Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

browser hijacker/Malware turned off Windows Restore in "group settings?"


  • This topic is locked This topic is locked
27 replies to this topic

#1 alaskalad

alaskalad

  • Members
  • 15 posts
  • OFFLINE
  •  
  • Local time:07:25 AM

Posted 19 July 2010 - 06:48 PM

I have had an ongoing problem for a couple of weeks involving browser hijacks, unable to update windows (error 08x0072EFF), unable to restore and fake antispyware pop ups.
I had Mcafee running when this started and have since tried Panda antivirus pro to no avail. Please help me if you can.
Hopefully I have followed the pre posting directions properly.
I am attaching the gmer file since it is too long to put in the text.
I have also run defogger.
Thanks,
alaskalad




DDS (Ver_10-03-17.01) - NTFSx86
Run by Bob at 15:15:18.14 on Mon 07/19/2010
Internet Explorer: 8.0.6001.18702
Microsoft Windows XP Home Edition 5.1.2600.3.1252.1.1033.18.2047.1354 [GMT -8:00]

AV: Panda Antivirus Pro 2010 *On-access scanning enabled* (Updated) {EEE2D94A-D4C1-421A-AB2C-2CE8FE51747A}
AV: McAfee VirusScan *On-access scanning enabled* (Updated) {84B5EE75-6421-4CDE-A33A-DD43BA9FAD83}
FW: McAfee Personal Firewall *enabled* {94894B63-8C7F-4050-BDA4-813CA00DA3E8}

============== Running Processes ===============

C:\WINDOWS\system32\svchost -k DcomLaunch
svchost.exe
C:\WINDOWS\system32\svchost.exe -k netsvcs
C:\Program Files\Panda Security\Panda Antivirus Pro 2010\TPSrv.exe
svchost.exe
svchost.exe
C:\PROGRAM FILES\PANDA SECURITY\PANDA ANTIVIRUS PRO 2010\WebProxy.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe
C:\Program Files\Bonjour\mDNSResponder.exe
C:\WINDOWS\system32\svchost -k Panda
C:\WINDOWS\system32\svchost.exe -k hpdevmgmt
C:\WINDOWS\system32\svchost.exe -k HPService
C:\Program Files\Java\jre6\bin\jqs.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\System32\svchost.exe -k HPZ12
C:\WINDOWS\system32\nvsvc32.exe
C:\Program Files\Panda Security\Panda Antivirus Pro 2010\PsCtrls.exe
C:\Program Files\Panda Security\Panda Antivirus Pro 2010\PavFnSvr.exe
C:\Program Files\Common Files\Panda Security\PavShld\pavprsrv.exe
C:\WINDOWS\System32\svchost.exe -k HPZ12
C:\Program Files\Panda Security\Panda Antivirus Pro 2010\PsImSvc.exe
C:\Program Files\Panda Security\Panda Antivirus Pro 2010\PskSvc.exe
C:\Program Files\CyberLink\Shared files\RichVideo.exe
C:\Program Files\Microsoft\Search Enhancement Pack\SeaPort\SeaPort.exe
C:\WINDOWS\System32\svchost.exe -k imgsvc
C:\Program Files\Yahoo!\SoftwareUpdate\YahooAUService.exe
C:\Program Files\Panda Security\Panda Antivirus Pro 2010\pavsrv51.exe
C:\Program Files\Panda Security\Panda Antivirus Pro 2010\AVENGINE.EXE
C:\Program Files\CyberLink\PowerDVD\PDVDServ.exe
C:\Program Files\Yahoo!\Search Protection\SearchProtection.exe
C:\Program Files\Common Files\Real\Update_OB\realsched.exe
C:\Program Files\Common Files\Java\Java Update\jusched.exe
C:\Program Files\Creative\SBLive\Diagnostics\diagent.exe
C:\Program Files\HP\HP Software Update\HPWuSchd2.exe
C:\Program Files\iTunes\iTunesHelper.exe
C:\Program Files\Panda Security\Panda Antivirus Pro 2010\APVXDWIN.EXE
C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe
C:\Program Files\Yahoo!\Messenger\YahooMessenger.exe
C:\Program Files\HP\Digital Imaging\bin\hpqtra08.exe
C:\Program Files\Nikon\PictureProject\NkbMonitor.exe
C:\Program Files\iPod\bin\iPodService.exe
C:\Program Files\HP\Digital Imaging\bin\hpqSTE08.exe
C:\Program Files\HP\Digital Imaging\bin\hpqbam08.exe
C:\Program Files\HP\Digital Imaging\bin\hpqgpc01.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\WINDOWS\System32\svchost.exe -k HTTPFilter
C:\Program Files\Trend Micro\HijackThis\HijackThis.exe
C:\WINDOWS\system32\NOTEPAD.EXE
C:\WINDOWS\system32\NOTEPAD.EXE
C:\Program Files\Microsoft Office\OFFICE11\WINWORD.EXE
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Documents and Settings\Bob\Local Settings\Temporary Internet Files\Content.IE5\MXV6KLS0\Defogger[1].exe
C:\Documents and Settings\Bob\Local Settings\Temporary Internet Files\Content.IE5\9VUU2QEV\dds[1].scr

============== Pseudo HJT Report ===============

uStart Page = hxxp://en.canoe.ca/home.html
uSearch Page = hxxp://us.rd.yahoo.com/customize/ie/defaults/sp/msgr9/*http://www.yahoo.com
uSearch Bar = hxxp://us.rd.yahoo.com/customize/ie/defaults/sb/msgr9/*http://www.yahoo.com/ext/search/search.html
mDefault_Search_URL = hxxp://us.rd.yahoo.com/customize/ie/defaults/su/msgr9/*http://www.yahoo.com
mSearch Page = hxxp://us.rd.yahoo.com/customize/ie/defaults/sp/msgr9/*http://www.yahoo.com
mStart Page = hxxp://www.yahoo.com/
uInternet Settings,ProxyOverride = <local>
uInternet Settings,ProxyServer = http=127.0.0.1:5643
uSearchAssistant = hxxp://www.google.com/ie
uSearchURL,(Default) = hxxp://search.yahoo.com/search?fr=mcafee&p=%s
mSearchAssistant = hxxp://www.google.com/ie
BHO: &Yahoo! Toolbar Helper: {02478d38-c3f9-4efb-9b51-7695eca05670} - c:\progra~1\yahoo!\companion\installs\cpn\yt.dll
BHO: HP Print Enhancer: {0347c33e-8762-4905-bf09-768834316c61} - c:\program files\hp\digital imaging\smart web printing\hpswp_printenhancer.dll
BHO: Adobe PDF Reader Link Helper: {06849e9f-c8d7-4d59-b87d-784b7d6be0b3} - c:\program files\common files\adobe\acrobat\activex\AcroIEHelper.dll
BHO: RealPlayer Download and Record Plugin for Internet Explorer: {3049c3e9-b461-4bc5-8870-4c09146192ca} - c:\program files\real\realplayer\rpbrowserrecordplugin.dll
BHO: adShotHlpr Object: {35c3a235-ee25-423a-a2f6-2bb15c77a7ff} - c:\windows\system32\elnap.dll
BHO: Search Helper: {6ebf7485-159f-4bff-a14f-b9e3aac4465b} - c:\program files\microsoft\search enhancement pack\search helper\SEPsearchhelperie.dll
BHO: moigh Object: {85f83964-eda7-4c7a-aae2-fe6029a4e758} - c:\windows\system32\alnap.dll
BHO: Google Toolbar Helper: {aa58ed58-01dd-4d91-8333-cf10577473f7} - c:\program files\google\google toolbar\GoogleToolbar.dll
BHO: Google Toolbar Notifier BHO: {af69de43-7d58-4638-b6fa-ce66b5ad205d} - c:\program files\google\googletoolbarnotifier\5.4.4525.1752\swg.dll
BHO: Google Dictionary Compression sdch: {c84d72fe-e17d-4195-bb24-76c02e2e7c4e} - c:\program files\google\google toolbar\component\fastsearch_219B3E1547538286.dll
BHO: MSN Toolbar Helper: {d2ce3e00-f94a-4740-988e-03dc2f38c34f} - c:\program files\msn\toolbar\3.0.1125.0\msneshellx.dll
BHO: Java™ Plug-In 2 SSV Helper: {dbc80044-a445-435b-bc74-9c25c1c588a9} - c:\program files\java\jre6\bin\jp2ssv.dll
BHO: JQSIEStartDetectorImpl Class: {e7e6f031-17ce-4c07-bc86-eabfe594f69c} - c:\program files\java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll
BHO: SingleInstance Class: {fdad4da1-61a2-4fd8-9c17-86f7ac245081} - c:\progra~1\yahoo!\companion\installs\cpn\YTSingleInstance.dll
BHO: HP Smart BHO Class: {ffffffff-cf4e-4f2b-bdc2-0e72e116a856} - c:\program files\hp\digital imaging\smart web printing\hpswp_BHO.dll
TB: &Google Toolbar: {2318c2b1-4965-11d4-9b18-009027a5cd4f} - c:\program files\google\google toolbar\GoogleToolbar.dll
TB: Yahoo! Toolbar: {ef99bd32-c1fb-11d2-892f-0090271d4f88} - c:\progra~1\yahoo!\companion\installs\cpn\yt.dll
TB: MSN Toolbar: {1e61ed7c-7cb8-49d6-b9e9-ab4c880c8414} - c:\program files\msn\toolbar\3.0.1125.0\msneshellx.dll
TB: {604BC32A-9680-40D1-9AC6-E06B23A1BA4C} - No File
EB: HP Smart Web Printing: {555d4d79-4bd2-4094-a395-cfc534424a05} - c:\program files\hp\digital imaging\smart web printing\hpswp_bho.dll
EB: {32683183-48a0-441b-a342-7c2a440a9478} - No File
uRun: [NvMediaCenter] "RUNDLL32.EXE" c:\windows\system32\NVMCTRAY.DLL,NvTaskbarInit
uRun: [YSearchProtection] "c:\program files\yahoo!\search protection\SearchProtection.exe"
uRun: [Search Protection] c:\program files\yahoo!\search protection\SearchProtection.exe
uRun: [swg] "c:\program files\google\googletoolbarnotifier\GoogleToolbarNotifier.exe"
uRun: [Messenger (Yahoo!)] "c:\program files\yahoo!\messenger\YahooMessenger.exe" -quiet
uRun: [MSMSGS] "c:\program files\messenger\msmsgs.exe" /background
uRun: [dqmelsrt] c:\documents and settings\bob\local settings\application data\wceufjygp\neixlentssd.exe
mRun: [NvCplDaemon] RUNDLL32.EXE c:\windows\system32\NvCpl.dll,NvStartup
mRun: [nwiz] nwiz.exe /install
mRun: [NvMediaCenter] "RUNDLL32.EXE" c:\windows\system32\NvMcTray.dll,NvTaskbarInit
mRun: [UpdReg] c:\windows\UpdReg.EXE
mRun: [diagent] "c:\program files\creative\sblive\diagnostics\diagent.exe" startup
mRun: [NWEReboot]
mRun: [RemoteControl] "c:\program files\cyberlink\powerdvd\PDVDServ.exe"
mRun: [LanguageShortcut] "c:\program files\cyberlink\powerdvd\language\Language.exe"
mRun: [YSearchProtection] "c:\program files\yahoo!\search protection\SearchProtection.exe"
mRun: [Microsoft Default Manager] "c:\program files\microsoft\search enhancement pack\default manager\DefMgr.exe" -resume
mRun: [TkBellExe] "c:\program files\common files\real\update_ob\realsched.exe" -osboot
mRun: [SunJavaUpdateSched] "c:\program files\common files\java\java update\jusched.exe"
mRun: [QuickTime Task] "c:\program files\quicktime\qttask.exe" -atboottime
mRun: [HP Software Update] c:\program files\hp\hp software update\HPWuSchd2.exe
mRun: [<NO NAME>]
mRun: [iTunesHelper] "c:\program files\itunes\iTunesHelper.exe"
mRun: [Adobe Reader Speed Launcher] "c:\program files\adobe\reader 8.0\reader\Reader_sl.exe"
mRun: [Adobe ARM] "c:\program files\common files\adobe\arm\1.0\AdobeARM.exe"
mRun: [sta] rundll32 "elnap.dll",,Run
mRun: [APVXDWIN] "c:\program files\panda security\panda antivirus pro 2010\APVXDWIN.EXE" /s
mRun: [SCANINICIO] "c:\program files\panda security\panda antivirus pro 2010\Inicio.exe"
dRun: [NvMediaCenter] RUNDLL32.EXE c:\windows\system32\NVMCTRAY.DLL,NvTaskbarInit
dRun: [mcexecwin] rundll32.exe c:\windows\temp\wrfnejg.dll, RestoreWindows
StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\hpdigi~1.lnk - c:\program files\hp\digital imaging\bin\hpqtra08.exe
StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\nkbmon~1.lnk - c:\program files\nikon\pictureproject\NkbMonitor.exe
IE: {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe
IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe
IE: {92780B25-18CC-41C8-B9BE-3C9C571A8263} - {FF059E31-CC5A-4E2E-BF3B-96E929D65503} - c:\progra~1\micros~2\office11\REFIEBAR.DLL
IE: {DDE87865-83C5-48c4-8357-2F5B1AA84522} - {DDE87865-83C5-48c4-8357-2F5B1AA84522} - c:\program files\hp\digital imaging\smart web printing\hpswp_BHO.dll
Trusted Zone: axo20.com\quintiles
Trusted Zone: concursolutions.com
Trusted Zone: sumtotalsystems.com
DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} - hxxp://update.microsoft.com/microsoftupdate/v6/V5Controls/en/x86/client/muweb_site.cab?1229052066500
DPF: {8FFBE65D-2C9C-4669-84BD-5829DC0B603C} - hxxp://fpdownload.macromedia.com/get/flashplayer/current/ultrashim.cab
DPF: {9191F686-7F0A-441D-8A98-2FE3AC1BD913} - hxxp://acs.pandasoftware.com/activescan/cabs/as2stubie.cab
DPF: {CAFEEFAC-0016-0000-0003-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_03-windows-i586.cab
DPF: {CAFEEFAC-0016-0000-0005-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_05-windows-i586.cab
DPF: {CAFEEFAC-0016-0000-0007-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_07-windows-i586.cab
Notify: avldr - avldr.dll
Notify: GoToAssist - c:\program files\citrix\gotoassist\599\G2AWinLogon.dll
SSODL: WPDShServiceObj - {AAA288BA-9A4C-45B0-95D7-94D524869DB5} - c:\windows\system32\WPDShServiceObj.dll

============= SERVICES / DRIVERS ===============

R0 pavboot;Panda boot driver;c:\windows\system32\drivers\pavboot.sys [2010-7-16 28552]
R1 ShldDrv;Panda File Shield Driver;c:\windows\system32\drivers\ShlDrv51.sys [2010-7-16 41144]
R2 Gwmsrv;Panda Goodware Cache Manager;c:\windows\system32\svchost -k panda --> c:\windows\system32\svchost -k Panda [?]
R2 Panda Software Controller;Panda Software Controller;c:\program files\panda security\panda antivirus pro 2010\PsCtrlS.exe [2010-7-16 173312]
R2 PAVDRV;pavdrv;c:\windows\system32\drivers\pavdrv51.sys [2010-7-16 84024]
R2 PAVFNSVR;Panda Function Service;c:\program files\panda security\panda antivirus pro 2010\PavFnSvr.exe [2010-7-16 169216]
R2 PavProc;Panda Process Protection Driver;c:\windows\system32\drivers\PavProc.sys [2010-7-16 163336]
R2 PavPrSrv;Panda Process Protection Service;c:\program files\common files\panda security\pavshld\PavPrSrv.exe [2010-7-16 62768]
R2 PAVSRV;Panda On-Access Anti-Malware Service;c:\program files\panda security\panda antivirus pro 2010\PAVSRV51.EXE [2010-7-16 291584]
R2 PskSvcRetail;Panda PSK service;c:\program files\panda security\panda antivirus pro 2010\psksvc.exe [2010-7-16 28928]
R3 AvFlt;Antivirus Filter Driver;c:\windows\system32\drivers\av5flt.sys --> c:\windows\system32\drivers\av5flt.sys [?]
R3 PavSRK.sys;PavSRK.sys;\??\c:\windows\system32\pavsrk.sys --> c:\windows\system32\PavSRK.sys [?]
R3 PavTPK.sys;PavTPK.sys;\??\c:\windows\system32\pavtpk.sys --> c:\windows\system32\PavTPK.sys [?]

============== File Associations ===============

JSEFile=c:\progra~1\pandas~1\pandaa~1\PavScrip.exe "%1" %*
VBEFile=c:\progra~1\pandas~1\pandaa~1\PavScrip.exe "%1" %*
VBSFile=c:\progra~1\pandas~1\pandaa~1\PavScrip.exe "%1" %*

=============== Created Last 30 ================

2010-07-19 23:13:25 0 ----a-w- c:\documents and settings\bob\defogger_reenable
2010-07-19 22:23:56 0 d-----w- c:\program files\Trend Micro
2010-07-17 02:52:01 0 d-----w- c:\program files\ACW
2010-07-16 20:35:53 0 d-----w- c:\docume~1\bob\applic~1\Street-Ads
2010-07-16 20:27:09 0 d-----w- c:\docume~1\bob\applic~1\Sky-Banners
2010-07-16 18:48:14 34688 -c--a-w- c:\windows\system32\dllcache\lbrtfdc.sys
2010-07-16 18:48:14 34688 ----a-w- c:\windows\system32\drivers\lbrtfdc.sys
2010-07-16 18:48:14 172416 ----a-w- c:\windows\system32\drivers\OLD60.tmp
2010-07-16 18:47:54 36608 ----a-w- c:\windows\system32\drivers\OLD5A.tmp
2010-07-16 18:47:54 36608 ----a-w- c:\windows\system32\drivers\ip6fw.sys
2010-07-16 18:47:45 2944 ----a-w- c:\windows\system32\drivers\OLD53.tmp
2010-07-16 18:47:44 2944 ----a-w- c:\windows\system32\drivers\drmkaud.sys
2010-07-16 18:47:41 8576 -c--a-w- c:\windows\system32\dllcache\i2omgmt.sys
2010-07-16 18:47:41 8576 ----a-w- c:\windows\system32\drivers\i2omgmt.sys
2010-07-16 18:47:33 8192 -c--a-w- c:\windows\system32\dllcache\changer.sys
2010-07-16 18:47:33 8192 ----a-w- c:\windows\system32\drivers\changer.sys
2010-07-16 18:47:12 142592 ----a-w- c:\windows\system32\drivers\OLD4D.tmp
2010-07-16 18:47:11 142592 ----a-w- c:\windows\system32\drivers\aec.sys
2010-07-16 18:46:56 150 ----a-w- C:\zrpt.xml
2010-07-16 11:43:42 250 ----a-w- c:\windows\system32\PavCPL.dat
2010-07-16 11:43:25 54832 ----a-w- c:\windows\system32\pavcpl.cpl
2010-07-16 11:43:07 446464 ----a-w- c:\windows\system32\HHActiveX.dll
2010-07-16 11:42:56 87296 ----a-w- c:\windows\system32\PavLspHook.dll
2010-07-16 11:42:56 55552 ----a-w- c:\windows\system32\pavipc.dll
2010-07-16 11:42:56 193792 ----a-w- c:\windows\system32\TpUtil.dll
2010-07-16 11:42:56 107568 ----a-w- c:\windows\system32\SYSTOOLS.DLL
2010-07-16 11:42:55 518400 ----a-w- c:\windows\system32\PavSHook.dll
2010-07-16 11:42:49 84024 ----a-w- c:\windows\system32\drivers\pavdrv51.sys
2010-07-16 11:42:49 58672 ----a-w- c:\windows\system32\avldr.dll
2010-07-16 11:42:49 0 d-----w- c:\windows\system32\PAV
2010-07-16 11:42:48 0 d-----w- c:\docume~1\bob\applic~1\Panda Security
2010-07-16 11:42:48 0 d-----w- c:\docume~1\alluse~1\applic~1\Panda Security
2010-07-16 11:38:08 28552 ----a-w- c:\windows\system32\drivers\pavboot.sys
2010-07-16 11:36:03 41144 ----a-w- c:\windows\system32\drivers\ShlDrv51.sys
2010-07-16 11:36:03 163336 ----a-w- c:\windows\system32\drivers\PavProc.sys
2010-07-16 11:36:03 0 d-----w- c:\program files\common files\Panda Security
2010-07-16 07:01:12 8627 ----a-w- c:\windows\system32\PAV_FOG.OPC
2010-07-15 22:38:53 0 d-----w- c:\program files\Panda Security
2010-06-30 03:50:20 552 ----a-w- c:\windows\system32\d3d8caps.dat

==================== Find3M ====================

2010-06-02 21:23:25 103784 ----a-w- c:\documents and settings\bob\GoToAssistDownloadHelper.exe
2009-04-17 07:22:16 245760 --sha-w- c:\windows\system32\config\systemprofile\ietldcache\index.dat

============= FINISH: 15:17:39.87 ===============

Attached Files


Edited by alaskalad, 19 July 2010 - 10:39 PM.


BC AdBot (Login to Remove)

 


#2 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:03:25 PM

Posted 25 July 2010 - 07:18 PM

Hi,

Welcome to Bleeping Computer. My name is m0le and I will be helping you with your log.
  • Please subscribe to this topic, if you haven't already. You can subscribe by clicking the Options box to the right of your topic title and selecting Track This Topic.

  • Please avoid installing/uninstalling or updating any programs and attempting any unsupervised fixes or scans. This can make helping you impossible.

  • Please reply to this post so I know you are there.
The forum is busy and we need to have replies as soon as possible. If I haven't had a reply after 3 days I will bump the topic and if you do not reply by the following day after that then I will close the topic.

Once I receive a reply then I will return with your first instructions.

Thanks thumbup2.gif
Posted Image
m0le is a proud member of UNITE

#3 alaskalad

alaskalad
  • Topic Starter

  • Members
  • 15 posts
  • OFFLINE
  •  
  • Local time:07:25 AM

Posted 25 July 2010 - 08:20 PM

Yes I am still here thank you mole.
The troubled pc is shut down and has been since I ran the posted logs so they should be up to date and I look forward to your help.

I have since learned that my ISP had "Quaranteened" us until I explained that the infected PC was disabled. I would like to know if any programs you need me to download can be done on another pc and then transferred via disc to the offline computer.

Thank you again in advance

alaskalad

#4 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:03:25 PM

Posted 26 July 2010 - 12:58 PM

Yes, you can download the following programs onto either a CD or a flashdrive to transfer over to the infected PC.

Make sure the infected PC is not connected to the internet and then download the following programs onto the disk or drive

Combofix

Please download ComboFix from one of these locations:

Rkill

Download and Run RKill

Please download RKill by Grinler from one of the 4 links below

Link 1
Link 2
Link 3
Link 4



OTL

Download OTL


Finally, MBAM

Please download Malwarebytes Anti-Malware

When you have done this please let me know
Posted Image
m0le is a proud member of UNITE

#5 alaskalad

alaskalad
  • Topic Starter

  • Members
  • 15 posts
  • OFFLINE
  •  
  • Local time:07:25 AM

Posted 26 July 2010 - 02:49 PM

thanks mole. Do I need to turn off my antivirus on the second pc to download?

edit: I can download all but rkill. Mcafee (on the uninfected machine) says there is a trojan and blocks it but since I am already concerned malware across this network I don't want to turn it off unless necessary.

edit again: I thought I would go ahead and run combofix as instructed until I received further instructions about rkill but it says McAfee is still running and I cannot find it. I uninstalled Pandavirus in case that is what was confusing it but it still finds McAfee and says not to proceed until it is turned off.

Edited by alaskalad, 26 July 2010 - 04:19 PM.


#6 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:03:25 PM

Posted 26 July 2010 - 05:14 PM

Some McAfee is still present on the machine.

Uninstall McAfee using this tool

Now try it again. smile.gif
Posted Image
m0le is a proud member of UNITE

#7 alaskalad

alaskalad
  • Topic Starter

  • Members
  • 15 posts
  • OFFLINE
  •  
  • Local time:07:25 AM

Posted 26 July 2010 - 05:50 PM

ok, rerunning combofix. now do I need to run rkill b4 OTL and MBAM? If I run them do you think it will be safe enough to take the infected machine on line to get rkll?

#8 alaskalad

alaskalad
  • Topic Starter

  • Members
  • 15 posts
  • OFFLINE
  •  
  • Local time:07:25 AM

Posted 26 July 2010 - 05:55 PM

Combofix has stalled looking for recovery console and is looking for an internet connection to proceed. I am thinking it would easier to just plug in for all of these fixes. If we get quaranteened again I will just deal with the ISP.
What do you think mole?

#9 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:03:25 PM

Posted 26 July 2010 - 06:13 PM

It is your choice if you don't want to continue but I'm not seeing anything unsurmountable here.


Also, I only wanted these downloaded and not run yet...


Please run Rkill first
  • Before we begin, you should disable your anti-malware softwares you have installed so they do not interfere RKill running as some anti-malware softwares detect RKill as malicious. Please refer to this page if you are not sure how.
  • Double-click on Rkill on your desktop to run it. (If you are using Windows Vista, please right-click on it and select Run As Administrator)
  • A black screen will appear and then disappear. Please do not worry, that is normal. This means that the tool has been successfully executed.
  • Please post the resulting log in your next reply.

Then when you run Combofix make sure that you do not request the Recovery Console to be installed.
  • Disable your AntiVirus and AntiSpyware applications, usually via a right click on the System Tray icon. They may otherwise interfere with our tools. (Click on this link to see a list of programs that should be disabled. The list is not all inclusive.)
  • Double click on Comfix.exe & follow the prompts.
  • As part of it's process, ComboFix will check to see if the Microsoft Windows Recovery Console is installed. With malware infections being as they are today, it's strongly recommended to have this pre-installed on your machine before doing any malware removal. It will allow you to boot up into a special recovery/repair mode that will allow us to more easily help you should your computer have a problem after an attempted removal of malware.
  • Follow the prompts to allow ComboFix to download and do not install the Microsoft Windows Recovery Console, and when prompted, agree to the End-User License Agreement to install the Microsoft Windows Recovery Console.
**Please note: If the Microsoft Windows Recovery Console is already installed, ComboFix will continue it's malware removal procedures.



Once the Microsoft Windows Recovery Console is installed using ComboFix, you should see the following message:



Click on Yes, to continue scanning for malware.

When finished, it shall produce a log for you. Please include the C:\ComboFix.txt in your next reply.


Posted Image
m0le is a proud member of UNITE

#10 alaskalad

alaskalad
  • Topic Starter

  • Members
  • 15 posts
  • OFFLINE
  •  
  • Local time:07:25 AM

Posted 26 July 2010 - 06:57 PM

OK, I am sorry mOle, I misread the directions but here are the rkill and combofix logs. I really do wish to continue and sincerely appreciate your help.



This log file is located at C:\rkill.log.
Please post this only if requested to by the person helping you.
Otherwise you can close this log when you wish.
Ran as Bob on 07/26/2010 at 15:29:26.


Processes terminated by Rkill or while it was running:


C:\Documents and Settings\Bob\Local Settings\Temporary Internet Files\Content.IE5\XNTWJTJU\rkill[1].scr


Rkill completed on 07/26/2010 at 15:29:32.




ComboFix 10-07-24.06 - Bob 07/26/2010 15:39:50.1.1 - x86
Microsoft Windows XP Home Edition 5.1.2600.3.1252.1.1033.18.2047.1742 [GMT -8:00]
Running from: c:\documents and settings\Bob\Desktop\ComboFix.exe
.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.

c:\documents and settings\Bob\Application Data\Sky-Banners
c:\documents and settings\Bob\Application Data\Sky-Banners\skb\log.xml
c:\documents and settings\Bob\Application Data\Street-Ads
c:\documents and settings\Bob\GoToAssistDownloadHelper.exe
C:\LOG20D.tmp
C:\LOG20F.tmp
C:\LOG210.tmp
c:\windows\$NtUninstallMTF1011$
c:\windows\$NtUninstallMTF1011$\zrpt.xml
c:\windows\system32\config\systemprofile\Application Data\Sky-Banners
c:\windows\system32\config\systemprofile\Application Data\Street-Ads
c:\windows\system32\Data

Infected copy of c:\windows\system32\drivers\pci.sys was found and disinfected
Restored copy from - Kitty had a snack tongue.gif
.
((((((((((((((((((((((((( Files Created from 2010-06-26 to 2010-07-26 )))))))))))))))))))))))))))))))
.

2010-07-19 22:23 . 2010-07-19 22:23 -------- d-----w- c:\program files\Trend Micro
2010-07-17 02:52 . 2010-07-17 02:52 -------- d-----w- c:\program files\ACW
2010-07-16 09:11 . 2010-07-16 09:11 -------- d-sh--w- c:\documents and settings\Administrator\IETldCache
2010-07-15 22:38 . 2010-07-26 20:59 -------- d-----w- c:\program files\Panda Security
2010-07-05 23:30 . 2010-07-05 23:33 -------- d-----w- c:\documents and settings\LocalService\Local Settings\Application Data\Adobe
2010-06-30 03:50 . 2010-06-30 03:50 552 ----a-w- c:\windows\system32\d3d8caps.dat

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2010-07-26 20:59 . 2007-10-04 19:23 -------- d--h--w- c:\program files\InstallShield Installation Information
2010-07-16 18:53 . 2010-07-16 18:47 -------- d-----w- c:\windows\system32\config\systemprofile\Application Data\HPAppData
2010-07-16 18:46 . 2008-08-09 19:17 664 ----a-w- c:\windows\system32\d3d9caps.dat
2010-07-16 10:26 . 2010-04-03 23:43 -------- d-----w- c:\documents and settings\Bob\Application Data\HPAppData
2010-06-27 20:35 . 2008-09-24 00:53 -------- d-----w- c:\program files\Common Files\Adobe
2010-06-23 18:12 . 2010-05-04 18:10 439816 ----a-w- c:\documents and settings\Bob\Application Data\Real\Update\setup3.10\setup.exe
2010-06-16 03:26 . 2008-12-12 03:59 -------- d-----w- c:\program files\Microsoft Silverlight
2010-06-16 03:13 . 2010-06-16 03:13 -------- d-----w- c:\documents and settings\Bob\Application Data\HP
2010-06-02 21:23 . 2010-06-02 21:23 -------- d-----w- c:\program files\Citrix
2010-05-23 16:22 . 2010-05-23 16:22 503808 ----a-w- c:\documents and settings\Bob\Application Data\Sun\Java\Deployment\SystemCache\6.0\46\f84c6ae-6042748d-n\msvcp71.dll
2010-05-23 16:22 . 2010-05-23 16:22 499712 ----a-w- c:\documents and settings\Bob\Application Data\Sun\Java\Deployment\SystemCache\6.0\46\f84c6ae-6042748d-n\jmc.dll
2010-05-23 16:22 . 2010-05-23 16:22 348160 ----a-w- c:\documents and settings\Bob\Application Data\Sun\Java\Deployment\SystemCache\6.0\46\f84c6ae-6042748d-n\msvcr71.dll
2010-05-23 16:22 . 2010-05-23 16:22 61440 ----a-w- c:\documents and settings\Bob\Application Data\Sun\Java\Deployment\SystemCache\6.0\50\5535ab32-67d83151-n\decora-sse.dll
2010-05-23 16:22 . 2010-05-23 16:22 12800 ----a-w- c:\documents and settings\Bob\Application Data\Sun\Java\Deployment\SystemCache\6.0\50\5535ab32-67d83151-n\decora-d3d.dll
2010-04-29 15:57 . 2010-04-29 15:57 73000 ----a-w- c:\documents and settings\All Users\Application Data\Apple Computer\Installer Cache\iTunes 9.1.1.12\SetupAdmin.exe
.

------- Sigcheck -------

[-] 2008-04-14 . F92E1076C42FCD6DB3D72D8CFE9816D5 . 13824 . . [5.1.2600.5512] . . c:\windows\system32\wscntfy.exe
[7] 2008-02-13 . 6B3BB0CB225DFE6F97A00A4D6882A450 . 13824 . . [5.1.2600.3311] . . c:\windows\ServicePackFiles\i386\wscntfy.exe
[7] 2004-08-04 . 49911DD39E023BB6C45E4E436CFBD297 . 13824 . . [5.1.2600.2180] . . c:\windows\$NtServicePackUninstall$\wscntfy.exe

[-] 2008-04-14 . 295D21F14C335B53CB8154E5B1F892B9 . 129024 . . [5.1.2600.5512] . . c:\windows\system32\xmlprov.dll
[7] 2008-02-12 . 57F89D9888665E43C9CC14537C8EE465 . 129024 . . [5.1.2600.3311] . . c:\windows\ServicePackFiles\i386\xmlprov.dll
[7] 2004-08-04 . EEF46DAB68229A14DA3D8E73C99E2959 . 129536 . . [5.1.2600.2180] . . c:\windows\$NtServicePackUninstall$\xmlprov.dll

[-] 2008-04-13 . 3BB22519A194418D5FEC05D800A19AD0 . 36608 . . [5.1.2600.5512] . . c:\windows\system32\drivers\ip6fw.sys
[7] 2008-02-12 . C0E5E466FC2C126429728060B5CD92D9 . 36608 . . [5.1.2600.3311] . . c:\windows\ServicePackFiles\i386\ip6fw.sys
[7] 2008-02-12 . C0E5E466FC2C126429728060B5CD92D9 . 36608 . . [5.1.2600.3311] . . c:\windows\system32\dllcache\ip6fw.sys
[7] 2004-08-04 . 4448006B6BC60E6C027932CFC38D6855 . 29056 . . [5.1.2600.2180] . . c:\windows\$NtServicePackUninstall$\ip6fw.sys

[-] 2008-04-14 . 0607CBC6FA20114CB491EFE4B2F9EFAD . 1689088 . . [5.03.2600.5512] . . c:\windows\system32\d3d9.dll
[7] 2008-02-12 . DAD6BD806D798496203D5743681477A1 . 1689088 . . [5.03.2600.3311] . . c:\windows\ServicePackFiles\i386\d3d9.dll
[7] 2004-08-04 . D67BDBBDA86CC9AEEBBAF3217C1717D8 . 1689088 . . [5.03.2600.2180] . . c:\windows\$NtServicePackUninstall$\d3d9.dll
.
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"NvMediaCenter"="c:\windows\system32\NVMCTRAY.DLL" [2003-07-28 49152]
"YSearchProtection"="c:\program files\Yahoo!\Search Protection\SearchProtection.exe" [2008-10-07 111856]
"Search Protection"="c:\program files\Yahoo!\Search Protection\SearchProtection.exe" [2008-10-07 111856]
"swg"="c:\program files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe" [2007-10-12 68856]
"Messenger (Yahoo!)"="c:\program files\Yahoo!\Messenger\YahooMessenger.exe" [2009-05-27 4351216]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"NvCplDaemon"="c:\windows\system32\NvCpl.dll" [2003-07-28 4841472]
"nwiz"="nwiz.exe" [2003-07-28 323584]
"NvMediaCenter"="c:\windows\system32\NvMcTray.dll" [2003-07-28 49152]
"UpdReg"="c:\windows\UpdReg.EXE" [2000-05-11 90112]
"diagent"="c:\program files\Creative\SBLive\Diagnostics\diagent.exe" [2002-04-03 135264]
"RemoteControl"="c:\program files\CyberLink\PowerDVD\PDVDServ.exe" [2005-12-08 30208]
"LanguageShortcut"="c:\program files\CyberLink\PowerDVD\Language\Language.exe" [2006-05-18 49152]
"YSearchProtection"="c:\program files\Yahoo!\Search Protection\SearchProtection.exe" [2008-10-07 111856]
"Microsoft Default Manager"="c:\program files\Microsoft\Search Enhancement Pack\Default Manager\DefMgr.exe" [2009-02-03 233304]
"TkBellExe"="c:\program files\Common Files\Real\Update_OB\realsched.exe" [2009-10-22 198160]
"SunJavaUpdateSched"="c:\program files\Common Files\Java\Java Update\jusched.exe" [2010-01-12 246504]
"QuickTime Task"="c:\program files\QuickTime\qttask.exe" [2010-03-18 421888]
"HP Software Update"="c:\program files\HP\HP Software Update\HPWuSchd2.exe" [2010-03-12 49208]
"iTunesHelper"="c:\program files\iTunes\iTunesHelper.exe" [2010-04-28 142120]
"Adobe Reader Speed Launcher"="c:\program files\Adobe\Reader 8.0\Reader\Reader_sl.exe" [2010-06-17 40368]
"Adobe ARM"="c:\program files\Common Files\Adobe\ARM\1.0\AdobeARM.exe" [2010-06-09 976832]

[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run]
"NvMediaCenter"="c:\windows\system32\NVMCTRAY.DLL" [2003-07-28 49152]

c:\documents and settings\All Users\Start Menu\Programs\Startup\
HP Digital Imaging Monitor.lnk - c:\program files\HP\Digital Imaging\bin\hpqtra08.exe [2008-10-16 214360]
NkbMonitor.exe.lnk - c:\program files\Nikon\PictureProject\NkbMonitor.exe [2008-1-22 118784]

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\GoToAssist]
2010-06-02 21:23 13672 ----a-w- c:\program files\Citrix\GoToAssist\599\g2awinlogon.dll

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]
"EnableFirewall"= 0 (0x0)

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"c:\\Program Files\\Yahoo!\\Messenger\\YahooMessenger.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpqtra08.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpqste08.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpofxm08.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hposfx08.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hposid01.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpqkygrp.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpfcCopy.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpzwiz01.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpiscnapp.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpofxs08.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpqfxt08.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpqgplgtupl.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpqgpc01.exe"=
"c:\\Program Files\\HP\\HP Software Update\\hpwucli.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\Smart Web Printing\\SmartWebPrintExe.exe"=
"c:\\Program Files\\Bonjour\\mDNSResponder.exe"=
"c:\\Program Files\\iTunes\\iTunes.exe"=


[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\svchost]
HPZ12 REG_MULTI_SZ Pml Driver HPZ12 Net Driver HPZ12
HPService REG_MULTI_SZ HPSLPSVC
hpdevmgmt REG_MULTI_SZ hpqcxs08 hpqddsvc
.
Contents of the 'Scheduled Tasks' folder

2010-07-06 c:\windows\Tasks\AppleSoftwareUpdate.job
- c:\program files\Apple Software Update\SoftwareUpdate.exe [2007-08-29 21:34]
.
.
------- Supplementary Scan -------
.
uStart Page = hxxp://en.canoe.ca/home.html
mStart Page = hxxp://www.yahoo.com/
uInternet Settings,ProxyOverride = <local>
uInternet Settings,ProxyServer = http=127.0.0.1:5643
uSearchAssistant = hxxp://www.google.com/ie
uSearchURL,(Default) = hxxp://search.yahoo.com/search?fr=mcafee&p=%s
Trusted Zone: axo20.com\quintiles
Trusted Zone: concursolutions.com
Trusted Zone: sumtotalsystems.com
.
- - - - ORPHANS REMOVED - - - -

BHO-{35C3A235-EE25-423A-A2F6-2BB15C77A7FF} - c:\windows\system32\elnap.dll
BHO-{85F83964-EDA7-4C7A-AAE2-FE6029A4E758} - c:\windows\system32\alnap.dll
Toolbar-Locked - (no file)
WebBrowser-{604BC32A-9680-40D1-9AC6-E06B23A1BA4C} - (no file)
HKCU-Run-dqmelsrt - c:\documents and settings\Bob\Local Settings\Application Data\wceufjygp\neixlentssd.exe
HKLM-Run-NWEReboot - (no file)
HKLM-Run-sta - elnap.dll
SafeBoot-svcWRSSSDK
AddRemove-$NtUninstallMTF1011$ - c:\windows\$NtUninstallMTF1011$\apUninstall.exe
AddRemove-ActiveScan 2.0 - c:\program files\Panda Security\ActiveScan 2.0\as2uninst.exe



**************************************************************************

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2010-07-26 15:48
Windows 5.1.2600 Service Pack 3, v.3311 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully
hidden files: 0

**************************************************************************
.
--------------------- DLLs Loaded Under Running Processes ---------------------

- - - - - - - > 'winlogon.exe'(436)
c:\program files\Citrix\GoToAssist\599\G2AWinLogon.dll
.
Completion time: 2010-07-26 15:50:49
ComboFix-quarantined-files.txt 2010-07-26 23:50

Pre-Run: 14,226,702,336 bytes free
Post-Run: 15,148,900,352 bytes free

- - End Of File - - 9F223CF046A78071F0079EAFF114086A


#11 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:03:25 PM

Posted 26 July 2010 - 07:22 PM

The TDSS rootkit has been removed

1. Close any open browsers.

2. Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.

3. Open notepad and copy/paste the text in the box below into it:

QUOTE
DDS::
uInternet Settings,ProxyOverride = <local>
uInternet Settings,ProxyServer = http=127.0.0.1:5643


Save this as CFScript.txt, in the same location as Comfix.exe (called ComboFix.exe in the below graphic)




Refering to the picture above, drag CFScript into ComboFix.exe

When finished, it shall produce a log for you at C:\ComboFix.txt which I will require in your next reply.
Posted Image
m0le is a proud member of UNITE

#12 alaskalad

alaskalad
  • Topic Starter

  • Members
  • 15 posts
  • OFFLINE
  •  
  • Local time:07:25 AM

Posted 26 July 2010 - 07:36 PM

here is the next combofix log:




ComboFix 10-07-24.06 - Bob 07/26/2010 16:30:15.2.1 - x86
Microsoft Windows XP Home Edition 5.1.2600.3.1252.1.1033.18.2047.1607 [GMT -8:00]
Running from: c:\documents and settings\Bob\Desktop\ComboFix.exe
Command switches used :: c:\documents and settings\Bob\Desktop\CFScript.txt
.

((((((((((((((((((((((((( Files Created from 2010-06-27 to 2010-07-27 )))))))))))))))))))))))))))))))
.

2010-07-19 22:23 . 2010-07-19 22:23 -------- d-----w- c:\program files\Trend Micro
2010-07-17 02:52 . 2010-07-17 02:52 -------- d-----w- c:\program files\ACW
2010-07-16 09:11 . 2010-07-16 09:11 -------- d-sh--w- c:\documents and settings\Administrator\IETldCache
2010-07-15 22:38 . 2010-07-26 20:59 -------- d-----w- c:\program files\Panda Security
2010-07-05 23:30 . 2010-07-05 23:33 -------- d-----w- c:\documents and settings\LocalService\Local Settings\Application Data\Adobe
2010-06-30 03:50 . 2010-06-30 03:50 552 ----a-w- c:\windows\system32\d3d8caps.dat

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2010-07-26 20:59 . 2007-10-04 19:23 -------- d--h--w- c:\program files\InstallShield Installation Information
2010-07-16 18:53 . 2010-07-16 18:47 -------- d-----w- c:\windows\system32\config\systemprofile\Application Data\HPAppData
2010-07-16 18:46 . 2008-08-09 19:17 664 ----a-w- c:\windows\system32\d3d9caps.dat
2010-07-16 10:26 . 2010-04-03 23:43 -------- d-----w- c:\documents and settings\Bob\Application Data\HPAppData
2010-06-27 20:35 . 2008-09-24 00:53 -------- d-----w- c:\program files\Common Files\Adobe
2010-06-23 18:12 . 2010-05-04 18:10 439816 ----a-w- c:\documents and settings\Bob\Application Data\Real\Update\setup3.10\setup.exe
2010-06-16 03:26 . 2008-12-12 03:59 -------- d-----w- c:\program files\Microsoft Silverlight
2010-06-16 03:13 . 2010-06-16 03:13 -------- d-----w- c:\documents and settings\Bob\Application Data\HP
2010-06-02 21:23 . 2010-06-02 21:23 -------- d-----w- c:\program files\Citrix
2010-05-23 16:22 . 2010-05-23 16:22 503808 ----a-w- c:\documents and settings\Bob\Application Data\Sun\Java\Deployment\SystemCache\6.0\46\f84c6ae-6042748d-n\msvcp71.dll
2010-05-23 16:22 . 2010-05-23 16:22 499712 ----a-w- c:\documents and settings\Bob\Application Data\Sun\Java\Deployment\SystemCache\6.0\46\f84c6ae-6042748d-n\jmc.dll
2010-05-23 16:22 . 2010-05-23 16:22 348160 ----a-w- c:\documents and settings\Bob\Application Data\Sun\Java\Deployment\SystemCache\6.0\46\f84c6ae-6042748d-n\msvcr71.dll
2010-05-23 16:22 . 2010-05-23 16:22 61440 ----a-w- c:\documents and settings\Bob\Application Data\Sun\Java\Deployment\SystemCache\6.0\50\5535ab32-67d83151-n\decora-sse.dll
2010-05-23 16:22 . 2010-05-23 16:22 12800 ----a-w- c:\documents and settings\Bob\Application Data\Sun\Java\Deployment\SystemCache\6.0\50\5535ab32-67d83151-n\decora-d3d.dll
2010-04-29 15:57 . 2010-04-29 15:57 73000 ----a-w- c:\documents and settings\All Users\Application Data\Apple Computer\Installer Cache\iTunes 9.1.1.12\SetupAdmin.exe
.

------- Sigcheck -------

[-] 2008-04-14 . F92E1076C42FCD6DB3D72D8CFE9816D5 . 13824 . . [5.1.2600.5512] . . c:\windows\system32\wscntfy.exe
[7] 2008-02-13 . 6B3BB0CB225DFE6F97A00A4D6882A450 . 13824 . . [5.1.2600.3311] . . c:\windows\ServicePackFiles\i386\wscntfy.exe
[7] 2004-08-04 . 49911DD39E023BB6C45E4E436CFBD297 . 13824 . . [5.1.2600.2180] . . c:\windows\$NtServicePackUninstall$\wscntfy.exe

[-] 2008-04-14 . 295D21F14C335B53CB8154E5B1F892B9 . 129024 . . [5.1.2600.5512] . . c:\windows\system32\xmlprov.dll
[7] 2008-02-12 . 57F89D9888665E43C9CC14537C8EE465 . 129024 . . [5.1.2600.3311] . . c:\windows\ServicePackFiles\i386\xmlprov.dll
[7] 2004-08-04 . EEF46DAB68229A14DA3D8E73C99E2959 . 129536 . . [5.1.2600.2180] . . c:\windows\$NtServicePackUninstall$\xmlprov.dll

[-] 2008-04-13 . 3BB22519A194418D5FEC05D800A19AD0 . 36608 . . [5.1.2600.5512] . . c:\windows\system32\drivers\ip6fw.sys
[7] 2008-02-12 . C0E5E466FC2C126429728060B5CD92D9 . 36608 . . [5.1.2600.3311] . . c:\windows\ServicePackFiles\i386\ip6fw.sys
[7] 2008-02-12 . C0E5E466FC2C126429728060B5CD92D9 . 36608 . . [5.1.2600.3311] . . c:\windows\system32\dllcache\ip6fw.sys
[7] 2004-08-04 . 4448006B6BC60E6C027932CFC38D6855 . 29056 . . [5.1.2600.2180] . . c:\windows\$NtServicePackUninstall$\ip6fw.sys

[-] 2008-04-14 . 0607CBC6FA20114CB491EFE4B2F9EFAD . 1689088 . . [5.03.2600.5512] . . c:\windows\system32\d3d9.dll
[7] 2008-02-12 . DAD6BD806D798496203D5743681477A1 . 1689088 . . [5.03.2600.3311] . . c:\windows\ServicePackFiles\i386\d3d9.dll
[7] 2004-08-04 . D67BDBBDA86CC9AEEBBAF3217C1717D8 . 1689088 . . [5.03.2600.2180] . . c:\windows\$NtServicePackUninstall$\d3d9.dll
.
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"NvMediaCenter"="c:\windows\system32\NVMCTRAY.DLL" [2003-07-28 49152]
"YSearchProtection"="c:\program files\Yahoo!\Search Protection\SearchProtection.exe" [2008-10-07 111856]
"Search Protection"="c:\program files\Yahoo!\Search Protection\SearchProtection.exe" [2008-10-07 111856]
"swg"="c:\program files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe" [2007-10-12 68856]
"Messenger (Yahoo!)"="c:\program files\Yahoo!\Messenger\YahooMessenger.exe" [2009-05-27 4351216]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"NvCplDaemon"="c:\windows\system32\NvCpl.dll" [2003-07-28 4841472]
"nwiz"="nwiz.exe" [2003-07-28 323584]
"NvMediaCenter"="c:\windows\system32\NvMcTray.dll" [2003-07-28 49152]
"UpdReg"="c:\windows\UpdReg.EXE" [2000-05-11 90112]
"diagent"="c:\program files\Creative\SBLive\Diagnostics\diagent.exe" [2002-04-03 135264]
"RemoteControl"="c:\program files\CyberLink\PowerDVD\PDVDServ.exe" [2005-12-08 30208]
"LanguageShortcut"="c:\program files\CyberLink\PowerDVD\Language\Language.exe" [2006-05-18 49152]
"YSearchProtection"="c:\program files\Yahoo!\Search Protection\SearchProtection.exe" [2008-10-07 111856]
"Microsoft Default Manager"="c:\program files\Microsoft\Search Enhancement Pack\Default Manager\DefMgr.exe" [2009-02-03 233304]
"TkBellExe"="c:\program files\Common Files\Real\Update_OB\realsched.exe" [2009-10-22 198160]
"SunJavaUpdateSched"="c:\program files\Common Files\Java\Java Update\jusched.exe" [2010-01-12 246504]
"QuickTime Task"="c:\program files\QuickTime\qttask.exe" [2010-03-18 421888]
"HP Software Update"="c:\program files\HP\HP Software Update\HPWuSchd2.exe" [2010-03-12 49208]
"iTunesHelper"="c:\program files\iTunes\iTunesHelper.exe" [2010-04-28 142120]
"Adobe Reader Speed Launcher"="c:\program files\Adobe\Reader 8.0\Reader\Reader_sl.exe" [2010-06-17 40368]
"Adobe ARM"="c:\program files\Common Files\Adobe\ARM\1.0\AdobeARM.exe" [2010-06-09 976832]

[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run]
"NvMediaCenter"="c:\windows\system32\NVMCTRAY.DLL" [2003-07-28 49152]

c:\documents and settings\All Users\Start Menu\Programs\Startup\
HP Digital Imaging Monitor.lnk - c:\program files\HP\Digital Imaging\bin\hpqtra08.exe [2008-10-16 214360]
NkbMonitor.exe.lnk - c:\program files\Nikon\PictureProject\NkbMonitor.exe [2008-1-22 118784]

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\GoToAssist]
2010-06-02 21:23 13672 ----a-w- c:\program files\Citrix\GoToAssist\599\g2awinlogon.dll

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]
"EnableFirewall"= 0 (0x0)

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"c:\\Program Files\\Yahoo!\\Messenger\\YahooMessenger.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpqtra08.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpqste08.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpofxm08.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hposfx08.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hposid01.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpqkygrp.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpfcCopy.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpzwiz01.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpiscnapp.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpofxs08.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpqfxt08.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpqgplgtupl.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpqgpc01.exe"=
"c:\\Program Files\\HP\\HP Software Update\\hpwucli.exe"=
"c:\\Program Files\\HP\\Digital Imaging\\Smart Web Printing\\SmartWebPrintExe.exe"=
"c:\\Program Files\\Bonjour\\mDNSResponder.exe"=
"c:\\Program Files\\iTunes\\iTunes.exe"=


[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\svchost]
HPZ12 REG_MULTI_SZ Pml Driver HPZ12 Net Driver HPZ12
HPService REG_MULTI_SZ HPSLPSVC
hpdevmgmt REG_MULTI_SZ hpqcxs08 hpqddsvc
.
Contents of the 'Scheduled Tasks' folder

2010-07-06 c:\windows\Tasks\AppleSoftwareUpdate.job
- c:\program files\Apple Software Update\SoftwareUpdate.exe [2007-08-29 21:34]
.
.
------- Supplementary Scan -------
.
uStart Page = hxxp://en.canoe.ca/home.html
mStart Page = hxxp://www.yahoo.com/
uSearchAssistant = hxxp://www.google.com/ie
uSearchURL,(Default) = hxxp://search.yahoo.com/search?fr=mcafee&p=%s
Trusted Zone: axo20.com\quintiles
Trusted Zone: concursolutions.com
Trusted Zone: sumtotalsystems.com
.

**************************************************************************

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2010-07-26 16:32
Windows 5.1.2600 Service Pack 3, v.3311 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully
hidden files: 0

**************************************************************************
.
--------------------- DLLs Loaded Under Running Processes ---------------------

- - - - - - - > 'winlogon.exe'(436)
c:\program files\Citrix\GoToAssist\599\G2AWinLogon.dll

- - - - - - - > 'explorer.exe'(3688)
c:\windows\system32\ieframe.dll
c:\windows\system32\OneX.DLL
c:\windows\system32\eappprxy.dll
c:\windows\system32\webcheck.dll
c:\windows\system32\WPDShServiceObj.dll
c:\windows\system32\PortableDeviceTypes.dll
c:\windows\system32\PortableDeviceApi.dll
.
Completion time: 2010-07-26 16:34:17
ComboFix-quarantined-files.txt 2010-07-27 00:34
ComboFix2.txt 2010-07-26 23:50

Pre-Run: 15,144,677,376 bytes free
Post-Run: 15,129,337,856 bytes free

- - End Of File - - 6DD3FC9CEF1BE80A4B4895C281A77D9D


#13 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:03:25 PM

Posted 26 July 2010 - 07:42 PM

That looks fine. Please run MBAM next
  • Make sure you are connected to the Internet.
  • Double-click on mbam-setup.exe to install the application or, if you are using Vista, right-click and select Run As Administrator on mbam-setup.exe to install the application.
  • When the installation begins, follow the prompts and do not make any changes to default settings.
  • When installation has finished, make sure you leave both of these checked:
    • Update Malwarebytes' Anti-Malware
    • Launch Malwarebytes' Anti-Malware
  • Then click Finish.
  • MBAM will automatically start and you will be asked to update the program before performing a scan. If an update is found, the program will automatically update itself. Press the OK button to close that box and continue. If you encounter any problems while downloading the updates, manually download them from here and just double-click on mbam-rules.exe to install.
  • On the Scanner tab:
    • Make sure the "Perform Full Scan" option is selected.
    • Then click on the Scan button.
  • If asked to select the drives to scan, leave all the drives selected and click on the Start Scan button.
  • The scan will begin and "Scan in progress" will show at the top. It may take some time to complete so please be patient.
  • When the scan is finished, a message box will say "The scan completed successfully. Click 'Show Results' to display all objects found".
  • Click OK to close the message box and continue with the removal process.
  • Back at the main Scanner screen, click on the Show Results button to see a list of any malware that was found.
  • Make sure that everything is checked, and click Remove Selected.
  • When removal is completed, a log report will open in Notepad.
  • The log is automatically saved and can be viewed by clicking the Logs tab in MBAM.
  • Copy and paste the contents of that report in your next reply and exit MBAM.
Note: If MBAM encounters a file that is difficult to remove, you may be asked to reboot your computer so it can proceed with the disinfection process. Regardless if prompted to restart the computer or not, please do so immediately. Failure to reboot normally (not into safe mode) will prevent MBAM from removing all the malware. MBAM may make changes to your registry as part of its disinfection routine. If you're using other security programs that detect registry changes, they may alert you after scanning with MBAM. Please permit the program to allow the changes.
Posted Image
m0le is a proud member of UNITE

#14 alaskalad

alaskalad
  • Topic Starter

  • Members
  • 15 posts
  • OFFLINE
  •  
  • Local time:07:25 AM

Posted 26 July 2010 - 08:53 PM

here is the mbam report:




Malwarebytes' Anti-Malware 1.46
www.malwarebytes.org

Database version: 4356

Windows 5.1.2600 Service Pack 3, v.3311
Internet Explorer 8.0.6001.18702

7/26/2010 5:50:55 PM
mbam-log-2010-07-26 (17-50-55).txt

Scan type: Full scan (A:\|C:\|D:\|E:\|)
Objects scanned: 217274
Time elapsed: 1 hour(s), 1 minute(s), 42 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 5
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 0

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
HKEY_CLASSES_ROOT\AppID\{84c3c236-f588-4c93-84f4-147b2abbe67b} (Adware.Adrotator) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\AppID\{38061edc-40bb-4618-a8da-e56353347e6d} (Adware.EZlife) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\AppID\{7b6a2552-e65b-4a9e-add4-c45577ffd8fd} (Adware.EZLife) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Sky-Banners (Adware.Adrotator) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Sky-Banners (Adware.Adrotator) -> Quarantined and deleted successfully.

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
(No malicious items detected)


#15 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:03:25 PM

Posted 27 July 2010 - 04:11 PM

ESET's online scanner should clear out any stray files
  1. Hold down Control and click on the following link to open ESET OnlineScan in a new window.
    ESET OnlineScan
  2. Click the button.
  3. For alternate browsers only: (Microsoft Internet Explorer users can skip these steps)
    1. Click on to download the ESET Smart Installer. Save it to your desktop.
    2. Double click on the icon on your desktop.
  4. Check
  5. Click the button.
  6. Accept any security warnings from your browser.
  7. Leave the top box checked and then check
  8. Push the Start button.
  9. ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this can take some time.
  10. When the scan completes, push
  11. Push , and save the file to your desktop using a unique name, such as ESETScan. Include the contents of this report in your next reply.
  12. Push the button.
  13. Push
NOTE: If no malware is found then no log will be produced. Let me know if this is the case.
Posted Image
m0le is a proud member of UNITE




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users