Win32/Crypto Infection

View previous topic View next topic Go down

Win32/Crypto Infection

Post by funshinepa on Thu Aug 20, 2009 10:07 pm

Oh my I've done so much to try and help myself I need you guys for this!!!

Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 5:55:39 PM, on 8/20/2009
Platform: Windows XP SP3 (WinNT 5.01.2600)
MSIE: Internet Explorer v7.00 (7.00.6000.16827)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\Program Files\Lavasoft\Ad-Aware\AAWService.exe
C:\WINDOWS\system32\spoolsv.exe
C:\PROGRA~1\AVG\AVG8\avgwdsvc.exe
C:\WINDOWS\system32\tcpsvcs.exe
C:\Program Files\Dell Support Center\bin\sprtsvc.exe
C:\WINDOWS\system32\svchost.exe
C:\PROGRA~1\AVG\AVG8\avgrsx.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\Explorer.EXE
C:\PROGRA~1\AVG\AVG8\avgtray.exe
C:\Program Files\DellSupport\DSAgnt.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Windows Live\Messenger\msnmsgr.exe
C:\Program Files\Windows Live\Contacts\wlcomm.exe
C:\PROGRA~1\AVG\AVG8\avgnsx.exe
C:\Program Files\Internet Explorer\Iexplore.exe
C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = [You must be registered and logged in to see this link.]
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = [You must be registered and logged in to see this link.]
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = [You must be registered and logged in to see this link.]
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = [You must be registered and logged in to see this link.]
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = [You must be registered and logged in to see this link.]
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant =
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,CustomizeSearch =
R1 - HKCU\Software\Microsoft\Internet Explorer\SearchURL,(Default) = [You must be registered and logged in to see this link.]
R3 - URLSearchHook: AVG Security Toolbar BHO - {A3BC75A2-1F87-4686-AA43-5347D756017C} - C:\Program Files\AVG\AVG8\Toolbar\IEToolbar.dll
R3 - URLSearchHook: (no name) - *{CFBFAE00-17A6-11D0-99CB-00C04FD64497} - (no file)
O2 - BHO: WormRadar.com IESiteBlocker.NavFilter - {3ca2f312-6f6e-4b53-a66e-4e65e497c8c0} - C:\Program Files\AVG\AVG8\avgssie.dll
O2 - BHO: Windows Live Sign-in Helper - {9030D464-4C02-4ABF-8ECC-5164760863C6} - C:\Program Files\Common Files\Microsoft Shared\Windows Live\WindowsLiveLogin.dll
O2 - BHO: AVG Security Toolbar BHO - {a3bc75a2-1f87-4686-aa43-5347d756017c} - C:\Program Files\AVG\AVG8\Toolbar\IEToolbar.dll
O3 - Toolbar: AVG Security Toolbar - {CCC7A320-B3CA-4199-B1A6-9F516DD69829} - C:\Program Files\AVG\AVG8\Toolbar\IEToolbar.dll
O4 - HKLM\..\Run: [AVG8_TRAY] C:\PROGRA~1\AVG\AVG8\avgtray.exe
O4 - HKLM\..\Run: [UserFaultCheck] %systemroot%\system32\dumprep 0 -u
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\Run: [dellsupportcenter] "C:\Program Files\Dell Support Center\bin\sprtcmd.exe" /P dellsupportcenter
O4 - HKCU\..\Run: [dellsupport] "C:\Program Files\DellSupport\DSAgnt.exe" /startup
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
O10 - Unknown file in Winsock LSP: c:\windows\system32\nwprovau.dll
O16 - DPF: {17492023-C23A-453E-A040-C7C580BBF700} (Windows Genuine Advantage Validation Tool) -
O16 - DPF: {215B8138-A3CF-44C5-803F-8226143CFC0A} (Trend Micro ActiveX Scan Agent 6.6) - [You must be registered and logged in to see this link.]
O16 - DPF: {48DD0448-9209-4F81-9F6D-D83562940134} (MySpace Uploader Control) - [You must be registered and logged in to see this link.]
O18 - Protocol: linkscanner - {F274614C-63F8-47D5-A4D1-FBDDE494F8D1} - C:\Program Files\AVG\AVG8\avgpp.dll
O18 - Filter hijack: text/html - {4094be8f-613f-42fb-9679-5defdf39a2af} - (no file)
O20 - Winlogon Notify: avgrsstarter - C:\WINDOWS\SYSTEM32\avgrsstx.dll
O23 - Service: IPv6 Helper Service 6to4Alerter (6to4Alerter) - Unknown owner - C:\WINDOWS\TEMP\g.exe (file missing)
O23 - Service: AVG Free8 WatchDog (avg8wd) - AVG Technologies CZ, s.r.o. - C:\PROGRA~1\AVG\AVG8\avgwdsvc.exe
O23 - Service: Background Intelligent Transfer Service (BITS) - Unknown owner - C:\WINDOWS\
O23 - Service: Lavasoft Ad-Aware Service (lavasoft ad-aware service) - Lavasoft - C:\Program Files\Lavasoft\Ad-Aware\AAWService.exe
O23 - Service: Intel NCS NetService (NetSvc) - Intel(R) Corporation - C:\Program Files\Intel\PROSetWired\NCS\Sync\NetSvc.exe
O23 - Service: SupportSoft Sprocket Service (DellSupportCenter) (sprtsvc_DellSupportCenter) - SupportSoft, Inc. - C:\Program Files\Dell Support Center\bin\sprtsvc.exe
O23 - Service: Viewpoint Manager Service - Unknown owner - C:\Program Files\Viewpoint\Common\ViewpointService.exe (file missing)
O23 - Service: Automatic Updates (wuauserv) - Unknown owner - C:\WINDOWS\

