Page 2 of 4 FirstFirst 1234 LastLast
Results 11 to 20 of 36

Thread: Need help with malware removal

  1. #11
    Junior Member
    Join Date
    Jan 2011
    Posts
    27

    Default

    I followed your suggestions, and chose to install avira.

    After installing Avira I ran the suggested First Scan. Nothing was detected, as there were no updates.

    I rebooted with wireless connection inserted, and updated virus database and ran a full scan.

    :veryredfacedsmiley: The scan detected quite a few infections.

    I have run DDS and GMER again, and together with the AV log, will post these in the following posts. Later this evening (here) I will run some more tests and see if I have any further issues.

  2. #12
    Junior Member
    Join Date
    Jan 2011
    Posts
    27

    Default

    I followed your suggestions, and chose to install avira.

    After installing Avira I ran the suggested First Scan. Nothing was detected, as there were no updates.

    I rebooted with wireless connection inserted, and updated virus database and ran a full scan.

    :veryredfacedsmiley: The scan detected quite a few infections.

    I have run DDS and GMER again, and together with the AV log, will post these in the following posts.

    The svchost issue, grabbing 98% of cpu, still exists. Later this evening (here) I will run some more tests and see if I have any further issues.

  3. #13
    Junior Member
    Join Date
    Jan 2011
    Posts
    27

    Default

    DDS


    DDS (Ver_10-12-12.02) - NTFSx86
    Run by Robert Prinsen at 18:01:34.00 on 20/01/2011
    Internet Explorer: 7.0.5730.13
    Microsoft Windows XP Professional 5.1.2600.3.1252.44.1033.18.447.138 [GMT 0:00]

    AV: AntiVir Desktop *Enabled/Updated* {AD166499-45F9-482A-A743-FDD3350758C7}

    ============== Running Processes ===============

    C:\WINDOWS\system32\svchost -k DcomLaunch
    svchost.exe
    C:\WINDOWS\System32\svchost.exe -k netsvcs
    C:\WINDOWS\system32\ACS.exe
    svchost.exe
    svchost.exe
    C:\WINDOWS\system32\spoolsv.exe
    C:\Program Files\Avira\AntiVir Desktop\sched.exe
    svchost.exe
    C:\Program Files\Avira\AntiVir Desktop\avguard.exe
    C:\Program Files\Bonjour\mDNSResponder.exe
    C:\Program Files\TOSHIBA\ConfigFree\CFSvcs.exe
    C:\WINDOWS\System32\svchost.exe -k eapsvcs
    C:\Program Files\Avira\AntiVir Desktop\avshadow.exe
    C:\WINDOWS\System32\svchost.exe -k HTTPFilter
    C:\Program Files\iPod\bin\iPodService.exe
    C:\Program Files\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE
    C:\Program Files\Linksys\Wireless-G Notebook Adapter\NICServ.exe
    C:\Program Files\NetScaler\NetScaler Secure Remote Access\nsverctl.exe
    C:\WINDOWS\System32\dmadmin.exe
    C:\WINDOWS\Explorer.EXE
    C:\Program Files\Synaptics\SynTP\SynTPLpr.exe
    C:\Program Files\Synaptics\SynTP\SynTPEnh.exe
    C:\WINDOWS\AGRSMMSG.exe
    C:\Program Files\Toshiba\Toshiba Applet\thotkey.exe
    C:\WINDOWS\system32\TPSMain.exe
    C:\Program Files\TOSHIBA\ConfigFree\NDSTray.exe
    C:\Program Files\TOSHIBA\TOSHIBA Zooming Utility\SmoothView.exe
    C:\WINDOWS\system32\TPSBattM.exe
    C:\Program Files\TOSHIBA\PadTouch\PadExe.exe
    C:\Program Files\iTunes\iTunesHelper.exe
    C:\Program Files\Avira\AntiVir Desktop\avgnt.exe
    C:\WINDOWS\system32\ctfmon.exe
    C:\Documents and Settings\Robert Prinsen.TOSHA60RPP\Desktop\dds.scr

    ============== Pseudo HJT Report ===============

    uInternet Settings,ProxyOverride = 127.0.0.1;*.local
    BHO: Adobe PDF Link Helper: {18df081c-e8ad-4283-a596-fa578c2ebdc3} - c:\program files\common files\adobe\acrobat\activex\AcroIEHelperShim.dll
    TB: {0B53EAC3-8D69-4B9E-9B19-A37C9A5676A7} - No File
    TB: RadioBar Toolbar: {5b291e6c-9a74-4034-971b-a4b007a0b315} -
    uRun: [ctfmon.exe] c:\windows\system32\ctfmon.exe
    uRun: [DriverUpdaterPro] c:\program files\ixi tools\driver updater pro\DriverUpdaterPro.exe -t
    mRun: [SynTPLpr] c:\program files\synaptics\syntp\SynTPLpr.exe
    mRun: [SynTPEnh] c:\program files\synaptics\syntp\SynTPEnh.exe
    mRun: [AGRSMMSG] AGRSMMSG.exe
    mRun: [THotkey] c:\program files\toshiba\toshiba applet\thotkey.exe
    mRun: [TPSMain] TPSMain.exe
    mRun: [NDSTray.exe] NDSTray.exe
    mRun: [SmoothView] c:\program files\toshiba\toshiba zooming utility\SmoothView.exe
    mRun: [PadTouch] "c:\program files\toshiba\padtouch\PadExe.exe
    mRun: [Adobe Reader Speed Launcher] "c:\program files\adobe\reader 9.0\reader\Reader_sl.exe"
    mRun: [Adobe ARM] "c:\program files\common files\adobe\arm\1.0\AdobeARM.exe"
    mRun: [QuickTime Task] "c:\program files\quicktime\QTTask.exe" -atboottime
    mRun: [iTunesHelper] "c:\program files\itunes\iTunesHelper.exe"
    mRun: [avgnt] "c:\program files\avira\antivir desktop\avgnt.exe" /min
    IE: E&xport to Microsoft Excel - c:\progra~1\micros~2\office11\EXCEL.EXE/3000
    IE: {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe
    IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe
    IE: {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - c:\windows\system32\msjava.dll
    IE: {92780B25-18CC-41C8-B9BE-3C9C571A8263} - {FF059E31-CC5A-4E2E-BF3B-96E929D65503} - c:\progra~1\micros~2\office11\REFIEBAR.DLL
    DPF: Microsoft XML Parser for Java - file:///C:/WINDOWS/Java/classes/xmldso.cab
    DPF: {04897B74-BBBE-46E5-9550-5C487F39C2E4} - hxxp://support.informatica.com/atlas/19227/applets/SiebelAx_OutBound_mail.cab
    DPF: {7530BFB8-7293-4D34-9923-61A11451AFC5} - hxxp://download.eset.com/special/eos/OnlineScanner.cab
    DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://java.sun.com/products/plugin/autodl/jinstall-142-windows-i586.cab
    DPF: {8C244272-1DC1-4CE7-9C6C-FABCA09EB543} - hxxp://support.informatica.com/atlas/19227/applets/SiebelAx_Desktop_Integration.cab
    DPF: {93A85BE8-6137-4E48-BBC8-E78E27035DB0} - hxxp://support.informatica.com/atlas/19227/applets/SiebelAx_HI_Client.cab
    DPF: {CAFEEFAC-0014-0002-0005-ABCDEFFEDCBA} - hxxp://java.sun.com/products/plugin/autodl/jinstall-142-windows-i586.cab
    DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} - hxxp://fpdownload2.macromedia.com/get/shockwave/cabs/flash/swflash.cab
    DPF: {E2883E8F-472F-4FB0-9522-AC9BF37916A7} - hxxp://platformdl.adobe.com/NOS/getPlusPlus/1.6/gp.cab
    Notify: AtiExtEvent - Ati2evxx.dll
    SSODL: WPDShServiceObj - {AAA288BA-9A4C-45B0-95D7-94D524869DB5} - c:\windows\system32\WPDShServiceObj.dll
    Hosts: 192.168.1.65 POETJE

    ============= SERVICES / DRIVERS ===============

    R0 atiide;atiide;c:\windows\system32\drivers\atiide.sys [2004-8-24 5632]
    R1 avgio;avgio;c:\program files\avira\antivir desktop\avgio.sys [2011-1-19 11608]
    R2 AntiVirSchedulerService;Avira AntiVir Scheduler;c:\program files\avira\antivir desktop\sched.exe [2011-1-19 135336]
    R2 AntiVirService;Avira AntiVir Guard;c:\program files\avira\antivir desktop\avguard.exe [2011-1-19 267944]
    R2 avgntflt;avgntflt;c:\windows\system32\drivers\avgntflt.sys [2011-1-19 61960]
    R2 ns80503;ns80503;c:\windows\system32\ns80503.sys [2009-2-18 42296]
    R2 nsverctl;NetScaler SSL VPN Version Control;c:\program files\netscaler\netscaler secure remote access\nsverctl.exe [2009-2-18 53248]
    R3 Net6IM;Net6;c:\windows\system32\drivers\net6im51.sys [2009-2-18 43640]
    R3 WPC54GSv1;Linksys Wireless Notebook Adapter WPC54GSv1 Driver;c:\windows\system32\drivers\WPC54GSv1.SYS [2006-11-30 610816]
    S3 cpuz132;cpuz132;\??\c:\docume~1\robert~1.tos\locals~1\temp\cpuz132\cpuz132_x32.sys --> c:\docume~1\robert~1.tos\locals~1\temp\cpuz132\cpuz132_x32.sys [?]
    S3 EraserUtilRebootDrv;EraserUtilRebootDrv;\??\c:\program files\common files\symantec shared\eengine\eraserutilrebootdrv.sys --> c:\program files\common files\symantec shared\eengine\EraserUtilRebootDrv.sys [?]

