Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Window launches and redirects


  • This topic is locked This topic is locked
14 replies to this topic

#1 All4's

All4's

  • Members
  • 7 posts
  • OFFLINE
  •  
  • Local time:12:31 AM

Posted 30 November 2009 - 10:32 PM

Hello, sounds like i am in the same boat as sraelkin and others. I keep getting IE opening a new window and directing me here: hxxp://www.ppcblinks.com/promo/?sid=NTA0NTIuNTk1LjI0NS0wLjE4MC4u and to other websites. I also get search engine redirects on both google and bing. This is crippling my ability to use the laptop for powerpoint, and other business functions.


DDS (Ver_09-11-29.01) - NTFSx86
Run by 10032507 at 21:56:52.56 on Mon 11/30/2009
Internet Explorer: 6.0.2900.2180
Microsoft Windows XP Professional 5.1.2600.2.1252.1.1033.18.1015.320 [GMT -5:00]

AV: avast! antivirus 4.8.1368 [VPS 091130-1] *On-access scanning disabled* (Updated) {7591DB91-41F0-48A3-B128-1A293FD8233D}
AV: Symantec AntiVirus Corporate Edition *On-access scanning enabled* (Updated) {FB06448E-52B8-493A-90F3-E43226D3305C}

============== Running Processes ===============

C:\WINDOWS\system32\svchost -k DcomLaunch
svchost.exe
C:\WINDOWS\System32\svchost.exe -k netsvcs
C:\Program Files\Intel\Wireless\Bin\EvtEng.exe
C:\Program Files\Intel\Wireless\Bin\S24EvMon.exe
C:\Program Files\Intel\Wireless\Bin\WLKeeper.exe
svchost.exe
svchost.exe
C:\Program Files\Common Files\Symantec Shared\ccSetMgr.exe
C:\Program Files\Common Files\Symantec Shared\ccEvtMgr.exe
C:\Program Files\Alwil Software\Avast4\aswUpdSv.exe
C:\Program Files\Alwil Software\Avast4\ashServ.exe
C:\WINDOWS\system32\spoolsv.exe
svchost.exe
C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
C:\Program Files\Bonjour\mDNSResponder.exe
C:\Program Files\Symantec AntiVirus\DefWatch.exe
C:\Program Files\Dell\OpenManage\Client\Iap.exe
C:\Program Files\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE
C:\Program Files\SAP\SAPsetup\setup\Updater\NwSapAutoWorkstationUpdateService.exe
C:\Program Files\Intel\Wireless\Bin\RegSrvc.exe
C:\Program Files\Symantec AntiVirus\SavRoam.exe
C:\Program Files\Symantec AntiVirus\Rtvscan.exe
C:\Program Files\UPHClean\uphclean.exe
C:\WINDOWS\system32\CCM\CLICOMP\RemCtrl\Wuser32.exe
C:\WINDOWS\system32\CCM\CcmExec.exe
C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe
C:\Program Files\Alwil Software\Avast4\ashWebSv.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\igfxpers.exe
C:\WINDOWS\system32\igfxsrvc.exe
C:\Program Files\Apoint\Apoint.exe
C:\WINDOWS\system32\dla\tfswctrl.exe
C:\Program Files\Common Files\Symantec Shared\ccApp.exe
C:\PROGRA~1\SYMANT~1\VPTray.exe
C:\Program Files\CyberLink\PowerDVD\DVDLauncher.exe
C:\Program Files\SAP\SAPsetup\setup\Updater\NwSapSetupUserNotificationTool.exe
C:\Program Files\Apoint\Apntex.exe
C:\Program Files\Intel\Wireless\bin\ZCfgSvc.exe
C:\Program Files\Intel\Wireless\Bin\ifrmewrk.exe
C:\Program Files\iTunes\iTunesHelper.exe
C:\PROGRA~1\ALWILS~1\Avast4\ashDisp.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\iPod\bin\iPodService.exe
C:\Program Files\Internet Explorer\IEXPLORE.EXE
C:\Documents and Settings\10032507\Desktop\dds.scr

============== Pseudo HJT Report ===============

uStart Page = https://www.ynaconnection.com/
mDefault_Page_URL = https://www.ynaconnection.com
uInternet Settings,ProxyServer = proxy-2.yazaki.local:8080
BHO: Adobe PDF Reader Link Helper: {06849e9f-c8d7-4d59-b87d-784b7d6be0b3} - c:\program files\common files\adobe\acrobat\activex\AcroIEHelper.dll
BHO: SSVHelper Class: {761497bb-d6f0-462c-b6eb-d4daf1d92d43} - c:\program files\java\jre1.6.0_05\bin\ssv.dll
uRun: [CTFMON.EXE] c:\windows\system32\ctfmon.exe
mRun: [IMJPMIG8.1] "c:\windows\ime\imjp8_1\IMJPMIG.EXE" /Spoil /RemAdvDef /Migration32
mRun: [PHIME2002ASync] c:\windows\system32\ime\tintlgnt\TINTSETP.EXE /SYNC
mRun: [PHIME2002A] c:\windows\system32\ime\tintlgnt\TINTSETP.EXE /IMEName
mRun: [igfxtray] c:\windows\system32\igfxtray.exe
mRun: [igfxhkcmd] c:\windows\system32\hkcmd.exe
mRun: [igfxpers] c:\windows\system32\igfxpers.exe
mRun: [Apoint] c:\program files\apoint\Apoint.exe
mRun: [dla] c:\windows\system32\dla\tfswctrl.exe
mRun: [UpdateManager] "c:\program files\common files\sonic\update manager\sgtray.exe" /r
mRun: [ccApp] "c:\program files\common files\symantec shared\ccApp.exe"
mRun: [vptray] c:\progra~1\symant~1\VPTray.exe
mRun: [DVDLauncher] "c:\program files\cyberlink\powerdvd\DVDLauncher.exe"
mRun: [SAP_WUS_UNT] "c:\program files\sap\sapsetup\setup\updater\NwSapSetupUserNotificationTool.exe"
mRun: [MSPY2002] c:\windows\system32\ime\pintlgnt\ImScInst.exe /SYNC
mRun: [IntelZeroConfig] "c:\program files\intel\wireless\bin\ZCfgSvc.exe"
mRun: [IntelWireless] "c:\program files\intel\wireless\bin\ifrmewrk.exe" /tf Intel PROSet/Wireless
mRun: [<NO NAME>]
mRun: [SSRPM Enrollment Wizard] "c:\program files\tools4ever\ssrpm\enrollment wizard\SSRPMEnroll.exe" /Autostart
mRun: [Synchronization Manager] %SystemRoot%\system32\mobsync.exe /logon
mRun: [QuickTime Task] "c:\program files\quicktime\qttask.exe" -atboottime
mRun: [iTunesHelper] "c:\program files\itunes\iTunesHelper.exe"
mRun: [Malwarebytes Anti-Malware (reboot)] "c:\program files\malwarebytes' anti-malware\mbam.exe" /runcleanupscript
mRun: [avast!] c:\progra~1\alwils~1\avast4\ashDisp.exe
dRun: [CTFMON.EXE] c:\windows\system32\CTFMON.EXE
uPolicies-explorer: NoDesktopCleanupWizard = 1 (0x1)
uPolicies-system: ConnectHomeDirToRoot = 0 (0x0)
mPolicies-explorer: NoWelcomeScreen = 1 (0x1)
IE: E&xport to Microsoft Excel - c:\progra~1\micros~2\office11\EXCEL.EXE/3000
IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe
IE: {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - {CAFEEFAC-0016-0000-0005-ABCDEFFEDCBC} - c:\program files\java\jre1.6.0_05\bin\ssv.dll
IE: {92780B25-18CC-41C8-B9BE-3C9C571A8263} - {FF059E31-CC5A-4E2E-BF3B-96E929D65503} - c:\progra~1\micros~2\office11\REFIEBAR.DLL
Trusted Zone: intersourcing.com
Trusted Zone: intersourcing.com\www52
Trusted Zone: ufjbank.co.jp\uwb
Trusted Zone: ufjbank.co.jp\uwbw
Trusted Zone: yazaki.com\apps.us
Trusted Zone: yazaki.com\local.us
Trusted Zone: toyota-edc.com\mailbox.us
Trusted Zone: ufjbank.co.jp\uwb
Trusted Zone: ufjbank.co.jp\uwbw
Trusted Zone: ultiprotime.com
Trusted Zone: yazaki-europe.com\gpdb
Trusted Zone: yazaki.com\apps.us
Trusted Zone: yazaki.com\local.us
Trusted Zone: yazaki.local\projsvr01
Trusted Zone: yazaki.net\xpedio
DPF: SEAGULL J Walk Java Client 3_1C7 - hxxp://ayccantn.yna.yazaki.net/jwalk/jwalk_ie.cab
DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_05-windows-i586.cab
DPF: {CAFEEFAC-0014-0002-0008-ABCDEFFEDCBA} - hxxp://java.sun.com/products/plugin/autodl/jinstall-142-windows-i586.cab
DPF: {CAFEEFAC-0016-0000-0005-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_05-windows-i586.cab
Handler: linkscanner - {F274614C-63F8-47D5-A4D1-FBDDE494F8D1} -
Handler: saphtmlp - {D1F8BD1E-7967-11D2-B43A-006094B9EADB} - c:\program files\sap\frontend\sapgui\SAPHTMLP.DLL
Handler: sapr3 - {D1F8BD1E-7967-11D2-B43A-006094B9EADB} - c:\program files\sap\frontend\sapgui\SAPHTMLP.DLL
Notify: igfxcui - igfxdev.dll
Notify: NavLogon - c:\windows\system32\NavLogon.dll
Hosts: 127.0.0.1 www.spywareinfo.com

============= SERVICES / DRIVERS ===============

R0 aaatimeo;aaatimeo;c:\windows\system32\drivers\aaatimeo.sys [2009-6-30 4928]
R1 aswSP;avast! Self Protection;c:\windows\system32\drivers\aswSP.sys [2009-11-30 114768]
R1 SAVRT;SAVRT;c:\program files\symantec antivirus\savrt.sys [2006-9-6 337592]
R1 SAVRTPEL;SAVRTPEL;c:\program files\symantec antivirus\Savrtpel.sys [2006-9-6 54968]
R2 aswFsBlk;aswFsBlk;c:\windows\system32\drivers\aswFsBlk.sys [2009-11-30 20560]
R2 avast! Antivirus;avast! Antivirus;c:\program files\alwil software\avast4\ashServ.exe [2009-11-30 138680]
R2 ccEvtMgr;Symantec Event Manager;c:\program files\common files\symantec shared\ccEvtMgr.exe [2006-7-19 192160]
R2 ccSetMgr;Symantec Settings Manager;c:\program files\common files\symantec shared\ccSetMgr.exe [2006-7-19 169632]
R2 NWSAPAutoWorkstationUpdateSvc;SAPSetup Automatic Workstation Update Service;c:\program files\sap\sapsetup\setup\updater\NwSapAutoWorkstationUpdateService.exe [2009-6-30 259440]
R2 SavRoam;SAVRoam;c:\program files\symantec antivirus\SavRoam.exe [2006-9-27 116464]
R2 Symantec AntiVirus;Symantec AntiVirus;c:\program files\symantec antivirus\Rtvscan.exe [2006-9-27 1813232]
R3 avast! Mail Scanner;avast! Mail Scanner;c:\program files\alwil software\avast4\ashMaiSv.exe [2009-11-30 254040]
R3 avast! Web Scanner;avast! Web Scanner;c:\program files\alwil software\avast4\ashWebSv.exe [2009-11-30 352920]
R3 EraserUtilRebootDrv;EraserUtilRebootDrv;c:\program files\common files\symantec shared\eengine\EraserUtilRebootDrv.sys [2009-10-30 102448]
R3 GTIPCI21;GTIPCI21;c:\windows\system32\drivers\gtipci21.sys [2009-6-30 80384]
R3 NAVENG;NAVENG;c:\progra~1\common~1\symant~1\virusd~1\20091130.004\naveng.sys [2009-11-30 84912]
R3 NAVEX15;NAVEX15;c:\progra~1\common~1\symant~1\virusd~1\20091130.004\navex15.sys [2009-11-30 1323568]
S3 TMPassthruMP;TMPassthruMP;c:\windows\system32\drivers\tmpassthru.sys --> c:\windows\system32\drivers\TMPassthru.sys [?]
S4 aarich;aarich;c:\windows\system32\drivers\aarich.sys [2009-6-30 241815]
S4 cda1000;cda1000;c:\windows\system32\drivers\cda1000.sys [2009-6-30 280608]

