Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Single incident trojan from cnet download (jzip)


  • This topic is locked This topic is locked
16 replies to this topic

#1 delldummy

delldummy

  • Members
  • 10 posts
  • OFFLINE
  •  
  • Local time:01:01 PM

Posted 09 December 2010 - 02:28 PM

I am grateful to have found this site(via wikipedia) and have spent the last few evenings browsing your
forums, reading all of the guidelines. Unfortunately, I have been unable to find information
specific to the my issues. That being said, here are the details:

Windows xp home version 5.1, build 2600, service pack 2
IE version 8.0

I believe I am having a problem with a single incident Trojan. Prior to the following events my
computer functioned normally.

I downloaded jzip from c-net(without researching) and soon realized my homepage settings had
been irreversably hijacked. Incidentally the program did not function and upon research I found many
others whom have had the same experience with it. I performed an uninstall but that was just a waste
of time. I don't believe this is a virus, just some basic trogan scum-ware.

Here is a comprehensive list of symptoms:

* Redirects IE to Bing upon logging on(though my yahoo browser still opens on yahoo)

* Search results from yahoo unaffected but clicking actual links of results redirects to various sites

* Paisting link addresses into address box will generally circumvent the issue, though pop-ups occur

* Favorites links sometimes appear "offline"(dimmed) but do function reguardless

* Upon browsing regedit, there appeared unsolisited programs "zugo" "sshelper" "SearchToolbar" etc.

* Something called: "Quick Web Player Setup" appeared on my desktop following jzip download.

* Safe mode boot produces message "keyboard failure" and first keystroke after loading causes
freeze-up(mouse works fine up to that point)

* Error Reports tend to hang IE

* Start up sometimes freezes indefinitely before desktop is loaded, ctrl-alt-del unresponsive

* Browser opening stalls, sometime becomes unresponsive

* General eradic browser behavior

Initially, a friend had advised me to download Malwarebytes. I went into safemode, got a "keyboard failure"
message on boot(although the arrow keys work during boot screen). The mouse was working, but
the first keystroke would always freeze all functions(including mouse). Eventually I figured out to use
the character map to paiste malwarebytes address and downloaded it in safe mode.

Full scan showed no problems so I got out of safe mode and tried again. This time it showed a trojan
and regsitry entry issue. When it was "repaired" I did a reboot and got a bluescreen, something to the
effect of "to protect your computer from damage windows has prevented loading...." and something about
"check recently installed software and hardware"(sorry, can't remember exact wording) After several
attempts I did a restore and everything was back to pre-malwarebytes.

Once again I did a malwarebytes scan(normal mode) and it said "no infected files". However, I am
still having the same issues so I am guessing that program did not resolve the issue.

I would greatly appreciate any help I could get with resolving this problem as well as passing the word
along for other to beware of this download.

Thank you in advance for your kind help.
Here is DDS text. and I have attached the DDS and ARK file.



DDS (Ver_10-12-05.01) - NTFSx86
Run by Owner at 11:57:14.06 on Thu 12/09/2010
Internet Explorer: 8.0.6001.18702
Microsoft Windows XP Home Edition 5.1.2600.2.1252.1.1033.18.510.319 [GMT -6:00]


============== Running Processes ===============

C:\WINDOWS\system32\svchost -k DcomLaunch
svchost.exe
svchost.exe
svchost.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\spoolsv.exe
svchost.exe
C:\WINDOWS\system32\svchost.exe -k imgsvc
C:\Program Files\Yahoo!\SoftwareUpdate\YahooAUService.exe
C:\Program Files\Messenger\msmsgs.exe
C:\Program Files\Yahoo!\Search Protection\SearchProtection.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Airlink101\AWLL3028\RtWLan.exe
C:\WINDOWS\system32\wscntfy.exe
C:\WINDOWS\system32\wuauclt.exe
C:\WINDOWS\System32\svchost.exe -k netsvcs
C:\Documents and Settings\Owner\Desktop\dds.scr

============== Pseudo HJT Report ===============

uStart Page = hxxp://www.bing.com/?pc=ZUGO&form=ZGAPHP
uSearch Page =
uWindow Title = Windows Internet Explorer provided by Yahoo!
uDefault_Page_URL = hxxp://www.yahoo.com/?fr=fp-yie8
uSearchAssistant =
mSearchAssistant =
BHO: {02478D38-C3F9-4efb-9B51-7695ECA05670} - No File
BHO: Adobe PDF Link Helper: {18df081c-e8ad-4283-a596-fa578c2ebdc3} - c:\program files\common files\adobe\acrobat\activex\AcroIEHelperShim.dll
BHO: {9D425283-D487-4337-BAB6-AB8354A81457} - No File
TB: {9D425283-D487-4337-BAB6-AB8354A81457} - No File
TB: {EF99BD32-C1FB-11D2-892F-0090271D4F88} - No File
uRun: [MSMSGS] "c:\program files\messenger\msmsgs.exe" /background
uRun: [Search Protection] c:\program files\yahoo!\search protection\SearchProtection.exe
uRun: [YSearchProtection] c:\program files\yahoo!\search protection\SearchProtection.exe
uRun: [ctfmon.exe] c:\windows\system32\ctfmon.exe
mRun: [Adobe Reader Speed Launcher] "c:\program files\adobe\reader 9.0\reader\Reader_sl.exe"
mRun: [YSearchProtection] "c:\program files\yahoo!\search protection\SearchProtection.exe"
mRun: [IgfxTray] c:\windows\system32\igfxtray.exe
mRun: [HotKeysCmds] c:\windows\system32\hkcmd.exe
StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\airlin~1.lnk - c:\program files\airlink101\awll3028\RtWLan.exe
IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe
DPF: {30528230-99f7-4bb4-88d8-fa1d4f56a2ab} - c:\program files\yahoo!\common\Yinsthelper.dll
DPF: {C1F8FC10-E5DB-4112-9DBF-6C3FF728D4E3} - hxxp://support.dell.com/systemprofiler/DellSystemLite.CAB
DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} - hxxp://download.macromedia.com/pub/shockwave/cabs/flash/swflash.cab
Notify: igfxcui - igfxsrvc.dll
SSODL: WPDShServiceObj - {AAA288BA-9A4C-45B0-95D7-94D524869DB5} - c:\windows\system32\WPDShServiceObj.dll
mASetup: {A509B1FF-37FF-4bFF-8CFF-4F3A747040FF} - c:\windows\system32\rundll32.exe c:\windows\system32\advpack.dll,launchinfsectionex c:\program files\internet explorer\clrtour.inf,DefaultInstall.ResetTour,,12

============= SERVICES / DRIVERS ===============

R2 EAPPkt;Realtek EAPPkt Protocol;c:\windows\system32\drivers\EAPPkt.sys [2008-11-18 38144]
R3 ews88mt;EWS88 WDM Audio;c:\windows\system32\drivers\ews88wdm.sys [2007-3-14 95712]
R3 RTL8187B;Airlink101 802.11g USB 2.0 Adapter;c:\windows\system32\drivers\rtl8187B.sys [2008-11-18 238208]

=============== Created Last 30 ================

2010-12-09 15:58:15 155648 ----a-w- c:\windows\system32\igfxres.dll
2010-12-09 04:00:50 -------- d-----w- c:\program files\MSXML 6.0
2010-12-05 21:16:46 54016 ----a-w- c:\windows\system32\drivers\milvcivw.sys
2010-12-05 20:54:37 -------- d-----w- c:\docume~1\owner\applic~1\Malwarebytes
2010-12-05 18:20:55 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2010-12-05 18:20:54 -------- d-----w- c:\docume~1\alluse~1\applic~1\Malwarebytes
2010-12-05 18:20:51 20952 ----a-w- c:\windows\system32\drivers\mbam.sys
2010-12-05 18:20:51 -------- d-----w- C:\Malwarebytes' Anti-Malware
2010-12-04 17:09:52 -------- d-----w- c:\docume~1\owner\applic~1\Iguz
2010-12-04 17:09:52 -------- d-----w- c:\docume~1\owner\applic~1\Akih
2010-12-04 16:38:58 -------- d-----w- c:\program files\Quick Web Player
2010-12-04 16:20:06 -------- d-----w- c:\docume~1\owner\locals~1\applic~1\WinZip

==================== Find3M ====================


=================== ROOTKIT ====================

Stealth MBR rootkit/Mebroot/Sinowal/TDL4 detector 0.4.2 by Gmer, http://www.gmer.net
Windows 5.1.2600 Disk: WDC_WD400BB-75FRA0 rev.77.07W77 -> Harddisk0\DR0 -> \Device\Ide\IdePort0 P0T0L0-4

device: opened successfully
user: MBR read successfully

Disk trace:
called modules: ntoskrnl.exe CLASSPNP.SYS disk.sys >>UNKNOWN [0x82F62555]<<
_asm { PUSH EBP; MOV EBP, ESP; PUSH ECX; MOV EAX, [EBP+0x8]; CMP EAX, [0x82f687b0]; MOV EAX, [0x82f6882c]; PUSH EBX; PUSH ESI; MOV ESI, [EBP+0xc]; MOV EBX, [ESI+0x60]; PUSH EDI; JNZ 0x20; MOV [EBP+0x8], EAX; }
1 nt!IofCallDriver[0x804E37D5] -> \Device\Harddisk0\DR0[0x82F5AAB8]
3 CLASSPNP[0xF87B905B] -> nt!IofCallDriver[0x804E37D5] -> [0x82FDCC50]
\Driver\atapi[0x82FD92E8] -> IRP_MJ_CREATE -> 0x82F62555
kernel: MBR read successfully
_asm { XOR AX, AX; MOV SS, AX; MOV SP, 0x7c00; STI ; PUSH AX; POP ES; PUSH AX; POP DS; CLD ; MOV SI, 0x7c1b; MOV DI, 0x61b; PUSH AX; PUSH DI; MOV CX, 0x1e5; REP MOVSB ; RETF ; MOV BP, 0x7be; MOV CL, 0x4; CMP [BP+0x0], CH; JL 0x2e; JNZ 0x3a; }
detected disk devices:
\Device\Ide\IdeDeviceP0T0L0-4 -> \??\IDE#DiskWDC_WD400BB-75FRA0______________________77.07W77#4457572d4143464a313132303839_033_0_0_0_0#{53f56307-b6bf-11d0-94f2-00a0c91efb8b} device not found
detected hooks:
\Driver\atapi DriverStartIo -> 0x82F6239B
user & kernel MBR OK
Warning: possible TDL3 rootkit infection !

============= FINISH: 11:58:34.81 ===============

Attached Files

  • Attached File  DDS.txt   5.66KB   0 downloads
  • Attached File  ark.txt   16.72KB   0 downloads


BC AdBot (Login to Remove)

 


#2 rigacci

rigacci

    Fiorentino


  • Members
  • 2,604 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:03:01 PM

Posted 16 December 2010 - 08:50 AM

Hello and welcome to Bleeping Computer

We apologize for the delay in responding to your request for help. Here at Bleeping Computer we get overwhelmed at times, and we are trying our best to keep up. Please note that your topic was not intentionally overlooked. Our mission is to help everyone in need, but sometimes it takes just a little longer to get to every request for help. No one is ignored here.

If you have since resolved the original problem you were having, we would appreciate you letting us know. If not please perform the following steps below so we can have a look at the current condition of your machine.

If you have not done so, include a clear description of the problems you're having, along with any steps you may have performed so far.

Upon completing the steps below another staff member will review your topic an do their best to resolve your issues.

If you have already posted a DDS log, please do so again, as your situation may have changed.
Use the 'Add Reply' and add the new log to this thread.

Thanks and again sorry for the delay.

We need to see some information about what is happening in your machine. Please perform the following scan:
  • Download DDS by sUBs from one of the following links. Save it to your desktop.
  • Double click on the DDS icon, allow it to run.
  • A small box will open, with an explaination about the tool. No input is needed, the scan is running.
  • Notepad will open with the results.
  • Follow the instructions that pop up for posting the results.
  • Close the program window, and delete the program from your desktop.
Please note: You may have to disable any script protection running if the scan fails to run. After downloading the tool, disconnect from the internet and disable all antivirus protection. Run the scan, enable your A/V and reconnect to the internet.

Information on A/V control HERE

We also need a new log from the GMER anti-rootkit scanner. Please first disable any CD emulation programs using the steps found in this topic:

Why we request you disable CD Emulation when receiving Malware Removal Advice


Then create another GMER log and post it as an attachment to the reply where you post your new DDS log. Instructions on how to properly create a GMER log can be found here:

How to create a GMER log


Thanks.

DR

#3 delldummy

delldummy
  • Topic Starter

  • Members
  • 10 posts
  • OFFLINE
  •  
  • Local time:01:01 PM

Posted 16 December 2010 - 12:14 PM

Thanks for the fast response.

