1. You are viewing our forum as a guest. For full access please Register. WindowsBBS.com is completely free, paid for by advertisers and donations.

[Non-curable - Virut] Unable to acces Microsoft.com or vaildate vista

Discussion in 'Malware and Virus Removal Archive' started by Aussieboy, 2009/05/16.

  1. 2009/05/16
    Aussieboy

    Aussieboy Inactive Thread Starter

    Joined:
    2009/05/16
    Messages:
    23
    Likes Received:
    0
    Hi ,

    I am currently have problems with my Acer laptop , just seeing if i can get it fixed without having to go out and buy a vista install disc to reform.

    My problems are :
    - Unable to access Microsoft.com sites in either IE or firefox
    - A message pops up occasional saying that my version of vista might be counterfeit ( which it ISN'T )
    - No control panel at all , no icon and the folder (the whole control pannel) rarely opens
    -cannot update vista using the update program.
    -My computer's background only shows one colour and not the image that it should be
    -this might be unrelated but Some online games are having problems with validating the versions of themselves (warcraft 3 , gunbound , FlyFF )

    What i have done so far :
    - i had spybot search and destroy on previous these problems
    - Done a scan with combofix in safemode (no log)
    - Installed Malwarebytes' Anti-Malware , scaned and fixed (2 logs)
    - Installed Adware remover , scaned and fixed (no log)

    Please help me out there , i am unless at this type of computer work and need this laptop bad for my uni work.

    These are the logs that i have : In Order hijackthis log , DDS log, 2 Malwares logs

    Logfile of Trend Micro HijackThis v2.0.2
    Scan saved at 8:39:56 AM, on 17/05/2009
    Platform: Windows Vista (WinNT 6.00.1904)
    MSIE: Internet Explorer v7.00 (7.00.6000.16764)
    Boot mode: Normal

    Running processes:
    C:\Windows\SYSTEM32\WISPTIS.EXE
    C:\Windows\system32\taskeng.exe
    C:\Windows\system32\Dwm.exe
    C:\Windows\Explorer.EXE
    C:\Program Files\Apoint2K\Apoint.exe
    C:\Windows\System32\igfxpers.exe
    C:\Windows\system32\igfxsrvc.exe
    C:\Program Files\Apoint2K\ApMsgFwd.exe
    C:\Program Files\Apoint2K\Apntex.exe
    C:\Program Files\Mozilla Firefox\firefox.exe
    C:\Windows\system32\taskmgr.exe
    C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

    R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = http://au.rd.yahoo.com/customize/ycomp/defaults/sp/*http://au.yahoo.com
    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.da-forums.org/index.php
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
    R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://en.au.acer.yahoo.com
    R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant =
    R0 - HKLM\Software\Microsoft\Internet Explorer\Search,CustomizeSearch =
    R1 - HKCU\Software\Microsoft\Internet Explorer\SearchURL,(Default) = http://au.rd.yahoo.com/customize/ycomp/defaults/su/*http://au.yahoo.com
    R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = *.local
    R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName =
    R3 - URLSearchHook: Winamp Search Class - {57BCA5FA-5DBB-45a2-B558-1755C3F6253B} - C:\Program Files\Winamp Toolbar\winamptb.dll
    R3 - URLSearchHook: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\Program Files\Yahoo!\Companion\Installs\cpn\yt.dll
    O1 - Hosts: 63.119.44.200 www.plazatwin.com
    O2 - BHO: Windows Live Toolbar Helper - {BDBD1DAD-C946-4A17-ADC1-64B5B4FF55D0} - C:\Program Files\Windows Live Toolbar\msntb.dll
    O3 - Toolbar: Acer eDataSecurity Management - {5CBE3B7C-1E47-477e-A7DD-396DB0476E29} - C:\Windows\system32\eDStoolbar.dll
    O3 - Toolbar: Show Norton Toolbar - {90222687-F593-4738-B738-FBEE9C7B26DF} - C:\Program Files\Common Files\Symantec Shared\coShared\Browser\1.0\UIBHO.dll
    O3 - Toolbar: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\Program Files\Yahoo!\Companion\Installs\cpn\yt.dll
    O3 - Toolbar: Windows Live Toolbar - {BDAD1DAD-C946-4A17-ADC1-64B5B4FF55D0} - C:\Program Files\Windows Live Toolbar\msntb.dll
    O3 - Toolbar: Winamp Toolbar - {EBF2BA02-9094-4c5a-858B-BB198F3D8DE2} - C:\Program Files\Winamp Toolbar\winamptb.dll
    O3 - Toolbar: BearShare MediaBar - {D3DEE18F-DB64-4BEB-9FF1-E1F0A5033E4A} - C:\Program Files\BearShare Applications\BearShare MediaBar\BearShareMediaBar.dll
    O3 - Toolbar: &Google Toolbar - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - C:\Program Files\Google\Google Toolbar\GoogleToolbar.dll
    O4 - HKLM\..\Run: [Apoint] C:\Program Files\Apoint2K\Apoint.exe
    O4 - HKLM\..\Run: [Persistence] C:\Windows\system32\igfxpers.exe
    O4 - HKLM\..\Run: [svchost.exe] "C:\Windows\system32\3361\SVCHOST.exe "
    O4 - HKLM\..\RunOnce: [svchost.exe] "C:\Windows\system32\3361\SVCHOST.exe "
    O4 - HKCU\..\Run: [SpybotSD TeaTimer] C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
    O4 - HKCU\..\Run: [uTorrent] "C:\Program Files\uTorrent\uTorrent.exe "
    O4 - HKUS\S-1-5-18\..\Run: [svc] c:\program Files\ThunMail\testabd.exe (User 'SYSTEM')
    O4 - HKUS\.DEFAULT\..\Run: [svc] c:\program Files\ThunMail\testabd.exe (User 'Default user')
    O8 - Extra context menu item: &Winamp Search - C:\ProgramData\Winamp Toolbar\ieToolbar\resources\en-US\local\search.html
    O8 - Extra context menu item: &Windows Live Search - res://C:\Program Files\Windows Live Toolbar\msntb.dll/search.htm
    O8 - Extra context menu item: Add to Windows &Live Favorites - http://favorites.live.com/quickadd.aspx
    O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\Office12\EXCEL.EXE/3000
    O9 - Extra button: Send to OneNote - {2670000A-7350-4f3c-8081-5663EE0C6C49} - C:\PROGRA~1\MICROS~2\Office12\ONBttnIE.dll
    O9 - Extra 'Tools' menuitem: S&end to OneNote - {2670000A-7350-4f3c-8081-5663EE0C6C49} - C:\PROGRA~1\MICROS~2\Office12\ONBttnIE.dll
    O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\Office12\REFIEBAR.DLL
    O9 - Extra button: (no name) - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
    O9 - Extra 'Tools' menuitem: Spybot - Search & Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
    O13 - Gopher Prefix:
    O18 - Protocol: grooveLocalGWS - {88FED34C-F0CA-4636-A375-3CB6248B04CD} - C:\Program Files\Microsoft Office\Office12\GrooveSystemServices.dll
    O22 - SharedTaskScheduler: jso8joigm409gopgmrlgd - {B2BA40A2-74F0-42BD-F434-12345A2C8953} - (no file)
    O23 - Service: @%SystemRoot%\system32\Alg.exe,-112 (ALG) - Unknown owner - C:\Windows\System32\alg.exe (file missing)
    O23 - Service: Automatic LiveUpdate Scheduler - Symantec Corporation - C:\Program Files\Symantec\LiveUpdate\ALUSchedulerSvc.exe
    O23 - Service: Symantec Event Manager (ccEvtMgr) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccSvcHst.exe
    O23 - Service: Symantec Settings Manager (ccSetMgr) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccSvcHst.exe
    O23 - Service: Dhcp server (DhcpSrv) - Unknown owner - C:\Windows\dhcp\svchost.exe
    O23 - Service: eDataSecurity Service - Unknown owner - C:\Acer\Empowering Technology\eDataSecurity\eDSService.exe (file missing)
    O23 - Service: MobilityService - Unknown owner - C:\Acer\Mobility Center\MobilityService.exe
    O23 - Service: nProtect GameGuard Service (npggsvc) - Unknown owner - C:\Windows\system32\GameMon.des.exe (file missing)
    O23 - Service: sopidkc Service (sopidkc) - 11.231.223.21 - C:\Windows\system32\sopidkc.exe
    O23 - Service: @%ProgramFiles%\Windows Media Player\wmpnetwk.exe,-101 (WMPNetworkSvc) - Unknown owner - C:\Program Files\Windows Media Player\wmpnetwk.exe (file missing)
    O23 - Service: @%systemroot%\system32\SearchIndexer.exe,-103 (WSearch) - Unknown owner - C:\Windows\system32\SearchIndexer.exe (file missing)
    O23 - Service: XAudioService - Unknown owner - C:\Windows\system32\DRIVERS\xaudio.exe (file missing)

    --
    End of file - 6641 bytes


    DDS (Ver_09-05-14.01) - NTFSx86
    Run by Adam at 8:43:02.95 on Sun 17/05/2009
    Internet Explorer: 7.0.6000.16764 BrowserJavaVersion: 1.6.0_13
    Microsoft® Windows Vistaâ„¢ Home Basic 6.0.6000.0.1252.61.1033.18.2549.1625 [GMT 10:00]

    AV: Norton Internet Security *On-access scanning disabled* (Outdated) {E10A9785-9598-4754-B552-92431C1C35F8}
    SP: Lavasoft Ad-Watch Live! *disabled* (Updated) {67844DAE-4F77-4D69-9457-98E8CFFDAA22}
    SP: Windows Defender *enabled* (Outdated) {D68DDC3A-831F-4FAE-9E44-DA132C1ACF46}
    SP: Norton Internet Security *disabled* (Outdated) {CBB7EE13-8244-4DAB-8B55-D5C7AA91E59A}
    FW: Norton Internet Security *disabled* {7C21A4C9-F61F-4AC4-B722-A6E19C16F220}