--
End of file - 4941 bytes

funshinepa
Novice
Novice

Posts Posts : 7
Joined Joined : 2009-08-20
Gender Gender : Female
OS OS : WINXP
Points Points : 26649
# Likes # Likes : 0

View user profile

Back to top Go down

Re: Win32/Crypto Infection

Post by Belahzur on Fri Aug 21, 2009 2:21 pm

Hello.

  • Open HijackThis
  • Choose "Do a system scan only"
  • Check the boxes in front of these lines:


    R3 - URLSearchHook: (no name) - *{CFBFAE00-17A6-11D0-99CB-00C04FD64497} - (no file)
    O4 - HKLM\..\Run: [UserFaultCheck] %systemroot%\system32\dumprep 0 -u
    O18 - Filter hijack: text/html - {4094be8f-613f-42fb-9679-5defdf39a2af} - (no file)
    O23 - Service: IPv6 Helper Service 6to4Alerter (6to4Alerter) - Unknown owner - C:\WINDOWS\TEMP\g.exe (file missing)
    O23 - Service: Viewpoint Manager Service - Unknown owner - C:\Program Files\Viewpoint\Common\ViewpointService.exe (file missing)


  • Press "Fix Checked"
  • Close Hijack This.

Please download and run this tool.

Download Malwarebytes' Anti-Malware from [You must be registered and logged in to see this link.]

Double Click mbam-setup.exe to install the application.

  • Make sure a checkmark is placed next to Update Malwarebytes' Anti-Malware and Launch Malwarebytes' Anti-Malware, then click Finish.
  • If an update is found, it will download and install the latest version.
  • Once the program has loaded, select "Perform Quick Scan", then click Scan.
  • The scan may take some time to finish,so please be patient.
  • When the scan is complete, click OK, then Show Results to view the results.
  • Make sure that everything is checked, and click Remove Selected.
  • When disinfection is completed, a log will open in Notepad and you may be prompted to Restart. (See Note)
  • The log is automatically saved by MBAM and can be viewed by clicking the Logs tab in MBAM.
Note:
If MBAM encounters a file that is difficult to remove, you will be presented with 1 of 2 prompts.
Click OK to either and let MBAM proceed with the disinfection process.
If asked to restart the computer, please do so immediately.


Post the contents of the MBAM Log.


[You must be registered and logged in to see this link.] - [You must be registered and logged in to see this link.] - Please PM me if I fail to respond within 24hrs.