My problem doesn't appear to be progressing too much; though I have noticed more "hangs" and IE seem a little slugish.
Thanks again for your help.

Here are the DDS, Attach, and GMER updates as of 11:00 CST.


DDS (Ver_10-12-05.01) - NTFSx86
Run by Owner at 10:30:19.25 on Thu 12/16/2010
Internet Explorer: 8.0.6001.18702
Microsoft Windows XP Home Edition 5.1.2600.2.1252.1.1033.18.510.327 [GMT -6:00]


============== Running Processes ===============

C:\WINDOWS\system32\svchost -k DcomLaunch
svchost.exe
C:\WINDOWS\System32\svchost.exe -k netsvcs
svchost.exe
svchost.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\spoolsv.exe
svchost.exe
C:\WINDOWS\system32\svchost.exe -k imgsvc
C:\Program Files\Yahoo!\SoftwareUpdate\YahooAUService.exe
C:\Program Files\Yahoo!\Search Protection\SearchProtection.exe
C:\Program Files\Messenger\msmsgs.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Airlink101\AWLL3028\RtWLan.exe
C:\WINDOWS\system32\wscntfy.exe
C:\WINDOWS\system32\wuauclt.exe
C:\Documents and Settings\Owner\Desktop\dds.scr

============== Pseudo HJT Report ===============

uStart Page = hxxp://www.bing.com/?pc=ZUGO&form=ZGAPHP
uSearch Page =
uWindow Title = Windows Internet Explorer provided by Yahoo!
uDefault_Page_URL = hxxp://www.yahoo.com/?fr=fp-yie8
uSearchAssistant =
mSearchAssistant =
BHO: {02478D38-C3F9-4efb-9B51-7695ECA05670} - No File
BHO: Adobe PDF Link Helper: {18df081c-e8ad-4283-a596-fa578c2ebdc3} - c:\program files\common files\adobe\acrobat\activex\AcroIEHelperShim.dll
BHO: {9D425283-D487-4337-BAB6-AB8354A81457} - No File
TB: {9D425283-D487-4337-BAB6-AB8354A81457} - No File
TB: {EF99BD32-C1FB-11D2-892F-0090271D4F88} - No File
uRun: [MSMSGS] "c:\program files\messenger\msmsgs.exe" /background
uRun: [Search Protection] c:\program files\yahoo!\search protection\SearchProtection.exe
uRun: [YSearchProtection] c:\program files\yahoo!\search protection\SearchProtection.exe
uRun: [ctfmon.exe] c:\windows\system32\ctfmon.exe
mRun: [Adobe Reader Speed Launcher] "c:\program files\adobe\reader 9.0\reader\Reader_sl.exe"
mRun: [YSearchProtection] "c:\program files\yahoo!\search protection\SearchProtection.exe"
mRun: [IgfxTray] c:\windows\system32\igfxtray.exe
mRun: [HotKeysCmds] c:\windows\system32\hkcmd.exe
StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\airlin~1.lnk - c:\program files\airlink101\awll3028\RtWLan.exe
IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe
DPF: {30528230-99f7-4bb4-88d8-fa1d4f56a2ab} - c:\program files\yahoo!\common\Yinsthelper.dll
DPF: {C1F8FC10-E5DB-4112-9DBF-6C3FF728D4E3} - hxxp://support.dell.com/systemprofiler/DellSystemLite.CAB
DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} - hxxp://download.macromedia.com/pub/shockwave/cabs/flash/swflash.cab
Notify: igfxcui - igfxsrvc.dll
SSODL: WPDShServiceObj - {AAA288BA-9A4C-45B0-95D7-94D524869DB5} - c:\windows\system32\WPDShServiceObj.dll
mASetup: {A509B1FF-37FF-4bFF-8CFF-4F3A747040FF} - c:\windows\system32\rundll32.exe c:\windows\system32\advpack.dll,launchinfsectionex c:\program files\internet explorer\clrtour.inf,DefaultInstall.ResetTour,,12

============= SERVICES / DRIVERS ===============

R2 EAPPkt;Realtek EAPPkt Protocol;c:\windows\system32\drivers\EAPPkt.sys [2008-11-18 38144]
R3 ews88mt;EWS88 WDM Audio;c:\windows\system32\drivers\ews88wdm.sys [2007-3-14 95712]
S3 RTL8187B;Airlink101 802.11g USB 2.0 Adapter;c:\windows\system32\drivers\rtl8187B.sys [2008-11-18 238208]

=============== Created Last 30 ================

2010-12-09 15:58:15 155648 ----a-w- c:\windows\system32\igfxres.dll
2010-12-09 04:00:50 -------- d-----w- c:\program files\MSXML 6.0
2010-12-05 21:16:46 54016 ----a-w- c:\windows\system32\drivers\milvcivw.sys
2010-12-05 20:54:37 -------- d-----w- c:\docume~1\owner\applic~1\Malwarebytes
2010-12-05 18:20:55 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2010-12-05 18:20:54 -------- d-----w- c:\docume~1\alluse~1\applic~1\Malwarebytes
2010-12-05 18:20:51 20952 ----a-w- c:\windows\system32\drivers\mbam.sys
2010-12-05 18:20:51 -------- d-----w- C:\Malwarebytes' Anti-Malware
2010-12-04 17:09:52 -------- d-----w- c:\docume~1\owner\applic~1\Iguz
2010-12-04 17:09:52 -------- d-----w- c:\docume~1\owner\applic~1\Akih
2010-12-04 16:38:58 -------- d-----w- c:\program files\Quick Web Player
2010-12-04 16:20:06 -------- d-----w- c:\docume~1\owner\locals~1\applic~1\WinZip

==================== Find3M ====================


=================== ROOTKIT ====================

Stealth MBR rootkit/Mebroot/Sinowal/TDL4 detector 0.4.2 by Gmer, http://www.gmer.net
Windows 5.1.2600 Disk: WDC_WD400BB-75FRA0 rev.77.07W77 -> Harddisk0\DR0 -> \Device\Ide\IdePort0 P0T0L0-4

device: opened successfully
user: MBR read successfully

Disk trace:
called modules: ntoskrnl.exe CLASSPNP.SYS disk.sys >>UNKNOWN [0x82F3F555]<<
_asm { PUSH EBP; MOV EBP, ESP; PUSH ECX; MOV EAX, [EBP+0x8]; CMP EAX, [0x82f457b0]; MOV EAX, [0x82f4582c]; PUSH EBX; PUSH ESI; MOV ESI, [EBP+0xc]; MOV EBX, [ESI+0x60]; PUSH EDI; JNZ 0x20; MOV [EBP+0x8], EAX; }
1 nt!IofCallDriver[0x804E37D5] -> \Device\Harddisk0\DR0[0x82FE4AB8]
3 CLASSPNP[0xF87B905B] -> nt!IofCallDriver[0x804E37D5] -> [0x82F8F4C8]
\Driver\atapi[0x82F522E8] -> IRP_MJ_CREATE -> 0x82F3F555
kernel: MBR read successfully
_asm { XOR AX, AX; MOV SS, AX; MOV SP, 0x7c00; STI ; PUSH AX; POP ES; PUSH AX; POP DS; CLD ; MOV SI, 0x7c1b; MOV DI, 0x61b; PUSH AX; PUSH DI; MOV CX, 0x1e5; REP MOVSB ; RETF ; MOV BP, 0x7be; MOV CL, 0x4; CMP [BP+0x0], CH; JL 0x2e; JNZ 0x3a; }
detected disk devices:
\Device\Ide\IdeDeviceP0T0L0-4 -> \??\IDE#DiskWDC_WD400BB-75FRA0______________________77.07W77#4457572d4143464a313132303839_033_0_0_0_0#{53f56307-b6bf-11d0-94f2-00a0c91efb8b} device not found
detected hooks:
\Driver\atapi DriverStartIo -> 0x82F3F39B
user & kernel MBR OK
Warning: possible TDL3 rootkit infection !

============= FINISH: 10:31:32.64 ===============

Attached Files



#4 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:03:01 PM

Posted 17 December 2010 - 12:49 AM

Hello

I Would like you to do the following.

Please print out or make a copy in notpad of any instructions given, as sometimes it is necessary to go offline and you will lose access to them.

Run Combofix:

You may be asked to install or update the Recovery Console (Win XP Only) if this happens please allow it to do so (you will need to be connected to the internet for this)

Before you run Combofix I will need you to turn off any security software you have running, If you do not know how to do this you can find out >here< or >here<

Combofix may need to reboot your computer more than once to do its job this is normal.

You can download Combofix from one of these links.
Link 1
Link 2
Link 3
1. Close any open browsers or any other programs that are open.
2. Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.

Double click on combofix.exe & follow the prompts.
When finished, it will produce a report for you.

Note 1: Do not mouseclick combofix's window while it's running. That may cause it to stall

Note 2: If you recieve an error "Illegal operation attempted on a registery key that has been marked for deletion." Please restart the computer

"information and logs"

  • In your next post I need the following
  • Log from Combofix
  • let me know of any problems you may have had
  • How is the computer doing now?

Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#5 delldummy

delldummy
  • Topic Starter

  • Members
  • 10 posts
  • OFFLINE
  •  
  • Local time:01:01 PM

Posted 17 December 2010 - 01:26 PM

Hi Gringo,

Thanks for the quick response.

I followed your directions. When I ran combofix and agreed to the recovery console download, the next promp indicated that I would need to connect to the internet(I was connected) Next prompt the same; when I hit ok it said "unable to download, proceeding with scan"(paraphrase).

When it was finished, I reset my homepage back to yahoo, opened IE and sure enough it went to yahoo. At that point, I ran the combofix again. This time it was able to download the recovery console and continue.


When it was finished I tested Yahoo search results for redirect by searching "bleeping computer". The home page link indeed took me to bleeping computer.

Interestingly, with some of the other links, for instance bleeping computer on facebook and an ehow reference about BC, I still get the usual redirect. Also I'm still getting the "Generic Host has encountered a problem and needs to close" message when the browser is idle for a few moments. In addition, the last time I restarted my computer, I saw a quick flash of the boot screen before windows loaded.

Below I have posted both first and second run logs for combofix. Thank you so much for your help.

Ric

first scan:

ComboFix 10-12-16.05 - Owner 12/17/2010 10:01:41.1.1 - x86
Microsoft Windows XP Home Edition 5.1.2600.2.1252.1.1033.18.510.356 [GMT -6:00]
Running from: c:\documents and settings\Owner\Desktop\ComboFix.exe

WARNING -THIS MACHINE DOES NOT HAVE THE RECOVERY CONSOLE INSTALLED !!
.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.

c:\windows\system32\Drivers\milvcivw.sys

.
((((((((((((((((((((((((( Files Created from 2010-11-17 to 2010-12-17 )))))))))))))))))))))))))))))))
.

