Jump to content

possible rootkit?


paulds

Recommended Posts

Hi and thanks for your help.

I am unable to goto antivirus sites (such as Malwarebytes) or Microsoft either. I get "Problem loading page" or "Server not found". Something obviously fishy is going on as I can get to other sites. Also I am prevented from making changes to some Windows settings (they donot stick). Followed directions in "What do I do now?" topic. Had to email in utilities from another PC as I could not download them on infected PC. Ran MBam and it found some items which I cleaned but problem still persists.

Here are log files from MBAM, GMER & RKUnhooker: (also ran DeFogger)

Malwarebytes' Anti-Malware 1.46

www.malwarebytes.org

Database version: 4896

Windows 5.1.2600 Service Pack 2

Internet Explorer 6.0.2900.2180

10/20/2010 4:41:03 PM

mbam-log-2010-10-20 (16-41-03).txt

Scan type: Quick scan

Objects scanned: 156769

Time elapsed: 8 minute(s), 56 second(s)

Memory Processes Infected: 0

Memory Modules Infected: 0

Registry Keys Infected: 3

Registry Values Infected: 0

Registry Data Items Infected: 1

Folders Infected: 0

Files Infected: 3

Memory Processes Infected:

(No malicious items detected)

Memory Modules Infected:

(No malicious items detected)

Registry Keys Infected:

HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{13197ace-6851-45c3-a7ff-c281324d5489} (Fake.Dropped.Malware) -> Quarantined and deleted successfully.

HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{549b5ca7-4a86-11d7-a4df-000874180bb3} (Trojan.Agent) -> Quarantined and deleted successfully.

HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{f10587e9-0e47-4cbe-84ae-7dd20b8684bb} (Trojan.BHO) -> Quarantined and deleted successfully.

Registry Values Infected:

(No malicious items detected)

Registry Data Items Infected:

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Folder\Hidden\SHOWALL\CheckedValue (Hijack.System.Hidden) -> Bad: (0) Good: (1) -> Quarantined and deleted successfully.

Folders Infected:

(No malicious items detected)

Files Infected:

C:\WINDOWS\SYSTEM32\xlibgfl254.dll_tobedeleted_old (Trojan.Vundo) -> Quarantined and deleted successfully.

C:\Documents and Settings\NetworkService\Local Settings\Temporary Internet Files\Content.IE5\DDZAEIRL\oqicwk[1].jpg (Extension.Mismatch) -> Quarantined and deleted successfully.

C:\WINDOWS\INF\ultra.PNF (Malware.Trace) -> Quarantined and deleted successfully.

GMER 1.0.15.15477 - http://www.gmer.net

Rootkit scan 2010-10-20 19:09:40

Windows 5.1.2600 Service Pack 2

Running: jdq9iur3.exe; Driver: C:\DOCUME~1\Sisk\LOCALS~1\Temp\uftcypow.sys

---- User code sections - GMER 1.0.15 ----

.text C:\WINDOWS\System32\svchost.exe[920] ntdll.dll!NtQueryInformationProcess 7C90E01B 5 Bytes JMP 00C49DD2

.text C:\WINDOWS\System32\svchost.exe[920] NETAPI32.dll!NetpwPathCanonicalize 5B86A259 5 Bytes JMP 00C49D72

.text C:\WINDOWS\System32\svchost.exe[968] ntdll.dll!NtQueryInformationProcess 7C90E01B 5 Bytes JMP 00779DD2

---- Devices - GMER 1.0.15 ----

Device \FileSystem\Fastfat \Fat B1402C8A

Device \FileSystem\Fastfat \Fat B13FF7C8

---- Services - GMER 1.0.15 ----

Service C:\WINDOWS\system32\svchost.exe (*** hidden *** ) [AUTO] fxmjzjg <-- ROOTKIT !!!

---- Registry - GMER 1.0.15 ----

Reg HKLM\SYSTEM\CurrentControlSet\Services\fxmjzjg@DisplayName Monitor Helper

Reg HKLM\SYSTEM\CurrentControlSet\Services\fxmjzjg@Type 32

Reg HKLM\SYSTEM\CurrentControlSet\Services\fxmjzjg@Start 2

Reg HKLM\SYSTEM\CurrentControlSet\Services\fxmjzjg@ErrorControl 0

Reg HKLM\SYSTEM\CurrentControlSet\Services\fxmjzjg@ImagePath %SystemRoot%\system32\svchost.exe -k netsvcs

Reg HKLM\SYSTEM\CurrentControlSet\Services\fxmjzjg@ObjectName LocalSystem

Reg HKLM\SYSTEM\CurrentControlSet\Services\fxmjzjg@Description Provides user experience theme management.

Reg HKLM\SYSTEM\CurrentControlSet\Services\fxmjzjg\Parameters

Reg HKLM\SYSTEM\CurrentControlSet\Services\fxmjzjg\Parameters@ServiceDll C:\WINDOWS\system32\tnpmg.dll

Reg HKLM\SYSTEM\ControlSet002\Services\fxmjzjg@DisplayName Monitor Helper

Reg HKLM\SYSTEM\ControlSet002\Services\fxmjzjg@Type 32

Reg HKLM\SYSTEM\ControlSet002\Services\fxmjzjg@Start 2

Reg HKLM\SYSTEM\ControlSet002\Services\fxmjzjg@ErrorControl 0

Reg HKLM\SYSTEM\ControlSet002\Services\fxmjzjg@ImagePath %SystemRoot%\system32\svchost.exe -k netsvcs

Reg HKLM\SYSTEM\ControlSet002\Services\fxmjzjg@ObjectName LocalSystem

Reg HKLM\SYSTEM\ControlSet002\Services\fxmjzjg@Description Provides user experience theme management.

Reg HKLM\SYSTEM\ControlSet002\Services\fxmjzjg\Parameters (not active ControlSet)

Reg HKLM\SYSTEM\ControlSet002\Services\fxmjzjg\Parameters@ServiceDll C:\WINDOWS\system32\tnpmg.dll

---- EOF - GMER 1.0.15 ----

??RkU Version: 3.8.388.590, Type LE (SR2)

==============================================

OS Name: Windows XP

Version 5.1.2600 (Service Pack 2)

Number of processors #1

==============================================

>Drivers

==============================================

0x804D7000 C:\WINDOWS\system32\ntoskrnl.exe 2179328 bytes (Microsoft Corporation, NT Kernel & System)

0x804D7000 PnpManager 2179328 bytes

0x804D7000 RAW 2179328 bytes

0x804D7000 WMIxWDM 2179328 bytes

0xBF800000 Win32k 1843200 bytes

0xBF800000 C:\WINDOWS\System32\win32k.sys 1843200 bytes (Microsoft Corporation, Multi-User Win32 Driver)

0xBA762000 C:\WINDOWS\System32\DRIVERS\BCMSM.sys 1101824 bytes (Broadcom Corporation, Modem Device Driver)

0xF7F06000 Ntfs.sys 577536 bytes (Microsoft Corporation, NT File System Driver)

0xBA6A5000 C:\WINDOWS\system32\drivers\smwdm.sys 548864 bytes (Analog Devices, Inc., SoundMAX Integrated Digital Audio )

0xBFA31000 C:\WINDOWS\System32\ialmdd5.DLL 483328 bytes (Intel Corporation, DirectDraw® Driver for Intel® Graphics Technology)

0xB21C9000 C:\WINDOWS\System32\DRIVERS\mrxsmb.sys 454656 bytes (Microsoft Corporation, Windows NT SMB Minirdr)

0xB234D000 C:\WINDOWS\System32\DRIVERS\tcpip.sys 360448 bytes (Microsoft Corporation, TCP/IP Protocol Driver)

0xB1787000 C:\WINDOWS\System32\DRIVERS\srv.sys 335872 bytes (Microsoft Corporation, Server driver)

0xBFFA0000 C:\WINDOWS\System32\ATMFD.DLL 286720 bytes (Adobe Systems Incorporated, Windows NT OpenType/Type 1 Font Driver)

0xB15C8000 C:\WINDOWS\System32\Drivers\HTTP.sys 266240 bytes (Microsoft Corporation, HTTP Protocol Stack)

0xBA55D000 C:\WINDOWS\System32\DRIVERS\update.sys 212992 bytes (Microsoft Corporation, Update Driver)

0xF79AC000 ACPI.sys 188416 bytes (Microsoft Corporation, ACPI Driver for NT)

0xBFA03000 C:\WINDOWS\System32\ialmdev5.DLL 188416 bytes (Intel Corporation, Component GHAL Driver)

0xB183B000 C:\WINDOWS\System32\DRIVERS\mrxdav.sys 184320 bytes (Microsoft Corporation, Windows NT WebDav Minirdr)

0xF7BF5000 NDIS.sys 184320 bytes (Microsoft Corporation, NDIS 5.1 wrapper driver)

0xB2238000 C:\WINDOWS\System32\DRIVERS\rdbss.sys 176128 bytes (Microsoft Corporation, Redirected Drive Buffering SubSystem Driver)

0xB2325000 C:\WINDOWS\System32\DRIVERS\netbt.sys 163840 bytes (Microsoft Corporation, MBT Transport driver)

0xBA681000 C:\WINDOWS\system32\drivers\portcls.sys 147456 bytes (Microsoft Corporation, Port Class (Class Driver for Port/Miniport Devices))

0xBA73F000 C:\WINDOWS\System32\DRIVERS\ks.sys 143360 bytes (Microsoft Corporation, Kernel CSA Library)

0xBA86F000 C:\WINDOWS\System32\DRIVERS\USBPORT.SYS 143360 bytes (Microsoft Corporation, USB 1.1 & 2.0 Port Driver)

0xB2303000 C:\WINDOWS\System32\drivers\afd.sys 139264 bytes (Microsoft Corporation, Ancillary Function Driver for WinSock)

0xBF9E1000 C:\WINDOWS\System32\ialmdnt5.dll 139264 bytes (Intel Corporation, Controller Hub for Intel Graphics Driver)

0xB215B000 C:\WINDOWS\System32\DRIVERS\ipnat.sys 135168 bytes (Microsoft Corporation, IP Network Address Translator)

0x806EC000 ACPI_HAL 131968 bytes

0x806EC000 C:\WINDOWS\system32\hal.dll 131968 bytes (Microsoft Corporation, Hardware Abstraction Layer DLL)

0xF7805000 fltmgr.sys 126976 bytes (Microsoft Corporation, Microsoft Filesystem Filter Manager)

0xF78DC000 ftdisk.sys 126976 bytes (Microsoft Corporation, FT Disk Driver)

0xB2484000 C:\WINDOWS\system32\drivers\ialmsbw.sys 114688 bytes (Intel Corporation, Intel Graphics Platform (SoftBIOS) Driver for Windows 2000® & Windows XP)

0xF7D20000 Mup.sys 110592 bytes (Microsoft Corporation, Multiple UNC Provider driver)

0xF7824000 atapi.sys 98304 bytes (Microsoft Corporation, IDE/ATAPI Port Driver)

0xB1FC8000 C:\WINDOWS\System32\Drivers\dump_atapi.sys 98304 bytes

0xBA8A6000 C:\WINDOWS\System32\DRIVERS\ialmnt5.sys 94208 bytes (Intel Corporation, Controller Hub for Intel Graphics Driver)

0xF7C22000 KSecDD.sys 94208 bytes (Microsoft Corporation, Kernel Security Support Provider Interface)

0xBA5CA000 C:\WINDOWS\System32\DRIVERS\ndiswan.sys 94208 bytes (Microsoft Corporation, MS PPP Framing Driver (Strong Encryption))

0xB1B7B000 C:\WINDOWS\system32\drivers\wdmaud.sys 86016 bytes (Microsoft Corporation, MMSYSTEM Wave/Midi API mapper)

0xB24A0000 C:\WINDOWS\system32\drivers\ialmkchw.sys 81920 bytes (Intel Corporation, Intel Graphics Chipset (KCH) Driver for Windows 2000® & Windows XP)

0xBA72B000 C:\WINDOWS\System32\DRIVERS\parport.sys 81920 bytes (Microsoft Corporation, Parallel Port Driver)

0xBA892000 C:\WINDOWS\System32\DRIVERS\VIDEOPRT.SYS 81920 bytes (Microsoft Corporation, Video Port Driver)

0xB23A5000 C:\WINDOWS\System32\DRIVERS\ipsec.sys 77824 bytes (Microsoft Corporation, IPSec Driver)

0xBF9C2000 C:\WINDOWS\System32\drivers\dxg.sys 73728 bytes (Microsoft Corporation, DirectX Graphics Driver)

0xB1829000 C:\WINDOWS\system32\Drivers\LxrJD31d.sys 73728 bytes

0xF7C39000 sr.sys 73728 bytes (Microsoft Corporation, System Restore Filesystem Filter Driver)

0xF799B000 pci.sys 69632 bytes (Microsoft Corporation, NT Plug and Play PCI Enumerator)

0xBA5B9000 C:\WINDOWS\System32\DRIVERS\psched.sys 69632 bytes (Microsoft Corporation, MS QoS Packet Scheduler)

