Page 1 of 2 12 LastLast
Results 1 to 10 of 17

Thread: Win32/Vundo.gen!G, Win32/Vundo.gen!AH,... infection

  1. #1
    Junior Member
    Join Date
    Jan 2009
    Posts
    11

    Default Win32/Vundo.gen!G, Win32/Vundo.gen!AH,... infection

    I am running McAfee AV, Win Defender & SpyBot S&D. They have all found and deleted bits of the malware. Following this post I will be switching off this PC and will wait for some help.

    Defenders latest reports:

    Category:
    Trojan Win32/Vundo.gen!G

    Resources:
    file:
    C:\WINDOWS\system32\pewodajuX.dll
    file:
    C:\WINDOWS\system32\habayeso.dll

    Category:
    Trojan Win32/Vundo.gen!AH
    Resources:
    file:
    C:\WINDOWS\system32\vupotiki.dll
    file:
    C:\WINDOWS\system32\sivujebi.dll
    file:
    C:\WINDOWS\system32\gakufisi.dll

    Category:
    Trojan Win32/Vundo.gen!AM
    file:
    C:\WINDOWS\system32\yirabiza.dll
    file:
    C:\WINDOWS\system32\setevari.dll

    Then later...

    C:\WINDOWS\system32\zedomafe.dll.tmp
    C:\WINDOWS\system32\tagisoje.dll.tmp
    C:\WINDOWS\system32\royubefe.dll.tmp
    C:\WINDOWS\system32\ridihaka.dll.tmp
    C:\WINDOWS\system32\kepumafo.dll.tmp

    I have now rebooted and run HJT, renamed with my logon name:

    Logfile of Trend Micro HijackThis v2.0.2
    Scan saved at 23:13:08, on 03/01/2009
    Platform: Windows XP SP3 (WinNT 5.01.2600)
    MSIE: Internet Explorer v7.00 (7.00.6000.16762)
    Boot mode: Normal

    Running processes:
    C:\WINDOWS\System32\smss.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\services.exe
    C:\WINDOWS\system32\lsass.exe
    C:\WINDOWS\system32\Ati2evxx.exe
    C:\WINDOWS\system32\svchost.exe
    C:\Program Files\Windows Defender\MsMpEng.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\system32\spoolsv.exe
    C:\WINDOWS\system32\crypserv.exe
    C:\Program Files\Java\jre6\bin\jqs.exe
    C:\PROGRA~1\McAfee\MSC\mcmscsvc.exe
    c:\program files\common files\mcafee\mna\mcnasvc.exe
    c:\PROGRA~1\COMMON~1\mcafee\mcproxy\mcproxy.exe
    C:\PROGRA~1\McAfee\VIRUSS~1\mcshield.exe
    C:\Program Files\Common Files\Microsoft Shared\VS7Debug\mdm.exe
    C:\WINDOWS\System32\svchost.exe
    C:\Program Files\Stunnel\stunnel-4.05.exe
    C:\Program Files\McAfee\MPF\MPFSrv.exe
    C:\PROGRA~1\McAfee\VIRUSS~1\mcsysmon.exe
    C:\WINDOWS\system32\rundll32.exe
    c:\PROGRA~1\mcafee.com\agent\mcagent.exe
    C:\WINDOWS\system32\Ati2evxx.exe
    C:\WINDOWS\Explorer.EXE
    C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe
    C:\Program Files\Windows Defender\MSASCui.exe
    C:\Program Files\Java\jre6\bin\jusched.exe
    C:\WINDOWS\system32\ctfmon.exe
    C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
    C:\Program Files\No-IP\DUC20.exe
    C:\WINDOWS\system32\notepad.exe
    C:\Program Files\Trend Micro\HijackThis\greeneyedman000.exe

    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.google.co.uk/intl/en/options/
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
    R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Local Page =
    R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Local Page =
    R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = *.local
    O2 - BHO: Spybot-S&D IE Protection - {53707962-6F74-2D53-2644-206D7942484F} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
    O2 - BHO: Java(tm) Plug-In SSV Helper - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre6\bin\ssv.dll
    O2 - BHO: scriptproxy - {7DB2D5A0-7241-4E79-B68D-6309F01C5231} - C:\Program Files\McAfee\VirusScan\scriptsn.dll
    O2 - BHO: Java(tm) Plug-In 2 SSV Helper - {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Program Files\Java\jre6\bin\jp2ssv.dll
    O2 - BHO: JQSIEStartDetectorImpl - {E7E6F031-17CE-4C07-BC86-EABFE594F69C} - C:\Program Files\Java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll
    O4 - HKLM\..\Run: [ATIPTA] C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe
    O4 - HKLM\..\Run: [Windows Defender] "C:\Program Files\Windows Defender\MSASCui.exe" -hide
    O4 - HKLM\..\Run: [mcagent_exe] "C:\Program Files\McAfee.com\Agent\mcagent.exe" /runkey
    O4 - HKLM\..\Run: [McENUI] C:\PROGRA~1\McAfee\MHN\McENUI.exe /hide
    O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre6\bin\jusched.exe"
    O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
    O4 - HKCU\..\Run: [SpybotSD TeaTimer] C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
    O4 - HKCU\..\RunOnce: [DelayShred] "c:\program files\mcafee\mshr\ShrCL.EXE" /P7 /q C:\DOCUME~1\Graham\LOCALS~1\Temp\ADOBEL~1.SH! C:\DOCUME~1\Graham\LOCALS~1\Temp\AD5E0D~1.SH! C:\DOCUME~1\Graham\LOCALS~1\TEMPOR~1\Content.IE5\HG01AMIE\CJ_2_~1.SH! C:\DOCUME~1\Graham\LOCALS~1\TEMPOR~1\Content.IE5\UUZYHNHL\ADS_1_~1.SH! C:\DOCUME~1\Graham\LOCALS~1\TEMPOR~1\Content.IE5\HG01AMIE\CJ_1_~1.SH! C:\DOCUME~1\Graham\LOCALS~1\TEMPOR~1\Content.IE5\UUZYHNHL\CJ_1_~1.SH! C:\DOCUME~1\Graham\LOCALS~1\TEMPOR~1\Content.IE5\TQ7QF1IJ\ADS_1_~1.SH!
    O4 - HKUS\S-1-5-18\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\ctfmon.exe (User 'SYSTEM')
    O4 - HKUS\.DEFAULT\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\ctfmon.exe (User 'Default user')
    O4 - Global Startup: No-IP DUC.lnk = C:\Program Files\No-IP\DUC20.exe
    O9 - Extra button: (no name) - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
    O9 - Extra 'Tools' menuitem: Spybot - Search & Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
    O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
    O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
    O16 - DPF: {4ED9DDF0-7479-4BBE-9335-5A1EDB1D8A21} (McAfee.com Operating System Class) - http://download.mcafee.com/molbin/sh...4/mcinsctl.cab
    O16 - DPF: {AB86CE53-AC9F-449F-9399-D8ABCA09EC09} (Get_ActiveX Control) - https://h17000.www1.hp.com/ewfrf-JAV...oadManager.ocx
    O16 - DPF: {BCC0FF27-31D9-4614-A68E-C18E1ADA4389} (DwnldGroupMgr Class) - http://download.mcafee.com/molbin/sh...21/mcgdmgr.cab
    O16 - DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} (Shockwave Flash Object) - http://fpdownload2.macromedia.com/ge...sh/swflash.cab
    O23 - Service: Ati HotKey Poller - ATI Technologies Inc. - C:\WINDOWS\system32\Ati2evxx.exe
    O23 - Service: ATI Smart - Unknown owner - C:\WINDOWS\system32\ati2sgag.exe
    O23 - Service: Crypkey License - CrypKey (Canada) Ltd. - C:\WINDOWS\SYSTEM32\crypserv.exe
    O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
    O23 - Service: Java Quick Starter (JavaQuickStarterService) - Sun Microsystems, Inc. - C:\Program Files\Java\jre6\bin\jqs.exe
    O23 - Service: MBackMonitor - McAfee - C:\Program Files\McAfee\MBK\MBackMonitor.exe
    O23 - Service: McAfee Services (mcmscsvc) - McAfee, Inc. - C:\PROGRA~1\McAfee\MSC\mcmscsvc.exe
    O23 - Service: McAfee Network Agent (McNASvc) - McAfee, Inc. - c:\program files\common files\mcafee\mna\mcnasvc.exe
    O23 - Service: McAfee Scanner (McODS) - McAfee, Inc. - C:\PROGRA~1\McAfee\VIRUSS~1\mcods.exe
    O23 - Service: McAfee Proxy Service (McProxy) - McAfee, Inc. - c:\PROGRA~1\COMMON~1\mcafee\mcproxy\mcproxy.exe
    O23 - Service: Mcsh55imiw - ATI Technologies Inc. - C:\WINDOWS\system32\drivers\atinttxx.sys
    O23 - Service: McAfee Real-time Scanner (McShield) - McAfee, Inc. - C:\PROGRA~1\McAfee\VIRUSS~1\mcshield.exe
    O23 - Service: McAfee SystemGuards (McSysmon) - McAfee, Inc. - C:\PROGRA~1\McAfee\VIRUSS~1\mcsysmon.exe
    O23 - Service: McAfee Personal Firewall Service (MpfService) - McAfee, Inc. - C:\Program Files\McAfee\MPF\MPFSrv.exe
    O23 - Service: stunnel - Unknown owner - C:\Program Files\Stunnel\stunnel-4.05.exe

    --
    End of file - 6999 bytes

  2. #2
    Emeritus Blade81's Avatar
    Join Date
    Oct 2006
    Location
    Finland
    Posts
    25,300

    Default

    Hi

    Could you please post a fresh hjt log since the one you posted is rather old now?
    Microsoft Windows Insider MVP 2016-2018
    Microsoft MVP Consumer Security 2008-2015
    UNITE member since 2006

    If you have problems create a thread in the forum, please.

    Malware removal instructions are for the correspondent user's case only.

  3. #3
    Junior Member
    Join Date
    Jan 2009
    Posts
    11

    Default New Scan

    Thanks. New scan below.

