TechSpot

Infected and I have tried to fix it for 12 hours.....

By lovelymsva
Nov 12, 2011
  1. Ok so the short version is windows XP tried doing reg virus scan with bulldog ( do not judge me :p ) and then went to malwarebytes, yes in safe mode. It let me download it and then i just kept running the scan becuase it was finding stuff but all that it looks like is on my computer is my computer, my documents, and recycle bin on the desktop. Nothing else can be seen or atleast from my novis perspective from anywhere but the files that run by when its booting up in safemode but i can see they are behind/ partition oooooor when i can get to the control panel in safe mode and see what to uninstall........my stuff is in there.

    Soooo after like the i dont even know how manyth time it ran the scan and i shoulda dang knew it was going to mess up becuase it wouldnt take the update on malwarebytes first.......but whatever..and then if found something, i restarted it and malwarebytes is gone and i cant redownload it as it says access denied.

    please send help
     
  2. Broni

    Broni Malware Annihilator Posts: 52,895   +344

    Welcome aboard [​IMG]

    Please, complete all steps listed here: http://www.techspot.com/vb/topic58138.html
    Make sure, you PASTE all logs. If some log exceeds 50,000 characters post limit, split it between couple of replies.
    Attached logs won't be reviewed.
    Complete as many steps as you can.

    Please, observe following rules:
    • Read all of my instructions very carefully. Your mistakes during cleaning process may have very serious consequences, like unbootable computer.
    • If you're stuck, or you're not sure about certain step, always ask before doing anything else.
    • Please refrain from running tools or applying updates other than those I suggest.
    • Never run more than one scan at a time.
    • Keep updating me regarding your computer behavior, good, or bad.
    • The cleaning process, once started, has to be completed. Even if your computer appears to act better, it may still be infected. Once the computer is totally clean, I'll certainly let you know.
    • If you leave the topic without explanation in the middle of a cleaning process, you may not be eligible to receive any more help in malware removal forum.
    • I close my topics if you have not replied in 5 days. If you need more time, simply let me know. If I closed your topic and you need it to be reopened, simply PM me.
     
  3. lovelymsva

    lovelymsva TS Rookie Topic Starter

    reply

    ok i had run malwarebytes, it was installed. its in there i just can't find it.......meaning its behind some partition and i dont have access. when i try to redownload it it says access denied. and this is in reg and safemode
     
  4. lovelymsva

    lovelymsva TS Rookie Topic Starter

    ha and ha

    ok so this sorry peice of crap virus thought it was sooooooooo cute but guess what? this time when i went to dl malwarebytes i noticed the icon on my desktop so instead of clicking ok on the access denied window i clicked the icon and it came upo and let me update to the most recent update.........I feel like i just won a small war.......logs to follow :)
     
  5. lovelymsva

    lovelymsva TS Rookie Topic Starter

    log 1

    Malwarebytes' Anti-Malware 1.51.2.1300
    www.malwarebytes.org

    Database version: 8147

    Windows 5.1.2600 Service Pack 3 (Safe Mode)
    Internet Explorer 8.0.6001.18702

    11/12/2011 2:17:35 PM
    mbam-log-2011-11-12 (14-17-35).txt

    Scan type: Full scan (C:\|)
    Objects scanned: 249090
    Time elapsed: 27 minute(s), 16 second(s)

    Memory Processes Infected: 0
    Memory Modules Infected: 0
    Registry Keys Infected: 0
    Registry Values Infected: 0
    Registry Data Items Infected: 7
    Folders Infected: 0
    Files Infected: 3

    Memory Processes Infected:
    (No malicious items detected)

    Memory Modules Infected:
    (No malicious items detected)

    Registry Keys Infected:
    (No malicious items detected)

    Registry Values Infected:
    (No malicious items detected)

    Registry Data Items Infected:
    HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Start_ShowControlPanel (PUM.Hijack.StartMenu) -> Bad: (0) Good: (1) -> Quarantined and deleted successfully.
    HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Start_ShowHelp (PUM.Hijack.StartMenu) -> Bad: (0) Good: (1) -> Quarantined and deleted successfully.
    HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Start_ShowMyComputer (PUM.Hijack.StartMenu) -> Bad: (0) Good: (1) -> Quarantined and deleted successfully.
    HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Start_ShowMyDocs (PUM.Hijack.StartMenu) -> Bad: (0) Good: (1) -> Quarantined and deleted successfully.
    HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Start_ShowRun (PUM.Hijack.StartMenu) -> Bad: (0) Good: (1) -> Quarantined and deleted successfully.
    HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Start_ShowSearch (PUM.Hijack.StartMenu) -> Bad: (0) Good: (1) -> Quarantined and deleted successfully.
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr (PUM.Hijack.TaskManager) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.

    Folders Infected:
    (No malicious items detected)

    Files Infected:
    c:\documents and settings\administrator\my documents\downloads\setup(3).exe (Trojan.FakeVLC) -> Quarantined and deleted successfully.
    c:\system volume information\_restore{d0810ce0-46ad-4c02-97d8-ecec44ceb622}\RP473\A0130013.exe (Rogue.FakeAlert) -> Quarantined and deleted successfully.
    c:\system volume information\_restore{d0810ce0-46ad-4c02-97d8-ecec44ceb622}\RP473\A0132012.exe (Rogue.FakeAlert) -> Quarantined and deleted successfully.




    Malwarebytes' Anti-Malware 1.51.2.1300
    www.malwarebytes.org

    Database version: 8148

    Windows 5.1.2600 Service Pack 3 (Safe Mode)
    Internet Explorer 6.0.2900.5512

    11/12/2011 4:46:48 PM
    mbam-log-2011-11-12 (16-46-48).txt

    Scan type: Quick scan
    Objects scanned: 185809
    Time elapsed: 17 minute(s), 33 second(s)

    Memory Processes Infected: 0
    Memory Modules Infected: 0
    Registry Keys Infected: 0
    Registry Values Infected: 0
    Registry Data Items Infected: 1
    Folders Infected: 0
    Files Infected: 0

    Memory Processes Infected:
    (No malicious items detected)

    Memory Modules Infected:
    (No malicious items detected)

    Registry Keys Infected:
    (No malicious items detected)

    Registry Values Infected:
    (No malicious items detected)

    Registry Data Items Infected:
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr (PUM.Hijack.TaskManager) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.

    Folders Infected:
    (No malicious items detected)

    Files Infected:
    (No malicious items detected)






    Malwarebytes' Anti-Malware 1.51.2.1300
    www.malwarebytes.org

    Database version: 8148

    Windows 5.1.2600 Service Pack 3 (Safe Mode)
    Internet Explorer 6.0.2900.5512

    11/12/2011 5:21:55 PM
    mbam-log-2011-11-12 (17-21-55).txt

    Scan type: Full scan (C:\|D:\|)
    Objects scanned: 211305
    Time elapsed: 18 minute(s), 8 second(s)

    Memory Processes Infected: 1
    Memory Modules Infected: 0
    Registry Keys Infected: 0
    Registry Values Infected: 1
    Registry Data Items Infected: 0
    Folders Infected: 0
    Files Infected: 3

    Memory Processes Infected:
    c:\documents and settings\all users\application data\upwjqggcxjxrdja.exe (Rogue.FakeAlert) -> 1760 -> Unloaded process successfully.

    Memory Modules Infected:
    (No malicious items detected)

    Registry Keys Infected:
    (No malicious items detected)

    Registry Values Infected:
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\upwJQGgCXjxrDJa.exe (Rogue.FakeAlert) -> Value: upwJQGgCXjxrDJa.exe -> Quarantined and deleted successfully.

    Registry Data Items Infected:
    (No malicious items detected)

    Folders Infected:
    (No malicious items detected)

    Files Infected:
    c:\documents and settings\all users\application data\upwjqggcxjxrdja.exe (Rogue.FakeAlert) -> Quarantined and deleted successfully.
    c:\WINDOWS\Temp\1A.tmp (Trojan.FakeAlert) -> Quarantined and deleted successfully.
    c:\WINDOWS\Temp\vhoifs3k8b4o0l.exe.tmp (Rogue.FakeAlert) -> Quarantined and deleted successfully.


