Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Unknown malware problem ( SSDT hooks )


  • Please log in to reply
11 replies to this topic

#1 Kenny Brb

Kenny Brb

  • Members
  • 11 posts
  • OFFLINE
  •  
  • Local time:11:27 PM

Posted 18 June 2009 - 07:02 PM

Hello!

I have been redirected here by Blade Zephon about an issue detailed explanation about it you can find here: http://www.bleepingcomputer.com/forums/ind...p;#entry1304779

In short, some SSDT hooks are found in my system, and no scanner seems to find anything suspicious.

I am pasting the DDS log (and attaching the attach.txt file) generated, hope you can give me any hint how should i proceed.

Thanks in advance!


DDS (Ver_09-05-14.01) - NTFSx86
Run by gbromov at 2:51:37,71 on 19.06.2009 Ј.
Internet Explorer: 8.0.6001.18702
Microsoft Windows XP Professional 5.1.2600.3.1251.359.1033.18.2046.1162 [GMT 3:00]

AV: ESET NOD32 Antivirus 4.0 *On-access scanning disabled* (Updated) {E5E70D32-0101-4F12-8FB0-D96ACA4F34C0}

============== Running Processes ===============

C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\system32\svchost -k DcomLaunch
svchost.exe
C:\WINDOWS\System32\svchost.exe -k netsvcs
svchost.exe
svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\system32\Ati2evxx.exe
svchost.exe
C:\WINDOWS\system32\agrsmsvc.exe
C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
C:\Program Files\Bonjour\mDNSResponder.exe
C:\Program Files\ESET\ESET NOD32 Antivirus\ekrn.exe
C:\Program Files\Google\Update\GoogleUpdate.exe
C:\Program Files\Raxco\PerfectDisk10\PDAgent.exe
C:\Program Files\Microsoft\Search Enhancement Pack\SeaPort\SeaPort.exe
C:\WINDOWS\system32\svchost.exe -k imgsvc
C:\Program Files\Toshiba\Bluetooth Toshiba Stack\TosBtSrv.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\Common Files\Real\Update_OB\realsched.exe
C:\Program Files\ESET\ESET NOD32 Antivirus\egui.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Toshiba\Bluetooth Toshiba Stack\TosBtMng.exe
C:\Program Files\TOSHIBA\Bluetooth Monitor\BtMon2.exe
C:\Program Files\Toshiba\Bluetooth Toshiba Stack\TosA2dp.exe
C:\Program Files\Toshiba\Bluetooth Toshiba Stack\TosBtHid.exe
C:\Program Files\Toshiba\Bluetooth Toshiba Stack\TosBtHsp.exe
C:\Program Files\Toshiba\Bluetooth Toshiba Stack\TosAVRC.exe
C:\Program Files\Mozilla Firefox\firefox.exe
C:\Program Files\Toshiba\Bluetooth Toshiba Stack\tosOBEX.exe
C:\Program Files\Toshiba\Bluetooth Toshiba Stack\TosBtBty.exe
C:\Program Files\Toshiba\Bluetooth Toshiba Stack\tosBtProc.exe
C:\WINDOWS\System32\svchost.exe -k HTTPFilter
C:\WINDOWS\system32\wuauclt.exe
C:\WINDOWS\system32\wscntfy.exe
C:\Documents and Settings\gbromov\Desktop\dds.scr

============== Pseudo HJT Report ===============

mLocal Page = about:blank
uInternet Connection Wizard,ShellNext = iexplore
uInternet Settings,ProxyOverride = *.local
BHO: Adobe PDF Link Helper: {18df081c-e8ad-4283-a596-fa578c2ebdc3} - c:\program files\common files\adobe\acrobat\activex\AcroIEHelperShim.dll
BHO: RealPlayer Download and Record Plugin for Internet Explorer: {3049c3e9-b461-4bc5-8870-4c09146192ca} - c:\program files\real\realplayer\rpbrowserrecordplugin.dll
BHO: {5C255C8A-E604-49b4-9D64-90988571CECB} - No File
BHO: Search Helper: {6ebf7485-159f-4bff-a14f-b9e3aac4465b} - c:\program files\microsoft\search enhancement pack\search helper\SEPsearchhelperie.dll
BHO: Windows Live Sign-in Helper: {9030d464-4c02-4abf-8ecc-5164760863c6} - c:\program files\common files\microsoft shared\windows live\WindowsLiveLogin.dll
BHO: Windows Live Toolbar Helper: {e15a8dc0-8516-42a1-81ea-dc94ec1acf10} - c:\program files\windows live\toolbar\wltcore.dll
TB: &Windows Live Toolbar: {21fa44ef-376d-4d53-9b0f-8a89d3229068} - c:\program files\windows live\toolbar\wltcore.dll
uRun: [ctfmon.exe] c:\windows\system32\ctfmon.exe
mRun: [TkBellExe] "c:\program files\common files\real\update_ob\realsched.exe" -osboot
mRun: [Adobe Reader Speed Launcher] "c:\program files\adobe\reader 9.0\reader\Reader_sl.exe"
mRun: [egui] "c:\program files\eset\eset nod32 antivirus\egui.exe" /hide /waitservice
dRun: [CTFMON.EXE] c:\windows\system32\CTFMON.EXE
StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\blueto~2.lnk - c:\program files\toshiba\bluetooth toshiba stack\TosBtMng.exe
StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\blueto~1.lnk - c:\program files\toshiba\bluetooth monitor\BtMon2.exe
IE: &D&ownload &with BitComet - c:\program files\bitcomet\BitComet.exe/AddLink.htm
IE: &D&ownload all video with BitComet - c:\program files\bitcomet\BitComet.exe/AddVideo.htm
IE: &D&ownload all with BitComet - c:\program files\bitcomet\BitComet.exe/AddAllLink.htm
IE: E&xport to Microsoft Excel - c:\progra~1\micros~3\office12\EXCEL.EXE/3000
IE: {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe
IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe
IE: {219C3416-8CB2-491a-A3C7-D9FCDDC9D600} - {5F7B1267-94A9-47F5-98DB-E99415F33AEC} - c:\program files\windows live\writer\WriterBrowserExtension.dll
IE: {92780B25-18CC-41C8-B9BE-3C9C571A8263} - {FF059E31-CC5A-4E2E-BF3B-96E929D65503} - c:\progra~1\micros~3\office12\REFIEBAR.DLL
DPF: {5ED80217-570B-4DA9-BF44-BE107C0EC166} - hxxp://cdn.scan.onecare.live.com/resource/download/scanner/wlscbase1140.cab
DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} - hxxp://www.update.microsoft.com/windowsupdate/v6/V5Controls/en/x86/client/wuweb_site.cab?1218913547250
DPF: {AA07EBD2-EBDD-4BD6-9F8F-114BD513492C} - hxxp://disteng.nefficient.com/disteng/neffy/NeffyLauncher.cab
Notify: !SASWinLogon - c:\program files\superantispyware\SASWINLO.dll
Notify: AtiExtEvent - Ati2evxx.dll
SSODL: WPDShServiceObj - {AAA288BA-9A4C-45B0-95D7-94D524869DB5} - c:\windows\system32\WPDShServiceObj.dll
SEH: SABShellExecuteHook Class: {5ae067d3-9afb-48e0-853a-ebb7f4a000da} - c:\program files\superantispyware\SASSEH.DLL

================= FIREFOX ===================

FF - ProfilePath - c:\docume~1\gbromov\applic~1\mozilla\firefox\profiles\if4c9iv5.default\
FF - prefs.js: browser.search.selectedEngine - Google
FF - prefs.js: browser.startup.homepage - hxxp://en-US.start2.mozilla.com/firefox?client=firefox-a&rls=org.mozilla:en-US:official
FF - prefs.js: keyword.URL - about:neterror?e=query&u=
FF - component: c:\program files\real\realplayer\browserrecord\components\nprpbrowserrecordplugin.dll
FF - plugin: c:\program files\google\update\1.2.145.5\npGoogleOneClick8.dll
FF - plugin: c:\program files\microsoft\office live\npOLW.dll
FF - plugin: c:\program files\windows live\photo gallery\NPWLPG.dll

============= SERVICES / DRIVERS ===============

R1 ehdrv;ehdrv;c:\windows\system32\drivers\ehdrv.sys [2009-4-9 107256]
R1 epfwtdir;epfwtdir;c:\windows\system32\drivers\epfwtdir.sys [2009-4-9 94360]
R1 SASDIFSV;SASDIFSV;c:\program files\superantispyware\sasdifsv.sys [2009-5-26 9968]
R1 SASKUTIL;SASKUTIL;c:\program files\superantispyware\SASKUTIL.SYS [2009-5-26 72944]
R2 ekrn;ESET Service;c:\program files\eset\eset nod32 antivirus\ekrn.exe [2009-4-9 731840]
R2 fssfltr;FssFltr;c:\windows\system32\drivers\fssfltr_tdi.sys [2009-5-11 55152]
R2 SeaPort;SeaPort;c:\program files\microsoft\search enhancement pack\seaport\SeaPort.exe [2009-5-19 240512]
R3 AtiHdmiService;ATI Function Driver for HDMI Service;c:\windows\system32\drivers\AtiHdmi.sys [2008-5-21 93696]
R3 WSIMD;wsimd Service;c:\windows\system32\drivers\wsimd.sys [2008-8-16 57408]
S1 mferkdk;VSCore mferkdk;\??\c:\program files\mcafee\virusscan enterprise\mferkdk.sys --> c:\program files\mcafee\virusscan enterprise\mferkdk.sys [?]
S2 gupdate1c9ede861e4b486;Google Update Service (gupdate1c9ede861e4b486);c:\program files\google\update\GoogleUpdate.exe [2009-6-15 133104]
S3 EBKTNPH;EBKTNPH;c:\docume~1\gbromov\locals~1\temp\ebktnph.exe --> c:\docume~1\gbromov\locals~1\temp\EBKTNPH.exe [?]
S3 fsssvc;Windows Live Family Safety;c:\program files\windows live\family safety\fsssvc.exe [2009-2-6 533360]
S3 rkhdrv40;Rootkit Unhooker Driver; [x]
S3 SASENUM;SASENUM;c:\program files\superantispyware\SASENUM.SYS [2009-5-26 7408]
S3 u2kg54;BUFFALO WLI-U2-KG54 Wireless LAN Adapter Service;c:\windows\system32\drivers\rt2500usb.sys [2008-8-24 139904]
S3 XDva189;XDva189;\??\c:\windows\system32\xdva189.sys --> c:\windows\system32\XDva189.sys [?]
S4 msvsmon80;Visual Studio 2005 Remote Debugger;c:\program files\microsoft visual studio 8\common7\ide\remote debugger\x86\msvsmon.exe [2006-12-2 2805000]

