Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Virtumonde


  • This topic is locked This topic is locked
16 replies to this topic

#1 ed-e-dee

ed-e-dee

  • Members
  • 276 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Australia
  • Local time:07:03 AM

Posted 23 September 2010 - 08:33 PM

I having all sorts of problems with this topic....lets hope that HJT will work here.

Logfile of Trend Micro HijackThis v2.0.4
Scan saved at 11:32:38 AM, on 24/09/2010
Platform: Windows XP SP3 (WinNT 5.01.2600)
MSIE: Internet Explorer v8.00 (8.00.6001.18702)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\system32\rundll32.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\igfxtray.exe
C:\WINDOWS\system32\hkcmd.exe
C:\WINDOWS\system32\igfxpers.exe
C:\WINDOWS\RTHDCPL.EXE
C:\Program Files\Common Files\Java\Java Update\jusched.exe
C:\Program Files\Telstra\BigPond Wireless Broadband\BigPond_CM.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
C:\WINDOWS\system32\igfxsrvc.exe
C:\Program Files\Java\jre6\bin\jqs.exe
C:\WINDOWS\system32\lxdecoms.exe
C:\Program Files\Norton AntiVirus\Engine\18.1.0.37\ccSvcHst.exe
C:\WINDOWS\system32\svchost.exe
C:\Program Files\Norton AntiVirus\Engine\18.1.0.37\ccSvcHst.exe
C:\Program Files\Mozilla Firefox\firefox.exe
C:\Program Files\Trend Micro\HijackThis\HiJackThis.exe

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = http://www.telstra.com/
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.optusnet.com.au/
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Window Title = Telstra BigPond Home Internet Explorer
O1 - Hosts: 74.125.45.100 4-open-davinci.com
O1 - Hosts: 74.125.45.100 securitysoftwarepayments.com
O1 - Hosts: 74.125.45.100 privatesecuredpayments.com
O1 - Hosts: 74.125.45.100 secure.privatesecuredpayments.com
O1 - Hosts: 74.125.45.100 getantivirusplusnow.com
O1 - Hosts: 74.125.45.100 secure-plus-payments.com
O1 - Hosts: 74.125.45.100 www.getantivirusplusnow.com
O1 - Hosts: 74.125.45.100 www.secure-plus-payments.com
O1 - Hosts: 74.125.45.100 www.getavplusnow.com
O1 - Hosts: 74.125.45.100 safebrowsing-cache.google.com
O1 - Hosts: 74.125.45.100 urs.microsoft.com
O1 - Hosts: 74.125.45.100 www.securesoftwarebill.com
O1 - Hosts: 74.125.45.100 secure.paysecuresystem.com
O1 - Hosts: 74.125.45.100 paysoftbillsolution.com
O1 - Hosts: 74.125.45.100 protected.maxisoftwaremart.com
O1 - Hosts: 217.23.15.139 www.google.com
O1 - Hosts: 217.23.15.139 google.com
O1 - Hosts: 217.23.15.139 google.com.au
O1 - Hosts: 217.23.15.139 www.google.com.au
O1 - Hosts: 217.23.15.139 google.be
O1 - Hosts: 217.23.15.139 www.google.be
O1 - Hosts: 217.23.15.139 google.com.br
O1 - Hosts: 217.23.15.139 www.google.com.br
O1 - Hosts: 217.23.15.139 google.ca
O1 - Hosts: 217.23.15.139 www.google.ca
O1 - Hosts: 217.23.15.139 google.ch
O1 - Hosts: 217.23.15.139 www.google.ch
O1 - Hosts: 217.23.15.139 google.de
O1 - Hosts: 217.23.15.139 www.google.de
O1 - Hosts: 217.23.15.139 google.dk
O1 - Hosts: 217.23.15.139 www.google.dk
O1 - Hosts: 217.23.15.139 google.fr
O1 - Hosts: 217.23.15.139 www.google.fr
O1 - Hosts: 217.23.15.139 google.ie
O1 - Hosts: 217.23.15.139 www.google.ie
O1 - Hosts: 217.23.15.139 google.it
O1 - Hosts: 217.23.15.139 www.google.it
O1 - Hosts: 217.23.15.139 google.co.jp
O1 - Hosts: 217.23.15.139 www.google.co.jp
O1 - Hosts: 217.23.15.139 google.nl
O1 - Hosts: 217.23.15.139 www.google.nl
O1 - Hosts: 217.23.15.139 google.no
O1 - Hosts: 217.23.15.139 www.google.no
O1 - Hosts: 217.23.15.139 google.co.nz
O1 - Hosts: 217.23.15.139 www.google.co.nz
O1 - Hosts: 217.23.15.139 google.pl
O1 - Hosts: 217.23.15.139 www.google.pl
O1 - Hosts: 217.23.15.139 google.se
O1 - Hosts: 217.23.15.139 www.google.se
O1 - Hosts: 217.23.15.139 google.co.uk
O1 - Hosts: 217.23.15.139 www.google.co.uk
O1 - Hosts: 217.23.15.139 google.co.za
O1 - Hosts: 217.23.15.139 www.google.co.za
O1 - Hosts: 217.23.15.139 www.google-analytics.com
O1 - Hosts: 217.23.15.139 www.bing.com
O1 - Hosts: 217.23.15.139 search.yahoo.com
O1 - Hosts: 217.23.15.139 www.search.yahoo.com
O1 - Hosts: 217.23.15.139 uk.search.yahoo.com
O1 - Hosts: 217.23.15.139 ca.search.yahoo.com
O1 - Hosts: 217.23.15.139 de.search.yahoo.com
O1 - Hosts: 217.23.15.139 fr.search.yahoo.com
O1 - Hosts: 217.23.15.139 au.search.yahoo.com
O2 - BHO: AcroIEHelperStub - {18DF081C-E8AD-4283-A596-FA578C2EBDC3} - C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelperShim.dll
O2 - BHO: WormRadar.com IESiteBlocker.NavFilter - {3CA2F312-6F6E-4B53-A66E-4E65E497C8C0} - C:\Program Files\AVG\AVG9\avgssie.dll (file missing)
O2 - BHO: Spybot-S&D IE Protection - {53707962-6F74-2D53-2644-206D7942484F} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O2 - BHO: Symantec Intrusion Prevention - {6D53EC84-6AAE-4787-AEEE-F4628F01010C} - C:\Program Files\Norton AntiVirus\Engine\18.1.0.37\IPSBHO.DLL
O2 - BHO: BigPond Wireless Broadband 2.0 Auto Dial - {DB92EC3F-697D-4C3B-9A3B-3ABBD23D4A85} - C:\Program Files\Telstra\BigPond Wireless Broadband\bpwbb2ad.dll
O2 - BHO: Java™ Plug-In 2 SSV Helper - {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Program Files\Java\jre6\bin\jp2ssv.dll
O2 - BHO: JQSIEStartDetectorImpl - {E7E6F031-17CE-4C07-BC86-EABFE594F69C} - C:\Program Files\Java\jre6\lib\deploy\jqs\ie\jqs_plugi

