Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Data protection/11 viruses found by Avira


  • This topic is locked This topic is locked
19 replies to this topic

#1 spbb05

spbb05

  • Members
  • 83 posts
  • OFFLINE
  •  
  • Local time:01:36 PM

Posted 24 May 2010 - 06:36 PM

One of my teens computer is infected. The laptop is a 4 year old Dell VOSTRO 1500 Windows XP Home Edition SP3. She accidentally clicked on an ad, windows started popping up and she closed them all. It appears it tried to installed programs.

We get a box with a red X titled" Data Protection" The text reads as follows - "Uncertified Avira AntiVir Desktop antivirus software detected on your computer. You need to remove Avira AntiVir Desktop software for the correct operation of Data Protection. Attention: If you don't remove Avira AntiVir Desktop software, the performance of your computer will dramatically degrade. Press OK to remove Avira AntiVir Desktop"

What I have done:
-Ran virus scan and Avira AntiVir Personal is detecting 11 viruses or unwanted programs.
-Ran CC Cleaner with all boxes checked and deleted all.
- I've turned off the resident tea timer function on Spybot S&D
-The computer has no internet access, ip addresses cannot be found for wireless or hardwired.We tried repairing connection with no success. All other computers on the home network access internet okay.

I downloaded and ran #6, 7 and 8 from a flash drive on the infected laptop.

I'm starting the Preparation Guide For Use Before Using Malware Removal Tools and Requesting Help at number 6. I'm also posting the Avira AntiVir at the end of the DDS.txt post.

Thank you for any help you can provide!




DDS (Ver_10-03-17.01) - NTFSx86
Run by Bri at 17:55:22.34 on Mon 05/24/2010
Internet Explorer: 7.0.5730.13 BrowserJavaVersion: 1.6.0_15
Microsoft Windows XP Home Edition 5.1.2600.3.1252.1.1033.18.1022.490 [GMT -5:00]

AV: AntiVir Desktop *On-access scanning enabled* (Updated) {AD166499-45F9-482A-A743-FDD3350758C7}
FW: COMODO Firewall Pro *disabled* {043803A3-4F86-4ef6-AFC5-F6E02A79969B}

============== Running Processes ===============

c:\windows\system32\svchost -k dcomlaunch
svchost.exe
c:\windows\system32\svchost.exe -k wudfservicegroup
C:\Program Files\Intel\Wireless\Bin\EvtEng.exe
C:\Program Files\Intel\Wireless\Bin\S24EvMon.exe
C:\Program Files\Intel\Wireless\Bin\WLKeeper.exe
svchost.exe
svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\Avira\AntiVir Desktop\sched.exe
svchost.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Avira\AntiVir Desktop\avguard.exe
C:\Program Files\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe
C:\Program Files\Bonjour\mDNSResponder.exe
C:\Program Files\Comodo\Firewall\cmdagent.exe
c:\windows\system32\svchost.exe -k netsvcs
C:\Program Files\Dell Network Assistant\hnm_svc.exe
C:\Program Files\Java\jre6\bin\jqs.exe
C:\WINDOWS\system32\nvsvc32.exe
C:\Program Files\Intel\Wireless\Bin\RegSrvc.exe
C:\Program Files\Common Files\Roxio Shared\9.0\SharedCOM\RoxWatch9.exe
c:\windows\system32\svchost.exe -k imgsvc
C:\Program Files\Synaptics\SynTP\SynTPEnh.exe
C:\WINDOWS\system32\rundll32.exe
C:\WINDOWS\system32\RUNDLL32.EXE
C:\Program Files\Java\jre6\bin\jusched.exe
C:\Program Files\Intel\Wireless\bin\ZCfgSvc.exe
C:\Program Files\Intel\Wireless\Bin\ifrmewrk.exe
C:\Program Files\Dell\QuickSet\quickset.exe
C:\WINDOWS\stsystra.exe
C:\WINDOWS\system32\KADxMain.exe
C:\Program Files\Common Files\InstallShield\UpdateService\issch.exe
C:\Program Files\Common Files\Roxio Shared\9.0\SharedCOM\RoxWatchTray9.exe
C:\Program Files\Roxio\Drag-to-Disc\DrgToDsc.exe
C:\Program Files\Dell\MediaDirect\PCMService.exe
C:\Program Files\Common Files\Real\Update_OB\realsched.exe
C:\Program Files\Avira\AntiVir Desktop\avgnt.exe
C:\Program Files\iTunes\iTunesHelper.exe
C:\WINDOWS\system32\ctfmon.exe
C:\DOCUME~1\Bri\LOCALS~1\Temp\wsdkrlxp.exe
C:\Program Files\Dell Network Assistant\ezi_hnm2.exe
C:\Program Files\Digital Line Detect\DLG.exe
C:\Program Files\Common Files\Roxio Shared\9.0\SharedCOM\RoxMediaDB9.exe
C:\DOCUME~1\Bri\LOCALS~1\Temp\wscsvc32.exe
C:\Program Files\Common Files\Roxio Shared\9.0\SharedCOM\CPSHelpRunner.exe
C:\Program Files\Intel\Wireless\Bin\Dot1XCfg.exe
C:\Program Files\iPod\bin\iPodService.exe
C:\DOCUME~1\Bri\LOCALS~1\Temp\asd3.tmp.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Documents and Settings\Bri\Desktop\dds.scr

============== Pseudo HJT Report ===============

uStart Page = hxxp://www.netflix.com/MemberHome
uSearch Bar =
uSearchMigratedDefaultURL = hxxp://www.google.com/search?q={searchTerms}&sourceid=ie7&rls=com.microsoft:en-US&ie=utf8&oe=utf8
mDefault_Page_URL = hxxp://www.dell.com
mDefault_Search_URL = hxxp://www.google.com/ie
mStart Page = hxxp://www.dell.com
uInternet Connection Wizard,ShellNext = iexplore
uInternet Settings,ProxyOverride = *.local
uSearchAssistant = hxxp://www.google.com/ie
uSearchURL,(Default) = hxxp://www.google.com/search?q=%s
mSearchAssistant = hxxp://www.google.com/hws/sb/dell-usuk/en/side.html?channel=us-smb
BHO: Adobe PDF Reader Link Helper: {06849e9f-c8d7-4d59-b87d-784b7d6be0b3} - c:\program files\adobe\acrobat 7.0\activex\AcroIEHelper.dll
BHO: RealPlayer Download and Record Plugin for Internet Explorer: {3049c3e9-b461-4bc5-8870-4c09146192ca} - c:\program files\real\realplayer\rpbrowserrecordplugin.dll
BHO: {53707962-6F74-2D53-2644-206D7942484F} - No File
BHO: CBrowserHelperObject Object: {ca6319c0-31b7-401e-a518-a07c3db8f777} - c:\program files\bae\BAE.dll
BHO: Java™ Plug-In 2 SSV Helper: {dbc80044-a445-435b-bc74-9c25c1c588a9} - c:\program files\java\jre6\bin\jp2ssv.dll
BHO: JQSIEStartDetectorImpl Class: {e7e6f031-17ce-4c07-bc86-eabfe594f69c} - c:\program files\java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll
uRun: [ctfmon.exe] c:\windows\system32\ctfmon.exe
uRun: [MSMSGS] "c:\program files\messenger\msmsgs.exe" /background
uRun: [wsdkrlxp.exe] c:\docume~1\bri\locals~1\temp\wsdkrlxp.exe
mRun: [SynTPEnh] c:\program files\synaptics\syntp\SynTPEnh.exe
mRun: [NvCplDaemon] RUNDLL32.EXE c:\windows\system32\NvCpl.dll,NvStartup
mRun: [nwiz] nwiz.exe /installquiet
mRun: [NVHotkey] rundll32.exe nvHotkey.dll,Start
mRun: [NvMediaCenter] RUNDLL32.EXE c:\windows\system32\NvMcTray.dll,NvTaskbarInit
mRun: [SunJavaUpdateSched] "c:\program files\java\jre6\bin\jusched.exe"
mRun: [IntelZeroConfig] "c:\program files\intel\wireless\bin\ZCfgSvc.exe"
mRun: [IntelWireless] "c:\program files\intel\wireless\bin\ifrmewrk.exe" /tf Intel PROSet/Wireless
mRun: [Dell QuickSet] c:\program files\dell\quickset\quickset.exe
mRun: [SigmatelSysTrayApp] stsystra.exe
mRun: [KADxMain] c:\windows\system32\KADxMain.exe
mRun: [ISUSPM Startup] c:\progra~1\common~1\instal~1\update~1\ISUSPM.exe -startup
mRun: [ISUSScheduler] "c:\program files\common files\installshield\updateservice\issch.exe" -start
mRun: [<NO NAME>]
mRun: [RoxWatchTray] "c:\program files\common files\roxio shared\9.0\sharedcom\RoxWatchTray9.exe"
mRun: [RoxioDragToDisc] "c:\program files\roxio\drag-to-disc\DrgToDsc.exe"
mRun: [PCMService] "c:\program files\dell\mediadirect\PCMService.exe"
mRun: [COMODO Firewall Pro] "c:\program files\comodo\firewall\CPF.exe" /background
mRun: [TkBellExe] "c:\program files\common files\real\update_ob\realsched.exe" -osboot
mRun: [avgnt] "c:\program files\avira\antivir desktop\avgnt.exe" /min
mRun: [QuickTime Task] "c:\program files\quicktime\QTTask.exe" -atboottime
mRun: [iTunesHelper] "c:\program files\itunes\iTunesHelper.exe"
StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\adober~1.lnk - c:\program files\adobe\acrobat 7.0\reader\reader_sl.exe
StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\dellne~1.lnk - c:\windows\installer\{0240bdfb-2995-4a3f-8c96-18d41282b716}\Icon0240BDFB3.exe
StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\digita~1.lnk - c:\program files\digital line detect\DLG.exe
uPolicies-system: DisableTaskMgr = 1 (0x1)
mPolicies-system: DisableTaskMgr = 1 (0x1)
IE: E&xport to Microsoft Excel - c:\progra~1\micros~2\office11\EXCEL.EXE/3000
IE: {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe
IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe
IE: {92780B25-18CC-41C8-B9BE-3C9C571A8263} - {FF059E31-CC5A-4E2E-BF3B-96E929D65503} - c:\progra~1\micros~2\office11\REFIEBAR.DLL
DPF: {05CA9FB0-3E3E-4B36-BF41-0E3A5CAA8CD8} - hxxp://go.microsoft.com/fwlink/?linkid=58813
DPF: {48DD0448-9209-4F81-9F6D-D83562940134} - hxxp://lads.myspace.com/upload/MySpaceUploader1006.cab
DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_15-windows-i586.cab
DPF: {8FFBE65D-2C9C-4669-84BD-5829DC0B603C} - hxxp://fpdownload.macromedia.com/get/flashplayer/current/polarbear/ultrashim.cab
DPF: {C7DB51B4-BCF7-4923-8874-7F1A0DC92277} - hxxp://office.microsoft.com/officeupdate/content/opuc4.cab
DPF: {CAFEEFAC-0015-0000-0006-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.5.0/jinstall-1_5_0_06-windows-i586.cab
DPF: {CAFEEFAC-0016-0000-0002-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_02-windows-i586.cab
DPF: {CAFEEFAC-0016-0000-0015-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_15-windows-i586.cab
DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_15-windows-i586.cab
SSODL: WPDShServiceObj - {AAA288BA-9A4C-45B0-95D7-94D524869DB5} - c:\windows\system32\WPDShServiceObj.dll
Hosts: 127.0.0.1 www.spywareinfo.com

================= FIREFOX ===================

FF - ProfilePath - c:\docume~1\bri\applic~1\mozilla\firefox\profiles\xv80raph.default\
FF - component: c:\program files\real\realplayer\browserrecord\firefox\ext\components\nprpffbrowserrecordext.dll
FF - plugin: c:\documents and settings\bri\application data\move networks\plugins\npqmp071503000010.dll
FF - plugin: c:\documents and settings\bri\application data\move networks\plugins\npqmp071505000011.dll
FF - HiddenExtension: Java Console: No Registry Reference - c:\program files\mozilla firefox\extensions\{CAFEEFAC-0016-0000-0015-ABCDEFFEDCBA}

============= SERVICES / DRIVERS ===============

R1 avgio;avgio;c:\program files\avira\antivir desktop\avgio.sys [2009-10-18 11608]
R2 AntiVirSchedulerService;Avira AntiVir Scheduler;c:\program files\avira\antivir desktop\sched.exe [2009-10-18 108289]
R2 AntiVirService;Avira AntiVir Guard;c:\program files\avira\antivir desktop\avguard.exe [2009-10-18 185089]
R2 avgntflt;avgntflt;c:\windows\system32\drivers\avgntflt.sys [2009-10-18 56816]
R2 CmdAgent;Comodo Application Agent;c:\program files\comodo\firewall\cmdagent.exe [2007-8-29 361040]

=============== Created Last 30 ================

2010-05-24 22:54:05 0 ----a-w- c:\documents and settings\bri\defogger_reenable
2010-05-24 12:31:58 0 d--h--w- c:\windows\PIF
2010-05-24 04:53:24 0 d-----w- c:\program files\Data Protection
2010-05-21 04:56:56 0 d-----w- c:\program files\iPod
2010-05-21 04:56:23 0 d-----w- c:\program files\iTunes
2010-05-21 04:56:23 0 d-----w- c:\docume~1\alluse~1\applic~1\{429CAD59-35B1-4DBC-BB6D-1DB246563521}
2010-05-21 04:46:07 0 d-----w- c:\program files\Bonjour
2010-05-13 12:27:14 173 ----a-w- c:\windows\system32\MRT.INI

==================== Find3M ====================

2010-05-21 04:11:41 91713 ----a-w- c:\windows\system32\nvModes.dat
2010-04-08 18:20:02 91424 ----a-w- c:\windows\system32\dnssd.dll
2010-04-08 18:20:02 107808 ----a-w- c:\windows\system32\dns-sd.exe
2010-03-10 13:18:21 13824 ------w- c:\windows\system32\dllcache\ieudinit.exe
2010-03-10 13:18:20 70656 ------w- c:\windows\system32\dllcache\ie4uinit.exe
2010-03-09 11:09:18 430080 ----a-w- c:\windows\system32\vbscript.dll
2010-03-09 11:09:18 430080 ------w- c:\windows\system32\dllcache\vbscript.dll
2010-02-24 13:11:07 455680 ------w- c:\windows\system32\dllcache\mrxsmb.sys
2008-07-19 00:35:41 32768 --sha-w- c:\windows\system32\config\systemprofile\local settings\history\history.ie5\mshist012008071820080719\index.dat

============= FINISH: 17:56:40.90 ===============


Here's the Avira AntiVir File....



Avira AntiVir Personal
Report file date: Monday, May 24, 2010 07:33

Scanning for 2148185 virus strains and unwanted programs.

Licensee : Avira AntiVir Personal - FREE Antivirus
Serial number : 0000149996-ADJIE-0000001
Platform : Windows XP
Windows version : (Service Pack 3) [5.1.2600]
Boot mode : Normally booted
Username : SYSTEM
Computer name : BRIANNA

Version information:
BUILD.DAT : 9.0.0.422 21701 Bytes 3/9/2010 10:29:00
AVSCAN.EXE : 9.0.3.10 466689 Bytes 11/21/2009 04:06:13
AVSCAN.DLL : 9.0.3.0 40705 Bytes 2/27/2009 16:58:24
LUKE.DLL : 9.0.3.2 209665 Bytes 2/20/2009 17:35:49
LUKERES.DLL : 9.0.2.0 12033 Bytes 2/27/2009 16:58:52
VBASE000.VDF : 7.10.0.0 19875328 Bytes 11/6/2009 04:06:12
VBASE001.VDF : 7.10.1.0 1372672 Bytes 11/19/2009 04:06:12
VBASE002.VDF : 7.10.3.1 3143680 Bytes 1/20/2010 05:38:39
VBASE003.VDF : 7.10.3.75 996864 Bytes 1/26/2010 06:04:54
VBASE004.VDF : 7.10.4.203 1579008 Bytes 3/5/2010 05:46:05
VBASE005.VDF : 7.10.6.82 2494464 Bytes 4/15/2010 04:43:22
VBASE006.VDF : 7.10.6.83 2048 Bytes 4/15/2010 04:43:22
VBASE007.VDF : 7.10.6.84 2048 Bytes 4/15/2010 04:43:22
VBASE008.VDF : 7.10.6.85 2048 Bytes 4/15/2010 04:43:23
VBASE009.VDF : 7.10.6.86 2048 Bytes 4/15/2010 04:43:23
VBASE010.VDF : 7.10.6.87 2048 Bytes 4/15/2010 04:43:23
VBASE011.VDF : 7.10.6.88 2048 Bytes 4/15/2010 04:43:23
VBASE012.VDF : 7.10.6.89 2048 Bytes 4/15/2010 04:43:23
VBASE013.VDF : 7.10.6.90 2048 Bytes 4/15/2010 04:43:24
VBASE014.VDF : 7.10.6.123 126464 Bytes 4/19/2010 04:43:10
VBASE015.VDF : 7.10.6.152 123392 Bytes 4/21/2010 04:43:18
VBASE016.VDF : 7.10.6.178 122880 Bytes 4/22/2010 04:43:28
VBASE017.VDF : 7.10.6.206 120320 Bytes 4/26/2010 04:44:00
VBASE018.VDF : 7.10.6.232 99328 Bytes 4/28/2010 14:08:57
VBASE019.VDF : 7.10.7.2 155648 Bytes 4/30/2010 14:56:56
VBASE020.VDF : 7.10.7.26 119808 Bytes 5/4/2010 05:22:57
VBASE021.VDF : 7.10.7.51 118272 Bytes 5/6/2010 05:22:58
VBASE022.VDF : 7.10.7.75 404992 Bytes 5/10/2010 05:25:17
VBASE023.VDF : 7.10.7.100 125440 Bytes 5/13/2010 05:42:40
VBASE024.VDF : 7.10.7.119 177664 Bytes 5/17/2010 06:08:16
VBASE025.VDF : 7.10.7.139 129024 Bytes 5/19/2010 06:10:30
VBASE026.VDF : 7.10.7.140 2048 Bytes 5/19/2010 06:10:31
VBASE027.VDF : 7.10.7.141 2048 Bytes 5/19/2010 06:10:31
VBASE028.VDF : 7.10.7.142 2048 Bytes 5/19/2010 06:10:31
VBASE029.VDF : 7.10.7.143 2048 Bytes 5/19/2010 06:10:31
VBASE030.VDF : 7.10.7.144 2048 Bytes 5/19/2010 06:10:31
VBASE031.VDF : 7.10.7.155 155648 Bytes 5/21/2010 06:12:35
Engineversion : 8.2.1.242
AEVDF.DLL : 8.1.2.0 106868 Bytes 4/24/2010 04:43:37
AESCRIPT.DLL : 8.1.3.29 1343866 Bytes 5/14/2010 05:40:29
AESCN.DLL : 8.1.6.1 127347 Bytes 5/14/2010 05:40:25
AESBX.DLL : 8.1.3.1 254324 Bytes 4/24/2010 04:43:38
AERDL.DLL : 8.1.4.6 541043 Bytes 4/16/2010 04:43:43
AEPACK.DLL : 8.2.1.1 426358 Bytes 3/19/2010 16:09:22
AEOFFICE.DLL : 8.1.1.0 201081 Bytes 5/14/2010 05:40:25
AEHEUR.DLL : 8.1.1.27 2670967 Bytes 5/8/2010 05:23:17
AEHELP.DLL : 8.1.11.3 242039 Bytes 4/6/2010 01:41:28
AEGEN.DLL : 8.1.3.9 377203 Bytes 5/14/2010 05:40:24
AEEMU.DLL : 8.1.2.0 393588 Bytes 4/24/2010 04:43:33
AECORE.DLL : 8.1.15.3 192886 Bytes 5/14/2010 05:40:22
AEBB.DLL : 8.1.1.0 53618 Bytes 4/24/2010 04:43:31
AVWINLL.DLL : 9.0.0.3 18177 Bytes 12/12/2008 14:47:59
AVPREF.DLL : 9.0.3.0 44289 Bytes 10/20/2009 04:43:46
AVREP.DLL : 8.0.0.7 159784 Bytes 2/18/2010 05:59:30
AVREG.DLL : 9.0.0.0 36609 Bytes 12/5/2008 16:32:09
AVARKT.DLL : 9.0.0.3 292609 Bytes 3/24/2009 21:05:41
AVEVTLOG.DLL : 9.0.0.7 167169 Bytes 1/30/2009 16:37:08
SQLITE3.DLL : 3.6.1.0 326401 Bytes 1/28/2009 21:03:49
SMTPLIB.DLL : 9.2.0.25 28417 Bytes 2/2/2009 14:21:33
NETNT.DLL : 9.0.0.0 11521 Bytes 12/5/2008 16:32:10
RCIMAGE.DLL : 9.0.0.25 2438913 Bytes 5/15/2009 21:39:58
RCTEXT.DLL : 9.0.73.0 86785 Bytes 11/21/2009 04:06:09

Configuration settings for the scan:
Jobname.............................: Complete system scan
Configuration file..................: c:\program files\avira\antivir desktop\sysscan.avp
Logging.............................: low
Primary action......................: interactive
Secondary action....................: ignore
Scan master boot sector.............: on
Scan boot sector....................: on
Boot sectors........................: C:,
Process scan........................: on
Scan registry.......................: on
Search for rootkits.................: on
Integrity checking of system files..: off
Scan all files......................: All files
Scan archives.......................: on
Recursion depth.....................: 20
Smart extensions....................: on
Macro heuristic.....................: on
File heuristic......................: medium

Start of the scan: Monday, May 24, 2010 07:33

Starting search for hidden objects.
\systemroot\pragmaueqradmbpx\pragmad.sys
[INFO] The registry entry is invisible.
HKEY_LOCAL_MACHINE\System\ControlSet001\Services\pragmaueqradmbpx
[INFO] The registry entry is invisible.
HKEY_LOCAL_MACHINE\System\ControlSet001\Services\CmdAgent\$%&'()*+,-./0123$%&'()*+,-./0123$%&'()*+,-./0123$%&'()*+,-./0123$%&'()*+,-./0123$%&'()*+,-./0123$%&'()*+,-./0123$%&'()*+,-./0123$%&'()*+,-./0123$%&'()*+,-./0123$%&'()*+,-./0123$%&'()*+,-./0123$%&'()*+,-./0123$%&'()*+,-./0123$%&'()*+,-./0123$%&'()*+,-./0123
[INFO] The registry entry is invisible.
HKEY_LOCAL_MACHINE\System\ControlSet001\Services\CmdMon\$%&'()*+,-./0123$%&'()*+,-./0123$%&'()*+,-./0123$%&'()*+,-./0123$%&'()*+,-./0123$%&'()*+,-./0123$%&'()*+,-./0123$%&'()*+,-./0123$%&'()*+,-./0123$%&'()*+,-./0123$%&'()*+,-./0123$%&'()*+,-./0123$%&'()*+,-./0123$%&'()*+,-./0123$%&'()*+,-./0123$%&'()*+,-./0123
[INFO] The registry entry is invisible.
HKEY_LOCAL_MACHINE\System\ControlSet001\Services\Inspect\$%&'()*+,-./0123$%&'()*+,-./0123$%&'()*+,-./0123$%&'()*+,-./0123$%&'()*+,-./0123$%&'()*+,-./0123$%&'()*+,-./0123$%&'()*+,-./0123$%&'()*+,-./0123$%&'()*+,-./0123$%&'()*+,-./0123$%&'()*+,-./0123$%&'()*+,-./0123$%&'()*+,-./0123$%&'()*+,-./0123$%&'()*+,-./0123
[INFO] The registry entry is invisible.
HKEY_LOCAL_MACHINE\System\ControlSet001\Services\pragmaueqradmbpx
[INFO] The registry entry is invisible.
HKEY_LOCAL_MACHINE\System\ControlSet001\Services\CmdAgent\$%&'()*+,-./0123$%&'()*+,-./0123$%&'()*+,-./0123$%&'()*+,-./0123$%&'()*+,-./0123$%&'()*+,-./0123$%&'()*+,-./0123$%&'()*+,-./0123$%&'()*+,-./0123$%&'()*+,-./0123$%&'()*+,-./0123$%&'()*+,-./0123$%&'()*+,-./0123$%&'()*+,-./0123$%&'()*+,-./0123$%&'()*+,-./0123
[INFO] The registry entry is invisible.
HKEY_LOCAL_MACHINE\System\ControlSet001\Services\CmdMon\$%&'()*+,-./0123$%&'()*+,-./0123$%&'()*+,-./0123$%&'()*+,-./0123$%&'()*+,-./0123$%&'()*+,-./0123$%&'()*+,-./0123$%&'()*+,-./0123$%&'()*+,-./0123$%&'()*+,-./0123$%&'()*+,-./0123$%&'()*+,-./0123$%&'()*+,-./0123$%&'()*+,-./0123$%&'()*+,-./0123$%&'()*+,-./0123
[INFO] The registry entry is invisible.
HKEY_LOCAL_MACHINE\System\ControlSet001\Services\Inspect\$%&'()*+,-./0123$%&'()*+,-./0123$%&'()*+,-./0123$%&'()*+,-./0123$%&'()*+,-./0123$%&'()*+,-./0123$%&'()*+,-./0123$%&'()*+,-./0123$%&'()*+,-./0123$%&'()*+,-./0123$%&'()*+,-./0123$%&'()*+,-./0123$%&'()*+,-./0123$%&'()*+,-./0123$%&'()*+,-./0123$%&'()*+,-./0123
[INFO] The registry entry is invisible.
'48160' objects were checked, '9' hidden objects were found.

The scan of running processes will be started
Scan process 'iexplore.exe' - '1' Module(s) have been scanned
Scan process 'avnotify.exe' - '1' Module(s) have been scanned
Scan process 'Dot1XCfg.exe' - '1' Module(s) have been scanned
Scan process 'avscan.exe' - '1' Module(s) have been scanned
Scan process 'avcenter.exe' - '1' Module(s) have been scanned
Scan process 'asd2.tmp.exe' - '1' Module(s) have been scanned
Scan process 'alg.exe' - '1' Module(s) have been scanned
Scan process 'CPSHelpRunner.exe' - '1' Module(s) have been scanned
Scan process 'iPodService.exe' - '1' Module(s) have been scanned
Scan process 'RoxMediaDB9.exe' - '1' Module(s) have been scanned
Scan process 'DLG.exe' - '1' Module(s) have been scanned
Scan process 'ezi_hnm2.exe' - '1' Module(s) have been scanned
Scan process 'wscsvc32.exe' - '1' Module(s) have been scanned
Scan process 'wmiprvse.exe' - '1' Module(s) have been scanned
Scan process 'wsdkrlxp.exe' - '1' Module(s) have been scanned
Scan process 'ctfmon.exe' - '1' Module(s) have been scanned
Scan process 'TeaTimer.exe' - '1' Module(s) have been scanned
Scan process 'iTunesHelper.exe' - '1' Module(s) have been scanned
Scan process 'avgnt.exe' - '1' Module(s) have been scanned
Scan process 'realsched.exe' - '1' Module(s) have been scanned
Scan process 'cpf.exe' - '1' Module(s) have been scanned
Scan process 'PCMService.exe' - '1' Module(s) have been scanned
Scan process 'DrgToDsc.exe' - '1' Module(s) have been scanned
Scan process 'RoxWatchTray9.exe' - '1' Module(s) have been scanned
Scan process 'issch.exe' - '1' Module(s) have been scanned
Scan process 'KADxMain.exe' - '1' Module(s) have been scanned
Scan process 'stsystra.exe' - '1' Module(s) have been scanned
Scan process 'quickset.exe' - '1' Module(s) have been scanned
Scan process 'iFrmewrk.exe' - '1' Module(s) have been scanned
Scan process 'ZCfgSvc.exe' - '1' Module(s) have been scanned
Scan process 'jusched.exe' - '1' Module(s) have been scanned
Scan process 'rundll32.exe' - '1' Module(s) have been scanned
Scan process 'rundll32.exe' - '1' Module(s) have been scanned
Scan process 'SynTPEnh.exe' - '1' Module(s) have been scanned
Scan process 'ctfmon.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'RoxWatch9.exe' - '1' Module(s) have been scanned
Scan process 'RegSrvc.exe' - '1' Module(s) have been scanned
Scan process 'nvsvc32.exe' - '1' Module(s) have been scanned
Scan process 'jqs.exe' - '1' Module(s) have been scanned
Scan process 'hnm_svc.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'cmdagent.exe' - '1' Module(s) have been scanned
Scan process 'mDNSResponder.exe' - '1' Module(s) have been scanned
Scan process 'AppleMobileDeviceService.exe' - '1' Module(s) have been scanned
Scan process 'avguard.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'sched.exe' - '1' Module(s) have been scanned
Scan process 'spoolsv.exe' - '1' Module(s) have been scanned
Scan process 'explorer.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'WLKEEPER.exe' - '1' Module(s) have been scanned
Scan process 'S24EvMon.exe' - '1' Module(s) have been scanned
Scan process 'EvtEng.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'lsass.exe' - '1' Module(s) have been scanned
Scan process 'services.exe' - '1' Module(s) have been scanned
Scan process 'winlogon.exe' - '1' Module(s) have been scanned
Scan process 'csrss.exe' - '1' Module(s) have been scanned
Scan process 'smss.exe' - '1' Module(s) have been scanned
63 processes with 63 modules were scanned

Starting master boot sector scan:
Master boot sector HD0
[INFO] No virus was found!

Start scanning boot sectors:
Boot sector 'C:\'
[INFO] No virus was found!

Starting to scan executable files (registry).
The registry was scanned ( '65' files ).


Starting the file scan:

Begin scan in 'C:\'
C:\hiberfil.sys
[WARNING] The file could not be opened!
[NOTE] This file is a Windows system file.
[NOTE] This file cannot be opened for scanning.
C:\pagefile.sys
[WARNING] The file could not be opened!
[NOTE] This file is a Windows system file.
[NOTE] This file cannot be opened for scanning.
C:\Documents and Settings\Bri\Application Data\Sun\Java\Deployment\cache\6.0\27\39a1255b-1ff826fe
[0] Archive type: ZIP
--> Uutecwv.class
[DETECTION] Contains recognition pattern of the JAVA/ClassLoad.IC.1 Java virus
C:\Documents and Settings\Bri\Application Data\Sun\Java\Deployment\cache\6.0\49\5aa25bf1-4ea0b152
[0] Archive type: ZIP
--> quote/Gmerrews.class
[DETECTION] Is the TR/Horse.CSU Trojan
--> quote/GReader.class
[DETECTION] Contains recognition pattern of the EXP/Java.Agent.F.6 exploit
C:\Documents and Settings\Bri\Application Data\Sun\Java\Deployment\cache\6.0\49\7e2f4ef1-30e3acf3
[0] Archive type: ZIP
--> sklif/Hieeyfc.class
[DETECTION] Contains recognition pattern of the JAVA/ClassLoade.I.1 Java virus
--> sklif/Hirwfee.class
[DETECTION] Contains recognition pattern of the JAVA/ClassLoad.IB.2 Java virus
C:\Documents and Settings\Bri\Local Settings\Temporary Internet Files\Content.IE5\2NW6GUWL\22f6ad[1].exe
[DETECTION] Is the TR/Meredrop.A.8021 Trojan
C:\System Volume Information\_restore{202550A8-7A33-4BCA-9586-051D24DDBF8F}\RP446\A0044769.dll
[DETECTION] Is the TR/Meredrop.A.8021 Trojan
C:\System Volume Information\_restore{202550A8-7A33-4BCA-9586-051D24DDBF8F}\RP447\A0044785.dll
[DETECTION] Is the TR/Meredrop.A.8021 Trojan
C:\System Volume Information\_restore{202550A8-7A33-4BCA-9586-051D24DDBF8F}\RP450\A0044893.dll
[DETECTION] Is the TR/Meredrop.A.8021 Trojan
C:\System Volume Information\_restore{202550A8-7A33-4BCA-9586-051D24DDBF8F}\RP451\A0044929.dll
[DETECTION] Is the TR/Meredrop.A.8021 Trojan
C:\System Volume Information\_restore{202550A8-7A33-4BCA-9586-051D24DDBF8F}\RP467\A0045883.exe
[DETECTION] Is the TR/Meredrop.A.8021 Trojan

Beginning disinfection:
C:\Documents and Settings\Bri\Application Data\Sun\Java\Deployment\cache\6.0\27\39a1255b-1ff826fe
[NOTE] The file was moved to '4c5b81ec.qua'!
C:\Documents and Settings\Bri\Application Data\Sun\Java\Deployment\cache\6.0\49\5aa25bf1-4ea0b152
[NOTE] The file was moved to '4c5b8214.qua'!
C:\Documents and Settings\Bri\Application Data\Sun\Java\Deployment\cache\6.0\49\7e2f4ef1-30e3acf3
[NOTE] The file was moved to '4c2c8218.qua'!
C:\Documents and Settings\Bri\Local Settings\Temporary Internet Files\Content.IE5\2NW6GUWL\22f6ad[1].exe
[DETECTION] Is the TR/Meredrop.A.8021 Trojan
[NOTE] The file was moved to '4c6081e6.qua'!
C:\System Volume Information\_restore{202550A8-7A33-4BCA-9586-051D24DDBF8F}\RP446\A0044769.dll
[DETECTION] Is the TR/Meredrop.A.8021 Trojan
[NOTE] The file was moved to '4c2a81e4.qua'!
C:\System Volume Information\_restore{202550A8-7A33-4BCA-9586-051D24DDBF8F}\RP447\A0044785.dll
[DETECTION] Is the TR/Meredrop.A.8021 Trojan
[NOTE] The file was moved to '4dcf038d.qua'!
C:\System Volume Information\_restore{202550A8-7A33-4BCA-9586-051D24DDBF8F}\RP450\A0044893.dll
[DETECTION] Is the TR/Meredrop.A.8021 Trojan
[NOTE] The file was moved to '4ffc59a5.qua'!
C:\System Volume Information\_restore{202550A8-7A33-4BCA-9586-051D24DDBF8F}\RP451\A0044929.dll
[DETECTION] Is the TR/Meredrop.A.8021 Trojan
[NOTE] The file was moved to '4dcd2bad.qua'!
C:\System Volume Information\_restore{202550A8-7A33-4BCA-9586-051D24DDBF8F}\RP467\A0045883.exe
[DETECTION] Is the TR/Meredrop.A.8021 Trojan
[NOTE] The file was moved to '4df64f3d.qua'!


End of the scan: Monday, May 24, 2010 08:40
Used time: 50:15 Minute(s)

The scan has been done completely.

7688 Scanned directories
350522 Files were scanned
11 Viruses and/or unwanted programs were found
0 Files were classified as suspicious
0 files were deleted
0 Viruses and unwanted programs were repaired
9 Files were moved to quarantine
0 Files were renamed
2 Files cannot be scanned
350509 Files not concerned
3480 Archives were scanned
2 Warnings
11 Notes
48160 Objects were scanned with rootkit scan
9 Hidden objects were found







Attached Files



BC AdBot (Login to Remove)

 


#2 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:06:36 PM

Posted 26 May 2010 - 04:18 PM

Hi,

Welcome to Bleeping Computer. My name is m0le and I will be helping you with your log.
  • Please subscribe to this topic, if you haven't already. You can subscribe by clicking the Options box to the right of your topic title and selecting Track This Topic.

  • Please avoid installing/uninstalling or updating any programs and attempting any unsupervised fixes or scans. This can make helping you impossible.

  • Please reply to this post so I know you are there.
The forum is busy and we need to have replies as soon as possible. If I haven't had a reply after 3 days I will bump the topic and if you do not reply by the following day after that then I will close the topic.

Once I receive a reply then I will return with your first instructions.

Thanks thumbup2.gif
Posted Image
m0le is a proud member of UNITE

#3 spbb05

spbb05
  • Topic Starter

  • Members
  • 83 posts
  • OFFLINE
  •  
  • Local time:01:36 PM

Posted 26 May 2010 - 05:48 PM

m0le - I'm ready anytime you are. The laptop has not been used since I posted above and still do not have internet access on the system.

Thanks for your help!



#4 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:06:36 PM

Posted 26 May 2010 - 06:12 PM

This is a rootkit called PRAGMA. It's quite new and still a bit unpredictable.

I will be using instructions which will be talking about downloading and running. All these programs can be downloaded and transferred onto the infected machine as you have done with Gmer and DDS.

Please download ComboFix from one of these locations:* IMPORTANT !!! Save ComboFix.exe to your Desktop making sure you rename it comfix.exe
  • Disable your AntiVirus and AntiSpyware applications, usually via a right click on the System Tray icon. They may otherwise interfere with our tools. (Click on this link to see a list of programs that should be disabled. The list is not all inclusive.)
  • Double click on Comfix.exe & follow the prompts.
  • As part of it's process, ComboFix will check to see if the Microsoft Windows Recovery Console is installed. With malware infections being as they are today, it's strongly recommended to have this pre-installed on your machine before doing any malware removal. It will allow you to boot up into a special recovery/repair mode that will allow us to more easily help you should your computer have a problem after an attempted removal of malware.
  • Follow the prompts to allow ComboFix to download and install the Microsoft Windows Recovery Console, and when prompted, agree to the End-User License Agreement to install the Microsoft Windows Recovery Console.
**Please note: If the Microsoft Windows Recovery Console is already installed, ComboFix will continue it's malware removal procedures.



Once the Microsoft Windows Recovery Console is installed using ComboFix, you should see the following message:



Click on Yes, to continue scanning for malware.

When finished, it shall produce a log for you. Please include the C:\ComboFix.txt in your next reply.
Posted Image
m0le is a proud member of UNITE

#5 spbb05

spbb05
  • Topic Starter

  • Members
  • 83 posts
  • OFFLINE
  •  
  • Local time:01:36 PM

Posted 26 May 2010 - 09:16 PM

m0le - I copied combofix and placed it on the desktop of the laptop. When I started the program i received the following warning:

"Warning!! Conbofix has detected the following real time scanners to be active:

antivirus: AntiVir Desktop

Antivirus and intrusion prevention programs are known to interfere with ComboFix's running. This may lead to unpredictable results or possible machine damage.

Please disable these scanners before clicking OK."

Before I copied ComboFix, I disabled AntiVir by unticking "AntiVir Guard enabled". I also disabled teatimer.

Should I proceed with combofix or is there someting else I can do to disable AntiVir?

Also,I read http://www.bleepingcomputer.com/combofix/how-to-use-combofix . In the link it talks about needing a live connection to install the Microsoft Recovery Console. is there a way I can do that from my other pc and copy to the infected laptop?

Edited by spbb05, 26 May 2010 - 09:22 PM.


#6 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:06:36 PM

Posted 27 May 2010 - 04:21 PM

ComboFix includes a method of installing the Windows Recovery console by downloading a file from Microsoft. Please follow these instructions:

1. On a clean computer click on the following link to go to Microsoft's Web site:

http://support.microsoft.com/kb/310994

2. At that page, scroll down and click on the appropriate download for your version of Windows XP (Home or Professional) and the service pack level that you have installed. When you click on the link to download the file, make sure you save it directly to your desktop. If you are using Windows XP Service Pack 3 (SP3), then select the Service Pack 2 download. If you are using Windows XP Media Center, then you should select the Windows XP Pro Service Pack 2 download.

3. Once the Microsoft file has finished downloading, you save it to the flashdrive. Drag the file on top of the ComboFix icon and let your mouse button go.

4. ComboFix will now automatically install the Windows Recovery Console onto your computer, which will show up as a new option when booting up your computer. Do not select the Windows Recovery Console option when you start your computer unless requested to by a helper.

Once the Windows Recovery Console has finished installed, ComboFix will open a prompt stating that it was installed and asking if you would like to proceed with scanning your computer. Press Yes and post the new log in your next reply. Then we should be clear to start fixing your computer.


Once that is done please run Combofix - the Antivir shouldn't be a problem.
Posted Image
m0le is a proud member of UNITE

#7 spbb05

spbb05
  • Topic Starter

  • Members
  • 83 posts
  • OFFLINE
  •  
  • Local time:01:36 PM

Posted 27 May 2010 - 05:30 PM

Thanks, I downloaded the Microsoft file and started ComboFix. ComboFix found the PRAGMA rootkit and it asked me to reboot the computer. When the computer started back up, AntiVir was enabled on start up and found a trojan file- C:\Qoobox\32788R22FWJFW\pcide.sys Is the TR/Patched.Gen Trojan
Its asking what we what to do with the file. The choices are- Repair, Move to quarantine, Delete, Rename, Deny access, and Ignore.
It also has a check box to 'Note action selected for this file (dangerous)'

What do I do next?

Thank you very much for your help!

#8 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:06:36 PM

Posted 27 May 2010 - 05:43 PM

You can actually ignore that file, it's in Combofix's quarantine folder.

Did you get a log from Combofix?
Posted Image
m0le is a proud member of UNITE

#9 spbb05

spbb05
  • Topic Starter

  • Members
  • 83 posts
  • OFFLINE
  •  
  • Local time:01:36 PM

Posted 27 May 2010 - 07:55 PM

Here is the file....


ComboFix 10-05-26.01 - Bri 05/27/2010 19:31:40.1.2 - x86
Microsoft Windows XP Home Edition 5.1.2600.3.1252.1.1033.18.1022.684 [GMT -5:00]
Running from: c:\documents and settings\Bri\Desktop\comfix.exe
Command switches used :: c:\documents and settings\Bri\Desktop\WindowsXP-KB310994-SP2-

Home-BootDisk-ENU.exe
AV: AntiVir Desktop *On-access scanning enabled* (Updated) {AD166499-45F9-482A-A743-

FDD3350758C7}
FW: COMODO Firewall Pro *disabled* {043803A3-4F86-4ef6-AFC5-F6E02A79969B}
* Created a new restore point
.

((((((((((((((((((((((((((((((((((((((( Other Deletions

)))))))))))))))))))))))))))))))))))))))))))))))))
.

c:\docume~1\Bri\LOCALS~1\Temp\wscsvc32.exe
c:\documents and settings\All Users\Application Data\pragmamfeklnmal.dll
c:\documents and settings\Bri\Desktop\nudetube.com.lnk
c:\documents and settings\Bri\Desktop\pornotube.com.lnk
c:\documents and settings\Bri\Desktop\spam001.exe
c:\documents and settings\Bri\Desktop\spam003.exe
c:\documents and settings\Bri\Desktop\troj000.exe
c:\documents and settings\Bri\Desktop\youporn.com.lnk
c:\program files\Data Protection
c:\windows\PRAGMAueqradmbpx
c:\windows\PRAGMAueqradmbpx\pragmabbr.dll
c:\windows\PRAGMAueqradmbpx\PRAGMAc.dll
c:\windows\PRAGMAueqradmbpx\PRAGMAcfg.ini
c:\windows\PRAGMAueqradmbpx\PRAGMAd.sys
c:\windows\PRAGMAueqradmbpx\pragmaserf.dll
c:\windows\PRAGMAueqradmbpx\PRAGMAsrcr.dat
c:\windows\system32\pragmasrcr.dat

.
((((((((((((((((((((((((((((((((((((((( Drivers/Services

)))))))))))))))))))))))))))))))))))))))))))))))))
.

-------\Service_PRAGMAueqradmbpx
-------\Legacy_PRAGMAueqradmbpx


((((((((((((((((((((((((( Files Created from 2010-04-28 to 2010-05-28

)))))))))))))))))))))))))))))))
.

2010-05-24 15:47 . 2010-05-24 15:47 -------- d-----w- c:\documents and

settings\Steve\Application Data\Apple Computer
2010-05-24 15:35 . 2010-05-24 15:35 -------- d-----w- c:\documents and

settings\Bri\Local Settings\Application Data\Help
2010-05-24 12:31 . 2010-05-24 12:31 -------- d--h--w- c:\windows\PIF
2010-05-23 05:25 . 2010-05-23 05:25 439816 ----a-w- c:\documents and

settings\Bri\Application Data\Real\Update\setup3.10\setup.exe
2010-05-21 04:56 . 2010-05-21 04:56 -------- d-----w- c:\program

files\iPod
2010-05-21 04:56 . 2010-05-21 04:58 -------- d-----w- c:\program

files\iTunes
2010-05-21 04:56 . 2010-05-21 04:58 -------- d-----w- c:\documents and

settings\All Users\Application Data\{429CAD59-35B1-4DBC-BB6D-1DB246563521}
2010-05-21 04:49 . 2010-05-21 04:49 -------- d-----w- c:\program

files\Apple Software Update
2010-05-21 04:46 . 2010-05-21 04:46 -------- d-----w- c:\program

files\Bonjour
2010-05-15 16:25 . 2010-05-15 16:25 -------- d-----w- c:\documents and

settings\NetworkService\Local Settings\Application Data\Adobe
2010-04-28 20:45 . 2010-04-28 20:45 73000 ----a-w- c:\documents and

settings\All Users\Application Data\Apple Computer\Installer Cache\iTunes 9.1.1.12

\SetupAdmin.exe

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report

))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2010-05-27 18:54 . 2007-08-22 11:43 -------- d---a-w- c:\documents and

settings\All Users\Application Data\TEMP
2010-05-24 14:52 . 2007-08-30 02:16 -------- d-----w- c:\documents and

settings\All Users\Application Data\Spybot - Search & Destroy
2010-05-24 11:10 . 2008-01-02 02:51 -------- d-----w- c:\documents and

settings\Bri\Application Data\Apple Computer
2010-05-21 04:56 . 2008-01-02 02:48 -------- d-----w- c:\program

files\Common Files\Apple
2010-05-21 04:52 . 2008-05-02 03:36 -------- d-----w- c:\program

files\QuickTime
2010-05-21 04:11 . 2007-08-22 11:15 91713 ----a-w- c:\windows\system32

\nvModes.dat
2010-04-17 19:31 . 2010-04-17 19:31 1956808 ----a-w- c:\documents and

settings\Steve\Application Data\Macromedia\Flash

Player\www.macromedia.com\bin\fpupdateax\fpupdateax.exe
2010-04-08 18:20 . 2010-04-08 18:20 91424 ----a-w- c:\windows\system32

\dnssd.dll
2010-04-08 18:20 . 2010-04-08 18:20 107808 ----a-w- c:\windows\system32\dns

-sd.exe
2010-03-11 12:38 . 2004-08-10 17:51 832512 ----a-w- c:\windows\system32

\wininet.dll
2010-03-11 12:38 . 2004-08-10 17:51 78336 ----a-w- c:\windows\system32

\ieencode.dll
2010-03-11 12:38 . 2004-08-10 17:50 17408 ----a-w- c:\windows\system32

\corpol.dll
2010-03-09 11:09 . 2004-08-10 17:51 430080 ----a-w- c:\windows\system32

\vbscript.dll
.

((((((((((((((((((((((((((((((((((((( Reg Loading Points

))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"SynTPEnh"="c:\program files\Synaptics\SynTP\SynTPEnh.exe" [2007-06-03 851968]
"NvCplDaemon"="c:\windows\system32\NvCpl.dll" [2007-06-06 8429568]
"nwiz"="nwiz.exe" [2007-06-06 1626112]
"NVHotkey"="nvHotkey.dll" [2007-06-06 67584]
"NvMediaCenter"="c:\windows\system32\NvMcTray.dll" [2007-06-06 81920]
"SunJavaUpdateSched"="c:\program files\Java\jre6\bin\jusched.exe" [2009-10-19 149280]
"IntelZeroConfig"="c:\program files\Intel\Wireless\bin\ZCfgSvc.exe" [2007-02-21 819200]
"IntelWireless"="c:\program files\Intel\Wireless\Bin\ifrmewrk.exe" [2007-02-21 970752]
"Dell QuickSet"="c:\program files\Dell\QuickSet\quickset.exe" [2007-05-14 1191936]
"SigmatelSysTrayApp"="stsystra.exe" [2007-06-06 405504]
"KADxMain"="c:\windows\system32\KADxMain.exe" [2006-11-02 282624]
"ISUSPM Startup"="c:\progra~1\COMMON~1\INSTAL~1\UPDATE~1\ISUSPM.exe" [2006-10-03 221184]
"ISUSScheduler"="c:\program files\Common Files\InstallShield\UpdateService\issch.exe"

[2006-10-03 81920]
"RoxWatchTray"="c:\program files\Common Files\Roxio Shared\9.0

\SharedCOM\RoxWatchTray9.exe" [2006-11-05 221184]
"RoxioDragToDisc"="c:\program files\Roxio\Drag-to-Disc\DrgToDsc.exe" [2006-08-17

1116920]
"PCMService"="c:\program files\Dell\MediaDirect\PCMService.exe" [2007-04-16 184320]
"COMODO Firewall Pro"="c:\program files\Comodo\Firewall\CPF.exe" [2007-08-30 1115728]
"TkBellExe"="c:\program files\Common Files\Real\Update_OB\realsched.exe" [2009-09-14

198160]
"avgnt"="c:\program files\Avira\AntiVir Desktop\avgnt.exe" [2009-03-02 209153]
"QuickTime Task"="c:\program files\QuickTime\QTTask.exe" [2010-03-18 421888]
"iTunesHelper"="c:\program files\iTunes\iTunesHelper.exe" [2010-04-28 142120]

c:\documents and settings\All Users\Start Menu\Programs\Startup\
Adobe Reader Speed Launch.lnk - c:\program files\Adobe\Acrobat 7.0\Reader\reader_sl.exe

[2005-9-23 29696]
Dell Network Assistant.lnk - c:\windows\Installer\{0240BDFB-2995-4A3F-8C96-

18D41282B716}\Icon0240BDFB3.exe [2007-8-22 7168]
Digital Line Detect.lnk - c:\program files\Digital Line Detect\DLG.exe [2007-8-22 50688]

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]
"EnableFirewall"= 0 (0x0)
"DisableNotifications"= 1 (0x1)

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplic

ations\List]
"%windir%\\system32\\sessmgr.exe"=
"c:\\Program Files\\Dell\\MediaDirect\\PCMService.exe"=
"c:\\Program Files\\Dell Network Assistant\\ezi_hnm2.exe"=
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"c:\\Program Files\\Bonjour\\mDNSResponder.exe"=
"c:\\Program Files\\iTunes\\iTunes.exe"=

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\GloballyOpenPort

s\List]
"10421:UDP"= 10421:UDP:SingleClick Discovery Protocol
"10426:UDP"= 10426:UDP:SingleClick ICC

R2 AntiVirSchedulerService;Avira AntiVir Scheduler;c:\program files\Avira\AntiVir

Desktop\sched.exe [10/18/2009 8:39 PM 108289]
.
Contents of the 'Scheduled Tasks' folder

2010-05-21 c:\windows\Tasks\AppleSoftwareUpdate.job
- c:\program files\Apple Software Update\SoftwareUpdate.exe [2009-10-22 16:50]
.
.
------- Supplementary Scan -------
.
uStart Page = hxxp://www.netflix.com/MemberHome
uSearchMigratedDefaultURL = hxxp://www.google.com/search?q={searchTerms}

&sourceid=ie7&rls=com.microsoft:en-US&ie=utf8&oe=utf8
mStart Page = hxxp://www.dell.com
uInternet Connection Wizard,ShellNext = iexplore
uInternet Settings,ProxyOverride = *.local
uSearchAssistant = hxxp://www.google.com/ie
uSearchURL,(Default) = hxxp://www.google.com/search?q=%s
IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~2\OFFICE11\EXCEL.EXE/3000
FF - ProfilePath - c:\documents and settings\Bri\Application

Data\Mozilla\Firefox\Profiles\xv80raph.default\
FF - component: c:\program

files\Real\RealPlayer\browserrecord\firefox\ext\components\nprpffbrowserrecordext.dll
FF - plugin: c:\documents and settings\Bri\Application Data\Move

Networks\plugins\npqmp071503000010.dll
FF - plugin: c:\documents and settings\Bri\Application Data\Move

Networks\plugins\npqmp071505000011.dll
.

**************************************************************************

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer,

http://www.gmer.net
Rootkit scan 2010-05-27 19:42
Windows 5.1.2600 Service Pack 3 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully
hidden files: 0

**************************************************************************

Stealth MBR rootkit/Mebroot/Sinowal detector 0.3.7 by Gmer, http://www.gmer.net

device: opened successfully
user: MBR read successfully
called modules: ntkrnlpa.exe catchme.sys CLASSPNP.SYS disk.sys >>UNKNOWN [0x870F3EE4]<<
kernel: MBR read successfully
detected MBR rootkit hooks:
\Driver\Disk -> CLASSPNP.SYS @ 0xf75d6f28
\Driver\ACPI -> ACPI.sys @ 0xf7469cb8
\Driver\atapi -> atapi.sys @ 0xf7421852
\Driver\iaStor -> iaStor.sys @ 0xf7366c1a
IoDeviceObjectType -> DeleteProcedure -> ntkrnlpa.exe @ 0x805836a8
ParseProcedure -> ntkrnlpa.exe @ 0x805827e8
\Device\Harddisk0\DR0 -> DeleteProcedure -> ntkrnlpa.exe @ 0x805836a8
ParseProcedure -> ntkrnlpa.exe @ 0x805827e8
user & kernel MBR OK

**************************************************************************
.
--------------------- DLLs Loaded Under Running Processes ---------------------

- - - - - - - > 'winlogon.exe'(908)
c:\windows\system32\WININET.dll

- - - - - - - > 'lsass.exe'(968)
c:\windows\system32\WININET.dll
.
Completion time: 2010-05-27 19:46:43
ComboFix-quarantined-files.txt 2010-05-28 00:46

Pre-Run: 90,716,872,704 bytes free
Post-Run: 90,779,881,472 bytes free

WindowsXP-KB310994-SP2-Home-BootDisk-ENU.exe
[boot loader]
timeout=2
default=multi(0)disk(0)rdisk(0)partition(2)\WINDOWS
[operating systems]
c:\cmdcons\BOOTSECT.DAT="Microsoft Windows Recovery Console" /cmdcons
multi(0)disk(0)rdisk(0)partition(2)\WINDOWS="Microsoft Windows XP Home Edition"

/noexecute=optin /fastdetect

- - End Of File - - 88946491DB13A6853E970CC72AEFB673


#10 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:06:36 PM

Posted 27 May 2010 - 07:59 PM

That seems to have removed the PRAGMA rootkit. Lovely file names it has, eh? ohmy.gif

Please run MBAM next

Please download Malwarebytes Anti-Malware and save it to your desktop.
  • Make sure you are connected to the Internet.
  • Double-click on mbam-setup.exe to install the application or, if you are using Vista, right-click and select Run As Administrator on mbam-setup.exe to install the application.
  • When the installation begins, follow the prompts and do not make any changes to default settings.
  • When installation has finished, make sure you leave both of these checked:
    • Update Malwarebytes' Anti-Malware
    • Launch Malwarebytes' Anti-Malware
  • Then click Finish.
  • MBAM will automatically start and you will be asked to update the program before performing a scan. If an update is found, the program will automatically update itself. Press the OK button to close that box and continue. If you encounter any problems while downloading the updates, manually download them from here and just double-click on mbam-rules.exe to install.
  • On the Scanner tab:
    • Make sure the "Perform Full Scan" option is selected.
    • Then click on the Scan button.
  • If asked to select the drives to scan, leave all the drives selected and click on the Start Scan button.
  • The scan will begin and "Scan in progress" will show at the top. It may take some time to complete so please be patient.
  • When the scan is finished, a message box will say "The scan completed successfully. Click 'Show Results' to display all objects found".
  • Click OK to close the message box and continue with the removal process.
  • Back at the main Scanner screen, click on the Show Results button to see a list of any malware that was found.
  • Make sure that everything is checked, and click Remove Selected.
  • When removal is completed, a log report will open in Notepad.
  • The log is automatically saved and can be viewed by clicking the Logs tab in MBAM.
  • Copy and paste the contents of that report in your next reply and exit MBAM.
Note: If MBAM encounters a file that is difficult to remove, you may be asked to reboot your computer so it can proceed with the disinfection process. Regardless if prompted to restart the computer or not, please do so immediately. Failure to reboot normally (not into safe mode) will prevent MBAM from removing all the malware. MBAM may make changes to your registry as part of its disinfection routine. If you're using other security programs that detect registry changes, they may alert you after scanning with MBAM. Please permit the program to allow the changes.
Posted Image
m0le is a proud member of UNITE

#11 spbb05

spbb05
  • Topic Starter

  • Members
  • 83 posts
  • OFFLINE
  •  
  • Local time:01:36 PM

Posted 27 May 2010 - 08:12 PM

They are crazy! It looks like we need internet access for the Malware Bytes; I still can not get a connection. What should I do?

Edited by spbb05, 27 May 2010 - 08:17 PM.


#12 spbb05

spbb05
  • Topic Starter

  • Members
  • 83 posts
  • OFFLINE
  •  
  • Local time:01:36 PM

Posted 27 May 2010 - 08:56 PM

We have internet connection and will begin the download!

Thank you!

#13 spbb05

spbb05
  • Topic Starter

  • Members
  • 83 posts
  • OFFLINE
  •  
  • Local time:01:36 PM

Posted 27 May 2010 - 10:25 PM

Malwarebytes' Anti-Malware 1.46
www.malwarebytes.org

Database version: 4150

Windows 5.1.2600 Service Pack 3
Internet Explorer 7.0.5730.13

5/27/2010 10:22:31 PM
mbam-log-2010-05-27 (22-22-31).txt

Scan type: Full scan (C:\|D:\|)
Objects scanned: 177504
Time elapsed: 59 minute(s), 22 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 1
Folders Infected: 0
Files Infected: 6

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Clients\StartMenuInternet\FIREFOX.EXE\shell\safemode\command\(default) (Hijack.StartMenuInternet) -> Bad: ("C:\Documents and Settings\Bri\Local Settings\Application Data\ave.exe" /START "C:\Program Files\Mozilla Firefox\firefox.exe" -safe-mode) Good: (firefox.exe -safe-mode) -> Quarantined and deleted successfully.

Folders Infected:
(No malicious items detected)

Files Infected:
C:\Qoobox\Quarantine\C\WINDOWS\PRAGMAueqradmbpx\pragmabbr.dll.vir (Malware.Packer.Gen) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\PRAGMAueqradmbpx\PRAGMAc.dll.vir (Malware.Packer.Gen) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\PRAGMAueqradmbpx\pragmaserf.dll.vir (Malware.Packer.Gen) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{202550A8-7A33-4BCA-9586-051D24DDBF8F}\RP479\A0051966.dll (Malware.Packer.Gen) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{202550A8-7A33-4BCA-9586-051D24DDBF8F}\RP479\A0051967.dll (Malware.Packer.Gen) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{202550A8-7A33-4BCA-9586-051D24DDBF8F}\RP479\A0051968.dll (Malware.Packer.Gen) -> Quarantined and deleted successfully.


#14 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:06:36 PM

Posted 28 May 2010 - 04:34 PM

Can you do a MBAM quick scan. This should be clear now. smile.gif
Posted Image
m0le is a proud member of UNITE

#15 spbb05

spbb05
  • Topic Starter

  • Members
  • 83 posts
  • OFFLINE
  •  
  • Local time:01:36 PM

Posted 28 May 2010 - 05:26 PM

It seems to be working pretty good now! Here's the scan -


Malwarebytes' Anti-Malware 1.46
www.malwarebytes.org

Database version: 4150

Windows 5.1.2600 Service Pack 3
Internet Explorer 7.0.5730.13

5/28/2010 5:21:54 PM
mbam-log-2010-05-28 (17-21-54).txt

Scan type: Quick scan
Objects scanned: 128024
Time elapsed: 6 minute(s), 49 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 0

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
(No malicious items detected)





0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users