TechSpot

XP Freezing, possible infection, logs by request

By TickyBox
Jul 3, 2010
  1. I posted the issues I've been having with my uncle's computer here: http://www.techspot.com/vb/topic149426.html and Route44 recommended I follow the 8 steps listed here and post the logs since it's possibly infected despite all of my scans showing nothing. Hopefully these logs will shed some light on the problem. Thanks.
     

    Attached Files:

  2. Broni

    Broni Malware Annihilator Posts: 52,904   +344

    Please download ComboFix from Here or Here to your Desktop.

    **Note: In the event you already have Combofix, this is a new version that I need you to download. It is important that it is saved directly to your desktop**
    1. Please, never rename Combofix unless instructed.
    2. Close any open browsers.
    3. Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.
      • Very Important! Temporarily disable your anti-virus, script blocking and any anti-malware real-time protection before performing a scan. They can interfere with ComboFix or remove some of its embedded files which may cause "unpredictable results".
      • Click on this link to see a list of programs that should be disabled. The list is not all inclusive. If yours is not listed and you don't know how to disable it, please ask.
      NOTE1. If Combofix asks you to install Recovery Console, please allow it.
      NOTE 2. If Combofix asks you to update the program, always do so.
      • Close any open browsers.
      • WARNING: Combofix will disconnect your machine from the Internet as soon as it starts
      • Please do not attempt to re-connect your machine back to the Internet until Combofix has completely finished.
      • If there is no internet connection after running Combofix, then restart your computer to restore back your connection.
    4. Double click on combofix.exe & follow the prompts.
    5. When finished, it will produce a report for you.
    6. Please post the "C:\ComboFix.txt"
    **Note: Do not mouseclick combofix's window while it's running. That may cause it to stall**

    Make sure, you re-enable your security programs, when you're done with Combofix.

    DO NOT make any other changes to your computer (like installing programs, using other cleaning tools, etc.), until it's officially declared clean!!!
     
  3. TickyBox

    TickyBox TS Rookie Topic Starter

    Here you go. It did say it detected rootkit like activity and had to reboot the system.

    ComboFix 10-07-03.06 - Mitch 07/04/2010 15:42:24.1.2 - x86
    Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.1918.1540 [GMT -4:00]
    Running from: c:\documents and settings\Mitch\Desktop\ComboFix.exe
    AV: avast! Antivirus *On-access scanning disabled* (Updated) {7591DB91-41F0-48A3-B128-1A293FD8233D}
    .

    ((((((((((((((((((((((((( Files Created from 2010-06-04 to 2010-07-04 )))))))))))))))))))))))))))))))
    .

    2010-07-02 23:19 . 2010-07-02 23:19 -------- d-----w- c:\program files\ATI
    2010-07-02 22:42 . 2010-06-28 20:37 165456 ----a-w- c:\windows\system32\drivers\aswSP.sys
    2010-07-02 22:42 . 2010-06-28 20:32 17744 ----a-w- c:\windows\system32\drivers\aswFsBlk.sys
    2010-07-02 22:42 . 2010-06-28 20:33 23376 ----a-w- c:\windows\system32\drivers\aswRdr.sys
    2010-07-02 22:42 . 2010-06-28 20:37 46672 ----a-w- c:\windows\system32\drivers\aswTdi.sys
    2010-07-02 22:42 . 2010-06-28 20:32 100176 ----a-w- c:\windows\system32\drivers\aswmon2.sys
    2010-07-02 22:42 . 2010-06-28 20:32 94544 ----a-w- c:\windows\system32\drivers\aswmon.sys
    2010-07-02 22:42 . 2010-06-28 20:32 28880 ----a-w- c:\windows\system32\drivers\aavmker4.sys
    2010-07-02 22:41 . 2010-06-28 20:57 38848 ----a-w- c:\windows\avastSS.scr
    2010-07-02 22:41 . 2010-06-28 20:57 165032 ----a-w- c:\windows\system32\aswBoot.exe
    2010-07-02 22:41 . 2010-07-02 22:41 -------- d-----w- c:\documents and settings\All Users\Application Data\Alwil Software
    2010-07-02 21:56 . 2010-07-02 21:59 -------- d-----w- c:\documents and settings\Mitch\Local Settings\Application Data\Runscanner.net
    2010-07-02 21:43 . 2010-07-04 19:40 -------- d-----w- c:\windows\system32\NtmsData
    2010-07-02 21:32 . 2010-07-04 19:42 -------- d-----w- c:\windows\system32\CatRoot2
    2010-07-02 20:51 . 2010-07-02 20:51 -------- d-----w- c:\documents and settings\All Users\Application Data\SUPERAntiSpyware.com
    2010-06-25 00:42 . 2010-06-25 00:42 -------- d-----w- c:\program files\Sophos
    2010-06-24 22:45 . 2010-06-24 22:45 -------- d-----w- c:\program files\Seagate
    2010-06-24 22:43 . 2010-06-24 22:46 -------- d-----w- c:\windows\SxsCaPendDel
    2010-06-24 22:42 . 2010-06-24 22:42 -------- d-----w- c:\program files\Common Files\Wise Installation Wizard
    2010-06-24 22:40 . 2010-06-24 22:41 592 ----a-w- c:\windows\chgkey.vbs
    2010-06-24 22:29 . 2010-06-24 22:29 -------- d-----w- c:\documents and settings\Mitch\Application Data\Malwarebytes
    2010-06-24 22:28 . 2010-06-24 22:28 -------- d-----w- c:\documents and settings\All Users\Application Data\Malwarebytes
    2010-06-24 22:28 . 2010-04-29 19:39 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
    2010-06-24 22:28 . 2010-06-24 22:28 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
    2010-06-24 22:28 . 2010-04-29 19:39 20952 ----a-w- c:\windows\system32\drivers\mbam.sys
    2010-06-24 22:21 . 2010-07-02 23:04 -------- d-----w- c:\documents and settings\Mitch\Application Data\QuickScan
    2010-06-24 21:28 . 2010-07-03 23:26 -------- d-----w- c:\documents and settings\All Users\Application Data\Spybot - Search & Destroy
    2010-06-24 21:28 . 2010-06-24 21:31 -------- d-----w- c:\program files\Spybot - Search & Destroy
    2010-06-23 13:15 . 2008-04-14 00:11 21504 -c--a-w- c:\windows\system32\dllcache\hidserv.dll
    2010-06-23 13:15 . 2008-04-14 00:11 21504 ----a-w- c:\windows\system32\hidserv.dll
    2010-06-19 11:21 . 2010-06-19 11:21 -------- d-----w- c:\documents and settings\Mitch\Application Data\ArcSoft
    2010-06-10 18:37 . 2010-06-10 18:37 -------- d-----w- c:\documents and settings\HelpAssistant\UserData
    2010-06-10 18:37 . 2008-09-23 01:18 1076 ----a-w- c:\documents and settings\HelpAssistant\XP.reg

