1. You are viewing our forum as a guest. For full access please Register. WindowsBBS.com is completely free, paid for by advertisers and donations.

Inactive Trojan.generic In Archive, can't Delete,can't find its location

Discussion in 'Malware and Virus Removal Archive' started by Amor, 2009/12/28.

  1. 2009/12/28
    Amor

    Amor Inactive Thread Starter

    Joined:
    2009/01/13
    Messages:
    20
    Likes Received:
    0
    [Inactive] Trojan.generic In Archive, can't Delete,can't find its location

    Hi Guys,

    Please find below the active threats after the BD deep scan. I had turned on the show all hidden files, hidden files extension option on before the scan.

    Remaining issues: Object Name Threat Name Final Status

    [System]=]C:\Documents and Settings\Amor\Cookies\amor@msnportal.112.2o7[1].txt Cookie.2o7 Delete Failed (file was in an archive)

    [System]=]C:\Documents and Settings\Amor\Cookies\amor@clicks.adengage[2].txt Cookie.Engage Delete Failed (file was in an archive)

    [System]=]\\.\70.103.101.103\aekgoprn.dll [1048] (memory dump) Trojan.Generic.2898141 Delete Failed (file was in an archive)

    [System]=]\\.\70.103.101.103\aekgoprn.dll [1048] (full dump) Trojan.Generic.2898141 Delete Failed (file was in an archive)


    tried finding the above threats in the cookies folder( still not sure, if those two are a threat?), but can't locate them, the rest two - the Main threat - Trojan generic, have no clue where to find 'em , Plz help!!

    Many thanks in advance, look forward to your swift and kind help
    ----------------------------
    The DDS.txt ----

    DDS (Ver_09-12-01.01) - NTFSx86
    Run by Amor at 10:49:00.46 on Mon 12/28/2009
    Internet Explorer: 8.0.6001.18702
    Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.959.266 [GMT 3:00]

    AV: BitDefender Antivirus *On-access scanning enabled* (Updated) {6C4BB89C-B0ED-4F41-A29C-4373888923BB}

    ============== Running Processes ===============

    C:\WINDOWS\system32\svchost -k DcomLaunch
    svchost.exe
    C:\Program Files\Common Files\BitDefender\BitDefender Update Service\livesrv.exe
    D:\Program Files\BitDefender 2009\vsserv.exe
    C:\WINDOWS\System32\svchost.exe -k netsvcs
    svchost.exe
    svchost.exe
    C:\WINDOWS\Explorer.EXE
    C:\WINDOWS\system32\spoolsv.exe
    C:\WINDOWS\system32\carpserv.exe
    D:\Program Files\BitDefender 2009\bdagent.exe
    C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe
    C:\WINDOWS\system32\ctfmon.exe
    C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe
    D:\Program Files\Google Calendar Sync\GoogleCalendarSync.exe
    svchost.exe
    D:\Program Files\Hotspot Shield\bin\openvpnas.exe
    D:\Program Files\Hotspot Shield\HssWPR\hsssrv.exe
    D:\Program Files\BitDefender 2009\seccenter.exe
    C:\Program Files\Microsoft Office\Office12\OUTLOOK.EXE
    C:\Program Files\Microsoft Office\Office12\OUTLOOK.EXE
    C:\Program Files\Microsoft Office\Office12\OUTLOOK.EXE
    C:\Program Files\Microsoft Office\Office12\OUTLOOK.EXE
    C:\Program Files\Microsoft Office\Office12\OUTLOOK.EXE
    C:\PROGRA~1\MICROS~2\Office12\OUTLOOK.EXE
    C:\PROGRA~1\MICROS~2\Office12\OUTLOOK.EXE
    C:\PROGRA~1\MICROS~2\Office12\OUTLOOK.EXE
    C:\Program Files\Microsoft Office\Office12\OUTLOOK.EXE
    C:\WINDOWS\system32\NOTEPAD.EXE
    C:\Program Files\Internet Explorer\iexplore.exe
    C:\Program Files\Internet Explorer\iexplore.exe
    C:\Program Files\Internet Explorer\iexplore.exe
    D:\Program Files\dds.scr

    ============== Pseudo HJT Report ===============

    uStart Page = hxxp://www.themoscowtimes.com/
    BHO: Groove GFS Browser Helper: {72853161-30c5-4d22-b7f9-0bbc1d38a37e} - c:\program files\microsoft office\office12\GrooveShellExtensions.dll
    BHO: Google Toolbar Helper: {aa58ed58-01dd-4d91-8333-cf10577473f7} - c:\program files\google\google toolbar\GoogleToolbar_32.dll
    BHO: Google Toolbar Notifier BHO: {af69de43-7d58-4638-b6fa-ce66b5ad205d} - c:\program files\google\googletoolbarnotifier\5.5.4723.1820\swg.dll
    BHO: Hotspot Shield Class: {f9e4a054-e9b1-4bc3-83a3-76a1ae736170} - d:\program files\hotspot shield\hssie\HssIE.dll
    TB: BitDefender Toolbar: {381ffde8-2394-4f90-b10d-fc6124a40f8c} - d:\program files\bitdefender 2009\IEToolbar.dll
    TB: Google Toolbar: {2318c2b1-4965-11d4-9b18-009027a5cd4f} - c:\program files\google\google toolbar\GoogleToolbar_32.dll
    EB: {32683183-48a0-441b-a342-7c2a440a9478} - No File
    uRun: [CTFMON.EXE] c:\windows\system32\ctfmon.exe
    uRun: [swg] "c:\program files\google\googletoolbarnotifier\GoogleToolbarNotifier.exe "
    mRun: [CARPService] carpserv.exe
    mRun: [BDAgent] "d:\program files\bitdefender 2009\bdagent.exe "
    mRun: [BitDefender Antiphishing Helper] "d:\program files\bitdefender 2009\IEShow.exe "
    mRun: [GrooveMonitor] "c:\program files\microsoft office\office12\GrooveMonitor.exe "
    dRun: [CTFMON.EXE] c:\windows\system32\CTFMON.EXE
    StartupFolder: c:\docume~1\amor\startm~1\programs\startup\launch~1.lnk - c:\program files\internet explorer\iexplore.exe
    StartupFolder: c:\docume~1\amor\startm~1\programs\startup\mozill~1.lnk - d:\program files\firefox.exe
    StartupFolder: c:\docume~1\amor\startm~1\programs\startup\STREAM.lnk -
    StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\google~1.lnk - d:\program files\google calendar sync\GoogleCalendarSync.exe
    IE: E&xport to Microsoft Excel - c:\progra~1\micros~2\office12\EXCEL.EXE/3000
    IE: Google Sidewiki... - c:\program files\google\google toolbar\component\GoogleToolbarDynamic_mui_en_5F1A57F0B9B89E2E.dll/cmsidewiki.html
    IE: {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe
    IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe
    IE: {2670000A-7350-4f3c-8081-5663EE0C6C49} - {48E73304-E1D6-4330-914C-F5F514E3486C} - c:\progra~1\micros~2\office12\ONBttnIE.dll
    IE: {92780B25-18CC-41C8-B9BE-3C9C571A8263} - {FF059E31-CC5A-4E2E-BF3B-96E929D65503} - c:\progra~1\micros~2\office12\REFIEBAR.DLL
    DPF: DirectAnimation Java Classes - file://c:\windows\java\classes\dajava.cab
    DPF: Microsoft XML Parser for Java - file://c:\windows\java\classes\xmldso.cab
    DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} - hxxp://update.microsoft.com/windowsupdate/v6/V5Controls/en/x86/client/wuweb_site.cab?1260938856913
    DPF: {D4003189-95B1-4A2F-9A87-F2B03665960D} - hxxp://vexcast.com/download/vexcast.cab
    TCP: {2029C8D4-C8B7-46FA-96BA-AB6D6105020F} = 212.188.4.10,195.34.32.116
    TCP: {2B07F3AE-0325-46DD-89ED-73200BA7D76F} = 195.34.32.116 212.188.4.10
    Handler: grooveLocalGWS - {88FED34C-F0CA-4636-A375-3CB6248B04CD} - c:\program files\microsoft office\office12\GrooveSystemServices.dll
    SEH: Groove GFS Stub Execution Hook: {b5a7f190-dda6-4420-b3ba-52453494e6cd} - c:\program files\microsoft office\office12\GrooveShellExtensions.dll

    ================= FIREFOX ===================

    FF - ProfilePath - c:\docume~1\amor\applic~1\mozilla\firefox\profiles\ojuttnoi.default\
    FF - prefs.js: browser.startup.homepage - www.samachar.com
    FF - component: d:\program files\components\FFComm.dll
    FF - plugin: c:\documents and settings\amor\application data\mozilla\firefox\profiles\ojuttnoi.default\extensions\firefox@tvunetworks.com\plugins\npTVUAx.dll
    FF - plugin: c:\program files\google\update\1.2.183.13\npGoogleOneClick8.dll
    FF - plugin: d:\program files\vlc\npvlc.dll

    ---- FIREFOX POLICIES ----
    d:\program files\greprefs\security-prefs.js - pref( "security.ssl3.rsa_seed_sha ", true);

    ============= SERVICES / DRIVERS ===============

    R3 ALiIRDA;ALi Infrared Device Driver;c:\windows\system32\drivers\alifir.sys [2009-12-16 26624]
    R3 bdfm;BDFM;c:\windows\system32\drivers\bdfm.sys [2008-9-18 111112]
    S2 gupdate;Google Update Service (gupdate);c:\program files\google\update\GoogleUpdate.exe [2009-12-17 135664]
    S3 Arrakis3;BitDefender Arrakis Server;c:\program files\common files\bitdefender\bitdefender arrakis server\bin\Arrakis3.exe [2009-1-20 172032]

    =============== Created Last 30 ================

    2009-12-27 04:49:05 0 d-----w- c:\windows\system32\wbem\Repository
    2009-12-25 20:19:53 0 d-----w- c:\windows\SHELLNEW
    2009-12-25 02:31:50 0 d-----w- C:\Hotspot Shield
    2009-12-24 17:46:27 0 d-----w- c:\windows\SxsCaPendDel
    2009-12-22 03:17:41 0 d-----w- c:\docume~1\alluse~1\applic~1\nagasoft
    2009-12-18 08:44:20 471552 -c----w- c:\windows\system32\dllcache\aclayers.dll
    2009-12-17 03:56:42 0 d-----w- c:\windows\pss
    2009-12-17 03:31:19 0 d-sh--w- c:\documents and settings\amor\IECompatCache
    2009-12-17 03:23:16 0 d-sh--w- c:\documents and settings\amor\PrivacIE
    2009-12-17 03:18:47 0 d-----w- c:\windows\system32\appmgmt
    2009-12-17 01:59:36 121 ----a-w- c:\windows\bdagent.INI
    2009-12-17 01:56:09 0 d-----w- c:\docume~1\amor\applic~1\Malwarebytes
    2009-12-17 01:56:03 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
    2009-12-17 01:55:48 0 d-----w- c:\docume~1\alluse~1\applic~1\Malwarebytes
    2009-12-17 01:55:47 19160 ----a-w- c:\windows\system32\drivers\mbam.sys
    2009-12-17 01:49:44 0 d-----w- c:\docume~1\alluse~1\applic~1\TVU Networks
    2009-12-17 01:49:35 0 d-----w- c:\documents and settings\amor\LocalLow
    2009-12-17 01:46:59 0 d-----w- c:\windows\system32\Nagasoft
    2009-12-16 21:13:28 286 ----a-w- c:\windows\system32\BDUpdateV1.xml
    2009-12-16 20:43:16 81984 ----a-w- c:\windows\system32\bdod.bin
    2009-12-16 20:32:07 850 ----a-w- c:\windows\system32\ProductTweaks.xml
    2009-12-16 20:32:06 385 ----a-w- c:\windows\system32\user_gensett.xml
    2009-12-16 20:28:49 0 d-----w- c:\docume~1\amor\applic~1\BitDefender
    2009-12-16 20:27:50 0 d-----w- c:\docume~1\alluse~1\applic~1\BitDefender
    2009-12-16 20:25:19 0 d-----w- c:\program files\common files\BitDefender
    2009-12-16 19:59:35 215920 ----a-w- c:\windows\system32\muweb.dll
    2009-12-16 19:59:35 16736 ----a-w- c:\windows\system32\mucltui.dll.mui
    2009-12-16 19:59:34 274288 ----a-w- c:\windows\system32\mucltui.dll
    2009-12-16 19:56:23 3255 ----a-w- c:\windows\system32\wbem\Outlook_01ca7e89d8628a20.mof
    2009-12-16 19:04:21 32656 ----a-w- c:\windows\system32\msonpmon.dll
    2009-12-16 18:23:18 0 d-sh--w- c:\documents and settings\amor\IETldCache
    2009-12-16 18:18:06 12800 -c----w- c:\windows\system32\dllcache\xpshims.dll
    2009-12-16 18:18:03 594432 -c----w- c:\windows\system32\dllcache\msfeeds.dll
    2009-12-16 18:18:03 55296 -c----w- c:\windows\system32\dllcache\msfeedsbs.dll
    2009-12-16 18:18:03 246272 -c----w- c:\windows\system32\dllcache\ieproxy.dll
    2009-12-16 18:18:03 1985536 -c----w- c:\windows\system32\dllcache\iertutil.dll
    2009-12-16 18:18:03 11069952 -c----w- c:\windows\system32\dllcache\ieframe.dll
    2009-12-16 18:17:56 0 d-----w- c:\windows\ie8updates
    2009-12-16 18:17:53 92160 -c----w- c:\windows\system32\dllcache\iecompat.dll
    2009-12-16 18:15:52 0 dc-h--w- c:\windows\ie8
    2009-12-16 08:13:56 0 d-----w- c:\windows\system32\scripting
    2009-12-16 08:13:50 0 d-----w- c:\windows\l2schemas
    2009-12-16 08:13:49 0 d-----w- c:\windows\system32\en
    2009-12-16 08:02:20 0 d-----w- c:\windows\network diagnostic
    2009-12-16 07:16:03 0 d-----w- c:\program files\common files\ODBC
    2009-12-16 07:15:57 0 d-----w- c:\program files\common files\SpeechEngines
    2009-12-16 07:15:24 0 d-----r- c:\documents and settings\all users\Documents
    2009-12-16 06:52:42 0 d-----w- c:\program files\CONEXANT
    2009-12-16 04:28:10 0 d-sh--w- c:\documents and settings\all users\DRM
    2009-12-16 04:25:34 0 d-----w- c:\program files\common files\MSSoap
    2009-12-16 04:23:57 0 d--h--w- c:\program files\WindowsUpdate
    2009-12-16 04:23:57 0 d-----w- c:\program files\Online Services
    2009-12-16 04:23:46 0 d-----w- c:\program files\Messenger
    2009-12-16 04:23:37 0 d-----w- c:\program files\MSN Gaming Zone
    2009-12-16 04:22:12 0 d-----w- c:\program files\Windows NT

    ==================== Find3M ====================

    2009-12-16 04:24:12 21640 ----a-w- c:\windows\system32\emptyregdb.dat
    2009-10-29 07:45:38 916480 ----a-w- c:\windows\system32\wininet.dll
    2009-10-21 05:38:36 75776 ----a-w- c:\windows\system32\strmfilt.dll
    2009-10-21 05:38:36 25088 ----a-w- c:\windows\system32\httpapi.dll
    2009-10-13 10:30:16 270336 ----a-w- c:\windows\system32\oakley.dll
    2009-10-12 13:38:19 149504 ----a-w- c:\windows\system32\rastls.dll
    2009-10-12 13:38:18 79872 ----a-w- c:\windows\system32\raschap.dll

    ============= FINISH: 10:51:02.64 ===============
     
    Amor,
    #1
  2. 2009/12/28
    Admin.

    Admin. Administrator Administrator Staff

    Joined:
    2001/12/30
    Messages:
    6,687
    Likes Received:
    107
    Hi,

    Read this post as indicated at the top of this forum & follow the instructions.
     

