Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Searchwebway3 / Mfeed Google Redirect


  • This topic is locked This topic is locked
14 replies to this topic

#1 NagataBusinessGroup

NagataBusinessGroup

  • Members
  • 7 posts
  • OFFLINE
  •  
  • Local time:06:03 AM

Posted 18 March 2010 - 01:44 AM

Hello there,
I've had this google redirect problem for over a month. I've been trying and trying to get rid of this virus by using AVG, Malwarebytes, Ad-Aware, Spybot, Windows Defender, Advanced Windows Care, IObit, Registry Mechanic, Avira, Avast, etc., but nothing works. When I type in a search in google it sends me to some other search site. I can't even get into my gmail account. When I type in www.gmail.com it says "404 Not Found". It's driving me nuts. I thought I could get rid of it on my own with the programs I mentioned but I can't. I need your help. What should I do?
Respectfully,
Grant

PS: The DDS file is below and the Attach.txt is attached to this message. I tried to run GMER numerous times but I keep getting the BSOD!



DDS (Ver_10-03-17.01) - NTFSx86
Run by Nagata Business Grp at 20:26:10.01 on Wed 03/17/2010
Internet Explorer: 8.0.6001.18702 BrowserJavaVersion: 1.6.0_07
Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.1023.300 [GMT -10:00]

FW: ZoneAlarm Firewall *enabled* {829BDA32-94B3-44F4-8446-F8FCFF809F8B}

============== Running Processes ===============

E:\WINDOWS\system32\svchost -k DcomLaunch
E:\WINDOWS\system32\svchost -k rpcss
E:\Program Files\Windows Defender\MsMpEng.exe
E:\WINDOWS\System32\svchost.exe -k netsvcs
E:\WINDOWS\system32\svchost.exe -k WudfServiceGroup
E:\WINDOWS\System32\svchost.exe -k NetworkService
E:\WINDOWS\System32\svchost.exe -k LocalService
E:\WINDOWS\system32\ZoneLabs\vsmon.exe
E:\Program Files\AVG\AVG9\avgchsvx.exe
E:\Program Files\AVG\AVG9\avgrsx.exe
E:\Program Files\AVG\AVG9\avgcsrvx.exe
E:\Program Files\Lavasoft\Ad-Aware\AAWService.exe
E:\WINDOWS\system32\spoolsv.exe
E:\Program Files\Common Files\Acronis\Schedule2\schedul2.exe
E:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
E:\Program Files\AVG\AVG9\avgwdsvc.exe
E:\Program Files\Delivery Center\5745897\Program\ServiceWrapper-5745897.exe
E:\Program Files\Bonjour\mDNSResponder.exe
E:\Program Files\Diskeeper Corporation\Diskeeper\DkService.exe
E:\WINDOWS\Explorer.EXE
E:\Documents and Settings\All Users\Application Data\EPSON\EPW!3 SSRP\E_S40RP7.EXE
E:\Program Files\Delivery Center\5745897\Program\DeliveryCenter.exe
E:\Program Files\AVG\AVG9\avgnsx.exe
E:\Program Files\Common Files\Microsoft Shared\VS7Debug\mdm.exe
E:\Program Files\Nero\Nero8\Nero BackItUp\NBService.exe
E:\WINDOWS\system32\nvsvc32.exe
E:\WINDOWS\system32\IoctlSvc.exe
E:\Program Files\Windows Defender\MSASCui.exe
E:\Program Files\Zone Labs\ZoneAlarm\zlclient.exe
E:\Program Files\Lavasoft\Ad-Aware\AAWTray.exe
E:\Program Files\Acronis\TrueImageHome\TimounterMonitor.exe
E:\Program Files\Common Files\Acronis\Schedule2\schedhlp.exe
E:\PROGRA~1\AVG\AVG9\avgtray.exe
E:\WINDOWS\system32\ctfmon.exe
E:\Program Files\Microsoft ActiveSync\wcescomm.exe
E:\PROGRA~1\MICROS~4\rapimgr.exe
E:\WINDOWS\system32\wuauclt.exe
E:\WINDOWS\System32\wbem\unsecapp.exe
E:\WINDOWS\system32\wbem\wmiprvse.exe
E:\WINDOWS\System32\alg.exe
E:\Program Files\Mozilla Firefox\firefox.exe
E:\Documents and Settings\Nagata Business Grp\Desktop\dds.scr
E:\WINDOWS\system32\wbem\wmiprvse.exe

============== Pseudo HJT Report ===============

uStart Page = https://login.katewwdb.com/
uSearch Page = hxxp://red.clientapps.yahoo.com/customize/ptec/defaults/sp/*http://www.yahoo.com
uSearch Bar = hxxp://red.clientapps.yahoo.com/customize/ptec/defaults/sb/*http://www.yahoo.com/search/ie.html
uSearchMigratedDefaultURL = hxxp://search.yahoo.com/search?p={searchTerms}&ei=utf-8&fr=b1ie7
uInternet Settings,ProxyOverride = *.local
uSearchURL,(Default) = hxxp://red.clientapps.yahoo.com/customize/ptec/defaults/su/*http://www.yahoo.com
uURLSearchHooks: AVG Security Toolbar BHO: {a3bc75a2-1f87-4686-aa43-5347d756017c} - e:\program files\avg\avg9\toolbar\IEToolbar.dll
uURLSearchHooks: H - No File
mURLSearchHooks: AVG Security Toolbar BHO: {a3bc75a2-1f87-4686-aa43-5347d756017c} - e:\program files\avg\avg9\toolbar\IEToolbar.dll
BHO: Adobe PDF Reader Link Helper: {06849e9f-c8d7-4d59-b87d-784b7d6be0b3} - e:\program files\common files\adobe\acrobat\activex\AcroIEHelper.dll
BHO: AVG Safe Search: {3ca2f312-6f6e-4b53-a66e-4e65e497c8c0} - e:\program files\avg\avg9\avgssie.dll
BHO: SSVHelper Class: {761497bb-d6f0-462c-b6eb-d4daf1d92d43} - e:\program files\java\jre1.6.0_07\bin\ssv.dll
BHO: AVG Security Toolbar BHO: {a3bc75a2-1f87-4686-aa43-5347d756017c} - e:\program files\avg\avg9\toolbar\IEToolbar.dll
BHO: Adobe PDF Conversion Toolbar Helper: {ae7cd045-e861-484f-8273-0445ee161910} - e:\program files\adobe\acrobat 8.0\acrobat\AcroIEFavClient.dll
BHO: EpsonToolBandKicker Class: {e99421fb-68dd-40f0-b4ac-b7027cae2f1a} - e:\program files\epson\epson web-to-page\EPSON Web-To-Page.dll
BHO: ZoneAlarm Spy Blocker BHO: {f0d4b231-da4b-4daf-81e4-dfee4931a4aa} - e:\program files\zonealarmsb\bar\1.bin\SPYBLOCK.DLL
TB: Adobe PDF: {47833539-d0c5-4125-9fa8-0819e2eaac93} - e:\program files\adobe\acrobat 8.0\acrobat\AcroIEFavClient.dll
TB: EPSON Web-To-Page: {ee5d279f-081b-4404-994d-c6b60aaeba6d} - e:\program files\epson\epson web-to-page\EPSON Web-To-Page.dll
TB: ZoneAlarm Spy Blocker: {f0d4b239-da4b-4daf-81e4-dfee4931a4aa} - e:\program files\zonealarmsb\bar\1.bin\SPYBLOCK.DLL
TB: AVG Security Toolbar: {ccc7a320-b3ca-4199-b1a6-9f516dd69829} - e:\program files\avg\avg9\toolbar\IEToolbar.dll
EB: Adobe PDF: {182ec0be-5110-49c8-a062-beb1d02a220b} - e:\program files\adobe\acrobat 8.0\acrobat\AcroIEFavClient.dll
EB: {32683183-48a0-441b-a342-7c2a440a9478} - No File
uRun: [EPSON Stylus CX8400 Series] e:\windows\system32\spool\drivers\w32x86\3\e_faticea.exe /fu "e:\windows\temp\E_SF3.tmp" /EF "HKCU"
uRun: [ctfmon.exe] e:\windows\system32\ctfmon.exe
uRun: [H/PC Connection Agent] "e:\program files\microsoft activesync\wcescomm.exe"
mRun: [Windows Defender] "e:\program files\windows defender\MSASCui.exe" -hide
mRun: [NvCplDaemon] RUNDLL32.EXE e:\windows\system32\NvCpl.dll,NvStartup
mRun: [Diamond Delivery Center] "e:\program files\delivery center\5745897\program\DeliveryCenter.exe" -startup
mRun: [ZoneAlarm Client] "e:\program files\zone labs\zonealarm\zlclient.exe"
mRun: [Ad-Watch] e:\program files\lavasoft\ad-aware\AAWTray.exe
mRun: [AcronisTimounterMonitor] e:\program files\acronis\trueimagehome\TimounterMonitor.exe
mRun: [Acronis Scheduler2 Service] "e:\program files\common files\acronis\schedule2\schedhlp.exe"
mRun: [AVG9_TRAY] e:\progra~1\avg\avg9\avgtray.exe
mRun: [IObit Security 360] "e:\program files\iobit\iobit security 360\IS360tray.exe" /autostart
mRun: [Adobe ARM] "e:\program files\common files\adobe\arm\1.0\AdobeARM.exe"
mRun: [QuickTime Task] "e:\program files\quicktime\qttask.exe" -atboottime
StartupFolder: e:\docume~1\alluse~1\startm~1\programs\startup\delivery center.lnk - e:\program files\delivery center\5745897\program\DeliveryCenter.exe
StartupFolder: e:\docume~1\alluse~1\startm~1\programs\startup\microsoft office.lnk - e:\program files\microsoft office\office10\OSA.EXE
IE: Append to existing PDF - e:\program files\adobe\acrobat 8.0\acrobat\AcroIEFavClient.dll/AcroIEAppend.html
IE: Convert link target to Adobe PDF - e:\program files\adobe\acrobat 8.0\acrobat\AcroIEFavClient.dll/AcroIECapture.html
IE: Convert link target to existing PDF - e:\program files\adobe\acrobat 8.0\acrobat\AcroIEFavClient.dll/AcroIEAppend.html
IE: Convert selected links to Adobe PDF - e:\program files\adobe\acrobat 8.0\acrobat\AcroIEFavClient.dll/AcroIECaptureSelLinks.html
IE: Convert selected links to existing PDF - e:\program files\adobe\acrobat 8.0\acrobat\AcroIEFavClient.dll/AcroIEAppendSelLinks.html
IE: Convert selection to Adobe PDF - e:\program files\adobe\acrobat 8.0\acrobat\AcroIEFavClient.dll/AcroIECapture.html
IE: Convert selection to existing PDF - e:\program files\adobe\acrobat 8.0\acrobat\AcroIEFavClient.dll/AcroIEAppend.html
IE: Convert to Adobe PDF - e:\program files\adobe\acrobat 8.0\acrobat\AcroIEFavClient.dll/AcroIECapture.html
IE: E&xport to Microsoft Excel - e:\progra~1\micros~2\office10\EXCEL.EXE/3000
IE: {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe
IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - e:\program files\messenger\msmsgs.exe
IE: {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - {CAFEEFAC-0016-0000-0007-ABCDEFFEDCBC} - e:\program files\java\jre1.6.0_07\bin\ssv.dll
IE: {2EAF5BB1-070F-11D3-9307-00C04FAE2D4F} - {2EAF5BB0-070F-11D3-9307-00C04FAE2D4F} - e:\progra~1\micros~4\INetRepl.dll
IE: {2EAF5BB2-070F-11D3-9307-00C04FAE2D4F} - {2EAF5BB0-070F-11D3-9307-00C04FAE2D4F} - e:\progra~1\micros~4\INetRepl.dll
Trusted Zone: //api.msappspace.com/
Trusted Zone: gmail.com\www
Trusted Zone: google.com\www
Trusted Zone: msappspace.com\www
Trusted Zone: msappspace.com\www.api
Trusted Zone: myspace.com
Trusted Zone: myspace.com\profile
Trusted Zone: wwdb.com\www
DPF: DirectAnimation Java Classes - file://e:\windows\java\classes\dajava.cab
DPF: Microsoft XML Parser for Java - file://e:\windows\java\classes\xmldso.cab
DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_07-windows-i586.cab
DPF: {8FFBE65D-2C9C-4669-84BD-5829DC0B603C} - hxxp://fpdownload.macromedia.com/get/flashplayer/current/ultrashim.cab
DPF: {CAFEEFAC-0016-0000-0005-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_05-windows-i586.cab
DPF: {CAFEEFAC-0016-0000-0007-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_07-windows-i586.cab
DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_07-windows-i586.cab
Handler: bwfile-5745897 - {3C365521-EB92-4444-A6F7-8050397FB607} - e:\program files\delivery center\5745897\program\GAPlugProtocol-5745897.dll
Handler: hddlife - {BD758015-47D9-477A-8873-4B688A2BC0E2} - e:\program files\binarysense\hddlife 3\hlAPP.dll
Handler: linkscanner - {F274614C-63F8-47D5-A4D1-FBDDE494F8D1} - e:\program files\avg\avg9\avgpp.dll
Notify: avgrsstarter - avgrsstx.dll
SSODL: WPDShServiceObj - {AAA288BA-9A4C-45B0-95D7-94D524869DB5} - e:\windows\system32\WPDShServiceObj.dll
SEH: Microsoft AntiMalware ShellExecuteHook: {091eb208-39dd-417d-a5dd-7e2c2d8fb9cb} - e:\progra~1\window~4\MpShHook.dll
Hosts: 89.149.210.106 uk.search.yahoo.com
Hosts: 89.149.210.106 www.google.es
Hosts: 89.149.210.106 www.google.co.uk
Hosts: 89.149.210.106 www.google.ca
Hosts: 89.149.210.106 www.google.gr

Note: multiple HOSTS entries found. Please refer to Attach.txt

================= FIREFOX ===================

FF - ProfilePath - e:\docume~1\nagata~1\applic~1\mozilla\firefox\profiles\oo6qcr3o.default\
FF - prefs.js: browser.search.selectedEngine - Yahoo! Search
FF - prefs.js: keyword.URL - hxxp://us.yhs.search.yahoo.com/avg/search?fr=yhs-avg&type=yahoo_avg_hs2-tb-web_us&p=
FF - component: e:\program files\avg\avg9\firefox\components\avgssff.dll
FF - plugin: e:\program files\mozilla firefox\plugins\NPZoneSB.dll
FF - HiddenExtension: Java Console: No Registry Reference - e:\program files\mozilla firefox\extensions\{CAFEEFAC-0016-0000-0001-ABCDEFFEDCBA}
FF - HiddenExtension: Java Console: No Registry Reference - e:\program files\mozilla firefox\extensions\{CAFEEFAC-0016-0000-0002-ABCDEFFEDCBA}
FF - HiddenExtension: Java Console: No Registry Reference - e:\program files\mozilla firefox\extensions\{CAFEEFAC-0016-0000-0003-ABCDEFFEDCBA}
FF - HiddenExtension: Java Console: No Registry Reference - e:\program files\mozilla firefox\extensions\{CAFEEFAC-0016-0000-0005-ABCDEFFEDCBA}
FF - HiddenExtension: Java Console: No Registry Reference - e:\program files\mozilla firefox\extensions\{CAFEEFAC-0016-0000-0007-ABCDEFFEDCBA}

---- FIREFOX POLICIES ----
e:\program files\mozilla firefox\greprefs\all.js - pref("ui.use_native_colors", true);
e:\program files\mozilla firefox\greprefs\all.js - pref("ui.use_native_popup_windows", false);
e:\program files\mozilla firefox\greprefs\all.js - pref("browser.enable_click_image_resizing", true);
e:\program files\mozilla firefox\greprefs\all.js - pref("accessibility.browsewithcaret_shortcut.enabled", true);
e:\program files\mozilla firefox\greprefs\all.js - pref("javascript.options.mem.high_water_mark", 32);
e:\program files\mozilla firefox\greprefs\all.js - pref("javascript.options.mem.gc_frequency", 1600);
e:\program files\mozilla firefox\greprefs\all.js - pref("network.auth.force-generic-ntlm", false);
e:\program files\mozilla firefox\greprefs\all.js - pref("svg.smil.enabled", false);
e:\program files\mozilla firefox\greprefs\all.js - pref("ui.trackpoint_hack.enabled", -1);
e:\program files\mozilla firefox\greprefs\all.js - pref("browser.formfill.debug", false);
e:\program files\mozilla firefox\greprefs\all.js - pref("browser.formfill.agedWeight", 2);
e:\program files\mozilla firefox\greprefs\all.js - pref("browser.formfill.bucketSize", 1);
e:\program files\mozilla firefox\greprefs\all.js - pref("browser.formfill.maxTimeGroupings", 25);
e:\program files\mozilla firefox\greprefs\all.js - pref("browser.formfill.timeGroupingSize", 604800);
e:\program files\mozilla firefox\greprefs\all.js - pref("browser.formfill.boundaryWeight", 25);
e:\program files\mozilla firefox\greprefs\all.js - pref("browser.formfill.prefixWeight", 5);
e:\program files\mozilla firefox\greprefs\all.js - pref("html5.enable", false);
e:\program files\mozilla firefox\greprefs\security-prefs.js - pref("security.ssl3.rsa_seed_sha", true);
e:\program files\mozilla firefox\defaults\pref\firefox-branding.js - pref("app.update.download.backgroundInterval", 600);
e:\program files\mozilla firefox\defaults\pref\firefox-branding.js - pref("app.update.url.manual", "http://www.firefox.com");
e:\program files\mozilla firefox\defaults\pref\firefox-branding.js - pref("browser.search.param.yahoo-fr-ja", "mozff");
e:\program files\mozilla firefox\defaults\pref\firefox.js - pref("extensions.{972ce4c6-7e08-4474-a285-3208198ce6fd}.name", "chrome://browser/locale/browser.properties");
e:\program files\mozilla firefox\defaults\pref\firefox.js - pref("extensions.{972ce4c6-7e08-4474-a285-3208198ce6fd}.description", "chrome://browser/locale/browser.properties");
e:\program files\mozilla firefox\defaults\pref\firefox.js - pref("xpinstall.whitelist.add", "addons.mozilla.org");
e:\program files\mozilla firefox\defaults\pref\firefox.js - pref("xpinstall.whitelist.add.36", "getpersonas.com");
e:\program files\mozilla firefox\defaults\pref\firefox.js - pref("lightweightThemes.update.enabled", true);
e:\program files\mozilla firefox\defaults\pref\firefox.js - pref("browser.allTabs.previews", false);
e:\program files\mozilla firefox\defaults\pref\firefox.js - pref("plugins.hide_infobar_for_outdated_plugin", false);
e:\program files\mozilla firefox\defaults\pref\firefox.js - pref("plugins.update.notifyUser", false);
e:\program files\mozilla firefox\defaults\pref\firefox.js - pref("toolbar.customization.usesheet", false);
e:\program files\mozilla firefox\defaults\pref\firefox.js - pref("browser.taskbar.previews.enable", false);
e:\program files\mozilla firefox\defaults\pref\firefox.js - pref("browser.taskbar.previews.max", 20);
e:\program files\mozilla firefox\defaults\pref\firefox.js - pref("browser.taskbar.previews.cachetime", 20);

============= SERVICES / DRIVERS ===============

R0 Lbd;Lbd;e:\windows\system32\drivers\Lbd.sys [2009-4-27 64288]
R1 AvgLdx86;AVG AVI Loader Driver x86;e:\windows\system32\drivers\avgldx86.sys [2008-5-22 216200]
R1 AvgMfx86;AVG On-access Scanner Minifilter Driver x86;e:\windows\system32\drivers\avgmfx86.sys [2008-4-8 29512]
R1 AvgTdiX;AVG Free Network Redirector;e:\windows\system32\drivers\avgtdix.sys [2009-11-20 242696]
R1 vsdatant;vsdatant;e:\windows\system32\vsdatant.sys [2008-10-13 353672]
R2 avg9wd;AVG Free WatchDog;e:\program files\avg\avg9\avgwdsvc.exe [2010-3-11 308064]
R2 BackWeb Plug-in - 5745897;Delivery Center;e:\program files\delivery center\5745897\program\ServiceWrapper-5745897.exe [2009-3-6 32807]
R2 Lavasoft Ad-Aware Service;Lavasoft Ad-Aware Service;e:\program files\lavasoft\ad-aware\AAWService.exe [2009-9-24 1181328]
R2 vsmon;TrueVector Internet Monitor;e:\windows\system32\zonelabs\vsmon.exe -service --> e:\windows\system32\zonelabs\vsmon.exe -service [?]
R2 WinDefend;Windows Defender;e:\program files\windows defender\MsMpEng.exe [2006-11-3 13592]
S2 HDDlife HDD Access service;HDDlife HDD Access service;e:\program files\binarysense\hddlife 3\hldasvc.exe [2007-4-23 218624]
S2 IS360service;IS360service;e:\program files\iobit\iobit security 360\is360srv.exe [2009-11-20 311568]
S3 IgniteService;IgniteService;e:\program files\ignitecds\IgniteService.exe [2009-3-6 86016]

=============== Created Last 30 ================

2010-03-16 05:04:52 56816 ----a-w- e:\windows\system32\drivers\avgntflt.sys
2010-03-16 04:58:58 0 d-----w- e:\docume~1\alluse~1\applic~1\Alwil Software
2010-03-12 02:18:11 12464 ----a-w- e:\windows\system32\avgrsstx.dll
2010-03-11 07:50:38 0 d-----w- e:\docume~1\alluse~1\applic~1\vsosdk
2010-03-11 07:36:27 0 d-----w- E:\ModernCollective
2010-02-25 03:33:11 58332 ---ha-w- e:\windows\system32\mlfcache.dat

==================== Find3M ====================

2010-03-12 02:18:12 242696 ----a-w- e:\windows\system32\drivers\avgtdix.sys
2010-03-12 02:17:37 216200 ----a-w- e:\windows\system32\drivers\avgldx86.sys
2010-02-24 20:16:06 181632 ------w- e:\windows\system32\MpSigStub.exe
2009-12-21 19:14:05 916480 ----a-w- e:\windows\system32\wininet.dll
2003-08-28 00:19:18 36963 ----a-r- e:\program files\common files\SM1updtr.dll
2009-12-13 02:16:53 203776 --sh--w- e:\windows\system32\unrar.exe
2008-09-26 02:06:35 32768 --sha-w- e:\windows\system32\config\systemprofile\local settings\history\history.ie5\mshist012008092520080926\index.dat

============= FINISH: 20:26:42.57 ===============

Attached Files



BC AdBot (Login to Remove)

 


#2 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:04:03 PM

Posted 20 March 2010 - 02:33 PM

Hi,

Welcome to Bleeping Computer. My name is m0le and I will be helping you with your log.
  • Please subscribe to this topic, if you haven't already. You can subscribe by clicking the Options box to the right of your topic title and selecting Track This Topic.

  • Please avoid installing/uninstalling or updating any programs and attempting any unsupervised fixes or scans. This can make helping you impossible.

  • Please reply to this post so I know you are there.
The forum is busy and we need to have replies as soon as possible. If I haven't had a reply after 3 days I will bump the topic and if you do not reply by the following day after that then I will close the topic.

Once I receive a reply then I will return with your first instructions.

Thanks thumbup2.gif
Posted Image
m0le is a proud member of UNITE

#3 NagataBusinessGroup

NagataBusinessGroup
  • Topic Starter

  • Members
  • 7 posts
  • OFFLINE
  •  
  • Local time:06:03 AM

Posted 22 March 2010 - 10:37 PM

Hello Mole,
Just replying as requested! I appreciate you taking the time to help me! Have a good day!
Grant

#4 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:04:03 PM

Posted 23 March 2010 - 04:20 AM

Hi Grant,

It looks like the clean-up you've been doing has been removing the source of the problem but isn't dealing with the changes it has made.

If the redirect is still present then please run Combofix as below. If not, then let me know.

Please download ComboFix from one of these locations:* IMPORTANT !!! Save ComboFix.exe to your Desktop making sure you rename it comfix.exe
  • Disable your AntiVirus and AntiSpyware applications, usually via a right click on the System Tray icon. They may otherwise interfere with our tools. (Click on this link to see a list of programs that should be disabled. The list is not all inclusive.)
  • Double click on Combofix.exe & follow the prompts.
  • As part of it's process, ComboFix will check to see if the Microsoft Windows Recovery Console is installed. With malware infections being as they are today, it's strongly recommended to have this pre-installed on your machine before doing any malware removal. It will allow you to boot up into a special recovery/repair mode that will allow us to more easily help you should your computer have a problem after an attempted removal of malware.
  • Follow the prompts to allow ComboFix to download and install the Microsoft Windows Recovery Console, and when prompted, agree to the End-User License Agreement to install the Microsoft Windows Recovery Console.
**Please note: If the Microsoft Windows Recovery Console is already installed, ComboFix will continue it's malware removal procedures.



Once the Microsoft Windows Recovery Console is installed using ComboFix, you should see the following message:



Click on Yes, to continue scanning for malware.

When finished, it shall produce a log for you. Please include the C:\ComboFix.txt in your next reply.

Thanks thumbup2.gif
Posted Image
m0le is a proud member of UNITE

#5 NagataBusinessGroup

NagataBusinessGroup
  • Topic Starter

  • Members
  • 7 posts
  • OFFLINE
  •  
  • Local time:06:03 AM

Posted 23 March 2010 - 05:04 AM

Hey Mole,
Thanks for replying back so quickly! Here's the log:


ComboFix 10-03-22.03 - Nagata Business Grp 03/22/2010 23:51:34.1.2 - x86
Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.1023.318 [GMT -10:00]
Running from: e:\documents and settings\Nagata Business Grp\Desktop\comfix.exe
FW: ZoneAlarm Firewall *enabled* {829BDA32-94B3-44F4-8446-F8FCFF809F8B}
.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.

e:\documents and settings\Nagata Business Grp\Application Data\0200000047c8571b716C.manifest
e:\documents and settings\Nagata Business Grp\Application Data\0200000047c8571b716O.manifest
e:\documents and settings\Nagata Business Grp\Application Data\0200000047c8571b716P.manifest
e:\documents and settings\Nagata Business Grp\Application Data\0200000047c8571b716S.manifest
e:\documents and settings\Nagata Business Grp\Application Data\inst.exe
e:\recycler\NPROTECT
e:\windows\msvrc20.dll
e:\windows\system32\776019347
e:\windows\system32\cont_adzgalore-remove.exe
e:\windows\system32\unrar.exe
e:\windows\twain_16.dll

.
((((((((((((((((((((((((( Files Created from 2010-02-23 to 2010-03-23 )))))))))))))))))))))))))))))))
.

2010-03-16 05:04 . 2010-03-16 07:11 56816 ----a-w- e:\windows\system32\drivers\avgntflt.sys
2010-03-16 04:58 . 2010-03-16 04:58 -------- d-----w- e:\program files\Alwil Software
2010-03-16 04:58 . 2010-03-16 04:58 -------- d-----w- e:\documents and settings\All Users\Application Data\Alwil Software
2010-03-12 02:18 . 2010-03-12 02:18 360584 ----a-w- e:\documents and settings\All Users\Application Data\avg9\update\backup\avgtdix.sys
2010-03-12 02:18 . 2010-03-12 02:18 333192 ----a-w- e:\documents and settings\All Users\Application Data\avg9\update\backup\avgldx86.sys
2010-03-12 02:18 . 2010-03-12 02:18 28424 ----a-w- e:\documents and settings\All Users\Application Data\avg9\update\backup\avgmfx86.sys
2010-03-12 02:18 . 2010-03-12 02:18 12464 ----a-w- e:\windows\system32\avgrsstx.dll
2010-03-11 07:50 . 2010-03-11 07:50 -------- d-----w- e:\documents and settings\All Users\Application Data\vsosdk
2010-03-11 07:36 . 2010-03-11 07:36 -------- d-----w- E:\ModernCollective
2010-02-25 03:33 . 2010-02-25 03:33 58332 ---ha-w- e:\windows\system32\mlfcache.dat

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2010-03-22 07:28 . 2009-08-01 07:33 -------- d-----w- e:\program files\DVDFab Platinum 4
2010-03-20 19:49 . 2010-03-22 07:23 38912 ----a-w- e:\windows\Internet Logs\xDB102.tmp
2010-03-20 19:49 . 2010-03-22 07:23 2341888 ----a-w- e:\windows\Internet Logs\xDB103.tmp
2010-03-20 19:17 . 2009-08-29 21:33 -------- d-----w- e:\documents and settings\Nagata Business Grp\Application Data\Azureus
2010-03-19 16:40 . 2010-03-20 02:05 33280 ----a-w- e:\windows\Internet Logs\xDB101.tmp
2010-03-18 16:31 . 2010-03-19 04:44 83968 ----a-w- e:\windows\Internet Logs\xDB100.tmp
2010-03-18 05:43 . 2009-11-20 04:56 -------- d-----w- e:\program files\Malwarebytes' Anti-Malware
2010-03-18 05:41 . 2010-03-18 05:41 5115824 ----a-w- e:\documents and settings\All Users\Application Data\Malwarebytes\Malwarebytes' Anti-Malware\mbam-setup.exe
2010-03-17 08:57 . 2007-02-16 08:21 -------- d-----w- e:\program files\PowerArchiver
2010-03-17 08:18 . 2010-03-17 08:19 58880 ----a-w- e:\windows\Internet Logs\xDBFF.tmp
2010-03-16 05:08 . 2010-03-16 05:09 69632 ----a-w- e:\windows\Internet Logs\xDBFE.tmp
2010-03-16 02:07 . 2008-12-18 04:23 83549510 ----a-w- e:\windows\Internet Logs\tvDebug.Zip
2010-03-15 16:39 . 2010-03-16 02:07 2269184 ----a-w- e:\windows\Internet Logs\xDBFD.tmp
2010-03-12 16:37 . 2010-03-13 02:04 2263552 ----a-w- e:\windows\Internet Logs\xDBFC.tmp
2010-03-12 16:37 . 2010-03-13 02:04 36864 ----a-w- e:\windows\Internet Logs\xDBFB.tmp
2010-03-12 02:18 . 2009-11-21 09:37 242696 ----a-w- e:\windows\system32\drivers\avgtdix.sys
2010-03-12 02:18 . 2008-04-09 07:55 29512 ----a-w- e:\windows\system32\drivers\avgmfx86.sys
2010-03-12 02:17 . 2008-05-23 03:13 216200 ----a-w- e:\windows\system32\drivers\avgldx86.sys
2010-03-11 16:41 . 2010-03-12 02:10 40448 ----a-w- e:\windows\Internet Logs\xDBFA.tmp
2010-03-11 07:42 . 2009-08-01 07:33 -------- d-----w- e:\documents and settings\Nagata Business Grp\Application Data\Vso
2010-03-10 16:36 . 2010-03-11 02:00 50176 ----a-w- e:\windows\Internet Logs\xDBF8.tmp
2010-03-10 16:36 . 2010-03-11 02:00 2259968 ----a-w- e:\windows\Internet Logs\xDBF9.tmp
2010-03-08 16:36 . 2010-03-09 02:02 2258944 ----a-w- e:\windows\Internet Logs\xDBF7.tmp
2010-03-08 16:36 . 2010-03-09 02:02 56832 ----a-w- e:\windows\Internet Logs\xDBF6.tmp
2010-03-06 21:07 . 2010-03-06 21:08 2256896 ----a-w- e:\windows\Internet Logs\xDBF5.tmp
2010-03-06 02:00 . 2010-03-06 02:01 2256384 ----a-w- e:\windows\Internet Logs\xDBF4.tmp
2010-03-06 02:00 . 2010-03-06 02:01 41472 ----a-w- e:\windows\Internet Logs\xDBF3.tmp
2010-03-04 16:29 . 2010-03-05 03:09 36352 ----a-w- e:\windows\Internet Logs\xDBF2.tmp
2010-03-04 04:15 . 2010-03-04 04:15 2258432 ----a-w- e:\windows\Internet Logs\xDBF1.tmp
2010-03-04 04:15 . 2010-03-04 04:15 37376 ----a-w- e:\windows\Internet Logs\xDBF0.tmp
2010-03-03 16:36 . 2010-03-04 02:22 2250240 ----a-w- e:\windows\Internet Logs\xDBEF.tmp
2010-03-03 16:36 . 2010-03-04 02:22 48640 ----a-w- e:\windows\Internet Logs\xDBEE.tmp
2010-03-03 06:58 . 2007-02-16 08:25 -------- d-----w- e:\program files\Common Files\Adobe
2010-03-02 16:37 . 2010-03-03 01:58 53248 ----a-w- e:\windows\Internet Logs\xDBED.tmp
2010-03-01 16:34 . 2010-03-02 02:02 77824 ----a-w- e:\windows\Internet Logs\xDBEC.tmp
2010-03-01 07:58 . 2010-03-01 07:59 2242560 ----a-w- e:\windows\Internet Logs\xDBEB.tmp
2010-02-28 01:08 . 2010-02-28 01:08 2242048 ----a-w- e:\windows\Internet Logs\xDBEA.tmp
2010-02-26 16:38 . 2010-02-27 01:57 2241536 ----a-w- e:\windows\Internet Logs\xDBE9.tmp
2010-02-26 16:38 . 2010-02-27 01:57 38912 ----a-w- e:\windows\Internet Logs\xDBE8.tmp
2010-02-25 16:39 . 2010-02-26 05:04 44032 ----a-w- e:\windows\Internet Logs\xDBE7.tmp
2010-02-25 03:21 . 2007-04-13 16:30 -------- d-----w- e:\documents and settings\Nagata Business Grp\Application Data\Apple Computer
2010-02-24 20:16 . 2009-11-16 09:14 181632 ------w- e:\windows\system32\MpSigStub.exe
2010-02-24 16:34 . 2010-02-25 02:25 2235904 ----a-w- e:\windows\Internet Logs\xDBE6.tmp
2010-02-24 16:34 . 2010-02-25 02:25 56320 ----a-w- e:\windows\Internet Logs\xDBE5.tmp
2010-02-23 16:32 . 2010-02-24 02:01 2235392 ----a-w- e:\windows\Internet Logs\xDBE4.tmp
2010-02-21 00:08 . 2010-02-22 06:09 61440 ----a-w- e:\windows\Internet Logs\xDBE2.tmp
2010-02-21 00:08 . 2010-02-22 06:09 2245120 ----a-w- e:\windows\Internet Logs\xDBE3.tmp
2010-02-18 16:36 . 2010-02-19 03:08 2223104 ----a-w- e:\windows\Internet Logs\xDBE1.tmp
2010-02-18 16:36 . 2010-02-19 03:08 39424 ----a-w- e:\windows\Internet Logs\xDBE0.tmp
2010-02-17 16:32 . 2010-02-18 02:11 55808 ----a-w- e:\windows\Internet Logs\xDBDF.tmp
2010-02-17 02:29 . 2010-02-17 02:30 2222080 ----a-w- e:\windows\Internet Logs\xDBDE.tmp
2010-02-16 04:34 . 2010-02-16 04:35 2227712 ----a-w- e:\windows\Internet Logs\xDBDD.tmp
2010-02-16 04:34 . 2010-02-16 04:35 92160 ----a-w- e:\windows\Internet Logs\xDBDC.tmp
2010-02-16 04:29 . 2010-02-16 04:27 -------- d-----w- e:\documents and settings\All Users\Application Data\{755AC846-7372-4AC8-8550-C52491DAA8BD}
2010-02-16 04:29 . 2009-07-02 07:43 -------- d-----w- e:\program files\iTunes
2010-02-16 04:28 . 2009-07-02 07:43 -------- d-----w- e:\program files\iPod
2010-02-16 04:28 . 2008-12-09 05:49 -------- d-----w- e:\program files\Common Files\Apple
2010-02-16 04:20 . 2010-02-16 04:18 -------- d-----w- e:\program files\QuickTime
2010-02-16 04:03 . 2010-02-16 04:03 72488 ----a-w- e:\documents and settings\All Users\Application Data\Apple Computer\Installer Cache\iTunes 9.0.3.15\SetupAdmin.exe
2010-02-16 03:55 . 2009-08-29 21:34 -------- d-----w- e:\documents and settings\Nagata Business Grp\Application Data\TuneUpMedia
2010-02-15 01:13 . 2010-02-15 01:13 2219520 ----a-w- e:\windows\Internet Logs\xDBDB.tmp
2010-02-11 16:39 . 2010-02-12 02:14 2218496 ----a-w- e:\windows\Internet Logs\xDBDA.tmp
2010-02-11 16:38 . 2010-02-12 02:14 54784 ----a-w- e:\windows\Internet Logs\xDBD9.tmp
2010-02-10 16:35 . 2010-02-11 02:24 2217984 ----a-w- e:\windows\Internet Logs\xDBD8.tmp
2010-02-09 16:38 . 2010-02-10 01:54 40960 ----a-w- e:\windows\Internet Logs\xDBD7.tmp
2010-02-08 16:35 . 2010-02-09 03:43 65024 ----a-w- e:\windows\Internet Logs\xDBD6.tmp
2010-02-08 06:45 . 2010-02-08 06:46 2216448 ----a-w- e:\windows\Internet Logs\xDBD5.tmp
2010-02-07 00:47 . 2010-02-07 00:47 2214912 ----a-w- e:\windows\Internet Logs\xDBD4.tmp
2010-02-05 16:38 . 2010-02-06 02:17 54272 ----a-w- e:\windows\Internet Logs\xDBD2.tmp
2010-02-05 16:38 . 2010-02-06 02:17 2214400 ----a-w- e:\windows\Internet Logs\xDBD3.tmp
2010-02-04 16:37 . 2010-02-05 02:01 2213888 ----a-w- e:\windows\Internet Logs\xDBD1.tmp
2010-02-03 16:35 . 2010-02-04 01:55 2213376 ----a-w- e:\windows\Internet Logs\xDBD0.tmp
2010-02-03 16:35 . 2010-02-04 01:55 57344 ----a-w- e:\windows\Internet Logs\xDBCF.tmp
2010-02-02 16:36 . 2010-02-03 01:56 2212864 ----a-w- e:\windows\Internet Logs\xDBCE.tmp
2010-02-01 16:38 . 2010-02-02 02:28 2212352 ----a-w- e:\windows\Internet Logs\xDBCD.tmp
2010-02-01 16:38 . 2010-02-02 02:28 57344 ----a-w- e:\windows\Internet Logs\xDBCC.tmp
2010-01-28 16:35 . 2010-01-29 03:37 40448 ----a-w- e:\windows\Internet Logs\xDBCB.tmp
2010-01-28 05:50 . 2009-08-22 20:43 -------- d-----w- e:\program files\Microsoft Silverlight
2010-01-27 16:43 . 2010-01-28 05:50 44032 ----a-w- e:\windows\Internet Logs\xDBC9.tmp
2010-01-27 16:43 . 2010-01-28 05:50 2217472 ----a-w- e:\windows\Internet Logs\xDBCA.tmp
2010-01-27 16:34 . 2010-01-27 16:34 -------- d-----w- e:\program files\MSXML 4.0
2010-01-26 16:27 . 2010-01-27 02:10 2211328 ----a-w- e:\windows\Internet Logs\xDBC8.tmp
2010-01-26 16:27 . 2010-01-27 02:10 107520 ----a-w- e:\windows\Internet Logs\xDBC7.tmp
2010-01-26 07:23 . 2009-08-29 21:32 -------- d-----w- e:\program files\Vuze
2010-01-25 16:30 . 2010-01-26 01:59 2206720 ----a-w- e:\windows\Internet Logs\xDBC6.tmp
2010-01-22 16:40 . 2010-01-23 04:13 2205696 ----a-w- e:\windows\Internet Logs\xDBC5.tmp
2010-01-20 16:38 . 2010-01-21 02:11 40960 ----a-w- e:\windows\Internet Logs\xDBC4.tmp
2010-01-19 16:39 . 2010-01-20 02:07 96768 ----a-w- e:\windows\Internet Logs\xDBC3.tmp
2010-01-19 03:57 . 2010-01-19 03:57 2203136 ----a-w- e:\windows\Internet Logs\xDBC2.tmp
2010-01-15 16:41 . 2010-01-18 06:19 2201088 ----a-w- e:\windows\Internet Logs\xDBC1.tmp
2010-01-14 16:37 . 2010-01-15 02:38 2200576 ----a-w- e:\windows\Internet Logs\xDBC0.tmp
2010-01-13 16:37 . 2010-01-14 02:09 41984 ----a-w- e:\windows\Internet Logs\xDBBE.tmp
2010-01-13 16:37 . 2010-01-14 02:09 2200064 ----a-w- e:\windows\Internet Logs\xDBBF.tmp
2010-01-12 16:27 . 2010-01-13 01:55 38400 ----a-w- e:\windows\Internet Logs\xDBBD.tmp
2010-01-11 16:37 . 2010-01-12 02:52 54784 ----a-w- e:\windows\Internet Logs\xDBBC.tmp
2010-01-10 13:36 . 2010-01-10 22:15 2198528 ----a-w- e:\windows\Internet Logs\xDBBB.tmp
2010-01-08 16:36 . 2010-01-09 01:01 37376 ----a-w- e:\windows\Internet Logs\xDBBA.tmp
2010-01-08 02:07 . 2009-11-20 04:56 38224 ----a-w- e:\windows\system32\drivers\mbamswissarmy.sys
2010-01-08 02:07 . 2009-11-20 04:56 19160 ----a-w- e:\windows\system32\drivers\mbam.sys
2010-01-07 16:37 . 2010-01-08 04:42 87552 ----a-w- e:\windows\Internet Logs\xDBB9.tmp
2009-09-25 16:41 . 2009-09-25 16:41 1044480 ----a-w- e:\program files\mozilla firefox\plugins\libdivx.dll
2009-09-25 16:41 . 2009-09-25 16:41 200704 ----a-w- e:\program files\mozilla firefox\plugins\ssldivx.dll
2007-09-22 10:50 . 2007-09-22 10:50 24 --sh--w- e:\windows\S16822132.tmp
.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\URLSearchHooks]
"{A3BC75A2-1F87-4686-AA43-5347D756017C}"= "e:\program files\AVG\AVG9\Toolbar\IEToolbar.dll" [2009-11-25 1230080]

[HKEY_CLASSES_ROOT\clsid\{a3bc75a2-1f87-4686-aa43-5347d756017c}]

[HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{A3BC75A2-1F87-4686-AA43-5347D756017C}]
2009-11-25 23:01 1230080 ----a-w- e:\program files\AVG\AVG9\Toolbar\IEToolbar.dll

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Toolbar]
"{CCC7A320-B3CA-4199-B1A6-9F516DD69829}"= "e:\program files\AVG\AVG9\Toolbar\IEToolbar.dll" [2009-11-25 1230080]

[HKEY_CLASSES_ROOT\clsid\{ccc7a320-b3ca-4199-b1a6-9f516dd69829}]

[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Toolbar\Webbrowser]
"{CCC7A320-B3CA-4199-B1A6-9F516DD69829}"= "e:\program files\AVG\AVG9\Toolbar\IEToolbar.dll" [2009-11-25 1230080]

[HKEY_CLASSES_ROOT\clsid\{ccc7a320-b3ca-4199-b1a6-9f516dd69829}]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"Windows Defender"="e:\program files\Windows Defender\MSASCui.exe" [2006-11-04 866584]
"NvCplDaemon"="e:\windows\system32\NvCpl.dll" [2008-09-18 13574144]
"Diamond Delivery Center"="e:\program files\Delivery Center\5745897\Program\DeliveryCenter.exe" [2009-03-07 32807]
"ZoneAlarm Client"="e:\program files\Zone Labs\ZoneAlarm\zlclient.exe" [2009-02-16 981384]
"Ad-Watch"="e:\program files\Lavasoft\Ad-Aware\AAWTray.exe" [2009-12-24 788880]
"AcronisTimounterMonitor"="e:\program files\Acronis\TrueImageHome\TimounterMonitor.exe" [2009-01-21 960536]
"Acronis Scheduler2 Service"="e:\program files\Common Files\Acronis\Schedule2\schedhlp.exe" [2009-01-21 377232]
"IObit Security 360"="e:\program files\IObit\IObit Security 360\IS360tray.exe" [2009-12-25 1280272]
"Adobe ARM"="e:\program files\Common Files\Adobe\ARM\1.0\AdobeARM.exe" [2009-09-04 935288]
"QuickTime Task"="e:\program files\QuickTime\qttask.exe" [2009-11-11 417792]

e:\documents and settings\All Users\Start Menu\Programs\Startup\
Delivery Center.lnk - e:\program files\Delivery Center\5745897\Program\DeliveryCenter.exe [2009-3-6 32807]
Microsoft Office.lnk - e:\program files\Microsoft Office\Office10\OSA.EXE [2001-2-13 83360]

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\avgrsstarter]
2010-03-12 02:18 12464 ----a-w- e:\windows\system32\avgrsstx.dll

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\Lavasoft Ad-Aware Service]
@="Service"

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\WinDefend]
@="Service"

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Alcmtr]
2005-05-04 04:43 69632 ----a-w- e:\windows\Alcmtr.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\QuickTime Task]
2009-11-11 09:08 417792 ----a-w- e:\program files\QuickTime\QTTask.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\RTHDCPL]
2008-03-07 03:14 16858112 ----a-w- e:\windows\RTHDCPL.exe

[HKEY_LOCAL_MACHINE\software\microsoft\security center]
"AntiVirusOverride"=dword:00000001
"FirewallOverride"=dword:00000001

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\ZoneLabsFirewall]
"DisableMonitoring"=dword:00000001

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]
"EnableFirewall"= 0 (0x0)

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=
"e:\\Program Files\\LimeWire\\LimeWire.exe"=
"e:\\Program Files\\Messenger\\msmsgs.exe"=
"e:\\WINDOWS\\system32\\spool\\drivers\\w32x86\\3\\SAGENT4.EXE"=
"e:\\WINDOWS\\system32\\dpvsetup.exe"=
"e:\\Program Files\\Starcraft\\StarCraft.exe"=
"e:\\Program Files\\Steam\\steamapps\\grantos50@hotmail.com\\counter-strike\\hl.exe"=
"e:\\Program Files\\Steam\\steam.exe"=
"e:\\Program Files\\Windows Media Player\\wmplayer.exe"=
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"e:\\Program Files\\MSN Messenger\\msnmsgr.exe"=
"e:\\Program Files\\MSN Messenger\\livecall.exe"=
"e:\program files\Microsoft ActiveSync\rapimgr.exe"= e:\program files\Microsoft ActiveSync\rapimgr.exe:169.254.2.0/255.255.255.0:Enabled:ActiveSync RAPI Manager
"e:\program files\Microsoft ActiveSync\wcescomm.exe"= e:\program files\Microsoft ActiveSync\wcescomm.exe:169.254.2.0/255.255.255.0:Enabled:ActiveSync Connection Manager
"e:\program files\Microsoft ActiveSync\WCESMgr.exe"= e:\program files\Microsoft ActiveSync\WCESMgr.exe:169.254.2.0/255.255.255.0:Enabled:ActiveSync Application
"e:\\Program Files\\Yahoo!\\Messenger\\YahooMessenger.exe"=
"e:\\Program Files\\Delivery Center\\5745897\\Program\\DeliveryCenter.exe"=
"e:\\Program Files\\Bonjour\\mDNSResponder.exe"=
"e:\\Program Files\\AVG\\AVG9\\avgupd.exe"=
"e:\\Program Files\\AVG\\AVG9\\avgnsx.exe"=
"e:\\Program Files\\iTunes\\iTunes.exe"=

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\GloballyOpenPorts\List]
"1723:TCP"= 1723:TCP:@xpsp2res.dll,-22015
"1701:UDP"= 1701:UDP:@xpsp2res.dll,-22016
"500:UDP"= 500:UDP:@xpsp2res.dll,-22017
"26675:TCP"= 26675:TCP:169.254.2.0/255.255.255.0:Enabled:ActiveSync Service
"110:TCP"= 110:TCP:svchost

R0 Lbd;Lbd;e:\windows\system32\drivers\Lbd.sys [4/27/2009 6:44 PM 64288]
R1 AvgLdx86;AVG AVI Loader Driver x86;e:\windows\system32\drivers\avgldx86.sys [5/22/2008 5:13 PM 216200]
R1 AvgTdiX;AVG Free Network Redirector;e:\windows\system32\drivers\avgtdix.sys [11/20/2009 11:37 PM 242696]
R2 avg9wd;AVG Free WatchDog;e:\program files\AVG\AVG9\avgwdsvc.exe [3/11/2010 4:18 PM 308064]
R2 WinDefend;Windows Defender;e:\program files\Windows Defender\MsMpEng.exe [11/3/2006 6:19 PM 13592]
S2 BackWeb Plug-in - 5745897;Delivery Center;e:\program files\Delivery Center\5745897\Program\ServiceWrapper-5745897.exe [3/6/2009 8:43 PM 32807]
S2 IS360service;IS360service;e:\program files\IObit\IObit Security 360\is360srv.exe [11/20/2009 11:45 PM 311568]
S2 Lavasoft Ad-Aware Service;Lavasoft Ad-Aware Service;e:\program files\Lavasoft\Ad-Aware\AAWService.exe [9/24/2009 1:17 AM 1181328]
S3 IgniteService;IgniteService;e:\program files\IgniteCDS\IgniteService.exe [3/6/2009 8:29 PM 86016]
.
Contents of the 'Scheduled Tasks' folder

2010-03-23 e:\windows\Tasks\Ad-Aware Update (Daily 1).job
- e:\program files\Lavasoft\Ad-Aware\Ad-AwareAdmin.exe [2009-10-01 04:34]

2010-03-23 e:\windows\Tasks\Ad-Aware Update (Daily 2).job
- e:\program files\Lavasoft\Ad-Aware\Ad-AwareAdmin.exe [2009-10-01 04:34]

2010-03-23 e:\windows\Tasks\Ad-Aware Update (Daily 3).job
- e:\program files\Lavasoft\Ad-Aware\Ad-AwareAdmin.exe [2009-10-01 04:34]

2010-03-23 e:\windows\Tasks\Ad-Aware Update (Daily 4).job
- e:\program files\Lavasoft\Ad-Aware\Ad-AwareAdmin.exe [2009-10-01 04:34]

2010-03-23 e:\windows\Tasks\Ad-Aware Update (Weekly).job
- e:\program files\Lavasoft\Ad-Aware\Ad-AwareAdmin.exe [2009-10-01 04:34]

2010-03-18 e:\windows\Tasks\AppleSoftwareUpdate.job
- e:\program files\Apple Software Update\SoftwareUpdate.exe [2008-07-30 22:34]

2010-02-01 e:\windows\Tasks\Install_NSS.job
- e:\program files\Vuze\nssstub.exe [2010-01-26 07:23]

2010-03-23 e:\windows\Tasks\MP Scheduled Scan.job
- e:\program files\Windows Defender\MpCmdRun.exe [2006-11-04 04:20]
.
.
------- Supplementary Scan -------
.
uStart Page = https://login.katewwdb.com/
uSearchMigratedDefaultURL = hxxp://search.yahoo.com/search?p={searchTerms}&ei=utf-8&fr=b1ie7
uInternet Settings,ProxyOverride = *.local
uSearchURL,(Default) = hxxp://red.clientapps.yahoo.com/customize/ptec/defaults/su/*http://www.yahoo.com
IE: Append to existing PDF - e:\program files\Adobe\Acrobat 8.0\Acrobat\AcroIEFavClient.dll/AcroIEAppend.html
IE: Convert link target to Adobe PDF - e:\program files\Adobe\Acrobat 8.0\Acrobat\AcroIEFavClient.dll/AcroIECapture.html
IE: Convert link target to existing PDF - e:\program files\Adobe\Acrobat 8.0\Acrobat\AcroIEFavClient.dll/AcroIEAppend.html
IE: Convert selected links to Adobe PDF - e:\program files\Adobe\Acrobat 8.0\Acrobat\AcroIEFavClient.dll/AcroIECaptureSelLinks.html
IE: Convert selected links to existing PDF - e:\program files\Adobe\Acrobat 8.0\Acrobat\AcroIEFavClient.dll/AcroIEAppendSelLinks.html
IE: Convert selection to Adobe PDF - e:\program files\Adobe\Acrobat 8.0\Acrobat\AcroIEFavClient.dll/AcroIECapture.html
IE: Convert selection to existing PDF - e:\program files\Adobe\Acrobat 8.0\Acrobat\AcroIEFavClient.dll/AcroIEAppend.html
IE: Convert to Adobe PDF - e:\program files\Adobe\Acrobat 8.0\Acrobat\AcroIEFavClient.dll/AcroIECapture.html
IE: E&xport to Microsoft Excel - e:\progra~1\MICROS~2\Office10\EXCEL.EXE/3000
Trusted Zone: //api.msappspace.com/
Trusted Zone: gmail.com\www
Trusted Zone: google.com\www
Trusted Zone: msappspace.com\www
Trusted Zone: msappspace.com\www.api
Trusted Zone: myspace.com
Trusted Zone: myspace.com\profile
Trusted Zone: wwdb.com\www
Handler: bwfile-5745897 - {3C365521-EB92-4444-A6F7-8050397FB607} - e:\program files\Delivery Center\5745897\Program\GAPlugProtocol-5745897.dll
Handler: hddlife - {BD758015-47D9-477A-8873-4B688A2BC0E2} - e:\program files\BinarySense\HDDlife 3\hlAPP.dll
DPF: DirectAnimation Java Classes - file://e:\windows\Java\classes\dajava.cab
DPF: Microsoft XML Parser for Java - file://e:\windows\Java\classes\xmldso.cab
FF - ProfilePath - e:\documents and settings\Nagata Business Grp\Application Data\Mozilla\Firefox\Profiles\oo6qcr3o.default\
FF - prefs.js: browser.search.selectedEngine - Yahoo! Search
FF - prefs.js: keyword.URL - hxxp://us.yhs.search.yahoo.com/avg/search?fr=yhs-avg&type=yahoo_avg_hs2-tb-web_us&p=
FF - component: e:\program files\AVG\AVG9\Firefox\components\avgssff.dll
FF - plugin: e:\program files\Mozilla Firefox\plugins\NPZoneSB.dll

---- FIREFOX POLICIES ----
e:\program files\Mozilla Firefox\greprefs\all.js - pref("ui.use_native_colors", true);
e:\program files\Mozilla Firefox\greprefs\all.js - pref("ui.use_native_popup_windows", false);
e:\program files\Mozilla Firefox\greprefs\all.js - pref("browser.enable_click_image_resizing", true);
e:\program files\Mozilla Firefox\greprefs\all.js - pref("accessibility.browsewithcaret_shortcut.enabled", true);
e:\program files\Mozilla Firefox\greprefs\all.js - pref("javascript.options.mem.high_water_mark", 32);
e:\program files\Mozilla Firefox\greprefs\all.js - pref("javascript.options.mem.gc_frequency", 1600);
e:\program files\Mozilla Firefox\greprefs\all.js - pref("network.auth.force-generic-ntlm", false);
e:\program files\Mozilla Firefox\greprefs\all.js - pref("svg.smil.enabled", false);
e:\program files\Mozilla Firefox\greprefs\all.js - pref("ui.trackpoint_hack.enabled", -1);
e:\program files\Mozilla Firefox\greprefs\all.js - pref("browser.formfill.debug", false);
e:\program files\Mozilla Firefox\greprefs\all.js - pref("browser.formfill.agedWeight", 2);
e:\program files\Mozilla Firefox\greprefs\all.js - pref("browser.formfill.bucketSize", 1);
e:\program files\Mozilla Firefox\greprefs\all.js - pref("browser.formfill.maxTimeGroupings", 25);
e:\program files\Mozilla Firefox\greprefs\all.js - pref("browser.formfill.timeGroupingSize", 604800);
e:\program files\Mozilla Firefox\greprefs\all.js - pref("browser.formfill.boundaryWeight", 25);
e:\program files\Mozilla Firefox\greprefs\all.js - pref("browser.formfill.prefixWeight", 5);
e:\program files\Mozilla Firefox\greprefs\all.js - pref("html5.enable", false);
e:\program files\Mozilla Firefox\greprefs\security-prefs.js - pref("security.ssl.allow_unrestricted_renego_everywhere__temporarily_available_pref", true);
e:\program files\Mozilla Firefox\greprefs\security-prefs.js - pref("security.ssl.renego_unrestricted_hosts", "");
e:\program files\Mozilla Firefox\greprefs\security-prefs.js - pref("security.ssl.treat_unsafe_negotiation_as_broken", false);
e:\program files\Mozilla Firefox\greprefs\security-prefs.js - pref("security.ssl.require_safe_negotiation", false);
e:\program files\Mozilla Firefox\defaults\pref\firefox-branding.js - pref("app.update.download.backgroundInterval", 600);
e:\program files\Mozilla Firefox\defaults\pref\firefox-branding.js - pref("app.update.url.manual", "http://www.firefox.com");
e:\program files\Mozilla Firefox\defaults\pref\firefox-branding.js - pref("browser.search.param.yahoo-fr-ja", "mozff");
e:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("extensions.{972ce4c6-7e08-4474-a285-3208198ce6fd}.name", "chrome://browser/locale/browser.properties");
e:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("extensions.{972ce4c6-7e08-4474-a285-3208198ce6fd}.description", "chrome://browser/locale/browser.properties");
e:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("xpinstall.whitelist.add", "addons.mozilla.org");
e:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("xpinstall.whitelist.add.36", "getpersonas.com");
e:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("lightweightThemes.update.enabled", true);
e:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("browser.allTabs.previews", false);
e:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("plugins.hide_infobar_for_outdated_plugin", false);
e:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("plugins.update.notifyUser", false);
e:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("toolbar.customization.usesheet", false);
e:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("browser.taskbar.previews.enable", false);
e:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("browser.taskbar.previews.max", 20);
e:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("browser.taskbar.previews.cachetime", 20);
.
- - - - ORPHANS REMOVED - - - -

AddRemove-AIPL WarmTone - e:\program files\steinberg\vstplugins\Uninst.isu
AddRemove-AKAI professional VST Collection v1.0 - e:\progra~1\STEINB~1\VSTPLU~1\VSTPLU~1\UNWISE.EXE
AddRemove-BS-1 VSTi v1.0.4 - e:\progra~1\STEINB~1\VSTPLU~1\BS1-UN~1.EXE
AddRemove-CesSynth.1.VST2.Instrument.v1.3-ZONE - e:\progra~1\STEINB~1\CUBASE~3\VSTPLU~1\UNWISE.EXE
AddRemove-CesSynth.2.VST2.Instrument.v1.3-ZONE - e:\progra~1\STEINB~1\CUBASE~3\VSTPLU~1\UNWISE.EXE
AddRemove-CesSynth.5.VST2.Instrument.v1.1-ZONE - e:\progra~1\STEINB~1\CUBASE~3\VSTPLU~1\UNWISE.EXE
AddRemove-Sonar Producer Edition v4.0.3 - e:\progra~1\Cakewalk\SONAR4~1\UNWISE.EXE
AddRemove-Steinberg Voice Designer v1.03 - e:\progra~1\STEINB~1\VSTPLU~1\VSTPLU~1\VOICED~1\UNWISE.EXE
AddRemove-Timeworks Mastering EQ - e:\program files\steinberg\vstplugins\Uninst.isu
AddRemove-timeworks Reverb 4080L - e:\program files\steinberg\vstplugins\Uninst.isu
AddRemove-VoxCiter VST 1.07 - e:\progra~1\STEINB~1\VSTPLU~1\VoxCiter\UNWISE.EXE
AddRemove-Warp VST V1.0 - e:\progra~1\STEINB~1\VSTPLU~1\WARPVS~1.0\UNWISE.EXE



**************************************************************************

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2010-03-22 23:57
Windows 5.1.2600 Service Pack 3 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully
hidden files: 0

**************************************************************************
.
--------------------- LOCKED REGISTRY KEYS ---------------------

[HKEY_USERS\.Default\Software\Microsoft\Internet Explorer\User Preferences]
@Denied: (2) (LocalSystem)
"88D7D0879DAB32E14DE5B3A805A34F98AFF34F5977"=hex:01,00,00,00,d0,8c,9d,df,01,15,
d1,11,8c,7a,00,c0,4f,c2,97,eb,01,00,00,00,92,7d,04,d4,66,5b,a1,49,8e,1d,63,\
"2D53CFFC5C1A3DD2E97B7979AC2A92BD59BC839E81"=hex:01,00,00,00,d0,8c,9d,df,01,15,
d1,11,8c,7a,00,c0,4f,c2,97,eb,01,00,00,00,92,7d,04,d4,66,5b,a1,49,8e,1d,63,\

[HKEY_USERS\S-1-5-21-1343024091-630328440-839522115-1003\Software\Microsoft\SystemCertificates\AddressBook*]
@Allowed: (Read) (RestrictedCode)
@Allowed: (Read) (RestrictedCode)
.
Completion time: 2010-03-22 23:59:20
ComboFix-quarantined-files.txt 2010-03-23 09:59

Pre-Run: 114,512,809,984 bytes free
Post-Run: 114,530,619,392 bytes free

WindowsXP-KB310994-SP2-Pro-BootDisk-ENU.exe
[boot loader]
timeout=2
default=multi(0)disk(0)rdisk(0)partition(1)\WINDOWS
[operating systems]
e:\cmdcons\BOOTSECT.DAT="Microsoft Windows Recovery Console" /cmdcons
multi(0)disk(0)rdisk(0)partition(1)\WINDOWS="Microsoft Windows XP Professional" /fastdetect /NoExecute=OptIn

- - End Of File - - 52F9CF2C4E7C9472B25993B90F0D801B


#6 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:04:03 PM

Posted 23 March 2010 - 01:18 PM

There's temp files that belong to the TDSS rootkit which we need to check out.
  • Download TDSSKiller and save it to your Desktop.

  • Extract its contents to your desktop and make sure TDSSKiller.exe (the contents of the zipped file) is on the Desktop itself, not within a folder on the desktop.

  • Go to Start > Run (Or you can hold down your Windows key and press R) and copy and paste the following into the text field. (make sure you include the quote marks) Then press OK.

    "%userprofile%\Desktop\TDSSKiller.exe" -l C:\TDSSKiller.txt -v

  • If it says "Hidden service detected" DO NOT type anything in. Just press Enter on your keyboard to leave the file alone
    .
  • When it is done, a log file should be created on your C: drive called "TDSSKiller.txt" please copy and paste the contents of that file here (or attach it).

Thanks thumbup2.gif
Posted Image
m0le is a proud member of UNITE

#7 NagataBusinessGroup

NagataBusinessGroup
  • Topic Starter

  • Members
  • 7 posts
  • OFFLINE
  •  
  • Local time:06:03 AM

Posted 23 March 2010 - 11:16 PM

Hey Mole,
Ok did exactly as you said. Here's the results:


18:14:39:765 3860 TDSS rootkit removing tool 2.2.8 Mar 10 2010 15:53:20
18:14:39:765 3860 ================================================================================
18:14:39:765 3860 SystemInfo:

18:14:39:765 3860 OS Version: 5.1.2600 ServicePack: 3.0
18:14:39:765 3860 Product type: Workstation
18:14:39:765 3860 ComputerName: NBGDESKTOP
18:14:39:781 3860 UserName: Nagata Business Grp
18:14:39:781 3860 Windows directory: E:\WINDOWS
18:14:39:781 3860 Processor architecture: Intel x86
18:14:39:781 3860 Number of processors: 2
18:14:39:781 3860 Page size: 0x1000
18:14:39:781 3860 Boot type: Normal boot
18:14:39:781 3860 ================================================================================
18:14:39:781 3860 UnloadDriverW: NtUnloadDriver error 2
18:14:39:781 3860 ForceUnloadDriverW: UnloadDriverW(klmd21) error 2
18:14:39:828 3860 wfopen_ex: Trying to open file E:\WINDOWS\system32\config\system
18:14:39:828 3860 wfopen_ex: MyNtCreateFileW error 32 (C0000043)
18:14:39:828 3860 wfopen_ex: Trying to KLMD file open
18:14:39:828 3860 wfopen_ex: File opened ok (Flags 2)
18:14:39:828 3860 wfopen_ex: Trying to open file E:\WINDOWS\system32\config\software
18:14:39:828 3860 wfopen_ex: MyNtCreateFileW error 32 (C0000043)
18:14:39:828 3860 wfopen_ex: Trying to KLMD file open
18:14:39:828 3860 wfopen_ex: File opened ok (Flags 2)
18:14:39:828 3860 Initialize success
18:14:39:828 3860
18:14:39:828 3860 Scanning Services ...
18:14:40:187 3860 GetAdvancedServicesInfo: Raw services enum returned 359 services
18:14:40:187 3860
18:14:40:187 3860 Scanning Kernel memory ...
18:14:40:187 3860 Devices to scan: 4
18:14:40:187 3860
18:14:40:187 3860 Driver Name: Disk
18:14:40:187 3860 IRP_MJ_CREATE : F7566BB0
18:14:40:187 3860 IRP_MJ_CREATE_NAMED_PIPE : 804F4562
18:14:40:187 3860 IRP_MJ_CLOSE : F7566BB0
18:14:40:187 3860 IRP_MJ_READ : F7560D1F
18:14:40:187 3860 IRP_MJ_WRITE : F7560D1F
18:14:40:187 3860 IRP_MJ_QUERY_INFORMATION : 804F4562
18:14:40:187 3860 IRP_MJ_SET_INFORMATION : 804F4562
18:14:40:187 3860 IRP_MJ_QUERY_EA : 804F4562
18:14:40:187 3860 IRP_MJ_SET_EA : 804F4562
18:14:40:187 3860 IRP_MJ_FLUSH_BUFFERS : F75612E2
18:14:40:187 3860 IRP_MJ_QUERY_VOLUME_INFORMATION : 804F4562
18:14:40:187 3860 IRP_MJ_SET_VOLUME_INFORMATION : 804F4562
18:14:40:187 3860 IRP_MJ_DIRECTORY_CONTROL : 804F4562
18:14:40:187 3860 IRP_MJ_FILE_SYSTEM_CONTROL : 804F4562
18:14:40:187 3860 IRP_MJ_DEVICE_CONTROL : F75613BB
18:14:40:187 3860 IRP_MJ_INTERNAL_DEVICE_CONTROL : F7564F28
18:14:40:187 3860 IRP_MJ_SHUTDOWN : F75612E2
18:14:40:187 3860 IRP_MJ_LOCK_CONTROL : 804F4562
18:14:40:187 3860 IRP_MJ_CLEANUP : 804F4562
18:14:40:187 3860 IRP_MJ_CREATE_MAILSLOT : 804F4562
18:14:40:187 3860 IRP_MJ_QUERY_SECURITY : 804F4562
18:14:40:187 3860 IRP_MJ_SET_SECURITY : 804F4562
18:14:40:187 3860 IRP_MJ_POWER : F7562C82
18:14:40:187 3860 IRP_MJ_SYSTEM_CONTROL : F756799E
18:14:40:187 3860 IRP_MJ_DEVICE_CHANGE : 804F4562
18:14:40:187 3860 IRP_MJ_QUERY_QUOTA : 804F4562
18:14:40:187 3860 IRP_MJ_SET_QUOTA : 804F4562
18:14:40:203 3860 E:\WINDOWS\system32\DRIVERS\disk.sys - Verdict: 1
18:14:40:203 3860
18:14:40:203 3860 Driver Name: USBSTOR
18:14:40:203 3860 IRP_MJ_CREATE : F1E4B218
18:14:40:203 3860 IRP_MJ_CREATE_NAMED_PIPE : 804F4562
18:14:40:203 3860 IRP_MJ_CLOSE : F1E4B218
18:14:40:203 3860 IRP_MJ_READ : F1E4B23C
18:14:40:203 3860 IRP_MJ_WRITE : F1E4B23C
18:14:40:203 3860 IRP_MJ_QUERY_INFORMATION : 804F4562
18:14:40:203 3860 IRP_MJ_SET_INFORMATION : 804F4562
18:14:40:203 3860 IRP_MJ_QUERY_EA : 804F4562
18:14:40:203 3860 IRP_MJ_SET_EA : 804F4562
18:14:40:203 3860 IRP_MJ_FLUSH_BUFFERS : 804F4562
18:14:40:203 3860 IRP_MJ_QUERY_VOLUME_INFORMATION : 804F4562
18:14:40:203 3860 IRP_MJ_SET_VOLUME_INFORMATION : 804F4562
18:14:40:203 3860 IRP_MJ_DIRECTORY_CONTROL : 804F4562
18:14:40:203 3860 IRP_MJ_FILE_SYSTEM_CONTROL : 804F4562
18:14:40:203 3860 IRP_MJ_DEVICE_CONTROL : F1E4B180
18:14:40:203 3860 IRP_MJ_INTERNAL_DEVICE_CONTROL : F1E469E6
18:14:40:203 3860 IRP_MJ_SHUTDOWN : 804F4562
18:14:40:203 3860 IRP_MJ_LOCK_CONTROL : 804F4562
18:14:40:203 3860 IRP_MJ_CLEANUP : 804F4562
18:14:40:203 3860 IRP_MJ_CREATE_MAILSLOT : 804F4562
18:14:40:203 3860 IRP_MJ_QUERY_SECURITY : 804F4562
18:14:40:203 3860 IRP_MJ_SET_SECURITY : 804F4562
18:14:40:203 3860 IRP_MJ_POWER : F1E4A5F0
18:14:40:203 3860 IRP_MJ_SYSTEM_CONTROL : F1E48A6E
18:14:40:203 3860 IRP_MJ_DEVICE_CHANGE : 804F4562
18:14:40:203 3860 IRP_MJ_QUERY_QUOTA : 804F4562
18:14:40:203 3860 IRP_MJ_SET_QUOTA : 804F4562
18:14:40:203 3860 E:\WINDOWS\system32\DRIVERS\USBSTOR.SYS - Verdict: 1
18:14:40:203 3860
18:14:40:203 3860 Driver Name: Disk
18:14:40:203 3860 IRP_MJ_CREATE : F7566BB0
18:14:40:203 3860 IRP_MJ_CREATE_NAMED_PIPE : 804F4562
18:14:40:203 3860 IRP_MJ_CLOSE : F7566BB0
18:14:40:203 3860 IRP_MJ_READ : F7560D1F
18:14:40:203 3860 IRP_MJ_WRITE : F7560D1F
18:14:40:203 3860 IRP_MJ_QUERY_INFORMATION : 804F4562
18:14:40:203 3860 IRP_MJ_SET_INFORMATION : 804F4562
18:14:40:203 3860 IRP_MJ_QUERY_EA : 804F4562
18:14:40:203 3860 IRP_MJ_SET_EA : 804F4562
18:14:40:203 3860 IRP_MJ_FLUSH_BUFFERS : F75612E2
18:14:40:203 3860 IRP_MJ_QUERY_VOLUME_INFORMATION : 804F4562
18:14:40:203 3860 IRP_MJ_SET_VOLUME_INFORMATION : 804F4562
18:14:40:203 3860 IRP_MJ_DIRECTORY_CONTROL : 804F4562
18:14:40:203 3860 IRP_MJ_FILE_SYSTEM_CONTROL : 804F4562
18:14:40:203 3860 IRP_MJ_DEVICE_CONTROL : F75613BB
18:14:40:203 3860 IRP_MJ_INTERNAL_DEVICE_CONTROL : F7564F28
18:14:40:203 3860 IRP_MJ_SHUTDOWN : F75612E2
18:14:40:203 3860 IRP_MJ_LOCK_CONTROL : 804F4562
18:14:40:203 3860 IRP_MJ_CLEANUP : 804F4562
18:14:40:203 3860 IRP_MJ_CREATE_MAILSLOT : 804F4562
18:14:40:203 3860 IRP_MJ_QUERY_SECURITY : 804F4562
18:14:40:203 3860 IRP_MJ_SET_SECURITY : 804F4562
18:14:40:203 3860 IRP_MJ_POWER : F7562C82
18:14:40:203 3860 IRP_MJ_SYSTEM_CONTROL : F756799E
18:14:40:203 3860 IRP_MJ_DEVICE_CHANGE : 804F4562
18:14:40:203 3860 IRP_MJ_QUERY_QUOTA : 804F4562
18:14:40:203 3860 IRP_MJ_SET_QUOTA : 804F4562
18:14:40:218 3860 E:\WINDOWS\system32\DRIVERS\disk.sys - Verdict: 1
18:14:40:218 3860
18:14:40:218 3860 Driver Name: atapi
18:14:40:218 3860 IRP_MJ_CREATE : F738D6F2
18:14:40:218 3860 IRP_MJ_CREATE_NAMED_PIPE : 804F4562
18:14:40:218 3860 IRP_MJ_CLOSE : F738D6F2
18:14:40:218 3860 IRP_MJ_READ : 804F4562
18:14:40:218 3860 IRP_MJ_WRITE : 804F4562
18:14:40:218 3860 IRP_MJ_QUERY_INFORMATION : 804F4562
18:14:40:218 3860 IRP_MJ_SET_INFORMATION : 804F4562
18:14:40:218 3860 IRP_MJ_QUERY_EA : 804F4562
18:14:40:218 3860 IRP_MJ_SET_EA : 804F4562
18:14:40:218 3860 IRP_MJ_FLUSH_BUFFERS : 804F4562
18:14:40:218 3860 IRP_MJ_QUERY_VOLUME_INFORMATION : 804F4562
18:14:40:218 3860 IRP_MJ_SET_VOLUME_INFORMATION : 804F4562
18:14:40:218 3860 IRP_MJ_DIRECTORY_CONTROL : 804F4562
18:14:40:218 3860 IRP_MJ_FILE_SYSTEM_CONTROL : 804F4562
18:14:40:218 3860 IRP_MJ_DEVICE_CONTROL : F738D712
18:14:40:218 3860 IRP_MJ_INTERNAL_DEVICE_CONTROL : F7389852
18:14:40:218 3860 IRP_MJ_SHUTDOWN : 804F4562
18:14:40:218 3860 IRP_MJ_LOCK_CONTROL : 804F4562
18:14:40:218 3860 IRP_MJ_CLEANUP : 804F4562
18:14:40:218 3860 IRP_MJ_CREATE_MAILSLOT : 804F4562
18:14:40:218 3860 IRP_MJ_QUERY_SECURITY : 804F4562
18:14:40:218 3860 IRP_MJ_SET_SECURITY : 804F4562
18:14:40:218 3860 IRP_MJ_POWER : F738D73C
18:14:40:218 3860 IRP_MJ_SYSTEM_CONTROL : F7394336
18:14:40:218 3860 IRP_MJ_DEVICE_CHANGE : 804F4562
18:14:40:218 3860 IRP_MJ_QUERY_QUOTA : 804F4562
18:14:40:218 3860 IRP_MJ_SET_QUOTA : 804F4562
18:14:40:218 3860 E:\WINDOWS\system32\DRIVERS\atapi.sys - Verdict: 1
18:14:40:218 3860
18:14:40:218 3860 Completed
18:14:40:218 3860
18:14:40:218 3860 Results:
18:14:40:218 3860 Memory objects infected / cured / cured on reboot: 0 / 0 / 0
18:14:40:218 3860 Registry objects infected / cured / cured on reboot: 0 / 0 / 0
18:14:40:218 3860 File objects infected / cured / cured on reboot: 0 / 0 / 0
18:14:40:218 3860
18:14:40:218 3860 fclose_ex: Trying to close file E:\WINDOWS\system32\config\system
18:14:40:218 3860 fclose_ex: Trying to close file E:\WINDOWS\system32\config\software
18:14:40:234 3860 KLMD(ARK) unloaded successfully



#8 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:04:03 PM

Posted 24 March 2010 - 07:13 PM

Good news with TDSSKiller. thumbup2.gif

Backup Your Registry with ERUNT
  • Please use the following link and scroll down to ERUNT and download it.
    http://aumha.org/freeware/freeware.php
  • For version with the Installer:
    Use the setup program to install ERUNT on your computer
  • For the zipped version:
    Unzip all the files into a folder of your choice.
Click Erunt.exe to backup your registry to the folder of your choice.

Note: to restore your registry, go to the folder and start ERDNT.exe

We need to execute an OTM script
  1. Please download OTM by OldTimer and save it to your desktop.
  2. Double click the icon on your desktop.
  3. Paste the following code under the area. Do not include the word "Code".
    CODE
    :Files
    e:\windows\Internet Logs\x*.tmp
    e:\windows\S16822132.tmp
  4. Push the large button.
  5. OTM may ask to reboot the machine. Please do so if asked.
  6. Copy/Paste the contents under the line here in your next reply.
  7. If you are unable to copy/paste from this window (as will be the case if the machine was rebooted), open Notepad (Start->All Programs->Accessories->Notepad), click File->Open, in the File Name box enter *.log and press the Enter key, navigate to the C:\_OTM\MovedFiles folder, and open the newest .log file present, and copy/paste the contents of that document back here in your next post.
Post the OTM log.


Now let's reset the hijack

Please download HostsXpert 4.3
  • Extract (unzip) HostsXpert.zip to a permanent folder on your hard drive such as C:\HostsXpert
  • Double-click HostsXpert.exe to run the program.
  • Click "Restore MS Hosts File".
  • Click OK at the confirmation box.
  • Click "Make Read Only".
  • Click the X to exit the program.
-- Note: If you were using a custom Hosts file you will need to replace any of those entries yourself.

Let me know how the PC is performing too.

Thanks thumbup2.gif
Posted Image
m0le is a proud member of UNITE

#9 NagataBusinessGroup

NagataBusinessGroup
  • Topic Starter

  • Members
  • 7 posts
  • OFFLINE
  •  
  • Local time:06:03 AM

Posted 24 March 2010 - 09:37 PM

Hey Mole,
Here's the results from OTM:

========== FILES ==========
e:\windows\Internet Logs\xDB1.tmp moved successfully.
e:\windows\Internet Logs\xDB10.tmp moved successfully.
e:\windows\Internet Logs\xDB100.tmp moved successfully.
e:\windows\Internet Logs\xDB101.tmp moved successfully.
e:\windows\Internet Logs\xDB102.tmp moved successfully.
e:\windows\Internet Logs\xDB103.tmp moved successfully.
e:\windows\Internet Logs\xDB104.tmp moved successfully.
e:\windows\Internet Logs\xDB105.tmp moved successfully.
e:\windows\Internet Logs\xDB11.tmp moved successfully.
e:\windows\Internet Logs\xDB12.tmp moved successfully.
e:\windows\Internet Logs\xDB13.tmp moved successfully.
e:\windows\Internet Logs\xDB14.tmp moved successfully.
e:\windows\Internet Logs\xDB15.tmp moved successfully.
e:\windows\Internet Logs\xDB16.tmp moved successfully.
e:\windows\Internet Logs\xDB17.tmp moved successfully.
e:\windows\Internet Logs\xDB18.tmp moved successfully.
e:\windows\Internet Logs\xDB19.tmp moved successfully.
e:\windows\Internet Logs\xDB1A.tmp moved successfully.
e:\windows\Internet Logs\xDB1B.tmp moved successfully.
e:\windows\Internet Logs\xDB1C.tmp moved successfully.
e:\windows\Internet Logs\xDB1D.tmp moved successfully.
e:\windows\Internet Logs\xDB1E.tmp moved successfully.
e:\windows\Internet Logs\xDB1F.tmp moved successfully.
e:\windows\Internet Logs\xDB2.tmp moved successfully.
e:\windows\Internet Logs\xDB20.tmp moved successfully.
e:\windows\Internet Logs\xDB21.tmp moved successfully.
e:\windows\Internet Logs\xDB22.tmp moved successfully.
e:\windows\Internet Logs\xDB23.tmp moved successfully.
e:\windows\Internet Logs\xDB24.tmp moved successfully.
e:\windows\Internet Logs\xDB25.tmp moved successfully.
e:\windows\Internet Logs\xDB26.tmp moved successfully.
e:\windows\Internet Logs\xDB27.tmp moved successfully.
e:\windows\Internet Logs\xDB28.tmp moved successfully.
e:\windows\Internet Logs\xDB29.tmp moved successfully.
e:\windows\Internet Logs\xDB2A.tmp moved successfully.
e:\windows\Internet Logs\xDB2B.tmp moved successfully.
e:\windows\Internet Logs\xDB2C.tmp moved successfully.
e:\windows\Internet Logs\xDB2D.tmp moved successfully.
e:\windows\Internet Logs\xDB2E.tmp moved successfully.
e:\windows\Internet Logs\xDB2F.tmp moved successfully.
e:\windows\Internet Logs\xDB3.tmp moved successfully.
e:\windows\Internet Logs\xDB30.tmp moved successfully.
e:\windows\Internet Logs\xDB31.tmp moved successfully.
e:\windows\Internet Logs\xDB32.tmp moved successfully.
e:\windows\Internet Logs\xDB33.tmp moved successfully.
e:\windows\Internet Logs\xDB34.tmp moved successfully.
e:\windows\Internet Logs\xDB35.tmp moved successfully.
e:\windows\Internet Logs\xDB36.tmp moved successfully.
e:\windows\Internet Logs\xDB37.tmp moved successfully.
e:\windows\Internet Logs\xDB38.tmp moved successfully.
e:\windows\Internet Logs\xDB39.tmp moved successfully.
e:\windows\Internet Logs\xDB3A.tmp moved successfully.
e:\windows\Internet Logs\xDB3B.tmp moved successfully.
e:\windows\Internet Logs\xDB3C.tmp moved successfully.
e:\windows\Internet Logs\xDB3D.tmp moved successfully.
e:\windows\Internet Logs\xDB3E.tmp moved successfully.
e:\windows\Internet Logs\xDB3F.tmp moved successfully.
e:\windows\Internet Logs\xDB4.tmp moved successfully.
e:\windows\Internet Logs\xDB40.tmp moved successfully.
e:\windows\Internet Logs\xDB41.tmp moved successfully.
e:\windows\Internet Logs\xDB42.tmp moved successfully.
e:\windows\Internet Logs\xDB43.tmp moved successfully.
e:\windows\Internet Logs\xDB44.tmp moved successfully.
e:\windows\Internet Logs\xDB45.tmp moved successfully.
e:\windows\Internet Logs\xDB46.tmp moved successfully.
e:\windows\Internet Logs\xDB47.tmp moved successfully.
e:\windows\Internet Logs\xDB48.tmp moved successfully.
e:\windows\Internet Logs\xDB49.tmp moved successfully.
e:\windows\Internet Logs\xDB4A.tmp moved successfully.
e:\windows\Internet Logs\xDB4B.tmp moved successfully.
e:\windows\Internet Logs\xDB4C.tmp moved successfully.
e:\windows\Internet Logs\xDB4D.tmp moved successfully.
e:\windows\Internet Logs\xDB4E.tmp moved successfully.
e:\windows\Internet Logs\xDB4F.tmp moved successfully.
e:\windows\Internet Logs\xDB5.tmp moved successfully.
e:\windows\Internet Logs\xDB50.tmp moved successfully.
e:\windows\Internet Logs\xDB51.tmp moved successfully.
e:\windows\Internet Logs\xDB52.tmp moved successfully.
e:\windows\Internet Logs\xDB53.tmp moved successfully.
e:\windows\Internet Logs\xDB54.tmp moved successfully.
e:\windows\Internet Logs\xDB55.tmp moved successfully.
e:\windows\Internet Logs\xDB56.tmp moved successfully.
e:\windows\Internet Logs\xDB57.tmp moved successfully.
e:\windows\Internet Logs\xDB58.tmp moved successfully.
e:\windows\Internet Logs\xDB59.tmp moved successfully.
e:\windows\Internet Logs\xDB5A.tmp moved successfully.
e:\windows\Internet Logs\xDB5B.tmp moved successfully.
e:\windows\Internet Logs\xDB5C.tmp moved successfully.
e:\windows\Internet Logs\xDB5D.tmp moved successfully.
e:\windows\Internet Logs\xDB5E.tmp moved successfully.
e:\windows\Internet Logs\xDB5F.tmp moved successfully.
e:\windows\Internet Logs\xDB6.tmp moved successfully.
e:\windows\Internet Logs\xDB60.tmp moved successfully.
e:\windows\Internet Logs\xDB61.tmp moved successfully.
e:\windows\Internet Logs\xDB62.tmp moved successfully.
e:\windows\Internet Logs\xDB63.tmp moved successfully.
e:\windows\Internet Logs\xDB64.tmp moved successfully.
e:\windows\Internet Logs\xDB65.tmp moved successfully.
e:\windows\Internet Logs\xDB66.tmp moved successfully.
e:\windows\Internet Logs\xDB67.tmp moved successfully.
e:\windows\Internet Logs\xDB68.tmp moved successfully.
e:\windows\Internet Logs\xDB69.tmp moved successfully.
e:\windows\Internet Logs\xDB6A.tmp moved successfully.
e:\windows\Internet Logs\xDB6B.tmp moved successfully.
e:\windows\Internet Logs\xDB6C.tmp moved successfully.
e:\windows\Internet Logs\xDB6D.tmp moved successfully.
e:\windows\Internet Logs\xDB6E.tmp moved successfully.
e:\windows\Internet Logs\xDB6F.tmp moved successfully.
e:\windows\Internet Logs\xDB7.tmp moved successfully.
e:\windows\Internet Logs\xDB70.tmp moved successfully.
e:\windows\Internet Logs\xDB71.tmp moved successfully.
e:\windows\Internet Logs\xDB72.tmp moved successfully.
e:\windows\Internet Logs\xDB73.tmp moved successfully.
e:\windows\Internet Logs\xDB74.tmp moved successfully.
e:\windows\Internet Logs\xDB75.tmp moved successfully.
e:\windows\Internet Logs\xDB76.tmp moved successfully.
e:\windows\Internet Logs\xDB77.tmp moved successfully.
e:\windows\Internet Logs\xDB78.tmp moved successfully.
e:\windows\Internet Logs\xDB79.tmp moved successfully.
e:\windows\Internet Logs\xDB7A.tmp moved successfully.
e:\windows\Internet Logs\xDB7B.tmp moved successfully.
e:\windows\Internet Logs\xDB7C.tmp moved successfully.
e:\windows\Internet Logs\xDB7D.tmp moved successfully.
e:\windows\Internet Logs\xDB7E.tmp moved successfully.
e:\windows\Internet Logs\xDB7F.tmp moved successfully.
e:\windows\Internet Logs\xDB8.tmp moved successfully.
e:\windows\Internet Logs\xDB80.tmp moved successfully.
e:\windows\Internet Logs\xDB81.tmp moved successfully.
e:\windows\Internet Logs\xDB82.tmp moved successfully.
e:\windows\Internet Logs\xDB83.tmp moved successfully.
e:\windows\Internet Logs\xDB84.tmp moved successfully.
e:\windows\Internet Logs\xDB85.tmp moved successfully.
e:\windows\Internet Logs\xDB86.tmp moved successfully.
e:\windows\Internet Logs\xDB87.tmp moved successfully.
e:\windows\Internet Logs\xDB88.tmp moved successfully.
e:\windows\Internet Logs\xDB89.tmp moved successfully.
e:\windows\Internet Logs\xDB8A.tmp moved successfully.
e:\windows\Internet Logs\xDB8B.tmp moved successfully.
e:\windows\Internet Logs\xDB8C.tmp moved successfully.
e:\windows\Internet Logs\xDB8D.tmp moved successfully.
e:\windows\Internet Logs\xDB8E.tmp moved successfully.
e:\windows\Internet Logs\xDB8F.tmp moved successfully.
e:\windows\Internet Logs\xDB9.tmp moved successfully.
e:\windows\Internet Logs\xDB90.tmp moved successfully.
e:\windows\Internet Logs\xDB91.tmp moved successfully.
e:\windows\Internet Logs\xDB92.tmp moved successfully.
e:\windows\Internet Logs\xDB93.tmp moved successfully.
e:\windows\Internet Logs\xDB94.tmp moved successfully.
e:\windows\Internet Logs\xDB95.tmp moved successfully.
e:\windows\Internet Logs\xDB96.tmp moved successfully.
e:\windows\Internet Logs\xDB97.tmp moved successfully.
e:\windows\Internet Logs\xDB98.tmp moved successfully.
e:\windows\Internet Logs\xDB99.tmp moved successfully.
e:\windows\Internet Logs\xDB9A.tmp moved successfully.
e:\windows\Internet Logs\xDB9B.tmp moved successfully.
e:\windows\Internet Logs\xDB9C.tmp moved successfully.
e:\windows\Internet Logs\xDB9D.tmp moved successfully.
e:\windows\Internet Logs\xDB9E.tmp moved successfully.
e:\windows\Internet Logs\xDB9F.tmp moved successfully.
e:\windows\Internet Logs\xDBA.tmp moved successfully.
e:\windows\Internet Logs\xDBA0.tmp moved successfully.
e:\windows\Internet Logs\xDBA1.tmp moved successfully.
e:\windows\Internet Logs\xDBA2.tmp moved successfully.
e:\windows\Internet Logs\xDBA3.tmp moved successfully.
e:\windows\Internet Logs\xDBA4.tmp moved successfully.
e:\windows\Internet Logs\xDBA5.tmp moved successfully.
e:\windows\Internet Logs\xDBA6.tmp moved successfully.
e:\windows\Internet Logs\xDBA7.tmp moved successfully.
e:\windows\Internet Logs\xDBA8.tmp moved successfully.
e:\windows\Internet Logs\xDBA9.tmp moved successfully.
e:\windows\Internet Logs\xDBAA.tmp moved successfully.
e:\windows\Internet Logs\xDBAB.tmp moved successfully.
e:\windows\Internet Logs\xDBAC.tmp moved successfully.
e:\windows\Internet Logs\xDBAD.tmp moved successfully.
e:\windows\Internet Logs\xDBAE.tmp moved successfully.
e:\windows\Internet Logs\xDBAF.tmp moved successfully.
e:\windows\Internet Logs\xDBB.tmp moved successfully.
e:\windows\Internet Logs\xDBB0.tmp moved successfully.
e:\windows\Internet Logs\xDBB1.tmp moved successfully.
e:\windows\Internet Logs\xDBB2.tmp moved successfully.
e:\windows\Internet Logs\xDBB3.tmp moved successfully.
e:\windows\Internet Logs\xDBB4.tmp moved successfully.
e:\windows\Internet Logs\xDBB5.tmp moved successfully.
e:\windows\Internet Logs\xDBB6.tmp moved successfully.
e:\windows\Internet Logs\xDBB7.tmp moved successfully.
e:\windows\Internet Logs\xDBB8.tmp moved successfully.
e:\windows\Internet Logs\xDBB9.tmp moved successfully.
e:\windows\Internet Logs\xDBBA.tmp moved successfully.
e:\windows\Internet Logs\xDBBB.tmp moved successfully.
e:\windows\Internet Logs\xDBBC.tmp moved successfully.
e:\windows\Internet Logs\xDBBD.tmp moved successfully.
e:\windows\Internet Logs\xDBBE.tmp moved successfully.
e:\windows\Internet Logs\xDBBF.tmp moved successfully.
e:\windows\Internet Logs\xDBC.tmp moved successfully.
e:\windows\Internet Logs\xDBC0.tmp moved successfully.
e:\windows\Internet Logs\xDBC1.tmp moved successfully.
e:\windows\Internet Logs\xDBC2.tmp moved successfully.
e:\windows\Internet Logs\xDBC3.tmp moved successfully.
e:\windows\Internet Logs\xDBC4.tmp moved successfully.
e:\windows\Internet Logs\xDBC5.tmp moved successfully.
e:\windows\Internet Logs\xDBC6.tmp moved successfully.
e:\windows\Internet Logs\xDBC7.tmp moved successfully.
e:\windows\Internet Logs\xDBC8.tmp moved successfully.
e:\windows\Internet Logs\xDBC9.tmp moved successfully.
e:\windows\Internet Logs\xDBCA.tmp moved successfully.
e:\windows\Internet Logs\xDBCB.tmp moved successfully.
e:\windows\Internet Logs\xDBCC.tmp moved successfully.
e:\windows\Internet Logs\xDBCD.tmp moved successfully.
e:\windows\Internet Logs\xDBCE.tmp moved successfully.
e:\windows\Internet Logs\xDBCF.tmp moved successfully.
e:\windows\Internet Logs\xDBD.tmp moved successfully.
e:\windows\Internet Logs\xDBD0.tmp moved successfully.
e:\windows\Internet Logs\xDBD1.tmp moved successfully.
e:\windows\Internet Logs\xDBD2.tmp moved successfully.
e:\windows\Internet Logs\xDBD3.tmp moved successfully.
e:\windows\Internet Logs\xDBD4.tmp moved successfully.
e:\windows\Internet Logs\xDBD5.tmp moved successfully.
e:\windows\Internet Logs\xDBD6.tmp moved successfully.
e:\windows\Internet Logs\xDBD7.tmp moved successfully.
e:\windows\Internet Logs\xDBD8.tmp moved successfully.
e:\windows\Internet Logs\xDBD9.tmp moved successfully.
e:\windows\Internet Logs\xDBDA.tmp moved successfully.
e:\windows\Internet Logs\xDBDB.tmp moved successfully.
e:\windows\Internet Logs\xDBDC.tmp moved successfully.
e:\windows\Internet Logs\xDBDD.tmp moved successfully.
e:\windows\Internet Logs\xDBDE.tmp moved successfully.
e:\windows\Internet Logs\xDBDF.tmp moved successfully.
e:\windows\Internet Logs\xDBE.tmp moved successfully.
e:\windows\Internet Logs\xDBE0.tmp moved successfully.
e:\windows\Internet Logs\xDBE1.tmp moved successfully.
e:\windows\Internet Logs\xDBE2.tmp moved successfully.
e:\windows\Internet Logs\xDBE3.tmp moved successfully.
e:\windows\Internet Logs\xDBE4.tmp moved successfully.
e:\windows\Internet Logs\xDBE5.tmp moved successfully.
e:\windows\Internet Logs\xDBE6.tmp moved successfully.
e:\windows\Internet Logs\xDBE7.tmp moved successfully.
e:\windows\Internet Logs\xDBE8.tmp moved successfully.
e:\windows\Internet Logs\xDBE9.tmp moved successfully.
e:\windows\Internet Logs\xDBEA.tmp moved successfully.
e:\windows\Internet Logs\xDBEB.tmp moved successfully.
e:\windows\Internet Logs\xDBEC.tmp moved successfully.
e:\windows\Internet Logs\xDBED.tmp moved successfully.
e:\windows\Internet Logs\xDBEE.tmp moved successfully.
e:\windows\Internet Logs\xDBEF.tmp moved successfully.
e:\windows\Internet Logs\xDBF.tmp moved successfully.
e:\windows\Internet Logs\xDBF0.tmp moved successfully.
e:\windows\Internet Logs\xDBF1.tmp moved successfully.
e:\windows\Internet Logs\xDBF2.tmp moved successfully.
e:\windows\Internet Logs\xDBF3.tmp moved successfully.
e:\windows\Internet Logs\xDBF4.tmp moved successfully.
e:\windows\Internet Logs\xDBF5.tmp moved successfully.
e:\windows\Internet Logs\xDBF6.tmp moved successfully.
e:\windows\Internet Logs\xDBF7.tmp moved successfully.
e:\windows\Internet Logs\xDBF8.tmp moved successfully.
e:\windows\Internet Logs\xDBF9.tmp moved successfully.
e:\windows\Internet Logs\xDBFA.tmp moved successfully.
e:\windows\Internet Logs\xDBFB.tmp moved successfully.
e:\windows\Internet Logs\xDBFC.tmp moved successfully.
e:\windows\Internet Logs\xDBFD.tmp moved successfully.
e:\windows\Internet Logs\xDBFE.tmp moved successfully.
e:\windows\Internet Logs\xDBFF.tmp moved successfully.
File move failed. e:\windows\S16822132.tmp scheduled to be moved on reboot.

OTM by OldTimer - Version 3.1.10.1 log created on 03242010_161659


Holy smoke you did it!!! My computer works and I can search Google and log into my Gmail account!! THANK YOU SOOOOOO VERY MUCH!!! I appreciate the time and help!! Have a wonderful day!! thumbup.gif
Grant

#10 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:04:03 PM

Posted 25 March 2010 - 12:29 PM

We're not done yet, mate. smile.gif

I still need to make sure the temp file went on reboot and there's some more scanning to be done to check other files.

If you're still there please run the ESET online scan next

I'd like us to scan your machine with ESET OnlineScan
  1. Hold down Control and click on the following link to open ESET OnlineScan in a new window.
    ESET OnlineScan
  2. Click the button.
  3. For alternate browsers only: (Microsoft Internet Explorer users can skip these steps)
    1. Click on to download the ESET Smart Installer. Save it to your desktop.
    2. Double click on the icon on your desktop.
  4. Check
  5. Click the button.
  6. Accept any security warnings from your browser.
  7. Check
  8. Push the Start button.
  9. ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this can take some time.
  10. When the scan completes, push
  11. Push , and save the file to your desktop using a unique name, such as ESETScan. Include the contents of this report in your next reply.
  12. Push the button.
  13. Push
NOTE: If no malware is found there will be no option to export the text file as no log will be produced. Let me know if this is the case.
Thanks smile.gif
Posted Image
m0le is a proud member of UNITE

#11 NagataBusinessGroup

NagataBusinessGroup
  • Topic Starter

  • Members
  • 7 posts
  • OFFLINE
  •  
  • Local time:06:03 AM

Posted 26 March 2010 - 11:28 AM

Hey Mole,
DARN! Thought we were all done. You're thorough, I like your style. Anyways here's the results!

E:\Documents and Settings\Nagata Business Grp\Local Settings\Temp\NOD68AF.tmp a variant of Win32/Toolbar.MyWebSearch application
E:\Documents and Settings\Nagata Business Grp\Local Settings\Temp\NODC3D6.tmp Win32/Toolbar.MyWebSearch application


#12 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:04:03 PM

Posted 26 March 2010 - 11:40 AM

Two temp files - there's usually some remnants from infections.

We can start the clean-up now though. Please run ATF

Please download ATF Cleaner by Atribune.
    Double-click ATF-Cleaner.exe to run the program.
    Under Main "Select Files to Delete" choose: Select All.
    Click the Empty Selected button.
If you use Firefox browser
    Click Firefox at the top and choose: Select All
    Click the Empty Selected button.
    NOTE: If you would like to keep your saved passwords, please click No at the prompt.
If you use Opera browser
    Click Opera at the top and choose: Select All
    Click the Empty Selected button.
    NOTE: If you would like to keep your saved passwords, please click No at the prompt.
Click Exit on the Main menu to close the program.
For Technical Support, double-click the e-mail address located at the bottom of each menu.

If you are using Firefox and this has caused page loading problems then please clear your private data. To do this go
to the Tools menu, select Clear Private Data, and then check Cache. Click Clear Private Data Now.

This could also be Clear Recent History or similar

Then close Firefox and then reopen it.


Now flush the Java cache

To Clear the Java Runtime Environment (JRE) cache, do this:
  • Click Start > Settings > Control Panel.
  • Double-click the Java icon.
    -The Java Control Panel appears.
  • Click "Settings" under Temporary Internet Files.
    -The Temporary Files Settings dialog box appears.
  • Click "Delete Files".
    -The Delete Temporary Files dialog box appears.
    -There are three options on this window to clear the cache.
    • Delete Files
    • View Applications
    • View Applets
  • Click "OK" on Delete Temporary Files window.
    -Note: This deletes all the Downloaded Applications and Applets from the cache.
  • Click "OK" on Temporary Files Settings window.
  • Close the Java Control Panel.
You can also view these instructions along with screenshots here.

Finally, if you're happy, we can clear up and clear out laugh.gif

You're clean. Good stuff! thumbup2.gif

Let's do some clearing up

Uninstall ComboFix

Remove Combofix now that we're done with it.
  • Please press the Windows Key and R on your keyboard. This will bring up the Run... command.
    (For Vista/Windows 7 please click Start -> All Programs -> Accessories -> Run)
  • Now type in Combofix /Uninstall in the runbox and click OK. (Notice the space between "Combofix" and "/")
  • Please follow the prompts to uninstall Combofix.
  • You will then receive a message saying Combofix was uninstalled successfully once it's done uninstalling itself.
This will uninstall Combofix and anything associated with it.


Download and Run OTC

We will now remove the tools we used during this fix using OTC.
  • Download OTC by OldTimer and save it to your desktop.
  • Double click icon to start the program. If you are using Vista, please right-click and choose run as administrator
  • Then Click the big button.
  • You will get a prompt saying "Being Cleanup Process". Please select Yes.
  • Restart your computer when prompted.
------------------------------------------------------------------------------------------------------------------------

Here's some advice on how you can keep your PC clean


Update your AntiVirus Software

It is imperative that you update your Antivirus software at least once a week (Even more if you wish). If you do not update your antivirus software then it will not be able to catch any of the new variants that may come out. If you use a commercial antivirus program you must make sure you keep renewing your subscription. Otherwise, once your subscription runs out, you may not be able to update the programs virus definitions.


Make sure your applications have all of their updates

It is also possible for other programs on your computer to have security vulnerability that can allow malware to infect you. Therefore, it is also a good idea to check for the latest versions of commonly installed applications that are regularly patched to fix vulnerabilities. You can check these by visiting Secunia Software Inspector and Calendar of Updates.


Install an AntiSpyware Program

A highly recommended AntiSpyware program is SuperAntiSpyware. You can download the free Home Version. or the Pro version for a 15 day trial period.

Installing this or another recommended program will provide spyware & hijacker protection on your computer alongside your virus protection. You should scan your computer with an AntiSpyware program on a regular basis just as you would an antivirus software.


Finally, here's a treasure trove of antivirus, antimalware and antispyware resources


That's it NBG, happy surfing!

Cheers.

m0le
Posted Image
m0le is a proud member of UNITE

#13 NagataBusinessGroup

NagataBusinessGroup
  • Topic Starter

  • Members
  • 7 posts
  • OFFLINE
  •  
  • Local time:06:03 AM

Posted 26 March 2010 - 05:37 PM

Hey Mole,
AWESOME!! Thank you so very much!! Appreciate all the help!! Have a great day!
Grant

#14 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:04:03 PM

Posted 26 March 2010 - 05:38 PM

You're welcome thumbup2.gif
Posted Image
m0le is a proud member of UNITE

#15 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:04:03 PM

Posted 30 March 2010 - 06:41 PM

Since this issue appears to be resolved ... this topic has been closed. Glad we could help. smile.gif

If you're the topic starter, and need this topic reopened, please contact me via pm with the address of the thread.

Everyone else please begin a New Topic.
Posted Image
m0le is a proud member of UNITE




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users