Jump to content

Welcome to Geeks to Go - Register now for FREE

Need help with your computer or device? Want to learn new tech skills? You're in the right place!
Geeks to Go is a friendly community of tech experts who can solve any problem you have. Just create a free account and post your question. Our volunteers will reply quickly and guide you through the steps. Don't let tech troubles stop you. Join Geeks to Go now and get the support you need!

How it Works Create Account
Photo

FBI Virus -- Win7 Home 64-bit [Solved]


  • This topic is locked This topic is locked

#46
cramit02

cramit02

    Member

  • Topic Starter
  • Member
  • PipPip
  • 78 posts
I went to C:\WINDOWS\system32\drivers\etc\Hosts but there is only 1 line in it and it's the Chinese jargon. Want me to 100% remove the line leaving a blank file? Or is that not the proper process to remove?
  • 0

Advertisements


#47
Essexboy

Essexboy

    GeekU Moderator

  • Retired Staff
  • 69,964 posts
Nope that will work
  • 0

#48
cramit02

cramit02

    Member

  • Topic Starter
  • Member
  • PipPip
  • 78 posts
Hosts file cleared of jargon. I'm looking in to a Windows Validation issue that's presented itself on this machine as well... unsure if it was an issue before it was sent to me or not. -- What's your diagnosis, Doc?
  • 0

#49
Essexboy

Essexboy

    GeekU Moderator

  • Retired Staff
  • 69,964 posts
Some malware does mess up the windows validation.. Try this MS Fixit http://support.microsoft.com/kb/916247
  • 0

#50
cramit02

cramit02

    Member

  • Topic Starter
  • Member
  • PipPip
  • 78 posts
Windows is Genuine and Validated. The date was off by a few hours/timezone... didn't think that'd make the difference but it apparently did.
  • 0

#51
Essexboy

Essexboy

    GeekU Moderator

  • Retired Staff
  • 69,964 posts
How is this baby behaving now ?

Please download Malwarebytes Anti-Malware to your desktop.

  • Right-click and Run as Administrator mbam-setup.exe and follow the prompts to install the program.
  • At the end, be sure a checkmark is placed next to Update Malwarebytes Anti-Malware and Launch Malwarebytes Anti-Malware, then click Finish.
  • If an update is found, it will download and install the latest version.
  • Once the program has loaded, select Perform quick scan, then click Scan as shown below.

    Posted Image
  • When the scan is complete, click OK, then Show Results to view the results.
  • Be sure that everything is checked, and click Remove Selected.
  • When completed, a log will open in Notepad. Please save it to a convenient location and post the results.


The log can also be found here:

Windows 2000 & Windows XP:
C:\Documents and Settings\<USERNAME>\Application Data\Malwarebytes\Malwarebytes' Anti-Malware\Logs

Windows Vista & Win7:
C:\Users\<USERNAME>\AppData\Roaming\Malwarebytes\Malwarebytes' Anti-Malware\Logs
----------
  • 0

#52
cramit02

cramit02

    Member

  • Topic Starter
  • Member
  • PipPip
  • 78 posts
MBAM Log:

Malwarebytes Anti-Malware 1.75.0.1300
www.malwarebytes.org

Database version: v2013.06.21.06

Windows XP Service Pack 3 x86 NTFS
Internet Explorer 8.0.6001.18702
eamuser :: AUSR-EAM-01 [administrator]

6/21/2013 3:29:21 PM
mbam-log-2013-06-21 (15-29-21).txt

Scan type: Quick scan
Scan options enabled: Memory | Startup | Registry | File System | Heuristics/Extra | Heuristics/Shuriken | PUP | PUM
Scan options disabled: P2P
Objects scanned: 218089
Time elapsed: 3 minute(s), 29 second(s)

Memory Processes Detected: 0
(No malicious items detected)

Memory Modules Detected: 0
(No malicious items detected)

Registry Keys Detected: 0
(No malicious items detected)

Registry Values Detected: 0
(No malicious items detected)

Registry Data Items Detected: 3
HKLM\SOFTWARE\Microsoft\Security Center|AntiVirusDisableNotify (PUM.Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> Quarantined and repaired successfully.
HKLM\SOFTWARE\Microsoft\Security Center|FirewallDisableNotify (PUM.Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> Quarantined and repaired successfully.
HKLM\SOFTWARE\Microsoft\Security Center|UpdatesDisableNotify (PUM.Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> Quarantined and repaired successfully.

