TechSpot

[A] Broni: XP machine slow - is it infected

By pot1234Dreadlox
Jun 18, 2012
  1. Broni,
    Thanks for your help previously. Have this XP machine (SP3) running slow...on the network of a previously infected machine... have posted logs below. Look forward to hearing from you...DL


    Malwarebytes Log
    Malwarebytes Anti-Malware (Trial) 1.61.0.1400
    www.malwarebytes.org
    Database version: v2012.06.18.03
    Windows XP Service Pack 3 x86 NTFS
    Internet Explorer 8.0.6001.18702
    Administrator :: SOUTH [administrator]
    Protection: Enabled
    18-Jun-12 4:39:41 PM
    mbam-log-2012-06-18 (16-39-41).txt
    Scan type: Quick scan
    Scan options enabled: Memory | Startup | Registry | File System | Heuristics/Extra | Heuristics/Shuriken | PUP | PUM
    Scan options disabled: P2P
    Objects scanned: 210493
    Time elapsed: 19 minute(s), 26 second(s)
    Memory Processes Detected: 0
    (No malicious items detected)
    Memory Modules Detected: 0
    (No malicious items detected)
    Registry Keys Detected: 0
    (No malicious items detected)
    Registry Values Detected: 0
    (No malicious items detected)
    Registry Data Items Detected: 3
    HKLM\SOFTWARE\Microsoft\Security Center|AntiVirusDisableNotify (PUM.Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> Quarantined and repaired successfully.
    HKLM\SOFTWARE\Microsoft\Security Center|FirewallDisableNotify (PUM.Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> Quarantined and repaired successfully.
    HKLM\SOFTWARE\Microsoft\Security Center|UpdatesDisableNotify (PUM.Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> Quarantined and repaired successfully.
    Folders Detected: 0
    (No malicious items detected)
    Files Detected: 0
    (No malicious items detected)
    (end)

    GMER log
    GMER 1.0.15.15641 - http://www.gmer.net
    Rootkit quick scan 2012-06-18 17:06:20
    Windows 5.1.2600 Service Pack 3 Harddisk0\DR0 -> \Device\Ide\IdeDeviceP4T0L0-12 ST3320620AS rev.3.AAC
    Running: pu82zy4i.exe; Driver: C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\fgtdypow.sys

    ---- Devices - GMER 1.0.15 ----
    AttachedDevice \FileSystem\Fastfat \Fat fltMgr.sys (Microsoft Filesystem Filter Manager/Microsoft Corporation)
    Device \Driver\Tcpip \Device\Ip 87C7C6D0
    Device \Driver\Tcpip \Device\Ip 88840AF8
    Device \Driver\Tcpip \Device\Tcp 87C7C6D0
    Device \Driver\Tcpip \Device\Tcp 88840AF8
    Device \Driver\Tcpip \Device\Udp 87C7C6D0
    Device \Driver\Tcpip \Device\Udp 88840AF8
    Device \Driver\Tcpip \Device\RawIp 87C7C6D0
    Device \Driver\Tcpip \Device\RawIp 88840AF8
    ---- EOF - GMER 1.0.15 ----
    DDS log

    DDS (Ver_2011-08-26.01) - NTFSx86
    Internet Explorer: 8.0.6001.18702
    Run by Administrator at 17:06:35 on 2012-06-18
    Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.2047.1237 [GMT 8:00]
    .
    AV: Total Defense Anti-Virus Plus *Disabled/Updated* {6B98D35F-BB76-41C0-876B-A50645ED099A}
    FW: Total Defense Personal Firewall *Enabled*
    .
    ============== Running Processes ===============
    .
    C:\WINDOWS\system32\nvsvc32.exe
    C:\WINDOWS\system32\svchost -k DcomLaunch
    svchost.exe
    C:\WINDOWS\System32\svchost.exe -k netsvcs
    svchost.exe
    svchost.exe
    C:\WINDOWS\Explorer.EXE
    C:\WINDOWS\system32\spoolsv.exe
    svchost.exe
    C:\Program Files\CA\CA Internet Security Suite\CA Anti-Virus Plus\caamsvc.exe
    C:\Program Files\CA\CA Internet Security Suite\CA Anti-Virus Plus\isafe.exe
    C:\Program Files\CA\CA Internet Security Suite\ccschedulersvc.exe
    C:\Program Files\SuperFlexible\ExtremeVSS.exe
    C:\Program Files\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE
    C:\WINDOWS\system32\slserv.exe
    C:\WINDOWS\system32\svchost.exe -k imgsvc
    C:\Program Files\CA\SharedComponents\TMEngine\UmxEngine.exe
    C:\Program Files\CA\CA Internet Security Suite\ccevtmgr.exe
    C:\WINDOWS\system32\ctfmon.exe
    C:\WINDOWS\RTHDCPL.EXE
    C:\WINDOWS\system32\RUNDLL32.EXE
    C:\Program Files\CA\CA Internet Security Suite\casc.exe
    C:\Program Files\Messenger\msmsgs.exe
    C:\WINDOWS\System32\spool\DRIVERS\W32X86\3\CNAP2LAK.EXE
    C:\WINDOWS\System32\spool\DRIVERS\W32X86\3\CNAC9SWK.EXE
    C:\Program Files\CA\CA Internet Security Suite\ccprovsp.exe
    C:\Program Files\Malwarebytes' Anti-Malware\mbamservice.exe
    .
    ============== Pseudo HJT Report ===============
    .
    uStart Page = hxxp://www.iinet.net.au/
    uInternet Settings,ProxyServer = proxy.austin.local:8080
    BHO: Adobe PDF Link Helper: {18df081c-e8ad-4283-a596-fa578c2ebdc3} - c:\program files\common files\adobe\acrobat\activex\AcroIEHelperShim.dll
    BHO: Total Defense Anti-Phishing Toolbar Helper: {45011cf5-e4a9-4f13-9093-f30a784eb9b2} - c:\program files\ca\ca internet security suite\ca anti-phishing\toolbar\caIEToolbar.dll
    TB: Total Defense Anti-Phishing Toolbar: {0123b506-0ad9-43aa-b0cf-916c122ad4c5} - c:\program files\ca\ca internet security suite\ca anti-phishing\toolbar\caIEToolbar.dll
    uRun: [MSMSGS] "c:\program files\messenger\msmsgs.exe" /background
    uRun: [ctfmon.exe] c:\windows\system32\ctfmon.exe
    uRun: [CNAP2 Launcher] c:\windows\system32\spool\drivers\w32x86\3\CNAP2LAK.EXE
    mRun: [RTHDCPL] RTHDCPL.EXE
    mRun: [Alcmtr] ALCMTR.EXE
    mRun: [NvMediaCenter] RUNDLL32.EXE c:\windows\system32\NvMcTray.dll,NvTaskbarInit
    mRun: [NvCplDaemon] RUNDLL32.EXE c:\windows\system32\NvCpl.dll,NvStartup
    mRun: [nwiz] c:\program files\nvidia corporation\nview\nwiz.exe /installquiet
    mRun: [Adobe ARM] "c:\program files\common files\adobe\arm\1.0\AdobeARM.exe"
    mRun: [cctray] "c:\program files\ca\ca internet security suite\casc.exe"
    mRun: [Malwarebytes' Anti-Malware] "c:\program files\malwarebytes' anti-malware\mbamgui.exe" /starttray
    mRunOnce: [Malwarebytes Anti-Malware] c:\program files\malwarebytes' anti-malware\mbamgui.exe /install /silent
    IE: E&xport to Microsoft Excel - c:\progra~1\micros~2\office11\EXCEL.EXE/3000
    IE: {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe
    IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe
    IE: {92780B25-18CC-41C8-B9BE-3C9C571A8263} - {FF059E31-CC5A-4E2E-BF3B-96E929D65503} - c:\progra~1\micros~2\office11\REFIEBAR.DLL
    LSP: c:\windows\system32\VetRedir.dll
    AppInit_DLLs: UmxSbxExw.dll
    .
    ============= SERVICES / DRIVERS ===============
    .
    R0 KmxAMRT;KmxAMRT;c:\windows\system32\drivers\KmxAMRT.sys [2011-10-27 170064]
    R0 KmxStart;KmxStart;c:\windows\system32\drivers\KmxStart.sys [2011-9-6 123984]
    R1 KmxAgent;KmxAgent;c:\windows\system32\drivers\KmxAgent.sys [2011-10-26 83536]
    R1 KmxFile;KmxFile;c:\windows\system32\drivers\KmxFile.sys [2011-9-6 63056]
    R1 KmxFw;KmxFw;c:\windows\system32\drivers\KmxFw.sys [2011-7-28 116304]
    R2 CAAMSvc;CAAMSvc;c:\program files\ca\ca internet security suite\ca anti-virus plus\CAAMSvc.exe [2012-2-10 206152]
    R2 CAISafe;CAISafe;c:\program files\ca\ca internet security suite\ca anti-virus plus\isafe.exe [2012-2-10 222544]
    R2 ccSchedulerSVC;CA Common Scheduler Service;c:\program files\ca\ca internet security suite\ccschedulersvc.exe [2012-2-10 207920]
    R2 ExtremeVSSService;Extreme VSS Service;c:\program files\superflexible\ExtremeVSS.exe [2012-2-4 3196800]
    R2 KmxCF;KmxCF;c:\windows\system32\drivers\KmxCF.sys [2011-9-6 150608]
    R2 KmxSbx;KmxSbx;c:\windows\system32\drivers\KmxSbx.sys [2011-9-6 81488]
    R2 MBAMService;MBAMService;c:\program files\malwarebytes' anti-malware\mbamservice.exe [2012-6-18 654408]
    R2 UmxEngine;TM Engine;c:\program files\ca\sharedcomponents\tmengine\UmxEngine.exe [2011-4-4 662096]
    R3 KmxCfg;KmxCfg;c:\windows\system32\drivers\KmxCfg.sys [2011-9-6 331344]
    R3 MBAMProtector;MBAMProtector;c:\windows\system32\drivers\mbam.sys [2012-6-18 22344]
    S3 14214;14214;c:\windows\system32\drivers\14214 --> c:\windows\system32\drivers\14214 [?]
    S3 PCPitstop Scheduling;PCPitstop Scheduling;c:\program files\ca\PCPitstopScheduleService.exe [2012-2-5 90864]
    .
    =============== Created Last 30 ================
    .
    2012-06-18 08:38:14 -------- d-----w- c:\documents and settings\administrator\application data\Malwarebytes
    2012-06-18 08:38:07 -------- d-----w- c:\documents and settings\all users\application data\Malwarebytes
    2012-06-18 08:38:06 22344 ----a-w- c:\windows\system32\drivers\mbam.sys
    2012-06-18 08:38:06 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
    2012-06-13 09:43:33 521728 -c----w- c:\windows\system32\dllcache\jsdbgui.dll
    .
    ==================== Find3M ====================
    .
    2012-05-31 13:22:09 599040 ----a-w- c:\windows\system32\crypt32.dll
    2012-05-16 15:08:26 916992 ----a-w- c:\windows\system32\wininet.dll
    2012-05-15 13:20:33 1863168 ----a-w- c:\windows\system32\win32k.sys
    2012-05-11 14:42:33 43520 ------w- c:\windows\system32\licmgr10.dll
    2012-05-11 14:42:33 1469440 ------w- c:\windows\system32\inetcpl.cpl
    2012-05-11 11:38:02 385024 ------w- c:\windows\system32\html.iec
    2012-05-04 13:16:13 2148352 ----a-w- c:\windows\system32\ntoskrnl.exe
    2012-05-04 12:32:19 2026496 ----a-w- c:\windows\system32\ntkrnlpa.exe
    2012-05-02 13:46:36 139656 ----a-w- c:\windows\system32\drivers\rdpwd.sys
    .
    ============= FINISH: 17:07:49.42 ===============
    ATTACH LOG