    Malwarebytes' Anti-Malware 1.51.2.1300
    www.malwarebytes.org

    Database version: 8148
     
  6. lovelymsva

    lovelymsva TS Rookie Topic Starter

    log 2

    Windows 5.1.2600 Service Pack 3 (Safe Mode)
    Internet Explorer 6.0.2900.5512

    11/12/2011 5:41:22 PM
    mbam-log-2011-11-12 (17-41-22).txt

    Scan type: Full scan (C:\|D:\|)
    Objects scanned: 212352
    Time elapsed: 19 minute(s), 16 second(s)

    Memory Processes Infected: 0
    Memory Modules Infected: 0
    Registry Keys Infected: 0
    Registry Values Infected: 0
    Registry Data Items Infected: 0
    Folders Infected: 0
    Files Infected: 0

    Memory Processes Infected:
    (No malicious items detected)

    Memory Modules Infected:
    (No malicious items detected)

    Registry Keys Infected:
    (No malicious items detected)

    Registry Values Infected:
    (No malicious items detected)

    Registry Data Items Infected:
    (No malicious items detected)

    Folders Infected:
    (No malicious items detected)

    Files Infected:
    (No malicious items detected)




    Malwarebytes' Anti-Malware 1.51.2.1300
    www.malwarebytes.org

    Database version: 8148

    Windows 5.1.2600 Service Pack 3 (Safe Mode)
    Internet Explorer 6.0.2900.5512

    11/12/2011 6:16:40 PM
    mbam-log-2011-11-12 (18-16-40).txt

    Scan type: Full scan (C:\|D:\|)
    Objects scanned: 212490
    Time elapsed: 19 minute(s), 40 second(s)

    Memory Processes Infected: 0
    Memory Modules Infected: 0
    Registry Keys Infected: 0
    Registry Values Infected: 0
    Registry Data Items Infected: 1
    Folders Infected: 0
    Files Infected: 2

    Memory Processes Infected:
    (No malicious items detected)

    Memory Modules Infected:
    (No malicious items detected)

    Registry Keys Infected:
    (No malicious items detected)

    Registry Values Infected:
    (No malicious items detected)

    Registry Data Items Infected:
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr (PUM.Hijack.TaskManager) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.

    Folders Infected:
    (No malicious items detected)

    Files Infected:
    c:\WINDOWS\Temp\2A.tmp (Trojan.FakeAlert) -> Quarantined and deleted successfully.
    c:\WINDOWS\Temp\uxtt3kad2djd0a.exe.tmp (Rogue.FakeAlert) -> Quarantined and deleted successfully.




    Malwarebytes' Anti-Malware 1.51.2.1300
    www.malwarebytes.org

    Database version: 8153

    Windows 5.1.2600 Service Pack 3
    Internet Explorer 6.0.2900.5512

    11/13/2011 10:25:05 AM
    mbam-log-2011-11-13 (10-25-05).txt

    Scan type: Full scan (C:\|D:\|)
    Objects scanned: 35035
    Time elapsed: 4 minute(s), 45 second(s)

    Memory Processes Infected: 0
    Memory Modules Infected: 0
    Registry Keys Infected: 0
    Registry Values Infected: 0
    Registry Data Items Infected: 0
    Folders Infected: 0
    Files Infected: 0

    Memory Processes Infected:
    (No malicious items detected)

    Memory Modules Infected:
    (No malicious items detected)

    Registry Keys Infected:
    (No malicious items detected)

    Registry Values Infected:
    (No malicious items detected)

    Registry Data Items Infected:
    (No malicious items detected)

    Folders Infected:
    (No malicious items detected)

    Files Infected:
    (No malicious items detected)




    Malwarebytes' Anti-Malware 1.51.2.1300
    www.malwarebytes.org

    Database version: 8153

    Windows 5.1.2600 Service Pack 3
    Internet Explorer 6.0.2900.5512

    11/13/2011 10:42:44 AM
    mbam-log-2011-11-13 (10-42-44).txt

    Scan type: Quick scan
    Objects scanned: 163526
    Time elapsed: 15 minute(s), 4 second(s)

    Memory Processes Infected: 0
    Memory Modules Infected: 0
    Registry Keys Infected: 0
    Registry Values Infected: 0
    Registry Data Items Infected: 0
    Folders Infected: 0
    Files Infected: 1

    Memory Processes Infected:
    (No malicious items detected)

    Memory Modules Infected:
    (No malicious items detected)

    Registry Keys Infected:
    (No malicious items detected)

    Registry Values Infected:
    (No malicious items detected)

    Registry Data Items Infected:
    (No malicious items detected)

    Folders Infected:
    (No malicious items detected)

    Files Infected:
    c:\WINDOWS\Temp\0.05104619722160997.exe (Exploit.Drop.2) -> Quarantined and deleted successfully.
     
  7. lovelymsva

    lovelymsva TS Rookie Topic Starter

    ok why there are so many

    well they are in chronological order from when i started yesterday.....thought you might wabt to see them all.

    on to next step
     
  8. lovelymsva

    lovelymsva TS Rookie Topic Starter

    gmer.log results

    GMER 1.0.15.15641 - http://www.gmer.net
    Rootkit quick scan 2011-11-13 10:57:38
    Windows 5.1.2600 Service Pack 3 Harddisk0\DR0 -> \Device\Ide\IdeDeviceP0T0L0-3 ST380815AS rev.3.CHF
    Running: 1ufq1zfk[1].exe; Driver: C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\awqdqkow.sys


    ---- Disk sectors - GMER 1.0.15 ----

    Disk \Device\Harddisk0\DR0 sector 00: rootkit-like behavior

    ---- Devices - GMER 1.0.15 ----

    Device \Driver\atapi -> DriverStartIo \Device\Ide\IdePort0 8A3252E0
    Device \Driver\atapi -> DriverStartIo \Device\Ide\IdeDeviceP0T0L0-3 8A3252E0
    Device \Driver\atapi -> DriverStartIo \Device\Ide\IdePort1 8A3252E0
    Device \Driver\atapi -> DriverStartIo \Device\Ide\IdeDeviceP1T0L0-e 8A3252E0
    Device \Driver\Tcpip \Device\Ip afwcore.sys (Agnitum Firewall Core Driver/Agnitum Ltd.)

    AttachedDevice \Driver\Tcpip \Device\Ip NSNetmon.sys (NovaShield Kernel Module /NovaShield, Inc.)

    Device \Driver\Tcpip \Device\Tcp afwcore.sys (Agnitum Firewall Core Driver/Agnitum Ltd.)

    AttachedDevice \Driver\Tcpip \Device\Tcp NSNetmon.sys (NovaShield Kernel Module /NovaShield, Inc.)

    Device \Driver\Tcpip \Device\Udp afwcore.sys (Agnitum Firewall Core Driver/Agnitum Ltd.)

    AttachedDevice \Driver\Tcpip \Device\Udp NSNetmon.sys (NovaShield Kernel Module /NovaShield, Inc.)

    Device \Driver\Tcpip \Device\RawIp afwcore.sys (Agnitum Firewall Core Driver/Agnitum Ltd.)

    AttachedDevice \Driver\Tcpip \Device\RawIp NSNetmon.sys (NovaShield Kernel Module /NovaShield, Inc.)

