Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

win32.TDSS.rtk/possible Virtumonde infection


  • Please log in to reply
10 replies to this topic

#1 NateH

NateH

  • Members
  • 6 posts
  • OFFLINE
  •  
  • Local time:09:10 AM

Posted 17 May 2009 - 11:09 PM

I have not been infected by any viruses in almost 4 years. My knowledge in computers is decent.
I have installed just about every virus scanner out there and still remain infected.
The first program I ran was spybot which found virtmonde. After using Avg, Windows Live One care, and Kaspersky I'm not showing an infection from that any more.
I thought I was good but whenever I do a google search sometimes clicking on a result I get redirected to some random pop-up like website or I get a pop-up saying I'm infected by a virus but its obvious the trojan itself is doing it.
It is very odd behavior though and usually only happens when I look for something related to the virus. For example when I first searched for tdss.rtk one of the results linked to this website.
But when I clicked on it I was redirected to some website asking for my credit card.
At this point spybot is the only program that finds anything, which is funny because the ones you are supposed to pay $50 find nothing.
But of course when it removes it the trojan it just comes back.

So at this point I'm not sure what to do so here is my HJT log. I hope someone can help me.

Much appreciated,
Nate

EDIT: I ran a program called malwarebyte's antimalware, it found 16 infections. I removed them but I still get the google redirect. New HJT and DDS log uploaded.


DDS (Ver_09-05-14.01) - NTFSx86
Run by Nathan at 0:38:17.87 on Mon 05/18/2009
Internet Explorer: 7.0.5730.11
Microsoft Windows XP Home Edition 5.1.2600.3.1252.1.1033.18.3071.2486 [GMT -4:00]


============== Running Processes ===============

C:\WINDOWS\system32\nvsvc32.exe
C:\WINDOWS\system32\svchost -k DcomLaunch
svchost.exe
C:\WINDOWS\System32\svchost.exe -k netsvcs
C:\WINDOWS\system32\svchost.exe -k WudfServiceGroup
svchost.exe
C:\WINDOWS\system32\spoolsv.exe
svchost.exe
C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
C:\Program Files\Bonjour\mDNSResponder.exe
C:\WINDOWS\system32\PnkBstrA.exe
C:\WINDOWS\system32\PnkBstrB.exe
C:\WINDOWS\system32\svchost.exe -k imgsvc
C:\Program Files\Linksys Wireless-G PCI Wireless Network Monitor\WLService.exe
C:\Program Files\Linksys Wireless-G PCI Wireless Network Monitor\WMP54Gv4.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\System32\svchost.exe -k HTTPFilter
C:\Program Files\Logitech\GamePanel Software\LCD Manager\LCDMon.exe
C:\Program Files\Logitech\GamePanel Software\LCD Manager\Applets\LCDClock.exe
C:\WINDOWS\system32\RUNDLL32.EXE
C:\Program Files\Logitech\GamePanel Software\LCD Manager\Applets\LCDMedia.exe
C:\WINDOWS\RTHDCPL.EXE
C:\Program Files\iTunes\iTunesHelper.exe
C:\Program Files\Messenger\msmsgs.exe
C:\Documents and Settings\Nathan\Local Settings\Application Data\Google\Update\GoogleUpdate.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Logitech\SetPoint\SetPoint.exe
C:\Program Files\Common Files\Logishrd\KHAL2\KHALMNPR.EXE
C:\Program Files\iPod\bin\iPodService.exe
svchost.exe
C:\Program Files\Mozilla Firefox\firefox.exe
C:\Documents and Settings\Nathan\My Documents\dds.scr

============== Pseudo HJT Report ===============

uInternet Settings,ProxyOverride = *.local
BHO: Adobe PDF Reader Link Helper: {06849e9f-c8d7-4d59-b87d-784b7d6be0b3} - c:\program files\common files\adobe\acrobat\activex\AcroIEHelper.dll
BHO: Spybot-S&D IE Protection: {53707962-6f74-2d53-2644-206d7942484f} - c:\progra~1\spybot~1\SDHelper.dll
BHO: {7E853D72-626A-48EC-A868-BA8D5E23E045} - No File
BHO: Windows Live Sign-in Helper: {9030d464-4c02-4abf-8ecc-5164760863c6} - c:\program files\common files\microsoft shared\windows live\WindowsLiveLogin.dll
BHO: {b747e4af-6a94-45ed-b172-d65f295d15fe} - No File
uRun: [MSMSGS] "c:\program files\messenger\msmsgs.exe" /background
uRun: [Google Update] "c:\documents and settings\nathan\local settings\application data\google\update\GoogleUpdate.exe" /c
uRun: [ctfmon.exe] c:\windows\system32\ctfmon.exe
mRun: [RivaTunerStartupDaemon] "c:\program files\rivatuner v2.24\RivaTuner.exe" /S
mRun: [QuickTime Task] "c:\program files\quicktime\QTTask.exe" -atboottime
mRun: [Logitech Hardware Abstraction Layer] KHALMNPR.EXE
mRun: [Launch LCDMon] "c:\program files\logitech\gamepanel software\lcd manager\LCDMon.exe"
mRun: [Kernel and Hardware Abstraction Layer] KHALMNPR.EXE
mRun: [AppleSyncNotifier] c:\program files\common files\apple\mobile device support\bin\AppleSyncNotifier.exe
mRun: [NvCplDaemon] RUNDLL32.EXE c:\windows\system32\NvCpl.dll,NvStartup
mRun: [NvMediaCenter] RUNDLL32.EXE c:\windows\system32\NvMcTray.dll,NvTaskbarInit
mRun: [nwiz] nwiz.exe /install
mRun: [RTHDCPL] RTHDCPL.EXE
mRun: [iTunesHelper] "c:\program files\itunes\iTunesHelper.exe"
StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\logite~1.lnk - c:\program files\logitech\setpoint\SetPoint.exe
IE: {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe
IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe
IE: {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - {53707962-6F74-2D53-2644-206D7942484F} - c:\progra~1\spybot~1\SDHelper.dll
DPF: {17492023-C23A-453E-A040-C7C580BBF700} - hxxp://download.microsoft.com/download/9/b/d/9bdc68ef-6a9f-4505-8fb8-d0d2d160e512/LegitCheckControl.cab
DPF: {20A60F0D-9AFA-4515-A0FD-83BD84642501} - hxxp://messenger.zone.msn.com/binary/msgrchkr.cab56986.cab
DPF: {5C051655-FCD5-4969-9182-770EA5AA5565} - hxxp://messenger.zone.msn.com/binary/SolitaireShowdown.cab56986.cab
DPF: {5D6F45B3-9043-443D-A792-115447494D24} - hxxp://messenger.zone.msn.com/DE-DE/a-UNO1/GAME_UNO1.cab
DPF: {5ED80217-570B-4DA9-BF44-BE107C0EC166} - hxxp://cdn.scan.onecare.live.com/resource/download/scanner/wlscbase5483.cab
DPF: {8FFBE65D-2C9C-4669-84BD-5829DC0B603C} - hxxp://fpdownload.macromedia.com/get/flashplayer/current/ultrashim.cab
DPF: {C3F79A2B-B9B4-4A66-B012-3EE46475B072} - hxxp://messenger.zone.msn.com/binary/MessengerStatsPAClient.cab56907.cab
DPF: {E6BB2089-163F-466B-812A-748096614DFD} - hxxp://cainternetsecurity.net/scanner/cascanner.cab
Notify: LBTWlgn - c:\program files\common files\logishrd\bluetooth\LBTWlgn.dll
AppInit_DLLs: c:\windows\system32\ c:\windows\system32\rufupiba.dll,c:\windows\system32\
SSODL: WPDShServiceObj - {AAA288BA-9A4C-45B0-95D7-94D524869DB5} - c:\windows\system32\WPDShServiceObj.dll
LSA: Notification Packages = scecli c:\windows\system32\junefare.dll