0xBA611000 C:\WINDOWS\System32\Drivers\Cdfs.SYS 65536 bytes (Microsoft Corporation, CD-ROM File System Driver)

0xF788C000 C:\WINDOWS\System32\DRIVERS\serial.sys 65536 bytes (Microsoft Corporation, Serial Device Driver)

0xF785C000 C:\WINDOWS\system32\drivers\drmk.sys 61440 bytes (Microsoft Corporation, Microsoft Kernel DRM Descrambler Filter)

0xF786C000 C:\WINDOWS\System32\DRIVERS\redbook.sys 61440 bytes (Microsoft Corporation, Redbook Audio Filter Driver)

0xB1BD8000 C:\WINDOWS\system32\drivers\sysaudio.sys 61440 bytes (Microsoft Corporation, System Audio WDM Filter)

0xF7AAB000 C:\WINDOWS\System32\DRIVERS\usbhub.sys 61440 bytes (Microsoft Corporation, Default Hub Driver for USB)

0xF787C000 C:\WINDOWS\System32\DRIVERS\cdrom.sys 53248 bytes (Microsoft Corporation, SCSI CD-ROM Driver)

0xF7A3B000 C:\WINDOWS\System32\DRIVERS\CLASSPNP.SYS 53248 bytes (Microsoft Corporation, SCSI Class System Dll)

0xF789C000 C:\WINDOWS\System32\DRIVERS\i8042prt.sys 53248 bytes (Microsoft Corporation, i8042 Port Driver)

0xBF9D4000 C:\WINDOWS\System32\ialmrnt5.dll 53248 bytes (Intel Corporation, Controller Hub for Intel Graphics Driver)

0xF784C000 C:\WINDOWS\System32\DRIVERS\rasl2tp.sys 53248 bytes (Microsoft Corporation, RAS L2TP mini-port/call-manager driver)

0xF7A1B000 VolSnap.sys 53248 bytes (Microsoft Corporation, Volume Shadow Copy Driver)

0xF7A5B000 C:\WINDOWS\System32\DRIVERS\raspptp.sys 49152 bytes (Microsoft Corporation, Peer-to-Peer Tunneling Protocol)

0xF78AC000 C:\WINDOWS\System32\DRIVERS\bcm4sbxp.sys 45056 bytes (Broadcom Corporation, Broadcom Corporation NDIS 5.1 ethernet driver)

0xF7A0B000 MountMgr.sys 45056 bytes (Microsoft Corporation, Mount Manager)

0xF783C000 C:\WINDOWS\System32\DRIVERS\raspppoe.sys 45056 bytes (Microsoft Corporation, RAS PPPoE mini-port/call-manager driver)

0xF7A8B000 C:\WINDOWS\System32\Drivers\NDProxy.SYS 40960 bytes (Microsoft Corporation, NDIS Proxy)

0xF7A7B000 C:\WINDOWS\System32\DRIVERS\termdd.sys 40960 bytes (Microsoft Corporation, Terminal Server Driver)

0xF7A2B000 disk.sys 36864 bytes (Microsoft Corporation, PnP Disk Driver)

0xF793B000 C:\WINDOWS\System32\Drivers\Fips.SYS 36864 bytes (Microsoft Corporation, FIPS Crypto Driver)

0xF78BC000 C:\WINDOWS\System32\DRIVERS\intelppm.sys 36864 bytes (Microsoft Corporation, Processor Device Driver)

0xF79FB000 isapnp.sys 36864 bytes (Microsoft Corporation, PNP ISA Bus Driver)

0xF7A6B000 C:\WINDOWS\System32\DRIVERS\msgpc.sys 36864 bytes (Microsoft Corporation, MS General Packet Classifier)

0xF797B000 C:\WINDOWS\System32\DRIVERS\netbios.sys 36864 bytes (Microsoft Corporation, NetBIOS interface driver)

0xB1ADA000 C:\WINDOWS\System32\Drivers\Normandy.SYS 36864 bytes (RKU Driver)

0xF790B000 C:\WINDOWS\System32\DRIVERS\wanarp.sys 36864 bytes (Microsoft Corporation, MS Remote Access and Routing ARP Driver)

0xF7B5B000 C:\WINDOWS\System32\Drivers\Modem.SYS 32768 bytes (Microsoft Corporation, Modem Device Driver)

0xF7BC3000 C:\WINDOWS\System32\Drivers\Npfs.SYS 32768 bytes (Microsoft Corporation, NPFS Driver)

0xF7B63000 C:\WINDOWS\System32\DRIVERS\fdc.sys 28672 bytes (Microsoft Corporation, Floppy Disk Controller Driver)

0xF7ABB000 C:\WINDOWS\System32\DRIVERS\PCIIDEX.SYS 28672 bytes (Microsoft Corporation, PCI IDE Bus Driver Extension)

0xF7B53000 C:\WINDOWS\System32\DRIVERS\usbehci.sys 28672 bytes (Microsoft Corporation, EHCI eUSB Miniport Driver)

0xF7B6B000 C:\WINDOWS\System32\DRIVERS\kbdclass.sys 24576 bytes (Microsoft Corporation, Keyboard Class Driver)

0xF7B73000 C:\WINDOWS\System32\DRIVERS\mouclass.sys 24576 bytes (Microsoft Corporation, Mouse Class Driver)

0xF7BB3000 C:\WINDOWS\System32\drivers\vga.sys 24576 bytes (Microsoft Corporation, VGA/Super VGA Video Driver)

0xF7BBB000 C:\WINDOWS\System32\Drivers\Msfs.SYS 20480 bytes (Microsoft Corporation, Mailslot driver)

0xF7B93000 C:\WINDOWS\System32\DRIVERS\omci.sys 20480 bytes (Dell Computer Corporation, OMCI Device Driver)

0xF7AC3000 PartMgr.sys 20480 bytes (Microsoft Corporation, Partition Manager)

0xF7B83000 C:\WINDOWS\System32\DRIVERS\ptilink.sys 20480 bytes (Parallel Technologies, Inc., Parallel Technologies DirectParallel IO Library)

0xF7B8B000 C:\WINDOWS\System32\DRIVERS\raspti.sys 20480 bytes (Microsoft Corporation, PTI DirectParallel® mini-port/call-manager driver)

0xF7B7B000 C:\WINDOWS\System32\DRIVERS\TDI.SYS 20480 bytes (Microsoft Corporation, TDI Wrapper)

0xF7B4B000 C:\WINDOWS\System32\DRIVERS\usbuhci.sys 20480 bytes (Microsoft Corporation, UHCI USB Miniport Driver)

0xF7B23000 C:\WINDOWS\System32\watchdog.sys 20480 bytes (Microsoft Corporation, Watchdog Driver)

0xBAFF8000 C:\WINDOWS\System32\DRIVERS\mssmbios.sys 16384 bytes (Microsoft Corporation, System Management BIOS Driver)

0xB1ECC000 C:\WINDOWS\System32\DRIVERS\ndisuio.sys 16384 bytes (Microsoft Corporation, NDIS User mode I/O Driver)

0xF7CEB000 C:\WINDOWS\System32\DRIVERS\serenum.sys 16384 bytes (Microsoft Corporation, Serial Port Enumerator)

0xF7C4B000 C:\WINDOWS\system32\BOOTVID.dll 12288 bytes (Microsoft Corporation, VGA Boot Driver)

0xBA5B5000 C:\WINDOWS\System32\drivers\Dxapi.sys 12288 bytes (Microsoft Corporation, DirectX API Driver)

0xF7CF3000 C:\WINDOWS\System32\DRIVERS\ndistapi.sys 12288 bytes (Microsoft Corporation, NDIS 3.0 connection wrapper driver)

0xBAFBF000 C:\WINDOWS\System32\DRIVERS\rasacd.sys 12288 bytes (Microsoft Corporation, RAS Automatic Connection Driver)

0xF7D51000 C:\WINDOWS\system32\drivers\aeaudio.sys 8192 bytes (Andrea Electronics Corporation, Andrea Audio Stub Driver)

0xF7D63000 C:\WINDOWS\System32\Drivers\Beep.SYS 8192 bytes (Microsoft Corporation, BEEP Driver)

0xF7D83000 C:\WINDOWS\System32\Drivers\dump_WMILIB.SYS 8192 bytes

0xF7D61000 C:\WINDOWS\System32\Drivers\Fs_Rec.SYS 8192 bytes (Microsoft Corporation, File System Recognizer Driver)

0xF7D5F000 C:\WINDOWS\System32\Drivers\i2omgmt.SYS 8192 bytes (Microsoft Corporation, I2O Utility Filter)

0xF7D3B000 C:\WINDOWS\system32\KDCOM.DLL 8192 bytes (Microsoft Corporation, Kernel Debugger HW Extension DLL)

0xF7D65000 C:\WINDOWS\System32\Drivers\mnmdd.SYS 8192 bytes (Microsoft Corporation, Frame buffer simulator)

0xF7D3F000 C:\WINDOWS\System32\Drivers\ParVdm.SYS 8192 bytes (Microsoft Corporation, VDM Parallel Driver)

0xF7D67000 C:\WINDOWS\System32\DRIVERS\RDPCDD.sys 8192 bytes (Microsoft Corporation, RDP Miniport)

0xF7D55000 C:\WINDOWS\System32\DRIVERS\swenum.sys 8192 bytes (Microsoft Corporation, Plug and Play Software Device Enumerator)

0xF7D59000 C:\WINDOWS\System32\DRIVERS\USBD.SYS 8192 bytes (Microsoft Corporation, Universal Serial Bus Driver)

0xF7D3D000 C:\WINDOWS\System32\DRIVERS\WMILIB.SYS 8192 bytes (Microsoft Corporation, WMILIB WMI support library Dll)

0xF7E68000 C:\WINDOWS\System32\DRIVERS\audstub.sys 4096 bytes (Microsoft Corporation, AudStub Driver)

0xF7E20000 C:\WINDOWS\System32\drivers\dxgthk.sys 4096 bytes (Microsoft Corporation, DirectX Graphics Driver Thunk)

0xF7E4C000 C:\WINDOWS\System32\Drivers\Null.SYS 4096 bytes (Microsoft Corporation, NULL Driver)

0xF7E03000 pciide.sys 4096 bytes (Microsoft Corporation, Generic PCI IDE Bus Driver)

==============================================

>Stealth

==============================================

WARNING: Virus alike driver modification [bthpan.sys]

WARNING: Virus alike driver modification [hsfdpsp2.sys]

WARNING: Virus alike driver modification [a308.sys]

WARNING: Virus alike driver modification [a314.sys]

WARNING: Virus alike driver modification [ndisip.sys]

WARNING: Virus alike driver modification [sffdisk.sys]

WARNING: Virus alike driver modification [slip.sys]

WARNING: Virus alike driver modification [wadv08nt.sys]

WARNING: Virus alike driver modification [a302.sys]

WARNING: Virus alike driver modification [ati1mdxx.sys]

WARNING: Virus alike driver modification [ACPIEC.SYS]

WARNING: Virus alike driver modification [wadv05nt.sys]

WARNING: Virus alike driver modification [wadv07nt.sys]

WARNING: Virus alike driver modification [a305.sys]

WARNING: Virus alike driver modification [mdmxsdk.sys]

WARNING: Virus alike driver modification [wadv09nt.sys]

WARNING: Virus alike driver modification [FADXP32.sys]

WARNING: Virus alike driver modification [wadv11nt.sys]

WARNING: Virus alike driver modification [pcmcia.sys]

WARNING: Virus alike driver modification [AMSINT.SYS]

WARNING: Virus alike driver modification [NIKEDRV.SYS]

WARNING: Virus alike driver modification [RIO8DRV.SYS]

WARNING: Virus alike driver modification [RIODRV.SYS]

WARNING: Virus alike driver modification [WS2IFSL.SYS]

WARNING: Virus alike driver modification [tdpipe.sys]

WARNING: Virus alike driver modification [ati1pdxx.sys]

WARNING: Virus alike driver modification [wsiintxx.sys]

WARNING: Virus alike driver modification [FAD.sys]

WARNING: Virus alike driver modification [wadv02nt.sys]

WARNING: Virus alike driver modification [FSVGA.SYS]

WARNING: Virus alike driver modification [wadv01nt.sys]

WARNING: Virus alike driver modification [NWLNKFLT.SYS]

WARNING: Virus alike driver modification [tunmp.sys]

WARNING: Virus alike driver modification [mtlmnt5.sys]

WARNING: Virus alike driver modification [mutohpen.sys]

WARNING: Virus alike driver modification [usb8023.sys]

WARNING: Virus alike driver modification [usb8023x.sys]

WARNING: Virus alike driver modification [slnt7554.sys]

WARNING: Virus alike driver modification [mtlstrm.sys]

WARNING: Virus alike driver modification [slwdmsup.sys]

WARNING: Virus alike driver modification [wacompen.sys]

WARNING: Virus alike driver modification [recagent.sys]

WARNING: Virus alike driver modification [CBIDF2K.SYS]