2010-12-12 23:16 . 2010-12-12 23:16 -------- d-----w- c:\documents and settings\LocalService\Local Settings\Application Data\Adobe
2010-12-09 15:58 . 2004-02-10 17:50 155648 ----a-w- c:\windows\system32\igfxres.dll
2010-12-09 04:00 . 2010-12-09 04:00 -------- d-----w- c:\program files\MSXML 6.0
2010-12-09 02:05 . 2010-12-09 02:05 -------- d-----w- c:\program files\7-Zip
2010-12-06 04:26 . 2010-12-06 04:26 -------- d-sh--w- c:\documents and settings\LocalService\IETldCache
2010-12-05 20:54 . 2010-12-05 20:54 -------- d-----w- c:\documents and settings\Owner\Application Data\Malwarebytes
2010-12-05 18:20 . 2010-11-29 23:42 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2010-12-05 18:20 . 2010-12-05 18:20 -------- d-----w- c:\documents and settings\All Users\Application Data\Malwarebytes
2010-12-05 18:20 . 2010-12-05 18:20 -------- d-----w- C:\Malwarebytes' Anti-Malware
2010-12-05 18:20 . 2010-11-29 23:42 20952 ----a-w- c:\windows\system32\drivers\mbam.sys
2010-12-05 16:29 . 2010-12-05 16:31 -------- d-----w- c:\documents and settings\Administrator
2010-12-04 17:09 . 2010-12-05 21:15 -------- d-----w- c:\documents and settings\Owner\Application Data\Iguz
2010-12-04 17:09 . 2010-12-04 18:11 -------- d-----w- c:\documents and settings\Owner\Application Data\Akih
2010-12-04 17:08 . 2010-12-04 17:08 -------- d-----w- c:\documents and settings\NetworkService\Local Settings\Application Data\Adobe
2010-12-04 16:38 . 2010-12-04 16:40 -------- d-----w- c:\program files\Quick Web Player
2010-12-04 16:20 . 2010-12-04 16:20 -------- d-----w- c:\documents and settings\Owner\Local Settings\Application Data\WinZip

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"Search Protection"="c:\program files\Yahoo!\Search Protection\SearchProtection.exe" [2009-02-03 111856]
"YSearchProtection"="c:\program files\Yahoo!\Search Protection\SearchProtection.exe" [2009-02-03 111856]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"Adobe Reader Speed Launcher"="c:\program files\Adobe\Reader 9.0\Reader\Reader_sl.exe" [2009-02-27 35696]
"YSearchProtection"="c:\program files\Yahoo!\Search Protection\SearchProtection.exe" [2009-02-03 111856]
"IgfxTray"="c:\windows\system32\igfxtray.exe" [2004-02-10 155648]
"HotKeysCmds"="c:\windows\system32\hkcmd.exe" [2004-02-10 118784]

c:\documents and settings\Administrator\Start Menu\Programs\Startup\
yfunso.exe [2010-12-4 160800]

c:\documents and settings\Default User\Start Menu\Programs\Startup\
yfunso.exe [2010-12-4 160800]

c:\documents and settings\All Users\Start Menu\Programs\Startup\
Airlink101 USB Wireless Configuration Utility.lnk - c:\program files\Airlink101\AWLL3028\RtWLan.exe [2008-11-18 811008]

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=

R2 EAPPkt;Realtek EAPPkt Protocol;c:\windows\system32\drivers\EAPPkt.sys [11/18/2008 7:08 PM 38144]
R3 ews88mt;EWS88 WDM Audio;c:\windows\system32\drivers\ews88wdm.sys [3/14/2007 1:04 AM 95712]
R3 RTL8187B;Airlink101 802.11g USB 2.0 Adapter;c:\windows\system32\drivers\rtl8187B.sys [11/18/2008 7:08 PM 238208]

[HKEY_LOCAL_MACHINE\software\microsoft\active setup\installed components\{A509B1FF-37FF-4bFF-8CFF-4F3A747040FF}]
2009-03-08 09:32 128512 ----a-w- c:\windows\system32\advpack.dll
.
.
------- Supplementary Scan -------
.
uStart Page = hxxp://www.bing.com/?pc=ZUGO&form=ZGAPHP
uSearchAssistant =
DPF: {C1F8FC10-E5DB-4112-9DBF-6C3FF728D4E3} - hxxp://support.dell.com/systemprofiler/DellSystemLite.CAB
.
- - - - ORPHANS REMOVED - - - -

AddRemove-Awave - d:\hotstuff.!!!\Shareware\AWave v5.0\Uninst.bat



**************************************************************************

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2010-12-17 10:18
Windows 5.1.2600 Service Pack 2 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully
hidden files: 0

**************************************************************************

Stealth MBR rootkit/Mebroot/Sinowal/TDL4 detector 0.4.2 by Gmer, http://www.gmer.net
Windows 5.1.2600 Disk: WDC_WD400BB-75FRA0 rev.77.07W77 -> Harddisk0\DR0 -> \Device\Ide\IdePort0 P0T0L0-4

device: opened successfully
user: MBR read successfully

Disk trace:
called modules: ntoskrnl.exe catchme.sys CLASSPNP.SYS disk.sys >>UNKNOWN [0x82F44555]<<
c:\docume~1\Owner\LOCALS~1\Temp\catchme.sys
_asm { PUSH EBP; MOV EBP, ESP; PUSH ECX; MOV EAX, [EBP+0x8]; CMP EAX, [0x82f4a7b0]; MOV EAX, [0x82f4a82c]; PUSH EBX; PUSH ESI; MOV ESI, [EBP+0xc]; MOV EBX, [ESI+0x60]; PUSH EDI; JNZ 0x20; MOV [EBP+0x8], EAX; }
1 nt!IofCallDriver[0x804E37D5] -> \Device\Harddisk0\DR0[0x82FB0AB8]
3 CLASSPNP[0xF87B905B] -> nt!IofCallDriver[0x804E37D5] -> [0x82F8BD78]
\Driver\atapi[0x82F5B2B0] -> IRP_MJ_CREATE -> 0x82F44555
kernel: MBR read successfully
_asm { XOR AX, AX; MOV SS, AX; MOV SP, 0x7c00; STI ; PUSH AX; POP ES; PUSH AX; POP DS; CLD ; MOV SI, 0x7c1b; MOV DI, 0x61b; PUSH AX; PUSH DI; MOV CX, 0x1e5; REP MOVSB ; RETF ; MOV BP, 0x7be; MOV CL, 0x4; CMP [BP+0x0], CH; JL 0x2e; JNZ 0x3a; }
detected disk devices:
\Device\Ide\IdeDeviceP0T0L0-4 -> \??\IDE#DiskWDC_WD400BB-75FRA0______________________77.07W77#4457572d4143464a313132303839_033_0_0_0_0#{53f56307-b6bf-11d0-94f2-00a0c91efb8b} device not found
detected hooks:
\Driver\atapi DriverStartIo -> 0x82F4439B
user & kernel MBR OK
Warning: possible TDL3 rootkit infection !

**************************************************************************
.
--------------------- LOCKED REGISTRY KEYS ---------------------

[HKEY_USERS\S-1-5-21-602162358-1677128483-839522115-1003\Software\Microsoft\SystemCertificates\AddressBook*]
@Allowed: (Read) (RestrictedCode)
@Allowed: (Read) (RestrictedCode)
.
--------------------- DLLs Loaded Under Running Processes ---------------------

- - - - - - - > 'winlogon.exe'(596)
c:\windows\system32\WININET.dll

- - - - - - - > 'lsass.exe'(656)
c:\windows\system32\WININET.dll
.
Completion time: 2010-12-17 10:21:47
ComboFix-quarantined-files.txt 2010-12-17 16:21

Pre-Run: 841,572,352 bytes free
Post-Run: 3,782,729,728 bytes free

- - End Of File - - D1A580B1085F78D0B7EAEFAE1C19C901

second scan:

ComboFix 10-12-16.05 - Owner 12/17/2010 10:46:53.2.1 - x86
Microsoft Windows XP Home Edition 5.1.2600.2.1252.1.1033.18.510.356 [GMT -6:00]
Running from: c:\documents and settings\Owner\Desktop\ComboFix.exe
.

((((((((((((((((((((((((( Files Created from 2010-11-17 to 2010-12-17 )))))))))))))))))))))))))))))))
.

2010-12-12 23:16 . 2010-12-12 23:16 -------- d-----w- c:\documents and settings\LocalService\Local Settings\Application Data\Adobe
2010-12-09 15:58 . 2004-02-10 17:50 155648 ----a-w- c:\windows\system32\igfxres.dll
2010-12-09 04:00 . 2010-12-09 04:00 -------- d-----w- c:\program files\MSXML 6.0
2010-12-09 02:05 . 2010-12-09 02:05 -------- d-----w- c:\program files\7-Zip
2010-12-06 04:26 . 2010-12-06 04:26 -------- d-sh--w- c:\documents and settings\LocalService\IETldCache
2010-12-05 20:54 . 2010-12-05 20:54 -------- d-----w- c:\documents and settings\Owner\Application Data\Malwarebytes
2010-12-05 18:20 . 2010-11-29 23:42 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2010-12-05 18:20 . 2010-12-05 18:20 -------- d-----w- c:\documents and settings\All Users\Application Data\Malwarebytes
2010-12-05 18:20 . 2010-12-05 18:20 -------- d-----w- C:\Malwarebytes' Anti-Malware
2010-12-05 18:20 . 2010-11-29 23:42 20952 ----a-w- c:\windows\system32\drivers\mbam.sys
2010-12-05 16:29 . 2010-12-05 16:31 -------- d-----w- c:\documents and settings\Administrator
2010-12-04 17:09 . 2010-12-05 21:15 -------- d-----w- c:\documents and settings\Owner\Application Data\Iguz
2010-12-04 17:09 . 2010-12-04 18:11 -------- d-----w- c:\documents and settings\Owner\Application Data\Akih
2010-12-04 17:08 . 2010-12-04 17:08 -------- d-----w- c:\documents and settings\NetworkService\Local Settings\Application Data\Adobe
2010-12-04 16:38 . 2010-12-04 16:40 -------- d-----w- c:\program files\Quick Web Player
2010-12-04 16:20 . 2010-12-04 16:20 -------- d-----w- c:\documents and settings\Owner\Local Settings\Application Data\WinZip

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"Search Protection"="c:\program files\Yahoo!\Search Protection\SearchProtection.exe" [2009-02-03 111856]
"YSearchProtection"="c:\program files\Yahoo!\Search Protection\SearchProtection.exe" [2009-02-03 111856]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"Adobe Reader Speed Launcher"="c:\program files\Adobe\Reader 9.0\Reader\Reader_sl.exe" [2009-02-27 35696]
"YSearchProtection"="c:\program files\Yahoo!\Search Protection\SearchProtection.exe" [2009-02-03 111856]
"IgfxTray"="c:\windows\system32\igfxtray.exe" [2004-02-10 155648]
"HotKeysCmds"="c:\windows\system32\hkcmd.exe" [2004-02-10 118784]

c:\documents and settings\Administrator\Start Menu\Programs\Startup\
yfunso.exe [2010-12-4 160800]

c:\documents and settings\Default User\Start Menu\Programs\Startup\
yfunso.exe [2010-12-4 160800]

c:\documents and settings\All Users\Start Menu\Programs\Startup\
Airlink101 USB Wireless Configuration Utility.lnk - c:\program files\Airlink101\AWLL3028\RtWLan.exe [2008-11-18 811008]

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=

R2 EAPPkt;Realtek EAPPkt Protocol;c:\windows\system32\drivers\EAPPkt.sys [11/18/2008 7:08 PM 38144]
R3 ews88mt;EWS88 WDM Audio;c:\windows\system32\drivers\ews88wdm.sys [3/14/2007 1:04 AM 95712]
R3 RTL8187B;Airlink101 802.11g USB 2.0 Adapter;c:\windows\system32\drivers\rtl8187B.sys [11/18/2008 7:08 PM 238208]

[HKEY_LOCAL_MACHINE\software\microsoft\active setup\installed components\{A509B1FF-37FF-4bFF-8CFF-4F3A747040FF}]
2009-03-08 09:32 128512 ----a-w- c:\windows\system32\advpack.dll
.
.
------- Supplementary Scan -------
.
uStart Page = hxxp://www.yahoo.com/
uSearchAssistant =
DPF: {C1F8FC10-E5DB-4112-9DBF-6C3FF728D4E3} - hxxp://support.dell.com/systemprofiler/DellSystemLite.CAB
.

**************************************************************************

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2010-12-17 10:54
Windows 5.1.2600 Service Pack 2 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully
hidden files: 0

**************************************************************************

Stealth MBR rootkit/Mebroot/Sinowal/TDL4 detector 0.4.2 by Gmer, http://www.gmer.net
Windows 5.1.2600 Disk: WDC_WD400BB-75FRA0 rev.77.07W77 -> Harddisk0\DR0 -> \Device\Ide\IdePort0 P0T0L0-4

device: opened successfully
user: MBR read successfully

Disk trace:
called modules: ntoskrnl.exe catchme.sys CLASSPNP.SYS disk.sys >>UNKNOWN [0x82F44555]<<
c:\docume~1\Owner\LOCALS~1\Temp\catchme.sys
_asm { PUSH EBP; MOV EBP, ESP; PUSH ECX; MOV EAX, [EBP+0x8]; CMP EAX, [0x82f4a7b0]; MOV EAX, [0x82f4a82c]; PUSH EBX; PUSH ESI; MOV ESI, [EBP+0xc]; MOV EBX, [ESI+0x60]; PUSH EDI; JNZ 0x20; MOV [EBP+0x8], EAX; }
1 nt!IofCallDriver[0x804E37D5] -> \Device\Harddisk0\DR0[0x82FB0AB8]
3 CLASSPNP[0xF87B905B] -> nt!IofCallDriver[0x804E37D5] -> [0x82F8C2D8]
\Driver\atapi[0x82F5B2B0] -> IRP_MJ_CREATE -> 0x82F44555
kernel: MBR read successfully
_asm { XOR AX, AX; MOV SS, AX; MOV SP, 0x7c00; STI ; PUSH AX; POP ES; PUSH AX; POP DS; CLD ; MOV SI, 0x7c1b; MOV DI, 0x61b; PUSH AX; PUSH DI; MOV CX, 0x1e5; REP MOVSB ; RETF ; MOV BP, 0x7be; MOV CL, 0x4; CMP [BP+0x0], CH; JL 0x2e; JNZ 0x3a; }
detected disk devices:
\Device\Ide\IdeDeviceP0T0L0-4 -> \??\IDE#DiskWDC_WD400BB-75FRA0______________________77.07W77#4457572d4143464a313132303839_033_0_0_0_0#{53f56307-b6bf-11d0-94f2-00a0c91efb8b} device not found
detected hooks:
\Driver\atapi DriverStartIo -> 0x82F4439B
user & kernel MBR OK
Warning: possible TDL3 rootkit infection !