    Logfile of Trend Micro HijackThis v2.0.2
    Scan saved at 18:00:57, on 09/01/2009
    Platform: Windows XP SP3 (WinNT 5.01.2600)
    MSIE: Internet Explorer v7.00 (7.00.6000.16762)
    Boot mode: Normal

    Running processes:
    C:\WINDOWS\System32\smss.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\services.exe
    C:\WINDOWS\system32\lsass.exe
    C:\WINDOWS\system32\Ati2evxx.exe
    C:\WINDOWS\system32\svchost.exe
    C:\Program Files\Windows Defender\MsMpEng.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\system32\spoolsv.exe
    C:\WINDOWS\system32\crypserv.exe
    C:\Program Files\Java\jre6\bin\jqs.exe
    C:\PROGRA~1\McAfee\MSC\mcmscsvc.exe
    c:\program files\common files\mcafee\mna\mcnasvc.exe
    c:\PROGRA~1\COMMON~1\mcafee\mcproxy\mcproxy.exe
    C:\PROGRA~1\McAfee\VIRUSS~1\mcshield.exe
    C:\Program Files\Common Files\Microsoft Shared\VS7Debug\mdm.exe
    C:\WINDOWS\System32\svchost.exe
    C:\Program Files\Stunnel\stunnel-4.05.exe
    C:\WINDOWS\system32\Ati2evxx.exe
    c:\PROGRA~1\mcafee.com\agent\mcagent.exe
    C:\WINDOWS\Explorer.EXE
    C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe
    C:\Program Files\Windows Defender\MSASCui.exe
    C:\Program Files\Java\jre6\bin\jusched.exe
    C:\WINDOWS\system32\ctfmon.exe
    C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
    C:\Program Files\No-IP\DUC20.exe
    C:\PROGRA~1\McAfee\VIRUSS~1\mcsysmon.exe
    C:\Program Files\Internet Explorer\iexplore.exe
    C:\Program Files\McAfee\MPF\MPFSrv.exe
    c:\PROGRA~1\mcafee\VIRUSS~1\mcvsshld.exe
    C:\Program Files\Trend Micro\HijackThis\greeneyedman000.exe
    C:\WINDOWS\system32\rundll32.exe
    c:\PROGRA~1\mcafee\msc\mcshell.exe

    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.google.co.uk/intl/en/options/
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
    R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Local Page =
    R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Local Page =
    R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = *.local
    O2 - BHO: Spybot-S&D IE Protection - {53707962-6F74-2D53-2644-206D7942484F} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
    O2 - BHO: Java(tm) Plug-In SSV Helper - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre6\bin\ssv.dll
    O2 - BHO: scriptproxy - {7DB2D5A0-7241-4E79-B68D-6309F01C5231} - C:\Program Files\McAfee\VirusScan\scriptsn.dll
    O2 - BHO: Java(tm) Plug-In 2 SSV Helper - {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Program Files\Java\jre6\bin\jp2ssv.dll
    O2 - BHO: JQSIEStartDetectorImpl - {E7E6F031-17CE-4C07-BC86-EABFE594F69C} - C:\Program Files\Java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll
    O4 - HKLM\..\Run: [ATIPTA] C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe
    O4 - HKLM\..\Run: [Windows Defender] "C:\Program Files\Windows Defender\MSASCui.exe" -hide
    O4 - HKLM\..\Run: [mcagent_exe] "C:\Program Files\McAfee.com\Agent\mcagent.exe" /runkey
    O4 - HKLM\..\Run: [McENUI] C:\PROGRA~1\McAfee\MHN\McENUI.exe /hide
    O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre6\bin\jusched.exe"
    O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
    O4 - HKCU\..\Run: [SpybotSD TeaTimer] C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
    O4 - HKCU\..\RunOnce: [DelayShred] "c:\program files\mcafee\mshr\ShrCL.EXE" /P7 /q C:\DOCUME~1\Graham\LOCALS~1\Temp\ADOBEL~1.SH! C:\DOCUME~1\Graham\LOCALS~1\Temp\AD5E0D~1.SH! C:\DOCUME~1\Graham\LOCALS~1\TEMPOR~1\Content.IE5\HG01AMIE\CJ_2_~1.SH! C:\DOCUME~1\Graham\LOCALS~1\TEMPOR~1\Content.IE5\UUZYHNHL\ADS_1_~1.SH! C:\DOCUME~1\Graham\LOCALS~1\TEMPOR~1\Content.IE5\HG01AMIE\CJ_1_~1.SH! C:\DOCUME~1\Graham\LOCALS~1\TEMPOR~1\Content.IE5\UUZYHNHL\CJ_1_~1.SH! C:\DOCUME~1\Graham\LOCALS~1\TEMPOR~1\Content.IE5\TQ7QF1IJ\ADS_1_~1.SH!
    O4 - HKUS\S-1-5-18\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\ctfmon.exe (User 'SYSTEM')
    O4 - HKUS\.DEFAULT\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\ctfmon.exe (User 'Default user')
    O4 - Global Startup: No-IP DUC.lnk = C:\Program Files\No-IP\DUC20.exe
    O9 - Extra button: (no name) - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
    O9 - Extra 'Tools' menuitem: Spybot - Search & Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
    O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
    O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
    O16 - DPF: {4ED9DDF0-7479-4BBE-9335-5A1EDB1D8A21} (McAfee.com Operating System Class) - http://download.mcafee.com/molbin/sh...4/mcinsctl.cab
    O16 - DPF: {AB86CE53-AC9F-449F-9399-D8ABCA09EC09} (Get_ActiveX Control) - https://h17000.www1.hp.com/ewfrf-JAV...oadManager.ocx
    O16 - DPF: {BCC0FF27-31D9-4614-A68E-C18E1ADA4389} (DwnldGroupMgr Class) - http://download.mcafee.com/molbin/sh...21/mcgdmgr.cab
    O16 - DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} (Shockwave Flash Object) - http://fpdownload2.macromedia.com/ge...sh/swflash.cab
    O23 - Service: Ati HotKey Poller - ATI Technologies Inc. - C:\WINDOWS\system32\Ati2evxx.exe
    O23 - Service: ATI Smart - Unknown owner - C:\WINDOWS\system32\ati2sgag.exe
    O23 - Service: Crypkey License - CrypKey (Canada) Ltd. - C:\WINDOWS\SYSTEM32\crypserv.exe
    O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
    O23 - Service: Java Quick Starter (JavaQuickStarterService) - Sun Microsystems, Inc. - C:\Program Files\Java\jre6\bin\jqs.exe
    O23 - Service: MBackMonitor - McAfee - C:\Program Files\McAfee\MBK\MBackMonitor.exe
    O23 - Service: McAfee Services (mcmscsvc) - McAfee, Inc. - C:\PROGRA~1\McAfee\MSC\mcmscsvc.exe
    O23 - Service: McAfee Network Agent (McNASvc) - McAfee, Inc. - c:\program files\common files\mcafee\mna\mcnasvc.exe
    O23 - Service: McAfee Scanner (McODS) - McAfee, Inc. - C:\PROGRA~1\McAfee\VIRUSS~1\mcods.exe
    O23 - Service: McAfee Proxy Service (McProxy) - McAfee, Inc. - c:\PROGRA~1\COMMON~1\mcafee\mcproxy\mcproxy.exe
    O23 - Service: Mcsh55imiw - ATI Technologies Inc. - C:\WINDOWS\system32\drivers\atinttxx.sys
    O23 - Service: McAfee Real-time Scanner (McShield) - McAfee, Inc. - C:\PROGRA~1\McAfee\VIRUSS~1\mcshield.exe
    O23 - Service: McAfee SystemGuards (McSysmon) - McAfee, Inc. - C:\PROGRA~1\McAfee\VIRUSS~1\mcsysmon.exe
    O23 - Service: McAfee Personal Firewall Service (MpfService) - McAfee, Inc. - C:\Program Files\McAfee\MPF\MPFSrv.exe
    O23 - Service: stunnel - Unknown owner - C:\Program Files\Stunnel\stunnel-4.05.exe

    --
    End of file - 7093 bytes

  4. #4
    Emeritus Blade81's Avatar
    Join Date
    Oct 2006
    Location
    Finland
    Posts
    25,300

    Default

    Hi again,


    Disable Spybot's TeaTimer to make sure it won't interfere with fixes. You can re-enable it when you're clean again:
    • Run Spybot-S&D in Advanced Mode
    • If it is not already set to do this, go to the Mode menu
      select
      Advanced Mode
    • On the left hand side, click on Tools
    • Then click on the Resident icon in the list
    • Uncheck
      Resident TeaTimer
      and OK any prompts.
    • Restart your computer


    Download ResetTeaTimer.bat to the Desktop (right click the link and select save)
    http://downloads.subratam.org/ResetTeaTimer.bat
    Double click ResetTeaTimer.bat to remove all entries set by TeaTimer (and preventing TeaTimer to restore them upon reactivation).


    Please visit this webpage for download links, and instructions for running ComboFix tool:

    http://www.bleepingcomputer.com/comb...o-use-combofix

    Please ensure you read this guide carefully and install the Recovery Console first.

    The Windows Recovery Console will allow you to boot up into a special recovery (repair) mode. This allows us to more easily help you should your computer have a problem after an attempted removal of malware. It is a simple procedure that will only take a few moments of your time.

    Once installed, you should see a blue screen prompt that says:

    The Recovery Console was successfully installed.

    Please continue as follows:

    1. Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix, link
      Remember to re-enable them afterwards.

    2. Click Yes to allow ComboFix to continue scanning for malware.


    When the tool is finished, it will produce a report for you.

    Please include the following reports for further review, and so we may continue cleansing the system:

    C:\ComboFix.txt
    New HijackThis log.


    A word of warning: Neither I nor sUBs are responsible for any damage you may have caused your machine by running ComboFix. This tool is not a toy and not for everyday use.
    Microsoft Windows Insider MVP 2016-2018
    Microsoft MVP Consumer Security 2008-2015
    UNITE member since 2006

    If you have problems create a thread in the forum, please.

    Malware removal instructions are for the correspondent user's case only.

  5. #5
    Junior Member
    Join Date
    Jan 2009
    Posts
    11

    Default Log Files

    ComboFix 09-01-08.05 - Graham 2009-01-09 19:40:12.1 - NTFSx86
    Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.1279.700 [GMT 0:00]
    Running from: c:\documents and settings\Graham\Desktop\ComboFix.exe
    AV: McAfee VirusScan *On-access scanning disabled* (Updated)
    FW: McAfee Personal Firewall *disabled*
    * Created a new restore point
    .

    ((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
    .

    c:\documents and settings\Graham\Local Settings\Temporary Internet Files\fbk.sts
    c:\windows\IE4 Error Log.txt
    c:\windows\system32\Cache
    c:\windows\system32\nuyovome.dll
    c:\windows\system32\vatedupo.dll

    .
    ((((((((((((((((((((((((((((((((((((((( Drivers/Services )))))))))))))))))))))))))))))))))))))))))))))))))
    .

    -------\Legacy_SERV-U
    -------\Service_Serv-U


    ((((((((((((((((((((((((( Files Created from 2008-12-09 to 2009-01-09 )))))))))))))))))))))))))))))))
    .