WARNING: Virus alike driver modification [diskdump.sys]

WARNING: Virus alike driver modification [DAC960NT.SYS]

WARNING: Virus alike driver modification [CPQARRAY.SYS]

WARNING: Virus alike driver modification [tape.sys]

WARNING: Virus alike driver modification [hidir.sys]

WARNING: Virus alike driver modification [dmio.sys]

WARNING: Virus alike driver modification [iNI910U.SYS]

WARNING: Virus alike driver modification [usbintel.sys]

WARNING: Virus alike driver modification [i81xnt5.sys]

WARNING: Virus alike driver modification [MODEMCSA.sys]

WARNING: Virus alike driver modification [sYMC810.SYS]

WARNING: Virus alike driver modification [a306.sys]

WARNING: Virus alike driver modification [bthenum.sys]

WARNING: Virus alike driver modification [ccdecode.sys]

WARNING: Virus alike driver modification [MRAID35X.SYS]

WARNING: Virus alike driver modification [DAC2W2K.SYS]

WARNING: Virus alike driver modification [ntmtlfax.sys]

WARNING: Virus alike driver modification [i2omp.sys]

WARNING: Virus alike driver modification [nv4_mini.sys]

WARNING: Virus alike driver modification [sPARROW.SYS]

WARNING: Virus alike driver modification [wstcodec.sys]

WARNING: Virus alike driver modification [wvchntxx.sys]

WARNING: Virus alike driver modification [watv02nt.sys]

WARNING: Virus alike driver modification [rdpdr.sys]

WARNING: Virus alike driver modification [RMCast.sys]

WARNING: Virus alike driver modification [DPTI2O.SYS]

WARNING: Virus alike driver modification [vch.sys]

WARNING: Virus alike driver modification [ati1ttxx.sys]

WARNING: Virus alike driver modification [TSBVCAP.SYS]

WARNING: Virus alike driver modification [a307.sys]

WARNING: Virus alike driver modification [tdtcp.sys]

WARNING: Virus alike driver modification [hsfbs2s2.sys]

WARNING: Virus alike driver modification [watv06nt.sys]

WARNING: Virus alike driver modification [tcpip6.sys]

WARNING: Virus alike driver modification [ASC3350P.SYS]

WARNING: Virus alike driver modification [wch7xxnt.sys]

WARNING: Virus alike driver modification [uSBCAMD.SYS]

WARNING: Virus alike driver modification [uSBCAMD2.SYS]

WARNING: Virus alike driver modification [hidparse.sys]

WARNING: Virus alike driver modification [sonydcam.sys]

WARNING: Virus alike driver modification [a309.sys]

WARNING: Virus alike driver modification [HPN.SYS]

WARNING: Virus alike driver modification [CINEMST2.SYS]

WARNING: Virus alike driver modification [ati1snxx.sys]

WARNING: Virus alike driver modification [ASC.SYS]

WARNING: Virus alike driver modification [PERC2.SYS]

WARNING: Virus alike driver modification [bthport.sys]

WARNING: Virus alike driver modification [sECDRV.SYS]

WARNING: Virus alike driver modification [sYM_HI.SYS]

WARNING: Virus alike driver modification [ip6fw.sys]

WARNING: Virus alike driver modification [a303.sys]

WARNING: Virus alike driver modification [watv01nt.sys]

WARNING: Virus alike driver modification [ati1xbxx.sys]

WARNING: Virus alike driver modification [rndismp.sys]

WARNING: Virus alike driver modification [rndismpx.sys]

WARNING: Virus alike driver modification [ati1raxx.sys]

WARNING: Virus alike driver modification [sYM_U3.SYS]

WARNING: Virus alike driver modification [ATMEPVC.SYS]

WARNING: Virus alike driver modification [NWLNKFWD.SYS]

WARNING: Virus alike driver modification [sYMC8XX.SYS]

WARNING: Virus alike driver modification [ati2mtaa.sys]

WARNING: Virus alike driver modification [a311.sys]

WARNING: Virus alike driver modification [QL10WNT.SYS]

WARNING: Virus alike driver modification [a310.sys]

WARNING: Virus alike driver modification [wa301a.sys]

WARNING: Virus alike driver modification [wa301b.sys]

WARNING: Virus alike driver modification [RAWWAN.SYS]

WARNING: Virus alike driver modification [ati1xsxx.sys]

WARNING: Virus alike driver modification [bthprint.sys]

WARNING: Virus alike driver modification [hidclass.sys]

WARNING: Virus alike driver modification [ati1tuxx.sys]

WARNING: Virus alike driver modification [crusoe.sys]

WARNING: Virus alike driver modification [uLTRA.SYS]

WARNING: Virus alike driver modification [amdk6.sys]

WARNING: Virus alike driver modification [a313.sys]

WARNING: Virus alike driver modification [bthmodem.sys]

WARNING: Virus alike driver modification [nmnt.sys]

WARNING: Virus alike driver modification [QL1080.SYS]

WARNING: Virus alike driver modification [slntamr.sys]

WARNING: Virus alike driver modification [sisagp.sys]

WARNING: Virus alike driver modification [viaagp.sys]

WARNING: Virus alike driver modification [agp440.sys]

WARNING: Virus alike driver modification [alim1541.sys]

WARNING: Virus alike driver modification [uagp35.sys]

WARNING: Virus alike driver modification [agpcpq.sys]

WARNING: Virus alike driver modification [mtxparhm.sys]

WARNING: Virus alike driver modification [QL12160.SYS]

WARNING: Virus alike driver modification [gagp30kx.sys]

WARNING: Virus alike driver modification [a304.sys]

WARNING: Virus alike driver modification [QL1280.SYS]

WARNING: Virus alike driver modification [mspqm.sys]

WARNING: Virus alike driver modification [TOSIDE.SYS]

WARNING: Virus alike driver modification [msdv.sys]

WARNING: Virus alike driver modification [ALIIDE.SYS]

WARNING: Virus alike driver modification [mspclock.sys]

WARNING: Virus alike driver modification [viaide.sys]

WARNING: Virus alike driver modification [intelide.sys]

WARNING: Virus alike driver modification [mstee.sys]

WARNING: Virus alike driver modification [PERC2HIB.SYS]

WARNING: Virus alike driver modification [AIC78U2.SYS]

WARNING: Virus alike driver modification [atmlane.sys]

WARNING: Virus alike driver modification [NWLNKSPX.SYS]

WARNING: Virus alike driver modification [ati1btxx.sys]

WARNING: Virus alike driver modification [AIC78XX.SYS]

WARNING: Virus alike driver modification [smbali.sys]

WARNING: Virus alike driver modification [bASFND.sys]

WARNING: Virus alike driver modification [arp1394.sys]

WARNING: Virus alike driver modification [nic1394.sys]

WARNING: Virus alike driver modification [ati1rvxx.sys]

WARNING: Virus alike driver modification [udfs.sys]

WARNING: Virus alike driver modification [EL90XBC5.SYS]

WARNING: Virus alike driver modification [hsfcxts2.sys]

WARNING: Virus alike driver modification [ati2mtag.sys]

WARNING: Virus alike driver modification [bridge.sys]

WARNING: Virus alike driver modification [mskssrv.sys]

WARNING: Virus alike driver modification [usbvideo.sys]

WARNING: Virus alike driver modification [dmboot.sys]

WARNING: Virus alike driver modification [nabtsfec.sys]

WARNING: Virus alike driver modification [asctrm.sys]

WARNING: Virus alike driver modification [bCMDM.sys]

WARNING: Virus alike driver modification [nwlnkipx.sys]

WARNING: Virus alike driver modification [slnthal.sys]

==============================================

>Files

==============================================

==============================================

>Hooks

==============================================

ntoskrnl.exe+0x00004AA2, Type: Inline - RelativeJump 0x804DBAA2-->804DBAA9 [ntoskrnl.exe]

[1056]svchost.exe-->ntdll.dll-->NtQueryInformationProcess, Type: Inline - RelativeJump 0x7C90E01B-->00000000 [unknown_code_page]

[992]svchost.exe-->ntdll.dll-->NtQueryInformationProcess, Type: Inline - RelativeJump 0x7C90E01B-->00000000 [unknown_code_page]

Link to post
Share on other sites

Hello paulds

Welcome to Malwarebytes.

=====================

One or more of the identified infections is a backdoor trojan or rootkit.

This type of infection has the capabilities to allows hacker to remotely control your computer, steal critical system information and download and execute files.

I would counsel you to disconnect this PC from the Internet immediately. If you do any banking or other financial transactions on the PC or if it should contain any other sensitive information, please get to a known clean computer and change all passwords where applicable, and it would be wise to contact those same financial institutions to apprise them of your situation.

Though the trojan has been identified and can be killed, because of it's backdoor functionality, your PC is very likely compromised and there is no way to be sure your computer can ever again be trusted. Many experts in the security community believe that once infected with this type of trojan, the best course of action would be a reformat and reinstall of the OS. Please read these for more information:

How Do I Handle Possible Identity Theft, Internet Fraud and CC Fraud?

When Should I Format, How Should I Reinstall

We can still clean this machine but I can't guarantee that it will be 100% secure afterwards. Let me know what you decide to do.

If you still want to clean it please do the following

===================

  • Download TDSSKiller and save it to your Desktop.
  • Extract its contents to your desktop.
  • Once extracted, open the TDSSKiller folder and doubleclick on TDSSKiller.exe to run the application, then on Start Scan.
  • If an infected file is detected, the default action will be Cure, click on Continue.
  • If a suspicious file is detected, the default action will be Skip, click on Continue.
  • It may ask you to reboot the computer to complete the process. Click on Reboot Now.
  • If no reboot is required, click on Report. A log file should appear. Please copy and paste the contents of that file here.
  • If a reboot is required, the report can also be found in your root directory, (usually C:\ folder) in the form of "TDSSKiller.[Version]_[Date]_[Time]_log.txt". Please copy and paste the contents of that file here.

Note if it tells you it found a locked service with this name > fxmjzjg have it delete it.

========

Download ComboFix from one of these locations:

Link 1

Link 2

* IMPORTANT !!! Save ComboFix.exe to your Desktop

  • Disable your AntiVirus and AntiSpyware applications, usually via a right click on the System Tray icon. They may otherwise interfere with our tools
  • Double click on ComboFix.exe & follow the prompts.
  • As part of it's process, ComboFix will check to see if the Microsoft Windows Recovery Console is installed. With malware infections being as they are today, it's strongly recommended to have this pre-installed on your machine before doing any malware removal. It will allow you to boot up into a special recovery/repair mode that will allow us to more easily help you should your computer have a problem after an attempted removal of malware.
  • Follow the prompts to allow ComboFix to download and install the Microsoft Windows Recovery Console, and when prompted, agree to the End-User License Agreement to install the Microsoft Windows Recovery Console.

**Please note: If the Microsoft Windows Recovery Console is already installed, ComboFix will continue it's malware removal procedures.

Once the Microsoft Windows Recovery Console is installed using ComboFix, you should see the following message:

Click on Yes, to continue scanning for malware.

When finished, it shall produce a log for you. Please include the C:\ComboFix.txt in your next reply.

Link to post
Share on other sites

Hello paulds

Welcome to Malwarebytes.

=====================

One or more of the identified infections is a backdoor trojan or rootkit.

This type of infection has the capabilities to allows hacker to remotely control your computer, steal critical system information and download and execute files.

I would counsel you to disconnect this PC from the Internet immediately. If you do any banking or other financial transactions on the PC or if it should contain any other sensitive information, please get to a known clean computer and change all passwords where applicable, and it would be wise to contact those same financial institutions to apprise them of your situation.

Though the trojan has been identified and can be killed, because of it's backdoor functionality, your PC is very likely compromised and there is no way to be sure your computer can ever again be trusted. Many experts in the security community believe that once infected with this type of trojan, the best course of action would be a reformat and reinstall of the OS. Please read these for more information:

How Do I Handle Possible Identity Theft, Internet Fraud and CC Fraud?

When Should I Format, How Should I Reinstall

We can still clean this machine but I can't guarantee that it will be 100% secure afterwards. Let me know what you decide to do.

If you still want to clean it please do the following

===================

  • Download TDSSKiller and save it to your Desktop.
  • Extract its contents to your desktop.
  • Once extracted, open the TDSSKiller folder and doubleclick on TDSSKiller.exe to run the application, then on Start Scan.
  • If an infected file is detected, the default action will be Cure, click on Continue.
  • If a suspicious file is detected, the default action will be Skip, click on Continue.
  • It may ask you to reboot the computer to complete the process. Click on Reboot Now.
  • If no reboot is required, click on Report. A log file should appear. Please copy and paste the contents of that file here.
  • If a reboot is required, the report can also be found in your root directory, (usually C:\ folder) in the form of "TDSSKiller.[Version]_[Date]_[Time]_log.txt". Please copy and paste the contents of that file here.

Note if it tells you it found a locked service with this name > fxmjzjg have it delete it.