Belahzur
Administrator
Administrator

Posts Posts : 34916
Joined Joined : 2008-08-03
Gender Gender : Male
OS OS : XP SP3 Media Centre
Points Points : 245059
# Likes # Likes : 1

View user profile

Back to top Go down

Re: Win32/Crypto Infection

Post by funshinepa on Fri Aug 21, 2009 2:26 pm

Thank you for the reply... I'm at work right now and will do as you ask when I get home after 6 pm. Appreciate your help.

funshinepa
Novice
Novice

Posts Posts : 7
Joined Joined : 2009-08-20
Gender Gender : Female
OS OS : WINXP
Points Points : 26649
# Likes # Likes : 0

View user profile

Back to top Go down

Re: Win32/Crypto Infection

Post by funshinepa on Fri Aug 21, 2009 9:13 pm

Malwarebytes' Anti-Malware 1.40
Database version: 2667
Windows 5.1.2600 Service Pack 3

8/21/2009 5:13:25 PM
mbam-log-2009-08-21 (17-13-25).txt

Scan type: Quick Scan
Objects scanned: 118184
Time elapsed: 9 minute(s), 28 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 1
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 0

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
HKEY_CURRENT_USER\SOFTWARE\ColdWare (Malware.Trace) -> Quarantined and deleted successfully.

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
(No malicious items detected)

funshinepa
Novice
Novice

Posts Posts : 7
Joined Joined : 2009-08-20
Gender Gender : Female
OS OS : WINXP
Points Points : 26649
# Likes # Likes : 0

View user profile

Back to top Go down

Re: Win32/Crypto Infection

Post by funshinepa on Fri Aug 21, 2009 9:15 pm

FYI... My Windows update won't work and when I tried to start the service I noticed it was %fystem% and Not %System%

funshinepa
Novice
Novice

Posts Posts : 7
Joined Joined : 2009-08-20
Gender Gender : Female
OS OS : WINXP
Points Points : 26649
# Likes # Likes : 0

View user profile

Back to top Go down

Re: Win32/Crypto Infection

Post by funshinepa on Fri Aug 21, 2009 9:20 pm

Or %fystemroot% rather..

funshinepa
Novice
Novice

Posts Posts : 7
Joined Joined : 2009-08-20
Gender Gender : Female
OS OS : WINXP
Points Points : 26649
# Likes # Likes : 0

View user profile

Back to top Go down

Re: Win32/Crypto Infection

Post by Origin on Sat Aug 22, 2009 4:59 pm

1. If you are using Firefox, make sure that your download settings are as follows:

* Tools->Options->Main tab
* Set to "Always ask me where to Save the files".

2. During the download, rename Combofix to Combo-Fix as follows:





3. It is important you rename Combofix during the download, but not after.
4. Please do not rename Combofix to other names, but only to the one indicated.
5. Close any open browsers.
6. We need to disable your local AV (Anti-virus) before running Combofix.

  • See [You must be registered and logged in to see this link.] for how to disable your AV.
  • Double click on ComboFix.exe.
  • Follow the prompts. NOTE:
  • Allow combofix to run
  • Post C:\combofix.txt back here.

    Note:
    Do not mouse click combofix's window whilst it's running. That may cause it to stall.


While my help is always free, please consider donating to keep this site alive: [You must be registered and logged in to see this link.]

[You must be registered and logged in to see this link.]

Origin
Master
Master

Posts Posts : 2685
Joined Joined : 2009-05-05
Gender Gender : Male
OS OS : Windows Xp Sp3
Points Points : 31473
# Likes # Likes : 0

View user profile

Back to top Go down

Re: Win32/Crypto Infection

Post by funshinepa on Sat Aug 22, 2009 11:02 pm

ComboFix 09-08-20.07 - Admin 08/21/2009 17:37.1.1 - NTFSx86
Microsoft Windows XP Home Edition 5.1.2600.3.1252.1.1033.18.510.188 [GMT -4:00]
Running from: c:\documents and settings\Admin\Desktop\Combo-Fix.exe
AV: AVG Anti-Virus Free *On-access scanning disabled* (Updated) {17DDD097-36FF-435F-9E1B-52D74245D6BF}
AV: Lavasoft Ad-Watch Live! Anti-Virus *On-access scanning disabled* (Updated) {A1C4F2E0-7FDE-4917-AFAE-013EFC3EDE33}
AV: Windows Live OneCare *On-access scanning enabled* (Updated) {427ADFC3-B354-4A51-BE34-A9D4218E45C4}
FW: Windows Live OneCare Firewall *disabled* {A3899D22-27E6-4A7E-AE4E-2C106646DAAB}
* Created a new restore point
.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.