    .
    (((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
    .
    2010-07-02 22:41 . 2008-09-22 23:25 -------- d-----w- c:\program files\Alwil Software
    2010-07-02 21:51 . 2008-09-22 22:19 42944 ----a-w- c:\documents and settings\Mitch\Local Settings\Application Data\GDIPFONTCACHEV1.DAT
    2010-07-01 01:23 . 2008-10-25 17:22 -------- d-----w- c:\program files\Lx_cats
    2010-06-23 16:29 . 2009-07-29 02:02 20 ---h--w- c:\documents and settings\All Users\Application Data\PKP_DLdw.DAT
    2010-06-23 16:18 . 2009-07-29 01:59 20 ---h--w- c:\documents and settings\All Users\Application Data\PKP_DLdu.DAT
    2010-05-27 11:01 . 2010-05-27 11:01 61440 ----a-w- c:\documents and settings\Mitch\Application Data\Sun\Java\Deployment\SystemCache\6.0\50\5535ab32-4dc00619-n\decora-sse.dll
    2010-05-27 11:01 . 2010-05-27 11:01 503808 ----a-w- c:\documents and settings\Mitch\Application Data\Sun\Java\Deployment\SystemCache\6.0\46\f84c6ae-19ddcafc-n\msvcp71.dll
    2010-05-27 11:01 . 2010-05-27 11:01 499712 ----a-w- c:\documents and settings\Mitch\Application Data\Sun\Java\Deployment\SystemCache\6.0\46\f84c6ae-19ddcafc-n\jmc.dll
    2010-05-27 11:01 . 2010-05-27 11:01 348160 ----a-w- c:\documents and settings\Mitch\Application Data\Sun\Java\Deployment\SystemCache\6.0\46\f84c6ae-19ddcafc-n\msvcr71.dll
    2010-05-27 11:01 . 2010-05-27 11:01 12800 ----a-w- c:\documents and settings\Mitch\Application Data\Sun\Java\Deployment\SystemCache\6.0\50\5535ab32-4dc00619-n\decora-d3d.dll
    2010-05-14 17:23 . 2010-02-03 22:07 -------- d-----w- c:\program files\Google
    2010-05-02 05:22 . 2004-08-04 12:00 1851264 ----a-w- c:\windows\system32\win32k.sys
    2010-04-20 05:30 . 2004-08-04 12:00 285696 ----a-w- c:\windows\system32\atmfd.dll
    2010-04-16 16:09 . 2004-08-04 12:00 667136 ----a-w- c:\windows\system32\wininet.dll
    2010-04-16 16:09 . 2004-08-04 12:00 81920 ----a-w- c:\windows\system32\ieencode.dll
    2010-04-12 21:29 . 2010-05-05 11:08 411368 ----a-w- c:\windows\system32\deployJava1.dll
    .

    ((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
    .
    .
    *Note* empty entries & legit default entries are not shown
    REGEDIT4

    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
    "StartCCC"="c:\program files\ATI Technologies\ATI.ACE\Core-Static\CLIStart.exe" [2008-01-21 61440]
    "RTHDCPL"="RTHDCPL.EXE" [2007-12-20 16860672]
    "NeroFilterCheck"="c:\program files\Common Files\Ahead\Lib\NeroCheck.exe" [2007-03-01 153136]
    "SecurDisc"="c:\program files\Nero\Nero 7\InCD\NBHGui.exe" [2007-11-26 1629480]
    "InCD"="c:\program files\Nero\Nero 7\InCD\InCD.exe" [2007-11-26 1057064]
    "Lexmark 5200 series"="c:\program files\Lexmark 5200 series\lxbtbmgr.exe" [2004-03-25 57344]
    "FaxCenterServer"="c:\program files\Lexmark Fax Solutions\fm3032.exe" [2004-03-23 294912]
    "QuickTime Task"="c:\program files\QuickTime\QTTask.exe" [2007-12-11 286720]
    "Nikon Transfer Monitor"="c:\program files\Common Files\Nikon\Monitor\NkMonitor.exe" [2008-09-30 485208]
    "SunJavaUpdateSched"="c:\program files\Common Files\Java\Java Update\jusched.exe" [2010-02-18 248040]
    "Adobe ARM"="c:\program files\Common Files\Adobe\ARM\1.0\AdobeARM.exe" [2010-06-09 976832]
    "Adobe Reader Speed Launcher"="c:\program files\Adobe\Reader 9.0\Reader\Reader_sl.exe" [2010-06-20 35760]
    "avast5"="c:\progra~1\ALWILS~1\Avast5\avastUI.exe" [2010-06-28 2837864]
    "LXBTCATS"="c:\windows\system32\spool\DRIVERS\W32X86\3\LXBTtime.dll" [2004-03-17 65536]

    [HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]
    "EnableFirewall"= 0 (0x0)

    [HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
    "%windir%\\system32\\sessmgr.exe"=

    [HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\GloballyOpenPorts\List]
    "65533:TCP"= 65533:TCP:Services
    "52344:TCP"= 52344:TCP:Services
    "7018:TCP"= 7018:TCP:Services
    "7019:TCP"= 7019:TCP:Services
    "3389:TCP"= 3389:TCP:Remote Desktop
    "5957:TCP"= 5957:TCP:Services
    "5958:TCP"= 5958:TCP:Services
    "7414:TCP"= 7414:TCP:Services
    "4457:TCP"= 4457:TCP:Services

    R1 aswSP;aswSP;c:\windows\system32\drivers\aswSP.sys [7/2/2010 6:42 PM 165456]
    R2 aswFsBlk;aswFsBlk;c:\windows\system32\drivers\aswFsBlk.sys [7/2/2010 6:42 PM 17744]
    S2 gupdate;Google Update Service (gupdate);c:\program files\Google\Update\GoogleUpdate.exe [2/3/2010 6:07 PM 135664]
    .
    Contents of the 'Scheduled Tasks' folder

    2010-07-03 c:\windows\Tasks\GoogleUpdateTaskMachineCore.job
    - c:\program files\Google\Update\GoogleUpdate.exe [2010-02-03 22:07]

    2010-07-04 c:\windows\Tasks\GoogleUpdateTaskMachineUA.job
    - c:\program files\Google\Update\GoogleUpdate.exe [2010-02-03 22:07]