========

Download ComboFix from one of these locations:

Link 1

Link 2

* IMPORTANT !!! Save ComboFix.exe to your Desktop

  • Disable your AntiVirus and AntiSpyware applications, usually via a right click on the System Tray icon. They may otherwise interfere with our tools
  • Double click on ComboFix.exe & follow the prompts.
  • As part of it's process, ComboFix will check to see if the Microsoft Windows Recovery Console is installed. With malware infections being as they are today, it's strongly recommended to have this pre-installed on your machine before doing any malware removal. It will allow you to boot up into a special recovery/repair mode that will allow us to more easily help you should your computer have a problem after an attempted removal of malware.
  • Follow the prompts to allow ComboFix to download and install the Microsoft Windows Recovery Console, and when prompted, agree to the End-User License Agreement to install the Microsoft Windows Recovery Console.

**Please note: If the Microsoft Windows Recovery Console is already installed, ComboFix will continue it's malware removal procedures.

Once the Microsoft Windows Recovery Console is installed using ComboFix, you should see the following message:

Click on Yes, to continue scanning for malware.

When finished, it shall produce a log for you. Please include the C:\ComboFix.txt in your next reply.

Thank you for response Kahdah. Ran TDSSKiller, it did not find any thing to fix, following is the log:

??2010/10/22 17:10:58.0421 TDSS rootkit removing tool 2.4.4.0 Oct 4 2010 09:06:59

2010/10/22 17:10:58.0421 ================================================================================

2010/10/22 17:10:58.0421 SystemInfo:

2010/10/22 17:10:58.0421

2010/10/22 17:10:58.0421 OS Version: 5.1.2600 ServicePack: 2.0

2010/10/22 17:10:58.0421 Product type: Workstation

2010/10/22 17:10:58.0421 ComputerName: KATHERINE

2010/10/22 17:10:58.0421 UserName: Sisk

2010/10/22 17:10:58.0421 Windows directory: C:\WINDOWS

2010/10/22 17:10:58.0421 System windows directory: C:\WINDOWS

2010/10/22 17:10:58.0421 Processor architecture: Intel x86

2010/10/22 17:10:58.0421 Number of processors: 1

2010/10/22 17:10:58.0421 Page size: 0x1000

2010/10/22 17:10:58.0421 Boot type: Normal boot

2010/10/22 17:10:58.0421 ================================================================================

2010/10/22 17:10:58.0625 Initialize success

2010/10/22 17:11:16.0328 ================================================================================

2010/10/22 17:11:16.0328 Scan started

2010/10/22 17:11:16.0328 Mode: Manual;

2010/10/22 17:11:16.0328 ================================================================================

2010/10/22 17:11:16.0968 abp480n5 (6abb91494fe6c59089b9336452ab2ea3) C:\WINDOWS\System32\DRIVERS\ABP480N5.SYS

2010/10/22 17:11:17.0156 ACPI (a10c7534f7223f4a73a948967d00e69b) C:\WINDOWS\system32\DRIVERS\ACPI.sys

2010/10/22 17:11:17.0359 ACPIEC (9859c0f6936e723e4892d7141b1327d5) C:\WINDOWS\system32\drivers\ACPIEC.sys

2010/10/22 17:11:17.0531 adpu160m (9a11864873da202c996558b2106b0bbc) C:\WINDOWS\System32\DRIVERS\adpu160m.sys

2010/10/22 17:11:17.0734 aeaudio (11c04b17ed2abbb4833694bcd644ac90) C:\WINDOWS\system32\drivers\aeaudio.sys

2010/10/22 17:11:17.0953 aec (841f385c6cfaf66b58fbd898722bb4f0) C:\WINDOWS\system32\drivers\aec.sys

2010/10/22 17:11:18.0125 AFD (5ac495f4cb807b2b98ad2ad591e6d92e) C:\WINDOWS\System32\drivers\afd.sys

2010/10/22 17:11:18.0281 agp440 (2c428fa0c3e3a01ed93c9b2a27d8d4bb) C:\WINDOWS\System32\DRIVERS\agp440.sys

2010/10/22 17:11:18.0453 agpCPQ (67288b07d6aba6c1267b626e67bc56fd) C:\WINDOWS\System32\DRIVERS\agpCPQ.sys

2010/10/22 17:11:18.0625 Aha154x (c23ea9b5f46c7f7910db3eab648ff013) C:\WINDOWS\System32\DRIVERS\aha154x.sys

2010/10/22 17:11:18.0765 aic78u2 (19dd0fb48b0c18892f70e2e7d61a1529) C:\WINDOWS\System32\DRIVERS\aic78u2.sys

2010/10/22 17:11:18.0921 aic78xx (b7fe594a7468aa0132deb03fb8e34326) C:\WINDOWS\System32\DRIVERS\aic78xx.sys

2010/10/22 17:11:19.0062 AliIde (1140ab9938809700b46bb88e46d72a96) C:\WINDOWS\System32\DRIVERS\aliide.sys

2010/10/22 17:11:19.0218 alim1541 (f312b7cef21eff52fa23056b9d815fad) C:\WINDOWS\System32\DRIVERS\alim1541.sys

2010/10/22 17:11:19.0390 amdagp (675c16a3c1f8482f85ee4a97fc0dde3d) C:\WINDOWS\System32\DRIVERS\amdagp.sys

2010/10/22 17:11:19.0562 amsint (79f5add8d24bd6893f2903a3e2f3fad6) C:\WINDOWS\System32\DRIVERS\amsint.sys

2010/10/22 17:11:19.0750 asc (62d318e9a0c8fc9b780008e724283707) C:\WINDOWS\System32\DRIVERS\asc.sys

2010/10/22 17:11:19.0906 asc3350p (69eb0cc7714b32896ccbfd5edcbea447) C:\WINDOWS\System32\DRIVERS\asc3350p.sys

2010/10/22 17:11:20.0078 asc3550 (5d8de112aa0254b907861e9e9c31d597) C:\WINDOWS\System32\DRIVERS\asc3550.sys

2010/10/22 17:11:20.0281 AsyncMac (02000abf34af4c218c35d257024807d6) C:\WINDOWS\system32\DRIVERS\asyncmac.sys

2010/10/22 17:11:20.0437 atapi (cdfe4411a69c224bd1d11b2da92dac51) C:\WINDOWS\system32\DRIVERS\atapi.sys

2010/10/22 17:11:20.0687 Atmarpc (ec88da854ab7d7752ec8be11a741bb7f) C:\WINDOWS\system32\DRIVERS\atmarpc.sys

2010/10/22 17:11:20.0890 audstub (d9f724aa26c010a217c97606b160ed68) C:\WINDOWS\system32\DRIVERS\audstub.sys

2010/10/22 17:11:21.0062 bcm4sbxp (068523d2cd260069b19ad68adea0d739) C:\WINDOWS\system32\DRIVERS\bcm4sbxp.sys

2010/10/22 17:11:21.0203 BCMModem (41347688046d49cde0f6d138a534f73d) C:\WINDOWS\system32\DRIVERS\BCMSM.sys

2010/10/22 17:11:21.0468 Beep (da1f27d85e0d1525f6621372e7b685e9) C:\WINDOWS\system32\drivers\Beep.sys

2010/10/22 17:11:21.0765 cbidf (90a673fc8e12a79afbed2576f6a7aaf9) C:\WINDOWS\System32\DRIVERS\cbidf2k.sys

2010/10/22 17:11:21.0890 cbidf2k (90a673fc8e12a79afbed2576f6a7aaf9) C:\WINDOWS\system32\drivers\cbidf2k.sys

2010/10/22 17:11:22.0046 cd20xrnt (f3ec03299634490e97bbce94cd2954c7) C:\WINDOWS\System32\DRIVERS\cd20xrnt.sys

2010/10/22 17:11:22.0250 Cdaudio (c1b486a7658353d33a10cc15211a873b) C:\WINDOWS\system32\drivers\Cdaudio.sys

2010/10/22 17:11:22.0468 Cdfs (cd7d5152df32b47f4e36f710b35aae02) C:\WINDOWS\system32\drivers\Cdfs.sys

2010/10/22 17:11:22.0687 Cdrom (af9c19b3100fe010496b1a27181fbf72) C:\WINDOWS\system32\DRIVERS\cdrom.sys

2010/10/22 17:11:22.0906 CmdIde (e5dcb56c533014ecbc556a8357c929d5) C:\WINDOWS\System32\DRIVERS\cmdide.sys

2010/10/22 17:11:23.0093 Cpqarray (3ee529119eed34cd212a215e8c40d4b6) C:\WINDOWS\System32\DRIVERS\cpqarray.sys

2010/10/22 17:11:23.0281 dac2w2k (e550e7418984b65a78299d248f0a7f36) C:\WINDOWS\System32\DRIVERS\dac2w2k.sys

2010/10/22 17:11:23.0453 dac960nt (683789caa3864eb46125ae86ff677d34) C:\WINDOWS\System32\DRIVERS\dac960nt.sys

2010/10/22 17:11:23.0656 Disk (00ca44e4534865f8a3b64f7c0984bff0) C:\WINDOWS\system32\DRIVERS\disk.sys

2010/10/22 17:11:23.0875 dmboot (c0fbb516e06e243f0cf31f597e7ebf7d) C:\WINDOWS\system32\drivers\dmboot.sys

2010/10/22 17:11:24.0062 dmio (f5e7b358a732d09f4bcf2824b88b9e28) C:\WINDOWS\system32\drivers\dmio.sys

2010/10/22 17:11:24.0218 dmload (e9317282a63ca4d188c0df5e09c6ac5f) C:\WINDOWS\system32\drivers\dmload.sys

2010/10/22 17:11:24.0359 DMusic (a6f881284ac1150e37d9ae47ff601267) C:\WINDOWS\system32\drivers\DMusic.sys

2010/10/22 17:11:24.0531 dpti2o (40f3b93b4e5b0126f2f5c0a7a5e22660) C:\WINDOWS\System32\DRIVERS\dpti2o.sys

2010/10/22 17:11:24.0734 drmkaud (1ed4dbbae9f5d558dbba4cc450e3eb2e) C:\WINDOWS\system32\drivers\drmkaud.sys

2010/10/22 17:11:24.0953 EL90XBC (6e883bf518296a40959131c2304af714) C:\WINDOWS\system32\DRIVERS\el90xbc5.sys

2010/10/22 17:11:25.0171 Fastfat (3117f595e9615e04f05a54fc15a03b20) C:\WINDOWS\system32\drivers\Fastfat.sys

2010/10/22 17:11:25.0359 Fdc (ced2e8396a8838e59d8fd529c680e02c) C:\WINDOWS\system32\DRIVERS\fdc.sys

2010/10/22 17:11:25.0531 Fips (e153ab8a11de5452bcf5ac7652dbf3ed) C:\WINDOWS\system32\drivers\Fips.sys

2010/10/22 17:11:25.0734 Flpydisk (0dd1de43115b93f4d85e889d7a86f548) C:\WINDOWS\system32\DRIVERS\flpydisk.sys

2010/10/22 17:11:25.0906 FltMgr (157754f0df355a9e0a6f54721914f9c6) C:\WINDOWS\system32\drivers\fltmgr.sys

2010/10/22 17:11:26.0078 Fs_Rec (3e1e2bd4f39b0e2b7dc4f4d2bcc2779a) C:\WINDOWS\system32\drivers\Fs_Rec.sys

2010/10/22 17:11:26.0296 Ftdisk (6ac26732762483366c3969c9e4d2259d) C:\WINDOWS\system32\DRIVERS\ftdisk.sys

2010/10/22 17:11:26.0312 Suspicious service (NoAccess): fxmjzjg

2010/10/22 17:11:26.0515 Gpc (c0f1d4a21de5a415df8170616703debf) C:\WINDOWS\system32\DRIVERS\msgpc.sys

2010/10/22 17:11:26.0718 hpn (b028377dea0546a5fcfba928a8aefae0) C:\WINDOWS\System32\DRIVERS\hpn.sys

2010/10/22 17:11:26.0921 HTTP (bfb7b73c942e816c4fb4a5a7bae87136) C:\WINDOWS\system32\Drivers\HTTP.sys

2010/10/22 17:11:27.0140 i2omgmt (8f09f91b5c91363b77bcd15599570f2c) C:\WINDOWS\system32\drivers\i2omgmt.sys

2010/10/22 17:11:27.0343 i2omp (ed6bf9e441fdea13292a6d30a64a24c3) C:\WINDOWS\System32\DRIVERS\i2omp.sys

2010/10/22 17:11:27.0531 i8042prt (5502b58eef7486ee6f93f3f164dcb808) C:\WINDOWS\system32\DRIVERS\i8042prt.sys

2010/10/22 17:11:27.0687 i81x (06b7ef73ba5f302eecc294cdf7e19702) C:\WINDOWS\system32\DRIVERS\i81xnt5.sys

2010/10/22 17:11:27.0890 iAimFP0 (7b5b44efe5eb9dadfb8ee29700885d23) C:\WINDOWS\system32\DRIVERS\wADV01nt.sys

2010/10/22 17:11:28.0062 iAimFP1 (eb1f6bab6c22ede0ba551b527475f7e9) C:\WINDOWS\system32\DRIVERS\wADV02NT.sys

