Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Hijackthis Log: Please Help Diagnose


  • This topic is locked This topic is locked
9 replies to this topic

#1 dmohr

dmohr

  • Members
  • 5 posts
  • OFFLINE
  •  
  • Local time:03:29 AM

Posted 24 August 2008 - 06:57 PM

Not: hijacker began last few days. Will not let me access any security sites to get fixes, so copied hijack this log file and sent from another computer.



Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 7:38:11 PM, on 8/24/2008
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)
Boot mode: Normal

Running processes:
C:\WINDOWS\system32\csrss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\svchost.exe
C:\Program Files\Common Files\Symantec Shared\ccEvtMgr.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\guard.exe
C:\Program Files\EarthLink TotalAccess\WENGINE\wmonitor.exe
C:\Program Files\Norton AntiVirus\navapsvc.exe
C:\WINDOWS\system32\HPZipm12.exe
C:\Program Files\Analog Devices\SoundMAX\SMAgent.exe
C:\WINDOWS\system32\svchost.exe
C:\Program Files\ThreatFire\TFService.exe
C:\WINDOWS\System32\alg.exe
C:\Program Files\Common Files\Symantec Shared\ccApp.exe
C:\Program Files\Analog Devices\SoundMAX\SMTray.exe
C:\Program Files\Microsoft IntelliPoint\ipoint.exe
C:\Program Files\PC Tools AntiVirus\PCTAV.exe
C:\Program Files\ThreatFire\TFTray.exe
C:\Garmin\ANT Agent\ANT Agent.exe
C:\Program Files\Messenger\msmsgs.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Internet Explorer\Iexplore.exe
C:\WINDOWS\system32\wuauclt.exe
C:\Program Files\Trend Micro\HijackThis\HijackThis.exe
C:\WINDOWS\system32\wbem\wmiprvse.exe

F2 - REG:system.ini: UserInit=C:\WINDOWS\system32\userinit.exe,C:\WINDOWS\system32\oembios.exe,
O4 - HKLM\..\Run: [ccApp] C:\Program Files\Common Files\Symantec Shared\ccApp.exe
O4 - HKLM\..\Run: [ccRegVfy] C:\Program Files\Common Files\Symantec Shared\ccRegVfy.exe
O4 - HKLM\..\Run: [Smapp] C:\Program Files\Analog Devices\SoundMAX\SMTray.exe
O4 - HKLM\..\Run: [IntelliPoint] "C:\Program Files\Microsoft IntelliPoint\ipoint.exe"
O4 - HKLM\..\Run: [PCTAVApp] "C:\Program Files\PC Tools AntiVirus\PCTAV.exe" /MONITORSCAN
O4 - HKLM\..\Run: [ThreatFire] C:\Program Files\ThreatFire\TFTray.exe
O4 - HKCU\..\Run: [ANT Agent] C:\Garmin\ANT Agent\ANT Agent.exe
O4 - HKCU\..\Run: [MSMSGS] "C:\Program Files\Messenger\msmsgs.exe" /background
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_03\bin\ssv.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_03\bin\ssv.dll
O9 - Extra button: (no name) - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\WINDOWS\system32\shdocvw.dll
O9 - Extra 'Tools' menuitem: Spybot - Search && Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\WINDOWS\system32\shdocvw.dll
O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O23 - Service: AVG Anti-Spyware Guard - GRISOFT s.r.o. - C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\guard.exe
O23 - Service: Symantec Event Manager (ccEvtMgr) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccEvtMgr.exe
O23 - Service: Symantec Password Validation Service (ccPwdSvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccPwdSvc.exe
O23 - Service: EarthLink Monitor Service (EarthLinkMonitor) - Boingo Wireless, Inc. - C:\Program Files\EarthLink TotalAccess\WENGINE\wmonitor.exe
O23 - Service: Norton AntiVirus Auto Protect Service (navapsvc) - Symantec Corporation - C:\Program Files\Norton AntiVirus\navapsvc.exe
O23 - Service: Pml Driver HPZ12 - HP - C:\WINDOWS\system32\HPZipm12.exe
O23 - Service: ScriptBlocking Service (SBService) - Symantec Corporation - C:\PROGRA~1\COMMON~1\SYMANT~1\SCRIPT~1\SBServ.exe
O23 - Service: Symantec Network Drivers Service (SNDSrvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\SNDSrvc.exe
O23 - Service: SoundMAX Agent Service (SoundMAX Agent Service (default)) - Analog Devices, Inc. - C:\Program Files\Analog Devices\SoundMAX\SMAgent.exe
O23 - Service: ThreatFire - PC Tools - C:\Program Files\ThreatFire\TFService.exe

--
End of file - 4588 bytes

BC AdBot (Login to Remove)

 


#2 PropagandaPanda

PropagandaPanda


  • Malware Response Team
  • 10,433 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:03:29 AM

Posted 25 August 2008 - 08:48 AM

Hello. I am PropagandaPanda (Panda or PP for short) and I will be helping you with your log.

I will need some time to look over your computer's log(s). I am still in training, so my responses to you must be checked by a coach.

You may want to keep the link to this topic in your favorites. Alternatively, you can click the Posted Image button at the top bar of this topic and Track this Topic, where you can choose email notifications. The topics you are tracking are shown here.

Please take note of a few guidelines for this fix:
  • Refrain from making any changes to your computer including installing/uninstall programs, deleting files, modifying the registry, and running scanners or tools. Doing so could cause changes to the directions I have to give you and prolong the time required. Further more, you should not be taking any advice relating to this computer from any other source throughout the course of this fix.
  • If you do not understand any step(s) provided, please do not hesitate to ask. I would much rather clarify instructions or explain them differently than have something important broken.
  • Even if things appear to be better, it may not mean we are finished. Please continue to follow my instructions and reply back until I give you the "all clean". We do not want to clean you part-way, only to have the system re-infect itself.
  • Finally, please reply using the Posted Image button in the lower right hand corner of your screen. Do not start a new topic. The logs that you post should be pasted directly into the reply. Only attach them if requested or if they do not fit into the post.
With Regards,
The Panda

Important Note to Other Users Reading this Topic: The instructions provided in this topic are for the original topic starter only. Even if you have similar problems or log entries to those given here, please do not follow the directions, especially those involving specific tools and scripts. Doing so can result in serious damage to your computer. Instead, please start your own topic. Feel free to link to any relevant topics as needed.

#3 PropagandaPanda

PropagandaPanda


  • Malware Response Team
  • 10,433 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:03:29 AM

Posted 26 August 2008 - 08:21 AM

Hello Dmohr.