================= FIREFOX ===================

FF - ProfilePath - c:\docume~1\nathan\applic~1\mozilla\firefox\profiles\da0j8rfn.default\
FF - plugin: c:\documents and settings\nathan\application data\mozilla\firefox\profiles\da0j8rfn.default\extensions\moveplayer@movenetworks.com\platform\winnt_x86-msvc\plugins\npmnqmp071101000055.dll
FF - plugin: c:\documents and settings\nathan\local settings\application data\google\update\1.2.145.5\npGoogleOneClick8.dll
FF - plugin: c:\program files\download manager\npfpdlm.dll

============= SERVICES / DRIVERS ===============

R4 kl1;Kl1;c:\windows\system32\drivers\kl1.sys --> c:\windows\system32\drivers\kl1.sys [?]
R4 klbg;Kaspersky Lab Boot Guard Driver;c:\windows\system32\drivers\klbg.sys --> c:\windows\system32\drivers\klbg.sys [?]
R4 KLIF;Kaspersky Lab Driver;c:\windows\system32\drivers\klif.sys --> c:\windows\system32\drivers\klif.sys [?]
S2 Ca533av;Mega DV(Video);c:\windows\system32\drivers\ca533av.sys --> c:\windows\system32\drivers\Ca533av.sys [?]
S3 Ambfilt;Ambfilt;c:\windows\system32\drivers\Ambfilt.sys [2009-4-9 1684736]
S3 m4301a;Linksys Wireless-B USB Network Adapter v4.0 Driver;c:\windows\system32\drivers\m4301A.sys [2007-6-1 83552]
S3 USBCamera;DSC Still Image Capture (CA533A);c:\windows\system32\drivers\bulk533.sys --> c:\windows\system32\drivers\Bulk533.sys [?]

=============== Created Last 30 ================

2009-05-18 00:16 <DIR> --d----- c:\docume~1\nathan\applic~1\Malwarebytes
2009-05-18 00:16 15,504 a------- c:\windows\system32\drivers\mbam.sys
2009-05-18 00:16 38,496 a------- c:\windows\system32\drivers\mbamswissarmy.sys
2009-05-18 00:16 <DIR> --d----- c:\program files\Malwarebytes' Anti-Malware
2009-05-18 00:16 <DIR> --d----- c:\docume~1\alluse~1\applic~1\Malwarebytes
2009-05-17 18:57 <DIR> --d----- c:\docume~1\alluse~1\applic~1\Kaspersky Lab Setup Files
2009-05-17 17:39 <DIR> --d----- c:\program files\Lavasoft
2009-05-17 17:39 <DIR> --d----- c:\program files\Trend Micro
2009-05-17 17:25 <DIR> --d----- c:\docume~1\alluse~1\applic~1\CA
2009-05-17 02:56 1,168 a------- c:\windows\wininit.ini
2009-05-13 00:15 <DIR> --d----- c:\program files\NVIDIA Corporation
2009-04-22 00:20 14,311,680 a------- c:\windows\system32\xlive.dll
2009-04-22 00:20 13,642,496 a------- c:\windows\system32\xlivefnt.dll
2009-04-22 00:19 172,173 a------- c:\windows\system32\xlive.dll.cat

