More system security problems

View previous topic View next topic Go down

More system security problems

Post by lcander on Tue Jun 16, 2009 2:33 am

I have been working on a computer that was a victim of the System Security malware mess for a friend. I have removed some of the infected files, but I'm sure I don't have everything gone because when I am able to get on internet pages, it often redirects to unwanted web pages or get a page that says 'Reported Site Attack' when trying to do a google search. I had to use a 'cached page' to get to the Geek Police page.
I tried installing the Malwarebytes program but the installation stalls while on the 'finishing' page and will not run. I was not able to uninstall it, either from the Add/Remove Prog. or the uninstall in the Program folder. Could I try renaming that program? I did get the Ice Sword installed and HiJack This (after I renamed the program). I am including the report from HJT

Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 9:08:28 PM, on 6/15/2009
Platform: Windows XP SP3 (WinNT 5.01.2600)
MSIE: Internet Explorer v8.00 (8.00.6001.18372)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\svchost.exe
C:\Program Files\Lavasoft\Ad-Aware\AAWService.exe
C:\WINDOWS\system32\LEXBCES.EXE
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\system32\LEXPPS.EXE
C:\WINDOWS\Explorer.EXE
C:\Program Files\Norton PC Checkup\executables\mrHealthy\MrHealthy.exe
C:\Program Files\Dell\Media Experience\PCMService.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\igfxpers.exe
C:\WINDOWS\system32\hkcmd.exe
C:\Program Files\HP\HP Software Update\HPWuSchd2.exe
C:\Program Files\Dell AIO Printer A960\dlbfbmgr.exe
C:\PROGRA~1\MUSICM~1\MUSICM~1\MMDiag.exe
C:\Program Files\Lavasoft\Ad-Aware\AAWTray.exe
C:\Program Files\Dell AIO Printer A960\dlbfbmon.exe
C:\Program Files\ClamWin\bin\ClamTray.exe
C:\WINDOWS\system32\ctfmon.exe
C:\PROGRA~1\SIMPLE~1\PHOTOS~1\data\Xtras\mssysmgr.exe
C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
C:\Program Files\MUSICMATCH\MUSICMATCH Jukebox\mim.exe
C:\Program Files\HP\Digital Imaging\bin\hpqtra08.exe
C:\Program Files\Kodak\Kodak EasyShare software\bin\EasyShare.exe
C:\Program Files\HP\Digital Imaging\bin\hpqimzone.exe
C:\Program Files\HP\Digital Imaging\bin\hpqSTE08.exe
C:\Program Files\Internet Explorer\Iexplore.exe
C:\Program Files\Internet Explorer\Iexplore.exe
C:\Program Files\Mozilla Firefox\firefox.exe
C:\Program Files\Trend Micro\HijackThis\HijackThis.exe
C:\Program Files\Internet Explorer\Iexplore.exe
C:\Program Files\Internet Explorer\Iexplore.exe

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = [You must be registered and logged in to see this link.]
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = [You must be registered and logged in to see this link.]
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = [You must be registered and logged in to see this link.]
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Bar = [You must be registered and logged in to see this link.]
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = [You must be registered and logged in to see this link.]
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = [You must be registered and logged in to see this link.]
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant = [You must be registered and logged in to see this link.]
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Local Page =
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Local Page =
R3 - URLSearchHook: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - (no file)
O1 - Hosts: 195.245.119.131 browser-security.microsoft.com
O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 6.0\Reader\ActiveX\AcroIEHelper.dll
O2 - BHO: &Helper - {2E59498D-7E44-4452-9044-0973B080B9E8} - C:\WINDOWS\system32\winexplorer.dll
O2 - BHO: (no name) - {3fd9cb96-2379-472b-8d7c-722de0eb19e6} - C:\WINDOWS\system32\yenuhaja.dll
O2 - BHO: Spybot-S&D IE Protection - {53707962-6F74-2D53-2644-206D7942484F} - C:\Program Files\Spybot - Search & Destroy\SDHelper.dll
O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.6.0_03\bin\ssv.dll
O2 - BHO: (no name) - {FDD3B846-8D59-4ffb-8758-209B6AD74ACC} - (no file)
O4 - HKLM\..\Run: [legejiyune] Rundll32.exe "C:\WINDOWS\system32\yosutihe.dll",s
O4 - HKLM\..\Run: [StorageGuard] "C:\Program Files\Common Files\Sonic\Update Manager\sgtray.exe" /r
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\Run: [PCMService] "C:\Program Files\Dell\Media Experience\PCMService.exe"
O4 - HKLM\..\Run: [PAV] C:\Program Files\PAV\pav.exe
O4 - HKLM\..\Run: [MimBoot] C:\PROGRA~1\MUSICM~1\MUSICM~1\mimboot.exe
O4 - HKLM\..\Run: [KernelFaultCheck] %systemroot%\system32\dumprep 0 -k
O4 - HKLM\..\Run: [iTunesHelper] "C:\Program Files\iTunes\iTunesHelper.exe"
O4 - HKLM\..\Run: [igfxtray] C:\WINDOWS\system32\igfxtray.exe
O4 - HKLM\..\Run: [igfxpers] C:\WINDOWS\system32\igfxpers.exe
O4 - HKLM\..\Run: [igfxhkcmd] C:\WINDOWS\system32\hkcmd.exe
O4 - HKLM\..\Run: [HP Software Update] C:\Program Files\HP\HP Software Update\HPWuSchd2.exe
O4 - HKLM\..\Run: [Dell AIO Printer A960] "C:\Program Files\Dell AIO Printer A960\dlbfbmgr.exe"
O4 - HKLM\..\Run: [AVG7_CC] C:\PROGRA~1\Grisoft\AVGFRE~1\avgcc.exe /STARTUP
O4 - HKLM\..\Run: [Ad-Watch] C:\Program Files\Lavasoft\Ad-Aware\AAWTray.exe
O4 - HKLM\..\Run: [sysldtray] C:\windows\ld09.exe
O4 - HKLM\..\Run: [CPMe357b5b6] Rundll32.exe "c:\windows\system32\tatetimo.dll",a
O4 - HKLM\..\Run: [e064862a] rundll32.exe "C:\WINDOWS\system32\rurisugo.dll",b
O4 - HKLM\..\Run: [ClamWin] "C:\Program Files\ClamWin\bin\ClamTray.exe" --logon
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
O4 - HKCU\..\Run: [system tool] C:\WINDOWS\sysguard.exe
O4 - HKCU\..\Run: [RealPlayer] "C:\Program Files\Real\RealOne Player\realplay.exe" /RunUPGToolCommandReBoot
O4 - HKCU\..\Run: [PhotoShow Deluxe Media Manager] C:\PROGRA~1\SIMPLE~1\PHOTOS~1\data\Xtras\mssysmgr.exe
O4 - HKCU\..\Run: [MySpaceIM] C:\Program Files\MySpace\IM\MySpaceIM.exe
O4 - HKCU\..\Run: [MsnMsgr] "C:\Program Files\MSN Messenger\MsnMsgr.Exe" /background
O4 - HKCU\..\Run: [MoneyAgent] "C:\Program Files\Microsoft Money\System\mnyexpr.exe"
O4 - HKCU\..\Run: [ErrorFix] C:\Program Files\ErrorFix\ErrorFix.exe -boot
O4 - HKCU\..\Run: [SpybotSD TeaTimer] C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
O4 - HKCU\..\Policies\Explorer\Run: [svcho] C:\WINDOWS\svcho.exe
O4 - HKUS\S-1-5-19\..\Run: [legejiyune] Rundll32.exe "C:\WINDOWS\system32\yosutihe.dll",s (User 'LOCAL SERVICE')
O4 - HKUS\S-1-5-20\..\Run: [legejiyune] Rundll32.exe "C:\WINDOWS\system32\yosutihe.dll",s (User 'NETWORK SERVICE')
O4 - Global Startup: Event Reminder.lnk = C:\Program Files\PrintMaster 16\pmremind.exe
O4 - Global Startup: HP Digital Imaging Monitor.lnk = C:\Program Files\HP\Digital Imaging\bin\hpqtra08.exe
O4 - Global Startup: HP Photosmart Premier Fast Start.lnk = C:\Program Files\HP\Digital Imaging\bin\hpqthb08.exe
O4 - Global Startup: Kodak EasyShare software.lnk = C:\Program Files\Kodak\Kodak EasyShare software\bin\EasyShare.exe
O8 - Extra context menu item: &Search - ?p=ZUfox000
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_03\bin\ssv.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_03\bin\ssv.dll
O9 - Extra button: PartyPoker.com - {B7FE5D70-9AA2-40F1-9C6B-12A255F085E1} - C:\Program Files\PartyGaming\PartyPoker\RunApp.exe (file missing)
O9 - Extra 'Tools' menuitem: PartyPoker.com - {B7FE5D70-9AA2-40F1-9C6B-12A255F085E1} - C:\Program Files\PartyGaming\PartyPoker\RunApp.exe (file missing)
O9 - Extra button: (no name) - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\Program Files\Spybot - Search & Destroy\SDHelper.dll
O9 - Extra 'Tools' menuitem: Spybot - Search && Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\Program Files\Spybot - Search & Destroy\SDHelper.dll
O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra button: Absolute Poker - {13C1DBF6-7535-495c-91F6-8C13714ED485} - C:\Documents and Settings\Owner\Start Menu\Programs\Absolute Poker\Absolute Poker.lnk (file missing) (HKCU)
O9 - Extra 'Tools' menuitem: Absolute Poker - {13C1DBF6-7535-495c-91F6-8C13714ED485} - C:\Documents and Settings\Owner\Start Menu\Programs\Absolute Poker\Absolute Poker.lnk (file missing) (HKCU)
O9 - Extra button: WeatherBug - {AF6CABAB-61F9-4f12-A198-B7D41EF1CB52} - C:\Program Files\AWS\WeatherBug\Weather.exe (file missing) (HKCU)
O16 - DPF: {05D44720-58E3-49E6-BDF6-D00330E511D3} (StagingUI Object) - [You must be registered and logged in to see this link.]
O16 - DPF: {149E45D8-163E-4189-86FC-45022AB2B6C9} (SpinTop DRM Control) - [You must be registered and logged in to see this link.]
O16 - DPF: {2B323CD9-50E3-11D3-9466-00A0C9700498} - [You must be registered and logged in to see this link.]
O16 - DPF: {2B96D5CC-C5B5-49A5-A69D-CC0A30F9028C} (MiniBugTransporterX Class) - [You must be registered and logged in to see this link.]
O16 - DPF: {3BB54395-5982-4788-8AF4-B5388FFDD0D8} (MSN Games Buddy Invite) - [You must be registered and logged in to see this link.]
O16 - DPF: {48DD0448-9209-4F81-9F6D-D83562940134} (MySpace Uploader Control) - [You must be registered and logged in to see this link.]
O16 - DPF: {4C39376E-FA9D-4349-BACC-D305C1750EF3} (EPUImageControl Class) - [You must be registered and logged in to see this link.]
O16 - DPF: {5736C456-EA94-4AAC-BB08-917ABDD035B3} (ZonePAChat Object) - [You must be registered and logged in to see this link.]
O16 - DPF: {58FC4C77-71C2-4972-A8CD-78691AD85158} (BJA Control) - [You must be registered and logged in to see this link.]
O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} (WUWebControl Class) - [You must be registered and logged in to see this link.]
O16 - DPF: {8A94C905-FF9D-43B6-8708-F0F22D22B1CB} (Wwlaunch Control) - [You must be registered and logged in to see this link.]
O16 - DPF: {A52FBD2B-7AB3-4F6B-90E3-91C772C5D00F} (WoF Control) - [You must be registered and logged in to see this link.]
O16 - DPF: {B8BE5E93-A60C-4D26-A2DC-220313175592} (MSN Games - Installer) - [You must be registered and logged in to see this link.]
O16 - DPF: {CC450D71-CC90-424C-8638-1F2DBAC87A54} (ArmHelper Control) - [You must be registered and logged in to see this link.]
O16 - DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} (Shockwave Flash Object) - [You must be registered and logged in to see this link.]
O16 - DPF: {D77EF652-9A6B-40C8-A4B9-1C0697C6CF41} (TikGames Online Control) - [You must be registered and logged in to see this link.]
O16 - DPF: {D8089245-3211-40F6-819B-9E5E92CD61A2} (FlashXControl Object) - [You must be registered and logged in to see this link.]
O16 - DPF: {DA2AA6CF-5C7A-4B71-BC3B-C771BB369937} (MSN Games Game Communicator) - [You must be registered and logged in to see this link.]
O16 - DPF: {E06E2E99-0AA1-11D4-ABA6-0060082AA75C} -
O16 - DPF: {F773E7B2-62A9-4524-9109-87D2F0BEFAA4} (ChessControl Class) - [You must be registered and logged in to see this link.]
O16 - DPF: {F7EDBBEA-1AD2-4EBF-AA07-D453CC29EE65} (Flash Casino Helper Object) - [You must be registered and logged in to see this link.]
O16 - DPF: {FF3C5A9F-5A91-4930-80E8-4709194C2AD3} (CheckersZPA Object) - [You must be registered and logged in to see this link.]
O20 - AppInit_DLLs: c:\windows\system32\sunezihe.dll C:\WINDOWS\system32\bamukitu.dll c:\windows\system32\tatetimo.dll
O21 - SSODL: SSODL - {EC43E3FD-5C60-46a6-97D7-E0B85DBDD6C4} - c:\windows\system32\tatetimo.dll (file missing)
O22 - SharedTaskScheduler: STS - {EC43E3FD-5C60-46a6-97D7-E0B85DBDD6C4} - c:\windows\system32\tatetimo.dll (file missing)
O23 - Service: getPlus(R) Helper - NOS Microsystems Ltd. - C:\Program Files\NOS\bin\getPlus_HelperSvc.exe
O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
O23 - Service: Lavasoft Ad-Aware Service - Lavasoft - C:\Program Files\Lavasoft\Ad-Aware\AAWService.exe
O23 - Service: LexBce Server (LexBceS) - Lexmark International, Inc. - C:\WINDOWS\system32\LEXBCES.EXE
O23 - Service: MrHealthy (MrHealthyService) - Symantec Corporation - C:\Program Files\Norton PC Checkup\executables\mrHealthy\MrHealthy.exe
O23 - Service: Pml Driver HPZ12 - HP - C:\WINDOWS\system32\HPZipm12.exe

--
End of file - 12575 bytes

Thanks so much for any help.

lcander
Intermediate
Intermediate

Status :
Online
Offline

Posts : 103
Joined : 2009-06-16
OS : Xp, Vista

View user profile

Back to top Go down

Re: More system security problems

Post by Origin on Tue Jun 16, 2009 2:43 am

Please download Ice Sword from [You must be registered and logged in to see this link.]

  1. Download the zip to your desktop and extract it.
  2. Open the Ice Sword folder and then launch IceSword.exe.
  3. Then look in the left hand bottom of the program and press "Registry"
  4. When the registry list opens, drag the line between the two windows so you can see which registry hive you need.
  5. Next, open the HKEY_LOCAL_MACHINE, and navigate to the following key:

    HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run

  6. Now look in the right side pane for two run values that are just random numbers.
  7. Once you have found the value(s), right click it and press "Delete"
  8. Okay the prompt and close IceSword.


While my help is always free, please consider donating to keep this site alive: [You must be registered and logged in to see this link.]

[You must be registered and logged in to see this link.]

Origin
Master
Master

Status :
Online
Offline

Posts : 2685
Joined : 2009-05-05
Gender : Male
OS : Windows Xp Sp3

View user profile

Back to top Go down

Re: More system security problems

Post by lcander on Tue Jun 16, 2009 3:01 am

I forgot to mention that I was able to run ClamWin which found 25 infected files as listed here:
C:\d45.bat: Trojan.Agent-116237 FOUND
C:\d45.bat: moved to 'C:\Documents and Settings\All Users\.clamwin\quarantine\d45.bat.infected'
C:\Documents and Settings\All Users\.clamwin\quarantine\d45.bat.infected: Trojan.Agent-116237 FOUND
C:\WINDOWS\system32\bepesata.exe: Trojan.Stuh-706 FOUND
C:\WINDOWS\system32\bepesata.exe: moved to 'C:\Documents and Settings\All Users\.clamwin\quarantine\bepesata.exe.infected'
C:\WINDOWS\system32\bokeneja.dll: Trojan.Agent-116206 FOUND
C:\WINDOWS\system32\bokeneja.dll: moved to 'C:\Documents and Settings\All Users\.clamwin\quarantine\bokeneja.dll.infected'
C:\WINDOWS\system32\dadazeti.dll: Trojan.Agent-116212 FOUND
C:\WINDOWS\system32\dadazeti.dll: moved to 'C:\Documents and Settings\All Users\.clamwin\quarantine\dadazeti.dll.infected'
C:\WINDOWS\system32\dubojoba.dll: Trojan.Vundo-15078 FOUND
C:\WINDOWS\system32\dubojoba.dll: moved to 'C:\Documents and Settings\All Users\.clamwin\quarantine\dubojoba.dll.infected'
C:\WINDOWS\system32\fijovopo.dll: Trojan.Vundo-14926 FOUND
C:\WINDOWS\system32\fijovopo.dll: moved to 'C:\Documents and Settings\All Users\.clamwin\quarantine\fijovopo.dll.infected'
C:\WINDOWS\system32\gogogahi.dll: Trojan.Vundo-15074 FOUND
C:\WINDOWS\system32\gogogahi.dll: moved to 'C:\Documents and Settings\All Users\.clamwin\quarantine\gogogahi.dll.infected'
C:\WINDOWS\system32\hapojute.dll: Trojan.Vundo-15078 FOUND
C:\WINDOWS\system32\hapojute.dll: moved to 'C:\Documents and Settings\All Users\.clamwin\quarantine\hapojute.dll.infected'
C:\WINDOWS\system32\hayitapa.dll: Trojan.Vundo-15322 FOUND
C:\WINDOWS\system32\hayitapa.dll: moved to 'C:\Documents and Settings\All Users\.clamwin\quarantine\hayitapa.dll.infected'
C:\WINDOWS\system32\jijoyowe.dll: Trojan.Vundo-15078 FOUND
C:\WINDOWS\system32\jijoyowe.dll: moved to 'C:\Documents and Settings\All Users\.clamwin\quarantine\jijoyowe.dll.infected'
C:\WINDOWS\system32\kevupavo.dll: Trojan.Spy-61786 FOUND
C:\WINDOWS\system32\kevupavo.dll: moved to 'C:\Documents and Settings\All Users\.clamwin\quarantine\kevupavo.dll.infected'
C:\WINDOWS\system32\lefefawe.dll: Trojan.Vundo-15078 FOUND
C:\WINDOWS\system32\lefefawe.dll: moved to 'C:\Documents and Settings\All Users\.clamwin\quarantine\lefefawe.dll.infected'
C:\WINDOWS\system32\lehigede.dll: Trojan.Agent-116207 FOUND
C:\WINDOWS\system32\lehigede.dll: moved to 'C:\Documents and Settings\All Users\.clamwin\quarantine\lehigede.dll.infected'
C:\WINDOWS\system32\leyeluto.dll: Trojan.Agent-116212 FOUND
C:\WINDOWS\system32\leyeluto.dll: moved to 'C:\Documents and Settings\All Users\.clamwin\quarantine\leyeluto.dll.infected'
C:\WINDOWS\system32\maremapa.dll: Trojan.Agent-116209 FOUND
C:\WINDOWS\system32\maremapa.dll: moved to 'C:\Documents and Settings\All Users\.clamwin\quarantine\maremapa.dll.infected'
C:\WINDOWS\system32\nazofafo.dll: Trojan.Spy-61786 FOUND
C:\WINDOWS\system32\nazofafo.dll: moved to 'C:\Documents and Settings\All Users\.clamwin\quarantine\nazofafo.dll.infected'
C:\WINDOWS\system32\nesafisa.exe: Trojan.Stuh-733 FOUND
C:\WINDOWS\system32\nesafisa.exe: moved to 'C:\Documents and Settings\All Users\.clamwin\quarantine\nesafisa.exe.infected'
C:\WINDOWS\system32\neweyoko.dll: Trojan.Vundo-15078 FOUND
C:\WINDOWS\system32\neweyoko.dll: moved to 'C:\Documents and Settings\All Users\.clamwin\quarantine\neweyoko.dll.infected'
C:\WINDOWS\system32\nidagiki.exe: Trojan.Stuh-763 FOUND
C:\WINDOWS\system32\nidagiki.exe: moved to 'C:\Documents and Settings\All Users\.clamwin\quarantine\nidagiki.exe.infected'
C:\WINDOWS\system32\siditesu.dll: Trojan.Agent-116212 FOUND
C:\WINDOWS\system32\siditesu.dll: moved to 'C:\Documents and Settings\All Users\.clamwin\quarantine\siditesu.dll.infected'
C:\WINDOWS\system32\vozigoji.dll: Trojan.Vundo-14836 FOUND
C:\WINDOWS\system32\vozigoji.dll: moved to 'C:\Documents and Settings\All Users\.clamwin\quarantine\vozigoji.dll.infected'
C:\WINDOWS\system32\wumikigo.dll: Trojan.Agent-116212 FOUND
C:\WINDOWS\system32\wumikigo.dll: moved to 'C:\Documents and Settings\All Users\.clamwin\quarantine\wumikigo.dll.infected'
C:\WINDOWS\system32\yohujoku.dll: Trojan.Vundo-14883 FOUND
C:\WINDOWS\system32\yohujoku.dll: moved to 'C:\Documents and Settings\All Users\.clamwin\quarantine\yohujoku.dll.infected'

I also was able to run AdAware which found Win32RootKitAgent and Win32TrojanTDSS as well as some cookies and something 'unknown'
SpyBot would not run although I was able to update it.

lcander
Intermediate
Intermediate

Status :
Online
Offline

Posts : 103
Joined : 2009-06-16
OS : Xp, Vista

View user profile

Back to top Go down

Re: More system security problems

Post by lcander on Tue Jun 16, 2009 3:05 am

I ran the Ice Sword and did not find the listings of the numbers.

lcander
Intermediate
Intermediate

Status :
Online
Offline

Posts : 103
Joined : 2009-06-16
OS : Xp, Vista

View user profile

Back to top Go down

Re: More system security problems

Post by Origin on Tue Jun 16, 2009 4:19 am

Please disable Ad-Watch, as it may hinder the removal of some HijackThis entries. You can re-enable it after your computer is clean. Please see here for instructions on how to disable it:

1. Right-click on the Ad-Watch icon in the system tray (located down by the system clock for most configurations)
2. Choose *Settings* from the dropdown menu
3. Under the *General Settings* tab turn OFF (red x) the option to "Load Ad-Watch at Startup" (if enabled)

4. Click on the *Status* button in the left hand menu
5. Turn OFF (red x) the option for *Regshield*
6. Close that window, then right-click on the Ad-Watch icon shield again down in the system tray next to the clock.
7. Choose *Turn off Ad-Watch* from the drop menu



I notice that you have Spybot's TeaTimer running. While this is normally a wonderful tool to protect against hijackers, it can also interfere with HijackThis fixes. So please disable TeaTimer by doing the following:
1) Run Spybot-S&D
2) Go to the Mode menu, and make sure "Advanced Mode" is selected
3) On the left hand side, choose Tools -> Resident
4) Uncheck "Resident TeaTimer" and OK any prompts
You can reenable TeaTimer once your system is clean.

Please make sure Teatimer is disable before we do this, otherwise this fix will fail.






  • Open HijackThis.
  • Choose "Do a system scan only"
  • Check the boxes in front of these lines:


    R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant = [You must be registered and logged in to see this link.]
    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Local Page =
    R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Local Page =
    R3 - URLSearchHook: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - (no file)
    O2 - BHO: &Helper - {2E59498D-7E44-4452-9044-0973B080B9E8} - C:\WINDOWS\system32\winexplorer.dll
    O2 - BHO: (no name) - {3fd9cb96-2379-472b-8d7c-722de0eb19e6} - C:\WINDOWS\system32\yenuhaja.dll
    O2 - BHO: (no name) - {FDD3B846-8D59-4ffb-8758-209B6AD74ACC} - (no file)
    O4 - HKLM\..\Run: [legejiyune] Rundll32.exe "C:\WINDOWS\system32\yosutihe.dll",s
    O4 - HKLM\..\Run: [KernelFaultCheck] %systemroot%\system32\dumprep 0 -k
    O4 - HKLM\..\Run: [CPMe357b5b6] Rundll32.exe "c:\windows\system32\tatetimo.dll",a
    O4 - HKLM\..\Run: [e064862a] rundll32.exe "C:\WINDOWS\system32\rurisugo.dll",b
    O4 - HKCU\..\Policies\Explorer\Run: [svcho] C:\WINDOWS\svcho.exe
    O4 - HKUS\S-1-5-19\..\Run: [legejiyune] Rundll32.exe "C:\WINDOWS\system32\yosutihe.dll",s (User 'LOCAL SERVICE')
    O4 - HKUS\S-1-5-20\..\Run: [legejiyune] Rundll32.exe "C:\WINDOWS\system32\yosutihe.dll",s (User 'NETWORK SERVICE')
    O4 - Global Startup: Event Reminder.lnk = C:\Program Files\PrintMaster 16\pmremind.exe
    O8 - Extra context menu item: &Search - ?p=ZUfox000
    O9 - Extra button: Absolute Poker - {13C1DBF6-7535-495c-91F6-8C13714ED485} - C:\Documents and Settings\Owner\Start Menu\Programs\Absolute Poker\Absolute Poker.lnk (file missing) (HKCU)
    O9 - Extra 'Tools' menuitem: Absolute Poker - {13C1DBF6-7535-495c-91F6-8C13714ED485} - C:\Documents and Settings\Owner\Start Menu\Programs\Absolute Poker\Absolute Poker.lnk (file missing) (HKCU)
    O9 - Extra button: WeatherBug - {AF6CABAB-61F9-4f12-A198-B7D41EF1CB52} - C:\Program Files\AWS\WeatherBug\Weather.exe (file missing) (HKCU)
    O16 - DPF: {2B96D5CC-C5B5-49A5-A69D-CC0A30F9028C} (MiniBugTransporterX Class) - [You must be registered and logged in to see this link.]
    O20 - AppInit_DLLs: c:\windows\system32\sunezihe.dll C:\WINDOWS\system32\bamukitu.dll c:\windows\system32\tatetimo.dll
    O21 - SSODL: SSODL - {EC43E3FD-5C60-46a6-97D7-E0B85DBDD6C4} - c:\windows\system32\tatetimo.dll (file missing)
    O22 - SharedTaskScheduler: STS - {EC43E3FD-5C60-46a6-97D7-E0B85DBDD6C4} - c:\windows\system32\tatetimo.dll (file missing)



  • Press "Fix Checked"
  • Close Hijack This.




Please download and run this tool.

Download Malwarebytes' Anti-Malware from [You must be registered and logged in to see this link.]

Double Click mbam-setup.exe to install the application.

  • Make sure a checkmark is placed next to Update Malwarebytes' Anti-Malware and Launch Malwarebytes' Anti-Malware, then click Finish.
  • If an update is found, it will download and install the latest version.
  • Once the program has loaded, select "Perform Quick Scan", then click Scan.
  • The scan may take some time to finish,so please be patient.
  • When the scan is complete, click OK, then Show Results to view the results.
  • Make sure that everything is checked, and click Remove Selected.
  • When disinfection is completed, a log will open in Notepad and you may be prompted to Restart. (See Note)
  • The log is automatically saved by MBAM and can be viewed by clicking the Logs tab in MBAM.
Note:
If MBAM encounters a file that is difficult to remove, you will be presented with 1 of 2 prompts.
Click OK to either and let MBAM proceed with the disinfection process.
If asked to restart the computer, please do so immediately.


Post the contents of the MBAM Log.


Last edited by Origin on Tue Jun 16, 2009 4:23 am; edited 1 time in total


While my help is always free, please consider donating to keep this site alive: [You must be registered and logged in to see this link.]

[You must be registered and logged in to see this link.]

Origin
Master
Master

Status :
Online
Offline

Posts : 2685
Joined : 2009-05-05
Gender : Male
OS : Windows Xp Sp3

View user profile

Back to top Go down

Re: More system security problems

Post by Origin on Tue Jun 16, 2009 4:19 am

Sorry internet lagg


While my help is always free, please consider donating to keep this site alive: [You must be registered and logged in to see this link.]

[You must be registered and logged in to see this link.]

Origin
Master
Master

Status :
Online
Offline

Posts : 2685
Joined : 2009-05-05
Gender : Male
OS : Windows Xp Sp3

View user profile

Back to top Go down

Tea Timer ?

Post by lcander on Tue Jun 16, 2009 1:35 pm

Since I can't open SpyBot, will it work to end the TeaTimer process in Task Manager? Also, my version of Ad Aware doesn't look quite like your screenshot, but I think I have AdWatch disabled on startup.
Thanks

lcander
Intermediate
Intermediate

Status :
Online
Offline

Posts : 103
Joined : 2009-06-16
OS : Xp, Vista

View user profile

Back to top Go down

Re: More system security problems

Post by Belahzur on Tue Jun 16, 2009 1:51 pm

Yes, you can kill TeaTimer via Task Manager.


[You must be registered and logged in to see this link.] - [You must be registered and logged in to see this link.] - Please PM me if I fail to respond within 24hrs.


Belahzur
Administrator
Administrator

Status :
Online
Offline

Posts : 34916
Joined : 2008-08-03
Gender : Male
OS : XP SP3 Media Centre

View user profile

Back to top Go down

Malwarebytes

Post by lcander on Tue Jun 16, 2009 3:09 pm

I fixed the entries you listed from HJT. I tried to open Malwarebytes that was already installed but nothing happened. So I uninstalled that installation thinking that because it was installed before the fix, maybe that was why it wouldn't open. After the uninstall, it required a restart. I reinstalled the Malwarebytes (after having to rename it) but it still won't open.
Would that mean I need to go through the HJT again and then try the download and installation of Malwarebytes?
Or is there some other trick to get the program to open?
TeaTimer and AdWatch are turned off.
Thanks

lcander
Intermediate
Intermediate

Status :
Online
Offline

Posts : 103
Joined : 2009-06-16
OS : Xp, Vista

View user profile

Back to top Go down

Re: More system security problems

Post by Belahzur on Tue Jun 16, 2009 3:18 pm


  • Download combofix from here
    [You must be registered and logged in to see this link.]
    [You must be registered and logged in to see this link.]

    1. If you are using Firefox, make sure that your download settings are as follows:

    * Tools->Options->Main tab
    * Set to "Always ask me where to Save the files".

    2. During the download, rename Combofix to Combo-Fix as follows:





    3. It is important you rename Combofix during the download, but not after.
    4. Please do not rename Combofix to other names, but only to the one indicated.
    5. Close any open browsers.
    6. Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.

  • We need to disable your local AV (Anti-virus) before running Combofix.
  • See [You must be registered and logged in to see this link.] for how to disable your AV. (AVG7)
  • Double click on ComboFix.exe.
  • Follow the prompts. NOTE:
  • ComboFix will check to see if the Microsoft Windows Recovery Console is installed.
    ***It's strongly recommended to have the Recovery Console installed before doing any malware removal.***

    **Please note: If the Microsoft Windows Recovery Console is already installed, ComboFix will automatically proceed with its scan.


  • The Recovery Console provides a recovery/repair mode should a problem occur during a Combofix run.



  • Allow ComboFix to download the Recovery Console.
  • Accept the End-User License Agreement.
  • The Recovery Console will be installed.
  • You will then get this next prompt that asks if you want to continue the malware scan, select yes



  • Allow combofix to run
  • Post C:\combofix.txt back here.

    Note:
    Do not mouseclick combofix's window whilst it's running. That may cause it to stall.


[You must be registered and logged in to see this link.] - [You must be registered and logged in to see this link.] - Please PM me if I fail to respond within 24hrs.


Belahzur
Administrator
Administrator

Status :
Online
Offline

Posts : 34916
Joined : 2008-08-03
Gender : Male
OS : XP SP3 Media Centre

View user profile

Back to top Go down

ComboFix

Post by lcander on Tue Jun 16, 2009 5:36 pm

ComboFix ran and installed the System Recovery. Now a message has come up in a window that says Rootkit!!!! on the title bar
The message says 'There is the presence of rootkit activity and needs to reboot. The files it lists are:
C:\Windows\system32\drivers\UACaculkrxpnsitmrv.sys
C:\Windows\system32\drivers\UACuufyndwtujeswd.dll
C:\Windows\system32\drivers\UACdpyryntvmnbgdvj.dat
C:\Windows\system32\drivers\UACxtpwxsywaoxtand.dll
C:\Windows\system32\drivers\UACdeqrgumnbnstpmk.dll
C:\Windows\system32\drivers\UACbneeymtoewowtyl.dll
C:\Windows\system32\drivers\UACmvbwddqwpkndgwq.dll
C:\Windows\system32\drivers\UACufyftomodjsxjpq.log
C:\Windows\system32\drivers\UACsqytbyyojkwkxpq.log
C:\Windows\system32\drivers\UACirmllmpeljwaywd.log

Should I click OK and let it reboot?

lcander
Intermediate
Intermediate

Status :
Online
Offline

Posts : 103
Joined : 2009-06-16
OS : Xp, Vista

View user profile

Back to top Go down

Re: More system security problems

Post by Belahzur on Tue Jun 16, 2009 6:04 pm

Hello.
Yes, reboot. I already knew of the rootkits presence, that's why MBAM won't work.

Once Combofix has finished it's run here, MBAM will work fine. Smile
Go a head and reboot, post the log when done.


[You must be registered and logged in to see this link.] - [You must be registered and logged in to see this link.] - Please PM me if I fail to respond within 24hrs.


Belahzur
Administrator
Administrator

Status :
Online
Offline

Posts : 34916
Joined : 2008-08-03
Gender : Male
OS : XP SP3 Media Centre

View user profile

Back to top Go down

Combo Fix report part 1

Post by lcander on Wed Jun 17, 2009 12:06 am

Here is the log generated when Combo Fix restarted
ComboFix 09-06-15.07 - Owner 06/16/2009 13:10.1 - NTFSx86
Microsoft Windows XP Home Edition 5.1.2600.3.1252.1.1033.18.510.305 [GMT -5:00]
Running from: c:\downloads\Combo-Fix.exe
.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.

c:\documents and settings\All Users\Application Data\Microsoft\Network\Downloader\qmgr0.dat
c:\documents and settings\All Users\Application Data\Microsoft\Network\Downloader\qmgr1.dat
c:\documents and settings\All Users\Start Menu\PAV
c:\documents and settings\Owner\Application Data\DriveCleaner Free
c:\windows\system32\drivers\UACaculkrxpnsitmrv.sys
c:\windows\system32\jasosise.exe
c:\windows\system32\lofojuzo.exe
c:\windows\system32\movezisa.exe
c:\windows\system32\tidadegi.exe
c:\windows\system32\UACbneeymtoewowtyl.dll
c:\windows\system32\UACdeqrgumnbnstpmk.dll
c:\windows\system32\UACdpyrjntvmnbgdvj.dat
c:\windows\system32\UACirmllmpeljwaywd.log
c:\windows\system32\UACmvbwddqwpkndgwq.dll
c:\windows\system32\UACsqytbyyojkwhxpq.log
c:\windows\system32\UACufyftomodtjsxjp.log
c:\windows\system32\UACuufyhndwtujeswd.dll
c:\windows\system32\UACxtpwxsywaoxtand.dll
c:\documents and settings\All Users\Start Menu\PAV\Personal Antivirus.lnk
c:\documents and settings\All Users\Start Menu\PAV\Uninstall.lnk
c:\documents and settings\Owner\Application Data\DriveCleaner Free\Logs\update.log
c:\windows\ld09.exe
c:\windows\system32\abojobud.ini
c:\windows\system32\adalosid.ini
c:\windows\system32\afunugaf.ini
c:\windows\system32\ajenekob.ini
c:\windows\system32\apameram.ini
c:\windows\system32\apipafip.ini
c:\windows\system32\apoyapon.ini
c:\windows\system32\apugapir.ini
c:\windows\system32\aridasuz.ini
c:\windows\system32\bamukitu.dll
c:\windows\system32\bigigare.dll
c:\windows\system32\bowikiku.dll
c:\windows\system32\buloreke.dll
c:\windows\system32\disolada.dll
c:\windows\system32\drivers\UACaculkrxpnsitmrv.sys
c:\windows\system32\edegihel.ini
c:\windows\system32\ekerolub.ini
c:\windows\system32\eragigib.ini
c:\windows\system32\eromadik.ini
c:\windows\system32\etujopah.ini
c:\windows\system32\ewafefel.ini
c:\windows\system32\ewoyojij.ini
c:\windows\system32\ewuduzas.ini
c:\windows\system32\eyilotaz.ini
c:\windows\system32\fagunufa.dll
c:\windows\system32\fomekinu.dll.tmp
c:\windows\system32\gikuyaju.dll
c:\windows\system32\gokisoso.dll
c:\windows\system32\GroupPolicy000.dat
c:\windows\system32\humoyofa.dll
c:\windows\system32\hupetetu.dll
c:\windows\system32\idukipij.ini
c:\windows\system32\igunizuk.ini
c:\windows\system32\inadozik.ini
c:\windows\system32\ininagol.ini
c:\windows\system32\iperajoz.ini
c:\windows\system32\itezadad.ini
c:\windows\system32\iyibehor.ini
c:\windows\system32\izohuhey.ini
c:\windows\system32\jipikudi.dll
c:\windows\system32\kidamore.dll
c:\windows\system32\kizodani.dll
c:\windows\system32\kobemiso.dll.tmp
c:\windows\system32\lodifeze.dll
c:\windows\system32\ogikimuw.ini
c:\windows\system32\ogusirur.ini
c:\windows\system32\okometaf.ini
c:\windows\system32\okoyewen.ini
c:\windows\system32\ososikog.ini
c:\windows\system32\otuleyel.ini
c:\windows\system32\ozenazaz.ini
c:\windows\system32\ripagupa.dll
c:\windows\system32\ronigofu.dll
c:\windows\system32\sazuduwe.dll
c:\windows\system32\suhahebu.dll
c:\windows\system32\teyunufa.dll.tmp
c:\windows\system32\tusubiku.dll
c:\windows\system32\UACbneeymtoewowtyl.dll
c:\windows\system32\UACdeqrgumnbnstpmk.dll
c:\windows\system32\UACdpyrjntvmnbgdvj.dat
c:\windows\system32\uacinit.dll
c:\windows\system32\UACirmllmpeljwaywd.log
c:\windows\system32\UACmvbwddqwpkndgwq.dll
c:\windows\system32\UACsqytbyyojkwhxpq.log
c:\windows\system32\UACufyftomodtjsxjp.log
c:\windows\system32\UACuufyhndwtujeswd.dll
c:\windows\system32\UACxtpwxsywaoxtand.dll
c:\windows\system32\ufasezay.ini
c:\windows\system32\ufoginor.ini
c:\windows\system32\ujayukig.ini
c:\windows\system32\ukibusut.ini
c:\windows\system32\usetidis.ini
c:\windows\system32\utetepuh.ini
c:\windows\system32\winexplorer.dll
c:\windows\system32\wobebupi.dll.tmp
c:\windows\system32\wokohebu.dll.tmp
c:\windows\system32\yazesafu.dll
c:\windows\system32\yehuhozi.dll
c:\windows\system32\yenuhaja.dll
c:\windows\system32\yosutihe.dll
c:\windows\system32\yukikono.dll
c:\windows\system32\zatoliye.dll
c:\windows\system32\zazanezo.dll
c:\windows\system32\zesanido.dll
c:\windows\system32\zusadira.dll
c:\windows\Sysvxd.exe

----- BITS: Possible infected sites -----

[You must be registered and logged in to see this link.]
.
((((((((((((((((((((((((((((((((((((((( Drivers/Services )))))))))))))))))))))))))))))))))))))))))))))))))
.

-------\Service_UACd.sys
-------\Legacy_MYWEBSEARCHSERVICE


((((((((((((((((((((((((( Files Created from 2009-05-16 to 2009-06-16 )))))))))))))))))))))))))))))))
.

2009-06-16 14:46 . 2009-05-26 18:20 40160 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2009-06-16 14:46 . 2009-06-16 14:47 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
2009-06-16 14:46 . 2009-06-16 14:46 -------- d-----w- c:\documents and settings\All Users\Application Data\Malwarebytes
2009-06-16 14:46 . 2009-05-26 18:19 19096 ----a-w- c:\windows\system32\drivers\mbam.sys
2009-06-16 13:27 . 2009-06-16 13:27 2 ---h--w- c:\windows\zaponce52689.dat
2009-06-16 05:46 . 2009-06-16 05:46 5300 --sh--w- c:\windows\system32\bohusika.exe
2009-06-16 05:45 . 2009-06-16 05:45 2 ---h--w- c:\windows\zaponce53652.dat
2009-06-16 05:45 . 2009-06-16 05:45 159 ----a-w- C:\d45.bat
2009-06-16 02:02 . 2009-06-16 02:02 -------- d-----w- c:\program files\Trend Micro
2009-06-15 18:11 . 2009-06-15 17:45 15688 ----a-w- c:\windows\system32\lsdelete.exe
2009-06-15 17:45 . 2009-06-15 17:44 64160 ----a-w- c:\windows\system32\drivers\Lbd.sys
2009-06-15 17:45 . 2009-06-15 17:45 2 ---h--w- c:\windows\zaponce53290.dat
2009-06-15 17:45 . 2009-06-15 17:45 2 ---h--w- c:\windows\zaponce53173.dat
2009-06-15 17:45 . 2009-06-15 17:45 314200 ----a-w- c:\documents and settings\All Users\Application Data\Lavasoft\Ad-Aware\Update\threatwork.exe
2009-06-15 17:45 . 2009-06-15 17:45 25440 ----a-w- c:\documents and settings\All Users\Application Data\Lavasoft\Ad-Aware\Update\savapibridge.dll
2009-06-15 17:45 . 2009-06-15 17:45 169312 ----a-w- c:\documents and settings\All Users\Application Data\Lavasoft\Ad-Aware\Update\lavamessage.dll
2009-06-15 17:45 . 2009-06-15 17:45 15688 ----a-w- c:\documents and settings\All Users\Application Data\Lavasoft\Ad-Aware\Update\lsdelete.exe
2009-06-15 17:45 . 2009-06-15 17:45 348496 ----a-w- c:\documents and settings\All Users\Application Data\Lavasoft\Ad-Aware\Update\lavalicense.dll
2009-06-15 17:45 . 2009-06-15 17:45 294240 ----a-w- c:\documents and settings\All Users\Application Data\Lavasoft\Ad-Aware\Update\UpdateManager.dll
2009-06-15 17:45 . 2009-06-15 17:45 83808 ----a-w- c:\documents and settings\All Users\Application Data\Lavasoft\Ad-Aware\Update\ShellExt.dll
2009-06-15 17:44 . 2009-06-15 17:44 1630048 ----a-w- c:\documents and settings\All Users\Application Data\Lavasoft\Ad-Aware\Update\Resources.dll
2009-06-15 17:44 . 2009-06-15 17:44 64160 ----a-w- c:\documents and settings\All Users\Application Data\Lavasoft\Ad-Aware\Update\Drivers\32\lbd.sys
2009-06-15 17:44 . 2009-06-15 17:44 40288 ----a-w- c:\documents and settings\All Users\Application Data\Lavasoft\Ad-Aware\Update\PrivacyClean.dll
2009-06-15 17:44 . 2009-06-15 17:44 212848 ----a-w- c:\documents and settings\All Users\Application Data\Lavasoft\Ad-Aware\Update\RPAPI.dll
2009-06-15 17:44 . 2009-06-15 17:44 640360 ----a-w- c:\documents and settings\All Users\Application Data\Lavasoft\Ad-Aware\Update\CEAPI.dll
2009-06-15 17:44 . 2009-06-15 17:44 540536 ----a-w- c:\documents and settings\All Users\Application Data\Lavasoft\Ad-Aware\Update\Ad-AwareCommand.exe
2009-06-15 17:44 . 2009-06-15 17:44 559464 ----a-w- c:\documents and settings\All Users\Application Data\Lavasoft\Ad-Aware\Update\Ad-AwareAdmin.exe
2009-06-15 17:44 . 2009-06-15 17:44 2352456 ----a-w- c:\documents and settings\All Users\Application Data\Lavasoft\Ad-Aware\Update\Ad-Aware.exe
2009-06-15 17:44 . 2009-06-15 17:44 627536 ----a-w- c:\documents and settings\All Users\Application Data\Lavasoft\Ad-Aware\Update\AAWWSC.exe
2009-06-15 17:44 . 2009-06-15 17:44 518488 ----a-w- c:\documents and settings\All Users\Application Data\Lavasoft\Ad-Aware\Update\AAWTray.exe
2009-06-15 17:44 . 2009-06-15 17:44 1005904 ----a-w- c:\documents and settings\All Users\Application Data\Lavasoft\Ad-Aware\Update\AAWService.exe
2009-06-15 17:39 . 2009-06-15 17:39 -------- dc-h--w- c:\documents and settings\All Users\Application Data\{7972B2E5-3E09-4E5E-81B7-FE5819D6772F}
2009-06-15 17:39 . 2009-03-12 08:17 2902048 -c--a-w- c:\documents and settings\All Users\Application Data\{7972B2E5-3E09-4E5E-81B7-FE5819D6772F}\Ad-AwareAE.exe
2009-06-13 03:14 . 2009-06-13 05:11 -------- d-----w- c:\documents and settings\Owner\.housecall6.6
2009-06-13 03:06 . 2009-06-13 03:06 -------- d-s---r- C:\assembly
2009-06-11 14:40 . 2009-06-11 14:40 -------- d-sh--w- c:\windows\system32\config\systemprofile\PrivacIE
2009-06-10 18:26 . 2009-06-10 18:26 -------- d-----w- c:\documents and settings\Administrator\Local Settings\Application Data\Mozilla
2009-06-10 18:24 . 2009-06-13 14:19 -------- d-----w- c:\documents and settings\Administrator\Application Data\.clamwin
2009-06-05 00:43 . 2009-06-05 00:46 -------- d-----w- c:\documents and settings\Owner\tmp
2009-05-28 23:55 . 2009-05-28 23:55 -------- d-----w- c:\program files\NortonInstaller
2009-05-28 23:55 . 2009-05-28 23:55 -------- d-----w- c:\documents and settings\All Users\Application Data\NortonInstaller
2009-05-28 21:13 . 2009-05-28 21:13 -------- d-----w- c:\program files\Common Files\Uninstall
2009-05-28 21:12 . 2009-05-28 21:12 -------- d-----w- c:\program files\LimeWire
2009-05-28 21:10 . 2009-05-28 21:11 -------- d-----w- C:\b36a23ba899725aee97877da
2009-05-26 23:37 . 2009-05-26 23:37 -------- d-sh--w- c:\documents and settings\Guest\PrivacIE
2009-05-26 23:37 . 2009-05-26 23:37 -------- d-sh--w- c:\documents and settings\Guest\IETldCache

.

lcander
Intermediate
Intermediate

Status :
Online
Offline

Posts : 103
Joined : 2009-06-16
OS : Xp, Vista

View user profile

Back to top Go down

Combo Fix part 2

Post by lcander on Wed Jun 17, 2009 12:07 am

(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2009-06-16 05:45 . 2009-03-16 05:45 15360 --sha-w- c:\windows\system32\yeyapoyu.exe
2009-06-15 19:20 . 2007-01-08 19:39 -------- d-----w- c:\program files\ClamWin
2009-06-15 18:47 . 2008-04-08 19:18 -------- d-----w- c:\program files\Mozilla Thunderbird
2009-06-15 17:56 . 2004-11-23 22:33 -------- d-----w- c:\documents and settings\All Users\Application Data\Spybot - Search & Destroy
2009-06-15 17:45 . 2009-03-15 17:45 15360 --sha-w- c:\windows\system32\wanisupa.exe
2009-06-15 17:39 . 2007-01-08 17:14 -------- d-----w- c:\program files\Lavasoft
2009-06-15 17:29 . 2004-11-23 22:33 -------- d-----w- c:\program files\Spybot - Search & Destroy
2009-06-13 16:49 . 2006-08-28 21:20 -------- d-----w- c:\documents and settings\All Users\Application Data\Kodak
2009-06-09 14:05 . 2009-03-09 14:04 537918 --sha-w- c:\windows\system32\nahovoge.exe
2009-06-07 19:03 . 2008-11-28 04:58 -------- d-----w- c:\program files\Common Files\Symantec Shared
2009-06-03 01:00 . 2005-07-19 01:08 -------- d-----w- c:\documents and settings\Owner\Application Data\AdobeUM
2009-05-27 11:27 . 2009-02-27 11:27 100864 ------w- c:\windows\system32\zojarepi.dll
2009-05-14 00:18 . 2009-02-14 00:18 63488 --sha-w- c:\windows\system32\zefirena.exe
2009-05-11 00:10 . 2009-02-11 00:10 70656 --sha-w- c:\windows\system32\pevuweku.dll
2009-05-10 12:10 . 2009-02-10 12:10 64000 --sha-w- c:\windows\system32\lutafone.exe
2009-05-10 12:10 . 2009-02-10 12:10 101376 ------w- c:\windows\system32\loganini.dll
2009-04-30 12:55 . 2004-11-24 04:18 -------- d-----w- c:\documents and settings\Owner\Application Data\MSN6
2009-04-19 17:21 . 2007-11-23 05:56 65816 -c--a-w- c:\documents and settings\Guest\Local Settings\Application Data\GDIPFONTCACHEV1.DAT
2008-09-06 07:35 . 2008-09-06 07:35 774144 -c--a-w- c:\program files\RngInterstitial.dll
2009-02-11 00:11 . 2009-02-11 00:11 70656 --sha-w- c:\windows\system32\domagihi.dll.tmp
2009-02-11 00:11 . 2009-02-11 00:11 70656 --sha-w- c:\windows\system32\jivuvomo.dll.tmp
2009-02-11 00:11 . 2009-02-11 00:11 70656 --sha-w- c:\windows\system32\kesezila.dll.tmp
.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"ctfmon.exe"="c:\windows\system32\ctfmon.exe" [2008-04-14 15360]
"PhotoShow Deluxe Media Manager"="c:\progra~1\SIMPLE~1\PHOTOS~1\data\Xtras\mssysmgr.exe" [2005-01-22 163840]
"MoneyAgent"="c:\program files\Microsoft Money\System\mnyexpr.exe" [2003-06-18 200704]
"SpybotSD TeaTimer"="c:\program files\Spybot - Search & Destroy\TeaTimer.exe" [2009-03-05 2260480]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"StorageGuard"="c:\program files\Common Files\Sonic\Update Manager\sgtray.exe" [2003-02-13 155648]
"QuickTime Task"="c:\program files\QuickTime\qttask.exe" [2007-11-15 286720]
"PCMService"="c:\program files\Dell\Media Experience\PCMService.exe" [2003-08-27 204800]
"MimBoot"="c:\progra~1\MUSICM~1\MUSICM~1\mimboot.exe" [2006-01-19 11776]
"igfxtray"="c:\windows\system32\igfxtray.exe" [2005-09-20 94208]
"igfxpers"="c:\windows\system32\igfxpers.exe" [2005-09-20 114688]
"igfxhkcmd"="c:\windows\system32\hkcmd.exe" [2005-09-20 77824]
"HP Software Update"="c:\program files\HP\HP Software Update\HPWuSchd2.exe" [2006-02-19 49152]
"Dell AIO Printer A960"="c:\program files\Dell AIO Printer A960\dlbfbmgr.exe" [2003-09-21 270336]
"Ad-Watch"="c:\program files\Lavasoft\Ad-Aware\AAWTray.exe" [2009-06-15 518488]
"ClamWin"="c:\program files\ClamWin\bin\ClamTray.exe" [2009-06-12 86016]

c:\documents and settings\All Users\Start Menu\Programs\Startup\
HP Digital Imaging Monitor.lnk - c:\program files\HP\Digital Imaging\bin\hpqtra08.exe [2006-2-19 288472]
HP Photosmart Premier Fast Start.lnk - c:\program files\HP\Digital Imaging\bin\hpqthb08.exe [2006-2-10 73728]
Kodak EasyShare software.lnk - c:\program files\Kodak\Kodak EasyShare software\bin\EasyShare.exe [2005-11-4 176128]

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\Lavasoft Ad-Aware Service]
@="Service"
HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\AVG7_EMC
HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\dla
HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\MCAgentExe
HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\MCUpdateExe
HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\TangoManager

[HKEY_LOCAL_MACHINE\software\microsoft\security center]
"UpdatesDisableNotify"=dword:00000001

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=
"c:\\Program Files\\Kodak\\KODAK Software Updater\\7288971\\Program\\Kodak Software Updater.exe"=
"c:\\Program Files\\Kodak\\Kodak EasyShare software\\bin\\EasyShare.exe"=
"c:\\Program Files\\LimeWire\\LimeWire.exe"=
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"c:\\WINDOWS\\system32\\mmc.exe"=
"c:\\WINDOWS\\system32\\LEXPPS.EXE"=

R0 Lbd;Lbd;c:\windows\system32\drivers\Lbd.sys [6/15/2009 12:45 PM 64160]
R2 MrHealthyService;MrHealthy;c:\program files\Norton PC Checkup\executables\mrHealthy\MrHealthy.exe -service --> c:\program files\Norton PC Checkup\executables\mrHealthy\MrHealthy.exe -service [?]
S3 ENDETECT;ENDETECT; [x]
S3 getPlus(R) Helper;getPlus(R) Helper;c:\program files\NOS\bin\getPlus_HelperSvc.exe [1/12/2009 10:52 PM 33752]
S3 L2XPSR;L2XPSR; [x]
S3 Lavasoft Ad-Aware Service;Lavasoft Ad-Aware Service;c:\program files\Lavasoft\Ad-Aware\AAWService.exe [3/9/2009 2:06 PM 1005904]
S3 LOGNT;LOGNT; [x]
S3 NTSTPL1;NTSTPL1; [x]
S3 TAPBIND;TAPBIND; [x]

[HKEY_LOCAL_MACHINE\software\microsoft\active setup\installed components\>{60B49E34-C7CC-11D0-8953-00A0C90347FF}]
"c:\windows\system32\rundll32.exe" "c:\windows\system32\iedkcs32.dll",BrandIEActiveSetup SIGNUP
.
Contents of the 'Scheduled Tasks' folder

2009-06-15 c:\windows\Tasks\Ad-Aware Update (Weekly).job
- c:\program files\Lavasoft\Ad-Aware\Ad-AwareAdmin.exe [2009-03-09 17:44]

2009-06-04 c:\windows\Tasks\Norton PC Checkup Weekday Scanner.job
- c:\program files\Norton PC Checkup\PC_Checkup.exe [2009-01-29 22:10]

2009-06-13 c:\windows\Tasks\Norton PC Checkup Weekend Scanner.job
- c:\program files\Norton PC Checkup\PC_Checkup.exe [2009-01-29 22:10]
.
- - - - ORPHANS REMOVED - - - -

BHO-{3fd9cb96-2379-472b-8d7c-722de0eb19e6} - c:\windows\system32\yenuhaja.dll
HKCU-Run-RealPlayer - c:\program files\Real\RealOne Player\realplay.exe
HKCU-Run-MySpaceIM - c:\program files\MySpace\IM\MySpaceIM.exe
HKCU-Run-MsnMsgr - c:\program files\MSN Messenger\MsnMsgr.Exe
HKCU-Run-ErrorFix - c:\program files\ErrorFix\ErrorFix.exe
HKCU-Run-Sonic RecordNow! - (no file)
HKLM-Run-PAV - c:\program files\PAV\pav.exe
HKLM-Run-iTunesHelper - c:\program files\iTunes\iTunesHelper.exe
HKLM-Run-AVG7_CC - c:\progra~1\Grisoft\AVGFRE~1\avgcc.exe
HKLM-Run-e064862a - c:\windows\system32\ripagupa.dll
HKLM-Run-CPMe357b5b6 - c:\windows\system32\zesanido.dll
HKLM-Run-legejiyune - c:\windows\system32\yosutihe.dll


.
------- Supplementary Scan -------
.
uStart Page = [You must be registered and logged in to see this link.]
uSearchMigratedDefaultURL = [You must be registered and logged in to see this link.]
mSearch Bar = [You must be registered and logged in to see this link.]
uInternet Connection Wizard,ShellNext = iexplore
uSearchURL,(Default) = [You must be registered and logged in to see this link.]
Trusted Zone: musicmatch.com\online
FF - ProfilePath -
.
.
------- File Associations -------
.
JSEFile=NOTEPAD.EXE %1
VBEFile=NOTEPAD.EXE %1
VBSFile=NOTEPAD.EXE %1
.

**************************************************************************

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, [You must be registered and logged in to see this link.]
Rootkit scan 2009-06-16 13:22
Windows 5.1.2600 Service Pack 3 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully
hidden files: 0

**************************************************************************
.
--------------------- LOCKED REGISTRY KEYS ---------------------

[HKEY_USERS\.Default\Software\Microsoft\Internet Explorer\User Preferences]
@Denied: (2) (LocalSystem)
"88D7D0879DAB32E14DE5B3A805A34F98AFF34F5977"=hex:01,00,00,00,d0,8c,9d,df,01,15,
d1,11,8c,7a,00,c0,4f,c2,97,eb,01,00,00,00,e5,70,95,ff,91,6a,25,4d,b2,cb,43,\
"2D53CFFC5C1A3DD2E97B7979AC2A92BD59BC839E81"=hex:01,00,00,00,d0,8c,9d,df,01,15,
d1,11,8c,7a,00,c0,4f,c2,97,eb,01,00,00,00,e5,70,95,ff,91,6a,25,4d,b2,cb,43,\
.
--------------------- DLLs Loaded Under Running Processes ---------------------

- - - - - - - > 'explorer.exe'(3168)
c:\windows\system32\ieframe.dll
c:\windows\system32\OneX.DLL
c:\windows\system32\eappprxy.dll
c:\windows\system32\webcheck.dll
c:\windows\system32\WPDShServiceObj.dll
c:\windows\system32\PortableDeviceTypes.dll
c:\windows\system32\PortableDeviceApi.dll
.
------------------------ Other Running Processes ------------------------
.
c:\windows\system32\LEXBCES.EXE
c:\windows\system32\LEXPPS.EXE
c:\program files\Norton PC Checkup\executables\mrHealthy\MrHealthy.exe
c:\program files\Dell AIO Printer A960\dlbfbmon.exe
c:\progra~1\MUSICM~1\MUSICM~1\MMDiag.exe
c:\program files\HP\Digital Imaging\bin\hpqimzone.exe
c:\program files\MUSICMATCH\MUSICMATCH Jukebox\mim.exe
c:\windows\system32\wscntfy.exe
c:\windows\system32\wbem\unsecapp.exe
c:\program files\HP\Digital Imaging\bin\hpqste08.exe
c:\windows\system32\msiexec.exe
c:\windows\system32\dwwin.exe
.
**************************************************************************
.
Completion time: 2009-06-16 13:32 - machine was rebooted
ComboFix-quarantined-files.txt 2009-06-16 18:32

Pre-Run: 60,559,446,016 bytes free
Post-Run: 60,656,050,176 bytes free

WindowsXP-KB310994-SP2-Home-BootDisk-ENU.exe
[boot loader]
timeout=2
default=multi(0)disk(0)rdisk(0)partition(1)\WINDOWS
[operating systems]
c:\cmdcons\BOOTSECT.DAT="Microsoft Windows Recovery Console" /cmdcons
multi(0)disk(0)rdisk(0)partition(1)\WINDOWS="Microsoft Windows XP Home Edition" /fastdetect /NoExecute=OptIn
multi(0)disk(0)rdisk(0)partition(2)\WINDOWS="Microsoft Windows XP Home Edition" /fastdetect

347 --- E O F --- 2009-04-17 15:04

lcander
Intermediate
Intermediate

Status :
Online
Offline

Posts : 103
Joined : 2009-06-16
OS : Xp, Vista

View user profile

Back to top Go down

Re: More system security problems

Post by Belahzur on Wed Jun 17, 2009 12:22 pm

Now open a new notepad file.
Input this into the notepad file:

KILLALL::

File::
c:\windows\zaponce52689.dat
c:\windows\system32\bohusika.exe
c:\windows\zaponce53652.dat
C:\d45.bat
c:\windows\zaponce53290.dat
c:\windows\zaponce53173.dat
c:\windows\system32\yeyapoyu.exe
c:\windows\system32\wanisupa.exe
c:\windows\system32\nahovoge.exe
c:\windows\system32\zojarepi.dll
c:\windows\system32\zefirena.exe
c:\windows\system32\pevuweku.dll
c:\windows\system32\lutafone.exe
c:\windows\system32\loganini.dll
c:\windows\system32\domagihi.dll.tmp
c:\windows\system32\jivuvomo.dll.tmp
c:\windows\system32\kesezila.dll.tmp

Folder::
c:\program files\LimeWire
c:\program files\Common Files\Uninstall

Registry::
[HKEY_LOCAL_MACHINE\software\microsoft\security center]
"UpdatesDisableNotify"=-
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"c:\\Program Files\\LimeWire\\LimeWire.exe"=-

DDS::
uStart Page = [You must be registered and logged in to see this link.]

Driver::
LOGNT
NTSTPL1
TAPBIND
L2XPSR
ENDETECT

Save this as CFScript.txt, save it to your desktop also.
Then drag and drop CFScript.txt into combofix as seen below:


This will open combofix again, agree to it's terms and allow it to run.
It may want to reboot after it's done. (It will warn you if it wants to)
Post the resulting log back here.


[You must be registered and logged in to see this link.] - [You must be registered and logged in to see this link.] - Please PM me if I fail to respond within 24hrs.


Belahzur
Administrator
Administrator

Status :
Online
Offline

Posts : 34916
Joined : 2008-08-03
Gender : Male
OS : XP SP3 Media Centre

View user profile

Back to top Go down

Combo fix report2 part 1

Post by lcander on Wed Jun 17, 2009 1:49 pm

ComboFix 09-06-16.05 - Owner 06/17/2009 8:18.3 - NTFSx86
Microsoft Windows XP Home Edition 5.1.2600.3.1252.1.1033.18.510.259 [GMT -5:00]
Running from: c:\documents and settings\Owner\Desktop\Combo-Fix.exe
Command switches used :: c:\documents and settings\Owner\Desktop\CFScript.txt

FILE ::
"C:\d45.bat"
"c:\windows\system32\bohusika.exe"
"c:\windows\system32\domagihi.dll.tmp"
"c:\windows\system32\jivuvomo.dll.tmp"
"c:\windows\system32\kesezila.dll.tmp"
"c:\windows\system32\loganini.dll"
"c:\windows\system32\lutafone.exe"
"c:\windows\system32\nahovoge.exe"
"c:\windows\system32\pevuweku.dll"
"c:\windows\system32\wanisupa.exe"
"c:\windows\system32\yeyapoyu.exe"
"c:\windows\system32\zefirena.exe"
"c:\windows\system32\zojarepi.dll"
"c:\windows\zaponce52689.dat"
"c:\windows\zaponce53173.dat"
"c:\windows\zaponce53290.dat"
"c:\windows\zaponce53652.dat"
.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.

c:\program files\Common Files\Uninstall
c:\program files\LimeWire
c:\program files\Common Files\Uninstall\PAV\Uninstall.lnk
c:\program files\LimeWire\lib\jacob-1.14.1-x64.dll
c:\program files\LimeWire\lib\jacob-1.14.1-x86.dll
c:\program files\LimeWire\lib\jdic.dll
c:\program files\LimeWire\lib\LimeWire.ico
c:\program files\LimeWire\lib\log4j.properties
c:\program files\LimeWire\lib\SystemUtilities.dll
c:\program files\LimeWire\lib\SystemUtilitiesA.dll
c:\program files\LimeWire\LimeWire On Startup.lnk
c:\program files\LimeWire\LimeWire.exe
c:\program files\LimeWire\LimeWire.ico
c:\program files\LimeWire\pmf.ico
c:\windows\system32\bohusika.exe
c:\windows\system32\domagihi.dll.tmp
c:\windows\system32\jivuvomo.dll.tmp
c:\windows\system32\kesezila.dll.tmp
c:\windows\system32\loganini.dll
c:\windows\system32\lutafone.exe
c:\windows\system32\nahovoge.exe
c:\windows\system32\pevuweku.dll
c:\windows\system32\wanisupa.exe
c:\windows\system32\yeyapoyu.exe
c:\windows\system32\zefirena.exe
c:\windows\system32\zojarepi.dll
c:\windows\zaponce52689.dat
c:\windows\zaponce53173.dat
c:\windows\zaponce53290.dat
c:\windows\zaponce53652.dat

.
((((((((((((((((((((((((((((((((((((((( Drivers/Services )))))))))))))))))))))))))))))))))))))))))))))))))
.

-------\Legacy_ENDETECT
-------\Legacy_L2XPSR
-------\Legacy_LOGNT
-------\Legacy_NTSTPL1
-------\Legacy_TAPBIND
-------\Service_ENDETECT
-------\Service_L2XPSR
-------\Service_LOGNT
-------\Service_NTSTPL1
-------\Service_TAPBIND


((((((((((((((((((((((((( Files Created from 2009-05-17 to 2009-06-17 )))))))))))))))))))))))))))))))
.

2009-06-16 14:46 . 2009-05-26 18:20 40160 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2009-06-16 14:46 . 2009-06-16 14:47 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
2009-06-16 14:46 . 2009-06-16 14:46 -------- d-----w- c:\documents and settings\All Users\Application Data\Malwarebytes
2009-06-16 14:46 . 2009-05-26 18:19 19096 ----a-w- c:\windows\system32\drivers\mbam.sys
2009-06-16 02:02 . 2009-06-16 02:02 -------- d-----w- c:\program files\Trend Micro
2009-06-15 18:11 . 2009-06-15 17:45 15688 ----a-w- c:\windows\system32\lsdelete.exe
2009-06-15 17:45 . 2009-06-15 17:44 64160 ----a-w- c:\windows\system32\drivers\Lbd.sys
2009-06-15 17:45 . 2009-06-15 17:45 314200 ----a-w- c:\documents and settings\All Users\Application Data\Lavasoft\Ad-Aware\Update\threatwork.exe
2009-06-15 17:45 . 2009-06-15 17:45 25440 ----a-w- c:\documents and settings\All Users\Application Data\Lavasoft\Ad-Aware\Update\savapibridge.dll
2009-06-15 17:45 . 2009-06-15 17:45 169312 ----a-w- c:\documents and settings\All Users\Application Data\Lavasoft\Ad-Aware\Update\lavamessage.dll
2009-06-15 17:45 . 2009-06-15 17:45 15688 ----a-w- c:\documents and settings\All Users\Application Data\Lavasoft\Ad-Aware\Update\lsdelete.exe
2009-06-15 17:45 . 2009-06-15 17:45 348496 ----a-w- c:\documents and settings\All Users\Application Data\Lavasoft\Ad-Aware\Update\lavalicense.dll
2009-06-15 17:45 . 2009-06-15 17:45 294240 ----a-w- c:\documents and settings\All Users\Application Data\Lavasoft\Ad-Aware\Update\UpdateManager.dll
2009-06-15 17:45 . 2009-06-15 17:45 83808 ----a-w- c:\documents and settings\All Users\Application Data\Lavasoft\Ad-Aware\Update\ShellExt.dll
2009-06-15 17:44 . 2009-06-15 17:44 1630048 ----a-w- c:\documents and settings\All Users\Application Data\Lavasoft\Ad-Aware\Update\Resources.dll
2009-06-15 17:44 . 2009-06-15 17:44 64160 ----a-w- c:\documents and settings\All Users\Application Data\Lavasoft\Ad-Aware\Update\Drivers\32\lbd.sys
2009-06-15 17:44 . 2009-06-15 17:44 40288 ----a-w- c:\documents and settings\All Users\Application Data\Lavasoft\Ad-Aware\Update\PrivacyClean.dll
2009-06-15 17:44 . 2009-06-15 17:44 212848 ----a-w- c:\documents and settings\All Users\Application Data\Lavasoft\Ad-Aware\Update\RPAPI.dll
2009-06-15 17:44 . 2009-06-15 17:44 640360 ----a-w- c:\documents and settings\All Users\Application Data\Lavasoft\Ad-Aware\Update\CEAPI.dll
2009-06-15 17:44 . 2009-06-15 17:44 540536 ----a-w- c:\documents and settings\All Users\Application Data\Lavasoft\Ad-Aware\Update\Ad-AwareCommand.exe
2009-06-15 17:44 . 2009-06-15 17:44 559464 ----a-w- c:\documents and settings\All Users\Application Data\Lavasoft\Ad-Aware\Update\Ad-AwareAdmin.exe
2009-06-15 17:44 . 2009-06-15 17:44 2352456 ----a-w- c:\documents and settings\All Users\Application Data\Lavasoft\Ad-Aware\Update\Ad-Aware.exe
2009-06-15 17:44 . 2009-06-15 17:44 627536 ----a-w- c:\documents and settings\All Users\Application Data\Lavasoft\Ad-Aware\Update\AAWWSC.exe
2009-06-15 17:44 . 2009-06-15 17:44 518488 ----a-w- c:\documents and settings\All Users\Application Data\Lavasoft\Ad-Aware\Update\AAWTray.exe
2009-06-15 17:44 . 2009-06-15 17:44 1005904 ----a-w- c:\documents and settings\All Users\Application Data\Lavasoft\Ad-Aware\Update\AAWService.exe
2009-06-15 17:39 . 2009-06-15 17:39 -------- dc-h--w- c:\documents and settings\All Users\Application Data\{7972B2E5-3E09-4E5E-81B7-FE5819D6772F}
2009-06-15 17:39 . 2009-03-12 08:17 2902048 -c--a-w- c:\documents and settings\All Users\Application Data\{7972B2E5-3E09-4E5E-81B7-FE5819D6772F}\Ad-AwareAE.exe
2009-06-13 03:14 . 2009-06-13 05:11 -------- d-----w- c:\documents and settings\Owner\.housecall6.6
2009-06-13 03:06 . 2009-06-13 03:06 -------- d-s---r- C:\assembly
2009-06-11 14:40 . 2009-06-11 14:40 -------- d-sh--w- c:\windows\system32\config\systemprofile\PrivacIE
2009-06-10 18:26 . 2009-06-10 18:26 -------- d-----w- c:\documents and settings\Administrator\Local Settings\Application Data\Mozilla
2009-06-10 18:24 . 2009-06-13 14:19 -------- d-----w- c:\documents and settings\Administrator\Application Data\.clamwin
2009-06-05 00:43 . 2009-06-05 00:46 -------- d-----w- c:\documents and settings\Owner\tmp
2009-05-28 23:55 . 2009-05-28 23:55 -------- d-----w- c:\program files\NortonInstaller
2009-05-28 23:55 . 2009-05-28 23:55 -------- d-----w- c:\documents and settings\All Users\Application Data\NortonInstaller
2009-05-28 21:10 . 2009-05-28 21:11 -------- d-----w- C:\b36a23ba899725aee97877da
2009-05-26 23:37 . 2009-05-26 23:37 -------- d-sh--w- c:\documents and settings\Guest\PrivacIE
2009-05-26 23:37 . 2009-05-26 23:37 -------- d-sh--w- c:\documents and settings\Guest\IETldCache

.

lcander
Intermediate
Intermediate

Status :
Online
Offline

Posts : 103
Joined : 2009-06-16
OS : Xp, Vista

View user profile

Back to top Go down

Combo Fix report2 part 2

Post by lcander on Wed Jun 17, 2009 1:50 pm

(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2009-06-15 19:20 . 2007-01-08 19:39 -------- d-----w- c:\program files\ClamWin
2009-06-15 18:47 . 2008-04-08 19:18 -------- d-----w- c:\program files\Mozilla Thunderbird
2009-06-15 17:56 . 2004-11-23 22:33 -------- d-----w- c:\documents and settings\All Users\Application Data\Spybot - Search & Destroy
2009-06-15 17:39 . 2007-01-08 17:14 -------- d-----w- c:\program files\Lavasoft
2009-06-15 17:29 . 2004-11-23 22:33 -------- d-----w- c:\program files\Spybot - Search & Destroy
2009-06-13 16:49 . 2006-08-28 21:20 -------- d-----w- c:\documents and settings\All Users\Application Data\Kodak
2009-06-07 19:03 . 2008-11-28 04:58 -------- d-----w- c:\program files\Common Files\Symantec Shared
2009-06-03 01:00 . 2005-07-19 01:08 -------- d-----w- c:\documents and settings\Owner\Application Data\AdobeUM
2009-04-30 12:55 . 2004-11-24 04:18 -------- d-----w- c:\documents and settings\Owner\Application Data\MSN6
2009-04-19 17:21 . 2007-11-23 05:56 65816 -c--a-w- c:\documents and settings\Guest\Local Settings\Application Data\GDIPFONTCACHEV1.DAT
2008-09-06 07:35 . 2008-09-06 07:35 774144 -c--a-w- c:\program files\RngInterstitial.dll
.

((((((((((((((((((((((((((((( [You must be registered and logged in to see this link.] )))))))))))))))))))))))))))))))))))))))))
.
+ 2009-06-17 13:32 . 2009-06-17 13:32 16384 c:\windows\temp\Perflib_Perfdata_7f4.dat
.
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"ctfmon.exe"="c:\windows\system32\ctfmon.exe" [2008-04-14 15360]
"PhotoShow Deluxe Media Manager"="c:\progra~1\SIMPLE~1\PHOTOS~1\data\Xtras\mssysmgr.exe" [2005-01-22 163840]
"MoneyAgent"="c:\program files\Microsoft Money\System\mnyexpr.exe" [2003-06-18 200704]
"SpybotSD TeaTimer"="c:\program files\Spybot - Search & Destroy\TeaTimer.exe" [2009-03-05 2260480]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"StorageGuard"="c:\program files\Common Files\Sonic\Update Manager\sgtray.exe" [2003-02-13 155648]
"QuickTime Task"="c:\program files\QuickTime\qttask.exe" [2007-11-15 286720]
"PCMService"="c:\program files\Dell\Media Experience\PCMService.exe" [2003-08-27 204800]
"MimBoot"="c:\progra~1\MUSICM~1\MUSICM~1\mimboot.exe" [2006-01-19 11776]
"igfxtray"="c:\windows\system32\igfxtray.exe" [2005-09-20 94208]
"igfxpers"="c:\windows\system32\igfxpers.exe" [2005-09-20 114688]
"igfxhkcmd"="c:\windows\system32\hkcmd.exe" [2005-09-20 77824]
"HP Software Update"="c:\program files\HP\HP Software Update\HPWuSchd2.exe" [2006-02-19 49152]
"Dell AIO Printer A960"="c:\program files\Dell AIO Printer A960\dlbfbmgr.exe" [2003-09-21 270336]
"Ad-Watch"="c:\program files\Lavasoft\Ad-Aware\AAWTray.exe" [2009-06-15 518488]
"ClamWin"="c:\program files\ClamWin\bin\ClamTray.exe" [2009-06-12 86016]

c:\documents and settings\All Users\Start Menu\Programs\Startup\
HP Digital Imaging Monitor.lnk - c:\program files\HP\Digital Imaging\bin\hpqtra08.exe [2006-2-19 288472]
HP Photosmart Premier Fast Start.lnk - c:\program files\HP\Digital Imaging\bin\hpqthb08.exe [2006-2-10 73728]
Kodak EasyShare software.lnk - c:\program files\Kodak\Kodak EasyShare software\bin\EasyShare.exe [2005-11-4 176128]

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\Lavasoft Ad-Aware Service]
@="Service"

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=
"c:\\Program Files\\Kodak\\KODAK Software Updater\\7288971\\Program\\Kodak Software Updater.exe"=
"c:\\Program Files\\Kodak\\Kodak EasyShare software\\bin\\EasyShare.exe"=
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"c:\\WINDOWS\\system32\\mmc.exe"=
"c:\\WINDOWS\\system32\\LEXPPS.EXE"=

R0 Lbd;Lbd;c:\windows\system32\drivers\Lbd.sys [6/15/2009 12:45 PM 64160]
R2 MrHealthyService;MrHealthy;c:\program files\Norton PC Checkup\executables\mrHealthy\MrHealthy.exe -service --> c:\program files\Norton PC Checkup\executables\mrHealthy\MrHealthy.exe -service [?]
S3 getPlus(R) Helper;getPlus(R) Helper;c:\program files\NOS\bin\getPlus_HelperSvc.exe [1/12/2009 10:52 PM 33752]
S3 Lavasoft Ad-Aware Service;Lavasoft Ad-Aware Service;c:\program files\Lavasoft\Ad-Aware\AAWService.exe [3/9/2009 2:06 PM 1005904]

[HKEY_LOCAL_MACHINE\software\microsoft\active setup\installed components\>{60B49E34-C7CC-11D0-8953-00A0C90347FF}]
"c:\windows\system32\rundll32.exe" "c:\windows\system32\iedkcs32.dll",BrandIEActiveSetup SIGNUP
.
Contents of the 'Scheduled Tasks' folder

2009-06-15 c:\windows\Tasks\Ad-Aware Update (Weekly).job
- c:\program files\Lavasoft\Ad-Aware\Ad-AwareAdmin.exe [2009-03-09 17:44]

2009-06-04 c:\windows\Tasks\Norton PC Checkup Weekday Scanner.job
- c:\program files\Norton PC Checkup\PC_Checkup.exe [2009-01-29 22:10]

2009-06-13 c:\windows\Tasks\Norton PC Checkup Weekend Scanner.job
- c:\program files\Norton PC Checkup\PC_Checkup.exe [2009-01-29 22:10]
.
- - - - ORPHANS REMOVED - - - -

BHO-{3fd9cb96-2379-472b-8d7c-722de0eb19e6} - (no file)


.
------- Supplementary Scan -------
.
uSearchMigratedDefaultURL = [You must be registered and logged in to see this link.]
mSearch Bar = [You must be registered and logged in to see this link.]
uInternet Connection Wizard,ShellNext = iexplore
uSearchURL,(Default) = [You must be registered and logged in to see this link.]
Trusted Zone: musicmatch.com\online
FF - ProfilePath -
.