    ============== Running Processes ===============

    C:\Windows\system32\wininit.exe
    C:\Windows\system32\lsm.exe
    C:\Windows\system32\svchost.exe -k DcomLaunch
    C:\Windows\system32\svchost.exe -k rpcss
    C:\Windows\System32\svchost.exe -k secsvcs
    C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted
    C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted
    C:\Windows\system32\svchost.exe -k netsvcs
    C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\svchost.exe -k LocalService
    C:\Windows\SYSTEM32\WISPTIS.EXE
    C:\Windows\system32\svchost.exe -k NetworkService
    C:\Program Files\Common Files\Symantec Shared\ccSvcHst.exe
    C:\Windows\System32\spoolsv.exe
    C:\Windows\system32\svchost.exe -k LocalServiceNoNetwork
    C:\Windows\SYSTEM32\WISPTIS.EXE
    C:\Windows\system32\taskeng.exe
    C:\Windows\system32\Dwm.exe
    C:\Windows\Explorer.EXE
    C:\Program Files\Apoint2K\Apoint.exe
    C:\Windows\System32\igfxpers.exe
    C:\Windows\system32\igfxsrvc.exe
    C:\Program Files\Symantec\LiveUpdate\ALUSchedulerSvc.exe
    C:\Acer\Mobility Center\MobilityService.exe
    C:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted
    C:\Windows\system32\svchost.exe -k imgsvc
    C:\Windows\system32\taskeng.exe
    C:\Program Files\Apoint2K\ApMsgFwd.exe
    C:\Program Files\Apoint2K\Apntex.exe
    C:\Windows\TEMP\VRT671B.tmp
    c:\program Files\ThunMail\testabd.exe
    C:\Windows\system32\w.exe
    C:\Windows\dhcp\svchost.exe
    C:\Windows\system32\svchost.exe -k netsvcs
    C:\Windows\system32\sopidkc.exe
    C:\Program Files\Mozilla Firefox\firefox.exe
    C:\Windows\system32\taskmgr.exe
    C:\Program Files\Trend Micro\HijackThis\HijackThis.exe
    C:\Windows\system32\NOTEPAD.EXE
    C:\Windows\system32\dncyool64.sys
    C:\Users\Adam\Downloads\dds.scr
    C:\Windows\system32\conime.exe
    C:\Windows\system32\wbem\wmiprvse.exe

    ============== Pseudo HJT Report ===============

    uStart Page = hxxp://www.da-forums.org/index.php
    uSEARCH PAGE = hxxp://au.rd.yahoo.com/customize/ycomp/defaults/sp/*http://au.yahoo.com
    uSearchMigratedDefaultURL = hxxp://search.yahoo.com/search?p={searchTerms}&ei=utf-8&fr=b1ie7
    mStart Page = hxxp://en.au.acer.yahoo.com
    uInternet Settings,ProxyOverride = *.local
    uSearchURL,(Default) = hxxp://au.rd.yahoo.com/customize/ycomp/defaults/su/*http://au.yahoo.com
    uURLSearchHooks: Winamp Search Class: {57bca5fa-5dbb-45a2-b558-1755c3f6253b} - c:\program files\winamp toolbar\winamptb.dll
    uURLSearchHooks: Yahoo! Toolbar: {ef99bd32-c1fb-11d2-892f-0090271d4f88} - c:\program files\yahoo!\companion\installs\cpn\yt.dll
    mURLSearchHooks: Winamp Search Class: {57bca5fa-5dbb-45a2-b558-1755c3f6253b} - c:\program files\winamp toolbar\winamptb.dll
    BHO: Windows Live Toolbar Helper: {bdbd1dad-c946-4a17-adc1-64b5b4ff55d0} - c:\program files\windows live toolbar\msntb.dll
    BHO: 1 (0x1) - No File
    TB: Acer eDataSecurity Management: {5cbe3b7c-1e47-477e-a7dd-396db0476e29} - c:\windows\system32\eDStoolbar.dll
    TB: Show Norton Toolbar: {90222687-f593-4738-b738-fbee9c7b26df} - c:\program files\common files\symantec shared\coshared\browser\1.0\UIBHO.dll
    TB: Yahoo! Toolbar: {ef99bd32-c1fb-11d2-892f-0090271d4f88} - c:\program files\yahoo!\companion\installs\cpn\yt.dll
    TB: Windows Live Toolbar: {bdad1dad-c946-4a17-adc1-64b5b4ff55d0} - c:\program files\windows live toolbar\msntb.dll
    TB: Winamp Toolbar: {ebf2ba02-9094-4c5a-858b-bb198f3d8de2} - c:\program files\winamp toolbar\winamptb.dll
    TB: BearShare MediaBar: {d3dee18f-db64-4beb-9ff1-e1f0a5033e4a} - c:\program files\bearshare applications\bearshare mediabar\BearShareMediaBar.dll
    TB: &Google Toolbar: {2318c2b1-4965-11d4-9b18-009027a5cd4f} - c:\program files\google\google toolbar\GoogleToolbar.dll
    uRun: [SpybotSD TeaTimer] c:\program files\spybot - search & destroy\TeaTimer.exe
    uRun: [uTorrent] "c:\program files\utorrent\uTorrent.exe "
    mRun: [Apoint] c:\program files\apoint2k\Apoint.exe
    mRun: [Persistence] c:\windows\system32\igfxpers.exe
    mRun: [svchost.exe] "c:\windows\system32\3361\SVCHOST.exe "
    mRunOnce: [svchost.exe] "c:\windows\system32\3361\SVCHOST.exe "
    dRun: [svc] c:\program files\thunmail\testabd.exe
    uPolicies-explorer: NoStartMenuMyGames = 0 (0x0)
    uPolicies-explorer: NoCommonGroups = 0 (0x0)
    uPolicies-explorer: NoSimpleStartMenu = 0 (0x0)
    uPolicies-explorer: NoDFSTab = 0 (0x0)
    uPolicies-explorer: NoFileAssociate = 0 (0x0)
    uPolicies-explorer: NoChangeAnimation = 0 (0x0)
    uPolicies-explorer: RestrictWelcomeCenter = 0 (0x0)
    mPolicies-explorer: NoSMMyPictures = 0 (0x0)
    mPolicies-explorer: NoStartMenuMyMusic = 0 (0x0)
    mPolicies-system: EnableLUA = 0 (0x0)
    IE: &Winamp Search - c:\programdata\winamp toolbar\ietoolbar\resources\en-us\local\search.html
    IE: &Windows Live Search - c:\program files\windows live toolbar\msntb.dll/search.htm
    IE: Add to Windows &Live Favorites - http://favorites.live.com/quickadd.aspx
    IE: Download all with Free Download Manager
    IE: Download selected with Free Download Manager
    IE: Download video with Free Download Manager
    IE: Download with Free Download Manager
    IE: E&xport to Microsoft Excel - c:\progra~1\micros~2\office12\EXCEL.EXE/3000
    IE: {2670000A-7350-4f3c-8081-5663EE0C6C49} - {48E73304-E1D6-4330-914C-F5F514E3486C} - c:\progra~1\micros~2\office12\ONBttnIE.dll
    IE: {92780B25-18CC-41C8-B9BE-3C9C571A8263} - {FF059E31-CC5A-4E2E-BF3B-96E929D65503} - c:\progra~1\micros~2\office12\REFIEBAR.DLL
    IE: {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - {53707962-6F74-2D53-2644-206D7942484F} - c:\progra~1\spybot~1\SDHelper.dll
    DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_13-windows-i586.cab
    DPF: {CAFEEFAC-0016-0000-0005-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_05-windows-i586.cab
    DPF: {CAFEEFAC-0016-0000-0013-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_13-windows-i586.cab
    DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_13-windows-i586.cab
    Handler: belarc - {6318E0AB-2E93-11D1-B8ED-00608CC9A71F} - c:\program files\belarc\advisor\system\BAVoilaX.dll
    Handler: grooveLocalGWS - {88FED34C-F0CA-4636-A375-3CB6248B04CD} - c:\program files\microsoft office\office12\GrooveSystemServices.dll
    Notify: igfxcui - igfxdev.dll
    STS: {B2BA40A2-74F0-42BD-F434-12345A2C8953} - No File
    SEH: Groove GFS Stub Execution Hook: {b5a7f190-dda6-4420-b3ba-52453494e6cd} - c:\program files\microsoft office\office12\GrooveShellExtensions.dll

    ================= FIREFOX ===================

    FF - ProfilePath - c:\users\adam\appdata\roaming\mozilla\firefox\profiles\m61pjhvd.default\
    FF - plugin: c:\program files\mozilla firefox\plugins\npPandoWebInst.dll

    ============= SERVICES / DRIVERS ===============

    R2 DhcpSrv;Dhcp server;c:\windows\dhcp\svchost.exe [2009-5-11 239616]
    R2 msncache;msncache;c:\windows\system32\svchost.exe -k netsvcs [2006-11-2 22016]
    R2 sopidkc;sopidkc Service;c:\windows\system32\sopidkc.exe [2006-11-2 194560]
    R3 b57nd60x;Broadcom NetXtreme Gigabit Ethernet - NDIS 6.0;c:\windows\system32\drivers\b57nd60x.sys [2007-7-31 179712]
    R3 EraserUtilRebootDrv;EraserUtilRebootDrv;c:\program files\common files\symantec shared\eengine\EraserUtilRebootDrv.sys [2007-8-1 102760]
    S3 IDSvix86;Symantec Intrusion Prevention Driver;c:\progra~2\symantec\defini~1\symcdata\idsdefs\20061025.029\IDSvix86.sys [2007-8-1 202872]
    S3 NPF;NetGroup Packet Filter Driver;c:\windows\system32\drivers\npf.sys [2005-8-3 32512]
    S3 npggsvc;nProtect GameGuard Service;c:\windows\system32\gamemon.des -service --> c:\windows\system32\GameMon.des -service [?]
    S3 s125bus;Sony Ericsson Device 125 driver (WDM);c:\windows\system32\drivers\s125bus.sys [2007-4-24 83336]
    S3 s125mdfl;Sony Ericsson Device 125 USB WMC Modem Filter;c:\windows\system32\drivers\s125mdfl.sys [2007-4-24 15112]
    S3 s125mdm;Sony Ericsson Device 125 USB WMC Modem Driver;c:\windows\system32\drivers\s125mdm.sys [2007-4-24 108680]
    S3 s125mgmt;Sony Ericsson Device 125 USB WMC Device Management Drivers (WDM);c:\windows\system32\drivers\s125mgmt.sys [2007-4-24 100488]
    S3 s125obex;Sony Ericsson Device 125 USB WMC OBEX Interface;c:\windows\system32\drivers\s125obex.sys [2007-4-24 98696]
    S4 ALaunchService;ALaunch Service;c:\acer\alaunch\ALaunchSvc.exe [2007-8-1 70656]
    S4 Lavasoft Ad-Aware Service;Lavasoft Ad-Aware Service;c:\program files\lavasoft\ad-aware\AAWService.exe [2009-1-20 953168]