==================== Find3M ====================

2009-04-27 00:42 457,248 a------- c:\windows\system32\NVUNINST.EXE
2009-04-06 21:30 9,986,048 a------- c:\windows\system32\nvoglnt.dll
2009-04-06 21:30 8,030,624 a------- c:\windows\system32\drivers\nv4_mini.sys
2009-04-06 21:30 5,882,496 a------- c:\windows\system32\nv4_disp.dll
2009-04-06 21:30 1,720,320 a------- c:\windows\system32\nvcuda.dll
2009-04-06 21:30 1,502,234 a------- c:\windows\system32\nvdata.bin
2009-04-06 21:30 1,310,720 a------- c:\windows\system32\nvcuvenc.dll
2009-04-06 21:30 802,816 a------- c:\windows\system32\nvapi.dll
2009-04-06 21:30 659,456 a------- c:\windows\system32\nvcuvid.dll
2009-04-06 21:30 453,152 a------- c:\windows\system32\nvudisp.exe
2009-04-06 21:30 139,264 a------- c:\windows\system32\nvcodins.dll
2009-04-06 21:30 139,264 a------- c:\windows\system32\nvcod.dll
2009-03-30 11:13 5,063,168 a------- c:\windows\system32\drivers\RtkHDAud.sys
2009-03-27 05:22 17,567,744 a------- c:\windows\RTHDCPL.EXE
2009-03-19 16:32 23,400 a------- c:\windows\system32\drivers\GEARAspiWDM.sys
2009-03-17 08:07 122,880 a------- c:\windows\RtkAudioService.exe
2009-03-17 07:58 540,672 a------- c:\windows\RtlExUpd.dll
2009-03-17 06:44 36,352 a------- c:\windows\system32\RtkCoInstXP.dll
2009-03-10 08:32 2,168,320 a------- c:\windows\MicCal.exe
2009-03-06 10:22 284,160 a------- c:\windows\system32\pdh.dll
2009-03-05 23:59 1,900,544 a------- c:\windows\system32\usbaaplrc.dll
2009-03-02 20:18 826,368 a------- c:\windows\system32\wininet.dll
2009-03-02 05:14 57,344 a------- c:\windows\ALCMTR.EXE
2009-02-20 23:42 201,352 a------- c:\windows\system32\PnkBstrB.exe
2009-02-20 14:09 78,336 a------- c:\windows\system32\ieencode.dll
2008-12-23 13:42 22,328 a------- c:\docume~1\nathan\applic~1\PnkBstrK.sys
2008-07-09 22:09 23 a------- c:\documents and settings\nathan\jagex_runescape_preferences.dat
2004-04-21 10:38 446,464 a------- c:\program files\HPUSBFW.EXE
2003-11-13 12:00 450,560 a------- c:\program files\HPUSBF.EXE
2008-05-31 04:33 32,768 a--sh--- c:\windows\system32\config\systemprofile\local settings\history\history.ie5\mshist012008053120080601\index.dat

============= FINISH: 0:38:37.81 ===============

Attached Files


Edited by NateH, 17 May 2009 - 11:44 PM.


BC AdBot (Login to Remove)

 


#2 NateH

NateH
  • Topic Starter

  • Members
  • 6 posts
  • OFFLINE
  •  
  • Local time:09:10 AM

Posted 17 May 2009 - 11:53 PM

Here was my log from malwarebytes (again it no longer finds anything):

Malwarebytes' Anti-Malware 1.36
Database version: 2146
Windows 5.1.2600 Service Pack 3

5/18/2009 12:22:10 AM
mbam-log-2009-05-18 (00-22-10).txt

Scan type: Quick Scan
Objects scanned: 76079
Time elapsed: 3 minute(s), 53 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 1
Registry Values Infected: 10
Registry Data Items Infected: 1
Folders Infected: 1
Files Infected: 2

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\dslcnnct (Trojan.Vundo) -> Quarantined and deleted successfully.

Registry Values Infected:
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\spybotdeletingb4675 (Trojan.TDSS) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\spybotdeletingd2537 (Trojan.TDSS) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\spybotdeletinga1340 (Trojan.TDSS) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\spybotdeletingc5453 (Trojan.TDSS) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\spybotdeletingb5722 (Trojan.TDSS) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\spybotdeletingd2199 (Trojan.TDSS) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\spybotdeletinga552 (Trojan.TDSS) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\spybotdeletingc4896 (Trojan.TDSS) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler\{ec43e3fd-5c60-46a6-97d7-e0b85dbdd6c4} (Trojan.BHO) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\ssodl (Trojan.BHO) -> Quarantined and deleted successfully.

Registry Data Items Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\UpdatesDisableNotify (Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.

Folders Infected:
C:\Documents and Settings\Nathan\Application Data\ptidle (Trojan.Downloader) -> Quarantined and deleted successfully.

Files Infected:
C:\WINDOWS\system32\ovfsthejirucnqnljuwjiiywedyutfqeorjlgy.dll (Trojan.TDSS) -> Delete on reboot.
C:\WINDOWS\system32\ovfsthkujxerwncnulfpckhmmehxprulhbaqgi.dll (Trojan.TDSS) -> Delete on reboot.

#3 Buckeye_Sam

Buckeye_Sam

    Malware Expert


  • Members
  • 17,382 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Pickerington, Ohio
  • Local time:08:10 AM

Posted 19 May 2009 - 04:27 PM

Hello! :thumbup2:
My name is Sam and I will be helping you.

In order to see what's going on with your computer I'll ask for you to post various logs from the tools that we will use to resolve your issue. Please also share with me any information about how your computer is reacting and behaving each step of the way as we work through this process.



Please download ComboFix from one of these locations:

Link 1
Link 2
Link 3

Important!
You should NOT use Combofix unless you have been instructed to do so by a Malware Removal Expert.
It is intended by its creator to be used under the guidance and supervision of an Malware Removal Expert, not for private use.
Using this tool incorrectly could lead to disastrous problems with your operating system such as preventing it from ever starting again.



Make sure that you save ComboFix.exe to your Desktop
  • Disable your AntiVirus and AntiSpyware applications, usually via a right click on the System Tray icon. They may otherwise interfere with our tools

  • Double click on ComboFix.exe & follow the prompts.

  • As part of it's process, ComboFix will check to see if the Microsoft Windows Recovery Console is installed. With malware infections being as they are today, it's strongly recommended to have this pre-installed on your machine before doing any malware removal. It will allow you to boot up into a special recovery/repair mode that will allow us to more easily help you should your computer have a problem after an attempted removal of malware.

  • Follow the prompts to allow ComboFix to download and install the Microsoft Windows Recovery Console, and when prompted, agree to the End-User License Agreement to install the Microsoft Windows Recovery Console.
**Please note: If the Microsoft Windows Recovery Console is already installed, ComboFix will continue it's malware removal procedures.


Posted Image


Once the Microsoft Windows Recovery Console is installed using ComboFix, you should see the following message:

Posted Image


Click on Yes, to continue scanning for malware.

When finished, it shall produce a log for you. Please include the C:\ComboFix.txt in your next reply.
Posted Image If I have helped you in any way, please consider a donation to help me continue the fight against malware.


Failing to respond back to the person that is giving up their own time to help you not only is insensitive and disrespectful, but it guarantees that you will never receive help from me again. Please thank your helpers and there will always be help here when you need it!


========================================================

#4 NateH

NateH
  • Topic Starter

  • Members
  • 6 posts
  • OFFLINE
  •  
  • Local time:09:10 AM

Posted 19 May 2009 - 05:08 PM

Thank you sir.
I ran combo fix and here is the log attached.