    ---- EOF - GMER 1.0.15 ----
     
  9. lovelymsva

    lovelymsva TS Rookie Topic Starter

    DDS results

    .
    DDS (Ver_2011-08-26.01) - NTFSx86
    Internet Explorer: 6.0.2900.5512 BrowserJavaVersion: 1.6.0_26
    Run by Administrator at 11:00:24 on 2011-11-13
    Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.2031.563 [GMT -6:00]
    .
    AV: BullGuard Antivirus *Enabled/Updated* {7A9BB333-8EDF-4FDC-A2A5-1A30FA021913}
    AV: Microsoft Security Essentials *Disabled/Updated* {EDB4FA23-53B8-4AFA-8C5D-99752CCA7095}
    AV: Microsoft Security Essentials *Disabled/Updated* {BCF43643-A118-4432-AEDE-D861FCBCFCDF}
    FW: BullGuard Firewall *Enabled*
    .
    ============== Running Processes ===============
    .
    C:\WINDOWS\system32\Ati2evxx.exe
    C:\WINDOWS\system32\svchost -k DcomLaunch
    C:\WINDOWS\System32\SvcHost.exe -k BullGuard_Main
    svchost.exe
    svchost.exe
    svchost.exe
    C:\WINDOWS\system32\spoolsv.exe
    C:\WINDOWS\Explorer.EXE
    C:\WINDOWS\RTHDCPL.EXE
    C:\Program Files\Belkin\Router Setup and Monitor\BelkinRouterMonitor.exe
    C:\Program Files\Common Files\Java\Java Update\jusched.exe
    C:\Program Files\BullGuard Ltd\BullGuard\BullGuard.exe
    C:\WINDOWS\system32\ctfmon.exe
    C:\Program Files\Messenger\msmsgs.exe
    C:\Program Files\Belkin\Router Setup and Monitor\BelkinSetup.exe
    svchost.exe
    C:\Program Files\Belkin\Router Setup and Monitor\BelkinService.exe
    C:\WINDOWS\System32\SvcHost.exe -k BullGuard_Backup
    C:\Program Files\BullGuard Ltd\BullGuard\BullGuardBhvScanner.exe
    C:\WINDOWS\System32\SvcHost.exe -k BullGuard
    C:\WINDOWS\System32\SvcHost.exe -k BullGuard_Proxy
    C:\Program Files\BullGuard Ltd\BullGuard\BullGuardScanner.exe
    C:\Program Files\BullGuard Ltd\BullGuard\BullGuardUpdate.exe
    C:\Program Files\Java\jre6\bin\jqs.exe
    C:\WINDOWS\system32\svchost.exe -k imgsvc
    C:\Program Files\Yahoo!\SoftwareUpdate\YahooAUService.exe
    C:\WINDOWS\System32\svchost.exe -k HTTPFilter
    C:\WINDOWS\System32\svchost.exe -k netsvcs
    C:\WINDOWS\system32\NOTEPAD.EXE
    C:\Documents and Settings\Administrator\Local Settings\Application Data\Google\Google Talk Plugin\googletalkplugin.exe
    C:\Program Files\Internet Explorer\iexplore.exe
    .
    ============== Pseudo HJT Report ===============
    .
    uStart Page = hxxp://www.google.com/
    BHO: {02478D38-C3F9-4efb-9B51-7695ECA05670} - No File
    BHO: Adobe PDF Link Helper: {18df081c-e8ad-4283-a596-fa578c2ebdc3} - c:\program files\common files\adobe\acrobat\activex\AcroIEHelperShim.dll
    BHO: Java(tm) Plug-In 2 SSV Helper: {dbc80044-a445-435b-bc74-9c25c1c588a9} - c:\program files\java\jre6\bin\jp2ssv.dll
    BHO: JQSIEStartDetectorImpl Class: {e7e6f031-17ce-4c07-bc86-eabfe594f69c} - c:\program files\java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll
    uRun: [ctfmon.exe] c:\windows\system32\ctfmon.exe
    uRun: [MSMSGS] "c:\program files\messenger\msmsgs.exe" /background
    uRun: [Google Update] "c:\documents and settings\administrator\local settings\application data\google\update\GoogleUpdate.exe" /c
    mRun: [StartCCC] "c:\program files\ati technologies\ati.ace\core-static\CLIStart.exe" MSRun
    mRun: [RTHDCPL] RTHDCPL.EXE
    mRun: [InstaLAN] "c:\program files\belkin\router setup and monitor\BelkinRouterMonitor.exe" startup
    mRun: [Adobe Reader Speed Launcher] "c:\program files\adobe\reader 9.0\reader\Reader_sl.exe"
    mRun: [Adobe ARM] "c:\program files\common files\adobe\arm\1.0\AdobeARM.exe"
    mRun: [SunJavaUpdateSched] "c:\program files\common files\java\java update\jusched.exe"
    mRun: [UserFaultCheck] %systemroot%\system32\dumprep 0 -u
    mRun: [BullGuard] "c:\program files\bullguard ltd\bullguard\BullGuard.exe" -boot
    mRun: [Malwarebytes' Anti-Malware (reboot)] "c:\program files\malwarebytes' anti-malware\mbam.exe" /runcleanupscript
    dRun: [DWQueuedReporting] "c:\progra~1\common~1\micros~1\dw\dwtrig20.exe" -t
    StartupFolder: c:\documents and settings\administrator\start menu\programs\startup\CurseClientStartup.ccip
    StartupFolder: c:\docume~1\admini~1\startm~1\programs\startup\openof~1.lnk - c:\program files\openoffice.org 3\program\quickstart.exe
    dPolicies-explorer: NoDesktop = 1 (0x1)
    dPolicies-system: DisableTaskMgr = 1 (0x1)
    IE: {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe
    IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe
    IE: {27FD17FB-CF63-486b-B2BE-8D8781CBEA01} - {27FD17FB-CF63-486b-B2BE-8D8781CBEA01} - c:\program files\bullguard ltd\bullguard\antiphishing\ie\BGAntiphishingIE.dll
    LSP: c:\windows\system32\BGLsp.dll
    DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} - hxxp://update.microsoft.com/windowsupdate/v6/V5Controls/en/x86/client/wuweb_site.cab?1281801832890
    DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} - hxxp://www.update.microsoft.com/microsoftupdate/v6/V5Controls/en/x86/client/muweb_site.cab?1281801921015
    DPF: {73ECB3AA-4717-450C-A2AB-D00DAD9EE203} - hxxp://h20270.www2.hp.com/ediags/gmn2/install/HPProductDetection2.cab
    DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_26-windows-i586.cab
    DPF: {CAFEEFAC-0016-0000-0026-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_26-windows-i586.cab
    DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_26-windows-i586.cab
    TCP: DhcpNameServer = 192.168.2.1
    TCP: Interfaces\{7EE890C2-9A16-4655-B00C-EEC4871864EC} : DhcpNameServer = 192.168.2.1
    Notify: AtiExtEvent - Ati2evxx.dll
    AppInit_DLLs: BgGamingMonitor.dll
    .
    ================= FIREFOX ===================
    .
    FF - ProfilePath - c:\documents and settings\administrator\application data\mozilla\firefox\profiles\xngyjcsx.default\
    FF - plugin: c:\documents and settings\administrator\application data\mozilla\plugins\npgoogletalk.dll
    FF - plugin: c:\documents and settings\administrator\application data\mozilla\plugins\npgtpo3dautoplugin.dll
    FF - plugin: c:\documents and settings\administrator\local settings\application data\google\update\1.3.21.79\npGoogleUpdate3.dll
    FF - plugin: c:\program files\adobe\reader 9.0\reader\air\nppdf32.dll
    FF - plugin: c:\program files\google\update\1.3.21.57\npGoogleUpdate3.dll
    FF - plugin: c:\program files\google\update\1.3.21.65\npGoogleUpdate3.dll
    FF - plugin: c:\program files\google\update\1.3.21.69\npGoogleUpdate3.dll
