BAM! I'm sucking wind. Here is the litiney of issue MBAM found. Everything
is compromised. Still more to do. It started with the PCDefender. That was
the one that I broke into.
I got Task Mgr back - but still have the "Access Denied to change of
services" message box whenever I do an msconfig.
Don't know if there was a solution to this thread - but MBAM works
This is much more complicated than what I thought - but the data and machine
is still functionable. Again, more to do.
Cut the following down due to the limit, but there were 705 items
Malwarebytes' Anti-Malware 1.41
Database version: 2988
Windows 5.1.2600 Service Pack 3, v.3311
10/19/2009 3:41:27 PM
mbam-log-2009-10-19 (15-41-27).txt
Registry Keys Infected: 682
Registry Values Infected: 10
Registry Data Items Infected: 7
Folders Infected: 3
Files Infected: 3
Registry Keys Infected:
HKEY_CLASSES_ROOT\WR (Malware.Trace) HKEY_CURRENT_USER\SOFTWARE\xflock
(Malware.Trace) HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows
NT\CurrentVersion\Image File Execution Options\_avp32.exe (Security.Hijack)
Break break break (just too much)
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File
Execution Options\fsav530wtbyb.exe (Security.Hijack)
Break break break -
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image Break
break - Over 705 !!!!!
File Execution Options\mcvsrte.exe (Security.Hijack)
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File
Execution Options\wscfxfw.exe (Security.Hijack)
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File
Execution Options\pctsTray.exe (Security.Hijack)
Registry Values Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs\C:\WINDOWS\system32\memman.vxd
(Rogue.sysCleaner) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File
Execution Options\Arrakis3.exe\debugger (Security.Hijack) -> Quarantined and
deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File
Execution Options\bdreinit.exe\debugger (Security.Hijack) -> Quarantined and
deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File
Execution Options\bdsubwiz.exe\debugger (Security.Hijack) -> Quarantined and
deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File
Execution Options\bdtkexec.exe\debugger (Security.Hijack) -> Quarantined and
deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File
Execution Options\bdwizreg.exe\debugger (Security.Hijack) -> Quarantined and
deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File
Execution Options\seccenter.exe\debugger (Security.Hijack) -> Quarantined and
deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File
Execution Options\uiscan.exe\debugger (Security.Hijack) -> Quarantined and
deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File
Execution Options\upgrepl.exe\debugger (Security.Hijack) -> Quarantined and
deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File
Execution Options\taskmgr.exe\debugger (Security.Hijack) -> Quarantined and
deleted successfully.
Registry Data Items Infected:
HKEY_CURRENT_USER\SOFTWARE\Classes\SOFTWARE\Microsoft\Internet
Explorer\SearchScopes\URL (Hijack.SearchPage) -> Bad:
(
http://search-gala.com/?&uid=157&q={searchTerms}) Good:
(
http://www.Google.com/) HKEY_USERS\.DEFAULT\SOFTWARE\Microsoft\Internet
Explorer\SearchScopes\URL (Hijack.SearchPage) -> Bad:
(
http://search-gala.com/?&uid=157&q={searchTerms}) Good:
(
http://www.Google.com/) HKEY_USERS\S-1-5-18\SOFTWARE\Microsoft\Internet
Explorer\SearchScopes\URL (Hijack.SearchPage) -> Bad:
(
http://search-gala.com/?&uid=157&q={searchTerms}) Good:
(
http://www.Google.com/)HKEY_USERS\S-1-5-19\SOFTWARE\Classes\SOFTWARE\Microsoft\Internet
Explorer\SearchScopes\URL (Hijack.SearchPage) -> Bad:
(
http://search-gala.com/?&uid=157&q={searchTerms}) Good:
(
http://www.Google.com/) HKEY_USERS\S-1-5-19\SOFTWARE\Microsoft\Internet
Explorer\SearchScopes\URL (Hijack.SearchPage) -> Bad:
(
http://search-gala.com/?&uid=157&q={searchTerms}) Good:
(
http://www.Google.com/) -> Quarantined and deleted successfully.
HKEY_USERS\S-1-5-20\SOFTWARE\Classes\SOFTWARE\Microsoft\Internet
Explorer\SearchScopes\URL (Hijack.SearchPage) -> Bad:
(
http://search-gala.com/?&uid=157&q={searchTerms}) Good:
(
http://www.Google.com/) -> Quarantined and deleted successfully.
HKEY_USERS\S-1-5-20\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\URL
(Hijack.SearchPage) -> Bad:
(
http://search-gala.com/?&uid=157&q={searchTerms}) Good:
(
http://www.Google.com/)
Folders Infected:
C:\Program Files\Temporary (Trojan.Agent) C:\Program Files\WinAble
(Trojan.Adloader)
C:\Documents and Settings\HP_Owner.YOUR-D0F670B45A\Application Data\Windows
PC Defender (Rogue.WindowsPCDefender)
Files Infected:
C:\WINDOWS\system32\memman.vxd (Rogue.sysCleaner) C:\Documents and
Settings\HP_Owner.YOUR-D0F670B45A\Application Data\Windows PC
Defender\Instructions.ini (Rogue.WindowsPCDefender) C:\Documents and
Settings\HP_Owner.YOUR-D0F670B45A\Application Data\Microsoft\Internet
Explorer\Quick Launch\Windows PC Defender.lnk (Rogue.WindowsPCDefender)