BC AdBot (Login to Remove)

 


#2 miekiemoes

miekiemoes

    Malware Killer Dog


  • Malware Response Team
  • 19,420 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:Belgium
  • Local time:10:03 PM

Posted 24 September 2010 - 06:04 AM

Hi,

Your HijackThis log is incomplete..

Anyway, * Please download Malwarebytes' Anti-Malware from Here

Double Click mbam-setup.exe to install the application.
  • Make sure a checkmark is placed next to Update Malwarebytes' Anti-Malware and Launch Malwarebytes' Anti-Malware, then click Finish.
  • If an update is found, it will download and install the latest version.
  • In case you already used MBAM previously, please update it before proceeding with the scan. To do this, click the "Update" tab and click the "Check For updates" button.
  • Once the program has loaded and updates were downloaded, select "Perform Quick Scan", then click Scan.
  • The scan may take some time to finish,so please be patient.
  • When the scan is complete, click OK, then Show Results to view the results.
  • Make sure that everything is checked, and click Remove Selected.
  • When disinfection is completed, a log will open in Notepad and you may be prompted to Restart.(See Extra Note)
  • The log is automatically saved by MBAM and can be viewed by clicking the Logs tab in MBAM.
  • Copy&Paste the entire report in your next reply along with a fresh HijackThis log.
Extra Note:
If MBAM encounters a file that is difficult to remove,you will be presented with 1 of 2 prompts,click OK to either and let MBAM proceed with the disinfection process,if asked to restart the computer,please do so immediatly.

Extra Note2: I see you are running Teatimer.
I suggest you to disable it because it can interfere with the changes you'll make on your system.
When everything is done and your log is clean again, you can enable it again.
If teatimer gives you a warning afterwards that some changes were made, allow this instead of blocking it.
How to disable TeaTimer <== click me for instructions.

After you disabled Teatimer, download ResetTeaTimer.exe to your desktop.
Then run ResetTeaTimer.exe.
This will only take a few seconds.




Edited by miekiemoes, 24 September 2010 - 06:04 AM.

AntispywareScanners---Antivirus Scanners---Firewalls---Online Scanners---Prevention---Help! My computer is slow---My Blog---Follow me on Twitter.
My help is ALWAYS FREE, but if you want to donate to help me continue my fight against malware -- click here!
Asking for help via Private Message or Mail will be ignored - So If you need help, post your problem in the forum.

#3 ed-e-dee

ed-e-dee
  • Topic Starter

  • Members
  • 276 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Australia
  • Local time:07:03 AM

Posted 24 September 2010 - 06:26 AM

Hi miekiemoes, thanks for your help, I have been having a devel of a time with this,
My Security Shield, was loaded on here and it just took over and I could not send mail via IE, downloaded Mozilla fox and still had trouble but I'm able to send

I hope this works now
It looks like it worked.

Malwarebytes' Anti-Malware 1.46
www.malwarebytes.org

Database version: 4682

Windows 5.1.2600 Service Pack 3
Internet Explorer 8.0.6001.18702

24/09/2010 9:12:58 PM
mbam-log-2010-09-24 (21-12-58).txt

Scan type: Quick scan
Objects scanned: 141069
Time elapsed: 3 minute(s), 6 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 2
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 1
Files Infected: 3

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
HKEY_CURRENT_USER\SOFTWARE\20W6RLKX65 (Trojan.FakeAlert) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\3FWHZQA3LT (Trojan.FakeAlert) -> Quarantined and deleted successfully.

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
C:\Documents and Settings\ASI\Application Data\My Security Shield (Rogue.MySecurityShield) -> Quarantined and deleted successfully.

Files Infected:
C:\Documents and Settings\ASI\Application Data\My Security Shield\Instructions.ini (Rogue.MySecurityShield) -> Quarantined and deleted successfully.
C:\Documents and Settings\ASI\Application Data\Microsoft\Internet Explorer\Quick Launch\My Security Shield.lnk (Rogue.MySecurityShield) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\shimg.dll (Trojan.Agent) -> Quarantined and deleted successfully.


Logfile of Trend Micro HijackThis v2.0.4
Scan saved at 9:17:25 PM, on 24/09/2010
Platform: Windows XP SP3 (WinNT 5.01.2600)
MSIE: Internet Explorer v8.00 (8.00.6001.18702)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\system32\rundll32.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\igfxtray.exe
C:\WINDOWS\system32\hkcmd.exe
C:\WINDOWS\system32\igfxpers.exe
C:\WINDOWS\RTHDCPL.EXE
C:\Program Files\Adobe\Reader 9.0\Reader\Reader_sl.exe
C:\Program Files\Common Files\Java\Java Update\jusched.exe
C:\Program Files\Telstra\BigPond Wireless Broadband\BigPond_CM.exe
C:\WINDOWS\system32\igfxsrvc.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
C:\Program Files\Java\jre6\bin\jqs.exe
C:\WINDOWS\system32\lxdecoms.exe
C:\Program Files\Norton AntiVirus\Engine\18.1.0.37\ccSvcHst.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\wuauclt.exe
C:\Program Files\Norton AntiVirus\Engine\18.1.0.37\ccSvcHst.exe
C:\Program Files\Trend Micro\HijackThis\HiJackThis.exe

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = http://www.telstra.com/
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.optusnet.com.au/
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Window Title = Telstra BigPond Home Internet Explorer
O1 - Hosts: 74.125.45.100 4-open-davinci.com
O1 - Hosts: 74.125.45.100 securitysoftwarepayments.com
O1 - Hosts: 74.125.45.100 privatesecuredpayments.com
O1 - Hosts: 74.125.45.100 secure.privatesecuredpayments.com
O1 - Hosts: 74.125.45.100 getantivirusplusnow.com
O1 - Hosts: 74.125.45.100 secure-plus-payments.com
O1 - Hosts: 74.125.45.100 www.getantivirusplusnow.com
O1 - Hosts: 74.125.45.100 www.secure-plus-payments.com
O1 - Hosts: 74.125.45.100 www.getavplusnow.com
O1 - Hosts: 74.125.45.100 safebrowsing-cache.google.com
O1 - Hosts: 74.125.45.100 urs.microsoft.com
O1 - Hosts: 74.125.45.100 www.securesoftwarebill.com
O1 - Hosts: 74.125.45.100 secure.paysecuresystem.com
O1 - Hosts: 74.125.45.100 paysoftbillsolution.com
O1 - Hosts: 74.125.45.100 protected.maxisoftwaremart.com
O1 - Hosts: 217.23.15.139 www.google.com
O1 - Hosts: 217.23.15.139 google.com
O1 - Hosts: 217.23.15.139 google.com.au
O1 - Hosts: 217.23.15.139 www.google.com.au
O1 - Hosts: 217.23.15.139 google.be
O1 - Hosts: 217.23.15.139 www.google.be
O1 - Hosts: 217.23.15.139 google.com.br
O1 - Hosts: 217.23.15.139 www.google.com.br
O1 - Hosts: 217.23.15.139 google.ca
O1 - Hosts: 217.23.15.139 www.google.ca
O1 - Hosts: 217.23.15.139 google.ch
O1 - Hosts: 217.23.15.139 www.google.ch
O1 - Hosts: 217.23.15.139 google.de
O1 - Hosts: 217.23.15.139 www.google.de
O1 - Hosts: 217.23.15.139 google.dk
O1 - Hosts: 217.23.15.139 www.google.dk
O1 - Hosts: 217.23.15.139 google.fr
O1 - Hosts: 217.23.15.139 www.google.fr
O1 - Hosts: 217.23.15.139 google.ie
O1 - Hosts: 217.23.15.139 www.google.ie
O1 - Hosts: 217.23.15.139 google.it
O1 - Hosts: 217.23.15.139 www.google.it
O1 - Hosts: 217.23.15.139 google.co.jp
O1 - Hosts: 217.23.15.139 www.google.co.jp
O1 - Hosts: 217.23.15.139 google.nl
O1 - Hosts: 217.23.15.139 www.google.nl
O1 - Hosts: 217.23.15.139 google.no
O1 - Hosts: 217.23.15.139 www.google.no
O1 - Hosts: 21

#4 ed-e-dee

ed-e-dee
  • Topic Starter

  • Members
  • 276 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Australia
  • Local time:07:03 AM

Posted 24 September 2010 - 06:32 AM

Bloody hell again it did'nt work,

Logfile of Trend Micro HijackThis v2.0.4
Scan saved at 9:17:25 PM, on 24/09/2010
Platform: Windows XP SP3 (WinNT 5.01.2600)
MSIE: Internet Explorer v8.00 (8.00.6001.18702)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\system32\rundll32.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\igfxtray.exe
C:\WINDOWS\system32\hkcmd.exe
C:\WINDOWS\system32\igfxpers.exe
C:\WINDOWS\RTHDCPL.EXE
C:\Program Files\Adobe\Reader 9.0\Reader\Reader_sl.exe
C:\Program Files\Common Files\Java\Java Update\jusched.exe
C:\Program Files\Telstra\BigPond Wireless Broadband\BigPond_CM.exe
C:\WINDOWS\system32\igfxsrvc.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
C:\Program Files\Java\jre6\bin\jqs.exe
C:\WINDOWS\system32\lxdecoms.exe
C:\Program Files\Norton AntiVirus\Engine\18.1.0.37\ccSvcHst.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\wuauclt.exe
C:\Program Files\Norton AntiVirus\Engine\18.1.0.37\ccSvcHst.exe
C:\Program Files\Trend Micro\HijackThis\HiJackThis.exe

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = http://www.telstra.com/
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.optusnet.com.au/
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Window Title = Telstra BigPond Home Internet Explorer
O1 - Hosts: 74.125.45.100 4-open-davinci.com
O1 - Hosts: 74.125.45.100 securitysoftwarepayments.com
O1 - Hosts: 74.125.45.100 privatesecuredpayments.com
O1 - Hosts: 74.125.45.100 secure.privatesecuredpayments.com
O1 - Hosts: 74.125.45.100 getantivirusplusnow.com
O1 - Hosts: 74.125.45.100 secure-plus-payments.com
O1 - Hosts: 74.125.45.100 www.getantivirusplusnow.com
O1 - Hosts: 74.125.45.100 www.secure-plus-payments.com
O1 - Hosts: 74.125.45.100 www.getavplusnow.com
O1 - Hosts: 74.125.45.100 safebrowsing-cache.google.com
O1 - Hosts: 74.125.45.100 urs.microsoft.com
O1 - Hosts: 74.125.45.100 www.securesoftwarebill.com
O1 - Hosts: 74.125.45.100 secure.paysecuresystem.com
O1 - Hosts: 74.125.45.100 paysoftbillsolution.com
O1 - Hosts: 74.125.45.100 protected.maxisoftwaremart.com
O1 - Hosts: 217.23.15.139 www.google.com
O1 - Hosts: 217.23.15.139 google.com
O1 - Hosts: 217.23.15.139 google.com.au
O1 - Hosts: 217.23.15.139 www.google.com.au
O1 - Hosts: 217.23.15.139 google.be
O1 - Hosts: 217.23.15.139 www.google.be
O1 - Hosts: 217.23.15.139 google.com.br
O1 - Hosts: 217.23.15.139 www.google.com.br
O1 - Hosts: 217.23.15.139 google.ca
O1 - Hosts: 217.23.15.139 www.google.ca
O1 - Hosts: 217.23.15.139 google.ch
O1 - Hosts: 217.23.15.139 www.google.ch
O1 - Hosts: 217.23.15.139 google.de
O1 - Hosts: 217.23.15.139 www.google.de
O1 - Hosts: 217.23.15.139 google.dk
O1 - Hosts: 217.23.15.139 www.google.dk
O1 - Hosts: 217.23.15.139 google.fr
O1 - Hosts: 217.23.15.139 www.google.fr
O1 - Hosts: 217.23.15.139 google.ie
O1 - Hosts: 217.23.15.139 www.google.ie
O1 - Hosts: 217.23.15.139 google.it
O1 - Hosts: 217.23.15.139 www.google.it
O1 - Hosts: 217.23.15.139 google.co.jp
O1 - Hosts: 217.23.15.139 www.google.co.jp
O1 - Hosts: 217.23.15.139 google.nl
O1 - Hosts: 217.23.15.139 www.google.nl
O1 - Hosts: 217.23.15.139 google.no
O1 - Hosts: 217.23.15.139 www.google.no
O1 - Hosts: 217.23.15.139 google.co.nz
O1 - Hosts: 217.23.15.139 www.google.co.nz
O1 - Hosts: 217.23.15.139 google.pl
O1 - Hosts: 217.23.15.139 www.google.pl
O1 - Hosts: 217.23.15.139 google.se
O1 - Hosts: 217.23.15.139 www.google.se
O1 - Hosts: 217.23.15.139 google.co.uk
O1 - Hosts: 217.23.15.139 www.google.co.uk
O1 - Hosts: 217.23.15.139 google.co.za
O1 - Hosts: 217.23.15.139 www.google.co.za
O1 - Hosts: 217.23.15.139 www.google-analytics.com
O1 - Hosts: 217.23.15.139 www.bing.com
O1 - Hosts: 217.23.15.139 search.yahoo.com
O1 - Hosts: 217.23.15.139 www.search.yahoo.com
O1 - Hosts: 217.23.15.139 uk.search.yahoo.com
O1 - Hosts: 217.23.15.139 ca.search.yahoo.com
O1 - Hosts: 217.23.15.139 de.search.yahoo.com
O1 - Hosts: 217.23.15.139 fr.search.yahoo.com
O1 - Hosts: 217.23.15.139 au.search.yahoo.com
O2 - BHO: AcroIEHelperStub - {18DF081C-E8AD-4283-A596-FA578C2EBDC3} - C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelperShim.dll
O2 - BHO: WormRadar.com IESiteBlocker.NavFilter - {3CA2F312-6F6E-4B53-A66E-4E65E497C8C0} - C:\Program Files\AVG\AVG9\avgssie.dll (file missing)
O2 - BHO: Spybot-S&D IE Protection - {53707962-6F74-2D53-2644-206D7942484F} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O2 - BHO: Symantec Intrusion Prevention - {6D53EC84-6AAE-4787-AEEE-F4628F01010C} - C:\Program Files\Norton AntiVirus\Engine\18.1.0.37\IPSBHO.DLL
O2 - BHO: BigPond Wireless Broadband 2.0 Auto Dial - {DB92EC3F-697D-4C3B-9A3B-3ABBD23D4A85} - C:\Program Files\Telstra\BigPond Wireless Broadband\bpwbb2ad.dll
O2 - BHO: Java™ Plug-In 2 SSV Helper - {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Program Files\Java\jre6\bin\jp2ssv.dll
O2 - BHO: JQSIEStartDetectorImpl - {E7E6F031-17CE-4C07-BC86-EABFE594F69C} - C:\Program Files\Java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll
O3 - Toolbar: (no

Bloody hell again it did'nt work,

Logfile of Trend Micro HijackThis v2.0.4
Scan saved at 9:17:25 PM, on 24/09/2010
Platform: Windows XP SP3 (WinNT 5.01.2600)
MSIE: Internet Explorer v8.00 (8.00.6001.18702)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\system32\rundll32.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\igfxtray.exe
C:\WINDOWS\system32\hkcmd.exe
C:\WINDOWS\system32\igfxpers.exe
C:\WINDOWS\RTHDCPL.EXE
C:\Program Files\Adobe\Reader 9.0\Reader\Reader_sl.exe
C:\Program Files\Common Files\Java\Java Update\jusched.exe
C:\Program Files\Telstra\BigPond Wireless Broadband\BigPond_CM.exe
C:\WINDOWS\system32\igfxsrvc.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
C:\Program Files\Java\jre6\bin\jqs.exe
C:\WINDOWS\system32\lxdecoms.exe
C:\Program Files\Norton AntiVirus\Engine\18.1.0.37\ccSvcHst.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\wuauclt.exe
C:\Program Files\Norton AntiVirus\Engine\18.1.0.37\ccSvcHst.exe
C:\Program Files\Trend Micro\HijackThis\HiJackThis.exe

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = http://www.telstra.com/
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.optusnet.com.au/
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Window Title = Telstra BigPond Home Internet Explorer
O1 - Hosts: 74.125.45.100 4-open-davinci.com
O1 - Hosts: 74.125.45.100 securitysoftwarepayments.com
O1 - Hosts: 74.125.45.100 privatesecuredpayments.com
O1 - Hosts: 74.125.45.100 secure.privatesecuredpayments.com
O1 - Hosts: 74.125.45.100 getantivirusplusnow.com
O1 - Hosts: 74.125.45.100 secure-plus-payments.com
O1 - Hosts: 74.125.45.100 www.getantivirusplusnow.com
O1 - Hosts: 74.125.45.100 www.secure-plus-payments.com
O1 - Hosts: 74.125.45.100 www.getavplusnow.com
O1 - Hosts: 74.125.45.100 safebrowsing-cache.google.com
O1 - Hosts: 74.125.45.100 urs.microsoft.com
O1 - Hosts: 74.125.45.100 www.securesoftwarebill.com
O1 - Hosts: 74.125.45.100 secure.paysecuresystem.com
O1 - Hosts: 74.125.45.100 paysoftbillsolution.com
O1 - Hosts: 74.125.45.100 protected.maxisoftwaremart.com
O1 - Hosts: 217.23.15.139 www.google.com
O1 - Hosts: 217.23.15.139 google.com
O1 - Hosts: 217.23.15.139 google.com.au
O1 - Hosts: 217.23.15.139 www.google.com.au
O1 - Hosts: 217.23.15.139 google.be
O1 - Hosts: 217.23.15.139 www.google.be
O1 - Hosts: 217.23.15.139 google.com.br
O1 - Hosts: 217.23.15.139 www.google.com.br
O1 - Hosts: 217.23.15.139 google.ca
O1 - Hosts: 217.23.15.139 www.google.ca
O1 - Hosts: 217.23.15.139 google.ch
O1 - Hosts: 217.23.15.139 www.google.ch
O1 - Hosts: 217.23.15.139 google.de
O1 - Hosts: 217.23.15.139 www.google.de
O1 - Hosts: 217.23.15.139 google.dk
O1 - Hosts: 217.23.15.139 www.google.dk
O1 - Hosts: 217.23.15.139 google.fr
O1 - Hosts: 217.23.15.139 www.google.fr
O1 - Hosts: 217.23.15.139 google.ie
O1 - Hosts: 217.23.15.139 www.google.ie
O1 - Hosts: 217.23.15.139 google.it
O1 - Hosts: 217.23.15.139 www.google.it
O1 - Hosts: 217.23.15.139 google.co.jp
O1 - Hosts: 217.23.15.139 www.google.co.jp
O1 - Hosts: 217.23.15.139 google.nl
O1 - Hosts: 217.23.15.139 www.google.nl
O1 - Hosts: 217.23.15.139 google.no
O1 - Hosts: 217.23.15.139 www.google.no
O1 - Hosts: 217.23.15.139 google.co.nz
O1 - Hosts: 217.23.15.139 www.google.co.nz
O1 - Hosts: 217.23.15.139 google.pl
O1 - Hosts: 217.23.15.139 www.google.pl
O1 - Hosts: 217.23.15.139 google.se
O1 - Hosts: 217.23.15.139 www.google.se
O1 - Hosts: 217.23.15.139 google.co.uk
O1 - Hosts: 217.23.15.139 www.google.co.uk
O1 - Hosts: 217.23.15.139 google.co.za
O1 - Hosts: 217.23.15.139 www.google.co.za
O1 - Hosts: 217.23.15.139 www.google-analytics.com
O1 - Hosts: 217.23.15.139 www.bing.com
O1 - Hosts: 217.23.15.139 search.yahoo.com
O1 - Hosts: 217.23.15.139 www.search.yahoo.com
O1 - Hosts: 217.23.15.139 uk.search.yahoo.com
O1 - Hosts: 217.23.15.139 ca.search.yahoo.com
O1 - Hosts: 217.23.15.139 de.search.yahoo.com
O1 - Hosts: 217.23.15.139 fr.search.yahoo.com
O1 - Hosts: 217.23.15.139 au.search.yahoo.com
O2 - BHO: AcroIEHelperStub - {18DF081C-E8AD-4283-A596-FA578C2EBDC3} - C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelperShim.dll
O2 - BHO: WormRadar.com IESiteBlocker.NavFilter - {3CA2F312-6F6E-4B53-A66E-4E65E497C8C0} - C:\Program Files\AVG\AVG9\avgssie.dll (file missing)
O2 - BHO: Spybot-S&D IE Protection - {53707962-6F74-2D53-2644-206D7942484F} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O2 - BHO: Symantec Intrusion Prevention - {6D53EC84-6AAE-4787-AEEE-F4628F01010C} - C:\Program Files\Norton AntiVirus\Engine\18.1.0.37\IPSBHO.DLL
O2 - BHO: BigPond Wireless Broadband 2.0 Auto Dial - {DB92EC3F-697D-4C3B-9A3B-3ABBD23D4A85} - C:\Program Files\Telstra\BigPond Wireless Broadband\bpwbb2ad.dll
O2 - BHO: Java™ Plug-In 2 SSV Helper - {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Program Files\Java\jre6\bin\jp2ssv.dll
O2 - BHO: JQSIEStartDetectorImpl - {E7E6F031-17CE-4C07-BC86-EABFE594F69C} - C:\Program Files\Java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll
O3 - Toolbar: (no name) - {CCC7A

#5 ed-e-dee

ed-e-dee
  • Topic Starter

  • Members
  • 276 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Australia
  • Local time:07:03 AM

Posted 24 September 2010 - 06:35 AM

Why can't I load the full report, in preview the whole page is there.

Eddee

#6 miekiemoes

miekiemoes

    Malware Killer Dog


  • Malware Response Team
  • 19,420 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:Belgium
  • Local time:10:03 PM

Posted 24 September 2010 - 07:20 AM

Hi,

Can you attach it instead?
AntispywareScanners---Antivirus Scanners---Firewalls---Online Scanners---Prevention---Help! My computer is slow---My Blog---Follow me on Twitter.
My help is ALWAYS FREE, but if you want to donate to help me continue my fight against malware -- click here!
Asking for help via Private Message or Mail will be ignored - So If you need help, post your problem in the forum.

#7 ed-e-dee

ed-e-dee
  • Topic Starter

  • Members
  • 276 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Australia
  • Local time:07:03 AM

Posted 25 September 2010 - 12:31 AM

I'm having allsorts of problems, internet connection drops out, I don't think hjt is working properly
I am going to try something new and see if I can get the reports to you.




Attached Files


Eddee

#8 miekiemoes

miekiemoes

    Malware Killer Dog


  • Malware Response Team
  • 19,420 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:Belgium
  • Local time:10:03 PM

Posted 25 September 2010 - 12:48 AM

Hi,

It's OK, let's clean up your hosts file first, so please do the following..

* Download: HostsXpert
Unzip hoster to an own folder, eg C:\HostsXpert
Start HostsExpert.exe, click 'Restore MS Hosts file' and click OK.

In case you get an error there...

Open Malwarebytes > More Tools tab > Fileassasin > Click Run Tool
Then an explorer Window will open.
Copy and paste next in the field under file name:

C:\WINDOWS\system32\drivers\etc\hosts

Then Click open next to it.

You should see this image:



Click yes there.

FileAssassin will then delete the hosts file.

To recreate it again (default hosts file), start Hostxpert again.
It will give a warning that the hosts file doesn't exist and Press OK to create hosts file.
Click OK there.

Then, * Please visit this webpage for instructions for downloading and running ComboFix:

http://www.bleepingcomputer.com/combofix/how-to-use-combofix

Post the log from ComboFix in your next reply.

Please make sure you disable ALL of your Antivirus/Antispyware/Firewall before running ComboFix..This because Security Software may see some components ComboFix uses (prep.com for example) as suspicious and blocks the tool, or even deletes it. Please visit HERE if you don't know how.




AntispywareScanners---Antivirus Scanners---Firewalls---Online Scanners---Prevention---Help! My computer is slow---My Blog---Follow me on Twitter.
My help is ALWAYS FREE, but if you want to donate to help me continue my fight against malware -- click here!
Asking for help via Private Message or Mail will be ignored - So If you need help, post your problem in the forum.

#9 ed-e-dee

ed-e-dee
  • Topic Starter

  • Members
  • 276 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Australia
  • Local time:07:03 AM

Posted 25 September 2010 - 03:51 AM

hi miekiemoes,, i hope I can get this sent now ,we will have to see.
had trouble with HostsXpert, I dont think I got it right.


Attached Files


Eddee

#10 miekiemoes

miekiemoes

    Malware Killer Dog


  • Malware Response Team
  • 19,420 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:Belgium
  • Local time:10:03 PM

Posted 25 September 2010 - 08:24 AM

Hi,

This looks OK again though.

What trouble did you have with hostsxpert?

What happens when you click 'Restore MS Hosts file' and click OK in it?


Also, can you upload this file for me?

C:\Windows\system32\mapistuby.dll

Upload it to this URL: http://www.bleepingcomputer.com/submit-malware.php?channel=8

This is a hidden file, so if hidden files are not set to show on your system, do the following:

Please set your system to show all files.
Click Start.
Open My Computer.
Select the Tools menu and click Folder Options.
Select the View Tab. Under the Hidden files and folders heading, select Show hidden files and folders.
Uncheck: Hide file extensions for known file types
Uncheck the Hide protected operating system files (recommended) option.
Click Yes to confirm.
Click OK.

Please hide your hidden files and folders afterwards again, when we are done with this thread and your problems are solved, because above instructions to set your system to show all files, unhide legit files and folders as well.
And I don't want you to delete them because they may look suspicious. To hide them again, just perform the above instructions in the opposite way.

Edited by miekiemoes, 25 September 2010 - 08:27 AM.

AntispywareScanners---Antivirus Scanners---Firewalls---Online Scanners---Prevention---Help! My computer is slow---My Blog---Follow me on Twitter.
My help is ALWAYS FREE, but if you want to donate to help me continue my fight against malware -- click here!
Asking for help via Private Message or Mail will be ignored - So If you need help, post your problem in the forum.

#11 ed-e-dee

ed-e-dee
  • Topic Starter

  • Members
  • 276 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Australia
  • Local time:07:03 AM

Posted 25 September 2010 - 11:11 PM

Hi miekiemoes.
I don' seem to be able to run hostsxpert and I can't see restore MS hosts files.
with the other mapistuby.dll this does not come up.

I have unchecked the 2 hide files,

I must admit that I'm not real good with computers I'm still having trouble with this type of stuff,I do try but fine some things are harder then others.
you will have to bear with me.
Eddee

#12 miekiemoes

miekiemoes

    Malware Killer Dog


  • Malware Response Team
  • 19,420 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:Belgium
  • Local time:10:03 PM

Posted 26 September 2010 - 01:33 AM

What error do you get when you run hostsxpert.exe?

Anyway, let's do the following instead...

* Open notepad - don't use any other texteditor than notepad or the script will fail.
Copy/paste the text in the quotebox below into notepad:

QUOTE
Suspect::[8]
C:\WINDOWS\system32\drivers\etc\hosts
C:\Windows\system32\mapistuby.dll


Save this as txtfile CFScript

Then drag the CFScript into ComboFix.exe as you see in the screenshot below.



This will start ComboFix again.
Then, when done, please visit this site:
http://www.bleepingcomputer.com/submit-malware.php?channel=8
Where it says: "Browse to the file you want to submit", use the Browse button to navigate to the following file: C:\Qoobox\Quarantine\[8]-Submit_date_time.zip (date_time will be replaced with the date and time when this file was created)
Then click the "Send File" button below in order to upload it.

After doing above,
Post the contents of Combofix.txt in your next reply.

AntispywareScanners---Antivirus Scanners---Firewalls---Online Scanners---Prevention---Help! My computer is slow---My Blog---Follow me on Twitter.
My help is ALWAYS FREE, but if you want to donate to help me continue my fight against malware -- click here!
Asking for help via Private Message or Mail will be ignored - So If you need help, post your problem in the forum.

#13 ed-e-dee

ed-e-dee
  • Topic Starter

  • Members
  • 276 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Australia
  • Local time:07:03 AM

Posted 26 September 2010 - 05:33 AM

ComboFix 10-09-24.05 - ASI 25/09/2010 17:50:05.1.2 - x86
Microsoft Windows XP Professional 5.1.2600.3.1252.61.1033.18.2009.1648 [GMT 10:00]
Running from: c:\documents and settings\ASI\Desktop\ComboFix.exe
AV: Norton AntiVirus *On-access scanning disabled* (Updated) {E10A9785-9598-4754-B552-92431C1C35F8}
.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.

c:\documents and settings\All Users\Application Data\33413af
c:\documents and settings\All Users\Application Data\33413af\23.mof
c:\documents and settings\All Users\Application Data\33413af\MSS.ico
c:\documents and settings\All Users\Application Data\33413af\MSSSys\vd952342.bd
c:\documents and settings\All Users\Application Data\33413af\protector.html

Infected copy of c:\windows\system32\drivers\serial.sys was found and disinfected
Restored copy from - Kitty had a snack tongue.gif
.
((((((((((((((((((((((((( Files Created from 2010-08-25 to 2010-09-25 )))))))))))))))))))))))))))))))
.

2010-09-25 06:51 . 2010-09-25 06:51 -------- d-----w- C:\hostsxpert
2010-09-25 06:51 . 2010-09-25 06:51 353485 ----a-w- C:\hostsxpert.zip
2010-09-24 01:01 . 2010-09-24 01:01 388096 ----a-r- c:\documents and settings\ASI\Application Data\Microsoft\Installer\{45A66726-69BC-466B-A7A4-12FCBA4883D7}\HiJackThis.exe
2010-09-23 23:55 . 2010-09-23 23:55 0 ----a-w- c:\windows\nsreg.dat
2010-09-23 23:55 . 2010-09-23 23:55 -------- d-----w- c:\documents and settings\ASI\Local Settings\Application Data\Mozilla
2010-09-23 05:29 . 2010-09-23 05:29 -------- d-----w- c:\documents and settings\All Users\Application Data\NortonInstaller
2010-09-23 05:29 . 2010-09-23 05:29 -------- d-----w- c:\program files\NortonInstaller
2010-09-23 05:25 . 2010-09-23 05:25 155648 --sha-r- c:\windows\system32\mapistuby.dll
2010-09-23 03:09 . 2010-09-23 03:09 -------- d-----w- C:\VundoFix Backups
2010-09-23 00:57 . 2010-09-23 00:57 -------- d-----w- c:\documents and settings\Administrator.ASIHOME-PC\Application Data\Malwarebytes
2010-09-23 00:56 . 2010-09-23 00:56 -------- d-sh--w- c:\documents and settings\Administrator.ASIHOME-PC\IETldCache
2010-09-22 23:55 . 2010-09-22 23:55 -------- d-----w- c:\program files\Trend Micro
2010-09-22 14:40 . 2010-09-22 14:40 -------- d-----w- c:\windows\system32\wbem\Repository

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2010-09-24 11:39 . 2010-06-26 10:16 -------- d-----w- c:\program files\Spybot - Search & Destroy
2010-09-24 11:38 . 2010-06-26 10:16 -------- d-----w- c:\documents and settings\All Users\Application Data\Spybot - Search & Destroy
2010-09-24 11:08 . 2010-04-07 02:23 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
2010-09-23 05:35 . 2010-09-23 05:32 -------- d-----w- c:\program files\Common Files\Symantec Shared
2010-09-23 05:32 . 2010-09-23 05:32 -------- d-----w- c:\documents and settings\All Users\Application Data\Norton
2010-09-23 05:32 . 2010-09-23 05:32 -------- d-----w- c:\program files\Symantec
2010-09-23 05:32 . 2010-09-23 05:32 805 ----a-w- c:\windows\system32\drivers\SYMEVENT.INF
2010-09-23 05:32 . 2010-09-23 05:32 7456 ----a-w- c:\windows\system32\drivers\SYMEVENT.CAT
2010-09-23 05:32 . 2010-09-23 05:32 60808 ----a-w- c:\windows\system32\S32EVNT1.DLL
2010-09-23 05:32 . 2010-09-23 05:32 126512 ----a-w- c:\windows\system32\drivers\SYMEVENT.SYS
2010-07-16 19:00 . 2010-06-26 11:26 423656 ----a-w- c:\windows\system32\deployJava1.dll
2010-07-13 01:20 . 2010-09-23 05:32 369072 ----a-r- c:\windows\system32\drivers\symtdi.sys
2010-07-11 09:10 . 2010-07-11 09:10 66440 ----a-w- c:\documents and settings\ASI\Local Settings\Application Data\GDIPFONTCACHEV1.DAT
.

------- Sigcheck -------

[-] 2008-06-27 . 362BC5AF8EAF712832C58CC13AE05750 . 1614848 . . [5.1.2600.5512] . . c:\windows\system32\sfcfiles.dll
.
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"IgfxTray"="c:\windows\system32\igfxtray.exe" [2009-05-08 141336]
"HotKeysCmds"="c:\windows\system32\hkcmd.exe" [2009-05-08 173592]
"Persistence"="c:\windows\system32\igfxpers.exe" [2009-05-08 142872]
"RTHDCPL"="RTHDCPL.EXE" [2009-04-27 17881088]
"Adobe Reader Speed Launcher"="c:\program files\Adobe\Reader 9.0\Reader\Reader_sl.exe" [2008-06-11 34672]
"SunJavaUpdateSched"="c:\program files\Common Files\Java\Java Update\jusched.exe" [2010-02-18 248040]
"BigPondWirelessBroadbandCM"="c:\program files\Telstra\BigPond Wireless Broadband\BigPond_CM.exe" [2009-11-27 2400768]

[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run]
"CTFMON.EXE"="c:\windows\system32\CTFMON.EXE" [2008-04-14 15360]

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]
"EnableFirewall"= 0 (0x0)

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"%windir%\\system32\\sessmgr.exe"=
"c:\\WINDOWS\\system32\\lxdecoms.exe"=
"c:\\WINDOWS\\system32\\spool\\drivers\\w32x86\\3\\lxdepswx.exe"=
"c:\\WINDOWS\\system32\\spool\\drivers\\w32x86\\3\\lxdejswx.exe"=

R0 SymDS;Symantec Data Store;c:\windows\system32\drivers\NAV\1201000.025\SymDS.sys [23/09/2010 3:32 PM 339504]
R0 SymEFA;Symantec Extended File Attributes;c:\windows\system32\drivers\NAV\1201000.025\SymEFA.sys [23/09/2010 3:32 PM 666672]
R1 BHDrvx86;BHDrvx86;c:\documents and settings\All Users\Application Data\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\NAV_18.1.0.37\Definitions\BASHDefs\20100901.003\BHDrvx86.sys [1/09/2010 8:57 AM 692272]
R1 SymIRON;Symantec Iron Driver;c:\windows\system32\drivers\NAV\1201000.025\Ironx86.sys [23/09/2010 3:32 PM 134704]
R2 lxde_device;lxde_device;c:\windows\system32\lxdecoms.exe -service --> c:\windows\system32\lxdecoms.exe -service [?]
R2 NAV;Norton AntiVirus;c:\program files\Norton AntiVirus\Engine\18.1.0.37\ccSvcHst.exe [23/09/2010 3:32 PM 126904]
R3 EraserUtilRebootDrv;EraserUtilRebootDrv;c:\program files\Common Files\Symantec Shared\EENGINE\EraserUtilRebootDrv.sys [23/09/2010 3:54 PM 102448]
R3 IDSxpx86;IDSxpx86;c:\documents and settings\All Users\Application Data\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\NAV_18.1.0.37\Definitions\IPSDefs\20100924.001\IDSXpx86.sys [25/09/2010 4:50 PM 331640]
S3 Ambfilt;Ambfilt;c:\windows\system32\drivers\Ambfilt.sys [5/06/2009 2:31 PM 1684736]
S3 massfilter;ZTE Mass Storage Filter Driver;c:\windows\system32\drivers\massfilter.sys [31/07/2010 6:07 PM 7680]
S3 ZTEusbnet;ZTE USB-NDIS miniport;c:\windows\system32\drivers\ZTEusbnet.sys [31/07/2010 6:07 PM 114688]
.
Contents of the 'Scheduled Tasks' folder
.
.
------- Supplementary Scan -------
.
uStart Page = hxxp://www.optusnet.com.au/
IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~2\Office12\EXCEL.EXE/3000
FF - ProfilePath - c:\documents and settings\ASI\Application Data\Mozilla\Firefox\Profiles\c7t8ioty.default\
FF - prefs.js: network.proxy.type - 0
FF - component: c:\documents and settings\All Users\Application Data\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\NAV_18.1.0.37\IPSFFPlgn\components\IPSFFPl.dll
FF - plugin: c:\program files\Java\jre6\bin\new_plugin\npdeployJava1.dll

---- FIREFOX POLICIES ----
c:\program files\Mozilla Firefox\greprefs\all.js - pref("network.IDN.whitelist.xn--mgbaam7a8h", true);
c:\program files\Mozilla Firefox\greprefs\all.js - pref("network.IDN.whitelist.xn--mgberp4a5d4ar", true);
c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("dom.ipc.plugins.enabled", false);
.
- - - - ORPHANS REMOVED - - - -

Toolbar-{CCC7A320-B3CA-4199-B1A6-9F516DD69829} - (no file)



**************************************************************************

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2010-09-25 17:52
Windows 5.1.2600 Service Pack 3 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully
hidden files: 0

**************************************************************************

[HKEY_LOCAL_MACHINE\System\ControlSet001\Services\NAV]
"ImagePath"="\"c:\program files\Norton AntiVirus\Engine\18.1.0.37\ccSvcHst.exe\" /s \"NAV\" /m \"c:\program files\Norton AntiVirus\Engine\18.1.0.37\diMaster.dll\" /prefetch:1"
.
Completion time: 2010-09-25 17:53:49
ComboFix-quarantined-files.txt 2010-09-25 07:53

Pre-Run: 493,226,151,936 bytes free
Post-Run: 493,608,394,752 bytes free

WindowsXP-KB310994-SP2-Pro-BootDisk-ENU.exe
[boot loader]
timeout=2
default=multi(0)disk(0)rdisk(0)partition(1)\WINDOWS
[operating systems]
c:\cmdcons\BOOTSECT.DAT="Microsoft Windows Recovery Console" /cmdcons
UnsupportedDebug="do not select this" /debug
multi(0)disk(0)rdisk(0)partition(1)\WINDOWS="Microsoft Windows XP Professional" /noexecute=optin /fastdetect

- - End Of File - - F1485B18DF9DC2CA0D90972A88822F78

Eddee

#14 miekiemoes

miekiemoes

    Malware Killer Dog


  • Malware Response Team
  • 19,420 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:Belgium
  • Local time:10:03 PM

Posted 26 September 2010 - 06:17 AM

Hi,

This is exactly the same Combofix log you posted before, but that's OK. I already received the recent Combofix log via the file submission.
We actually don't need Combofix anymore.

Your hosts file appears to be restored already as well, so no worries about hostsxpert since we don't need it either anymore.

I've had a look at the mapistuby.dll and this one is indeed a malicious file and needs to get deleted. I have added detection for this file to Malwarebytes in a meanwhile, so database update 4699 should detect and delete it.
This update will go in soon.

So, you have two choices here to deal with this file..
Since you cannot find the file yourself to delete it, you can wait till database update 4699 is up and then run a new Malwarebytes scan.
You can see what database version you are running under the "Update tab".


Or, if you don't want to wait till the 4699 update, you can deal with this already via Malwarebytes > More Tools tab > Fileassasin > Click Run Tool
Then an explorer Window will open.
Copy and paste next in the field under file name:

c:\windows\system32\mapistuby.dll

Then Click open next to it.

Malwarebytes will then delete this file.

Let me know in your next reply how things are now.

AntispywareScanners---Antivirus Scanners---Firewalls---Online Scanners---Prevention---Help! My computer is slow---My Blog---Follow me on Twitter.
My help is ALWAYS FREE, but if you want to donate to help me continue my fight against malware -- click here!
Asking for help via Private Message or Mail will be ignored - So If you need help, post your problem in the forum.

#15 ed-e-dee

ed-e-dee
  • Topic Starter

  • Members
  • 276 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Australia
  • Local time:07:03 AM

Posted 26 September 2010 - 09:03 PM

G/Day miekiemoes.

Well I think everything is working ok now , you did'nt want me to run a report for you?.
if not then ok.

thank you for your help and patience.

Eddee




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users