    UNLESS SPECIFICALLY INSTRUCTED, DO NOT POST THIS LOG.
    IF REQUESTED, ZIP IT UP & ATTACH IT
    .
    DDS (Ver_2011-08-26.01)
    .
    Microsoft Windows XP Professional
    Boot Device: \Device\HarddiskVolume1
    Install Date: 02-Feb-12 1:42:23 PM
    System Uptime: 18-Jun-12 3:09:30 PM (2 hours ago)
    .
    Motherboard: MSI | | MS-7260
    Processor: AMD Athlon(tm) 64 X2 Dual Core Processor 3800+ | CPU 1 | 2010/200mhz
    .
    ==== Disk Partitions =========================
    .
    C: is FIXED (NTFS) - 298 GiB total, 222.894 GiB free.
    D: is Removable
    E: is Removable
    F: is Removable
    G: is Removable
    H: is Removable
    I: is CDROM ()
    .
    ==== Disabled Device Manager Items =============
    .
    Class GUID: {4D36E972-E325-11CE-BFC1-08002BE10318}
    Description: NVIDIA nForce Networking Controller
    Device ID: {1A3E09BE-1E45-494B-9174-D7385B45BBF5}\NVNET_DEV0373\4&E0244F4&0&00
    Manufacturer: NVIDIA
    Name: NVIDIA nForce Networking Controller
    PNP Device ID: {1A3E09BE-1E45-494B-9174-D7385B45BBF5}\NVNET_DEV0373\4&E0244F4&0&00
    Service: NVENETFD
    .
    ==== System Restore Points ===================
    .
    RP45: 21-Mar-12 12:59:44 PM - System Checkpoint
    RP46: 22-Mar-12 1:50:06 PM - System Checkpoint
    RP47: 23-Mar-12 2:00:07 PM - System Checkpoint
    RP48: 24-Mar-12 2:56:14 PM - System Checkpoint
    RP49: 25-Mar-12 4:32:07 PM - System Checkpoint
    RP50: 26-Mar-12 6:12:28 PM - System Checkpoint
    RP51: 27-Mar-12 6:51:20 PM - System Checkpoint
    RP52: 29-Mar-12 3:03:30 PM - System Checkpoint
    RP53: 30-Mar-12 5:15:31 PM - System Checkpoint
    RP54: 31-Mar-12 5:27:03 PM - System Checkpoint
    RP55: 02-Apr-12 6:46:24 AM - System Checkpoint
    RP56: 03-Apr-12 7:56:11 AM - System Checkpoint
    RP57: 04-Apr-12 8:49:52 AM - System Checkpoint
    RP58: 05-Apr-12 9:56:14 AM - System Checkpoint
    RP59: 06-Apr-12 10:02:26 AM - System Checkpoint
    RP60: 10-Apr-12 9:06:02 AM - System Checkpoint
    RP61: 10-Apr-12 5:49:30 PM - Installed Windows XP WgaNotify.
    RP62: 11-Apr-12 6:25:00 PM - System Checkpoint
    RP63: 12-Apr-12 6:34:44 PM - System Checkpoint
    RP64: 13-Apr-12 3:00:13 AM - Software Distribution Service 3.0
    RP65: 14-Apr-12 11:56:54 AM - System Checkpoint
    RP66: 15-Apr-12 12:54:37 PM - System Checkpoint
    RP67: 16-Apr-12 2:00:24 PM - System Checkpoint
    RP68: 17-Apr-12 2:44:22 PM - System Checkpoint
    RP69: 18-Apr-12 3:54:26 PM - System Checkpoint
    RP70: 19-Apr-12 4:59:00 PM - System Checkpoint
    RP71: 20-Apr-12 5:33:38 PM - System Checkpoint
    RP72: 21-Apr-12 6:20:21 PM - System Checkpoint
    RP73: 22-Apr-12 9:33:38 PM - System Checkpoint
    RP74: 24-Apr-12 7:05:40 AM - System Checkpoint
    RP75: 25-Apr-12 10:00:34 AM - System Checkpoint
    RP76: 26-Apr-12 10:30:17 AM - System Checkpoint
    RP77: 27-Apr-12 11:50:17 AM - System Checkpoint
    RP78: 30-Apr-12 11:00:23 AM - System Checkpoint
    RP79: 01-May-12 11:22:50 AM - System Checkpoint
    RP80: 02-May-12 12:49:12 PM - System Checkpoint
    RP81: 03-May-12 1:16:25 PM - System Checkpoint
    RP82: 04-May-12 1:31:30 PM - System Checkpoint
    RP83: 05-May-12 1:35:19 PM - System Checkpoint
    RP84: 06-May-12 2:13:52 PM - System Checkpoint
    RP85: 07-May-12 2:54:49 PM - System Checkpoint
    RP86: 08-May-12 3:41:52 PM - System Checkpoint
    RP87: 09-May-12 3:47:54 PM - System Checkpoint
    RP88: 10-May-12 4:31:42 PM - System Checkpoint
    RP89: 11-May-12 5:18:32 PM - System Checkpoint
    RP90: 12-May-12 12:43:44 PM - Software Distribution Service 3.0
    RP91: 14-May-12 5:19:26 PM - System Checkpoint
    RP92: 15-May-12 6:22:19 PM - System Checkpoint
    RP93: 17-May-12 7:30:26 AM - System Checkpoint
    RP94: 18-May-12 7:57:42 AM - System Checkpoint
    RP95: 21-May-12 4:00:02 PM - System Checkpoint
    RP96: 22-May-12 4:19:52 PM - System Checkpoint
    RP97: 23-May-12 5:21:23 PM - System Checkpoint
    RP98: 25-May-12 7:52:03 AM - System Checkpoint
    RP99: 28-May-12 10:30:01 AM - System Checkpoint
    RP100: 29-May-12 1:16:07 PM - System Checkpoint
    RP101: 30-May-12 1:59:51 PM - System Checkpoint
    RP102: 31-May-12 2:29:47 PM - System Checkpoint
    RP103: 01-Jun-12 4:07:56 PM - System Checkpoint
    RP104: 03-Jun-12 10:58:41 AM - System Checkpoint
    RP105: 04-Jun-12 11:04:46 AM - System Checkpoint
    RP106: 05-Jun-12 3:00:13 AM - Software Distribution Service 3.0
    RP107: 06-Jun-12 7:28:19 AM - System Checkpoint
    RP108: 07-Jun-12 1:36:00 PM - System Checkpoint
    RP109: 08-Jun-12 2:12:14 PM - System Checkpoint
    RP110: 11-Jun-12 12:30:07 PM - System Checkpoint
    RP111: 12-Jun-12 12:50:58 PM - System Checkpoint
    RP112: 13-Jun-12 1:07:04 PM - System Checkpoint
    RP113: 13-Jun-12 10:49:44 PM - Software Distribution Service 3.0
    RP114: 15-Jun-12 9:04:42 AM - System Checkpoint
    RP115: 16-Jun-12 9:58:42 AM - System Checkpoint
    RP116: 17-Jun-12 10:58:42 AM - System Checkpoint
    RP117: 18-Jun-12 12:10:42 PM - System Checkpoint
    .
    ==== Installed Programs ======================
    .
    .
    Adobe AIR
    Adobe Reader X (10.1.3)
    Anti-Phishing
    Anti-Virus Plus
    APH placeholder
    Backup and Migration
    CA Anti-Virus Plus
    CA PC Tune-Up 3.0.0.2
    Camera Support Core Library
    Camera Window
    Canon Camera Support Core Library
    Canon Camera Window for ZoomBrowser EX
    Canon LBP7200C
    Canon MovieEdit Task for ZoomBrowser EX
    Canon PhotoRecord
    Canon RAW Image Task for ZoomBrowser EX
    Canon RemoteCapture Task for ZoomBrowser EX
    Canon Utilities PhotoStitch 3.1
    Canon Utilities ZoomBrowser EX
    DNAMigrator
    Hotfix for Windows XP (KB2633952)
    Hotfix for Windows XP (KB952287)
    Malwarebytes Anti-Malware version 1.61.0.1400
    Microsoft Office Professional Edition 2003
    Microsoft Visual C++ 2005 Redistributable
    MovieEdit Task
    MSXML 4.0 SP2 (KB954430)
    MSXML 4.0 SP2 (KB973688)
    NVIDIA Control Panel 266.58
    NVIDIA Drivers
    NVIDIA Graphics Driver 266.58
    NVIDIA Install Application
    NVIDIA nView 135.50
    NVIDIA nView Desktop Manager
    Parental Controls
    Personal Firewall
    PhotoStitch
    Qurb
    RAW Image Task 1.1
    Realtek High Definition Audio Driver
    RemoteCapture Task 1.0.3
    Security Update for Microsoft Windows (KB2564958)
    Security Update for Windows Internet Explorer 8 (KB2510531)
    Security Update for Windows Internet Explorer 8 (KB2544521)
    Security Update for Windows Internet Explorer 8 (KB2618444)