2010/10/22 17:11:28.0218 iAimFP2 (03ce989d846c1aa81145cb22fcb86d06) C:\WINDOWS\system32\DRIVERS\wADV05NT.sys

2010/10/22 17:11:28.0390 iAimFP3 (525849b4469de021d5d61b4db9be3a9d) C:\WINDOWS\system32\DRIVERS\wSiINTxx.sys

2010/10/22 17:11:28.0609 iAimFP4 (589c2bcdb5bd602bf7b63d210407ef8c) C:\WINDOWS\system32\DRIVERS\wVchNTxx.sys

2010/10/22 17:11:28.0796 iAimTV0 (d83bdd5c059667a2f647a6be5703a4d2) C:\WINDOWS\system32\DRIVERS\wATV01nt.sys

2010/10/22 17:11:28.0984 iAimTV1 (ed968d23354daa0d7c621580c012a1f6) C:\WINDOWS\system32\DRIVERS\wATV02NT.sys

2010/10/22 17:11:29.0218 iAimTV3 (d738273f218a224c1ddac04203f27a84) C:\WINDOWS\system32\DRIVERS\wATV04nt.sys

2010/10/22 17:11:29.0375 iAimTV4 (0052d118995cbab152daabe6106d1442) C:\WINDOWS\system32\DRIVERS\wCh7xxNT.sys

2010/10/22 17:11:29.0546 ialm (1406d6ef4436aee970efe13193123965) C:\WINDOWS\system32\DRIVERS\ialmnt5.sys

2010/10/22 17:11:29.0750 Imapi (f8aa320c6a0409c0380e5d8a99d76ec6) C:\WINDOWS\system32\DRIVERS\imapi.sys

2010/10/22 17:11:29.0921 ini910u (4a40e045faee58631fd8d91afc620719) C:\WINDOWS\System32\DRIVERS\ini910u.sys

2010/10/22 17:11:30.0125 IntelIde (2d722b2b54ab55b2fa475eb58d7b2aad) C:\WINDOWS\System32\DRIVERS\intelide.sys

2010/10/22 17:11:30.0312 intelppm (279fb78702454dff2bb445f238c048d2) C:\WINDOWS\system32\DRIVERS\intelppm.sys

2010/10/22 17:11:30.0500 ip6fw (4448006b6bc60e6c027932cfc38d6855) C:\WINDOWS\system32\drivers\ip6fw.sys

2010/10/22 17:11:30.0703 IpFilterDriver (731f22ba402ee4b62748adaf6363c182) C:\WINDOWS\system32\DRIVERS\ipfltdrv.sys

2010/10/22 17:11:30.0890 IpInIp (e1ec7f5da720b640cd8fb8424f1b14bb) C:\WINDOWS\system32\DRIVERS\ipinip.sys

2010/10/22 17:11:31.0109 IpNat (e2168cbc7098ffe963c6f23f472a3593) C:\WINDOWS\system32\DRIVERS\ipnat.sys

2010/10/22 17:11:31.0312 IPSec (64537aa5c003a6afeee1df819062d0d1) C:\WINDOWS\system32\DRIVERS\ipsec.sys

2010/10/22 17:11:31.0531 IRENUM (50708daa1b1cbb7d6ac1cf8f56a24410) C:\WINDOWS\system32\DRIVERS\irenum.sys

2010/10/22 17:11:31.0718 isapnp (e504f706ccb699c2596e9a3da1596e87) C:\WINDOWS\system32\DRIVERS\isapnp.sys

2010/10/22 17:11:31.0890 Kbdclass (ebdee8a2ee5393890a1acee971c4c246) C:\WINDOWS\system32\DRIVERS\kbdclass.sys

2010/10/22 17:11:32.0062 kmixer (d93cad07c5683db066b0b2d2d3790ead) C:\WINDOWS\system32\drivers\kmixer.sys

2010/10/22 17:11:32.0281 KSecDD (eb7ffe87fd367ea8fca0506f74a87fbb) C:\WINDOWS\system32\drivers\KSecDD.sys

2010/10/22 17:11:32.0546 LxrJD31d (72f30fa2e98d628dff8d82011e687ebb) C:\WINDOWS\system32\Drivers\LxrJD31d.sys

2010/10/22 17:11:32.0750 mnmdd (4ae068242760a1fb6e1a44bf4e16afa6) C:\WINDOWS\system32\drivers\mnmdd.sys

2010/10/22 17:11:32.0921 Modem (6fc6f9d7acc36dca9b914565a3aeda05) C:\WINDOWS\system32\drivers\Modem.sys

2010/10/22 17:11:33.0078 MODEMCSA (1992e0d143b09653ab0f9c5e04b0fd65) C:\WINDOWS\system32\drivers\MODEMCSA.sys

2010/10/22 17:11:33.0281 Mouclass (34e1f0031153e491910e12551400192c) C:\WINDOWS\system32\DRIVERS\mouclass.sys

2010/10/22 17:11:33.0437 MountMgr (65653f3b4477f3c63e68a9659f85ee2e) C:\WINDOWS\system32\drivers\MountMgr.sys

2010/10/22 17:11:33.0593 mraid35x (3f4bb95e5a44f3be34824e8e7caf0737) C:\WINDOWS\System32\DRIVERS\mraid35x.sys

2010/10/22 17:11:33.0812 MRxDAV (46edcc8f2db2f322c24f48785cb46366) C:\WINDOWS\system32\DRIVERS\mrxdav.sys

2010/10/22 17:11:34.0046 MRxSmb (5ddc9a1b2eb5a4bf010ce8c019a18c1f) C:\WINDOWS\system32\DRIVERS\mrxsmb.sys

2010/10/22 17:11:34.0250 Msfs (561b3a4333ca2dbdba28b5b956822519) C:\WINDOWS\system32\drivers\Msfs.sys

2010/10/22 17:11:34.0437 MSKSSRV (ae431a8dd3c1d0d0610cdbac16057ad0) C:\WINDOWS\system32\drivers\MSKSSRV.sys

2010/10/22 17:11:34.0593 MSPCLOCK (13e75fef9dfeb08eeded9d0246e1f448) C:\WINDOWS\system32\drivers\MSPCLOCK.sys

2010/10/22 17:11:34.0718 MSPQM (1988a33ff19242576c3d0ef9ce785da7) C:\WINDOWS\system32\drivers\MSPQM.sys

2010/10/22 17:11:34.0875 mssmbios (469541f8bfd2b32659d5d463a6714bce) C:\WINDOWS\system32\DRIVERS\mssmbios.sys

2010/10/22 17:11:35.0031 Mup (82035e0f41c2dd05ae41d27fe6cf7de1) C:\WINDOWS\system32\drivers\Mup.sys

2010/10/22 17:11:35.0187 NDIS (558635d3af1c7546d26067d5d9b6959e) C:\WINDOWS\system32\drivers\NDIS.sys

2010/10/22 17:11:35.0328 NdisTapi (08d43bbdacdf23f34d79e44ed35c1b4c) C:\WINDOWS\system32\DRIVERS\ndistapi.sys

2010/10/22 17:11:35.0484 Ndisuio (34d6cd56409da9a7ed573e1c90a308bf) C:\WINDOWS\system32\DRIVERS\ndisuio.sys

2010/10/22 17:11:35.0640 NdisWan (0b90e255a9490166ab368cd55a529893) C:\WINDOWS\system32\DRIVERS\ndiswan.sys

2010/10/22 17:11:35.0843 NDProxy (59fc3fb44d2669bc144fd87826bb571f) C:\WINDOWS\system32\drivers\NDProxy.sys

2010/10/22 17:11:36.0046 NetBIOS (3a2aca8fc1d7786902ca434998d7ceb4) C:\WINDOWS\system32\DRIVERS\netbios.sys

2010/10/22 17:11:36.0265 NetBT (0c80e410cd2f47134407ee7dd19cc86b) C:\WINDOWS\system32\DRIVERS\netbt.sys

2010/10/22 17:11:36.0437 Npfs (4f601bcb8f64ea3ac0994f98fed03f8e) C:\WINDOWS\system32\drivers\Npfs.sys

2010/10/22 17:11:36.0656 Ntfs (b78be402c3f63dd55521f73876951cdd) C:\WINDOWS\system32\drivers\Ntfs.sys

2010/10/22 17:11:36.0890 Null (73c1e1f395918bc2c6dd67af7591a3ad) C:\WINDOWS\system32\drivers\Null.sys

2010/10/22 17:11:37.0140 nv (2b298519edbfcf451d43e0f1e8f1006d) C:\WINDOWS\system32\DRIVERS\nv4_mini.sys

2010/10/22 17:11:37.0375 NwlnkFlt (b305f3fad35083837ef46a0bbce2fc57) C:\WINDOWS\system32\DRIVERS\nwlnkflt.sys

2010/10/22 17:11:37.0515 NwlnkFwd (c99b3415198d1aab7227f2c88fd664b9) C:\WINDOWS\system32\DRIVERS\nwlnkfwd.sys

2010/10/22 17:11:37.0671 omci (53d5f1278d9edb21689bbbcecc09108d) C:\WINDOWS\system32\DRIVERS\omci.sys

2010/10/22 17:11:37.0843 P3 (3e16eff2a6fed2d8d7f5a66dfe65d183) C:\WINDOWS\system32\DRIVERS\p3.sys

2010/10/22 17:11:37.0968 Parport (29744eb4ce659dfe3b4122deb45bc478) C:\WINDOWS\system32\DRIVERS\parport.sys

2010/10/22 17:11:38.0140 PartMgr (3334430c29dc338092f79c38ef7b4cd0) C:\WINDOWS\system32\drivers\PartMgr.sys

2010/10/22 17:11:38.0250 ParVdm (70e98b3fd8e963a6a46a2e6247e0bea1) C:\WINDOWS\system32\drivers\ParVdm.sys

2010/10/22 17:11:38.0421 PCI (8086d9979234b603ad5bc2f5d890b234) C:\WINDOWS\system32\DRIVERS\pci.sys

2010/10/22 17:11:38.0703 PCIIde (ccf5f451bb1a5a2a522a76e670000ff0) C:\WINDOWS\system32\DRIVERS\pciide.sys

2010/10/22 17:11:38.0796 Pcmcia (82a087207decec8456fbe8537947d579) C:\WINDOWS\system32\drivers\Pcmcia.sys

2010/10/22 17:11:39.0203 perc2 (6c14b9c19ba84f73d3a86dba11133101) C:\WINDOWS\System32\DRIVERS\perc2.sys

2010/10/22 17:11:39.0390 perc2hib (f50f7c27f131afe7beba13e14a3b9416) C:\WINDOWS\System32\DRIVERS\perc2hib.sys

2010/10/22 17:11:39.0640 PptpMiniport (1c5cc65aac0783c344f16353e60b72ac) C:\WINDOWS\system32\DRIVERS\raspptp.sys

2010/10/22 17:11:39.0828 Processor (0d97d88720a4087ec93af7dbb303b30a) C:\WINDOWS\system32\DRIVERS\processr.sys

2010/10/22 17:11:39.0937 PSched (48671f327553dcf1d27f6197f622a668) C:\WINDOWS\system32\DRIVERS\psched.sys

2010/10/22 17:11:40.0062 Ptilink (80d317bd1c3dbc5d4fe7b1678c60cadd) C:\WINDOWS\system32\DRIVERS\ptilink.sys

2010/10/22 17:11:40.0218 ql1080 (0a63fb54039eb5662433caba3b26dba7) C:\WINDOWS\System32\DRIVERS\ql1080.sys

2010/10/22 17:11:40.0406 Ql10wnt (6503449e1d43a0ff0201ad5cb1b8c706) C:\WINDOWS\System32\DRIVERS\ql10wnt.sys

2010/10/22 17:11:40.0562 ql12160 (156ed0ef20c15114ca097a34a30d8a01) C:\WINDOWS\System32\DRIVERS\ql12160.sys

2010/10/22 17:11:40.0703 ql1240 (70f016bebde6d29e864c1230a07cc5e6) C:\WINDOWS\System32\DRIVERS\ql1240.sys

2010/10/22 17:11:40.0812 ql1280 (907f0aeea6bc451011611e732bd31fcf) C:\WINDOWS\System32\DRIVERS\ql1280.sys

2010/10/22 17:11:40.0984 RasAcd (fe0d99d6f31e4fad8159f690d68ded9c) C:\WINDOWS\system32\DRIVERS\rasacd.sys

2010/10/22 17:11:41.0218 Rasl2tp (98faeb4a4dcf812ba1c6fca4aa3e115c) C:\WINDOWS\system32\DRIVERS\rasl2tp.sys

2010/10/22 17:11:41.0390 RasPppoe (7306eeed8895454cbed4669be9f79faa) C:\WINDOWS\system32\DRIVERS\raspppoe.sys

2010/10/22 17:11:41.0500 Raspti (fdbb1d60066fcfbb7452fd8f9829b242) C:\WINDOWS\system32\DRIVERS\raspti.sys