    =============== Created Last 30 ================

    2011-01-19 21:18:11 -------- d-----w- c:\docume~1\robert~1.tos\applic~1\Avira
    2011-01-19 21:06:50 61960 ----a-w- c:\windows\system32\drivers\avgntflt.sys
    2011-01-19 21:06:45 -------- d-----w- c:\program files\Avira
    2011-01-19 21:06:45 -------- d-----w- c:\docume~1\alluse~1\applic~1\Avira
    2011-01-16 21:30:00 -------- d-----w- c:\program files\ESET
    2011-01-16 19:48:23 -------- d-----w- C:\KeepDeletedItems
    2011-01-16 16:11:24 -------- d-----w- c:\docume~1\robert~1.tos\applic~1\Malwarebytes
    2011-01-16 16:11:14 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
    2011-01-16 16:11:13 -------- d-----w- c:\docume~1\alluse~1\applic~1\Malwarebytes
    2011-01-16 16:11:10 20952 ----a-w- c:\windows\system32\drivers\mbam.sys
    2011-01-16 16:11:10 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
    2011-01-09 04:16:30 -------- d-----w- c:\windows\system32\wbem\repository\FS
    2011-01-09 04:16:30 -------- d-----w- c:\windows\system32\wbem\Repository
    2011-01-09 03:38:07 -------- d-----w- c:\docume~1\alluse~1\applic~1\gCkNc07000

    ==================== Find3M ====================

    2010-11-29 17:38:30 94208 ----a-w- c:\windows\system32\QuickTimeVR.qtx
    2010-11-29 17:38:30 69632 ----a-w- c:\windows\system32\QuickTime.qts

    =================== ROOTKIT ====================

    Stealth MBR rootkit/Mebroot/Sinowal/TDL4 detector 0.4.2 by Gmer, http://www.gmer.net
    Windows 5.1.2600 Disk: TOSHIBA_MK8032GAX rev.AD002D -> Harddisk0\DR0 -> \Device\Ide\IdePort0 P0T0L0-3

    device: opened successfully
    user: MBR read successfully

    Disk trace:
    called modules: ntoskrnl.exe CLASSPNP.SYS disk.sys ACPI.sys hal.dll >>UNKNOWN [0x8532B555]<<
    _asm { PUSH EBP; MOV EBP, ESP; PUSH ECX; MOV EAX, [EBP+0x8]; CMP EAX, [0x853317b0]; MOV EAX, [0x8533182c]; PUSH EBX; PUSH ESI; MOV ESI, [EBP+0xc]; MOV EBX, [ESI+0x60]; PUSH EDI; JNZ 0x20; MOV [EBP+0x8], EAX; }
    1 nt!IofCallDriver[0x804E37C5] -> \Device\Harddisk0\DR0[0x85341030]
    3 CLASSPNP[0xF7808FD7] -> nt!IofCallDriver[0x804E37C5] -> \Device\00000085[0x85375F18]
    5 ACPI[0xF775F620] -> nt!IofCallDriver[0x804E37C5] -> [0x85376B58]
    \Driver\atapi[0x8537FAA8] -> IRP_MJ_CREATE -> 0x8532B555
    kernel: MBR read successfully
    _asm { XOR AX, AX; MOV SS, AX; MOV SP, 0x7c00; STI ; PUSH AX; POP ES; PUSH AX; POP DS; CLD ; MOV SI, 0x7c1b; MOV DI, 0x61b; PUSH AX; PUSH DI; MOV CX, 0x1e5; REP MOVSB ; RETF ; MOV SI, 0x7be; MOV CL, 0x4; CMP [SI], CH; JL 0x2d; JNZ 0x3b; }
    detected disk devices:
    \Device\Ide\IdeDeviceP0T0L0-3 -> \??\IDE#DiskTOSHIBA_MK8032GAX_______________________AD002D__#5&1c50b25f&0&0.0.0#{53f56307-b6bf-11d0-94f2-00a0c91efb8b} device not found
    detected hooks:
    \Driver\atapi DriverStartIo -> 0x8532B39B
    user & kernel MBR OK
    Warning: possible TDL3 rootkit infection !

    ============= FINISH: 18:03:43.35 ===============

  4. #14
    Junior Member
    Join Date
    Jan 2011
    Posts
    27

    Default

    Attach.txt


    UNLESS SPECIFICALLY INSTRUCTED, DO NOT POST THIS LOG.
    IF REQUESTED, ZIP IT UP & ATTACH IT

    DDS (Ver_10-12-12.02)

    Microsoft Windows XP Professional
    Boot Device: \Device\HarddiskVolume1
    Install Date: 30/12/2008 13:45:01
    System Uptime: 20/01/2011 17:54:08 (1 hours ago)

    Motherboard: TOSHIBA | | Portable PC
    Processor: Intel(R) Celeron(R) CPU 2.80GHz | mFCPGA | 2800/133mhz

    ==== Disk Partitions =========================

    C: is FIXED (NTFS) - 75 GiB total, 37.252 GiB free.
    D: is CDROM ()

    ==== Disabled Device Manager Items =============

    ==== System Restore Points ===================

    No restore point in system.

    ==== Installed Programs ======================

    Adobe Flash Player 10 ActiveX
    Adobe Reader 9.3
    Apple Application Support
    Apple Mobile Device Support
    Apple Software Update
    Atheros Client Utility
    Atheros Wireless LAN MiniPCI card Driver
    ATI - Software Uninstall Utility
    ATI Control Panel
    ATI Display Driver
    Avira AntiVir Personal - Free Antivirus
    BitTorrent
    Bonjour
    BT Broadband Help
    CD/DVD Drive Acoustic Silencer
    Citrix Access Gateway Enterprise Edition
    EPSON PhotoQuicker3.5
    EPSON Print CD
    EPSON PRINT Image Framer Tool2.1
    EPSON Printer Software
    ERUNT 1.1j
    ESET Online Scanner v3
    ESPR800 Referene Guide
    ESPR800 Software Guide
    FastStone Image Viewer 3.6
    GearDrvs
    Hotfix for Microsoft .NET Framework 3.5 SP1 (KB953595)
    Hotfix for Microsoft .NET Framework 3.5 SP1 (KB958484)
    Hotfix for Windows Media Format 11 SDK (KB929399)
    Hotfix for Windows Media Player 11 (KB939683)
    Hotfix for Windows XP (KB915800-v4)
    Hotfix for Windows XP (KB952287)
    Hotfix for Windows XP (KB954550-v5)
    Hotfix for Windows XP (KB961118)
    Hotfix for Windows XP (KB970653-v3)
    Hotfix for Windows XP (KB976098-v2)
    InterVideo WinDVD for Toshiba
    iTunes
    Java 2 Runtime Environment, SE v1.4.2_05
    Macromedia Flash Player
    Malwarebytes' Anti-Malware
    Microsoft .NET Framework 1.1
    Microsoft .NET Framework 1.1 Security Update (KB953297)
    Microsoft .NET Framework 2.0 Service Pack 2
    Microsoft .NET Framework 3.0 Service Pack 2
    Microsoft .NET Framework 3.5 SP1
    Microsoft Base Smart Card Cryptographic Service Provider Package
    Microsoft Compression Client Pack 1.0 for Windows XP
    Microsoft Internationalized Domain Names Mitigation APIs
    Microsoft Kernel-Mode Driver Framework Feature Pack 1.5
    Microsoft National Language Support Downlevel APIs
    Microsoft Office Professional Edition 2003
    Microsoft Silverlight
    Microsoft User-Mode Driver Framework Feature Pack 1.0
    Microsoft Visual C++ 2005 Redistributable
    Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729.4148
    MobTime Cell Phone Manager V6.6.5
    Motorola Driver Installation 3.2.0
    Odyssey SDK
    PCI 1620 Cardbus Controller and Software
    PCI1620 Ultramedia Controller
    PIF DESIGNER2.1
    QuickTime
    Realtek AC'97 Audio
    REALTEK Gigabit and Fast Ethernet NIC Driver
    ScanToWeb
    Security Update for Step By Step Interactive Training (KB923723)
    Security Update for Windows Internet Explorer 7 (KB938127-v2)
    Security Update for Windows Internet Explorer 7 (KB938127)
    Security Update for Windows Internet Explorer 7 (KB956390)
    Security Update for Windows Internet Explorer 7 (KB958215)
    Security Update for Windows Internet Explorer 7 (KB960714)
    Security Update for Windows Internet Explorer 7 (KB961260)
    Security Update for Windows Internet Explorer 7 (KB963027)
    Security Update for Windows Internet Explorer 7 (KB969897)
    Security Update for Windows Internet Explorer 7 (KB972260)
    Security Update for Windows Internet Explorer 7 (KB974455)
    Security Update for Windows Media Player (KB911564)
    Security Update for Windows Media Player (KB952069)
    Security Update for Windows Media Player (KB954155)
    Security Update for Windows Media Player (KB968816)
    Security Update for Windows Media Player (KB973540)
    Security Update for Windows Media Player 11 (KB954154)
    Security Update for Windows Media Player 6.4 (KB925398)
    Security Update for Windows Media Player 9 (KB936782)
    Security Update for Windows XP (KB923561)
    Security Update for Windows XP (KB938464-v2)
    Security Update for Windows XP (KB938464)
    Security Update for Windows XP (KB941569)
    Security Update for Windows XP (KB946648)
    Security Update for Windows XP (KB950762)
    Security Update for Windows XP (KB950974)
    Security Update for Windows XP (KB951066)
    Security Update for Windows XP (KB951376-v2)
    Security Update for Windows XP (KB951698)
    Security Update for Windows XP (KB951748)
    Security Update for Windows XP (KB952004)
    Security Update for Windows XP (KB952954)
    Security Update for Windows XP (KB954211)
    Security Update for Windows XP (KB954459)
    Security Update for Windows XP (KB954600)
    Security Update for Windows XP (KB955069)
    Security Update for Windows XP (KB956391)
    Security Update for Windows XP (KB956572)
    Security Update for Windows XP (KB956744)
    Security Update for Windows XP (KB956802)
    Security Update for Windows XP (KB956803)
    Security Update for Windows XP (KB956841)
    Security Update for Windows XP (KB956844)
    Security Update for Windows XP (KB957095)
    Security Update for Windows XP (KB957097)
    Security Update for Windows XP (KB958215)
    Security Update for Windows XP (KB958644)
    Security Update for Windows XP (KB958687)
    Security Update for Windows XP (KB958690)
    Security Update for Windows XP (KB958869)
    Security Update for Windows XP (KB959426)
    Security Update for Windows XP (KB960225)
    Security Update for Windows XP (KB960714)
    Security Update for Windows XP (KB960715)
    Security Update for Windows XP (KB960803)
    Security Update for Windows XP (KB960859)
    Security Update for Windows XP (KB961371)
    Security Update for Windows XP (KB961373)
    Security Update for Windows XP (KB961501)
    Security Update for Windows XP (KB968537)
    Security Update for Windows XP (KB969059)
    Security Update for Windows XP (KB969898)
    Security Update for Windows XP (KB969947)
    Security Update for Windows XP (KB970238)
    Security Update for Windows XP (KB971486)
    Security Update for Windows XP (KB971557)
    Security Update for Windows XP (KB971633)
    Security Update for Windows XP (KB971657)
    Security Update for Windows XP (KB971961)
    Security Update for Windows XP (KB973346)
    Security Update for Windows XP (KB973354)
    Security Update for Windows XP (KB973507)
    Security Update for Windows XP (KB973525)
    Security Update for Windows XP (KB973869)
    Security Update for Windows XP (KB974112)
    Security Update for Windows XP (KB974571)
    Security Update for Windows XP (KB975025)
    Security Update for Windows XP (KB975467)
    SMSC IrCC V5.1.3600.3 SP1
    SRS WOW XT Plug-In for Windows Media Player for Toshiba version 1.0.2
    Synaptics Pointing Device Driver
    TOSHIBA ConfigFree
    TOSHIBA Console
    TOSHIBA Controls
    TOSHIBA Hotkey Utility for Display Devices
    TOSHIBA Manuals
    TOSHIBA PC Diagnostic Tool
    TOSHIBA Power Saver
    TOSHIBA Software Modem
    TOSHIBA Utilities
    TOSHIBA Zooming Utility
    Touch and Launch
    Update for Microsoft .NET Framework 3.5 SP1 (KB963707)
    Update for Windows Internet Explorer 7 (KB976749)
    Update for Windows XP (KB943729)
    Update for Windows XP (KB951978)
    Update for Windows XP (KB955839)
    Update for Windows XP (KB967715)
    Update for Windows XP (KB968389)
    Update for Windows XP (KB973687)
    Update for Windows XP (KB973815)
    WebFldrs XP
    Windows Genuine Advantage Notifications (KB905474)
    Windows Internet Explorer 7
    Windows Media Format 11 runtime
    Windows Media Player 11
    Windows XP Service Pack 3
    WinZip
    Wireless-G Notebook Adapter