    Security Update for Windows Internet Explorer 8 (KB2647516)
    Security Update for Windows Internet Explorer 8 (KB2675157)
    Security Update for Windows Internet Explorer 8 (KB2699988)
    Security Update for Windows Internet Explorer 8 (KB982381)
    Security Update for Windows Media Player (KB2378111)
    Security Update for Windows Media Player (KB952069)
    Security Update for Windows Media Player (KB954155)
    Security Update for Windows Media Player (KB973540)
    Security Update for Windows Media Player (KB975558)
    Security Update for Windows Media Player (KB978695)
    Security Update for Windows XP (KB2079403)
    Security Update for Windows XP (KB2115168)
    Security Update for Windows XP (KB2229593)
    Security Update for Windows XP (KB2296011)
    Security Update for Windows XP (KB2347290)
    Security Update for Windows XP (KB2360937)
    Security Update for Windows XP (KB2387149)
    Security Update for Windows XP (KB2393802)
    Security Update for Windows XP (KB2412687)
    Security Update for Windows XP (KB2419632)
    Security Update for Windows XP (KB2423089)
    Security Update for Windows XP (KB2440591)
    Security Update for Windows XP (KB2443105)
    Security Update for Windows XP (KB2476490)
    Security Update for Windows XP (KB2478960)
    Security Update for Windows XP (KB2478971)
    Security Update for Windows XP (KB2479943)
    Security Update for Windows XP (KB2481109)
    Security Update for Windows XP (KB2483185)
    Security Update for Windows XP (KB2485663)
    Security Update for Windows XP (KB2506212)
    Security Update for Windows XP (KB2507618)
    Security Update for Windows XP (KB2507938)
    Security Update for Windows XP (KB2508429)
    Security Update for Windows XP (KB2509553)
    Security Update for Windows XP (KB2510581)
    Security Update for Windows XP (KB2535512)
    Security Update for Windows XP (KB2536276-v2)
    Security Update for Windows XP (KB2544521)
    Security Update for Windows XP (KB2544893-v2)
    Security Update for Windows XP (KB2566454)
    Security Update for Windows XP (KB2570222)
    Security Update for Windows XP (KB2570947)
    Security Update for Windows XP (KB2584146)
    Security Update for Windows XP (KB2585542)
    Security Update for Windows XP (KB2592799)
    Security Update for Windows XP (KB2598479)
    Security Update for Windows XP (KB2603381)
    Security Update for Windows XP (KB2618444)
    Security Update for Windows XP (KB2618451)
    Security Update for Windows XP (KB2619339)
    Security Update for Windows XP (KB2620712)
    Security Update for Windows XP (KB2621440)
    Security Update for Windows XP (KB2624667)
    Security Update for Windows XP (KB2631813)
    Security Update for Windows XP (KB2633171)
    Security Update for Windows XP (KB2639417)
    Security Update for Windows XP (KB2641653)
    Security Update for Windows XP (KB2646524)
    Security Update for Windows XP (KB2647518)
    Security Update for Windows XP (KB2653956)
    Security Update for Windows XP (KB2659262)
    Security Update for Windows XP (KB2660465)
    Security Update for Windows XP (KB2661637)
    Security Update for Windows XP (KB2676562)
    Security Update for Windows XP (KB2685939)
    Security Update for Windows XP (KB2686509)
    Security Update for Windows XP (KB2695962)
    Security Update for Windows XP (KB2707511)
    Security Update for Windows XP (KB2709162)
    Security Update for Windows XP (KB923561)
    Security Update for Windows XP (KB923789)
    Security Update for Windows XP (KB946648)
    Security Update for Windows XP (KB950762)
    Security Update for Windows XP (KB950974)
    Security Update for Windows XP (KB951376-v2)
    Security Update for Windows XP (KB952004)
    Security Update for Windows XP (KB952954)
    Security Update for Windows XP (KB954459)
    Security Update for Windows XP (KB956572)
    Security Update for Windows XP (KB956744)
    Security Update for Windows XP (KB956802)
    Security Update for Windows XP (KB956844)
    Security Update for Windows XP (KB957097)
    Security Update for Windows XP (KB958644)
    Security Update for Windows XP (KB958687)
    Security Update for Windows XP (KB959426)
    Security Update for Windows XP (KB960803)
    Security Update for Windows XP (KB960859)
    Security Update for Windows XP (KB961501)
    Security Update for Windows XP (KB969059)
    Security Update for Windows XP (KB970430)
    Security Update for Windows XP (KB971657)
    Security Update for Windows XP (KB972270)
    Security Update for Windows XP (KB973507)
    Security Update for Windows XP (KB973869)
    Security Update for Windows XP (KB973904)
    Security Update for Windows XP (KB974112)
    Security Update for Windows XP (KB974318)
    Security Update for Windows XP (KB974392)
    Security Update for Windows XP (KB974571)
    Security Update for Windows XP (KB975025)
    Security Update for Windows XP (KB975467)
    Security Update for Windows XP (KB975560)
    Security Update for Windows XP (KB975713)
    Security Update for Windows XP (KB977816)
    Security Update for Windows XP (KB977914)
    Security Update for Windows XP (KB978338)
    Security Update for Windows XP (KB978542)
    Security Update for Windows XP (KB978601)
    Security Update for Windows XP (KB978706)
    Security Update for Windows XP (KB979309)
    Security Update for Windows XP (KB979482)
    Security Update for Windows XP (KB979687)
    Security Update for Windows XP (KB981322)
    Security Update for Windows XP (KB981997)
    Security Update for Windows XP (KB982132)
    Security Update for Windows XP (KB982665)
    Super Flexible File Synchronizer 5.64
    Total Defense Internet Security Suite
    Update for Windows Internet Explorer 8 (KB2598845)
    Update for Windows XP (KB2345886)
    Update for Windows XP (KB2467659)
    Update for Windows XP (KB2641690)
    Update for Windows XP (KB2718704)
    Update for Windows XP (KB898461)
    Update for Windows XP (KB951978)
    Update for Windows XP (KB955759)
    Update for Windows XP (KB968389)
    Update for Windows XP (KB971029)
    Update for Windows XP (KB973687)
    Update for Windows XP (KB973815)
    WebFldrs XP
    Windows Genuine Advantage Notifications (KB905474)
    Windows Internet Explorer 8
    .
    ==== Event Viewer Messages From Past Week ========
    .
    18-Jun-12 5:06:39 PM, error: Service Control Manager [7016] - The SmartLinkService service has reported an invalid current state 0.
    .
    ==== End Of File ===========================
     