  3. to hide this advert.

  4. 2009/12/28
    Amor

    Amor Inactive Thread Starter

    Joined:
    2009/01/13
    Messages:
    20
    Likes Received:
    0
    Hi Arie,

    Please find below the Attach.txt

    Thanks!

    -----------

    DDS (Ver_09-12-01.01)

    Microsoft Windows XP Professional
    Boot Device: \Device\HarddiskVolume1
    Install Date: 12/16/2009 7:34:13 AM
    System Uptime: 12/27/2009 10:22:49 AM (24 hours ago)

    Motherboard: Hewlett-Packard | | 0850
    Processor: Intel(R) Pentium(R) 4 CPU 2.66GHz | WMT478/NWD | 2658/mhz

    ==== Disk Partitions =========================

    A: is Removable
    C: is FIXED (NTFS) - 149 GiB total, 135.846 GiB free.
    D: is FIXED (NTFS) - 149 GiB total, 107.311 GiB free.
    E: is CDROM ()

    ==== Disabled Device Manager Items =============

    Class GUID: {4D36E972-E325-11CE-BFC1-08002BE10318}
    Description: Broadcom 802.11b/g WLAN
    Device ID: PCI\VEN_14E4&DEV_4320&SUBSYS_00E70E11&REV_02\3&61AAA01&0&48
    Manufacturer: Broadcom
    Name: Broadcom 802.11b/g WLAN
    PNP Device ID: PCI\VEN_14E4&DEV_4320&SUBSYS_00E70E11&REV_02\3&61AAA01&0&48
    Service: BCM43XX

    ==== System Restore Points ===================

    RP1: 12/16/2009 7:37:29 AM - System Checkpoint
    RP2: 12/16/2009 7:45:52 AM - Update to an unsigned driver
    RP3: 12/16/2009 7:55:57 AM - Software Distribution Service 3.0
    RP4: 12/16/2009 7:56:13 AM - Installed Windows XP KB842773.
    RP5: 12/16/2009 7:57:04 AM - Installed Windows Installer KB893803v2.
    RP6: 12/16/2009 7:57:38 AM - Installed Windows XP KB892130.
    RP7: 12/16/2009 7:57:52 AM - Installed Windows XP KB898461.
    RP8: 12/16/2009 8:47:26 AM - Software Distribution Service 3.0
    RP9: 12/16/2009 9:01:27 AM - Installed Windows XP Service Pack 2.
    RP10: 12/16/2009 9:49:59 AM - Software Distribution Service 3.0
    RP11: 12/16/2009 10:32:37 AM - Software Distribution Service 3.0
    RP12: 12/16/2009 9:03:56 PM - Software Distribution Service 3.0
    RP13: 12/16/2009 9:36:10 PM - Installed Microsoft Office Enterprise 2007
    RP14: 12/16/2009 10:04:10 PM - Printer Driver Send To Microsoft OneNote Driver Installed
    RP15: 12/16/2009 10:27:05 PM - Printer Driver Send To Microsoft OneNote Driver Installed
    RP16: 12/16/2009 11:27:40 PM - Installed BitDefender Antivirus 2009
    RP17: 12/17/2009 5:24:46 AM - Installed WinZip 14.0
    RP18: 12/17/2009 6:17:31 AM - Removed WinZip 14.0
    RP19: 12/17/2009 9:24:53 AM - Software Distribution Service 3.0
    RP20: 12/18/2009 11:44:52 AM - Software Distribution Service 3.0
    RP21: 12/18/2009 12:11:04 PM - Installed Windows XP WgaNotify.
    RP22: 12/18/2009 5:20:07 PM - Printer Driver Send To Microsoft OneNote Driver Installed
    RP23: 12/18/2009 6:38:39 PM - Printer Driver Send To Microsoft OneNote Driver Installed
    RP24: 12/19/2009 8:37:56 PM - System Checkpoint
    RP25: 12/20/2009 5:13:24 PM - Printer Driver Send To Microsoft OneNote Driver Installed
    RP26: 12/22/2009 8:21:55 AM - Printer Driver Send To Microsoft OneNote Driver Installed
    RP27: 12/23/2009 12:56:29 PM - System Checkpoint
    RP28: 12/24/2009 1:00:00 PM - Printer Driver Send To Microsoft OneNote Driver Installed
    RP29: 12/24/2009 8:25:44 PM - Removed Microsoft Office Enterprise 2007
    RP30: 12/24/2009 9:00:02 PM - Installed Microsoft Office Enterprise 2007
    RP31: 12/24/2009 9:10:06 PM - Software Distribution Service 3.0
    RP32: 12/24/2009 9:49:12 PM - Printer Driver Send To Microsoft OneNote Driver Installed
    RP33: 12/24/2009 10:15:23 PM - Printer Driver Send To Microsoft OneNote Driver Installed
    RP34: 12/24/2009 10:23:44 PM - Software Distribution Service 3.0
    RP35: 12/24/2009 10:57:18 PM - Software Distribution Service 3.0
    RP36: 12/25/2009 9:57:33 AM - Printer Driver Send To Microsoft OneNote Driver Installed
    RP37: 12/25/2009 10:37:56 AM - Printer Driver Send To Microsoft OneNote Driver Installed
    RP38: 12/25/2009 10:23:57 PM - Removed Microsoft Office Enterprise 2007
    RP39: 12/25/2009 10:55:52 PM - Software Distribution Service 3.0
    RP40: 12/25/2009 11:11:24 PM - Installed Microsoft Office Enterprise 2007
    RP41: 12/25/2009 11:50:31 PM - Printer Driver Send To Microsoft OneNote Driver Installed
    RP42: 12/26/2009 12:16:40 AM - Printer Driver Send To Microsoft OneNote Driver Installed
    RP43: 12/26/2009 7:47:08 AM - Software Distribution Service 3.0
    RP44: 12/27/2009 7:45:46 AM - Restore Operation
    RP45: 12/27/2009 8:07:09 AM - Software Distribution Service 3.0

    ==== Installed Programs ======================


    2007 Microsoft Office Suite Service Pack 2 (SP2)
    Adobe Flash Player 10 ActiveX
    Adobe Flash Player 10 Plugin
    ATI Display Driver
    BitDefender Antivirus 2009
    Conexant 56K ACLink Modem
    Google Calendar Sync
    Google Toolbar for Internet Explorer
    Google Update Helper
    HijackThis 2.0.2
    Hotfix for Windows XP (KB952287)
    Hotfix for Windows XP (KB976098-v2)
    Hotspot Shield 1.30
    Malwarebytes' Anti-Malware
    Microsoft Office Access MUI (English) 2007
    Microsoft Office Access Setup Metadata MUI (English) 2007
    Microsoft Office Enterprise 2007
    Microsoft Office Excel MUI (English) 2007
    Microsoft Office Groove MUI (English) 2007
    Microsoft Office Groove Setup Metadata MUI (English) 2007
    Microsoft Office InfoPath MUI (English) 2007
    Microsoft Office OneNote MUI (English) 2007
    Microsoft Office Outlook MUI (English) 2007
    Microsoft Office PowerPoint MUI (English) 2007
    Microsoft Office Proof (English) 2007
    Microsoft Office Proof (French) 2007
    Microsoft Office Proof (Spanish) 2007
    Microsoft Office Proofing (English) 2007
    Microsoft Office Publisher MUI (English) 2007
    Microsoft Office Shared MUI (English) 2007
    Microsoft Office Shared Setup Metadata MUI (English) 2007
    Microsoft Office Word MUI (English) 2007
    Microsoft Software Update for Web Folders (English) 12
    Mozilla Firefox (3.5.6)
    Security Update for 2007 Microsoft Office System (KB969559)
    Security Update for 2007 Microsoft Office System (KB973704)
    Security Update for Microsoft Office Excel 2007 (KB973593)
    Security Update for Microsoft Office Outlook 2007 (KB972363)
    Security Update for Microsoft Office PowerPoint 2007 (KB957789)
    Security Update for Microsoft Office Publisher 2007 (KB969693)
    Security Update for Microsoft Office system 2007 (972581)
    Security Update for Microsoft Office system 2007 (KB969613)
    Security Update for Microsoft Office system 2007 (KB974234)
    Security Update for Microsoft Office Visio Viewer 2007 (KB973709)
    Security Update for Microsoft Office Word 2007 (KB969604)
    Security Update for Windows Internet Explorer 8 (KB971961)
    Security Update for Windows Internet Explorer 8 (KB976325)
    Security Update for Windows Media Player (KB952069)
    Security Update for Windows Media Player (KB954155)
    Security Update for Windows Media Player (KB968816)
    Security Update for Windows Media Player (KB973540)
    Security Update for Windows XP (KB923561)
    Security Update for Windows XP (KB946648)
    Security Update for Windows XP (KB950762)
    Security Update for Windows XP (KB950974)
    Security Update for Windows XP (KB951066)
    Security Update for Windows XP (KB951376-v2)
    Security Update for Windows XP (KB951748)
    Security Update for Windows XP (KB952004)
    Security Update for Windows XP (KB952954)
    Security Update for Windows XP (KB955069)
    Security Update for Windows XP (KB956572)
    Security Update for Windows XP (KB956744)
    Security Update for Windows XP (KB956802)
    Security Update for Windows XP (KB956803)
    Security Update for Windows XP (KB956844)
    Security Update for Windows XP (KB957097)
    Security Update for Windows XP (KB958644)
    Security Update for Windows XP (KB958687)
    Security Update for Windows XP (KB958869)
    Security Update for Windows XP (KB959426)
    Security Update for Windows XP (KB960225)
    Security Update for Windows XP (KB960803)
    Security Update for Windows XP (KB960859)
    Security Update for Windows XP (KB961371-v2)
    Security Update for Windows XP (KB961501)
    Security Update for Windows XP (KB969059)
    Security Update for Windows XP (KB969947)
    Security Update for Windows XP (KB970238)
    Security Update for Windows XP (KB970430)
    Security Update for Windows XP (KB971486)
    Security Update for Windows XP (KB971557)
    Security Update for Windows XP (KB971633)
    Security Update for Windows XP (KB971657)
    Security Update for Windows XP (KB973354)
    Security Update for Windows XP (KB973507)
    Security Update for Windows XP (KB973525)
    Security Update for Windows XP (KB973869)
    Security Update for Windows XP (KB973904)
    Security Update for Windows XP (KB974112)
    Security Update for Windows XP (KB974318)
    Security Update for Windows XP (KB974392)
    Security Update for Windows XP (KB974571)
    Security Update for Windows XP (KB975025)
    Security Update for Windows XP (KB975467)
    Security Update for Windows XP (KB976325)
    SopCast 3.2.4
    TVUPlayer 2.4.9.1
    Update for 2007 Microsoft Office System (KB967642)
    Update for Microsoft Office InfoPath 2007 (KB976416)
    Update for Outlook 2007 Junk Email Filter (kb976884)
    Update for Windows Internet Explorer 8 (KB975364)
    Update for Windows XP (KB951978)
    Update for Windows XP (KB955759)
    Update for Windows XP (KB967715)
    Update for Windows XP (KB968389)
    Update for Windows XP (KB971737)
    Update for Windows XP (KB973687)
    Update for Windows XP (KB973815)
    VexcastPlayer2.0
    VJOcx2.0
    VLC media player 1.0.3
    WebFldrs XP
    Windows Genuine Advantage Notifications (KB905474)
    Windows Genuine Advantage Validation Tool (KB892130)
    Windows Internet Explorer 8
    Windows XP Service Pack 3
    WinRAR archiver

    ==== Event Viewer Messages From Past Week ========

    12/27/2009 7:40:55 AM, error: DCOM [10005] - DCOM got error "%1084" attempting to start the service netman with arguments " " in order to run the server: {BA126AD7-2166-11D1-B1D0-00805FC1270E}
    12/27/2009 7:39:21 AM, error: DCOM [10005] - DCOM got error "%1084" attempting to start the service netman with arguments " " in order to run the server: {BA126AE5-2166-11D1-B1D0-00805FC1270E}
    12/27/2009 7:39:17 AM, error: DCOM [10005] - DCOM got error "%1084" attempting to start the service EventSystem with arguments " " in order to run the server: {1BE1F766-5536-11D1-B726-00C04FB926AF}
    12/27/2009 7:39:07 AM, error: Service Control Manager [7026] - The following boot-start or system-start driver(s) failed to load: AFD bdftdif Fips intelppm IPSec MRxSmb NetBIOS NetBT RasAcd Rdbss Tcpip
    12/27/2009 7:39:07 AM, error: Service Control Manager [7001] - The TCP/IP NetBIOS Helper service depends on the AFD Networking Support Environment service which failed to start because of the following error: A device attached to the system is not functioning.
    12/27/2009 7:39:07 AM, error: Service Control Manager [7001] - The IPSEC Services service depends on the IPSEC driver service which failed to start because of the following error: A device attached to the system is not functioning.
    12/27/2009 7:39:07 AM, error: Service Control Manager [7001] - The Hotspot Shield Service service depends on the DHCP Client service which failed to start because of the following error: The dependency service or group failed to start.
    12/27/2009 7:39:07 AM, error: Service Control Manager [7001] - The DNS Client service depends on the TCP/IP Protocol Driver service which failed to start because of the following error: A device attached to the system is not functioning.
    12/27/2009 7:39:07 AM, error: Service Control Manager [7001] - The DHCP Client service depends on the NetBios over Tcpip service which failed to start because of the following error: A device attached to the system is not functioning.
    12/27/2009 6:12:18 AM, error: Service Control Manager [7023] - The Automatic Updates service terminated with the following error: %%2147952422
    12/27/2009 6:12:17 AM, error: Service Control Manager [7024] - The Background Intelligent Transfer Service service terminated with service-specific error 2147952422 (0x80072726).
    12/27/2009 5:07:10 AM, error: sr [1] - The System Restore filter encountered the unexpected error '0xC0000010' while processing the file 'L' on the volume 'C2CAD972#4079#4fd3#A68D#AD34CC121074'. It has stopped monitoring the volume.
    12/27/2009 4:28:31 AM, error: ACPIEC [1] - \Device\ACPIEC: The embedded controller (EC) hardware didn't respond within the timeout period. This may indicate an error in the EC hardware or firmware, or possibly a poorly designed BIOS which accesses the EC in an unsafe manner. The EC driver will retry the failed transaction if possible.

    ==== End Of File ===========================
     
    Amor,
    #3
  5. 2009/12/28
    broni

    broni Moderator Malware Analyst

    Joined:
    2002/08/01
    Messages:
    21,701
    Likes Received:
    116
    Print these instructions out.

    NOTE. If any of the programs listed below refuse to run, try renaming executive file to something else; for instance, rename hijackthis.exe to scanner.exe

    ***VERY IMPORTANT! Make sure, you update Superantispyware, and Malwarebytes before running the scans.***

    STEP 1. Download SUPERAntiSpyware Free for Home Users:
    http://www.superantispyware.com/

    * Double-click SUPERAntiSpyware.exe and use the default settings for installation.
    * An icon will be created on your desktop. Double-click that icon to launch the program.
    * If asked to update the program definitions, click "Yes ". If not, update the definitions before scanning by selecting "Check for Updates ". (If you encounter any problems while downloading the updates, manually download and unzip them from here: http://www.superantispyware.com/definitions.html.)
    * Close SUPERAntiSpyware.

