Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Infected-hacktool.rootkit


  • This topic is locked This topic is locked
22 replies to this topic

#1 gainesdell

gainesdell

  • Members
  • 11 posts
  • OFFLINE
  •  
  • Local time:09:41 PM

Posted 02 May 2009 - 08:59 AM

About a month ago, Symantec detected a hacktool.rootkit in system32 and in my system restore. I cleaned out my system restore (supposedly) but can't get rid of the virus completely...I can really only find one file that isn't supposed to be in my computer-catsrvp.dll-and I assume that just getting rid of this won't solve my problem. Symantec always just says it could only partially take action against the risk and that quarantine failed, clean failed, and delete failed. I wish I had more information for you, but I think thats it...here is the DDS.txt:


DDS (Ver_09-03-16.01) - NTFSx86
Run by Phil at 9:40:02.21 on Sat 05/02/2009
Internet Explorer: 7.0.5730.11
Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.1022.533 [GMT -4:00]

AV: Symantec AntiVirus Corporate Edition *On-access scanning disabled* (Updated)

============== Running Processes ===============

E:\WINDOWS\system32\Ati2evxx.exe
E:\WINDOWS\system32\svchost -k DcomLaunch
svchost.exe
E:\WINDOWS\System32\svchost.exe -k netsvcs
svchost.exe
svchost.exe
E:\Program Files\Common Files\Symantec Shared\ccSetMgr.exe
E:\Program Files\Common Files\Symantec Shared\ccEvtMgr.exe
E:\Program Files\Common Files\Symantec Shared\SPBBC\SPBBCSvc.exe
E:\WINDOWS\system32\spoolsv.exe
svchost.exe
E:\Program Files\Symantec AntiVirus\DefWatch.exe
E:\WINDOWS\system32\lkcitdl.exe
E:\WINDOWS\system32\lkads.exe
E:\WINDOWS\system32\lktsrv.exe
C:\Programs\bleep\MAX\nimxs.exe
C:\Programs\bleep\Shared\Security\nidmsrv.exe
E:\WINDOWS\system32\nisvcloc.exe
C:\Programs\bleep\Shared\Tagger\tagsrv.exe
E:\WINDOWS\System32\svchost.exe -k imgsvc
E:\Program Files\Symantec AntiVirus\Rtvscan.exe
E:\WINDOWS\stsystra.exe
E:\Program Files\Common Files\Symantec Shared\ccApp.exe
E:\PROGRA~1\SYMANT~1\VPTray.exe
E:\WINDOWS\system32\ctfmon.exe
E:\Program Files\Wireless PCI_CardBus utility V1.01\Wireless PCI_CardBus utility V1.01.exe
E:\WINDOWS\explorer.exe
E:\WINDOWS\system32\notepad.exe
E:\Program Files\Internet Explorer\IEXPLORE.EXE
E:\WINDOWS\system32\wscntfy.exe
E:\Documents and Settings\Phil\Desktop\dds.scr

============== Pseudo HJT Report ===============

uStart Page = hxxp://att.yahoo.com/
mStart Page = hxxp://www.calvin.edu
BHO: SnagIt Toolbar Loader: {00c6482d-c502-44c8-8409-fce54ad9c208} - c:\programs\snagit printscreen\SnagItBHO.dll
BHO: Yahoo! Toolbar Helper: {02478d38-c3f9-4efb-9b51-7695eca05670} - e:\program files\yahoo!\companion\installs\cpn\yt.dll
BHO: Adobe PDF Reader Link Helper: {06849e9f-c8d7-4d59-b87d-784b7d6be0b3} - e:\program files\common files\adobe\acrobat\activex\AcroIEHelper.dll
BHO: {2a2a3591-d770-4c04-a2a2-94fad1991bcf} - e:\windows\system32\catsrvp.dll
BHO: Groove GFS Browser Helper: {72853161-30c5-4d22-b7f9-0bbc1d38a37e} - e:\progra~1\micros~2\office12\GRA8E1~1.DLL
BHO: SSVHelper Class: {761497bb-d6f0-462c-b6eb-d4daf1d92d43} - e:\program files\java\jre1.5.0_09\bin\ssv.dll
TB: Yahoo! Toolbar: {ef99bd32-c1fb-11d2-892f-0090271d4f88} - e:\program files\yahoo!\companion\installs\cpn\yt.dll
TB: SnagIt: {8ff5e183-abde-46eb-b09e-d2aab95cabe3} - c:\programs\snagit printscreen\SnagItIEAddin.dll
EB: {32683183-48a0-441b-a342-7c2a440a9478} - No File
uRun: [ctfmon.exe] e:\windows\system32\ctfmon.exe
uRun: [OM2_Monitor] "e:\program files\olympus\olympus master 2\MMonitor.exe" -NoStart
mRun: [ATIPTA] "e:\program files\ati technologies\ati control panel\atiptaxx.exe"
mRun: [QuickTime Task] "e:\program files\quicktime\qttask.exe" -atboottime
mRun: [HP Component Manager] "e:\program files\hp\hpcoretech\hpcmpmgr.exe"
mRun: [SigmatelSysTrayApp] stsystra.exe
mRun: [ccApp] "e:\program files\common files\symantec shared\ccApp.exe"
mRun: [vptray] e:\progra~1\symant~1\VPTray.exe
mRun: [Adobe Reader Speed Launcher] "c:\programs\adobe\reader\Reader_sl.exe"
mRun: [Adobe Photo Downloader] "c:\programs\adobe photoshop elements 5.0\apdproxy.exe"
mRun: [OM2_Monitor] "e:\program files\olympus\olympus master 2\FirstStart.exe" /OM
StartupFolder: e:\docume~1\phil\startm~1\programs\startup\onenot~1.lnk - e:\program files\microsoft office\office12\ONENOTEM.EXE
StartupFolder: e:\docume~1\alluse~1\startm~1\programs\startup\wirele~1.lnk - e:\program files\wireless pci_cardbus utility v1.01\Wireless PCI_CardBus utility V1.01.exe
IE: E&xport to Microsoft Excel - e:\progra~1\micros~2\office12\EXCEL.EXE/3000
IE: {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe
IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - e:\program files\messenger\msmsgs.exe
IE: {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - {CAFEEFAC-0015-0000-0009-ABCDEFFEDCBC} - e:\program files\java\jre1.5.0_09\bin\ssv.dll
IE: {2670000A-7350-4f3c-8081-5663EE0C6C49} - {48E73304-E1D6-4330-914C-F5F514E3486C} - e:\progra~1\micros~2\office12\ONBttnIE.dll
IE: {92780B25-18CC-41C8-B9BE-3C9C571A8263} - {FF059E31-CC5A-4E2E-BF3B-96E929D65503} - e:\progra~1\micros~2\office12\REFIEBAR.DLL
DPF: {02BF25D5-8C17-4B23-BC80-D3488ABDDC6B} - hxxp://www.apple.com/qtactivex/qtplugin.cab
DPF: {0CCA191D-13A6-4E29-B746-314DEE697D83} - hxxp://upload.facebook.com/controls/2008.10.10_v5.5.8/FacebookPhotoUploader5.cab
DPF: {17492023-C23A-453E-A040-C7C580BBF700} - hxxp://download.microsoft.com/download/3/9/8/398422c0-8d3e-40e1-a617-af65a72a0465/LegitCheckControl.cab
DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://java.sun.com/update/1.5.0/jinstall-1_5_0_09-windows-i586-jc.cab
DPF: {CAFEEFAC-0015-0000-0009-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.5.0/jinstall-1_5_0_09-windows-i586.cab
DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.5.0/jinstall-1_5_0_09-windows-i586.cab
DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} - hxxp://fpdownload.macromedia.com/get/flashplayer/current/swflash.cab
DPF: {EDFCB7CB-942C-4822-AF14-F0B687409848} - hxxp://www.prolabexpress.com/ImageUploader4.cab
Handler: cetihpz - {CF184AD3-CDCB-4168-A3F7-8E447D129300} - e:\program files\hp\hpcoretech\comp\hpuiprot.dll
Handler: grooveLocalGWS - {88FED34C-F0CA-4636-A375-3CB6248B04CD} - e:\progra~1\micros~2\office12\GR99D3~1.DLL
Notify: NavLogon - e:\windows\system32\NavLogon.dll
SSODL: WPDShServiceObj - {AAA288BA-9A4C-45B0-95D7-94D524869DB5} - e:\windows\system32\WPDShServiceObj.dll
SEH: Groove GFS Stub Execution Hook: {b5a7f190-dda6-4420-b3ba-52453494e6cd} - e:\progra~1\micros~2\office12\GRA8E1~1.DLL

============= SERVICES / DRIVERS ===============

R0 chioevzo;chioevzo;e:\windows\system32\drivers\chioevzo.sys [2001-8-23 23424]
R0 d346bus;d346bus;e:\windows\system32\drivers\d346bus.sys [2007-8-15 156800]
R0 d346prt;d346prt;e:\windows\system32\drivers\d346prt.sys [2007-8-15 5248]
R1 SAVRT;SAVRT;e:\program files\symantec antivirus\savrt.sys [2005-12-19 337592]
R1 SAVRTPEL;SAVRTPEL;e:\program files\symantec antivirus\Savrtpel.sys [2005-12-19 54968]
R2 ccEvtMgr;Symantec Event Manager;e:\program files\common files\symantec shared\ccEvtMgr.exe [2006-7-19 192160]
R2 ccSetMgr;Symantec Settings Manager;e:\program files\common files\symantec shared\ccSetMgr.exe [2006-7-19 169632]
R2 Symantec AntiVirus;Symantec AntiVirus;e:\program files\symantec antivirus\Rtvscan.exe [2006-8-3 1807600]
R3 EraserUtilRebootDrv;EraserUtilRebootDrv;e:\program files\common files\symantec shared\eengine\EraserUtilRebootDrv.sys [2009-4-10 101936]
R3 NAVENG;NAVENG;e:\progra~1\common~1\symant~1\virusd~1\20090501.017\naveng.sys [2009-5-2 89104]
R3 NAVEX15;NAVEX15;e:\progra~1\common~1\symant~1\virusd~1\20090501.017\navex15.sys [2009-5-2 876144]
S0 d344prt;d344prt;e:\windows\system32\drivers\d344prt.sys --> e:\windows\system32\drivers\d344prt.sys [?]
S3 EraserUtilDrvI3;EraserUtilDrvI3;\??\e:\program files\common files\symantec shared\eengine\eraserutildrvi3.sys --> e:\program files\common files\symantec shared\eengine\EraserUtilDrvI3.sys [?]
S3 SavRoam;SAVRoam;e:\program files\symantec antivirus\SavRoam.exe [2006-8-3 115952]

=============== Created Last 30 ================

2009-04-30 19:26 <DIR> --d----- e:\program files\GMATPrep
2009-04-28 18:26 161,792 a------- e:\windows\SWREG.exe
2009-04-28 18:26 98,816 a------- e:\windows\sed.exe
2009-04-15 07:58 2,560 -------- e:\windows\system32\xpsp4res.dll
2009-04-15 07:58 1,203,922 -c------ e:\windows\system32\dllcache\sysmain.sdb
2009-04-15 07:58 215,552 -c------ e:\windows\system32\dllcache\wordpad.exe
2009-04-15 07:56 473,600 -c------ e:\windows\system32\dllcache\fastprox.dll
2009-04-15 07:56 453,120 -c------ e:\windows\system32\dllcache\wmiprvsd.dll
2009-04-15 07:56 401,408 -c------ e:\windows\system32\dllcache\rpcss.dll
2009-04-15 07:56 284,160 -c------ e:\windows\system32\dllcache\pdh.dll
2009-04-15 07:56 227,840 -c------ e:\windows\system32\dllcache\wmiprvse.exe
2009-04-15 07:56 110,592 -c------ e:\windows\system32\dllcache\services.exe
2009-04-15 07:56 729,088 -c------ e:\windows\system32\dllcache\lsasrv.dll
2009-04-15 07:56 714,752 -c------ e:\windows\system32\dllcache\ntdll.dll
2009-04-15 07:56 617,472 -c------ e:\windows\system32\dllcache\advapi32.dll
2009-04-10 11:40 <DIR> --d----- e:\program files\common files\Real
2009-04-10 11:40 <DIR> --d----- e:\program files\common files\ODBC
2009-04-10 11:39 <DIR> --d----- e:\program files\common files\Merge Modules
2009-04-10 11:33 <DIR> --d----- e:\program files\OLYMPUS
2009-04-10 11:31 <DIR> --d----- e:\program files\common files\xing shared
2009-04-10 11:31 <DIR> --d----- e:\program files\common files\Wise Installation Wizard
2009-04-10 11:31 <DIR> --d----- e:\program files\D-Tools
2009-04-10 11:30 <DIR> --d----- e:\docume~1\phil\applic~1\Azureus
2009-04-10 11:30 <DIR> --d----- e:\docume~1\phil\applic~1\LimeWire
2009-04-10 11:29 <DIR> --d----- e:\docume~1\phil\applic~1\ParetoLogic
2009-04-10 11:25 <DIR> --d----- e:\documents and settings\phil\Adobe
2009-04-10 11:24 <DIR> --d----- e:\documents and settings\all users\Adobe
2009-04-09 19:48 97,792 a------- e:\windows\system32\catsrvp.dll
2009-04-07 22:03 <DIR> --d----- e:\windows\system32\scripting
2009-04-07 22:03 <DIR> --d----- e:\windows\l2schemas
2009-04-07 22:03 <DIR> --d----- e:\windows\system32\en

==================== Find3M ====================

2009-04-07 22:07 86,327 a------- e:\windows\pchealth\helpctr\offlinecache\index.dat
2009-03-06 10:22 284,160 a------- e:\windows\system32\pdh.dll
2009-03-02 20:18 826,368 a------- e:\windows\system32\wininet.dll
2009-02-20 14:09 78,336 a------- e:\windows\system32\ieencode.dll
2009-02-09 08:10 729,088 a------- e:\windows\system32\lsasrv.dll
2009-02-09 08:10 714,752 a------- e:\windows\system32\ntdll.dll
2009-02-09 08:10 617,472 a------- e:\windows\system32\advapi32.dll
2009-02-09 08:10 401,408 a------- e:\windows\system32\rpcss.dll
2009-02-09 07:13 1,846,784 a------- e:\windows\system32\win32k.sys
2009-02-06 07:11 110,592 a------- e:\windows\system32\services.exe
2009-02-06 07:06 2,145,280 a------- e:\windows\system32\ntoskrnl.exe
2009-02-06 06:39 35,328 a------- e:\windows\system32\sc.exe
2009-02-06 06:32 2,023,936 a------- e:\windows\system32\ntkrnlpa.exe
2009-02-03 15:59 56,832 a------- e:\windows\system32\secur32.dll

============= FINISH: 9:40:20.15 ===============




Thank You!!!!!!!!!!!!!!!!!!!!!!!!!

