Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Infected - Logs Enclosed - Trojan Downloader/Root?


  • This topic is locked This topic is locked
10 replies to this topic

#1 ozzyo99

ozzyo99

  • Members
  • 6 posts
  • OFFLINE
  •  
  • Local time:02:48 AM

Posted 21 February 2010 - 12:41 AM

Hi there,

Well, I managed to get my first infection in as long as I remember last week. I was downloading a RAR which it seems was carrying a nice payload.

Anyway, I've done all the usual stuff:
-Installed NOD32 4.0.437, latest defs.
-Installed/Scanned Spybot SD.
-Installed/Scanned TrojanHunter.
-Installed/Scanned MS Defender.
-Installed/Scanned Malwarebytes.
-Installed/Scanned HiJackThis.
-Installed/Scanned RootkitBuster.

The trojan/root (whatever it is), seems to be downloading new trojans and the NOD quarantine has the following listed:
-Win32/Olmarik.UL Trojan.
-Win32/Cmag.BR Trojan.
-Win32/Kryptik.CNF Trojan.
-Win32/Autorun.VB.LR worm.
-Win32/TrojanDownloader.FakeAlert.ATL Trojan.
-Win32/Kryptik.CMU Trojan.
-Win32/SpamtTool.Agent.NDR Trojan.
-Win32/PSW.OnlineGames.NNU Trojan.

With exception of the OnlineGames trojan, which infected Autorun, and Spamtool, which infected the System32\drivers directory. The rest have only been present in the C:\Documents and Settings\James directory, in the form of randomly named .exe files.

I thought NOD had dealt with it, but for a while my IE was infected with a fake/infected Java addon, which crashed all my browsers (IE8, FF3.5.7, Chrome) independently. I since removed that, and any other Java junk, and again rescanned with everything listed, but occasionally NOD is still picking up new trojans.

Anyway, as per the advice thread, here are my logs... I'd really apprteciate some feedback on how I can remove/locate whatever is causing this. I should also mention, that there's no visible sign of the trojan, but, I do have an occasional fake Security Center pop-up, in the form of a rogue SVCHOST which doesn't get picked up by NOD, Teatimer or Security Center.

Thanks all

LOGS
------------------


DDS (Ver_09-12-01.01) - NTFSx86
Run by James at 14:48:07.82 on 21/02/2010
Internet Explorer: 8.0.6001.18702
Microsoft Windows XP Professional 5.1.2600.3.1252.44.1033.18.1015.174 [GMT 10:00]

AV: ESET NOD32 Antivirus 4.0 *On-access scanning enabled* (Updated) {E5E70D32-0101-4F12-8FB0-D96ACA4F34C0}

============== Running Processes ===============

C:\WINDOWS\system32\svchost -k DcomLaunch
svchost.exe
C:\Program Files\Windows Defender\MsMpEng.exe
C:\WINDOWS\System32\svchost.exe -k netsvcs
svchost.exe
svchost.exe
C:\WINDOWS\system32\spoolsv.exe
svchost.exe
C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
C:\Program Files\Bonjour\mDNSResponder.exe
C:\Program Files\ESET\ESET NOD32 Antivirus\ekrn.exe
C:\WINDOWS\system32\svchost.exe -k imgsvc
C:\WINDOWS\system32\UTSCSI.EXE
C:\WINDOWS\Explorer.EXE
C:\Program Files\EeePC\ACPI\AsAcpiSvr.exe
C:\Program Files\EeePC\ACPI\AsEPCMon.exe
C:\WINDOWS\RTHDCPL.EXE
C:\WINDOWS\SOUNDMAN.EXE
C:\Program Files\Elantech\ETDCtrl.exe
D:\Program Files\iTunes\iTunesHelper.exe
C:\Program Files\ESET\ESET NOD32 Antivirus\egui.exe
C:\Program Files\Windows Defender\MSASCui.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Messenger\msmsgs.exe
C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
C:\WINDOWS\system32\igfxext.exe
C:\WINDOWS\system32\igfxsrvc.exe
C:\Program Files\iPod\bin\iPodService.exe
C:\Program Files\Asus\EeePC\Super Hybrid Engine\SuperHybridEngine.exe
C:\WINDOWS\system32\wuauclt.exe
C:\Program Files\Mozilla Firefox\firefox.exe
C:\Program Files\TrendMicro\HiJackThis\HiJackThis.exe
C:\Program Files\Internet Explorer\IEXPLORE.EXE
C:\Program Files\Internet Explorer\IEXPLORE.EXE
C:\Program Files\Internet Explorer\IEXPLORE.EXE
C:\Program Files\Internet Explorer\IEXPLORE.EXE
C:\Documents and Settings\James\Local Settings\Temporary Internet Files\Content.IE5\GWQGR3GB\dds[1].scr

============== Pseudo HJT Report ===============

uStart Page = hxxp://ehgringo.blogspot.com/
BHO: Spybot-S&D IE Protection: {53707962-6f74-2d53-2644-206d7942484f} - c:\progra~1\spybot~1\SDHelper.dll
uRun: [ctfmon.exe] c:\windows\system32\ctfmon.exe
uRun: [MSMSGS] "c:\program files\messenger\msmsgs.exe" /background
uRun: [SpybotSD TeaTimer] c:\program files\spybot - search & destroy\TeaTimer.exe
uRun: [Google Update] "c:\documents and settings\james\local settings\application data\google\update\GoogleUpdate.exe" /c
mRun: [<NO NAME>]
mRun: [AsusACPIServer] c:\program files\eeepc\acpi\AsAcpiSvr.exe
mRun: [AsusEPCMonitor] c:\program files\eeepc\acpi\AsEPCMon.exe
mRun: [RTHDCPL] RTHDCPL.EXE
mRun: [SoundMan] SOUNDMAN.EXE
mRun: [AlcWzrd] ALCWZRD.EXE
mRun: [Alcmtr] ALCMTR.EXE
mRun: [ETDWare] c:\program files\elantech\ETDCtrl.exe
mRun: [MbWzdFPAP-EXL600] c:\windows\system32\fpap-exl600\PdtGuide.exe
mRun: [HotKeysCmds] c:\windows\system32\hkcmd.exe
mRun: [iTunesHelper] "d:\program files\itunes\iTunesHelper.exe"
mRun: [egui] "c:\program files\eset\eset nod32 antivirus\egui.exe" /hide /waitservice
mRun: [Windows Defender] "c:\program files\windows defender\MSASCui.exe" -hide
dRun: [CTFMON.EXE] c:\windows\system32\ctfmon.exe
StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\autoru~1.lnk - c:\program files\asus\asus os cleaner\AsOSCleaner.exe
StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\superh~1.lnk - c:\program files\asus\eeepc\super hybrid engine\SuperHybridEngine.exe
IE: {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe
IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe
IE: {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - {53707962-6F74-2D53-2644-206D7942484F} - c:\progra~1\spybot~1\SDHelper.dll
DPF: {3D3B42C2-11BF-4732-A304-A01384B70D68} - hxxp://picasaweb.google.co.uk/s/v/56.42/uploader2.cab
DPF: {4871A87A-BFDD-4106-8153-FFDE2BAC2967} - hxxp://dlm.tools.akamai.com/dlmanager/versions/activex/dlm-activex-2.2.4.3.cab
DPF: {67DABFBF-D0AB-41FA-9C46-CC0F21721616} - hxxp://download.divx.com/player/DivXBrowserPlugin.cab
DPF: {8FFBE65D-2C9C-4669-84BD-5829DC0B603C} - hxxp://fpdownload.macromedia.com/get/flashplayer/current/polarbear/ultrashim.cab
DPF: {E77F23EB-E7AB-4502-8F37-247DBAF1A147} - hxxp://gfx1.hotmail.com/mail/w4/pr01/photouploadcontrol/MSNPUpld.cab
TCP: {8830D1C2-5DFA-4D0F-A8DA-F66B89519A94} = 8.8.8.8,8.8.4.4
Handler: skype4com - {FFC8B962-9B40-4DFF-9458-1830C7DD7F5D} - c:\progra~1\common~1\skype\SKYPE4~1.DLL
Notify: igfxcui - igfxdev.dll
SEH: Microsoft AntiMalware ShellExecuteHook: {091eb208-39dd-417d-a5dd-7e2c2d8fb9cb} - c:\progra~1\wifd1f~1\MpShHook.dll
Hosts: 127.0.0.1 www.spywareinfo.com

================= FIREFOX ===================

FF - ProfilePath - c:\docume~1\james\applic~1\mozilla\firefox\profiles\16ap9ne3.default\
FF - prefs.js: browser.startup.homepage - hxxp://ehgringo.blogspot.com/
FF - plugin: c:\documents and settings\james\local settings\application data\google\update\1.2.183.13\npGoogleOneClick8.dll
FF - plugin: d:\program files\itunes\mozilla plugins\npitunes.dll

---- FIREFOX POLICIES ----
c:\program files\mozilla firefox\greprefs\security-prefs.js - pref("security.ssl3.rsa_seed_sha", true);

============= SERVICES / DRIVERS ===============

R1 ehdrv;ehdrv;c:\windows\system32\drivers\ehdrv.sys [2009-5-14 107256]
R1 epfwtdir;epfwtdir;c:\windows\system32\drivers\epfwtdir.sys [2009-5-14 94360]
R2 ekrn;ESET Service;c:\program files\eset\eset nod32 antivirus\ekrn.exe [2009-5-14 731840]
R2 WinDefend;Windows Defender;c:\program files\windows defender\MsMpEng.exe [2006-11-3 13592]
R3 RT80x86;Ralink 802.11n Wireless Driver;c:\windows\system32\drivers\rt2860.sys [2008-10-29 625024]
S3 dciiodrv;dciiodrv;c:\windows\system32\drivers\dciiodrv.sys [2009-12-28 2944]
S3 GTUHSBUS;GT UHS BUS;c:\windows\system32\drivers\gtuhsbus.sys [2009-4-17 58880]
S3 GTUHSNDISIPXP;GT UHS IP NDIS;c:\windows\system32\drivers\gtuhs51.sys [2009-4-17 106112]
S3 GTUHSOMS;GT UHS OMS;c:\windows\system32\drivers\gtuhsoms.sys [2009-4-17 18816]
S3 GTUHSSER;GT UHS SER;c:\windows\system32\drivers\gtuhsser.sys [2009-4-17 8064]
S3 PortTalk;PortTalk;c:\windows\system32\drivers\porttalk.sys [2009-12-28 3567]

=============== Created Last 30 ================

2010-02-21 02:45:06 161296 ----a-w- c:\windows\system32\drivers\tmcomm.sys
2010-02-21 02:39:48 0 d-----w- c:\program files\TrendMicro
2010-02-20 08:15:12 0 d-----w- c:\docume~1\james\applic~1\avidemux
2010-02-20 08:13:17 0 d-----w- c:\program files\Avidemux 2.5
2010-02-19 15:31:16 353792 -c----w- c:\windows\system32\dllcache\srv.sys
2010-02-19 15:27:11 455424 -c----w- c:\windows\system32\dllcache\mrxsmb.sys
2010-02-19 15:10:56 0 d-----w- c:\docume~1\james\applic~1\TrojanHunter
2010-02-19 14:30:14 0 d-----w- c:\program files\TrojanHunter 5.2
2010-02-19 12:01:09 181120 ------w- c:\windows\system32\MpSigStub.exe
2010-02-19 11:40:16 0 d-----w- c:\program files\Spybot - Search & Destroy
2010-02-19 11:40:16 0 d-----w- c:\docume~1\alluse~1\applic~1\Spybot - Search & Destroy
2010-02-19 11:20:25 2373 --sh--r- c:\documents and settings\james\yaaidi.exe
2010-02-19 10:48:59 34688 -c--a-w- c:\windows\system32\dllcache\lbrtfdc.sys
2010-02-19 10:48:59 34688 ----a-w- c:\windows\system32\drivers\lbrtfdc.sys
2010-02-19 10:47:47 8576 -c--a-w- c:\windows\system32\dllcache\i2omgmt.sys
2010-02-19 10:47:47 8576 ----a-w- c:\windows\system32\drivers\i2omgmt.sys
2010-02-19 10:47:30 8192 -c--a-w- c:\windows\system32\dllcache\changer.sys
2010-02-19 10:47:30 8192 ----a-w- c:\windows\system32\drivers\changer.sys
2010-02-19 10:44:09 2373 --sh--r- c:\documents and settings\james\wurif.exe
2010-02-19 02:17:39 0 d-----w- c:\windows\system32\windows media
2010-02-19 02:16:59 0 d-----w- c:\windows\RegisteredPackages
2010-02-19 02:16:49 0 d--h--w- c:\windows\msdownld.tmp
2010-02-19 01:53:38 0 d--h--w- c:\windows\system32\GroupPolicy
2010-02-18 12:31:42 33690341 ----a-w- c:\windows\bleep.flv
2010-02-17 12:08:39 0 d-----w- c:\docume~1\james\applic~1\Malwarebytes
2010-02-17 12:08:06 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2010-02-17 12:07:56 0 d-----w- c:\docume~1\alluse~1\applic~1\Malwarebytes
2010-02-17 12:07:55 19160 ----a-w- c:\windows\system32\drivers\mbam.sys
2010-02-17 12:07:47 0 d-----w- c:\program files\Malwarebytes' Anti-Malware
2010-02-12 23:07:14 0 d-----w- c:\program files\WindSolutions
2010-02-11 12:14:39 0 d-----w- c:\program files\ESET
2010-02-11 08:29:11 135168 --sh--r- c:\documents and settings\james\vaoada.exe
2010-02-09 00:52:35 0 d-----w- c:\program files\TCP IP Manager

==================== Find3M ====================

2009-12-31 16:50:03 353792 ----a-w- c:\windows\system32\drivers\srv.sys
2009-12-27 14:09:37 2944 ---ha-w- c:\windows\system32\drivers\dciiodrv.sys
2009-12-21 19:14:05 916480 ----a-w- c:\windows\system32\wininet.dll
2009-12-16 18:43:27 343040 ----a-w- c:\windows\system32\mspaint.exe
2009-12-14 16:33:48 53248 -c--a-w- c:\windows\system32\CSVer.dll
2009-12-14 07:08:23 33280 ----a-w- c:\windows\system32\csrsrv.dll
2009-12-08 19:26:15 2145280 ----a-w- c:\windows\system32\ntoskrnl.exe
2009-12-08 18:43:51 2023936 ----a-w- c:\windows\system32\ntkrnlpa.exe
2009-11-27 17:11:44 17920 ----a-w- c:\windows\system32\msyuv.dll
2009-11-27 17:11:44 1291776 ----a-w- c:\windows\system32\quartz.dll
2009-11-27 16:07:35 8704 ----a-w- c:\windows\system32\tsbyuv.dll
2009-11-27 16:07:35 28672 ----a-w- c:\windows\system32\msvidc32.dll
2009-11-27 16:07:34 84992 ----a-w- c:\windows\system32\avifil32.dll
2009-11-27 16:07:34 48128 ----a-w- c:\windows\system32\iyuv_32.dll
2009-11-27 16:07:34 11264 ----a-w- c:\windows\system32\msrle32.dll
2009-11-24 06:03:54 196608 ----a-w- c:\windows\system32\HMIPCore.dll

============= FINISH: 14:49:22.39 ===============

HijackThis

Hi all,

Just thought I'd add the GMER log to the mix. Would really appreciate peoples feedback on anything they find, thanks.

Had to Zip it due to size.

Merged posts. ~ OB

Attached Files


Edited by Orange Blossom, 21 February 2010 - 10:04 AM.


BC AdBot (Login to Remove)

 


#2 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:04:48 PM

Posted 22 February 2010 - 09:04 PM

Hi,

Welcome to Bleeping Computer. My name is m0le and I will be helping you with your log.
  • Please subscribe to this topic, if you haven't already. You can subscribe by clicking the Options box to the right of your topic title and selecting Track This Topic.

  • Please avoid installing/uninstalling or updating any programs and attempting any unsupervised fixes or scans. This can make helping you impossible.

  • Please reply to this post so I know you are there.
The forum is busy and we need to have replies as soon as possible. If I haven't had a reply after 3 days I will bump the topic and if you do not reply by the following day after that then I will close the topic.

Once I receive a reply then I will return with your first instructions.

Thanks thumbup2.gif
Posted Image
m0le is a proud member of UNITE

#3 ozzyo99

ozzyo99
  • Topic Starter

  • Members
  • 6 posts
  • OFFLINE
  •  
  • Local time:02:48 AM

Posted 24 February 2010 - 09:51 AM

Hello mole,

Thanks for the response. Please by all means post instructions for me to follow.

Just so as you're aware, I'm currently travelling, therefore it may on occasion take a number of days to reply to the thread [not all of the places I'm staying at have internet connectivity].

Thanks in advance.


#4 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:04:48 PM

Posted 24 February 2010 - 06:44 PM

There isn't anything showing but then this is a sneaky rootkit that NOD32 is flagging.

Please download ComboFix from one of these locations:* IMPORTANT !!! Save ComboFix.exe to your Desktop making sure you rename it comfix.exe
  • Disable your AntiVirus and AntiSpyware applications, usually via a right click on the System Tray icon. They may otherwise interfere with our tools. (Click on this link to see a list of programs that should be disabled. The list is not all inclusive.)
  • Double click on Combofix.exe & follow the prompts.
  • As part of it's process, ComboFix will check to see if the Microsoft Windows Recovery Console is installed. With malware infections being as they are today, it's strongly recommended to have this pre-installed on your machine before doing any malware removal. It will allow you to boot up into a special recovery/repair mode that will allow us to more easily help you should your computer have a problem after an attempted removal of malware.
  • Follow the prompts to allow ComboFix to download and install the Microsoft Windows Recovery Console, and when prompted, agree to the End-User License Agreement to install the Microsoft Windows Recovery Console.
**Please note: If the Microsoft Windows Recovery Console is already installed, ComboFix will continue it's malware removal procedures.



Once the Microsoft Windows Recovery Console is installed using ComboFix, you should see the following message:



Click on Yes, to continue scanning for malware.

When finished, it shall produce a log for you. Please include the C:\ComboFix.txt in your next reply.

Thanks thumbup2.gif
Posted Image
m0le is a proud member of UNITE

#5 ozzyo99

ozzyo99
  • Topic Starter

  • Members
  • 6 posts
  • OFFLINE
  •  
  • Local time:02:48 AM

Posted 24 February 2010 - 11:32 PM

Here's the combofix log, ignore the Combofix.exe name.

Something I recently discovered is that from my profile 'James' I cannot see a C:\Documents and settings\James directory, yet I can still see the All Users/Default User directorys. I'm not sure if this was viewable before, but I am aware of a few suspect .exe's [which Combofix found] hiding in there, including Voada.exe which NOD found, and I thought deleted last week... I also manually deleted any reg entries pertaining to "voada".

Anyway, here's the log [I couldn't install the RC due to my inet dropping out at that precise moment, but can do now if I run it again, recommended?]

Start of log
---------------

ComboFix 10-02-24.01 - James 25/02/2010 14:05:16.1.2 - x86
Microsoft Windows XP Professional 5.1.2600.3.1252.44.1033.18.1015.267 [GMT 10:00]
Running from: c:\documents and settings\James\Desktop\ComboFix6.exe
AV: ESET NOD32 Antivirus 4.0 *On-access scanning disabled* (Updated) {E5E70D32-0101-4F12-8FB0-D96ACA4F34C0}

WARNING -THIS MACHINE DOES NOT HAVE THE RECOVERY CONSOLE INSTALLED !!
.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.

c:\documents and settings\James\vaoada.exe
c:\documents and settings\James\wurif.exe
c:\documents and settings\James\yaaidi.exe

.
((((((((((((((((((((((((( Files Created from 2010-01-25 to 2010-02-25 )))))))))))))))))))))))))))))))
.

2010-02-25 03:50 . 2010-02-25 03:50 -------- d-----w- c:\program files\Movie
2010-02-22 22:52 . 2010-02-22 22:52 -------- d-----w- c:\documents and settings\James\Local Settings\Application Data\PCHealth
2010-02-21 15:08 . 2010-02-21 15:08 -------- d-----w- c:\program files\Common Files\Java
2010-02-21 15:07 . 2010-02-21 15:07 348160 ----a-w- c:\documents and settings\James\Application Data\Sun\Java\Deployment\SystemCache\6.0\54\1a209876-19742e58-n\msvcr71.dll
2010-02-21 15:07 . 2010-02-21 15:07 503808 ----a-w- c:\documents and settings\James\Application Data\Sun\Java\Deployment\SystemCache\6.0\54\1a209876-19742e58-n\msvcp71.dll
2010-02-21 15:07 . 2010-02-21 15:07 499712 ----a-w- c:\documents and settings\James\Application Data\Sun\Java\Deployment\SystemCache\6.0\54\1a209876-19742e58-n\jmc.dll
2010-02-21 15:07 . 2010-02-21 15:07 61440 ----a-w- c:\documents and settings\James\Application Data\Sun\Java\Deployment\SystemCache\6.0\17\6d0ad391-6a62481d-n\decora-sse.dll
2010-02-21 15:07 . 2010-02-21 15:07 12800 ----a-w- c:\documents and settings\James\Application Data\Sun\Java\Deployment\SystemCache\6.0\17\6d0ad391-6a62481d-n\decora-d3d.dll
2010-02-21 08:16 . 2008-03-01 17:28 206608 ----a-w- c:\windows\system32\drivers\TMPassthru.sys
2010-02-21 08:16 . 2010-02-21 08:16 -------- d-----w- c:\program files\Trend Micro
2010-02-21 02:45 . 2010-02-21 02:45 161296 ----a-w- c:\windows\system32\drivers\tmcomm.sys
2010-02-21 02:40 . 2010-02-21 02:40 388096 ----a-r- c:\documents and settings\James\Application Data\Microsoft\Installer\{0761C9A8-8F3A-4216-B4A7-B7AFBF24A24A}\HiJackThis.exe
2010-02-21 02:39 . 2010-02-21 02:39 -------- d-----w- c:\program files\TrendMicro
2010-02-20 08:15 . 2010-02-20 08:23 -------- d-----w- c:\documents and settings\James\Application Data\avidemux
2010-02-20 08:13 . 2010-02-20 08:15 -------- d-----w- c:\program files\Avidemux 2.5
2010-02-20 00:36 . 2010-02-20 00:40 -------- d-----w- c:\documents and settings\James\Local Settings\Application Data\Temp
2010-02-20 00:36 . 2010-02-20 00:41 -------- d-----w- c:\documents and settings\James\Local Settings\Application Data\Google
2010-02-19 15:31 . 2009-12-31 16:50 353792 -c----w- c:\windows\system32\dllcache\srv.sys
2010-02-19 15:27 . 2009-12-04 18:22 455424 -c----w- c:\windows\system32\dllcache\mrxsmb.sys
2010-02-19 15:10 . 2010-02-19 15:10 -------- d-----w- c:\documents and settings\James\Application Data\TrojanHunter
2010-02-19 14:30 . 2010-02-20 08:05 -------- d-----w- c:\program files\TrojanHunter 5.2
2010-02-19 12:01 . 2010-01-14 01:12 181120 ------w- c:\windows\system32\MpSigStub.exe
2010-02-19 11:55 . 2010-02-19 11:55 -------- d-----w- c:\program files\Windows Defender
2010-02-19 11:40 . 2010-02-19 12:20 -------- d-----w- c:\program files\Spybot - Search & Destroy
2010-02-19 11:40 . 2010-02-19 11:49 -------- d-----w- c:\documents and settings\All Users\Application Data\Spybot - Search & Destroy
2010-02-19 10:48 . 2008-04-13 08:40 34688 -c--a-w- c:\windows\system32\dllcache\lbrtfdc.sys
2010-02-19 10:48 . 2008-04-13 08:40 34688 ----a-w- c:\windows\system32\drivers\lbrtfdc.sys
2010-02-19 10:47 . 2008-04-13 08:41 8576 -c--a-w- c:\windows\system32\dllcache\i2omgmt.sys
2010-02-19 10:47 . 2008-04-13 08:41 8576 ----a-w- c:\windows\system32\drivers\i2omgmt.sys
2010-02-19 10:47 . 2008-04-13 08:40 8192 -c--a-w- c:\windows\system32\dllcache\changer.sys
2010-02-19 10:47 . 2008-04-13 08:40 8192 ----a-w- c:\windows\system32\drivers\changer.sys
2010-02-19 02:17 . 2010-02-19 02:17 -------- d-----w- c:\windows\system32\windows media
2010-02-19 02:16 . 2010-02-19 02:17 -------- d--h--w- c:\windows\msdownld.tmp
2010-02-19 01:53 . 2010-02-19 01:53 -------- d--h--w- c:\windows\system32\GroupPolicy
2010-02-17 12:08 . 2010-02-17 12:08 -------- d-----w- c:\documents and settings\James\Application Data\Malwarebytes
2010-02-17 12:08 . 2010-01-07 05:07 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2010-02-17 12:07 . 2010-02-17 12:07 -------- d-----w- c:\documents and settings\All Users\Application Data\Malwarebytes
2010-02-17 12:07 . 2010-01-07 05:07 19160 ----a-w- c:\windows\system32\drivers\mbam.sys
2010-02-17 12:07 . 2010-02-17 12:08 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
2010-02-12 23:07 . 2010-02-12 23:07 -------- d-----w- c:\program files\WindSolutions
2010-02-11 19:32 . 2010-02-11 19:32 -------- d-----w- c:\documents and settings\LocalService\Application Data\ABIG
2010-02-11 12:35 . 2010-02-11 12:35 -------- d-----w- c:\documents and settings\LocalService\Local Settings\Application Data\ESET
2010-02-11 12:32 . 2010-02-11 12:32 -------- d-----w- c:\documents and settings\James\Local Settings\Application Data\ESET
2010-02-11 12:14 . 2010-02-11 12:14 -------- d-----w- c:\program files\ESET
2010-02-11 12:14 . 2010-02-11 12:14 -------- d-----w- c:\documents and settings\All Users\Application Data\ESET
2010-02-09 00:52 . 2010-02-09 00:52 -------- d-----w- c:\program files\TCP IP Manager

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2010-02-25 04:16 . 2009-02-24 10:51 -------- d-----w- c:\documents and settings\James\Application Data\uTorrent
2010-02-24 04:13 . 2009-12-24 22:39 -------- d-----w- c:\documents and settings\James\Application Data\foobar2000
2010-02-21 15:03 . 2009-04-16 18:05 411368 -c--a-w- c:\windows\system32\deploytk.dll
2010-02-21 11:18 . 2009-10-27 12:51 -------- d-----w- c:\documents and settings\James\Application Data\Skype
2010-02-21 09:14 . 2009-10-27 12:53 -------- d-----w- c:\documents and settings\James\Application Data\skypePM
2010-02-21 08:16 . 2008-10-29 12:56 -------- d--h--w- c:\program files\InstallShield Installation Information
2010-02-20 08:04 . 2009-11-18 02:20 -------- d-----w- c:\program files\DivX
2010-02-13 00:00 . 2009-11-26 12:15 -------- d-----w- c:\documents and settings\All Users\Application Data\WindSolutions
2010-02-11 11:31 . 2009-12-23 01:04 -------- d-----w- c:\program files\Flickr Uploadr
2010-01-20 21:20 . 2009-11-26 13:43 -------- d-----w- c:\documents and settings\James\Application Data\Apple Computer
2010-01-20 20:06 . 2010-01-20 20:06 -------- d-----w- c:\program files\iPhoneBrowse
2010-01-20 03:05 . 2010-01-20 03:04 -------- d-----w- c:\program files\iPod
2010-01-20 03:04 . 2009-11-26 12:37 -------- d-----w- c:\program files\Common Files\Apple
2010-01-20 02:48 . 2009-12-12 12:18 -------- d-----w- c:\program files\QuickTime
2010-01-20 02:33 . 2009-12-31 04:06 -------- d-----w- c:\program files\Hide My IP 2009
2010-01-13 17:22 . 2010-01-13 17:22 -------- d-----w- c:\program files\ECAP
2010-01-13 14:50 . 2008-10-29 12:59 -------- d-----w- c:\program files\Common Files\InstallShield
2010-01-03 03:10 . 2010-01-03 03:10 -------- d-----w- c:\program files\SopCast
2009-12-31 16:50 . 2004-08-04 12:00 353792 ----a-w- c:\windows\system32\drivers\srv.sys
2009-12-31 14:23 . 2009-12-31 14:23 -------- d-----w- c:\program files\LeahScape
2009-12-31 14:23 . 2009-12-31 14:23 -------- d-----w- c:\documents and settings\James\Application Data\FoxyProxy
2009-12-28 03:22 . 2009-12-28 03:22 -------- d-----w- c:\program files\Haali
2009-12-28 03:22 . 2009-12-28 03:22 -------- d-----w- c:\program files\CoreCodec
2009-12-27 14:09 . 2009-12-27 14:09 2944 ---ha-w- c:\windows\system32\drivers\dciiodrv.sys
2009-12-21 19:14 . 2004-08-04 12:00 916480 ----a-w- c:\windows\system32\wininet.dll
2009-12-16 18:43 . 2008-10-29 12:06 343040 ----a-w- c:\windows\system32\mspaint.exe
2009-12-14 16:33 . 2008-10-29 13:15 53248 -c--a-w- c:\windows\system32\CSVer.dll
2009-12-14 07:08 . 2004-08-04 12:00 33280 ----a-w- c:\windows\system32\csrsrv.dll
2009-12-08 19:26 . 2004-08-04 12:00 2145280 ----a-w- c:\windows\system32\ntoskrnl.exe
2009-12-08 18:43 . 2004-08-03 22:59 2023936 ----a-w- c:\windows\system32\ntkrnlpa.exe
2009-12-04 18:22 . 2004-08-04 12:00 455424 ----a-w- c:\windows\system32\drivers\mrxsmb.sys
2009-11-27 17:11 . 2004-08-04 12:00 1291776 ----a-w- c:\windows\system32\quartz.dll
2009-11-27 17:11 . 2004-08-04 00:56 17920 ----a-w- c:\windows\system32\msyuv.dll
2009-11-27 16:07 . 2004-08-04 12:00 28672 ----a-w- c:\windows\system32\msvidc32.dll
2009-11-27 16:07 . 2001-08-17 22:36 8704 ----a-w- c:\windows\system32\tsbyuv.dll
2009-11-27 16:07 . 2004-08-04 12:00 84992 ----a-w- c:\windows\system32\avifil32.dll
2009-11-27 16:07 . 2004-08-04 12:00 11264 ----a-w- c:\windows\system32\msrle32.dll
2009-11-27 16:07 . 2004-08-04 00:56 48128 ----a-w- c:\windows\system32\iyuv_32.dll
.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shelliconoverlayidentifiers\IconOverlay1EXL600]
@="{BF9B13E4-FE9B-4121-853F-866F4E9E2830}"
[HKEY_CLASSES_ROOT\CLSID\{BF9B13E4-FE9B-4121-853F-866F4E9E2830}]
2008-04-16 13:55 599552 ----a-w- c:\windows\system32\FPAP-EXL600\FileptcIconOverlay.dll

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"MSMSGS"="c:\program files\Messenger\msmsgs.exe" [2008-04-14 1695232]
"SpybotSD TeaTimer"="c:\program files\Spybot - Search & Destroy\TeaTimer.exe" [2009-03-05 2260480]
"Google Update"="c:\documents and settings\James\Local Settings\Application Data\Google\Update\GoogleUpdate.exe" [2010-02-20 135664]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"AsusACPIServer"="c:\program files\EeePC\ACPI\AsAcpiSvr.exe" [2008-06-03 479232]
"AsusEPCMonitor"="c:\program files\EeePC\ACPI\AsEPCMon.exe" [2008-05-21 94208]
"RTHDCPL"="RTHDCPL.EXE" [2008-05-26 16862720]
"SoundMan"="SOUNDMAN.EXE" [2006-07-21 86016]
"AlcWzrd"="ALCWZRD.EXE" [2006-05-04 2808832]
"ETDWare"="c:\program files\Elantech\ETDCtrl.exe" [2009-01-23 416768]
"MbWzdFPAP-EXL600"="c:\windows\system32\FPAP-EXL600\PdtGuide.exe" [2008-04-16 1030656]
"HotKeysCmds"="c:\windows\system32\hkcmd.exe" [2008-02-15 74752]
"iTunesHelper"="d:\program files\iTunes\iTunesHelper.exe" [2009-11-12 141600]
"egui"="c:\program files\ESET\ESET NOD32 Antivirus\egui.exe" [2009-05-14 2029640]
"Windows Defender"="c:\program files\Windows Defender\MSASCui.exe" [2006-11-03 866584]
"TMRUBottedTray"="c:\program files\Trend Micro\RUBotted\TMRUBottedTray.exe" [2008-11-06 288088]
"SunJavaUpdateSched"="c:\program files\Common Files\Java\Java Update\jusched.exe" [2010-01-11 246504]
"QuickTime Task"="c:\program files\QuickTime\qttask.exe" [2009-11-11 417792]

[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run]
"CTFMON.EXE"="c:\windows\system32\ctfmon.exe" [2008-04-14 15360]

c:\documents and settings\All Users\Start Menu\Programs\Startup\
AutoRun OSCleaner.lnk - c:\program files\ASUS\Asus OS Cleaner\AsOSCleaner.exe [2008-10-30 118784]
SuperHybridEngine.lnk - c:\program files\Asus\EeePC\Super Hybrid Engine\SuperHybridEngine.exe [2008-10-30 294912]

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\WinDefend]
@="Service"

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\AsusTray]
2008-06-03 13:43 98304 ----a-w- c:\program files\EeePC\ACPI\AsTray.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\IgfxTray]
2008-04-22 20:15 47104 ----a-w- c:\windows\system32\AsTray.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\MSMSGS]
2008-04-14 00:12 1695232 ----a-w- c:\program files\Messenger\msmsgs.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\QuickTime Task]
2009-11-11 04:08 417792 ----a-w- c:\program files\QuickTime\QTTask.exe

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run-]
"QuickTime Task"="c:\program files\QuickTime\qttask.exe" -atboottime

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=
"c:\\Program Files\\uTorrent\\uTorrent.exe"=
"c:\\Program Files\\Skype\\Plugin Manager\\skypePM.exe"=
"c:\\utorrent.exe"=
"c:\\Program Files\\Bonjour\\mDNSResponder.exe"=
"d:\\Program Files\\iTunes\\iTunes.exe"=
"c:\\WINDOWS\\Network Diagnostic\\xpnetdiag.exe"=
"c:\\Program Files\\Messenger\\msmsgs.exe"=
"c:\\Program Files\\Skype\\Phone\\Skype.exe"=
"c:\\Program Files\\ASUS\\ASUSUpdate for Eee PC\\Update.exe"=

R1 ehdrv;ehdrv;c:\windows\system32\drivers\ehdrv.sys [14/05/2009 14:47 107256]
R1 epfwtdir;epfwtdir;c:\windows\system32\drivers\epfwtdir.sys [14/05/2009 14:49 94360]
R2 ekrn;ESET Service;c:\program files\ESET\ESET NOD32 Antivirus\ekrn.exe [14/05/2009 14:47 731840]
R2 WinDefend;Windows Defender;c:\program files\Windows Defender\MsMpEng.exe [03/11/2006 19:19 13592]
R3 RT80x86;Ralink 802.11n Wireless Driver;c:\windows\system32\drivers\rt2860.sys [29/10/2008 22:56 625024]
R3 TMPassthruMP;TMPassthruMP;c:\windows\system32\drivers\TMPassthru.sys [21/02/2010 18:16 206608]
S2 RUBotted;Trend Micro RUBotted Service;c:\program files\Trend Micro\RUBotted\TMRUBotted.exe [21/02/2010 18:16 582992]
S3 dciiodrv;dciiodrv;c:\windows\system32\drivers\dciiodrv.sys [28/12/2009 00:09 2944]
S3 GTUHSBUS;GT UHS BUS;c:\windows\system32\drivers\gtuhsbus.sys [17/04/2009 03:44 58880]
S3 GTUHSNDISIPXP;GT UHS IP NDIS;c:\windows\system32\drivers\gtuhs51.sys [17/04/2009 03:45 106112]
S3 GTUHSOMS;GT UHS OMS;c:\windows\system32\drivers\gtuhsoms.sys [17/04/2009 03:45 18816]
S3 GTUHSSER;GT UHS SER;c:\windows\system32\drivers\gtuhsser.sys [17/04/2009 03:45 8064]
S3 PortTalk;PortTalk;c:\windows\system32\drivers\porttalk.sys [28/12/2009 13:32 3567]
S3 TMPassthru;Trend Micro Passthru Ndis Service;c:\windows\system32\drivers\TMPassthru.sys [21/02/2010 18:16 206608]
.
Contents of the 'Scheduled Tasks' folder

2010-02-19 c:\windows\Tasks\AppleSoftwareUpdate.job
- c:\program files\Apple Software Update\SoftwareUpdate.exe [2008-07-30 17:34]

2010-02-25 c:\windows\Tasks\GoogleUpdateTaskUserS-1-5-21-1390067357-413027322-725345543-1003Core.job
- c:\documents and settings\James\Local Settings\Application Data\Google\Update\GoogleUpdate.exe [2010-02-20 00:35]

2010-02-25 c:\windows\Tasks\GoogleUpdateTaskUserS-1-5-21-1390067357-413027322-725345543-1003UA.job
- c:\documents and settings\James\Local Settings\Application Data\Google\Update\GoogleUpdate.exe [2010-02-20 00:35]

2010-02-24 c:\windows\Tasks\MP Scheduled Scan.job
- c:\program files\Windows Defender\MpCmdRun.exe [2006-11-03 09:20]

2012-01-11 c:\windows\Tasks\User_Feed_Synchronization-{053E6B62-DB3E-494E-8334-4B26E1CAD63A}.job
- c:\windows\system32\msfeedssync.exe [2007-08-13 08:31]
.
.
------- Supplementary Scan -------
.
uStart Page = hxxp://ehgringo.blogspot.com/
TCP: {8830D1C2-5DFA-4D0F-A8DA-F66B89519A94} = 8.8.8.8,8.8.4.4
DPF: {3D3B42C2-11BF-4732-A304-A01384B70D68} - hxxp://picasaweb.google.co.uk/s/v/56.42/uploader2.cab
FF - ProfilePath - c:\documents and settings\James\Application Data\Mozilla\Firefox\Profiles\16ap9ne3.default\
FF - prefs.js: browser.startup.homepage - hxxp://ehgringo.blogspot.com/
FF - plugin: c:\documents and settings\James\Local Settings\Application Data\Google\Update\1.2.183.13\npGoogleOneClick8.dll
FF - plugin: d:\program files\iTunes\Mozilla Plugins\npitunes.dll
.
- - - - ORPHANS REMOVED - - - -

MSConfigStartUp-SunJavaUpdateSched - c:\program files\Java\jre6\bin\jusched.exe



**************************************************************************

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2010-02-25 14:15
Windows 5.1.2600 Service Pack 3 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully
hidden files: 0

**************************************************************************
.
--------------------- DLLs Loaded Under Running Processes ---------------------

- - - - - - - > 'winlogon.exe'(968)
c:\windows\system32\igfxdev.dll
.
Completion time: 2010-02-25 14:23:19
ComboFix-quarantined-files.txt 2010-02-25 04:23

Pre-Run: 196,796,416 bytes free
Post-Run: 229,416,960 bytes free

- - End Of File - - FD25C61BCB2667B43B631E78016E6329


#6 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:04:48 PM

Posted 25 February 2010 - 07:25 AM

Not as bad as I thought. smile.gif

Can you run these two programs to do a sweep scan of the system

Please download Malwarebytes Anti-Malware and save it to your desktop.
  • Make sure you are connected to the Internet.
  • Double-click on mbam-setup.exe to install the application or, if you are using Vista, right-click and select Run As Administrator on mbam-setup.exe to install the application.
  • When the installation begins, follow the prompts and do not make any changes to default settings.
  • When installation has finished, make sure you leave both of these checked:
    • Update Malwarebytes' Anti-Malware
    • Launch Malwarebytes' Anti-Malware
  • Then click Finish.
  • MBAM will automatically start and you will be asked to update the program before performing a scan. If an update is found, the program will automatically update itself. Press the OK button to close that box and continue. If you encounter any problems while downloading the updates, manually download them from here and just double-click on mbam-rules.exe to install.
  • On the Scanner tab:
    • Make sure the "Perform Full Scan" option is selected.
    • Then click on the Scan button.
  • If asked to select the drives to scan, leave all the drives selected and click on the Start Scan button.
  • The scan will begin and "Scan in progress" will show at the top. It may take some time to complete so please be patient.
  • When the scan is finished, a message box will say "The scan completed successfully. Click 'Show Results' to display all objects found".
  • Click OK to close the message box and continue with the removal process.
  • Back at the main Scanner screen, click on the Show Results button to see a list of any malware that was found.
  • Make sure that everything is checked, and click Remove Selected.
  • When removal is completed, a log report will open in Notepad.
  • The log is automatically saved and can be viewed by clicking the Logs tab in MBAM.
  • Copy and paste the contents of that report in your next reply and exit MBAM.
Note: If MBAM encounters a file that is difficult to remove, you may be asked to reboot your computer so it can proceed with the disinfection process. Regardless if prompted to restart the computer or not, please do so immediately. Failure to reboot normally (not into safe mode) will prevent MBAM from removing all the malware. MBAM may make changes to your registry as part of its disinfection routine. If you're using other security programs that detect registry changes, they may alert you after scanning with MBAM. Please permit the program to allow the changes.


Then ESET for an online scan

I'd like us to scan your machine with ESET OnlineScan
  1. Hold down Control and click on the following link to open ESET OnlineScan in a new window.
    ESET OnlineScan
  2. Click the button.
  3. For alternate browsers only: (Microsoft Internet Explorer users can skip these steps)
    1. Click on to download the ESET Smart Installer. Save it to your desktop.
    2. Double click on the icon on your desktop.
  4. Check
  5. Click the button.
  6. Accept any security warnings from your browser.
  7. Check
  8. Push the Start button.
  9. ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this can take some time.
  10. When the scan completes, push
  11. Push , and save the file to your desktop using a unique name, such as ESETScan. Include the contents of this report in your next reply.
  12. Push the button.
  13. Push

Thanks thumbup2.gif



Posted Image
m0le is a proud member of UNITE

#7 ozzyo99

ozzyo99
  • Topic Starter

  • Members
  • 6 posts
  • OFFLINE
  •  
  • Local time:02:48 AM

Posted 25 February 2010 - 11:33 PM

Hi Mole,

The ESET online scan, and the MBAM scans all came back completely clean.

Any further steps? My main concern is a hidden rootkit somewhere, but having tried the main tools available, none seem to find anything - but then TDSS is a royal PITA to detect from what I've read.

FYI, NOD or anything else has quarantined or detected any further infections. Willing to try some other methods if you have further ideas.

[The definitions for NOD/MBAM/Spybot are all up to date]

Thanks, thus far for the help.

Edited by ozzyo99, 25 February 2010 - 11:34 PM.


#8 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:04:48 PM

Posted 26 February 2010 - 07:31 AM

Yes, TDSS is a major player at the moment.

Usually most infections by this rootkit would have either been scanned and found or the symptoms would have stalled our attempts to kill it. Combofix usually removes it but it hasn't always and so to double-check the files it infects and for your peace of mind please run TDSSKiller.

  • Download TDSSKiller and save it to your Desktop.

  • Extract its contents to your desktop and make sure TDSSKiller.exe (the contents of the zipped file) is on the Desktop itself, not within a folder on the desktop.

  • Go to Start > Run (Or you can hold down your Windows key and press R) and copy and paste the following into the text field. (make sure you include the quote marks) Then press OK.

    "%userprofile%\Desktop\TDSSKiller.exe" -l C:\TDSSKiller.txt -v

  • If it says "Hidden service detected" DO NOT type anything in. Just press Enter on your keyboard to leave the file alone
    .
  • When it is done, a log file should be created on your C: drive called "TDSSKiller.txt" please copy and paste the contents of that file here (or attach it).
If that's clean then we can go to the final instructions. thumbup2.gif
Posted Image
m0le is a proud member of UNITE

#9 ozzyo99

ozzyo99
  • Topic Starter

  • Members
  • 6 posts
  • OFFLINE
  •  
  • Local time:02:48 AM

Posted 26 February 2010 - 11:59 AM

Clean

02:57:11:000 2784 TDSS rootkit removing tool 2.2.7 Feb 25 2010 10:44:44
02:57:11:000 2784 ================================================================================
02:57:11:000 2784 SystemInfo:

02:57:11:000 2784 OS Version: 5.1.2600 ServicePack: 3.0
02:57:11:000 2784 Product type: Workstation
02:57:11:000 2784 ComputerName: PCJJV44H3JDHJ
02:57:11:000 2784 UserName: James
02:57:11:000 2784 Windows directory: C:\WINDOWS
02:57:11:000 2784 Processor architecture: Intel x86
02:57:11:000 2784 Number of processors: 2
02:57:11:000 2784 Page size: 0x1000
02:57:11:000 2784 Boot type: Normal boot
02:57:11:000 2784 ================================================================================
02:57:11:000 2784 UnloadDriverW: NtUnloadDriver error 2
02:57:11:000 2784 ForceUnloadDriverW: UnloadDriverW(klmd21) error 2
02:57:11:500 2784 Initialize success
02:57:11:500 2784
02:57:11:500 2784 Scanning Services ...
02:57:11:500 2784 wfopen_ex: Trying to open file C:\WINDOWS\system32\config\system
02:57:11:500 2784 wfopen_ex: MyNtCreateFileW error 32 (C0000043)
02:57:11:500 2784 wfopen_ex: Trying to KLMD file open
02:57:11:500 2784 wfopen_ex: File opened ok (Flags 2)
02:57:11:500 2784 wfopen_ex: Trying to open file C:\WINDOWS\system32\config\software
02:57:11:500 2784 wfopen_ex: MyNtCreateFileW error 32 (C0000043)
02:57:11:500 2784 wfopen_ex: Trying to KLMD file open
02:57:11:500 2784 wfopen_ex: File opened ok (Flags 2)
02:57:13:031 2784 GetAdvancedServicesInfo: Raw services enum returned 318 services
02:57:13:031 2784 fclose_ex: Trying to close file C:\WINDOWS\system32\config\system
02:57:13:031 2784 fclose_ex: Trying to close file C:\WINDOWS\system32\config\software
02:57:13:031 2784
02:57:13:031 2784 Scanning Kernel memory ...
02:57:13:031 2784 Devices to scan: 6
02:57:13:031 2784
02:57:13:031 2784 Driver Name: Disk
02:57:13:031 2784 IRP_MJ_CREATE : F75CEBB0
02:57:13:031 2784 IRP_MJ_CREATE_NAMED_PIPE : 804F4562
02:57:13:031 2784 IRP_MJ_CLOSE : F75CEBB0
02:57:13:031 2784 IRP_MJ_READ : F75C8D1F
02:57:13:031 2784 IRP_MJ_WRITE : F75C8D1F
02:57:13:031 2784 IRP_MJ_QUERY_INFORMATION : 804F4562
02:57:13:031 2784 IRP_MJ_SET_INFORMATION : 804F4562
02:57:13:046 2784 IRP_MJ_QUERY_EA : 804F4562
02:57:13:046 2784 IRP_MJ_SET_EA : 804F4562
02:57:13:046 2784 IRP_MJ_FLUSH_BUFFERS : F75C92E2
02:57:13:046 2784 IRP_MJ_QUERY_VOLUME_INFORMATION : 804F4562
02:57:13:046 2784 IRP_MJ_SET_VOLUME_INFORMATION : 804F4562
02:57:13:046 2784 IRP_MJ_DIRECTORY_CONTROL : 804F4562
02:57:13:046 2784 IRP_MJ_FILE_SYSTEM_CONTROL : 804F4562
02:57:13:046 2784 IRP_MJ_DEVICE_CONTROL : F75C93BB
02:57:13:046 2784 IRP_MJ_INTERNAL_DEVICE_CONTROL : F75CCF28
02:57:13:046 2784 IRP_MJ_SHUTDOWN : F75C92E2
02:57:13:046 2784 IRP_MJ_LOCK_CONTROL : 804F4562
02:57:13:046 2784 IRP_MJ_CLEANUP : 804F4562
02:57:13:046 2784 IRP_MJ_CREATE_MAILSLOT : 804F4562
02:57:13:046 2784 IRP_MJ_QUERY_SECURITY : 804F4562
02:57:13:046 2784 IRP_MJ_SET_SECURITY : 804F4562
02:57:13:046 2784 IRP_MJ_POWER : F75CAC82
02:57:13:046 2784 IRP_MJ_SYSTEM_CONTROL : F75CF99E
02:57:13:046 2784 IRP_MJ_DEVICE_CHANGE : 804F4562
02:57:13:046 2784 IRP_MJ_QUERY_QUOTA : 804F4562
02:57:13:046 2784 IRP_MJ_SET_QUOTA : 804F4562
02:57:13:046 2784 sion
02:57:13:046 2784 C:\WINDOWS\system32\DRIVERS\disk.sys - Verdict: Clean
02:57:13:046 2784
02:57:13:046 2784 Driver Name: usbstor
02:57:13:046 2784 IRP_MJ_CREATE : F7915218
02:57:13:046 2784 IRP_MJ_CREATE_NAMED_PIPE : 804F4562
02:57:13:046 2784 IRP_MJ_CLOSE : F7915218
02:57:13:046 2784 IRP_MJ_READ : F791523C
02:57:13:046 2784 IRP_MJ_WRITE : F791523C
02:57:13:046 2784 IRP_MJ_QUERY_INFORMATION : 804F4562
02:57:13:046 2784 IRP_MJ_SET_INFORMATION : 804F4562
02:57:13:046 2784 IRP_MJ_QUERY_EA : 804F4562
02:57:13:046 2784 IRP_MJ_SET_EA : 804F4562
02:57:13:046 2784 IRP_MJ_FLUSH_BUFFERS : 804F4562
02:57:13:046 2784 IRP_MJ_QUERY_VOLUME_INFORMATION : 804F4562
02:57:13:046 2784 IRP_MJ_SET_VOLUME_INFORMATION : 804F4562
02:57:13:046 2784 IRP_MJ_DIRECTORY_CONTROL : 804F4562
02:57:13:046 2784 IRP_MJ_FILE_SYSTEM_CONTROL : 804F4562
02:57:13:046 2784 IRP_MJ_DEVICE_CONTROL : F7915180
02:57:13:046 2784 IRP_MJ_INTERNAL_DEVICE_CONTROL : F79109E6
02:57:13:046 2784 IRP_MJ_SHUTDOWN : 804F4562
02:57:13:046 2784 IRP_MJ_LOCK_CONTROL : 804F4562
02:57:13:046 2784 IRP_MJ_CLEANUP : 804F4562
02:57:13:046 2784 IRP_MJ_CREATE_MAILSLOT : 804F4562
02:57:13:046 2784 IRP_MJ_QUERY_SECURITY : 804F4562
02:57:13:046 2784 IRP_MJ_SET_SECURITY : 804F4562
02:57:13:046 2784 IRP_MJ_POWER : F79145F0
02:57:13:046 2784 IRP_MJ_SYSTEM_CONTROL : F7912A6E
02:57:13:046 2784 IRP_MJ_DEVICE_CHANGE : 804F4562
02:57:13:046 2784 IRP_MJ_QUERY_QUOTA : 804F4562
02:57:13:046 2784 IRP_MJ_SET_QUOTA : 804F4562
02:57:13:078 2784 siohd: 0
02:57:13:156 2784 C:\WINDOWS\system32\DRIVERS\USBSTOR.SYS - Verdict: Clean
02:57:13:156 2784
02:57:13:156 2784 Driver Name: Disk
02:57:13:156 2784 IRP_MJ_CREATE : F75CEBB0
02:57:13:156 2784 IRP_MJ_CREATE_NAMED_PIPE : 804F4562
02:57:13:156 2784 IRP_MJ_CLOSE : F75CEBB0
02:57:13:156 2784 IRP_MJ_READ : F75C8D1F
02:57:13:156 2784 IRP_MJ_WRITE : F75C8D1F
02:57:13:156 2784 IRP_MJ_QUERY_INFORMATION : 804F4562
02:57:13:156 2784 IRP_MJ_SET_INFORMATION : 804F4562
02:57:13:156 2784 IRP_MJ_QUERY_EA : 804F4562
02:57:13:156 2784 IRP_MJ_SET_EA : 804F4562
02:57:13:156 2784 IRP_MJ_FLUSH_BUFFERS : F75C92E2
02:57:13:156 2784 IRP_MJ_QUERY_VOLUME_INFORMATION : 804F4562
02:57:13:156 2784 IRP_MJ_SET_VOLUME_INFORMATION : 804F4562
02:57:13:156 2784 IRP_MJ_DIRECTORY_CONTROL : 804F4562
02:57:13:156 2784 IRP_MJ_FILE_SYSTEM_CONTROL : 804F4562
02:57:13:156 2784 IRP_MJ_DEVICE_CONTROL : F75C93BB
02:57:13:156 2784 IRP_MJ_INTERNAL_DEVICE_CONTROL : F75CCF28
02:57:13:156 2784 IRP_MJ_SHUTDOWN : F75C92E2
02:57:13:156 2784 IRP_MJ_LOCK_CONTROL : 804F4562
02:57:13:156 2784 IRP_MJ_CLEANUP : 804F4562
02:57:13:156 2784 IRP_MJ_CREATE_MAILSLOT : 804F4562
02:57:13:156 2784 IRP_MJ_QUERY_SECURITY : 804F4562
02:57:13:156 2784 IRP_MJ_SET_SECURITY : 804F4562
02:57:13:156 2784 IRP_MJ_POWER : F75CAC82
02:57:13:156 2784 IRP_MJ_SYSTEM_CONTROL : F75CF99E
02:57:13:156 2784 IRP_MJ_DEVICE_CHANGE : 804F4562
02:57:13:156 2784 IRP_MJ_QUERY_QUOTA : 804F4562
02:57:13:156 2784 IRP_MJ_SET_QUOTA : 804F4562
02:57:13:156 2784 sion
02:57:13:156 2784 C:\WINDOWS\system32\DRIVERS\disk.sys - Verdict: Clean
02:57:13:156 2784
02:57:13:156 2784 Driver Name: Disk
02:57:13:156 2784 IRP_MJ_CREATE : F75CEBB0
02:57:13:156 2784 IRP_MJ_CREATE_NAMED_PIPE : 804F4562
02:57:13:156 2784 IRP_MJ_CLOSE : F75CEBB0
02:57:13:156 2784 IRP_MJ_READ : F75C8D1F
02:57:13:156 2784 IRP_MJ_WRITE : F75C8D1F
02:57:13:156 2784 IRP_MJ_QUERY_INFORMATION : 804F4562
02:57:13:156 2784 IRP_MJ_SET_INFORMATION : 804F4562
02:57:13:156 2784 IRP_MJ_QUERY_EA : 804F4562
02:57:13:156 2784 IRP_MJ_SET_EA : 804F4562
02:57:13:156 2784 IRP_MJ_FLUSH_BUFFERS : F75C92E2
02:57:13:156 2784 IRP_MJ_QUERY_VOLUME_INFORMATION : 804F4562
02:57:13:156 2784 IRP_MJ_SET_VOLUME_INFORMATION : 804F4562
02:57:13:156 2784 IRP_MJ_DIRECTORY_CONTROL : 804F4562
02:57:13:156 2784 IRP_MJ_FILE_SYSTEM_CONTROL : 804F4562
02:57:13:156 2784 IRP_MJ_DEVICE_CONTROL : F75C93BB
02:57:13:156 2784 IRP_MJ_INTERNAL_DEVICE_CONTROL : F75CCF28
02:57:13:156 2784 IRP_MJ_SHUTDOWN : F75C92E2
02:57:13:156 2784 IRP_MJ_LOCK_CONTROL : 804F4562
02:57:13:156 2784 IRP_MJ_CLEANUP : 804F4562
02:57:13:156 2784 IRP_MJ_CREATE_MAILSLOT : 804F4562
02:57:13:156 2784 IRP_MJ_QUERY_SECURITY : 804F4562
02:57:13:156 2784 IRP_MJ_SET_SECURITY : 804F4562
02:57:13:156 2784 IRP_MJ_POWER : F75CAC82
02:57:13:156 2784 IRP_MJ_SYSTEM_CONTROL : F75CF99E
02:57:13:156 2784 IRP_MJ_DEVICE_CHANGE : 804F4562
02:57:13:156 2784 IRP_MJ_QUERY_QUOTA : 804F4562
02:57:13:156 2784 IRP_MJ_SET_QUOTA : 804F4562
02:57:13:156 2784 sion
02:57:13:156 2784 C:\WINDOWS\system32\DRIVERS\disk.sys - Verdict: Clean
02:57:13:156 2784
02:57:13:156 2784 Driver Name: atapi
02:57:13:156 2784 IRP_MJ_CREATE : F73F56F2
02:57:13:156 2784 IRP_MJ_CREATE_NAMED_PIPE : 804F4562
02:57:13:156 2784 IRP_MJ_CLOSE : F73F56F2
02:57:13:156 2784 IRP_MJ_READ : 804F4562
02:57:13:156 2784 IRP_MJ_WRITE : 804F4562
02:57:13:156 2784 IRP_MJ_QUERY_INFORMATION : 804F4562
02:57:13:156 2784 IRP_MJ_SET_INFORMATION : 804F4562
02:57:13:156 2784 IRP_MJ_QUERY_EA : 804F4562
02:57:13:156 2784 IRP_MJ_SET_EA : 804F4562
02:57:13:156 2784 IRP_MJ_FLUSH_BUFFERS : 804F4562
02:57:13:156 2784 IRP_MJ_QUERY_VOLUME_INFORMATION : 804F4562
02:57:13:156 2784 IRP_MJ_SET_VOLUME_INFORMATION : 804F4562
02:57:13:156 2784 IRP_MJ_DIRECTORY_CONTROL : 804F4562
02:57:13:156 2784 IRP_MJ_FILE_SYSTEM_CONTROL : 804F4562
02:57:13:156 2784 IRP_MJ_DEVICE_CONTROL : F73F5712
02:57:13:156 2784 IRP_MJ_INTERNAL_DEVICE_CONTROL : F73F1852
02:57:13:156 2784 IRP_MJ_SHUTDOWN : 804F4562
02:57:13:156 2784 IRP_MJ_LOCK_CONTROL : 804F4562
02:57:13:156 2784 IRP_MJ_CLEANUP : 804F4562
02:57:13:156 2784 IRP_MJ_CREATE_MAILSLOT : 804F4562
02:57:13:156 2784 IRP_MJ_QUERY_SECURITY : 804F4562
02:57:13:156 2784 IRP_MJ_SET_SECURITY : 804F4562
02:57:13:156 2784 IRP_MJ_POWER : F73F573C
02:57:13:156 2784 IRP_MJ_SYSTEM_CONTROL : F73FC336
02:57:13:156 2784 IRP_MJ_DEVICE_CHANGE : 804F4562
02:57:13:156 2784 IRP_MJ_QUERY_QUOTA : 804F4562
02:57:13:156 2784 IRP_MJ_SET_QUOTA : 804F4562
02:57:13:234 2784 siohd: 0
02:57:13:250 2784 C:\WINDOWS\system32\DRIVERS\atapi.sys - Verdict: Clean
02:57:13:250 2784
02:57:13:250 2784 Driver Name: atapi
02:57:13:250 2784 IRP_MJ_CREATE : F73F56F2
02:57:13:250 2784 IRP_MJ_CREATE_NAMED_PIPE : 804F4562
02:57:13:250 2784 IRP_MJ_CLOSE : F73F56F2
02:57:13:250 2784 IRP_MJ_READ : 804F4562
02:57:13:250 2784 IRP_MJ_WRITE : 804F4562
02:57:13:250 2784 IRP_MJ_QUERY_INFORMATION : 804F4562
02:57:13:250 2784 IRP_MJ_SET_INFORMATION : 804F4562
02:57:13:250 2784 IRP_MJ_QUERY_EA : 804F4562
02:57:13:250 2784 IRP_MJ_SET_EA : 804F4562
02:57:13:250 2784 IRP_MJ_FLUSH_BUFFERS : 804F4562
02:57:13:250 2784 IRP_MJ_QUERY_VOLUME_INFORMATION : 804F4562
02:57:13:250 2784 IRP_MJ_SET_VOLUME_INFORMATION : 804F4562
02:57:13:250 2784 IRP_MJ_DIRECTORY_CONTROL : 804F4562
02:57:13:250 2784 IRP_MJ_FILE_SYSTEM_CONTROL : 804F4562
02:57:13:250 2784 IRP_MJ_DEVICE_CONTROL : F73F5712
02:57:13:250 2784 IRP_MJ_INTERNAL_DEVICE_CONTROL : F73F1852
02:57:13:250 2784 IRP_MJ_SHUTDOWN : 804F4562
02:57:13:250 2784 IRP_MJ_LOCK_CONTROL : 804F4562
02:57:13:250 2784 IRP_MJ_CLEANUP : 804F4562
02:57:13:250 2784 IRP_MJ_CREATE_MAILSLOT : 804F4562
02:57:13:250 2784 IRP_MJ_QUERY_SECURITY : 804F4562
02:57:13:250 2784 IRP_MJ_SET_SECURITY : 804F4562
02:57:13:250 2784 IRP_MJ_POWER : F73F573C
02:57:13:250 2784 IRP_MJ_SYSTEM_CONTROL : F73FC336
02:57:13:250 2784 IRP_MJ_DEVICE_CHANGE : 804F4562
02:57:13:250 2784 IRP_MJ_QUERY_QUOTA : 804F4562
02:57:13:250 2784 IRP_MJ_SET_QUOTA : 804F4562
02:57:13:265 2784 siohd: 0
02:57:13:265 2784 C:\WINDOWS\system32\DRIVERS\atapi.sys - Verdict: Clean
02:57:13:281 2784
02:57:13:281 2784 Completed
02:57:13:281 2784
02:57:13:281 2784 Results:
02:57:13:281 2784 Memory objects infected / cured / cured on reboot: 0 / 0 / 0
02:57:13:281 2784 Registry objects infected / cured / cured on reboot: 0 / 0 / 0
02:57:13:281 2784 File objects infected / cured / cured on reboot: 0 / 0 / 0
02:57:13:281 2784
02:57:13:281 2784 KLMD(ARK) unloaded successfully


#10 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:04:48 PM

Posted 26 February 2010 - 06:11 PM

That is clean alright. smile.gif


We can complete the fix now with the final instructions.

You're clean. Good stuff! thumbup2.gif

Let's do some clearing up

Uninstall ComboFix

Remove Combofix now that we're done with it.
  • Please press the Windows Key and R on your keyboard. This will bring up the Run... command.
    (For Vista/Windows 7 please click Start -> All Programs -> Accessories -> Run)
  • Now type in Combofix /Uninstall in the runbox and click OK. (Notice the space between "Combofix" and "/")
  • Please follow the prompts to uninstall Combofix.
  • You will then receive a message saying Combofix was uninstalled successfully once it's done uninstalling itself.
This will uninstall Combofix and anything associated with it.


Download and Run OTC

We will now remove the tools we used during this fix using OTC.
  • Download OTC by OldTimer and save it to your desktop.
  • Double click icon to start the program. If you are using Vista, please right-click and choose run as administrator
  • Then Click the big button.
  • You will get a prompt saying "Being Cleanup Process". Please select Yes.
  • Restart your computer when prompted.
------------------------------------------------------------------------------------------------------------------------

Here's some advice on how you can keep your PC clean


Update your AntiVirus Software

It is imperative that you update your Antivirus software at least once a week (Even more if you wish). If you do not update your antivirus software then it will not be able to catch any of the new variants that may come out. If you use a commercial antivirus program you must make sure you keep renewing your subscription. Otherwise, once your subscription runs out, you may not be able to update the programs virus definitions.


Make sure your applications have all of their updates

It is also possible for other programs on your computer to have security vulnerability that can allow malware to infect you. Therefore, it is also a good idea to check for the latest versions of commonly installed applications that are regularly patched to fix vulnerabilities. You can check these by visiting Secunia Software Inspector and Calendar of Updates.


Install an AntiSpyware Program

A highly recommended AntiSpyware program is SuperAntiSpyware. You can download the free Home Version. or the Pro version for a 15 day trial period.

Installing this or another recommended program will provide spyware & hijacker protection on your computer alongside your virus protection. You should scan your computer with an AntiSpyware program on a regular basis just as you would an antivirus software.


Finally, here's a treasure trove of antivirus, antimalware and antispyware resources


That's it ozzyo99, happy surfing!

Cheers.

m0le
Posted Image
m0le is a proud member of UNITE

#11 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:04:48 PM

Posted 02 March 2010 - 09:00 PM

Since this issue appears to be resolved ... this topic has been closed. Glad we could help. smile.gif

If you're the topic starter, and need this topic reopened, please contact me via pm with the address of the thread.

Everyone else please begin a New Topic.
Posted Image
m0le is a proud member of UNITE




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users