Please transfer any tools needed to the infected computer's desktop before running them.

Posted ImageBackdoor Threat
I'm sorry to say that your computer is infected with one or more backdoor trojans.

This means that sensitive information could have been stolen. I would advise to change any passwords for any accounts that you have accessed with the infected computer using a clean computer ASAP. If you have used this computer for banking, I would strongly suggest that you report the possible stolen information. Please do not use the computer for any further transactions, or to enter any other information, if at all possible, until it is declared clean.

You may want to read this article on how to handle identity theft.
You may also want to read this article regarding preventing of identity theft.

This computer can still be cleaned, however, I cannot guarantee that it will be 100% safe even after disinfection.

Please read When Should I Format, How Should I Reinstall.

I will proceed assuming you wish to disinfect. If you want to do a reinstall, reply back saying so.

Uninstall PCTools Antivirus and AVG Antispyware
I see signs of more than one antivirus program, Norton and PCToolsAV. It is not recommended that you do so. In addition to wasting resources, the programs may detect virus signatures in the other and cause false positives. The different drivers used by the programs can cause crashes.

AVG Antispyware 7.5 is now outdated and will not provide you with sufficient protection. It had been combined with AVG antivirus 7.5 into AVG8.

Please uninstall PCTools Antivirus and AVG Antispyware 7.5 using Add/Remove Programs. I'm asking you to uninstall this one because I only see one component of it left.

It's possible that the uninstall entries are missing, in that case, we will remove it otherwise later.


Disable Realtime Protection
Realtime security programs are important for keeping out malware. However, they can interfere with the tools we need to run.

Please navigate to the system tray on the bottom right hand corner and look for a Posted Image sign.
  • right-click it -> chose "Disable Auto-Protect."
  • select a duration of 5 hours (this assures no interference with the cleanup of your pc)
  • click "Ok."
  • a popup will warn that protection will now be disabled and the sign will now look like this: Posted Image
You succesfully disabled the Norton Antivirus Guard.

Download and Run ComboFix
Download Combofix from any of the links below, and save it to your desktop.
Link 1, Link 2, Link 3

Refer to this page for full instructions on running ComboFix.
http://www.bleepingcomputer.com/combofix/how-to-use-combofix
  • Close/disable all anti-virus and anti-malware programs so they do not interfere with the running of ComboFix. Refer to this page if you are not sure how.
  • Double click ComboFix.exe to start the program. Agree to the prompts.
  • When ComboFix is finished, a log report (C:\ComboFix.txt) will open. Post back with it.
Leave your computer alone while ComboFix is running.

ComboFix will restart your computer if malware is found; allow it to do so.



Save Uninstall List with HijackThis
  • Double click the HijackThis icon on your desktop.
  • If you see a while screen, click Main Menu at the middle bottom of the window, otherwise move onto the next step.
  • Click Open the Misc Tools section.
  • Under System tools, select Uninstall Manager....
  • Near the bottom right, click Save list... and save uninstall_list.txt onto your desktop.
  • Close out of HijackThis.
  • Post back with uninstall_list.txt.
Rename HijackThis Before Taking New Log
I suspect that an infection is hiding some entries from HijackThis. Please rename the program.
  • Double click the My Computer icon on your desktop, then C: Drive, then Program Files, then Trend Micro, then HijackThis.
  • Right click on HijackThis.exe (or just HijackThis if you don't have extensions enabled), and select Rename.
  • Input fluffybunny.exe and hit Enter.
  • Close out of the window
The shortcut on your desktop will need to be changed to point to the newly named HijackThis.
  • Right click the HijackThis icon on your desktop and select Properties.
  • In the Target box, copy in with the qoutes:
    "C:\Program Files\Trend Micro\HijackThis\fluffybunny.exe"
  • Hit OK.
Now take a new log.
  • Double click the HijackThis icon on your desktop.
  • If you see a while screen, click Main Menu at the middle bottom of the window, otherwise move onto the next step.
  • Click the first option, Do a system scan and save a logfile.
  • The scan will finish in a moment and a notepad with hijackthis.txt will open.
-------------
Post back with:
-the ComboFix log
-the uninstall list generated by HijackThis
-a new HijackThis log

Please also comment on how your computer is running now. Is you Internet access better?

With Regards,
The Panda

#4 dmohr

dmohr
  • Topic Starter

  • Members
  • 5 posts
  • OFFLINE
  •  
  • Local time:03:29 AM

Posted 27 August 2008 - 11:09 PM

Removed PCTools and AVG software

Disabled realtime protection

Combofix downloaded and put on desktop.

Loaded recovery module but did not start per tutorial.

However, message from combofix is "combofix has detected rootkit activity and needs to reboot this machine. If I click ok it reboots and nothing else. If I click combofix again it goes through the same routine.

What is next action?

Thank you!

#5 PropagandaPanda

PropagandaPanda


  • Malware Response Team
  • 10,433 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:03:29 AM

Posted 28 August 2008 - 09:49 AM

Hello Dmohr.

Please see if ComboFix created a log here:
C:\ComboFix.txt
If so post back with that.

Download and Run ComboFix
Download Combofix from any of the links below. You must rename it before saving it. Save it to your desktop.

Link 1
Link 2
Link 3

Posted Image

Posted Image

Double click on Combo-Fix.exe & follow the prompts.

When finished, it will produce a open a report for you. Post back with it. It is at C:\ComboFix.txt.

Do not mouseclick the ComboFix window while it's running. That may cause it to stall.

If you still have trouble with ComboFix, skip it for now.

