these two points.
UPDATE UPDATE UPDATE!!! Make sure you do this about every 1-2 weeks.
Make sure all of your security programs are up to date.
Visit Microsoft's Windows Update Site Frequently - It is important that you visit http://www.windowsupdate.com regularly. This will ensure your computer has always the latest security updates available installed on your computer. If there are new updates to install, install them immediately, reboot your computer, and revisit the site until there are no more critical updates.


Once again, please post and tell me how things are going with your system... problems etc.

Have a great day,
Blade :cool:

zazz666
2011-03-11, 21:34
Thx a lot for the help, as always, fast and easy!!

Blade81
2011-03-12, 09:42
Since this issue appears to be resolved ... this Topic has been closed. Glad I could help. :)

Note:If it has been three days or more since your last post, and the helper assisting you posted a response to that post to which you did not reply, your topic will not be reopened. At that point, if you still require help, please start a new topic and include a fresh DDS log and a link to your previous thread.

If it has been less than three days since your last response and you need the thread re-opened, please send me or other MOD a private message (pm). A valid, working link to the closed topic is required.