Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Google Redirect


  • This topic is locked This topic is locked
41 replies to this topic

#1 Roode

Roode

  • Members
  • 21 posts
  • OFFLINE
  •  
  • Local time:11:24 AM

Posted 31 December 2009 - 08:51 AM

Gmer log:
GMER 1.0.15.15281 - http://www.gmer.net
Rootkit scan 2009-12-31 07:54:50
Windows 5.1.2600 Service Pack 3
Running: 9647sttz.exe; Driver: C:\DOCUME~1\SIGNPR~1\LOCALS~1\Temp\awrirpob.sys


---- Kernel code sections - GMER 1.0.15 ----

.rsrc C:\WINDOWS\system32\drivers\nvgts.sys entry point in ".rsrc" section [0xF731502C]
.text C:\WINDOWS\system32\DRIVERS\nv4_mini.sys section is writeable [0xF698C360, 0x32DEFD, 0xE8000020]
init C:\WINDOWS\system32\drivers\monfilt.sys entry point in "init" section [0xF6503280]

---- User code sections - GMER 1.0.15 ----

.text C:\WINDOWS\system32\SearchIndexer.exe[1596] kernel32.dll!WriteFile 7C810E27 7 Bytes JMP 00585C0C C:\WINDOWS\system32\MSSRCH.DLL (mssrch.dll/Microsoft Corporation)

---- Devices - GMER 1.0.15 ----

Device \Driver\00000836 -> \Driver\nvgts \Device\Harddisk0\DR0 8509150C

---- Files - GMER 1.0.15 ----

File C:\WINDOWS\system32\drivers\nvgts.sys suspicious modification

---- EOF - GMER 1.0.15 ----

Hijackthis log:
Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 7:52:10 AM, on 12/31/2009
Platform: Windows XP SP3 (WinNT 5.01.2600)
MSIE: Internet Explorer v8.00 (8.00.6001.18702)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Java\jre6\bin\jqs.exe
C:\WINDOWS\system32\nvsvc32.exe
C:\WINDOWS\system32\SearchIndexer.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\VIA\VIAudioi\HDADeck\HDeck.exe
C:\WINDOWS\system32\RUNDLL32.EXE
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\GIGABYTE\Common\GNConfig.exe
C:\Documents and Settings\Sign Printer\My Documents\Downloads\9647sttz.exe
C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = www.google.com
O4 - HKLM\..\Run: [nwiz] nwiz.exe /install
O4 - HKLM\..\Run: [HDAudDeck] C:\Program Files\VIA\VIAudioi\HDADeck\HDeck.exe 1
O4 - HKLM\..\Run: [NvMediaCenter] RUNDLL32.EXE C:\WINDOWS\system32\NvMcTray.dll,NvTaskbarInit
O4 - HKLM\..\Run: [Seagull Drivers] ssdal_nc.exe startup
O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\system32\NvCpl.dll,NvStartup
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
O4 - HKCU\..\Run: [ccleaner] "C:\Program Files\CCleaner\ccleaner.exe" /AUTO
O4 - Global Startup: Gigabyte Wireless Utility.lnk = C:\Program Files\GIGABYTE\Common\GNConfig.exe
O23 - Service: Java Quick Starter (JavaQuickStarterService) - Sun Microsystems, Inc. - C:\Program Files\Java\jre6\bin\jqs.exe
O23 - Service: nProtect GameGuard Service (npggsvc) - Unknown owner - C:\WINDOWS\system32\GameMon.des.exe (file missing)
O23 - Service: NVIDIA Display Driver Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\system32\nvsvc32.exe

--
End of file - 2040 bytes

DDS log:

DDS (Ver_09-12-01.01) - NTFSx86
Run by Sign Printer at 8:25:20.70 on Thu 12/31/2009
Internet Explorer: 8.0.6001.18702 BrowserJavaVersion: 1.6.0_15
Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.894.634 [GMT -5:00]

AV: ZoneAlarm Antivirus *On-access scanning disabled* (Updated) {5D467B10-818C-4CAB-9FF7-6893B5B8F3CF}
FW: ZoneAlarm Firewall *disabled* {829BDA32-94B3-44F4-8446-F8FCFF809F8B}

============== Running Processes ===============

C:\WINDOWS\system32\svchost -k DcomLaunch
svchost.exe
C:\WINDOWS\System32\svchost.exe -k netsvcs
svchost.exe
svchost.exe
C:\WINDOWS\system32\spoolsv.exe
svchost.exe
C:\WINDOWS\system32\wuauclt.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\GIGABYTE\Common\GNConfig.exe
C:\WINDOWS\system32\SearchIndexer.exe
C:\Documents and Settings\Sign Printer\My Documents\Downloads\dds.scr

============== Pseudo HJT Report ===============

uStart Page = www.google.com
TB: {EE2AC4E5-B0B0-4EC6-88A9-BCA1A32AB107} - No File
EB: {32683183-48a0-441b-a342-7c2a440a9478} - No File
uRun: [ccleaner] "c:\program files\ccleaner\ccleaner.exe" /AUTO
mRun: [nwiz] nwiz.exe /install
mRun: [HDAudDeck] c:\program files\via\viaudioi\hdadeck\HDeck.exe 1
mRun: [NvMediaCenter] RUNDLL32.EXE c:\windows\system32\NvMcTray.dll,NvTaskbarInit
mRun: [Seagull Drivers] ssdal_nc.exe startup
mRun: [NvCplDaemon] RUNDLL32.EXE c:\windows\system32\NvCpl.dll,NvStartup
StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\gigaby~1.lnk - c:\program files\gigabyte\common\GNConfig.exe
DPF: DirectAnimation Java Classes - file://c:\windows\java\classes\dajava.cab
DPF: Microsoft XML Parser for Java - file://c:\windows\java\classes\xmldso.cab
DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_15-windows-i586.cab
DPF: {CAFEEFAC-0016-0000-0015-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_15-windows-i586.cab
DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_15-windows-i586.cab
DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} - hxxp://download.macromedia.com/pub/shockwave/cabs/flash/swflash.cab
SSODL: WPDShServiceObj - {AAA288BA-9A4C-45B0-95D7-94D524869DB5} - c:\windows\system32\WPDShServiceObj.dll
SEH: Windows Desktop Search Namespace Manager: {56f9679e-7826-4c84-81f3-532071a8bcc5} - c:\program files\windows desktop search\MSNLNamespaceMgr.dll
LSA: Notification Packages = scecli zujevuho.dll

================= FIREFOX ===================

FF - ProfilePath - c:\docume~1\signpr~1\applic~1\mozilla\firefox\profiles\wokztk9l.default\
FF - prefs.js: browser.startup.homepage - www.google.com
FF - HiddenExtension: Microsoft .NET Framework Assistant: {20a82645-c095-46ed-80e3-08825760534b} - c:\windows\microsoft.net\framework\v3.5\windows presentation foundation\dotnetassistantextension\
FF - HiddenExtension: Java Console: No Registry Reference - c:\program files\mozilla firefox\extensions\{CAFEEFAC-0016-0000-0013-ABCDEFFEDCBA}
FF - HiddenExtension: Java Console: No Registry Reference - c:\program files\mozilla firefox\extensions\{CAFEEFAC-0016-0000-0014-ABCDEFFEDCBA}
FF - HiddenExtension: Java Console: No Registry Reference - c:\program files\mozilla firefox\extensions\{CAFEEFAC-0016-0000-0015-ABCDEFFEDCBA}

---- FIREFOX POLICIES ----
c:\program files\mozilla firefox\greprefs\security-prefs.js - pref("security.ssl3.rsa_seed_sha", true);

============= SERVICES / DRIVERS ===============

R3 VIAHdAudAddService;VIA High Definition Audio Driver Service;c:\windows\system32\drivers\viahduaa.sys [2009-2-19 279680]
S3 FXDrv32;FXDrv32;c:\foxconn\FXDrv32.sys [2009-2-19 16352]
S3 npggsvc;nProtect GameGuard Service;c:\windows\system32\gamemon.des -service --> c:\windows\system32\GameMon.des -service [?]
S3 rootrepeal;rootrepeal;\??\c:\windows\system32\drivers\rootrepeal.sys --> c:\windows\system32\drivers\rootrepeal.sys [?]

=============== Created Last 30 ================

2009-12-04 12:54:25 0 d-----w- c:\docume~1\alluse~1\applic~1\SUPERAntiSpyware.com
2009-12-04 12:54:08 0 d-----w- c:\program files\SUPERAntiSpyware
2009-12-04 12:54:08 0 d-----w- c:\docume~1\signpr~1\applic~1\SUPERAntiSpyware.com
2009-12-04 12:41:12 0 d-----w- c:\program files\Spybot - Search & Destroy
2009-12-04 12:41:12 0 d-----w- c:\docume~1\alluse~1\applic~1\Spybot - Search & Destroy

==================== Find3M ====================

2009-12-03 21:14:06 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2009-12-03 21:13:56 19160 ----a-w- c:\windows\system32\drivers\mbam.sys
2009-10-29 07:45:38 916480 ----a-w- c:\windows\system32\wininet.dll
2009-10-26 16:08:55 4212 ---ha-w- c:\windows\system32\zllictbl.dat
2009-10-21 05:38:36 75776 ----a-w- c:\windows\system32\strmfilt.dll
2009-10-21 05:38:36 25088 ----a-w- c:\windows\system32\httpapi.dll
2009-10-13 10:30:16 270336 ----a-w- c:\windows\system32\oakley.dll
2009-10-12 13:38:19 149504 ----a-w- c:\windows\system32\rastls.dll
2009-10-12 13:38:18 79872 ----a-w- c:\windows\system32\raschap.dll
2009-04-24 12:42:46 133492859 ----a-w- c:\program files\openofficeorg1.cab
2009-04-24 12:42:20 9815040 ----a-w- c:\program files\openofficeorg31.msi
2009-04-23 22:36:08 336 ----a-w- c:\program files\setup.ini
2002-03-11 09:06:30 1822520 ----a-w- c:\program files\instmsiw.exe
2002-03-11 08:45:04 1708856 ----a-w- c:\program files\instmsia.exe

============= FINISH: 8:26:35.09 ===============

Root Repeal log:
ROOTREPEAL © AD, 2007-2009
==================================================
Scan Start Time: 2009/12/31 08:28
Program Version: Version 1.3.5.0
Windows Version: Windows XP SP3
==================================================

Drivers
-------------------
Name: PCI_HAL
Image Path: \Driver\PCI_HAL
Address: 0x00000000 Size: 0 File Visible: No Signed: -
Status: -

Name: rootrepeal.sys
Image Path: C:\WINDOWS\system32\drivers\rootrepeal.sys
Address: 0xF2682000 Size: 49152 File Visible: No Signed: -
Status: -

==EOF==

Mbam info report:
Malwarebytes' Anti-Malware 1.43
Database version: 3462
Executable location: C:\Program Files\Malwarebytes' Anti-Malware
Database location: C:\Documents and Settings\All Users\Application Data\Malwarebytes\Malwarebytes' Anti-Malware\rules.ref

Username: Sign Printer
Windows folder: C:\WINDOWS
System folder: C:\WINDOWS\system32
Root drive: C:
Program Files: C:\Program Files
Common Files: C:\Program Files\Common Files

Desktop: C:\Documents and Settings\All Users\Desktop
Desktop: C:\Documents and Settings\Default User\Desktop
Desktop: C:\Documents and Settings\Sign Printer\Desktop

Start Menu: C:\Documents and Settings\All Users\Start Menu
Start Menu: C:\Documents and Settings\Default User\Start Menu
Start Menu: C:\Documents and Settings\LocalService\Start Menu
Start Menu: C:\Documents and Settings\Sign Printer\Start Menu

User Root: C:\Documents and Settings\All Users
User Root: C:\Documents and Settings\Default User
User Root: C:\Documents and Settings\LocalService
User Root: C:\Documents and Settings\NetworkService
User Root: C:\Documents and Settings\Sign Printer

Favorite: C:\Documents and Settings\All Users\Favorites
Favorite: C:\Documents and Settings\Default User\Favorites
Favorite: C:\Documents and Settings\Sign Printer\Favorites

Application Data: C:\Documents and Settings\All Users\Application Data
Application Data: C:\Documents and Settings\Default User\Application Data
Application Data: C:\Documents and Settings\LocalService\Application Data
Application Data: C:\Documents and Settings\NetworkService\Application Data
Application Data: C:\Documents and Settings\Sign Printer\Application Data

Quick Launch: C:\Documents and Settings\Sign Printer\Application Data\Microsoft\Internet Explorer\Quick Launch

Temporary Folder: C:\WINDOWS\Temp
Temporary Folder: C:\Documents and Settings\Default User\Local Settings\Temp
Temporary Folder: C:\Documents and Settings\LocalService\Local Settings\Temp
Temporary Folder: C:\Documents and Settings\NetworkService\Local Settings\Temp
Temporary Folder: C:\Documents and Settings\Sign Printer\Local Settings\Temp

Programs: C:\Documents and Settings\All Users\Start Menu\Programs
Programs: C:\Documents and Settings\Default User\Start Menu\Programs
Programs: C:\Documents and Settings\LocalService\Start Menu\Programs
Programs: C:\Documents and Settings\Sign Printer\Start Menu\Programs

Startup: C:\Documents and Settings\All Users\Start Menu\Programs\Startup
Startup: C:\Documents and Settings\Default User\Start Menu\Programs\Startup
Startup: C:\Documents and Settings\Sign Printer\Start Menu\Programs\Startup

Documents: C:\Documents and Settings\All Users\Documents
Documents: C:\Documents and Settings\Default User\My Documents
Documents: C:\Documents and Settings\Sign Printer\My Documents

Mbam scan log:
Malwarebytes' Anti-Malware 1.43
Database version: 3462
Executable location: C:\Program Files\Malwarebytes' Anti-Malware
Database location: C:\Documents and Settings\All Users\Application Data\Malwarebytes\Malwarebytes' Anti-Malware\rules.ref

Username: Sign Printer
Windows folder: C:\WINDOWS
System folder: C:\WINDOWS\system32
Root drive: C:
Program Files: C:\Program Files
Common Files: C:\Program Files\Common Files

Desktop: C:\Documents and Settings\All Users\Desktop
Desktop: C:\Documents and Settings\Default User\Desktop
Desktop: C:\Documents and Settings\Sign Printer\Desktop

Start Menu: C:\Documents and Settings\All Users\Start Menu
Start Menu: C:\Documents and Settings\Default User\Start Menu
Start Menu: C:\Documents and Settings\LocalService\Start Menu
Start Menu: C:\Documents and Settings\Sign Printer\Start Menu

User Root: C:\Documents and Settings\All Users
User Root: C:\Documents and Settings\Default User
User Root: C:\Documents and Settings\LocalService
User Root: C:\Documents and Settings\NetworkService
User Root: C:\Documents and Settings\Sign Printer

Favorite: C:\Documents and Settings\All Users\Favorites
Favorite: C:\Documents and Settings\Default User\Favorites
Favorite: C:\Documents and Settings\Sign Printer\Favorites

Application Data: C:\Documents and Settings\All Users\Application Data
Application Data: C:\Documents and Settings\Default User\Application Data
Application Data: C:\Documents and Settings\LocalService\Application Data
Application Data: C:\Documents and Settings\NetworkService\Application Data
Application Data: C:\Documents and Settings\Sign Printer\Application Data

Quick Launch: C:\Documents and Settings\Sign Printer\Application Data\Microsoft\Internet Explorer\Quick Launch

Temporary Folder: C:\WINDOWS\Temp
Temporary Folder: C:\Documents and Settings\Default User\Local Settings\Temp
Temporary Folder: C:\Documents and Settings\LocalService\Local Settings\Temp
Temporary Folder: C:\Documents and Settings\NetworkService\Local Settings\Temp
Temporary Folder: C:\Documents and Settings\Sign Printer\Local Settings\Temp

Programs: C:\Documents and Settings\All Users\Start Menu\Programs
Programs: C:\Documents and Settings\Default User\Start Menu\Programs
Programs: C:\Documents and Settings\LocalService\Start Menu\Programs
Programs: C:\Documents and Settings\Sign Printer\Start Menu\Programs

Startup: C:\Documents and Settings\All Users\Start Menu\Programs\Startup
Startup: C:\Documents and Settings\Default User\Start Menu\Programs\Startup
Startup: C:\Documents and Settings\Sign Printer\Start Menu\Programs\Startup

Documents: C:\Documents and Settings\All Users\Documents
Documents: C:\Documents and Settings\Default User\My Documents
Documents: C:\Documents and Settings\Sign Printer\My Documents


Links from google searches are redirected 3 times before finally going to the correct address. The identity information box next to the address is a green virtual reality world or a blue swoosh that slightly resembles an "a".

If you guys need anything else just send me an e-mail or msg. I really appreciate the help.

Attached Files



BC AdBot (Login to Remove)

 


#2 Roode

Roode
  • Topic Starter

  • Members
  • 21 posts
  • OFFLINE
  •  
  • Local time:11:24 AM

Posted 04 January 2010 - 09:10 AM

Just ran Combofix, saved the log for it, however it did not fix the problem of the redirect. Let me know if you will need this posted.

#3 Elise

Elise

    Bleepin' Blonde


  • Malware Study Hall Admin
  • 60,816 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:Romania
  • Local time:07:24 PM

Posted 09 January 2010 - 03:01 PM

Hello ,
And :( to the Bleeping Computer Malware Removal Forum
. My name is Elise and I'll be glad to help you with your computer problems.


I will be working on your malware issues, this may or may not solve other issues you may have with your machine.

Please note that whatever repairs we make, are for fixing your computer problems only and by no means should be used on another computer.

You may want to keep the link to this topic in your favorites. Alternatively, you can click the button at the top bar of this topic and Track this Topic, where you can choose email notifications. The topics you are tracking are shown here.
-----------------------------------------------------------
If you have since resolved the original problem you were having, we would appreciate you letting us know. If not please perform the following steps below so we can have a look at the current condition of your machine.

If you have not done so, include a clear description of the problems you're having, along with any steps you may have performed so far.

If you have already posted a DDS log, please do so again, as your situation may have changed.
Use the 'Add Reply' and add the new log to this thread.

We need to see some information about what is happening in your machine. Please perform the following scan:
  • Download DDS by sUBs from one of the following links. Save it to your desktop.
  • Double click on the DDS icon, allow it to run.
  • A small box will open, with an explanation about the tool. No input is needed, the scan is running.
  • Notepad will open with the results.
  • Follow the instructions that pop up for posting the results. Post both logs (no need to zip attach.txt).
  • Close the program window, and delete the program from your desktop.
Please note: You may have to disable any script protection running if the scan fails to run. After downloading the tool, disconnect from the internet and disable all antivirus protection. Run the scan, enable your A/V and reconnect to the internet.

Information on A/V control HERE


Please download GMER from one of the following locations and save it to your desktop:
  • Main Mirror
    This version will download a randomly named file (Recommended)
  • Zipped Mirror
    This version will download a zip file you will need to extract first. If you use this mirror, please extract the zip file to your desktop.
  • Disconnect from the Internet and close all running programs.
  • Temporarily disable any real-time active protection so your security programs will not conflict with gmer's driver.
  • Double-click on the randomly named GMER file (i.e. n7gmo46c.exe) and allow the gmer.sys driver to load if asked.
  • Note: If you downloaded the zipped version, extract the file to its own folder such as C:\gmer and then double-click on gmer.exe.

    Posted Image
  • GMER will open to the Rootkit/Malware tab and perform an automatic quick scan when first run. (do not use the computer while the scan is in progress)
  • If you receive a WARNING!!! about rootkit activity and are asked to fully scan your system...click NO.
  • Now click the Scan button. If you see a rootkit warning window, click OK.
  • When the scan is finished, click the Save... button to save the scan results to your Desktop. Save the file as gmer.log.
  • Click the Copy button and paste the results into your next reply.
  • Exit GMER and re-enable all active protection when done.
-- If you encounter any problems, try running GMER in Safe Mode.