c:\documents and settings.\NetworkService\Favorites\Desktop.ini
c:\program files\Common
c:\recycler\S-1-5-21-2845955718-4188408835-162556378-1722
c:\windows\Fonts\WPHV07NB.TTF
c:\windows\patch.exe
c:\windows\system32\filironu.dll
c:\windows\system32\jigigoso.dll
c:\windows\system32\UACjatlsklfigppvgo.dat
c:\windows\system32\UACjmebtptllbrjykx.log
c:\windows\system32\UACmetnqwhfmncqufg.log
c:\windows\system32\UACpajypgnavcctwsr.log
c:\windows\system32\Ultra.dll
c:\documents and settings.\NetworkService\Favorites\Desktop.ini . . . . failed to delete

c:\windows\system32\proquota.exe . . . is missing!!

.
((((((((((((((((((((((((((((((((((((((( Drivers/Services )))))))))))))))))))))))))))))))))))))))))))))))))
.

-------\Legacy_IPRIP
-------\Legacy_PODMENA
-------\Legacy_PODMENADRV


((((((((((((((((((((((((( Files Created from 2009-07-21 to 2009-08-21 )))))))))))))))))))))))))))))))
.

2009-08-21 03:40 . 2009-08-21 03:40 -------- d-----w- c:\documents and settings\JP\Local Settings\Application Data\AVG Security Toolbar
2009-08-21 03:39 . 2009-08-21 03:39 -------- d-----w- c:\documents and settings\JP\Local Settings\Application Data\Mozilla
2009-08-21 03:38 . 2009-08-21 03:38 -------- d-----w- c:\documents and settings\JP\Application Data\Malwarebytes
2009-08-21 03:36 . 2009-08-21 03:36 -------- d-----w- c:\documents and settings\JP\Local Settings\Application Data\SupportSoft
2009-08-21 02:35 . 2009-07-24 13:55 1090816 ----a-w- c:\documents and settings\All Users\Application Data\AVG Security Toolbar\IEToolbar.dll
2009-08-20 11:20 . 2009-07-03 14:49 15688 ----a-w- c:\windows\system32\lsdelete.exe
2009-08-20 05:46 . 2009-08-21 03:37 -------- d--h--w- C:\$AVG8.VAULT$
2009-08-20 05:18 . 2009-08-20 05:18 -------- d-----w- c:\documents and settings\Admin\Local Settings\Application Data\AVG Security Toolbar
2009-08-20 05:16 . 2009-08-20 05:16 11952 ----a-w- c:\windows\system32\avgrsstx.dll
2009-08-20 05:16 . 2009-08-20 05:16 108552 ----a-w- c:\windows\system32\drivers\avgtdix.sys
2009-08-20 05:16 . 2009-08-20 05:16 335240 ----a-w- c:\windows\system32\drivers\avgldx86.sys
2009-08-20 05:16 . 2009-08-20 05:16 27784 ----a-w- c:\windows\system32\drivers\avgmfx86.sys
2009-08-20 05:16 . 2009-08-21 20:54 -------- d-----w- c:\windows\system32\drivers\Avg
2009-08-20 05:15 . 2009-08-21 02:35 -------- d-----w- c:\documents and settings\All Users\Application Data\AVG Security Toolbar
2009-08-20 05:15 . 2009-08-20 05:15 -------- d-----w- c:\program files\AVG
2009-08-20 05:15 . 2009-08-20 08:19 -------- d-----w- c:\documents and settings\All Users\Application Data\avg8
2009-08-20 05:06 . 2009-08-20 05:06 -------- d-----w- c:\docume~1\Admin\APPLIC~1\AVG8
2009-08-20 04:50 . 2009-07-03 14:49 64160 ----a-w- c:\windows\system32\drivers\Lbd.sys
2009-08-20 04:49 . 2009-08-20 05:02 -------- dc-h--w- c:\documents and settings\All Users\Application Data\{EF63305C-BAD7-4144-9208-D65528260864}
2009-08-20 04:49 . 2009-07-08 17:28 2920112 -c--a-w- c:\documents and settings\All Users\Application Data\{EF63305C-BAD7-4144-9208-D65528260864}\Ad-AwareAE.exe
2009-08-20 04:49 . 2009-08-20 04:50 -------- d-----w- c:\documents and settings\All Users\Application Data\Lavasoft
2009-08-20 04:49 . 2009-08-20 04:49 -------- d-----w- c:\program files\Lavasoft
2009-08-20 03:58 . 2003-10-13 19:30 94208 ----a-w- c:\windows\system32\GTW32N50.dll
2009-08-20 03:58 . 2003-09-26 02:15 15872 ----a-w- c:\windows\system32\GTNDIS5.sys
2009-08-20 02:08 . 2009-08-20 02:08 106496 ----a-w- c:\documents and settings\JP\Local Settings\Application Data\GDIPFONTCACHEV1.DAT