**************************************************************************
.
--------------------- LOCKED REGISTRY KEYS ---------------------

[HKEY_USERS\S-1-5-21-602162358-1677128483-839522115-1003\Software\Microsoft\SystemCertificates\AddressBook*]
@Allowed: (Read) (RestrictedCode)
@Allowed: (Read) (RestrictedCode)
.
--------------------- DLLs Loaded Under Running Processes ---------------------

- - - - - - - > 'winlogon.exe'(596)
c:\windows\system32\WININET.dll

- - - - - - - > 'lsass.exe'(656)
c:\windows\system32\WININET.dll
.
Completion time: 2010-12-17 10:57:51
ComboFix-quarantined-files.txt 2010-12-17 16:57
ComboFix2.txt 2010-12-17 16:21

Pre-Run: 3,761,221,632 bytes free
Post-Run: 3,777,007,616 bytes free

WindowsXP-KB310994-SP2-Home-BootDisk-ENU.exe
[boot loader]
timeout=2
default=multi(0)disk(0)rdisk(0)partition(1)\WINDOWS
[operating systems]
c:\cmdcons\BOOTSECT.DAT="Microsoft Windows Recovery Console" /cmdcons
UnsupportedDebug="do not select this" /debug
multi(0)disk(0)rdisk(0)partition(1)\WINDOWS="Microsoft Windows XP Home Edition" /noexecute=optin /fastdetect

- - End Of File - - B8726D704E689D038AB758D31EB2C631

Edited by delldummy, 17 December 2010 - 01:30 PM.


#6 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:03:01 PM

Posted 17 December 2010 - 01:34 PM

Hello

I saw a quick flash of the boot screen before windows loaded.
this is the recovery console and will be there from now on

It looks like the rootkit is still active. I want you to run this tool for me next.

tdsskiller:

Please read carefully and follow these steps.
  • Download TDSSKiller and save it to your Desktop.
  • doubleclick on TDSSKiller.exe to run the application, then on Start Scan.
  • If an infected file is detected, the default action will be Cure, click on Continue.
  • If a suspicious file is detected, the default action will be Skip, click on Continue.
  • It may ask you to reboot the computer to complete the process. Click on Reboot Now.
  • If no reboot is require, click on Report. A log file should appear. Please copy and paste the contents of that file here.
  • If a reboot is required, the report can also be found in your root directory, (usually C:\ folder) in the form of "TDSSKiller.[Version]_[Date]_[Time]_log.txt". Please copy and paste the contents of that file here.

Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#7 delldummy

delldummy
  • Topic Starter

  • Members
  • 10 posts
  • OFFLINE
  •  
  • Local time:01:01 PM

Posted 17 December 2010 - 02:08 PM

Hi Gringo,

I ran the TDSSKiller scan; it found the malware, cured, and I rebooted.

Then repeated the yahoo search "bleeping computer" and none of the links redirect; looks like everything is running smoothly. As of yet, no hangs, "Generic Host messages", or involuntary disconnects.

Thanks,

Ric

Here's the report:

2010/12/17 12:50:50.0718 TDSS rootkit removing tool 2.4.12.0 Dec 16 2010 09:46:46
2010/12/17 12:50:50.0718 ================================================================================
2010/12/17 12:50:50.0718 SystemInfo:
2010/12/17 12:50:50.0718
2010/12/17 12:50:50.0718 OS Version: 5.1.2600 ServicePack: 2.0
2010/12/17 12:50:50.0718 Product type: Workstation
2010/12/17 12:50:50.0718 ComputerName: RIC
2010/12/17 12:50:50.0718 UserName: Owner
2010/12/17 12:50:50.0718 Windows directory: C:\WINDOWS
2010/12/17 12:50:50.0718 System windows directory: C:\WINDOWS
2010/12/17 12:50:50.0718 Processor architecture: Intel x86
2010/12/17 12:50:50.0718 Number of processors: 1
2010/12/17 12:50:50.0718 Page size: 0x1000
2010/12/17 12:50:50.0718 Boot type: Normal boot
2010/12/17 12:50:50.0718 ================================================================================
2010/12/17 12:50:51.0234 Initialize success
2010/12/17 12:51:00.0562 ================================================================================
2010/12/17 12:51:00.0562 Scan started
2010/12/17 12:51:00.0562 Mode: Manual;
2010/12/17 12:51:00.0562 ================================================================================
2010/12/17 12:51:01.0625 ACPI (a10c7534f7223f4a73a948967d00e69b) C:\WINDOWS\system32\DRIVERS\ACPI.sys
2010/12/17 12:51:01.0781 ACPIEC (9859c0f6936e723e4892d7141b1327d5) C:\WINDOWS\system32\drivers\ACPIEC.sys
2010/12/17 12:51:01.0984 aec (841f385c6cfaf66b58fbd898722bb4f0) C:\WINDOWS\system32\drivers\aec.sys
2010/12/17 12:51:02.0125 AegisP (30bb1bde595ca65fd5549462080d94e5) C:\WINDOWS\system32\DRIVERS\AegisP.sys
2010/12/17 12:51:02.0312 AFD (55e6e1c51b6d30e54335750955453702) C:\WINDOWS\System32\drivers\afd.sys
2010/12/17 12:51:03.0328 AsyncMac (02000abf34af4c218c35d257024807d6) C:\WINDOWS\system32\DRIVERS\asyncmac.sys
2010/12/17 12:51:03.0500 atapi (cdfe4411a69c224bd1d11b2da92dac51) C:\WINDOWS\system32\DRIVERS\atapi.sys
2010/12/17 12:51:03.0718 Atmarpc (ec88da854ab7d7752ec8be11a741bb7f) C:\WINDOWS\system32\DRIVERS\atmarpc.sys
2010/12/17 12:51:03.0843 audstub (d9f724aa26c010a217c97606b160ed68) C:\WINDOWS\system32\DRIVERS\audstub.sys
2010/12/17 12:51:03.0984 Beep (da1f27d85e0d1525f6621372e7b685e9) C:\WINDOWS\system32\drivers\Beep.sys
2010/12/17 12:51:04.0187 cbidf2k (90a673fc8e12a79afbed2576f6a7aaf9) C:\WINDOWS\system32\drivers\cbidf2k.sys
2010/12/17 12:51:04.0375 Cdaudio (c1b486a7658353d33a10cc15211a873b) C:\WINDOWS\system32\drivers\Cdaudio.sys
2010/12/17 12:51:04.0484 Cdfs (cd7d5152df32b47f4e36f710b35aae02) C:\WINDOWS\system32\drivers\Cdfs.sys
2010/12/17 12:51:04.0609 Cdrom (af9c19b3100fe010496b1a27181fbf72) C:\WINDOWS\system32\DRIVERS\cdrom.sys
2010/12/17 12:51:04.0703 cercsr6 (84853b3fd012251690570e9e7e43343f) C:\WINDOWS\system32\drivers\cercsr6.sys
2010/12/17 12:51:05.0421 Disk (00ca44e4534865f8a3b64f7c0984bff0) C:\WINDOWS\system32\DRIVERS\disk.sys
2010/12/17 12:51:05.0609 dmboot (c0fbb516e06e243f0cf31f597e7ebf7d) C:\WINDOWS\system32\drivers\dmboot.sys
2010/12/17 12:51:05.0781 dmio (f5e7b358a732d09f4bcf2824b88b9e28) C:\WINDOWS\system32\drivers\dmio.sys
2010/12/17 12:51:05.0906 dmload (e9317282a63ca4d188c0df5e09c6ac5f) C:\WINDOWS\system32\drivers\dmload.sys
2010/12/17 12:51:06.0031 DMusic (a6f881284ac1150e37d9ae47ff601267) C:\WINDOWS\system32\drivers\DMusic.sys
2010/12/17 12:51:06.0140 dot4 (ad7fc1963b152b3728e3c4f83554a576) C:\WINDOWS\system32\DRIVERS\Dot4.sys
2010/12/17 12:51:06.0296 Dot4Print (77ce63a8a34ae23d9fe4c7896d1debe7) C:\WINDOWS\system32\DRIVERS\Dot4Prt.sys
2010/12/17 12:51:06.0390 Dot4Scan (bd05306428da63369692477ddc0f6f5f) C:\WINDOWS\system32\DRIVERS\Dot4Scan.sys
2010/12/17 12:51:06.0531 dot4usb (6ec3af6bb5b30e488a0c559921f012e1) C:\WINDOWS\system32\DRIVERS\dot4usb.sys
2010/12/17 12:51:06.0765 drmkaud (1ed4dbbae9f5d558dbba4cc450e3eb2e) C:\WINDOWS\system32\drivers\drmkaud.sys
2010/12/17 12:51:06.0890 EAPPkt (d82414ec520453efe2eba936f6a9115a) C:\WINDOWS\system32\DRIVERS\EAPPkt.sys
2010/12/17 12:51:07.0015 ews88mt (fb8cea6a21f46f794d6bd638395626c5) C:\WINDOWS\system32\drivers\ews88wdm.sys
2010/12/17 12:51:07.0156 Fastfat (3117f595e9615e04f05a54fc15a03b20) C:\WINDOWS\system32\drivers\Fastfat.sys
2010/12/17 12:51:07.0312 Fdc (ced2e8396a8838e59d8fd529c680e02c) C:\WINDOWS\system32\DRIVERS\fdc.sys
2010/12/17 12:51:07.0468 Fips (e153ab8a11de5452bcf5ac7652dbf3ed) C:\WINDOWS\system32\drivers\Fips.sys
2010/12/17 12:51:07.0593 Flpydisk (0dd1de43115b93f4d85e889d7a86f548) C:\WINDOWS\system32\DRIVERS\flpydisk.sys
2010/12/17 12:51:07.0718 FltMgr (157754f0df355a9e0a6f54721914f9c6) C:\WINDOWS\system32\DRIVERS\fltMgr.sys
2010/12/17 12:51:07.0828 Fs_Rec (3e1e2bd4f39b0e2b7dc4f4d2bcc2779a) C:\WINDOWS\system32\drivers\Fs_Rec.sys
2010/12/17 12:51:07.0953 Ftdisk (6ac26732762483366c3969c9e4d2259d) C:\WINDOWS\system32\DRIVERS\ftdisk.sys
2010/12/17 12:51:08.0093 Gpc (c0f1d4a21de5a415df8170616703debf) C:\WINDOWS\system32\DRIVERS\msgpc.sys
2010/12/17 12:51:08.0234 HidUsb (1de6783b918f540149aa69943bdfeba8) C:\WINDOWS\system32\DRIVERS\hidusb.sys
2010/12/17 12:51:08.0468 HTTP (9f8b0f4276f618964fd118be4289b7cd) C:\WINDOWS\system32\Drivers\HTTP.sys
2010/12/17 12:51:08.0859 i8042prt (5502b58eef7486ee6f93f3f164dcb808) C:\WINDOWS\system32\DRIVERS\i8042prt.sys
2010/12/17 12:51:09.0015 ialm (da58a8be6a445835f603720c4bc8837e) C:\WINDOWS\system32\DRIVERS\ialmnt5.sys
2010/12/17 12:51:09.0218 Imapi (f8aa320c6a0409c0380e5d8a99d76ec6) C:\WINDOWS\system32\DRIVERS\imapi.sys
2010/12/17 12:51:09.0500 IntelIde (2d722b2b54ab55b2fa475eb58d7b2aad) C:\WINDOWS\system32\DRIVERS\intelide.sys
2010/12/17 12:51:09.0640 intelppm (279fb78702454dff2bb445f238c048d2) C:\WINDOWS\system32\DRIVERS\intelppm.sys
2010/12/17 12:51:09.0750 Ip6Fw (4448006b6bc60e6c027932cfc38d6855) C:\WINDOWS\system32\DRIVERS\Ip6Fw.sys
2010/12/17 12:51:09.0906 IpFilterDriver (731f22ba402ee4b62748adaf6363c182) C:\WINDOWS\system32\DRIVERS\ipfltdrv.sys
2010/12/17 12:51:10.0046 IpInIp (e1ec7f5da720b640cd8fb8424f1b14bb) C:\WINDOWS\system32\DRIVERS\ipinip.sys
2010/12/17 12:51:10.0156 IpNat (b5a8e215ac29d24d60b4d1250ef05ace) C:\WINDOWS\system32\DRIVERS\ipnat.sys
2010/12/17 12:51:10.0328 IPSec (64537aa5c003a6afeee1df819062d0d1) C:\WINDOWS\system32\DRIVERS\ipsec.sys
2010/12/17 12:51:10.0437 IRENUM (50708daa1b1cbb7d6ac1cf8f56a24410) C:\WINDOWS\system32\DRIVERS\irenum.sys
2010/12/17 12:51:10.0578 isapnp (e504f706ccb699c2596e9a3da1596e87) C:\WINDOWS\system32\DRIVERS\isapnp.sys
2010/12/17 12:51:10.0687 Kbdclass (ebdee8a2ee5393890a1acee971c4c246) C:\WINDOWS\system32\DRIVERS\kbdclass.sys
2010/12/17 12:51:10.0796 kmixer (d93cad07c5683db066b0b2d2d3790ead) C:\WINDOWS\system32\drivers\kmixer.sys
2010/12/17 12:51:10.0968 KSecDD (1be7cc2535d760ae4d481576eb789f24) C:\WINDOWS\system32\drivers\KSecDD.sys
2010/12/17 12:51:11.0265 mnmdd (4ae068242760a1fb6e1a44bf4e16afa6) C:\WINDOWS\system32\drivers\mnmdd.sys
2010/12/17 12:51:11.0421 Modem (6fc6f9d7acc36dca9b914565a3aeda05) C:\WINDOWS\system32\drivers\Modem.sys
2010/12/17 12:51:11.0531 Mouclass (34e1f0031153e491910e12551400192c) C:\WINDOWS\system32\DRIVERS\mouclass.sys
2010/12/17 12:51:11.0656 mouhid (b1c303e17fb9d46e87a98e4ba6769685) C:\WINDOWS\system32\DRIVERS\mouhid.sys
2010/12/17 12:51:11.0765 MountMgr (65653f3b4477f3c63e68a9659f85ee2e) C:\WINDOWS\system32\drivers\MountMgr.sys
2010/12/17 12:51:12.0000 MRxDAV (46edcc8f2db2f322c24f48785cb46366) C:\WINDOWS\system32\DRIVERS\mrxdav.sys
2010/12/17 12:51:12.0203 MRxSmb (fb6c89bb3ce282b08bdb1e3c179e1c39) C:\WINDOWS\system32\DRIVERS\mrxsmb.sys
2010/12/17 12:51:12.0390 Msfs (561b3a4333ca2dbdba28b5b956822519) C:\WINDOWS\system32\drivers\Msfs.sys
2010/12/17 12:51:12.0531 MSKSSRV (ae431a8dd3c1d0d0610cdbac16057ad0) C:\WINDOWS\system32\drivers\MSKSSRV.sys
2010/12/17 12:51:12.0625 MSPCLOCK (13e75fef9dfeb08eeded9d0246e1f448) C:\WINDOWS\system32\drivers\MSPCLOCK.sys
2010/12/17 12:51:12.0750 MSPQM (1988a33ff19242576c3d0ef9ce785da7) C:\WINDOWS\system32\drivers\MSPQM.sys
2010/12/17 12:51:12.0843 mssmbios (469541f8bfd2b32659d5d463a6714bce) C:\WINDOWS\system32\DRIVERS\mssmbios.sys
2010/12/17 12:51:12.0984 Mup (82035e0f41c2dd05ae41d27fe6cf7de1) C:\WINDOWS\system32\drivers\Mup.sys
2010/12/17 12:51:13.0140 NDIS (558635d3af1c7546d26067d5d9b6959e) C:\WINDOWS\system32\drivers\NDIS.sys
2010/12/17 12:51:13.0281 NdisTapi (08d43bbdacdf23f34d79e44ed35c1b4c) C:\WINDOWS\system32\DRIVERS\ndistapi.sys
2010/12/17 12:51:13.0437 Ndisuio (34d6cd56409da9a7ed573e1c90a308bf) C:\WINDOWS\system32\DRIVERS\ndisuio.sys
2010/12/17 12:51:13.0531 NdisWan (0b90e255a9490166ab368cd55a529893) C:\WINDOWS\system32\DRIVERS\ndiswan.sys
2010/12/17 12:51:13.0656 NDProxy (59fc3fb44d2669bc144fd87826bb571f) C:\WINDOWS\system32\drivers\NDProxy.sys
2010/12/17 12:51:13.0750 NetBIOS (3a2aca8fc1d7786902ca434998d7ceb4) C:\WINDOWS\system32\DRIVERS\netbios.sys
2010/12/17 12:51:13.0890 NetBT (0c80e410cd2f47134407ee7dd19cc86b) C:\WINDOWS\system32\DRIVERS\netbt.sys
2010/12/17 12:51:14.0093 Npfs (4f601bcb8f64ea3ac0994f98fed03f8e) C:\WINDOWS\system32\drivers\Npfs.sys
2010/12/17 12:51:14.0234 Ntfs (b78be402c3f63dd55521f73876951cdd) C:\WINDOWS\system32\drivers\Ntfs.sys
2010/12/17 12:51:14.0421 Null (73c1e1f395918bc2c6dd67af7591a3ad) C:\WINDOWS\system32\drivers\Null.sys
2010/12/17 12:51:14.0578 NwlnkFlt (b305f3fad35083837ef46a0bbce2fc57) C:\WINDOWS\system32\DRIVERS\nwlnkflt.sys
2010/12/17 12:51:14.0718 NwlnkFwd (c99b3415198d1aab7227f2c88fd664b9) C:\WINDOWS\system32\DRIVERS\nwlnkfwd.sys
2010/12/17 12:51:14.0828 Parport (29744eb4ce659dfe3b4122deb45bc478) C:\WINDOWS\system32\DRIVERS\parport.sys
2010/12/17 12:51:14.0968 PartMgr (3334430c29dc338092f79c38ef7b4cd0) C:\WINDOWS\system32\drivers\PartMgr.sys
2010/12/17 12:51:15.0078 ParVdm (70e98b3fd8e963a6a46a2e6247e0bea1) C:\WINDOWS\system32\drivers\ParVdm.sys
2010/12/17 12:51:15.0203 PCI (8086d9979234b603ad5bc2f5d890b234) C:\WINDOWS\system32\DRIVERS\pci.sys
2010/12/17 12:51:15.0453 PCIIde (ccf5f451bb1a5a2a522a76e670000ff0) C:\WINDOWS\system32\DRIVERS\pciide.sys
2010/12/17 12:51:15.0562 Pcmcia (82a087207decec8456fbe8537947d579) C:\WINDOWS\system32\drivers\Pcmcia.sys
2010/12/17 12:51:16.0343 PptpMiniport (1c5cc65aac0783c344f16353e60b72ac) C:\WINDOWS\system32\DRIVERS\raspptp.sys
2010/12/17 12:51:16.0500 PSched (48671f327553dcf1d27f6197f622a668) C:\WINDOWS\system32\DRIVERS\psched.sys
2010/12/17 12:51:16.0609 Ptilink (80d317bd1c3dbc5d4fe7b1678c60cadd) C:\WINDOWS\system32\DRIVERS\ptilink.sys
2010/12/17 12:51:17.0203 RasAcd (fe0d99d6f31e4fad8159f690d68ded9c) C:\WINDOWS\system32\DRIVERS\rasacd.sys
2010/12/17 12:51:17.0343 Rasl2tp (98faeb4a4dcf812ba1c6fca4aa3e115c) C:\WINDOWS\system32\DRIVERS\rasl2tp.sys
2010/12/17 12:51:17.0484 RasPppoe (7306eeed8895454cbed4669be9f79faa) C:\WINDOWS\system32\DRIVERS\raspppoe.sys
2010/12/17 12:51:17.0562 Raspti (fdbb1d60066fcfbb7452fd8f9829b242) C:\WINDOWS\system32\DRIVERS\raspti.sys
2010/12/17 12:51:17.0687 Rdbss (29d66245adba878fff574cd66abd2884) C:\WINDOWS\system32\DRIVERS\rdbss.sys
2010/12/17 12:51:17.0828 RDPCDD (4912d5b403614ce99c28420f75353332) C:\WINDOWS\system32\DRIVERS\RDPCDD.sys
2010/12/17 12:51:17.0937 RDPWD (d4f5643d7714ef499ae9527fdcd50894) C:\WINDOWS\system32\drivers\RDPWD.sys
2010/12/17 12:51:18.0109 redbook (b31b4588e4086d8d84adbf9845c2402b) C:\WINDOWS\system32\DRIVERS\redbook.sys
2010/12/17 12:51:18.0312 RTL8187B (d668006d3f4249d20729ef6da27c916e) C:\WINDOWS\system32\DRIVERS\RTL8187B.sys
2010/12/17 12:51:18.0468 Secdrv (d26e26ea516450af9d072635c60387f4) C:\WINDOWS\system32\DRIVERS\secdrv.sys
2010/12/17 12:51:18.0609 serenum (a2d868aeeff612e70e213c451a70cafb) C:\WINDOWS\system32\DRIVERS\serenum.sys
2010/12/17 12:51:18.0718 Serial (cd9404d115a00d249f70a371b46d5a26) C:\WINDOWS\system32\DRIVERS\serial.sys
2010/12/17 12:51:18.0828 Sfloppy (0d13b6df6e9e101013a7afb0ce629fe0) C:\WINDOWS\system32\drivers\Sfloppy.sys
2010/12/17 12:51:19.0156 splitter (8e186b8f23295d1e42c573b82b80d548) C:\WINDOWS\system32\drivers\splitter.sys
2010/12/17 12:51:19.0281 sr (e41b6d037d6cd08461470af04500dc24) C:\WINDOWS\system32\DRIVERS\sr.sys
2010/12/17 12:51:19.0453 Srv (7a4f147cc6b133f905f6e65e2f8669fb) C:\WINDOWS\system32\DRIVERS\srv.sys
2010/12/17 12:51:19.0609 swenum (03c1bae4766e2450219d20b993d6e046) C:\WINDOWS\system32\DRIVERS\swenum.sys
2010/12/17 12:51:19.0718 swmidi (94abc808fc4b6d7d2bbf42b85e25bb4d) C:\WINDOWS\system32\drivers\swmidi.sys
2010/12/17 12:51:20.0218 sysaudio (650ad082d46bac0e64c9c0e0928492fd) C:\WINDOWS\system32\drivers\sysaudio.sys
2010/12/17 12:51:20.0390 Tcpip (2a5554fc5b1e04e131230e3ce035c3f9) C:\WINDOWS\system32\DRIVERS\tcpip.sys
2010/12/17 12:51:20.0531 TDPIPE (38d437cf2d98965f239b0abcd66dcb0f) C:\WINDOWS\system32\drivers\TDPIPE.sys
2010/12/17 12:51:20.0640 TDTCP (ed0580af02502d00ad8c4c066b156be9) C:\WINDOWS\system32\drivers\TDTCP.sys
2010/12/17 12:51:20.0765 TermDD (a540a99c281d933f3d69d55e48727f47) C:\WINDOWS\system32\DRIVERS\termdd.sys
2010/12/17 12:51:21.0031 Udfs (12f70256f140cd7d52c58c7048fde657) C:\WINDOWS\system32\drivers\Udfs.sys
2010/12/17 12:51:21.0234 Update (aff2e5045961bbc0a602bb6f95eb1345) C:\WINDOWS\system32\DRIVERS\update.sys
2010/12/17 12:51:21.0375 usbehci (15e993ba2f6946b2bfbbfcd30398621e) C:\WINDOWS\system32\DRIVERS\usbehci.sys
2010/12/17 12:51:21.0515 usbhub (c72f40947f92cea56a8fb532edf025f1) C:\WINDOWS\system32\DRIVERS\usbhub.sys
2010/12/17 12:51:21.0609 usbuhci (f8fd1400092e23c8f2f31406ef06167b) C:\WINDOWS\system32\DRIVERS\usbuhci.sys
2010/12/17 12:51:21.0718 VgaSave (8a60edd72b4ea5aea8202daf0e427925) C:\WINDOWS\System32\drivers\vga.sys
2010/12/17 12:51:21.0953 VolSnap (ee4660083deba849ff6c485d944b379b) C:\WINDOWS\system32\drivers\VolSnap.sys
2010/12/17 12:51:22.0093 Wanarp (984ef0b9788abf89974cfed4bfbaacbc) C:\WINDOWS\system32\DRIVERS\wanarp.sys
2010/12/17 12:51:22.0250 wdmaud (2797f33ebf50466020c430ee4f037933) C:\WINDOWS\system32\drivers\wdmaud.sys
2010/12/17 12:51:22.0468 WudfPf (f15feafffbb3644ccc80c5da584e6311) C:\WINDOWS\system32\DRIVERS\WudfPf.sys
2010/12/17 12:51:22.0593 WudfRd (28b524262bce6de1f7ef9f510ba3985b) C:\WINDOWS\system32\DRIVERS\wudfrd.sys
2010/12/17 12:51:22.0953 \HardDisk1 - detected Rootkit.Win32.TDSS.tdl4 (0)
2010/12/17 12:51:22.0953 ================================================================================
2010/12/17 12:51:22.0953 Scan finished
2010/12/17 12:51:22.0953 ================================================================================
2010/12/17 12:51:22.0968 Detected object count: 1
2010/12/17 12:51:37.0765 \HardDisk1 - will be cured after reboot
2010/12/17 12:51:37.0765 Rootkit.Win32.TDSS.tdl4(\HardDisk1) - User select action: Cure
2010/12/17 12:51:48.0468 Deinitialize success

#8 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:03:01 PM

Posted 17 December 2010 - 05:34 PM

These logs are looking alot better. But we still have some work to do.

