Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Virus - IE opens to random sites, unable to see CD/DVD drives, unable to run GMER.


  • This topic is locked This topic is locked
28 replies to this topic

#1 piscomatt

piscomatt

  • Members
  • 19 posts
  • OFFLINE
  •  
  • Local time:06:13 AM

Posted 26 August 2010 - 02:05 PM

I believe I have a malware virus on my computer. It started where Internet Explorer pages would open by themselves to random sites. Next I've noticed that my CD drives are no longer visible. When I put a CD or DVD into either one of my 2 disc drives, I don't see either on My Computer. I keep getting an error that my drives are not up-to-date but I'm not able to update them. I get the following message when my computer comes on - "The driver CDR4_XP.SYS on your system is old. Please reinstall DirectCD to update the driver".

I followed the steps for the Preparation Guide and have attached the Attach.txt and DDS.txt files. I was not able to run the GMER program. I tried multiple times and I keep getting this error and the computer shuts down. The error was "A problem has been detected and windows has been shut down to prevent damage to your computer. IRQL_NOT_LESS_OR_EQUAL." There is more text and then at the bottom it said "Technical Info: ***STOP: 0x0000000A (0x00202074,....)" it continues on with more numbers.

Any help would be greatly appreciated.

Thanks

Attached Files



BC AdBot (Login to Remove)

 


#2 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:11:13 AM

Posted 31 August 2010 - 07:59 PM

Hi,

Welcome to Bleeping Computer. My name is m0le and I will be helping you with your log.
  • Please subscribe to this topic, if you haven't already. You can subscribe by clicking the Options box to the right of your topic title and selecting Track This Topic.

  • Please avoid installing/uninstalling or updating any programs and attempting any unsupervised fixes or scans. This can make helping you impossible.

  • Please reply to this post so I know you are there.
The forum is busy and we need to have replies as soon as possible. If I haven't had a reply after 3 days I will bump the topic and if you do not reply by the following day after that then I will close the topic.

Once I receive a reply then I will return with your first instructions.

Thanks thumbup2.gif
Posted Image
m0le is a proud member of UNITE

#3 piscomatt

piscomatt
  • Topic Starter

  • Members
  • 19 posts
  • OFFLINE
  •  
  • Local time:06:13 AM

Posted 31 August 2010 - 08:07 PM

Thanks for your response. I'll wait for your first instructions.

Thanks.

#4 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:11:13 AM

Posted 31 August 2010 - 08:13 PM

Please run Rootkit Unhooker so that we can see if anything is there

Scan With RKUnHooker
  • Please Download Rootkit Unhooker Save it to your desktop.
  • Now double-click on RKUnhookerLE.exe to run it.
  • Click the Report tab, then click Scan.
  • Check (Tick) Drivers, Stealth,. Uncheck the rest. then Click OK.
  • Wait till the scanner has finished and then click File, Save Report.
  • Save the report somewhere where you can find it. Click Close.
Copy the entire contents of the report and paste it in a reply here.

Note** you may get this warning. It is ok to just ignore this.

"Rootkit Unhooker has detected a parasite inside itself!
It is recommended to remove parasite, okay?"