    PHYSICALLY DISCONNECT FROM THE INTERNET

    Restart computer in Safe Mode.
    To enter Safe Mode, restart computer, and keep tapping F8 key, until menu appears; select Safe Mode; you'll see "Safe Mode" in all four corners of your screen

    * Open SUPERAntiSpyware.
    * Click Scan your Computer... button.
    * Click Scanning Preferences/Control Center... button.
    * Under General and Startup tab, make sure, Start SUPERAntiSpyware when Windows starts option is UN-checked.
    * Click the Scanning Control tab.
    * Under Scanner Options make sure the following are checked (leave all others unchecked):
    • Close browsers before scanning.
    • Terminate memory threats before quarantining.
    * Click the Close button to leave the control center screen.
    * On the left, make sure you check C:\Fixed Drive.
    * On the right, choose Perform Complete Scan.
    * Click Next to start the scan. Please be patient while it scans your computer.
    * After the scan is complete, a Scan Summary box will appear with potentially harmful items that were detected. Click OK.
    * Make sure everything has a checkmark next to it and click Next.
    * A notification will appear that Quarantine and Removal is Complete. Click OK and then click the Finish button to return to the main menu.
    * If asked if you want to reboot, click Yes.
    * To retrieve the removal information after reboot, launch SUPERAntispyware again.
    • Click Preferences, then click the Statistics/Logs tab.
    • Under Scanner Logs, double-click SUPERAntiSpyware Scan Log.
    • If there are several logs, click the current dated log and press View log. A text file will open in your default text editor.
    • Please copy and paste the Scan Log results in your next reply.
    * Click Close to exit the program.
    Post SUPERAntiSpyware log.

    RECONNECT TO THE INTERNET

    RESTART COMPUTER!

    STEP 2. Download Malwarebytes' Anti-Malware: http://www.malwarebytes.org/mbam.php to your desktop.
    (Malwarebytes is free to use as a manual scanner. Payment is only required if you wish to have it run and update automatically which is not necessary for our purposes)

    * Double-click mbam-setup.exe and follow the prompts to install the program.
    * At the end, be sure a checkmark is placed next to Update Malwarebytes' Anti-Malware and Launch Malwarebytes' Anti-Malware, then click Finish.
    * If an update is found, it will download and install the latest version.
    * Once the program has loaded, select Perform full scan, then click Scan.
    * When the scan is complete, click OK, then Show Results to view the results.
    * Be sure that everything is checked, and click Remove Selected.
    * When completed, a log will open in Notepad.
    * Post the log back here.

    The log can also be found here:
    C:\Documents and Settings\Username\Application Data\Malwarebytes\Malwarebytes' Anti-Malware\Logs\log-date.txt
    Or at C:\Program Files\Malwarebytes' Anti-Malware\Logs\log-date.txt

    RESTART COMPUTER!

    STEP 3. Download GMER: http://www.gmer.net/files.php, by clicking on Download EXE button.
    Alternative downloads:
    - http://majorgeeks.com/GMER_d5198.html
    - http://www.softpedia.com/get/Interne...ers/GMER.shtml
    Double click on downloaded .exe file, select Rootkit tab and click the Scan button.
    When scan is completed, click Save button, and save the results as gmer.log
    Warning ! Please, do not select the "Show all" checkbox during the scan.
    Post the log to your next reply.

    RESTART COMPUTER

    STEP 4. Download HijackThis:
    http://www.trendsecure.com/portal/en-US/tools/security_tools/hijackthis/download
    by clicking on Installer under Version 2.0.2
    [DO NOT download version 2.0.3 (beta)]
    Install, and run it.
    Post HijackThis log.
    NOTE. If you're using Vista, right click on HijackThis, and click Run as Administrator
    Do NOT attempt to "fix" anything!


    DO NOT make any other changes to your computer (like installing programs, using other cleaning tools, etc.), until it's officially declared clean!!!
     
  6. 2009/12/28
    Amor

    Amor Inactive Thread Starter

    Joined:
    2009/01/13
    Messages:
    20
    Likes Received:
    0
    Many thanks ! Broni, will do the above steps and get back to you
     
    Amor,
    #5
  7. 2009/12/28
    broni

    broni Moderator Malware Analyst

    Joined:
    2002/08/01
    Messages:
    21,701
    Likes Received:
    116
    Ok :)
     
  8. 2009/12/28
    Amor

    Amor Inactive Thread Starter

    Joined:
    2009/01/13
    Messages:
    20
    Likes Received:
    0
    U r da one, Mr. Broni! Gracias ! , while i am posting the Super Antispyware, Malware bytes, Hijack this log files, i am doing a Gmer scan and bingo ! it has found the bloody creeps the Trojan generic virus deep hidden in C & D drives ! lol. Waiting to post the Gmer Log as it completes.

    Let me first tell you my actions, Before you advised me to do the above steps, i had already done the Malware bytes scan and the Hijack this scan. Please find them below starting with the Super Antispyware Log.

    1) Super Antispyware Log --

    SUPERAntiSpyware Scan Log
    http://www.superantispyware.com

    Generated 12/29/2009 at 02:15 AM

    Application Version : 4.32.1000

    Core Rules Database Version : 4417
    Trace Rules Database Version: 2244

    Scan type : Complete Scan
    Total Scan Time : 01:41:05

    Memory items scanned : 366
    Memory threats detected : 0
    Registry items scanned : 4440
    Registry threats detected : 0
    File items scanned : 36056
    File threats detected : 0

    ------------------------

    2) Malware Bytes Scan Log ( * which i did before the SuperAntiSpyware Scan)

    Malwarebytes' Anti-Malware 1.42
    Database version: 3444
    Windows 5.1.2600 Service Pack 3
    Internet Explorer 8.0.6001.18702

    12/28/2009 11:27:42 PM
    mbam-log-2009-12-28 (23-27-42).txt

    Scan type: Full Scan (C:\|D:\|)
    Objects scanned: 165061
    Time elapsed: 2 hour(s), 54 minute(s), 7 second(s)

    Memory Processes Infected: 0
    Memory Modules Infected: 0
    Registry Keys Infected: 0
    Registry Values Infected: 0
    Registry Data Items Infected: 0
    Folders Infected: 0
    Files Infected: 0

    Memory Processes Infected:
    (No malicious items detected)

    Memory Modules Infected:
    (No malicious items detected)

    Registry Keys Infected:
    (No malicious items detected)

    Registry Values Infected:
    (No malicious items detected)

    Registry Data Items Infected:
    (No malicious items detected)

    Folders Infected:
    (No malicious items detected)

    Files Infected:
    (No malicious items detected)

    -------------------------------------

    3) Hijack This Scan Log ( * which i did before your Instructions i.e - Before The Super AntiSpyware Scan)

    Logfile of Trend Micro HijackThis v2.0.2
    Scan saved at 10:29:19 AM, on 12/28/2009
    Platform: Windows XP SP3 (WinNT 5.01.2600)
    MSIE: Internet Explorer v8.00 (8.00.6001.18702)
    Boot mode: Normal

    Running processes:
    C:\WINDOWS\System32\smss.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\services.exe
    C:\WINDOWS\system32\lsass.exe
    C:\WINDOWS\system32\svchost.exe
    C:\Program Files\Common Files\BitDefender\BitDefender Update Service\livesrv.exe
    D:\Program Files\BitDefender 2009\vsserv.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\Explorer.EXE
    C:\WINDOWS\system32\spoolsv.exe
    C:\WINDOWS\system32\carpserv.exe
    D:\Program Files\BitDefender 2009\bdagent.exe
    C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe
    C:\WINDOWS\system32\ctfmon.exe
    C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe
    D:\Program Files\Google Calendar Sync\GoogleCalendarSync.exe
    D:\Program Files\Hotspot Shield\bin\openvpnas.exe
    D:\Program Files\Hotspot Shield\HssWPR\hsssrv.exe
    D:\Program Files\BitDefender 2009\seccenter.exe
    C:\Program Files\Microsoft Office\Office12\OUTLOOK.EXE
    C:\Program Files\Microsoft Office\Office12\OUTLOOK.EXE
    C:\Program Files\Microsoft Office\Office12\OUTLOOK.EXE
    C:\Program Files\Microsoft Office\Office12\OUTLOOK.EXE
    C:\Program Files\Microsoft Office\Office12\OUTLOOK.EXE
    C:\PROGRA~1\MICROS~2\Office12\OUTLOOK.EXE
    C:\PROGRA~1\MICROS~2\Office12\OUTLOOK.EXE
    C:\PROGRA~1\MICROS~2\Office12\OUTLOOK.EXE
    C:\Program Files\Microsoft Office\Office12\OUTLOOK.EXE
    C:\WINDOWS\system32\wuauclt.exe
    D:\Program Files\HijackThis.exe

    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.themoscowtimes.com/
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
    R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
    O2 - BHO: Groove GFS Browser Helper - {72853161-30C5-4D22-B7F9-0BBC1D38A37E} - C:\Program Files\Microsoft Office\Office12\GrooveShellExtensions.dll
    O2 - BHO: Google Toolbar Helper - {AA58ED58-01DD-4d91-8333-CF10577473F7} - C:\Program Files\Google\Google Toolbar\GoogleToolbar_32.dll
    O2 - BHO: Google Toolbar Notifier BHO - {AF69DE43-7D58-4638-B6FA-CE66B5AD205D} - C:\Program Files\Google\GoogleToolbarNotifier\5.5.4723.1820\swg.dll
    O2 - BHO: Hotspot Shield Class - {F9E4A054-E9B1-4BC3-83A3-76A1AE736170} - D:\Program Files\Hotspot Shield\hssie\HssIE.dll
    O3 - Toolbar: BitDefender Toolbar - {381FFDE8-2394-4f90-B10D-FC6124A40F8C} - D:\Program Files\BitDefender 2009\IEToolbar.dll
    O3 - Toolbar: Google Toolbar - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - C:\Program Files\Google\Google Toolbar\GoogleToolbar_32.dll
    O4 - HKLM\..\Run: [CARPService] carpserv.exe
    O4 - HKLM\..\Run: [BDAgent] "D:\Program Files\BitDefender 2009\bdagent.exe "
    O4 - HKLM\..\Run: [BitDefender Antiphishing Helper] "D:\Program Files\BitDefender 2009\IEShow.exe "
    O4 - HKLM\..\Run: [GrooveMonitor] "C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe "
    O4 - HKCU\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\ctfmon.exe
    O4 - HKCU\..\Run: [swg] "C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe "
    O4 - HKUS\S-1-5-19\..\Run: [CTFMON.EXE] C:\WINDOWS\System32\CTFMON.EXE (User 'LOCAL SERVICE')
    O4 - HKUS\S-1-5-20\..\Run: [CTFMON.EXE] C:\WINDOWS\System32\CTFMON.EXE (User 'NETWORK SERVICE')
    O4 - HKUS\S-1-5-18\..\Run: [CTFMON.EXE] C:\WINDOWS\System32\CTFMON.EXE (User 'SYSTEM')
    O4 - HKUS\.DEFAULT\..\Run: [CTFMON.EXE] C:\WINDOWS\System32\CTFMON.EXE (User 'Default user')
    O4 - Startup: Launch Internet Explorer Browser.lnk = C:\Program Files\Internet Explorer\iexplore.exe
    O4 - Startup: Mozilla Firefox.lnk = D:\Program Files\firefox.exe
    O4 - Startup: STREAM.lnk = ?
    O4 - Global Startup: Google Calendar Sync.lnk = D:\Program Files\Google Calendar Sync\GoogleCalendarSync.exe
    O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\Office12\EXCEL.EXE/3000
    O8 - Extra context menu item: Google Sidewiki... - res://C:\Program Files\Google\Google Toolbar\Component\GoogleToolbarDynamic_mui_en_5F1A57F0B9B89E2E.dll/cmsidewiki.html
    O9 - Extra button: Send to OneNote - {2670000A-7350-4f3c-8081-5663EE0C6C49} - C:\PROGRA~1\MICROS~2\Office12\ONBttnIE.dll
    O9 - Extra 'Tools' menuitem: S&end to OneNote - {2670000A-7350-4f3c-8081-5663EE0C6C49} - C:\PROGRA~1\MICROS~2\Office12\ONBttnIE.dll
    O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\Office12\REFIEBAR.DLL
    O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
    O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
    O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} (WUWebControl Class) - http://update.microsoft.com/windowsupdate/v6/V5Controls/en/x86/client/wuweb_site.cab?1260938856913
    O16 - DPF: {D4003189-95B1-4A2F-9A87-F2B03665960D} (VodClient Control Class) - http://vexcast.com/download/vexcast.cab
    O17 - HKLM\System\CCS\Services\Tcpip\..\{2029C8D4-C8B7-46FA-96BA-AB6D6105020F}: NameServer = 212.188.4.10,195.34.32.116
    O17 - HKLM\System\CCS\Services\Tcpip\..\{2B07F3AE-0325-46DD-89ED-73200BA7D76F}: NameServer = 195.34.32.116 212.188.4.10
    O18 - Protocol: grooveLocalGWS - {88FED34C-F0CA-4636-A375-3CB6248B04CD} - C:\Program Files\Microsoft Office\Office12\GrooveSystemServices.dll
    O23 - Service: BitDefender Arrakis Server (Arrakis3) - Unknown owner - C:\Program Files\Common Files\BitDefender\BitDefender Arrakis Server\bin\Arrakis3.exe
    O23 - Service: Google Update Service (gupdate) (gupdate) - Google Inc. - C:\Program Files\Google\Update\GoogleUpdate.exe
    O23 - Service: Google Software Updater (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
    O23 - Service: Hotspot Shield Service (HotspotShieldService) - Unknown owner - D:\Program Files\Hotspot Shield\bin\openvpnas.exe
    O23 - Service: Hotspot Shield Routing Service (HssSrv) - AnchorFree Inc. - D:\Program Files\Hotspot Shield\HssWPR\hsssrv.exe
    O23 - Service: Hotspot Shield Tray Service (HssTrayService) - Unknown owner - D:\Program Files\Hotspot Shield\bin\HssTrayService.EXE
    O23 - Service: BitDefender Desktop Update Service (LIVESRV) - BitDefender SRL - C:\Program Files\Common Files\BitDefender\BitDefender Update Service\livesrv.exe
    O23 - Service: BitDefender Virus Shield (VSSERV) - BitDefender S. R. L. - D:\Program Files\BitDefender 2009\vsserv.exe

    --
    End of file - 7069 bytes

    -------------------

    4) The Big Bomb ! lol - GMER Scan

    GMER Scan ( This missile has nailed the Trojan Generic creep ) will post the Scan Log, Its nearly getting over, can see all the Trojans there in the hidden files - C & D.

    My Windows is installed on C and all rest Program Files on D for obvious reasons.

    Coming soon with it :D
     
    Last edited: 2009/12/28
    Amor,
    #7
  9. 2009/12/28
    broni

    broni Moderator Malware Analyst

    Joined:
    2002/08/01
    Messages:
    21,701
    Likes Received:
    116
    Ok :)
     
  10. 2009/12/29
    Amor

    Amor Inactive Thread Starter

    Joined:
    2009/01/13
    Messages:
    20
    Likes Received:
    0
    Hiya Broni !, here U go , Look forward to your expert advice, my friend, thanks again :)

    (* Manually delete the evil Generic Trojans - Library* aekgoprn.dll* is what i must, i can't wait :D lol)


    GMER Log

    GMER 1.0.15.15281 - http://www.gmer.net
    Rootkit scan 2009-12-29 09:02:18
    Windows 5.1.2600 Service Pack 3
    Running: s7t6x423.exe; Driver: C:\DOCUME~1\Amor\LOCALS~1\Temp\awldikoc.sys


    ---- System - GMER 1.0.15 ----

    SSDT \??\D:\Program Files\BitDefender 2009\bdselfpr.sys (BitDefender Self Protection Driver/BitDefender S.R.L.) ZwOpenProcess [0xF0000C90]
    SSDT \??\D:\Program Files\BitDefender 2009\bdselfpr.sys (BitDefender Self Protection Driver/BitDefender S.R.L.) ZwOpenThread [0xF0000D7E]
    SSDT \??\D:\Program Files\BitDefender 2009\bdselfpr.sys (BitDefender Self Protection Driver/BitDefender S.R.L.) ZwTerminateProcess [0xF0000BF4]
    SSDT \??\D:\Program Files\BitDefender 2009\bdselfpr.sys (BitDefender Self Protection Driver/BitDefender S.R.L.) ZwTerminateThread [0xF0000EC4]

    ---- Kernel code sections - GMER 1.0.15 ----

    .text usbuhci.sys F795A000 23 Bytes [FF, 75, 10, 56, FF, 75, 08, ...]
    .text usbuhci.sys F795A018 50 Bytes [55, 8B, EC, 8B, 4D, 0C, 8B, ...]
    .text usbuhci.sys F795A04B 17 Bytes [15, 24, D6, 95, F7, 8B, C6, ...] {ADC EAX, 0xf795d624; MOV EAX, ESI; POP ESI; POP EBP; RET 0x8; INT 3 ; INT 3 ; INT 3 ; INT 3 ; INT 3 }
    .text usbuhci.sys F795A05D 35 Bytes [FF, 55, 8B, EC, 56, 8B, 75, ...]
    .text usbuhci.sys F795A081 139 Bytes [00, 33, C1, 25, 00, 04, 00, ...]
    .text ...