Folders Detected: 0
(No malicious items detected)

Files Detected: 0
(No malicious items detected)

(end)
  • 0

#53
Essexboy

Essexboy

    GeekU Moderator

  • Retired Staff
  • 69,964 posts
Looks good, I appear to have got the lot :)

Are you happy with the performance now ?
  • 0

#54
cramit02

cramit02

    Member

  • Topic Starter
  • Member
  • PipPip
  • 78 posts
Normal system seems to be 100% A-OK, boots right up w/o delay or odd screens, scans are coming up clean... I'm good. My only remaining issue is Safe Mode. I rebooted the machine and tried to get in to safe mode and it still looped back to the initial hp screen.
  • 0

#55
cramit02

cramit02

    Member

  • Topic Starter
  • Member
  • PipPip
  • 78 posts
I just ran SUPERAntiSpyware for laughs, it found a WinLogon malware trace... Removed threats.

SAS Log:

SUPERAntiSpyware Scan Log
http://www.superantispyware.com

Generated 06/21/2013 at 03:50 PM

Application Version : 5.6.1020

Core Rules Database Version : 10551
Trace Rules Database Version: 8363

Scan type : Quick Scan
Total Scan Time : 00:03:58

Operating System Information
Windows XP Professional 32-bit, Service Pack 3 (Build 5.01.2600)
Administrator

Memory items scanned : 522
Memory threats detected : 0
Registry items scanned : 32533
Registry threats detected : 1
File items scanned : 6413
File threats detected : 87

Malware.Trace
HKU\S-1-5-21-1085031214-1844823847-1177238915-1003\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINLOGON#SHELL