    FF - plugin: c:\program files\java\jre6\bin\new_plugin\npdeployJava1.dll
    FF - Ext: Default: {972ce4c6-7e08-4474-a285-3208198ce6fd} - c:\program files\mozilla firefox\extensions\{972ce4c6-7e08-4474-a285-3208198ce6fd}
    FF - Ext: BullGuard Safe Browsing: antiphishing@bullguard - c:\program files\bullguard ltd\bullguard\antiphishing\ff\antiphishing@bullguard
    .
    ---- FIREFOX POLICIES ----
    FF - user.js: yahoo.ytff.general.dontshowhpoffer - true
    ============= SERVICES / DRIVERS ===============
    .
    R1 BdSpy;BdSpy;c:\windows\system32\drivers\BdSpy.sys [2011-11-2 64608]
    R1 NovaShieldFilterDriver;NovaShieldFilterDriver;c:\windows\system32\drivers\NSKernel.sys [2011-11-2 789448]
    R1 NovaShieldTDIDriver;NovaShieldTDIDriver;c:\windows\system32\drivers\NSNetmon.sys [2011-11-2 19272]
    R2 BsBackup;BullGuard backup service;c:\windows\system32\SvcHost.exe -k BullGuard_Backup [2004-8-4 14336]
    R2 BsBhvScan;BullGuard behavioural detection service;c:\program files\bullguard ltd\bullguard\BullGuardBhvScanner.exe [2011-10-27 292192]
    R2 BsFileScan;BullGuard on-access service;c:\windows\system32\SvcHost.exe -k BullGuard [2004-8-4 14336]
    R2 BsFire;BullGuard firewall service;c:\windows\system32\SvcHost.exe -k BullGuard [2004-8-4 14336]
    R2 BsMailProxy;BullGuard e-mail monitoring service;c:\windows\system32\SvcHost.exe -k BullGuard_Proxy [2004-8-4 14336]
    R2 BsMain;BullGuard main service;c:\windows\system32\SvcHost.exe -k BullGuard_Main [2004-8-4 14336]
    R2 BsScanner;BullGuard scanning service;c:\program files\bullguard ltd\bullguard\BullGuardScanner.exe [2011-10-27 167264]
    R2 BsUpdate;BullGuard update service;c:\program files\bullguard ltd\bullguard\BullGuardUpdate.exe [2011-11-12 275808]
    R3 afw;Agnitum firewall driver;c:\windows\system32\drivers\afw.sys [2011-11-2 34280]
    R3 afwcore;afwcore;c:\windows\system32\drivers\afwcore.sys [2011-11-2 267624]
    S1 MpKsl9c92129e;MpKsl9c92129e;\??\c:\documents and settings\all users\application data\microsoft\microsoft antimalware\definition updates\{461b02a2-5338-4728-a202-ac239f015809}\mpksl9c92129e.sys --> c:\documents and settings\all users\application data\microsoft\microsoft antimalware\definition updates\{461b02a2-5338-4728-a202-ac239f015809}\MpKsl9c92129e.sys [?]
    S1 MpKslc3cb35f8;MpKslc3cb35f8;\??\c:\documents and settings\all users\application data\microsoft\microsoft antimalware\definition updates\{461b02a2-5338-4728-a202-ac239f015809}\mpkslc3cb35f8.sys --> c:\documents and settings\all users\application data\microsoft\microsoft antimalware\definition updates\{461b02a2-5338-4728-a202-ac239f015809}\MpKslc3cb35f8.sys [?]
    S2 clr_optimization_v4.0.30319_32;Microsoft .NET Framework NGEN v4.0.30319_X86;c:\windows\microsoft.net\framework\v4.0.30319\mscorsvw.exe [2010-3-18 130384]
    S2 srv70;srv70;c:\windows\system32\svchost.exe -k netsvcs [2004-8-4 14336]
    S3 WPFFontCache_v0400;Windows Presentation Foundation Font Cache 4.0.0.0;c:\windows\microsoft.net\framework\v4.0.30319\wpf\WPFFontCache_v0400.exe [2010-3-18 753504]
    .
    =============== Created Last 30 ================
    .
    2011-11-13 16:43:15 54016 ----a-w- c:\windows\system32\drivers\adbk.sys
    2011-11-12 22:02:49 -------- d--h--w- C:\4cd936a9afb93e5872139c2890
    2011-11-12 19:44:04 -------- d--h--w- c:\documents and settings\administrator\application data\Malwarebytes
    2011-11-12 19:42:58 -------- d--h--w- c:\documents and settings\all users\application data\Malwarebytes
    2011-11-12 19:42:55 22216 ---ha-w- c:\windows\system32\drivers\mbam.sys
    2011-11-12 19:42:55 -------- d--h--w- c:\program files\Malwarebytes' Anti-Malware
    2011-11-12 19:41:23 9466208 ---ha-w- C:\mbam-setup-1.51.1.1800.exe
    2011-11-12 19:36:30 -------- d--h--w- c:\documents and settings\administrator\local settings\application data\LogMeIn Rescue Applet
    2011-11-12 15:50:13 -------- d--h--w- c:\program files\common files\BullGuard Ltd
    2011-11-12 15:50:07 -------- d--h--w- c:\program files\BullGuard Ltd
    2011-11-12 14:29:21 560804 ----a-w- c:\windows\system32\PerfStringBackup.TMP
    2011-11-02 10:45:40 34280 ---ha-w- c:\windows\system32\drivers\afw.sys
    2011-11-02 10:45:40 267624 ---ha-w- c:\windows\system32\drivers\afwcore.sys
    2011-11-02 10:45:28 789448 ---ha-w- c:\windows\system32\drivers\NSKernel.sys
    2011-11-02 10:45:28 19272 ---ha-w- c:\windows\system32\drivers\NSNetmon.sys
    2011-11-02 10:45:12 304712 ---ha-w- c:\windows\system32\drivers\Trufos.sys
    2011-11-02 10:44:58 64608 ---ha-w- c:\windows\system32\drivers\BdSpy.sys
    .
    ==================== Find3M ====================
    .
    2011-10-18 15:06:54 414368 ---ha-w- c:\windows\system32\FlashPlayerCPLApp.cpl
    2011-09-22 08:47:40 100216 ---ha-w- c:\windows\system32\BgGamingMonitor.dll
    2011-09-14 13:26:10 53080 ---ha-w- c:\windows\system32\BGLsp.dll
    2011-09-03 10:17:37 599040 ---ha-w- c:\windows\system32\crypt32.dll
    .
    =================== ROOTKIT ====================
    .
    Stealth MBR rootkit/Mebroot/Sinowal/TDL4 detector 0.4.2 by Gmer, http://www.gmer.net
    Windows 5.1.2600 Disk: ST380815AS rev.3.CHF -> Harddisk0\DR0 -> \Device\Ide\IdeDeviceP0T0L0-3
    .
    device: opened successfully
    user: MBR read successfully
    .
    Disk trace:
    called modules: ntkrnlpa.exe CLASSPNP.SYS disk.sys ACPI.sys hal.dll >>UNKNOWN [0x8A3254C0]<<
    _asm { MOV EAX, [ESP+0x4]; MOV ECX, [0x8a32c8a4]; PUSH ESI; MOV ESI, [ESP+0xc]; PUSH EDI; MOV EDI, [ESI+0x60]; CMP EAX, [0x8a32c730]; JNZ 0x1f; MOV [ESP+0xc], ECX; }
    1 ntkrnlpa!IofCallDriver[0x804EF1A6] -> \Device\Harddisk0\DR0[0x8A790AB8]
    3 CLASSPNP[0xBA0E8FD7] -> ntkrnlpa!IofCallDriver[0x804EF1A6] -> \Device\00000065[0x8A7ACF18]
    5 ACPI[0xB9F7F620] -> ntkrnlpa!IofCallDriver[0x804EF1A6] -> [0x8A75BD98]
    \Driver\atapi[0x8A40BD28] -> IRP_MJ_CREATE -> 0x8A3254C0
    error: Read A device attached to the system is not functioning.
    kernel: MBR read successfully
    _asm { XOR AX, AX; MOV SS, AX; MOV SP, 0x7c00; STI ; PUSH AX; POP ES; PUSH AX; POP DS; CLD ; MOV SI, 0x7c1b; MOV DI, 0x61b; PUSH AX; PUSH DI; MOV CX, 0x1e5; REP MOVSB ; RETF ; MOV BP, 0x7be; MOV CL, 0x4; CMP [BP+0x0], CH; JL 0x2e; JNZ 0x3a; }
    detected disk devices:
    detected hooks:
    \Driver\atapi DriverStartIo -> 0x8A3252E0
    user & kernel MBR OK
    Warning: possible TDL3 rootkit infection !
    .
    ============= FINISH: 11:01:22.07 ===============
     
