FBI Virus -- Win7 Home 64-bit [Solved]
Started by
cramit02
, May 31 2013 10:04 PM
#46
Posted 21 June 2013 - 01:01 PM
#47
Posted 21 June 2013 - 01:13 PM
Nope that will work
#48
Posted 21 June 2013 - 01:15 PM
Hosts file cleared of jargon. I'm looking in to a Windows Validation issue that's presented itself on this machine as well... unsure if it was an issue before it was sent to me or not. -- What's your diagnosis, Doc?
#49
Posted 21 June 2013 - 01:18 PM
Some malware does mess up the windows validation.. Try this MS Fixit http://support.microsoft.com/kb/916247
#50
Posted 21 June 2013 - 01:24 PM
Windows is Genuine and Validated. The date was off by a few hours/timezone... didn't think that'd make the difference but it apparently did.
#51
Posted 21 June 2013 - 01:27 PM
How is this baby behaving now ?
Please download Malwarebytes Anti-Malware to your desktop.
The log can also be found here:
Windows 2000 & Windows XP:
C:\Documents and Settings\<USERNAME>\Application Data\Malwarebytes\Malwarebytes' Anti-Malware\Logs
Windows Vista & Win7:
C:\Users\<USERNAME>\AppData\Roaming\Malwarebytes\Malwarebytes' Anti-Malware\Logs
----------
Please download Malwarebytes Anti-Malware to your desktop.
- Right-click and Run as Administrator mbam-setup.exe and follow the prompts to install the program.
- At the end, be sure a checkmark is placed next to Update Malwarebytes Anti-Malware and Launch Malwarebytes Anti-Malware, then click Finish.
- If an update is found, it will download and install the latest version.
- Once the program has loaded, select Perform quick scan, then click Scan as shown below.
- When the scan is complete, click OK, then Show Results to view the results.
- Be sure that everything is checked, and click Remove Selected.
- When completed, a log will open in Notepad. Please save it to a convenient location and post the results.
The log can also be found here:
Windows 2000 & Windows XP:
C:\Documents and Settings\<USERNAME>\Application Data\Malwarebytes\Malwarebytes' Anti-Malware\Logs
Windows Vista & Win7:
C:\Users\<USERNAME>\AppData\Roaming\Malwarebytes\Malwarebytes' Anti-Malware\Logs
----------
#52
Posted 21 June 2013 - 01:34 PM
MBAM Log:
Malwarebytes Anti-Malware 1.75.0.1300
www.malwarebytes.org
Database version: v2013.06.21.06
Windows XP Service Pack 3 x86 NTFS
Internet Explorer 8.0.6001.18702
eamuser :: AUSR-EAM-01 [administrator]
6/21/2013 3:29:21 PM
mbam-log-2013-06-21 (15-29-21).txt
Scan type: Quick scan
Scan options enabled: Memory | Startup | Registry | File System | Heuristics/Extra | Heuristics/Shuriken | PUP | PUM
Scan options disabled: P2P
Objects scanned: 218089
Time elapsed: 3 minute(s), 29 second(s)
Memory Processes Detected: 0
(No malicious items detected)
Memory Modules Detected: 0
(No malicious items detected)
Registry Keys Detected: 0
(No malicious items detected)
Registry Values Detected: 0
(No malicious items detected)
Registry Data Items Detected: 3
HKLM\SOFTWARE\Microsoft\Security Center|AntiVirusDisableNotify (PUM.Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> Quarantined and repaired successfully.
HKLM\SOFTWARE\Microsoft\Security Center|FirewallDisableNotify (PUM.Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> Quarantined and repaired successfully.
HKLM\SOFTWARE\Microsoft\Security Center|UpdatesDisableNotify (PUM.Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> Quarantined and repaired successfully.
Folders Detected: 0
(No malicious items detected)
Files Detected: 0
(No malicious items detected)
(end)
Malwarebytes Anti-Malware 1.75.0.1300
www.malwarebytes.org
Database version: v2013.06.21.06
Windows XP Service Pack 3 x86 NTFS
Internet Explorer 8.0.6001.18702
eamuser :: AUSR-EAM-01 [administrator]
6/21/2013 3:29:21 PM
mbam-log-2013-06-21 (15-29-21).txt
Scan type: Quick scan
Scan options enabled: Memory | Startup | Registry | File System | Heuristics/Extra | Heuristics/Shuriken | PUP | PUM
Scan options disabled: P2P
Objects scanned: 218089
Time elapsed: 3 minute(s), 29 second(s)
Memory Processes Detected: 0
(No malicious items detected)
Memory Modules Detected: 0
(No malicious items detected)
Registry Keys Detected: 0
(No malicious items detected)
Registry Values Detected: 0
(No malicious items detected)
Registry Data Items Detected: 3
HKLM\SOFTWARE\Microsoft\Security Center|AntiVirusDisableNotify (PUM.Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> Quarantined and repaired successfully.
HKLM\SOFTWARE\Microsoft\Security Center|FirewallDisableNotify (PUM.Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> Quarantined and repaired successfully.
HKLM\SOFTWARE\Microsoft\Security Center|UpdatesDisableNotify (PUM.Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> Quarantined and repaired successfully.
Folders Detected: 0
(No malicious items detected)
Files Detected: 0
(No malicious items detected)
(end)
#53
Posted 21 June 2013 - 01:38 PM
Looks good, I appear to have got the lot
Are you happy with the performance now ?
Are you happy with the performance now ?
#54
Posted 21 June 2013 - 01:45 PM
Normal system seems to be 100% A-OK, boots right up w/o delay or odd screens, scans are coming up clean... I'm good. My only remaining issue is Safe Mode. I rebooted the machine and tried to get in to safe mode and it still looped back to the initial hp screen.
#55
Posted 21 June 2013 - 01:55 PM
I just ran SUPERAntiSpyware for laughs, it found a WinLogon malware trace... Removed threats.
SAS Log:
SUPERAntiSpyware Scan Log
http://www.superantispyware.com
Generated 06/21/2013 at 03:50 PM
Application Version : 5.6.1020
Core Rules Database Version : 10551
Trace Rules Database Version: 8363
Scan type : Quick Scan
Total Scan Time : 00:03:58
Operating System Information
Windows XP Professional 32-bit, Service Pack 3 (Build 5.01.2600)
Administrator
Memory items scanned : 522
Memory threats detected : 0
Registry items scanned : 32533
Registry threats detected : 1
File items scanned : 6413
File threats detected : 87
Malware.Trace
HKU\S-1-5-21-1085031214-1844823847-1177238915-1003\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINLOGON#SHELL
Adware.Tracking Cookie
C:\Documents and Settings\eamuser\Cookies\4XC7OMI9.txt [ /questionmarket.com ]
C:\Documents and Settings\eamuser\Cookies\GX9ZIEUU.txt [ /zedo.com ]
C:\Documents and Settings\eamuser\Cookies\C336JWWU.txt [ /traveladvertising.com ]
C:\Documents and Settings\eamuser\Cookies\8LNU9UZA.txt [ /media6degrees.com ]
C:\Documents and Settings\eamuser\Cookies\5U25EU3H.txt [ /www.googleadservices.com ]
C:\Documents and Settings\eamuser\Cookies\4K40Y29C.txt [ /lfstmedia.com ]
C:\Documents and Settings\eamuser\Cookies\GBBYQE94.txt [ /rtst.122.2o7.net ]
C:\Documents and Settings\eamuser\Cookies\DV6ZU1DT.txt [ /tribalfusion.com ]
C:\Documents and Settings\eamuser\Cookies\58WJRXYO.txt [ /ad.yieldmanager.com ]
C:\Documents and Settings\eamuser\Cookies\6J0YG6HI.txt [ /fastclick.net ]
C:\Documents and Settings\eamuser\Cookies\W8BMQ0AH.txt [ /atdmt.com ]
C:\Documents and Settings\eamuser\Cookies\U4B33LDX.txt [ /ad.mlnadvertising.com ]
C:\Documents and Settings\eamuser\Cookies\A15U69TO.txt [ /casalemedia.com ]
C:\Documents and Settings\eamuser\Cookies\KLZIB6KC.txt [ /ads.health.yahoo.net ]
C:\Documents and Settings\eamuser\Cookies\YMH1WMKV.txt [ /dmtracker.com ]
C:\Documents and Settings\eamuser\Cookies\MPIJP36C.txt [ /interclick.com ]
C:\Documents and Settings\eamuser\Cookies\L89ALXR8.txt [ /serving-sys.com ]
C:\Documents and Settings\eamuser\Cookies\2KY1MTTO.txt [ /adinterax.com ]
C:\Documents and Settings\eamuser\Cookies\NXQ19XDN.txt [ /advertising.com ]
C:\Documents and Settings\eamuser\Cookies\SXV28KOP.txt [ /yieldmanager.net ]
C:\Documents and Settings\eamuser\Cookies\UYQR5649.txt [ /lucidmedia.com ]
C:\Documents and Settings\eamuser\Cookies\PL9Z4QAI.txt [ /ads.pointroll.com ]
C:\Documents and Settings\eamuser\Cookies\80D0J4YC.txt [ /invitemedia.com ]
C:\Documents and Settings\eamuser\Cookies\R10WB3S9.txt [ /doubleclick.net ]
C:\Documents and Settings\eamuser\Cookies\W4YB9D6H.txt [ /ads.undertone.com ]
C:\Documents and Settings\eamuser\Cookies\5IPRORZU.txt [ /apmebf.com ]
C:\Documents and Settings\eamuser\Cookies\72DT0KEB.txt [ /atwola.com ]
C:\Documents and Settings\eamuser\Cookies\VZ033QQW.txt [ /pointroll.com ]
C:\Documents and Settings\eamuser\Cookies\SG8KX8XZ.txt [ /overture.com ]
C:\Documents and Settings\eamuser\Cookies\MWIZ1QJ4.txt [ /nextag.com ]
C:\Documents and Settings\eamuser\Cookies\JF11DKAE.txt [ /dc.tremormedia.com ]
C:\Documents and Settings\eamuser\Cookies\8NKIJ8F3.txt [ /mediaplex.com ]
C:\Documents and Settings\eamuser\Cookies\GR0XT65W.txt [ /revsci.net ]
C:\Documents and Settings\eamuser\Cookies\7G2W0WS7.txt [ /ads.batpmturner.com ]
C:\Documents and Settings\eamuser\Cookies\ID0I2W6A.txt [ /ads.cnn.com ]
C:\Documents and Settings\eamuser\Cookies\CQXQOSTO.txt [ /pro-market.net ]
C:\Documents and Settings\eamuser\Cookies\YSFNLO6F.txt [ /www.googleadservices.com ]
C:\Documents and Settings\eamuser\Cookies\L574VP0D.txt [ /insightexpressai.com ]
C:\Documents and Settings\eamuser\Cookies\210NWLX5.txt [ /specificclick.net ]
C:\Documents and Settings\eamuser\Cookies\6VXINB0H.txt [ /ad.amateurmatch.com ]
C:\Documents and Settings\eamuser\Cookies\ZESB0XWI.txt [ /realmedia.com ]
C:\Documents and Settings\eamuser\Cookies\QS57UOUG.txt [ /legolas-media.com ]
C:\Documents and Settings\eamuser\Cookies\VFL3TQ65.txt [ /www.googleadservices.com ]
C:\Documents and Settings\eamuser\Cookies\ABWX3A1P.txt [ /bs.serving-sys.com ]
C:\Documents and Settings\eamuser\Cookies\SSC62FJN.txt [ /toplist.cz ]
C:\Documents and Settings\eamuser\Cookies\YLE7ISPX.txt [ /adtechus.com ]
C:\Documents and Settings\eamuser\Cookies\NSIRDJNW.txt [ /collective-media.net ]
C:\Documents and Settings\eamuser\Cookies\12ON1Q71.txt [ /ru4.com ]
C:\Documents and Settings\eamuser\Cookies\9WVD646P.txt [ /warnerbros.112.2o7.net ]
C:\Documents and Settings\eamuser\Cookies\G7O38HUK.txt [ /at.atwola.com ]
C:\Documents and Settings\eamuser\Cookies\SZZOXLO5.txt [ /ar.atwola.com ]
C:\Documents and Settings\eamuser\Cookies\YBW9H4LZ.txt [ /kontera.com ]
C:\Documents and Settings\eamuser\Cookies\6C987FZL.txt [ /microsoftinternetexplorer.112.2o7.net ]
C:\Documents and Settings\eamuser\Cookies\A497UER8.txt [ /tacoda.at.atwola.com ]
C:\Documents and Settings\eamuser\Cookies\J2V5SWQW.txt [ /ads.p161.net ]
C:\Documents and Settings\eamuser\Cookies\HBXI5672.txt [ /ads.creative-serving.com ]
C:\Documents and Settings\eamuser\Cookies\8EQX5ZJT.txt [ /adxpose.com ]
C:\Documents and Settings\eamuser\Cookies\4DP0P4D1.txt [ /imrworldwide.com ]
C:\Documents and Settings\eamuser\Cookies\DJR7M40T.txt [ /ad.360yield.com ]
C:\Documents and Settings\eamuser\Cookies\FA171R0T.txt [ /ads.nascar.com ]
C:\Documents and Settings\eamuser\Cookies\UPEOPDNN.txt [ /clickbooth.com ]
C:\Documents and Settings\eamuser\Cookies\X2TT2CSF.txt [ /eyeviewads.com ]
C:\Documents and Settings\eamuser\Cookies\TEAO04X9.txt [ /ads.pubmatic.com ]
C:\Documents and Settings\eamuser\Cookies\40OPOHGV.txt [ /adform.net ]
C:\Documents and Settings\eamuser\Cookies\7C1GCWWU.txt [ /c1.atdmt.com ]
C:\Documents and Settings\eamuser\Cookies\M5QAZIC4.txt [ /cbs.112.2o7.net ]
C:\Documents and Settings\eamuser\Cookies\TAS2ZT6I.txt [ /adserver.adtechus.com ]
C:\Documents and Settings\eamuser\Cookies\XWSZPCSJ.txt [ /mediaservices-d.openxenterprise.com ]
C:\Documents and Settings\eamuser\Cookies\1LFKWC2C.txt [ /a1.interclick.com ]
C:\Documents and Settings\eamuser\Cookies\96XNF2AG.txt [ /247realmedia.com ]
C:\Documents and Settings\eamuser\Cookies\IBDVV8MR.txt [ /in.getclicky.com ]
C:\Documents and Settings\eamuser\Cookies\PJEB9ST3.txt [ /smartadserver.com ]
C:\Documents and Settings\eamuser\Cookies\C0UJBI2H.txt [ /t.pointroll.com ]
C:\Documents and Settings\eamuser\Cookies\06ME2W4X.txt [ /liveperson.net ]
C:\Documents and Settings\eamuser\Cookies\WZ69U1I3.txt [ /www.googleadservices.com ]
C:\Documents and Settings\eamuser\Cookies\7A1UMKAG.txt [ /network.realmedia.com ]
C:\Documents and Settings\eamuser\Cookies\4705J29O.txt [ /liveperson.net ]
C:\Documents and Settings\eamuser\Cookies\O3MQAZPB.txt [ /ads.bridgetrack.com ]
C:\Documents and Settings\eamuser\Cookies\RHUPS15C.txt [ /clickfuse.com ]
C:\Documents and Settings\eamuser\Cookies\OCVD0OBS.txt [ /track.adform.net ]
C:\Documents and Settings\eamuser\Cookies\0A1LD7U8.txt [ /www.googleadservices.com ]
C:\Documents and Settings\eamuser\Cookies\OJSF5XC2.txt [ /burstnet.com ]
C:\Documents and Settings\eamuser\Cookies\MUSDT05R.txt [ /amazon-adsystem.com ]
C:\Documents and Settings\eamuser\Cookies\ZS4C58UF.txt [ /va.marketer.lpsnmedia.net ]
C:\Documents and Settings\eamuser\Cookies\0JXGSHZ2.txt [ /statcounter.com ]
C:\DOCUMENTS AND SETTINGS\EAMUSER\Cookies\8R02AL90.txt [ Cookie:[email protected]/adserving ]
C:\DOCUMENTS AND SETTINGS\EAMUSER\Cookies\W07XWSRV.txt [ Cookie:[email protected]/demandmedia-ehow/ ]
SAS Log:
SUPERAntiSpyware Scan Log
http://www.superantispyware.com
Generated 06/21/2013 at 03:50 PM
Application Version : 5.6.1020
Core Rules Database Version : 10551
Trace Rules Database Version: 8363
Scan type : Quick Scan
Total Scan Time : 00:03:58
Operating System Information
Windows XP Professional 32-bit, Service Pack 3 (Build 5.01.2600)
Administrator
Memory items scanned : 522
Memory threats detected : 0
Registry items scanned : 32533
Registry threats detected : 1
File items scanned : 6413
File threats detected : 87
Malware.Trace
HKU\S-1-5-21-1085031214-1844823847-1177238915-1003\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINLOGON#SHELL
Adware.Tracking Cookie
C:\Documents and Settings\eamuser\Cookies\4XC7OMI9.txt [ /questionmarket.com ]
C:\Documents and Settings\eamuser\Cookies\GX9ZIEUU.txt [ /zedo.com ]
C:\Documents and Settings\eamuser\Cookies\C336JWWU.txt [ /traveladvertising.com ]
C:\Documents and Settings\eamuser\Cookies\8LNU9UZA.txt [ /media6degrees.com ]
C:\Documents and Settings\eamuser\Cookies\5U25EU3H.txt [ /www.googleadservices.com ]
C:\Documents and Settings\eamuser\Cookies\4K40Y29C.txt [ /lfstmedia.com ]
C:\Documents and Settings\eamuser\Cookies\GBBYQE94.txt [ /rtst.122.2o7.net ]
C:\Documents and Settings\eamuser\Cookies\DV6ZU1DT.txt [ /tribalfusion.com ]
C:\Documents and Settings\eamuser\Cookies\58WJRXYO.txt [ /ad.yieldmanager.com ]
C:\Documents and Settings\eamuser\Cookies\6J0YG6HI.txt [ /fastclick.net ]
C:\Documents and Settings\eamuser\Cookies\W8BMQ0AH.txt [ /atdmt.com ]
C:\Documents and Settings\eamuser\Cookies\U4B33LDX.txt [ /ad.mlnadvertising.com ]
C:\Documents and Settings\eamuser\Cookies\A15U69TO.txt [ /casalemedia.com ]
C:\Documents and Settings\eamuser\Cookies\KLZIB6KC.txt [ /ads.health.yahoo.net ]
C:\Documents and Settings\eamuser\Cookies\YMH1WMKV.txt [ /dmtracker.com ]
C:\Documents and Settings\eamuser\Cookies\MPIJP36C.txt [ /interclick.com ]
C:\Documents and Settings\eamuser\Cookies\L89ALXR8.txt [ /serving-sys.com ]
C:\Documents and Settings\eamuser\Cookies\2KY1MTTO.txt [ /adinterax.com ]
C:\Documents and Settings\eamuser\Cookies\NXQ19XDN.txt [ /advertising.com ]
C:\Documents and Settings\eamuser\Cookies\SXV28KOP.txt [ /yieldmanager.net ]
C:\Documents and Settings\eamuser\Cookies\UYQR5649.txt [ /lucidmedia.com ]
C:\Documents and Settings\eamuser\Cookies\PL9Z4QAI.txt [ /ads.pointroll.com ]
C:\Documents and Settings\eamuser\Cookies\80D0J4YC.txt [ /invitemedia.com ]
C:\Documents and Settings\eamuser\Cookies\R10WB3S9.txt [ /doubleclick.net ]
C:\Documents and Settings\eamuser\Cookies\W4YB9D6H.txt [ /ads.undertone.com ]
C:\Documents and Settings\eamuser\Cookies\5IPRORZU.txt [ /apmebf.com ]
C:\Documents and Settings\eamuser\Cookies\72DT0KEB.txt [ /atwola.com ]
C:\Documents and Settings\eamuser\Cookies\VZ033QQW.txt [ /pointroll.com ]
C:\Documents and Settings\eamuser\Cookies\SG8KX8XZ.txt [ /overture.com ]
C:\Documents and Settings\eamuser\Cookies\MWIZ1QJ4.txt [ /nextag.com ]
C:\Documents and Settings\eamuser\Cookies\JF11DKAE.txt [ /dc.tremormedia.com ]
C:\Documents and Settings\eamuser\Cookies\8NKIJ8F3.txt [ /mediaplex.com ]
C:\Documents and Settings\eamuser\Cookies\GR0XT65W.txt [ /revsci.net ]
C:\Documents and Settings\eamuser\Cookies\7G2W0WS7.txt [ /ads.batpmturner.com ]
C:\Documents and Settings\eamuser\Cookies\ID0I2W6A.txt [ /ads.cnn.com ]
C:\Documents and Settings\eamuser\Cookies\CQXQOSTO.txt [ /pro-market.net ]
C:\Documents and Settings\eamuser\Cookies\YSFNLO6F.txt [ /www.googleadservices.com ]
C:\Documents and Settings\eamuser\Cookies\L574VP0D.txt [ /insightexpressai.com ]
C:\Documents and Settings\eamuser\Cookies\210NWLX5.txt [ /specificclick.net ]
C:\Documents and Settings\eamuser\Cookies\6VXINB0H.txt [ /ad.amateurmatch.com ]
C:\Documents and Settings\eamuser\Cookies\ZESB0XWI.txt [ /realmedia.com ]
C:\Documents and Settings\eamuser\Cookies\QS57UOUG.txt [ /legolas-media.com ]
C:\Documents and Settings\eamuser\Cookies\VFL3TQ65.txt [ /www.googleadservices.com ]
C:\Documents and Settings\eamuser\Cookies\ABWX3A1P.txt [ /bs.serving-sys.com ]
C:\Documents and Settings\eamuser\Cookies\SSC62FJN.txt [ /toplist.cz ]
C:\Documents and Settings\eamuser\Cookies\YLE7ISPX.txt [ /adtechus.com ]
C:\Documents and Settings\eamuser\Cookies\NSIRDJNW.txt [ /collective-media.net ]
C:\Documents and Settings\eamuser\Cookies\12ON1Q71.txt [ /ru4.com ]
C:\Documents and Settings\eamuser\Cookies\9WVD646P.txt [ /warnerbros.112.2o7.net ]
C:\Documents and Settings\eamuser\Cookies\G7O38HUK.txt [ /at.atwola.com ]
C:\Documents and Settings\eamuser\Cookies\SZZOXLO5.txt [ /ar.atwola.com ]
C:\Documents and Settings\eamuser\Cookies\YBW9H4LZ.txt [ /kontera.com ]
C:\Documents and Settings\eamuser\Cookies\6C987FZL.txt [ /microsoftinternetexplorer.112.2o7.net ]
C:\Documents and Settings\eamuser\Cookies\A497UER8.txt [ /tacoda.at.atwola.com ]
C:\Documents and Settings\eamuser\Cookies\J2V5SWQW.txt [ /ads.p161.net ]
C:\Documents and Settings\eamuser\Cookies\HBXI5672.txt [ /ads.creative-serving.com ]
C:\Documents and Settings\eamuser\Cookies\8EQX5ZJT.txt [ /adxpose.com ]
C:\Documents and Settings\eamuser\Cookies\4DP0P4D1.txt [ /imrworldwide.com ]
C:\Documents and Settings\eamuser\Cookies\DJR7M40T.txt [ /ad.360yield.com ]
C:\Documents and Settings\eamuser\Cookies\FA171R0T.txt [ /ads.nascar.com ]
C:\Documents and Settings\eamuser\Cookies\UPEOPDNN.txt [ /clickbooth.com ]
C:\Documents and Settings\eamuser\Cookies\X2TT2CSF.txt [ /eyeviewads.com ]
C:\Documents and Settings\eamuser\Cookies\TEAO04X9.txt [ /ads.pubmatic.com ]
C:\Documents and Settings\eamuser\Cookies\40OPOHGV.txt [ /adform.net ]
C:\Documents and Settings\eamuser\Cookies\7C1GCWWU.txt [ /c1.atdmt.com ]
C:\Documents and Settings\eamuser\Cookies\M5QAZIC4.txt [ /cbs.112.2o7.net ]
C:\Documents and Settings\eamuser\Cookies\TAS2ZT6I.txt [ /adserver.adtechus.com ]
C:\Documents and Settings\eamuser\Cookies\XWSZPCSJ.txt [ /mediaservices-d.openxenterprise.com ]
C:\Documents and Settings\eamuser\Cookies\1LFKWC2C.txt [ /a1.interclick.com ]
C:\Documents and Settings\eamuser\Cookies\96XNF2AG.txt [ /247realmedia.com ]
C:\Documents and Settings\eamuser\Cookies\IBDVV8MR.txt [ /in.getclicky.com ]
C:\Documents and Settings\eamuser\Cookies\PJEB9ST3.txt [ /smartadserver.com ]
C:\Documents and Settings\eamuser\Cookies\C0UJBI2H.txt [ /t.pointroll.com ]
C:\Documents and Settings\eamuser\Cookies\06ME2W4X.txt [ /liveperson.net ]
C:\Documents and Settings\eamuser\Cookies\WZ69U1I3.txt [ /www.googleadservices.com ]
C:\Documents and Settings\eamuser\Cookies\7A1UMKAG.txt [ /network.realmedia.com ]
C:\Documents and Settings\eamuser\Cookies\4705J29O.txt [ /liveperson.net ]
C:\Documents and Settings\eamuser\Cookies\O3MQAZPB.txt [ /ads.bridgetrack.com ]
C:\Documents and Settings\eamuser\Cookies\RHUPS15C.txt [ /clickfuse.com ]
C:\Documents and Settings\eamuser\Cookies\OCVD0OBS.txt [ /track.adform.net ]
C:\Documents and Settings\eamuser\Cookies\0A1LD7U8.txt [ /www.googleadservices.com ]
C:\Documents and Settings\eamuser\Cookies\OJSF5XC2.txt [ /burstnet.com ]
C:\Documents and Settings\eamuser\Cookies\MUSDT05R.txt [ /amazon-adsystem.com ]
C:\Documents and Settings\eamuser\Cookies\ZS4C58UF.txt [ /va.marketer.lpsnmedia.net ]
C:\Documents and Settings\eamuser\Cookies\0JXGSHZ2.txt [ /statcounter.com ]
C:\DOCUMENTS AND SETTINGS\EAMUSER\Cookies\8R02AL90.txt [ Cookie:[email protected]/adserving ]
C:\DOCUMENTS AND SETTINGS\EAMUSER\Cookies\W07XWSRV.txt [ Cookie:[email protected]/demandmedia-ehow/ ]
#56
Posted 21 June 2013 - 02:04 PM
That is the malware as well however, I know a small programme that will fix that download and run safe mode repair from here http://www.tweaking...._safe_mode.html let me know if that cures it. If so I will tidy up
#57
Posted 21 June 2013 - 02:11 PM
Ran the Tweaking.com fix, Safe Mode is still looping.
#58
Posted 21 June 2013 - 03:50 PM
OK this is a bit OTT but combofix repairs safe mode
Download and Install Combofix
Download ComboFix from one of the following locations:
Link 1
Link 2
VERY IMPORTANT !!! Save ComboFix.exe to your Desktop
* IMPORTANT - Disable your AntiVirus and AntiSpyware applications, usually via a right click on the System Tray icon. They may otherwise interfere with our tools. If you have difficulty properly disabling your protective programs, refer to this link here
Notes:
1. Do not mouse-click Combofix's window while it is running. That may cause it to stall.
2. Do not "re-run" Combofix. If you have a problem, reply back for further instructions.
3. If after the reboot you get errors about programmes being marked for deletion then reboot, that will cure it.
Please make sure you include the combo fix log in your next reply as well as describe how your computer is running now
Download and Install Combofix
Download ComboFix from one of the following locations:
Link 1
Link 2
VERY IMPORTANT !!! Save ComboFix.exe to your Desktop
* IMPORTANT - Disable your AntiVirus and AntiSpyware applications, usually via a right click on the System Tray icon. They may otherwise interfere with our tools. If you have difficulty properly disabling your protective programs, refer to this link here
- Double click on ComboFix.exe & follow the prompts.
- Accept the disclaimer and allow to update if it asks
- Allow the installation of the recovery console
- When finished, it shall produce a log for you.
- Please include the C:\ComboFix.txt in your next reply.
Notes:
1. Do not mouse-click Combofix's window while it is running. That may cause it to stall.
2. Do not "re-run" Combofix. If you have a problem, reply back for further instructions.
3. If after the reboot you get errors about programmes being marked for deletion then reboot, that will cure it.
Please make sure you include the combo fix log in your next reply as well as describe how your computer is running now
#59
Posted 24 June 2013 - 01:39 PM
After running ComboFix and rebooting, Safe Mode is operating. General PC overall: quick to boot and seems to be working.
ComboFix 13-06-24.01 - eamuser 06/24/2013 14:08:38.1.2 - x86
Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.2031.1516 [GMT -5:00]
Running from: c:\documents and settings\eamuser\Desktop\ComboFix.exe
AV: Norton 360 *Disabled/Outdated* {E10A9785-9598-4754-B552-92431C1C35F8}
FW: Norton 360 *Disabled* {7C21A4C9-F61F-4AC4-B722-A6E19C16F220}
* Created a new restore point
.
.
((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.
.
c:\documents and settings\All Users\Application Data\TEMP
c:\documents and settings\All Users\Application Data\TEMP\{A8516AC9-AAF1-47F9-9766-03E2D4CDBCF8}\PostBuild.exe
c:\documents and settings\All Users\Application Data\TEMP\{B46BEA36-0B71-4A4E-AE41-87241643FA0A}\PostBuild.exe
c:\documents and settings\All Users\Application Data\TEMP\{B46BEA36-0B71-4A4E-AE41-87241643FA0A}\Setup.exe
.
.
((((((((((((((((((((((((( Files Created from 2013-05-24 to 2013-06-24 )))))))))))))))))))))))))))))))
.
.
2013-06-21 21:06 . 2013-06-21 21:06 181064 ----a-w- c:\windows\PSEXESVC.EXE
2013-06-21 21:06 . 2013-06-21 21:06 -------- d-----w- C:\Tweaking.com_Windows_Repair_Logs
2013-06-21 18:58 . 2013-06-21 18:58 -------- d-sh--w- c:\documents and settings\LocalService\IETldCache
2013-06-15 18:57 . 2013-06-15 18:57 -------- d-----w- c:\documents and settings\All Users\Application Data\Office Genuine Advantage
2013-06-15 18:27 . 2013-06-15 18:29 -------- d-----w- c:\program files\Common Files\Adobe
2013-06-15 17:25 . 2013-06-15 17:25 -------- d-----w- C:\_OTL
2013-05-30 11:08 . 2013-05-30 11:41 -------- d---a-w- C:\Kaspersky Rescue Disk 10.0
.
.
.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2013-06-24 18:52 . 2012-04-12 20:29 51 ----a-w- c:\windows\system32\drivers\etc\hosts-lms.tmp
2013-06-15 15:50 . 2012-06-26 17:15 692104 ----a-w- c:\windows\system32\FlashPlayerApp.exe
2013-06-15 15:50 . 2012-06-26 17:15 71048 ----a-w- c:\windows\system32\FlashPlayerCPLApp.cpl
2013-06-08 04:28 . 2013-03-05 19:57 86888 ----a-w- c:\windows\system32\LMIRfsClientNP.dll
2013-06-08 04:28 . 2013-03-05 19:57 53064 ----a-w- c:\windows\system32\Spool\prtprocs\w32x86\LMIproc.dll
2013-06-08 04:28 . 2013-03-05 19:57 31560 ----a-w- c:\windows\system32\LMIport.dll
2013-06-08 04:28 . 2013-03-05 19:57 92488 ----a-w- c:\windows\system32\LMIinit.dll
2013-05-07 22:30 . 2008-08-21 12:00 920064 ----a-w- c:\windows\system32\wininet.dll
2013-05-07 22:30 . 2008-08-21 12:00 43520 ------w- c:\windows\system32\licmgr10.dll
2013-05-07 22:30 . 2008-08-21 12:00 1469440 ------w- c:\windows\system32\inetcpl.cpl
2013-05-07 21:53 . 2008-08-21 12:00 385024 ------w- c:\windows\system32\html.iec
2013-05-03 01:30 . 2008-08-21 12:00 2149888 ----a-w- c:\windows\system32\ntoskrnl.exe
2013-05-03 00:38 . 2008-04-14 00:01 2028544 ----a-w- c:\windows\system32\ntkrnlpa.exe
2013-04-10 01:31 . 2008-08-21 12:00 1876352 ----a-w- c:\windows\system32\win32k.sys
2013-04-04 19:50 . 2013-03-05 20:03 22856 ----a-w- c:\windows\system32\drivers\mbam.sys
.
.
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"RTHDCPL"="RTHDCPL.EXE" [2008-06-13 16871936]
"IgfxTray"="c:\windows\system32\igfxtray.exe" [2008-12-12 143360]
"HotKeysCmds"="c:\windows\system32\hkcmd.exe" [2008-12-12 172032]
"Persistence"="c:\windows\system32\igfxpers.exe" [2008-12-12 143360]
"KASHMNDSHF73467808252560"="c:\program files\Kaseya\MNDSHF73467808252560\KaUsrTsk.exe" [2012-03-21 409600]
"PowerDVD12DMREngine"="c:\program files\CyberLink\PowerDVD12\Kernel\DMR\PowerDVD12DMREngine.exe" [2012-01-02 501544]
"PowerDVD12Agent"="c:\program files\CyberLink\PowerDVD12\PowerDVD12Agent.exe" [2012-02-21 371256]
"SunJavaUpdateSched"="c:\program files\Common Files\Java\Java Update\jusched.exe" [2012-07-03 252848]
"LogMeIn GUI"="c:\program files\LogMeIn\x86\LogMeInSystray.exe" [2012-11-29 63048]
"Adobe ARM"="c:\program files\Common Files\Adobe\ARM\1.0\AdobeARM.exe" [2012-12-18 946352]
.
[hkey_local_machine\software\microsoft\windows\currentversion\explorer\ShellExecuteHooks]
"{5AE067D3-9AFB-48E0-853A-EBB7F4A000DA}"= "c:\program files\SUPERAntiSpyware\SASSEH.DLL" [2011-07-19 113024]
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\LMIinit]
2013-06-08 04:28 92488 ----a-w- c:\windows\system32\LMIinit.dll
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\!SASCORE]
@=""
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\KAMNDSHF73467808252560]
@="Service"
.
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]
"EnableFirewall"= 0 (0x0)
.
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"%windir%\\system32\\sessmgr.exe"=
"c:\\Program Files\\CyberLink\\PowerDVD12\\PowerDVD12.exe"=
"c:\\Program Files\\CyberLink\\PowerDVD12\\Kernel\\DMR\\PowerDVD12DMREngine.exe"=
"c:\\Program Files\\CyberLink\\PowerDVD12\\Kernel\\DMS\\CLMSServerPDVD12.exe"=
"c:\\Program Files\\CyberLink\\PowerDVD12\\PowerDVD12Agent.exe"=
"c:\\Program Files\\CyberLink\\PowerDVD12\\PowerDVD12ML.exe"=
"c:\\Program Files\\TeamViewer\\Version7\\TeamViewer.exe"=
"c:\\Program Files\\TeamViewer\\Version7\\TeamViewer_Service.exe"=
.
R0 SymDS;Symantec Data Store;c:\windows\system32\drivers\N360\0604010.00E\symds.sys [2/6/2013 8:51 AM 340088]
R0 SymEFA;Symantec Extended File Attributes;c:\windows\system32\drivers\N360\0604010.00E\symefa.sys [2/6/2013 8:51 AM 924320]
R1 BHDrvx86;BHDrvx86;c:\documents and settings\All Users\Application Data\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\N360_6.0.0.145\Definitions\BASHDefs\20130412.001\BHDrvx86.sys [4/12/2013 6:53 PM 1000024]
R1 ccSet_N360;Norton 360 Settings Manager;c:\windows\system32\drivers\N360\0604010.00E\ccsetx86.sys [2/6/2013 8:51 AM 132768]
R1 SASDIFSV;SASDIFSV;c:\program files\SUPERAntiSpyware\sasdifsv.sys [7/22/2011 11:27 AM 12880]
R1 SASKUTIL;SASKUTIL;c:\program files\SUPERAntiSpyware\SASKUTIL.SYS [7/12/2011 4:55 PM 67664]
R1 SymIRON;Symantec Iron Driver;c:\windows\system32\drivers\N360\0604010.00E\ironx86.sys [2/6/2013 8:51 AM 149624]
R2 !SASCORE;SAS Core Service;c:\program files\SUPERAntiSpyware\SASCore.exe [7/11/2012 1:54 PM 116608]
R2 {329F96B6-DF1E-4328-BFDA-39EA953C1312};Power Control [2012/04/13 09:52];c:\program files\CyberLink\PowerDVD12\Common\NavFilter\000.fcl [2/16/2012 7:46 PM 87536]
R2 CLHNServiceForPowerDVD12;CLHNServiceForPowerDVD12;c:\program files\CyberLink\PowerDVD12\Kernel\DMP\CLHNServer\CLHNServiceForPowerDVD12.exe [4/13/2012 8:51 AM 87336]
R2 CyberLink PowerDVD 12 Media Server Monitor Service;CyberLink PowerDVD 12 Media Server Monitor Service;c:\program files\CyberLink\PowerDVD12\Kernel\DMS\CLMSMonitorServicePDVD12.exe [4/13/2012 8:51 AM 75048]
R2 CyberLink PowerDVD 12 Media Server Service;CyberLink PowerDVD 12 Media Server Service;c:\program files\CyberLink\PowerDVD12\Kernel\DMS\CLMSServerPDVD12.exe [4/13/2012 8:51 AM 296232]
R2 KAMNDSHF73467808252560;Kaseya Agent;c:\program files\Kaseya\MNDSHF73467808252560\AgentMon.exe [4/13/2012 7:47 AM 847872]
R2 LMIGuardianSvc;LMIGuardianSvc;c:\program files\LogMeIn\x86\LMIGuardianSvc.exe [1/25/2013 5:37 PM 375120]
R2 LMIInfo;LogMeIn Kernel Information Provider;c:\program files\LogMeIn\x86\rainfo.sys [11/29/2012 12:56 PM 13624]
R2 MSSQL$MOBILEDB;SQL Server (MOBILEDB);c:\program files\Microsoft SQL Server\MSSQL.1\MSSQL\Binn\sqlservr.exe [10/14/2005 2:51 AM 28768528]
R2 N360;Norton 360;c:\program files\Norton 360\Engine\6.4.1.14\ccsvchst.exe [2/6/2013 8:51 AM 138272]
R2 ntk_PowerDVD12;ntk_PowerDVD12;c:\program files\CyberLink\PowerDVD12\Kernel\DMP\CLHNServer\ntk_PowerDVD12.sys [4/13/2012 8:52 AM 120432]
R2 TeamViewer7;TeamViewer 7;c:\program files\TeamViewer\Version7\TeamViewer_Service.exe [7/16/2012 9:31 AM 2673064]
R2 VZWConfigService;VZW Config Service;c:\program files\Novatel Wireless\LTE Support\VZWMSConfig.exe [4/16/2012 8:06 AM 218160]
R3 EraserUtilRebootDrv;EraserUtilRebootDrv;c:\program files\Common Files\Symantec Shared\EENGINE\EraserUtilRebootDrv.sys [8/9/2012 1:50 PM 106656]
R3 IFXTPM;IFXTPM;c:\windows\system32\drivers\ifxtpm.sys [7/23/2008 1:31 PM 44800]
R3 KAPFA;KAPFA;c:\windows\system32\drivers\KAPFA.sys [4/13/2012 7:47 AM 20096]
S3 IDSxpx86;IDSxpx86;c:\documents and settings\All Users\Application Data\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\N360_6.0.0.145\Definitions\IPSDefs\20130424.001\IDSXpx86.sys [4/25/2013 8:30 AM 373728]
S3 NWRmNet_001;Novatel Wireless Verizon RmNet Network Adapter;c:\windows\system32\drivers\NWRmNet_001.sys [5/3/2012 10:43 AM 296448]
S3 NWUSBModem_001;Novatel Wireless Verizon USB Modem Driver;c:\windows\system32\drivers\nwusbmdm_001.sys [5/3/2012 10:43 AM 176384]
S3 NWUSBPort_001;Novatel Wireless Verizon USB Status Port Driver;c:\windows\system32\drivers\nwusbser_001.sys [5/3/2012 10:43 AM 176384]
S3 NWUSBPort2_000;Novatel Wireless USB Status2 Port Driver (vGEN);c:\windows\system32\drivers\nwusbser2_000.sys [5/3/2012 10:43 AM 176384]
S3 NWUSBPort2_001;Novatel Wireless Verizon USB Status2 Port Driver;c:\windows\system32\drivers\nwusbser2_001.sys [5/3/2012 10:43 AM 176384]
S3 SMSIVZAM5;SMSIVZAM5 NDIS Protocol Driver;c:\progra~1\VERIZO~1\VZACCE~1\SMSIVZAM5.SYS [4/14/2010 7:29 PM 32408]
.
Contents of the 'Scheduled Tasks' folder
.
2013-06-23 c:\windows\Tasks\Adobe Flash Player Updater.job
- c:\windows\system32\Macromed\Flash\FlashPlayerUpdateService.exe [2012-06-26 15:50]
.
2013-06-24 c:\windows\Tasks\GoogleUpdateTaskMachineCore.job
- c:\program files\Google\Update\GoogleUpdate.exe [2012-12-07 20:49]
.
2013-06-24 c:\windows\Tasks\GoogleUpdateTaskMachineUA.job
- c:\program files\Google\Update\GoogleUpdate.exe [2012-12-07 20:49]
.
.
------- Supplementary Scan -------
.
uStart Page = about:blank
IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~2\OFFICE11\EXCEL.EXE/3000
TCP: DhcpNameServer = 192.168.47.41 10.1.0.238
.
.
**************************************************************************
.
catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2013-06-24 14:12
Windows 5.1.2600 Service Pack 3 NTFS
.
scanning hidden processes ...
.
scanning hidden autostart entries ...
.
scanning hidden files ...
.
scan completed successfully
hidden files: 0
.
**************************************************************************
.
[HKEY_LOCAL_MACHINE\System\ControlSet004\Services\N360]
"ImagePath"="\"c:\program files\Norton 360\Engine\6.4.1.14\ccSvcHst.exe\" /s \"N360\" /m \"c:\program files\Norton 360\Engine\6.4.1.14\diMaster.dll\" /prefetch:1"
.
[HKEY_LOCAL_MACHINE\System\ControlSet004\Services\{329F96B6-DF1E-4328-BFDA-39EA953C1312}]
"ImagePath"="\??\c:\program files\CyberLink\PowerDVD12\Common\NavFilter\000.fcl"
.
--------------------- LOCKED REGISTRY KEYS ---------------------
.
[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}]
@Denied: (A 2) (Everyone)
@="FlashBroker"
"LocalizedString"="@c:\\WINDOWS\\system32\\Macromed\\Flash\\FlashUtil32_11_7_700_224_ActiveX.exe,-101"
.
[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\Elevation]
"Enabled"=dword:00000001
.
[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\LocalServer32]
@="c:\\WINDOWS\\system32\\Macromed\\Flash\\FlashUtil32_11_7_700_224_ActiveX.exe"
.
[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\TypeLib]
@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"
.
[HKEY_LOCAL_MACHINE\software\Classes\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}]
@Denied: (A 2) (Everyone)
@="IFlashBroker5"
.
[HKEY_LOCAL_MACHINE\software\Classes\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}\ProxyStubClsid32]
@="{00020424-0000-0000-C000-000000000046}"
.
[HKEY_LOCAL_MACHINE\software\Classes\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}\TypeLib]
@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"
"Version"="1.0"
.
--------------------- DLLs Loaded Under Running Processes ---------------------
.
- - - - - - - > 'winlogon.exe'(732)
c:\windows\system32\LMIinit.dll
c:\windows\system32\LMIRfsClientNP.dll
.
Completion time: 2013-06-24 14:16:29
ComboFix-quarantined-files.txt 2013-06-24 19:16
.
Pre-Run: 145,823,903,744 bytes free
Post-Run: 145,632,198,656 bytes free
.
WindowsXP-KB310994-SP2-Pro-BootDisk-ENU.exe
[boot loader]
timeout=2
default=multi(0)disk(0)rdisk(0)partition(1)\WINDOWS
[operating systems]
c:\cmdcons\BOOTSECT.DAT="Microsoft Windows Recovery Console" /cmdcons
UnsupportedDebug="do not select this" /debug
multi(0)disk(0)rdisk(0)partition(1)\WINDOWS="Microsoft Windows XP Professional" /noexecute=optin /fastdetect
.
- - End Of File - - 5ACABE2B906C0231236D65368F5618EA
8F558EB6672622401DA993E1E865C861
ComboFix 13-06-24.01 - eamuser 06/24/2013 14:08:38.1.2 - x86
Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.2031.1516 [GMT -5:00]
Running from: c:\documents and settings\eamuser\Desktop\ComboFix.exe
AV: Norton 360 *Disabled/Outdated* {E10A9785-9598-4754-B552-92431C1C35F8}
FW: Norton 360 *Disabled* {7C21A4C9-F61F-4AC4-B722-A6E19C16F220}
* Created a new restore point
.
.
((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.
.
c:\documents and settings\All Users\Application Data\TEMP
c:\documents and settings\All Users\Application Data\TEMP\{A8516AC9-AAF1-47F9-9766-03E2D4CDBCF8}\PostBuild.exe
c:\documents and settings\All Users\Application Data\TEMP\{B46BEA36-0B71-4A4E-AE41-87241643FA0A}\PostBuild.exe
c:\documents and settings\All Users\Application Data\TEMP\{B46BEA36-0B71-4A4E-AE41-87241643FA0A}\Setup.exe
.
.
((((((((((((((((((((((((( Files Created from 2013-05-24 to 2013-06-24 )))))))))))))))))))))))))))))))
.
.
2013-06-21 21:06 . 2013-06-21 21:06 181064 ----a-w- c:\windows\PSEXESVC.EXE
2013-06-21 21:06 . 2013-06-21 21:06 -------- d-----w- C:\Tweaking.com_Windows_Repair_Logs
2013-06-21 18:58 . 2013-06-21 18:58 -------- d-sh--w- c:\documents and settings\LocalService\IETldCache
2013-06-15 18:57 . 2013-06-15 18:57 -------- d-----w- c:\documents and settings\All Users\Application Data\Office Genuine Advantage
2013-06-15 18:27 . 2013-06-15 18:29 -------- d-----w- c:\program files\Common Files\Adobe
2013-06-15 17:25 . 2013-06-15 17:25 -------- d-----w- C:\_OTL
2013-05-30 11:08 . 2013-05-30 11:41 -------- d---a-w- C:\Kaspersky Rescue Disk 10.0
.
.
.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2013-06-24 18:52 . 2012-04-12 20:29 51 ----a-w- c:\windows\system32\drivers\etc\hosts-lms.tmp
2013-06-15 15:50 . 2012-06-26 17:15 692104 ----a-w- c:\windows\system32\FlashPlayerApp.exe
2013-06-15 15:50 . 2012-06-26 17:15 71048 ----a-w- c:\windows\system32\FlashPlayerCPLApp.cpl
2013-06-08 04:28 . 2013-03-05 19:57 86888 ----a-w- c:\windows\system32\LMIRfsClientNP.dll
2013-06-08 04:28 . 2013-03-05 19:57 53064 ----a-w- c:\windows\system32\Spool\prtprocs\w32x86\LMIproc.dll
2013-06-08 04:28 . 2013-03-05 19:57 31560 ----a-w- c:\windows\system32\LMIport.dll
2013-06-08 04:28 . 2013-03-05 19:57 92488 ----a-w- c:\windows\system32\LMIinit.dll
2013-05-07 22:30 . 2008-08-21 12:00 920064 ----a-w- c:\windows\system32\wininet.dll
2013-05-07 22:30 . 2008-08-21 12:00 43520 ------w- c:\windows\system32\licmgr10.dll
2013-05-07 22:30 . 2008-08-21 12:00 1469440 ------w- c:\windows\system32\inetcpl.cpl
2013-05-07 21:53 . 2008-08-21 12:00 385024 ------w- c:\windows\system32\html.iec
2013-05-03 01:30 . 2008-08-21 12:00 2149888 ----a-w- c:\windows\system32\ntoskrnl.exe
2013-05-03 00:38 . 2008-04-14 00:01 2028544 ----a-w- c:\windows\system32\ntkrnlpa.exe
2013-04-10 01:31 . 2008-08-21 12:00 1876352 ----a-w- c:\windows\system32\win32k.sys
2013-04-04 19:50 . 2013-03-05 20:03 22856 ----a-w- c:\windows\system32\drivers\mbam.sys
.
.
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"RTHDCPL"="RTHDCPL.EXE" [2008-06-13 16871936]
"IgfxTray"="c:\windows\system32\igfxtray.exe" [2008-12-12 143360]
"HotKeysCmds"="c:\windows\system32\hkcmd.exe" [2008-12-12 172032]
"Persistence"="c:\windows\system32\igfxpers.exe" [2008-12-12 143360]
"KASHMNDSHF73467808252560"="c:\program files\Kaseya\MNDSHF73467808252560\KaUsrTsk.exe" [2012-03-21 409600]
"PowerDVD12DMREngine"="c:\program files\CyberLink\PowerDVD12\Kernel\DMR\PowerDVD12DMREngine.exe" [2012-01-02 501544]
"PowerDVD12Agent"="c:\program files\CyberLink\PowerDVD12\PowerDVD12Agent.exe" [2012-02-21 371256]
"SunJavaUpdateSched"="c:\program files\Common Files\Java\Java Update\jusched.exe" [2012-07-03 252848]
"LogMeIn GUI"="c:\program files\LogMeIn\x86\LogMeInSystray.exe" [2012-11-29 63048]
"Adobe ARM"="c:\program files\Common Files\Adobe\ARM\1.0\AdobeARM.exe" [2012-12-18 946352]
.
[hkey_local_machine\software\microsoft\windows\currentversion\explorer\ShellExecuteHooks]
"{5AE067D3-9AFB-48E0-853A-EBB7F4A000DA}"= "c:\program files\SUPERAntiSpyware\SASSEH.DLL" [2011-07-19 113024]
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\LMIinit]
2013-06-08 04:28 92488 ----a-w- c:\windows\system32\LMIinit.dll
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\!SASCORE]
@=""
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\KAMNDSHF73467808252560]
@="Service"
.
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]
"EnableFirewall"= 0 (0x0)
.
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"%windir%\\system32\\sessmgr.exe"=
"c:\\Program Files\\CyberLink\\PowerDVD12\\PowerDVD12.exe"=
"c:\\Program Files\\CyberLink\\PowerDVD12\\Kernel\\DMR\\PowerDVD12DMREngine.exe"=
"c:\\Program Files\\CyberLink\\PowerDVD12\\Kernel\\DMS\\CLMSServerPDVD12.exe"=
"c:\\Program Files\\CyberLink\\PowerDVD12\\PowerDVD12Agent.exe"=
"c:\\Program Files\\CyberLink\\PowerDVD12\\PowerDVD12ML.exe"=
"c:\\Program Files\\TeamViewer\\Version7\\TeamViewer.exe"=
"c:\\Program Files\\TeamViewer\\Version7\\TeamViewer_Service.exe"=
.
