Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Google redirects me on searches


  • Please log in to reply
23 replies to this topic

#1 pnbsoup

pnbsoup

  • Members
  • 85 posts
  • OFFLINE
  •  
  • Local time:03:20 AM

Posted 15 April 2010 - 10:07 AM

Trying to help out a friend on her laptop...When she does a search on google it sometimes re-directs her to other websites...I tried to run the mbr program but it fails it states that not recognized internal and external command operable command program? Can someone please try to help us out?

Thanks


Pnbsoup

BC AdBot (Login to Remove)

 


#2 pnbsoup

pnbsoup
  • Topic Starter

  • Members
  • 85 posts
  • OFFLINE
  •  
  • Local time:03:20 AM

Posted 15 April 2010 - 02:17 PM

bump...

Edited by Budapest, 15 April 2010 - 04:37 PM.
Moved from Virus, Trojan, Spyware, and Malware Removal Logs ~BP


#3 pnbsoup

pnbsoup
  • Topic Starter

  • Members
  • 85 posts
  • OFFLINE
  •  
  • Local time:03:20 AM

Posted 16 April 2010 - 03:59 PM

I havent heard from anyone in like 2days...Can someone please help me??

#4 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,490 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:04:20 AM

Posted 16 April 2010 - 07:47 PM

Hello those replies to yourself make it appear you are being helped as the colum shows 4 replies.

Lets do this
Next run ATF:
Note: On Vista, "Windows Temp" is disabled. To empty "Windows Temp" ATF-Cleaner must be "Run as an Administrator".

Please download ATF Cleaner by Atribune & save it to your desktop.
  • Double-click ATF-Cleaner.exe to run the program.
  • Under Main "Select Files to Delete" choose: Select All.
  • Click the Empty Selected button.
  • If you use Firefox browser click Firefox at the top and choose: Select All
  • Click the Empty Selected button.
    If you would like to keep your saved passwords, please click No at the prompt.
  • If you use Opera browser click Opera at the top and choose: Select All
  • Click the Empty Selected button.
    If you would like to keep your saved passwords, please click No at the prompt.
  • Click Exit on the Main menu to close the program.

Next run MBAM (MalwareBytes):

Please download Malwarebytes Anti-Malware (v1.45) and save it to your desktop.alternate download link 1
alternate download link 2
MBAM may "make changes to your registry" as part of its disinfection routine. If using other security programs that detect registry changes (ie Spybot's Teatimer), they may interfere or alert you. Temporarily disable such programs or permit them to allow the changes.
  • Make sure you are connected to the Internet.
  • Double-click on mbam-setup.exe to install the application.
  • When the installation begins, follow the prompts and do not make any changes to default settings.
  • When installation has finished, make sure you leave both of these checked:
    • Update Malwarebytes' Anti-Malware
    • Launch Malwarebytes' Anti-Malware
  • Then click Finish.
MBAM will automatically start and you will be asked to update the program before performing a scan.
  • If an update is found, the program will automatically update itself. Press the OK button to close that box and continue.
  • If you encounter any problems while downloading the definition updates, manually download them from here and just double-click on mbam-rules.exe to install.
On the Scanner tab:
  • Make sure the "Perform Quick Scan" option is selected.
  • Then click on the Scan button.
  • If asked to select the drives to scan, leave all the drives selected and click on the Start Scan button.
  • The scan will begin and "Scan in progress" will show at the top. It may take some time to complete so please be patient.
  • When the scan is finished, a message box will say "The scan completed successfully. Click 'Show Results' to display all objects found".
  • Click OK to close the message box and continue with the removal process.
Back at the main Scanner screen:
  • Click on the Show Results button to see a list of any malware that was found.
  • Make sure that everything is checked, and click Remove Selected.
  • When removal is completed, a log report will open in Notepad.
  • The log is automatically saved and can be viewed by clicking the Logs tab in MBAM.
  • Copy and paste the contents of that report in your next reply. Be sure to post the complete log to include the top portion which shows MBAM's database version and your operating system.
  • Exit MBAM when done.
Note: If MBAM encounters a file that is difficult to remove, you will be asked to reboot your computer so MBAM can proceed with the disinfection process. If asked to restart the computer, please do so immediately. Failure to reboot normally (not into safe mode) will prevent MBAM from removing all the malware.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#5 pnbsoup

pnbsoup
  • Topic Starter

  • Members
  • 85 posts
  • OFFLINE
  •  
  • Local time:03:20 AM

Posted 19 April 2010 - 10:00 AM

Hello Boopme,
Before reading your post I ran the superantivirus program...afterwards I ran the ATF Cleaner and the MBAM. Below is the log from MBAM.