  10. Broni

    Broni Malware Annihilator Posts: 52,895   +344

    Go ahead with DDS.
     
  11. lovelymsva

    lovelymsva TS Rookie Topic Starter

    DDS results 2 attach log

    .
    UNLESS SPECIFICALLY INSTRUCTED, DO NOT POST THIS LOG.
    IF REQUESTED, ZIP IT UP & ATTACH IT
    .
    DDS (Ver_2011-08-26.01)
    .
    Microsoft Windows XP Professional
    Boot Device: \Device\HarddiskVolume1
    Install Date: 8/14/2010 9:26:58 AM
    System Uptime: 11/12/2011 11:29:43 PM (12 hours ago)
    .
    Motherboard: Hewlett-Packard | | 0A54h
    Processor: Intel(R) Pentium(R) D CPU 3.40GHz | XU1 PROCESSOR | 3391/800mhz
    .
    ==== Disk Partitions =========================
    .
    C: is FIXED (NTFS) - 75 GiB total, 15.377 GiB free.
    D: is CDROM ()
    .
    ==== Disabled Device Manager Items =============
    .
    Class GUID:
    Description: Audio Device on High Definition Audio Bus
    Device ID: HDAUDIO\FUNC_01&VEN_1002&DEV_AA01&SUBSYS_00AA0100&REV_1002\5&354C8EF0&0&0001
    Manufacturer:
    Name: Audio Device on High Definition Audio Bus
    PNP Device ID: HDAUDIO\FUNC_01&VEN_1002&DEV_AA01&SUBSYS_00AA0100&REV_1002\5&354C8EF0&0&0001
    Service:
    .
    Class GUID: {4D36E97E-E325-11CE-BFC1-08002BE10318}
    Description: PCI Simple Communications Controller
    Device ID: PCI\VEN_8086&DEV_2994&SUBSYS_2801103C&REV_02\3&B1BFB68&0&18
    Manufacturer:
    Name: PCI Simple Communications Controller
    PNP Device ID: PCI\VEN_8086&DEV_2994&SUBSYS_2801103C&REV_02\3&B1BFB68&0&18
    Service:
    .
    Class GUID: {4D36E96F-E325-11CE-BFC1-08002BE10318}
    Description: PS/2 Compatible Mouse
    Device ID: ACPI\PNP0F13\4&696F438&0
    Manufacturer: Microsoft
    Name: PS/2 Compatible Mouse
    PNP Device ID: ACPI\PNP0F13\4&696F438&0
    Service: i8042prt
    .
    Class GUID: {4D36E97E-E325-11CE-BFC1-08002BE10318}
    Description:
    Device ID: ACPI\IFX0102\1
    Manufacturer:
    Name:
    PNP Device ID: ACPI\IFX0102\1
    Service:
    .
    ==== System Restore Points ===================
    .
    RP414: 8/13/2011 5:26:09 PM - Software Distribution Service 3.0
    RP415: 8/14/2011 2:15:21 AM - Software Distribution Service 3.0
    RP416: 8/14/2011 5:21:30 PM - Software Distribution Service 3.0
    RP417: 8/15/2011 5:21:30 PM - Software Distribution Service 3.0
    RP418: 8/16/2011 5:21:29 PM - Software Distribution Service 3.0
    RP419: 8/17/2011 5:21:38 PM - Software Distribution Service 3.0
    RP420: 8/18/2011 5:21:14 PM - Software Distribution Service 3.0
    RP421: 8/19/2011 5:21:23 PM - Software Distribution Service 3.0
    RP422: 8/20/2011 5:21:33 PM - Software Distribution Service 3.0
    RP423: 8/21/2011 2:15:09 AM - Software Distribution Service 3.0
    RP424: 8/21/2011 5:21:32 PM - Software Distribution Service 3.0
    RP425: 8/22/2011 5:54:59 PM - Software Distribution Service 3.0
    RP426: 8/23/2011 5:49:49 PM - Software Distribution Service 3.0
    RP427: 8/24/2011 5:00:15 AM - Software Distribution Service 3.0
    RP428: 8/24/2011 5:49:45 PM - Software Distribution Service 3.0
    RP429: 8/25/2011 5:49:49 PM - Software Distribution Service 3.0
    RP430: 8/26/2011 5:50:31 PM - Software Distribution Service 3.0
    RP431: 8/27/2011 6:12:34 PM - System Checkpoint
    RP432: 8/28/2011 10:31:24 AM - Software Distribution Service 3.0
    RP433: 8/29/2011 5:33:35 PM - Software Distribution Service 3.0
    RP434: 8/30/2011 7:27:42 PM - Software Distribution Service 3.0
    RP435: 8/31/2011 5:24:42 PM - Installed Java(TM) 6 Update 26
    RP436: 8/31/2011 7:52:23 PM - Software Distribution Service 3.0
    RP437: 9/7/2011 1:20:00 AM - System Checkpoint
    RP438: 9/8/2011 1:31:17 AM - System Checkpoint
    RP439: 9/17/2011 7:55:29 AM - Software Distribution Service 3.0
    RP440: 9/17/2011 12:58:55 PM - Installed Ventrilo Client
    RP441: 9/17/2011 5:29:33 PM - Installed Ventrilo Client
    RP442: 9/19/2011 4:24:01 PM - System Checkpoint
    RP443: 9/24/2011 4:34:34 PM - System Checkpoint
    RP444: 9/25/2011 5:08:24 PM - System Checkpoint
    RP445: 9/27/2011 9:02:03 PM - System Checkpoint
    RP446: 9/27/2011 9:36:37 PM - Software Distribution Service 3.0
    RP447: 9/28/2011 9:36:53 PM - System Checkpoint
    RP448: 9/29/2011 10:08:18 PM - System Checkpoint
    RP449: 9/30/2011 10:27:07 PM - System Checkpoint
    RP450: 10/1/2011 4:48:56 PM - Removed Click to Call with Skype
    RP451: 10/8/2011 6:34:17 PM - System Checkpoint
    RP452: 10/9/2011 10:50:11 PM - System Checkpoint
    RP453: 10/11/2011 12:54:08 AM - System Checkpoint
    RP454: 10/12/2011 4:08:40 AM - System Checkpoint
    RP455: 10/13/2011 9:10:48 PM - System Checkpoint
    RP456: 10/15/2011 10:24:09 PM - System Checkpoint
    RP457: 10/16/2011 10:37:42 PM - System Checkpoint
    RP458: 10/18/2011 12:38:04 AM - System Checkpoint
    RP459: 10/20/2011 11:27:17 PM - System Checkpoint
    RP460: 10/22/2011 1:30:19 AM - System Checkpoint
    RP461: 10/23/2011 2:10:05 AM - System Checkpoint
    RP462: 10/26/2011 8:03:16 PM - System Checkpoint
    RP463: 10/28/2011 7:38:19 PM - System Checkpoint
    RP464: 10/30/2011 5:14:25 PM - System Checkpoint
    RP465: 11/1/2011 1:21:26 AM - System Checkpoint
    RP466: 11/2/2011 11:18:29 PM - System Checkpoint
    RP467: 11/3/2011 11:26:03 PM - System Checkpoint
    RP468: 11/4/2011 11:51:54 PM - System Checkpoint
    RP469: 11/5/2011 11:27:53 PM - System Checkpoint
    RP470: 11/6/2011 11:51:52 PM - System Checkpoint
    RP471: 11/9/2011 12:33:01 AM - System Checkpoint
    RP472: 11/10/2011 1:12:55 AM - System Checkpoint
    RP473: 11/11/2011 2:35:01 AM - System Checkpoint
    .
    ==== Installed Programs ======================
    .
    Adobe AIR
    Adobe Flash Player 10 ActiveX
    Adobe Flash Player 11 Plugin
    Adobe Reader 9.4.6
    Adobe Shockwave Player 11.5
    ATI AVIVO Codecs
    ATI Catalyst Install Manager
    ATI Display Driver
    ATI Problem Report Wizard
    AVS Media Player 4.1.1.60
    AVS Update Manager 1.0
    AVS Video Converter 6
    AVS4YOU Software Navigator 1.4
    Belkin Setup and Router Monitor
    BullGuard
    Burn4Free CD & DVD 4.9.0.0
    Catalyst Control Center - Branding
    Catalyst Control Center Core Implementation
    Catalyst Control Center Graphics Full Existing
    Catalyst Control Center Graphics Full New
    Catalyst Control Center Graphics Light
    Catalyst Control Center Graphics Previews Common
    Catalyst Control Center HydraVision Full
    Catalyst Control Center InstallProxy
    Catalyst Control Center Localization All
    ccc-core-preinstall
    ccc-core-static
    ccc-utility
    CCC Help Chinese Standard
    CCC Help Chinese Traditional
    CCC Help Czech
    CCC Help Danish
    CCC Help Dutch
    CCC Help English
    CCC Help Finnish
    CCC Help French
    CCC Help German
    CCC Help Greek
    CCC Help Hungarian
    CCC Help Italian
    CCC Help Japanese
    CCC Help Korean
    CCC Help Norwegian
    CCC Help Polish
    CCC Help Portuguese
    CCC Help Russian
    CCC Help Spanish
    CCC Help Swedish
    CCC Help Thai
    CCC Help Turkish
    Google Talk Plugin
    Hotfix for Microsoft .NET Framework 3.5 SP1 (KB953595)
    Hotfix for Microsoft .NET Framework 3.5 SP1 (KB958484)
    Hotfix for Windows XP (KB2158563)
    Hotfix for Windows XP (KB2443685)
    Hotfix for Windows XP (KB2570791)
    Hotfix for Windows XP (KB952287)
    Hotfix for Windows XP (KB954550-v5)
    Hotfix for Windows XP (KB961118)
    Hotfix for Windows XP (KB981793)
    HP Product Detection
    Intel(R) Network Connections Drivers
    Java Auto Updater
    Java(TM) 6 Update 26
    Malwarebytes' Anti-Malware version 1.51.2.1300
    Microsoft .NET Framework 2.0 Service Pack 2
    Microsoft .NET Framework 3.0 Service Pack 2
    Microsoft .NET Framework 3.5 SP1
    Microsoft .NET Framework 4 Client Profile
    Microsoft Application Error Reporting