2010/10/22 17:11:41.0656 Rdbss (809ca45caa9072b3176ad44579d7f688) C:\WINDOWS\system32\DRIVERS\rdbss.sys

2010/10/22 17:11:41.0843 RDPCDD (4912d5b403614ce99c28420f75353332) C:\WINDOWS\system32\DRIVERS\RDPCDD.sys

2010/10/22 17:11:42.0046 rdpdr (a2cae2c60bc37e0751ef9dda7ceaf4ad) C:\WINDOWS\system32\DRIVERS\rdpdr.sys

2010/10/22 17:11:42.0250 RDPWD (b54cd38a9ebfbf2b3561426e3fe26f62) C:\WINDOWS\system32\drivers\RDPWD.sys

2010/10/22 17:11:42.0468 redbook (b31b4588e4086d8d84adbf9845c2402b) C:\WINDOWS\system32\DRIVERS\redbook.sys

2010/10/22 17:11:42.0718 Secdrv (d26e26ea516450af9d072635c60387f4) C:\WINDOWS\system32\DRIVERS\secdrv.sys

2010/10/22 17:11:42.0875 serenum (a2d868aeeff612e70e213c451a70cafb) C:\WINDOWS\system32\DRIVERS\serenum.sys

2010/10/22 17:11:43.0062 Serial (cd9404d115a00d249f70a371b46d5a26) C:\WINDOWS\system32\DRIVERS\serial.sys

2010/10/22 17:11:43.0203 Sfloppy (0d13b6df6e9e101013a7afb0ce629fe0) C:\WINDOWS\system32\drivers\Sfloppy.sys

2010/10/22 17:11:43.0500 sisagp (732d859b286da692119f286b21a2a114) C:\WINDOWS\System32\DRIVERS\sisagp.sys

2010/10/22 17:11:43.0656 smwdm (31fd0707c7dbe715234f2823b27214fe) C:\WINDOWS\system32\drivers\smwdm.sys

2010/10/22 17:11:43.0812 Sparrow (83c0f71f86d3bdaf915685f3d568b20e) C:\WINDOWS\System32\DRIVERS\sparrow.sys

2010/10/22 17:11:44.0000 splitter (8e186b8f23295d1e42c573b82b80d548) C:\WINDOWS\system32\drivers\splitter.sys

2010/10/22 17:11:44.0171 sr (e41b6d037d6cd08461470af04500dc24) C:\WINDOWS\system32\DRIVERS\sr.sys

2010/10/22 17:11:44.0343 Srv (553007ecce7f6565bbe645beb66d3b69) C:\WINDOWS\system32\DRIVERS\srv.sys

2010/10/22 17:11:44.0578 swenum (03c1bae4766e2450219d20b993d6e046) C:\WINDOWS\system32\DRIVERS\swenum.sys

2010/10/22 17:11:44.0765 swmidi (94abc808fc4b6d7d2bbf42b85e25bb4d) C:\WINDOWS\system32\drivers\swmidi.sys

2010/10/22 17:11:44.0921 symc810 (1ff3217614018630d0a6758630fc698c) C:\WINDOWS\System32\DRIVERS\symc810.sys

2010/10/22 17:11:45.0062 symc8xx (070e001d95cf725186ef8b20335f933c) C:\WINDOWS\System32\DRIVERS\symc8xx.sys

2010/10/22 17:11:45.0171 sym_hi (80ac1c4abbe2df3b738bf15517a51f2c) C:\WINDOWS\System32\DRIVERS\sym_hi.sys

2010/10/22 17:11:45.0281 sym_u3 (bf4fab949a382a8e105f46ebb4937058) C:\WINDOWS\System32\DRIVERS\sym_u3.sys

2010/10/22 17:11:45.0437 sysaudio (650ad082d46bac0e64c9c0e0928492fd) C:\WINDOWS\system32\drivers\sysaudio.sys

2010/10/22 17:11:45.0671 Tcpip (583e063fdc888ca30d05c2724b0d7ef4) C:\WINDOWS\system32\DRIVERS\tcpip.sys

2010/10/22 17:11:45.0875 TDPIPE (38d437cf2d98965f239b0abcd66dcb0f) C:\WINDOWS\system32\drivers\TDPIPE.sys

2010/10/22 17:11:46.0062 TDTCP (ed0580af02502d00ad8c4c066b156be9) C:\WINDOWS\system32\drivers\TDTCP.sys

2010/10/22 17:11:46.0250 TermDD (a540a99c281d933f3d69d55e48727f47) C:\WINDOWS\system32\DRIVERS\termdd.sys

2010/10/22 17:11:46.0421 TosIde (f2790f6af01321b172aa62f8e1e187d9) C:\WINDOWS\System32\DRIVERS\toside.sys

2010/10/22 17:11:46.0640 Udfs (12f70256f140cd7d52c58c7048fde657) C:\WINDOWS\system32\drivers\Udfs.sys

2010/10/22 17:11:46.0843 ultra (1b698a51cd528d8da4ffaed66dfc51b9) C:\WINDOWS\System32\DRIVERS\ultra.sys

2010/10/22 17:11:47.0015 Update (aff2e5045961bbc0a602bb6f95eb1345) C:\WINDOWS\system32\DRIVERS\update.sys

2010/10/22 17:11:47.0250 usbehci (15e993ba2f6946b2bfbbfcd30398621e) C:\WINDOWS\system32\DRIVERS\usbehci.sys

2010/10/22 17:11:47.0453 usbhub (c72f40947f92cea56a8fb532edf025f1) C:\WINDOWS\system32\DRIVERS\usbhub.sys

2010/10/22 17:11:47.0671 USBSTOR (6cd7b22193718f1d17a47a1cd6d37e75) C:\WINDOWS\system32\DRIVERS\USBSTOR.SYS

2010/10/22 17:11:47.0890 usbuhci (f8fd1400092e23c8f2f31406ef06167b) C:\WINDOWS\system32\DRIVERS\usbuhci.sys

2010/10/22 17:11:48.0062 VgaSave (8a60edd72b4ea5aea8202daf0e427925) C:\WINDOWS\System32\drivers\vga.sys

2010/10/22 17:11:48.0281 viaagp (d92e7c8a30cfd14d8e15b5f7f032151b) C:\WINDOWS\System32\DRIVERS\viaagp.sys

2010/10/22 17:11:48.0468 ViaIde (59cb1338ad3654417bea49636457f65d) C:\WINDOWS\System32\DRIVERS\viaide.sys

2010/10/22 17:11:48.0625 VolSnap (ee4660083deba849ff6c485d944b379b) C:\WINDOWS\system32\drivers\VolSnap.sys

2010/10/22 17:11:48.0812 Wanarp (984ef0b9788abf89974cfed4bfbaacbc) C:\WINDOWS\system32\DRIVERS\wanarp.sys

2010/10/22 17:11:49.0125 wdmaud (2797f33ebf50466020c430ee4f037933) C:\WINDOWS\system32\drivers\wdmaud.sys

2010/10/22 17:11:49.0453 {6080A529-897E-4629-A488-ABA0C29B635E} (fd1f4e9cf06c71c8d73a24acf18d8296) C:\WINDOWS\system32\drivers\ialmsbw.sys

2010/10/22 17:11:49.0609 {D31A0762-0CEB-444e-ACFF-B049A1F6FE91} (d4d7331d33d1fa73e588e5ce0d90a4c1) C:\WINDOWS\system32\drivers\ialmkchw.sys

2010/10/22 17:11:49.0843 ================================================================================

2010/10/22 17:11:49.0843 Scan finished

2010/10/22 17:11:49.0843 ================================================================================

And here is the Combofix log:

ComboFix 10-10-22.03 - Sisk 10/22/2010 17:24:44.1.1 - x86

Microsoft Windows XP Home Edition 5.1.2600.2.1252.1.1033.18.1150.878 [GMT -7:00]

Running from: c:\documents and settings\Sisk\Desktop\ComboFix.exe

.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))

.

c:\windows\system32\drivers\fad.sys

c:\windows\system32\tmp.reg

.

((((((((((((((((((((((((( Files Created from 2010-09-23 to 2010-10-23 )))))))))))))))))))))))))))))))

.

2010-10-20 23:28 . 2010-10-20 23:28 -------- d-----w- c:\documents and settings\Sisk\Application Data\Malwarebytes

2010-10-20 23:28 . 2010-04-29 22:39 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys

2010-10-20 23:28 . 2010-10-20 23:28 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware

2010-10-20 23:28 . 2010-10-20 23:28 -------- d-----w- c:\documents and settings\All Users\Application Data\Malwarebytes

2010-10-20 23:28 . 2010-04-29 22:39 20952 ----a-w- c:\windows\system32\drivers\mbam.sys

2010-10-19 19:45 . 2010-10-19 19:45 -------- d-----w- c:\documents and settings\Owner

2010-09-29 23:12 . 2010-09-14 23:00 64984 ----a-w- c:\program files\Mozilla Firefox\plugins\npnul32.dll

2010-09-29 23:12 . 2010-09-14 23:00 138712 ----a-w- c:\program files\Mozilla Firefox\components\brwsrcmp.dll

2010-09-29 23:12 . 2010-09-14 22:59 23512 ----a-w- c:\program files\Mozilla Firefox\components\browserdirprovider.dll

.

(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))

.

.

------- Sigcheck -------

Cryptography Services Error !!

.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))

.

.

*Note* empty entries & legit default entries are not shown

REGEDIT4

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]

"IgfxTray"="c:\windows\System32\igfxtray.exe" [2003-04-07 155648]

"HotKeysCmds"="c:\windows\System32\hkcmd.exe" [2003-04-07 114688]

"BCMSMMSG"="BCMSMMSG.exe" [2003-08-29 122880]

"PCMService"="c:\program files\Dell\Media Experience\PCMService.exe" [2003-08-27 204800]

"QuickTime Task"="c:\program files\QuickTime\qttask.exe" [2004-03-12 77824]

"TkBellExe"="c:\program files\Common Files\Real\Update_OB\realsched.exe" [2004-03-12 151597]

"gcasServ"="c:\program files\Microsoft AntiSpyware\gcasServ.exe" [2005-11-15 473928]

"NCNETWORKSDM"="c:\program files\NCNETWORKSDM\bin\sprtcmd.exe" [2010-06-17 206120]

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]

"EnableFirewall"= 0 (0x0)

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]

"%windir%\\system32\\sessmgr.exe"=

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\GloballyOpenPorts\List]

"5101:TCP"= 5101:TCP:voxkm

R2 sprtsvc_ncnetworksdm;SupportSoft Sprocket Service (ncnetworksdm);c:\program files\NCNETWORKSDM\bin\sprtsvc.exe [6/17/2010 3:59 AM 206120]

R2 tgsrvc_ncnetworksdm;SupportSoft Repair Service (ncnetworksdm);c:\program files\NCNETWORKSDM\bin\tgsrvc.exe [6/17/2010 3:59 AM 185640]

S2 fxmjzjg;Monitor Helper;c:\windows\system32\svchost.exe -k netsvcs [8/29/2002 4:00 AM 14336]

--- Other Services/Drivers In Memory ---

*Deregistered* - klmd25

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Svchost - NetSvcs

fxmjzjg

.

.

------- Supplementary Scan -------

.

uInternet Connection Wizard,ShellNext = hxxp://www.dell4me.com/myway

Trusted Zone: .com\avast

Trusted Zone: mcaffee.com\www.us

Trusted Zone: netflix.com\www

DPF: {7F8C8173-AD80-4807-AA75-5672F22B4582} - hxxp://download.zonelabs.com/bin/promotions/spywaredetector/ICSScanner37440.cab

FF - ProfilePath - c:\documents and settings\Sisk\Application Data\Mozilla\Firefox\Profiles\2jxqr5hd.default\

FF - prefs.js: browser.search.defaulturl - hxxp://www.google.com/search?lr=&ie=UTF-8&oe=UTF-8&q=

FF - prefs.js: browser.startup.homepage - hxxp://www.teoma.com/

FF - component: c:\documents and settings\Sisk\Application Data\Mozilla\Firefox\Profiles\2jxqr5hd.default\extensions\{3112ca9c-de6d-4884-a869-9855de68056c}\components\frozen.dll

FF - plugin: c:\program files\Java\j2re1.4.2\bin\NPJPI142.dll

FF - plugin: c:\program files\Viewpoint\Viewpoint Experience Technology\npViewpoint.dll

---- FIREFOX POLICIES ----

c:\program files\Mozilla Firefox\greprefs\all.js - pref("network.IDN.whitelist.xn--mgbaam7a8h", true);

c:\program files\Mozilla Firefox\greprefs\all.js - pref("network.IDN.whitelist.xn--mgberp4a5d4ar", true);

c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("dom.ipc.plugins.enabled", false);

.