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2009-08-21 03:52 . 2009-04-28 02:02 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
2009-08-21 00:57 . 2009-05-19 01:32 -------- d-----w- c:\program files\Paint Shop Pro 6
2009-08-20 04:41 . 2009-02-28 19:11 -------- d-----w- c:\program files\Spybot - Search & Destroy
2009-08-20 04:41 . 2005-12-19 06:14 -------- d-----w- c:\documents and settings\All Users\Application Data\Spybot - Search & Destroy
2009-08-20 04:02 . 2005-03-31 17:50 -------- d--h--w- c:\program files\InstallShield Installation Information
2009-08-20 03:53 . 2005-03-31 18:00 -------- d-----w- c:\program files\Viewpoint
2009-08-20 02:56 . 2005-03-31 17:59 -------- d-----w- c:\program files\Common Files\AOL
2009-08-20 01:44 . 2005-04-13 22:33 -------- d-----w- c:\program files\Yahoo!
2009-08-20 01:42 . 2008-05-26 21:51 -------- d-----w- c:\program files\RealArcade
2009-08-20 01:38 . 2007-06-13 01:11 -------- d-----w- c:\documents and settings\All Users\Application Data\Yahoo!
2009-08-20 01:30 . 2009-04-14 02:21 -------- d-----w- c:\documents and settings\All Users\Application Data\Skype
2009-08-20 01:29 . 2005-04-04 16:35 106496 -c--a-w- c:\documents and settings\Admin\Local Settings\Application Data\GDIPFONTCACHEV1.DAT
2009-08-20 01:28 . 2009-03-26 05:45 -------- d-----w- c:\documents and settings\All Users\Application Data\Microsoft Help
2009-08-20 01:23 . 2009-03-30 04:24 -------- d-----w- c:\docume~1\Admin\APPLIC~1\FrostWire
2009-08-20 01:15 . 2009-04-18 19:19 -------- d-----w- c:\program files\GameSpy Arcade
2009-08-03 17:36 . 2009-04-28 02:02 38160 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2009-08-03 17:36 . 2009-04-28 02:02 19096 ----a-w- c:\windows\system32\drivers\mbam.sys
2009-06-12 01:05 . 2009-06-12 01:05 106960 ----a-w- c:\documents and settings\Administrator\Local Settings\Application Data\GDIPFONTCACHEV1.DAT
2009-06-01 00:42 . 2009-06-01 00:42 69120 ----a-w- c:\documents and settings\All Users\Application Data\SupportSoft\DellSupportCenter\_default\data\f9cd5860-4b46-43fa-aa04-46ba9e956204\7e7d3c88-958b-4607-85a7-8c1cc5188887.1\NOTEPAD.EXE
2009-08-21 02:49 . 2008-04-07 02:32 67688 ----a-w- c:\program files\mozilla firefox\components\jar50.dll
2009-08-21 02:49 . 2008-04-07 02:32 54368 ----a-w- c:\program files\mozilla firefox\components\jsd3250.dll
2009-08-21 02:49 . 2008-04-07 02:32 34944 ----a-w- c:\program files\mozilla firefox\components\myspell.dll
2009-08-21 02:49 . 2008-04-07 02:32 46712 ----a-w- c:\program files\mozilla firefox\components\spellchk.dll
2009-08-21 02:49 . 2008-04-07 02:32 172136 ----a-w- c:\program files\mozilla firefox\components\xpinstal.dll
2005-09-03 15:41 . 2005-07-26 23:26 56 --sh--r- c:\windows\SYSTEM32\32450022CA.sys
2008-10-11 23:48 . 2008-08-01 23:58 88 -csh--r- c:\windows\SYSTEM32\CA22004532.sys
2008-10-11 23:48 . 2008-08-01 23:18 2516 -csha-w- c:\windows\SYSTEM32\KGyGaAvL.sys
.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\URLSearchHooks]
"{A3BC75A2-1F87-4686-AA43-5347D756017C}"= "c:\program files\AVG\AVG8\Toolbar\IEToolbar.dll" [2009-07-24 1090816]

