Page 1 of 2 12 LastLast
Results 1 to 10 of 13

Thread: Clean At Last?

  1. #1
    Member
    Join Date
    Jul 2011
    Posts
    6
    Points
    0

    Default Clean At Last?

    Logfile of Trend Micro HijackThis v2.0.4
    Scan saved at 12:12:35 PM, on 7/25/2011
    Platform: Windows XP SP3 (WinNT 5.01.2600)
    MSIE: Internet Explorer v8.00 (8.00.6001.18702)
    Boot mode: Normal

    Running processes:
    C:\WINDOWS\System32\smss.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\services.exe
    C:\WINDOWS\system32\lsass.exe
    C:\WINDOWS\system32\svchost.exe
    C:\Program Files\Ahead\InCD\InCDsrv.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\system32\spoolsv.exe
    C:\WINDOWS\Explorer.EXE
    C:\Program Files\Common Files\Acronis\Schedule2\schedul2.exe
    C:\Program Files\Common Files\Acronis\Schedule2\schedhlp.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\System32\svchost.exe
    C:\Program Files\Norton Internet Security\Engine\18.6.0.29\ccSvcHst.exe
    C:\WINDOWS\system32\IoctlSvc.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\System32\svchost.exe
    C:\Program Files\Norton Internet Security\Engine\18.6.0.29\ccSvcHst.exe
    C:\WINDOWS\system32\dla\tfswctrl.exe
    C:\Program Files\Acronis\DriveMonitor\adm_tray.exe
    C:\Program Files\Norton Utilities 14\nu.exe
    C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
    C:\Program Files\Common Files\Nikon\Monitor\NkMonitor.exe
    C:\Program Files\Mozilla Firefox\firefox.exe
    C:\Program Files\Mozilla Firefox\plugin-container.exe
    C:\Program Files\Trend Micro\HiJackThis\HiJackThis.exe

    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = about:blank
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = MSN.com
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = Bing
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = Bing
    R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = MSN.com
    R1 - HKCU\Software\Microsoft\Internet Explorer\SearchURL,(Default) = %s - Yahoo! Search Results
    R3 - URLSearchHook: McAfee SiteAdvisor Toolbar - {0EBBBE48-BAD4-4B4C-8E5A-516ABECAE064} - (no file)
    O2 - BHO: AcroIEHelperStub - {18DF081C-E8AD-4283-A596-FA578C2EBDC3} - C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelperShim.dll
    O2 - BHO: Symantec NCO BHO - {602ADB0E-4AFF-4217-8AA1-95DAC4DFA408} - C:\Program Files\Norton Internet Security\Engine\18.6.0.29\coIEPlg.dll
    O2 - BHO: Symantec Intrusion Prevention - {6D53EC84-6AAE-4787-AEEE-F4628F01010C} - C:\Program Files\Norton Internet Security\Engine\18.6.0.29\IPS\IPSBHO.DLL
    O2 - BHO: McAfee SiteAdvisor BHO - {B164E929-A1B6-4A06-B104-2CD0E90A88FF} - (no file)
    O3 - Toolbar: Norton Toolbar - {7FEBEFE3-6B19-4349-98D2-FFB09D4B49CA} - C:\Program Files\Norton Internet Security\Engine\18.6.0.29\coIEPlg.dll
    O3 - Toolbar: McAfee SiteAdvisor Toolbar - {0EBBBE48-BAD4-4B4C-8E5A-516ABECAE064} - (no file)
    O4 - HKLM\..\Run: [NeroFilterCheck] C:\WINDOWS\system32\NeroCheck.exe
    O4 - HKLM\..\Run: [OneTouch Monitor] C:\Program Files\Visioneer OneTouch\OneTouchMon.exe
    O4 - HKLM\..\Run: [dla] C:\WINDOWS\system32\dla\tfswctrl.exe
    O4 - HKLM\..\Run: [DVDBitSet] "C:\Program Files\HP CD-DVD\Umbrella\DVDBitSet.exe" /NOUI
    O4 - HKLM\..\Run: [KernelFaultCheck] %systemroot%\system32\dumprep 0 -k
    O4 - HKLM\..\Run: [Adobe ARM] "C:\Program Files\Common Files\Adobe\ARM\1.0\AdobeARM.exe"
    O4 - HKLM\..\Run: [adm_tray.exe] C:\Program Files\Acronis\DriveMonitor\adm_tray.exe
    O4 - HKLM\..\Run: [Acronis Scheduler2 Service] "C:\Program Files\Common Files\Acronis\Schedule2\schedhlp.exe"
    O4 - HKLM\..\Run: [Adobe Reader Speed Launcher] "C:\Program Files\Adobe\Reader 9.0\Reader\Reader_sl.exe"
    O4 - HKLM\..\RunOnce: [Malwarebytes' Anti-Malware] C:\Program Files\Malwarebytes' Anti-Malware\mbamgui.exe /install /silent
    O4 - HKCU\..\Run: [NortonUtilities] C:\Program Files\Norton Utilities 14\nu.exe /QS
    O4 - HKCU\..\Run: [SUPERAntiSpyware] C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
    O4 - Global Startup: Adobe Gamma Loader.lnk = C:\Program Files\Common Files\Adobe\Calibration\Adobe Gamma Loader.exe
    O4 - Global Startup: Nikon Monitor.lnk = C:\Program Files\Common Files\Nikon\Monitor\NkMonitor.exe
    O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
    O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
    O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O17 - HKLM\System\CCS\Services\Tcpip\..\{18F09D07-36C4-4AC6-A475-1CD709D5A90C}: NameServer = 209.244.0.3 209.244.0.4
    O17 - HKLM\System\CS1\Services\Tcpip\..\{18F09D07-36C4-4AC6-A475-1CD709D5A90C}: NameServer = 209.244.0.3 209.244.0.4
    O18 - Protocol: dssrequest - {5513F07E-936B-4E52-9B00-067394E91CC5} - (no file)
    O18 - Protocol: sacore - {5513F07E-936B-4E52-9B00-067394E91CC5} - (no file)
    O20 - Winlogon Notify: !SASWinLogon - C:\Program Files\SUPERAntiSpyware\SASWINLO.DLL
    O22 - SharedTaskScheduler: Browseui preloader - {438755C2-A8BA-11D1-B96B-00A0C90312E1} - C:\WINDOWS\system32\browseui.dll
    O22 - SharedTaskScheduler: Component Categories cache daemon - {8C7461EF-2B13-11d2-BE35-3078302C2030} - C:\WINDOWS\system32\browseui.dll
    O23 - Service: Acronis Scheduler2 Service (AcrSch2Svc) - Acronis - C:\Program Files\Common Files\Acronis\Schedule2\schedul2.exe
    O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
    O23 - Service: InCD Helper (read only) (InCDsrvR) - Nero AG - C:\Program Files\Ahead\InCD\InCDsrv.exe
    O23 - Service: McAfee SiteAdvisor Service - Unknown owner - c:\PROGRA~1\mcafee\siteadvisor\mcsacore.exe (file missing)
    O23 - Service: Norton Internet Security (NIS) - Symantec Corporation - C:\Program Files\Norton Internet Security\Engine\18.6.0.29\ccSvcHst.exe
    O23 - Service: PLFlash DeviceIoControl Service - Prolific Technology Inc. - C:\WINDOWS\system32\IoctlSvc.exe

