Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Search Re-direct Virus


  • This topic is locked This topic is locked
11 replies to this topic

#1 oface

oface

  • Members
  • 32 posts
  • OFFLINE
  •  
  • Local time:03:39 AM

Posted 19 June 2010 - 08:52 PM

Hellow thewall! I have a search re-direct virus. I could not run GMER, it BSOD'ed on me 3 times while it was running. Here is the the DDS log:



DDS (Ver_10-03-17.01) - NTFSx86
Run by Oleg at 20:05:42.70 on Sat 06/19/2010
Internet Explorer: 6.0.2900.5512
Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.2046.1427 [GMT -5:00]

AV: McAfee VirusScan *On-access scanning disabled* (Updated) {84B5EE75-6421-4CDE-A33A-DD43BA9FAD83}
FW: McAfee Personal Firewall *enabled* {94894B63-8C7F-4050-BDA4-813CA00DA3E8}

============== Running Processes ===============

C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\system32\svchost -k DcomLaunch
C:\WINDOWS\system32\svchost -k rpcss
C:\WINDOWS\System32\svchost.exe -k netsvcs
C:\WINDOWS\system32\svchost.exe -k NetworkService
C:\WINDOWS\system32\svchost.exe -k LocalService
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\Java\jre6\bin\jusched.exe
C:\Program Files\Intel\Intel Matrix Storage Manager\iaanotif.exe
C:\Program Files\Intel\Modem Event Monitor\IntelMEM.exe
C:\Program Files\Creative\SBAudigy2ZS\Surround Mixer\CTSysVol.exe
C:\Program Files\Creative\SBAudigy2ZS\DVDAudio\CTDVDDET.EXE
C:\WINDOWS\system32\CTHELPER.EXE
C:\WINDOWS\system32\dla\tfswctrl.exe
C:\Program Files\Common Files\InstallShield\UpdateService\issch.exe
C:\Program Files\Dell\Media Experience\DMXLauncher.exe
C:\Program Files\CyberLink\PowerDVD\DVDLauncher.exe
C:\Program Files\McAfee.com\Agent\mcagent.exe
C:\Program Files\iTunes\iTunesHelper.exe
C:\Program Files\Messenger\msmsgs.exe
C:\WINDOWS\system32\svchost.exe -k LocalService
C:\Program Files\DellSupport\DSAgnt.exe
C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
C:\WINDOWS\system32\CTsvcCDA.EXE
C:\WINDOWS\System32\svchost.exe -k HTTPFilter
C:\Program Files\Intel\Intel Matrix Storage Manager\iaantmon.exe
C:\Program Files\Java\jre6\bin\jqs.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\PROGRA~1\Nero\data\Xtras\mssysmgr.exe
C:\PROGRA~1\McAfee\MSC\mcmscsvc.exe
C:\Program Files\Windows Media Player\WMPNSCFG.exe
C:\WINDOWS\system32\rundll32.exe
C:\Program Files\Adobe\Acrobat 6.0\Distillr\acrotray.exe
C:\PROGRA~1\McAfee\VIRUSS~1\mcshield.exe
C:\Program Files\WinZip\WZQKPICK.EXE
C:\Program Files\Sony\Sony Picture Utility\VolumeWatcher\SPUVolumeWatcher.exe
C:\Program Files\McAfee\MPF\MPFSrv.exe
C:\Program Files\Comcast\Desktop Doctor\bin\sprtsvc.exe
C:\Program Files\Dell Support Center\bin\sprtsvc.exe
C:\WINDOWS\system32\svchost.exe -k imgsvc
C:\WINDOWS\system32\fxssvc.exe
C:\Program Files\Windows Media Player\WMPNetwk.exe
C:\Program Files\iPod\bin\iPodService.exe
C:\WINDOWS\System32\alg.exe
C:\PROGRA~1\McAfee\VIRUSS~1\mcsysmon.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Documents and Settings\Oleg\Local Settings\Application Data\Google\Chrome\Application\chrome.exe
C:\Documents and Settings\Oleg\Local Settings\Application Data\Google\Chrome\Application\chrome.exe
C:\PROGRA~1\BXNEWF~1\bxExpHelper.exe
C:\Documents and Settings\Oleg\Desktop\dds.scr
C:\WINDOWS\system32\wbem\wmiprvse.exe

============== Pseudo HJT Report ===============

uStart Page = hxxp://www.google.com/
uSearch Bar = hxxp://www.google.com/ie
uDefault_Page_URL = hxxp://www.dell4me.com/myway
uWindow Title = Windows Internet Explorer provided by Comcast
mStart Page = hxxp://www.comcast.net/
mWindow Title = Windows Internet Explorer provided by Comcast
uSearchAssistant = hxxp://www.google.com/ie
uSearchURL,(Default) = hxxp://www.google.com/search?q=%s
uURLSearchHooks: H - No File
BHO: AcroIEHlprObj Class: {06849e9f-c8d7-4d59-b87d-784b7d6be0b3} - c:\program files\adobe\acrobat 6.0\acrobat\activex\AcroIEHelper.dll
BHO: bxNewFolder: {51c8bca8-2524-4523-bf09-738c4eebfc58} - c:\progra~1\bxnewf~1\BXNEWF~1.DLL
BHO: DriveLetterAccess: {5ca3d70e-1895-11cf-8e15-001234567890} - c:\windows\system32\dla\tfswshx.dll
BHO: Java™ Plug-In SSV Helper: {761497bb-d6f0-462c-b6eb-d4daf1d92d43} - c:\program files\java\jre6\bin\ssv.dll
BHO: scriptproxy: {7db2d5a0-7241-4e79-b68d-6309f01c5231} - c:\program files\mcafee\virusscan\scriptsn.dll
BHO: AcroIEToolbarHelper Class: {ae7cd045-e861-484f-8273-0445ee161910} - c:\program files\adobe\acrobat 6.0\acrobat\AcroIEFavClient.dll
BHO: Java™ Plug-In 2 SSV Helper: {dbc80044-a445-435b-bc74-9c25c1c588a9} - c:\program files\java\jre6\bin\jp2ssv.dll
BHO: JQSIEStartDetectorImpl Class: {e7e6f031-17ce-4c07-bc86-eabfe594f69c} - c:\program files\java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll
BHO: EpsonToolBandKicker Class: {e99421fb-68dd-40f0-b4ac-b7027cae2f1a} - c:\program files\epson\epson web-to-page\EPSON Web-To-Page.dll
TB: EPSON Web-To-Page: {ee5d279f-081b-4404-994d-c6b60aaeba6d} - c:\program files\epson\epson web-to-page\EPSON Web-To-Page.dll
TB: Adobe PDF: {47833539-d0c5-4125-9fa8-0819e2eaac93} - c:\program files\adobe\acrobat 6.0\acrobat\AcroIEFavClient.dll
EB: Adobe PDF: {182ec0be-5110-49c8-a062-beb1d02a220b} - c:\program files\adobe\acrobat 6.0\acrobat\AcroIEFavClient.dll
uRun: [MSMSGS] "c:\program files\messenger\msmsgs.exe" /background
uRun: [BgMonitor_{79662E04-7C6C-4d9f-84C7-88D8A56B10AA}] "c:\program files\common files\ahead\lib\NMBgMonitor.exe"
uRun: [DellSupport] "c:\program files\dellsupport\DSAgnt.exe" /startup
uRun: [DellSupportCenter] "c:\program files\dell support center\bin\sprtcmd.exe" /P DellSupportCenter
uRun: [Google Update] "c:\documents and settings\oleg\local settings\application data\google\update\GoogleUpdate.exe" /c
uRun: [PhotoShow Deluxe Media Manager] c:\progra~1\nero\data\xtras\mssysmgr.exe
uRun: [WMPNSCFG] c:\program files\windows media player\WMPNSCFG.exe
uRun: [{764E28DD-9460-A959-8CFC-BE7FAE0528F8}] "c:\documents and settings\oleg\application data\peev\ivynt.exe"
uRun: [Eretuqazefijo] rundll32.exe "c:\windows\skycsi.dll",Startup
mRun: [SunJavaUpdateSched] "c:\program files\java\jre6\bin\jusched.exe"
mRun: [IAAnotif] c:\program files\intel\intel matrix storage manager\iaanotif.exe
mRun: [ATIPTA] c:\program files\ati technologies\ati control panel\atiptaxx.exe
mRun: [IntelMeM] c:\program files\intel\modem event monitor\IntelMEM.exe
mRun: [CTSysVol] c:\program files\creative\sbaudigy2zs\surround mixer\CTSysVol.exe /r
mRun: [CTDVDDET] "c:\program files\creative\sbaudigy2zs\dvdaudio\CTDVDDET.EXE"
mRun: [CTHelper] CTHELPER.EXE
mRun: [UpdReg] c:\windows\UpdReg.EXE
mRun: [dla] c:\windows\system32\dla\tfswctrl.exe
mRun: [ISUSPM Startup] c:\progra~1\common~1\instal~1\update~1\ISUSPM.exe -startup
mRun: [ISUSScheduler] "c:\program files\common files\installshield\updateservice\issch.exe" -start
mRun: [DMXLauncher] c:\program files\dell\media experience\DMXLauncher.exe
mRun: [tgcmd] "c:\program files\support.com\bin\tgcmd.exe" /server
mRun: [DVDLauncher] "c:\program files\cyberlink\powerdvd\DVDLauncher.exe"
mRun: [mcagent_exe] "c:\program files\mcafee.com\agent\mcagent.exe" /runkey
mRun: [dscactivate] "c:\program files\dell support center\gs_agent\custom\dsca.exe"
mRun: [QuickTime Task] "c:\program files\quicktime\qttask.exe" -atboottime
mRun: [iTunesHelper] "c:\program files\itunes\iTunesHelper.exe"
mRun: [DellSupportCenter] "c:\program files\dell support center\bin\sprtcmd.exe" /P DellSupportCenter
mRun: [ddoctorv2] "c:\program files\comcast\desktop doctor\bin\sprtcmd.exe" /P ddoctorv2
mRun: [<NO NAME>]
mRun: [NeroFilterCheck] c:\windows\system32\NeroCheck.exe
mRun: [KernelFaultCheck] %systemroot%\system32\dumprep 0 -k
mRun: [Acivufutufu] rundll32.exe "c:\windows\urugapojuyibox.dll",Startup
StartupFolder: c:\docume~1\oleg\startm~1\programs\startup\fotkid~1.lnk - c:\program files\fotki desktop\fotki.exe
StartupFolder: c:\docume~1\oleg\startm~1\programs\startup\pictur~1.lnk - c:\program files\sony\sony picture utility\volumewatcher\SPUVolumeWatcher.exe
StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\acroba~1.lnk - c:\program files\adobe\acrobat 6.0\distillr\acrotray.exe
StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\adober~1.lnk - c:\program files\adobe\acrobat 7.0\reader\reader_sl.exe
StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\winzip~1.lnk - c:\program files\winzip\WZQKPICK.EXE
mPolicies-system: EnableLUA = 0 (0x0)
IE: E&xport to Microsoft Excel - c:\progra~1\micros~4\office11\EXCEL.EXE/3000
IE: {669B269B-0D4E-41FB-A3D8-FD67CA94F646} - http://www.comcast.net/
IE: {8828075D-D097-4055-AA02-2DBFA9D85E8A} - http://www.comcastsupport.com/
IE: {97809617-3937-4F84-B335-9BB05EF1A8D4} - http://online.comcast.net/help/
IE: {CD67F990-D8E9-11d2-98FE-00C0F0318AFE}
IE: {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe
IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe
IE: {92780B25-18CC-41C8-B9BE-3C9C571A8263} - {FF059E31-CC5A-4E2E-BF3B-96E929D65503} - c:\progra~1\micros~4\office11\REFIEBAR.DLL
DPF: {166B1BCA-3F9C-11CF-8075-444553540000} - hxxp://download.macromedia.com/pub/shockwave/cabs/director/sw.cab
DPF: {17492023-C23A-453E-A040-C7C580BBF700} - hxxp://go.microsoft.com/fwlink/?linkid=39204
DPF: {264AED84-12F1-4CA1-8AA7-EB939AE58D8D} - hxxps://208.4.152.34/CACHE/webvpn/stc/1/binaries/stcweb.cab
DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} - hxxp://www.update.microsoft.com/microsoftupdate/v6/V5Controls/en/x86/client/muweb_site.cab?1181672852328
DPF: {8100D56A-5661-482C-BEE8-AFECE305D968} - hxxp://upload.facebook.com/controls/2009.07.28_v5.5.8.1/FacebookPhotoUploader55.cab
DPF: {832BF1DE-74EE-4FA6-AC05-63EA5D374403} - hxxps://relativity.legisdiscovery.com/Relativity/ActiveX/webclientmanager.cab
DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_11-windows-i586.cab
DPF: {CAFEEFAC-0014-0002-0003-ABCDEFFEDCBA} - hxxp://java.sun.com/products/plugin/autodl/jinstall-142-windows-i586.cab
DPF: {CAFEEFAC-0015-0000-0006-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.5.0/jinstall-1_5_0_06-windows-i586.cab
DPF: {CAFEEFAC-0015-0000-0011-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.5.0/jinstall-1_5_0_11-windows-i586.cab
DPF: {CAFEEFAC-0016-0000-0002-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_02-windows-i586.cab
DPF: {CAFEEFAC-0016-0000-0003-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_03-windows-i586.cab
DPF: {CAFEEFAC-0016-0000-0007-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_07-windows-i586.cab
DPF: {CAFEEFAC-0016-0000-0011-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_11-windows-i586.cab
DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_11-windows-i586.cab
DPF: {D64CF6D4-45DF-4D8F-9F14-E65FADF2777C} - hxxp://www.dvrstation.com/pdvratl.cab
DPF: {E06E2E99-0AA1-11D4-ABA6-0060082AA75C} - hxxps://legisdiscovery.webex.com/client/T27L/support/ieatgpc.cab
DPF: {E2883E8F-472F-4FB0-9522-AC9BF37916A7} - hxxp://platformdl.adobe.com/NOS/getPlusPlus/1.6/gp.cab
TCP: NameServer = 93.188.163.49,93.188.161.197
TCP: {36C18004-F09B-4F34-88DA-435B4A836DFA} = 93.188.163.49,93.188.161.197
SSODL: WPDShServiceObj - {AAA288BA-9A4C-45B0-95D7-94D524869DB5} - c:\windows\system32\WPDShServiceObj.dll
LSA: Notification Packages = scecli skycsi.dll

============= SERVICES / DRIVERS ===============

P2 McShield;McAfee Real-time Scanner;c:\progra~1\mcafee\viruss~1\mcshield.exe [2007-1-20 144704]
R1 mfehidk;McAfee Inc. mfehidk;c:\windows\system32\drivers\mfehidk.sys [2007-1-20 214664]
R3 McSysmon;McAfee SystemGuards;c:\progra~1\mcafee\viruss~1\mcsysmon.exe [2007-1-20 606736]
R3 mfeavfk;McAfee Inc. mfeavfk;c:\windows\system32\drivers\mfeavfk.sys [2007-1-20 79816]
R3 mfebopk;McAfee Inc. mfebopk;c:\windows\system32\drivers\mfebopk.sys [2007-1-20 35272]
R3 mfesmfk;McAfee Inc. mfesmfk;c:\windows\system32\drivers\mfesmfk.sys [2007-1-20 40552]
S2 McProxy;McAfee Proxy Service;c:\progra~1\common~1\mcafee\mcproxy\mcproxy.exe [2007-8-1 359952]
S3 CSVirtA;Cisco Systems SSL VPN Adapter;c:\windows\system32\drivers\csvirta.sys --> c:\windows\system32\drivers\CSVirtA.sys [?]
S3 mferkdk;McAfee Inc. mferkdk;c:\windows\system32\drivers\mferkdk.sys [2007-1-20 34248]

=============== Created Last 30 ================

2010-06-20 01:03:31 0 ----a-w- c:\documents and settings\oleg\defogger_reenable
2010-06-05 15:28:56 472007 ----a-r- C:\txtsetup.sif
2010-06-05 15:28:56 260272 ----a-r- C:\$LDR$
2010-06-05 15:28:44 0 d-----w- C:\$WIN_NT$.~BT
2010-06-05 14:56:55 6571 ----a-w- c:\windows\system32\Config.MPF
2010-06-05 14:54:46 0 d-----w- c:\windows\system32\wbem\Repository
2010-06-05 14:54:37 0 d-----w- c:\program files\Fotki Desktop
2010-06-05 14:54:29 0 d-----w- c:\windows\system32\KB905474
2010-06-05 14:54:21 0 d-----w- c:\program files\common files\McAfee
2010-06-05 14:54:19 0 d-----w- c:\program files\McAfee.com
2010-06-05 14:54:18 0 d-----w- c:\program files\McAfee
2010-06-05 14:11:43 0 d-----w- c:\docume~1\alluse~1\applic~1\Citrix
2010-05-24 02:31:31 3252 ----a-w- c:\windows\system32\wbem\Outlook_01cafae9384507d4.mof

==================== Find3M ====================

2010-06-19 20:28:32 49556 ----a-w- c:\windows\system32\GlyphInfo.bin
2010-06-19 20:28:32 161860 ----a-w- c:\windows\system32\FontInfo.bin

============= FINISH: 20:06:51.67 ===============

Attached Files



BC AdBot (Login to Remove)

 


#2 thewall

thewall

  • Malware Response Team
  • 6,425 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Florida
  • Local time:03:39 AM

Posted 20 June 2010 - 11:39 AM

Try running GMER once again but this time download and run RKill right before doing so. Also uncheck everything but Sections before you try to run GMER.


RKill by Grinler
Link #1
Link #2
Link #3
Link #4
  • Download Link #1.
  • Save it to your Desktop.
  • Double click the RKill desktop icon.
    If you are using Vista please right click and run as Admin!
  • A black screen will briefly flash indicating a successful run.
  • If this does not occur please delete that application and download Link #2.
  • Continue process until the tool runs.
  • If the tool does not run from any of the links tell me about it.

If I have helped you then please consider donating so I can continue the fight against malware Posted Image
All donations go directly to the helper

Posted Image

Due to the large amount of backlogs we have I cannot respond to PMs for help unless I am already working with you

#3 oface

oface
  • Topic Starter

  • Members
  • 32 posts
  • OFFLINE
  •  
  • Local time:03:39 AM

Posted 20 June 2010 - 12:00 PM

The tool run fine but it did not help with GMER, i unchecked everything but sections but it still BSOD'ed on me twice.

#4 thewall

thewall

  • Malware Response Team
  • 6,425 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Florida
  • Local time:03:39 AM

Posted 20 June 2010 - 12:17 PM

Let's try another one:
  • Download RootRepeal from the following location and save it to your desktop.
  • Extract the contents of RootRepeal.zip, to your desktop.
  • Double click on your desktop.
  • Click on the report tab, then click scan
  • Check all seven boxes:
    Drivers
    Files
    Processes
    SSDT
    Stealth Objects
    Hidden Services
    Shadow SSDT
  • Click Ok
  • Check the box for your main system drive (Usually C:), and press Ok.
  • Allow RootRepeal to run a scan of your system. This may take some time.
  • Once the scan completes, Click the Save Report button. Save the log as RootRepeal.txt and post it in your next reply.

If I have helped you then please consider donating so I can continue the fight against malware Posted Image
All donations go directly to the helper

Posted Image

Due to the large amount of backlogs we have I cannot respond to PMs for help unless I am already working with you

#5 oface

oface
  • Topic Starter

  • Members
  • 32 posts
  • OFFLINE
  •  
  • Local time:03:39 AM

Posted 20 June 2010 - 02:24 PM

This one ran..here is the log:

ROOTREPEAL © AD, 2007-2009
==================================================
Scan Start Time: 2010/06/20 13:49
Program Version: Version 1.3.5.0
Windows Version: Windows XP SP3
==================================================

Drivers
-------------------
Name: dump_iastor.sys
Image Path: C:\WINDOWS\System32\Drivers\dump_iastor.sys
Address: 0xA3B9B000 Size: 872448 File Visible: No Signed: -
Status: -

Name: rootrepeal.sys
Image Path: C:\WINDOWS\system32\drivers\rootrepeal.sys
Address: 0xA0515000 Size: 49152 File Visible: No Signed: -
Status: -

Hidden/Locked Files
-------------------
Path: C:\hiberfil.sys
Status: Locked to the Windows API!

Path: c:\windows\system32\cthelper.rpt
Status: Allocation size mismatch (API: 4096, Raw: 0)

Path: c:\windows\temp\mcmsc_hrehrcnyc8w5swp
Status: Allocation size mismatch (API: 4096, Raw: 0)

Path: c:\windows\temp\mcmsc_ksofe03kv98b1xl
Status: Allocation size mismatch (API: 4096, Raw: 0)

Path: c:\windows\temp\mcafee_8dyfaa4bkd0oemy
Status: Allocation size mismatch (API: 4096, Raw: 0)

Path: c:\windows\temp\mcafee_kjwfxw6xqlfbxp5
Status: Allocation size mismatch (API: 4096, Raw: 0)

Path: c:\windows\temp\mcafee_pklnktydxczrmby
Status: Allocation size mismatch (API: 4096, Raw: 0)

Path: c:\windows\temp\mcmsc_nbgfdrm3ti1c3h3
Status: Allocation size mismatch (API: 4096, Raw: 0)

Path: c:\windows\temp\mcmsc_qbnfbunookdmpxc
Status: Allocation size mismatch (API: 4096, Raw: 0)

Path: c:\windows\temp\mcmsc_adyncjqa5evp1mq
Status: Allocation size mismatch (API: 4096, Raw: 0)

Path: c:\windows\temp\mcafee_qtkqllp7y1jhmsa
Status: Allocation size mismatch (API: 4096, Raw: 0)

Path: c:\windows\temp\mcafee_twi5b1zq3g8rzln
Status: Allocation size mismatch (API: 4096, Raw: 0)

Path: c:\windows\temp\perflib_perfdata_860.dat
Status: Allocation size mismatch (API: 16384, Raw: 0)

Path: c:\documents and settings\oleg\local settings\temp\d108_appcompat.txt
Status: Allocation size mismatch (API: 32768, Raw: 16384)

Path: c:\documents and settings\oleg\local settings\temp\d778_appcompat.txt
Status: Allocation size mismatch (API: 32768, Raw: 16384)

Path: c:\program files\comcast\desktop doctor\bin\sprtcmd.rpt
Status: Allocation size mismatch (API: 360, Raw: 0)

Path: C:\Documents and Settings\Oleg\Local Settings\Apps\2.0\T03YDO4G.EK2\Z5N94Y14.696\manifests\clickonce_bootstrap.exe.cdf-ms
Status: Locked to the Windows API!

Path: C:\Documents and Settings\Oleg\Local Settings\Apps\2.0\T03YDO4G.EK2\Z5N94Y14.696\manifests\clickonce_bootstrap.exe.manifest
Status: Locked to the Windows API!

Stealth Objects
-------------------
Object: Hidden Module [Name: asorgido.dll]
Process: Explorer.EXE (PID: 1852) Address: 0x03440000 Size: 315392

Object: Hidden Module [Name: asorgido.dll]
Process: iexplore.exe (PID: 1676) Address: 0x00c20000 Size: 315392

Object: Hidden Module [Name: z00clicker.dll]
Process: iexplore.exe (PID: 1676) Address: 0x10000000 Size: 167936

==EOF==

#6 thewall

thewall

  • Malware Response Team
  • 6,425 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Florida
  • Local time:03:39 AM

Posted 20 June 2010 - 05:23 PM

OK, let's try running CF on this one: Since you already have RKill on this machine run it again right before running CF.


Please download ComboFix from one of these locations:

Link 1
Link 2

* IMPORTANT !!! Save ComboFix.exe to your Desktop
  • Disable your AntiVirus and AntiSpyware applications, usually via a right click on the System Tray icon. They may otherwise interfere with our tools. Instruction can be found HERE
  • Double click on ComboFix.exe & follow the prompts.
  • As part of it's process, ComboFix will check to see if the Microsoft Windows Recovery Console is installed. With malware infections being as they are today, it's strongly recommended to have this pre-installed on your machine before doing any malware removal. It will allow you to boot up into a special recovery/repair mode that will allow us to more easily help you should your computer have a problem after an attempted removal of malware.
  • Follow the prompts to allow ComboFix to download and install the Microsoft Windows Recovery Console, and when prompted, agree to the End-User License Agreement to install the Microsoft Windows Recovery Console.

**Please note: If the Microsoft Windows Recovery Console is already installed, ComboFix will continue it's malware removal procedures.




Once the Microsoft Windows Recovery Console is installed using ComboFix, you should see the following message:





Click on Yes, to continue scanning for malware.

When finished, it will produce a log for you. Please include the C:\ComboFix.txt in your next reply.





If I have helped you then please consider donating so I can continue the fight against malware Posted Image
All donations go directly to the helper

Posted Image

Due to the large amount of backlogs we have I cannot respond to PMs for help unless I am already working with you

#7 oface

oface
  • Topic Starter

  • Members
  • 32 posts
  • OFFLINE
  •  
  • Local time:03:39 AM

Posted 20 June 2010 - 10:07 PM

OK ComboFix ran, below is the log. Couple of notes - I could not disable my McAfee because when i click on it it comes up blank with no menu options or buttons and right-clicking in the tray does not give me an option to disable. Also, since i got this virus it tells me that McAfee update was not properly installed and I need to un-install McAffee and do a clean install.

While ComboFix was running it found a "parasite" that tried to attach itself to it:

C:\Documents and Setting\Oleg\Local Settings\Application Data\Windows Server\upkgmf.dll

It also detected a "rootkit activity" and needed to re-boot, through this process it BSODed twice on me but did eventually finish:

-------

ComboFix 10-06-20.03 - Oleg 06/20/2010 21:37:52.1.2 - x86
Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.2046.1630 [GMT -5:00]
Running from: c:\documents and settings\Oleg\Desktop\ComboFix.exe
AV: McAfee VirusScan *On-access scanning disabled* (Updated) {84B5EE75-6421-4CDE-A33A-DD43BA9FAD83}
FW: McAfee Personal Firewall *enabled* {94894B63-8C7F-4050-BDA4-813CA00DA3E8}
.
The following files were disabled during the run:
c:\documents and settings\Oleg\Local Settings\Application Data\Windows Server\upkgmf.dll


((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.

c:\documents and settings\Oleg\Application Data\ACD Systems\ACDSee\ImageDB.ddf
c:\documents and settings\Oleg\Application Data\Peev
c:\documents and settings\Oleg\Application Data\Peev\ivynt.exe
c:\documents and settings\Oleg\Local Settings\Application Data\{97DD2238-DE72-43DA-95B2-58E2EE8EF81B}
c:\documents and settings\Oleg\Local Settings\Application Data\{97DD2238-DE72-43DA-95B2-58E2EE8EF81B}\chrome.manifest
c:\documents and settings\Oleg\Local Settings\Application Data\{97DD2238-DE72-43DA-95B2-58E2EE8EF81B}\chrome\content\_cfg.js
c:\documents and settings\Oleg\Local Settings\Application Data\{97DD2238-DE72-43DA-95B2-58E2EE8EF81B}\chrome\content\overlay.xul
c:\documents and settings\Oleg\Local Settings\Application Data\{97DD2238-DE72-43DA-95B2-58E2EE8EF81B}\install.rdf
c:\documents and settings\Oleg\Local Settings\Application Data\Windows Server
c:\documents and settings\Oleg\Local Settings\Application Data\Windows Server\flags.ini
c:\documents and settings\Oleg\Local Settings\Application Data\Windows Server\upkgmf.dll
c:\documents and settings\Oleg\Local Settings\Application Data\Windows Server\upkgmf.dll.vir
c:\documents and settings\Oleg\Local Settings\Application Data\Windows Server\uses32.dat
C:\feed.txt
c:\windows\skycsi.dll
c:\windows\urugapojuyibox.dll
c:\windows\xpsp1hfm.log

Infected copy of c:\windows\system32\drivers\iaStor.sys was found and disinfected
Restored copy from - Kitty had a snack tongue.gif
.
((((((((((((((((((((((((( Files Created from 2010-05-21 to 2010-06-21 )))))))))))))))))))))))))))))))
.

2010-06-21 02:45 . 2010-06-21 02:51 -------- d-----w- c:\documents and settings\Oleg\Local Settings\Application Data\Windows Server
2010-06-20 01:14 . 2010-06-20 01:14 -------- d-----w- C:\Windows Server
2010-06-05 15:28 . 2010-06-05 15:28 -------- d-----w- C:\$WIN_NT$.~BT
2010-06-05 14:54 . 2010-06-05 14:54 -------- d-----w- c:\windows\system32\wbem\Repository
2010-06-05 14:54 . 2010-06-05 14:54 -------- d-----w- c:\program files\Fotki Desktop
2010-06-05 14:54 . 2010-06-05 14:54 -------- d-----w- c:\windows\system32\KB905474
2010-06-05 14:54 . 2010-06-05 14:54 -------- d-----w- c:\program files\Common Files\McAfee
2010-06-05 14:54 . 2010-06-05 14:54 -------- d-----w- c:\program files\McAfee.com
2010-06-05 14:54 . 2010-06-05 14:54 -------- d-----w- c:\program files\McAfee
2010-06-05 14:11 . 2010-06-05 14:11 -------- d-----w- c:\documents and settings\All Users\Application Data\Citrix
2010-06-05 14:09 . 2010-06-05 14:09 -------- d-----w- c:\documents and settings\Oleg\Local Settings\Application Data\Citrix

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2010-06-21 02:52 . 2005-11-05 06:21 49392 ----a-w- c:\windows\system32\GlyphInfo.bin
2010-06-21 02:52 . 2005-11-05 06:21 161284 ----a-w- c:\windows\system32\FontInfo.bin
2010-06-21 02:49 . 2005-10-01 20:21 384 ----a-w- c:\windows\system32\DVCStateBkp-{00000005-00000000-00000004-00001102-00000004-20061102}.dat
2010-06-21 02:49 . 2005-10-01 20:21 384 ----a-w- c:\windows\system32\DVCState-{00000005-00000000-00000004-00001102-00000004-20061102}.dat
2010-06-21 02:30 . 2010-03-05 03:56 120 ----a-w- c:\windows\Hdusolozikequwa.dat
2010-06-20 20:29 . 2006-12-29 11:56 -------- d-----w- c:\documents and settings\Oleg\Application Data\Zaihde
2010-06-20 16:45 . 2010-03-05 03:56 0 ----a-w- c:\windows\Ozosagifo.bin
2010-06-05 14:54 . 2007-01-20 15:22 -------- d-----w- c:\documents and settings\All Users\Application Data\McAfee
2010-06-05 14:09 . 2005-10-01 20:16 -------- d-----w- c:\program files\Common Files\Java
2010-06-05 14:08 . 2005-10-01 20:16 -------- d-----w- c:\program files\Java
2010-06-05 13:56 . 2009-07-23 11:52 -------- d-----w- c:\documents and settings\Oleg\Application Data\FotkiDesktop
2010-05-19 12:26 . 2005-11-21 19:16 -------- d-----w- c:\documents and settings\Oleg\Application Data\SmartFTP
2010-05-18 03:16 . 2010-05-18 03:16 -------- d-----w- c:\documents and settings\All Users\Application Data\Office Genuine Advantage
2010-05-18 03:16 . 2010-05-18 03:16 -------- d-----w- c:\documents and settings\Oleg\Application Data\Office Genuine Advantage
2010-05-15 03:36 . 2010-01-24 05:02 -------- d-----w- c:\documents and settings\Oleg\Application Data\U3
.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"DellSupportCenter"="c:\program files\Dell Support Center\bin\sprtcmd.exe" [2009-05-21 206064]
"Google Update"="c:\documents and settings\Oleg\Local Settings\Application Data\Google\Update\GoogleUpdate.exe" [2009-01-28 133104]
"PhotoShow Deluxe Media Manager"="c:\progra~1\Nero\data\Xtras\mssysmgr.exe" [2004-11-12 212992]
"WMPNSCFG"="c:\program files\Windows Media Player\WMPNSCFG.exe" [2006-10-19 204288]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"SunJavaUpdateSched"="c:\program files\Java\jre6\bin\jusched.exe" [2009-02-28 136600]
"IAAnotif"="c:\program files\Intel\Intel Matrix Storage Manager\iaanotif.exe" [2005-06-17 139264]
"ATIPTA"="c:\program files\ATI Technologies\ATI Control Panel\atiptaxx.exe" [2005-04-15 344064]
"IntelMeM"="c:\program files\Intel\Modem Event Monitor\IntelMEM.exe" [2003-09-04 221184]
"CTSysVol"="c:\program files\Creative\SBAudigy2ZS\Surround Mixer\CTSysVol.exe" [2003-09-17 57344]
"CTDVDDET"="c:\program files\Creative\SBAudigy2ZS\DVDAudio\CTDVDDET.EXE" [2003-06-18 45056]
"CTHelper"="CTHELPER.EXE" [2004-03-11 28672]
"UpdReg"="c:\windows\UpdReg.EXE" [2000-05-11 90112]
"dla"="c:\windows\system32\dla\tfswctrl.exe" [2004-12-06 127035]
"ISUSPM Startup"="c:\progra~1\COMMON~1\INSTAL~1\UPDATE~1\ISUSPM.exe" [2004-07-27 221184]
"ISUSScheduler"="c:\program files\Common Files\InstallShield\UpdateService\issch.exe" [2004-07-27 81920]
"DMXLauncher"="c:\program files\Dell\Media Experience\DMXLauncher.exe" [2005-01-27 86016]
"tgcmd"="c:\program files\support.com\bin\tgcmd.exe" [2002-04-25 1544192]
"DVDLauncher"="c:\program files\CyberLink\PowerDVD\DVDLauncher.exe" [2006-04-06 49152]
"mcagent_exe"="c:\program files\McAfee.com\Agent\mcagent.exe" [2009-10-29 1218008]
"dscactivate"="c:\program files\Dell Support Center\gs_agent\custom\dsca.exe" [2007-11-15 16384]
"QuickTime Task"="c:\program files\QuickTime\qttask.exe" [2008-02-01 385024]
"iTunesHelper"="c:\program files\iTunes\iTunesHelper.exe" [2008-02-19 267048]
"DellSupportCenter"="c:\program files\Dell Support Center\bin\sprtcmd.exe" [2009-05-21 206064]
"ddoctorv2"="c:\program files\Comcast\Desktop Doctor\bin\sprtcmd.exe" [2008-04-24 202560]
"NeroFilterCheck"="c:\windows\system32\NeroCheck.exe" [2001-07-09 155648]

c:\documents and settings\Oleg\Start Menu\Programs\Startup\
Fotki Desktop.lnk - c:\program files\Fotki Desktop\fotki.exe [2009-7-23 2001920]
Picture Motion Browser Media Check Tool.lnk - c:\program files\Sony\Sony Picture Utility\VolumeWatcher\SPUVolumeWatcher.exe [2006-12-20 229376]

c:\documents and settings\All Users\Start Menu\Programs\Startup\
Acrobat Assistant.lnk - c:\program files\Adobe\Acrobat 6.0\Distillr\acrotray.exe [2003-5-15 217193]
Adobe Reader Speed Launch.lnk - c:\program files\Adobe\Acrobat 7.0\Reader\reader_sl.exe [2004-12-14 29696]
WinZip Quick Pick.lnk - c:\program files\WinZip\WZQKPICK.EXE [2006-1-10 122880]

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\mcmscsvc]
@=""

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\MCODS]
@=""

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\McAfeeAntiVirus]
"DisableMonitoring"=dword:00000001

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\McAfeeFirewall]
"DisableMonitoring"=dword:00000001

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=
"c:\\Program Files\\SmartFTP\\SmartFTP.exe"=
"c:\\Program Files\\SmartFTP Client 2.0\\SmartFTP.exe"=
"c:\\Program Files\\support.com\\bin\\tgcmd.exe"=
"c:\\Program Files\\iTunes\\iTunes.exe"=
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"c:\\Program Files\\Common Files\\McAfee\\MNA\\McNASvc.exe"=
"c:\\WINDOWS\\system32\\spoolsv.exe"=

S3 CSVirtA;Cisco Systems SSL VPN Adapter;c:\windows\system32\DRIVERS\CSVirtA.sys --> c:\windows\system32\DRIVERS\CSVirtA.sys [?]

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\svchost]
getPlusHelper REG_MULTI_SZ getPlusHelper
.
Contents of the 'Scheduled Tasks' folder

2010-06-17 c:\windows\Tasks\AppleSoftwareUpdate.job
- c:\program files\Apple Software Update\SoftwareUpdate.exe [2008-07-30 18:34]

2010-06-20 c:\windows\Tasks\GoogleUpdateTaskUserS-1-5-21-3718396523-3807994655-2004028109-1005Core.job
- c:\documents and settings\Oleg\Local Settings\Application Data\Google\Update\GoogleUpdate.exe [2009-01-28 15:08]

2010-06-21 c:\windows\Tasks\GoogleUpdateTaskUserS-1-5-21-3718396523-3807994655-2004028109-1005UA.job
- c:\documents and settings\Oleg\Local Settings\Application Data\Google\Update\GoogleUpdate.exe [2009-01-28 15:08]

2010-06-21 c:\windows\Tasks\OGALogon.job
- c:\windows\system32\OGAEXEC.exe [2009-08-03 20:07]
.
.
------- Supplementary Scan -------
.
uStart Page = hxxp://www.google.com/
mStart Page = hxxp://www.comcast.net/
mWindow Title = Windows Internet Explorer provided by Comcast
uSearchAssistant = hxxp://www.google.com/ie
uSearchURL,(Default) = hxxp://www.google.com/search?q=%s
IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~4\OFFICE11\EXCEL.EXE/3000
DPF: {264AED84-12F1-4CA1-8AA7-EB939AE58D8D} - hxxps://208.4.152.34/CACHE/webvpn/stc/1/binaries/stcweb.cab
DPF: {832BF1DE-74EE-4FA6-AC05-63EA5D374403} - hxxps://relativity.legisdiscovery.com/Relativity/ActiveX/webclientmanager.cab
DPF: {D64CF6D4-45DF-4D8F-9F14-E65FADF2777C} - hxxp://www.dvrstation.com/pdvratl.cab
.
- - - - ORPHANS REMOVED - - - -

HKCU-Run-BgMonitor_{79662E04-7C6C-4d9f-84C7-88D8A56B10AA} - c:\program files\Common Files\Ahead\Lib\NMBgMonitor.exe
HKCU-Run-{764E28DD-9460-A959-8CFC-BE7FAE0528F8} - c:\documents and settings\Oleg\Application Data\Peev\ivynt.exe
HKCU-Run-Eretuqazefijo - c:\windows\skycsi.dll
HKLM-Run-Acivufutufu - c:\windows\urugapojuyibox.dll



**************************************************************************

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2010-06-20 21:52
Windows 5.1.2600 Service Pack 3 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

HKLM\Software\Microsoft\Windows\CurrentVersion\Run
tgcmd = "c:\program files\support.com\bin\tgcmd.exe" /server?cmd.exe" /server

scanning hidden files ...

scan completed successfully
hidden files: 0

**************************************************************************
.
--------------------- DLLs Loaded Under Running Processes ---------------------

- - - - - - - > 'winlogon.exe'(784)
c:\windows\system32\config\systemprofile\Local Settings\Application Data\Windows Server\upkgmf.dll

- - - - - - - > 'explorer.exe'(4024)
c:\progra~1\WINDOW~2\wmpband.dll
c:\windows\system32\WPDShServiceObj.dll
c:\program files\ArcSoft\Software Suite\PhotoImpression 5\share\pihook.dll
c:\program files\SmartFTP Client 2.0\smarthook.dll
c:\windows\system32\PortableDeviceTypes.dll
c:\windows\system32\PortableDeviceApi.dll
.
------------------------ Other Running Processes ------------------------
.
c:\windows\system32\Ati2evxx.exe
c:\program files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
c:\windows\system32\CTsvcCDA.EXE
c:\program files\Intel\Intel Matrix Storage Manager\iaantmon.exe
c:\program files\Java\jre6\bin\jqs.exe
c:\progra~1\McAfee\MSC\mcmscsvc.exe
c:\program files\common files\mcafee\mna\mcnasvc.exe
c:\progra~1\COMMON~1\mcafee\mcproxy\mcproxy.exe
c:\progra~1\McAfee\VIRUSS~1\mcshield.exe
c:\program files\McAfee\MPF\MPFSrv.exe
c:\program files\Comcast\Desktop Doctor\bin\sprtsvc.exe
c:\program files\Dell Support Center\bin\sprtsvc.exe
c:\program files\Windows Media Player\WMPNetwk.exe
c:\windows\system32\fxssvc.exe
c:\windows\system32\wscntfy.exe
c:\program files\iPod\bin\iPodService.exe
c:\progra~1\McAfee\VIRUSS~1\mcsysmon.exe
.
**************************************************************************
.
Completion time: 2010-06-20 21:58:59 - machine was rebooted
ComboFix-quarantined-files.txt 2010-06-21 02:58

Pre-Run: 191,727,550,464 bytes free
Post-Run: 191,976,726,528 bytes free

WindowsXP-KB310994-SP2-Pro-BootDisk-ENU.exe
[Boot Loader]
Timeout=2
Default=c:\$win_nt$.~bt\BOOTSECT.DAT
[Operating Systems]
c:\cmdcons\BOOTSECT.DAT="Microsoft Windows Recovery Console" /cmdcons
multi(0)disk(0)rdisk(0)partition(2)\WINDOWS="Microsoft Windows XP Professional" /noexecute=optin /fastdetect
c:\$win_nt$.~bt\BOOTSECT.DAT="Microsoft Windows XP Professional Setup"

- - End Of File - - AA8C835C4DA7BE5785476A2638054E7C


#8 thewall

thewall

  • Malware Response Team
  • 6,425 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Florida
  • Local time:03:39 AM

Posted 21 June 2010 - 01:08 PM

OK, that appeared to find quite a bit. We'll run a scan now:




It's important to run this online scan to search for any remnants. It can take some time, so please be patient and allow it to run it's full course:



Please perform a scan with Kaspersky Online Virus Scanner.
-- Requires free Java Runtime Environment (JRE) to be installed before scanning for malware as ActiveX is no longer being used.
-- This scan will not remove any detected file threats but it will show where they are located so they can be cleaned with other tools.
  • Vista users need to right-click the IE or FF Start Menu or Quick Launch Bar icons and Run As Administrator from the context menu.
  • Read the "Advantages - Requirements and Limitations" then press the ... button.
  • You will be prompted to install an application from Kaspersky. Click the Run button. It will start downloading and installing the scanner and virus definitions.
  • When the downloads have finished, you should see 'Database is updated. Ready to scan'. Click on the ... button.
  • Make sure these boxes are checked. By default, they should be. If not, please check them and click on the ... button afterwards:
    • Detect malicious programs of the following categories:
      Viruses, Worms, Trojan Horses, Rootkits
      Spyware, Adware, Dialers and other potentially dangerous programs
    • Scan compound files (doesn't apply to the File scan area):
      Archives
      Mail databases
  • Click on My Computer under the Scan section. OK any warnings from your protection programs.
  • The scan will take a while so be patient and do NOT use the computer while the scan is running. Keep all other programs and windows closed.
  • Once the scan is complete (the 'status' will show complete), click on View Scan Report and any infected objects will be shown.
  • Click on Save Report As... and change the Files of type to Text file (.txt)
  • Name the file KAVScan_ddmmyy (day, month, year) before clicking on the Save button and save it to your Desktop.
  • Copy and paste (Ctrl+C) the saved scan results from that file in your next reply.
-- Note: Some online scanners will detect existing anti-virus software and refuse to cooperate. You may have to disable the real-time protection components of your existing anti-virus and try running the scan again. If you do this, remember to turn them back on after you are finished.
If I have helped you then please consider donating so I can continue the fight against malware Posted Image
All donations go directly to the helper

Posted Image

Due to the large amount of backlogs we have I cannot respond to PMs for help unless I am already working with you

#9 oface

oface
  • Topic Starter

  • Members
  • 32 posts
  • OFFLINE
  •  
  • Local time:03:39 AM

Posted 24 June 2010 - 07:12 AM

Here you go....

--------

--------------------------------------------------------------------------------
KASPERSKY ONLINE SCANNER 7.0: scan report
Thursday, June 24, 2010
Operating system: Microsoft Windows XP Professional Service Pack 3 (build 2600)
Kaspersky Online Scanner version: 7.0.26.13
Last database update: Wednesday, June 23, 2010 21:46:55
Records in database: 4314567
--------------------------------------------------------------------------------

Scan settings:
scan using the following database: extended
Scan archives: yes
Scan e-mail databases: yes

Scan area - My Computer:
A:\
C:\
D:\
E:\
F:\
G:\

Scan statistics:
Objects scanned: 323372
Threats found: 4
Infected objects found: 8
Suspicious objects found: 0
Scan duration: 04:37:58


File name / Threat / Threats count
C:\Documents and Settings\Oleg\Application Data\Sun\Java\Deployment\cache\6.0\49\1b7443f1-4ae816ef Infected: Trojan-Downloader.Java.OpenConnection.ap 1
C:\Documents and Settings\Oleg\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\nRT.jar-6516744d-509dc71e.zip Infected: Trojan-Downloader.Java.OpenConnection.ap 1
C:\Program Files\ZangoToolbar\ZangoInstaller.exe Infected: not-a-virus:AdWare.Win32.180Solutions.ao 1
C:\Qoobox\Quarantine\C\Documents and Settings\Oleg\Local Settings\Application Data\Windows Server\upkgmf.dll.vir Infected: Trojan-Spy.Win32.Small.chw 1
C:\Qoobox\Quarantine\C\Documents and Settings\Oleg\Local Settings\Application Data\Windows Server\upkgmf.dll.vir.vir Infected: Trojan-Spy.Win32.Small.chw 1
C:\Qoobox\Quarantine\C\WINDOWS\skycsi.dll.vir Infected: Trojan-Downloader.Win32.Mufanom.uaq 1
C:\WINDOWS\system32\config\systemprofile\Local Settings\Application Data\Windows Server\upkgmf.dll Infected: Trojan-Spy.Win32.Small.chw 1
C:\Windows Server\upkgmf.dll Infected: Trojan-Spy.Win32.Small.chw 1

Selected area has been scanned.


#10 thewall

thewall

  • Malware Response Team
  • 6,425 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Florida
  • Local time:03:39 AM

Posted 24 June 2010 - 03:12 PM

The Qoobox entries are of no concern. They will be gone when we uninstall ComboFix.

See if you can delete the following two entries. If you required any assistance on how to do so please let me know:

C:\WINDOWS\system32\config\systemprofile\Local Settings\Application Data\Windows Server\upkgmf.dll
C:\Windows Server\upkgmf.dll




You need to clean out your Java Cache. Instructions are provided in the link below:

Link for info is:


http://support.f-secure.com/enu/home/virus...javacache.shtml




Let me when/if you have successfully completed the above and give me a rundown on how the computer is behaving.
If I have helped you then please consider donating so I can continue the fight against malware Posted Image
All donations go directly to the helper

Posted Image

Due to the large amount of backlogs we have I cannot respond to PMs for help unless I am already working with you

#11 oface

oface
  • Topic Starter

  • Members
  • 32 posts
  • OFFLINE
  •  
  • Local time:03:39 AM

Posted 24 June 2010 - 09:35 PM

Done.

It seems to be acting much better. It loads up faster and now when i perform searches it can actually take me to the proper link for some searches but some search results now take me to "http://results5.google.com/" which is just a blank page, before it would take me to the same page but then re-direct me to advertisement websites but now it's just stuck on the blank page for some search results.

What's even more interesting is that if i click on a search result and it takes me to the blank page on "http://results5.google.com/" after i close that window and click on the same result again, it takes me to the proper/correct site.

#12 thewall

thewall

  • Malware Response Team
  • 6,425 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Florida
  • Local time:03:39 AM

Posted 04 July 2010 - 03:08 PM

Due to the lack of feedback This Topic is closed.

Should you need it reopened, please contact my by PM. Include the address of this thread in your request.

If you have a new issue, please start a New Topic.

This applies only to the original poster. Everyone else please begin a New Topic.
If I have helped you then please consider donating so I can continue the fight against malware Posted Image
All donations go directly to the helper

Posted Image

Due to the large amount of backlogs we have I cannot respond to PMs for help unless I am already working with you




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users