Please print out these instructions, or copy them to a Notepad file. It will make it easier for you to follow the instructions and complete all of the necessary steps..

uninstall some programs

1. click on start
2. then go to settings
3. after that you need control panel
4. look for the icon add/remove programs
click on the following programs

Adobe Reader 9.1

and click on remove

Update Adobe Reader

Recently there have been vunerabilities detected in older versions of Adobe Reader. It is strongly suggested that you update to the current version.

You can download it from http://www.adobe.com/products/acrobat/readstep2.html
After installing the latest Adobe Reader, uninstall all previous versions.
If you already have Adobe Photoshop® Album Starter Edition installed or do not wish to have it installed UNcheck the box which says Also Download Adobe Photoshop® Album Starter Edition.

If you don't like Adobe Reader (53 MB), you can download Foxit PDF Reader(7 MB) from here. It's a much smaller file to download and uses a lot less resources than Adobe Reader.

Note: When installing FoxitReader, be carefull not to install anything to do with AskBar.
[/list]TFC(Temp File Cleaner):

  • Please download TFC to your desktop,
  • Save any unsaved work. TFC will close all open application windows.
  • Double-click TFC.exe to run the program.
  • If prompted, click "Yes" to reboot.
Note: Save your work. TFC will automatically close any open programs, let it run uninterrupted. It shouldn't take longer take a couple of minutes, and may only take a few seconds. Only if needed will you be prompted to reboot.

: Malwarebytes' Anti-Malware :

  • I would like you to rerun MBAM
  • Double-click mbam icon
  • go to the update tab at the top
  • click on check for updates
  • If an update is found, it will download and install the latest version.
  • Once the program has loaded, select Perform quick scan, then click Scan.
  • When the scan is complete, click OK, then Show Results to view the results.
  • Be sure that everything is Checked (ticked) except items in the C:\System Volume Information folder and click on Remove Selected.
  • When completed, a log will open in Notepad. please copy and paste the log into your next reply
  • If you accidently close it, the log file is saved here and will be named like this:
  • C:\Documents and Settings\Username\Application Data\Malwarebytes\Malwarebytes' Anti-Malware\Logs\mbam-log-date (time).txt

Note: If MBAM encounters a file that is difficult to remove, you will be presented with 1 of 2 prompts.
Click OK to either and let MBAM proceed with the disinfection process.
If asked to restart the computer, please do so immediately. Failure to reboot will prevent MBAM from removing all the malware.


Download HijackThis

  • Go Here to download HijackThis Installer
  • Save HijackThis Installer to your desktop.
  • Double-click on the HijackThis Installer icon on your desktop. (Vista and Win 7 right click and run as admin)
  • By default it will install to C:\Program Files\Trend Micro\HijackThis .
  • Click on Install.
  • It will create a HijackThis icon on the desktop.
  • Once installed it will launch Hijackthis.
  • Click on the Do a system scan and save a logfile button. It will scan and the log should open in notepad.
  • Click on Edit > Select All then click on Edit > Copy to copy the entire contents of the log.
  • Come back here to this thread and Paste the log in your next reply.
  • DO NOT use the AnalyseThis button its findings are dangerous if misinterpreted.
  • DO NOT have Hijackthis fix anything yet. Most of what it finds will be harmless or even required.

"information and logs"

  • In your next post I need the following

  • Log From MBAM
  • report from Hijackthis
  • let me know of any problems you may have had
  • How is the computer doing now?

Gringo

I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#9 delldummy

delldummy
  • Topic Starter

  • Members
  • 10 posts
  • OFFLINE
  •  
  • Local time:01:01 PM

Posted 17 December 2010 - 08:05 PM

Hi Gringo,

Wow this computer is getting the once over. Everything seems to be functioning well no hangs, stalls, freezes, or redirects to report.

Thanks,

Ric

Here are the logs:

Malwarebytes-

Malwarebytes' Anti-Malware 1.50
www.malwarebytes.org

Database version: 5346

Windows 5.1.2600 Service Pack 2
Internet Explorer 8.0.6001.18702

12/17/2010 6:23:14 PM
mbam-log-2010-12-17 (18-23-14).txt

Scan type: Quick scan
Objects scanned: 130180
Time elapsed: 2 minute(s), 13 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 0

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
(No malicious items detected)


Hijack This-

Logfile of Trend Micro HijackThis v2.0.4
Scan saved at 6:55:54 PM, on 12/17/2010
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v8.00 (8.00.6001.18702)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\system32\svchost.exe
C:\Program Files\Yahoo!\SoftwareUpdate\YahooAUService.exe
C:\Program Files\Yahoo!\Search Protection\SearchProtection.exe
C:\WINDOWS\system32\hkcmd.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Airlink101\AWLL3028\RtWLan.exe
C:\WINDOWS\system32\wscntfy.exe
C:\WINDOWS\system32\wuauclt.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\WINDOWS\system32\msiexec.exe
C:\Program Files\Trend Micro\HiJackThis\HiJackThis.exe

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.yahoo.com/
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
O2 - BHO: (no name) - {02478D38-C3F9-4efb-9B51-7695ECA05670} - (no file)
O2 - BHO: AcroIEHelperStub - {18DF081C-E8AD-4283-A596-FA578C2EBDC3} - C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelperShim.dll
O2 - BHO: Google Toolbar Helper - {AA58ED58-01DD-4d91-8333-CF10577473F7} - C:\Program Files\Google\Google Toolbar\GoogleToolbar_32.dll
O2 - BHO: Google Toolbar Notifier BHO - {AF69DE43-7D58-4638-B6FA-CE66B5AD205D} - C:\Program Files\Google\GoogleToolbarNotifier\5.5.5126.1836\swg.dll
O3 - Toolbar: Google Toolbar - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - C:\Program Files\Google\Google Toolbar\GoogleToolbar_32.dll
O4 - HKLM\..\Run: [YSearchProtection] "C:\Program Files\Yahoo!\Search Protection\SearchProtection.exe"
O4 - HKLM\..\Run: [IgfxTray] C:\WINDOWS\system32\igfxtray.exe
O4 - HKLM\..\Run: [HotKeysCmds] C:\WINDOWS\system32\hkcmd.exe
O4 - HKLM\..\Run: [Adobe Reader Speed Launcher] "C:\Program Files\Adobe\Reader 10.0\Reader\Reader_sl.exe"
O4 - HKLM\..\Run: [Adobe ARM] "C:\Program Files\Common Files\Adobe\ARM\1.0\AdobeARM.exe"
O4 - HKCU\..\Run: [Search Protection] C:\Program Files\Yahoo!\Search Protection\SearchProtection.exe
O4 - HKCU\..\Run: [YSearchProtection] C:\Program Files\Yahoo!\Search Protection\SearchProtection.exe
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
O4 - .DEFAULT User Startup: yfunso.exe (User 'Default user')
O4 - Global Startup: Airlink101 USB Wireless Configuration Utility.lnk = ?
O8 - Extra context menu item: Google Sidewiki... - res://C:\Program Files\Google\Google Toolbar\Component\GoogleToolbarDynamic_mui_en_89D8574934B26AC4.dll/cmsidewiki.html
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O16 - DPF: {30528230-99f7-4bb4-88d8-fa1d4f56a2ab} (Installation Support) - C:\Program Files\Yahoo!\Common\Yinsthelper.dll
O16 - DPF: {C1F8FC10-E5DB-4112-9DBF-6C3FF728D4E3} (DellSystemLite.Scanner) - http://support.dell.com/systemprofiler/DellSystemLite.CAB
O16 - DPF: {E2883E8F-472F-4FB0-9522-AC9BF37916A7} - http://platformdl.adobe.com/NOS/getPlusPlus/1.6/gp.cab
O22 - SharedTaskScheduler: Browseui preloader - {438755C2-A8BA-11D1-B96B-00A0C90312E1} - C:\WINDOWS\system32\browseui.dll
O22 - SharedTaskScheduler: Component Categories cache daemon - {8C7461EF-2B13-11d2-BE35-3078302C2030} - C:\WINDOWS\system32\browseui.dll
O23 - Service: Google Update Service (gupdate) (gupdate) - Google Inc. - C:\Program Files\Google\Update\GoogleUpdate.exe
O23 - Service: Google Software Updater (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
O23 - Service: Yahoo! Updater (YahooAUService) - Yahoo! Inc. - C:\Program Files\Yahoo!\SoftwareUpdate\YahooAUService.exe

--
End of file - 4454 bytes

#10 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:03:01 PM

Posted 17 December 2010 - 09:27 PM

Greetings

Wow this computer is getting the once over. Everything seems to be functioning well no hangs, stalls, freezes, or redirects to report.
When we finish you will know it is clean and as secure as it can be.


These logs are looking very good, we are almost done!!! Just one more scan to go.

:Remove unneeded startup entries:

This part of the fix is purely optional
These are programs that start up when you turn on your computer but don't need to be, any of these programs you can click on their icons (or start from the control panel) and start the program when you need it. By stopping these programs you will boot up faster and your computer will work faster.

  • Run HijackThis
  • Click on the Scan button
  • Put a check beside all of the items listed below (if present):

    • O4 - HKLM\..\Run: [YSearchProtection] "C:\Program Files\Yahoo!\Search Protection\SearchProtection.exe"
      O4 - HKLM\..\Run: [IgfxTray] C:\WINDOWS\system32\igfxtray.exe
      O4 - HKLM\..\Run: [Adobe Reader Speed Launcher] "C:\Program Files\Adobe\Reader 10.0\Reader\Reader_sl.exe"
      O4 - HKLM\..\Run: [Adobe ARM] "C:\Program Files\Common Files\Adobe\ARM\1.0\AdobeARM.exe"
      O4 - HKCU\..\Run: [Search Protection] C:\Program Files\Yahoo!\Search Protection\SearchProtection.exe
      O4 - HKCU\..\Run: [YSearchProtection] C:\Program Files\Yahoo!\Search Protection\SearchProtection.exe
      O4 - .DEFAULT User Startup: yfunso.exe (User 'Default user')
  • Close all open windows and browsers/email, etc...
  • Click on the "Fix Checked" button
  • When completed, close the application.

    NOTE**You can research each of those lines >here< and see if you want to keep them or not
    just copy the name between the brakets and paste into the search space
    O4 - HKLM\..\Run: [IntelliPoint]


Eset Online Scanner

**Note** You will need to use Internet explorer for this scan - Vista and win 7 right click on IE shortcut and run as admin

Go Eset web page to run an online scannner from ESET.

  • Turn off the real time scanner of any existing antivirus program while performing the online scan
  • click on the ESET Online Scanner button
  • Tick the box next to YES, I accept the Terms of Use.
    • Click Start
  • When asked, allow the activex control to install
    • Click Start
  • Make sure that the option Remove found threats is unticked and the Scan Archives option is ticked.
  • Click on Advanced Settings, ensure the options
    Scan for potentially unwanted applications, Scan for potentially unsafe applications, and Enable Anti-Stealth Technology are ticked.
  • Click Scan
  • Wait for the scan to finish
  • Use notepad to open the logfile located at C:\Program Files\Eset\Eset Online Scanner\log.txt
Copy and paste that log as a reply to this topic

Gringo

Edited by gringo_pr, 17 December 2010 - 09:28 PM.

I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#11 delldummy

delldummy
  • Topic Starter

  • Members
  • 10 posts
  • OFFLINE
  •  
  • Local time:01:01 PM

Posted 18 December 2010 - 11:35 AM

Hi Gringo, sorry for the delay response.

I had no idea all that yahoo junk was running on start-up, but I'm sure glad to stop it.