-------------------------------------------------------------
Please be patient and I'd be grateful if you would note the following
  • The cleaning process is not instant. DDS logs can take some time to research, so please be patient with me. I know that you need your computer working as quickly as possible, and I will work hard to help see that happen.
  • Please reply using the Add/Reply button in the lower right hand corner of your screen. Do not start a new topic.
  • The logs that you post should be pasted directly into the reply. Only attach them if requested or if they do not fit into the post.
  • Unfortunately, if I do not hear back from you within 5 days, I will be forced to close your topic. If you still need help after I have closed your topic, send me or a moderator a personal message with the address of the thread or feel free to create a new one.
In the meantime please, do NOT install any new programs or update anything unless told to do so while we are fixing your problem

If you still need help, please include the following in your next reply
  • A detailed description of your problems
  • A new DDS log (don't forget attach.txt)
  • GMER log
Please do NOT post logs as attachments, unless you are unable to copy/paste a log directly in the reply box.


Thanks and again sorry for the delay.

regards, Elise


"Now faith is the substance of things hoped for, the evidence of things not seen."

 

Follow BleepingComputer on: Facebook | Twitter | Google+ | lockerdome

 

Malware analyst @ Emsisoft


#4 Roode

Roode
  • Topic Starter

  • Members
  • 21 posts
  • OFFLINE
  •  
  • Local time:11:24 AM

Posted 11 January 2010 - 10:47 AM

DDS (Ver_09-12-01.01) - NTFSx86
Run by Sign Printer at 9:06:45.23 on Mon 01/11/2010
Internet Explorer: 8.0.6001.18702 BrowserJavaVersion: 1.6.0_15
Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.894.375 [GMT -5:00]

AV: ZoneAlarm Antivirus *On-access scanning disabled* (Updated) {5D467B10-818C-4CAB-9FF7-6893B5B8F3CF}
FW: ZoneAlarm Firewall *disabled* {829BDA32-94B3-44F4-8446-F8FCFF809F8B}

============== Running Processes ===============

C:\WINDOWS\system32\svchost -k DcomLaunch
svchost.exe
C:\WINDOWS\System32\svchost.exe -k netsvcs
svchost.exe
svchost.exe
C:\WINDOWS\system32\spoolsv.exe
svchost.exe
C:\WINDOWS\system32\nvsvc32.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\GIGABYTE\Common\GNConfig.exe
C:\Documents and Settings\Sign Printer\Desktop\dds(2).scr

============== Pseudo HJT Report ===============

uStart Page = www.google.com
TB: {EE2AC4E5-B0B0-4EC6-88A9-BCA1A32AB107} - No File
EB: {32683183-48a0-441b-a342-7c2a440a9478} - No File
uRun: [ccleaner] "c:\program files\ccleaner\ccleaner.exe" /AUTO
mRun: [nwiz] nwiz.exe /install
mRun: [HDAudDeck] c:\program files\via\viaudioi\hdadeck\HDeck.exe 1
mRun: [NvMediaCenter] RUNDLL32.EXE c:\windows\system32\NvMcTray.dll,NvTaskbarInit
mRun: [Seagull Drivers] ssdal_nc.exe startup
mRun: [NvCplDaemon] RUNDLL32.EXE c:\windows\system32\NvCpl.dll,NvStartup
StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\gigaby~1.lnk - c:\program files\gigabyte\common\GNConfig.exe
DPF: DirectAnimation Java Classes - file://c:\windows\java\classes\dajava.cab
DPF: Microsoft XML Parser for Java - file://c:\windows\java\classes\xmldso.cab
DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_15-windows-i586.cab
DPF: {CAFEEFAC-0016-0000-0015-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_15-windows-i586.cab
DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_15-windows-i586.cab
DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} - hxxp://download.macromedia.com/pub/shockwave/cabs/flash/swflash.cab
SSODL: WPDShServiceObj - {AAA288BA-9A4C-45B0-95D7-94D524869DB5} - c:\windows\system32\WPDShServiceObj.dll
SEH: Windows Desktop Search Namespace Manager: {56f9679e-7826-4c84-81f3-532071a8bcc5} - c:\program files\windows desktop search\MSNLNamespaceMgr.dll

================= FIREFOX ===================

FF - ProfilePath - c:\docume~1\signpr~1\applic~1\mozilla\firefox\profiles\wokztk9l.default\
FF - prefs.js: browser.startup.homepage - www.google.com
FF - HiddenExtension: Microsoft .NET Framework Assistant: {20a82645-c095-46ed-80e3-08825760534b} - c:\windows\microsoft.net\framework\v3.5\windows presentation foundation\dotnetassistantextension\
FF - HiddenExtension: Java Console: No Registry Reference - c:\program files\mozilla firefox\extensions\{CAFEEFAC-0016-0000-0013-ABCDEFFEDCBA}
FF - HiddenExtension: Java Console: No Registry Reference - c:\program files\mozilla firefox\extensions\{CAFEEFAC-0016-0000-0014-ABCDEFFEDCBA}
FF - HiddenExtension: Java Console: No Registry Reference - c:\program files\mozilla firefox\extensions\{CAFEEFAC-0016-0000-0015-ABCDEFFEDCBA}

---- FIREFOX POLICIES ----
c:\program files\mozilla firefox\greprefs\security-prefs.js - pref("security.ssl3.rsa_seed_sha", true);

============= SERVICES / DRIVERS ===============

R3 VIAHdAudAddService;VIA High Definition Audio Driver Service;c:\windows\system32\drivers\viahduaa.sys [2009-2-19 279680]
S3 FXDrv32;FXDrv32;c:\foxconn\FXDrv32.sys [2009-2-19 16352]
S3 npggsvc;nProtect GameGuard Service;c:\windows\system32\gamemon.des -service --> c:\windows\system32\GameMon.des -service [?]

=============== Created Last 30 ================

2010-01-04 13:20:40 0 d-sha-r- C:\cmdcons
2010-01-04 13:18:09 98816 ----a-w- c:\windows\sed.exe
2010-01-04 13:18:09 77312 ----a-w- c:\windows\MBR.exe
2010-01-04 13:18:09 261632 ----a-w- c:\windows\PEV.exe
2010-01-04 13:18:09 161792 ----a-w- c:\windows\SWREG.exe

==================== Find3M ====================

2009-12-30 19:55:24 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2009-12-30 19:54:58 19160 ----a-w- c:\windows\system32\drivers\mbam.sys
2009-10-29 07:45:38 916480 ------w- c:\windows\system32\wininet.dll
2009-10-26 16:08:55 4212 ---ha-w- c:\windows\system32\zllictbl.dat
2009-10-21 05:38:36 75776 ----a-w- c:\windows\system32\strmfilt.dll
2009-10-21 05:38:36 25088 ----a-w- c:\windows\system32\httpapi.dll
2009-04-24 12:42:46 133492859 ----a-w- c:\program files\openofficeorg1.cab
2009-04-24 12:42:20 9815040 ----a-w- c:\program files\openofficeorg31.msi
2009-04-23 22:36:08 336 ----a-w- c:\program files\setup.ini
2002-03-11 09:06:30 1822520 ----a-w- c:\program files\instmsiw.exe
2002-03-11 08:45:04 1708856 ----a-w- c:\program files\instmsia.exe

============= FINISH: 9:08:06.01 ===============



GMER 1.0.15.15281 - http://www.gmer.net
Rootkit scan 2010-01-11 10:23:02
Windows 5.1.2600 Service Pack 3
Running: o9ynlhus.exe; Driver: C:\DOCUME~1\SIGNPR~1\LOCALS~1\Temp\awrirpob.sys


---- Kernel code sections - GMER 1.0.15 ----

.rsrc C:\WINDOWS\system32\drivers\nvgts.sys entry point in ".rsrc" section [0xF731502C]
.text C:\WINDOWS\system32\DRIVERS\nv4_mini.sys section is writeable [0xF69F3360, 0x32DEFD, 0xE8000020]
init C:\WINDOWS\system32\drivers\monfilt.sys entry point in "init" section [0xF6627280]

---- User code sections - GMER 1.0.15 ----

.text C:\WINDOWS\system32\svchost.exe[672] ole32.dll!CoCreateInstance 7750057E 5 Bytes JMP 0255000A

---- Devices - GMER 1.0.15 ----

Device \Driver\00000835 -> \Driver\nvgts \Device\Harddisk0\DR0 8509050C

---- Files - GMER 1.0.15 ----

File C:\WINDOWS\system32\drivers\nvgts.sys suspicious modification

---- EOF - GMER 1.0.15 ----


I've included a "paint" picture that i drew of the address bar information icons. The 2 symbols are a rough approximation of what is shown when i'm being redirected. Please let me know if you need any further information.

Thanks

Attached Files



#5 Elise

Elise

    Bleepin' Blonde


  • Malware Study Hall Admin
  • 60,816 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:Romania
  • Local time:07:24 PM

Posted 11 January 2010 - 12:59 PM

Hello Roode,

BACKDOOR WARNING
------------------------------
One or more of the identified infections is known to use a backdoor.

This allows hackers to remotely control your computer, steal critical system information and download and execute files.

I would advice you to disconnect this PC from the Internet immediately. If you do any banking or other financial transactions on the PC or if it should contain any other sensitive information, please get to a known clean computer and change all passwords where applicable, and it would be wise to contact those same financial institutions to apprise them of your situation.

Though the infection has been identified and can be killed, because of it's backdoor functionality, your PC is very likely compromised and there is no way to be sure your computer can ever again be trusted. Many experts in the security community believe that once infected with this type of trojan, the best course of action would be a reformat and reinstall of the OS. Please read these for more information:

How Do I Handle Possible Identify Theft, Internet Fraud and CC Fraud?
When Should I Format, How Should I Reinstall

We can still clean this machine but I can't guarantee that it will be 100% secure afterwards. Let me know what you decide to do. If you decide to go through with the cleanup, please proceed with the following steps.


Your log shows you have been running Combofix. Please post me the log you will find at c:\combofix.txt

Please note: ComboFix is an extremely powerful tool which should only be used when instructed to do so by someone who has been properly trained. ComboFix is intended by its creator to be "used under the guidance and supervision of an expert." It is NOT for unsupervised use. Please read Combofix's Disclaimer.

Using this tool incorrectly could lead to disastrous problems with your operating system such as preventing it from ever starting again.

regards, Elise


"Now faith is the substance of things hoped for, the evidence of things not seen."

 

Follow BleepingComputer on: Facebook | Twitter | Google+ | lockerdome

 

Malware analyst @ Emsisoft


#6 Roode

Roode
  • Topic Starter

  • Members
  • 21 posts
  • OFFLINE
  •  
  • Local time:11:24 AM

Posted 11 January 2010 - 01:37 PM

ComboFix 10-01-03.05 - Sign Printer 01/04/2010 8:32.1.2 - x86
Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.894.657 [GMT -5:00]
Running from: c:\documents and settings\Sign Printer\My Documents\Downloads\ComboFix.exe
AV: ZoneAlarm Antivirus *On-access scanning disabled* (Updated) {5D467B10-818C-4CAB-9FF7-6893B5B8F3CF}
FW: ZoneAlarm Firewall *disabled* {829BDA32-94B3-44F4-8446-F8FCFF809F8B}
.

((((((((((((((((((((((((( Files Created from 2009-12-04 to 2010-01-04 )))))))))))))))))))))))))))))))
.

2009-12-09 08:01 . 2009-12-09 08:01 -------- d-sh--w- c:\documents and settings\Default User\IETldCache
2009-12-07 18:28 . 2009-12-31 13:32 5061520 ----a-w- c:\documents and settings\All Users\Application Data\Malwarebytes\Malwarebytes' Anti-Malware\mbam-setup.exe

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2009-12-31 13:32 . 2009-11-04 12:30 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
2009-12-30 19:55 . 2009-11-04 12:30 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2009-12-30 19:54 . 2009-11-04 12:30 19160 ----a-w- c:\windows\system32\drivers\mbam.sys
2009-12-09 08:01 . 2009-02-19 13:44 -------- d-----w- c:\documents and settings\All Users\Application Data\Microsoft Help
2009-12-04 14:07 . 2009-12-04 12:41 -------- d-----w- c:\program files\Spybot - Search & Destroy
2009-12-04 13:15 . 2009-12-04 12:54 -------- d-----w- c:\documents and settings\Sign Printer\Application Data\SUPERAntiSpyware.com
2009-12-04 13:15 . 2009-12-04 12:54 -------- d-----w- c:\program files\SUPERAntiSpyware
2009-12-04 13:13 . 2009-12-04 12:41 -------- d-----w- c:\documents and settings\All Users\Application Data\Spybot - Search & Destroy
2009-12-04 12:54 . 2009-12-04 12:54 -------- d-----w- c:\documents and settings\All Users\Application Data\SUPERAntiSpyware.com
2009-12-04 12:37 . 2009-11-23 13:04 -------- d-----w- c:\documents and settings\All Users\Application Data\Apple Computer
2009-11-25 14:39 . 2009-03-04 14:33 -------- d-----w- c:\documents and settings\All Users\Application Data\Viewpoint
2009-11-25 13:18 . 2009-11-25 13:18 -------- d-----w- c:\documents and settings\Sign Printer\Application Data\AdobeUM
2009-11-24 13:36 . 2009-11-24 13:36 -------- d-----w- c:\program files\CCleaner
2009-11-23 13:05 . 2009-11-23 13:04 -------- d-----w- c:\program files\QuickTime
2009-11-19 19:18 . 2009-11-19 19:18 -------- d-----w- c:\program files\Alwil Software
2009-11-10 12:34 . 2009-02-19 13:46 -------- d-----w- c:\program files\Microsoft Works
2009-10-29 07:45 . 2002-08-29 12:00 916480 ----a-w- c:\windows\system32\wininet.dll
2009-10-26 16:08 . 2009-10-26 15:31 4212 ---ha-w- c:\windows\system32\zllictbl.dat
2009-10-21 05:38 . 2009-02-19 13:26 25088 ----a-w- c:\windows\system32\httpapi.dll
2009-10-21 05:38 . 2009-02-19 13:26 75776 ----a-w- c:\windows\system32\strmfilt.dll
2009-10-20 16:20 . 2009-02-19 13:26 265728 ------w- c:\windows\system32\drivers\http.sys
2009-10-13 10:30 . 2002-08-29 12:00 270336 ----a-w- c:\windows\system32\oakley.dll
2009-10-12 13:38 . 2002-08-29 12:00 149504 ----a-w- c:\windows\system32\rastls.dll
2009-10-12 13:38 . 2002-08-29 12:00 79872 ----a-w- c:\windows\system32\raschap.dll
2009-04-24 12:42 . 2009-04-24 12:42 133492859 ----a-w- c:\program files\openofficeorg1.cab
2009-04-24 12:42 . 2009-04-24 12:42 9815040 ----a-w- c:\program files\openofficeorg31.msi
2009-04-23 22:36 . 2009-04-23 22:36 336 ----a-w- c:\program files\setup.ini
2002-03-11 09:06 . 2002-03-11 09:06 1822520 ----a-w- c:\program files\instmsiw.exe
2002-03-11 08:45 . 2002-03-11 08:45 1708856 ----a-w- c:\program files\instmsia.exe
.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"ccleaner"="c:\program files\CCleaner\ccleaner.exe" [2009-12-21 1803064]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"Seagull Drivers"="ssdal_nc.exe startup" [X]
"nwiz"="nwiz.exe" [2008-09-18 1657376]
"HDAudDeck"="c:\program files\VIA\VIAudioi\HDADeck\HDeck.exe" [2008-07-12 29896704]
"NvMediaCenter"="c:\windows\system32\NvMcTray.dll" [2008-09-18 86016]
"NvCplDaemon"="c:\windows\system32\NvCpl.dll" [2008-09-18 13574144]

c:\documents and settings\All Users\Start Menu\Programs\Startup\
Gigabyte Wireless Utility.lnk - c:\program files\GIGABYTE\Common\GNConfig.exe [2009-2-18 753664]

[hkey_local_machine\software\microsoft\windows\currentversion\explorer\ShellExecuteHooks]
"{56F9679E-7826-4C84-81F3-532071A8BCC5}"= "c:\program files\Windows Desktop Search\MSNLNamespaceMgr.dll" [2009-05-25 304128]

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\QuickTime Task]
2009-11-11 04:08 417792 ----a-w- c:\program files\QuickTime\QTTask.exe

[HKEY_LOCAL_MACHINE\software\microsoft\security center]
"AntiVirusOverride"=dword:00000001

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\ZoneLabsFirewall]
"DisableMonitoring"=dword:00000001

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"c:\\Program Files\\Mozilla Firefox\\firefox.exe"=
"c:\\Program Files\\VIA\\VIAudioi\\HDADeck\\HDeck.exe"=
"c:\\WINDOWS\\Network Diagnostic\\xpnetdiag.exe"=
"c:\\WINDOWS\\system32\\sessmgr.exe"=
"c:\\WINDOWS\\system32\\searchindexer.exe"=
"c:\\WINDOWS\\system32\\spoolsv.exe"=
"c:\\WINDOWS\\system32\\wbem\\wmiprvse.exe"=

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\GloballyOpenPorts\List]
"6160:TCP"= 6160:TCP:*:Disabled:Seagull Driver Networking

R3 VIAHdAudAddService;VIA High Definition Audio Driver Service;c:\windows\system32\drivers\viahduaa.sys [2/19/2009 11:55 AM 279680]
S3 FXDrv32;FXDrv32;c:\foxconn\FXDrv32.sys [2/19/2009 11:09 AM 16352]
S3 npggsvc;nProtect GameGuard Service;c:\windows\system32\GameMon.des -service --> c:\windows\system32\GameMon.des -service [?]
.
Contents of the 'Scheduled Tasks' folder

2010-01-04 c:\windows\Tasks\User_Feed_Synchronization-{6DA65D1D-E470-47C5-88A7-C36675DD3413}.job
- c:\windows\system32\msfeedssync.exe [2007-08-13 08:31]
.
.
------- Supplementary Scan -------
.
uStart Page = www.google.com
DPF: DirectAnimation Java Classes - file://c:\windows\Java\classes\dajava.cab
DPF: Microsoft XML Parser for Java - file://c:\windows\Java\classes\xmldso.cab
FF - ProfilePath - c:\documents and settings\Sign Printer\Application Data\Mozilla\Firefox\Profiles\wokztk9l.default\
FF - prefs.js: browser.startup.homepage - www.google.com
FF - HiddenExtension: Microsoft .NET Framework Assistant: {20a82645-c095-46ed-80e3-08825760534b} - c:\windows\Microsoft.NET\Framework\v3.5\Windows Presentation Foundation\DotNetAssistantExtension\
.

**************************************************************************

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2010-01-04 08:40
Windows 5.1.2600 Service Pack 3 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

HKLM\Software\Microsoft\Windows\CurrentVersion\Run
HDAudDeck = c:\program files\VIA\VIAudioi\HDADeck\HDeck.exe 1????????????????????????????????????????????????

scanning hidden files ...

scan completed successfully
hidden files: 0

**************************************************************************

Stealth MBR rootkit/Mebroot/Sinowal detector 0.3.7 by Gmer, http://www.gmer.net

device: opened successfully
user: MBR read successfully
called modules: ntkrnlpa.exe CLASSPNP.SYS disk.sys >>UNKNOWN [0x84A9050C]<<
kernel: MBR read successfully
detected MBR rootkit hooks:
\Driver\Disk -> CLASSPNP.SYS @ 0xf74cbf28
\Driver\atapi -> atapi.sys @ 0xf731e852
IoDeviceObjectType -> DeleteProcedure -> ntkrnlpa.exe @ 0x805836a8
ParseProcedure -> ntkrnlpa.exe @ 0x805827e8
\Device\Harddisk0\DR0 -> DeleteProcedure -> ntkrnlpa.exe @ 0x805836a8
ParseProcedure -> ntkrnlpa.exe @ 0x805827e8
NDIS: Gigabyte GN-WP01GS PCI WLAN Card(Turbo) -> SendCompleteHandler -> NDIS.sys @ 0xf71f0b0a
PacketIndicateHandler -> NDIS.sys @ 0xf71fba21
SendHandler -> NDIS.sys @ 0xf71f0949
user & kernel MBR OK

**************************************************************************

[HKEY_LOCAL_MACHINE\System\ControlSet001\Services\npggsvc]
"ImagePath"="c:\windows\system32\GameMon.des -service"
.
--------------------- LOCKED REGISTRY KEYS ---------------------

[HKEY_USERS\S-1-5-21-796845957-179605362-725345543-1003\Software\Microsoft\SystemCertificates\AddressBook*]
@Allowed: (Read) (RestrictedCode)
@Allowed: (Read) (RestrictedCode)
.
--------------------- DLLs Loaded Under Running Processes ---------------------

- - - - - - - > 'winlogon.exe'(508)
c:\windows\system32\WININET.dll

- - - - - - - > 'lsass.exe'(568)
c:\windows\system32\WININET.dll

- - - - - - - > 'explorer.exe'(3968)
c:\windows\system32\WININET.dll
c:\windows\system32\ieframe.dll
c:\windows\system32\webcheck.dll
c:\windows\system32\WPDShServiceObj.dll
c:\windows\system32\PortableDeviceTypes.dll
c:\windows\system32\PortableDeviceApi.dll
.
------------------------ Other Running Processes ------------------------
.
c:\program files\Java\jre6\bin\jqs.exe
c:\windows\system32\nvsvc32.exe
c:\windows\system32\SearchIndexer.exe
c:\windows\system32\RUNDLL32.EXE
.
**************************************************************************
.
Completion time: 2010-01-04 08:45:15 - machine was rebooted
ComboFix-quarantined-files.txt 2010-01-04 13:45

Pre-Run: 149,305,573,376 bytes free
Post-Run: 149,328,084,992 bytes free

WindowsXP-KB310994-SP2-Pro-BootDisk-ENU.exe
[boot loader]
timeout=2
default=multi(0)disk(0)rdisk(0)partition(1)\WINDOWS
[operating systems]
c:\cmdcons\BOOTSECT.DAT="Microsoft Windows Recovery Console" /cmdcons
multi(0)disk(0)rdisk(0)partition(1)\WINDOWS="Microsoft Windows XP Professional" /fastdetect /NoExecute=OptIn

- - End Of File - - 9487B101D7C98E7167D1DA70C38F02EE


This is my work computer, and it has some proprietary software and drivers installed that i'd like to not risk, so please advise me how best to clean this until i can replace this tower with a new one.

Thanks

#7 Elise

Elise

    Bleepin' Blonde


  • Malware Study Hall Admin
  • 60,816 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:Romania
  • Local time:07:24 PM

Posted 11 January 2010 - 01:49 PM

Hello Roode,

Please delete any old copy of Combofix you still might have and download a new one as instructed below.

COMBOFIX
---------------
Please download ComboFix from one of these locations:Bleepingcomputer
ForoSpyware
  • Disable your AntiVirus and AntiSpyware applications, usually via a right click on the System Tray icon. They may otherwise interfere with our tools. (Click on this link to see a list of programs that should be disabled. The list is not all inclusive.)
  • Double click on Combofix.exe and follow the prompts.
  • As part of it's process, ComboFix will check to see if the Microsoft Windows Recovery Console is installed. With malware infections being as they are today, it's strongly recommended to have this pre-installed on your machine before doing any malware removal. It will allow you to boot up into a special recovery/repair mode that will allow us to more easily help you should your computer have a problem after an attempted removal of malware.
  • Follow the prompts to allow ComboFix to download and install the Microsoft Windows Recovery Console, and when prompted, agree to the End-User License Agreement to install the Microsoft Windows Recovery Console.
**Please note: If the Microsoft Windows Recovery Console is already installed, or if you are running Vista, ComboFix will continue it's malware removal procedures.

Posted Image


Once the Microsoft Windows Recovery Console is installed using ComboFix, you should see the following message:

Posted Image


Click on Yes, to continue scanning for malware.

When finished, it shall produce a log for you. Please include the C:\ComboFix.txt in your next reply.


In your next reply, please include the following:
  • Combofix.txt

regards, Elise


"Now faith is the substance of things hoped for, the evidence of things not seen."

 

Follow BleepingComputer on: Facebook | Twitter | Google+ | lockerdome

 

Malware analyst @ Emsisoft


#8 Roode

Roode
  • Topic Starter

  • Members
  • 21 posts
  • OFFLINE
  •  
  • Local time:11:24 AM

Posted 12 January 2010 - 09:05 AM

ComboFix 10-01-11.03 - Sign Printer 01/12/2010 8:47.2.2 - x86
Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.894.618 [GMT -5:00]
Running from: c:\documents and settings\Sign Printer\Desktop\ComboFix.exe
AV: ZoneAlarm Antivirus *On-access scanning disabled* (Updated) {5D467B10-818C-4CAB-9FF7-6893B5B8F3CF}
FW: ZoneAlarm Firewall *disabled* {829BDA32-94B3-44F4-8446-F8FCFF809F8B}
.

((((((((((((((((((((((((( Files Created from 2009-12-12 to 2010-01-12 )))))))))))))))))))))))))))))))
.

2010-01-11 15:41 . 2010-01-11 15:42 -------- d-----w- c:\documents and settings\All Users\Application Data\WinZip

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2010-01-11 16:12 . 2009-11-04 12:30 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
2010-01-11 16:12 . 2009-12-07 18:28 5115824 ----a-w- c:\documents and settings\All Users\Application Data\Malwarebytes\Malwarebytes' Anti-Malware\mbam-setup.exe
2010-01-07 21:07 . 2009-11-04 12:30 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2010-01-07 21:07 . 2009-11-04 12:30 19160 ----a-w- c:\windows\system32\drivers\mbam.sys
2009-12-09 08:01 . 2009-02-19 13:44 -------- d-----w- c:\documents and settings\All Users\Application Data\Microsoft Help
2009-12-04 14:07 . 2009-12-04 12:41 -------- d-----w- c:\program files\Spybot - Search & Destroy
2009-12-04 13:15 . 2009-12-04 12:54 -------- d-----w- c:\documents and settings\Sign Printer\Application Data\SUPERAntiSpyware.com
2009-12-04 13:15 . 2009-12-04 12:54 -------- d-----w- c:\program files\SUPERAntiSpyware
2009-12-04 13:13 . 2009-12-04 12:41 -------- d-----w- c:\documents and settings\All Users\Application Data\Spybot - Search & Destroy
2009-12-04 12:54 . 2009-12-04 12:54 -------- d-----w- c:\documents and settings\All Users\Application Data\SUPERAntiSpyware.com
2009-12-04 12:37 . 2009-11-23 13:04 -------- d-----w- c:\documents and settings\All Users\Application Data\Apple Computer
2009-11-25 14:39 . 2009-03-04 14:33 -------- d-----w- c:\documents and settings\All Users\Application Data\Viewpoint
2009-11-25 13:18 . 2009-11-25 13:18 -------- d-----w- c:\documents and settings\Sign Printer\Application Data\AdobeUM
2009-11-24 13:36 . 2009-11-24 13:36 -------- d-----w- c:\program files\CCleaner
2009-11-23 13:05 . 2009-11-23 13:04 -------- d-----w- c:\program files\QuickTime
2009-11-19 19:18 . 2009-11-19 19:18 -------- d-----w- c:\program files\Alwil Software
2009-10-29 07:45 . 2002-08-29 12:00 916480 ------w- c:\windows\system32\wininet.dll
2009-10-26 16:08 . 2009-10-26 15:31 4212 ---ha-w- c:\windows\system32\zllictbl.dat
2009-10-21 05:38 . 2009-02-19 13:26 25088 ----a-w- c:\windows\system32\httpapi.dll
2009-10-21 05:38 . 2009-02-19 13:26 75776 ----a-w- c:\windows\system32\strmfilt.dll
2009-10-20 16:20 . 2009-02-19 13:26 265728 ------w- c:\windows\system32\drivers\http.sys
2009-04-24 12:42 . 2009-04-24 12:42 133492859 ----a-w- c:\program files\openofficeorg1.cab
2009-04-24 12:42 . 2009-04-24 12:42 9815040 ----a-w- c:\program files\openofficeorg31.msi
2009-04-23 22:36 . 2009-04-23 22:36 336 ----a-w- c:\program files\setup.ini
2002-03-11 09:06 . 2002-03-11 09:06 1822520 ----a-w- c:\program files\instmsiw.exe
2002-03-11 08:45 . 2002-03-11 08:45 1708856 ----a-w- c:\program files\instmsia.exe
.

((((((((((((((((((((((((((((( SnapShot@2010-01-04_13.41.10 )))))))))))))))))))))))))))))))))))))))))
.
+ 2010-01-12 13:55 . 2010-01-12 13:55 16384 c:\windows\Temp\Perflib_Perfdata_554.dat
+ 2009-06-15 16:38 . 2010-01-07 14:36 84661 c:\windows\system32\Macromed\Flash\uninstall_plugin.exe
+ 2010-01-07 14:40 . 2010-01-07 14:40 84507 c:\windows\system32\Macromed\Flash\uninstall_activeX.exe
+ 2010-01-11 20:43 . 2010-01-11 20:29 32768 c:\windows\system32\config\systemprofile\Local Settings\History\History.IE5\MSHist012010011120100112\index.dat
+ 2010-01-11 20:43 . 2010-01-11 20:29 49152 c:\windows\system32\config\systemprofile\Local Settings\History\History.IE5\MSHist012010010420100111\index.dat
- 2009-02-18 21:27 . 2010-01-04 13:27 32768 c:\windows\system32\config\systemprofile\Local Settings\History\History.IE5\index.dat
+ 2009-02-18 21:27 . 2010-01-12 13:16 32768 c:\windows\system32\config\systemprofile\Local Settings\History\History.IE5\index.dat
+ 2009-11-07 23:36 . 2010-01-12 13:26 16384 c:\windows\system32\config\systemprofile\IETldCache\index.dat
- 2009-11-07 23:36 . 2010-01-04 13:27 16384 c:\windows\system32\config\systemprofile\IETldCache\index.dat
+ 2010-01-04 13:45 . 2010-01-12 13:16 32768 c:\windows\system32\config\systemprofile\Cookies\index.dat
- 2009-02-18 21:27 . 2010-01-04 13:27 32768 c:\windows\system32\config\systemprofile\Cookies\index.dat
- 2009-12-10 06:25 . 2010-01-04 11:55 32768 c:\windows\system32\config\systemprofile\Application Data\Microsoft\Internet Explorer\UserData\index.dat
+ 2009-12-10 06:25 . 2010-01-06 07:29 32768 c:\windows\system32\config\systemprofile\Application Data\Microsoft\Internet Explorer\UserData\index.dat
+ 2010-01-11 15:41 . 2010-01-11 15:41 29184 c:\windows\Installer\{CD95F661-A5C4-44F5-A6AA-ECDD91C240BB}\IconCD95F6617.exe
- 2009-07-18 03:21 . 2009-07-18 03:21 257440 c:\windows\system32\Macromed\Flash\NPSWF32_FlashUtil.exe
+ 2009-10-28 03:40 . 2009-10-28 03:40 257440 c:\windows\system32\Macromed\Flash\NPSWF32_FlashUtil.exe
+ 2009-11-03 00:24 . 2009-11-03 00:24 257440 c:\windows\system32\Macromed\Flash\FlashUtil10d.exe
+ 2010-01-11 15:41 . 2010-01-11 15:41 632320 c:\windows\Installer\{CD95F661-A5C4-44F5-A6AA-ECDD91C240BB}\IconCD95F66110.exe
+ 2009-10-28 03:40 . 2009-10-28 03:40 3885984 c:\windows\system32\Macromed\Flash\NPSWF32.dll
+ 2009-02-18 21:27 . 2010-01-12 13:16 2801664 c:\windows\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\index.dat
+ 2010-01-11 15:41 . 2010-01-11 15:41 1544192 c:\windows\Installer\e6d5f.msi
.
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"ccleaner"="c:\program files\CCleaner\ccleaner.exe" [2009-12-21 1803064]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"Seagull Drivers"="ssdal_nc.exe startup" [X]
"nwiz"="nwiz.exe" [2008-09-18 1657376]
"HDAudDeck"="c:\program files\VIA\VIAudioi\HDADeck\HDeck.exe" [2008-07-12 29896704]
"NvMediaCenter"="c:\windows\system32\NvMcTray.dll" [2008-09-18 86016]
"NvCplDaemon"="c:\windows\system32\NvCpl.dll" [2008-09-18 13574144]

c:\documents and settings\All Users\Start Menu\Programs\Startup\
Gigabyte Wireless Utility.lnk - c:\program files\GIGABYTE\Common\GNConfig.exe [2009-2-18 753664]
WinZip Quick Pick.lnk - c:\program files\WinZip\WZQKPICK.EXE [2009-11-18 495432]

[hkey_local_machine\software\microsoft\windows\currentversion\explorer\ShellExecuteHooks]
"{56F9679E-7826-4C84-81F3-532071A8BCC5}"= "c:\program files\Windows Desktop Search\MSNLNamespaceMgr.dll" [2009-05-25 304128]

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\QuickTime Task]
2009-11-11 04:08 417792 ----a-w- c:\program files\QuickTime\QTTask.exe

[HKEY_LOCAL_MACHINE\software\microsoft\security center]
"AntiVirusOverride"=dword:00000001

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\ZoneLabsFirewall]
"DisableMonitoring"=dword:00000001

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"c:\\Program Files\\Mozilla Firefox\\firefox.exe"=
"c:\\Program Files\\VIA\\VIAudioi\\HDADeck\\HDeck.exe"=
"c:\\WINDOWS\\Network Diagnostic\\xpnetdiag.exe"=
"c:\\WINDOWS\\system32\\sessmgr.exe"=
"c:\\WINDOWS\\system32\\searchindexer.exe"=
"c:\\WINDOWS\\system32\\spoolsv.exe"=
"c:\\WINDOWS\\system32\\wbem\\wmiprvse.exe"=

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\GloballyOpenPorts\List]
"6160:TCP"= 6160:TCP:*:Disabled:Seagull Driver Networking

R3 VIAHdAudAddService;VIA High Definition Audio Driver Service;c:\windows\system32\drivers\viahduaa.sys [2/19/2009 11:55 AM 279680]
S3 FXDrv32;FXDrv32;c:\foxconn\FXDrv32.sys [2/19/2009 11:09 AM 16352]
S3 npggsvc;nProtect GameGuard Service;c:\windows\system32\GameMon.des -service --> c:\windows\system32\GameMon.des -service [?]
.
Contents of the 'Scheduled Tasks' folder

2010-01-12 c:\windows\Tasks\User_Feed_Synchronization-{6DA65D1D-E470-47C5-88A7-C36675DD3413}.job
- c:\windows\system32\msfeedssync.exe [2007-08-13 08:31]
.
.
------- Supplementary Scan -------
.
uStart Page = www.google.com
DPF: DirectAnimation Java Classes - file://c:\windows\Java\classes\dajava.cab
DPF: Microsoft XML Parser for Java - file://c:\windows\Java\classes\xmldso.cab
FF - ProfilePath - c:\documents and settings\Sign Printer\Application Data\Mozilla\Firefox\Profiles\wokztk9l.default\
FF - prefs.js: browser.startup.homepage - www.google.com
FF - HiddenExtension: Microsoft .NET Framework Assistant: {20a82645-c095-46ed-80e3-08825760534b} - c:\windows\Microsoft.NET\Framework\v3.5\Windows Presentation Foundation\DotNetAssistantExtension\
.

**************************************************************************

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2010-01-12 08:55
Windows 5.1.2600 Service Pack 3 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

HKLM\Software\Microsoft\Windows\CurrentVersion\Run
HDAudDeck = c:\program files\VIA\VIAudioi\HDADeck\HDeck.exe 1????????????????????????????????????????????????

scanning hidden files ...

scan completed successfully
hidden files: 0

**************************************************************************

Stealth MBR rootkit/Mebroot/Sinowal detector 0.3.7 by Gmer, http://www.gmer.net

device: opened successfully
user: MBR read successfully
called modules: ntkrnlpa.exe CLASSPNP.SYS disk.sys >>UNKNOWN [0x8509050C]<<
kernel: MBR read successfully
detected MBR rootkit hooks:
\Driver\Disk -> CLASSPNP.SYS @ 0xf74cbf28
\Driver\atapi -> atapi.sys @ 0xf731e852
IoDeviceObjectType -> DeleteProcedure -> ntkrnlpa.exe @ 0x805836a8
ParseProcedure -> ntkrnlpa.exe @ 0x805827e8
\Device\Harddisk0\DR0 -> DeleteProcedure -> ntkrnlpa.exe @ 0x805836a8
ParseProcedure -> ntkrnlpa.exe @ 0x805827e8
NDIS: Gigabyte GN-WP01GS PCI WLAN Card(Turbo) -> SendCompleteHandler -> NDIS.sys @ 0xf71f0b0a
PacketIndicateHandler -> NDIS.sys @ 0xf71fba21
SendHandler -> NDIS.sys @ 0xf71f0949
user & kernel MBR OK

**************************************************************************

[HKEY_LOCAL_MACHINE\System\ControlSet001\Services\npggsvc]
"ImagePath"="c:\windows\system32\GameMon.des -service"
.
--------------------- LOCKED REGISTRY KEYS ---------------------

[HKEY_USERS\S-1-5-21-796845957-179605362-725345543-1003\Software\Microsoft\SystemCertificates\AddressBook*]
@Allowed: (Read) (RestrictedCode)
@Allowed: (Read) (RestrictedCode)
.
--------------------- DLLs Loaded Under Running Processes ---------------------

- - - - - - - > 'winlogon.exe'(512)
c:\windows\system32\WININET.dll

- - - - - - - > 'lsass.exe'(572)
c:\windows\system32\WININET.dll

- - - - - - - > 'explorer.exe'(2252)
c:\windows\system32\WININET.dll
c:\windows\system32\ieframe.dll
c:\windows\system32\webcheck.dll
c:\windows\system32\WPDShServiceObj.dll
c:\windows\system32\PortableDeviceTypes.dll
c:\windows\system32\PortableDeviceApi.dll
.
------------------------ Other Running Processes ------------------------
.
c:\program files\Java\jre6\bin\jqs.exe
c:\windows\system32\nvsvc32.exe
c:\windows\system32\SearchIndexer.exe
c:\windows\system32\RUNDLL32.EXE
.
**************************************************************************
.
Completion time: 2010-01-12 09:00:46 - machine was rebooted
ComboFix-quarantined-files.txt 2010-01-12 14:00
ComboFix2.txt 2010-01-04 13:45

Pre-Run: 149,022,060,544 bytes free
Post-Run: 148,987,805,696 bytes free

- - End Of File - - 46FF6A3AC4A853D2ED411EB193627AED


I'll test to see if the redirect is still happening later today.

#9 Elise

Elise

    Bleepin' Blonde


  • Malware Study Hall Admin
  • 60,816 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:Romania
  • Local time:07:24 PM

Posted 12 January 2010 - 09:32 AM

Okay, let me know if you still get redirected.

Also, please navigate to the following file and doubleclick on it to run it: c:\windows\mbr.exe

A log file will be created, c:\windows\mbr.log, please post its contents in your next reply.

regards, Elise


"Now faith is the substance of things hoped for, the evidence of things not seen."

 

Follow BleepingComputer on: Facebook | Twitter | Google+ | lockerdome

 

Malware analyst @ Emsisoft


#10 Roode

Roode
  • Topic Starter

  • Members
  • 21 posts
  • OFFLINE
  •  
  • Local time:11:24 AM

Posted 12 January 2010 - 09:35 AM

Still being redirected, same sites, as well as a www.directdr.com tab being opened occasionally.

Stealth MBR rootkit/Mebroot/Sinowal detector 0.3.7 by Gmer, http://www.gmer.net

device: opened successfully
user: MBR read successfully
kernel: MBR read successfully
user & kernel MBR OK

#11 Elise

Elise

    Bleepin' Blonde


  • Malware Study Hall Admin
  • 60,816 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:Romania
  • Local time:07:24 PM

Posted 12 January 2010 - 09:53 AM

Hello Roode,

Unfortunately we are dealing with an infected file that is not yet recognized by Combofix, so lets try if we can find a replacement for it.

Please download SystemLook from one of the links below and save it to your Desktop.
Download Mirror #1
Download Mirror #2
  • Double-click SystemLook.exe to run it.
  • Copy the content of the following codebox into the main textfield:
    :filefind
    nvgts.sys
  • Click the Look button to start the scan.
  • When finished, a notepad window will open with the results of the scan. Please post this log in your next reply.
Note: The log can also be found on your Desktop entitled SystemLook.txt

In your next reply, please include the following:
  • SystemLook.txt

regards, Elise


"Now faith is the substance of things hoped for, the evidence of things not seen."

 

Follow BleepingComputer on: Facebook | Twitter | Google+ | lockerdome

 

Malware analyst @ Emsisoft


#12 Roode

Roode
  • Topic Starter

  • Members
  • 21 posts
  • OFFLINE
  •  
  • Local time:11:24 AM

Posted 12 January 2010 - 11:11 AM

SystemLook v1.0 by jpshortstuff (10.01.10)
Log created at 11:10 on 12/01/2010 by Sign Printer (Administrator - Elevation successful)

========== filefind ==========

Searching for "nvgts.sys"
C:\FoxConn\Driver\NVIDIA\MCP61\Chipset\WinXP\32bit\IDE\WinXP\sataraid\Floppy\Disk1\nvgts.sys -ra--- 132096 bytes [15:59 19/02/2009] [12:01 25/01/2008] A117466B0ACB13288DEEE4F2E936E67F
C:\FoxConn\Driver\NVIDIA\MCP61\Chipset\WinXP\32bit\IDE\WinXP\sataraid\nvgts.sys -ra--- 132096 bytes [15:59 19/02/2009] [12:01 25/01/2008] A117466B0ACB13288DEEE4F2E936E67F
C:\FoxConn\Driver\NVIDIA\MCP61\Chipset\WinXP\32bit\IDE\WinXP\sata_ide\Floppy\Disk1\nvgts.sys -ra--- 132096 bytes [15:59 19/02/2009] [12:01 25/01/2008] A117466B0ACB13288DEEE4F2E936E67F
C:\FoxConn\Driver\NVIDIA\MCP61\Chipset\WinXP\32bit\IDE\WinXP\sata_ide\nvgts.sys -ra--- 132096 bytes [15:59 19/02/2009] [12:01 25/01/2008] A117466B0ACB13288DEEE4F2E936E67F
C:\WINDOWS\system32\drivers\nvgts.sys -ra--- 132096 bytes [16:10 19/02/2009] [12:01 25/01/2008] 3141744DF5BC87362986494D5FF77191

-=End Of File=-

#13 Elise

Elise

    Bleepin' Blonde


  • Malware Study Hall Admin
  • 60,816 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:Romania
  • Local time:07:24 PM

Posted 12 January 2010 - 11:50 AM

Hello Roode,

We got lucky there :(

CF-SCRIPT
-------------
We need to execute a CF-script.
  • Close any open browsers.
  • Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.
  • Click Start > Run and in the box that opens type notepad and press enter. Copy/paste the text in the codebox below into it (make sure to copy everything, the codebox scrolls to the right):
FCopy::C:\FoxConn\Driver\NVIDIA\MCP61\Chipset\WinXP\32bit\IDE\WinXP\sataraid\nvgts.sys | C:\WINDOWS\system32\drivers\nvgts.sys
Save this as CFScript.txt, in the same location as ComboFix.exe

Posted Image

Refering to the picture above, drag CFScript into ComboFix.exe

When finished, it shall produce a log for you at C:\ComboFix.txt which I will require in your next reply.

In your next reply, please include the following:
  • Combofix.txt

Edited by elise025, 12 January 2010 - 11:51 AM.

regards, Elise


"Now faith is the substance of things hoped for, the evidence of things not seen."

 

Follow BleepingComputer on: Facebook | Twitter | Google+ | lockerdome

 

Malware analyst @ Emsisoft


#14 Roode

Roode
  • Topic Starter

  • Members
  • 21 posts
  • OFFLINE
  •  
  • Local time:11:24 AM

Posted 12 January 2010 - 03:06 PM

ComboFix 10-01-11.04 - Sign Printer 01/12/2010 13:10:21.3.2 - x86
Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.894.608 [GMT -5:00]
Running from: c:\documents and settings\Sign Printer\Desktop\ComboFix.exe
Command switches used :: c:\documents and settings\Sign Printer\Desktop\CFScript.txt
AV: ZoneAlarm Antivirus *On-access scanning disabled* (Updated) {5D467B10-818C-4CAB-9FF7-6893B5B8F3CF}
FW: ZoneAlarm Firewall *disabled* {829BDA32-94B3-44F4-8446-F8FCFF809F8B}
.

((((((((((((((((((((((((( Files Created from 2009-12-12 to 2010-01-12 )))))))))))))))))))))))))))))))
.

2010-01-12 14:36 . 2010-01-12 14:36 -------- d-----w- c:\documents and settings\Sign Printer\Application Data\Windows Search
2010-01-12 14:27 . 2010-01-12 14:27 -------- d-----w- c:\documents and settings\All Users\Application Data\IObit
2010-01-12 14:27 . 2010-01-12 14:27 -------- d-----w- c:\program files\IObit
2010-01-12 14:15 . 2010-01-12 14:15 102800 ----a-w- c:\windows\system32\drivers\tmcomm.sys
2010-01-11 15:41 . 2010-01-11 15:42 -------- d-----w- c:\documents and settings\All Users\Application Data\WinZip

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2010-01-11 16:12 . 2009-11-04 12:30 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
2010-01-11 16:12 . 2009-12-07 18:28 5115824 ----a-w- c:\documents and settings\All Users\Application Data\Malwarebytes\Malwarebytes' Anti-Malware\mbam-setup.exe
2010-01-07 21:07 . 2009-11-04 12:30 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2010-01-07 21:07 . 2009-11-04 12:30 19160 ----a-w- c:\windows\system32\drivers\mbam.sys
2009-12-09 08:01 . 2009-02-19 13:44 -------- d-----w- c:\documents and settings\All Users\Application Data\Microsoft Help
2009-12-04 14:07 . 2009-12-04 12:41 -------- d-----w- c:\program files\Spybot - Search & Destroy
2009-12-04 13:15 . 2009-12-04 12:54 -------- d-----w- c:\documents and settings\Sign Printer\Application Data\SUPERAntiSpyware.com
2009-12-04 13:15 . 2009-12-04 12:54 -------- d-----w- c:\program files\SUPERAntiSpyware
2009-12-04 13:13 . 2009-12-04 12:41 -------- d-----w- c:\documents and settings\All Users\Application Data\Spybot - Search & Destroy
2009-12-04 12:54 . 2009-12-04 12:54 -------- d-----w- c:\documents and settings\All Users\Application Data\SUPERAntiSpyware.com
2009-12-04 12:37 . 2009-11-23 13:04 -------- d-----w- c:\documents and settings\All Users\Application Data\Apple Computer
2009-11-25 14:39 . 2009-03-04 14:33 -------- d-----w- c:\documents and settings\All Users\Application Data\Viewpoint
2009-11-25 13:18 . 2009-11-25 13:18 -------- d-----w- c:\documents and settings\Sign Printer\Application Data\AdobeUM
2009-11-24 13:36 . 2009-11-24 13:36 -------- d-----w- c:\program files\CCleaner
2009-11-23 13:05 . 2009-11-23 13:04 -------- d-----w- c:\program files\QuickTime
2009-11-19 19:18 . 2009-11-19 19:18 -------- d-----w- c:\program files\Alwil Software
2009-10-29 07:45 . 2002-08-29 12:00 916480 ------w- c:\windows\system32\wininet.dll
2009-10-26 16:08 . 2009-10-26 15:31 4212 ---ha-w- c:\windows\system32\zllictbl.dat
2009-10-21 05:38 . 2009-02-19 13:26 25088 ----a-w- c:\windows\system32\httpapi.dll
2009-10-21 05:38 . 2009-02-19 13:26 75776 ----a-w- c:\windows\system32\strmfilt.dll
2009-10-20 16:20 . 2009-02-19 13:26 265728 ------w- c:\windows\system32\drivers\http.sys
2009-04-24 12:42 . 2009-04-24 12:42 133492859 ----a-w- c:\program files\openofficeorg1.cab
2009-04-24 12:42 . 2009-04-24 12:42 9815040 ----a-w- c:\program files\openofficeorg31.msi
2009-04-23 22:36 . 2009-04-23 22:36 336 ----a-w- c:\program files\setup.ini
2002-03-11 09:06 . 2002-03-11 09:06 1822520 ----a-w- c:\program files\instmsiw.exe
2002-03-11 08:45 . 2002-03-11 08:45 1708856 ----a-w- c:\program files\instmsia.exe
.

((((((((((((((((((((((((((((( SnapShot@2010-01-04_13.41.10 )))))))))))))))))))))))))))))))))))))))))
.
+ 2009-06-15 16:38 . 2010-01-07 14:36 84661 c:\windows\system32\Macromed\Flash\uninstall_plugin.exe
+ 2010-01-07 14:40 . 2010-01-07 14:40 84507 c:\windows\system32\Macromed\Flash\uninstall_activeX.exe
+ 2010-01-11 20:43 . 2010-01-11 20:29 32768 c:\windows\system32\config\systemprofile\Local Settings\History\History.IE5\MSHist012010011120100112\index.dat
+ 2010-01-11 20:43 . 2010-01-11 20:29 49152 c:\windows\system32\config\systemprofile\Local Settings\History\History.IE5\MSHist012010010420100111\index.dat
- 2009-02-18 21:27 . 2010-01-04 13:27 32768 c:\windows\system32\config\systemprofile\Local Settings\History\History.IE5\index.dat
+ 2009-02-18 21:27 . 2010-01-12 18:18 32768 c:\windows\system32\config\systemprofile\Local Settings\History\History.IE5\index.dat
- 2009-11-07 23:36 . 2010-01-04 13:27 16384 c:\windows\system32\config\systemprofile\IETldCache\index.dat
+ 2009-11-07 23:36 . 2010-01-12 18:28 16384 c:\windows\system32\config\systemprofile\IETldCache\index.dat
- 2009-02-18 21:27 . 2010-01-04 13:27 32768 c:\windows\system32\config\systemprofile\Cookies\index.dat
+ 2010-01-04 13:45 . 2010-01-12 18:18 32768 c:\windows\system32\config\systemprofile\Cookies\index.dat
- 2009-12-10 06:25 . 2010-01-04 11:55 32768 c:\windows\system32\config\systemprofile\Application Data\Microsoft\Internet Explorer\UserData\index.dat
+ 2009-12-10 06:25 . 2010-01-06 07:29 32768 c:\windows\system32\config\systemprofile\Application Data\Microsoft\Internet Explorer\UserData\index.dat
+ 2010-01-11 15:41 . 2010-01-11 15:41 29184 c:\windows\Installer\{CD95F661-A5C4-44F5-A6AA-ECDD91C240BB}\IconCD95F6617.exe
- 2009-07-18 03:21 . 2009-07-18 03:21 257440 c:\windows\system32\Macromed\Flash\NPSWF32_FlashUtil.exe
+ 2009-10-28 03:40 . 2009-10-28 03:40 257440 c:\windows\system32\Macromed\Flash\NPSWF32_FlashUtil.exe
+ 2009-11-03 00:24 . 2009-11-03 00:24 257440 c:\windows\system32\Macromed\Flash\FlashUtil10d.exe
+ 2010-01-11 15:41 . 2010-01-11 15:41 632320 c:\windows\Installer\{CD95F661-A5C4-44F5-A6AA-ECDD91C240BB}\IconCD95F66110.exe
+ 2009-10-28 03:40 . 2009-10-28 03:40 3885984 c:\windows\system32\Macromed\Flash\NPSWF32.dll
+ 2009-02-18 21:27 . 2010-01-12 18:18 2801664 c:\windows\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\index.dat
+ 2010-01-11 15:41 . 2010-01-11 15:41 1544192 c:\windows\Installer\e6d5f.msi
.
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"ccleaner"="c:\program files\CCleaner\ccleaner.exe" [2009-12-21 1803064]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"Seagull Drivers"="ssdal_nc.exe startup" [X]
"HDAudDeck"="c:\program files\VIA\VIAudioi\HDADeck\HDeck.exe" [2008-07-12 29896704]
"NvMediaCenter"="c:\windows\system32\NvMcTray.dll" [2008-09-18 86016]
"NvCplDaemon"="c:\windows\system32\NvCpl.dll" [2008-09-18 13574144]
"IObit Security 360"="c:\program files\IObit\IObit Security 360\IS360tray.exe" [2009-11-14 1278736]

c:\documents and settings\All Users\Start Menu\Programs\Startup\
Gigabyte Wireless Utility.lnk - c:\program files\GIGABYTE\Common\GNConfig.exe [2009-2-18 753664]
WinZip Quick Pick.lnk - c:\program files\WinZip\WZQKPICK.EXE [2009-11-18 495432]

[hkey_local_machine\software\microsoft\windows\currentversion\explorer\ShellExecuteHooks]
"{56F9679E-7826-4C84-81F3-532071A8BCC5}"= "c:\program files\Windows Desktop Search\MSNLNamespaceMgr.dll" [2009-05-25 304128]

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\QuickTime Task]
2009-11-11 04:08 417792 ----a-w- c:\program files\QuickTime\QTTask.exe

[HKEY_LOCAL_MACHINE\software\microsoft\security center]
"AntiVirusOverride"=dword:00000001

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\ZoneLabsFirewall]
"DisableMonitoring"=dword:00000001

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"c:\\Program Files\\Mozilla Firefox\\firefox.exe"=
"c:\\Program Files\\VIA\\VIAudioi\\HDADeck\\HDeck.exe"=
"c:\\WINDOWS\\Network Diagnostic\\xpnetdiag.exe"=
"c:\\WINDOWS\\system32\\sessmgr.exe"=
"c:\\WINDOWS\\system32\\searchindexer.exe"=
"c:\\WINDOWS\\system32\\spoolsv.exe"=
"c:\\WINDOWS\\system32\\wbem\\wmiprvse.exe"=

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\GloballyOpenPorts\List]
"6160:TCP"= 6160:TCP:*:Disabled:Seagull Driver Networking

R2 IS360service;IS360service;c:\program files\IObit\IObit Security 360\is360srv.exe [1/12/2010 9:27 AM 312592]
R3 VIAHdAudAddService;VIA High Definition Audio Driver Service;c:\windows\system32\drivers\viahduaa.sys [2/19/2009 11:55 AM 279680]
S3 FXDrv32;FXDrv32;c:\foxconn\FXDrv32.sys [2/19/2009 11:09 AM 16352]
.
Contents of the 'Scheduled Tasks' folder

2010-01-12 c:\windows\Tasks\User_Feed_Synchronization-{6DA65D1D-E470-47C5-88A7-C36675DD3413}.job
- c:\windows\system32\msfeedssync.exe [2007-08-13 08:31]
.
.
------- Supplementary Scan -------
.
uStart Page = www.google.com
DPF: DirectAnimation Java Classes - file://c:\windows\Java\classes\dajava.cab
DPF: Microsoft XML Parser for Java - file://c:\windows\Java\classes\xmldso.cab
FF - ProfilePath - c:\documents and settings\Sign Printer\Application Data\Mozilla\Firefox\Profiles\wokztk9l.default\
FF - prefs.js: browser.startup.homepage - www.google.com
FF - HiddenExtension: Microsoft .NET Framework Assistant: {20a82645-c095-46ed-80e3-08825760534b} - c:\windows\Microsoft.NET\Framework\v3.5\Windows Presentation Foundation\DotNetAssistantExtension\
.

**************************************************************************

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2010-01-12 14:07
Windows 5.1.2600 Service Pack 3 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

HKLM\Software\Microsoft\Windows\CurrentVersion\Run
HDAudDeck = c:\program files\VIA\VIAudioi\HDADeck\HDeck.exe 1????????????????????????????????????????????????

scanning hidden files ...

scan completed successfully
hidden files: 0

**************************************************************************

Stealth MBR rootkit/Mebroot/Sinowal detector 0.3.7 by Gmer, http://www.gmer.net

device: opened successfully
user: MBR read successfully
called modules: ntkrnlpa.exe CLASSPNP.SYS disk.sys >>UNKNOWN [0x8508750C]<<
kernel: MBR read successfully
detected MBR rootkit hooks:
\Driver\Disk -> CLASSPNP.SYS @ 0xf74cbf28
\Driver\atapi -> atapi.sys @ 0xf731e852
IoDeviceObjectType -> DeleteProcedure -> ntkrnlpa.exe @ 0x805836a8
ParseProcedure -> ntkrnlpa.exe @ 0x805827e8
\Device\Harddisk0\DR0 -> DeleteProcedure -> ntkrnlpa.exe @ 0x805836a8
ParseProcedure -> ntkrnlpa.exe @ 0x805827e8
NDIS: Gigabyte GN-WP01GS PCI WLAN Card(Turbo) -> SendCompleteHandler -> NDIS.sys @ 0xf71f0b0a
PacketIndicateHandler -> NDIS.sys @ 0xf71fba21
SendHandler -> NDIS.sys @ 0xf71f0949
user & kernel MBR OK

**************************************************************************
.
--------------------- LOCKED REGISTRY KEYS ---------------------

[HKEY_USERS\S-1-5-21-796845957-179605362-725345543-1003\Software\Microsoft\SystemCertificates\AddressBook*]
@Allowed: (Read) (RestrictedCode)
@Allowed: (Read) (RestrictedCode)
.
--------------------- DLLs Loaded Under Running Processes ---------------------

- - - - - - - > 'winlogon.exe'(512)
c:\windows\system32\WININET.dll

- - - - - - - > 'lsass.exe'(572)
c:\windows\system32\WININET.dll

- - - - - - - > 'explorer.exe'(2088)
c:\windows\system32\WININET.dll
c:\windows\system32\ieframe.dll
c:\windows\system32\webcheck.dll
c:\windows\system32\WPDShServiceObj.dll
c:\windows\system32\PortableDeviceTypes.dll
c:\windows\system32\PortableDeviceApi.dll
.
------------------------ Other Running Processes ------------------------
.
c:\windows\system32\nvsvc32.exe
c:\windows\system32\SearchIndexer.exe
c:\windows\system32\RUNDLL32.EXE
.
**************************************************************************
.
Completion time: 2010-01-12 14:11:14 - machine was rebooted
ComboFix-quarantined-files.txt 2010-01-12 19:11
ComboFix2.txt 2010-01-12 14:00
ComboFix3.txt 2010-01-04 13:45

Pre-Run: 148,933,341,184 bytes free
Post-Run: 148,893,720,576 bytes free

- - End Of File - - 191997AEC719CD007A56CC9E3AD16743


For whatever reason Windows will not open into safe mode. Just FYI. Combofix also "updated" when I ran the text file through it.

#15 Elise

Elise

    Bleepin' Blonde


  • Malware Study Hall Admin
  • 60,816 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:Romania
  • Local time:07:24 PM

Posted 12 January 2010 - 04:01 PM

That didn't work, so lets try it manually.

Click start > run, type notepad in the runbox and press enter.
Copy/paste the text in the codebox below into Notepad and save it as fixme.con in your c:\windows folder (very important!!). Note, in Notepad this should be two lines, make sure you copy all text, the codebox scrolls to the right!
ren C:\WINDOWS\system32\drivers\nvgts.sys C:\WINDOWS\system32\drivers\nvgts.sys.bakcopy C:\FoxConn\Driver\NVIDIA\MCP61\Chipset\WinXP\32bit\IDE\WinXP\sataraid\nvgts.sys C:\WINDOWS\system32\drivers\nvgts.sys
Exit Notepad.
  • Restart your computer
  • Before Windows loads, you will be prompted to choose which Operating System to start
  • Use the up and down arrow key to select Microsoft Windows Recovery Console
  • You must enter which Windows installation to log onto. Type 1 and press enter.
  • At the C:\Windows prompt, type the following bolded lines, and press Enter after each line:

    Set AllowAllPaths = true (Note - if you get an error message after entering this, ignore it and continue.)

    batch fixme.con

  • At the next prompt type the following bolded text, and press Enter:

    exit
Windows will now begin loading.

Please verify if you still are having redirects afterwards.

Edited by elise025, 13 January 2010 - 01:52 AM.

regards, Elise


"Now faith is the substance of things hoped for, the evidence of things not seen."

 

Follow BleepingComputer on: Facebook | Twitter | Google+ | lockerdome

 

Malware analyst @ Emsisoft





0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users