    2009-01-03 11:42 . 2009-01-03 11:42 <DIR> d-------- c:\documents and settings\Graham\Application Data\URSoft
    2009-01-03 11:41 . 2009-01-03 11:58 <DIR> d-------- c:\program files\Your Uninstaller 2008
    2009-01-02 17:08 . 2009-01-02 17:08 <DIR> d-------- c:\program files\ATF-Cleaner
    2009-01-02 16:41 . 2009-01-02 16:39 410,984 --a------ c:\windows\system32\deploytk.dll
    2009-01-02 16:41 . 2009-01-02 16:39 73,728 --a------ c:\windows\system32\javacpl.cpl
    2009-01-02 13:34 . 2009-01-02 13:34 <DIR> d-------- c:\program files\Microsoft Silverlight
    2009-01-02 13:28 . 2009-01-02 13:28 <DIR> d-------- c:\windows\system32\GroupPolicy
    2009-01-02 13:25 . 2008-03-07 17:02 192,000 -----c--- c:\windows\system32\dllcache\offfilt.dll
    2009-01-02 13:25 . 2008-03-07 17:02 98,304 -----c--- c:\windows\system32\dllcache\nlhtml.dll
    2009-01-02 13:25 . 2008-03-07 17:02 29,696 -----c--- c:\windows\system32\dllcache\mimefilt.dll
    2009-01-02 12:15 . 2009-01-02 12:15 <DIR> d-------- c:\program files\Trend Micro
    2009-01-01 14:06 . 2009-01-01 14:06 <DIR> d-------- c:\documents and settings\Graham\Application Data\Malwarebytes
    2009-01-01 14:05 . 2009-01-03 13:44 <DIR> d-------- c:\program files\Malwarebytes' Anti-Malware
    2009-01-01 14:05 . 2009-01-01 14:05 <DIR> d-------- c:\documents and settings\All Users\Application Data\Malwarebytes
    2009-01-01 14:05 . 2008-12-03 19:52 38,496 --a------ c:\windows\system32\drivers\mbamswissarmy.sys
    2009-01-01 14:05 . 2008-12-03 19:52 15,504 --a------ c:\windows\system32\drivers\mbam.sys
    2008-12-31 14:01 . 2008-12-31 14:01 <DIR> d-------- c:\program files\TeaTimer (Spybot - Search & Destroy)
    2008-12-31 14:00 . 2008-12-31 14:00 <DIR> d-------- c:\program files\SDHelper (Spybot - Search & Destroy)
    2008-12-31 14:00 . 2008-12-31 14:00 <DIR> d-------- c:\program files\Misc. Support Library (Spybot - Search & Destroy)
    2008-12-31 14:00 . 2008-12-31 14:00 <DIR> d-------- c:\program files\File Scanner Library (Spybot - Search & Destroy)

    .
    (((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
    .
    2009-01-03 14:26 --------- d-----w c:\documents and settings\All Users\Application Data\Spybot - Search & Destroy
    2009-01-03 14:17 --------- d-----w c:\program files\Spybot - Search & Destroy
    2009-01-03 11:43 --------- d---a-w c:\documents and settings\All Users\Application Data\TEMP
    2009-01-03 11:21 --------- d-----w c:\documents and settings\Graham\Application Data\Spybot - Search & Destroy
    2009-01-03 11:20 --------- d--h--w c:\program files\InstallShield Installation Information
    2009-01-03 11:20 --------- d-----w c:\program files\2BrightSparks
    2009-01-03 11:18 --------- d-----w c:\program files\Common Files\Adobe
    2009-01-02 17:57 --------- d-----w c:\program files\DC++
    2009-01-02 16:39 --------- d-----w c:\program files\Java
    2009-01-02 01:10 --------- d-----w c:\program files\eMule
    2008-12-31 11:25 --------- d-----w c:\program files\McAfee
    2008-12-21 18:18 --------- d-----w c:\program files\mIRC
    2008-10-23 12:36 286,720 ----a-w c:\windows\system32\gdi32.dll
    2008-10-16 20:38 826,368 ----a-w c:\windows\system32\wininet.dll
    2008-10-16 14:13 202,776 ----a-w c:\windows\system32\wuweb.dll
    2008-10-16 14:13 1,809,944 ----a-w c:\windows\system32\wuaueng.dll
    2008-10-16 14:12 561,688 ----a-w c:\windows\system32\wuapi.dll
    2008-10-16 14:12 323,608 ----a-w c:\windows\system32\wucltui.dll
    2008-10-16 14:09 92,696 ----a-w c:\windows\system32\cdm.dll
    2008-10-16 14:09 51,224 ----a-w c:\windows\system32\wuauclt.exe
    2008-10-16 14:09 43,544 ----a-w c:\windows\system32\wups2.dll
    2008-10-16 14:08 34,328 ----a-w c:\windows\system32\wups.dll
    2008-10-16 14:06 268,648 ----a-w c:\windows\system32\mucltui.dll
    2008-10-16 14:06 208,744 ----a-w c:\windows\system32\muweb.dll
    2006-07-07 14:19 0 ---h--w c:\documents and settings\All Users\Application Data\PKP_DLea.DAT
    2006-05-08 14:20 20 ---h--w c:\documents and settings\All Users\Application Data\PKP_DLec.DAT
    2008-09-27 13:30 32,768 --sha-w c:\windows\system32\config\systemprofile\Local Settings\History\History.IE5\MSHist012008092720080928\index.dat
    .

    ((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
    .
    .
    *Note* empty entries & legit default entries are not shown
    REGEDIT4

    [HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
    "ctfmon.exe"="c:\windows\system32\ctfmon.exe" [2008-04-14 15360]

    [HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce]
    "DelayShred"="c:\program files\mcafee\mshr\ShrCL.EXE" [2008-07-09 111904]

    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
    "ATIPTA"="c:\program files\ATI Technologies\ATI Control Panel\atiptaxx.exe" [2004-08-25 339968]
    "mcagent_exe"="c:\program files\McAfee.com\Agent\mcagent.exe" [2008-07-11 641208]
    "McENUI"="c:\progra~1\McAfee\MHN\McENUI.exe" [2008-06-13 1176808]
    "SunJavaUpdateSched"="c:\program files\Java\jre6\bin\jusched.exe" [2009-01-02 136600]

    [HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run]
    "CTFMON.EXE"="c:\windows\system32\ctfmon.exe" [2008-04-14 15360]

    c:\documents and settings\All Users\Start Menu\Programs\Startup\
    No-IP DUC.lnk - c:\program files\No-IP\DUC20.exe [2005-01-24 1079296]

    [HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\drivers32]
    "vidc.ffds"= ffdshow.ax

    [HKEY_LOCAL_MACHINE\system\currentcontrolset\control\session manager]
    BootExecute REG_MULTI_SZ autocheck autochk /r \??\E:\0autocheck autochk *

    [HKEY_LOCAL_MACHINE\software\microsoft\security center]
    "AntiVirusDisableNotify"=dword:00000001
    "UpdatesDisableNotify"=dword:00000001

    [HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\McAfeeAntiVirus]
    "DisableMonitoring"=dword:00000001

    [HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\McAfeeFirewall]
    "DisableMonitoring"=dword:00000001

    [HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]
    "EnableFirewall"= 0 (0x0)

    [HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
    "c:\\WINDOWS\\system32\\sessmgr.exe"=
    "c:\\Program Files\\DC++\\DCPlusPlus.exe"=
    "c:\\Program Files\\mIRC\\mirc.exe"=
    "c:\\Program Files\\eMule\\emule.exe"=
    "c:\\Program Files\\Messenger\\msmsgs.exe"=
    "%windir%\\Network Diagnostic\\xpnetdiag.exe"=
    "c:\\WINDOWS\\system32\\svchost.exe"=
    "c:\\Program Files\\Common Files\\McAfee\\MNA\\McNASvc.exe"=
    "%windir%\\system32\\sessmgr.exe"=

    [HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\GloballyOpenPorts\List]
    "1111:TCP"= 1111:TCP:System
    "1111:UDP"= 1111:UDP:System
    "1523:TCP"= 1523:TCP:System
    "1523:UDP"= 1523:UDP:System

    R4 WinDefend;Windows Defender;c:\program files\Windows Defender\MsMpEng.exe [2006-11-03 13592]
    S0 muavw;muavw;c:\windows\system32\drivers\jzdmb.sys --> c:\windows\system32\drivers\jzdmb.sys [?]
    S4 hpdj00;hpdj00;c:\docume~1\Graham\LOCALS~1\Temp\hpdj00.exe -servicerunning=true -uninstall=HP Photosmart 8400 Series -product=8400 --> c:\docume~1\Graham\LOCALS~1\Temp\hpdj00.exe -servicerunning=true -uninstall=HP Photosmart 8400 Series -product=8400 [?]
    .
    Contents of the 'Scheduled Tasks' folder

    2009-01-09 c:\windows\Tasks\bqextqlh.job
    - c:\windows\system32\rundll32.exe [2008-04-14 00:12]

    2008-12-28 c:\windows\Tasks\McAfee.com Scan for Viruses - My Computer (PC1-Administrator).job
    - c:\program files\mcafee.com\vso\mcmnhdlr.exe []

    2009-01-02 c:\windows\Tasks\McAfee.com Scan for Viruses - My Computer (PC1-Graham).job
    - c:\program files\mcafee.com\vso\mcmnhdlr.exe []

    2008-12-25 c:\windows\Tasks\McDefragTask.job
    - c:\progra~1\mcafee\mqc\QcConsol.exe [2008-07-09 17:10]

    2009-01-09 c:\windows\Tasks\MP Scheduled Scan.job
    - c:\program files\Windows Defender\MpCmdRun.exe [2006-11-03 18:20]

    2009-01-09 c:\windows\Tasks\User_Feed_Synchronization-{71F1E3E0-1D75-4DF2-943E-A76B05831D45}.job
    - c:\windows\system32\msfeedssync.exe [2006-10-17 12:58]
    .
    .
    ------- Supplementary Scan -------
    .
    uStart Page = hxxp://www.google.co.uk/intl/en/options/
    uSearchMigratedDefaultURL = hxxp://www.google.com/search?q={searchTerms}&sourceid=ie7&rls=com.microsoft:en-US&ie=utf8&oe=utf8
    uInternet Settings,ProxyOverride = *.local
    uSearchURL,(Default) = hxxp://www.google.com/keyword/%s
    .

    **************************************************************************

    catchme 0.3.1367 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
    Rootkit scan 2009-01-09 19:46:39
    Windows 5.1.2600 Service Pack 3 NTFS

    scanning hidden processes ...

    scanning hidden autostart entries ...

    scanning hidden files ...

    scan completed successfully
    hidden files: 0

    **************************************************************************
    .
    --------------------- LOCKED REGISTRY KEYS ---------------------

    [HKEY_USERS\S-1-5-21-854245398-1078145449-1957994488-1003\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved\{A818F93E-B1F2-4A98-0DEE-D1CFDF2FF70B}*NULL*]
    @Allowed: (Read) (RestrictedCode)
    @Allowed: (Read) (RestrictedCode)
    "abfnkdnehnicapfiompgkbekpipibeoffa"=hex:61,61,00,00
    "bbfnkdnehnicapfiommglhlggogcfeddhnpb"=hex:61,61,00,00
    .
    --------------------- DLLs Loaded Under Running Processes ---------------------

    - - - - - - - > 'winlogon.exe'(616)
    c:\windows\system32\Ati2evxx.dll
    .
    ------------------------ Other Running Processes ------------------------
    .
    c:\windows\system32\ati2evxx.exe
    c:\windows\system32\Crypserv.exe
    c:\program files\Java\jre6\bin\jqs.exe
    c:\progra~1\McAfee\MSC\mcmscsvc.exe
    c:\program files\Common Files\McAfee\MNA\McNASvc.exe
    c:\windows\system32\ati2evxx.exe
    c:\progra~1\COMMON~1\McAfee\McProxy\McProxy.exe
    c:\progra~1\McAfee\VIRUSS~1\Mcshield.exe
    c:\program files\Common Files\Microsoft Shared\VS7Debug\mdm.exe
    c:\progra~1\McAfee.com\Agent\mcagent.exe
    c:\program files\Stunnel\stunnel-4.05.exe
    c:\windows\system32\wdfmgr.exe
    c:\windows\system32\wscntfy.exe
    c:\program files\McAfee\MPF\MpfSrv.exe
    .
    **************************************************************************
    .
    Completion time: 2009-01-09 19:51:49 - machine was rebooted
    ComboFix-quarantined-files.txt 2009-01-09 19:51:36

