Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Windows Internet Security Virus and Zlob


  • This topic is locked This topic is locked
32 replies to this topic

#1 norweigan wood

norweigan wood

  • Members
  • 27 posts
  • OFFLINE
  •  
  • Local time:02:13 AM

Posted 25 March 2010 - 10:33 AM

A couple of years ago a great person helped me out on this site, now I'm back for more help. I'm getting pop ups and redirects when I'm online - the one thing I can see that I'm infected with is the Windows Internet Security Virus and I also have a Zlob DNS Changer that shows up in my malware scans and which malwhere removes but it comes back every time I restart the computer. I did reset this computer back to its factory setting using the restore disk that it came with as its a few years old now and I wanted to clear it out to see if it would speed things up. It didn't get rid of these pesky things I am infected with. I also tried switching my browser (I usually use firefox) to google chrome or safari but that didn't improve the situation either. I'm not very computer literate so please help me get rid of these annoying things - I can hardly use the internet at the moment because of this problem. Below is the DDS info and attached is the attach file. I was not able to get my computer to perform the GMER scan. I tried several times and though the scan starts ok after a minute or two my computer freezes up and I get a black screen that I am not able to do anything with unless I unplug the computer and restart. Thanks in advance to anyone who helps me smile.gif


DDS (Ver_10-03-17.01) - NTFSx86
Run by claire at 20:59:32.85 on Wed 03/24/2010
Internet Explorer: 6.0.2900.2180 BrowserJavaVersion: 1.6.0_18
Microsoft Windows XP Professional 5.1.2600.2.1252.1.1033.18.1014.303 [GMT -5:00]

AV: AVG Anti-Virus Free *On-access scanning enabled* (Updated) {17DDD097-36FF-435F-9E1B-52D74245D6BF}

============== Running Processes ===============

C:\WINDOWS\system32\svchost -k DcomLaunch
C:\WINDOWS\system32\svchost -k rpcss
C:\WINDOWS\System32\svchost.exe -k netsvcs
C:\Program Files\Intel\Wireless\Bin\EvtEng.exe
C:\Program Files\AVG\AVG9\avgchsvx.exe
C:\Program Files\AVG\AVG9\avgrsx.exe
C:\Program Files\Intel\Wireless\Bin\S24EvMon.exe
C:\Program Files\AVG\AVG9\avgcsrvx.exe
C:\WINDOWS\system32\svchost.exe -k NetworkService
C:\WINDOWS\system32\svchost.exe -k LocalService
C:\WINDOWS\Explorer.EXE
C:\Program Files\Lavasoft\Ad-Aware\AAWService.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Common Files\AOL\ACS\AOLAcsd.exe
C:\Program Files\Common Files\AOL\TopSpeed\2.0\aoltsmon.exe
C:\Program Files\AVG\AVG9\avgwdsvc.exe
C:\Program Files\Common Files\AOL\TopSpeed\2.0\aoltpspd.exe
C:\Program Files\TOSHIBA\TOSHIBA Controls\TFncKy.exe
C:\Program Files\Bonjour\mDNSResponder.exe
C:\WINDOWS\system32\TDispVol.exe
C:\Program Files\Synaptics\SynTP\SynTPEnh.exe
C:\WINDOWS\system32\igfxtray.exe
C:\Program Files\TOSHIBA\ConfigFree\CFSvcs.exe
C:\WINDOWS\system32\igfxpers.exe
C:\WINDOWS\ehome\ehtray.exe
C:\Program Files\Toshiba\Toshiba Applet\thotkey.exe
C:\Program Files\Synaptics\SynTP\Toshiba.exe
C:\Program Files\Synaptics\SynTP\SynTPLpr.exe
C:\Program Files\ltmoh\Ltmoh.exe
C:\WINDOWS\system32\DVDRAMSV.exe
C:\WINDOWS\AGRSMMSG.exe
C:\WINDOWS\eHome\ehRecvr.exe
C:\Program Files\TOSHIBA\ConfigFree\NDSTray.exe
C:\Program Files\Toshiba\Tvs\TvsTray.exe
C:\WINDOWS\eHome\ehSched.exe
C:\WINDOWS\system32\TPSMain.exe
C:\Program Files\TOSHIBA\TOSHIBA Zooming Utility\SmoothView.exe
C:\WINDOWS\system32\dla\DLACTRLW.exe
C:\toshiba\ivp\ism\pinger.exe
C:\Program Files\IObit\IObit Security 360\IS360srv.exe
C:\Program Files\Intel\Wireless\bin\ZCfgSvc.exe
C:\Program Files\Intel\Wireless\Bin\ifrmewrk.exe
C:\PROGRA~1\AVG\AVG9\avgtray.exe
C:\WINDOWS\system32\TPSBattM.exe
C:\Program Files\IObit\IObit Security 360\IS360tray.exe
C:\Program Files\AVG\AVG9\avgnsx.exe
C:\Program Files\HP\HP Software Update\HPWuSchd2.exe
C:\Program Files\QuickTime\QTTask.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\TOSHIBA\TOSCDSPD\toscdspd.exe
C:\Program Files\Windows Live\Messenger\msnmsgr.exe
C:\Program Files\Java\jre6\bin\jqs.exe
C:\Program Files\HP\Digital Imaging\bin\hpqtra08.exe
C:\WINDOWS\system32\RAMASST.exe
C:\Program Files\Microsoft Office\OFFICE11\ONENOTEM.EXE
C:\Program Files\Intel\Wireless\Bin\RegSrvc.exe
C:\WINDOWS\system32\svchost.exe -k LocalService
C:\WINDOWS\system32\svchost.exe -k imgsvc
c:\TOSHIBA\IVP\swupdate\swupdtmr.exe
C:\Program Files\TOSHIBA\TOSHIBA Applet\TAPPSRV.exe
C:\WINDOWS\ehome\mcrdsvc.exe
C:\WINDOWS\system32\wbem\unsecapp.exe
C:\WINDOWS\system32\dllhost.exe
C:\WINDOWS\eHome\ehmsas.exe
C:\Program Files\HP\Digital Imaging\bin\hpqgalry.exe
C:\WINDOWS\System32\alg.exe
C:\WINDOWS\system32\wbem\wmiprvse.exe
C:\PROGRA~1\Intel\Wireless\Bin\Dot1XCfg.exe
C:\Program Files\Lavasoft\Ad-Aware\AAWTray.exe
C:\Documents and Settings\claire\Local Settings\Application Data\Google\Chrome\Application\chrome.exe
C:\Documents and Settings\claire\Local Settings\Application Data\Google\Chrome\Application\chrome.exe
C:\Documents and Settings\claire\My Documents\Downloads\dds.scr
C:\WINDOWS\system32\wbem\wmiprvse.exe

============== Pseudo HJT Report ===============

uStart Page = hxxp://www.toshibadirect.com/dpdstart
uSearch Bar = hxxp://www.google.com/ie
uSearch Page = hxxp://www.google.com
mDefault_Page_URL = hxxp://www.toshibadirect.com/dpdstart
uInternet Settings,ProxyOverride = *.local
mSearchAssistant = hxxp://www.google.com/ie
uURLSearchHooks: AVG Security Toolbar BHO: {a3bc75a2-1f87-4686-aa43-5347d756017c} - c:\program files\avg\avg9\toolbar\IEToolbar.dll
uURLSearchHooks: H - No File
uURLSearchHooks: H - No File
BHO: &Yahoo! Toolbar Helper: {02478d38-c3f9-4efb-9b51-7695eca05670} - c:\program files\yahoo!\companion\installs\cpn\yt.dll
BHO: Adobe PDF Link Helper: {18df081c-e8ad-4283-a596-fa578c2ebdc3} - c:\program files\common files\adobe\acrobat\activex\AcroIEHelperShim.dll
BHO: AVG Safe Search: {3ca2f312-6f6e-4b53-a66e-4e65e497c8c0} - c:\program files\avg\avg9\avgssie.dll
BHO: {5C255C8A-E604-49b4-9D64-90988571CECB} - No File
BHO: DriveLetterAccess: {5ca3d70e-1895-11cf-8e15-001234567890} - c:\windows\system32\dla\DLASHX_W.DLL
BHO: Windows Live Sign-in Helper: {9030d464-4c02-4abf-8ecc-5164760863c6} - c:\program files\common files\microsoft shared\windows live\WindowsLiveLogin.dll
BHO: AVG Security Toolbar BHO: {a3bc75a2-1f87-4686-aa43-5347d756017c} - c:\program files\avg\avg9\toolbar\IEToolbar.dll
BHO: Google Toolbar Helper: {aa58ed58-01dd-4d91-8333-cf10577473f7} - c:\program files\google\googletoolbar1.dll
BHO: Java™ Plug-In 2 SSV Helper: {dbc80044-a445-435b-bc74-9c25c1c588a9} - c:\program files\java\jre6\bin\jp2ssv.dll
BHO: JQSIEStartDetectorImpl Class: {e7e6f031-17ce-4c07-bc86-eabfe594f69c} - c:\program files\java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll
BHO: SingleInstance Class: {fdad4da1-61a2-4fd8-9c17-86f7ac245081} - c:\program files\yahoo!\companion\installs\cpn\YTSingleInstance.dll
TB: &Google: {2318c2b1-4965-11d4-9b18-009027a5cd4f} - c:\program files\google\googletoolbar1.dll
TB: AVG Security Toolbar: {ccc7a320-b3ca-4199-b1a6-9f516dd69829} - c:\program files\avg\avg9\toolbar\IEToolbar.dll
TB: Yahoo! Toolbar: {ef99bd32-c1fb-11d2-892f-0090271d4f88} - c:\program files\yahoo!\companion\installs\cpn\yt.dll
EB: Real.com: {fe54fa40-d68c-11d2-98fa-00c0f0318afe} - c:\windows\system32\Shdocvw.dll
uRun: [ctfmon.exe] c:\windows\system32\ctfmon.exe
uRun: [TOSCDSPD] c:\program files\toshiba\toscdspd\toscdspd.exe
uRun: [Google Update] "c:\documents and settings\claire\local settings\application data\google\update\GoogleUpdate.exe" /c
uRun: [msnmsgr] "c:\program files\windows live\messenger\msnmsgr.exe" /background
mRun: [TFncKy] TFncKy.exe
mRun: [TDispVol] TDispVol.exe
mRun: [SynTPEnh] c:\program files\synaptics\syntp\SynTPEnh.exe
mRun: [igfxtray] c:\windows\system32\igfxtray.exe
mRun: [igfxhkcmd] c:\windows\system32\hkcmd.exe
mRun: [igfxpers] c:\windows\system32\igfxpers.exe
mRun: [ehTray] c:\windows\ehome\ehtray.exe
mRun: [THotkey] c:\program files\toshiba\toshiba applet\thotkey.exe
mRun: [SynTPLpr] c:\program files\synaptics\syntp\SynTPLpr.exe
mRun: [LtMoh] c:\program files\ltmoh\Ltmoh.exe
mRun: [AGRSMMSG] AGRSMMSG.exe
mRun: [NDSTray.exe] NDSTray.exe
mRun: [Tvs] c:\program files\toshiba\tvs\TvsTray.exe
mRun: [TPSMain] TPSMain.exe
mRun: [SmoothView] c:\program files\toshiba\toshiba zooming utility\SmoothView.exe
mRun: [dla] c:\windows\system32\dla\DLACTRLW.exe
mRun: [Pinger] c:\toshiba\ivp\ism\pinger.exe /run
mRun: [IntelZeroConfig] "c:\program files\intel\wireless\bin\ZCfgSvc.exe"
mRun: [IntelWireless] "c:\program files\intel\wireless\bin\ifrmewrk.exe" /tf Intel PROSet/Wireless
mRun: [MSKDetectorExe] c:\program files\mcafee\spamkiller\MSKDetct.exe /uninstall
mRun: [AVG9_TRAY] c:\progra~1\avg\avg9\avgtray.exe
mRun: [Adobe Reader Speed Launcher] "c:\program files\adobe\reader 9.0\reader\Reader_sl.exe"
mRun: [Adobe ARM] "c:\program files\common files\adobe\arm\1.0\AdobeARM.exe"
mRun: [SunJavaUpdateSched] "c:\program files\common files\java\java update\jusched.exe"
mRun: [IObit Security 360] "c:\program files\iobit\iobit security 360\IS360tray.exe" /autostart
mRun: [HP Software Update] "c:\program files\hp\hp software update\HPWuSchd2.exe"
mRun: [QuickTime Task] "c:\program files\quicktime\QTTask.exe" -atboottime
StartupFolder: c:\docume~1\claire\startm~1\programs\startup\micros~1.lnk - c:\program files\microsoft office\office11\ONENOTEM.EXE
StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\hpdigi~1.lnk - c:\program files\hp\digital imaging\bin\hpqtra08.exe
StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\hpimag~1.lnk - c:\program files\hp\digital imaging\bin\hpqthb08.exe
StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\ramasst.lnk - c:\windows\system32\RAMASST.exe
IE: &Google Search - c:\program files\google\GoogleToolbar1.dll/cmsearch.html
IE: &Translate English Word - c:\program files\google\GoogleToolbar1.dll/cmwordtrans.html
IE: Backward Links - c:\program files\google\GoogleToolbar1.dll/cmbacklinks.html
IE: Cached Snapshot of Page - c:\program files\google\GoogleToolbar1.dll/cmcache.html
IE: E&xport to Microsoft Excel - c:\progra~1\micros~2\office11\EXCEL.EXE/3000
IE: Similar Pages - c:\program files\google\GoogleToolbar1.dll/cmsimilar.html
IE: Translate Page into English - c:\program files\google\GoogleToolbar1.dll/cmtrans.html
IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe
IE: {92780B25-18CC-41C8-B9BE-3C9C571A8263} - {FF059E31-CC5A-4E2E-BF3B-96E929D65503} - c:\progra~1\micros~2\office11\REFIEBAR.DLL
IE: {CD67F990-D8E9-11d2-98FE-00C0F0318AFE} - {FE54FA40-D68C-11d2-98FA-00C0F0318AFE} - c:\windows\system32\Shdocvw.dll
DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_18-windows-i586.cab
DPF: {CAFEEFAC-0015-0000-0004-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.5.0/jinstall-1_5_0_04-windows-i586.cab
DPF: {CAFEEFAC-0016-0000-0018-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_18-windows-i586.cab
DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_18-windows-i586.cab
Handler: linkscanner - {F274614C-63F8-47D5-A4D1-FBDDE494F8D1} - c:\program files\avg\avg9\avgpp.dll
Notify: avgrsstarter - avgrsstx.dll
Notify: igfxcui - igfxdev.dll
AppInit_DLLs: c:\progra~1\google\google~1\GOEC62~1.DLL

================= FIREFOX ===================

FF - ProfilePath - c:\docume~1\claire\applic~1\mozilla\firefox\profiles\4gauck6l.default\
FF - prefs.js: browser.search.selectedEngine - Yahoo! Search
FF - prefs.js: keyword.URL - hxxp://us.yhs.search.yahoo.com/avg/search?fr=yhs-avg&type=yahoo_avg_hs2-tb-web_us&p=
FF - component: c:\program files\avg\avg9\firefox\components\avgssff.dll
FF - component: c:\program files\avg\avg9\toolbar\firefox\avg@igeared\components\IGeared_tavgp_xputils2.dll
FF - component: c:\program files\avg\avg9\toolbar\firefox\avg@igeared\components\IGeared_tavgp_xputils3.dll
FF - component: c:\program files\avg\avg9\toolbar\firefox\avg@igeared\components\IGeared_tavgp_xputils35.dll
FF - component: c:\program files\avg\avg9\toolbar\firefox\avg@igeared\components\xpavgtbapi.dll
FF - plugin: c:\documents and settings\claire\local settings\application data\google\update\1.2.183.23\npGoogleOneClick8.dll
FF - plugin: c:\documents and settings\claire\local settings\application data\yahoo!\browserplus\2.6.0\plugins\npybrowserplus_2.6.0.dll
FF - plugin: c:\program files\viewpoint\viewpoint experience technology\npViewpoint.dll
FF - HiddenExtension: Java Console: No Registry Reference - c:\program files\mozilla firefox\extensions\{CAFEEFAC-0016-0000-0018-ABCDEFFEDCBA}

---- FIREFOX POLICIES ----
c:\program files\mozilla firefox\greprefs\all.js - pref("ui.use_native_colors", true);
c:\program files\mozilla firefox\greprefs\all.js - pref("ui.use_native_popup_windows", false);
c:\program files\mozilla firefox\greprefs\all.js - pref("browser.enable_click_image_resizing", true);
c:\program files\mozilla firefox\greprefs\all.js - pref("accessibility.browsewithcaret_shortcut.enabled", true);
c:\program files\mozilla firefox\greprefs\all.js - pref("javascript.options.mem.high_water_mark", 32);
c:\program files\mozilla firefox\greprefs\all.js - pref("javascript.options.mem.gc_frequency", 1600);
c:\program files\mozilla firefox\greprefs\all.js - pref("network.auth.force-generic-ntlm", false);
c:\program files\mozilla firefox\greprefs\all.js - pref("svg.smil.enabled", false);
c:\program files\mozilla firefox\greprefs\all.js - pref("ui.trackpoint_hack.enabled", -1);
c:\program files\mozilla firefox\greprefs\all.js - pref("browser.formfill.debug", false);
c:\program files\mozilla firefox\greprefs\all.js - pref("browser.formfill.agedWeight", 2);
c:\program files\mozilla firefox\greprefs\all.js - pref("browser.formfill.bucketSize", 1);
c:\program files\mozilla firefox\greprefs\all.js - pref("browser.formfill.maxTimeGroupings", 25);
c:\program files\mozilla firefox\greprefs\all.js - pref("browser.formfill.timeGroupingSize", 604800);
c:\program files\mozilla firefox\greprefs\all.js - pref("browser.formfill.boundaryWeight", 25);
c:\program files\mozilla firefox\greprefs\all.js - pref("browser.formfill.prefixWeight", 5);
c:\program files\mozilla firefox\greprefs\all.js - pref("html5.enable", false);
c:\program files\mozilla firefox\greprefs\security-prefs.js - pref("security.ssl3.rsa_seed_sha", true);
c:\program files\mozilla firefox\defaults\pref\firefox-branding.js - pref("app.update.download.backgroundInterval", 600);
c:\program files\mozilla firefox\defaults\pref\firefox-branding.js - pref("app.update.url.manual", "http://www.firefox.com");
c:\program files\mozilla firefox\defaults\pref\firefox-branding.js - pref("browser.search.param.yahoo-fr-ja", "mozff");
c:\program files\mozilla firefox\defaults\pref\firefox.js - pref("extensions.{972ce4c6-7e08-4474-a285-3208198ce6fd}.name", "chrome://browser/locale/browser.properties");
c:\program files\mozilla firefox\defaults\pref\firefox.js - pref("extensions.{972ce4c6-7e08-4474-a285-3208198ce6fd}.description", "chrome://browser/locale/browser.properties");
c:\program files\mozilla firefox\defaults\pref\firefox.js - pref("xpinstall.whitelist.add", "addons.mozilla.org");
c:\program files\mozilla firefox\defaults\pref\firefox.js - pref("xpinstall.whitelist.add.36", "getpersonas.com");
c:\program files\mozilla firefox\defaults\pref\firefox.js - pref("lightweightThemes.update.enabled", true);
c:\program files\mozilla firefox\defaults\pref\firefox.js - pref("browser.allTabs.previews", false);
c:\program files\mozilla firefox\defaults\pref\firefox.js - pref("plugins.hide_infobar_for_outdated_plugin", false);
c:\program files\mozilla firefox\defaults\pref\firefox.js - pref("plugins.update.notifyUser", false);
c:\program files\mozilla firefox\defaults\pref\firefox.js - pref("toolbar.customization.usesheet", false);
c:\program files\mozilla firefox\defaults\pref\firefox.js - pref("browser.taskbar.previews.enable", false);
c:\program files\mozilla firefox\defaults\pref\firefox.js - pref("browser.taskbar.previews.max", 20);
c:\program files\mozilla firefox\defaults\pref\firefox.js - pref("browser.taskbar.previews.cachetime", 20);

============= SERVICES / DRIVERS ===============

R0 Lbd;Lbd;c:\windows\system32\drivers\Lbd.sys [2010-2-27 64288]
R0 pavboot;pavboot;c:\windows\system32\drivers\pavboot.sys [2010-3-24 28552]
R1 AvgLdx86;AVG Free AVI Loader Driver x86;c:\windows\system32\drivers\avgldx86.sys [2010-2-27 216200]
R1 AvgMfx86;AVG Free On-access Scanner Minifilter Driver x86;c:\windows\system32\drivers\avgmfx86.sys [2010-2-27 29512]
R1 AvgTdiX;AVG Free Network Redirector;c:\windows\system32\drivers\avgtdix.sys [2010-2-27 242696]
R2 avg9wd;AVG Free WatchDog;c:\program files\avg\avg9\avgwdsvc.exe [2010-3-17 308064]
R2 IS360service;IS360service;c:\program files\iobit\iobit security 360\is360srv.exe [2010-2-27 311568]
R2 Lavasoft Ad-Aware Service;Lavasoft Ad-Aware Service;c:\program files\lavasoft\ad-aware\AAWService.exe [2010-2-4 1228208]
R2 McrdSvc;Media Center Extender Service;c:\windows\ehome\mcrdsvc.exe [2005-8-5 99328]
S3 SVRPEDRV;SVRPEDRV;\??\c:\sysprep\pedrv.sys --> c:\sysprep\PEDrv.sys [?]

=============== Created Last 30 ================


==================== Find3M ====================

2010-02-12 16:46:14 91424 ----a-w- c:\windows\system32\dnssd.dll
2010-02-12 16:46:14 107808 ----a-w- c:\windows\system32\dns-sd.exe

============= FINISH: 21:00:06.03 ===============

Attached Files



BC AdBot (Login to Remove)

 


#2 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:06:13 AM

Posted 28 March 2010 - 12:06 PM

Hi,

Welcome to Bleeping Computer. My name is m0le and I will be helping you with your log.
  • Please subscribe to this topic, if you haven't already. You can subscribe by clicking the Options box to the right of your topic title and selecting Track This Topic.

  • Please avoid installing/uninstalling or updating any programs and attempting any unsupervised fixes or scans. This can make helping you impossible.

  • Please reply to this post so I know you are there.
The forum is busy and we need to have replies as soon as possible. If I haven't had a reply after 3 days I will bump the topic and if you do not reply by the following day after that then I will close the topic.

----------------------------------------------

Can you try RootRepeal as Gmer is crashing

We Need to check for Rootkits with RootRepeal
  • Download RootRepeal from the following location and save it to your desktop.

    First Location
    Second Location
    Third Location

  • Open on your desktop.
  • Click the tab.
  • Click the button.
  • Check all seven boxes:
  • Push Ok
  • Check the box for your main system drive (Usually C:), and press Ok.
  • Allow RootRepeal to run a scan of your system. This may take some time.
  • Once the scan completes, push the button. Save the log to your desktop, using a distinctive name, such as RootRepeal.txt. Include this report in your next reply, please.

Posted Image
m0le is a proud member of UNITE

#3 norweigan wood

norweigan wood
  • Topic Starter

  • Members
  • 27 posts
  • OFFLINE
  •  
  • Local time:02:13 AM

Posted 29 March 2010 - 09:18 AM

Hi m0le - thanks for you help - I did the scan and posted it but I see I forgot to check the c drive so I'm deleting the post I had put up and am running the scan now - I'll post the new results in a minute!

Edited by norweigan wood, 29 March 2010 - 09:37 AM.


#4 norweigan wood

norweigan wood
  • Topic Starter

  • Members
  • 27 posts
  • OFFLINE
  •  
  • Local time:02:13 AM

Posted 29 March 2010 - 09:46 AM

Here are the proper results of the scan - obviously I have no idea what they mean so please tell me if I have something bad :

ROOTREPEAL © AD, 2007-2009
==================================================
Scan Start Time: 2010/03/29 10:35
Program Version: Version 1.3.5.0
Windows Version: Windows XP Media Center Edition SP2
==================================================

Drivers
-------------------
Name: dump_atapi.sys
Image Path: C:\WINDOWS\System32\Drivers\dump_atapi.sys
Address: 0xAA74E000 Size: 98304 File Visible: No Signed: -
Status: -

Name: dump_WMILIB.SYS
Image Path: C:\WINDOWS\System32\Drivers\dump_WMILIB.SYS
Address: 0xF7B7A000 Size: 8192 File Visible: No Signed: -
Status: -

Name: rootrepeal.sys
Image Path: C:\WINDOWS\system32\drivers\rootrepeal.sys
Address: 0xA9088000 Size: 49152 File Visible: No Signed: -
Status: -

Hidden/Locked Files
-------------------
Path: C:\hiberfil.sys
Status: Locked to the Windows API!

SSDT
-------------------
#: 041 Function Name: NtCreateKey
Status: Hooked by "Lbd.sys" at address 0xf76ae87e

#: 247 Function Name: NtSetValueKey
Status: Hooked by "Lbd.sys" at address 0xf76aebfe

==EOF==

#5 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:06:13 AM

Posted 29 March 2010 - 12:56 PM

The RootRepeal log is showing nothing but redirections mean that something is directing the problems.

Download and Run RKill

Please download RKill by Grinler from one of the 4 links below and save it to your desktop.

Link 1
Link 2
Link 3
Link 4
  • Before we begin, you should disable your anti-malware softwares you have installed so they do not interfere RKill running as some anti-malware softwares detect RKill as malicious. Please refer to this page if you are not sure how.
  • Double-click on Rkill on your desktop to run it. (If you are using Windows Vista, please right-click on it and select Run As Administrator)
  • A black screen will appear and then disappear. Please do not worry, that is normal. This means that the tool has been successfully executed.
  • Please post the resulting log in your next reply.

Then

Please download ComboFix from one of these locations:* IMPORTANT !!! Save ComboFix.exe to your Desktop making sure you rename it comfix.exe
  • Disable your AntiVirus and AntiSpyware applications, usually via a right click on the System Tray icon. They may otherwise interfere with our tools. (Click on this link to see a list of programs that should be disabled. The list is not all inclusive.)
  • Double click on Combofix.exe & follow the prompts.
  • As part of it's process, ComboFix will check to see if the Microsoft Windows Recovery Console is installed. With malware infections being as they are today, it's strongly recommended to have this pre-installed on your machine before doing any malware removal. It will allow you to boot up into a special recovery/repair mode that will allow us to more easily help you should your computer have a problem after an attempted removal of malware.
  • Follow the prompts to allow ComboFix to download and install the Microsoft Windows Recovery Console, and when prompted, agree to the End-User License Agreement to install the Microsoft Windows Recovery Console.
**Please note: If the Microsoft Windows Recovery Console is already installed, ComboFix will continue it's malware removal procedures.



Once the Microsoft Windows Recovery Console is installed using ComboFix, you should see the following message:



Click on Yes, to continue scanning for malware.

When finished, it shall produce a log for you. Please include the C:\ComboFix.txt in your next reply.

Thanks smile.gif
Posted Image
m0le is a proud member of UNITE

#6 norweigan wood

norweigan wood
  • Topic Starter

  • Members
  • 27 posts
  • OFFLINE
  •  
  • Local time:02:13 AM

Posted 29 March 2010 - 02:08 PM

Hi M0le, Here are the results of the two scans :

RKill :

This log file is located at C:\rkill.log.
Please post this only if requested to by the person helping you.
Otherwise you can close this log when you wish.
Ran as claire on 03/29/2010 at 14:34:45.


Processes terminated by Rkill or while it was running:


C:\Documents and Settings\claire\Desktop\.pif


Rkill completed on 03/29/2010 at 14:34:47.


ComboFix :

ComboFix 10-03-28.03 - claire 03/29/2010 14:53:21.1.2 - x86
Microsoft Windows XP Professional 5.1.2600.2.1252.1.1033.18.1014.473 [GMT -5:00]
Running from: c:\documents and settings\claire\Desktop\comfix.exe
AV: AVG Anti-Virus Free *On-access scanning disabled* (Updated) {17DDD097-36FF-435F-9E1B-52D74245D6BF}
* Created a new restore point
.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.

c:\recycler\S-1-5-21-3868997124-911790988-508925577-500
c:\windows\system32\Thumbs.db

.
((((((((((((((((((((((((( Files Created from 2010-02-28 to 2010-03-29 )))))))))))))))))))))))))))))))
.

2010-03-29 19:24 . 2010-03-29 19:24 -------- d--h--w- c:\windows\PIF
2010-03-24 23:14 . 2009-06-30 14:37 28552 ----a-w- c:\windows\system32\drivers\pavboot.sys
2010-03-24 23:10 . 2010-03-24 23:10 -------- d-----w- c:\program files\Panda Security
2010-03-24 23:04 . 2003-03-24 21:52 16384 -c--a-w- c:\windows\system32\dllcache\tcptsat.dll
2010-03-24 23:04 . 2003-03-24 21:52 32827 -c--a-w- c:\windows\system32\dllcache\tcptest.exe
2010-03-24 23:04 . 2004-08-10 12:00 8192 -c--a-w- c:\windows\system32\dllcache\staxmem.dll
2010-03-24 23:04 . 2004-08-10 12:00 2134528 -c--a-w- c:\windows\system32\dllcache\smtpsnap.dll
2010-03-24 23:04 . 2004-08-10 12:00 189440 -c--a-w- c:\windows\system32\dllcache\smtpadm.dll
2010-03-24 23:04 . 2003-03-24 21:52 20536 -c--a-w- c:\windows\system32\dllcache\shtml.dll
2010-03-24 23:04 . 2003-03-24 21:52 16437 -c--a-w- c:\windows\system32\dllcache\shtml.exe
2010-03-24 20:12 . 2010-03-24 20:12 -------- d-----w- c:\program files\QuickTime
2010-03-24 15:44 . 2010-03-24 22:14 -------- d-----w- c:\documents and settings\All Users\Application Data\Yahoo! Companion
2010-03-24 15:44 . 2010-03-24 15:44 -------- d-----w- c:\documents and settings\claire\Application Data\Yahoo!
2010-03-24 15:44 . 2010-03-24 15:44 -------- d-----w- c:\program files\CCleaner
2010-03-24 15:23 . 2010-03-24 15:23 30180 ---ha-w- c:\windows\system32\mlfcache.dat
2010-03-24 15:23 . 2010-03-24 20:12 -------- d-----w- c:\documents and settings\claire\Local Settings\Application Data\Apple Computer
2010-03-24 15:23 . 2010-03-24 15:23 -------- d-----w- c:\documents and settings\claire\Application Data\Apple Computer
2010-03-24 15:23 . 2010-03-24 15:23 -------- d-----w- c:\program files\Safari
2010-03-24 15:23 . 2010-03-24 15:23 -------- d-----w- c:\documents and settings\All Users\Application Data\Apple Computer
2010-03-24 15:22 . 2010-03-24 15:22 -------- d-----w- c:\program files\Bonjour
2010-03-24 15:22 . 2010-03-24 15:22 -------- d-----w- c:\program files\Common Files\Apple
2010-03-24 15:22 . 2010-03-24 15:22 -------- d-----w- c:\documents and settings\claire\Local Settings\Application Data\Apple
2010-03-24 15:22 . 2010-03-24 15:22 -------- d-----w- c:\program files\Apple Software Update
2010-03-24 15:22 . 2010-03-24 15:22 -------- d-----w- c:\documents and settings\All Users\Application Data\Apple
2010-03-24 14:57 . 2010-03-24 14:57 -------- d-----w- c:\documents and settings\claire\Local Settings\Application Data\Yahoo!
2010-03-24 14:56 . 2010-03-24 14:56 -------- d-----w- c:\windows\Sun
2010-03-24 14:50 . 2010-03-24 14:50 -------- d-s---w- c:\documents and settings\claire\UserData
2010-03-24 14:50 . 2010-03-24 14:50 -------- d-----w- c:\documents and settings\claire\Local Settings\Application Data\IsolatedStorage
2010-03-17 18:35 . 2010-03-17 18:35 12464 ----a-w- c:\windows\system32\avgrsstx.dll
2010-03-14 20:12 . 2010-03-15 22:31 -------- d-----w- c:\documents and settings\claire\Application Data\gtk-2.0
2010-03-14 20:12 . 2010-03-14 20:12 -------- d-----w- c:\documents and settings\claire\.thumbnails
2010-03-13 22:04 . 2010-03-15 22:31 -------- d-----w- c:\documents and settings\claire\.gimp-2.6
2010-03-13 22:04 . 2010-03-13 22:04 -------- d-----w- c:\program files\GIMP-2.0
2010-03-12 20:11 . 2010-03-29 19:48 -------- d-----w- c:\documents and settings\claire\Tracing
2010-03-12 20:10 . 2010-03-12 20:10 -------- d-----w- c:\program files\Microsoft
2010-03-12 20:09 . 2010-03-12 20:09 -------- d-----w- c:\program files\Windows Live SkyDrive
2010-03-12 20:09 . 2010-03-12 20:09 -------- d-----w- c:\program files\Windows Live
2010-03-12 20:05 . 2010-03-12 20:05 -------- d-----w- c:\program files\Common Files\Windows Live
2010-03-08 14:56 . 2010-03-08 14:56 -------- d-----w- c:\documents and settings\claire\Local Settings\Application Data\HP
2010-03-07 23:02 . 2010-03-07 23:02 -------- d-----w- c:\documents and settings\All Users\Application Data\HP
2010-03-07 23:00 . 2010-03-07 23:00 -------- d-----w- c:\program files\Common Files\HP
2010-03-07 22:57 . 2010-03-07 22:58 -------- d-----w- c:\program files\Hewlett-Packard
2010-03-07 22:57 . 2010-03-07 22:57 -------- d-----w- c:\program files\Common Files\Hewlett-Packard
2010-03-07 22:56 . 2004-12-14 16:07 16496 ----a-r- c:\windows\system32\drivers\HPZipr12.sys
2010-03-07 22:55 . 2004-12-14 16:07 51120 ----a-r- c:\windows\system32\drivers\HPZid412.sys
2010-03-07 22:55 . 2004-12-14 16:07 21744 ----a-r- c:\windows\system32\drivers\HPZius12.sys
2010-03-07 22:55 . 2004-08-04 04:01 25856 -c--a-w- c:\windows\system32\dllcache\usbprint.sys
2010-03-07 22:55 . 2004-08-04 04:01 25856 ----a-w- c:\windows\system32\drivers\usbprint.sys
2010-03-07 22:55 . 2004-08-04 03:58 15104 -c--a-w- c:\windows\system32\dllcache\usbscan.sys
2010-03-07 22:55 . 2004-08-04 03:58 15104 ----a-w- c:\windows\system32\drivers\usbscan.sys
2010-03-07 22:55 . 2004-08-04 04:08 31616 -c--a-w- c:\windows\system32\dllcache\usbccgp.sys
2010-03-07 22:55 . 2004-08-04 04:08 31616 ----a-w- c:\windows\system32\drivers\usbccgp.sys
2010-03-07 22:53 . 2004-09-29 17:14 69632 ----a-w- c:\windows\system32\HPZipm12.exe
2010-03-07 22:53 . 2004-09-29 17:09 57344 ----a-w- c:\windows\system32\HPZisn12.dll
2010-03-07 22:53 . 2004-09-29 17:09 94208 ----a-w- c:\windows\system32\HPZipt12.dll
2010-03-07 22:53 . 2004-09-29 17:08 61440 ----a-w- c:\windows\system32\HPZinw12.exe
2010-03-07 22:53 . 2004-09-29 17:15 204800 ----a-w- c:\windows\system32\HPZipr12.dll
2010-03-07 22:53 . 2004-09-29 17:12 278584 ----a-w- c:\windows\system32\HPZidr12.dll
2010-03-07 22:40 . 2010-03-07 22:58 -------- d-----w- c:\program files\HP
2010-03-07 22:24 . 2010-03-07 23:12 68939 ----a-w- c:\windows\hpoins05.dat
2010-03-07 22:24 . 2004-12-14 16:07 19696 ------w- c:\windows\hpomdl05.dat
2010-03-03 15:44 . 2010-03-03 15:44 -------- d-----w- c:\documents and settings\claire\Application Data\Template
2010-02-28 03:52 . 2010-02-28 03:52 -------- d-----w- c:\documents and settings\All Users\Application Data\IObit
2010-02-28 03:52 . 2010-02-28 03:52 -------- d-----w- c:\program files\IObit
2010-02-28 03:27 . 2010-02-28 03:26 411368 ----a-w- c:\windows\system32\deploytk.dll
2010-02-28 03:20 . 2010-02-28 03:20 -------- d-----w- c:\program files\Common Files\Adobe
2010-02-28 03:18 . 2010-02-28 03:18 -------- d-----w- c:\documents and settings\claire\Application Data\AdobeUM
2010-02-28 03:03 . 2010-02-04 15:52 15880 ----a-w- c:\windows\system32\lsdelete.exe
2010-02-28 02:39 . 2010-02-04 15:53 64288 ----a-w- c:\windows\system32\drivers\Lbd.sys
2010-02-28 02:38 . 2010-02-28 02:38 -------- dc-h--w- c:\documents and settings\All Users\Application Data\{74D08EB8-01D1-4BAE-91E3-F30C1B031AC6}
2010-02-28 02:38 . 2010-02-28 02:39 -------- d-----w- c:\documents and settings\All Users\Application Data\Lavasoft
2010-02-28 02:38 . 2010-02-28 02:38 -------- d-----w- c:\program files\Lavasoft
2010-02-28 02:13 . 2010-03-24 01:23 -------- d-----w- c:\documents and settings\claire\Local Settings\Application Data\Temp
2010-02-28 02:12 . 2010-02-28 02:12 -------- d-----w- c:\documents and settings\claire\Local Settings\Application Data\AVG Security Toolbar
2010-02-28 02:10 . 2010-03-18 13:41 -------- d-----w- C:\$AVG
2010-02-28 02:10 . 2010-03-17 18:35 29512 ----a-w- c:\windows\system32\drivers\avgmfx86.sys
2010-02-28 02:10 . 2010-03-17 18:35 216200 ----a-w- c:\windows\system32\drivers\avgldx86.sys
2010-02-28 02:10 . 2010-03-29 14:59 -------- d-----w- c:\windows\system32\drivers\Avg
2010-02-28 02:10 . 2010-02-28 03:17 -------- d-----w- c:\documents and settings\All Users\Application Data\AVG Security Toolbar
2010-02-28 02:10 . 2010-03-17 18:36 242696 ----a-w- c:\windows\system32\drivers\avgtdix.sys
2010-02-28 02:10 . 2010-02-28 02:10 -------- d-----w- c:\program files\AVG
2010-02-28 02:10 . 2010-02-28 02:10 -------- d-----w- c:\documents and settings\All Users\Application Data\avg9
2010-02-28 01:36 . 2010-02-28 01:36 -------- d-----w- c:\windows\system32\config\systemprofile\Application Data\McAfee.com Personal Firewall
2010-02-28 01:34 . 2006-05-13 22:56 -------- d-----w- c:\windows\system32\config\systemprofile\Application Data\AOL
2010-02-28 01:34 . 2006-02-16 09:56 -------- d-----w- c:\windows\system32\config\systemprofile\Application Data\You've Got Pictures Screensaver
2010-02-28 01:07 . 2010-02-28 01:07 -------- d-----w- c:\documents and settings\LocalService\Application Data\McAfee.com Personal Firewall
2010-02-27 23:46 . 2010-02-27 23:46 -------- d-----w- c:\documents and settings\claire\Application Data\Malwarebytes
2010-02-27 23:46 . 2010-01-08 00:07 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2010-02-27 23:46 . 2010-02-27 23:46 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
2010-02-27 23:46 . 2010-02-27 23:46 -------- d-----w- c:\documents and settings\All Users\Application Data\Malwarebytes
2010-02-27 23:46 . 2010-01-08 00:07 19160 ----a-w- c:\windows\system32\drivers\mbam.sys
2010-02-27 23:41 . 2010-02-27 23:41 -------- d-----w- c:\documents and settings\claire\Local Settings\Application Data\Mozilla

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2010-03-29 19:39 . 2010-03-03 15:44 192 ----a-w- c:\documents and settings\claire\Application Data\wklnhst.dat
2010-03-24 15:44 . 2006-02-16 10:14 -------- d-----w- c:\program files\Yahoo!
2010-03-12 20:10 . 2006-02-16 16:59 35656 ----a-w- c:\documents and settings\Administrator\Local Settings\Application Data\GDIPFONTCACHEV1.DAT
2010-03-08 14:56 . 2010-02-28 01:35 129 ----a-w- c:\documents and settings\claire\Local Settings\Application Data\fusioncache.dat
2010-03-07 15:05 . 2006-02-15 15:37 87931 ----a-w- c:\windows\pchealth\helpctr\OfflineCache\index.dat
2010-03-04 09:00 . 2010-03-04 09:00 79144 ----a-w- c:\documents and settings\All Users\Application Data\Apple Computer\Installer Cache\Safari 5.31.22.7\SetupAdmin.exe
2010-02-28 03:27 . 2010-02-28 03:27 503808 ----a-w- c:\documents and settings\claire\Application Data\Sun\Java\Deployment\SystemCache\6.0\54\1a209876-2ead5997-n\msvcp71.dll
2010-02-28 03:27 . 2010-02-28 03:27 499712 ----a-w- c:\documents and settings\claire\Application Data\Sun\Java\Deployment\SystemCache\6.0\54\1a209876-2ead5997-n\jmc.dll
2010-02-28 03:27 . 2010-02-28 03:27 348160 ----a-w- c:\documents and settings\claire\Application Data\Sun\Java\Deployment\SystemCache\6.0\54\1a209876-2ead5997-n\msvcr71.dll
2010-02-28 03:27 . 2010-02-28 03:27 61440 ----a-w- c:\documents and settings\claire\Application Data\Sun\Java\Deployment\SystemCache\6.0\17\6d0ad391-1eddefb2-n\decora-sse.dll
2010-02-28 03:27 . 2010-02-28 03:27 12800 ----a-w- c:\documents and settings\claire\Application Data\Sun\Java\Deployment\SystemCache\6.0\17\6d0ad391-1eddefb2-n\decora-d3d.dll
2010-02-28 03:27 . 2006-02-16 09:28 -------- d-----w- c:\program files\Common Files\Java
2010-02-28 03:26 . 2006-02-16 09:28 -------- d-----w- c:\program files\Java
2010-02-28 02:21 . 2006-02-17 09:57 -------- d-----w- c:\program files\DIGStream
2010-02-28 01:36 . 2006-05-13 23:44 -------- d-----w- c:\documents and settings\All Users\Application Data\McAfee.com Personal Firewall
2010-02-28 01:35 . 2010-02-28 01:35 -------- d-----w- c:\documents and settings\claire\Application Data\McAfee.com Personal Firewall
2010-02-28 01:34 . 2010-02-28 01:34 21275 ----a-w- c:\windows\system32\drivers\AegisP.sys
2010-02-28 01:34 . 2010-02-28 01:34 -------- d-----w- c:\documents and settings\All Users\Application Data\Intel
2010-02-28 01:34 . 2006-02-15 16:18 -------- d-----w- c:\program files\Intel
2010-02-28 01:33 . 2010-02-28 01:35 -------- d-----w- c:\documents and settings\claire\Application Data\Intel
2010-02-28 01:33 . 2010-02-28 01:34 -------- d-----w- c:\windows\system32\config\systemprofile\Application Data\Intel
2010-02-28 01:33 . 2010-02-28 01:33 -------- d-----w- c:\documents and settings\Administrator\Application Data\Intel
2010-02-28 01:28 . 2010-02-28 01:28 -------- d-----w- c:\program files\AVerMedia
2010-02-28 01:27 . 2010-02-28 01:27 -------- d-----w- c:\program files\Common Files\InterVideo
2010-02-28 01:27 . 2006-02-16 09:25 -------- d-----w- c:\program files\InterVideo
2010-02-28 01:27 . 2006-02-15 16:20 -------- d--h--w- c:\program files\InstallShield Installation Information
2010-02-12 16:46 . 2010-02-12 16:46 91424 ----a-w- c:\windows\system32\dnssd.dll
2010-02-12 16:46 . 2010-02-12 16:46 107808 ----a-w- c:\windows\system32\dns-sd.exe
2010-02-04 15:53 . 2010-02-28 02:38 2954656 -c--a-w- c:\documents and settings\All Users\Application Data\{74D08EB8-01D1-4BAE-91E3-F30C1B031AC6}\Ad-AwareInstaller.exe
.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\URLSearchHooks]
"{A3BC75A2-1F87-4686-AA43-5347D756017C}"= "c:\program files\AVG\AVG9\Toolbar\IEToolbar.dll" [2009-11-25 1230080]

[HKEY_CLASSES_ROOT\clsid\{a3bc75a2-1f87-4686-aa43-5347d756017c}]

[HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{A3BC75A2-1F87-4686-AA43-5347D756017C}]
2009-11-25 21:01 1230080 ----a-w- c:\program files\AVG\AVG9\Toolbar\IEToolbar.dll

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Toolbar]
"{CCC7A320-B3CA-4199-B1A6-9F516DD69829}"= "c:\program files\AVG\AVG9\Toolbar\IEToolbar.dll" [2009-11-25 1230080]

[HKEY_CLASSES_ROOT\clsid\{ccc7a320-b3ca-4199-b1a6-9f516dd69829}]

[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Toolbar\Webbrowser]
"{CCC7A320-B3CA-4199-B1A6-9F516DD69829}"= "c:\program files\AVG\AVG9\Toolbar\IEToolbar.dll" [2009-11-25 1230080]

[HKEY_CLASSES_ROOT\clsid\{ccc7a320-b3ca-4199-b1a6-9f516dd69829}]

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"TOSCDSPD"="c:\program files\TOSHIBA\TOSCDSPD\toscdspd.exe" [2004-12-30 65536]
"Google Update"="c:\documents and settings\claire\Local Settings\Application Data\Google\Update\GoogleUpdate.exe" [2010-02-28 135664]
"msnmsgr"="c:\program files\Windows Live\Messenger\msnmsgr.exe" [2009-07-26 3883856]
"ctfmon.exe"="c:\windows\system32\ctfmon.exe" [2004-08-10 15360]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"CFSServ.exe"="CFSServ.exe -NoClient" [X]
"TFncKy"="TFncKy.exe" [BU]
"TDispVol"="TDispVol.exe" [2005-03-11 73728]
"SynTPEnh"="c:\program files\Synaptics\SynTP\SynTPEnh.exe" [2005-12-16 761945]
"igfxtray"="c:\windows\system32\igfxtray.exe" [2005-11-28 98304]
"igfxhkcmd"="c:\windows\system32\hkcmd.exe" [2005-11-28 77824]
"igfxpers"="c:\windows\system32\igfxpers.exe" [2005-11-28 118784]
"ehTray"="c:\windows\ehome\ehtray.exe" [2005-08-05 64512]
"THotkey"="c:\program files\Toshiba\Toshiba Applet\thotkey.exe" [2006-01-05 352256]
"SynTPLpr"="c:\program files\Synaptics\SynTP\SynTPLpr.exe" [2005-12-16 82009]
"LtMoh"="c:\program files\ltmoh\Ltmoh.exe" [2004-08-18 184320]
"AGRSMMSG"="AGRSMMSG.exe" [2005-10-15 88203]
"NDSTray.exe"="NDSTray.exe" [BU]
"Tvs"="c:\program files\Toshiba\Tvs\TvsTray.exe" [2005-11-30 73728]
"TPSMain"="TPSMain.exe" [2005-06-01 282624]
"SmoothView"="c:\program files\TOSHIBA\TOSHIBA Zooming Utility\SmoothView.exe" [2005-04-27 122880]
"dla"="c:\windows\system32\dla\DLACTRLW.exe" [2005-10-06 122940]
"Pinger"="c:\toshiba\ivp\ism\pinger.exe" [2005-03-18 151552]
"IntelZeroConfig"="c:\program files\Intel\Wireless\bin\ZCfgSvc.exe" [2005-12-05 667718]
"IntelWireless"="c:\program files\Intel\Wireless\Bin\ifrmewrk.exe" [2005-11-28 602182]
"MSKDetectorExe"="c:\program files\McAfee\SpamKiller\MSKDetct.exe" [2005-08-12 1121792]
"Adobe Reader Speed Launcher"="c:\program files\Adobe\Reader 9.0\Reader\Reader_sl.exe" [2009-12-22 35760]
"Adobe ARM"="c:\program files\Common Files\Adobe\ARM\1.0\AdobeARM.exe" [2009-12-11 948672]
"SunJavaUpdateSched"="c:\program files\Common Files\Java\Java Update\jusched.exe" [2010-02-18 248040]
"HP Software Update"="c:\program files\HP\HP Software Update\HPWuSchd2.exe" [2004-09-13 49152]
"QuickTime Task"="c:\program files\QuickTime\QTTask.exe" [2010-02-15 417792]

c:\documents and settings\claire\Start Menu\Programs\Startup\
Microsoft Office OneNote 2003 Quick Launch.lnk - c:\program files\Microsoft Office\OFFICE11\ONENOTEM.EXE [2004-6-12 59080]

c:\documents and settings\All Users\Start Menu\Programs\Startup\
HP Digital Imaging Monitor.lnk - c:\program files\HP\Digital Imaging\bin\hpqtra08.exe [2004-11-4 258048]
HP Image Zone Fast Start.lnk - c:\program files\HP\Digital Imaging\bin\hpqthb08.exe [2004-11-4 53248]
RAMASST.lnk - c:\windows\system32\RAMASST.exe [2006-2-15 155648]

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\avgrsstarter]
2010-03-17 18:35 12464 ----a-w- c:\windows\system32\avgrsstx.dll

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\Lavasoft Ad-Aware Service]
@="Service"

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=
"c:\\TOSHIBA\\ivp\\NetInt\\Netint.exe"=
"c:\\TOSHIBA\\Ivp\\ISM\\pinger.exe"= c:\\TOSHIBA\\IVP\\ISM\\pinger.exe
"c:\\Program Files\\Common Files\\AOL\\Loader\\aolload.exe"=
"c:\\Program Files\\Common Files\\AOL\\ACS\\AOLDial.exe"=
"c:\\Program Files\\Common Files\\AOL\\ACS\\AOLacsd.exe"=
"c:\\Program Files\\America Online 9.0\\waol.exe"=
"c:\\Program Files\\Common Files\\AOL\\TopSpeed\\2.0\\aoltsmon.exe"=
"c:\\Program Files\\Common Files\\AOL\\TopSpeed\\2.0\\aoltpspd.exe"=
"c:\\Program Files\\Common Files\\AOL\\System Information\\sinf.exe"=
"c:\\Program Files\\Common Files\\AOL\\AOL Spyware Protection\\AOLSP Scheduler.exe"=
"c:\\Program Files\\Common Files\\AOL\\AOL Spyware Protection\\asp.exe"=
"c:\\Program Files\\Common Files\\AolCoach\\en_en\\player\\AOLNySEV.exe"=
"c:\\Program Files\\Messenger\\msmsgs.exe"=
"c:\\Program Files\\Common Files\\AOL\\1147563008\\EE\\AOLServiceHost.exe"=
"c:\\Program Files\\Yahoo!\\Yahoo! Music Engine\\YahooMusicEngine.exe"=
"c:\\Program Files\\AVG\\AVG9\\avgupd.exe"=
"c:\\Program Files\\AVG\\AVG9\\avgnsx.exe"=
"c:\\Program Files\\Windows Live\\Messenger\\wlcsdk.exe"=
"c:\\Program Files\\Windows Live\\Messenger\\msnmsgr.exe"=
"c:\\Program Files\\Bonjour\\mDNSResponder.exe"=

R0 Lbd;Lbd;c:\windows\system32\drivers\Lbd.sys [2/27/2010 9:39 PM 64288]
R0 pavboot;pavboot;c:\windows\system32\drivers\pavboot.sys [3/24/2010 6:14 PM 28552]
R1 AvgLdx86;AVG Free AVI Loader Driver x86;c:\windows\system32\drivers\avgldx86.sys [2/27/2010 9:10 PM 216200]
R1 AvgTdiX;AVG Free Network Redirector;c:\windows\system32\drivers\avgtdix.sys [2/27/2010 9:10 PM 242696]
R2 avg9wd;AVG Free WatchDog;c:\program files\AVG\AVG9\avgwdsvc.exe [3/17/2010 1:35 PM 308064]
R2 Lavasoft Ad-Aware Service;Lavasoft Ad-Aware Service;c:\program files\Lavasoft\Ad-Aware\AAWService.exe [2/4/2010 10:52 AM 1228208]
S3 SVRPEDRV;SVRPEDRV;\??\c:\sysprep\PEDrv.sys --> c:\sysprep\PEDrv.sys [?]
.
Contents of the 'Scheduled Tasks' folder

2010-03-29 c:\windows\Tasks\Ad-Aware Update (Weekly).job
- c:\program files\Lavasoft\Ad-Aware\Ad-AwareAdmin.exe [2010-02-04 15:52]

2010-03-24 c:\windows\Tasks\AppleSoftwareUpdate.job
- c:\program files\Apple Software Update\SoftwareUpdate.exe [2008-07-30 17:34]

2010-03-18 c:\windows\Tasks\GoogleUpdateTaskUserS-1-5-21-2443927813-440997947-2730816415-1005Core.job
- c:\documents and settings\claire\Local Settings\Application Data\Google\Update\GoogleUpdate.exe [2010-02-28 02:13]

2010-03-29 c:\windows\Tasks\GoogleUpdateTaskUserS-1-5-21-2443927813-440997947-2730816415-1005UA.job
- c:\documents and settings\claire\Local Settings\Application Data\Google\Update\GoogleUpdate.exe [2010-02-28 02:13]
.
.
------- Supplementary Scan -------
.
uStart Page = hxxp://www.toshibadirect.com/dpdstart
uInternet Settings,ProxyOverride = *.local
IE: &Google Search - c:\program files\Google\GoogleToolbar1.dll/cmsearch.html
IE: &Translate English Word - c:\program files\Google\GoogleToolbar1.dll/cmwordtrans.html
IE: Backward Links - c:\program files\Google\GoogleToolbar1.dll/cmbacklinks.html
IE: Cached Snapshot of Page - c:\program files\Google\GoogleToolbar1.dll/cmcache.html
IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~2\OFFICE11\EXCEL.EXE/3000
IE: Similar Pages - c:\program files\Google\GoogleToolbar1.dll/cmsimilar.html
IE: Translate Page into English - c:\program files\Google\GoogleToolbar1.dll/cmtrans.html
FF - ProfilePath - c:\documents and settings\claire\Application Data\Mozilla\Firefox\Profiles\4gauck6l.default\
FF - prefs.js: browser.search.selectedEngine - Yahoo! Search
FF - prefs.js: keyword.URL - hxxp://us.yhs.search.yahoo.com/avg/search?fr=yhs-avg&type=yahoo_avg_hs2-tb-web_us&p=
FF - component: c:\program files\AVG\AVG9\Firefox\components\avgssff.dll
FF - component: c:\program files\AVG\AVG9\Toolbar\Firefox\avg@igeared\components\IGeared_tavgp_xputils2.dll
FF - component: c:\program files\AVG\AVG9\Toolbar\Firefox\avg@igeared\components\IGeared_tavgp_xputils3.dll
FF - component: c:\program files\AVG\AVG9\Toolbar\Firefox\avg@igeared\components\IGeared_tavgp_xputils35.dll
FF - component: c:\program files\AVG\AVG9\Toolbar\Firefox\avg@igeared\components\xpavgtbapi.dll
FF - plugin: c:\documents and settings\claire\Local Settings\Application Data\Google\Update\1.2.183.23\npGoogleOneClick8.dll
FF - plugin: c:\documents and settings\claire\Local Settings\Application Data\Yahoo!\BrowserPlus\2.6.0\Plugins\npybrowserplus_2.6.0.dll
FF - plugin: c:\program files\Viewpoint\Viewpoint Experience Technology\npViewpoint.dll

---- FIREFOX POLICIES ----
c:\program files\Mozilla Firefox\greprefs\all.js - pref("ui.use_native_colors", true);
c:\program files\Mozilla Firefox\greprefs\all.js - pref("ui.use_native_popup_windows", false);
c:\program files\Mozilla Firefox\greprefs\all.js - pref("browser.enable_click_image_resizing", true);
c:\program files\Mozilla Firefox\greprefs\all.js - pref("accessibility.browsewithcaret_shortcut.enabled", true);
c:\program files\Mozilla Firefox\greprefs\all.js - pref("javascript.options.mem.high_water_mark", 32);
c:\program files\Mozilla Firefox\greprefs\all.js - pref("javascript.options.mem.gc_frequency", 1600);
c:\program files\Mozilla Firefox\greprefs\all.js - pref("network.auth.force-generic-ntlm", false);
c:\program files\Mozilla Firefox\greprefs\all.js - pref("svg.smil.enabled", false);
c:\program files\Mozilla Firefox\greprefs\all.js - pref("ui.trackpoint_hack.enabled", -1);
c:\program files\Mozilla Firefox\greprefs\all.js - pref("browser.formfill.debug", false);
c:\program files\Mozilla Firefox\greprefs\all.js - pref("browser.formfill.agedWeight", 2);
c:\program files\Mozilla Firefox\greprefs\all.js - pref("browser.formfill.bucketSize", 1);
c:\program files\Mozilla Firefox\greprefs\all.js - pref("browser.formfill.maxTimeGroupings", 25);
c:\program files\Mozilla Firefox\greprefs\all.js - pref("browser.formfill.timeGroupingSize", 604800);
c:\program files\Mozilla Firefox\greprefs\all.js - pref("browser.formfill.boundaryWeight", 25);
c:\program files\Mozilla Firefox\greprefs\all.js - pref("browser.formfill.prefixWeight", 5);
c:\program files\Mozilla Firefox\greprefs\all.js - pref("html5.enable", false);
c:\program files\Mozilla Firefox\defaults\pref\firefox-branding.js - pref("app.update.download.backgroundInterval", 600);
c:\program files\Mozilla Firefox\defaults\pref\firefox-branding.js - pref("app.update.url.manual", "http://www.firefox.com");
c:\program files\Mozilla Firefox\defaults\pref\firefox-branding.js - pref("browser.search.param.yahoo-fr-ja", "mozff");
c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("extensions.{972ce4c6-7e08-4474-a285-3208198ce6fd}.name", "chrome://browser/locale/browser.properties");
c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("extensions.{972ce4c6-7e08-4474-a285-3208198ce6fd}.description", "chrome://browser/locale/browser.properties");
c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("xpinstall.whitelist.add", "addons.mozilla.org");
c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("xpinstall.whitelist.add.36", "getpersonas.com");
c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("lightweightThemes.update.enabled", true);
c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("browser.allTabs.previews", false);
c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("plugins.hide_infobar_for_outdated_plugin", false);
c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("plugins.update.notifyUser", false);
c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("toolbar.customization.usesheet", false);
c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("browser.taskbar.previews.enable", false);
c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("browser.taskbar.previews.max", 20);
c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("browser.taskbar.previews.cachetime", 20);
.

**************************************************************************

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2010-03-29 15:01
Windows 5.1.2600 Service Pack 2 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully
hidden files: 0

**************************************************************************
.
--------------------- DLLs Loaded Under Running Processes ---------------------

- - - - - - - > 'explorer.exe'(3432)
c:\windows\system32\TDispVol.dll
c:\windows\system32\msi.dll
c:\windows\system32\TPwrCfg.DLL
c:\windows\system32\TPwrReg.dll
c:\windows\system32\TPSTrace.DLL
.
------------------------ Other Running Processes ------------------------
.
c:\program files\Intel\Wireless\Bin\EvtEng.exe
c:\program files\AVG\AVG9\avgchsvx.exe
c:\program files\AVG\AVG9\avgrsx.exe
c:\program files\Intel\Wireless\Bin\S24EvMon.exe
c:\program files\AVG\AVG9\avgcsrvx.exe
c:\program files\Common Files\AOL\ACS\AOLAcsd.exe
c:\program files\Common Files\AOL\TopSpeed\2.0\aoltsmon.exe
c:\program files\Common Files\AOL\TopSpeed\2.0\aoltpspd.exe
c:\program files\Bonjour\mDNSResponder.exe
c:\program files\TOSHIBA\ConfigFree\CFSvcs.exe
c:\windows\system32\DVDRAMSV.exe
c:\windows\eHome\ehRecvr.exe
c:\program files\TOSHIBA\TOSHIBA Controls\TFncKy.exe
c:\windows\system32\TDispVol.exe
c:\windows\eHome\ehSched.exe
c:\program files\AVG\AVG9\avgnsx.exe
c:\program files\Java\jre6\bin\jqs.exe
c:\program files\Synaptics\SynTP\Toshiba.exe
c:\windows\AGRSMMSG.exe
c:\program files\TOSHIBA\ConfigFree\NDSTray.exe
c:\program files\Intel\Wireless\Bin\RegSrvc.exe
c:\windows\system32\TPSMain.exe
c:\toshiba\IVP\swupdate\swupdtmr.exe
c:\windows\system32\TPSBattM.exe
c:\program files\TOSHIBA\TOSHIBA Applet\TAPPSRV.exe
c:\windows\ehome\mcrdsvc.exe
c:\program files\TOSHIBA\ConfigFree\CFSServ.exe
c:\program files\HP\Digital Imaging\bin\hpqgalry.exe
c:\windows\system32\wbem\unsecapp.exe
c:\windows\system32\wscntfy.exe
c:\windows\eHome\ehmsas.exe
c:\progra~1\Intel\Wireless\Bin\Dot1XCfg.exe
c:\windows\system32\dllhost.exe
c:\program files\Lavasoft\Ad-Aware\AAWTray.exe
.
**************************************************************************
.
Completion time: 2010-03-29 15:04:03 - machine was rebooted
ComboFix-quarantined-files.txt 2010-03-29 20:04

Pre-Run: 145,601,323,008 bytes free
Post-Run: 145,608,491,008 bytes free

WindowsXP-KB310994-SP2-Pro-BootDisk-ENU.exe
[boot loader]
timeout=2
default=multi(0)disk(0)rdisk(0)partition(1)\WINDOWS
[operating systems]
c:\cmdcons\BOOTSECT.DAT="Microsoft Windows Recovery Console" /cmdcons
multi(0)disk(0)rdisk(0)partition(1)\WINDOWS="Windows XP Media Center Edition" /noexecute=optin /fastdetect

- - End Of File - - 08C4BB913EFF33716E38AD11889172BA




#7 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:06:13 AM

Posted 29 March 2010 - 03:52 PM

Not the malware list I was expecting. dry.gif

Is the redirecting still happening?
Posted Image
m0le is a proud member of UNITE

#8 norweigan wood

norweigan wood
  • Topic Starter

  • Members
  • 27 posts
  • OFFLINE
  •  
  • Local time:02:13 AM

Posted 29 March 2010 - 04:37 PM

Hi M0le - yes its still redirecting, in fact when I clicked on this page to reply to you I was redirected to 'realtor.com' LOL!! I also still keep getting pop ups with a box that says 'windows internet security' Did it show any malware or at all or just not what you were looking for?

#9 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:06:13 AM

Posted 29 March 2010 - 05:03 PM

It showed a bit but nothing as I expected.

Can you run TDSSKiller for me
  • Download TDSSKiller and save it to your Desktop.

  • Extract its contents to your desktop and make sure TDSSKiller.exe (the contents of the zipped file) is on the Desktop itself, not within a folder on the desktop.

  • Go to Start > Run (Or you can hold down your Windows key and press R) and copy and paste the following into the text field. (make sure you include the quote marks) Then press OK.

    "%userprofile%\Desktop\TDSSKiller.exe" -l C:\TDSSKiller.txt -v

  • If it says "Hidden service detected" DO NOT type anything in. Just press Enter on your keyboard to leave the file alone
    .
  • When it is done, a log file should be created on your C: drive called "TDSSKiller.txt" please copy and paste the contents of that file here (or attach it).

Posted Image
m0le is a proud member of UNITE

#10 norweigan wood

norweigan wood
  • Topic Starter

  • Members
  • 27 posts
  • OFFLINE
  •  
  • Local time:02:13 AM

Posted 29 March 2010 - 05:15 PM

Ok - here are the results :

18:12:32:046 3172 TDSS rootkit removing tool 2.2.8.1 Mar 22 2010 10:43:04
18:12:32:046 3172 ================================================================================
18:12:32:046 3172 SystemInfo:

18:12:32:046 3172 OS Version: 5.1.2600 ServicePack: 2.0
18:12:32:046 3172 Product type: Workstation
18:12:32:046 3172 ComputerName: TOSHIBA-USER
18:12:32:046 3172 UserName: claire
18:12:32:046 3172 Windows directory: C:\WINDOWS
18:12:32:046 3172 Processor architecture: Intel x86
18:12:32:046 3172 Number of processors: 2
18:12:32:046 3172 Page size: 0x1000
18:12:32:046 3172 Boot type: Normal boot
18:12:32:046 3172 ================================================================================
18:12:32:046 3172 UnloadDriverW: NtUnloadDriver error 2
18:12:32:046 3172 ForceUnloadDriverW: UnloadDriverW(klmd21) error 2
18:12:32:078 3172 wfopen_ex: Trying to open file C:\WINDOWS\system32\config\system
18:12:32:093 3172 wfopen_ex: MyNtCreateFileW error 32 (C0000043)
18:12:32:093 3172 wfopen_ex: Trying to KLMD file open
18:12:32:093 3172 wfopen_ex: File opened ok (Flags 2)
18:12:32:093 3172 wfopen_ex: Trying to open file C:\WINDOWS\system32\config\software
18:12:32:093 3172 wfopen_ex: MyNtCreateFileW error 32 (C0000043)
18:12:32:093 3172 wfopen_ex: Trying to KLMD file open
18:12:32:093 3172 wfopen_ex: File opened ok (Flags 2)
18:12:32:093 3172 Initialize success
18:12:32:093 3172
18:12:32:093 3172 Scanning Services ...
18:12:32:656 3172 Raw services enum returned 353 services
18:12:32:656 3172
18:12:32:656 3172 Scanning Kernel memory ...
18:12:32:656 3172 Devices to scan: 4
18:12:32:656 3172
18:12:32:656 3172 Driver Name: Disk
18:12:32:656 3172 IRP_MJ_CREATE : F76A4C30
18:12:32:656 3172 IRP_MJ_CREATE_NAMED_PIPE : 804FC769
18:12:32:656 3172 IRP_MJ_CLOSE : F76A4C30
18:12:32:656 3172 IRP_MJ_READ : F769ED9B
18:12:32:656 3172 IRP_MJ_WRITE : F769ED9B
18:12:32:656 3172 IRP_MJ_QUERY_INFORMATION : 804FC769
18:12:32:656 3172 IRP_MJ_SET_INFORMATION : 804FC769
18:12:32:656 3172 IRP_MJ_QUERY_EA : 804FC769
18:12:32:656 3172 IRP_MJ_SET_EA : 804FC769
18:12:32:656 3172 IRP_MJ_FLUSH_BUFFERS : F769F366
18:12:32:656 3172 IRP_MJ_QUERY_VOLUME_INFORMATION : 804FC769
18:12:32:656 3172 IRP_MJ_SET_VOLUME_INFORMATION : 804FC769
18:12:32:656 3172 IRP_MJ_DIRECTORY_CONTROL : 804FC769
18:12:32:656 3172 IRP_MJ_FILE_SYSTEM_CONTROL : 804FC769
18:12:32:656 3172 IRP_MJ_DEVICE_CONTROL : F769F44D
18:12:32:656 3172 IRP_MJ_INTERNAL_DEVICE_CONTROL : F76A2FC3
18:12:32:656 3172 IRP_MJ_SHUTDOWN : F769F366
18:12:32:656 3172 IRP_MJ_LOCK_CONTROL : 804FC769
18:12:32:656 3172 IRP_MJ_CLEANUP : 804FC769
18:12:32:656 3172 IRP_MJ_CREATE_MAILSLOT : 804FC769
18:12:32:656 3172 IRP_MJ_QUERY_SECURITY : 804FC769
18:12:32:656 3172 IRP_MJ_SET_SECURITY : 804FC769
18:12:32:656 3172 IRP_MJ_POWER : F76A0EF3
18:12:32:656 3172 IRP_MJ_SYSTEM_CONTROL : F76A5A24
18:12:32:656 3172 IRP_MJ_DEVICE_CHANGE : 804FC769
18:12:32:656 3172 IRP_MJ_QUERY_QUOTA : 804FC769
18:12:32:656 3172 IRP_MJ_SET_QUOTA : 804FC769
18:12:32:687 3172 C:\WINDOWS\system32\DRIVERS\disk.sys - Verdict: 1
18:12:32:687 3172
18:12:32:687 3172 Driver Name: Disk
18:12:32:687 3172 IRP_MJ_CREATE : F76A4C30
18:12:32:687 3172 IRP_MJ_CREATE_NAMED_PIPE : 804FC769
18:12:32:687 3172 IRP_MJ_CLOSE : F76A4C30
18:12:32:687 3172 IRP_MJ_READ : F769ED9B
18:12:32:687 3172 IRP_MJ_WRITE : F769ED9B
18:12:32:687 3172 IRP_MJ_QUERY_INFORMATION : 804FC769
18:12:32:687 3172 IRP_MJ_SET_INFORMATION : 804FC769
18:12:32:687 3172 IRP_MJ_QUERY_EA : 804FC769
18:12:32:687 3172 IRP_MJ_SET_EA : 804FC769
18:12:32:687 3172 IRP_MJ_FLUSH_BUFFERS : F769F366
18:12:32:687 3172 IRP_MJ_QUERY_VOLUME_INFORMATION : 804FC769
18:12:32:687 3172 IRP_MJ_SET_VOLUME_INFORMATION : 804FC769
18:12:32:687 3172 IRP_MJ_DIRECTORY_CONTROL : 804FC769
18:12:32:687 3172 IRP_MJ_FILE_SYSTEM_CONTROL : 804FC769
18:12:32:687 3172 IRP_MJ_DEVICE_CONTROL : F769F44D
18:12:32:687 3172 IRP_MJ_INTERNAL_DEVICE_CONTROL : F76A2FC3
18:12:32:687 3172 IRP_MJ_SHUTDOWN : F769F366
18:12:32:687 3172 IRP_MJ_LOCK_CONTROL : 804FC769
18:12:32:687 3172 IRP_MJ_CLEANUP : 804FC769
18:12:32:687 3172 IRP_MJ_CREATE_MAILSLOT : 804FC769
18:12:32:687 3172 IRP_MJ_QUERY_SECURITY : 804FC769
18:12:32:687 3172 IRP_MJ_SET_SECURITY : 804FC769
18:12:32:687 3172 IRP_MJ_POWER : F76A0EF3
18:12:32:687 3172 IRP_MJ_SYSTEM_CONTROL : F76A5A24
18:12:32:687 3172 IRP_MJ_DEVICE_CHANGE : 804FC769
18:12:32:687 3172 IRP_MJ_QUERY_QUOTA : 804FC769
18:12:32:687 3172 IRP_MJ_SET_QUOTA : 804FC769
18:12:32:687 3172 C:\WINDOWS\system32\DRIVERS\disk.sys - Verdict: 1
18:12:32:687 3172
18:12:32:687 3172 Driver Name: Disk
18:12:32:687 3172 IRP_MJ_CREATE : F76A4C30
18:12:32:687 3172 IRP_MJ_CREATE_NAMED_PIPE : 804FC769
18:12:32:687 3172 IRP_MJ_CLOSE : F76A4C30
18:12:32:687 3172 IRP_MJ_READ : F769ED9B
18:12:32:687 3172 IRP_MJ_WRITE : F769ED9B
18:12:32:687 3172 IRP_MJ_QUERY_INFORMATION : 804FC769
18:12:32:687 3172 IRP_MJ_SET_INFORMATION : 804FC769
18:12:32:687 3172 IRP_MJ_QUERY_EA : 804FC769
18:12:32:687 3172 IRP_MJ_SET_EA : 804FC769
18:12:32:687 3172 IRP_MJ_FLUSH_BUFFERS : F769F366
18:12:32:687 3172 IRP_MJ_QUERY_VOLUME_INFORMATION : 804FC769
18:12:32:687 3172 IRP_MJ_SET_VOLUME_INFORMATION : 804FC769
18:12:32:687 3172 IRP_MJ_DIRECTORY_CONTROL : 804FC769
18:12:32:687 3172 IRP_MJ_FILE_SYSTEM_CONTROL : 804FC769
18:12:32:687 3172 IRP_MJ_DEVICE_CONTROL : F769F44D
18:12:32:687 3172 IRP_MJ_INTERNAL_DEVICE_CONTROL : F76A2FC3
18:12:32:687 3172 IRP_MJ_SHUTDOWN : F769F366
18:12:32:687 3172 IRP_MJ_LOCK_CONTROL : 804FC769
18:12:32:687 3172 IRP_MJ_CLEANUP : 804FC769
18:12:32:687 3172 IRP_MJ_CREATE_MAILSLOT : 804FC769
18:12:32:687 3172 IRP_MJ_QUERY_SECURITY : 804FC769
18:12:32:687 3172 IRP_MJ_SET_SECURITY : 804FC769
18:12:32:687 3172 IRP_MJ_POWER : F76A0EF3
18:12:32:687 3172 IRP_MJ_SYSTEM_CONTROL : F76A5A24
18:12:32:687 3172 IRP_MJ_DEVICE_CHANGE : 804FC769
18:12:32:687 3172 IRP_MJ_QUERY_QUOTA : 804FC769
18:12:32:687 3172 IRP_MJ_SET_QUOTA : 804FC769
18:12:32:687 3172 C:\WINDOWS\system32\DRIVERS\disk.sys - Verdict: 1
18:12:32:687 3172
18:12:32:687 3172 Driver Name: atapi
18:12:32:687 3172 IRP_MJ_CREATE : F756D572
18:12:32:687 3172 IRP_MJ_CREATE_NAMED_PIPE : 804FC769
18:12:32:687 3172 IRP_MJ_CLOSE : F756D572
18:12:32:687 3172 IRP_MJ_READ : 804FC769
18:12:32:687 3172 IRP_MJ_WRITE : 804FC769
18:12:32:687 3172 IRP_MJ_QUERY_INFORMATION : 804FC769
18:12:32:687 3172 IRP_MJ_SET_INFORMATION : 804FC769
18:12:32:687 3172 IRP_MJ_QUERY_EA : 804FC769
18:12:32:687 3172 IRP_MJ_SET_EA : 804FC769
18:12:32:687 3172 IRP_MJ_FLUSH_BUFFERS : 804FC769
18:12:32:687 3172 IRP_MJ_QUERY_VOLUME_INFORMATION : 804FC769
18:12:32:687 3172 IRP_MJ_SET_VOLUME_INFORMATION : 804FC769
18:12:32:687 3172 IRP_MJ_DIRECTORY_CONTROL : 804FC769
18:12:32:687 3172 IRP_MJ_FILE_SYSTEM_CONTROL : 804FC769
18:12:32:687 3172 IRP_MJ_DEVICE_CONTROL : F756D592
18:12:32:687 3172 IRP_MJ_INTERNAL_DEVICE_CONTROL : F75697B4
18:12:32:687 3172 IRP_MJ_SHUTDOWN : 804FC769
18:12:32:687 3172 IRP_MJ_LOCK_CONTROL : 804FC769
18:12:32:687 3172 IRP_MJ_CLEANUP : 804FC769
18:12:32:687 3172 IRP_MJ_CREATE_MAILSLOT : 804FC769
18:12:32:687 3172 IRP_MJ_QUERY_SECURITY : 804FC769
18:12:32:687 3172 IRP_MJ_SET_SECURITY : 804FC769
18:12:32:687 3172 IRP_MJ_POWER : F756D5BC
18:12:32:687 3172 IRP_MJ_SYSTEM_CONTROL : F7574164
18:12:32:687 3172 IRP_MJ_DEVICE_CHANGE : 804FC769
18:12:32:687 3172 IRP_MJ_QUERY_QUOTA : 804FC769
18:12:32:687 3172 IRP_MJ_SET_QUOTA : 804FC769
18:12:32:703 3172 C:\WINDOWS\system32\DRIVERS\atapi.sys - Verdict: 1
18:12:32:703 3172
18:12:32:703 3172 Completed
18:12:32:703 3172
18:12:32:703 3172 Results:
18:12:32:703 3172 Memory objects infected / cured / cured on reboot: 0 / 0 / 0
18:12:32:703 3172 Registry objects infected / cured / cured on reboot: 0 / 0 / 0
18:12:32:703 3172 File objects infected / cured / cured on reboot: 0 / 0 / 0
18:12:32:703 3172
18:12:32:703 3172 fclose_ex: Trying to close file C:\WINDOWS\system32\config\system
18:12:32:703 3172 fclose_ex: Trying to close file C:\WINDOWS\system32\config\software
18:12:32:703 3172 KLMD(ARK) unloaded successfully


#11 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:06:13 AM

Posted 29 March 2010 - 06:58 PM

Let's see if the malware reversed any settings

Please download Malwarebytes Anti-Malware and save it to your desktop.
  • Make sure you are connected to the Internet.
  • Double-click on mbam-setup.exe to install the application or, if you are using Vista, right-click and select Run As Administrator on mbam-setup.exe to install the application.
  • When the installation begins, follow the prompts and do not make any changes to default settings.
  • When installation has finished, make sure you leave both of these checked:
    • Update Malwarebytes' Anti-Malware
    • Launch Malwarebytes' Anti-Malware
  • Then click Finish.
  • MBAM will automatically start and you will be asked to update the program before performing a scan. If an update is found, the program will automatically update itself. Press the OK button to close that box and continue. If you encounter any problems while downloading the updates, manually download them from here and just double-click on mbam-rules.exe to install.
  • On the Scanner tab:
    • Make sure the "Perform Full Scan" option is selected.
    • Then click on the Scan button.
  • If asked to select the drives to scan, leave all the drives selected and click on the Start Scan button.
  • The scan will begin and "Scan in progress" will show at the top. It may take some time to complete so please be patient.
  • When the scan is finished, a message box will say "The scan completed successfully. Click 'Show Results' to display all objects found".
  • Click OK to close the message box and continue with the removal process.
  • Back at the main Scanner screen, click on the Show Results button to see a list of any malware that was found.
  • Make sure that everything is checked, and click Remove Selected.
  • When removal is completed, a log report will open in Notepad.
  • The log is automatically saved and can be viewed by clicking the Logs tab in MBAM.
  • Copy and paste the contents of that report in your next reply and exit MBAM.
Note: If MBAM encounters a file that is difficult to remove, you may be asked to reboot your computer so it can proceed with the disinfection process. Regardless if prompted to restart the computer or not, please do so immediately. Failure to reboot normally (not into safe mode) will prevent MBAM from removing all the malware. MBAM may make changes to your registry as part of its disinfection routine. If you're using other security programs that detect registry changes, they may alert you after scanning with MBAM. Please permit the program to allow the changes.


Now

Download and scan with SUPERAntiSpyware Free for Home Users
  • Double-click SUPERAntiSpyware.exe and use the default settings for installation.
  • An icon will be created on your desktop. Double-click that icon to launch the program.
  • If asked to update the program definitions, click "Yes". If not, update the definitions before scanning by selecting "Check for Updates". (If you encounter any problems while downloading the updates, manually download them from here. Double-click on the hyperlink for Download Installer and save SASDEFINITIONS.EXE to your desktop. Then double-click on SASDEFINITIONS.EXE to install the definitions.)
  • In the Main Menu, click the Preferences... button.
  • Click the Scanning Control tab.
  • Under Scanner Options make sure the following are checked (leave all others unchecked):
    • Close browsers before scanning.
    • Scan for tracking cookies.
    • Terminate memory threats before quarantining.
  • Click the "Close" button to leave the control center screen.
  • Back on the main screen, under "Scan for Harmful Software" click Scan your computer.
  • On the left, make sure you check C:\Fixed Drive.
  • On the right, under "Complete Scan", choose Perform Complete Scan.
  • Click "Next" to start the scan. Please be patient while it scans your computer.
  • After the scan is complete, a Scan Summary box will appear with potentially harmful items that were detected. Click "OK".
  • Make sure everything has a checkmark next to it and click "Next".
  • A notification will appear that "Quarantine and Removal is Complete". Click "OK" and then click the "Finish" button to return to the main menu.
  • If asked if you want to reboot, click "Yes".
  • To retrieve the removal information after reboot, launch SUPERAntispyware again.
    • Click Preferences, then click the Statistics/Logs tab.
    • Under Scanner Logs, double-click SUPERAntiSpyware Scan Log.
    • If there are several logs, click the current dated log and press View log. A text file will open in your default text editor.
    • Please copy and paste the Scan Log results in your next reply.
  • Click Close to exit the program.

Posted Image
m0le is a proud member of UNITE

#12 norweigan wood

norweigan wood
  • Topic Starter

  • Members
  • 27 posts
  • OFFLINE
  •  
  • Local time:02:13 AM

Posted 30 March 2010 - 02:38 PM

Hi m0le - below is the malewarebytes scan log. I was unable to download the other anti spyware program. Every time I tried I just kept getting a blank page that would say that my browser couldn't find the server. I did try using a different internet browser but it didn't help.

Malwarebytes' Anti-Malware 1.45
www.malwarebytes.org

Database version: 3934

Windows 5.1.2600 Service Pack 2
Internet Explorer 6.0.2900.2180

3/30/2010 3:21:55 PM
mbam-log-2010-03-30 (15-21-55).txt

Scan type: Full scan (C:\|)
Objects scanned: 165048
Time elapsed: 30 minute(s), 58 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 1
Registry Values Infected: 0
Registry Data Items Infected: 2
Folders Infected: 0
Files Infected: 0

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{8ecc055d-047f-11d1-a537-0000f8753ed1} (Trojan.Agent) -> Quarantined and deleted successfully.

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters\DhcpNameServer (Trojan.DNSChanger) -> Data: 85.255.112.202 85.255.112.197 1.2.3.4 -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters\Interfaces\{d149d22c-9005-49b7-8835-e126bafc4327}\DhcpNameServer (Trojan.DNSChanger) -> Data: 85.255.112.202 85.255.112.197 1.2.3.4 -> Quarantined and deleted successfully.

Folders Infected:
(No malicious items detected)

Files Infected:
(No malicious items detected)


#13 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:06:13 AM

Posted 30 March 2010 - 05:42 PM

Let's try another tool and see if anything else is lurking

Before we start fixing anything you should print out these instructions or copy them to a NotePad file so they will be accessible. Some steps will require you to disconnect from the Internet or use Safe Mode and you will not have access to this page.

Please download DrWeb-CureIt and save it to your desktop. DO NOT perform a scan yet.

Reboot your computer in "Safe Mode" using the F8 method. To do this, restart your computer and after hearing your computer beep once during startup (but before the Windows icon appears) press the F8 key repeatedly. A menu will appear with several options. Use the arrow keys to navigate and select the option to run Windows in "Safe Mode".

Scan with Dr.Web CureIt as follows:
  • Double-click on launch.exe to open the program and click Start. (There is no need to update if you just downloaded the most current version
  • Read the Virus check by DrWeb scanner prompt and click Ok where asked to Start scan now? Allow the setup.exe to load if asked by any of your security programs.
  • The Express scan will automatically begin.
    (This is a short scan of files currently running in memory, boot sectors, and targeted folders).
  • If prompted to dowload the Full version Free Trial, ignore and click the X to close the window.
  • If an infected object is found, you will be prompted to move anything that cannot be cured. Click Yes to All. (This will move any detected files to the C:\Documents and Settings\userprofile\DoctorWeb\Quarantine folder if they can't be cured)
  • After the Express Scan is finished, put a check next to Complete scan to scan all local disks and removable media.
  • In the top menu, click Settings > Change settings, and uncheck "Heuristic analysis" under the "Scanning" tab, then click Apply, Ok.
  • Back at the main window, click the green arrow "Start Scanning" button on the right under the Dr.Web logo.
  • Please be patient as this scan could take a long time to complete.
  • When the scan has finished, a message will be displayed at the bottom indicating if any viruses were found.
  • Click Select All, then choose Cure > Move incurable.
  • In the top menu, click file and choose save report list.
  • Save the DrWeb.csv report to your desktop.
  • Exit Dr.Web Cureit when done.
  • Important! Reboot your computer because it could be possible that files in use will be moved/deleted during reboot.
  • After reboot, post the contents of the log from Dr.Web in your next reply. (You can use Notepad to open the DrWeb.cvs report)

Posted Image
m0le is a proud member of UNITE

#14 norweigan wood

norweigan wood
  • Topic Starter

  • Members
  • 27 posts
  • OFFLINE
  •  
  • Local time:02:13 AM

Posted 31 March 2010 - 11:43 AM

Hi m0le, my computer is being stubborn. I start it in safe mode and the scan only gets about halfway through before freezing.

#15 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:06:13 AM

Posted 31 March 2010 - 11:55 AM

Try the ESET online scan and let's see if it's your PC or the malware

I'd like us to scan your machine with ESET OnlineScan
  1. Hold down Control and click on the following link to open ESET OnlineScan in a new window.
    ESET OnlineScan
  2. Click the button.
  3. For alternate browsers only: (Microsoft Internet Explorer users can skip these steps)
    1. Click on to download the ESET Smart Installer. Save it to your desktop.
    2. Double click on the icon on your desktop.
  4. Check
  5. Click the button.
  6. Accept any security warnings from your browser.
  7. Check
  8. Push the Start button.
  9. ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this can take some time.
  10. When the scan completes, push
  11. Push , and save the file to your desktop using a unique name, such as ESETScan. Include the contents of this report in your next reply.
  12. Push the button.
  13. Push
NOTE: If no malware is found there will be no option to export the text file as no log will be produced. Let me know if this is the case.
Posted Image
m0le is a proud member of UNITE




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users