Looks like I'm not finished yet though, according to ESET; but I can tell you the performance of this computer is already better than before I was hit with that malware.

Thanks,

Ric

Here is the ESET log:

ESETSmartInstaller@High as CAB hook log:
OnlineScanner.ocx - registred OK
# version=7
# iexplore.exe=8.00.6001.18702 (longhorn_ie8_rtm(wmbla).090308-0339)
# OnlineScanner.ocx=1.0.0.6415
# api_version=3.0.2
# EOSSerial=a5dc4cb9f52df24f9c0b363627876bc8
# end=finished
# remove_checked=false
# archives_checked=true
# unwanted_checked=true
# unsafe_checked=false
# antistealth_checked=true
# utc_time=2010-12-18 05:44:58
# local_time=2010-12-17 11:44:58 (-0600, Central Standard Time)
# country="United States"
# lang=1033
# osver=5.1.2600 NT Service Pack 2
# compatibility_mode=512 16777215 100 0 0 0 0 0
# compatibility_mode=8192 67108863 100 0 0 0 0 0
# scanned=31621
# found=14
# cleaned=0
# scan_time=1406
C:\Documents and Settings\Administrator\Desktop\mbam-setup-1.50.0.0.exe Win32/TrojanDownloader.Small.PAC trojan (unable to clean) 00000000000000000000000000000000 I
C:\Documents and Settings\Administrator\Start Menu\Programs\Startup\yfunso.exe a variant of Win32/Kryptik.IXE trojan (unable to clean) 00000000000000000000000000000000 I
C:\Documents and Settings\Default User\Start Menu\Programs\Startup\yfunso.exe a variant of Win32/Kryptik.IXE trojan (unable to clean) 00000000000000000000000000000000 I
C:\Documents and Settings\Owner\Desktop\a1404_06_esn_xp.exe Win32/TrojanDownloader.Small.PAC trojan (unable to clean) 00000000000000000000000000000000 I
C:\Documents and Settings\Owner\Desktop\R58201.EXE Win32/TrojanDownloader.Small.PAC trojan (unable to clean) 00000000000000000000000000000000 I
C:\Documents and Settings\Owner\Desktop\setup.exe Win32/TrojanDownloader.Small.PAC trojan (unable to clean) 00000000000000000000000000000000 I
C:\System Volume Information\_restore{D0FE4B1C-18DB-48D4-AE5E-CAC24CD70281}\RP527\A0104296.exe Win32/TrojanDownloader.Small.PAC trojan (unable to clean) 00000000000000000000000000000000 I
C:\System Volume Information\_restore{D0FE4B1C-18DB-48D4-AE5E-CAC24CD70281}\RP529\A0106425.EXE Win32/TrojanDownloader.Small.PAC trojan (unable to clean) 00000000000000000000000000000000 I
C:\System Volume Information\_restore{D0FE4B1C-18DB-48D4-AE5E-CAC24CD70281}\RP529\A0106426.exe Win32/TrojanDownloader.Small.PAC trojan (unable to clean) 00000000000000000000000000000000 I
C:\System Volume Information\_restore{D0FE4B1C-18DB-48D4-AE5E-CAC24CD70281}\RP530\A0106430.exe Win32/TrojanDownloader.Small.PAC trojan (unable to clean) 00000000000000000000000000000000 I
C:\System Volume Information\_restore{D0FE4B1C-18DB-48D4-AE5E-CAC24CD70281}\RP530\A0107482.exe Win32/TrojanDownloader.Small.PAC trojan (unable to clean) 00000000000000000000000000000000 I
C:\System Volume Information\_restore{D0FE4B1C-18DB-48D4-AE5E-CAC24CD70281}\RP535\A0113696.exe Win32/TrojanDownloader.Small.PAC trojan (unable to clean) 00000000000000000000000000000000 I
C:\System Volume Information\_restore{D0FE4B1C-18DB-48D4-AE5E-CAC24CD70281}\RP537\A0119035.exe Win32/TrojanDownloader.Small.PAC trojan (unable to clean) 00000000000000000000000000000000 I
C:\System Volume Information\_restore{D0FE4B1C-18DB-48D4-AE5E-CAC24CD70281}\RP542\A0119162.exe Win32/TrojanDownloader.Small.PAC trojan (unable to clean) 00000000000000000000000000000000 I
# version=7
# iexplore.exe=8.00.6001.18702 (longhorn_ie8_rtm(wmbla).090308-0339)
# OnlineScanner.ocx=1.0.0.6415
# api_version=3.0.2
# EOSSerial=a5dc4cb9f52df24f9c0b363627876bc8
# end=finished
# remove_checked=false
# archives_checked=true
# unwanted_checked=true
# unsafe_checked=true
# antistealth_checked=true
# utc_time=2010-12-18 03:52:54
# local_time=2010-12-18 09:52:54 (-0600, Central Standard Time)
# country="United States"
# lang=1033
# osver=5.1.2600 NT Service Pack 2
# compatibility_mode=512 16777215 100 0 0 0 0 0
# compatibility_mode=8192 67108863 100 0 0 0 0 0
# scanned=31649
# found=14
# cleaned=0
# scan_time=1366
C:\Documents and Settings\Administrator\Desktop\mbam-setup-1.50.0.0.exe Win32/TrojanDownloader.Small.PAC trojan (unable to clean) 00000000000000000000000000000000 I
C:\Documents and Settings\Administrator\Start Menu\Programs\Startup\yfunso.exe a variant of Win32/Kryptik.IXE trojan (unable to clean) 00000000000000000000000000000000 I
C:\Documents and Settings\Default User\Start Menu\Programs\Startup\yfunso.exe a variant of Win32/Kryptik.IXE trojan (unable to clean) 00000000000000000000000000000000 I
C:\Documents and Settings\Owner\Desktop\a1404_06_esn_xp.exe Win32/TrojanDownloader.Small.PAC trojan (unable to clean) 00000000000000000000000000000000 I
C:\Documents and Settings\Owner\Desktop\R58201.EXE Win32/TrojanDownloader.Small.PAC trojan (unable to clean) 00000000000000000000000000000000 I
C:\Documents and Settings\Owner\Desktop\setup.exe Win32/TrojanDownloader.Small.PAC trojan (unable to clean) 00000000000000000000000000000000 I
C:\System Volume Information\_restore{D0FE4B1C-18DB-48D4-AE5E-CAC24CD70281}\RP527\A0104296.exe Win32/TrojanDownloader.Small.PAC trojan (unable to clean) 00000000000000000000000000000000 I
C:\System Volume Information\_restore{D0FE4B1C-18DB-48D4-AE5E-CAC24CD70281}\RP529\A0106425.EXE Win32/TrojanDownloader.Small.PAC trojan (unable to clean) 00000000000000000000000000000000 I
C:\System Volume Information\_restore{D0FE4B1C-18DB-48D4-AE5E-CAC24CD70281}\RP529\A0106426.exe Win32/TrojanDownloader.Small.PAC trojan (unable to clean) 00000000000000000000000000000000 I
C:\System Volume Information\_restore{D0FE4B1C-18DB-48D4-AE5E-CAC24CD70281}\RP530\A0106430.exe Win32/TrojanDownloader.Small.PAC trojan (unable to clean) 00000000000000000000000000000000 I
C:\System Volume Information\_restore{D0FE4B1C-18DB-48D4-AE5E-CAC24CD70281}\RP530\A0107482.exe Win32/TrojanDownloader.Small.PAC trojan (unable to clean) 00000000000000000000000000000000 I
C:\System Volume Information\_restore{D0FE4B1C-18DB-48D4-AE5E-CAC24CD70281}\RP535\A0113696.exe Win32/TrojanDownloader.Small.PAC trojan (unable to clean) 00000000000000000000000000000000 I
C:\System Volume Information\_restore{D0FE4B1C-18DB-48D4-AE5E-CAC24CD70281}\RP537\A0119035.exe Win32/TrojanDownloader.Small.PAC trojan (unable to clean) 00000000000000000000000000000000 I
C:\System Volume Information\_restore{D0FE4B1C-18DB-48D4-AE5E-CAC24CD70281}\RP542\A0119162.exe Win32/TrojanDownloader.Small.PAC trojan (unable to clean) 00000000000000000000000000000000 I

#12 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:03:01 PM

Posted 18 December 2010 - 01:41 PM

Greetings

There are somethings in the online scan I want to remove so run this scrript for me.

:Run CFScript:

Open Notepad and copy/paste the text in the box into the window:

File::
C:\Documents and Settings\Administrator\Desktop\mbam-setup-1.50.0.0.exe
C:\Documents and Settings\Administrator\Start Menu\Programs\Startup\yfunso.exe
C:\Documents and Settings\Default User\Start Menu\Programs\Startup\yfunso.exe
C:\Documents and Settings\Owner\Desktop\a1404_06_esn_xp.exe
C:\Documents and Settings\Owner\Desktop\R58201.EXE
C:\Documents and Settings\Owner\Desktop\setup.exe


Save it to your desktop as CFScript.txt

Refering to the picture above, drag CFScript.txt into ComboFix.exe
Posted Image
This will let ComboFix run again.
Restart if you have to.
Save the produced logfile to your desktop.

Note: Do not mouseclick combofix's window whilst it's running. That may cause it to stall

"information and logs"

  • In your next post I need the following

  • report from Combofix
  • let me know of any problems you may have had
  • How is the computer doing now after running the script?

Gringo

I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#13 delldummy

delldummy
  • Topic Starter

  • Members
  • 10 posts
  • OFFLINE
  •  
  • Local time:01:01 PM

Posted 18 December 2010 - 02:33 PM

Hi Gringo,

About halfway through the scan Combofix prompted that it needed to upload files for further analysis. It later propted that the server was unavailable and the files had been saved to upload later.

Would I still need to do that?

Thanks,

Ric

Here is the log:

ComboFix 10-12-18.01 - Owner 12/18/2010 13:07:45.3.1 - x86
Microsoft Windows XP Home Edition 5.1.2600.2.1252.1.1033.18.510.297 [GMT -6:00]
Running from: c:\documents and settings\Owner\Desktop\ComboFix.exe
Command switches used :: c:\documents and settings\Owner\Desktop\CFScript.txt

FILE ::
"c:\documents and settings\Administrator\Desktop\mbam-setup-1.50.0.0.exe"
"c:\documents and settings\Administrator\Start Menu\Programs\Startup\yfunso.exe"
"c:\documents and settings\Default User\Start Menu\Programs\Startup\yfunso.exe"
"c:\documents and settings\Owner\Desktop\a1404_06_esn_xp.exe"
"c:\documents and settings\Owner\Desktop\R58201.EXE"
"c:\documents and settings\Owner\Desktop\setup.exe"
.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.

c:\documents and settings\Administrator\Desktop\mbam-setup-1.50.0.0.exe
c:\documents and settings\Administrator\Start Menu\Programs\Startup\yfunso.exe
c:\documents and settings\Default User\Start Menu\Programs\Startup\yfunso.exe
c:\documents and settings\Owner\Desktop\a1404_06_esn_xp.exe
c:\documents and settings\Owner\Desktop\R58201.EXE
c:\documents and settings\Owner\Desktop\setup.exe

.
((((((((((((((((((((((((( Files Created from 2010-11-18 to 2010-12-18 )))))))))))))))))))))))))))))))
.