[HKEY_CLASSES_ROOT\clsid\{a3bc75a2-1f87-4686-aa43-5347d756017c}]

[HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{a3bc75a2-1f87-4686-aa43-5347d756017c}]
2009-07-24 13:55 1090816 ----a-w- c:\program files\AVG\AVG8\Toolbar\IEToolbar.dll

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Toolbar]
"{CCC7A320-B3CA-4199-B1A6-9F516DD69829}"= "c:\program files\AVG\AVG8\Toolbar\IEToolbar.dll" [2009-07-24 1090816]

[HKEY_CLASSES_ROOT\clsid\{ccc7a320-b3ca-4199-b1a6-9f516dd69829}]

[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Toolbar\Webbrowser]
"{CCC7A320-B3CA-4199-B1A6-9F516DD69829}"= "c:\program files\AVG\AVG8\Toolbar\IEToolbar.dll" [2009-07-24 1090816]

[HKEY_CLASSES_ROOT\clsid\{ccc7a320-b3ca-4199-b1a6-9f516dd69829}]

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"dellsupport"="c:\program files\DellSupport\DSAgnt.exe" [2007-03-15 460784]
"ctfmon.exe"="c:\windows\system32\ctfmon.exe" [2008-04-14 15360]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"AVG8_TRAY"="c:\progra~1\AVG\AVG8\avgtray.exe" [2009-08-20 2007832]
"QuickTime Task"="c:\program files\QuickTime\qttask.exe" [2007-10-20 286720]
"dellsupportcenter"="c:\program files\Dell Support Center\bin\sprtcmd.exe" [2009-01-30 206064]
"SoundMAXPnP"="c:\program files\Analog Devices\Core\smax4pnp.exe" [2004-10-14 1404928]

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\avgrsstarter]
2009-08-20 05:16 11952 ----a-w- c:\windows\SYSTEM32\avgrsstx.dll

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\lavasoft ad-aware service]
@="Service"

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\mcmscsvc]
@=""

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\MCODS]
@=""

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\OneCareMP]
@="Service"

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\services]
"TangoService"=2 (0x2)
"TuneUp.ProgramStatisticsSvc"=2 (0x2)
"TuneUp.Defrag"=3 (0x3)
"JavaQuickStarterService"=2 (0x2)

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run-]
"QuickTime Task"="c:\program files\QuickTime\qttask.exe" -atboottime
"SoundMAXPnP"=c:\program files\Analog Devices\Core\smax4pnp.exe
"IgfxTray"=c:\windows\system32\igfxtray.exe
"HotKeysCmds"=c:\windows\system32\hkcmd.exe
"dla"=c:\windows\system32\dla\tfswctrl.exe
"LXCJCATS"=rundll32 c:\windows\System32\spool\DRIVERS\W32X86\3\LXCJtime.dll,_RunDLLEntry@16

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list]
"%windir%\\system32\\sessmgr.exe"=

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\icmpsettings]
"AllowInboundEchoRequest"= 1 (0x1)

