Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

unknown, drweb lists BackDoor.Tdss, in memory


  • This topic is locked This topic is locked
20 replies to this topic

#1 bigdumbal

bigdumbal

  • Members
  • 22 posts
  • OFFLINE
  •  
  • Local time:03:06 AM

Posted 20 May 2010 - 03:11 PM

see this
http://www.bleepingcomputer.com/forums/t/316538/unknown-infection-seemingly-benign-popups-to-unknown-sites-followed-by-more-extensive-problems/
for background info

DDS log:

DDS (Ver_10-03-17.01) - NTFSx86
Run by Alexander Kreider at 18:31:53.81 on Tue 05/18/2010
Internet Explorer: 8.0.6001.18702
Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.3318.2705 [GMT -6:00]

AV: Data Protection *On-access scanning enabled* (Outdated) {28e00e3b-806e-4533-925c-f4c3d79514b9}

============== Running Processes ===============

C:\WINDOWS\system32\svchost -k DcomLaunch
svchost.exe
C:\WINDOWS\System32\svchost.exe -k netsvcs
svchost.exe
svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\RTHDCPL.EXE
C:\WINDOWS\system32\igfxtray.exe
C:\WINDOWS\system32\igfxpers.exe
C:\Program Files\HP\HP Software Update\HPWuSchd2.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
C:\WINDOWS\system32\igfxsrvc.exe
C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
C:\Program Files\HP\Digital Imaging\bin\hpqtra08.exe
svchost.exe
C:\Program Files\Java\jre6\bin\jqs.exe
C:\Program Files\HP\Digital Imaging\bin\hpqSTE08.exe
C:\WINDOWS\system32\HPZipm12.exe
c:\Program Files\Common Files\Protexis\License Service\PsiService_2.exe
c:\Program Files\Common Files\Roxio Shared\9.0\SharedCOM\RoxWatch9.exe
C:\Program Files\Microsoft\Search Enhancement Pack\SeaPort\SeaPort.exe
C:\WINDOWS\system32\svchost.exe -k imgsvc
C:\WINDOWS\system32\wuauclt.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\WINDOWS\System32\svchost.exe -k HTTPFilter
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Documents and Settings\Alexander Kreider\Desktop\dds.scr

============== Pseudo HJT Report ===============

uStart Page = hxxp://www.google.com/
uInternet Connection Wizard,ShellNext = iexplore
uInternet Settings,ProxyServer = http=127.0.0.1:5555
uInternet Settings,ProxyOverride =
BHO: Adobe PDF Reader Link Helper: {06849e9f-c8d7-4d59-b87d-784b7d6be0b3} - c:\program files\common files\adobe\acrobat\activex\AcroIEHelper.dll
BHO: Spybot-S&D IE Protection: {53707962-6f74-2d53-2644-206d7942484f} - c:\program files\spybot - search & destroy\SDHelper.dll
BHO: Search Helper: {6ebf7485-159f-4bff-a14f-b9e3aac4465b} - c:\program files\microsoft\search enhancement pack\search helper\SearchHelper.dll__BHODemonDisabled
BHO: MSN Toolbar Helper: {d2ce3e00-f94a-4740-988e-03dc2f38c34f} - c:\program files\msn\toolbar\3.0.1125.0\msneshellx.dll__BHODemonDisabled
BHO: This BHO has been disabled by BHODemon. - No File
BHO: JQSIEStartDetectorImpl Class: {e7e6f031-17ce-4c07-bc86-eabfe594f69c} - c:\program files\java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll__BHODemonDisabled
TB: MSN Toolbar: {1e61ed7c-7cb8-49d6-b9e9-ab4c880c8414} - c:\program files\msn\toolbar\3.0.1125.0\msneshellx.dll
TB: {604BC32A-9680-40D1-9AC6-E06B23A1BA4C} - No File
TB: {472734EA-242A-422B-ADF8-83D1E48CC825} - No File
uRun: [ctfmon.exe] c:\windows\system32\ctfmon.exe
uRun: [SpybotSD TeaTimer] c:\program files\spybot - search & destroy\TeaTimer.exe
uRun: [SUPERAntiSpyware] c:\program files\superantispyware\SUPERAntiSpyware.exe
mRun: [RTHDCPL] RTHDCPL.EXE
mRun: [Alcmtr] ALCMTR.EXE
mRun: [IgfxTray] c:\windows\system32\igfxtray.exe
mRun: [HotKeysCmds] c:\windows\system32\hkcmd.exe
mRun: [Persistence] c:\windows\system32\igfxpers.exe
mRun: []
mRun: [HP Software Update] c:\program files\hp\hp software update\HPWuSchd2.exe
mRun: [Microsoft Default Manager] "c:\program files\microsoft\search enhancement pack\default manager\DefMgr.exe" -resume
mRun: [QuickFinder Scheduler] "c:\program files\corel\wordperfect office x4\programs\QFSCHD140.EXE"
mRun: [Adobe Reader Speed Launcher] "c:\program files\adobe\reader 8.0\reader\Reader_sl.exe"
mRun: [QuickTime Task] "c:\program files\quicktime\qttask.exe" -atboottime
mRun: [Malwarebytes Anti-Malware (rootkit-scan)] "c:\program files\malwarebytes' anti-malware\mbam.exe" /runcleanupscript
dRun: [bcrwbrtf] c:\documents and settings\networkservice\local settings\application data\joosmjglw\jeijdtxtssd.exe
StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\hpdigi~1.lnk - c:\program files\hp\digital imaging\bin\hpqtra08.exe
IE: E&xport to Microsoft Excel - c:\progra~1\micros~2\office12\EXCEL.EXE/3000
IE: Open with WordPerfect - c:\program files\corel\wordperfect office x4\programs\WPLauncher.hta
IE: {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe
IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe
IE: {92780B25-18CC-41C8-B9BE-3C9C571A8263} - {FF059E31-CC5A-4E2E-BF3B-96E929D65503} - c:\progra~1\micros~2\office12\REFIEBAR.DLL
IE: {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - {53707962-6F74-2D53-2644-206D7942484F} - c:\program files\spybot - search & destroy\SDHelper.dll
DPF: {05D44720-58E3-49E6-BDF6-D00330E511D3} - hxxp://zone.msn.com/binFrameWork/v10/StagingUI.cab55579.cab
DPF: {166B1BCA-3F9C-11CF-8075-444553540000} - hxxp://fpdownload.macromedia.com/pub/shockwave/cabs/director/sw.cab
DPF: {233C1507-6A77-46A4-9443-F871F945D258} - hxxp://fpdownload.macromedia.com/pub/shockwave/cabs/director/sw.cab
DPF: {3BB54395-5982-4788-8AF4-B5388FFDD0D8} - hxxp://zone.msn.com/BinFrameWork/v10/ZBuddy.cab55579.cab
DPF: {459E93B6-150E-45D5-8D4B-45C66FC035FE} - hxxp://apps.corel.com/nos_dl_manager/plugin/IEGetPlugin.cab
DPF: {4F1E5B1A-2A80-42CA-8532-2D05CB959537} - hxxp://gfx1.hotmail.com/mail/w3/resources/MSNPUpld.cab
DPF: {5736C456-EA94-4AAC-BB08-917ABDD035B3} - hxxp://zone.msn.com/binframework/v10/ZPAChat.cab55579.cab
DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} - hxxp://www.update.microsoft.com/windowsupdate/v6/V5Controls/en/x86/client/wuweb_site.cab?1206018920343
DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://javadl.sun.com/webapps/download/AutoDL?BundleId=29223
DPF: {8FFBE65D-2C9C-4669-84BD-5829DC0B603C} - hxxp://fpdownload.macromedia.com/get/flashplayer/current/ultrashim.cab
DPF: {95B5D20C-BD31-4489-8ABF-F8C8BE748463} - hxxp://zone.msn.com/bingame/zpagames/zpa_hrtz.cab99160.cab
DPF: {A4110378-789B-455F-AE86-3A1BFC402853} - hxxp://zone.msn.com/bingame/zpagames/zpa_shvl.cab55579.cab
DPF: {B8BE5E93-A60C-4D26-A2DC-220313175592} - hxxp://cdn2.zone.msn.com/binFramework/v10/ZPAFramework.cab102118.cab
DPF: {CAFEEFAC-0016-0000-0013-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_13-windows-i586.cab
DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_13-windows-i586.cab
DPF: {DA2AA6CF-5C7A-4B71-BC3B-C771BB369937} - hxxp://zone.msn.com/binframework/v10/StProxy.cab55579.cab
Notify: !SASWinLogon - c:\program files\superantispyware\SASWINLO.dll
Notify: igfxcui - igfxdev.dll
SSODL: WPDShServiceObj - {AAA288BA-9A4C-45B0-95D7-94D524869DB5} - c:\windows\system32\WPDShServiceObj.dll
SEH: SABShellExecuteHook Class: {5ae067d3-9afb-48e0-853a-ebb7f4a000da} - c:\program files\superantispyware\SASSEH.DLL

============= SERVICES / DRIVERS ===============

R1 cfd2a289-8951-4ede-910c-aad2f1097a8d;cfd2a289-8951-4ede-910c-aad2f1097a8d;c:\windows\iprot\cfd2a289-8951-4ede-910c-aad2f1097a8d\PhysMem.sys [2009-6-12 3584]
R1 SASDIFSV;SASDIFSV;c:\program files\superantispyware\sasdifsv.sys [2010-2-17 12872]
R1 SASKUTIL;SASKUTIL;c:\program files\superantispyware\SASKUTIL.SYS [2010-5-6 68168]
S0 enwpgm;enwpgm;c:\windows\system32\drivers\bxhlvua.sys --> c:\windows\system32\drivers\bxhlvua.sys [?]
S3 getPlusŪ Installer;getPlusŪ Installer;c:\program files\nos\bin\getPlus_HelperSvc.exe [2009-6-13 59552]
S3 motccgp;Motorola USB Composite Device Driver;c:\windows\system32\drivers\motccgp.sys --> c:\windows\system32\drivers\motccgp.sys [?]
S3 motccgpfl;MotCcgpFlService;c:\windows\system32\drivers\motccgpfl.sys --> c:\windows\system32\drivers\motccgpfl.sys [?]
S3 motport;Motorola USB Diagnostic Port;c:\windows\system32\drivers\motport.sys --> c:\windows\system32\drivers\motport.sys [?]
S4 ispw;ispw;c:\windows\system32\drivers\bdyiwn.sys [2010-5-12 54016]
S4 lnlacney;lnlacney;c:\windows\system32\drivers\igdhaber.sys [2010-5-13 54016]
S4 nnfx;nnfx;c:\windows\system32\drivers\qnvjgkig.sys [2010-5-13 54016]
S4 rixhpgod;rixhpgod;c:\windows\system32\drivers\pbovoou.sys [2010-5-13 54016]

=============== Created Last 30 ================

2010-05-19 00:23:27 0 ----a-w- c:\documents and settings\alexander kreider\defogger_reenable
2010-05-14 20:05:02 0 d-----w- c:\documents and settings\alexander kreider\DoctorWeb
2010-05-14 16:36:11 0 d-----w- c:\docume~1\alexan~1\applic~1\SUPERAntiSpyware.com
2010-05-14 16:35:38 0 d-----w- c:\program files\common files\Wise Installation Wizard
2010-05-14 02:55:27 54016 ----a-w- c:\windows\system32\drivers\igdhaber.sys
2010-05-14 02:34:04 54016 ----a-w- c:\windows\system32\drivers\pbovoou.sys
2010-05-14 02:30:00 54016 ----a-w- c:\windows\system32\drivers\qnvjgkig.sys
2010-05-12 23:46:21 54016 ----a-w- c:\windows\system32\drivers\bdyiwn.sys
2010-05-12 23:46:21 4 ----a-w- c:\windows\system32\hohpets
2010-05-12 15:07:30 0 d-----w- c:\windows\Downloaded Installations
2010-05-10 16:07:47 0 d-----w- c:\docume~1\alluse~1\applic~1\SUPERAntiSpyware.com
2010-05-10 16:07:37 0 d-----w- c:\program files\SUPERAntiSpyware
2010-05-06 17:32:11 0 d-----w- c:\windows\system32\wbem\Repository
2010-05-05 05:24:28 0 d-----w- c:\program files\Spybot - Search & Destroy
2010-05-05 05:24:28 0 d-----w- c:\docume~1\alluse~1\applic~1\Spybot - Search & Destroy
2010-04-21 22:05:58 11 ----a-r- c:\windows\amunres.lsl

==================== Find3M ====================

2010-04-29 21:39:38 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2010-04-29 21:39:26 20952 ----a-w- c:\windows\system32\drivers\mbam.sys
2010-03-10 06:15:52 420352 ----a-w- c:\windows\system32\vbscript.dll
2010-03-10 06:15:52 420352 ----a-w- c:\windows\system32\dllcache\vbscript.dll
2010-02-25 17:54:36 11070976 ------w- c:\windows\system32\dllcache\ieframe.dll
2010-02-24 13:11:07 455680 ------w- c:\windows\system32\dllcache\mrxsmb.sys
2010-02-24 09:54:25 173056 ------w- c:\windows\system32\dllcache\ie4uinit.exe

============= FINISH: 18:33:10.37 ===============

Merged posts and removed unnecessary text. ~ OB

Attached Files


Edited by Orange Blossom, 20 May 2010 - 10:26 PM.


BC AdBot (Login to Remove)

 


#2 Shannon2012

Shannon2012

  • Security Colleague
  • 3,657 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:North Carolina, USA
  • Local time:05:06 AM

Posted 22 May 2010 - 07:13 AM

Hello and welcome to Bleeping Computer

We apologize for the delay in responding to your request for help. Here at Bleeping Computer we get overwhelmed at times, and we are trying our best to keep up. Please note that your topic was not intentionally overlooked. Our mission is to help everyone in need, but sometimes it takes just a little longer to get to every request for help. No one is ignored here.

If you have since resolved the original problem you were having, we would appreciate you letting us know. If not please perform the following steps below so we can have a look at the current condition of your machine.

If you have not done so, include a clear description of the problems you're having, along with any steps you may have performed so far.

Upon completing the steps below another staff member will review and take the steps necessary with you to get your machine back in working order clean and free of malware.

If you have already posted a DDS log, please do so again, as your situation may have changed.
Use the 'Add Reply' and add the new log to this thread.

Thanks and again sorry for the delay.

We need to see some information about what is happening in your machine. Please perform the following scan:
  • Download DDS by sUBs from one of the following links. Save it to your desktop.
  • Double click on the DDS icon, allow it to run.
  • A small box will open, with an explaination about the tool. No input is needed, the scan is running.
  • Notepad will open with the results.
  • Follow the instructions that pop up for posting the results.
  • Close the program window, and delete the program from your desktop.
Please note: You may have to disable any script protection running if the scan fails to run. After downloading the tool, disconnect from the internet and disable all antivirus protection. Run the scan, enable your A/V and reconnect to the internet.

Information on A/V control HERE

We also need a new log from the GMER anti-rootkit scanner. Please first disable any CD emulation programs using the steps found in this topic:

Why we request you disable CD Emulation when receiving Malware Removal Advice

Then create another GMER log and post it as an attachment to the reply where you post your new DDS log. Instructions on how to properly create a GMER log can be found here:

How to create a GMER log


Shannon

#3 bigdumbal

bigdumbal
  • Topic Starter

  • Members
  • 22 posts
  • OFFLINE
  •  
  • Local time:03:06 AM

Posted 23 May 2010 - 12:31 AM

Cannot thank you all enough; will stop thanking when it is clear I'm not speaking to someone new as it may become annoying, but want to make sure you know your help is very much appreciated.

see link in op this thread for background/symptoms.

addl symptoms are that I cannot post to bleeping puter or send hotmail message from infected machine at this point, get 'unable to display webpage' when I try. this is being posted from another machine. only hope it won't move to this 'puter via log files transferred via jump drive to post this.

if best/most thorough solution is a wipe and reinstall, I'm willing to undertake that as I have all crucial files from infected machine, but would need some help with it.

gmer scan results attached. this was squirrely, so advise if I need to repeat. squirrel-ness was that I anticipated it to fart out a file, but I had to help it by naming the file, etc. machine was very slow to respond during this and was obviously bogged down with something unfortunate. surprised I got anything at all, hope it is useful.

dds log below, 'attach' attached, as is gmer log


dds log:


DDS (Ver_10-03-17.01) - NTFSx86
Run by Alexander Kreider at 20:45:05.00 on Sat 05/22/2010
Internet Explorer: 8.0.6001.18702
Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.3318.2725 [GMT -6:00]

AV: Data Protection *On-access scanning enabled* (Outdated) {28e00e3b-806e-4533-925c-f4c3d79514b9}

============== Running Processes ===============

C:\WINDOWS\system32\svchost -k DcomLaunch
svchost.exe
C:\WINDOWS\System32\svchost.exe -k netsvcs
svchost.exe
svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\RTHDCPL.EXE
C:\WINDOWS\system32\igfxtray.exe
C:\WINDOWS\system32\igfxpers.exe
C:\Program Files\HP\HP Software Update\HPWuSchd2.exe
C:\Program Files\Adobe\Reader 8.0\Reader\Reader_sl.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
C:\Program Files\HP\Digital Imaging\bin\hpqtra08.exe
C:\WINDOWS\system32\igfxsrvc.exe
C:\Documents and Settings\Alexander Kreider\Local Settings\Application Data\Google\Update\1.2.183.23\GoogleCrashHandler.exe
C:\Program Files\HP\Digital Imaging\bin\hpqSTE08.exe
svchost.exe
C:\Program Files\Java\jre6\bin\jqs.exe
C:\WINDOWS\system32\HPZipm12.exe
c:\Program Files\Common Files\Protexis\License Service\PsiService_2.exe
c:\Program Files\Common Files\Roxio Shared\9.0\SharedCOM\RoxWatch9.exe
C:\Program Files\Microsoft\Search Enhancement Pack\SeaPort\SeaPort.exe
C:\WINDOWS\system32\svchost.exe -k imgsvc
C:\WINDOWS\system32\wuauclt.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\WINDOWS\System32\svchost.exe -k HTTPFilter
C:\Program Files\Internet Explorer\iexplore.exe
C:\Documents and Settings\Alexander Kreider\Desktop\dds.scr

============== Pseudo HJT Report ===============

uStart Page = hxxp://www.google.com/
uInternet Connection Wizard,ShellNext = iexplore
uInternet Settings,ProxyServer = http=127.0.0.1:5555
uInternet Settings,ProxyOverride = <local>
BHO: Adobe PDF Reader Link Helper: {06849e9f-c8d7-4d59-b87d-784b7d6be0b3} - c:\program files\common files\adobe\acrobat\activex\AcroIEHelper.dll
BHO: Spybot-S&D IE Protection: {53707962-6f74-2d53-2644-206d7942484f} - c:\program files\spybot - search & destroy\SDHelper.dll
BHO: Search Helper: {6ebf7485-159f-4bff-a14f-b9e3aac4465b} - c:\program files\microsoft\search enhancement pack\search helper\SearchHelper.dll__BHODemonDisabled
BHO: MSN Toolbar Helper: {d2ce3e00-f94a-4740-988e-03dc2f38c34f} - c:\program files\msn\toolbar\3.0.1125.0\msneshellx.dll__BHODemonDisabled
BHO: This BHO has been disabled by BHODemon. - No File
BHO: JQSIEStartDetectorImpl Class: {e7e6f031-17ce-4c07-bc86-eabfe594f69c} - c:\program files\java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll__BHODemonDisabled
TB: MSN Toolbar: {1e61ed7c-7cb8-49d6-b9e9-ab4c880c8414} - c:\program files\msn\toolbar\3.0.1125.0\msneshellx.dll
TB: {604BC32A-9680-40D1-9AC6-E06B23A1BA4C} - No File
TB: {472734EA-242A-422B-ADF8-83D1E48CC825} - No File
uRun: [ctfmon.exe] c:\windows\system32\ctfmon.exe
uRun: [SpybotSD TeaTimer] c:\program files\spybot - search & destroy\TeaTimer.exe
uRun: [SUPERAntiSpyware] c:\program files\superantispyware\SUPERAntiSpyware.exe
uRun: [Google Update] "c:\documents and settings\alexander kreider\local settings\application data\google\update\GoogleUpdate.exe" /c
mRun: [RTHDCPL] RTHDCPL.EXE
mRun: [Alcmtr] ALCMTR.EXE
mRun: [IgfxTray] c:\windows\system32\igfxtray.exe
mRun: [HotKeysCmds] c:\windows\system32\hkcmd.exe
mRun: [Persistence] c:\windows\system32\igfxpers.exe
mRun: [<NO NAME>]
mRun: [HP Software Update] c:\program files\hp\hp software update\HPWuSchd2.exe
mRun: [Microsoft Default Manager] "c:\program files\microsoft\search enhancement pack\default manager\DefMgr.exe" -resume
mRun: [QuickFinder Scheduler] "c:\program files\corel\wordperfect office x4\programs\QFSCHD140.EXE"
mRun: [Adobe Reader Speed Launcher] "c:\program files\adobe\reader 8.0\reader\Reader_sl.exe"
mRun: [QuickTime Task] "c:\program files\quicktime\qttask.exe" -atboottime
mRun: [Malwarebytes Anti-Malware (rootkit-scan)] "c:\program files\malwarebytes' anti-malware\mbam.exe" /runcleanupscript
dRun: [bcrwbrtf] c:\documents and settings\networkservice\local settings\application data\joosmjglw\jeijdtxtssd.exe
StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\hpdigi~1.lnk - c:\program files\hp\digital imaging\bin\hpqtra08.exe
IE: E&xport to Microsoft Excel - c:\progra~1\micros~2\office12\EXCEL.EXE/3000
IE: Open with WordPerfect - c:\program files\corel\wordperfect office x4\programs\WPLauncher.hta
IE: {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe
IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe
IE: {92780B25-18CC-41C8-B9BE-3C9C571A8263} - {FF059E31-CC5A-4E2E-BF3B-96E929D65503} - c:\progra~1\micros~2\office12\REFIEBAR.DLL
IE: {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - {53707962-6F74-2D53-2644-206D7942484F} - c:\program files\spybot - search & destroy\SDHelper.dll
DPF: {05D44720-58E3-49E6-BDF6-D00330E511D3} - hxxp://zone.msn.com/binFrameWork/v10/StagingUI.cab55579.cab
DPF: {166B1BCA-3F9C-11CF-8075-444553540000} - hxxp://fpdownload.macromedia.com/pub/shockwave/cabs/director/sw.cab
DPF: {233C1507-6A77-46A4-9443-F871F945D258} - hxxp://fpdownload.macromedia.com/pub/shockwave/cabs/director/sw.cab
DPF: {3BB54395-5982-4788-8AF4-B5388FFDD0D8} - hxxp://zone.msn.com/BinFrameWork/v10/ZBuddy.cab55579.cab
DPF: {459E93B6-150E-45D5-8D4B-45C66FC035FE} - hxxp://apps.corel.com/nos_dl_manager/plugin/IEGetPlugin.cab
DPF: {4F1E5B1A-2A80-42CA-8532-2D05CB959537} - hxxp://gfx1.hotmail.com/mail/w3/resources/MSNPUpld.cab
DPF: {5736C456-EA94-4AAC-BB08-917ABDD035B3} - hxxp://zone.msn.com/binframework/v10/ZPAChat.cab55579.cab
DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} - hxxp://www.update.microsoft.com/windowsupdate/v6/V5Controls/en/x86/client/wuweb_site.cab?1206018920343
DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://javadl.sun.com/webapps/download/AutoDL?BundleId=29223
DPF: {8FFBE65D-2C9C-4669-84BD-5829DC0B603C} - hxxp://fpdownload.macromedia.com/get/flashplayer/current/ultrashim.cab
DPF: {95B5D20C-BD31-4489-8ABF-F8C8BE748463} - hxxp://zone.msn.com/bingame/zpagames/zpa_hrtz.cab99160.cab
DPF: {A4110378-789B-455F-AE86-3A1BFC402853} - hxxp://zone.msn.com/bingame/zpagames/zpa_shvl.cab55579.cab
DPF: {B8BE5E93-A60C-4D26-A2DC-220313175592} - hxxp://cdn2.zone.msn.com/binFramework/v10/ZPAFramework.cab102118.cab
DPF: {CAFEEFAC-0016-0000-0013-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_13-windows-i586.cab
DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_13-windows-i586.cab
DPF: {DA2AA6CF-5C7A-4B71-BC3B-C771BB369937} - hxxp://zone.msn.com/binframework/v10/StProxy.cab55579.cab
Notify: !SASWinLogon - c:\program files\superantispyware\SASWINLO.dll
Notify: igfxcui - igfxdev.dll
SSODL: WPDShServiceObj - {AAA288BA-9A4C-45B0-95D7-94D524869DB5} - c:\windows\system32\WPDShServiceObj.dll
SEH: SABShellExecuteHook Class: {5ae067d3-9afb-48e0-853a-ebb7f4a000da} - c:\program files\superantispyware\SASSEH.DLL

============= SERVICES / DRIVERS ===============

R1 cfd2a289-8951-4ede-910c-aad2f1097a8d;cfd2a289-8951-4ede-910c-aad2f1097a8d;c:\windows\iprot\cfd2a289-8951-4ede-910c-aad2f1097a8d\PhysMem.sys [2009-6-12 3584]
R1 SASDIFSV;SASDIFSV;c:\program files\superantispyware\sasdifsv.sys [2010-2-17 12872]
R1 SASKUTIL;SASKUTIL;c:\program files\superantispyware\SASKUTIL.SYS [2010-5-6 68168]
S0 enwpgm;enwpgm;c:\windows\system32\drivers\bxhlvua.sys --> c:\windows\system32\drivers\bxhlvua.sys [?]
S3 getPlus® Installer;getPlus® Installer;c:\program files\nos\bin\getPlus_HelperSvc.exe [2009-6-13 59552]
S3 motccgp;Motorola USB Composite Device Driver;c:\windows\system32\drivers\motccgp.sys --> c:\windows\system32\drivers\motccgp.sys [?]
S3 motccgpfl;MotCcgpFlService;c:\windows\system32\drivers\motccgpfl.sys --> c:\windows\system32\drivers\motccgpfl.sys [?]
S3 motport;Motorola USB Diagnostic Port;c:\windows\system32\drivers\motport.sys --> c:\windows\system32\drivers\motport.sys [?]
S4 ispw;ispw;c:\windows\system32\drivers\bdyiwn.sys [2010-5-12 54016]
S4 lnlacney;lnlacney;c:\windows\system32\drivers\igdhaber.sys [2010-5-13 54016]
S4 nnfx;nnfx;c:\windows\system32\drivers\qnvjgkig.sys [2010-5-13 54016]
S4 rixhpgod;rixhpgod;c:\windows\system32\drivers\pbovoou.sys [2010-5-13 54016]

=============== Created Last 30 ================

2010-05-19 00:23:27 0 ----a-w- c:\documents and settings\alexander kreider\defogger_reenable
2010-05-14 20:05:02 0 d-----w- c:\documents and settings\alexander kreider\DoctorWeb
2010-05-14 16:36:11 0 d-----w- c:\docume~1\alexan~1\applic~1\SUPERAntiSpyware.com
2010-05-14 16:35:38 0 d-----w- c:\program files\common files\Wise Installation Wizard
2010-05-14 02:55:27 54016 ----a-w- c:\windows\system32\drivers\igdhaber.sys
2010-05-14 02:34:04 54016 ----a-w- c:\windows\system32\drivers\pbovoou.sys
2010-05-14 02:30:00 54016 ----a-w- c:\windows\system32\drivers\qnvjgkig.sys
2010-05-12 23:46:21 54016 ----a-w- c:\windows\system32\drivers\bdyiwn.sys
2010-05-12 23:46:21 4 ----a-w- c:\windows\system32\hohpets
2010-05-12 15:07:30 0 d-----w- c:\windows\Downloaded Installations
2010-05-10 16:07:47 0 d-----w- c:\docume~1\alluse~1\applic~1\SUPERAntiSpyware.com
2010-05-10 16:07:37 0 d-----w- c:\program files\SUPERAntiSpyware
2010-05-06 17:32:11 0 d-----w- c:\windows\system32\wbem\Repository
2010-05-05 05:24:28 0 d-----w- c:\program files\Spybot - Search & Destroy
2010-05-05 05:24:28 0 d-----w- c:\docume~1\alluse~1\applic~1\Spybot - Search & Destroy

==================== Find3M ====================

2010-04-29 21:39:38 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2010-04-29 21:39:26 20952 ----a-w- c:\windows\system32\drivers\mbam.sys
2010-03-10 06:15:52 420352 ----a-w- c:\windows\system32\vbscript.dll
2010-03-10 06:15:52 420352 ----a-w- c:\windows\system32\dllcache\vbscript.dll
2010-02-25 17:54:36 11070976 ------w- c:\windows\system32\dllcache\ieframe.dll
2010-02-24 13:11:07 455680 ------w- c:\windows\system32\dllcache\mrxsmb.sys
2010-02-24 09:54:25 173056 ------w- c:\windows\system32\dllcache\ie4uinit.exe

============= FINISH: 20:46:25.54 ===============

Attached Files



#4 bigdumbal

bigdumbal
  • Topic Starter

  • Members
  • 22 posts
  • OFFLINE
  •  
  • Local time:03:06 AM

Posted 23 May 2010 - 12:42 AM

I hate to say anything, as it may misdirect you and I know little to nothing, but I just can't resist; my sense is that it is in java as dr web cureit found a bunch of infected java archives. certainly it is i-net focused, particularly IE. will do non i-net functions all day long w/o symptom, but the minute I open an ie window, it will all start to creep in again.

#5 myrti

myrti

    Sillyberry


  • Malware Study Hall Admin
  • 33,766 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:At home
  • Local time:11:06 AM

Posted 23 May 2010 - 07:36 AM

Hello and welcome to Bleepingcomputer! smile.gif

I'm sorry to say I've got bad news: You have been infected by a nasty rootkit. It is a backdoor trojan.

This allows hackers to remotely control your computer, steal critical system information and download and execute files.

I would counsel you to disconnect this PC from the Internet immediately. If you do any banking or other financial transactions on the PC or if it should contain any other sensitive information, please get to a known clean computer and change all passwords where applicable, and it would be wise to contact those same financial institutions to apprise them of your situation.

Though the trojan has been identified and can be killed, because of it's backdoor functionality, your PC is very likely compromised and there is no way to be sure your computer can ever again be trusted. Many experts in the security community believe that once infected with this type of trojan, the best course of action would be a reformat and reinstall of the OS. Please read these for more information:

How Do I Handle Possible Identify Theft, Internet Fraud and CC Fraud?
When Should I Format, How Should I Reinstall

We can still clean this machine but I can't guarantee that it will be 100% secure afterwards. Let me know what you decide to do.


If you decide to clean, then please run ComboFix and post the log in your next reply:

Please download ComboFix from one of these locations:

Link 2
Link 3

* IMPORTANT !!! Save ComboFix.exe to your Desktop
  • Temporarily disable isable your AntiVirus and AntiSpyware applications. They may otherwise interfere with our tools
    Usually this can be done via a right click on the System Tray icon, check this tutorial for disabling the most common security programs: Link

  • Double click on ComboFix.exe & follow the prompts.
  • As part of it's process, ComboFix will check to see if the Microsoft Windows Recovery Console is installed. With malware infections being as they are today, it's strongly recommended to have this pre-installed on your machine before doing any malware removal. It will allow you to boot up into a special recovery/repair mode that will allow us to more easily help you should your computer have a problem after an attempted removal of malware.
  • Follow the prompts to allow ComboFix to download and install the Microsoft Windows Recovery Console, and when prompted, agree to the End-User License Agreement to install the Microsoft Windows Recovery Console.
**Please note: If the Microsoft Windows Recovery Console is already installed, ComboFix will continue it's malware removal procedures.



Once the Microsoft Windows Recovery Console is installed using ComboFix, you should see the following message:



Click on Yes, to continue scanning for malware.

When finished, it will produce a log for you. Please include the C:\ComboFix.txt in your next reply.

This tool is not a toy and not for everyday use.
ComboFix SHOULD NOT be used unless requested by a forum helper


If you need help, see this link:
http://www.bleepingcomputer.com/combofix/how-to-use-combofix

regards myrti

is that a bird?  a plane? nooo it's the flying blueberry!

If I have been helping you and haven't replied in 2 days, feel free to shoot me a PM! Please don't send help request via PM, unless I am already helping you. Use the forums!

 

Follow BleepingComputer on: Facebook | Twitter | Google+


#6 bigdumbal

bigdumbal
  • Topic Starter

  • Members
  • 22 posts
  • OFFLINE
  •  
  • Local time:03:06 AM

Posted 25 May 2010 - 11:48 PM

I'd like to clean this; can do banking and other sensitive activity from another, never infected machine.

could not figure out how to disable spybot and super anti spyware, so removed them via ad/remove programs, then ran combo fix.

Thank you again for your help.

cf log:


ComboFix 10-05-25.02 - Alexander Kreider 05/25/2010 21:50:04.1.2 - x86
Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.3318.2965 [GMT -6:00]
Running from: c:\documents and settings\Alexander Kreider\Desktop\ComboFix.exe
.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.

c:\documents and settings\Alexander Kreider\Local Settings\Temporary Internet Files\webex.ini
c:\windows\Downloaded Program Files\popcaploader.inf
c:\windows\system32\drivers\bdyiwn.sys
c:\windows\system32\drivers\igdhaber.sys
c:\windows\system32\drivers\pbovoou.sys
c:\windows\system32\drivers\qnvjgkig.sys

Infected copy of c:\windows\system32\drivers\asc.sys was found and disinfected
Restored copy from - Kitty had a snack tongue.gif
.
((((((((((((((((((((((((((((((((((((((( Drivers/Services )))))))))))))))))))))))))))))))))))))))))))))))))
.

-------\Legacy_ispw
-------\Legacy_lnlacney
-------\Legacy_nnfx
-------\Legacy_rixhpgod
-------\Service_ispw
-------\Service_lnlacney
-------\Service_nnfx
-------\Service_rixhpgod


((((((((((((((((((((((((( Files Created from 2010-04-26 to 2010-05-26 )))))))))))))))))))))))))))))))
.

2010-05-20 20:24 . 2010-05-20 20:25 -------- d-----w- c:\documents and settings\Alexander Kreider\Local Settings\Application Data\Temp
2010-05-20 20:24 . 2010-05-23 06:03 -------- d-----w- c:\documents and settings\Alexander Kreider\Local Settings\Application Data\Google
2010-05-14 20:05 . 2010-05-14 21:49 -------- d-----w- c:\documents and settings\Alexander Kreider\DoctorWeb
2010-05-12 15:07 . 2010-05-12 15:07 -------- d-----w- c:\windows\Downloaded Installations
2010-05-12 14:43 . 2010-05-12 16:17 -------- d-----w- c:\documents and settings\NetworkService\Local Settings\Application Data\joosmjglw
2010-05-12 14:42 . 2010-05-12 14:42 -------- d-sh--w- c:\documents and settings\NetworkService\PrivacIE
2010-05-10 16:07 . 2010-05-10 16:07 -------- d-----w- c:\documents and settings\All Users\Application Data\SUPERAntiSpyware.com
2010-05-10 16:07 . 2010-05-26 03:34 -------- d-----w- c:\program files\SUPERAntiSpyware
2010-05-10 00:04 . 2010-05-10 00:04 -------- d-----w- c:\documents and settings\Alexander Kreider\Local Settings\Application Data\Threat Expert
2010-05-06 17:32 . 2010-05-06 17:32 -------- d-----w- c:\windows\system32\wbem\Repository
2010-05-06 15:41 . 2010-05-06 17:31 -------- d-----w- c:\documents and settings\NetworkService\Local Settings\Application Data\Adobe
2010-05-06 15:38 . 2010-05-06 17:31 -------- d-----w- c:\documents and settings\NetworkService\Application Data\Adobe(2)
2010-05-05 05:24 . 2010-05-26 03:36 -------- d-----w- c:\program files\Spybot - Search & Destroy
2010-05-05 05:24 . 2010-05-26 03:35 -------- d-----w- c:\documents and settings\All Users\Application Data\Spybot - Search & Destroy
2010-05-05 04:43 . 2010-05-05 04:43 -------- d-sh--w- c:\documents and settings\LocalService\IETldCache

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2010-05-15 01:32 . 2009-06-13 18:07 -------- d-----w- c:\program files\wpcvtr
2010-05-10 00:25 . 2009-08-20 23:14 -------- d---a-w- c:\documents and settings\All Users\Application Data\TEMP
2010-05-08 16:43 . 2010-01-10 17:15 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
2010-04-29 21:39 . 2010-01-10 17:15 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2010-04-29 21:39 . 2010-01-10 17:15 20952 ----a-w- c:\windows\system32\drivers\mbam.sys
2010-03-25 07:32 . 2009-09-04 05:39 5068928 ----a-w- c:\documents and settings\LocalService\Local Settings\Application Data\FontCache3.0.0.0.dat
2010-03-10 06:15 . 2006-09-28 00:01 420352 ----a-w- c:\windows\system32\vbscript.dll
2010-02-25 06:24 . 2006-09-28 00:01 916480 ----a-w- c:\windows\system32\wininet.dll
.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"RTHDCPL"="RTHDCPL.EXE" [2008-05-16 16862720]
"IgfxTray"="c:\windows\system32\igfxtray.exe" [2007-12-19 135168]
"HotKeysCmds"="c:\windows\system32\hkcmd.exe" [2007-12-19 159744]
"Persistence"="c:\windows\system32\igfxpers.exe" [2007-12-19 131072]
"HP Software Update"="c:\program files\HP\HP Software Update\HPWuSchd2.exe" [2007-05-08 54840]
"Microsoft Default Manager"="c:\program files\Microsoft\Search Enhancement Pack\Default Manager\DefMgr.exe" [2009-02-03 233304]
"QuickFinder Scheduler"="c:\program files\Corel\WordPerfect Office X4\Programs\QFSCHD140.EXE" [2008-03-21 83232]
"Adobe Reader Speed Launcher"="c:\program files\Adobe\Reader 8.0\Reader\Reader_sl.exe" [2008-10-15 39792]
"QuickTime Task"="c:\program files\QuickTime\qttask.exe" [2010-02-16 417792]
"Malwarebytes Anti-Malware (rootkit-scan)"="c:\program files\Malwarebytes' Anti-Malware\mbam.exe" [2010-04-29 1090952]

c:\documents and settings\All Users\Start Menu\Programs\Startup\
HP Digital Imaging Monitor.lnk - c:\program files\HP\Digital Imaging\bin\hpqtra08.exe [2005-5-12 282624]

[HKEY_LOCAL_MACHINE\software\microsoft\security center]
"AntiVirusOverride"=dword:00000001

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"c:\\Program Files\\Microsoft Office\\Office12\\OUTLOOK.EXE"=
"c:\\WINDOWS\\system32\\sessmgr.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpqtra08.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpqste08.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpofxm08.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hposfx08.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hposid01.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpqscnvw.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpqkygrp.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpfccopy.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpzwiz01.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\Unload\\HpqPhUnl.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\Unload\\HpqDIA.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpoews01.exe"=
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"%windir%\\system32\\sessmgr.exe"=
"c:\\WINDOWS\\system32\\java.exe"=

R1 cfd2a289-8951-4ede-910c-aad2f1097a8d;cfd2a289-8951-4ede-910c-aad2f1097a8d;c:\windows\iprot\cfd2a289-8951-4ede-910c-aad2f1097a8d\PhysMem.sys [6/12/2009 6:42 PM 3584]
S0 enwpgm;enwpgm;c:\windows\system32\drivers\bxhlvua.sys --> c:\windows\system32\drivers\bxhlvua.sys [?]
S3 getPlus® Installer;getPlus® Installer;c:\program files\NOS\bin\getPlus_HelperSvc.exe [6/13/2009 12:28 PM 59552]
S3 motccgp;Motorola USB Composite Device Driver;c:\windows\system32\DRIVERS\motccgp.sys --> c:\windows\system32\DRIVERS\motccgp.sys [?]
S3 motccgpfl;MotCcgpFlService;c:\windows\system32\DRIVERS\motccgpfl.sys --> c:\windows\system32\DRIVERS\motccgpfl.sys [?]
S3 motport;Motorola USB Diagnostic Port;c:\windows\system32\DRIVERS\motport.sys --> c:\windows\system32\DRIVERS\motport.sys [?]
.
Contents of the 'Scheduled Tasks' folder

2010-05-08 c:\windows\Tasks\AppleSoftwareUpdate.job
- c:\program files\Apple Software Update\SoftwareUpdate.exe [2008-07-30 19:34]
.
.
------- Supplementary Scan -------
.
uStart Page = hxxp://www.google.com/
uInternet Connection Wizard,ShellNext = iexplore
uInternet Settings,ProxyServer = http=127.0.0.1:5555
uInternet Settings,ProxyOverride = <local>
IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~2\Office12\EXCEL.EXE/3000
IE: Open with WordPerfect - c:\program files\Corel\WordPerfect Office X4\Programs\WPLauncher.hta
.
- - - - ORPHANS REMOVED - - - -

WebBrowser-{604BC32A-9680-40D1-9AC6-E06B23A1BA4C} - (no file)



**************************************************************************

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2010-05-25 21:58
Windows 5.1.2600 Service Pack 3 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully
hidden files: 0

**************************************************************************
.
--------------------- LOCKED REGISTRY KEYS ---------------------

[HKEY_USERS\.Default\Software\Microsoft\Internet Explorer\User Preferences]
@Denied: (2) (LocalSystem)
"88D7D0879DAB32E14DE5B3A805A34F98AFF34F5977"=hex:01,00,00,00,d0,8c,9d,df,01,15,
d1,11,8c,7a,00,c0,4f,c2,97,eb,01,00,00,00,4d,62,80,7b,7b,17,1e,49,aa,cb,97,\
"2D53CFFC5C1A3DD2E97B7979AC2A92BD59BC839E81"=hex:01,00,00,00,d0,8c,9d,df,01,15,
d1,11,8c,7a,00,c0,4f,c2,97,eb,01,00,00,00,4d,62,80,7b,7b,17,1e,49,aa,cb,97,\
.
--------------------- DLLs Loaded Under Running Processes ---------------------

- - - - - - - > 'explorer.exe'(2380)
c:\windows\system32\WININET.dll
c:\windows\system32\ieframe.dll
c:\windows\system32\webcheck.dll
c:\windows\system32\WPDShServiceObj.dll
c:\program files\Roxio\Drag-to-Disc\Shellex.dll
c:\program files\Common Files\Roxio Shared\9.0\DLLShared\DLAAPI_W.DLL
c:\program files\Roxio\Drag-to-Disc\ShellRes.dll
c:\windows\system32\PortableDeviceTypes.dll
c:\windows\system32\PortableDeviceApi.dll
.
------------------------ Other Running Processes ------------------------
.
c:\program files\Java\jre6\bin\jqs.exe
c:\windows\RTHDCPL.EXE
c:\windows\system32\igfxsrvc.exe
c:\program files\Common Files\Protexis\License Service\PsiService_2.exe
c:\program files\Common Files\Roxio Shared\9.0\SharedCOM\RoxWatch9.exe
c:\program files\Microsoft\Search Enhancement Pack\SeaPort\SeaPort.exe
c:\program files\HP\Digital Imaging\bin\hpqSTE08.exe
.
**************************************************************************
.
Completion time: 2010-05-25 22:01:35 - machine was rebooted
ComboFix-quarantined-files.txt 2010-05-26 04:01

Pre-Run: 221,183,643,648 bytes free
Post-Run: 222,372,294,656 bytes free

WindowsXP-KB310994-SP2-Pro-BootDisk-ENU.exe
[boot loader]
timeout=2
default=multi(0)disk(0)rdisk(0)partition(1)\WINDOWS
[operating systems]
c:\cmdcons\BOOTSECT.DAT="Microsoft Windows Recovery Console" /cmdcons
multi(0)disk(0)rdisk(0)partition(1)\WINDOWS="Microsoft Windows XP Professional" /noexecute=optin /fastdetect

- - End Of File - - 9A6F757C40B59ABF20B53B7BB0DD3907


#7 myrti

myrti

    Sillyberry


  • Malware Study Hall Admin
  • 33,766 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:At home
  • Local time:11:06 AM

Posted 26 May 2010 - 07:41 AM

Hi,

Please make sure that you can view all hidden files. Instructions on how to do this can be found here:

How to see hidden files in Windows

Please click this link-->Jotti

When the jotti page has finished loading, click the browse button and navigate to the files listed below in bold, then click Submit. You will only be able to have one file scanned at a time.

c:\windows\iprot\cfd2a289-8951-4ede-910c-aad2f1097a8d\PhysMem.sys
c:\windows\system32\drivers\bxhlvua.sys

Please post back the results of the scan in your next post.

If Jotti is busy, try the same at Virustotal: http://www.virustotal.com/

regards myrti

is that a bird?  a plane? nooo it's the flying blueberry!

If I have been helping you and haven't replied in 2 days, feel free to shoot me a PM! Please don't send help request via PM, unless I am already helping you. Use the forums!

 

Follow BleepingComputer on: Facebook | Twitter | Google+


#8 bigdumbal

bigdumbal
  • Topic Starter

  • Members
  • 22 posts
  • OFFLINE
  •  
  • Local time:03:06 AM

Posted 26 May 2010 - 10:11 AM

Filename: PhysMem.sys
Status: Scan finished. 0 out of 19 scanners reported malware.
Scan taken on: Wed 26 May 2010 16:49:23 (CET) Permalink

File size: 3584 bytes
Filetype: PE32 executable for MS Windows (native) Intel 80386 32-bit
MD5: 3a370a1f60f1930b721350a9624b4963
SHA1: 4e3cba6aebd0dd68e1834024b28e1a9b74eb9514

apparently bxhlvua.sys does not exist, or I cannot find it.
search all files/folders including system folders, hidden files and folders, and subfolders returned only something called 'chunks' which appears to be an ie temp file about this thread...





#9 myrti

myrti

    Sillyberry


  • Malware Study Hall Admin
  • 33,766 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:At home
  • Local time:11:06 AM

Posted 26 May 2010 - 11:27 AM

Hi,

1. Close any open browsers.

2. Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.

3. Open notepad and copy/paste the text in the quotebox below into it:

QUOTE
File::
c:\windows\system32\drivers\bxhlvua.sys
Folder::
c:\documents and settings\NetworkService\Local Settings\Application Data\joosmjglw
DDS::
uInternet Settings,ProxyServer = http=127.0.0.1:5555
uInternet Settings,ProxyOverride = <local>
Driver::
enwpgm


Save this as CFScript.txt, in the same location as ComboFix.exe




Refering to the picture above, drag CFScript into ComboFix.exe

When finished, it shall produce a log for you at C:\ComboFix.txt which I will require in your next reply.

regards myrti

is that a bird?  a plane? nooo it's the flying blueberry!

If I have been helping you and haven't replied in 2 days, feel free to shoot me a PM! Please don't send help request via PM, unless I am already helping you. Use the forums!

 

Follow BleepingComputer on: Facebook | Twitter | Google+


#10 bigdumbal

bigdumbal
  • Topic Starter

  • Members
  • 22 posts
  • OFFLINE
  •  
  • Local time:03:06 AM

Posted 26 May 2010 - 01:26 PM

after dragging CFScript into combofix.exe, it propted me that a newer version of combofix was available, did I want to update it. I clicked yes.

ComboFix.txt attached

Attached Files



#11 myrti

myrti

    Sillyberry


  • Malware Study Hall Admin
  • 33,766 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:At home
  • Local time:11:06 AM

Posted 26 May 2010 - 02:29 PM

Hi,

yes please always allow ComboFix to update if it asks to do so. The log is looking good. How is your PC currently doing?

regards myrti

is that a bird?  a plane? nooo it's the flying blueberry!

If I have been helping you and haven't replied in 2 days, feel free to shoot me a PM! Please don't send help request via PM, unless I am already helping you. Use the forums!

 

Follow BleepingComputer on: Facebook | Twitter | Google+


#12 bigdumbal

bigdumbal
  • Topic Starter

  • Members
  • 22 posts
  • OFFLINE
  •  
  • Local time:03:06 AM

Posted 26 May 2010 - 03:08 PM

It seems ok...

I have not had a recurrence of the symptoms, and it is noticeably snappier loading a page.

But I cannot really say for certain yet; I have been using it only to address this issue the last few days, keeping it turned off and (when on) disconnected from i-net as much as possible, so there has not been much opportunity for the symptoms to show up.

If you think you've got it taken care of, I will return to using it normally and see how it does.

If you don't hear back from me in 3-4 days, consider it solved and chalk up another victory.

Thank you again for your help.

ps, out of curiosity, what is the file bxhlvua.sys that I could not find to scan with jotti?

Edited by bigdumbal, 26 May 2010 - 03:12 PM.


#13 myrti

myrti

    Sillyberry


  • Malware Study Hall Admin
  • 33,766 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:At home
  • Local time:11:06 AM

Posted 26 May 2010 - 03:18 PM

Hi,

it seems that the file was really missing and not hiding and hence it is very difficult to say to what it belonged. It could be anything from a temporary file your anti virus program created to kill of the infection to a file the infection created to kill of the anti virus program.

The important thing is, though, that with the modifications ComboFix made in its last run the file really shouldn't be present on your system. Meaning whatever it was in a previous life it is no longer there.

However please don't leave just yet, I would like to run a scan with Eset to make sure nothing is left:
  1. Hold down Control and click on the following link to open ESET OnlineScan in a new window.
    ESET OnlineScan
  2. Click the button.
  3. For alternate browsers only: (Microsoft Internet Explorer users can skip these steps)
    1. Click on to download the ESET Smart Installer. Save it to your desktop.
    2. Double click on the icon on your desktop.
  4. Check
  5. Click the button.
  6. Accept any security warnings from your browser.
  7. Check
  8. Push the Start button.
  9. ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this can take some time.
  10. When the scan completes, push
  11. Push , and save the file to your desktop using a unique name, such as ESETScan. Include the contents of this report in your next reply.
  12. Push the button.
  13. Push

regards myrti

is that a bird?  a plane? nooo it's the flying blueberry!

If I have been helping you and haven't replied in 2 days, feel free to shoot me a PM! Please don't send help request via PM, unless I am already helping you. Use the forums!

 

Follow BleepingComputer on: Facebook | Twitter | Google+


#14 bigdumbal

bigdumbal
  • Topic Starter

  • Members
  • 22 posts
  • OFFLINE
  •  
  • Local time:03:06 AM

Posted 29 May 2010 - 12:03 AM

eset is scanning now...

hangs at 416 files scanned, tried twice, will try a third time and see if it gets off it, but was hung at that point for 10+minutes...

I have noticed an extreme slowdown in a flash based online game I play. could something we've done have affected the flash player?

could the same something be slowing both the flash player and eset?

Edited by bigdumbal, 29 May 2010 - 12:45 AM.


#15 bigdumbal

bigdumbal
  • Topic Starter

  • Members
  • 22 posts
  • OFFLINE
  •  
  • Local time:03:06 AM

Posted 29 May 2010 - 04:34 AM

C:\Documents and Settings\Alexander Kreider\DoctorWeb\Quarantine\3248d7a-227e8711 Java/TrojanDownloader.Agent.NAM trojan deleted - quarantined
C:\Documents and Settings\Alexander Kreider\DoctorWeb\Quarantine\48345e37-6e36e56f multiple threats deleted - quarantined
C:\Documents and Settings\Alexander Kreider\DoctorWeb\Quarantine\6eb74992-42e9c3d3 multiple threats deleted - quarantined
C:\Documents and Settings\Alexander Kreider\DoctorWeb\Quarantine\7075181f-27da2ae4 Java/TrojanDownloader.Agent.NAM trojan deleted - quarantined
C:\Documents and Settings\Alexander Kreider\DoctorWeb\Quarantine\7cd6d302-30d3be4a Java/TrojanDownloader.Agent.NAM trojan deleted - quarantined
C:\Qoobox\Quarantine\C\WINDOWS\system32\Drivers\asc.sys.vir Win32/Olmarik.ZC trojan cleaned - quarantined
C:\System Volume Information\_restore{6742B4A6-3600-42DD-A01B-B908D2B25349}\RP427\A0027792.exe a variant of Win32/Injector.BOH trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{6742B4A6-3600-42DD-A01B-B908D2B25349}\RP437\A0030186.sys a variant of Win32/Rootkit.Kryptik.AZ trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{6742B4A6-3600-42DD-A01B-B908D2B25349}\RP438\A0031347.sys a variant of Win32/Rootkit.Kryptik.AZ trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{6742B4A6-3600-42DD-A01B-B908D2B25349}\RP439\A0031398.sys a variant of Win32/Rootkit.Kryptik.AZ trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{6742B4A6-3600-42DD-A01B-B908D2B25349}\RP439\A0031400.sys a variant of Win32/Rootkit.Kryptik.AZ trojan cleaned by deleting - quarantined
C:\System Volume Information\_restore{6742B4A6-3600-42DD-A01B-B908D2B25349}\RP443\A0036686.sys Win32/Olmarik.ZC trojan cleaned - quarantined





0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users