    =============== Created Last 30 ================

    2009-05-17 08:39 <DIR> --d----- c:\program files\Trend Micro
    2009-05-17 08:03 <DIR> --d----- c:\windows\system32\3361
    2009-05-17 08:03 211,456 a------- c:\windows\system32\w.exe
    2009-05-17 08:03 36,864 a------- c:\windows\system32\dpcxool64.sys
    2009-05-17 08:03 8 a------- c:\windows\system32\comsa32.sys
    2009-05-15 10:57 442,368 a----r-- c:\windows\system32\vp6vfw.dll
    2009-05-13 04:05 55,808 a------- C:\unobi.dll
    2009-05-12 13:40 <DIR> --d----- C:\_OTScanIt
    2009-05-12 11:55 <DIR> --d----- c:\users\adam\appdata\roaming\Malwarebytes
    2009-05-12 11:55 15,504 a------- c:\windows\system32\drivers\mbam.sys
    2009-05-12 11:55 38,496 a------- c:\windows\system32\drivers\mbamswissarmy.sys
    2009-05-12 11:55 <DIR> --d----- c:\programdata\Malwarebytes
    2009-05-12 11:55 <DIR> --d----- c:\program files\Malwarebytes' Anti-Malware
    2009-05-12 11:55 <DIR> --d----- c:\progra~2\Malwarebytes
    2009-05-11 20:35 69,632 a----r-- c:\windows\system32\xmltok.dll
    2009-05-11 20:35 46,032 a----r-- c:\windows\system32\xmlinst.exe
    2009-05-11 20:35 36,864 a----r-- c:\windows\system32\xmlparse.dll
    2009-05-11 20:35 35,840 a----r-- c:\windows\system32\comdlg32.oca
    2009-05-11 20:35 29,184 a----r-- c:\windows\system32\MSINET.oca
    2009-05-11 20:35 28,432 a----r-- c:\windows\system32\msxmlr.dll
    2009-05-11 20:35 24,576 a----r-- c:\windows\system32\msxml3a.dll
    2009-05-11 20:35 89,360 a----r-- c:\windows\system32\VB5DB.DLL
    2009-05-11 20:35 <DIR> --d----- c:\program files\Ubi Soft
    2009-05-11 08:18 <DIR> --d----- c:\windows\dhcp
    2009-05-11 08:18 176,640 a------- c:\windows\system32\tpsaxyd.exe
    2009-05-09 08:18 209,430,351 a------- c:\windows\MEMORY.DMP
    2009-05-06 16:11 <DIR> --d----- C:\etax2008
    2009-05-01 08:02 <DIR> --dshr-- c:\program files\ThunMail
    2009-05-01 07:58 <DIR> --d----- c:\programdata\Windows Genuine Advantage
    2009-05-01 06:54 <DIR> --d----- C:\SDFix
    2009-04-29 21:10 484 a------- c:\windows\eReg.dat
    2009-04-29 20:48 <DIR> --d----- c:\program files\RegFix Mantra
    2009-04-29 20:34 <DIR> --d----- c:\users\adam\appdata\roaming\SmartPCTools
    2009-04-29 16:03 <DIR> --d----- c:\programdata\Office Genuine Advantage
    2009-04-26 11:15 15,688 a------- c:\windows\system32\lsdelete.exe
    2009-04-26 09:35 <DIR> -cd-h--- c:\programdata\{2BAE6915-8510-4B9F-B498-02DA86258AA0}
    2009-04-26 09:35 <DIR> -cd-h--- c:\progra~2\{2BAE6915-8510-4B9F-B498-02DA86258AA0}
    2009-04-26 09:35 <DIR> --d----- c:\programdata\Lavasoft
    2009-04-26 09:35 <DIR> --d----- c:\program files\Lavasoft
    2009-04-25 16:23 <DIR> --d----- c:\programdata\3539E
    2009-04-25 16:23 <DIR> --d----- c:\progra~2\3539E
    2009-04-25 09:30 <DIR> --d----- c:\program files\EMCO
    2009-04-25 08:09 15,000 a------- c:\windows\system32\jksahfo93wjfkd.dll.vir
    2009-04-19 14:12 <DIR> --d----- c:\program files\common files\eSellerate
    2009-04-19 14:12 <DIR> --d----- c:\program files\AnswersThatWork
    2009-04-19 11:29 <DIR> --d----- c:\program files\Ace Utilities
    2009-04-19 11:24 <DIR> --d----- c:\program files\Promosoft Corporation
    2009-04-19 08:10 15,000 a------- c:\windows\system32\zfgh83jg3.dll
    2009-04-19 08:03 339,968 a------- c:\windows\system32\CF18794.exe
    2009-04-19 08:03 <DIR> --d----- C:\ComboFix
    2009-04-18 16:51 <DIR> --d----- c:\programdata\F217
    2009-04-18 16:51 <DIR> --d----- c:\progra~2\F217
    2009-04-17 15:15 <DIR> --d----- c:\programdata\33379
    2009-04-17 15:15 <DIR> --d----- c:\progra~2\33379
    2009-04-17 13:21 182,272 a------- c:\windows\SWREG.exe
    2009-04-17 13:21 118,784 a------- c:\windows\sed.exe

    ==================== Find3M ====================

    2009-04-29 16:37 37,376 a------- c:\windows\system32\rasautou.exe
    2009-04-29 16:37 34,816 a------- c:\windows\hh.exe
    2009-04-29 16:37 2,625,536 a------- c:\windows\system32\SLsvc.exe
    2009-04-29 16:37 72,704 a------- c:\windows\system32\expand.exe
    2009-04-29 16:37 44,544 a------- c:\windows\system32\dnscacheugc.exe
    2009-04-29 16:37 164,352 a------- c:\windows\system32\iscsicli.exe
    2009-04-29 16:37 61,440 a------- c:\windows\system32\auditpol.exe
    2009-04-16 13:25 410,984 a------- c:\windows\system32\deploytk.dll
    2009-04-15 09:15 47,360 a------- c:\users\adam\appdata\roaming\pcouffin.sys
    2009-04-15 08:57 143,360 a------- c:\windows\inf\infstrng.dat
    2009-04-15 08:57 86,016 a------- c:\windows\inf\infpub.dat
    2009-04-15 08:57 86,016 a------- c:\windows\inf\infstor.dat
    2009-04-15 08:57 47,360 a------- c:\windows\system32\drivers\pcouffin.sys
    2008-12-15 05:48 174 a--sh--- c:\program files\desktop.ini
    2008-08-27 06:22 665,600 a------- c:\windows\inf\drvindex.dat
    2008-01-15 18:06 0 a------- c:\users\adam\appdata\roaming\wklnhst.dat
    2006-11-02 22:39 287,440 a------- c:\windows\inf\perflib\0409\perfi.dat
    2006-11-02 22:39 287,440 a------- c:\windows\inf\perflib\0409\perfh.dat
    2006-11-02 22:39 30,674 a------- c:\windows\inf\perflib\0409\perfd.dat
    2006-11-02 22:39 30,674 a------- c:\windows\inf\perflib\0409\perfc.dat
    2006-11-02 19:20 287,440 a------- c:\windows\inf\perflib\0000\perfi.dat
    2006-11-02 19:20 287,440 a------- c:\windows\inf\perflib\0000\perfh.dat
    2006-11-02 19:20 30,674 a------- c:\windows\inf\perflib\0000\perfd.dat
    2006-11-02 19:20 30,674 a------- c:\windows\inf\perflib\0000\perfc.dat
    2006-05-03 19:06 163,328 ---shr-- c:\windows\system32\flvDX.dll
    2007-02-21 20:47 31,232 ---shr-- c:\windows\system32\msfDX.dll
    2008-03-16 22:30 216,064 ---shr-- c:\windows\system32\nbDX.dll

    ============= FINISH: 8:44:27.21 ===============

    Malwarebytes' Anti-Malware 1.36
    Database version: 1945
    Windows 6.0.6000

    13/05/2009 7:43:07 AM
    mbam-log-2009-05-13 (07-43-07).txt

    Scan type: Full Scan (C:\|D:\|)
    Objects scanned: 188293
    Time elapsed: 4 hour(s), 23 minute(s), 5 second(s)

    Memory Processes Infected: 1
    Memory Modules Infected: 0
    Registry Keys Infected: 2
    Registry Values Infected: 0
    Registry Data Items Infected: 1
    Folders Infected: 0
    Files Infected: 5

    Memory Processes Infected:
    C:\Windows\System32\sopidkc.exe (Backdoor.Bot) -> Unloaded process successfully.

    Memory Modules Infected:
    (No malicious items detected)

    Registry Keys Infected:
    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\sopidkc (Backdoor.Bot) -> Quarantined and deleted successfully.
    HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\sopidkc (Backdoor.Bot) -> Quarantined and deleted successfully.

    Registry Values Infected:
    (No malicious items detected)

    Registry Data Items Infected:
    HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions (Hijack.FolderOptions) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.

    Folders Infected:
    (No malicious items detected)

    Files Infected:
    C:\Windows\System32\comsa32.sys (Trojan.Agent) -> Quarantined and deleted successfully.
    C:\Windows\System32\FInstall.sys (Backdoor.Bot) -> Quarantined and deleted successfully.
    C:\Windows\System32\sopidkc.exe (Backdoor.Bot) -> Delete on reboot.
    C:\Windows\System32\tpszxyd.sys (Backdoor.Bot) -> Quarantined and deleted successfully.
    C:\Windows\System32\dpcxool64.sys (Spyware.OnlineGames) -> Quarantined and deleted successfully.

    Database version: 1945
    Windows 6.0.6000

    12/05/2009 12:58:55 PM
    mbam-log-2009-05-12 (12-58-55).txt

    Scan type: Full Scan (C:\|D:\|)
    Objects scanned: 127398
    Time elapsed: 1 hour(s), 2 minute(s), 28 second(s)

    Memory Processes Infected: 0
    Memory Modules Infected: 0
    Registry Keys Infected: 1
    Registry Values Infected: 1
    Registry Data Items Infected: 0
    Folders Infected: 0
    Files Infected: 0

    Memory Processes Infected:
    (No malicious items detected)

    Memory Modules Infected:
    (No malicious items detected)

    Registry Keys Infected:
    HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{d5bf49a0-94f3-42bd-f434-3604812c8955} (Trojan.Agent) -> Quarantined and deleted successfully.

    Registry Values Infected:
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler\{d5bf49a0-94f3-42bd-f434-3604812c8955} (Trojan.Agent) -> Quarantined and deleted successfully.

    Registry Data Items Infected:
    (No malicious items detected)

    Folders Infected:
    (No malicious items detected)

    Files Infected:
    (No malicious items detected)
     
  2. 2009/05/16
    broni

    broni Moderator Malware Analyst

    Joined:
    2002/08/01
    Messages:
    21,701
    Likes Received:
    116
    There is a lot of infection there.
    Why is Norton listed as disabled? Did you disable it, or you're not able to enable it because of an infection?
    What happened with Combofix log?
     
    Last edited: 2009/05/16

  3. to hide this advert.

  4. 2009/05/16
    Aussieboy

    Aussieboy Inactive Thread Starter

    Joined:
    2009/05/16
    Messages:
    23
    Likes Received:
    0
    I never really installed the thing , a trail came with the computer and i had heard that norton has extremely hard to get off the hard drive so i didnt install but it is odd how it does say that its disabled , its probably due to the fact that its not installed either.