Download and Run Scan with GMER
We will use GMER to scan for rootkits.
  • Download gmer.zip and save to your desktop.
  • Unzip/extract the file to its own folder. (Click here for information on how to do this if not sure. Win 2000 users click here.
  • When you have done this, disconnect from the Internet and close all running programs.
    There is a small chance this application may crash your computer so save any work you have open.
  • Double-click on Gmer.exe to start the program.
  • Allow the gmer.sys driver to load if asked.
  • If it gives you a warning at program start about rootkit activity and asks if you want to run a scan...click NO.
  • Click on Settings, then check the first five settings:
    • System Protection and Tracing
    • Processes
    • Save created processes to the log
    • Drivers
    • Save loaded drivers to the log
  • You will be prompted to restart your computer. Please do so.
After the reboot, run Gmer again and click on the Rootkit tab.
  • Look at the right hand side (under Files) and uncheck all drives with the exception of your C drive.
  • Make sure all other boxes on the right of the screen are checked, EXCEPT for Show All.
  • Click on the Scan and wait for the scan to finish.
    Note: Before scanning, make sure all other running programs are closed and no other actions like a scheduled antivirus scan will occur while this scan completes. Also do not use your computer during the scan. You will know that the scan is done when the Stop buttons turns back to Scan.
  • When completed, click on the Copy button and right-click on your Desktop, choose New>Text document. Once the file is created, open it and right-click again and choose Paste. Save the file as gmer.txt and copy the information in your next reply.
  • Note: If you have any problems, try running GMER in Safe Mode
Important!:Please do not select the Show all checkbox during the scan..
----------
Please post back with:
-the old ComboFix log, if it was created
-the new ComboFix log, if it worked
-the GMER log

With Regards,
The Panda

#6 dmohr

dmohr
  • Topic Starter

  • Members
  • 5 posts
  • OFFLINE
  •  
  • Local time:03:29 AM

Posted 28 August 2008 - 09:23 PM

Thank you again for your advice and instructions.

I am still not able to run combo-fix - it reboots when it detects the rootkit, in safe mode too.

I was able to run gmer - log follows.

Thanks again.


GMER 1.0.14.14536 - http://www.gmer.net
Rootkit scan 2008-08-28 21:29:40
Windows 5.1.2600 Service Pack 2


---- System - GMER 1.0.14 ----

SSDT 82368FC0 ZwConnectPort

Code E1700430 ZwEnumerateKey
Code E1700510 ZwFlushInstructionCache
Code F85B2E34 pIofCallDriver

---- Kernel code sections - GMER 1.0.14 ----

PAGE ntoskrnl.exe!ZwEnumerateKey 8056EEB0 5 Bytes JMP E1700434
PAGE ntoskrnl.exe!ZwFlushInstructionCache 805769EA 5 Bytes JMP E1700514

---- User code sections - GMER 1.0.14 ----

.text C:\WINDOWS\system32\NOTEPAD.EXE[2624] GDI32.dll!ExtTextOutW 77F18086 5 Bytes JMP 00AD000A

