Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Google search results redirection


  • This topic is locked This topic is locked
5 replies to this topic

#1 dunceguy

dunceguy

  • Members
  • 3 posts
  • OFFLINE
  •  
  • Local time:01:55 AM

Posted 30 October 2009 - 08:55 AM

Hi,

I am getting redirected the first few times I click on a Google result after each search. I have run Spybot S&D, Malwarebytes, Ad-Aware, SUPERAntiSpyware, and Trojan Remover, but they all found nothing. The HJT log does not show anything that made me go "Aha!".

Here is my DDS report:


DDS (Ver_09-10-26.01) - NTFSx86
Run by rzanelli at 17:57:53.06 on Thu 10/29/2009
Internet Explorer: 7.0.5730.11 BrowserJavaVersion: 1.6.0_04
Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.2046.920 [GMT -4:00]

AV: Symantec AntiVirus Corporate Edition *On-access scanning enabled* (Updated) {FB06448E-52B8-493A-90F3-E43226D3305C}

============== Running Processes ===============

C:\WINDOWS\system32\svchost -k DcomLaunch
svchost.exe
C:\WINDOWS\System32\svchost.exe -k netsvcs
C:\Program Files\Intel\Wireless\Bin\EvtEng.exe
C:\Program Files\Intel\Wireless\Bin\S24EvMon.exe
C:\Program Files\Intel\Wireless\Bin\WLKeeper.exe
svchost.exe
svchost.exe
C:\Program Files\Common Files\Symantec Shared\ccSetMgr.exe
C:\Program Files\Common Files\Symantec Shared\ccEvtMgr.exe
C:\Program Files\Common Files\Symantec Shared\SPBBC\SPBBCSvc.exe
C:\WINDOWS\system32\spoolsv.exe
svchost.exe
C:\Program Files\Broadcom\ASFIPMon\AsfIpMon.exe
svchost.exe
C:\Program Files\SQLLIB\bin\db2jds.exe
C:\Program Files\SQLLIB\bin\db2sec.exe
C:\Program Files\Symantec AntiVirus\DefWatch.exe
C:\Program Files\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE
C:\Program Files\Dell\QuickSet\NICCONFIGSVC.exe
C:\WINDOWS\system32\nvsvc32.exe
C:\WINDOWS\system32\PGPserv.exe
C:\Program Files\Intel\Wireless\Bin\RegSrvc.exe
C:\Program Files\Symantec AntiVirus\SavRoam.exe
C:\WINDOWS\system32\svchost.exe -k imgsvc
C:\Program Files\Symantec AntiVirus\Rtvscan.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\Apoint\Apoint.exe
C:\WINDOWS\system32\rundll32.exe
C:\Program Files\Common Files\Symantec Shared\ccApp.exe
C:\WINDOWS\system32\taskswitch.exe
C:\WINDOWS\System32\DLA\DLACTRLW.EXE
C:\Program Files\Intel\Wireless\Bin\ifrmewrk.exe
C:\Program Files\Intel\Wireless\bin\ZCfgSvc.exe
C:\WINDOWS\system32\rundll32.exe
C:\WINDOWS\system32\wuauclt.exe
C:\Program Files\Apoint\HidFind.exe
C:\WINDOWS\system32\ICO.EXE
C:\WINDOWS\stsystra.exe
C:\PROGRA~1\SYMANT~1\VPTray.exe
C:\Program Files\Apoint\Apntex.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
C:\PROGRA~1\Intel\Wireless\Bin\Dot1XCfg.exe
C:\Program Files\Digital Line Detect\DLG.exe
C:\Program Files\Microsoft Office\OFFICE11\OUTLOOK.EXE
C:\Program Files\PGP Corporation\PGP for Windows XP\PGPtray.exe
\\Donatello\c$\Program Files\Trillian\trillian.exe
C:\Program Files\Microsoft Office\OFFICE11\WINWORD.EXE
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Files\Downloads\Spyware\RootRepeal.exe
c:\WINDOWS\Microsoft.NET\Framework\v3.0\Windows Communication Foundation\infocard.exe
C:\Files\Downloads\Spyware\dds.scr

