Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Redirect Malware


  • This topic is locked This topic is locked
11 replies to this topic

#1 sonardude

sonardude

  • Members
  • 5 posts
  • OFFLINE
  •  
  • Local time:12:46 AM

Posted 11 May 2010 - 07:45 AM

Hi,
We had an XP machine which got some sort of redirecting search virus in IE. Google Chrome would boot but never display a site.
We ran the ComboFix and am attaching the log. Please help...

ComboFix 10-05-10.03 - Jeff 05/11/2010 7:58.1.2 - x86
Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.502.246 [GMT -4:00]
Running from: c:\documents and settings\Jeff\Desktop\ComboFix.exe
AV: Total Protection Service *On-access scanning disabled* (Updated) {8C354827-2F54-4E28-90DC-AD391E77808C}
* Resident AV is active

.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.

c:\windows\system32\ialmuARA.dll
c:\windows\system32\ialmuARB.dll
c:\windows\system32\ialmuCHS.dll
c:\windows\system32\ialmuCHT.dll
c:\windows\system32\ialmuCSY.dll
c:\windows\system32\ialmuDAN.dll
c:\windows\system32\ialmuDEU.dll
c:\windows\system32\ialmudlg.exe
c:\windows\system32\ialmuELL.dll
c:\windows\system32\ialmuENG.dll
c:\windows\system32\ialmuESP.dll
c:\windows\system32\ialmuFIN.dll
c:\windows\system32\ialmuFRA.dll
c:\windows\system32\ialmuFRC.dll
c:\windows\system32\ialmuHEB.dll
c:\windows\system32\ialmuHUN.dll
c:\windows\system32\ialmuITA.dll
c:\windows\system32\ialmuJPN.dll
c:\windows\system32\ialmuKOR.dll
c:\windows\system32\ialmuNLD.dll
c:\windows\system32\ialmuNOR.dll
c:\windows\system32\ialmuPLK.dll
c:\windows\system32\ialmuPTB.dll
c:\windows\system32\ialmuPTG.dll
c:\windows\system32\ialmuRUS.dll
c:\windows\system32\ialmuSVE.dll
c:\windows\system32\ialmuTHA.dll
c:\windows\system32\ialmuTRK.dll
c:\windows\system32\igfxrara.lrc
c:\windows\system32\igfxrchs.lrc
c:\windows\system32\igfxrcht.lrc
c:\windows\system32\igfxrcsy.lrc
c:\windows\system32\igfxrdan.lrc
c:\windows\system32\igfxrdeu.lrc
c:\windows\system32\igfxrell.lrc
c:\windows\system32\igfxrenu.lrc
c:\windows\system32\igfxresp.lrc
c:\windows\system32\igfxrfin.lrc
c:\windows\system32\igfxrfra.lrc
c:\windows\system32\igfxrheb.lrc
c:\windows\system32\igfxrhun.lrc
c:\windows\system32\igfxrita.lrc
c:\windows\system32\igfxrjpn.lrc
c:\windows\system32\igfxrkor.lrc
c:\windows\system32\igfxrnld.lrc
c:\windows\system32\igfxrnor.lrc
c:\windows\system32\igfxrplk.lrc
c:\windows\system32\igfxrptb.lrc
c:\windows\system32\igfxrptg.lrc
c:\windows\system32\igfxrrus.lrc
c:\windows\system32\igfxrsve.lrc
c:\windows\system32\igfxrtha.lrc
c:\windows\system32\igfxrtrk.lrc

Infected copy of c:\windows\system32\drivers\pciide.sys was found and disinfected
Restored copy from - Kitty had a snack tongue.gif
.
((((((((((((((((((((((((( Files Created from 2010-04-11 to 2010-05-11 )))))))))))))))))))))))))))))))
.

2010-05-10 19:04 . 2010-05-10 19:04 -------- d-sh--w- c:\documents and settings\Administrator\IETldCache
2010-05-10 18:58 . 2010-05-10 19:04 15944 ----a-w- c:\windows\system32\drivers\hitmanpro35.sys
2010-05-10 18:58 . 2010-05-10 18:58 -------- d-----w- c:\documents and settings\All Users\Application Data\Hitman Pro
2010-05-10 18:58 . 2010-05-10 18:58 -------- d-----w- c:\program files\Hitman Pro 3.5
2010-05-10 16:43 . 2010-05-10 16:43 -------- d-----w- c:\documents and settings\Jeff\Application Data\Malwarebytes
2010-05-10 16:43 . 2010-04-29 19:39 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2010-05-10 16:43 . 2010-05-10 16:43 -------- d-----w- c:\documents and settings\All Users\Application Data\Malwarebytes
2010-05-10 16:42 . 2010-04-29 19:39 20952 ----a-w- c:\windows\system32\drivers\mbam.sys
2010-05-10 16:42 . 2010-05-10 17:33 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
2010-05-10 14:26 . 2010-05-10 17:37 -------- dc----w- c:\windows\system32\DRVSTORE
2010-05-10 14:26 . 2010-05-10 14:26 95024 ----a-w- c:\windows\system32\drivers\SBREDrv.sys
2010-05-10 14:16 . 2010-05-10 17:37 -------- d-----w- c:\program files\Lavasoft
2010-05-10 14:16 . 2010-05-10 17:37 -------- d-----w- c:\documents and settings\All Users\Application Data\Lavasoft
2010-05-10 13:38 . 2010-05-10 13:38 -------- d-----w- c:\program files\AVG
2010-05-05 13:56 . 2010-05-05 13:56 -------- d-sh--w- c:\documents and settings\NetworkService\UserData
2010-05-04 20:27 . 2010-05-04 20:27 -------- d-----w- c:\documents and settings\Jeff\Local Settings\Application Data\avwsbmpah

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2010-05-11 11:48 . 2010-03-08 17:32 -------- d-----w- c:\documents and settings\Jeff\Application Data\.purple
2010-04-19 11:55 . 2009-06-29 16:36 -------- d-----w- c:\program files\Google
2010-03-10 06:15 . 2004-08-04 10:00 420352 ----a-w- c:\windows\system32\vbscript.dll
2010-03-03 12:52 . 2010-03-03 12:52 152576 ----a-w- c:\documents and settings\Jeff\Application Data\Sun\Java\jre1.6.0_17\lzma.dll
2010-03-03 12:52 . 2009-11-17 12:30 79488 ----a-w- c:\documents and settings\Jeff\Application Data\Sun\Java\jre1.6.0_17\gtapi.dll
2010-02-25 06:24 . 2006-03-04 03:33 916480 ----a-w- c:\windows\system32\wininet.dll
2010-02-24 13:11 . 2004-08-04 10:00 455680 ----a-w- c:\windows\system32\drivers\mrxsmb.sys
2010-02-16 14:08 . 2005-03-30 01:21 2146304 ----a-w- c:\windows\system32\ntoskrnl.exe
2010-02-16 13:25 . 2005-03-30 01:01 2024448 ----a-w- c:\windows\system32\ntkrnlpa.exe
2010-02-12 04:33 . 2004-08-04 10:00 100864 ----a-w- c:\windows\system32\6to4svc.dll
2010-02-11 12:02 . 2004-08-04 10:00 226880 ----a-w- c:\windows\system32\drivers\tcpip6.sys
.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"swg"="c:\program files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe" [2009-06-29 39408]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"igfxtray"="c:\windows\system32\igfxtray.exe" [2005-10-14 94208]
"igfxhkcmd"="c:\windows\system32\hkcmd.exe" [2005-10-14 77824]
"igfxpers"="c:\windows\system32\igfxpers.exe" [2005-10-14 114688]
"MVS Splash"="c:\program files\McAfee\Managed VirusScan\DesktopUI\XTray.exe" [2010-04-05 476480]
"SoundMAXPnP"="c:\program files\Analog Devices\Core\smax4pnp.exe" [2004-10-14 1404928]

c:\documents and settings\All Users\Start Menu\Programs\Startup\
Pidgin.lnk - c:\program files\Pidgin\pidgin.exe [2010-2-16 45603]

[HKEY_LOCAL_MACHINE\software\microsoft\security center]
"AntiVirusOverride"=dword:00000001

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\McAfeeAntiVirus]
"DisableMonitoring"=dword:00000001

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"c:\\Program Files\\McAfee\\Managed VirusScan\\Agent\\myAgtSvc.exe"=

R2 EngineServer;EngineServer;c:\program files\McAfee\Managed VirusScan\VScan\EngineServer.exe [3/26/2009 1:31 PM 14144]
R2 myAgtSvc;McAfee Virus and Spyware Protection Service;c:\program files\McAfee\Managed VirusScan\Agent\myAgtSvc.exe [3/26/2009 1:27 PM 282824]
S2 gupdate1c9f8d7efbddf68;Google Update Service (gupdate1c9f8d7efbddf68);c:\program files\Google\Update\GoogleUpdate.exe [6/29/2009 12:37 PM 133104]
.
Contents of the 'Scheduled Tasks' folder

2010-05-11 c:\windows\Tasks\Google Software Updater.job
- c:\program files\Google\Common\Google Updater\GoogleUpdaterService.exe [2009-06-29 16:36]

2010-05-11 c:\windows\Tasks\GoogleUpdateTaskMachineCore.job
- c:\program files\Google\Update\GoogleUpdate.exe [2009-06-29 16:37]

2010-05-10 c:\windows\Tasks\GoogleUpdateTaskMachineUA.job
- c:\program files\Google\Update\GoogleUpdate.exe [2009-06-29 16:37]
.
.
------- Supplementary Scan -------
.
uStart Page = hxxp://access/
IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~2\Office10\EXCEL.EXE/3000
Trusted Zone: //about.htm/
Trusted Zone: //Exclude.htm/
Trusted Zone: //LanguageSelection.htm/
Trusted Zone: //Message.htm/
Trusted Zone: //MyAgttryCmd.htm/
Trusted Zone: //MyAgttryNag.htm/
Trusted Zone: //MyNotification.htm/
Trusted Zone: //NOCLessUpdate.htm/
Trusted Zone: //quarantine.htm/
Trusted Zone: //ScanNow.htm/
Trusted Zone: //strings.vbs/
Trusted Zone: //Template.htm/
Trusted Zone: //Update.htm/
Trusted Zone: //VirFound.htm/
Trusted Zone: mcafee.com\*
Trusted Zone: mcafeeasap.com\betavscan
Trusted Zone: mcafeeasap.com\vs
Trusted Zone: mcafeeasap.com\www
.
- - - - ORPHANS REMOVED - - - -

HKCU-Run-Spark - c:\program files\Spark\Spark.exe
HKLM-Run-McAfee Managed Services Tray - c:\program files\McAfee\Managed VirusScan\Agent\StartMyagtTry.exe
AddRemove-MVS - c:\progra~1\McAfee\MANAGE~1\Agent\myinx



**************************************************************************

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2010-05-11 08:14
Windows 5.1.2600 Service Pack 3 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully
hidden files: 0

**************************************************************************

Stealth MBR rootkit/Mebroot/Sinowal detector 0.3.7 by Gmer, http://www.gmer.net

device: opened successfully
user: MBR read successfully
called modules: ntkrnlpa.exe catchme.sys CLASSPNP.SYS disk.sys >>UNKNOWN [0x820E8EE4]<<
kernel: MBR read successfully
detected MBR rootkit hooks:
\Driver\Disk -> CLASSPNP.SYS @ 0xf84b9f28
\Driver\ACPI -> ACPI.sys @ 0xf834ccb8
\Driver\atapi -> atapi.sys @ 0xf82de852
IoDeviceObjectType -> DeleteProcedure -> ntkrnlpa.exe @ 0x805836a8
ParseProcedure -> ntkrnlpa.exe @ 0x805827e8
\Device\Harddisk0\DR0 -> DeleteProcedure -> ntkrnlpa.exe @ 0x805836a8
ParseProcedure -> ntkrnlpa.exe @ 0x805827e8
NDIS: Broadcom NetXtreme 57xx Gigabit Controller -> SendCompleteHandler -> NDIS.sys @ 0xf81d2bb0
PacketIndicateHandler -> NDIS.sys @ 0xf81dfa21
SendHandler -> NDIS.sys @ 0xf81bd87b
user & kernel MBR OK

**************************************************************************
.
--------------------- DLLs Loaded Under Running Processes ---------------------

- - - - - - - > 'winlogon.exe'(664)
c:\windows\system32\WININET.dll

- - - - - - - > 'lsass.exe'(724)
c:\windows\system32\WININET.dll
.
Completion time: 2010-05-11 08:18:40
ComboFix-quarantined-files.txt 2010-05-11 12:18

Pre-Run: 28,628,279,296 bytes free
Post-Run: 29,514,080,256 bytes free

WindowsXP-KB310994-SP2-Pro-BootDisk-ENU.exe
[boot loader]
timeout=2
default=multi(0)disk(0)rdisk(0)partition(2)\WINDOWS
[operating systems]
c:\cmdcons\BOOTSECT.DAT="Microsoft Windows Recovery Console" /cmdcons
multi(0)disk(0)rdisk(0)partition(2)\WINDOWS="Microsoft Windows XP Professional" /noexecute=optin /fastdetect

- - End Of File - - 6332345FA16FB4595115C6AEA8DC75C4

Edited by Pandy, 11 May 2010 - 08:54 AM.
Moved to a more appropriate forum ~Pandy


BC AdBot (Login to Remove)

 


#2 sonardude

sonardude
  • Topic Starter

  • Members
  • 5 posts
  • OFFLINE
  •  
  • Local time:12:46 AM

Posted 12 May 2010 - 12:43 PM

The machine in question is running XP SP3 & IE8. Whenever you perform a search on any of the search sites you get redirected to different sites on each click. Google Chrome is also loaded up on this machine and you can try and start it but it just sits there trying to load a site which it never does.


DDS (Ver_10-03-17.01) - NTFSx86
Run by Jeff at 12:05:49.73 on Wed 05/12/2010
Internet Explorer: 8.0.6001.18702
Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.502.114 [GMT -4:00]

AV: Total Protection Service *On-access scanning enabled* (Updated) {8C354827-2F54-4E28-90DC-AD391E77808C}

============== Running Processes ===============

C:\WINDOWS\system32\svchost -k DcomLaunch
svchost.exe
svchost.exe
svchost.exe
C:\WINDOWS\system32\spoolsv.exe
svchost.exe
C:\Program Files\McAfee\Managed VirusScan\VScan\EngineServer.exe
C:\Program Files\Java\jre6\bin\jqs.exe
C:\PROGRA~1\McAfee\MANAGE~1\VScan\McShield.exe
C:\Program Files\McAfee\Managed VirusScan\Agent\myAgtSvc.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\igfxpers.exe
C:\Program Files\McAfee\Managed VirusScan\DesktopUI\XTray.exe
C:\Program Files\Analog Devices\Core\smax4pnp.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Pidgin\pidgin.exe
C:\WINDOWS\system32\wuauclt.exe
C:\WINDOWS\System32\svchost.exe -k netsvcs
C:\PROGRA~1\MICROS~2\Office10\OUTLOOK.EXE
C:\Program Files\Internet Explorer\IEXPLORE.EXE
C:\Program Files\Internet Explorer\IEXPLORE.EXE
C:\PROGRA~1\MICROS~2\Office10\OUTLOOK.EXE
C:\PROGRA~1\MICROS~2\Office10\OUTLOOK.EXE
C:\PROGRA~1\MICROS~2\Office10\OUTLOOK.EXE
C:\PROGRA~1\MICROS~2\Office10\OUTLOOK.EXE
C:\PROGRA~1\MICROS~2\Office10\OUTLOOK.EXE
C:\PROGRA~1\MICROS~2\Office10\OUTLOOK.EXE
C:\PROGRA~1\MICROS~2\Office10\OUTLOOK.EXE
C:\PROGRA~1\MICROS~2\Office10\OUTLOOK.EXE
C:\Program Files\McAfee\Managed VirusScan\Agent\UpdDlg.exe
C:\WINDOWS\system32\wuauclt.exe
C:\PROGRA~1\MICROS~2\Office10\OUTLOOK.EXE
C:\PROGRA~1\MICROS~2\Office10\OUTLOOK.EXE
C:\PROGRA~1\MICROS~2\Office10\OUTLOOK.EXE
C:\Documents and Settings\Jeff\Desktop\dds.scr

============== Pseudo HJT Report ===============

uStart Page = hxxp://access/
BHO: Adobe PDF Link Helper: {18df081c-e8ad-4283-a596-fa578c2ebdc3} - c:\program files\common files\adobe\acrobat\activex\AcroIEHelperShim.dll
BHO: scriptproxy: {7db2d5a0-7241-4e79-b68d-6309f01c5231} - c:\program files\mcafee\managed virusscan\vscan\ScriptSn.20100412072837.dll
BHO: Google Toolbar Notifier BHO: {af69de43-7d58-4638-b6fa-ce66b5ad205d} - c:\program files\google\googletoolbarnotifier\5.1.1309.3572\swg.dll
BHO: JQSIEStartDetectorImpl Class: {e7e6f031-17ce-4c07-bc86-eabfe594f69c} - c:\program files\java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll
uRun: [swg] c:\program files\google\googletoolbarnotifier\GoogleToolbarNotifier.exe
uRun: [ctfmon.exe] c:\windows\system32\ctfmon.exe
mRun: [igfxtray] c:\windows\system32\igfxtray.exe
mRun: [igfxhkcmd] c:\windows\system32\hkcmd.exe
mRun: [igfxpers] c:\windows\system32\igfxpers.exe
mRun: [MVS Splash] "c:\program files\mcafee\managed virusscan\desktopui\XTray.exe" /LOGON
mRun: [SoundMAXPnP] c:\program files\analog devices\core\smax4pnp.exe
StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\pidgin.lnk - c:\program files\pidgin\pidgin.exe
IE: E&xport to Microsoft Excel - c:\progra~1\micros~2\office10\EXCEL.EXE/3000
IE: {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe
IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe
Trusted Zone: //about.htm/
Trusted Zone: //Exclude.htm/
Trusted Zone: //LanguageSelection.htm/
Trusted Zone: //Message.htm/
Trusted Zone: //MyAgttryCmd.htm/
Trusted Zone: //MyAgttryNag.htm/
Trusted Zone: //MyNotification.htm/
Trusted Zone: //NOCLessUpdate.htm/
Trusted Zone: //quarantine.htm/
Trusted Zone: //ScanNow.htm/
Trusted Zone: //strings.vbs/
Trusted Zone: //Template.htm/
Trusted Zone: //Update.htm/
Trusted Zone: //VirFound.htm/
Trusted Zone: mcafee.com\*
Trusted Zone: mcafeeasap.com\betavscan
Trusted Zone: mcafeeasap.com\vs
Trusted Zone: mcafeeasap.com\www
DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} - hxxp://update.microsoft.com/windowsupdate/v6/V5Controls/en/x86/client/wuweb_site.cab?1238084650612
DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} - hxxp://www.update.microsoft.com/microsoftupdate/v6/V5Controls/en/x86/client/muweb_site.cab?1265045571593
DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_17-windows-i586.cab
DPF: {CAFEEFAC-0016-0000-0007-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_07-windows-i586.cab
DPF: {CAFEEFAC-0016-0000-0017-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_17-windows-i586.cab
DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_17-windows-i586.cab
DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} - hxxp://fpdownload2.macromedia.com/get/shockwave/cabs/flash/swflash.cab
Handler: cdo - {CD00020A-8B95-11D1-82DB-00C04FB1625D} - c:\program files\common files\microsoft shared\web folders\PKMCDO.DLL
Handler: myrm - {4D034FC3-013F-4b95-B544-44D49ABE3E76} - c:\program files\mcafee\managed virusscan\agent\MyRmProt5.0.0.768.dll
Notify: igfxcui - igfxdev.dll
SSODL: WPDShServiceObj - {AAA288BA-9A4C-45B0-95D7-94D524869DB5} - c:\windows\system32\WPDShServiceObj.dll

============= SERVICES / DRIVERS ===============

R1 mfehidk;McAfee Inc. mfehidk;c:\windows\system32\drivers\mfehidk.sys [2009-3-26 214664]
R2 EngineServer;EngineServer;c:\program files\mcafee\managed virusscan\vscan\EngineServer.exe [2009-3-26 14144]
R2 McShield;McShield;c:\progra~1\mcafee\manage~1\vscan\McShield.exe [2009-3-26 144704]
R2 myAgtSvc;McAfee Virus and Spyware Protection Service;c:\program files\mcafee\managed virusscan\agent\myAgtSvc.exe [2009-3-26 282824]
R3 MfeAVFK;McAfee Inc. MfeAVFK;c:\windows\system32\drivers\mfeavfk.sys [2009-3-26 79816]
R3 MfeBOPK;McAfee Inc. MfeBOPK;c:\windows\system32\drivers\mfebopk.sys [2009-3-26 35272]
R3 MfeRKDK;McAfee Inc. MfeRKDK;c:\windows\system32\drivers\mferkdk.sys [2009-3-26 34248]
S2 gupdate1c9f8d7efbddf68;Google Update Service (gupdate1c9f8d7efbddf68);c:\program files\google\update\GoogleUpdate.exe [2009-6-29 133104]

=============== Created Last 30 ================

2010-05-12 15:59:54 0 ----a-w- c:\documents and settings\jeff\defogger_reenable
2010-05-12 14:59:35 0 d-----w- c:\program files\Cobian Backup 8
2010-05-11 11:53:09 0 d-sha-r- C:\cmdcons
2010-05-11 11:49:58 98816 ----a-w- c:\windows\sed.exe
2010-05-11 11:49:58 77312 ----a-w- c:\windows\MBR.exe
2010-05-11 11:49:58 256512 ----a-w- c:\windows\PEV.exe
2010-05-11 11:49:58 161792 ----a-w- c:\windows\SWREG.exe
2010-05-10 18:58:29 15944 ----a-w- c:\windows\system32\drivers\hitmanpro35.sys
2010-05-10 18:58:12 0 d-----w- c:\docume~1\alluse~1\applic~1\Hitman Pro
2010-05-10 18:58:11 0 d-----w- c:\program files\Hitman Pro 3.5
2010-05-10 16:43:23 0 d-----w- c:\docume~1\jeff\applic~1\Malwarebytes
2010-05-10 16:43:02 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2010-05-10 16:43:00 0 d-----w- c:\docume~1\alluse~1\applic~1\Malwarebytes
2010-05-10 16:42:59 20952 ----a-w- c:\windows\system32\drivers\mbam.sys
2010-05-10 16:42:56 0 d-----w- c:\program files\Malwarebytes' Anti-Malware
2010-05-10 14:26:21 95024 ----a-w- c:\windows\system32\drivers\SBREDrv.sys
2010-05-10 14:16:45 0 d-----w- c:\program files\Lavasoft
2010-05-10 13:38:40 0 d-----w- c:\program files\AVG
2010-04-12 17:31:51 1866 ----a-w- C:\OTIS LAS

==================== Find3M ====================

2010-03-10 06:15:52 420352 ----a-w- c:\windows\system32\vbscript.dll
2010-02-25 06:24:37 916480 ----a-w- c:\windows\system32\wininet.dll
2010-02-16 14:08:49 2146304 ----a-w- c:\windows\system32\ntoskrnl.exe
2010-02-16 13:25:04 2024448 ----a-w- c:\windows\system32\ntkrnlpa.exe
2010-02-12 04:33:11 100864 ----a-w- c:\windows\system32\6to4svc.dll

============= FINISH: 12:06:55.96 ===============

Attached Files


Edited by Orange Blossom, 12 May 2010 - 06:04 PM.
Merged topics. ~ OB


#3 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:04:46 AM

Posted 12 May 2010 - 07:00 PM

Hi,

Welcome to Bleeping Computer. My name is m0le and I will be helping you with your log.
  • Please subscribe to this topic, if you haven't already. You can subscribe by clicking the Options box to the right of your topic title and selecting Track This Topic.

  • Please avoid installing/uninstalling or updating any programs and attempting any unsupervised fixes or scans. This can make helping you impossible.

  • Please reply to this post so I know you are there.
The forum is busy and we need to have replies as soon as possible. If I haven't had a reply after 3 days I will bump the topic and if you do not reply by the following day after that then I will close the topic.

Once I receive a reply then I will return with your first instructions.

Thanks thumbup2.gif
Posted Image
m0le is a proud member of UNITE

#4 sonardude

sonardude
  • Topic Starter

  • Members
  • 5 posts
  • OFFLINE
  •  
  • Local time:12:46 AM

Posted 13 May 2010 - 07:12 AM

I'm here!

#5 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:04:46 AM

Posted 13 May 2010 - 05:42 PM

TDSS is everywhere at the moment. This rootkit is nasty but we can remove it.


Please run Combofix

Please download ComboFix from one of these locations:* IMPORTANT !!! Save ComboFix.exe to your Desktop making sure you rename it comfix.exe
  • Disable your AntiVirus and AntiSpyware applications, usually via a right click on the System Tray icon. They may otherwise interfere with our tools. (Click on this link to see a list of programs that should be disabled. The list is not all inclusive.)
  • Double click on Comfix.exe & follow the prompts.
  • As part of it's process, ComboFix will check to see if the Microsoft Windows Recovery Console is installed. With malware infections being as they are today, it's strongly recommended to have this pre-installed on your machine before doing any malware removal. It will allow you to boot up into a special recovery/repair mode that will allow us to more easily help you should your computer have a problem after an attempted removal of malware.
  • Follow the prompts to allow ComboFix to download and install the Microsoft Windows Recovery Console, and when prompted, agree to the End-User License Agreement to install the Microsoft Windows Recovery Console.
**Please note: If the Microsoft Windows Recovery Console is already installed, ComboFix will continue it's malware removal procedures.



Once the Microsoft Windows Recovery Console is installed using ComboFix, you should see the following message:



Click on Yes, to continue scanning for malware.

When finished, it shall produce a log for you. Please include the C:\ComboFix.txt in your next reply.
Posted Image
m0le is a proud member of UNITE

#6 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:04:46 AM

Posted 16 May 2010 - 06:43 PM

Hi,

I have not had a reply from you for 3 days. Can you please tell me if you still need help with your computer as I am unable to help other members with their problems while I have your topic still open. The time taken between posts can also change the situation with your PC making it more difficult to help you.

If you like you can PM me.

Thanks,


m0le
Posted Image
m0le is a proud member of UNITE

#7 sonardude

sonardude
  • Topic Starter

  • Members
  • 5 posts
  • OFFLINE
  •  
  • Local time:12:46 AM

Posted 17 May 2010 - 07:11 AM

Here is the combofix

ComboFix 10-05-10.03 - Jeff 05/11/2010 7:58.1.2 - x86
Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.502.246 [GMT -4:00]
Running from: c:\documents and settings\Jeff\Desktop\ComboFix.exe
AV: Total Protection Service *On-access scanning disabled* (Updated) {8C354827-2F54-4E28-90DC-AD391E77808C}
* Resident AV is active

.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.

c:\windows\system32\ialmuARA.dll
c:\windows\system32\ialmuARB.dll
c:\windows\system32\ialmuCHS.dll
c:\windows\system32\ialmuCHT.dll
c:\windows\system32\ialmuCSY.dll
c:\windows\system32\ialmuDAN.dll
c:\windows\system32\ialmuDEU.dll
c:\windows\system32\ialmudlg.exe
c:\windows\system32\ialmuELL.dll
c:\windows\system32\ialmuENG.dll
c:\windows\system32\ialmuESP.dll
c:\windows\system32\ialmuFIN.dll
c:\windows\system32\ialmuFRA.dll
c:\windows\system32\ialmuFRC.dll
c:\windows\system32\ialmuHEB.dll
c:\windows\system32\ialmuHUN.dll
c:\windows\system32\ialmuITA.dll
c:\windows\system32\ialmuJPN.dll
c:\windows\system32\ialmuKOR.dll
c:\windows\system32\ialmuNLD.dll
c:\windows\system32\ialmuNOR.dll
c:\windows\system32\ialmuPLK.dll
c:\windows\system32\ialmuPTB.dll
c:\windows\system32\ialmuPTG.dll
c:\windows\system32\ialmuRUS.dll
c:\windows\system32\ialmuSVE.dll
c:\windows\system32\ialmuTHA.dll
c:\windows\system32\ialmuTRK.dll
c:\windows\system32\igfxrara.lrc
c:\windows\system32\igfxrchs.lrc
c:\windows\system32\igfxrcht.lrc
c:\windows\system32\igfxrcsy.lrc
c:\windows\system32\igfxrdan.lrc
c:\windows\system32\igfxrdeu.lrc
c:\windows\system32\igfxrell.lrc
c:\windows\system32\igfxrenu.lrc
c:\windows\system32\igfxresp.lrc
c:\windows\system32\igfxrfin.lrc
c:\windows\system32\igfxrfra.lrc
c:\windows\system32\igfxrheb.lrc
c:\windows\system32\igfxrhun.lrc
c:\windows\system32\igfxrita.lrc
c:\windows\system32\igfxrjpn.lrc
c:\windows\system32\igfxrkor.lrc
c:\windows\system32\igfxrnld.lrc
c:\windows\system32\igfxrnor.lrc
c:\windows\system32\igfxrplk.lrc
c:\windows\system32\igfxrptb.lrc
c:\windows\system32\igfxrptg.lrc
c:\windows\system32\igfxrrus.lrc
c:\windows\system32\igfxrsve.lrc
c:\windows\system32\igfxrtha.lrc
c:\windows\system32\igfxrtrk.lrc

Infected copy of c:\windows\system32\drivers\pciide.sys was found and disinfected
Restored copy from - Kitty had a snack tongue.gif
.
((((((((((((((((((((((((( Files Created from 2010-04-11 to 2010-05-11 )))))))))))))))))))))))))))))))
.

2010-05-10 19:04 . 2010-05-10 19:04 -------- d-sh--w- c:\documents and settings\Administrator\IETldCache
2010-05-10 18:58 . 2010-05-10 19:04 15944 ----a-w- c:\windows\system32\drivers\hitmanpro35.sys
2010-05-10 18:58 . 2010-05-10 18:58 -------- d-----w- c:\documents and settings\All Users\Application Data\Hitman Pro
2010-05-10 18:58 . 2010-05-10 18:58 -------- d-----w- c:\program files\Hitman Pro 3.5
2010-05-10 16:43 . 2010-05-10 16:43 -------- d-----w- c:\documents and settings\Jeff\Application Data\Malwarebytes
2010-05-10 16:43 . 2010-04-29 19:39 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2010-05-10 16:43 . 2010-05-10 16:43 -------- d-----w- c:\documents and settings\All Users\Application Data\Malwarebytes
2010-05-10 16:42 . 2010-04-29 19:39 20952 ----a-w- c:\windows\system32\drivers\mbam.sys
2010-05-10 16:42 . 2010-05-10 17:33 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
2010-05-10 14:26 . 2010-05-10 17:37 -------- dc----w- c:\windows\system32\DRVSTORE
2010-05-10 14:26 . 2010-05-10 14:26 95024 ----a-w- c:\windows\system32\drivers\SBREDrv.sys
2010-05-10 14:16 . 2010-05-10 17:37 -------- d-----w- c:\program files\Lavasoft
2010-05-10 14:16 . 2010-05-10 17:37 -------- d-----w- c:\documents and settings\All Users\Application Data\Lavasoft
2010-05-10 13:38 . 2010-05-10 13:38 -------- d-----w- c:\program files\AVG
2010-05-05 13:56 . 2010-05-05 13:56 -------- d-sh--w- c:\documents and settings\NetworkService\UserData
2010-05-04 20:27 . 2010-05-04 20:27 -------- d-----w- c:\documents and settings\Jeff\Local Settings\Application Data\avwsbmpah

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2010-05-11 11:48 . 2010-03-08 17:32 -------- d-----w- c:\documents and settings\Jeff\Application Data\.purple
2010-04-19 11:55 . 2009-06-29 16:36 -------- d-----w- c:\program files\Google
2010-03-10 06:15 . 2004-08-04 10:00 420352 ----a-w- c:\windows\system32\vbscript.dll
2010-03-03 12:52 . 2010-03-03 12:52 152576 ----a-w- c:\documents and settings\Jeff\Application Data\Sun\Java\jre1.6.0_17\lzma.dll
2010-03-03 12:52 . 2009-11-17 12:30 79488 ----a-w- c:\documents and settings\Jeff\Application Data\Sun\Java\jre1.6.0_17\gtapi.dll
2010-02-25 06:24 . 2006-03-04 03:33 916480 ----a-w- c:\windows\system32\wininet.dll
2010-02-24 13:11 . 2004-08-04 10:00 455680 ----a-w- c:\windows\system32\drivers\mrxsmb.sys
2010-02-16 14:08 . 2005-03-30 01:21 2146304 ----a-w- c:\windows\system32\ntoskrnl.exe
2010-02-16 13:25 . 2005-03-30 01:01 2024448 ----a-w- c:\windows\system32\ntkrnlpa.exe
2010-02-12 04:33 . 2004-08-04 10:00 100864 ----a-w- c:\windows\system32\6to4svc.dll
2010-02-11 12:02 . 2004-08-04 10:00 226880 ----a-w- c:\windows\system32\drivers\tcpip6.sys
.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"swg"="c:\program files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe" [2009-06-29 39408]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"igfxtray"="c:\windows\system32\igfxtray.exe" [2005-10-14 94208]
"igfxhkcmd"="c:\windows\system32\hkcmd.exe" [2005-10-14 77824]
"igfxpers"="c:\windows\system32\igfxpers.exe" [2005-10-14 114688]
"MVS Splash"="c:\program files\McAfee\Managed VirusScan\DesktopUI\XTray.exe" [2010-04-05 476480]
"SoundMAXPnP"="c:\program files\Analog Devices\Core\smax4pnp.exe" [2004-10-14 1404928]

c:\documents and settings\All Users\Start Menu\Programs\Startup\
Pidgin.lnk - c:\program files\Pidgin\pidgin.exe [2010-2-16 45603]

[HKEY_LOCAL_MACHINE\software\microsoft\security center]
"AntiVirusOverride"=dword:00000001

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\McAfeeAntiVirus]
"DisableMonitoring"=dword:00000001

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"c:\\Program Files\\McAfee\\Managed VirusScan\\Agent\\myAgtSvc.exe"=

R2 EngineServer;EngineServer;c:\program files\McAfee\Managed VirusScan\VScan\EngineServer.exe [3/26/2009 1:31 PM 14144]
R2 myAgtSvc;McAfee Virus and Spyware Protection Service;c:\program files\McAfee\Managed VirusScan\Agent\myAgtSvc.exe [3/26/2009 1:27 PM 282824]
S2 gupdate1c9f8d7efbddf68;Google Update Service (gupdate1c9f8d7efbddf68);c:\program files\Google\Update\GoogleUpdate.exe [6/29/2009 12:37 PM 133104]
.
Contents of the 'Scheduled Tasks' folder

2010-05-11 c:\windows\Tasks\Google Software Updater.job
- c:\program files\Google\Common\Google Updater\GoogleUpdaterService.exe [2009-06-29 16:36]

2010-05-11 c:\windows\Tasks\GoogleUpdateTaskMachineCore.job
- c:\program files\Google\Update\GoogleUpdate.exe [2009-06-29 16:37]

2010-05-10 c:\windows\Tasks\GoogleUpdateTaskMachineUA.job
- c:\program files\Google\Update\GoogleUpdate.exe [2009-06-29 16:37]
.
.
------- Supplementary Scan -------
.
uStart Page = hxxp://access/
IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~2\Office10\EXCEL.EXE/3000
Trusted Zone: //about.htm/
Trusted Zone: //Exclude.htm/
Trusted Zone: //LanguageSelection.htm/
Trusted Zone: //Message.htm/
Trusted Zone: //MyAgttryCmd.htm/
Trusted Zone: //MyAgttryNag.htm/
Trusted Zone: //MyNotification.htm/
Trusted Zone: //NOCLessUpdate.htm/
Trusted Zone: //quarantine.htm/
Trusted Zone: //ScanNow.htm/
Trusted Zone: //strings.vbs/
Trusted Zone: //Template.htm/
Trusted Zone: //Update.htm/
Trusted Zone: //VirFound.htm/
Trusted Zone: mcafee.com\*
Trusted Zone: mcafeeasap.com\betavscan
Trusted Zone: mcafeeasap.com\vs
Trusted Zone: mcafeeasap.com\www
.
- - - - ORPHANS REMOVED - - - -

HKCU-Run-Spark - c:\program files\Spark\Spark.exe
HKLM-Run-McAfee Managed Services Tray - c:\program files\McAfee\Managed VirusScan\Agent\StartMyagtTry.exe
AddRemove-MVS - c:\progra~1\McAfee\MANAGE~1\Agent\myinx



**************************************************************************

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2010-05-11 08:14
Windows 5.1.2600 Service Pack 3 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully
hidden files: 0

**************************************************************************

Stealth MBR rootkit/Mebroot/Sinowal detector 0.3.7 by Gmer, http://www.gmer.net

device: opened successfully
user: MBR read successfully
called modules: ntkrnlpa.exe catchme.sys CLASSPNP.SYS disk.sys >>UNKNOWN [0x820E8EE4]<<
kernel: MBR read successfully
detected MBR rootkit hooks:
\Driver\Disk -> CLASSPNP.SYS @ 0xf84b9f28
\Driver\ACPI -> ACPI.sys @ 0xf834ccb8
\Driver\atapi -> atapi.sys @ 0xf82de852
IoDeviceObjectType -> DeleteProcedure -> ntkrnlpa.exe @ 0x805836a8
ParseProcedure -> ntkrnlpa.exe @ 0x805827e8
\Device\Harddisk0\DR0 -> DeleteProcedure -> ntkrnlpa.exe @ 0x805836a8
ParseProcedure -> ntkrnlpa.exe @ 0x805827e8
NDIS: Broadcom NetXtreme 57xx Gigabit Controller -> SendCompleteHandler -> NDIS.sys @ 0xf81d2bb0
PacketIndicateHandler -> NDIS.sys @ 0xf81dfa21
SendHandler -> NDIS.sys @ 0xf81bd87b
user & kernel MBR OK

**************************************************************************
.
--------------------- DLLs Loaded Under Running Processes ---------------------

- - - - - - - > 'winlogon.exe'(664)
c:\windows\system32\WININET.dll

- - - - - - - > 'lsass.exe'(724)
c:\windows\system32\WININET.dll
.
Completion time: 2010-05-11 08:18:40
ComboFix-quarantined-files.txt 2010-05-11 12:18

Pre-Run: 28,628,279,296 bytes free
Post-Run: 29,514,080,256 bytes free

WindowsXP-KB310994-SP2-Pro-BootDisk-ENU.exe
[boot loader]
timeout=2
default=multi(0)disk(0)rdisk(0)partition(2)\WINDOWS
[operating systems]
c:\cmdcons\BOOTSECT.DAT="Microsoft Windows Recovery Console" /cmdcons
multi(0)disk(0)rdisk(0)partition(2)\WINDOWS="Microsoft Windows XP Professional" /noexecute=optin /fastdetect

- - End Of File - - 6332345FA16FB4595115C6AEA8DC75C4

#8 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:04:46 AM

Posted 17 May 2010 - 01:14 PM

That's a good start to proceedings. Please run Combofix again but in the way below this time.

1. Close any open browsers.

2. Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.

3. Open notepad and copy/paste the text in the quotebox below into it:

QUOTE
Folder::
c:\documents and settings\Jeff\Local Settings\Application Data\avwsbmpah


Save this as CFScript.txt, in the same location as ComboFix.exe




Refering to the picture above, drag CFScript into ComboFix.exe

When finished, it shall produce a log for you at C:\ComboFix.txt which I will require in your next reply.


Then run MBAM

Please download Malwarebytes Anti-Malware and save it to your desktop.
  • Make sure you are connected to the Internet.
  • Double-click on mbam-setup.exe to install the application or, if you are using Vista, right-click and select Run As Administrator on mbam-setup.exe to install the application.
  • When the installation begins, follow the prompts and do not make any changes to default settings.
  • When installation has finished, make sure you leave both of these checked:
    • Update Malwarebytes' Anti-Malware
    • Launch Malwarebytes' Anti-Malware
  • Then click Finish.
  • MBAM will automatically start and you will be asked to update the program before performing a scan. If an update is found, the program will automatically update itself. Press the OK button to close that box and continue. If you encounter any problems while downloading the updates, manually download them from here and just double-click on mbam-rules.exe to install.
  • On the Scanner tab:
    • Make sure the "Perform Full Scan" option is selected.
    • Then click on the Scan button.
  • If asked to select the drives to scan, leave all the drives selected and click on the Start Scan button.
  • The scan will begin and "Scan in progress" will show at the top. It may take some time to complete so please be patient.
  • When the scan is finished, a message box will say "The scan completed successfully. Click 'Show Results' to display all objects found".
  • Click OK to close the message box and continue with the removal process.
  • Back at the main Scanner screen, click on the Show Results button to see a list of any malware that was found.
  • Make sure that everything is checked, and click Remove Selected.
  • When removal is completed, a log report will open in Notepad.
  • The log is automatically saved and can be viewed by clicking the Logs tab in MBAM.
  • Copy and paste the contents of that report in your next reply and exit MBAM.
Note: If MBAM encounters a file that is difficult to remove, you may be asked to reboot your computer so it can proceed with the disinfection process. Regardless if prompted to restart the computer or not, please do so immediately. Failure to reboot normally (not into safe mode) will prevent MBAM from removing all the malware. MBAM may make changes to your registry as part of its disinfection routine. If you're using other security programs that detect registry changes, they may alert you after scanning with MBAM. Please permit the program to allow the changes.
Posted Image
m0le is a proud member of UNITE

#9 sonardude

sonardude
  • Topic Starter

  • Members
  • 5 posts
  • OFFLINE
  •  
  • Local time:12:46 AM

Posted 18 May 2010 - 08:02 AM

Completed both however the virus remains.
Combofix appeared to have found something however MalwareBytes did not.



ComboFix 10-05-16.05 - Jeff 05/18/2010 7:58.2.2 - x86
Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.502.252 [GMT -4:00]
Running from: c:\documents and settings\Jeff\Desktop\ComboFix.exe
Command switches used :: c:\documents and settings\Jeff\Desktop\CFScript.txt
AV: Total Protection Service *On-access scanning disabled* (Updated) {8C354827-2F54-4E28-90DC-AD391E77808C}
* Resident AV is active

.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.

c:\documents and settings\Jeff\Local Settings\Application Data\avwsbmpah

Infected copy of c:\windows\system32\drivers\pciide.sys was found and disinfected
Restored copy from - Kitty had a snack tongue.gif
.
((((((((((((((((((((((((( Files Created from 2010-04-18 to 2010-05-18 )))))))))))))))))))))))))))))))
.

2010-05-12 14:59 . 2010-05-12 15:48 -------- d-----w- c:\program files\Cobian Backup 8
2010-05-12 13:53 . 2010-05-12 13:53 -------- d-sh--w- c:\documents and settings\LocalService\IETldCache
2010-05-12 12:47 . 2010-05-12 12:47 -------- d-sh--w- c:\documents and settings\LocalService\UserData
2010-05-11 19:12 . 2010-05-11 19:15 -------- d-----w- c:\documents and settings\NetworkService\Local Settings\Application Data\Adobe
2010-05-10 19:04 . 2010-05-10 19:04 -------- d-sh--w- c:\documents and settings\Administrator\IETldCache
2010-05-10 18:58 . 2010-05-10 19:04 15944 ----a-w- c:\windows\system32\drivers\hitmanpro35.sys
2010-05-10 18:58 . 2010-05-10 18:58 -------- d-----w- c:\documents and settings\All Users\Application Data\Hitman Pro
2010-05-10 18:58 . 2010-05-10 18:58 -------- d-----w- c:\program files\Hitman Pro 3.5
2010-05-10 16:43 . 2010-05-10 16:43 -------- d-----w- c:\documents and settings\Jeff\Application Data\Malwarebytes
2010-05-10 16:43 . 2010-04-29 19:39 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2010-05-10 16:43 . 2010-05-10 16:43 -------- d-----w- c:\documents and settings\All Users\Application Data\Malwarebytes
2010-05-10 16:42 . 2010-04-29 19:39 20952 ----a-w- c:\windows\system32\drivers\mbam.sys
2010-05-10 16:42 . 2010-05-10 17:33 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
2010-05-10 14:26 . 2010-05-10 17:37 -------- dc----w- c:\windows\system32\DRVSTORE
2010-05-10 14:26 . 2010-05-10 14:26 95024 ----a-w- c:\windows\system32\drivers\SBREDrv.sys
2010-05-10 14:16 . 2010-05-10 17:37 -------- d-----w- c:\program files\Lavasoft
2010-05-10 14:16 . 2010-05-10 17:37 -------- d-----w- c:\documents and settings\All Users\Application Data\Lavasoft
2010-05-10 13:38 . 2010-05-10 13:38 -------- d-----w- c:\program files\AVG
2010-05-05 13:56 . 2010-05-05 13:56 -------- d-sh--w- c:\documents and settings\NetworkService\UserData

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2010-05-18 11:44 . 2010-03-08 17:32 -------- d-----w- c:\documents and settings\Jeff\Application Data\.purple
2010-05-11 12:23 . 2009-06-29 16:36 -------- d-----w- c:\program files\Google
2010-03-10 06:15 . 2004-08-04 10:00 420352 ----a-w- c:\windows\system32\vbscript.dll
2010-03-03 12:52 . 2010-03-03 12:52 152576 ----a-w- c:\documents and settings\Jeff\Application Data\Sun\Java\jre1.6.0_17\lzma.dll
2010-03-03 12:52 . 2009-11-17 12:30 79488 ----a-w- c:\documents and settings\Jeff\Application Data\Sun\Java\jre1.6.0_17\gtapi.dll
2010-02-25 06:24 . 2006-03-04 03:33 916480 ----a-w- c:\windows\system32\wininet.dll
2010-02-24 13:11 . 2004-08-04 10:00 455680 ----a-w- c:\windows\system32\drivers\mrxsmb.sys
.

((((((((((((((((((((((((((((( SnapShot@2010-05-11_12.15.12 )))))))))))))))))))))))))))))))))))))))))
.
+ 2010-05-18 11:56 . 2010-05-18 11:56 16384 c:\windows\Temp\Perflib_Perfdata_744.dat
- 2009-06-09 12:31 . 2010-02-24 12:09 90112 c:\windows\Installer\{92110409-6000-11D3-8CFE-0050048383C9}\xlicons.exe
+ 2009-06-09 12:31 . 2010-05-12 13:36 90112 c:\windows\Installer\{92110409-6000-11D3-8CFE-0050048383C9}\xlicons.exe
+ 2009-06-09 12:31 . 2010-05-12 13:36 45056 c:\windows\Installer\{92110409-6000-11D3-8CFE-0050048383C9}\wordicon.exe
- 2009-06-09 12:31 . 2010-02-24 12:09 45056 c:\windows\Installer\{92110409-6000-11D3-8CFE-0050048383C9}\wordicon.exe
- 2009-06-09 12:31 . 2010-02-24 12:09 22528 c:\windows\Installer\{92110409-6000-11D3-8CFE-0050048383C9}\unbndico.exe
+ 2009-06-09 12:31 . 2010-05-12 13:36 22528 c:\windows\Installer\{92110409-6000-11D3-8CFE-0050048383C9}\unbndico.exe
+ 2009-06-09 12:31 . 2010-05-12 13:36 30720 c:\windows\Installer\{92110409-6000-11D3-8CFE-0050048383C9}\pptico.exe
- 2009-06-09 12:31 . 2010-02-24 12:09 30720 c:\windows\Installer\{92110409-6000-11D3-8CFE-0050048383C9}\pptico.exe
- 2009-06-09 12:31 . 2010-02-24 12:09 16384 c:\windows\Installer\{92110409-6000-11D3-8CFE-0050048383C9}\PEicons.exe
+ 2009-06-09 12:31 . 2010-05-12 13:36 16384 c:\windows\Installer\{92110409-6000-11D3-8CFE-0050048383C9}\PEicons.exe
+ 2009-06-09 12:31 . 2010-05-12 13:36 34304 c:\windows\Installer\{92110409-6000-11D3-8CFE-0050048383C9}\misc.exe
- 2009-06-09 12:31 . 2010-02-24 12:09 34304 c:\windows\Installer\{92110409-6000-11D3-8CFE-0050048383C9}\misc.exe
+ 2009-06-09 12:31 . 2010-05-12 13:36 3584 c:\windows\Installer\{92110409-6000-11D3-8CFE-0050048383C9}\opwicon.exe
- 2009-06-09 12:31 . 2010-02-24 12:09 3584 c:\windows\Installer\{92110409-6000-11D3-8CFE-0050048383C9}\opwicon.exe
- 2009-06-09 12:31 . 2010-02-24 12:09 8192 c:\windows\Installer\{92110409-6000-11D3-8CFE-0050048383C9}\mspicons.exe
+ 2009-06-09 12:31 . 2010-05-12 13:36 8192 c:\windows\Installer\{92110409-6000-11D3-8CFE-0050048383C9}\mspicons.exe
+ 2009-06-09 12:31 . 2010-05-12 13:36 2560 c:\windows\Installer\{92110409-6000-11D3-8CFE-0050048383C9}\cagicon.exe
- 2009-06-09 12:31 . 2010-02-24 12:09 2560 c:\windows\Installer\{92110409-6000-11D3-8CFE-0050048383C9}\cagicon.exe
+ 2009-03-26 16:30 . 2010-01-29 15:01 691712 c:\windows\system32\inetcomm.dll
- 2009-03-26 16:30 . 2008-04-11 19:04 691712 c:\windows\system32\inetcomm.dll
- 2009-03-26 16:53 . 2008-04-11 19:04 691712 c:\windows\system32\dllcache\inetcomm.dll
+ 2009-03-26 16:53 . 2010-01-29 15:01 691712 c:\windows\system32\dllcache\inetcomm.dll
- 2009-06-09 12:31 . 2010-02-24 12:09 114688 c:\windows\Installer\{92110409-6000-11D3-8CFE-0050048383C9}\outicon.exe
+ 2009-06-09 12:31 . 2010-05-12 13:36 114688 c:\windows\Installer\{92110409-6000-11D3-8CFE-0050048383C9}\outicon.exe
- 2009-06-09 12:31 . 2010-02-24 12:09 167936 c:\windows\Installer\{92110409-6000-11D3-8CFE-0050048383C9}\accicons.exe
+ 2009-06-09 12:31 . 2010-05-12 13:36 167936 c:\windows\Installer\{92110409-6000-11D3-8CFE-0050048383C9}\accicons.exe
+ 2009-08-17 11:42 . 2010-01-29 15:01 1315328 c:\windows\system32\dllcache\msoe.dll
- 2009-08-17 11:42 . 2009-07-10 13:27 1315328 c:\windows\system32\dllcache\msoe.dll
+ 2009-03-26 17:02 . 2010-04-30 18:51 32058312 c:\windows\system32\MRT.exe
.
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"swg"="c:\program files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe" [2009-06-29 39408]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"igfxtray"="c:\windows\system32\igfxtray.exe" [2005-10-14 94208]
"igfxhkcmd"="c:\windows\system32\hkcmd.exe" [2005-10-14 77824]
"igfxpers"="c:\windows\system32\igfxpers.exe" [2005-10-14 114688]
"MVS Splash"="c:\program files\McAfee\Managed VirusScan\DesktopUI\XTray.exe" [2010-04-05 476480]
"SoundMAXPnP"="c:\program files\Analog Devices\Core\smax4pnp.exe" [2004-10-14 1404928]

c:\documents and settings\All Users\Start Menu\Programs\Startup\
Pidgin.lnk - c:\program files\Pidgin\pidgin.exe [2010-2-16 45603]

[HKEY_LOCAL_MACHINE\software\microsoft\security center]
"AntiVirusOverride"=dword:00000001

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\McAfeeAntiVirus]
"DisableMonitoring"=dword:00000001

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"c:\\Program Files\\McAfee\\Managed VirusScan\\Agent\\myAgtSvc.exe"=

R2 EngineServer;EngineServer;c:\program files\McAfee\Managed VirusScan\VScan\EngineServer.exe [3/26/2009 1:31 PM 14144]
R2 myAgtSvc;McAfee Virus and Spyware Protection Service;c:\program files\McAfee\Managed VirusScan\Agent\myAgtSvc.exe [3/26/2009 1:27 PM 282824]
S2 gupdate1c9f8d7efbddf68;Google Update Service (gupdate1c9f8d7efbddf68);c:\program files\Google\Update\GoogleUpdate.exe [6/29/2009 12:37 PM 133104]
.
Contents of the 'Scheduled Tasks' folder

2010-05-18 c:\windows\Tasks\Google Software Updater.job
- c:\program files\Google\Common\Google Updater\GoogleUpdaterService.exe [2009-06-29 16:36]

2010-05-18 c:\windows\Tasks\GoogleUpdateTaskMachineCore.job
- c:\program files\Google\Update\GoogleUpdate.exe [2009-06-29 16:37]

2010-05-18 c:\windows\Tasks\GoogleUpdateTaskMachineUA.job
- c:\program files\Google\Update\GoogleUpdate.exe [2009-06-29 16:37]
.
.
------- Supplementary Scan -------
.
uStart Page = hxxp://access/
IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~2\Office10\EXCEL.EXE/3000
Trusted Zone: //about.htm/
Trusted Zone: //Exclude.htm/
Trusted Zone: //LanguageSelection.htm/
Trusted Zone: //Message.htm/
Trusted Zone: //MyAgttryCmd.htm/
Trusted Zone: //MyAgttryNag.htm/
Trusted Zone: //MyNotification.htm/
Trusted Zone: //NOCLessUpdate.htm/
Trusted Zone: //quarantine.htm/
Trusted Zone: //ScanNow.htm/
Trusted Zone: //strings.vbs/
Trusted Zone: //Template.htm/
Trusted Zone: //Update.htm/
Trusted Zone: //VirFound.htm/
Trusted Zone: mcafee.com\*
Trusted Zone: mcafeeasap.com\betavscan
Trusted Zone: mcafeeasap.com\vs
Trusted Zone: mcafeeasap.com\www
.

**************************************************************************

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2010-05-18 08:10
Windows 5.1.2600 Service Pack 3 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully
hidden files: 0

**************************************************************************

Stealth MBR rootkit/Mebroot/Sinowal detector 0.3.7 by Gmer, http://www.gmer.net

device: opened successfully
user: MBR read successfully
called modules: ntkrnlpa.exe catchme.sys CLASSPNP.SYS disk.sys >>UNKNOWN [0x820E7EE4]<<
kernel: MBR read successfully
detected MBR rootkit hooks:
\Driver\Disk -> CLASSPNP.SYS @ 0xf84b9f28
\Driver\ACPI -> ACPI.sys @ 0xf834ccb8
\Driver\atapi -> atapi.sys @ 0xf82de852
IoDeviceObjectType -> DeleteProcedure -> ntkrnlpa.exe @ 0x805836a8
ParseProcedure -> ntkrnlpa.exe @ 0x805827e8
\Device\Harddisk0\DR0 -> DeleteProcedure -> ntkrnlpa.exe @ 0x805836a8
ParseProcedure -> ntkrnlpa.exe @ 0x805827e8
NDIS: Broadcom NetXtreme 57xx Gigabit Controller -> SendCompleteHandler -> NDIS.sys @ 0xf81d2bb0
PacketIndicateHandler -> NDIS.sys @ 0xf81dfa21
SendHandler -> NDIS.sys @ 0xf81bd87b
user & kernel MBR OK

**************************************************************************
.
--------------------- DLLs Loaded Under Running Processes ---------------------

- - - - - - - > 'winlogon.exe'(664)
c:\windows\system32\WININET.dll

- - - - - - - > 'lsass.exe'(724)
c:\windows\system32\WININET.dll
.
Completion time: 2010-05-18 08:14:16
ComboFix-quarantined-files.txt 2010-05-18 12:14
ComboFix2.txt 2010-05-11 12:18

Pre-Run: 29,494,882,304 bytes free
Post-Run: 29,709,680,640 bytes free

- - End Of File - - FBB21A76515772AE8D75DAA66B270583







Malwarebytes' Anti-Malware 1.46
www.malwarebytes.org

Database version: 4111

Windows 5.1.2600 Service Pack 3
Internet Explorer 8.0.6001.18702

5/18/2010 8:43:25 AM
mbam-log-2010-05-18 (08-43-25).txt

Scan type: Full scan (C:\|D:\|)
Objects scanned: 162432
Time elapsed: 26 minute(s), 46 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 0

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
(No malicious items detected)

#10 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:04:46 AM

Posted 18 May 2010 - 03:49 PM

QUOTE
Completed both however the virus remains.


By this I take it that the redirections are still occurring...


The virus is long gone but its effects are still there so we need to reset the PC.
  • Open Control Panel and navigate to "Network and Internet Connections"
  • Then click Network and Internet Connections
  • Now select your active Internet connection and right click on it. Suppose if you are using wireless connection right click on "Wireless Network Connection"
  • Select the TCP/IP service in the list and then click properties
  • Change DNS to "Obtain DNS server automatically


Then

Please download HostsXpert 4.3
  • Extract (unzip) HostsXpert.zip to a permanent folder on your hard drive such as C:\HostsXpert
  • Double-click HostsXpert.exe to run the program.
  • Click "Restore MS Hosts File".
  • Click OK at the confirmation box.
  • Click "Make Read Only".
  • Click the X to exit the program.
-- Note: If you were using a custom Hosts file you will need to replace any of those entries yourself.


Finally

Please open the command prompt:
Start > Run > type cmd and then OK. Then type the following, into the black window:
CODE
ipconfig /flushdns

Then tap the enter button on your keyboard.
You should see the following confirmation:
QUOTE
Windows IP Configuration
Successfully flushed the DNS Resolver Cache.


This should stop the redirects in most cases. smile.gif
Posted Image
m0le is a proud member of UNITE

#11 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:04:46 AM

Posted 20 May 2010 - 07:27 PM

Hi,

I have not had a reply from you for 3 days. Can you please tell me if you still need help with your computer as I am unable to help other members with their problems while I have your topic still open. The time taken between posts can also change the situation with your PC making it more difficult to help you.

If you like you can PM me.

Thanks,


m0le
Posted Image
m0le is a proud member of UNITE

#12 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:04:46 AM

Posted 23 May 2010 - 04:02 PM

Since this issue appears to be resolved ... this topic has been closed. Glad we could help. smile.gif

If you're the topic starter, and need this topic reopened, please contact me via pm with the address of the thread.

Everyone else please begin a New Topic.
Posted Image
m0le is a proud member of UNITE




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users