    Microsoft Visual C++ 2005 Redistributable
    Microsoft Visual C++ 2008 Redistributable - KB2467174 - x86 9.0.30729.5570
    Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729.17
    Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729.4148
    Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729.6161
    Microsoft Visual C++ 2010 x86 Redistributable - 10.0.40219
    Mozilla Firefox (3.6.24)
    OpenOffice.org 3.2
    Realtek High Definition Audio Driver
    Security Update for Microsoft .NET Framework 3.5 SP1 (KB2416473)
    Security Update for Windows Media Player (KB2378111)
    Security Update for Windows Media Player (KB952069)
    Security Update for Windows Media Player (KB954155)
    Security Update for Windows Media Player (KB973540)
    Security Update for Windows Media Player (KB975558)
    Security Update for Windows Media Player (KB978695)
    Security Update for Windows Media Player (KB979402)
    Security Update for Windows XP (KB2079403)
    Security Update for Windows XP (KB2115168)
    Security Update for Windows XP (KB2121546)
    Security Update for Windows XP (KB2160329)
    Security Update for Windows XP (KB2229593)
    Security Update for Windows XP (KB2259922)
    Security Update for Windows XP (KB2279986)
    Security Update for Windows XP (KB2286198)
    Security Update for Windows XP (KB2296011)
    Security Update for Windows XP (KB2296199)
    Security Update for Windows XP (KB2347290)
    Security Update for Windows XP (KB2360937)
    Security Update for Windows XP (KB2387149)
    Security Update for Windows XP (KB2393802)
    Security Update for Windows XP (KB2412687)
    Security Update for Windows XP (KB2419632)
    Security Update for Windows XP (KB2423089)
    Security Update for Windows XP (KB2436673)
    Security Update for Windows XP (KB2440591)
    Security Update for Windows XP (KB2443105)
    Security Update for Windows XP (KB2476490)
    Security Update for Windows XP (KB2476687)
    Security Update for Windows XP (KB2478960)
    Security Update for Windows XP (KB2478971)
    Security Update for Windows XP (KB2479628)
    Security Update for Windows XP (KB2479943)
    Security Update for Windows XP (KB2481109)
    Security Update for Windows XP (KB2483185)
    Security Update for Windows XP (KB2485376)
    Security Update for Windows XP (KB2485663)
    Security Update for Windows XP (KB2503658)
    Security Update for Windows XP (KB2503665)
    Security Update for Windows XP (KB2506212)
    Security Update for Windows XP (KB2506223)
    Security Update for Windows XP (KB2507618)
    Security Update for Windows XP (KB2507938)
    Security Update for Windows XP (KB2508272)
    Security Update for Windows XP (KB2508429)
    Security Update for Windows XP (KB2509553)
    Security Update for Windows XP (KB2511455)
    Security Update for Windows XP (KB2524375)
    Security Update for Windows XP (KB2535512)
    Security Update for Windows XP (KB2536276-v2)
    Security Update for Windows XP (KB2536276)
    Security Update for Windows XP (KB2544893)
    Security Update for Windows XP (KB2555917)
    Security Update for Windows XP (KB2562937)
    Security Update for Windows XP (KB2566454)
    Security Update for Windows XP (KB2567680)
    Security Update for Windows XP (KB2570222)
    Security Update for Windows XP (KB923561)
    Security Update for Windows XP (KB923789)
    Security Update for Windows XP (KB946648)
    Security Update for Windows XP (KB950760)
    Security Update for Windows XP (KB950762)
    Security Update for Windows XP (KB950974)
    Security Update for Windows XP (KB951376-v2)
    Security Update for Windows XP (KB951748)
    Security Update for Windows XP (KB952004)
    Security Update for Windows XP (KB952954)
    Security Update for Windows XP (KB955069)
    Security Update for Windows XP (KB956572)
    Security Update for Windows XP (KB956744)
    Security Update for Windows XP (KB956802)
    Security Update for Windows XP (KB956803)
    Security Update for Windows XP (KB956844)
    Security Update for Windows XP (KB958644)
    Security Update for Windows XP (KB958869)
    Security Update for Windows XP (KB959426)
    Security Update for Windows XP (KB960225)
    Security Update for Windows XP (KB960803)
    Security Update for Windows XP (KB960859)
    Security Update for Windows XP (KB961501)
    Security Update for Windows XP (KB969059)
    Security Update for Windows XP (KB970238)
    Security Update for Windows XP (KB970430)
    Security Update for Windows XP (KB971468)
    Security Update for Windows XP (KB971657)
    Security Update for Windows XP (KB972270)
    Security Update for Windows XP (KB973507)
    Security Update for Windows XP (KB973869)
    Security Update for Windows XP (KB973904)
    Security Update for Windows XP (KB974112)
    Security Update for Windows XP (KB974318)
    Security Update for Windows XP (KB974392)
    Security Update for Windows XP (KB974571)
    Security Update for Windows XP (KB975025)
    Security Update for Windows XP (KB975467)
    Security Update for Windows XP (KB975560)
    Security Update for Windows XP (KB975561)
    Security Update for Windows XP (KB975562)
    Security Update for Windows XP (KB975713)
    Security Update for Windows XP (KB977816)
    Security Update for Windows XP (KB977914)
    Security Update for Windows XP (KB978037)
    Security Update for Windows XP (KB978338)
    Security Update for Windows XP (KB978542)
    Security Update for Windows XP (KB978601)
    Security Update for Windows XP (KB978706)
    Security Update for Windows XP (KB979309)
    Security Update for Windows XP (KB979482)
    Security Update for Windows XP (KB979559)
    Security Update for Windows XP (KB979683)
    Security Update for Windows XP (KB979687)
    Security Update for Windows XP (KB980195)
    Security Update for Windows XP (KB980218)
    Security Update for Windows XP (KB980232)
    Security Update for Windows XP (KB980436)
    Security Update for Windows XP (KB981322)
    Security Update for Windows XP (KB981852)
    Security Update for Windows XP (KB981957)
    Security Update for Windows XP (KB981997)
    Security Update for Windows XP (KB982132)
    Security Update for Windows XP (KB982214)
    Security Update for Windows XP (KB982381)
    Security Update for Windows XP (KB982665)
    Security Update for Windows XP (KB982802)
    Update for Microsoft .NET Framework 3.5 SP1 (KB963707)
    Update for Windows XP (KB2141007)
    Update for Windows XP (KB2345886)
    Update for Windows XP (KB2467659)
    Update for Windows XP (KB2541763)
    Update for Windows XP (KB2607712)
    Update for Windows XP (KB951978)
    Update for Windows XP (KB955759)
    Update for Windows XP (KB967715)
    Update for Windows XP (KB968389)
    Update for Windows XP (KB971029)
    Update for Windows XP (KB971737)
    Update for Windows XP (KB973687)
    Update for Windows XP (KB973815)
    Ventrilo Client
    WebFldrs XP
    Windows Genuine Advantage Notifications (KB905474)
    Windows Genuine Advantage Validation Tool (KB892130)
    Windows Media Player Firefox Plugin
    Windows XP Service Pack 3
    World of Warcraft
    Yahoo! Detect
    Yahoo! Software Update
    .
    ==== Event Viewer Messages From Past Week ========
    .
    11/9/2011 2:54:23 AM, error: Rasman [20035] - Remote Access Connection Manager failed to start because it could not create buffers. Restart the computer. Access is denied.
    11/9/2011 2:54:20 AM, error: Service Control Manager [7023] - The Remote Access Connection Manager service terminated with the following error: Access is denied.
    11/8/2011 4:48:05 PM, error: Service Control Manager [7023] - The srv70 service terminated with the following error: The specified module could not be found.
    .
    ==== End Of File ===========================
     