    --
    End of file - 6243 bytes

    SUPERAntiSpyware Scan Log
    SUPERAntiSpyware.com | Remove Malware | Remove Spyware - AntiMalware, AntiSpyware, AntiAdware!

    Generated 07/24/2011 at 10:48 PM

    Application Version : 4.55.1000

    Core Rules Database Version : 7373
    Trace Rules Database Version: 5185

    Scan type : Complete Scan
    Total Scan Time : 06:09:17

    Memory items scanned : 480
    Memory threats detected : 0
    Registry items scanned : 6714
    Registry threats detected : 6
    File items scanned : 109316
    File threats detected : 15

    Trojan.Agent/Gen
    HKLM\System\ControlSet001\Services\utezmtu5
    C:\WINDOWS\SYSTEM32\DRIVERS\UTEZMTU5.SYS
    HKLM\System\ControlSet001\Enum\Root\LEGACY_utezmtu5
    HKLM\System\ControlSet003\Services\utezmtu5
    HKLM\System\ControlSet003\Enum\Root\LEGACY_utezmtu5
    HKLM\System\CurrentControlSet\Services\utezmtu5
    HKLM\System\CurrentControlSet\Enum\Root\LEGACY_utezmtu5

    Adware.Tracking Cookie
    adimages.scrippsnetworks.com [ C:\Documents and Settings\anon\Application Data\Macromedia\Flash Player\#SharedObjects\7HPAAU84 ]
    ia.media-imdb.com [ C:\Documents and Settings\anon\Application Data\Macromedia\Flash Player\#SharedObjects\7HPAAU84 ]
    msnbcmedia.msn.com [ C:\Documents and Settings\anon\Application Data\Macromedia\Flash Player\#SharedObjects\7HPAAU84 ]
    pornokub.com [ C:\Documents and Settings\anon\Application Data\Macromedia\Flash Player\#SharedObjects\7HPAAU84 ]
    s0.2mdn.net [ C:\Documents and Settings\anon\Application Data\Macromedia\Flash Player\#SharedObjects\7HPAAU84 ]
    www.naiadsystems.com [ C:\Documents and Settings\anon\Application Data\Macromedia\Flash Player\#SharedObjects\7HPAAU84 ]
    C:\Documents and Settings\anon\Cookies\anon@media6degrees[2].txt
    naiadsystems.com [ D:\WINDOWS\Application Data\Macromedia\Flash Player\#SharedObjects\NXR9C79M ]

    Trojan.Dropper/Win-NV
    C:\WINDOWS\SYSBCKUP\MSVIDEO.DLL

    Trojan.Agent/Gen-Krpytik
    D:\SYSTEM VOLUME INFORMATION\_RESTORE{C03FAA9C-525D-4194-8D8E-D9603381FD03}\RP23\A0001439.DLL
    D:\SYSTEM VOLUME INFORMATION\_RESTORE{C03FAA9C-525D-4194-8D8E-D9603381FD03}\RP23\A0001440.DLL
    D:\SIERRA\ICR2\TIMER95.DLL
    D:\SIERRA\ICR2\COMM95.DLL

    Trojan.Agent/Gen-FakeAlert
    E:\COPIED FROM C\CDRWS\CD-RW 9\RECOVERED FILES\ICQ\ICQUNINSTALL.EXE

    Malwarebytes' Anti-Malware 1.51.1.1800
    Malwarebytes : Free anti-malware, anti-virus and spyware removal download

    Database version: 7272

    Windows 5.1.2600 Service Pack 3
    Internet Explorer 8.0.6001.18702

    7/25/2011 11:28:09 AM
    mbam-log-2011-07-25 (11-28-08).txt

    Scan type: Full scan (C:\|D:\|E:\|)
    Objects scanned: 635975
    Time elapsed: 4 hour(s), 45 minute(s), 40 second(s)