R0 pceanu;pceanu;c:\windows\system32\drivers\kvxy.sys [x]
R1 ad104605;ad104605;c:\windows\System32\drivers\ad104605.sys [x]
R2 uzlqlrutobm;uzlqlrutobm;c:\windows\system32\drivers\vmwylpkeb.sys [x]
R3 ENDETECT;ENDETECT;c:\progra~1\DSLTOO~1\DSLTOO~1\app\ENDETECT.SYS [x]
R3 hp315filter;HP315 Bug Filter Driver;c:\windows\System32\Drivers\hp315filter.sys [2005-05-17 3168]
R3 L2XPSR;L2XPSR;c:\progra~1\DSLTOO~1\DSLTOO~1\app\L2XPSR.SYS [x]
R3 NTSTPL1;NTSTPL1;c:\progra~1\DSLTOO~1\DSLTOO~1\app\NTSTPL1.SYS [x]
R3 TAPBIND;TAPBIND;c:\progra~1\DSLTOO~1\DSLTOO~1\app\TAPBIND1.SYS [x]
R3 wind502u;Motorola Wireless USB Adapter WU830G Windows Driver;c:\windows\system32\DRIVERS\wind502u.sys [2004-03-25 336256]
R4 Viewpoint Manager Service;Viewpoint Manager Service;c:\program files\Viewpoint\Common\ViewpointService.exe [x]
S0 lbd;lbd;c:\windows\system32\DRIVERS\Lbd.sys [2009-07-03 64160]
S1 avgldx86;AVG Free AVI Loader Driver x86;c:\windows\System32\Drivers\avgldx86.sys [2009-08-20 335240]
S1 avgtdix;AVG Free8 Network Redirector;c:\windows\System32\Drivers\avgtdix.sys [2009-08-20 108552]
S2 avg8wd;AVG Free8 WatchDog;c:\progra~1\AVG\AVG8\avgwdsvc.exe [2009-08-20 297752]
S2 hnmwrlspkt;HomeNet Manager Wireless Protocol;c:\windows\system32\DRIVERS\hnm_wrls_pkt.sys [2006-01-13 13696]
S2 lavasoft ad-aware service;lavasoft ad-aware service;c:\program files\Lavasoft\Ad-Aware\AAWService.exe [2009-07-03 1029456]
S2 wsppkt;Wireless Security Protocol;c:\windows\system32\DRIVERS\wsp_pkt.sys [2006-01-13 13568]


[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\svchost]
p2psvc REG_MULTI_SZ p2psvc p2pimsvc p2pgasvc PNRPSvc
.
Contents of the 'Scheduled Tasks' folder

2009-08-21 c:\windows\Tasks\Ad-Aware Update (Daily).job
- c:\program files\Lavasoft\Ad-Aware\Ad-AwareAdmin.exe [2009-07-03 14:49]

2009-06-11 c:\windows\Tasks\CleanUp!.job
- c:\progra~1\CleanUp!\Cleanup.exe [2005-04-09 21:00]

2007-06-13 c:\windows\Tasks\MP Scheduled Quick Scan.job
- c:\program files\Microsoft Windows OneCare Live\Antivirus\MpCmdRun.exe [2007-02-08 00:21]
.
- - - - ORPHANS REMOVED - - - -

Toolbar-Locked - (no file)
WebBrowser-{A26503FE-B3B8-4910-A9DC-9CBD25C6B8D6} - (no file)


.
------- Supplementary Scan -------
.
uSearchMigratedDefaultURL = [You must be registered and logged in to see this link.]
uStart Page = [You must be registered and logged in to see this link.]
uInternet Connection Wizard,ShellNext = iexplore
uSearchURL,(Default) = [You must be registered and logged in to see this link.]
FF - ProfilePath - c:\docume~1\Admin\APPLIC~1\Mozilla\Firefox\Profiles\q4tyvp5l.Default User\
FF - prefs.js: browser.search.selectedEngine - Yahoo! Search
FF - prefs.js: browser.startup.homepage - [You must be registered and logged in to see this link.]
FF - component: c:\program files\AVG\AVG8\Firefox\components\avgssff.dll
FF - component: c:\program files\AVG\AVG8\Toolbar\Firefox\avg@igeared\components\IGeared_tavgp_xputils2.dll
FF - component: c:\program files\AVG\AVG8\Toolbar\Firefox\avg@igeared\components\IGeared_tavgp_xputils3.dll
FF - component: c:\program files\AVG\AVG8\Toolbar\Firefox\avg@igeared\components\IGeared_tavgp_xputils35.dll
FF - component: c:\program files\AVG\AVG8\Toolbar\Firefox\avg@igeared\components\xpavgtbapi.dll
FF - component: c:\program files\Mozilla Firefox\components\xpinstal.dll

