Dead Ended with this...

Discussion in 'Windows - Virus and spyware problems' started by vlady1027, Jun 11, 2008.

  1. vlady1027

    vlady1027 Member

    Joined:
    Jun 11, 2008
    Messages:
    9
    Likes Received:
    0
    Trophy Points:
    11
    Hello everyone!

    I was hoping that someone can help me out with this...
    OK, it is my brother's laptop, XP SP2. He brought it to me with this complain. Whenever he is trying open IE - there is another IE window pops up almost immediately after, preventing doing anything online.
    I have read some posts here and other places, so I ran SUPERAntiSpyware Free Edition, Malwarebytes' Anti-Malware, Spyware Doctor, and BitDefender. Fist two detected Trojan.Downloader-NewJuan/VM and Adware.Vundo.Variant/Rel. I have tried to remove them using those tools, but they keep coming back after reboot. Now - interesting part - after running those two numerous times - now they show nothing. However, IE behavior did not change. Sorry to keep this long - just want to make sure you'all get the picture. I am not a guru nor am I a newbie but I have never seen anything like this before.
    Thanks for all replies!
     
  2. 2oldGeek

    2oldGeek Active member

    Joined:
    Jun 16, 2005
    Messages:
    3,658
    Likes Received:
    38
    Trophy Points:
    78
    Sorry, vlady1027, but we can’t see what’s on your computer…..
    Vundo.Variants are extremely difficult to remove but, if you’ll supply us with some logs, maybe someone can help you…

    Download and Run HijackThis
    Download HJTInstall.exe to your Desktop.
    • Doubleclick HJTInstall.exe to install it.
    • By default it will install to C:\Program Files\Trend Micro\HijackThis .
    • Click on Install.
    • It will create a HijackThis icon on the desktop.
    • Once installed, it will launch Hijackthis.
    • Click on the Do a system scan and save a logfile button. It will scan and the log should open in notepad.
    Copy/Paste the log to your next reply please.

    Make an uninstall list using HijackThis
    To access the Uninstall Manager you would do the following:

    1. Start HijackThis
    2. Click on the Config button
    3. Click on the Misc Tools button
    4. Click on the Open Uninstall Manager button.
    5. Click on the Save list... button and specify where you would like to save this file. When you press Save button a notepad will open with the contents of that file. Simply copy and paste the contents of that notepad here in your next reply.

    Reply and post with:
    HijackThis Log
    Uninstall List



    2OG
     
  3. cdavfrew

    cdavfrew Regular member

    Joined:
    May 19, 2008
    Messages:
    1,183
    Likes Received:
    0
    Trophy Points:
    46
    Hey vlady1027.

    It seems that you have a downloader variant of vundo. This means that the malware will download more malware. Therefore, please disable your internet connection while doing scans or fixes, even when you restart your computer.

    First of all, do what 2oldgeek said. Please remember to rename HijackThis to something like scanner.exe before running it.

    Secondly, follow the instructions on this page ( http://forums.majorgeeks.com/showthread.php?t=137630 ) about running MGTools. Post the logs here.

    Third, download both Vundofix and Virtumundobegone. Run both of them and post the logs here.

    Fourth, run scans with superantispyware and malwarebytes again, except this time in safe mode. Quarantine anything you find

    Fifth, download Killbox and leave it somewhere safe. We will use it another time.

    Sixth, download CCleaner and run it after you have done all of the above. Before running it, delete all Internet Temporary Files and Cookies within your browser options.

    Best Regards :D
     
  4. vlady1027

    vlady1027 Member

    Joined:
    Jun 11, 2008
    Messages:
    9
    Likes Received:
    0
    Trophy Points:
    11
    2oldGeek - thank you.

    Here is the log for HijackThis:

    Logfile of Trend Micro HijackThis v2.0.2
    Scan saved at 10:18:54 AM, on 6/12/2008
    Platform: Windows XP SP2 (WinNT 5.01.2600)
    MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)
    Boot mode: Normal

     
    Last edited: Jun 14, 2008
  5. 2oldGeek

    2oldGeek Active member

    Joined:
    Jun 16, 2005
    Messages:
    3,658
    Likes Received:
    38
    Trophy Points:
    78
    Hi vlady1027,

    Download SDFix and save it to your Desktop.
    • Run the SDFix.exe by double clicking on it.
    • Allow it to install into the default location which is normally c:\SDFix

    Reboot your computer in "Safe Mode" using the F8 method. To do this, restart your computer and after hearing your computer beep once during startup (but before the Windows icon appears) press the F8 key repeatedly. A menu will appear with several options. Use the arrow keys to navigate and select the option to run Windows in "Safe Mode".

    • When you have booted into safe mode, open the C:\SDFix folder and double click RunThis.bat to start the script.
    • Type Y to begin the cleanup process.
    • It will remove any Trojan Services or Registry entries found and then prompt you to press any key to Reboot.
    • Press any Key and it will restart the PC.
    • When the PC restarts the Fixtool will run again and complete the removal process then display Finished, press any key to end the script and load your desktop icons.
    • Once the desktop icons load the SDFix report will open on screen and also save into the SDFix folder as Report.txt.
    • Attach the Report.txt file to your next message.



    2OG
     
  6. vlady1027

    vlady1027 Member

    Joined:
    Jun 11, 2008
    Messages:
    9
    Likes Received:
    0
    Trophy Points:
    11
    cdavfrew - thank you.

     
    Last edited: Jun 14, 2008
  7. vlady1027

    vlady1027 Member

    Joined:
    Jun 11, 2008
    Messages:
    9
    Likes Received:
    0
    Trophy Points:
    11
    Here is a runkeys.txt


     
    Last edited: Jun 14, 2008
  8. vlady1027

    vlady1027 Member

    Joined:
    Jun 11, 2008
    Messages:
    9
    Likes Received:
    0
    Trophy Points:
    11
    Here is GetUnKeys.txt


     
    Last edited: Jun 14, 2008
  9. vlady1027

    vlady1027 Member

    Joined:
    Jun 11, 2008
    Messages:
    9
    Likes Received:
    0
    Trophy Points:
    11
    OK... cdavfrew

    1.Ran Vundofix and Virtumundobegone and the logs are clean -
    Nothing was found.
    Here is VBG.txt
    2.Ran superantispyware and malwarebytes in Safe Mode.
    superantispyware did not find anything but malwarebytes did and here is the log:

    Registry Keys Infected:
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MS Juan (Malware.Trace) -> No action taken.

    3.Downloaded KillBox and will use it per your request.
    4.Downloaded CCleaner
    here is what it found
    ccleaner_log.txt

    CLEANING COMPLETE - (56.521 secs)
    ------------------------------------------------------------------------------------------
    95.7MB removed.
    ------------------------------------------------------------------------------------------



    2oldGeek
    I followed your instructions with SDFix as well...
    Here is the report.txt

    SDFix: Version 1.191
    Run by Administrator on Thu 06/12/2008 at 03:56 PM

    Microsoft Windows XP [Version 5.1.2600]
    Running From: C:\SDFix

    Checking Services :

    Restoring Windows Registry Values
    Restoring Windows Default Hosts File

    Rebooting

    Checking Files :

    No Trojan Files Found

    Removing Temp Files

    ADS Check :



    Final Check :

    catchme 0.3.1361.2 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
    Rootkit scan 2008-06-12 16:01:20
    Windows 5.1.2600 Service Pack 2 NTFS

    scanning hidden processes ...

    scanning hidden services & system hive ...

    scanning hidden registry entries ...

    scanning hidden files ...

    scan completed successfully
    hidden processes: 0
    hidden services: 0
    hidden files: 0

    Remaining Services :

    Authorized Application Key Export:

    [HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list]
    "%windir%\\system32\\sessmgr.exe"="%windir%\\system32\\sessmgr.exe:*:enabled:mad:xpsp2res.dll,-22019"
    "%windir%\\Network Diagnostic\\xpnetdiag.exe"="%windir%\\Network Diagnostic\\xpnetdiag.exe:*:Enabled:mad:xpsp3res.dll,-20000"
    "C:\\Program Files\\Real\\RealPlayer\\realplay.exe"="C:\\Program Files\\Real\\RealPlayer\\realplay.exe:*:Enabled:RealPlayer"
    "C:\\Program Files\\Internet Explorer\\iexplore.exe"="C:\\Program Files\\Internet Explorer\\iexplore.exe:*:Enabled:Internet Explorer"

    [HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\domainprofile\authorizedapplications\list]
    "%windir%\\system32\\sessmgr.exe"="%windir%\\system32\\sessmgr.exe:*:enabled:mad:xpsp2res.dll,-22019"
    "%windir%\\Network Diagnostic\\xpnetdiag.exe"="%windir%\\Network Diagnostic\\xpnetdiag.exe:*:Enabled:mad:xpsp3res.dll,-20000"

    Remaining Files :

    Files with Hidden Attributes :

    Tue 10 Jun 2008 267 ..SH. --- "C:\BOOT.BAK"
    Wed 24 Oct 2007 5,903,928 A..H. --- "C:\Program Files\Picasa2\setup.exe"
    Mon 9 Jun 2008 384 A.SH. --- "C:\WINDOWS\system32\htmdmtri.tmp"
    Tue 11 Sep 2007 0 A.SH. --- "C:\Documents and Settings\All Users\DRM\Cache\Indiv01.tmp"
    Wed 7 May 2008 0 A..H. --- "C:\WINDOWS\SoftwareDistribution\Download\385cb67dda0ffd4dea8c0d990dc65796\BIT1.tmp"
    Wed 11 Jun 2008 2,585,864 A..H. --- "C:\WINDOWS\SoftwareDistribution\Download\a2c8f709dd0237a7e496be18e0ba404e\BIT16.tmp"

    Finished!
     
    Last edited: Jun 14, 2008
  10. cdavfrew

    cdavfrew Regular member

    Joined:
    May 19, 2008
    Messages:
    1,183
    Likes Received:
    0
    Trophy Points:
    46
    Woah... okay, here's the deal, vlady. I would recommend editing your former posts and deleting all of them, so as to not make this thread huge. I have already got what I needed from them, and you can delete them now.

    I see that you did not rename HijackThis as I asked you to. Please rename it to scanner.exe or something like that before posting another log.

    Booting into safe mode, delete the following .ini files in your system32 folder. You may have to use Killbox to remove them.

    ayaaknpo.ini
    ayaakn~1.ini
    gkwwxhhm.ini
    hikvvxrr.ini
    htmdmt~1.ini
    oygxgoqw.ini
    perfst~1.ini
    ptbdakvl.ini
    xiefwxsu.ini

    Good news is, none of these .ini files were created on the 12th or 13th. :)

    Using regedit, manually delete the registry key Malwarebytes detected. Please also do this in safe mode.

    As for the IE condition, open it, click on Tools > Manage Add-ons > Enable or Disable Add-ons. Within that window, list all the add-ons you do not recognize. Anything slightly suspicious; just post it here.

    Also, please download A-squared Free and do a scan with it in safe mode. Do not remove anything: only post the log here. Also download GMER, do a scan, and post the log here.

    Best Regards :D Hope to solve your brother's problem soon!
     
  11. vlady1027

    vlady1027 Member

    Joined:
    Jun 11, 2008
    Messages:
    9
    Likes Received:
    0
    Trophy Points:
    11
    cdavfrew - thank you! I hope to solve this problem soon too!
    My bro's problem is that he lets several people use his machine and I think none of them have any ideas about what is they can catch out there. Especially without firewall. I installed Comodo for him after the fact.

    1. Could not find out how to delete a thread. So I just trimmed them.
    2. I thought I did rename HJT to CleanerHJT.exe.
    3. Booted in Safe Mode and deleted files you mentioned. However, I
    could not locate files:
    ayaakn~1.ini
    htmdmt~1.ini
    persfst~1.ini

    I also deleted file ayaaknpo.ini2 - I thought I might as well,
    I did not have to use KillBox.
    4. Went into regedit in Safe Mode and manually removed Juan reg. key.
    5. Went in IE and checked for suspicious add-ons. All there were are:

    Veoh Browser plug-in
    Diagnose Connection Problems
    Research
    Windows Messenger

    I thought that they are all OK, however, I disabled the Veoh plug-
    in just because it is not necessary.
    6. Downloaded and ran A-Squared in Safe Mode - here is a log:
    a-squared Free - Version 3.5

    Last update: N/A



    Scan settings:



    Objects: Memory, Traces, Cookies, C:\

    Scan archives: On

    Heuristics: On

    ADS Scan: On



    Scan start: 6/14/2008 12:36:37 PM



    Value: HKEY_CURRENT_USER\Software\PartyGaming\PartyPoker --> 1 detected: Trace.Registry.PartyPoker

    Value: HKEY_CURRENT_USER\Software\PartyGaming\PartyPoker --> 10 detected: Trace.Registry.PartyPoker

    Value: HKEY_CURRENT_USER\Software\PartyGaming\PartyPoker --> 2 detected: Trace.Registry.PartyPoker

    Value: HKEY_CURRENT_USER\Software\PartyGaming\PartyPoker --> 4 detected: Trace.Registry.PartyPoker

    Value: HKEY_CURRENT_USER\Software\PartyGaming\PartyPoker --> 5 detected: Trace.Registry.PartyPoker

    Value: HKEY_CURRENT_USER\Software\PartyGaming\PartyPoker --> 6 detected: Trace.Registry.PartyPoker

    Value: HKEY_CURRENT_USER\Software\PartyGaming\PartyPoker --> 7 detected: Trace.Registry.PartyPoker

    Value: HKEY_CURRENT_USER\Software\PartyGaming\PartyPoker --> 9 detected: Trace.Registry.PartyPoker

    Value: HKEY_CURRENT_USER\Software\PartyGaming\PartyPoker --> AdsLastKnownState detected: Trace.Registry.PartyPoker

    Value: HKEY_CURRENT_USER\Software\PartyGaming\PartyPoker --> AppPath detected: Trace.Registry.PartyPoker

    Value: HKEY_CURRENT_USER\Software\PartyGaming\PartyPoker --> BlackjackSounds detected: Trace.Registry.PartyPoker

    Value: HKEY_CURRENT_USER\Software\PartyGaming\PartyPoker --> BlackjackVoice detected: Trace.Registry.PartyPoker

    Value: HKEY_CURRENT_USER\Software\PartyGaming\PartyPoker --> DisableCharacters detected: Trace.Registry.PartyPoker

    Value: HKEY_CURRENT_USER\Software\PartyGaming\PartyPoker --> DisableMouseHelp detected: Trace.Registry.PartyPoker

    Value: HKEY_CURRENT_USER\Software\PartyGaming\PartyPoker --> EnableCallOuts detected: Trace.Registry.PartyPoker

    Value: HKEY_CURRENT_USER\Software\PartyGaming\PartyPoker --> EnableCardAnimations detected: Trace.Registry.PartyPoker

    Value: HKEY_CURRENT_USER\Software\PartyGaming\PartyPoker --> EnableCongratulations detected: Trace.Registry.PartyPoker

    Value: HKEY_CURRENT_USER\Software\PartyGaming\PartyPoker --> EnableSounds detected: Trace.Registry.PartyPoker

    Value: HKEY_CURRENT_USER\Software\PartyGaming\PartyPoker --> FourColourDeck detected: Trace.Registry.PartyPoker

    Value: HKEY_CURRENT_USER\Software\PartyGaming\PartyPoker --> HHEnableLog detected: Trace.Registry.PartyPoker

    Value: HKEY_CURRENT_USER\Software\PartyGaming\PartyPoker --> HHLogDays detected: Trace.Registry.PartyPoker

    Value: HKEY_CURRENT_USER\Software\PartyGaming\PartyPoker --> HHLogSize detected: Trace.Registry.PartyPoker

    Value: HKEY_CURRENT_USER\Software\PartyGaming\PartyPoker --> id detected: Trace.Registry.PartyPoker

    Value: HKEY_CURRENT_USER\Software\PartyGaming\PartyPoker --> InitialPort detected: Trace.Registry.PartyPoker

    Value: HKEY_CURRENT_USER\Software\PartyGaming\PartyPoker --> InstallState detected: Trace.Registry.PartyPoker

    Value: HKEY_CURRENT_USER\Software\PartyGaming\PartyPoker --> MuckLosingHand detected: Trace.Registry.PartyPoker

    Value: HKEY_CURRENT_USER\Software\PartyGaming\PartyPoker --> SearchHiding detected: Trace.Registry.PartyPoker

    Value: HKEY_CURRENT_USER\Software\PartyGaming\PartyPoker --> SL detected: Trace.Registry.PartyPoker

    Value: HKEY_CURRENT_USER\Software\PartyGaming\PartyPoker --> TableType detected: Trace.Registry.PartyPoker

    Value: HKEY_CURRENT_USER\Software\PartyGaming\PartyPoker --> useCount detected: Trace.Registry.PartyPoker

    Value: HKEY_CURRENT_USER\Software\PartyGaming --> AutoLoginToOtherGames detected: Trace.Registry.PartyPoker

    Value: HKEY_CURRENT_USER\Software\PartyGaming --> CFDialogShown detected: Trace.Registry.PartyPoker

    Value: HKEY_CURRENT_USER\Software\PartyGaming --> FreshInstall detected: Trace.Registry.PartyPoker

    Value: HKEY_CURRENT_USER\Software\PartyGaming --> OldCFformat detected: Trace.Registry.PartyPoker

    c:\documents and settings\administrator\application data\antispyware detected: Trace.Directory.AntiSpywareApp

    c:\documents and settings\administrator\application data\antispyware\settings detected: Trace.Directory.AntiSpywareApp

    c:\documents and settings\administrator\application data\antispyware\rs.dat detected: Trace.File.AntiSpywareApp

    Value: HKEY_CURRENT_USER\Software\Antispyware\AntiSpyware\Settings --> AllDrives detected: Trace.Registry.AntiSpywareApp

    Value: HKEY_CURRENT_USER\Software\Antispyware\AntiSpyware\Settings --> DeepScanScheduledScans detected: Trace.Registry.AntiSpywareApp

    Value: HKEY_CURRENT_USER\Software\Antispyware\AntiSpyware\Settings --> DownloadUpdates detected: Trace.Registry.AntiSpywareApp

    Value: HKEY_CURRENT_USER\Software\Antispyware\AntiSpyware\Settings --> LastScanTime detected: Trace.Registry.AntiSpywareApp

    Value: HKEY_CURRENT_USER\Software\Antispyware\AntiSpyware\Settings --> LogActivities detected: Trace.Registry.AntiSpywareApp

    Value: HKEY_CURRENT_USER\Software\Antispyware\AntiSpyware\Settings --> NumberOfScans detected: Trace.Registry.AntiSpywareApp

    Value: HKEY_CURRENT_USER\Software\Antispyware\AntiSpyware\Settings --> ScanActiveProcs detected: Trace.Registry.AntiSpywareApp

    Value: HKEY_CURRENT_USER\Software\Antispyware\AntiSpyware\Settings --> ScanCookie detected: Trace.Registry.AntiSpywareApp

    Value: HKEY_CURRENT_USER\Software\Antispyware\AntiSpyware\Settings --> ScanDeep detected: Trace.Registry.AntiSpywareApp

    Value: HKEY_CURRENT_USER\Software\Antispyware\AntiSpyware\Settings --> ScanFiles detected: Trace.Registry.AntiSpywareApp

    Value: HKEY_CURRENT_USER\Software\Antispyware\AntiSpyware\Settings --> ScanP2P detected: Trace.Registry.AntiSpywareApp

    Value: HKEY_CURRENT_USER\Software\Antispyware\AntiSpyware\Settings --> ScanWinReg detected: Trace.Registry.AntiSpywareApp

    Value: HKEY_CURRENT_USER\Software\Antispyware\AntiSpyware\Settings --> Startup detected: Trace.Registry.AntiSpywareApp

    C:\Documents and Settings\Administrator\Desktop\SDFix.exe/Process.exe detected: Riskware.RiskTool.Win32.Processor.20

    C:\Program Files\COMODO\Firewall\s1.tmp detected: Riskware.AdTool.Win32.MyWebSearch.bn

    C:\SDFix\apps\Process.exe detected: Riskware.RiskTool.Win32.Processor.20



    Scanned



    Files: 41736

    Traces: 184681

    Cookies: 2

    Processes: 12



    Found



    Files: 3

    Traces: 50

    Cookies: 0

    Processes: 0

    Registry keys: 0



    Scan end: 6/14/2008 1:09:28 PM

    Scan time: 0:32:51



    7. Downloaded and ran GMER - here is a log:

    GMER 1.0.14.14536 - http://www.gmer.net

    Rootkit scan 2008-06-14 13:36:24

    Windows 5.1.2600 Service Pack 2





    ---- System - GMER 1.0.14 ----



    SSDT \SystemRoot\System32\DRIVERS\cmdguard.sys (COMODO Firewall Pro Sandbox Driver/COMODO) ZwAdjustPrivilegesToken [0xB808DC8C]

    SSDT \??\C:\Program Files\Softwin\BitDefender10\bdrsdrv.sys ZwClose [0xB578A9AC]

    SSDT \SystemRoot\System32\DRIVERS\cmdguard.sys (COMODO Firewall Pro Sandbox Driver/COMODO) ZwConnectPort [0xB808D3C4]

    SSDT \SystemRoot\System32\DRIVERS\cmdguard.sys (COMODO Firewall Pro Sandbox Driver/COMODO) ZwCreateFile [0xB808D8A0]

    SSDT \??\C:\Program Files\Softwin\BitDefender10\bdrsdrv.sys ZwCreateKey [0xB578A95E]

    SSDT \SystemRoot\System32\DRIVERS\cmdguard.sys (COMODO Firewall Pro Sandbox Driver/COMODO) ZwCreatePort [0xB808D080]

    SSDT \SystemRoot\system32\drivers\iksysflt.sys (System Filter Device Driver/PCTools Research Pty Ltd.) ZwCreateProcess [0xB80BB8A2]

    SSDT \SystemRoot\system32\drivers\iksysflt.sys (System Filter Device Driver/PCTools Research Pty Ltd.) ZwCreateProcessEx [0xB80BBE88]

    SSDT \SystemRoot\System32\DRIVERS\cmdguard.sys (COMODO Firewall Pro Sandbox Driver/COMODO) ZwCreateSection [0xB808F084]

    SSDT \SystemRoot\System32\DRIVERS\cmdguard.sys (COMODO Firewall Pro Sandbox Driver/COMODO) ZwCreateSymbolicLinkObject [0xB808DE72]

    SSDT \SystemRoot\System32\DRIVERS\cmdguard.sys (COMODO Firewall Pro Sandbox Driver/COMODO) ZwCreateThread [0xB808CC50]

    SSDT \??\C:\Program Files\Softwin\BitDefender10\bdrsdrv.sys ZwDeleteKey [0xB578AA12]

    SSDT \??\C:\Program Files\Softwin\BitDefender10\bdrsdrv.sys ZwDeleteValueKey [0xB578AA3C]

    SSDT \SystemRoot\System32\DRIVERS\cmdguard.sys (COMODO Firewall Pro Sandbox Driver/COMODO) ZwDuplicateObject [0xB808CB02]

    SSDT \??\C:\Program Files\Softwin\BitDefender10\bdrsdrv.sys ZwEnumerateKey [0xB578AE6A]

    SSDT \??\C:\Program Files\Softwin\BitDefender10\bdrsdrv.sys ZwEnumerateValueKey [0xB578AEE0]

    SSDT \??\C:\Program Files\Softwin\BitDefender10\bdrsdrv.sys ZwFlushKey [0xB578A9E8]

    SSDT \SystemRoot\System32\DRIVERS\cmdguard.sys (COMODO Firewall Pro Sandbox Driver/COMODO) ZwLoadDriver [0xB808ED24]

    SSDT \??\C:\Program Files\Softwin\BitDefender10\bdrsdrv.sys ZwLoadKey [0xB578AF58]

    SSDT \??\C:\Program Files\Softwin\BitDefender10\bdfsdrv.sys ZwOpenFile [0xB4B7CF1F]

    SSDT \??\C:\Program Files\Softwin\BitDefender10\bdrsdrv.sys ZwOpenKey [0xB578A91C]

    SSDT \SystemRoot\System32\DRIVERS\cmdguard.sys (COMODO Firewall Pro Sandbox Driver/COMODO) ZwOpenProcess [0xB808C822]

    SSDT \SystemRoot\System32\DRIVERS\cmdguard.sys (COMODO Firewall Pro Sandbox Driver/COMODO) ZwOpenSection [0xB808D744]

    SSDT \SystemRoot\System32\DRIVERS\cmdguard.sys (COMODO Firewall Pro Sandbox Driver/COMODO) ZwOpenThread [0xB808C9AA]

    SSDT \??\C:\Program Files\Softwin\BitDefender10\bdrsdrv.sys ZwQueryKey [0xB578AEA6]

    SSDT \??\C:\Program Files\Softwin\BitDefender10\bdrsdrv.sys ZwQueryValueKey [0xB578AF1C]

    SSDT \SystemRoot\System32\DRIVERS\cmdguard.sys (COMODO Firewall Pro Sandbox Driver/COMODO) ZwRenameKey [0xB808E7F2]

    SSDT \SystemRoot\System32\DRIVERS\cmdguard.sys (COMODO Firewall Pro Sandbox Driver/COMODO) ZwRequestWaitReplyPort [0xB808D196]

    SSDT \SystemRoot\System32\DRIVERS\cmdguard.sys (COMODO Firewall Pro Sandbox Driver/COMODO) ZwSecureConnectPort [0xB808EAE6]

    SSDT \SystemRoot\System32\DRIVERS\cmdguard.sys (COMODO Firewall Pro Sandbox Driver/COMODO) ZwSetSystemInformation [0xB808EEC4]

    SSDT \??\C:\Program Files\Softwin\BitDefender10\bdrsdrv.sys ZwSetValueKey [0xB578AAE9]

    SSDT \SystemRoot\System32\DRIVERS\cmdguard.sys (COMODO Firewall Pro Sandbox Driver/COMODO) ZwShutdownSystem [0xB808D5D2]

    SSDT \SystemRoot\System32\DRIVERS\cmdguard.sys (COMODO Firewall Pro Sandbox Driver/COMODO) ZwSystemDebugControl [0xB808D638]

    SSDT \??\C:\Program Files\SUPERAntiSpyware\SASKUTIL.sys (SASKUTIL.SYS/SUPERAdBlocker.com and SUPERAntiSpyware.com) ZwTerminateProcess [0xB7F54F20]

    SSDT \SystemRoot\System32\DRIVERS\cmdguard.sys (COMODO Firewall Pro Sandbox Driver/COMODO) ZwTerminateThread [0xB808CE18]

    SSDT \??\C:\Program Files\Softwin\BitDefender10\bdrsdrv.sys ZwUnloadKey [0xB578AF86]

    SSDT \SystemRoot\system32\drivers\iksysflt.sys (System Filter Device Driver/PCTools Research Pty Ltd.) ZwWriteVirtualMemory [0xB80BA420]



    ---- Kernel code sections - GMER 1.0.14 ----



    .text ntkrnlpa.exe!ZwCallbackReturn + 2BEC 805037EC 12 Bytes [ 80, D0, 08, B8, A2, B8, 0B, ... ]

    ? C:\WINDOWS\system32\Drivers\mchInjDrv.sys The system cannot find the file specified. !



    ---- User code sections - GMER 1.0.14 ----



    .text C:\Program Files\System Control Manager\edd.exe[448] kernel32.dll!LoadLibraryExW 7C801AF1 6 Bytes JMP 5F070F5A

    .text C:\Program Files\System Control Manager\edd.exe[448] USER32.dll!SetWindowsHookExW 77D6E621 6 Bytes JMP 5F0A0F5A

    .text C:\Program Files\System Control Manager\edd.exe[448] USER32.dll!SetWindowsHookExA 77D702B2 6 Bytes JMP 5F040F5A

    .text C:\WINDOWS\system32\nvsvc32.exe[460] kernel32.dll!LoadLibraryExW 7C801AF1 6 Bytes JMP 5F070F5A

    .text C:\WINDOWS\system32\nvsvc32.exe[460] USER32.dll!SetWindowsHookExW 77D6E621 6 Bytes JMP 5F0A0F5A

    .text C:\WINDOWS\system32\nvsvc32.exe[460] USER32.dll!SetWindowsHookExA 77D702B2 6 Bytes JMP 5F040F5A

    .text C:\Program Files\O2Micro Oz128 Driver\o2flash.exe[540] kernel32.dll!LoadLibraryExW 7C801AF1 6 Bytes JMP 5F070F5A

    .text C:\Program Files\O2Micro Oz128 Driver\o2flash.exe[540] USER32.dll!SetWindowsHookExW 77D6E621 6 Bytes JMP 5F0A0F5A

    .text C:\Program Files\O2Micro Oz128 Driver\o2flash.exe[540] USER32.dll!SetWindowsHookExA 77D702B2 6 Bytes JMP 5F040F5A

    .text C:\WINDOWS\RTHDCPL.EXE[604] kernel32.dll!LoadLibraryExW 7C801AF1 6 Bytes JMP 5F070F5A

    .text C:\WINDOWS\RTHDCPL.EXE[604] USER32.dll!SetWindowsHookExW 77D6E621 6 Bytes JMP 5F0A0F5A

    .text C:\WINDOWS\RTHDCPL.EXE[604] USER32.dll!SetWindowsHookExA 77D702B2 6 Bytes JMP 5F040F5A

    .text C:\Program Files\Spyware Doctor\SDTrayApp.exe[620] kernel32.dll!LoadLibraryExW 7C801AF1 6 Bytes JMP 5F070F5A

    .text C:\Program Files\Spyware Doctor\SDTrayApp.exe[620] kernel32.dll!CreateThread + 1A 7C810849 4 Bytes [ AF, 92, C3, 83 ]

    .text C:\Program Files\Spyware Doctor\SDTrayApp.exe[620] USER32.dll!SetWindowsHookExW 77D6E621 6 Bytes JMP 5F0A0F5A

    .text C:\Program Files\Spyware Doctor\SDTrayApp.exe[620] USER32.dll!SetWindowsHookExA 77D702B2 6 Bytes JMP 5F040F5A

    .text C:\WINDOWS\system32\ctfmon.exe[660] kernel32.dll!LoadLibraryExW 7C801AF1 6 Bytes JMP 5F070F5A

    .text C:\WINDOWS\system32\ctfmon.exe[660] USER32.dll!SetWindowsHookExW 77D6E621 6 Bytes JMP 5F0A0F5A

    .text C:\WINDOWS\system32\ctfmon.exe[660] USER32.dll!SetWindowsHookExA 77D702B2 6 Bytes JMP 5F040F5A

    .text C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe[664] kernel32.dll!LoadLibraryExW 7C801AF1 6 Bytes JMP 5F070F5A

    .text C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe[664] USER32.dll!SetWindowsHookExW 77D6E621 6 Bytes JMP 5F0A0F5A

    .text C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe[664] USER32.dll!SetWindowsHookExA 77D702B2 6 Bytes JMP 5F040F5A

    .text C:\Documents and Settings\Administrator\Desktop\gmer\gmer.exe[732] kernel32.dll!LoadLibraryExW 7C801AF1 6 Bytes JMP 5F070F5A

    .text C:\Documents and Settings\Administrator\Desktop\gmer\gmer.exe[732] kernel32.dll!FreeLibrary + 15 7C80AA7B 4 Bytes [ BD, 55, EF, F4 ]

    .text C:\Documents and Settings\Administrator\Desktop\gmer\gmer.exe[732] USER32.dll!SetWindowsHookExW 77D6E621 6 Bytes JMP 5F0A0F5A

    .text C:\Documents and Settings\Administrator\Desktop\gmer\gmer.exe[732] USER32.dll!SetWindowsHookExA 77D702B2 6 Bytes JMP 5F040F5A

    .text C:\Program Files\Spyware Doctor\svcntaux.exe[796] kernel32.dll!LoadLibraryExW 7C801AF1 6 Bytes JMP 5F070F5A

    .text C:\Program Files\Spyware Doctor\svcntaux.exe[796] USER32.dll!SetWindowsHookExW 77D6E621 6 Bytes JMP 5F0A0F5A

    .text C:\Program Files\Spyware Doctor\svcntaux.exe[796] USER32.dll!SetWindowsHookExA 77D702B2 6 Bytes JMP 5F040F5A

    .text C:\WINDOWS\system32\csrss.exe[812] USER32.dll!SetWindowsHookExW 77D6E621 6 Bytes JMP 5F0A0F5A

    .text C:\WINDOWS\system32\csrss.exe[812] USER32.dll!SetWindowsHookExA 77D702B2 6 Bytes JMP 5F040F5A

    .text C:\WINDOWS\system32\csrss.exe[812] KERNEL32.dll!LoadLibraryExW 7C801AF1 6 Bytes JMP 5F070F5A

    .text C:\WINDOWS\system32\winlogon.exe[844] kernel32.dll!LoadLibraryExW 7C801AF1 6 Bytes JMP 5F070F5A

    .text C:\WINDOWS\system32\winlogon.exe[844] USER32.dll!SetWindowsHookExW 77D6E621 6 Bytes JMP 5F0A0F5A

    .text C:\WINDOWS\system32\winlogon.exe[844] USER32.dll!SetWindowsHookExA 77D702B2 6 Bytes JMP 5F040F5A

    .text C:\WINDOWS\system32\services.exe[888] kernel32.dll!LoadLibraryExW 7C801AF1 6 Bytes JMP 5F070F5A

    .text C:\WINDOWS\system32\services.exe[888] USER32.dll!SetWindowsHookExW 77D6E621 6 Bytes JMP 5F0A0F5A

    .text C:\WINDOWS\system32\services.exe[888] USER32.dll!SetWindowsHookExA 77D702B2 6 Bytes JMP 5F040F5A

    .text C:\WINDOWS\system32\lsass.exe[900] kernel32.dll!LoadLibraryExW 7C801AF1 6 Bytes JMP 5F070F5A

    .text C:\WINDOWS\system32\lsass.exe[900] USER32.dll!SetWindowsHookExW 77D6E621 6 Bytes JMP 5F0A0F5A

    .text C:\WINDOWS\system32\lsass.exe[900] USER32.dll!SetWindowsHookExA 77D702B2 6 Bytes JMP 5F040F5A

    .text C:\Program Files\Common Files\Softwin\BitDefender Scan Server\bdss.exe[952] kernel32.dll!LoadLibraryExW 7C801AF1 6 Bytes JMP 5F070F5A

    .text C:\Program Files\Common Files\Softwin\BitDefender Scan Server\bdss.exe[952] USER32.dll!SetWindowsHookExW 77D6E621 6 Bytes JMP 5F0A0F5A

    .text C:\Program Files\Common Files\Softwin\BitDefender Scan Server\bdss.exe[952] USER32.dll!SetWindowsHookExA 77D702B2 6 Bytes JMP 5F040F5A

    .text C:\WINDOWS\system32\svchost.exe[1060] kernel32.dll!LoadLibraryExW 7C801AF1 6 Bytes JMP 5F070F5A

    .text C:\WINDOWS\system32\svchost.exe[1060] USER32.dll!SetWindowsHookExW 77D6E621 6 Bytes JMP 5F0A0F5A

    .text C:\WINDOWS\system32\svchost.exe[1060] USER32.dll!SetWindowsHookExA 77D702B2 6 Bytes JMP 5F040F5A

    .text C:\WINDOWS\system32\svchost.exe[1128] kernel32.dll!LoadLibraryExW 7C801AF1 6 Bytes JMP 5F070F5A

    .text C:\WINDOWS\system32\svchost.exe[1128] USER32.dll!SetWindowsHookExW 77D6E621 6 Bytes JMP 5F0A0F5A

    .text C:\WINDOWS\system32\svchost.exe[1128] USER32.dll!SetWindowsHookExA 77D702B2 6 Bytes JMP 5F040F5A

    .text C:\WINDOWS\System32\svchost.exe[1188] kernel32.dll!LoadLibraryExW 7C801AF1 6 Bytes JMP 5F070F5A

    .text C:\WINDOWS\System32\svchost.exe[1188] USER32.dll!SetWindowsHookExW 77D6E621 6 Bytes JMP 5F0A0F5A

    .text C:\WINDOWS\System32\svchost.exe[1188] USER32.dll!SetWindowsHookExA 77D702B2 6 Bytes JMP 5F040F5A

    .text C:\Program Files\Spyware Doctor\swdsvc.exe[1244] kernel32.dll!CreateThread + 1A 7C810849 4 Bytes [ CF, 9C, C5, 83 ]

    .text C:\WINDOWS\system32\svchost.exe[1344] kernel32.dll!LoadLibraryExW 7C801AF1 6 Bytes JMP 5F070F5A

    .text C:\WINDOWS\system32\svchost.exe[1344] USER32.dll!SetWindowsHookExW 77D6E621 6 Bytes JMP 5F0A0F5A

    .text C:\WINDOWS\system32\svchost.exe[1344] USER32.dll!SetWindowsHookExA 77D702B2 6 Bytes JMP 5F040F5A

    .text C:\WINDOWS\system32\svchost.exe[1368] kernel32.dll!LoadLibraryExW 7C801AF1 6 Bytes JMP 5F070F5A

    .text C:\WINDOWS\system32\svchost.exe[1368] USER32.dll!SetWindowsHookExW 77D6E621 6 Bytes JMP 5F0A0F5A

    .text C:\WINDOWS\system32\svchost.exe[1368] USER32.dll!SetWindowsHookExA 77D702B2 6 Bytes JMP 5F040F5A

    .text C:\WINDOWS\system32\svchost.exe[1428] kernel32.dll!LoadLibraryExW 7C801AF1 6 Bytes JMP 5F070F5A

    .text C:\WINDOWS\system32\svchost.exe[1428] USER32.dll!SetWindowsHookExW 77D6E621 6 Bytes JMP 5F0A0F5A

    .text C:\WINDOWS\system32\svchost.exe[1428] USER32.dll!SetWindowsHookExA 77D702B2 6 Bytes JMP 5F040F5A

    .text C:\Program Files\Toshiba\Bluetooth Toshiba Stack\TosBtSrv.exe[1472] kernel32.dll!LoadLibraryExW 7C801AF1 6 Bytes JMP 5F070F5A

    .text C:\Program Files\Toshiba\Bluetooth Toshiba Stack\TosBtSrv.exe[1472] USER32.dll!SetWindowsHookExW 77D6E621 6 Bytes JMP 5F0A0F5A

    .text C:\Program Files\Toshiba\Bluetooth Toshiba Stack\TosBtSrv.exe[1472] USER32.dll!SetWindowsHookExA 77D702B2 6 Bytes JMP 5F040F5A

    .text C:\WINDOWS\system32\spoolsv.exe[1504] kernel32.dll!LoadLibraryExW 7C801AF1 6 Bytes JMP 5F070F5A

    .text C:\WINDOWS\system32\spoolsv.exe[1504] USER32.dll!SetWindowsHookExW 77D6E621 6 Bytes JMP 5F0A0F5A

    .text C:\WINDOWS\system32\spoolsv.exe[1504] USER32.dll!SetWindowsHookExA 77D702B2 6 Bytes JMP 5F040F5A

    .text C:\Program Files\Common Files\Softwin\BitDefender Communicator\xcommsvr.exe[1672] kernel32.dll!LoadLibraryExW 7C801AF1 6 Bytes JMP 5F070F5A

    .text C:\Program Files\Common Files\Softwin\BitDefender Communicator\xcommsvr.exe[1672] USER32.dll!SetWindowsHookExW 77D6E621 6 Bytes JMP 5F0A0F5A

    .text C:\Program Files\Common Files\Softwin\BitDefender Communicator\xcommsvr.exe[1672] USER32.dll!SetWindowsHookExA 77D702B2 6 Bytes JMP 5F040F5A

    .text C:\Program Files\Common Files\Softwin\BitDefender Update Service\livesrv.exe[1728] kernel32.dll!LoadLibraryExW 7C801AF1 6 Bytes JMP 5F070F5A

    .text C:\Program Files\Common Files\Softwin\BitDefender Update Service\livesrv.exe[1728] USER32.dll!SetWindowsHookExW 77D6E621 6 Bytes JMP 5F0A0F5A

    .text C:\Program Files\Common Files\Softwin\BitDefender Update Service\livesrv.exe[1728] USER32.dll!SetWindowsHookExA 77D702B2 6 Bytes JMP 5F040F5A

    .text C:\Program Files\a-squared Free\a2service.exe[1848] kernel32.dll!LoadLibraryExW 7C801AF1 6 Bytes JMP 5F070F5A

    .text C:\Program Files\a-squared Free\a2service.exe[1848] USER32.dll!SetWindowsHookExW 77D6E621 6 Bytes JMP 5F0A0F5A

    .text C:\Program Files\a-squared Free\a2service.exe[1848] USER32.dll!SetWindowsHookExA 77D702B2 6 Bytes JMP 5F040F5A

    .text C:\WINDOWS\Explorer.EXE[1920] kernel32.dll!LoadLibraryExW 7C801AF1 6 Bytes JMP 5F070F5A

    .text C:\WINDOWS\Explorer.EXE[1920] USER32.dll!SetWindowsHookExW 77D6E621 6 Bytes JMP 5F0A0F5A

    .text C:\WINDOWS\Explorer.EXE[1920] USER32.dll!SetWindowsHookExA 77D702B2 6 Bytes JMP 5F040F5A

    .text C:\Program Files\COMODO\Firewall\cmdagent.exe[1968] kernel32.dll!LoadLibraryExW 7C801AF1 6 Bytes JMP 5F08001E

    .text C:\Program Files\COMODO\Firewall\cmdagent.exe[1968] USER32.dll!SetWindowsHookExW 77D6E621 6 Bytes JMP 5F0B001E

    .text C:\Program Files\COMODO\Firewall\cmdagent.exe[1968] USER32.dll!SetWindowsHookExA 77D702B2 6 Bytes JMP 5F05001E

    .text C:\Program Files\Softwin\BitDefender10\vsserv.exe[2192] kernel32.dll!LoadLibraryExW 7C801AF1 6 Bytes JMP 5F070F5A

    .text C:\Program Files\Softwin\BitDefender10\vsserv.exe[2192] USER32.dll!SetWindowsHookExW 77D6E621 6 Bytes JMP 5F0A0F5A

    .text C:\Program Files\Softwin\BitDefender10\vsserv.exe[2192] USER32.dll!SetWindowsHookExA 77D702B2 6 Bytes JMP 5F040F5A

    .text C:\WINDOWS\System32\alg.exe[2848] kernel32.dll!LoadLibraryExW 7C801AF1 6 Bytes JMP 5F070F5A

    .text C:\WINDOWS\System32\alg.exe[2848] kernel32.dll!FreeLibrary + 15 7C80AA7B 4 Bytes [ BD, 55, EF, F4 ]

    .text C:\WINDOWS\System32\alg.exe[2848] USER32.dll!SetWindowsHookExW 77D6E621 6 Bytes JMP 5F0A0F5A

    .text C:\WINDOWS\System32\alg.exe[2848] USER32.dll!SetWindowsHookExA 77D702B2 6 Bytes JMP 5F040F5A

    .text C:\WINDOWS\system32\wuauclt.exe[3380] kernel32.dll!LoadLibraryExW 7C801AF1 6 Bytes JMP 5F070F5A

    .text C:\WINDOWS\system32\wuauclt.exe[3380] kernel32.dll!LoadLibraryA 7C801D77 5 Bytes JMP 10003090 C:\WINDOWS\system32\sockspy.dll

    .text C:\WINDOWS\system32\wuauclt.exe[3380] kernel32.dll!FreeLibrary + 15 7C80AA7B 4 Bytes [ BD, 55, EF, F4 ]

    .text C:\WINDOWS\system32\wuauclt.exe[3380] USER32.dll!SetWindowsHookExW 77D6E621 6 Bytes JMP 5F0A0F5A

    .text C:\WINDOWS\system32\wuauclt.exe[3380] USER32.dll!SetWindowsHookExA 77D702B2 6 Bytes JMP 5F040F5A



    ---- Kernel IAT/EAT - GMER 1.0.14 ----



    IAT \SystemRoot\system32\DRIVERS\ndiswan.sys[NDIS.SYS!NdisCloseAdapter] [BA60D710] inspect.sys (COMODO Firewall Pro Firewall Driver/COMODO)

    IAT \SystemRoot\system32\DRIVERS\ndiswan.sys[NDIS.SYS!NdisOpenAdapter] [BA60D770] inspect.sys (COMODO Firewall Pro Firewall Driver/COMODO)

    IAT \SystemRoot\system32\DRIVERS\ndiswan.sys[NDIS.SYS!NdisDeregisterProtocol] [BA60D990] inspect.sys (COMODO Firewall Pro Firewall Driver/COMODO)

    IAT \SystemRoot\system32\DRIVERS\ndiswan.sys[NDIS.SYS!NdisRegisterProtocol] [BA60D950] inspect.sys (COMODO Firewall Pro Firewall Driver/COMODO)

    IAT \SystemRoot\system32\DRIVERS\raspppoe.sys[NDIS.SYS!NdisRegisterProtocol] [BA60D950] inspect.sys (COMODO Firewall Pro Firewall Driver/COMODO)

    IAT \SystemRoot\system32\DRIVERS\raspppoe.sys[NDIS.SYS!NdisOpenAdapter] [BA60D770] inspect.sys (COMODO Firewall Pro Firewall Driver/COMODO)

    IAT \SystemRoot\system32\DRIVERS\raspppoe.sys[NDIS.SYS!NdisCloseAdapter] [BA60D710] inspect.sys (COMODO Firewall Pro Firewall Driver/COMODO)

    IAT \SystemRoot\system32\DRIVERS\raspppoe.sys[NDIS.SYS!NdisDeregisterProtocol] [BA60D990] inspect.sys (COMODO Firewall Pro Firewall Driver/COMODO)

    IAT \SystemRoot\system32\DRIVERS\psched.sys[NDIS.SYS!NdisDeregisterProtocol] [BA60D990] inspect.sys (COMODO Firewall Pro Firewall Driver/COMODO)

    IAT \SystemRoot\system32\DRIVERS\psched.sys[NDIS.SYS!NdisRegisterProtocol] [BA60D950] inspect.sys (COMODO Firewall Pro Firewall Driver/COMODO)

    IAT \SystemRoot\system32\DRIVERS\psched.sys[NDIS.SYS!NdisOpenAdapter] [BA60D770] inspect.sys (COMODO Firewall Pro Firewall Driver/COMODO)

    IAT \SystemRoot\system32\DRIVERS\psched.sys[NDIS.SYS!NdisCloseAdapter] [BA60D710] inspect.sys (COMODO Firewall Pro Firewall Driver/COMODO)

    IAT \SystemRoot\System32\Drivers\NDProxy.SYS[NDIS.SYS!NdisRegisterProtocol] [BA60D950] inspect.sys (COMODO Firewall Pro Firewall Driver/COMODO)

    IAT \SystemRoot\System32\Drivers\NDProxy.SYS[NDIS.SYS!NdisCloseAdapter] [BA60D710] inspect.sys (COMODO Firewall Pro Firewall Driver/COMODO)

    IAT \SystemRoot\System32\Drivers\NDProxy.SYS[NDIS.SYS!NdisOpenAdapter] [BA60D770] inspect.sys (COMODO Firewall Pro Firewall Driver/COMODO)

    IAT \SystemRoot\System32\Drivers\NDProxy.SYS[NDIS.SYS!NdisDeregisterProtocol] [BA60D990] inspect.sys (COMODO Firewall Pro Firewall Driver/COMODO)

    IAT \SystemRoot\system32\DRIVERS\tcpip.sys[NDIS.SYS!NdisCloseAdapter] [BA60D710] inspect.sys (COMODO Firewall Pro Firewall Driver/COMODO)

    IAT \SystemRoot\system32\DRIVERS\tcpip.sys[NDIS.SYS!NdisRegisterProtocol] [BA60D950] inspect.sys (COMODO Firewall Pro Firewall Driver/COMODO)

    IAT \SystemRoot\system32\DRIVERS\tcpip.sys[NDIS.SYS!NdisOpenAdapter] [BA60D770] inspect.sys (COMODO Firewall Pro Firewall Driver/COMODO)

    IAT \SystemRoot\system32\DRIVERS\wanarp.sys[NDIS.SYS!NdisDeregisterProtocol] [BA60D990] inspect.sys (COMODO Firewall Pro Firewall Driver/COMODO)

    IAT \SystemRoot\system32\DRIVERS\wanarp.sys[NDIS.SYS!NdisRegisterProtocol] [BA60D950] inspect.sys (COMODO Firewall Pro Firewall Driver/COMODO)

    IAT \SystemRoot\system32\DRIVERS\wanarp.sys[NDIS.SYS!NdisOpenAdapter] [BA60D770] inspect.sys (COMODO Firewall Pro Firewall Driver/COMODO)

    IAT \SystemRoot\system32\DRIVERS\wanarp.sys[NDIS.SYS!NdisCloseAdapter] [BA60D710] inspect.sys (COMODO Firewall Pro Firewall Driver/COMODO)

    IAT \SystemRoot\system32\DRIVERS\arp1394.sys[NDIS.SYS!NdisCloseAdapter] [BA60D710] inspect.sys (COMODO Firewall Pro Firewall Driver/COMODO)

    IAT \SystemRoot\system32\DRIVERS\arp1394.sys[NDIS.SYS!NdisOpenAdapter] [BA60D770] inspect.sys (COMODO Firewall Pro Firewall Driver/COMODO)

    IAT \SystemRoot\system32\DRIVERS\arp1394.sys[NDIS.SYS!NdisDeregisterProtocol] [BA60D990] inspect.sys (COMODO Firewall Pro Firewall Driver/COMODO)

    IAT \SystemRoot\system32\DRIVERS\arp1394.sys[NDIS.SYS!NdisRegisterProtocol] [BA60D950] inspect.sys (COMODO Firewall Pro Firewall Driver/COMODO)

    IAT \SystemRoot\system32\DRIVERS\nwlnkipx.sys[NDIS.SYS!NdisDeregisterProtocol] [BA60D990] inspect.sys (COMODO Firewall Pro Firewall Driver/COMODO)

    IAT \SystemRoot\system32\DRIVERS\nwlnkipx.sys[NDIS.SYS!NdisCloseAdapter] [BA60D710] inspect.sys (COMODO Firewall Pro Firewall Driver/COMODO)

    IAT \SystemRoot\system32\DRIVERS\nwlnkipx.sys[NDIS.SYS!NdisOpenAdapter] [BA60D770] inspect.sys (COMODO Firewall Pro Firewall Driver/COMODO)

    IAT \SystemRoot\system32\DRIVERS\nwlnkipx.sys[NDIS.SYS!NdisRegisterProtocol] [BA60D950] inspect.sys (COMODO Firewall Pro Firewall Driver/COMODO)

    IAT \SystemRoot\system32\DRIVERS\ndisuio.sys[NDIS.SYS!NdisRegisterProtocol] [BA60D950] inspect.sys (COMODO Firewall Pro Firewall Driver/COMODO)

    IAT \SystemRoot\system32\DRIVERS\ndisuio.sys[NDIS.SYS!NdisDeregisterProtocol] [BA60D990] inspect.sys (COMODO Firewall Pro Firewall Driver/COMODO)

    IAT \SystemRoot\system32\DRIVERS\ndisuio.sys[NDIS.SYS!NdisCloseAdapter] [BA60D710] inspect.sys (COMODO Firewall Pro Firewall Driver/COMODO)

    IAT \SystemRoot\system32\DRIVERS\ndisuio.sys[NDIS.SYS!NdisOpenAdapter] [BA60D770] inspect.sys (COMODO Firewall Pro Firewall Driver/COMODO)



    ---- Devices - GMER 1.0.14 ----



    AttachedDevice \FileSystem\Ntfs \Ntfs ikfileflt.sys (PCTools Research Pty Ltd.)

    AttachedDevice \Driver\Tcpip \Device\Ip cmdhlp.sys (COMODO Firewall Pro Helper Driver/COMODO)

    AttachedDevice \Driver\Tcpip \Device\Tcp cmdhlp.sys (COMODO Firewall Pro Helper Driver/COMODO)

    AttachedDevice \Driver\Tcpip \Device\Udp cmdhlp.sys (COMODO Firewall Pro Helper Driver/COMODO)

    AttachedDevice \Driver\Tcpip \Device\RawIp cmdhlp.sys (COMODO Firewall Pro Helper Driver/COMODO)



    ---- EOF - GMER 1.0.14 ----
     
    Last edited: Jun 14, 2008
  12. cdavfrew

    cdavfrew Regular member

    Joined:
    May 19, 2008
    Messages:
    1,183
    Likes Received:
    0
    Trophy Points:
    46
    Hey vlady.

    Except for these entries in A-squared, you can remove the rest.

    C:\Documents and Settings\Administrator\Desktop\SDFix.exe/Process.exe detected: Riskware.RiskTool.Win32.Processor.20

    C:\Program Files\COMODO\Firewall\s1.tmp detected: Riskware.AdTool.Win32.MyWebSearch.bn

    C:\SDFix\apps\Process.exe detected: Riskware.RiskTool.Win32.Processor.20


    To entirely rule out this problem as a malware one, we have to do two more steps.

    1. Follow Ltangel's instructions on downloading and running Combofix in this thread: http://forums.afterdawn.com/thread_view.cfm/639221 Post the log here.

    2. Two alternatives:

    a. Please download Antivir Rescue CD from here http://dl.antivir.de/down/vdf/rescuecd/rescuecd.exe

    - download it to a clean system (other than your infected computer)
    - launch rescuecd.exe file and place a blank CD in your writer unit
    - choose your burning device from the drop down list and press burn button. Please wait unitl disc is created. At the end you should see a success message
    - place the rescue disc in the infected computer and boot from it. Choose optiopn 2 (Boot from Rescue CD)
    - choose English language and watch the progress at the end of the boot, you should see a menu
    - choose the second option: "Scan your system with AntiVir"

    b.
    Download Antivir Free, install it, and update it. In my opinion, Antivir has the best antivirus engine, and superior malware detection. You can read about it on Av-Comparatives.org. After that, right click on the Antivir icon in your task bar, click on Configure Antivir, and make sure Expert Mode is checked. Go to General, Extended Threat Categories, and make sure everything but APPL is checked. Then go to Scanner, Scan, Action for concerning files, and set primary action to quarantine. Do a scan with Antivir, and post the log here.

    If you still have the internet explorer problem, it probably is a setting set in the registry. We'll figure that out later.

    Best Regards :D

    PS: You've been doing great!
     
  13. vlady1027

    vlady1027 Member

    Joined:
    Jun 11, 2008
    Messages:
    9
    Likes Received:
    0
    Trophy Points:
    11
    cdavfrew - many thanks!

    1. Removed all entries except the three mentioned.
    2. Downloaded and installed ComboFix as per instructions.
    I ran it and then realized that I have Bit Defender still running
    in the background. So I disabled all the AV and Firewalls and ran
    it again
    Here is the log:

    ComboFix 08-06-15.1 - Administrator 2008-06-15 17:12:21.2 - NTFSx86

    Microsoft Windows XP Professional 5.1.2600.2.1252.1.1033.18.1682 [GMT -7:00]

    Running from: C:\Documents and Settings\Administrator\Desktop\Combo-Fix.exe



    WARNING -THIS MACHINE DOES NOT HAVE THE RECOVERY CONSOLE INSTALLED !!

    .



    ((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))

    .

    .

    ---- Previous Run -------

    .

    C:\WINDOWS\BM4b85e646.xml

    C:\WINDOWS\pskt.ini

    C:\WINDOWS\system32\mcrh.tmp



    .

    ((((((((((((((((((((((((( Files Created from 2008-05-16 to 2008-06-16 )))))))))))))))))))))))))))))))

    .



    2008-06-14 13:19 . 2008-06-15 16:06 250 --a------ C:\WINDOWS\gmer.ini

    2008-06-14 12:30 . 2008-06-14 13:09 <DIR> d-------- C:\Program Files\a-squared Free

    2008-06-14 12:26 . 2008-06-14 12:26 <DIR> d-------- C:\!KillBox

    2008-06-12 17:22 . 2008-06-12 17:29 <DIR> d-------- C:\Program Files\CCleaner

    2008-06-12 15:53 . 2008-06-12 15:54 <DIR> d-------- C:\WINDOWS\ERUNT

    2008-06-12 15:49 . 2008-06-12 16:03 <DIR> d-------- C:\SDFix

    2008-06-12 15:40 . 2008-06-12 15:40 <DIR> d-------- C:\VundoFix Backups

    2008-06-12 11:16 . 2008-06-12 11:20 <DIR> d-------- C:\MGtools

    2008-06-12 11:11 . 2005-01-13 19:41 11,254 --a------ C:\WINDOWS\system32\locate.com

    2008-06-12 11:09 . 2008-06-12 11:20 34,779 --a------ C:\MGlogs.zip

    2008-06-12 10:17 . 2008-06-12 10:17 <DIR> d-------- C:\Program Files\Trend Micro

    2008-06-11 22:42 . 2008-06-11 22:43 <DIR> d-------- C:\ComboFix

    2008-06-11 13:40 . 2008-06-11 13:40 143,104 --a------ C:\WINDOWS\system32\guard32.dll

    2008-06-11 13:40 . 2008-06-11 13:40 87,056 --a------ C:\WINDOWS\system32\drivers\cmdguard.sys

    2008-06-11 13:40 . 2008-06-11 13:40 24,208 --a------ C:\WINDOWS\system32\drivers\cmdhlp.sys

    2008-06-11 12:14 . 2008-06-11 12:14 <DIR> d-------- C:\Program Files\Malwarebytes' Anti-Malware

    2008-06-11 12:14 . 2008-06-11 12:14 <DIR> d-------- C:\Documents and Settings\All Users\Application Data\Malwarebytes

    2008-06-11 12:14 . 2008-06-11 12:14 <DIR> d-------- C:\Documents and Settings\Administrator\Application Data\Malwarebytes

    2008-06-11 12:14 . 2008-06-10 19:02 34,296 --a------ C:\WINDOWS\system32\drivers\mbamcatchme.sys

    2008-06-11 12:14 . 2008-06-10 19:02 15,864 --a------ C:\WINDOWS\system32\drivers\mbam.sys

    2008-06-11 07:49 . 2008-06-11 07:49 <DIR> d-------- C:\Program Files\SUPERAntiSpyware

    2008-06-11 07:49 . 2008-06-11 07:49 <DIR> d-------- C:\Documents and Settings\All Users\Application Data\SUPERAntiSpyware.com

    2008-06-11 07:49 . 2008-06-11 07:49 <DIR> d-------- C:\Documents and Settings\Administrator\Application Data\SUPERAntiSpyware.com

    2008-06-11 07:48 . 2008-06-11 07:48 <DIR> d-------- C:\Program Files\Common Files\Wise Installation Wizard

    2008-06-11 07:11 . 2008-06-14 12:34 <DIR> d-------- C:\Program Files\Spyware Doctor

    2008-06-11 07:11 . 2008-06-11 07:11 <DIR> d-------- C:\Program Files\Common Files\PC Tools

    2008-06-11 07:11 . 2008-06-11 07:11 <DIR> d-------- C:\Documents and Settings\All Users\Application Data\PC Tools

    2008-06-11 07:11 . 2008-06-11 07:11 <DIR> d-------- C:\Documents and Settings\Administrator\Application Data\PC Tools

    2008-06-11 07:11 . 2008-06-11 07:17 83,536 --a------ C:\WINDOWS\system32\drivers\iksyssec.sys

    2008-06-11 07:11 . 2008-06-11 07:16 59,984 --a------ C:\WINDOWS\system32\drivers\iksysflt.sys

    2008-06-11 07:11 . 2008-06-11 07:15 52,304 --a------ C:\WINDOWS\system32\drivers\ikfilesec.sys

    2008-06-11 07:11 . 2008-06-11 07:15 39,248 --a------ C:\WINDOWS\system32\drivers\ikfileflt.sys

    2008-06-11 07:11 . 2008-06-11 07:15 26,064 --a------ C:\WINDOWS\system32\drivers\kcom.sys

    2008-06-10 02:50 . 2006-02-28 05:00 10,129,408 --a--c--- C:\WINDOWS\system32\dllcache\hwxkor.dll

    2008-06-10 02:49 . 2006-02-28 05:00 13,463,552 --a--c--- C:\WINDOWS\system32\dllcache\hwxjpn.dll

    2008-06-10 02:48 . 2004-05-13 00:39 876,653 --a--c--- C:\WINDOWS\system32\dllcache\fp4awel.dll

    2008-06-10 02:44 . 2008-06-10 02:44 749 -rah----- C:\WINDOWS\WindowsShell.Manifest

    2008-06-10 02:44 . 2008-06-10 02:44 749 -rah----- C:\WINDOWS\system32\wuaucpl.cpl.manifest

    2008-06-10 02:44 . 2008-06-10 02:44 749 -rah----- C:\WINDOWS\system32\sapi.cpl.manifest

    2008-06-10 02:44 . 2008-06-10 02:44 749 -rah----- C:\WINDOWS\system32\nwc.cpl.manifest

    2008-06-10 02:44 . 2008-06-10 02:44 749 -rah----- C:\WINDOWS\system32\ncpa.cpl.manifest

    2008-06-10 02:44 . 2008-06-10 02:44 488 -rah----- C:\WINDOWS\system32\logonui.exe.manifest

    2008-06-10 02:43 . 2006-02-28 05:00 16,384 --a--c--- C:\WINDOWS\system32\dllcache\isignup.exe

    2008-06-10 01:57 . 2006-02-28 05:00 24,661 --a------ C:\WINDOWS\system32\spxcoins.dll

    2008-06-10 01:57 . 2006-02-28 05:00 24,661 --a--c--- C:\WINDOWS\system32\dllcache\spxcoins.dll

    2008-06-10 01:57 . 2006-02-28 05:00 13,312 --a------ C:\WINDOWS\system32\irclass.dll

    2008-06-10 01:57 . 2006-02-28 05:00 13,312 --a--c--- C:\WINDOWS\system32\dllcache\irclass.dll

    2008-06-10 01:36 . 2008-06-10 01:36 <DIR> d-------- C:\$WIN_NT$.~BT

    2008-06-10 01:25 . 2006-02-28 05:00 471,971 -ra------ C:\txtsetup.sif

    2008-06-10 01:25 . 2006-02-28 05:00 260,272 -ra------ C:\$LDR$

    2008-06-10 01:14 . 2008-06-10 01:14 <DIR> d-------- C:\Documents and Settings\All Users\Application Data\Nero

    2008-06-10 01:14 . 2008-06-12 10:09 <DIR> d-------- C:\Documents and Settings\All Users\Application Data\Apple Computer

    2008-06-10 01:14 . 2008-06-10 01:14 <DIR> d-------- C:\Documents and Settings\Administrator\Application Data\Nero

    2008-06-03 22:14 . 2008-06-11 14:09 <DIR> d-------- C:\Documents and Settings\All Users\Application Data\comodo

    2008-06-03 22:14 . 2008-06-03 22:14 <DIR> d-------- C:\Documents and Settings\Administrator\Application Data\Comodo

    2008-06-03 22:13 . 2008-06-03 22:13 <DIR> d-------- C:\Program Files\COMODO

    2008-05-28 04:20 . 2008-05-28 04:20 36,708 --ah----- C:\WINDOWS\system32\mlfcache.dat

    2008-05-24 03:04 . 2008-05-24 03:06 <DIR> d-------- C:\Program Files\Microsoft Windows OneCare Live

    2008-05-24 02:04 . 2008-05-24 02:04 <DIR> d-------- C:\Program Files\Magellan

    2008-05-24 01:27 . 2008-05-24 02:04 <DIR> d-------- C:\Program Files\Common Files\Nero

    2008-05-22 21:49 . 2008-05-22 21:49 7,680 --ahs---- C:\WINDOWS\Thumbs.db

    2008-05-21 15:16 . 2003-06-18 17:31 17,920 --a------ C:\WINDOWS\system32\mdimon.dll

    2008-05-21 15:16 . 2008-05-21 15:16 376 --a------ C:\WINDOWS\ODBC.INI

    2008-05-21 15:15 . 2008-05-21 15:15 <DIR> d-------- C:\Program Files\Microsoft.NET

    2008-05-21 15:14 . 2008-05-21 15:15 <DIR> d--h----- C:\WINDOWS\ShellNew

    2008-05-21 15:14 . 2008-05-21 15:14 <DIR> d-------- C:\Program Files\Microsoft ActiveSync

    2008-05-21 15:10 . 2008-05-21 15:10 <DIR> dr-h----- C:\MSOCache

    2008-05-21 15:03 . 2008-06-10 00:50 <DIR> d-------- C:\Program Files\uTorrent



    .

    (((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))

    .

    2008-06-16 00:13 81,984 ----a-w C:\WINDOWS\system32\bdod.bin

    2008-06-15 22:16 --------- d---a-w C:\Documents and Settings\All Users\Application Data\TEMP

    2008-06-11 20:14 --------- d-----w C:\Program Files\Google

    2008-06-11 12:25 --------- d--h--r C:\Documents and Settings\All Users\Application Data\yahoo!

    2008-05-28 07:18 --------- d-----w C:\Documents and Settings\Administrator\Application Data\Apple Computer

    2008-05-27 10:06 --------- d-----w C:\Program Files\Windows Media Connect 2

    2008-05-27 10:06 --------- d-----w C:\Program Files\DivX

    2008-05-24 07:21 --------- d--h--w C:\Program Files\InstallShield Installation Information

    2008-05-23 22:00 --------- d-----w C:\Program Files\Norton Security Scan

    2008-05-21 22:04 --------- d-----w C:\Program Files\Common Files\Adobe

    2008-05-13 01:53 524,288 ----a-w C:\WINDOWS\system32\DivXsm.exe

    2008-05-13 01:53 3,596,288 ----a-w C:\WINDOWS\system32\qt-dx331.dll

    2008-05-13 01:51 200,704 ----a-w C:\WINDOWS\system32\ssldivx.dll

    2008-05-13 01:51 1,044,480 ----a-w C:\WINDOWS\system32\libdivx.dll

    2008-05-13 01:49 161,096 ----a-w C:\WINDOWS\system32\DivXCodecVersionChecker.exe

    2008-05-13 01:49 12,288 ----a-w C:\WINDOWS\system32\DivXWMPExtType.dll

    2008-05-08 09:24 --------- d-----w C:\Program Files\VideoLAN

    2008-05-08 09:24 --------- d-----w C:\Documents and Settings\Administrator\Application Data\vlc

    2008-05-01 05:04 --------- d-----w C:\Documents and Settings\Administrator\Application Data\DivX

    .




    3. Downloaded and ran AntiVir Free. Followed all your directions.
    The only thing here is that during the run it prompted me to
    choose the action couple of times and I chose to Quarantine.
    Here is the log:





    Avira AntiVir Personal

    Report file date: 2008-06-15 18:00



    Scanning for 1165085 virus strains and unwanted programs.



    Licensed to: Avira AntiVir PersonalEdition Classic

    Serial number: 0000149996-ADJIE-0001

    Platform: Windows XP

    Windows version: (Service Pack 2) [5.1.2600]

    Boot mode: Normally booted

    Username: SYSTEM

    Computer name: YOUR-0D78F39FCD



    Version information:

    BUILD.DAT : 8.1.00.295 16479 Bytes 2008-04-09 16:24:00

    AVSCAN.EXE : 8.1.2.12 311553 Bytes 2008-03-18 18:02:56

    AVSCAN.DLL : 8.1.1.0 53505 Bytes 2008-02-07 17:43:37

    LUKE.DLL : 8.1.2.9 151809 Bytes 2008-02-28 17:41:23

    LUKERES.DLL : 8.1.2.1 12033 Bytes 2008-02-21 17:28:40

    ANTIVIR0.VDF : 6.40.0.0 11030528 Bytes 2007-07-18 19:33:34

    ANTIVIR1.VDF : 7.0.3.2 5447168 Bytes 2008-03-07 22:08:58

    ANTIVIR2.VDF : 7.0.3.62 337408 Bytes 2008-03-21 04:12:34

    ANTIVIR3.VDF : 7.0.3.68 57856 Bytes 2008-03-25 17:27:50

    Engineversion : 8.1.0.28

    AEVDF.DLL : 8.1.0.5 102772 Bytes 2008-02-25 18:58:21

    AESCRIPT.DLL : 8.1.0.19 229754 Bytes 2008-04-08 00:34:44

    AESCN.DLL : 8.1.0.12 115060 Bytes 2008-04-08 00:34:44

    AERDL.DLL : 8.1.0.19 418164 Bytes 2008-04-08 00:34:44

    AEPACK.DLL : 8.1.1.0 364918 Bytes 2008-03-18 20:20:42

    AEOFFICE.DLL : 8.1.0.15 192889 Bytes 2008-04-08 00:34:44

    AEHEUR.DLL : 8.1.0.15 1147253 Bytes 2008-04-08 00:34:44

    AEHELP.DLL : 8.1.0.11 115061 Bytes 2008-04-08 00:34:43

    AEGEN.DLL : 8.1.0.15 299379 Bytes 2008-04-08 00:34:43

    AEEMU.DLL : 8.1.0.5 430450 Bytes 2008-04-08 00:34:43

    AECORE.DLL : 8.1.0.25 168309 Bytes 2008-04-08 18:58:32

    AVWINLL.DLL : 1.0.0.7 14593 Bytes 2008-01-24 02:07:53

    AVPREF.DLL : 8.0.0.1 25857 Bytes 2008-02-18 19:37:50

    AVREP.DLL : 7.0.0.1 155688 Bytes 2007-04-16 22:26:47

    AVREG.DLL : 8.0.0.0 30977 Bytes 2008-01-24 02:07:49

    AVARKT.DLL : 1.0.0.23 307457 Bytes 2008-02-12 17:29:23

    AVEVTLOG.DLL : 8.0.0.11 114945 Bytes 2008-02-28 17:31:31

    SQLITE3.DLL : 3.3.17.1 339968 Bytes 2008-01-23 02:28:02

    SMTPLIB.DLL : 1.2.0.19 28929 Bytes 2008-01-24 02:08:39

    NETNT.DLL : 8.0.0.1 7937 Bytes 2008-01-25 21:05:10

    RCIMAGE.DLL : 8.0.0.35 2371841 Bytes 2008-03-10 23:37:25

    RCTEXT.DLL : 8.0.32.0 86273 Bytes 2008-03-06 21:02:11



    Configuration settings for the scan:

    Jobname..........................: Complete system scan

    Configuration file...............: C:\Program Files\Avira\AntiVir PersonalEdition Classic\sysscan.avp

    Logging..........................: low

    Primary action...................: quarantine

    Secondary action.................: ignore

    Scan master boot sector..........: on

    Scan boot sector.................: on

    Boot sectors.....................: C:,

    Scan memory......................: on

    Process scan.....................: on

    Scan registry....................: on

    Search for rootkits..............: off

    Scan all files...................: All files

    Scan archives....................: on

    Recursion depth..................: 20

    Smart extensions.................: on

    Macro heuristic..................: on

    File heuristic...................: medium

    Deviating risk categories........: +GAME,+JOKE,+PCK,+SPR,



    Start of the scan: 2008-06-15 18:00



    The scan of running processes will be started

    Scan process 'avscan.exe' - '1' Module(s) have been scanned

    Scan process 'avcenter.exe' - '1' Module(s) have been scanned

    Scan process 'avgnt.exe' - '1' Module(s) have been scanned

    Scan process 'avguard.exe' - '1' Module(s) have been scanned

    Scan process 'sched.exe' - '1' Module(s) have been scanned

    Scan process 'wuauclt.exe' - '1' Module(s) have been scanned

    Scan process 'SUPERAntiSpyware.exe' - '1' Module(s) have been scanned

    Scan process 'ctfmon.exe' - '1' Module(s) have been scanned

    Scan process 'RTHDCPL.exe' - '1' Module(s) have been scanned

    Scan process 'alg.exe' - '1' Module(s) have been scanned

    Scan process 'vsserv.exe' - '1' Module(s) have been scanned

    Scan process 'livesrv.exe' - '1' Module(s) have been scanned

    Scan process 'bdss.exe' - '1' Module(s) have been scanned

    Scan process 'xcommsvr.exe' - '1' Module(s) have been scanned

    Scan process 'TosBtSrv.exe' - '1' Module(s) have been scanned

    Scan process 'svchost.exe' - '1' Module(s) have been scanned

    Scan process 'o2flash.exe' - '1' Module(s) have been scanned

    Scan process 'nvsvc32.exe' - '1' Module(s) have been scanned

    Scan process 'edd.exe' - '1' Module(s) have been scanned

    Scan process 'explorer.exe' - '1' Module(s) have been scanned

    Scan process 'cmdagent.exe' - '1' Module(s) have been scanned

    Scan process 'a2service.exe' - '1' Module(s) have been scanned

    Scan process 'spoolsv.exe' - '1' Module(s) have been scanned

    Scan process 'svchost.exe' - '1' Module(s) have been scanned

    Scan process 'svchost.exe' - '1' Module(s) have been scanned

    Scan process 'svchost.exe' - '1' Module(s) have been scanned

    Scan process 'svchost.exe' - '1' Module(s) have been scanned

    Scan process 'svchost.exe' - '1' Module(s) have been scanned

    Scan process 'lsass.exe' - '1' Module(s) have been scanned

    Scan process 'services.exe' - '1' Module(s) have been scanned

    Scan process 'winlogon.exe' - '1' Module(s) have been scanned

    Scan process 'csrss.exe' - '1' Module(s) have been scanned

    Scan process 'smss.exe' - '1' Module(s) have been scanned

    33 processes with 33 modules were scanned



    Starting master boot sector scan:

    Master boot sector HD0

    [INFO] No virus was found!



    Start scanning boot sectors:

    Boot sector 'C:\'

    [INFO] No virus was found!



    Starting to scan the registry.

    The registry was scanned ( '23' files ).





    Starting the file scan:



    Begin scan in 'C:\'

    C:\pagefile.sys

    [WARNING] The file could not be opened!

    C:\Combo-Fix\pv.cfexe

    [DETECTION] Contains detection pattern of the SPR/Tool.PV program

    [WARNING] An error has occurred and the file was not deleted. ErrorID: 26003

    [WARNING]

    C:\Documents and Settings\Administrator\Desktop\Combo-Fix.exe

    [DETECTION] Contains detection pattern of the SPR/Tool.PV program

    [NOTE] The file was moved to '48c2bbd2.qua'!

    C:\System Volume Information\_restore{C2ABF6B2-AAE1-4CFF-A1C7-9163185EF5CE}\RP12\A0007156.exe

    [DETECTION] Contains detection pattern of the SPR/Tool.PV program

    [NOTE] The file was moved to '4885bfe7.qua'!

    C:\System Volume Information\_restore{C2ABF6B2-AAE1-4CFF-A1C7-9163185EF5CE}\RP8\A0002221.dll

    [DETECTION] Is the Trojan horse TR/Trash.Gen

    [WARNING] An error has occurred and the file was not deleted. ErrorID: 26003

    [WARNING]

    C:\System Volume Information\_restore{C2ABF6B2-AAE1-4CFF-A1C7-9163185EF5CE}\RP8\A0002222.dll

    [DETECTION] Is the Trojan horse TR/Trash.Gen

    [WARNING] An error has occurred and the file was not deleted. ErrorID: 26003

    [WARNING]





    End of the scan: 2008-06-15 18:39

    Used time: 39:08 min



    The scan has been done completely.



    3570 Scanning directories

    166475 Files were scanned

    5 viruses and/or unwanted programs were found

    0 Files were classified as suspicious:

    0 files were deleted

    0 files were repaired

    2 files were moved to quarantine

    0 files were renamed

    1 Files cannot be scanned

    166470 Files not concerned

    870 Archives were scanned

    4 Warnings

    2 Notes




    Thanks for sticking around!
     
  14. cdavfrew

    cdavfrew Regular member

    Joined:
    May 19, 2008
    Messages:
    1,183
    Likes Received:
    0
    Trophy Points:
    46
    Hey vlady.

    You're welcome. From the way you are doing, you deserve the help.

    We've now officially ruled out the problem as malware. Apparently, Vundo did something to your system, and we have to find out what that is. Please note that it might never be able to be removed, or reversed, and even a format would be necessary, but we'll try our best.

    First of all, upgrade Internet Explorer 6 to 7. This will close many security holes in your browser, preventing more infection, and also, the reinstall of a browser may do it good.

    Secondly, download Advanced Windowscare Personal, update it fully, and scan your computer with it. This program scans for problems in system settings, security, and such.

    Third, I don't suppose you have a system restore from before this entire infection. If you do, that will be worth a try.

    Best Regards :D
     
  15. vlady1027

    vlady1027 Member

    Joined:
    Jun 11, 2008
    Messages:
    9
    Likes Received:
    0
    Trophy Points:
    11
    Hello cdavfrew!

    I enabled internet connection on infected machine.
    All the symptoms remained. I am able to connect to the home page and that's about it. Every time I try to go to a different website - there is another blank window pops up and prevents me of going anywhere else.

    I think from now on I think it is safe to say that the only solution to the problem is to format and reinstall the OS. I think that's the way I am going to go about it. Especially after you mentioned that there is a possibility of a virus remaining in the system after all the clean up.

    I will recommend my brother to buy an XP disk and start from the scratch. Better yet I will have him install Ubuntu Hardy along with XP - just like I do.

    Anyways! Thanks for all your help!
     
  16. cdavfrew

    cdavfrew Regular member

    Joined:
    May 19, 2008
    Messages:
    1,183
    Likes Received:
    0
    Trophy Points:
    46
    Hey vlady.

    Sorry to hear about the choice to format. However, there are some things your brother can do to prevent another infection!

    I recommend Antivir as a free antivirus, which has superb detection, fast scan speeds, and low memory consumption. Check AV-Comparatives.

    For spyware protection, Superantispyware Free is a good choice. Even though there isn't the real-time protection which is offered in the Professional version and other free antispywares, it has a superior protection rate than the others and is great as an on-demand scanner.

    Firewalls are important too. Comodo, Online Armor, and Zonealarm all make great free alternatives. However, if you are looking for something less memory consuming, I would say that Filseclab Firewall is the next best. Combined with Windows Firewall, they make a great team.

    Internet Explorer probably is a secure enough browser, but you can make it even safer by immunizing it, which inclues SpywareBlaster, Spybot SDHelper, and a good hosts file like MVPS and HP Hosts files, all of which you can use to block bad websites. The website immunization feature in Advanced Windowscare is pretty good as well.

    Hope to have given you some useful information for the new system setup of your brother's laptop!

    Best Regards :D
     

Share This Page