Advertisement
If you have a new account but are having problems posting or verifying your account, please email us on hello@boards.ie for help. Thanks :)
Hello all! Please ensure that you are posting a new thread or question in the appropriate forum. The Feedback forum is overwhelmed with questions that are having to be moved elsewhere. If you need help to verify your account contact hello@boards.ie
Hi there,
There is an issue with role permissions that is being worked on at the moment.
If you are having trouble with access or permissions on regional forums please post here to get access: https://www.boards.ie/discussion/2058365403/you-do-not-have-permission-for-that#latest

gaopdx and gaopdxserv.sys

  • 03-02-2009 4:26pm
    #1
    Closed Accounts Posts: 9,700 ✭✭✭


    I've been having a few problems esp updating security definitions and the like with sites not being found. I ran as many of the tasks in the sticky, but couldn't download wrapper or rooter and windows update is being redirected to google. I reckon I need some expert help beyond my limited capabilities. Help would be appreciated, tia.

    I did manage to remove iamfamous.dll but rootkitrevealer lists:

    HKU\S-1-5-21-1844237615-1757981266-1606980848-1003\Software\Skype\Toolbars\Firefox\ExtensionVersion 2/3/2009 13:47 9 bytes Data mismatch between Windows API and raw hive data.
    HKLM\SECURITY\Policy\Secrets\SAC* 1/29/2009 18:38 0 bytes Key name contains embedded nulls (*)
    HKLM\SECURITY\Policy\Secrets\SAI* 1/29/2009 18:38 0 bytes Key name contains embedded nulls (*)
    HKLM\SOFTWARE\gaopdx 1/30/2009 14:46 0 bytes Hidden from Windows API.
    HKLM\SYSTEM\ControlSet001\Services\gaopdxserv.sys 2/3/2009 16:00 0 bytes Hidden from Windows API.
    HKLM\SYSTEM\ControlSet002\Services\gaopdxserv.sys 2/3/2009 16:00 0 bytes Hidden from Windows API.
    C: 1/1/1601 00:00 0 bytes Error mounting volume
    D: 1/1/1601 00:00 0 bytes Error mounting volume


    Also here's the Hijackthis log:

    Logfile of Trend Micro HijackThis v2.0.2
    Scan saved at 16:18:15, on 2/3/2009
    Platform: Windows XP SP3 (WinNT 5.01.2600)
    MSIE: Internet Explorer v6.00 SP3 (6.00.2900.5512)
    Boot mode: Normal

    Running processes:
    C:\WINDOWS\System32\smss.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\services.exe
    C:\WINDOWS\system32\lsass.exe
    C:\WINDOWS\system32\Ati2evxx.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\System32\svchost.exe
    C:\Program Files\Intel\WiFi\bin\S24EvMon.exe
    C:\WINDOWS\system32\ZoneLabs\vsmon.exe
    C:\Program Files\Lavasoft\Ad-Aware\AAWService.exe
    C:\WINDOWS\system32\spoolsv.exe
    C:\PROGRA~1\AVG\AVG8\avgwdsvc.exe
    C:\WINDOWS\system32\Ati2evxx.exe
    C:\Program Files\Intel\WiFi\bin\EvtEng.exe
    C:\WINDOWS\Explorer.EXE
    C:\Program Files\Common Files\Intel\WirelessCommon\RegSrvc.exe
    C:\WINDOWS\system32\svchost.exe
    C:\Program Files\Apoint\Apoint.exe
    C:\Program Files\Intel\WiFi\bin\ZCfgSvc.exe
    C:\Program Files\Common Files\Intel\WirelessCommon\iFrmewrk.exe
    C:\PROGRA~1\AVG\AVG8\avgrsx.exe
    C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe
    C:\PROGRA~1\AVG\AVG8\avgtray.exe
    C:\Program Files\Zone Labs\ZoneAlarm\zlclient.exe
    C:\Program Files\Lavasoft\Ad-Aware\AAWTray.exe
    C:\Program Files\Skype\Phone\Skype.exe
    C:\Documents and Settings\Richie\Local Settings\Application Data\Google\Update\GoogleUpdate.exe
    C:\Program Files\Apoint\HidFind.exe
    C:\Program Files\Apoint\Apntex.exe
    C:\PROGRA~1\AVG\AVG8\avgemc.exe
    C:\WINDOWS\system32\wbem\unsecapp.exe
    C:\WINDOWS\System32\svchost.exe
    C:\Program Files\Skype\Plugin Manager\skypePM.exe
    C:\Program Files\Mozilla Firefox\firefox.exe
    C:\Program Files\Trend Micro\HijackThis\HijackThis.exe
    C:\WINDOWS\system32\wuauclt.exe

    R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = *.local
    O2 - BHO: WormRadar.com IESiteBlocker.NavFilter - {3CA2F312-6F6E-4B53-A66E-4E65E497C8C0} - C:\Program Files\AVG\AVG8\avgssie.dll
    O4 - HKLM\..\Run: [Apoint] C:\Program Files\Apoint\Apoint.exe
    O4 - HKLM\..\Run: [IntelZeroConfig] "C:\Program Files\Intel\WiFi\bin\ZCfgSvc.exe"
    O4 - HKLM\..\Run: [IntelWireless] "C:\Program Files\Common Files\Intel\WirelessCommon\iFrmewrk.exe" /tf Intel Wireless Tray
    O4 - HKLM\..\Run: [ATIPTA] "C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe"
    O4 - HKLM\..\Run: [AVG8_TRAY] C:\PROGRA~1\AVG\AVG8\avgtray.exe
    O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\QTTask.exe" -atboottime
    O4 - HKLM\..\Run: [ZoneAlarm Client] "C:\Program Files\Zone Labs\ZoneAlarm\zlclient.exe"
    O4 - HKLM\..\Run: [Ad-Watch] C:\Program Files\Lavasoft\Ad-Aware\AAWTray.exe
    O4 - HKCU\..\Run: [KeyMapperStarup] C:\downloads\KeyRemapper.exe /background
    O4 - HKCU\..\Run: [Skype] "C:\Program Files\Skype\Phone\Skype.exe" /nosplash /minimized
    O4 - HKCU\..\Run: [Google Update] "C:\Documents and Settings\Richie\Local Settings\Application Data\Google\Update\GoogleUpdate.exe" /c
    O9 - Extra button: PokerStars - {3AD14F0C-ED16-4e43-B6D8-661B03F6A1EF} - C:\Program Files\PokerStars\PokerStarsUpdate.exe
    O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
    O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
    O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O16 - DPF: {01A88BB1-1174-41EC-ACCB-963509EAE56B} (SysProWmi Class) - http://support.euro.dell.com/systemprofiler/SysPro.CAB
    O17 - HKLM\System\CCS\Services\Tcpip\..\{34565F01-7FE0-4732-B699-11A3831F20AB}: NameServer = 208.67.222.222,208.67.220.220
    O18 - Protocol: linkscanner - {F274614C-63F8-47D5-A4D1-FBDDE494F8D1} - C:\Program Files\AVG\AVG8\avgpp.dll
    O18 - Protocol: skype4com - {FFC8B962-9B40-4DFF-9458-1830C7DD7F5D} - C:\PROGRA~1\COMMON~1\Skype\SKYPE4~1.DLL
    O20 - AppInit_DLLs: avgrsstx.dll
    O20 - Winlogon Notify: !SASWinLogon - C:\Program Files\SUPERAntiSpyware\SASWINLO.dll
    O23 - Service: Ati HotKey Poller - ATI Technologies Inc. - C:\WINDOWS\system32\Ati2evxx.exe
    O23 - Service: AVG Free8 E-mail Scanner (avg8emc) - AVG Technologies CZ, s.r.o. - C:\PROGRA~1\AVG\AVG8\avgemc.exe
    O23 - Service: AVG Free8 WatchDog (avg8wd) - AVG Technologies CZ, s.r.o. - C:\PROGRA~1\AVG\AVG8\avgwdsvc.exe
    O23 - Service: Intel® PROSet/Wireless Event Log (EvtEng) - Intel(R) Corporation - C:\Program Files\Intel\WiFi\bin\EvtEng.exe
    O23 - Service: FLEXnet Licensing Service - Macrovision Europe Ltd. - C:\Program Files\Common Files\Macrovision Shared\FLEXnet Publisher\FNPLicensingService.exe
    O23 - Service: Lavasoft Ad-Aware Service - Lavasoft - C:\Program Files\Lavasoft\Ad-Aware\AAWService.exe
    O23 - Service: Intel® PROSet/Wireless Registry Service (RegSrvc) - Intel(R) Corporation - C:\Program Files\Common Files\Intel\WirelessCommon\RegSrvc.exe
    O23 - Service: Intel® PROSet/Wireless WiFi Service (S24EventMonitor) - Intel(R) Corporation - C:\Program Files\Intel\WiFi\bin\S24EvMon.exe
    O23 - Service: TrueVector Internet Monitor (vsmon) - Check Point Software Technologies LTD - C:\WINDOWS\system32\ZoneLabs\vsmon.exe

    --
    End of file - 5319 bytes


Comments

  • Closed Accounts Posts: 1,970 ✭✭✭ActorSeeksJob


    hello

    Please download ComboFix from Here or Here to your Desktop.

    **Note: In the event you already have Combofix, this is a new version that I need you to download. It is important that it is saved and renamed following this process directly to your desktop**
    1. If you are using Firefox, make sure that your download settings are as follows:
      • Tools->Options->Main tab
      • Set to "Always ask me where to Save the files".
    2. During the download, rename Combofix to Combo-Fix as follows:

      CF_download_FF.gif

      CF_download_rename.gif

    3. It is important you rename Combofix during the download, but not after.
    4. Please do not rename Combofix to other names, but only to the one indicated.
    5. Close any open browsers.
    6. Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.

      • Very Important! Temporarily disable your anti-virus, script blocking and any anti-malware real-time protection before performing a scan. They can interfere with ComboFix or remove some of its embedded files which may cause "unpredictable results".
      • Click on this link to see a list of programs that should be disabled. The list is not all inclusive. If yours is not listed and you don't know how to disable it, please ask.

      • Close any open browsers.
      • WARNING: Combofix will disconnect your machine from the Internet as soon as it starts
      • Please do not attempt to re-connect your machine back to the Internet until Combofix has completely finished.
      • If there is no internet connection after running Combofix, then restart your computer to restore back your connection.

    7. Double click on combo-Fix.exe & follow the prompts.
    8. When finished, it will produce a report for you.
    9. Please post the "C:\Combo-Fix.txt" along with a new HijackThis log for further review.
    **Note: Do not mouseclick combo-fix's window while it's running. That may cause it to stall**


  • Closed Accounts Posts: 9,700 ✭✭✭tricky D


    Hi ActorSJ,

    Ran those instructions. Updates are behaving much better now.

    ComboF log:

    ComboFix 09-02-02.04 - Richie 2009-02-03 17:36:45.1 - NTFSx86
    Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.1279.810 [GMT 0:00]
    Running from: c:\documents and settings\Richie\Desktop\Combo-Fix.exe
    AV: AVG Anti-Virus Free *On-access scanning disabled* (Updated)
    FW: ZoneAlarm Firewall *enabled*
    .

    ((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
    .

    C:\autorun.inf
    c:\windows\system32\drivers\gaopdxfqjdabwt.sys
    c:\windows\system32\drivers\gaopdxkylkmppq.sys
    c:\windows\system32\drivers\gaopdxnkrujmtd.sys
    c:\windows\system32\gaopdxfvkoppfq.dll
    c:\windows\system32\ispnet.dll
    D:\Autorun.inf

    .
    ((((((((((((((((((((((((((((((((((((((( Drivers/Services )))))))))))))))))))))))))))))))))))))))))))))))))
    .

    \Service_gaopdxserv.sys


    ((((((((((((((((((((((((( Files Created from 2009-01-03 to 2009-02-03 )))))))))))))))))))))))))))))))
    .

    2009-02-03 16:15 . 2009-02-03 16:15 <DIR> d
    C:\Rooter$
    2009-02-03 14:34 . 2009-02-03 14:34 <DIR> d
    c:\program files\Malwarebytes' Anti-Malware
    2009-02-03 14:34 . 2009-02-03 14:34 <DIR> d
    c:\documents and settings\Richie\Application Data\Malwarebytes
    2009-02-03 14:34 . 2009-02-03 14:34 <DIR> d
    c:\documents and settings\All Users\Application Data\Malwarebytes
    2009-02-03 14:34 . 2009-01-14 16:11 38,496 --a
    c:\windows\system32\drivers\mbamswissarmy.sys
    2009-02-03 14:34 . 2009-01-14 16:11 15,504 --a
    c:\windows\system32\drivers\mbam.sys
    2009-02-03 13:04 . 2009-02-03 13:04 <DIR> d
    c:\program files\Lavasoft
    2009-02-03 13:04 . 2009-02-03 13:04 <DIR> d
    c:\documents and settings\All Users\Application Data\Lavasoft
    2009-02-03 13:04 . 2009-02-03 13:04 <DIR> d--h-c--- c:\documents and settings\All Users\Application Data\{83C91755-2546-441D-AC40-9A6B4B860800}
    2009-02-03 13:04 . 2009-01-18 21:30 64,160 --a
    c:\windows\system32\drivers\Lbd.sys
    2009-01-31 18:52 . 2009-01-31 18:52 <DIR> d
    c:\program files\CCleaner
    2009-01-31 18:23 . 2009-02-02 13:33 <DIR> d--h
    C:\$AVG8.VAULT$
    2009-01-31 17:17 . 2009-01-31 17:17 <DIR> d
    c:\program files\Trend Micro
    2009-01-31 17:00 . 2008-11-13 15:18 1,221,008 --a
    c:\windows\system32\zpeng25.dll
    2009-01-31 16:28 . 1999-12-21 07:58 21,312 --a
    c:\windows\choice.exe
    2009-01-31 16:26 . 2009-01-31 16:26 <DIR> d
    c:\temp\ie-spyad
    2009-01-31 16:26 . 2009-02-03 16:12 <DIR> d
    C:\temp
    2009-01-31 15:41 . 2009-01-31 15:41 <DIR> d
    c:\program files\Zone Labs
    2009-01-31 15:41 . 2009-01-31 15:41 <DIR> d
    c:\documents and settings\All Users\Application Data\MailFrontier
    2009-01-31 15:40 . 2009-02-03 17:38 <DIR> d
    c:\windows\Internet Logs
    2009-01-31 14:07 . 2009-01-31 14:07 <DIR> d
    c:\documents and settings\Richie\Application Data\Apple Computer
    2009-01-30 18:04 . 2009-01-30 18:04 <DIR> d
    c:\program files\Netscape
    2009-01-30 18:04 . 2009-01-30 18:04 <DIR> d
    c:\documents and settings\Richie\WINDOWS
    2009-01-30 18:04 . 1996-01-09 10:38 283,648 --a
    c:\windows\uninst.exe
    2009-01-30 18:04 . 1995-08-22 12:19 20,992 --a
    c:\windows\system32\POSTAL32.DLL
    2009-01-30 18:01 . 2009-01-30 18:01 <DIR> d
    c:\program files\Safari
    2009-01-30 18:00 . 2009-01-30 18:00 <DIR> d
    c:\program files\QuickTime
    2009-01-30 18:00 . 2009-01-30 18:00 <DIR> d
    c:\program files\Common Files\Apple
    2009-01-30 18:00 . 2009-01-30 18:00 <DIR> d
    c:\documents and settings\All Users\Application Data\Apple Computer
    2009-01-30 17:47 . 2009-01-30 17:47 <DIR> d
    c:\program files\Opera
    2009-01-30 16:53 . 2009-01-30 17:17 <DIR> d
    c:\program files\Google
    2009-01-30 16:46 . 2009-01-30 16:48 <DIR> d
    c:\program files\Common Files\Macromedia
    2009-01-30 16:45 . 2009-01-30 16:48 <DIR> d
    c:\program files\Macromedia
    2009-01-30 16:42 . 2009-01-30 16:42 <DIR> d
    c:\documents and settings\All Users\Application Data\FLEXnet
    2009-01-30 16:39 . 2009-01-30 18:21 <DIR> d
    c:\program files\Bonjour
    2009-01-30 16:34 . 2009-01-30 16:34 <DIR> d
    c:\program files\Common Files\Macrovision Shared
    2009-01-30 16:33 . 2009-01-30 16:39 <DIR> d
    c:\program files\Common Files\Adobe
    2009-01-30 16:17 . 2009-02-02 23:41 <DIR> d
    c:\program files\BGwin
    2009-01-30 15:46 . 2009-01-31 17:10 <DIR> d
    c:\program files\PokerStars
    2009-01-30 15:31 . 2009-01-30 15:43 <DIR> d
    C:\Poker
    2009-01-30 15:11 . 2009-01-31 00:32 <DIR> d--h
    c:\windows\$hf_mig$
    2009-01-30 15:09 . 2009-01-30 15:09 <DIR> d
    c:\windows\system32\XPSViewer
    2009-01-30 15:09 . 2009-01-30 15:09 <DIR> d
    c:\program files\Reference Assemblies
    2009-01-30 15:09 . 2009-01-30 15:09 <DIR> d
    c:\program files\MSBuild
    2009-01-30 15:09 . 2007-11-30 11:18 26,488 --a
    c:\windows\system32\spupdsvc.exe
    2009-01-30 15:08 . 2009-01-30 15:09 <DIR> d
    C:\85407a7e4c0f8434ff180b11948a
    2009-01-30 15:08 . 2008-07-06 12:06 1,676,288
    c:\windows\system32\xpssvcs.dll
    2009-01-30 15:08 . 2008-07-06 12:06 1,676,288
    c--- c:\windows\system32\dllcache\xpssvcs.dll
    2009-01-30 15:08 . 2008-07-06 10:50 597,504
    c--- c:\windows\system32\dllcache\printfilterpipelinesvc.exe
    2009-01-30 15:08 . 2008-07-06 12:06 575,488
    c:\windows\system32\xpsshhdr.dll
    2009-01-30 15:08 . 2008-07-06 12:06 575,488
    c--- c:\windows\system32\dllcache\xpsshhdr.dll
    2009-01-30 15:08 . 2008-07-06 12:06 117,760
    c:\windows\system32\prntvpt.dll
    2009-01-30 15:08 . 2008-07-06 12:06 89,088
    c--- c:\windows\system32\dllcache\filterpipelineprintproc.dll
    2009-01-30 14:46 . 2009-02-03 16:00 4 --a
    c:\windows\system32\gaopdxcounter
    2009-01-30 13:49 . 2008-04-14 00:16 10,880 --a
    c:\windows\system32\drivers\NdisIP.sys
    2009-01-30 13:49 . 2008-04-14 00:16 10,880 --a--c--- c:\windows\system32\dllcache\ndisip.sys
    2009-01-30 13:49 . 2008-04-14 00:09 5,504 --a
    c:\windows\system32\drivers\MSTEE.sys
    2009-01-30 13:49 . 2008-04-14 00:09 5,504 --a--c--- c:\windows\system32\dllcache\mstee.sys
    2009-01-30 13:44 . 2009-01-30 13:45 <DIR> d--h
    c:\windows\msdownld.tmp
    2009-01-30 13:44 . 2009-01-30 13:44 <DIR> d
    c:\program files\Windows Media Components
    2009-01-30 13:43 . 2002-07-03 11:44 53,248 --a
    c:\windows\amcap.exe
    2009-01-30 13:40 . 2008-04-14 00:15 60,032 --a
    c:\windows\system32\drivers\USBAUDIO.sys
    2009-01-30 13:40 . 2008-04-14 00:15 60,032 --a--c--- c:\windows\system32\dllcache\usbaudio.sys
    2009-01-30 13:39 . 2008-04-14 00:15 32,128 --a
    c:\windows\system32\drivers\usbccgp.sys
    2009-01-30 13:39 . 2008-04-14 00:15 32,128 --a--c--- c:\windows\system32\dllcache\usbccgp.sys
    2009-01-30 13:28 . 2009-02-03 16:01 <DIR> d
    c:\documents and settings\Richie\Application Data\skypePM
    2009-01-30 13:28 . 2009-01-30 13:28 56 --ah
    c:\windows\system32\ezsidmv.dat
    2009-01-30 13:26 . 2009-01-30 13:26 <DIR> d
    c:\program files\Skype
    2009-01-30 13:26 . 2009-01-30 13:26 <DIR> d
    c:\program files\Common Files\Skype
    2009-01-30 13:26 . 2009-02-03 17:20 <DIR> d
    c:\documents and settings\Richie\Application Data\Skype
    2009-01-30 13:26 . 2009-01-30 13:26 <DIR> d
    c:\documents and settings\All Users\Application Data\Skype
    2009-01-30 02:04 . 2009-01-30 02:31 <DIR> d
    c:\documents and settings\Richie\Application Data\vlc
    2009-01-30 02:02 . 2009-01-30 02:02 <DIR> d
    c:\program files\VideoLAN
    2009-01-30 00:07 . 2009-01-30 00:09 <DIR> d
    c:\windows\ShellNew
    2009-01-29 23:45 . 2009-01-29 23:45 <DIR> d
    c:\documents and settings\Richie\Application Data\Softarium.com
    2009-01-29 23:41 . 2009-01-30 19:37 <DIR> d
    c:\program files\BitLord
    2009-01-29 23:37 . 2009-01-29 23:37 <DIR> d
    c:\program files\Notepad++
    2009-01-29 23:37 . 2009-01-29 23:43 <DIR> d
    c:\documents and settings\Richie\Application Data\Notepad++
    2009-01-29 22:46 . 2009-02-03 14:32 <DIR> d
    c:\program files\Full Tilt Poker
    2009-01-29 22:01 . 2001-08-17 13:48 12,160 --a
    c:\windows\system32\drivers\mouhid.sys
    2009-01-29 22:01 . 2001-08-17 13:48 12,160 --a--c--- c:\windows\system32\dllcache\mouhid.sys
    2009-01-29 22:01 . 2008-04-14 00:15 10,368 --a
    c:\windows\system32\drivers\hidusb.sys
    2009-01-29 19:52 . 2009-01-29 22:51 <DIR> d
    C:\PMAIL
    2009-01-29 19:32 . 2009-02-02 12:01 <DIR> d
    c:\windows\system32\drivers\Avg
    2009-01-29 19:32 . 2009-01-29 19:32 <DIR> d
    c:\program files\AVG
    2009-01-29 19:32 . 2009-01-31 12:00 <DIR> d
    c:\documents and settings\All Users\Application Data\avg8
    2009-01-29 19:32 . 2009-01-29 19:32 97,928 --a
    c:\windows\system32\drivers\avgldx86.sys
    2009-01-29 19:32 . 2009-01-29 19:32 76,040 --a
    c:\windows\system32\drivers\avgtdix.sys
    2009-01-29 19:32 . 2009-01-29 19:32 10,520 --a
    c:\windows\system32\avgrsstx.dll
    2009-01-29 19:22 . 2009-01-31 17:38 <DIR> d
    c:\program files\SUPERAntiSpyware
    2009-01-29 19:22 . 2009-01-29 19:22 <DIR> d
    c:\documents and settings\Richie\Application Data\SUPERAntiSpyware.com
    2009-01-29 19:22 . 2009-01-29 19:22 <DIR> d
    c:\documents and settings\All Users\Application Data\SUPERAntiSpyware.com
    2009-01-29 19:21 . 2009-01-29 19:21 <DIR> d
    c:\program files\Common Files\Wise Installation Wizard
    2009-01-29 19:20 . 2009-01-29 19:20 249,592 --a
    c:\windows\system32\cssdll32.dll
    2009-01-29 19:19 . 2009-01-31 15:45 <DIR> d
    c:\program files\COMODO
    2009-01-29 19:19 . 2009-01-31 15:43 <DIR> d
    c:\documents and settings\All Users\Application Data\comodo
    2009-01-29 19:16 . 2009-01-30 16:53 <DIR> d
    C:\home
    2009-01-29 19:16 . 2009-02-03 17:22 <DIR> d
    C:\downloads
    2009-01-29 19:09 . 2009-01-29 19:09 0 --a
    c:\windows\nsreg.dat
    2009-01-29 19:03 . 2009-01-29 19:03 0 --a
    c:\windows\WinPM.INI
    2009-01-29 19:01 . 2004-04-29 12:06 3,592,192 --a
    c:\windows\system32\qt-mt323.dll
    2009-01-29 19:01 . 2003-10-07 18:08 6,656 --a
    c:\windows\system32\WnASPI32.dll
    2009-01-29 19:00 . 2009-01-29 19:00 <DIR> d
    c:\program files\7tools

    .
    (((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
    .
    2009-02-03 11:56
    d--h--w c:\program files\InstallShield Installation Information
    2009-01-29 18:52
    d
    w c:\program files\Common Files\InstallShield
    2009-01-29 18:49
    d
    w c:\program files\ATI Technologies
    2009-01-29 18:43
    d
    w c:\program files\Dell
    2009-01-29 18:39
    d
    w c:\windows\system32\config\systemprofile\Application Data\Intel
    2009-01-29 18:39
    d
    w c:\documents and settings\Richie\Application Data\Intel
    2009-01-29 18:39
    d
    w c:\documents and settings\NetworkService\Application Data\Intel
    2009-01-29 18:39
    d
    w c:\documents and settings\LocalService\Application Data\Intel
    2009-01-29 18:39
    d
    w c:\documents and settings\Administrator\Application Data\Intel
    2009-01-29 18:38
    d
    w c:\program files\Intel
    2009-01-29 18:38
    d
    w c:\program files\Common Files\Intel
    2009-01-29 18:38
    d
    w c:\documents and settings\All Users\Application Data\Intel
    2009-01-29 18:33
    d
    w c:\program files\CONEXANT
    2009-01-29 18:33
    d
    w c:\program files\Broadcom
    2009-01-29 18:31
    d
    w c:\program files\Apoint
    2009-01-29 18:30
    d
    w c:\program files\SigmaTel
    2009-01-29 17:36
    d
    w c:\program files\microsoft frontpage
    .

    ((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
    .
    .
    *Note* empty entries & legit default entries are not shown
    REGEDIT4

    [HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
    "Skype"="c:\program files\Skype\Phone\Skype.exe" [2008-11-18 21633320]
    "Google Update"="c:\documents and settings\Richie\Local Settings\Application Data\Google\Update\GoogleUpdate.exe" [2009-01-30 133104]

    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
    "Apoint"="c:\program files\Apoint\Apoint.exe" [2005-10-07 176128]
    "IntelZeroConfig"="c:\program files\Intel\WiFi\bin\ZCfgSvc.exe" [2008-10-16 1368064]
    "IntelWireless"="c:\program files\Common Files\Intel\WirelessCommon\iFrmewrk.exe" [2008-10-16 1191936]
    "ATIPTA"="c:\program files\ATI Technologies\ATI Control Panel\atiptaxx.exe" [2005-08-05 344064]
    "AVG8_TRAY"="c:\progra~1\AVG\AVG8\avgtray.exe" [2009-01-29 1261336]
    "QuickTime Task"="c:\program files\QuickTime\QTTask.exe" [2008-09-06 413696]
    "ZoneAlarm Client"="c:\program files\Zone Labs\ZoneAlarm\zlclient.exe" [2008-11-13 981904]
    "Ad-Watch"="c:\program files\Lavasoft\Ad-Aware\AAWTray.exe" [2009-01-18 506712]

    [hkey_local_machine\software\microsoft\windows\currentversion\explorer\ShellExecuteHooks]
    "{5AE067D3-9AFB-48E0-853A-EBB7F4A000DA}"= "c:\program files\SUPERAntiSpyware\SASSEH.DLL" [2008-05-13 77824]

    [HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\!SASWinLogon]
    2008-12-22 11:05 356352 c:\program files\SUPERAntiSpyware\SASWINLO.dll

    [HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\windows]
    "AppInit_DLLs"=avgrsstx.dll

    [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\Lavasoft Ad-Aware Service]
    @=&quot;Service"

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\services]
    "Bonjour Service"=2 (0x2)

    [HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\ZoneLabsFirewall]
    "DisableMonitoring"=dword:00000001

    [HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]
    "EnableFirewall"= 0 (0x0)

    [HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
    "%windir%\\Network Diagnostic\\xpnetdiag.exe"=
    "%windir%\\system32\\sessmgr.exe"=
    "c:\\Program Files\\AVG\\AVG8\\avgemc.exe"=
    "c:\\Program Files\\AVG\\AVG8\\avgupd.exe"=
    "c:\\Program Files\\Bonjour\\mDNSResponder.exe"=
    "c:\\Program Files\\BitLord\\BitLord.exe"=
    "c:\\Program Files\\Skype\\Phone\\Skype.exe"=

    R0 Lbd;Lbd;c:\windows\system32\drivers\Lbd.sys [2009-02-03 64160]
    R1 AvgLdx86;AVG Free AVI Loader Driver x86;c:\windows\system32\drivers\avgldx86.sys [2009-01-29 97928]
    R1 SASDIFSV;SASDIFSV;c:\program files\SUPERAntiSpyware\sasdifsv.sys [2009-01-15 8944]
    R1 SASKUTIL;SASKUTIL;c:\program files\SUPERAntiSpyware\SASKUTIL.SYS [2009-01-15 55024]
    R2 avg8emc;AVG Free8 E-mail Scanner;c:\progra~1\AVG\AVG8\avgemc.exe [2009-01-29 875288]
    R2 avg8wd;AVG Free8 WatchDog;c:\progra~1\AVG\AVG8\avgwdsvc.exe [2009-01-29 231704]
    R2 AvgTdiX;AVG Free8 Network Redirector;c:\windows\system32\drivers\avgtdix.sys [2009-01-29 76040]
    R2 Lavasoft Ad-Aware Service;Lavasoft Ad-Aware Service;c:\program files\Lavasoft\Ad-Aware\AAWService.exe [2009-01-18 921936]
    S0 cerc6;cerc6; [x]
    S3 SASENUM;SASENUM;c:\program files\SUPERAntiSpyware\SASENUM.SYS [2009-01-15 7408]

    [HKEY_CURRENT_USER\software\microsoft\windows\currentversion\explorer\mountpoints2\{ae3f74f8-eec6-11dd-98dd-00123feb219d}]
    \Shell\AutoRun\command - f:\autorun\Install.exe
    .
    Contents of the 'Scheduled Tasks' folder

    2009-02-03 c:\windows\Tasks\Ad-Aware Update (Weekly).job
    - c:\program files\Lavasoft\Ad-Aware\Ad-AwareAdmin.exe [2009-01-18 21:34]

    2009-02-03 c:\windows\Tasks\GoogleUpdateTaskUserS-1-5-21-1844237615-1757981266-1606980848-1003.job
    - c:\documents and settings\Richie\Local Settings\Application Data\Google\Update\GoogleUpdate.exe [2009-01-30 17:28]

    2009-01-30 c:\windows\Tasks\Microsoft_Hardware_Launch_IType_exe.job
    - c:\program files\Microsoft IntelliType Pro\itype.exe []
    .
    - - - - ORPHANS REMOVED - - - -

    WebBrowser-{3041D03E-FD4B-44E0-B742-2D9B88305F98} - c:\program files\AskBarDis\bar\bin\askBar.dll
    HKCU-Run-KeyMapperStarup - c:\downloads\KeyRemapper.exe


    .
    Supplementary Scan
    .
    uInternet Settings,ProxyOverride = *.local
    TCP: {34565F01-7FE0-4732-B699-11A3831F20AB} = 208.67.222.222,208.67.220.220
    FF - ProfilePath - c:\documents and settings\Richie\Application Data\Mozilla\Firefox\Profiles\qxbx6g1v.default\
    FF - prefs.js: browser.search.selectedEngine - Google
    FF - prefs.js: browser.startup.homepage - about:blank
    FF - prefs.js: network.proxy.ftp - 192.168.1.1
    FF - prefs.js: network.proxy.gopher - 192.168.1.1
    FF - prefs.js: network.proxy.http - 192.168.1.1
    FF - prefs.js: network.proxy.ssl - 192.168.1.1
    FF - prefs.js: network.proxy.type - 1
    FF - component: c:\documents and settings\Richie\Application Data\Mozilla\Firefox\Profiles\qxbx6g1v.default\extensions\{3b56bcc7-54e5-44a2-9b44-66c3ef58c13e}\components\nstidy.dll
    FF - component: c:\documents and settings\Richie\Application Data\Mozilla\Firefox\Profiles\qxbx6g1v.default\extensions\{6AC85730-7D0F-4de0-B3FA-21142DD85326}\platform\WINNT\components\ColorZilla.dll
    FF - component: c:\documents and settings\Richie\Application Data\Mozilla\Firefox\Profiles\qxbx6g1v.default\extensions\{88836b34-ff60-42d0-a684-e58683fcc4b9}\components\FFAlert.dll
    FF - component: c:\program files\AVG\AVG8\Firefox\components\avgssff.dll
    FF - component: c:\program files\Mozilla Firefox\extensions\{B13721C7-F507-4982-B2E5-502A71474FED}\components\NPComponent.dll
    FF - plugin: c:\documents and settings\Richie\Local Settings\Application Data\Google\Update\1.2.133.37\npGoogleOneClick7.dll
    .

    **************************************************************************

    catchme 0.3.1367 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
    Rootkit scan 2009-02-03 17:39:40
    Windows 5.1.2600 Service Pack 3 NTFS

    scanning hidden processes ...

    scanning hidden autostart entries ...

    scanning hidden files ...

    scan completed successfully
    hidden files: 0

    **************************************************************************
    .
    DLLs Loaded Under Running Processes

    - - - - - - - > 'winlogon.exe'(892)
    c:\program files\SUPERAntiSpyware\SASWINLO.dll
    c:\windows\system32\Ati2evxx.dll
    c:\windows\system32\COMRes.dll
    .
    Completion time: 2009-02-03 17:41:08
    ComboFix-quarantined-files.txt 2009-02-03 17:41:04

    Pre-Run: 114,349,113,344 bytes free
    Post-Run: 114,335,076,352 bytes free

    WindowsXP-KB310994-SP2-Pro-BootDisk-ENU.exe
    [boot loader]
    timeout=2
    default=multi(0)disk(0)rdisk(0)partition(1)\WINDOWS
    [operating systems]
    c:\cmdcons\BOOTSECT.DAT="Microsoft Windows Recovery Console" /cmdcons
    multi(0)disk(0)rdisk(0)partition(1)\WINDOWS="Microsoft Windows XP Professional" /noexecute=optin /fastdetect

    256 --- E O F --- 2009-01-31 00:32:49



    HijackThis log:

    Logfile of Trend Micro HijackThis v2.0.2
    Scan saved at 18:05:11, on 2/3/2009
    Platform: Windows XP SP3 (WinNT 5.01.2600)
    MSIE: Internet Explorer v6.00 SP3 (6.00.2900.5512)
    Boot mode: Normal

    Running processes:
    C:\WINDOWS\System32\smss.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\services.exe
    C:\WINDOWS\system32\lsass.exe
    C:\WINDOWS\system32\Ati2evxx.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\System32\svchost.exe
    C:\Program Files\Intel\WiFi\bin\S24EvMon.exe
    C:\WINDOWS\system32\ZoneLabs\vsmon.exe
    C:\Program Files\Lavasoft\Ad-Aware\AAWService.exe
    C:\WINDOWS\system32\spoolsv.exe
    C:\WINDOWS\system32\Ati2evxx.exe
    C:\PROGRA~1\AVG\AVG8\avgwdsvc.exe
    C:\WINDOWS\Explorer.EXE
    C:\Program Files\Intel\WiFi\bin\EvtEng.exe
    C:\Program Files\Common Files\Intel\WirelessCommon\RegSrvc.exe
    C:\WINDOWS\system32\svchost.exe
    C:\Program Files\Apoint\Apoint.exe
    C:\Program Files\Intel\WiFi\bin\ZCfgSvc.exe
    C:\Program Files\Common Files\Intel\WirelessCommon\iFrmewrk.exe
    C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe
    C:\PROGRA~1\AVG\AVG8\avgtray.exe
    C:\Program Files\Zone Labs\ZoneAlarm\zlclient.exe
    C:\Program Files\Lavasoft\Ad-Aware\AAWTray.exe
    C:\Documents and Settings\Richie\Local Settings\Application Data\Google\Update\GoogleUpdate.exe
    C:\Program Files\Apoint\HidFind.exe
    C:\Program Files\Apoint\Apntex.exe
    C:\PROGRA~1\AVG\AVG8\avgrsx.exe
    C:\PROGRA~1\AVG\AVG8\avgemc.exe
    C:\PROGRA~1\AVG\AVG8\avgnsx.exe
    C:\WINDOWS\system32\wbem\unsecapp.exe
    C:\Program Files\AVG\AVG8\avgcsrvx.exe
    C:\Program Files\AVG\AVG8\avgcsrvx.exe
    C:\WINDOWS\system32\wuauclt.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\system32\wuauclt.exe
    C:\Program Files\Mozilla Firefox\firefox.exe
    C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
    R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = *.local
    O2 - BHO: WormRadar.com IESiteBlocker.NavFilter - {3CA2F312-6F6E-4B53-A66E-4E65E497C8C0} - C:\Program Files\AVG\AVG8\avgssie.dll
    O4 - HKLM\..\Run: [Apoint] C:\Program Files\Apoint\Apoint.exe
    O4 - HKLM\..\Run: [IntelZeroConfig] "C:\Program Files\Intel\WiFi\bin\ZCfgSvc.exe"
    O4 - HKLM\..\Run: [IntelWireless] "C:\Program Files\Common Files\Intel\WirelessCommon\iFrmewrk.exe" /tf Intel Wireless Tray
    O4 - HKLM\..\Run: [ATIPTA] "C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe"
    O4 - HKLM\..\Run: [AVG8_TRAY] C:\PROGRA~1\AVG\AVG8\avgtray.exe
    O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\QTTask.exe" -atboottime
    O4 - HKLM\..\Run: [ZoneAlarm Client] "C:\Program Files\Zone Labs\ZoneAlarm\zlclient.exe"
    O4 - HKLM\..\Run: [Ad-Watch] C:\Program Files\Lavasoft\Ad-Aware\AAWTray.exe
    O4 - HKCU\..\Run: [Skype] "C:\Program Files\Skype\Phone\Skype.exe" /nosplash /minimized
    O4 - HKCU\..\Run: [Google Update] "C:\Documents and Settings\Richie\Local Settings\Application Data\Google\Update\GoogleUpdate.exe" /c
    O9 - Extra button: PokerStars - {3AD14F0C-ED16-4e43-B6D8-661B03F6A1EF} - C:\Program Files\PokerStars\PokerStarsUpdate.exe
    O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
    O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
    O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O16 - DPF: {01A88BB1-1174-41EC-ACCB-963509EAE56B} (SysProWmi Class) - http://support.euro.dell.com/systemprofiler/SysPro.CAB
    O17 - HKLM\System\CCS\Services\Tcpip\..\{34565F01-7FE0-4732-B699-11A3831F20AB}: NameServer = 208.67.222.222,208.67.220.220
    O18 - Protocol: linkscanner - {F274614C-63F8-47D5-A4D1-FBDDE494F8D1} - C:\Program Files\AVG\AVG8\avgpp.dll
    O18 - Protocol: skype4com - {FFC8B962-9B40-4DFF-9458-1830C7DD7F5D} - C:\PROGRA~1\COMMON~1\Skype\SKYPE4~1.DLL
    O20 - Winlogon Notify: !SASWinLogon - C:\Program Files\SUPERAntiSpyware\SASWINLO.dll
    O20 - Winlogon Notify: avgrsstarter - C:\WINDOWS\SYSTEM32\avgrsstx.dll
    O23 - Service: Ati HotKey Poller - ATI Technologies Inc. - C:\WINDOWS\system32\Ati2evxx.exe
    O23 - Service: AVG Free8 E-mail Scanner (avg8emc) - AVG Technologies CZ, s.r.o. - C:\PROGRA~1\AVG\AVG8\avgemc.exe
    O23 - Service: AVG Free8 WatchDog (avg8wd) - AVG Technologies CZ, s.r.o. - C:\PROGRA~1\AVG\AVG8\avgwdsvc.exe
    O23 - Service: Intel® PROSet/Wireless Event Log (EvtEng) - Intel(R) Corporation - C:\Program Files\Intel\WiFi\bin\EvtEng.exe
    O23 - Service: FLEXnet Licensing Service - Macrovision Europe Ltd. - C:\Program Files\Common Files\Macrovision Shared\FLEXnet Publisher\FNPLicensingService.exe
    O23 - Service: Lavasoft Ad-Aware Service - Lavasoft - C:\Program Files\Lavasoft\Ad-Aware\AAWService.exe
    O23 - Service: Intel® PROSet/Wireless Registry Service (RegSrvc) - Intel(R) Corporation - C:\Program Files\Common Files\Intel\WirelessCommon\RegSrvc.exe
    O23 - Service: Intel® PROSet/Wireless WiFi Service (S24EventMonitor) - Intel(R) Corporation - C:\Program Files\Intel\WiFi\bin\S24EvMon.exe
    O23 - Service: TrueVector Internet Monitor (vsmon) - Check Point Software Technologies LTD - C:\WINDOWS\system32\ZoneLabs\vsmon.exe

    --
    End of file - 5681 bytes


  • Closed Accounts Posts: 1,970 ✭✭✭ActorSeeksJob


    hello

    Please download OTMoveIt3 by OldTimer
    • Save it to your desktop.
    • Please double-click OTMoveIt3.exe to run it. (Note: If you are running on Vista, right-click on the file and choose Run As Administrator).
    • Copy the lines in the codebox below to the clipboard by highlighting ALL of them and pressing CTRL + C (or, after highlighting, right-click and choose Copy):
      :Processes
      explorer.exe
      
      :Services
      cerc6
      :Reg
      [-HKEY_CURRENT_USER\software\microsoft\windows\currentversion\explorer\mountpoints2\{ae3f74f8-eec6-11dd-98dd-00123feb219d}]
      
      :Files
      c:\windows\choice.exe
      c:\windows\system32\gaopdxcounter
      
      :Commands
      [purity]
      [emptytemp]
      [start explorer]
      [Reboot]
      
    • Return to OTMoveIt3, right click in the "Paste Instructions for Items to be Moved" window (under the yellow bar) and choose Paste.
    • Click the red Moveit! button.
    • Copy everything in the Results window (under the green bar) to the clipboard by highlighting ALL of them and pressing CTRL + C (or, after highlighting, right-click and choose copy), and paste it in your next reply.
    • Close OTMoveIt3
    Note: If a file or folder cannot be moved immediately you may be asked to reboot the machine to finish the move process. If you are asked to reboot the machine choose Yes. In this case, after the reboot, open Notepad (Start->All Programs->Accessories->Notepad), click File->Open, in the File Name box enter *.log and press the Enter key, navigate to the C:\_OTMoveIt\MovedFiles folder, and open the newest .log file present, and copy/paste the contents of that document back here in your next post.


  • Closed Accounts Posts: 9,700 ✭✭✭tricky D


    ========== PROCESSES ==========
    Process explorer.exe killed successfully.
    ========== SERVICES/DRIVERS ==========
    Service cerc6 stopped successfully.
    Service cerc6 deleted successfully.
    ========== REGISTRY ==========
    Registry key HKEY_CURRENT_USER\software\microsoft\windows\currentversion\explorer\mountpoints2\{ae3f74f8-eec6-11dd-98dd-00123feb219d}\\ deleted successfully.
    ========== FILES ==========
    c:\windows\choice.exe moved successfully.
    File/Folder c:\windows\system32\gaopdxcounter not found.
    ========== COMMANDS ==========
    File delete failed. C:\DOCUME~1\Richie\LOCALS~1\Temp\etilqs_FIJLEcHxIJ4cqlSQPPeZ scheduled to be deleted on reboot.
    File delete failed. C:\DOCUME~1\Richie\LOCALS~1\Temp\~DF1BDE.tmp scheduled to be deleted on reboot.
    File delete failed. C:\DOCUME~1\Richie\LOCALS~1\Temp\~DF389E.tmp scheduled to be deleted on reboot.
    User's Temp folder emptied.
    User's Temporary Internet Files folder emptied.
    User's Internet Explorer cache folder emptied.
    File delete failed. C:\Documents and Settings\LocalService\Local Settings\Temp\Temporary Internet Files\Content.IE5\index.dat scheduled to be deleted on reboot.
    File delete failed. C:\Documents and Settings\LocalService\Local Settings\Temp\History\History.IE5\index.dat scheduled to be deleted on reboot.
    File delete failed. C:\Documents and Settings\LocalService\Local Settings\Temp\Cookies\index.dat scheduled to be deleted on reboot.
    Local Service Temp folder emptied.
    File delete failed. C:\Documents and Settings\LocalService\Local Settings\Temporary Internet Files\Content.IE5\index.dat scheduled to be deleted on reboot.
    Local Service Temporary Internet Files folder emptied.
    File delete failed. C:\WINDOWS\temp\ZLT06254.TMP scheduled to be deleted on reboot.
    Windows Temp folder emptied.
    File delete failed. C:\Documents and Settings\Richie\Local Settings\Application Data\Mozilla\Firefox\Profiles\qxbx6g1v.default\Cache\_CACHE_001_ scheduled to be deleted on reboot.
    File delete failed. C:\Documents and Settings\Richie\Local Settings\Application Data\Mozilla\Firefox\Profiles\qxbx6g1v.default\Cache\_CACHE_002_ scheduled to be deleted on reboot.
    File delete failed. C:\Documents and Settings\Richie\Local Settings\Application Data\Mozilla\Firefox\Profiles\qxbx6g1v.default\Cache\_CACHE_003_ scheduled to be deleted on reboot.
    File delete failed. C:\Documents and Settings\Richie\Local Settings\Application Data\Mozilla\Firefox\Profiles\qxbx6g1v.default\Cache\_CACHE_MAP_ scheduled to be deleted on reboot.
    File delete failed. C:\Documents and Settings\Richie\Local Settings\Application Data\Mozilla\Firefox\Profiles\qxbx6g1v.default\urlclassifier3.sqlite scheduled to be deleted on reboot.
    File delete failed. C:\Documents and Settings\Richie\Local Settings\Application Data\Mozilla\Firefox\Profiles\qxbx6g1v.default\XUL.mfl scheduled to be deleted on reboot.
    FireFox cache emptied.
    Opera cache emptied.
    Temp folders emptied.
    Explorer started successfully

    OTMoveIt3 by OldTimer - Version 1.0.8.0 log created on 02042009_131051

    Files moved on Reboot...
    File C:\DOCUME~1\Richie\LOCALS~1\Temp\etilqs_FIJLEcHxIJ4cqlSQPPeZ not found!
    C:\DOCUME~1\Richie\LOCALS~1\Temp\~DF1BDE.tmp moved successfully.
    C:\DOCUME~1\Richie\LOCALS~1\Temp\~DF389E.tmp moved successfully.
    File move failed. C:\Documents and Settings\LocalService\Local Settings\Temp\Temporary Internet Files\Content.IE5\index.dat scheduled to be moved on reboot.
    File move failed. C:\Documents and Settings\LocalService\Local Settings\Temp\History\History.IE5\index.dat scheduled to be moved on reboot.
    File move failed. C:\Documents and Settings\LocalService\Local Settings\Temp\Cookies\index.dat scheduled to be moved on reboot.
    File move failed. C:\Documents and Settings\LocalService\Local Settings\Temporary Internet Files\Content.IE5\index.dat scheduled to be moved on reboot.
    File C:\WINDOWS\temp\ZLT06254.TMP not found!
    C:\Documents and Settings\Richie\Local Settings\Application Data\Mozilla\Firefox\Profiles\qxbx6g1v.default\Cache\_CACHE_001_ moved successfully.
    C:\Documents and Settings\Richie\Local Settings\Application Data\Mozilla\Firefox\Profiles\qxbx6g1v.default\Cache\_CACHE_002_ moved successfully.
    C:\Documents and Settings\Richie\Local Settings\Application Data\Mozilla\Firefox\Profiles\qxbx6g1v.default\Cache\_CACHE_003_ moved successfully.
    C:\Documents and Settings\Richie\Local Settings\Application Data\Mozilla\Firefox\Profiles\qxbx6g1v.default\Cache\_CACHE_MAP_ moved successfully.
    C:\Documents and Settings\Richie\Local Settings\Application Data\Mozilla\Firefox\Profiles\qxbx6g1v.default\urlclassifier3.sqlite moved successfully.
    C:\Documents and Settings\Richie\Local Settings\Application Data\Mozilla\Firefox\Profiles\qxbx6g1v.default\XUL.mfl moved successfully.


  • Closed Accounts Posts: 1,970 ✭✭✭ActorSeeksJob


    hello

    Please download ATF Cleaner by Atribune.
      Double-click
    ATF-Cleaner.exe to run the program.
    Under Main choose: Select All
    Click the Empty Selected button.
    If you use Firefox browser
      Click
    Firefox at the top and choose: Select All
    Click the Empty Selected button.
    NOTE: If you would like to keep your saved passwords, please click No at the prompt.
    If you use Opera browser
      Click
    Opera at the top and choose: Select All
    Click the Empty Selected button.
    NOTE: If you would like to keep your saved passwords, please click No at the prompt.
    Click Exit on the Main menu to close the program.




    Please download Malwarebytes' Anti-Malware from Here or Here

    Double Click mbam-setup.exe to install the application.
    • Make sure a checkmark is placed next to Update Malwarebytes' Anti-Malware and Launch Malwarebytes' Anti-Malware, then click Finish.
    • If an update is found, it will download and install the latest version.
    • Once the program has loaded, select "Perform Quick Scan", then click Scan.
    • The scan may take some time to finish,so please be patient.
    • When the scan is complete, click OK, then Show Results to view the results.
    • Make sure that everything is checked, and click Remove Selected.
    • When disinfection is completed, a log will open in Notepad and you may be prompted to Restart.(See Extra Note)
    • The log is automatically saved by MBAM and can be viewed by clicking the Logs tab in MBAM.
    • Copy&Paste the entire report in your next reply.
    Extra Note:
    If MBAM encounters a file that is difficult to remove,you will be presented with 1 of 2 prompts,click OK to either and let MBAM proceed with the disinfection process,if asked to restart the computer,please do so immediatly.






    Go to Kaspersky website and perform an online antivirus scan.
    1. Read through the requirements and privacy statement and click on Accept button.
    2. It will start downloading and installing the scanner and virus definitions. You will be prompted to install an application from Kaspersky. Click Run.
    3. When the downloads have finished, click on Settings.
    4. Make sure these boxes are checked (ticked). If they are not, please tick them and click on the Save button:
        Spyware, Adware, Dialers, and other potentially dangerous programs
        Archives
        Mail databases
      [*]Click on My Computer under Scan.
      [*]Once the scan is complete, it will display the results. Click on View Scan Report.
      [*]You will see a list of infected items there. Click on Save Report As....
      [*]Save this report to a convenient place. Change the Files of type to Text file (.txt) before clicking on the Save button. Then post it here.


    5. Advertisement
    6. Closed Accounts Posts: 9,700 ✭✭✭tricky D


      Hi


      Malwarebytes' Anti-Malware 1.33
      Database version: 1728
      Windows 5.1.2600 Service Pack 3

      2/4/2009 19:30:53
      mbam-log-2009-02-04 (19-30-53).txt

      Scan type: Quick Scan
      Objects scanned: 49147
      Time elapsed: 3 minute(s), 55 second(s)

      Memory Processes Infected: 0
      Memory Modules Infected: 0
      Registry Keys Infected: 0
      Registry Values Infected: 0
      Registry Data Items Infected: 0
      Folders Infected: 0
      Files Infected: 0

      Memory Processes Infected:
      (No malicious items detected)

      Memory Modules Infected:
      (No malicious items detected)

      Registry Keys Infected:
      (No malicious items detected)

      Registry Values Infected:
      (No malicious items detected)

      Registry Data Items Infected:
      (No malicious items detected)

      Folders Infected:
      (No malicious items detected)

      Files Infected:
      (No malicious items detected)


      Kaspersky

      KASPERSKY ONLINE SCANNER 7 REPORT
      Thursday, February 5, 2009
      Operating System: Microsoft Windows XP Professional Service Pack 3 (build 2600)
      Kaspersky Online Scanner 7 version: 7.0.25.0
      Program database last update: Thursday, February 05, 2009 11:14:40
      Records in database: 1754610

      Scan settings:
      Scan using the following database: extended
      Scan archives: yes
      Scan mail databases: yes

      Scan area - My Computer:
      C:\
      D:\
      E:\
      F:\

      Scan statistics:
      Files scanned: 112504
      Threat name: 47
      Infected objects: 62
      Suspicious objects: 15
      Duration of the scan: 05:02:50


      File name / Threat name / Threats count
      C:\home\work\business\biz-docs\proposals and contracts\Proposal Kit Pro-v7.0.exe Infected: Trojan.Win32.Pakes.cgn 1
      C:\home\work\business\biz-docs\proposals and contracts\Proposal_Kit_10.0_Pro.zip Infected: Trojan.Win32.Pakes.cgn 1
      F:\backup\MAIL\ADMIN\FOL045E1.PMM Infected: Exploit.PHP.Small.c 1
      F:\backup\MAIL\ADMIN\FOL045E1.PMM Infected: Exploit.Perl.Slsnif.a 1
      F:\backup\MAIL\ADMIN\FOL045E1.PMM Infected: Trojan-Clicker.HTML.IFrame.e 1
      F:\backup\MAIL\ADMIN\FOL045E1.PMM Infected: Exploit.JS.CVE-2006-1359.a 1
      F:\backup\MAIL\ADMIN\FOL045E1.PMM Infected: Exploit.Perl.VWar.a 1
      F:\backup\MAIL\ADMIN\FOL045E1.PMM Infected: HackTool.Win32.Defacer.a 1
      F:\backup\MAIL\ADMIN\FOL045E1.PMM Infected: Backdoor.PHP.WebShell.l 1
      F:\backup\MAIL\ADMIN\FOL045E1.PMM Infected: Constructor.Perl.Machd.a 1
      F:\backup\MAIL\ADMIN\FOL045E1.PMM Infected: Exploit.HTML.CVE2006-4777.a 1
      F:\backup\MAIL\ADMIN\FOL045E1.PMM Infected: Worm.OSX.Niqtana.a 1
      F:\downloads\old_HD\PMAIL\MAIL\220CE882.PM$ Suspicious: Exploit.HTML.Iframe.FileDownload 1
      F:\downloads\old_HD\PMAIL\MAIL\3245D4DE.PM$ Suspicious: Exploit.HTML.Iframe.FileDownload 1
      F:\downloads\old_HD\PMAIL\MAIL\379AA832.PM$ Suspicious: Exploit.HTML.Iframe.FileDownload 1
      F:\downloads\old_HD\PMAIL\MAIL\4F771E78.PM$ Suspicious: Exploit.HTML.Iframe.FileDownload 1
      F:\downloads\old_HD\PMAIL\MAIL\65252E5.PM$ Suspicious: Exploit.HTML.Iframe.FileDownload 1
      F:\downloads\old_HD\PMAIL\MAIL\73A15179.PM$ Suspicious: Exploit.HTML.Iframe.FileDownload 1
      F:\downloads\old_HD\PMAIL\MAIL\783CFA7C.PM$ Suspicious: Exploit.HTML.Iframe.FileDownload 1
      F:\downloads\old_HD\PMAIL\MAIL\FOL06B63.PMM Infected: Net-Worm.Win32.Mytob.bf 2
      F:\downloads\old_HD\PMAIL\MAIL\UNX01465.MBX Infected: Email-Worm.Win32.Sobig.e 1
      F:\downloads\old_HD\PMAIL\MAIL\UNX01465.MBX Infected: Email-Worm.Win32.Tanatos.b 1
      F:\downloads\old_HD\PMAIL\MAIL\UNX04150.MBX Infected: Email-Worm.Win32.Bagle.at 1
      F:\downloads\old_HD\PMAIL\MAIL\UNX05354.MBX Infected: Email-Worm.Win32.Bagle.gen 1
      F:\downloads\old_HD\PMAIL\MAIL\UNX05354.MBX Infected: Email-Worm.Win32.Bagle.z 1
      F:\downloads\old_HD\PMAIL\MAIL\UNX05FC5.MBX Suspicious: Trojan-Downloader.JS.gen 2
      F:\downloads\old_HD\PMAIL\MAIL\UNX05FC5.MBX Infected: Exploit.HTML.IframeBof 2
      F:\downloads\old_HD\PMAIL\MAIL\UNX05FC5.MBX Infected: Net-Worm.Perl.Santy.b 1
      F:\downloads\old_HD\PMAIL\MAIL\UNX05FC5.MBX Infected: Net-Worm.Perl.Spyki.c 1
      F:\downloads\old_HD\PMAIL\MAIL\UNX05FC5.MBX Infected: Backdoor.Perl.Shellbot.a 2
      F:\downloads\old_HD\PMAIL\MAIL\UNX05FC5.MBX Infected: Net-Worm.Perl.Spyki.b 1
      F:\downloads\old_HD\PMAIL\MAIL\UNX05FC5.MBX Infected: Net-Worm.Perl.Spyki.a 1
      F:\downloads\old_HD\PMAIL\MAIL\UNX05FC5.MBX Infected: Exploit.HTML.Mht 1
      F:\downloads\old_HD\PMAIL\MAIL\UNX05FC5.MBX Infected: Trojan.Java.ClassLoader.h 1
      F:\downloads\old_HD\PMAIL\MAIL\UNX05FC5.MBX Infected: Trojan-Downloader.Java.OpenStream.c 1
      F:\downloads\old_HD\PMAIL\MAIL\UNX05FC5.MBX Infected: Trojan.Java.ClassLoader.d 1
      F:\downloads\old_HD\PMAIL\MAIL\UNX05FC5.MBX Infected: Trojan-Downloader.Win32.Small.yx 1
      F:\downloads\old_HD\PMAIL\MAIL\UNX05FC5.MBX Infected: Trojan.VBS.KillAV.v 3
      F:\downloads\old_HD\PMAIL\MAIL\UNX05FC5.MBX Infected: Exploit.Win32.MS04-028.gen 1
      F:\downloads\old_HD\PMAIL\MAIL\UNX05FC5.MBX Infected: Exploit.Win32.WinAmp.a 2
      F:\downloads\old_HD\PMAIL\MAIL\UNX05FC5.MBX Infected: Exploit.Perl.Vbil.a 1
      F:\downloads\old_HD\PMAIL\MAIL\UNX05FC5.MBX Infected: Exploit.Python.PunBB.a 1
      F:\downloads\old_HD\PMAIL\MAIL\UNX05FC5.MBX Infected: Exploit.Perl.Seq.a 1
      F:\downloads\old_HD\PMAIL\MAIL\UNX05FC5.MBX Infected: Exploit.Perl.Ecard.a 2
      F:\downloads\old_HD\PMAIL\MAIL\UNX05FC5.MBX Infected: Trojan.JS.ObjID.a 2
      F:\downloads\old_HD\PMAIL\MAIL\UNX05FC5.MBX Infected: Exploit.Perl.Carte.a 1
      F:\downloads\old_HD\PMAIL\MAIL\UNX05FC5.MBX Infected: Exploit.Linux.Strayhorn.a 1
      F:\downloads\old_HD\PMAIL\MAIL\UNX05FC5.MBX Suspicious: Trojan-Spy.HTML.Fraud.gen 2
      F:\downloads\old_HD\PMAIL\MAIL\UNX05FC5.MBX Infected: Exploit.Perl.BT.a 1
      F:\downloads\old_HD\PMAIL\MAIL\UNX05FC5.MBX Infected: Exploit.Perl.SPB.a 1
      F:\downloads\old_HD\PMAIL\MAIL\UNX05FC5.MBX Infected: Exploit.Python.Mantis.a 2
      F:\downloads\old_HD\PMAIL\MAIL\UNX07D7A.MBX Suspicious: Exploit.HTML.Iframe.FileDownload 3
      F:\downloads\old_HD\PMAIL\MAIL\UNX07D7A.MBX Infected: Email-Worm.Win32.Klez.h 3
      F:\downloads\old_HD\PMAIL\MAIL\UNX07DFF.MBX Suspicious: Exploit.HTML.CodeBaseExec 1
      F:\Music\0aDOWNLOADS\Stephane Grappelli\01 Track 1.wma Infected: Trojan-Downloader.WMA.Wimad.l 1
      F:\Music\0aDOWNLOADS\Stephane Grappelli\03 Track 3.wma Infected: Trojan-Downloader.WMA.Wimad.l 1
      F:\Music\0aDOWNLOADS\Stephane Grappelli\06 Track 6.wma Infected: Trojan-Downloader.WMA.Wimad.l 1
      F:\Music\0aDOWNLOADS\Stephane Grappelli\07 Track 7.wma Infected: Trojan-Downloader.WMA.Wimad.l 1
      F:\Music\0aDOWNLOADS\Stephane Grappelli\Eighties classic.wma Infected: Trojan-Downloader.WMA.Wimad.l 1
      F:\Music\0aDOWNLOADS\Stephane Grappelli\TOTALLY HIP TRACK.wma Infected: Trojan-Downloader.WMA.Wimad.l 1
      F:\work\business\biz-docs\proposals and contracts\Proposal Kit Pro-v7.0.exe Infected: Trojan.Win32.Pakes.cgn 1
      F:\work\business\biz-docs\proposals and contracts\Proposal_Kit_10.0_Pro.zip Infected: Trojan.Win32.Pakes.cgn 1

      The selected area was scanned.



      (lots in old pegasus mails!)


    7. Closed Accounts Posts: 1,970 ✭✭✭ActorSeeksJob


      hello

      Please download OTMoveIt3 by OldTimer
      • Save it to your desktop.
      • Please double-click OTMoveIt3.exe to run it. (Note: If you are running on Vista, right-click on the file and choose Run As Administrator).
      • Copy the lines in the codebox below to the clipboard by highlighting ALL of them and pressing CTRL + C (or, after highlighting, right-click and choose Copy):
        :Processes
        explorer.exe
        
        :Services
        
        :Reg
        
        :Files
        F:\Music\0aDOWNLOADS\Stephane Grappelli\01 Track 1.wma
        F:\Music\0aDOWNLOADS\Stephane Grappelli\03 Track 3.wma
        F:\Music\0aDOWNLOADS\Stephane Grappelli\06 Track 6.wma
        F:\Music\0aDOWNLOADS\Stephane Grappelli\07 Track 7.wma
        F:\Music\0aDOWNLOADS\Stephane Grappelli\Eighties classic.wma
        F:\Music\0aDOWNLOADS\Stephane Grappelli\TOTALLY HIP TRACK.wma
        F:\work\business\biz-docs\proposals and contracts\Proposal Kit Pro-v7.0.exe
        F:\work\business\biz-docs\proposals and contracts\Proposal_Kit_10.0_Pro.zip
        C:\home\work\business\biz-docs\proposals and contracts\Proposal Kit Pro-v7.0.exe
        C:\home\work\business\biz-docs\proposals and contracts\Proposal_Kit_10.0_Pro.zip
        
        :Commands
        [purity]
        [emptytemp]
        [start explorer]
        [Reboot]
        
      • Return to OTMoveIt3, right click in the "Paste Instructions for Items to be Moved" window (under the yellow bar) and choose Paste.
      • Click the red Moveit! button.
      • Copy everything in the Results window (under the green bar) to the clipboard by highlighting ALL of them and pressing CTRL + C (or, after highlighting, right-click and choose copy), and paste it in your next reply.
      • Close OTMoveIt3
      Note: If a file or folder cannot be moved immediately you may be asked to reboot the machine to finish the move process. If you are asked to reboot the machine choose Yes. In this case, after the reboot, open Notepad (Start->All Programs->Accessories->Notepad), click File->Open, in the File Name box enter *.log and press the Enter key, navigate to the C:\_OTMoveIt\MovedFiles folder, and open the newest .log file present, and copy/paste the contents of that document back here in your next post.




      Download the GMER Rootkit Scanner. Unzip it to your Desktop.

      Before scanning, make sure all other running programs are closed and no other actions like a scheduled antivirus scan will occur while the scan is being performed. Do not use your computer for anything else during the scan.

      Double-click gmer.exe. The program will begin to run.

      **Caution**
      These types of scans can produce false positives. Do NOT take any action on any
      "<--- ROOKIT" entries unless advised by a trained Security Analyst

      If possible rootkit activity is found, you will be asked if you would like to perform a full scan.
      • Click NO
      • In the right panel, you will see a bunch of boxes that have been checked ... leave everything checked and ensure the Show all box is Unchecked.
      • Now click the Scan button.
        Once the scan is complete, you may receive another notice about rootkit activity.
      • Click OK.
      • GMER will produce a log. Click on the [Save..] button, and in the File name area, type in "GMER.txt"
      • Save it where you can easily find it, such as your desktop.
      Post the contents of GMER.txt in your next reply.


    8. Closed Accounts Posts: 9,700 ✭✭✭tricky D


      Hi

      OTMoveIt3 log

      ========== PROCESSES ==========
      Process explorer.exe killed successfully.
      ========== SERVICES/DRIVERS ==========
      ========== REGISTRY ==========
      ========== FILES ==========
      File/Folder F:\Music\0aDOWNLOADS\Stephane Grappelli\01 Track 1.wma not found.
      File/Folder F:\Music\0aDOWNLOADS\Stephane Grappelli\03 Track 3.wma not found.
      File/Folder F:\Music\0aDOWNLOADS\Stephane Grappelli\06 Track 6.wma not found.
      File/Folder F:\Music\0aDOWNLOADS\Stephane Grappelli\07 Track 7.wma not found.
      File/Folder F:\Music\0aDOWNLOADS\Stephane Grappelli\Eighties classic.wma not found.
      File/Folder F:\Music\0aDOWNLOADS\Stephane Grappelli\TOTALLY HIP TRACK.wma not found.
      File/Folder F:\work\business\biz-docs\proposals and contracts\Proposal Kit Pro-v7.0.exe not found.
      File/Folder F:\work\business\biz-docs\proposals and contracts\Proposal_Kit_10.0_Pro.zip not found.
      C:\home\work\business\biz-docs\proposals and contracts\Proposal Kit Pro-v7.0.exe moved successfully.
      C:\home\work\business\biz-docs\proposals and contracts\Proposal_Kit_10.0_Pro.zip moved successfully.
      ========== COMMANDS ==========
      File delete failed. C:\DOCUME~1\Richie\LOCALS~1\Temp\etilqs_4tOYzFgUegpSqy3sJ11C scheduled to be deleted on reboot.
      File delete failed. C:\DOCUME~1\Richie\LOCALS~1\Temp\~DF3B2B.tmp scheduled to be deleted on reboot.
      File delete failed. C:\DOCUME~1\Richie\LOCALS~1\Temp\~DF4AEB.tmp scheduled to be deleted on reboot.
      User's Temp folder emptied.
      User's Temporary Internet Files folder emptied.
      User's Internet Explorer cache folder emptied.
      File delete failed. C:\Documents and Settings\LocalService\Local Settings\Temp\Temporary Internet Files\Content.IE5\index.dat scheduled to be deleted on reboot.
      File delete failed. C:\Documents and Settings\LocalService\Local Settings\Temp\History\History.IE5\index.dat scheduled to be deleted on reboot.
      File delete failed. C:\Documents and Settings\LocalService\Local Settings\Temp\Cookies\index.dat scheduled to be deleted on reboot.
      Local Service Temp folder emptied.
      File delete failed. C:\Documents and Settings\LocalService\Local Settings\Temporary Internet Files\Content.IE5\index.dat scheduled to be deleted on reboot.
      Local Service Temporary Internet Files folder emptied.
      File delete failed. C:\WINDOWS\temp\Perflib_Perfdata_754.dat scheduled to be deleted on reboot.
      File delete failed. C:\WINDOWS\temp\ZLT03f72.TMP scheduled to be deleted on reboot.
      Windows Temp folder emptied.
      Java cache emptied.
      File delete failed. C:\Documents and Settings\Richie\Local Settings\Application Data\Mozilla\Firefox\Profiles\qxbx6g1v.default\Cache\_CACHE_001_ scheduled to be deleted on reboot.
      File delete failed. C:\Documents and Settings\Richie\Local Settings\Application Data\Mozilla\Firefox\Profiles\qxbx6g1v.default\Cache\_CACHE_002_ scheduled to be deleted on reboot.
      File delete failed. C:\Documents and Settings\Richie\Local Settings\Application Data\Mozilla\Firefox\Profiles\qxbx6g1v.default\Cache\_CACHE_003_ scheduled to be deleted on reboot.
      File delete failed. C:\Documents and Settings\Richie\Local Settings\Application Data\Mozilla\Firefox\Profiles\qxbx6g1v.default\Cache\_CACHE_MAP_ scheduled to be deleted on reboot.
      File delete failed. C:\Documents and Settings\Richie\Local Settings\Application Data\Mozilla\Firefox\Profiles\qxbx6g1v.default\urlclassifier3.sqlite scheduled to be deleted on reboot.
      File delete failed. C:\Documents and Settings\Richie\Local Settings\Application Data\Mozilla\Firefox\Profiles\qxbx6g1v.default\XUL.mfl scheduled to be deleted on reboot.
      FireFox cache emptied.
      Opera cache emptied.
      Temp folders emptied.
      Explorer started successfully

      OTMoveIt3 by OldTimer - Version 1.0.8.0 log created on 02062009_141915

      Files moved on Reboot...
      File C:\DOCUME~1\Richie\LOCALS~1\Temp\etilqs_4tOYzFgUegpSqy3sJ11C not found!
      C:\DOCUME~1\Richie\LOCALS~1\Temp\~DF3B2B.tmp moved successfully.
      File C:\DOCUME~1\Richie\LOCALS~1\Temp\~DF4AEB.tmp not found!
      File move failed. C:\Documents and Settings\LocalService\Local Settings\Temp\Temporary Internet Files\Content.IE5\index.dat scheduled to be moved on reboot.
      File move failed. C:\Documents and Settings\LocalService\Local Settings\Temp\History\History.IE5\index.dat scheduled to be moved on reboot.
      File move failed. C:\Documents and Settings\LocalService\Local Settings\Temp\Cookies\index.dat scheduled to be moved on reboot.
      File move failed. C:\Documents and Settings\LocalService\Local Settings\Temporary Internet Files\Content.IE5\index.dat scheduled to be moved on reboot.
      File C:\WINDOWS\temp\Perflib_Perfdata_754.dat not found!
      File C:\WINDOWS\temp\ZLT03f72.TMP not found!
      C:\Documents and Settings\Richie\Local Settings\Application Data\Mozilla\Firefox\Profiles\qxbx6g1v.default\Cache\_CACHE_001_ moved successfully.
      C:\Documents and Settings\Richie\Local Settings\Application Data\Mozilla\Firefox\Profiles\qxbx6g1v.default\Cache\_CACHE_002_ moved successfully.
      C:\Documents and Settings\Richie\Local Settings\Application Data\Mozilla\Firefox\Profiles\qxbx6g1v.default\Cache\_CACHE_003_ moved successfully.
      C:\Documents and Settings\Richie\Local Settings\Application Data\Mozilla\Firefox\Profiles\qxbx6g1v.default\Cache\_CACHE_MAP_ moved successfully.
      C:\Documents and Settings\Richie\Local Settings\Application Data\Mozilla\Firefox\Profiles\qxbx6g1v.default\urlclassifier3.sqlite moved successfully.
      C:\Documents and Settings\Richie\Local Settings\Application Data\Mozilla\Firefox\Profiles\qxbx6g1v.default\XUL.mfl moved successfully.



      GMER 1.0.14.14536 - http://www.gmer.net
      Rootkit scan 2009-02-06 14:35:38
      Windows 5.1.2600 Service Pack 3


      ---- Devices - GMER 1.0.14 ----

      Device \Driver\Tcpip \Device\Ip vsdatant.sys (TrueVector Device Driver/Check Point Software Technologies LTD)

      AttachedDevice \Driver\Tcpip \Device\Ip ntkrnlpa.exe (NT Kernel & System/Microsoft Corporation)

      Device \Driver\Tcpip \Device\Tcp vsdatant.sys (TrueVector Device Driver/Check Point Software Technologies LTD)

      AttachedDevice \Driver\Tcpip \Device\Tcp ntkrnlpa.exe (NT Kernel & System/Microsoft Corporation)
      AttachedDevice \Driver\Tcpip \Device\Tcp Lbd.sys (Boot Driver/Lavasoft AB)

      Device \Driver\Tcpip \Device\Udp vsdatant.sys (TrueVector Device Driver/Check Point Software Technologies LTD)

      AttachedDevice \Driver\Tcpip \Device\Udp ntkrnlpa.exe (NT Kernel & System/Microsoft Corporation)
      AttachedDevice \Driver\Tcpip \Device\Udp Lbd.sys (Boot Driver/Lavasoft AB)

      Device \Driver\Tcpip \Device\RawIp vsdatant.sys (TrueVector Device Driver/Check Point Software Technologies LTD)

      AttachedDevice \Driver\Tcpip \Device\RawIp ntkrnlpa.exe (NT Kernel & System/Microsoft Corporation)
      AttachedDevice \Driver\Tcpip \Device\RawIp Lbd.sys (Boot Driver/Lavasoft AB)

      ---- EOF - GMER 1.0.14 ----


    9. Closed Accounts Posts: 1,970 ✭✭✭ActorSeeksJob


      all done

      Follow these steps to uninstall Combofix and tools used in the removal of malware
      • Click START then RUN
      • Now type Combofix /u in the runbox and click OK. Note the space between the X and the U, it needs to be there.
        CF_Cleanup.png



      Download ToolsCleaner2 to your desktop and run it ( by de A.Rothstein & Dj Quiou )
      • Click the Pt. Restauration button and press OK to the prompts.
      • Click the Corbeille button and press OK to the prompt.
      • Click the Fichiers temp button and press OK to the prompt.
      • Click the Recherche button and let it run ( it may look like it freezes but let it continue )
      • Once it is done click the Suppression button and let it remove anything it finds.
      • Close the program



      Below I have included a number of recommendations for how to protect your computer against malware infections.
      • Keep Windows updated by regularly checking their website at :
        http://windowsupdate.microsoft.com/
        This will ensure your computer has always the latest security updates available installed on your computer.

      • SpywareBlaster protects against bad ActiveX, it immunizes your PC against them.

      • SpywareGuard offers realtime protection from spyware installation attempts. Make sure you are only running one real-time anti-spyware protection program ( eg : TeaTimer, Windows Defender ) or there will be a conflict.

      • Make Internet Explorer more secure
        • Click Start > Run
        • Type Inetcpl.cpl & click OK
        • Click on the Security tab
        • Click Reset all zones to default level
        • Make sure the Internet Zone is selected & Click Custom level
        • In the ActiveX section, set the first two options ("Download signed and unsigned ActiveX controls) to "Prompt", and ("Initialize and Script ActiveX controls not marked as safe") to "Disable".
        • Next Click OK, then Apply button and then OK to exit the Internet Properties page.
      • ATF Cleaner - Cleans temporary files from IE and Windows, empties the recycle bin and more. Great tool to help speed up your computer and knock out those nasties that like to reside in the temp folders.

      • MVPS Hosts file replaces your current HOSTS file with one containing well known ad sites and other bad sites. Basically, this prevents your computer from connecting to those sites by redirecting them to 127.0.0.1 which is your local computer, meaning it will be difficult to infect yourself in the future.

      • Please consider using an alternate browser. Mozilla's Firefox browser is fantastic; it is much more
        secure than Internet Explorer, immune to almost all known browser hijackers, and also has the best built-in pop up
        blocker (as an added benefit!) that I have ever seen. If you are interested, Firefox may be downloaded from
        Here


        If you choose to use Firefox, I highly recommend these add-ons to keep your PC even more secure.
        • NoScript - for blocking ads and other potential website attacks
        • McAfee SiteAdvisor - this tells you whether the sites you are about to visit are safe or not. A must if you do a lot of Googling

      • Keep a backup of your important files - Now, more than ever, it's especially important to protect your digital files and memories. This article is full of good information on alternatives for home backup solutions.

      • ERUNT (Emergency Recovery Utility NT) allows you to keep a complete backup of your registry and restore it when needed. The standard registry backup options that come with Windows back up most of the registry but not all of it. ERUNT however creates a complete backup set, including the Security hive and user related sections. ERUNT is easy to use and since it creates a full backup, there are no options or choices other than to select the location of the backup files. The backup set includes a small executable that will launch the registry restore if needed.

      • Recovery Console - Recent trends appear to indicate that future infections will include attacks to the boot sector of the computer. The installation of the Recovery Console in the computer will be our only defense against this threat. For more information and steps to install the Recovery Console see This Article. Should you need assistance in installing the Recovery Console, please do not hesitate to ask.

      • Please read my guide on how to prevent malware and about safe computing here
      Thank you for your patience, and performing all of the procedures requested.


    10. Closed Accounts Posts: 9,700 ✭✭✭tricky D


      Hi ActorSeeksJob,

      Thanks a million for your sterling work.



      (fwiw ComboFix /u bugged out - problem with prep.com and Suppression remained greyed out)


    11. Advertisement
    12. Closed Accounts Posts: 1,970 ✭✭✭ActorSeeksJob


      do this as well then

      Now we need to create a new System Restore point.

      Click Start Menu > Run > type (or copy and paste)

      %SystemRoot%\System32\restore\rstrui.exe

      Press OK. Choose Create a Restore Point then click Next. Name it and click Create, when the confirmation screen shows the restore point has been created click Close.

      Next goto Start Menu > Run > type

      cleanmgr

      Click OK, Disk Cleanup will open and start calculating the amount of space that can be freed, Once thats finished it will open the Disk Cleanup options screen, click the More Options tab then click Clean up on the system restore area and choose Yes at the confirmation window which will remove all the restore points except the one we just created.

      To close Disk Cleanup and remove the Temporary Internet Files detected in the initial scan click OK then choose Yes on the confirmation window.


    13. Closed Accounts Posts: 9,700 ✭✭✭tricky D


      Hi,

      That's done now.


    14. Closed Accounts Posts: 2 Ray123


      Hi ASJ,

      I too have this gao... troj on my computer. I tried all the steps mention above till the gmer step. I dont know how to proceed from here. Would you mind guiding me how to go ahead. Heres the log:


      GMER 1.0.14.14536 - http://www.gmer.net
      Rootkit scan 2009-02-16 22:02:24
      Windows 6.0.6001 Service Pack 1


      ---- System - GMER 1.0.14 ----

      SSDT \??\S:\SUPERAntiSpyware\SASKUTIL.sys ZwTerminateProcess [0x8B492F20]

      Code \SystemRoot\system32\drivers\mfehidk.sys (Host Intrusion Detection Link Driver/McAfee, Inc.) ZwTerminateProcess [0xA76354E7]

      ---- Kernel code sections - GMER 1.0.14 ----

      .text ntoskrnl.exe!KeInsertQueue + 811 824AAE08 4 Bytes [ 20, 2F, 49, 8B ]
      PAGE ntoskrnl.exe!ZwTerminateProcess 82655FDB 5 Bytes JMP A76354EB \SystemRoot\system32\drivers\mfehidk.sys (Host Intrusion Detection Link Driver/McAfee, Inc.)

      ---- Devices - GMER 1.0.14 ----

      AttachedDevice \FileSystem\Ntfs \Ntfs mfehidk.sys (Host Intrusion Detection Link Driver/McAfee, Inc.)
      AttachedDevice \Driver\kbdclass \Device\KeyboardClass0 Wdf01000.sys (WDF Dynamic/Microsoft Corporation)
      AttachedDevice \Driver\kbdclass \Device\KeyboardClass1 Wdf01000.sys (WDF Dynamic/Microsoft Corporation)
      AttachedDevice \FileSystem\fastfat \Fat fltmgr.sys (Microsoft Filesystem Filter Manager/Microsoft Corporation)
      AttachedDevice \FileSystem\fastfat \Fat mfehidk.sys (Host Intrusion Detection Link Driver/McAfee, Inc.)

      ---- Services - GMER 1.0.14 ----

      Service system32\drivers\gaopdxdhppnpbw.sys (*** hidden *** ) [SYSTEM] gaopdxserv.sys <-- ROOTKIT !!!

      ---- Registry - GMER 1.0.14 ----

      Reg HKLM\SYSTEM\CurrentControlSet\Services\gaopdxserv.sys@start 1
      Reg HKLM\SYSTEM\CurrentControlSet\Services\gaopdxserv.sys@type 1
      Reg HKLM\SYSTEM\CurrentControlSet\Services\gaopdxserv.sys@group file system
      Reg HKLM\SYSTEM\CurrentControlSet\Services\gaopdxserv.sys@imagepath \systemroot\system32\drivers\gaopdxdhppnpbw.sys
      Reg HKLM\SYSTEM\CurrentControlSet\Services\gaopdxserv.sys\modules
      Reg HKLM\SYSTEM\CurrentControlSet\Services\gaopdxserv.sys\modules@gaopdxserv \\?\globalroot\systemroot\system32\drivers\gaopdxdhppnpbw.sys
      Reg HKLM\SYSTEM\CurrentControlSet\Services\gaopdxserv.sys\modules@gaopdxl \\?\globalroot\systemroot\system32\gaopdxicyauvey.dll
      Reg HKLM\SYSTEM\ControlSet002\Services\gaopdxserv.sys@start 1
      Reg HKLM\SYSTEM\ControlSet002\Services\gaopdxserv.sys@type 1
      Reg HKLM\SYSTEM\ControlSet002\Services\gaopdxserv.sys@group file system
      Reg HKLM\SYSTEM\ControlSet002\Services\gaopdxserv.sys@imagepath \systemroot\system32\drivers\gaopdxdhppnpbw.sys
      Reg HKLM\SYSTEM\ControlSet002\Services\gaopdxserv.sys\modules
      Reg HKLM\SYSTEM\ControlSet002\Services\gaopdxserv.sys\modules@gaopdxserv \\?\globalroot\systemroot\system32\drivers\gaopdxdhppnpbw.sys
      Reg HKLM\SYSTEM\ControlSet002\Services\gaopdxserv.sys\modules@gaopdxl \\?\globalroot\systemroot\system32\gaopdxicyauvey.dll
      Reg HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\DPX\Assets\F9BCC51C467D4687
      Reg HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\DPX\Assets\F9BCC51C467D4687@Count 0x64 0x00 0x00 0x00 ...
      Reg HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\DPX\Assets\F9BCC51C467D4687@DateTime 0xC0 0xD3 0x4C 0xBE ...

      ---- EOF - GMER 1.0.14 ----


      Thanks,
      ray


    15. Closed Accounts Posts: 1,970 ✭✭✭ActorSeeksJob


      hello

      We need to use GMER to delete a service and remove the file:
      • Open the gmer folder and double click gmer.exe to run the program
      • On starting GMER will run a short scan, allow it to complete this, then click No if it asks you to run a full scan.
      • Click on the > > > tab to open the menus
      GMER1.jpg
      • Click on the Services tab
      GMER_Services_Tab.jpg
      • Scroll down until you find the following Service (Note: This may be highlighted in red)
        gaopdxdhppnpbw
        gaopdxserv
      • Click on the Service Name to Highlight it, then right click and choose Delete...
        GMER_Delete_Service.jpg
      • Click OK at the first confirmation dialog to remove the service
      • Click OK to the second confirmation dialog to remove the file
        Let me know of any problems you encountered.




        lets remove the file:
        • Click on the Files tab
        GMER_Files_Tab.jpg
        • Now on the right hand side, locate the file
          C:\windows\system32\drivers\gaopdxdhppnpbw.sys
          C:\windows\system32\gaopdxicyauvey.dll
        • Click on the file to Highlight it, then click the Delete button on the right hand side.
          GMER_Delete_Button.jpg
        • Click Yes to the confirmation
        • Click OK to exit the program


    16. Closed Accounts Posts: 2 Ray123


      Thanks ASJ. I did delete that service adding the path to the :FILES in

      OTMoveIt3 by OldTimer


      I guess, probably thats why I couldnt see it in GMER. Well thank a lot for the all the guiding in all the posts. Reallt appreciate your knowledge and effort.

      Thanks again,
      Ray


    Advertisement