Adware.Tracking Cookie
C:\Documents and Settings\eamuser\Cookies\4XC7OMI9.txt [ /questionmarket.com ]
C:\Documents and Settings\eamuser\Cookies\GX9ZIEUU.txt [ /zedo.com ]
C:\Documents and Settings\eamuser\Cookies\C336JWWU.txt [ /traveladvertising.com ]
C:\Documents and Settings\eamuser\Cookies\8LNU9UZA.txt [ /media6degrees.com ]
C:\Documents and Settings\eamuser\Cookies\5U25EU3H.txt [ /www.googleadservices.com ]
C:\Documents and Settings\eamuser\Cookies\4K40Y29C.txt [ /lfstmedia.com ]
C:\Documents and Settings\eamuser\Cookies\GBBYQE94.txt [ /rtst.122.2o7.net ]
C:\Documents and Settings\eamuser\Cookies\DV6ZU1DT.txt [ /tribalfusion.com ]
C:\Documents and Settings\eamuser\Cookies\58WJRXYO.txt [ /ad.yieldmanager.com ]
C:\Documents and Settings\eamuser\Cookies\6J0YG6HI.txt [ /fastclick.net ]
C:\Documents and Settings\eamuser\Cookies\W8BMQ0AH.txt [ /atdmt.com ]
C:\Documents and Settings\eamuser\Cookies\U4B33LDX.txt [ /ad.mlnadvertising.com ]
C:\Documents and Settings\eamuser\Cookies\A15U69TO.txt [ /casalemedia.com ]
C:\Documents and Settings\eamuser\Cookies\KLZIB6KC.txt [ /ads.health.yahoo.net ]
C:\Documents and Settings\eamuser\Cookies\YMH1WMKV.txt [ /dmtracker.com ]
C:\Documents and Settings\eamuser\Cookies\MPIJP36C.txt [ /interclick.com ]
C:\Documents and Settings\eamuser\Cookies\L89ALXR8.txt [ /serving-sys.com ]
C:\Documents and Settings\eamuser\Cookies\2KY1MTTO.txt [ /adinterax.com ]
C:\Documents and Settings\eamuser\Cookies\NXQ19XDN.txt [ /advertising.com ]
C:\Documents and Settings\eamuser\Cookies\SXV28KOP.txt [ /yieldmanager.net ]
C:\Documents and Settings\eamuser\Cookies\UYQR5649.txt [ /lucidmedia.com ]
C:\Documents and Settings\eamuser\Cookies\PL9Z4QAI.txt [ /ads.pointroll.com ]
C:\Documents and Settings\eamuser\Cookies\80D0J4YC.txt [ /invitemedia.com ]
C:\Documents and Settings\eamuser\Cookies\R10WB3S9.txt [ /doubleclick.net ]
C:\Documents and Settings\eamuser\Cookies\W4YB9D6H.txt [ /ads.undertone.com ]
C:\Documents and Settings\eamuser\Cookies\5IPRORZU.txt [ /apmebf.com ]
C:\Documents and Settings\eamuser\Cookies\72DT0KEB.txt [ /atwola.com ]
C:\Documents and Settings\eamuser\Cookies\VZ033QQW.txt [ /pointroll.com ]
C:\Documents and Settings\eamuser\Cookies\SG8KX8XZ.txt [ /overture.com ]
C:\Documents and Settings\eamuser\Cookies\MWIZ1QJ4.txt [ /nextag.com ]
C:\Documents and Settings\eamuser\Cookies\JF11DKAE.txt [ /dc.tremormedia.com ]
C:\Documents and Settings\eamuser\Cookies\8NKIJ8F3.txt [ /mediaplex.com ]
C:\Documents and Settings\eamuser\Cookies\GR0XT65W.txt [ /revsci.net ]
C:\Documents and Settings\eamuser\Cookies\7G2W0WS7.txt [ /ads.batpmturner.com ]
C:\Documents and Settings\eamuser\Cookies\ID0I2W6A.txt [ /ads.cnn.com ]
C:\Documents and Settings\eamuser\Cookies\CQXQOSTO.txt [ /pro-market.net ]
C:\Documents and Settings\eamuser\Cookies\YSFNLO6F.txt [ /www.googleadservices.com ]
C:\Documents and Settings\eamuser\Cookies\L574VP0D.txt [ /insightexpressai.com ]
C:\Documents and Settings\eamuser\Cookies\210NWLX5.txt [ /specificclick.net ]
C:\Documents and Settings\eamuser\Cookies\6VXINB0H.txt [ /ad.amateurmatch.com ]
C:\Documents and Settings\eamuser\Cookies\ZESB0XWI.txt [ /realmedia.com ]
C:\Documents and Settings\eamuser\Cookies\QS57UOUG.txt [ /legolas-media.com ]
C:\Documents and Settings\eamuser\Cookies\VFL3TQ65.txt [ /www.googleadservices.com ]
C:\Documents and Settings\eamuser\Cookies\ABWX3A1P.txt [ /bs.serving-sys.com ]