    Pre-Run: 40,799,436,800 bytes free
    Post-Run: 40,693,526,528 bytes free

    WindowsXP-KB310994-SP2-Pro-BootDisk-ENU.exe
    [boot loader]
    timeout=2
    default=multi(0)disk(0)rdisk(0)partition(1)\WINDOWS
    [operating systems]
    c:\cmdcons\BOOTSECT.DAT="Microsoft Windows Recovery Console" /cmdcons
    multi(0)disk(0)rdisk(0)partition(1)\WINDOWS="Microsoft Windows XP Professional" /fastdetect /NoExecute=OptIn

    196 --- E O F --- 2009-01-09 17:50:55

    **********************************************************
    Logfile of Trend Micro HijackThis v2.0.2
    Scan saved at 19:53:46, on 09/01/2009
    Platform: Windows XP SP3 (WinNT 5.01.2600)
    MSIE: Internet Explorer v7.00 (7.00.6000.16762)
    Boot mode: Normal

    Running processes:
    C:\WINDOWS\System32\smss.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\services.exe
    C:\WINDOWS\system32\lsass.exe
    C:\WINDOWS\system32\Ati2evxx.exe
    C:\WINDOWS\system32\svchost.exe
    C:\Program Files\Windows Defender\MsMpEng.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\system32\spoolsv.exe
    C:\WINDOWS\system32\crypserv.exe
    C:\Program Files\Java\jre6\bin\jqs.exe
    C:\PROGRA~1\McAfee\MSC\mcmscsvc.exe
    c:\program files\common files\mcafee\mna\mcnasvc.exe
    C:\WINDOWS\system32\Ati2evxx.exe
    c:\PROGRA~1\COMMON~1\mcafee\mcproxy\mcproxy.exe
    C:\PROGRA~1\McAfee\VIRUSS~1\mcshield.exe
    C:\Program Files\Common Files\Microsoft Shared\VS7Debug\mdm.exe
    C:\WINDOWS\System32\svchost.exe
    c:\PROGRA~1\mcafee.com\agent\mcagent.exe
    C:\Program Files\Stunnel\stunnel-4.05.exe
    C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe
    C:\Program Files\Java\jre6\bin\jusched.exe
    C:\WINDOWS\system32\ctfmon.exe
    C:\Program Files\No-IP\DUC20.exe
    C:\WINDOWS\system32\wscntfy.exe
    C:\Program Files\McAfee\MPF\MPFSrv.exe
    C:\WINDOWS\explorer.exe
    C:\WINDOWS\system32\notepad.exe
    C:\Program Files\Trend Micro\HijackThis\greeneyedman000.exe

    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.google.co.uk/intl/en/options/
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
    R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Local Page =
    R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Local Page =
    R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = *.local
    O2 - BHO: Java(tm) Plug-In SSV Helper - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre6\bin\ssv.dll
    O2 - BHO: scriptproxy - {7DB2D5A0-7241-4E79-B68D-6309F01C5231} - C:\Program Files\McAfee\VirusScan\scriptsn.dll
    O2 - BHO: Java(tm) Plug-In 2 SSV Helper - {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Program Files\Java\jre6\bin\jp2ssv.dll
    O2 - BHO: JQSIEStartDetectorImpl - {E7E6F031-17CE-4C07-BC86-EABFE594F69C} - C:\Program Files\Java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll
    O4 - HKLM\..\Run: [ATIPTA] C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe
    O4 - HKLM\..\Run: [mcagent_exe] "C:\Program Files\McAfee.com\Agent\mcagent.exe" /runkey
    O4 - HKLM\..\Run: [McENUI] C:\PROGRA~1\McAfee\MHN\McENUI.exe /hide
    O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre6\bin\jusched.exe"
    O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
    O4 - HKCU\..\RunOnce: [DelayShred] "c:\program files\mcafee\mshr\ShrCL.EXE" /P7 /q C:\DOCUME~1\Graham\LOCALS~1\Temp\ADOBEL~1.SH! C:\DOCUME~1\Graham\LOCALS~1\Temp\AD5E0D~1.SH! C:\DOCUME~1\Graham\LOCALS~1\TEMPOR~1\Content.IE5\HG01AMIE\CJ_2_~1.SH! C:\DOCUME~1\Graham\LOCALS~1\TEMPOR~1\Content.IE5\UUZYHNHL\ADS_1_~1.SH! C:\DOCUME~1\Graham\LOCALS~1\TEMPOR~1\Content.IE5\HG01AMIE\CJ_1_~1.SH! C:\DOCUME~1\Graham\LOCALS~1\TEMPOR~1\Content.IE5\UUZYHNHL\CJ_1_~1.SH! C:\DOCUME~1\Graham\LOCALS~1\TEMPOR~1\Content.IE5\TQ7QF1IJ\ADS_1_~1.SH!
    O4 - HKUS\S-1-5-18\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\ctfmon.exe (User 'SYSTEM')
    O4 - HKUS\.DEFAULT\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\ctfmon.exe (User 'Default user')
    O4 - Global Startup: No-IP DUC.lnk = C:\Program Files\No-IP\DUC20.exe
    O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
    O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
    O16 - DPF: {4ED9DDF0-7479-4BBE-9335-5A1EDB1D8A21} (McAfee.com Operating System Class) - http://download.mcafee.com/molbin/sh...4/mcinsctl.cab
    O16 - DPF: {AB86CE53-AC9F-449F-9399-D8ABCA09EC09} (Get_ActiveX Control) - https://h17000.www1.hp.com/ewfrf-JAV...oadManager.ocx
    O16 - DPF: {BCC0FF27-31D9-4614-A68E-C18E1ADA4389} (DwnldGroupMgr Class) - http://download.mcafee.com/molbin/sh...21/mcgdmgr.cab
    O16 - DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} (Shockwave Flash Object) - http://fpdownload2.macromedia.com/ge...sh/swflash.cab
    O23 - Service: Ati HotKey Poller - ATI Technologies Inc. - C:\WINDOWS\system32\Ati2evxx.exe
    O23 - Service: ATI Smart - Unknown owner - C:\WINDOWS\system32\ati2sgag.exe
    O23 - Service: Crypkey License - CrypKey (Canada) Ltd. - C:\WINDOWS\SYSTEM32\crypserv.exe
    O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
    O23 - Service: Java Quick Starter (JavaQuickStarterService) - Sun Microsystems, Inc. - C:\Program Files\Java\jre6\bin\jqs.exe
    O23 - Service: MBackMonitor - McAfee - C:\Program Files\McAfee\MBK\MBackMonitor.exe
    O23 - Service: McAfee Services (mcmscsvc) - McAfee, Inc. - C:\PROGRA~1\McAfee\MSC\mcmscsvc.exe
    O23 - Service: McAfee Network Agent (McNASvc) - McAfee, Inc. - c:\program files\common files\mcafee\mna\mcnasvc.exe
    O23 - Service: McAfee Scanner (McODS) - McAfee, Inc. - C:\PROGRA~1\McAfee\VIRUSS~1\mcods.exe
    O23 - Service: McAfee Proxy Service (McProxy) - McAfee, Inc. - c:\PROGRA~1\COMMON~1\mcafee\mcproxy\mcproxy.exe
    O23 - Service: Mcsh55imiw - ATI Technologies Inc. - C:\WINDOWS\system32\drivers\atinttxx.sys
    O23 - Service: McAfee Real-time Scanner (McShield) - McAfee, Inc. - C:\PROGRA~1\McAfee\VIRUSS~1\mcshield.exe
    O23 - Service: McAfee Personal Firewall Service (MpfService) - McAfee, Inc. - C:\Program Files\McAfee\MPF\MPFSrv.exe
    O23 - Service: stunnel - Unknown owner - C:\Program Files\Stunnel\stunnel-4.05.exe

    --
    End of file - 6193 bytes

  6. #6
    Emeritus Blade81's Avatar
    Join Date
    Oct 2006
    Location
    Finland
    Posts
    25,300

    Default

    Hi

    IMPORTANT I notice there are signs of one or more P2P (Peer to Peer) File Sharing Programs on your computer.


    DC++
    eMule


    I'd like you to read this thread.

    Please go to Control Panel > Add/Remove Programs and uninstall the programs listed above (in red).

    Delete these folders afterwards:

    c:\program files\DC++
    c:\program files\eMule

    Empty Recycle Bin.

    After that:



    Start hjt, do a system scan, check (if found):
    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Local Page =
    R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Local Page =

    Close browsers and fix checked.


    Creating & executing batch file
    -------------------------------

    Open notepad and then copy and paste the bolded lines below into it. Go to File > save as and name the file fixes.bat, change the Save as type to all files and save it to your desktop.
    @echo off
    swreg null delete "HKU\S-1-5-21-854245398-1078145449-1957994488-1003\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved\{A818F93E-B1F2-4A98-0DEE-D1CFDF2FF70B}*" /n *


    Double-click on fixes.bat file to execute it.


    Open notepad and copy/paste the text in the quotebox below into it:

    Code:
    File::
    c:\windows\Tasks\bqextqlh.job
    
    Folder::
    c:\program files\DC++
    c:\program files\eMule
    
    Registry::
    [HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
    "c:\\Program Files\\DC++\\DCPlusPlus.exe"=-
    "c:\\Program Files\\eMule\\emule.exe"=-

    Save this as
    CFScript

    A word of warning: Neither I nor sUBs are responsible for any damage you may have caused your machine. This tool is not a toy and not for everyday use.



    Refering to the picture above, drag CFScript into ComboFix.exe
    Then post the resultant log.


    Combofix should never take more that 20 minutes including the reboot if malware is detected.
    If it does, open Task Manager then Processes tab (press ctrl, alt and del at the same time) and end any processes of findstr, find, sed or swreg, then combofix should continue.
    If that happened we want to know, and also what process you had to end.


    Download ATF (Atribune Temp File) Cleanerę by Atribune to your desktop.

    Double-click ATF Cleaner.exe to open it

    Under Main choose:
    Windows Temp
    Current User Temp
    All Users Temp
    Cookies
    Temporary Internet Files
    Prefetch
    Java Cache

    *The other boxes are optional*
    Then click the Empty Selected button.

    If you use Firefox:
    Click Firefox at the top and choose: Select All
    Click the Empty Selected button.
    NOTE: If you would like to keep your saved passwords, please click NO at the prompt.

    If you use Opera:
    Click Opera at the top and choose: Select All
    Click the Empty Selected button.
    NOTE: If you would like to keep your saved passwords, please click NO at the prompt.

    Click Exit on the Main menu to close the program.


    Please run an online scan with Kaspersky Online Scanner as instructed in the screenshot here.