=============== Created Last 30 ================

2009-12-01 00:15:19 0 d-----w- c:\program files\Spybot - Search & Destroy
2009-12-01 00:15:19 0 d-----w- c:\docume~1\alluse~1\applic~1\Spybot - Search & Destroy
2009-11-30 19:47:02 0 ----a-w- c:\windows\VPC32.INI
2009-11-29 17:30:27 93360 ----a-w- c:\windows\system32\drivers\SBREDrv.sys
2009-11-29 15:14:26 0 d-----w- c:\docume~1\alluse~1\applic~1\avg9
2009-11-29 15:06:56 0 d-----w- c:\docume~1\10032507\applic~1\AVG8
2009-11-29 00:36:40 0 d-----w- c:\program files\Trend Micro
2009-11-29 00:30:07 0 d-----w- c:\documents and settings\10032507\log
2009-11-17 03:22:59 0 d-----w- c:\docume~1\10032507\applic~1\Malwarebytes
2009-11-17 03:22:53 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2009-11-17 03:22:52 19160 ----a-w- c:\windows\system32\drivers\mbam.sys
2009-11-17 03:22:52 0 d-----w- c:\program files\Malwarebytes' Anti-Malware
2009-11-17 03:22:52 0 d-----w- c:\docume~1\alluse~1\applic~1\Malwarebytes
2009-11-16 22:52:50 0 d-----w- c:\windows\system32\Adobe
2009-11-11 15:18:57 3253 ----a-w- c:\windows\system32\wbem\Outlook_01ca62e249c424c8.mof
2009-11-01 04:39:34 26600 ----a-w- c:\windows\system32\drivers\GEARAspiWDM.sys
2009-11-01 04:39:34 107368 ----a-w- c:\windows\system32\GEARAspi.dll
2009-11-01 04:38:40 0 d-----w- c:\program files\iPod
2009-11-01 04:38:35 0 d-----w- c:\program files\iTunes
2009-11-01 04:38:35 0 d-----w- c:\docume~1\alluse~1\applic~1\{755AC846-7372-4AC8-8550-C52491DAA8BD}
2009-11-01 04:38:02 0 d-----w- c:\program files\Bonjour

==================== Find3M ====================

2009-11-28 18:55:59 95360 ----a-w- c:\windows\system32\drivers\atapi.sys
2009-10-26 04:07:03 262144 ----a-w- c:\windows\system32\default_user_class.dat
2009-10-20 15:00:17 21275 ----a-w- c:\windows\system32\drivers\AegisP.sys
2009-09-25 05:56:36 662016 ----a-w- c:\windows\system32\wininet.dll
2009-09-25 05:56:32 81920 ----a-w- c:\windows\system32\ieencode.dll
2009-09-11 14:33:52 133632 ----a-w- c:\windows\system32\msv1_0.dll
2009-09-04 20:45:26 58880 ----a-w- c:\windows\system32\msasn1.dll
2008-06-12 11:53:04 955904 ----a-w- c:\program files\common files\SAPActiveXL.xlt
2008-06-12 11:53:04 949760 ----a-w- c:\program files\common files\SAPActiveXL_nosig.xlt
2008-06-12 11:53:04 626688 ----a-w- c:\program files\common files\sapconsaccess.dll
2008-06-12 11:53:04 40960 ----a-w- c:\program files\common files\DigitalSignature.ocx
2008-06-12 11:53:04 3125248 ----a-w- c:\program files\common files\sapxlhelper.dll
2008-06-12 11:53:04 192512 ----a-w- c:\program files\common files\sapconsr3.dll

============= FINISH: 21:58:08.25 ===============

Attached Files


Edited by Orange Blossom, 30 November 2009 - 10:37 PM.
Deactivate links. ~ OB


BC AdBot (Login to Remove)

 


#2 JSntgRvr

JSntgRvr

    Master Surgeon General


  • Malware Response Team
  • 11,635 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto Rico
  • Local time:01:31 AM

Posted 01 December 2009 - 07:55 PM

Hi, All4's :(

Welcome.

Posted Image
Download GMER Rootkit Scanner from here or here.
  • Extract the contents of the zipped file to desktop.
  • Double click GMER.exe.
  • If it gives you a warning about rootkit activity and asks if you want to run a full scan...click on NO, then use the following settings for a more complete scan..

    Posted Image
    Click the image to enlarge it
  • In the right panel, you will see several boxes that have been checked. Ensure the following are UNCHECKED ...
    • Sections
    • IAT/EAT
    • Drives/Partition other than Systemdrive (typically C:\)
    • Show All (don't miss this one)
  • Then click the Scan button & wait for it to finish.
  • Once done click on the [Save..] button, and in the File name area, type in "ark.txt"
  • Save it where you can easily find it, such as your desktop and post its contents in your next reply.
**Caution**
Rootkit scans often produce false positives. Do NOT take any action on any "<--- ROOKIT" entries

No request for help throughout private messaging will be attended.

If I have helped you, consider making a donation to help me continue the fight against Malware!
btn_donate_SM.gif


#3 All4's

All4's
  • Topic Starter

  • Members
  • 7 posts
  • OFFLINE
  •  
  • Local time:12:31 AM

Posted 01 December 2009 - 08:54 PM

GMER 1.0.15.15252 - http://www.gmer.net
Rootkit scan 2009-12-01 20:53:19
Windows 5.1.2600 Service Pack 2
Running: gmer.exe; Driver: C:\DOCUME~1\10032507\LOCALS~1\Temp\kflcrkod.sys


---- System - GMER 1.0.15 ----

SSDT \SystemRoot\System32\Drivers\aswSP.SYS (avast! self protection module/ALWIL Software) ZwClose [0xA2B356B8]
SSDT 86313A28 ZwConnectPort
SSDT \SystemRoot\System32\Drivers\aswSP.SYS (avast! self protection module/ALWIL Software) ZwCreateKey [0xA2B35574]
SSDT \??\C:\Program Files\Symantec\SYMEVENT.SYS (Symantec Event Library/Symantec Corporation) ZwDeleteValueKey [0xA7933350]
SSDT \SystemRoot\System32\Drivers\aswSP.SYS (avast! self protection module/ALWIL Software) ZwDuplicateObject [0xA2B3514C]
SSDT \SystemRoot\System32\Drivers\aswSP.SYS (avast! self protection module/ALWIL Software) ZwOpenKey [0xA2B3564E]
SSDT \SystemRoot\System32\Drivers\aswSP.SYS (avast! self protection module/ALWIL Software) ZwOpenProcess [0xA2B3508C]
SSDT \SystemRoot\System32\Drivers\aswSP.SYS (avast! self protection module/ALWIL Software) ZwOpenThread [0xA2B350F0]
SSDT \SystemRoot\System32\Drivers\aswSP.SYS (avast! self protection module/ALWIL Software) ZwQueryValueKey [0xA2B3576E]
SSDT \SystemRoot\System32\Drivers\aswSP.SYS (avast! self protection module/ALWIL Software) ZwRestoreKey [0xA2B3572E]
SSDT \??\C:\Program Files\Symantec\SYMEVENT.SYS (Symantec Event Library/Symantec Corporation) ZwSetValueKey [0xA7933580]
SSDT \??\C:\WINDOWS\system32\Drivers\uphcleanhlp.sys ZwUnloadKey [0xA28B76D0]

---- Devices - GMER 1.0.15 ----

AttachedDevice \FileSystem\Ntfs \Ntfs aswMon2.SYS (avast! File System Filter Driver for Windows XP/ALWIL Software)
AttachedDevice \FileSystem\Ntfs \Ntfs SYMEVENT.SYS (Symantec Event Library/Symantec Corporation)
AttachedDevice \Driver\Tcpip \Device\Ip SYMTDI.SYS (Network Dispatch Driver/Symantec Corporation)
AttachedDevice \Driver\Tcpip \Device\Ip aswRdr.SYS (avast! TDI RDR Driver/ALWIL Software)
AttachedDevice \Driver\Tcpip \Device\Ip aswTdi.SYS (avast! TDI Filter Driver/ALWIL Software)
AttachedDevice \Driver\Tcpip \Device\Tcp aswTdi.SYS (avast! TDI Filter Driver/ALWIL Software)
AttachedDevice \Driver\Tcpip \Device\Tcp SYMTDI.SYS (Network Dispatch Driver/Symantec Corporation)
AttachedDevice \Driver\Tcpip \Device\Tcp aswRdr.SYS (avast! TDI RDR Driver/ALWIL Software)
AttachedDevice \Driver\Tcpip \Device\Udp aswTdi.SYS (avast! TDI Filter Driver/ALWIL Software)
AttachedDevice \Driver\Tcpip \Device\Udp SYMTDI.SYS (Network Dispatch Driver/Symantec Corporation)
AttachedDevice \Driver\Tcpip \Device\Udp aswRdr.SYS (avast! TDI RDR Driver/ALWIL Software)
AttachedDevice \Driver\Tcpip \Device\RawIp aswTdi.SYS (avast! TDI Filter Driver/ALWIL Software)
AttachedDevice \Driver\Tcpip \Device\RawIp SYMTDI.SYS (Network Dispatch Driver/Symantec Corporation)

Device \FileSystem\Fs_Rec \FileSystem\UdfsCdRomRecognizer tfsnifs.sys (Drive Letter Access Component/Sonic Solutions)
Device \FileSystem\Fs_Rec \FileSystem\FatCdRomRecognizer tfsnifs.sys (Drive Letter Access Component/Sonic Solutions)
Device \FileSystem\Fs_Rec \FileSystem\CdfsRecognizer tfsnifs.sys (Drive Letter Access Component/Sonic Solutions)
Device \FileSystem\Fs_Rec \FileSystem\FatDiskRecognizer tfsnifs.sys (Drive Letter Access Component/Sonic Solutions)
Device \FileSystem\Fs_Rec \FileSystem\UdfsDiskRecognizer tfsnifs.sys (Drive Letter Access Component/Sonic Solutions)
Device \FileSystem\Cdfs \Cdfs tfsnifs.sys (Drive Letter Access Component/Sonic Solutions)
Device -> \Driver\atapi \Device\Harddisk0\DR0 86554618

---- Files - GMER 1.0.15 ----

File C:\WINDOWS\system32\drivers\atapi.sys suspicious modification

---- EOF - GMER 1.0.15 ----

#4 JSntgRvr

JSntgRvr

    Master Surgeon General


  • Malware Response Team
  • 11,635 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto Rico
  • Local time:01:31 AM

Posted 01 December 2009 - 09:06 PM

Please read and follow all these instructions very carefully.

Please download ComboFix from Here or Here to your Desktop.

**Note: In the event you already have Combofix, this is a new version that I need you to download. It is important that it is saved directly to your desktop**
  • Please, never rename Combofix unless instructed.
  • Close any open browsers.
  • Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.

    -----------------------------------------------------------

    • Very Important! Temporarily disable your anti-virus, script blocking and any anti-malware real-time protection before performing a scan. They can interfere with ComboFix or remove some of its embedded files which may cause "unpredictable results".
    • Click on this link to see a list of programs that should be disabled. The list is not all inclusive. If yours is not listed and you don't know how to disable it, please ask.

      -----------------------------------------------------------

    • Close any open browsers.
    • WARNING: Combofix will disconnect your machine from the Internet as soon as it starts
    • Please do not attempt to re-connect your machine back to the Internet until Combofix has completely finished.
    • If there is no internet connection after running Combofix, then restart your computer to restore back your connection.

    -----------------------------------------------------------

  • Double click on combofix.exe & follow the prompts.
  • If you receive a message that Combofix has detected the presence of rootkit activity and needs to reboot, kindly write down on paper the list of files present in the message before continuing, and post it in your next reply.
  • Install the Recovery Console upon request.
  • When finished, it will produce a report for you.
  • Please post the "C:\ComboFix.txt" along with a new DDS log for further review.
**Note: Do not mouseclick combofix's window while it's running. That may cause it to stall**

Note: ComboFix may reset a number of Internet Explorer's settings, including making it the default browser.
Note: Combofix prevents autorun of ALL CDs, floppies and USB devices to assist with malware removal & increase security.

Please download SystemLook from one of the links below and save it to your Desktop.
Download Mirror #1
Download Mirror #2
  • Double-click SystemLook.exe to run it.
  • Copy the content of the following codebox into the main textfield:

    :filefind
    atapi.sys

  • Click the Look button to start the scan.
  • When finished, a notepad window will open with the results of the scan. Please post this log in your next reply.
Note: The log can also be found on your Desktop entitled SystemLook.txt

Please do not install any new programs or update anything unless told to do so while we are fixing your problem.

Edited by JSntgRvr, 01 December 2009 - 09:08 PM.

No request for help throughout private messaging will be attended.

If I have helped you, consider making a donation to help me continue the fight against Malware!
btn_donate_SM.gif


#5 All4's

All4's
  • Topic Starter

  • Members
  • 7 posts
  • OFFLINE
  •  
  • Local time:12:31 AM

Posted 01 December 2009 - 10:31 PM

Here is the Combofix log.

ComboFix 09-12-01.01 - 10032507 12/01/2009 22:00.1.1 - x86
Microsoft Windows XP Professional 5.1.2600.2.1252.1.1033.18.1015.531 [GMT -5:00]
Running from: c:\documents and settings\10032507\Desktop\ComboFix.exe
AV: Symantec AntiVirus Corporate Edition *On-access scanning disabled* (Updated) {FB06448E-52B8-493A-90F3-E43226D3305C}
.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.

c:\documents and settings\All Users\Application Data\Microsoft\Network\Downloader\qmgr0.dat
c:\documents and settings\All Users\Application Data\Microsoft\Network\Downloader\qmgr1.dat

----- BITS: Possible infected sites -----

hxxp://SMS01:80
hxxp://cant-avi-001:8530
Infected copy of c:\windows\system32\DRIVERS\atapi.sys was found and disinfected
Restored copy from - Kitty ate it :(
Infected copy of c:\windows\system32\drivers\iaStor.sys was found and disinfected
Restored copy from - Kitty ate it :(
.
((((((((((((((((((((((((( Files Created from 2009-11-02 to 2009-12-02 )))))))))))))))))))))))))))))))
.

2009-12-02 00:03 . 2009-12-02 00:03 -------- d-----w- c:\program files\Safer Networking
2009-12-01 01:54 . 2009-12-01 01:54 -------- d-----w- c:\program files\Alwil Software
2009-12-01 00:15 . 2009-12-01 01:42 -------- d-----w- c:\program files\Spybot - Search & Destroy
2009-12-01 00:15 . 2009-12-01 01:40 -------- d-----w- c:\documents and settings\All Users\Application Data\Spybot - Search & Destroy
2009-11-29 17:30 . 2009-11-29 17:30 93360 ----a-w- c:\windows\system32\drivers\SBREDrv.sys
2009-11-29 17:25 . 2009-12-01 01:38 -------- d-----w- c:\documents and settings\All Users\Application Data\Lavasoft
2009-11-29 15:14 . 2009-11-29 15:15 -------- d-----w- c:\documents and settings\All Users\Application Data\avg9
2009-11-29 15:06 . 2009-11-29 15:06 -------- d-----w- c:\documents and settings\10032507\Application Data\AVG8
2009-11-29 00:36 . 2009-11-29 17:18 -------- d-----w- c:\program files\Trend Micro
2009-11-29 00:30 . 2009-11-29 00:30 -------- d-----w- c:\documents and settings\10032507\log
2009-11-28 14:37 . 2009-11-28 15:15 -------- d-----w- c:\documents and settings\10032507\Local Settings\Application Data\xxfwkl
2009-11-23 13:27 . 2009-11-22 09:00 259440 ----a-w- c:\documents and settings\All Users\Application Data\Symantec\Symantec AntiVirus Corporate Edition\7.5\I2_LDVP.VDB\vd2eec03.vdb\ECMSVR32.DLL
2009-11-23 13:27 . 2009-11-10 22:48 1647984 ----a-w- c:\documents and settings\All Users\Application Data\Symantec\Symantec AntiVirus Corporate Edition\7.5\I2_LDVP.VDB\vd2eec03.vdb\NAVEX32A.DLL
2009-11-23 13:27 . 2009-11-10 22:48 84912 ----a-w- c:\documents and settings\All Users\Application Data\Symantec\Symantec AntiVirus Corporate Edition\7.5\I2_LDVP.VDB\vd2eec03.vdb\NAVENG.SYS
2009-11-23 13:27 . 2009-11-10 22:48 177520 ----a-w- c:\documents and settings\All Users\Application Data\Symantec\Symantec AntiVirus Corporate Edition\7.5\I2_LDVP.VDB\vd2eec03.vdb\NAVENG32.DLL
2009-11-23 13:27 . 2009-11-10 22:48 1323568 ----a-w- c:\documents and settings\All Users\Application Data\Symantec\Symantec AntiVirus Corporate Edition\7.5\I2_LDVP.VDB\vd2eec03.vdb\NAVEX15.SYS
2009-11-23 13:27 . 2009-09-09 01:24 2747952 ----a-w- c:\documents and settings\All Users\Application Data\Symantec\Symantec AntiVirus Corporate Edition\7.5\I2_LDVP.VDB\vd2eec03.vdb\CCERASER.DLL
2009-11-23 13:27 . 2009-08-18 01:15 102448 ----a-w- c:\documents and settings\All Users\Application Data\Symantec\Symantec AntiVirus Corporate Edition\7.5\I2_LDVP.VDB\vd2eec03.vdb\ERASER.SYS
2009-11-23 13:27 . 2009-08-18 01:15 371248 ----a-w- c:\documents and settings\All Users\Application Data\Symantec\Symantec AntiVirus Corporate Edition\7.5\I2_LDVP.VDB\vd2eec03.vdb\EECTRL.SYS
2009-11-17 03:22 . 2009-11-17 03:22 -------- d-----w- c:\documents and settings\10032507\Application Data\Malwarebytes
2009-11-17 03:22 . 2009-09-10 19:54 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2009-11-17 03:22 . 2009-11-17 03:22 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
2009-11-17 03:22 . 2009-11-17 03:22 -------- d-----w- c:\documents and settings\All Users\Application Data\Malwarebytes
2009-11-17 03:22 . 2009-09-10 19:53 19160 ----a-w- c:\windows\system32\drivers\mbam.sys
2009-11-16 22:52 . 2009-11-16 22:52 -------- d-----w- c:\windows\system32\Adobe
2009-11-04 16:44 . 2009-11-04 16:44 -------- d-----w- c:\documents and settings\NetworkService\Local Settings\Application Data\Apple

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2009-12-02 02:59 . 2009-06-30 19:06 -------- d-----w- c:\program files\Symantec AntiVirus
2009-11-29 17:18 . 2009-06-30 19:30 -------- d--h--w- c:\program files\InstallShield Installation Information
2009-11-28 18:55 . 2004-08-03 22:59 95360 ----a-w- c:\windows\system32\drivers\atapi.sys
2009-11-01 04:42 . 2009-11-01 04:40 -------- d-----w- c:\documents and settings\10032507\Application Data\Apple Computer
2009-11-01 04:39 . 2009-11-01 04:38 -------- d-----w- c:\program files\iTunes
2009-11-01 04:39 . 2009-11-01 04:38 -------- d-----w- c:\documents and settings\All Users\Application Data\{755AC846-7372-4AC8-8550-C52491DAA8BD}
2009-11-01 04:38 . 2009-11-01 04:38 -------- d-----w- c:\program files\iPod
2009-11-01 04:38 . 2009-11-01 04:36 -------- d-----w- c:\program files\Common Files\Apple
2009-11-01 04:38 . 2009-11-01 04:37 -------- d-----w- c:\documents and settings\All Users\Application Data\Apple Computer
2009-11-01 04:38 . 2009-11-01 04:38 -------- d-----w- c:\program files\Bonjour
2009-11-01 04:37 . 2009-11-01 04:37 -------- d-----w- c:\program files\QuickTime
2009-11-01 04:37 . 2009-11-01 04:36 -------- d-----w- c:\program files\Apple Software Update
2009-11-01 04:36 . 2009-11-01 04:36 -------- d-----w- c:\documents and settings\All Users\Application Data\Apple
2009-10-29 00:58 . 2009-10-29 00:58 79144 ----a-w- c:\documents and settings\All Users\Application Data\Apple Computer\Installer Cache\iTunes 9.0.2.25\SetupAdmin.exe
2009-10-27 20:59 . 2009-10-27 20:59 62864 ----a-w- c:\documents and settings\10032507\Local Settings\Application Data\GDIPFONTCACHEV1.DAT
2009-10-26 04:07 . 2009-10-26 04:07 262144 ----a-w- c:\windows\system32\default_user_class.dat
2009-10-23 13:06 . 2009-10-23 13:06 932373 ----a-w- c:\windows\java\Packages\LNXVDNXR.ZIP
2009-10-23 13:06 . 2009-10-23 13:06 2724 ----a-w- c:\windows\java\Packages\Data\DBPN17TR.DAT
2009-10-22 21:06 . 2009-10-22 21:05 -------- d-----w- c:\documents and settings\10032507\Application Data\PDF reDirect
2009-10-22 21:06 . 2009-06-30 19:32 -------- d-----w- c:\program files\WINSPL32
2009-10-22 16:01 . 2009-10-22 16:01 -------- d-----w- c:\program files\Tools4ever
2009-10-22 16:00 . 2009-10-22 16:00 25214 ----a-r- c:\windows\system32\config\systemprofile\Application Data\Microsoft\Installer\{FF77941A-2BFA-4A18-BE2E-69B9498E4D55}\_294823.exe
2009-10-22 16:00 . 2009-10-22 16:00 -------- d-----w- c:\program files\UPHClean
2009-10-22 16:00 . 2009-10-22 15:59 -------- d-----w- c:\program files\Scripts
2009-10-22 15:50 . 2009-10-22 15:50 -------- d-----w- c:\documents and settings\10032507\Application Data\Sonic
2009-10-20 16:01 . 2009-06-30 18:39 86327 ----a-w- c:\windows\pchealth\helpctr\OfflineCache\index.dat
2009-10-20 15:18 . 2009-10-20 15:18 -------- d-----w- c:\program files\Enterprise Vault
2009-10-20 15:06 . 2009-10-20 15:06 -------- d-----w- c:\documents and settings\10031444\Application Data\Sonic
2009-10-20 15:04 . 2009-10-20 15:04 -------- d-----w- c:\documents and settings\NetworkService\Application Data\Intel
2009-10-20 15:00 . 2009-10-22 15:48 -------- d-----w- c:\documents and settings\10032507\Application Data\Intel
2009-10-20 15:00 . 2009-10-20 15:04 -------- d-----w- c:\documents and settings\10031444\Application Data\Intel
2009-10-20 15:00 . 2009-10-20 15:00 -------- d-----w- c:\documents and settings\Default User\Application Data\Intel
2009-10-20 15:00 . 2009-10-20 15:00 -------- d-----w- c:\windows\system32\config\systemprofile\Application Data\Intel
2009-10-20 15:00 . 2009-10-20 15:00 -------- d-----w- c:\documents and settings\installer\Application Data\Intel
2009-10-20 15:00 . 2009-10-20 15:00 21275 ----a-w- c:\windows\system32\drivers\AegisP.sys
2009-10-20 15:00 . 2009-10-20 15:00 -------- d-----w- c:\documents and settings\All Users\Application Data\Intel
2009-09-25 05:56 . 2009-06-30 21:10 662016 ----a-w- c:\windows\system32\wininet.dll
2009-09-25 05:56 . 2009-06-30 21:07 81920 ----a-w- c:\windows\system32\ieencode.dll
2009-09-11 14:33 . 2009-06-30 21:08 133632 ----a-w- c:\windows\system32\msv1_0.dll
2009-09-04 20:45 . 2009-06-30 21:08 58880 ----a-w- c:\windows\system32\msasn1.dll
2008-06-12 11:53 . 2009-06-30 19:42 3125248 ----a-w- c:\program files\Common Files\sapxlhelper.dll
2008-06-12 11:53 . 2009-06-30 19:42 192512 ----a-w- c:\program files\Common Files\sapconsr3.dll
2008-06-12 11:53 . 2009-06-30 19:42 949760 ----a-w- c:\program files\Common Files\SAPActiveXL_nosig.xlt
2008-06-12 11:53 . 2009-06-30 19:42 626688 ----a-w- c:\program files\Common Files\sapconsaccess.dll
2008-06-12 11:53 . 2009-06-30 19:42 955904 ----a-w- c:\program files\Common Files\SAPActiveXL.xlt
2008-06-12 11:53 . 2009-06-30 19:42 40960 ----a-w- c:\program files\Common Files\DigitalSignature.ocx
.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"IMJPMIG8.1"="c:\windows\IME\imjp8_1\IMJPMIG.EXE" [2004-08-04 208952]
"PHIME2002ASync"="c:\windows\system32\IME\TINTLGNT\TINTSETP.EXE" [2004-08-04 455168]
"PHIME2002A"="c:\windows\system32\IME\TINTLGNT\TINTSETP.EXE" [2004-08-04 455168]
"igfxtray"="c:\windows\system32\igfxtray.exe" [2005-09-20 94208]
"igfxhkcmd"="c:\windows\system32\hkcmd.exe" [2005-09-20 77824]
"igfxpers"="c:\windows\system32\igfxpers.exe" [2005-09-20 114688]
"Apoint"="c:\program files\Apoint\Apoint.exe" [2004-09-13 155648]
"dla"="c:\windows\system32\dla\tfswctrl.exe" [2004-08-13 122939]
"UpdateManager"="c:\program files\Common Files\Sonic\Update Manager\sgtray.exe" [2004-01-07 110592]
"ccApp"="c:\program files\Common Files\Symantec Shared\ccApp.exe" [2006-07-19 52896]
"vptray"="c:\progra~1\SYMANT~1\VPTray.exe" [2006-09-28 125168]
"DVDLauncher"="c:\program files\CyberLink\PowerDVD\DVDLauncher.exe" [2004-04-26 53248]
"SAP_WUS_UNT"="c:\program files\SAP\SAPsetup\setup\Updater\NwSapSetupUserNotificationTool.exe" [2009-01-20 218480]
"MSPY2002"="c:\windows\system32\IME\PINTLGNT\ImScInst.exe" [2004-08-04 59392]
"IntelZeroConfig"="c:\program files\Intel\Wireless\bin\ZCfgSvc.exe" [2005-12-28 667718]
"IntelWireless"="c:\program files\Intel\Wireless\Bin\ifrmewrk.exe" [2005-12-28 602182]
"SSRPM Enrollment Wizard"="c:\program files\Tools4ever\SSRPM\Enrollment Wizard\SSRPMEnroll.exe" [2009-04-15 603648]
"Synchronization Manager"="c:\windows\system32\mobsync.exe" [2004-08-04 143360]
"QuickTime Task"="c:\program files\QuickTime\qttask.exe" [2009-09-05 417792]
"iTunesHelper"="c:\program files\iTunes\iTunesHelper.exe" [2009-10-29 141600]
"Malwarebytes Anti-Malware (reboot)"="c:\program files\Malwarebytes' Anti-Malware\mbam.exe" [2009-09-10 1312080]

[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run]
"CTFMON.EXE"="c:\windows\system32\CTFMON.EXE" [2004-08-04 15360]

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\explorer]
"NoWelcomeScreen"= 1 (0x1)

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\group policy\state\S-1-5-21-2269756940-1620682258-3082775950-3960\Scripts\Logon\0\0]
"Script"=\\na.yazaki.local\netlogon\ADScripts\Unauthorized Login.vbs

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\group policy\state\S-1-5-21-2269756940-1620682258-3082775950-3960\Scripts\Logon\1\0]
"Script"=\\na.yazaki.local\netlogon\AppSettings\Outlook\OutlookSettings.cmd

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\group policy\state\S-1-5-21-2269756940-1620682258-3082775950-3960\Scripts\Logon\2\0]
"Script"=\\yazaki.local\na\install\clients\scripts\SapLogonVariable_MakeLocalCopy.cmd

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\group policy\state\S-1-5-21-2269756940-1620682258-3082775950-3960\Scripts\Logon\3\0]
"Script"=\\na.yazaki.local\NETLOGON\AppSettings\Outlook\OutlookSettings.cmd

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\group policy\state\S-1-5-21-2269756940-1620682258-3082775950-3975\Scripts\Logon\0\0]
"Script"=\\na.yazaki.local\netlogon\ADScripts\Unauthorized Login.vbs

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\group policy\state\S-1-5-21-2269756940-1620682258-3082775950-8425\Scripts\Logoff\0\0]
"Script"=\\yazaki.local\netlogon\LimitLogon\llogoff.vbs

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\group policy\state\S-1-5-21-2269756940-1620682258-3082775950-8425\Scripts\Logon\0\0]
"Script"=\\na.yazaki.local\netlogon\ADScripts\Unauthorized Login.vbs

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\group policy\state\S-1-5-21-2269756940-1620682258-3082775950-8425\Scripts\Logon\1\0]
"Script"=\\yazaki.local\netlogon\LimitLogon\llogin.vbs

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\group policy\state\S-1-5-21-2269756940-1620682258-3082775950-8425\Scripts\Logon\2\0]
"Script"=\\yazaki.local\NETLOGON\LocalAdmin.vbs

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\group policy\state\S-1-5-21-2269756940-1620682258-3082775950-8425\Scripts\Logon\3\0]
"Script"=\\yazaki.local\na\install\clients\scripts\SapLogonVariable_MakeLocalCopy.cmd

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\group policy\state\S-1-5-21-2269756940-1620682258-3082775950-8425\Scripts\Logon\4\0]
"Script"=\\na.yazaki.local\NETLOGON\AppSettings\Outlook\OutlookSettings.cmd

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecAntiVirus]
"DisableMonitoring"=dword:00000001

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]
"EnableFirewall"= 0 (0x0)

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=
"c:\\Program Files\\Bonjour\\mDNSResponder.exe"=
"c:\\Program Files\\iTunes\\iTunes.exe"=

R0 aaatimeo;aaatimeo;c:\windows\system32\drivers\aaatimeo.sys [6/30/2009 4:21 PM 4928]
R2 NWSAPAutoWorkstationUpdateSvc;SAPSetup Automatic Workstation Update Service;c:\program files\SAP\SapSetup\setup\Updater\NwSapAutoWorkstationUpdateService.exe [6/30/2009 2:41 PM 259440]
R2 SavRoam;SAVRoam;c:\program files\Symantec AntiVirus\SavRoam.exe [9/27/2006 7:33 PM 116464]
R3 EraserUtilRebootDrv;EraserUtilRebootDrv;c:\program files\Common Files\Symantec Shared\EENGINE\EraserUtilRebootDrv.sys [10/30/2009 9:51 AM 102448]
R3 GTIPCI21;GTIPCI21;c:\windows\system32\drivers\gtipci21.sys [6/30/2009 4:15 PM 80384]
S3 TMPassthruMP;TMPassthruMP;c:\windows\system32\DRIVERS\TMPassthru.sys --> c:\windows\system32\DRIVERS\TMPassthru.sys [?]
S4 aarich;aarich;c:\windows\system32\drivers\aarich.sys [6/30/2009 4:21 PM 241815]
S4 cda1000;cda1000;c:\windows\system32\drivers\cda1000.sys [6/30/2009 4:21 PM 280608]

--- Other Services/Drivers In Memory ---

*Deregistered* - uphcleanhlp
.
Contents of the 'Scheduled Tasks' folder

2009-11-25 c:\windows\Tasks\AppleSoftwareUpdate.job
- c:\program files\Apple Software Update\SoftwareUpdate.exe [2008-07-30 16:34]
.
.
------- Supplementary Scan -------
.
uStart Page = https://www.ynaconnection.com/
uInternet Settings,ProxyServer = proxy-2.yazaki.local:8080
IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~2\OFFICE11\EXCEL.EXE/3000
Trusted Zone: chrysler.com
Trusted Zone: chrysler.com\aqip02.extra
Trusted Zone: dhs.gov
Trusted Zone: intersourcing.com
Trusted Zone: intersourcing.com\www52
Trusted Zone: intuit.com
Trusted Zone: paychex.com\previewhostingservice
Trusted Zone: projsvr01
Trusted Zone: toyota-edc.com\mailbox.us
Trusted Zone: ufjbank.co.jp\uwb
Trusted Zone: ufjbank.co.jp\uwbw
Trusted Zone: ultiprotime.com
Trusted Zone: wolfgangsvault.com
Trusted Zone: yazaki-europe.com\gpdb
Trusted Zone: yazaki.com\apps.us
Trusted Zone: yazaki.com\local.us
Trusted Zone: yazaki.local\projsvr01
Trusted Zone: yazaki.net\xpedio
Trusted Zone: chrysler.com
Trusted Zone: chrysler.com\aqip02.extra
Trusted Zone: dhs.gov
Trusted Zone: intersourcing.com
Trusted Zone: intuit.com
Trusted Zone: paychex.com\previewhostingservice
Trusted Zone: projsvr01
Trusted Zone: toyota-edc.com\mailbox.us
Trusted Zone: ufjbank.co.jp\uwb
Trusted Zone: ufjbank.co.jp\uwbw
Trusted Zone: ultiprotime.com
Trusted Zone: wolfgangsvault.com
Trusted Zone: yazaki-europe.com\gpdb
Trusted Zone: yazaki.com\apps.us
Trusted Zone: yazaki.com\local.us
Trusted Zone: yazaki.local\projsvr01
Trusted Zone: yazaki.net\xpedio
DPF: SEAGULL J Walk Java Client 3_1C7 - hxxp://ayccantn.yna.yazaki.net/jwalk/jwalk_ie.cab
.
- - - - ORPHANS REMOVED - - - -

AddRemove-{9F72EF8B-AEC9-4CA5-B483-143980AFD6FD} - c:\program files\Apoint\Uninstap.exe ADDREMOVE



**************************************************************************

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2009-12-01 22:11
Windows 5.1.2600 Service Pack 2 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully
hidden files: 0

**************************************************************************
.
--------------------- DLLs Loaded Under Running Processes ---------------------

- - - - - - - > 'winlogon.exe'(856)
c:\windows\system32\SSRPMGINA.dll
.
Completion time: 2009-12-01 22:14
ComboFix-quarantined-files.txt 2009-12-02 03:14

Pre-Run: 53,519,458,304 bytes free
Post-Run: 53,931,118,592 bytes free

WindowsXP-KB310994-SP2-Pro-BootDisk-ENU.exe
[boot loader]
timeout=2
default=multi(0)disk(0)rdisk(0)partition(1)\WINDOWS
[operating systems]
c:\cmdcons\BOOTSECT.DAT="Microsoft Windows Recovery Console" /cmdcons
multi(0)disk(0)rdisk(0)partition(1)\WINDOWS="Microsoft Windows XP Professional" /noexecute=optin /fastdetect
[spybotsd]
timeout.old=30

- - End Of File - - 38E3343BDB46CFD5EC2E5812C01BA417


Now the DDS log.


DDS (Ver_09-12-01.01) - NTFSx86
Run by 10032507 at 22:17:12.43 on Tue 12/01/2009
Internet Explorer: 6.0.2900.2180
Microsoft Windows XP Professional 5.1.2600.2.1252.1.1033.18.1015.454 [GMT -5:00]

AV: Symantec AntiVirus Corporate Edition *On-access scanning enabled* (Updated) {FB06448E-52B8-493A-90F3-E43226D3305C}

============== Running Processes ===============

C:\WINDOWS\system32\svchost -k DcomLaunch
svchost.exe
C:\WINDOWS\System32\svchost.exe -k netsvcs
C:\Program Files\Intel\Wireless\Bin\EvtEng.exe
C:\Program Files\Intel\Wireless\Bin\S24EvMon.exe
C:\Program Files\Intel\Wireless\Bin\WLKeeper.exe
svchost.exe
svchost.exe
C:\Program Files\Common Files\Symantec Shared\ccSetMgr.exe
C:\Program Files\Common Files\Symantec Shared\ccEvtMgr.exe
C:\WINDOWS\system32\spoolsv.exe
svchost.exe
C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
C:\Program Files\Bonjour\mDNSResponder.exe
C:\Program Files\Symantec AntiVirus\DefWatch.exe
C:\Program Files\Dell\OpenManage\Client\Iap.exe
C:\Program Files\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE
C:\Program Files\SAP\SAPsetup\setup\Updater\NwSapAutoWorkstationUpdateService.exe
C:\Program Files\Intel\Wireless\Bin\RegSrvc.exe
C:\Program Files\Symantec AntiVirus\SavRoam.exe
C:\Program Files\Symantec AntiVirus\Rtvscan.exe
C:\Program Files\UPHClean\uphclean.exe
C:\WINDOWS\system32\CCM\CLICOMP\RemCtrl\Wuser32.exe
C:\WINDOWS\system32\CCM\CcmExec.exe
C:\WINDOWS\system32\wuauclt.exe
C:\WINDOWS\explorer.exe
C:\Program Files\Internet Explorer\IEXPLORE.EXE
C:\WINDOWS\system32\ctfmon.exe
C:\Documents and Settings\10032507\Desktop\dds.scr

============== Pseudo HJT Report ===============

uStart Page = https://www.ynaconnection.com/
uInternet Settings,ProxyServer = proxy-2.yazaki.local:8080
BHO: Adobe PDF Reader Link Helper: {06849e9f-c8d7-4d59-b87d-784b7d6be0b3} - c:\program files\common files\adobe\acrobat\activex\AcroIEHelper.dll
BHO: SSVHelper Class: {761497bb-d6f0-462c-b6eb-d4daf1d92d43} - c:\program files\java\jre1.6.0_05\bin\ssv.dll
uRun: [ctfmon.exe] c:\windows\system32\ctfmon.exe
mRun: [IMJPMIG8.1] "c:\windows\ime\imjp8_1\IMJPMIG.EXE" /Spoil /RemAdvDef /Migration32
mRun: [PHIME2002ASync] c:\windows\system32\ime\tintlgnt\TINTSETP.EXE /SYNC
mRun: [PHIME2002A] c:\windows\system32\ime\tintlgnt\TINTSETP.EXE /IMEName
mRun: [igfxtray] c:\windows\system32\igfxtray.exe
mRun: [igfxhkcmd] c:\windows\system32\hkcmd.exe
mRun: [igfxpers] c:\windows\system32\igfxpers.exe
mRun: [Apoint] c:\program files\apoint\Apoint.exe
mRun: [dla] c:\windows\system32\dla\tfswctrl.exe
mRun: [UpdateManager] "c:\program files\common files\sonic\update manager\sgtray.exe" /r
mRun: [ccApp] "c:\program files\common files\symantec shared\ccApp.exe"
mRun: [vptray] c:\progra~1\symant~1\VPTray.exe
mRun: [DVDLauncher] "c:\program files\cyberlink\powerdvd\DVDLauncher.exe"
mRun: [SAP_WUS_UNT] "c:\program files\sap\sapsetup\setup\updater\NwSapSetupUserNotificationTool.exe"
mRun: [MSPY2002] c:\windows\system32\ime\pintlgnt\ImScInst.exe /SYNC
mRun: [IntelZeroConfig] "c:\program files\intel\wireless\bin\ZCfgSvc.exe"
mRun: [IntelWireless] "c:\program files\intel\wireless\bin\ifrmewrk.exe" /tf Intel PROSet/Wireless
mRun: [SSRPM Enrollment Wizard] "c:\program files\tools4ever\ssrpm\enrollment wizard\SSRPMEnroll.exe" /Autostart
mRun: [Synchronization Manager] %SystemRoot%\system32\mobsync.exe /logon
mRun: [QuickTime Task] "c:\program files\quicktime\qttask.exe" -atboottime
mRun: [iTunesHelper] "c:\program files\itunes\iTunesHelper.exe"
mRun: [Malwarebytes Anti-Malware (reboot)] "c:\program files\malwarebytes' anti-malware\mbam.exe" /runcleanupscript
dRun: [CTFMON.EXE] c:\windows\system32\CTFMON.EXE
uPolicies-explorer: NoDesktopCleanupWizard = 1 (0x1)
mPolicies-explorer: NoWelcomeScreen = 1 (0x1)
IE: E&xport to Microsoft Excel - c:\progra~1\micros~2\office11\EXCEL.EXE/3000
IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe
IE: {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - {CAFEEFAC-0016-0000-0005-ABCDEFFEDCBC} - c:\program files\java\jre1.6.0_05\bin\ssv.dll
IE: {92780B25-18CC-41C8-B9BE-3C9C571A8263} - {FF059E31-CC5A-4E2E-BF3B-96E929D65503} - c:\progra~1\micros~2\office11\REFIEBAR.DLL
Trusted Zone: chrysler.com
Trusted Zone: chrysler.com\aqip02.extra
Trusted Zone: dhs.gov
Trusted Zone: intersourcing.com
Trusted Zone: intersourcing.com\www52
Trusted Zone: intuit.com
Trusted Zone: paychex.com\previewhostingservice
Trusted Zone: projsvr01
Trusted Zone: toyota-edc.com\mailbox.us
Trusted Zone: ufjbank.co.jp\uwb
Trusted Zone: ufjbank.co.jp\uwbw
Trusted Zone: ultiprotime.com
Trusted Zone: wolfgangsvault.com
Trusted Zone: yazaki-europe.com\gpdb
Trusted Zone: yazaki.com\apps.us
Trusted Zone: yazaki.com\local.us
Trusted Zone: yazaki.local\projsvr01
Trusted Zone: yazaki.net\xpedio
Trusted Zone: chrysler.com
Trusted Zone: chrysler.com\aqip02.extra
Trusted Zone: dhs.gov
Trusted Zone: intersourcing.com
Trusted Zone: intuit.com
Trusted Zone: paychex.com\previewhostingservice
Trusted Zone: projsvr01
Trusted Zone: toyota-edc.com\mailbox.us
Trusted Zone: ufjbank.co.jp\uwb
Trusted Zone: ufjbank.co.jp\uwbw
Trusted Zone: ultiprotime.com
Trusted Zone: wolfgangsvault.com
Trusted Zone: yazaki-europe.com\gpdb
Trusted Zone: yazaki.com\apps.us
Trusted Zone: yazaki.com\local.us
Trusted Zone: yazaki.local\projsvr01
Trusted Zone: yazaki.net\xpedio
DPF: SEAGULL J Walk Java Client 3_1C7 - hxxp://ayccantn.yna.yazaki.net/jwalk/jwalk_ie.cab
DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_05-windows-i586.cab
DPF: {CAFEEFAC-0014-0002-0008-ABCDEFFEDCBA} - hxxp://java.sun.com/products/plugin/autodl/jinstall-142-windows-i586.cab
DPF: {CAFEEFAC-0016-0000-0005-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_05-windows-i586.cab
Handler: linkscanner - {F274614C-63F8-47D5-A4D1-FBDDE494F8D1} -
Handler: saphtmlp - {D1F8BD1E-7967-11D2-B43A-006094B9EADB} - c:\program files\sap\frontend\sapgui\SAPHTMLP.DLL
Handler: sapr3 - {D1F8BD1E-7967-11D2-B43A-006094B9EADB} - c:\program files\sap\frontend\sapgui\SAPHTMLP.DLL
Notify: igfxcui - igfxdev.dll
Notify: NavLogon - c:\windows\system32\NavLogon.dll
Hosts: 127.0.0.1 www.spywareinfo.com

============= SERVICES / DRIVERS ===============

R0 aaatimeo;aaatimeo;c:\windows\system32\drivers\aaatimeo.sys [2009-6-30 4928]
R1 SAVRT;SAVRT;c:\program files\symantec antivirus\savrt.sys [2006-9-6 337592]
R1 SAVRTPEL;SAVRTPEL;c:\program files\symantec antivirus\Savrtpel.sys [2006-9-6 54968]
R2 ccEvtMgr;Symantec Event Manager;c:\program files\common files\symantec shared\ccEvtMgr.exe [2006-7-19 192160]
R2 ccSetMgr;Symantec Settings Manager;c:\program files\common files\symantec shared\ccSetMgr.exe [2006-7-19 169632]
R2 NWSAPAutoWorkstationUpdateSvc;SAPSetup Automatic Workstation Update Service;c:\program files\sap\sapsetup\setup\updater\NwSapAutoWorkstationUpdateService.exe [2009-6-30 259440]
R2 SavRoam;SAVRoam;c:\program files\symantec antivirus\SavRoam.exe [2006-9-27 116464]
R2 Symantec AntiVirus;Symantec AntiVirus;c:\program files\symantec antivirus\Rtvscan.exe [2006-9-27 1813232]
R3 EraserUtilRebootDrv;EraserUtilRebootDrv;c:\program files\common files\symantec shared\eengine\EraserUtilRebootDrv.sys [2009-10-30 102448]
R3 GTIPCI21;GTIPCI21;c:\windows\system32\drivers\gtipci21.sys [2009-6-30 80384]
R3 NAVENG;NAVENG;c:\progra~1\common~1\symant~1\virusd~1\20091130.004\naveng.sys [2009-11-30 84912]
R3 NAVEX15;NAVEX15;c:\progra~1\common~1\symant~1\virusd~1\20091130.004\navex15.sys [2009-11-30 1323568]
S3 TMPassthruMP;TMPassthruMP;c:\windows\system32\drivers\tmpassthru.sys --> c:\windows\system32\drivers\TMPassthru.sys [?]
S4 aarich;aarich;c:\windows\system32\drivers\aarich.sys [2009-6-30 241815]
S4 cda1000;cda1000;c:\windows\system32\drivers\cda1000.sys [2009-6-30 280608]

=============== Created Last 30 ================

2009-12-02 02:44:45 0 d-sha-r- C:\cmdcons
2009-12-02 02:42:57 77312 ----a-w- c:\windows\MBR.exe
2009-12-02 02:42:57 260608 ----a-w- c:\windows\PEV.exe
2009-12-02 02:42:57 161792 ----a-w- c:\windows\SWREG.exe
2009-12-02 00:03:26 0 d-----w- c:\program files\Safer Networking
2009-12-01 00:15:19 0 d-----w- c:\program files\Spybot - Search & Destroy
2009-12-01 00:15:19 0 d-----w- c:\docume~1\alluse~1\applic~1\Spybot - Search & Destroy
2009-11-30 19:47:02 0 ----a-w- c:\windows\VPC32.INI
2009-11-29 17:30:27 93360 ----a-w- c:\windows\system32\drivers\SBREDrv.sys
2009-11-29 15:14:26 0 d-----w- c:\docume~1\alluse~1\applic~1\avg9
2009-11-29 15:06:56 0 d-----w- c:\docume~1\10032507\applic~1\AVG8
2009-11-29 00:36:40 0 d-----w- c:\program files\Trend Micro
2009-11-29 00:30:07 0 d-----w- c:\documents and settings\10032507\log
2009-11-17 03:22:59 0 d-----w- c:\docume~1\10032507\applic~1\Malwarebytes
2009-11-17 03:22:53 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2009-11-17 03:22:52 19160 ----a-w- c:\windows\system32\drivers\mbam.sys
2009-11-17 03:22:52 0 d-----w- c:\program files\Malwarebytes' Anti-Malware
2009-11-17 03:22:52 0 d-----w- c:\docume~1\alluse~1\applic~1\Malwarebytes
2009-11-16 22:52:50 0 d-----w- c:\windows\system32\Adobe
2009-11-11 15:18:57 3253 ----a-w- c:\windows\system32\wbem\Outlook_01ca62e249c424c8.mof

==================== Find3M ====================

2009-11-28 18:55:59 95360 ------w- c:\windows\system32\drivers\atapi.sys
2009-10-26 04:07:03 262144 ----a-w- c:\windows\system32\default_user_class.dat
2009-10-20 15:00:17 21275 ----a-w- c:\windows\system32\drivers\AegisP.sys
2009-09-25 05:56:36 662016 ------w- c:\windows\system32\wininet.dll
2009-09-25 05:56:32 81920 ----a-w- c:\windows\system32\ieencode.dll
2009-09-11 14:33:52 133632 ----a-w- c:\windows\system32\msv1_0.dll
2009-09-04 20:45:26 58880 ----a-w- c:\windows\system32\msasn1.dll
2008-06-12 11:53:04 955904 ----a-w- c:\program files\common files\SAPActiveXL.xlt
2008-06-12 11:53:04 949760 ----a-w- c:\program files\common files\SAPActiveXL_nosig.xlt
2008-06-12 11:53:04 626688 ----a-w- c:\program files\common files\sapconsaccess.dll
2008-06-12 11:53:04 40960 ----a-w- c:\program files\common files\DigitalSignature.ocx
2008-06-12 11:53:04 3125248 ----a-w- c:\program files\common files\sapxlhelper.dll
2008-06-12 11:53:04 192512 ----a-w- c:\program files\common files\sapconsr3.dll

============= FINISH: 22:17:53.56 ===============


Finally the Systemlook file.

SystemLook v1.0 by jpshortstuff (29.08.09)
Log created at 22:22 on 01/12/2009 by 10032507 (Limited User)

========== filefind ==========

Searching for "atapi.sys"
C:\WINDOWS\ERDNT\cache\atapi.sys --a--- 95360 bytes [03:12 02/12/2009] [18:55 28/11/2009] CDFE4411A69C224BD1D11B2DA92DAC51
C:\WINDOWS\system32\dllcache\atapi.sys --a--c 95360 bytes [22:59 03/08/2004] [18:55 28/11/2009] CDFE4411A69C224BD1D11B2DA92DAC51
C:\WINDOWS\system32\drivers\atapi.sys ------ 95360 bytes [22:59 03/08/2004] [18:55 28/11/2009] CDFE4411A69C224BD1D11B2DA92DAC51

-=End Of File=-

I believe that is everything you asked for. If not let me know and I will get you what you need ASAP. I can't say enough how much I appreciate your help!

#6 JSntgRvr

JSntgRvr

    Master Surgeon General


  • Malware Response Team
  • 11,635 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto Rico
  • Local time:01:31 AM

Posted 01 December 2009 - 10:50 PM

  • Double-click SystemLook.exe to run it.
  • Copy the content of the following codebox into the main textfield:

    :filefind
    iaStor.sys

  • Click the Look button to start the scan.
  • When finished, a notepad window will open with the results of the scan. Please post this log in your next reply.
Note: The log can also be found on your Desktop entitled SystemLook.txt

No request for help throughout private messaging will be attended.

If I have helped you, consider making a donation to help me continue the fight against Malware!
btn_donate_SM.gif


#7 All4's

All4's
  • Topic Starter

  • Members
  • 7 posts
  • OFFLINE
  •  
  • Local time:12:31 AM

Posted 01 December 2009 - 10:54 PM

SystemLook v1.0 by jpshortstuff (29.08.09)
Log created at 22:53 on 01/12/2009 by 10032507 (Limited User)

========== filefind ==========

Searching for "iaStor.sys"
C:\WINDOWS\OemDir\iaStor.sys --a--- 319000 bytes [21:21 30/06/2009] [19:33 22/07/2008] ABFEBC5F846C71AFEBD7F8F6BA740C03
C:\WINDOWS\system32\drivers\iaStor.sys --a--- 319000 bytes [21:21 30/06/2009] [19:33 22/07/2008] ABFEBC5F846C71AFEBD7F8F6BA740C03

-=End Of File=-

#8 JSntgRvr

JSntgRvr

    Master Surgeon General


  • Malware Response Team
  • 11,635 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto Rico
  • Local time:01:31 AM

Posted 01 December 2009 - 11:05 PM

Open a command prompt (Start -> Run, type CMD and click Ok). At the prompt copy and paste the following lines, one by one and press Enter after each line:

Copy /y C:\WINDOWS\OemDir\iaStor.sys C:\
Copy /y C:\WINDOWS\system32\dllcache\atapi.sys C:\


On each command you should receive a message, 1 file copied. This important as the next set of instructions wont work if these messages are not received.

1. Please download The Avenger by Swandog46 to your Desktop.
  • Right click on the Avenger.zip folder and select "Extract All..."
  • Follow the prompts and extract the avenger folder to your desktop
2. Copy all the text contained in the code box below to your Clipboard by highlighting it and pressing (Ctrl+C):

Begin copying here:
Files to move:
C:\iaStor.sys | C:\WINDOWS\system32\drivers\iaStor.sys
C:\atapi.sys | C:\WINDOWS\system32\drivers\atapi.sys

Note: the above code was created specifically for this user. If you are not this user, do NOT follow these directions as they could damage the workings of your system.


3. Now, open the avenger folder and start The Avenger program by clicking on its icon.
  • Right click on the window under Input script here:, and select Paste.
  • You can also click on this window and press (Ctrl+V) to paste the contents of the clipboard.
  • Click on Execute
  • Answer "Yes" twice when prompted.
4. The Avenger will automatically do the following:
  • It will Restart your computer. ( In cases where the code to execute contains "Drivers to Delete", The Avenger will actually restart your system twice.)
  • On reboot, it will briefly open a black command window on your desktop, this is normal.
  • After the restart, it creates a log file that should open with the results of Avengerís actions. This log file will be located at C:\avenger.txt
  • The Avenger will also have backed up all the files, etc., that you asked it to delete, and will have zipped them and moved the zip archives to C:\avenger\backup.zip.
5. Please copy/paste the content of c:\avenger.txt into your reply along with a fresh DDS log .

No request for help throughout private messaging will be attended.

If I have helped you, consider making a donation to help me continue the fight against Malware!
btn_donate_SM.gif


#9 All4's

All4's
  • Topic Starter

  • Members
  • 7 posts
  • OFFLINE
  •  
  • Local time:12:31 AM

Posted 01 December 2009 - 11:19 PM

Logfile of The Avenger Version 2.0, © by Swandog46
http://swandog46.geekstogo.com

Platform: Windows XP

*******************

Script file opened successfully.
Script file read successfully.

Backups directory opened successfully at C:\Avenger

*******************

Beginning to process script file:

Rootkit scan active.
No rootkits found!

File move operation "C:\iaStor.sys|C:\WINDOWS\system32\drivers\iaStor.sys" completed successfully.
File move operation "C:\atapi.sys|C:\WINDOWS\system32\drivers\atapi.sys" completed successfully.

Completed script processing.

*******************

Finished! Terminate.



DDS (Ver_09-12-01.01) - NTFSx86
Run by 10032507 at 23:15:46.34 on Tue 12/01/2009
Internet Explorer: 6.0.2900.2180
Microsoft Windows XP Professional 5.1.2600.2.1252.1.1033.18.1015.489 [GMT -5:00]

AV: Symantec AntiVirus Corporate Edition *On-access scanning enabled* (Updated) {FB06448E-52B8-493A-90F3-E43226D3305C}

============== Running Processes ===============

C:\WINDOWS\system32\svchost -k DcomLaunch
svchost.exe
C:\WINDOWS\System32\svchost.exe -k netsvcs
C:\Program Files\Intel\Wireless\Bin\EvtEng.exe
C:\Program Files\Intel\Wireless\Bin\S24EvMon.exe
C:\Program Files\Intel\Wireless\Bin\WLKeeper.exe
svchost.exe
svchost.exe
C:\Program Files\Common Files\Symantec Shared\ccSetMgr.exe
C:\Program Files\Common Files\Symantec Shared\ccEvtMgr.exe
C:\WINDOWS\system32\spoolsv.exe
svchost.exe
C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
C:\Program Files\Bonjour\mDNSResponder.exe
C:\Program Files\Symantec AntiVirus\DefWatch.exe
C:\Program Files\Dell\OpenManage\Client\Iap.exe
C:\Program Files\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE
C:\Program Files\SAP\SAPsetup\setup\Updater\NwSapAutoWorkstationUpdateService.exe
C:\Program Files\Intel\Wireless\Bin\RegSrvc.exe
C:\Program Files\Symantec AntiVirus\SavRoam.exe
C:\Program Files\Symantec AntiVirus\Rtvscan.exe
C:\Program Files\UPHClean\uphclean.exe
C:\WINDOWS\system32\CCM\CLICOMP\RemCtrl\Wuser32.exe
C:\WINDOWS\system32\CCM\CcmExec.exe
C:\WINDOWS\system32\msiexec.exe
C:\WINDOWS\system32\userinit.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\NOTEPAD.EXE
C:\WINDOWS\system32\igfxpers.exe
C:\WINDOWS\system32\wuauclt.exe
C:\WINDOWS\system32\igfxsrvc.exe
C:\Program Files\Apoint\Apoint.exe
C:\WINDOWS\system32\dla\tfswctrl.exe
C:\Program Files\Common Files\Sonic\Update Manager\sgtray.exe
C:\WINDOWS\system32\userinit.exe
C:\Program Files\Common Files\Symantec Shared\ccApp.exe
C:\PROGRA~1\SYMANT~1\VPTray.exe
C:\Program Files\CyberLink\PowerDVD\DVDLauncher.exe
C:\Program Files\Apoint\Apntex.exe
C:\Program Files\SAP\SAPsetup\setup\Updater\NwSapSetupUserNotificationTool.exe
C:\Program Files\Intel\Wireless\bin\ZCfgSvc.exe
C:\Program Files\Intel\Wireless\Bin\ifrmewrk.exe
C:\Program Files\iTunes\iTunesHelper.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Documents and Settings\10032507\Desktop\dds.scr

============== Pseudo HJT Report ===============

uStart Page = https://www.ynaconnection.com/
uInternet Settings,ProxyServer = proxy-2.yazaki.local:8080
BHO: Adobe PDF Reader Link Helper: {06849e9f-c8d7-4d59-b87d-784b7d6be0b3} - c:\program files\common files\adobe\acrobat\activex\AcroIEHelper.dll
BHO: SSVHelper Class: {761497bb-d6f0-462c-b6eb-d4daf1d92d43} - c:\program files\java\jre1.6.0_05\bin\ssv.dll
uRun: [ctfmon.exe] c:\windows\system32\ctfmon.exe
mRun: [IMJPMIG8.1] "c:\windows\ime\imjp8_1\IMJPMIG.EXE" /Spoil /RemAdvDef /Migration32
mRun: [PHIME2002ASync] c:\windows\system32\ime\tintlgnt\TINTSETP.EXE /SYNC
mRun: [PHIME2002A] c:\windows\system32\ime\tintlgnt\TINTSETP.EXE /IMEName
mRun: [igfxtray] c:\windows\system32\igfxtray.exe
mRun: [igfxhkcmd] c:\windows\system32\hkcmd.exe
mRun: [igfxpers] c:\windows\system32\igfxpers.exe
mRun: [Apoint] c:\program files\apoint\Apoint.exe
mRun: [dla] c:\windows\system32\dla\tfswctrl.exe
mRun: [UpdateManager] "c:\program files\common files\sonic\update manager\sgtray.exe" /r
mRun: [ccApp] "c:\program files\common files\symantec shared\ccApp.exe"
mRun: [vptray] c:\progra~1\symant~1\VPTray.exe
mRun: [DVDLauncher] "c:\program files\cyberlink\powerdvd\DVDLauncher.exe"
mRun: [SAP_WUS_UNT] "c:\program files\sap\sapsetup\setup\updater\NwSapSetupUserNotificationTool.exe"
mRun: [MSPY2002] c:\windows\system32\ime\pintlgnt\ImScInst.exe /SYNC
mRun: [IntelZeroConfig] "c:\program files\intel\wireless\bin\ZCfgSvc.exe"
mRun: [IntelWireless] "c:\program files\intel\wireless\bin\ifrmewrk.exe" /tf Intel PROSet/Wireless
mRun: [SSRPM Enrollment Wizard] "c:\program files\tools4ever\ssrpm\enrollment wizard\SSRPMEnroll.exe" /Autostart
mRun: [Synchronization Manager] %SystemRoot%\system32\mobsync.exe /logon
mRun: [QuickTime Task] "c:\program files\quicktime\qttask.exe" -atboottime
mRun: [iTunesHelper] "c:\program files\itunes\iTunesHelper.exe"
mRun: [Malwarebytes Anti-Malware (reboot)] "c:\program files\malwarebytes' anti-malware\mbam.exe" /runcleanupscript
dRun: [CTFMON.EXE] c:\windows\system32\CTFMON.EXE
uPolicies-explorer: NoDesktopCleanupWizard = 1 (0x1)
mPolicies-explorer: NoWelcomeScreen = 1 (0x1)
IE: E&xport to Microsoft Excel - c:\progra~1\micros~2\office11\EXCEL.EXE/3000
IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe
IE: {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - {CAFEEFAC-0016-0000-0005-ABCDEFFEDCBC} - c:\program files\java\jre1.6.0_05\bin\ssv.dll
IE: {92780B25-18CC-41C8-B9BE-3C9C571A8263} - {FF059E31-CC5A-4E2E-BF3B-96E929D65503} - c:\progra~1\micros~2\office11\REFIEBAR.DLL
Trusted Zone: chrysler.com
Trusted Zone: chrysler.com\aqip02.extra
Trusted Zone: dhs.gov
Trusted Zone: intersourcing.com
Trusted Zone: intersourcing.com\www52
Trusted Zone: intuit.com
Trusted Zone: paychex.com\previewhostingservice
Trusted Zone: projsvr01
Trusted Zone: toyota-edc.com\mailbox.us
Trusted Zone: ufjbank.co.jp\uwb
Trusted Zone: ufjbank.co.jp\uwbw
Trusted Zone: ultiprotime.com
Trusted Zone: wolfgangsvault.com
Trusted Zone: yazaki-europe.com\gpdb
Trusted Zone: yazaki.com\apps.us
Trusted Zone: yazaki.com\local.us
Trusted Zone: yazaki.local\projsvr01
Trusted Zone: yazaki.net\xpedio
Trusted Zone: chrysler.com
Trusted Zone: chrysler.com\aqip02.extra
Trusted Zone: dhs.gov
Trusted Zone: intersourcing.com
Trusted Zone: intuit.com
Trusted Zone: paychex.com\previewhostingservice
Trusted Zone: projsvr01
Trusted Zone: toyota-edc.com\mailbox.us
Trusted Zone: ufjbank.co.jp\uwb
Trusted Zone: ufjbank.co.jp\uwbw
Trusted Zone: ultiprotime.com
Trusted Zone: wolfgangsvault.com
Trusted Zone: yazaki-europe.com\gpdb
Trusted Zone: yazaki.com\apps.us
Trusted Zone: yazaki.com\local.us
Trusted Zone: yazaki.local\projsvr01
Trusted Zone: yazaki.net\xpedio
DPF: SEAGULL J Walk Java Client 3_1C7 - hxxp://ayccantn.yna.yazaki.net/jwalk/jwalk_ie.cab
DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_05-windows-i586.cab
DPF: {CAFEEFAC-0014-0002-0008-ABCDEFFEDCBA} - hxxp://java.sun.com/products/plugin/autodl/jinstall-142-windows-i586.cab
DPF: {CAFEEFAC-0016-0000-0005-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_05-windows-i586.cab
Handler: linkscanner - {F274614C-63F8-47D5-A4D1-FBDDE494F8D1} -
Handler: saphtmlp - {D1F8BD1E-7967-11D2-B43A-006094B9EADB} - c:\program files\sap\frontend\sapgui\SAPHTMLP.DLL
Handler: sapr3 - {D1F8BD1E-7967-11D2-B43A-006094B9EADB} - c:\program files\sap\frontend\sapgui\SAPHTMLP.DLL
Notify: igfxcui - igfxdev.dll
Notify: NavLogon - c:\windows\system32\NavLogon.dll
Hosts: 127.0.0.1 www.spywareinfo.com

============= SERVICES / DRIVERS ===============

R0 aaatimeo;aaatimeo;c:\windows\system32\drivers\aaatimeo.sys [2009-6-30 4928]
R1 SAVRT;SAVRT;c:\program files\symantec antivirus\savrt.sys [2006-9-6 337592]
R1 SAVRTPEL;SAVRTPEL;c:\program files\symantec antivirus\Savrtpel.sys [2006-9-6 54968]
R2 ccEvtMgr;Symantec Event Manager;c:\program files\common files\symantec shared\ccEvtMgr.exe [2006-7-19 192160]
R2 ccSetMgr;Symantec Settings Manager;c:\program files\common files\symantec shared\ccSetMgr.exe [2006-7-19 169632]
R2 NWSAPAutoWorkstationUpdateSvc;SAPSetup Automatic Workstation Update Service;c:\program files\sap\sapsetup\setup\updater\NwSapAutoWorkstationUpdateService.exe [2009-6-30 259440]
R2 SavRoam;SAVRoam;c:\program files\symantec antivirus\SavRoam.exe [2006-9-27 116464]
R2 Symantec AntiVirus;Symantec AntiVirus;c:\program files\symantec antivirus\Rtvscan.exe [2006-9-27 1813232]
R3 EraserUtilRebootDrv;EraserUtilRebootDrv;c:\program files\common files\symantec shared\eengine\EraserUtilRebootDrv.sys [2009-10-30 102448]
R3 GTIPCI21;GTIPCI21;c:\windows\system32\drivers\gtipci21.sys [2009-6-30 80384]
R3 NAVENG;NAVENG;c:\progra~1\common~1\symant~1\virusd~1\20091130.004\naveng.sys [2009-11-30 84912]
R3 NAVEX15;NAVEX15;c:\progra~1\common~1\symant~1\virusd~1\20091130.004\navex15.sys [2009-11-30 1323568]
S3 TMPassthruMP;TMPassthruMP;c:\windows\system32\drivers\tmpassthru.sys --> c:\windows\system32\drivers\TMPassthru.sys [?]
S4 aarich;aarich;c:\windows\system32\drivers\aarich.sys [2009-6-30 241815]
S4 cda1000;cda1000;c:\windows\system32\drivers\cda1000.sys [2009-6-30 280608]

=============== Created Last 30 ================

2009-12-02 02:44:45 0 d-sha-r- C:\cmdcons
2009-12-02 02:42:57 77312 ----a-w- c:\windows\MBR.exe
2009-12-02 02:42:57 260608 ----a-w- c:\windows\PEV.exe
2009-12-02 02:42:57 161792 ----a-w- c:\windows\SWREG.exe
2009-12-02 00:03:26 0 d-----w- c:\program files\Safer Networking
2009-12-01 00:15:19 0 d-----w- c:\program files\Spybot - Search & Destroy
2009-12-01 00:15:19 0 d-----w- c:\docume~1\alluse~1\applic~1\Spybot - Search & Destroy
2009-11-30 19:47:02 0 ----a-w- c:\windows\VPC32.INI
2009-11-29 17:30:27 93360 ----a-w- c:\windows\system32\drivers\SBREDrv.sys
2009-11-29 15:14:26 0 d-----w- c:\docume~1\alluse~1\applic~1\avg9
2009-11-29 15:06:56 0 d-----w- c:\docume~1\10032507\applic~1\AVG8
2009-11-29 00:36:40 0 d-----w- c:\program files\Trend Micro
2009-11-29 00:30:07 0 d-----w- c:\documents and settings\10032507\log
2009-11-17 03:22:59 0 d-----w- c:\docume~1\10032507\applic~1\Malwarebytes
2009-11-17 03:22:53 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2009-11-17 03:22:52 19160 ----a-w- c:\windows\system32\drivers\mbam.sys
2009-11-17 03:22:52 0 d-----w- c:\program files\Malwarebytes' Anti-Malware
2009-11-17 03:22:52 0 d-----w- c:\docume~1\alluse~1\applic~1\Malwarebytes
2009-11-16 22:52:50 0 d-----w- c:\windows\system32\Adobe
2009-11-11 15:18:57 3253 ----a-w- c:\windows\system32\wbem\Outlook_01ca62e249c424c8.mof

==================== Find3M ====================

2009-11-28 18:55:59 95360 ----a-w- c:\windows\system32\drivers\atapi.sys
2009-10-26 04:07:03 262144 ----a-w- c:\windows\system32\default_user_class.dat
2009-10-20 15:00:17 21275 ----a-w- c:\windows\system32\drivers\AegisP.sys
2009-09-25 05:56:36 662016 ------w- c:\windows\system32\wininet.dll
2009-09-25 05:56:32 81920 ----a-w- c:\windows\system32\ieencode.dll
2009-09-11 14:33:52 133632 ----a-w- c:\windows\system32\msv1_0.dll
2009-09-04 20:45:26 58880 ----a-w- c:\windows\system32\msasn1.dll
2008-06-12 11:53:04 955904 ----a-w- c:\program files\common files\SAPActiveXL.xlt
2008-06-12 11:53:04 949760 ----a-w- c:\program files\common files\SAPActiveXL_nosig.xlt
2008-06-12 11:53:04 626688 ----a-w- c:\program files\common files\sapconsaccess.dll
2008-06-12 11:53:04 40960 ----a-w- c:\program files\common files\DigitalSignature.ocx
2008-06-12 11:53:04 3125248 ----a-w- c:\program files\common files\sapxlhelper.dll
2008-06-12 11:53:04 192512 ----a-w- c:\program files\common files\sapconsr3.dll

============= FINISH: 23:16:45.70 ===============

#10 JSntgRvr

JSntgRvr

    Master Surgeon General


  • Malware Response Team
  • 11,635 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto Rico
  • Local time:01:31 AM

Posted 01 December 2009 - 11:26 PM

Look at Post #2 and post a fresh GMER report. Have you tried installing SP3 in that computer?

No request for help throughout private messaging will be attended.

If I have helped you, consider making a donation to help me continue the fight against Malware!
btn_donate_SM.gif


#11 All4's

All4's
  • Topic Starter

  • Members
  • 7 posts
  • OFFLINE
  •  
  • Local time:12:31 AM

Posted 02 December 2009 - 12:12 AM

The updated gmer log file is below. Honestly I don't know what SP3 is so I guess my answer is no.

GMER 1.0.15.15252 - http://www.gmer.net
Rootkit scan 2009-12-02 00:10:27
Windows 5.1.2600 Service Pack 2
Running: gmer.exe; Driver: C:\DOCUME~1\10032507\LOCALS~1\Temp\kflcrkod.sys


---- System - GMER 1.0.15 ----

SSDT 864A64E8 ZwConnectPort
SSDT \??\C:\Program Files\Symantec\SYMEVENT.SYS (Symantec Event Library/Symantec Corporation) ZwDeleteValueKey [0xAAE92350]
SSDT \??\C:\Program Files\Symantec\SYMEVENT.SYS (Symantec Event Library/Symantec Corporation) ZwSetValueKey [0xAAE92580]
SSDT \??\C:\WINDOWS\system32\Drivers\uphcleanhlp.sys ZwUnloadKey [0xAA3906D0]

---- Devices - GMER 1.0.15 ----

AttachedDevice \FileSystem\Ntfs \Ntfs SYMEVENT.SYS (Symantec Event Library/Symantec Corporation)
AttachedDevice \Driver\Tcpip \Device\Ip SYMTDI.SYS (Network Dispatch Driver/Symantec Corporation)
AttachedDevice \Driver\Tcpip \Device\Tcp SYMTDI.SYS (Network Dispatch Driver/Symantec Corporation)
AttachedDevice \Driver\Tcpip \Device\Udp SYMTDI.SYS (Network Dispatch Driver/Symantec Corporation)
AttachedDevice \Driver\Tcpip \Device\RawIp SYMTDI.SYS (Network Dispatch Driver/Symantec Corporation)

Device \FileSystem\Fs_Rec \FileSystem\UdfsCdRomRecognizer tfsnifs.sys (Drive Letter Access Component/Sonic Solutions)
Device \FileSystem\Fs_Rec \FileSystem\FatCdRomRecognizer tfsnifs.sys (Drive Letter Access Component/Sonic Solutions)
Device \FileSystem\Fs_Rec \FileSystem\CdfsRecognizer tfsnifs.sys (Drive Letter Access Component/Sonic Solutions)
Device \FileSystem\Fs_Rec \FileSystem\FatDiskRecognizer tfsnifs.sys (Drive Letter Access Component/Sonic Solutions)
Device \FileSystem\Fs_Rec \FileSystem\UdfsDiskRecognizer tfsnifs.sys (Drive Letter Access Component/Sonic Solutions)
Device \FileSystem\Cdfs \Cdfs tfsnifs.sys (Drive Letter Access Component/Sonic Solutions)

---- Threads - GMER 1.0.15 ----

Thread System [4:108] F736731E

---- EOF - GMER 1.0.15 ----

#12 JSntgRvr

JSntgRvr

    Master Surgeon General


  • Malware Response Team
  • 11,635 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto Rico
  • Local time:01:31 AM

Posted 02 December 2009 - 02:02 AM

The suspicious file modification is no longer present in the log. How is the computer doing?

No request for help throughout private messaging will be attended.

If I have helped you, consider making a donation to help me continue the fight against Malware!
btn_donate_SM.gif


#13 All4's

All4's
  • Topic Starter

  • Members
  • 7 posts
  • OFFLINE
  •  
  • Local time:12:31 AM

Posted 02 December 2009 - 08:06 PM

Awesome! Thanks a ton for all of the help. M donation is on the way you so can help others too.

#14 JSntgRvr

JSntgRvr

    Master Surgeon General


  • Malware Response Team
  • 11,635 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto Rico
  • Local time:01:31 AM

Posted 02 December 2009 - 08:56 PM

Hi, All4's :(

Congratulations.

Reset and Re-enable your System Restore to remove bad files that have been backed up by Windows. The files in System Restore are protected to prevent any programmes changing them. This is the only way to clean these files: (You will lose all previous restore points which are likely to be infected.)

To reset your restore points, please note that you will need to log into your computer with an account which has full administrator access. You will know if the account has administrator access because you will be able to see the System Restore tab. If the tab is missing, you are logged in under a limited account.

(Windows XP)

1. Turn off System Restore.
On the Desktop, right-click My Computer.
Click Properties.
Click the System Restore tab.
Check Turn off System Restore.
Click Apply, and then click OK.

2. Reboot.

3. Turn ON System Restore.

On the Desktop, right-click My Computer.
Click Properties.
Click the System Restore tab.
UN-Check *Turn off System Restore*.
Click Apply, and then click OK..

Since the tools we used to scan the computer, as well as tools to delete files and folders, are no longer needed, they should be removed, as well as the folders created by these tools.

Follow these steps to uninstall Combofix
  • Click START then RUN
  • Now type Combofix /Uninstall in the runbox and click OK. Note the space between the x and the /u, it needs to be there.

    Posted Image
Create a Restore point (If the above process fails to do so):
  • Click Start, point to All Programs, point to Accessories, point to System Tools, and then click System Restore.
  • In the System Restore dialog box, click Create a restore point, and then click Next.
  • Type a description for your restore point, such as "After Cleanup", then click Create.
The following is a list of free tools and utilities that I like to suggest to people. This list is full of great tools and utilities to help you understand how you got infected and how to keep from getting infected again.
  • Spybot Search & Destroy - A useful tool which can search and annhilate bad files that make it onto your system. Now with an Immunize section that will help prevent future infections.
  • AdAware - Another very powerful tool which searches and kills bad files that infect your system. AdAware and Spybot Search & Destroy compliment each other very well.
  • SpywareBlaster - Great prevention tool to keep bad files from installing on your system.
  • ZonedOut + IE-SpyAd - puts over 5000 sites in your restricted zone so you'll be protected when you visit innocent-looking sites that aren't actually innocent at all.
  • ATF! - Cleans temporary files from IE and Windows, empties the recycle bin and more. Great tool to help speed up your computer and knock out those bad files that like to reside in the temp folders.
  • Windows Updates - It is very important to make sure that both Internet Explorer and Windows are kept current with the latest critical security patches from Microsoft. To do this just start Internet Explorer and select Tools > Windows Update, and follow the online instructions from there.
  • Google Toolbar - Free google toolbar that allows you to use the powerful Google search engine from the bar, but also blocks pop up windows.
  • Trillian or Miranda-IM - These are Malware free Instant Messenger programs which allow you to connect to multiple IM services in one program! (AOL, Yahoo, ICQ, IRC, MSN)
  • ERUNT (Emergency Recovery Utility NT) allows you to keep a complete backup of your registry and restore it when needed. The standard registry backup options that come with Windows back up most of the registry but not all of it. ERUNT however creates a complete backup set, including the Security hive and user related sections. ERUNT is easy to use and since it creates a full backup, there are no options or choices other than to select the location of the backup files. The backup set includes a small executable that will launch the registry restore if needed.
  • Recovery Console - Recent trends appear to indicate that future infections will include attacks to the boot sector of the computer. The installation of the Recovery Console in the computer will be our only defense against this threat. For more information and steps to install the Recovery Console see This Article. Should you need assistance in installing the Recovery Console, please do not hesitate to ask.
To find out more information about how you got infected in the first place and some great guidelines to follow to prevent future infections you can read this article by Miekiemoes.

Best wishes! Posted Image

No request for help throughout private messaging will be attended.

If I have helped you, consider making a donation to help me continue the fight against Malware!
btn_donate_SM.gif


#15 JSntgRvr

JSntgRvr

    Master Surgeon General


  • Malware Response Team
  • 11,635 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto Rico
  • Local time:01:31 AM

Posted 07 December 2009 - 08:11 PM

Since this issue appears to be resolved ... this Topic has been closed. Glad we could help.

If you're the topic starter, and need this topic reopened, please contact a staff member with the address of the thread.

Everyone else please begin a New Topic.

No request for help throughout private messaging will be attended.

If I have helped you, consider making a donation to help me continue the fight against Malware!
btn_donate_SM.gif





0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users