    ==== Event Viewer Messages From Past Week ========

    19/01/2011 21:04:54, error: SideBySide [59] - Resolve Partial Assembly failed for Microsoft.VC90.CRT. Reference error message: The referenced assembly is not installed on your system. .
    19/01/2011 21:04:54, error: SideBySide [59] - Generate Activation Context failed for C:\DOCUME~1\ROBERT~1.TOS\LOCALS~1\Temp\RarSFX0\redist.dll. Reference error message: The operation completed successfully. .
    19/01/2011 21:04:54, error: SideBySide [32] - Dependent Assembly Microsoft.VC90.CRT could not be found and Last Error was The referenced assembly is not installed on your system.
    19/01/2011 18:11:24, error: Service Control Manager [7034] - The Workstation service terminated unexpectedly. It has done this 1 time(s).
    19/01/2011 18:11:24, error: Service Control Manager [7034] - The Network Location Awareness (NLA) service terminated unexpectedly. It has done this 1 time(s).
    19/01/2011 18:11:24, error: Service Control Manager [7034] - The Network Connections service terminated unexpectedly. It has done this 1 time(s).
    19/01/2011 18:11:24, error: Service Control Manager [7031] - The Network Access Protection Agent service terminated unexpectedly. It has done this 1 time(s). The following corrective action will be taken in 120000 milliseconds: Restart the service.
    19/01/2011 18:11:24, error: Service Control Manager [7031] - The Help and Support service terminated unexpectedly. It has done this 1 time(s). The following corrective action will be taken in 100 milliseconds: Restart the service.
    19/01/2011 18:11:24, error: Service Control Manager [7031] - The Health Key and Certificate Management Service service terminated unexpectedly. It has done this 1 time(s). The following corrective action will be taken in 120000 milliseconds: Restart the service.
    16/01/2011 17:47:37, error: sr [1] - The System Restore filter encountered the unexpected error '0xC0000001' while processing the file '' on the volume 'HarddiskVolume1'. It has stopped monitoring the volume.
    16/01/2011 17:47:20, error: Service Control Manager [7026] - The following boot-start or system-start driver(s) failed to load: PCIIde
    16/01/2011 14:43:20, error: atapi [9] - The device, \Device\Ide\IdePort0, did not respond within the timeout period.
    16/01/2011 14:02:48, error: Service Control Manager [7034] - The Logical Disk Manager service terminated unexpectedly. It has done this 1 time(s).
    16/01/2011 14:02:48, error: Service Control Manager [7034] - The Fast User Switching Compatibility service terminated unexpectedly. It has done this 1 time(s).
    16/01/2011 14:02:48, error: Service Control Manager [7034] - The DHCP Client service terminated unexpectedly. It has done this 1 time(s).
    16/01/2011 14:02:48, error: Service Control Manager [7034] - The Cryptographic Services service terminated unexpectedly. It has done this 1 time(s).
    16/01/2011 14:02:48, error: Service Control Manager [7034] - The COM+ Event System service terminated unexpectedly. It has done this 1 time(s).
    16/01/2011 12:02:51, error: Service Control Manager [7023] - The Windows Firewall/Internet Connection Sharing (ICS) service terminated with the following error: Access is denied.
    16/01/2011 00:31:33, error: NIC1394 [5002] - 1394 Net Adapter #2 : Has determined that the adapter is not functioning properly.
    15/01/2011 23:33:49, error: PSched [14103] - QoS [Adapter {61CDDA0E-D1FC-411D-B3E0-88E0DAB67413}]: The netcard driver failed the query for OID_GEN_LINK_SPEED.
    15/01/2011 16:28:34, error: Service Control Manager [7023] - The COM Host service terminated with the following error: Catastrophic failure
    15/01/2011 12:00:37, error: PSched [14103] - QoS [Adapter {0EB55893-35F8-43E6-8E4A-EA153AFA1B29}]: The netcard driver failed the query for OID_GEN_LINK_SPEED.

    ==== End Of File ===========================

  5. #15
    Junior Member
    Join Date
    Jan 2011
    Posts
    27

    Default

    AV Log



    Avira AntiVir Personal
    Report file date: 19 January 2011 21:22

    Scanning for 2384044 virus strains and unwanted programs.