    Post back its report, a fresh hjt log and above mentioned ComboFix resultant log.
    Microsoft Windows Insider MVP 2016-2018
    Microsoft MVP Consumer Security 2008-2015
    UNITE member since 2006

    If you have problems create a thread in the forum, please.

    Malware removal instructions are for the correspondent user's case only.

  7. #7
    Junior Member
    Join Date
    Jan 2009
    Posts
    11

    Default ComboFix, KOS, HJT logs

    ComboFix 09-01-08.05 - Graham 2009-01-10 17:19:21.2 - NTFSx86
    Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.1279.762 [GMT 0:00]
    Running from: c:\documents and settings\Graham\Desktop\ComboFix.exe
    Command switches used :: c:\documents and settings\Graham\Desktop\CFScript
    AV: McAfee VirusScan *On-access scanning disabled* (Updated)
    FW: McAfee Personal Firewall *enabled*
    * Created a new restore point

    FILE ::
    c:\windows\Tasks\bqextqlh.job
    .

    ((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
    .

    c:\windows\Tasks\bqextqlh.job

    .
    ((((((((((((((((((((((((( Files Created from 2008-12-10 to 2009-01-10 )))))))))))))))))))))))))))))))
    .

    2009-01-03 11:42 . 2009-01-03 11:42 <DIR> d-------- c:\documents and settings\Graham\Application Data\URSoft
    2009-01-03 11:41 . 2009-01-03 11:58 <DIR> d-------- c:\program files\Your Uninstaller 2008
    2009-01-02 17:08 . 2009-01-02 17:08 <DIR> d-------- c:\program files\ATF-Cleaner
    2009-01-02 16:41 . 2009-01-02 16:39 410,984 --a------ c:\windows\system32\deploytk.dll
    2009-01-02 16:41 . 2009-01-02 16:39 73,728 --a------ c:\windows\system32\javacpl.cpl
    2009-01-02 13:34 . 2009-01-02 13:34 <DIR> d-------- c:\program files\Microsoft Silverlight
    2009-01-02 13:28 . 2009-01-02 13:28 <DIR> d-------- c:\windows\system32\GroupPolicy
    2009-01-02 13:25 . 2008-03-07 17:02 192,000 -----c--- c:\windows\system32\dllcache\offfilt.dll
    2009-01-02 13:25 . 2008-03-07 17:02 98,304 -----c--- c:\windows\system32\dllcache\nlhtml.dll
    2009-01-02 13:25 . 2008-03-07 17:02 29,696 -----c--- c:\windows\system32\dllcache\mimefilt.dll
    2009-01-02 12:15 . 2009-01-02 12:15 <DIR> d-------- c:\program files\Trend Micro
    2009-01-01 14:06 . 2009-01-01 14:06 <DIR> d-------- c:\documents and settings\Graham\Application Data\Malwarebytes
    2009-01-01 14:05 . 2009-01-03 13:44 <DIR> d-------- c:\program files\Malwarebytes' Anti-Malware
    2009-01-01 14:05 . 2009-01-01 14:05 <DIR> d-------- c:\documents and settings\All Users\Application Data\Malwarebytes
    2009-01-01 14:05 . 2008-12-03 19:52 38,496 --a------ c:\windows\system32\drivers\mbamswissarmy.sys
    2009-01-01 14:05 . 2008-12-03 19:52 15,504 --a------ c:\windows\system32\drivers\mbam.sys
    2008-12-31 14:01 . 2008-12-31 14:01 <DIR> d-------- c:\program files\TeaTimer (Spybot - Search & Destroy)
    2008-12-31 14:00 . 2008-12-31 14:00 <DIR> d-------- c:\program files\SDHelper (Spybot - Search & Destroy)
    2008-12-31 14:00 . 2008-12-31 14:00 <DIR> d-------- c:\program files\Misc. Support Library (Spybot - Search & Destroy)
    2008-12-31 14:00 . 2008-12-31 14:00 <DIR> d-------- c:\program files\File Scanner Library (Spybot - Search & Destroy)

    .
    (((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
    .
    2009-01-03 14:26 --------- d-----w c:\documents and settings\All Users\Application Data\Spybot - Search & Destroy
    2009-01-03 14:17 --------- d-----w c:\program files\Spybot - Search & Destroy
    2009-01-03 11:43 --------- d---a-w c:\documents and settings\All Users\Application Data\TEMP
    2009-01-03 11:21 --------- d-----w c:\documents and settings\Graham\Application Data\Spybot - Search & Destroy
    2009-01-03 11:20 --------- d--h--w c:\program files\InstallShield Installation Information
    2009-01-03 11:20 --------- d-----w c:\program files\2BrightSparks
    2009-01-03 11:18 --------- d-----w c:\program files\Common Files\Adobe
    2009-01-02 16:39 --------- d-----w c:\program files\Java
    2008-12-31 11:25 --------- d-----w c:\program files\McAfee
    2008-12-21 18:18 --------- d-----w c:\program files\mIRC
    2008-10-23 12:36 286,720 ----a-w c:\windows\system32\gdi32.dll
    2008-10-16 20:38 826,368 ----a-w c:\windows\system32\wininet.dll
    2008-10-16 14:13 202,776 ----a-w c:\windows\system32\wuweb.dll
    2008-10-16 14:13 1,809,944 ----a-w c:\windows\system32\wuaueng.dll
    2008-10-16 14:12 561,688 ----a-w c:\windows\system32\wuapi.dll
    2008-10-16 14:12 323,608 ----a-w c:\windows\system32\wucltui.dll
    2008-10-16 14:09 92,696 ----a-w c:\windows\system32\cdm.dll
    2008-10-16 14:09 51,224 ----a-w c:\windows\system32\wuauclt.exe
    2008-10-16 14:09 43,544 ----a-w c:\windows\system32\wups2.dll
    2008-10-16 14:08 34,328 ----a-w c:\windows\system32\wups.dll
    2008-10-16 14:06 268,648 ----a-w c:\windows\system32\mucltui.dll
    2008-10-16 14:06 208,744 ----a-w c:\windows\system32\muweb.dll
    2006-07-07 14:19 0 ---h--w c:\documents and settings\All Users\Application Data\PKP_DLea.DAT
    2006-05-08 14:20 20 ---h--w c:\documents and settings\All Users\Application Data\PKP_DLec.DAT
    2008-09-27 13:30 32,768 --sha-w c:\windows\system32\config\systemprofile\Local Settings\History\History.IE5\MSHist012008092720080928\index.dat
    .

    ((((((((((((((((((((((((((((( snapshot@2009-01-09_19.48.29.57 )))))))))))))))))))))))))))))))))))))))))
    .
    - 2009-01-09 17:52:40 32,768 ----a-w c:\windows\system32\config\systemprofile\Cookies\index.dat
    + 2009-01-10 16:52:19 32,768 ----a-w c:\windows\system32\config\systemprofile\Cookies\index.dat
    - 2009-01-09 17:52:40 32,768 ----a-w c:\windows\system32\config\systemprofile\Local Settings\History\History.IE5\index.dat
    + 2009-01-10 16:52:19 32,768 ----a-w c:\windows\system32\config\systemprofile\Local Settings\History\History.IE5\index.dat
    - 2009-01-09 17:52:40 32,768 ----a-w c:\windows\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\index.dat
    + 2009-01-10 16:52:19 32,768 ----a-w c:\windows\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\index.dat
    + 2009-01-10 16:40:58 16,384 ----atw c:\windows\Temp\Perflib_Perfdata_628.dat
    .
    ((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
    .
    .
    *Note* empty entries & legit default entries are not shown
    REGEDIT4

    [HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
    "ctfmon.exe"="c:\windows\system32\ctfmon.exe" [2008-04-14 15360]

    [HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce]
    "DelayShred"="c:\program files\mcafee\mshr\ShrCL.EXE" [2008-07-09 111904]

    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
    "ATIPTA"="c:\program files\ATI Technologies\ATI Control Panel\atiptaxx.exe" [2004-08-25 339968]
    "mcagent_exe"="c:\program files\McAfee.com\Agent\mcagent.exe" [2008-07-11 641208]
    "McENUI"="c:\progra~1\McAfee\MHN\McENUI.exe" [2008-06-13 1176808]
    "SunJavaUpdateSched"="c:\program files\Java\jre6\bin\jusched.exe" [2009-01-02 136600]

    [HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run]
    "CTFMON.EXE"="c:\windows\system32\ctfmon.exe" [2008-04-14 15360]

    c:\documents and settings\All Users\Start Menu\Programs\Startup\
    No-IP DUC.lnk - c:\program files\No-IP\DUC20.exe [2005-01-24 1079296]

    [HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\drivers32]
    "vidc.ffds"= ffdshow.ax

    [HKEY_LOCAL_MACHINE\system\currentcontrolset\control\session manager]
    BootExecute REG_MULTI_SZ autocheck autochk /r \??\E:\0autocheck autochk *

    [HKEY_LOCAL_MACHINE\software\microsoft\security center]
    "AntiVirusDisableNotify"=dword:00000001
    "UpdatesDisableNotify"=dword:00000001

    [HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\McAfeeAntiVirus]
    "DisableMonitoring"=dword:00000001

    [HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\McAfeeFirewall]
    "DisableMonitoring"=dword:00000001

    [HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]
    "EnableFirewall"= 0 (0x0)

    [HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
    "c:\\WINDOWS\\system32\\sessmgr.exe"=
    "c:\\Program Files\\mIRC\\mirc.exe"=
    "c:\\Program Files\\Messenger\\msmsgs.exe"=
    "%windir%\\Network Diagnostic\\xpnetdiag.exe"=
    "c:\\WINDOWS\\system32\\svchost.exe"=
    "c:\\Program Files\\Common Files\\McAfee\\MNA\\McNASvc.exe"=
    "%windir%\\system32\\sessmgr.exe"=

    [HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\GloballyOpenPorts\List]
    "1111:TCP"= 1111:TCP:System
    "1111:UDP"= 1111:UDP:System
    "1523:TCP"= 1523:TCP:System
    "1523:UDP"= 1523:UDP:System

    R4 WinDefend;Windows Defender;c:\program files\Windows Defender\MsMpEng.exe [2006-11-03 13592]
    S0 muavw;muavw;c:\windows\system32\drivers\jzdmb.sys --> c:\windows\system32\drivers\jzdmb.sys [?]
    S4 hpdj00;hpdj00;c:\docume~1\Graham\LOCALS~1\Temp\hpdj00.exe -servicerunning=true -uninstall=HP Photosmart 8400 Series -product=8400 --> c:\docume~1\Graham\LOCALS~1\Temp\hpdj00.exe -servicerunning=true -uninstall=HP Photosmart 8400 Series -product=8400 [?]
    .
    Contents of the 'Scheduled Tasks' folder

    2008-12-28 c:\windows\Tasks\McAfee.com Scan for Viruses - My Computer (PC1-Administrator).job
    - c:\program files\mcafee.com\vso\mcmnhdlr.exe []

    2009-01-02 c:\windows\Tasks\McAfee.com Scan for Viruses - My Computer (PC1-Graham).job
    - c:\program files\mcafee.com\vso\mcmnhdlr.exe []

    2008-12-25 c:\windows\Tasks\McDefragTask.job
    - c:\progra~1\mcafee\mqc\QcConsol.exe [2008-07-09 17:10]

    2009-01-10 c:\windows\Tasks\MP Scheduled Scan.job
    - c:\program files\Windows Defender\MpCmdRun.exe [2006-11-03 18:20]

    2009-01-10 c:\windows\Tasks\User_Feed_Synchronization-{71F1E3E0-1D75-4DF2-943E-A76B05831D45}.job
    - c:\windows\system32\msfeedssync.exe [2006-10-17 12:58]
    .
    .
    ------- Supplementary Scan -------
    .
    uStart Page = hxxp://www.google.co.uk/intl/en/options/
    uSearchMigratedDefaultURL = hxxp://www.google.com/search?q={searchTerms}&sourceid=ie7&rls=com.microsoft:en-US&ie=utf8&oe=utf8
    uInternet Settings,ProxyOverride = *.local
    uSearchURL,(Default) = hxxp://www.google.com/keyword/%s
    .