C:\Documents and Settings\eamuser\Cookies\SSC62FJN.txt [ /toplist.cz ]
C:\Documents and Settings\eamuser\Cookies\YLE7ISPX.txt [ /adtechus.com ]
C:\Documents and Settings\eamuser\Cookies\NSIRDJNW.txt [ /collective-media.net ]
C:\Documents and Settings\eamuser\Cookies\12ON1Q71.txt [ /ru4.com ]
C:\Documents and Settings\eamuser\Cookies\9WVD646P.txt [ /warnerbros.112.2o7.net ]
C:\Documents and Settings\eamuser\Cookies\G7O38HUK.txt [ /at.atwola.com ]
C:\Documents and Settings\eamuser\Cookies\SZZOXLO5.txt [ /ar.atwola.com ]
C:\Documents and Settings\eamuser\Cookies\YBW9H4LZ.txt [ /kontera.com ]
C:\Documents and Settings\eamuser\Cookies\6C987FZL.txt [ /microsoftinternetexplorer.112.2o7.net ]
C:\Documents and Settings\eamuser\Cookies\A497UER8.txt [ /tacoda.at.atwola.com ]
C:\Documents and Settings\eamuser\Cookies\J2V5SWQW.txt [ /ads.p161.net ]
C:\Documents and Settings\eamuser\Cookies\HBXI5672.txt [ /ads.creative-serving.com ]
C:\Documents and Settings\eamuser\Cookies\8EQX5ZJT.txt [ /adxpose.com ]
C:\Documents and Settings\eamuser\Cookies\4DP0P4D1.txt [ /imrworldwide.com ]
C:\Documents and Settings\eamuser\Cookies\DJR7M40T.txt [ /ad.360yield.com ]
C:\Documents and Settings\eamuser\Cookies\FA171R0T.txt [ /ads.nascar.com ]
C:\Documents and Settings\eamuser\Cookies\UPEOPDNN.txt [ /clickbooth.com ]
C:\Documents and Settings\eamuser\Cookies\X2TT2CSF.txt [ /eyeviewads.com ]
C:\Documents and Settings\eamuser\Cookies\TEAO04X9.txt [ /ads.pubmatic.com ]
C:\Documents and Settings\eamuser\Cookies\40OPOHGV.txt [ /adform.net ]
C:\Documents and Settings\eamuser\Cookies\7C1GCWWU.txt [ /c1.atdmt.com ]
C:\Documents and Settings\eamuser\Cookies\M5QAZIC4.txt [ /cbs.112.2o7.net ]
C:\Documents and Settings\eamuser\Cookies\TAS2ZT6I.txt [ /adserver.adtechus.com ]
C:\Documents and Settings\eamuser\Cookies\XWSZPCSJ.txt [ /mediaservices-d.openxenterprise.com ]
C:\Documents and Settings\eamuser\Cookies\1LFKWC2C.txt [ /a1.interclick.com ]
C:\Documents and Settings\eamuser\Cookies\96XNF2AG.txt [ /247realmedia.com ]
C:\Documents and Settings\eamuser\Cookies\IBDVV8MR.txt [ /in.getclicky.com ]
C:\Documents and Settings\eamuser\Cookies\PJEB9ST3.txt [ /smartadserver.com ]
C:\Documents and Settings\eamuser\Cookies\C0UJBI2H.txt [ /t.pointroll.com ]
C:\Documents and Settings\eamuser\Cookies\06ME2W4X.txt [ /liveperson.net ]
C:\Documents and Settings\eamuser\Cookies\WZ69U1I3.txt [ /www.googleadservices.com ]
C:\Documents and Settings\eamuser\Cookies\7A1UMKAG.txt [ /network.realmedia.com ]
C:\Documents and Settings\eamuser\Cookies\4705J29O.txt [ /liveperson.net ]
C:\Documents and Settings\eamuser\Cookies\O3MQAZPB.txt [ /ads.bridgetrack.com ]
C:\Documents and Settings\eamuser\Cookies\RHUPS15C.txt [ /clickfuse.com ]
C:\Documents and Settings\eamuser\Cookies\OCVD0OBS.txt [ /track.adform.net ]
C:\Documents and Settings\eamuser\Cookies\0A1LD7U8.txt [ /www.googleadservices.com ]
C:\Documents and Settings\eamuser\Cookies\OJSF5XC2.txt [ /burstnet.com ]
C:\Documents and Settings\eamuser\Cookies\MUSDT05R.txt [ /amazon-adsystem.com ]
C:\Documents and Settings\eamuser\Cookies\ZS4C58UF.txt [ /va.marketer.lpsnmedia.net ]
C:\Documents and Settings\eamuser\Cookies\0JXGSHZ2.txt [ /statcounter.com ]
C:\DOCUMENTS AND SETTINGS\EAMUSER\Cookies\8R02AL90.txt [ Cookie:[email protected]/adserving ]
C:\DOCUMENTS AND SETTINGS\EAMUSER\Cookies\W07XWSRV.txt [ Cookie:[email protected]/demandmedia-ehow/ ]
  • 0