---- User IAT/EAT - GMER 1.0.14 ----

IAT C:\Program Files\Analog Devices\SoundMAX\SMAgent.exe[620] @ C:\WINDOWS\system32\kernel32.dll [ntdll.dll!NtQueryDirectoryFile] 00134934
IAT C:\Program Files\Analog Devices\SoundMAX\SMAgent.exe[620] @ C:\WINDOWS\system32\kernel32.dll [ntdll.dll!LdrLoadDll] 001348C6
IAT C:\Program Files\Analog Devices\SoundMAX\SMAgent.exe[620] @ C:\WINDOWS\system32\kernel32.dll [ntdll.dll!LdrGetProcedureAddress] 00134888
IAT C:\Program Files\Analog Devices\SoundMAX\SMAgent.exe[620] @ C:\WINDOWS\system32\kernel32.dll [ntdll.dll!NtCreateThread] 00134855
IAT C:\Program Files\Analog Devices\SoundMAX\SMAgent.exe[620] @ C:\WINDOWS\system32\SHELL32.dll [USER32.dll!TranslateMessage] 00133B4E
IAT C:\Program Files\Analog Devices\SoundMAX\SMAgent.exe[620] @ C:\WINDOWS\system32\SHELL32.dll [USER32.dll!GetClipboardData] 0013386F
IAT C:\Program Files\Analog Devices\SoundMAX\SMAgent.exe[620] @ C:\WINDOWS\system32\SHLWAPI.dll [USER32.dll!TranslateMessage] 00133B4E
IAT C:\Program Files\Analog Devices\SoundMAX\SMAgent.exe[620] @ C:\WINDOWS\system32\ole32.dll [USER32.dll!GetClipboardData] 0013386F
IAT C:\Program Files\Analog Devices\SoundMAX\SMAgent.exe[620] @ C:\WINDOWS\system32\ole32.dll [USER32.dll!TranslateMessage] 00133B4E
IAT C:\Program Files\Analog Devices\SoundMAX\SMAgent.exe[620] @ C:\WINDOWS\system32\WS2HELP.dll [ntdll.dll!NtQueryDirectoryFile] 00134934
IAT C:\WINDOWS\system32\services.exe[724] @ C:\WINDOWS\system32\services.exe [ntdll.dll!NtQueryDirectoryFile] 00C44934
IAT C:\WINDOWS\system32\services.exe[724] @ C:\WINDOWS\system32\kernel32.dll [ntdll.dll!NtQueryDirectoryFile] 00C44934
IAT C:\WINDOWS\system32\services.exe[724] @ C:\WINDOWS\system32\kernel32.dll [ntdll.dll!LdrLoadDll] 00C448C6
IAT C:\WINDOWS\system32\services.exe[724] @ C:\WINDOWS\system32\kernel32.dll [ntdll.dll!LdrGetProcedureAddress] 00C44888
IAT C:\WINDOWS\system32\services.exe[724] @ C:\WINDOWS\system32\kernel32.dll [ntdll.dll!NtCreateThread] 00C44855
IAT C:\WINDOWS\system32\services.exe[724] @ C:\WINDOWS\system32\SHLWAPI.dll [USER32.dll!TranslateMessage] 00C43B4E
IAT C:\WINDOWS\system32\services.exe[724] @ C:\WINDOWS\system32\WS2HELP.dll [ntdll.dll!NtQueryDirectoryFile] 00C44934
IAT C:\WINDOWS\system32\services.exe[724] @ C:\WINDOWS\system32\shell32.dll [USER32.dll!TranslateMessage] 00C43B4E
IAT C:\WINDOWS\system32\services.exe[724] @ C:\WINDOWS\system32\shell32.dll [USER32.dll!GetClipboardData] 00C4386F
IAT C:\WINDOWS\system32\services.exe[724] @ C:\WINDOWS\system32\ole32.dll [USER32.dll!GetClipboardData] 00C4386F
IAT C:\WINDOWS\system32\services.exe[724] @ C:\WINDOWS\system32\ole32.dll [USER32.dll!TranslateMessage] 00C43B4E
IAT C:\WINDOWS\system32\lsass.exe[736] @ C:\WINDOWS\system32\kernel32.dll [ntdll.dll!NtQueryDirectoryFile] 00DE4934
IAT C:\WINDOWS\system32\lsass.exe[736] @ C:\WINDOWS\system32\kernel32.dll [ntdll.dll!LdrLoadDll] 00DE48C6
IAT C:\WINDOWS\system32\lsass.exe[736] @ C:\WINDOWS\system32\kernel32.dll [ntdll.dll!LdrGetProcedureAddress] 00DE4888
IAT C:\WINDOWS\system32\lsass.exe[736] @ C:\WINDOWS\system32\kernel32.dll [ntdll.dll!NtCreateThread] 00DE4855
IAT C:\WINDOWS\system32\lsass.exe[736] @ C:\WINDOWS\system32\LSASRV.dll [ntdll.dll!LdrLoadDll] 00DE48C6
IAT C:\WINDOWS\system32\lsass.exe[736] @ C:\WINDOWS\system32\WS2HELP.dll [ntdll.dll!NtQueryDirectoryFile] 00DE4934
IAT C:\WINDOWS\system32\lsass.exe[736] @ C:\WINDOWS\system32\SAMSRV.dll [ntdll.dll!LdrLoadDll] 00DE48C6
IAT C:\WINDOWS\system32\lsass.exe[736] @ C:\WINDOWS\system32\SAMSRV.dll [ntdll.dll!LdrGetProcedureAddress] 00DE4888
IAT C:\WINDOWS\system32\lsass.exe[736] @ C:\WINDOWS\system32\ole32.dll [USER32.dll!GetClipboardData] 00DE386F
IAT C:\WINDOWS\system32\lsass.exe[736] @ C:\WINDOWS\system32\ole32.dll [USER32.dll!TranslateMessage] 00DE3B4E
IAT C:\WINDOWS\system32\lsass.exe[736] @ C:\WINDOWS\system32\SHELL32.dll [USER32.dll!TranslateMessage] 00DE3B4E
IAT C:\WINDOWS\system32\lsass.exe[736] @ C:\WINDOWS\system32\SHELL32.dll [USER32.dll!GetClipboardData] 00DE386F
IAT C:\WINDOWS\system32\lsass.exe[736] @ C:\WINDOWS\system32\SHLWAPI.dll [USER32.dll!TranslateMessage] 00DE3B4E
IAT C:\WINDOWS\system32\svchost.exe[892] @ C:\WINDOWS\system32\kernel32.dll [ntdll.dll!NtCreateThread] 00BA4855
IAT C:\WINDOWS\system32\svchost.exe[960] @ C:\WINDOWS\system32\kernel32.dll [ntdll.dll!NtQueryDirectoryFile] 00404934
IAT C:\WINDOWS\system32\svchost.exe[960] @ C:\WINDOWS\system32\kernel32.dll [ntdll.dll!LdrLoadDll] 004048C6
IAT C:\WINDOWS\system32\svchost.exe[960] @ C:\WINDOWS\system32\kernel32.dll [ntdll.dll!LdrGetProcedureAddress] 00404888
IAT C:\WINDOWS\system32\svchost.exe[960] @ C:\WINDOWS\system32\kernel32.dll [ntdll.dll!NtCreateThread] 00404855
IAT C:\WINDOWS\system32\svchost.exe[960] @ C:\WINDOWS\system32\ole32.dll [USER32.dll!GetClipboardData] 0040386F
IAT C:\WINDOWS\system32\svchost.exe[960] @ C:\WINDOWS\system32\ole32.dll [USER32.dll!TranslateMessage] 00403B4E
IAT C:\WINDOWS\system32\svchost.exe[960] @ C:\WINDOWS\system32\SHELL32.dll [USER32.dll!TranslateMessage] 00403B4E
IAT C:\WINDOWS\system32\svchost.exe[960] @ C:\WINDOWS\system32\SHELL32.dll [USER32.dll!GetClipboardData] 0040386F
IAT C:\WINDOWS\system32\svchost.exe[960] @ C:\WINDOWS\system32\SHLWAPI.dll [USER32.dll!TranslateMessage] 00403B4E
IAT C:\WINDOWS\system32\svchost.exe[960] @ C:\WINDOWS\system32\WS2HELP.dll [ntdll.dll!NtQueryDirectoryFile] 00404934
IAT C:\WINDOWS\system32\svchost.exe[1036] @ C:\WINDOWS\system32\kernel32.dll [ntdll.dll!NtQueryDirectoryFile] 00934934
IAT C:\WINDOWS\system32\svchost.exe[1036] @ C:\WINDOWS\system32\kernel32.dll [ntdll.dll!LdrLoadDll] 009348C6
IAT C:\WINDOWS\system32\svchost.exe[1036] @ C:\WINDOWS\system32\kernel32.dll [ntdll.dll!LdrGetProcedureAddress] 00934888
IAT C:\WINDOWS\system32\svchost.exe[1036] @ C:\WINDOWS\system32\kernel32.dll [ntdll.dll!NtCreateThread] 00934855
