Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

IE Search Results Redirected to Ads


  • Please log in to reply
16 replies to this topic

#1 Kaltavar

Kaltavar

  • Members
  • 9 posts
  • OFFLINE
  •  
  • Local time:02:31 AM

Posted 21 August 2009 - 03:00 PM

My computer was recently infected with the Windows Antivirus Pro (desot.exe & svchast.exe) virus. And a bunch of others that came with it were caught by Malwarebytes antimalware program. The computer is now mostly normal but 1 symptom remains, some of the time (probably 60%) when I try to click on search result links my browser is redirected to ad sites.

Symantec AV, Trend Micro's Housecall and Malwarebytes programs are unable to find anything and report a clean computer. I've been unable to locate the culprit myself.

Below are scans from the DDS scan and also a scan from HijackThis. Attached is the DDS attachment and the RootRepeal report. Now the RootRepeal report is interesting and seems to have a good culprit listed with this hidden kbiwkmxsflchit service and the kbiwkmkfyldvmk.dll modules. Something keeps opening sqlbrowser.exe a few minutes after I kill the process tree too. The sqlbrowser.exe file is located in the correct directory and has the Microsoft digital signature though so I overlooked it's restarting. I will wait to see if anyone has advice on how to deal with this kbiwkmxsflchit thing, or there's something else entirely I'm missing.

DDR:


DDS (Ver_09-07-30.01) - NTFSx86
Internet Explorer: 7.0.5730.13
AV: Symantec AntiVirus Corporate Edition *On-access scanning disabled* (Updated) {FB06448E-52B8-493A-90F3-E43226D3305C}

============== Running Processes ===============


============== Pseudo HJT Report ===============

uSearch Page = hxxp://www.google.com
uSearch Bar = hxxp://www.google.com/ie
mDefault_Search_URL = hxxp://www.google.com/ie
mSearch Page = hxxp://www.google.com
mStart Page = hxxp://www.google.com
BHO: Adobe PDF Reader Link Helper: {06849e9f-c8d7-4d59-b87d-784b7d6be0b3} - c:\program files\common files\adobe\acrobat\activex\AcroIEHelper.dll
BHO: DIALux 3.1 ULDBrowserHelper Class: {69ab812a-8ce4-4bf3-b49b-3b60a9f31fb2} - c:\program files\dialux\DLXShellExtension.dll
uRun: [ctfmon.exe] c:\windows\system32\ctfmon.exe
mRun: [ccApp] "c:\program files\common files\symantec shared\ccApp.exe"
mRun: [DiskeeperSystray] "c:\program files\diskeeper corporation\diskeeper\DkIcon.exe"
mRun: [Act.Outlook.Service] "c:\program files\act\act for windows\Act.Outlook.Service.exe"
mRun: [Act! Preloader] "c:\program files\act\act for windows\ActSage.exe" -preload
mRun: [Adobe Reader Speed Launcher] "c:\program files\adobe\reader 8.0\reader\Reader_sl.exe"
mPolicies-explorer: NoWelcomeScreen = 1 (0x1)
IE: E&xport to Microsoft Excel - c:\progra~1\micros~2\office11\EXCEL.EXE/3000
IE: {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe
IE: {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - {CAFEEFAC-0016-0000-0007-ABCDEFFEDCBC} - c:\program files\java\jre1.6.0_07\bin\ssv.dll
IE: {6F431AC3-364A-478b-BBDB-89C7CE1B18F6} - {6F431AC3-364A-478b-BBDB-89C7CE1B18F6} - mscoree.dll
IE: {92780B25-18CC-41C8-B9BE-3C9C571A8263} - {FF059E31-CC5A-4E2E-BF3B-96E929D65503} - c:\progra~1\micros~2\office11\REFIEBAR.DLL
DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} - hxxp://www.update.microsoft.com/windowsupdate/v6/V5Controls/en/x86/client/wuweb_site.cab?1197937556859
DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} - hxxp://www.update.microsoft.com/microsoftupdate/v6/V5Controls/en/x86/client/muweb_site.cab?1197937665546
DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_07-windows-i586.cab
DPF: {CAFEEFAC-0016-0000-0003-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_03-windows-i586.cab
DPF: {CAFEEFAC-0016-0000-0005-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_05-windows-i586.cab
DPF: {CAFEEFAC-0016-0000-0007-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_07-windows-i586.cab
DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_07-windows-i586.cab
DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} - hxxp://fpdownload2.macromedia.com/get/shockwave/cabs/flash/swflash.cab
TCP: {FF3845B5-8F87-4557-B1BC-79B928B5DE73} = 172.16.0.200,66.180.96.12
Handler: dialux - {8352FA4C-39C6-11D3-ADBA-00A0244FB1A2} - c:\program files\dialux\DLXToolBox.dll
Notify: igfxcui - igfxsrvc.dll
Notify: NavLogon - c:\windows\system32\NavLogon.dll

============= SERVICES / DRIVERS ===============


=============== Created Last 30 ================

2009-08-21 13:01 <DIR> --d----- c:\program files\Trend Micro
2009-08-20 16:30 <DIR> --d----- c:\docume~1\mjohns~1\applic~1\Malwarebytes
2009-08-20 16:30 38,160 a------- c:\windows\system32\drivers\mbamswissarmy.sys
2009-08-20 16:30 19,096 a------- c:\windows\system32\drivers\mbam.sys
2009-08-20 16:30 <DIR> --d----- c:\docume~1\alluse~1\applic~1\Malwarebytes
2009-08-20 16:29 <DIR> --d----- c:\program files\Malwarebytes' Anti-Malware
2009-08-20 15:05 102,664 a------- c:\windows\system32\drivers\tmcomm.sys
2009-08-20 14:22 10,752 a------- c:\windows\DCEBoot.exe
2009-08-20 11:07 <DIR> a-d----- c:\windows\system32\images
2009-08-19 15:02 19,968 a------- c:\windows\system32\uacserf.dll
2009-08-19 15:02 30,208 a------- c:\windows\system32\uacrem.dll
2009-08-19 15:01 1,110,399 a------- c:\windows\system32\uacmal.db
2009-08-19 15:01 174 a------- c:\windows\system32\uacsr.dat
2009-08-19 14:53 <DIR> --d----- c:\program files\PocketRAR

==================== Find3M ====================

2009-08-21 13:30 1,682 a--sh--- c:\docume~1\alluse~1\applic~1\KGyGaAvL.sys
2008-10-02 14:18 168 ---shr-- c:\docume~1\alluse~1\applic~1\5D2CBDA77D.sys
2008-10-24 12:56 32,768 a--sh--- c:\windows\temp\cookies\index.dat
2008-10-24 12:56 49,152 a--sh--- c:\windows\temp\history\history.ie5\index.dat
2008-10-24 12:56 180,224 a--sh--- c:\windows\temp\temporary internet files\content.ie5\index.dat

============= FINISH: 14:06:19.03 ===============

HJT:

Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 1:01:47 PM, on 8/21/2009
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v7.00 (7.00.6000.16735)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Common Files\Symantec Shared\ccSetMgr.exe
C:\Program Files\Common Files\Symantec Shared\SPBBC\SPBBCSvc.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Symantec AntiVirus\DefWatch.exe
C:\Program Files\Diskeeper Corporation\Diskeeper\DkService.exe
C:\Program Files\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE
C:\Program Files\Microsoft SQL Server\MSSQL.1\MSSQL\Binn\sqlservr.exe
C:\Program Files\Common Files\Protexis\License Service\PsiService_2.exe
C:\Program Files\Microsoft SQL Server\90\Shared\sqlwriter.exe
C:\Program Files\Common Files\Symantec Shared\ccEvtMgr.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\Common Files\Symantec Shared\ccApp.exe
C:\Program Files\ACT\Act for Windows\Act.Outlook.Service.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Microsoft Office\OFFICE11\OUTLOOK.EXE
C:\Program Files\Microsoft Office\OFFICE11\WINWORD.EXE
C:\Program Files\Adobe\Reader 8.0\Reader\AcroRd32.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant =
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,CustomizeSearch =
R1 - HKCU\Software\Microsoft\Internet Connection Wizard,ShellNext = http://go.microsoft.com/fwlink/?LinkId=74005
O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelper.dll
O2 - BHO: DIALux 3.1 ULDBrowserHelper Class - {69AB812A-8CE4-4BF3-B49B-3B60A9F31FB2} - C:\Program Files\DIALux\DLXShellExtension.dll
O4 - HKLM\..\Run: [ccApp] "C:\Program Files\Common Files\Symantec Shared\ccApp.exe"
O4 - HKLM\..\Run: [DiskeeperSystray] "C:\Program Files\Diskeeper Corporation\Diskeeper\DkIcon.exe"
O4 - HKLM\..\Run: [Act.Outlook.Service] "C:\Program Files\ACT\Act for Windows\Act.Outlook.Service.exe"
O4 - HKLM\..\Run: [Act! Preloader] "C:\Program Files\ACT\Act for Windows\ActSage.exe" -preload
O4 - HKLM\..\Run: [Adobe Reader Speed Launcher] "C:\Program Files\Adobe\Reader 8.0\Reader\Reader_sl.exe"
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
O4 - HKUS\S-1-5-21-940388142-2270075148-2440478034-1133\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe (User '?')
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\OFFICE11\EXCEL.EXE/3000
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_07\bin\ssv.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_07\bin\ssv.dll
O9 - Extra button: Attach Web page to ACT! contact - {6F431AC3-364A-478b-BBDB-89C7CE1B18F6} - mscoree.dll (file missing)
O9 - Extra 'Tools' menuitem: Attach Web page to ACT! contact... - {6F431AC3-364A-478b-BBDB-89C7CE1B18F6} - mscoree.dll (file missing)
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\OFFICE11\REFIEBAR.DLL
O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} (WUWebControl Class) - http://www.update.microsoft.com/windowsupd...b?1197937556859
O16 - DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} (MUWebControl Class) - http://www.update.microsoft.com/microsoftu...b?1197937665546
O16 - DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} (Shockwave Flash Object) - http://fpdownload2.macromedia.com/get/shoc...ash/swflash.cab
O17 - HKLM\System\CCS\Services\Tcpip\..\{FF3845B5-8F87-4557-B1BC-79B928B5DE73}: NameServer = 172.16.0.200,66.180.96.12
O23 - Service: ACT! Scheduler - Sage Software, Inc. - C:\Program Files\ACT\Act for Windows\Act.Scheduler.exe
O23 - Service: Symantec Event Manager (ccEvtMgr) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccEvtMgr.exe
O23 - Service: Symantec Settings Manager (ccSetMgr) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccSetMgr.exe
O23 - Service: Symantec AntiVirus Definition Watcher (DefWatch) - Symantec Corporation - C:\Program Files\Symantec AntiVirus\DefWatch.exe
O23 - Service: Diskeeper - Diskeeper Corporation - C:\Program Files\Diskeeper Corporation\Diskeeper\DkService.exe
O23 - Service: Google Updater Service (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
O23 - Service: LiveUpdate - Symantec Corporation - C:\PROGRA~1\Symantec\LIVEUP~1\LUCOMS~1.EXE
O23 - Service: Protexis Licensing V2 (PSI_SVC_2) - Protexis Inc. - C:\Program Files\Common Files\Protexis\License Service\PsiService_2.exe
O23 - Service: SAVRoam (SavRoam) - symantec - C:\Program Files\Symantec AntiVirus\SavRoam.exe
O23 - Service: Symantec Network Drivers Service (SNDSrvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\SNDSrvc.exe
O23 - Service: Symantec SPBBCSvc (SPBBCSvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\SPBBC\SPBBCSvc.exe
O23 - Service: Symantec AntiVirus - Symantec Corporation - C:\Program Files\Symantec AntiVirus\Rtvscan.exe

--
End of file - 6598 bytes

Attached Files



BC AdBot (Login to Remove)

 


#2 Buckeye_Sam

Buckeye_Sam

    Malware Expert


  • Members
  • 17,382 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Pickerington, Ohio
  • Local time:02:31 AM

Posted 23 August 2009 - 04:16 PM

Hello! :thumbup2:
My name is Sam and I will be helping you.

In order to see what's going on with your computer I'll ask for you to post various logs from the tools that we will use to resolve your issue. Please also share with me any information about how your computer is reacting and behaving each step of the way as we work through this process.



Please download ComboFix from one of these locations:

Link 1
Link 2
Link 3

Important!
You should NOT use Combofix unless you have been instructed to do so by a Malware Removal Expert.
It is intended by its creator to be used under the guidance and supervision of an Malware Removal Expert, not for private use.
Using this tool incorrectly could lead to disastrous problems with your operating system such as preventing it from ever starting again.



Make sure that you save ComboFix.exe to your Desktop
  • Disable your AntiVirus and AntiSpyware applications, usually via a right click on the System Tray icon. They may otherwise interfere with our tools

  • Double click on ComboFix.exe & follow the prompts.

  • As part of it's process, ComboFix will check to see if the Microsoft Windows Recovery Console is installed. With malware infections being as they are today, it's strongly recommended to have this pre-installed on your machine before doing any malware removal. It will allow you to boot up into a special recovery/repair mode that will allow us to more easily help you should your computer have a problem after an attempted removal of malware.

  • Follow the prompts to allow ComboFix to download and install the Microsoft Windows Recovery Console, and when prompted, agree to the End-User License Agreement to install the Microsoft Windows Recovery Console.
**Please note: If the Microsoft Windows Recovery Console is already installed, ComboFix will continue it's malware removal procedures.


Posted Image


Once the Microsoft Windows Recovery Console is installed using ComboFix, you should see the following message:

Posted Image


Click on Yes, to continue scanning for malware.

When finished, it shall produce a log for you. Please include the C:\ComboFix.txt in your next reply.
Posted Image If I have helped you in any way, please consider a donation to help me continue the fight against malware.


Failing to respond back to the person that is giving up their own time to help you not only is insensitive and disrespectful, but it guarantees that you will never receive help from me again. Please thank your helpers and there will always be help here when you need it!


========================================================

#3 Kaltavar

Kaltavar
  • Topic Starter

  • Members
  • 9 posts
  • OFFLINE
  •  
  • Local time:02:31 AM

Posted 24 August 2009 - 08:43 AM

I'm unable to run it completely. I downloaded it and placed it on my desktop. When I launch combofix.exe, a blue DOS or command line type box comes up and says it's preparing to run.

Then it just closes and nothing happens. It never gets to the part where it checks for Virtual Console, or proceeds with any scan or report.

I have tried running the program in safe mode and it made no change.

I also discovered that my password no longer works if I attempt to log in in safe mode without networking. I must be logging in with networking or can't log in.

#4 Buckeye_Sam

Buckeye_Sam

    Malware Expert


  • Members
  • 17,382 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Pickerington, Ohio
  • Local time:02:31 AM

Posted 24 August 2009 - 11:21 AM

Go ahead and delete combofix.exe off your desktop.

Download Combofix from any of the links below. You must rename it before saving it. Save it to your desktop.

Link 1
Link 2
Link 3

Posted Image


Posted Image
--------------------------------------------------------------------

Double click on Combo-Fix.exe & follow the prompts.
  • When finished, it will produce a report for you.
  • Please post the C:\ComboFix.txt so we can continue cleaning the system.

Posted Image If I have helped you in any way, please consider a donation to help me continue the fight against malware.


Failing to respond back to the person that is giving up their own time to help you not only is insensitive and disrespectful, but it guarantees that you will never receive help from me again. Please thank your helpers and there will always be help here when you need it!


========================================================

#5 Kaltavar

Kaltavar
  • Topic Starter

  • Members
  • 9 posts
  • OFFLINE
  •  
  • Local time:02:31 AM

Posted 25 August 2009 - 11:49 AM

I deleted the original, downloaded it again, changed the name to combo-fix.exe. Unfortunately this made no difference. I also tried changing the name to asdf.exe with no change. I tried several times, one time it got as far as 'attempting to create a system restore point' before it crashed, but the rest of the time it was still 'preparing to run'.

There is no error, message, report or anything when it ends. The window simply closes and nothing more happens.

#6 Buckeye_Sam

Buckeye_Sam

    Malware Expert


  • Members
  • 17,382 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Pickerington, Ohio
  • Local time:02:31 AM

Posted 25 August 2009 - 01:05 PM

Open RootRepeal, click the Files tab and select Scan. Right click and select Wipe File on:

C:\WINDOWS\system32\kbiwkmkfyldvmk.dll
C:\WINDOWS\system32\kbiwkmofgdkfir.dll
C:\WINDOWS\system32\kbiwkmvyaekcuy.dat
C:\WINDOWS\system32\kbiwkmxuudpvbh.dat
C:\WINDOWS\Temp\kbiwkmyritvxtueo.tmp
C:\WINDOWS\system32\drivers\kbiwkmmwicnmou.sys


Next click theHidden Services tab and select Scan. right click and select Wipe File on:

kbiwkmxsflchit


Reboot your machine


Please post a new report from RootRepeal.

Also try to run Combofix once again and post that log if it runs successfully.
Posted Image If I have helped you in any way, please consider a donation to help me continue the fight against malware.


Failing to respond back to the person that is giving up their own time to help you not only is insensitive and disrespectful, but it guarantees that you will never receive help from me again. Please thank your helpers and there will always be help here when you need it!


========================================================

#7 Kaltavar

Kaltavar
  • Topic Starter

  • Members
  • 9 posts
  • OFFLINE
  •  
  • Local time:02:31 AM

Posted 25 August 2009 - 01:20 PM

OK. There were several more kbiwkm* files on the files report and I wiped them all.

On the hidden services tab, I selected "wipe file" and it says "Successfully wiped the file!" but it's still there on the list and does not disappear off. Re-scanning also has it remaining on my list. I also tried force delete with the same results (success message without removing it from the list). I'm about to try to restart and will try again with rootrepeal and combofix.

edit:

Upon restart, I tried Combo-fix.exe again and the same issue remains.

I ran rootrepeal again, and in the files tab, all these files now are still gone and a scan returns no results at all.

In the hidden services tab, I still have the same service remaining.

Hidden Services
-------------------
Service Name: kbiwkmxsflchit
Image Path: C:\WINDOWS\system32\drivers\kbiwkmmwicnmou.sys

Edited by Kaltavar, 25 August 2009 - 01:30 PM.


#8 Buckeye_Sam

Buckeye_Sam

    Malware Expert


  • Members
  • 17,382 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Pickerington, Ohio
  • Local time:02:31 AM

Posted 25 August 2009 - 01:55 PM

Please post the entire report from RootRepeal so I can review the entire log.
Posted Image If I have helped you in any way, please consider a donation to help me continue the fight against malware.


Failing to respond back to the person that is giving up their own time to help you not only is insensitive and disrespectful, but it guarantees that you will never receive help from me again. Please thank your helpers and there will always be help here when you need it!


========================================================

#9 Kaltavar

Kaltavar
  • Topic Starter

  • Members
  • 9 posts
  • OFFLINE
  •  
  • Local time:02:31 AM

Posted 25 August 2009 - 02:10 PM

ROOTREPEAL © AD, 2007-2009
==================================================
Scan Start Time: 2009/08/25 14:17
Program Version: Version 1.3.5.0
Windows Version: Windows XP SP2
==================================================

Drivers
-------------------
Name: 6.tmp
Image Path: C:\WINDOWS\system32\6.tmp
Address: 0xF7A2F000 Size: 6144 File Visible: No Signed: -
Status: -

Name: dump_atapi.sys
Image Path: C:\WINDOWS\System32\Drivers\dump_atapi.sys
Address: 0xEE9CD000 Size: 98304 File Visible: No Signed: -
Status: -

Name: dump_WMILIB.SYS
Image Path: C:\WINDOWS\System32\Drivers\dump_WMILIB.SYS
Address: 0xF79FD000 Size: 8192 File Visible: No Signed: -
Status: -

Name: rootrepeal.sys
Image Path: C:\WINDOWS\system32\drivers\rootrepeal.sys
Address: 0xF7617000 Size: 49152 File Visible: No Signed: -
Status: -

SSDT
-------------------
#: 031 Function Name: NtConnectPort
Status: Hooked by "<unknown>" at address 0x8621ecf0

#: 065 Function Name: NtDeleteValueKey
Status: Hooked by "C:\WINDOWS\system32\Drivers\SYMEVENT.SYS" at address 0xeedd8350

#: 177 Function Name: NtQueryValueKey
Status: Hooked by "<unknown>" at address 0x862210a8

#: 206 Function Name: NtResumeThread
Status: Hooked by "<unknown>" at address 0x86188610

#: 247 Function Name: NtSetValueKey
Status: Hooked by "C:\WINDOWS\system32\Drivers\SYMEVENT.SYS" at address 0xeedd8580

Hidden Services
-------------------
Service Name: kbiwkmxsflchit
Image Path: C:\WINDOWS\system32\drivers\kbiwkmmwicnmou.sys

==EOF==

Attached Files

  • Attached File  ark.txt   4.33KB   2 downloads


#10 Buckeye_Sam

Buckeye_Sam

    Malware Expert


  • Members
  • 17,382 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Pickerington, Ohio
  • Local time:02:31 AM

Posted 25 August 2009 - 02:37 PM

1. Please download The Avenger2 by Swandog46 to your Desktop.
  • Right click on the Avenger.zip folder and select "Extract All..."
  • Follow the prompts and extract the avenger folder to your desktop
2. Copy all the text contained in the code box below to your Clipboard by highlighting it and pressing (Ctrl+C):

Drivers to delete:
kbiwkmxsflchit

Note: the above code was created specifically for this user. If you are not this user, do NOT follow these directions as they could damage the workings of your system.


3. Now, open the avenger folder and start The Avenger program by clicking on its icon.
  • Right click on the window under Input script here:, and select Paste.
  • You can also Paste the text copied to the clipboard into this window by pressing (Ctrl+V), or click on the third button under the menu to paste it from the clipboard.
  • Click on Execute
  • Answer "Yes" twice when prompted.
4. The Avenger will automatically do the following:
  • It will Restart your computer. ( In cases where the code to execute contains "Drivers to Delete" or "Drivers to Disable", The Avenger will actually restart your system twice.)
  • On reboot, it will briefly open a black command window on your desktop, this is normal.
  • After the restart, it creates a log file that should open with the results of Avengerís actions. This log file will be located at C:\avenger.txt
  • The Avenger will also have backed up all the files, etc., that you asked it to delete, and will have zipped them and moved the zip archives to C:\avenger\backup.zip.
5. Please copy/paste the content of c:\avenger.txt into your reply.



=======================



Please update Malwarebytes and run a full scan.
  • Open Malwarebytes and select the Update tab.
  • Click on the Check for Updates button and allow the program to download the latest updates.
  • Once you have the latest updates, select the Scanner tab.
  • Select "Perform full scan" and click the Scan button.
  • If asked to select the drives to scan, leave all the drives selected and click on the Start Scan button.
  • The scan will begin and "Scan in progress" will show at the top. It may take some time to complete so please be patient.
  • When the scan is finished, a message box will say "The scan completed successfully. Click 'Show Results' to display all objects found".
  • Click OK to close the message box and continue with the removal process.
  • Back at the main Scanner screen, click on the Show Results button to see a list of any malware that was found.
  • Make sure that everything is checked, and click Remove Selected.
  • When removal is completed, a log report will open in Notepad and you may be prompted to restart your computer. (see Note below)
  • The log is automatically saved and can be viewed by clicking the Logs tab in MBAM.
  • Copy and paste the contents of that report in your next reply and exit MBAM.
Note: If MBAM encounters a file that is difficult to remove, you will be presented with 1 of 2 prompts. Click OK to either and let MBAM proceed with the disinfection process. If asked to restart the computer, please do so immediately. Failure to reboot will prevent MBAM from removing all the malware.
Posted Image If I have helped you in any way, please consider a donation to help me continue the fight against malware.


Failing to respond back to the person that is giving up their own time to help you not only is insensitive and disrespectful, but it guarantees that you will never receive help from me again. Please thank your helpers and there will always be help here when you need it!


========================================================

#11 Kaltavar

Kaltavar
  • Topic Starter

  • Members
  • 9 posts
  • OFFLINE
  •  
  • Local time:02:31 AM

Posted 25 August 2009 - 03:02 PM

Upon restart I recieved an error message, "Unable to locate C:\cleaner.exe" I believe it said. It may be irrelevant.

Copy of the log:

Logfile of The Avenger Version 2.0, © by Swandog46
http://swandog46.geekstogo.com

Platform: Windows XP

*******************

Script file opened successfully.
Script file read successfully.

Backups directory opened successfully at C:\Avenger

*******************

Beginning to process script file:

Rootkit scan active.
No rootkits found!

Driver "kbiwkmxsflchit" deleted successfully.

Completed script processing.

*******************

Finished! Terminate.

RootRepeal log:

ROOTREPEAL © AD, 2007-2009
==================================================
Scan Start Time: 2009/08/25 15:12
Program Version: Version 1.3.5.0
Windows Version: Windows XP SP2
==================================================

Drivers
-------------------
Name: dump_atapi.sys
Image Path: C:\WINDOWS\System32\Drivers\dump_atapi.sys
Address: 0xEEA2F000 Size: 98304 File Visible: No Signed: -
Status: -

Name: dump_WMILIB.SYS
Image Path: C:\WINDOWS\System32\Drivers\dump_WMILIB.SYS
Address: 0xF79C9000 Size: 8192 File Visible: No Signed: -
Status: -

Name: obkbh.sys
Image Path: obkbh.sys
Address: 0xF7497000 Size: 61440 File Visible: No Signed: -
Status: -

Name: PROCEXP111.SYS
Image Path: C:\WINDOWS\system32\Drivers\PROCEXP111.SYS
Address: 0xF7A23000 Size: 7872 File Visible: No Signed: -
Status: -

Name: rootrepeal.sys
Image Path: C:\WINDOWS\system32\drivers\rootrepeal.sys
Address: 0xEE02C000 Size: 49152 File Visible: No Signed: -
Status: -

SSDT
-------------------
#: 031 Function Name: NtConnectPort
Status: Hooked by "<unknown>" at address 0x8620ebc8

#: 065 Function Name: NtDeleteValueKey
Status: Hooked by "C:\WINDOWS\system32\Drivers\SYMEVENT.SYS" at address 0xeedd8350

#: 177 Function Name: NtQueryValueKey
Status: Hooked by "<unknown>" at address 0x8608d680

#: 206 Function Name: NtResumeThread
Status: Hooked by "<unknown>" at address 0x85d484a0

#: 247 Function Name: NtSetValueKey
Status: Hooked by "C:\WINDOWS\system32\Drivers\SYMEVENT.SYS" at address 0xeedd8580

==EOF==

MalwareBytes anti-malware program has updated from version 2667 to 2695 and I will run a full scan. I'll post when it's finished, don't know how long it will take, but it appears to have removed the problem.

#12 Kaltavar

Kaltavar
  • Topic Starter

  • Members
  • 9 posts
  • OFFLINE
  •  
  • Local time:02:31 AM

Posted 25 August 2009 - 03:39 PM

Antimalware found a few more remains of the Antivirus Pro bug this time around.

Malwarebytes' Anti-Malware 1.40
Database version: 2695
Windows 5.1.2600 Service Pack 2

8/25/2009 3:51:22 PM
mbam-log-2009-08-25 (15-51-22).txt

Scan type: Full Scan (C:\|)
Objects scanned: 165737
Time elapsed: 27 minute(s), 32 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 1
Registry Data Items Infected: 0
Folders Infected: 1
Files Infected: 2

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
HKEY_USERS\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\minix32 (Rogue.WinAntivirusPro) -> Quarantined and deleted successfully.

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
C:\Program Files\Windows AntiVirus Pro (Rogue.WindowsAntiVirusPro) -> Quarantined and deleted successfully.

Files Infected:
C:\WINDOWS\system32\minix32.exe (Rogue.WinAntivirusPro) -> Quarantined and deleted successfully.
C:\Program Files\Windows AntiVirus Pro\ANTI_files.exe (Rogue.WindowsAntiVirusPro) -> Quarantined and deleted successfully.


Should I attempt to run combofix now to see if it will run?

#13 Buckeye_Sam

Buckeye_Sam

    Malware Expert


  • Members
  • 17,382 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Pickerington, Ohio
  • Local time:02:31 AM

Posted 25 August 2009 - 05:43 PM

Yes, try Combofix again. But first delete the copy that you downloaded previously and download a fresh copy.
Posted Image If I have helped you in any way, please consider a donation to help me continue the fight against malware.


Failing to respond back to the person that is giving up their own time to help you not only is insensitive and disrespectful, but it guarantees that you will never receive help from me again. Please thank your helpers and there will always be help here when you need it!


========================================================

#14 Kaltavar

Kaltavar
  • Topic Starter

  • Members
  • 9 posts
  • OFFLINE
  •  
  • Local time:02:31 AM

Posted 26 August 2009 - 07:42 AM

Combofix ran successfully.

ComboFix 09-08-25.01 - 08/25/2009 15:58.1.1 - NTFSx86
AV: Symantec AntiVirus Corporate Edition *On-access scanning disabled* (Updated) {FB06448E-52B8-493A-90F3-E43226D3305C}
* Created a new restore point

WARNING -THIS MACHINE DOES NOT HAVE THE RECOVERY CONSOLE INSTALLED !!
.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.

c:\docume~1\M~1\LOCALS~1\Temp\catchme.dll
c:\documents and settings\~\Local Settings\Temp\catchme.dll
c:\windows\Installer\5fc719.msp
c:\windows\run.log
c:\windows\system32\config\systemprofile\Start Menu\Programs\Windows Antivirus Pro
c:\windows\system32\config\systemprofile\Start Menu\Programs\Windows Antivirus Pro\Windows Antivirus Pro.lnk
c:\windows\system32\drivers\kbiwkmmwicnmou.sys
c:\windows\system32\images
c:\windows\system32\images\i1.gif
c:\windows\system32\images\i2.gif
c:\windows\system32\images\i3.gif
c:\windows\system32\images\j1.gif
c:\windows\system32\images\j2.gif
c:\windows\system32\images\j3.gif
c:\windows\system32\images\jj1.gif
c:\windows\system32\images\jj2.gif
c:\windows\system32\images\jj3.gif
c:\windows\system32\images\l1.gif
c:\windows\system32\images\l2.gif
c:\windows\system32\images\l3.gif
c:\windows\system32\images\pix.gif
c:\windows\system32\images\t1.gif
c:\windows\system32\images\t2.gif
c:\windows\system32\images\up1.gif
c:\windows\system32\images\up2.gif
c:\windows\system32\images\w1.gif
c:\windows\system32\images\w11.gif
c:\windows\system32\images\w2.gif
c:\windows\system32\images\w3.gif
c:\windows\system32\images\w3.jpg
c:\windows\system32\images\wt1.gif
c:\windows\system32\images\wt2.gif
c:\windows\system32\images\wt3.gif
c:\windows\system32\kbiwkmkfyldvmk.dll
c:\windows\system32\kbiwkmofgdkfir.dll
c:\windows\system32\kbiwkmvyaekcuy.dat
c:\windows\system32\kbiwkmxuudpvbh.dat
c:\windows\system32\mdm.exe

.
((((((((((((((((((((((((( Files Created from 2009-07-25 to 2009-08-25 )))))))))))))))))))))))))))))))
.

2009-08-25 20:04 . 2009-08-25 20:04 0 ----a-w- C:\backup.reg
2009-08-25 20:04 . 2009-08-25 20:04 574 ----a-w- C:\cleanup.bat
2009-08-25 20:04 . 2009-08-25 20:04 135168 ----a-w- C:\zip.exe
2009-08-25 18:56 . 2009-08-25 18:56 -------- d-----w- c:\program files\Sophos
2009-08-25 16:58 . 2009-08-25 16:58 -------- d-s---w- C:\asdf
2009-08-24 13:48 . 2009-08-24 13:49 -------- d-s---w- C:\ComboFixr
2009-08-24 13:46 . 2009-08-24 13:48 -------- d-s---w- C:\ComboFix
2009-08-21 18:01 . 2009-08-21 18:01 -------- d-----w- c:\program files\Trend Micro
2009-08-20 21:30 . 2009-08-20 21:30 -------- d-----w- c:\documents and settings\~\Application Data\Malwarebytes
2009-08-20 21:30 . 2009-08-03 18:36 38160 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2009-08-20 21:30 . 2009-08-20 21:30 -------- d-----w- c:\documents and settings\All Users\Application Data\Malwarebytes
2009-08-20 21:30 . 2009-08-03 18:36 19096 ----a-w- c:\windows\system32\drivers\mbam.sys
2009-08-20 21:29 . 2009-08-20 21:30 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
2009-08-20 20:05 . 2008-10-24 16:52 102664 ----a-w- c:\windows\system32\drivers\tmcomm.sys
2009-08-19 19:53 . 2009-08-19 19:53 -------- d-----w- c:\program files\PocketRAR

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2009-08-21 18:30 . 2007-12-18 19:20 1682 --sha-w- c:\documents and settings\All Users\Application Data\KGyGaAvL.sys
2009-08-21 18:30 . 2007-12-18 19:20 1682 --sha-w- c:\documents and settings\All Users\Application Data\KGyGaAvL.sys
2009-08-19 19:50 . 2007-12-18 00:24 -------- d-----w- c:\program files\Symantec AntiVirus
.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"ccApp"="c:\program files\Common Files\Symantec Shared\ccApp.exe" [2006-11-21 52840]
"DiskeeperSystray"="c:\program files\Diskeeper Corporation\Diskeeper\DkIcon.exe" [2005-11-22 221184]
"Act.Outlook.Service"="c:\program files\ACT\Act for Windows\Act.Outlook.Service.exe" [2008-08-01 28672]
"Act! Preloader"="c:\program files\ACT\Act for Windows\ActSage.exe" [2008-08-01 393216]
"Adobe Reader Speed Launcher"="c:\program files\Adobe\Reader 8.0\Reader\Reader_sl.exe" [2008-10-15 39792]

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\explorer]
"NoWelcomeScreen"= 1 (0x1)

[HKEY_LOCAL_MACHINE\software\microsoft\security center]
"AntiVirusOverride"=dword:00000001
"FirewallOverride"=dword:00000001

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecAntiVirus]
"DisableMonitoring"=dword:00000001

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]
"EnableFirewall"= 0 (0x0)

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=

R2 ACT! Scheduler;ACT! Scheduler;c:\program files\ACT\Act for Windows\Act.Scheduler.exe [2008-08-01 81920]
R2 Parclass;Parclass;c:\windows\System32\Drivers\Parclass.sys [2000-04-04 19824]
R3 MEMSWEEP2;MEMSWEEP2;c:\windows\system32\6.tmp [x]
R3 PZQK;PZQK;c:\docume~1\MJOHNS~1\LOCALS~1\Temp\PZQK.exe [x]
R3 SavRoam;SavRoam;c:\program files\Symantec AntiVirus\SavRoam.exe [2007-03-15 116416]
S2 MSSQL$ACT7;SQL Server (ACT7);c:\program files\Microsoft SQL Server\MSSQL.1\MSSQL\Binn\sqlservr.exe [2007-02-10 29178224]
S3 EraserUtilRebootDrv;EraserUtilRebootDrv;c:\program files\Common Files\Symantec Shared\EENGINE\EraserUtilRebootDrv.sys [2009-03-16 101936]

.
.
------- Supplementary Scan -------
.
mStart Page = hxxp://www.google.com
IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~2\OFFICE11\EXCEL.EXE/3000
TCP: {FF3845B5-8F87-4557-B1BC-79B928B5DE73} = 172.16.0.200,66.180.96.12
.

**************************************************************************

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2009-08-25 16:02
Windows 5.1.2600 Service Pack 2 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully
hidden files: 0

**************************************************************************

[HKEY_LOCAL_MACHINE\System\ControlSet001\Services\MEMSWEEP2]
"ImagePath"="\??\c:\windows\system32\6.tmp"
.
Completion time: 2009-08-25 16:04
ComboFix-quarantined-files.txt 2009-08-25 21:04

Pre-Run: 145,124,790,272 bytes free
Post-Run: 145,282,101,248 bytes free

126

The redirecting seems to have gone away as well. Thank you for your help.

#15 Buckeye_Sam

Buckeye_Sam

    Malware Expert


  • Members
  • 17,382 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Pickerington, Ohio
  • Local time:02:31 AM

Posted 26 August 2009 - 11:02 AM

Did Combofix prompt you to install the Recovery Console?

Copy and paste ALL the following text in the Quote box below into Notepad.
Click on File(in the menu at the top)>Save as../Save as Type: 'All Files' /File name: CFScript to your desktop.

Driver::
MEMSWEEP2
PZQK

File::
c:\windows\system32\6.tmp
Prior to running Combofix.exe you should disable your antivirus program.

Now drag then drop the CFScript file onto ComboFix.exe as seen in the image below.

Posted Image

This will start ComboFix again.
After reboot, (in case it asks to reboot), post the contents of Combofix.txt in your next reply.



How is your computer behaving now? Any remaining problems?
Posted Image If I have helped you in any way, please consider a donation to help me continue the fight against malware.


Failing to respond back to the person that is giving up their own time to help you not only is insensitive and disrespectful, but it guarantees that you will never receive help from me again. Please thank your helpers and there will always be help here when you need it!


========================================================




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users