ComboFix 09-05-19.04 - Nathan 05/19/2009 17:57.1 - NTFSx86
Microsoft Windows XP Home Edition 5.1.2600.3.1252.1.1033.18.3071.2552 [GMT -4:00]
Running from: c:\documents and settings\Nathan\My Documents\ComboFix.exe
.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.

c:\windows\system32\drivers\ovfsthnjntjixbfdhbodbfrtqhbedupqhotmsv.sys
c:\windows\system32\ovfsthejirucnqnljuwjiiywedyutfqeorjlgy.dll
c:\windows\system32\ovfsthkujxerwncnulfpckhmmehxprulhbaqgi.dll
c:\windows\system32\ovfsthkujxerwncnulfpckhmmehxprulhbaqgi.dll_old
c:\windows\system32\ovfsthkvtqlvuoyxyjgpppxlqgcgeufvsbhpxk.dll
c:\windows\system32\ovfsthwsdqbpqlujfgeieblyybagrhonudxuka.dat
c:\windows\system32\ovfsthxvekqpibonvvcqomjmxvuekoqampjyhh.dat

.
((((((((((((((((((((((((( Files Created from 2009-04-19 to 2009-05-19 )))))))))))))))))))))))))))))))
.

2009-05-18 04:16 . 2009-05-18 04:16 -------- d-----w c:\documents and settings\Nathan\Application Data\Malwarebytes
2009-05-18 04:16 . 2009-04-06 19:32 15504 ----a-w c:\windows\system32\drivers\mbam.sys
2009-05-18 04:16 . 2009-04-06 19:32 38496 ----a-w c:\windows\system32\drivers\mbamswissarmy.sys
2009-05-18 04:16 . 2009-05-18 04:16 -------- d-----w c:\documents and settings\All Users\Application Data\Malwarebytes
2009-05-18 04:16 . 2009-05-18 04:16 -------- d-----w c:\program files\Malwarebytes' Anti-Malware
2009-05-17 22:57 . 2009-05-17 22:57 -------- d-----w c:\documents and settings\All Users\Application Data\Kaspersky Lab Setup Files
2009-05-17 21:39 . 2009-05-18 00:59 -------- d-----w c:\program files\Lavasoft
2009-05-17 21:39 . 2009-05-17 22:07 -------- d-----w c:\documents and settings\All Users\Application Data\Lavasoft
2009-05-17 21:39 . 2009-05-17 21:39 -------- d-----w c:\program files\Trend Micro
2009-05-17 21:25 . 2009-05-17 21:25 -------- d-----w c:\documents and settings\All Users\Application Data\CA
2009-05-17 07:46 . 2009-05-17 18:12 -------- d-----w c:\program files\Windows Live Safety Center
2009-05-13 04:15 . 2009-05-13 04:15 -------- d-----w c:\program files\NVIDIA Corporation
2009-05-05 03:54 . 2009-05-05 03:54 98928 ----a-w c:\documents and settings\LocalService\Local Settings\Application Data\FontCache3.0.0.0.dat
2009-04-22 04:20 . 2009-04-22 04:20 14311680 ----a-w c:\windows\system32\xlive.dll
2009-04-22 04:20 . 2009-04-22 04:20 13642496 ----a-w c:\windows\system32\xlivefnt.dll