    ---- Kernel IAT/EAT - GMER 1.0.15 ----

    IAT \SystemRoot\System32\DRIVERS\usbuhci.sys[ntoskrnl.exe!ObfDereferenceObject] FC458966
    IAT \SystemRoot\System32\DRIVERS\usbuhci.sys[ntoskrnl.exe!ExAllocatePool] 8AFC558A
    IAT \SystemRoot\System32\DRIVERS\usbuhci.sys[ntoskrnl.exe!ExFreePoolWithTag] 03E9C0CA
    IAT \SystemRoot\System32\DRIVERS\usbuhci.sys[ntoskrnl.exe!ZwClose] 7501E183
    IAT \SystemRoot\System32\DRIVERS\usbuhci.sys[ntoskrnl.exe!ZwSetSystemInformation] 10C2F60E
    IAT \SystemRoot\System32\DRIVERS\usbuhci.sys[ntoskrnl.exe!swprintf] 85660975
    IAT \SystemRoot\System32\DRIVERS\usbuhci.sys[ntoskrnl.exe!RtlInitUnicodeString] 830474C0
    IAT \SystemRoot\System32\DRIVERS\usbuhci.sys[ntoskrnl.exe!IoCreateDriver] 57000C66
    IAT \SystemRoot\System32\DRIVERS\usbuhci.sys[ntoskrnl.exe!ObMakeTemporaryObject] 83FC7D8B
    IAT \SystemRoot\System32\DRIVERS\usbuhci.sys[ntoskrnl.exe!ExUuidCreate] 7D8901E7
    IAT \SystemRoot\System32\DRIVERS\usbuhci.sys[ntoskrnl.exe!RtlStringFromGUID] 043D8BF4
    IAT \SystemRoot\System32\DRIVERS\usbuhci.sys[ntoskrnl.exe!sprintf] 75F795D4
    IAT \SystemRoot\System32\DRIVERS\usbuhci.sys[ntoskrnl.exe!RtlFreeUnicodeString] 06C2F60F
    IAT \SystemRoot\System32\DRIVERS\usbuhci.sys[ntoskrnl.exe!ZwSetInformationFile] 85660A75
    IAT \SystemRoot\System32\DRIVERS\usbuhci.sys[ntoskrnl.exe!ZwWriteFile] F60575C9
    IAT \SystemRoot\System32\DRIVERS\usbuhci.sys[ntoskrnl.exe!ZwCreateFile] 197410C2
    IAT \SystemRoot\System32\DRIVERS\usbuhci.sys[ntoskrnl.exe!ZwQueryInformationFile] 66FC75FF
    IAT \SystemRoot\System32\DRIVERS\usbuhci.sys[ntoskrnl.exe!KeQuerySystemTime] 53424689
    IAT \SystemRoot\System32\DRIVERS\usbuhci.sys[ntoskrnl.exe!RtlTimeToTimeFields] 458BD7FF
    IAT \SystemRoot\System32\DRIVERS\usbuhci.sys[ntoskrnl.exe!ZwDeleteFile] 83006AF8
    IAT \SystemRoot\System32\DRIVERS\usbuhci.sys[ntoskrnl.exe!ZwOpenFile] C65004C0
    IAT \SystemRoot\System32\DRIVERS\usbuhci.sys[ntoskrnl.exe!ZwReadFile] FF010B45
    IAT \SystemRoot\System32\DRIVERS\usbuhci.sys[ntoskrnl.exe!RtlIpv4StringToAddressExA] 7D8366D7
    IAT \SystemRoot\System32\DRIVERS\usbuhci.sys[ntoskrnl.exe!KeInsertQueue] 237400F4
    IAT \SystemRoot\System32\DRIVERS\usbuhci.sys[ntoskrnl.exe!KeRemoveQueue] D032E856
    IAT \SystemRoot\System32\DRIVERS\usbuhci.sys[ntoskrnl.exe!KeRundownQueue] 4E8BFFFF
    IAT \SystemRoot\System32\DRIVERS\usbuhci.sys[ntoskrnl.exe!IoFreeIrp] 0101F658
    IAT \SystemRoot\System32\DRIVERS\usbuhci.sys[ntoskrnl.exe!KeInitializeQueue] 468B1575
    IAT \SystemRoot\System32\DRIVERS\usbuhci.sys[ntoskrnl.exe!ObfReferenceObject] F606EB54
    IAT \SystemRoot\System32\DRIVERS\usbuhci.sys[ntoskrnl.exe!PsCreateSystemThread] 74010440
    IAT \SystemRoot\System32\DRIVERS\usbuhci.sys[ntoskrnl.exe!ObReferenceObjectByHandle] 14408B0A
    IAT \SystemRoot\System32\DRIVERS\usbuhci.sys[ntoskrnl.exe!IoBuildDeviceIoControlRequest] F375C085
    IAT \SystemRoot\System32\DRIVERS\usbuhci.sys[ntoskrnl.exe!IofCallDriver] 33010983
    IAT \SystemRoot\System32\DRIVERS\usbuhci.sys[ntoskrnl.exe!ZwOpenSection] FC5D8ADB
    IAT \SystemRoot\System32\DRIVERS\usbuhci.sys[ntoskrnl.exe!ZwMapViewOfSection] 8304EBC0
    IAT \SystemRoot\System32\DRIVERS\usbuhci.sys[ntoskrnl.exe!MmAllocatePagesForMdl] 047401E3
    IAT \SystemRoot\System32\DRIVERS\usbuhci.sys[ntoskrnl.exe!MmMapLockedPagesSpecifyCache] 0EEB016A
    IAT \SystemRoot\System32\DRIVERS\usbuhci.sys[ntoskrnl.exe!MmUnmapLockedPages] 3966C033
    IAT \SystemRoot\System32\DRIVERS\usbuhci.sys[ntoskrnl.exe!MmFreePagesFromMdl] 0C74F445
    IAT \SystemRoot\System32\DRIVERS\usbuhci.sys[ntoskrnl.exe!ZwUnmapViewOfSection] 741C4639
    IAT \SystemRoot\System32\DRIVERS\usbuhci.sys[ntoskrnl.exe!RtlHashUnicodeString] E8565007
    IAT \SystemRoot\System32\DRIVERS\usbuhci.sys[ntoskrnl.exe!KeSetEvent] FFFFF7D2
    IAT \SystemRoot\System32\DRIVERS\usbuhci.sys[ntoskrnl.exe!RtlPrefixUnicodeString] 74DB8566
    IAT \SystemRoot\System32\DRIVERS\usbuhci.sys[ntoskrnl.exe!IoGetRelatedDeviceObject] 0C468B27
    IAT \SystemRoot\System32\DRIVERS\usbuhci.sys[ntoskrnl.exe!IoAllocateIrp] 8D10F883
    IAT \SystemRoot\System32\DRIVERS\usbuhci.sys[ntoskrnl.exe!KeInitializeEvent] 4E890148
    IAT \SystemRoot\System32\DRIVERS\usbuhci.sys[ntoskrnl.exe!KeWaitForSingleObject] FF19730C
    IAT \SystemRoot\System32\DRIVERS\usbuhci.sys[ntoskrnl.exe!ExAllocatePoolWithTag] 15FFF875
    IAT \SystemRoot\System32\DRIVERS\usbuhci.sys[ntoskrnl.exe!PoStartNextPowerIrp] [F795D408] \SystemRoot\System32\DRIVERS\usbuhci.sys (UHCI USB Miniport Driver/Microsoft Corporation)
    IAT \SystemRoot\System32\DRIVERS\usbuhci.sys[ntoskrnl.exe!IofCompleteRequest] 00010D66
    IAT \SystemRoot\System32\DRIVERS\usbuhci.sys[ntoskrnl.exe!PoCallDriver] F4458966
    IAT \SystemRoot\System32\DRIVERS\usbuhci.sys[ntoskrnl.exe!ObReferenceObjectByName] FFF475FF
    IAT \SystemRoot\System32\DRIVERS\usbuhci.sys[ntoskrnl.exe!IoDriverObjectType] D7FFF875
    IAT \SystemRoot\System32\DRIVERS\usbuhci.sys[ntoskrnl.exe!IoEnumerateDeviceObjectList] 5F0B458A
    IAT \SystemRoot\System32\DRIVERS\usbuhci.sys[ntoskrnl.exe!IoCreateDevice] C2C95B5E
    IAT \SystemRoot\System32\DRIVERS\usbuhci.sys[ntoskrnl.exe!ZwCreateSection] CCCC0004
    IAT \SystemRoot\System32\DRIVERS\usbuhci.sys[ntoskrnl.exe!ZwFlushVirtualMemory] CCCCCCCC
    IAT \SystemRoot\System32\DRIVERS\usbuhci.sys[ntoskrnl.exe!ZwOpenKey] 8B55FF8B
    IAT \SystemRoot\System32\DRIVERS\usbuhci.sys[ntoskrnl.exe!ZwEnumerateKey] 8B5653EC
    IAT \SystemRoot\System32\DRIVERS\usbuhci.sys[ntoskrnl.exe!ZwDeleteKey] 468B0875
    IAT \SystemRoot\System32\DRIVERS\usbuhci.sys[ntoskrnl.exe!ZwQueryKey] 5E8B6608
    IAT \SystemRoot\System32\DRIVERS\usbuhci.sys[ntoskrnl.exe!IoQueueWorkItem] 45895742
    IAT \SystemRoot\System32\DRIVERS\usbuhci.sys[ntoskrnl.exe!ZwLoadDriver] 50C03308
    IAT \SystemRoot\System32\DRIVERS\usbuhci.sys[ntoskrnl.exe!ZwQueryDirectoryFile] 46896650
    IAT \SystemRoot\System32\DRIVERS\usbuhci.sys[ntoskrnl.exe!IoDeleteDevice] C3B70F42
    IAT \SystemRoot\System32\DRIVERS\usbuhci.sys[ntoskrnl.exe!ZwOpenDirectoryObject] 64706850
    IAT \SystemRoot\System32\DRIVERS\usbuhci.sys[ntoskrnl.exe!ZwQueryDirectoryObject] 01BF5F69
    IAT \SystemRoot\System32\DRIVERS\usbuhci.sys[ntoskrnl.exe!IoGetDeviceObjectPointer] 57100000
    IAT \SystemRoot\System32\DRIVERS\usbuhci.sys[ntoskrnl.exe!wcsrchr] 2415FF56
    IAT \SystemRoot\System32\DRIVERS\usbuhci.sys[ntoskrnl.exe!IoAllocateWorkItem] 83F795D6
    IAT \SystemRoot\System32\DRIVERS\usbuhci.sys[ntoskrnl.exe!KeInitializeTimer] 8B663FE3
    IAT \SystemRoot\System32\DRIVERS\usbuhci.sys[ntoskrnl.exe!KeInitializeDpc] A8DB33C3
    IAT \SystemRoot\System32\DRIVERS\usbuhci.sys[ntoskrnl.exe!KeSetTimerEx] 531B7403
    IAT \SystemRoot\System32\DRIVERS\usbuhci.sys[ntoskrnl.exe!_allmul] C0B70F53
    IAT \SystemRoot\System32\DRIVERS\usbuhci.sys[ntoskrnl.exe!_allshr] 45506850
    IAT \SystemRoot\System32\DRIVERS\usbuhci.sys[ntoskrnl.exe!_aullrem] 56575F69
    IAT \SystemRoot\System32\DRIVERS\usbuhci.sys[ntoskrnl.exe!memset] D62415FF
    IAT \SystemRoot\System32\DRIVERS\usbuhci.sys[ntoskrnl.exe!memcpy] 5653F795

    ---- User IAT/EAT - GMER 1.0.15 ----

    IAT C:\WINDOWS\Explorer.EXE[288] @ C:\WINDOWS\system32\kernel32.dll [ntdll.dll!LdrGetProcedureAddress] [02D717A6] \\.\70.103.101.103\aekgoprn.dll
    IAT C:\WINDOWS\system32\spoolsv.exe[384] @ C:\WINDOWS\system32\kernel32.dll [ntdll.dll!LdrGetProcedureAddress] [100017A6] \\.\70.103.101.103\aekgoprn.dll
    IAT C:\WINDOWS\system32\lsass.exe[1068] @ C:\WINDOWS\system32\kernel32.dll [ntdll.dll!LdrGetProcedureAddress] [100017A6] \\.\70.103.101.103\aekgoprn.dll
    IAT C:\WINDOWS\system32\svchost.exe[1272] @ C:\WINDOWS\system32\kernel32.dll [ntdll.dll!LdrGetProcedureAddress] [100017A6] \\.\70.103.101.103\aekgoprn.dll
    IAT C:\Program Files\Common Files\BitDefender\BitDefender Update Service\livesrv.exe[1392] @ C:\WINDOWS\system32\kernel32.dll [ntdll.dll!LdrGetProcedureAddress] 017717A6
    IAT C:\WINDOWS\System32\svchost.exe[1524] @ C:\WINDOWS\system32\kernel32.dll [ntdll.dll!LdrGetProcedureAddress] [100017A6] \\.\70.103.101.103\aekgoprn.dll
    IAT C:\WINDOWS\System32\svchost.exe[1596] @ C:\WINDOWS\system32\kernel32.dll [ntdll.dll!LdrGetProcedureAddress] [100017A6] \\.\70.103.101.103\aekgoprn.dll
    IAT D:\Program Files\Hotspot Shield\bin\openvpnas.exe[1668] @ C:\WINDOWS\system32\kernel32.dll [ntdll.dll!LdrGetProcedureAddress] [100017A6] \\.\70.103.101.103\aekgoprn.dll
    IAT D:\Program Files\Hotspot Shield\HssWPR\hsssrv.exe[1872] @ C:\WINDOWS\system32\kernel32.dll [ntdll.dll!LdrGetProcedureAddress] [100017A6] \\.\70.103.101.103\aekgoprn.dll
    IAT C:\WINDOWS\System32\svchost.exe[1888] @ C:\WINDOWS\system32\kernel32.dll [ntdll.dll!LdrGetProcedureAddress] [100017A6] \\.\70.103.101.103\aekgoprn.dll
    IAT C:\WINDOWS\System32\alg.exe[3136] @ C:\WINDOWS\system32\kernel32.dll [ntdll.dll!LdrGetProcedureAddress] [100017A6] \\.\70.103.101.103\aekgoprn.dll

    ---- Devices - GMER 1.0.15 ----

    AttachedDevice \Driver\Tcpip \Device\Ip bdftdif.sys (BitDefender Firewall TDI Filter Driver/BitDefender LLC)

    Device \Driver\USB_RNDIS \Device\{2029C8D4-C8B7-46FA-96BA-AB6D6105020F} RNDISMP.SYS (Remote NDIS Miniport/Microsoft Corporation)