  2. Broni

    Broni Malware Annihilator Posts: 52,898   +344

    Please, observe following rules:
    • Read all of my instructions very carefully. Your mistakes during cleaning process may have very serious consequences, like unbootable computer.
    • If you're stuck, or you're not sure about certain step, always ask before doing anything else.
    • Please refrain from running tools or applying updates other than those I suggest.
    • Never run more than one scan at a time.
    • Keep updating me regarding your computer behavior, good, or bad.
    • The cleaning process, once started, has to be completed. Even if your computer appears to act better, it may still be infected. Once the computer is totally clean, I'll certainly let you know.
    • If you leave the topic without explanation in the middle of a cleaning process, you may not be eligible to receive any more help in malware removal forum.
    • I close my topics if you have not replied in 5 days. If you need more time, simply let me know. If I closed your topic and you need it to be reopened, simply PM me.

    =====================================================

    Download Bootkit Remover to your desktop.

    • Unzip downloaded file to your Desktop.
    • Double-click on boot_cleaner.exe to run the program (Vista/7 users,right click on boot_cleaner.exe and click Run As Administrator).
    • It will show a Black screen with some data on it.
    • Right click on the screen and click Select All.
    • Press CTRL+C
    • Open a Notepad and press CTRL+V
    • Post the output back here.

    =====================================================

    Download aswMBR to your desktop.
    Double click the aswMBR.exe to run it.
    If you see this question: Would you like to download latest Avast! virus definitions?" say "Yes".
    Click the "Scan" button to start scan.
    On completion of the scan click "Save log", save it to your desktop and post in your next reply.

    NOTE. aswMBR will create MBR.dat file on your desktop. This is a copy of your MBR. Do NOT delete it.
     
  3. pot1234Dreadlox

    pot1234Dreadlox TS Enthusiast Topic Starter Posts: 106

    Hi Broni, logs below.
    This machine is running really slow....but the only stuff that Total Defense has reported is an old tracking cookie. I think it's probably okay but because its also on the network would like your opinion. :)

    bootclean log
    Bootkit Remover
    (c) 2009 Esage Lab
    www.esagelab.com
    Program version: 1.2.0.1
    OS Version: Microsoft Windows XP Professional Service Pack 3 (build 2600)
    System volume is \\.\C:
    \\.\C: -> \\.\PhysicalDrive0 at offset 0x00000000`00007e00
    Boot sector MD5 is: 6def5ffcbcdbdb4082f1015625e597bd
    Size Device Name MBR Status
    --------------------------------------------
    298 GB \\.\PhysicalDrive0 OK (DOS/Win32 Boot code found)

    Done;
    Press any key to quit...

    aswMBR log
    aswMBR version 0.9.9.1665 Copyright(c) 2011 AVAST Software
    Run date: 2012-06-19 00:15:22
    -----------------------------
    00:15:22.171 OS Version: Windows 5.1.2600 Service Pack 3
    00:15:22.171 Number of processors: 2 586 0x4B02
    00:15:22.171 ComputerName: SOUTH UserName:
    00:15:23.468 Initialize success
    00:20:23.390 AVAST engine defs: 12061801
    00:27:27.109 Disk 0 (boot) \Device\Harddisk0\DR0 -> \Device\Ide\IdeDeviceP4T0L0-12
    00:27:27.109 Disk 0 Vendor: ST3320620AS 3.AAC Size: 305245MB BusType: 3
    00:27:27.125 Disk 0 MBR read successfully
    00:27:27.125 Disk 0 MBR scan
    00:27:27.171 Disk 0 Windows XP default MBR code
    00:27:27.171 Disk 0 Partition 1 80 (A) 07 HPFS/NTFS NTFS 305234 MB offset 63
    00:27:27.203 Disk 0 scanning sectors +625121280
    00:27:27.296 Disk 0 scanning C:\WINDOWS\system32\drivers
    00:27:37.984 Service scanning
    00:27:54.953 Modules scanning
    00:27:58.984 Disk 0 trace - called modules:
    00:27:59.015 ntkrnlpa.exe CLASSPNP.SYS disk.sys ACPI.sys hal.dll atapi.sys pciide.sys PCIIDEX.SYS
    00:27:59.015 1 nt!IofCallDriver -> \Device\Harddisk0\DR0[0x89d4e030]
    00:27:59.015 3 CLASSPNP.SYS[b80e8fd7] -> nt!IofCallDriver -> \Device\0000006c[0x89ddd688]
    00:27:59.015 5 ACPI.sys[b7f7f620] -> nt!IofCallDriver -> \Device\Ide\IdeDeviceP4T0L0-12[0x89d6e030]
    00:27:59.671 AVAST engine scan C:\WINDOWS
    00:28:09.593 AVAST engine scan C:\WINDOWS\system32
    00:30:13.031 AVAST engine scan C:\WINDOWS\system32\drivers
    00:30:29.046 AVAST engine scan C:\Documents and Settings\Administrator
    00:46:53.468 AVAST engine scan C:\Documents and Settings\All Users
    00:47:23.906 Scan finished successfully
    00:55:44.421 Disk 0 MBR has been saved successfully to "C:\Documents and Settings\Administrator\Desktop\logs\MBR.dat"
    00:55:44.421 The log file has been saved successfully to "C:\Documents and Settings\Administrator\Desktop\logs\aswMBR.txt"
     
  4. Broni

    Broni Malware Annihilator Posts: 52,898   +344

    Please download ComboFix from Here, Here or Here to your Desktop.

    **Note: In the event you already have Combofix, this is a new version that I need you to download. It is important that it is saved directly to your desktop**
    • Never rename Combofix unless instructed.
    • Close any open browsers.
    • Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.
    • Very Important! Temporarily disable your anti-virus, script blocking and any anti-malware real-time protection before performing a scan. They can interfere with ComboFix or remove some of its embedded files which may cause "unpredictable results".
    • Click on this link to see a list of programs that should be disabled. The list is not all inclusive. If yours is not listed and you don't know how to disable it, please ask.
    • Close any open browsers.
    • WARNING: Combofix will disconnect your machine from the Internet as soon as it starts
    • Please do not attempt to re-connect your machine back to the Internet until Combofix has completely finished.
    • If there is no internet connection after running Combofix, then restart your computer to restore back your connection.
    • Double click on combofix.exe & follow the prompts.

    • NOTE1. If Combofix asks you to install Recovery Console, please allow it.
      NOTE 2. If Combofix asks you to update the program, always do so.
    • When finished, it will produce a report for you.
    • Please post the "C:\ComboFix.txt"
    **Note 1: Do not mouseclick combofix's window while it's running. That may cause it to stall
    **Note 2 for AVG and CA Internet Security (Total Defense Internet Security) users: ComboFix will not run until AVG/CA Internet Security is uninstalled as a protective measure against the anti-virus. This is because AVG/CA Internet Security "falsely" detects ComboFix (or its embedded files) as a threat and may remove them resulting in the tool not working correctly which in turn can cause "unpredictable results". Since AVG/CA Internet Security cannot be effectively disabled before running ComboFix, the author recommends you to uninstall AVG/CA Internet Security first.
    Use AppRemover to uninstall it: http://www.appremover.com/
    We can reinstall it when we're done with CF.
    **Note 3: If you receive an error "Illegal operation attempted on a registery key that has been marked for deletion", restart computer to fix the issue.
    **Note 4: Some infections may take some significant time to be cured. As long as your computer clock is running Combofix is still working. Be patient.


    Make sure, you re-enable your security programs, when you're done with Combofix.

    ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
    ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

    NOTE.
    If, for some reason, Combofix refuses to run, try one of the following:

    1. Run Combofix from Safe Mode.

    2. Delete Combofix file, download fresh one, but rename combofix.exe to your_name.exe BEFORE saving it to your desktop.
    Do NOT run it yet.
    Please download and run the below tool named Rkill (courtesy of BleepingComputer.com) which may help allow other programs to run.
    There are 4 different versions. If one of them won't run then download and try to run the other one.
    Vista and Win7 users need to right click Rkill and choose Run as Administrator
    You only need to get one of these to run, not all of them. You may get warnings from your antivirus about this tool, ignore them or shutdown your antivirus.

    * Rkill.com
    * Rkill.scr
    * Rkill.exe
    • Double-click on the Rkill icon to run the tool.
    • If using Vista or Windows 7 right-click on it and choose Run As Administrator.
    • A black DOS box will briefly flash and then disappear. This is normal and indicates the tool ran successfully.
    • If not, delete the file, then download and use the one provided in Link 2.
    • If it does not work, repeat the process and attempt to use one of the remaining links until the tool runs.
    • Do not reboot until instructed.
    • If the tool does not run from any of the links provided, please let me know.
    Once you've gotten one of them to run, immediately run your_name.exe by double clicking on it.