    The program is running as an unrestricted full version.
    Online services are available:

    Licensee : Avira AntiVir Personal - FREE Antivirus
    Serial number : 0000149996-ADJIE-0000001
    Platform : Windows XP
    Windows version : (Service Pack 3) [5.1.2600]
    Boot mode : Normally booted
    Username : SYSTEM
    Computer name : TOSHA60RPP

    Version information:
    BUILD.DAT : 10.0.0.609 31824 Bytes 13/12/2010 09:43:00
    AVSCAN.EXE : 10.0.3.5 435368 Bytes 13/12/2010 08:39:56
    AVSCAN.DLL : 10.0.3.0 46440 Bytes 01/04/2010 12:57:04
    LUKE.DLL : 10.0.3.2 104296 Bytes 13/12/2010 08:40:06
    LUKERES.DLL : 10.0.0.1 12648 Bytes 10/02/2010 23:40:49
    VBASE000.VDF : 7.10.0.0 19875328 Bytes 06/11/2009 09:05:36
    VBASE001.VDF : 7.11.0.0 13342208 Bytes 14/12/2010 21:19:55
    VBASE002.VDF : 7.11.0.1 2048 Bytes 14/12/2010 21:19:56
    VBASE003.VDF : 7.11.0.2 2048 Bytes 14/12/2010 21:19:56
    VBASE004.VDF : 7.11.0.3 2048 Bytes 14/12/2010 21:19:56
    VBASE005.VDF : 7.11.0.4 2048 Bytes 14/12/2010 21:19:56
    VBASE006.VDF : 7.11.0.5 2048 Bytes 14/12/2010 21:19:56
    VBASE007.VDF : 7.11.0.6 2048 Bytes 14/12/2010 21:19:56
    VBASE008.VDF : 7.11.0.7 2048 Bytes 14/12/2010 21:19:57
    VBASE009.VDF : 7.11.0.8 2048 Bytes 14/12/2010 21:19:57
    VBASE010.VDF : 7.11.0.9 2048 Bytes 14/12/2010 21:19:57
    VBASE011.VDF : 7.11.0.10 2048 Bytes 14/12/2010 21:19:57
    VBASE012.VDF : 7.11.0.11 2048 Bytes 14/12/2010 21:19:57
    VBASE013.VDF : 7.11.0.52 128000 Bytes 16/12/2010 21:19:58
    VBASE014.VDF : 7.11.0.91 226816 Bytes 20/12/2010 21:19:59
    VBASE015.VDF : 7.11.0.122 136192 Bytes 21/12/2010 21:20:00
    VBASE016.VDF : 7.11.0.156 122880 Bytes 24/12/2010 21:20:00
    VBASE017.VDF : 7.11.0.185 146944 Bytes 27/12/2010 21:20:01
    VBASE018.VDF : 7.11.0.228 132608 Bytes 30/12/2010 21:20:02
    VBASE019.VDF : 7.11.1.5 148480 Bytes 03/01/2011 21:20:03
    VBASE020.VDF : 7.11.1.37 156672 Bytes 07/01/2011 21:20:03
    VBASE021.VDF : 7.11.1.65 140800 Bytes 10/01/2011 21:20:04
    VBASE022.VDF : 7.11.1.87 225280 Bytes 11/01/2011 21:20:05
    VBASE023.VDF : 7.11.1.124 125440 Bytes 14/01/2011 21:20:06
    VBASE024.VDF : 7.11.1.155 132096 Bytes 17/01/2011 21:20:07
    VBASE025.VDF : 7.11.1.156 2048 Bytes 17/01/2011 21:20:07
    VBASE026.VDF : 7.11.1.157 2048 Bytes 17/01/2011 21:20:07
    VBASE027.VDF : 7.11.1.158 2048 Bytes 17/01/2011 21:20:07
    VBASE028.VDF : 7.11.1.159 2048 Bytes 17/01/2011 21:20:07
    VBASE029.VDF : 7.11.1.160 2048 Bytes 17/01/2011 21:20:07
    VBASE030.VDF : 7.11.1.161 2048 Bytes 17/01/2011 21:20:07
    VBASE031.VDF : 7.11.1.182 111104 Bytes 19/01/2011 21:20:08
    Engineversion : 8.2.4.148
    AEVDF.DLL : 8.1.2.1 106868 Bytes 13/12/2010 08:39:51
    AESCRIPT.DLL : 8.1.3.52 1282426 Bytes 19/01/2011 21:20:21
    AESCN.DLL : 8.1.7.2 127349 Bytes 13/12/2010 08:39:50
    AESBX.DLL : 8.1.3.2 254324 Bytes 13/12/2010 08:39:50
    AERDL.DLL : 8.1.9.2 635252 Bytes 13/12/2010 08:39:50
    AEPACK.DLL : 8.2.4.7 512375 Bytes 19/01/2011 21:20:19
    AEOFFICE.DLL : 8.1.1.15 205178 Bytes 19/01/2011 21:20:18
    AEHEUR.DLL : 8.1.2.66 3166582 Bytes 19/01/2011 21:20:17
    AEHELP.DLL : 8.1.16.0 246136 Bytes 13/12/2010 08:39:42
    AEGEN.DLL : 8.1.5.1 397683 Bytes 19/01/2011 21:20:10
    AEEMU.DLL : 8.1.3.0 393589 Bytes 13/12/2010 08:39:42
    AECORE.DLL : 8.1.19.0 196984 Bytes 13/12/2010 08:39:41
    AEBB.DLL : 8.1.1.0 53618 Bytes 13/12/2010 08:39:41
    AVWINLL.DLL : 10.0.0.0 19304 Bytes 13/12/2010 08:39:56
    AVPREF.DLL : 10.0.0.0 44904 Bytes 13/12/2010 08:39:54
    AVREP.DLL : 10.0.0.8 62209 Bytes 17/06/2010 14:27:13
    AVREG.DLL : 10.0.3.2 53096 Bytes 13/12/2010 08:39:54
    AVSCPLR.DLL : 10.0.3.2 84328 Bytes 13/12/2010 08:39:56
    AVARKT.DLL : 10.0.22.6 231784 Bytes 13/12/2010 08:39:52
    AVEVTLOG.DLL : 10.0.0.8 203112 Bytes 13/12/2010 08:39:53
    SQLITE3.DLL : 3.6.19.0 355688 Bytes 17/06/2010 14:27:22
    AVSMTP.DLL : 10.0.0.17 63848 Bytes 13/12/2010 08:39:56
    NETNT.DLL : 10.0.0.0 11624 Bytes 17/06/2010 14:27:21
    RCIMAGE.DLL : 10.0.0.26 2550120 Bytes 28/01/2010 13:10:20
    RCTEXT.DLL : 10.0.58.0 97128 Bytes 13/12/2010 08:40:20

    Configuration settings for the scan:
    Jobname.............................: Complete system scan
    Configuration file..................: C:\Program Files\Avira\AntiVir Desktop\sysscan.avp
    Logging.............................: low
    Primary action......................: interactive
    Secondary action....................: ignore
    Scan master boot sector.............: on
    Scan boot sector....................: on
    Boot sectors........................: C:,
    Process scan........................: on
    Extended process scan...............: on
    Scan registry.......................: on
    Search for rootkits.................: on
    Integrity checking of system files..: off
    Scan all files......................: All files
    Scan archives.......................: on
    Recursion depth.....................: 20
    Smart extensions....................: on
    Macro heuristic.....................: on
    File heuristic......................: medium

    Start of the scan: 19 January 2011 21:22

    Starting search for hidden objects.
    c:\program files\synaptics\syntp\syntplpr.exe
    c:\program files\synaptics\syntp\syntplpr.exe
    [NOTE] The process is not visible.

    The scan of running processes will be started
    Scan process 'rsmsink.exe' - '34' Module(s) have been scanned
    Scan process 'msdtc.exe' - '46' Module(s) have been scanned
    Scan process 'dllhost.exe' - '66' Module(s) have been scanned
    Scan process 'dllhost.exe' - '51' Module(s) have been scanned
    Scan process 'vssvc.exe' - '54' Module(s) have been scanned
    Scan process 'avscan.exe' - '76' Module(s) have been scanned
    Scan process 'avcenter.exe' - '66' Module(s) have been scanned
    Scan process 'taskmgr.exe' - '43' Module(s) have been scanned
    Scan process 'ctfmon.exe' - '32' Module(s) have been scanned
    Scan process 'TPSBattM.exe' - '30' Module(s) have been scanned
    Scan process 'avgnt.exe' - '52' Module(s) have been scanned
    Scan process 'iTunesHelper.exe' - '67' Module(s) have been scanned
    Scan process 'PadExe.exe' - '44' Module(s) have been scanned
    Scan process 'SmoothView.exe' - '25' Module(s) have been scanned
    Scan process 'NDSTray.exe' - '72' Module(s) have been scanned
    Scan process 'TPSMain.exe' - '42' Module(s) have been scanned
    Scan process 'thotkey.exe' - '45' Module(s) have been scanned
    Scan process 'AGRSMMSG.exe' - '25' Module(s) have been scanned
    Scan process 'SynTPEnh.exe' - '33' Module(s) have been scanned
    Scan process 'SynTPLpr.exe' - '28' Module(s) have been scanned
    Scan process 'Explorer.EXE' - '110' Module(s) have been scanned
    Scan process 'dmadmin.exe' - '33' Module(s) have been scanned
    Scan process 'nsverctl.exe' - '27' Module(s) have been scanned
    Scan process 'NICServ.exe' - '31' Module(s) have been scanned
    Scan process 'avshadow.exe' - '33' Module(s) have been scanned
    Scan process 'MDM.EXE' - '27' Module(s) have been scanned
    Scan process 'iPodService.exe' - '36' Module(s) have been scanned
    Scan process 'svchost.exe' - '40' Module(s) have been scanned
    Scan process 'svchost.exe' - '40' Module(s) have been scanned
    Scan process 'CFSvcs.exe' - '44' Module(s) have been scanned
    Scan process 'mDNSResponder.exe' - '39' Module(s) have been scanned
    Scan process 'avguard.exe' - '61' Module(s) have been scanned
    Scan process 'alg.exe' - '39' Module(s) have been scanned
    Scan process 'svchost.exe' - '36' Module(s) have been scanned
    Scan process 'sched.exe' - '50' Module(s) have been scanned
    Scan process 'spoolsv.exe' - '62' Module(s) have been scanned
    Scan process 'svchost.exe' - '47' Module(s) have been scanned
    Scan process 'svchost.exe' - '38' Module(s) have been scanned
    Scan process 'ACS.exe' - '35' Module(s) have been scanned
    Scan process 'svchost.exe' - '170' Module(s) have been scanned
    Scan process 'svchost.exe' - '45' Module(s) have been scanned
    Scan process 'svchost.exe' - '56' Module(s) have been scanned
    Scan process 'lsass.exe' - '64' Module(s) have been scanned
    Scan process 'services.exe' - '43' Module(s) have been scanned
    Scan process 'winlogon.exe' - '73' Module(s) have been scanned
    Scan process 'csrss.exe' - '14' Module(s) have been scanned
    Scan process 'smss.exe' - '2' Module(s) have been scanned

    Starting master boot sector scan:
    Master boot sector HD0
    [INFO] No virus was found!