IAT C:\WINDOWS\system32\svchost.exe[1036] @ C:\WINDOWS\system32\ole32.dll [USER32.dll!GetClipboardData] 0093386F
IAT C:\WINDOWS\system32\svchost.exe[1036] @ C:\WINDOWS\system32\ole32.dll [USER32.dll!TranslateMessage] 00933B4E
IAT C:\WINDOWS\system32\svchost.exe[1036] @ C:\WINDOWS\system32\SHELL32.dll [USER32.dll!TranslateMessage] 00933B4E
IAT C:\WINDOWS\system32\svchost.exe[1036] @ C:\WINDOWS\system32\SHELL32.dll [USER32.dll!GetClipboardData] 0093386F
IAT C:\WINDOWS\system32\svchost.exe[1036] @ C:\WINDOWS\system32\SHLWAPI.dll [USER32.dll!TranslateMessage] 00933B4E
IAT C:\WINDOWS\system32\svchost.exe[1036] @ c:\windows\system32\WS2HELP.dll [ntdll.dll!NtQueryDirectoryFile] 00934934
IAT C:\WINDOWS\System32\svchost.exe[1132] @ C:\WINDOWS\system32\kernel32.dll [ntdll.dll!NtQueryDirectoryFile] 00A34934
IAT C:\WINDOWS\System32\svchost.exe[1132] @ C:\WINDOWS\system32\kernel32.dll [ntdll.dll!LdrLoadDll] 00A348C6
IAT C:\WINDOWS\System32\svchost.exe[1132] @ C:\WINDOWS\system32\kernel32.dll [ntdll.dll!LdrGetProcedureAddress] 00A34888
IAT C:\WINDOWS\System32\svchost.exe[1132] @ C:\WINDOWS\system32\kernel32.dll [ntdll.dll!NtCreateThread] 00A34855
IAT C:\WINDOWS\System32\svchost.exe[1132] @ C:\WINDOWS\system32\ole32.dll [USER32.dll!GetClipboardData] 00A3386F
IAT C:\WINDOWS\System32\svchost.exe[1132] @ C:\WINDOWS\system32\ole32.dll [USER32.dll!TranslateMessage] 00A33B4E
IAT C:\WINDOWS\System32\svchost.exe[1132] @ C:\WINDOWS\system32\SHELL32.dll [USER32.dll!TranslateMessage] 00A33B4E
IAT C:\WINDOWS\System32\svchost.exe[1132] @ C:\WINDOWS\system32\SHELL32.dll [USER32.dll!GetClipboardData] 00A3386F
IAT C:\WINDOWS\System32\svchost.exe[1132] @ C:\WINDOWS\system32\SHLWAPI.dll [USER32.dll!TranslateMessage] 00A33B4E
IAT C:\WINDOWS\System32\svchost.exe[1132] @ C:\WINDOWS\System32\WS2HELP.dll [ntdll.dll!NtQueryDirectoryFile] 00A34934
IAT C:\WINDOWS\system32\svchost.exe[1228] @ C:\WINDOWS\system32\kernel32.dll [ntdll.dll!NtQueryDirectoryFile] 00794934
IAT C:\WINDOWS\system32\svchost.exe[1228] @ C:\WINDOWS\system32\kernel32.dll [ntdll.dll!LdrLoadDll] 007948C6
IAT C:\WINDOWS\system32\svchost.exe[1228] @ C:\WINDOWS\system32\kernel32.dll [ntdll.dll!LdrGetProcedureAddress] 00794888
IAT C:\WINDOWS\system32\svchost.exe[1228] @ C:\WINDOWS\system32\kernel32.dll [ntdll.dll!NtCreateThread] 00794855
IAT C:\WINDOWS\system32\svchost.exe[1228] @ C:\WINDOWS\system32\ole32.dll [USER32.dll!GetClipboardData] 0079386F
IAT C:\WINDOWS\system32\svchost.exe[1228] @ C:\WINDOWS\system32\ole32.dll [USER32.dll!TranslateMessage] 00793B4E
IAT C:\WINDOWS\system32\svchost.exe[1228] @ C:\WINDOWS\system32\SHELL32.dll [USER32.dll!TranslateMessage] 00793B4E
IAT C:\WINDOWS\system32\svchost.exe[1228] @ C:\WINDOWS\system32\SHELL32.dll [USER32.dll!GetClipboardData] 0079386F
IAT C:\WINDOWS\system32\svchost.exe[1228] @ C:\WINDOWS\system32\SHLWAPI.dll [USER32.dll!TranslateMessage] 00793B4E
IAT C:\WINDOWS\system32\svchost.exe[1228] @ C:\WINDOWS\system32\WS2HELP.dll [ntdll.dll!NtQueryDirectoryFile] 00794934
IAT C:\Program Files\EarthLink TotalAccess\WENGINE\wmonitor.exe[1520] @ C:\WINDOWS\system32\kernel32.dll [ntdll.dll!NtQueryDirectoryFile] 00134934
IAT C:\Program Files\EarthLink TotalAccess\WENGINE\wmonitor.exe[1520] @ C:\WINDOWS\system32\kernel32.dll [ntdll.dll!LdrLoadDll] 001348C6
IAT C:\Program Files\EarthLink TotalAccess\WENGINE\wmonitor.exe[1520] @ C:\WINDOWS\system32\kernel32.dll [ntdll.dll!LdrGetProcedureAddress] 00134888
IAT C:\Program Files\EarthLink TotalAccess\WENGINE\wmonitor.exe[1520] @ C:\WINDOWS\system32\kernel32.dll [ntdll.dll!NtCreateThread] 00134855
IAT C:\Program Files\EarthLink TotalAccess\WENGINE\wmonitor.exe[1520] @ C:\WINDOWS\system32\ole32.dll [USER32.dll!GetClipboardData] 0013386F
IAT C:\Program Files\EarthLink TotalAccess\WENGINE\wmonitor.exe[1520] @ C:\WINDOWS\system32\ole32.dll [USER32.dll!TranslateMessage] 00133B4E
IAT C:\Program Files\EarthLink TotalAccess\WENGINE\wmonitor.exe[1520] @ C:\WINDOWS\system32\SHLWAPI.dll [USER32.dll!TranslateMessage] 00133B4E
IAT C:\Program Files\EarthLink TotalAccess\WENGINE\wmonitor.exe[1520] @ C:\WINDOWS\system32\WS2HELP.dll [ntdll.dll!NtQueryDirectoryFile] 00134934
IAT C:\Program Files\EarthLink TotalAccess\WENGINE\wmonitor.exe[1520] @ C:\WINDOWS\system32\shell32.dll [USER32.dll!TranslateMessage] 00133B4E
IAT C:\Program Files\EarthLink TotalAccess\WENGINE\wmonitor.exe[1520] @ C:\WINDOWS\system32\shell32.dll [USER32.dll!GetClipboardData] 0013386F
IAT C:\WINDOWS\system32\svchost.exe[1680] @ C:\WINDOWS\system32\kernel32.dll [ntdll.dll!NtQueryDirectoryFile] 00404934
IAT C:\WINDOWS\system32\svchost.exe[1680] @ C:\WINDOWS\system32\kernel32.dll [ntdll.dll!LdrLoadDll] 004048C6
IAT C:\WINDOWS\system32\svchost.exe[1680] @ C:\WINDOWS\system32\kernel32.dll [ntdll.dll!LdrGetProcedureAddress] 00404888
IAT C:\WINDOWS\system32\svchost.exe[1680] @ C:\WINDOWS\system32\kernel32.dll [ntdll.dll!NtCreateThread] 00404855
IAT C:\WINDOWS\system32\svchost.exe[1680] @ C:\WINDOWS\system32\ole32.dll [USER32.dll!GetClipboardData] 0040386F
IAT C:\WINDOWS\system32\svchost.exe[1680] @ C:\WINDOWS\system32\ole32.dll [USER32.dll!TranslateMessage] 00403B4E
IAT C:\WINDOWS\system32\svchost.exe[1680] @ C:\WINDOWS\system32\SHELL32.dll [USER32.dll!TranslateMessage] 00403B4E
IAT C:\WINDOWS\system32\svchost.exe[1680] @ C:\WINDOWS\system32\SHELL32.dll [USER32.dll!GetClipboardData] 0040386F
IAT C:\WINDOWS\system32\svchost.exe[1680] @ C:\WINDOWS\system32\SHLWAPI.dll [USER32.dll!TranslateMessage] 00403B4E
IAT C:\WINDOWS\system32\svchost.exe[1680] @ C:\WINDOWS\system32\WS2HELP.dll [ntdll.dll!NtQueryDirectoryFile] 00404934
IAT C:\WINDOWS\system32\HPZipm12.exe[1708] @ C:\WINDOWS\system32\kernel32.dll [ntdll.dll!NtQueryDirectoryFile] 00134934
IAT C:\WINDOWS\system32\HPZipm12.exe[1708] @ C:\WINDOWS\system32\kernel32.dll [ntdll.dll!LdrLoadDll] 001348C6
