Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Exploit Neosploit Toolkit (type 779)


  • This topic is locked This topic is locked
15 replies to this topic

#1 Reddons1

Reddons1

  • Members
  • 17 posts
  • OFFLINE
  •  
  • Local time:12:54 PM

Posted 15 April 2010 - 09:02 PM

Hi recently it seems I have picked up the above rootkit and it has made my computer time very frustrating.

As I have very little computer knowledge I was hoping someone could walk me through the fix.

I have read your 'Before you post' section and have been working my way through the list but when I try to do the GMER (Twice now) somewhere after the first hour my computer crashes and I lose the lot.

I have all the other data waiting to go and I have Combofix ready as well.

Just one other point about this redirect, I find that even when using IE if I get a mail with a link it will open on a Google page and not IE so I can't use it, this also happens with MSN, I can open it and chat but if I try to read my hotmail it opens a Google page.

Gee I hope that makes sense. wacko.gif

Thank you in advance
Ken

Mod. edit. Instructed member to post logs. Has problems doing so. I have removed my replies and merged/paraphrased the member's posts. ~ OB

Got a problem.

Every time I try to post my DDS log I get an 'Internet Explorer cannot display the webpage' error

Ken

See if I can do an attach...

Attachment not working either

I am going to need to think through how to get these details loaded, I'm in Australia and it's midnight here so I might try again in the morning if thats ok?


Ken

DDS (Ver_10-03-17.01) - NTFSx86
Run by Ken at 11:58:39.45 on Thu 15/04/2010
Internet Explorer: 8.0.6001.18904
Microsoft® Windows Vista™ Home Basic 6.0.6002.2.1252.61.1033.18.1015.343 [GMT 10:00]

SP: Lavasoft Ad-Watch Live! *disabled* (Updated) {67844DAE-4F77-4D69-9457-98E8CFFDAA22}
SP: Windows Defender *disabled* (Updated) {D68DDC3A-831F-4FAE-9E44-DA132C1ACF46}

============== Running Processes ===============

C:\Windows\system32\wininit.exe
C:\Program Files\AVG\AVG9\avgchsvx.exe
C:\Program Files\AVG\AVG9\avgrsx.exe
C:\Windows\system32\lsm.exe
C:\Program Files\AVG\AVG9\avgcsrvx.exe
C:\Windows\system32\svchost.exe -k DcomLaunch
C:\Windows\system32\svchost.exe -k rpcss
C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted
C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted
C:\Windows\system32\svchost.exe -k netsvcs
C:\Windows\system32\svchost.exe -k GPSvcGroup
C:\Windows\system32\SLsvc.exe
C:\Windows\system32\svchost.exe -k LocalService
C:\Windows\system32\svchost.exe -k NetworkService
C:\Program Files\Lavasoft\Ad-Aware\AAWService.exe
C:\Windows\System32\spoolsv.exe
C:\Windows\system32\svchost.exe -k LocalServiceNoNetwork
C:\Program Files\AVG\AVG9\avgwdsvc.exe
C:\Program Files\Common Files\Symantec Shared\PIF\{B8E1DD85-8582-4c61-B58F-2F227FCA9A08}\PifSvc.exe
C:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted
C:\Program Files\Microsoft\Search Enhancement Pack\SeaPort\SeaPort.exe
C:\Windows\system32\svchost.exe -k imgsvc
C:\Windows\System32\svchost.exe -k WerSvcGroup
C:\Windows\system32\SearchIndexer.exe
C:\Program Files\AVG\AVG9\avgnsx.exe
C:\Program Files\AVG\AVG9\avgemc.exe
C:\Program Files\AVG\AVG9\avgcsrvx.exe
C:\Windows\system32\wbem\unsecapp.exe
C:\Windows\system32\wbem\wmiprvse.exe
C:\Windows\system32\taskeng.exe
C:\Windows\system32\taskeng.exe
C:\Windows\system32\Dwm.exe
C:\Program Files\Common Files\Symantec Shared\PIF\{B8E1DD85-8582-4c61-B58F-2F227FCA9A08}\PIFSvc.exe
C:\Program Files\Common Files\Java\Java Update\jusched.exe
C:\Windows\SOUNDMAN.EXE
C:\Program Files\Common Files\LogiShrd\LComMgr\Communications_Helper.exe
C:\Program Files\Logitech\QuickCam10\QuickCam10.exe
C:\Program Files\AVG\AVG9\avgtray.exe
C:\Windows\System32\rundll32.exe
C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe
C:\Program Files\Windows Media Player\wmpnscfg.exe
C:\Program Files\Windows Media Player\wmpnetwk.exe
C:\Program Files\IncrediMail\bin\IMApp.exe
C:\Program Files\Lavasoft\Ad-Aware\AAWTray.exe
C:\Program Files\Common Files\LogiShrd\LComMgr\LVComSX.exe
C:\Program Files\Common Files\Logishrd\LQCVFX\COCIManager.exe
C:\Windows\Explorer.exe
C:\Windows\system32\notepad.exe
C:\Program Files\IncrediMail\bin\IncMail.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Google\Google Toolbar\GoogleToolbarUser_32.exe
C:\Program Files\Windows Live\Toolbar\wltuser.exe
C:\Windows\system32\Macromed\Flash\FlashUtil10d.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Users\Ken\Desktop\dds.scr
C:\Windows\system32\wbem\wmiprvse.exe

I thought I could break it up but only the first part gets through Meaning thought the log could be posted in sections in different posts but that didn't work. ~ OB

Paraphrase I do not have access to another computer.

Edited by Orange Blossom, 18 April 2010 - 09:21 AM.