  12. Broni

    Broni Malware Annihilator Posts: 52,895   +344

    You're running two AV programs, BullGuard Antivirus and MSE.
    One of them has to go.
    Your choice.

    Then....

    Download TDSSKiller and save it to your desktop.
    • Doubleclick on TDSSKiller.exe to run the application, then on Start Scan.
    • If an infected file is detected, the default action will be Cure, click on Continue.
    • If a suspicious file is detected, the default action will be Skip, click on Continue.
    • It may ask you to reboot the computer to complete the process. Click on Reboot Now.
    • If no reboot is require, click on Report. A log file should appear. Please copy and paste the contents of that file here.
    • If a reboot is required, the report can also be found in your root directory (usually C:\ folder) in the form of TDSSKiller_xxxx_log.txt. Please copy and paste the contents of that file here.
     
  13. lovelymsva

    lovelymsva TS Rookie Topic Starter

    so noooooooow

    I did the kaspersky thing and im trying to reboot but it just sits on windows is shutting down.......like 5 min now......
     
  14. Broni

    Broni Malware Annihilator Posts: 52,895   +344

    Give it more time.
     
  15. lovelymsva

    lovelymsva TS Rookie Topic Starter

    sooo

    the first time it found something but I hadnt saved it so i re-did this step



    13:21:36.0406 2700 Rasl2tp (11b4a627bc9614b885c4969bfa5ff8a6) C:\WINDOWS\system32\DRIVERS\rasl2tp.sys
    13:21:36.0406 2700 Rasl2tp - ok
    13:21:36.0421 2700 RasPppoe (5bc962f2654137c9909c3d4603587dee) C:\WINDOWS\system32\DRIVERS\raspppoe.sys
    13:21:36.0421 2700 RasPppoe - ok
    13:21:36.0437 2700 Raspti (fdbb1d60066fcfbb7452fd8f9829b242) C:\WINDOWS\system32\DRIVERS\raspti.sys
    13:21:36.0437 2700 Raspti - ok
    13:21:36.0468 2700 Rdbss (7ad224ad1a1437fe28d89cf22b17780a) C:\WINDOWS\system32\DRIVERS\rdbss.sys
    13:21:36.0468 2700 Rdbss - ok
    13:21:36.0500 2700 RDPCDD (4912d5b403614ce99c28420f75353332) C:\WINDOWS\system32\DRIVERS\RDPCDD.sys
    13:21:36.0500 2700 RDPCDD - ok
    13:21:36.0531 2700 rdpdr (15cabd0f7c00c47c70124907916af3f1) C:\WINDOWS\system32\DRIVERS\rdpdr.sys
    13:21:36.0531 2700 rdpdr - ok
    13:21:36.0593 2700 RDPWD (fc105dd312ed64eb66bff111e8ec6eac) C:\WINDOWS\system32\drivers\RDPWD.sys
    13:21:36.0609 2700 RDPWD - ok
    13:21:36.0640 2700 redbook (f828dd7e1419b6653894a8f97a0094c5) C:\WINDOWS\system32\DRIVERS\redbook.sys
    13:21:36.0640 2700 redbook - ok
    13:21:36.0703 2700 Secdrv (90a3935d05b494a5a39d37e71f09a677) C:\WINDOWS\system32\DRIVERS\secdrv.sys
    13:21:36.0703 2700 Secdrv - ok
    13:21:36.0765 2700 serenum (0f29512ccd6bead730039fb4bd2c85ce) C:\WINDOWS\system32\DRIVERS\serenum.sys
    13:21:36.0765 2700 serenum - ok
    13:21:36.0781 2700 Serial (cca207a8896d4c6a0c9ce29a4ae411a7) C:\WINDOWS\system32\DRIVERS\serial.sys
    13:21:36.0781 2700 Serial - ok
    13:21:36.0812 2700 Sfloppy (8e6b8c671615d126fdc553d1e2de5562) C:\WINDOWS\system32\drivers\Sfloppy.sys
    13:21:36.0812 2700 Sfloppy - ok
    13:21:36.0828 2700 Simbad - ok
    13:21:36.0828 2700 Sparrow - ok
    13:21:36.0875 2700 splitter (ab8b92451ecb048a4d1de7c3ffcb4a9f) C:\WINDOWS\system32\drivers\splitter.sys
    13:21:36.0875 2700 splitter - ok
    13:21:36.0890 2700 sr (76bb022c2fb6902fd5bdd4f78fc13a5d) C:\WINDOWS\system32\DRIVERS\sr.sys
    13:21:36.0890 2700 sr - ok
    13:21:36.0921 2700 Srv (47ddfc2f003f7f9f0592c6874962a2e7) C:\WINDOWS\system32\DRIVERS\srv.sys
    13:21:36.0921 2700 Srv - ok
    13:21:36.0953 2700 swenum (3941d127aef12e93addf6fe6ee027e0f) C:\WINDOWS\system32\DRIVERS\swenum.sys
    13:21:36.0953 2700 swenum - ok
    13:21:37.0000 2700 swmidi (8ce882bcc6cf8a62f2b2323d95cb3d01) C:\WINDOWS\system32\drivers\swmidi.sys
    13:21:37.0000 2700 swmidi - ok
    13:21:37.0031 2700 symc810 - ok
    13:21:37.0046 2700 symc8xx - ok
    13:21:37.0078 2700 sym_hi - ok
    13:21:37.0093 2700 sym_u3 - ok
    13:21:37.0140 2700 sysaudio (8b83f3ed0f1688b4958f77cd6d2bf290) C:\WINDOWS\system32\drivers\sysaudio.sys
    13:21:37.0140 2700 sysaudio - ok
    13:21:37.0203 2700 Tcpip (9aefa14bd6b182d61e3119fa5f436d3d) C:\WINDOWS\system32\DRIVERS\tcpip.sys
    13:21:37.0203 2700 Tcpip - ok
    13:21:37.0250 2700 TDPIPE (6471a66807f5e104e4885f5b67349397) C:\WINDOWS\system32\drivers\TDPIPE.sys
    13:21:37.0250 2700 TDPIPE - ok
    13:21:37.0296 2700 TDTCP (c56b6d0402371cf3700eb322ef3aaf61) C:\WINDOWS\system32\drivers\TDTCP.sys
    13:21:37.0296 2700 TDTCP - ok
    13:21:37.0328 2700 TermDD (88155247177638048422893737429d9e) C:\WINDOWS\system32\DRIVERS\termdd.sys
    13:21:37.0328 2700 TermDD - ok
    13:21:37.0343 2700 TosIde - ok
    13:21:37.0421 2700 Trufos (d391f1171a2e3a7080df6faae7a20c0b) C:\WINDOWS\system32\DRIVERS\Trufos.sys
    13:21:37.0437 2700 Trufos - ok
    13:21:37.0484 2700 Udfs (5787b80c2e3c5e2f56c2a233d91fa2c9) C:\WINDOWS\system32\drivers\Udfs.sys
    13:21:37.0484 2700 Udfs - ok
    13:21:37.0500 2700 ultra - ok
    13:21:37.0546 2700 Update (402ddc88356b1bac0ee3dd1580c76a31) C:\WINDOWS\system32\DRIVERS\update.sys
    13:21:37.0562 2700 Update - ok
    13:21:37.0609 2700 usbccgp (173f317ce0db8e21322e71b7e60a27e8) C:\WINDOWS\system32\DRIVERS\usbccgp.sys
    13:21:37.0609 2700 usbccgp - ok
    13:21:37.0640 2700 usbehci (65dcf09d0e37d4c6b11b5b0b76d470a7) C:\WINDOWS\system32\DRIVERS\usbehci.sys
    13:21:37.0640 2700 usbehci - ok
    13:21:37.0671 2700 usbhub (1ab3cdde553b6e064d2e754efe20285c) C:\WINDOWS\system32\DRIVERS\usbhub.sys
    13:21:37.0671 2700 usbhub - ok
    13:21:37.0718 2700 usbscan (a0b8cf9deb1184fbdd20784a58fa75d4) C:\WINDOWS\system32\DRIVERS\usbscan.sys
    13:21:37.0718 2700 usbscan - ok
    13:21:37.0750 2700 USBSTOR (a32426d9b14a089eaa1d922e0c5801a9) C:\WINDOWS\system32\DRIVERS\USBSTOR.SYS
    13:21:37.0750 2700 USBSTOR - ok
    13:21:37.0781 2700 usbuhci (26496f9dee2d787fc3e61ad54821ffe6) C:\WINDOWS\system32\DRIVERS\usbuhci.sys
    13:21:37.0781 2700 usbuhci - ok
    13:21:37.0796 2700 VgaSave (0d3a8fafceacd8b7625cd549757a7df1) C:\WINDOWS\System32\drivers\vga.sys
    13:21:37.0796 2700 VgaSave - ok
    13:21:37.0812 2700 ViaIde - ok
    13:21:37.0859 2700 VolSnap (4c8fcb5cc53aab716d810740fe59d025) C:\WINDOWS\system32\drivers\VolSnap.sys
    13:21:37.0859 2700 VolSnap - ok
    13:21:37.0890 2700 Wanarp (e20b95baedb550f32dd489265c1da1f6) C:\WINDOWS\system32\DRIVERS\wanarp.sys
    13:21:37.0890 2700 Wanarp - ok
    13:21:37.0921 2700 WDICA - ok
    13:21:37.0968 2700 wdmaud (6768acf64b18196494413695f0c3a00f) C:\WINDOWS\system32\drivers\wdmaud.sys
    13:21:37.0968 2700 wdmaud - ok
    13:21:38.0031 2700 WmiAcpi (c42584fd66ce9e17403aebca199f7bdb) C:\WINDOWS\system32\DRIVERS\wmiacpi.sys
    13:21:38.0031 2700 WmiAcpi - ok
    13:21:38.0109 2700 WS2IFSL (6abe6e225adb5a751622a9cc3bc19ce8) C:\WINDOWS\System32\drivers\ws2ifsl.sys
    13:21:38.0109 2700 WS2IFSL - ok
    13:21:38.0140 2700 MBR (0x1B8) (8f558eb6672622401da993e1e865c861) \Device\Harddisk0\DR0
    13:21:38.0250 2700 \Device\Harddisk0\DR0 - ok
    13:21:38.0250 2700 Boot (0x1200) (823bae7d640e3e2573451cdb6b7eea05) \Device\Harddisk0\DR0\Partition0
    13:21:38.0250 2700 \Device\Harddisk0\DR0\Partition0 - ok
    13:21:38.0250 2700 ============================================================
    13:21:38.0250 2700 Scan finished
    13:21:38.0250 2700 ============================================================
    13:21:38.0265 3824 Detected object count: 0
    13:21:38.0265 3824 Actual detected object count: 0
     