    Also combofix's log i have losted it or it wasn't made in the first place
     
    Last edited: 2009/05/16
  5. 2009/05/16
    broni

    broni Moderator Malware Analyst

    Joined:
    2002/08/01
    Messages:
    21,701
    Likes Received:
    116
    OK, we have to take it slowly. One thing at a time.

    1. Make sure, Windows firewall is on.
    Since you can't see Control Panel, go Start, and in "Start search" type in:
    WSCUI.CPL
    Press Enter to open Windows Security Center.

    2. Download, and run Norton Removal Tool: http://service1.symantec.com/Support/tsgeninfo.nsf/docid/2005033108162039

    3. Install one of these:
    - Avast! free antivirus: http://www.avast.com/eng/download-avast-home.html
    - Avira free antivirus: http://www.free-av.com/en/download/index.html

    - free PC Tools Firewall Plus: http://www.pctools.com/firewall/

    - free Comodo Internet Security (firewall + AV): http://www.personalfirewall.comodo.com/
    NOTE. During installation, Comodo will also allow you to install AV only, or firewall only, if you prefer to combine one Comodo product with some other product.

    If you decide to install Avast, or Avira, make sure, Windows firewall is turned on, or use PC Tools Firewall Plus.
    If you decide to install Comodo, make sure, Windows firewall is turned off.

    IMPORTANT! Make sure, you use only ONE antivirus, and ONE firewall.

    After installation, update the program, and run full scan.

    4. When done....

    Print these instructions out.

    NOTE. If any of the programs listed below refuse to run, try renaming executive file to something else; for instance, rename hijackthis.exe to scanner.exe

    STEP 1. Download SUPERAntiSpyware Free for Home Users:
    http://www.superantispyware.com/

    * Double-click SUPERAntiSpyware.exe and use the default settings for installation.
    * An icon will be created on your desktop. Double-click that icon to launch the program.
    * If asked to update the program definitions, click "Yes ". If not, update the definitions before scanning by selecting "Check for Updates ". (If you encounter any problems while downloading the updates, manually download and unzip them from here: http://www.superantispyware.com/definitions.html.)
    * Close SUPERAntiSpyware.

    PHYSICALLY DISCONNECT FROM THE INTERNET

    Restart computer in Safe Mode.
    To enter Safe Mode, restart computer, and keep tapping F8 key, until menu appears; select Safe Mode; you'll see "Safe Mode" in all four corners of your screen

    * Open SUPERAntiSpyware.
    * Under Configuration and Preferences, click the Preferences button.
    * Under General and Startup tab, make sure, Start SUPERAntiSpyware when Windows starts option is UN-checked.
    * Click the Scanning Control tab.
    * Under Scanner Options make sure the following are checked (leave all others unchecked):
    - Close browsers before scanning.
    - Scan for tracking cookies.
    - Terminate memory threats before quarantining.

    * Click the Close button to leave the control center screen.
    * Back on the main screen, under Scan for Harmful Software click Scan your computer.
    * On the left, make sure you check C:\Fixed Drive.
    * On the right, under Complete Scan, choose Perform Complete Scan.
    * Click Next to start the scan. Please be patient while it scans your computer.
    * After the scan is complete, a Scan Summary box will appear with potentially harmful items that were detected. Click OK.
    * Make sure everything has a checkmark next to it and click Next.
    * A notification will appear that Quarantine and Removal is Complete. Click OK and then click the Finish button to return to the main menu.
    * If asked if you want to reboot, click Yes.
    * To retrieve the removal information after reboot, launch SUPERAntispyware again.
    - Click Preferences, then click the Statistics/Logs tab.
    - Under Scanner Logs, double-click SUPERAntiSpyware Scan Log.
    - If there are several logs, click the current dated log and press View log. A text file will open in your default text editor.
    - Please copy and paste the Scan Log results in your next reply.

    * Click Close to exit the program.
    Post SUPERAntiSpyware log.
    NOTE: Tracking cookies may be omitted from the log.

    RECONNECT TO THE INTERNET

    RESTART COMPUTER!

    STEP 2. Download Malwarebytes' Anti-Malware: http://www.malwarebytes.org/mbam.php to your desktop.
    (Malwarebytes is free to use as a manual scanner. Payment is only required if you wish to have it run and update automatically which is not necessary for our purposes)

    * Double-click mbam-setup.exe and follow the prompts to install the program.
    * At the end, be sure a checkmark is placed next to Update Malwarebytes' Anti-Malware and Launch Malwarebytes' Anti-Malware, then click Finish.
    * If an update is found, it will download and install the latest version.
    * Once the program has loaded, select Perform full scan, then click Scan.
    * When the scan is complete, click OK, then Show Results to view the results.
    * Be sure that everything is checked, and click Remove Selected.
    * When completed, a log will open in Notepad.
    * Post the log back here.

    The log can also be found here:
    C:\Documents and Settings\Username\Application Data\Malwarebytes\Malwarebytes' Anti-Malware\Logs\log-date.txt
    Or at C:\Program Files\Malwarebytes' Anti-Malware\Logs\log-date.txt

    RESTART COMPUTER!

    STEP 3. Download GMER: http://www.gmer.net/files.php, by clicking on Download EXE button.
    Alternative downloads:
    - http://majorgeeks.com/GMER_d5198.html
    - http://www.softpedia.com/get/Interne...ers/GMER.shtml
    Double click on downloaded .exe file, select Rootkit tab and click the Scan button.
    When scan is completed, click Save button, and save the results as gmer.log
    Warning ! Please, do not select the "Show all" checkbox during the scan.
    Post the log to your next reply.

    RESTART COMPUTER

    STEP 4. Download HijackThis:
    http://www.trendsecure.com/portal/en-US/tools/security_tools/hijackthis/download
    by clicking on Download HijackThis Installer
    Install, and run it.
    Post HijackThis log.
    Do NOT attempt to "fix" anything!


    DO NOT make any other changes to your computer (like installing programs, using other cleaning tools, etc.), until it's officially declared clean!!!
     
  6. 2009/05/16
    Aussieboy

    Aussieboy Inactive Thread Starter

    Joined:
    2009/05/16
    Messages:
    23
    Likes Received:
    0
    Just doing step 2 now just though i might tell u that i couldn't access the Norton link nor the Avast! link so i downloaded the Norton remover from another computer in the house and used the wireless router with a internet modem connected to it , to get the remover tool over to my computer.
     
  7. 2009/05/16
    broni

    broni Moderator Malware Analyst

    Joined:
    2002/08/01
    Messages:
    21,701
    Likes Received:
    116
    Download Avast on good computer, and move the installation file to bad computer.
    You need to have AV program.
     
  8. 2009/05/16
    Aussieboy

    Aussieboy Inactive Thread Starter

    Joined:
    2009/05/16
    Messages:
    23
    Likes Received:
    0
    I am downloading Avast on the good computer now .
     
  9. 2009/05/16
    broni

    broni Moderator Malware Analyst

    Joined:
    2002/08/01
    Messages:
    21,701
    Likes Received:
    116
    Very well :)
     
  10. 2009/05/17
    Aussieboy

    Aussieboy Inactive Thread Starter

    Joined:
    2009/05/16
    Messages:
    23
    Likes Received:
    0
    I did the scan with Avast! , it said to do a bootscan to remove a virus found in the memory so i restarted computer and avast did a boot scan and found a lot files infected with Win32:vitro , i tried to repair but it wasn't able to do so, so then i went to delete infected file , i told it not to delete anything in the windows file but i think it delete some startup files or damaged the normal startup files as i cannot start the computer normal i have to go to safe mode with networking to access the internet and the computer.

    What happens to the computer normally :
    Boots to OS fine
    Comes to visa login page fine
    Logs into a User fine
    Once Loged in windows stop responding completely
    Alt+Ctrl+del doesnt even work at all
    Not matter what i press there isn't any response at all

    SUPERAntiSpyware Scan Log
    http://www.superantispyware.com

    Generated 05/18/2009 at 11:47 AM

    Application Version : 4.26.1002

    Core Rules Database Version : 3895
    Trace Rules Database Version: 1843

    Scan type : Complete Scan
    Total Scan Time : 00:47:48

    Memory items scanned : 379
    Memory threats detected : 0
    Registry items scanned : 8009
    Registry threats detected : 14
    File items scanned : 25157
    File threats detected : 36

    Trojan.Sino-PWS/Gen
    HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler#{B2BA40A2-74F0-42BD-F434-12345A2C8953}
    HKU\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{B2BA40A2-74F0-42BD-F434-12345A2C8953}
    HKU\S-1-5-21-1275490929-3834731154-2838317729-1000\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{B2BA40A2-74F0-42BD-F434-12345A2C8953}
    HKU\S-1-5-18\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{B2BA40A2-74F0-42BD-F434-12345A2C8953}

    Trojan.Agent/Gen-Ertfor
    HKU\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{D5BF49A0-94F3-42BD-F434-3604812C8955}
    HKU\S-1-5-18\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{D5BF49A0-94F3-42BD-F434-3604812C8955}

    Trojan.Downloader-SVCHost/Fake
    HKLM\System\ControlSet001\Services\DhcpSrv
    C:\WINDOWS\DHCP\SVCHOST.EXE
    HKLM\System\ControlSet001\Enum\Root\LEGACY_DhcpSrv
    HKLM\System\ControlSet002\Services\DhcpSrv
    HKLM\System\ControlSet002\Enum\Root\LEGACY_DhcpSrv
    HKLM\System\ControlSet003\Services\DhcpSrv
    HKLM\System\ControlSet003\Enum\Root\LEGACY_DhcpSrv
    HKLM\System\CurrentControlSet\Services\DhcpSrv
    HKLM\System\CurrentControlSet\Enum\Root\LEGACY_DhcpSrv

    Adware.Tracking Cookie
    C:\Users\Adam\AppData\Roaming\Microsoft\Windows\Cookies\adam@2o7[1].txt
    C:\Users\Adam\AppData\Roaming\Microsoft\Windows\Cookies\adam@revsci[1].txt
    C:\Users\Adam\AppData\Roaming\Microsoft\Windows\Cookies\adam@ads.gamesbannernet[1].txt
    C:\Users\Guest\AppData\Roaming\Microsoft\Windows\Cookies\guest@2o7[2].txt
    C:\Users\Guest\AppData\Roaming\Microsoft\Windows\Cookies\guest@msnportal.112.2o7[1].txt
    C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\system@overture[2].txt
    C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\system@partyaccount[1].txt
    C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\system@cms.trafficmp[1].txt
    C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\system@stat.dealtime[1].txt
    C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\system@secure.partyaccount[1].txt
    C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\system@invitemedia[2].txt
    C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\system@ad.yieldmanager[1].txt
    C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\system@partypoker[1].txt
    C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\system@trafficmp[1].txt
    C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\system@revsci[1].txt
    C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\system@collective-media[1].txt