BC AdBot (Login to Remove)

 


#2 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:02:54 AM

Posted 19 April 2010 - 07:45 PM

Hi,

Welcome to Bleeping Computer. My name is m0le and I will be helping you with your log.
  • Please subscribe to this topic, if you haven't already. You can subscribe by clicking the Options box to the right of your topic title and selecting Track This Topic.

  • Please avoid installing/uninstalling or updating any programs and attempting any unsupervised fixes or scans. This can make helping you impossible.

  • Please reply to this post so I know you are there.
The forum is busy and we need to have replies as soon as possible. If I haven't had a reply after 3 days I will bump the topic and if you do not reply by the following day after that then I will close the topic.

Once I receive a reply then I will return with your first instructions.

Thanks thumbup2.gif
Posted Image
m0le is a proud member of UNITE

#3 Reddons1

Reddons1
  • Topic Starter

  • Members
  • 17 posts
  • OFFLINE
  •  
  • Local time:12:54 PM

Posted 20 April 2010 - 12:27 AM

Hi And thank you for your help.

I have subscribed to the topic but please be aware that I am in Australia so there will be time zone clashes.

Regards
Ken

#4 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:02:54 AM

Posted 20 April 2010 - 01:08 PM

Okay, I noted the time difference (that's 24 hours behind isn't it?)

Can you try and run Gmer by checking only SECTIONS
Posted Image
m0le is a proud member of UNITE

#5 Reddons1

Reddons1
  • Topic Starter

  • Members
  • 17 posts
  • OFFLINE
  •  
  • Local time:12:54 PM

Posted 20 April 2010 - 08:10 PM

Wow that caused a lot of issues with my computer but finally here is GMER with only sections checked.....


GMER 1.0.15.15281 - http://www.gmer.net
Rootkit scan 2010-04-21 09:49:18
Windows 6.0.6002 Service Pack 2
Running: gmer.exe; Driver: C:\Users\Ken\AppData\Local\Temp\uwldqpow.sys


---- Kernel code sections - GMER 1.0.15 ----

.rsrc C:\Windows\system32\drivers\volmgr.sys entry point in ".rsrc" section [0x80730014]

---- User code sections - GMER 1.0.15 ----

.text C:\Windows\system32\svchost.exe[1300] ntdll.dll!NtProtectVirtualMemory 77014D34 5 Bytes JMP 001C000A
.text C:\Windows\system32\svchost.exe[1300] ntdll.dll!NtWriteVirtualMemory 77015674 5 Bytes JMP 001D000A
.text C:\Windows\system32\svchost.exe[1300] ntdll.dll!KiUserExceptionDispatcher 77015DC8 5 Bytes JMP 001B000A
.text C:\Windows\system32\svchost.exe[1300] ole32.dll!CoCreateInstance 75719EA6 5 Bytes JMP 014B000A
.text C:\Windows\system32\svchost.exe[1300] USER32.dll!GetCursorPos 765F0B88 5 Bytes JMP 016E000A
.text C:\Windows\Explorer.EXE[2580] ntdll.dll!NtProtectVirtualMemory 77014D34 5 Bytes JMP 0028000A
.text C:\Windows\Explorer.EXE[2580] ntdll.dll!NtWriteVirtualMemory 77015674 5 Bytes JMP 0029000A
.text C:\Windows\Explorer.EXE[2580] ntdll.dll!KiUserExceptionDispatcher 77015DC8 5 Bytes JMP 0001000A
.text C:\Program Files\Internet Explorer\iexplore.exe[2876] ntdll.dll!NtProtectVirtualMemory 77014D34 5 Bytes JMP 0037000A
.text C:\Program Files\Internet Explorer\iexplore.exe[2876] ntdll.dll!NtWriteVirtualMemory 77015674 5 Bytes JMP 0038000A
.text C:\Program Files\Internet Explorer\iexplore.exe[2876] ntdll.dll!KiUserExceptionDispatcher 77015DC8 5 Bytes JMP 0036000A
.text C:\Program Files\Internet Explorer\iexplore.exe[2876] USER32.dll!CreateDialogParamW 765D72A2 5 Bytes JMP 6D87DE50 C:\Windows\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[2876] USER32.dll!GetAsyncKeyState 765D863C 5 Bytes JMP 6D798EF7 C:\Windows\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[2876] USER32.dll!SetWindowsHookExW 765D87AD 5 Bytes JMP 6D879A75 C:\Windows\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[2876] USER32.dll!CallNextHookEx 765D8E3B 5 Bytes JMP 6D86D101 C:\Windows\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[2876] USER32.dll!UnhookWindowsHookEx 765D98DB 5 Bytes JMP 6D7E466E C:\Windows\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[2876] USER32.dll!EnableWindow 765DCD8B 5 Bytes JMP 6D87DCDD C:\Windows\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[2876] USER32.dll!CreateWindowExW 765E1305 5 Bytes JMP 6D87DAC4 C:\Windows\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[2876] USER32.dll!GetKeyState 765E8CB1 5 Bytes JMP 6D87D28B C:\Windows\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[2876] USER32.dll!IsDialogMessageW 765F0745 5 Bytes JMP 6D7A5A17 C:\Windows\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[2876] USER32.dll!CreateDialogParamA 765F17AA 5 Bytes JMP 6D9753AB C:\Windows\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[2876] USER32.dll!IsDialogMessage 765F1847 5 Bytes JMP 6D974C47 C:\Windows\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[2876] USER32.dll!CreateDialogIndirectParamA 765F26F1 5 Bytes JMP 6D9753E2 C:\Windows\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[2876] USER32.dll!CreateDialogIndirectParamW 765F9A62 5 Bytes JMP 6D975419 C:\Windows\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[2876] USER32.dll!SetKeyboardState 76600987 5 Bytes JMP 6D974FB6 C:\Windows\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[2876] USER32.dll!DialogBoxParamW 766010B0 5 Bytes JMP 6D7A5505 C:\Windows\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[2876] USER32.dll!DialogBoxIndirectParamW 76602EF5 5 Bytes JMP 6D97473F C:\Windows\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[2876] USER32.dll!SendInput 76602F75 5 Bytes JMP 6D975B73 C:\Windows\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[2876] USER32.dll!EndDialog 7660326E 5 Bytes JMP 6D7A7EC2 C:\Windows\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[2876] USER32.dll!SetCursorPos 76616FB2 5 Bytes JMP 6D975BC7 C:\Windows\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[2876] USER32.dll!DialogBoxParamA 76618152 5 Bytes JMP 6D9746DC C:\Windows\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[2876] USER32.dll!DialogBoxIndirectParamA 7661847D 5 Bytes JMP 6D9747A2 C:\Windows\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[2876] USER32.dll!MessageBoxIndirectA 7662D4D9 5 Bytes JMP 6D974671 C:\Windows\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[2876] USER32.dll!MessageBoxIndirectW 7662D5D3 5 Bytes JMP 6D974606 C:\Windows\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[2876] USER32.dll!MessageBoxExA 7662D639 5 Bytes JMP 6D9745A4 C:\Windows\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[2876] USER32.dll!MessageBoxExW 7662D65D 5 Bytes JMP 6D974542 C:\Windows\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[2876] USER32.dll!keybd_event 7662D972 5 Bytes JMP 6D975EF7 C:\Windows\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[2876] SHELL32.dll!SHRestricted + D95 75A08988 4 Bytes [4D, 30, 72, 69] {DEC EBP; XOR [EDX+0x69], DH}
.text C:\Program Files\Internet Explorer\iexplore.exe[2876] SHELL32.dll!SHRestricted + D9D 75A08990 8 Bytes [57, 2F, 72, 69, 9C, 5B, 71, ...] {PUSH EDI; DAS ; JB 0x6d; PUSHF ; POP EBX; JNO 0x71}
.text C:\Program Files\Internet Explorer\iexplore.exe[2876] ole32.dll!OleLoadFromStream 756E1E12 5 Bytes JMP 6D974AA7 C:\Windows\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[2876] ole32.dll!CoCreateInstance 75719EA6 5 Bytes JMP 6D87DB20 C:\Windows\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[4068] ntdll.dll!NtProtectVirtualMemory 77014D34 5 Bytes JMP 0049000A
.text C:\Program Files\Internet Explorer\iexplore.exe[4068] ntdll.dll!NtWriteVirtualMemory 77015674 5 Bytes JMP 004A000A
.text C:\Program Files\Internet Explorer\iexplore.exe[4068] ntdll.dll!KiUserExceptionDispatcher 77015DC8 5 Bytes JMP 0048000A
.text C:\Program Files\Internet Explorer\iexplore.exe[4068] USER32.dll!CreateWindowExW 765E1305 5 Bytes JMP 6D87DAC4 C:\Windows\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[4068] USER32.dll!DialogBoxParamW 766010B0 5 Bytes JMP 6D7A5505 C:\Windows\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[4068] USER32.dll!DialogBoxIndirectParamW 76602EF5 5 Bytes JMP 6D97473F C:\Windows\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[4068] USER32.dll!DialogBoxParamA 76618152 5 Bytes JMP 6D9746DC C:\Windows\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[4068] USER32.dll!DialogBoxIndirectParamA 7661847D 5 Bytes JMP 6D9747A2 C:\Windows\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[4068] USER32.dll!MessageBoxIndirectA 7662D4D9 5 Bytes JMP 6D974671 C:\Windows\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[4068] USER32.dll!MessageBoxIndirectW 7662D5D3 5 Bytes JMP 6D974606 C:\Windows\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[4068] USER32.dll!MessageBoxExA 7662D639 5 Bytes JMP 6D9745A4 C:\Windows\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[4068] USER32.dll!MessageBoxExW 7662D65D 5 Bytes JMP 6D974542 C:\Windows\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[4596] ntdll.dll!NtProtectVirtualMemory 77014D34 5 Bytes JMP 018B000A
.text C:\Program Files\Internet Explorer\iexplore.exe[4596] ntdll.dll!NtWriteVirtualMemory 77015674 5 Bytes JMP 018C000A
.text C:\Program Files\Internet Explorer\iexplore.exe[4596] ntdll.dll!KiUserExceptionDispatcher 77015DC8 5 Bytes JMP 0001000A
.text C:\Program Files\Internet Explorer\iexplore.exe[4596] USER32.dll!CreateDialogParamW 765D72A2 5 Bytes JMP 6D87DE50 C:\Windows\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[4596] USER32.dll!GetAsyncKeyState 765D863C 5 Bytes JMP 6D798EF7 C:\Windows\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[4596] USER32.dll!SetWindowsHookExW 765D87AD 5 Bytes JMP 6D879A75 C:\Windows\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[4596] USER32.dll!CallNextHookEx 765D8E3B 5 Bytes JMP 6D86D101 C:\Windows\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[4596] USER32.dll!UnhookWindowsHookEx 765D98DB 5 Bytes JMP 6D7E466E C:\Windows\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[4596] USER32.dll!EnableWindow 765DCD8B 5 Bytes JMP 6D87DCDD C:\Windows\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[4596] USER32.dll!CreateWindowExW 765E1305 5 Bytes JMP 6D87DAC4 C:\Windows\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[4596] USER32.dll!GetKeyState 765E8CB1 5 Bytes JMP 6D87D28B C:\Windows\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[4596] USER32.dll!IsDialogMessageW 765F0745 5 Bytes JMP 6D7A5A17 C:\Windows\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[4596] USER32.dll!CreateDialogParamA 765F17AA 5 Bytes JMP 6D9753AB C:\Windows\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[4596] USER32.dll!IsDialogMessage 765F1847 5 Bytes JMP 6D974C47 C:\Windows\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[4596] USER32.dll!CreateDialogIndirectParamA 765F26F1 5 Bytes JMP 6D9753E2 C:\Windows\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[4596] USER32.dll!CreateDialogIndirectParamW 765F9A62 5 Bytes JMP 6D975419 C:\Windows\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[4596] USER32.dll!SetKeyboardState 76600987 5 Bytes JMP 6D974FB6 C:\Windows\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[4596] USER32.dll!DialogBoxParamW 766010B0 5 Bytes JMP 6D7A5505 C:\Windows\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[4596] USER32.dll!DialogBoxIndirectParamW 76602EF5 5 Bytes JMP 6D97473F C:\Windows\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[4596] USER32.dll!SendInput 76602F75 5 Bytes JMP 6D975B73 C:\Windows\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[4596] USER32.dll!EndDialog 7660326E 5 Bytes JMP 6D7A7EC2 C:\Windows\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[4596] USER32.dll!SetCursorPos 76616FB2 5 Bytes JMP 6D975BC7 C:\Windows\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[4596] USER32.dll!DialogBoxParamA 76618152 5 Bytes JMP 6D9746DC C:\Windows\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[4596] USER32.dll!DialogBoxIndirectParamA 7661847D 5 Bytes JMP 6D9747A2 C:\Windows\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[4596] USER32.dll!MessageBoxIndirectA 7662D4D9 5 Bytes JMP 6D974671 C:\Windows\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[4596] USER32.dll!MessageBoxIndirectW 7662D5D3 5 Bytes JMP 6D974606 C:\Windows\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[4596] USER32.dll!MessageBoxExA 7662D639 5 Bytes JMP 6D9745A4 C:\Windows\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[4596] USER32.dll!MessageBoxExW 7662D65D 5 Bytes JMP 6D974542 C:\Windows\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[4596] USER32.dll!keybd_event 7662D972 5 Bytes JMP 6D975EF7 C:\Windows\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[4596] SHELL32.dll!SHRestricted + D95 75A08988 4 Bytes [4D, 30, 72, 69] {DEC EBP; XOR [EDX+0x69], DH}
.text C:\Program Files\Internet Explorer\iexplore.exe[4596] SHELL32.dll!SHRestricted + D9D 75A08990 8 Bytes [57, 2F, 72, 69, 9C, 5B, 71, ...] {PUSH EDI; DAS ; JB 0x6d; PUSHF ; POP EBX; JNO 0x71}
.text C:\Program Files\Internet Explorer\iexplore.exe[4596] ole32.dll!OleLoadFromStream 756E1E12 5 Bytes JMP 6D974AA7 C:\Windows\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[4596] ole32.dll!CoCreateInstance 75719EA6 5 Bytes JMP 6D87DB20 C:\Windows\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)

---- Files - GMER 1.0.15 ----

File C:\Windows\system32\drivers\volmgr.sys suspicious modification

---- EOF - GMER 1.0.15 ----


#6 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:02:54 AM

Posted 20 April 2010 - 08:17 PM

Well, it did its best but Gmer has given the game away smile.gif


Please run Combofix

Please download ComboFix from one of these locations:* IMPORTANT !!! Save ComboFix.exe to your Desktop making sure you rename it comfix.exe
  • Disable your AntiVirus and AntiSpyware applications, usually via a right click on the System Tray icon. They may otherwise interfere with our tools. (Click on this link to see a list of programs that should be disabled. The list is not all inclusive.)
  • Double click on Combofix.exe & follow the prompts.
  • As part of it's process, ComboFix will check to see if the Microsoft Windows Recovery Console is installed. With malware infections being as they are today, it's strongly recommended to have this pre-installed on your machine before doing any malware removal. It will allow you to boot up into a special recovery/repair mode that will allow us to more easily help you should your computer have a problem after an attempted removal of malware.
  • Follow the prompts to allow ComboFix to download and install the Microsoft Windows Recovery Console, and when prompted, agree to the End-User License Agreement to install the Microsoft Windows Recovery Console.
**Please note: If the Microsoft Windows Recovery Console is already installed, ComboFix will continue it's malware removal procedures.



Once the Microsoft Windows Recovery Console is installed using ComboFix, you should see the following message:



Click on Yes, to continue scanning for malware.

When finished, it shall produce a log for you. Please include the C:\ComboFix.txt in your next reply.
Posted Image
m0le is a proud member of UNITE

#7 Reddons1

Reddons1
  • Topic Starter

  • Members
  • 17 posts
  • OFFLINE
  •  
  • Local time:12:54 PM

Posted 20 April 2010 - 09:52 PM

Sorry that took a long time....


ComboFix 10-04-19.08 - Ken 21/04/2010 11:38:28.1.1 - x86
Microsoft® Windows Vista™ Home Basic 6.0.6002.2.1252.61.1033.18.1015.217 [GMT 10:00]
Running from: c:\users\Ken\Desktop\ComboFix.exe
SP: Lavasoft Ad-Watch Live! *disabled* (Updated) {67844DAE-4F77-4D69-9457-98E8CFFDAA22}
SP: Spybot - Search and Destroy *disabled* (Outdated) {ED588FAF-1B8F-43B4-ACA8-8E3C85DADBE9}
SP: Windows Defender *disabled* (Updated) {D68DDC3A-831F-4FAE-9E44-DA132C1ACF46}
.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.

c:\$recycle.bin\S-1-5-21-2365545147-1999384947-2466353664-500
c:\$recycle.bin\S-1-5-21-3672943283-3746749995-3723665432-500
c:\$recycle.bin\S-1-5-21-771917383-560384130-4287710917-500
c:\users\Ken\AppData\Local\Microsoft\Windows\Temporary Internet Files\1ffw0B.jpg
c:\users\Ken\AppData\Local\Microsoft\Windows\Temporary Internet Files\Oi6T5.jpg
c:\users\Ken\AppData\Local\Microsoft\Windows\Temporary Internet Files\q6imtSK.jpg
c:\users\Ken\AppData\Local\Microsoft\Windows\Temporary Internet Files\uXFHaB.jpg

Infected copy of c:\windows\system32\drivers\volmgr.sys was found and disinfected
Restored copy from - Kitty had a snack tongue.gif
.
((((((((((((((((((((((((( Files Created from 2010-03-21 to 2010-04-21 )))))))))))))))))))))))))))))))
.

2010-04-21 01:56 . 2010-04-21 02:26 -------- d-----w- c:\users\Ken\AppData\Local\temp
2010-04-21 01:56 . 2010-04-21 01:56 -------- d-----w- c:\users\Public\AppData\Local\temp
2010-04-21 01:56 . 2010-04-21 01:56 -------- d-----w- c:\users\Default\AppData\Local\temp
2010-04-17 06:51 . 2010-04-17 06:51 -------- d-----w- c:\program files\Activision
2010-04-16 05:41 . 2010-04-16 05:41 -------- d-----w- c:\users\Ken\AppData\Roaming\Purple Patch Games
2010-04-15 04:19 . 2010-04-15 04:19 -------- d-----w- c:\programdata\WindowsSearch
2010-04-14 23:56 . 2010-04-14 23:56 -------- d-----w- C:\$RECYCLE(0).BIN
2010-04-14 23:49 . 2010-04-19 00:24 -------- d-----w- c:\users\Ken\AppData\Local\temp(98)
2010-04-13 04:32 . 2010-04-13 04:32 -------- d-----w- c:\users\Ken\AppData\Local\Apps
2010-04-13 04:32 . 2010-04-13 04:34 -------- d-----w- c:\users\Ken\AppData\Local\Deployment
2010-04-09 00:47 . 2010-04-09 00:47 -------- d-----w- c:\programdata\IObit
2010-04-07 06:56 . 2010-04-07 07:02 -------- d-----w- c:\users\Ken\AppData\Roaming\Virtual City
2010-04-05 11:56 . 2010-04-05 11:56 -------- d-----w- c:\programdata\Far Mills
2010-03-30 06:20 . 2010-03-30 06:20 -------- d-----w- c:\programdata\Fenomen Games
2010-03-28 00:14 . 2010-03-28 00:14 -------- d-----w- C:\hegames

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2010-04-21 01:35 . 2008-04-23 10:19 680 ----a-w- c:\users\Ken\AppData\Local\d3d9caps.dat
2010-04-20 08:53 . 2008-09-11 07:56 52792 ----a-w- c:\windows\system32\drivers\volmgr.sys
2010-04-20 08:52 . 2009-06-05 00:51 -------- d-----w- c:\programdata\Spybot - Search & Destroy
2010-04-20 08:52 . 2009-06-05 00:51 -------- d-----w- c:\program files\Spybot - Search & Destroy
2010-04-20 08:52 . 2009-11-19 21:46 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
2010-04-19 09:38 . 2008-04-24 01:16 -------- d-----w- c:\programdata\Microsoft Help
2010-04-19 05:52 . 2008-08-30 01:21 -------- d-----w- c:\program files\RealArcade
2010-03-22 23:20 . 2008-06-20 10:18 -------- d-----w- c:\programdata\GameHouse
2010-03-20 10:45 . 2008-04-23 10:20 80064 ----a-w- c:\users\Ken\AppData\Local\GDIPFONTCACHEV1.DAT
2010-03-14 11:34 . 2010-03-14 11:34 -------- d-----w- c:\program files\DivX
2010-03-14 11:34 . 2010-03-14 11:34 -------- d-----w- c:\program files\Common Files\DivX Shared
2010-03-13 21:53 . 2010-01-15 06:58 242696 ----a-w- c:\windows\system32\drivers\avgtdix.sys
2010-03-13 21:53 . 2010-03-13 21:53 12464 ----a-w- c:\windows\system32\avgrsstx.dll
2010-03-13 21:53 . 2010-01-15 06:57 29512 ----a-w- c:\windows\system32\drivers\avgmfx86.sys
2010-03-13 21:52 . 2010-01-15 06:57 216200 ----a-w- c:\windows\system32\drivers\avgldx86.sys
2010-03-10 08:12 . 2006-11-02 11:18 -------- d-----w- c:\program files\Windows Mail
2010-02-23 06:39 . 2010-03-30 21:33 916480 ----a-w- c:\windows\system32\wininet.dll
2010-02-23 06:33 . 2010-03-30 21:33 109056 ----a-w- c:\windows\system32\iesysprep.dll
2010-02-23 06:33 . 2010-03-30 21:33 71680 ----a-w- c:\windows\system32\iesetup.dll
2010-02-23 04:55 . 2010-03-30 21:33 133632 ----a-w- c:\windows\system32\ieUnatt.exe
2010-02-19 23:47 . 2010-02-19 23:47 3604480 ----a-w- c:\windows\system32\GPhotos.scr
2010-02-19 21:14 . 2010-02-19 21:14 95024 ----a-w- c:\windows\system32\drivers\SBREDrv.sys
2010-02-19 21:13 . 2009-07-16 02:22 15880 ----a-w- c:\windows\system32\lsdelete.exe
2010-02-04 15:53 . 2010-02-19 21:14 64288 ----a-w- c:\windows\system32\drivers\Lbd.sys
2010-01-25 12:00 . 2010-02-23 20:15 471552 ----a-w- c:\windows\system32\secproc_isv.dll
2010-01-25 12:00 . 2010-02-23 20:15 152576 ----a-w- c:\windows\system32\secproc_ssp_isv.dll
2010-01-25 12:00 . 2010-02-23 20:15 152064 ----a-w- c:\windows\system32\secproc_ssp.dll
2010-01-25 12:00 . 2010-02-23 20:15 471552 ----a-w- c:\windows\system32\secproc.dll
2010-01-25 11:58 . 2010-02-23 20:15 332288 ----a-w- c:\windows\system32\msdrm.dll
2010-01-25 08:21 . 2010-02-23 20:15 526336 ----a-w- c:\windows\system32\RMActivate_isv.exe
2010-01-25 08:21 . 2010-02-23 20:15 346624 ----a-w- c:\windows\system32\RMActivate_ssp_isv.exe
2010-01-25 08:21 . 2010-02-23 20:15 518144 ----a-w- c:\windows\system32\RMActivate.exe
2010-01-25 08:21 . 2010-02-23 20:15 347136 ----a-w- c:\windows\system32\RMActivate_ssp.exe
2010-01-23 09:26 . 2010-02-23 20:16 2048 ----a-w- c:\windows\system32\tzres.dll
.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\URLSearchHooks]
"{A3BC75A2-1F87-4686-AA43-5347D756017C}"= "c:\program files\AVG\AVG9\Toolbar\IEToolbar.dll" [2009-11-25 1230080]

[HKEY_CLASSES_ROOT\clsid\{a3bc75a2-1f87-4686-aa43-5347d756017c}]

[HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{31c7d459-9cc3-44f2-9dca-fc11795309b4}]
2009-10-01 06:29 2166296 ----a-w- c:\program files\IObitCom\tbIObi.dll

[HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{A3BC75A2-1F87-4686-AA43-5347D756017C}]
2009-11-25 02:01 1230080 ----a-w- c:\program files\AVG\AVG9\Toolbar\IEToolbar.dll

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Toolbar]
"{CCC7A320-B3CA-4199-B1A6-9F516DD69829}"= "c:\program files\AVG\AVG9\Toolbar\IEToolbar.dll" [2009-11-25 1230080]

[HKEY_CLASSES_ROOT\clsid\{ccc7a320-b3ca-4199-b1a6-9f516dd69829}]

[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Toolbar\Webbrowser]
"{CCC7A320-B3CA-4199-B1A6-9F516DD69829}"= "c:\program files\AVG\AVG9\Toolbar\IEToolbar.dll" [2009-11-25 1230080]
"{31C7D459-9CC3-44F2-9DCA-FC11795309B4}"= "c:\program files\IObitCom\tbIObi.dll" [2009-10-01 2166296]

[HKEY_CLASSES_ROOT\clsid\{ccc7a320-b3ca-4199-b1a6-9f516dd69829}]

[HKEY_CLASSES_ROOT\clsid\{31c7d459-9cc3-44f2-9dca-fc11795309b4}]

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"swg"="c:\program files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe" [2009-02-21 39408]
"SpybotSD TeaTimer"="c:\program files\Spybot - Search & Destroy\TeaTimer.exe" [2009-03-05 2260480]
"msnmsgr"="c:\program files\Windows Live\Messenger\msnmsgr.exe" [2009-07-26 3883856]
"IncrediMail"="c:\program files\IncrediMail\bin\IncMail.exe" [2009-05-27 251264]
"Google Update"="c:\users\Ken\AppData\Local\Google\Update\GoogleUpdate.exe" [2008-09-02 133104]
"WMPNSCFG"="c:\program files\Windows Media Player\WMPNSCFG.exe" [2008-01-19 202240]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"Windows Defender"="c:\program files\Windows Defender\MSASCui.exe" [2008-01-19 1008184]
"Symantec PIF AlertEng"="c:\program files\Common Files\Symantec Shared\PIF\{B8E1DD85-8582-4c61-B58F-2F227FCA9A08}\PifSvc.exe" [2008-01-29 583048]
"SunJavaUpdateSched"="c:\program files\Common Files\Java\Java Update\jusched.exe" [2010-01-11 246504]
"SoundMan"="SOUNDMAN.EXE" [2006-03-03 577536]
"Malwarebytes Anti-Malware (reboot)"="c:\program files\Malwarebytes' Anti-Malware\mbam.exe" [2009-09-10 1312080]
"LogitechCommunicationsManager"="c:\program files\Common Files\LogiShrd\LComMgr\Communications_Helper.exe" [2007-02-07 488984]
"LogitechQuickCamRibbon"="c:\program files\Logitech\QuickCam10\QuickCam10.exe" [2007-02-07 774168]

[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run]
"msnmsgr"="c:\program files\Windows Live\Messenger\msnmsgr.exe" [2009-07-26 3883856]

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\system]
"EnableUIADesktopToggle"= 0 (0x0)

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\windows]
"AppInit_DLLs"=c:\windows\System32\avgrsstx.dll

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\Lavasoft Ad-Aware Service]
@="Service"

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\WinDefend]
@="Service"

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring]
"DisableMonitoring"=dword:00000001

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecAntiVirus]
"DisableMonitoring"=dword:00000001

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecFirewall]
"DisableMonitoring"=dword:00000001

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Svc]
"VistaSp2"=hex(cool.gif:0e,1e,c5,41,5a,01,ca,01

R2 gupdate;Google Update Service (gupdate);c:\program files\Google\Update\GoogleUpdate.exe [2010-01-31 135664]
R4 PCPitstop Scheduling;PCPitstop Scheduling;c:\program files\PCPitstop\PCPitstopScheduleService.exe [2009-06-25 85504]
S0 Lbd;Lbd;c:\windows\system32\DRIVERS\Lbd.sys [2010-02-04 64288]
S1 AvgLdx86;AVG Free AVI Loader Driver x86;c:\windows\System32\Drivers\avgldx86.sys [2010-03-13 216200]
S1 AvgTdiX;AVG Free Network Redirector;c:\windows\System32\Drivers\avgtdix.sys [2010-03-13 242696]
S2 avg9emc;AVG Free E-mail Scanner;c:\program files\AVG\AVG9\avgemc.exe [2010-03-13 916760]
S2 avg9wd;AVG Free WatchDog;c:\program files\AVG\AVG9\avgwdsvc.exe [2010-03-13 308064]
S2 Lavasoft Ad-Aware Service;Lavasoft Ad-Aware Service;c:\program files\Lavasoft\Ad-Aware\AAWService.exe [2010-04-05 1265264]
S2 SBSDWSCService;SBSD Security Center Service;c:\program files\Spybot - Search & Destroy\SDWinSec.exe [2009-01-26 1153368]
S3 KeyScrambler;KeyScrambler;c:\windows\system32\drivers\keyscrambler.sys [2008-06-24 113896]


[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\svchost]
LocalServiceNoNetwork REG_MULTI_SZ PLA DPS BFE mpssvc
LocalServiceAndNoImpersonation REG_MULTI_SZ FontCache
.
Contents of the 'Scheduled Tasks' folder

2010-04-21 c:\windows\Tasks\AWC AutoSweep.job
- c:\program files\IObit\Advanced SystemCare 3\AutoSweep.exe [2009-11-03 04:11]

2010-04-21 c:\windows\Tasks\AWC Update.job
- c:\program files\IObit\Advanced SystemCare 3\IObitUpdate.exe [2009-11-03 03:38]

2010-04-21 c:\windows\Tasks\GoogleUpdateTaskMachineCore.job
- c:\program files\Google\Update\GoogleUpdate.exe [2010-01-31 00:14]

2010-04-21 c:\windows\Tasks\GoogleUpdateTaskMachineUA.job
- c:\program files\Google\Update\GoogleUpdate.exe [2010-01-31 00:14]

2010-04-10 c:\windows\Tasks\GoogleUpdateTaskUserS-1-5-21-4287592349-2547934367-1205708605-1000Core.job
- c:\users\Ken\AppData\Local\Google\Update\GoogleUpdate.exe [2008-09-02 23:32]

2010-04-21 c:\windows\Tasks\GoogleUpdateTaskUserS-1-5-21-4287592349-2547934367-1205708605-1000UA.job
- c:\users\Ken\AppData\Local\Google\Update\GoogleUpdate.exe [2008-09-02 23:32]

2010-04-20 c:\windows\Tasks\User_Feed_Synchronization-{8391109C-96B7-4008-BAE7-7FEA8FAC3431}.job
- c:\windows\system32\msfeedssync.exe [2010-03-30 04:54]
.
.
------- Supplementary Scan -------
.
uStart Page = hxxp://mystart.incredimail.com/
IE: Add to Google Photos Screensa&ver - c:\windows\system32\GPhotos.scr/200
IE: Add to Windows &Live Favorites - http://favorites.live.com/quickadd.aspx
IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~2\Office12\EXCEL.EXE/3000
IE: Google Sidewiki... - c:\program files\Google\Google Toolbar\Component\GoogleToolbarDynamic_mui_en_96D6FF0C6D236BF8.dll/cmsidewiki.html
IE: {{FA9B9510-9FCB-4ca0-818C-5D0987B47C4D} - c:\program files\PokerStars.NET\PokerStarsUpdate.exe
DPF: {94E5218F-9737-4FC2-8457-567B1FF23DC0} - hxxp://utilities.pcpitstop.com/Nirvana/controls/DiskMD3Ctrl.dll
.
- - - - ORPHANS REMOVED - - - -

URLSearchHooks-*{31c7d459-9cc3-44f2-9dca-fc11795309b4} - (no file)



**************************************************************************

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2010-04-21 12:26
Windows 6.0.6002 Service Pack 2 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully
hidden files: 0

**************************************************************************

[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\{95808DC4-FA4A-4c74-92FE-5B863F82066B}]
"ImagePath"="\??\c:\program files\CyberLink\PowerDVD\000.fcl"
.
--------------------- LOCKED REGISTRY KEYS ---------------------

[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0000\AllUserSettings]
@Denied: (A) (Users)
@Denied: (A) (Everyone)
@Allowed: (B 1 2 3 4 5) (S-1-5-20)
"BlindDial"=dword:00000000
.
Completion time: 2010-04-21 12:46:03
ComboFix-quarantined-files.txt 2010-04-21 02:43
ComboFix2.txt 2010-04-14 23:57

Pre-Run: 25,795,371,008 bytes free
Post-Run: 25,837,400,064 bytes free

- - End Of File - - 20C10343AF873DA70C3B79C15347A8B3


#8 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:02:54 AM

Posted 21 April 2010 - 03:58 PM

That looks much better. How is the PC running?

Please run the ESET scanner

I'd like us to scan your machine with ESET OnlineScan
  1. Hold down Control and click on the following link to open ESET OnlineScan in a new window.
    ESET OnlineScan
  2. Click the button.
  3. For alternate browsers only: (Microsoft Internet Explorer users can skip these steps)
    1. Click on to download the ESET Smart Installer. Save it to your desktop.
    2. Double click on the icon on your desktop.
  4. Check
  5. Click the button.
  6. Accept any security warnings from your browser.
  7. Check
  8. Push the Start button.
  9. ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this can take some time.
  10. When the scan completes, push
  11. Push , and save the file to your desktop using a unique name, such as ESETScan. Include the contents of this report in your next reply.
  12. Push the button.
  13. Push
NOTE: If no malware is found there will be no option to export the text file as no log will be produced. Let me know if this is the case.
Posted Image
m0le is a proud member of UNITE

#9 Reddons1

Reddons1
  • Topic Starter

  • Members
  • 17 posts
  • OFFLINE
  •  
  • Local time:12:54 PM

Posted 21 April 2010 - 04:16 PM

I have checked 'scan archives' should I uncheck 'remove found threats' or let it do that?


Ken

#10 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:02:54 AM

Posted 21 April 2010 - 05:04 PM

Check "remove found threats"
Posted Image
m0le is a proud member of UNITE

#11 Reddons1

Reddons1
  • Topic Starter

  • Members
  • 17 posts
  • OFFLINE
  •  
  • Local time:12:54 PM

Posted 21 April 2010 - 09:12 PM

Ok first up just let me say thank you very much as you have already fixed a lot (including the original problem) from my computer.

Here is the Eset log....

C:\Qoobox\Quarantine\C\Windows\system32\Drivers\volmgr.sys.vir Win32/Olmarik.XG trojan cleaned - quarantined
C:\Users\Ken\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\AYJQ80UP\news[1].htm HTML/TrojanClicker.Agent.A trojan cleaned by deleting - quarantined
C:\Users\Ken\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\JINJANSZ\data[1].htm JS/Exploit.Agent.NBC trojan cleaned by deleting - quarantined
C:\Users\Ken\Documents\Downloads\captaincooks.exe Win32/PrimeCasino application cleaned by deleting - quarantined



Ken

#12 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:02:54 AM

Posted 22 April 2010 - 06:17 PM

ESET has removed the likely cause of the infection. Are there any more problems?
Posted Image
m0le is a proud member of UNITE

#13 Reddons1

Reddons1
  • Topic Starter

  • Members
  • 17 posts
  • OFFLINE
  •  
  • Local time:12:54 PM

Posted 22 April 2010 - 06:38 PM

No everything seems to be working normal again thanks.

One last question; Should I now remove Combofix from my computer and if so what is the best way to do so as it does not show up on my add/remove list.

Many thanks again for your help.


Ken

#14 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:02:54 AM

Posted 22 April 2010 - 06:59 PM

We will remove Combofix - and a few other things - right now as part of the final instructions

You're clean. Good stuff! thumbup2.gif

Let's do some clearing up

Uninstall ComboFix

Remove Combofix now that we're done with it.
  • Please press the Windows Key and R on your keyboard. This will bring up the Run... command.
    (For Vista/Windows 7 please click Start -> All Programs -> Accessories -> Run)
  • Now type in Combofix /Uninstall in the runbox and click OK. (Notice the space between "Combofix" and "/")
  • Please follow the prompts to uninstall Combofix.
  • You will then receive a message saying Combofix was uninstalled successfully once it's done uninstalling itself.
This will uninstall Combofix and anything associated with it.


Download and Run OTC

We will now remove the tools we used during this fix using OTC.
  • Download OTC by OldTimer and save it to your desktop.
  • Double click icon to start the program. If you are using Vista, please right-click and choose run as administrator
  • Then Click the big button.
  • You will get a prompt saying "Being Cleanup Process". Please select Yes.
  • Restart your computer when prompted.
------------------------------------------------------------------------------------------------------------------------

Here's some advice on how you can keep your PC clean


Update your AntiVirus Software

It is imperative that you update your Antivirus software at least once a week (Even more if you wish). If you do not update your antivirus software then it will not be able to catch any of the new variants that may come out. If you use a commercial antivirus program you must make sure you keep renewing your subscription. Otherwise, once your subscription runs out, you may not be able to update the programs virus definitions.


Make sure your applications have all of their updates

It is also possible for other programs on your computer to have security vulnerability that can allow malware to infect you. Therefore, it is also a good idea to check for the latest versions of commonly installed applications that are regularly patched to fix vulnerabilities. You can check these by visiting Secunia Software Inspector and Calendar of Updates.


Install an AntiSpyware Program

A highly recommended AntiSpyware program is SuperAntiSpyware. You can download the free Home Version. or the Pro version for a 15 day trial period.

Installing this or another recommended program will provide spyware & hijacker protection on your computer alongside your virus protection. You should scan your computer with an AntiSpyware program on a regular basis just as you would an antivirus software.


Finally, here's a treasure trove of antivirus, antimalware and antispyware resources


That's it Reddons1, happy surfing!

Cheers.

m0le
Posted Image
m0le is a proud member of UNITE

#15 Reddons1

Reddons1
  • Topic Starter

  • Members
  • 17 posts
  • OFFLINE
  •  
  • Local time:12:54 PM

Posted 23 April 2010 - 01:54 AM

Many thanks m0le and to all at Bleeping...


Ken




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users