Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

YourProtection/Trojan/Java/Redirect/Popup Saga


  • This topic is locked This topic is locked
17 replies to this topic

#1 kylezo

kylezo

  • Members
  • 57 posts
  • OFFLINE
  •  
  • Local time:07:41 PM

Posted 16 April 2010 - 02:29 AM

Hey folks,
Got a bit of a YourProtection infection (can't remember the more common variant name atm) that I was sure I got rid of, and I think what I have now may be unrelated...in any case, here is the story:

(edit: Terribly sorry, but I forgot to mention I'm running an HP laptop with Windows XP Pro SP3.)

I run both MalwareByte's Ant-Malware and Avira Antivir Premium Security Suite. Downloaded and ran a compromised program using SandboxIE, which apparently is vastly inferior to VMs for this kind of testing...suffice to say it had no trouble getting into my system. I immediately started experiencing redirects so I ran MalwareBytes and Avira scans, and I think they removed something. Restarted and the problem started getting worse, i.e. couldn't run either MB or Avira anymore. So I boot into safe mode, run scans and clean the results up. MB found something and cleaned it and Avira found nothing so at this point I'm convinced foolishly that I > malware. I start into normal modce and the problem is seemingly gone, until I get another redirect or popup or something. At this point I begin running scans again and downloading the diagnostics from the sticky here (DDS and gmer). Forgot to mention I ran TDSSKILLER and rkill with the Myprotect issue. Anyways, at this point I'm looking through processes running ProcessExplorer, and I see that lsass.exe is running at 50% cpu and avguard.exe is running at the other 50%. This is about halfway through the GMER process. So GMER took about 3 hours to complete, and It never actually finished. It was crawling because of the CPU battle I assume. So I ran the diagnostics in safe mode, did more scans and removals, until both safe mode and normal mode scans showed nothing out of the ordinary. Then I get on the internet again and more popups and redirects. Apparently MB and Avira aren't all they are cracked up to be... So, I attempt to run GMER again to get a satisfactory log out of it ( I got good DDS logs finally). Well, GMER, as usual at this point, runs for about 10 minutes just fine but at some point lsass starts acting up. This time, by some miracle, it was able to finish and I got a completed log. Also forgot to mention that at many points during this adventure I was unable to turn off my computer by logging off/shut down because of CPU usage from lsass. Safe mode has been free of problems, however. So I'm now at my wits end and need a power greater than myself to intervene. I noticed one of the detections from MB or Avira was Java related, another Trojan. At this point they are detecting nothing.

My sincerest thanks for all the time you folks put in here...such a fantastic service! I tried to take care of everything myself to lighten the volutneer workload as it were but...I've reached my comfortable limits, lol.

Here is my DDS log, DDS.txt. Attached are the other DDS attach.tcx and GMER's ark.txt. Let me know what else you need!

==========================================

DDS (Ver_10-03-17.01) - NTFSx86
Run by Administrator at 22:41:13.07 on Thu 04/15/2010
Internet Explorer: 7.0.5730.13
Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.3036.2569 [GMT -7:00]

AV: AntiVir Desktop *On-access scanning disabled* (Updated) {11638345-E4FC-4BEE-BB73-EC754659C5F6}

============== Running Processes ===============

C:\Program Files\Avira\AntiVir Desktop\avguard.exe
C:\Program Files\Avira\AntiVir Desktop\avshadow.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\system32\svchost -k DcomLaunch
svchost.exe
C:\WINDOWS\System32\svchost.exe -k netsvcs
C:\WINDOWS\system32\Ati2evxx.exe
svchost.exe
C:\Program Files\Avira\AntiVir Desktop\sched.exe
C:\Program Files\Intel\Intel Matrix Storage Manager\IAANTMon.exe
C:\Program Files\Sandboxie\SbieSvc.exe
C:\WINDOWS\system32\svchost.exe -k imgsvc
C:\WINDOWS\Explorer.EXE
svchost.exe
C:\Program Files\Intel\Intel Matrix Storage Manager\iaanotif.exe
C:\Program Files\Synaptics\SynTP\SynTPEnh.exe
C:\Program Files\Avira\AntiVir Desktop\avgnt.exe
C:\Program Files\Analog Devices\Core\smax4pnp.exe
C:\Program Files\HostsMan\hostssrv.exe
C:\WINDOWS\system32\taskmgr.exe
c:\program files\avira\antivir desktop\avcenter.exe
C:\WINDOWS\System32\vssvc.exe
C:\WINDOWS\system32\dllhost.exe
C:\WINDOWS\system32\dllhost.exe
C:\Documents and Settings\Administrator\Desktop\dds.scr

============== Pseudo HJT Report ===============

uStart Page = about:blank
uDefault_Page_URL = hxxp://ie.redirect.hp.com/svs/rdr?TYPE=3&tp=iehome&locale=en_us&c=83&bd=all&pf=cmnb
uInternet Connection Wizard,ShellNext = hxxp://ie.redirect.hp.com/svs/rdr?TYPE=3&tp=iehome&locale=en_us&c=83&bd=all&pf=cmnb
BHO: Java™ Plug-In 2 SSV Helper: {dbc80044-a445-435b-bc74-9c25c1c588a9} - c:\program files\java\jre6\bin\jp2ssv.dll
BHO: JQSIEStartDetectorImpl Class: {e7e6f031-17ce-4c07-bc86-eabfe594f69c} - c:\program files\java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll
uRun: [HostsServer] "c:\program files\hostsman\hostssrv.exe" --start
mRun: [MsmqIntCert] regsvr32 /s mqrt.dll
mRun: [IAAnotif] c:\program files\intel\intel matrix storage manager\iaanotif.exe
mRun: [SynTPEnh] c:\program files\synaptics\syntp\SynTPEnh.exe
mRun: [Cpqset] c:\program files\hewlett-packard\default settings\cpqset.exe
mRun: [IMJPMIG8.1] "c:\windows\ime\imjp8_1\IMJPMIG.EXE" /Spoil /RemAdvDef /Migration32
mRun: [PHIME2002ASync] c:\windows\system32\ime\tintlgnt\TINTSETP.EXE /SYNC
mRun: [PHIME2002A] c:\windows\system32\ime\tintlgnt\TINTSETP.EXE /IMEName
mRun: [SoundMAX] c:\program files\analog devices\soundmax\Smax4.exe /tray
mRun: [SunJavaUpdateSched] "c:\program files\java\jre6\bin\jusched.exe"
mRun: [KernelFaultCheck] %systemroot%\system32\dumprep 0 -k
mRun: [AtiPTA] atiptaxx.exe
mRun: [avgnt] "c:\program files\avira\antivir desktop\avgnt.exe" /min
mRun: [SoundMAXPnP] c:\program files\analog devices\core\smax4pnp.exe
uPolicies-explorer: MaxRecentDocs = 20 (0x14)
IE: Add to Google Photos Screensa&ver - c:\windows\system32\GPhotos.scr/200
IE: E&xport to Microsoft Excel - c:\progra~1\micros~2\office12\EXCEL.EXE/3000
IE: {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe
IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe
DPF: {0CCA191D-13A6-4E29-B746-314DEE697D83} - hxxp://upload.facebook.com/controls/2008.10.10_v5.5.8/FacebookPhotoUploader5.cab
DPF: {1239CC52-59EF-4DFA-8C61-90FFA846DF7E} - hxxp://www.musicnotes.com/download/mnviewer.cab
DPF: {140E4DF8-9E14-4A34-9577-C77561ED7883} - hxxp://content.systemrequirementslab.com.s3.amazonaws.com/global/bin/srldetect_cyri_4.1.72.0.cab
DPF: {49232000-16E4-426C-A231-62846947304B} - hxxps://wimpro.cce.hp.com/ChatEntry/downloads/sysinfo.cab
DPF: {7530BFB8-7293-4D34-9923-61A11451AFC5} - hxxp://download.eset.com/special/eos/OnlineScanner.cab
DPF: {8100D56A-5661-482C-BEE8-AFECE305D968} - hxxp://upload.facebook.com/controls/2009.07.28_v5.5.8.1/FacebookPhotoUploader55.cab
DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_12-windows-i586.cab
DPF: {A8F2B9BD-A6A0-486A-9744-18920D898429} - hxxp://www.sibelius.com/download/software/win/ActiveXPlugin.cab
DPF: {CAFEEFAC-0016-0000-0012-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_12-windows-i586.cab
DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_12-windows-i586.cab
DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} - hxxp://fpdownload2.macromedia.com/get/shockwave/cabs/flash/swflash.cab
Notify: AtiExtEvent - Ati2evxx.dll
mASetup: {469072DA-4AE2-2A7C-25B0-D4C9D2A4EE00} - c:\windows\system32\sys32.dll.exe

============= SERVICES / DRIVERS ===============

R0 SFAUDIO;Sonic Focus DSP Driver;c:\windows\system32\drivers\sfaudio.sys [2008-3-28 24064]
R1 avgio;avgio;c:\program files\avira\antivir desktop\avgio.sys [2009-3-19 11608]
R2 AntiVirSchedulerService;Avira AntiVir Scheduler;c:\program files\avira\antivir desktop\sched.exe [2009-3-19 135336]
R2 AntiVirService;Avira AntiVir Guard;c:\program files\avira\antivir desktop\avguard.exe [2009-3-19 267432]
R2 avgntflt;avgntflt;c:\windows\system32\drivers\avgntflt.sys [2009-3-19 60936]
R3 e1yexpress;Intel® Gigabit Network Connections Driver;c:\windows\system32\drivers\e1y5132.sys [2008-9-26 244368]
R3 IFXTPM;IFXTPM;c:\windows\system32\drivers\ifxtpm.sys [2007-4-4 41216]
R3 SbieDrv;SbieDrv;c:\program files\sandboxie\SbieDrv.sys [2010-4-13 117480]
S0 jgarkfsi;jgarkfsi;c:\windows\system32\drivers\slcp.sys --> c:\windows\system32\drivers\slcp.sys [?]
S0 vsyla;vsyla;c:\windows\system32\drivers\ifjj.sys --> c:\windows\system32\drivers\ifjj.sys [?]
S3 ggflt;SEMC USB Flash Driver Filter;c:\windows\system32\drivers\ggflt.sys [2008-5-31 13352]
S3 NRKCTL32;NRKCTL32;\??\c:\program files\wcpuid\nrkctl32.sys --> c:\program files\wcpuid\NRKCTL32.SYS [?]
S3 rismc32;RICOH Smart Card Reader;c:\windows\system32\drivers\rismc32.sys [2008-9-26 47616]
S3 USB44LDR;M-Audio USB MIDISPORT 4x4 Loader;c:\windows\system32\drivers\usb44ldr.sys [2009-11-13 23080]
S4 AntiVirMailService;Avira AntiVir MailGuard;c:\program files\avira\antivir desktop\avmailc.exe [2009-3-19 337064]
S4 AntiVirWebService;Avira AntiVir WebGuard;c:\program files\avira\antivir desktop\avwebgrd.exe [2009-3-19 405672]
S4 ATSwpWDF;AuthenTec TruePrint USB WDF Driver;c:\windows\system32\drivers\ATSwpWDF.sys [2008-5-15 475520]

=============== Created Last 30 ================

2010-04-15 20:45:16 79432 ----a-w- c:\windows\system32\drivers\avfwim.sys
2010-04-15 20:45:16 102856 ----a-w- c:\windows\system32\drivers\avfwot.sys
2010-04-14 01:26:24 507904 ----a-w- c:\windows\system32\sys32.dll.exe
2010-04-12 07:37:54 0 d-----w- c:\docume~1\admini~1\applic~1\Avira
2010-04-10 23:23:51 0 d-----w- c:\docume~1\admini~1\applic~1\TeamViewer
2010-04-10 23:23:39 0 d-----w- c:\program files\TeamViewer
2010-04-10 20:39:28 0 d-----w- c:\program files\Copy (11) of Diablo II
2010-04-10 20:35:28 0 d-----w- c:\program files\Copy (10) of Diablo II
2010-04-10 20:29:37 0 d-----w- c:\program files\Copy (9) of Diablo II
2010-04-10 20:23:11 0 d-----w- c:\program files\Copy (8) of Diablo II
2010-04-10 04:20:23 0 ----a-w- c:\documents and settings\administrator\yes
2010-04-09 07:49:59 0 d-----w- c:\program files\SocksCapV2
2010-04-09 07:49:07 299520 ----a-w- c:\windows\uninst.exe
2010-04-09 07:48:54 0 d-----w- c:\documents and settings\administrator\WINDOWS
2010-04-09 02:14:16 0 d-----w- c:\program files\Copy (7) of Diablo II
2010-04-09 02:03:49 0 d-----w- c:\program files\Copy (6) of Diablo II
2010-04-09 01:54:19 0 d-----w- c:\program files\Copy (5) of Diablo II
2010-04-09 01:27:37 0 d-----w- c:\program files\Copy (4) of Diablo II
2010-04-08 11:05:03 0 d-----w- c:\docume~1\admini~1\applic~1\Malwarebytes
2010-04-08 11:04:40 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2010-04-08 11:04:39 0 d-----w- c:\docume~1\alluse~1\applic~1\Malwarebytes
2010-04-08 11:04:38 20824 ----a-w- c:\windows\system32\drivers\mbam.sys
2010-04-08 11:04:38 0 d-----w- c:\program files\Malwarebytes' Anti-Malware
2010-04-08 09:32:13 1170 ----a-w- c:\docume~1\alluse~1\applic~1\_VOIDmfeklnmal.dll
2010-04-08 09:14:19 0 d-----w- c:\program files\ESET
2010-03-31 10:04:46 0 ----a-w- c:\documents and settings\administrator\and
2010-03-30 04:19:56 0 ----a-w- c:\documents and settings\administrator\GV
2010-03-19 12:37:13 0 d-----w- c:\program files\SystemRequirementsLab

==================== Find3M ====================

2010-04-16 00:34:34 36352 ----a-w- c:\windows\system32\drivers\disk.sys
2010-04-16 00:34:34 36352 ----a-w- c:\windows\system32\dllcache\disk.sys
2010-04-12 07:24:44 60936 ----a-w- c:\windows\system32\drivers\avgntflt.sys
2010-04-10 20:46:14 40861 ----a-w- c:\windows\DIIUnin.dat
2010-04-06 02:38:38 60008 ---ha-w- c:\windows\system32\mlfcache.dat
2010-03-20 01:05:50 4874240 ----a-w- c:\windows\system32\dllcache\wmp.dll
2010-03-10 13:18:21 13824 ------w- c:\windows\system32\dllcache\ieudinit.exe
2010-03-10 13:18:20 70656 ----a-w- c:\windows\system32\dllcache\ie4uinit.exe
2010-03-09 11:09:18 430080 ----a-w- c:\windows\system32\vbscript.dll
2010-03-09 11:09:18 430080 ----a-w- c:\windows\system32\dllcache\vbscript.dll
2010-02-24 13:11:07 455680 ----a-w- c:\windows\system32\drivers\mrxsmb.sys
2010-02-24 13:11:07 455680 ----a-w- c:\windows\system32\dllcache\mrxsmb.sys
2010-02-23 05:20:02 634648 ----a-w- c:\windows\system32\dllcache\iexplore.exe
2010-02-23 05:18:28 161792 ----a-w- c:\windows\system32\dllcache\ieakui.dll
2010-02-17 16:10:28 2189952 ----a-w- c:\windows\system32\dllcache\ntoskrnl.exe
2010-02-16 14:08:49 2146304 ----a-w- c:\windows\system32\ntoskrnl.exe
2010-02-16 14:08:49 2146304 ----a-w- c:\windows\system32\dllcache\ntkrnlmp.exe
2010-02-16 13:25:04 2066816 ----a-w- c:\windows\system32\dllcache\ntkrnlpa.exe
2010-02-16 13:25:04 2024448 ----a-w- c:\windows\system32\ntkrnlpa.exe
2010-02-16 13:25:04 2024448 ----a-w- c:\windows\system32\dllcache\ntkrpamp.exe
2010-02-12 04:33:11 100864 ----a-w- c:\windows\system32\dllcache\6to4svc.dll
2010-02-12 04:33:11 100864 ----a-w- c:\windows\system32\6to4svc.dll
2010-02-11 12:02:15 226880 ----a-w- c:\windows\system32\dllcache\tcpip6.sys

============= FINISH: 22:43:30.17 ===============

Attached Files


Edited by kylezo, 16 April 2010 - 02:35 AM.


BC AdBot (Login to Remove)

 


#2 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:02:41 AM

Posted 19 April 2010 - 07:46 PM

Hi,

Welcome to Bleeping Computer. My name is m0le and I will be helping you with your log.
  • Please subscribe to this topic, if you haven't already. You can subscribe by clicking the Options box to the right of your topic title and selecting Track This Topic.

  • Please avoid installing/uninstalling or updating any programs and attempting any unsupervised fixes or scans. This can make helping you impossible.

  • Please reply to this post so I know you are there.
The forum is busy and we need to have replies as soon as possible. If I haven't had a reply after 3 days I will bump the topic and if you do not reply by the following day after that then I will close the topic.

Once I receive a reply then I will return with your first instructions.

Thanks thumbup2.gif
Posted Image
m0le is a proud member of UNITE

#3 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:02:41 AM

Posted 19 April 2010 - 07:49 PM

Hi,

Welcome to Bleeping Computer. My name is m0le and I will be helping you with your log.
  • Please subscribe to this topic, if you haven't already. You can subscribe by clicking the Options box to the right of your topic title and selecting Track This Topic.

  • Please avoid installing/uninstalling or updating any programs and attempting any unsupervised fixes or scans. This can make helping you impossible.

  • Please reply to this post so I know you are there.
The forum is busy and we need to have replies as soon as possible. If I haven't had a reply after 3 days I will bump the topic and if you do not reply by the following day after that then I will close the topic.

Once I receive a reply then I will return with your first instructions.

Thanks thumbup2.gif
Posted Image
m0le is a proud member of UNITE

#4 kylezo

kylezo
  • Topic Starter

  • Members
  • 57 posts
  • OFFLINE
  •  
  • Local time:07:41 PM

Posted 19 April 2010 - 09:15 PM

Hey thanks for the reply m0le. Iam ready and waitin, let me know what you need from me!

#5 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:02:41 AM

Posted 20 April 2010 - 12:59 PM

Okay, you have the TDL3 rootkit which modifies system files. We need to replace one of these

Please download SystemLook from one of the links below and save it to your Desktop.
Download Mirror #1
Download Mirror #2
  • Double-click SystemLook.exe to run it.
  • Copy the content of the following codebox into the main textfield:
    CODE
    :filefind
    disk.sys

  • Click the Look button to start the scan.
  • When finished, a notepad window will open with the results of the scan. Please post this log in your next reply.
Note: The log can also be found on your Desktop entitled SystemLook.txt
Posted Image
m0le is a proud member of UNITE

#6 kylezo

kylezo
  • Topic Starter

  • Members
  • 57 posts
  • OFFLINE
  •  
  • Local time:07:41 PM

Posted 20 April 2010 - 05:25 PM

Thanks m0le, I knew somethin was up with iAstor... =S

SystemLook v1.0 by jpshortstuff (11.01.10)
Log created at 15:21 on 20/04/2010 by Administrator (Administrator - Elevation successful)

========== filefind ==========

Searching for "disk.sys"
C:\WINDOWS\$NtServicePackUninstall$\disk.sys -----c 36352 bytes [08:49 27/02/2009] [08:00 04/08/2004] 00CA44E4534865F8A3B64F7C0984BFF0
C:\WINDOWS\ServicePackFiles\i386\disk.sys -----c 36352 bytes [08:42 27/02/2009] [18:40 13/04/2008] 044452051F3E02E7963599FC8F4F3E25
C:\WINDOWS\system32\dllcache\disk.sys --a--- 36352 bytes [08:00 04/08/2004] [07:33 19/04/2010] 044452051F3E02E7963599FC8F4F3E25
C:\WINDOWS\system32\drivers\disk.sys --a--- 36352 bytes [08:00 04/08/2004] [21:58 20/04/2010] 044452051F3E02E7963599FC8F4F3E25

-=End Of File=-

#7 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:02:41 AM

Posted 20 April 2010 - 05:59 PM

Just heard that Combofix might now be able to move it straight away. Let's check that.

Please download ComboFix from one of these locations:* IMPORTANT !!! Save ComboFix.exe to your Desktop making sure you rename it comfix.exe
  • Disable your AntiVirus and AntiSpyware applications, usually via a right click on the System Tray icon. They may otherwise interfere with our tools. (Click on this link to see a list of programs that should be disabled. The list is not all inclusive.)
  • Double click on Combofix.exe & follow the prompts.
  • As part of it's process, ComboFix will check to see if the Microsoft Windows Recovery Console is installed. With malware infections being as they are today, it's strongly recommended to have this pre-installed on your machine before doing any malware removal. It will allow you to boot up into a special recovery/repair mode that will allow us to more easily help you should your computer have a problem after an attempted removal of malware.
  • Follow the prompts to allow ComboFix to download and install the Microsoft Windows Recovery Console, and when prompted, agree to the End-User License Agreement to install the Microsoft Windows Recovery Console.
**Please note: If the Microsoft Windows Recovery Console is already installed, ComboFix will continue it's malware removal procedures.



Once the Microsoft Windows Recovery Console is installed using ComboFix, you should see the following message:



Click on Yes, to continue scanning for malware.

When finished, it shall produce a log for you. Please include the C:\ComboFix.txt in your next reply.
Posted Image
m0le is a proud member of UNITE

#8 kylezo

kylezo
  • Topic Starter

  • Members
  • 57 posts
  • OFFLINE
  •  
  • Local time:07:41 PM

Posted 20 April 2010 - 07:54 PM

Ran succesfully... heres the log:

ComboFix 10-04-19.08 - Administrator 04/20/2010 17:11:15.1.2 - x86
Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.3036.2634 [GMT -7:00]
Running from: c:\documents and settings\Administrator\Desktop\ComFix.exe
AV: AntiVir Desktop *On-access scanning disabled* (Updated) {11638345-E4FC-4BEE-BB73-EC754659C5F6}
FW: Avira FireWall *disabled* {11638345-E4FC-4BEE-BB73-EC754659C5F6}
.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.

c:\documents and settings\Administrator\Local Settings\Application Data\ave.exe
c:\documents and settings\All Users\Application Data\_VOIDmfeklnmal.dll
c:\documents and settings\NetworkService\Local Settings\Application Data\ave.exe
c:\recycler\S-1-5-21-1708537768-602609370-725345543-500
c:\recycler\S-1-5-21-317033925-353495288-542102242-500
c:\windows\system32\out.txt

Infected copy of c:\windows\system32\drivers\disk.sys was found and disinfected
Restored copy from - Kitty had a snack tongue.gif
.
((((((((((((((((((((((((( Files Created from 2010-03-21 to 2010-04-21 )))))))))))))))))))))))))))))))
.

2010-04-16 20:46 . 2010-04-20 22:11 664 ----a-w- c:\windows\system32\d3d9caps.dat
2010-04-15 20:45 . 2010-04-15 20:44 79432 ----a-w- c:\windows\system32\drivers\avfwim.sys
2010-04-15 20:45 . 2010-04-12 07:24 102856 ----a-w- c:\windows\system32\drivers\avfwot.sys
2010-04-12 07:37 . 2010-04-12 07:37 -------- d-----w- c:\documents and settings\Administrator\Application Data\Avira
2010-04-10 23:23 . 2010-04-10 23:23 -------- d-----w- c:\documents and settings\Administrator\Application Data\TeamViewer
2010-04-10 23:23 . 2010-04-10 23:23 -------- d-----w- c:\program files\TeamViewer
2010-04-10 20:39 . 2010-04-10 20:41 -------- d-----w- c:\program files\Copy (11) of Diablo II
2010-04-10 20:35 . 2010-04-10 20:37 -------- d-----w- c:\program files\Copy (10) of Diablo II
2010-04-10 20:29 . 2010-04-10 20:31 -------- d-----w- c:\program files\Copy (9) of Diablo II
2010-04-10 20:23 . 2010-04-10 20:25 -------- d-----w- c:\program files\Copy (8) of Diablo II
2010-04-09 07:49 . 2010-04-09 07:49 -------- d-----w- c:\program files\SocksCapV2
2010-04-09 07:49 . 1998-02-07 05:37 299520 ----a-w- c:\windows\uninst.exe
2010-04-09 07:48 . 2010-04-09 07:48 -------- d-----w- c:\documents and settings\Administrator\WINDOWS
2010-04-09 02:14 . 2010-04-09 02:17 -------- d-----w- c:\program files\Copy (7) of Diablo II
2010-04-09 02:03 . 2010-04-10 20:15 -------- d-----w- c:\program files\Copy (6) of Diablo II
2010-04-09 01:54 . 2010-04-09 07:57 -------- d-----w- c:\program files\Copy (5) of Diablo II
2010-04-09 01:27 . 2010-04-10 22:21 -------- d-----w- c:\program files\Copy (4) of Diablo II
2010-04-08 11:05 . 2010-04-08 11:05 -------- d-----w- c:\documents and settings\Administrator\Application Data\Malwarebytes
2010-04-08 11:04 . 2010-03-30 07:46 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2010-04-08 11:04 . 2010-04-08 11:04 -------- d-----w- c:\documents and settings\All Users\Application Data\Malwarebytes
2010-04-08 11:04 . 2010-04-17 07:46 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
2010-04-08 11:04 . 2010-03-30 07:45 20824 ----a-w- c:\windows\system32\drivers\mbam.sys
2010-04-08 09:14 . 2010-04-08 09:14 -------- d-----w- c:\program files\ESET

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2010-04-20 23:07 . 2009-02-27 23:59 -------- d-----w- c:\documents and settings\Administrator\Application Data\uTorrent
2010-04-20 21:58 . 2004-08-04 08:00 36352 ----a-w- c:\windows\system32\drivers\disk.sys
2010-04-19 09:08 . 2009-10-09 06:40 -------- d-----w- c:\documents and settings\Administrator\Application Data\dvdcss
2010-04-19 02:39 . 2009-02-28 02:13 -------- d-----w- c:\documents and settings\Administrator\Application Data\mIRC
2010-04-19 00:15 . 2009-02-28 04:54 -------- d-----w- c:\program files\Diablo II
2010-04-19 00:13 . 2009-02-28 02:13 -------- d-----w- c:\program files\mIRC
2010-04-17 18:07 . 2008-09-26 16:55 318488 ----a-w- c:\windows\system32\drivers\iaStor.sys
2010-04-15 22:08 . 2008-09-26 17:05 -------- d-----w- c:\program files\Hewlett-Packard
2010-04-14 07:29 . 2009-02-28 01:49 -------- d-----w- c:\program files\Sandboxie
2010-04-13 21:00 . 2009-02-27 21:45 -------- d-----w- c:\program files\uTorrent
2010-04-12 07:28 . 2009-03-19 22:57 -------- d-----w- c:\documents and settings\All Users\Application Data\Avira
2010-04-12 07:24 . 2009-03-19 22:57 124784 ----a-w- c:\windows\system32\drivers\avipbb.sys
2010-04-12 07:24 . 2009-03-19 22:57 22360 ----a-w- c:\windows\system32\drivers\avgntmgr.sys
2010-04-12 07:24 . 2009-03-19 22:57 60936 ----a-w- c:\windows\system32\drivers\avgntflt.sys
2010-04-12 07:24 . 2009-03-19 22:57 51992 ----a-w- c:\windows\system32\drivers\avgntdd.sys
2010-04-10 23:55 . 2009-05-11 09:16 -------- d-----w- c:\program files\World of Warcraft
2010-04-10 20:46 . 2009-02-28 05:07 40861 ----a-w- c:\windows\DIIUnin.dat
2010-04-06 02:38 . 2009-03-18 06:33 60008 ---ha-w- c:\windows\system32\mlfcache.dat
2010-04-05 13:16 . 2008-09-26 17:05 -------- d--h--w- c:\program files\InstallShield Installation Information
2010-04-05 12:56 . 2009-02-27 23:52 -------- d-----w- c:\program files\CCleaner
2010-03-26 22:00 . 2009-02-27 21:29 -------- d-----w- c:\program files\Copy of Diablo II
2010-03-19 12:37 . 2010-03-19 12:37 -------- d-----w- c:\program files\SystemRequirementsLab
2010-03-14 10:33 . 2009-02-28 13:00 -------- d---a-w- c:\documents and settings\All Users\Application Data\TEMP
2010-03-14 09:25 . 2009-03-03 09:33 -------- d-----w- c:\program files\Riva FLV Encoder 2.0
2010-03-14 05:17 . 2009-02-28 13:01 -------- d-----w- c:\documents and settings\Administrator\Application Data\MyPhoneExplorer
2010-03-11 12:38 . 2004-08-04 08:00 832512 ----a-w- c:\windows\system32\wininet.dll
2010-03-11 12:38 . 2004-08-04 08:00 78336 ----a-w- c:\windows\system32\ieencode.dll
2010-03-11 12:38 . 2004-08-04 08:00 17408 ----a-w- c:\windows\system32\corpol.dll
2010-03-09 11:09 . 2004-08-04 08:00 430080 ----a-w- c:\windows\system32\vbscript.dll
2010-02-27 00:56 . 2010-02-27 00:56 -------- d-----w- c:\program files\Sibelius Software
2010-02-24 13:11 . 2004-08-04 08:00 455680 ----a-w- c:\windows\system32\drivers\mrxsmb.sys
2010-02-16 14:08 . 2004-08-04 08:00 2146304 ----a-w- c:\windows\system32\ntoskrnl.exe
2010-02-16 13:25 . 2004-08-04 08:00 2024448 ----a-w- c:\windows\system32\ntkrnlpa.exe
2010-02-12 04:33 . 2004-08-04 08:00 100864 ----a-w- c:\windows\system32\6to4svc.dll
2010-02-11 12:02 . 2004-08-04 08:00 226880 ----a-w- c:\windows\system32\drivers\tcpip6.sys
.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"HostsServer"="c:\program files\HostsMan\hostssrv.exe" [2007-12-22 1462272]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"MsmqIntCert"="mqrt.dll" [2008-04-14 177152]
"IAAnotif"="c:\program files\Intel\Intel Matrix Storage Manager\iaanotif.exe" [2008-06-20 178712]
"SynTPEnh"="c:\program files\Synaptics\SynTP\SynTPEnh.exe" [2008-03-27 1040384]
"Cpqset"="c:\program files\Hewlett-Packard\Default Settings\cpqset.exe" [2008-05-14 61440]
"IMJPMIG8.1"="c:\windows\IME\imjp8_1\IMJPMIG.EXE" [2004-08-04 208952]
"PHIME2002ASync"="c:\windows\system32\IME\TINTLGNT\TINTSETP.EXE" [2004-08-04 455168]
"PHIME2002A"="c:\windows\system32\IME\TINTLGNT\TINTSETP.EXE" [2004-08-04 455168]
"SunJavaUpdateSched"="c:\program files\Java\jre6\bin\jusched.exe" [2009-02-28 148888]
"avgnt"="c:\program files\Avira\AntiVir Desktop\avgnt.exe" [2010-04-12 282792]
"SoundMAXPnP"="c:\program files\Analog Devices\Core\smax4pnp.exe" [2008-12-11 1044480]

[HKEY_CURRENT_USER\software\microsoft\windows\currentversion\policies\explorer]
"MaxRecentDocs"= 20 (0x14)

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\DiskeeperSystray]
2005-04-30 23:34 196696 ----a-w- c:\program files\Executive Software\Diskeeper\DkIcon.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\services]
"Diskeeper"=2 (0x2)

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run-]
"DiskeeperSystray"="c:\program files\Executive Software\Diskeeper\DkIcon.exe"
"hpWirelessAssistant"=c:\program files\Hewlett-Packard\HP Wireless Assistant\HPWAMain.exe

[HKEY_LOCAL_MACHINE\software\microsoft\security center]
"AntiVirusOverride"=dword:00000001
"FirewallOverride"=dword:00000001

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]
"EnableFirewall"= 0 (0x0)
"DisableNotifications"= 1 (0x1)

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=
"c:\\WINDOWS\\system32\\mqsvc.exe"=
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"c:\\Program Files\\Ventrilo\\Ventrilo.exe"=
"c:\\Program Files\\uTorrent\\uTorrent.exe"=
"c:\\Program Files\\KCeasy\\giFT\\giFTl.exe"=
"c:\\Program Files\\TeamViewer\\Version5\\TeamViewer.exe"=

R0 SFAUDIO;Sonic Focus DSP Driver;c:\windows\system32\drivers\sfaudio.sys [3/28/2008 3:14 AM 24064]
R1 avfwot;avfwot;c:\windows\system32\drivers\avfwot.sys [4/15/2010 1:45 PM 102856]
R2 AntiVirFirewallService;Avira FireWall;c:\program files\Avira\AntiVir Desktop\avfwsvc.exe [4/12/2010 12:27 AM 536232]
R2 AntiVirSchedulerService;Avira AntiVir Scheduler;c:\program files\Avira\AntiVir Desktop\sched.exe [3/19/2009 3:57 PM 135336]
R2 AntiVirWebService;Avira AntiVir WebGuard;c:\program files\Avira\AntiVir Desktop\avwebgrd.exe [3/19/2009 3:57 PM 405672]
R3 avfwim;AvFw Packet Filter Miniport;c:\windows\system32\drivers\avfwim.sys [4/15/2010 1:45 PM 79432]
R3 e1yexpress;Intel® Gigabit Network Connections Driver;c:\windows\system32\drivers\e1y5132.sys [9/26/2008 9:55 AM 244368]
R3 IFXTPM;IFXTPM;c:\windows\system32\drivers\ifxtpm.sys [4/4/2007 12:16 PM 41216]
S0 jgarkfsi;jgarkfsi;c:\windows\system32\drivers\slcp.sys --> c:\windows\system32\drivers\slcp.sys [?]
S0 vsyla;vsyla;c:\windows\system32\drivers\ifjj.sys --> c:\windows\system32\drivers\ifjj.sys [?]
S3 ggflt;SEMC USB Flash Driver Filter;c:\windows\system32\drivers\ggflt.sys [5/31/2008 1:36 AM 13352]
S3 NRKCTL32;NRKCTL32;\??\c:\program files\WCPUID\NRKCTL32.SYS --> c:\program files\WCPUID\NRKCTL32.SYS [?]
S3 rismc32;RICOH Smart Card Reader;c:\windows\system32\drivers\rismc32.sys [9/26/2008 9:55 AM 47616]
S3 USB44LDR;M-Audio USB MIDISPORT 4x4 Loader;c:\windows\system32\drivers\usb44ldr.sys [11/13/2009 1:01 AM 23080]
S4 AntiVirMailService;Avira AntiVir MailGuard;c:\program files\Avira\AntiVir Desktop\avmailc.exe [3/19/2009 3:57 PM 337064]
S4 ATSwpWDF;AuthenTec TruePrint USB WDF Driver;c:\windows\system32\drivers\ATSwpWDF.sys [5/15/2008 1:29 PM 475520]
.
.
------- Supplementary Scan -------
.
uStart Page = about:blank
uInternet Connection Wizard,ShellNext = hxxp://ie.redirect.hp.com/svs/rdr?TYPE=3&tp=iehome&locale=en_us&c=83&bd=all&pf=cmnb
IE: Add to Google Photos Screensa&ver - c:\windows\system32\GPhotos.scr/200
IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~2\Office12\EXCEL.EXE/3000
LSP: c:\program files\Avira\AntiVir Desktop\avsda.dll
DPF: {140E4DF8-9E14-4A34-9577-C77561ED7883} - hxxp://content.systemrequirementslab.com.s3.amazonaws.com/global/bin/srldetect_cyri_4.1.72.0.cab
.
- - - - ORPHANS REMOVED - - - -

HKLM-Run-AtiPTA - atiptaxx.exe
SafeBoot-klmdb.sys
ActiveSetup-{469072DA-4AE2-2A7C-25B0-D4C9D2A4EE00} - c:\windows\system32\sys32.dll.exe
AddRemove-2kv4.8.442 - c:\windows\Radeon Omega Drivers v4.8.442
AddRemove-{379BD39E-F13E-458F-96D8-56BD7F2CC516} - c:\program files\InstallShield Installation Information\{379BD39E-F13E-458F-96D8-56BD7F2CC516}\setup.exe



**************************************************************************

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2010-04-20 17:45
Windows 5.1.2600 Service Pack 3 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

HKLM\Software\Microsoft\Windows\CurrentVersion\Run
Cpqset = c:\program files\Hewlett-Packard\Default Settings\cpqset.exe???????????????????????|?M?|?????M?|??@

scanning hidden files ...

scan completed successfully
hidden files: 0

**************************************************************************
.
--------------------- LOCKED REGISTRY KEYS ---------------------

[HKEY_USERS\S-1-5-21-1401790243-2608130014-3592314082-500\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved\{39806F38-079A-CF19-4DA5-A9A7CE4DFD47}*]
@Allowed: (Read) (RestrictedCode)
@Allowed: (Read) (RestrictedCode)

[HKEY_USERS\S-1-5-21-1401790243-2608130014-3592314082-500\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved\{9E2ED9A7-3F07-4A90-C547-417F70939C38}*]
@Allowed: (Read) (RestrictedCode)
@Allowed: (Read) (RestrictedCode)
.
--------------------- DLLs Loaded Under Running Processes ---------------------

- - - - - - - > 'winlogon.exe'(1384)
c:\windows\system32\Ati2evxx.dll
.
Completion time: 2010-04-20 17:51:22
ComboFix-quarantined-files.txt 2010-04-21 00:51

Pre-Run: 73,525,022,720 bytes free
Post-Run: 74,026,070,016 bytes free

WindowsXP-KB310994-SP2-Pro-BootDisk-ENU.exe
[boot loader]
timeout=2
default=multi(0)disk(0)rdisk(0)partition(1)\WINDOWS
[operating systems]
c:\cmdcons\BOOTSECT.DAT="Microsoft Windows Recovery Console" /cmdcons
multi(0)disk(0)rdisk(0)partition(1)\WINDOWS="Microsoft Windows XP Professional" /noexecute=optin /fastdetect

- - End Of File - - 6DCA06EED204C095A693DC20FAC822F9


#9 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:02:41 AM

Posted 20 April 2010 - 08:15 PM

Back to Combofix for another run at the remaining malware

1. Close any open browsers.

2. Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.

3. Open notepad and copy/paste the text in the quotebox below into it:

QUOTE
File::
c:\windows\system32\drivers\slcp.sys
c:\windows\system32\drivers\ifjj.sys

Driver::
jgarkfsi
vsyla


Save this as CFScript.txt, in the same location as ComboFix.exe




Refering to the picture above, drag CFScript into ComboFix.exe

When finished, it shall produce a log for you at C:\ComboFix.txt which I will require in your next reply.
Posted Image
m0le is a proud member of UNITE

#10 kylezo

kylezo
  • Topic Starter

  • Members
  • 57 posts
  • OFFLINE
  •  
  • Local time:07:41 PM

Posted 20 April 2010 - 10:31 PM

a smooth excecution, Although I would make a note that my antivirus had no system tray icon when my computer had restred from the last cf run,, and I at first assumed that maybe combofix disabled it by default or something, but it then alreted me that the guard was still running. Luckily i was still able to access the control center from shortcuts. Anyways, here's the new log:

ComboFix 10-04-19.08 - Administrator 04/20/2010 19:50:08.2.2 - x86
Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.3036.2563 [GMT -7:00]
Running from: c:\documents and settings\Administrator\Desktop\ComFix.exe
Command switches used :: c:\documents and settings\Administrator\Desktop\cfscript.txt
AV: AntiVir Desktop *On-access scanning disabled* (Updated) {11638345-E4FC-4BEE-BB73-EC754659C5F6}
FW: Avira FireWall *disabled* {11638345-E4FC-4BEE-BB73-EC754659C5F6}

FILE ::
"c:\windows\system32\drivers\ifjj.sys"
"c:\windows\system32\drivers\slcp.sys"
.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.

.
((((((((((((((((((((((((((((((((((((((( Drivers/Services )))))))))))))))))))))))))))))))))))))))))))))))))
.

-------\Service_jgarkfsi
-------\Service_vsyla


((((((((((((((((((((((((( Files Created from 2010-03-21 to 2010-04-21 )))))))))))))))))))))))))))))))
.

2010-04-16 20:46 . 2010-04-20 22:11 664 ----a-w- c:\windows\system32\d3d9caps.dat
2010-04-15 20:45 . 2010-04-15 20:44 79432 ----a-w- c:\windows\system32\drivers\avfwim.sys
2010-04-15 20:45 . 2010-04-12 07:24 102856 ----a-w- c:\windows\system32\drivers\avfwot.sys
2010-04-12 07:37 . 2010-04-12 07:37 -------- d-----w- c:\documents and settings\Administrator\Application Data\Avira
2010-04-10 23:23 . 2010-04-10 23:23 -------- d-----w- c:\documents and settings\Administrator\Application Data\TeamViewer
2010-04-10 23:23 . 2010-04-10 23:23 -------- d-----w- c:\program files\TeamViewer
2010-04-10 20:39 . 2010-04-10 20:41 -------- d-----w- c:\program files\Copy (11) of Diablo II
2010-04-10 20:35 . 2010-04-10 20:37 -------- d-----w- c:\program files\Copy (10) of Diablo II
2010-04-10 20:29 . 2010-04-10 20:31 -------- d-----w- c:\program files\Copy (9) of Diablo II
2010-04-10 20:23 . 2010-04-10 20:25 -------- d-----w- c:\program files\Copy (8) of Diablo II
2010-04-09 07:49 . 2010-04-09 07:49 -------- d-----w- c:\program files\SocksCapV2
2010-04-09 07:49 . 1998-02-07 05:37 299520 ----a-w- c:\windows\uninst.exe
2010-04-09 07:48 . 2010-04-09 07:48 -------- d-----w- c:\documents and settings\Administrator\WINDOWS
2010-04-09 02:14 . 2010-04-09 02:17 -------- d-----w- c:\program files\Copy (7) of Diablo II
2010-04-09 02:03 . 2010-04-10 20:15 -------- d-----w- c:\program files\Copy (6) of Diablo II
2010-04-09 01:54 . 2010-04-09 07:57 -------- d-----w- c:\program files\Copy (5) of Diablo II
2010-04-09 01:27 . 2010-04-10 22:21 -------- d-----w- c:\program files\Copy (4) of Diablo II
2010-04-08 11:05 . 2010-04-08 11:05 -------- d-----w- c:\documents and settings\Administrator\Application Data\Malwarebytes
2010-04-08 11:04 . 2010-03-30 07:46 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2010-04-08 11:04 . 2010-04-08 11:04 -------- d-----w- c:\documents and settings\All Users\Application Data\Malwarebytes
2010-04-08 11:04 . 2010-04-17 07:46 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
2010-04-08 11:04 . 2010-03-30 07:45 20824 ----a-w- c:\windows\system32\drivers\mbam.sys
2010-04-08 09:14 . 2010-04-08 09:14 -------- d-----w- c:\program files\ESET

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2010-04-21 02:39 . 2009-02-27 23:59 -------- d-----w- c:\documents and settings\Administrator\Application Data\uTorrent
2010-04-20 21:58 . 2004-08-04 08:00 36352 ----a-w- c:\windows\system32\drivers\disk.sys
2010-04-19 09:08 . 2009-10-09 06:40 -------- d-----w- c:\documents and settings\Administrator\Application Data\dvdcss
2010-04-19 02:39 . 2009-02-28 02:13 -------- d-----w- c:\documents and settings\Administrator\Application Data\mIRC
2010-04-19 00:15 . 2009-02-28 04:54 -------- d-----w- c:\program files\Diablo II
2010-04-19 00:13 . 2009-02-28 02:13 -------- d-----w- c:\program files\mIRC
2010-04-17 18:07 . 2008-09-26 16:55 318488 ----a-w- c:\windows\system32\drivers\iaStor.sys
2010-04-15 22:08 . 2008-09-26 17:05 -------- d-----w- c:\program files\Hewlett-Packard
2010-04-14 07:29 . 2009-02-28 01:49 -------- d-----w- c:\program files\Sandboxie
2010-04-13 21:00 . 2009-02-27 21:45 -------- d-----w- c:\program files\uTorrent
2010-04-12 07:28 . 2009-03-19 22:57 -------- d-----w- c:\documents and settings\All Users\Application Data\Avira
2010-04-12 07:24 . 2009-03-19 22:57 124784 ----a-w- c:\windows\system32\drivers\avipbb.sys
2010-04-12 07:24 . 2009-03-19 22:57 22360 ----a-w- c:\windows\system32\drivers\avgntmgr.sys
2010-04-12 07:24 . 2009-03-19 22:57 60936 ----a-w- c:\windows\system32\drivers\avgntflt.sys
2010-04-12 07:24 . 2009-03-19 22:57 51992 ----a-w- c:\windows\system32\drivers\avgntdd.sys
2010-04-10 23:55 . 2009-05-11 09:16 -------- d-----w- c:\program files\World of Warcraft
2010-04-10 20:46 . 2009-02-28 05:07 40861 ----a-w- c:\windows\DIIUnin.dat
2010-04-06 02:38 . 2009-03-18 06:33 60008 ---ha-w- c:\windows\system32\mlfcache.dat
2010-04-05 13:16 . 2008-09-26 17:05 -------- d--h--w- c:\program files\InstallShield Installation Information
2010-04-05 12:56 . 2009-02-27 23:52 -------- d-----w- c:\program files\CCleaner
2010-03-26 22:00 . 2009-02-27 21:29 -------- d-----w- c:\program files\Copy of Diablo II
2010-03-19 12:37 . 2010-03-19 12:37 -------- d-----w- c:\program files\SystemRequirementsLab
2010-03-14 10:33 . 2009-02-28 13:00 -------- d---a-w- c:\documents and settings\All Users\Application Data\TEMP
2010-03-14 09:25 . 2009-03-03 09:33 -------- d-----w- c:\program files\Riva FLV Encoder 2.0
2010-03-14 05:17 . 2009-02-28 13:01 -------- d-----w- c:\documents and settings\Administrator\Application Data\MyPhoneExplorer
2010-03-11 12:38 . 2004-08-04 08:00 832512 ----a-w- c:\windows\system32\wininet.dll
2010-03-11 12:38 . 2004-08-04 08:00 78336 ----a-w- c:\windows\system32\ieencode.dll
2010-03-11 12:38 . 2004-08-04 08:00 17408 ----a-w- c:\windows\system32\corpol.dll
2010-03-09 11:09 . 2004-08-04 08:00 430080 ----a-w- c:\windows\system32\vbscript.dll
2010-02-27 00:56 . 2010-02-27 00:56 -------- d-----w- c:\program files\Sibelius Software
2010-02-24 13:11 . 2004-08-04 08:00 455680 ----a-w- c:\windows\system32\drivers\mrxsmb.sys
2010-02-16 14:08 . 2004-08-04 08:00 2146304 ----a-w- c:\windows\system32\ntoskrnl.exe
2010-02-16 13:25 . 2004-08-04 08:00 2024448 ----a-w- c:\windows\system32\ntkrnlpa.exe
2010-02-12 04:33 . 2004-08-04 08:00 100864 ----a-w- c:\windows\system32\6to4svc.dll
2010-02-11 12:02 . 2004-08-04 08:00 226880 ----a-w- c:\windows\system32\drivers\tcpip6.sys
.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"HostsServer"="c:\program files\HostsMan\hostssrv.exe" [2007-12-22 1462272]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"MsmqIntCert"="mqrt.dll" [2008-04-14 177152]
"IAAnotif"="c:\program files\Intel\Intel Matrix Storage Manager\iaanotif.exe" [2008-06-20 178712]
"SynTPEnh"="c:\program files\Synaptics\SynTP\SynTPEnh.exe" [2008-03-27 1040384]
"Cpqset"="c:\program files\Hewlett-Packard\Default Settings\cpqset.exe" [2008-05-14 61440]
"IMJPMIG8.1"="c:\windows\IME\imjp8_1\IMJPMIG.EXE" [2004-08-04 208952]
"PHIME2002ASync"="c:\windows\system32\IME\TINTLGNT\TINTSETP.EXE" [2004-08-04 455168]
"PHIME2002A"="c:\windows\system32\IME\TINTLGNT\TINTSETP.EXE" [2004-08-04 455168]
"SunJavaUpdateSched"="c:\program files\Java\jre6\bin\jusched.exe" [2009-02-28 148888]
"avgnt"="c:\program files\Avira\AntiVir Desktop\avgnt.exe" [2010-04-12 282792]
"SoundMAXPnP"="c:\program files\Analog Devices\Core\smax4pnp.exe" [2008-12-11 1044480]

[HKEY_CURRENT_USER\software\microsoft\windows\currentversion\policies\explorer]
"MaxRecentDocs"= 20 (0x14)

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\DiskeeperSystray]
2005-04-30 23:34 196696 ----a-w- c:\program files\Executive Software\Diskeeper\DkIcon.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\services]
"Diskeeper"=2 (0x2)

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run-]
"DiskeeperSystray"="c:\program files\Executive Software\Diskeeper\DkIcon.exe"
"hpWirelessAssistant"=c:\program files\Hewlett-Packard\HP Wireless Assistant\HPWAMain.exe

[HKEY_LOCAL_MACHINE\software\microsoft\security center]
"AntiVirusOverride"=dword:00000001
"FirewallOverride"=dword:00000001

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]
"EnableFirewall"= 0 (0x0)
"DisableNotifications"= 1 (0x1)

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=
"c:\\WINDOWS\\system32\\mqsvc.exe"=
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"c:\\Program Files\\Ventrilo\\Ventrilo.exe"=
"c:\\Program Files\\uTorrent\\uTorrent.exe"=
"c:\\Program Files\\KCeasy\\giFT\\giFTl.exe"=
"c:\\Program Files\\TeamViewer\\Version5\\TeamViewer.exe"=

R0 SFAUDIO;Sonic Focus DSP Driver;c:\windows\system32\drivers\sfaudio.sys [3/28/2008 3:14 AM 24064]
R1 avfwot;avfwot;c:\windows\system32\drivers\avfwot.sys [4/15/2010 1:45 PM 102856]
R2 AntiVirFirewallService;Avira FireWall;c:\program files\Avira\AntiVir Desktop\avfwsvc.exe [4/12/2010 12:27 AM 536232]
R2 AntiVirSchedulerService;Avira AntiVir Scheduler;c:\program files\Avira\AntiVir Desktop\sched.exe [3/19/2009 3:57 PM 135336]
R2 AntiVirWebService;Avira AntiVir WebGuard;c:\program files\Avira\AntiVir Desktop\avwebgrd.exe [3/19/2009 3:57 PM 405672]
R3 avfwim;AvFw Packet Filter Miniport;c:\windows\system32\drivers\avfwim.sys [4/15/2010 1:45 PM 79432]
R3 e1yexpress;Intel® Gigabit Network Connections Driver;c:\windows\system32\drivers\e1y5132.sys [9/26/2008 9:55 AM 244368]
R3 IFXTPM;IFXTPM;c:\windows\system32\drivers\ifxtpm.sys [4/4/2007 12:16 PM 41216]
S3 ggflt;SEMC USB Flash Driver Filter;c:\windows\system32\drivers\ggflt.sys [5/31/2008 1:36 AM 13352]
S3 NRKCTL32;NRKCTL32;\??\c:\program files\WCPUID\NRKCTL32.SYS --> c:\program files\WCPUID\NRKCTL32.SYS [?]
S3 rismc32;RICOH Smart Card Reader;c:\windows\system32\drivers\rismc32.sys [9/26/2008 9:55 AM 47616]
S3 USB44LDR;M-Audio USB MIDISPORT 4x4 Loader;c:\windows\system32\drivers\usb44ldr.sys [11/13/2009 1:01 AM 23080]
S4 AntiVirMailService;Avira AntiVir MailGuard;c:\program files\Avira\AntiVir Desktop\avmailc.exe [3/19/2009 3:57 PM 337064]
S4 ATSwpWDF;AuthenTec TruePrint USB WDF Driver;c:\windows\system32\drivers\ATSwpWDF.sys [5/15/2008 1:29 PM 475520]
.
.
------- Supplementary Scan -------
.
uStart Page = about:blank
uInternet Connection Wizard,ShellNext = hxxp://ie.redirect.hp.com/svs/rdr?TYPE=3&tp=iehome&locale=en_us&c=83&bd=all&pf=cmnb
IE: Add to Google Photos Screensa&ver - c:\windows\system32\GPhotos.scr/200
IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~2\Office12\EXCEL.EXE/3000
LSP: c:\program files\Avira\AntiVir Desktop\avsda.dll
DPF: {140E4DF8-9E14-4A34-9577-C77561ED7883} - hxxp://content.systemrequirementslab.com.s3.amazonaws.com/global/bin/srldetect_cyri_4.1.72.0.cab
.

**************************************************************************

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2010-04-20 20:23
Windows 5.1.2600 Service Pack 3 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

HKLM\Software\Microsoft\Windows\CurrentVersion\Run
Cpqset = c:\program files\Hewlett-Packard\Default Settings\cpqset.exe???????????????????????|?M?|?????M?|??@

scanning hidden files ...

scan completed successfully
hidden files: 0

**************************************************************************
.
--------------------- LOCKED REGISTRY KEYS ---------------------

[HKEY_USERS\S-1-5-21-1401790243-2608130014-3592314082-500\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved\{39806F38-079A-CF19-4DA5-A9A7CE4DFD47}*]
@Allowed: (Read) (RestrictedCode)
@Allowed: (Read) (RestrictedCode)

[HKEY_USERS\S-1-5-21-1401790243-2608130014-3592314082-500\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved\{9E2ED9A7-3F07-4A90-C547-417F70939C38}*]
@Allowed: (Read) (RestrictedCode)
@Allowed: (Read) (RestrictedCode)
.
--------------------- DLLs Loaded Under Running Processes ---------------------

- - - - - - - > 'winlogon.exe'(1384)
c:\windows\system32\Ati2evxx.dll

- - - - - - - > 'explorer.exe'(2628)
c:\windows\system32\WININET.dll
c:\program files\ESTsoft\ALSong\asBand.dll
c:\windows\system32\ieframe.dll
.
------------------------ Other Running Processes ------------------------
.
c:\program files\Avira\AntiVir Desktop\avguard.exe
c:\program files\Avira\AntiVir Desktop\avshadow.exe
c:\windows\system32\Ati2evxx.exe
c:\windows\system32\Ati2evxx.exe
c:\program files\Intel\Intel Matrix Storage Manager\IAANTMon.exe
c:\program files\Sandboxie\SbieSvc.exe
c:\program files\Avira\AntiVir Desktop\checkt.exe
.
**************************************************************************
.
Completion time: 2010-04-20 20:28:49 - machine was rebooted
ComboFix-quarantined-files.txt 2010-04-21 03:28
ComboFix2.txt 2010-04-21 00:51

Pre-Run: 74,044,768,256 bytes free
Post-Run: 73,950,629,888 bytes free

- - End Of File - - 8CA373B83BD5DF3AA81901E906E6ED42

PS. of course I am a novice at reading logs but I was wondering if you could explain to me or give me a link to read more about this rootkit. I see that these gibberish services/drivers showed up in the logs with no timestamps and look suspicious enough as it is, but what do they do?? I'm curious. So if you happen to have spare time or a convenient link, let me know, but otherwise I understand how swamped you guys are recently here. A LOT of google redirects stuff going around, and I was experiencing this bahavior too, which I thought odd because I think the file I downloaded was older malware. maybe it wasn't so old as I thought. Also interesting about this is that I used TDSSkiller with my initial YourProtection problem, and thena gain along with rkill with this stuff but it neverquite seemed to root out the trootkit, pardon the pun.It's quite insteresting to me so I'll read around for more info. Thanks alot for your help so far!

PPS. oooo envermind I found this great thread that seems to have some good info in it... <3 this site!

Edited by kylezo, 20 April 2010 - 10:51 PM.


#11 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:02:41 AM

Posted 21 April 2010 - 01:51 PM

Clear-up time. Just to check for any remnants please go online and scan using ESET's tool

I'd like us to scan your machine with ESET OnlineScan
  1. Hold down Control and click on the following link to open ESET OnlineScan in a new window.
    ESET OnlineScan
  2. Click the button.
  3. For alternate browsers only: (Microsoft Internet Explorer users can skip these steps)
    1. Click on to download the ESET Smart Installer. Save it to your desktop.
    2. Double click on the icon on your desktop.
  4. Check
  5. Click the button.
  6. Accept any security warnings from your browser.
  7. Check
  8. Push the Start button.
  9. ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this can take some time.
  10. When the scan completes, push
  11. Push , and save the file to your desktop using a unique name, such as ESETScan. Include the contents of this report in your next reply.
  12. Push the button.
  13. Push
NOTE: If no malware is found there will be no option to export the text file as no log will be produced. Let me know if this is the case.
Posted Image
m0le is a proud member of UNITE

#12 kylezo

kylezo
  • Topic Starter

  • Members
  • 57 posts
  • OFFLINE
  •  
  • Local time:07:41 PM

Posted 21 April 2010 - 05:51 PM

C:\Documents and Settings\Administrator\Application Data\Sun\Java\Deployment\cache\6.0\58\371addfa-4eafb04d Java/TrojanDownloader.Agent.NAM trojan deleted - quarantined
C:\Qoobox\Quarantine\C\Documents and Settings\Administrator\Local Settings\Application Data\ave.exe.vir a variant of Win32/Kryptik.DSA trojan cleaned by deleting - quarantined
C:\Qoobox\Quarantine\C\Documents and Settings\NetworkService\Local Settings\Application Data\ave.exe.vir a variant of Win32/Kryptik.DVP trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{A80475B6-CF6D-4B3A-BD21-B16C67DB5304}\RP264\A0091509.exe a variant of Win32/Kryptik.DSW trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{A80475B6-CF6D-4B3A-BD21-B16C67DB5304}\RP267\A0094616.exe a variant of Win32/Kryptik.DSA trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{A80475B6-CF6D-4B3A-BD21-B16C67DB5304}\RP267\A0094618.exe a variant of Win32/Kryptik.DVP trojan cleaned by deleting - quarantined


#13 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:02:41 AM

Posted 21 April 2010 - 06:50 PM

That's a nice log right there thumbup.gif

You're clean. Good stuff! thumbup2.gif

Let's do some clearing up

Uninstall ComboFix

Remove Combofix now that we're done with it.
  • Please press the Windows Key and R on your keyboard. This will bring up the Run... command.
    (For Vista/Windows 7 please click Start -> All Programs -> Accessories -> Run)
  • Now type in Combofix /Uninstall in the runbox and click OK. (Notice the space between "Combofix" and "/")
  • Please follow the prompts to uninstall Combofix.
  • You will then receive a message saying Combofix was uninstalled successfully once it's done uninstalling itself.
This will uninstall Combofix and anything associated with it.


Download and Run OTC

We will now remove the tools we used during this fix using OTC.
  • Download OTC by OldTimer and save it to your desktop.
  • Double click icon to start the program. If you are using Vista, please right-click and choose run as administrator
  • Then Click the big button.
  • You will get a prompt saying "Being Cleanup Process". Please select Yes.
  • Restart your computer when prompted.
------------------------------------------------------------------------------------------------------------------------

Here's some advice on how you can keep your PC clean


Update your AntiVirus Software

It is imperative that you update your Antivirus software at least once a week (Even more if you wish). If you do not update your antivirus software then it will not be able to catch any of the new variants that may come out. If you use a commercial antivirus program you must make sure you keep renewing your subscription. Otherwise, once your subscription runs out, you may not be able to update the programs virus definitions.


Make sure your applications have all of their updates

It is also possible for other programs on your computer to have security vulnerability that can allow malware to infect you. Therefore, it is also a good idea to check for the latest versions of commonly installed applications that are regularly patched to fix vulnerabilities. You can check these by visiting Secunia Software Inspector and Calendar of Updates.


Install an AntiSpyware Program

A highly recommended AntiSpyware program is SuperAntiSpyware. You can download the free Home Version. or the Pro version for a 15 day trial period.

Installing this or another recommended program will provide spyware & hijacker protection on your computer alongside your virus protection. You should scan your computer with an AntiSpyware program on a regular basis just as you would an antivirus software.


Finally, here's a treasure trove of antivirus, antimalware and antispyware resources


That's it kylezo, happy surfing!

Cheers.

m0le
Posted Image
m0le is a proud member of UNITE

#14 kylezo

kylezo
  • Topic Starter

  • Members
  • 57 posts
  • OFFLINE
  •  
  • Local time:07:41 PM

Posted 21 April 2010 - 07:23 PM

I wasnt able to mention in my last post because I had to get a new keyboard, lol, but overnight my avira picked up a trojan activity of some sort in the restore area of the system files...

Virus or unwanted program 'TR/Patched.Gen [trojan]'
detected in file 'C:\System Volume Information\_restore{A80475B6-CF6D-4B3A-BD21-B16C67DB5304}\RP267\A0094562.sys.
Action performed: Deny access

Not detected in the eset scan later,

detected in file 'C:\System Volume Information\_restore{A80475B6-CF6D-4B3A-BD21-B16C67DB5304}\RP267\A0092604.exe.
Action performed: Deny access

Nor was this,

Virus or unwanted program 'TR/Patched.Gen [trojan]'
detected in file 'C:\System Volume Information\_restore{A80475B6-CF6D-4B3A-BD21-B16C67DB5304}\RP267\A0092605.sys.
Action performed: Deny access

Nor this. It also give me this lovely warning:

Virus or unwanted program 'TR/Patched.Gen [trojan]'
detected in file 'C:\Qoobox\Quarantine\C\WINDOWS\system32\Drivers\disk.sys.vir.
Action performed: Deny access

And when I ried to click "more info" to see the file locations and then overwrite and delete them, the scanner module popped up but never ran, and its been hanging ever since then in the background. I'm afraid to restart my computer for fear of the dropper unpacking again in my HDD driver, lol. And I cant close the scanner module becasue its a protected process (suppose I shoudl be relieved? lol). Please advise? =S

And THANK YOU for all your help so far...and the reading I've done on TLD3 has explained clearly to me why MBAM and avira never picked it up..pesky little bugger, aint it...

#15 kylezo

kylezo
  • Topic Starter

  • Members
  • 57 posts
  • OFFLINE
  •  
  • Local time:07:41 PM

Posted 22 April 2010 - 02:26 AM

Ok i bit the bullet and restarted since avscan.exe was at constant 50% cpue...just like the good ol days >.< When myh computer came to, there was another detection by Avira in system volume information which I overwrote&deleted using avira...I'm just going to follow alll you isntructions on cleanup and post new logs or anything if yo want.

The file 'C:\System Volume Information\_restore{A80475B6-CF6D-4B3A-BD21-B16C67DB5304}\RP267\A0092604.exe'
contained a virus or unwanted program 'TR/PCK.Katusha.J.1883' [trojan]
Action(s) taken:
The file was moved to the quarantine directory under the name '4a255403.qua'.




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users