=============== Created Last 30 ================

2009-06-18 13:41 <DIR> --d----- c:\windows\system32\KB905474
2009-06-18 03:51 <DIR> --d----- c:\docume~1\alluse~1\applic~1\SUPERAntiSpyware.com
2009-06-18 03:51 <DIR> --d----- c:\program files\SUPERAntiSpyware
2009-06-18 03:51 <DIR> --d----- c:\docume~1\gbromov\applic~1\SUPERAntiSpyware.com
2009-06-18 03:29 38,160 a------- c:\windows\system32\drivers\mbamswissarmy.sys
2009-06-18 03:29 19,096 a------- c:\windows\system32\drivers\mbam.sys
2009-06-18 02:32 <DIR> --d----- c:\program files\ESET
2009-06-18 01:50 578,560 ac------ c:\windows\system32\dllcache\user32.dll
2009-06-18 01:47 <DIR> --d----- c:\windows\ERUNT
2009-06-18 00:07 <DIR> --d----- c:\docume~1\gbromov\applic~1\Malwarebytes
2009-06-18 00:07 <DIR> --d----- c:\program files\Malwarebytes' Anti-Malware
2009-06-18 00:07 <DIR> --d----- c:\docume~1\alluse~1\applic~1\Malwarebytes
2009-06-17 23:14 <DIR> --dshr-- C:\cmdcons
2009-06-17 23:14 <DIR> --d----- c:\windows\setup.pss
2009-06-17 23:14 <DIR> --d----- c:\windows\setupupd
2009-06-16 21:01 <DIR> --d----- c:\program files\NewtonSDK
2009-06-15 23:47 118,784 a------- c:\windows\SeaMonkeyUninstall.exe
2009-06-15 23:47 118,784 a------- c:\windows\GREUninstall.exe
2009-06-15 23:47 8,653 a------- c:\windows\mozver.dat
2009-06-15 23:46 <DIR> --d----- c:\program files\mozilla.org
2009-06-15 21:13 <DIR> --d----- c:\docume~1\alluse~1\applic~1\Kaspersky Lab Setup Files
2009-06-15 04:50 <DIR> --d----- c:\program files\common files\xing shared
2009-06-13 18:26 69,632 a------- c:\windows\system32\drivers\SKYNETjbnreemx.sys.vir
2009-06-12 00:21 <DIR> --d----- c:\docume~1\alluse~1\applic~1\FarmFrenzy2
2009-06-12 00:21 <DIR> --d----- c:\windows\Farm Frenzy 2
2009-06-12 00:21 <DIR> --d----- c:\program files\Farm Frenzy 2
2009-06-09 21:52 246,272 -c------ c:\windows\system32\dllcache\ieproxy.dll
2009-06-09 21:52 12,800 -c------ c:\windows\system32\dllcache\xpshims.dll
2009-06-08 00:21 <DIR> --d----- c:\docume~1\gbromov\applic~1\Octoshape
2009-06-03 21:19 <DIR> --d----- c:\program files\DAEMON Tools Toolbar
2009-05-28 00:42 <DIR> --dsh--- c:\documents and settings\gbromov\PrivacIE
2009-05-28 00:41 <DIR> --dsh--- c:\documents and settings\gbromov\IETldCache
2009-05-28 00:37 <DIR> --d----- c:\windows\ie8updates
2009-05-28 00:37 102,912 -c------ c:\windows\system32\dllcache\iecompat.dll
2009-05-28 00:35 <DIR> -cd-h--- c:\windows\ie8
2009-05-23 15:00 29,101 a------- c:\windows\scunin.dat
2009-05-23 15:00 70,656 a------- c:\windows\ScUnin.exe
2009-05-23 15:00 967 a------- c:\windows\ScUnin.pif

==================== Find3M ====================

2009-06-02 22:38 721,904 a------- c:\windows\system32\drivers\sptd.sys
2009-05-13 08:15 915,456 a------- c:\windows\system32\wininet.dll
2009-05-10 20:40 0 a---h--- c:\windows\system32\drivers\Msft_Kernel_SynTP_01007.Wdf
2009-05-10 20:40 0 a---h--- c:\windows\system32\drivers\MsftWdf_Kernel_01007_Coinstaller_Critical.Wdf
2009-05-07 18:32 345,600 a------- c:\windows\system32\localspl.dll
2009-05-07 01:25 177,024 a------- c:\windows\system32\psloglist.exe
2009-05-07 01:25 381,824 a------- c:\windows\system32\psexec.exe
2009-05-01 13:54 231,176 a------- c:\windows\system32\PDBoot.exe
2009-04-23 11:22 141,568 a------- c:\windows\system32\drivers\Rtenicxp.sys
2009-04-17 15:26 1,847,168 a------- c:\windows\system32\win32k.sys
2009-04-15 17:51 585,216 a------- c:\windows\system32\rpcrt4.dll
2009-03-26 02:31 39,424 a------- c:\windows\zipinst.exe
2009-02-03 23:44 32,768 a--sh--- c:\windows\system32\config\systemprofile\local settings\history\history.ie5\mshist012009020320090204\index.dat

============= FINISH: 2:51:47,20 ===============

Attached Files



BC AdBot (Login to Remove)

 


m

#2 JSntgRvr

JSntgRvr

    Master Surgeon General


  • Malware Response Team
  • 10,850 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:Puerto Rico
  • Local time:12:27 AM

Posted 19 June 2009 - 01:42 AM

Hi, Kenny Brb :thumbup2:

Download This file. Note its name and save it to your root folder, such as C:\.
  • Disconnect from the Internet and close all running programs.
  • Temporarily disable any real-time active protection so your security program drivers will not conflict with this file.
  • Click on this link to see a list of programs that should be disabled.
  • Double-click on the downloaded file to start the program. (If running Vista, right click on it and select "Run as an Administrator")
  • Allow the driver to load if asked.
  • You may be prompted to scan immediately if it detects rootkit activity.
  • If you are prompted to scan your system click "Yes" to begin the scan.
  • If not prompted, click the "Rootkit/Malware" tab.
  • On the right-side, all items to be scanned should be checked by default except for "Show All". Leave that box unchecked.
  • Select all drives that are connected to your system to be scanned.
  • Click the Scan button to begin. (Please be patient as it can take some time to complete)
  • When the scan is finished, click Save to save the scan results to your Desktop.
  • Save the file as Results.log and copy/paste the contents in your next reply.
  • Exit the program and re-enable all active protection when done.

No request for help throughout private messaging will be attended.

If I have helped you, consider making a donation to help me continue the fight against Malware!
btn_donate_SM.gif


#3 Kenny Brb

Kenny Brb
  • Topic Starter

  • Members
  • 11 posts
  • OFFLINE
  •  
  • Local time:11:27 PM

Posted 19 June 2009 - 05:02 PM

Hey, and thanks for your response.

I've disabled all programs specified and ran GMER as you instructed. First i ran a full scan with all hard drives included, sadly after the scan finished ( in 4 hours ) SAVE button went missing :thumbup2: I realize it may sound pretty retarded so i even took screenshots of it :)

Anyways, i ran the test again, this time with all hard drives excluded, the result as far as the in-program list go are exactly the same, so I am uploading these instead.

Cheers.

GMER 1.0.15.14972 - http://www.gmer.net
Rootkit scan 2009-06-20 00:56:22
Windows 5.1.2600 Service Pack 3


---- System - GMER 1.0.15 ----

SSDT 89BF8630 ZwAssignProcessToJobObject
SSDT spfe.sys ZwCreateKey [0xF72860E0]
SSDT spfe.sys ZwEnumerateKey [0xF72A4CA4]
SSDT spfe.sys ZwEnumerateValueKey [0xF72A5032]
SSDT spfe.sys ZwOpenKey [0xF72860C0]
SSDT 89BF7A60 ZwOpenProcess
SSDT 89BF7E80 ZwOpenThread
SSDT spfe.sys ZwQueryKey [0xF72A510A]
SSDT spfe.sys ZwQueryValueKey [0xF72A4F8A]
SSDT spfe.sys ZwSetValueKey [0xF72A519C]
SSDT 89BF8460 ZwSuspendProcess
SSDT 89BF8280 ZwSuspendThread
SSDT 89BF7C90 ZwTerminateProcess
SSDT 89BF80B0 ZwTerminateThread

INT 0x06 \??\C:\WINDOWS\system32\drivers\Haspnt.sys (HASP Kernel Device Driver for Windows NT/Aladdin Knowledge Systems) AC1A316D
INT 0x0E \??\C:\WINDOWS\system32\drivers\Haspnt.sys (HASP Kernel Device Driver for Windows NT/Aladdin Knowledge Systems) AC1A2FC2
INT 0x62 ? 8A8F1BF8
INT 0x73 ? 8A8F1BF8
INT 0x73 ? 8A8F1BF8
INT 0x73 ? 8A8F1BF8
INT 0x82 ? 8A8F1BF8
INT 0x84 ? 8A67FF00
INT 0x94 ? 8A67FF00
INT 0xB4 ? 8A67FF00
INT 0xB4 ? 8A67FF00

---- Kernel code sections - GMER 1.0.15 ----

? spfe.sys The system cannot find the file specified. !
.text USBPORT.SYS!DllUnload F66BF8AC 5 Bytes JMP 8A67F4E0

---- User code sections - GMER 1.0.15 ----

.text C:\Program Files\ESET\ESET NOD32 Antivirus\ekrn.exe[1600] kernel32.dll!SetUnhandledExceptionFilter 7C84495D 4 Bytes [C2, 04, 00, 00]

---- Kernel IAT/EAT - GMER 1.0.15 ----

IAT atapi.sys[HAL.dll!READ_PORT_UCHAR] [F7287042] spfe.sys
IAT atapi.sys[HAL.dll!READ_PORT_BUFFER_USHORT] [F728713E] spfe.sys
IAT atapi.sys[HAL.dll!READ_PORT_USHORT] [F72870C0] spfe.sys
IAT atapi.sys[HAL.dll!WRITE_PORT_BUFFER_USHORT] [F7287800] spfe.sys
IAT atapi.sys[HAL.dll!WRITE_PORT_UCHAR] [F72876D6] spfe.sys
IAT \SystemRoot\system32\DRIVERS\i8042prt.sys[HAL.dll!READ_PORT_UCHAR] [F7296E9C] spfe.sys

---- Devices - GMER 1.0.15 ----

Device \FileSystem\Ntfs \Ntfs 8A8F01F8

AttachedDevice \FileSystem\Ntfs \Ntfs eamon.sys (Amon monitor/ESET)

Device \FileSystem\Fastfat \FatCdrom 89CD7500

AttachedDevice \Driver\Kbdclass \Device\KeyboardClass0 wdf01000.sys (WDF Dynamic/Microsoft Corporation)
AttachedDevice \Driver\Kbdclass \Device\KeyboardClass1 wdf01000.sys (WDF Dynamic/Microsoft Corporation)

Device \Driver\usbohci \Device\USBPDO-0 8A64E1F8
Device \Driver\dmio \Device\DmControl\DmIoDaemon 8A8831F8
Device \Driver\dmio \Device\DmControl\DmConfig 8A8831F8
Device \Driver\dmio \Device\DmControl\DmPnP 8A8831F8
Device \Driver\dmio \Device\DmControl\DmInfo 8A8831F8
Device \Driver\usbohci \Device\USBPDO-1 8A64E1F8
Device \Driver\usbohci \Device\USBPDO-2 8A64E1F8
Device \Driver\usbohci \Device\USBPDO-3 8A64E1F8
Device \Driver\usbehci \Device\USBPDO-4 8A64B500

AttachedDevice \Driver\Tcpip \Device\Tcp epfwtdir.sys (ESET Antivirus Network Redirector/ESET)
AttachedDevice \Driver\Tcpip \Device\Tcp fssfltr_tdi.sys (Family Safety Filter Driver (TDI)/Microsoft Corporation)

Device \Driver\prodrv06 \Device\ProDrv06 E20C9C30
Device \Driver\usbohci \Device\USBPDO-5 8A64E1F8
Device \Driver\Ftdisk \Device\HarddiskVolume1 8A8F21F8
Device \Driver\Ftdisk \Device\HarddiskVolume2 8A8F21F8
Device \Driver\Cdrom \Device\CdRom0 8A6FD1F8
Device \Driver\Ftdisk \Device\HarddiskVolume3 8A8F21F8
Device \Driver\atapi \Device\Ide\IdeDeviceP0T0L0-3 prosync1.sys (StarForce Protection Synchronization Driver/Protection Technology)
Device \Driver\atapi \Device\Ide\IdePort0 prosync1.sys (StarForce Protection Synchronization Driver/Protection Technology)
Device \Driver\atapi \Device\Ide\IdePort1 prosync1.sys (StarForce Protection Synchronization Driver/Protection Technology)
Device \Driver\atapi \Device\Ide\IdePort2 prosync1.sys (StarForce Protection Synchronization Driver/Protection Technology)
Device \Driver\atapi \Device\Ide\IdePort3 prosync1.sys (StarForce Protection Synchronization Driver/Protection Technology)
Device \Driver\atapi \Device\Ide\IdeDeviceP2T0L0-12 prosync1.sys (StarForce Protection Synchronization Driver/Protection Technology)
Device \Driver\Ftdisk \Device\HarddiskVolume4 8A8F21F8
Device \Driver\prohlp02 \Device\ProHlp02 E1000208
Device \Driver\NetBT \Device\NetBt_Wins_Export 8A10B1F8
Device \Driver\NetBT \Device\NetbiosSmb 8A10B1F8
Device \Driver\usbohci \Device\USBFDO-0 8A64E1F8
Device \Driver\usbohci \Device\USBFDO-1 8A64E1F8
Device \FileSystem\MRxSmb \Device\LanmanDatagramReceiver 899C41F8
Device \Driver\usbohci \Device\USBFDO-2 8A64E1F8
Device \FileSystem\MRxSmb \Device\LanmanRedirector 899C41F8
Device \Driver\usbohci \Device\USBFDO-3 8A64E1F8
Device \Driver\usbohci \Device\USBFDO-4 8A64E1F8
Device \Driver\Ftdisk \Device\FtControl 8A8F21F8
Device \Driver\usbehci \Device\USBFDO-5 8A64B500
Device \FileSystem\Fastfat \Fat 89CD7500