    Memory Processes Infected: 0
    Memory Modules Infected: 0
    Registry Keys Infected: 0
    Registry Values Infected: 0
    Registry Data Items Infected: 0
    Folders Infected: 0
    Files Infected: 0

    Memory Processes Infected:
    (No malicious items detected)

    Memory Modules Infected:
    (No malicious items detected)

    Registry Keys Infected:
    (No malicious items detected)

    Registry Values Infected:
    (No malicious items detected)

    Registry Data Items Infected:
    (No malicious items detected)

    Folders Infected:
    (No malicious items detected)

    Files Infected:
    (No malicious items detected)

  2. #2
    Member Spyware Fighter
    Join Date
    Jun 2010
    Location
    Bement,Ill USA
    Posts
    1,340
    Points
    146

    Default

    Hello and welcome to Help2Go

    We apologize for the delay in responding to your request for help. Here at Help2Go we get overwhelmed at times, and we are trying our best to keep up. Please note that your topic was not intentionally overlooked. Our mission is to help everyone in need, but sometimes it takes just a little longer to get to every request for help. No one is ignored here.

    Please take note:

    1. If you have since resolved the original problem you were having, we would appreciate you letting us know.
    2. If you are unable to create a log because your computer cannot start up successfully please provide detailed information about your installed Windows Operating System including the Version, Edition and if it is a 32bit or a 64bit system.
      • If you are unsure about any of these characteristics just post what you can and we will guide you.
    3. Please tell us if you have your original Windows CD/DVD available.
    4. If you are unable to perform the steps we have recommended please try one more time and if unsuccessful alert us of such and we will design an alternate means of obtaining the necessary information.
    5. If you have not done so, include a clear description of the problems you're having, along with any steps you may have performed so far.
    6. Upon completing the steps below another staff member will review your topic an do their best to resolve your issues.
    7. If you have already posted a DDS log, please do so again, as your situation may have changed.
    8. Use the 'Add Reply' and add the new log to this thread.


    We need to see some information about what is happening in your machine. Please perform the following scan again:

    • Download DDS by sUBs from one of the following links if you no longer have it available. Save it to your desktop.
    • Double click on the DDS icon, allow it to run.
    • A small box will open, with an explanation about the tool. No input is needed, the scan is running.
    • Notepad will open with the results.
    • Follow the instructions that pop up for posting the results.
    • Close the program window, and delete the program from your desktop.
    Please note: You may have to disable any script protection running if the scan fails to run. After downloading the tool, disconnect from the internet and disable all antivirus protection. Run the scan, enable your A/V and reconnect to the internet.

    Information on A/V control HERE


    We also need a new log from the GMER anti-rootkit Scanner.

    Please note that if you are running a 64-bit version of Windows you will not be able to run GMER and you may skip this step. Then proceed to run aswMbr.exe as noted below.

    Please first disable any CD emulation programs using the steps found in this topic:

    Then create another GMER log and post it as an attachment to the reply where you post your new DDS log. Instructions on how to properly create a GMER log can be found here:


    Note:
    If you are unable to run a Gmer scan due the fact you are running a 64bit machine please run the following tool and post its log.

    Please download aswMBR ( 511KB ) to your desktop.
    • Double click the aswMBR.exe icon to run it
    • Click the Scan button to start the scan
    • On completion of the scan, click the save log button, save it to your desktop and post it in your next reply.




    Thanks and again sorry for the delay.
    " Extinguishing Malware from the world"

    The Spware Help forum is very busy. If I'm helping you and I've not posted back within 24 hrs., send a PM with your topic link. Thank you.
    HELP REQUESTS VIA THE PM SYSTEM WILL BE IGNORED. The Forums are there for a reason!
    Thanks-




  3. #3
    Member
    Join Date
    Jul 2011
    Posts
    6
    Points
    0

    Default Sorry

    I'm sorry that after spending more than half a day collecting the information you requested (each of the scans took about 6 hours to complete), 'you' are unable to use that information to confirm or deny that my system does or does not have any remaining spyware. At least Superantispyware found some things Norton Internet security suite didn't find or stop.

  4. #4
    Member Spyware Fighter
    Join Date
    Jun 2010
    Location
    Bement,Ill USA
    Posts
    1,340
    Points
    146

    Default

    Hello,

    In the Spware community there is not one single tool that can tell whether you are clean or not. The tools I wanted you to run where to gather information about what is on your machine not a tool designed for finding and removing anything. We don't just have you run tools for the fun of it. Sometime it may take multiple tools and multiple times of running them in different ways to find and clean your system. If you don't want to run the additional tools then I will consider this topic closed and you you no longer want our help.
    " Extinguishing Malware from the world"

    The Spware Help forum is very busy. If I'm helping you and I've not posted back within 24 hrs., send a PM with your topic link. Thank you.
    HELP REQUESTS VIA THE PM SYSTEM WILL BE IGNORED. The Forums are there for a reason!
    Thanks-