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2009-05-19 04:28 . 2007-06-03 02:47 -------- d-----w c:\program files\Trillian
2009-05-18 03:27 . 2007-06-03 23:56 -------- d-----w c:\program files\Spybot - Search & Destroy
2009-05-17 23:59 . 2007-06-10 08:26 -------- d-----w c:\program files\Java
2009-05-01 03:19 . 2007-06-04 07:53 -------- d-----w c:\program files\World of Warcraft
2009-04-27 04:42 . 2009-04-10 00:49 457248 ----a-w c:\windows\system32\NVUNINST.EXE
2009-04-17 22:07 . 2009-04-17 22:07 -------- d-----w c:\program files\iTunes
2009-04-17 22:07 . 2009-04-17 22:07 -------- d-----w c:\program files\iPod
2009-04-17 22:07 . 2008-08-07 05:25 -------- d-----w c:\program files\Common Files\Apple
2009-04-17 07:15 . 2009-04-17 07:15 -------- d-----w c:\program files\oZone3D
2009-04-11 05:57 . 2007-06-02 21:13 -------- d-----w c:\program files\EA GAMES
2009-04-11 05:55 . 2007-06-03 01:15 -------- d-----w c:\program files\Common Files\Wise Installation Wizard
2009-04-10 00:59 . 2009-04-10 00:59 -------- d-----w c:\program files\RivaTuner v2.24
2009-04-10 00:58 . 2007-06-01 14:22 40320 ----a-w c:\documents and settings\Nathan\Local Settings\Application Data\GDIPFONTCACHEV1.DAT
2009-04-10 00:54 . 2009-04-10 00:54 -------- d-----w c:\program files\Realtek
2009-04-09 23:53 . 2009-04-09 23:53 -------- d-----w c:\program files\Electronic Arts
2009-04-07 01:30 . 2009-04-10 00:49 453152 ----a-w c:\windows\system32\nvudisp.exe
2009-04-07 01:30 . 2009-04-10 00:48 9986048 ----a-w c:\windows\system32\nvoglnt.dll
2009-04-07 01:30 . 2009-04-10 00:48 8030624 ----a-w c:\windows\system32\drivers\nv4_mini.sys
2009-04-07 01:30 . 2009-04-10 00:48 802816 ----a-w c:\windows\system32\nvapi.dll
2009-04-07 01:30 . 2009-04-10 00:48 5882496 ----a-w c:\windows\system32\nv4_disp.dll
2009-04-07 01:30 . 2009-04-10 00:48 1720320 ----a-w c:\windows\system32\nvcuda.dll
2009-04-07 01:30 . 2009-04-10 00:48 1502234 ----a-w c:\windows\system32\nvdata.bin
2009-04-07 01:30 . 2009-04-10 00:48 139264 ----a-w c:\windows\system32\nvcodins.dll
2009-04-07 01:30 . 2009-04-10 00:48 139264 ----a-w c:\windows\system32\nvcod.dll
2009-04-07 01:30 . 2009-04-10 00:48 1310720 ----a-w c:\windows\system32\nvcuvenc.dll
2009-04-07 01:30 . 2009-02-16 00:36 659456 ----a-w c:\windows\system32\nvcuvid.dll
2009-03-30 15:13 . 2009-04-10 00:54 5063168 ----a-w c:\windows\system32\drivers\RtkHDAud.sys
2009-03-27 09:22 . 2009-04-10 00:54 17567744 ----a-w c:\windows\RTHDCPL.EXE
2009-03-24 03:42 . 2009-03-24 03:42 -------- d-----w c:\program files\VideoLAN
2009-03-24 03:41 . 2008-02-16 07:41 -------- d-----w c:\program files\DivX
2009-03-24 03:41 . 2009-03-24 03:41 -------- d-----w c:\program files\Common Files\DivX Shared
2009-03-22 00:48 . 2007-06-03 01:17 -------- d-----w c:\program files\Download Manager
2009-03-19 20:32 . 2008-01-29 16:01 23400 ----a-w c:\windows\system32\drivers\GEARAspiWDM.sys
2009-03-17 12:07 . 2009-04-10 00:54 122880 ----a-w c:\windows\RtkAudioService.exe
2009-03-17 11:58 . 2009-04-10 00:54 540672 ----a-w c:\windows\RtlExUpd.dll
2009-03-17 10:44 . 2009-04-10 00:54 36352 ----a-w c:\windows\system32\RtkCoInstXP.dll
2009-03-10 12:32 . 2009-04-10 00:54 2168320 ----a-w c:\windows\MicCal.exe
2009-03-06 14:22 . 2004-08-04 12:00 284160 ----a-w c:\windows\system32\pdh.dll
2009-03-06 03:59 . 2009-03-16 05:58 1900544 ----a-w c:\windows\system32\usbaaplrc.dll
2009-03-06 03:59 . 2008-08-07 05:25 36864 ----a-w c:\windows\system32\drivers\usbaapl.sys
2009-03-03 00:18 . 2004-08-04 12:00 826368 ----a-w c:\windows\system32\wininet.dll
2009-03-02 09:14 . 2009-04-10 00:54 57344 ----a-w c:\windows\ALCMTR.EXE
2009-02-21 03:42 . 2007-06-22 04:33 140216 ----a-w c:\windows\system32\drivers\PnkBstrK.sys
2009-02-21 03:42 . 2007-06-22 04:29 201352 ----a-w c:\windows\system32\PnkBstrB.exe
2009-02-20 18:09 . 2004-08-04 12:00 78336 ----a-w c:\windows\system32\ieencode.dll
2004-04-21 14:38 . 2007-09-17 00:41 446464 ----a-w c:\program files\HPUSBFW.EXE
2003-11-13 16:00 . 2007-09-17 00:41 450560 ----a-w c:\program files\HPUSBF.EXE
2009-01-27 01:34 . 2009-01-27 01:34 1044480 ----a-w c:\program files\mozilla firefox\plugins\libdivx.dll
2009-01-27 01:34 . 2009-01-27 01:34 200704 ----a-w c:\program files\mozilla firefox\plugins\ssldivx.dll
.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"MSMSGS"="c:\program files\Messenger\msmsgs.exe" [2008-04-14 1695232]
"Google Update"="c:\documents and settings\Nathan\Local Settings\Application Data\Google\Update\GoogleUpdate.exe" [2008-10-02 133104]
"ctfmon.exe"="c:\windows\system32\ctfmon.exe" [2008-04-14 15360]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"RivaTunerStartupDaemon"="c:\program files\RivaTuner v2.24\RivaTuner.exe" [2009-02-25 2781184]
"QuickTime Task"="c:\program files\QuickTime\QTTask.exe" [2009-01-05 413696]
"Launch LCDMon"="c:\program files\Logitech\GamePanel Software\LCD Manager\LCDMon.exe" [2007-07-17 1687824]
"AppleSyncNotifier"="c:\program files\Common Files\Apple\Mobile Device Support\bin\AppleSyncNotifier.exe" [2009-03-06 177472]
"NvCplDaemon"="c:\windows\system32\NvCpl.dll" [2009-04-07 13750272]
"NvMediaCenter"="c:\windows\system32\NvMcTray.dll" [2009-04-07 86016]
"iTunesHelper"="c:\program files\iTunes\iTunesHelper.exe" [2009-04-02 342312]
"Logitech Hardware Abstraction Layer"="KHALMNPR.EXE" - c:\windows\KHALMNPR.Exe [2008-02-29 76304]
"Kernel and Hardware Abstraction Layer"="KHALMNPR.EXE" - c:\windows\KHALMNPR.Exe [2008-02-29 76304]
"nwiz"="nwiz.exe" - c:\windows\system32\nwiz.exe [2009-04-07 1657376]
"RTHDCPL"="RTHDCPL.EXE" - c:\windows\RTHDCPL.EXE [2009-03-27 17567744]

c:\documents and settings\All Users\Start Menu\Programs\Startup\
Logitech SetPoint.lnk - c:\program files\Logitech\SetPoint\SetPoint.exe [2008-10-12 805392]

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\LBTWlgn]
2008-05-02 06:42 72208 ----a-w c:\program files\Common Files\Logishrd\Bluetooth\LBTWLgn.dll

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\WdfLoadGroup]
@=""

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\services]
"JavaQuickStarterService"=2 (0x2)
"idsvc"=3 (0x3)
"WMPNetworkSvc"=3 (0x3)
"WLSetupSvc"=3 (0x3)
"usnjsvc"=3 (0x3)
"LBTServ"=3 (0x3)
"iPod Service"=3 (0x3)

[HKEY_LOCAL_MACHINE\software\microsoft\security center]
"AntiVirusOverride"=dword:00000001
"FirewallOverride"=dword:00000001

