Advertisement
If you have a new account but are having problems posting or verifying your account, please email us on hello@boards.ie for help. Thanks :)
Hello all! Please ensure that you are posting a new thread or question in the appropriate forum. The Feedback forum is overwhelmed with questions that are having to be moved elsewhere. If you need help to verify your account contact hello@boards.ie
Hi there,
There is an issue with role permissions that is being worked on at the moment.
If you are having trouble with access or permissions on regional forums please post here to get access: https://www.boards.ie/discussion/2058365403/you-do-not-have-permission-for-that#latest

Need help with Vundo removal

  • 21-12-2008 8:09pm
    #1
    Registered Users, Registered Users 2 Posts: 5,836 ✭✭✭


    Hi ASJ,

    I appear to have Vundo (again :o) and am in need of your expertise.

    TrendMicro has displayed alerts for TROJ_VUNDO.TUS a couple of times. Symptoms include browser (IE + Firefox) pop-ups plus SpywareGuard keeps stopping BHOs being added to the browser.

    SuperAnitSpyware found a bunch of stuff but the problem still persists after restarting. Presumably it regenerates upon windows login.

    Heres a HijackThis log


    Logfile of Trend Micro HijackThis v2.0.2
    Scan saved at 20:02:53, on 21/12/2008
    Platform: Windows XP SP2 (WinNT 5.01.2600)
    MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)
    Boot mode: Normal

    Running processes:
    C:\WINDOWS\System32\smss.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\services.exe
    C:\WINDOWS\system32\lsass.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\system32\ngvpnmgr.exe
    C:\WINDOWS\system32\spoolsv.exe
    C:\Program Files\Iron Mountain\Connected BackupPC\AgentService.exe
    C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
    C:\WINDOWS\system32\bmwebcfg.exe
    C:\Program Files\Bonjour\mDNSResponder.exe
    C:\Program Files\Gemplus\GemSafe Libraries User\BIN\GCardSrvNT.exe
    C:\WINDOWS\system32\gtdetectsc.exe
    C:\Program Files\Common Files\GtFlashSwitch\GtFlashSwitch.exe
    C:\Program Files\iPass\iPassConnect\iPCAgent.exe
    C:\Program Files\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE
    C:\Program Files\Trend Micro\OfficeScan Client\ntrtscan.exe
    C:\WINDOWS\system32\nvsvc32.exe
    C:\WINDOWS\system32\HPZipm12.exe
    C:\WINDOWS\system32\StacSV.exe
    C:\WINDOWS\system32\svchost.exe
    C:\Program Files\Apache Software Foundation\Tomcat 6.0\bin\tomcat6.exe
    C:\WINDOWS\Explorer.EXE
    C:\WINDOWS\system32\SearchIndexer.exe
    C:\WINDOWS\system32\CCM\CLICOMP\RemCtrl\Wuser32.exe
    C:\WINDOWS\system32\CCM\CcmExec.exe
    C:\Program Files\Trend Micro\OfficeScan Client\tmlisten.exe
    C:\Program Files\Trend Micro\OfficeScan Client\pccntmon.exe
    C:\Program Files\ (x86)\CyberLink\PowerDVD DX\PDVDDXSrv.exe
    C:\Program Files\Iron Mountain\Connected BackupPC\Agent.exe
    C:\WINDOWS\system32\RunDLL32.exe
    C:\Program Files\Gemplus\GAC\GACService.exe
    C:\Program Files\Common Files\Real\Update_OB\realsched.exe
    C:\Program Files\Apache Software Foundation\Tomcat 6.0\bin\tomcat6w.exe
    C:\Program Files\iTunes\iTunesHelper.exe
    C:\Program Files\iPass\iPassConnect\downloader\ipccheck.exe
    C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
    C:\Program Files\Windows Desktop Search\WindowsSearch.exe
    C:\Program Files\OpenOffice.org 2.4\program\soffice.exe
    C:\Program Files\SpywareGuard\sgmain.exe
    C:\Program Files\OpenOffice.org 2.4\program\soffice.BIN
    C:\Program Files\Gemplus\GemSafe Libraries User\BIN\GCardSrv.exe
    C:\WINDOWS\system32\SearchProtocolHost.exe
    C:\Program Files\SpywareGuard\sgbhp.exe
    C:\Program Files\Trend Micro\OfficeScan Client\CNTAoSMgr.exe
    C:\WINDOWS\TEMP\CT94A5.EXE
    C:\Program Files\iPod\bin\iPodService.exe
    C:\Program Files\Mozilla Firefox\firefox.exe
    C:\WINDOWS\system32\rundll32.exe
    C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://my.msp.com/
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://mymsp.msp.com/mymsp
    R1 - HKCU\Software\Microsoft\Internet Connection Wizard,ShellNext = http://mymsp.msp.com/mymsp
    R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Window Title = Microsoft Internet Explorer provided by msp GRID
    R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = *.local
    O2 - BHO: SpywareGuard Download Protection - {4A368E80-174F-4872-96B5-0B27DDD11DB2} - C:\Program Files\SpywareGuard\dlprotect.dll
    O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.6.0_04\bin\ssv.dll
    O2 - BHO: {1d183cfb-a523-feea-9d24-47dce8436b1a} - {a1b6348e-cd74-42d9-aeef-325abfc381d1} - C:\WINDOWS\system32\mruvbb.dll
    O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\system32\NvCpl.dll,NvStartup
    O4 - HKLM\..\Run: [OfficeScanNT Monitor] "C:\Program Files\Trend Micro\OfficeScan Client\pccntmon.exe" -HideWindow
    O4 - HKLM\..\Run: [PDVDDXSrv] "C:\Program Files\ (x86)\CyberLink\PowerDVD DX\PDVDDXSrv.exe"
    O4 - HKLM\..\Run: [AgentUiRunKey] "C:\Program Files\Iron Mountain\Connected BackupPC\Agent.exe" -ni -sss -e http://localhost:16386/
    O4 - HKLM\..\Run: [NvMediaCenter] RunDLL32.exe NvMCTray.dll,NvTaskbarInit
    O4 - HKLM\..\Run: [gemstrmw] C:\WINDOWS\system32\gemstrmw.exe /r
    O4 - HKLM\..\Run: [GACService] C:\Program Files\Gemplus\GAC\GACService.exe
    O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Common Files\Real\Update_OB\realsched.exe" -osboot
    O4 - HKLM\..\Run: [ApacheTomcatMonitor] "C:\Program Files\Apache Software Foundation\Tomcat 6.0\bin\tomcat6w.exe" //MS//Tomcat6
    O4 - HKLM\..\Run: [REGSHAVE] C:\Program Files\REGSHAVE\REGSHAVE.EXE /AUTORUN
    O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\QTTask.exe" -atboottime
    O4 - HKLM\..\Run: [iTunesHelper] "C:\Program Files\iTunes\iTunesHelper.exe"
    O4 - HKCU\..\Run: [ccleaner] "C:\Program Files\CCleaner\CCleaner.exe" /AUTO
    O4 - HKCU\..\Run: [MsnMsgr] "C:\Program Files\Windows Live\Messenger\MsnMsgr.Exe" /background
    O4 - HKCU\..\Run: [SUPERAntiSpyware] C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
    O4 - HKUS\S-1-5-19\..\Run: [wubabebepa] Rundll32.exe "C:\WINDOWS\system32\tezepugi.dll",s (User 'LOCAL SERVICE')
    O4 - HKUS\S-1-5-20\..\Run: [wubabebepa] Rundll32.exe "C:\WINDOWS\system32\tezepugi.dll",s (User 'NETWORK SERVICE')
    O4 - S-1-5-18 Startup: RegUpdates.cmd (User 'SYSTEM')
    O4 - .DEFAULT Startup: RegUpdates.cmd (User 'Default user')
    O4 - .DEFAULT User Startup: RegUpdates.cmd (User 'Default user')
    O4 - Startup: OpenOffice.org 2.4.lnk = C:\Program Files\OpenOffice.org 2.4\program\quickstart.exe
    O4 - Startup: SpywareGuard.lnk = C:\Program Files\SpywareGuard\sgmain.exe
    O4 - Global Startup: ExifLauncher2.lnk = C:\Program Files\FinePixViewer\QuickDCF2.exe
    O4 - Global Startup: Windows Desktop Search.lnk = C:\Program Files\Windows Desktop Search\WindowsSearch.exe
    O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\OFFICE11\EXCEL.EXE/3000
    O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_04\bin\ssv.dll
    O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_04\bin\ssv.dll
    O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\OFFICE11\REFIEBAR.DLL
    O9 - Extra button: @C:\Program Files\Messenger\Msgslang.dll,-61144 - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O9 - Extra 'Tools' menuitem: @C:\Program Files\Messenger\Msgslang.dll,-61144 - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O10 - Unknown file in Winsock LSP: bmnet.dll
    O10 - Unknown file in Winsock LSP: bmnet.dll
    O10 - Unknown file in Winsock LSP: bmnet.dll
    O14 - IERESET.INF: START_PAGE_URL=http://mymsp.msp.com/mymsp
    O15 - Trusted Zone: *.capeweb
    O15 - Trusted Zone: *.msp
    O15 - Trusted Zone: *.msp.com
    O15 - Trusted Zone: *.northamerica.msp.net
    O15 - Trusted Zone: *.firsthandfoundation
    O15 - Trusted Zone: *.intellinet
    O15 - Trusted Zone: *.krpro01
    O15 - Trusted Zone: *.meetingplace
    O15 - Trusted Zone: *.msprjcrtweb
    O15 - Trusted Zone: *.msprjprdweb
    O15 - Trusted Zone: *.mymeded
    O15 - Trusted Zone: msp.skillport.com
    O15 - Trusted Zone: *.vcmsp.com
    O15 - Trusted Zone: *.webwhqprd
    O15 - Trusted Zone: *.wsswebcrtwhq01
    O15 - Trusted Zone: *.wsswebcrtwhq02
    O15 - Trusted Zone: *.wsswebwhq01
    O15 - Trusted Zone: *.wsswebwhq02
    O16 - DPF: {60A6F73C-54B5-46C1-B436-5E4E6AFF2136} (Siebel High Interactivity Framework) - http://navigator.msp.com/callcenter/19234/applets/SiebelAx_HI_Client.cab
    O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} (WUWebControl Class) - http://www.update.microsoft.com/windowsupdate/v6/V5Controls/en/x86/client/wuweb_site.cab?1218301312875
    O16 - DPF: {8C244272-1DC1-4CE7-9C6C-FABCA09EB543} (Siebel Desktop Integration) - http://navigator.msp.com/callcenter/19234/applets/SiebelAx_Desktop_Integration.cab
    O16 - DPF: {EAE0D004-1B84-4F67-AA92-35B3A0B4F045} (Siebel Email Support for Microsoft Outlook and Lotus Notes) - http://navigator.msp.com/callcenter/19234/applets/SiebelAx_OutBound_mail.cab
    O17 - HKLM\System\CCS\Services\Tcpip\Parameters: Domain = northamerica.msp.net
    O17 - HKLM\Software\..\Telephony: DomainName = northamerica.msp.net
    O17 - HKLM\System\CCS\Services\Tcpip\..\{D43A8BB4-C26F-4EEB-9181-54288A1D6323}: NameServer = 212.104.130.9,212.104.130.65
    O17 - HKLM\System\CS1\Services\Tcpip\Parameters: Domain = northamerica.msp.net
    O20 - AppInit_DLLs: mruvbb.dll,C:\WINDOWS\system32\vutofudi.dll
    O20 - Winlogon Notify: !SASWinLogon - C:\Program Files\SUPERAntiSpyware\SASWINLO.dll
    O23 - Service: AgentService - Iron Mountain Incorporated - C:\Program Files\Iron Mountain\Connected BackupPC\AgentService.exe
    O23 - Service: Apple Mobile Device - Apple Inc. - C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
    O23 - Service: Bytemobile Web Configurator (bmwebcfg) - Bytemobile, Inc. - C:\WINDOWS\system32\bmwebcfg.exe
    O23 - Service: Bonjour Service - Apple Inc. - C:\Program Files\Bonjour\mDNSResponder.exe
    O23 - Service: GemSAFE Card Server - Gemplus - C:\Program Files\Gemplus\GemSafe Libraries User\BIN\GCardSrvNT.exe
    O23 - Service: GtDetectSc Service (gtdetectsc) - OptionNV - C:\WINDOWS\system32\gtdetectsc.exe
    O23 - Service: GtFlashSwitch - OptionNV - C:\Program Files\Common Files\GtFlashSwitch\GtFlashSwitch.exe
    O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\1050\Intel 32\IDriverT.exe
    O23 - Service: iPassConnectEngine - iPass - C:\Program Files\iPass\iPassConnect\iPassConnectEngine.exe
    O23 - Service: iPCAgent - iPass, Inc. - C:\Program Files\iPass\iPassConnect\iPCAgent.exe
    O23 - Service: iPod Service - Apple Inc. - C:\Program Files\iPod\bin\iPodService.exe
    O23 - Service: Aventail VPN Client (NgVpnMgr) - Aventail Corporation - C:\WINDOWS\system32\ngvpnmgr.exe
    O23 - Service: OfficeScanNT RealTime Scan (ntrtscan) - Trend Micro Inc. - C:\Program Files\Trend Micro\OfficeScan Client\ntrtscan.exe
    O23 - Service: NVIDIA Display Driver Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\system32\nvsvc32.exe
    O23 - Service: Pml Driver HPZ12 - HP - C:\WINDOWS\system32\HPZipm12.exe
    O23 - Service: SigmaTel Audio Service (STacSV) - SigmaTel, Inc. - C:\WINDOWS\system32\StacSV.exe
    O23 - Service: OfficeScan NT Listener (tmlisten) - Trend Micro Inc. - C:\Program Files\Trend Micro\OfficeScan Client\tmlisten.exe
    O23 - Service: OfficeScan NT Proxy Service (TmProxy) - Trend Micro Inc. - C:\Program Files\Trend Micro\OfficeScan Client\TmProxy.exe
    O23 - Service: Apache Tomcat (Tomcat6) - Apache Software Foundation - C:\Program Files\Apache Software Foundation\Tomcat 6.0\bin\tomcat6.exe

    --
    End of file - 10766 bytes



    Any ideas?


Comments

  • Closed Accounts Posts: 1,970 ✭✭✭ActorSeeksJob


    Hi

    Download Rooter.exe to your desktop
    • Then doubleclick it to start the tool
    • A Notepad file containing the report will open, also found at %systemdrive%\Rooter.txt. Post that here


  • Registered Users, Registered Users 2 Posts: 5,836 ✭✭✭Vokes


    Hey, thanks.

    Have the output here:



    Microsoft Windows XP Professional ( v5.1.2600 ) Service Pack 2
    X86-based PC ( Multiprocessor Free : Intel(R) Core(TM)2 Duo CPU T7500 @ 2.20GHz )
    BIOS : Phoenix ROM BIOS PLUS Version 1.10 A07
    USER : SB013944 ( Not Administrator ! )
    BOOT : Normal boot

    Antivirus : Trend Micro OfficeScan Antivirus 8.0 (Activated)


    C:\ (Local Disk) - NTFS - Total:111 Go (Free:50 Go)
    D:\ (CD or DVD)

    21/12/2008|21:25

    \\ Search..

    C:\WINDOWS\system32\knqYGfhk.ini
    C:\WINDOWS\system32\knqYGfhk.ini2
    ==> VUNDO <==


    1 - "C:\Rooter$\Rooter_1.txt" - 21/12/2008|21:25

    \\ Scan completed at 21:25


  • Registered Users, Registered Users 2 Posts: 5,836 ✭✭✭Vokes


    Hmmm, it's also intermittantly redirecting me and prompting me to install Antivirus 2009, which from looking at other threads doesn't appear to be legit.


  • Closed Accounts Posts: 1,970 ✭✭✭ActorSeeksJob


    Hello

    Please download the OTMoveIt3 by OldTimer or from here.
    • Save it to your desktop.
    • Please double-click OTMoveIt3.exe to run it. (Note: If you are running on Vista, right-click on the file and choose Run As Administrator).
    • Copy the lines in the codebox below to the clipboard by highlighting ALL of them and pressing CTRL + C (or, after highlighting, right-click and choose Copy):
      :Processes
      explorer.exe
      
      :Services
      
      :Reg
      
      :Files
      C:\WINDOWS\system32\knqYGfhk.ini
      C:\WINDOWS\system32\knqYGfhk.ini2
      
      :Commands
      [purity]
      [emptytemp]
      [start explorer]
      [Reboot]
      
    • Return to OTMoveIt3, right click in the "Paste Instructions for Items to be Moved" window (under the yellow bar) and choose Paste.
    • Click the red Moveit! button.
    • Copy everything in the Results window (under the green bar) to the clipboard by highlighting ALL of them and pressing CTRL + C (or, after highlighting, right-click and choose copy), and paste it in your next reply.
    • Close OTMoveIt3
    Note: If a file or folder cannot be moved immediately you may be asked to reboot the machine to finish the move process. If you are asked to reboot the machine choose Yes. In this case, after the reboot, open Notepad (Start->All Programs->Accessories->Notepad), click File->Open, in the File Name box enter *.log and press the Enter key, navigate to the C:\_OTMoveIt\MovedFiles folder, and open the newest .log file present, and copy/paste the contents of that document back here in your next post.




    Download ComboFix from one of these locations:

    Link 1
    Link 2


    * IMPORTANT !!! Save ComboFix.exe to your Desktop

    • Disable your AntiVirus and AntiSpyware applications, usually via a right click on the System Tray icon. They may otherwise interfere with our tools

    • Double click on ComboFix.exe & follow the prompts.

    • As part of it's process, ComboFix will check to see if the Microsoft Windows Recovery Console is installed. With malware infections being as they are today, it's strongly recommended to have this pre-installed on your machine before doing any malware removal. It will allow you to boot up into a special recovery/repair mode that will allow us to more easily help you should your computer have a problem after an attempted removal of malware.

    • Follow the prompts to allow ComboFix to download and install the Microsoft Windows Recovery Console, and when prompted, agree to the End-User License Agreement to install the Microsoft Windows Recovery Console.

    **Please note: If the Microsoft Windows Recovery Console is already installed, ComboFix will continue it's malware removal procedures.

    RcAuto1.gif


    Once the Microsoft Windows Recovery Console is installed using ComboFix, you should see the following message:

    whatnext.png


    Click on Yes, to continue scanning for malware.

    When finished, it shall produce a log for you. Please include the C:\ComboFix.txt log in your next reply.


  • Registered Users, Registered Users 2 Posts: 5,836 ✭✭✭Vokes


    OTMoiveIt output


    ========== PROCESSES ==========
    Process explorer.exe killed successfully.
    ========== SERVICES/DRIVERS ==========
    ========== REGISTRY ==========
    ========== FILES ==========
    C:\WINDOWS\system32\knqYGfhk.ini moved successfully.
    C:\WINDOWS\system32\knqYGfhk.ini2 moved successfully.
    ========== COMMANDS ==========
    File delete failed. C:\DOCUME~1\sb013944\LOCALS~1\Temp\hsperfdata_SB013944\2372 scheduled to be deleted on reboot.
    File delete failed. C:\DOCUME~1\sb013944\LOCALS~1\Temp\e4j3.tmp_dir17977\exe4jlib.jar scheduled to be deleted on reboot.
    File delete failed. C:\DOCUME~1\sb013944\LOCALS~1\Temp\etilqs_CSmK6LmEWyP2jaHEw4gM scheduled to be deleted on reboot.
    File delete failed. C:\DOCUME~1\sb013944\LOCALS~1\Temp\etilqs_nLiYU6dOnXf2UhMsd1B4 scheduled to be deleted on reboot.
    File delete failed. C:\DOCUME~1\sb013944\LOCALS~1\Temp\etilqs_nLiYU6dOnXf2UhMsd1B4-journal scheduled to be deleted on reboot.
    File delete failed. C:\DOCUME~1\sb013944\LOCALS~1\Temp\~DF1D12.tmp scheduled to be deleted on reboot.
    File delete failed. C:\DOCUME~1\sb013944\LOCALS~1\Temp\~DF5DE7.tmp scheduled to be deleted on reboot.
    User's Temp folder emptied.
    User's Temporary Internet Files folder emptied.
    User's Internet Explorer cache folder emptied.
    Local Service Temp folder emptied.
    File delete failed. C:\Documents and Settings\LocalService\Local Settings\Temporary Internet Files\Content.IE5\index.dat scheduled to be deleted on reboot.
    Local Service Temporary Internet Files folder emptied.
    File delete failed. C:\WINDOWS\temp\hsperfdata_SYSTEM\1808 scheduled to be deleted on reboot.
    File delete failed. C:\WINDOWS\temp\fb_1712.lck scheduled to be deleted on reboot.
    File delete failed. C:\WINDOWS\temp\GBB7AE.EXE scheduled to be deleted on reboot.
    File delete failed. C:\WINDOWS\temp\Perflib_Perfdata_160.dat scheduled to be deleted on reboot.
    Windows Temp folder emptied.
    Java cache emptied.
    File delete failed. C:\Documents and Settings\sb013944\Local Settings\Application Data\Mozilla\Firefox\Profiles\n7wi5eh3.default\OfflineCache\index.sqlite scheduled to be deleted on reboot.
    File delete failed. C:\Documents and Settings\sb013944\Local Settings\Application Data\Mozilla\Firefox\Profiles\n7wi5eh3.default\Cache\_CACHE_001_ scheduled to be deleted on reboot.
    File delete failed. C:\Documents and Settings\sb013944\Local Settings\Application Data\Mozilla\Firefox\Profiles\n7wi5eh3.default\Cache\_CACHE_002_ scheduled to be deleted on reboot.
    File delete failed. C:\Documents and Settings\sb013944\Local Settings\Application Data\Mozilla\Firefox\Profiles\n7wi5eh3.default\Cache\_CACHE_003_ scheduled to be deleted on reboot.
    File delete failed. C:\Documents and Settings\sb013944\Local Settings\Application Data\Mozilla\Firefox\Profiles\n7wi5eh3.default\Cache\_CACHE_MAP_ scheduled to be deleted on reboot.
    File delete failed. C:\Documents and Settings\sb013944\Local Settings\Application Data\Mozilla\Firefox\Profiles\n7wi5eh3.default\urlclassifier3.sqlite scheduled to be deleted on reboot.
    File delete failed. C:\Documents and Settings\sb013944\Local Settings\Application Data\Mozilla\Firefox\Profiles\n7wi5eh3.default\XUL.mfl scheduled to be deleted on reboot.
    FireFox cache emptied.
    Temp folders emptied.
    Explorer started successfully

    OTMoveIt3 by OldTimer - Version 1.0.7.2 log created on 12222008_134806



    ComboFix output

    ComboFix 08-12-21.04 - SB013944 2008-12-22 14:05:00.1 - NTFSx86
    Microsoft Windows XP Professional 5.1.2600.2.1252.1.1033.18.2046.1399 [GMT 0:00]
    Running from: c:\documents and settings\sb013944\Desktop\ComboFix.exe
    * Created a new restore point
    .
    The following files were disabled during the run:
    c:\windows\system32\mruvbb.dll


    ((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
    .

    c:\documents and settings\All Users\Application Data\Microsoft\Network\Downloader\qmgr0.dat
    c:\documents and settings\All Users\Application Data\Microsoft\Network\Downloader\qmgr1.dat
    c:\documents and settings\sb013944\Application Data\gadcom
    c:\windows\system32\_000110_.tmp.dll
    c:\windows\system32\_000114_.tmp.dll
    c:\windows\system32\dsnmkiow.dll
    c:\windows\system32\idizesub.ini
    c:\windows\system32\katpoglw.ini
    c:\windows\system32\mruvbb.dll.vir
    c:\windows\system32\phyxkrtu.dll
    c:\windows\system32\wlgoptak.dll

    BITS: Possible infected sites

    hxxp://INSMSWHQ01:80
    hxxp://INSMSWHQ01.northamerica.msp.net:80
    hxxp://FILESRVLON1:80
    .
    ((((((((((((((((((((((((( Files Created from 2008-11-22 to 2008-12-22 )))))))))))))))))))))))))))))))
    .

    2008-12-22 13:48 . 2008-12-22 13:48 <DIR> d
    C:\_OTMoveIt
    2008-12-21 21:25 . 2008-12-22 13:46 <DIR> d
    C:\Rooter$
    2008-12-21 19:08 . 2008-12-21 19:08 <DIR> d
    c:\documents and settings\All Users\Application Data\SUPERAntiSpyware.com
    2008-12-21 19:07 . 2008-12-21 19:07 <DIR> d
    c:\program files\SUPERAntiSpyware
    2008-12-21 19:07 . 2008-12-21 19:07 <DIR> d
    c:\documents and settings\sb013944\Application Data\SUPERAntiSpyware.com
    2008-12-21 19:06 . 2008-12-21 19:06 <DIR> d
    c:\program files\Common Files\Wise Installation Wizard
    2008-12-21 18:33 . 2008-12-21 18:33 <DIR> d
    C:\VundoFix Backups
    2008-12-21 17:43 . 2008-12-21 18:06 <DIR> d
    c:\program files\SpywareGuard
    2008-12-21 16:50 . 2008-12-21 16:50 <DIR> d
    c:\documents and settings\sb013944\LocalLow
    2008-12-21 16:50 . 2008-12-21 16:50 <DIR> d
    c:\documents and settings\All Users\Application Data\TVU Networks
    2008-12-19 17:32 . 2008-12-19 17:32 <DIR> d
    c:\documents and settings\sb013944\Application Data\cmw
    2008-12-19 17:31 . 2008-12-19 17:31 <DIR> d
    c:\program files\winpwn
    2008-12-19 16:35 . 2008-12-19 16:35 <DIR> d
    c:\program files\Bonjour
    2008-12-19 16:33 . 2008-12-19 16:33 <DIR> d
    c:\program files\iTunes
    2008-12-19 16:33 . 2008-12-19 16:33 <DIR> d
    c:\program files\iPod
    2008-12-19 16:33 . 2008-12-19 16:33 <DIR> d
    c:\documents and settings\All Users\Application Data\{3276BE95_AF08_429F_A64F_CA64CB79BCF6}
    2008-12-19 16:31 . 2008-12-19 16:31 <DIR> d
    c:\program files\QuickTime
    2008-12-12 11:18 . 2008-12-12 11:18 87,336 --a
    c:\windows\system32\dns-sd.exe
    2008-12-12 11:11 . 2008-12-12 11:11 61,440 --a
    c:\windows\system32\dnssd.dll
    2008-11-27 00:06 . 2008-11-27 00:06 9,087 --a
    c:\windows\system32\folder.jpg
    2008-11-26 09:50 . 2008-11-26 09:50 <DIR> d
    c:\program files\REGSHAVE
    2008-11-26 09:50 . 2008-11-26 09:57 <DIR> d
    c:\program files\FinePixViewer
    2008-11-26 09:50 . 2003-09-03 16:45 274,432 --a
    c:\windows\system32\FFTIFF16.dll
    2008-11-26 09:50 . 2006-07-12 14:39 208,896 --a
    c:\windows\system32\FFRafShellEx.dll
    2008-11-26 09:50 . 2004-07-24 21:28 155,648 --a
    c:\windows\system32\FFRAFLIB.DLL
    2008-11-26 09:50 . 2001-11-25 11:11 81,924
    c:\windows\system32\drivers\VC4CB104.SYS
    2008-11-26 09:50 . 2002-02-05 16:33 69,632 --a
    c:\windows\system32\FREGSHEX.DLL
    2008-11-26 09:50 . 2002-02-27 11:27 65,536 --a
    c:\windows\system32\FINFCHECK.dll
    2008-11-26 09:50 . 2002-06-25 10:06 45,056 --a
    c:\windows\system32\FINFCOPY.dll
    2008-11-26 09:50 . 2002-02-13 10:00 45,056 --a
    c:\windows\system32\FCLKBTN.DLL

    .
    (((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
    .
    2008-12-22 09:36
    d
    w c:\documents and settings\sb013944\Application Data\OpenOffice.org2
    2008-12-21 17:44
    d
    w c:\program files\Trend Micro
    2008-12-21 16:30 48,396 ----a-w c:\windows\UninstVeetleTVPlayer.exe
    2008-12-20 16:11
    d
    w c:\documents and settings\sb013944\Application Data\uTorrent
    2008-12-20 00:10
    d
    w c:\program files\MediaMonkey
    2008-12-19 16:55
    d
    w c:\documents and settings\sb013944\Application Data\Apple Computer
    2008-12-19 16:42
    d
    w c:\program files\Apple Software Update
    2008-12-19 16:33
    d
    w c:\program files\Common Files\Apple
    2008-11-26 09:57
    d
    w c:\documents and settings\sb013944\Application Data\FUJIFILM
    2008-11-26 09:52
    d--h--w c:\program files\InstallShield Installation Information
    2008-11-20 18:05
    d
    w c:\program files\MSXML 4.0
    2008-11-15 18:19
    d
    w c:\documents and settings\sb013944\Application Data\Sports Interactive
    2008-11-15 18:10
    d
    w c:\program files\Sports Interactive
    2008-11-07 14:23 32,000 ----a-w c:\windows\system32\drivers\usbaapl.sys
    2008-11-04 11:24
    d
    w c:\documents and settings\All Users\Application Data\Sports Interactive
    2008-10-24 11:10 453,632 ----a-w c:\windows\system32\drivers\mrxsmb.sys
    .

    ((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
    .
    .
    *Note* empty entries & legit default entries are not shown
    REGEDIT4

    [HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
    "ccleaner"="c:\program files\CCleaner\CCleaner.exe" [2008-06-25 1209584]
    "SUPERAntiSpyware"="c:\program files\SUPERAntiSpyware\SUPERAntiSpyware.exe" [2008-12-04 1809648]

    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
    "NvCplDaemon"="c:\windows\system32\NvCpl.dll" [2007-04-29 8429568]
    "OfficeScanNT Monitor"="c:\program files\Trend Micro\OfficeScan Client\pccntmon.exe" [2007-12-12 710000]
    "PDVDDXSrv"="c:\program files\ (x86)\CyberLink\PowerDVD DX\PDVDDXSrv.exe" [2006-10-20 118784]
    "AgentUiRunKey"="c:\program files\Iron Mountain\Connected BackupPC\Agent.exe" [2007-07-25 239104]
    "gemstrmw"="c:\windows\system32\gemstrmw.exe" [2004-09-15 24576]
    "GACService"="c:\program files\Gemplus\GAC\GACService.exe" [2006-05-09 1335379]
    "TkBellExe"="c:\program files\Common Files\Real\Update_OB\realsched.exe" [2008-09-09 185896]
    "ApacheTomcatMonitor"="c:\program files\Apache Software Foundation\Tomcat 6.0\bin\tomcat6w.exe" [2008-07-22 98304]
    "REGSHAVE"="c:\program files\REGSHAVE\REGSHAVE.EXE" [2002-02-04 53248]
    "QuickTime Task"="c:\program files\QuickTime\QTTask.exe" [2008-11-04 413696]
    "iTunesHelper"="c:\program files\iTunes\iTunesHelper.exe" [2008-11-20 290088]
    "MSConfig"="c:\windows\PCHealth\HelpCtr\Binaries\MSConfig.exe" [2004-08-04 158208]
    "NvMediaCenter"="NvMCTray.dll" [2007-04-29 c:\windows\system32\nvmctray.dll]

    c:\documents and settings\Default User\Start Menu\Programs\Startup\
    RegUpdates.cmd [2007-09-27 100]

    c:\documents and settings\sb013944\Start Menu\Programs\Startup\
    SpywareGuard.lnk - c:\program files\SpywareGuard\sgmain.exe [2003-08-29 360448]

    c:\documents and settings\All Users\Start Menu\Programs\Startup\
    ExifLauncher2.lnk - c:\program files\FinePixViewer\QuickDCF2.exe [2008-11-26 303104]
    Windows Desktop Search.lnk - c:\program files\Windows Desktop Search\WindowsSearch.exe [2007-02-05 118784]

    [hkey_local_machine\software\microsoft\windows\currentversion\explorer\ShellExecuteHooks]
    "{56F9679E-7826-4C84-81F3-532071A8BCC5}"= "c:\program files\Windows Desktop Search\MSNLNamespaceMgr.dll" [2007-02-05 294400]
    "{5AE067D3-9AFB-48E0-853A-EBB7F4A000DA}"= "c:\program files\SUPERAntiSpyware\SASSEH.DLL" [2008-05-13 77824]

    [HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\!SASWinLogon]
    2008-12-03 14:56 352256 c:\program files\SUPERAntiSpyware\SASWINLO.dll

    [HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\group policy\state\Machine\Scripts\Startup\0\0]
    "Script"=\\insmswhq01\SMSClient\i386\client.vbs

    [HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\group policy\state\S-1-5-21-60319325-1160982951-1601773907-126420\Scripts\Logon\0\0]
    "Script"=\\filesrvwhq\Wallpapers\wallpaper.vbs

    [HKLM\~\startupfolder\C:^Documents and Settings^sb013944^Start Menu^Programs^Startup^OpenOffice.org 2.4.lnk]
    path=c:\documents and settings\sb013944\Start Menu\Programs\Startup\OpenOffice.org 2.4.lnk
    backup=c:\windows\pss\OpenOffice.org 2.4.lnkStartup

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\269add80]
    --ahs---- 2008-12-22 09:01 83067 c:\windows\system32\busezidi.dll

    [HKEY_LOCAL_MACHINE\software\microsoft\security center]
    "UpdatesDisableNotify"=dword:00000001

    [HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\TrendAntiVirus]
    "DisableMonitoring"=dword:00000001

    [HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
    "%windir%\\system32\\sessmgr.exe"=
    "c:\\Program Files\\Microsoft Office Communicator\\communicator.exe"=
    "c:\\Program Files\\Iron Mountain\\Connected BackupPC\\Agent.exe"=
    "c:\\Program Files\\uTorrent\\uTorrent.exe"=
    "c:\\Program Files\\Messenger\\Msmsgs.exe"=
    "c:\\Program Files\\T-Mobile\\Communication Center\\AutoUpdateSrv.exe"=
    "c:\\Program Files\\Charles\\Charles.exe"=
    "c:\\Program Files\\Mozilla Firefox\\firefox.exe"=
    "c:\\Program Files\\Sports Interactive\\Football Manager 2009 Demo\\fm.exe"=
    "c:\\Program Files\\Sports Interactive\\Football Manager 2009\\fm.exe"=
    "c:\\Program Files\\VideoLAN\\VLC\\vlc.exe"=
    "c:\\Program Files\\Gemplus\\GAC\\GACService.exe"=
    "c:\\Program Files\\SpywareGuard\\sgmain.exe"=

    R1 SASDIFSV;SASDIFSV;\??\c:\program files\SUPERAntiSpyware\SASDIFSV.SYS [2008-12-04 8944]
    R1 SASKUTIL;SASKUTIL;\??\c:\program files\SUPERAntiSpyware\SASKUTIL.sys [2008-12-04 55024]
    R2 AgentService;AgentService;"c:\program files\Iron Mountain\Connected BackupPC\AgentService.exe" -p 16386 [2007-07-25 5218304]
    R2 GemSAFE Card Server;GemSAFE Card Server;c:\program files\Gemplus\GemSafe Libraries User\BIN\GCardSrvNT.exe [2005-06-01 118784]
    R2 gtdetectsc;GtDetectSc Service;c:\windows\system32\gtdetectsc.exe [2008-08-17 122880]
    R2 GtFlashSwitch;GtFlashSwitch;"c:\program files\Common Files\GtFlashSwitch\GtFlashSwitch.exe" [2007-02-09 176128]
    R2 iPCAgent;iPCAgent;c:\program files\iPass\iPassConnect\iPCAgent.exe [2007-09-11 90112]
    R2 LV_Tracker;LV_Tracker;c:\windows\system32\DRIVERS\LV_Tracker.sys [2007-07-25 45640]
    R2 MDC80211;iPass Protocol (IEEE 802.1x) v2.3.1.9;c:\windows\system32\DRIVERS\mdc80211.sys [2007-09-11 15793]
    R2 NgVpnMgr;Aventail VPN Client;c:\windows\system32\ngvpnmgr.exe [2007-04-10 194629]
    R2 TmFilter;Trend Micro Filter;\??\c:\program files\Trend Micro\OfficeScan Client\TmXPFlt.sys [2007-06-12 205328]
    R2 TmPreFilter;Trend Micro PreFilter;\??\c:\program files\Trend Micro\OfficeScan Client\TmPreFlt.sys [2007-06-12 36368]
    R2 Tomcat6;Apache Tomcat;"c:\program files\Apache Software Foundation\Tomcat 6.0\bin\tomcat6.exe" //RS//Tomcat6 [2008-07-22 57344]
    R3 NgLog;Aventail VPN Logging;c:\windows\system32\DRIVERS\nglog.sys [2007-04-10 17920]
    R3 NgVpn;Aventail VPN Adapter;c:\windows\system32\DRIVERS\ngvpn.sys [2007-04-10 70144]
    R3 SASENUM;SASENUM;\??\c:\program files\SUPERAntiSpyware\SASENUM.SYS [2008-12-04 7408]
    S3 GTPTSER;GT PT SER;c:\windows\system32\DRIVERS\gtptser.sys [2006-10-31 8064]
    S3 GTUQBUS;GT UQ BUS;c:\windows\system32\DRIVERS\gtuqbus.sys [2006-10-31 36992]
    S3 NgFilter;Aventail VPN Filter;c:\windows\system32\DRIVERS\ngfilter.sys [2007-04-10 15360]
    S3 TmProxy;OfficeScan NT Proxy Service;"c:\program files\Trend Micro\OfficeScan Client\TmProxy.exe" [2007-04-27 558416]
    .
    Contents of the 'Scheduled Tasks' folder

    2008-12-19 c:\windows\Tasks\AppleSoftwareUpdate.job
    - c:\program files\Apple Software Update\SoftwareUpdate.exe [2008-07-30 12:34]

    2008-12-22 c:\windows\Tasks\ozkiozkz.job
    - c:\windows\system32\rundll32.exe [2004-08-04 12:00]

    2008-12-03 c:\windows\Tasks\shutdown.job
    - c:\windows\system32\shutdown.exe [2004-08-04 12:00]
    .
    - - - - ORPHANS REMOVED - - - -

    BHO-{1e38d353-6435-4dd0-8f5b-de69a766971c} - c:\windows\system32\poviwumi.dll
    BHO-{a1b6348e-cd74-42d9-aeef-325abfc381d1} - c:\windows\system32\mruvbb.dll
    HKCU-Run-MsnMsgr - c:\program files\Windows Live\Messenger\MsnMsgr.Exe
    HKLM-Run-CPM25a9ee1c - c:\windows\system32\yinerodu.dll
    HKLM-Run-wubabebepa - c:\windows\system32\yijokuwu.dll
    MSConfigStartUp-CPM25a9ee1c - c:\windows\system32\yinerodu.dll
    MSConfigStartUp-wubabebepa - c:\windows\system32\yijokuwu.dll


    .
    Supplementary Scan
    .
    uStart Page = hxxp://my.msp.com/
    uInternet Connection Wizard,ShellNext = hxxp://mymsp.msp.com/mymsp
    uInternet Settings,ProxyOverride = *.local
    IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~2\OFFICE11\EXCEL.EXE/3000
    LSP: bmnet.dll
    Trusted Zone: *.capeweb
    Trusted Zone: *.msp
    Trusted Zone: *.msp.com
    Trusted Zone: *.northamerica.msp.net
    Trusted Zone: *.firsthandfoundation
    Trusted Zone: *.intellinet
    Trusted Zone: *.krpro01
    Trusted Zone: *.meetingplace
    Trusted Zone: *.msprjcrtweb
    Trusted Zone: *.msprjprdweb
    Trusted Zone: *.mymeded
    Trusted Zone: msp.skillport.com
    Trusted Zone: *.vcmsp.com
    Trusted Zone: *.webwhqprd
    Trusted Zone: *.wsswebcrtwhq01
    Trusted Zone: *.wsswebcrtwhq02
    Trusted Zone: *.wsswebwhq01
    Trusted Zone: *.wsswebwhq02
    TCP: {D43A8BB4-C26F-4EEB-9181-54288A1D6323} = 212.104.130.9,212.104.130.65

    c:\windows\Downloaded Program Files\SiebelAx_HI_Client_19234_QF0701.dll - O16 -: {60A6F73C-54B5-46C1-B436-5E4E6AFF2136}
    hxxp://navigator.msp.com/callcenter/19234/applets/SiebelAx_HI_Client.cab
    c:\windows\Downloaded Program Files\SiebelAx_HI_Client.inf

    c:\windows\Downloaded Program Files\SiebelAx_Desktop_Integration_19234.exe - O16 -: {8C244272-1DC1-4CE7-9C6C-FABCA09EB543}
    hxxp://navigator.msp.com/callcenter/19234/applets/SiebelAx_Desktop_Integration.cab
    c:\windows\Downloaded Program Files\SiebelAx_Desktop_Integration.inf

    c:\windows\Downloaded Program Files\SiebelAx_OutBound_mail_19234.dll - O16 -: {EAE0D004-1B84-4F67-AA92-35B3A0B4F045}
    hxxp://navigator.msp.com/callcenter/19234/applets/SiebelAx_OutBound_mail.cab
    c:\windows\Downloaded Program Files\SiebelAx_OutBound_mail.inf
    FF - ProfilePath - c:\documents and settings\sb013944\Application Data\Mozilla\Firefox\Profiles\n7wi5eh3.default\
    FF - prefs.js: browser.startup.homepage - hxxp://www.boards.ie/index.php?filter=subbed
    FF - plugin: c:\program files\Veetle\plugins\npVeetle.dll
    FF - plugin: c:\program files\Veetle\VLC\npvlc.dll
    .

    **************************************************************************

    catchme 0.3.1367 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
    Rootkit scan 2008-12-22 14:10:37
    Windows 5.1.2600 Service Pack 2 NTFS

    scanning hidden processes ...

    scanning hidden autostart entries ...

    scanning hidden files ...

    scan completed successfully
    hidden files: 0

    **************************************************************************
    .
    DLLs Loaded Under Running Processes

    - - - - - - - > 'winlogon.exe'(852)
    c:\program files\SUPERAntiSpyware\SASWINLO.dll
    c:\windows\system32\bmnet.dll
    c:\program files\Bonjour\mdnsNSP.dll

    - - - - - - - > 'lsass.exe'(912)
    c:\windows\system32\bmnet.dll
    c:\program files\Bonjour\mdnsNSP.dll
    .
    Other Running Processes
    .
    c:\windows\system32\scardsvr.exe
    c:\program files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
    c:\windows\system32\bmwebcfg.exe
    c:\program files\Bonjour\mDNSResponder.exe
    c:\program files\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE
    c:\program files\Trend Micro\OfficeScan Client\NTRtScan.exe
    c:\windows\system32\nvsvc32.exe
    c:\windows\system32\HPZipm12.exe
    c:\windows\system32\sessmgr.exe
    c:\windows\system32\stacsv.exe
    c:\windows\system32\searchindexer.exe
    c:\windows\system32\CCM\clicomp\RemCtrl\Wuser32.exe
    c:\windows\system32\CCM\CcmExec.exe
    c:\program files\Trend Micro\OfficeScan Client\TmListen.exe
    c:\windows\system32\msiexec.exe
    c:\program files\Trend Micro\OfficeScan Client\CNTAoSMgr.exe
    c:\windows\Temp\XB811C.EXE
    c:\windows\system32\searchprotocolhost.exe
    c:\program files\iPass\iPassConnect\downloader\ipccheck.exe
    c:\program files\Gemplus\GemSafe Libraries User\BIN\GCardSrv.exe
    c:\program files\iPod\bin\iPodService.exe
    c:\progra~1\COMMON~1\MICROS~1\DW\DWTRIG20.EXE
    c:\program files\SpywareGuard\sgbhp.exe
    c:\windows\system32\searchfilterhost.exe
    .
    **************************************************************************
    .
    Completion time: 2008-12-22 14:14:54 - machine was rebooted
    ComboFix-quarantined-files.txt 2008-12-22 14:14:50

    Pre-Run: 54,471,688,192 bytes free
    Post-Run: 54,406,729,728 bytes free

    WindowsXP-KB310994-SP2-Pro-BootDisk-ENU.exe
    [boot loader]
    timeout=2
    default=multi(0)disk(0)rdisk(0)partition(1)\WINDOWS
    [operating systems]
    c:\cmdcons\BOOTSECT.DAT="Microsoft Windows Recovery Console" /cmdcons
    multi(0)disk(0)rdisk(0)partition(1)\WINDOWS="Microsoft Windows XP Professional" /noexecute=optin /fastdetect

    276



    Thanks


  • Advertisement
  • Closed Accounts Posts: 1,970 ✭✭✭ActorSeeksJob


    Looking good, nearly done

    Please download ATF Cleaner by Atribune.
      Double-click
    ATF-Cleaner.exe to run the program.
    Under Main choose: Select All
    Click the Empty Selected button.
    If you use Firefox browser
      Click
    Firefox at the top and choose: Select All
    Click the Empty Selected button.
    NOTE: If you would like to keep your saved passwords, please click No at the prompt.
    If you use Opera browser
      Click
    Opera at the top and choose: Select All
    Click the Empty Selected button.
    NOTE: If you would like to keep your saved passwords, please click No at the prompt.
    Click Exit on the Main menu to close the program.




    Please download Malwarebytes' Anti-Malware from Here or Here

    Double Click mbam-setup.exe to install the application.
    • Make sure a checkmark is placed next to Update Malwarebytes' Anti-Malware and Launch Malwarebytes' Anti-Malware, then click Finish.
    • If an update is found, it will download and install the latest version.
    • Once the program has loaded, select "Perform Quick Scan", then click Scan.
    • The scan may take some time to finish,so please be patient.
    • When the scan is complete, click OK, then Show Results to view the results.
    • Make sure that everything is checked, and click Remove Selected.
    • When disinfection is completed, a log will open in Notepad and you may be prompted to Restart.(See Extra Note)
    • The log is automatically saved by MBAM and can be viewed by clicking the Logs tab in MBAM.
    • Copy&Paste the entire report in your next reply.
    Extra Note:
    If MBAM encounters a file that is difficult to remove,you will be presented with 1 of 2 prompts,click OK to either and let MBAM proceed with the disinfection process,if asked to restart the computer,please do so immediatly.






    Go to Kaspersky website and perform an online antivirus scan.
    1. Read through the requirements and privacy statement and click on Accept button.
    2. It will start downloading and installing the scanner and virus definitions. You will be prompted to install an application from Kaspersky. Click Run.
    3. When the downloads have finished, click on Settings.
    4. Make sure these boxes are checked (ticked). If they are not, please tick them and click on the Save button:
        Spyware, Adware, Dialers, and other potentially dangerous programs
        Archives
        Mail databases
      [*]Click on My Computer under Scan.
      [*]Once the scan is complete, it will display the results. Click on View Scan Report.
      [*]You will see a list of infected items there. Click on Save Report As....
      [*]Save this report to a convenient place. Change the Files of type to Text file (.txt) before clicking on the Save button. Then post it here.


    5. Registered Users, Registered Users 2 Posts: 5,836 ✭✭✭Vokes


      MBAM log report:

      Malwarebytes' Anti-Malware 1.31
      Database version: 1533
      Windows 5.1.2600 Service Pack 2

      2008-12-22 22:17:26
      mbam-log-2008-12-22 (22-17-26).txt

      Scan type: Quick Scan
      Objects scanned: 57382
      Time elapsed: 4 minute(s), 22 second(s)

      Memory Processes Infected: 0
      Memory Modules Infected: 0
      Registry Keys Infected: 1
      Registry Values Infected: 0
      Registry Data Items Infected: 1
      Folders Infected: 0
      Files Infected: 1

      Memory Processes Infected:
      (No malicious items detected)

      Memory Modules Infected:
      (No malicious items detected)

      Registry Keys Infected:
      HKEY_CURRENT_USER\SOFTWARE\Microsoft\instkey (Trojan.Vundo) -> Quarantined and deleted successfully.

      Registry Values Infected:
      (No malicious items detected)

      Registry Data Items Infected:
      HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\StartMenuLogOff (Hijack.StartMenu) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.

      Folders Infected:
      (No malicious items detected)

      Files Infected:
      C:\WINDOWS\system32\busezidi.dll (Trojan.Vundo) -> Quarantined and deleted successfully.


      Kaspersky Report:

      KASPERSKY ONLINE SCANNER 7 REPORT
      Tuesday, December 23, 2008
      Operating System: Microsoft Windows XP Professional Service Pack 2 (build 2600)
      Kaspersky Online Scanner 7 version: 7.0.25.0
      Program database last update: Monday, December 22, 2008 20:52:41
      Records in database: 1501730

      Scan settings:
      Scan using the following database: extended
      Scan archives: yes
      Scan mail databases: yes

      Scan area - My Computer:
      C:\
      D:\

      Scan statistics:
      Files scanned: 71216
      Threat name: 1
      Infected objects: 2
      Suspicious objects: 0
      Duration of the scan: 03:08:16


      File name / Threat name / Threats count
      C:\Program Files\Trend Micro\OfficeScan Client\SUSPECT\winsinstall.exe Infected: not-a-virus:FraudTool.Win32.VirusRemover.k 1
      C:\Program Files\Trend Micro\OfficeScan Client\SUSPECT\winsinstall_c58.VIR Infected: not-a-virus:FraudTool.Win32.VirusRemover.k 1

      The selected area was scanned.




      Additionally, had a look at the MSCONFIG startup tab and there seems to be another remnant hanging out there. Command is rundll32.exe "C:\WINDOWS\system32\busezidi.dll",b with the location being SOFTWARE\Microsoft\Windows\CurrentVersion\Run. This item is unticked however.


    6. Closed Accounts Posts: 1,970 ✭✭✭ActorSeeksJob


      Post a new HJT log


    7. Registered Users, Registered Users 2 Posts: 5,836 ✭✭✭Vokes


      Logfile of Trend Micro HijackThis v2.0.2
      Scan saved at 08:15, on 2008-12-24
      Platform: Windows XP SP2 (WinNT 5.01.2600)
      MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)
      Boot mode: Normal

      Running processes:
      C:\WINDOWS\System32\smss.exe
      C:\WINDOWS\system32\winlogon.exe
      C:\WINDOWS\system32\services.exe
      C:\WINDOWS\system32\lsass.exe
      C:\WINDOWS\system32\svchost.exe
      C:\WINDOWS\System32\svchost.exe
      C:\WINDOWS\system32\ngvpnmgr.exe
      C:\WINDOWS\system32\spoolsv.exe
      C:\Program Files\Iron Mountain\Connected BackupPC\AgentService.exe
      C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
      C:\WINDOWS\system32\bmwebcfg.exe
      C:\Program Files\Bonjour\mDNSResponder.exe
      C:\Program Files\Gemplus\GemSafe Libraries User\BIN\GCardSrvNT.exe
      C:\WINDOWS\system32\gtdetectsc.exe
      C:\Program Files\Common Files\GtFlashSwitch\GtFlashSwitch.exe
      C:\Program Files\iPass\iPassConnect\iPCAgent.exe
      C:\Program Files\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE
      C:\Program Files\Trend Micro\OfficeScan Client\ntrtscan.exe
      C:\WINDOWS\system32\nvsvc32.exe
      C:\WINDOWS\system32\HPZipm12.exe
      C:\WINDOWS\system32\sessmgr.exe
      C:\WINDOWS\system32\StacSV.exe
      C:\WINDOWS\system32\svchost.exe
      C:\Program Files\Apache Software Foundation\Tomcat 6.0\bin\tomcat6.exe
      C:\WINDOWS\system32\SearchIndexer.exe
      C:\WINDOWS\system32\CCM\CLICOMP\RemCtrl\Wuser32.exe
      C:\WINDOWS\system32\CCM\CcmExec.exe
      C:\Program Files\Trend Micro\OfficeScan Client\tmlisten.exe
      C:\WINDOWS\system32\msiexec.exe
      C:\WINDOWS\TEMP\XYB3A7.EXE
      C:\Program Files\Trend Micro\OfficeScan Client\CNTAoSMgr.exe
      C:\WINDOWS\Explorer.EXE
      C:\Program Files\Trend Micro\OfficeScan Client\pccntmon.exe
      C:\Program Files\ (x86)\CyberLink\PowerDVD DX\PDVDDXSrv.exe
      C:\Program Files\Iron Mountain\Connected BackupPC\Agent.exe
      C:\WINDOWS\system32\RunDLL32.exe
      C:\Program Files\Common Files\Real\Update_OB\realsched.exe
      C:\Program Files\iTunes\iTunesHelper.exe
      C:\Program Files\Gemplus\GemSafe Libraries User\BIN\GCardSrv.exe
      C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
      C:\Program Files\Windows Desktop Search\WindowsSearch.exe
      C:\Program Files\SpywareGuard\sgmain.exe
      C:\Program Files\iPass\iPassConnect\downloader\ipccheck.exe
      C:\Program Files\iPod\bin\iPodService.exe
      C:\Program Files\SpywareGuard\sgbhp.exe
      C:\WINDOWS\system32\SearchProtocolHost.exe
      C:\PROGRA~1\COMMON~1\MICROS~1\DW\DWTRIG20.EXE
      C:\WINDOWS\system32\wuauclt.exe
      C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

      R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://my.msp.com/
      R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://mymsp.msp.com/mymsp
      R1 - HKCU\Software\Microsoft\Internet Connection Wizard,ShellNext = http://mymsp.msp.com/mymsp
      R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = *.local
      O2 - BHO: SpywareGuard Download Protection - {4A368E80-174F-4872-96B5-0B27DDD11DB2} - C:\Program Files\SpywareGuard\dlprotect.dll
      O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.6.0_04\bin\ssv.dll
      O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\system32\NvCpl.dll,NvStartup
      O4 - HKLM\..\Run: [OfficeScanNT Monitor] "C:\Program Files\Trend Micro\OfficeScan Client\pccntmon.exe" -HideWindow
      O4 - HKLM\..\Run: [PDVDDXSrv] "C:\Program Files\ (x86)\CyberLink\PowerDVD DX\PDVDDXSrv.exe"
      O4 - HKLM\..\Run: [AgentUiRunKey] "C:\Program Files\Iron Mountain\Connected BackupPC\Agent.exe" -ni -sss -e http://localhost:16386/
      O4 - HKLM\..\Run: [NvMediaCenter] RunDLL32.exe NvMCTray.dll,NvTaskbarInit
      O4 - HKLM\..\Run: [gemstrmw] C:\WINDOWS\system32\gemstrmw.exe /r
      O4 - HKLM\..\Run: [GACService] C:\Program Files\Gemplus\GAC\GACService.exe
      O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Common Files\Real\Update_OB\realsched.exe" -osboot
      O4 - HKLM\..\Run: [ApacheTomcatMonitor] "C:\Program Files\Apache Software Foundation\Tomcat 6.0\bin\tomcat6w.exe" //MS//Tomcat6
      O4 - HKLM\..\Run: [REGSHAVE] C:\Program Files\REGSHAVE\REGSHAVE.EXE /AUTORUN
      O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\QTTask.exe" -atboottime
      O4 - HKLM\..\Run: [iTunesHelper] "C:\Program Files\iTunes\iTunesHelper.exe"
      O4 - HKCU\..\Run: [ccleaner] "C:\Program Files\CCleaner\CCleaner.exe" /AUTO
      O4 - HKCU\..\Run: [SUPERAntiSpyware] C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
      O4 - S-1-5-18 Startup: RegUpdates.cmd (User 'SYSTEM')
      O4 - .DEFAULT Startup: RegUpdates.cmd (User 'Default user')
      O4 - .DEFAULT User Startup: RegUpdates.cmd (User 'Default user')
      O4 - Startup: SpywareGuard.lnk = C:\Program Files\SpywareGuard\sgmain.exe
      O4 - Global Startup: ExifLauncher2.lnk = C:\Program Files\FinePixViewer\QuickDCF2.exe
      O4 - Global Startup: Windows Desktop Search.lnk = C:\Program Files\Windows Desktop Search\WindowsSearch.exe
      O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\OFFICE11\EXCEL.EXE/3000
      O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_04\bin\ssv.dll
      O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_04\bin\ssv.dll
      O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\OFFICE11\REFIEBAR.DLL
      O9 - Extra button: @C:\Program Files\Messenger\Msgslang.dll,-61144 - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
      O9 - Extra 'Tools' menuitem: @C:\Program Files\Messenger\Msgslang.dll,-61144 - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
      O10 - Unknown file in Winsock LSP: bmnet.dll
      O10 - Unknown file in Winsock LSP: bmnet.dll
      O10 - Unknown file in Winsock LSP: bmnet.dll
      O14 - IERESET.INF: START_PAGE_URL=http://mymsp.msp.com/mymsp
      O15 - Trusted Zone: *.capeweb
      O15 - Trusted Zone: *.msp
      O15 - Trusted Zone: *.msp.com
      O15 - Trusted Zone: *.northamerica.msp.net
      O15 - Trusted Zone: *.firsthandfoundation
      O15 - Trusted Zone: *.intellinet
      O15 - Trusted Zone: *.krpro01
      O15 - Trusted Zone: *.meetingplace
      O15 - Trusted Zone: *.msprjcrtweb
      O15 - Trusted Zone: *.msprjprdweb
      O15 - Trusted Zone: *.mymeded
      O15 - Trusted Zone: msp.skillport.com
      O15 - Trusted Zone: *.vcmsp.com
      O15 - Trusted Zone: *.webwhqprd
      O15 - Trusted Zone: *.wsswebcrtwhq01
      O15 - Trusted Zone: *.wsswebcrtwhq02
      O15 - Trusted Zone: *.wsswebwhq01
      O15 - Trusted Zone: *.wsswebwhq02
      O16 - DPF: {60A6F73C-54B5-46C1-B436-5E4E6AFF2136} (Siebel High Interactivity Framework) - http://navigator.msp.com/callcenter/19234/applets/SiebelAx_HI_Client.cab
      O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} (WUWebControl Class) - http://www.update.microsoft.com/windowsupdate/v6/V5Controls/en/x86/client/wuweb_site.cab?1218301312875
      O16 - DPF: {8C244272-1DC1-4CE7-9C6C-FABCA09EB543} (Siebel Desktop Integration) - http://navigator.msp.com/callcenter/19234/applets/SiebelAx_Desktop_Integration.cab
      O16 - DPF: {EAE0D004-1B84-4F67-AA92-35B3A0B4F045} (Siebel Email Support for Microsoft Outlook and Lotus Notes) - http://navigator.msp.com/callcenter/19234/applets/SiebelAx_OutBound_mail.cab
      O17 - HKLM\System\CCS\Services\Tcpip\Parameters: Domain = northamerica.msp.net
      O17 - HKLM\Software\..\Telephony: DomainName = northamerica.msp.net
      O17 - HKLM\System\CCS\Services\Tcpip\..\{D43A8BB4-C26F-4EEB-9181-54288A1D6323}: NameServer = 212.104.130.9,212.104.130.65
      O17 - HKLM\System\CS1\Services\Tcpip\Parameters: Domain = northamerica.net
      O20 - Winlogon Notify: !SASWinLogon - C:\Program Files\SUPERAntiSpyware\SASWINLO.dll
      O23 - Service: AgentService - Iron Mountain Incorporated - C:\Program Files\Iron Mountain\Connected BackupPC\AgentService.exe
      O23 - Service: Apple Mobile Device - Apple Inc. - C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
      O23 - Service: Bytemobile Web Configurator (bmwebcfg) - Bytemobile, Inc. - C:\WINDOWS\system32\bmwebcfg.exe
      O23 - Service: Bonjour Service - Apple Inc. - C:\Program Files\Bonjour\mDNSResponder.exe
      O23 - Service: GemSAFE Card Server - Gemplus - C:\Program Files\Gemplus\GemSafe Libraries User\BIN\GCardSrvNT.exe
      O23 - Service: GtDetectSc Service (gtdetectsc) - OptionNV - C:\WINDOWS\system32\gtdetectsc.exe
      O23 - Service: GtFlashSwitch - OptionNV - C:\Program Files\Common Files\GtFlashSwitch\GtFlashSwitch.exe
      O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\1050\Intel 32\IDriverT.exe
      O23 - Service: iPassConnectEngine - iPass - C:\Program Files\iPass\iPassConnect\iPassConnectEngine.exe
      O23 - Service: iPCAgent - iPass, Inc. - C:\Program Files\iPass\iPassConnect\iPCAgent.exe
      O23 - Service: iPod Service - Apple Inc. - C:\Program Files\iPod\bin\iPodService.exe
      O23 - Service: Aventail VPN Client (NgVpnMgr) - Aventail Corporation - C:\WINDOWS\system32\ngvpnmgr.exe
      O23 - Service: OfficeScanNT RealTime Scan (ntrtscan) - Trend Micro Inc. - C:\Program Files\Trend Micro\OfficeScan Client\ntrtscan.exe
      O23 - Service: NVIDIA Display Driver Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\system32\nvsvc32.exe
      O23 - Service: Pml Driver HPZ12 - HP - C:\WINDOWS\system32\HPZipm12.exe
      O23 - Service: SigmaTel Audio Service (STacSV) - SigmaTel, Inc. - C:\WINDOWS\system32\StacSV.exe
      O23 - Service: OfficeScan NT Listener (tmlisten) - Trend Micro Inc. - C:\Program Files\Trend Micro\OfficeScan Client\tmlisten.exe
      O23 - Service: OfficeScan NT Proxy Service (TmProxy) - Trend Micro Inc. - C:\Program Files\Trend Micro\OfficeScan Client\TmProxy.exe
      O23 - Service: Apache Tomcat (Tomcat6) - Apache Software Foundation - C:\Program Files\Apache Software Foundation\Tomcat 6.0\bin\tomcat6.exe

      --
      End of file - 9864 bytes


    8. Closed Accounts Posts: 1,970 ✭✭✭ActorSeeksJob


      hows she running


    9. Advertisement
    10. Registered Users, Registered Users 2 Posts: 5,836 ✭✭✭Vokes


      She's purring like a kitten :)

      No problems whatsoever at the moment. Everything running nice n' fast. No IE popups and SpywareGuard has not detected anymore BHO hijack attempts.

      You reckon it's all good so?


    11. Closed Accounts Posts: 1,970 ✭✭✭ActorSeeksJob


      Yup

      Follow these steps to uninstall Combofix and tools used in the removal of malware
      • Click START then RUN
      • Now type Combofix /u in the runbox and click OK. Note the space between the X and the U, it needs to be there.
        CF_Cleanup.png



      • Make sure you have an Internet Connection.
      • Download OTCleanIt to your desktop and run it
      • A list of tool components used in the Cleanup of malware will be downloaded.
      • If your Firewall or Real Time protection attempts to block OTCleanUp to reach the Internet, please allow the application to do so.
      • Click Yes to beging the Cleanup process and remove these components, including this application.
      • You will be asked to reboot the machine to finish the Cleanup process. If you are asked to reboot the machine choose Yes.



      Please download JavaRa to your desktop and unzip it to its own folder
      • Run JavaRa.exe, pick the language of your choice and click Select. Then click Remove Older Versions.
      • Accept any prompts.
      • Open JavaRa.exe again and select Search For Updates.
      • Select Update Using Sun Java's Website then click Search and click on the Open Webpage button. Download and install the latest Java Runtime Environment (JRE) version for your computer.



      Below I have included a number of recommendations for how to protect your computer against malware infections.

      * Keep Windows updated by regularly checking their website at :
      http://windowsupdate.microsoft.com/
      This will ensure your computer has always the latest security updates available installed on your computer.

      * To reduce re-infection for malware in the future, I strongly recommend installing these free programs:

      SpywareBlaster protects against bad ActiveX

      * SpywareGuard offers realtime protection from spyware installation attempts. Make sure you are only running one real-time anti-spyware protection program or there will be a conflict.

      Make Internet Explorer more secure
      • Click Start > Run
      • Type Inetcpl.cpl & click OK
      • Click on the Security tab
      • Click Reset all zones to default level
      • Make sure the Internet Zone is selected & Click Custom level
      • In the ActiveX section, set the first two options ("Download signed and unsigned ActiveX controls) to "Prompt", and ("Initialize and Script ActiveX controls not marked as safe") to "Disable".
      • Next Click OK, then Apply button and then OK to exit the Internet Properties page.


      *ATF Cleaner - Cleans temporary files from IE and Windows, empties the recycle bin and more. Great tool to help speed up your computer and knock out those nasties that like to reside in the temp folders.

      *NoScript - Addon for Firefox that stops all scripts from running on websites. Stops malicious software from invading via flash, java, javascript, and many other entry points.

      *Keep a backup of your important files - Now, more than ever, it's especially important to protect your digital files and memories. This article is full of good information on alternatives for home backup solutions.

      * MVPS Hosts file replaces your current HOSTS file with one containing well known ad sites and other bad sites. Basically, this prevents your computer from connecting to those sites by redirecting them to 127.0.0.1 which is your local computer, meaning it will be difficult to infect yourself in the future.

      * Please consider using an alternate browser. Mozilla's Firefox browser is fantastic; it is much more
      secure than Internet Explorer, immune to almost all known browser hijackers, and also has the best built-in pop up
      blocker (as an added benefit!) that I have ever seen. If you are interested, Firefox may be downloaded from
      Here

      * Take a good look at the following suggestions for malware prevention by reading Tony Klein’s article 'How Did I Get Infected In The First Place'
      Here

      *ERUNT (Emergency Recovery Utility NT) allows you to keep a complete backup of your registry and restore it when needed. The standard registry backup options that come with Windows back up most of the registry but not all of it. ERUNT however creates a complete backup set, including the Security hive and user related sections. ERUNT is easy to use and since it creates a full backup, there are no options or choices other than to select the location of the backup files. The backup set includes a small executable that will launch the registry restore if needed.

      * Recovery Console - Recent trends appear to indicate that future infections will include attacks to the boot sector of the computer. The installation of the Recovery Console in the computer will be our only defense against this threat. For more information and steps to install the Recovery Console see This Article. Should you need assistance in installing the Recovery Console, please do not hesitate to ask.

      Thank you for your patience, and performing all of the procedures requested.


    12. Registered Users, Registered Users 2 Posts: 5,836 ✭✭✭Vokes


      Thanks for all your help, ASJ and have a great Xmas.


    13. Closed Accounts Posts: 3 theoldguy


      I have this affliction also. I cannot make Rooter work. It just sits there. Thanks


    14. Closed Accounts Posts: 1,970 ✭✭✭ActorSeeksJob


      Make a new topic and post the MBAM and HJT log from the Sticky Thread


    15. Closed Accounts Posts: 3 theoldguy


      Make a new topic and post the MBAM and HJT log from the Sticky Thread
      Sorry I am new and have no clue what you are asking me to do.:confused:


    16. Closed Accounts Posts: 1,970 ✭✭✭ActorSeeksJob


      Read the topics that are pinned at the top of this forum


    17. Closed Accounts Posts: 3 theoldguy


      I am sorry to be so dense. I just don't understand. I tried to follow your instructions and cannot make the first download work. roote.exe.:confused: I am running XP on a Toshiba laptop.


    Advertisement