Posted Image
m0le is a proud member of UNITE

#5 piscomatt

piscomatt
  • Topic Starter

  • Members
  • 19 posts
  • OFFLINE
  •  
  • Local time:06:13 AM

Posted 31 August 2010 - 08:49 PM

Here is the log file from rootkit unhooker. Thanks

RkU Version: 3.8.388.590, Type LE (SR2)
==============================================
OS Name: Windows XP
Version 5.1.2600 (Service Pack 3)
Number of processors #1
==============================================
>Drivers
==============================================
0xBF9D6000 C:\WINDOWS\System32\nv4_disp.dll 2891776 bytes (NVIDIA Corporation, NVIDIA Compatible Windows 2000 Display driver, Version 42.38 )
0x804D7000 C:\WINDOWS\system32\ntoskrnl.exe 2189952 bytes (Microsoft Corporation, NT Kernel & System)
0x804D7000 PnpManager 2189952 bytes
0x804D7000 RAW 2189952 bytes
0x804D7000 WMIxWDM 2189952 bytes
0xBF800000 Win32k 1851392 bytes
0xBF800000 C:\WINDOWS\System32\win32k.sys 1851392 bytes (Microsoft Corporation, Multi-User Win32 Driver)
0xF7743000 C:\WINDOWS\System32\DRIVERS\nv4_mini.sys 1167360 bytes (NVIDIA Corporation, NVIDIA Compatible Windows 2000 Miniport Driver, Version 42.38 )
0xF75D9000 C:\WINDOWS\System32\DRIVERS\HSF_DP.sys 1093632 bytes (Conexant Systems, HSF_DP driver)
0xF8409000 Ntfs.sys 577536 bytes (Microsoft Corporation, NT File System Driver)
0xF754D000 C:\WINDOWS\System32\DRIVERS\HSF_CNXT.sys 573440 bytes (Conexant Systems, WinACHSF driver)
0xF7470000 C:\WINDOWS\system32\drivers\smwdm.sys 548864 bytes (Analog Devices, Inc., SoundMAX Integrated Digital Audio )
0xF1FF3000 C:\WINDOWS\System32\DRIVERS\mrxsmb.sys 458752 bytes (Microsoft Corporation, Windows NT SMB Minirdr)
0xF73A3000 C:\WINDOWS\System32\DRIVERS\update.sys 385024 bytes (Microsoft Corporation, Update Driver)
0xF2125000 C:\WINDOWS\System32\DRIVERS\tcpip.sys 364544 bytes (Microsoft Corporation, TCP/IP Protocol Driver)
0xF16C1000 C:\WINDOWS\System32\DRIVERS\srv.sys 356352 bytes (Microsoft Corporation, Server driver)
0xF1F42000 C:\WINDOWS\system32\DRIVERS\PRISMA02.sys 352256 bytes (Conexant Systems, Inc., PRISM Wireless NDIS 5 Driver)
0xBFFA0000 C:\WINDOWS\System32\ATMFD.DLL 286720 bytes (Adobe Systems Incorporated, Windows NT OpenType/Type 1 Font Driver)
0xF08B5000 C:\WINDOWS\System32\Drivers\HTTP.sys 266240 bytes (Microsoft Corporation, HTTP Protocol Stack)
0xF2210000 C:\WINDOWS\System32\Drivers\cdudf_xp.SYS 241664 bytes (Roxio, CD-UDF NT Filesystem Driver)
0xF1FC0000 C:\WINDOWS\system32\drivers\mfehidk.sys 208896 bytes (McAfee, Inc., Host Intrusion Detection Link Driver)
0xF21CB000 C:\WINDOWS\System32\Drivers\UdfReadr_xp.SYS 208896 bytes (Roxio, CD-UDF NT Filesystem Reader Driver)
0xF8527000 ACPI.sys 188416 bytes (Microsoft Corporation, ACPI Driver for NT)
0xF188C000 C:\WINDOWS\System32\DRIVERS\mrxdav.sys 184320 bytes (Microsoft Corporation, Windows NT WebDav Minirdr)
0xF83DC000 NDIS.sys 184320 bytes (Microsoft Corporation, NDIS 5.1 wrapper driver)
0xF2063000 C:\WINDOWS\System32\DRIVERS\rdbss.sys 176128 bytes (Microsoft Corporation, Redirected Drive Buffering SubSystem Driver)
0xF20B0000 C:\WINDOWS\System32\DRIVERS\netbt.sys 163840 bytes (Microsoft Corporation, MBT Transport driver)
0xF76E4000 C:\WINDOWS\System32\DRIVERS\HSFHWBS2.sys 159744 bytes (Conexant Systems, HSF_HWB2 WDM driver)
0xF20FE000 C:\WINDOWS\System32\Drivers\Mpfp.sys 159744 bytes (McAfee, Inc., McAfee Personal Firewall Plus Driver)
0xF20D8000 C:\WINDOWS\System32\DRIVERS\ipnat.sys 155648 bytes (Microsoft Corporation, IP Network Address Translator)