    BearShare File Sharing Client
    C:\PROGRAM FILES\BEARSHARE APPLICATIONS\BEARSHARE\BEARSHARE.EXE

    Trojan.Dropper/Gen
    C:\USERS\ADAM\APPDATA\LOCAL\MICROSOFT\WINDOWS\TEMPORARY INTERNET FILES\CONTENT.IE5\KEEDZFZS\SETUP_LIB_SRL[1].EXE

    Trojan.Unknown Origin
    C:\WINDOWS\SERVICEPROFILES\LOCALSERVICE\APPDATA\LOCAL\TEMP\VRT990C.TMP
    C:\WINDOWS\SERVICEPROFILES\LOCALSERVICE\APPDATA\LOCAL\TEMP\VRTDAFB.TMP
    C:\WINDOWS\TEMP\VRT1D6E.TMP
    C:\WINDOWS\TEMP\VRT538B.TMP
    C:\WINDOWS\TEMP\VRT5984.TMP
    C:\WINDOWS\TEMP\VRT7676.TMP
    C:\WINDOWS\TEMP\VRT862F.TMP
    C:\WINDOWS\TEMP\VRT869C.TMP
    C:\WINDOWS\TEMP\VRT8CF3.TMP
    C:\WINDOWS\TEMP\VRTAA61.TMP
    C:\WINDOWS\TEMP\VRTAE86.TMP
    C:\WINDOWS\TEMP\VRTDFB3.TMP

    Trojan.Downloader-DncYool64
    C:\WINDOWS\SYSTEM32\DNCYOOL64.SYS
    C:\Windows\Prefetch\DNCYOOL64.SYS-E50E272B.pf

    Trojan.Agent/Gen-MSNCache-A
    C:\WINDOWS\SYSTEM32\MSNCACHE.DLL

    Trojan.Smitfraud Variant-Gen/Bensorty
    C:\WINDOWS\SYSTEM32\ZFGH83JG3.DLL

    Trojan.Agent/Gen-Virut
    C:\WINDOWS\TEMP\_AVAST4_\UNP233084402.TMP
     
  11. 2009/05/17
    Aussieboy

    Aussieboy Inactive Thread Starter

    Joined:
    2009/05/16
    Messages:
    23
    Likes Received:
    0
    Malwarebytes' Anti-Malware 1.36
    Database version: 1945
    Windows 6.0.6000

    18/05/2009 1:30:54 PM
    mbam-log-2009-05-18 (13-30-54).txt

    Scan type: Full Scan (C:\|D:\|)
    Objects scanned: 217531
    Time elapsed: 48 minute(s), 27 second(s)

    Memory Processes Infected: 0
    Memory Modules Infected: 0
    Registry Keys Infected: 0
    Registry Values Infected: 0
    Registry Data Items Infected: 0
    Folders Infected: 0
    Files Infected: 0

    Memory Processes Infected:
    (No malicious items detected)

    Memory Modules Infected:
    (No malicious items detected)

    Registry Keys Infected:
    (No malicious items detected)

    Registry Values Infected:
    (No malicious items detected)

    Registry Data Items Infected:
    (No malicious items detected)

    Folders Infected:
    (No malicious items detected)

    Files Infected:
    (No malicious items detected)
     
  12. 2009/05/17
    broni

    broni Moderator Malware Analyst

    Joined:
    2002/08/01
    Messages:
    21,701
    Likes Received:
    116
    OK, at this point let's try to fix booting to normal mode problem.

    If you have Vista DVD...

    http://www.vistax64.com/tutorials/88236-repair-install-vista.html

    If you don't have Vista DVD...

    1. Create Vista Recovery Disc.

    Option 1:
    http://www.c4consulting.com.au/soluctions/vista/VISTA SOLUCTIONS.htm

    Option 2:
    Download Vista Recovery Disc iso image: http://neosmart.net/blog/2008/windows-vista-recovery-disc-download/
    Burn it to CD, or DVD: http://neosmart.net/wiki/display/G/Burning+ISO+Images+to+a+CD+or+DVD

    2. Boot from created disk.
    At first screen click on Repair your computer:
    [​IMG]
    This will bring you to a new screen where the repair process will look for all Windows Vista installations on your computer. When done you will be presented with the System Recovery Options dialog box:
    [​IMG]
    After this, it will present you with a list of options including startup repair, system restore and command prompt:
    [​IMG]
    Try Startup Repair.

    Do NOT try, at this point, "System Restore ".
     
  13. 2009/05/17
    Aussieboy

    Aussieboy Inactive Thread Starter

    Joined:
    2009/05/16
    Messages:
    23
    Likes Received:
    0
    Just downloading the .iso image and iso burning program atm
    I started gmer scaning before i read ur reply so i let it finish , theres the log from it.

    MER 1.0.15.14972 - http://www.gmer.net
    Rootkit scan 2009-05-18 14:22:34
    Windows 6.0.6000


    ---- User code sections - GMER 1.0.15 ----

    .text C:\Windows\system32\csrss.exe[404] ntdll.dll!NtCreateFile 7703F414 5 Bytes CALL 7FFA4698
    .text C:\Windows\system32\csrss.exe[404] ntdll.dll!NtCreateProcess 7703F4D4 5 Bytes CALL 7FFA4727
    .text C:\Windows\system32\csrss.exe[404] ntdll.dll!NtCreateProcessEx 7703F4E4 5 Bytes CALL 7FFA4734
    .text C:\Windows\system32\csrss.exe[404] ntdll.dll!NtDeviceIoControlFile 7703F844 5 Bytes CALL 7FFA49B8
    .text C:\Windows\system32\csrss.exe[404] ntdll.dll!NtOpenFile 7703FBF4 5 Bytes CALL 7FFA471D
    .text C:\Windows\system32\csrss.exe[404] ntdll.dll!NtQueryInformationProcess 7703FE94 5 Bytes CALL 7FFA4775
    .text C:\Windows\system32\csrss.exe[404] ntdll.dll!NtCreateUserProcess 770408A4 5 Bytes CALL 7FFA4741
    .text C:\Windows\system32\wininit.exe[412] ntdll.dll!NtCreateFile 7703F414 5 Bytes CALL 7FFA4698
    .text C:\Windows\system32\wininit.exe[412] ntdll.dll!NtCreateProcess 7703F4D4 5 Bytes CALL 7FFA4727
    .text C:\Windows\system32\wininit.exe[412] ntdll.dll!NtCreateProcessEx 7703F4E4 5 Bytes CALL 7FFA4734
    .text C:\Windows\system32\wininit.exe[412] ntdll.dll!NtDeviceIoControlFile 7703F844 5 Bytes CALL 7FFA49B8
    .text C:\Windows\system32\wininit.exe[412] ntdll.dll!NtOpenFile 7703FBF4 5 Bytes CALL 7FFA471D
    .text C:\Windows\system32\wininit.exe[412] ntdll.dll!NtQueryInformationProcess 7703FE94 5 Bytes CALL 7FFA4775
    .text C:\Windows\system32\wininit.exe[412] ntdll.dll!NtCreateUserProcess 770408A4 5 Bytes CALL 7FFA4741
    .text C:\Windows\system32\winlogon.exe[440] ntdll.dll!NtCreateFile 7703F414 5 Bytes CALL 7FFA4698
    .text C:\Windows\system32\winlogon.exe[440] ntdll.dll!NtCreateProcess 7703F4D4 5 Bytes CALL 7FFA4727
    .text C:\Windows\system32\winlogon.exe[440] ntdll.dll!NtCreateProcessEx 7703F4E4 5 Bytes CALL 7FFA4734
    .text C:\Windows\system32\winlogon.exe[440] ntdll.dll!NtDeviceIoControlFile 7703F844 5 Bytes CALL 7FFA49B8
    .text C:\Windows\system32\winlogon.exe[440] ntdll.dll!NtOpenFile 7703FBF4 5 Bytes CALL 7FFA471D
    .text C:\Windows\system32\winlogon.exe[440] ntdll.dll!NtQueryInformationProcess 7703FE94 5 Bytes CALL 7FFA4775
    .text C:\Windows\system32\winlogon.exe[440] ntdll.dll!NtCreateUserProcess 770408A4 5 Bytes CALL 7FFA4741
    .text C:\Windows\system32\services.exe[484] ntdll.dll!NtCreateFile 7703F414 5 Bytes CALL 7FFA4698
    .text C:\Windows\system32\services.exe[484] ntdll.dll!NtCreateProcess 7703F4D4 5 Bytes CALL 7FFA4727
    .text C:\Windows\system32\services.exe[484] ntdll.dll!NtCreateProcessEx 7703F4E4 5 Bytes CALL 7FFA4734
    .text C:\Windows\system32\services.exe[484] ntdll.dll!NtDeviceIoControlFile 7703F844 5 Bytes CALL 7FFA49B8
    .text C:\Windows\system32\services.exe[484] ntdll.dll!NtOpenFile 7703FBF4 5 Bytes CALL 7FFA471D
    .text C:\Windows\system32\services.exe[484] ntdll.dll!NtQueryInformationProcess 7703FE94 5 Bytes CALL 7FFA4775
    .text C:\Windows\system32\services.exe[484] ntdll.dll!NtCreateUserProcess 770408A4 5 Bytes CALL 7FFA4741
    .text C:\Windows\system32\lsass.exe[500] ntdll.dll!NtCreateFile 7703F414 5 Bytes CALL 7FF94698
    .text C:\Windows\system32\lsass.exe[500] ntdll.dll!NtCreateProcess 7703F4D4 5 Bytes CALL 7FF94727
    .text C:\Windows\system32\lsass.exe[500] ntdll.dll!NtCreateProcessEx 7703F4E4 5 Bytes CALL 7FF94734
    .text C:\Windows\system32\lsass.exe[500] ntdll.dll!NtDeviceIoControlFile 7703F844 5 Bytes CALL 7FF949B8
    .text C:\Windows\system32\lsass.exe[500] ntdll.dll!NtOpenFile 7703FBF4 5 Bytes CALL 7FF9471D
    .text C:\Windows\system32\lsass.exe[500] ntdll.dll!NtQueryInformationProcess 7703FE94 5 Bytes CALL 7FF94775
    .text C:\Windows\system32\lsass.exe[500] ntdll.dll!NtCreateUserProcess 770408A4 5 Bytes CALL 7FF94741
    .text C:\Windows\system32\lsm.exe[508] ntdll.dll!NtCreateFile 7703F414 5 Bytes CALL 7FFA4698
    .text C:\Windows\system32\lsm.exe[508] ntdll.dll!NtCreateProcess 7703F4D4 5 Bytes CALL 7FFA4727
    .text C:\Windows\system32\lsm.exe[508] ntdll.dll!NtCreateProcessEx 7703F4E4 5 Bytes CALL 7FFA4734
    .text C:\Windows\system32\lsm.exe[508] ntdll.dll!NtDeviceIoControlFile 7703F844 5 Bytes CALL 7FFA49B8
    .text C:\Windows\system32\lsm.exe[508] ntdll.dll!NtOpenFile 7703FBF4 5 Bytes CALL 7FFA471D
    .text C:\Windows\system32\lsm.exe[508] ntdll.dll!NtQueryInformationProcess 7703FE94 5 Bytes CALL 7FFA4775
    .text C:\Windows\system32\lsm.exe[508] ntdll.dll!NtCreateUserProcess 770408A4 5 Bytes CALL 7FFA4741
    .text C:\Windows\system32\svchost.exe[664] ntdll.dll!NtCreateFile 7703F414 5 Bytes CALL 7FFA4698
    .text C:\Windows\system32\svchost.exe[664] ntdll.dll!NtCreateProcess 7703F4D4 5 Bytes CALL 7FFA4727
    .text C:\Windows\system32\svchost.exe[664] ntdll.dll!NtCreateProcessEx 7703F4E4 5 Bytes CALL 7FFA4734
    .text C:\Windows\system32\svchost.exe[664] ntdll.dll!NtDeviceIoControlFile 7703F844 5 Bytes CALL 7FFA49B8
    .text C:\Windows\system32\svchost.exe[664] ntdll.dll!NtOpenFile 7703FBF4 5 Bytes CALL 7FFA471D
    .text C:\Windows\system32\svchost.exe[664] ntdll.dll!NtQueryInformationProcess 7703FE94 5 Bytes CALL 7FFA4775
    .text C:\Windows\system32\svchost.exe[664] ntdll.dll!NtCreateUserProcess 770408A4 5 Bytes CALL 7FFA4741
    .text C:\Windows\system32\svchost.exe[720] ntdll.dll!NtCreateFile 7703F414 5 Bytes CALL 7FFA4698
    .text C:\Windows\system32\svchost.exe[720] ntdll.dll!NtCreateProcess 7703F4D4 5 Bytes CALL 7FFA4727
    .text C:\Windows\system32\svchost.exe[720] ntdll.dll!NtCreateProcessEx 7703F4E4 5 Bytes CALL 7FFA4734
    .text C:\Windows\system32\svchost.exe[720] ntdll.dll!NtDeviceIoControlFile 7703F844 5 Bytes CALL 7FFA49B8
    .text C:\Windows\system32\svchost.exe[720] ntdll.dll!NtOpenFile 7703FBF4 5 Bytes CALL 7FFA471D
    .text C:\Windows\system32\svchost.exe[720] ntdll.dll!NtQueryInformationProcess 7703FE94 5 Bytes CALL 7FFA4775
    .text C:\Windows\system32\svchost.exe[720] ntdll.dll!NtCreateUserProcess 770408A4 5 Bytes CALL 7FFA4741
    .text C:\Windows\System32\svchost.exe[752] ntdll.dll!NtCreateFile 7703F414 5 Bytes CALL 7FFA4698
    .text C:\Windows\System32\svchost.exe[752] ntdll.dll!NtCreateProcess 7703F4D4 5 Bytes CALL 7FFA4727
    .text C:\Windows\System32\svchost.exe[752] ntdll.dll!NtCreateProcessEx 7703F4E4 5 Bytes CALL 7FFA4734
    .text C:\Windows\System32\svchost.exe[752] ntdll.dll!NtDeviceIoControlFile 7703F844 5 Bytes CALL 7FFA49B8
    .text C:\Windows\System32\svchost.exe[752] ntdll.dll!NtOpenFile 7703FBF4 5 Bytes CALL 7FFA471D
    .text C:\Windows\System32\svchost.exe[752] ntdll.dll!NtQueryInformationProcess 7703FE94 5 Bytes CALL 7FFA4775
    .text C:\Windows\System32\svchost.exe[752] ntdll.dll!NtCreateUserProcess 770408A4 5 Bytes CALL 7FFA4741
    .text C:\Windows\System32\svchost.exe[852] ntdll.dll!NtCreateFile 7703F414 5 Bytes CALL 7FFA4698
    .text C:\Windows\System32\svchost.exe[852] ntdll.dll!NtCreateProcess 7703F4D4 5 Bytes CALL 7FFA4727
    .text C:\Windows\System32\svchost.exe[852] ntdll.dll!NtCreateProcessEx 7703F4E4 5 Bytes CALL 7FFA4734
    .text C:\Windows\System32\svchost.exe[852] ntdll.dll!NtDeviceIoControlFile 7703F844 5 Bytes CALL 7FFA49B8
    .text C:\Windows\System32\svchost.exe[852] ntdll.dll!NtOpenFile 7703FBF4 5 Bytes CALL 7FFA471D
    .text C:\Windows\System32\svchost.exe[852] ntdll.dll!NtQueryInformationProcess 7703FE94 5 Bytes CALL 7FFA4775
    .text C:\Windows\System32\svchost.exe[852] ntdll.dll!NtCreateUserProcess 770408A4 5 Bytes CALL 7FFA4741
    .text C:\Windows\system32\svchost.exe[880] ntdll.dll!NtCreateFile 7703F414 5 Bytes CALL 7FFA4698
    .text C:\Windows\system32\svchost.exe[880] ntdll.dll!NtCreateProcess 7703F4D4 5 Bytes CALL 7FFA4727
    .text C:\Windows\system32\svchost.exe[880] ntdll.dll!NtCreateProcessEx 7703F4E4 5 Bytes CALL 7FFA4734
    .text C:\Windows\system32\svchost.exe[880] ntdll.dll!NtDeviceIoControlFile 7703F844 5 Bytes CALL 7FFA49B8
    .text C:\Windows\system32\svchost.exe[880] ntdll.dll!NtOpenFile 7703FBF4 5 Bytes CALL 7FFA471D
    .text C:\Windows\system32\svchost.exe[880] ntdll.dll!NtQueryInformationProcess 7703FE94 5 Bytes CALL 7FFA4775
    .text C:\Windows\system32\svchost.exe[880] ntdll.dll!NtCreateUserProcess 770408A4 5 Bytes CALL 7FFA4741
    .text C:\Windows\System32\svchost.exe[916] ntdll.dll!NtCreateFile 7703F414 5 Bytes CALL 7FFA4698
    .text C:\Windows\System32\svchost.exe[916] ntdll.dll!NtCreateProcess 7703F4D4 5 Bytes CALL 7FFA4727
    .text C:\Windows\System32\svchost.exe[916] ntdll.dll!NtCreateProcessEx 7703F4E4 5 Bytes CALL 7FFA4734
    .text C:\Windows\System32\svchost.exe[916] ntdll.dll!NtDeviceIoControlFile 7703F844 5 Bytes CALL 7FFA49B8
    .text C:\Windows\System32\svchost.exe[916] ntdll.dll!NtOpenFile 7703FBF4 5 Bytes CALL 7FFA471D
    .text C:\Windows\System32\svchost.exe[916] ntdll.dll!NtQueryInformationProcess 7703FE94 5 Bytes CALL 7FFA4775
    .text C:\Windows\System32\svchost.exe[916] ntdll.dll!NtCreateUserProcess 770408A4 5 Bytes CALL 7FFA4741
    .text C:\Windows\system32\svchost.exe[940] ntdll.dll!NtCreateFile 7703F414 5 Bytes CALL 7FFA4698
    .text C:\Windows\system32\svchost.exe[940] ntdll.dll!NtCreateProcess 7703F4D4 5 Bytes CALL 7FFA4727
    .text C:\Windows\system32\svchost.exe[940] ntdll.dll!NtCreateProcessEx 7703F4E4 5 Bytes CALL 7FFA4734
    .text C:\Windows\system32\svchost.exe[940] ntdll.dll!NtDeviceIoControlFile 7703F844 5 Bytes CALL 7FFA49B8
    .text C:\Windows\system32\svchost.exe[940] ntdll.dll!NtOpenFile 7703FBF4 5 Bytes CALL 7FFA471D
    .text C:\Windows\system32\svchost.exe[940] ntdll.dll!NtQueryInformationProcess 7703FE94 5 Bytes CALL 7FFA4775
    .text C:\Windows\system32\svchost.exe[940] ntdll.dll!NtCreateUserProcess 770408A4 5 Bytes CALL 7FFA4741
    .text C:\Windows\system32\svchost.exe[960] ntdll.dll!NtCreateFile 7703F414 5 Bytes CALL 7FFA4698
    .text C:\Windows\system32\svchost.exe[960] ntdll.dll!NtCreateProcess 7703F4D4 5 Bytes CALL 7FFA4727
    .text C:\Windows\system32\svchost.exe[960] ntdll.dll!NtCreateProcessEx 7703F4E4 5 Bytes CALL 7FFA4734
    .text C:\Windows\system32\svchost.exe[960] ntdll.dll!NtDeviceIoControlFile 7703F844 5 Bytes CALL 7FFA49B8
    .text C:\Windows\system32\svchost.exe[960] ntdll.dll!NtOpenFile 7703FBF4 5 Bytes CALL 7FFA471D
    .text C:\Windows\system32\svchost.exe[960] ntdll.dll!NtQueryInformationProcess 7703FE94 5 Bytes CALL 7FFA4775
    .text C:\Windows\system32\svchost.exe[960] ntdll.dll!NtCreateUserProcess 770408A4 5 Bytes CALL 7FFA4741
    .text C:\Windows\SYSTEM32\WISPTIS.EXE[1116] ntdll.dll!NtCreateFile 7703F414 5 Bytes CALL 7FFA4698
    .text C:\Windows\SYSTEM32\WISPTIS.EXE[1116] ntdll.dll!NtCreateProcess 7703F4D4 5 Bytes CALL 7FFA4727
    .text C:\Windows\SYSTEM32\WISPTIS.EXE[1116] ntdll.dll!NtCreateProcessEx 7703F4E4 5 Bytes CALL 7FFA4734
    .text C:\Windows\SYSTEM32\WISPTIS.EXE[1116] ntdll.dll!NtDeviceIoControlFile 7703F844 5 Bytes CALL 7FFA49B8
    .text C:\Windows\SYSTEM32\WISPTIS.EXE[1116] ntdll.dll!NtOpenFile 7703FBF4 5 Bytes CALL 7FFA471D
    .text C:\Windows\SYSTEM32\WISPTIS.EXE[1116] ntdll.dll!NtQueryInformationProcess 7703FE94 5 Bytes CALL 7FFA4775
    .text C:\Windows\SYSTEM32\WISPTIS.EXE[1116] ntdll.dll!NtCreateUserProcess 770408A4 5 Bytes CALL 7FFA4741
    .text C:\Program Files\Lavasoft\Ad-Aware\AAWService.exe[1180] ntdll.dll!NtCreateFile 7703F414 5 Bytes CALL 7FFA4698
    .text C:\Program Files\Lavasoft\Ad-Aware\AAWService.exe[1180] ntdll.dll!NtCreateProcess 7703F4D4 5 Bytes CALL 7FFA4727
    .text C:\Program Files\Lavasoft\Ad-Aware\AAWService.exe[1180] ntdll.dll!NtCreateProcessEx 7703F4E4 5 Bytes CALL 7FFA4734
    .text C:\Program Files\Lavasoft\Ad-Aware\AAWService.exe[1180] ntdll.dll!NtDeviceIoControlFile 7703F844 5 Bytes CALL 7FFA49B8
    .text C:\Program Files\Lavasoft\Ad-Aware\AAWService.exe[1180] ntdll.dll!NtOpenFile 7703FBF4 5 Bytes CALL 7FFA471D
    .text C:\Program Files\Lavasoft\Ad-Aware\AAWService.exe[1180] ntdll.dll!NtQueryInformationProcess 7703FE94 5 Bytes CALL 7FFA4775
    .text C:\Program Files\Lavasoft\Ad-Aware\AAWService.exe[1180] ntdll.dll!NtCreateUserProcess 770408A4 5 Bytes CALL 7FFA4741
    .text C:\Windows\system32\svchost.exe[1204] ntdll.dll!NtCreateFile 7703F414 5 Bytes CALL 7FFA4698
    .text C:\Windows\system32\svchost.exe[1204] ntdll.dll!NtCreateProcess 7703F4D4 5 Bytes CALL 7FFA4727
    .text C:\Windows\system32\svchost.exe[1204] ntdll.dll!NtCreateProcessEx 7703F4E4 5 Bytes CALL 7FFA4734
    .text C:\Windows\system32\svchost.exe[1204] ntdll.dll!NtDeviceIoControlFile 7703F844 5 Bytes CALL 7FFA49B8
    .text C:\Windows\system32\svchost.exe[1204] ntdll.dll!NtOpenFile 7703FBF4 5 Bytes CALL 7FFA471D
    .text C:\Windows\system32\svchost.exe[1204] ntdll.dll!NtQueryInformationProcess 7703FE94 5 Bytes CALL 7FFA4775
    .text C:\Windows\system32\svchost.exe[1204] ntdll.dll!NtCreateUserProcess 770408A4 5 Bytes CALL 7FFA4741
    .text C:\Program Files\Mozilla Firefox\firefox.exe[1248] ntdll.dll!NtCreateFile 7703F414 5 Bytes CALL 7FFA4698
    .text C:\Program Files\Mozilla Firefox\firefox.exe[1248] ntdll.dll!NtCreateProcess 7703F4D4 5 Bytes CALL 7FFA4727
    .text C:\Program Files\Mozilla Firefox\firefox.exe[1248] ntdll.dll!NtCreateProcessEx 7703F4E4 5 Bytes CALL 7FFA4734
    .text C:\Program Files\Mozilla Firefox\firefox.exe[1248] ntdll.dll!NtDeviceIoControlFile 7703F844 5 Bytes CALL 7FFA49B8
    .text C:\Program Files\Mozilla Firefox\firefox.exe[1248] ntdll.dll!NtOpenFile 7703FBF4 5 Bytes CALL 7FFA471D
    .text C:\Program Files\Mozilla Firefox\firefox.exe[1248] ntdll.dll!NtQueryInformationProcess 7703FE94 5 Bytes CALL 7FFA4775
    .text C:\Program Files\Mozilla Firefox\firefox.exe[1248] ntdll.dll!NtCreateUserProcess 770408A4 5 Bytes CALL 7FFA4741
    .text C:\Windows\system32\svchost.exe[1308] ntdll.dll!NtCreateFile 7703F414 5 Bytes CALL 7FFA4698
    .text C:\Windows\system32\svchost.exe[1308] ntdll.dll!NtCreateProcess 7703F4D4 5 Bytes CALL 7FFA4727
    .text C:\Windows\system32\svchost.exe[1308] ntdll.dll!NtCreateProcessEx 7703F4E4 5 Bytes CALL 7FFA4734
    .text C:\Windows\system32\svchost.exe[1308] ntdll.dll!NtDeviceIoControlFile 7703F844 5 Bytes CALL 7FFA49B8
    .text C:\Windows\system32\svchost.exe[1308] ntdll.dll!NtOpenFile 7703FBF4 5 Bytes CALL 7FFA471D
    .text C:\Windows\system32\svchost.exe[1308] ntdll.dll!NtQueryInformationProcess 7703FE94 5 Bytes CALL 7FFA4775
    .text C:\Windows\system32\svchost.exe[1308] ntdll.dll!NtCreateUserProcess 770408A4 5 Bytes CALL 7FFA4741
    .text C:\Users\Adam\Desktop\Programs\18hjphgz.exe[1780] ntdll.dll!NtCreateFile 7703F414 5 Bytes CALL 7FFA4698
    .text C:\Users\Adam\Desktop\Programs\18hjphgz.exe[1780] ntdll.dll!NtCreateProcess 7703F4D4 5 Bytes CALL 7FFA4727
    .text C:\Users\Adam\Desktop\Programs\18hjphgz.exe[1780] ntdll.dll!NtCreateProcessEx 7703F4E4 5 Bytes CALL 7FFA4734
    .text C:\Users\Adam\Desktop\Programs\18hjphgz.exe[1780] ntdll.dll!NtDeviceIoControlFile 7703F844 5 Bytes CALL 7FFA49B8
    .text C:\Users\Adam\Desktop\Programs\18hjphgz.exe[1780] ntdll.dll!NtOpenFile 7703FBF4 5 Bytes CALL 7FFA471D
    .text C:\Users\Adam\Desktop\Programs\18hjphgz.exe[1780] ntdll.dll!NtQueryInformationProcess 7703FE94 5 Bytes CALL 7FFA4775
    .text C:\Users\Adam\Desktop\Programs\18hjphgz.exe[1780] ntdll.dll!NtCreateUserProcess 770408A4 5 Bytes CALL 7FFA4741
    .text C:\Windows\SYSTEM32\WISPTIS.EXE[1804] ntdll.dll!NtCreateFile 7703F414 5 Bytes CALL 7FFA4698
    .text C:\Windows\SYSTEM32\WISPTIS.EXE[1804] ntdll.dll!NtCreateProcess 7703F4D4 5 Bytes CALL 7FFA4727
    .text C:\Windows\SYSTEM32\WISPTIS.EXE[1804] ntdll.dll!NtCreateProcessEx 7703F4E4 5 Bytes CALL 7FFA4734
    .text C:\Windows\SYSTEM32\WISPTIS.EXE[1804] ntdll.dll!NtDeviceIoControlFile 7703F844 5 Bytes CALL 7FFA49B8
    .text C:\Windows\SYSTEM32\WISPTIS.EXE[1804] ntdll.dll!NtOpenFile 7703FBF4 5 Bytes CALL 7FFA471D
    .text C:\Windows\SYSTEM32\WISPTIS.EXE[1804] ntdll.dll!NtQueryInformationProcess 7703FE94 5 Bytes CALL 7FFA4775
    .text C:\Windows\SYSTEM32\WISPTIS.EXE[1804] ntdll.dll!NtCreateUserProcess 770408A4 5 Bytes CALL 7FFA4741
    .reloc C:\Windows\Explorer.EXE[1860] C:\Windows\Explorer.EXE section is executable [0x012C7000, 0xDA00, 0xE2000040]
    .reloc C:\Windows\Explorer.EXE[1860] C:\Windows\Explorer.EXE entry point in ".reloc" section [0x012CCB44]
    .text C:\Windows\Explorer.EXE[1860] ntdll.dll!NtCreateFile 7703F414 5 Bytes CALL 7FFA4698
    .text C:\Windows\Explorer.EXE[1860] ntdll.dll!NtCreateProcess 7703F4D4 5 Bytes CALL 7FFA4727
    .text C:\Windows\Explorer.EXE[1860] ntdll.dll!NtCreateProcessEx 7703F4E4 5 Bytes CALL 7FFA4734
    .text C:\Windows\Explorer.EXE[1860] ntdll.dll!NtDeviceIoControlFile 7703F844 5 Bytes CALL 7FFA49B8
    .text C:\Windows\Explorer.EXE[1860] ntdll.dll!NtOpenFile 7703FBF4 5 Bytes CALL 7FFA471D
    .text C:\Windows\Explorer.EXE[1860] ntdll.dll!NtQueryInformationProcess 7703FE94 5 Bytes CALL 7FFA4775
    .text C:\Windows\Explorer.EXE[1860] ntdll.dll!NtCreateUserProcess 770408A4 5 Bytes CALL 7FFA4741

    ---- Devices - GMER 1.0.15 ----

    AttachedDevice \Driver\tdx \Device\Tcp aswTdi.SYS (avast! TDI Filter Driver/ALWIL Software)
    AttachedDevice \Driver\tdx \Device\Udp aswTdi.SYS (avast! TDI Filter Driver/ALWIL Software)

    ---- Registry - GMER 1.0.15 ----

    Reg HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows@AppInit_DLLs eNetHook.dll
    Reg HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows@IconServiceLib IconCodecService.dll
    Reg HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows@DdeSendTimeout 0
    Reg HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows@DesktopHeapLogging 1
    Reg HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows@GDIProcessHandleQuota 10000
    Reg HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows@ShutdownWarningDialogTimeout -1
    Reg HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows@USERPostMessageLimit 10000
    Reg HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows@USERProcessHandleQuota 10000
    Reg HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows@ mnmsrvc
    Reg HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows@DeviceNotSelectedTimeout 15
    Reg HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows@Spooler yes
    Reg HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows@TransmissionRetryTimeout 90

    ---- EOF - GMER 1.0.15 ----
     
  14. 2009/05/17
    broni

    broni Moderator Malware Analyst

    Joined:
    2002/08/01
    Messages:
    21,701
    Likes Received:
    116
    GMER looks fine...
     
  15. 2009/05/18
    Aussieboy

    Aussieboy Inactive Thread Starter

    Joined:
    2009/05/16
    Messages:
    23
    Likes Received:
    0
    i followed the steps but the startup repair said i should remove any recently added portable media players and such , but i don't anything connected to laptop but i mouse and the power cord , i removed the mouse and tried the process again but it still said i had to remove and restart to continue/start the repair process.
     
  16. 2009/05/18
    Aussieboy

    Aussieboy Inactive Thread Starter

    Joined:
    2009/05/16
    Messages:
    23
    Likes Received:
    0
    Latest Hijackthis log

    Logfile of Trend Micro HijackThis v2.0.2
    Scan saved at 3:26:19 PM, on 18/05/2009
    Platform: Windows Vista (WinNT 6.00.1904)
    MSIE: Internet Explorer v7.00 (7.00.6000.16764)
    Boot mode: Safe mode with network support

    Running processes:
    C:\Windows\SYSTEM32\WISPTIS.EXE
    C:\Windows\Explorer.EXE
    C:\Program Files\Mozilla Firefox\firefox.exe
    C:\Users\Adam\Desktop\Programs\HijackThis.exe

    R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = http://au.rd.yahoo.com/customize/ycomp/defaults/sp/*http://au.yahoo.com
    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.da-forums.org/index.php
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
    R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://en.au.acer.yahoo.com
    R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant =
    R0 - HKLM\Software\Microsoft\Internet Explorer\Search,CustomizeSearch =
    R1 - HKCU\Software\Microsoft\Internet Explorer\SearchURL,(Default) = http://au.rd.yahoo.com/customize/ycomp/defaults/su/*http://au.yahoo.com
    R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = *.local
    R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName =
    R3 - URLSearchHook: Winamp Search Class - {57BCA5FA-5DBB-45a2-B558-1755C3F6253B} - C:\Program Files\Winamp Toolbar\winamptb.dll
    R3 - URLSearchHook: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\Program Files\Yahoo!\Companion\Installs\cpn\yt.dll
    O2 - BHO: Windows Live Toolbar Helper - {BDBD1DAD-C946-4A17-ADC1-64B5B4FF55D0} - C:\Program Files\Windows Live Toolbar\msntb.dll
    O3 - Toolbar: Acer eDataSecurity Management - {5CBE3B7C-1E47-477e-A7DD-396DB0476E29} - C:\Windows\system32\eDStoolbar.dll
    O3 - Toolbar: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\Program Files\Yahoo!\Companion\Installs\cpn\yt.dll
    O3 - Toolbar: Windows Live Toolbar - {BDAD1DAD-C946-4A17-ADC1-64B5B4FF55D0} - C:\Program Files\Windows Live Toolbar\msntb.dll
    O3 - Toolbar: Winamp Toolbar - {EBF2BA02-9094-4c5a-858B-BB198F3D8DE2} - C:\Program Files\Winamp Toolbar\winamptb.dll
    O3 - Toolbar: BearShare MediaBar - {D3DEE18F-DB64-4BEB-9FF1-E1F0A5033E4A} - C:\Program Files\BearShare Applications\BearShare MediaBar\BearShareMediaBar.dll
    O3 - Toolbar: &Google Toolbar - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - C:\Program Files\Google\Google Toolbar\GoogleToolbar.dll
    O4 - HKLM\..\Run: [Persistence] C:\Windows\system32\igfxpers.exe
    O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre6\bin\jusched.exe "
    O4 - HKLM\..\Run: [LManager] C:\PROGRA~1\LAUNCH~1\LManager.exe
    O4 - HKLM\..\Run: [eDataSecurity Loader] C:\Acer\Empowering Technology\eDataSecurity\eDSloader.exe
    O4 - HKLM\..\Run: [MSConfig] "C:\Windows\system32\msconfig.exe" /auto
    O4 - HKLM\..\Run: [avast!] C:\PROGRA~1\ALWILS~1\Avast4\ashDisp.exe
    O4 - HKCU\..\Run: [SpybotSD TeaTimer] C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
    O4 - HKCU\..\Run: [uTorrent] "C:\Program Files\uTorrent\uTorrent.exe "
    O4 - HKUS\S-1-5-21-1275490929-3834731154-2838317729-1000\..\Run: [SpybotSD TeaTimer] C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe (User '?')
    O4 - HKUS\S-1-5-21-1275490929-3834731154-2838317729-1000\..\Run: [uTorrent] "C:\Program Files\uTorrent\uTorrent.exe" (User '?')
    O8 - Extra context menu item: &Winamp Search - C:\ProgramData\Winamp Toolbar\ieToolbar\resources\en-US\local\search.html
    O8 - Extra context menu item: &Windows Live Search - res://C:\Program Files\Windows Live Toolbar\msntb.dll/search.htm
    O8 - Extra context menu item: Add to Windows &Live Favorites - http://favorites.live.com/quickadd.aspx
    O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\Office12\EXCEL.EXE/3000
    O9 - Extra button: Send to OneNote - {2670000A-7350-4f3c-8081-5663EE0C6C49} - C:\PROGRA~1\MICROS~2\Office12\ONBttnIE.dll
    O9 - Extra 'Tools' menuitem: S&end to OneNote - {2670000A-7350-4f3c-8081-5663EE0C6C49} - C:\PROGRA~1\MICROS~2\Office12\ONBttnIE.dll
    O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\Office12\REFIEBAR.DLL
    O9 - Extra button: (no name) - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
    O9 - Extra 'Tools' menuitem: Spybot - Search & Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
    O13 - Gopher Prefix:
    O18 - Protocol: grooveLocalGWS - {88FED34C-F0CA-4636-A375-3CB6248B04CD} - C:\Program Files\Microsoft Office\Office12\GrooveSystemServices.dll
    O23 - Service: ALaunch Service (ALaunchService) - Unknown owner - C:\Acer\ALaunch\ALaunchSvc.exe (file missing)
    O23 - Service: @%SystemRoot%\system32\Alg.exe,-112 (ALG) - Unknown owner - C:\Windows\System32\alg.exe (file missing)
    O23 - Service: Apple Mobile Device - Apple Inc. - C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
    O23 - Service: avast! iAVS4 Control Service (aswUpdSv) - ALWIL Software - C:\Program Files\Alwil Software\Avast4\aswUpdSv.exe
    O23 - Service: avast! Antivirus - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashServ.exe
    O23 - Service: avast! Mail Scanner - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe
    O23 - Service: avast! Web Scanner - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashWebSv.exe
    O23 - Service: Bonjour Service - Apple Inc. - C:\Program Files\Bonjour\mDNSResponder.exe
    O23 - Service: CyberLink Background Capture Service (CBCS) (CLCapSvc) - Unknown owner - C:\Program Files\Acer\Acer Arcade\Kernel\TV\CLCapSvc.exe (file missing)
    O23 - Service: CyberLink Task Scheduler (CTS) (CLSched) - Unknown owner - C:\Program Files\Acer\Acer Arcade\Kernel\TV\CLSched.exe (file missing)
    O23 - Service: CyberLink Media Library Service - Unknown owner - C:\Program Files\Acer\Acer Arcade\Kernel\CLML_NTService\CLMLServer.exe (file missing)
    O23 - Service: eDataSecurity Service - Unknown owner - C:\Acer\Empowering Technology\eDataSecurity\eDSService.exe (file missing)
    O23 - Service: eLock Service (eLockService) - Unknown owner - C:\Acer\Empowering Technology\eLock\Service\eLockServ.exe (file missing)
    O23 - Service: eNet Service - Unknown owner - C:\Acer\Empowering Technology\eNet\eNet Service.exe (file missing)
    O23 - Service: eRecovery Service (eRecoveryService) - Unknown owner - C:\Acer\Empowering Technology\eRecovery\eRecoveryService.exe (file missing)
    O23 - Service: eSettings Service (eSettingsService) - Unknown owner - C:\Acer\Empowering Technology\eSettings\Service\capuserv.exe (file missing)
    O23 - Service: InstallDriver Table Manager (IDriverT) - Unknown owner - C:\Program Files\Common Files\InstallShield\Driver\1050\Intel 32\IDriverT.exe (file missing)
    O23 - Service: iPod Service - Apple Inc. - C:\Program Files\iPod\bin\iPodService.exe
    O23 - Service: Lavasoft Ad-Aware Service - Lavasoft - C:\Program Files\Lavasoft\Ad-Aware\AAWService.exe
    O23 - Service: MobilityService - Unknown owner - C:\Acer\Mobility Center\MobilityService.exe (file missing)
    O23 - Service: nProtect GameGuard Service (npggsvc) - Unknown owner - C:\Windows\system32\GameMon.des.exe (file missing)
    O23 - Service: Remote Packet Capture Protocol v.0 (experimental) (rpcapd) - Unknown owner - C:\Program Files\WinPcap\rpcapd.exe (file missing)
    O23 - Service: Windows Live Setup Service (WLSetupSvc) - Unknown owner - C:\Program Files\Windows Live\installer\WLSetupSvc.exe (file missing)
    O23 - Service: ePower Service (WMIService) - Unknown owner - C:\Acer\Empowering Technology\ePower\ePowerSvc.exe (file missing)
    O23 - Service: @%ProgramFiles%\Windows Media Player\wmpnetwk.exe,-101 (WMPNetworkSvc) - Unknown owner - C:\Program Files\Windows Media Player\wmpnetwk.exe (file missing)
    O23 - Service: @%systemroot%\system32\SearchIndexer.exe,-103 (WSearch) - Unknown owner - C:\Windows\system32\SearchIndexer.exe (file missing)
    O23 - Service: XAudioService - Unknown owner - C:\Windows\system32\DRIVERS\xaudio.exe (file missing)

    --
    End of file - 8351 bytes
     
  17. 2009/05/18
    broni

    broni Moderator Malware Analyst

    Joined:
    2002/08/01
    Messages:
    21,701
    Likes Received:
    116
    Hmmm...I have no idea what's happening here.
    In this case, we may need to take another approach, which will brings you back a little.
    Boot to Safe Mode, and use System Restore with a date prior to installing Avast.
    It'll obviously bring some infection back, so we'll have to repeat some steps.
    If after using System Restore you can boot to normal mode, do so.
    Reinstall Avast, but this time don't allow it to run boot scan.
    Run regular scan though, after updating Avast.

    When done, re-run Super, Bytes, and HJT.
    Post all logs.

    Oh, you may need to re-run Norton Removal Tool as well.
     
  18. 2009/05/18
    broni

    broni Moderator Malware Analyst

    Joined:
    2002/08/01
    Messages:
    21,701
    Likes Received:
    116
    I need to go to bed now, but you have a lot of things to do :)
     
  19. 2009/05/18
    Aussieboy

    Aussieboy Inactive Thread Starter

    Joined:
    2009/05/16
    Messages:
    23
    Likes Received:
    0
    sorry about that , i didn't read the whole thing , the top said that their weren't any startup problems to fix and that it was fine but i tried to start normally and still got nothing. I still got to the log on screen , entered my password then the background came up and that is it nothing else.
     
  20. 2009/05/18
    Aussieboy

    Aussieboy Inactive Thread Starter

    Joined:
    2009/05/16
    Messages:
    23
    Likes Received:
    0
    Problem is i went to system restore i have no earlier points , in fact i dont have any at all when i am pretty sure i did :(

    well ill leave to sleep , ill wait for a reply on what to do next.
     
  21. 2009/05/18
    broni

    broni Moderator Malware Analyst

    Joined:
    2002/08/01
    Messages:
    21,701
    Likes Received:
    116
    Can you post exact message, maybe a screenshot?
    Did you remove mouse while computer was off?
     

Share This Page

  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.