R0 SymDS;Symantec Data Store;c:\windows\system32\drivers\N360\0604010.00E\symds.sys [2/6/2013 8:51 AM 340088]
R0 SymEFA;Symantec Extended File Attributes;c:\windows\system32\drivers\N360\0604010.00E\symefa.sys [2/6/2013 8:51 AM 924320]
R1 BHDrvx86;BHDrvx86;c:\documents and settings\All Users\Application Data\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\N360_6.0.0.145\Definitions\BASHDefs\20130412.001\BHDrvx86.sys [4/12/2013 6:53 PM 1000024]
R1 ccSet_N360;Norton 360 Settings Manager;c:\windows\system32\drivers\N360\0604010.00E\ccsetx86.sys [2/6/2013 8:51 AM 132768]
R1 SASDIFSV;SASDIFSV;c:\program files\SUPERAntiSpyware\sasdifsv.sys [7/22/2011 11:27 AM 12880]
R1 SASKUTIL;SASKUTIL;c:\program files\SUPERAntiSpyware\SASKUTIL.SYS [7/12/2011 4:55 PM 67664]
R1 SymIRON;Symantec Iron Driver;c:\windows\system32\drivers\N360\0604010.00E\ironx86.sys [2/6/2013 8:51 AM 149624]
R2 !SASCORE;SAS Core Service;c:\program files\SUPERAntiSpyware\SASCore.exe [7/11/2012 1:54 PM 116608]
R2 {329F96B6-DF1E-4328-BFDA-39EA953C1312};Power Control [2012/04/13 09:52];c:\program files\CyberLink\PowerDVD12\Common\NavFilter\000.fcl [2/16/2012 7:46 PM 87536]
R2 CLHNServiceForPowerDVD12;CLHNServiceForPowerDVD12;c:\program files\CyberLink\PowerDVD12\Kernel\DMP\CLHNServer\CLHNServiceForPowerDVD12.exe [4/13/2012 8:51 AM 87336]
R2 CyberLink PowerDVD 12 Media Server Monitor Service;CyberLink PowerDVD 12 Media Server Monitor Service;c:\program files\CyberLink\PowerDVD12\Kernel\DMS\CLMSMonitorServicePDVD12.exe [4/13/2012 8:51 AM 75048]
R2 CyberLink PowerDVD 12 Media Server Service;CyberLink PowerDVD 12 Media Server Service;c:\program files\CyberLink\PowerDVD12\Kernel\DMS\CLMSServerPDVD12.exe [4/13/2012 8:51 AM 296232]
R2 KAMNDSHF73467808252560;Kaseya Agent;c:\program files\Kaseya\MNDSHF73467808252560\AgentMon.exe [4/13/2012 7:47 AM 847872]
R2 LMIGuardianSvc;LMIGuardianSvc;c:\program files\LogMeIn\x86\LMIGuardianSvc.exe [1/25/2013 5:37 PM 375120]
R2 LMIInfo;LogMeIn Kernel Information Provider;c:\program files\LogMeIn\x86\rainfo.sys [11/29/2012 12:56 PM 13624]
R2 MSSQL$MOBILEDB;SQL Server (MOBILEDB);c:\program files\Microsoft SQL Server\MSSQL.1\MSSQL\Binn\sqlservr.exe [10/14/2005 2:51 AM 28768528]
R2 N360;Norton 360;c:\program files\Norton 360\Engine\6.4.1.14\ccsvchst.exe [2/6/2013 8:51 AM 138272]
R2 ntk_PowerDVD12;ntk_PowerDVD12;c:\program files\CyberLink\PowerDVD12\Kernel\DMP\CLHNServer\ntk_PowerDVD12.sys [4/13/2012 8:52 AM 120432]
R2 TeamViewer7;TeamViewer 7;c:\program files\TeamViewer\Version7\TeamViewer_Service.exe [7/16/2012 9:31 AM 2673064]
R2 VZWConfigService;VZW Config Service;c:\program files\Novatel Wireless\LTE Support\VZWMSConfig.exe [4/16/2012 8:06 AM 218160]
R3 EraserUtilRebootDrv;EraserUtilRebootDrv;c:\program files\Common Files\Symantec Shared\EENGINE\EraserUtilRebootDrv.sys [8/9/2012 1:50 PM 106656]
R3 IFXTPM;IFXTPM;c:\windows\system32\drivers\ifxtpm.sys [7/23/2008 1:31 PM 44800]
R3 KAPFA;KAPFA;c:\windows\system32\drivers\KAPFA.sys [4/13/2012 7:47 AM 20096]
S3 IDSxpx86;IDSxpx86;c:\documents and settings\All Users\Application Data\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\N360_6.0.0.145\Definitions\IPSDefs\20130424.001\IDSXpx86.sys [4/25/2013 8:30 AM 373728]
S3 NWRmNet_001;Novatel Wireless Verizon RmNet Network Adapter;c:\windows\system32\drivers\NWRmNet_001.sys [5/3/2012 10:43 AM 296448]
S3 NWUSBModem_001;Novatel Wireless Verizon USB Modem Driver;c:\windows\system32\drivers\nwusbmdm_001.sys [5/3/2012 10:43 AM 176384]
S3 NWUSBPort_001;Novatel Wireless Verizon USB Status Port Driver;c:\windows\system32\drivers\nwusbser_001.sys [5/3/2012 10:43 AM 176384]
S3 NWUSBPort2_000;Novatel Wireless USB Status2 Port Driver (vGEN);c:\windows\system32\drivers\nwusbser2_000.sys [5/3/2012 10:43 AM 176384]
S3 NWUSBPort2_001;Novatel Wireless Verizon USB Status2 Port Driver;c:\windows\system32\drivers\nwusbser2_001.sys [5/3/2012 10:43 AM 176384]
S3 SMSIVZAM5;SMSIVZAM5 NDIS Protocol Driver;c:\progra~1\VERIZO~1\VZACCE~1\SMSIVZAM5.SYS [4/14/2010 7:29 PM 32408]
.
Contents of the 'Scheduled Tasks' folder
.
2013-06-23 c:\windows\Tasks\Adobe Flash Player Updater.job
- c:\windows\system32\Macromed\Flash\FlashPlayerUpdateService.exe [2012-06-26 15:50]
.
2013-06-24 c:\windows\Tasks\GoogleUpdateTaskMachineCore.job
- c:\program files\Google\Update\GoogleUpdate.exe [2012-12-07 20:49]
.
2013-06-24 c:\windows\Tasks\GoogleUpdateTaskMachineUA.job
- c:\program files\Google\Update\GoogleUpdate.exe [2012-12-07 20:49]
.
.
------- Supplementary Scan -------
.
uStart Page = about:blank
IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~2\OFFICE11\EXCEL.EXE/3000
TCP: DhcpNameServer = 192.168.47.41 10.1.0.238
.
.
**************************************************************************
.
catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2013-06-24 14:12
Windows 5.1.2600 Service Pack 3 NTFS
.
scanning hidden processes ...
.
scanning hidden autostart entries ...
.
scanning hidden files ...
.
scan completed successfully
hidden files: 0
.
**************************************************************************
.
[HKEY_LOCAL_MACHINE\System\ControlSet004\Services\N360]
"ImagePath"="\"c:\program files\Norton 360\Engine\6.4.1.14\ccSvcHst.exe\" /s \"N360\" /m \"c:\program files\Norton 360\Engine\6.4.1.14\diMaster.dll\" /prefetch:1"
.
[HKEY_LOCAL_MACHINE\System\ControlSet004\Services\{329F96B6-DF1E-4328-BFDA-39EA953C1312}]
"ImagePath"="\??\c:\program files\CyberLink\PowerDVD12\Common\NavFilter\000.fcl"
.
--------------------- LOCKED REGISTRY KEYS ---------------------
.
[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}]
@Denied: (A 2) (Everyone)
@="FlashBroker"
"LocalizedString"="@c:\\WINDOWS\\system32\\Macromed\\Flash\\FlashUtil32_11_7_700_224_ActiveX.exe,-101"
.
[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\Elevation]
"Enabled"=dword:00000001
.
[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\LocalServer32]
@="c:\\WINDOWS\\system32\\Macromed\\Flash\\FlashUtil32_11_7_700_224_ActiveX.exe"
.
[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\TypeLib]
@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"
.
[HKEY_LOCAL_MACHINE\software\Classes\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}]
@Denied: (A 2) (Everyone)
@="IFlashBroker5"
.
[HKEY_LOCAL_MACHINE\software\Classes\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}\ProxyStubClsid32]
@="{00020424-0000-0000-C000-000000000046}"
.
[HKEY_LOCAL_MACHINE\software\Classes\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}\TypeLib]
@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"
"Version"="1.0"
.
--------------------- DLLs Loaded Under Running Processes ---------------------
.
- - - - - - - > 'winlogon.exe'(732)
c:\windows\system32\LMIinit.dll
c:\windows\system32\LMIRfsClientNP.dll
.
Completion time: 2013-06-24 14:16:29
ComboFix-quarantined-files.txt 2013-06-24 19:16
.
Pre-Run: 145,823,903,744 bytes free
Post-Run: 145,632,198,656 bytes free
.
WindowsXP-KB310994-SP2-Pro-BootDisk-ENU.exe
[boot loader]
timeout=2
default=multi(0)disk(0)rdisk(0)partition(1)\WINDOWS
[operating systems]
c:\cmdcons\BOOTSECT.DAT="Microsoft Windows Recovery Console" /cmdcons
UnsupportedDebug="do not select this" /debug
multi(0)disk(0)rdisk(0)partition(1)\WINDOWS="Microsoft Windows XP Professional" /noexecute=optin /fastdetect
.
- - End Of File - - 5ACABE2B906C0231236D65368F5618EA
8F558EB6672622401DA993E1E865C861
Edited by cramit02, 24 June 2013 - 01:49 PM.
#60
Posted 24 June 2013 - 01:59 PM
Are you happy for the cleanup ?
Similar Topics
0 user(s) are reading this topic
0 members, 0 guests, 0 anonymous users