    Start scanning boot sectors:
    Boot sector 'C:\'
    [INFO] No virus was found!

    Starting to scan executable files (registry).
    The registry was scanned ( '1668' files ).


    Starting the file scan:

    Begin scan in 'C:\'
    C:\Documents and Settings\Robert Prinsen.TOSHA60RPP\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\B.jar-5835e3c9-3c0f8f6c.zip
    [0] Archive type: ZIP
    [DETECTION] Is the TR/ClassLoader.AR Trojan
    --> mp1/p2/C.class
    [DETECTION] Contains recognition pattern of the JAVA/Agent.BW Java virus
    --> mp1/p2/M.class
    [DETECTION] Is the TR/ClassLoader.AR Trojan
    C:\Documents and Settings\Robert Prinsen.TOSHA60RPP\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\blhuymaldvjue.jar-59d68fc8-3ff81520.zip
    [0] Archive type: ZIP
    [DETECTION] Contains recognition pattern of the JAVA/Agent.EZ Java virus
    --> a66d578f084.class
    [DETECTION] Contains recognition pattern of the JAVA/Agent.EZ Java virus
    --> ab16db71cdc.class
    [DETECTION] Contains recognition pattern of the JAVA/Agent.FH Java virus
    --> ae28546890f.class
    [DETECTION] Contains recognition pattern of the JAVA/Agent.FJ Java virus
    --> af439f03798.class
    [DETECTION] Contains recognition pattern of the JAVA/Agent.FK Java virus
    C:\Documents and Settings\Robert Prinsen.TOSHA60RPP\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\brxsgtywiwcnk4.jar-d70c546-37b48ee0.zip
    [0] Archive type: ZIP
    [DETECTION] Contains recognition pattern of the JAVA/Agent.EZ Java virus
    --> a66d578f084.class
    [DETECTION] Contains recognition pattern of the JAVA/Agent.EZ Java virus
    --> ab16db71cdc.class
    [DETECTION] Contains recognition pattern of the JAVA/Agent.FH Java virus
    --> ae28546890f.class
    [DETECTION] Contains recognition pattern of the JAVA/Agent.FJ Java virus
    --> af439f03798.class
    [DETECTION] Contains recognition pattern of the JAVA/Agent.FK Java virus
    C:\Documents and Settings\Robert Prinsen.TOSHA60RPP\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\cofrbofvfqcma3.jar-63286ab-4e9f9f35.zip
    [0] Archive type: ZIP
    [DETECTION] Contains recognition pattern of the JAVA/OpenConnect.AI Java virus
    --> bpac/purok.class
    [DETECTION] Contains recognition pattern of the JAVA/OpenConnect.AI Java virus
    C:\Documents and Settings\Robert Prinsen.TOSHA60RPP\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\cvgnhngobrdngq5.jar-64d63f84-1b9f5224.zip
    [0] Archive type: ZIP
    [DETECTION] Contains recognition pattern of the JAVA/OpenConnect.CF Java virus
    --> bpac/a.class
    [DETECTION] Contains recognition pattern of the JAVA/OpenConnect.CF Java virus
    C:\Documents and Settings\Robert Prinsen.TOSHA60RPP\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\des.jar-3f4a90d1-5e6e400a.zip
    [0] Archive type: ZIP
    [DETECTION] Contains recognition pattern of the JAVA/Agent.BH Java virus
    --> dev/s/AdgredY.class
    [DETECTION] Contains recognition pattern of the JAVA/Agent.BH Java virus
    --> dev/s/DyesyasZ.class
    [DETECTION] Contains recognition pattern of the JAVA/Agent.GS Java virus
    --> dev/s/LoaderX.class
    [DETECTION] Contains recognition pattern of the JAVA/ClassLoader.BO Java virus
    C:\Documents and Settings\Robert Prinsen.TOSHA60RPP\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\ilirhzcvyqcrfme.jar-153eafeb-3812f852.zip
    [0] Archive type: ZIP
    [DETECTION] Contains recognition pattern of the JAVA/Agent.EZ Java virus
    --> a66d578f084.class
    [DETECTION] Contains recognition pattern of the JAVA/Agent.EZ Java virus
    --> ab16db71cdc.class
    [DETECTION] Contains recognition pattern of the JAVA/Agent.FH Java virus
    --> ae28546890f.class
    [DETECTION] Contains recognition pattern of the JAVA/Agent.FJ Java virus
    --> af439f03798.class
    [DETECTION] Contains recognition pattern of the JAVA/Agent.FK Java virus
    C:\Documents and Settings\Robert Prinsen.TOSHA60RPP\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\j.jar-c0e2cd6-4800da7d.zip
    [0] Archive type: ZIP
    [DETECTION] Contains recognition pattern of the JAVA/Dldr.Agent.W Java virus
    --> CustomClass.class
    [DETECTION] Contains recognition pattern of the JAVA/Rowindal.I Java virus
    --> evilPolicy.class
    [DETECTION] Contains recognition pattern of the EXP/CVE-2008-5353.SW exploit
    --> dostuff.class
    [DETECTION] Contains recognition pattern of the JAVA/Dldr.Agent.W Java virus
    --> mosdef.class
    [DETECTION] Contains recognition pattern of the EXP/CVE-2008-5353.WA exploit
    --> SiteError.class
    [DETECTION] Contains recognition pattern of the EXP/CVE-2010-0094.B exploit
    --> xmo.ser
    [DETECTION] Contains recognition pattern of the EXP/CVE-2010-0094.A exploit
    C:\Documents and Settings\Robert Prinsen.TOSHA60RPP\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\jvmaudio.jar-306ea40d-4b27d295.zip
    [0] Archive type: ZIP
    [DETECTION] Contains recognition pattern of the EXP/CVE-2009-3867.GC exploit
    --> vmain.class
    [DETECTION] Contains recognition pattern of the EXP/CVE-2009-3867.GC exploit
    C:\Documents and Settings\Robert Prinsen.TOSHA60RPP\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\jvmseria.jar-2fd98af-5b96ed15.zip
    [0] Archive type: ZIP
    [DETECTION] Contains recognition pattern of the EXP/CVE-2008-5353.KM exploit
    --> ________vload.class
    [DETECTION] Contains recognition pattern of the EXP/CVE-2008-5353.KM exploit
    --> vmain.class
    [DETECTION] Contains recognition pattern of the EXP/CVE-2008-5353.ND exploit
    C:\Documents and Settings\Robert Prinsen.TOSHA60RPP\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\jvmsetfi.jar-681c415c-77749623.zip
    [0] Archive type: ZIP
    [DETECTION] Contains recognition pattern of the EXP/CVE-2009-3867.EH exploit
    --> vmain.class
    [DETECTION] Contains recognition pattern of the EXP/CVE-2009-3867.EH exploit
    C:\Documents and Settings\Robert Prinsen.TOSHA60RPP\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\manluckybreak.jar-4f6929dd-28db29e6.zip
    [0] Archive type: ZIP
    [DETECTION] Contains recognition pattern of the JAVA/ClassLoad.AF.2 Java virus
    --> KAK/NED/NOD32.class
    [DETECTION] Contains recognition pattern of the JAVA/ClassLoad.AF.2 Java virus
    --> KAK/NED/sexxxy.class
    [DETECTION] Contains recognition pattern of the JAVA/Agent.25252 Java virus
    --> KAK/NED/crime4u.class
    [DETECTION] Contains recognition pattern of the JAVA/Agent.9888 Java virus
    C:\Documents and Settings\Robert Prinsen.TOSHA60RPP\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\smallrich.jar-5375884f-54c2a55f.zip
    [0] Archive type: ZIP
    [DETECTION] Contains recognition pattern of the JAVA/Agent.M.3 Java virus
    --> seopack.class
    [DETECTION] Contains recognition pattern of the JAVA/Agent.M.3 Java virus
    C:\Documents and Settings\Robert Prinsen.TOSHA60RPP\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\yqhvcsgljoilx.jar-59e908ab-7415d730.zip
    [0] Archive type: ZIP
    [DETECTION] Contains recognition pattern of the JAVA/Agent.EZ Java virus
    --> a66d578f084.class
    [DETECTION] Contains recognition pattern of the JAVA/Agent.EZ Java virus
    --> ab16db71cdc.class
    [DETECTION] Contains recognition pattern of the JAVA/Agent.FH Java virus
    --> ae28546890f.class
    [DETECTION] Contains recognition pattern of the JAVA/Agent.FJ Java virus
    --> af439f03798.class
    [DETECTION] Contains recognition pattern of the JAVA/Agent.FK Java virus