    AttachedDevice \Driver\Tcpip \Device\Tcp bdftdif.sys (BitDefender Firewall TDI Filter Driver/BitDefender LLC)
    AttachedDevice \Driver\Tcpip \Device\Udp bdftdif.sys (BitDefender Firewall TDI Filter Driver/BitDefender LLC)
    AttachedDevice \Driver\Tcpip \Device\RawIp bdftdif.sys (BitDefender Firewall TDI Filter Driver/BitDefender LLC)

    Device \Driver\Disk \GLOBAL??\C2CAD972#4079#4fd3#A68D#AD34CC121074 F78EBBD4

    ---- Threads - GMER 1.0.15 ----

    Thread System [4:124] F78EC90A

    ---- Processes - GMER 1.0.15 ----

    Library \\.\70.103.101.103\aekgoprn.dll (*** hidden *** ) @ C:\WINDOWS\Explorer.EXE [288] 0x02D70000
    Library \\.\70.103.101.103\aekgoprn.dll (*** hidden *** ) @ C:\WINDOWS\system32\spoolsv.exe [384] 0x10000000
    Library \\.\70.103.101.103\aekgoprn.dll (*** hidden *** ) @ C:\Program Files\Internet Explorer\iexplore.exe [676] 0x10000000
    Library \\.\70.103.101.103\aekgoprn.dll (*** hidden *** ) @ C:\Program Files\Google\Update\GoogleUpdate.exe [700] 0x10000000
    Library \\.\70.103.101.103\aekgoprn.dll (*** hidden *** ) @ C:\Program Files\Internet Explorer\iexplore.exe [876] 0x10000000
    Library \\.\70.103.101.103\aekgoprn.dll (*** hidden *** ) @ D:\Program Files\BitDefender 2009\seccenter.exe [988] 0x01D30000
    Library \\.\70.103.101.103\aekgoprn.dll (*** hidden *** ) @ C:\WINDOWS\system32\lsass.exe [1068] 0x10000000
    Library \\.\70.103.101.103\aekgoprn.dll (*** hidden *** ) @ C:\WINDOWS\system32\svchost.exe [1272] 0x10000000
    Library \\.\70.103.101.103\aekgoprn.dll (*** hidden *** ) @ D:\Program Files\BitDefender 2009\vsserv.exe [1432] 0x03400000
    Library \\.\70.103.101.103\aekgoprn.dll (*** hidden *** ) @ C:\WINDOWS\System32\svchost.exe [1524] 0x10000000
    Library \\.\70.103.101.103\aekgoprn.dll (*** hidden *** ) @ D:\Program Files\firefox.exe [1568] 0x01540000
    Library \\.\70.103.101.103\aekgoprn.dll (*** hidden *** ) @ C:\WINDOWS\System32\svchost.exe [1596] 0x10000000
    Library \\.\70.103.101.103\aekgoprn.dll (*** hidden *** ) @ D:\Program Files\Hotspot Shield\bin\openvpnas.exe [1668] 0x10000000
    Library \\.\70.103.101.103\aekgoprn.dll (*** hidden *** ) @ C:\Program Files\Google\Update\GoogleUpdate.exe [1760] 0x10000000
    Library \\.\70.103.101.103\aekgoprn.dll (*** hidden *** ) @ D:\Program Files\Hotspot Shield\HssWPR\hsssrv.exe [1872] 0x10000000
    Library \\.\70.103.101.103\aekgoprn.dll (*** hidden *** ) @ C:\WINDOWS\System32\svchost.exe [1888] 0x10000000
    Library \\.\70.103.101.103\aekgoprn.dll (*** hidden *** ) @ C:\WINDOWS\System32\alg.exe [3136] 0x10000000




    ---- EOF - GMER 1.0.15 ----
     
    Last edited: 2009/12/29
    Amor,
    #9
  11. 2009/12/29
    broni

    broni Moderator Malware Analyst

    Joined:
    2002/08/01
    Messages:
    21,701
    Likes Received:
    116
    Please download ComboFix from [color= "Red"]Here[/color] or [color= "#FF0000"]Here[/color] to your Desktop.

    **Note: In the event you already have Combofix, this is a new version that I need you to download. It is important that it is saved directly to your desktop**
    1. Please, never rename Combofix unless instructed.
    2. Close any open browsers.
    3. Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.
      • Very Important! Temporarily disable your anti-virus, script blocking and any anti-malware real-time protection before performing a scan. They can interfere with ComboFix or remove some of its embedded files which may cause "unpredictable results ".
      • Click on this link to see a list of programs that should be disabled. The list is not all inclusive. If yours is not listed and you don't know how to disable it, please ask.
      NOTE. If Combofix asks you to install Recovery Console, please allow it.
      • Close any open browsers.
      • WARNING: Combofix will disconnect your machine from the Internet as soon as it starts
      • Please do not attempt to re-connect your machine back to the Internet until Combofix has completely finished.
      • If there is no internet connection after running Combofix, then restart your computer to restore back your connection.
    4. Double click on combofix.exe & follow the prompts.
    5. When finished, it will produce a report for you.
    6. Please post the "C:\ComboFix.txt" along with a new HijackThis log for further review.
    **Note: Do not mouseclick combofix's window while it's running. That may cause it to stall**

    Make sure, you re-enable your security programs, when you're done with Combofix.

    DO NOT make any other changes to your computer (like installing programs, using other cleaning tools, etc.), until it's officially declared clean!!!
     
  12. 2009/12/29
    Amor

    Amor Inactive Thread Starter

    Joined:
    2009/01/13
    Messages:
    20
    Likes Received:
    0
    Broni, downloading the Comofix and will turn back to you with the results. Thanks :)
     
  13. 2009/12/29
    Amor

    Amor Inactive Thread Starter

    Joined:
    2009/01/13
    Messages:
    20
    Likes Received:
    0
    Broni ! Here's the Combo Fix Log , look forward to your reply. Thanks dude :)

    ComboFix 09-12-28.03 - Amor 12/29/2009 10:23:56.1.1 - x86
    Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.959.672 [GMT 3:00]
    Running from: c:\documents and settings\Amor\Desktop\ComboFix.exe
    AV: BitDefender Antivirus *On-access scanning disabled* (Updated) {6C4BB89C-B0ED-4F41-A29C-4373888923BB}
    .

    ((((((((((((((((((((((((( Files Created from 2009-11-28 to 2009-12-29 )))))))))))))))))))))))))))))))
    .

    2009-12-28 20:56 . 2009-12-28 20:56 52224 ----a-w- c:\documents and settings\Amor\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\SDDLLS\SD10005.dll
    2009-12-28 20:56 . 2009-12-28 20:56 117760 ----a-w- c:\documents and settings\Amor\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\SDDLLS\UIREPAIR.DLL
    2009-12-28 20:54 . 2009-12-28 20:54 -------- d-----w- c:\documents and settings\All Users\Application Data\SUPERAntiSpyware.com
    2009-12-28 20:54 . 2009-12-28 20:54 -------- d-----w- c:\documents and settings\Amor\Application Data\SUPERAntiSpyware.com
    2009-12-28 20:52 . 2009-12-28 20:52 -------- d-----w- c:\program files\Common Files\Wise Installation Wizard
    2009-12-27 04:49 . 2009-12-27 04:49 -------- d-----w- c:\windows\system32\wbem\Repository
    2009-12-25 20:48 . 2009-12-25 21:05 -------- d-----w- c:\program files\Microsoft Works
    2009-12-25 20:47 . 2009-12-25 20:47 -------- d-----w- c:\program files\MSBuild
    2009-12-25 20:19 . 2009-12-25 20:44 -------- d-----w- c:\windows\SHELLNEW
    2009-12-25 20:11 . 2009-12-25 20:11 -------- d-----r- C:\MSOCache
    2009-12-25 02:31 . 2009-12-25 02:31 -------- d-----w- C:\Hotspot Shield
    2009-12-24 17:46 . 2009-12-25 19:49 -------- d-----w- c:\windows\SxsCaPendDel
    2009-12-22 03:17 . 2009-12-22 03:17 -------- d-----w- c:\documents and settings\All Users\Application Data\nagasoft
    2009-12-22 03:17 . 2009-12-22 03:17 -------- d-----w- c:\documents and settings\Amor\Local Settings\Application Data\nagasoft
    2009-12-18 08:44 . 2009-11-21 15:51 471552 -c----w- c:\windows\system32\dllcache\aclayers.dll
    2009-12-17 19:40 . 2009-12-17 19:40 -------- d-----w- c:\documents and settings\LocalService\Local Settings\Application Data\nagasoft
    2009-12-17 06:35 . 2009-12-17 06:35 -------- d-----w- c:\documents and settings\Default User\Local Settings\Application Data\Microsoft Help
    2009-12-17 06:12 . 2009-12-17 06:13 -------- d-----w- c:\documents and settings\Amor\Application Data\Media Player Classic
    2009-12-17 04:06 . 2009-12-17 04:06 -------- d-----w- c:\documents and settings\NetworkService\Local Settings\Application Data\Google
    2009-12-17 04:02 . 2009-12-17 04:02 -------- d-----w- c:\documents and settings\LocalService\Local Settings\Application Data\Google
    2009-12-17 04:01 . 2009-12-17 04:01 -------- d-----w- c:\program files\Google
    2009-12-17 03:31 . 2009-12-17 03:31 -------- d-sh--w- c:\documents and settings\Amor\IECompatCache
    2009-12-17 03:23 . 2009-12-17 03:23 -------- d-sh--w- c:\documents and settings\Amor\PrivacIE
    2009-12-17 02:25 . 2009-12-17 03:17 -------- d-----w- c:\documents and settings\All Users\Application Data\WinZip
    2009-12-17 02:04 . 2009-12-28 10:49 -------- d-----w- c:\documents and settings\Amor\Application Data\vlc
    2009-12-17 01:56 . 2009-12-17 01:56 4844296 ----a-w- c:\documents and settings\All Users\Application Data\Malwarebytes\Malwarebytes' Anti-Malware\mbam-setup.exe
    2009-12-17 01:56 . 2009-12-17 01:56 -------- d-----w- c:\documents and settings\Amor\Application Data\Malwarebytes
    2009-12-17 01:56 . 2009-12-03 13:14 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
    2009-12-17 01:55 . 2009-12-17 01:55 -------- d-----w- c:\documents and settings\All Users\Application Data\Malwarebytes
    2009-12-17 01:55 . 2009-12-03 13:13 19160 ----a-w- c:\windows\system32\drivers\mbam.sys
    2009-12-17 01:49 . 2009-12-17 01:49 -------- d-----w- c:\documents and settings\Amor\Local Settings\Application Data\TVU Networks
    2009-12-17 01:49 . 2009-12-17 01:49 -------- d-----w- c:\documents and settings\All Users\Application Data\TVU Networks
    2009-12-17 01:49 . 2009-12-17 01:49 -------- d-----w- c:\documents and settings\Amor\LocalLow
    2009-12-17 01:46 . 2009-12-25 06:00 -------- d-----w- c:\windows\system32\Nagasoft
    2009-12-16 20:43 . 2009-12-29 07:37 81984 ----a-w- c:\windows\system32\bdod.bin
    2009-12-16 20:28 . 2009-12-16 20:28 -------- d-----w- c:\documents and settings\Amor\Application Data\BitDefender
    2009-12-16 20:27 . 2009-12-16 20:31 -------- d-----w- c:\documents and settings\All Users\Application Data\BitDefender
    2009-12-16 20:25 . 2009-12-16 20:28 -------- d-----w- c:\program files\Common Files\BitDefender
    2009-12-16 19:59 . 2009-08-06 16:23 215920 ----a-w- c:\windows\system32\muweb.dll
    2009-12-16 19:59 . 2009-08-06 16:23 274288 ----a-w- c:\windows\system32\mucltui.dll
    2009-12-16 19:04 . 2008-11-10 08:41 32656 ----a-w- c:\windows\system32\msonpmon.dll
    2009-12-16 19:04 . 2006-10-26 16:56 33104 ----a-w- c:\windows\system32\Spool\prtprocs\w32x86\msonpppr.dll
    2009-12-16 18:40 . 2009-12-16 18:40 -------- d-----w- c:\documents and settings\Amor\Local Settings\Application Data\Microsoft Help
    2009-12-16 18:38 . 2009-12-28 11:37 -------- d-----w- c:\documents and settings\All Users\Application Data\Microsoft Help
    2009-12-16 18:23 . 2009-12-16 18:23 -------- d-sh--w- c:\documents and settings\Amor\IETldCache
    2009-12-16 18:18 . 2009-10-29 07:45 12800 -c----w- c:\windows\system32\dllcache\xpshims.dll
    2009-12-16 18:18 . 2009-10-29 07:45 594432 -c----w- c:\windows\system32\dllcache\msfeeds.dll
    2009-12-16 18:18 . 2009-10-29 07:45 55296 -c----w- c:\windows\system32\dllcache\msfeedsbs.dll
    2009-12-16 18:18 . 2009-10-29 07:45 246272 -c----w- c:\windows\system32\dllcache\ieproxy.dll
    2009-12-16 18:18 . 2009-10-29 07:45 1985536 -c----w- c:\windows\system32\dllcache\iertutil.dll
    2009-12-16 18:18 . 2009-10-29 07:45 11069952 -c----w- c:\windows\system32\dllcache\ieframe.dll
    2009-12-16 18:17 . 2009-12-17 06:28 -------- d-----w- c:\windows\ie8updates
    2009-12-16 18:17 . 2009-10-02 04:44 92160 -c----w- c:\windows\system32\dllcache\iecompat.dll
    2009-12-16 18:15 . 2009-12-16 18:16 -------- dc-h--w- c:\windows\ie8
    2009-12-16 08:13 . 2009-12-16 08:13 -------- d-----w- c:\windows\system32\scripting
    2009-12-16 08:13 . 2009-12-16 08:13 -------- d-----w- c:\windows\l2schemas
    2009-12-16 08:13 . 2009-12-16 08:13 -------- d-----w- c:\windows\system32\en

    .
    (((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
    .
    2009-12-26 04:35 . 2009-12-16 06:37 69232 ----a-w- c:\documents and settings\Amor\Local Settings\Application Data\GDIPFONTCACHEV1.DAT
    2009-12-16 08:18 . 2009-12-16 04:28 86327 ----a-w- c:\windows\PCHealth\HelpCtr\OfflineCache\index.dat
    2009-12-16 06:52 . 2009-12-16 06:52 -------- d-----w- c:\program files\CONEXANT
    2009-12-16 05:19 . 2009-12-16 05:19 0 ----a-w- c:\windows\nsreg.dat
    2009-12-16 04:29 . 2009-12-16 04:29 -------- d-----w- c:\program files\microsoft frontpage
    2009-12-16 04:29 . 2009-12-16 04:29 2678 ----a-w- c:\windows\java\Packages\Data\3FJH3TRR.DAT
    2009-12-16 04:29 . 2009-12-16 04:29 558142 ----a-w- c:\windows\java\Packages\IUXJ7FP7.ZIP
    2009-12-16 04:29 . 2009-12-16 04:29 2678 ----a-w- c:\windows\java\Packages\Data\L3DV7RDZ.DAT
    2009-12-16 04:29 . 2009-12-16 04:29 2678 ----a-w- c:\windows\java\Packages\Data\NZNPFTB9.DAT
    2009-12-16 04:29 . 2009-12-16 04:29 2678 ----a-w- c:\windows\java\Packages\Data\LJLV7LJH.DAT
    2009-12-16 04:29 . 2009-12-16 04:29 2678 ----a-w- c:\windows\java\Packages\Data\DF9N9NHF.DAT
    2009-12-16 04:29 . 2009-12-16 04:29 155995 ----a-w- c:\windows\java\Packages\6CKESE1N.ZIP
    2009-12-16 04:24 . 2009-12-16 04:24 21640 ----a-w- c:\windows\system32\emptyregdb.dat
    2009-11-21 15:51 . 2002-08-29 20:00 471552 ----a-w- c:\windows\AppPatch\aclayers.dll
    2009-10-29 07:45 . 2002-08-29 20:00 916480 ----a-w- c:\windows\system32\wininet.dll
    2009-10-21 05:38 . 2004-08-04 07:56 75776 ----a-w- c:\windows\system32\strmfilt.dll
    2009-10-21 05:38 . 2004-08-04 07:56 25088 ----a-w- c:\windows\system32\httpapi.dll
    2009-10-20 16:20 . 2004-08-04 06:00 265728 ------w- c:\windows\system32\drivers\http.sys
    2009-10-16 07:50 . 2009-10-16 07:50 2520888 ----a-w- c:\documents and settings\Amor\Application Data\Mozilla\Firefox\Profiles\ojuttnoi.default\extensions\firefox@tvunetworks.com\plugins\npTVUAx.dll
    2009-10-13 10:30 . 2002-08-29 20:00 270336 ----a-w- c:\windows\system32\oakley.dll
    2009-10-12 13:38 . 2002-08-29 20:00 149504 ----a-w- c:\windows\system32\rastls.dll
    2009-10-12 13:38 . 2002-08-29 20:00 79872 ----a-w- c:\windows\system32\raschap.dll
    .