IAT C:\WINDOWS\system32\HPZipm12.exe[1708] @ C:\WINDOWS\system32\kernel32.dll [ntdll.dll!LdrGetProcedureAddress] 00134888
IAT C:\WINDOWS\system32\HPZipm12.exe[1708] @ C:\WINDOWS\system32\kernel32.dll [ntdll.dll!NtCreateThread] 00134855
IAT C:\WINDOWS\system32\HPZipm12.exe[1708] @ C:\WINDOWS\system32\WS2HELP.dll [ntdll.dll!NtQueryDirectoryFile] 00134934
IAT C:\WINDOWS\system32\HPZipm12.exe[1708] @ C:\WINDOWS\system32\ole32.dll [USER32.dll!GetClipboardData] 0013386F
IAT C:\WINDOWS\system32\HPZipm12.exe[1708] @ C:\WINDOWS\system32\ole32.dll [USER32.dll!TranslateMessage] 00133B4E
IAT C:\WINDOWS\system32\HPZipm12.exe[1708] @ C:\WINDOWS\system32\SHLWAPI.dll [USER32.dll!TranslateMessage] 00133B4E
IAT C:\WINDOWS\system32\HPZipm12.exe[1708] @ C:\WINDOWS\system32\shell32.dll [USER32.dll!TranslateMessage] 00133B4E
IAT C:\WINDOWS\system32\HPZipm12.exe[1708] @ C:\WINDOWS\system32\shell32.dll [USER32.dll!GetClipboardData] 0013386F
IAT C:\Program Files\Common Files\Symantec Shared\ccEvtMgr.exe[1840] @ C:\WINDOWS\system32\kernel32.dll [ntdll.dll!NtQueryDirectoryFile] 00134934
IAT C:\Program Files\Common Files\Symantec Shared\ccEvtMgr.exe[1840] @ C:\WINDOWS\system32\kernel32.dll [ntdll.dll!LdrLoadDll] 001348C6
IAT C:\Program Files\Common Files\Symantec Shared\ccEvtMgr.exe[1840] @ C:\WINDOWS\system32\kernel32.dll [ntdll.dll!LdrGetProcedureAddress] 00134888
IAT C:\Program Files\Common Files\Symantec Shared\ccEvtMgr.exe[1840] @ C:\WINDOWS\system32\kernel32.dll [ntdll.dll!NtCreateThread] 00134855
IAT C:\Program Files\Common Files\Symantec Shared\ccEvtMgr.exe[1840] @ C:\WINDOWS\system32\ole32.dll [USER32.dll!GetClipboardData] 0013386F
IAT C:\Program Files\Common Files\Symantec Shared\ccEvtMgr.exe[1840] @ C:\WINDOWS\system32\ole32.dll [USER32.dll!TranslateMessage] 00133B4E
IAT C:\Program Files\Common Files\Symantec Shared\ccEvtMgr.exe[1840] @ C:\WINDOWS\system32\SHLWAPI.dll [USER32.dll!TranslateMessage] 00133B4E
IAT C:\Program Files\Common Files\Symantec Shared\ccEvtMgr.exe[1840] @ C:\WINDOWS\system32\WS2HELP.dll [ntdll.dll!NtQueryDirectoryFile] 00134934
IAT C:\Program Files\Common Files\Symantec Shared\ccEvtMgr.exe[1840] @ C:\WINDOWS\system32\shell32.dll [USER32.dll!TranslateMessage] 00133B4E
IAT C:\Program Files\Common Files\Symantec Shared\ccEvtMgr.exe[1840] @ C:\WINDOWS\system32\shell32.dll [USER32.dll!GetClipboardData] 0013386F
IAT C:\WINDOWS\system32\spoolsv.exe[1992] @ C:\WINDOWS\system32\kernel32.dll [ntdll.dll!NtQueryDirectoryFile] 00404934
IAT C:\WINDOWS\system32\spoolsv.exe[1992] @ C:\WINDOWS\system32\kernel32.dll [ntdll.dll!LdrLoadDll] 004048C6
IAT C:\WINDOWS\system32\spoolsv.exe[1992] @ C:\WINDOWS\system32\kernel32.dll [ntdll.dll!LdrGetProcedureAddress] 00404888
IAT C:\WINDOWS\system32\spoolsv.exe[1992] @ C:\WINDOWS\system32\kernel32.dll [ntdll.dll!NtCreateThread] 00404855
IAT C:\WINDOWS\system32\spoolsv.exe[1992] @ C:\WINDOWS\system32\ole32.dll [USER32.dll!GetClipboardData] 0040386F
IAT C:\WINDOWS\system32\spoolsv.exe[1992] @ C:\WINDOWS\system32\ole32.dll [USER32.dll!TranslateMessage] 00403B4E
IAT C:\WINDOWS\system32\spoolsv.exe[1992] @ C:\WINDOWS\system32\SHELL32.dll [USER32.dll!TranslateMessage] 00403B4E
IAT C:\WINDOWS\system32\spoolsv.exe[1992] @ C:\WINDOWS\system32\SHELL32.dll [USER32.dll!GetClipboardData] 0040386F
IAT C:\WINDOWS\system32\spoolsv.exe[1992] @ C:\WINDOWS\system32\SHLWAPI.dll [USER32.dll!TranslateMessage] 00403B4E
IAT C:\WINDOWS\system32\spoolsv.exe[1992] @ C:\WINDOWS\system32\WS2HELP.dll [ntdll.dll!NtQueryDirectoryFile] 00404934
IAT C:\WINDOWS\System32\alg.exe[2232] @ C:\WINDOWS\system32\kernel32.dll [ntdll.dll!NtQueryDirectoryFile] 00404934
IAT C:\WINDOWS\System32\alg.exe[2232] @ C:\WINDOWS\system32\kernel32.dll [ntdll.dll!LdrLoadDll] 004048C6
IAT C:\WINDOWS\System32\alg.exe[2232] @ C:\WINDOWS\system32\kernel32.dll [ntdll.dll!LdrGetProcedureAddress] 00404888
IAT C:\WINDOWS\System32\alg.exe[2232] @ C:\WINDOWS\system32\kernel32.dll [ntdll.dll!NtCreateThread] 00404855
IAT C:\WINDOWS\System32\alg.exe[2232] @ C:\WINDOWS\system32\ole32.dll [USER32.dll!GetClipboardData] 0040386F
IAT C:\WINDOWS\System32\alg.exe[2232] @ C:\WINDOWS\system32\ole32.dll [USER32.dll!TranslateMessage] 00403B4E
IAT C:\WINDOWS\System32\alg.exe[2232] @ C:\WINDOWS\System32\WS2HELP.dll [ntdll.dll!NtQueryDirectoryFile] 00404934
IAT C:\WINDOWS\System32\alg.exe[2232] @ C:\WINDOWS\system32\SHELL32.dll [USER32.dll!TranslateMessage] 00403B4E
IAT C:\WINDOWS\System32\alg.exe[2232] @ C:\WINDOWS\system32\SHELL32.dll [USER32.dll!GetClipboardData] 0040386F
IAT C:\WINDOWS\System32\alg.exe[2232] @ C:\WINDOWS\system32\SHLWAPI.dll [USER32.dll!TranslateMessage] 00403B4E
IAT C:\WINDOWS\System32\svchost.exe[2892] @ C:\WINDOWS\system32\kernel32.dll [ntdll.dll!NtQueryDirectoryFile] 00404934
IAT C:\WINDOWS\System32\svchost.exe[2892] @ C:\WINDOWS\system32\kernel32.dll [ntdll.dll!LdrLoadDll] 004048C6
IAT C:\WINDOWS\System32\svchost.exe[2892] @ C:\WINDOWS\system32\kernel32.dll [ntdll.dll!LdrGetProcedureAddress] 00404888
IAT C:\WINDOWS\System32\svchost.exe[2892] @ C:\WINDOWS\system32\kernel32.dll [ntdll.dll!NtCreateThread] 00404855
IAT C:\WINDOWS\System32\svchost.exe[2892] @ C:\WINDOWS\system32\ole32.dll [USER32.dll!GetClipboardData] 0040386F
IAT C:\WINDOWS\System32\svchost.exe[2892] @ C:\WINDOWS\system32\ole32.dll [USER32.dll!TranslateMessage] 00403B4E
IAT C:\WINDOWS\System32\svchost.exe[2892] @ C:\WINDOWS\system32\SHELL32.dll [USER32.dll!TranslateMessage] 00403B4E
IAT C:\WINDOWS\System32\svchost.exe[2892] @ C:\WINDOWS\system32\SHELL32.dll [USER32.dll!GetClipboardData] 0040386F
IAT C:\WINDOWS\System32\svchost.exe[2892] @ C:\WINDOWS\system32\SHLWAPI.dll [USER32.dll!TranslateMessage] 00403B4E
IAT C:\WINDOWS\System32\svchost.exe[2892] @ C:\WINDOWS\System32\WS2HELP.dll [ntdll.dll!NtQueryDirectoryFile] 00404934