    2010-06-24 c:\windows\Tasks\WGASetup.job
    - c:\windows\system32\KB905474\wgasetup.exe [2009-06-01 02:18]
    .
    .
    ------- Supplementary Scan -------
    .
    uInternet Settings,ProxyOverride = *.local
    IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~2\OFFICE11\EXCEL.EXE/3000
    FF - ProfilePath - c:\documents and settings\Mitch\Application Data\Mozilla\Firefox\Profiles\hz8m92p6.default\
    FF - prefs.js: browser.startup.homepage - hxxp://www.msnbc.com
    FF - plugin: c:\documents and settings\Mitch\Local Settings\Application Data\Yahoo!\BrowserPlus\2.8.1\Plugins\npybrowserplus_2.8.1.dll
    FF - plugin: c:\program files\Google\Google Earth\plugin\npgeplugin.dll
    FF - plugin: c:\program files\Google\Update\1.2.183.23\npGoogleOneClick8.dll
    FF - plugin: c:\program files\Mozilla Firefox\plugins\npdeployJava1.dll
    FF - HiddenExtension: Microsoft .NET Framework Assistant: {20a82645-c095-46ed-80e3-08825760534b} - c:\windows\Microsoft.NET\Framework\v3.5\Windows Presentation Foundation\DotNetAssistantExtension\

    ---- FIREFOX POLICIES ----
    FF - user.js: yahoo.homepage.dontask - truec:\program files\Mozilla Firefox\greprefs\all.js - pref("ui.use_native_colors", true);
    c:\program files\Mozilla Firefox\greprefs\all.js - pref("network.IDN.whitelist.lu", true);
    c:\program files\Mozilla Firefox\greprefs\all.js - pref("network.IDN.whitelist.nu", true);
    c:\program files\Mozilla Firefox\greprefs\all.js - pref("network.IDN.whitelist.nz", true);
    c:\program files\Mozilla Firefox\greprefs\all.js - pref("network.IDN.whitelist.xn--mgberp4a5d4ar", true);
    c:\program files\Mozilla Firefox\greprefs\all.js - pref("network.IDN.whitelist.xn--p1ai", true);
    c:\program files\Mozilla Firefox\greprefs\all.js - pref("network.IDN.whitelist.xn--mgbayh7gpa", true);
    c:\program files\Mozilla Firefox\greprefs\all.js - pref("network.IDN.whitelist.tel", true);
    c:\program files\Mozilla Firefox\greprefs\all.js - pref("network.auth.force-generic-ntlm", false);
    c:\program files\Mozilla Firefox\greprefs\all.js - pref("network.proxy.type", 5);
    c:\program files\Mozilla Firefox\greprefs\all.js - pref("dom.ipc.plugins.timeoutSecs", 45);
    c:\program files\Mozilla Firefox\greprefs\all.js - pref("svg.smil.enabled", false);
    c:\program files\Mozilla Firefox\greprefs\all.js - pref("accelerometer.enabled", true);
    c:\program files\Mozilla Firefox\greprefs\security-prefs.js - pref("security.ssl.allow_unrestricted_renego_everywhere__temporarily_available_pref", true);
    c:\program files\Mozilla Firefox\greprefs\security-prefs.js - pref("security.ssl.renego_unrestricted_hosts", "");
    c:\program files\Mozilla Firefox\greprefs\security-prefs.js - pref("security.ssl.treat_unsafe_negotiation_as_broken", false);
    c:\program files\Mozilla Firefox\greprefs\security-prefs.js - pref("security.ssl.require_safe_negotiation", false);
    c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("extensions.{972ce4c6-7e08-4474-a285-3208198ce6fd}.name", "chrome://browser/locale/browser.properties");
    c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("extensions.{972ce4c6-7e08-4474-a285-3208198ce6fd}.description", "chrome://browser/locale/browser.properties");
    c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("plugins.update.notifyUser", false);
    c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("dom.ipc.plugins.enabled.nptest.dll", true);
    c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("dom.ipc.plugins.enabled.npswf32.dll", true);
    c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("dom.ipc.plugins.enabled.npctrl.dll", true);
    c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("dom.ipc.plugins.enabled.npqtplugin.dll", true);
    c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("dom.ipc.plugins.enabled", false);
    .
    - - - - ORPHANS REMOVED - - - -

    ShellExecuteHooks-{5AE067D3-9AFB-48E0-853A-EBB7F4A000DA} - (no file)



    **************************************************************************

    catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
    Rootkit scan 2010-07-04 15:48
    Windows 5.1.2600 Service Pack 3 NTFS

    scanning hidden processes ...

    scanning hidden autostart entries ...

    HKLM\Software\Microsoft\Windows\CurrentVersion\Run
    LXBTCATS = rundll32 c:\windows\system32\spool\DRIVERS\W32X86\3\LXBTtime.dll,_RunDLLEntry@16???????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????

    scanning hidden files ...

    scan completed successfully
    hidden files: 0

    **************************************************************************

    Stealth MBR rootkit/Mebroot/Sinowal detector 0.3.7 by Gmer, http://www.gmer.net

    device: opened successfully
    user: MBR read successfully
    called modules: ntkrnlpa.exe CLASSPNP.SYS disk.sys ACPI.sys hal.dll >>UNKNOWN [0x8824378A]<<
    kernel: MBR read successfully
    detected MBR rootkit hooks:
    \Driver\Disk -> CLASSPNP.SYS @ 0xba0ecf28
    \Driver\ACPI -> ACPI.sys @ 0xb9f7fcb8
    \Driver\atapi -> ntkrnlpa.exe @ 0x80586e11
    IoDeviceObjectType -> DeleteProcedure -> ntkrnlpa.exe @ 0x805836a8
    ParseProcedure -> ntkrnlpa.exe @ 0x805827e8
    \Device\Harddisk0\DR0 -> DeleteProcedure -> ntkrnlpa.exe @ 0x805836a8
    ParseProcedure -> ntkrnlpa.exe @ 0x805827e8
    NDIS: Realtek RTL8168C(P)/8111C(P) PCI-E Gigabit Ethernet NIC -> SendCompleteHandler -> 0x882a9b60
    PacketIndicateHandler -> NDIS.sys @ 0xb9e2aa21
    SendHandler -> NDIS.sys @ 0xb9e0887b
    copy of MBR has been found in sector 0x01D1C06C0
    malicious code @ sector 0x01D1C06C3 !
    PE file found in sector at 0x01D1C06D9 !
    MBR rootkit infection detected ! Use: "mbr.exe -f" to fix.