- - - - ORPHANS REMOVED - - - -

HKCU-Run-DellSupport - c:\program files\Dell Support\DSAgnt.exe

HKCU-Run-DellSupport- - c:\program files\Dell Support\DSAgnt.exe

HKCU-Run-Uniblue RegistryBooster 2 - c:\program files\Uniblue\RegistryBooster 2\RegistryBooster.exe

**************************************************************************

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net

Rootkit scan 2010-10-22 17:29

Windows 5.1.2600 Service Pack 2 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully

hidden files: 0

**************************************************************************

[HKEY_LOCAL_MACHINE\System\ControlSet001\Services\fxmjzjg]

"ServiceDll"="c:\windows\system32\tnpmg.dll"

.

Completion time: 2010-10-22 17:31:03

ComboFix-quarantined-files.txt 2010-10-23 00:30

Pre-Run: 32,782,598,144 bytes free

Post-Run: 32,982,982,656 bytes free

WindowsXP-KB310994-SP2-Home-BootDisk-ENU.exe

[boot loader]

timeout=2

default=multi(0)disk(0)rdisk(0)partition(2)\WINDOWS

[operating systems]

c:\cmdcons\BOOTSECT.DAT="Microsoft Windows Recovery Console" /cmdcons

UnsupportedDebug="do not select this" /debug

multi(0)disk(0)rdisk(0)partition(2)\WINDOWS="Microsoft Windows XP Home Edition" /fastdetect /NoExecute=OptIn

- - End Of File - - 2432AFA601418C83A666A6E069357EF9

Link to post
Share on other sites

1. Open notepad and copy/paste the text in the codebox below into it:

http://forums.malwarebytes.org/index.php?showtopic=65566

Collect::
c:\windows\system32\tnpmg.dll


Driver::
fxmjzjg

NetSvc::
fxmjzjg

2. Save the above as CFScript.txt

3. Then drag the CFScript.txt into ComboFix.exe as depicted in the animation below. This will start ComboFix again.

CFScriptB-4.gif

4. During this run Combofix will collect and automatically upload some sample files.

You will see it say Combofix needs to upload some samples.

If it fails to do that do the requested steps at the bottom of this post to manually upload the samples.

5. After reboot, (in case it asks to reboot), please post the following report/log into your next reply:

  • Combofix.txt

===========

Note::

If Combofix fails to upload anything please do the following:

Go to Start > My Computer > C:\

Then Navigate to C:\Qoobox\Quarantine\[4]-Submit_Date_Time.zip

Click Here to upload the submit.zip please.

Link to post
Share on other sites

Here is the next ComboFix log:

ComboFix 10-10-22.04 - Sisk 10/22/2010 19:37:40.2.1 - x86

Microsoft Windows XP Home Edition 5.1.2600.2.1252.1.1033.18.1150.875 [GMT -7:00]

Running from: c:\documents and settings\Sisk\Desktop\ComboFix.exe

Command switches used :: c:\documents and settings\Sisk\Desktop\CFScript.txt

file zipped: c:\windows\system32\tnpmg.dll

.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))

.

c:\windows\system32\tnpmg.dll

.

((((((((((((((((((((((((((((((((((((((( Drivers/Services )))))))))))))))))))))))))))))))))))))))))))))))))

.

-------\Legacy_FXMJZJG

-------\Service_fxmjzjg

((((((((((((((((((((((((( Files Created from 2010-09-23 to 2010-10-23 )))))))))))))))))))))))))))))))

.

2010-10-20 23:28 . 2010-10-20 23:28 -------- d-----w- c:\documents and settings\Sisk\Application Data\Malwarebytes

2010-10-20 23:28 . 2010-04-29 22:39 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys

2010-10-20 23:28 . 2010-10-20 23:28 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware

2010-10-20 23:28 . 2010-10-20 23:28 -------- d-----w- c:\documents and settings\All Users\Application Data\Malwarebytes

2010-10-20 23:28 . 2010-04-29 22:39 20952 ----a-w- c:\windows\system32\drivers\mbam.sys

2010-10-19 19:45 . 2010-10-19 19:45 -------- d-----w- c:\documents and settings\Owner

2010-09-29 23:12 . 2010-09-14 23:00 64984 ----a-w- c:\program files\Mozilla Firefox\plugins\npnul32.dll

2010-09-29 23:12 . 2010-09-14 23:00 138712 ----a-w- c:\program files\Mozilla Firefox\components\brwsrcmp.dll

2010-09-29 23:12 . 2010-09-14 22:59 23512 ----a-w- c:\program files\Mozilla Firefox\components\browserdirprovider.dll

.

(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))

.

.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))

.

.

*Note* empty entries & legit default entries are not shown

REGEDIT4

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]

"IgfxTray"="c:\windows\System32\igfxtray.exe" [2003-04-07 155648]

"HotKeysCmds"="c:\windows\System32\hkcmd.exe" [2003-04-07 114688]

"BCMSMMSG"="BCMSMMSG.exe" [2003-08-29 122880]

"PCMService"="c:\program files\Dell\Media Experience\PCMService.exe" [2003-08-27 204800]

"QuickTime Task"="c:\program files\QuickTime\qttask.exe" [2004-03-12 77824]

"TkBellExe"="c:\program files\Common Files\Real\Update_OB\realsched.exe" [2004-03-12 151597]

"gcasServ"="c:\program files\Microsoft AntiSpyware\gcasServ.exe" [2005-11-15 473928]

"NCNETWORKSDM"="c:\program files\NCNETWORKSDM\bin\sprtcmd.exe" [2010-06-17 206120]

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]

"EnableFirewall"= 0 (0x0)

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]

"%windir%\\system32\\sessmgr.exe"=

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\GloballyOpenPorts\List]

"5101:TCP"= 5101:TCP:voxkm

R2 sprtsvc_ncnetworksdm;SupportSoft Sprocket Service (ncnetworksdm);c:\program files\NCNETWORKSDM\bin\sprtsvc.exe [6/17/2010 3:59 AM 206120]

R2 tgsrvc_ncnetworksdm;SupportSoft Repair Service (ncnetworksdm);c:\program files\NCNETWORKSDM\bin\tgsrvc.exe [6/17/2010 3:59 AM 185640]

.

.

------- Supplementary Scan -------

.

uInternet Connection Wizard,ShellNext = hxxp://www.dell4me.com/myway

Trusted Zone: .com\avast

Trusted Zone: mcaffee.com\www.us

Trusted Zone: netflix.com\www

DPF: {7F8C8173-AD80-4807-AA75-5672F22B4582} - hxxp://download.zonelabs.com/bin/promotions/spywaredetector/ICSScanner37440.cab

FF - ProfilePath - c:\documents and settings\Sisk\Application Data\Mozilla\Firefox\Profiles\2jxqr5hd.default\

FF - prefs.js: browser.search.defaulturl - hxxp://www.google.com/search?lr=&ie=UTF-8&oe=UTF-8&q=

FF - prefs.js: browser.startup.homepage - hxxp://www.teoma.com/

FF - component: c:\documents and settings\Sisk\Application Data\Mozilla\Firefox\Profiles\2jxqr5hd.default\extensions\{3112ca9c-de6d-4884-a869-9855de68056c}\components\frozen.dll

FF - plugin: c:\program files\Java\j2re1.4.2\bin\NPJPI142.dll

FF - plugin: c:\program files\Viewpoint\Viewpoint Experience Technology\npViewpoint.dll

---- FIREFOX POLICIES ----

c:\program files\Mozilla Firefox\greprefs\all.js - pref("network.IDN.whitelist.xn--mgbaam7a8h", true);

c:\program files\Mozilla Firefox\greprefs\all.js - pref("network.IDN.whitelist.xn--mgberp4a5d4ar", true);

c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("dom.ipc.plugins.enabled", false);

.

**************************************************************************

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net

Rootkit scan 2010-10-22 19:43

Windows 5.1.2600 Service Pack 2 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully

hidden files: 0

**************************************************************************

.

------------------------ Other Running Processes ------------------------

.

c:\windows\system32\LxrJD31s.exe

c:\windows\BCMSMMSG.exe

c:\program files\Microsoft AntiSpyware\gcasDtServ.exe

c:\windows\system32\wscntfy.exe

.

**************************************************************************

.

Completion time: 2010-10-22 19:46:48 - machine was rebooted

ComboFix-quarantined-files.txt 2010-10-23 02:46

ComboFix2.txt 2010-10-23 00:31

Pre-Run: 32,988,553,216 bytes free

Post-Run: 32,929,132,544 bytes free

- - End Of File - - 8A09F33590B240100325E4144125EDD2

Link to post
Share on other sites

Almost I would like to still run some scans to double check :D

Go to Start > My Computer > C:\

Then Navigate to C:\Qoobox\Quarantine\[4]-Submit_Date_Time.zip

Click Here to upload the submit.zip please.

Update Run Malwarebytes

================

Please update\run Malwarebytes' Anti-Malware.

Double Click the Malwarebytes Anti-Malware icon to run the application.

  • Click on the update tab then click on Check for updates.
  • If an update is found, it will download and install the latest version.
  • Once the update has loaded, go to the Scanner tab and select "Perform Quick Scan", then click Scan.
  • The scan may take some time to finish,so please be patient.
  • When the scan is complete, click OK, then Show Results to view the results.
  • Make sure that everything is checked, and click Remove Selected.
  • When disinfection is completed, a log will open in Notepad and you may be prompted to Restart.(See Extra Note)
  • The log is automatically saved by MBAM and can be viewed by clicking the Logs tab in MBAM.
  • Copy&Paste the entire report in your next reply.

Extra Note:

If MBAM encounters a file that is difficult to remove,you will be presented with 1 of 2 prompts,click OK to either and let MBAM proceed with the disinfection process,if asked to restart the computer,please do so immediatley.

=====

Please do a scan with Kaspersky Online Scanner

Note: If you are using Windows Vista, open your browser by right-clicking on its icon and select 'Run as administrator' to perform this scan.

Click on the Accept button and install any components it needs.

  • The program will install and then begin downloading the latest definition files.
  • After the files have been downloaded on the left side of the page in the Scan section select My Computer
  • This will start the program and scan your system.
  • The scan will take a while, so be patient and let it run.
  • Once the scan is complete, click on View scan report
  • Now, click on the Save Report as button.
  • Save the file to your desktop.
  • Copy and paste that information in your next post.

Link to post
Share on other sites

here is latest MBAM log:

Malwarebytes' Anti-Malware 1.46

www.malwarebytes.org

Database version: 4928

Windows 5.1.2600 Service Pack 2

Internet Explorer 6.0.2900.2180

10/23/2010 11:33:05 AM

mbam-log-2010-10-23 (11-33-05).txt

Scan type: Quick scan

Objects scanned: 143241

Time elapsed: 5 minute(s), 39 second(s)

Memory Processes Infected: 0

Memory Modules Infected: 0

Registry Keys Infected: 0

Registry Values Infected: 0

Registry Data Items Infected: 0

Folders Infected: 0

Files Infected: 0

Memory Processes Infected:

(No malicious items detected)

Memory Modules Infected:

(No malicious items detected)

Registry Keys Infected:

(No malicious items detected)

Registry Values Infected:

(No malicious items detected)

Registry Data Items Infected:

(No malicious items detected)

Folders Infected:

(No malicious items detected)

Files Infected:

(No malicious items detected)

I cannot run Kaspersky because Java is not running. I uninstalled the earlier version of Java (just now) and downloaded the latest version however it is not completing the install - no files are being installed. Something is preventing this?

Link to post
Share on other sites

Yes you can go ahead and re-enable the items with Defogger.

Please click here to download Kaspersky Virus Removal Tool.

  1. Double click on the file you just downloaded and let it install.
  2. It will install to your desktop.
  3. After that leave what is selected and put a check next to My Computer.
  4. Click on the option that says Threat Detection and change it to Disinfect,delete if disinfection fails.
  5. Then click on Start Scan.
  6. Before it is done it may prompt for action regardless of the setting so choose delete if prompted.
  7. When the scan is done no log will be produced.
  8. Click on the bottom where it says Report to open the report.
  9. Then highlight of of the items found by using ctrl + a on your keyboard to select all or use your mouse to select all then right click and choose copy.
  10. This will copy the items that it found to the clipboard you can then open notepad (go to start then run then type in notepad) and choose paste to paste the contents into Notepad.
  11. You can save this on the desktop.
  12. Post the contents of the document in your next reply.

Note: This tool will self uninstall when you close it so please save the log before closing it.