Thanks for your help..

Malwarebytes' Anti-Malware 1.45
www.malwarebytes.org

Database version: 4006

Windows 5.1.2600 Service Pack 3
Internet Explorer 7.0.5730.13

4/19/2010 10:49:41 AM
mbam-log-2010-04-19 (10-49-41).txt

Scan type: Quick scan
Objects scanned: 119869
Time elapsed: 10 minute(s), 1 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 1

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
C:\WINDOWS\system32\timedrv26.sys (Backdoor.HacDef) -> Quarantined and deleted successfully.

#6 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,490 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:04:20 AM

Posted 19 April 2010 - 10:58 AM

Hello again,now we need a safe mode scan from SAS:

Please download and scan with SUPERAntiSpyware Free
  • Double-click SUPERAntiSypware.exe and use the default settings for installation.
  • An icon will be created on your desktop. Double-click that icon to launch the program.
  • If it will not start, go to Start > All Prgrams > SUPERAntiSpyware and click on Alternate Start.
  • If asked to update the program definitions, click "Yes". If not, update the definitions before scanning by selecting "Check for Updates". (If you encounter any problems while downloading the updates, manually download them from here. Double-click on the hyperlink for Download Installer and save SASDEFINITIONS.EXE to your desktop. Then double-click on SASDEFINITIONS.EXE to install the definitions.)
  • In the Main Menu, click the Preferences... button.
  • Click the "General and Startup" tab, and under Start-up Options, make sure "Start SUPERAntiSpyware when Windows starts" box is unchecked.
  • Click the "Scanning Control" tab, and under Scanner Options, make sure the following are checked (leave all others unchecked):
    • Close browsers before scanning.
    • Scan for tracking cookies.
    • Terminate memory threats before quarantining.
  • Click the "Close" button to leave the control center screen and exit the program.
  • Do not run a scan just yet.
Reboot your computer in "Safe Mode" using the F8 method. To do this, restart your computer and after hearing your computer beep once during startup (but before the Windows icon appears) press the F8 key repeatedly. A menu will appear with several options. Use the arrow keys to navigate and select the option to run Windows in "Safe Mode".

Scan with SUPERAntiSpyware as follows:
  • Launch the program and back on the main screen, under "Scan for Harmful Software" click Scan your computer.
  • On the left, make sure you check C:\Fixed Drive.
  • On the right, under "Complete Scan", choose Perform Complete Scan and click "Next".
  • After the scan is complete, a Scan Summary box will appear with potentially harmful items that were detected. Click "OK".
  • Make sure everything has a checkmark next to it and click "Next".
  • A notification will appear that "Quarantine and Removal is Complete". Click "OK" and then click the "Finish" button to return to the main menu.
  • If asked if you want to reboot, click "Yes" and reboot normally.
  • To retrieve the removal information after reboot, launch SUPERAntispyware again.
    • Click Preferences, then click the Statistics/Logs tab.
    • Under Scanner Logs, double-click SUPERAntiSpyware Scan Log.
    • If there are several logs, click the current dated log and press View log. A text file will open in your default text editor.
    • Please copy and paste the Scan Log results in your next reply.
  • Click Close to exit the program.
If you have a problem downloading, installing or getting SAS to run, try downloading and using the SUPERAntiSpyware Portable Scanner instead. Save the randomly named file (i.e. SAS_1710895.COM) to a usb drive or CD and transfer to the infected computer. Then double-click on it to launch and scan. The file is randomly named to help keep malware from blocking the scanner.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#7 pnbsoup

pnbsoup
  • Topic Starter

  • Members
  • 85 posts
  • OFFLINE
  •  
  • Local time:03:20 AM

Posted 20 April 2010 - 08:14 AM

Boopme
I ran the super antivirus program...is there a log that I need to post?

pnbsoup

#8 pnbsoup

pnbsoup
  • Topic Starter

  • Members
  • 85 posts
  • OFFLINE
  •  
  • Local time:03:20 AM

Posted 20 April 2010 - 08:18 AM

Sorry attached is the log from Super Anti-virus program...

SUPERAntiSpyware Scan Log
http://www.superantispyware.com

Generated 04/19/2010 at 10:33 AM

Application Version : 4.35.1000

Core Rules Database Version : 4821
Trace Rules Database Version: 2633

Scan type : Complete Scan
Total Scan Time : 01:23:31

Memory items scanned : 274
Memory threats detected : 0
Registry items scanned : 5653
Registry threats detected : 0
File items scanned : 50677
File threats detected : 4

Adware.Tracking Cookie
C:\Documents and Settings\Laurie Scioscia\Cookies\laurie_scioscia@bs.serving-sys[1].txt
C:\Documents and Settings\Laurie Scioscia\Cookies\laurie_scioscia@collective-media[1].txt
C:\Documents and Settings\Laurie Scioscia\Cookies\laurie_scioscia@doubleclick[1].txt
C:\Documents and Settings\Laurie Scioscia\Cookies\laurie_scioscia@serving-sys[2].txt

#9 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,490 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:04:20 AM

Posted 20 April 2010 - 10:57 AM

Looks good, one more to be sure before we are done... Online scan.

ESET
Please perform a scan with Eset Online Antiivirus Scanner.
(Requires Internet Explorer to work. If given the option, choose "Quarantine" instead of delete.)
Vista users need to run Internet Explorer as Administrator. Right-click on the IE icon in the Start Menu or Quick Launch Bar on the Taskbar and select Run as Administrator from the context menu.
  • Click the green ESET Online Scanner button.
  • Read the End User License Agreement and check the box: YES, I accept the Terms of Use.
  • Click on the Start button next to it.
  • You may receive an alert on the address bar that "This site might require the following ActiveX control...Click here to install...". Click on that alert and then click Insall ActiveX component.
  • A new window will appear asking "Do you want to install this software?"".
  • Answer Yes to download and install the ActiveX controls that allows the scan to run.
  • Click Start.
  • Check Remove found threats and Scan potentially unwanted applications.
  • Click Scan to start. (please be patient as the scan could take some time to complete)
  • If offered the option to get information or buy software. Just close the window.
  • When the scan has finished, a log.txt file will be created and automatically saved in the C:\Program Files\EsetOnlineScanner\ folder.
  • Click Posted Image > Run..., then copy and paste this command into the open box: C:\Program Files\EsetOnlineScanner\log.txt
  • The scan results will open in Notepad. Copy and paste the contents of log.txt in your next reply.
Note: Some online scanners will detect existing anti-virus software and refuse to cooperate. You may have to disable the real-time protection components of your existing anti-virus and try running the scan again. If you do this, remember to turn them back on after you are finished.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#10 pnbsoup

pnbsoup
  • Topic Starter

  • Members
  • 85 posts
  • OFFLINE
  •  
  • Local time:03:20 AM

Posted 20 April 2010 - 11:53 AM

Boopme,
I'm not able to run this online scanner? After several attempts I still get redirected to comcast wifi login pages. After finally going to the webpage, I get to where it asks me to install active X I get the following message in a window "To display webpage again internet explorer needs to resend information you've previously submitted. 2 options resend or cancel"...

Thanks

pnbsoup

#11 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,490 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:04:20 AM

Posted 20 April 2010 - 12:09 PM

Rerun MBAM (MalwareBytes) like this:

Open MBAM in normal mode and click Update tab, select Check for Updates,when done
click Scanner tab,select FULL scan and scan (normal mode).
After scan click Remove Selected, Post new scan log and Reboot into normal mode.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#12 pnbsoup

pnbsoup
  • Topic Starter

  • Members
  • 85 posts
  • OFFLINE
  •  
  • Local time:03:20 AM

Posted 20 April 2010 - 01:30 PM

below is the new log through Malware....

Malwarebytes' Anti-Malware 1.45
www.malwarebytes.org

Database version: 4012

Windows 5.1.2600 Service Pack 3
Internet Explorer 7.0.5730.13

4/20/2010 2:28:46 PM
mbam-log-2010-04-20 (14-28-46).txt

Scan type: Full scan (C:\|)
Objects scanned: 213635
Time elapsed: 1 hour(s), 11 minute(s), 16 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 3

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
C:\System Volume Information\_restore{D5341F9C-33F7-43CF-8BD2-1AE937C9BA1B}\RP822\A0488300.sys (Backdoor.HacDef) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{D5341F9C-33F7-43CF-8BD2-1AE937C9BA1B}\RP823\A0488474.sys (Backdoor.HacDef) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\timedrv26.sys (Backdoor.HacDef) -> Quarantined and deleted successfully.

#13 Eric ~ Computer Guy

Eric ~ Computer Guy

  • Members
  • 125 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Dallas, TX
  • Local time:02:20 AM

Posted 20 April 2010 - 01:34 PM

Check your Users files

(either C:\Documents and Settings\Users for Windows XP OR C:\Users for Windows Vista/7)

Do you have folders named "HelpAssist...."

If so, then you have the Mebroot MBR virus, which will be overlooked by nearly all scanners except Trend Micro's Rootkit Buster.

Even if you do not have the "HelpAssist" folders in the Users area, run Rootkit Buster, found here: http://free.antivirus.com/clean-up-tools/

It will tell you if you have a rootkit (which I HIGHLY suspect) and where it is.

**Also check your HOSTS file, located at C:\%windir%\system32\drivers\etc

Double-click on your HOSTS file and choose to Open With Notepad. From there, check to see if you have entries below "127.0.0.1 localhost", and see if these entries have google.com at the right hand side.

If you cannot see your HOSTS file, reboot into Safe Mode with Networking, point to the same location, and check the HOSTS then. If it has the google entries, close the HOSTS file and use Malwarebytes' File Assasin to delete it, and then reboot. This will allow your system to create a new HOSTS file.

Be sure to run a Full Scan while in Safe Mode, just to make sure you are clean.

Edited by Eric ~ Computer Guy, 20 April 2010 - 01:58 PM.


#14 pnbsoup

pnbsoup
  • Topic Starter

  • Members
  • 85 posts
  • OFFLINE
  •  
  • Local time:03:20 AM

Posted 20 April 2010 - 02:43 PM

Eric,
Thanks for helping me out....I could not find folder name helpassist...I could not find the users for windows xp or c:users for windows...

Also I check the HOSTS file and it stated 0KB and when I attempted to open with Notepad it came up blank? I also tried to open with MS Word, that too was blank...Below is the log from rootkit buster...

Thanks for your insight!


+----------------------------------------------------
| Trend Micro RootkitBuster
| Module version: 2.80.0.1077
+----------------------------------------------------


--== Dump Hidden MBR, Hidden Files and Alternate Data Streams on C:\ ==--
[HIDDEN_FILE]:
FullPath : C:\WINDOWS\system32\cjnr4r4dysjatkcxp.exe
FullPathLength: 41
DesiredAccess : 0x0
Options : 0x0
Attributes : 0x20
ShareAccess : 0x0
Type : 0x0
[HIDDEN_FILE]:
FullPath : C:\WINDOWS\system32\cjnr4r4dytkbt.exe
FullPathLength: 37
DesiredAccess : 0x0
Options : 0x0
Attributes : 0x20
ShareAccess : 0x0
Type : 0x0
[HIDDEN_FILE]:
FullPath : C:\WINDOWS\system32\cjnr4r4favmdw.exe
FullPathLength: 37
DesiredAccess : 0x0
Options : 0x0
Attributes : 0x20
ShareAccess : 0x0
Type : 0x0
[HIDDEN_FILE]:
FullPath : C:\WINDOWS\system32\cjnr4r4pjevmfwot.exe
FullPathLength: 40
DesiredAccess : 0x0
Options : 0x0
Attributes : 0x20
ShareAccess : 0x0
Type : 0x0
[HIDDEN_FILE]:
FullPath : C:\WINDOWS\system32\cjnr4r4toizqjasnf.exe
FullPathLength: 41
DesiredAccess : 0x0
Options : 0x0
Attributes : 0x20
ShareAccess : 0x0
Type : 0x0
[HIDDEN_FILE]:
FullPath : C:\WINDOWS\system32\cjnr4r4zupfwpgy.exe
FullPathLength: 39
DesiredAccess : 0x0
Options : 0x0
Attributes : 0x20
ShareAccess : 0x0
Type : 0x0
[HIDDEN_FILE]:
FullPath : C:\WINDOWS\system32\dior4f4btja.exe
FullPathLength: 35
DesiredAccess : 0x0
Options : 0x0
Attributes : 0x20
ShareAccess : 0x0
Type : 0x0
[HIDDEN_FILE]:
FullPath : C:\WINDOWS\system32\dior4f4fwqhyqi.exe
FullPathLength: 38
DesiredAccess : 0x0
Options : 0x0
Attributes : 0x20
ShareAccess : 0x0
Type : 0x0
[HIDDEN_FILE]:
FullPath : C:\WINDOWS\system32\dior4f4jzsizriztk.exe
FullPathLength: 41
DesiredAccess : 0x0
Options : 0x0
Attributes : 0x20
ShareAccess : 0x0
Type : 0x0
[HIDDEN_FILE]:
FullPath : C:\WINDOWS\system32\dior4f4kgbsjct.exe
FullPathLength: 38
DesiredAccess : 0x0
Options : 0x0
Attributes : 0x20
ShareAccess : 0x0
Type : 0x0
[HIDDEN_FILE]:
FullPath : C:\WINDOWS\system32\dior4f4lctlctmew.exe
FullPathLength: 40
DesiredAccess : 0x0
Options : 0x0
Attributes : 0x20
ShareAccess : 0x0
Type : 0x0
[HIDDEN_FILE]:
FullPath : C:\WINDOWS\system32\dior4f4mdwnexo.exe
FullPathLength: 38
DesiredAccess : 0x0
Options : 0x0
Attributes : 0x20
ShareAccess : 0x0
Type : 0x0
[HIDDEN_FILE]:
FullPath : C:\WINDOWS\system32\dior4f4vndu.exe
FullPathLength: 35
DesiredAccess : 0x0
Options : 0x0
Attributes : 0x20
ShareAccess : 0x0
Type : 0x0
[HIDDEN_FILE]:
FullPath : C:\WINDOWS\system32\dior4f4xsmdunewrj.exe
FullPathLength: 41
DesiredAccess : 0x0
Options : 0x0
Attributes : 0x80
ShareAccess : 0x0
Type : 0x0
[HIDDEN_FILE]:
FullPath : C:\WINDOWS\system32\mlsdf8hiyphyqjas.exe
FullPathLength: 40
DesiredAccess : 0x0
Options : 0x0
Attributes : 0x20
ShareAccess : 0x0
Type : 0x0
[HIDDEN_FILE]:
FullPath : C:\WINDOWS\system32\nlkfev7avqh.exe
FullPathLength: 35
DesiredAccess : 0x0
Options : 0x0
Attributes : 0x20
ShareAccess : 0x0
Type : 0x0
[HIDDEN_FILE]:
FullPath : C:\WINDOWS\system32\nlkfev7avqhyq.exe
FullPathLength: 37
DesiredAccess : 0x0
Options : 0x0
Attributes : 0x20
ShareAccess : 0x0
Type : 0x0
[HIDDEN_FILE]:
FullPath : C:\WINDOWS\system32\nlkfev7haqharic.exe
FullPathLength: 39
DesiredAccess : 0x0
Options : 0x0
Attributes : 0x20
ShareAccess : 0x0
Type : 0x0
[HIDDEN_FILE]:
FullPath : C:\WINDOWS\system32\nlkfev7jbsj.exe
FullPathLength: 35
DesiredAccess : 0x0
Options : 0x0
Attributes : 0x20
ShareAccess : 0x0
Type : 0x0
[HIDDEN_FILE]:
FullPath : C:\WINDOWS\system32\nlkfev7xsnevnfwrj.exe
FullPathLength: 41
DesiredAccess : 0x0
Options : 0x0
Attributes : 0x20
ShareAccess : 0x0
Type : 0x0
[HIDDEN_FILE]:
FullPath : C:\WINDOWS\system32\sklrr7ypkfvmfwo.exe
FullPathLength: 39
DesiredAccess : 0x0
Options : 0x0
Attributes : 0x20
ShareAccess : 0x0
Type : 0x0
[HIDDEN_FILE]:
FullPath : C:\WINDOWS\system32\sklrr7yqhbribt.exe
FullPathLength: 38
DesiredAccess : 0x0
Options : 0x0
Attributes : 0x20
ShareAccess : 0x0
Type : 0x0
[HIDDEN_FILE]:
FullPath : C:\WINDOWS\system32\sklrr7yvofw.exe
FullPathLength: 35
DesiredAccess : 0x0
Options : 0x0
Attributes : 0x20
ShareAccess : 0x0
Type : 0x0
[HIDDEN_FILE]:
FullPath : C:\WINDOWS\system32\sklrr7yxpgwp.exe
FullPathLength: 36
DesiredAccess : 0x0
Options : 0x0
Attributes : 0x20
ShareAccess : 0x0
Type : 0x0
[HIDDEN_FILE]:
FullPath : C:\WINDOWS\system32\timedrv26.sys
FullPathLength: 33
DesiredAccess : 0x0
Options : 0x0
Attributes : 0x21
ShareAccess : 0x0
Type : 0x0
[HIDDEN_FILE]:
FullPath : C:\WINDOWS\Temp\cjnr4r45501385.exe
FullPathLength: 34
DesiredAccess : 0x0
Options : 0x0
Attributes : 0x20
ShareAccess : 0x0
Type : 0x0
[HIDDEN_FILE]:
FullPath : C:\WINDOWS\Temp\cjnr4r4DB3EC4D6.tmp
FullPathLength: 35
DesiredAccess : 0x0
Options : 0x0
Attributes : 0x20
ShareAccess : 0x0
Type : 0x0
[HIDDEN_FILE]:
FullPath : C:\WINDOWS\Temp\cjnr4r4DB3EC4D7.tmp
FullPathLength: 35
DesiredAccess : 0x0
Options : 0x0
Attributes : 0x20
ShareAccess : 0x0
Type : 0x0
[HIDDEN_FILE]:
FullPath : C:\WINDOWS\Temp\dior4f41381676.exe
FullPathLength: 34
DesiredAccess : 0x0
Options : 0x0
Attributes : 0x20
ShareAccess : 0x0
Type : 0x0
[HIDDEN_FILE]:
FullPath : C:\WINDOWS\Temp\mlsdf8h9143594.exe
FullPathLength: 34
DesiredAccess : 0x0
Options : 0x0
Attributes : 0x20
ShareAccess : 0x0
Type : 0x0
[HIDDEN_FILE]:
FullPath : C:\WINDOWS\Temp\nlkfev72225577.exe
FullPathLength: 34
DesiredAccess : 0x0
Options : 0x0
Attributes : 0x20
ShareAccess : 0x0
Type : 0x0
[HIDDEN_FILE]:
FullPath : C:\WINDOWS\Temp\nlkfev76136292.exe
FullPathLength: 34
DesiredAccess : 0x0
Options : 0x0
Attributes : 0x20
ShareAccess : 0x0
Type : 0x0
[HIDDEN_FILE]:
FullPath : C:\WINDOWS\Temp\nlkfev77366457.exe
FullPathLength: 34
DesiredAccess : 0x0
Options : 0x0
Attributes : 0x20
ShareAccess : 0x0
Type : 0x0
33 hidden files found.

--== Dump Hidden Registry Value on HKLM ==--
[HIDDEN_REGISTRY][Hidden Reg Value]:
KeyPath : HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BEHAVIORS
Root : 0
SubKey : FEATURE_BEHAVIORS
ValueName : *
Data : 1
ValueType : 4
AccessType: 0
FullLength: 0x5d
DataSize : 0x4
[HIDDEN_REGISTRY][Hidden Reg Value]:
KeyPath : HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_DISABLE_MK_PROTOCOL
Root : 0
SubKey : FEATURE_DISABLE_MK_PROTOCOL
ValueName : *
Data : 1
ValueType : 4
AccessType: 0
FullLength: 0x67
DataSize : 0x4
[HIDDEN_REGISTRY][Hidden Reg Value]:
KeyPath : HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_PROTECT_DECOMPRESSION_FILTER_FROM_ABORT_KB942367
Root : 0
SubKey : FEATURE_PROTECT_DECOMPRESSION_FILTER_FROM_ABORT_KB942367
ValueName : *
Data : 1
ValueType : 4
AccessType: 0
FullLength: 0x84
DataSize : 0x4
[HIDDEN_REGISTRY][Hidden Reg Value]:
KeyPath : HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\CancelAutoplay\Files
Root : 0
SubKey : Files
ValueName : *setup*.exe
Data :
ValueType : 1
AccessType: 0
FullLength: 0x6b
DataSize : 0x2
[HIDDEN_REGISTRY][Hidden Reg Value]:
KeyPath : HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\CancelAutoplay\Files
Root : 0
SubKey : Files
ValueName : *instal*.exe
Data :
ValueType : 1
AccessType: 0
FullLength: 0x6b
DataSize : 0x2
[HIDDEN_REGISTRY][Hidden Reg Value]:
KeyPath : HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\CancelAutoplay\Files
Root : 0
SubKey : Files
ValueName : *setup*.bat
Data :
ValueType : 1
AccessType: 0
FullLength: 0x6b
DataSize : 0x2
[HIDDEN_REGISTRY][Hidden Reg Value]:
KeyPath : HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\CancelAutoplay\Files
Root : 0
SubKey : Files
ValueName : *instal*.bat
Data :
ValueType : 1
AccessType: 0
FullLength: 0x6b
DataSize : 0x2
[HIDDEN_REGISTRY][Hidden Reg Value]:
KeyPath : HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\CancelAutoplay\Files
Root : 0
SubKey : Files
ValueName : *setup*.cmd
Data :
ValueType : 1
AccessType: 0
FullLength: 0x6b
DataSize : 0x2
[HIDDEN_REGISTRY][Hidden Reg Value]:
KeyPath : HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\CancelAutoplay\Files
Root : 0
SubKey : Files
ValueName : *instal*.cmd
Data :
ValueType : 1
AccessType: 0
FullLength: 0x6b
DataSize : 0x2
[HIDDEN_REGISTRY][Hidden Reg Value]:
KeyPath : HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\CancelAutoplay\Files
Root : 0
SubKey : Files
ValueName : *setup*.com
Data :
ValueType : 1
AccessType: 0
FullLength: 0x6b
DataSize : 0x2
[HIDDEN_REGISTRY][Hidden Reg Value]:
KeyPath : HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\CancelAutoplay\Files
Root : 0
SubKey : Files
ValueName : *instal*.com
Data :
ValueType : 1
AccessType: 0
FullLength: 0x6b
DataSize : 0x2
[HIDDEN_REGISTRY][Hidden Reg Value]:
KeyPath : HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Accepted Documents
Root : 0
SubKey : Accepted Documents
ValueName : ***
Data : application/vnd.ms-powerpoint
ValueType : 1
AccessType: 0
FullLength: 0x61
DataSize : 0x3c
[HIDDEN_REGISTRY][Hidden Reg Value]:
KeyPath : HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Accepted Documents
Root : 0
SubKey : Accepted Documents
ValueName : **
Data : application/vnd.ms-excel
ValueType : 1
AccessType: 0
FullLength: 0x61
DataSize : 0x32
[HIDDEN_REGISTRY][Hidden Reg Value]:
KeyPath : HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Accepted Documents
Root : 0
SubKey : Accepted Documents
ValueName : *
Data : application/msword
ValueType : 1
AccessType: 0
FullLength: 0x61
DataSize : 0x26
[HIDDEN_REGISTRY][Hidden Reg Value]:
KeyPath : HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\AllowedDragProtocols\0
Root : 0
SubKey : 0
ValueName : *
Data : 0
ValueType : 4
AccessType: 0
FullLength: 0x65
DataSize : 0x4
[HIDDEN_REGISTRY][Hidden Reg Value]:
KeyPath : HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\AllowedDragProtocols\2
Root : 0
SubKey : 2
ValueName : *
Data : 0
ValueType : 4
AccessType: 0
FullLength: 0x65
DataSize : 0x4
[HIDDEN_REGISTRY][Hidden Reg Value]:
KeyPath : HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Time
Root : 0
SubKey : Time
ValueName : Type
Data : 272
ValueType : 4
AccessType: 0
FullLength: 0x39
DataSize : 0x4
[HIDDEN_REGISTRY][Hidden Reg Value]:
KeyPath : HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Time
Root : 0
SubKey : Time
ValueName : Start
Data : 2
ValueType : 4
AccessType: 0
FullLength: 0x39
DataSize : 0x4
[HIDDEN_REGISTRY][Hidden Reg Value]:
KeyPath : HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Time
Root : 0
SubKey : Time
ValueName : ErrorControl
Data : 0
ValueType : 4
AccessType: 0
FullLength: 0x39
DataSize : 0x4
[HIDDEN_REGISTRY][Hidden Reg Value]:
KeyPath : HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Time
Root : 0
SubKey : Time
ValueName : ImagePath
Data : C:\WINDOWS\system32\dior4f4xsmdunewrj.exe
ValueType : 2
AccessType: 0
FullLength: 0x39
DataSize : 0x54
[HIDDEN_REGISTRY][Hidden Reg Value]:
KeyPath : HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Time
Root : 0
SubKey : Time
ValueName : DisplayName
Data : Time Service
ValueType : 1
AccessType: 0
FullLength: 0x39
DataSize : 0x1a
[HIDDEN_REGISTRY][Hidden Reg Value]:
KeyPath : HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Time
Root : 0
SubKey : Time
ValueName : ObjectName
Data : LocalSystem
ValueType : 1
AccessType: 0
FullLength: 0x39
DataSize : 0x18
[HIDDEN_REGISTRY][Hidden Reg Value]:
KeyPath : HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Time
Root : 0
SubKey : Time
ValueName : Description
Data : Maintains date and time synchronization on all clients and servers in the network.
ValueType : 1
AccessType: 0
FullLength: 0x39
DataSize : 0xa6
[HIDDEN_REGISTRY][Hidden Reg Value]:
KeyPath : HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Time\Security
Root : 0
SubKey : Security
ValueName : Security
Data : 1 0 14 80 90 0 0 0 ...
ValueType : 3
AccessType: 0
FullLength: 0x42
DataSize : 0xa8
[HIDDEN_REGISTRY][Hidden Reg Value]:
KeyPath : HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Time\Enum
Root : 0
SubKey : Enum
ValueName : 0
Data : Root\LEGACY_TIME\0000
ValueType : 1
AccessType: 0
FullLength: 0x3e
DataSize : 0x2c
[HIDDEN_REGISTRY][Hidden Reg Value]:
KeyPath : HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Time\Enum
Root : 0
SubKey : Enum
ValueName : Count
Data : 1
ValueType : 4
AccessType: 0
FullLength: 0x3e
DataSize : 0x4
[HIDDEN_REGISTRY][Hidden Reg Value]:
KeyPath : HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Time\Enum
Root : 0
SubKey : Enum
ValueName : NextInstance
Data : 1
ValueType : 4
AccessType: 0
FullLength: 0x3e
DataSize : 0x4
[HIDDEN_REGISTRY][Hidden Reg Value]:
KeyPath : HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\WTime
Root : 0
SubKey : WTime
ValueName : ErrorControl
Data : 0
ValueType : 4
AccessType: 0
FullLength: 0x3a
DataSize : 0x4
[HIDDEN_REGISTRY][Hidden Reg Value]:
KeyPath : HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\WTime
Root : 0
SubKey : WTime
ValueName : ImagePath
Data : \??\C:\WINDOWS\system32\timedrv26.sys
ValueType : 2
AccessType: 0
FullLength: 0x3a
DataSize : 0x4c
[HIDDEN_REGISTRY][Hidden Reg Value]:
KeyPath : HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\WTime
Root : 0
SubKey : WTime
ValueName : Start
Data : 3
ValueType : 4
AccessType: 0
FullLength: 0x3a
DataSize : 0x4
[HIDDEN_REGISTRY][Hidden Reg Value]:
KeyPath : HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\WTime
Root : 0
SubKey : WTime
ValueName : Type
Data : 1
ValueType : 4
AccessType: 0
FullLength: 0x3a
DataSize : 0x4
[HIDDEN_REGISTRY][Hidden Reg Value]:
KeyPath : HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\WTime\Enum
Root : 0
SubKey : Enum
ValueName : 0
Data : Root\LEGACY_WTIME\0000
ValueType : 1
AccessType: 0
FullLength: 0x3f
DataSize : 0x2e
[HIDDEN_REGISTRY][Hidden Reg Value]:
KeyPath : HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\WTime\Enum
Root : 0
SubKey : Enum
ValueName : Count
Data : 1
ValueType : 4
AccessType: 0
FullLength: 0x3f
DataSize : 0x4
[HIDDEN_REGISTRY][Hidden Reg Value]:
KeyPath : HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\WTime\Enum
Root : 0
SubKey : Enum
ValueName : NextInstance
Data : 1
ValueType : 4
AccessType: 0
FullLength: 0x3f
DataSize : 0x4
34 hidden registry entries found.


--== Dump Hidden Process ==--
[HIDDEN_PROCESS]:
ParentId : 000002D0
ID : 000006D4
Type : 0x00000001
Name : dior4f4xsmdunewrj.exe
ImageName : C:\WINDOWS\system32\dior4f4xsmdunewrj.exe


--== Dump Hidden Driver ==--
No hidden drivers found.

#15 Eric ~ Computer Guy

Eric ~ Computer Guy

  • Members
  • 125 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Dallas, TX
  • Local time:02:20 AM

Posted 20 April 2010 - 02:47 PM

As I suspected, you have a pretty bad rootkit infection.

I do not ever condone the usage of ComboFix, personally, as it causes more problems than it solves in my professional experience.

At this point, I would highly recommend backing up your data and doing a low-level format and reinstallation of Windows, as the cleanup process of such a heavy rootkit infection could probably cause more problems, even after the rootkits are removed.

Just my 2 cents...

If you would like to pursue a repair, the moderators will have all the reference materials you would need to undertake such an endeavor.

**Since you have an MBR rootkit, you could get to the Recovery Console and run FIXMBR and restart. But, that wouldn't necessarily remove all rootkits.

If you decide to back up your data, be sure to scan it for malware on the external media that you are able to put it on before you transfer it over to another PC. And ONLY scan that media on a system with strong, active, up-to-date security software running.

Edited by Eric ~ Computer Guy, 20 April 2010 - 02:53 PM.





0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users