    **************************************************************************
    .
    --------------------- LOCKED REGISTRY KEYS ---------------------

    [HKEY_LOCAL_MACHINE\software\Microsoft\Windows NT\CurrentVersion\WPAEvents]
    @Denied: (Full) (LocalSystem)
    "OOBETimer"=hex:ff,d5,71,d6,8b,6a,8d,6f,d5,33,93,fd
    "LastWPAEventLogged"=hex:d5,07,05,00,06,00,07,00,0f,00,38,00,24,00,fd,02
    .
    --------------------- DLLs Loaded Under Running Processes ---------------------

    - - - - - - - > 'winlogon.exe'(544)
    c:\windows\system32\Ati2evxx.dll

    - - - - - - - > 'explorer.exe'(6744)
    c:\windows\system32\WPDShServiceObj.dll
    c:\windows\system32\PortableDeviceTypes.dll
    c:\windows\system32\PortableDeviceApi.dll
    .
    ------------------------ Other Running Processes ------------------------
    .
    c:\windows\system32\Ati2evxx.exe
    c:\program files\Alwil Software\Avast5\AvastSvc.exe
    c:\windows\system32\Ati2evxx.exe
    c:\windows\RTHDCPL.EXE
    c:\program files\ATI Technologies\ATI.ACE\Core-Static\MOM.exe
    c:\program files\Lexmark 5200 series\lxbtbmon.exe
    c:\program files\ATI Technologies\ATI.ACE\Core-Static\ccc.exe
    c:\program files\Bonjour\mDNSResponder.exe
    c:\program files\Nero\Nero 7\InCD\InCDsrv.exe
    c:\program files\Java\jre6\bin\jqs.exe
    c:\windows\system32\wscntfy.exe
    .
    **************************************************************************
    .
    Completion time: 2010-07-04 15:51:55 - machine was rebooted
    ComboFix-quarantined-files.txt 2010-07-04 19:51

    Pre-Run: 237,775,470,592 bytes free
    Post-Run: 237,654,577,152 bytes free

    WindowsXP-KB310994-SP2-Pro-BootDisk-ENU.exe
    [boot loader]
    timeout=2
    default=multi(0)disk(0)rdisk(0)partition(1)\WINDOWS
    [operating systems]
    c:\cmdcons\BOOTSECT.DAT="Microsoft Windows Recovery Console" /cmdcons
    multi(0)disk(0)rdisk(0)partition(1)\WINDOWS="Microsoft Windows XP Professional" /noexecute=optin /fastdetect /usepmtimer

    - - End Of File - - 9463A8EBF631717080E97BB8B8CBA124
     

    Attached Files:

  4. Broni

    Broni Malware Annihilator Posts: 52,904   +344

    Download the MBR Rootkit Detector: http://www2.gmer.net/mbr/mbr.exe to your desktop.

    * Doubleclick mbr.exe and follow prompts (Vista users: right click on mbr.exe and click "Run As Administrator").
    * A black DOS window will quickly appear then disappear.
    * When mbr.exe is finished it will create a log on your desktop.
    * Copy and paste contents of that log (mbr.log) file to your next reply.
     
  5. TickyBox

    TickyBox TS Rookie Topic Starter

    Stealth MBR rootkit/Mebroot/Sinowal detector 0.3.7 by Gmer, http://www.gmer.net

    device: opened successfully
    user: MBR read successfully
    kernel: MBR read successfully
    copy of MBR has been found in sector 0x01D1C06C0
    malicious code @ sector 0x01D1C06C3 !
    PE file found in sector at 0x01D1C06D9 !
    MBR rootkit infection detected ! Use: "mbr.exe -f" to fix.
     
  6. Broni

    Broni Malware Annihilator Posts: 52,904   +344

    Go Start>Run (Vista/7 users "Start search"), type in:
    cmd
    Click OK (Vista/7 users, hold CTRL and SHIFT keys, press Enter)

    At the DOS prompt copy/paste:
    "%userprofile%\desktop\mbr.exe" -f (<------make sure you have a space before the -f)
    Hit Enter.

    Type:
    exit
    Hit Enter.

    Restart the computer normally.

    Run the mbr.exe again.
    Post new log.
     
  7. TickyBox

    TickyBox TS Rookie Topic Starter

    Stealth MBR rootkit/Mebroot/Sinowal detector 0.3.7 by Gmer, http://www.gmer.net

    device: opened successfully
    user: MBR read successfully
    kernel: MBR read successfully
    user & kernel MBR OK
    copy of MBR has been found in sector 0x01D1C06C0
    malicious code @ sector 0x01D1C06C3 !
    PE file found in sector at 0x01D1C06D9 !
     
  8. Broni

    Broni Malware Annihilator Posts: 52,904   +344

    Very good :)

    Delete your GMER file, download fresh one and post new log.
    Delete your Combofix file, download fresh one and post new log.
     
  9. TickyBox

    TickyBox TS Rookie Topic Starter

    Here's the combofix log. The new GMER one is in the attachment.

    ComboFix 10-07-04.01 - Mitch 07/04/2010 16:41:55.2.2 - x86
    Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.1918.1366 [GMT -4:00]
    Running from: c:\documents and settings\Mitch\Desktop\ComboFix.exe
    AV: avast! Antivirus *On-access scanning disabled* (Updated) {7591DB91-41F0-48A3-B128-1A293FD8233D}
    .

    ((((((((((((((((((((((((( Files Created from 2010-06-04 to 2010-07-04 )))))))))))))))))))))))))))))))
    .