Advertisements


#56
Essexboy

Essexboy

    GeekU Moderator

  • Retired Staff
  • 69,964 posts
That is the malware as well however, I know a small programme that will fix that download and run safe mode repair from here http://www.tweaking...._safe_mode.html let me know if that cures it. If so I will tidy up
  • 0

#57
cramit02

cramit02

    Member

  • Topic Starter
  • Member
  • PipPip
  • 78 posts
Ran the Tweaking.com fix, Safe Mode is still looping.
  • 0

#58
Essexboy

Essexboy

    GeekU Moderator

  • Retired Staff
  • 69,964 posts
OK this is a bit OTT but combofix repairs safe mode

Download and Install Combofix

Download ComboFix from one of the following locations:
Link 1
Link 2

VERY IMPORTANT !!! Save ComboFix.exe to your Desktop

* IMPORTANT - Disable your AntiVirus and AntiSpyware applications, usually via a right click on the System Tray icon. They may otherwise interfere with our tools. If you have difficulty properly disabling your protective programs, refer to this link here
  • Double click on ComboFix.exe & follow the prompts.
  • Accept the disclaimer and allow to update if it asks
  • Allow the installation of the recovery console

    Posted Image

    Posted Image
  • When finished, it shall produce a log for you.
  • Please include the C:\ComboFix.txt in your next reply.

Notes:
1. Do not mouse-click Combofix's window while it is running. That may cause it to stall.
2. Do not "re-run" Combofix. If you have a problem, reply back for further instructions.

3. If after the reboot you get errors about programmes being marked for deletion then reboot, that will cure it.


Please make sure you include the combo fix log in your next reply as well as describe how your computer is running now
  • 0

#59
cramit02

cramit02

    Member

  • Topic Starter
  • Member
  • PipPip
  • 78 posts
After running ComboFix and rebooting, Safe Mode is operating. General PC overall: quick to boot and seems to be working.



ComboFix 13-06-24.01 - eamuser 06/24/2013 14:08:38.1.2 - x86
Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.2031.1516 [GMT -5:00]
Running from: c:\documents and settings\eamuser\Desktop\ComboFix.exe
AV: Norton 360 *Disabled/Outdated* {E10A9785-9598-4754-B552-92431C1C35F8}
FW: Norton 360 *Disabled* {7C21A4C9-F61F-4AC4-B722-A6E19C16F220}
* Created a new restore point
.
.
((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.
.
c:\documents and settings\All Users\Application Data\TEMP
c:\documents and settings\All Users\Application Data\TEMP\{A8516AC9-AAF1-47F9-9766-03E2D4CDBCF8}\PostBuild.exe
c:\documents and settings\All Users\Application Data\TEMP\{B46BEA36-0B71-4A4E-AE41-87241643FA0A}\PostBuild.exe
c:\documents and settings\All Users\Application Data\TEMP\{B46BEA36-0B71-4A4E-AE41-87241643FA0A}\Setup.exe
.
.
((((((((((((((((((((((((( Files Created from 2013-05-24 to 2013-06-24 )))))))))))))))))))))))))))))))
.
.
2013-06-21 21:06 . 2013-06-21 21:06 181064 ----a-w- c:\windows\PSEXESVC.EXE
2013-06-21 21:06 . 2013-06-21 21:06 -------- d-----w- C:\Tweaking.com_Windows_Repair_Logs
2013-06-21 18:58 . 2013-06-21 18:58 -------- d-sh--w- c:\documents and settings\LocalService\IETldCache
2013-06-15 18:57 . 2013-06-15 18:57 -------- d-----w- c:\documents and settings\All Users\Application Data\Office Genuine Advantage
2013-06-15 18:27 . 2013-06-15 18:29 -------- d-----w- c:\program files\Common Files\Adobe
2013-06-15 17:25 . 2013-06-15 17:25 -------- d-----w- C:\_OTL
2013-05-30 11:08 . 2013-05-30 11:41 -------- d---a-w- C:\Kaspersky Rescue Disk 10.0
.
.
.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2013-06-24 18:52 . 2012-04-12 20:29 51 ----a-w- c:\windows\system32\drivers\etc\hosts-lms.tmp
2013-06-15 15:50 . 2012-06-26 17:15 692104 ----a-w- c:\windows\system32\FlashPlayerApp.exe
2013-06-15 15:50 . 2012-06-26 17:15 71048 ----a-w- c:\windows\system32\FlashPlayerCPLApp.cpl
2013-06-08 04:28 . 2013-03-05 19:57 86888 ----a-w- c:\windows\system32\LMIRfsClientNP.dll
2013-06-08 04:28 . 2013-03-05 19:57 53064 ----a-w- c:\windows\system32\Spool\prtprocs\w32x86\LMIproc.dll
2013-06-08 04:28 . 2013-03-05 19:57 31560 ----a-w- c:\windows\system32\LMIport.dll
2013-06-08 04:28 . 2013-03-05 19:57 92488 ----a-w- c:\windows\system32\LMIinit.dll
2013-05-07 22:30 . 2008-08-21 12:00 920064 ----a-w- c:\windows\system32\wininet.dll
2013-05-07 22:30 . 2008-08-21 12:00 43520 ------w- c:\windows\system32\licmgr10.dll
2013-05-07 22:30 . 2008-08-21 12:00 1469440 ------w- c:\windows\system32\inetcpl.cpl
2013-05-07 21:53 . 2008-08-21 12:00 385024 ------w- c:\windows\system32\html.iec
2013-05-03 01:30 . 2008-08-21 12:00 2149888 ----a-w- c:\windows\system32\ntoskrnl.exe
2013-05-03 00:38 . 2008-04-14 00:01 2028544 ----a-w- c:\windows\system32\ntkrnlpa.exe
2013-04-10 01:31 . 2008-08-21 12:00 1876352 ----a-w- c:\windows\system32\win32k.sys
2013-04-04 19:50 . 2013-03-05 20:03 22856 ----a-w- c:\windows\system32\drivers\mbam.sys
.
.
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"RTHDCPL"="RTHDCPL.EXE" [2008-06-13 16871936]
"IgfxTray"="c:\windows\system32\igfxtray.exe" [2008-12-12 143360]
"HotKeysCmds"="c:\windows\system32\hkcmd.exe" [2008-12-12 172032]
"Persistence"="c:\windows\system32\igfxpers.exe" [2008-12-12 143360]
"KASHMNDSHF73467808252560"="c:\program files\Kaseya\MNDSHF73467808252560\KaUsrTsk.exe" [2012-03-21 409600]
"PowerDVD12DMREngine"="c:\program files\CyberLink\PowerDVD12\Kernel\DMR\PowerDVD12DMREngine.exe" [2012-01-02 501544]
"PowerDVD12Agent"="c:\program files\CyberLink\PowerDVD12\PowerDVD12Agent.exe" [2012-02-21 371256]
"SunJavaUpdateSched"="c:\program files\Common Files\Java\Java Update\jusched.exe" [2012-07-03 252848]
"LogMeIn GUI"="c:\program files\LogMeIn\x86\LogMeInSystray.exe" [2012-11-29 63048]
"Adobe ARM"="c:\program files\Common Files\Adobe\ARM\1.0\AdobeARM.exe" [2012-12-18 946352]
.
[hkey_local_machine\software\microsoft\windows\currentversion\explorer\ShellExecuteHooks]
"{5AE067D3-9AFB-48E0-853A-EBB7F4A000DA}"= "c:\program files\SUPERAntiSpyware\SASSEH.DLL" [2011-07-19 113024]
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\LMIinit]
2013-06-08 04:28 92488 ----a-w- c:\windows\system32\LMIinit.dll
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\!SASCORE]
@=""
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\KAMNDSHF73467808252560]
@="Service"
.
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]
"EnableFirewall"= 0 (0x0)
.
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"%windir%\\system32\\sessmgr.exe"=
"c:\\Program Files\\CyberLink\\PowerDVD12\\PowerDVD12.exe"=
"c:\\Program Files\\CyberLink\\PowerDVD12\\Kernel\\DMR\\PowerDVD12DMREngine.exe"=
"c:\\Program Files\\CyberLink\\PowerDVD12\\Kernel\\DMS\\CLMSServerPDVD12.exe"=
"c:\\Program Files\\CyberLink\\PowerDVD12\\PowerDVD12Agent.exe"=
"c:\\Program Files\\CyberLink\\PowerDVD12\\PowerDVD12ML.exe"=
"c:\\Program Files\\TeamViewer\\Version7\\TeamViewer.exe"=
"c:\\Program Files\\TeamViewer\\Version7\\TeamViewer_Service.exe"=
.
R0 SymDS;Symantec Data Store;c:\windows\system32\drivers\N360\0604010.00E\symds.sys [2/6/2013 8:51 AM 340088]
R0 SymEFA;Symantec Extended File Attributes;c:\windows\system32\drivers\N360\0604010.00E\symefa.sys [2/6/2013 8:51 AM 924320]
R1 BHDrvx86;BHDrvx86;c:\documents and settings\All Users\Application Data\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\N360_6.0.0.145\Definitions\BASHDefs\20130412.001\BHDrvx86.sys [4/12/2013 6:53 PM 1000024]
R1 ccSet_N360;Norton 360 Settings Manager;c:\windows\system32\drivers\N360\0604010.00E\ccsetx86.sys [2/6/2013 8:51 AM 132768]
R1 SASDIFSV;SASDIFSV;c:\program files\SUPERAntiSpyware\sasdifsv.sys [7/22/2011 11:27 AM 12880]
R1 SASKUTIL;SASKUTIL;c:\program files\SUPERAntiSpyware\SASKUTIL.SYS [7/12/2011 4:55 PM 67664]
R1 SymIRON;Symantec Iron Driver;c:\windows\system32\drivers\N360\0604010.00E\ironx86.sys [2/6/2013 8:51 AM 149624]
R2 !SASCORE;SAS Core Service;c:\program files\SUPERAntiSpyware\SASCore.exe [7/11/2012 1:54 PM 116608]
R2 {329F96B6-DF1E-4328-BFDA-39EA953C1312};Power Control [2012/04/13 09:52];c:\program files\CyberLink\PowerDVD12\Common\NavFilter\000.fcl [2/16/2012 7:46 PM 87536]
R2 CLHNServiceForPowerDVD12;CLHNServiceForPowerDVD12;c:\program files\CyberLink\PowerDVD12\Kernel\DMP\CLHNServer\CLHNServiceForPowerDVD12.exe [4/13/2012 8:51 AM 87336]
R2 CyberLink PowerDVD 12 Media Server Monitor Service;CyberLink PowerDVD 12 Media Server Monitor Service;c:\program files\CyberLink\PowerDVD12\Kernel\DMS\CLMSMonitorServicePDVD12.exe [4/13/2012 8:51 AM 75048]
R2 CyberLink PowerDVD 12 Media Server Service;CyberLink PowerDVD 12 Media Server Service;c:\program files\CyberLink\PowerDVD12\Kernel\DMS\CLMSServerPDVD12.exe [4/13/2012 8:51 AM 296232]
R2 KAMNDSHF73467808252560;Kaseya Agent;c:\program files\Kaseya\MNDSHF73467808252560\AgentMon.exe [4/13/2012 7:47 AM 847872]
R2 LMIGuardianSvc;LMIGuardianSvc;c:\program files\LogMeIn\x86\LMIGuardianSvc.exe [1/25/2013 5:37 PM 375120]
R2 LMIInfo;LogMeIn Kernel Information Provider;c:\program files\LogMeIn\x86\rainfo.sys [11/29/2012 12:56 PM 13624]
R2 MSSQL$MOBILEDB;SQL Server (MOBILEDB);c:\program files\Microsoft SQL Server\MSSQL.1\MSSQL\Binn\sqlservr.exe [10/14/2005 2:51 AM 28768528]
R2 N360;Norton 360;c:\program files\Norton 360\Engine\6.4.1.14\ccsvchst.exe [2/6/2013 8:51 AM 138272]
R2 ntk_PowerDVD12;ntk_PowerDVD12;c:\program files\CyberLink\PowerDVD12\Kernel\DMP\CLHNServer\ntk_PowerDVD12.sys [4/13/2012 8:52 AM 120432]
R2 TeamViewer7;TeamViewer 7;c:\program files\TeamViewer\Version7\TeamViewer_Service.exe [7/16/2012 9:31 AM 2673064]
R2 VZWConfigService;VZW Config Service;c:\program files\Novatel Wireless\LTE Support\VZWMSConfig.exe [4/16/2012 8:06 AM 218160]
R3 EraserUtilRebootDrv;EraserUtilRebootDrv;c:\program files\Common Files\Symantec Shared\EENGINE\EraserUtilRebootDrv.sys [8/9/2012 1:50 PM 106656]
R3 IFXTPM;IFXTPM;c:\windows\system32\drivers\ifxtpm.sys [7/23/2008 1:31 PM 44800]
R3 KAPFA;KAPFA;c:\windows\system32\drivers\KAPFA.sys [4/13/2012 7:47 AM 20096]
S3 IDSxpx86;IDSxpx86;c:\documents and settings\All Users\Application Data\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\N360_6.0.0.145\Definitions\IPSDefs\20130424.001\IDSXpx86.sys [4/25/2013 8:30 AM 373728]
S3 NWRmNet_001;Novatel Wireless Verizon RmNet Network Adapter;c:\windows\system32\drivers\NWRmNet_001.sys [5/3/2012 10:43 AM 296448]
