Jump to content


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.

Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.


AV Security Suite and Rootkit viruses

  • This topic is locked This topic is locked
2 replies to this topic

#1 LogiJ


  • Members
  • 1 posts
  • Local time:05:19 AM

Posted 17 July 2010 - 02:39 PM

I've read a few other forums on this virus, have downloaded ComboFix, HiJackThis, Malwarebytes', all to no avail. It started out bundled with a virus that installed an "AV Security Suite" program that Malwarebytes' seems to have removed. I'm still occasionally redirected when clicking on search engine links and there are often new tabs automatically opened that insist on me pressing some button or other. Assistance would be greatly appreciated. I read that I'm not supposed to use ComboFix without direction... but I already have smile.gif so here's my ComboFix log:

ComboFix 10-07-08.02 - HP_Administrator 07/09/2010 18:13:12.1.2 - x86
Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.958.708 [GMT -6:00]
Running from: c:\documents and settings\HP_Administrator\My Documents\Downloads\ComboFix.exe

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))


((((((((((((((((((((((((( Files Created from 2010-06-10 to 2010-07-10 )))))))))))))))))))))))))))))))

2010-07-09 22:03 . 2010-07-09 22:03 -------- d-----w- c:\program files\CCleaner
2010-07-09 21:34 . 2010-07-09 21:34 -------- d-----w- c:\program files\Trend Micro
2010-07-09 21:28 . 2010-07-09 21:28 -------- d-----w- c:\documents and settings\HP_Administrator\Application Data\Malwarebytes
2010-07-09 21:28 . 2010-04-29 21:39 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2010-07-09 21:28 . 2010-07-09 21:28 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
2010-07-09 21:28 . 2010-07-09 21:28 -------- d-----w- c:\documents and settings\All Users\Application Data\Malwarebytes
2010-07-09 21:28 . 2010-04-29 21:39 20952 ----a-w- c:\windows\system32\drivers\mbam.sys
2010-07-09 20:36 . 2010-07-09 20:36 -------- d-s---w- c:\documents and settings\NetworkService\UserData
2010-07-08 05:12 . 2010-07-08 05:13 -------- d-----w- c:\program files\SystemRequirementsLab
2010-07-08 05:12 . 2010-07-08 05:12 77312 ----a-w- c:\documents and settings\HP_Administrator\Application Data\SystemRequirementsLab\srlproxy_cyri_4.1.72.0A.dll
2010-07-08 05:12 . 2010-07-08 05:12 -------- d-----w- c:\documents and settings\HP_Administrator\Application Data\SystemRequirementsLab
2010-06-24 17:14 . 2010-06-24 17:14 253241 ----a-w- c:\documents and settings\HP_Administrator\Application Data\Sony Online Entertainment\npsoeact.dll
2010-06-24 17:14 . 2010-06-24 17:14 -------- d-----w- c:\documents and settings\HP_Administrator\Application Data\Sony Online Entertainment
2010-06-24 17:14 . 2010-06-24 17:14 -------- d-----w- c:\documents and settings\HP_Administrator\Local Settings\Application Data\SCE
2010-06-22 19:57 . 2010-06-22 19:57 2568656 ----a-w- c:\documents and settings\All Users\Application Data\NOS\Adobe_Downloads\install_flash_player.exe
2010-06-22 19:56 . 2010-06-23 16:12 -------- d-----w- c:\documents and settings\All Users\Application Data\NOS

(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
2010-07-09 18:54 . 2010-02-23 04:38 574424 ----a-w- c:\documents and settings\LocalService\Local Settings\Application Data\FontCache3.0.0.0.dat
2010-07-07 06:28 . 2010-02-22 04:53 -------- d-----w- c:\program files\World of Warcraft
2010-07-02 18:01 . 2010-05-19 04:51 -------- d-----w- c:\program files\World of Warcraft Public Test
2010-06-22 21:26 . 2010-05-20 07:37 -------- d-----w- c:\documents and settings\All Users\Application Data\Blizzard Entertainment
2010-05-25 14:53 . 2010-05-25 14:51 -------- d-----w- c:\program files\Registry Patrol
2010-05-20 07:37 . 2010-05-20 07:37 48388 ----a-w- c:\documents and settings\All Users\Application Data\Blizzard Entertainment\Battle.net\Cache\Download\Scan.dll
2010-05-19 05:12 . 2010-03-26 14:12 -------- d-----w- c:\program files\Common Files\Blizzard Entertainment
2010-05-19 04:50 . 2010-05-19 04:20 -------- d-----w- c:\program files\ US PTR Installer

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
*Note* empty entries & legit default entries are not shown

"ehTray"="c:\windows\ehome\ehtray.exe" [2005-09-30 67584]
"Recguard"="c:\windows\SMINST\RECGUARD.EXE" [2005-07-23 237568]
"HPBootOp"="c:\program files\Hewlett-Packard\HP Boot Optimizer\HPBootOp.exe" [2006-02-16 249856]
"NvCplDaemon"="c:\windows\system32\NvCpl.dll" [2010-01-12 13666408]
"NvMediaCenter"="c:\windows\system32\NvMcTray.dll" [2010-01-12 110696]
"TkBellExe"="c:\program files\Common Files\Real\Update_OB\realsched.exe" [2006-08-01 180269]
"RTHDCPL"="RTHDCPL.EXE" [2006-06-14 16239616]

[HKLM\~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^Updates From HP.lnk]
path=c:\documents and settings\All Users\Start Menu\Programs\Startup\Updates From HP.lnk
backup=c:\windows\pss\Updates From HP.lnkCommon Startup

"c:\\Program Files\\Ventrilo\\Ventrilo.exe"=
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"c:\\Program Files\\QuickTime\\QuickTimePlayer.exe"=
"c:\\Program Files\\Bonjour\\mDNSResponder.exe"=
"c:\\Program Files\\iTunes\\iTunes.exe"=
"c:\\Program Files\\World of Warcraft\\Repair.exe"=
"c:\\Program Files\\World of Warcraft\\Launcher.exe"=
"c:\\Program Files\\World of Warcraft Public Test\\Launcher.exe"=
"c:\\Program Files\\World of Warcraft\\WoW-3.2.0-enUS-downloader.exe"=
"c:\\Documents and Settings\\HP_Administrator\\Local Settings\\Apps\\2.0\\758TVGPO.OKE\\7H7LQQ1H.3XQ\\curs..tion_eee711038731a406_0004.0000_172b37d8269e5e48\\CurseClient.exe"=

S3 LiveTurbineMessageService;Turbine Message Service - Live;"c:\program files\Turbine\Turbine Download Manager\TurbineMessageService.exe" --> c:\program files\Turbine\Turbine Download Manager\TurbineMessageService.exe [?]
S3 LiveTurbineNetworkService;Turbine Network Service - Live;"c:\program files\Turbine\Turbine Download Manager\TurbineNetworkService.exe" --> c:\program files\Turbine\Turbine Download Manager\TurbineNetworkService.exe [?]
------- Supplementary Scan -------
uStart Page = hxxp://www.google.com/
FF - ProfilePath - c:\documents and settings\HP_Administrator\Application Data\Mozilla\Firefox\Profiles\2g61eytc.default\
FF - prefs.js: browser.startup.homepage - hxxp://www.google.com/
FF - HiddenExtension: Microsoft .NET Framework Assistant: {20a82645-c095-46ed-80e3-08825760534b} - c:\windows\Microsoft.NET\Framework\v3.5\Windows Presentation Foundation\DotNetAssistantExtension\

c:\program files\Mozilla Firefox\greprefs\all.js - pref("ui.use_native_colors", true);
c:\program files\Mozilla Firefox\greprefs\all.js - pref("network.IDN.whitelist.lu", true);
c:\program files\Mozilla Firefox\greprefs\all.js - pref("network.IDN.whitelist.nu", true);
c:\program files\Mozilla Firefox\greprefs\all.js - pref("network.IDN.whitelist.nz", true);
c:\program files\Mozilla Firefox\greprefs\all.js - pref("network.IDN.whitelist.xn--mgberp4a5d4ar", true);
c:\program files\Mozilla Firefox\greprefs\all.js - pref("network.IDN.whitelist.xn--p1ai", true);
c:\program files\Mozilla Firefox\greprefs\all.js - pref("network.IDN.whitelist.xn--mgbayh7gpa", true);
c:\program files\Mozilla Firefox\greprefs\all.js - pref("network.IDN.whitelist.tel", true);
c:\program files\Mozilla Firefox\greprefs\all.js - pref("network.auth.force-generic-ntlm", false);
c:\program files\Mozilla Firefox\greprefs\all.js - pref("network.proxy.type", 5);
c:\program files\Mozilla Firefox\greprefs\all.js - pref("dom.ipc.plugins.timeoutSecs", 45);
c:\program files\Mozilla Firefox\greprefs\all.js - pref("svg.smil.enabled", false);
c:\program files\Mozilla Firefox\greprefs\all.js - pref("accelerometer.enabled", true);
c:\program files\Mozilla Firefox\greprefs\security-prefs.js - pref("security.ssl.allow_unrestricted_renego_everywhere__temporarily_available_pref", true);
c:\program files\Mozilla Firefox\greprefs\security-prefs.js - pref("security.ssl.renego_unrestricted_hosts", "");
c:\program files\Mozilla Firefox\greprefs\security-prefs.js - pref("security.ssl.treat_unsafe_negotiation_as_broken", false);
c:\program files\Mozilla Firefox\greprefs\security-prefs.js - pref("security.ssl.require_safe_negotiation", false);
c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("extensions.{972ce4c6-7e08-4474-a285-3208198ce6fd}.name", "chrome://browser/locale/browser.properties");
c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("extensions.{972ce4c6-7e08-4474-a285-3208198ce6fd}.description", "chrome://browser/locale/browser.properties");
c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("plugins.update.notifyUser", false);
c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("dom.ipc.plugins.enabled.nptest.dll", true);
c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("dom.ipc.plugins.enabled.npswf32.dll", true);
c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("dom.ipc.plugins.enabled.npctrl.dll", true);
c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("dom.ipc.plugins.enabled.npqtplugin.dll", true);
c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("dom.ipc.plugins.enabled", false);
- - - - ORPHANS REMOVED - - - -

HKLM-Run-PCDrProfiler - (no file)
HKLM-Run-nwiz - nwiz.exe
MSConfigStartUp-xxxfyrdj - c:\documents and settings\HP_Administrator\Local Settings\Application Data\okiabspni\gkculprtssd.exe
MSConfigStartUp-ykmyatst - c:\documents and settings\HP_Administrator\Local Settings\Application Data\rsgebpafp\ixgrountssd.exe
AddRemove-NVIDIA Display Control Panel - c:\program files\NVIDIA Corporation\Uninstall\nvuninst.exe


catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2010-07-09 18:19
Windows 5.1.2600 Service Pack 3 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

c:\docume~1\HP_ADM~1\LOCALS~1\Temp\RGI1.tmp 7075 bytes

scan completed successfully
hidden files: 1


Stealth MBR rootkit/Mebroot/Sinowal detector 0.3.7 by Gmer, http://www.gmer.net

device: opened successfully
user: MBR read successfully
called modules: ntkrnlpa.exe catchme.sys CLASSPNP.SYS disk.sys ACPI.sys hal.dll >>UNKNOWN [0x86264EC5]<<
kernel: MBR read successfully
detected MBR rootkit hooks:
\Driver\Disk -> CLASSPNP.SYS @ 0xf75d4f28
\Driver\ACPI -> ACPI.sys @ 0xf7447cb8
\Driver\atapi -> atapi.sys @ 0xf7304852
\Driver\iaStor -> iaStor.sys @ 0xf7328b10
IoDeviceObjectType -> SecurityProcedure -> ntkrnlpa.exe @ 0x80583d4a
\Device\Harddisk0\DR0 -> SecurityProcedure -> ntkrnlpa.exe @ 0x80583d4a
NDIS: NVIDIA nForce Networking Controller -> SendCompleteHandler -> NDIS.sys @ 0xf71b5bb0
PacketIndicateHandler -> NDIS.sys @ 0xf71c2a21
SendHandler -> NDIS.sys @ 0xf71a087b
user & kernel MBR OK

Completion time: 2010-07-09 18:21:56
ComboFix-quarantined-files.txt 2010-07-10 00:21

Pre-Run: 166,922,551,296 bytes free
Post-Run: 166,920,339,456 bytes free

- - End Of File - - 6CA22E0AB342BB45687592E235BF397B

BC AdBot (Login to Remove)


#2 etavares


    Bleepin' Remover

  • Malware Response Team
  • 15,514 posts
  • Gender:Male
  • Local time:07:19 AM

Posted 23 July 2010 - 06:37 PM

Hello and welcome to Bleeping Computer

We apologize for the delay in responding to your request for help. Here at Bleeping Computer we get overwhelmed at times, and we are trying our best to keep up. Please note that your topic was not intentionally overlooked. Our mission is to help everyone in need, but sometimes it takes just a little longer to get to every request for help. No one is ignored here.

If you have since resolved the original problem you were having, we would appreciate you letting us know. If not please perform the following steps below so we can have a look at the current condition of your machine.

If you have not done so, include a clear description of the problems you're having, along with any steps you may have performed so far.

Please refrain from running tools or applying updates other than those we suggest while we are cleaning up your computer. The reason for this is so we know what is going on with the machine at any time. Some programs can interfere with others and hamper the recovery process. Please also continue to work with me until I give you the all clear. Even if your computer appears to act better, you may still be infected.

Even if you have already provided information about your PC, we need a new log to see what has changed since you originally posted your problem.

Once we start working together, please reply back within 3 days or this thread may be closed so we can help others who are waiting.

We need to create an OTL report,
  • Please download OTL from this link.
  • Save it to your desktop.
  • Double click on the icon on your desktop.
  • Click the "Scan All Users" checkbox.
  • Under the Custom Scan box paste this in:

    drivers32 /all
    %systemroot%\system32\*.dll /lockedfiles
    %systemroot%\system32\*.sys /90
    %systemroot%\Tasks\*.job /lockedfiles
    %systemroot%\*. /mp /s
    %systemroot%\*. /mp /s

  • Click the Quick Scan button.
  • The scan should take a few minutes.
  • Please copy and paste both logs in your reply.

We also need a new log from the GMER anti-rootkit scanner. Please first disable any CD emulation programs using the steps found in this topic:

Why we request you disable CD Emulation when receiving Malware Removal Advice

Then create another GMER log and post it as an attachment to the reply where you post your new OTL log. Instructions on how to properly create a GMER log can be found here:

How to create a GMER log

In your reply, please post both OTL logs and the GMER log.

If I don't respond within 2 days, please feel free to PM me.
Please don't ask for help via PM. The forums are there for a reason. Please post in the forums so others may benefit as well.

Posted Image
Unified Network of Instructors and Trusted Eliminators

#3 etavares


    Bleepin' Remover

  • Malware Response Team
  • 15,514 posts
  • Gender:Male
  • Local time:07:19 AM

Posted 28 July 2010 - 05:35 PM

Due to the lack of feedback, this Topic is closed.

If you need this topic reopened, please request this by sending the moderating team
a PM with the address of the thread. This applies only to the original topic starter.

Everyone else please begin a New Topic.

If I don't respond within 2 days, please feel free to PM me.
Please don't ask for help via PM. The forums are there for a reason. Please post in the forums so others may benefit as well.

Posted Image
Unified Network of Instructors and Trusted Eliminators

0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users