    ((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
    .
    .
    *Note* empty entries & legit default entries are not shown
    REGEDIT4

    [HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{F9E4A054-E9B1-4BC3-83A3-76A1AE736170}]
    2009-12-25 02:30 218160 ----a-w- d:\program files\Hotspot Shield\hssie\HssIE.dll

    [HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
    "swg "= "c:\program files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe" [2009-12-17 39408]

    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
    "CARPService "= "carpserv.exe" [2003-05-21 4608]
    "BDAgent "= "d:\program files\BitDefender 2009\bdagent.exe" [2009-12-16 782336]
    "BitDefender Antiphishing Helper "= "d:\program files\BitDefender 2009\IEShow.exe" [2009-02-23 69632]
    "GrooveMonitor "= "c:\program files\Microsoft Office\Office12\GrooveMonitor.exe" [2008-10-25 31072]

    [HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run]
    "CTFMON.EXE "= "c:\windows\System32\CTFMON.EXE" [2008-04-14 15360]

    [hkey_local_machine\software\microsoft\windows\currentversion\explorer\ShellExecuteHooks]
    "{5AE067D3-9AFB-48E0-853A-EBB7F4A000DA} "= "d:\program files\SASSEH.DLL" [2008-05-13 77824]

    [HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\!SASWinLogon]
    2009-09-03 11:21 548352 ----a-w- d:\program files\SASWINLO.dll

    [HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]
    "EnableFirewall "= 0 (0x0)

    [HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
    "%windir%\\system32\\sessmgr.exe "=
    "%windir%\\Network Diagnostic\\xpnetdiag.exe "=
    "d:\\Program Files\\TVUPlayer\\TVUPlayer.exe "=
    "d:\\Program Files\\SopCast\\adv\\SopAdver.exe "=
    "d:\\Program Files\\SopCast\\SopCast.exe "=
    "c:\\WINDOWS\\system32\\Nagasoft\\FFVJPlayer.exe "=
    "c:\\Program Files\\Microsoft Office\\Office12\\OUTLOOK.EXE "=
    "c:\\Program Files\\Microsoft Office\\Office12\\GROOVE.EXE "=
    "c:\\Program Files\\Microsoft Office\\Office12\\ONENOTE.EXE "=

    R1 SASDIFSV;SASDIFSV;d:\program files\sasdifsv.sys [12/16/2009 4:26 PM 9968]
    R1 SASKUTIL;SASKUTIL;d:\program files\SASKUTIL.SYS [12/16/2009 4:26 PM 74480]
    R3 ALiIRDA;ALi Infrared Device Driver;c:\windows\system32\drivers\alifir.sys [12/16/2009 10:18 AM 26624]
    R3 bdfm;BDFM;c:\windows\system32\drivers\bdfm.sys [9/18/2008 12:09 PM 111112]
    S2 gupdate;Google Update Service (gupdate);c:\program files\Google\Update\GoogleUpdate.exe [12/17/2009 7:01 AM 135664]
    S3 Arrakis3;BitDefender Arrakis Server;c:\program files\Common Files\BitDefender\BitDefender Arrakis Server\bin\Arrakis3.exe [1/20/2009 7:16 PM 172032]
    S3 SASENUM;SASENUM;d:\program files\SASENUM.SYS [12/16/2009 4:27 PM 7408]

    [HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\svchost]
    bdx REG_MULTI_SZ scan
    vvdsvc REG_MULTI_SZ vvdsvc
    .
    ------- Supplementary Scan -------
    .
    uStart Page = hxxp://www.themoscowtimes.com/
    IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~2\Office12\EXCEL.EXE/3000
    IE: Google Sidewiki... - c:\program files\Google\Google Toolbar\Component\GoogleToolbarDynamic_mui_en_5F1A57F0B9B89E2E.dll/cmsidewiki.html
    TCP: {2029C8D4-C8B7-46FA-96BA-AB6D6105020F} = 212.188.4.10,195.34.32.116
    DPF: DirectAnimation Java Classes - file://c:\windows\Java\classes\dajava.cab
    DPF: Microsoft XML Parser for Java - file://c:\windows\Java\classes\xmldso.cab
    FF - ProfilePath - c:\documents and settings\Amor\Application Data\Mozilla\Firefox\Profiles\ojuttnoi.default\
    FF - prefs.js: browser.startup.homepage - www.samachar.com
    FF - component: d:\program files\components\FFComm.dll
    FF - plugin: c:\documents and settings\Amor\Application Data\Mozilla\Firefox\Profiles\ojuttnoi.default\extensions\firefox@tvunetworks.com\plugins\npTVUAx.dll
    FF - plugin: c:\program files\Google\Update\1.2.183.13\npGoogleOneClick8.dll
    FF - plugin: d:\program files\VLC\npvlc.dll
    .

    **************************************************************************

    catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
    Rootkit scan 2009-12-29 10:40
    Windows 5.1.2600 Service Pack 3 NTFS

    scanning hidden processes ...

    scanning hidden autostart entries ...

    scanning hidden files ...

    scan completed successfully
    hidden files: 0

    **************************************************************************

    Stealth MBR rootkit/Mebroot/Sinowal detector 0.3.7 by Gmer, http://www.gmer.net

    device: opened successfully
    user: MBR read successfully
    called modules: ntoskrnl.exe CLASSPNP.SYS disk.sys >>UNKNOWN [0xF78F3BD4]<<
    kernel: MBR read successfully
    detected MBR rootkit hooks:
    \Driver\Disk -> CLASSPNP.SYS @ 0xf7605f28
    \Driver\ACPI -> ACPI.sys @ 0xf7558cb8
    \Driver\atapi -> atapi.sys @ 0xf74cc852
    IoDeviceObjectType -> DeleteProcedure -> ntoskrnl.exe @ 0x805a05a9
    ParseProcedure -> ntoskrnl.exe @ 0x8056ea15
    \Device\Harddisk0\DR0 -> DeleteProcedure -> ntoskrnl.exe @ 0x805a05a9
    ParseProcedure -> ntoskrnl.exe @ 0x8056ea15
    NDIS: -> SendCompleteHandler -> 0x0
    PacketIndicateHandler -> 0x0
    SendHandler -> 0x0
    user & kernel MBR OK

    **************************************************************************
    .
    --------------------- DLLs Loaded Under Running Processes ---------------------

    - - - - - - - > 'winlogon.exe'(884)
    d:\program files\SASWINLO.dll
    c:\windows\system32\WININET.dll

    - - - - - - - > 'explorer.exe'(484)
    c:\windows\system32\WININET.dll
    c:\windows\WinSxS\x86_Microsoft.VC80.CRT_1fc8b3b9a1e18e3b_8.0.50727.762_x-ww_6b128700\MSVCR80.dll
    c:\windows\system32\ieframe.dll
    c:\windows\system32\webcheck.dll
    c:\windows\system32\hnetcfg.dll
    aekgoprn.dll 10000000 49152 \\.\70.103.101.103\aekgoprn.dll
    .
    ------------------------ Other Running Processes ------------------------
    .
    d:\program files\Hotspot Shield\bin\openvpnas.exe
    d:\program files\Hotspot Shield\HssWPR\hsssrv.exe
    c:\windows\system32\wscntfy.exe
    c:\windows\system32\carpserv.exe
    .
    **************************************************************************
    .
    Completion time: 2009-12-29 10:47:39 - machine was rebooted
    ComboFix-quarantined-files.txt 2009-12-29 07:47

    Pre-Run: 145,735,262,208 bytes free
    Post-Run: 145,779,494,912 bytes free

    WindowsXP-KB310994-SP2-Pro-BootDisk-ENU.exe
    [boot loader]
    timeout=2
    default=multi(0)disk(0)rdisk(0)partition(1)\WINDOWS
    [operating systems]
    c:\cmdcons\BOOTSECT.DAT= "Microsoft Windows Recovery Console" /cmdcons
    multi(0)disk(0)rdisk(0)partition(1)\WINDOWS= "Microsoft Windows XP Professional" /fastdetect /NoExecute=OptIn

    - - End Of File - - 4D6A8FF35429A788F07A1E0BAB8052D2
     
  14. 2009/12/29
    Amor

    Amor Inactive Thread Starter

    Joined:
    2009/01/13
    Messages:
    20
    Likes Received:
    0
    Here's the HIjack this Log, Thanks.

    Logfile of Trend Micro HijackThis v2.0.2
    Scan saved at 10:56:03 AM, on 12/29/2009
    Platform: Windows XP SP3 (WinNT 5.01.2600)
    MSIE: Internet Explorer v8.00 (8.00.6001.18702)
    Boot mode: Normal

    Running processes:
    C:\WINDOWS\System32\smss.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\services.exe
    C:\WINDOWS\system32\lsass.exe
    C:\WINDOWS\system32\svchost.exe
    C:\Program Files\Common Files\BitDefender\BitDefender Update Service\livesrv.exe
    D:\Program Files\BitDefender 2009\vsserv.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\system32\spoolsv.exe
    D:\Program Files\Hotspot Shield\bin\openvpnas.exe
    D:\Program Files\Hotspot Shield\HssWPR\hsssrv.exe
    C:\WINDOWS\system32\wscntfy.exe
    C:\WINDOWS\system32\carpserv.exe
    D:\Program Files\BitDefender 2009\bdagent.exe
    C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe
    C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe
    C:\WINDOWS\explorer.exe
    C:\WINDOWS\system32\ctfmon.exe
    D:\Program Files\HijackThis.exe

    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.themoscowtimes.com/
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
    R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
    O2 - BHO: Groove GFS Browser Helper - {72853161-30C5-4D22-B7F9-0BBC1D38A37E} - C:\Program Files\Microsoft Office\Office12\GrooveShellExtensions.dll
    O2 - BHO: Google Toolbar Helper - {AA58ED58-01DD-4d91-8333-CF10577473F7} - C:\Program Files\Google\Google Toolbar\GoogleToolbar_32.dll
    O2 - BHO: Google Toolbar Notifier BHO - {AF69DE43-7D58-4638-B6FA-CE66B5AD205D} - C:\Program Files\Google\GoogleToolbarNotifier\5.5.4723.1820\swg.dll
    O2 - BHO: Hotspot Shield Class - {F9E4A054-E9B1-4BC3-83A3-76A1AE736170} - D:\Program Files\Hotspot Shield\hssie\HssIE.dll
    O3 - Toolbar: BitDefender Toolbar - {381FFDE8-2394-4f90-B10D-FC6124A40F8C} - D:\Program Files\BitDefender 2009\IEToolbar.dll
    O3 - Toolbar: Google Toolbar - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - C:\Program Files\Google\Google Toolbar\GoogleToolbar_32.dll
    O4 - HKLM\..\Run: [CARPService] carpserv.exe
    O4 - HKLM\..\Run: [BDAgent] "D:\Program Files\BitDefender 2009\bdagent.exe "
    O4 - HKLM\..\Run: [BitDefender Antiphishing Helper] "D:\Program Files\BitDefender 2009\IEShow.exe "
    O4 - HKLM\..\Run: [GrooveMonitor] "C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe "
    O4 - HKCU\..\Run: [swg] "C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe "
    O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
    O4 - HKUS\S-1-5-18\..\Run: [CTFMON.EXE] C:\WINDOWS\System32\CTFMON.EXE (User 'SYSTEM')
    O4 - HKUS\.DEFAULT\..\Run: [CTFMON.EXE] C:\WINDOWS\System32\CTFMON.EXE (User 'Default user')
    O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\Office12\EXCEL.EXE/3000
    O8 - Extra context menu item: Google Sidewiki... - res://C:\Program Files\Google\Google Toolbar\Component\GoogleToolbarDynamic_mui_en_5F1A57F0B9B89E2E.dll/cmsidewiki.html
    O9 - Extra button: Send to OneNote - {2670000A-7350-4f3c-8081-5663EE0C6C49} - C:\PROGRA~1\MICROS~2\Office12\ONBttnIE.dll
    O9 - Extra 'Tools' menuitem: S&end to OneNote - {2670000A-7350-4f3c-8081-5663EE0C6C49} - C:\PROGRA~1\MICROS~2\Office12\ONBttnIE.dll
    O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\Office12\REFIEBAR.DLL
    O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
    O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
    O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} (WUWebControl Class) - http://update.microsoft.com/windowsupdate/v6/V5Controls/en/x86/client/wuweb_site.cab?1260938856913
    O16 - DPF: {D4003189-95B1-4A2F-9A87-F2B03665960D} (VodClient Control Class) - http://vexcast.com/download/vexcast.cab
    O17 - HKLM\System\CCS\Services\Tcpip\..\{2029C8D4-C8B7-46FA-96BA-AB6D6105020F}: NameServer = 212.188.4.10,195.34.32.116
    O17 - HKLM\System\CCS\Services\Tcpip\..\{2B07F3AE-0325-46DD-89ED-73200BA7D76F}: NameServer = 195.34.32.116 212.188.4.10
    O18 - Protocol: grooveLocalGWS - {88FED34C-F0CA-4636-A375-3CB6248B04CD} - C:\Program Files\Microsoft Office\Office12\GrooveSystemServices.dll
    O20 - Winlogon Notify: !SASWinLogon - D:\Program Files\SASWINLO.dll
    O23 - Service: BitDefender Arrakis Server (Arrakis3) - Unknown owner - C:\Program Files\Common Files\BitDefender\BitDefender Arrakis Server\bin\Arrakis3.exe
    O23 - Service: Google Update Service (gupdate) (gupdate) - Google Inc. - C:\Program Files\Google\Update\GoogleUpdate.exe
    O23 - Service: Google Software Updater (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
    O23 - Service: Hotspot Shield Service (HotspotShieldService) - Unknown owner - D:\Program Files\Hotspot Shield\bin\openvpnas.exe
    O23 - Service: Hotspot Shield Routing Service (HssSrv) - AnchorFree Inc. - D:\Program Files\Hotspot Shield\HssWPR\hsssrv.exe
    O23 - Service: Hotspot Shield Tray Service (HssTrayService) - Unknown owner - D:\Program Files\Hotspot Shield\bin\HssTrayService.EXE
    O23 - Service: BitDefender Desktop Update Service (LIVESRV) - BitDefender SRL - C:\Program Files\Common Files\BitDefender\BitDefender Update Service\livesrv.exe
    O23 - Service: BitDefender Virus Shield (VSSERV) - BitDefender S. R. L. - D:\Program Files\BitDefender 2009\vsserv.exe

    --
    End of file - 6062 bytes
     
  15. 2009/12/29
    broni

    broni Moderator Malware Analyst

    Joined:
    2002/08/01
    Messages:
    21,701
    Likes Received:
    116
    1. Please open Notepad
    • Click Start , then Run
    • Type notepad .exe in the Run Box.