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"c:\\Program Files\\EA GAMES\\Battlefield 2\\BF2.exe"=
"c:\\WINDOWS\\system32\\pnkbstra.exe"=
"c:\\WINDOWS\\system32\\PnkBstrB.exe"=
"c:\\Program Files\\uTorrent\\uTorrent.exe"=
"c:\\Program Files\\Windows Live\\Messenger\\msnmsgr.exe"=
"c:\\Program Files\\Windows Live\\Messenger\\livecall.exe"=
"e:\\COD\\iw3mp.exe"=
"e:\\GTA\\Rockstar Games Social Club\\RGSCLauncher.exe"=
"e:\\GTA\\Grand Theft Auto IV\\LaunchGTAIV.exe"=
"c:\\Program Files\\Bonjour\\mDNSResponder.exe"=
"c:\\Program Files\\EA GAMES\\Mirror's Edge\\Binaries\\MirrorsEdge.exe"=
"c:\\Program Files\\iTunes\\iTunes.exe"=

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\GloballyOpenPorts\List]
"16167:TCP"= 16167:TCP:BitComet 16167 TCP
"16167:UDP"= 16167:UDP:BitComet 16167 UDP

S2 Ca533av;Mega DV(Video);c:\windows\system32\Drivers\Ca533av.sys --> c:\windows\system32\Drivers\Ca533av.sys [?]
S3 Ambfilt;Ambfilt;c:\windows\system32\drivers\Ambfilt.sys [4/9/2009 8:54 PM 1684736]
S3 m4301a;Linksys Wireless-B USB Network Adapter v4.0 Driver;c:\windows\system32\drivers\m4301A.sys [6/1/2007 10:08 AM 83552]
S3 USBCamera;DSC Still Image Capture (CA533A);c:\windows\system32\Drivers\Bulk533.sys --> c:\windows\system32\Drivers\Bulk533.sys [?]

--- Other Services/Drivers In Memory ---

*NewlyCreated* - GTNDIS5

[HKEY_LOCAL_MACHINE\software\microsoft\active setup\installed components\{DCEF9ECF-DB04-E099-CEA0-A4D10005B009}]
c:\windows\system32\My_Server.exe
.
Contents of the 'Scheduled Tasks' folder

2008-09-12 c:\windows\Tasks\AppleSoftwareUpdate.job
- c:\program files\Apple Software Update\SoftwareUpdate.exe [2008-04-11 16:34]

2009-05-19 c:\windows\Tasks\GoogleUpdateTaskUserS-1-5-21-861567501-682003330-725345543-1004.job
- c:\documents and settings\Nathan\Local Settings\Application Data\Google\Update\GoogleUpdate.exe [2008-10-02 20:43]
.
- - - - ORPHANS REMOVED - - - -

BHO-{b747e4af-6a94-45ed-b172-d65f295d15fe} - (no file)


.
------- Supplementary Scan -------
.
uInternet Settings,ProxyOverride = *.local
DPF: {E6BB2089-163F-466B-812A-748096614DFD} - hxxp://cainternetsecurity.net/scanner/cascanner.cab
FF - ProfilePath - c:\documents and settings\Nathan\Application Data\Mozilla\Firefox\Profiles\da0j8rfn.default\
FF - plugin: c:\documents and settings\Nathan\Application Data\Mozilla\Firefox\Profiles\da0j8rfn.default\extensions\moveplayer@movenetworks.com\platform\WINNT_x86-msvc\plugins\npmnqmp071101000055.dll
FF - plugin: c:\documents and settings\Nathan\Local Settings\Application Data\Google\Update\1.2.145.5\npGoogleOneClick8.dll
FF - plugin: c:\program files\Download Manager\npfpdlm.dll
.

**************************************************************************

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2009-05-19 18:00
Windows 5.1.2600 Service Pack 3 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully
hidden files: 0

**************************************************************************
.
--------------------- LOCKED REGISTRY KEYS ---------------------

[HKEY_USERS\S-1-5-21-861567501-682003330-725345543-1004\Software\SecuROM\!CAUTION! NEVER A OR CHANGE ANY KEY*]
"??"=hex:7e,8c,f1,f6,15,9c,40,a9,91,c4,cc,c5,93,ce,09,2c,aa,f6,4f,bb,3e,e2,04,
47,61,0f,f9,cd,c3,d8,51,db,3e,4a,a3,cc,c9,bc,55,c7,4a,60,ac,0b,4e,a6,49,3c,\
"??"=hex:25,65,bb,27,8b,92,55,34,10,3f,d9,49,2f,0e,31,37

[HKEY_USERS\S-1-5-21-861567501-682003330-725345543-1004\Software\SecuROM\License information*]
"datasecu"=hex:4e,d2,34,c0,fa,dc,77,03,83,7a,e6,b4,de,2a,08,b9,85,ee,b4,29,09,
ef,01,9a,45,41,d1,18,d5,ea,f3,3a,7a,c0,8f,cd,99,65,66,61,d1,71,85,d5,86,b1,\
"rkeysecu"=hex:61,44,9b,84,2c,7f,58,42,51,32,11,df,66,71,1d,a2
.
--------------------- DLLs Loaded Under Running Processes ---------------------

- - - - - - - > 'winlogon.exe'(572)
c:\program files\common files\logishrd\bluetooth\LBTWlgn.dll
c:\program files\common files\logishrd\bluetooth\LBTServ.dll

- - - - - - - > 'explorer.exe'(2832)
c:\program files\Logitech\SetPoint\GameHook.dll
c:\program files\Logitech\SetPoint\lgscroll.dll
c:\windows\system32\WPDShServiceObj.dll
c:\program files\WinSCP\DragExt.dll
c:\windows\system32\PortableDeviceTypes.dll
c:\windows\system32\PortableDeviceApi.dll
.
------------------------ Other Running Processes ------------------------
.
c:\windows\system32\nvsvc32.exe
c:\program files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
c:\program files\Bonjour\mDNSResponder.exe
c:\windows\system32\PnkBstrA.exe
c:\windows\system32\PnkBstrB.exe
c:\program files\Linksys Wireless-G PCI Wireless Network Monitor\WLService.exe
c:\program files\Linksys Wireless-G PCI Wireless Network Monitor\WMP54Gv4.exe
c:\program files\Logitech\GamePanel Software\LCD Manager\Applets\LCDClock.exe
c:\windows\system32\rundll32.exe
c:\program files\Common Files\Logishrd\KHAL2\KHALMNPR.exe
c:\program files\iPod\bin\iPodService.exe
c:\program files\iTunes\iTunes.exe
c:\program files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceHelper.exe
c:\program files\Common Files\Apple\Mobile Device Support\bin\distnoted.exe
c:\program files\Common Files\Apple\Mobile Device Support\bin\SyncServer.exe
.
**************************************************************************
.
Completion time: 2009-05-19 18:04 - machine was rebooted
ComboFix-quarantined-files.txt 2009-05-19 22:04

Pre-Run: 12,412,968,960 bytes free
Post-Run: 12,337,049,600 bytes free

224 --- E O F --- 2009-05-17 00:13

Attached Files


Edited by Buckeye_Sam, 20 May 2009 - 11:21 AM.