  16. Broni

    Broni Malware Annihilator Posts: 52,895   +344

    Download aswMBR to your desktop.
    Double click the aswMBR.exe to run it.
    If you see this question: Would you like to download latest Avast! virus definitions?" say "Yes".
    Click the "Scan" button to start scan:
    [​IMG]

    On completion of the scan click "Save log", save it to your desktop and post in your next reply:
    [​IMG]

    NOTE. aswMBR will create MBR.dat file on your desktop. This is a copy of your MBR. Do NOT delete it.

    ===================================================================

    Please download ComboFix from Here or Here to your Desktop.

    **Note: In the event you already have Combofix, this is a new version that I need you to download. It is important that it is saved directly to your desktop**
    1. Please, never rename Combofix unless instructed.
    2. Close any open browsers.
    3. Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.
      • Very Important! Temporarily disable your anti-virus, script blocking and any anti-malware real-time protection before performing a scan. They can interfere with ComboFix or remove some of its embedded files which may cause "unpredictable results".
      • Click on this link to see a list of programs that should be disabled. The list is not all inclusive. If yours is not listed and you don't know how to disable it, please ask.
      NOTE1. If Combofix asks you to install Recovery Console, please allow it.
      NOTE 2. If Combofix asks you to update the program, always do so.
      • Close any open browsers.
      • WARNING: Combofix will disconnect your machine from the Internet as soon as it starts
      • Please do not attempt to re-connect your machine back to the Internet until Combofix has completely finished.
      • If there is no internet connection after running Combofix, then restart your computer to restore back your connection.
    4. Double click on combofix.exe & follow the prompts.
    5. When finished, it will produce a report for you.
    6. Please post the "C:\ComboFix.txt"
    **Note 1: Do not mouseclick combofix's window while it's running. That may cause it to stall
    **Note 2 for AVG users: ComboFix will not run until AVG is uninstalled as a protective measure against the anti-virus. This is because AVG "falsely" detects ComboFix (or its embedded files) as a threat and may remove them resulting in the tool not working correctly which in turn can cause "unpredictable results". Since AVG cannot be effectively disabled before running ComboFix, the author recommends you to uninstall AVG first.
    Use AppRemover to uninstall it: http://www.appremover.com/
    We can reinstall it when we're done with CF.
    **Note 3: If you receive an error "Illegal operation attempted on a registery key that has been marked for deletion", restart computer to fix the issue.



    Make sure, you re-enable your security programs, when you're done with Combofix.

    ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

    NOTE.
    If, for some reason, Combofix refuses to run, try one of the following:

    1. Run Combofix from Safe Mode (How to...)

    2. Delete Combofix file, download fresh one, but rename combofix.exe to yourname.exe BEFORE saving it to your desktop.
    Do NOT run it yet.

    Please download and run the below tool named Rkill (courtesy of BleepingComputer.com) which may help allow other programs to run.

    There are 4 different versions. If one of them won't run then download and try to run the other one.

    Vista and Win7 users need to right click Rkill and choose Run as Administrator

    You only need to get one of these to run, not all of them. You may get warnings from your antivirus about this tool, ignore them or shutdown your antivirus.

    Rkill.com
    Rkill.scr
    Rkill.exe

    • Double-click on the Rkill desktop icon to run the tool.
    • If using Vista or Windows 7 right-click on it and choose Run As Administrator.
    • A black DOS box will briefly flash and then disappear. This is normal and indicates the tool ran successfully.
    • If not, delete the file, then download and use the one provided in Link 2.
    • If it does not work, repeat the process and attempt to use one of the remaining links until the tool runs.
    • Do not reboot until instructed.
    • If the tool does not run from any of the links provided, please let me know.

    Once you've gotten one of them to run, immediately run your_name.exe by double clicking on it.

    If normal mode still doesn't work, run BOTH tools from safe mode.

    In case #2, please post BOTH logs, rKill and Combofix.

    DO NOT make any other changes to your computer (like installing programs, using other cleaning tools, etc.), until it's officially declared clean!!!
     
Topic Status:
Not open for further replies.

Similar Topics

Add New Comment

You need to be a member to leave a comment. Join thousands of tech enthusiasts and participate.
TechSpot Account You may also...