---- Devices - GMER 1.0.14 ----

AttachedDevice \FileSystem\Ntfs \Ntfs SYMEVENT.SYS (Symantec Event Library/Symantec Corporation)
AttachedDevice \Driver\Tcpip \Device\Ip SYMTDI.SYS (Network Dispatch Driver/Symantec Corporation)
AttachedDevice \Driver\Tcpip \Device\Tcp SYMTDI.SYS (Network Dispatch Driver/Symantec Corporation)
AttachedDevice \Driver\Tcpip \Device\Udp SYMTDI.SYS (Network Dispatch Driver/Symantec Corporation)
AttachedDevice \Driver\Tcpip \Device\RawIp SYMTDI.SYS (Network Dispatch Driver/Symantec Corporation)

---- Modules - GMER 1.0.14 ----

Module \systemroot\system32\drivers\TDSSserv.sys (*** hidden *** ) F85B1000-F85BC000 (45056 bytes)

---- Services - GMER 1.0.14 ----

Service C:\WINDOWS\system32\drivers\TDSSserv.sys (*** hidden *** ) [SYSTEM] tdssserv <-- ROOTKIT !!!

---- Registry - GMER 1.0.14 ----

Reg HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\tdssserv.sys
Reg HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\tdssserv.sys@ driver
Reg HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot\Network\tdssserv.sys
Reg HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot\Network\tdssserv.sys@ driver
Reg HKLM\SYSTEM\CurrentControlSet\Services\tdssserv
Reg HKLM\SYSTEM\CurrentControlSet\Services\tdssserv@start 1
Reg HKLM\SYSTEM\CurrentControlSet\Services\tdssserv@type 1
Reg HKLM\SYSTEM\CurrentControlSet\Services\tdssserv@imagepath \systemroot\system32\drivers\TDSSserv.sys
Reg HKLM\SYSTEM\ControlSet002\Control\SafeBoot\Minimal\tdssserv.sys
Reg HKLM\SYSTEM\ControlSet002\Control\SafeBoot\Minimal\tdssserv.sys@ driver
Reg HKLM\SYSTEM\ControlSet002\Control\SafeBoot\Network\tdssserv.sys
Reg HKLM\SYSTEM\ControlSet002\Control\SafeBoot\Network\tdssserv.sys@ driver
Reg HKLM\SYSTEM\ControlSet002\Services\tdssserv
Reg HKLM\SYSTEM\ControlSet002\Services\tdssserv@start 1
Reg HKLM\SYSTEM\ControlSet002\Services\tdssserv@type 1
Reg HKLM\SYSTEM\ControlSet002\Services\tdssserv@imagepath \systemroot\system32\drivers\TDSSserv.sys
Reg HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\tdssdata
Reg HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\tdssdata@affid 61
Reg HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\tdssdata@subid v2test6
Reg HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\tdssdata@control 0x1A 0x00 0x15 0x13 ...
Reg HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\tdssdata@prov 10010
Reg HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\tdssdata@googleadserver pagead2.googlesyndication.com
Reg HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\tdssdata@flagged 1
Reg HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows@AppInit_DLLs
Reg HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows@DeviceNotSelectedTimeout 15
Reg HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows@GDIProcessHandleQuota 10000
Reg HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows@Spooler yes
Reg HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows@swapdisk
Reg HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows@TransmissionRetryTimeout 90
Reg HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows@USERProcessHandleQuota 10000

---- EOF - GMER 1.0.14 ----

#7 PropagandaPanda

PropagandaPanda


  • Malware Response Team
  • 10,433 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:03:29 AM

Posted 29 August 2008 - 10:58 AM

Hello Dmohr.

Were you able to find the ComboFix log here?:
C:\ComboFix.txt?

Also look for a log here:
C:\qoobox\combofix********.txt

If any of those exist, post back with it.

Posted ImageBackdoor Threat
I'm sorry to say that your computer is infected with one or more backdoor trojans.

This means that sensitive information could have been stolen. I would advise to change any passwords for any accounts that you have accessed with the infected computer using a clean computer ASAP. If you have used this computer for banking, I would strongly suggest that you report the possible stolen information. Please do not use the computer for any further transactions, or to enter any other information, if at all possible, until it is declared clean.

You may want to read this article on how to handle identity theft.
You may also want to read this article regarding preventing of identity theft.

This computer can still be cleaned, however, I cannot guarantee that it will be 100% safe even after disinfection.

Please read When Should I Format, How Should I Reinstall.

I will proceed assuming you wish to disinfect. If you want to do a reinstall, reply back saying so.

Download and Run SDFix
You can find complete instructions on running SDFix in the link below:
http://www.bleepingcomputer.com/forums/t/131299/how-to-use-sdfix/

SDfix is for Windows 2000 and Windows XP only,
  • Download SDfix setup onto your desktop.
  • Run the installer. Leave the install location at your system root.
  • After the install, boot into Safe Mode.
  • Click your Start Menu. Click Run. Type in c:\sdfix\runthis.bat. Hit OK.
  • The prompt window will open. Type Y and hit Enter.
  • Wait for the scan to finish.
  • You will be prompted to restart. Press anykey to do so. Allow Sdfix to boot the computer into normal boot.
  • At reboot, the prompt window will pop-up, along with a log (\rapport.txt) shortly after. Copy the contents of the log back in your next reply.
Please try to run ComboFix again after SDFix has finished. If you are able to, post back with the new log along with the old one.

Run GMER again with the same instructions.

Follow my instructions at the bottom of this post to rename HijackThis and take a new log.
--------------
Post back with:
-the SDFix log
-the ComboFix log(s) (old one, if there, and new one, if you can run it now).
-a new GMER log
-a new HijackThis log after renaming it.

Is you computer running better?

With Regards,
The Panda

#8 dmohr

dmohr
  • Topic Starter

  • Members
  • 5 posts
  • OFFLINE
  •  
  • Local time:03:29 AM

Posted 30 August 2008 - 07:49 AM

Panda-san

Fixes seemed to work. After SDFix, ComboFix would run, followed by Gmer and Hijack this. Attaching latest logs.

Thanks for your help!

Attached Files



#9 PropagandaPanda

PropagandaPanda


  • Malware Response Team
  • 10,433 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:03:29 AM

Posted 30 August 2008 - 10:44 AM

Hello Dmohr.

Looks much better :thumbsup: .

Install Recovery Console with ComboFix
Go to Microsoft's website => http://support.microsoft.com/kb/310994

Select the download that's appropriate for your Operating System

Posted Image

Download the file & save it as it's originally named, next to ComboFix.exe.
Posted Image
Now close all open windows and programs, including all anti virus and anti malware programs so they do not interfere with the running of ComboFix.
  • Drag the setup package onto ComboFix.exe and drop it.
  • Follow the prompts to start ComboFix and when prompted, agree to the End-User License Agreement to install the Microsoft Recovery Console.
  • At the next prompt, click No.
Posted Image

Run ComboFix with CFScript
We will run ComboFix again. This time, the instructions are slightly different.
  • Close any open browsers.
  • Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix. Refer to this page if you are unsure how.
  • Open notepad (Start>Run>"notepad") and copy/paste the text in the quotebox below into it:


    File::
    C:\WINDOWS\system32\drivers\plc13qfa3uh.sys
    C:\WINDOWS\system32\tdssserf.dll

    Folder::
    C:\WINDOWS\system32\sysproc64
    C:\Documents and Settings\LocalService\Application Data\sysproc64

    Save this as CFScript.txt, in the same location as ComboFix.exe. (This should be your desktop.)
    Posted Image
    Refering to the picture above, drag CFScript into ComboFix.exe.
When finished, it shall produce a log for you at "C:\ComboFix.txt". Post back with that log.

Do not mouseclick ComboFix's window while it's running. That may cause it to stall

Update Java to Version 6 Update 7
Your current version of Java is outdated. Malware creators can exploit the lesser security of older versions. Please uninstall your current version through Add/Remove Programs. Remove all instances of Java, J2SE Runtime, Java Runtime, and Java Runtime Environment. Restart your computer after uninstalling.

Please then install the latest Java from this page. Follow the prompts and select the appropriate settings for your machine. Click on the "Required File" jdk-6u7-windows-i586-p.exe to download the installer. Double click the installer to run. Delete the installer after use.

Run Scan with Kaspersky
Please do a scan with Kaspersky Online Scanner.

This scan is for Internet Explorer Only.

If you are using Windows Vista, open your browser by right-clicking on its icon and select 'Run as administrator' to perform this scan.
  • Please disable your realtime protection software before proceeding. Refer to this page if you are unsure how.
  • Open the Kaspersky Scanner page.
  • Click on Accept and install any components it needs.
  • The program will install and then begin downloading the latest definition files.
  • After the files have been downloaded on the left side of the page in the Scan section select My Computer
  • This will start the program and scan your system.
  • The scan will take a while, so be patient and let it run.
  • Once the scan is complete, click on View scan report
  • Now, click on the Save Report as button.
  • Save the file to your desktop.
  • Copy and paste that information in your next post.
You can refer to this animation by sundavis.

This scanner will only scan. It does not remove any malware it finds.

-------------
Post back with:
-the new ComboFix log
-the Kaspersky log
-a new HijackThis log

Also, is your computer running better now? Still have any problems?

With Regards,
The Panda

#10 Shaba

Shaba

    Koutsi


  • Members
  • 7,872 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Finland
  • Local time:09:29 AM

Posted 04 September 2008 - 11:01 AM

Due to the lack of feedback this Topic is closed.

If you need this topic reopened, please request this by sending the moderating team
a PM with the address of the thread. This applies only to the original topic starter.

Everyone else please begin a New Topic.
Microsoft MVP Consumer Security
Posted Image

Posted Image




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users