    If normal mode still doesn't work, run BOTH tools from safe mode.

    In case #2, please post BOTH logs, rKill and Combofix.

    DO NOT make any other changes to your computer (like installing programs, using other cleaning tools, etc.), until it's officially declared clean!!!
     
  5. pot1234Dreadlox

    pot1234Dreadlox TS Enthusiast Topic Starter Posts: 106

    :) okay, I will set machine to run the combo - its after 1am here, so will set them and log off and post the logs in the morning. thanks for your help.:)
     
  6. Broni

    Broni Malware Annihilator Posts: 52,898   +344

    No problem :)
     
  7. pot1234Dreadlox

    pot1234Dreadlox TS Enthusiast Topic Starter Posts: 106

    Broni, Hi. Combofix for this machine follows. CA just didn't want to uninstall.... I'll get your responses in the morning as I have to crash tonight..... thanks for your help....ifyou can give me some idea on how to reinstall CA that would be good (for some reason, it is CA not Total defense on this machine, maybe 'cos it is XP?) Thanks a million, DL:)

    Combofix log

    ComboFix 12-06-16.02 - Administrator 19-Jun-12 21:23:21.1.2 - x86
    Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.2047.1572 [GMT 8:00]
    Running from: c:\documents and settings\Administrator\Desktop\ComboFix.exe
    .
    .
    ((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
    .
    .
    c:\documents and settings\Administrator\My Documents\$AP14A.tmp
    c:\documents and settings\Administrator\My Documents\$AP2D8.tmp
    c:\documents and settings\Administrator\My Documents\$AP31C.tmp
    c:\documents and settings\All Users\Start Menu\Programs\Internet Explorer.lnk
    .
    .
    ((((((((((((((((((((((((( Files Created from 2012-05-19 to 2012-06-19 )))))))))))))))))))))))))))))))
    .
    .
    2012-06-18 17:21 . 2012-06-19 13:09 -------- d-----w- c:\windows\SxsCaPendDel
    2012-06-18 08:38 . 2012-06-18 08:38 -------- d-----w- c:\documents and settings\Administrator\Application Data\Malwarebytes
    2012-06-18 08:38 . 2012-06-18 08:38 -------- d-----w- c:\documents and settings\All Users\Application Data\Malwarebytes
    2012-06-13 09:43 . 2012-05-11 14:42 521728 -c----w- c:\windows\system32\dllcache\jsdbgui.dll
    .
    .
    .
    (((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
    .
    2012-05-31 13:22 . 2009-12-31 15:00 599040 ----a-w- c:\windows\system32\crypt32.dll
    2012-05-16 15:08 . 2009-12-31 15:00 916992 ----a-w- c:\windows\system32\wininet.dll
    2012-05-15 13:20 . 2009-12-31 15:00 1863168 ----a-w- c:\windows\system32\win32k.sys
    2012-05-11 14:42 . 2009-12-31 15:00 43520 ------w- c:\windows\system32\licmgr10.dll
    2012-05-11 14:42 . 2009-12-31 15:00 1469440 ------w- c:\windows\system32\inetcpl.cpl
    2012-05-11 11:38 . 2009-12-31 15:00 385024 ------w- c:\windows\system32\html.iec
    2012-05-04 13:16 . 2009-12-31 15:00 2148352 ----a-w- c:\windows\system32\ntoskrnl.exe
    2012-05-04 12:32 . 2008-04-14 00:01 2026496 ----a-w- c:\windows\system32\ntkrnlpa.exe
    2012-05-02 13:46 . 2012-02-02 05:36 139656 ----a-w- c:\windows\system32\drivers\rdpwd.sys
    .
    .
    ((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
    .
    .
    *Note* empty entries & legit default entries are not shown
    REGEDIT4
    .
    [HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
    "CNAP2 Launcher"="c:\windows\System32\spool\DRIVERS\W32X86\3\CNAP2LAK.EXE" [2008-09-05 406944]
    .
    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
    "RTHDCPL"="RTHDCPL.EXE" [2008-05-16 16862720]
    "NvMediaCenter"="c:\windows\system32\NvMcTray.dll" [2011-01-07 111208]
    "NvCplDaemon"="c:\windows\system32\NvCpl.dll" [2011-01-07 13880424]
    "nwiz"="c:\program files\NVIDIA Corporation\nView\nwiz.exe" [2010-11-03 1753192]
    "Adobe ARM"="c:\program files\Common Files\Adobe\ARM\1.0\AdobeARM.exe" [2012-01-03 843712]
    .
    [HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\ComputerAssociatesAntiMalware]
    "DisableMonitoring"=dword:00000001
    .
    [HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
    "%windir%\\Network Diagnostic\\xpnetdiag.exe"=
    "%windir%\\system32\\sessmgr.exe"=
    .
    R2 ExtremeVSSService;Extreme VSS Service;c:\program files\SuperFlexible\ExtremeVSS.exe [04-Feb-12 11:13 AM 3196800]
    S3 14214;14214;c:\windows\system32\DRIVERS\14214 --> c:\windows\system32\DRIVERS\14214 [?]
    .
    --- Other Services/Drivers In Memory ---
    .
    *NewlyCreated* - WS2IFSL
    .
    .
    ------- Supplementary Scan -------
    .
    uStart Page = hxxp://www.iinet.net.au/
    uInternet Settings,ProxyServer = proxy.austin.local:8080
    IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~2\OFFICE11\EXCEL.EXE/3000
    .
    - - - - ORPHANS REMOVED - - - -
    .
    Notify-PFW - (no file)
    .
    .
    .
    **************************************************************************
    .
    catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
    Rootkit scan 2012-06-19 21:28
    Windows 5.1.2600 Service Pack 3 NTFS
    .
    scanning hidden processes ...
    .
    scanning hidden autostart entries ...
    .
    scanning hidden files ...
    .
    scan completed successfully
    hidden files: 0
    .
    **************************************************************************
    .
    [HKEY_LOCAL_MACHINE\System\ControlSet001\Services\14214]
    "ImagePath"="System32\DRIVERS\14214"
    .
    --------------------- LOCKED REGISTRY KEYS ---------------------
    .
    [HKEY_USERS\S-1-5-21-2052111302-1580436667-1801674531-500\Software\Microsoft\Internet Explorer\User Preferences]
    @Denied: (2) (Administrator)
    "88D7D0879DAB32E14DE5B3A805A34F98AFF34F5977"=hex:01,00,00,00,d0,8c,9d,df,01,15,
    d1,11,8c,7a,00,c0,4f,c2,97,eb,01,00,00,00,17,a9,dd,1e,44,8a,00,49,a1,36,fa,\
    "2D53CFFC5C1A3DD2E97B7979AC2A92BD59BC839E81"=hex:01,00,00,00,d0,8c,9d,df,01,15,
    d1,11,8c,7a,00,c0,4f,c2,97,eb,01,00,00,00,17,a9,dd,1e,44,8a,00,49,a1,36,fa,\
    .
    Completion time: 2012-06-19 21:29:37
    ComboFix-quarantined-files.txt 2012-06-19 13:29
    .
    Pre-Run: 239,911,809,024 bytes free
    Post-Run: 240,612,577,280 bytes free
    .
    WindowsXP-KB310994-SP2-Pro-BootDisk-ENU.exe
    [boot loader]
    timeout=2
    default=multi(0)disk(0)rdisk(0)partition(1)\WINDOWS
    [operating systems]
    c:\cmdcons\BOOTSECT.DAT="Microsoft Windows Recovery Console" /cmdcons
    UnsupportedDebug="do not select this" /debug
    multi(0)disk(0)rdisk(0)partition(1)\WINDOWS="Microsoft Windows XP Professional" /noexecute=optin /fastdetect
    .
    - - End Of File - - 7D63C80E495FFBFB503B52BBE20218C8
     
  8. Broni

    Broni Malware Annihilator Posts: 52,898   +344

    1. Please open Notepad (Start>All Programs>Accessories>Notepad).

    2. Now copy/paste the entire content of the codebox below into the Notepad window:

    Code:
    File::
    c:\windows\system32\DRIVERS\14214
    
    Folder::
    c:\windows\system32\DRIVERS\14214
    
    Driver::
    14214
    
    Registry::
    [-HKEY_LOCAL_MACHINE\System\ControlSet001\Services\14214]
    
    ClearJavaCache::
    

    3. Save the above as CFScript.txt

    4. Close/disable all anti virus and anti malware programs again, so they do not interfere with the running of ComboFix.

    5. Then drag the CFScript.txt into ComboFix.exe as depicted in the animation below. This will start ComboFix again.

    [​IMG]


    6. After reboot, (in case it asks to reboot), please post the following reports/logs into your next reply:
    • Combofix.txt
     
  9. pot1234Dreadlox

    pot1234Dreadlox TS Enthusiast Topic Starter Posts: 106

    :) just starting all posts now...
     