  5. #5
    Member
    Join Date
    Jul 2011
    Posts
    6
    Points
    0

    Default

    .
    UNLESS SPECIFICALLY INSTRUCTED, DO NOT POST THIS LOG.
    IF REQUESTED, ZIP IT UP & ATTACH IT
    .
    DDS (Ver_2011-06-23.01)
    .
    Microsoft Windows XP Home Edition
    Boot Device: \Device\HarddiskVolume1
    Install Date: 11/15/2009 3:56:48 PM
    System Uptime: 8/1/2011 4:01:20 PM (53 hours ago)
    Processor: Intel(R) Celeron(TM) CPU 1200MHz | | 1202/mhz
    .
    ==== Disk Partitions =========================
    .
    A: is Removable
    C: is FIXED (NTFS) - 37 GiB total, 1.182 GiB free.
    D: is FIXED (FAT32) - 23 GiB total, 11.676 GiB free.
    E: is FIXED (FAT32) - 92 GiB total, 15.457 GiB free.
    F: is CDROM ()
    .
    ==== Disabled Device Manager Items =============
    .
    Class GUID: {4D36E971-E325-11CE-BFC1-08002BE10318}
    Description: Officejet Pro 8000 A809
    Device ID: ROOT\MULTIFUNCTION\0000
    Manufacturer: HP
    Name: Officejet Pro 8000 A809
    PNP Device ID: ROOT\MULTIFUNCTION\0000
    Service:
    .
    ==== System Restore Points ===================
    .
    RP449: 6/16/2011 12:22:58 PM - System Checkpoint
    RP450: 6/17/2011 12:06:53 PM - Made by Norton Utilities O
    RP451: 6/19/2011 9:33:12 AM - Made by Norton Utilities O
    RP452: 6/21/2011 11:15:14 AM - System Checkpoint
    RP453: 6/23/2011 4:04:53 PM - Made by Norton Utilities O
    RP454: 6/27/2011 6:27:04 PM - Made by Norton Utilities O
    RP455: 6/28/2011 8:42:23 AM - Made by Norton Utilities O
    RP456: 6/28/2011 4:28:22 PM - Made by Norton Utilities O
    RP457: 7/1/2011 2:49:39 AM - Software Distribution Service 3.0
    RP458: 7/1/2011 5:19:58 AM - Made by Norton Utilities O
    RP459: 7/4/2011 8:33:58 AM - Made by Norton Utilities O
    RP460: 7/6/2011 9:59:09 PM - Made by Norton Utilities O
    RP461: 7/11/2011 2:12:27 PM - Made by Norton Utilities O
    RP462: 7/13/2011 4:35:50 AM - Made by Norton Utilities O
    RP463: 7/18/2011 9:35:08 AM - Made by Norton Utilities O
    RP464: 7/19/2011 12:33:05 PM - Made by Norton Utilities O
    RP465: 7/21/2011 8:16:39 PM - Made by Norton Utilities O
    RP466: 7/23/2011 8:58:25 PM - Made by Norton Utilities O
    RP467: 7/24/2011 11:56:53 AM - Made by Norton Utilities O
    RP468: 7/24/2011 12:38:20 PM - Made by Norton Utilities O
    RP469: 7/25/2011 5:31:27 AM - Made by Norton Utilities O
    RP470: 7/25/2011 11:51:03 AM - Installed HiJackThis
    RP471: 7/25/2011 2:24:15 PM - Made by Norton Utilities O
    RP472: 7/25/2011 4:56:27 PM - Made by Norton Utilities O
    RP473: 7/27/2011 12:56:10 PM - Made by Norton Utilities O
    RP474: 7/29/2011 1:21:50 PM - Made by Norton Utilities O
    RP475: 8/1/2011 4:19:12 PM - Made by Norton Utilities O
    .
    ==== Installed Programs ======================
    .
    .
    ==== Event Viewer Messages From Past Week ========
    .
    .
    ==== End Of File ===========================


    GMER 1.0.15.15641 - GMER - Rootkit Detector and Remover
    Rootkit scan 2011-08-03 23:05:12
    Windows 5.1.2600 Service Pack 3 Harddisk0\DR0 -> \Device\Ide\IdeDeviceP0T0L0-4 MAXTOR_6L040J2 rev.A93.0500
    Running: gmer.exe; Driver: C:\Documents and Settings\anon\Local Settings\Temp\pxldqpow.sys


    ---- System - GMER 1.0.15 ----

    SSDT 82CBBFD0

    ZwAlertResumeThread
    SSDT 82BBBEC0

    ZwAlertThread
    SSDT 82A41408

    ZwAllocateVirtualMemory
    SSDT 82A41158

    ZwAssignProcessToJobObject
    SSDT 82C580E8

    ZwConnectPort
    SSDT \??\C:\WINDOWS\system32\Drivers\SYMEVENT.SYS (Symantec Event Library/Symantec Corporation)

    ZwCreateKey [0xF5E3D710]
    SSDT 82BA1E40

    ZwCreateMutant
    SSDT 82C7E568

    ZwCreateSymbolicLinkObject
    SSDT 82B4E1A0

    ZwCreateThread
    SSDT 82A41008

    ZwDebugActiveProcess
    SSDT \??\C:\WINDOWS\system32\Drivers\SYMEVENT.SYS (Symantec Event Library/Symantec Corporation)

    ZwDeleteKey [0xF5E3D990]
    SSDT \??\C:\WINDOWS\system32\Drivers\SYMEVENT.SYS (Symantec Event Library/Symantec Corporation)

    ZwDeleteValueKey [0xF5E3DEF0]
    SSDT 82A49CF0

    ZwDuplicateObject
    SSDT 82C392C8

    ZwFreeVirtualMemory
    SSDT 82BA1F10

    ZwImpersonateAnonymousToken
    SSDT 82BA1FD0

    ZwImpersonateThread
    SSDT 82C287B8

    ZwLoadDriver
    SSDT 82C1F0B0

    ZwMapViewOfSection
    SSDT 82BF5F48

    ZwOpenEvent
    SSDT 82AE0280

    ZwOpenProcess
    SSDT 82D0F170

    ZwOpenProcessToken
    SSDT 82A82E68

    ZwOpenSection
    SSDT 82C1C430

    ZwOpenThread
    SSDT 82A41068

    ZwProtectVirtualMemory
    SSDT 82BA6A98

    ZwResumeThread
    SSDT 82ACD248

    ZwSetContextThread
    SSDT 82ACD308

    ZwSetInformationProcess
    SSDT 82CC9120

    ZwSetSystemInformation
    SSDT \??\C:\WINDOWS\system32\Drivers\SYMEVENT.SYS (Symantec Event Library/Symantec Corporation)