    Beginning disinfection:
    C:\Documents and Settings\Robert Prinsen.TOSHA60RPP\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\yqhvcsgljoilx.jar-59e908ab-7415d730.zip
    [DETECTION] Contains recognition pattern of the JAVA/Agent.EZ Java virus
    [NOTE] The file was moved to the quarantine directory under the name '4f137743.qua'.
    C:\Documents and Settings\Robert Prinsen.TOSHA60RPP\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\smallrich.jar-5375884f-54c2a55f.zip
    [DETECTION] Contains recognition pattern of the JAVA/Agent.M.3 Java virus
    [NOTE] The file was moved to the quarantine directory under the name '578358e0.qua'.
    C:\Documents and Settings\Robert Prinsen.TOSHA60RPP\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\manluckybreak.jar-4f6929dd-28db29e6.zip
    [DETECTION] Contains recognition pattern of the JAVA/ClassLoad.AF.2 Java virus
    [NOTE] The file was moved to the quarantine directory under the name '05e1021c.qua'.
    C:\Documents and Settings\Robert Prinsen.TOSHA60RPP\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\jvmsetfi.jar-681c415c-77749623.zip
    [DETECTION] Contains recognition pattern of the EXP/CVE-2009-3867.EH exploit
    [NOTE] The file was moved to the quarantine directory under the name '63d74dc3.qua'.
    C:\Documents and Settings\Robert Prinsen.TOSHA60RPP\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\jvmseria.jar-2fd98af-5b96ed15.zip
    [DETECTION] Contains recognition pattern of the EXP/CVE-2008-5353.ND exploit
    [NOTE] The file was moved to the quarantine directory under the name '265360fd.qua'.
    C:\Documents and Settings\Robert Prinsen.TOSHA60RPP\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\jvmaudio.jar-306ea40d-4b27d295.zip
    [DETECTION] Contains recognition pattern of the EXP/CVE-2009-3867.GC exploit
    [NOTE] The file was moved to the quarantine directory under the name '5948529c.qua'.
    C:\Documents and Settings\Robert Prinsen.TOSHA60RPP\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\j.jar-c0e2cd6-4800da7d.zip
    [DETECTION] Contains recognition pattern of the JAVA/Dldr.Agent.W Java virus
    [NOTE] The file was moved to the quarantine directory under the name '15f57e9e.qua'.
    C:\Documents and Settings\Robert Prinsen.TOSHA60RPP\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\ilirhzcvyqcrfme.jar-153eafeb-3812f852.zip
    [DETECTION] Contains recognition pattern of the JAVA/Agent.EZ Java virus
    [NOTE] The file was moved to the quarantine directory under the name '69ec3e90.qua'.
    C:\Documents and Settings\Robert Prinsen.TOSHA60RPP\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\des.jar-3f4a90d1-5e6e400a.zip
    [DETECTION] Contains recognition pattern of the JAVA/Agent.BH Java virus
    [NOTE] The file was moved to the quarantine directory under the name '44bc11da.qua'.
    C:\Documents and Settings\Robert Prinsen.TOSHA60RPP\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\cvgnhngobrdngq5.jar-64d63f84-1b9f5224.zip
    [DETECTION] Contains recognition pattern of the JAVA/OpenConnect.CF Java virus
    [NOTE] The file was moved to the quarantine directory under the name '5de02a51.qua'.
    C:\Documents and Settings\Robert Prinsen.TOSHA60RPP\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\cofrbofvfqcma3.jar-63286ab-4e9f9f35.zip
    [DETECTION] Contains recognition pattern of the JAVA/OpenConnect.AI Java virus
    [NOTE] The file was moved to the quarantine directory under the name '31bf066a.qua'.
    C:\Documents and Settings\Robert Prinsen.TOSHA60RPP\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\brxsgtywiwcnk4.jar-d70c546-37b48ee0.zip
    [DETECTION] Contains recognition pattern of the JAVA/Agent.EZ Java virus
    [NOTE] The file was moved to the quarantine directory under the name '40343ff8.qua'.
    C:\Documents and Settings\Robert Prinsen.TOSHA60RPP\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\blhuymaldvjue.jar-59d68fc8-3ff81520.zip
    [DETECTION] Contains recognition pattern of the JAVA/Agent.EZ Java virus
    [NOTE] The file was moved to the quarantine directory under the name '4e1e0f25.qua'.
    C:\Documents and Settings\Robert Prinsen.TOSHA60RPP\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\B.jar-5835e3c9-3c0f8f6c.zip
    [DETECTION] Is the TR/ClassLoader.AR Trojan
    [NOTE] The file was moved to the quarantine directory under the name '0b097639.qua'.


    End of the scan: 20 January 2011 06:17
    Used time: 7:04:18 Hour(s)

    The scan has been done completely.

    16108 Scanned directories
    4006367 Files were scanned
    48 Viruses and/or unwanted programs were found
    0 Files were classified as suspicious
    0 files were deleted
    0 Viruses and unwanted programs were repaired
    14 Files were moved to quarantine
    0 Files were renamed
    0 Files cannot be scanned
    4006319 Files not concerned
    34756 Archives were scanned
    0 Warnings
    14 Notes
    495887 Objects were scanned with rootkit scan
    1 Hidden objects were found

  6. #16
    Emeritus
    Join Date
    Aug 2007
    Posts
    1,875

    Default

    It looks like what Avira found and cleaned were some infected files in Java's cache. I'll be having you update to the latest Java and cleaning out Java's cache in future posts.


    IMPORTANT I notice there are signs of one or more P2P (Person to Person) File Sharing Programs on your computer.

    BitTorrent

    I'd like you to read the Guidelines for P2P Programs where we explain why it's not a good idea to have them.

    Also available here.

    My recommendation is you go to Control Panel > Add/Remove Programs and uninstall the programs listed above (in red).


    Step # 1: Download and Run ComboFix

    Download ComboFix from any of the links below. You must rename it to Pluuf.exe before saving it. Save it to your Desktop.

    Link 1
    Link 2

    --------------------------------------------------------------------

    *Ensure you have disabled all anti virus and anti malware programs so they do not interfere with the running of ComboFix.

    Double click on Pluuf.exe & follow the prompts.
    • When finished, it will produce a report for you.
    • Please include C:\ComboFix.txt in your next reply so we can continue cleaning the system.


    Note:
    Do not mouseclick combofix's window while it's running. That may cause it to stall
    Last edited by km2357; 2011-01-20 at 21:20.
    Malware Removal University Master
    Member of ASAP & UNITE

  7. #17
    Junior Member
    Join Date
    Jan 2011
    Posts
    27

    Default

    I followed your instructions. I removed bittorrent, which I installed some six months ago, but never got working. Maybe just as well.

    I re-downloaded combofix and renamed it pluuf.exe before saving, and also deleted the original download. I ran it and followed all instructions. The next few posts will have the GMER which I ran earlier and the combofix log.

    Google is still re-routing, svchost is quiet thusfar.

  8. #18
    Junior Member
    Join Date
    Jan 2011
    Posts
    27

    Default

    GMER

    GMER 1.0.15.15530 - http://www.gmer.net
    Rootkit quick scan 2011-01-20 18:18:51
    Windows 5.1.2600 Service Pack 3 Harddisk0\DR0 -> \Device\Ide\IdePort0 TOSHIBA_MK8032GAX rev.AD002D
    Running: gmer.exe; Driver: C:\DOCUME~1\ROBERT~1.TOS\LOCALS~1\Temp\uwldrkow.sys


    ---- Disk sectors - GMER 1.0.15 ----

    Disk \Device\Harddisk0\DR0 sector 62: rootkit-like behavior;
    Disk \Device\Harddisk0\DR0 sector 63: rootkit-like behavior;

    ---- Devices - GMER 1.0.15 ----

    Device \Driver\atapi -> DriverStartIo \Device\Ide\IdePort0 8532B39B
    Device \Driver\atapi -> DriverStartIo \Device\Ide\IdePort1 8532B39B
    Device \Driver\atapi -> DriverStartIo \Device\Ide\IdeDeviceP1T0L0-e 8532B39B
    Device \Driver\Tcpip \Device\Ip ns80503.sys (Citrix Access Gateway client/Citrix Systems, Inc)
    Device \Driver\Tcpip \Device\Tcp ns80503.sys (Citrix Access Gateway client/Citrix Systems, Inc)
    Device \Driver\Tcpip \Device\Udp ns80503.sys (Citrix Access Gateway client/Citrix Systems, Inc)
    Device \Driver\Tcpip \Device\RawIp ns80503.sys (Citrix Access Gateway client/Citrix Systems, Inc)

    AttachedDevice \Driver\Kbdclass \Device\KeyboardClass0 SynTP.sys (Synaptics Touchpad Driver/Synaptics, Inc.)
    AttachedDevice \Driver\Kbdclass \Device\KeyboardClass1 SynTP.sys (Synaptics Touchpad Driver/Synaptics, Inc.)

    Device \Device\Ide\IdeDeviceP0T0L0-3 -> \??\IDE#DiskTOSHIBA_MK8032GAX_______________________AD002D__#5&1c50b25f&0&0.0.0#{53f56307-b6bf-11d0-94f2-00a0c91efb8b} device not found

    ---- EOF - GMER 1.0.15 ----

    GMER 1.0.15.15530 - http://www.gmer.net
    Rootkit scan 2011-01-20 21:51:59
    Windows 5.1.2600 Service Pack 3 Harddisk0\DR0 -> \Device\Ide\IdePort0 TOSHIBA_MK8032GAX rev.AD002D
    Running: gmer.exe; Driver: C:\DOCUME~1\ROBERT~1.TOS\LOCALS~1\Temp\uwldrkow.sys


    ---- System - GMER 1.0.15 ----

    SSDT EF86FB76 ZwCreateKey
    SSDT EF86FB6C ZwCreateThread
    SSDT EF86FB7B ZwDeleteKey
    SSDT EF86FB85 ZwDeleteValueKey
    SSDT EF86FB8A ZwLoadKey
    SSDT EF86FB58 ZwOpenProcess
    SSDT EF86FB5D ZwOpenThread
    SSDT EF86FB94 ZwReplaceKey
    SSDT EF86FB8F ZwRestoreKey
    SSDT EF86FB80 ZwSetValueKey

    ---- Kernel code sections - GMER 1.0.15 ----

    init C:\WINDOWS\system32\drivers\ALCXSENS.SYS entry point in "init" section [0xEB450900]
    .text tcpip.sys!ARPRcv + 1D69 B6F6A41E 5 Bytes JMP EF8D52E0 \??\C:\WINDOWS\system32\ns80503.sys (Citrix Access Gateway client/Citrix Systems, Inc)
    ? C:\DOCUME~1\ROBERT~1.TOS\LOCALS~1\Temp\mbr.sys The system cannot find the file specified. !