    **************************************************************************

    catchme 0.3.1367 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
    Rootkit scan 2009-01-10 17:22:32
    Windows 5.1.2600 Service Pack 3 NTFS

    scanning hidden processes ...

    scanning hidden autostart entries ...

    scanning hidden files ...

    scan completed successfully
    hidden files: 0

    **************************************************************************
    .
    --------------------- DLLs Loaded Under Running Processes ---------------------

    - - - - - - - > 'winlogon.exe'(616)
    c:\windows\system32\Ati2evxx.dll
    .
    Completion time: 2009-01-10 17:26:09
    ComboFix-quarantined-files.txt 2009-01-10 17:25:59
    ComboFix2.txt 2009-01-09 19:51:53

    Pre-Run: 68,579,889,152 bytes free
    Post-Run: 68,566,421,504 bytes free

    163 --- E O F --- 2009-01-09 17:50:55

    **********************************************************

    --------------------------------------------------------------------------------
    KASPERSKY ONLINE SCANNER 7 REPORT
    Saturday, January 10, 2009
    Operating System: Microsoft Windows XP Professional Service Pack 3 (build 2600)
    Kaspersky Online Scanner 7 version: 7.0.25.0
    Program database last update: Saturday, January 10, 2009 16:36:23
    Records in database: 1598915
    --------------------------------------------------------------------------------

    Scan settings:
    Scan using the following database: extended
    Scan archives: yes
    Scan mail databases: yes

    Scan area - My Computer:
    A:\
    C:\
    D:\
    F:\
    G:\
    H:\
    I:\
    J:\
    K:\
    L:\
    Z:\

    Scan statistics:
    Files scanned: 94404
    Threat name: 1
    Infected objects: 2
    Suspicious objects: 0
    Duration of the scan: 04:35:56


    File name / Threat name / Threats count
    C:\Program Files\mIRC\mirc.exe Infected: not-a-virus:Client-IRC.Win32.mIRC.612 1
    H:\Software\P2P\mIRC\mirc612.exe Infected: not-a-virus:Client-IRC.Win32.mIRC.612 1

    The selected area was scanned.

    **********************************************************

    Logfile of Trend Micro HijackThis v2.0.2
    Scan saved at 22:34:00, on 10/01/2009
    Platform: Windows XP SP3 (WinNT 5.01.2600)
    MSIE: Internet Explorer v7.00 (7.00.6000.16762)
    Boot mode: Normal

    Running processes:
    C:\WINDOWS\System32\smss.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\services.exe
    C:\WINDOWS\system32\lsass.exe
    C:\WINDOWS\system32\Ati2evxx.exe
    C:\WINDOWS\system32\svchost.exe
    C:\Program Files\Windows Defender\MsMpEng.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\system32\spoolsv.exe
    C:\WINDOWS\system32\crypserv.exe
    C:\Program Files\Java\jre6\bin\jqs.exe
    C:\PROGRA~1\McAfee\MSC\mcmscsvc.exe
    c:\program files\common files\mcafee\mna\mcnasvc.exe
    c:\PROGRA~1\COMMON~1\mcafee\mcproxy\mcproxy.exe
    C:\PROGRA~1\McAfee\VIRUSS~1\mcshield.exe
    C:\Program Files\Common Files\Microsoft Shared\VS7Debug\mdm.exe
    C:\WINDOWS\System32\svchost.exe
    C:\Program Files\Stunnel\stunnel-4.05.exe
    c:\PROGRA~1\mcafee.com\agent\mcagent.exe
    C:\WINDOWS\system32\Ati2evxx.exe
    C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe
    C:\Program Files\Java\jre6\bin\jusched.exe
    C:\WINDOWS\system32\ctfmon.exe
    C:\Program Files\No-IP\DUC20.exe
    C:\Program Files\McAfee\MPF\MPFSrv.exe
    C:\WINDOWS\system32\wscntfy.exe
    C:\WINDOWS\system32\notepad.exe
    C:\WINDOWS\explorer.exe
    C:\Program Files\Internet Explorer\IEXPLORE.EXE
    C:\Program Files\Java\jre6\bin\java.exe
    C:\Program Files\Internet Explorer\IEXPLORE.EXE
    C:\WINDOWS\system32\notepad.exe
    C:\Program Files\Trend Micro\HijackThis\greeneyedman000.exe

    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.google.co.uk/intl/en/options/
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
    R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
    R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = *.local
    O2 - BHO: Java(tm) Plug-In SSV Helper - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre6\bin\ssv.dll
    O2 - BHO: scriptproxy - {7DB2D5A0-7241-4E79-B68D-6309F01C5231} - C:\Program Files\McAfee\VirusScan\scriptsn.dll
    O2 - BHO: Java(tm) Plug-In 2 SSV Helper - {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Program Files\Java\jre6\bin\jp2ssv.dll
    O2 - BHO: JQSIEStartDetectorImpl - {E7E6F031-17CE-4C07-BC86-EABFE594F69C} - C:\Program Files\Java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll
    O4 - HKLM\..\Run: [ATIPTA] C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe
    O4 - HKLM\..\Run: [mcagent_exe] "C:\Program Files\McAfee.com\Agent\mcagent.exe" /runkey
    O4 - HKLM\..\Run: [McENUI] C:\PROGRA~1\McAfee\MHN\McENUI.exe /hide
    O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre6\bin\jusched.exe"
    O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
    O4 - HKCU\..\RunOnce: [DelayShred] "c:\program files\mcafee\mshr\ShrCL.EXE" /P7 /q C:\DOCUME~1\Graham\LOCALS~1\Temp\ADOBEL~1.SH! C:\DOCUME~1\Graham\LOCALS~1\Temp\AD5E0D~1.SH! C:\DOCUME~1\Graham\LOCALS~1\TEMPOR~1\Content.IE5\HG01AMIE\CJ_2_~1.SH! C:\DOCUME~1\Graham\LOCALS~1\TEMPOR~1\Content.IE5\UUZYHNHL\ADS_1_~1.SH! C:\DOCUME~1\Graham\LOCALS~1\TEMPOR~1\Content.IE5\HG01AMIE\CJ_1_~1.SH! C:\DOCUME~1\Graham\LOCALS~1\TEMPOR~1\Content.IE5\UUZYHNHL\CJ_1_~1.SH! C:\DOCUME~1\Graham\LOCALS~1\TEMPOR~1\Content.IE5\TQ7QF1IJ\ADS_1_~1.SH!
    O4 - HKUS\S-1-5-18\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\ctfmon.exe (User 'SYSTEM')
    O4 - HKUS\.DEFAULT\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\ctfmon.exe (User 'Default user')
    O4 - Global Startup: No-IP DUC.lnk = C:\Program Files\No-IP\DUC20.exe
    O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
    O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
    O16 - DPF: {4ED9DDF0-7479-4BBE-9335-5A1EDB1D8A21} (McAfee.com Operating System Class) - http://download.mcafee.com/molbin/sh...4/mcinsctl.cab
    O16 - DPF: {AB86CE53-AC9F-449F-9399-D8ABCA09EC09} (Get_ActiveX Control) - https://h17000.www1.hp.com/ewfrf-JAV...oadManager.ocx
    O16 - DPF: {BCC0FF27-31D9-4614-A68E-C18E1ADA4389} (DwnldGroupMgr Class) - http://download.mcafee.com/molbin/sh...21/mcgdmgr.cab
    O16 - DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} (Shockwave Flash Object) - http://fpdownload2.macromedia.com/ge...sh/swflash.cab
    O23 - Service: Ati HotKey Poller - ATI Technologies Inc. - C:\WINDOWS\system32\Ati2evxx.exe
    O23 - Service: ATI Smart - Unknown owner - C:\WINDOWS\system32\ati2sgag.exe
    O23 - Service: Crypkey License - CrypKey (Canada) Ltd. - C:\WINDOWS\SYSTEM32\crypserv.exe
    O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
    O23 - Service: Java Quick Starter (JavaQuickStarterService) - Sun Microsystems, Inc. - C:\Program Files\Java\jre6\bin\jqs.exe
    O23 - Service: MBackMonitor - McAfee - C:\Program Files\McAfee\MBK\MBackMonitor.exe
    O23 - Service: McAfee Services (mcmscsvc) - McAfee, Inc. - C:\PROGRA~1\McAfee\MSC\mcmscsvc.exe
    O23 - Service: McAfee Network Agent (McNASvc) - McAfee, Inc. - c:\program files\common files\mcafee\mna\mcnasvc.exe
    O23 - Service: McAfee Scanner (McODS) - McAfee, Inc. - C:\PROGRA~1\McAfee\VIRUSS~1\mcods.exe
    O23 - Service: McAfee Proxy Service (McProxy) - McAfee, Inc. - c:\PROGRA~1\COMMON~1\mcafee\mcproxy\mcproxy.exe
    O23 - Service: Mcsh55imiw - ATI Technologies Inc. - C:\WINDOWS\system32\drivers\atinttxx.sys
    O23 - Service: McAfee Real-time Scanner (McShield) - McAfee, Inc. - C:\PROGRA~1\McAfee\VIRUSS~1\mcshield.exe
    O23 - Service: McAfee Personal Firewall Service (MpfService) - McAfee, Inc. - C:\Program Files\McAfee\MPF\MPFSrv.exe
    O23 - Service: stunnel - Unknown owner - C:\Program Files\Stunnel\stunnel-4.05.exe

    --
    End of file - 6231 bytes

  8. #8
    Emeritus Blade81's Avatar
    Join Date
    Oct 2006
    Location
    Finland
    Posts
    25,300

    Default

    Hi

    Open notepad and copy/paste the text in the quotebox below into it:

    Code:
    Driver::
    muavw
    
    File::
    c:\windows\system32\drivers\jzdmb.sys

    Save this as
    CFScript

    A word of warning: Neither I nor sUBs are responsible for any damage you may have caused your machine. This tool is not a toy and not for everyday use.



    Refering to the picture above, drag CFScript into ComboFix.exe
    Then post the resultant log & a fresh hjt log. How's the system running?