2010-12-18 05:14 . 2010-12-18 05:14 -------- d-----w- c:\program files\ESET
2010-12-18 02:12 . 2010-12-18 02:12 -------- d-----w- c:\documents and settings\Owner\Local Settings\Application Data\Temp
2010-12-18 00:53 . 2010-12-18 00:53 388096 ----a-r- c:\documents and settings\Owner\Application Data\Microsoft\Installer\{45A66726-69BC-466B-A7A4-12FCBA4883D7}\HiJackThis.exe
2010-12-18 00:53 . 2010-12-18 00:53 -------- d-----w- c:\program files\Trend Micro
2010-12-18 00:05 . 2010-12-18 00:05 -------- d-----w- c:\documents and settings\NetworkService\Local Settings\Application Data\Google
2010-12-18 00:00 . 2010-12-18 00:00 -------- d-----w- c:\documents and settings\LocalService\Local Settings\Application Data\Google
2010-12-18 00:00 . 2010-12-18 00:00 -------- d-----w- c:\documents and settings\Owner\Local Settings\Application Data\Google
2010-12-17 23:59 . 2010-12-18 00:00 -------- d-----w- c:\program files\Google
2010-12-12 23:16 . 2010-12-12 23:16 -------- d-----w- c:\documents and settings\LocalService\Local Settings\Application Data\Adobe
2010-12-09 15:58 . 2004-02-10 17:50 155648 ----a-w- c:\windows\system32\igfxres.dll
2010-12-09 04:00 . 2010-12-09 04:00 -------- d-----w- c:\program files\MSXML 6.0
2010-12-09 02:05 . 2010-12-09 02:05 -------- d-----w- c:\program files\7-Zip
2010-12-06 04:26 . 2010-12-06 04:26 -------- d-sh--w- c:\documents and settings\LocalService\IETldCache
2010-12-05 20:54 . 2010-12-05 20:54 -------- d-----w- c:\documents and settings\Owner\Application Data\Malwarebytes
2010-12-05 18:20 . 2010-11-29 23:42 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2010-12-05 18:20 . 2010-12-05 18:20 -------- d-----w- c:\documents and settings\All Users\Application Data\Malwarebytes
2010-12-05 18:20 . 2010-12-05 18:20 -------- d-----w- C:\Malwarebytes' Anti-Malware
2010-12-05 18:20 . 2010-11-29 23:42 20952 ----a-w- c:\windows\system32\drivers\mbam.sys
2010-12-05 16:29 . 2010-12-05 16:31 -------- d-----w- c:\documents and settings\Administrator
2010-12-04 17:09 . 2010-12-05 21:15 -------- d-----w- c:\documents and settings\Owner\Application Data\Iguz
2010-12-04 17:09 . 2010-12-04 18:11 -------- d-----w- c:\documents and settings\Owner\Application Data\Akih
2010-12-04 17:08 . 2010-12-04 17:08 -------- d-----w- c:\documents and settings\NetworkService\Local Settings\Application Data\Adobe
2010-12-04 16:38 . 2010-12-04 16:40 -------- d-----w- c:\program files\Quick Web Player
2010-12-04 16:20 . 2010-12-04 16:20 -------- d-----w- c:\documents and settings\Owner\Local Settings\Application Data\WinZip

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
.

((((((((((((((((((((((((((((( SnapShot@2010-12-17_16.18.23 )))))))))))))))))))))))))))))))))))))))))
.
+ 2010-12-18 00:00 . 2010-12-18 00:00 22528 c:\windows\Installer\ea889.msi
+ 2010-12-18 00:00 . 2010-12-18 00:00 24064 c:\windows\Installer\ea884.msi
+ 2007-11-07 07:19 . 2007-11-07 07:19 655872 c:\windows\WinSxS\x86_Microsoft.VC90.CRT_1fc8b3b9a1e18e3b_9.0.21022.8_x-ww_d08d0375\msvcr90.dll
+ 2007-11-07 07:19 . 2007-11-07 07:19 568832 c:\windows\WinSxS\x86_Microsoft.VC90.CRT_1fc8b3b9a1e18e3b_9.0.21022.8_x-ww_d08d0375\msvcp90.dll
+ 2007-11-07 02:23 . 2007-11-07 02:23 224768 c:\windows\WinSxS\x86_Microsoft.VC90.CRT_1fc8b3b9a1e18e3b_9.0.21022.8_x-ww_d08d0375\msvcm90.dll
+ 2010-12-17 21:47 . 2010-12-17 21:47 969728 c:\windows\Installer\9fd618.msi
+ 2009-08-19 23:07 . 2009-08-19 23:07 1415000 c:\windows\system32\msxml6.dll
+ 2010-12-18 00:04 . 2010-12-18 00:04 2283008 c:\windows\Installer\ea88f.msi
+ 2010-12-18 00:53 . 2010-12-18 00:53 1094656 c:\windows\Installer\25251b.msi
.
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"HotKeysCmds"="c:\windows\system32\hkcmd.exe" [2004-02-10 118784]

c:\documents and settings\All Users\Start Menu\Programs\Startup\
Airlink101 USB Wireless Configuration Utility.lnk - c:\program files\Airlink101\AWLL3028\RtWLan.exe [2008-11-18 811008]

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=

R2 EAPPkt;Realtek EAPPkt Protocol;c:\windows\system32\drivers\EAPPkt.sys [11/18/2008 7:08 PM 38144]
R3 ews88mt;EWS88 WDM Audio;c:\windows\system32\drivers\ews88wdm.sys [3/14/2007 1:04 AM 95712]
R3 RTL8187B;Airlink101 802.11g USB 2.0 Adapter;c:\windows\system32\drivers\rtl8187B.sys [11/18/2008 7:08 PM 238208]
S2 gupdate;Google Update Service (gupdate);c:\program files\Google\Update\GoogleUpdate.exe [12/17/2010 6:00 PM 136176]

[HKEY_LOCAL_MACHINE\software\microsoft\active setup\installed components\{A509B1FF-37FF-4bFF-8CFF-4F3A747040FF}]
2009-03-08 09:32 128512 ----a-w- c:\windows\system32\advpack.dll
.
Contents of the 'Scheduled Tasks' folder

2010-12-18 c:\windows\Tasks\GoogleUpdateTaskMachineCore.job
- c:\program files\Google\Update\GoogleUpdate.exe [2010-12-18 00:00]

2010-12-18 c:\windows\Tasks\GoogleUpdateTaskMachineUA.job
- c:\program files\Google\Update\GoogleUpdate.exe [2010-12-18 00:00]
.
.
------- Supplementary Scan -------
.
uStart Page = hxxp://www.yahoo.com/
uSearchAssistant =
IE: Google Sidewiki... - c:\program files\Google\Google Toolbar\Component\GoogleToolbarDynamic_mui_en_89D8574934B26AC4.dll/cmsidewiki.html
DPF: {C1F8FC10-E5DB-4112-9DBF-6C3FF728D4E3} - hxxp://support.dell.com/systemprofiler/DellSystemLite.CAB
.

**************************************************************************

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2010-12-18 13:12
Windows 5.1.2600 Service Pack 2 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully
hidden files: 0

**************************************************************************
.
--------------------- LOCKED REGISTRY KEYS ---------------------

[HKEY_USERS\S-1-5-21-602162358-1677128483-839522115-1003\Software\Microsoft\SystemCertificates\AddressBook*]
@Allowed: (Read) (RestrictedCode)
@Allowed: (Read) (RestrictedCode)
.
Completion time: 2010-12-18 13:14:16
ComboFix-quarantined-files.txt 2010-12-18 19:14
ComboFix2.txt 2010-12-17 16:57
ComboFix3.txt 2010-12-17 16:21

Pre-Run: 3,453,018,112 bytes free
Post-Run: 3,370,057,728 bytes free

- - End Of File - - 1A08FBFACB3558191ABB1279AF64C3D6

#14 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:03:01 PM

Posted 18 December 2010 - 02:50 PM

Hello

Would I still need to do that?
no they will be removed now anyway




Very well done!! This is my general post for when your logs show no more signs of malware - Please let me know if you still are having problems with your computer and what these problems are.


The following procedure will implement some cleanup procedures. It will also reset your System Restore by flushing out previous restore points and create a new restore point. It will also remove all the backups our tools may have made.

Any programs and logs that are left over you can just be deleted from the desktop. TFC is a free temp file cleaner that is very easy to use, I would keep this and use before you do any scans or when you want to free up some space.

:DeFogger:

  • To re-enable your Emulation drivers, double click DeFogger to run the tool.
  • The application window will appear
  • Click the Re-enable button to re-enable your CD Emulation drivers
  • Click Yes to continue
  • A 'Finished!' message will appear
  • Click OK
  • DeFogger will now ask to reboot the machine - click OK
Your Emulation drivers are now re-enabled.


:Uninstall ComboFix:

  • turn off all active protection software
  • push the "windows key" + "R" (between the "Ctrl" button and "Alt" Button)
  • please copy and past the following into the box ComboFix /Uninstall and click OK.
  • Note the space between the X and the /Uninstall, it needs to be there.
  • Posted Image


:remove tools:

Please download OTCleanIt and save it to desktop. This tool will remove all the tools we used to clean your pc.
  • Double-click OTCleanIt.exe.
  • Click the CleanUp! button.
  • Select Yes when the "Begin cleanup Process?" prompt appears.
  • If you are prompted to Reboot during the cleanup, select Yes.
  • The tool will delete itself once it finishes, if not delete it by yourself.
  • If asked to restart the computer, please do so
Note: If you receive a warning from your firewall or other security programs regarding OTCleanIt attempting to contact the internet, please allow it to do so.


:clear system restore points:

This is a good time to clear your existing system restore points and establish a new clean restore point:
  • Go to Start > All Programs > Accessories > System Tools > System Restore
  • Select Create a restore point, and Ok it.
  • Next, go to Start > Run and type in cleanmgr
  • choose your root drive (normally C:)
  • after it calculates how much space you will save it will open up a new window
  • Select the More options tab at the top of the window
  • Choose the option to clean up system restore and OK it.
  • go back to the disk clean up tab
  • put a checkmark in all - except compress old files (leave this unchecked)
  • click Ok then click yes
This will remove all restore points except the new one you just created and clean unneeded files


:Make your Internet Explorer more secure:

  • From within Internet Explorer click on the Tools menu and then click on Options.
  • Click once on the Security tab
  • Click once on the Internet icon so it becomes highlighted.
  • Click once on the Custom Level button.
  • Change the Download signed ActiveX controls to Prompt
  • Change the Download unsigned ActiveX controls to Disable
  • Change the Initialise and script ActiveX controls not marked as safe to Disable
  • Change the Installation of desktop items to Prompt
  • Change the Launching programs and files in an IFRAME to Prompt
  • When all these settings have been made, click on the OK button.
  • If it prompts you as to whether or not you want to save the settings, press the Yes button.
    Next press the Apply button and then the OK to exit the Internet Properties page.


:Make Firefox more secure:

please visit this page to explain how to make Firefox more secure - How to Secure Firefox


Make sure your applications have all of their updates

It is also possible for other programs on your computer to have security vulnerability that can allow malware to infect you. Therefore, it is also a good idea to check for the latest versions of commonly installed applications that are regularly patched to fix vulnerabilities. You can check these by visiting Secunia Software Inspector


:Turn On Automatic Updates:

Turn On Automatic Updates
1. Click Start, click Run, type sysdm.cpl, and then press ENTER.
2. Click the Automatic Updates tab, and then click to select one of the following options. We recommend that you select the Automatic (recommended) Automatically download recommended updates for my computer and install them

If you click this setting, click to select the day and time for scheduled updates to occur. You can schedule Automatic Updates for any time of day. Remember, your computer must be on at the scheduled time for updates to be installed. After you set this option, Windows recognizes when you are online and uses your Internet connection to find updates on the Windows Update Web site or on the Microsoft Update Web site that apply to your computer. Updates are downloaded automatically in the background, and you are not notified or interrupted during this process. An icon appears in the notification area of your taskbar when the updates are being downloaded. You can point to the icon to view the download status. To pause or to resume the download, right-click the icon, and then click Pause or Resume. When the download is completed, another message appears in the notification area so that you can review the updates that are scheduled for installation. If you choose not to install at that time, Windows starts the installation on your set schedule.

or visit http://www.windowsupdate.com regularly. This will ensure your computer has always the latest security updates available installed on your computer. If there are new updates to install, install them immediately, reboot your computer, and revisit the site until there are no more critical updates.

:antispyware programs:

I would reccomend the download and installation of some or all of the following programs (all free), and the updating of them regularly:

  • WinPatrol As a robust security monitor, WinPatrol will alert you to hijackings, malware attacks and critical changes made to your computer without your permission. WinPatrol takes snapshot of your critical system resources and alerts you to any changes that may occur without your knowledge.
  • Spyware Blaster - By altering your registry, this program stops harmful sites from installing things like ActiveX Controls on your machines.
  • Malwarebytes' Anti-Malware Malwarebytes' Anti-Malware is a new and powerful anti-malware tool. It is
    totally free but for real-time protection you will have to pay a small one-time fee. We used this to help clean your computer and recomend keeping it and using often.

Here is some great reading about how to be safer online:

PC Safety and Security - What Do I Need? from my friends at Tech Support Forum
and
COMPUTER SECURITY - a short guide to staying safer online from my friends at Malware Removal

I'd be grateful if you could reply to this post so that I know you have read it and, if you've no other questions, the thread can then be closed.

I Will Keep This Open For About Three Days, If Anything Comes Up - Just Come Back And Let Me Know, after that time you will have to send me a PM

My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->Posted Image<-- Don't worry every little bit helps.

Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#15 delldummy

delldummy
  • Topic Starter

  • Members
  • 10 posts
  • OFFLINE
  •  
  • Local time:01:01 PM

Posted 18 December 2010 - 04:15 PM

Hi Gringo,

Much thanks for your kind assistance. Your directions were simple and easy to understand. I will keep a watch on things over the next couple of days and let you know if anything suspicious happens, though I have to say this is the best this computer has ran in a long while.

Thanks again,

Ric




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users