Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Log Data after running ComboFix - Pls Analyze


  • This topic is locked This topic is locked
3 replies to this topic

#1 Darcy B

Darcy B

  • Members
  • 2 posts
  • OFFLINE
  •  
  • Local time:01:14 PM

Posted 05 February 2010 - 12:04 PM

Hello...
I ran the ComboFix and below is the results that were displayed... if someone is available to analyze this data to tell me how to proceed I would be very grateful!!!
Thank you!!
Darcy B

ComboFix 10-02-04.08 - Calvin 02/05/2010 10:21:56.1.2 - x86
Microsoft Windows XP Home Edition 5.1.2600.2.1252.1.1033.18.2037.1519 [GMT -6:00]
Running from: c:\documents and settings\Calvin\My Documents\Downloads\ComboFix.exe

WARNING -THIS MACHINE DOES NOT HAVE THE RECOVERY CONSOLE INSTALLED !!
.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.

c:\documents and settings\HelpAssistant.DARCY\autorun.inf
c:\documents and settings\Me\autorun.inf
c:\windows\system32\AutoRun.inf
c:\windows\system32\Thumbs.db

.
original MBR restored successfully !
.
((((((((((((((((((((((((((((((((((((((( Drivers/Services )))))))))))))))))))))))))))))))))))))))))))))))))
.

-------\Legacy_WSCSVC
-------\Service_wscsvc


((((((((((((((((((((((((( Files Created from 2010-01-05 to 2010-02-05 )))))))))))))))))))))))))))))))
.

2010-02-05 16:21 . 2010-02-05 16:21 -------- d-----w- C:\32788R22FWJFW
2010-02-05 16:03 . 2010-02-05 16:03 -------- d-----w- c:\documents and settings\HelpAssistant.DARCY\Wrapperscorner Downloads
2010-02-05 16:03 . 2010-02-05 16:03 -------- d-----w- c:\documents and settings\HelpAssistant.DARCY\Wrappers TLC
2010-02-05 16:03 . 2010-02-05 16:03 -------- d-----w- c:\documents and settings\HelpAssistant.DARCY\Wrappers
2010-02-04 13:14 . 2008-07-17 23:52 132392 ----a-r- c:\documents and settings\HelpAssistant.DARCY\InstallSeagateManager.exe
2010-02-04 13:06 . 2010-02-04 13:06 -------- d-----w- c:\documents and settings\HelpAssistant.DARCY\brian
2010-02-03 20:55 . 2010-02-03 20:55 -------- d-----w- c:\windows\system32\wbem\Repository
2010-02-03 11:00 . 2010-02-04 14:23 -------- d-s---w- c:\documents and settings\HelpAssistant

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2010-02-05 16:44 . 2009-11-05 20:31 -------- d-----w- c:\documents and settings\All Users\Application Data\x3watch
2010-02-05 16:24 . 2009-07-08 16:19 -------- d-----w- c:\documents and settings\Me\Application Data\Skype
2010-02-04 17:26 . 2010-02-04 17:07 -------- d-----w- c:\documents and settings\All Users\Application Data\Spybot - Search & Destroy
2010-02-04 17:07 . 2010-02-04 17:07 -------- d-----w- c:\program files\Spybot - Search & Destroy
2010-02-04 17:00 . 2010-02-04 16:53 -------- d---a-w- c:\documents and settings\All Users\Application Data\TEMP
2010-02-03 20:54 . 2010-02-03 20:54 -------- d-----w- c:\program files\McAfee Security Scan
2010-02-03 02:30 . 2009-09-10 00:25 32648 ----a-w- c:\documents and settings\Noah\Local Settings\Application Data\GDIPFONTCACHEV1.DAT
2010-01-31 05:12 . 2009-07-08 16:20 -------- d-----w- c:\program files\WrapCandy70
2010-01-11 03:48 . 2009-07-08 16:41 32648 ----a-w- c:\documents and settings\Me\Local Settings\Application Data\GDIPFONTCACHEV1.DAT
2010-01-08 23:24 . 2009-07-17 17:48 30640 ----a-w- c:\documents and settings\Calvin\Local Settings\Application Data\GDIPFONTCACHEV1.DAT
2009-12-22 05:42 . 2006-03-04 03:33 662016 ----a-w- c:\windows\system32\wininet.dll
2009-12-22 05:42 . 2004-08-04 10:00 81920 ----a-w- c:\windows\system32\ieencode.dll
2009-12-16 13:43 . 2009-12-16 13:43 -------- d-----w- c:\documents and settings\All Users\Application Data\McAfee
2009-12-15 14:08 . 2009-07-08 03:27 -------- d-----w- c:\documents and settings\All Users\Application Data\NOS
2009-12-14 13:43 . 2009-12-14 13:43 -------- d-----w- c:\documents and settings\All Users\Application Data\McAfee Security Scan
2009-12-13 03:19 . 2009-12-12 00:00 -------- d-----w- c:\program files\Norton Security Scan
2009-12-13 03:19 . 2009-10-22 01:24 -------- d-----w- c:\documents and settings\All Users\Application Data\Norton
2009-12-13 03:19 . 2009-10-26 00:03 -------- d-----w- c:\program files\Common Files\Symantec Shared
2009-12-12 00:00 . 2009-10-22 01:24 -------- d-----w- c:\documents and settings\All Users\Application Data\NortonInstaller
2009-12-10 09:00 . 2009-07-08 17:35 -------- d-----w- c:\documents and settings\All Users\Application Data\Microsoft Help
2009-11-21 16:36 . 2004-08-04 10:00 470528 ----a-w- c:\windows\AppPatch\aclayers.dll
.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"swg"="c:\program files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe" [2009-07-08 39408]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"PDVDDXSrv"="c:\program files\CyberLink\PowerDVD DX\PDVDDXSrv.exe" [2008-02-26 128296]
"IgfxTray"="c:\windows\system32\igfxtray.exe" [2008-08-18 150040]
"HotKeysCmds"="c:\windows\system32\hkcmd.exe" [2008-08-18 170520]
"Persistence"="c:\windows\system32\igfxpers.exe" [2008-08-18 141848]
"SoundMAXPnP"="c:\program files\Analog Devices\Core\smax4pnp.exe" [2007-08-01 1036288]
"QuickTime Task"="c:\program files\QuickTime\QTTask.exe" [2009-09-05 417792]
"iTunesHelper"="c:\program files\iTunes\iTunesHelper.exe" [2009-09-09 305440]
"SunJavaUpdateSched"="c:\program files\Java\jre6\bin\jusched.exe" [2009-09-21 148888]
"Adobe Reader Speed Launcher"="c:\program files\Adobe\Reader 9.0\Reader\Reader_sl.exe" [2009-10-03 35696]
"Adobe ARM"="c:\program files\Common Files\Adobe\ARM\1.0\AdobeARM.exe" [2009-09-04 935288]
"x3watch"="c:\program files\X3watch\x3watch.exe" [2008-06-01 299008]

c:\documents and settings\Noah\Start Menu\Programs\Startup\
OneNote 2007 Screen Clipper and Launcher.lnk - c:\program files\Microsoft Office\Office12\ONENOTEM.EXE [2008-10-25 98696]

c:\documents and settings\Me\Start Menu\Programs\Startup\
OneNote 2007 Screen Clipper and Launcher.lnk - c:\program files\Microsoft Office\Office12\ONENOTEM.EXE [2008-10-25 98696]

c:\documents and settings\Calvin\Start Menu\Programs\Startup\
OneNote 2007 Screen Clipper and Launcher.lnk - c:\program files\Microsoft Office\Office12\ONENOTEM.EXE [2008-10-25 98696]

c:\documents and settings\All Users\Start Menu\Programs\Startup\
McAfee Security Scan.lnk - c:\program files\McAfee Security Scan\1.0.150\SSScheduler.exe [2009-7-27 199184]

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\GoToAssist]
2009-07-08 05:07 10536 ----a-w- c:\program files\Citrix\GoToAssist\514\g2awinlogon.dll


--- Other Services/Drivers In Memory ---

*NewlyCreated* - GTNDIS5

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\svchost]
HPZ12 REG_MULTI_SZ Pml Driver HPZ12 Net Driver HPZ12
hpdevmgmt REG_MULTI_SZ hpqcxs08

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Svchost - NetSvcs
AppMgmt
AudioSrv
Browser
CryptSvc
DMServer
DHCP
ERSvc
FastUserSwitchingCompatibility
HidServ
LanmanServer
LanmanWorkstation
Messenger
Nla
NWCWorkstation
Schedule
Seclogon
SRService
Themes
TrkWks
W32Time
Wmi
WmdmPmSp
winmgmt
xmlprov
BITS
wuauserv
ShellHWDetection
helpsvc
.
Contents of the 'Scheduled Tasks' folder

2010-02-02 c:\windows\Tasks\AppleSoftwareUpdate.job
- c:\program files\Apple Software Update\SoftwareUpdate.exe [2008-07-30 17:34]
.
.
------- Supplementary Scan -------
.
uSearch Page = hxxp://www.google.com
uSearch Bar = hxxp://www.google.com/ie
uSearchAssistant = hxxp://www.google.com/ie
uSearchURL,(Default) = hxxp://www.google.com/search?q=%s
IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~2\Office12\EXCEL.EXE/3000
FF - ProfilePath - c:\documents and settings\Calvin\Application Data\Mozilla\Firefox\Profiles\umyn5onv.default\
FF - HiddenExtension: Microsoft .NET Framework Assistant: {20a82645-c095-46ed-80e3-08825760534b} - c:\windows\Microsoft.NET\Framework\v3.5\Windows Presentation Foundation\DotNetAssistantExtension\
.

**************************************************************************

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2010-02-05 10:44
Windows 5.1.2600 Service Pack 2 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully
hidden files: 0

**************************************************************************

Stealth MBR rootkit/Mebroot/Sinowal detector 0.3.7 by Gmer, http://www.gmer.net

device: opened successfully
user: MBR read successfully
called modules: ntkrnlpa.exe CLASSPNP.SYS disk.sys >>UNKNOWN [0x88ECC7C8]<<
kernel: MBR read successfully
detected MBR rootkit hooks:
\Driver\Disk -> CLASSPNP.SYS @ 0xba0ecfc3
\Driver\ACPI -> ACPI.sys @ 0xb9f7fcb8
\Driver\atapi -> atapi.sys @ 0xb9e707b4
\Driver\iaStor -> 0x88ecc7c8
IoDeviceObjectType -> DeleteProcedure -> ntkrnlpa.exe @ 0x80582544
ParseProcedure -> ntkrnlpa.exe @ 0x80581684
\Device\Harddisk0\DR0 -> DeleteProcedure -> ntkrnlpa.exe @ 0x80582544
ParseProcedure -> ntkrnlpa.exe @ 0x80581684
NDIS: Linksys Wireless-G PCI Adapter -> SendCompleteHandler -> 0x889d2330
PacketIndicateHandler -> NDIS.sys @ 0xb9d72b21
SendHandler -> NDIS.sys @ 0xb9d66d33
Warning: possible MBR rootkit infection !
copy of MBR has been found in sector 0x012A0123B
malicious code @ sector 0x012A0123E !
PE file found in sector at 0x012A01254 !
MBR rootkit infection detected ! Use: "mbr.exe -f" to fix.

**************************************************************************
.
--------------------- DLLs Loaded Under Running Processes ---------------------

- - - - - - - > 'winlogon.exe'(720)
c:\program files\Citrix\GoToAssist\514\G2AWinLogon.dll

- - - - - - - > 'explorer.exe'(3064)
c:\windows\system32\msi.dll
.
------------------------ Other Running Processes ------------------------
.
c:\program files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
c:\program files\Bonjour\mDNSResponder.exe
c:\program files\Java\jre6\bin\jqs.exe
c:\program files\Linksys Wireless-G PCI Adapter\WLService.exe
c:\program files\Linksys Wireless-G PCI Adapter\WMP54Gv4.exe
c:\program files\Yahoo!\SoftwareUpdate\YahooAUService.exe
c:\windows\system32\igfxsrvc.exe
c:\program files\iPod\bin\iPodService.exe
.
**************************************************************************
.
Completion time: 2010-02-05 10:51:07 - machine was rebooted
ComboFix-quarantined-files.txt 2010-02-05 16:51

Pre-Run: 59,202,830,336 bytes free
Post-Run: 60,576,014,336 bytes free

- - End Of File - - 7A9657BA55D52552796DB2C2B9F814B7

Edit: Moved topic from XP to the more appropriate forum. ~ Animal

BC AdBot (Login to Remove)

 


#2 Darcy B

Darcy B
  • Topic Starter

  • Members
  • 2 posts
  • OFFLINE
  •  
  • Local time:01:14 PM

Posted 06 February 2010 - 11:02 AM

Curious how long it takes to get a reply... Never done anything like this before. Trying to decide if I just need to take my computer in to have it looked at. Any information again, it would be greatly appreciated!!!

Thank you!!!


===========

Hello

While we understand your frustration at having to wait, please note that Bleeping Computer deals with several hundred requests for assistance such as yours on a daily basis. As a result, our backlog is quite large as are other comparable sites that help others with malware issues. Although our HJT Team members work on hundreds of requests each day, they are all volunteers who work logs when they can and are able to do so. No one is paid by Bleeping Computer for their assistance to our members.

Further, our malware removal staff is comprised of team members with various levels of skill and expertise to deal with thousands of malware variants, some more complex than others. Although we try to take DDS/HJT logs in order (starting with the oldest), it is often the skill level of the particular helper and sometimes the operating system that dictates which logs get selected first. Some infections are more complicated than others and require a higher skill level to remove. Without that skill level attempted removal could result in disastrous results. In other instances, the helper may not be familiar with the operating system that you are using, since they use another. In either case, neither of us want someone to assist you who is not familiar with your issue and attempt to fix it.

We ask that once you have posted your log and are waiting, please DO NOT "bump" your thread or make further replies until it has been responded to by a member of the HJT Team. The reason we ask this or do not respond to your requests is because that would remove you from the active queue that Techs and Staff have access to. The malware staff checks the forum for postings that have 0 replies as this makes it easier for them to identify those who have not been helped. If you post another response, there will be 1 reply. A team member, looking for a new log to work may assume another HJT Team member is already assisting you and not open the thread to respond.

That is why I have made an edit to your last post, instead of a reply. Please do not multiple post here, as that only pushes you further down the queue and causes confusion to the staff.

Please be patient. It may take several days, up to more than a week, perhaps less, to get a response but your log will be reviewed and answered as soon as possible. I advise checking your topic once a day for responses as the e-mail notification system is unreliable.

Thank you for understanding.

Elise - forum moderator

Edited by elise025, 07 February 2010 - 05:57 AM.


#3 syler

syler

  • Malware Response Team
  • 8,150 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Warrington, UK
  • Local time:08:14 PM

Posted 12 February 2010 - 03:23 PM

Hello,

My name is Syler and I will be helping you to solve your Malware issues. If you have since resolved your issues I would appreciate if you
would let me no so I can close this topic, if you still need help please let me no what issues you are still having, in your next reply.

We apologize for the delay in responding to your request for help. Here at Bleeping Computer we get overwhelmed at times, and
we are trying our best to keep up.

  • Download random's system information tool (RSIT) by random/random from here and save it to your desktop.
  • Double click on RSIT.exe to run RSIT.
  • Click Continue at the disclaimer screen.
  • Once it has finished, two logs will open. Please post the contents of both log.txt (<<will be maximized) and info.txt (<<will be minimized)


  1. Please download GMER from one of the following locations, and save it to your desktop:
    • Main Mirror
      This version will download a randomly named file (Recommended)
    • Zip Mirror
      This version will download a zip file you will need to extract first. If you use this mirror, please extract the zip file to your desktop.
  2. Disconnect from the Internet and close all running programs, as this process may crash your computer.
  3. Temporarily disable any real-time active protection so your security program drivers will not conflict with gmer's driver.
  4. Double click on Gmer to run it.
  5. Allow the gmer.sys driver to load if asked.
  6. You may see a rootkit warning window, If you do, click No.
  7. Untick the following boxes on the right side of the Gmer screen.
    Sections
    IAT/EAT
    Files
    Show All
  8. Click on and wait for the scan to finish.
  9. If you see a rootkit warning window, click OK.
  10. Push and save the logfile to your desktop.
  11. Copy and Paste the contents of that file in your next post.



Then please post back here with the following:
  • log.txt
  • info.txt
  • Gmer log

Thanks

unite.jpg


#4 syler

syler

  • Malware Response Team
  • 8,150 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Warrington, UK
  • Local time:08:14 PM

Posted 16 February 2010 - 07:42 PM

Due to the lack of feedback this Topic is closed.

If you need this topic reopened, please request this by sending me a PM
with the address of the thread. This applies only to the original topic starter.

Everyone else please begin a New Topic.

unite.jpg





0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users