Link to post
Share on other sites

Here is Kaspersy log:

Autoscan: completed 52 minutes ago (events: 12, objects: 81109, time: 00:41:15)

10/24/2010 8:55:16 AM Task started

10/24/2010 9:03:10 AM Detected: Exploit.Java.ByteVerify C:\Documents and Settings\Sisk\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\file\animan.class-4379e08a-743c2ff2.class

10/24/2010 9:03:10 AM Detected: Exploit.Java.ByteVerify C:\Documents and Settings\Sisk\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\file\animan.class-15019a97-794e59fa.class

10/24/2010 9:03:13 AM Deleted: Exploit.Java.ByteVerify C:\Documents and Settings\Sisk\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\file\animan.class-4379e08a-743c2ff2.class

10/24/2010 9:03:59 AM Deleted: Exploit.Java.ByteVerify C:\Documents and Settings\Sisk\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\file\animan.class-15019a97-794e59fa.class

10/24/2010 9:15:53 AM Detected: Net-Worm.Win32.Kido.ih C:\Qoobox\Quarantine\[4]-Submit_2010-10-22_19.37.37.zip/tnpmg.dll

10/24/2010 9:17:20 AM Untreated: Net-Worm.Win32.Kido.ih C:\Qoobox\Quarantine\[4]-Submit_2010-10-22_19.37.37.zip/tnpmg.dll Cannot be disinfected

10/24/2010 9:17:21 AM Deleted: Net-Worm.Win32.Kido.ih C:\Qoobox\Quarantine\[4]-Submit_2010-10-22_19.37.37.zip/tnpmg.dll

10/24/2010 9:17:46 AM Detected: Trojan.Win32.Qhost.adl C:\System Volume Information\_restore{B37680B2-BA0A-4E5D-BF30-83E44C588624}\RP173\A0003778.exe/UPX

10/24/2010 9:17:48 AM Deleted: Trojan.Win32.Qhost.adl C:\System Volume Information\_restore{B37680B2-BA0A-4E5D-BF30-83E44C588624}\RP173\A0003778.exe

10/24/2010 9:35:53 AM Processing error C:\WINDOWS\SYSTEM32\DLLCACHE\ntdos804.sys Read error

10/24/2010 9:36:31 AM Task completed

Link to post
Share on other sites

Please submit the following file to one of these online file scanners.

(All you have to do is copy and paste the file path into the box when you click on Browse then once you have done that click on the open button then submit)

C:\WINDOWS\SYSTEM32\DLLCACHE\ntdos804.sys

Jotti File Scan
VirusTotal File Scan

This will produce a report after the scan is complete, please copy and paste those results in your next post.

==================

Also let me know of any remaining issues.

Please download DDS and save it to your desktop.

  • Double click dds.scr to run the tool.
  • When done, DDS.txt will open as well as attach.txt.
  • Save both reports to your desktop.

---------------------------------------------------

Please include the contents of the following in your next reply:

DDS.txt

attach.txt

Link to post
Share on other sites

File scan results:

File already submitted: The file sent has already been analysed by VirusTotal in the past. This is same basic info regarding the sample itself and its last analysis:

MD5: 3cffaefff23b0d208214a6d3061a5b1b

Date first seen: 2009-03-31 02:13:25 (UTC)

Date last seen: 2010-09-13 16:53:22 (UTC)

Detection ratio: 0/43

DDS (Ver_10-10-21.02) - NTFSx86

Run by Sisk at 17:23:37.07 on Sun 10/24/2010

Internet Explorer: 6.0.2900.2180

Microsoft Windows XP Home Edition 5.1.2600.2.1252.1.1033.18.1150.789 [GMT -7:00]

============== Running Processes ===============

C:\WINDOWS\system32\svchost -k DcomLaunch

svchost.exe

C:\WINDOWS\System32\svchost.exe -k netsvcs

svchost.exe

svchost.exe

C:\WINDOWS\system32\spoolsv.exe

C:\WINDOWS\Explorer.EXE

C:\WINDOWS\system32\LxrJD31s.exe

C:\Program Files\NCNETWORKSDM\bin\sprtsvc.exe

C:\Program Files\NCNETWORKSDM\bin\tgsrvc.exe

C:\WINDOWS\system32\svchost.exe -k netsvcs

C:\WINDOWS\BCMSMMSG.exe

C:\Program Files\Dell\Media Experience\PCMService.exe

C:\Program Files\Common Files\Real\Update_OB\realsched.exe

C:\Program Files\Messenger\msmsgs.exe

C:\WINDOWS\system32\wscntfy.exe

C:\Program Files\Microsoft AntiSpyware\gcasDtServ.exe

C:\Program Files\Mozilla Firefox\firefox.exe

C:\Documents and Settings\Sisk\Desktop\dds.scr

============== Pseudo HJT Report ===============

uInternet Connection Wizard,ShellNext = hxxp://www.dell4me.com/myway

BHO: AcroIEHlprObj Class: {06849e9f-c8d7-4d59-b87d-784b7d6be0b3} - c:\program files\adobe\acrobat 6.0\reader\activex\AcroIEHelper.dll

EB: {32683183-48a0-441b-a342-7c2a440a9478} - No File

uRun: [MSMSGS] "c:\program files\messenger\msmsgs.exe" /background

mRun: [igfxTray] c:\windows\system32\igfxtray.exe

mRun: [HotKeysCmds] c:\windows\system32\hkcmd.exe

mRun: [bCMSMMSG] BCMSMMSG.exe

mRun: [PCMService] "c:\program files\dell\media experience\PCMService.exe"

mRun: [QuickTime Task] "c:\program files\quicktime\qttask.exe" -atboottime

mRun: [TkBellExe] "c:\program files\common files\real\update_ob\realsched.exe" -osboot

mRun: [gcasServ] "c:\program files\microsoft antispyware\gcasServ.exe"

mRun: [NCNETWORKSDM] "c:\program files\ncnetworksdm\bin\sprtcmd.exe" /P NCNETWORKSDM

IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe

IE: {CD67F990-D8E9-11d2-98FE-00C0F0318AFE} - {FE54FA40-D68C-11d2-98FA-00C0F0318AFE} - c:\windows\system32\Shdocvw.dll

Trusted Zone: .com\avast

Trusted Zone: mcaffee.com\www.us

Trusted Zone: netflix.com\www

DPF: {17492023-C23A-453E-A040-C7C580BBF700} - hxxp://go.microsoft.com/fwlink/?linkid=39204

DPF: {7F8C8173-AD80-4807-AA75-5672F22B4582} - hxxp://download.zonelabs.com/bin/promotions/spywaredetector/ICSScanner37440.cab

DPF: {BCC0FF27-31D9-4614-A68E-C18E1ADA4389} - hxxp://download.mcafee.com/molbin/shared/mcgdmgr/en-us/1,0,0,19/mcgdmgr.cab

Notify: igfxcui - igfxsrvc.dll

SEH: Microsoft.AntiSpyware.ShellExecuteHook.1: {9ef34ff2-3396-4527-9d27-04c8c1c67806} - c:\program files\microsoft antispyware\shellextension.dll

================= FIREFOX ===================

FF - ProfilePath - c:\docume~1\sisk\applic~1\mozilla\firefox\profiles\2jxqr5hd.default\

FF - prefs.js: browser.search.defaulturl - hxxp://www.google.com/search?lr=&ie=UTF-8&oe=UTF-8&q=

FF - prefs.js: browser.startup.homepage - hxxp://www.teoma.com/

FF - component: c:\documents and settings\sisk\application data\mozilla\firefox\profiles\2jxqr5hd.default\extensions\{3112ca9c-de6d-4884-a869-9855de68056c}\components\frozen.dll

FF - plugin: c:\program files\viewpoint\viewpoint experience technology\npViewpoint.dll

---- FIREFOX POLICIES ----

c:\program files\mozilla firefox\greprefs\all.js - pref("network.IDN.whitelist.xn--mgbaam7a8h", true);

c:\program files\mozilla firefox\greprefs\all.js - pref("network.IDN.whitelist.xn--fiqz9s", true); // Traditional

c:\program files\mozilla firefox\greprefs\all.js - pref("network.IDN.whitelist.xn--fiqs8s", true); // Simplified

c:\program files\mozilla firefox\greprefs\all.js - pref("network.IDN.whitelist.xn--j6w193g", true);

c:\program files\mozilla firefox\greprefs\all.js - pref("network.IDN.whitelist.xn--mgberp4a5d4ar", true);

c:\program files\mozilla firefox\greprefs\all.js - pref("network.IDN.whitelist.xn--mgberp4a5d4a87g", true);

c:\program files\mozilla firefox\greprefs\all.js - pref("network.IDN.whitelist.xn--mgbqly7c0a67fbc", true);

c:\program files\mozilla firefox\greprefs\all.js - pref("network.IDN.whitelist.xn--mgbqly7cvafr", true);

c:\program files\mozilla firefox\greprefs\all.js - pref("network.IDN.whitelist.xn--kpry57d", true); // Traditional

c:\program files\mozilla firefox\greprefs\all.js - pref("network.IDN.whitelist.xn--kprw13d", true); // Simplified

============= SERVICES / DRIVERS ===============

R2 sprtsvc_ncnetworksdm;SupportSoft Sprocket Service (ncnetworksdm);c:\program files\ncnetworksdm\bin\sprtsvc.exe [2010-6-17 206120]

R2 tgsrvc_ncnetworksdm;SupportSoft Repair Service (ncnetworksdm);c:\program files\ncnetworksdm\bin\tgsrvc.exe [2010-6-17 185640]

=============== Created Last 30 ================

2010-10-23 00:23:34 -------- d-sha-r- C:\cmdcons

2010-10-23 00:19:21 98816 ----a-w- c:\windows\sed.exe

2010-10-23 00:19:21 77312 ----a-w- c:\windows\MBR.exe

2010-10-23 00:19:21 256512 ----a-w- c:\windows\PEV.exe

2010-10-23 00:19:21 161792 ----a-w- c:\windows\SWREG.exe

2010-10-20 23:28:48 -------- d-----w- c:\docume~1\sisk\applic~1\Malwarebytes

2010-10-20 23:28:41 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys

2010-10-20 23:28:40 20952 ----a-w- c:\windows\system32\drivers\mbam.sys

2010-10-20 23:28:40 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware

2010-10-20 23:28:40 -------- d-----w- c:\docume~1\alluse~1\applic~1\Malwarebytes

2010-09-29 23:12:20 66520 ----a-w- c:\program files\mozilla firefox\plugins\npnul32.dll

2010-09-29 23:12:20 25048 ----a-w- c:\program files\mozilla firefox\components\browserdirprovider.dll

2010-09-29 23:12:20 140248 ----a-w- c:\program files\mozilla firefox\components\brwsrcmp.dll

==================== Find3M ====================

============= FINISH: 17:24:14.04 ===============

Thanks for your response kahda. I am still not able to install Java. The setup runs but nothing installs - any clues?

Attach.zip

Link to post
Share on other sites

JavaRa log:

JavaRa 1.16 Removal Log.

Report follows after line.

------------------------------------

The JavaRa removal process was started on Mon Oct 25 19:55:35 2010

Found and removed: C:\Documents and Settings\Sisk\Application Data\Sun\Java\jre1.6.0_20

Found and removed: SOFTWARE\Microsoft\Active Setup\Installed Components\{08B0E5C0-4FCB-11CF-AAA5-00401C608500}

------------------------------------

Finished reporting.

Still not finishing on install, Tried to install as a plugin from Firefox but that did not work either. It ends saying "Plugins not installed". Any other ideas?

Link to post
Share on other sites

Hmm ok let's see if anything is left over.

Please download SystemLook from one of the links below and save it to your Desktop.

Download Mirror #1

Download Mirror #2

  • Double-click SystemLook.exe to run it.
  • Copy the content of the following codebox into the main textfield:
    :Folderfind
    Java


  • Click the Look button to start the scan.
  • When finished, a notepad window will open with the results of the scan. Please post this log in your next reply.

Note: The log can also be found on your Desktop entitled SystemLook.txt

Link to post
Share on other sites

So when you click it nothing happens?

* Go here to run an online scannner from ESET.

  • Note: You will need to use Internet explorer for this scan
  • Tick the box next to YES, I accept the Terms of Use.
  • Click Start
  • When asked, allow the activex control to install
  • Click Start
  • Check next options: Remove found threats and Scan unwanted applications.
  • Click Scan
  • Wait for the scan to finish
  • Use notepad to open the logfile located at C:\Program Files\ESET\ESET Online Scanner\log.txt
  • Copy and paste that log as a reply to this topic

Link to post
Share on other sites

ESET did not find any thing to fix, here is the log:

ESETSmartInstaller@High as downloader log:

all ok

# version=7

# OnlineScannerApp.exe=1.0.0.1

# OnlineScanner.ocx=1.0.0.6211

# api_version=3.0.2

# EOSSerial=4dd3f42bdd1b2a43a4793396f4b0d5ef

# end=finished

# remove_checked=true

# archives_checked=false

# unwanted_checked=true

# unsafe_checked=false

# antistealth_checked=true

# utc_time=2010-10-27 11:08:28

# local_time=2010-10-27 04:08:28 (-0800, Pacific Standard Time)

# country="United States"

# lang=1033

# osver=5.1.2600 NT Service Pack 2

# compatibility_mode=8192 67108863 100 0 0 0 0 0

# scanned=38146

# found=0

# cleaned=0

# scan_time=1277

When in Internet Explorer I have been getting the following message on the information bar:

"Your security settings do not allow websites to use ActiveX controls"

I was not able to run ESET from IE because of this and it happens also during MS Windows Update. I have reset settings for ActiveX but it does not change this situation.

Link to post
Share on other sites

Guest
This topic is now closed to further replies.
  • Recently Browsing   0 members

    • No registered users viewing this page.
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.