    ---- User code sections - GMER 1.0.15 ----

    .text C:\WINDOWS\Explorer.EXE[2044] ntdll.dll!NtProtectVirtualMemory 7C90D6EE 5 Bytes JMP 00C2000A
    .text C:\WINDOWS\Explorer.EXE[2044] ntdll.dll!NtWriteVirtualMemory 7C90DFAE 5 Bytes JMP 00CC000A
    .text C:\WINDOWS\Explorer.EXE[2044] ntdll.dll!KiUserExceptionDispatcher 7C90E47C 5 Bytes JMP 00B7000C
    .text C:\WINDOWS\System32\svchost.exe[3660] ntdll.dll!NtProtectVirtualMemory 7C90D6EE 5 Bytes JMP 00CB000A
    .text C:\WINDOWS\System32\svchost.exe[3660] ntdll.dll!NtWriteVirtualMemory 7C90DFAE 5 Bytes JMP 00CC000A
    .text C:\WINDOWS\System32\svchost.exe[3660] ntdll.dll!KiUserExceptionDispatcher 7C90E47C 5 Bytes JMP 00CA000C
    .text C:\WINDOWS\System32\svchost.exe[3660] ole32.dll!CoCreateInstance 7750057E 5 Bytes JMP 00E1000A
    .text C:\Program Files\Internet Explorer\iexplore.exe[3680] ntdll.dll!NtProtectVirtualMemory 7C90D6EE 5 Bytes JMP 00D5000A
    .text C:\Program Files\Internet Explorer\iexplore.exe[3680] ntdll.dll!NtWriteVirtualMemory 7C90DFAE 5 Bytes JMP 00D6000A
    .text C:\Program Files\Internet Explorer\iexplore.exe[3680] ntdll.dll!KiUserExceptionDispatcher 7C90E47C 5 Bytes JMP 00D4000C
    .text C:\Program Files\Internet Explorer\iexplore.exe[3680] USER32.dll!DialogBoxParamW 7E4247AB 5 Bytes JMP 3E1DF4B9 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
    .text C:\Program Files\Internet Explorer\iexplore.exe[3680] USER32.dll!DialogBoxIndirectParamW 7E432072 5 Bytes JMP 3E351FF7 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
    .text C:\Program Files\Internet Explorer\iexplore.exe[3680] USER32.dll!MessageBoxIndirectA 7E43A082 5 Bytes JMP 3E351F78 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
    .text C:\Program Files\Internet Explorer\iexplore.exe[3680] USER32.dll!DialogBoxParamA 7E43B144 5 Bytes JMP 3E351FBC C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
    .text C:\Program Files\Internet Explorer\iexplore.exe[3680] USER32.dll!MessageBoxExW 7E450838 5 Bytes JMP 3E351F04 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
    .text C:\Program Files\Internet Explorer\iexplore.exe[3680] USER32.dll!MessageBoxExA 7E45085C 5 Bytes JMP 3E351F3E C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
    .text C:\Program Files\Internet Explorer\iexplore.exe[3680] USER32.dll!DialogBoxIndirectParamA 7E456D7D 5 Bytes JMP 3E352032 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
    .text C:\Program Files\Internet Explorer\iexplore.exe[3680] USER32.dll!MessageBoxIndirectW 7E4664D5 5 Bytes JMP 3E2017EA C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
    .text C:\Program Files\Internet Explorer\iexplore.exe[3680] ole32.dll!OleLoadFromStream 77529C85 5 Bytes JMP 3E3521F4 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)

    ---- Devices - GMER 1.0.15 ----

    Device \Driver\Tcpip \Device\Ip ns80503.sys (Citrix Access Gateway client/Citrix Systems, Inc)

    AttachedDevice \Driver\Kbdclass \Device\KeyboardClass0 SynTP.sys (Synaptics Touchpad Driver/Synaptics, Inc.)
    AttachedDevice \Driver\Kbdclass \Device\KeyboardClass1 SynTP.sys (Synaptics Touchpad Driver/Synaptics, Inc.)

    Device \Driver\Tcpip \Device\Tcp ns80503.sys (Citrix Access Gateway client/Citrix Systems, Inc)
    Device \Driver\atapi -> DriverStartIo \Device\Ide\IdePort0 8532B39B
    Device \Driver\atapi -> DriverStartIo \Device\Ide\IdePort1 8532B39B
    Device \Driver\atapi -> DriverStartIo \Device\Ide\IdeDeviceP1T0L0-e 8532B39B
    Device \Driver\Tcpip \Device\Udp ns80503.sys (Citrix Access Gateway client/Citrix Systems, Inc)
    Device \Driver\Tcpip \Device\RawIp ns80503.sys (Citrix Access Gateway client/Citrix Systems, Inc)
    Device \Driver\Tcpip \Device\IPMULTICAST ns80503.sys (Citrix Access Gateway client/Citrix Systems, Inc)
    Device \Device\Ide\IdeDeviceP0T0L0-3 -> \??\IDE#DiskTOSHIBA_MK8032GAX_______________________AD002D__#5&1c50b25f&0&0.0.0#{53f56307-b6bf-11d0-94f2-00a0c91efb8b} device not found

    ---- Disk sectors - GMER 1.0.15 ----

    Disk \Device\Harddisk0\DR0 sector 62: rootkit-like behavior;
    Disk \Device\Harddisk0\DR0 sector 63: rootkit-like behavior;

    ---- EOF - GMER 1.0.15 ----

  9. #19
    Junior Member
    Join Date
    Jan 2011
    Posts
    27

    Default

    ComboFix 11-01-19.04 - Robert Prinsen 20/01/2011 22:51:16.1.1 - x86
    Microsoft Windows XP Professional 5.1.2600.3.1252.44.1033.18.447.136 [GMT 0:00]
    Running from: c:\documents and settings\Robert Prinsen.TOSHA60RPP\Desktop\Pluuf.exe
    AV: AntiVir Desktop *Disabled/Updated* {AD166499-45F9-482A-A743-FDD3350758C7}
    .

    ((((((((((((((((((((((((( Files Created from 2010-12-20 to 2011-01-20 )))))))))))))))))))))))))))))))
    .

    2011-01-19 21:18 . 2011-01-19 21:18 -------- d-----w- c:\documents and settings\Robert Prinsen.TOSHA60RPP\Application Data\Avira
    2011-01-19 21:06 . 2010-12-13 08:40 61960 ----a-w- c:\windows\system32\drivers\avgntflt.sys
    2011-01-19 21:06 . 2010-12-13 08:40 135096 ----a-w- c:\windows\system32\drivers\avipbb.sys
    2011-01-19 21:06 . 2010-06-17 14:27 45416 ----a-w- c:\windows\system32\drivers\avgntdd.sys
    2011-01-19 21:06 . 2010-06-17 14:27 22360 ----a-w- c:\windows\system32\drivers\avgntmgr.sys
    2011-01-19 21:06 . 2011-01-19 21:06 -------- d-----w- c:\program files\Avira
    2011-01-19 21:06 . 2011-01-19 21:06 -------- d-----w- c:\documents and settings\All Users\Application Data\Avira
    2011-01-16 21:30 . 2011-01-16 21:30 -------- d-----w- c:\program files\ESET
    2011-01-16 19:48 . 2011-01-16 19:48 -------- d-----w- C:\KeepDeletedItems
    2011-01-16 16:11 . 2011-01-16 16:11 -------- d-----w- c:\documents and settings\Robert Prinsen.TOSHA60RPP\Application Data\Malwarebytes
    2011-01-16 16:11 . 2010-12-20 18:09 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
    2011-01-16 16:11 . 2011-01-16 16:11 -------- d-----w- c:\documents and settings\All Users\Application Data\Malwarebytes
    2011-01-16 16:11 . 2011-01-16 16:11 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
    2011-01-16 16:11 . 2010-12-20 18:08 20952 ----a-w- c:\windows\system32\drivers\mbam.sys
    2011-01-16 13:37 . 2011-01-16 13:37 -------- d-----w- c:\program files\ERUNT
    2011-01-12 23:09 . 2011-01-12 23:10 -------- d-----w- c:\documents and settings\NetworkService\Local Settings\Application Data\Adobe
    2011-01-12 20:38 . 2011-01-12 20:38 -------- d-----w- c:\documents and settings\Robert\Application Data\Apple Computer
    2011-01-12 20:38 . 2011-01-12 20:38 -------- d-----w- c:\documents and settings\Robert\Local Settings\Application Data\Apple Computer
    2011-01-09 04:16 . 2011-01-09 04:16 -------- d-----w- c:\windows\system32\wbem\Repository
    2011-01-09 03:38 . 2011-01-09 04:16 -------- d-----w- c:\documents and settings\All Users\Application Data\gCkNc07000

    .
    (((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
    .
    2010-11-29 17:38 . 2010-11-29 17:38 94208 ----a-w- c:\windows\system32\QuickTimeVR.qtx
    2010-11-29 17:38 . 2010-11-29 17:38 69632 ----a-w- c:\windows\system32\QuickTime.qts
    .

