Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Vundo infection ... possibly others as well


  • This topic is locked This topic is locked
2 replies to this topic

#1 bustamove

bustamove

  • Members
  • 25 posts
  • OFFLINE
  •  
  • Local time:01:38 AM

Posted 14 October 2009 - 06:37 PM

I have run malware bytes, a squared, and super anti spyware with no luck fully removing the infection. I had the Comodo firewall but removed it recently and wouldn't you know it I got infected :(

Any help is greatly appreciated


DDS (Ver_09-10-13.01) - NTFSx86
Run by Alex at 18:32:05.48 on Wed 10/14/2009
Internet Explorer: 7.0.5730.13 BrowserJavaVersion: 1.6.0_15
Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.2046.1200 [GMT -4:00]

AV: VirusScan Enterprise + AntiSpyware Enterprise *On-access scanning enabled* (Updated) {918A2B0B-2C60-4016-A4AB-E868DEABF7F0}
FW: COMODO Firewall *enabled* {043803A3-4F86-4ef6-AFC5-F6E02A79969B}

============== Running Processes ===============

D:\WINDOWS\system32\Ati2evxx.exe
D:\WINDOWS\system32\svchost -k DcomLaunch
svchost.exe
D:\WINDOWS\system32\svchost.exe -k netsvcs
D:\WINDOWS\system32\svchost.exe -k WudfServiceGroup
D:\WINDOWS\system32\Ati2evxx.exe
svchost.exe
svchost.exe
D:\WINDOWS\system32\spoolsv.exe
svchost.exe
D:\Program Files\a-squared Free\a2service.exe
D:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
D:\Program Files\Bonjour\mDNSResponder.exe
D:\Program Files\Intel\Intel Matrix Storage Manager\iaantmon.exe
D:\Program Files\Java\jre6\bin\jqs.exe
D:\Program Files\McAfee\Common Framework\FrameworkService.exe
D:\Program Files\McAfee\VirusScan Enterprise\vstskmgr.exe
D:\Program Files\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE
D:\WINDOWS\system32\IoctlSvc.exe
D:\WINDOWS\system32\HPZipm12.exe
D:\WINDOWS\System32\svchost.exe -k imgsvc
D:\WINDOWS\system32\ZuneBusEnum.exe
D:\WINDOWS\system32\SearchIndexer.exe
D:\WINDOWS\Explorer.EXE
D:\Program Files\ATI Technologies\ATI.ACE\Core-Static\MOM.exe
D:\WINDOWS\RTHDCPL.EXE
D:\WINDOWS\System32\svchost.exe -k HTTPFilter
D:\Program Files\McAfee\Common Framework\UdaterUI.exe
D:\Program Files\McAfee\Common Framework\McTray.exe
D:\Program Files\Microsoft IntelliPoint\ipoint.exe
D:\Program Files\Intel\Intel Matrix Storage Manager\iaanotif.exe
C:\Program Files\Adobe\Acrobat 7.0\Distillr\Acrotray.exe
D:\WINDOWS\system32\xRaidSetup.exe
D:\Program Files\iTunes\iTunesHelper.exe
D:\Program Files\Java\jre6\bin\jusched.exe
D:\Program Files\Zune\ZuneLauncher.exe
D:\Program Files\Common Files\SolidWorks Installation Manager\Scheduler\sldIMScheduler.exe
D:\WINDOWS\system32\ctfmon.exe
D:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe
D:\Program Files\Common Files\Ahead\Lib\NMIndexingService.exe
D:\Program Files\MSI\DigiCell\DigiCell.exe
D:\Program Files\Microsoft Office\OFFICE11\ONENOTEM.EXE
D:\Program Files\Windows Desktop Search\WindowsSearch.exe
D:\Program Files\Common Files\Ahead\Lib\NMIndexStoreSvr.exe
D:\Program Files\ATI Technologies\ATI.ACE\Core-Static\ccc.exe
D:\Program Files\iPod\bin\iPodService.exe
D:\Program Files\Mozilla Firefox\firefox.exe
D:\Program Files\McAfee\VirusScan Enterprise\mcshield.exe
D:\WINDOWS\system32\SearchProtocolHost.exe
D:\Documents and Settings\Alex\My Documents\Downloads\dds.scr