    Combofix should never take more that 20 minutes including the reboot if malware is detected.
    If it does, open Task Manager then Processes tab (press ctrl, alt and del at the same time) and end any processes of findstr, find, sed or swreg, then combofix should continue.
    If that happened we want to know, and also what process you had to end.
    Microsoft Windows Insider MVP 2016-2018
    Microsoft MVP Consumer Security 2008-2015
    UNITE member since 2006

    If you have problems create a thread in the forum, please.

    Malware removal instructions are for the correspondent user's case only.

  9. #9
    Junior Member
    Join Date
    Jan 2009
    Posts
    11

    Default Advice

    I am running Combofix on that PC now and will post logs when it is finished. Since I posted the initial log in this thread I have kept that PC switched off except when carryign out your advice. When I have run this set what should I set up to keep the PC clear?

    I have McAfee AV and Firewall, Win Defender, SpyBot S&D, Spyware Blaster (free version), Malwarebytes Anti-malware (free version), Ad-Aware (free version), Guidescope proxy server. Right now I am assuming that I need realtime protection with McAfee, Defender and SyBot with Guidescope too. Then use the other scanners weekly. But does that stop something similar getting back on to this PC?

    I am not so sure that I have the firewall set up properly. It gives me the facility to choose the access of all the programs and services, but in some case I have no idea what setting to use, e.g. run dll as an app?

    What do you recommend?

    I also have two other PC running on this home network. What is the best way to be absolutely sure that they are clear?

  10. #10
    Junior Member
    Join Date
    Jan 2009
    Posts
    11

    Default

    ComboFix 09-01-10.03 - Graham 2009-01-11 12:46:02.3 - NTFSx86
    Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.1279.843 [GMT 0:00]
    Running from: c:\documents and settings\Graham\Desktop\ComboFix.exe
    Command switches used :: c:\documents and settings\Graham\Desktop\CFScript
    AV: McAfee VirusScan *On-access scanning disabled* (Updated)
    FW: McAfee Personal Firewall *disabled*
    * Created a new restore point

    FILE ::
    c:\windows\system32\drivers\jzdmb.sys
    .

    ((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
    .

    c:\windows\system32\mspdox35.dll
    c:\windows\system32\msrdo20.dll
    c:\windows\system32\msxbse35.dll
    c:\windows\system32\rdocurs.dll

    .
    ((((((((((((((((((((((((((((((((((((((( Drivers/Services )))))))))))))))))))))))))))))))))))))))))))))))))
    .

    -------\Service_muavw


    ((((((((((((((((((((((((( Files Created from 2008-12-11 to 2009-01-11 )))))))))))))))))))))))))))))))
    .

    2009-01-03 11:42 . 2009-01-03 11:42 <DIR> d-------- c:\documents and settings\Graham\Application Data\URSoft
    2009-01-03 11:41 . 2009-01-03 11:58 <DIR> d-------- c:\program files\Your Uninstaller 2008
    2009-01-02 17:08 . 2009-01-02 17:08 <DIR> d-------- c:\program files\ATF-Cleaner
    2009-01-02 16:41 . 2009-01-02 16:39 410,984 --a------ c:\windows\system32\deploytk.dll
    2009-01-02 16:41 . 2009-01-02 16:39 73,728 --a------ c:\windows\system32\javacpl.cpl
    2009-01-02 13:34 . 2009-01-02 13:34 <DIR> d-------- c:\program files\Microsoft Silverlight
    2009-01-02 13:28 . 2009-01-02 13:28 <DIR> d-------- c:\windows\system32\GroupPolicy
    2009-01-02 13:25 . 2008-03-07 17:02 192,000 -----c--- c:\windows\system32\dllcache\offfilt.dll
    2009-01-02 13:25 . 2008-03-07 17:02 98,304 -----c--- c:\windows\system32\dllcache\nlhtml.dll
    2009-01-02 13:25 . 2008-03-07 17:02 29,696 -----c--- c:\windows\system32\dllcache\mimefilt.dll
    2009-01-02 12:15 . 2009-01-02 12:15 <DIR> d-------- c:\program files\Trend Micro
    2009-01-01 14:06 . 2009-01-01 14:06 <DIR> d-------- c:\documents and settings\Graham\Application Data\Malwarebytes
    2009-01-01 14:05 . 2009-01-03 13:44 <DIR> d-------- c:\program files\Malwarebytes' Anti-Malware
    2009-01-01 14:05 . 2009-01-01 14:05 <DIR> d-------- c:\documents and settings\All Users\Application Data\Malwarebytes
    2009-01-01 14:05 . 2008-12-03 19:52 38,496 --a------ c:\windows\system32\drivers\mbamswissarmy.sys
    2009-01-01 14:05 . 2008-12-03 19:52 15,504 --a------ c:\windows\system32\drivers\mbam.sys
    2008-12-31 14:01 . 2008-12-31 14:01 <DIR> d-------- c:\program files\TeaTimer (Spybot - Search & Destroy)
    2008-12-31 14:00 . 2008-12-31 14:00 <DIR> d-------- c:\program files\SDHelper (Spybot - Search & Destroy)
    2008-12-31 14:00 . 2008-12-31 14:00 <DIR> d-------- c:\program files\Misc. Support Library (Spybot - Search & Destroy)
    2008-12-31 14:00 . 2008-12-31 14:00 <DIR> d-------- c:\program files\File Scanner Library (Spybot - Search & Destroy)

    .
    (((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
    .
    2009-01-03 14:26 --------- d-----w c:\documents and settings\All Users\Application Data\Spybot - Search & Destroy
    2009-01-03 14:17 --------- d-----w c:\program files\Spybot - Search & Destroy
    2009-01-03 11:43 --------- d---a-w c:\documents and settings\All Users\Application Data\TEMP
    2009-01-03 11:21 --------- d-----w c:\documents and settings\Graham\Application Data\Spybot - Search & Destroy
    2009-01-03 11:20 --------- d--h--w c:\program files\InstallShield Installation Information
    2009-01-03 11:20 --------- d-----w c:\program files\2BrightSparks
    2009-01-03 11:18 --------- d-----w c:\program files\Common Files\Adobe
    2009-01-02 16:39 --------- d-----w c:\program files\Java
    2008-12-31 11:25 --------- d-----w c:\program files\McAfee
    2008-12-21 18:18 --------- d-----w c:\program files\mIRC
    2008-10-23 12:36 286,720 ----a-w c:\windows\system32\gdi32.dll
    2008-10-16 20:38 826,368 ----a-w c:\windows\system32\wininet.dll
    2008-10-16 14:13 202,776 ----a-w c:\windows\system32\wuweb.dll
    2008-10-16 14:13 1,809,944 ----a-w c:\windows\system32\wuaueng.dll
    2008-10-16 14:12 561,688 ----a-w c:\windows\system32\wuapi.dll
    2008-10-16 14:12 323,608 ----a-w c:\windows\system32\wucltui.dll
    2008-10-16 14:09 92,696 ----a-w c:\windows\system32\cdm.dll
    2008-10-16 14:09 51,224 ----a-w c:\windows\system32\wuauclt.exe
    2008-10-16 14:09 43,544 ----a-w c:\windows\system32\wups2.dll
    2008-10-16 14:08 34,328 ----a-w c:\windows\system32\wups.dll
    2008-10-16 14:06 268,648 ----a-w c:\windows\system32\mucltui.dll
    2008-10-16 14:06 208,744 ----a-w c:\windows\system32\muweb.dll
    2006-07-07 14:19 0 ---h--w c:\documents and settings\All Users\Application Data\PKP_DLea.DAT
    2006-05-08 14:20 20 ---h--w c:\documents and settings\All Users\Application Data\PKP_DLec.DAT
    2008-09-27 13:30 32,768 --sha-w c:\windows\system32\config\systemprofile\Local Settings\History\History.IE5\MSHist012008092720080928\index.dat
    .

    ((((((((((((((((((((((((((((( snapshot@2009-01-09_19.48.29.57 )))))))))))))))))))))))))))))))))))))))))
    .
    - 2009-01-09 17:52:40 32,768 ----a-w c:\windows\system32\config\systemprofile\Cookies\index.dat
    + 2009-01-11 11:12:41 32,768 ----a-w c:\windows\system32\config\systemprofile\Cookies\index.dat
    - 2009-01-09 17:52:40 32,768 ----a-w c:\windows\system32\config\systemprofile\Local Settings\History\History.IE5\index.dat
    + 2009-01-11 11:12:41 32,768 ----a-w c:\windows\system32\config\systemprofile\Local Settings\History\History.IE5\index.dat
    + 2009-01-11 12:51:56 16,384 ----atw c:\windows\Temp\Perflib_Perfdata_620.dat
    .
    ((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
    .
    .
    *Note* empty entries & legit default entries are not shown
    REGEDIT4

    [HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
    "ctfmon.exe"="c:\windows\system32\ctfmon.exe" [2008-04-14 15360]

    [HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce]
    "DelayShred"="c:\program files\mcafee\mshr\ShrCL.EXE" [2008-07-09 111904]

    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
    "ATIPTA"="c:\program files\ATI Technologies\ATI Control Panel\atiptaxx.exe" [2004-08-25 339968]
    "mcagent_exe"="c:\program files\McAfee.com\Agent\mcagent.exe" [2008-07-11 641208]
    "McENUI"="c:\progra~1\McAfee\MHN\McENUI.exe" [2008-06-13 1176808]
    "SunJavaUpdateSched"="c:\program files\Java\jre6\bin\jusched.exe" [2009-01-02 136600]

    [HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run]
    "CTFMON.EXE"="c:\windows\system32\ctfmon.exe" [2008-04-14 15360]

    c:\documents and settings\All Users\Start Menu\Programs\Startup\
    No-IP DUC.lnk - c:\program files\No-IP\DUC20.exe [2005-01-24 1079296]

    [HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\drivers32]
    "vidc.ffds"= ffdshow.ax

    [HKEY_LOCAL_MACHINE\system\currentcontrolset\control\session manager]
    BootExecute REG_MULTI_SZ autocheck autochk /r \??\E:\0autocheck autochk *

    [HKEY_LOCAL_MACHINE\software\microsoft\security center]
    "AntiVirusDisableNotify"=dword:00000001
    "UpdatesDisableNotify"=dword:00000001

    [HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\McAfeeAntiVirus]
    "DisableMonitoring"=dword:00000001

    [HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\McAfeeFirewall]
    "DisableMonitoring"=dword:00000001

    [HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]
    "EnableFirewall"= 0 (0x0)

    [HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
    "c:\\WINDOWS\\system32\\sessmgr.exe"=
    "c:\\Program Files\\mIRC\\mirc.exe"=
    "c:\\Program Files\\Messenger\\msmsgs.exe"=
    "%windir%\\Network Diagnostic\\xpnetdiag.exe"=
    "c:\\WINDOWS\\system32\\svchost.exe"=
    "c:\\Program Files\\Common Files\\McAfee\\MNA\\McNASvc.exe"=
    "%windir%\\system32\\sessmgr.exe"=