  10. pot1234Dreadlox

    pot1234Dreadlox TS Enthusiast Topic Starter Posts: 106

    Log at last! :)

    Combo log

    ComboFix 12-06-16.02 - Administrator 20-Jun-12 13:05:09.2.2 - x86
    Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.2047.1562 [GMT 8:00]
    Running from: c:\documents and settings\Administrator\Desktop\ComboFix.exe
    Command switches used :: c:\documents and settings\Administrator\Desktop\broni-south\cfscript.txt
    .
    FILE ::
    "c:\windows\system32\DRIVERS\14214"
    .
    .
    ((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
    .
    .
    .
    ((((((((((((((((((((((((((((((((((((((( Drivers/Services )))))))))))))))))))))))))))))))))))))))))))))))))
    .
    .
    -------\Legacy_14214
    -------\Service_14214
    .
    .
    ((((((((((((((((((((((((( Files Created from 2012-05-20 to 2012-06-20 )))))))))))))))))))))))))))))))
    .
    .
    2012-06-18 17:21 . 2012-06-19 13:09 -------- d-----w- c:\windows\SxsCaPendDel
    2012-06-18 08:38 . 2012-06-18 08:38 -------- d-----w- c:\documents and settings\Administrator\Application Data\Malwarebytes
    2012-06-18 08:38 . 2012-06-18 08:38 -------- d-----w- c:\documents and settings\All Users\Application Data\Malwarebytes
    2012-06-13 09:43 . 2012-05-11 14:42 521728 -c----w- c:\windows\system32\dllcache\jsdbgui.dll
    .
    .
    .
    (((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
    .
    2012-05-31 13:22 . 2009-12-31 15:00 599040 ----a-w- c:\windows\system32\crypt32.dll
    2012-05-16 15:08 . 2009-12-31 15:00 916992 ----a-w- c:\windows\system32\wininet.dll
    2012-05-15 13:20 . 2009-12-31 15:00 1863168 ----a-w- c:\windows\system32\win32k.sys
    2012-05-11 14:42 . 2009-12-31 15:00 43520 ------w- c:\windows\system32\licmgr10.dll
    2012-05-11 14:42 . 2009-12-31 15:00 1469440 ------w- c:\windows\system32\inetcpl.cpl
    2012-05-11 11:38 . 2009-12-31 15:00 385024 ------w- c:\windows\system32\html.iec
    2012-05-04 13:16 . 2009-12-31 15:00 2148352 ----a-w- c:\windows\system32\ntoskrnl.exe
    2012-05-04 12:32 . 2008-04-14 00:01 2026496 ----a-w- c:\windows\system32\ntkrnlpa.exe
    2012-05-02 13:46 . 2012-02-02 05:36 139656 ----a-w- c:\windows\system32\drivers\rdpwd.sys
    .
    .
    ((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
    .
    .
    *Note* empty entries & legit default entries are not shown
    REGEDIT4
    .
    [HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
    "CNAP2 Launcher"="c:\windows\System32\spool\DRIVERS\W32X86\3\CNAP2LAK.EXE" [2008-09-05 406944]
    .
    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
    "RTHDCPL"="RTHDCPL.EXE" [2008-05-16 16862720]
    "NvMediaCenter"="c:\windows\system32\NvMcTray.dll" [2011-01-07 111208]
    "NvCplDaemon"="c:\windows\system32\NvCpl.dll" [2011-01-07 13880424]
    "nwiz"="c:\program files\NVIDIA Corporation\nView\nwiz.exe" [2010-11-03 1753192]
    "Adobe ARM"="c:\program files\Common Files\Adobe\ARM\1.0\AdobeARM.exe" [2012-01-03 843712]
    .
    [HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\ComputerAssociatesAntiMalware]
    "DisableMonitoring"=dword:00000001
    .
    [HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]
    "EnableFirewall"= 0 (0x0)
    .
    [HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
    "%windir%\\Network Diagnostic\\xpnetdiag.exe"=
    "%windir%\\system32\\sessmgr.exe"=
    .
    R2 ExtremeVSSService;Extreme VSS Service;c:\program files\SuperFlexible\ExtremeVSS.exe [04-Feb-12 11:13 AM 3196800]
    .
    .
    ------- Supplementary Scan -------
    .
    uStart Page = hxxp://www.iinet.net.au/
    uInternet Settings,ProxyServer = proxy.austin.local:8080
    IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~2\OFFICE11\EXCEL.EXE/3000
    .
    .
    **************************************************************************
    .
    catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
    Rootkit scan 2012-06-20 13:10
    Windows 5.1.2600 Service Pack 3 NTFS
    .
    scanning hidden processes ...
    .
    scanning hidden autostart entries ...
    .
    scanning hidden files ...
    .
    scan completed successfully
    hidden files: 0
    .
    **************************************************************************
    .
    --------------------- LOCKED REGISTRY KEYS ---------------------
    .
    [HKEY_USERS\S-1-5-21-2052111302-1580436667-1801674531-500\Software\Microsoft\Internet Explorer\User Preferences]
    @Denied: (2) (Administrator)
    "88D7D0879DAB32E14DE5B3A805A34F98AFF34F5977"=hex:01,00,00,00,d0,8c,9d,df,01,15,
    d1,11,8c,7a,00,c0,4f,c2,97,eb,01,00,00,00,17,a9,dd,1e,44,8a,00,49,a1,36,fa,\
    "2D53CFFC5C1A3DD2E97B7979AC2A92BD59BC839E81"=hex:01,00,00,00,d0,8c,9d,df,01,15,
    d1,11,8c,7a,00,c0,4f,c2,97,eb,01,00,00,00,17,a9,dd,1e,44,8a,00,49,a1,36,fa,\
    .
    --------------------- DLLs Loaded Under Running Processes ---------------------
    .
    - - - - - - - > 'explorer.exe'(2248)
    c:\windows\system32\WININET.dll
    c:\windows\system32\ieframe.dll
    c:\windows\system32\webcheck.dll
    .
    ------------------------ Other Running Processes ------------------------
    .
    c:\windows\system32\nvsvc32.exe
    c:\program files\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE
    c:\windows\system32\wscntfy.exe
    c:\windows\RTHDCPL.EXE
    c:\windows\system32\RUNDLL32.EXE
    c:\windows\System32\spool\DRIVERS\W32X86\3\CNAC9SWK.EXE
    .
    **************************************************************************
    .
    Completion time: 2012-06-20 13:12:32 - machine was rebooted
    ComboFix-quarantined-files.txt 2012-06-20 05:12
    ComboFix2.txt 2012-06-19 13:29
    .
    Pre-Run: 240,598,274,048 bytes free
    Post-Run: 240,540,897,280 bytes free
    .
    - - End Of File - - 7543C776D5D5350915F0931148AEDA22
     
  11. Broni

    Broni Malware Annihilator Posts: 52,898   +344

    I don't really see much there.

    You can reinstall CA now.

    Download OTL to your Desktop.

    • Double click on the icon to run it. Make sure all other windows are closed and to let it run uninterrupted.
    • Click the Scan All Users checkbox.
    • Under the Custom Scan box paste this in:


    netsvcs
    drivers32
    %SYSTEMDRIVE%\*.*
    %systemroot%\Fonts\*.com
    %systemroot%\Fonts\*.dll
    %systemroot%\Fonts\*.ini
    %systemroot%\Fonts\*.ini2
    %systemroot%\Fonts\*.exe
    %systemroot%\system32\spool\prtprocs\w32x86\*.*
    %systemroot%\REPAIR\*.bak1
    %systemroot%\REPAIR\*.ini
    %systemroot%\system32\*.jpg
    %systemroot%\*.jpg
    %systemroot%\*.png
    %systemroot%\*.scr
    %systemroot%\*._sy
    %APPDATA%\Adobe\Update\*.*
    %ALLUSERSPROFILE%\Favorites\*.*
    %APPDATA%\Microsoft\*.*
    %PROGRAMFILES%\*.*
    %APPDATA%\Update\*.*
    %systemroot%\*. /mp /s
    CREATERESTOREPOINT
    %systemroot%\System32\config\*.sav
    %PROGRAMFILES%\bak. /s
    %systemroot%\system32\bak. /s
    %ALLUSERSPROFILE%\Start Menu\*.lnk /x
    %systemroot%\system32\config\systemprofile\*.dat /x
    %systemroot%\*.config
    %systemroot%\system32\*.db
    %APPDATA%\Microsoft\Internet Explorer\Quick Launch\*.lnk /x
    %USERPROFILE%\Desktop\*.exe
    %PROGRAMFILES%\Common Files\*.*
    %systemroot%\*.src
    %systemroot%\install\*.*
    %systemroot%\system32\DLL\*.*
    %systemroot%\system32\HelpFiles\*.*
    %systemroot%\tasks\*.*
    %systemroot%\system32\rundll\*.*
    %systemroot%\winn32\*.*
    %systemroot%\Java\*.*
    %systemroot%\system32\test\*.*
    %systemroot%\system32\Rundll32\*.*
    %systemroot%\AppPatch\Custom\*.*
    %APPDATA%\Roaming\Microsoft\Windows\Recent\*.lnk /x
    %PROGRAMFILES%\PC-Doctor\Downloads\*.*
    %PROGRAMFILES%\Internet Explorer\*.tmp
    %PROGRAMFILES%\Internet Explorer\*.dat
    %USERPROFILE%\My Documents\*.exe
    %USERPROFILE%\*.exe
    %systemroot%\ADDINS\*.*
    %systemroot%\assembly\*.bak2
    %systemroot%\Config\*.*
    %systemroot%\REPAIR\*.bak2
    %systemroot%\SECURITY\Database\*.sdb /x
    %systemroot%\SYSTEM\*.bak2
    %systemroot%\Web\*.bak2
    %systemroot%\Driver Cache\*.*
    %PROGRAMFILES%\Mozilla Firefox\0*.exe
    %ProgramFiles%\Microsoft Common\*.*
    %ProgramFiles%\TinyProxy.
    %USERPROFILE%\Favorites\*.url /x
    %systemroot%\system32\*.bk
    %systemroot%\*.te
    %systemroot%\system32\system32\*.*
    %ALLUSERSPROFILE%\*.dat /x
    %systemroot%\system32\drivers\*.rmv
    dir /b "%systemroot%\system32\*.exe" | find /I " " /c
    dir /b "%systemroot%\*.exe" | find /I " " /c
    %PROGRAMFILES%\Microsoft\*.*
    %systemroot%\System32\Wbem\proquota.exe
    %PROGRAMFILES%\Mozilla Firefox\*.dat
    %USERPROFILE%\Cookies\*.txt /x
    %SystemRoot%\system32\fonts\*.*
    %systemroot%\system32\winlog\*.*
    %systemroot%\system32\Language\*.*
    %systemroot%\system32\Settings\*.*
    %systemroot%\system32\*.quo
    %SYSTEMROOT%\AppPatch\*.exe
    %SYSTEMROOT%\inf\*.exe
    %SYSTEMROOT%\Installer\*.exe
    %systemroot%\system32\config\*.bak2
    %systemroot%\system32\Computers\*.*
    %SystemRoot%\system32\Sound\*.*
    %SystemRoot%\system32\SpecialImg\*.*
    %SystemRoot%\system32\code\*.*
    %SystemRoot%\system32\draft\*.*
    %SystemRoot%\system32\MSSSys\*.*
    %ProgramFiles%\Javascript\*.*
    %systemroot%\pchealth\helpctr\System\*.exe /s
    %systemroot%\Web\*.exe
    %systemroot%\system32\msn\*.*
    %systemroot%\system32\*.tro
    %AppData%\Microsoft\Installer\msupdates\*.*
    %ProgramFiles%\Messenger\*.*
    %systemroot%\system32\systhem32\*.*
    %systemroot%\system\*.exe
    HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate\Auto Update\Results\Install\LastSuccessTime /rs
    /md5start
    /md5stop


    • Click the Quick Scan button. Do not change any settings unless otherwise told to do so. The scan wont take long.
    • When the scan completes, it will open two notepad windows: OTL.txt and Extras.txt. These are saved in the same location as OTL.
    • Please copy (Edit->Select All, Edit->Copy) the contents of these files, one at a time, and post them back here.
     
  12. pot1234Dreadlox

    pot1234Dreadlox TS Enthusiast Topic Starter Posts: 106

    Broni, Thanks. Can't create an OTL log .... it hangs (not responding) at
    KHEY_LOCAL_Machine\system\currentcontrolset\contol\session manager\DOS drivers\Aux....

    I can't see the rest of the line.

    AAaagghhhh! :confused:
     
  13. Broni

    Broni Malware Annihilator Posts: 52,898   +344

    1. Download Security Check from HERE, and save it to your Desktop.
    • Double-click SecurityCheck.exe
    • Follow the onscreen instructions inside of the black box.
    • A Notepad document should open automatically called checkup.txt; please post the contents of that document.

      NOTE SecurityCheck may produce some false warning(s), so leave the results reading to me.

    2. Please download Farbar Service Scanner (FSS) and run it on the computer with the issue.
    • Make sure the following options are checked:
      • Internet Services
      • Windows Firewall
      • System Restore
      • Security Center
      • Windows Update
      • Windows Defender
    • Press "Scan".
    • It will create a log (FSS.txt) in the same directory the tool is run.
    • Please copy and paste the log to your reply.


    3. Download Temp File Cleaner (TFC)
    • Double click on TFC.exe to run the program.
    • Click on Start button to begin cleaning process.
    • TFC will close all running programs, and it may ask you to restart computer.


    4. Please run a free online scan with the ESET Online Scanner

    • Disable your antivirus program
    • Tick the box next to YES, I accept the Terms of Use
    • Click Start
    • Accept any security warnings from your browser.
    • Check Scan archives
    • Click Start
    • ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this can take some time.
    • When the scan completes, click on List of found threats
    • Click on Export to text file , and save the file to your desktop using a unique name, such as ESETScan. Include the contents of this report in your next reply.
    • NOTE. If Eset won't find any threats, it won't produce any log.
     
  14. pot1234Dreadlox

    pot1234Dreadlox TS Enthusiast Topic Starter Posts: 106

    :) okay off to do this now.... I am not sure if the infected machine will connect to the internet for the eset scan.... guess we will find out soon
    nice to be online at the same time. thanks! DL
     
  15. pot1234Dreadlox

    pot1234Dreadlox TS Enthusiast Topic Starter Posts: 106

    Hi, FSS logs and Checkup logs to follow; temp cleaner is running at the moment

    FSS log

    Farbar Service Scanner Version: 23-06-2012
    Ran by Administrator (administrator) on 24-06-2012 at 14:09:37
    Running from "C:\Documents and Settings\Administrator\Desktop\broni-south-aeb"
    Microsoft Windows XP Professional Service Pack 3 (X86)
    Boot Mode: Normal
    ****************************************************************
    Internet Services:
    ============
    Connection Status:
    ==============
    Localhost is accessible.
    LAN connected.
    Google IP is accessible.
    Google.com is accessible.
    Yahoo IP is accessible.
    Yahoo.com is accessible.

    Windows Firewall:
    =============
    Firewall Disabled Policy:
    ==================
    [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile]
    "EnableFirewall"=DWORD:0

    System Restore:
    ============
    System Restore Disabled Policy:
    ========================

    Security Center:
    ============
    Windows Update:
    ============
    Windows Autoupdate Disabled Policy:
    ============================

    File Check:
    ========
    C:\WINDOWS\system32\dhcpcsvc.dll => MD5 is legit
    C:\WINDOWS\system32\Drivers\afd.sys => MD5 is legit
    C:\WINDOWS\system32\Drivers\netbt.sys => MD5 is legit
    C:\WINDOWS\system32\Drivers\tcpip.sys => MD5 is legit
    C:\WINDOWS\system32\Drivers\ipsec.sys => MD5 is legit
    C:\WINDOWS\system32\dnsrslvr.dll => MD5 is legit
    C:\WINDOWS\system32\ipnathlp.dll => MD5 is legit
    C:\WINDOWS\system32\netman.dll => MD5 is legit
    C:\WINDOWS\system32\wbem\WMIsvc.dll => MD5 is legit
    C:\WINDOWS\system32\srsvc.dll => MD5 is legit
    C:\WINDOWS\system32\Drivers\sr.sys => MD5 is legit
    C:\WINDOWS\system32\wscsvc.dll => MD5 is legit
    C:\WINDOWS\system32\wbem\WMIsvc.dll => MD5 is legit
    C:\WINDOWS\system32\wuauserv.dll => MD5 is legit
    C:\WINDOWS\system32\qmgr.dll => MD5 is legit
    C:\WINDOWS\system32\es.dll => MD5 is legit
    C:\WINDOWS\system32\cryptsvc.dll => MD5 is legit
    C:\WINDOWS\system32\svchost.exe => MD5 is legit
    C:\WINDOWS\system32\rpcss.dll => MD5 is legit
    C:\WINDOWS\system32\services.exe => MD5 is legit

    **** End of log ****

    Security checkup log

    Results of screen317's Security Check version 0.99.24
    Windows XP Service Pack 3 x86
    Internet Explorer 8
    ``````````````````````````````
    Antivirus/Firewall Check:

    Windows Firewall Disabled!
    CA Anti-Virus Plus
    Antivirus up to date!
    ```````````````````````````````
    Anti-malware/Other Utilities Check:

    Adobe Reader X (10.1.3)
    ````````````````````````````````
    Process Check:
    objlist.exe by Laurent

    Malwarebytes' Anti-Malware mbamservice.exe
    Malwarebytes' Anti-Malware mbamgui.exe
    CA CA Internet Security Suite CA Anti-Virus Plus caamsvc.exe
    CA CA Internet Security Suite CA Anti-Virus Plus isafe.exe
    ``````````End of Log````````````
     
  16. pot1234Dreadlox

    pot1234Dreadlox TS Enthusiast Topic Starter Posts: 106

    Hi Broni, the temp cleaner didn't run but I have started the online scanner....so far 1 found but it very slow and only 8% completed..... here's hoping..... DL
     
  17. pot1234Dreadlox

    pot1234Dreadlox TS Enthusiast Topic Starter Posts: 106

    Broni,
    The scan has finished.... 2 files found.....