S3 NWUSBModem_001;Novatel Wireless Verizon USB Modem Driver;c:\windows\system32\drivers\nwusbmdm_001.sys [5/3/2012 10:43 AM 176384]
S3 NWUSBPort_001;Novatel Wireless Verizon USB Status Port Driver;c:\windows\system32\drivers\nwusbser_001.sys [5/3/2012 10:43 AM 176384]
S3 NWUSBPort2_000;Novatel Wireless USB Status2 Port Driver (vGEN);c:\windows\system32\drivers\nwusbser2_000.sys [5/3/2012 10:43 AM 176384]
S3 NWUSBPort2_001;Novatel Wireless Verizon USB Status2 Port Driver;c:\windows\system32\drivers\nwusbser2_001.sys [5/3/2012 10:43 AM 176384]
S3 SMSIVZAM5;SMSIVZAM5 NDIS Protocol Driver;c:\progra~1\VERIZO~1\VZACCE~1\SMSIVZAM5.SYS [4/14/2010 7:29 PM 32408]
.
Contents of the 'Scheduled Tasks' folder
.
2013-06-23 c:\windows\Tasks\Adobe Flash Player Updater.job
- c:\windows\system32\Macromed\Flash\FlashPlayerUpdateService.exe [2012-06-26 15:50]
.
2013-06-24 c:\windows\Tasks\GoogleUpdateTaskMachineCore.job
- c:\program files\Google\Update\GoogleUpdate.exe [2012-12-07 20:49]
.
2013-06-24 c:\windows\Tasks\GoogleUpdateTaskMachineUA.job
- c:\program files\Google\Update\GoogleUpdate.exe [2012-12-07 20:49]
.
.
------- Supplementary Scan -------
.
uStart Page = about:blank
IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~2\OFFICE11\EXCEL.EXE/3000
TCP: DhcpNameServer = 192.168.47.41 10.1.0.238
.
.
**************************************************************************
.
catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2013-06-24 14:12
Windows 5.1.2600 Service Pack 3 NTFS
.
scanning hidden processes ...
.
scanning hidden autostart entries ...
.
scanning hidden files ...
.
scan completed successfully
hidden files: 0
.
**************************************************************************
.
[HKEY_LOCAL_MACHINE\System\ControlSet004\Services\N360]
"ImagePath"="\"c:\program files\Norton 360\Engine\6.4.1.14\ccSvcHst.exe\" /s \"N360\" /m \"c:\program files\Norton 360\Engine\6.4.1.14\diMaster.dll\" /prefetch:1"
.
[HKEY_LOCAL_MACHINE\System\ControlSet004\Services\{329F96B6-DF1E-4328-BFDA-39EA953C1312}]
"ImagePath"="\??\c:\program files\CyberLink\PowerDVD12\Common\NavFilter\000.fcl"
.
--------------------- LOCKED REGISTRY KEYS ---------------------
.
[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}]
@Denied: (A 2) (Everyone)
@="FlashBroker"
"LocalizedString"="@c:\\WINDOWS\\system32\\Macromed\\Flash\\FlashUtil32_11_7_700_224_ActiveX.exe,-101"
.
[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\Elevation]
"Enabled"=dword:00000001
.
[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\LocalServer32]
@="c:\\WINDOWS\\system32\\Macromed\\Flash\\FlashUtil32_11_7_700_224_ActiveX.exe"
.
[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\TypeLib]
@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"
.
[HKEY_LOCAL_MACHINE\software\Classes\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}]
@Denied: (A 2) (Everyone)
@="IFlashBroker5"
.
[HKEY_LOCAL_MACHINE\software\Classes\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}\ProxyStubClsid32]
@="{00020424-0000-0000-C000-000000000046}"
.
[HKEY_LOCAL_MACHINE\software\Classes\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}\TypeLib]
@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"
"Version"="1.0"
.
--------------------- DLLs Loaded Under Running Processes ---------------------
.
- - - - - - - > 'winlogon.exe'(732)
c:\windows\system32\LMIinit.dll
c:\windows\system32\LMIRfsClientNP.dll
.
Completion time: 2013-06-24 14:16:29
ComboFix-quarantined-files.txt 2013-06-24 19:16
.
Pre-Run: 145,823,903,744 bytes free
Post-Run: 145,632,198,656 bytes free
.
WindowsXP-KB310994-SP2-Pro-BootDisk-ENU.exe
[boot loader]
timeout=2
default=multi(0)disk(0)rdisk(0)partition(1)\WINDOWS
[operating systems]
c:\cmdcons\BOOTSECT.DAT="Microsoft Windows Recovery Console" /cmdcons
UnsupportedDebug="do not select this" /debug
multi(0)disk(0)rdisk(0)partition(1)\WINDOWS="Microsoft Windows XP Professional" /noexecute=optin /fastdetect
.
- - End Of File - - 5ACABE2B906C0231236D65368F5618EA
8F558EB6672622401DA993E1E865C861

Edited by cramit02, 24 June 2013 - 01:49 PM.

  • 0

#60
Essexboy

Essexboy

    GeekU Moderator

  • Retired Staff
  • 69,964 posts
Are you happy for the cleanup ?
  • 0






Similar Topics

0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users

As Featured On:

Microsoft Yahoo BBC MSN PC Magazine Washington Post HP