    2. Now copy/paste the entire content of the codebox below into the Notepad window:

    Code:
    KillAll::
    
    mbr::
    
    

    3. Save the above as CFScript.txt

    4. Then drag the CFScript.txt into ComboFix.exe as depicted in the animation below. This will start ComboFix again.

    [​IMG]


    5. After reboot, (in case it asks to reboot), please post the following reports/logs into your next reply:
    • Combofix.txt
    • A new HijackThis log.
     
  16. 2009/12/29
    Amor

    Amor Inactive Thread Starter

    Joined:
    2009/01/13
    Messages:
    20
    Likes Received:
    0
    Hey Broni !, Please find theCombofix Log

    ComboFix 09-12-28.03 - Amor 12/29/2009 22:05:37.2.1 - x86
    Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.959.656 [GMT 3:00]
    Running from: c:\documents and settings\Amor\Desktop\ComboFix.exe
    Command switches used :: c:\documents and settings\Amor\Desktop\CFScript.txt
    AV: BitDefender Antivirus *On-access scanning disabled* (Updated) {6C4BB89C-B0ED-4F41-A29C-4373888923BB}
    .

    ((((((((((((((((((((((((( Files Created from 2009-11-28 to 2009-12-29 )))))))))))))))))))))))))))))))
    .

    2009-12-28 20:56 . 2009-12-28 20:56 52224 ----a-w- c:\documents and settings\Amor\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\SDDLLS\SD10005.dll
    2009-12-28 20:56 . 2009-12-28 20:56 117760 ----a-w- c:\documents and settings\Amor\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\SDDLLS\UIREPAIR.DLL
    2009-12-28 20:54 . 2009-12-28 20:54 -------- d-----w- c:\documents and settings\All Users\Application Data\SUPERAntiSpyware.com
    2009-12-28 20:54 . 2009-12-28 20:54 -------- d-----w- c:\documents and settings\Amor\Application Data\SUPERAntiSpyware.com
    2009-12-28 20:52 . 2009-12-28 20:52 -------- d-----w- c:\program files\Common Files\Wise Installation Wizard
    2009-12-27 04:49 . 2009-12-27 04:49 -------- d-----w- c:\windows\system32\wbem\Repository
    2009-12-25 20:48 . 2009-12-25 21:05 -------- d-----w- c:\program files\Microsoft Works
    2009-12-25 20:47 . 2009-12-25 20:47 -------- d-----w- c:\program files\MSBuild
    2009-12-25 20:19 . 2009-12-25 20:44 -------- d-----w- c:\windows\SHELLNEW
    2009-12-25 20:11 . 2009-12-25 20:11 -------- d-----r- C:\MSOCache
    2009-12-25 02:31 . 2009-12-25 02:31 -------- d-----w- C:\Hotspot Shield
    2009-12-24 17:46 . 2009-12-25 19:49 -------- d-----w- c:\windows\SxsCaPendDel
    2009-12-22 03:17 . 2009-12-22 03:17 -------- d-----w- c:\documents and settings\All Users\Application Data\nagasoft
    2009-12-22 03:17 . 2009-12-22 03:17 -------- d-----w- c:\documents and settings\Amor\Local Settings\Application Data\nagasoft
    2009-12-18 08:44 . 2009-11-21 15:51 471552 -c----w- c:\windows\system32\dllcache\aclayers.dll
    2009-12-17 19:40 . 2009-12-17 19:40 -------- d-----w- c:\documents and settings\LocalService\Local Settings\Application Data\nagasoft
    2009-12-17 06:35 . 2009-12-17 06:35 -------- d-----w- c:\documents and settings\Default User\Local Settings\Application Data\Microsoft Help
    2009-12-17 06:12 . 2009-12-17 06:13 -------- d-----w- c:\documents and settings\Amor\Application Data\Media Player Classic
    2009-12-17 04:06 . 2009-12-17 04:06 -------- d-----w- c:\documents and settings\NetworkService\Local Settings\Application Data\Google
    2009-12-17 04:02 . 2009-12-17 04:02 -------- d-----w- c:\documents and settings\LocalService\Local Settings\Application Data\Google
    2009-12-17 04:01 . 2009-12-17 04:01 -------- d-----w- c:\program files\Google
    2009-12-17 03:31 . 2009-12-17 03:31 -------- d-sh--w- c:\documents and settings\Amor\IECompatCache
    2009-12-17 03:23 . 2009-12-17 03:23 -------- d-sh--w- c:\documents and settings\Amor\PrivacIE
    2009-12-17 02:25 . 2009-12-17 03:17 -------- d-----w- c:\documents and settings\All Users\Application Data\WinZip
    2009-12-17 02:04 . 2009-12-28 10:49 -------- d-----w- c:\documents and settings\Amor\Application Data\vlc
    2009-12-17 01:56 . 2009-12-17 01:56 4844296 ----a-w- c:\documents and settings\All Users\Application Data\Malwarebytes\Malwarebytes' Anti-Malware\mbam-setup.exe
    2009-12-17 01:56 . 2009-12-17 01:56 -------- d-----w- c:\documents and settings\Amor\Application Data\Malwarebytes
    2009-12-17 01:56 . 2009-12-03 13:14 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
    2009-12-17 01:55 . 2009-12-17 01:55 -------- d-----w- c:\documents and settings\All Users\Application Data\Malwarebytes
    2009-12-17 01:55 . 2009-12-03 13:13 19160 ----a-w- c:\windows\system32\drivers\mbam.sys
    2009-12-17 01:49 . 2009-12-17 01:49 -------- d-----w- c:\documents and settings\Amor\Local Settings\Application Data\TVU Networks
    2009-12-17 01:49 . 2009-12-17 01:49 -------- d-----w- c:\documents and settings\All Users\Application Data\TVU Networks
    2009-12-17 01:49 . 2009-12-17 01:49 -------- d-----w- c:\documents and settings\Amor\LocalLow
    2009-12-17 01:46 . 2009-12-25 06:00 -------- d-----w- c:\windows\system32\Nagasoft
    2009-12-16 20:43 . 2009-12-29 19:19 81984 ----a-w- c:\windows\system32\bdod.bin
    2009-12-16 20:28 . 2009-12-16 20:28 -------- d-----w- c:\documents and settings\Amor\Application Data\BitDefender
    2009-12-16 20:27 . 2009-12-16 20:31 -------- d-----w- c:\documents and settings\All Users\Application Data\BitDefender
    2009-12-16 20:25 . 2009-12-16 20:28 -------- d-----w- c:\program files\Common Files\BitDefender
    2009-12-16 19:59 . 2009-08-06 16:23 215920 ----a-w- c:\windows\system32\muweb.dll
    2009-12-16 19:59 . 2009-08-06 16:23 274288 ----a-w- c:\windows\system32\mucltui.dll
    2009-12-16 19:04 . 2008-11-10 08:41 32656 ----a-w- c:\windows\system32\msonpmon.dll
    2009-12-16 19:04 . 2006-10-26 16:56 33104 ----a-w- c:\windows\system32\Spool\prtprocs\w32x86\msonpppr.dll
    2009-12-16 18:40 . 2009-12-16 18:40 -------- d-----w- c:\documents and settings\Amor\Local Settings\Application Data\Microsoft Help
    2009-12-16 18:38 . 2009-12-28 11:37 -------- d-----w- c:\documents and settings\All Users\Application Data\Microsoft Help
    2009-12-16 18:23 . 2009-12-16 18:23 -------- d-sh--w- c:\documents and settings\Amor\IETldCache
    2009-12-16 18:18 . 2009-10-29 07:45 12800 -c----w- c:\windows\system32\dllcache\xpshims.dll
    2009-12-16 18:18 . 2009-10-29 07:45 594432 -c----w- c:\windows\system32\dllcache\msfeeds.dll
    2009-12-16 18:18 . 2009-10-29 07:45 55296 -c----w- c:\windows\system32\dllcache\msfeedsbs.dll
    2009-12-16 18:18 . 2009-10-29 07:45 246272 -c----w- c:\windows\system32\dllcache\ieproxy.dll
    2009-12-16 18:18 . 2009-10-29 07:45 1985536 -c----w- c:\windows\system32\dllcache\iertutil.dll
    2009-12-16 18:18 . 2009-10-29 07:45 11069952 -c----w- c:\windows\system32\dllcache\ieframe.dll
    2009-12-16 18:17 . 2009-12-17 06:28 -------- d-----w- c:\windows\ie8updates
    2009-12-16 18:17 . 2009-10-02 04:44 92160 -c----w- c:\windows\system32\dllcache\iecompat.dll
    2009-12-16 18:15 . 2009-12-16 18:16 -------- dc-h--w- c:\windows\ie8
    2009-12-16 08:13 . 2009-12-16 08:13 -------- d-----w- c:\windows\system32\scripting
    2009-12-16 08:13 . 2009-12-16 08:13 -------- d-----w- c:\windows\l2schemas
    2009-12-16 08:13 . 2009-12-16 08:13 -------- d-----w- c:\windows\system32\en

    .
    (((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
    .
    2009-12-26 04:35 . 2009-12-16 06:37 69232 ----a-w- c:\documents and settings\Amor\Local Settings\Application Data\GDIPFONTCACHEV1.DAT
    2009-12-16 08:18 . 2009-12-16 04:28 86327 ----a-w- c:\windows\PCHealth\HelpCtr\OfflineCache\index.dat
    2009-12-16 06:52 . 2009-12-16 06:52 -------- d-----w- c:\program files\CONEXANT
    2009-12-16 05:19 . 2009-12-16 05:19 0 ----a-w- c:\windows\nsreg.dat
    2009-12-16 04:29 . 2009-12-16 04:29 -------- d-----w- c:\program files\microsoft frontpage
    2009-12-16 04:29 . 2009-12-16 04:29 2678 ----a-w- c:\windows\java\Packages\Data\3FJH3TRR.DAT
    2009-12-16 04:29 . 2009-12-16 04:29 558142 ----a-w- c:\windows\java\Packages\IUXJ7FP7.ZIP
    2009-12-16 04:29 . 2009-12-16 04:29 2678 ----a-w- c:\windows\java\Packages\Data\L3DV7RDZ.DAT
    2009-12-16 04:29 . 2009-12-16 04:29 2678 ----a-w- c:\windows\java\Packages\Data\NZNPFTB9.DAT
    2009-12-16 04:29 . 2009-12-16 04:29 2678 ----a-w- c:\windows\java\Packages\Data\LJLV7LJH.DAT
    2009-12-16 04:29 . 2009-12-16 04:29 2678 ----a-w- c:\windows\java\Packages\Data\DF9N9NHF.DAT
    2009-12-16 04:29 . 2009-12-16 04:29 155995 ----a-w- c:\windows\java\Packages\6CKESE1N.ZIP
    2009-12-16 04:24 . 2009-12-16 04:24 21640 ----a-w- c:\windows\system32\emptyregdb.dat
    2009-11-21 15:51 . 2002-08-29 20:00 471552 ----a-w- c:\windows\AppPatch\aclayers.dll
    2009-10-29 07:45 . 2002-08-29 20:00 916480 ------w- c:\windows\system32\wininet.dll
    2009-10-21 05:38 . 2004-08-04 07:56 75776 ----a-w- c:\windows\system32\strmfilt.dll
    2009-10-21 05:38 . 2004-08-04 07:56 25088 ----a-w- c:\windows\system32\httpapi.dll
    2009-10-20 16:20 . 2004-08-04 06:00 265728 ------w- c:\windows\system32\drivers\http.sys
    2009-10-16 07:50 . 2009-10-16 07:50 2520888 ----a-w- c:\documents and settings\Amor\Application Data\Mozilla\Firefox\Profiles\ojuttnoi.default\extensions\firefox@tvunetworks.com\plugins\npTVUAx.dll
    2009-10-13 10:30 . 2002-08-29 20:00 270336 ----a-w- c:\windows\system32\oakley.dll
    2009-10-12 13:38 . 2002-08-29 20:00 149504 ----a-w- c:\windows\system32\rastls.dll
    2009-10-12 13:38 . 2002-08-29 20:00 79872 ----a-w- c:\windows\system32\raschap.dll
    .

    ((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
    .
    .
    *Note* empty entries & legit default entries are not shown
    REGEDIT4

    [HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{F9E4A054-E9B1-4BC3-83A3-76A1AE736170}]
    2009-12-25 02:30 218160 ----a-w- d:\program files\Hotspot Shield\hssie\HssIE.dll

    [HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
    "swg "= "c:\program files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe" [2009-12-17 39408]

    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
    "CARPService "= "carpserv.exe" [2003-05-21 4608]
    "BDAgent "= "d:\program files\BitDefender 2009\bdagent.exe" [2009-12-16 782336]
    "BitDefender Antiphishing Helper "= "d:\program files\BitDefender 2009\IEShow.exe" [2009-02-23 69632]
    "GrooveMonitor "= "c:\program files\Microsoft Office\Office12\GrooveMonitor.exe" [2008-10-25 31072]

    [HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run]
    "CTFMON.EXE "= "c:\windows\System32\CTFMON.EXE" [2008-04-14 15360]

    [hkey_local_machine\software\microsoft\windows\currentversion\explorer\ShellExecuteHooks]
    "{5AE067D3-9AFB-48E0-853A-EBB7F4A000DA} "= "d:\program files\SASSEH.DLL" [2008-05-13 77824]

    [HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\!SASWinLogon]
    2009-09-03 11:21 548352 ----a-w- d:\program files\SASWINLO.dll

    [HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
    "%windir%\\system32\\sessmgr.exe "=
    "%windir%\\Network Diagnostic\\xpnetdiag.exe "=
    "d:\\Program Files\\TVUPlayer\\TVUPlayer.exe "=
    "d:\\Program Files\\SopCast\\adv\\SopAdver.exe "=
    "d:\\Program Files\\SopCast\\SopCast.exe "=
    "c:\\WINDOWS\\system32\\Nagasoft\\FFVJPlayer.exe "=
    "c:\\Program Files\\Microsoft Office\\Office12\\OUTLOOK.EXE "=
    "c:\\Program Files\\Microsoft Office\\Office12\\GROOVE.EXE "=
    "c:\\Program Files\\Microsoft Office\\Office12\\ONENOTE.EXE "=

    R1 SASDIFSV;SASDIFSV;d:\program files\sasdifsv.sys [12/16/2009 4:26 PM 9968]
    R1 SASKUTIL;SASKUTIL;d:\program files\SASKUTIL.SYS [12/16/2009 4:26 PM 74480]
    R3 ALiIRDA;ALi Infrared Device Driver;c:\windows\system32\drivers\alifir.sys [12/16/2009 10:18 AM 26624]
    R3 bdfm;BDFM;c:\windows\system32\drivers\bdfm.sys [9/18/2008 12:09 PM 111112]
    S2 gupdate;Google Update Service (gupdate);c:\program files\Google\Update\GoogleUpdate.exe [12/17/2009 7:01 AM 135664]
    S3 Arrakis3;BitDefender Arrakis Server;c:\program files\Common Files\BitDefender\BitDefender Arrakis Server\bin\Arrakis3.exe [1/20/2009 7:16 PM 172032]
    S3 SASENUM;SASENUM;d:\program files\SASENUM.SYS [12/16/2009 4:27 PM 7408]

    [HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\svchost]
    bdx REG_MULTI_SZ scan
    vvdsvc REG_MULTI_SZ vvdsvc
    .
    ------- Supplementary Scan -------
    .
    uStart Page = hxxp://www.themoscowtimes.com/
    IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~2\Office12\EXCEL.EXE/3000
    IE: Google Sidewiki... - c:\program files\Google\Google Toolbar\Component\GoogleToolbarDynamic_mui_en_5F1A57F0B9B89E2E.dll/cmsidewiki.html
    TCP: {2029C8D4-C8B7-46FA-96BA-AB6D6105020F} = 212.188.4.10,195.34.32.116
    DPF: DirectAnimation Java Classes - file://c:\windows\Java\classes\dajava.cab
    DPF: Microsoft XML Parser for Java - file://c:\windows\Java\classes\xmldso.cab
    FF - ProfilePath - c:\documents and settings\Amor\Application Data\Mozilla\Firefox\Profiles\ojuttnoi.default\
    FF - prefs.js: browser.startup.homepage - www.samachar.com
    FF - component: d:\program files\components\FFComm.dll
    FF - plugin: c:\documents and settings\Amor\Application Data\Mozilla\Firefox\Profiles\ojuttnoi.default\extensions\firefox@tvunetworks.com\plugins\npTVUAx.dll
    FF - plugin: c:\program files\Google\Update\1.2.183.13\npGoogleOneClick8.dll
    FF - plugin: d:\program files\VLC\npvlc.dll
    .