    ZwSetValueKey [0xF5E3E140]
    SSDT 82BF5E88

    ZwSuspendProcess
    SSDT 82BA6AD0

    ZwSuspendThread
    SSDT \??\C:\Program Files\SUPERAntiSpyware\SASKUTIL.SYS (SASKUTIL.SYS/SUPERAdBlocker.com and SUPERAntiSpyware.com)

    ZwTerminateProcess [0xF5D21620]
    SSDT 82C57290

    ZwTerminateThread
    SSDT 82CDBC68

    ZwUnmapViewOfSection
    SSDT 82C49D38

    ZwWriteVirtualMemory

    ---- Kernel code sections - GMER 1.0.15 ----

    .text ntoskrnl.exe!_abnormal_termination + C8

    804E2734 4 Bytes CALL 86D0ECB9
    ? SYMDS.SYS

    The system cannot find the file specified. !
    ? SYMEFA.SYS

    The system cannot find the file specified. !
    ? C:\WINDOWS\system32\13.tmp

    The system cannot find the file specified. !
    ? C:\Documents and Settings\anon\Local Settings\Temp\mbr.sys

    The system cannot find the file specified. !

    ---- User code sections - GMER 1.0.15 ----

    .text C:\Program Files\Mozilla Firefox\firefox.exe[188] ntdll.dll!NtMapViewOfSection

    7C90D51E 5 Bytes JMP 0277003A
    .text C:\Program Files\Mozilla Firefox\firefox.exe[188] ntdll.dll!NtSetInformationProcess

    7C90DC9E 5 Bytes JMP 027700F7
    .text C:\Program Files\Mozilla Firefox\firefox.exe[188] ntdll.dll!LdrLoadDll

    7C91632D 5 Bytes JMP 004013F0 C:\Program Files\Mozilla Firefox\firefox.exe (Firefox/Mozilla Corporation)
    .text C:\Program Files\Mozilla Firefox\firefox.exe[188] kernel32.dll!VirtualProtectEx + 6E

    7C801ACF 7 Bytes JMP 027703D2
    .text C:\Program Files\Mozilla Firefox\firefox.exe[188] kernel32.dll!ReadProcessMemory + 3E

    7C80220E 7 Bytes JMP 027701B0
    .text C:\Program Files\Mozilla Firefox\firefox.exe[188] kernel32.dll!lstrlenW + 43

    7C809AEC 7 Bytes JMP 0277031C
    .text C:\Program Files\Mozilla Firefox\firefox.exe[188] kernel32.dll!GetVersionExA + D3

    7C812C51 7 Bytes JMP 02770488
    .text C:\Program Files\Mozilla Firefox\firefox.exe[188] kernel32.dll!GetProcessHandleCount + 35

    7C86229F 7 Bytes JMP 02770266
    .text C:\Program Files\Mozilla Firefox\plugin-container.exe[864] USER32.dll!TrackPopupMenu

    7E46531E 5 Bytes JMP 104089D7 C:\Program Files\Mozilla Firefox\xul.dll (Mozilla Foundation)

    ---- Registry - GMER 1.0.15 ----

    Reg HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\ProfileList\S-1-5-18@RefCount 1

    ---- Files - GMER 1.0.15 ----

    File C:\WINDOWS\explorer.exe

    (size mismatch) 1004032/1033728 bytes executable
    File C:\WINDOWS\system32\ir50_qcx.dll

    (size mismatch) 183808/181760 bytes executable
    File C:\WINDOWS\system32\drivers\incdrm.sys

    (size mismatch) 22848/28672 bytes executable
    File C:\WINDOWS\system32\divx.dll

    (size mismatch) 2024448/639066 bytes executable
    File C:\WINDOWS\system32\hal.dll

    (size mismatch) 127872/131840 bytes executable
    File C:\WINDOWS\system32\ir50_qc.dll

    (size mismatch) 200192/198144 bytes executable

    ---- EOF - GMER 1.0.15 ----

    aswMBR version 0.9.8.978 Copyright(c) 2011 AVAST Software
    Run date: 2011-08-03 23:08:00
    -----------------------------
    23:08:00.406 OS Version: Windows 5.1.2600 Service Pack 3
    23:08:00.406 Number of processors: 1 586 0xB01
    23:08:00.421 ComputerName: CELERON UserName: anon
    23:08:35.890 Initialize success
    23:10:34.406 AVAST engine download error: 0
    23:11:52.578 Disk 0 (boot) \Device\Harddisk0\DR0 -> \Device\Ide\IdeDeviceP0T0L0-4
    23:11:52.578 Disk 0 Vendor: MAXTOR_6L040J2 A93.0500 Size: 38172MB BusType: 3
    23:11:52.593 Disk 1 \Device\Harddisk1\DR1 -> \Device\Ide\IdeDeviceP0T1L0-c
    23:11:52.593 Disk 1 Vendor: Maxtor_6Y120P0 YAR41BW0 Size: 117246MB BusType: 3
    23:11:54.593 Disk 0 MBR read successfully
    23:11:54.593 Disk 0 MBR scan
    23:11:54.593 Disk 0 Windows XP default MBR code
    23:11:54.687 Disk 0 scanning sectors +78172290
    23:11:55.031 Disk 0 scanning C:\WINDOWS\system32\drivers
    23:12:40.796 File: C:\WINDOWS\system32\drivers\incdrm.sys **SUSPICIOUS**
    23:13:14.640 Service scanning
    23:13:18.156 Modules scanning
    23:13:57.843 Disk 0 trace - called modules:
    23:13:57.859 ntoskrnl.exe CLASSPNP.SYS disk.sys ACPI.sys hal.dll atapi.sys intelide.sys PCIIDEX.SYS
    23:13:57.859 1 nt!IofCallDriver -> \Device\Harddisk0\DR0[0x82fa4ab8]
    23:13:57.859 3 CLASSPNP.SYS[f8786fd7] -> nt!IofCallDriver -> \Device\0000005f[0x82fcd908]
    23:13:57.875 5 ACPI.sys[f86ed620] -> nt!IofCallDriver -> \Device\Ide\IdeDeviceP0T0L0-4[0x82fce940]
    23:13:57.875 Scan finished successfully
    06:03:44.859 Disk 0 MBR has been saved successfully to "C:\Documents and Settings\anon\My