============== Pseudo HJT Report ===============

uInternet Settings,ProxyOverride = *.local
BHO: AcroIEHlprObj Class: {06849e9f-c8d7-4d59-b87d-784b7d6be0b3} - c:\program files\adobe\acrobat 7.0\activex\AcroIEHelper.dll
BHO: {201f27d4-3704-41d6-89c1-aa35e39143ed} - No File
BHO: scriptproxy: {7db2d5a0-7241-4e79-b68d-6309f01c5231} - d:\program files\mcafee\virusscan enterprise\Scriptcl.dll
BHO: AcroIEToolbarHelper Class: {ae7cd045-e861-484f-8273-0445ee161910} - c:\program files\adobe\acrobat 7.0\acrobat\AcroIEFavClient.dll
BHO: Google Toolbar Notifier BHO: {af69de43-7d58-4638-b6fa-ce66b5ad205d} - d:\program files\google\googletoolbarnotifier\5.1.1309.3572\swg.dll
BHO: Java™ Plug-In 2 SSV Helper: {dbc80044-a445-435b-bc74-9c25c1c588a9} - d:\program files\java\jre6\bin\jp2ssv.dll
BHO: JQSIEStartDetectorImpl Class: {e7e6f031-17ce-4c07-bc86-eabfe594f69c} - d:\program files\java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll
TB: Adobe PDF: {47833539-d0c5-4125-9fa8-0819e2eaac93} - c:\program files\adobe\acrobat 7.0\acrobat\AcroIEFavClient.dll
TB: {3041d03e-fd4b-44e0-b742-2d9b88305f98} - No File
EB: Adobe PDF: {182ec0be-5110-49c8-a062-beb1d02a220b} - c:\program files\adobe\acrobat 7.0\acrobat\AcroIEFavClient.dll
EB: {32683183-48a0-441b-a342-7c2a440a9478} - No File
uRun: [ctfmon.exe] d:\windows\system32\ctfmon.exe
uRun: [BgMonitor_{79662E04-7C6C-4d9f-84C7-88D8A56B10AA}] "d:\program files\common files\ahead\lib\NMBgMonitor.exe"
mRun: [StartCCC] "d:\program files\ati technologies\ati.ace\core-static\CLIStart.exe" MSRun
mRun: [ShStatEXE] "d:\program files\mcafee\virusscan enterprise\SHSTAT.EXE" /STANDALONE
mRun: [RTHDCPL] RTHDCPL.EXE
mRun: [nwiz] nwiz.exe /install
mRun: [NvMediaCenter] RUNDLL32.EXE d:\windows\system32\NvMcTray.dll,NvTaskbarInit
mRun: [NvCplDaemon] RUNDLL32.EXE d:\windows\system32\NvCpl.dll,NvStartup
mRun: [NeroFilterCheck] d:\program files\common files\ahead\lib\NeroCheck.exe
mRun: [McAfeeUpdaterUI] "d:\program files\mcafee\common framework\UdaterUI.exe" /StartedFromRunKey
mRun: [JMB36X IDE Setup] d:\windows\raidtool\xInsIDE.exe
mRun: [IntelliPoint] "d:\program files\microsoft intellipoint\ipoint.exe"
mRun: [IAAnotif] d:\program files\intel\intel matrix storage manager\iaanotif.exe
mRun: [Acrobat Assistant 7.0] "c:\program files\adobe\acrobat 7.0\distillr\Acrotray.exe"
mRun: [36X Raid Configurer] d:\windows\system32\xRaidSetup.exe boot
mRun: [QuickTime Task] "d:\program files\quicktime\QTTask.exe" -atboottime
mRun: [iTunesHelper] "d:\program files\itunes\iTunesHelper.exe"
mRun: [SunJavaUpdateSched] "d:\program files\java\jre6\bin\jusched.exe"
mRun: [Zune Launcher] "d:\program files\zune\ZuneLauncher.exe"
mRun: [SolidWorks_CheckForUpdates] "d:\program files\common files\solidworks installation manager\scheduler\sldIMScheduler.exe" /scheduler
mRun: [Malwarebytes Anti-Malware (reboot)] "d:\program files\malwarebytes' anti-malware\mbam.exe" /runcleanupscript
dRun: [DWQueuedReporting] "d:\progra~1\common~1\micros~1\dw\dwtrig20.exe" -t
StartupFolder: d:\docume~1\alluse~1\startm~1\programs\startup\adobea~1.lnk - d:\windows\installer\{ac76ba86-1033-0000-7760-100000000002}\SC_Acrobat.exe
StartupFolder: d:\docume~1\alluse~1\startm~1\programs\startup\digicell.lnk - d:\program files\msi\digicell\DigiCell.exe
StartupFolder: d:\docume~1\alluse~1\startm~1\programs\startup\micros~1.lnk - d:\program files\microsoft office\office11\ONENOTEM.EXE
StartupFolder: d:\docume~1\alluse~1\startm~1\programs\startup\window~1.lnk - d:\program files\windows desktop search\WindowsSearch.exe
IE: Convert link target to Adobe PDF - c:\program files\adobe\acrobat 7.0\acrobat\AcroIEFavClient.dll/AcroIECapture.html
IE: Convert link target to existing PDF - c:\program files\adobe\acrobat 7.0\acrobat\AcroIEFavClient.dll/AcroIEAppend.html
IE: Convert selected links to Adobe PDF - c:\program files\adobe\acrobat 7.0\acrobat\AcroIEFavClient.dll/AcroIECaptureSelLinks.html
IE: Convert selected links to existing PDF - c:\program files\adobe\acrobat 7.0\acrobat\AcroIEFavClient.dll/AcroIEAppendSelLinks.html
IE: Convert selection to Adobe PDF - c:\program files\adobe\acrobat 7.0\acrobat\AcroIEFavClient.dll/AcroIECapture.html
IE: Convert selection to existing PDF - c:\program files\adobe\acrobat 7.0\acrobat\AcroIEFavClient.dll/AcroIEAppend.html
IE: Convert to Adobe PDF - c:\program files\adobe\acrobat 7.0\acrobat\AcroIEFavClient.dll/AcroIECapture.html
IE: Convert to existing PDF - c:\program files\adobe\acrobat 7.0\acrobat\AcroIEFavClient.dll/AcroIEAppend.html
IE: E&xport to Microsoft Excel - d:\progra~1\micros~2\office11\EXCEL.EXE/3000
IE: {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe
IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - d:\program files\messenger\msmsgs.exe
IE: {92780B25-18CC-41C8-B9BE-3C9C571A8263} - {FF059E31-CC5A-4E2E-BF3B-96E929D65503} - d:\progra~1\micros~2\office11\REFIEBAR.DLL
DPF: DirectAnimation Java Classes - file://d:\windows\java\classes\dajava.cab
DPF: Microsoft XML Parser for Java - file://d:\windows\java\classes\xmldso.cab
DPF: {05CA9FB0-3E3E-4B36-BF41-0E3A5CAA8CD8} - hxxp://download.microsoft.com/download/e/4/9/e494c802-dd90-4c6b-a074-469358f075a6/OGAControl.cab
DPF: {149E45D8-163E-4189-86FC-45022AB2B6C9} - file:///D:/Program%20Files/Amazing%20Adventures%20Special%20Edition%20Bundle/Images/stg_drm.ocx
DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} - hxxp://www.update.microsoft.com/windowsupdate/v6/V5Controls/en/x86/client/wuweb_site.cab?1231021062450
DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_15-windows-i586.cab
DPF: {8FFBE65D-2C9C-4669-84BD-5829DC0B603C} - hxxp://fpdownload.macromedia.com/get/flashplayer/current/polarbear/ultrashim.cab
DPF: {C7DB51B4-BCF7-4923-8874-7F1A0DC92277} - hxxp://office.microsoft.com/officeupdate/content/opuc4.cab
DPF: {CAFEEFAC-0016-0000-0007-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_07-windows-i586.cab
DPF: {CAFEEFAC-0016-0000-0015-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_15-windows-i586.cab
DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_15-windows-i586.cab
DPF: {CC450D71-CC90-424C-8638-1F2DBAC87A54} - file:///D:/Program%20Files/Lost%20Realms%20-%20Legacy%20of%20the%20Sun%20Princess/Images/armhelper.ocx
Notify: !SASWinLogon - d:\program files\superantispyware\SASWINLO.DLL
Notify: AtiExtEvent - Ati2evxx.dll
AppInit_DLLs: d:\windows\system32\guard32.dll d:\windows\system32\gokehama.dll ridobuhi.dll d:\windows\system32\disesobe.dll d:\windows\system32\goradoja.dll
SSODL: WPDShServiceObj - {AAA288BA-9A4C-45B0-95D7-94D524869DB5} - d:\windows\system32\WPDShServiceObj.dll
SSODL: zosesuzay - {8132c176-4df5-4c8f-b930-7db977b70a1b} - No File
SSODL: fahevasem - {170a71d5-6a16-4c67-8c35-8e85b915e188} - No File
SSODL: weboyagiw - {34ab847d-0caa-4d4f-89ac-af7ca2a35952} - No File
STS: {8132c176-4df5-4c8f-b930-7db977b70a1b} - No File
STS: {170a71d5-6a16-4c67-8c35-8e85b915e188} - No File
STS: {34ab847d-0caa-4d4f-89ac-af7ca2a35952} - No File
SEH: Windows Desktop Search Namespace Manager: {56f9679e-7826-4c84-81f3-532071a8bcc5} - d:\program files\windows desktop search\MSNLNamespaceMgr.dll
SEH: SABShellExecuteHook Class: {5ae067d3-9afb-48e0-853a-ebb7f4a000da} - d:\program files\superantispyware\SASSEH.DLL
LSA: Notification Packages = scecli malewevu.dll

================= FIREFOX ===================

FF - ProfilePath - d:\docume~1\alex\applic~1\mozilla\firefox\profiles\93nv45a3.default\
FF - plugin: c:\program files\adobe\acrobat 7.0\acrobat\browser\nppdf32.dll
FF - plugin: d:\program files\google\google updater\2.4.1536.6592\npCIDetect13.dll
FF - HiddenExtension: Microsoft .NET Framework Assistant: {20a82645-c095-46ed-80e3-08825760534b} - d:\windows\microsoft.net\framework\v3.5\windows presentation foundation\dotnetassistantextension\
FF - HiddenExtension: Java Console: No Registry Reference - d:\program files\mozilla firefox\extensions\{CAFEEFAC-0016-0000-0007-ABCDEFFEDCBA}
FF - HiddenExtension: Java Console: No Registry Reference - d:\program files\mozilla firefox\extensions\{CAFEEFAC-0016-0000-0014-ABCDEFFEDCBA}
FF - HiddenExtension: Java Console: No Registry Reference - d:\program files\mozilla firefox\extensions\{CAFEEFAC-0016-0000-0015-ABCDEFFEDCBA}

============= SERVICES / DRIVERS ===============

R0 Lbd;Lbd;d:\windows\system32\drivers\Lbd.sys [2009-2-12 64160]
R1 cmdGuard;COMODO Internet Security Sandbox Driver;d:\windows\system32\drivers\cmdguard.sys [2009-3-4 132040]
R1 cmdHlp;COMODO Internet Security Helper Driver;d:\windows\system32\drivers\cmdhlp.sys [2009-3-4 25160]
R1 SASDIFSV;SASDIFSV;d:\program files\superantispyware\sasdifsv.sys [2009-5-14 9968]
R1 SASKUTIL;SASKUTIL;d:\program files\superantispyware\SASKUTIL.SYS [2009-5-14 74480]
R3 AtiHdmiService;ATI Function Driver for HDMI Service;d:\windows\system32\drivers\AtiHdmi.sys [2009-1-26 89600]
R3 DigiCellDriver;DigiCellDriver;d:\program files\msi\digicell\NTGLM7X.sys [2006-6-7 28672]
S0 eewmvxti;eewmvxti;d:\windows\system32\drivers\imdlhzof.sys --> d:\windows\system32\drivers\imdlhzof.sys [?]
S2 VRDVC10;Sony VRD-VC10 [Video Capture];d:\windows\system32\drivers\VRDVC10X.SYS [2004-11-9 31104]
S3 CoordinatorServiceHost;SW Distributed TS Coordinator Service;c:\solidworks corp\solidworks\swscheduler\DTSCoordinatorService.exe [2009-3-19 83240]
S3 NtApm;NT Apm/Legacy Interface Driver;d:\windows\system32\drivers\NtApm.sys [2009-1-3 9344]
S3 SASENUM;SASENUM;d:\program files\superantispyware\SASENUM.SYS [2009-5-14 7408]
S4 msvsmon80;Visual Studio 2005 Remote Debugger;d:\program files\microsoft visual studio 8\common7\ide\remote debugger\x86\msvsmon.exe [2005-9-23 2799808]

=============== Created Last 30 ================

2009-10-13 20:55 38,224 a------- d:\windows\system32\drivers\mbamswissarmy.sys
2009-10-13 20:55 19,160 a------- d:\windows\system32\drivers\mbam.sys
2009-10-13 20:55 <DIR> --d----- d:\program files\Malwarebytes' Anti-Malware
2009-10-10 09:40 88,576 a------- d:\windows\system32\parodupa.dll
2009-09-19 11:57 40,960 a----r-- d:\windows\system32\psfind.dll
2009-09-17 22:51 758,352 a------- D:\fwconfig.exe
2009-09-17 22:51 131,072 a------- D:\clicapi.dll
2009-09-17 22:40 0 a---h--- d:\windows\system32\drivers\Msft_User_ZuneDriver_01_09_00.Wdf
2009-09-17 22:40 0 a---h--- d:\windows\system32\drivers\Msft_Kernel_WinUSB_01009.Wdf
2009-09-17 22:39 0 a---h--- d:\windows\system32\drivers\MsftWdf_user_01_09_00.Wdf
2009-09-17 22:16 0 a---h--- d:\windows\system32\drivers\Msft_Kernel_zumbus_01009.Wdf
2009-09-17 22:16 0 a---h--- d:\windows\system32\drivers\MsftWdf_Kernel_01009_Coinstaller_Critical.Wdf

==================== Find3M ====================

2009-09-04 13:17 447,216 a------- d:\windows\system32\ZuneWlanCfgSvc.exe
2009-09-04 13:16 58,592 a------- d:\windows\system32\ZuneBusEnum.exe
2009-09-02 00:29 74,240 a------- d:\windows\system32\ZuneUsbTransport.dll
2009-09-02 00:29 57,344 a------- d:\windows\system32\ZuneRegUtil.dll
2009-09-02 00:29 18,944 a------- d:\windows\system32\ZuneTcp2Udp.dll
2009-09-02 00:29 12,800 a------- d:\windows\system32\ZunePTDNS.dll
2009-09-02 00:29 310,784 a------- d:\windows\system32\ZuneNetProxy.dll
2009-09-02 00:29 147,456 a------- d:\windows\system32\ZuneMTPZ.dll
2009-09-02 00:28 40,832 a------- d:\windows\system32\drivers\zumbus.sys
2009-08-17 12:37 1,837,296 a------- d:\windows\system32\WUDFUpdate_01009.dll
2009-08-17 12:37 1,461,992 a------- d:\windows\system32\WdfCoInstaller01009.dll
2009-08-05 05:01 204,800 a------- d:\windows\system32\mswebdvd.dll
2009-07-25 05:23 411,368 a------- d:\windows\system32\deploytk.dll
2009-07-24 22:25 179,792 a------- d:\windows\system32\guard32.dll
2009-07-17 15:01 58,880 a------- d:\windows\system32\atl.dll
2009-07-08 17:10 61,440 a--sh--- d:\windows\system32\febudipi.dll
2009-07-10 21:38 88,576 a--sh--- d:\windows\system32\kimapuge.dll
2009-07-09 07:49 82,944 a--sh--- d:\windows\system32\neletato.dll
2009-07-08 17:10 83,968 a--sh--- d:\windows\system32\poveyawi.dll

============= FINISH: 18:33:20.85 ===============




ROOTREPEAL © AD, 2007-2009
==================================================
Scan Start Time: 2009/10/14 18:35
Program Version: Version 1.3.5.0
Windows Version: Windows XP SP3
==================================================

Drivers
-------------------
Name: dump_atapi.sys
Image Path: D:\WINDOWS\System32\Drivers\dump_atapi.sys
Address: 0xACBC5000 Size: 98304 File Visible: No Signed: -
Status: -

Name: dump_WMILIB.SYS
Image Path: D:\WINDOWS\System32\Drivers\dump_WMILIB.SYS
Address: 0xBA5E8000 Size: 8192 File Visible: No Signed: -
Status: -

Name: PCI_HAL
Image Path: \Driver\PCI_HAL
Address: 0x00000000 Size: 0 File Visible: No Signed: -
Status: -

Name: rootrepeal.sys
Image Path: D:\WINDOWS\system32\drivers\rootrepeal.sys
Address: 0xA9116000 Size: 49152 File Visible: No Signed: -
Status: -

Hidden/Locked Files
-------------------
Path: D:\RootRepeal report 10-14-09 (18-35-23).txt
Status: Visible to the Windows API, but not on disk.

Path: d:\documents and settings\alex\application data\im\sldimschedulerlog_20090-40300-1100_00008.txt
Status: Allocation size mismatch (API: 8192, Raw: 0)

Path: d:\documents and settings\alex\application data\im\sldimschedulerlog_20090-40300-1100_00010.txt
Status: Allocation size mismatch (API: 8192, Raw: 0)

SSDT
-------------------
#: 011 Function Name: NtAdjustPrivilegesToken
Status: Hooked by "D:\WINDOWS\System32\DRIVERS\cmdguard.sys" at address 0xacdedf68

#: 031 Function Name: NtConnectPort
Status: Hooked by "D:\WINDOWS\System32\DRIVERS\cmdguard.sys" at address 0xacded472

#: 037 Function Name: NtCreateFile
Status: Hooked by "D:\WINDOWS\System32\DRIVERS\cmdguard.sys" at address 0xacdedb0c

#: 041 Function Name: NtCreateKey
Status: Hooked by "D:\WINDOWS\System32\DRIVERS\cmdguard.sys" at address 0xacdee4e4

#: 046 Function Name: NtCreatePort
Status: Hooked by "D:\WINDOWS\System32\DRIVERS\cmdguard.sys" at address 0xacded150

#: 050 Function Name: NtCreateSection
Status: Hooked by "D:\WINDOWS\System32\DRIVERS\cmdguard.sys" at address 0xacdef1f0

#: 052 Function Name: NtCreateSymbolicLinkObject
Status: Hooked by "D:\WINDOWS\System32\DRIVERS\cmdguard.sys" at address 0xacdef4c8

#: 053 Function Name: NtCreateThread
Status: Hooked by "D:\WINDOWS\System32\DRIVERS\cmdguard.sys" at address 0xacdecd16

#: 063 Function Name: NtDeleteKey
Status: Hooked by "D:\WINDOWS\System32\DRIVERS\cmdguard.sys" at address 0xacdee14e

#: 065 Function Name: NtDeleteValueKey
Status: Hooked by "D:\WINDOWS\System32\DRIVERS\cmdguard.sys" at address 0xacdee2fe

#: 068 Function Name: NtDuplicateObject
Status: Hooked by "D:\WINDOWS\System32\DRIVERS\cmdguard.sys" at address 0xacdeca78

#: 097 Function Name: NtLoadDriver
Status: Hooked by "D:\WINDOWS\System32\DRIVERS\cmdguard.sys" at address 0xacdeee72

#: 105 Function Name: NtMakeTemporaryObject
Status: Hooked by "D:\WINDOWS\System32\DRIVERS\cmdguard.sys" at address 0xacded6f6

#: 116 Function Name: NtOpenFile
Status: Hooked by "D:\WINDOWS\System32\DRIVERS\cmdguard.sys" at address 0xacdedd50

#: 122 Function Name: NtOpenProcess
Status: Hooked by "D:\WINDOWS\System32\DRIVERS\cmdguard.sys" at address 0xacdec7a8

#: 125 Function Name: NtOpenSection
Status: Hooked by "D:\WINDOWS\System32\DRIVERS\cmdguard.sys" at address 0xacded986

#: 128 Function Name: NtOpenThread
Status: Hooked by "D:\WINDOWS\System32\DRIVERS\cmdguard.sys" at address 0xacdec920

#: 192 Function Name: NtRenameKey
Status: Hooked by "D:\WINDOWS\System32\DRIVERS\cmdguard.sys" at address 0xacdee8aa

#: 200 Function Name: NtRequestWaitReplyPort
Status: Hooked by "D:\WINDOWS\System32\DRIVERS\cmdguard.sys" at address 0xacded26e

#: 210 Function Name: NtSecureConnectPort
Status: Hooked by "D:\WINDOWS\System32\DRIVERS\cmdguard.sys" at address 0xacdeec0e

#: 240 Function Name: NtSetSystemInformation
Status: Hooked by "D:\WINDOWS\System32\DRIVERS\cmdguard.sys" at address 0xacdef020

#: 247 Function Name: NtSetValueKey
Status: Hooked by "D:\WINDOWS\System32\DRIVERS\cmdguard.sys" at address 0xacdee6aa

#: 249 Function Name: NtShutdownSystem
Status: Hooked by "D:\WINDOWS\System32\DRIVERS\cmdguard.sys" at address 0xacded690

#: 255 Function Name: NtSystemDebugControl
Status: Hooked by "D:\WINDOWS\System32\DRIVERS\cmdguard.sys" at address 0xacded87a

#: 257 Function Name: NtTerminateProcess
Status: Hooked by "D:\WINDOWS\System32\DRIVERS\cmdguard.sys" at address 0xacded01a

#: 258 Function Name: NtTerminateThread
Status: Hooked by "D:\WINDOWS\System32\DRIVERS\cmdguard.sys" at address 0xacdecee8

Shadow SSDT
-------------------
#: 013 Function Name: NtGdiBitBlt
Status: Hooked by "D:\WINDOWS\System32\DRIVERS\cmdguard.sys" at address 0xacdf12a4

#: 122 Function Name: NtGdiDeleteObjectApp
Status: Hooked by "D:\WINDOWS\System32\DRIVERS\cmdguard.sys" at address 0xacdf19c8

#: 227 Function Name: NtGdiMaskBlt
Status: Hooked by "D:\WINDOWS\System32\DRIVERS\cmdguard.sys" at address 0xacdf13d8

#: 233 Function Name: NtGdiOpenDCW
Status: Hooked by "D:\WINDOWS\System32\DRIVERS\cmdguard.sys" at address 0xacdf1888

#: 237 Function Name: NtGdiPlgBlt
Status: Hooked by "D:\WINDOWS\System32\DRIVERS\cmdguard.sys" at address 0xacdf1518

#: 292 Function Name: NtGdiStretchBlt
Status: Hooked by "D:\WINDOWS\System32\DRIVERS\cmdguard.sys" at address 0xacdf164c

#: 310 Function Name: NtUserBlockInput
Status: Hooked by "D:\WINDOWS\System32\DRIVERS\cmdguard.sys" at address 0xacdf1124

#: 319 Function Name: NtUserCallHwndParamLock
Status: Hooked by "D:\WINDOWS\System32\DRIVERS\cmdguard.sys" at address 0xacdf0376

#: 383 Function Name: NtUserGetAsyncKeyState
Status: Hooked by "D:\WINDOWS\System32\DRIVERS\cmdguard.sys" at address 0xacdf0df4

#: 389 Function Name: NtUserGetClipboardData
Status: Hooked by "D:\WINDOWS\System32\DRIVERS\cmdguard.sys" at address 0xacdf1786

#: 414 Function Name: NtUserGetKeyboardState
Status: Hooked by "D:\WINDOWS\System32\DRIVERS\cmdguard.sys" at address 0xacdf0b62

#: 416 Function Name: NtUserGetKeyState
Status: Hooked by "D:\WINDOWS\System32\DRIVERS\cmdguard.sys" at address 0xacdf0ca4

#: 460 Function Name: NtUserMessageCall
Status: Hooked by "D:\WINDOWS\System32\DRIVERS\cmdguard.sys" at address 0xacdf0846

#: 465 Function Name: NtUserMoveWindow
Status: Hooked by "D:\WINDOWS\System32\DRIVERS\cmdguard.sys" at address 0xacdf00ae

#: 475 Function Name: NtUserPostMessage
Status: Hooked by "D:\WINDOWS\System32\DRIVERS\cmdguard.sys" at address 0xacdf04f8

#: 476 Function Name: NtUserPostThreadMessage
Status: Hooked by "D:\WINDOWS\System32\DRIVERS\cmdguard.sys" at address 0xacdf06a4

#: 491 Function Name: NtUserRegisterRawInputDevices
Status: Hooked by "D:\WINDOWS\System32\DRIVERS\cmdguard.sys" at address 0xacdf0f44

#: 502 Function Name: NtUserSendInput
Status: Hooked by "D:\WINDOWS\System32\DRIVERS\cmdguard.sys" at address 0xacdf0a08

#: 509 Function Name: NtUserSetClipboardViewer
Status: Hooked by "D:\WINDOWS\System32\DRIVERS\cmdguard.sys" at address 0xacdf103a

#: 529 Function Name: NtUserSetParent
Status: Hooked by "D:\WINDOWS\System32\DRIVERS\cmdguard.sys" at address 0xacdf021e

#: 549 Function Name: NtUserSetWindowsHookEx
Status: Hooked by "D:\WINDOWS\System32\DRIVERS\cmdguard.sys" at address 0xacdf1a2e

#: 552 Function Name: NtUserSetWinEventHook
Status: Hooked by "D:\WINDOWS\System32\DRIVERS\cmdguard.sys" at address 0xacdf1c62

==EOF==

Attached Files



BC AdBot (Login to Remove)

 


#2 schrauber

schrauber

    Mr.Mechanic


  • Malware Response Team
  • 24,794 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Munich,Germany
  • Local time:06:38 AM

Posted 27 October 2009 - 03:16 PM

Hello and welcome to Bleeping Computer

We apologize for the delay in responding to your request for help. Here at Bleeping Computer we get overwhelmed at times, and we are trying our best to keep up. Please note that your topic was not intentionally overlooked. Our mission is to help everyone in need, but sometimes it takes just a little longer to get to every request for help. No one is ignored here.

If you have since resolved the original problem you were having, we would appreciate you letting us know. If not please perform the following steps below so we can have a look at the current condition of your machine.

If you have not done so, include a clear description of the problems you're having, along with any steps you may have performed so far.

Upon completing the steps below another staff member will review and take the steps necessary with you to get your machine back in working order clean and free of malware.

If you have already posted a DDS log, please do so again, as your situation may have changed.
Use the 'Add Reply' and add the new log to this thread.


Thanks and again sorry for the delay.

We need to see some information about what is happening in your machine. Please perform the following scan:
  • Download DDS by sUBs from one of the following links. Save it to your desktop.
  • Double click on the DDS icon, allow it to run.
  • A small box will open, with an explaination about the tool. No input is needed, the scan is running.
  • Notepad will open with the results.
  • Follow the instructions that pop up for posting the results.
  • Close the program window, and delete the program from your desktop.
Please note: You may have to disable any script protection running if the scan fails to run. After downloading the tool, disconnect from the internet and disable all antivirus protection. Run the scan, enable your A/V and reconnect to the internet.

Information on A/V control HERE
regards,
schrauber

Posted Image
Posted Image

If I've not posted back within 48 hrs., feel free to send a PM with your topic link. Thank you!

If I have helped you then please consider donating to continue the fight against malware Posted Image

#3 schrauber

schrauber

    Mr.Mechanic


  • Malware Response Team
  • 24,794 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Munich,Germany
  • Local time:06:38 AM

Posted 01 November 2009 - 04:24 PM

Due to the lack of feedback, this topic is now closed.
If you need this topic reopened, please PM a staff member and we will reopen it for you (include the address of this thread in your request). This applies to the original topic starter only. Everyone else with similar problems, please start a new topic.
regards,
schrauber

Posted Image
Posted Image

If I've not posted back within 48 hrs., feel free to send a PM with your topic link. Thank you!

If I have helped you then please consider donating to continue the fight against malware Posted Image




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users