#5 Buckeye_Sam

Buckeye_Sam

    Malware Expert


  • Members
  • 17,382 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Pickerington, Ohio
  • Local time:08:10 AM

Posted 20 May 2009 - 11:23 AM

Please update Malwarebytes and run a full scan.
  • Open Malwarebytes and select the Update tab.
  • Click on the Check for Updates button and allow the program to download the latest updates.
  • Once you have the latest updates, select the Scanner tab.
  • Select "Perform full scan" and click the Scan button.
  • If asked to select the drives to scan, leave all the drives selected and click on the Start Scan button.
  • The scan will begin and "Scan in progress" will show at the top. It may take some time to complete so please be patient.
  • When the scan is finished, a message box will say "The scan completed successfully. Click 'Show Results' to display all objects found".
  • Click OK to close the message box and continue with the removal process.
  • Back at the main Scanner screen, click on the Show Results button to see a list of any malware that was found.
  • Make sure that everything is checked, and click Remove Selected.
  • When removal is completed, a log report will open in Notepad and you may be prompted to restart your computer. (see Note below)
  • The log is automatically saved and can be viewed by clicking the Logs tab in MBAM.
  • Copy and paste the contents of that report in your next reply and exit MBAM.
Note: If MBAM encounters a file that is difficult to remove, you will be presented with 1 of 2 prompts. Click OK to either and let MBAM proceed with the disinfection process. If asked to restart the computer, please do so immediately. Failure to reboot will prevent MBAM from removing all the malware.


How is your computer behaving now?
Posted Image If I have helped you in any way, please consider a donation to help me continue the fight against malware.


Failing to respond back to the person that is giving up their own time to help you not only is insensitive and disrespectful, but it guarantees that you will never receive help from me again. Please thank your helpers and there will always be help here when you need it!


========================================================

#6 NateH

NateH
  • Topic Starter

  • Members
  • 6 posts
  • OFFLINE
  •  
  • Local time:09:10 AM

Posted 20 May 2009 - 03:31 PM

It found and cleaned 10 infections. I cleaned them up but I still have the problem where google pages are getting hijacked.
Here is the log:

Malwarebytes' Anti-Malware 1.36
Database version: 2159
Windows 5.1.2600 Service Pack 3

5/20/2009 4:23:26 PM
mbam-log-2009-05-20 (16-23-26).txt

Scan type: Full Scan (C:\|E:\|)
Objects scanned: 161061
Time elapsed: 40 minute(s), 49 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 10

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
C:\Qoobox\Quarantine\C\WINDOWS\system32\ovfsthejirucnqnljuwjiiywedyutfqeorjlgy.dll.vir (Trojan.TDSS) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\system32\ovfsthkujxerwncnulfpckhmmehxprulhbaqgi.dll.vir (Trojan.TDSS) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\system32\ovfsthkvtqlvuoyxyjgpppxlqgcgeufvsbhpxk.dll.vir (Trojan.TDSS) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\system32\drivers\ovfsthnjntjixbfdhbodbfrtqhbedupqhotmsv.sys.vir (Trojan.TDSS) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{5ED7E53F-0FC2-4A8E-AA20-386E718F3FA2}\RP731\A0159062.sys (Trojan.TDSS) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{5ED7E53F-0FC2-4A8E-AA20-386E718F3FA2}\RP731\A0159063.dll (Trojan.TDSS) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{5ED7E53F-0FC2-4A8E-AA20-386E718F3FA2}\RP731\A0159064.dll (Trojan.TDSS) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{5ED7E53F-0FC2-4A8E-AA20-386E718F3FA2}\RP731\A0159065.dll (Trojan.TDSS) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{5ED7E53F-0FC2-4A8E-AA20-386E718F3FA2}\RP731\A0159168.dll (Trojan.TDSS) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{5ED7E53F-0FC2-4A8E-AA20-386E718F3FA2}\RP731\A0159169.dll (Trojan.TDSS) -> Quarantined and deleted successfully.

Edited by NateH, 20 May 2009 - 03:32 PM.


#7 Buckeye_Sam

Buckeye_Sam

    Malware Expert


  • Members
  • 17,382 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Pickerington, Ohio
  • Local time:08:10 AM

Posted 20 May 2009 - 03:41 PM

Please download GooredFix and save it to your Desktop. Double-click Goored.exe to run it. Select 1. Find Goored (no fix) by typing 1 and pressing Enter. A log will open, please post the contents of that log in your next reply (it can also be found on your desktop, called Goored.txt). Note: Do not run Option #2 yet.
Posted Image If I have helped you in any way, please consider a donation to help me continue the fight against malware.


Failing to respond back to the person that is giving up their own time to help you not only is insensitive and disrespectful, but it guarantees that you will never receive help from me again. Please thank your helpers and there will always be help here when you need it!


========================================================

#8 NateH

NateH
  • Topic Starter

  • Members
  • 6 posts
  • OFFLINE
  •  
  • Local time:09:10 AM

Posted 20 May 2009 - 04:56 PM

Heres what it got:

GooredFix v1.92 by jpshortstuff
Log created at 17:55 on 20/05/2009 running Option #1 (Nathan)
Firefox version 3.0.10 (en-US)

=====Suspect Goored Entries=====

C:\Program Files\Mozilla Firefox\extensions\{1C170B74-D539-47EF-89A9-AA9C54879BBC}

=====Dumping Registry Values=====

[HKEY_LOCAL_MACHINE\SOFTWARE\Mozilla\Mozilla Firefox 3.0.10\extensions]
"Plugins"="C:\Program Files\Mozilla Firefox\plugins"

[HKEY_LOCAL_MACHINE\SOFTWARE\Mozilla\Mozilla Firefox 3.0.10\extensions]
"Components"="C:\Program Files\Mozilla Firefox\components"

#9 Buckeye_Sam

Buckeye_Sam

    Malware Expert


  • Members
  • 17,382 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Pickerington, Ohio
  • Local time:08:10 AM

Posted 20 May 2009 - 06:56 PM

Please double-click Goored.exe on your Desktop to run it. Select 2. Fix Goored by typing 2 and pressing Enter. Make sure all instances of Firefox are closed at this point. Type y at the prompt and press Enter again. A log will open, please post the contents of that log in your next reply (it can also be found on your desktop, called Goored.txt)

How is your computer behaving now?
Posted Image If I have helped you in any way, please consider a donation to help me continue the fight against malware.