    ((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
    .
    .
    *Note* empty entries & legit default entries are not shown
    REGEDIT4

    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
    "SynTPLpr"="c:\program files\Synaptics\SynTP\SynTPLpr.exe" [2004-04-22 98304]
    "SynTPEnh"="c:\program files\Synaptics\SynTP\SynTPEnh.exe" [2004-04-22 507904]
    "AGRSMMSG"="AGRSMMSG.exe" [2004-02-20 88363]
    "THotkey"="c:\program files\Toshiba\Toshiba Applet\thotkey.exe" [2004-08-16 430080]
    "TPSMain"="TPSMain.exe" [2004-08-11 266240]
    "NDSTray.exe"="NDSTray.exe" [BU]
    "SmoothView"="c:\program files\TOSHIBA\TOSHIBA Zooming Utility\SmoothView.exe" [2004-04-27 118784]
    "PadTouch"="c:\program files\TOSHIBA\PadTouch\PadExe.exe" [2004-02-12 1019904]
    "Adobe Reader Speed Launcher"="c:\program files\Adobe\Reader 9.0\Reader\Reader_sl.exe" [2009-12-22 35760]
    "Adobe ARM"="c:\program files\Common Files\Adobe\ARM\1.0\AdobeARM.exe" [2009-12-11 948672]
    "QuickTime Task"="c:\program files\QuickTime\QTTask.exe" [2010-11-29 421888]
    "iTunesHelper"="c:\program files\iTunes\iTunesHelper.exe" [2010-12-13 421160]
    "avgnt"="c:\program files\Avira\AntiVir Desktop\avgnt.exe" [2010-12-13 281768]

    [HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring]
    "DisableMonitoring"=dword:00000001

    [HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecAntiVirus]
    "DisableMonitoring"=dword:00000001

    [HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecFirewall]
    "DisableMonitoring"=dword:00000001

    [HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]
    "EnableFirewall"= 0 (0x0)

    [HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
    "%windir%\\system32\\sessmgr.exe"=
    "%windir%\\Network Diagnostic\\xpnetdiag.exe"=
    "c:\\Program Files\\Bonjour\\mDNSResponder.exe"=
    "c:\\Program Files\\iTunes\\iTunes.exe"=

    R0 atiide;atiide;c:\windows\system32\drivers\atiide.sys [24/08/2004 09:52 5632]
    R2 AntiVirSchedulerService;Avira AntiVir Scheduler;c:\program files\Avira\AntiVir Desktop\sched.exe [19/01/2011 21:06 135336]
    R2 ns80503;ns80503;c:\windows\system32\ns80503.sys [18/02/2009 23:50 42296]
    R2 nsverctl;NetScaler SSL VPN Version Control;c:\program files\NetScaler\NetScaler Secure Remote Access\nsverctl.exe [18/02/2009 23:50 53248]
    R3 Net6IM;Net6;c:\windows\system32\drivers\net6im51.sys [18/02/2009 23:50 43640]
    R3 WPC54GSv1;Linksys Wireless Notebook Adapter WPC54GSv1 Driver;c:\windows\system32\drivers\WPC54GSv1.SYS [30/11/2006 22:54 610816]
    S3 EraserUtilRebootDrv;EraserUtilRebootDrv;\??\c:\program files\Common Files\Symantec Shared\EENGINE\EraserUtilRebootDrv.sys --> c:\program files\Common Files\Symantec Shared\EENGINE\EraserUtilRebootDrv.sys [?]
    .
    Contents of the 'Scheduled Tasks' folder
    .
    .
    ------- Supplementary Scan -------
    .
    uInternet Settings,ProxyOverride = 127.0.0.1;*.local
    IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~2\OFFICE11\EXCEL.EXE/3000
    DPF: Microsoft XML Parser for Java - file:///C:/WINDOWS/Java/classes/xmldso.cab
    DPF: {04897B74-BBBE-46E5-9550-5C487F39C2E4} - hxxp://support.informatica.com/atlas/19227/applets/SiebelAx_OutBound_mail.cab
    DPF: {8C244272-1DC1-4CE7-9C6C-FABCA09EB543} - hxxp://support.informatica.com/atlas/19227/applets/SiebelAx_Desktop_Integration.cab
    DPF: {93A85BE8-6137-4E48-BBC8-E78E27035DB0} - hxxp://support.informatica.com/atlas/19227/applets/SiebelAx_HI_Client.cab
    .
    - - - - ORPHANS REMOVED - - - -

    WebBrowser-{5B291E6C-9A74-4034-971B-A4B007A0B315} - (no file)
    HKCU-Run-DriverUpdaterPro - c:\program files\iXi Tools\Driver Updater Pro\DriverUpdaterPro.exe



    **************************************************************************

    catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
    Rootkit scan 2011-01-20 23:11
    Windows 5.1.2600 Service Pack 3 NTFS

    scanning hidden processes ...

    scanning hidden autostart entries ...

    scanning hidden files ...

    scan completed successfully
    hidden files: 0

    **************************************************************************

    Stealth MBR rootkit/Mebroot/Sinowal/TDL4 detector 0.4.2 by Gmer, http://www.gmer.net
    Windows 5.1.2600 Disk: TOSHIBA_MK8032GAX rev.AD002D -> Harddisk0\DR0 -> \Device\Ide\IdePort0 P0T0L0-3

    device: opened successfully
    user: MBR read successfully

    Disk trace:
    called modules: ntoskrnl.exe catchme.sys CLASSPNP.SYS disk.sys ACPI.sys hal.dll >>UNKNOWN [0x8532C555]<<
    c:\docume~1\ROBERT~1.TOS\LOCALS~1\Temp\catchme.sys
    _asm { PUSH EBP; MOV EBP, ESP; PUSH ECX; MOV EAX, [EBP+0x8]; CMP EAX, [0x853327b0]; MOV EAX, [0x8533282c]; PUSH EBX; PUSH ESI; MOV ESI, [EBP+0xc]; MOV EBX, [ESI+0x60]; PUSH EDI; JNZ 0x20; MOV [EBP+0x8], EAX; }
    1 nt!IofCallDriver[0x804E37C5] -> \Device\Harddisk0\DR0[0x85375030]
    3 CLASSPNP[0xF7808FD7] -> nt!IofCallDriver[0x804E37C5] -> \Device\00000086[0x85390F18]
    5 ACPI[0xF775F620] -> nt!IofCallDriver[0x804E37C5] -> [0x853427F8]
    \Driver\atapi[0x85369F38] -> IRP_MJ_CREATE -> 0x8532C555
    kernel: MBR read successfully
    _asm { XOR AX, AX; MOV SS, AX; MOV SP, 0x7c00; STI ; PUSH AX; POP ES; PUSH AX; POP DS; CLD ; MOV SI, 0x7c1b; MOV DI, 0x61b; PUSH AX; PUSH DI; MOV CX, 0x1e5; REP MOVSB ; RETF ; MOV SI, 0x7be; MOV CL, 0x4; CMP [SI], CH; JL 0x2d; JNZ 0x3b; }
    detected disk devices:
    \Device\Ide\IdeDeviceP0T0L0-3 -> \??\IDE#DiskTOSHIBA_MK8032GAX_______________________AD002D__#5&1c50b25f&0&0.0.0#{53f56307-b6bf-11d0-94f2-00a0c91efb8b} device not found
    detected hooks:
    \Driver\atapi DriverStartIo -> 0x8532C39B
    user & kernel MBR OK
    Warning: possible TDL3 rootkit infection !

    **************************************************************************
    .
    --------------------- DLLs Loaded Under Running Processes ---------------------

    - - - - - - - > 'winlogon.exe'(688)
    c:\windows\system32\WININET.dll
    c:\windows\system32\Ati2evxx.dll

    - - - - - - - > 'lsass.exe'(748)
    c:\windows\system32\WININET.dll
    .
    Completion time: 2011-01-20 23:17:01
    ComboFix-quarantined-files.txt 2011-01-20 23:16

    Pre-Run: 39,864,868,864 bytes free
    Post-Run: 40,400,457,728 bytes free

    WindowsXP-KB310994-SP2-Pro-BootDisk-ENU.exe
    [boot loader]
    timeout=2
    default=multi(0)disk(0)rdisk(0)partition(1)\WINDOWS
    [operating systems]
    c:\cmdcons\BOOTSECT.DAT="Microsoft Windows Recovery Console" /cmdcons
    UnsupportedDebug="do not select this" /debug
    multi(0)disk(0)rdisk(0)partition(1)\WINDOWS="Microsoft Windows XP Professional" /noexecute=optin /fastdetect

    - - End Of File - - F55A53EE277088A6BB40D5E8FFCFBE72

  10. #20
    Junior Member
    Join Date
    Jan 2011
    Posts
    27

    Default

    svchost is still coming in and hogging the cpu.

    One other problem I had with IExplorer has disappeared, and that is, it would not start properly, and I needed to register, which it could not do. That happened after a microsoft upgrade, after which I disabled the auto updates.

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •