Advertisement
If you have a new account but are having problems posting or verifying your account, please email us on hello@boards.ie for help. Thanks :)
Hello all! Please ensure that you are posting a new thread or question in the appropriate forum. The Feedback forum is overwhelmed with questions that are having to be moved elsewhere. If you need help to verify your account contact hello@boards.ie
gaopdx and gaopdxserv.sys
Options
-
03-02-2009 5:26pmI've been having a few problems esp updating security definitions and the like with sites not being found. I ran as many of the tasks in the sticky, but couldn't download wrapper or rooter and windows update is being redirected to google. I reckon I need some expert help beyond my limited capabilities. Help would be appreciated, tia.
I did manage to remove iamfamous.dll but rootkitrevealer lists:
HKU\S-1-5-21-1844237615-1757981266-1606980848-1003\Software\Skype\Toolbars\Firefox\ExtensionVersion 2/3/2009 13:47 9 bytes Data mismatch between Windows API and raw hive data.
HKLM\SECURITY\Policy\Secrets\SAC* 1/29/2009 18:38 0 bytes Key name contains embedded nulls (*)
HKLM\SECURITY\Policy\Secrets\SAI* 1/29/2009 18:38 0 bytes Key name contains embedded nulls (*)
HKLM\SOFTWARE\gaopdx 1/30/2009 14:46 0 bytes Hidden from Windows API.
HKLM\SYSTEM\ControlSet001\Services\gaopdxserv.sys 2/3/2009 16:00 0 bytes Hidden from Windows API.
HKLM\SYSTEM\ControlSet002\Services\gaopdxserv.sys 2/3/2009 16:00 0 bytes Hidden from Windows API.
C: 1/1/1601 00:00 0 bytes Error mounting volume
1/1/1601 00:00 0 bytes Error mounting volume
Also here's the Hijackthis log:
Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 16:18:15, on 2/3/2009
Platform: Windows XP SP3 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP3 (6.00.2900.5512)
Boot mode: Normal
Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Intel\WiFi\bin\S24EvMon.exe
C:\WINDOWS\system32\ZoneLabs\vsmon.exe
C:\Program Files\Lavasoft\Ad-Aware\AAWService.exe
C:\WINDOWS\system32\spoolsv.exe
C:\PROGRA~1\AVG\AVG8\avgwdsvc.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\Program Files\Intel\WiFi\bin\EvtEng.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\Common Files\Intel\WirelessCommon\RegSrvc.exe
C:\WINDOWS\system32\svchost.exe
C:\Program Files\Apoint\Apoint.exe
C:\Program Files\Intel\WiFi\bin\ZCfgSvc.exe
C:\Program Files\Common Files\Intel\WirelessCommon\iFrmewrk.exe
C:\PROGRA~1\AVG\AVG8\avgrsx.exe
C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe
C:\PROGRA~1\AVG\AVG8\avgtray.exe
C:\Program Files\Zone Labs\ZoneAlarm\zlclient.exe
C:\Program Files\Lavasoft\Ad-Aware\AAWTray.exe
C:\Program Files\Skype\Phone\Skype.exe
C:\Documents and Settings\Richie\Local Settings\Application Data\Google\Update\GoogleUpdate.exe
C:\Program Files\Apoint\HidFind.exe
C:\Program Files\Apoint\Apntex.exe
C:\PROGRA~1\AVG\AVG8\avgemc.exe
C:\WINDOWS\system32\wbem\unsecapp.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Skype\Plugin Manager\skypePM.exe
C:\Program Files\Mozilla Firefox\firefox.exe
C:\Program Files\Trend Micro\HijackThis\HijackThis.exe
C:\WINDOWS\system32\wuauclt.exe
R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = *.local
O2 - BHO: WormRadar.com IESiteBlocker.NavFilter - {3CA2F312-6F6E-4B53-A66E-4E65E497C8C0} - C:\Program Files\AVG\AVG8\avgssie.dll
O4 - HKLM\..\Run: [Apoint] C:\Program Files\Apoint\Apoint.exe
O4 - HKLM\..\Run: [IntelZeroConfig] "C:\Program Files\Intel\WiFi\bin\ZCfgSvc.exe"
O4 - HKLM\..\Run: [IntelWireless] "C:\Program Files\Common Files\Intel\WirelessCommon\iFrmewrk.exe" /tf Intel Wireless Tray
O4 - HKLM\..\Run: [ATIPTA] "C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe"
O4 - HKLM\..\Run: [AVG8_TRAY] C:\PROGRA~1\AVG\AVG8\avgtray.exe
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\QTTask.exe" -atboottime
O4 - HKLM\..\Run: [ZoneAlarm Client] "C:\Program Files\Zone Labs\ZoneAlarm\zlclient.exe"
O4 - HKLM\..\Run: [Ad-Watch] C:\Program Files\Lavasoft\Ad-Aware\AAWTray.exe
O4 - HKCU\..\Run: [KeyMapperStarup] C:\downloads\KeyRemapper.exe /background
O4 - HKCU\..\Run: [Skype] "C:\Program Files\Skype\Phone\Skype.exe" /nosplash /minimized
O4 - HKCU\..\Run: [Google Update] "C:\Documents and Settings\Richie\Local Settings\Application Data\Google\Update\GoogleUpdate.exe" /c
O9 - Extra button: PokerStars - {3AD14F0C-ED16-4e43-B6D8-661B03F6A1EF} - C:\Program Files\PokerStars\PokerStarsUpdate.exe
O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O16 - DPF: {01A88BB1-1174-41EC-ACCB-963509EAE56B} (SysProWmi Class) - http://support.euro.dell.com/systemprofiler/SysPro.CAB
O17 - HKLM\System\CCS\Services\Tcpip\..\{34565F01-7FE0-4732-B699-11A3831F20AB}: NameServer = 208.67.222.222,208.67.220.220
O18 - Protocol: linkscanner - {F274614C-63F8-47D5-A4D1-FBDDE494F8D1} - C:\Program Files\AVG\AVG8\avgpp.dll
O18 - Protocol: skype4com - {FFC8B962-9B40-4DFF-9458-1830C7DD7F5D} - C:\PROGRA~1\COMMON~1\Skype\SKYPE4~1.DLL
O20 - AppInit_DLLs: avgrsstx.dll
O20 - Winlogon Notify: !SASWinLogon - C:\Program Files\SUPERAntiSpyware\SASWINLO.dll
O23 - Service: Ati HotKey Poller - ATI Technologies Inc. - C:\WINDOWS\system32\Ati2evxx.exe
O23 - Service: AVG Free8 E-mail Scanner (avg8emc) - AVG Technologies CZ, s.r.o. - C:\PROGRA~1\AVG\AVG8\avgemc.exe
O23 - Service: AVG Free8 WatchDog (avg8wd) - AVG Technologies CZ, s.r.o. - C:\PROGRA~1\AVG\AVG8\avgwdsvc.exe
O23 - Service: Intel® PROSet/Wireless Event Log (EvtEng) - Intel(R) Corporation - C:\Program Files\Intel\WiFi\bin\EvtEng.exe
O23 - Service: FLEXnet Licensing Service - Macrovision Europe Ltd. - C:\Program Files\Common Files\Macrovision Shared\FLEXnet Publisher\FNPLicensingService.exe
O23 - Service: Lavasoft Ad-Aware Service - Lavasoft - C:\Program Files\Lavasoft\Ad-Aware\AAWService.exe
O23 - Service: Intel® PROSet/Wireless Registry Service (RegSrvc) - Intel(R) Corporation - C:\Program Files\Common Files\Intel\WirelessCommon\RegSrvc.exe
O23 - Service: Intel® PROSet/Wireless WiFi Service (S24EventMonitor) - Intel(R) Corporation - C:\Program Files\Intel\WiFi\bin\S24EvMon.exe
O23 - Service: TrueVector Internet Monitor (vsmon) - Check Point Software Technologies LTD - C:\WINDOWS\system32\ZoneLabs\vsmon.exe
--
End of file - 5319 bytes0
Comments
-
hello
Please download ComboFix from Here or Here to your Desktop.
**Note: In the event you already have Combofix, this is a new version that I need you to download. It is important that it is saved and renamed following this process directly to your desktop**- If you are using Firefox, make sure that your download settings are as follows:
- Tools->Options->Main tab
- Set to "Always ask me where to Save the files".
- During the download, rename Combofix to Combo-Fix as follows:
- It is important you rename Combofix during the download, but not after.
- Please do not rename Combofix to other names, but only to the one indicated.
- Close any open browsers.
- Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.
- Very Important! Temporarily disable your anti-virus, script blocking and any anti-malware real-time protection before performing a scan. They can interfere with ComboFix or remove some of its embedded files which may cause "unpredictable results".
- Click on this link to see a list of programs that should be disabled. The list is not all inclusive. If yours is not listed and you don't know how to disable it, please ask.
- Close any open browsers.
- WARNING: Combofix will disconnect your machine from the Internet as soon as it starts
- Please do not attempt to re-connect your machine back to the Internet until Combofix has completely finished.
- If there is no internet connection after running Combofix, then restart your computer to restore back your connection.
- Double click on combo-Fix.exe & follow the prompts.
- When finished, it will produce a report for you.
- Please post the "C:\Combo-Fix.txt" along with a new HijackThis log for further review.
0 - If you are using Firefox, make sure that your download settings are as follows:
-
Hi ActorSJ,
Ran those instructions. Updates are behaving much better now.
ComboF log:
ComboFix 09-02-02.04 - Richie 2009-02-03 17:36:45.1 - NTFSx86
Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.1279.810 [GMT 0:00]
Running from: c:\documents and settings\Richie\Desktop\Combo-Fix.exe
AV: AVG Anti-Virus Free *On-access scanning disabled* (Updated)
FW: ZoneAlarm Firewall *enabled*
.
((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.
C:\autorun.inf
c:\windows\system32\drivers\gaopdxfqjdabwt.sys
c:\windows\system32\drivers\gaopdxkylkmppq.sys
c:\windows\system32\drivers\gaopdxnkrujmtd.sys
c:\windows\system32\gaopdxfvkoppfq.dll
c:\windows\system32\ispnet.dll
\Autorun.inf
.
((((((((((((((((((((((((((((((((((((((( Drivers/Services )))))))))))))))))))))))))))))))))))))))))))))))))
.
\Service_gaopdxserv.sys
((((((((((((((((((((((((( Files Created from 2009-01-03 to 2009-02-03 )))))))))))))))))))))))))))))))
.
2009-02-03 16:15 . 2009-02-03 16:15 <DIR> d
C:\Rooter$
2009-02-03 14:34 . 2009-02-03 14:34 <DIR> d
c:\program files\Malwarebytes' Anti-Malware
2009-02-03 14:34 . 2009-02-03 14:34 <DIR> d
c:\documents and settings\Richie\Application Data\Malwarebytes
2009-02-03 14:34 . 2009-02-03 14:34 <DIR> d
c:\documents and settings\All Users\Application Data\Malwarebytes
2009-02-03 14:34 . 2009-01-14 16:11 38,496 --a
c:\windows\system32\drivers\mbamswissarmy.sys
2009-02-03 14:34 . 2009-01-14 16:11 15,504 --a
c:\windows\system32\drivers\mbam.sys
2009-02-03 13:04 . 2009-02-03 13:04 <DIR> d
c:\program files\Lavasoft
2009-02-03 13:04 . 2009-02-03 13:04 <DIR> d
c:\documents and settings\All Users\Application Data\Lavasoft
2009-02-03 13:04 . 2009-02-03 13:04 <DIR> d--h-c--- c:\documents and settings\All Users\Application Data\{83C91755-2546-441D-AC40-9A6B4B860800}
2009-02-03 13:04 . 2009-01-18 21:30 64,160 --a
c:\windows\system32\drivers\Lbd.sys
2009-01-31 18:52 . 2009-01-31 18:52 <DIR> d
c:\program files\CCleaner
2009-01-31 18:23 . 2009-02-02 13:33 <DIR> d--h
C:\$AVG8.VAULT$
2009-01-31 17:17 . 2009-01-31 17:17 <DIR> d
c:\program files\Trend Micro
2009-01-31 17:00 . 2008-11-13 15:18 1,221,008 --a
c:\windows\system32\zpeng25.dll
2009-01-31 16:28 . 1999-12-21 07:58 21,312 --a
c:\windows\choice.exe
2009-01-31 16:26 . 2009-01-31 16:26 <DIR> d
c:\temp\ie-spyad
2009-01-31 16:26 . 2009-02-03 16:12 <DIR> d
C:\temp
2009-01-31 15:41 . 2009-01-31 15:41 <DIR> d
c:\program files\Zone Labs
2009-01-31 15:41 . 2009-01-31 15:41 <DIR> d
c:\documents and settings\All Users\Application Data\MailFrontier
2009-01-31 15:40 . 2009-02-03 17:38 <DIR> d
c:\windows\Internet Logs
2009-01-31 14:07 . 2009-01-31 14:07 <DIR> d
c:\documents and settings\Richie\Application Data\Apple Computer
2009-01-30 18:04 . 2009-01-30 18:04 <DIR> d
c:\program files\Netscape
2009-01-30 18:04 . 2009-01-30 18:04 <DIR> d
c:\documents and settings\Richie\WINDOWS
2009-01-30 18:04 . 1996-01-09 10:38 283,648 --a
c:\windows\uninst.exe
2009-01-30 18:04 . 1995-08-22 12:19 20,992 --a
c:\windows\system32\POSTAL32.DLL
2009-01-30 18:01 . 2009-01-30 18:01 <DIR> d
c:\program files\Safari
2009-01-30 18:00 . 2009-01-30 18:00 <DIR> d
c:\program files\QuickTime
2009-01-30 18:00 . 2009-01-30 18:00 <DIR> d
c:\program files\Common Files\Apple
2009-01-30 18:00 . 2009-01-30 18:00 <DIR> d
c:\documents and settings\All Users\Application Data\Apple Computer
2009-01-30 17:47 . 2009-01-30 17:47 <DIR> d
c:\program files\Opera
2009-01-30 16:53 . 2009-01-30 17:17 <DIR> d
c:\program files\Google
2009-01-30 16:46 . 2009-01-30 16:48 <DIR> d
c:\program files\Common Files\Macromedia
2009-01-30 16:45 . 2009-01-30 16:48 <DIR> d
c:\program files\Macromedia
2009-01-30 16:42 . 2009-01-30 16:42 <DIR> d
c:\documents and settings\All Users\Application Data\FLEXnet
2009-01-30 16:39 . 2009-01-30 18:21 <DIR> d
c:\program files\Bonjour
2009-01-30 16:34 . 2009-01-30 16:34 <DIR> d
c:\program files\Common Files\Macrovision Shared
2009-01-30 16:33 . 2009-01-30 16:39 <DIR> d
c:\program files\Common Files\Adobe
2009-01-30 16:17 . 2009-02-02 23:41 <DIR> d
c:\program files\BGwin
2009-01-30 15:46 . 2009-01-31 17:10 <DIR> d
c:\program files\PokerStars
2009-01-30 15:31 . 2009-01-30 15:43 <DIR> d
C:\Poker
2009-01-30 15:11 . 2009-01-31 00:32 <DIR> d--h
c:\windows\$hf_mig$
2009-01-30 15:09 . 2009-01-30 15:09 <DIR> d
c:\windows\system32\XPSViewer
2009-01-30 15:09 . 2009-01-30 15:09 <DIR> d
c:\program files\Reference Assemblies
2009-01-30 15:09 . 2009-01-30 15:09 <DIR> d
c:\program files\MSBuild
2009-01-30 15:09 . 2007-11-30 11:18 26,488 --a
c:\windows\system32\spupdsvc.exe
2009-01-30 15:08 . 2009-01-30 15:09 <DIR> d
C:\85407a7e4c0f8434ff180b11948a
2009-01-30 15:08 . 2008-07-06 12:06 1,676,288
c:\windows\system32\xpssvcs.dll
2009-01-30 15:08 . 2008-07-06 12:06 1,676,288
c--- c:\windows\system32\dllcache\xpssvcs.dll
2009-01-30 15:08 . 2008-07-06 10:50 597,504
c--- c:\windows\system32\dllcache\printfilterpipelinesvc.exe
2009-01-30 15:08 . 2008-07-06 12:06 575,488
c:\windows\system32\xpsshhdr.dll
2009-01-30 15:08 . 2008-07-06 12:06 575,488
c--- c:\windows\system32\dllcache\xpsshhdr.dll
2009-01-30 15:08 . 2008-07-06 12:06 117,760
c:\windows\system32\prntvpt.dll
2009-01-30 15:08 . 2008-07-06 12:06 89,088
c--- c:\windows\system32\dllcache\filterpipelineprintproc.dll
2009-01-30 14:46 . 2009-02-03 16:00 4 --a
c:\windows\system32\gaopdxcounter
2009-01-30 13:49 . 2008-04-14 00:16 10,880 --a
c:\windows\system32\drivers\NdisIP.sys
2009-01-30 13:49 . 2008-04-14 00:16 10,880 --a--c--- c:\windows\system32\dllcache\ndisip.sys
2009-01-30 13:49 . 2008-04-14 00:09 5,504 --a
c:\windows\system32\drivers\MSTEE.sys
2009-01-30 13:49 . 2008-04-14 00:09 5,504 --a--c--- c:\windows\system32\dllcache\mstee.sys
2009-01-30 13:44 . 2009-01-30 13:45 <DIR> d--h
c:\windows\msdownld.tmp
2009-01-30 13:44 . 2009-01-30 13:44 <DIR> d
c:\program files\Windows Media Components
2009-01-30 13:43 . 2002-07-03 11:44 53,248 --a
c:\windows\amcap.exe
2009-01-30 13:40 . 2008-04-14 00:15 60,032 --a
c:\windows\system32\drivers\USBAUDIO.sys
2009-01-30 13:40 . 2008-04-14 00:15 60,032 --a--c--- c:\windows\system32\dllcache\usbaudio.sys
2009-01-30 13:39 . 2008-04-14 00:15 32,128 --a
c:\windows\system32\drivers\usbccgp.sys
2009-01-30 13:39 . 2008-04-14 00:15 32,128 --a--c--- c:\windows\system32\dllcache\usbccgp.sys
2009-01-30 13:28 . 2009-02-03 16:01 <DIR> d
c:\documents and settings\Richie\Application Data\skypePM
2009-01-30 13:28 . 2009-01-30 13:28 56 --ah
c:\windows\system32\ezsidmv.dat
2009-01-30 13:26 . 2009-01-30 13:26 <DIR> d
c:\program files\Skype
2009-01-30 13:26 . 2009-01-30 13:26 <DIR> d
c:\program files\Common Files\Skype
2009-01-30 13:26 . 2009-02-03 17:20 <DIR> d
c:\documents and settings\Richie\Application Data\Skype
2009-01-30 13:26 . 2009-01-30 13:26 <DIR> d
c:\documents and settings\All Users\Application Data\Skype
2009-01-30 02:04 . 2009-01-30 02:31 <DIR> d
c:\documents and settings\Richie\Application Data\vlc
2009-01-30 02:02 . 2009-01-30 02:02 <DIR> d
c:\program files\VideoLAN
2009-01-30 00:07 . 2009-01-30 00:09 <DIR> d
c:\windows\ShellNew
2009-01-29 23:45 . 2009-01-29 23:45 <DIR> d
c:\documents and settings\Richie\Application Data\Softarium.com
2009-01-29 23:41 . 2009-01-30 19:37 <DIR> d
c:\program files\BitLord
2009-01-29 23:37 . 2009-01-29 23:37 <DIR> d
c:\program files\Notepad++
2009-01-29 23:37 . 2009-01-29 23:43 <DIR> d
c:\documents and settings\Richie\Application Data\Notepad++
2009-01-29 22:46 . 2009-02-03 14:32 <DIR> d
c:\program files\Full Tilt Poker
2009-01-29 22:01 . 2001-08-17 13:48 12,160 --a
c:\windows\system32\drivers\mouhid.sys
2009-01-29 22:01 . 2001-08-17 13:48 12,160 --a--c--- c:\windows\system32\dllcache\mouhid.sys
2009-01-29 22:01 . 2008-04-14 00:15 10,368 --a
c:\windows\system32\drivers\hidusb.sys
2009-01-29 19:52 . 2009-01-29 22:51 <DIR> d
C:\PMAIL
2009-01-29 19:32 . 2009-02-02 12:01 <DIR> d
c:\windows\system32\drivers\Avg
2009-01-29 19:32 . 2009-01-29 19:32 <DIR> d
c:\program files\AVG
2009-01-29 19:32 . 2009-01-31 12:00 <DIR> d
c:\documents and settings\All Users\Application Data\avg8
2009-01-29 19:32 . 2009-01-29 19:32 97,928 --a
c:\windows\system32\drivers\avgldx86.sys
2009-01-29 19:32 . 2009-01-29 19:32 76,040 --a
c:\windows\system32\drivers\avgtdix.sys
2009-01-29 19:32 . 2009-01-29 19:32 10,520 --a
c:\windows\system32\avgrsstx.dll
2009-01-29 19:22 . 2009-01-31 17:38 <DIR> d
c:\program files\SUPERAntiSpyware
2009-01-29 19:22 . 2009-01-29 19:22 <DIR> d
c:\documents and settings\Richie\Application Data\SUPERAntiSpyware.com
2009-01-29 19:22 . 2009-01-29 19:22 <DIR> d
c:\documents and settings\All Users\Application Data\SUPERAntiSpyware.com
2009-01-29 19:21 . 2009-01-29 19:21 <DIR> d
c:\program files\Common Files\Wise Installation Wizard
2009-01-29 19:20 . 2009-01-29 19:20 249,592 --a
c:\windows\system32\cssdll32.dll
2009-01-29 19:19 . 2009-01-31 15:45 <DIR> d
c:\program files\COMODO
2009-01-29 19:19 . 2009-01-31 15:43 <DIR> d
c:\documents and settings\All Users\Application Data\comodo
2009-01-29 19:16 . 2009-01-30 16:53 <DIR> d
C:\home
2009-01-29 19:16 . 2009-02-03 17:22 <DIR> d
C:\downloads
2009-01-29 19:09 . 2009-01-29 19:09 0 --a
c:\windows\nsreg.dat
2009-01-29 19:03 . 2009-01-29 19:03 0 --a
c:\windows\WinPM.INI
2009-01-29 19:01 . 2004-04-29 12:06 3,592,192 --a
c:\windows\system32\qt-mt323.dll
2009-01-29 19:01 . 2003-10-07 18:08 6,656 --a
c:\windows\system32\WnASPI32.dll
2009-01-29 19:00 . 2009-01-29 19:00 <DIR> d
c:\program files\7tools
.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2009-02-03 11:56
d--h--w c:\program files\InstallShield Installation Information
2009-01-29 18:52
d
w c:\program files\Common Files\InstallShield
2009-01-29 18:49
d
w c:\program files\ATI Technologies
2009-01-29 18:43
d
w c:\program files\Dell
2009-01-29 18:39
d
w c:\windows\system32\config\systemprofile\Application Data\Intel
2009-01-29 18:39
d
w c:\documents and settings\Richie\Application Data\Intel
2009-01-29 18:39
d
w c:\documents and settings\NetworkService\Application Data\Intel
2009-01-29 18:39
d
w c:\documents and settings\LocalService\Application Data\Intel
2009-01-29 18:39
d
w c:\documents and settings\Administrator\Application Data\Intel
2009-01-29 18:38
d
w c:\program files\Intel
2009-01-29 18:38
d
w c:\program files\Common Files\Intel
2009-01-29 18:38
d
w c:\documents and settings\All Users\Application Data\Intel
2009-01-29 18:33
d
w c:\program files\CONEXANT
2009-01-29 18:33
d
w c:\program files\Broadcom
2009-01-29 18:31
d
w c:\program files\Apoint
2009-01-29 18:30
d
w c:\program files\SigmaTel
2009-01-29 17:36
d
w c:\program files\microsoft frontpage
.
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"Skype"="c:\program files\Skype\Phone\Skype.exe" [2008-11-18 21633320]
"Google Update"="c:\documents and settings\Richie\Local Settings\Application Data\Google\Update\GoogleUpdate.exe" [2009-01-30 133104]
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"Apoint"="c:\program files\Apoint\Apoint.exe" [2005-10-07 176128]
"IntelZeroConfig"="c:\program files\Intel\WiFi\bin\ZCfgSvc.exe" [2008-10-16 1368064]
"IntelWireless"="c:\program files\Common Files\Intel\WirelessCommon\iFrmewrk.exe" [2008-10-16 1191936]
"ATIPTA"="c:\program files\ATI Technologies\ATI Control Panel\atiptaxx.exe" [2005-08-05 344064]
"AVG8_TRAY"="c:\progra~1\AVG\AVG8\avgtray.exe" [2009-01-29 1261336]
"QuickTime Task"="c:\program files\QuickTime\QTTask.exe" [2008-09-06 413696]
"ZoneAlarm Client"="c:\program files\Zone Labs\ZoneAlarm\zlclient.exe" [2008-11-13 981904]
"Ad-Watch"="c:\program files\Lavasoft\Ad-Aware\AAWTray.exe" [2009-01-18 506712]
[hkey_local_machine\software\microsoft\windows\currentversion\explorer\ShellExecuteHooks]
"{5AE067D3-9AFB-48E0-853A-EBB7F4A000DA}"= "c:\program files\SUPERAntiSpyware\SASSEH.DLL" [2008-05-13 77824]
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\!SASWinLogon]
2008-12-22 11:05 356352 c:\program files\SUPERAntiSpyware\SASWINLO.dll
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\windows]
"AppInit_DLLs"=avgrsstx.dll
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\Lavasoft Ad-Aware Service]
@="Service"
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\services]
"Bonjour Service"=2 (0x2)
[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\ZoneLabsFirewall]
"DisableMonitoring"=dword:00000001
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]
"EnableFirewall"= 0 (0x0)
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"%windir%\\system32\\sessmgr.exe"=
"c:\\Program Files\\AVG\\AVG8\\avgemc.exe"=
"c:\\Program Files\\AVG\\AVG8\\avgupd.exe"=
"c:\\Program Files\\Bonjour\\mDNSResponder.exe"=
"c:\\Program Files\\BitLord\\BitLord.exe"=
"c:\\Program Files\\Skype\\Phone\\Skype.exe"=
R0 Lbd;Lbd;c:\windows\system32\drivers\Lbd.sys [2009-02-03 64160]
R1 AvgLdx86;AVG Free AVI Loader Driver x86;c:\windows\system32\drivers\avgldx86.sys [2009-01-29 97928]
R1 SASDIFSV;SASDIFSV;c:\program files\SUPERAntiSpyware\sasdifsv.sys [2009-01-15 8944]
R1 SASKUTIL;SASKUTIL;c:\program files\SUPERAntiSpyware\SASKUTIL.SYS [2009-01-15 55024]
R2 avg8emc;AVG Free8 E-mail Scanner;c:\progra~1\AVG\AVG8\avgemc.exe [2009-01-29 875288]
R2 avg8wd;AVG Free8 WatchDog;c:\progra~1\AVG\AVG8\avgwdsvc.exe [2009-01-29 231704]
R2 AvgTdiX;AVG Free8 Network Redirector;c:\windows\system32\drivers\avgtdix.sys [2009-01-29 76040]
R2 Lavasoft Ad-Aware Service;Lavasoft Ad-Aware Service;c:\program files\Lavasoft\Ad-Aware\AAWService.exe [2009-01-18 921936]
S0 cerc6;cerc6; [x]
S3 SASENUM;SASENUM;c:\program files\SUPERAntiSpyware\SASENUM.SYS [2009-01-15 7408]
[HKEY_CURRENT_USER\software\microsoft\windows\currentversion\explorer\mountpoints2\{ae3f74f8-eec6-11dd-98dd-00123feb219d}]
\Shell\AutoRun\command - f:\autorun\Install.exe
.
Contents of the 'Scheduled Tasks' folder
2009-02-03 c:\windows\Tasks\Ad-Aware Update (Weekly).job
- c:\program files\Lavasoft\Ad-Aware\Ad-AwareAdmin.exe [2009-01-18 21:34]
2009-02-03 c:\windows\Tasks\GoogleUpdateTaskUserS-1-5-21-1844237615-1757981266-1606980848-1003.job
- c:\documents and settings\Richie\Local Settings\Application Data\Google\Update\GoogleUpdate.exe [2009-01-30 17:28]
2009-01-30 c:\windows\Tasks\Microsoft_Hardware_Launch_IType_exe.job
- c:\program files\Microsoft IntelliType Pro\itype.exe []
.
- - - - ORPHANS REMOVED - - - -
WebBrowser-{3041D03E-FD4B-44E0-B742-2D9B88305F98} - c:\program files\AskBarDis\bar\bin\askBar.dll
HKCU-Run-KeyMapperStarup - c:\downloads\KeyRemapper.exe
.
Supplementary Scan
.
uInternet Settings,ProxyOverride = *.local
TCP: {34565F01-7FE0-4732-B699-11A3831F20AB} = 208.67.222.222,208.67.220.220
FF - ProfilePath - c:\documents and settings\Richie\Application Data\Mozilla\Firefox\Profiles\qxbx6g1v.default\
FF - prefs.js: browser.search.selectedEngine - Google
FF - prefs.js: browser.startup.homepage - about:blank
FF - prefs.js: network.proxy.ftp - 192.168.1.1
FF - prefs.js: network.proxy.gopher - 192.168.1.1
FF - prefs.js: network.proxy.http - 192.168.1.1
FF - prefs.js: network.proxy.ssl - 192.168.1.1
FF - prefs.js: network.proxy.type - 1
FF - component: c:\documents and settings\Richie\Application Data\Mozilla\Firefox\Profiles\qxbx6g1v.default\extensions\{3b56bcc7-54e5-44a2-9b44-66c3ef58c13e}\components\nstidy.dll
FF - component: c:\documents and settings\Richie\Application Data\Mozilla\Firefox\Profiles\qxbx6g1v.default\extensions\{6AC85730-7D0F-4de0-B3FA-21142DD85326}\platform\WINNT\components\ColorZilla.dll
FF - component: c:\documents and settings\Richie\Application Data\Mozilla\Firefox\Profiles\qxbx6g1v.default\extensions\{88836b34-ff60-42d0-a684-e58683fcc4b9}\components\FFAlert.dll
FF - component: c:\program files\AVG\AVG8\Firefox\components\avgssff.dll
FF - component: c:\program files\Mozilla Firefox\extensions\{B13721C7-F507-4982-B2E5-502A71474FED}\components\NPComponent.dll
FF - plugin: c:\documents and settings\Richie\Local Settings\Application Data\Google\Update\1.2.133.37\npGoogleOneClick7.dll
.
**************************************************************************
catchme 0.3.1367 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2009-02-03 17:39:40
Windows 5.1.2600 Service Pack 3 NTFS
scanning hidden processes ...
scanning hidden autostart entries ...
scanning hidden files ...
scan completed successfully
hidden files: 0
**************************************************************************
.
DLLs Loaded Under Running Processes
- - - - - - - > 'winlogon.exe'(892)
c:\program files\SUPERAntiSpyware\SASWINLO.dll
c:\windows\system32\Ati2evxx.dll
c:\windows\system32\COMRes.dll
.
Completion time: 2009-02-03 17:41:08
ComboFix-quarantined-files.txt 2009-02-03 17:41:04
Pre-Run: 114,349,113,344 bytes free
Post-Run: 114,335,076,352 bytes free
WindowsXP-KB310994-SP2-Pro-BootDisk-ENU.exe
[boot loader]
timeout=2
default=multi(0)disk(0)rdisk(0)partition(1)\WINDOWS
[operating systems]
c:\cmdcons\BOOTSECT.DAT="Microsoft Windows Recovery Console" /cmdcons
multi(0)disk(0)rdisk(0)partition(1)\WINDOWS="Microsoft Windows XP Professional" /noexecute=optin /fastdetect
256 --- E O F --- 2009-01-31 00:32:49
HijackThis log:
Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 18:05:11, on 2/3/2009
Platform: Windows XP SP3 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP3 (6.00.2900.5512)
Boot mode: Normal
Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Intel\WiFi\bin\S24EvMon.exe
C:\WINDOWS\system32\ZoneLabs\vsmon.exe
C:\Program Files\Lavasoft\Ad-Aware\AAWService.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\PROGRA~1\AVG\AVG8\avgwdsvc.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\Intel\WiFi\bin\EvtEng.exe
C:\Program Files\Common Files\Intel\WirelessCommon\RegSrvc.exe
C:\WINDOWS\system32\svchost.exe
C:\Program Files\Apoint\Apoint.exe
C:\Program Files\Intel\WiFi\bin\ZCfgSvc.exe
C:\Program Files\Common Files\Intel\WirelessCommon\iFrmewrk.exe
C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe
C:\PROGRA~1\AVG\AVG8\avgtray.exe
C:\Program Files\Zone Labs\ZoneAlarm\zlclient.exe
C:\Program Files\Lavasoft\Ad-Aware\AAWTray.exe
C:\Documents and Settings\Richie\Local Settings\Application Data\Google\Update\GoogleUpdate.exe
C:\Program Files\Apoint\HidFind.exe
C:\Program Files\Apoint\Apntex.exe
C:\PROGRA~1\AVG\AVG8\avgrsx.exe
C:\PROGRA~1\AVG\AVG8\avgemc.exe
C:\PROGRA~1\AVG\AVG8\avgnsx.exe
C:\WINDOWS\system32\wbem\unsecapp.exe
C:\Program Files\AVG\AVG8\avgcsrvx.exe
C:\Program Files\AVG\AVG8\avgcsrvx.exe
C:\WINDOWS\system32\wuauclt.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\wuauclt.exe
C:\Program Files\Mozilla Firefox\firefox.exe
C:\Program Files\Trend Micro\HijackThis\HijackThis.exe
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = *.local
O2 - BHO: WormRadar.com IESiteBlocker.NavFilter - {3CA2F312-6F6E-4B53-A66E-4E65E497C8C0} - C:\Program Files\AVG\AVG8\avgssie.dll
O4 - HKLM\..\Run: [Apoint] C:\Program Files\Apoint\Apoint.exe
O4 - HKLM\..\Run: [IntelZeroConfig] "C:\Program Files\Intel\WiFi\bin\ZCfgSvc.exe"
O4 - HKLM\..\Run: [IntelWireless] "C:\Program Files\Common Files\Intel\WirelessCommon\iFrmewrk.exe" /tf Intel Wireless Tray
O4 - HKLM\..\Run: [ATIPTA] "C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe"
O4 - HKLM\..\Run: [AVG8_TRAY] C:\PROGRA~1\AVG\AVG8\avgtray.exe
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\QTTask.exe" -atboottime
O4 - HKLM\..\Run: [ZoneAlarm Client] "C:\Program Files\Zone Labs\ZoneAlarm\zlclient.exe"
O4 - HKLM\..\Run: [Ad-Watch] C:\Program Files\Lavasoft\Ad-Aware\AAWTray.exe
O4 - HKCU\..\Run: [Skype] "C:\Program Files\Skype\Phone\Skype.exe" /nosplash /minimized
O4 - HKCU\..\Run: [Google Update] "C:\Documents and Settings\Richie\Local Settings\Application Data\Google\Update\GoogleUpdate.exe" /c
O9 - Extra button: PokerStars - {3AD14F0C-ED16-4e43-B6D8-661B03F6A1EF} - C:\Program Files\PokerStars\PokerStarsUpdate.exe
O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O16 - DPF: {01A88BB1-1174-41EC-ACCB-963509EAE56B} (SysProWmi Class) - http://support.euro.dell.com/systemprofiler/SysPro.CAB
O17 - HKLM\System\CCS\Services\Tcpip\..\{34565F01-7FE0-4732-B699-11A3831F20AB}: NameServer = 208.67.222.222,208.67.220.220
O18 - Protocol: linkscanner - {F274614C-63F8-47D5-A4D1-FBDDE494F8D1} - C:\Program Files\AVG\AVG8\avgpp.dll
O18 - Protocol: skype4com - {FFC8B962-9B40-4DFF-9458-1830C7DD7F5D} - C:\PROGRA~1\COMMON~1\Skype\SKYPE4~1.DLL
O20 - Winlogon Notify: !SASWinLogon - C:\Program Files\SUPERAntiSpyware\SASWINLO.dll
O20 - Winlogon Notify: avgrsstarter - C:\WINDOWS\SYSTEM32\avgrsstx.dll
O23 - Service: Ati HotKey Poller - ATI Technologies Inc. - C:\WINDOWS\system32\Ati2evxx.exe
O23 - Service: AVG Free8 E-mail Scanner (avg8emc) - AVG Technologies CZ, s.r.o. - C:\PROGRA~1\AVG\AVG8\avgemc.exe
O23 - Service: AVG Free8 WatchDog (avg8wd) - AVG Technologies CZ, s.r.o. - C:\PROGRA~1\AVG\AVG8\avgwdsvc.exe
O23 - Service: Intel® PROSet/Wireless Event Log (EvtEng) - Intel(R) Corporation - C:\Program Files\Intel\WiFi\bin\EvtEng.exe
O23 - Service: FLEXnet Licensing Service - Macrovision Europe Ltd. - C:\Program Files\Common Files\Macrovision Shared\FLEXnet Publisher\FNPLicensingService.exe
O23 - Service: Lavasoft Ad-Aware Service - Lavasoft - C:\Program Files\Lavasoft\Ad-Aware\AAWService.exe
O23 - Service: Intel® PROSet/Wireless Registry Service (RegSrvc) - Intel(R) Corporation - C:\Program Files\Common Files\Intel\WirelessCommon\RegSrvc.exe
O23 - Service: Intel® PROSet/Wireless WiFi Service (S24EventMonitor) - Intel(R) Corporation - C:\Program Files\Intel\WiFi\bin\S24EvMon.exe
O23 - Service: TrueVector Internet Monitor (vsmon) - Check Point Software Technologies LTD - C:\WINDOWS\system32\ZoneLabs\vsmon.exe
--
End of file - 5681 bytes0 -
hello
Please download OTMoveIt3 by OldTimer- Save it to your desktop.
- Please double-click OTMoveIt3.exe to run it. (Note: If you are running on Vista, right-click on the file and choose Run As Administrator).
- Copy the lines in the codebox below to the clipboard by highlighting ALL of them and pressing CTRL + C (or, after highlighting, right-click and choose Copy):
:Processes explorer.exe :Services cerc6 :Reg [-HKEY_CURRENT_USER\software\microsoft\windows\currentversion\explorer\mountpoints2\{ae3f74f8-eec6-11dd-98dd-00123feb219d}] :Files c:\windows\choice.exe c:\windows\system32\gaopdxcounter :Commands [purity] [emptytemp] [start explorer] [Reboot]
- Return to OTMoveIt3, right click in the "Paste Instructions for Items to be Moved" window (under the yellow bar) and choose Paste.
- Click the red Moveit! button.
- Copy everything in the Results window (under the green bar) to the clipboard by highlighting ALL of them and pressing CTRL + C (or, after highlighting, right-click and choose copy), and paste it in your next reply.
- Close OTMoveIt3
0 -
========== PROCESSES ==========
Process explorer.exe killed successfully.
========== SERVICES/DRIVERS ==========
Service cerc6 stopped successfully.
Service cerc6 deleted successfully.
========== REGISTRY ==========
Registry key HKEY_CURRENT_USER\software\microsoft\windows\currentversion\explorer\mountpoints2\{ae3f74f8-eec6-11dd-98dd-00123feb219d}\\ deleted successfully.
========== FILES ==========
c:\windows\choice.exe moved successfully.
File/Folder c:\windows\system32\gaopdxcounter not found.
========== COMMANDS ==========
File delete failed. C:\DOCUME~1\Richie\LOCALS~1\Temp\etilqs_FIJLEcHxIJ4cqlSQPPeZ scheduled to be deleted on reboot.
File delete failed. C:\DOCUME~1\Richie\LOCALS~1\Temp\~DF1BDE.tmp scheduled to be deleted on reboot.
File delete failed. C:\DOCUME~1\Richie\LOCALS~1\Temp\~DF389E.tmp scheduled to be deleted on reboot.
User's Temp folder emptied.
User's Temporary Internet Files folder emptied.
User's Internet Explorer cache folder emptied.
File delete failed. C:\Documents and Settings\LocalService\Local Settings\Temp\Temporary Internet Files\Content.IE5\index.dat scheduled to be deleted on reboot.
File delete failed. C:\Documents and Settings\LocalService\Local Settings\Temp\History\History.IE5\index.dat scheduled to be deleted on reboot.
File delete failed. C:\Documents and Settings\LocalService\Local Settings\Temp\Cookies\index.dat scheduled to be deleted on reboot.
Local Service Temp folder emptied.
File delete failed. C:\Documents and Settings\LocalService\Local Settings\Temporary Internet Files\Content.IE5\index.dat scheduled to be deleted on reboot.
Local Service Temporary Internet Files folder emptied.
File delete failed. C:\WINDOWS\temp\ZLT06254.TMP scheduled to be deleted on reboot.
Windows Temp folder emptied.
File delete failed. C:\Documents and Settings\Richie\Local Settings\Application Data\Mozilla\Firefox\Profiles\qxbx6g1v.default\Cache\_CACHE_001_ scheduled to be deleted on reboot.
File delete failed. C:\Documents and Settings\Richie\Local Settings\Application Data\Mozilla\Firefox\Profiles\qxbx6g1v.default\Cache\_CACHE_002_ scheduled to be deleted on reboot.
File delete failed. C:\Documents and Settings\Richie\Local Settings\Application Data\Mozilla\Firefox\Profiles\qxbx6g1v.default\Cache\_CACHE_003_ scheduled to be deleted on reboot.
File delete failed. C:\Documents and Settings\Richie\Local Settings\Application Data\Mozilla\Firefox\Profiles\qxbx6g1v.default\Cache\_CACHE_MAP_ scheduled to be deleted on reboot.
File delete failed. C:\Documents and Settings\Richie\Local Settings\Application Data\Mozilla\Firefox\Profiles\qxbx6g1v.default\urlclassifier3.sqlite scheduled to be deleted on reboot.
File delete failed. C:\Documents and Settings\Richie\Local Settings\Application Data\Mozilla\Firefox\Profiles\qxbx6g1v.default\XUL.mfl scheduled to be deleted on reboot.
FireFox cache emptied.
Opera cache emptied.
Temp folders emptied.
Explorer started successfully
OTMoveIt3 by OldTimer - Version 1.0.8.0 log created on 02042009_131051
Files moved on Reboot...
File C:\DOCUME~1\Richie\LOCALS~1\Temp\etilqs_FIJLEcHxIJ4cqlSQPPeZ not found!
C:\DOCUME~1\Richie\LOCALS~1\Temp\~DF1BDE.tmp moved successfully.
C:\DOCUME~1\Richie\LOCALS~1\Temp\~DF389E.tmp moved successfully.
File move failed. C:\Documents and Settings\LocalService\Local Settings\Temp\Temporary Internet Files\Content.IE5\index.dat scheduled to be moved on reboot.
File move failed. C:\Documents and Settings\LocalService\Local Settings\Temp\History\History.IE5\index.dat scheduled to be moved on reboot.
File move failed. C:\Documents and Settings\LocalService\Local Settings\Temp\Cookies\index.dat scheduled to be moved on reboot.
File move failed. C:\Documents and Settings\LocalService\Local Settings\Temporary Internet Files\Content.IE5\index.dat scheduled to be moved on reboot.
File C:\WINDOWS\temp\ZLT06254.TMP not found!
C:\Documents and Settings\Richie\Local Settings\Application Data\Mozilla\Firefox\Profiles\qxbx6g1v.default\Cache\_CACHE_001_ moved successfully.
C:\Documents and Settings\Richie\Local Settings\Application Data\Mozilla\Firefox\Profiles\qxbx6g1v.default\Cache\_CACHE_002_ moved successfully.
C:\Documents and Settings\Richie\Local Settings\Application Data\Mozilla\Firefox\Profiles\qxbx6g1v.default\Cache\_CACHE_003_ moved successfully.
C:\Documents and Settings\Richie\Local Settings\Application Data\Mozilla\Firefox\Profiles\qxbx6g1v.default\Cache\_CACHE_MAP_ moved successfully.
C:\Documents and Settings\Richie\Local Settings\Application Data\Mozilla\Firefox\Profiles\qxbx6g1v.default\urlclassifier3.sqlite moved successfully.
C:\Documents and Settings\Richie\Local Settings\Application Data\Mozilla\Firefox\Profiles\qxbx6g1v.default\XUL.mfl moved successfully.0 -
hello
Please download ATF Cleaner by Atribune.-
Double-click
Under Main choose: Select All
Click the Empty Selected button.
If you use Firefox browser-
Click
Click the Empty Selected button.
NOTE: If you would like to keep your saved passwords, please click No at the prompt.
If you use Opera browser-
Click
Click the Empty Selected button.
NOTE: If you would like to keep your saved passwords, please click No at the prompt.
Click Exit on the Main menu to close the program.
Please download Malwarebytes' Anti-Malware from Here or Here
Double Click mbam-setup.exe to install the application.- Make sure a checkmark is placed next to Update Malwarebytes' Anti-Malware and Launch Malwarebytes' Anti-Malware, then click Finish.
- If an update is found, it will download and install the latest version.
- Once the program has loaded, select "Perform Quick Scan", then click Scan.
- The scan may take some time to finish,so please be patient.
- When the scan is complete, click OK, then Show Results to view the results.
- Make sure that everything is checked, and click Remove Selected.
- When disinfection is completed, a log will open in Notepad and you may be prompted to Restart.(See Extra Note)
- The log is automatically saved by MBAM and can be viewed by clicking the Logs tab in MBAM.
- Copy&Paste the entire report in your next reply.
If MBAM encounters a file that is difficult to remove,you will be presented with 1 of 2 prompts,click OK to either and let MBAM proceed with the disinfection process,if asked to restart the computer,please do so immediatly.
Go to Kaspersky website and perform an online antivirus scan.- Read through the requirements and privacy statement and click on Accept button.
- It will start downloading and installing the scanner and virus definitions. You will be prompted to install an application from Kaspersky. Click Run.
- When the downloads have finished, click on Settings.
- Make sure these boxes are checked (ticked). If they are not, please tick them and click on the Save button:
Archives
Mail databases
[*]Once the scan is complete, it will display the results. Click on View Scan Report.
[*]You will see a list of infected items there. Click on Save Report As....
[*]Save this report to a convenient place. Change the Files of type to Text file (.txt) before clicking on the Save button. Then post it here.0 -
Advertisement
-
Hi
Malwarebytes' Anti-Malware 1.33
Database version: 1728
Windows 5.1.2600 Service Pack 3
2/4/2009 19:30:53
mbam-log-2009-02-04 (19-30-53).txt
Scan type: Quick Scan
Objects scanned: 49147
Time elapsed: 3 minute(s), 55 second(s)
Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 0
Memory Processes Infected:
(No malicious items detected)
Memory Modules Infected:
(No malicious items detected)
Registry Keys Infected:
(No malicious items detected)
Registry Values Infected:
(No malicious items detected)
Registry Data Items Infected:
(No malicious items detected)
Folders Infected:
(No malicious items detected)
Files Infected:
(No malicious items detected)
Kaspersky
KASPERSKY ONLINE SCANNER 7 REPORT
Thursday, February 5, 2009
Operating System: Microsoft Windows XP Professional Service Pack 3 (build 2600)
Kaspersky Online Scanner 7 version: 7.0.25.0
Program database last update: Thursday, February 05, 2009 11:14:40
Records in database: 1754610
Scan settings:
Scan using the following database: extended
Scan archives: yes
Scan mail databases: yes
Scan area - My Computer:
C:\
\
E:\
F:\
Scan statistics:
Files scanned: 112504
Threat name: 47
Infected objects: 62
Suspicious objects: 15
Duration of the scan: 05:02:50
File name / Threat name / Threats count
C:\home\work\business\biz-docs\proposals and contracts\Proposal Kit Pro-v7.0.exe Infected: Trojan.Win32.Pakes.cgn 1
C:\home\work\business\biz-docs\proposals and contracts\Proposal_Kit_10.0_Pro.zip Infected: Trojan.Win32.Pakes.cgn 1
F:\backup\MAIL\ADMIN\FOL045E1.PMM Infected: Exploit.PHP.Small.c 1
F:\backup\MAIL\ADMIN\FOL045E1.PMM Infected: Exploit.Perl.Slsnif.a 1
F:\backup\MAIL\ADMIN\FOL045E1.PMM Infected: Trojan-Clicker.HTML.IFrame.e 1
F:\backup\MAIL\ADMIN\FOL045E1.PMM Infected: Exploit.JS.CVE-2006-1359.a 1
F:\backup\MAIL\ADMIN\FOL045E1.PMM Infected: Exploit.Perl.VWar.a 1
F:\backup\MAIL\ADMIN\FOL045E1.PMM Infected: HackTool.Win32.Defacer.a 1
F:\backup\MAIL\ADMIN\FOL045E1.PMM Infected: Backdoor.PHP.WebShell.l 1
F:\backup\MAIL\ADMIN\FOL045E1.PMM Infected: Constructor.Perl.Machd.a 1
F:\backup\MAIL\ADMIN\FOL045E1.PMM Infected: Exploit.HTML.CVE2006-4777.a 1
F:\backup\MAIL\ADMIN\FOL045E1.PMM Infected: Worm.OSX.Niqtana.a 1
F:\downloads\old_HD\PMAIL\MAIL\220CE882.PM$ Suspicious: Exploit.HTML.Iframe.FileDownload 1
F:\downloads\old_HD\PMAIL\MAIL\3245D4DE.PM$ Suspicious: Exploit.HTML.Iframe.FileDownload 1
F:\downloads\old_HD\PMAIL\MAIL\379AA832.PM$ Suspicious: Exploit.HTML.Iframe.FileDownload 1
F:\downloads\old_HD\PMAIL\MAIL\4F771E78.PM$ Suspicious: Exploit.HTML.Iframe.FileDownload 1
F:\downloads\old_HD\PMAIL\MAIL\65252E5.PM$ Suspicious: Exploit.HTML.Iframe.FileDownload 1
F:\downloads\old_HD\PMAIL\MAIL\73A15179.PM$ Suspicious: Exploit.HTML.Iframe.FileDownload 1
F:\downloads\old_HD\PMAIL\MAIL\783CFA7C.PM$ Suspicious: Exploit.HTML.Iframe.FileDownload 1
F:\downloads\old_HD\PMAIL\MAIL\FOL06B63.PMM Infected: Net-Worm.Win32.Mytob.bf 2
F:\downloads\old_HD\PMAIL\MAIL\UNX01465.MBX Infected: Email-Worm.Win32.Sobig.e 1
F:\downloads\old_HD\PMAIL\MAIL\UNX01465.MBX Infected: Email-Worm.Win32.Tanatos.b 1
F:\downloads\old_HD\PMAIL\MAIL\UNX04150.MBX Infected: Email-Worm.Win32.Bagle.at 1
F:\downloads\old_HD\PMAIL\MAIL\UNX05354.MBX Infected: Email-Worm.Win32.Bagle.gen 1
F:\downloads\old_HD\PMAIL\MAIL\UNX05354.MBX Infected: Email-Worm.Win32.Bagle.z 1
F:\downloads\old_HD\PMAIL\MAIL\UNX05FC5.MBX Suspicious: Trojan-Downloader.JS.gen 2
F:\downloads\old_HD\PMAIL\MAIL\UNX05FC5.MBX Infected: Exploit.HTML.IframeBof 2
F:\downloads\old_HD\PMAIL\MAIL\UNX05FC5.MBX Infected: Net-Worm.Perl.Santy.b 1
F:\downloads\old_HD\PMAIL\MAIL\UNX05FC5.MBX Infected: Net-Worm.Perl.Spyki.c 1
F:\downloads\old_HD\PMAIL\MAIL\UNX05FC5.MBX Infected: Backdoor.Perl.Shellbot.a 2
F:\downloads\old_HD\PMAIL\MAIL\UNX05FC5.MBX Infected: Net-Worm.Perl.Spyki.b 1
F:\downloads\old_HD\PMAIL\MAIL\UNX05FC5.MBX Infected: Net-Worm.Perl.Spyki.a 1
F:\downloads\old_HD\PMAIL\MAIL\UNX05FC5.MBX Infected: Exploit.HTML.Mht 1
F:\downloads\old_HD\PMAIL\MAIL\UNX05FC5.MBX Infected: Trojan.Java.ClassLoader.h 1
F:\downloads\old_HD\PMAIL\MAIL\UNX05FC5.MBX Infected: Trojan-Downloader.Java.OpenStream.c 1
F:\downloads\old_HD\PMAIL\MAIL\UNX05FC5.MBX Infected: Trojan.Java.ClassLoader.d 1
F:\downloads\old_HD\PMAIL\MAIL\UNX05FC5.MBX Infected: Trojan-Downloader.Win32.Small.yx 1
F:\downloads\old_HD\PMAIL\MAIL\UNX05FC5.MBX Infected: Trojan.VBS.KillAV.v 3
F:\downloads\old_HD\PMAIL\MAIL\UNX05FC5.MBX Infected: Exploit.Win32.MS04-028.gen 1
F:\downloads\old_HD\PMAIL\MAIL\UNX05FC5.MBX Infected: Exploit.Win32.WinAmp.a 2
F:\downloads\old_HD\PMAIL\MAIL\UNX05FC5.MBX Infected: Exploit.Perl.Vbil.a 1
F:\downloads\old_HD\PMAIL\MAIL\UNX05FC5.MBX Infected: Exploit.Python.PunBB.a 1
F:\downloads\old_HD\PMAIL\MAIL\UNX05FC5.MBX Infected: Exploit.Perl.Seq.a 1
F:\downloads\old_HD\PMAIL\MAIL\UNX05FC5.MBX Infected: Exploit.Perl.Ecard.a 2
F:\downloads\old_HD\PMAIL\MAIL\UNX05FC5.MBX Infected: Trojan.JS.ObjID.a 2
F:\downloads\old_HD\PMAIL\MAIL\UNX05FC5.MBX Infected: Exploit.Perl.Carte.a 1
F:\downloads\old_HD\PMAIL\MAIL\UNX05FC5.MBX Infected: Exploit.Linux.Strayhorn.a 1
F:\downloads\old_HD\PMAIL\MAIL\UNX05FC5.MBX Suspicious: Trojan-Spy.HTML.Fraud.gen 2
F:\downloads\old_HD\PMAIL\MAIL\UNX05FC5.MBX Infected: Exploit.Perl.BT.a 1
F:\downloads\old_HD\PMAIL\MAIL\UNX05FC5.MBX Infected: Exploit.Perl.SPB.a 1
F:\downloads\old_HD\PMAIL\MAIL\UNX05FC5.MBX Infected: Exploit.Python.Mantis.a 2
F:\downloads\old_HD\PMAIL\MAIL\UNX07D7A.MBX Suspicious: Exploit.HTML.Iframe.FileDownload 3
F:\downloads\old_HD\PMAIL\MAIL\UNX07D7A.MBX Infected: Email-Worm.Win32.Klez.h 3
F:\downloads\old_HD\PMAIL\MAIL\UNX07DFF.MBX Suspicious: Exploit.HTML.CodeBaseExec 1
F:\Music\0aDOWNLOADS\Stephane Grappelli\01 Track 1.wma Infected: Trojan-Downloader.WMA.Wimad.l 1
F:\Music\0aDOWNLOADS\Stephane Grappelli\03 Track 3.wma Infected: Trojan-Downloader.WMA.Wimad.l 1
F:\Music\0aDOWNLOADS\Stephane Grappelli\06 Track 6.wma Infected: Trojan-Downloader.WMA.Wimad.l 1
F:\Music\0aDOWNLOADS\Stephane Grappelli\07 Track 7.wma Infected: Trojan-Downloader.WMA.Wimad.l 1
F:\Music\0aDOWNLOADS\Stephane Grappelli\Eighties classic.wma Infected: Trojan-Downloader.WMA.Wimad.l 1
F:\Music\0aDOWNLOADS\Stephane Grappelli\TOTALLY HIP TRACK.wma Infected: Trojan-Downloader.WMA.Wimad.l 1
F:\work\business\biz-docs\proposals and contracts\Proposal Kit Pro-v7.0.exe Infected: Trojan.Win32.Pakes.cgn 1
F:\work\business\biz-docs\proposals and contracts\Proposal_Kit_10.0_Pro.zip Infected: Trojan.Win32.Pakes.cgn 1
The selected area was scanned.
(lots in old pegasus mails!)0 -
hello
Please download OTMoveIt3 by OldTimer- Save it to your desktop.
- Please double-click OTMoveIt3.exe to run it. (Note: If you are running on Vista, right-click on the file and choose Run As Administrator).
- Copy the lines in the codebox below to the clipboard by highlighting ALL of them and pressing CTRL + C (or, after highlighting, right-click and choose Copy):
:Processes explorer.exe :Services :Reg :Files F:\Music\0aDOWNLOADS\Stephane Grappelli\01 Track 1.wma F:\Music\0aDOWNLOADS\Stephane Grappelli\03 Track 3.wma F:\Music\0aDOWNLOADS\Stephane Grappelli\06 Track 6.wma F:\Music\0aDOWNLOADS\Stephane Grappelli\07 Track 7.wma F:\Music\0aDOWNLOADS\Stephane Grappelli\Eighties classic.wma F:\Music\0aDOWNLOADS\Stephane Grappelli\TOTALLY HIP TRACK.wma F:\work\business\biz-docs\proposals and contracts\Proposal Kit Pro-v7.0.exe F:\work\business\biz-docs\proposals and contracts\Proposal_Kit_10.0_Pro.zip C:\home\work\business\biz-docs\proposals and contracts\Proposal Kit Pro-v7.0.exe C:\home\work\business\biz-docs\proposals and contracts\Proposal_Kit_10.0_Pro.zip :Commands [purity] [emptytemp] [start explorer] [Reboot]
- Return to OTMoveIt3, right click in the "Paste Instructions for Items to be Moved" window (under the yellow bar) and choose Paste.
- Click the red Moveit! button.
- Copy everything in the Results window (under the green bar) to the clipboard by highlighting ALL of them and pressing CTRL + C (or, after highlighting, right-click and choose copy), and paste it in your next reply.
- Close OTMoveIt3
Download the GMER Rootkit Scanner. Unzip it to your Desktop.
Before scanning, make sure all other running programs are closed and no other actions like a scheduled antivirus scan will occur while the scan is being performed. Do not use your computer for anything else during the scan.
Double-click gmer.exe. The program will begin to run.
**Caution**
These types of scans can produce false positives. Do NOT take any action on any "<--- ROOKIT" entries unless advised by a trained Security Analyst
If possible rootkit activity is found, you will be asked if you would like to perform a full scan.- Click NO
- In the right panel, you will see a bunch of boxes that have been checked ... leave everything checked and ensure the Show all box is Unchecked.
- Now click the Scan button.
Once the scan is complete, you may receive another notice about rootkit activity. - Click OK.
- GMER will produce a log. Click on the [Save..] button, and in the File name area, type in "GMER.txt"
- Save it where you can easily find it, such as your desktop.
0 -
Hi
OTMoveIt3 log
========== PROCESSES ==========
Process explorer.exe killed successfully.
========== SERVICES/DRIVERS ==========
========== REGISTRY ==========
========== FILES ==========
File/Folder F:\Music\0aDOWNLOADS\Stephane Grappelli\01 Track 1.wma not found.
File/Folder F:\Music\0aDOWNLOADS\Stephane Grappelli\03 Track 3.wma not found.
File/Folder F:\Music\0aDOWNLOADS\Stephane Grappelli\06 Track 6.wma not found.
File/Folder F:\Music\0aDOWNLOADS\Stephane Grappelli\07 Track 7.wma not found.
File/Folder F:\Music\0aDOWNLOADS\Stephane Grappelli\Eighties classic.wma not found.
File/Folder F:\Music\0aDOWNLOADS\Stephane Grappelli\TOTALLY HIP TRACK.wma not found.
File/Folder F:\work\business\biz-docs\proposals and contracts\Proposal Kit Pro-v7.0.exe not found.
File/Folder F:\work\business\biz-docs\proposals and contracts\Proposal_Kit_10.0_Pro.zip not found.
C:\home\work\business\biz-docs\proposals and contracts\Proposal Kit Pro-v7.0.exe moved successfully.
C:\home\work\business\biz-docs\proposals and contracts\Proposal_Kit_10.0_Pro.zip moved successfully.
========== COMMANDS ==========
File delete failed. C:\DOCUME~1\Richie\LOCALS~1\Temp\etilqs_4tOYzFgUegpSqy3sJ11C scheduled to be deleted on reboot.
File delete failed. C:\DOCUME~1\Richie\LOCALS~1\Temp\~DF3B2B.tmp scheduled to be deleted on reboot.
File delete failed. C:\DOCUME~1\Richie\LOCALS~1\Temp\~DF4AEB.tmp scheduled to be deleted on reboot.
User's Temp folder emptied.
User's Temporary Internet Files folder emptied.
User's Internet Explorer cache folder emptied.
File delete failed. C:\Documents and Settings\LocalService\Local Settings\Temp\Temporary Internet Files\Content.IE5\index.dat scheduled to be deleted on reboot.
File delete failed. C:\Documents and Settings\LocalService\Local Settings\Temp\History\History.IE5\index.dat scheduled to be deleted on reboot.
File delete failed. C:\Documents and Settings\LocalService\Local Settings\Temp\Cookies\index.dat scheduled to be deleted on reboot.
Local Service Temp folder emptied.
File delete failed. C:\Documents and Settings\LocalService\Local Settings\Temporary Internet Files\Content.IE5\index.dat scheduled to be deleted on reboot.
Local Service Temporary Internet Files folder emptied.
File delete failed. C:\WINDOWS\temp\Perflib_Perfdata_754.dat scheduled to be deleted on reboot.
File delete failed. C:\WINDOWS\temp\ZLT03f72.TMP scheduled to be deleted on reboot.
Windows Temp folder emptied.
Java cache emptied.
File delete failed. C:\Documents and Settings\Richie\Local Settings\Application Data\Mozilla\Firefox\Profiles\qxbx6g1v.default\Cache\_CACHE_001_ scheduled to be deleted on reboot.
File delete failed. C:\Documents and Settings\Richie\Local Settings\Application Data\Mozilla\Firefox\Profiles\qxbx6g1v.default\Cache\_CACHE_002_ scheduled to be deleted on reboot.
File delete failed. C:\Documents and Settings\Richie\Local Settings\Application Data\Mozilla\Firefox\Profiles\qxbx6g1v.default\Cache\_CACHE_003_ scheduled to be deleted on reboot.
File delete failed. C:\Documents and Settings\Richie\Local Settings\Application Data\Mozilla\Firefox\Profiles\qxbx6g1v.default\Cache\_CACHE_MAP_ scheduled to be deleted on reboot.
File delete failed. C:\Documents and Settings\Richie\Local Settings\Application Data\Mozilla\Firefox\Profiles\qxbx6g1v.default\urlclassifier3.sqlite scheduled to be deleted on reboot.
File delete failed. C:\Documents and Settings\Richie\Local Settings\Application Data\Mozilla\Firefox\Profiles\qxbx6g1v.default\XUL.mfl scheduled to be deleted on reboot.
FireFox cache emptied.
Opera cache emptied.
Temp folders emptied.
Explorer started successfully
OTMoveIt3 by OldTimer - Version 1.0.8.0 log created on 02062009_141915
Files moved on Reboot...
File C:\DOCUME~1\Richie\LOCALS~1\Temp\etilqs_4tOYzFgUegpSqy3sJ11C not found!
C:\DOCUME~1\Richie\LOCALS~1\Temp\~DF3B2B.tmp moved successfully.
File C:\DOCUME~1\Richie\LOCALS~1\Temp\~DF4AEB.tmp not found!
File move failed. C:\Documents and Settings\LocalService\Local Settings\Temp\Temporary Internet Files\Content.IE5\index.dat scheduled to be moved on reboot.
File move failed. C:\Documents and Settings\LocalService\Local Settings\Temp\History\History.IE5\index.dat scheduled to be moved on reboot.
File move failed. C:\Documents and Settings\LocalService\Local Settings\Temp\Cookies\index.dat scheduled to be moved on reboot.
File move failed. C:\Documents and Settings\LocalService\Local Settings\Temporary Internet Files\Content.IE5\index.dat scheduled to be moved on reboot.
File C:\WINDOWS\temp\Perflib_Perfdata_754.dat not found!
File C:\WINDOWS\temp\ZLT03f72.TMP not found!
C:\Documents and Settings\Richie\Local Settings\Application Data\Mozilla\Firefox\Profiles\qxbx6g1v.default\Cache\_CACHE_001_ moved successfully.
C:\Documents and Settings\Richie\Local Settings\Application Data\Mozilla\Firefox\Profiles\qxbx6g1v.default\Cache\_CACHE_002_ moved successfully.
C:\Documents and Settings\Richie\Local Settings\Application Data\Mozilla\Firefox\Profiles\qxbx6g1v.default\Cache\_CACHE_003_ moved successfully.
C:\Documents and Settings\Richie\Local Settings\Application Data\Mozilla\Firefox\Profiles\qxbx6g1v.default\Cache\_CACHE_MAP_ moved successfully.
C:\Documents and Settings\Richie\Local Settings\Application Data\Mozilla\Firefox\Profiles\qxbx6g1v.default\urlclassifier3.sqlite moved successfully.
C:\Documents and Settings\Richie\Local Settings\Application Data\Mozilla\Firefox\Profiles\qxbx6g1v.default\XUL.mfl moved successfully.
GMER 1.0.14.14536 - http://www.gmer.net
Rootkit scan 2009-02-06 14:35:38
Windows 5.1.2600 Service Pack 3
---- Devices - GMER 1.0.14 ----
Device \Driver\Tcpip \Device\Ip vsdatant.sys (TrueVector Device Driver/Check Point Software Technologies LTD)
AttachedDevice \Driver\Tcpip \Device\Ip ntkrnlpa.exe (NT Kernel & System/Microsoft Corporation)
Device \Driver\Tcpip \Device\Tcp vsdatant.sys (TrueVector Device Driver/Check Point Software Technologies LTD)
AttachedDevice \Driver\Tcpip \Device\Tcp ntkrnlpa.exe (NT Kernel & System/Microsoft Corporation)
AttachedDevice \Driver\Tcpip \Device\Tcp Lbd.sys (Boot Driver/Lavasoft AB)
Device \Driver\Tcpip \Device\Udp vsdatant.sys (TrueVector Device Driver/Check Point Software Technologies LTD)
AttachedDevice \Driver\Tcpip \Device\Udp ntkrnlpa.exe (NT Kernel & System/Microsoft Corporation)
AttachedDevice \Driver\Tcpip \Device\Udp Lbd.sys (Boot Driver/Lavasoft AB)
Device \Driver\Tcpip \Device\RawIp vsdatant.sys (TrueVector Device Driver/Check Point Software Technologies LTD)
AttachedDevice \Driver\Tcpip \Device\RawIp ntkrnlpa.exe (NT Kernel & System/Microsoft Corporation)
AttachedDevice \Driver\Tcpip \Device\RawIp Lbd.sys (Boot Driver/Lavasoft AB)
---- EOF - GMER 1.0.14 ----0 -
all done
Follow these steps to uninstall Combofix and tools used in the removal of malware- Click START then RUN
- Now type Combofix /u in the runbox and click OK. Note the space between the X and the U, it needs to be there.
Download ToolsCleaner2 to your desktop and run it ( by de A.Rothstein & Dj Quiou )- Click the Pt. Restauration button and press OK to the prompts.
- Click the Corbeille button and press OK to the prompt.
- Click the Fichiers temp button and press OK to the prompt.
- Click the Recherche button and let it run ( it may look like it freezes but let it continue )
- Once it is done click the Suppression button and let it remove anything it finds.
- Close the program
Below I have included a number of recommendations for how to protect your computer against malware infections.- Keep Windows updated by regularly checking their website at :
http://windowsupdate.microsoft.com/
This will ensure your computer has always the latest security updates available installed on your computer. - SpywareBlaster protects against bad ActiveX, it immunizes your PC against them.
- SpywareGuard offers realtime protection from spyware installation attempts. Make sure you are only running one real-time anti-spyware protection program ( eg : TeaTimer, Windows Defender ) or there will be a conflict.
- Make Internet Explorer more secure
- Click Start > Run
- Type Inetcpl.cpl & click OK
- Click on the Security tab
- Click Reset all zones to default level
- Make sure the Internet Zone is selected & Click Custom level
- In the ActiveX section, set the first two options ("Download signed and unsigned ActiveX controls) to "Prompt", and ("Initialize and Script ActiveX controls not marked as safe") to "Disable".
- Next Click OK, then Apply button and then OK to exit the Internet Properties page.
- ATF Cleaner - Cleans temporary files from IE and Windows, empties the recycle bin and more. Great tool to help speed up your computer and knock out those nasties that like to reside in the temp folders.
- MVPS Hosts file replaces your current HOSTS file with one containing well known ad sites and other bad sites. Basically, this prevents your computer from connecting to those sites by redirecting them to 127.0.0.1 which is your local computer, meaning it will be difficult to infect yourself in the future.
- Please consider using an alternate browser. Mozilla's Firefox browser is fantastic; it is much more
secure than Internet Explorer, immune to almost all known browser hijackers, and also has the best built-in pop up
blocker (as an added benefit!) that I have ever seen. If you are interested, Firefox may be downloaded from
Here
If you choose to use Firefox, I highly recommend these add-ons to keep your PC even more secure.- NoScript - for blocking ads and other potential website attacks
- McAfee SiteAdvisor - this tells you whether the sites you are about to visit are safe or not. A must if you do a lot of Googling
- Keep a backup of your important files - Now, more than ever, it's especially important to protect your digital files and memories. This article is full of good information on alternatives for home backup solutions.
- ERUNT (Emergency Recovery Utility NT) allows you to keep a complete backup of your registry and restore it when needed. The standard registry backup options that come with Windows back up most of the registry but not all of it. ERUNT however creates a complete backup set, including the Security hive and user related sections. ERUNT is easy to use and since it creates a full backup, there are no options or choices other than to select the location of the backup files. The backup set includes a small executable that will launch the registry restore if needed.
- Recovery Console - Recent trends appear to indicate that future infections will include attacks to the boot sector of the computer. The installation of the Recovery Console in the computer will be our only defense against this threat. For more information and steps to install the Recovery Console see This Article. Should you need assistance in installing the Recovery Console, please do not hesitate to ask.
- Please read my guide on how to prevent malware and about safe computing here
0 -
Hi ActorSeeksJob,
Thanks a million for your sterling work.
(fwiw ComboFix /u bugged out - problem with prep.com and Suppression remained greyed out)0 -
Advertisement
-
do this as well then
Now we need to create a new System Restore point.
Click Start Menu > Run > type (or copy and paste)
%SystemRoot%\System32\restore\rstrui.exe
Press OK. Choose Create a Restore Point then click Next. Name it and click Create, when the confirmation screen shows the restore point has been created click Close.
Next goto Start Menu > Run > type
cleanmgr
Click OK, Disk Cleanup will open and start calculating the amount of space that can be freed, Once thats finished it will open the Disk Cleanup options screen, click the More Options tab then click Clean up on the system restore area and choose Yes at the confirmation window which will remove all the restore points except the one we just created.
To close Disk Cleanup and remove the Temporary Internet Files detected in the initial scan click OK then choose Yes on the confirmation window.0 -
Hi,
That's done now.0 -
Hi ASJ,
I too have this gao... troj on my computer. I tried all the steps mention above till the gmer step. I dont know how to proceed from here. Would you mind guiding me how to go ahead. Heres the log:
GMER 1.0.14.14536 - http://www.gmer.net
Rootkit scan 2009-02-16 22:02:24
Windows 6.0.6001 Service Pack 1
---- System - GMER 1.0.14 ----
SSDT \??\S:\SUPERAntiSpyware\SASKUTIL.sys ZwTerminateProcess [0x8B492F20]
Code \SystemRoot\system32\drivers\mfehidk.sys (Host Intrusion Detection Link Driver/McAfee, Inc.) ZwTerminateProcess [0xA76354E7]
---- Kernel code sections - GMER 1.0.14 ----
.text ntoskrnl.exe!KeInsertQueue + 811 824AAE08 4 Bytes [ 20, 2F, 49, 8B ]
PAGE ntoskrnl.exe!ZwTerminateProcess 82655FDB 5 Bytes JMP A76354EB \SystemRoot\system32\drivers\mfehidk.sys (Host Intrusion Detection Link Driver/McAfee, Inc.)
---- Devices - GMER 1.0.14 ----
AttachedDevice \FileSystem\Ntfs \Ntfs mfehidk.sys (Host Intrusion Detection Link Driver/McAfee, Inc.)
AttachedDevice \Driver\kbdclass \Device\KeyboardClass0 Wdf01000.sys (WDF Dynamic/Microsoft Corporation)
AttachedDevice \Driver\kbdclass \Device\KeyboardClass1 Wdf01000.sys (WDF Dynamic/Microsoft Corporation)
AttachedDevice \FileSystem\fastfat \Fat fltmgr.sys (Microsoft Filesystem Filter Manager/Microsoft Corporation)
AttachedDevice \FileSystem\fastfat \Fat mfehidk.sys (Host Intrusion Detection Link Driver/McAfee, Inc.)
---- Services - GMER 1.0.14 ----
Service system32\drivers\gaopdxdhppnpbw.sys (*** hidden *** ) [SYSTEM] gaopdxserv.sys <-- ROOTKIT !!!
---- Registry - GMER 1.0.14 ----
Reg HKLM\SYSTEM\CurrentControlSet\Services\gaopdxserv.sys@start 1
Reg HKLM\SYSTEM\CurrentControlSet\Services\gaopdxserv.sys@type 1
Reg HKLM\SYSTEM\CurrentControlSet\Services\gaopdxserv.sys@group file system
Reg HKLM\SYSTEM\CurrentControlSet\Services\gaopdxserv.sys@imagepath \systemroot\system32\drivers\gaopdxdhppnpbw.sys
Reg HKLM\SYSTEM\CurrentControlSet\Services\gaopdxserv.sys\modules
Reg HKLM\SYSTEM\CurrentControlSet\Services\gaopdxserv.sys\modules@gaopdxserv \\?\globalroot\systemroot\system32\drivers\gaopdxdhppnpbw.sys
Reg HKLM\SYSTEM\CurrentControlSet\Services\gaopdxserv.sys\modules@gaopdxl \\?\globalroot\systemroot\system32\gaopdxicyauvey.dll
Reg HKLM\SYSTEM\ControlSet002\Services\gaopdxserv.sys@start 1
Reg HKLM\SYSTEM\ControlSet002\Services\gaopdxserv.sys@type 1
Reg HKLM\SYSTEM\ControlSet002\Services\gaopdxserv.sys@group file system
Reg HKLM\SYSTEM\ControlSet002\Services\gaopdxserv.sys@imagepath \systemroot\system32\drivers\gaopdxdhppnpbw.sys
Reg HKLM\SYSTEM\ControlSet002\Services\gaopdxserv.sys\modules
Reg HKLM\SYSTEM\ControlSet002\Services\gaopdxserv.sys\modules@gaopdxserv \\?\globalroot\systemroot\system32\drivers\gaopdxdhppnpbw.sys
Reg HKLM\SYSTEM\ControlSet002\Services\gaopdxserv.sys\modules@gaopdxl \\?\globalroot\systemroot\system32\gaopdxicyauvey.dll
Reg HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\DPX\Assets\F9BCC51C467D4687
Reg HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\DPX\Assets\F9BCC51C467D4687@Count 0x64 0x00 0x00 0x00 ...
Reg HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\DPX\Assets\F9BCC51C467D4687@DateTime 0xC0 0xD3 0x4C 0xBE ...
---- EOF - GMER 1.0.14 ----
Thanks,
ray0 -
hello
We need to use GMER to delete a service and remove the file:- Open the gmer folder and double click gmer.exe to run the program
- On starting GMER will run a short scan, allow it to complete this, then click No if it asks you to run a full scan.
- Click on the > > > tab to open the menus
- Click on the Services tab
- Scroll down until you find the following Service (Note: This may be highlighted in red)gaopdxdhppnpbw
gaopdxserv - Click on the Service Name to Highlight it, then right click and choose Delete...
- Click OK at the first confirmation dialog to remove the service
- Click OK to the second confirmation dialog to remove the file
Let me know of any problems you encountered.
lets remove the file:- Click on the Files tab
- Now on the right hand side, locate the file
C:\windows\system32\drivers\gaopdxdhppnpbw.sys
C:\windows\system32\gaopdxicyauvey.dll
- Click on the file to Highlight it, then click the Delete button on the right hand side.
- Click Yes to the confirmation
- Click OK to exit the program
0 -
Thanks ASJ. I did delete that service adding the path to the :FILES in
OTMoveIt3 by OldTimer
I guess, probably thats why I couldnt see it in GMER. Well thank a lot for the all the guiding in all the posts. Reallt appreciate your knowledge and effort.
Thanks again,
Ray0
Advertisement