    2010-07-02 23:19 . 2010-07-02 23:19 -------- d-----w- c:\program files\ATI
    2010-07-02 22:42 . 2010-06-28 20:37 165456 ----a-w- c:\windows\system32\drivers\aswSP.sys
    2010-07-02 22:42 . 2010-06-28 20:32 17744 ----a-w- c:\windows\system32\drivers\aswFsBlk.sys
    2010-07-02 22:42 . 2010-06-28 20:33 23376 ----a-w- c:\windows\system32\drivers\aswRdr.sys
    2010-07-02 22:42 . 2010-06-28 20:37 46672 ----a-w- c:\windows\system32\drivers\aswTdi.sys
    2010-07-02 22:42 . 2010-06-28 20:32 100176 ----a-w- c:\windows\system32\drivers\aswmon2.sys
    2010-07-02 22:42 . 2010-06-28 20:32 94544 ----a-w- c:\windows\system32\drivers\aswmon.sys
    2010-07-02 22:42 . 2010-06-28 20:32 28880 ----a-w- c:\windows\system32\drivers\aavmker4.sys
    2010-07-02 22:41 . 2010-06-28 20:57 38848 ----a-w- c:\windows\avastSS.scr
    2010-07-02 22:41 . 2010-06-28 20:57 165032 ----a-w- c:\windows\system32\aswBoot.exe
    2010-07-02 22:41 . 2010-07-02 22:41 -------- d-----w- c:\documents and settings\All Users\Application Data\Alwil Software
    2010-07-02 21:56 . 2010-07-02 21:59 -------- d-----w- c:\documents and settings\Mitch\Local Settings\Application Data\Runscanner.net
    2010-07-02 21:43 . 2010-07-04 19:40 -------- d-----w- c:\windows\system32\NtmsData
    2010-07-02 21:32 . 2010-07-04 20:41 -------- d-----w- c:\windows\system32\CatRoot2
    2010-07-02 20:51 . 2010-07-02 20:51 -------- d-----w- c:\documents and settings\All Users\Application Data\SUPERAntiSpyware.com
    2010-06-25 00:42 . 2010-06-25 00:42 -------- d-----w- c:\program files\Sophos
    2010-06-24 22:45 . 2010-06-24 22:45 -------- d-----w- c:\program files\Seagate
    2010-06-24 22:43 . 2010-06-24 22:46 -------- d-----w- c:\windows\SxsCaPendDel
    2010-06-24 22:42 . 2010-06-24 22:42 -------- d-----w- c:\program files\Common Files\Wise Installation Wizard
    2010-06-24 22:40 . 2010-06-24 22:41 592 ----a-w- c:\windows\chgkey.vbs
    2010-06-24 22:29 . 2010-06-24 22:29 -------- d-----w- c:\documents and settings\Mitch\Application Data\Malwarebytes
    2010-06-24 22:28 . 2010-06-24 22:28 -------- d-----w- c:\documents and settings\All Users\Application Data\Malwarebytes
    2010-06-24 22:28 . 2010-04-29 19:39 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
    2010-06-24 22:28 . 2010-06-24 22:28 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
    2010-06-24 22:28 . 2010-04-29 19:39 20952 ----a-w- c:\windows\system32\drivers\mbam.sys
    2010-06-24 22:21 . 2010-07-02 23:04 -------- d-----w- c:\documents and settings\Mitch\Application Data\QuickScan
    2010-06-24 21:28 . 2010-07-03 23:26 -------- d-----w- c:\documents and settings\All Users\Application Data\Spybot - Search & Destroy
    2010-06-24 21:28 . 2010-06-24 21:31 -------- d-----w- c:\program files\Spybot - Search & Destroy
    2010-06-23 13:15 . 2008-04-14 00:11 21504 -c--a-w- c:\windows\system32\dllcache\hidserv.dll
    2010-06-23 13:15 . 2008-04-14 00:11 21504 ----a-w- c:\windows\system32\hidserv.dll
    2010-06-19 11:21 . 2010-06-19 11:21 -------- d-----w- c:\documents and settings\Mitch\Application Data\ArcSoft
    2010-06-10 18:37 . 2010-06-10 18:37 -------- d-----w- c:\documents and settings\HelpAssistant\UserData
    2010-06-10 18:37 . 2008-09-23 01:18 1076 ----a-w- c:\documents and settings\HelpAssistant\XP.reg

    .
    (((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
    .
    2010-07-02 22:41 . 2008-09-22 23:25 -------- d-----w- c:\program files\Alwil Software
    2010-07-02 21:51 . 2008-09-22 22:19 42944 ----a-w- c:\documents and settings\Mitch\Local Settings\Application Data\GDIPFONTCACHEV1.DAT
    2010-07-01 01:23 . 2008-10-25 17:22 -------- d-----w- c:\program files\Lx_cats
    2010-06-23 16:29 . 2009-07-29 02:02 20 ---h--w- c:\documents and settings\All Users\Application Data\PKP_DLdw.DAT
    2010-06-23 16:18 . 2009-07-29 01:59 20 ---h--w- c:\documents and settings\All Users\Application Data\PKP_DLdu.DAT
    2010-05-27 11:01 . 2010-05-27 11:01 61440 ----a-w- c:\documents and settings\Mitch\Application Data\Sun\Java\Deployment\SystemCache\6.0\50\5535ab32-4dc00619-n\decora-sse.dll
    2010-05-27 11:01 . 2010-05-27 11:01 503808 ----a-w- c:\documents and settings\Mitch\Application Data\Sun\Java\Deployment\SystemCache\6.0\46\f84c6ae-19ddcafc-n\msvcp71.dll
    2010-05-27 11:01 . 2010-05-27 11:01 499712 ----a-w- c:\documents and settings\Mitch\Application Data\Sun\Java\Deployment\SystemCache\6.0\46\f84c6ae-19ddcafc-n\jmc.dll
    2010-05-27 11:01 . 2010-05-27 11:01 348160 ----a-w- c:\documents and settings\Mitch\Application Data\Sun\Java\Deployment\SystemCache\6.0\46\f84c6ae-19ddcafc-n\msvcr71.dll
    2010-05-27 11:01 . 2010-05-27 11:01 12800 ----a-w- c:\documents and settings\Mitch\Application Data\Sun\Java\Deployment\SystemCache\6.0\50\5535ab32-4dc00619-n\decora-d3d.dll
    2010-05-14 17:23 . 2010-02-03 22:07 -------- d-----w- c:\program files\Google
    2010-05-02 05:22 . 2004-08-04 12:00 1851264 ----a-w- c:\windows\system32\win32k.sys
    2010-04-20 05:30 . 2004-08-04 12:00 285696 ----a-w- c:\windows\system32\atmfd.dll
    2010-04-16 16:09 . 2004-08-04 12:00 667136 ----a-w- c:\windows\system32\wininet.dll
    2010-04-16 16:09 . 2004-08-04 12:00 81920 ----a-w- c:\windows\system32\ieencode.dll
    2010-04-12 21:29 . 2010-05-05 11:08 411368 ----a-w- c:\windows\system32\deployJava1.dll
    .

