Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Google redirect problem after removing Advanced Defender


  • This topic is locked This topic is locked
25 replies to this topic

#1 spiffitz

spiffitz

  • Members
  • 12 posts
  • OFFLINE
  •  
  • Local time:05:07 AM

Posted 21 February 2010 - 12:25 AM

My computer got a case of "Advanced Defender" and I removed it by following the instructions on http://www.bleepingcomputer.com/virus-remo...vanced-defender

Everything seems fine, although Google results still redirect into bogus URLs, for example if the result is "www.site.com" it will try to direct me instead to "9o2.site.com" or some other seemingly random first set of numbers before the domain. Once the blank page shows up, reloading the page gives me the correct URL. I haven't found any other issues with the PC. I use Firefox for browsing. Thank you in advance.

DDS.txt follows:

DDS (Ver_09-12-01.01) - NTFSx86
Run by Ron at 20:56:17.89 on Sat 02/20/2010
Internet Explorer: 6.0.2900.2180 BrowserJavaVersion: 1.6.0_16
Microsoft Windows XP Professional 5.1.2600.2.1252.1.1033.18.1535.856 [GMT -8:00]

AV: AVG Anti-Virus Free *On-access scanning enabled* (Updated) {17DDD097-36FF-435F-9E1B-52D74245D6BF}

============== Running Processes ===============

C:\WINDOWS\system32\nvsvc32.exe
C:\WINDOWS\system32\svchost -k DcomLaunch
svchost.exe
C:\WINDOWS\System32\svchost.exe -k netsvcs
svchost.exe
C:\Program Files\AVG\AVG9\avgrsx.exe
svchost.exe
C:\Program Files\AVG\AVG9\avgcsrvx.exe
C:\WINDOWS\system32\LEXBCES.EXE
C:\WINDOWS\system32\LEXPPS.EXE
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\ATI Technologies\ATI.ACE\Core-Static\MOM.exe
C:\PROGRA~1\AVG\AVG9\avgtray.exe
C:\WINDOWS\RTHDCPL.EXE
C:\WINDOWS\SOUNDMAN.EXE
C:\WINDOWS\system32\RUNDLL32.EXE
C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
E:\steam\steam.exe
C:\Program Files\ATI Technologies\ATI.ACE\Core-Static\ccc.exe
C:\Program Files\Mozilla Firefox\firefox.exe
C:\Program Files\AVG\AVG9\avgwdsvc.exe
C:\Program Files\LogMeIn Hamachi\hamachi-2.exe
C:\Program Files\Java\jre6\bin\jqs.exe
C:\Program Files\AVG\AVG9\avgnsx.exe
C:\Program Files\RALINK\Common\RalinkRegistryWriter.exe
C:\Program Files\AVG\AVG9\avgemc.exe
C:\Program Files\AVG\AVG9\avgcsrvx.exe
C:\Documents and Settings\Ron\Desktop\dds.scr

============== Pseudo HJT Report ===============

uStart Page = hxxp://greatdanetubesite.com/hardcore/xmovie.php?id=45120
BHO: ClickCatcher MSIE handler: {16664845-0e00-11d2-8059-000000000000} - c:\program files\common files\reget shared\Catcher.dll
BHO: Adobe PDF Link Helper: {18df081c-e8ad-4283-a596-fa578c2ebdc3} - c:\program files\common files\adobe\acrobat\activex\AcroIEHelperShim.dll
BHO: AVG Safe Search: {3ca2f312-6f6e-4b53-a66e-4e65e497c8c0} - c:\program files\avg\avg9\avgssie.dll
BHO: Spybot-S&D IE Protection: {53707962-6f74-2d53-2644-206d7942484f} - c:\progra~1\spybot~1\SDHelper.dll
BHO: Java™ Plug-In 2 SSV Helper: {dbc80044-a445-435b-bc74-9c25c1c588a9} - c:\program files\java\jre6\bin\jp2ssv.dll
BHO: JQSIEStartDetectorImpl Class: {e7e6f031-17ce-4c07-bc86-eabfe594f69c} - c:\program files\java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll
TB: ReGet Bar: {17939a30-18e2-471e-9d3a-56dd725f1215} - c:\program files\regetdx\iebar.dll
uRun: [SpybotSD TeaTimer] c:\program files\spybot - search & destroy\TeaTimer.exe
uRun: [Steam] "e:\steam\steam.exe" -silent
mRun: [StartCCC] "c:\program files\ati technologies\ati.ace\core-static\CLIStart.exe" MSRun
mRun: [AVG9_TRAY] c:\progra~1\avg\avg9\avgtray.exe
mRun: [amd_dc_opt] c:\program files\amd\dual-core optimizer\amd_dc_opt.exe
mRun: [RTHDCPL] RTHDCPL.EXE
mRun: [SoundMan] SOUNDMAN.EXE
mRun: [nwiz] nwiz.exe /installquiet
mRun: [NvCplDaemon] RUNDLL32.EXE c:\windows\system32\NvCpl.dll,NvStartup
mRun: [NvMediaCenter] RUNDLL32.EXE c:\windows\system32\NvMcTray.dll,NvTaskbarInit
mRun: [DAEMON Tools-1033] "c:\program files\d-tools\daemon.exe" -lang 1033
StartupFolder: c:\docume~1\ron\startm~1\programs\startup\magicd~1.lnk - c:\program files\magicdisc\MagicDisc.exe
mPolicies-system: EnableLUA = 0 (0x0)
IE: Add to Google Photos Screensa&ver - c:\windows\system32\GPhotos.scr/200
IE: Do&wnload by ReGet Deluxe - c:\program files\common files\reget shared\CC_Link.htm
IE: Download A&ll by ReGet Deluxe - c:\program files\common files\reget shared\CC_All.htm
IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe
IE: {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - {53707962-6F74-2D53-2644-206D7942484F} - c:\progra~1\spybot~1\SDHelper.dll
DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_16-windows-i586.cab
DPF: {CAFEEFAC-0016-0000-0016-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_16-windows-i586.cab
DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_16-windows-i586.cab
DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} - hxxp://download.macromedia.com/pub/shockwave/cabs/flash/swflash.cab
TCP: NameServer = 93.188.163.159,93.188.161.66
TCP: {56905461-6E38-4203-88A2-D53BB05E923A} = 93.188.163.159,93.188.161.66
Handler: linkscanner - {F274614C-63F8-47D5-A4D1-FBDDE494F8D1} - c:\program files\avg\avg9\avgpp.dll
Notify: avgrsstarter - avgrsstx.dll
AppInit_DLLs: herugife.dll

================= FIREFOX ===================

FF - ProfilePath - c:\docume~1\ron\applic~1\mozilla\firefox\profiles\9hgba821.default\
FF - prefs.js: browser.startup.homepage - google.com
FF - plugin: d:\program files\google\picasa3\npPicasa3.dll
FF - HiddenExtension: Java Console: No Registry Reference - c:\program files\mozilla firefox\extensions\{CAFEEFAC-0016-0000-0016-ABCDEFFEDCBA}

---- FIREFOX POLICIES ----
c:\program files\mozilla firefox\greprefs\security-prefs.js - pref("security.ssl3.rsa_seed_sha", true);

============= SERVICES / DRIVERS ===============

R1 AvgLdx86;AVG Free AVI Loader Driver x86;c:\windows\system32\drivers\avgldx86.sys [2010-1-18 333192]
R1 AvgMfx86;AVG Free On-access Scanner Minifilter Driver x86;c:\windows\system32\drivers\avgmfx86.sys [2010-1-18 28424]
R1 AvgTdiX;AVG Free Network Redirector;c:\windows\system32\drivers\avgtdix.sys [2010-1-18 360584]
R2 avg9emc;AVG Free E-mail Scanner;c:\program files\avg\avg9\avgemc.exe [2010-1-18 906520]
R2 avg9wd;AVG Free WatchDog;c:\program files\avg\avg9\avgwdsvc.exe [2010-1-18 285392]
R2 cpuz132;cpuz132;c:\windows\system32\drivers\cpuz132_x32.sys [2010-1-19 12672]
R2 Hamachi2Svc;LogMeIn Hamachi 2.0 Tunneling Engine;c:\program files\logmein hamachi\hamachi-2.exe [2009-10-29 1074568]
R2 RalinkRegistryWriter;Ralink Registry Writer;c:\program files\ralink\common\RalinkRegistryWriter.exe [2010-1-17 69632]
R3 SWUSBFLT;Microsoft SideWinder VIA Filter Driver;c:\windows\system32\drivers\SWUSBFLT.SYS [2010-2-14 3968]
S3 AODDriver;AODDriver;c:\program files\gigabyte\et6\i386\AODDriver.sys [2009-2-23 7168]
S3 etdrv;etdrv;c:\windows\etdrv.sys [2010-1-19 17488]
S3 GVTDrv;GVTDrv;c:\windows\system32\drivers\GVTDrv.sys [2010-1-19 24944]
S3 SetupNTGLM7X;SetupNTGLM7X;\??\k:\msi\ntglm7x.sys --> k:\msi\NTGLM7X.sys [?]
S4 d347bus;d347bus;c:\windows\system32\drivers\d347bus.sys [2010-2-16 155136]
S4 d347prt;d347prt;c:\windows\system32\drivers\d347prt.sys [2010-2-16 5248]

=============== Created Last 30 ================

2010-02-21 04:48:01 52 ----a-w- c:\documents and settings\ron\defogger_reenable
2010-02-17 15:54:39 0 d-----w- c:\windows\C5C1C0F0D62F4DBF81D4D7EF397C228B.TMP
2010-02-17 15:40:02 0 d-----w- c:\program files\common files\BioWare
2010-02-16 18:08:50 5248 ----a-w- c:\windows\system32\drivers\d347prt.sys
2010-02-16 18:08:50 155136 ----a-w- c:\windows\system32\drivers\d347bus.sys
2010-02-16 18:08:50 0 d-----w- c:\program files\D-Tools
2010-02-16 18:05:42 0 d-----w- c:\windows\Downloaded Installations
2010-02-16 15:18:27 0 d-----w- c:\program files\Microsoft Games
2010-02-15 16:45:58 0 d-----w- c:\program files\Eagle Dynamics
2010-02-15 07:01:32 2688 -c--a-w- c:\windows\system32\dllcache\hidswvd.sys
2010-02-15 07:01:32 2688 ----a-w- c:\windows\system32\drivers\HIDSwvd.sys
2010-02-15 07:01:30 59136 -c--a-w- c:\windows\system32\dllcache\gckernel.sys
2010-02-15 07:01:30 59136 ----a-w- c:\windows\system32\drivers\GcKernel.sys
2010-02-15 07:01:26 3968 -c--a-w- c:\windows\system32\dllcache\swusbflt.sys
2010-02-15 07:01:26 3968 ----a-w- c:\windows\system32\drivers\SWUSBFLT.SYS
2010-02-15 07:01:26 10240 -c--a-w- c:\windows\system32\dllcache\swpdflt2.dll
2010-02-15 07:01:26 10240 ----a-w- c:\windows\system32\swpdflt2.dll
2010-02-15 06:49:39 0 d-----w- c:\docume~1\alluse~1\applic~1\Electronic Arts
2010-02-14 17:53:44 516768 -c--a-w- c:\windows\system32\dllcache\ativvaxx.dll
2010-02-14 17:53:44 516768 ----a-w- c:\windows\system32\ativvaxx.dll
2010-02-14 17:53:43 1888992 -c--a-w- c:\windows\system32\dllcache\ati3duag.dll
2010-02-14 17:53:43 1888992 ----a-w- c:\windows\system32\ati3duag.dll
2010-02-14 17:53:41 701440 -c--a-w- c:\windows\system32\dllcache\ati2mtag.sys
2010-02-14 17:53:41 701440 ----a-w- c:\windows\system32\drivers\ati2mtag.sys
2010-02-14 17:53:37 229376 -c--a-w- c:\windows\system32\dllcache\ati2cqag.dll
2010-02-14 17:53:37 229376 ----a-w- c:\windows\system32\ati2cqag.dll
2010-02-14 17:53:37 201728 -c--a-w- c:\windows\system32\dllcache\ati2dvag.dll
2010-02-14 17:53:37 201728 ----a-w- c:\windows\system32\ati2dvag.dll
2010-02-14 04:38:40 0 d-----w- c:\program files\LogMeIn Hamachi
2010-02-13 07:19:53 0 d-----w- c:\windows\system32\NtmsData
2010-02-13 05:32:34 21504 -c--a-w- c:\windows\system32\dllcache\hidserv.dll
2010-02-13 05:32:34 21504 ----a-w- c:\windows\system32\hidserv.dll
2010-02-13 05:32:29 14848 -c--a-w- c:\windows\system32\dllcache\kbdhid.sys
2010-02-13 05:32:29 14848 ----a-w- c:\windows\system32\drivers\kbdhid.sys
2010-02-13 05:31:53 31616 -c--a-w- c:\windows\system32\dllcache\usbccgp.sys
2010-02-13 05:31:53 31616 ----a-w- c:\windows\system32\drivers\usbccgp.sys
2010-02-13 02:38:59 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2010-02-13 02:38:57 19160 ----a-w- c:\windows\system32\drivers\mbam.sys
2010-02-13 02:31:43 0 d-----w- c:\program files\CCleaner
2010-02-13 00:39:59 0 d-----w- c:\docume~1\ron\applic~1\Malwarebytes
2010-02-13 00:39:53 0 d-----w- c:\program files\Malwarebytes' Anti-Malware
2010-02-13 00:39:53 0 d-----w- c:\docume~1\alluse~1\applic~1\Malwarebytes
2010-02-13 00:18:11 0 d-----w- c:\documents and settings\all users\Microsoft PData
2010-02-12 17:32:37 0 d-----w- c:\docume~1\alluse~1\applic~1\NVIDIA Corporation
2010-02-12 17:32:19 0 d-----w- c:\program files\NVIDIA Corporation
2010-02-12 17:31:21 9047 ----a-w- c:\windows\system32\nvinfo.pb
2010-02-12 17:31:21 61440 ----a-w- c:\windows\system32\OpenCL.dll
2010-02-12 17:31:21 4077672 ----a-w- c:\windows\system32\nvcuvenc.dll
2010-02-12 17:31:21 2259560 ----a-w- c:\windows\system32\nvcuvid.dll
2010-02-12 17:31:18 2283526 ----a-w- c:\windows\system32\nvdata.bin
2010-02-12 17:31:18 11632640 ----a-w- c:\windows\system32\nvcompiler.dll
2010-02-12 17:28:05 0 d-----w- c:\windows\pss
2010-02-12 16:53:38 33792 ----a-w- c:\windows\system32\drivers\AmdPPM.sys
2010-02-12 16:22:59 0 d-----w- c:\program files\common files\ATI Technologies
2010-02-12 16:15:03 0 d-----w- c:\program files\Realtek
2010-02-12 16:14:57 528384 ----a-w- c:\windows\RtlExUpd.dll
2010-02-12 16:07:42 10 ----a-w- c:\windows\WININIT.INI
2010-02-12 16:06:59 0 d-----w- c:\windows\A7E07C2B2220441587E3784D5814BC93.TMP
2010-02-12 16:06:43 25699 ----a-w- c:\windows\system32\nvdisp.nvu
2010-02-12 16:06:43 0 d-----w- c:\windows\nview
2010-02-12 16:06:41 592488 ----a-w- c:\windows\system32\nvudisp.exe
2010-02-12 14:02:04 8832 -c--a-w- c:\windows\system32\dllcache\wmiacpi.sys
2010-02-12 14:02:04 8832 ----a-w- c:\windows\system32\drivers\wmiacpi.sys
2010-02-12 01:33:40 117888 ----a-w- c:\windows\system32\drivers\Rtenicxp.sys
2010-02-12 01:33:39 9728 ----a-w- c:\windows\system32\RtNicProp32.dll
2010-02-12 01:30:39 9096 ----a-w- c:\windows\system32\drivers\amdide.sys
2010-02-09 18:11:33 0 d-----w- c:\docume~1\ron\applic~1\.purple
2010-02-09 16:18:09 23856 ----a-w- c:\windows\system32\spupdsvc.exe
2010-02-08 04:07:10 0 d-----w- c:\program files\2K Games
2010-02-08 00:19:04 21840 ----atw- c:\windows\system32\SIntfNT.dll
2010-02-08 00:19:04 17212 ----atw- c:\windows\system32\SIntf32.dll
2010-02-08 00:19:04 12067 ----atw- c:\windows\system32\SIntf16.dll
2010-02-07 23:41:54 0 d-----w- c:\program files\Diablo II
2010-02-05 18:22:10 155 ----a-w- c:\windows\dellstat.ini
2010-02-05 18:20:22 73728 ----a-w- c:\windows\system32\dlbcpwr.dll
2010-02-05 18:20:22 57344 ----a-w- c:\windows\system32\dlbccinf.dll
2010-02-05 18:20:22 49152 ----a-w- c:\windows\system32\dlbccoin.dll
2010-02-05 18:20:22 40960 ----a-w- c:\windows\system32\dlbcvs.dll
2010-02-05 18:20:22 373 ----a-w- c:\windows\system32\dlbccoin.ini
2010-02-05 18:20:22 311296 ----a-w- c:\windows\system32\LEXBCES.EXE
2010-02-05 18:20:22 201216 ----a-w- c:\windows\system32\LEXP2P32.DLL
2010-02-05 18:20:22 197120 ----a-w- c:\windows\system32\LEX2KUSB.DLL
2010-02-05 18:20:22 192512 ----a-w- c:\windows\system32\lexlmpm.dll
2010-02-05 18:20:22 174592 ----a-w- c:\windows\system32\LEXPPS.EXE
2010-02-05 18:20:22 147456 ----a-w- c:\windows\system32\LEXBCE.DLL
2010-02-05 18:17:05 25856 -c--a-w- c:\windows\system32\dllcache\usbprint.sys
2010-02-05 18:17:05 25856 ----a-w- c:\windows\system32\drivers\usbprint.sys
2010-02-05 07:07:16 447752 ----a-r- c:\windows\system32\vp6vfw.dll
2010-02-05 07:07:14 0 d-----w- c:\program files\Microsoft WSE
2010-01-31 03:48:45 69 ----a-w- c:\documents and settings\ron\jagex_runescape_preferences2.dat
2010-01-31 03:47:25 39 ----a-w- c:\documents and settings\ron\jagex_runescape_preferences.dat
2010-01-31 03:47:13 0 d-----w- c:\windows\.jagex_cache_32
2010-01-28 16:40:08 178176 ----a-w- c:\windows\system32\unrar.dll
2010-01-28 16:40:05 0 d-----w- c:\program files\K-Lite Codec Pack
2010-01-27 17:17:02 1933312 ----a-w- c:\windows\system32\cdintf250.dll
2010-01-27 17:16:47 0 d-----w- c:\program files\common files\Palo Alto Software
2010-01-27 17:16:39 0 d-----w- c:\program files\common files\Intuit
2010-01-27 17:16:36 164 ----a-w- c:\windows\QUICKEN.INI
2010-01-27 16:57:44 0 d-----w- c:\docume~1\ron\applic~1\Intuit
2010-01-27 16:57:44 0 d-----w- c:\docume~1\alluse~1\applic~1\Intuit
2010-01-23 04:37:07 4 ----a-w- c:\windows\system32\GVTunner.ref

==================== Find3M ====================

2010-02-13 09:51:26 17488 ----a-w- c:\windows\gdrv.sys
2010-02-05 08:20:04 24944 ----a-w- c:\windows\system32\drivers\GVTDrv.sys
2010-01-21 23:41:41 411368 ----a-w- c:\windows\system32\deploytk.dll
2010-01-21 03:46:58 17488 ----a-w- c:\windows\etdrv.sys
2010-01-19 04:43:25 12464 ----a-w- c:\windows\system32\avgrsstx.dll
2010-01-19 04:43:24 360584 ----a-w- c:\windows\system32\drivers\avgtdix.sys
2010-01-19 04:43:19 333192 ----a-w- c:\windows\system32\drivers\avgldx86.sys
2010-01-18 00:41:50 21361 ----a-w- c:\windows\system32\drivers\AegisP.sys
2010-01-17 18:23:30 21640 ----a-w- c:\windows\system32\emptyregdb.dat
2010-01-12 06:17:44 278120 ----a-w- c:\windows\system32\nvmccs.dll
2010-01-12 06:17:44 154216 ----a-w- c:\windows\system32\nvsvc32.exe
2010-01-12 06:17:44 145000 ----a-w- c:\windows\system32\nvcolor.exe
2010-01-12 06:17:44 13666408 ----a-w- c:\windows\system32\nvcpl.dll
2010-01-12 06:17:44 110696 ----a-w- c:\windows\system32\nvmctray.dll
2010-01-12 06:17:40 81920 ----a-w- c:\windows\system32\nvwddi.dll
2010-01-12 04:03:33 6359168 ----a-w- c:\windows\system32\nv4_disp.dll
2010-01-12 04:03:33 4104192 ----a-w- c:\windows\system32\nvcuda.dll
2010-01-12 04:03:33 182888 ----a-w- c:\windows\system32\nvcodins.dll
2010-01-12 04:03:33 182888 ----a-w- c:\windows\system32\nvcod.dll
2010-01-12 04:03:33 14458880 ----a-w- c:\windows\system32\nvoglnt.dll
2010-01-12 04:03:33 1081344 ----a-w- c:\windows\system32\nvapi.dll
2010-01-12 04:03:33 10276768 ----a-w- c:\windows\system32\drivers\nv4_mini.sys
2009-12-14 19:15:14 2146304 ----a-w- c:\windows\system32\GPhotos.scr

============= FINISH: 20:56:39.23 ===============

Attached Files



BC AdBot (Login to Remove)

 


#2 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:01:07 PM

Posted 22 February 2010 - 09:01 PM

Hi,

Welcome to Bleeping Computer. My name is m0le and I will be helping you with your log.
  • Please subscribe to this topic, if you haven't already. You can subscribe by clicking the Options box to the right of your topic title and selecting Track This Topic.

  • Please avoid installing/uninstalling or updating any programs and attempting any unsupervised fixes or scans. This can make helping you impossible.

  • Please reply to this post so I know you are there.
The forum is busy and we need to have replies as soon as possible. If I haven't had a reply after 3 days I will bump the topic and if you do not reply by the following day after that then I will close the topic.

----------------------------------------------

Can you run a rootkit scan for me with Gmer

Please download GMER from one of the following locations and save it to your desktop:
  • Main Mirror
    This version will download a randomly named file (Recommended)
  • Zipped Mirror
    This version will download a zip file you will need to extract first. If you use this mirror, please extract the zip file to your desktop.
  • Disconnect from the Internet and close all running programs.
  • Temporarily disable any real-time active protection so your security programs will not conflict with gmer's driver.
  • Double-click on the randomly named GMER file (i.e. n7gmo46c.exe) and allow the gmer.sys driver to load if asked.
  • Note: If you downloaded the zipped version, extract the file to its own folder such as C:\gmer and then double-click on gmer.exe.


  • GMER will open to the Rootkit/Malware tab and perform an automatic quick scan when first run. (do not use the computer while the scan is in progress)
  • If you receive a WARNING!!! about rootkit activity and are asked to fully scan your system...click NO.
  • Now click the Scan button. If you see a rootkit warning window, click OK.
  • When the scan is finished, click the Save... button to save the scan results to your Desktop. Save the file as gmer.log.
  • Click the Copy button and paste the results into your next reply.
  • Exit GMER and re-enable all active protection when done.
-- If you encounter any problems, try running GMER in Safe Mode.
Posted Image
m0le is a proud member of UNITE

#3 spiffitz

spiffitz
  • Topic Starter

  • Members
  • 12 posts
  • OFFLINE
  •  
  • Local time:05:07 AM

Posted 23 February 2010 - 12:22 AM

Hi m0le, gmer runs just fine but if I try to save or even just click "copy" the machine freezes. I'm then not able to launch anything or even get to the taskbar. Safe mode doesn't work; it reboots right away before getting into Windows. You didn't specify any specific settings for gmer so I just ran it on default with everything checked. Should I run it with any specific settings checked/unchecked?

I still have the "ark.txt" when I ran gmer the first time, when I followed the prep guide. I haven't changed anything on the system since, is that of any use?


#4 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:01:07 PM

Posted 23 February 2010 - 07:54 AM

Yes, please copy and paste the Gmer scan for me. thumbup2.gif
Posted Image
m0le is a proud member of UNITE

#5 spiffitz

spiffitz
  • Topic Starter

  • Members
  • 12 posts
  • OFFLINE
  •  
  • Local time:05:07 AM

Posted 23 February 2010 - 11:24 AM

GMER 1.0.15.15281 - http://www.gmer.net
Rootkit scan 2010-02-20 21:10:14
Windows 5.1.2600 Service Pack 2
Running: gmer.exe; Driver: C:\DOCUME~1\Ron\LOCALS~1\Temp\kxtdypob.sys


---- Devices - GMER 1.0.15 ----

AttachedDevice \Driver\Tcpip \Device\Ip avgtdix.sys (AVG Network connection watcher/AVG Technologies CZ, s.r.o.)
AttachedDevice \Driver\Tcpip \Device\Tcp avgtdix.sys (AVG Network connection watcher/AVG Technologies CZ, s.r.o.)

Device \Driver\atapi \Device\Ide\IdePort0 [B7F149F2] atapi.sys[unknown section] {MOV EAX, [0xffdf0308]; JMP [EAX+0xac]}
Device \Driver\atapi \Device\Ide\IdeDeviceP2T0L0-1c [B7F149F2] atapi.sys[unknown section] {MOV EAX, [0xffdf0308]; JMP [EAX+0xac]}
Device \Driver\atapi \Device\Ide\IdePort1 [B7F149F2] atapi.sys[unknown section] {MOV EAX, [0xffdf0308]; JMP [EAX+0xac]}
Device \Driver\atapi \Device\Ide\IdePort2 [B7F149F2] atapi.sys[unknown section] {MOV EAX, [0xffdf0308]; JMP [EAX+0xac]}
Device \Driver\atapi \Device\Ide\IdePort3 [B7F149F2] atapi.sys[unknown section] {MOV EAX, [0xffdf0308]; JMP [EAX+0xac]}
Device \Driver\atapi \Device\Ide\IdeDeviceP1T1L0-e [B7F149F2] atapi.sys[unknown section] {MOV EAX, [0xffdf0308]; JMP [EAX+0xac]}
Device \Driver\atapi \Device\Ide\IdeDeviceP2T1L0-24 [B7F149F2] atapi.sys[unknown section] {MOV EAX, [0xffdf0308]; JMP [EAX+0xac]}
Device \Driver\atapi \Device\Ide\IdeDeviceP0T1L0-3 [B7F149F2] atapi.sys[unknown section] {MOV EAX, [0xffdf0308]; JMP [EAX+0xac]}

AttachedDevice \Driver\Tcpip \Device\Udp avgtdix.sys (AVG Network connection watcher/AVG Technologies CZ, s.r.o.)
AttachedDevice \Driver\Tcpip \Device\RawIp avgtdix.sys (AVG Network connection watcher/AVG Technologies CZ, s.r.o.)
AttachedDevice \FileSystem\Fastfat \Fat fltMgr.sys (Microsoft Filesystem Filter Manager/Microsoft Corporation)

---- Files - GMER 1.0.15 ----

File C:\WINDOWS\system32\drivers\atapi.sys suspicious modification

---- EOF - GMER 1.0.15 ----


#6 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:01:07 PM

Posted 23 February 2010 - 01:59 PM

Gmer has found a rootkit.

Download and Run RKill

Please download RKill by Grinler from one of the 4 links below and save it to your desktop.

Link 1
Link 2
Link 3
Link 4
  • Before we begin, you should disable your anti-malware softwares you have installed so they do not interfere RKill running as some anti-malware softwares detect RKill as malicious. Please refer to this page if you are not sure how.
  • Double-click on Rkill on your desktop to run it. (If you are using Windows Vista, please right-click on it and select Run As Administrator)
  • A black screen will appear and then disappear. Please do not worry, that is normal. This means that the tool has been successfully executed.
  • Please post the resulting log in your next reply.

Then

Please download ComboFix from one of these locations:* IMPORTANT !!! Save ComboFix.exe to your Desktop making sure you rename it comfix.exe
  • Disable your AntiVirus and AntiSpyware applications, usually via a right click on the System Tray icon. They may otherwise interfere with our tools. (Click on this link to see a list of programs that should be disabled. The list is not all inclusive.)
  • Double click on Combofix.exe & follow the prompts.
  • As part of it's process, ComboFix will check to see if the Microsoft Windows Recovery Console is installed. With malware infections being as they are today, it's strongly recommended to have this pre-installed on your machine before doing any malware removal. It will allow you to boot up into a special recovery/repair mode that will allow us to more easily help you should your computer have a problem after an attempted removal of malware.
  • Follow the prompts to allow ComboFix to download and install the Microsoft Windows Recovery Console, and when prompted, agree to the End-User License Agreement to install the Microsoft Windows Recovery Console.
**Please note: If the Microsoft Windows Recovery Console is already installed, ComboFix will continue it's malware removal procedures.



Once the Microsoft Windows Recovery Console is installed using ComboFix, you should see the following message:



Click on Yes, to continue scanning for malware.

When finished, it shall produce a log for you. Please include the C:\ComboFix.txt in your next reply.

Thanks smile.gif
Posted Image
m0le is a proud member of UNITE

#7 spiffitz

spiffitz
  • Topic Starter

  • Members
  • 12 posts
  • OFFLINE
  •  
  • Local time:05:07 AM

Posted 23 February 2010 - 03:52 PM

This log file is located at C:\rkill.log.
Please post this only if requested to by the person helping you.
Otherwise you can close this log when you wish.
Ran as Ron on 02/23/2010 at 12:25:36.


Processes terminated by Rkill or while it was running:


C:\WINDOWS\system32\nvsvc32.exe
C:\WINDOWS\system32\RUNDLL32.EXE
C:\Program Files\LogMeIn Hamachi\hamachi-2.exe
C:\Documents and Settings\Ron\Desktop\rkill.pif


Rkill completed on 02/23/2010 at 12:25:42.

Attached Files



#8 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:01:07 PM

Posted 23 February 2010 - 07:44 PM

I'm a bit surprised that Combofix did not replace the infected file.

Please run this tool to search for a replacement file.

Please download SystemLook from one of the links below and save it to your Desktop.
Download Mirror #1
Download Mirror #2
  • Double-click SystemLook.exe to run it.
  • Copy the content of the following codebox into the main textfield:
    CODE
    :filefind
    atapi*

  • Click the Look button to start the scan.
  • When finished, a notepad window will open with the results of the scan. Please post this log in your next reply.
Note: The log can also be found on your Desktop entitled SystemLook.txt
Posted Image
m0le is a proud member of UNITE

#9 spiffitz

spiffitz
  • Topic Starter

  • Members
  • 12 posts
  • OFFLINE
  •  
  • Local time:05:07 AM

Posted 23 February 2010 - 08:09 PM

SystemLook v1.0 by jpshortstuff (11.01.10)
Log created at 17:07 on 23/02/2010 by Ron (Administrator - Elevation successful)

========== filefind ==========

Searching for "atapi*"
C:\cmdcons\ATAPI.SY_ --a--- 49558 bytes [06:59 04/08/2004] [06:59 04/08/2004] 28541D14647BB58502D09D1CEAEE6684
C:\WINDOWS\ERDNT\cache\atapi.sys --a--- 95360 bytes [20:43 23/02/2010] [20:07 03/08/2004] CDFE4411A69C224BD1D11B2DA92DAC51
C:\WINDOWS\system32\drivers\atapi.sys ------ 95360 bytes [20:07 03/08/2004] [20:07 03/08/2004] CDFE4411A69C224BD1D11B2DA92DAC51
C:\WINDOWS\system32\ReinstallBackups\0000\DriverFiles\i386\atapi.sys --a--- 95360 bytes [00:37 18/01/2010] [20:07 03/08/2004] CDFE4411A69C224BD1D11B2DA92DAC51
C:\WINDOWS\system32\ReinstallBackups\0001\DriverFiles\i386\atapi.sys --a--- 95360 bytes [00:37 18/01/2010] [20:07 03/08/2004] CDFE4411A69C224BD1D11B2DA92DAC51
C:\WINDOWS\system32\ReinstallBackups\0006\DriverFiles\i386\atapi.sys --a--- 95360 bytes [16:22 12/02/2010] [20:07 03/08/2004] CDFE4411A69C224BD1D11B2DA92DAC51
C:\WINDOWS\system32\ReinstallBackups\0007\DriverFiles\i386\atapi.sys --a--- 95360 bytes [16:22 12/02/2010] [20:07 03/08/2004] CDFE4411A69C224BD1D11B2DA92DAC51

-=End Of File=-

#10 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:01:07 PM

Posted 23 February 2010 - 08:17 PM

Okay, now we can run Combofix again and replace the file

1. Close any open browsers.

2. Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.

3. Open notepad and copy/paste the text in the quotebox below into it:

QUOTE
FCopy::
C:\WINDOWS\system32\ReinstallBackups\0006\DriverFiles\i386\atapi.sys | C:\WINDOWS\system32\drivers\atapi.sys


Save this as CFScript.txt, in the same location as ComboFix.exe




Refering to the picture above, drag CFScript into ComboFix.exe

When finished, it shall produce a log for you at C:\ComboFix.txt which I will require in your next reply.

That should take care of that. smile.gif
Posted Image
m0le is a proud member of UNITE

#11 spiffitz

spiffitz
  • Topic Starter

  • Members
  • 12 posts
  • OFFLINE
  •  
  • Local time:05:07 AM

Posted 23 February 2010 - 08:53 PM

OK here it is. I wasn't watching it and the self reboot surprised me, I thought my machine crashed again.

Attached Files



#12 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:01:07 PM

Posted 23 February 2010 - 09:03 PM

QUOTE(spiffitz @ Feb 24 2010, 01:53 AM) View Post
OK here it is. I wasn't watching it and the self reboot surprised me, I thought my machine crashed again.


Yes, it's a powerful tool. thumbup2.gif

That seems to have worked a treat.


Please run ESET for me

I'd like us to scan your machine with ESET OnlineScan
  1. Hold down Control and click on the following link to open ESET OnlineScan in a new window.
    ESET OnlineScan
  2. Click the button.
  3. For alternate browsers only: (Microsoft Internet Explorer users can skip these steps)
    1. Click on to download the ESET Smart Installer. Save it to your desktop.
    2. Double click on the icon on your desktop.
  4. Check
  5. Click the button.
  6. Accept any security warnings from your browser.
  7. Check
  8. Push the Start button.
  9. ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this can take some time.
  10. When the scan completes, push
  11. Push , and save the file to your desktop using a unique name, such as ESETScan. Include the contents of this report in your next reply.
  12. Push the button.
  13. Push

Next can you post a new Gmer log so I can check what it is saying.

Thanks thumbup2.gif
Posted Image
m0le is a proud member of UNITE

#13 spiffitz

spiffitz
  • Topic Starter

  • Members
  • 12 posts
  • OFFLINE
  •  
  • Local time:05:07 AM

Posted 23 February 2010 - 10:11 PM

m0le, that eset link is coming up blank for me both in IE and Firefox. The graphic in your message can't be clicked on, either. I tried the link on another computer and it works, although the graphic still is non-clickable so I can not download it and move it over the network. Do you have another link to try? I found some through Google but I'd rather have your recommendation.




#14 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:01:07 PM

Posted 24 February 2010 - 03:40 PM

The graphic is not a link but the ESET text link should be working.

Can you try running BitDefender and see if that works. IE for the browser please.

Please run a BitDefender Online Scan
  • Click I Agree to agree to the EULA.
  • Allow the ActiveX control to install when prompted.
  • Click Click here to scan to begin the scan.
  • Please refrain from using the computer until the scan is finished. This might take a while to run, but it is important that nothing else is running while you scan.
  • When the scan is finished, click on Click here to export the scan results.
  • Save the report to your desktop so you can post it in your next reply.

Posted Image
m0le is a proud member of UNITE

#15 spiffitz

spiffitz
  • Topic Starter

  • Members
  • 12 posts
  • OFFLINE
  •  
  • Local time:05:07 AM

Posted 25 February 2010 - 01:17 PM

Hi m0le, Bit Defender says it's unable to update the virus database, then in the scan screen it says "scan failed" with no scan done at all.

My Google results are still re-directing to bogus sites, btw.




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users