Failing to respond back to the person that is giving up their own time to help you not only is insensitive and disrespectful, but it guarantees that you will never receive help from me again. Please thank your helpers and there will always be help here when you need it!


========================================================

#10 NateH

NateH
  • Topic Starter

  • Members
  • 6 posts
  • OFFLINE
  •  
  • Local time:09:10 AM

Posted 21 May 2009 - 12:48 AM

Thee problem seems gone. Here is the log:

GooredFix v1.92 by jpshortstuff
Log created at 01:04 on 21/05/2009 running Option #2 (Nathan)
Firefox version 3.0.10 (en-US)

=====Goored Deletions=====
C:\Program Files\Mozilla Firefox\extensions\{1C170B74-D539-47EF-89A9-AA9C54879BBC}
->Backing up folder... Done.
->Emptying folder... Done.
->Deleting folder... Done.

=====Dumping Registry Values=====

[HKEY_LOCAL_MACHINE\SOFTWARE\Mozilla\Mozilla Firefox 3.0.10\extensions]
"Plugins"="C:\Program Files\Mozilla Firefox\plugins"

[HKEY_LOCAL_MACHINE\SOFTWARE\Mozilla\Mozilla Firefox 3.0.10\extensions]
"Components"="C:\Program Files\Mozilla Firefox\components"

#11 Buckeye_Sam

Buckeye_Sam

    Malware Expert


  • Members
  • 17,382 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Pickerington, Ohio
  • Local time:08:10 AM

Posted 21 May 2009 - 09:15 AM

Excellent! :)



We need to remove Combofix now that we're done with it.
  • Click START then RUN
  • Now type Combofix /u in the runbox and click OK

  • Posted Image



==================



Now that you are clean, please follow these simple steps in order to keep your computer clean and secure:
  • Disable and Enable System Restore. - If you are using Windows ME or XP then you should disable and reenable system restore to make sure there are no infected files found in a restore point left over from what we have just cleaned.

    You can find instructions on how to enable and reenable system restore here:

    Windows XP System Restore Guide

    Renable system restore with instructions from tutorial above

  • Make your Internet Explorer more secure - This can be done by following these simple instructions:
    • From within Internet Explorer click on the Tools menu and then click on Options.
    • Click once on the Security tab
    • Click once on the Internet icon so it becomes highlighted.
    • Click once on the Custom Level button.
      • Change the Download signed ActiveX controls to Prompt
      • Change the Download unsigned ActiveX controls to Disable
      • Change the Initialize and script ActiveX controls not marked as safe to Disable
      • Change the Installation of desktop items to Prompt
      • Change the Launching programs and files in an IFRAME to Prompt
      • Change the Navigate sub-frames across different domains to Prompt
      • When all these settings have been made, click on the OK button.
      • If it prompts you as to whether or not you want to save the settings, press the Yes button.
    • Next press the Apply button and then the OK to exit the Internet Properties page.
  • Use an AntiVirus Software - It is very important that your computer has an anti-virus software running on your machine. This alone can save you a lot of trouble with malware in the future.

    See this link for a listing of some online & their stand-alone antivirus programs:

    Virus, Spyware, and Malware Protection and Removal Resources

  • Update your AntiVirus Software - It is imperitive that you update your Antivirus software at least once a week (Even more if you wish). If you do not update your antivirus software then it will not be able to catch any of the new variants that may come out.

  • Use a Firewall - I can not stress how important it is that you use a Firewall on your computer. Without a firewall your computer is succeptible to being hacked and taken over. I am very serious about this and see it happen almost every day with my clients. Simply using a Firewall in its default configuration can lower your risk greatly.

    For a tutorial on Firewalls and a listing of some available ones see the link below:

    Understanding and Using Firewalls

  • Visit Microsoft's Windows Update Site Frequently - It is important that you visit http://www.windowsupdate.com regularly. This will ensure your computer has always the latest security updates available installed on your computer. If there are new updates to install, install them immediately, reboot your computer, and revisit the site until there are no more critical updates.

  • Install Spybot - Search and Destroy - Install and download Spybot - Search and Destroy with its TeaTimer option. This will provide realtime spyware & hijacker protection on your computer alongside your virus protection. You should also scan your computer with program on a regular basis just as you would an antivirus software.

    A tutorial on installing & using this product can be found here:

    Using Spybot - Search & Destroy to remove Spyware , Malware, and Hijackers

  • Install Ad-Aware - Install and download Ad-Aware. ou should also scan your computer with program on a regular basis just as you would an antivirus software in conjunction with Spybot.

    A tutorial on installing & using this product can be found here:

    Using Ad-aware to remove Spyware, Malware, & Hijackers from Your Computer

  • Install SpywareBlaster - SpywareBlaster will added a large list of programs and sites into your Internet Explorer settings that will protect you from running and downloading known malicious programs.

    A tutorial on installing & using this product can be found here:

    Using SpywareBlaster to protect your computer from Spyware and Malware

  • Update all these programs regularly - Make sure you update all the programs I have listed regularly. Without regular updates you WILL NOT be protected when new malicious programs are released.
Follow this list and your potential for being infected again will reduce dramatically.

:thumbup2: :step4:
Posted Image If I have helped you in any way, please consider a donation to help me continue the fight against malware.


Failing to respond back to the person that is giving up their own time to help you not only is insensitive and disrespectful, but it guarantees that you will never receive help from me again. Please thank your helpers and there will always be help here when you need it!


========================================================




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users