    ESET scan report

    C:\#backup\Documents and Settings\All Users\Documents\FMdownloads\PDFCreator-Setup.exe Win32/Somoto application deleted - quarantined
    C:\System Volume Information\_restore{8238F2E0-A1D4-4FE1-87AB-4D5D9E6EDEB5}\RP123\A0013163.exe Win32/Somoto application deleted - quarantined
     
  18. Broni

    Broni Malware Annihilator Posts: 52,898   +344

    Your computer is clean [​IMG]

    1. We need to reset system restore to prevent your computer from being accidentally reinfected by using some old restore point(s). We'll create fresh, clean restore point, using following OTL script:

    Run OTL

    • Under the Custom Scans/Fixes box at the bottom, paste in the following:

    Code:
    :OTL
    :Commands
    [purity]
    [emptytemp]
    [EMPTYFLASH]
    [emptyjava]
    [CLEARALLRESTOREPOINTS]
    [Reboot]
    • Then click the Run Fix button at the top
    • Let the program run unhindered, reboot the PC when it is done
    • Post resulting log.

    2. Now, we'll remove all tools, we used during our cleaning process

    Clean up with OTL:

    • Double-click OTL.exe to start the program.
    • Close all other programs apart from OTL as this step will require a reboot
    • On the OTL main screen, press the CLEANUP button
    • Say Yes to the prompt and then allow the program to reboot your computer.

    If you still have any tools or logs leftover on your computer you can go ahead and delete those off of your computer now.

    3. Make sure, Windows Updates are current.

    4. If any Trojan was listed among your infection(s), make sure, you change all of your on-line important passwords (bank account(s), secured web sites, etc.) immediately!

    5. Download, and install WOT (Web OF Trust): http://www.mywot.com/. It'll warn you (in most cases) about dangerous web sites.

    6. Run Malwarebytes "Quick scan" once in a while to assure safety of your computer.

    7. Run Temporary File Cleaner (TFC) weekly.

    8. Download and install Secunia Personal Software Inspector (PSI): http://secunia.com/vulnerability_scanning/personal/. The Secunia PSI is a FREE security tool designed to detect vulnerable and out-dated programs and plug-ins which expose your PC to attacks. Run it weekly.

    9. (optional) If you want to keep all your programs up to date, download and install FileHippo Update Checker.
    The Update Checker will scan your computer for installed software, check the versions and then send this information to FileHippo.com to see if there are any newer releases.

    10. (Windows XP only) Run defrag at your convenience.

    11. When installing\updating ANY program, make sure you always select "Custom " installation, so you can UN-check any possible "drive-by-install" (foistware), like toolbars etc., which may try to install along with the legitimate program. Do NOT click "Next" button without looking at any given page.

    12. Read How did I get infected?, With steps so it does not happen again!: http://www.bleepingcomputer.com/forums/topic2520.html

    13. Please, let me know, how your computer is doing.
     
  19. pot1234Dreadlox

    pot1234Dreadlox TS Enthusiast Topic Starter Posts: 106

    :)Yay, off to do this now.... OTL log attached....

    OTL log

    All processes killed
    Error: Unable to interpret <Code:> in the current context!
    ========== OTL ==========
    ========== COMMANDS ==========
    Error: Unable to interpret <[Code:> in the current context!
    ========== OTL ==========
    ========== COMMANDS ==========

    [EMPTYTEMP]

    User: Administrator
    ->Temp folder emptied: 1245244 bytes
    ->Temporary Internet Files folder emptied: 6975480 bytes
    ->FireFox cache emptied: 20721481 bytes
    ->Flash cache emptied: 1175 bytes

    User: All Users

    User: Default User
    ->Temp folder emptied: 0 bytes
    ->Temporary Internet Files folder emptied: 33170 bytes
    ->Flash cache emptied: 56475 bytes

    User: LocalService
    ->Temp folder emptied: 0 bytes
    ->Temporary Internet Files folder emptied: 32902 bytes

    User: NetworkService
    ->Temp folder emptied: 0 bytes
    ->Temporary Internet Files folder emptied: 33170 bytes

    %systemdrive% .tmp files removed: 0 bytes
    %systemroot% .tmp files removed: 2402044 bytes
    %systemroot%\System32 .tmp files removed: 2577 bytes
    %systemroot%\System32\dllcache .tmp files removed: 0 bytes
    %systemroot%\System32\drivers .tmp files removed: 0 bytes
    Windows Temp folder emptied: 195283 bytes
    %systemroot%\system32\config\systemprofile\Local Settings\Temp folder emptied: 0 bytes
    %systemroot%\system32\config\systemprofile\Local Settings\Temporary Internet Files folder emptied: 0 bytes
    RecycleBin emptied: 69562528 bytes

    Total Files Cleaned = 97.00 mb


    [EMPTYFLASH]

    User: Administrator
    ->Flash cache emptied: 0 bytes

    User: All Users

    User: Default User
    ->Flash cache emptied: 0 bytes

    User: LocalService

    User: NetworkService

    Total Flash Files Cleaned = 0.00 mb


    [EMPTYJAVA]

    User: Administrator

    User: All Users

    User: Default User

    User: LocalService

    User: NetworkService

    Total Java Files Cleaned = 0.00 mb

    Unable to start System Restore Service. Error code 10
    Error: Unable to interpret <purity]> in the current context!

    [EMPTYTEMP]

    User: Administrator
    ->Temp folder emptied: 0 bytes
    ->Temporary Internet Files folder emptied: 0 bytes
    ->FireFox cache emptied: 0 bytes
    ->Flash cache emptied: 0 bytes

    User: All Users

    User: Default User
    ->Temp folder emptied: 0 bytes
    ->Temporary Internet Files folder emptied: 0 bytes
    ->Flash cache emptied: 0 bytes

    User: LocalService
    ->Temp folder emptied: 0 bytes
    ->Temporary Internet Files folder emptied: 0 bytes

    User: NetworkService
    ->Temp folder emptied: 0 bytes
    ->Temporary Internet Files folder emptied: 0 bytes

    %systemdrive% .tmp files removed: 0 bytes
    %systemroot% .tmp files removed: 0 bytes
    %systemroot%\System32 .tmp files removed: 0 bytes
    %systemroot%\System32\dllcache .tmp files removed: 0 bytes
    %systemroot%\System32\drivers .tmp files removed: 0 bytes
    Windows Temp folder emptied: 0 bytes
    %systemroot%\system32\config\systemprofile\Local Settings\Temp folder emptied: 0 bytes
    %systemroot%\system32\config\systemprofile\Local Settings\Temporary Internet Files folder emptied: 0 bytes
    RecycleBin emptied: 0 bytes

    Total Files Cleaned = 0.00 mb


    [EMPTYFLASH]

    User: Administrator
    ->Flash cache emptied: 0 bytes

    User: All Users

    User: Default User
    ->Flash cache emptied: 0 bytes

    User: LocalService

    User: NetworkService

    Total Flash Files Cleaned = 0.00 mb


    [EMPTYJAVA]

    User: Administrator

    User: All Users

    User: Default User

    User: LocalService

    User: NetworkService

    Total Java Files Cleaned = 0.00 mb

    Unable to stop System Restore Service. Error code 1717. Restore points not cleared.
    Unable to start System Restore Service. Error code 10. Restore point not created.

    OTL by OldTimer - Version 3.2.50.0 log created on 06252012_111836
    Files\Folders moved on Reboot...
    Registry entries deleted on Reboot...


    The machine is now downloading files via Hippo.... do I turn the system restore back on....?
     
  20. Broni

    Broni Malware Annihilator Posts: 52,898   +344

    There was some problem with resetting restore points by OTL.
    You have to do it manually.
    Turn system restore off.
    Restart computer.
    Turn system restore on.
     
  21. pot1234Dreadlox

    pot1234Dreadlox TS Enthusiast Topic Starter Posts: 106

    Okay, I'll go and do this.
     
  22. pot1234Dreadlox

    pot1234Dreadlox TS Enthusiast Topic Starter Posts: 106

    Temp File Cleaner is causing the system to hang.... over 40 minutes. Is it okay to run %temp% to clean up the temp files instead? Thanks DL
     
  23. Broni

    Broni Malware Annihilator Posts: 52,898   +344

    Run it from safe mode
     
  24. pot1234Dreadlox

    pot1234Dreadlox TS Enthusiast Topic Starter Posts: 106

    okay, thanks......
     
  25. Broni

    Broni Malware Annihilator Posts: 52,898   +344

    Go on...
     
Topic Status:
Not open for further replies.

Similar Topics

Add New Comment

You need to be a member to leave a comment. Join thousands of tech enthusiasts and participate.
TechSpot Account You may also...