============== Pseudo HJT Report ===============

uStart Page = hxxp://iwww/
uSearch Page = hxxp://www.google.com
uSearch Bar = hxxp://www.google.com/ie
mDefault_Search_URL = hxxp://www.google.com/ie
mSearch Page = hxxp://www.google.com
mStart Page = hxxp://www.google.com
mSearchMigratedDefaultURL =
uInternet Connection Wizard,ShellNext = hxxp://iwww.trcinc.com/
uInternet Settings,ProxyOverride = *.local
uSearchAssistant = hxxp://www.google.com
mSearchAssistant = hxxp://www.google.com
BHO: AcroIEHlprObj Class: {06849e9f-c8d7-4d59-b87d-784b7d6be0b3} - c:\program files\adobe\acrobat 7.0\activex\AcroIEHelper.dll
BHO: Spybot-S&D IE Protection: {53707962-6f74-2d53-2644-206d7942484f} - c:\progra~1\spybot~1\SDHelper.dll
BHO: DriveLetterAccess: {5ca3d70e-1895-11cf-8e15-001234567890} - c:\windows\system32\dla\DLASHX_W.DLL
BHO: SSVHelper Class: {761497bb-d6f0-462c-b6eb-d4daf1d92d43} - c:\program files\java\jre1.6.0_04\bin\ssv.dll
BHO: IE Developer Toolbar BHO: {cc7e636d-39aa-49b6-b511-65413da137a1} - c:\program files\microsoft\internet explorer developer toolbar\IEDevToolbar.dll
TB: {40D41A8B-D79B-43D7-99A7-9EE0F344C385} - No File
EB: IE Developer Toolbar: {a202b231-ef71-4a08-bdb9-4ce5ae8bde0a} - c:\program files\microsoft\internet explorer developer toolbar\IEDevToolbar.dll
uRun: [ctfmon.exe] c:\windows\system32\ctfmon.exe
uRun: [SpybotSD TeaTimer] c:\program files\spybot - search & destroy\TeaTimer.exe
mRun: [Apoint] c:\program files\apoint\Apoint.exe
mRun: [BluetoothAuthenticationAgent] rundll32.exe bthprops.cpl,,BluetoothAuthenticationAgent
mRun: [ccApp] "c:\program files\common files\symantec shared\ccApp.exe"
mRun: [CoolSwitch] c:\windows\system32\taskswitch.exe
mRun: [DLA] c:\windows\system32\dla\DLACTRLW.EXE
mRun: [IntelWireless] "c:\program files\intel\wireless\bin\ifrmewrk.exe" /tf Intel PROSet/Wireless
mRun: [IntelZeroConfig] "c:\program files\intel\wireless\bin\ZCfgSvc.exe"
mRun: [NvCplDaemon] RUNDLL32.EXE c:\windows\system32\NvCpl.dll,NvStartup
mRun: [NVHotkey] rundll32.exe nvHotkey.dll,Start
mRun: [nwiz] nwiz.exe /installquiet
mRun: [PMX Daemon] ICO.EXE
mRun: [SigmatelSysTrayApp] stsystra.exe
mRun: [vptray] c:\progra~1\symant~1\VPTray.exe
mRun: [Malwarebytes Anti-Malware (reboot)] "c:\program files\malwarebytes' anti-malware\mbam.exe" /runcleanupscript
mRun: [TrojanScanner] c:\program files\trojan remover\Trjscan.exe /boot
StartupFolder: c:\docume~1\rzanelli\startm~1\programs\startup\trillian.lnk - \\donatello\c$\program files\trillian\trillian.exe
StartupFolder: c:\documents and settings\all users\start menu\programs\startup\Adobe Reader Speed Launch.lnk.disabled
StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\digita~1.lnk - c:\program files\digital line detect\DLG.exe
StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\pgptray.lnk - c:\program files\pgp corporation\pgp for windows xp\PGPtray.exe
IE: &AIM Search - c:\program files\aim toolbar\AIMBar.dll/aimsearch.htm
IE: E&xport to Microsoft Excel - c:\progra~1\micros~2\office11\EXCEL.EXE/3000
IE: {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe
IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe
IE: {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - {CAFEEFAC-0016-0000-0004-ABCDEFFEDCBC} - c:\program files\java\jre1.6.0_04\bin\ssv.dll
IE: {48FFE35F-36D9-44bd-A6CC-1D34414EAC0D} - {CC962137-2E78-4F94-975E-FC0C07DBD78F} - c:\program files\microsoft\internet explorer developer toolbar\IEDevToolbar.dll
IE: {92780B25-18CC-41C8-B9BE-3C9C571A8263} - {FF059E31-CC5A-4E2E-BF3B-96E929D65503} - c:\progra~1\micros~3\office11\REFIEBAR.DLL
IE: {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - {53707962-6F74-2D53-2644-206D7942484F} - c:\progra~1\spybot~1\SDHelper.dll
DPF: {17492023-C23A-453E-A040-C7C580BBF700} - hxxp://download.microsoft.com/download/8/b/d/8bd77752-5704-4d68-a152-f7252adaa4f2/LegitCheckControl.cab
DPF: {3E68E405-C6DE-49FF-83AE-41EE9F4C36CE} - hxxp://office.microsoft.com/officeupdate/content/opuc3.cab
DPF: {4871A87A-BFDD-4106-8153-FFDE2BAC2967} - hxxp://dlm.tools.akamai.com/dlmanager/versions/activex/dlm-activex-2.2.5.1.cab
DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} - hxxp://www.update.microsoft.com/windowsupdate/v6/V5Controls/en/x86/client/wuweb_site.cab?1233685442593
DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} - hxxp://update.microsoft.com/microsoftupdate/v6/V5Controls/en/x86/client/muweb_site.cab?1158093740281
DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_04-windows-i586.cab
DPF: {8FFBE65D-2C9C-4669-84BD-5829DC0B603C} - hxxp://fpdownload.macromedia.com/get/flashplayer/current/ultrashim.cab
DPF: {CAFEEFAC-0014-0002-0013-ABCDEFFEDCBA} - hxxp://java.sun.com/products/plugin/autodl/jinstall-142-windows-i586.cab
DPF: {CAFEEFAC-0015-0000-0011-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.5.0/jinstall-1_5_0_11-windows-i586.cab
DPF: {CAFEEFAC-0016-0000-0004-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_04-windows-i586.cab
DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_04-windows-i586.cab
DPF: {D30CA0FD-1CA0-11D4-AC78-006008A9A8BC} - hxxp://155.17.95.35/US%20Workstations/webinst.cab
Notify: !SASWinLogon - c:\program files\superantispyware\SASWINLO.dll
Notify: NavLogon - c:\windows\system32\NavLogon.dll
SEH: SABShellExecuteHook Class: {5ae067d3-9afb-48e0-853a-ebb7f4a000da} - c:\program files\superantispyware\SASSEH.DLL

================= FIREFOX ===================

FF - ProfilePath - c:\docume~1\rzanelli\applic~1\mozilla\firefox\profiles\yscc6too.default\
FF - prefs.js: browser.search.selectedEngine - Google
FF - prefs.js: browser.startup.homepage - hxxp://iwww
FF - HiddenExtension: XULRunner: {AF1CB04A-42F8-48EC-8C08-54B49D0484EB} - c:\documents and settings\rzanelli\local settings\application data\{af1cb04a-42f8-48ec-8c08-54b49d0484eb}\
FF - HiddenExtension: Java Console: No Registry Reference - c:\program files\mozilla firefox\extensions\{CAFEEFAC-0016-0000-0004-ABCDEFFEDCBA}

============= SERVICES / DRIVERS ===============

R0 Lbd;Lbd;c:\windows\system32\drivers\Lbd.sys [2009-10-28 64288]
R1 SASDIFSV;SASDIFSV;c:\program files\superantispyware\sasdifsv.sys [2009-10-12 9968]
R1 SASKUTIL;SASKUTIL;c:\program files\superantispyware\SASKUTIL.SYS [2009-10-12 74480]
R2 ASFIPmon;Broadcom ASF IP Monitor;c:\program files\broadcom\asfipmon\AsfIpMon.exe [2005-10-18 61440]
R2 PGPsdkDriver;PGPsdkDriver;c:\windows\system32\drivers\PGPsdk.sys [2007-8-4 26624]
R2 SavRoam;SAVRoam;c:\program files\symantec antivirus\SavRoam.exe [2006-9-27 116464]
R3 EraserUtilRebootDrv;EraserUtilRebootDrv;c:\program files\common files\symantec shared\eengine\EraserUtilRebootDrv.sys [2009-9-12 102448]
S3 DB2ControlCenterServer;DB2 JDBC Applet Server - Control Center;c:\program files\sqllib\bin\db2ccs.exe [2007-1-10 141312]
S3 EraserUtilDrv10910;EraserUtilDrv10910;\??\c:\program files\common files\symantec shared\eengine\eraserutildrv10910.sys --> c:\program files\common files\symantec shared\eengine\EraserUtilDrv10910.sys [?]
S3 Lavasoft Ad-Aware Service;Lavasoft Ad-Aware Service;c:\program files\lavasoft\ad-aware\AAWService.exe [2009-9-24 1179232]
S3 NPF;NetGroup Packet Filter Driver;c:\windows\system32\drivers\npf.sys [2008-12-23 50704]
S3 rcp_service;ReaConverter scheduler service;c:\program files\reaconverter 5.5 pro\rcp_scheduler.exe [2007-11-30 558592]
S3 SASENUM;SASENUM;c:\program files\superantispyware\SASENUM.SYS [2009-10-12 7408]
UnknownUnknown kivtnoau;kivtnoau; [x]

=============== Created Last 30 ================

2009-10-29 21:57:51 0 d-----w- c:\temp\38.tmp
2009-10-29 19:48:00 77312 ----a-w- c:\windows\system32\ztvunace26.dll
2009-10-29 19:48:00 75264 ----a-w- c:\windows\system32\unacev2.dll
2009-10-29 19:48:00 69632 ----a-w- c:\windows\system32\ztvcabinet.dll
2009-10-29 19:48:00 162304 ----a-w- c:\windows\system32\ztvunrar36.dll
2009-10-29 19:48:00 153088 ----a-w- c:\windows\system32\UNRAR3.dll
2009-10-29 19:47:56 0 d-----w- c:\program files\Trojan Remover
2009-10-29 19:47:56 0 d-----w- c:\docume~1\rzanelli\applic~1\Simply Super Software
2009-10-29 19:47:56 0 d-----w- c:\docume~1\alluse~1\applic~1\Simply Super Software
2009-10-29 01:44:09 15880 ----a-w- c:\windows\system32\lsdelete.exe.bak
2009-10-28 23:21:01 64288 ----a-w- c:\windows\system32\drivers\Lbd.sys
2009-10-28 23:19:00 0 dc-h--w- c:\docume~1\alluse~1\applic~1\{CFBD8779-FAAB-4357-84F2-1EC8619FADA6}
2009-10-28 23:18:31 0 d-----w- c:\program files\Lavasoft
2009-10-28 23:05:25 54 ----a-w- c:\windows\system32\rp_stats.dat
2009-10-28 23:05:25 39 ----a-w- c:\windows\system32\rp_rules.dat
2009-10-28 23:03:51 0 d-----w- c:\docume~1\alluse~1\applic~1\SUPERAntiSpyware.com
2009-10-28 23:02:49 93360 ----a-w- c:\windows\system32\drivers\SBREDrv.sys
2009-10-28 22:59:37 0 d-----w- c:\program files\SUPERAntiSpyware
2009-10-28 22:59:37 0 d-----w- c:\docume~1\rzanelli\applic~1\SUPERAntiSpyware.com
2009-10-28 22:57:25 0 d-----w- c:\program files\common files\Wise Installation Wizard
2009-10-28 17:08:18 0 d-----w- c:\docume~1\rzanelli\applic~1\RCP 5
2009-10-28 17:08:16 0 d-----w- c:\program files\ReaConverter 5.5 Pro
2009-10-14 15:01:05 0 d-----w- c:\docume~1\rzanelli\applic~1\Python-Eggs
2009-10-14 15:00:41 0 d-----w- c:\program files\Agilo
2009-10-12 15:22:34 26600 ----a-w- c:\windows\system32\drivers\GEARAspiWDM.sys
2009-10-12 15:22:34 107368 ----a-w- c:\windows\system32\GEARAspi.dll
2009-10-12 15:21:39 0 d-----w- c:\program files\iPod
2009-10-12 15:21:33 0 d-----w- c:\program files\iTunes
2009-10-12 15:21:33 0 d-----w- c:\docume~1\alluse~1\applic~1\{755AC846-7372-4AC8-8550-C52491DAA8BD}
2009-10-12 15:21:18 0 d-----w- c:\program files\Bonjour

==================== Find3M ====================

2009-10-29 19:59:24 135163 ----a-w- c:\windows\system32\nvModes.dat
2009-09-10 18:54:06 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2009-09-10 18:53:50 19160 ----a-w- c:\windows\system32\drivers\mbam.sys
2009-08-06 23:23:46 274288 ----a-w- c:\windows\system32\mucltui.dll
2009-08-06 23:23:46 215920 ----a-w- c:\windows\system32\muweb.dll
2009-08-05 09:01:48 204800 ----a-w- c:\windows\system32\mswebdvd.dll
2009-02-03 19:24:38 32768 --sha-w- c:\windows\system32\config\systemprofile\local settings\history\history.ie5\mshist012009020320090204\index.dat
2009-05-19 01:45:26 32768 --sha-w- c:\windows\temp\cookies\index.dat
2009-05-19 01:45:26 32768 --sha-w- c:\windows\temp\history\history.ie5\index.dat
2009-05-19 01:45:26 49152 --sha-w- c:\windows\temp\temporary internet files\content.ie5\index.dat

============= FINISH: 17:59:43.42 ===============

Attached Files



BC AdBot (Login to Remove)

 


#2 Buckeye_Sam

Buckeye_Sam

    Malware Expert


  • Members
  • 17,382 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Pickerington, Ohio
  • Local time:12:55 AM

Posted 30 October 2009 - 05:16 PM

Hello! :(
My name is Sam and I will be helping you.

In order to see what's going on with your computer I'll ask for you to post various logs from the tools that we will use to resolve your issue. Please also share with me any information about how your computer is reacting and behaving each step of the way as we work through this process.

Please download ComboFix from one of these locations:

Link 1
Link 2
Link 3

Important!
You should NOT use Combofix unless you have been instructed to do so by a Malware Removal Expert.
It is intended by its creator to be used under the guidance and supervision of an Malware Removal Expert, not for private use.
Using this tool incorrectly could lead to disastrous problems with your operating system such as preventing it from ever starting again.



Make sure that you save ComboFix.exe to your Desktop
  • Disable your AntiVirus and AntiSpyware applications, usually via a right click on the System Tray icon. They may otherwise interfere with our tools

  • Double click on ComboFix.exe & follow the prompts.

  • As part of it's process, ComboFix will check to see if the Microsoft Windows Recovery Console is installed. With malware infections being as they are today, it's strongly recommended to have this pre-installed on your machine before doing any malware removal. It will allow you to boot up into a special recovery/repair mode that will allow us to more easily help you should your computer have a problem after an attempted removal of malware.

  • Follow the prompts to allow ComboFix to download and install the Microsoft Windows Recovery Console, and when prompted, agree to the End-User License Agreement to install the Microsoft Windows Recovery Console.
**Please note: If the Microsoft Windows Recovery Console is already installed, ComboFix will continue it's malware removal procedures.


Posted Image


Once the Microsoft Windows Recovery Console is installed using ComboFix, you should see the following message:

Posted Image


Click on Yes, to continue scanning for malware.

When finished, it shall produce a log for you. Please include the C:\ComboFix.txt in your next reply.
Posted Image If I have helped you in any way, please consider a donation to help me continue the fight against malware.


Failing to respond back to the person that is giving up their own time to help you not only is insensitive and disrespectful, but it guarantees that you will never receive help from me again. Please thank your helpers and there will always be help here when you need it!


========================================================

#3 dunceguy

dunceguy
  • Topic Starter

  • Members
  • 3 posts
  • OFFLINE
  •  
  • Local time:01:55 AM

Posted 02 November 2009 - 05:54 PM

Hi Sam,

Thank you for your help!
I ran ComboFix as you requested. During the scan it said it detected rootkit activity and restarted the computer. It looks like the redirection is no longer occurring, so I hope my system is now clean!

Here is the ComboFix log:

ComboFix 09-11-01.04 - rzanelli 11/02/2009 17:01.1.2 - NTFSx86
Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.2046.1291 [GMT -5:00]
Running from: c:\documents and settings\rzanelli\Desktop\ComboFix.exe
AV: Symantec AntiVirus Corporate Edition *On-access scanning disabled* (Updated) {FB06448E-52B8-493A-90F3-E43226D3305C}
.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.

c:\program files\Mozilla Firefox\searchplugins\search.xml
c:\recycler\S-1-5-21-1177238915-1229272821-682003330-1003
c:\recycler\S-1-5-21-1937541479-1234471034-3367111647-1003
c:\recycler\S-1-5-21-1937541479-1234471034-3367111647-500
c:\recycler\S-1-5-21-2224904215-418096096-403357140-1003
c:\recycler\S-1-5-21-2407921302-3189288872-3036489917-1003
c:\recycler\S-1-5-21-3247591523-515429243-2249821913-1003
c:\windows\Downloaded Program Files\webinst.dll
c:\windows\system32\ban_list.txt
c:\windows\system32\images
c:\windows\system32\images\toolbar\calendar.gif
c:\windows\system32\images\toolbar\crlogo.gif
c:\windows\system32\images\toolbar\export.gif
c:\windows\system32\images\toolbar\export_over.gif
c:\windows\system32\images\toolbar\exportd.gif
c:\windows\system32\images\toolbar\First.gif
c:\windows\system32\images\toolbar\first_over.gif
c:\windows\system32\images\toolbar\Firstd.gif
c:\windows\system32\images\toolbar\gotopage.gif
c:\windows\system32\images\toolbar\gotopage_over.gif
c:\windows\system32\images\toolbar\gotopaged.gif
c:\windows\system32\images\toolbar\grouptree.gif
c:\windows\system32\images\toolbar\grouptree_over.gif
c:\windows\system32\images\toolbar\grouptreed.gif
c:\windows\system32\images\toolbar\grouptreepressed.gif
c:\windows\system32\images\toolbar\Last.gif
c:\windows\system32\images\toolbar\last_over.gif
c:\windows\system32\images\toolbar\Lastd.gif
c:\windows\system32\images\toolbar\Next.gif
c:\windows\system32\images\toolbar\next_over.gif
c:\windows\system32\images\toolbar\Nextd.gif
c:\windows\system32\images\toolbar\Prev.gif
c:\windows\system32\images\toolbar\prev_over.gif
c:\windows\system32\images\toolbar\Prevd.gif
c:\windows\system32\images\toolbar\print.gif
c:\windows\system32\images\toolbar\print_over.gif
c:\windows\system32\images\toolbar\printd.gif
c:\windows\system32\images\toolbar\Refresh.gif
c:\windows\system32\images\toolbar\refresh_over.gif
c:\windows\system32\images\toolbar\refreshd.gif
c:\windows\system32\images\toolbar\Search.gif
c:\windows\system32\images\toolbar\search_over.gif
c:\windows\system32\images\toolbar\searchd.gif
c:\windows\system32\images\toolbar\up.gif
c:\windows\system32\images\toolbar\up_over.gif
c:\windows\system32\images\toolbar\upd.gif
c:\windows\system32\images\tree\begindots.gif
c:\windows\system32\images\tree\beginminus.gif
c:\windows\system32\images\tree\beginplus.gif
c:\windows\system32\images\tree\blank.gif
c:\windows\system32\images\tree\blankdots.gif
c:\windows\system32\images\tree\dots.gif
c:\windows\system32\images\tree\lastdots.gif
c:\windows\system32\images\tree\lastminus.gif
c:\windows\system32\images\tree\lastplus.gif
c:\windows\system32\images\tree\Magnify.gif
c:\windows\system32\images\tree\minus.gif
c:\windows\system32\images\tree\minusbox.gif
c:\windows\system32\images\tree\plus.gif
c:\windows\system32\images\tree\plusbox.gif
c:\windows\system32\images\tree\singleminus.gif
c:\windows\system32\images\tree\singleplus.gif

Infected copy of c:\windows\system32\DRIVERS\atapi.sys was found and disinfected
Restored copy from - Kitty ate it :(
.
((((((((((((((((((((((((( Files Created from 2009-10-02 to 2009-11-02 )))))))))))))))))))))))))))))))
.

2009-11-02 22:24 . 2009-11-02 22:24 53248 ----a-w- c:\temp\catchme.dll
2009-11-02 22:05 . 2009-11-02 22:05 -------- d-----w- c:\windows\LastGood
2009-11-02 20:51 . 2009-11-02 20:51 -------- d-----w- c:\windows\system32\js
2009-11-02 20:51 . 2009-11-02 20:51 -------- d-----w- c:\windows\system32\html
2009-11-02 20:51 . 2009-11-02 20:51 -------- d-----w- c:\windows\system32\css
2009-11-02 20:19 . 2009-11-02 20:20 -------- d-----w- c:\program files\Microsoft Web Designer Tools
2009-11-02 20:19 . 2009-11-02 20:19 -------- d-----r- C:\MSOCache
2009-11-02 20:18 . 2009-11-02 20:18 -------- d-----w- c:\documents and settings\rzanelli\Local Settings\Application Data\Microsoft Help
2009-11-02 20:17 . 2009-11-02 20:41 -------- d-----w- c:\documents and settings\All Users\Application Data\Microsoft Help
2009-11-02 20:09 . 2009-11-02 22:23 -------- d-----w- c:\temp\SIT34801.tmp
2009-11-02 19:53 . 2009-11-02 19:53 157528 ----a-w- c:\documents and settings\LocalService\Local Settings\Application Data\FontCache3.0.0.0.dat
2009-11-02 19:41 . 2001-12-19 16:45 8576 ----a-w- c:\windows\system32\drivers\VCdRom.sys
2009-10-29 19:49 . 2009-10-29 20:01 -------- d---a-w- c:\documents and settings\All Users\Application Data\TEMP
2009-10-29 19:48 . 2006-06-19 17:01 69632 ----a-w- c:\windows\system32\ztvcabinet.dll
2009-10-29 19:48 . 2006-05-25 19:52 162304 ----a-w- c:\windows\system32\ztvunrar36.dll
2009-10-29 19:48 . 2005-08-26 05:50 77312 ----a-w- c:\windows\system32\ztvunace26.dll
2009-10-29 19:48 . 2003-02-03 00:06 153088 ----a-w- c:\windows\system32\UNRAR3.dll
2009-10-29 19:48 . 2002-03-06 05:00 75264 ----a-w- c:\windows\system32\unacev2.dll
2009-10-29 19:47 . 2009-10-29 19:48 -------- d-----w- c:\program files\Trojan Remover
2009-10-29 19:47 . 2009-10-29 19:47 -------- d-----w- c:\documents and settings\rzanelli\Application Data\Simply Super Software
2009-10-29 19:47 . 2009-10-29 19:47 -------- d-----w- c:\documents and settings\All Users\Application Data\Simply Super Software
2009-10-28 23:21 . 2009-09-23 12:55 64288 ----a-w- c:\windows\system32\drivers\Lbd.sys
2009-10-28 23:19 . 2009-10-28 23:19 -------- dc-h--w- c:\documents and settings\All Users\Application Data\{CFBD8779-FAAB-4357-84F2-1EC8619FADA6}
2009-10-28 23:18 . 2009-10-28 23:18 -------- d-----w- c:\program files\Lavasoft
2009-10-28 23:05 . 2009-10-28 23:14 54 ----a-w- c:\windows\system32\rp_stats.dat
2009-10-28 23:05 . 2009-10-28 23:14 39 ----a-w- c:\windows\system32\rp_rules.dat
2009-10-28 23:03 . 2009-10-28 23:03 -------- d-----w- c:\documents and settings\All Users\Application Data\SUPERAntiSpyware.com
2009-10-28 23:02 . 2009-10-28 23:01 93360 ----a-w- c:\windows\system32\drivers\SBREDrv.sys
2009-10-28 22:59 . 2009-10-28 22:59 -------- d-----w- c:\program files\SUPERAntiSpyware
2009-10-28 22:59 . 2009-10-28 22:59 -------- d-----w- c:\documents and settings\rzanelli\Application Data\SUPERAntiSpyware.com
2009-10-28 22:58 . 2009-10-28 23:18 -------- d-----w- c:\documents and settings\All Users\Application Data\Lavasoft
2009-10-28 22:57 . 2009-10-28 22:57 -------- d-----w- c:\program files\Common Files\Wise Installation Wizard
2009-10-28 17:08 . 2009-10-28 18:57 -------- d-----w- c:\documents and settings\rzanelli\Application Data\RCP 5
2009-10-28 17:08 . 2009-10-28 17:08 -------- d-----w- c:\program files\ReaConverter 5.5 Pro
2009-10-23 17:38 . 2009-10-23 17:38 -------- d-----w- c:\documents and settings\rzanelli\Local Settings\Application Data\{AF1CB04A-42F8-48EC-8C08-54B49D0484EB}
2009-10-14 15:01 . 2009-10-14 15:01 -------- d-----w- c:\documents and settings\rzanelli\Application Data\Python-Eggs
2009-10-14 15:00 . 2009-10-14 15:01 -------- d-----w- c:\program files\Agilo
2009-10-12 15:22 . 2009-05-18 18:17 26600 ----a-w- c:\windows\system32\drivers\GEARAspiWDM.sys
2009-10-12 15:22 . 2008-04-17 17:12 107368 ----a-w- c:\windows\system32\GEARAspi.dll
2009-10-12 15:21 . 2009-10-12 15:21 -------- d-----w- c:\program files\iPod
2009-10-12 15:21 . 2009-10-12 15:22 -------- d-----w- c:\program files\iTunes
2009-10-12 15:21 . 2009-10-12 15:22 -------- d-----w- c:\documents and settings\All Users\Application Data\{755AC846-7372-4AC8-8550-C52491DAA8BD}
2009-10-12 15:21 . 2009-10-12 15:21 -------- d-----w- c:\program files\Bonjour

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2009-11-02 22:21 . 2007-08-28 22:56 -------- d-----w- c:\program files\Symantec AntiVirus
2009-11-02 21:57 . 2006-09-12 20:10 135163 ----a-w- c:\windows\system32\nvModes.dat
2009-11-02 20:51 . 2009-11-02 20:51 -------- d-----w- c:\program files\Business Objects
2009-11-02 20:51 . 2009-11-02 20:25 -------- d-----w- c:\program files\Microsoft Visual Studio 9.0
2009-11-02 20:50 . 2009-11-02 20:47 -------- d-----w- c:\program files\Microsoft SQL Server
2009-11-02 20:48 . 2009-11-02 20:48 -------- d-----w- c:\program files\MSXML 6.0
2009-11-02 20:46 . 2009-11-02 20:46 -------- d-----w- c:\program files\Microsoft Device Emulator
2009-11-02 20:46 . 2009-11-02 20:45 -------- d-----w- c:\program files\Windows Mobile 5.0 SDK R2
2009-11-02 20:44 . 2009-11-02 20:44 -------- d-----w- c:\program files\Microsoft Synchronization Services
2009-11-02 20:44 . 2009-11-02 20:44 -------- d-----w- c:\program files\Microsoft SQL Server Compact Edition
2009-11-02 20:40 . 2007-01-08 21:59 69088 ----a-w- c:\documents and settings\rzanelli\Local Settings\Application Data\GDIPFONTCACHEV1.DAT
2009-11-02 20:34 . 2007-06-25 19:01 -------- d-----w- c:\program files\Common Files\Merge Modules
2009-11-02 20:34 . 2009-11-02 20:34 -------- d-----w- c:\documents and settings\All Users\Application Data\PreEmptive Solutions
2009-11-02 20:29 . 2009-11-02 20:25 -------- d-----w- c:\program files\HTML Help Workshop
2009-11-02 20:29 . 2009-09-15 03:03 -------- d-----w- c:\program files\MSBuild
2009-11-02 20:25 . 2009-11-02 20:25 -------- d-----w- c:\program files\Microsoft SDKs
2009-11-02 20:25 . 2009-11-02 20:25 -------- d-----w- c:\program files\CE Remote Tools
2009-10-27 22:03 . 2007-01-02 17:54 -------- d-----w- c:\program files\Trillian
2009-10-12 15:21 . 2009-09-21 15:18 -------- d-----w- c:\program files\Common Files\Apple
2009-10-12 15:21 . 2009-09-21 15:19 -------- d-----w- c:\documents and settings\All Users\Application Data\Apple Computer
2009-10-12 15:16 . 2008-04-09 02:40 -------- d-----w- c:\program files\Safari
2009-09-30 21:23 . 2008-04-02 17:53 -------- d-----w- c:\documents and settings\rzanelli\Application Data\SQL Developer
2009-09-21 15:20 . 2009-09-21 15:19 -------- d-----w- c:\program files\QuickTime
2009-09-21 15:18 . 2009-09-21 15:18 -------- d-----w- c:\program files\Apple Software Update
2009-09-21 15:18 . 2009-09-21 15:18 -------- d-----w- c:\documents and settings\All Users\Application Data\Apple
2009-09-15 23:05 . 2009-09-15 23:05 -------- d-----w- c:\program files\AsfTools 3.1
2009-09-15 03:03 . 2009-09-15 03:03 -------- d-----w- c:\program files\Reference Assemblies
2009-09-12 04:21 . 2007-07-12 20:41 -------- d-----w- c:\program files\Spybot - Search & Destroy
2009-09-12 04:20 . 2009-02-03 14:54 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
2009-09-10 18:54 . 2009-02-03 14:54 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2009-09-10 18:53 . 2009-02-03 14:54 19160 ----a-w- c:\windows\system32\drivers\mbam.sys
2009-08-06 23:24 . 2006-09-12 19:54 327896 ----a-w- c:\windows\system32\wucltui.dll
2009-08-06 23:24 . 2006-09-12 19:54 209632 ----a-w- c:\windows\system32\wuweb.dll
2009-08-06 23:24 . 2006-09-12 19:54 35552 ----a-w- c:\windows\system32\wups.dll
2009-08-06 23:24 . 2005-05-26 08:16 44768 ----a-w- c:\windows\system32\wups2.dll
2009-08-06 23:24 . 2006-09-12 19:54 53472 ----a-w- c:\windows\system32\wuauclt.exe
2009-08-06 23:24 . 2004-08-04 04:56 96480 ----a-w- c:\windows\system32\cdm.dll
2009-08-06 23:23 . 2006-09-12 19:54 575704 ----a-w- c:\windows\system32\wuapi.dll
2009-08-06 23:23 . 2006-09-13 14:59 274288 ----a-w- c:\windows\system32\mucltui.dll
2009-08-06 23:23 . 2006-09-12 19:54 1929952 ----a-w- c:\windows\system32\wuaueng.dll
2009-08-06 23:23 . 2005-05-26 08:19 215920 ----a-w- c:\windows\system32\muweb.dll
2009-08-05 09:01 . 2004-08-04 04:56 204800 ----a-w- c:\windows\system32\mswebdvd.dll
.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"SpybotSD TeaTimer"="c:\program files\Spybot - Search & Destroy\TeaTimer.exe" [2009-03-05 2260480]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"Apoint"="c:\program files\Apoint\Apoint.exe" [2005-10-07 176128]
"ccApp"="c:\program files\Common Files\Symantec Shared\ccApp.exe" [2006-07-19 52896]
"CoolSwitch"="c:\windows\system32\taskswitch.exe" [2002-03-19 45632]
"DLA"="c:\windows\System32\DLA\DLACTRLW.EXE" [2005-11-07 122940]
"IntelWireless"="c:\program files\Intel\Wireless\Bin\ifrmewrk.exe" [2006-05-01 602182]
"IntelZeroConfig"="c:\program files\Intel\Wireless\bin\ZCfgSvc.exe" [2006-05-01 667718]
"NvCplDaemon"="c:\windows\system32\NvCpl.dll" [2006-05-01 7561216]
"vptray"="c:\progra~1\SYMANT~1\VPTray.exe" [2006-09-28 125168]
"Malwarebytes Anti-Malware (reboot)"="c:\program files\Malwarebytes' Anti-Malware\mbam.exe" [2009-09-10 1312080]
"BluetoothAuthenticationAgent"="bthprops.cpl" - c:\windows\system32\bthprops.cpl [2008-04-14 110592]
"NVHotkey"="nvHotkey.dll" - c:\windows\system32\nvhotkey.dll [2006-05-01 73728]
"nwiz"="nwiz.exe" - c:\windows\system32\nwiz.exe [2006-05-01 1519616]
"PMX Daemon"="ICO.EXE" - c:\windows\system32\ico.exe [2006-06-09 47104]
"SigmatelSysTrayApp"="stsystra.exe" - c:\windows\stsystra.exe [2006-03-24 282624]

c:\documents and settings\rzanelli\Start Menu\Programs\Startup\
Trillian.lnk - \\Donatello\c$\Program Files\Trillian\trillian.exe [2009-8-31 1873272]

c:\documents and settings\All Users\Start Menu\Programs\Startup\
Adobe Reader Speed Launch.lnk.disabled [2009-2-5 1757]
Digital Line Detect.lnk - c:\program files\Digital Line Detect\DLG.exe [2006-9-12 24576]
PGPtray.lnk - c:\program files\PGP Corporation\PGP for Windows XP\PGPtray.exe [2007-8-4 339968]

[hkey_local_machine\software\microsoft\windows\currentversion\explorer\ShellExecuteHooks]
"{5AE067D3-9AFB-48E0-853A-EBB7F4A000DA}"= "c:\program files\SUPERAntiSpyware\SASSEH.DLL" [2008-05-13 77824]

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\!SASWinLogon]
2009-09-03 19:21 548352 ----a-w- c:\program files\SUPERAntiSpyware\SASWINLO.dll

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\Lavasoft Ad-Aware Service]
@="Service"

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecAntiVirus]
"DisableMonitoring"=dword:00000001

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]
"EnableFirewall"= 0 (0x0)

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=
"c:\\Program Files\\Symantec AntiVirus\\VPC32.exe"=
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\GloballyOpenPorts\List]
"38293:UDP"= 38293:UDP:SAV Server Discovery
"2967:TCP"= 2967:TCP:Symantec System Center

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\IcmpSettings]
"AllowInboundEchoRequest"= 1 (0x1)

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\RemoteAdminSettings]
"RemoteAddresses"= LocalSubNet
"Enabled"= 1 (0x1)

R0 Lbd;Lbd;c:\windows\system32\drivers\Lbd.sys [10/28/2009 6:21 PM 64288]
R1 SASDIFSV;SASDIFSV;c:\program files\SUPERAntiSpyware\sasdifsv.sys [10/12/2009 8:24 PM 9968]
R1 SASKUTIL;SASKUTIL;c:\program files\SUPERAntiSpyware\SASKUTIL.SYS [10/12/2009 8:24 PM 74480]
R1 vcdrom;Virtual CD-ROM Device Driver;c:\windows\system32\drivers\VCdRom.sys [11/2/2009 2:41 PM 8576]
R2 ASFIPmon;Broadcom ASF IP Monitor;c:\program files\Broadcom\ASFIPMon\AsfIpMon.exe [10/18/2005 4:11 PM 61440]
R2 Lavasoft Ad-Aware Service;Lavasoft Ad-Aware Service;c:\program files\Lavasoft\Ad-Aware\AAWService.exe [9/24/2009 6:17 AM 1179232]
R2 SavRoam;SAVRoam;c:\program files\Symantec AntiVirus\SavRoam.exe [9/27/2006 7:33 PM 116464]
R3 EraserUtilRebootDrv;EraserUtilRebootDrv;c:\program files\Common Files\Symantec Shared\EENGINE\EraserUtilRebootDrv.sys [9/11/2009 11:22 PM 102448]
S3 DB2ControlCenterServer;DB2 JDBC Applet Server - Control Center;c:\program files\SQLLIB\bin\db2ccs.exe [1/10/2007 1:59 PM 141312]
S3 EraserUtilDrv10910;EraserUtilDrv10910;\??\c:\program files\Common Files\Symantec Shared\EENGINE\EraserUtilDrv10910.sys --> c:\program files\Common Files\Symantec Shared\EENGINE\EraserUtilDrv10910.sys [?]
S3 NPF;NetGroup Packet Filter Driver;c:\windows\system32\drivers\npf.sys [12/23/2008 10:35 AM 50704]
S3 rcp_service;ReaConverter scheduler service;c:\program files\ReaConverter 5.5 Pro\rcp_scheduler.exe [11/30/2007 10:27 AM 558592]
S3 SASENUM;SASENUM;c:\program files\SUPERAntiSpyware\SASENUM.SYS [10/12/2009 8:24 PM 7408]

--- Other Services/Drivers In Memory ---

*NewlyCreated* - MBR
*Deregistered* - mbr
*Deregistered* - PROCEXP113
.
Contents of the 'Scheduled Tasks' folder

2009-11-02 c:\windows\Tasks\Ad-Aware Update (Weekly).job
- c:\program files\Lavasoft\Ad-Aware\Ad-AwareAdmin.exe [2009-10-01 23:20]

2009-10-29 c:\windows\Tasks\AppleSoftwareUpdate.job
- c:\program files\Apple Software Update\SoftwareUpdate.exe [2008-07-30 16:34]

2009-04-09 c:\windows\Tasks\Emule.job
- c:\programs\old\eMule0.47c\emule.exe [2006-09-14 21:15]

2009-04-09 c:\windows\Tasks\kill Emule.job
- c:\windows\system32\taskkill.exe [2001-08-23 00:12]
.
.
------- Supplementary Scan -------
.
uStart Page = hxxp://iwww/
mStart Page = hxxp://www.google.com
mSearchMigratedDefaultURL =
uInternet Connection Wizard,ShellNext = hxxp://iwww.trcinc.com/
uInternet Settings,ProxyOverride = *.local
IE: &AIM Search - c:\program files\AIM Toolbar\AIMBar.dll/aimsearch.htm
IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~2\OFFICE11\EXCEL.EXE/3000
DPF: {D30CA0FD-1CA0-11D4-AC78-006008A9A8BC} - hxxp://155.17.95.35/US%20Workstations/webinst.cab
FF - ProfilePath - c:\documents and settings\rzanelli\Application Data\Mozilla\Firefox\Profiles\yscc6too.default\
FF - prefs.js: browser.search.selectedEngine - Google
FF - prefs.js: browser.startup.homepage - hxxp://iwww
FF - HiddenExtension: XULRunner: {AF1CB04A-42F8-48EC-8C08-54B49D0484EB} - c:\documents and settings\rzanelli\Local Settings\Application Data\{AF1CB04A-42F8-48EC-8C08-54B49D0484EB}\
.
- - - - ORPHANS REMOVED - - - -

Notify-crypt32chain - (no file)



**************************************************************************

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2009-11-02 17:24
Windows 5.1.2600 Service Pack 3 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully
hidden files: 0

**************************************************************************
.
--------------------- DLLs Loaded Under Running Processes ---------------------

- - - - - - - > 'winlogon.exe'(996)
c:\program files\SUPERAntiSpyware\SASWINLO.dll
c:\windows\system32\WININET.dll

- - - - - - - > 'lsass.exe'(1052)
c:\program files\Bonjour\mdnsNSP.dll
.
Completion time: 2009-11-02 17:34
ComboFix-quarantined-files.txt 2009-11-02 22:34

Pre-Run: 33,162,731,520 bytes free
Post-Run: 33,100,365,824 bytes free

- - End Of File - - DD721086641C9B208BCCE968627007EC

#4 Buckeye_Sam

Buckeye_Sam

    Malware Expert


  • Members
  • 17,382 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Pickerington, Ohio
  • Local time:12:55 AM

Posted 02 November 2009 - 07:23 PM

Looks pretty good, but we need to run one more scan to pick up any remnants.


Please update Malwarebytes and run a full scan.
  • Open Malwarebytes and select the Update tab.
  • Click on the Check for Updates button and allow the program to download the latest updates.
  • Once you have the latest updates, select the Scanner tab.
  • Select "Perform full scan" and click the Scan button.
  • If asked to select the drives to scan, leave all the drives selected and click on the Start Scan button.
  • The scan will begin and "Scan in progress" will show at the top. It may take some time to complete so please be patient.
  • When the scan is finished, a message box will say "The scan completed successfully. Click 'Show Results' to display all objects found".
  • Click OK to close the message box and continue with the removal process.
  • Back at the main Scanner screen, click on the Show Results button to see a list of any malware that was found.
  • Make sure that everything is checked, and click Remove Selected.
  • When removal is completed, a log report will open in Notepad and you may be prompted to restart your computer. (see Note below)
  • The log is automatically saved and can be viewed by clicking the Logs tab in MBAM.
  • Copy and paste the contents of that report in your next reply and exit MBAM.
Note: If MBAM encounters a file that is difficult to remove, you will be presented with 1 of 2 prompts. Click OK to either and let MBAM proceed with the disinfection process. If asked to restart the computer, please do so immediately. Failure to reboot will prevent MBAM from removing all the malware.
Posted Image If I have helped you in any way, please consider a donation to help me continue the fight against malware.


Failing to respond back to the person that is giving up their own time to help you not only is insensitive and disrespectful, but it guarantees that you will never receive help from me again. Please thank your helpers and there will always be help here when you need it!


========================================================

#5 dunceguy

dunceguy
  • Topic Starter

  • Members
  • 3 posts
  • OFFLINE
  •  
  • Local time:01:55 AM

Posted 03 November 2009 - 12:27 PM

I ran MalwareBytes and it said that it didn't find anything. Here is the MBAM log:


Malwarebytes' Anti-Malware 1.41
Database version: 3092
Windows 5.1.2600 Service Pack 3

11/3/2009 12:25:32 PM
mbam-log-2009-11-03 (12-25-32).txt

Scan type: Full Scan (C:\|)
Objects scanned: 382881
Time elapsed: 2 hour(s), 25 minute(s), 16 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 0

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
(No malicious items detected)

#6 Buckeye_Sam

Buckeye_Sam

    Malware Expert


  • Members
  • 17,382 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Pickerington, Ohio
  • Local time:12:55 AM

Posted 04 November 2009 - 07:45 AM

Excellent! :(
As long as things are running smoothly on your end now, I'll go ahead and post some final steps and recommendations.



We need to remove Combofix now that we're done with it.
  • Click START then RUN
  • Now type Combofix /u in the runbox and click OK

  • Posted Image



==================



Now that you are clean, please follow these simple steps in order to keep your computer clean and secure:
  • Disable and Enable System Restore. - You should disable and reenable system restore to make sure there are no infected files found in a restore point left over from what we have just cleaned.

    You can find instructions on how to enable and reenable system restore here:

    Windows XP System Restore Guide

    Renable system restore with instructions from tutorial above

  • Use an AntiVirus Software - It is very important that your computer has an anti-virus software running on your machine. This alone can save you a lot of trouble with malware in the future.

    See this link for a listing of some online & their stand-alone antivirus programs:

    Virus, Spyware, and Malware Protection and Removal Resources

  • Update your AntiVirus Software - It is imperitive that you update your Antivirus software at least once a week (Even more if you wish). If you do not update your antivirus software then it will not be able to catch any of the new variants that may come out.

  • Use a Firewall - I can not stress how important it is that you use a Firewall on your computer. Without a firewall your computer is succeptible to being hacked and taken over. I am very serious about this and see it happen almost every day with my clients. Simply using a Firewall in its default configuration can lower your risk greatly.

    For a tutorial on Firewalls and a listing of some available ones see the link below:

    Understanding and Using Firewalls

  • Visit Microsoft's Windows Update Site Frequently - It is important that you visit http://www.windowsupdate.com regularly. This will ensure your computer has always the latest security updates available installed on your computer. If there are new updates to install, install them immediately, reboot your computer, and revisit the site until there are no more critical updates.

  • Install Spybot - Search and Destroy - Install and download Spybot - Search and Destroy with its TeaTimer option. This will provide realtime spyware & hijacker protection on your computer alongside your virus protection. You should also scan your computer with program on a regular basis just as you would an antivirus software.

    A tutorial on installing & using this product can be found here:

    Using Spybot - Search & Destroy to remove Spyware , Malware, and Hijackers

  • Install SpywareBlaster - SpywareBlaster will added a large list of programs and sites into your Internet Explorer settings that will protect you from running and downloading known malicious programs.

    A tutorial on installing & using this product can be found here:

    Using SpywareBlaster to protect your computer from Spyware and Malware

  • Update all these programs regularly - Make sure you update all the programs I have listed regularly. Without regular updates you WILL NOT be protected when new malicious programs are released.
Follow this list and your potential for being infected again will reduce dramatically.

:( :)
Posted Image If I have helped you in any way, please consider a donation to help me continue the fight against malware.


Failing to respond back to the person that is giving up their own time to help you not only is insensitive and disrespectful, but it guarantees that you will never receive help from me again. Please thank your helpers and there will always be help here when you need it!


========================================================




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users