    ((((((((((((((((((((((((((((( SnapShot@2010-07-04_19.48.05 )))))))))))))))))))))))))))))))))))))))))
    .
    + 2010-07-04 20:25 . 2010-07-04 20:25 16384 c:\windows\Temp\Perflib_Perfdata_960.dat
    .
    ((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
    .
    .
    *Note* empty entries & legit default entries are not shown
    REGEDIT4

    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
    "StartCCC"="c:\program files\ATI Technologies\ATI.ACE\Core-Static\CLIStart.exe" [2008-01-21 61440]
    "RTHDCPL"="RTHDCPL.EXE" [2007-12-20 16860672]
    "NeroFilterCheck"="c:\program files\Common Files\Ahead\Lib\NeroCheck.exe" [2007-03-01 153136]
    "SecurDisc"="c:\program files\Nero\Nero 7\InCD\NBHGui.exe" [2007-11-26 1629480]
    "InCD"="c:\program files\Nero\Nero 7\InCD\InCD.exe" [2007-11-26 1057064]
    "Lexmark 5200 series"="c:\program files\Lexmark 5200 series\lxbtbmgr.exe" [2004-03-25 57344]
    "FaxCenterServer"="c:\program files\Lexmark Fax Solutions\fm3032.exe" [2004-03-23 294912]
    "QuickTime Task"="c:\program files\QuickTime\QTTask.exe" [2007-12-11 286720]
    "Nikon Transfer Monitor"="c:\program files\Common Files\Nikon\Monitor\NkMonitor.exe" [2008-09-30 485208]
    "SunJavaUpdateSched"="c:\program files\Common Files\Java\Java Update\jusched.exe" [2010-02-18 248040]
    "Adobe ARM"="c:\program files\Common Files\Adobe\ARM\1.0\AdobeARM.exe" [2010-06-09 976832]
    "Adobe Reader Speed Launcher"="c:\program files\Adobe\Reader 9.0\Reader\Reader_sl.exe" [2010-06-20 35760]
    "avast5"="c:\progra~1\ALWILS~1\Avast5\avastUI.exe" [2010-06-28 2837864]
    "LXBTCATS"="c:\windows\system32\spool\DRIVERS\W32X86\3\LXBTtime.dll" [2004-03-17 65536]

    [HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]
    "EnableFirewall"= 0 (0x0)

    [HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
    "%windir%\\system32\\sessmgr.exe"=

    [HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\GloballyOpenPorts\List]
    "65533:TCP"= 65533:TCP:Services
    "52344:TCP"= 52344:TCP:Services
    "7018:TCP"= 7018:TCP:Services
    "7019:TCP"= 7019:TCP:Services
    "3389:TCP"= 3389:TCP:Remote Desktop
    "5957:TCP"= 5957:TCP:Services
    "5958:TCP"= 5958:TCP:Services
    "7414:TCP"= 7414:TCP:Services
    "4457:TCP"= 4457:TCP:Services

    R1 aswSP;aswSP;c:\windows\system32\drivers\aswSP.sys [7/2/2010 6:42 PM 165456]
    R2 aswFsBlk;aswFsBlk;c:\windows\system32\drivers\aswFsBlk.sys [7/2/2010 6:42 PM 17744]
    S2 gupdate;Google Update Service (gupdate);c:\program files\Google\Update\GoogleUpdate.exe [2/3/2010 6:07 PM 135664]
    .
    Contents of the 'Scheduled Tasks' folder

    2010-07-04 c:\windows\Tasks\GoogleUpdateTaskMachineCore.job
    - c:\program files\Google\Update\GoogleUpdate.exe [2010-02-03 22:07]

    2010-07-04 c:\windows\Tasks\GoogleUpdateTaskMachineUA.job
    - c:\program files\Google\Update\GoogleUpdate.exe [2010-02-03 22:07]

    2010-07-04 c:\windows\Tasks\WGASetup.job
    - c:\windows\system32\KB905474\wgasetup.exe [2009-06-01 02:18]
    .
    .
    ------- Supplementary Scan -------
    .
    uInternet Settings,ProxyOverride = *.local
    IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~2\OFFICE11\EXCEL.EXE/3000
    FF - ProfilePath - c:\documents and settings\Mitch\Application Data\Mozilla\Firefox\Profiles\hz8m92p6.default\
    FF - prefs.js: browser.startup.homepage - hxxp://www.msnbc.com
    FF - plugin: c:\documents and settings\Mitch\Local Settings\Application Data\Yahoo!\BrowserPlus\2.8.1\Plugins\npybrowserplus_2.8.1.dll
    FF - plugin: c:\program files\Google\Google Earth\plugin\npgeplugin.dll
    FF - plugin: c:\program files\Google\Update\1.2.183.23\npGoogleOneClick8.dll
    FF - plugin: c:\program files\Mozilla Firefox\plugins\npdeployJava1.dll
    FF - HiddenExtension: Microsoft .NET Framework Assistant: {20a82645-c095-46ed-80e3-08825760534b} - c:\windows\Microsoft.NET\Framework\v3.5\Windows Presentation Foundation\DotNetAssistantExtension\

    ---- FIREFOX POLICIES ----
    FF - user.js: yahoo.homepage.dontask - truec:\program files\Mozilla Firefox\greprefs\all.js - pref("ui.use_native_colors", true);
    c:\program files\Mozilla Firefox\greprefs\all.js - pref("network.IDN.whitelist.lu", true);
    c:\program files\Mozilla Firefox\greprefs\all.js - pref("network.IDN.whitelist.nu", true);
    c:\program files\Mozilla Firefox\greprefs\all.js - pref("network.IDN.whitelist.nz", true);
    c:\program files\Mozilla Firefox\greprefs\all.js - pref("network.IDN.whitelist.xn--mgberp4a5d4ar", true);
    c:\program files\Mozilla Firefox\greprefs\all.js - pref("network.IDN.whitelist.xn--p1ai", true);
    c:\program files\Mozilla Firefox\greprefs\all.js - pref("network.IDN.whitelist.xn--mgbayh7gpa", true);
    c:\program files\Mozilla Firefox\greprefs\all.js - pref("network.IDN.whitelist.tel", true);
    c:\program files\Mozilla Firefox\greprefs\all.js - pref("network.auth.force-generic-ntlm", false);
    c:\program files\Mozilla Firefox\greprefs\all.js - pref("network.proxy.type", 5);
    c:\program files\Mozilla Firefox\greprefs\all.js - pref("dom.ipc.plugins.timeoutSecs", 45);
    c:\program files\Mozilla Firefox\greprefs\all.js - pref("svg.smil.enabled", false);
    c:\program files\Mozilla Firefox\greprefs\all.js - pref("accelerometer.enabled", true);
    c:\program files\Mozilla Firefox\greprefs\security-prefs.js - pref("security.ssl.allow_unrestricted_renego_everywhere__temporarily_available_pref", true);
    c:\program files\Mozilla Firefox\greprefs\security-prefs.js - pref("security.ssl.renego_unrestricted_hosts", "");
    c:\program files\Mozilla Firefox\greprefs\security-prefs.js - pref("security.ssl.treat_unsafe_negotiation_as_broken", false);
    c:\program files\Mozilla Firefox\greprefs\security-prefs.js - pref("security.ssl.require_safe_negotiation", false);
    c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("extensions.{972ce4c6-7e08-4474-a285-3208198ce6fd}.name", "chrome://browser/locale/browser.properties");
    c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("extensions.{972ce4c6-7e08-4474-a285-3208198ce6fd}.description", "chrome://browser/locale/browser.properties");
    c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("plugins.update.notifyUser", false);
    c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("dom.ipc.plugins.enabled.nptest.dll", true);
    c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("dom.ipc.plugins.enabled.npswf32.dll", true);
    c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("dom.ipc.plugins.enabled.npctrl.dll", true);
    c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("dom.ipc.plugins.enabled.npqtplugin.dll", true);
    c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("dom.ipc.plugins.enabled", false);
    .

    **************************************************************************

    catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
    Rootkit scan 2010-07-04 16:44
    Windows 5.1.2600 Service Pack 3 NTFS

    scanning hidden processes ...

    scanning hidden autostart entries ...

    HKLM\Software\Microsoft\Windows\CurrentVersion\Run
    LXBTCATS = rundll32 c:\windows\system32\spool\DRIVERS\W32X86\3\LXBTtime.dll,_RunDLLEntry@16???????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????

    scanning hidden files ...

    scan completed successfully
    hidden files: 0

    **************************************************************************
    .
    --------------------- LOCKED REGISTRY KEYS ---------------------

    [HKEY_LOCAL_MACHINE\software\Microsoft\Windows NT\CurrentVersion\WPAEvents]
    @Denied: (Full) (LocalSystem)
    "OOBETimer"=hex:ff,d5,71,d6,8b,6a,8d,6f,d5,33,93,fd
    "LastWPAEventLogged"=hex:d5,07,05,00,06,00,07,00,0f,00,38,00,24,00,fd,02
    .
    --------------------- DLLs Loaded Under Running Processes ---------------------

    - - - - - - - > 'winlogon.exe'(536)
    c:\windows\system32\Ati2evxx.dll

    - - - - - - - > 'explorer.exe'(13204)
    c:\windows\system32\WPDShServiceObj.dll
    c:\windows\system32\PortableDeviceTypes.dll
    c:\windows\system32\PortableDeviceApi.dll
    .
    Completion time: 2010-07-04 16:45:33
    ComboFix-quarantined-files.txt 2010-07-04 20:45
    ComboFix2.txt 2010-07-04 19:51

    Pre-Run: 237,633,007,616 bytes free
    Post-Run: 237,619,322,880 bytes free

    - - End Of File - - 4FFD3329C23A6D8A147C1F6107D82B71
     

    Attached Files:

  10. Broni

    Broni Malware Annihilator Posts: 52,904   +344

    Looks good :)
    How is your computer doing at the moment?

    Uninstall Combofix:
    Go Start > Run [Vista users, go Start>"Start search"]
    Type in:
    Combofix /Uninstall
    Note the space between the "Combofix" and the "/Uninstall"
    Click OK (Vista users - press Enter).
    Restart computer.

    ======================================================================

    Download OTL to your Desktop.

    * Double click on the icon to run it. Make sure all other windows are closed and to let it run uninterrupted.
    * Under the Custom Scan box paste this in:



    netsvcs
    drivers32 /all
    %SYSTEMDRIVE%\*.*
    %systemroot%\system32\Spool\prtprocs\w32x86\*.dll
    %systemroot%\system32\*.wt
    %systemroot%\system32\*.ruy
    %systemroot%\Fonts\*.com
    %systemroot%\Fonts\*.dll
    %systemroot%\system32\spool\prtprocs\w32x86\*.tmp
    %systemroot%\*. /mp /s
    /md5start
    /md5stop
    CREATERESTOREPOINT
    %systemroot%\system32\*.dll /lockedfiles
    %systemroot%\Tasks\*.job /lockedfiles
    %systemroot%\System32\config\*.sav
    %systemroot%\system32\user32.dll /md5
    %systemroot%\system32\ws2_32.dll /md5
    %systemroot%\system32\ws2help.dll /md5
    HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate\Auto Update\Results\Install|LastSuccessTime /rs



    * Click the Quick Scan button. Do not change any settings unless otherwise told to do so. The scan wont take long.
    • When the scan completes, it will open two notepad windows: OTL.txt and Extras.txt. These are saved in the same location as OTL.
    • Please copy (Edit->Select All, Edit->Copy) the contents of these files, one at a time, and post them back here.
     
  11. TickyBox

    TickyBox TS Rookie Topic Starter

    It did lock up again when I ran GMER earlier and tried to save the log and I wound up having to hit the reset button and rerun the program. It also hung a bit on reboot after I uninstalled combofix. Here's the two other logs.
     

    Attached Files:

  12. Broni

    Broni Malware Annihilator Posts: 52,904   +344

    Sometimes, it happens with those programs, especially with GMER.


    Run OTL
    • Under the Custom Scans/Fixes box at the bottom, paste in the following

      Code:
      :OTL
      DRV - File not found [Kernel | On_Demand | Stopped] -- C:\DOCUME~1\Mitch\LOCALS~1\Temp\catchme.sys -- (catchme)
      
      
      :Services
      
      :Reg
      
      :Files
      
      :Commands
      [purity]
      [emptytemp]
      [emptyflash]
      [resethosts]
      [Reboot]
    • Then click the Run Fix button at the top
    • Let the program run unhindered, reboot the PC when it is done
    • You will get a log that shows the results of the fix. Please post it.
     
  13. TickyBox

    TickyBox TS Rookie Topic Starter

    All processes killed
    ========== OTL ==========
    Service catchme stopped successfully!
    Service catchme deleted successfully!
    File C:\DOCUME~1\Mitch\LOCALS~1\Temp\catchme.sys not found.
    ========== SERVICES/DRIVERS ==========
    ========== REGISTRY ==========
    ========== FILES ==========
    ========== COMMANDS ==========

    [EMPTYTEMP]

    User: All Users

    User: Default User
    ->Temp folder emptied: 0 bytes
    ->Temporary Internet Files folder emptied: 0 bytes

    User: HelpAssistant
    ->Temp folder emptied: 615189 bytes
    ->Temporary Internet Files folder emptied: 402 bytes
    ->Java cache emptied: 2027 bytes
    ->FireFox cache emptied: 1971369 bytes
    ->Flash cache emptied: 0 bytes

    User: LocalService
    ->Temp folder emptied: 0 bytes
    ->Temporary Internet Files folder emptied: 32902 bytes

    User: Mitch
    ->Temp folder emptied: 589899 bytes
    ->Temporary Internet Files folder emptied: 33170 bytes
    ->Java cache emptied: 2027 bytes
    ->FireFox cache emptied: 39351205 bytes
    ->Flash cache emptied: 0 bytes

    User: NetworkService
    ->Temp folder emptied: 0 bytes
    ->Temporary Internet Files folder emptied: 33170 bytes

    %systemdrive% .tmp files removed: 0 bytes
    %systemroot% .tmp files removed: 0 bytes
    %systemroot%\System32 .tmp files removed: 0 bytes
    %systemroot%\System32\dllcache .tmp files removed: 0 bytes
    %systemroot%\System32\drivers .tmp files removed: 0 bytes
    Windows Temp folder emptied: 33023 bytes
    %systemroot%\system32\config\systemprofile\Local Settings\Temp folder emptied: 0 bytes
    %systemroot%\system32\config\systemprofile\Local Settings\Temporary Internet Files folder emptied: 0 bytes
    RecycleBin emptied: 0 bytes

    Total Files Cleaned = 41.00 mb


    [EMPTYFLASH]

    User: All Users

    User: Default User

    User: HelpAssistant
    ->Flash cache emptied: 0 bytes

    User: LocalService

    User: Mitch
    ->Flash cache emptied: 0 bytes

    User: NetworkService

    Total Flash Files Cleaned = 0.00 mb

    C:\WINDOWS\System32\drivers\etc\Hosts moved successfully.
    HOSTS file reset successfully

    OTL by OldTimer - Version 3.2.7.1 log created on 07042010_204814

    Files\Folders moved on Reboot...
    File move failed. C:\WINDOWS\temp\_avast5_\Webshlock.txt scheduled to be moved on reboot.

    Registry entries deleted on Reboot...
     
  14. Broni

    Broni Malware Annihilator Posts: 52,904   +344

    Good :)

    1. Download Temp File Cleaner (TFC)
    Double click on TFC.exe to run the program.
    Click on Start button to begin cleaning process.
    TFC will close all running programs, and it may ask you to restart computer.


    2. Go to Kaspersky website and perform an online antivirus scan.

    1. Disable your active antivirus program.
    2. Read through the requirements and privacy statement and click on Accept button.
    3. It will start downloading and installing the scanner and virus definitions. You will be prompted to install an application from Kaspersky. Click Run.
    4. When the downloads have finished, click on Settings.
    5. Make sure these boxes are checked (ticked). If they are not, please tick them and click on the Save button:

    • Spyware, Adware, Dialers, and other potentially dangerous programs
      [*] Archives
      [*] Mail databases
    6. Click on My Computer under Scan.
    7. Once the scan is complete, it will display the results. Click on View Scan Report.
    8. You will see a list of infected items there. Click on Save Report As....
    9. Save this report to a convenient place. Change the Files of type to Text file (.txt) before clicking on the Save button. Then post it here.
     
  15. TickyBox

    TickyBox TS Rookie Topic Starter

    --------------------------------------------------------------------------------
    KASPERSKY ONLINE SCANNER 7.0: scan report
    Sunday, July 4, 2010
    Operating system: Microsoft Windows XP Professional Service Pack 3 (build 2600)
    Kaspersky Online Scanner version: 7.0.26.13
    Last database update: Sunday, July 04, 2010 18:22:01
    Records in database: 4246361
    --------------------------------------------------------------------------------

    Scan settings:
    scan using the following database: extended
    Scan archives: yes
    Scan e-mail databases: yes

    Scan area - My Computer:
    C:\
    D:\
    E:\

    Scan statistics:
    Objects scanned: 63723
    Threats found: 2
    Infected objects found: 2
    Suspicious objects found: 0
    Scan duration: 00:57:55


    File name / Threat / Threats count
    C:\Documents and Settings\Mitch\My Documents\Downloads\kcleaner.exe Infected: not-a-virus:AdWare.Win32.Relevant.p 1
    C:\Documents and Settings\Mitch\My Documents\Downloads\kcleaner.exe Infected: not-a-virus:AdWare.Win32.Relevant.q 1

    Selected area has been scanned.
     
  16. Broni

    Broni Malware Annihilator Posts: 52,904   +344

    Just one file, not really dangerous, but get rid of it (kcleaner.exe)
    Empty Recycle Bin afterward.

    Then....

    OTL Clean-Up
    Clean up with OTL:

    * Double-click OTL.exe to start the program.
    * Close all other programs apart from OTL as this step will require a reboot
    * On the OTL main screen, press the CLEANUP button
    * Say Yes to the prompt and then allow the program to reboot your computer.

    If you still have any tools or logs leftover on your computer you can go ahead and delete those off of your computer now.

    =====================================================================

    Your computer is clean [​IMG]

    1. We need to reset system restore to prevent your computer from being accidentally reinfected by using some old restore point(s). We'll create fresh, clean restore point.

    Turn off System Restore:

    - Windows XP:
    1. Click Start.
    2. Right-click the My Computer icon, and then click Properties.
    3. Click the System Restore tab.
    4. Check "Turn off System Restore".
    5. Click Apply.
    6. When turning off System Restore, the existing restore points will be deleted. Click Yes to do this.
    7. Click OK.
    - Windows Vista and 7:
    1. Click Start.
    2. Right-click the Computer icon, and then click Properties.
    3. Click on System Protection under the Tasks column on the left side
    4. Click on Continue on the "User Account Control" window that pops up
    5. Under the System Protection tab, find Available Disks
    6. Uncheck the box for any drive you wish to disable system restore on (in most cases, drive "C:")
    7. When turning off System Restore, the existing restore points will be deleted. Click "Turn System Restore Off" on the popup window to do this.
    8. Click OK

    2. Restart computer.

    3. Turn System Restore on.

    4. Make sure, Windows Updates are current.

    5. If any Trojan was listed among your infection(s), make sure, you change all of your on-line important passwords (bank account(s), secured web sites, etc.) immediately!

    6. Download, and install WOT (Web OF Trust): http://www.mywot.com/. It'll warn you (in most cases) about dangerous web sites.

    7. Run defrag at your convenience.

    8. Read How did I get infected?, With steps so it does not happen again!: http://www.bleepingcomputer.com/forums/topic2520.html

    9. Please, let me know, how is your computer doing.
     
  17. TickyBox

    TickyBox TS Rookie Topic Starter

    Things seem to be ok so far. There was a bit of a hang on reboot, but that was program based as it didn't do that when I rebooted from the start menu. Nothing has frozen on me yet, but if it does I'll let you know. Thank you so much for everything. You've been a tremendous help. ^^
     
  18. Broni

    Broni Malware Annihilator Posts: 52,904   +344

    Way to go!! [​IMG]
    Good luck and stay safe :)
     
Topic Status:
Not open for further replies.

Similar Topics

Add New Comment

You need to be a member to leave a comment. Join thousands of tech enthusiasts and participate.
TechSpot Account You may also...