AttachedDevice \FileSystem\Fastfat \Fat eamon.sys (Amon monitor/ESET)

Device \FileSystem\Cdfs \Cdfs 8A48B1F8

---- Threads - GMER 1.0.15 ----

Thread System [4:396] 89BF6790

---- Registry - GMER 1.0.15 ----

Reg HKLM\SYSTEM\CurrentControlSet\Services\sptd\Cfg@s1 771343423
Reg HKLM\SYSTEM\CurrentControlSet\Services\sptd\Cfg@s2 285507792
Reg HKLM\SYSTEM\CurrentControlSet\Services\sptd\Cfg@h0 2
Reg HKLM\SYSTEM\CurrentControlSet\Services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC
Reg HKLM\SYSTEM\CurrentControlSet\Services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC@h0 1
Reg HKLM\SYSTEM\CurrentControlSet\Services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC@hdf12 0xEB 0xF0 0xEF 0xDD ...
Reg HKLM\SYSTEM\CurrentControlSet\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4
Reg HKLM\SYSTEM\CurrentControlSet\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4@h0 0
Reg HKLM\SYSTEM\CurrentControlSet\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4@khjeh 0x69 0xE8 0xA5 0xCA ...
Reg HKLM\SYSTEM\CurrentControlSet\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4\00000001
Reg HKLM\SYSTEM\CurrentControlSet\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4\00000001@khjeh 0x93 0x5A 0x00 0x0B ...
Reg HKLM\SYSTEM\CurrentControlSet\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4\00000001\0Jf40
Reg HKLM\SYSTEM\CurrentControlSet\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4\00000001\0Jf40@khjeh 0xA3 0xAC 0x50 0xB0 ...
Reg HKLM\SYSTEM\ControlSet002\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4
Reg HKLM\SYSTEM\ControlSet002\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4@p0 C:\Program Files\DAEMON Tools Lite\
Reg HKLM\SYSTEM\ControlSet002\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4@h0 0
Reg HKLM\SYSTEM\ControlSet002\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4@khjeh 0x69 0xE8 0xA5 0xCA ...
Reg HKLM\SYSTEM\ControlSet002\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4\00000001
Reg HKLM\SYSTEM\ControlSet002\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4\00000001@a0 0x20 0x01 0x00 0x00 ...
Reg HKLM\SYSTEM\ControlSet002\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4\00000001@khjeh 0x93 0x5A 0x00 0x0B ...
Reg HKLM\SYSTEM\ControlSet002\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4\00000001\0Jf40
Reg HKLM\SYSTEM\ControlSet002\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4\00000001\0Jf40@khjeh 0x45 0xC0 0xF8 0x68 ...
Reg HKLM\SYSTEM\ControlSet003\Services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC
Reg HKLM\SYSTEM\ControlSet003\Services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC@h0 1
Reg HKLM\SYSTEM\ControlSet003\Services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC@hdf12 0xEB 0xF0 0xEF 0xDD ...
Reg HKLM\SYSTEM\ControlSet003\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4
Reg HKLM\SYSTEM\ControlSet003\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4@h0 0
Reg HKLM\SYSTEM\ControlSet003\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4@khjeh 0x69 0xE8 0xA5 0xCA ...
Reg HKLM\SYSTEM\ControlSet003\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4\00000001
Reg HKLM\SYSTEM\ControlSet003\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4\00000001@khjeh 0x93 0x5A 0x00 0x0B ...
Reg HKLM\SYSTEM\ControlSet003\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4\00000001\0Jf40
Reg HKLM\SYSTEM\ControlSet003\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4\00000001\0Jf40@khjeh 0xA3 0xAC 0x50 0xB0 ...

---- EOF - GMER 1.0.15 ----

#4 JSntgRvr

JSntgRvr

    Master Surgeon General


  • Malware Response Team
  • 10,850 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:Puerto Rico
  • Local time:12:27 AM

Posted 19 June 2009 - 10:49 PM

Hi, Kenny Brb :thumbup2:

Please read and follow all these instructions very carefully.

Posted Image Please download Malwarebytes' Anti-Malware from Here.

Double Click mbam-setup.exe to install the application.
  • Make sure a checkmark is placed next to Update Malwarebytes' Anti-Malware and Launch Malwarebytes' Anti-Malware, then click Finish.
  • If an update is found, it will download and install the latest version.
  • Once the program has loaded, select "Perform Quick Scan", then click Scan.
  • The scan may take some time to finish,so please be patient.
  • When the scan is complete, click OK, then Show Results to view the results.
  • Make sure that everything is checked, and click Remove Selected.
  • When disinfection is completed, a log will open in Notepad and you may be prompted to Restart.(See Extra Note)
  • The log is automatically saved by MBAM and can be viewed by clicking the Logs tab in MBAM.
  • Copy&Paste the entire report in your next reply.
Extra Note:

If MBAM encounters a file that is difficult to remove,you will be presented with 1 of 2 prompts,click OK to either and let MBAM proceed with the disinfection process. If asked to restart the computer, please do so immediatly.

=====================================================================


Please download ComboFix from Here or Here to your Desktop.

**Note: In the event you already have Combofix, this is a new version that I need you to download. It is important that it is saved directly to your desktop**
  • Please, never rename Combofix unless instructed.
  • Close any open browsers.
  • Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.

    -----------------------------------------------------------

    • Very Important! Temporarily disable your anti-virus, script blocking and any anti-malware real-time protection before performing a scan. They can interfere with ComboFix or remove some of its embedded files which may cause "unpredictable results".
    • Click on this link to see a list of programs that should be disabled. The list is not all inclusive. If yours is not listed and you don't know how to disable it, please ask.

      -----------------------------------------------------------

    • Close any open browsers.
    • WARNING: Combofix will disconnect your machine from the Internet as soon as it starts
    • Please do not attempt to re-connect your machine back to the Internet until Combofix has completely finished.
    • If there is no internet connection after running Combofix, then restart your computer to restore back your connection.

    -----------------------------------------------------------

  • Double click on combofix.exe & follow the prompts.
  • If you receive a message that Combofix has detected the presence of rootkit activity and needs to reboot, kindly write down on paper the list of files present in the message before continuing, and post it in your next reply.
  • Install the Recovery Console upon request.
  • When finished, it will produce a report for you.
  • Please post the "C:\ComboFix.txt" along with a new HijackThis log for further review.
**Note: Do not mouseclick combofix's window while it's running. That may cause it to stall**

Note: ComboFix may reset a number of Internet Explorer's settings, including making it the default browser.
Note: Combofix prevents autorun of ALL CDs, floppies and USB devices to assist with malware removal & increase security.

Please do not install any new programs or update anything unless told to do so while we are fixing your problem.

=====================================================================


Also, please download MBR.EXE by GMER. Save the file in your Root directory, C:\, then bring your computer to a Command prompt.

Go to Start -> Run, type CMD and click OK. At the prompt type the following and press Enter after each command:

cd C:\
MBR.EXE -t


The program will check the Master Boot Record and will produce a report. Post the contents of that report i your next reply.

Type Exit at the Command prompt and press Enter to return back to Windows.

No request for help throughout private messaging will be attended.

If I have helped you, consider making a donation to help me continue the fight against Malware!
btn_donate_SM.gif


#5 Kenny Brb

Kenny Brb
  • Topic Starter

  • Members
  • 11 posts
  • OFFLINE
  •  
  • Local time:11:27 PM

Posted 20 June 2009 - 08:07 AM

Hey and thanks again.

I followed your instructions and posting the reports below.
( slightly confused about "Please post the "C:\ComboFix.txt" along with a new HijackThis log for further review." , not really sure what is HijackThis log, no such application has been mentioned prior to this point )

Malwarebytes' Anti-Malware 1.38
Database version: 2314
Windows 5.1.2600 Service Pack 3

20.6.2009 г. 15:49:13
mbam-log-2009-06-20 (15-49-13).txt

Scan type: Quick Scan
Objects scanned: 93338
Time elapsed: 4 minute(s), 10 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 0

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
(No malicious items detected)


ComboFix 09-06-19.01 - gbromov 06.2009 г. 15:53.1 - NTFSx86
Microsoft Windows XP Professional 5.1.2600.3.1251.359.1033.18.2046.1531 [GMT 3:00]
Running from: c:\documents and settings\gbromov\Desktop\ComboFix.exe
AV: ESET NOD32 Antivirus 4.0 *On-access scanning disabled* (Updated) {E5E70D32-0101-4F12-8FB0-D96ACA4F34C0}
.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.

c:\documents and settings\gbromov\Application Data\.#
c:\recycler\S-1-5-21-1032142525-2857679527-774325983-2422
c:\recycler\S-1-5-21-4317612050-0644876366-523100311-0730
c:\recycler\S-1-5-21-4402572602-9331554896-696521431-2610
c:\documents and settings\gbromov\Application Data\.#\MBX@C20@A141A8.###
c:\documents and settings\gbromov\Application Data\.#\MBX@C20@A141D8.###
c:\documents and settings\gbromov\Application Data\.#\MBX@C20@A14208.###
c:\recycler\S-1-5-21-1032142525-2857679527-774325983-2422\Desktop.ini
c:\recycler\S-1-5-21-4317612050-0644876366-523100311-0730\Desktop.ini
c:\recycler\S-1-5-21-4402572602-9331554896-696521431-2610\Desktop.ini
c:\windows\system32\drivers\SKYNETjbnreemx.sys.vir

.
((((((((((((((((((((((((((((((((((((((( Drivers/Services )))))))))))))))))))))))))))))))))))))))))))))))))
.

-------\Legacy_podmena
-------\Legacy_podmenadrv


((((((((((((((((((((((((( Files Created from 2009-05-20 to 2009-06-20 )))))))))))))))))))))))))))))))
.