    Documents\Downloads\AntiSpyware\MBR.dat"
    06:03:44.984 The log file has been saved successfully to "C:\Documents and Settings\anon\My

    Documents\Downloads\AntiSpyware\aswMBR.txt"

  6. #6
    Member Spyware Fighter
    Join Date
    Jun 2010
    Location
    Bement,Ill USA
    Posts
    1,340
    Points
    146

    Default

    Hello,


    You gave me the Attach.txt part of the DDS log. Please post the DDS.txt portion of the logs.

    Please download the TDSS Rootkit Removing Tool (TDSSKiller.exe) and save it to your Desktop. <-Important!!!
    Be sure to download TDSSKiller.exe (v2.5.6.0) from Kaspersky's website and not TDSSKiller.zip which appears to be an older version 2.3.2.2 of the tool.
    • Double-click on TDSSKiller.exe to run the tool for known TDSS variants.
      Vista/Windows 7 users right-click and select Run As Administrator.
    • If TDSSKiller does not run, try renaming it.
    • To do this, right-click on TDSSKiller.exe, select Rename and give it a random name with the .com file extension (i.e. 123abc.com). If you do not see the file extension, please refer to How to change the file extension.
    • Click the Start Scan button.
    • Do not use the computer during the scan
    • If the scan completes with nothing found, click Close to exit.
    • If malicious objects are found, they will show in the Scan results - Select action for found objects and offer three options.
    • Ensure Cure (default) is selected, then click Continue > Reboot now to finish the cleaning process.
    • A log file named TDSSKiller_version_date_time_log.txt (i.e. TDSSKiller.2.5.6.0_27.07.2010_09.o7.26_log.txt) will be created and saved to the root directory (usually Local Disk C.
    • Copy and paste the contents of that file in your next reply.


    Things to include in your next reply::
    TDSSKILLER log
    DDS.txt
    How is your machine running now?
    " Extinguishing Malware from the world"

    The Spware Help forum is very busy. If I'm helping you and I've not posted back within 24 hrs., send a PM with your topic link. Thank you.
    HELP REQUESTS VIA THE PM SYSTEM WILL BE IGNORED. The Forums are there for a reason!
    Thanks-




  7. #7
    Member
    Join Date
    Jul 2011
    Posts
    6
    Points
    0

    Default Yes I did.

    Quote Originally Posted by fireman4it View Post
    Hello,


    You gave me the Attach.txt part of the DDS log. Please post the DDS.txt portion of the logs.

    >No - I did give you the DDS.ext - as part of the 'attach.text, which consisted of:
    DDS.txt + GMER.txt (log) + aswMBR.txt (log)

    Nothing has changed because so far, I have not received any help - only requests for more information.

    Please download the TDSS Rootkit Removing Tool (TDSSKiller.exe) and save it to your Desktop. <-Important!!!
    Be sure to download TDSSKiller.exe (v2.5.6.0) from Kaspersky's website and not TDSSKiller.zip which appears to be an older version 2.3.2.2 of the tool.
    • Double-click on TDSSKiller.exe to run the tool for known TDSS variants.
      Vista/Windows 7 users right-click and select Run As Administrator.
    • If TDSSKiller does not run, try renaming it.
    • To do this, right-click on TDSSKiller.exe, select Rename and give it a random name with the .com file extension (i.e. 123abc.com). If you do not see the file extension, please refer to How to change the file extension.
    • Click the Start Scan button.
    • Do not use the computer during the scan
    • If the scan completes with nothing found, click Close to exit.
    • If malicious objects are found, they will show in the Scan results - Select action for found objects and offer three options.
    • Ensure Cure (default) is selected, then click Continue > Reboot now to finish the cleaning process.
    • A log file named TDSSKiller_version_date_time_log.txt (i.e. TDSSKiller.2.5.6.0_27.07.2010_09.o7.26_log.txt) will be created and saved to the root directory (usually Local Disk C.
    • Copy and paste the contents of that file in your next reply.


    Things to include in your next reply::
    TDSSKILLER log
    DDS.txt
    How is your machine running now?

  8. #8
    Member Spyware Fighter
    Join Date
    Jun 2010
    Location
    Bement,Ill USA
    Posts
    1,340
    Points
    146

    Default

    >No - I did give you the DDS.ext - as part of the 'attach.text, which consisted of:
    DDS.txt + GMER.txt (log) + aswMBR.txt (log)
    No you gave me the Attach.txt portion of the log. Please follow the directions on running and posting the DDS portion of the logs. Also please run and post the TDSSkiller log. TDSSkiller is a tool please run it and post the log.


    1.
    Download DDS and save it to your desktop from here or here or here.
    Disable any script blocker, and then double click dds.scr to run the tool.