    [HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\GloballyOpenPorts\List]
    "1111:TCP"= 1111:TCP:System
    "1111:UDP"= 1111:UDP:System
    "1523:TCP"= 1523:TCP:System
    "1523:UDP"= 1523:UDP:System

    R4 WinDefend;Windows Defender;c:\program files\Windows Defender\MsMpEng.exe [2006-11-03 13592]
    S4 hpdj00;hpdj00;c:\docume~1\Graham\LOCALS~1\Temp\hpdj00.exe -servicerunning=true -uninstall=HP Photosmart 8400 Series -product=8400 --> c:\docume~1\Graham\LOCALS~1\Temp\hpdj00.exe -servicerunning=true -uninstall=HP Photosmart 8400 Series -product=8400 [?]
    .
    Contents of the 'Scheduled Tasks' folder

    2009-01-11 c:\windows\Tasks\McAfee.com Scan for Viruses - My Computer (PC1-Administrator).job
    - c:\program files\mcafee.com\vso\mcmnhdlr.exe []

    2009-01-02 c:\windows\Tasks\McAfee.com Scan for Viruses - My Computer (PC1-Graham).job
    - c:\program files\mcafee.com\vso\mcmnhdlr.exe []

    2008-12-25 c:\windows\Tasks\McDefragTask.job
    - c:\progra~1\mcafee\mqc\QcConsol.exe [2008-07-09 17:10]

    2009-01-11 c:\windows\Tasks\MP Scheduled Scan.job
    - c:\program files\Windows Defender\MpCmdRun.exe [2006-11-03 18:20]

    2009-01-11 c:\windows\Tasks\User_Feed_Synchronization-{71F1E3E0-1D75-4DF2-943E-A76B05831D45}.job
    - c:\windows\system32\msfeedssync.exe [2006-10-17 12:58]
    .
    .
    ------- Supplementary Scan -------
    .
    uStart Page = hxxp://www.google.co.uk/intl/en/options/
    uSearchMigratedDefaultURL = hxxp://www.google.com/search?q={searchTerms}&sourceid=ie7&rls=com.microsoft:en-US&ie=utf8&oe=utf8
    uInternet Settings,ProxyOverride = *.local
    uSearchURL,(Default) = hxxp://www.google.com/keyword/%s
    .

    **************************************************************************

    catchme 0.3.1367 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
    Rootkit scan 2009-01-11 13:21:53
    Windows 5.1.2600 Service Pack 3 NTFS

    scanning hidden processes ...

    scanning hidden autostart entries ...

    scanning hidden files ...

    scan completed successfully
    hidden files: 0

    **************************************************************************
    .
    --------------------- DLLs Loaded Under Running Processes ---------------------

    - - - - - - - > 'winlogon.exe'(616)
    c:\windows\system32\Ati2evxx.dll
    .
    ------------------------ Other Running Processes ------------------------
    .
    c:\windows\system32\ati2evxx.exe
    c:\windows\system32\Crypserv.exe
    c:\program files\Java\jre6\bin\jqs.exe
    c:\progra~1\McAfee\MSC\mcmscsvc.exe
    c:\program files\Common Files\McAfee\MNA\McNASvc.exe
    c:\progra~1\COMMON~1\McAfee\McProxy\McProxy.exe
    c:\progra~1\McAfee\VIRUSS~1\Mcshield.exe
    c:\program files\Common Files\Microsoft Shared\VS7Debug\mdm.exe
    c:\program files\Stunnel\stunnel-4.05.exe
    c:\windows\system32\wdfmgr.exe
    c:\program files\McAfee\MPF\MpfSrv.exe
    c:\progra~1\McAfee.com\Agent\mcagent.exe
    c:\windows\system32\ati2evxx.exe
    c:\windows\system32\wscntfy.exe
    c:\windows\system32\verclsid.exe
    .
    **************************************************************************
    .
    Completion time: 2009-01-11 13:26:01 - machine was rebooted
    ComboFix-quarantined-files.txt 2009-01-11 13:25:54
    ComboFix2.txt 2009-01-10 17:26:12
    ComboFix3.txt 2009-01-09 19:51:53

    Pre-Run: 68,483,543,040 bytes free
    Post-Run: 68,537,856,000 bytes free

    187 --- E O F --- 2009-01-09 17:50:55


    **********************************************************

    Logfile of Trend Micro HijackThis v2.0.2
    Scan saved at 13:51:56, on 11/01/2009
    Platform: Windows XP SP3 (WinNT 5.01.2600)
    MSIE: Internet Explorer v7.00 (7.00.6000.16762)
    Boot mode: Normal

    Running processes:
    C:\WINDOWS\System32\smss.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\services.exe
    C:\WINDOWS\system32\lsass.exe
    C:\WINDOWS\system32\Ati2evxx.exe
    C:\WINDOWS\system32\svchost.exe
    C:\Program Files\Windows Defender\MsMpEng.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\system32\spoolsv.exe
    C:\WINDOWS\system32\crypserv.exe
    C:\Program Files\Java\jre6\bin\jqs.exe
    C:\PROGRA~1\McAfee\MSC\mcmscsvc.exe
    c:\program files\common files\mcafee\mna\mcnasvc.exe
    c:\PROGRA~1\COMMON~1\mcafee\mcproxy\mcproxy.exe
    C:\PROGRA~1\McAfee\VIRUSS~1\mcshield.exe
    C:\Program Files\Common Files\Microsoft Shared\VS7Debug\mdm.exe
    C:\WINDOWS\System32\svchost.exe
    C:\Program Files\Stunnel\stunnel-4.05.exe
    C:\Program Files\McAfee\MPF\MPFSrv.exe
    c:\PROGRA~1\mcafee.com\agent\mcagent.exe
    C:\WINDOWS\system32\Ati2evxx.exe
    C:\WINDOWS\system32\wscntfy.exe
    C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe
    C:\Program Files\Java\jre6\bin\jusched.exe
    C:\WINDOWS\system32\ctfmon.exe
    C:\Program Files\No-IP\DUC20.exe
    C:\WINDOWS\explorer.exe
    C:\Program Files\Trend Micro\HijackThis\greeneyedman000.exe

    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.google.co.uk/intl/en/options/
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
    R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
    R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = *.local
    O2 - BHO: Java(tm) Plug-In SSV Helper - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre6\bin\ssv.dll
    O2 - BHO: scriptproxy - {7DB2D5A0-7241-4E79-B68D-6309F01C5231} - C:\Program Files\McAfee\VirusScan\scriptsn.dll
    O2 - BHO: Java(tm) Plug-In 2 SSV Helper - {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Program Files\Java\jre6\bin\jp2ssv.dll
    O2 - BHO: JQSIEStartDetectorImpl - {E7E6F031-17CE-4C07-BC86-EABFE594F69C} - C:\Program Files\Java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll
    O4 - HKLM\..\Run: [ATIPTA] C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe
    O4 - HKLM\..\Run: [mcagent_exe] "C:\Program Files\McAfee.com\Agent\mcagent.exe" /runkey
    O4 - HKLM\..\Run: [McENUI] C:\PROGRA~1\McAfee\MHN\McENUI.exe /hide
    O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre6\bin\jusched.exe"
    O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
    O4 - HKCU\..\RunOnce: [DelayShred] "c:\program files\mcafee\mshr\ShrCL.EXE" /P7 /q C:\DOCUME~1\Graham\LOCALS~1\Temp\ADOBEL~1.SH! C:\DOCUME~1\Graham\LOCALS~1\Temp\AD5E0D~1.SH! C:\DOCUME~1\Graham\LOCALS~1\TEMPOR~1\Content.IE5\HG01AMIE\CJ_2_~1.SH! C:\DOCUME~1\Graham\LOCALS~1\TEMPOR~1\Content.IE5\UUZYHNHL\ADS_1_~1.SH! C:\DOCUME~1\Graham\LOCALS~1\TEMPOR~1\Content.IE5\HG01AMIE\CJ_1_~1.SH! C:\DOCUME~1\Graham\LOCALS~1\TEMPOR~1\Content.IE5\UUZYHNHL\CJ_1_~1.SH! C:\DOCUME~1\Graham\LOCALS~1\TEMPOR~1\Content.IE5\TQ7QF1IJ\ADS_1_~1.SH!
    O4 - HKUS\S-1-5-18\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\ctfmon.exe (User 'SYSTEM')
    O4 - HKUS\.DEFAULT\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\ctfmon.exe (User 'Default user')
    O4 - Global Startup: No-IP DUC.lnk = C:\Program Files\No-IP\DUC20.exe
    O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
    O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
    O16 - DPF: {4ED9DDF0-7479-4BBE-9335-5A1EDB1D8A21} (McAfee.com Operating System Class) - http://download.mcafee.com/molbin/sh...4/mcinsctl.cab
    O16 - DPF: {AB86CE53-AC9F-449F-9399-D8ABCA09EC09} (Get_ActiveX Control) - https://h17000.www1.hp.com/ewfrf-JAV...oadManager.ocx
    O16 - DPF: {BCC0FF27-31D9-4614-A68E-C18E1ADA4389} (DwnldGroupMgr Class) - http://download.mcafee.com/molbin/sh...21/mcgdmgr.cab
    O16 - DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} (Shockwave Flash Object) - http://fpdownload2.macromedia.com/ge...sh/swflash.cab
    O23 - Service: Ati HotKey Poller - ATI Technologies Inc. - C:\WINDOWS\system32\Ati2evxx.exe
    O23 - Service: ATI Smart - Unknown owner - C:\WINDOWS\system32\ati2sgag.exe
    O23 - Service: Crypkey License - CrypKey (Canada) Ltd. - C:\WINDOWS\SYSTEM32\crypserv.exe
    O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
    O23 - Service: Java Quick Starter (JavaQuickStarterService) - Sun Microsystems, Inc. - C:\Program Files\Java\jre6\bin\jqs.exe
    O23 - Service: MBackMonitor - McAfee - C:\Program Files\McAfee\MBK\MBackMonitor.exe
    O23 - Service: McAfee Services (mcmscsvc) - McAfee, Inc. - C:\PROGRA~1\McAfee\MSC\mcmscsvc.exe
    O23 - Service: McAfee Network Agent (McNASvc) - McAfee, Inc. - c:\program files\common files\mcafee\mna\mcnasvc.exe
    O23 - Service: McAfee Scanner (McODS) - McAfee, Inc. - C:\PROGRA~1\McAfee\VIRUSS~1\mcods.exe
    O23 - Service: McAfee Proxy Service (McProxy) - McAfee, Inc. - c:\PROGRA~1\COMMON~1\mcafee\mcproxy\mcproxy.exe
    O23 - Service: Mcsh55imiw - ATI Technologies Inc. - C:\WINDOWS\system32\drivers\atinttxx.sys
    O23 - Service: McAfee Real-time Scanner (McShield) - McAfee, Inc. - C:\PROGRA~1\McAfee\VIRUSS~1\mcshield.exe
    O23 - Service: McAfee Personal Firewall Service (MpfService) - McAfee, Inc. - C:\Program Files\McAfee\MPF\MPFSrv.exe
    O23 - Service: stunnel - Unknown owner - C:\Program Files\Stunnel\stunnel-4.05.exe

    --
    End of file - 6026 bytes

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •