Generic FakeAlert.k

January 27th, 2020

Hi, my McAfee has picked up Generic Fakealert.k & quarantines it everytime but of course this just keeps reoccuring??? Can anyone please help me get rid of this thing? This affects google on comp, redirects to pop ups instead of related site, maybe stops my downloading as I have had many problems with that stopping recently. Have googled for help but nothing that I can relate to yet, or that I’m capable of using lol. Thanks for reading this & will worship a positve result in getting rid of it
Answer #1
I’m not a pro at this but, Try going on safe mode and doing a full scan to your computer.
And make sure your security is up to date.
Answer #2
thanks for trying to help, i have tried safe mode & done a full scan, this found another problem, DNSChanger!k , DNSChanger.r & Generic Rootkit.d!rootkit. Security is supposedly up to date, using updates on mcAfee. Quarantined 3 & removed 1 but back comes the fakealert.k!!!
Will try it again now though, Cheers
Answer #3
Lets remove it shall we, please do the following:
Please download the current version of HijackThis from here: http://download.bleepingcomputer.com/hijackthis/HJTInstall.exe

  • Double click and run the installer.
  • It will install to C:\Program Files\Trend Micro\HijackThis\hijackthis.exe
  • After installing, you should get the user agreement, press accept and Hijack This will run.
  • Select Do a system scan and save a log file. This will open a notepad file of everything Hijack This found, copy and paste it back here.

Answer #4
Here’s hoping, eventually manged to do as you suggested, here is the log file. Thanking you C:\Program Files\Trend Micro\HijackThis\HijackThis.exe
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://nz.yahoo.com/
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Window Title = Packard Bell
R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = *.local
O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 7.0\ActiveX\AcroIEHelper.dll
O2 - BHO: Groove GFS Browser Helper - {72853161-30C5-4D22-B7F9-0BBC1D38A37E} - C:\PROGRA~1\MICROS~3\Office12\GRA8E1~1.DLL
O2 - BHO: scriptproxy - {7DB2D5A0-7241-4E79-B68D-6309F01C5231} - C:\Program Files\McAfee\VirusScan\scriptsn.dll
O2 - BHO: EpsonToolBandKicker Class - {E99421FB-68DD-40F0-B4AC-B7027CAE2F1A} - C:\Program Files\EPSON\EPSON Web-To-Page\EPSON Web-To-Page.dll
O3 - Toolbar: EPSON Web-To-Page - {EE5D279F-081B-4404-994D-C6B60AAEBA6D} - C:\Program Files\EPSON\EPSON Web-To-Page\EPSON Web-To-Page.dll
O4 - HKLM\..\Run: [ATIPTA] C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe
O4 - HKLM\..\Run: [ACTIVBOARD] c:\apps\ABoard\ABoard.exe
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Common Files\Real\Update_OB\realsched.exe"  -osboot
O4 - HKLM\..\Run: [tcnz_UninstallTracking] C:\DOCUME~1\DARRYL~1\LOCALS~1\Temp\InstallHelper.exe /uninstalltrackingvendor=tcnz
O4 - HKLM\..\Run: [tcnz_McciTrayApp] C:\Program Files\tcnz\McciTrayApp.exe
O4 - HKLM\..\Run: [mcagent_exe] "C:\Program Files\McAfee.com\Agent\mcagent.exe" /runkey
O4 - HKLM\..\Run: [UserFaultCheck] %systemroot%\system32\dumprep 0 -u
O4 - HKCU\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\ctfmon.exe
O4 - HKCU\..\Run: [EzStatus] C:\Apps\EZHome\EZStatus.exe
O4 - HKCU\..\Run: [SUPERAntiSpyware] C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
O4 - HKCU\..\Run: [Startup Manager] "startUp manager.exe"
O4 - HKCU\..\Run: [MSMSGS] "C:\Program Files\Messenger\msmsgs.exe" /background
O4 - HKCU\..\Run: [Darryl & Leah] C:\Documents and Settings\Darryl & Leah\Darryl & Leah.exe /i
O4 - HKUS\S-1-5-19\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'LOCAL SERVICE')
O4 - HKUS\S-1-5-20\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'NETWORK SERVICE')
O4 - HKUS\S-1-5-18\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'SYSTEM')
O4 - HKUS\.DEFAULT\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'Default user')
O4 - Global Startup: Adobe Reader Speed Launch.lnk = C:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~3\Office12\EXCEL.EXE/3000
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\j2re1.4.2_05\bin\npjpi142_05.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\j2re1.4.2_05\bin\npjpi142_05.dll
O9 - Extra button: Send to OneNote - {2670000A-7350-4f3c-8081-5663EE0C6C49} - C:\PROGRA~1\MICROS~3\Office12\ONBttnIE.dll
O9 - Extra 'Tools' menuitem: S&end to OneNote - {2670000A-7350-4f3c-8081-5663EE0C6C49} - C:\PROGRA~1\MICROS~3\Office12\ONBttnIE.dll
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~3\Office12\REFIEBAR.DLL
O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O15 - Trusted Zone: http://*.mcafee.com
O15 - Trusted Zone: http://ptcnztbc.tcnz.motive.com
O15 - Trusted Zone: http://www.telecom.co.nz
O16 - DPF: {EF791A6B-FC12-4C68-99EF-FB9E207A39E6} (McFreeScan Class) - http://download.mcafee.com/molbin/iss-loc/mcfscan/2,2,0,5631/mcfscan.cab
O18 - Protocol: grooveLocalGWS - {88FED34C-F0CA-4636-A375-3CB6248B04CD} - C:\PROGRA~1\MICROS~3\Office12\GR99D3~1.DLL
O23 - Service: Apple Mobile Device - Apple Inc. - C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
O23 - Service: ATI Smart - Unknown owner - C:\WINDOWS\system32\ati2sgag.exe
O23 - Service: Bonjour Service - Apple Inc. - C:\Program Files\Bonjour\mDNSResponder.exe
O23 - Service: Folder Size (FolderSize) - Brio - C:\Program Files\FolderSize\FolderSizeSvc.exe
O23 - Service: iPod Service - Apple Inc. - C:\Program Files\iPod\bin\iPodService.exe
O23 - Service: McciCMService - Motive Communications, Inc. - C:\Program Files\Common Files\Motive\McciCMService.exe
O23 - Service: McAfee Services (mcmscsvc) - McAfee, Inc. - C:\PROGRA~1\McAfee\MSC\mcmscsvc.exe
O23 - Service: McAfee Network Agent (McNASvc) - McAfee, Inc. - c:\PROGRA~1\COMMON~1\mcafee\mna\mcnasvc.exe
O23 - Service: McAfee Scanner (McODS) - McAfee, Inc. - C:\PROGRA~1\McAfee\VIRUSS~1\mcods.exe
O23 - Service: McAfee Proxy Service (McProxy) - McAfee, Inc. - c:\PROGRA~1\COMMON~1\mcafee\mcproxy\mcproxy.exe
O23 - Service: McAfee Real-time Scanner (McShield) - McAfee, Inc. - C:\PROGRA~1\McAfee\VIRUSS~1\mcshield.exe
O23 - Service: McAfee SystemGuards (McSysmon) - McAfee, Inc. - C:\PROGRA~1\McAfee\VIRUSS~1\mcsysmon.exe
O23 - Service: McAfee Personal Firewall Service (MpfService) - McAfee, Inc. - C:\Program Files\McAfee\MPF\MPFSrv.exe
O23 - Service: SmartLinkService (SLService) - Smart Link - C:\WINDOWS\SYSTEM32\slserv.exe
O23 - Service: SymWMI Service (SymWSC) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\Security Center\SymWSC.exe
O23 - Service: Virtual CD v4 Security service (SDK - Version) (VCSSecS) - H+H Software GmbH - C:\Program Files\Virtual CD v4 SDK\system\vcssecs.exe
--
End of file - 7786 bytes

Please remember to CODE all links & Passwords
Post edited For You - nzindiboy

Answer #5

[*] Open HijackThis [*] Choose [b]"Do a system scan only"[/b]
[*] Check the boxes in front of these lines:
[b]
O15 - Trusted Zone: http://*.mcafee.com O15 - Trusted Zone: http://ptcnztbc.tcnz.motive.com O15 - Trusted Zone: http://www.telecom.co.nz
[/b]
[*] Press [b]"Fix Checked"[/b]
[*] Close Hijack This.
[/list]
Download Malwarebytes' Anti-Malware from here:
[code]http://www.besttechie.net/tools/mbam-setup.exe[/code]
Double Click mbam-setup.exe to install the application.[list]
[*] Make sure a checkmark is placed next to Update Malwarebytes' Anti-Malware and Launch Malwarebytes' Anti-Malware, then click Finish.
[*] If an update is found, it will download and install the latest version.
[*] Once the program has loaded, select "Perform Quick Scan", then click Scan.
[*] The scan may take some time to finish,so please be patient.
[*] When the scan is complete, click OK, then Show Results to view the results.
[*] Make sure that everything is checked, and click Remove Selected.
[*] When disinfection is completed, a log will open in Notepad and you may be prompted to Restart. (See Note)
[*] The log is automatically saved by MBAM and can be viewed by clicking the Logs tab in MBAM.
[i]

Note:
If MBAM encounters a file that is difficult to remove, you will be presented with 1 of 2 prompts.
Click OK to either and let MBAM proceed with the disinfection process.
If asked to restart the computer, please do so immediately.[/i]
Post the contents of the MBAM Log.
Please remember to CODE all links & Passwords
Post edited For You - nzindiboy

Answer #6
have downloaded this file but when i click run on it nothing happens?
Answer #7
sorry please correct that, didnt save file this time, have ran it from site
Answer #8
now it is on my computer, double clicked on shortcut on desktop & nothing happening
Answer #9
That means there might be a rootkit, in your system, please do the following:

  • Download combofix from either of these two links:
    http://download.bleepingcomputer.com/sUBs/ComboFix.exe
    http://subs.geekstogo.com/ComboFix.exe

1. If you are using Firefox, make sure that your download settings are as follows:
* Tools->Options->Main tab
* Set to “Always ask me where to Save the files”.
2. During the download, rename Combofix to Combo-Fix as follows:
Image
Image
3. It is important you rename Combofix during the download, but not after.
4. Please do not rename Combofix to other names, but only to the one indicated.
5. Close any open browsers.
6. We need to disable your local AV (Anti-virus) before running Combofix.
See here for how to disable your AV..

    http://www.bleepingcomputer.com/forums/index.php?showtopic=114351

  • Double click on ComboFix.exe.
  • Follow the prompts. NOTE:
  • ComboFix will check to see if the Microsoft Windows Recovery Console is installed.
    ***It’s strongly recommended to have the Recovery Console installed before doing any malware removal.***

  • Allow combofix to run
  • Post C:\combofix.txt back here.
    Note:
    Do not mouseclick combofix’s window whilst it’s running. That may cause it to stall.

Answer #10
Thanks for persevering with me, I shut down McAfee as told to but had it on resume on startup so hopefully I havent stuffed it up. If so can I just run combofix again? Here is the report log.
Thanking you [/code]ComboFix 09-05-31.06 – Darryl & Leah 06/02/2009 20:12.1 – NTFSx86
Microsoft Windows XP Home Edition 5.1.2600.3.1252.1.1033.18.1023.640 [GMT 12:00]
Running from: c:\documents and settings\Darryl & Leah\Desktop\Combo-Fix.exe
AV: McAfee VirusScan *On-access scanning disabled* (Updated) {84B5EE75-6421-4CDE-A33A-DD43BA9FAD83}
FW: McAfee Personal Firewall *disabled* {94894B63-8C7F-4050-BDA4-813CA00DA3E8}
* Resident AV is active
.
((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.
c:\documents and settings\Darryl & Leah\Application Data\inst.exe
c:\windows\system32\drivers\UACxvimovrerfvmehw.sys
c:\windows\system32\UACbpjljcoxurmoubm.dll
c:\windows\system32\UACeexuspqmfagvdkp.dll
c:\windows\system32\UACiacofexrldfrqbm.log
c:\windows\system32\uacinit.dll
c:\windows\system32\UACjfjtytriswwbtte.dll
c:\windows\system32\UACqpveisclvlnqqun.dll
c:\windows\system32\UACuuonloptwjlliss.log
c:\windows\system32\UACwqekvmtsgmkdcyx.log
c:\windows\system32\UACxsbbpiewxgmdpba.dat
c:\windows\system32\UACyrhsnbrpxvbhpmk.dll
.
((((((((((((((((((((((((((((((((((((((( Drivers/Services )))))))))))))))))))))))))))))))))))))))))))))))))
.
——-\Service_UACd.sys
——-\Legacy_ACPI32
——-\Legacy_ATI64SI
——-\Legacy_FIPS32CUP
——-\Legacy_I386SI
——-\Legacy_KSI32SK
——-\Legacy_NETSIK
——-\Legacy_NICSK32
——-\Legacy_PORT135SIK
——-\Legacy_SECURENTM
——-\Legacy_SYSTEMNTMI
——-\Legacy_WS2_32SIK
——-\Service_acpi32
——-\Service_ati64si
——-\Service_fips32cup
——-\Service_i386si
——-\Service_ksi32sk
——-\Service_netsik
——-\Service_nicsk32
——-\Service_port135sik
——-\Service_securentm
——-\Service_systemntmi
——-\Service_ws2_32sik
((((((((((((((((((((((((( Files Created from 2009-05-02 to 2009-06-02 )))))))))))))))))))))))))))))))
.
2009-06-01 04:01 . 2009-05-26 01:2040160—-a-w-c:\windows\system32\drivers\mbamswissarmy.sys
2009-06-01 04:01 . 2009-06-01 04:01——–d—–w-c:\program files\Malwarebytes’ Anti-Malware
2009-06-01 04:01 . 2009-06-01 04:01——–d—–w-c:\documents and settings\All Users\Application Data\Malwarebytes
2009-06-01 04:01 . 2009-05-26 01:1919096—-a-w-c:\windows\system32\drivers\mbam.sys
2009-06-01 02:19 . 2009-06-01 02:19——–d—–w-c:\program files\Trend Micro
2009-06-01 02:17 . 2009-06-01 02:17812344—-a-w-c:\program files\HJTInstall.exe
2009-05-31 05:42 . 2009-05-31 05:42——–d—–w-c:\windows\McAfee.com
2009-05-31 05:00 . 2009-05-31 05:04——–d—–w-C:\xdat
2009-05-31 01:15 . 2009-05-31 01:15——–d—–w-c:\program files\AVG
2009-05-30 20:43 . 2009-05-30 20:430—-a-w-c:\windows\nsreg.dat
2009-05-30 20:42 . 2009-05-30 20:42——–d—–w-c:\documents and settings\Darryl & Leah\Local Settings\Application Data\Mozilla
2009-05-27 07:00 . 2009-05-12 04:08266400—-a-r-c:\documents and settings\Darryl & Leah\Application Data\McAfee\Supportability\MVTLogs\Results\detect.dll
2009-05-27 06:58 . 2009-05-27 06:5849152—-a-r-c:\documents and settings\Darryl & Leah\Application Data\Microsoft\Installer\{FCC07EEA-FA18-4A21-9105-9666603C6885}\IconFCC07EEA1.exe
2009-05-27 06:58 . 2009-05-27 06:5849152—-a-r-c:\documents and settings\Darryl & Leah\Application Data\Microsoft\Installer\{FCC07EEA-FA18-4A21-9105-9666603C6885}\IconFCC07EEA.exe
2009-05-26 03:51 . 2009-05-26 03:51194—-a-w-c:\documents and settings\Darryl & Leah\Application Data\asd.bat
2009-05-18 06:55 . 2009-05-18 06:55——–d—–w-c:\program files\Citrix
2009-05-18 06:53 . 2009-05-18 06:53——–d—–w-c:\documents and settings\Darryl & Leah\Local Settings\Application Data\Citrix
2009-05-18 06:53 . 2009-05-18 06:5361224—-a-w-c:\documents and settings\Darryl & Leah\GoToAssistDownloadHelper.exe
2009-05-18 06:41 . 2008-10-23 01:08120136—-a-w-c:\windows\system32\drivers\Mpfp.sys
2009-05-18 06:40 . 2009-05-18 06:41——–d—–w-c:\program files\Common Files\McAfee
2009-05-18 06:40 . 2009-05-18 06:40——–d—–w-c:\program files\McAfee.com
2009-05-18 06:40 . 2009-05-27 06:58——–d—–w-c:\program files\McAfee
2009-05-16 07:04 . 2009-05-16 07:04——–d-sh–w-c:\documents and settings\Darryl & Leah\IECompatCache
2009-05-16 05:20 . 2009-05-16 05:20——–d-sh–w-c:\documents and settings\Administrator\PrivacIE
2009-05-16 02:29 . 2009-05-16 02:29——–d-sh–w-c:\documents and settings\Administrator\IETldCache
2009-05-11 05:36 . 2009-05-11 05:36——–d—–w-c:\documents and settings\Darryl & Leah\Local Settings\Application Data\Deployment
2009-05-09 00:27 . 2009-05-09 00:27——–d-sh–w-c:\windows\system32\config\systemprofile\IETldCache
2009-05-09 00:23 . 2009-05-09 00:23——–d-sh–w-c:\documents and settings\Darryl & Leah\PrivacIE
2009-05-09 00:22 . 2009-05-09 00:22——–d-sh–w-c:\documents and settings\Darryl & Leah\IETldCache
2009-05-08 21:13 . 2009-04-25 05:30102400——w-c:\windows\system32\dllcache\iecompat.dll
2009-05-08 21:11 . 2009-02-20 08:1081920—-a-w-c:\windows\system32\ieencode.dll
2009-05-08 21:02 . 2009-05-08 21:03——–d—–w-c:\windows\system32\XPSViewer
2009-05-08 21:02 . 2009-05-08 21:02——–d—–w-c:\program files\Reference Assemblies
2009-05-08 21:02 . 2008-07-06 12:0689088——w-c:\windows\system32\dllcache\filterpipelineprintproc.dll
2009-05-08 21:02 . 2008-07-06 12:06117760——w-c:\windows\system32\prntvpt.dll
2009-05-08 21:02 . 2008-07-06 12:06575488——w-c:\windows\system32\xpsshhdr.dll
2009-05-08 21:02 . 2008-07-06 12:06575488——w-c:\windows\system32\dllcache\xpsshhdr.dll
2009-05-08 21:02 . 2008-07-06 12:061676288——w-c:\windows\system32\xpssvcs.dll
2009-05-08 21:02 . 2008-07-06 12:061676288——w-c:\windows\system32\dllcache\xpssvcs.dll
2009-05-08 21:02 . 2008-07-06 10:50597504——w-c:\windows\system32\dllcache\printfilterpipelinesvc.exe
2009-05-06 06:04 . 2009-05-16 22:24——–d—–w-c:\program files\Common Files\Motive
2009-05-06 06:03 . 2009-05-06 06:03——–d—–w-c:\documents and settings\All Users\Application Data\Motive
2009-05-06 04:16 . 2009-05-06 04:16——–d—–w-c:\documents and settings\Darryl & Leah\Application Data\Motive
2009-05-06 04:16 . 2009-05-06 04:16——–d—–w-c:\windows\Motive
2009-05-06 04:15 . 2009-05-06 06:04——–d—–w-c:\program files\tcnz
.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2009-06-02 02:09 . 2008-07-31 07:292162—-a-w-c:\documents and settings\Darryl & Leah\Application Data\wklnhst.dat
2009-05-31 10:17 . 2008-08-09 02:48——–d—–w-c:\documents and settings\Darryl & Leah\Application Data\Vso
2009-05-31 05:21 . 2008-10-26 01:17——–d—–w-c:\documents and settings\All Users\Application Data\Avg8
2009-05-30 04:29 . 2008-11-16 07:08——–d—–w-c:\program files\Spyware Doctor
2009-05-30 04:29 . 2008-11-16 07:08——–d—a-w-c:\documents and settings\All Users\Application Data\TEMP
2009-05-30 04:28 . 2008-07-29 21:48——–d—–w-c:\program files\SUPERAntiSpyware
2009-05-27 06:58 . 2008-10-26 01:23——–d—–w-c:\documents and settings\All Users\Application Data\McAfee
2009-05-23 07:44 . 2008-08-15 22:26——–d—–w-c:\program files\Magic iPod Video Converter
2009-05-09 05:35 . 2008-07-26 00:3998600—-a-w-c:\documents and settings\Darryl & Leah\Local Settings\Application Data\GDIPFONTCACHEV1.DAT
2009-05-08 21:02 . 2008-09-20 08:24——–d—–w-c:\program files\MSBuild
2009-05-06 06:03 . 2008-09-20 01:46——–d—–w-c:\program files\QuickTime
2009-05-06 06:03 . 2008-08-09 04:55——–d—–w-c:\program files\DivX
2009-04-26 07:53 . 2009-04-26 07:535092—-a-w-c:\windows\system32\d3d9caps.dat
2009-03-24 23:06 . 2008-10-26 01:3140552—-a-w-c:\windows\system32\drivers\mfesmfk.sys
2009-03-24 23:06 . 2008-10-26 01:3179880—-a-w-c:\windows\system32\drivers\mfeavfk.sys
2009-03-24 23:06 . 2008-10-26 01:3135272—-a-w-c:\windows\system32\drivers\mfebopk.sys
2009-03-24 23:06 . 2008-10-26 01:31214024—-a-w-c:\windows\system32\drivers\mfehidk.sys
2009-03-24 23:05 . 2008-10-26 01:3134216—-a-w-c:\windows\system32\drivers\mferkdk.sys
2009-03-06 14:22 . 2004-08-10 04:38284160—-a-w-c:\windows\system32\pdh.dll
.
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown REGEDIT4
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
“CTFMON.EXE”=”c:\windows\system32\ctfmon.exe” [2008-04-14 15360]
“EzStatus”=”c:\apps\EZHome\EZStatus.exe” [2004-12-20 94208]
“MSMSGS”=”c:\program files\Messenger\msmsgs.exe” [2008-04-14 1695232]
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
“ATIPTA”=”c:\program files\ATI Technologies\ATI Control Panel\atiptaxx.exe” [2004-08-12 339968]
“ACTIVBOARD”=”c:\apps\ABoard\ABoard.exe” [2003-05-01 24576]
“QuickTime Task”=”c:\program files\QuickTime\qttask.exe” [2008-09-06 413696]
“TkBellExe”=”c:\program files\Common Files\Real\Update_OB\realsched.exe” [2005-05-12 180269]
“tcnz_McciTrayApp”=”c:\program files\tcnz\McciTrayApp.exe” [2008-06-20 1464832]
“mcagent_exe”=”c:\program files\McAfee.com\Agent\mcagent.exe” [2009-03-25 645328]
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run]
“CTFMON.EXE”=”c:\windows\system32\CTFMON.EXE” [2008-04-14 15360]
“EzStatus”=”c:\apps\EZHome\EZStatus.exe” [2004-12-20 94208]
c:\documents and settings\All Users\Start Menu\Programs\Startup\
Adobe Reader Speed Launch.lnk – c:\program files\Adobe\Acrobat 7.0\Reader\reader_sl.exe [2004-12-14 29696]
HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\drivers32
“wave3″= serwvdrv.dll
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\mcmscsvc]
@=””
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\MCODS]
@=””
[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\McAfeeAntiVirus]
“DisableMonitoring”=dword:00000001
[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\McAfeeFirewall]
“DisableMonitoring”=dword:00000001
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]
“EnableFirewall”= 0 (0x0)
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
“%windir%\\system32\\sessmgr.exe”=
“c:\\Program Files\\Bonjour\\mDNSResponder.exe”=
“c:\\Program Files\\Microsoft Office\\Office12\\OUTLOOK.EXE”=
“c:\\Program Files\\Microsoft Office\\Office12\\GROOVE.EXE”=
“c:\\Program Files\\Microsoft Office\\Office12\\ONENOTE.EXE”=
“%windir%\\Network Diagnostic\\xpnetdiag.exe”=
“c:\\Program Files\\iTunes\\iTunes.exe”=
“c:\\Program Files\\ATI Technologies\\ATI Control Panel\\atiptaxx.exe”=
“c:\\Program Files\\Common Files\\McAfee\\MNA\\McNASvc.exe”=
R1 vcsmpdrv;vcsmpdrv;c:\windows\system32\drivers\vcsmpdrv.sys [5/12/2005 8:08 PM 49024]
R2 VCSSecS;Virtual CD v4 Security service (SDK – Version);c:\program files\Virtual CD v4 SDK\System\vcssecs.exe [5/12/2005 8:08 PM 139264]
R3 Cap713x;Cap713x Video Capture;c:\windows\system32\drivers\Cap713x.sys [5/12/2005 7:58 PM 671104]
S1 SASDIFSV;SASDIFSV;\??\c:\program files\SUPERAntiSpyware\SASDIFSV.SYS –> c:\program files\SUPERAntiSpyware\SASDIFSV.SYS [?]
S1 SASKUTIL;SASKUTIL;\??\c:\program files\SUPERAntiSpyware\SASKUTIL.sys –> c:\program files\SUPERAntiSpyware\SASKUTIL.sys [?]
S2 amd64si;amd64si;\??\c:\windows\system32\drivers\amd64si.sys –> c:\windows\system32\drivers\amd64si.sys [?]
S3 QCEmerald;Logitech QuickCam Web;c:\windows\system32\drivers\OVCE.sys [12/26/2008 9:56 AM 31872]
S3 SASENUM;SASENUM;\??\c:\program files\SUPERAntiSpyware\SASENUM.SYS –> c:\program files\SUPERAntiSpyware\SASENUM.SYS [?]
.
Contents of the ‘Scheduled Tasks’ folder
2009-05-18 c:\windows\Tasks\AppleSoftwareUpdate.job
– c:\program files\Apple Software Update\SoftwareUpdate.exe [2008-07-30 00:34]
2009-05-18 c:\windows\Tasks\McDefragTask.job
– c:\progra~1\mcafee\mqc\QcConsol.exe [2009-05-18 22:53]
2009-05-18 c:\windows\Tasks\McQcTask.job
– c:\progra~1\mcafee\mqc\QcConsol.exe [2009-05-18 22:53]
2008-07-26 c:\windows\Tasks\Registration reminder 1.job
– c:\windows\system32\OOBE\oobebaln.exe [2004-08-10 00:12]
.
– – – – ORPHANS REMOVED – – – –
HKCU-Run-SUPERAntiSpyware – c:\program files\SUPERAntiSpyware\SUPERAntiSpyware.exe
HKCU-Run-Startup Manager – startUp manager.exe
HKLM-Run-Telecom Help Assistant – (no file)
SafeBoot-procexp90.Sys
.
——- Supplementary Scan ——-
.
uStart Page = hxxp://nz.yahoo.com/
uInternet Settings,ProxyOverride = *.local
IE: E&xport to Microsoft Excel – c:\progra~1\MICROS~3\Office12\EXCEL.EXE/3000
Trusted Zone: 0.0.0.0
Trusted Zone: internet
Trusted Zone: mcafee.com
Trusted Zone: motive.com
Trusted Zone: telecom.co.nz\www
FF – ProfilePath – c:\documents and settings\Darryl & Leah\Application Data\Mozilla\Firefox\Profiles\gsw7una6.default\
FF – plugin: c:\program files\Java\j2re1.4.2_05\bin\NPJava11.dll
FF – plugin: c:\program files\Java\j2re1.4.2_05\bin\NPJava12.dll
FF – plugin: c:\program files\Java\j2re1.4.2_05\bin\NPJava13.dll
FF – plugin: c:\program files\Java\j2re1.4.2_05\bin\NPJava14.dll
FF – plugin: c:\program files\Java\j2re1.4.2_05\bin\NPJava32.dll
FF – plugin: c:\program files\Java\j2re1.4.2_05\bin\NPJPI142_05.dll
FF – plugin: c:\program files\Java\j2re1.4.2_05\bin\NPOJI610.dll
.
**************************************************************************
catchme 0.3.1398 W2K/XP/Vista – rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2009-06-02 20:17
Windows 5.1.2600 Service Pack 3 NTFS
scanning hidden processes … scanning hidden autostart entries … scanning hidden files … scan completed successfully
hidden files: 0
**************************************************************************
.
——————— LOCKED REGISTRY KEYS ———————
[HKEY_USERS\S-1-5-21-3253738354-1626395089-3549077446-1007\Software\Microsoft\SystemCertificates\AddressBook*]
@Allowed: (Read) (RestrictedCode)
@Allowed: (Read) (RestrictedCode)
.
——————— DLLs Loaded Under Running Processes ———————
– – – – – – – > ‘explorer.exe'(3912)
c:\windows\system32\WPDShServiceObj.dll
c:\program files\ArcSoft\PhotoImpression 5\share\pihook.dll
c:\windows\system32\PortableDeviceTypes.dll
c:\windows\system32\PortableDeviceApi.dll
.
———————— Other Running Processes ————————
.
c:\apps\ABoard\AOSD.EXE
c:\program files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
c:\program files\Bonjour\mDNSResponder.exe
c:\program files\FolderSize\FolderSizeSvc.exe
c:\program files\Common Files\Motive\McciCMService.exe
c:\program files\Common Files\Microsoft Shared\VS7Debug\mdm.exe
c:\program files\Common Files\Symantec Shared\Security Center\SymWSC.exe
c:\windows\system32\wscntfy.exe
.
**************************************************************************
.
Completion time: 2009-06-02 20:19 – machine was rebooted
ComboFix-quarantined-files.txt 2009-06-02 08:19
Pre-Run: 29,797,322,752 bytes free
Post-Run: 29,736,423,424 bytes free
244— E O F —2009-06-01 09:33
[code]
Answer #11
Now open a new notepad file.
Input this into the notepad file:

File::
C:\xdat
c:\windows\system32\d3d9caps.dat

Save this as CFScript.txt, save it to your desktop also.
Then drag and drop CFScript.txt into combofix as seen below:
Image
This will open combofix again, agree to it’s terms and allow it to run. It may want to reboot after it’s done. (It will warn you if it wants to) Post the resulting log back here.
Answer #12
Have done as you asked, Thanks
ComboFix 09-06-01.03 – Darryl & Leah 06/03/2009 16:39.2 – NTFSx86
Microsoft Windows XP Home Edition 5.1.2600.3.1252.1.1033.18.1023.523 [GMT 12:00]
Running from: c:\documents and settings\Darryl & Leah\Desktop\Combo-Fix.exe
Command switches used :: c:\documents and settings\Darryl & Leah\Desktop\CFScript.txt
AV: McAfee VirusScan *On-access scanning disabled* (Updated) {84B5EE75-6421-4CDE-A33A-DD43BA9FAD83}
FW: McAfee Personal Firewall *disabled* {94894B63-8C7F-4050-BDA4-813CA00DA3E8}
FILE ::
“c:\windows\system32\d3d9caps.dat”
“C:\xdat”
.
((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.
c:\windows\system32\d3d9caps.dat
.
((((((((((((((((((((((((( Files Created from 2009-05-03 to 2009-06-03 )))))))))))))))))))))))))))))))
.
2009-06-01 04:01 . 2009-05-26 01:2040160—-a-w-c:\windows\system32\drivers\mbamswissarmy.sys
2009-06-01 04:01 . 2009-06-01 04:01——–d—–w-c:\program files\Malwarebytes’ Anti-Malware
2009-06-01 04:01 . 2009-06-01 04:01——–d—–w-c:\documents and settings\All Users\Application Data\Malwarebytes
2009-06-01 04:01 . 2009-05-26 01:1919096—-a-w-c:\windows\system32\drivers\mbam.sys
2009-06-01 02:19 . 2009-06-01 02:19——–d—–w-c:\program files\Trend Micro
2009-06-01 02:17 . 2009-06-01 02:17812344—-a-w-c:\program files\HJTInstall.exe
2009-05-31 05:42 . 2009-05-31 05:42——–d—–w-c:\windows\McAfee.com
2009-05-31 05:00 . 2009-05-31 05:04——–d—–w-C:\xdat
2009-05-31 01:15 . 2009-05-31 01:15——–d—–w-c:\program files\AVG
2009-05-30 20:43 . 2009-05-30 20:430—-a-w-c:\windows\nsreg.dat
2009-05-30 20:42 . 2009-05-30 20:42——–d—–w-c:\documents and settings\Darryl & Leah\Local Settings\Application Data\Mozilla
2009-05-27 07:00 . 2009-05-12 04:08266400—-a-r-c:\documents and settings\Darryl & Leah\Application Data\McAfee\Supportability\MVTLogs\Results\detect.dll
2009-05-27 06:58 . 2009-05-27 06:5849152—-a-r-c:\documents and settings\Darryl & Leah\Application Data\Microsoft\Installer\{FCC07EEA-FA18-4A21-9105-9666603C6885}\IconFCC07EEA1.exe
2009-05-27 06:58 . 2009-05-27 06:5849152—-a-r-c:\documents and settings\Darryl & Leah\Application Data\Microsoft\Installer\{FCC07EEA-FA18-4A21-9105-9666603C6885}\IconFCC07EEA.exe
2009-05-26 03:51 . 2009-05-26 03:51194—-a-w-c:\documents and settings\Darryl & Leah\Application Data\asd.bat
2009-05-18 06:55 . 2009-05-18 06:55——–d—–w-c:\program files\Citrix
2009-05-18 06:53 . 2009-05-18 06:53——–d—–w-c:\documents and settings\Darryl & Leah\Local Settings\Application Data\Citrix
2009-05-18 06:53 . 2009-05-18 06:5361224—-a-w-c:\documents and settings\Darryl & Leah\GoToAssistDownloadHelper.exe
2009-05-18 06:41 . 2008-10-23 01:08120136—-a-w-c:\windows\system32\drivers\Mpfp.sys
2009-05-18 06:40 . 2009-05-18 06:41——–d—–w-c:\program files\Common Files\McAfee
2009-05-18 06:40 . 2009-05-18 06:40——–d—–w-c:\program files\McAfee.com
2009-05-18 06:40 . 2009-05-27 06:58——–d—–w-c:\program files\McAfee
2009-05-16 07:04 . 2009-05-16 07:04——–d-sh–w-c:\documents and settings\Darryl & Leah\IECompatCache
2009-05-16 05:20 . 2009-05-16 05:20——–d-sh–w-c:\documents and settings\Administrator\PrivacIE
2009-05-16 02:29 . 2009-05-16 02:29——–d-sh–w-c:\documents and settings\Administrator\IETldCache
2009-05-11 05:36 . 2009-05-11 05:36——–d—–w-c:\documents and settings\Darryl & Leah\Local Settings\Application Data\Deployment
2009-05-09 00:27 . 2009-05-09 00:27——–d-sh–w-c:\windows\system32\config\systemprofile\IETldCache
2009-05-09 00:23 . 2009-05-09 00:23——–d-sh–w-c:\documents and settings\Darryl & Leah\PrivacIE
2009-05-09 00:22 . 2009-05-09 00:22——–d-sh–w-c:\documents and settings\Darryl & Leah\IETldCache
2009-05-08 21:13 . 2009-04-25 05:30102400——w-c:\windows\system32\dllcache\iecompat.dll
2009-05-08 21:11 . 2009-02-20 08:1081920—-a-w-c:\windows\system32\ieencode.dll
2009-05-08 21:02 . 2009-05-08 21:03——–d—–w-c:\windows\system32\XPSViewer
2009-05-08 21:02 . 2009-05-08 21:02——–d—–w-c:\program files\Reference Assemblies
2009-05-08 21:02 . 2008-07-06 12:0689088——w-c:\windows\system32\dllcache\filterpipelineprintproc.dll
2009-05-08 21:02 . 2008-07-06 12:06117760——w-c:\windows\system32\prntvpt.dll
2009-05-08 21:02 . 2008-07-06 12:06575488——w-c:\windows\system32\xpsshhdr.dll
2009-05-08 21:02 . 2008-07-06 12:06575488——w-c:\windows\system32\dllcache\xpsshhdr.dll
2009-05-08 21:02 . 2008-07-06 12:061676288——w-c:\windows\system32\xpssvcs.dll
2009-05-08 21:02 . 2008-07-06 12:061676288——w-c:\windows\system32\dllcache\xpssvcs.dll
2009-05-08 21:02 . 2008-07-06 10:50597504——w-c:\windows\system32\dllcache\printfilterpipelinesvc.exe
2009-05-06 06:04 . 2009-05-16 22:24——–d—–w-c:\program files\Common Files\Motive
2009-05-06 06:03 . 2009-05-06 06:03——–d—–w-c:\documents and settings\All Users\Application Data\Motive
2009-05-06 04:16 . 2009-05-06 04:16——–d—–w-c:\documents and settings\Darryl & Leah\Application Data\Motive
2009-05-06 04:16 . 2009-05-06 04:16——–d—–w-c:\windows\Motive
2009-05-06 04:15 . 2009-05-06 06:04——–d—–w-c:\program files\tcnz
.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2009-06-02 09:35 . 2008-07-31 07:292574—-a-w-c:\documents and settings\Darryl & Leah\Application Data\wklnhst.dat
2009-05-31 10:17 . 2008-08-09 02:48——–d—–w-c:\documents and settings\Darryl & Leah\Application Data\Vso
2009-05-31 05:21 . 2008-10-26 01:17——–d—–w-c:\documents and settings\All Users\Application Data\Avg8
2009-05-30 04:29 . 2008-11-16 07:08——–d—–w-c:\program files\Spyware Doctor
2009-05-30 04:29 . 2008-11-16 07:08——–d—a-w-c:\documents and settings\All Users\Application Data\TEMP
2009-05-30 04:28 . 2008-07-29 21:48——–d—–w-c:\program files\SUPERAntiSpyware
2009-05-27 06:58 . 2008-10-26 01:23——–d—–w-c:\documents and settings\All Users\Application Data\McAfee
2009-05-23 07:44 . 2008-08-15 22:26——–d—–w-c:\program files\Magic iPod Video Converter
2009-05-09 05:35 . 2008-07-26 00:3998600—-a-w-c:\documents and settings\Darryl & Leah\Local Settings\Application Data\GDIPFONTCACHEV1.DAT
2009-05-08 21:02 . 2008-09-20 08:24——–d—–w-c:\program files\MSBuild
2009-05-06 06:03 . 2008-09-20 01:46——–d—–w-c:\program files\QuickTime
2009-05-06 06:03 . 2008-08-09 04:55——–d—–w-c:\program files\DivX
2009-03-24 23:06 . 2008-10-26 01:3140552—-a-w-c:\windows\system32\drivers\mfesmfk.sys
2009-03-24 23:06 . 2008-10-26 01:3179880—-a-w-c:\windows\system32\drivers\mfeavfk.sys
2009-03-24 23:06 . 2008-10-26 01:3135272—-a-w-c:\windows\system32\drivers\mfebopk.sys
2009-03-24 23:06 . 2008-10-26 01:31214024—-a-w-c:\windows\system32\drivers\mfehidk.sys
2009-03-24 23:05 . 2008-10-26 01:3134216—-a-w-c:\windows\system32\drivers\mferkdk.sys
2009-03-06 14:22 . 2004-08-10 04:38284160—-a-w-c:\windows\system32\pdh.dll
.
((((((((((((((((((((((((((((( SnapShot@2009-06-02_08.17.54 )))))))))))))))))))))))))))))))))))))))))
.
+ 2008-07-25 23:59 . 2009-06-03 04:1432768 c:\windows\system32\config\systemprofile\Local Settings\History\History.IE5\index.dat
– 2008-07-25 23:59 . 2009-06-02 05:5532768 c:\windows\system32\config\systemprofile\Local Settings\History\History.IE5\index.dat
+ 2008-07-25 23:59 . 2009-06-03 04:1432768 c:\windows\system32\config\systemprofile\Cookies\index.dat
– 2008-07-25 23:59 . 2009-06-02 05:5532768 c:\windows\system32\config\systemprofile\Cookies\index.dat
.
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown REGEDIT4
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
“CTFMON.EXE”=”c:\windows\system32\ctfmon.exe” [2008-04-14 15360]
“EzStatus”=”c:\apps\EZHome\EZStatus.exe” [2004-12-20 94208]
“MSMSGS”=”c:\program files\Messenger\msmsgs.exe” [2008-04-14 1695232]
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
“ATIPTA”=”c:\program files\ATI Technologies\ATI Control Panel\atiptaxx.exe” [2004-08-12 339968]
“ACTIVBOARD”=”c:\apps\ABoard\ABoard.exe” [2003-05-01 24576]
“QuickTime Task”=”c:\program files\QuickTime\qttask.exe” [2008-09-06 413696]
“TkBellExe”=”c:\program files\Common Files\Real\Update_OB\realsched.exe” [2005-05-12 180269]
“tcnz_McciTrayApp”=”c:\program files\tcnz\McciTrayApp.exe” [2008-06-20 1464832]
“mcagent_exe”=”c:\program files\McAfee.com\Agent\mcagent.exe” [2009-03-25 645328]
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run]
“CTFMON.EXE”=”c:\windows\system32\CTFMON.EXE” [2008-04-14 15360]
“EzStatus”=”c:\apps\EZHome\EZStatus.exe” [2004-12-20 94208]
c:\documents and settings\All Users\Start Menu\Programs\Startup\
Adobe Reader Speed Launch.lnk – c:\program files\Adobe\Acrobat 7.0\Reader\reader_sl.exe [2004-12-14 29696]
HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\drivers32
“wave3″= serwvdrv.dll
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\mcmscsvc]
@=””
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\MCODS]
@=””
[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\McAfeeAntiVirus]
“DisableMonitoring”=dword:00000001
[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\McAfeeFirewall]
“DisableMonitoring”=dword:00000001
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]
“EnableFirewall”= 0 (0x0)
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
“%windir%\\system32\\sessmgr.exe”=
“c:\\Program Files\\Bonjour\\mDNSResponder.exe”=
“c:\\Program Files\\Microsoft Office\\Office12\\OUTLOOK.EXE”=
“c:\\Program Files\\Microsoft Office\\Office12\\GROOVE.EXE”=
“c:\\Program Files\\Microsoft Office\\Office12\\ONENOTE.EXE”=
“%windir%\\Network Diagnostic\\xpnetdiag.exe”=
“c:\\Program Files\\iTunes\\iTunes.exe”=
“c:\\Program Files\\ATI Technologies\\ATI Control Panel\\atiptaxx.exe”=
“c:\\Program Files\\Common Files\\McAfee\\MNA\\McNASvc.exe”=
R1 vcsmpdrv;vcsmpdrv;c:\windows\system32\drivers\vcsmpdrv.sys [5/12/2005 8:08 PM 49024]
R2 VCSSecS;Virtual CD v4 Security service (SDK – Version);c:\program files\Virtual CD v4 SDK\System\vcssecs.exe [5/12/2005 8:08 PM 139264]
R3 Cap713x;Cap713x Video Capture;c:\windows\system32\drivers\Cap713x.sys [5/12/2005 7:58 PM 671104]
S1 SASDIFSV;SASDIFSV;\??\c:\program files\SUPERAntiSpyware\SASDIFSV.SYS –> c:\program files\SUPERAntiSpyware\SASDIFSV.SYS [?]
S1 SASKUTIL;SASKUTIL;\??\c:\program files\SUPERAntiSpyware\SASKUTIL.sys –> c:\program files\SUPERAntiSpyware\SASKUTIL.sys [?]
S2 amd64si;amd64si;\??\c:\windows\system32\drivers\amd64si.sys –> c:\windows\system32\drivers\amd64si.sys [?]
S3 QCEmerald;Logitech QuickCam Web;c:\windows\system32\drivers\OVCE.sys [12/26/2008 9:56 AM 31872]
S3 SASENUM;SASENUM;\??\c:\program files\SUPERAntiSpyware\SASENUM.SYS –> c:\program files\SUPERAntiSpyware\SASENUM.SYS [?]
.
Contents of the ‘Scheduled Tasks’ folder
2009-05-18 c:\windows\Tasks\AppleSoftwareUpdate.job
– c:\program files\Apple Software Update\SoftwareUpdate.exe [2008-07-30 00:34]
2009-05-18 c:\windows\Tasks\McDefragTask.job
– c:\progra~1\mcafee\mqc\QcConsol.exe [2009-05-18 22:53]
2009-05-18 c:\windows\Tasks\McQcTask.job
– c:\progra~1\mcafee\mqc\QcConsol.exe [2009-05-18 22:53]
2008-07-26 c:\windows\Tasks\Registration reminder 1.job
– c:\windows\system32\OOBE\oobebaln.exe [2004-08-10 00:12]
.
.
——- Supplementary Scan ——-
.
uStart Page = hxxp://nz.yahoo.com/
uInternet Settings,ProxyOverride = *.local
IE: E&xport to Microsoft Excel – c:\progra~1\MICROS~3\Office12\EXCEL.EXE/3000
Trusted Zone: 0.0.0.0
Trusted Zone: internet
Trusted Zone: mcafee.com
Trusted Zone: motive.com
Trusted Zone: telecom.co.nz\www
FF – ProfilePath – c:\documents and settings\Darryl & Leah\Application Data\Mozilla\Firefox\Profiles\gsw7una6.default\
FF – plugin: c:\program files\Java\j2re1.4.2_05\bin\NPJava11.dll
FF – plugin: c:\program files\Java\j2re1.4.2_05\bin\NPJava12.dll
FF – plugin: c:\program files\Java\j2re1.4.2_05\bin\NPJava13.dll
FF – plugin: c:\program files\Java\j2re1.4.2_05\bin\NPJava14.dll
FF – plugin: c:\program files\Java\j2re1.4.2_05\bin\NPJava32.dll
FF – plugin: c:\program files\Java\j2re1.4.2_05\bin\NPJPI142_05.dll
FF – plugin: c:\program files\Java\j2re1.4.2_05\bin\NPOJI610.dll
.
**************************************************************************
catchme 0.3.1398 W2K/XP/Vista – rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2009-06-03 16:41
Windows 5.1.2600 Service Pack 3 NTFS
scanning hidden processes … scanning hidden autostart entries … scanning hidden files … scan completed successfully
hidden files: 0
**************************************************************************
.
——————— LOCKED REGISTRY KEYS ———————
[HKEY_USERS\S-1-5-21-3253738354-1626395089-3549077446-1007\Software\Microsoft\SystemCertificates\AddressBook*]
@Allowed: (Read) (RestrictedCode)
@Allowed: (Read) (RestrictedCode)
.
Completion time: 2009-06-03 16:42
ComboFix-quarantined-files.txt 2009-06-03 04:42
ComboFix2.txt 2009-06-02 08:19
Pre-Run: 29,597,954,048 bytes free
Post-Run: 29,584,035,840 bytes free
193— E O F —2009-06-01 09:33[code]
Answer #13
: Malwarebytes’ Anti-Malware :

    Please download http://www.besttechie.net/tools/mbam-setup.exeMalwarebytes’ Anti-Malware to your desktop.

  • Double-click mbam-setup.exe and follow the prompts to install the program.
  • At the end, be sure a checkmark is placed next to
    • Update Malwarebytes’ Anti-Malware
    • and Launch Malwarebytes’ Anti-Malware
  • then click Finish.
  • If an update is found, it will download and install the latest version.
  • Once the program has loaded, select Perform full scan, then click Scan.
  • When the scan is complete, click OK, then Show Results to view the results.
  • Be sure that everything is Checked (ticked) except items in the C:\System Volume Information folder and click on Remove Selected.
  • When completed, a log will open in Notepad. please copy and paste the log into your next reply
    • If you accidently close it, the log file is saved here and will be named like this:
    • C:\Documents and Settings\Username\Application Data\Malwarebytes\Malwarebytes’ Anti-Malware\Logs\mbam-log-date (time).txt

Note: If MBAM encounters a file that is difficult to remove, you will be presented with 1 of 2 prompts.
Click OK to either and let MBAM proceed with the disinfection process.
If asked to restart the computer, please do so immediately. Failure to reboot will prevent MBAM from removing all the malware.

Answer #14
Malwarebytes’ Anti-Malware 1.37
Database version: 2227
Windows 5.1.2600 Service Pack 3
6/4/2009 6:56:55 PM
mbam-log-2009-06-04 (18-56-55).txt
Scan type: Full Scan (C:\|E:\|)
Objects scanned: 182782
Time elapsed: 51 minute(s), 32 second(s)
Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 2
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 6
Memory Processes Infected:
(No malicious items detected)
Memory Modules Infected:
(No malicious items detected)
Registry Keys Infected:
HKEY_CURRENT_USER\SOFTWARE\WinPC Antivirus (Rogue.WinPCAntivirus) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\amd64si (Rootkit.Agent) -> Quarantined and deleted successfully.
Registry Values Infected:
(No malicious items detected)
Registry Data Items Infected:
(No malicious items detected)
Folders Infected:
(No malicious items detected)
Files Infected:
c:\qoobox\quarantine\c\windows\system32\UACbpjljcoxurmoubm.dll.vir (Trojan.TDSS) -> Quarantined and deleted successfully.
c:\qoobox\quarantine\c\windows\system32\UACeexuspqmfagvdkp.dll.vir (Trojan.TDSS) -> Quarantined and deleted successfully.
c:\qoobox\quarantine\c\windows\system32\UACjfjtytriswwbtte.dll.vir (Trojan.TDSS) -> Quarantined and deleted successfully.
c:\qoobox\quarantine\c\windows\system32\UACqpveisclvlnqqun.dll.vir (Trojan.TDSS) -> Quarantined and deleted successfully.
c:\qoobox\quarantine\c\windows\system32\drivers\UACxvimovrerfvmehw.sys.vir (Trojan.TDSS) -> Quarantined and deleted successfully.
c:\documents and settings\Darryl & Leah\Application Data\asd.bat (Rogue.WinPCDefender) -> Quarantined and deleted successfully.[code]
Answer #15
Click Start > Run and copy/paste the following bolded text into the Run box and click OK:
ComboFix /u
Image
This will also reset your restore points.
How is the machine running now?
Answer #16
do i have to redownload combo fix? not on my computer anymore? not sure when or why?
Answer #17
No the last fix was to uninstall ComboFix, how is the computer running?
Answer #18
No the last fix was to uninstall ComboFix, how is the computer running?Hi, my partner is away right now so im not quite up to speed on whats happening to our computer. i have noticed that it will frequently ‘timeout’ while on internet

 

| Sitemap |