    * When done, DDS will open two (2) logs:

    1. DDS.txt
    2. Attach.txt

    Save both reports to your desktop post the contents of the DDS.txt log. Save the other report incase I need to look at it later.


    2.
    Please download the TDSS Rootkit Removing Tool (TDSSKiller.exe) and save it to your Desktop. <-Important!!!
    Be sure to download TDSSKiller.exe (v2.5.6.0) from Kaspersky's website and not TDSSKiller.zip which appears to be an older version 2.3.2.2 of the tool.
    • Double-click on TDSSKiller.exe to run the tool for known TDSS variants.
      Vista/Windows 7 users right-click and select Run As Administrator.
    • If TDSSKiller does not run, try renaming it.
    • To do this, right-click on TDSSKiller.exe, select Rename and give it a random name with the .com file extension (i.e. 123abc.com). If you do not see the file extension, please refer to How to change the file extension.
    • Click the Start Scan button.
    • Do not use the computer during the scan
    • If the scan completes with nothing found, click Close to exit.
    • If malicious objects are found, they will show in the Scan results - Select action for found objects and offer three options.
    • Ensure Cure (default) is selected, then click Continue > Reboot now to finish the cleaning process.
    • A log file named TDSSKiller_version_date_time_log.txt (i.e. TDSSKiller.2.5.6.0_27.07.2010_09.o7.26_log.txt) will be created and saved to the root directory (usually Local Disk C.
    • Copy and paste the contents of that file in your next reply.


    3.
    Install Recovery Console and Run ComboFix

    This tool is not a toy. If used the wrong way you could trash your computer. Please use only under direction of a Helper. If you decide to do so anyway, please do not blame me or ComboFix.

    Download Combofix from any of the links below, and save it to your desktop.

    Link 1
    Link 2
    • Close/disable all anti-virus and anti-malware programs so they do not interfere with the running of ComboFix. Refer to this page if you are not sure how.
    • Close any open windows, including this one.
    • Double click on ComboFix.exe & follow the prompts.
    • As part of it's process, ComboFix will check to see if the Microsoft Windows Recovery Console is installed. With malware infections being as they are today, it's strongly recommended to have this pre-installed on your machine before doing any malware removal. It will allow you to boot up into a special recovery/repair mode that will allow us to more easily help you should your computer have a problem after an attempted removal of malware.
    • If you did not have it installed, you will see the prompt below. Choose YES.
    • Follow the prompts to allow ComboFix to download and install the Microsoft Windows Recovery Console, and when prompted, agree to the End-User License Agreement to install the Microsoft Windows Recovery Console.

    **Please note: If the Microsoft Windows Recovery Console is already installed, ComboFix will continue it's malware removal procedures.

    Note:The Windows Recovery Console will allow you to boot up into a special recovery (repair) mode. This allows us to more easily help you
    should your computer have a problem after an attempted removal of malware. It is a simple procedure that will only take a few moments of your time.

    • Once the Microsoft Windows Recovery Console is installed using ComboFix, you should see the following message:

    • Click on Yes, to continue scanning for malware.
    • When finished, it will produce a report for you. Please post the contents of the log (C:\ComboFix.txt).
    Leave your computer alone while ComboFix is running.
    ComboFix will restart your computer if malware is found; allow it to do so.


    Note: Please Do NOT mouseclick combofix's window while its running because it may cause it to stall.


    Things to include in your next reply::
    DDS.txt
    TdssKiller log
    Combofix.txt
    How is your machine running now?
    " Extinguishing Malware from the world"

    The Spware Help forum is very busy. If I'm helping you and I've not posted back within 24 hrs., send a PM with your topic link. Thank you.
    HELP REQUESTS VIA THE PM SYSTEM WILL BE IGNORED. The Forums are there for a reason!
    Thanks-




  9. #9
    Member
    Join Date
    Jul 2011
    Posts
    6
    Points
    0

    Default dds.txt

    .
    DDS (Ver_2011-06-23.01) - NTFSx86
    Internet Explorer: 8.0.6001.18702
    Run by anon at 21:42:43 on 2011-08-03
    .
    ============== Running Processes ===============
    .
    C:\Program Files\Ahead\InCD\InCDsrv.exe
    C:\WINDOWS\system32\spoolsv.exe
    C:\Program Files\Common Files\Acronis\Schedule2\schedul2.exe
    C:\WINDOWS\Explorer.EXE
    C:\Program Files\Common Files\Acronis\Schedule2\schedhlp.exe
    C:\Program Files\Norton Internet Security\Engine\18.6.0.29\ccSvcHst.exe
    C:\WINDOWS\system32\IoctlSvc.exe
    C:\WINDOWS\system32\wdfmgr.exe
    C:\Program Files\Norton Internet Security\Engine\18.6.0.29\ccSvcHst.exe
    C:\WINDOWS\system32\dla\tfswctrl.exe
    C:\Program Files\Acronis\DriveMonitor\adm_tray.exe
    C:\Program Files\Norton Utilities 14\nu.exe
    C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
    C:\Program Files\Common Files\Nikon\Monitor\NkMonitor.exe
    C:\WINDOWS\System32\alg.exe
    C:\Program Files\Mozilla Firefox\firefox.exe
    C:\Program Files\Mozilla Firefox\plugin-container.exe
    C:\Documents and Settings\anon\My Documents\Downloads\AntiSpyware\dds.scr
    C:\WINDOWS\system32\wbem\wmiprvse.exe
    C:\WINDOWS\System32\svchost.exe -k netsvcs
    C:\WINDOWS\System32\svchost.exe -k NetworkService
    C:\WINDOWS\system32\svchost.exe -k hpdevmgmt
    C:\WINDOWS\system32\svchost.exe -k HPService
    C:\WINDOWS\System32\svchost.exe -k HPZ12
    C:\WINDOWS\System32\svchost.exe -k HPZ12
    C:\WINDOWS\System32\svchost.exe -k imgsvc
    C:\WINDOWS\System32\svchost.exe -k LocalService
    C:\WINDOWS\System32\svchost.exe -k HTTPFilter
    .
    ============== Pseudo HJT Report ===============
    .
    uStart Page = about:blank
    uSearchURL,(Default) = hxxp://search.yahoo.com/search?fr=mcafee&p=%s
    uURLSearchHooks: McAfee SiteAdvisor Toolbar: {0ebbbe48-bad4-4b4c-8e5a-516abecae064} -
    BHO: Adobe PDF Link Helper: {18df081c-e8ad-4283-a596-fa578c2ebdc3} - c:\program files\common files\adobe\acrobat\activex\AcroIEHelperShim.dll
    BHO: Symantec NCO BHO: {602adb0e-4aff-4217-8aa1-95dac4dfa408} - c:\program files\norton internet security\engine\18.6.0.29\coIEPlg.dll
    BHO: Symantec Intrusion Prevention: {6d53ec84-6aae-4787-aeee-f4628f01010c} - c:\program files\norton internet security\engine\18.6.0.29\ips\IPSBHO.DLL
    BHO: {b164e929-a1b6-4a06-b104-2cd0e90a88ff} - McAfee SiteAdvisor BHO
    TB: Norton Toolbar: {7febefe3-6b19-4349-98d2-ffb09d4b49ca} - c:\program files\norton internet security\engine\18.6.0.29\coIEPlg.dll
    TB: McAfee SiteAdvisor Toolbar: {0ebbbe48-bad4-4b4c-8e5a-516abecae064} -
    TB: {EF99BD32-C1FB-11D2-892F-0090271D4F88} - No File
    EB: {32683183-48a0-441b-a342-7c2a440a9478} - No File
    uRun: [NortonUtilities] c:\program files\norton utilities 14\nu.exe /QS
    uRun: [SUPERAntiSpyware] c:\program files\superantispyware\SUPERAntiSpyware.exe
    mRun: [NeroFilterCheck] c:\windows\system32\NeroCheck.exe
    mRun: [OneTouch Monitor] c:\program files\visioneer onetouch\OneTouchMon.exe
    mRun: [dla] c:\windows\system32\dla\tfswctrl.exe
    mRun: [DVDBitSet] "c:\program files\hp cd-dvd\umbrella\DVDBitSet.exe" /NOUI
    mRun: [Adobe ARM] "c:\program files\common files\adobe\arm\1.0\AdobeARM.exe"
    mRun: [adm_tray.exe] c:\program files\acronis\drivemonitor\adm_tray.exe
    mRun: [ioloDelayModule] c:\program files\iolo\system mechanic professional 6\delay.exe
    uPolicies-explorer: NoRecentDocsNetHood = 01000000
    uPolicies-explorer: NoSMHelp = 01000000
    dPolicies-explorer: EditLevel = 0 (0x0)
    dPolicies-explorer: NoCommonGroups = 0 (0x0)
    IE: {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe
    IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe
    Trusted Zone: turbotax.com
    Notify: !SASWinLogon - c:\program files\superantispyware\SASWINLO.DLL
    SEH: SABShellExecuteHook Class: {5ae067d3-9afb-48e0-853a-ebb7f4a000da} - c:\program files\superantispyware\SASSEH.DLL
    .
    ============= SERVICES / DRIVERS ===============
    .
    .
    =============== Created Last 30 ================
    .
    .
    ==================== Find3M ====================
    .
    .
    ============= FINISH: 21:45:35.04 ===============

  10. #10
    Member Spyware Fighter
    Join Date
    Jun 2010
    Location
    Bement,Ill USA
    Posts
    1,340
    Points
    146

    Default

    Hello,

    Thanks for the DDS.txt. Now can you please download and run TDssKIller and post its log. It a tool for removing certain infection that I believe you might have.

    Please download the TDSS Rootkit Removing Tool (TDSSKiller.exe) and save it to your Desktop. <-Important!!!
    Be sure to download TDSSKiller.exe (v2.5.6.0) from Kaspersky's website and not TDSSKiller.zip which appears to be an older version 2.3.2.2 of the tool.
    • Double-click on TDSSKiller.exe to run the tool for known TDSS variants.
      Vista/Windows 7 users right-click and select Run As Administrator.
    • If TDSSKiller does not run, try renaming it.
    • To do this, right-click on TDSSKiller.exe, select Rename and give it a random name with the .com file extension (i.e. 123abc.com). If you do not see the file extension, please refer to How to change the file extension.
    • Click the Start Scan button.
    • Do not use the computer during the scan
    • If the scan completes with nothing found, click Close to exit.
    • If malicious objects are found, they will show in the Scan results - Select action for found objects and offer three options.
    • Ensure Cure (default) is selected, then click Continue > Reboot now to finish the cleaning process.
    • A log file named TDSSKiller_version_date_time_log.txt (i.e. TDSSKiller.2.5.6.0_27.07.2010_09.o7.26_log.txt) will be created and saved to the root directory (usually Local Disk C.
    • Copy and paste the contents of that file in your next reply.



    How is your machine running now?
    " Extinguishing Malware from the world"

    The Spware Help forum is very busy. If I'm helping you and I've not posted back within 24 hrs., send a PM with your topic link. Thank you.
    HELP REQUESTS VIA THE PM SYSTEM WILL BE IGNORED. The Forums are there for a reason!
    Thanks-




Page 1 of 2 12 LastLast