2009-06-20 12:42 . 2009-06-17 08:27 38160 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2009-06-20 12:42 . 2009-06-17 08:27 19096 ----a-w- c:\windows\system32\drivers\mbam.sys
2009-06-20 02:23 . 2009-06-20 02:23 -------- d-----w- C:\Movavi files
2009-06-20 02:22 . 2009-06-20 03:04 -------- d-----w- c:\program files\Movavi Video Converter 7
2009-06-20 02:21 . 2009-06-20 02:21 -------- d-----w- c:\documents and settings\gbromov\Local Settings\Application Data\Downloaded Installations
2009-06-19 18:38 . 2009-06-19 18:38 286208 ----a-w- C:\602imise.exe
2009-06-18 00:51 . 2009-06-18 00:51 -------- d-----w- c:\documents and settings\All Users\Application Data\SUPERAntiSpyware.com
2009-06-18 00:51 . 2009-06-19 18:36 -------- d-----w- c:\documents and settings\gbromov\Application Data\SUPERAntiSpyware.com
2009-06-18 00:51 . 2009-06-19 18:36 -------- d-----w- c:\program files\SUPERAntiSpyware
2009-06-17 23:32 . 2009-06-17 23:32 -------- d-----w- c:\program files\ESET
2009-06-17 22:50 . 2009-06-17 22:50 578560 -c--a-w- c:\windows\system32\dllcache\user32.dll
2009-06-17 22:47 . 2009-06-17 22:48 -------- d-----w- c:\windows\ERUNT
2009-06-17 22:47 . 2009-06-17 22:47 -------- d-sh--w- c:\documents and settings\Administrator\IETldCache
2009-06-17 21:07 . 2009-06-17 21:07 -------- d-----w- c:\documents and settings\gbromov\Application Data\Malwarebytes
2009-06-17 21:07 . 2009-06-20 12:42 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
2009-06-17 21:07 . 2009-06-17 21:07 -------- d-----w- c:\documents and settings\All Users\Application Data\Malwarebytes
2009-06-17 19:53 . 2009-06-17 19:56 -------- d-----w- c:\program files\Windows Live Safety Center
2009-06-16 18:01 . 2009-06-16 18:01 -------- d-----w- c:\program files\NewtonSDK
2009-06-16 17:34 . 2009-06-16 17:34 -------- d-----w- c:\documents and settings\NetworkService\Local Settings\Application Data\Google
2009-06-15 20:47 . 2009-06-15 20:47 118784 ----a-w- c:\windows\SeaMonkeyUninstall.exe
2009-06-15 20:47 . 2009-06-15 20:47 118784 ----a-w- c:\windows\GREUninstall.exe
2009-06-15 20:47 . 2009-06-15 20:47 8653 ----a-w- c:\windows\mozver.dat
2009-06-15 20:46 . 2009-06-15 20:46 -------- d-----w- c:\program files\mozilla.org
2009-06-15 18:50 . 2009-06-15 18:50 -------- d-----w- c:\program files\Apple Software Update
2009-06-15 18:37 . 2009-06-15 18:37 -------- d-----w- c:\documents and settings\LocalService\Local Settings\Application Data\Google
2009-06-15 18:37 . 2009-06-15 19:07 -------- d-----w- c:\program files\Google
2009-06-15 18:13 . 2009-06-15 18:13 -------- d-----w- c:\documents and settings\All Users\Application Data\Kaspersky Lab Setup Files
2009-06-15 01:50 . 2009-06-15 01:50 -------- d-----w- c:\program files\Common Files\xing shared
2009-06-13 15:26 . 2009-06-13 20:59 -------- d---a-w- c:\documents and settings\All Users\Application Data\TEMP
2009-06-13 14:10 . 2009-05-06 22:25 177024 ----a-w- c:\windows\system32\psloglist.exe
2009-06-13 14:10 . 2009-05-06 22:25 381824 ----a-w- c:\windows\system32\psexec.exe
2009-06-13 14:10 . 2008-01-09 12:36 107560 ----a-w- c:\windows\system32\psservice.exe
2009-06-13 14:10 . 2007-07-09 07:23 243072 ----a-w- c:\windows\system32\Psinfo.exe
2009-06-13 14:10 . 2006-12-04 13:53 207664 ----a-w- c:\windows\system32\psshutdown.exe
2009-06-13 14:10 . 2006-12-04 13:53 187184 ----a-w- c:\windows\system32\pssuspend.exe
2009-06-13 14:10 . 2006-12-04 13:53 187184 ----a-w- c:\windows\system32\pskill.exe
2009-06-13 14:10 . 2006-12-04 13:53 187184 ----a-w- c:\windows\system32\psgetsid.exe
2009-06-13 14:10 . 2006-12-04 13:53 125744 ----a-w- c:\windows\system32\pslist.exe
2009-06-13 14:10 . 2006-12-04 13:53 105264 ----a-w- c:\windows\system32\pspasswd.exe
2009-06-13 14:10 . 2006-12-04 13:53 105264 ----a-w- c:\windows\system32\psloggedon.exe
2009-06-13 14:10 . 2006-12-04 13:53 105264 ----a-w- c:\windows\system32\psfile.exe
2009-06-13 13:58 . 2009-06-13 13:58 -------- d-----w- c:\documents and settings\LocalService\Local Settings\Application Data\ESET
2009-06-13 13:57 . 2009-06-13 13:57 -------- d-----w- c:\documents and settings\gbromov\Local Settings\Application Data\ESET
2009-06-13 13:56 . 2009-06-13 13:56 -------- d-----w- c:\documents and settings\All Users\Application Data\ESET
2009-06-13 13:50 . 2009-06-13 13:50 -------- d-sh--w- c:\documents and settings\LocalService\IETldCache
2009-06-11 21:21 . 2009-06-11 22:43 -------- d-----w- c:\documents and settings\All Users\Application Data\FarmFrenzy2
2009-06-11 21:21 . 2009-06-11 21:21 -------- d-----w- c:\program files\Farm Frenzy 2
2009-06-11 21:21 . 2009-06-11 21:21 -------- d-----w- c:\windows\Farm Frenzy 2
2009-06-09 18:52 . 2009-04-30 21:22 12800 -c----w- c:\windows\system32\dllcache\xpshims.dll
2009-06-09 18:52 . 2009-04-30 21:22 246272 -c----w- c:\windows\system32\dllcache\ieproxy.dll
2009-06-07 21:21 . 2009-06-07 21:25 -------- d-----w- c:\documents and settings\gbromov\Application Data\Octoshape
2009-06-06 12:11 . 2009-06-06 12:11 -------- d-----w- c:\documents and settings\gbromov\Local Settings\Application Data\Blizzard Entertainment
2009-06-03 18:19 . 2009-06-03 18:19 -------- d-----w- c:\program files\DAEMON Tools Toolbar
2009-05-27 21:42 . 2009-05-27 21:42 -------- d-sh--w- c:\documents and settings\gbromov\PrivacIE
2009-05-27 21:41 . 2009-05-27 21:41 -------- d-sh--w- c:\documents and settings\NetworkService\IETldCache
2009-05-27 21:41 . 2009-05-27 21:41 -------- d-sh--w- c:\documents and settings\gbromov\IETldCache
2009-05-27 21:37 . 2009-05-27 21:37 -------- d-----w- c:\windows\ie8updates
2009-05-27 21:37 . 2009-05-12 05:11 102912 -c----w- c:\windows\system32\dllcache\iecompat.dll
2009-05-27 21:35 . 2009-05-27 21:36 -------- dc-h--w- c:\windows\ie8
2009-05-23 12:00 . 2009-05-23 12:01 29101 ----a-w- c:\windows\scunin.dat
2009-05-23 12:00 . 2009-05-23 12:01 967 ----a-w- c:\windows\ScUnin.pif
2009-05-23 12:00 . 2009-05-23 12:01 70656 ----a-w- c:\windows\ScUnin.exe

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2009-06-20 03:20 . 2008-08-16 21:00 -------- d-----w- c:\documents and settings\gbromov\Application Data\uTorrent
2009-06-20 02:45 . 2008-09-02 22:12 -------- d-----w- c:\program files\BitComet
2009-06-19 18:36 . 2008-11-27 19:22 -------- d-----w- c:\program files\Common Files\Wise Installation Wizard
2009-06-18 00:00 . 2008-08-18 11:48 -------- d-----w- c:\documents and settings\All Users\Application Data\Microsoft Help
2009-06-17 21:56 . 2009-04-03 18:00 -------- d-----w- c:\documents and settings\gbromov\Application Data\.purple
2009-06-15 20:47 . 2008-08-16 18:07 335 ----a-w- c:\windows\nsreg.dat
2009-06-15 19:49 . 2008-09-27 10:47 -------- d-----w- c:\program files\Common Files\Apple
2009-06-15 19:43 . 2009-04-03 18:01 -------- d-----w- c:\documents and settings\gbromov\Application Data\gtk-2.0
2009-06-15 18:40 . 2008-08-16 21:01 -------- d-----w- c:\program files\Winamp
2009-06-15 01:50 . 2008-08-17 00:49 -------- d-----w- c:\program files\Common Files\Real
2009-06-14 23:12 . 2008-09-16 17:30 -------- d-----w- c:\documents and settings\gbromov\Application Data\Skype
2009-06-03 18:19 . 2009-03-19 20:59 -------- d-----w- c:\documents and settings\gbromov\Application Data\DAEMON Tools Lite
2009-06-02 19:38 . 2008-08-17 15:58 721904 ----a-w- c:\windows\system32\drivers\sptd.sys
2009-05-30 13:04 . 2009-01-17 14:27 -------- d-----w- c:\documents and settings\gbromov\Application Data\teamspeak2
2009-05-20 20:56 . 2008-08-28 20:30 -------- d-----w- c:\program files\VMware
2009-05-20 20:55 . 2008-08-28 20:31 -------- d-----w- c:\documents and settings\All Users\Application Data\VMware
2009-05-19 19:44 . 2008-08-28 20:34 -------- d-----w- c:\documents and settings\LocalService\Application Data\VMware
2009-05-13 05:15 . 2004-08-03 22:56 915456 ----a-w- c:\windows\system32\wininet.dll
2009-05-11 20:30 . 2009-05-11 20:30 -------- d-----w- c:\program files\Microsoft Office Outlook Connector
2009-05-11 20:30 . 2009-05-11 20:26 -------- d-----w- c:\program files\Windows Live
2009-05-11 20:29 . 2009-05-11 20:29 -------- d-----w- c:\program files\Microsoft Sync Framework
2009-05-11 20:28 . 2009-05-11 20:28 -------- d-----w- c:\program files\Microsoft SQL Server Compact Edition
2009-05-11 20:27 . 2009-05-10 17:39 -------- d-----w- c:\program files\Microsoft
2009-05-11 20:27 . 2009-05-11 20:27 -------- d-----w- c:\program files\Windows Live SkyDrive
2009-05-11 20:20 . 2009-05-11 20:20 -------- d-----w- c:\program files\DivXLand
2009-05-11 01:11 . 2009-05-11 01:11 -------- d-----w- c:\program files\Haali
2009-05-10 17:48 . 2008-08-16 16:46 70064 ----a-w- c:\documents and settings\gbromov\Local Settings\Application Data\GDIPFONTCACHEV1.DAT
2009-05-10 17:44 . 2008-09-07 00:13 -------- d-----w- c:\program files\Microsoft Works
2009-05-10 17:40 . 2009-05-10 17:40 0 ---ha-w- c:\windows\system32\drivers\Msft_Kernel_SynTP_01007.Wdf
2009-05-10 17:40 . 2009-05-10 17:40 0 ---ha-w- c:\windows\system32\drivers\MsftWdf_Kernel_01007_Coinstaller_Critical.Wdf
2009-05-10 17:40 . 2009-05-10 17:40 -------- d-----w- c:\program files\Synaptics
2009-05-10 17:39 . 2009-05-10 17:39 -------- d-----w- c:\program files\Common Files\Windows Live
2009-05-10 17:39 . 2009-05-10 17:39 -------- d-----w- c:\program files\Microsoft Silverlight
2009-05-07 15:32 . 2004-08-03 22:56 345600 ----a-w- c:\windows\system32\localspl.dll
2009-05-01 10:54 . 2009-05-01 10:54 231176 ----a-w- c:\windows\system32\PDBoot.exe
2009-04-24 20:42 . 2009-04-24 20:42 -------- d-----w- c:\program files\Sourceforge
2009-04-23 08:22 . 2008-08-16 16:59 141568 ----a-w- c:\windows\system32\drivers\Rtenicxp.sys
2009-04-22 23:03 . 2008-08-18 11:40 -------- d-----w- c:\program files\ACDSee32
2009-04-17 12:26 . 2004-08-03 21:17 1847168 ----a-w- c:\windows\system32\win32k.sys
2009-04-15 14:51 . 2004-08-03 22:56 585216 ----a-w- c:\windows\system32\rpcrt4.dll
2009-04-09 12:21 . 2009-04-09 12:21 94360 ----a-w- c:\windows\system32\drivers\epfwtdir.sys
2009-04-09 12:18 . 2009-04-09 12:18 107256 ----a-w- c:\windows\system32\drivers\ehdrv.sys
2009-04-09 12:10 . 2009-04-09 12:10 113960 ----a-w- c:\windows\system32\drivers\eamon.sys
2009-03-25 23:31 . 2009-03-25 23:31 39424 ----a-w- c:\windows\zipinst.exe
.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"ctfmon.exe"="c:\windows\system32\ctfmon.exe" [2008-04-14 15360]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"TkBellExe"="c:\program files\Common Files\Real\Update_OB\realsched.exe" [2009-06-15 198160]
"Adobe Reader Speed Launcher"="c:\program files\Adobe\Reader 9.0\Reader\Reader_sl.exe" [2009-02-27 35696]
"egui"="c:\program files\ESET\ESET NOD32 Antivirus\egui.exe" [2009-04-09 2029640]

[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run]
"CTFMON.EXE"="c:\windows\system32\CTFMON.EXE" [2008-04-14 15360]

c:\documents and settings\All Users\Start Menu\Programs\Startup\
Bluetooth Manager.lnk - c:\program files\Toshiba\Bluetooth Toshiba Stack\TosBtMng.exe [2008-4-14 2979144]
Bluetooth Monitor.lnk - c:\program files\TOSHIBA\Bluetooth Monitor\BtMon2.exe [2008-8-16 69632]

[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\session manager]
BootExecute REG_MULTI_SZ PDBoot.exe\0autocheck autochk *

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\Wdf01000.sys]
@="Driver"

[HKEY_LOCAL_MACHINE\software\microsoft\security center]
"FirewallOverride"=dword:00000001

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]
"EnableFirewall"= 0 (0x0)

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=
"c:\\Program Files\\uTorrent\\uTorrent.exe"=
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"c:\\Program Files\\Microsoft Office\\Office12\\OUTLOOK.EXE"=
"c:\\Program Files\\Ventrilo\\Ventrilo.exe"=
"c:\\Program Files\\Bonjour\\mDNSResponder.exe"=
"c:\\Program Files\\Windows Live\\Messenger\\wlcsdk.exe"=
"c:\\Program Files\\Windows Live\\Messenger\\msnmsgr.exe"=
"c:\\Program Files\\Windows Live\\Sync\\WindowsLiveSync.exe"=
"c:\\Program Files\\Skype\\Phone\\Skype.exe"=

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\GloballyOpenPorts\List]
"26208:TCP"= 26208:TCP:BitComet 26208 TCP
"26208:UDP"= 26208:UDP:BitComet 26208 UDP

R1 ehdrv;ehdrv;c:\windows\system32\drivers\ehdrv.sys [09.4.2009 г. 15:18 107256]
R1 epfwtdir;epfwtdir;c:\windows\system32\drivers\epfwtdir.sys [09.4.2009 г. 15:21 94360]
R2 ekrn;ESET Service;c:\program files\ESET\ESET NOD32 Antivirus\ekrn.exe [09.4.2009 г. 15:19 731840]
R2 fssfltr;FssFltr;c:\windows\system32\drivers\fssfltr_tdi.sys [11.5.2009 г. 23:30 55152]
R3 AtiHdmiService;ATI Function Driver for HDMI Service;c:\windows\system32\drivers\AtiHdmi.sys [21.5.2008 г. 02:53 93696]
R3 WSIMD;wsimd Service;c:\windows\system32\drivers\wsimd.sys [16.8.2008 г. 19:56 57408]
S2 gupdate1c9ede861e4b486;Google Update Service (gupdate1c9ede861e4b486);c:\program files\Google\Update\GoogleUpdate.exe [15.6.2009 г. 21:37 133104]
S3 EBKTNPH;EBKTNPH;c:\docume~1\gbromov\LOCALS~1\Temp\EBKTNPH.exe --> c:\docume~1\gbromov\LOCALS~1\Temp\EBKTNPH.exe [?]
S3 fsssvc;Windows Live Family Safety;c:\program files\Windows Live\Family Safety\fsssvc.exe [06.2.2009 г. 18:08 533360]
S3 rkhdrv40;Rootkit Unhooker Driver; [x]
S3 u2kg54;BUFFALO WLI-U2-KG54 Wireless LAN Adapter Service;c:\windows\system32\drivers\rt2500usb.sys [24.8.2008 г. 17:35 139904]
S3 XDva189;XDva189;\??\c:\windows\system32\XDva189.sys --> c:\windows\system32\XDva189.sys [?]
S4 msvsmon80;Visual Studio 2005 Remote Debugger;c:\program files\Microsoft Visual Studio 8\Common7\IDE\Remote Debugger\x86\msvsmon.exe [02.12.2006 г. 06:17 2805000]

[HKEY_LOCAL_MACHINE\software\microsoft\active setup\installed components\>{60B49E34-C7CC-11D0-8953-00A0C90347FF}]
"c:\windows\system32\rundll32.exe" "c:\windows\system32\iedkcs32.dll",BrandIEActiveSetup SIGNUP
.
Contents of the 'Scheduled Tasks' folder

2009-06-15 c:\windows\Tasks\AppleSoftwareUpdate.job
- c:\program files\Apple Software Update\SoftwareUpdate.exe [2008-07-30 09:34]

2009-06-20 c:\windows\Tasks\GoogleUpdateTaskMachine.job
- c:\program files\Google\Update\GoogleUpdate.exe [2009-06-15 18:37]
.
.
------- Supplementary Scan -------
.
mLocal Page = about:blank
uInternet Connection Wizard,ShellNext = iexplore
uInternet Settings,ProxyOverride = *.local
IE: &D&ownload &with BitComet - c:\program files\BitComet\BitComet.exe/AddLink.htm
IE: &D&ownload all video with BitComet - c:\program files\BitComet\BitComet.exe/AddVideo.htm
IE: &D&ownload all with BitComet - c:\program files\BitComet\BitComet.exe/AddAllLink.htm
IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~3\Office12\EXCEL.EXE/3000
DPF: {AA07EBD2-EBDD-4BD6-9F8F-114BD513492C} - hxxp://disteng.nefficient.com/disteng/neffy/NeffyLauncher.cab
FF - ProfilePath -
.

**************************************************************************

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2009-06-20 15:57
Windows 5.1.2600 Service Pack 3 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully
hidden files: 0

**************************************************************************
.
--------------------- DLLs Loaded Under Running Processes ---------------------

- - - - - - - > 'winlogon.exe'(924)
c:\windows\system32\Ati2evxx.dll

- - - - - - - > 'explorer.exe'(3592)
c:\windows\system32\WININET.dll
c:\windows\system32\ieframe.dll
c:\windows\system32\webcheck.dll
c:\windows\system32\WPDShServiceObj.dll
c:\windows\system32\PortableDeviceTypes.dll
c:\windows\system32\PortableDeviceApi.dll
.
------------------------ Other Running Processes ------------------------
.
c:\windows\system32\ati2evxx.exe
c:\windows\system32\ati2evxx.exe
c:\program files\TOSHIBA\Bluetooth Toshiba Stack\TosA2dp.exe
c:\program files\TOSHIBA\Bluetooth Toshiba Stack\TosBtHid.exe
c:\program files\TOSHIBA\Bluetooth Toshiba Stack\TosAVRC.exe
c:\windows\system32\agrsmsvc.exe
c:\program files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
c:\program files\Bonjour\mDNSResponder.exe
c:\program files\Raxco\PerfectDisk10\PDAgent.exe
c:\program files\Microsoft\Search Enhancement Pack\SeaPort\SeaPort.exe
c:\program files\TOSHIBA\Bluetooth Toshiba Stack\TosBtSrv.exe
c:\windows\system32\wscntfy.exe
c:\program files\TOSHIBA\Bluetooth Toshiba Stack\TosOBEX.exe
c:\program files\TOSHIBA\Bluetooth Toshiba Stack\TosBtBty.exe
c:\program files\TOSHIBA\Bluetooth Toshiba Stack\TosBtProc.exe
.
**************************************************************************
.
Completion time: 2009-06-20 16:00 - machine was rebooted
ComboFix-quarantined-files.txt 2009-06-20 13:00

Pre-Run: 17 868 201 984 bytes free
Post-Run: 17 847 508 992 bytes free

254 --- E O F --- 2009-06-18 10:41


Stealth MBR rootkit/Mebroot/Sinowal detector 0.3.6 by Gmer, http://www.gmer.net

device: opened successfully
user: MBR read successfully
kernel: MBR read successfully
user & kernel MBR OK

#6 JSntgRvr

JSntgRvr

    Master Surgeon General


  • Malware Response Team
  • 10,850 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:Puerto Rico
  • Local time:12:27 AM

Posted 20 June 2009 - 12:45 PM

Hi, Kenny Brb :thumbup2:
  • Copy the entire contents of the Quote Box below to Notepad.
  • Name the file as CFScript.txt
  • Change the Save as Type to All Files
  • and Save it on the desktop

http://www.bleepingcomputer.com/forums/top...ml#entry1306742

Collect::[4]
c:\windows\system32\XDva189.sys

Driver::
XDva189


Posted Image

Once saved, referring to the picture above, drag CFScript.txt into ComboFix.exe, and post back the resulting report.

Posted ImageClick here to download HJTInstall.exe
  • Save HJTInstall.exe to your desktop.
  • Doubleclick on the HJTInstall.exe icon on your desktop.
  • By default it will install to C:\Program Files\Trend Micro\HijackThis .
  • Click on Install.
  • It will create a HijackThis icon on the desktop.
  • Once installed, it will launch Hijackthis.
  • Click on the Do a system scan and save a logfile button. It will scan and the log should open in notepad.
  • Click on "Edit > Select All" then click on "Edit > Copy" to copy the entire contents of the log.
  • Come back here to this thread and Paste the log in your next reply.
  • DO NOT have Hijackthis fix anything yet. Most of what it finds will be harmless or even required.
Please do an online scan with Kaspersky WebScanner

Kaspersky online scanner uses JAVA tecnology to perform the scan. If you do not have the latest JAVA version, follow the instrutions below under Upgrading Java, to download and install the latest vesion.
  • Read through the requirements and privacy statement and click on Accept button.
  • It will start downloading and installing the scanner and virus definitions. You will be prompted to install an application from Kaspersky. Click Run.
  • When the downloads have finished, click on Settings.
  • Make sure the following is checked.
    • Spyware, Adware, Dialers, and other potentially dangerous programs
      Archives
      Mail databases
  • Click on My Computer under Scan.
  • Once the scan is complete, it will display the results. Click on View Scan Report.
  • You will see a list of infected items there. Click on Save Report As....
  • Save this report to a convenient place. Change the Files of type to Text file (.txt) before clicking on the Save button.
  • Please post this log in your next reply.
Upgrading Java:
  • Download the latest version of Java SE Runtime Environment (JRE)JRE 6 Update 14.
  • Click the "Download" button to the right.
  • Select your Platform and check the box that says: "I agree to the Java SE Runtime Environment 6 License Agreement.".
  • Click on Continue.
  • Click on the link to download Windows Offline Installation (jre-6u14-windows-i586.exe) and save it to your desktop. Do NOT use the Sun Download Manager..
  • Close any programs you may have running - especially your web browser.
  • Go to Start > Control Panel, double-click on Add/Remove programs and remove all older versions of Java.
  • Check any item with Java Runtime Environment (JRE or J2SE) in the name.
  • Click the Remove or Change/Remove button.
  • Repeat as many times as necessary to remove each Java version.
  • Reboot your computer once all Java components are removed.
  • Then from your desktop double-click on the download to install the newest version.(Vista users, right click on the jre-6u14-windows-i586.exe and select "Run as an Administrator.")

No request for help throughout private messaging will be attended.

If I have helped you, consider making a donation to help me continue the fight against Malware!
btn_donate_SM.gif


#7 Kenny Brb

Kenny Brb
  • Topic Starter

  • Members
  • 11 posts
  • OFFLINE
  •  
  • Local time:11:27 PM

Posted 20 June 2009 - 07:22 PM

Phew, finally kaspersky's scan finished.

So there we go:

ComboFix 09-06-19.01 - gbromov 06.2009 г. 23:45.2 - NTFSx86
Microsoft Windows XP Professional 5.1.2600.3.1251.359.1033.18.2046.1508 [GMT 3:00]
Running from: c:\documents and settings\gbromov\Desktop\ComboFix.exe
Command switches used :: c:\documents and settings\gbromov\Desktop\CFScript.txt
AV: ESET NOD32 Antivirus 4.0 *On-access scanning disabled* (Updated) {E5E70D32-0101-4F12-8FB0-D96ACA4F34C0}
.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.

.
((((((((((((((((((((((((((((((((((((((( Drivers/Services )))))))))))))))))))))))))))))))))))))))))))))))))
.

-------\Legacy_XDVA189
-------\Service_XDva189


((((((((((((((((((((((((( Files Created from 2009-05-20 to 2009-06-20 )))))))))))))))))))))))))))))))
.

2009-06-20 12:42 . 2009-06-17 08:27 38160 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2009-06-20 12:42 . 2009-06-17 08:27 19096 ----a-w- c:\windows\system32\drivers\mbam.sys
2009-06-20 02:23 . 2009-06-20 02:23 -------- d-----w- C:\Movavi files
2009-06-20 02:22 . 2009-06-20 03:04 -------- d-----w- c:\program files\Movavi Video Converter 7
2009-06-20 02:21 . 2009-06-20 02:21 -------- d-----w- c:\documents and settings\gbromov\Local Settings\Application Data\Downloaded Installations
2009-06-19 18:38 . 2009-06-19 18:38 286208 ----a-w- C:\602imise.exe
2009-06-18 00:51 . 2009-06-18 00:51 -------- d-----w- c:\documents and settings\All Users\Application Data\SUPERAntiSpyware.com
2009-06-18 00:51 . 2009-06-19 18:36 -------- d-----w- c:\documents and settings\gbromov\Application Data\SUPERAntiSpyware.com
2009-06-18 00:51 . 2009-06-19 18:36 -------- d-----w- c:\program files\SUPERAntiSpyware
2009-06-17 23:32 . 2009-06-17 23:32 -------- d-----w- c:\program files\ESET
2009-06-17 22:50 . 2009-06-17 22:50 578560 -c--a-w- c:\windows\system32\dllcache\user32.dll
2009-06-17 22:47 . 2009-06-17 22:48 -------- d-----w- c:\windows\ERUNT
2009-06-17 22:47 . 2009-06-17 22:47 -------- d-sh--w- c:\documents and settings\Administrator\IETldCache
2009-06-17 21:07 . 2009-06-17 21:07 -------- d-----w- c:\documents and settings\gbromov\Application Data\Malwarebytes
2009-06-17 21:07 . 2009-06-20 12:42 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
2009-06-17 21:07 . 2009-06-17 21:07 -------- d-----w- c:\documents and settings\All Users\Application Data\Malwarebytes
2009-06-17 19:53 . 2009-06-17 19:56 -------- d-----w- c:\program files\Windows Live Safety Center
2009-06-16 18:01 . 2009-06-16 18:01 -------- d-----w- c:\program files\NewtonSDK
2009-06-16 17:34 . 2009-06-16 17:34 -------- d-----w- c:\documents and settings\NetworkService\Local Settings\Application Data\Google
2009-06-15 20:47 . 2009-06-15 20:47 118784 ----a-w- c:\windows\SeaMonkeyUninstall.exe
2009-06-15 20:47 . 2009-06-15 20:47 118784 ----a-w- c:\windows\GREUninstall.exe
2009-06-15 20:47 . 2009-06-15 20:47 8653 ----a-w- c:\windows\mozver.dat
2009-06-15 20:46 . 2009-06-15 20:46 -------- d-----w- c:\program files\mozilla.org
2009-06-15 18:50 . 2009-06-15 18:50 -------- d-----w- c:\program files\Apple Software Update
2009-06-15 18:37 . 2009-06-15 18:37 -------- d-----w- c:\documents and settings\LocalService\Local Settings\Application Data\Google
2009-06-15 18:37 . 2009-06-15 19:07 -------- d-----w- c:\program files\Google
2009-06-15 18:13 . 2009-06-15 18:13 -------- d-----w- c:\documents and settings\All Users\Application Data\Kaspersky Lab Setup Files
2009-06-15 01:50 . 2009-06-15 01:50 -------- d-----w- c:\program files\Common Files\xing shared
2009-06-13 15:26 . 2009-06-13 20:59 -------- d---a-w- c:\documents and settings\All Users\Application Data\TEMP
2009-06-13 14:10 . 2009-05-06 22:25 177024 ----a-w- c:\windows\system32\psloglist.exe
2009-06-13 14:10 . 2009-05-06 22:25 381824 ----a-w- c:\windows\system32\psexec.exe
2009-06-13 14:10 . 2008-01-09 12:36 107560 ----a-w- c:\windows\system32\psservice.exe
2009-06-13 14:10 . 2007-07-09 07:23 243072 ----a-w- c:\windows\system32\Psinfo.exe
2009-06-13 14:10 . 2006-12-04 13:53 207664 ----a-w- c:\windows\system32\psshutdown.exe
2009-06-13 14:10 . 2006-12-04 13:53 187184 ----a-w- c:\windows\system32\pssuspend.exe
2009-06-13 14:10 . 2006-12-04 13:53 187184 ----a-w- c:\windows\system32\pskill.exe
2009-06-13 14:10 . 2006-12-04 13:53 187184 ----a-w- c:\windows\system32\psgetsid.exe
2009-06-13 14:10 . 2006-12-04 13:53 125744 ----a-w- c:\windows\system32\pslist.exe
2009-06-13 14:10 . 2006-12-04 13:53 105264 ----a-w- c:\windows\system32\pspasswd.exe
2009-06-13 14:10 . 2006-12-04 13:53 105264 ----a-w- c:\windows\system32\psloggedon.exe
2009-06-13 14:10 . 2006-12-04 13:53 105264 ----a-w- c:\windows\system32\psfile.exe
2009-06-13 13:58 . 2009-06-13 13:58 -------- d-----w- c:\documents and settings\LocalService\Local Settings\Application Data\ESET
2009-06-13 13:57 . 2009-06-13 13:57 -------- d-----w- c:\documents and settings\gbromov\Local Settings\Application Data\ESET
2009-06-13 13:56 . 2009-06-13 13:56 -------- d-----w- c:\documents and settings\All Users\Application Data\ESET
2009-06-13 13:50 . 2009-06-13 13:50 -------- d-sh--w- c:\documents and settings\LocalService\IETldCache
2009-06-11 21:21 . 2009-06-11 22:43 -------- d-----w- c:\documents and settings\All Users\Application Data\FarmFrenzy2
2009-06-11 21:21 . 2009-06-11 21:21 -------- d-----w- c:\program files\Farm Frenzy 2
2009-06-11 21:21 . 2009-06-11 21:21 -------- d-----w- c:\windows\Farm Frenzy 2
2009-06-09 18:52 . 2009-04-30 21:22 12800 -c----w- c:\windows\system32\dllcache\xpshims.dll
2009-06-09 18:52 . 2009-04-30 21:22 246272 -c----w- c:\windows\system32\dllcache\ieproxy.dll
2009-06-07 21:21 . 2009-06-07 21:25 -------- d-----w- c:\documents and settings\gbromov\Application Data\Octoshape
2009-06-06 12:11 . 2009-06-06 12:11 -------- d-----w- c:\documents and settings\gbromov\Local Settings\Application Data\Blizzard Entertainment
2009-06-03 18:19 . 2009-06-03 18:19 -------- d-----w- c:\program files\DAEMON Tools Toolbar
2009-05-27 21:42 . 2009-05-27 21:42 -------- d-sh--w- c:\documents and settings\gbromov\PrivacIE
2009-05-27 21:41 . 2009-05-27 21:41 -------- d-sh--w- c:\documents and settings\NetworkService\IETldCache
2009-05-27 21:41 . 2009-05-27 21:41 -------- d-sh--w- c:\documents and settings\gbromov\IETldCache
2009-05-27 21:37 . 2009-05-27 21:37 -------- d-----w- c:\windows\ie8updates
2009-05-27 21:37 . 2009-05-12 05:11 102912 -c----w- c:\windows\system32\dllcache\iecompat.dll
2009-05-27 21:35 . 2009-05-27 21:36 -------- dc-h--w- c:\windows\ie8
2009-05-23 12:00 . 2009-05-23 12:01 29101 ----a-w- c:\windows\scunin.dat
2009-05-23 12:00 . 2009-05-23 12:01 967 ----a-w- c:\windows\ScUnin.pif
2009-05-23 12:00 . 2009-05-23 12:01 70656 ----a-w- c:\windows\ScUnin.exe

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2009-06-20 03:20 . 2008-08-16 21:00 -------- d-----w- c:\documents and settings\gbromov\Application Data\uTorrent
2009-06-20 02:45 . 2008-09-02 22:12 -------- d-----w- c:\program files\BitComet
2009-06-19 18:36 . 2008-11-27 19:22 -------- d-----w- c:\program files\Common Files\Wise Installation Wizard
2009-06-18 00:00 . 2008-08-18 11:48 -------- d-----w- c:\documents and settings\All Users\Application Data\Microsoft Help
2009-06-17 21:56 . 2009-04-03 18:00 -------- d-----w- c:\documents and settings\gbromov\Application Data\.purple
2009-06-15 20:47 . 2008-08-16 18:07 335 ----a-w- c:\windows\nsreg.dat
2009-06-15 19:49 . 2008-09-27 10:47 -------- d-----w- c:\program files\Common Files\Apple
2009-06-15 19:43 . 2009-04-03 18:01 -------- d-----w- c:\documents and settings\gbromov\Application Data\gtk-2.0
2009-06-15 18:40 . 2008-08-16 21:01 -------- d-----w- c:\program files\Winamp
2009-06-15 01:50 . 2008-08-17 00:49 -------- d-----w- c:\program files\Common Files\Real
2009-06-14 23:12 . 2008-09-16 17:30 -------- d-----w- c:\documents and settings\gbromov\Application Data\Skype
2009-06-03 18:19 . 2009-03-19 20:59 -------- d-----w- c:\documents and settings\gbromov\Application Data\DAEMON Tools Lite
2009-06-02 19:38 . 2008-08-17 15:58 721904 ----a-w- c:\windows\system32\drivers\sptd.sys
2009-05-30 13:04 . 2009-01-17 14:27 -------- d-----w- c:\documents and settings\gbromov\Application Data\teamspeak2
2009-05-20 20:56 . 2008-08-28 20:30 -------- d-----w- c:\program files\VMware
2009-05-20 20:55 . 2008-08-28 20:31 -------- d-----w- c:\documents and settings\All Users\Application Data\VMware
2009-05-19 19:44 . 2008-08-28 20:34 -------- d-----w- c:\documents and settings\LocalService\Application Data\VMware
2009-05-13 05:15 . 2004-08-03 22:56 915456 ----a-w- c:\windows\system32\wininet.dll
2009-05-11 20:30 . 2009-05-11 20:30 -------- d-----w- c:\program files\Microsoft Office Outlook Connector
2009-05-11 20:30 . 2009-05-11 20:26 -------- d-----w- c:\program files\Windows Live
2009-05-11 20:29 . 2009-05-11 20:29 -------- d-----w- c:\program files\Microsoft Sync Framework
2009-05-11 20:28 . 2009-05-11 20:28 -------- d-----w- c:\program files\Microsoft SQL Server Compact Edition
2009-05-11 20:27 . 2009-05-10 17:39 -------- d-----w- c:\program files\Microsoft
2009-05-11 20:27 . 2009-05-11 20:27 -------- d-----w- c:\program files\Windows Live SkyDrive
2009-05-11 20:20 . 2009-05-11 20:20 -------- d-----w- c:\program files\DivXLand
2009-05-11 01:11 . 2009-05-11 01:11 -------- d-----w- c:\program files\Haali
2009-05-10 17:48 . 2008-08-16 16:46 70064 ----a-w- c:\documents and settings\gbromov\Local Settings\Application Data\GDIPFONTCACHEV1.DAT
2009-05-10 17:44 . 2008-09-07 00:13 -------- d-----w- c:\program files\Microsoft Works
2009-05-10 17:40 . 2009-05-10 17:40 0 ---ha-w- c:\windows\system32\drivers\Msft_Kernel_SynTP_01007.Wdf
2009-05-10 17:40 . 2009-05-10 17:40 0 ---ha-w- c:\windows\system32\drivers\MsftWdf_Kernel_01007_Coinstaller_Critical.Wdf
2009-05-10 17:40 . 2009-05-10 17:40 -------- d-----w- c:\program files\Synaptics
2009-05-10 17:39 . 2009-05-10 17:39 -------- d-----w- c:\program files\Common Files\Windows Live
2009-05-10 17:39 . 2009-05-10 17:39 -------- d-----w- c:\program files\Microsoft Silverlight
2009-05-07 15:32 . 2004-08-03 22:56 345600 ----a-w- c:\windows\system32\localspl.dll
2009-05-01 10:54 . 2009-05-01 10:54 231176 ----a-w- c:\windows\system32\PDBoot.exe
2009-04-24 20:42 . 2009-04-24 20:42 -------- d-----w- c:\program files\Sourceforge
2009-04-23 08:22 . 2008-08-16 16:59 141568 ----a-w- c:\windows\system32\drivers\Rtenicxp.sys
2009-04-22 23:03 . 2008-08-18 11:40 -------- d-----w- c:\program files\ACDSee32
2009-04-17 12:26 . 2004-08-03 21:17 1847168 ----a-w- c:\windows\system32\win32k.sys
2009-04-15 14:51 . 2004-08-03 22:56 585216 ----a-w- c:\windows\system32\rpcrt4.dll
2009-04-09 12:21 . 2009-04-09 12:21 94360 ----a-w- c:\windows\system32\drivers\epfwtdir.sys
2009-04-09 12:18 . 2009-04-09 12:18 107256 ----a-w- c:\windows\system32\drivers\ehdrv.sys
2009-04-09 12:10 . 2009-04-09 12:10 113960 ----a-w- c:\windows\system32\drivers\eamon.sys
2009-03-25 23:31 . 2009-03-25 23:31 39424 ----a-w- c:\windows\zipinst.exe
.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"ctfmon.exe"="c:\windows\system32\ctfmon.exe" [2008-04-14 15360]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"TkBellExe"="c:\program files\Common Files\Real\Update_OB\realsched.exe" [2009-06-15 198160]
"Adobe Reader Speed Launcher"="c:\program files\Adobe\Reader 9.0\Reader\Reader_sl.exe" [2009-02-27 35696]
"egui"="c:\program files\ESET\ESET NOD32 Antivirus\egui.exe" [2009-04-09 2029640]

[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run]
"CTFMON.EXE"="c:\windows\system32\CTFMON.EXE" [2008-04-14 15360]

c:\documents and settings\All Users\Start Menu\Programs\Startup\
Bluetooth Manager.lnk - c:\program files\Toshiba\Bluetooth Toshiba Stack\TosBtMng.exe [2008-4-14 2979144]
Bluetooth Monitor.lnk - c:\program files\TOSHIBA\Bluetooth Monitor\BtMon2.exe [2008-8-16 69632]

[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\session manager]
BootExecute REG_MULTI_SZ PDBoot.exe\0autocheck autochk *

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\Wdf01000.sys]
@="Driver"

[HKEY_LOCAL_MACHINE\software\microsoft\security center]
"FirewallOverride"=dword:00000001

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]
"EnableFirewall"= 0 (0x0)

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=
"c:\\Program Files\\uTorrent\\uTorrent.exe"=
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"c:\\Program Files\\Microsoft Office\\Office12\\OUTLOOK.EXE"=
"c:\\Program Files\\Ventrilo\\Ventrilo.exe"=
"c:\\Program Files\\Bonjour\\mDNSResponder.exe"=
"c:\\Program Files\\Windows Live\\Messenger\\wlcsdk.exe"=
"c:\\Program Files\\Windows Live\\Messenger\\msnmsgr.exe"=
"c:\\Program Files\\Windows Live\\Sync\\WindowsLiveSync.exe"=
"c:\\Program Files\\Skype\\Phone\\Skype.exe"=

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\GloballyOpenPorts\List]
"26208:TCP"= 26208:TCP:BitComet 26208 TCP
"26208:UDP"= 26208:UDP:BitComet 26208 UDP

R1 ehdrv;ehdrv;c:\windows\system32\drivers\ehdrv.sys [09.4.2009 г. 15:18 107256]
R1 epfwtdir;epfwtdir;c:\windows\system32\drivers\epfwtdir.sys [09.4.2009 г. 15:21 94360]
R2 ekrn;ESET Service;c:\program files\ESET\ESET NOD32 Antivirus\ekrn.exe [09.4.2009 г. 15:19 731840]
R2 fssfltr;FssFltr;c:\windows\system32\drivers\fssfltr_tdi.sys [11.5.2009 г. 23:30 55152]
R3 AtiHdmiService;ATI Function Driver for HDMI Service;c:\windows\system32\drivers\AtiHdmi.sys [21.5.2008 г. 02:53 93696]
R3 WSIMD;wsimd Service;c:\windows\system32\drivers\wsimd.sys [16.8.2008 г. 19:56 57408]
S2 gupdate1c9ede861e4b486;Google Update Service (gupdate1c9ede861e4b486);c:\program files\Google\Update\GoogleUpdate.exe [15.6.2009 г. 21:37 133104]
S3 EBKTNPH;EBKTNPH;c:\docume~1\gbromov\LOCALS~1\Temp\EBKTNPH.exe --> c:\docume~1\gbromov\LOCALS~1\Temp\EBKTNPH.exe [?]
S3 fsssvc;Windows Live Family Safety;c:\program files\Windows Live\Family Safety\fsssvc.exe [06.2.2009 г. 18:08 533360]
S3 rkhdrv40;Rootkit Unhooker Driver; [x]
S3 u2kg54;BUFFALO WLI-U2-KG54 Wireless LAN Adapter Service;c:\windows\system32\drivers\rt2500usb.sys [24.8.2008 г. 17:35 139904]
S4 msvsmon80;Visual Studio 2005 Remote Debugger;c:\program files\Microsoft Visual Studio 8\Common7\IDE\Remote Debugger\x86\msvsmon.exe [02.12.2006 г. 06:17 2805000]

[HKEY_LOCAL_MACHINE\software\microsoft\active setup\installed components\>{60B49E34-C7CC-11D0-8953-00A0C90347FF}]
"c:\windows\system32\rundll32.exe" "c:\windows\system32\iedkcs32.dll",BrandIEActiveSetup SIGNUP
.
Contents of the 'Scheduled Tasks' folder

2009-06-15 c:\windows\Tasks\AppleSoftwareUpdate.job
- c:\program files\Apple Software Update\SoftwareUpdate.exe [2008-07-30 09:34]

2009-06-20 c:\windows\Tasks\GoogleUpdateTaskMachine.job
- c:\program files\Google\Update\GoogleUpdate.exe [2009-06-15 18:37]
.
.
------- Supplementary Scan -------
.
mLocal Page = about:blank
uInternet Connection Wizard,ShellNext = iexplore
uInternet Settings,ProxyOverride = *.local
IE: &D&ownload &with BitComet - c:\program files\BitComet\BitComet.exe/AddLink.htm
IE: &D&ownload all video with BitComet - c:\program files\BitComet\BitComet.exe/AddVideo.htm
IE: &D&ownload all with BitComet - c:\program files\BitComet\BitComet.exe/AddAllLink.htm
IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~3\Office12\EXCEL.EXE/3000
DPF: {AA07EBD2-EBDD-4BD6-9F8F-114BD513492C} - hxxp://disteng.nefficient.com/disteng/neffy/NeffyLauncher.cab
FF - ProfilePath -
.

**************************************************************************

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2009-06-20 23:50
Windows 5.1.2600 Service Pack 3 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully
hidden files: 0

**************************************************************************
.
--------------------- DLLs Loaded Under Running Processes ---------------------

- - - - - - - > 'winlogon.exe'(928)
c:\windows\system32\Ati2evxx.dll

- - - - - - - > 'explorer.exe'(3284)
c:\windows\system32\WININET.dll
c:\windows\system32\ieframe.dll
c:\windows\system32\webcheck.dll
c:\windows\system32\WPDShServiceObj.dll
c:\windows\system32\PortableDeviceTypes.dll
c:\windows\system32\PortableDeviceApi.dll
.
------------------------ Other Running Processes ------------------------
.
c:\windows\system32\ati2evxx.exe
c:\windows\system32\ati2evxx.exe
c:\program files\TOSHIBA\Bluetooth Toshiba Stack\TosA2dp.exe
c:\program files\TOSHIBA\Bluetooth Toshiba Stack\TosBtHid.exe
c:\program files\TOSHIBA\Bluetooth Toshiba Stack\TosAVRC.exe
c:\windows\system32\agrsmsvc.exe
c:\program files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
c:\program files\Bonjour\mDNSResponder.exe
c:\program files\Raxco\PerfectDisk10\PDAgent.exe
c:\program files\Microsoft\Search Enhancement Pack\SeaPort\SeaPort.exe
c:\program files\TOSHIBA\Bluetooth Toshiba Stack\TosBtSrv.exe
c:\program files\TOSHIBA\Bluetooth Toshiba Stack\TosOBEX.exe
c:\program files\TOSHIBA\Bluetooth Toshiba Stack\TosBtBty.exe
c:\program files\TOSHIBA\Bluetooth Toshiba Stack\TosBtProc.exe
.
**************************************************************************
.
Completion time: 2009-06-20 23:53 - machine was rebooted
ComboFix-quarantined-files.txt 2009-06-20 20:53
ComboFix2.txt 2009-06-20 13:00

Pre-Run: 17 866 330 112 bytes free
Post-Run: 17 850 970 112 bytes free

243 --- E O F --- 2009-06-18 10:41


Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 23:55:16, on 20.6.2009 г.
Platform: Windows XP SP3 (WinNT 5.01.2600)
MSIE: Internet Explorer v8.00 (8.00.6001.18702)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Google\Update\GoogleUpdate.exe
C:\Program Files\Common Files\Real\Update_OB\realsched.exe
C:\Program Files\ESET\ESET NOD32 Antivirus\egui.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Toshiba\Bluetooth Toshiba Stack\TosBtMng.exe
C:\Program Files\TOSHIBA\Bluetooth Monitor\BtMon2.exe
C:\Program Files\Toshiba\Bluetooth Toshiba Stack\TosA2dp.exe
C:\Program Files\Toshiba\Bluetooth Toshiba Stack\TosBtHid.exe
C:\Program Files\Toshiba\Bluetooth Toshiba Stack\TosAVRC.exe
C:\WINDOWS\system32\agrsmsvc.exe
C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
C:\Program Files\Bonjour\mDNSResponder.exe
C:\Program Files\ESET\ESET NOD32 Antivirus\ekrn.exe
C:\Program Files\Raxco\PerfectDisk10\PDAgent.exe
C:\Program Files\Microsoft\Search Enhancement Pack\SeaPort\SeaPort.exe
C:\WINDOWS\system32\svchost.exe
C:\Program Files\Toshiba\Bluetooth Toshiba Stack\TosBtSrv.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Toshiba\Bluetooth Toshiba Stack\tosOBEX.exe
C:\Program Files\Toshiba\Bluetooth Toshiba Stack\TosBtBty.exe
C:\Program Files\Toshiba\Bluetooth Toshiba Stack\tosBtProc.exe
C:\WINDOWS\system32\wuauclt.exe
C:\WINDOWS\explorer.exe
C:\WINDOWS\system32\notepad.exe
C:\Program Files\Mozilla Firefox\firefox.exe
C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Local Page = about:blank
R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = *.local
O2 - BHO: AcroIEHelperStub - {18DF081C-E8AD-4283-A596-FA578C2EBDC3} - C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelperShim.dll
O2 - BHO: RealPlayer Download and Record Plugin for Internet Explorer - {3049C3E9-B461-4BC5-8870-4C09146192CA} - C:\Program Files\Real\RealPlayer\rpbrowserrecordplugin.dll
O2 - BHO: (no name) - {5C255C8A-E604-49b4-9D64-90988571CECB} - (no file)
O2 - BHO: Search Helper - {6EBF7485-159F-4bff-A14F-B9E3AAC4465B} - C:\Program Files\Microsoft\Search Enhancement Pack\Search Helper\SEPsearchhelperie.dll
O2 - BHO: Windows Live Sign-in Helper - {9030D464-4C02-4ABF-8ECC-5164760863C6} - C:\Program Files\Common Files\Microsoft Shared\Windows Live\WindowsLiveLogin.dll
O2 - BHO: Windows Live Toolbar Helper - {E15A8DC0-8516-42A1-81EA-DC94EC1ACF10} - C:\Program Files\Windows Live\Toolbar\wltcore.dll
O3 - Toolbar: &Windows Live Toolbar - {21FA44EF-376D-4D53-9B0F-8A89D3229068} - C:\Program Files\Windows Live\Toolbar\wltcore.dll
O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Common Files\Real\Update_OB\realsched.exe" -osboot
O4 - HKLM\..\Run: [Adobe Reader Speed Launcher] "C:\Program Files\Adobe\Reader 9.0\Reader\Reader_sl.exe"
O4 - HKLM\..\Run: [egui] "C:\Program Files\ESET\ESET NOD32 Antivirus\egui.exe" /hide /waitservice
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
O4 - HKUS\S-1-5-18\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'SYSTEM')
O4 - HKUS\.DEFAULT\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'Default user')
O4 - Global Startup: Bluetooth Manager.lnk = ?
O4 - Global Startup: Bluetooth Monitor.lnk = ?
O8 - Extra context menu item: &D&ownload &with BitComet - res://C:\Program Files\BitComet\BitComet.exe/AddLink.htm
O8 - Extra context menu item: &D&ownload all video with BitComet - res://C:\Program Files\BitComet\BitComet.exe/AddVideo.htm
O8 - Extra context menu item: &D&ownload all with BitComet - res://C:\Program Files\BitComet\BitComet.exe/AddAllLink.htm
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~3\Office12\EXCEL.EXE/3000
O9 - Extra button: Blog This - {219C3416-8CB2-491a-A3C7-D9FCDDC9D600} - C:\Program Files\Windows Live\Writer\WriterBrowserExtension.dll
O9 - Extra 'Tools' menuitem: &Blog This in Windows Live Writer - {219C3416-8CB2-491a-A3C7-D9FCDDC9D600} - C:\Program Files\Windows Live\Writer\WriterBrowserExtension.dll
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~3\Office12\REFIEBAR.DLL
O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O16 - DPF: {5ED80217-570B-4DA9-BF44-BE107C0EC166} (Windows Live Safety Center Base Module) - http://cdn.scan.onecare.live.com/resource/...lscbase1140.cab
O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} (WUWebControl Class) - http://www.update.microsoft.com/windowsupd...b?1218913547250
O16 - DPF: {AA07EBD2-EBDD-4BD6-9F8F-114BD513492C} (NeffyLauncherCtl Class) - http://disteng.nefficient.com/disteng/neff...ffyLauncher.cab
O23 - Service: Agere Modem Call Progress Audio (AgereModemAudio) - Agere Systems - C:\WINDOWS\system32\agrsmsvc.exe
O23 - Service: Apple Mobile Device - Apple Inc. - C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
O23 - Service: Ati HotKey Poller - ATI Technologies Inc. - C:\WINDOWS\system32\Ati2evxx.exe
O23 - Service: ATI Smart - Unknown owner - C:\WINDOWS\system32\ati2sgag.exe
O23 - Service: Bonjour Service - Apple Inc. - C:\Program Files\Bonjour\mDNSResponder.exe
O23 - Service: EBKTNPH - Unknown owner - C:\DOCUME~1\gbromov\LOCALS~1\Temp\EBKTNPH.exe (file missing)
O23 - Service: ESET HTTP Server (EhttpSrv) - ESET - C:\Program Files\ESET\ESET NOD32 Antivirus\EHttpSrv.exe
O23 - Service: ESET Service (ekrn) - ESET - C:\Program Files\ESET\ESET NOD32 Antivirus\ekrn.exe
O23 - Service: FLEXnet Licensing Service - Macrovision Europe Ltd. - C:\Program Files\Common Files\Macrovision Shared\FLEXnet Publisher\FNPLicensingService.exe
O23 - Service: Google Update Service (gupdate1c9ede861e4b486) (gupdate1c9ede861e4b486) - Google Inc. - C:\Program Files\Google\Update\GoogleUpdate.exe
O23 - Service: PDAgent - Raxco Software, Inc. - C:\Program Files\Raxco\PerfectDisk10\PDAgent.exe
O23 - Service: PDEngine - Raxco Software, Inc. - C:\Program Files\Raxco\PerfectDisk10\PDEngine.exe
O23 - Service: TOSHIBA Bluetooth Service - TOSHIBA CORPORATION - C:\Program Files\Toshiba\Bluetooth Toshiba Stack\TosBtSrv.exe

--
End of file - 7498 bytes


--------------------------------------------------------------------------------
KASPERSKY ONLINE SCANNER 7.0 REPORT
Sunday, June 21, 2009
Operating System: Microsoft Windows XP Professional Service Pack 3 (build 2600)
Kaspersky Online Scanner version: 7.0.26.13
Program database last update: Saturday, June 20, 2009 23:13:45
Records in database: 2371831
--------------------------------------------------------------------------------

Scan settings:
Scan using the following database: extended
Scan archives: yes
Scan mail databases: yes

Scan area - My Computer:
C:\
D:\
E:\
Z:\

Scan statistics:
Files scanned: 142044
Threat name: 0
Infected objects: 0
Suspicious objects: 0
Duration of the scan: 02:55:23

No malware has been detected. The scan area is clean.

The selected area was scanned.

#8 JSntgRvr

JSntgRvr

    Master Surgeon General


  • Malware Response Team
  • 10,850 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:Puerto Rico
  • Local time:12:27 AM

Posted 20 June 2009 - 10:46 PM

Hi, Kenny Brb :thumbup2:

Logs look clear. How is the computer doing?

No request for help throughout private messaging will be attended.

If I have helped you, consider making a donation to help me continue the fight against Malware!
btn_donate_SM.gif


#9 Kenny Brb

Kenny Brb
  • Topic Starter

  • Members
  • 11 posts
  • OFFLINE
  •  
  • Local time:11:27 PM

Posted 21 June 2009 - 06:34 AM

Apart from the recently discovered overheating issue, it seems to be working fine.

Its speed was never the issue though, what really bothers me are those registry read/write hooks. While I can't imaging what harm could possibly be done with just those 7 functions (maybe apart from hiding some registry entries from scanners), I still am planning to reinstall the windows if there is no way of getting rid of them.

Maybe it's not even a malware, but just some regular application I have installed, but in any case it behaves really virus-like. Changing its name each restart, hiding from the filesystem, hooking immediately after an unhook attempt etc.

Any change you know what application could possible install those hooks?

#10 JSntgRvr

JSntgRvr

    Master Surgeon General


  • Malware Response Team
  • 10,850 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:Puerto Rico
  • Local time:12:27 AM

Posted 21 June 2009 - 11:35 AM

Apart from the recently discovered overheating issue, it seems to be working fine.

Its speed was never the issue though, what really bothers me are those registry read/write hooks. While I can't imaging what harm could possibly be done with just those 7 functions (maybe apart from hiding some registry entries from scanners), I still am planning to reinstall the windows if there is no way of getting rid of them.

Maybe it's not even a malware, but just some regular application I have installed, but in any case it behaves really virus-like. Changing its name each restart, hiding from the filesystem, hooking immediately after an unhook attempt etc.

Any change you know what application could possible install those hooks?

Can you be more especific concerning these hooks? I know Daemon Tools and starforce (Copyright protection) will inject hidden drivers and registry entries to protect themselves from malware, but see no issue in your logs with stealth malware. Give me an example of those hooks you are referring to.

Lets do some housekeeping:

Reset and Re-enable your System Restore to remove bad files that have been backed up by Windows. The files in System Restore are protected to prevent any programmes changing them. This is the only way to clean these files: (You will lose all previous restore points which are likely to be infected.)

To reset your restore points, please note that you will need to log into your computer with an account which has full administrator access. You will know if the account has administrator access because you will be able to see the System Restore tab. If the tab is missing, you are logged in under a limited account.

(Windows XP)

1. Turn off System Restore.
On the Desktop, right-click My Computer.
Click Properties.
Click the System Restore tab.
Check Turn off System Restore.
Click Apply, and then click OK.

2. Reboot.

3. Turn ON System Restore.

On the Desktop, right-click My Computer.
Click Properties.
Click the System Restore tab.
UN-Check *Turn off System Restore*.
Click Apply, and then click OK..

Since the tools we used to scan the computer, as well as tools to delete files and folders, are no longer needed, they should be removed, as well as the folders created by these tools.

Follow these steps to uninstall Combofix
  • Click START then RUN
  • Now type Combofix /u in the runbox and click OK. Note the space between the x and the /u, it needs to be there.

    Posted Image
Create a Restore point (If the above process fails to do so):
  • Click Start, point to All Programs, point to Accessories, point to System Tools, and then click System Restore.
  • In the System Restore dialog box, click Create a restore point, and then click Next.
  • Type a description for your restore point, such as "After Cleanup", then click Create.

No request for help throughout private messaging will be attended.

If I have helped you, consider making a donation to help me continue the fight against Malware!
btn_donate_SM.gif


#11 Kenny Brb

Kenny Brb
  • Topic Starter

  • Members
  • 11 posts
  • OFFLINE
  •  
  • Local time:11:27 PM

Posted 21 June 2009 - 12:30 PM

...I know Daemon Tools and starforce (Copyright protection) will inject hidden drivers and registry entries to protect themselves from malware...


That's about all I needed it seems! :thumbup2:

When i found those unidentified hooks on my PC, after some internet search I read about Daemon Tools being one of the suspects. However after uninstalling it the hooks were still there so I figured it's not it.

Obviously, I was wrong. Its not Deamon Tools itself installing the hooks but the SPTD driver it installs. However, uninstalling daemontools for some weird reason does not install the driver. I just downloaded stand alone SPTD driver and upon start it found the old one being already installed on my PC. Uninstalling it got rid of those hooks for good.

I just keep asking myself, why the heck they had to implement the said driver with such rootkit behaviour. Generating random name on each restart, protecting itself from force unhooks etc.

So, basically, me being paranoid is all my PC has.

I am really sorry for wasting your time with, what turns out to be, non-existing issue.

Thanks for your support though, it is much appreciated!

Edited by Kenny Brb, 21 June 2009 - 12:32 PM.


#12 JSntgRvr

JSntgRvr

    Master Surgeon General


  • Malware Response Team
  • 10,850 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:Puerto Rico
  • Local time:12:27 AM

Posted 21 June 2009 - 11:26 PM

The following is a list of tools and utilities that I like to suggest to people. This list is full of great tools and utilities to help you understand how you got infected and how to keep from getting infected again.
  • Spybot Search & Destroy - Uber powerful tool which can search and annhilate nasties that make it onto your system. Now with an Immunize section that will help prevent future infections.
  • AdAware - Another very powerful tool which searches and kills nasties that infect your system. AdAware and Spybot Search & Destroy compliment each other very well.
  • SpywareBlaster - Great prevention tool to keep nasties from installing on your system.
  • ZonedOut + IE-SpyAd - puts over 5000 sites in your restricted zone so you'll be protected when you visit innocent-looking sites that aren't actually innocent at all.
  • ATF! - Cleans temporary files from IE and Windows, empties the recycle bin and more. Great tool to help speed up your computer and knock out those nasties that like to reside in the temp folders.
  • Windows Updates - It is very important to make sure that both Internet Explorer and Windows are kept current with the latest critical security patches from Microsoft. To do this just start Internet Explorer and select Tools > Windows Update, and follow the online instructions from there.
  • Google Toolbar - Free google toolbar that allows you to use the powerful Google search engine from the bar, but also blocks pop up windows.
  • Trillian or Miranda-IM - These are Malware free Instant Messenger programs which allow you to connect to multiple IM services in one program! (AOL, Yahoo, ICQ, IRC, MSN)
  • ERUNT (Emergency Recovery Utility NT) allows you to keep a complete backup of your registry and restore it when needed. The standard registry backup options that come with Windows back up most of the registry but not all of it. ERUNT however creates a complete backup set, including the Security hive and user related sections. ERUNT is easy to use and since it creates a full backup, there are no options or choices other than to select the location of the backup files. The backup set includes a small executable that will launch the registry restore if needed.
  • Recovery Console - Recent trends appear to indicate that future infections will include attacks to the boot sector of the computer. The installation of the Recovery Console in the computer will be our only defense against this threat. For more information and steps to install the Recovery Console see This Article. Should you need assistance in installing the Recovery Console, please do not hesitate to ask.
To find out more information about how you got infected in the first place and some great guidelines to follow to prevent future infections you can read this article by Miekiemoes.

Best wishes! Posted Image

No request for help throughout private messaging will be attended.

If I have helped you, consider making a donation to help me continue the fight against Malware!
btn_donate_SM.gif





0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users