Attached Files



BC AdBot (Login to Remove)

 


#2 KoanYorel

KoanYorel

    Bleepin' Conundrum


  • Members
  • 19,461 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:65 miles due East of the &quot;Logic Free Zone&quot;, in Md, USA
  • Local time:09:41 PM

Posted 16 May 2009 - 05:28 PM

Hello and welcome to Bleeping Computer

We apologize for the delay in responding to your request for help. Here at Bleeping Computer we get overwhelmed at times, and we are trying our best to keep up. Please note that your topic was not intentionally overlooked. Our mission is to help everyone in need, but sometimes it takes just a little longer to get to every request for help. No one is ignored here.

If you have since resolved the original problem you were having, we would appreciate you letting us know. If not please perform the following steps below so we can have a look at the current condition of your machine.

If you have not done so, include a clear description of the problems you're having, along with any steps you may have performed so far.

Upon completing the steps below another staff member will review and take the steps necessary with you to get your machine back in working order clean and free of malware.

If you have already posted a DDS log, please do so again, as your situation may have changed.
Use the 'Add Reply' and add the new log to this thread.


Thanks and again sorry for the delay.

We need to see some information about what is happening in your machine. Please perform the following scan:
  • Download DDS by sUBs from one of the following links. Save it to your desktop.
  • Double click on the DDS icon, allow it to run.
  • A small box will open, with an explaination about the tool. No input is needed, the scan is running.
  • Notepad will open with the results.
  • Follow the instructions that pop up for posting the results.
  • Close the program window, and delete the program from your desktop.
Please note: You may have to disable any script protection running if the scan fails to run. After downloading the tool, disconnect from the internet and disable all antivirus protection. Run the scan, enable your A/V and reconnect to the internet.

Information on A/V control HERE

R,
K
The only easy day was yesterday.

...some do, some don't; some will, some won't (WR)

#3 gainesdell

gainesdell
  • Topic Starter

  • Members
  • 11 posts
  • OFFLINE
  •  
  • Local time:09:41 PM

Posted 17 May 2009 - 11:29 AM

Thank You so much for your response. I havn't tried anything new since the first post, but here is an updated DDS log and attach.txt...


DDS (Ver_09-03-16.01) - NTFSx86
Run by Phil at 12:24:06.93 on Sun 05/17/2009
Internet Explorer: 7.0.5730.11
Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.1022.473 [GMT -4:00]

AV: Symantec AntiVirus Corporate Edition *On-access scanning enabled* (Updated)

============== Running Processes ===============

E:\WINDOWS\system32\Ati2evxx.exe
E:\WINDOWS\system32\svchost -k DcomLaunch
svchost.exe
E:\WINDOWS\System32\svchost.exe -k netsvcs
svchost.exe
svchost.exe
E:\Program Files\Common Files\Symantec Shared\ccSetMgr.exe
E:\Program Files\Common Files\Symantec Shared\ccEvtMgr.exe
E:\Program Files\Common Files\Symantec Shared\SPBBC\SPBBCSvc.exe
E:\WINDOWS\system32\spoolsv.exe
svchost.exe
C:\Programs\Adobe Photoshop Elements 5.0\PhotoshopElementsFileAgent.exe
E:\WINDOWS\Explorer.EXE
E:\Program Files\Symantec AntiVirus\DefWatch.exe
E:\WINDOWS\system32\lkcitdl.exe
E:\WINDOWS\system32\lkads.exe
E:\WINDOWS\system32\lktsrv.exe
C:\Programs\bleep\MAX\nimxs.exe
C:\Programs\bleep\Shared\Security\nidmsrv.exe
E:\WINDOWS\system32\nisvcloc.exe
C:\Programs\bleep\Shared\Tagger\tagsrv.exe
E:\WINDOWS\System32\svchost.exe -k imgsvc
E:\Program Files\Symantec AntiVirus\Rtvscan.exe
E:\Program Files\HP\hpcoretech\hpcmpmgr.exe
E:\WINDOWS\stsystra.exe
E:\Program Files\Common Files\Symantec Shared\ccApp.exe
E:\PROGRA~1\SYMANT~1\VPTray.exe
C:\Programs\Adobe Photoshop Elements 5.0\apdproxy.exe
E:\WINDOWS\system32\ctfmon.exe
E:\Program Files\Wireless PCI_CardBus utility V1.01\Wireless PCI_CardBus utility V1.01.exe
E:\Program Files\Internet Explorer\IEXPLORE.EXE
E:\Documents and Settings\Phil\Desktop\dds.scr

============== Pseudo HJT Report ===============

uStart Page = hxxp://att.yahoo.com/
mStart Page = hxxp://www.calvin.edu
BHO: SnagIt Toolbar Loader: {00c6482d-c502-44c8-8409-fce54ad9c208} - c:\programs\snagit printscreen\SnagItBHO.dll
BHO: Yahoo! Toolbar Helper: {02478d38-c3f9-4efb-9b51-7695eca05670} - e:\program files\yahoo!\companion\installs\cpn\yt.dll
BHO: Adobe PDF Reader Link Helper: {06849e9f-c8d7-4d59-b87d-784b7d6be0b3} - e:\program files\common files\adobe\acrobat\activex\AcroIEHelper.dll
BHO: {2a2a3591-d770-4c04-a2a2-94fad1991bcf} - e:\windows\system32\catsrvp.dll
BHO: Groove GFS Browser Helper: {72853161-30c5-4d22-b7f9-0bbc1d38a37e} - e:\progra~1\micros~2\office12\GRA8E1~1.DLL
BHO: SSVHelper Class: {761497bb-d6f0-462c-b6eb-d4daf1d92d43} - e:\program files\java\jre1.5.0_09\bin\ssv.dll
TB: Yahoo! Toolbar: {ef99bd32-c1fb-11d2-892f-0090271d4f88} - e:\program files\yahoo!\companion\installs\cpn\yt.dll
TB: SnagIt: {8ff5e183-abde-46eb-b09e-d2aab95cabe3} - c:\programs\snagit printscreen\SnagItIEAddin.dll
EB: {32683183-48a0-441b-a342-7c2a440a9478} - No File
uRun: [ctfmon.exe] e:\windows\system32\ctfmon.exe
uRun: [OM2_Monitor] "e:\program files\olympus\olympus master 2\MMonitor.exe" -NoStart
mRun: [ATIPTA] "e:\program files\ati technologies\ati control panel\atiptaxx.exe"
mRun: [QuickTime Task] "e:\program files\quicktime\qttask.exe" -atboottime
mRun: [HP Component Manager] "e:\program files\hp\hpcoretech\hpcmpmgr.exe"
mRun: [SigmatelSysTrayApp] stsystra.exe
mRun: [ccApp] "e:\program files\common files\symantec shared\ccApp.exe"
mRun: [vptray] e:\progra~1\symant~1\VPTray.exe
mRun: [Adobe Reader Speed Launcher] "c:\programs\adobe\reader\Reader_sl.exe"
mRun: [Adobe Photo Downloader] "c:\programs\adobe photoshop elements 5.0\apdproxy.exe"
mRun: [OM2_Monitor] "e:\program files\olympus\olympus master 2\FirstStart.exe" /OM
StartupFolder: e:\docume~1\phil\startm~1\programs\startup\onenot~1.lnk - e:\program files\microsoft office\office12\ONENOTEM.EXE
StartupFolder: e:\docume~1\alluse~1\startm~1\programs\startup\wirele~1.lnk - e:\program files\wireless pci_cardbus utility v1.01\Wireless PCI_CardBus utility V1.01.exe
IE: E&xport to Microsoft Excel - e:\progra~1\micros~2\office12\EXCEL.EXE/3000
IE: {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe
IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - e:\program files\messenger\msmsgs.exe
IE: {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - {CAFEEFAC-0015-0000-0009-ABCDEFFEDCBC} - e:\program files\java\jre1.5.0_09\bin\ssv.dll
IE: {2670000A-7350-4f3c-8081-5663EE0C6C49} - {48E73304-E1D6-4330-914C-F5F514E3486C} - e:\progra~1\micros~2\office12\ONBttnIE.dll
IE: {92780B25-18CC-41C8-B9BE-3C9C571A8263} - {FF059E31-CC5A-4E2E-BF3B-96E929D65503} - e:\progra~1\micros~2\office12\REFIEBAR.DLL
DPF: {02BF25D5-8C17-4B23-BC80-D3488ABDDC6B} - hxxp://www.apple.com/qtactivex/qtplugin.cab
DPF: {0CCA191D-13A6-4E29-B746-314DEE697D83} - hxxp://upload.facebook.com/controls/2008.10.10_v5.5.8/FacebookPhotoUploader5.cab
DPF: {17492023-C23A-453E-A040-C7C580BBF700} - hxxp://download.microsoft.com/download/3/9/8/398422c0-8d3e-40e1-a617-af65a72a0465/LegitCheckControl.cab
DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://java.sun.com/update/1.5.0/jinstall-1_5_0_09-windows-i586-jc.cab
DPF: {CAFEEFAC-0015-0000-0009-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.5.0/jinstall-1_5_0_09-windows-i586.cab
DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.5.0/jinstall-1_5_0_09-windows-i586.cab
DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} - hxxp://fpdownload.macromedia.com/get/flashplayer/current/swflash.cab
DPF: {EDFCB7CB-942C-4822-AF14-F0B687409848} - hxxp://www.prolabexpress.com/ImageUploader4.cab
Handler: cetihpz - {CF184AD3-CDCB-4168-A3F7-8E447D129300} - e:\program files\hp\hpcoretech\comp\hpuiprot.dll
Handler: grooveLocalGWS - {88FED34C-F0CA-4636-A375-3CB6248B04CD} - e:\progra~1\micros~2\office12\GR99D3~1.DLL
Notify: NavLogon - e:\windows\system32\NavLogon.dll
SSODL: WPDShServiceObj - {AAA288BA-9A4C-45B0-95D7-94D524869DB5} - e:\windows\system32\WPDShServiceObj.dll
SEH: Groove GFS Stub Execution Hook: {b5a7f190-dda6-4420-b3ba-52453494e6cd} - e:\progra~1\micros~2\office12\GRA8E1~1.DLL

============= SERVICES / DRIVERS ===============

R0 chioevzo;chioevzo;e:\windows\system32\drivers\chioevzo.sys [2001-8-23 23424]
R0 d346bus;d346bus;e:\windows\system32\drivers\d346bus.sys [2007-8-15 156800]
R0 d346prt;d346prt;e:\windows\system32\drivers\d346prt.sys [2007-8-15 5248]
R1 SAVRT;SAVRT;e:\program files\symantec antivirus\savrt.sys [2005-12-19 337592]
R1 SAVRTPEL;SAVRTPEL;e:\program files\symantec antivirus\Savrtpel.sys [2005-12-19 54968]
R2 ccEvtMgr;Symantec Event Manager;e:\program files\common files\symantec shared\ccEvtMgr.exe [2006-7-19 192160]
R2 ccSetMgr;Symantec Settings Manager;e:\program files\common files\symantec shared\ccSetMgr.exe [2006-7-19 169632]
R2 Symantec AntiVirus;Symantec AntiVirus;e:\program files\symantec antivirus\Rtvscan.exe [2006-8-3 1807600]
R3 EraserUtilRebootDrv;EraserUtilRebootDrv;e:\program files\common files\symantec shared\eengine\EraserUtilRebootDrv.sys [2009-4-10 101936]
R3 NAVENG;NAVENG;e:\progra~1\common~1\symant~1\virusd~1\20090515.003\naveng.sys [2009-5-16 89104]
R3 NAVEX15;NAVEX15;e:\progra~1\common~1\symant~1\virusd~1\20090515.003\navex15.sys [2009-5-16 876144]
S0 d344prt;d344prt;e:\windows\system32\drivers\d344prt.sys --> e:\windows\system32\drivers\d344prt.sys [?]
S3 EraserUtilDrvI3;EraserUtilDrvI3;\??\e:\program files\common files\symantec shared\eengine\eraserutildrvi3.sys --> e:\program files\common files\symantec shared\eengine\EraserUtilDrvI3.sys [?]
S3 SavRoam;SAVRoam;e:\program files\symantec antivirus\SavRoam.exe [2006-8-3 115952]

=============== Created Last 30 ================

2009-04-30 19:26 <DIR> --d----- e:\program files\GMATPrep
2009-04-28 18:26 161,792 a------- e:\windows\SWREG.exe
2009-04-28 18:26 98,816 a------- e:\windows\sed.exe

==================== Find3M ====================

2009-04-07 22:07 86,327 a------- e:\windows\pchealth\helpctr\offlinecache\index.dat
2009-03-06 10:22 284,160 a------- e:\windows\system32\pdh.dll
2009-03-02 20:18 826,368 a------- e:\windows\system32\wininet.dll
2009-02-20 14:09 78,336 a------- e:\windows\system32\ieencode.dll

============= FINISH: 12:24:45.67 ===============

Attached Files



#4 extremeboy

extremeboy

  • Malware Response Team
  • 12,975 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:09:41 PM

Posted 18 May 2009 - 07:45 PM

Hello.

Can I see the Symantec log so I know what it is detecting please.

Then proceed with the following and once it's done post a new set of DDS logs.

Download and run MalwareBytes Anti-Malware

Please download Malwarebytes Anti-Malware and save it to your desktop.
alternate download link 1
  • Make sure you are connected to the Internet.
  • Double-click on Download_mbam-setup.exe to install the application.
  • When the installation begins, follow the prompts and do not make any changes to default settings.
  • When installation has finished, make sure you leave both of these checked:
    • Update Malwarebytes' Anti-Malware
    • Launch Malwarebytes' Anti-Malware
  • Then click Finish.
  • MBAM will automatically start and you will be asked to update the program before performing a scan. If an update is found, the program will automatically update itself. Press the OK button to close that box and continue. If you encounter any problems while downloading the updates, manually download them from here and just double-click on mbam-rules.exe to install.
  • On the Scanner tab:
    • Make sure the "Perform Quick Scan" option is selected.
    • Then click on the Scan button.
  • If asked to select the drives to scan, leave all the drives selected and click on the Start Scan button.
  • The scan will begin and "Scan in progress" will show at the top. It may take some time to complete so please be patient.
  • When the scan is finished, a message box will say "The scan completed successfully. Click 'Show Results' to display all objects found".
  • Click OK to close the message box and continue with the removal process.
  • Back at the main Scanner screen, click on the Show Results button to see a list of any malware that was found.
  • Make sure that everything is checked, and click Remove Selected.
  • When removal is completed, a log report will open in Notepad and you may be prompted to restart your computer. (see Note below)
  • The log is automatically saved and can be viewed by clicking the Logs tab in MBAM.
  • Copy and paste the contents of that report in your next reply and exit MBAM.
Note: If MBAM encounters a file that is difficult to remove, you will be presented with 1 of 2 prompts. Click OK to either and let MBAM proceed with the disinfection process. If asked to restart the computer, please do so immediately. Failure to reboot will prevent MBAM from removing all the malware.

For complete or visual instructions on installing and running Malwarebytes Anti-Malware please read this link

Download and run RootRepeal CR

Please download RootRepeal to your desktop
  • Physically disconnect your machine from the internet as your system will be unprotected.
  • Unzip it to it's own folder
  • Close/Disable all other programs especially your security programs (anti-spyware, anti-virus, and firewall) Refer to this page, if you are unsure how.
  • Double-click on RootRepeal.exe to run it. If you are using Vista, please right-click and run as Administrator...
  • Click the Report tab at the bottom.
  • Now click the Scan button in the Report Tab. Posted Image
  • A box will pop up, check the boxes beside ALL SIX
    Posted Image
  • Now click OK.
  • Another box will open, check the boxes beside all the drives, eg : C:\, then click OK.
  • The scan will take a little while to run, so let it go unhindered.
  • Once it is done, click the Save Report button. Posted Image
  • Save it as RepealScan and save it to your desktop
  • Reconnect to the internet.
  • Post the log here in your reply.
With Regards,
Extremeboy
Note: Please do not PM me asking for help, instead please post it in the correct forum requesting for help. Help requests via the PM system will be ignored.

If I'm helping you and I don't reply within 48 hours please feel free to send me a PM.

The help you receive here is always free but if you wish to show your appreciation, you may wish to Posted Image.

#5 gainesdell

gainesdell
  • Topic Starter

  • Members
  • 11 posts
  • OFFLINE
  •  
  • Local time:09:41 PM

Posted 19 May 2009 - 05:36 PM

I hope this is what you are requesting when you say log...doesn't seem like there is a lot of info here though, its attaced in Excel. There are so many logs it goes on indefinitely...I should have the other report posted soon.

Attached Files


Edited by gainesdell, 19 May 2009 - 05:39 PM.


#6 extremeboy

extremeboy

  • Malware Response Team
  • 12,975 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:09:41 PM

Posted 19 May 2009 - 05:39 PM

- don't see the log though?? ~I see you edited your post..

I also would like you to run MBAM and RootRepeal afterwards.

~EB

Edited by extremeboy, 19 May 2009 - 05:39 PM.

Note: Please do not PM me asking for help, instead please post it in the correct forum requesting for help. Help requests via the PM system will be ignored.

If I'm helping you and I don't reply within 48 hours please feel free to send me a PM.

The help you receive here is always free but if you wish to show your appreciation, you may wish to Posted Image.

#7 gainesdell

gainesdell
  • Topic Starter

  • Members
  • 11 posts
  • OFFLINE
  •  
  • Local time:09:41 PM

Posted 19 May 2009 - 07:45 PM

OK, Done with mbam and rootrepeal scans. First the MBAM report:



Malwarebytes' Anti-Malware 1.36
Database version: 2110
Windows 5.1.2600 Service Pack 3

5/19/2009 7:48:08 PM
mbam-log-2009-05-19 (19-48-08).txt

Scan type: Quick Scan
Objects scanned: 80062
Time elapsed: 5 minute(s), 56 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 2
Registry Values Infected: 4
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 2

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{2a2a3591-d770-4c04-a2a2-94fad1991bcf} (Trojan.BHO.H) -> Delete on reboot.
HKEY_CLASSES_ROOT\CLSID\{2a2a3591-d770-4c04-a2a2-94fad1991bcf} (Trojan.BHO.H) -> Delete on reboot.

Registry Values Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Settings\bf (Trojan.Agent) -> Delete on reboot.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Settings\bk (Trojan.Agent) -> Delete on reboot.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Settings\iu (Trojan.Agent) -> Delete on reboot.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Settings\mu (Trojan.Agent) -> Delete on reboot.

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
E:\WINDOWS\system32\catsrvp.dll (Trojan.BHO.H) -> Delete on reboot.
E:\Documents and Settings\Phil\Local Settings\Temp\codscqfp.dat (Rootkit.Agent) -> Delete on reboot.




Next the RepealScan:




ROOTREPEAL © AD, 2007-2008
==================================================
Scan Time: 2009/05/19 20:03
Program Version: Version 1.2.3.0
Windows Version: Windows XP SP3
==================================================

Drivers
-------------------
Name:
Image Path:
Address: 0xF72DF000 Size: 98304 File Visible: No
Status: -

Name:
Image Path:
Address: 0x00000000 Size: 0 File Visible: No
Status: -

Name: 00000062
Image Path: \Driver\00000062
Address: 0x00000000 Size: 0 File Visible: No
Status: -

Name: dump_atapi.sys
Image Path: E:\WINDOWS\System32\Drivers\dump_atapi.sys
Address: 0xF47B6000 Size: 98304 File Visible: No
Status: -

Name: dump_WMILIB.SYS
Image Path: E:\WINDOWS\System32\Drivers\dump_WMILIB.SYS
Address: 0xF7ABA000 Size: 8192 File Visible: No
Status: -

Name: rootrepeal.sys
Image Path: E:\WINDOWS\system32\drivers\rootrepeal.sys
Address: 0xF120E000 Size: 45056 File Visible: No
Status: -

Name: zrjgztcj.sys
Image Path: zrjgztcj.sys
Address: 0xF7592000 Size: 61440 File Visible: No
Status: -

Hidden/Locked Files
-------------------
Path: E:\Documents and Settings\Phil\Local Settings\Temp\codscqfp.dat
Status: Locked to the Windows API!

Path: E:\Documents and Settings\Phil\Local Settings\Temporary Internet Files\AntiPhishing\B3BB5BBA-E7D5-40AB-A041-A5B1C0B26C8F.dat
Status: Allocation size mismatch (API: 8192, Raw: 4096)

SSDT
-------------------
#: 012 Function Name: NtAlertResumeThread
Status: Hooked by "<unknown>" at address 0x868f39b8

#: 013 Function Name: NtAlertThread
Status: Hooked by "<unknown>" at address 0x868f3a98

#: 017 Function Name: NtAllocateVirtualMemory
Status: Hooked by "<unknown>" at address 0x868f7148

#: 025 Function Name: NtClose
Status: Hooked by "d346bus.sys" at address 0xf7388d08

#: 031 Function Name: NtConnectPort
Status: Hooked by "<unknown>" at address 0x869278d8

#: 041 Function Name: NtCreateKey
Status: Hooked by "d346bus.sys" at address 0xf7388cc0

#: 043 Function Name: NtCreateMutant
Status: Hooked by "<unknown>" at address 0x86964ec8

#: 045 Function Name: NtCreatePagingFile
Status: Hooked by "d346bus.sys" at address 0xf737ca20

#: 053 Function Name: NtCreateThread
Status: Hooked by "<unknown>" at address 0x8695f738

#: 065 Function Name: NtDeleteValueKey
Status: Hooked by "E:\Program Files\Symantec\SYMEVENT.SYS" at address 0xf4bb6cc0

#: 071 Function Name: NtEnumerateKey
Status: Hooked by "d346bus.sys" at address 0xf737d4fc

#: 073 Function Name: NtEnumerateValueKey
Status: Hooked by "d346bus.sys" at address 0xf7388e00

#: 083 Function Name: NtFreeVirtualMemory
Status: Hooked by "<unknown>" at address 0x8695d0d0

#: 089 Function Name: NtImpersonateAnonymousToken
Status: Hooked by "<unknown>" at address 0x86922a78

#: 091 Function Name: NtImpersonateThread
Status: Hooked by "<unknown>" at address 0x86922b58

#: 108 Function Name: NtMapViewOfSection
Status: Hooked by "<unknown>" at address 0x868f1b50

#: 114 Function Name: NtOpenEvent
Status: Hooked by "<unknown>" at address 0x86964de8

#: 116 Function Name: NtOpenFile
Status: Hooked by "d346bus.sys" at address 0xf737ca60

#: 119 Function Name: NtOpenKey
Status: Hooked by "d346bus.sys" at address 0xf7388c84

#: 123 Function Name: NtOpenProcessToken
Status: Hooked by "<unknown>" at address 0x868f62b0

#: 129 Function Name: NtOpenThreadToken
Status: Hooked by "<unknown>" at address 0x86917d38

#: 160 Function Name: NtQueryKey
Status: Hooked by "d346bus.sys" at address 0xf737d51c

#: 177 Function Name: NtQueryValueKey
Status: Hooked by "<unknown>" at address 0x8691f7d8

#: 206 Function Name: NtResumeThread
Status: Hooked by "<unknown>" at address 0x86922840

#: 213 Function Name: NtSetContextThread
Status: Hooked by "<unknown>" at address 0x869225a8

#: 228 Function Name: NtSetInformationProcess
Status: Hooked by "<unknown>" at address 0x86917e18

#: 229 Function Name: NtSetInformationThread
Status: Hooked by "<unknown>" at address 0x869224c8

#: 241 Function Name: NtSetSystemPowerState
Status: Hooked by "d346bus.sys" at address 0xf7388230

#: 247 Function Name: NtSetValueKey
Status: Hooked by "E:\Program Files\Symantec\SYMEVENT.SYS" at address 0xf4bb6f20

#: 253 Function Name: NtSuspendProcess
Status: Hooked by "<unknown>" at address 0x8691f6f8

#: 254 Function Name: NtSuspendThread
Status: Hooked by "<unknown>" at address 0x86913b40

#: 257 Function Name: NtTerminateProcess
Status: Hooked by "<unknown>" at address 0x86960a80

#: 258 Function Name: NtTerminateThread
Status: Hooked by "<unknown>" at address 0x86913c20

#: 267 Function Name: NtUnmapViewOfSection
Status: Hooked by "<unknown>" at address 0x86916488

#: 277 Function Name: NtWriteVirtualMemory
Status: Hooked by "<unknown>" at address 0x8695d190

Stealth Objects
-------------------
Object: Hidden Code [Driver: Ntfs, IRP_MJ_CREATE]
Process: System Address: 0x86fcf1d8 Size: -

Object: Hidden Code [Driver: Ntfs, IRP_MJ_CLOSE]
Process: System Address: 0x86fcf1d8 Size: -

Object: Hidden Code [Driver: Ntfs, IRP_MJ_READ]
Process: System Address: 0x86fcf1d8 Size: -

Object: Hidden Code [Driver: Ntfs, IRP_MJ_WRITE]
Process: System Address: 0x86fcf1d8 Size: -

Object: Hidden Code [Driver: Ntfs, IRP_MJ_QUERY_INFORMATION]
Process: System Address: 0x86fcf1d8 Size: -

Object: Hidden Code [Driver: Ntfs, IRP_MJ_SET_INFORMATION]
Process: System Address: 0x86fcf1d8 Size: -

Object: Hidden Code [Driver: Ntfs, IRP_MJ_QUERY_EA]
Process: System Address: 0x86fcf1d8 Size: -

Object: Hidden Code [Driver: Ntfs, IRP_MJ_SET_EA]
Process: System Address: 0x86fcf1d8 Size: -

Object: Hidden Code [Driver: Ntfs, IRP_MJ_FLUSH_BUFFERS]
Process: System Address: 0x86fcf1d8 Size: -

Object: Hidden Code [Driver: Ntfs, IRP_MJ_QUERY_VOLUME_INFORMATION]
Process: System Address: 0x86fcf1d8 Size: -

Object: Hidden Code [Driver: Ntfs, IRP_MJ_SET_VOLUME_INFORMATION]
Process: System Address: 0x86fcf1d8 Size: -

Object: Hidden Code [Driver: Ntfs, IRP_MJ_DIRECTORY_CONTROL]
Process: System Address: 0x86fcf1d8 Size: -

Object: Hidden Code [Driver: Ntfs, IRP_MJ_FILE_SYSTEM_CONTROL]
Process: System Address: 0x86fcf1d8 Size: -

Object: Hidden Code [Driver: Ntfs, IRP_MJ_DEVICE_CONTROL]
Process: System Address: 0x86fcf1d8 Size: -

Object: Hidden Code [Driver: Ntfs, IRP_MJ_SHUTDOWN]
Process: System Address: 0x86fcf1d8 Size: -

Object: Hidden Code [Driver: Ntfs, IRP_MJ_LOCK_CONTROL]
Process: System Address: 0x86fcf1d8 Size: -

Object: Hidden Code [Driver: Ntfs, IRP_MJ_CLEANUP]
Process: System Address: 0x86fcf1d8 Size: -

Object: Hidden Code [Driver: Ntfs, IRP_MJ_QUERY_SECURITY]
Process: System Address: 0x86fcf1d8 Size: -

Object: Hidden Code [Driver: Ntfs, IRP_MJ_SET_SECURITY]
Process: System Address: 0x86fcf1d8 Size: -

Object: Hidden Code [Driver: Ntfs, IRP_MJ_QUERY_QUOTA]
Process: System Address: 0x86fcf1d8 Size: -

Object: Hidden Code [Driver: Ntfs, IRP_MJ_SET_QUOTA]
Process: System Address: 0x86fcf1d8 Size: -

Object: Hidden Code [Driver: Ntfs, IRP_MJ_PNP]
Process: System Address: 0x86fcf1d8 Size: -

Object: Hidden Code [Driver: atapi, IRP_MJ_CREATE]
Process: System Address: 0x86c186d0 Size: -

Object: Hidden Code [Driver: atapi, IRP_MJ_CREATE_NAMED_PIPE]
Process: System Address: 0x86c186d0 Size: -

Object: Hidden Code [Driver: atapi, IRP_MJ_CLOSE]
Process: System Address: 0x86c186d0 Size: -

Object: Hidden Code [Driver: atapi, IRP_MJ_READ]
Process: System Address: 0x86c186d0 Size: -

Object: Hidden Code [Driver: atapi, IRP_MJ_WRITE]
Process: System Address: 0x86c186d0 Size: -

Object: Hidden Code [Driver: atapi, IRP_MJ_QUERY_INFORMATION]
Process: System Address: 0x86c186d0 Size: -

Object: Hidden Code [Driver: atapi, IRP_MJ_SET_INFORMATION]
Process: System Address: 0x86c186d0 Size: -

Object: Hidden Code [Driver: atapi, IRP_MJ_QUERY_EA]
Process: System Address: 0x86c186d0 Size: -

Object: Hidden Code [Driver: atapi, IRP_MJ_SET_EA]
Process: System Address: 0x86c186d0 Size: -

Object: Hidden Code [Driver: atapi, IRP_MJ_FLUSH_BUFFERS]
Process: System Address: 0x86c186d0 Size: -

Object: Hidden Code [Driver: atapi, IRP_MJ_QUERY_VOLUME_INFORMATION]
Process: System Address: 0x86c186d0 Size: -

Object: Hidden Code [Driver: atapi, IRP_MJ_SET_VOLUME_INFORMATION]
Process: System Address: 0x86c186d0 Size: -

Object: Hidden Code [Driver: atapi, IRP_MJ_DIRECTORY_CONTROL]
Process: System Address: 0x86c186d0 Size: -

Object: Hidden Code [Driver: atapi, IRP_MJ_FILE_SYSTEM_CONTROL]
Process: System Address: 0x86c186d0 Size: -

Object: Hidden Code [Driver: atapi, IRP_MJ_DEVICE_CONTROL]
Process: System Address: 0x86c186d0 Size: -

Object: Hidden Code [Driver: atapi, IRP_MJ_INTERNAL_DEVICE_CONTROL]
Process: System Address: 0x86c186d0 Size: -

Object: Hidden Code [Driver: atapi, IRP_MJ_SHUTDOWN]
Process: System Address: 0x86c186d0 Size: -

Object: Hidden Code [Driver: atapi, IRP_MJ_LOCK_CONTROL]
Process: System Address: 0x86c186d0 Size: -

Object: Hidden Code [Driver: atapi, IRP_MJ_CLEANUP]
Process: System Address: 0x86c186d0 Size: -

Object: Hidden Code [Driver: atapi, IRP_MJ_CREATE_MAILSLOT]
Process: System Address: 0x86c186d0 Size: -

Object: Hidden Code [Driver: atapi, IRP_MJ_QUERY_SECURITY]
Process: System Address: 0x86c186d0 Size: -

Object: Hidden Code [Driver: atapi, IRP_MJ_SET_SECURITY]
Process: System Address: 0x86c186d0 Size: -

Object: Hidden Code [Driver: atapi, IRP_MJ_POWER]
Process: System Address: 0x86c186d0 Size: -

Object: Hidden Code [Driver: atapi, IRP_MJ_SYSTEM_CONTROL]
Process: System Address: 0x86c186d0 Size: -

Object: Hidden Code [Driver: atapi, IRP_MJ_DEVICE_CHANGE]
Process: System Address: 0x86c186d0 Size: -

Object: Hidden Code [Driver: atapi, IRP_MJ_QUERY_QUOTA]
Process: System Address: 0x86c186d0 Size: -

Object: Hidden Code [Driver: atapi, IRP_MJ_SET_QUOTA]
Process: System Address: 0x86c186d0 Size: -

Object: Hidden Code [Driver: atapi, IRP_MJ_PNP]
Process: System Address: 0x86c186d0 Size: -

Object: Hidden Code [Driver: Cdrom, IRP_MJ_CREATE]
Process: System Address: 0x86c18238 Size: -

Object: Hidden Code [Driver: Cdrom, IRP_MJ_CREATE_NAMED_PIPE]
Process: System Address: 0x86c18238 Size: -

Object: Hidden Code [Driver: Cdrom, IRP_MJ_CLOSE]
Process: System Address: 0x86c18238 Size: -

Object: Hidden Code [Driver: Cdrom, IRP_MJ_READ]
Process: System Address: 0x86c18238 Size: -

Object: Hidden Code [Driver: Cdrom, IRP_MJ_WRITE]
Process: System Address: 0x86c18238 Size: -

Object: Hidden Code [Driver: Cdrom, IRP_MJ_QUERY_INFORMATION]
Process: System Address: 0x86c18238 Size: -

Object: Hidden Code [Driver: Cdrom, IRP_MJ_SET_INFORMATION]
Process: System Address: 0x86c18238 Size: -

Object: Hidden Code [Driver: Cdrom, IRP_MJ_QUERY_EA]
Process: System Address: 0x86c18238 Size: -

Object: Hidden Code [Driver: Cdrom, IRP_MJ_SET_EA]
Process: System Address: 0x86c18238 Size: -

Object: Hidden Code [Driver: Cdrom, IRP_MJ_FLUSH_BUFFERS]
Process: System Address: 0x86c18238 Size: -

Object: Hidden Code [Driver: Cdrom, IRP_MJ_QUERY_VOLUME_INFORMATION]
Process: System Address: 0x86c18238 Size: -

Object: Hidden Code [Driver: Cdrom, IRP_MJ_SET_VOLUME_INFORMATION]
Process: System Address: 0x86c18238 Size: -

Object: Hidden Code [Driver: Cdrom, IRP_MJ_DIRECTORY_CONTROL]
Process: System Address: 0x86c18238 Size: -

Object: Hidden Code [Driver: Cdrom, IRP_MJ_FILE_SYSTEM_CONTROL]
Process: System Address: 0x86c18238 Size: -

Object: Hidden Code [Driver: Cdrom, IRP_MJ_DEVICE_CONTROL]
Process: System Address: 0x86c18238 Size: -

Object: Hidden Code [Driver: Cdrom, IRP_MJ_INTERNAL_DEVICE_CONTROL]
Process: System Address: 0x86c18238 Size: -

Object: Hidden Code [Driver: Cdrom, IRP_MJ_SHUTDOWN]
Process: System Address: 0x86c18238 Size: -

Object: Hidden Code [Driver: Cdrom, IRP_MJ_LOCK_CONTROL]
Process: System Address: 0x86c18238 Size: -

Object: Hidden Code [Driver: Cdrom, IRP_MJ_CLEANUP]
Process: System Address: 0x86c18238 Size: -

Object: Hidden Code [Driver: Cdrom, IRP_MJ_CREATE_MAILSLOT]
Process: System Address: 0x86c18238 Size: -

Object: Hidden Code [Driver: Cdrom, IRP_MJ_QUERY_SECURITY]
Process: System Address: 0x86c18238 Size: -

Object: Hidden Code [Driver: Cdrom, IRP_MJ_SET_SECURITY]
Process: System Address: 0x86c18238 Size: -

Object: Hidden Code [Driver: Cdrom, IRP_MJ_POWER]
Process: System Address: 0x86c18238 Size: -

Object: Hidden Code [Driver: Cdrom, IRP_MJ_SYSTEM_CONTROL]
Process: System Address: 0x86c18238 Size: -

Object: Hidden Code [Driver: Cdrom, IRP_MJ_DEVICE_CHANGE]
Process: System Address: 0x86c18238 Size: -

Object: Hidden Code [Driver: Cdrom, IRP_MJ_QUERY_QUOTA]
Process: System Address: 0x86c18238 Size: -

Object: Hidden Code [Driver: Cdrom, IRP_MJ_SET_QUOTA]
Process: System Address: 0x86c18238 Size: -

Object: Hidden Code [Driver: Cdrom, IRP_MJ_PNP]
Process: System Address: 0x86c18238 Size: -

Object: Hidden Code [Driver: dmio, IRP_MJ_CREATE]
Process: System Address: 0x86fd11d8 Size: -

Object: Hidden Code [Driver: dmio, IRP_MJ_CLOSE]
Process: System Address: 0x86fd11d8 Size: -

Object: Hidden Code [Driver: dmio, IRP_MJ_READ]
Process: System Address: 0x86fd11d8 Size: -

Object: Hidden Code [Driver: dmio, IRP_MJ_WRITE]
Process: System Address: 0x86fd11d8 Size: -

Object: Hidden Code [Driver: dmio, IRP_MJ_FLUSH_BUFFERS]
Process: System Address: 0x86fd11d8 Size: -

Object: Hidden Code [Driver: dmio, IRP_MJ_DEVICE_CONTROL]
Process: System Address: 0x86fd11d8 Size: -

Object: Hidden Code [Driver: dmio, IRP_MJ_INTERNAL_DEVICE_CONTROL]
Process: System Address: 0x86fd11d8 Size: -

Object: Hidden Code [Driver: dmio, IRP_MJ_SHUTDOWN]
Process: System Address: 0x86fd11d8 Size: -

Object: Hidden Code [Driver: dmio, IRP_MJ_POWER]
Process: System Address: 0x86fd11d8 Size: -

Object: Hidden Code [Driver: dmio, IRP_MJ_SYSTEM_CONTROL]
Process: System Address: 0x86fd11d8 Size: -

Object: Hidden Code [Driver: dmio, IRP_MJ_PNP]
Process: System Address: 0x86fd11d8 Size: -

Object: Hidden Code [Driver: usbuhci, IRP_MJ_CREATE]
Process: System Address: 0x86ec61d8 Size: -

Object: Hidden Code [Driver: usbuhci, IRP_MJ_CLOSE]
Process: System Address: 0x86ec61d8 Size: -

Object: Hidden Code [Driver: usbuhci, IRP_MJ_DEVICE_CONTROL]
Process: System Address: 0x86ec61d8 Size: -

Object: Hidden Code [Driver: usbuhci, IRP_MJ_INTERNAL_DEVICE_CONTROL]
Process: System Address: 0x86ec61d8 Size: -

Object: Hidden Code [Driver: usbuhci, IRP_MJ_POWER]
Process: System Address: 0x86ec61d8 Size: -

Object: Hidden Code [Driver: usbuhci, IRP_MJ_SYSTEM_CONTROL]
Process: System Address: 0x86ec61d8 Size: -

Object: Hidden Code [Driver: usbuhci, IRP_MJ_PNP]
Process: System Address: 0x86ec61d8 Size: -

Object: Hidden Code [Driver: Ftdisk, IRP_MJ_CREATE]
Process: System Address: 0x86f5f1d8 Size: -

Object: Hidden Code [Driver: Ftdisk, IRP_MJ_READ]
Process: System Address: 0x86f5f1d8 Size: -

Object: Hidden Code [Driver: Ftdisk, IRP_MJ_WRITE]
Process: System Address: 0x86f5f1d8 Size: -

Object: Hidden Code [Driver: Ftdisk, IRP_MJ_FLUSH_BUFFERS]
Process: System Address: 0x86f5f1d8 Size: -

Object: Hidden Code [Driver: Ftdisk, IRP_MJ_DEVICE_CONTROL]
Process: System Address: 0x86f5f1d8 Size: -

Object: Hidden Code [Driver: Ftdisk, IRP_MJ_INTERNAL_DEVICE_CONTROL]
Process: System Address: 0x86f5f1d8 Size: -

Object: Hidden Code [Driver: Ftdisk, IRP_MJ_SHUTDOWN]
Process: System Address: 0x86f5f1d8 Size: -

Object: Hidden Code [Driver: Ftdisk, IRP_MJ_CLEANUP]
Process: System Address: 0x86f5f1d8 Size: -

Object: Hidden Code [Driver: Ftdisk, IRP_MJ_POWER]
Process: System Address: 0x86f5f1d8 Size: -

Object: Hidden Code [Driver: Ftdisk, IRP_MJ_SYSTEM_CONTROL]
Process: System Address: 0x86f5f1d8 Size: -

Object: Hidden Code [Driver: Ftdisk, IRP_MJ_PNP]
Process: System Address: 0x86f5f1d8 Size: -

Object: Hidden Code [Driver: NetBT, IRP_MJ_CREATE]
Process: System Address: 0x868f6808 Size: -

Object: Hidden Code [Driver: NetBT, IRP_MJ_CLOSE]
Process: System Address: 0x868f6808 Size: -

Object: Hidden Code [Driver: NetBT, IRP_MJ_DEVICE_CONTROL]
Process: System Address: 0x868f6808 Size: -

Object: Hidden Code [Driver: NetBT, IRP_MJ_INTERNAL_DEVICE_CONTROL]
Process: System Address: 0x868f6808 Size: -

Object: Hidden Code [Driver: NetBT, IRP_MJ_CLEANUP]
Process: System Address: 0x868f6808 Size: -

Object: Hidden Code [Driver: NetBT, IRP_MJ_PNP]
Process: System Address: 0x868f6808 Size: -

Object: Hidden Code [Driver: usbehci, IRP_MJ_CREATE]
Process: System Address: 0x86eb6980 Size: -

Object: Hidden Code [Driver: usbehci, IRP_MJ_CLOSE]
Process: System Address: 0x86eb6980 Size: -

Object: Hidden Code [Driver: usbehci, IRP_MJ_DEVICE_CONTROL]
Process: System Address: 0x86eb6980 Size: -

Object: Hidden Code [Driver: usbehci, IRP_MJ_INTERNAL_DEVICE_CONTROL]
Process: System Address: 0x86eb6980 Size: -

Object: Hidden Code [Driver: usbehci, IRP_MJ_POWER]
Process: System Address: 0x86eb6980 Size: -

Object: Hidden Code [Driver: usbehci, IRP_MJ_SYSTEM_CONTROL]
Process: System Address: 0x86eb6980 Size: -

Object: Hidden Code [Driver: usbehci, IRP_MJ_PNP]
Process: System Address: 0x86eb6980 Size: -

Object: Hidden Code [Driver: Rdbss, IRP_MJ_READ]
Process: System Address: 0x868e7848 Size: -

Object: Hidden Code [Driver: Srv, IRP_MJ_READ]
Process: System Address: 0x86185250 Size: -

Object: Hidden Code [Driver: MRxSmb, IRP_MJ_CREATE]
Process: System Address: 0x868e61d8 Size: -

Object: Hidden Code [Driver: MRxSmb, IRP_MJ_CREATE_NAMED_PIPE]
Process: System Address: 0x868e61d8 Size: -

Object: Hidden Code [Driver: MRxSmb, IRP_MJ_CLOSE]
Process: System Address: 0x868e61d8 Size: -

Object: Hidden Code [Driver: MRxSmb, IRP_MJ_READ]
Process: System Address: 0x868e1650 Size: -

Object: Hidden Code [Driver: MRxSmb, IRP_MJ_WRITE]
Process: System Address: 0x868e61d8 Size: -

Object: Hidden Code [Driver: MRxSmb, IRP_MJ_QUERY_INFORMATION]
Process: System Address: 0x868e61d8 Size: -

Object: Hidden Code [Driver: MRxSmb, IRP_MJ_SET_INFORMATION]
Process: System Address: 0x868e61d8 Size: -

Object: Hidden Code [Driver: MRxSmb, IRP_MJ_QUERY_EA]
Process: System Address: 0x868e61d8 Size: -

Object: Hidden Code [Driver: MRxSmb, IRP_MJ_SET_EA]
Process: System Address: 0x868e61d8 Size: -

Object: Hidden Code [Driver: MRxSmb, IRP_MJ_FLUSH_BUFFERS]
Process: System Address: 0x868e61d8 Size: -

Object: Hidden Code [Driver: MRxSmb, IRP_MJ_QUERY_VOLUME_INFORMATION]
Process: System Address: 0x868e61d8 Size: -

Object: Hidden Code [Driver: MRxSmb, IRP_MJ_SET_VOLUME_INFORMATION]
Process: System Address: 0x868e61d8 Size: -

Object: Hidden Code [Driver: MRxSmb, IRP_MJ_DIRECTORY_CONTROL]
Process: System Address: 0x868e61d8 Size: -

Object: Hidden Code [Driver: MRxSmb, IRP_MJ_FILE_SYSTEM_CONTROL]
Process: System Address: 0x868e61d8 Size: -

Object: Hidden Code [Driver: MRxSmb, IRP_MJ_DEVICE_CONTROL]
Process: System Address: 0x868e61d8 Size: -

Object: Hidden Code [Driver: MRxSmb, IRP_MJ_INTERNAL_DEVICE_CONTROL]
Process: System Address: 0x868e61d8 Size: -

Object: Hidden Code [Driver: MRxSmb, IRP_MJ_SHUTDOWN]
Process: System Address: 0x868e61d8 Size: -

Object: Hidden Code [Driver: MRxSmb, IRP_MJ_LOCK_CONTROL]
Process: System Address: 0x868e61d8 Size: -

Object: Hidden Code [Driver: MRxSmb, IRP_MJ_CLEANUP]
Process: System Address: 0x868e61d8 Size: -

Object: Hidden Code [Driver: MRxSmb, IRP_MJ_CREATE_MAILSLOT]
Process: System Address: 0x868e61d8 Size: -

Object: Hidden Code [Driver: MRxSmb, IRP_MJ_QUERY_SECURITY]
Process: System Address: 0x868e61d8 Size: -

Object: Hidden Code [Driver: MRxSmb, IRP_MJ_SET_SECURITY]
Process: System Address: 0x868e61d8 Size: -

Object: Hidden Code [Driver: MRxSmb, IRP_MJ_POWER]
Process: System Address: 0x868e61d8 Size: -

Object: Hidden Code [Driver: MRxSmb, IRP_MJ_SYSTEM_CONTROL]
Process: System Address: 0x868e61d8 Size: -

Object: Hidden Code [Driver: MRxSmb, IRP_MJ_DEVICE_CHANGE]
Process: System Address: 0x868e61d8 Size: -

Object: Hidden Code [Driver: MRxSmb, IRP_MJ_QUERY_QUOTA]
Process: System Address: 0x868e61d8 Size: -

Object: Hidden Code [Driver: MRxSmb, IRP_MJ_SET_QUOTA]
Process: System Address: 0x868e61d8 Size: -

Object: Hidden Code [Driver: MRxSmb, IRP_MJ_PNP]
Process: System Address: 0x868e61d8 Size: -

Object: Hidden Code [Driver: NpfsȀ෺䅓䍃B, IRP_MJ_READ]
Process: System Address: 0x869934b0 Size: -

Object: Hidden Code [Driver: Msfs؅ఆ剒敬ꎼ, IRP_MJ_READ]
Process: System Address: 0x869716e8 Size: -

Object: Hidden Code [Driver: Fs_Rec, IRP_MJ_READ]
Process: System Address: 0x86974e88 Size: -

Object: Hidden Code [Driver: Cdfsࠅఛ浗灩, IRP_MJ_CREATE]
Process: System Address: 0x868921d8 Size: -

Object: Hidden Code [Driver: Cdfsࠅఛ浗灩, IRP_MJ_CLOSE]
Process: System Address: 0x868921d8 Size: -

Object: Hidden Code [Driver: Cdfsࠅఛ浗灩, IRP_MJ_READ]
Process: System Address: 0x868a2538 Size: -

Object: Hidden Code [Driver: Cdfsࠅఛ浗灩, IRP_MJ_QUERY_INFORMATION]
Process: System Address: 0x868921d8 Size: -

Object: Hidden Code [Driver: Cdfsࠅఛ浗灩, IRP_MJ_SET_INFORMATION]
Process: System Address: 0x868921d8 Size: -

Object: Hidden Code [Driver: Cdfsࠅఛ浗灩, IRP_MJ_QUERY_VOLUME_INFORMATION]
Process: System Address: 0x868921d8 Size: -

Object: Hidden Code [Driver: Cdfsࠅఛ浗灩, IRP_MJ_DIRECTORY_CONTROL]
Process: System Address: 0x868921d8 Size: -

Object: Hidden Code [Driver: Cdfsࠅఛ浗灩, IRP_MJ_FILE_SYSTEM_CONTROL]
Process: System Address: 0x868921d8 Size: -

Object: Hidden Code [Driver: Cdfsࠅఛ浗灩, IRP_MJ_DEVICE_CONTROL]
Process: System Address: 0x868921d8 Size: -

Object: Hidden Code [Driver: Cdfsࠅఛ浗灩, IRP_MJ_SHUTDOWN]
Process: System Address: 0x868921d8 Size: -

Object: Hidden Code [Driver: Cdfsࠅఛ浗灩, IRP_MJ_LOCK_CONTROL]
Process: System Address: 0x868921d8 Size: -

Object: Hidden Code [Driver: Cdfsࠅఛ浗灩, IRP_MJ_CLEANUP]
Process: System Address: 0x868921d8 Size: -

Object: Hidden Code [Driver: Cdfsࠅఛ浗灩, IRP_MJ_PNP]
Process: System Address: 0x868921d8 Size: -





I sure hope something good happened

#8 extremeboy

extremeboy

  • Malware Response Team
  • 12,975 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:09:41 PM

Posted 19 May 2009 - 08:15 PM

Hello.

Install Recovery Console and Run ComboFix

Note to readers of this post other than the starter of this thread:
ComboFix is a VERY POWERFUL tool which should NOT BE USED without guidance of an expert.

Please download Combofix from any of the links below, and save it to your desktop.

Link 1
Link 2
Link 3
  • Close/disable all anti-virus and anti-malware programs so they do not interfere with the running of ComboFix. Refer to this page if you are not sure how.
  • Close any open windows, including this one.
  • Double click on ComboFix.exe & follow the prompts.
  • As part of it's process, ComboFix will check to see if the Microsoft Windows Recovery Console is installed. With malware infections being as they are today, it's strongly recommended to have this pre-installed on your machine before doing any malware removal. It will allow you to boot up into a special recovery/repair mode that will allow us to more easily help you should your computer have a problem after an attempted removal of malware.
  • If you did not have it installed, you will see the prompt below. Choose YES.
  • Posted Image
  • Follow the prompts to allow ComboFix to download and install the Microsoft Windows Recovery Console, and when prompted, agree to the End-User License Agreement to install the Microsoft Windows Recovery Console.
**Please note: If the Microsoft Windows Recovery Console is already installed, ComboFix will continue it's malware removal procedures.

Note:The Windows Recovery Console will allow you to boot up into a special recovery (repair) mode. This allows us to more easily help you
should your computer have a problem after an attempted removal of malware. It is a simple procedure that will only take a few moments of your time.

  • Once the Microsoft Windows Recovery Console is installed using ComboFix, you should see the following message:

    Posted Image
  • Click on Yes, to continue scanning for malware.
  • When finished, it will produce a report for you. Please post the contents of the log (C:\ComboFix.txt).
Leave your computer alone while ComboFix is running.
ComboFix will restart your computer if malware is found; allow it to do so.


Note: Please Do NOT mouseclick combofix's window while its running because it may call it to stall.

~Extremeboy
Note: Please do not PM me asking for help, instead please post it in the correct forum requesting for help. Help requests via the PM system will be ignored.

If I'm helping you and I don't reply within 48 hours please feel free to send me a PM.

The help you receive here is always free but if you wish to show your appreciation, you may wish to Posted Image.

#9 gainesdell

gainesdell
  • Topic Starter

  • Members
  • 11 posts
  • OFFLINE
  •  
  • Local time:09:41 PM

Posted 20 May 2009 - 08:00 PM

Combo Fix Log Report:

ComboFix 09-05-02.4 - Phil 05/20/2009 20:48.4 - NTFSx86
Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.1022.515 [GMT -4:00]
Running from: e:\documents and settings\Phil\Desktop\ComboFix.exe
AV: Symantec AntiVirus Corporate Edition *On-access scanning disabled* (Updated)
.
- REDUCED FUNCTIONALITY MODE -
.

((((((((((((((((((((((((( Files Created from 2009-04-21 to 2009-05-21 )))))))))))))))))))))))))))))))
.

2009-05-19 23:33 . 2009-05-19 23:33 -------- d-----w e:\documents and settings\Phil\Application Data\Malwarebytes
2009-05-19 23:32 . 2009-04-06 19:32 15504 ----a-w e:\windows\system32\drivers\mbam.sys
2009-05-19 23:32 . 2009-04-06 19:32 38496 ----a-w e:\windows\system32\drivers\mbamswissarmy.sys
2009-05-19 23:32 . 2009-05-19 23:32 -------- d-----w e:\documents and settings\All Users\Application Data\Malwarebytes
2009-05-19 23:32 . 2009-05-19 23:33 -------- d-----w e:\program files\Malwarebytes' Anti-Malware
2009-04-30 23:26 . 2009-04-30 23:28 -------- d-----w e:\program files\GMATPrep

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2009-05-21 00:47 . 2006-11-15 23:09 6 ---ha-w e:\windows\Tasks\SA.DAT
2009-05-21 00:46 . 2007-09-05 20:29 -------- d-----w e:\program files\Symantec AntiVirus
2009-05-20 21:40 . 2006-12-16 19:29 420 ---ha-w e:\windows\Tasks\User_Feed_Synchronization-{43EF4B1C-9EC7-4625-8362-2420B49D6788}.job
2009-05-19 23:57 . 2006-11-16 00:32 69232 -c--a-w e:\documents and settings\Phil\Local Settings\Application Data\GDIPFONTCACHEV1.DAT
2009-04-30 23:26 . 2006-11-16 00:39 -------- d--h--w e:\program files\InstallShield Installation Information
2009-04-10 15:40 . 2009-04-10 15:40 -------- d-----w e:\program files\Common Files\Real
2009-04-10 15:39 . 2009-04-10 15:39 -------- d-----w e:\program files\Common Files\Merge Modules
2009-04-10 15:39 . 2009-04-10 15:39 -------- d-----w e:\program files\Common Files\Java
2009-04-10 15:39 . 2009-04-10 15:39 -------- d-----w e:\program files\Common Files\InstallShield
2009-04-10 15:34 . 2009-04-10 15:33 -------- d-----w e:\program files\OLYMPUS
2009-04-10 15:31 . 2009-04-10 15:31 -------- d-----w e:\program files\Common Files\xing shared
2009-04-10 15:31 . 2009-04-10 15:31 -------- d-----w e:\program files\Common Files\Wise Installation Wizard
2009-04-10 15:31 . 2009-04-10 15:31 -------- d-----w e:\program files\QuickTime
2009-04-10 15:31 . 2009-04-10 15:31 -------- d-----w e:\program files\D-Tools
2009-04-08 02:07 . 2006-11-15 23:09 86327 ----a-w e:\windows\PCHEALTH\HELPCTR\OfflineCache\index.dat
2009-03-06 14:22 . 2001-08-23 12:00 284160 ----a-w e:\windows\system32\pdh.dll
2009-03-03 00:18 . 2004-01-08 20:23 826368 ----a-w e:\windows\system32\wininet.dll
2009-02-20 18:09 . 2004-08-04 07:56 78336 ----a-w e:\windows\system32\ieencode.dll
2005-10-12 19:04 . 2005-10-12 19:04 131072 -c--a-w e:\program files\internet explorer\plugins\LV80ActiveXControl.dll
2006-06-07 18:40 . 2006-06-07 18:40 132848 -c--a-w e:\program files\internet explorer\plugins\LV82ActiveXControl.dll
.

((((((((((((((((((((((((((((( SnapShot@2009-04-28_22.31.58 )))))))))))))))))))))))))))))))))))))))))
.
- 2001-08-23 12:00 . 2009-04-28 21:58 53608 e:\windows\system32\perfc009.dat
+ 2001-08-23 12:00 . 2009-05-20 21:41 53608 e:\windows\system32\perfc009.dat
- 2009-03-12 01:08 . 2009-04-16 01:49 35088 e:\windows\Installer\{90120000-0030-0000-0000-0000000FF1CE}\oisicon.exe
+ 2009-03-12 01:08 . 2009-04-29 01:48 35088 e:\windows\Installer\{90120000-0030-0000-0000-0000000FF1CE}\oisicon.exe
+ 2009-03-12 01:08 . 2009-04-29 01:48 18704 e:\windows\Installer\{90120000-0030-0000-0000-0000000FF1CE}\mspicons.exe
- 2009-03-12 01:08 . 2009-04-16 01:49 18704 e:\windows\Installer\{90120000-0030-0000-0000-0000000FF1CE}\mspicons.exe
- 2009-03-12 01:08 . 2009-04-16 01:49 20240 e:\windows\Installer\{90120000-0030-0000-0000-0000000FF1CE}\cagicon.exe
+ 2009-03-12 01:08 . 2009-04-29 01:48 20240 e:\windows\Installer\{90120000-0030-0000-0000-0000000FF1CE}\cagicon.exe
+ 2001-08-23 12:00 . 2009-05-20 21:41 383254 e:\windows\system32\perfh009.dat
- 2001-08-23 12:00 . 2009-04-28 21:58 383254 e:\windows\system32\perfh009.dat
+ 2006-11-15 17:57 . 2009-05-01 11:03 266208 e:\windows\system32\FNTCACHE.DAT
- 2009-03-12 01:08 . 2009-04-16 01:49 888080 e:\windows\Installer\{90120000-0030-0000-0000-0000000FF1CE}\wordicon.exe
+ 2009-03-12 01:08 . 2009-04-29 01:48 888080 e:\windows\Installer\{90120000-0030-0000-0000-0000000FF1CE}\wordicon.exe
- 2009-03-12 01:08 . 2009-04-16 01:49 272648 e:\windows\Installer\{90120000-0030-0000-0000-0000000FF1CE}\pubs.exe
+ 2009-03-12 01:08 . 2009-04-29 01:48 272648 e:\windows\Installer\{90120000-0030-0000-0000-0000000FF1CE}\pubs.exe
- 2009-03-12 01:08 . 2009-04-16 01:49 922384 e:\windows\Installer\{90120000-0030-0000-0000-0000000FF1CE}\pptico.exe
+ 2009-03-12 01:08 . 2009-04-29 01:48 922384 e:\windows\Installer\{90120000-0030-0000-0000-0000000FF1CE}\pptico.exe
- 2009-03-12 01:08 . 2009-04-16 01:49 845584 e:\windows\Installer\{90120000-0030-0000-0000-0000000FF1CE}\outicon.exe
+ 2009-03-12 01:08 . 2009-04-29 01:48 845584 e:\windows\Installer\{90120000-0030-0000-0000-0000000FF1CE}\outicon.exe
+ 2009-03-12 01:08 . 2009-04-29 01:48 217864 e:\windows\Installer\{90120000-0030-0000-0000-0000000FF1CE}\misc.exe
- 2009-03-12 01:08 . 2009-04-16 01:49 217864 e:\windows\Installer\{90120000-0030-0000-0000-0000000FF1CE}\misc.exe
- 2009-03-12 01:08 . 2009-04-16 01:49 184080 e:\windows\Installer\{90120000-0030-0000-0000-0000000FF1CE}\joticon.exe
+ 2009-03-12 01:08 . 2009-04-29 01:48 184080 e:\windows\Installer\{90120000-0030-0000-0000-0000000FF1CE}\joticon.exe
- 2009-03-12 01:08 . 2009-04-16 01:49 159504 e:\windows\Installer\{90120000-0030-0000-0000-0000000FF1CE}\inficon.exe
+ 2009-03-12 01:08 . 2009-04-29 01:48 159504 e:\windows\Installer\{90120000-0030-0000-0000-0000000FF1CE}\inficon.exe
- 2009-03-12 01:08 . 2009-04-16 01:49 1172240 e:\windows\Installer\{90120000-0030-0000-0000-0000000FF1CE}\xlicons.exe
+ 2009-03-12 01:08 . 2009-04-29 01:48 1172240 e:\windows\Installer\{90120000-0030-0000-0000-0000000FF1CE}\xlicons.exe
+ 2009-03-12 01:08 . 2009-04-29 01:48 1165584 e:\windows\Installer\{90120000-0030-0000-0000-0000000FF1CE}\accicons.exe
- 2009-03-12 01:08 . 2009-04-16 01:49 1165584 e:\windows\Installer\{90120000-0030-0000-0000-0000000FF1CE}\accicons.exe
.
-- Snapshot reset to current date --
.
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{2A2A3591-D770-4C04-A2A2-94FAD1991BCF}]
2008-04-14 00:11 97792 ----a-w e:\windows\system32\catsrvp.dll

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"ctfmon.exe"="e:\windows\system32\ctfmon.exe" [2008-04-14 15360]
"OM2_Monitor"="e:\program files\OLYMPUS\OLYMPUS Master 2\MMonitor.exe" [2008-05-15 95536]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"ATIPTA"="e:\program files\ATI Technologies\ATI Control Panel\atiptaxx.exe" [2005-08-06 344064]
"QuickTime Task"="e:\program files\QuickTime\qttask.exe" [2006-09-01 282624]
"HP Component Manager"="e:\program files\HP\hpcoretech\hpcmpmgr.exe" [2003-12-22 241664]
"ccApp"="e:\program files\Common Files\Symantec Shared\ccApp.exe" [2006-07-20 52896]
"vptray"="e:\progra~1\SYMANT~1\VPTray.exe" [2006-08-03 124656]
"Adobe Reader Speed Launcher"="c:\programs\Adobe\Reader\Reader_sl.exe" [2008-01-12 39792]
"Adobe Photo Downloader"="c:\programs\Adobe Photoshop Elements 5.0\apdproxy.exe" [2006-09-14 61440]
"OM2_Monitor"="e:\program files\OLYMPUS\OLYMPUS Master 2\FirstStart.exe" [2008-05-15 54576]
"SigmatelSysTrayApp"="stsystra.exe" - e:\windows\stsystra.exe [2006-02-10 282624]

e:\documents and settings\Phil\Start Menu\Programs\Startup\
OneNote 2007 Screen Clipper and Launcher.lnk - e:\program files\Microsoft Office\Office12\ONENOTEM.EXE [2007-12-7 101440]

e:\documents and settings\All Users\Start Menu\Programs\Startup\
Wireless PCI_CardBus utility V1.01.exe.lnk - e:\program files\Wireless PCI_CardBus utility V1.01\Wireless PCI_CardBus utility V1.01.exe [2007-7-30 913408]

[HKLM\~\startupfolder\E:^Documents and Settings^All Users^Start Menu^Programs^Startup^Adobe Reader Speed Launch.lnk]
path=e:\documents and settings\All Users\Start Menu\Programs\Startup\Adobe Reader Speed Launch.lnk
backup=e:\windows\pss\Adobe Reader Speed Launch.lnkCommon Startup

[HKLM\~\startupfolder\E:^Documents and Settings^All Users^Start Menu^Programs^Startup^Adobe Reader Synchronizer.lnk]
path=e:\documents and settings\All Users\Start Menu\Programs\Startup\Adobe Reader Synchronizer.lnk
backup=e:\windows\pss\Adobe Reader Synchronizer.lnkCommon Startup

[HKLM\~\startupfolder\E:^Documents and Settings^All Users^Start Menu^Programs^Startup^InterVideo WinCinema Manager.lnk]
path=e:\documents and settings\All Users\Start Menu\Programs\Startup\InterVideo WinCinema Manager.lnk
backup=e:\windows\pss\InterVideo WinCinema Manager.lnkCommon Startup

[HKLM\~\startupfolder\E:^Documents and Settings^All Users^Start Menu^Programs^Startup^SnagIt 8.lnk]
path=e:\documents and settings\All Users\Start Menu\Programs\Startup\SnagIt 8.lnk
backup=e:\windows\pss\SnagIt 8.lnkCommon Startup

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecAntiVirus]
"DisableMonitoring"=dword:00000001

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]
"EnableFirewall"= 0 (0x0)

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"c:\\Programs\\Azureus\\Azureus.exe"=
"c:\\Programs\\bleep\\LabVIEW.exe"=
"e:\\Program Files\\Microsoft Office\\Office12\\GROOVE.EXE"=
"e:\\Program Files\\Microsoft Office\\Office12\\ONENOTE.EXE"=
"e:\\Program Files\\Microsoft Office\\Office12\\OUTLOOK.EXE"=
"e:\\Program Files\\Common Files\\Ahead\\Nero Web\\SetupX.exe"=
"e:\\WINDOWS\\system32\\sessmgr.exe"=
"%windir%\\system32\\sessmgr.exe"=

R0 d344prt;d344prt; [x]
R3 EraserUtilDrvI3;EraserUtilDrvI3; [x]
R3 SavRoam;SavRoam;e:\program files\Symantec AntiVirus\SavRoam.exe [2006-08-03 115952]
S0 chioevzo;chioevzo;e:\windows\system32\drivers\chioevzo.sys [2001-08-23 23424]
S0 d346bus;d346bus;e:\windows\system32\DRIVERS\d346bus.sys [2004-03-13 156800]
S0 d346prt;d346prt;e:\windows\System32\Drivers\d346prt.sys [2004-03-13 5248]
S3 EraserUtilRebootDrv;EraserUtilRebootDrv;e:\program files\Common Files\Symantec Shared\EENGINE\EraserUtilRebootDrv.sys [2009-03-16 101936]

.
Contents of the 'Scheduled Tasks' folder

2009-05-20 e:\windows\Tasks\User_Feed_Synchronization-{43EF4B1C-9EC7-4625-8362-2420B49D6788}.job
- e:\windows\system32\msfeedssync.exe [2006-10-17 17:58]
.
.
------- Supplementary Scan -------
.
uStart Page = hxxp://att.yahoo.com/
mStart Page = hxxp://www.calvin.edu
IE: E&xport to Microsoft Excel - e:\progra~1\MICROS~2\Office12\EXCEL.EXE/3000
.

**************************************************************************

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2009-05-20 20:48
Windows 5.1.2600 Service Pack 3 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully
hidden files: 0

**************************************************************************
.
--------------------- DLLs Loaded Under Running Processes ---------------------

- - - - - - - > 'explorer.exe'(1460)
e:\progra~1\WINDOW~3\wmpband.dll
e:\windows\system32\WPDShServiceObj.dll
e:\windows\system32\PortableDeviceTypes.dll
e:\windows\system32\hnetcfg.dll
e:\windows\system32\PortableDeviceApi.dll
.
Completion time: 2009-05-21 20:50
ComboFix-quarantined-files.txt 2009-05-21 00:50
ComboFix2.txt 2009-05-02 13:05
ComboFix3.txt 2009-04-28 23:09
ComboFix4.txt 2009-04-28 22:33

Pre-Run: 8,585,625,600 bytes free
Post-Run: 8,788,017,152 bytes free

168 --- E O F --- 2009-04-29 01:48

#10 extremeboy

extremeboy

  • Malware Response Team
  • 12,975 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:09:41 PM

Posted 21 May 2009 - 04:25 PM

Hello.

Combofix was ran way too many times.....

It is also outdated. you should of downloaded a new copy as requested in my previous reply.

Please delete and re-download it to your desktop.

Now run it again.

After that please post the contents of ComboFix-quarantined-files.txt in your C:\Qoobox folder.

With Regards,
Extremeboy
Note: Please do not PM me asking for help, instead please post it in the correct forum requesting for help. Help requests via the PM system will be ignored.

If I'm helping you and I don't reply within 48 hours please feel free to send me a PM.

The help you receive here is always free but if you wish to show your appreciation, you may wish to Posted Image.

#11 gainesdell

gainesdell
  • Topic Starter

  • Members
  • 11 posts
  • OFFLINE
  •  
  • Local time:09:41 PM

Posted 21 May 2009 - 08:02 PM

ComboFix Log.txt:




ComboFix 09-05-21.01 - Phil 05/21/2009 20:45.5 - NTFSx86
Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.1022.507 [GMT -4:00]
Running from: e:\documents and settings\Phil\Desktop\ComboFix.exe
AV: Symantec AntiVirus Corporate Edition *On-access scanning disabled* (Updated) {FB06448E-52B8-493A-90F3-E43226D3305C}
.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.

e:\windows\system32\catsrvp.dll
e:\windows\system32\drivers\chioevzo.sys
e:\windows\system32\drivers\hhbinzmh.sys

.
((((((((((((((((((((((((((((((((((((((( Drivers/Services )))))))))))))))))))))))))))))))))))))))))))))))))
.

-------\Legacy_CHIOEVZO
-------\Service_chioevzo


((((((((((((((((((((((((( Files Created from 2009-04-22 to 2009-05-22 )))))))))))))))))))))))))))))))
.

2009-05-19 23:33 . 2009-05-19 23:33 -------- d-----w e:\documents and settings\Phil\Application Data\Malwarebytes
2009-05-19 23:32 . 2009-04-06 19:32 15504 ----a-w e:\windows\system32\drivers\mbam.sys
2009-05-19 23:32 . 2009-04-06 19:32 38496 ----a-w e:\windows\system32\drivers\mbamswissarmy.sys
2009-05-19 23:32 . 2009-05-19 23:33 -------- d-----w e:\program files\Malwarebytes' Anti-Malware
2009-05-19 23:32 . 2009-05-19 23:32 -------- d-----w e:\documents and settings\All Users\Application Data\Malwarebytes
2009-04-30 23:26 . 2009-04-30 23:28 -------- d-----w e:\program files\GMATPrep

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2009-05-22 00:51 . 2007-09-05 20:29 -------- d-----w e:\program files\Symantec AntiVirus
2009-05-19 23:57 . 2006-11-16 00:32 69232 -c--a-w e:\documents and settings\Phil\Local Settings\Application Data\GDIPFONTCACHEV1.DAT
2009-04-30 23:26 . 2006-11-16 00:39 -------- d--h--w e:\program files\InstallShield Installation Information
2009-04-29 01:48 . 2006-11-16 04:42 -------- d-----w e:\documents and settings\All Users\Application Data\Microsoft Help
2009-04-13 23:08 . 2009-04-13 23:08 -------- d-----w e:\documents and settings\Phil\Application Data\Yahoo!
2009-04-10 15:40 . 2009-04-10 15:40 -------- d-----w e:\program files\Common Files\Real
2009-04-10 15:39 . 2009-04-10 15:39 -------- d-----w e:\program files\Common Files\Merge Modules
2009-04-10 15:39 . 2009-04-10 15:39 -------- d-----w e:\program files\Common Files\Java
2009-04-10 15:39 . 2009-04-10 15:39 -------- d-----w e:\program files\Common Files\InstallShield
2009-04-10 15:34 . 2009-04-10 15:33 -------- d-----w e:\program files\OLYMPUS
2009-04-10 15:31 . 2009-04-10 15:31 -------- d-----w e:\program files\Common Files\xing shared
2009-04-10 15:31 . 2009-04-10 15:31 -------- d-----w e:\program files\Common Files\Wise Installation Wizard
2009-04-10 15:31 . 2009-04-10 15:31 -------- d-----w e:\program files\QuickTime
2009-04-10 15:31 . 2009-04-10 15:31 -------- d-----w e:\program files\D-Tools
2009-04-10 15:30 . 2009-04-10 15:30 -------- d-----w e:\documents and settings\Phil\Application Data\AdobeUM
2009-04-10 15:30 . 2009-04-10 15:30 -------- d-----w e:\documents and settings\Phil\Application Data\Ahead
2009-04-10 15:30 . 2009-04-10 15:30 -------- d-----w e:\documents and settings\Phil\Application Data\Apple Computer
2009-04-10 15:30 . 2009-04-10 15:30 -------- d-----w e:\documents and settings\Phil\Application Data\Azureus
2009-04-10 15:30 . 2009-04-10 15:30 -------- d-----w e:\documents and settings\Phil\Application Data\Leadertech
2009-04-10 15:30 . 2009-04-10 15:30 -------- d-----w e:\documents and settings\Phil\Application Data\InterVideo
2009-04-10 15:30 . 2009-04-10 15:30 -------- d-----w e:\documents and settings\Phil\Application Data\LimeWire
2009-04-10 15:29 . 2009-04-10 15:29 -------- d-----w e:\documents and settings\Phil\Application Data\ParetoLogic
2009-04-10 15:29 . 2009-04-10 15:29 -------- d-----w e:\documents and settings\Phil\Application Data\Talkback
2009-04-10 15:29 . 2009-04-10 15:29 -------- d-----w e:\documents and settings\Phil\Application Data\U3
2009-04-08 02:07 . 2006-11-15 23:09 86327 ----a-w e:\windows\PCHEALTH\HELPCTR\OfflineCache\index.dat
2009-03-06 14:22 . 2001-08-23 12:00 284160 ----a-w e:\windows\system32\pdh.dll
2009-03-03 00:18 . 2004-01-08 20:23 826368 ----a-w e:\windows\system32\wininet.dll
2005-10-12 19:04 . 2005-10-12 19:04 131072 -c--a-w e:\program files\internet explorer\plugins\LV80ActiveXControl.dll
2006-06-07 18:40 . 2006-06-07 18:40 132848 -c--a-w e:\program files\internet explorer\plugins\LV82ActiveXControl.dll
.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"ctfmon.exe"="e:\windows\system32\ctfmon.exe" [2008-04-14 15360]
"OM2_Monitor"="e:\program files\OLYMPUS\OLYMPUS Master 2\MMonitor.exe" [2008-05-15 95536]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"ATIPTA"="e:\program files\ATI Technologies\ATI Control Panel\atiptaxx.exe" [2005-08-06 344064]
"QuickTime Task"="e:\program files\QuickTime\qttask.exe" [2006-09-01 282624]
"HP Component Manager"="e:\program files\HP\hpcoretech\hpcmpmgr.exe" [2003-12-22 241664]
"ccApp"="e:\program files\Common Files\Symantec Shared\ccApp.exe" [2006-07-20 52896]
"vptray"="e:\progra~1\SYMANT~1\VPTray.exe" [2006-08-03 124656]
"Adobe Reader Speed Launcher"="c:\programs\Adobe\Reader\Reader_sl.exe" [2008-01-12 39792]
"Adobe Photo Downloader"="c:\programs\Adobe Photoshop Elements 5.0\apdproxy.exe" [2006-09-14 61440]
"OM2_Monitor"="e:\program files\OLYMPUS\OLYMPUS Master 2\FirstStart.exe" [2008-05-15 54576]
"SigmatelSysTrayApp"="stsystra.exe" - e:\windows\stsystra.exe [2006-02-10 282624]

e:\documents and settings\Phil\Start Menu\Programs\Startup\
OneNote 2007 Screen Clipper and Launcher.lnk - e:\program files\Microsoft Office\Office12\ONENOTEM.EXE [2007-12-7 101440]

e:\documents and settings\All Users\Start Menu\Programs\Startup\
Wireless PCI_CardBus utility V1.01.exe.lnk - e:\program files\Wireless PCI_CardBus utility V1.01\Wireless PCI_CardBus utility V1.01.exe [2007-7-30 913408]

[HKLM\~\startupfolder\E:^Documents and Settings^All Users^Start Menu^Programs^Startup^Adobe Reader Speed Launch.lnk]
path=e:\documents and settings\All Users\Start Menu\Programs\Startup\Adobe Reader Speed Launch.lnk
backup=e:\windows\pss\Adobe Reader Speed Launch.lnkCommon Startup

[HKLM\~\startupfolder\E:^Documents and Settings^All Users^Start Menu^Programs^Startup^Adobe Reader Synchronizer.lnk]
path=e:\documents and settings\All Users\Start Menu\Programs\Startup\Adobe Reader Synchronizer.lnk
backup=e:\windows\pss\Adobe Reader Synchronizer.lnkCommon Startup

[HKLM\~\startupfolder\E:^Documents and Settings^All Users^Start Menu^Programs^Startup^InterVideo WinCinema Manager.lnk]
path=e:\documents and settings\All Users\Start Menu\Programs\Startup\InterVideo WinCinema Manager.lnk
backup=e:\windows\pss\InterVideo WinCinema Manager.lnkCommon Startup

[HKLM\~\startupfolder\E:^Documents and Settings^All Users^Start Menu^Programs^Startup^SnagIt 8.lnk]
path=e:\documents and settings\All Users\Start Menu\Programs\Startup\SnagIt 8.lnk
backup=e:\windows\pss\SnagIt 8.lnkCommon Startup

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecAntiVirus]
"DisableMonitoring"=dword:00000001

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"c:\\Programs\\Azureus\\Azureus.exe"=
"c:\\Programs\\bleep\\LabVIEW.exe"=
"e:\\Program Files\\Microsoft Office\\Office12\\GROOVE.EXE"=
"e:\\Program Files\\Microsoft Office\\Office12\\ONENOTE.EXE"=
"e:\\Program Files\\Microsoft Office\\Office12\\OUTLOOK.EXE"=
"e:\\Program Files\\Common Files\\Ahead\\Nero Web\\SetupX.exe"=
"e:\\WINDOWS\\system32\\sessmgr.exe"=
"%windir%\\system32\\sessmgr.exe"=

R0 d346bus;d346bus;e:\windows\system32\drivers\d346bus.sys [8/15/2007 7:05 PM 156800]
R3 EraserUtilRebootDrv;EraserUtilRebootDrv;e:\program files\Common Files\Symantec Shared\EENGINE\EraserUtilRebootDrv.sys [4/10/2009 11:51 AM 101936]
S0 d344prt;d344prt;e:\windows\system32\Drivers\d344prt.sys --> e:\windows\system32\Drivers\d344prt.sys [?]
S0 d346prt;d346prt;e:\windows\system32\drivers\d346prt.sys [8/15/2007 7:05 PM 5248]
S3 EraserUtilDrvI3;EraserUtilDrvI3;\??\e:\program files\Common Files\Symantec Shared\EENGINE\EraserUtilDrvI3.sys --> e:\program files\Common Files\Symantec Shared\EENGINE\EraserUtilDrvI3.sys [?]
S3 SavRoam;SAVRoam;e:\program files\Symantec AntiVirus\SavRoam.exe [8/3/2006 11:48 AM 115952]

--- Other Services/Drivers In Memory ---

*NewlyCreated* - CHIOEVZO
*Deregistered* - chioevzo
.
Contents of the 'Scheduled Tasks' folder

2009-05-22 e:\windows\Tasks\User_Feed_Synchronization-{43EF4B1C-9EC7-4625-8362-2420B49D6788}.job
- e:\windows\system32\msfeedssync.exe [2006-10-17 17:58]
.
.
------- Supplementary Scan -------
.
uStart Page = hxxp://att.yahoo.com/
mStart Page = hxxp://www.calvin.edu
IE: E&xport to Microsoft Excel - e:\progra~1\MICROS~2\Office12\EXCEL.EXE/3000
.

**************************************************************************

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2009-05-21 20:51
Windows 5.1.2600 Service Pack 3 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully
hidden files: 0

**************************************************************************
.
--------------------- DLLs Loaded Under Running Processes ---------------------

- - - - - - - > 'explorer.exe'(368)
e:\progra~1\WINDOW~3\wmpband.dll
e:\windows\system32\WPDShServiceObj.dll
e:\windows\system32\hnetcfg.dll
e:\windows\system32\PortableDeviceTypes.dll
e:\windows\system32\PortableDeviceApi.dll
.
------------------------ Other Running Processes ------------------------
.
e:\windows\system32\ati2evxx.exe
e:\program files\Common Files\Symantec Shared\ccSetMgr.exe
e:\program files\Common Files\Symantec Shared\ccEvtMgr.exe
e:\program files\Common Files\Symantec Shared\SPBBC\SPBBCSvc.exe
c:\programs\Adobe Photoshop Elements 5.0\PhotoshopElementsFileAgent.exe
e:\program files\Symantec AntiVirus\DefWatch.exe
e:\windows\system32\lkcitdl.exe
e:\windows\system32\lkads.exe
e:\windows\system32\lktsrv.exe
c:\programs\bleep\MAX\nimxs.exe
c:\programs\bleep\Shared\Security\nidmsrv.exe
e:\windows\system32\nisvcloc.exe
c:\programs\bleep\Shared\Tagger\tagsrv.exe
e:\program files\Symantec AntiVirus\Rtvscan.exe
e:\windows\system32\wscntfy.exe
.
**************************************************************************
.
Completion time: 2009-05-22 20:55 - machine was rebooted
ComboFix-quarantined-files.txt 2009-05-22 00:55

Pre-Run: 8,782,540,800 bytes free
Post-Run: 8,700,485,632 bytes free

166 --- E O F --- 2009-04-29 01:48










Quarantined Files:




2009-05-22 00:48:03 . 2009-05-22 00:48:03 6,070 ----a-w E:\Qoobox\Quarantine\Registry_backups\Service_chioevzo.reg.dat
2009-05-22 00:48:03 . 2009-05-22 00:48:03 1,390 ----a-w E:\Qoobox\Quarantine\Registry_backups\Legacy_CHIOEVZO.reg.dat
2009-05-22 00:47:49 . 2009-05-22 00:47:49 6,383 ----a-w E:\Qoobox\Quarantine\Registry_backups\tcpip.reg
2009-05-22 00:47:25 . 2009-05-22 00:47:25 18,210 ----a-w E:\Qoobox\Quarantine\E\WINDOWS\system32\drivers\_hhbinzmh_.sys.zip
2009-05-22 00:47:24 . 2009-05-22 00:47:24 11,438 ----a-w E:\Qoobox\Quarantine\E\WINDOWS\system32\drivers\_chioevzo_.sys.zip
2009-05-22 00:47:24 . 2009-05-22 00:47:24 93,736 ----a-w E:\Qoobox\Quarantine\E\WINDOWS\system32\_catsrvp_.dll.zip
2009-05-22 00:44:11 . 2009-05-22 00:47:25 681 ----a-w E:\Qoobox\Quarantine\catchme.log
2009-04-09 23:48:22 . 2008-04-14 00:11:50 97,792 ----a-w E:\Qoobox\Quarantine\E\WINDOWS\system32\catsrvp.dll.vir
2001-08-23 12:00:00 . 2001-08-23 12:00:00 23,424 ----a-w E:\Qoobox\Quarantine\E\WINDOWS\system32\drivers\chioevzo.sys.vir
2001-08-23 12:00:00 . 2009-05-22 00:47:24 23,424 ----a-w E:\Qoobox\Quarantine\E\WINDOWS\system32\drivers\hhbinzmh.sys.vir

#12 extremeboy

extremeboy

  • Malware Response Team
  • 12,975 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:09:41 PM

Posted 22 May 2009 - 02:33 PM

Hello.

Do the following:

Update and Scan with MalwareBytes Anti-Malware
  • Launch Malwarebytes' Anti-Malware
  • Go to the Update tab
  • Select Check for Update and let MBAM download and install any available updates.
  • After the update is complete go to the Scanner tab.
  • Make sure the "Perform Quick Scan" option is selected.
  • Then click on the Scan button.
  • If asked to select the drives to scan, leave all the drives selected and click on the Start Scan button.
  • The scan will begin and "Scan in progress" will show at the top. It may take some time to complete so please be patient.
  • When the scan is finished, a message box will say "The scan completed successfully. Click 'Show Results' to display all objects found".
  • Click OK to close the message box and continue with the removal process.
  • Back at the main Scanner screen, click on the Show Results button to see a list of any malware that was found.
  • Make sure that everything is checked, and click Remove Selected.
  • When removal is completed, a log report will open in Notepad and you may be prompted to restart your computer. (see Note below)
  • The log is automatically saved and can be viewed by clicking the Logs tab in MBAM.
  • Copy and paste the contents of that report in your next reply and exit MBAM.
Note: If MBAM encounters a file that is difficult to remove, you will be presented with 1 of 2 prompts. Click OK to either and let MBAM proceed with the disinfection process. If asked to restart the computer, please do so immediately. Failure to reboot will prevent MBAM from removing all the malware.

Update Java to Version 6 Update 13

Your Java is out of date. Older versions have vulnerabilities that malicious sites can use to exploit and infect your system. Please follow these steps to remove older version Java components and update:
  • Download the latest version of Java Runtime Environment (JRE) Version 6 and save it to your desktop.
  • Look for "Java Runtime Environment (JRE)" JRE 6 Update 13.
  • Click the Download button to the right.
  • Select your Platform: "Windows".
  • Select your Language: "Multi-language".
  • Read the License Agreement, and then check the box that says: "Accept License Agreement".
  • Click Continue and the page will refresh.
  • Under Required Files, check the box for Windows Offline Installation, click the link below it and save the file to your desktop.
  • Close any programs you may have running - especially your web browser.
Go to Start > Settings > Control Panel, double-click on Add/Remove Programs and remove all older versions of Java.
  • Check (highlight) any item with Java Runtime Environment (JRE or J2SE) in the name.
  • Click the Remove or Change/Remove button and follow the onscreen instructions for the Java uninstaller.
    Repeat as many times as necessary to remove each Java versions.
  • Reboot your computer once all Java components are removed.
  • Then from your desktop double-click on jre-6u13-windows-i586-p.exe to install the newest version.
*If using Windows Vista and the installer refuses to launch due to insufficient user permissions, then Run As Administrator.
** If you choose to update via the Java applet in Control Panel, uncheck the option to install the Toolbar unless you want it.
*** The uninstaller incorporated in this release removes previous Updates 10 and above, but does not remove older versions, so they still need to be removed manually.


Post take a new DDS log afterwards.

Thanks.

~Extremeboy
Note: Please do not PM me asking for help, instead please post it in the correct forum requesting for help. Help requests via the PM system will be ignored.

If I'm helping you and I don't reply within 48 hours please feel free to send me a PM.

The help you receive here is always free but if you wish to show your appreciation, you may wish to Posted Image.

#13 extremeboy

extremeboy

  • Malware Response Team
  • 12,975 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:09:41 PM

Posted 26 May 2009 - 04:36 PM

Hello there.

Are you still with me?
Note: Please do not PM me asking for help, instead please post it in the correct forum requesting for help. Help requests via the PM system will be ignored.

If I'm helping you and I don't reply within 48 hours please feel free to send me a PM.

The help you receive here is always free but if you wish to show your appreciation, you may wish to Posted Image.

#14 gainesdell

gainesdell
  • Topic Starter

  • Members
  • 11 posts
  • OFFLINE
  •  
  • Local time:09:41 PM

Posted 26 May 2009 - 06:24 PM

Yes, I am back...Still here, just gone for a few days. Thank you for staying with me here...I just finished the first task of another MBAM scan (updated). Nothing bad was found, so there was no removing to be done. Here is that log, now I just need to update Java and post another DDS log. Hopefully my next post will be within the hour. thanks again.....

Malwarebytes' Anti-Malware 1.37
Database version: 2182
Windows 5.1.2600 Service Pack 3

5/26/2009 6:27:36 PM
mbam-log-2009-05-26 (18-27-36).txt

Scan type: Quick Scan
Objects scanned: 82462
Time elapsed: 3 minute(s), 45 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 0

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
(No malicious items detected)





more to follow soon after java update.

#15 gainesdell

gainesdell
  • Topic Starter

  • Members
  • 11 posts
  • OFFLINE
  •  
  • Local time:09:41 PM

Posted 26 May 2009 - 06:48 PM

Hello again, the old java should be gone and the new installed. below is a new DDS log. ooooh, hope that didn't need an update too..here it is, please let me know thanks!





DDS (Ver_09-03-16.01) - NTFSx86
Run by Phil at 19:42:55.46 on Tue 05/26/2009
Internet Explorer: 7.0.5730.11
Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.1022.522 [GMT -4:00]

AV: Symantec AntiVirus Corporate Edition *On-access scanning disabled* (Updated)

============== Running Processes ===============

E:\WINDOWS\system32\svchost -k DcomLaunch
svchost.exe
E:\WINDOWS\System32\svchost.exe -k netsvcs
svchost.exe
svchost.exe
E:\Program Files\Common Files\Symantec Shared\ccSetMgr.exe
E:\Program Files\Common Files\Symantec Shared\ccEvtMgr.exe
E:\Program Files\Common Files\Symantec Shared\SPBBC\SPBBCSvc.exe
E:\WINDOWS\system32\spoolsv.exe
svchost.exe
C:\Programs\Adobe Photoshop Elements 5.0\PhotoshopElementsFileAgent.exe
E:\WINDOWS\Explorer.EXE
E:\Program Files\Symantec AntiVirus\DefWatch.exe
E:\WINDOWS\system32\lkcitdl.exe
E:\WINDOWS\system32\lkads.exe
E:\WINDOWS\system32\lktsrv.exe
C:\Programs\bleep\MAX\nimxs.exe
C:\Programs\bleep\Shared\Security\nidmsrv.exe
E:\WINDOWS\system32\nisvcloc.exe
C:\Programs\bleep\Shared\Tagger\tagsrv.exe
E:\WINDOWS\System32\svchost.exe -k imgsvc
E:\Program Files\Symantec AntiVirus\Rtvscan.exe
E:\Program Files\HP\hpcoretech\hpcmpmgr.exe
E:\WINDOWS\stsystra.exe
E:\Program Files\Common Files\Symantec Shared\ccApp.exe
E:\PROGRA~1\SYMANT~1\VPTray.exe
C:\Programs\Adobe Photoshop Elements 5.0\apdproxy.exe
E:\WINDOWS\system32\ctfmon.exe
E:\Program Files\Wireless PCI_CardBus utility V1.01\Wireless PCI_CardBus utility V1.01.exe
E:\WINDOWS\system32\msiexec.exe
E:\Program Files\Java\jre6\bin\jqs.exe
E:\WINDOWS\system32\wscntfy.exe
E:\Documents and Settings\Phil\Desktop\dds.scr

============== Pseudo HJT Report ===============

uStart Page = hxxp://att.yahoo.com/
mStart Page = hxxp://www.calvin.edu
BHO: SnagIt Toolbar Loader: {00c6482d-c502-44c8-8409-fce54ad9c208} - c:\programs\snagit printscreen\SnagItBHO.dll
BHO: Yahoo! Toolbar Helper: {02478d38-c3f9-4efb-9b51-7695eca05670} - e:\program files\yahoo!\companion\installs\cpn\yt.dll
BHO: Adobe PDF Reader Link Helper: {06849e9f-c8d7-4d59-b87d-784b7d6be0b3} - e:\program files\common files\adobe\acrobat\activex\AcroIEHelper.dll
BHO: Groove GFS Browser Helper: {72853161-30c5-4d22-b7f9-0bbc1d38a37e} - e:\progra~1\micros~2\office12\GRA8E1~1.DLL
BHO: Java™ Plug-In 2 SSV Helper: {dbc80044-a445-435b-bc74-9c25c1c588a9} - e:\program files\java\jre6\bin\jp2ssv.dll
BHO: JQSIEStartDetectorImpl Class: {e7e6f031-17ce-4c07-bc86-eabfe594f69c} - e:\program files\java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll
TB: Yahoo! Toolbar: {ef99bd32-c1fb-11d2-892f-0090271d4f88} - e:\program files\yahoo!\companion\installs\cpn\yt.dll
TB: SnagIt: {8ff5e183-abde-46eb-b09e-d2aab95cabe3} - c:\programs\snagit printscreen\SnagItIEAddin.dll
EB: {32683183-48a0-441b-a342-7c2a440a9478} - No File
uRun: [ctfmon.exe] e:\windows\system32\ctfmon.exe
uRun: [OM2_Monitor] "e:\program files\olympus\olympus master 2\MMonitor.exe" -NoStart
mRun: [ATIPTA] "e:\program files\ati technologies\ati control panel\atiptaxx.exe"
mRun: [QuickTime Task] "e:\program files\quicktime\qttask.exe" -atboottime
mRun: [HP Component Manager] "e:\program files\hp\hpcoretech\hpcmpmgr.exe"
mRun: [SigmatelSysTrayApp] stsystra.exe
mRun: [ccApp] "e:\program files\common files\symantec shared\ccApp.exe"
mRun: [vptray] e:\progra~1\symant~1\VPTray.exe
mRun: [Adobe Reader Speed Launcher] "c:\programs\adobe\reader\Reader_sl.exe"
mRun: [Adobe Photo Downloader] "c:\programs\adobe photoshop elements 5.0\apdproxy.exe"
mRun: [OM2_Monitor] "e:\program files\olympus\olympus master 2\FirstStart.exe" /OM
mRun: [SunJavaUpdateSched] "e:\program files\java\jre6\bin\jusched.exe"
StartupFolder: e:\docume~1\phil\startm~1\programs\startup\onenot~1.lnk - e:\program files\microsoft office\office12\ONENOTEM.EXE
StartupFolder: e:\docume~1\alluse~1\startm~1\programs\startup\wirele~1.lnk - e:\program files\wireless pci_cardbus utility v1.01\Wireless PCI_CardBus utility V1.01.exe
IE: E&xport to Microsoft Excel - e:\progra~1\micros~2\office12\EXCEL.EXE/3000
IE: {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe
IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - e:\program files\messenger\msmsgs.exe
IE: {2670000A-7350-4f3c-8081-5663EE0C6C49} - {48E73304-E1D6-4330-914C-F5F514E3486C} - e:\progra~1\micros~2\office12\ONBttnIE.dll
IE: {92780B25-18CC-41C8-B9BE-3C9C571A8263} - {FF059E31-CC5A-4E2E-BF3B-96E929D65503} - e:\progra~1\micros~2\office12\REFIEBAR.DLL
DPF: {02BF25D5-8C17-4B23-BC80-D3488ABDDC6B} - hxxp://www.apple.com/qtactivex/qtplugin.cab
DPF: {0CCA191D-13A6-4E29-B746-314DEE697D83} - hxxp://upload.facebook.com/controls/2008.10.10_v5.5.8/FacebookPhotoUploader5.cab
DPF: {17492023-C23A-453E-A040-C7C580BBF700} - hxxp://download.microsoft.com/download/3/9/8/398422c0-8d3e-40e1-a617-af65a72a0465/LegitCheckControl.cab
DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_13-windows-i586.cab
DPF: {CAFEEFAC-0016-0000-0013-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_13-windows-i586.cab
DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_13-windows-i586.cab
DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} - hxxp://fpdownload.macromedia.com/get/flashplayer/current/swflash.cab
DPF: {EDFCB7CB-942C-4822-AF14-F0B687409848} - hxxp://www.prolabexpress.com/ImageUploader4.cab
Handler: cetihpz - {CF184AD3-CDCB-4168-A3F7-8E447D129300} - e:\program files\hp\hpcoretech\comp\hpuiprot.dll
Handler: grooveLocalGWS - {88FED34C-F0CA-4636-A375-3CB6248B04CD} - e:\progra~1\micros~2\office12\GR99D3~1.DLL
Notify: NavLogon - e:\windows\system32\NavLogon.dll
SSODL: WPDShServiceObj - {AAA288BA-9A4C-45B0-95D7-94D524869DB5} - e:\windows\system32\WPDShServiceObj.dll
SEH: Groove GFS Stub Execution Hook: {b5a7f190-dda6-4420-b3ba-52453494e6cd} - e:\progra~1\micros~2\office12\GRA8E1~1.DLL

============= SERVICES / DRIVERS ===============

R0 d346bus;d346bus;e:\windows\system32\drivers\d346bus.sys [2007-8-15 156800]
R0 d346prt;d346prt;e:\windows\system32\drivers\d346prt.sys [2007-8-15 5248]
R1 SAVRT;SAVRT;e:\program files\symantec antivirus\savrt.sys [2005-12-19 337592]
R1 SAVRTPEL;SAVRTPEL;e:\program files\symantec antivirus\Savrtpel.sys [2005-12-19 54968]
R2 ccEvtMgr;Symantec Event Manager;e:\program files\common files\symantec shared\ccEvtMgr.exe [2006-7-19 192160]
R2 ccSetMgr;Symantec Settings Manager;e:\program files\common files\symantec shared\ccSetMgr.exe [2006-7-19 169632]
R2 Symantec AntiVirus;Symantec AntiVirus;e:\program files\symantec antivirus\Rtvscan.exe [2006-8-3 1807600]
R3 EraserUtilRebootDrv;EraserUtilRebootDrv;e:\program files\common files\symantec shared\eengine\EraserUtilRebootDrv.sys [2009-4-10 101936]
R3 NAVENG;NAVENG;e:\progra~1\common~1\symant~1\virusd~1\20090524.003\naveng.sys [2009-5-24 89104]
R3 NAVEX15;NAVEX15;e:\progra~1\common~1\symant~1\virusd~1\20090524.003\navex15.sys [2009-5-24 876144]
S0 d344prt;d344prt;e:\windows\system32\drivers\d344prt.sys --> e:\windows\system32\drivers\d344prt.sys [?]
S3 EraserUtilDrvI3;EraserUtilDrvI3;\??\e:\program files\common files\symantec shared\eengine\eraserutildrvi3.sys --> e:\program files\common files\symantec shared\eengine\EraserUtilDrvI3.sys [?]
S3 SavRoam;SAVRoam;e:\program files\symantec antivirus\SavRoam.exe [2006-8-3 115952]

=============== Created Last 30 ================

2009-05-26 19:40 410,984 a------- e:\windows\system32\deploytk.dll
2009-05-26 19:40 73,728 a------- e:\windows\system32\javacpl.cpl
2009-05-21 20:45 161,792 a------- e:\windows\SWREG.exe
2009-05-21 20:45 130,048 a------- e:\windows\PEV.exe
2009-05-21 20:45 98,816 a------- e:\windows\sed.exe
2009-05-19 19:33 <DIR> --d----- e:\docume~1\phil\applic~1\Malwarebytes
2009-05-19 19:32 19,096 a------- e:\windows\system32\drivers\mbam.sys
2009-05-19 19:32 40,160 a------- e:\windows\system32\drivers\mbamswissarmy.sys
2009-05-19 19:32 <DIR> --d----- e:\program files\Malwarebytes' Anti-Malware
2009-05-19 19:32 <DIR> --d----- e:\docume~1\alluse~1\applic~1\Malwarebytes
2009-04-30 19:26 <DIR> --d----- e:\program files\GMATPrep

==================== Find3M ====================

2009-04-07 22:07 86,327 a------- e:\windows\pchealth\helpctr\offlinecache\index.dat
2009-03-06 10:22 284,160 a------- e:\windows\system32\pdh.dll
2009-03-02 20:18 826,368 a------- e:\windows\system32\wininet.dll

============= FINISH: 19:43:25.18 ===============





Please let me know if you need the attach.txt attached.

Thank you




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users