    **************************************************************************

    catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
    Rootkit scan 2009-12-29 22:21
    Windows 5.1.2600 Service Pack 3 NTFS

    scanning hidden processes ...

    scanning hidden autostart entries ...

    scanning hidden files ...

    scan completed successfully
    hidden files: 0

    **************************************************************************

    Stealth MBR rootkit/Mebroot/Sinowal detector 0.3.7 by Gmer, http://www.gmer.net

    device: opened successfully
    user: MBR read successfully
    called modules: ntoskrnl.exe CLASSPNP.SYS disk.sys >>UNKNOWN [0xF78EBBD4]<<
    kernel: MBR read successfully
    detected MBR rootkit hooks:
    \Driver\Disk -> CLASSPNP.SYS @ 0xf7605f28
    \Driver\ACPI -> ACPI.sys @ 0xf7558cb8
    \Driver\atapi -> atapi.sys @ 0xf74cc852
    IoDeviceObjectType -> DeleteProcedure -> ntoskrnl.exe @ 0x805a05a9
    ParseProcedure -> ntoskrnl.exe @ 0x8056ea15
    \Device\Harddisk0\DR0 -> DeleteProcedure -> ntoskrnl.exe @ 0x805a05a9
    ParseProcedure -> ntoskrnl.exe @ 0x8056ea15
    NDIS: -> SendCompleteHandler -> 0x0
    PacketIndicateHandler -> 0x0
    SendHandler -> 0x0
    user & kernel MBR OK

    **************************************************************************
    .
    --------------------- DLLs Loaded Under Running Processes ---------------------

    - - - - - - - > 'winlogon.exe'(880)
    d:\program files\SASWINLO.dll
    c:\windows\system32\WININET.dll

    - - - - - - - > 'explorer.exe'(1732)
    c:\windows\system32\WININET.dll
    c:\windows\WinSxS\x86_Microsoft.VC80.CRT_1fc8b3b9a1e18e3b_8.0.50727.762_x-ww_6b128700\MSVCR80.dll
    c:\windows\system32\ieframe.dll
    c:\windows\system32\webcheck.dll
    c:\windows\system32\hnetcfg.dll
    aekgoprn.dll 10000000 49152 \\.\70.103.101.103\aekgoprn.dll
    .
    ------------------------ Other Running Processes ------------------------
    .
    d:\program files\Hotspot Shield\bin\openvpnas.exe
    d:\program files\Hotspot Shield\HssWPR\hsssrv.exe
    c:\windows\system32\wscntfy.exe
    c:\windows\system32\carpserv.exe
    .
    **************************************************************************
    .
    Completion time: 2009-12-29 22:30:35 - machine was rebooted
    ComboFix-quarantined-files.txt 2009-12-29 19:30
    ComboFix2.txt 2009-12-29 07:47

    Pre-Run: 145,747,095,552 bytes free
    Post-Run: 145,748,574,208 bytes free

    - - End Of File - - F0CAA19E890EEC53FCD406D631F3B794
     
  17. 2009/12/29
    Amor

    Amor Inactive Thread Starter

    Joined:
    2009/01/13
    Messages:
    20
    Likes Received:
    0
    Hi Broni, Please find the Hijack This Log

    Logfile of Trend Micro HijackThis v2.0.2
    Scan saved at 10:38:52 PM, on 12/29/2009
    Platform: Windows XP SP3 (WinNT 5.01.2600)
    MSIE: Internet Explorer v8.00 (8.00.6001.18702)
    Boot mode: Normal

    Running processes:
    C:\WINDOWS\System32\smss.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\services.exe
    C:\WINDOWS\system32\lsass.exe
    C:\WINDOWS\system32\svchost.exe
    C:\Program Files\Common Files\BitDefender\BitDefender Update Service\livesrv.exe
    D:\Program Files\BitDefender 2009\vsserv.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\system32\spoolsv.exe
    C:\WINDOWS\Explorer.EXE
    C:\WINDOWS\system32\carpserv.exe
    D:\Program Files\BitDefender 2009\bdagent.exe
    C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe
    C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe
    D:\Program Files\Hotspot Shield\bin\openvpnas.exe
    D:\Program Files\Hotspot Shield\HssWPR\hsssrv.exe
    C:\WINDOWS\system32\wuauclt.exe
    C:\WINDOWS\system32\wscntfy.exe
    D:\Program Files\HijackThis.exe

    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.themoscowtimes.com/
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
    R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
    O2 - BHO: Groove GFS Browser Helper - {72853161-30C5-4D22-B7F9-0BBC1D38A37E} - C:\Program Files\Microsoft Office\Office12\GrooveShellExtensions.dll
    O2 - BHO: Google Toolbar Helper - {AA58ED58-01DD-4d91-8333-CF10577473F7} - C:\Program Files\Google\Google Toolbar\GoogleToolbar_32.dll
    O2 - BHO: Google Toolbar Notifier BHO - {AF69DE43-7D58-4638-B6FA-CE66B5AD205D} - C:\Program Files\Google\GoogleToolbarNotifier\5.5.4723.1820\swg.dll
    O2 - BHO: Hotspot Shield Class - {F9E4A054-E9B1-4BC3-83A3-76A1AE736170} - D:\Program Files\Hotspot Shield\hssie\HssIE.dll
    O3 - Toolbar: BitDefender Toolbar - {381FFDE8-2394-4f90-B10D-FC6124A40F8C} - D:\Program Files\BitDefender 2009\IEToolbar.dll
    O3 - Toolbar: Google Toolbar - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - C:\Program Files\Google\Google Toolbar\GoogleToolbar_32.dll
    O4 - HKLM\..\Run: [CARPService] carpserv.exe
    O4 - HKLM\..\Run: [BDAgent] "D:\Program Files\BitDefender 2009\bdagent.exe "
    O4 - HKLM\..\Run: [BitDefender Antiphishing Helper] "D:\Program Files\BitDefender 2009\IEShow.exe "
    O4 - HKLM\..\Run: [GrooveMonitor] "C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe "
    O4 - HKCU\..\Run: [swg] "C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe "
    O4 - HKUS\S-1-5-18\..\Run: [CTFMON.EXE] C:\WINDOWS\System32\CTFMON.EXE (User 'SYSTEM')
    O4 - HKUS\.DEFAULT\..\Run: [CTFMON.EXE] C:\WINDOWS\System32\CTFMON.EXE (User 'Default user')
    O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\Office12\EXCEL.EXE/3000
    O8 - Extra context menu item: Google Sidewiki... - res://C:\Program Files\Google\Google Toolbar\Component\GoogleToolbarDynamic_mui_en_5F1A57F0B9B89E2E.dll/cmsidewiki.html
    O9 - Extra button: Send to OneNote - {2670000A-7350-4f3c-8081-5663EE0C6C49} - C:\PROGRA~1\MICROS~2\Office12\ONBttnIE.dll
    O9 - Extra 'Tools' menuitem: S&end to OneNote - {2670000A-7350-4f3c-8081-5663EE0C6C49} - C:\PROGRA~1\MICROS~2\Office12\ONBttnIE.dll
    O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\Office12\REFIEBAR.DLL
    O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
    O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
    O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} (WUWebControl Class) - http://update.microsoft.com/windowsupdate/v6/V5Controls/en/x86/client/wuweb_site.cab?1260938856913
    O16 - DPF: {D4003189-95B1-4A2F-9A87-F2B03665960D} (VodClient Control Class) - http://vexcast.com/download/vexcast.cab
    O17 - HKLM\System\CCS\Services\Tcpip\..\{2029C8D4-C8B7-46FA-96BA-AB6D6105020F}: NameServer = 212.188.4.10,195.34.32.116
    O18 - Protocol: grooveLocalGWS - {88FED34C-F0CA-4636-A375-3CB6248B04CD} - C:\Program Files\Microsoft Office\Office12\GrooveSystemServices.dll
    O20 - Winlogon Notify: !SASWinLogon - D:\Program Files\SASWINLO.dll
    O23 - Service: BitDefender Arrakis Server (Arrakis3) - Unknown owner - C:\Program Files\Common Files\BitDefender\BitDefender Arrakis Server\bin\Arrakis3.exe
    O23 - Service: Google Update Service (gupdate) (gupdate) - Google Inc. - C:\Program Files\Google\Update\GoogleUpdate.exe
    O23 - Service: Google Software Updater (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
    O23 - Service: Hotspot Shield Service (HotspotShieldService) - Unknown owner - D:\Program Files\Hotspot Shield\bin\openvpnas.exe
    O23 - Service: Hotspot Shield Routing Service (HssSrv) - AnchorFree Inc. - D:\Program Files\Hotspot Shield\HssWPR\hsssrv.exe
    O23 - Service: Hotspot Shield Tray Service (HssTrayService) - Unknown owner - D:\Program Files\Hotspot Shield\bin\HssTrayService.EXE
    O23 - Service: BitDefender Desktop Update Service (LIVESRV) - BitDefender SRL - C:\Program Files\Common Files\BitDefender\BitDefender Update Service\livesrv.exe
    O23 - Service: BitDefender Virus Shield (VSSERV) - BitDefender S. R. L. - D:\Program Files\BitDefender 2009\vsserv.exe

    --
    End of file - 5879 bytes
     
  18. 2009/12/29
    broni

    broni Moderator Malware Analyst

    Joined:
    2002/08/01
    Messages:
    21,701
    Likes Received:
    116
    Uninstall Combofix:
    Go Start > Run [Vista users, go Start> "Start search"]
    Type in:
    Combofix /Uninstall
    Note the space between the "Combofix" and the "/Uninstall "
    Restart computer.


    Print these instructions out.

    NOTE. If any of the programs listed below refuse to run, try renaming executive file to something else; for instance, rename hijackthis.exe to scanner.exe

    ***VERY IMPORTANT! Make sure, you update Superantispyware, and Malwarebytes before running the scans.***

    STEP 1. Download SUPERAntiSpyware Free for Home Users:
    http://www.superantispyware.com/

    * Double-click SUPERAntiSpyware.exe and use the default settings for installation.
    * An icon will be created on your desktop. Double-click that icon to launch the program.
    * If asked to update the program definitions, click "Yes ". If not, update the definitions before scanning by selecting "Check for Updates ". (If you encounter any problems while downloading the updates, manually download and unzip them from here: http://www.superantispyware.com/definitions.html.)
    * Close SUPERAntiSpyware.

    PHYSICALLY DISCONNECT FROM THE INTERNET

    Restart computer in Safe Mode.
    To enter Safe Mode, restart computer, and keep tapping F8 key, until menu appears; select Safe Mode; you'll see "Safe Mode" in all four corners of your screen

    * Open SUPERAntiSpyware.
    * Click Scan your Computer... button.
    * Click Scanning Preferences/Control Center... button.
    * Under General and Startup tab, make sure, Start SUPERAntiSpyware when Windows starts option is UN-checked.
    * Click the Scanning Control tab.
    * Under Scanner Options make sure the following are checked (leave all others unchecked):
    - Close browsers before scanning.
    - Terminate memory threats before quarantining.

    * Click the Close button to leave the control center screen.
    * On the left, make sure you check C:\Fixed Drive.
    * On the right, choose Perform Complete Scan.
    * Click Next to start the scan. Please be patient while it scans your computer.
    * After the scan is complete, a Scan Summary box will appear with potentially harmful items that were detected. Click OK.
    * Make sure everything has a checkmark next to it and click Next.
    * A notification will appear that Quarantine and Removal is Complete. Click OK and then click the Finish button to return to the main menu.
    * If asked if you want to reboot, click Yes.
    * To retrieve the removal information after reboot, launch SUPERAntispyware again.
    - Click Preferences, then click the Statistics/Logs tab.
    - Under Scanner Logs, double-click SUPERAntiSpyware Scan Log.
    - If there are several logs, click the current dated log and press View log. A text file will open in your default text editor.
    - Please copy and paste the Scan Log results in your next reply.

    * Click Close to exit the program.
    Post SUPERAntiSpyware log.

    RECONNECT TO THE INTERNET

    RESTART COMPUTER!

    STEP 2. Download Malwarebytes' Anti-Malware: http://www.malwarebytes.org/mbam.php to your desktop.
    (Malwarebytes is free to use as a manual scanner. Payment is only required if you wish to have it run and update automatically which is not necessary for our purposes)

    * Double-click mbam-setup.exe and follow the prompts to install the program.
    * At the end, be sure a checkmark is placed next to Update Malwarebytes' Anti-Malware and Launch Malwarebytes' Anti-Malware, then click Finish.
    * If an update is found, it will download and install the latest version.
    * Once the program has loaded, select Perform full scan, then click Scan.
    * When the scan is complete, click OK, then Show Results to view the results.
    * Be sure that everything is checked, and click Remove Selected.
    * When completed, a log will open in Notepad.
    * Post the log back here.

    The log can also be found here:
    C:\Documents and Settings\Username\Application Data\Malwarebytes\Malwarebytes' Anti-Malware\Logs\log-date.txt
    Or at C:\Program Files\Malwarebytes' Anti-Malware\Logs\log-date.txt

    RESTART COMPUTER!

    STEP 3.
    Post fresh HijackThis log.
    NOTE. If you're using Vista, right click on HijackThis, and click Run as Administrator
    Do NOT attempt to "fix" anything!


    DO NOT make any other changes to your computer (like installing programs, using other cleaning tools, etc.), until it's officially declared clean!!!
     
  19. 2009/12/29
    Amor

    Amor Inactive Thread Starter

    Joined:
    2009/01/13
    Messages:
    20
    Likes Received:
    0
    Thanks Broni, the previous time i tried running the Super Anti Spyware in the Safe MODE, ( Will change its name this time though )

    I got a windows installer error. SO ran it in the usal mode ( *Forgot telling U that)

    Just noted a thing, i have the BD' 09 Anti virus turned off but **** thing pops up again during the Combo Fix uninstall ( It also popped during the COMO FIx previous run) I think i'll need to reinstall wiNdowS, if the damned Viruses have leeway still, not a big trouble as i have Windows on C and All Docs snd Programs on D with a backup on Google Docs.

    Will Get back to you after i try all your instructions.:)
     
    Last edited: 2009/12/30
  20. 2009/12/29
    broni

    broni Moderator Malware Analyst

    Joined:
    2002/08/01
    Messages:
    21,701
    Likes Received:
    116
    Ok...
     
  21. 2009/12/29
    Amor

    Amor Inactive Thread Starter

    Joined:
    2009/01/13
    Messages:
    20
    Likes Received:
    0
    Hey Broni, the Super Anti Spyware ran this time in the safe mode !

    here's the Log

    SUPERAntiSpyware Scan Log
    http://www.superantispyware.com

    Generated 12/30/2009 at 04:15 AM

    Application Version : 4.32.1000

    Core Rules Database Version : 4421
    Trace Rules Database Version: 2247

    Scan type : Complete Scan
    Total Scan Time : 01:47:28

    Memory items scanned : 253
    Memory threats detected : 0
    Registry items scanned : 4456
    Registry threats detected : 0
    File items scanned : 47173
    File threats detected : 0


    will come back to you with the Malware Scan Log, one Q for U, After the GMER scan i thought we have nailed the trojan generic viruses, something else here ?, that we yet can't delete it, plz enlighten me on this ? :)
     
    Last edited: 2009/12/29

Share This Page

  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.