funshinepa
Novice
Novice

Posts Posts : 7
Joined Joined : 2009-08-20
Gender Gender : Female
OS OS : WINXP
Points Points : 26649
# Likes # Likes : 0

View user profile

Back to top Go down

Re: Win32/Crypto Infection

Post by funshinepa on Sat Aug 22, 2009 11:02 pm

------- File Associations -------
.
.

**************************************************************************

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, [You must be registered and logged in to see this link.]
Rootkit scan 2009-08-21 17:45
Windows 5.1.2600 Service Pack 3 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...


c:\windows\system32\muweb.dll 208744 bytes executable

scan completed successfully
hidden files: 1

**************************************************************************
.
--------------------- LOCKED REGISTRY KEYS ---------------------

[HKEY_LOCAL_MACHINE\software\Classes\.application\bootstrap]
@DACL=(02 0000)
@="bootstrap.application.1"
.
--------------------- DLLs Loaded Under Running Processes ---------------------

- - - - - - - > 'explorer.exe'(4020)
c:\windows\system32\mshtml.dll
c:\windows\system32\WPDShServiceObj.dll
c:\windows\system32\PortableDeviceTypes.dll
c:\windows\system32\PortableDeviceApi.dll
.
------------------------ Other Running Processes ------------------------
.
c:\windows\SYSTEM32\TCPSVCS.EXE
c:\program files\Dell Support Center\bin\sprtsvc.exe
c:\program files\AVG\AVG8\avgrsx.exe
c:\progra~1\AVG\AVG8\avgnsx.exe
c:\program files\Lavasoft\Ad-Aware\AAWTray.exe
.
**************************************************************************
.
Completion time: 2009-08-21 18:07 - machine was rebooted
ComboFix-quarantined-files.txt 2009-08-21 22:07

Pre-Run: 7,300,329,472 bytes free
Post-Run: 7,288,180,736 bytes free

WindowsXP-KB310994-SP2-Home-BootDisk-ENU.exe
[boot loader]
timeout=2
default=multi(0)disk(0)rdisk(0)partition(2)\WINDOWS
[operating systems]
c:\cmdcons\BOOTSECT.DAT="Microsoft Windows Recovery Console" /cmdcons
multi(0)disk(0)rdisk(0)partition(2)\WINDOWS="Microsoft Windows XP Home Edition" /fastdetect /NoExecute=OptOut

236

funshinepa
Novice
Novice

Posts Posts : 7
Joined Joined : 2009-08-20
Gender Gender : Female
OS OS : WINXP
Points Points : 26649
# Likes # Likes : 0

View user profile

Back to top Go down

Re: Win32/Crypto Infection

Post by Origin on Tue Aug 25, 2009 3:37 pm

Please download SystemLook from one of the links below and save it to your Desktop.
[You must be registered and logged in to see this link.]
[You must be registered and logged in to see this link.]

  • Double-click SystemLook.exe to run it.
  • Copy the content of the following codebox into the main textfield:
    Code:

    :filefind
    proquota.exe

  • Click the Look button to start the scan.
  • When finished, a notepad window will open with the results of the scan. Please post this log in your next reply.
Note: The log can also be found on your Desktop entitled SystemLook.txt


While my help is always free, please consider donating to keep this site alive: [You must be registered and logged in to see this link.]

[You must be registered and logged in to see this link.]

Origin
Master
Master

Posts Posts : 2685
Joined Joined : 2009-05-05
Gender Gender : Male
OS OS : Windows Xp Sp3
Points Points : 31473
# Likes # Likes : 0

View user profile

Back to top Go down

View previous topic View next topic Back to top

- Similar topics

 
Permissions in this forum:
You cannot reply to topics in this forum