0xF7529000 C:\WINDOWS\System32\DRIVERS\e100b325.sys 147456 bytes (Intel Corporation, Intel® PRO/100 Adapter NDIS 5.1 driver)
0xF17A0000 C:\WINDOWS\System32\Drivers\Fastfat.SYS 147456 bytes (Microsoft Corporation, Fast FAT File System Driver)
0xF744C000 C:\WINDOWS\system32\drivers\portcls.sys 147456 bytes (Microsoft Corporation, Port Class (Class Driver for Port/Miniport Devices))
0xF770B000 C:\WINDOWS\System32\DRIVERS\USBPORT.SYS 147456 bytes (Microsoft Corporation, USB 1.1 & 2.0 Port Driver)
0xF7429000 C:\WINDOWS\system32\drivers\ks.sys 143360 bytes (Microsoft Corporation, Kernel CSA Library)
0xF208E000 C:\WINDOWS\System32\drivers\afd.sys 139264 bytes (Microsoft Corporation, Ancillary Function Driver for WinSock)
0x806EE000 ACPI_HAL 131840 bytes
0x806EE000 C:\WINDOWS\system32\hal.dll 131840 bytes (Microsoft Corporation, Hardware Abstraction Layer DLL)
0xF84BF000 fltmgr.sys 131072 bytes (Microsoft Corporation, Microsoft Filesystem Filter Manager)
0xF84F7000 ftdisk.sys 126976 bytes (Microsoft Corporation, FT Disk Driver)
0xF74F6000 C:\WINDOWS\System32\Drivers\pwd_2k.SYS 126976 bytes (Roxio, Win2000 Framework for Packet Write Driver)
0xF83C2000 Mup.sys 106496 bytes (Microsoft Corporation, Multiple UNC Provider driver)
0xF84DF000 atapi.sys 98304 bytes (Microsoft Corporation, IDE/ATAPI Port Driver)
0xF8496000 KSecDD.sys 94208 bytes (Microsoft Corporation, Kernel Security Support Provider Interface)
0xF7412000 C:\WINDOWS\System32\DRIVERS\ndiswan.sys 94208 bytes (Microsoft Corporation, MS PPP Framing Driver (Strong Encryption))
0xF1763000 C:\WINDOWS\system32\drivers\wdmaud.sys 86016 bytes (Microsoft Corporation, MMSYSTEM Wave/Midi API mapper)
0xF7515000 C:\WINDOWS\System32\DRIVERS\parport.sys 81920 bytes (Microsoft Corporation, Parallel Port Driver)
0xF772F000 C:\WINDOWS\System32\DRIVERS\VIDEOPRT.SYS 81920 bytes (Microsoft Corporation, Video Port Driver)
0xF217E000 C:\WINDOWS\System32\DRIVERS\ipsec.sys 77824 bytes (Microsoft Corporation, IPSec Driver)
0xBF9C4000 C:\WINDOWS\System32\drivers\dxg.sys 73728 bytes (Microsoft Corporation, DirectX Graphics Driver)
0xF08A3000 C:\WINDOWS\system32\drivers\mfeavfk.sys 73728 bytes (McAfee, Inc., Anti-Virus File System Filter Driver)
0xF84AD000 sr.sys 73728 bytes (Microsoft Corporation, System Restore Filesystem Filter Driver)
0xF8516000 pci.sys 69632 bytes (Microsoft Corporation, NT Plug and Play PCI Enumerator)
0xF7401000 C:\WINDOWS\System32\DRIVERS\psched.sys 69632 bytes (Microsoft Corporation, MS QoS Packet Scheduler)
0xF8696000 C:\WINDOWS\System32\Drivers\Cdr4_xp.SYS 61440 bytes (Roxio, CDR4_XP CDR Helper)
0xF86E6000 C:\WINDOWS\system32\drivers\drmk.sys 61440 bytes (Microsoft Corporation, Microsoft Kernel DRM Descrambler Filter)
0xF1C49000 C:\WINDOWS\system32\drivers\sysaudio.sys 61440 bytes (Microsoft Corporation, System Audio WDM Filter)
0xF87B6000 C:\WINDOWS\System32\DRIVERS\usbhub.sys 61440 bytes (Microsoft Corporation, Default Hub Driver for USB)
0xF85B6000 C:\WINDOWS\System32\DRIVERS\CLASSPNP.SYS 53248 bytes (Microsoft Corporation, SCSI Class System Dll)
0xF8626000 C:\WINDOWS\System32\DRIVERS\i8042prt.sys 53248 bytes (Microsoft Corporation, i8042 Port Driver)
0xF86F6000 C:\WINDOWS\System32\DRIVERS\rasl2tp.sys 53248 bytes (Microsoft Corporation, RAS L2TP mini-port/call-manager driver)
0xF8596000 VolSnap.sys 53248 bytes (Microsoft Corporation, Volume Shadow Copy Driver)
0xF8736000 C:\WINDOWS\System32\DRIVERS\raspptp.sys 49152 bytes (Microsoft Corporation, Peer-to-Peer Tunneling Protocol)
0xF85C6000 agp440.sys 45056 bytes (Microsoft Corporation, 440 NT AGP Filter)
0xF87D6000 C:\WINDOWS\System32\Drivers\Fips.SYS 45056 bytes (Microsoft Corporation, FIPS Crypto Driver)
0xF8586000 MountMgr.sys 45056 bytes (Microsoft Corporation, Mount Manager)
0xF8706000 C:\WINDOWS\System32\DRIVERS\raspppoe.sys 45056 bytes (Microsoft Corporation, RAS PPPoE mini-port/call-manager driver)
0xF8576000 isapnp.sys 40960 bytes (Microsoft Corporation, PNP ISA Bus Driver)
0xF8786000 C:\WINDOWS\System32\Drivers\NDProxy.SYS 40960 bytes (Microsoft Corporation, NDIS Proxy)
0xF8756000 C:\WINDOWS\System32\DRIVERS\termdd.sys 40960 bytes (Microsoft Corporation, Terminal Server Driver)
0xF8686000 C:\WINDOWS\System32\Drivers\AFS2K.SYS 36864 bytes (Oak Technology Inc., Audio File System)
0xF85A6000 disk.sys 36864 bytes (Microsoft Corporation, PnP Disk Driver)
0xF7890000 C:\WINDOWS\system32\DRIVERS\HIDCLASS.SYS 36864 bytes (Microsoft Corporation, Hid Class Library)
0xF8616000 C:\WINDOWS\System32\DRIVERS\intelppm.sys 36864 bytes (Microsoft Corporation, Processor Device Driver)
0xF86B6000 C:\WINDOWS\System32\DRIVERS\ipfltdrv.sys 36864 bytes (Microsoft Corporation, IP FILTER DRIVER)
0xF04FB000 C:\WINDOWS\system32\drivers\mfesmfk.sys 36864 bytes (McAfee, Inc., System Monitor Filter Driver)
0xF8746000 C:\WINDOWS\System32\DRIVERS\msgpc.sys 36864 bytes (Microsoft Corporation, MS General Packet Classifier)
0xF8766000 C:\WINDOWS\System32\DRIVERS\netbios.sys 36864 bytes (Microsoft Corporation, NetBIOS interface driver)
0xEF9D0000 C:\WINDOWS\System32\Drivers\Normandy.SYS 36864 bytes (RKU Driver)
0xF86D6000 C:\WINDOWS\System32\DRIVERS\wanarp.sys 36864 bytes (Microsoft Corporation, MS Remote Access and Routing ARP Driver)
0xF8916000 C:\WINDOWS\System32\Drivers\Modem.SYS 32768 bytes (Microsoft Corporation, Modem Device Driver)
0xF894E000 C:\WINDOWS\System32\Drivers\Npfs.SYS 32768 bytes (Microsoft Corporation, NPFS Driver)
0xF890E000 C:\WINDOWS\System32\DRIVERS\usbehci.sys 32768 bytes (Microsoft Corporation, EHCI eUSB Miniport Driver)
0xF891E000 C:\WINDOWS\System32\DRIVERS\fdc.sys 28672 bytes (Microsoft Corporation, Floppy Disk Controller Driver)
0xF8866000 C:\WINDOWS\system32\DRIVERS\HIDPARSE.SYS 28672 bytes (Microsoft Corporation, Hid Parsing Library)
0xF886E000 C:\WINDOWS\system32\drivers\mfebopk.sys 28672 bytes (McAfee, Inc., Buffer Overflow Protection Driver)
0xF8946000 C:\WINDOWS\System32\Drivers\MxlW2k.SYS 28672 bytes (MusicMatch, Inc., MusicMatch Access Layer KMD)
0xF87F6000 C:\WINDOWS\System32\DRIVERS\PCIIDEX.SYS 28672 bytes (Microsoft Corporation, PCI IDE Bus Driver Extension)
0xF8926000 C:\WINDOWS\System32\DRIVERS\kbdclass.sys 24576 bytes (Microsoft Corporation, Keyboard Class Driver)
0xF8856000 C:\WINDOWS\System32\DRIVERS\mouclass.sys 24576 bytes (Microsoft Corporation, Mouse Class Driver)
0xF8906000 C:\WINDOWS\System32\DRIVERS\usbuhci.sys 24576 bytes (Microsoft Corporation, UHCI USB Miniport Driver)
0xF8936000 C:\WINDOWS\System32\drivers\vga.sys 24576 bytes (Microsoft Corporation, VGA/Super VGA Video Driver)
0xF884E000 C:\WINDOWS\System32\DRIVERS\wanatw4.sys 24576 bytes (America Online, Inc., Wan Miniport (ATW))
0xF88AE000 C:\WINDOWS\System32\DRIVERS\flpydisk.sys 20480 bytes (Microsoft Corporation, Floppy Driver)
0xF893E000 C:\WINDOWS\System32\Drivers\Msfs.SYS 20480 bytes (Microsoft Corporation, Mailslot driver)
0xF885E000 C:\WINDOWS\System32\DRIVERS\omci.sys 20480 bytes (Dell Computer Corporation, OMCI Device Driver)
0xF87FE000 PartMgr.sys 20480 bytes (Microsoft Corporation, Partition Manager)
0xF883E000 C:\WINDOWS\System32\DRIVERS\ptilink.sys 20480 bytes (Parallel Technologies, Inc., Parallel Technologies DirectParallel IO Library)
0xF8806000 PxHelp20.sys 20480 bytes (Sonic Solutions, Px Engine Device Driver for Windows 2000/XP)
0xF8846000 C:\WINDOWS\System32\DRIVERS\raspti.sys 20480 bytes (Microsoft Corporation, PTI DirectParallel® mini-port/call-manager driver)
0xF8836000 C:\WINDOWS\System32\DRIVERS\TDI.SYS 20480 bytes (Microsoft Corporation, TDI Wrapper)
0xF88F6000 C:\WINDOWS\System32\watchdog.sys 20480 bytes (Microsoft Corporation, Watchdog Driver)
0xF1B41000 C:\WINDOWS\system32\DRIVERS\mdc8021x.sys 16384 bytes (Meetinghouse Data Communications, IEEE 802.1X Protocol Driver)
0xF8A4E000 C:\WINDOWS\System32\DRIVERS\mssmbios.sys 16384 bytes (Microsoft Corporation, System Management BIOS Driver)
0xF1B3D000 C:\WINDOWS\System32\DRIVERS\ndisuio.sys 16384 bytes (Microsoft Corporation, NDIS User mode I/O Driver)
0xF8986000 C:\WINDOWS\system32\BOOTVID.dll 12288 bytes (Microsoft Corporation, VGA Boot Driver)
0xF738F000 C:\WINDOWS\System32\drivers\Dxapi.sys 12288 bytes (Microsoft Corporation, DirectX API Driver)
0xF8A36000 C:\WINDOWS\system32\DRIVERS\hidusb.sys 12288 bytes (Microsoft Corporation, USB Miniport Driver for Input Devices)
0xF8A02000 C:\WINDOWS\System32\Drivers\i2omgmt.SYS 12288 bytes (Microsoft Corporation, I2O Utility Filter)
0xF1516000 C:\WINDOWS\System32\DRIVERS\mdmxsdk.sys 12288 bytes (Conexant, Diagnostic Interface DRIVER)
0xF8A3A000 C:\WINDOWS\System32\DRIVERS\mouhid.sys 12288 bytes (Microsoft Corporation, HID Mouse Filter Driver)
0xF8A3E000 C:\WINDOWS\System32\DRIVERS\ndistapi.sys 12288 bytes (Microsoft Corporation, NDIS 3.0 connection wrapper driver)
0xF7EE9000 C:\WINDOWS\System32\DRIVERS\rasacd.sys 12288 bytes (Microsoft Corporation, RAS Automatic Connection Driver)
0xF7ED9000 C:\WINDOWS\System32\drivers\ws2ifsl.sys 12288 bytes (Microsoft Corporation, Winsock2 IFS Layer)
0xF8AC2000 C:\WINDOWS\system32\drivers\aeaudio.sys 8192 bytes (Andrea Electronics Corporation, Andrea Audio Stub Driver)
0xF8AD0000 C:\WINDOWS\System32\Drivers\Beep.SYS 8192 bytes (Microsoft Corporation, BEEP Driver)
0xF8AB8000 C:\Program Files\DellSupport\GTAction\triggers\DSproct.sys 8192 bytes (Gteko Ltd., Process Trigger Driver)
0xF8AC8000 C:\WINDOWS\system32\DRIVERS\dsunidrv.sys 8192 bytes (Gteko Ltd., GUniDriver)
0xF8ACE000 C:\WINDOWS\System32\Drivers\Fs_Rec.SYS 8192 bytes (Microsoft Corporation, File System Recognizer Driver)
0xF8A76000 C:\WINDOWS\system32\KDCOM.DLL 8192 bytes (Microsoft Corporation, Kernel Debugger HW Extension DLL)
0xF8AD2000 C:\WINDOWS\System32\Drivers\mnmdd.SYS 8192 bytes (Microsoft Corporation, Frame buffer simulator)
0xF8AA8000 C:\WINDOWS\System32\Drivers\ParVdm.SYS 8192 bytes (Microsoft Corporation, VDM Parallel Driver)
0xF8AD4000 C:\WINDOWS\System32\DRIVERS\RDPCDD.sys 8192 bytes (Microsoft Corporation, RDP Miniport)
0xF8AC4000 C:\WINDOWS\System32\DRIVERS\swenum.sys 8192 bytes (Microsoft Corporation, Plug and Play Software Device Enumerator)
0xF8ACC000 C:\WINDOWS\System32\DRIVERS\USBD.SYS 8192 bytes (Microsoft Corporation, Universal Serial Bus Driver)
0xF8A78000 C:\WINDOWS\System32\DRIVERS\WMILIB.SYS 8192 bytes (Microsoft Corporation, WMILIB WMI support library Dll)
0xF8B55000 C:\WINDOWS\System32\drivers\dxgthk.sys 4096 bytes (Microsoft Corporation, DirectX Graphics Driver Thunk)
0xF8CAE000 C:\WINDOWS\System32\Drivers\Null.SYS 4096 bytes (Microsoft Corporation, NULL Driver)
0xF8B3E000 pciide.sys 4096 bytes (Microsoft Corporation, Generic PCI IDE Bus Driver)
!!!!!!!!!!!Hidden driver: 0x829A5AEA ?_empty_? 1302 bytes
0x82505FC5 unknown_irp_handler 59 bytes
!!!!!!!!!!!Hidden driver: 0x828735F0 ?_empty_? 0 bytes
==============================================
>Stealth
==============================================
0xF84DF000 WARNING: suspicious driver modification [atapi.sys::0x829A5AEA]
0xF8926000 WARNING: Virus alike driver modification [kbdclass.sys], 24576 bytes
0x825065F7 Unknown page with executable code, 2569 bytes
0x043B0000 Hidden Image-->SupportSoft.Agent.Sprocket.dll [ EPROCESS 0x82153B88 ] PID: 936, 28672 bytes
WARNING: Virus alike driver modification [2D680UG.sys]
0x82504257 Unknown page with executable code, 3497 bytes
0x04390000 Hidden Image-->SupportSoft.Agent.Sprocket.SupportMessage.dll [ EPROCESS 0x82153B88 ] PID: 936, 45056 bytes
0x82504FAA Unknown thread object [ ETHREAD 0x82449C28 ] , 600 bytes
0x82504FAA Unknown thread object [ ETHREAD 0x82875490 ] , 600 bytes
0x82504FAA Unknown thread object [ ETHREAD 0x81DC1BE8 ] , 600 bytes
0x82504FAA Unknown thread object [ ETHREAD 0x823A6DA8 ] , 600 bytes
0x82504FAA Unknown thread object [ ETHREAD 0x82162020 ] , 600 bytes
0x82504FAA Unknown thread object [ ETHREAD 0x82142498 ] , 600 bytes
0x825057CA Unknown thread object [ ETHREAD 0x828E0DA8 ] TID: 1624, 600 bytes
0x8250557C Unknown thread object [ ETHREAD 0x82844DA8 ] TID: 1636, 600 bytes
0x8250657D Unknown thread object [ ETHREAD 0x8290AAB8 ] TID: 1648, 600 bytes
0x82504FAA Unknown thread object [ ETHREAD 0x8203E020 ] , 600 bytes
0x82504FAA Unknown thread object [ ETHREAD 0x82209020 ] , 600 bytes
0x82504FAA Unknown thread object [ ETHREAD 0x82864528 ] , 600 bytes
0x82504FAA Unknown thread object [ ETHREAD 0x821F2DA8 ] , 600 bytes
0x82504FAA Unknown thread object [ ETHREAD 0x820EADA8 ] , 600 bytes
0x82504FAA Unknown thread object [ ETHREAD 0x8212B880 ] , 600 bytes
0x82504FAA Unknown thread object [ ETHREAD 0x820A5020 ] , 600 bytes
0x82504FAA Unknown thread object [ ETHREAD 0x820CD360 ] , 600 bytes
0x82504FAA Unknown thread object [ ETHREAD 0x8210FB00 ] , 600 bytes
0x82504FAA Unknown thread object [ ETHREAD 0x820ABDA8 ] , 600 bytes
0x82504FAA Unknown thread object [ ETHREAD 0x81C82838 ] , 600 bytes
0x82504FAA Unknown thread object [ ETHREAD 0x823A0DA8 ] , 600 bytes
0x82504FAA Unknown thread object [ ETHREAD 0x820F3970 ] , 600 bytes
0x82504FAA Unknown thread object [ ETHREAD 0x8208EDA8 ] , 600 bytes
0x82504FAA Unknown thread object [ ETHREAD 0x820C9600 ] , 600 bytes
0x82504FAA Unknown thread object [ ETHREAD 0x8206ADA8 ] , 600 bytes
0x82504FAA Unknown thread object [ ETHREAD 0x81E0F020 ] , 600 bytes
0x82504FAA Unknown thread object [ ETHREAD 0x8204A020 ] , 600 bytes
0x82504FAA Unknown thread object [ ETHREAD 0x8207FCB8 ] , 600 bytes
0x82504FAA Unknown thread object [ ETHREAD 0x820371D8 ] , 600 bytes
0x82504FAA Unknown thread object [ ETHREAD 0x8206B1B8 ] , 600 bytes
0x82504FAA Unknown thread object [ ETHREAD 0x82219020 ] , 600 bytes
0x82504FAA Unknown thread object [ ETHREAD 0x823B66D0 ] , 600 bytes
0x82504FAA Unknown thread object [ ETHREAD 0x823A46F8 ] , 600 bytes
0x82504FAA Unknown thread object [ ETHREAD 0x8213FC98 ] , 600 bytes
0x82504FAA Unknown thread object [ ETHREAD 0x8213E618 ] , 600 bytes
0x82504FAA Unknown thread object [ ETHREAD 0x81D14380 ] , 600 bytes
0x82504FAA Unknown thread object [ ETHREAD 0x8293FD20 ] , 600 bytes
0x039B0000 Hidden Image-->sprtmessage.dll [ EPROCESS 0x82153B88 ] PID: 936, 77824 bytes


#6 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:11:13 AM

Posted 01 September 2010 - 05:45 PM

Please run Combofix, RKU has spotted a rootkit so we need to remove it.

Please download ComboFix from one of these locations:* IMPORTANT !!! Save ComboFix.exe to your Desktop making sure you rename it comfix.exe
  • Disable your AntiVirus and AntiSpyware applications, usually via a right click on the System Tray icon. They may otherwise interfere with our tools. (Click on this link to see a list of programs that should be disabled. The list is not all inclusive.)
  • Double click on Comfix.exe & follow the prompts.
  • As part of it's process, ComboFix will check to see if the Microsoft Windows Recovery Console is installed. With malware infections being as they are today, it's strongly recommended to have this pre-installed on your machine before doing any malware removal. It will allow you to boot up into a special recovery/repair mode that will allow us to more easily help you should your computer have a problem after an attempted removal of malware.
  • Follow the prompts to allow ComboFix to download and install the Microsoft Windows Recovery Console, and when prompted, agree to the End-User License Agreement to install the Microsoft Windows Recovery Console.
**Please note: If the Microsoft Windows Recovery Console is already installed, ComboFix will continue it's malware removal procedures.



Once the Microsoft Windows Recovery Console is installed using ComboFix, you should see the following message:



Click on Yes, to continue scanning for malware.

When finished, it shall produce a log for you. Please include the C:\ComboFix.txt in your next reply.
Posted Image
m0le is a proud member of UNITE

#7 piscomatt

piscomatt
  • Topic Starter

  • Members
  • 19 posts
  • OFFLINE
  •  
  • Local time:06:13 AM

Posted 02 September 2010 - 08:57 AM

Attached is the Combofix.txt log file after the program was run.
Thanks

Attached Files



#8 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:11:13 AM

Posted 02 September 2010 - 01:57 PM

1. Close any open browsers.

2. Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.

3. Open notepad and copy/paste the text in the box below into it:

QUOTE
RegLock::
[HKEY_USERS\S-1-5-21-2281204375-1522761372-2101453767-1007\Software\Microsoft\SystemCertificates\AddressBook*]
[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{A483C63A-CDBC-426E-BF93-872502E8144E}]
[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{A483C63A-CDBC-426E-BF93-872502E8144E}\Elevation]
[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{A483C63A-CDBC-426E-BF93-872502E8144E}\LocalServer32]
[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{A483C63A-CDBC-426E-BF93-872502E8144E}\TypeLib]
[HKEY_LOCAL_MACHINE\software\Classes\Interface\{E3F2C3CB-5EB8-4A04-B22C-7E3B4B6AF30F}]
[HKEY_LOCAL_MACHINE\software\Classes\Interface\{E3F2C3CB-5EB8-4A04-B22C-7E3B4B6AF30F}\ProxyStubClsid32]
[HKEY_LOCAL_MACHINE\software\Classes\Interface\{E3F2C3CB-5EB8-4A04-B22C-7E3B4B6AF30F}\TypeLib]


Save this as CFScript.txt, in the same location as Comfix.exe (called ComboFix.exe in the below graphic)




Refering to the picture above, drag CFScript into ComboFix.exe

If the program requests for you to update Combofix then click Yes.

When finished, it shall produce a log for you at C:\ComboFix.txt which I will require in your next reply.


Now please run MBRCheck

Please download MBRCheck to your desktop.

1. Double click MBRCheck.exe to run it (Right click and run as Administrator for Vista).
2. It will open a black window, please do not fix anything (if it gives you an option).
3. Exit that window and it will produce a log (MBRCheck_date_time).
4. Please post that log when you reply.
Posted Image
m0le is a proud member of UNITE

#9 piscomatt

piscomatt
  • Topic Starter

  • Members
  • 19 posts
  • OFFLINE
  •  
  • Local time:06:13 AM

Posted 02 September 2010 - 03:18 PM

I ran both and have attached the Combofix and MBRCheck text files.
Thanks

Attached Files



#10 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:11:13 AM

Posted 02 September 2010 - 03:25 PM

Next please uninstall and reinstall Roxio.

This program is causing the "The driver CDR4_XP.SYS on your system is old. Please reinstall DirectCD to update the driver" message and the Combofix log is showing that it may be infected. So let's get rid and reinstall a fresh copy.

When that's done please let me know if the message above has stopped.

Posted Image
m0le is a proud member of UNITE

#11 piscomatt

piscomatt
  • Topic Starter

  • Members
  • 19 posts
  • OFFLINE
  •  
  • Local time:06:13 AM

Posted 02 September 2010 - 07:42 PM

Ok, I uninstalled it and reinstalled. I don't see the message anymore and the CD and DVD drives are both showing now.

#12 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:11:13 AM

Posted 02 September 2010 - 08:02 PM

Okay, everything's looking in good shape.

Please run the ESET online scanner to look for infected files and other bits of crud
  1. Hold down Control and click on the following link to open ESET OnlineScan in a new window.
    ESET OnlineScan
  2. Click the button.
  3. For alternate browsers only: (Microsoft Internet Explorer users can skip these steps)
    1. Click on to download the ESET Smart Installer. Save it to your desktop.
    2. Double click on the icon on your desktop.
  4. Check
  5. Click the button.
  6. Accept any security warnings from your browser.
  7. Leave the top box checked and then check
  8. Push the Start button.
  9. ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this can take some time.
  10. When the scan completes, push
  11. Push , and save the file to your desktop using a unique name, such as ESETScan. Include the contents of this report in your next reply.
  12. Push the button.
  13. Push
NOTE: If no malware is found then no log will be produced. Let me know if this is the case.
Posted Image
m0le is a proud member of UNITE

#13 piscomatt

piscomatt
  • Topic Starter

  • Members
  • 19 posts
  • OFFLINE
  •  
  • Local time:06:13 AM

Posted 03 September 2010 - 09:23 AM

Here is the esetscan.txt file after the scan was completed.

Thanks.

Attached Files



#14 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:11:13 AM

Posted 03 September 2010 - 07:30 PM

All those entries are already in quarantine.

How is the PC running?
Posted Image
m0le is a proud member of UNITE

#15 piscomatt

piscomatt
  • Topic Starter

  • Members
  • 19 posts
  • OFFLINE
  •  
  • Local time:06:13 AM

Posted 04 September 2010 - 12:32 PM

Everything seems to be working fine. Only thing I notice is that when in IE and at the aol.com site I sometimes get these Registry errors. It seems to happen when I click on "mail" on aol.com. Thanks.

Registry Errors
Windows Internet Explorer
Warning errors were detected in your computer's registry
(It lists four in a window)
HKEY_Classes_ROOT\CLSID(H213KLO-7
HKEY_SYS_CORE\VAR(WL43320-7677-F
HD_SYSTEM\ID(HF49480-7JF77-SD33H49
HIKEY_Classes_ROOT\(43534L00
Then below it says DOWNLOAD REGISTRY CLEANER with an arrow

Another time it was

HKEY_CLASSESROOT\VSTA.DTEProvider.1\CLSID(AE3BA545-2EIE-4fd3-937C-9119AA69EOE4)
HKEY_CLASSES_ROOT\TypeLib\0002E558-0000-C000-000000000016)\0101win32C:ProgramFiles\Common.....
HKEY_CLASSES_ROOT\TypeLib\(3424F2E-520E-4458-8D74-EE4B07AC7F15)\2.0\0\win32C:\DOCUME~1\AMY.liu\...
HKEY_CLASSES_ROOT\TYPELIB\(6F19CBB2-5A18-48113-B693-F0310D1F57E6)\2.0\win32C:\DOCUME~1\Amy.liu\...




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users