Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Infected with rootkit infection (?)


  • This topic is locked This topic is locked
16 replies to this topic

#1 Persida

Persida

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:07:24 AM

Posted 13 January 2010 - 04:26 PM

Hello,

I have some sort of worm in my system, I'm not sure if it's really a rootkit infection, I saw something similar in somebody else's post. Fairly frequently my monitor bleeps as if some blank window would pop up and instantly vanish, the majority of anivirus web pages don't load in my Firefox browser and a small Internet explorer window appears asking me to save some content from www.channelnetwork.cn (I have always pressed Cancel but the window reappears). Also I think it has somehow disabled my Antivirus and Firewall updates, when I try to manually update I run into the same problem as with the anivirus web pages (I'm currently using COMODO Internet Security). It's quite possible to have had this worm for some good months because that Internet Explorer window used to apear in the past as well but at some point it stopped, and my virus signature database seems to have been last updated on the 20th of November. My antivirus does not find anything wrong with the system of course.

DDS (Ver_09-12-01.01) - NTFSx86
Run by raluca at 22:58:23,29 on 13.01.2010
Internet Explorer: 6.0.2900.2180
Microsoft Windows XP Professional 5.1.2600.2.1252.1.1033.18.1014.437 [GMT 2:00]

AV: COMODO Antivirus *On-access scanning enabled* (Outdated) {043803A5-4F86-4ef7-AFC5-F6E02A79969B}
AV: Active Security *On-access scanning enabled* (Outdated) {28e00e3b-806e-4533-925c-f4c3d79514b9}
FW: COMODO Firewall *enabled* {043803A3-4F86-4ef6-AFC5-F6E02A79969B}

============== Running Processes ===============

C:\WINDOWS\system32\svchost -k DcomLaunch
svchost.exe
C:\WINDOWS\System32\svchost.exe -k netsvcs
svchost.exe
svchost.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\COMODO\COMODO Internet Security\cmdagent.exe
C:\Program Files\COMODO\SafeSurf\cssurf.exe
C:\Program Files\COMODO\COMODO Internet Security\cfp.exe
C:\Program Files\uTorrent\uTorrent.exe
C:\Program Files\Rainlendar2\Rainlendar2.exe
C:\Program Files\Yahoo!\Messenger\ymsgr_tray.exe
C:\Program Files\Mozilla Firefox\firefox.exe
C:\Program Files\Internet Explorer\Iexplore.exe
C:\Documents and Settings\raluca\Desktop\dds.scr

============== Pseudo HJT Report ===============

mWinlogon: Taskman=c:\recycler\s-1-5-21-3846606443-5544215551-259476925-6873\nissan.exe
BHO: Adobe PDF Link Helper: {18df081c-e8ad-4283-a596-fa578c2ebdc3} - c:\program files\common files\adobe\acrobat\activex\AcroIEHelperShim.dll
uRun: [uTorrent] "c:\program files\utorrent\uTorrent.exe"
uRun: [Messenger (Yahoo!)] "c:\program files\yahoo!\messenger\YahooMessenger.exe" -quiet
uRun: [Rainlendar2] c:\program files\rainlendar2\Rainlendar2.exe
mRun: [COMODO SafeSurf] "c:\program files\comodo\safesurf\cssurf.exe" -s
mRun: [COMODO Internet Security] "c:\program files\comodo\comodo internet security\cfp.exe" -h
mRun: [AIMP2] c:\program files\aimp2\AIMP2.exe
IE: E&xport to Microsoft Excel - c:\progra~1\micros~2\office12\EXCEL.EXE/3000
IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe
IE: {92780B25-18CC-41C8-B9BE-3C9C571A8263} - {FF059E31-CC5A-4E2E-BF3B-96E929D65503} - c:\progra~1\micros~2\office12\REFIEBAR.DLL
Notify: igfxcui - igfxdev.dll
AppInit_DLLs: c:\windows\system32\guard32.dll c:\windows\system32\cssdll32.dll

================= FIREFOX ===================

FF - ProfilePath - c:\docume~1\raluca\applic~1\mozilla\firefox\profiles\ad7luqnz.default\
FF - prefs.js: browser.startup.homepage - www.google.com
FF - prefs.js: keyword.URL - hxxp://search.yahoo.com/search?fr=greentree_ff1&ei=utf-8&type=966134&p=
FF - prefs.js: network.proxy.type - 2
FF - plugin: c:\documents and settings\raluca\local settings\application data\yahoo!\browserplus\2.4.21\plugins\npybrowserplus_2.4.21.dll
FF - plugin: c:\program files\divx\divx plus web player\npdivx32.dll

============= SERVICES / DRIVERS ===============

R? lxuqevc;Support Universal
R? msmpd;msmpd
S? cmdAgent;COMODO Internet Security Helper Service
S? cmdGuard;COMODO Internet Security Sandbox Driver
S? cmdHlp;COMODO Internet Security Helper Driver
S? VBoxDrv;VirtualBox Service
S? VBoxNetAdp;VirtualBox Host-Only Ethernet Adapter
S? VBoxNetFlt;VBoxNetFlt Service
S? VBoxUSBMon;VirtualBox USB Monitor Driver

=============== Created Last 30 ================

2010-01-11 11:31:56 0 dc----w- c:\windows\Transcend JetFlash Recovery Tool
2010-01-11 11:31:56 0 dc----w- c:\program files\Transcend JetFlash Recovery Tool
2010-01-09 07:18:19 0 dc----w- c:\program files\common files\DivX Shared
2010-01-09 07:18:17 0 dc----w- c:\program files\DivX
2010-01-06 08:50:32 0 dc----w- c:\documents and settings\raluca\.rainlendar2
2010-01-06 08:50:23 0 dc----w- c:\program files\Rainlendar2
2009-12-25 10:17:48 1010176 -c--a-w- c:\windows\system32\wscsvc32.exe

==================== Find3M ====================

2004-08-04 12:00:00 166048 --sha-r- c:\windows\system32\ogfaobxk.dll

============= FINISH: 22:59:15,62 ===============

Attached Files



BC AdBot (Login to Remove)

 


#2 Buckeye_Sam

Buckeye_Sam

    Malware Expert


  • Members
  • 17,382 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Pickerington, Ohio
  • Local time:12:24 AM

Posted 13 January 2010 - 07:49 PM

Hello! smile.gif
My name is Sam and I will be helping you.

In order to see what's going on with your computer I will ask for you to post various logs from the tools that we will use to resolve your issue. Please also share with me any information about how your computer is reacting and behaving each step of the way as we work through this process.


Please download Malwarebytes Anti-Malware and save it to your desktop.
alternate download link 1
alternate download link 2
  • Make sure you are connected to the Internet.
  • Double-click on Download_mbam-setup.exe to install the application.
  • When the installation begins, follow the prompts and do not make any changes to default settings.
  • When installation has finished, make sure you leave both of these checked:
    • Update Malwarebytes' Anti-Malware
    • Launch Malwarebytes' Anti-Malware
  • Then click Finish.
  • MBAM will automatically start and you will be asked to update the program before performing a scan. If an update is found, the program will automatically update itself. Press the OK button to close that box and continue. If you encounter any problems while downloading the updates, manually download them from here and just double-click on mbam-rules.exe to install.
  • On the Scanner tab:
    • Make sure the "Perform Quick Scan" option is selected.
    • Then click on the Scan button.
  • If asked to select the drives to scan, leave all the drives selected and click on the Start Scan button.
  • The scan will begin and "Scan in progress" will show at the top. It may take some time to complete so please be patient.
  • When the scan is finished, a message box will say "The scan completed successfully. Click 'Show Results' to display all objects found".
  • Click OK to close the message box and continue with the removal process.
  • Back at the main Scanner screen, click on the Show Results button to see a list of any malware that was found.
  • Make sure that everything is checked, and click Remove Selected.
  • When removal is completed, a log report will open in Notepad and you may be prompted to restart your computer. (see Note below)
  • The log is automatically saved and can be viewed by clicking the Logs tab in MBAM.
  • Copy and paste the contents of that report in your next reply and exit MBAM.
Note: If MBAM encounters a file that is difficult to remove, you will be presented with 1 of 2 prompts. Click OK to either and let MBAM proceed with the disinfection process. If asked to restart the computer, please do so immediately. Failure to reboot will prevent MBAM from removing all the malware.




We need to create an OTL Report
  • Please download OTL from here
  • Save it to your desktop.
  • Double click on the icon on your desktop.
  • Click the "Scan All Users" checkbox.
  • Under the Custom Scan box paste this in

    netsvcs
    %SYSTEMDRIVE%\*.exe
    /md5start
    eventlog.dll
    scecli.dll
    netlogon.dll
    cngaudit.dll
    sceclt.dll
    ntelogon.dll
    logevent.dll
    iaStor.sys
    nvstor.sys
    atapi.sys
    IdeChnDr.sys
    viasraid.sys
    AGP440.sys
    vaxscsi.sys
    nvatabus.sys
    viamraid.sys
    nvata.sys
    nvgts.sys
    iastorv.sys
    ViPrt.sys
    eNetHook.dll
    ahcix86.sys
    KR10N.sys
    /md5stop
    %systemroot%\*. /mp /s
    %systemroot%\system32\*.dll /lockedfiles
    CREATERESTOREPOINT



  • Click the "Quick Scan" button.
  • The scan should take just a few minutes.
  • Please copy and paste both logs back here in your next reply.

Posted Image If I have helped you in any way, please consider a donation to help me continue the fight against malware.


Failing to respond back to the person that is giving up their own time to help you not only is insensitive and disrespectful, but it guarantees that you will never receive help from me again. Please thank your helpers and there will always be help here when you need it!


========================================================

#3 Persida

Persida
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:07:24 AM

Posted 14 January 2010 - 02:02 AM

Hello, Sam! Thank you very much for helping me solve this issue. Unfortunately I cannot download the program you recommended, none of the links worked ( the second one took me to the site but there none of the three links worked, it just showed a page saying page not found). I should maybe mention that my internet connection is through an automatic proxy configuration URL.

#4 Buckeye_Sam

Buckeye_Sam

    Malware Expert


  • Members
  • 17,382 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Pickerington, Ohio
  • Local time:12:24 AM

Posted 14 January 2010 - 08:51 AM

Sounds like you're being blocked by the malware. How about the other tool, OTL? Are you able to download it and run it?
Posted Image If I have helped you in any way, please consider a donation to help me continue the fight against malware.


Failing to respond back to the person that is giving up their own time to help you not only is insensitive and disrespectful, but it guarantees that you will never receive help from me again. Please thank your helpers and there will always be help here when you need it!


========================================================

#5 Persida

Persida
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:07:24 AM

Posted 14 January 2010 - 10:02 AM

Forgot all about the OTL. I did manage to download it and it started scanning but it froze at: "Checking service: lxuqevc". I tried it 4 times with the exact same result.
If it's of any relevance, after my first attempt of scanning and after refreshing my desktop once the -hide hidden files- option sort of disabled itself and all my hidden elements became visible.

Edited by Persida, 14 January 2010 - 10:09 AM.


#6 Buckeye_Sam

Buckeye_Sam

    Malware Expert


  • Members
  • 17,382 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Pickerington, Ohio
  • Local time:12:24 AM

Posted 15 January 2010 - 07:35 AM

Please download ComboFix from one of these locations:

Link 1
Link 2
Link 3

Important!
You should NOT use Combofix unless you have been instructed to do so by a Malware Removal Expert.
It is intended by its creator to be used under the guidance and supervision of an Malware Removal Expert, not for private use.
Using this tool incorrectly could lead to disastrous problems with your operating system such as preventing it from ever starting again.



Make sure that you save ComboFix.exe to your Desktop
  • Disable your AntiVirus and AntiSpyware applications, usually via a right click on the System Tray icon. They may otherwise interfere with our tools

  • Double click on ComboFix.exe & follow the prompts.

  • As part of it's process, ComboFix will check to see if the Microsoft Windows Recovery Console is installed. With malware infections being as they are today, it's strongly recommended to have this pre-installed on your machine before doing any malware removal. It will allow you to boot up into a special recovery/repair mode that will allow us to more easily help you should your computer have a problem after an attempted removal of malware.

  • Follow the prompts to allow ComboFix to download and install the Microsoft Windows Recovery Console, and when prompted, agree to the End-User License Agreement to install the Microsoft Windows Recovery Console.
**Please note: If the Microsoft Windows Recovery Console is already installed, ComboFix will continue it's malware removal procedures.





Once the Microsoft Windows Recovery Console is installed using ComboFix, you should see the following message:




Click on Yes, to continue scanning for malware.

When finished, it shall produce a log for you. Please copy and paste the contents of C:\ComboFix.txt in your next reply.


Posted Image If I have helped you in any way, please consider a donation to help me continue the fight against malware.


Failing to respond back to the person that is giving up their own time to help you not only is insensitive and disrespectful, but it guarantees that you will never receive help from me again. Please thank your helpers and there will always be help here when you need it!


========================================================

#7 Persida

Persida
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:07:24 AM

Posted 15 January 2010 - 09:47 AM

Hello again,

Combofix doesn't seem to work either. I had no problem downloading it but after I double clicked it the small window asking me weather I want to run it appeared, I pressed Run and then some sort of warning appeared telling me that combo fix is not affiliated with www.combofix.com and that I shouldn't run it without previous instructions (this just what I remember from it, it's not really precise). It also said that I should press No if I didn't agree with its policies so I chose Yes and then nothing else happened. After waiting a fair amount of time I tried again but absolutely nothing happened. I downloaded it again from the first link ( the other two don't work) and tried but still nothing ( just a small bar which shows it would be loading appears but then nothing else). I should mention that I had not forgotten to disable my antivirus/firewall software. Should I try to uninstall Comodo and then try again with ComboFix?


#8 Buckeye_Sam

Buckeye_Sam

    Malware Expert


  • Members
  • 17,382 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Pickerington, Ohio
  • Local time:12:24 AM

Posted 15 January 2010 - 10:10 AM

Let's try it again, with one variation.

Download Combofix from any of the links below. You must rename it before saving it. Save it to your desktop.

Link 1
Link 2
Link 3





--------------------------------------------------------------------

Double click on Combo-Fix.exe & follow the prompts.
    When finished, it will produce a report for you.
  • Please post the C:\ComboFix.txt so we can continue cleaning the system.

Posted Image If I have helped you in any way, please consider a donation to help me continue the fight against malware.


Failing to respond back to the person that is giving up their own time to help you not only is insensitive and disrespectful, but it guarantees that you will never receive help from me again. Please thank your helpers and there will always be help here when you need it!


========================================================

#9 Persida

Persida
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:07:24 AM

Posted 15 January 2010 - 01:06 PM

Hi
Combofix worked this time. Before I post the log for you I should mention that I noticed the log says COMODO was still running while Combofix did; I don't know why this happened I disabled everything I could find from the program and then right-clicked it and chose exit. Also on Combofix's last reboot my AIMP player started playing although the .exe window said 'please do not run any programs until Combofix finishes'. I quickly closed AIMP but if you think any damage might have been caused because of these two slips please tell me weather I should redo the whole operation again or whatever else you think. Everything looks fine from my point, though (although an Internet Explorer icon appeared on my desktop and when I opened Firefox it said that it was not my default browser and if I wanted to make it the default - I clicked yes). I'll also post the information Combofix generated at some point in a small dialog box besides its log, so here you go:

C:\WINDOWS\system32\drivers\UACyabdwfjxdg.sys
C:\WINDOWS\system32\UACvsbmlhpwip.dll
C:\WINDOWS\system32\UACmpelbqvbqy.dll
C:\WINDOWS\system32\UACexelrbdwes.dat
C:\WINDOWS\system32\UACdqilvhpymr.log
C:\WINDOWS\system32\UACtimuerrfvk.db
C:\WINDOWS\system32\UACypeordktuf.dll
C:\WINDOWS\system32\UACtnpybksmqx.dll
C:\WINDOWS\system32\UACyquqrojjog.dll

Combofix Log

ComboFix 10-01-14.07 - raluca 15.01.2010 19:41:07.1.1 - x86
Microsoft Windows XP Professional 5.1.2600.2.1252.1.1033.18.1014.723 [GMT 2:00]
Running from: c:\documents and settings\raluca\Desktop\Combo-Fix.exe
AV: COMODO Antivirus *On-access scanning enabled* (Outdated) {043803A5-4F86-4ef7-AFC5-F6E02A79969B}
FW: COMODO Firewall *disabled* {043803A3-4F86-4ef6-AFC5-F6E02A79969B}
.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.

c:\recycler\S-1-5-21-3846606443-5544215551-259476925-6873
c:\windows\system32\drivers\UACyabdwfjxdg.sys
c:\windows\system32\ogfaobxk.dll
c:\windows\system32\UACdqilvhpymr.log
c:\windows\system32\UACexelrbdwes.dat
c:\windows\system32\uacinit.dll
c:\windows\system32\UACmpelbqvbqy.dll
c:\windows\system32\UACtimuerrfvk.db
c:\windows\system32\uactmp.db
c:\windows\system32\UACtnpybksmqx.dll
c:\windows\system32\UACvsbmlhpwip.dll
c:\windows\system32\UACypeordktuf.dll
c:\windows\system32\UACyquqrojjog.dll
c:\windows\system32\wscsvc32.exe
D:\resycled

.
((((((((((((((((((((((((((((((((((((((( Drivers/Services )))))))))))))))))))))))))))))))))))))))))))))))))
.

-------\Service_UACd.sys
-------\Legacy_UACd.sys
-------\Legacy_LXUQEVC
-------\Service_lxuqevc


((((((((((((((((((((((((( Files Created from 2009-12-15 to 2010-01-15 )))))))))))))))))))))))))))))))
.

2010-01-14 04:54 . 2010-01-14 04:55 -------- dc----w- c:\program files\Cobian Backup 9
2010-01-11 11:31 . 2010-01-11 11:31 -------- dc----w- c:\windows\Transcend JetFlash Recovery Tool
2010-01-11 11:31 . 2010-01-11 11:31 -------- dc----w- c:\program files\Transcend JetFlash Recovery Tool
2010-01-09 20:14 . 2010-01-11 20:38 -------- dc----w- c:\documents and settings\raluca\Application Data\vlc
2010-01-09 07:18 . 2010-01-09 07:18 -------- dc----w- c:\program files\Common Files\DivX Shared
2010-01-09 07:18 . 2010-01-09 07:37 -------- dc----w- c:\program files\DivX
2010-01-06 08:50 . 2010-01-15 17:46 -------- dc----w- c:\documents and settings\raluca\.rainlendar2
2010-01-06 08:50 . 2010-01-06 09:04 -------- dc----w- c:\program files\Rainlendar2

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2010-01-15 17:47 . 2009-09-24 09:02 -------- dc----w- c:\documents and settings\raluca\Application Data\uTorrent
2010-01-15 17:39 . 2009-09-24 08:44 -------- dc----w- c:\documents and settings\All Users\Application Data\_comodo_
2009-12-22 17:49 . 2009-10-02 14:11 -------- dc----w- c:\documents and settings\raluca\Application Data\Y!StatusRevolution
2009-12-14 19:09 . 2009-09-24 08:09 -------- dc----w- c:\documents and settings\All Users\Application Data\Microsoft Help
2009-12-06 15:51 . 2009-12-06 15:51 -------- dc----w- c:\program files\YouTube Downloader
2009-12-06 15:45 . 2009-12-06 15:38 -------- dc----w- c:\documents and settings\raluca\Application Data\GetRightToGo
2009-11-28 18:34 . 2009-11-28 18:34 -------- dc----w- c:\documents and settings\raluca\Application Data\Uniblue
2009-11-26 19:26 . 2009-10-07 20:20 -------- dc----w- c:\documents and settings\raluca\Application Data\U3
.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"uTorrent"="c:\program files\uTorrent\uTorrent.exe" [2009-10-17 289072]
"Messenger (Yahoo!)"="c:\program files\Yahoo!\Messenger\YahooMessenger.exe" [2009-05-26 4351216]
"Rainlendar2"="c:\program files\Rainlendar2\Rainlendar2.exe" [2009-08-22 5148672]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"COMODO SafeSurf"="c:\program files\COMODO\SafeSurf\cssurf.exe" [2009-09-24 278264]
"COMODO Internet Security"="c:\program files\COMODO\COMODO Internet Security\cfp.exe" [2009-09-24 1797880]
"AIMP2"="c:\program files\AIMP2\AIMP2.exe" [2008-12-30 358400]

[HKLM\~\startupfolder\C:^Documents and Settings^raluca^Start Menu^Programs^Startup^Adobe Gamma.lnk]
path=c:\documents and settings\raluca\Start Menu\Programs\Startup\Adobe Gamma.lnk
backup=c:\windows\pss\Adobe Gamma.lnkStartup

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Adobe Reader Speed Launcher]
2009-02-27 14:10 35696 -c----w- c:\program files\Adobe\Reader 9.0\Reader\reader_sl.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Alcmtr]
2005-05-04 07:43 69632 -c----w- c:\windows\Alcmtr.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\AzMixerSel]
2005-06-12 08:51 53248 -c----w- c:\program files\Realtek\InstallShield\AzMixerSel.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\ctfmon.exe]
2004-08-04 12:00 15360 -c----w- c:\windows\system32\ctfmon.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Messenger (Yahoo!)]
2009-05-26 19:06 4351216 -c----w- c:\program files\Yahoo!\Messenger\YahooMessenger.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\MSMSGS]
2004-08-03 22:06 1667584 ------w- c:\program files\Messenger\msmsgs.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\NeroFilterCheck]
2001-07-09 08:50 155648 -c----w- c:\windows\system32\NeroCheck.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\RTHDCPL]
2007-05-29 05:32 16132608 -c----w- c:\windows\RTHDCPL.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\services]
"ose"=3 (0x3)
"odserv"=3 (0x3)
"CiSvc"=3 (0x3)

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=
"c:\\Program Files\\Yahoo!\\Messenger\\YahooMessenger.exe"=
"c:\\Program Files\\Sun\\VirtualBox\\VirtualBox.exe"=
"c:\\Program Files\\uTorrent\\uTorrent.exe"=
"c:\\Documents and Settings\\raluca\\My Documents\\Programe\\Strong DC\\StrongDC.exe"=

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\GloballyOpenPorts\List]
"3381:TCP"= 3381:TCP:varsvqa

R1 cmdGuard;COMODO Internet Security Sandbox Driver;c:\windows\system32\drivers\cmdguard.sys [24.09.2009 10:20 101776]
R1 cmdHlp;COMODO Internet Security Helper Driver;c:\windows\system32\drivers\cmdhlp.sys [24.09.2009 10:20 31504]
R1 VBoxDrv;VirtualBox Service;c:\windows\system32\drivers\VBoxDrv.sys [05.10.2009 04:24 115856]
R1 VBoxUSBMon;VirtualBox USB Monitor Driver;c:\windows\system32\drivers\VBoxUSBMon.sys [05.10.2009 04:24 41424]
R3 VBoxNetAdp;VirtualBox Host-Only Ethernet Adapter;c:\windows\system32\drivers\VBoxNetAdp.sys [05.10.2009 04:24 91856]
R3 VBoxNetFlt;VBoxNetFlt Service;c:\windows\system32\drivers\VBoxNetFlt.sys [09.09.2009 07:15 100368]
S3 msmpd;msmpd;\??\c:\windows\system32\08A.tmp --> c:\windows\system32\08A.tmp [?]
.
.
------- Supplementary Scan -------
.
IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~2\Office12\EXCEL.EXE/3000
FF - ProfilePath - c:\documents and settings\raluca\Application Data\Mozilla\Firefox\Profiles\ad7luqnz.default\
FF - prefs.js: browser.startup.homepage - www.google.com
FF - prefs.js: keyword.URL - hxxp://search.yahoo.com/search?fr=greentree_ff1&ei=utf-8&type=966134&p=
FF - prefs.js: network.proxy.type - 2
FF - plugin: c:\documents and settings\raluca\Local Settings\Application Data\Yahoo!\BrowserPlus\2.4.21\Plugins\npybrowserplus_2.4.21.dll
FF - plugin: c:\program files\DivX\DivX Plus Web Player\npdivx32.dll
.
- - - - ORPHANS REMOVED - - - -

MSConfigStartUp-BroadcomWireless - c:\program files\Broadcom\Wireless\Utility\WlanUtil.exe
MSConfigStartUp-HotKeysCmds - c:\windows\system32\hkcmd.exe
MSConfigStartUp-IgfxTray - c:\windows\system32\igfxtray.exe
MSConfigStartUp-Persistence - c:\windows\system32\igfxpers.exe



**************************************************************************

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2010-01-15 19:46
Windows 5.1.2600 Service Pack 2 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully
hidden files: 0

**************************************************************************

[HKEY_LOCAL_MACHINE\System\ControlSet001\Services\msmpd]
"ImagePath"="\??\c:\windows\system32\08A.tmp"
.
------------------------ Other Running Processes ------------------------
.
c:\program files\COMODO\COMODO Internet Security\cmdagent.exe
c:\windows\system32\wscntfy.exe
c:\program files\Yahoo!\Messenger\ymsgr_tray.exe
.
**************************************************************************
.
Completion time: 2010-01-15 19:48:48 - machine was rebooted
ComboFix-quarantined-files.txt 2010-01-15 17:48

Pre-Run: 2.012.893.184 bytes free
Post-Run: 2.007.465.984 bytes free

WindowsXP-KB310994-SP2-Pro-BootDisk-ENU.exe
[boot loader]
timeout=2
default=multi(0)disk(0)rdisk(0)partition(1)\WINDOWS
[operating systems]
c:\cmdcons\BOOTSECT.DAT="Microsoft Windows Recovery Console" /cmdcons
multi(0)disk(0)rdisk(0)partition(1)\WINDOWS="Microsoft Windows XP Professional" /noexecute=optin /fastdetect

- - End Of File - - CCA08590006470D484A6C80A0EF5A076

Attached Files


Edited by Persida, 15 January 2010 - 01:24 PM.


#10 Buckeye_Sam

Buckeye_Sam

    Malware Expert


  • Members
  • 17,382 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Pickerington, Ohio
  • Local time:12:24 AM

Posted 16 January 2010 - 09:17 AM

It should be fine. Sometimes Combofix will detect your antivirus as running when it's not. You just have to certain that it is disabled.

Copy and paste ALL the following text in the Quote box below into Notepad.
Click on File(in the menu at the top)>Save as../Save as Type: 'All Files' /File name: CFScript to your desktop.

CODE
Driver::
msmpd

File::
c:\windows\system32\08A.tmp

Prior to running Combofix.exe you should disable your antivirus program.

Now drag then drop the CFScript file onto ComboFix.exe as seen in the image below.



This will start ComboFix again.
After reboot, (in case it asks to reboot), post the contents of Combofix.txt in your next reply.

Posted Image If I have helped you in any way, please consider a donation to help me continue the fight against malware.


Failing to respond back to the person that is giving up their own time to help you not only is insensitive and disrespectful, but it guarantees that you will never receive help from me again. Please thank your helpers and there will always be help here when you need it!


========================================================

#11 Persida

Persida
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:07:24 AM

Posted 16 January 2010 - 11:42 AM

Hi,
These are the contents of the Combofix log:

ComboFix 10-01-14.07 - raluca 16.01.2010 18:31:50.2.1 - x86
Microsoft Windows XP Professional 5.1.2600.2.1252.1.1033.18.1014.740 [GMT 2:00]
Running from: c:\documents and settings\raluca\Desktop\Combo-Fix.exe
Command switches used :: c:\documents and settings\raluca\Desktop\CFScript.txt
AV: COMODO Antivirus *On-access scanning disabled* (Outdated) {043803A5-4F86-4ef7-AFC5-F6E02A79969B}
FW: COMODO Firewall *disabled* {043803A3-4F86-4ef6-AFC5-F6E02A79969B}

FILE ::
"c:\windows\system32\08A.tmp"
.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.

.
((((((((((((((((((((((((((((((((((((((( Drivers/Services )))))))))))))))))))))))))))))))))))))))))))))))))
.

-------\Service_msmpd


((((((((((((((((((((((((( Files Created from 2009-12-16 to 2010-01-16 )))))))))))))))))))))))))))))))
.

2010-01-14 04:54 . 2010-01-14 04:55 -------- dc----w- c:\program files\Cobian Backup 9
2010-01-11 11:31 . 2010-01-11 11:31 -------- dc----w- c:\windows\Transcend JetFlash Recovery Tool
2010-01-11 11:31 . 2010-01-11 11:31 -------- dc----w- c:\program files\Transcend JetFlash Recovery Tool
2010-01-09 20:14 . 2010-01-11 20:38 -------- dc----w- c:\documents and settings\raluca\Application Data\vlc
2010-01-09 07:18 . 2010-01-09 07:18 -------- dc----w- c:\program files\Common Files\DivX Shared
2010-01-09 07:18 . 2010-01-09 07:37 -------- dc----w- c:\program files\DivX
2010-01-06 08:50 . 2010-01-16 16:36 -------- dc----w- c:\documents and settings\raluca\.rainlendar2
2010-01-06 08:50 . 2010-01-06 09:04 -------- dc----w- c:\program files\Rainlendar2

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2010-01-16 16:37 . 2009-09-24 09:02 -------- dc----w- c:\documents and settings\raluca\Application Data\uTorrent
2010-01-16 16:30 . 2009-09-24 08:44 -------- dc----w- c:\documents and settings\All Users\Application Data\_comodo_
2009-12-22 17:49 . 2009-10-02 14:11 -------- dc----w- c:\documents and settings\raluca\Application Data\Y!StatusRevolution
2009-12-14 19:09 . 2009-09-24 08:09 -------- dc----w- c:\documents and settings\All Users\Application Data\Microsoft Help
2009-12-06 15:51 . 2009-12-06 15:51 -------- dc----w- c:\program files\YouTube Downloader
2009-12-06 15:45 . 2009-12-06 15:38 -------- dc----w- c:\documents and settings\raluca\Application Data\GetRightToGo
2009-11-28 18:34 . 2009-11-28 18:34 -------- dc----w- c:\documents and settings\raluca\Application Data\Uniblue
2009-11-26 19:26 . 2009-10-07 20:20 -------- dc----w- c:\documents and settings\raluca\Application Data\U3
.

((((((((((((((((((((((((((((( SnapShot@2010-01-15_17.46.39 )))))))))))))))))))))))))))))))))))))))))
.
- 2004-08-04 12:00 . 2010-01-15 17:44 40190 c:\windows\system32\perfc009.dat
+ 2004-08-04 12:00 . 2010-01-16 16:19 40190 c:\windows\system32\perfc009.dat
+ 2004-08-04 12:00 . 2010-01-16 16:19 311842 c:\windows\system32\perfh009.dat
- 2004-08-04 12:00 . 2010-01-15 17:44 311842 c:\windows\system32\perfh009.dat
.
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"uTorrent"="c:\program files\uTorrent\uTorrent.exe" [2009-10-17 289072]
"Messenger (Yahoo!)"="c:\program files\Yahoo!\Messenger\YahooMessenger.exe" [2009-05-26 4351216]
"Rainlendar2"="c:\program files\Rainlendar2\Rainlendar2.exe" [2009-08-22 5148672]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"COMODO SafeSurf"="c:\program files\COMODO\SafeSurf\cssurf.exe" [2009-09-24 278264]
"AIMP2"="c:\program files\AIMP2\AIMP2.exe" [2008-12-30 358400]

[HKLM\~\startupfolder\C:^Documents and Settings^raluca^Start Menu^Programs^Startup^Adobe Gamma.lnk]
path=c:\documents and settings\raluca\Start Menu\Programs\Startup\Adobe Gamma.lnk
backup=c:\windows\pss\Adobe Gamma.lnkStartup

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Adobe Reader Speed Launcher]
2009-02-27 14:10 35696 -c----w- c:\program files\Adobe\Reader 9.0\Reader\reader_sl.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Alcmtr]
2005-05-04 07:43 69632 -c----w- c:\windows\Alcmtr.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\AzMixerSel]
2005-06-12 08:51 53248 -c----w- c:\program files\Realtek\InstallShield\AzMixerSel.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\ctfmon.exe]
2004-08-04 12:00 15360 -c----w- c:\windows\system32\ctfmon.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Messenger (Yahoo!)]
2009-05-26 19:06 4351216 -c----w- c:\program files\Yahoo!\Messenger\YahooMessenger.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\MSMSGS]
2004-08-03 22:06 1667584 ------w- c:\program files\Messenger\msmsgs.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\NeroFilterCheck]
2001-07-09 08:50 155648 -c----w- c:\windows\system32\NeroCheck.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\RTHDCPL]
2007-05-29 05:32 16132608 -c----w- c:\windows\RTHDCPL.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\services]
"ose"=3 (0x3)
"odserv"=3 (0x3)
"CiSvc"=3 (0x3)

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]
"EnableFirewall"= 0 (0x0)

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=
"c:\\Program Files\\Yahoo!\\Messenger\\YahooMessenger.exe"=
"c:\\Program Files\\Sun\\VirtualBox\\VirtualBox.exe"=
"c:\\Program Files\\uTorrent\\uTorrent.exe"=
"c:\\Documents and Settings\\raluca\\My Documents\\Programe\\Strong DC\\StrongDC.exe"=

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\GloballyOpenPorts\List]
"3381:TCP"= 3381:TCP:varsvqa

R1 cmdGuard;COMODO Internet Security Sandbox Driver;c:\windows\system32\drivers\cmdguard.sys [24.09.2009 10:20 101776]
R1 cmdHlp;COMODO Internet Security Helper Driver;c:\windows\system32\drivers\cmdhlp.sys [24.09.2009 10:20 31504]
R1 VBoxDrv;VirtualBox Service;c:\windows\system32\drivers\VBoxDrv.sys [05.10.2009 04:24 115856]
R1 VBoxUSBMon;VirtualBox USB Monitor Driver;c:\windows\system32\drivers\VBoxUSBMon.sys [05.10.2009 04:24 41424]
R3 VBoxNetAdp;VirtualBox Host-Only Ethernet Adapter;c:\windows\system32\drivers\VBoxNetAdp.sys [05.10.2009 04:24 91856]
R3 VBoxNetFlt;VBoxNetFlt Service;c:\windows\system32\drivers\VBoxNetFlt.sys [09.09.2009 07:15 100368]
.
.
------- Supplementary Scan -------
.
IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~2\Office12\EXCEL.EXE/3000
FF - ProfilePath - c:\documents and settings\raluca\Application Data\Mozilla\Firefox\Profiles\ad7luqnz.default\
FF - prefs.js: browser.startup.homepage - www.google.com
FF - prefs.js: keyword.URL - hxxp://search.yahoo.com/search?fr=greentree_ff1&ei=utf-8&type=966134&p=
FF - prefs.js: network.proxy.type - 2
FF - plugin: c:\documents and settings\raluca\Local Settings\Application Data\Yahoo!\BrowserPlus\2.4.21\Plugins\npybrowserplus_2.4.21.dll
FF - plugin: c:\program files\DivX\DivX Plus Web Player\npdivx32.dll
.

**************************************************************************

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2010-01-16 18:37
Windows 5.1.2600 Service Pack 2 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully
hidden files: 0

**************************************************************************
.
------------------------ Other Running Processes ------------------------
.
c:\program files\COMODO\COMODO Internet Security\cmdagent.exe
c:\windows\system32\wscntfy.exe
c:\program files\Yahoo!\Messenger\ymsgr_tray.exe
.
**************************************************************************
.
Completion time: 2010-01-16 18:38:45 - machine was rebooted
ComboFix-quarantined-files.txt 2010-01-16 16:38
ComboFix2.txt 2010-01-15 17:48

Pre-Run: 1.854.017.536 bytes free
Post-Run: 1.877.479.424 bytes free

- - End Of File - - 2120EF7782893B5A59472B112C1351CE


#12 Buckeye_Sam

Buckeye_Sam

    Malware Expert


  • Members
  • 17,382 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Pickerington, Ohio
  • Local time:12:24 AM

Posted 17 January 2010 - 12:47 PM

Let's go back to Malwarebytes now.

Please download Malwarebytes Anti-Malware and save it to your desktop.
alternate download link 1
alternate download link 2
If you have a previous version of MBAM, remove it via Add/Remove Programs and download a fresh copy.
  • Make sure you are connected to the Internet.
  • Double-click on mbam-setup.exe to install the application.
  • When the installation begins, follow the prompts and do not make any changes to default settings.
  • When installation has finished, make sure you leave both of these checked:
    • Update Malwarebytes' Anti-Malware
    • Launch Malwarebytes' Anti-Malware
  • Then click Finish.
MBAM will automatically start and you will be asked to update the program before performing a scan.
  • If an update is found, the program will automatically update itself.
  • Press the OK button to close that box and continue.
  • If you encounter any problems while downloading the updates, manually download them from here and just double-click on mbam-rules.exe to install. Alternatively, you can update through MBAM's interface from a clean computer, copy the definitions (rules.ref) located in C:\Documents and Settings\All Users\Application Data\Malwarebytes\Malwarebytes' Anti-Malware from that system to a usb stick or CD and then copy it to the infected machine.
On the Scanner tab:
  • Make sure the "Perform Quick Scan" option is selected.
  • Then click on the Scan button.
  • If asked to select the drives to scan, leave all the drives selected and click on the Start Scan button.
  • The scan will begin and "Scan in progress" will show at the top. It may take some time to complete so please be patient.
  • When the scan is finished, a message box will say "The scan completed successfully. Click 'Show Results' to display all objects found".
  • Click OK to close the message box and continue with the removal process.
Back at the main Scanner screen:
  • Click on the Show Results button to see a list of any malware that was found.
  • Make sure that everything is checked, and click Remove Selected.
  • When removal is completed, a log report will open in Notepad.
  • The log is automatically saved and can be viewed by clicking the Logs tab in MBAM.
  • Copy and paste the contents of that report in your next reply and exit MBAM.
Note: If MBAM encounters a file that is difficult to remove, you may be asked to reboot your computer so it can proceed with the disinfection process. Regardless if prompted to restart the computer or not, please do so immediately. Failure to reboot normally (not into safe mode) will prevent MBAM from removing all the malware. MBAM may "make changes to your registry" as part of its disinfection routine. If using other security programs that detect registry changes (ie Spybot's Teatimer), they may interfere or alert you after scanning with MBAM. Please temporarily disable such programs or permit them to allow the changes.

Posted Image If I have helped you in any way, please consider a donation to help me continue the fight against malware.


Failing to respond back to the person that is giving up their own time to help you not only is insensitive and disrespectful, but it guarantees that you will never receive help from me again. Please thank your helpers and there will always be help here when you need it!


========================================================

#13 Persida

Persida
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:07:24 AM

Posted 17 January 2010 - 01:10 PM

Looks like there was nothing threatening found so the Show results button didn't appear at all and the last step you described didn't take place.
Here is the log of the scan:

Malwarebytes' Anti-Malware 1.44
Database version: 3583
Windows 5.1.2600 Service Pack 2
Internet Explorer 6.0.2900.2180

17.01.2010 08:05:07
mbam-log-2010-01-17 (20-05-07).txt

Scan type: Quick Scan
Objects scanned: 100426
Time elapsed: 4 minute(s), 7 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 0

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
(No malicious items detected)


#14 Buckeye_Sam

Buckeye_Sam

    Malware Expert


  • Members
  • 17,382 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Pickerington, Ohio
  • Local time:12:24 AM

Posted 18 January 2010 - 09:40 AM

Looks good!
How is your computer behaving now? Any more problems?
Posted Image If I have helped you in any way, please consider a donation to help me continue the fight against malware.


Failing to respond back to the person that is giving up their own time to help you not only is insensitive and disrespectful, but it guarantees that you will never receive help from me again. Please thank your helpers and there will always be help here when you need it!


========================================================

#15 Persida

Persida
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:07:24 AM

Posted 18 January 2010 - 05:14 PM

Indeed I have noticed that my laptop stopped blinking and those Internet explorer dialogs haven't reappeared. Although if I try to enter any online antivirus scan site "Address not found" shows up. Could this be non related? I thought I was finally rid of the problem.

All the best!


Edited by Persida, 19 January 2010 - 07:04 AM.





0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users