**************************************************************************

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, [You must be registered and logged in to see this link.]
Rootkit scan 2009-06-17 08:31
Windows 5.1.2600 Service Pack 3 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully
hidden files: 0

**************************************************************************
.
--------------------- LOCKED REGISTRY KEYS ---------------------

[HKEY_USERS\.Default\Software\Microsoft\Internet Explorer\User Preferences]
@Denied: (2) (LocalSystem)
"88D7D0879DAB32E14DE5B3A805A34F98AFF34F5977"=hex:01,00,00,00,d0,8c,9d,df,01,15,
d1,11,8c,7a,00,c0,4f,c2,97,eb,01,00,00,00,e5,70,95,ff,91,6a,25,4d,b2,cb,43,\
"2D53CFFC5C1A3DD2E97B7979AC2A92BD59BC839E81"=hex:01,00,00,00,d0,8c,9d,df,01,15,
d1,11,8c,7a,00,c0,4f,c2,97,eb,01,00,00,00,e5,70,95,ff,91,6a,25,4d,b2,cb,43,\
.
--------------------- DLLs Loaded Under Running Processes ---------------------

- - - - - - - > 'explorer.exe'(976)
c:\windows\system32\ieframe.dll
c:\windows\system32\OneX.DLL
c:\windows\system32\eappprxy.dll
c:\windows\system32\webcheck.dll
c:\windows\system32\WPDShServiceObj.dll
c:\windows\system32\PortableDeviceTypes.dll
c:\windows\system32\PortableDeviceApi.dll
.
------------------------ Other Running Processes ------------------------
.
c:\windows\system32\LEXBCES.EXE
c:\windows\system32\LEXPPS.EXE
c:\program files\Norton PC Checkup\executables\mrHealthy\MrHealthy.exe
c:\progra~1\MUSICM~1\MUSICM~1\MMDiag.exe
c:\program files\Dell AIO Printer A960\dlbfbmon.exe
c:\program files\HP\Digital Imaging\bin\hpqimzone.exe
c:\program files\MUSICMATCH\MUSICMATCH Jukebox\mim.exe
c:\windows\system32\wscntfy.exe
c:\program files\HP\Digital Imaging\bin\hpqste08.exe
c:\windows\system32\msiexec.exe
c:\windows\system32\wbem\unsecapp.exe
.
**************************************************************************
.
Completion time: 2009-06-17 8:40 - machine was rebooted
ComboFix-quarantined-files.txt 2009-06-17 13:40
ComboFix2.txt 2009-06-17 00:24
ComboFix3.txt 2009-06-16 18:32

Pre-Run: 60,642,181,120 bytes free
Post-Run: 60,609,331,200 bytes free

240 --- E O F --- 2009-04-17 15:04

lcander
Intermediate
Intermediate

Status :
Online
Offline

Posts : 103
Joined : 2009-06-16
OS : Xp, Vista

View user profile

Back to top Go down

Re: More system security problems

Post by Origin on Wed Jun 17, 2009 1:58 pm

Please download and run this tool.

Download Malwarebytes' Anti-Malware from [You must be registered and logged in to see this link.]

Double Click mbam-setup.exe to install the application.

  • Make sure a checkmark is placed next to Update Malwarebytes' Anti-Malware and Launch Malwarebytes' Anti-Malware, then click Finish.
  • If an update is found, it will download and install the latest version.
  • Once the program has loaded, select "Perform Quick Scan", then click Scan.
  • The scan may take some time to finish,so please be patient.
  • When the scan is complete, click OK, then Show Results to view the results.
  • Make sure that everything is checked, and click Remove Selected.
  • When disinfection is completed, a log will open in Notepad and you may be prompted to Restart. (See Note)
  • The log is automatically saved by MBAM and can be viewed by clicking the Logs tab in MBAM.
Note:
If MBAM encounters a file that is difficult to remove, you will be presented with 1 of 2 prompts.
Click OK to either and let MBAM proceed with the disinfection process.
If asked to restart the computer, please do so immediately.


Post the contents of the MBAM Log.


While my help is always free, please consider donating to keep this site alive: [You must be registered and logged in to see this link.]

[You must be registered and logged in to see this link.]

Origin
Master
Master

Status :
Online
Offline

Posts : 2685
Joined : 2009-05-05
Gender : Male
OS : Windows Xp Sp3

View user profile

Back to top Go down

MBam log

Post by lcander on Wed Jun 17, 2009 2:39 pm

Here is what came up after running Malwarebytes and a restart.

Malwarebytes' Anti-Malware 1.37
Database version: 2296
Windows 5.1.2600 Service Pack 3

6/17/2009 9:29:18 AM
mbam-log-2009-06-17 (09-29-18).txt

Scan type: Quick Scan
Objects scanned: 108629
Time elapsed: 6 minute(s), 47 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 6
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 7
Files Infected: 22

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
HKEY_CLASSES_ROOT\minibugtransporter.minibugtransporterx (Adware.Minibug) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\minibugtransporter.minibugtransporterx.1 (Adware.Minibug) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interface\{04a38f6b-006f-4247-ba4c-02a139d5531c} (Adware.Minibug) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Typelib\{3c2d2a1e-031f-4397-9614-87c932a848e0} (Adware.Minibug) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\ErrorFix (Rogue.ErrorFix) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\ErrorFix (Rogue.ErrorFix) -> Quarantined and deleted successfully.

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
C:\WINDOWS\system32\NetworkService32 (Worm.Archive) -> Quarantined and deleted successfully.
c:\documents and settings\Owner\Application Data\ErrorFix (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\documents and settings\Owner\application data\ErrorFix\Logs (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\documents and settings\Owner\application data\ErrorFix\QuarantineW (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\documents and settings\Owner\application data\ErrorFix\quarantinew\2009-01-12 22-12-410 (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\documents and settings\Owner\application data\ErrorFix\quarantinew\2009-01-12 22-12-410 (Rogue.ErrorFix) -> Files: 601 -> Quarantined and deleted successfully.
c:\documents and settings\Owner\application data\ErrorFix\quarantinew\2009-01-13 16-00-260 (Rogue.ErrorFix) -> Quarantined and deleted successfully.

Files Infected:
c:\WINDOWS\system32\networkservice32\101.crack.zip (Worm.Archive) -> Quarantined and deleted successfully.
c:\WINDOWS\system32\networkservice32\101.crack.zip.kwd (Worm.Archive) -> Quarantined and deleted successfully.
c:\WINDOWS\system32\networkservice32\102.keygen.zip (Worm.Archive) -> Quarantined and deleted successfully.
c:\WINDOWS\system32\networkservice32\102.keygen.zip.kwd (Worm.Archive) -> Quarantined and deleted successfully.
c:\WINDOWS\system32\networkservice32\103.serial.zip (Worm.Archive) -> Quarantined and deleted successfully.
c:\WINDOWS\system32\networkservice32\103.serial.zip.kwd (Worm.Archive) -> Quarantined and deleted successfully.
c:\WINDOWS\system32\networkservice32\104.setup.zip (Worm.Archive) -> Quarantined and deleted successfully.
c:\WINDOWS\system32\networkservice32\104.setup.zip.kwd (Worm.Archive) -> Quarantined and deleted successfully.
c:\WINDOWS\system32\networkservice32\105.music.mp3 (Worm.Archive) -> Quarantined and deleted successfully.
c:\WINDOWS\system32\networkservice32\105.music.mp3.kwd (Worm.Archive) -> Quarantined and deleted successfully.
c:\WINDOWS\system32\networkservice32\106.music.snd (Worm.Archive) -> Quarantined and deleted successfully.
c:\WINDOWS\system32\networkservice32\106.music.snd.kwd (Worm.Archive) -> Quarantined and deleted successfully.
c:\WINDOWS\system32\networkservice32\107.music.au (Worm.Archive) -> Quarantined and deleted successfully.
c:\WINDOWS\system32\networkservice32\107.music.au.kwd (Worm.Archive) -> Quarantined and deleted successfully.
c:\WINDOWS\system32\networkservice32\108.video.wmv (Worm.Archive) -> Quarantined and deleted successfully.
c:\WINDOWS\system32\networkservice32\108.video.wmv.kwd (Worm.Archive) -> Quarantined and deleted successfully.
c:\documents and settings\Owner\application data\ErrorFix\resultsw.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\documents and settings\Owner\application data\ErrorFix\Logs\2009-01-12 22-11-030.log (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\documents and settings\Owner\application data\ErrorFix\Logs\2009-01-13 12-00-010.log (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\documents and settings\Owner\application data\ErrorFix\Logs\2009-01-13 12-00-011.log (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\documents and settings\Owner\application data\ErrorFix\quarantinew\2009-01-13 16-00-260\filelist.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.
c:\documents and settings\Owner\application data\ErrorFix\quarantinew\2009-01-13 16-00-260\regb-0.db (Rogue.ErrorFix) -> Quarantined and deleted successfully.

lcander
Intermediate
Intermediate

Status :
Online
Offline

Posts : 103
Joined : 2009-06-16
OS : Xp, Vista

View user profile

Back to top Go down

Re: More system security problems

Post by Belahzur on Wed Jun 17, 2009 2:44 pm

Hello.
This should be fine now.

Click Start > Run and copy/paste the following bolded text into the Run box and click OK:

ComboFix /u



This will also reset your restore points.

How is the machine running now?


[You must be registered and logged in to see this link.] - [You must be registered and logged in to see this link.] - Please PM me if I fail to respond within 24hrs.


Belahzur
Administrator
Administrator

Status :
Online
Offline

Posts : 34916
Joined : 2008-08-03
Gender : Male
OS : XP SP3 Media Centre

View user profile

Back to top Go down

Thanks

Post by lcander on Wed Jun 17, 2009 7:59 pm

The machine seems to be running much better. A couple programs are slow to open but no more annoying pop-ups. That system security fake was a nasty one.
I think we got it. Thanks so much. Geek Police are great!!!!!

lcander
Intermediate
Intermediate

Status :
Online
Offline

Posts : 103
Joined : 2009-06-16
OS : Xp, Vista

View user profile

Back to top Go down

View previous topic View next topic Back to top

- Similar topics

 
Permissions in this forum:
You cannot reply to topics in this forum