Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Browser redirect and Generic 32 failure on audio


  • This topic is locked This topic is locked
14 replies to this topic

#1 SpeedyStone

SpeedyStone

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:09:07 AM

Posted 28 December 2010 - 07:48 AM

Pure Networks, I believe, is supposed to be part of MagicJack phone services. It used to start automatically, but now it isn't.

ALCXMNTR.EXE... I'm thinking might be virus related. SHOULD be a part of the Realtek Audio controller. But, if it gets shut down, within a minute or two, Explorer goes bad. Also, it shuts down the audio controller. Sometimes, it will randomly generate a Generic Host Processes error, which also disabled the audio controller. The controller is still listed in Device Manager as good, but audio is disabled in the control panel. The audio controller can be re enabled, though, by deinstalling and then reinstalling the controller via Device Manager.

Avast recently expired, but we had this before then. It shows 7 shields as disabled and it does not appear to be running in the Services list. I am guessing it is being disabled.

I told my fiance that I would work on this (and get help here), and one step was going to be to download and run SUPERAntiSpyware. She decided to ignore me and do it herself... got redirected to STOPzilla... and she ran that. I immediately stopped it and removed it... and then proceeded to cry for a few minutes. In the future, I intend to ignore her, piss her off, and do what I should have to begin with... harden her computer from future attack.

I have noticed the redirects seem to be random... but are far more likely (almost certain) to occur when searching for virus related assistance or terms. Sneaky little malware is redirecting, of course, to sites designed to make hacking the system even easier and more likely.

**
Any help that can be offered is greatly appreciated!!
**

Logs following....


DDS (Ver_10-12-12.02) - NTFSx86
Run by regina at 6:02:03.85 on Tue 12/28/2010
Internet Explorer: 8.0.6001.18702
Microsoft Windows XP Home Edition 5.1.2600.3.1252.1.1033.18.2302.1481 [GMT -6:00]

AV: avast! Antivirus *Enabled/Updated* {7591DB91-41F0-48A3-B128-1A293FD8233D}
AV: Microsoft Security Essentials *Enabled/Updated* {BCF43643-A118-4432-AEDE-D861FCBCFCDF}

============== Running Processes ===============

C:\WINDOWS\system32\nvsvc32.exe
C:\WINDOWS\system32\svchost -k DcomLaunch
svchost.exe
c:\Program Files\Microsoft Security Essentials\MsMpEng.exe
C:\WINDOWS\System32\svchost.exe -k netsvcs
svchost.exe
svchost.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\Microsoft Security Essentials\msseces.exe
C:\Program Files\Common Files\Pure Networks Shared\Platform\nmctxth.exe
C:\Program Files\Linksys\Linksys Wireless Manager\LinksysWirelessManager.exe
C:\WINDOWS\system32\RUNDLL32.EXE
C:\Program Files\Alwil Software\Avast5\avastUI.exe
C:\Program Files\Microsoft IntelliPoint\ipoint.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\SPYBOT\TeaTimer.exe
C:\Program Files\HP\Digital Imaging\bin\hpqtra08.exe
C:\WINDOWS\system32\spoolsv.exe
svchost.exe
C:\WINDOWS\system32\svchost.exe -k hpdevmgmt
C:\Program Files\Common Files\Pure Networks Shared\Platform\nmsrvc.exe
C:\Program Files\HP\Digital Imaging\bin\hpqSTE08.exe
C:\Program Files\FIREFOX\firefox.exe
C:\Program Files\FIREFOX\plugin-container.exe
C:\Documents and Settings\regina\Desktop\BLEEPING MALWARE PROGRAMS\dds.scr

============== Pseudo HJT Report ===============

uStart Page = hxxp://www.facebook.com/
mWinlogon: Userinit=userinit.exe
BHO: Adobe PDF Reader Link Helper: {06849e9f-c8d7-4d59-b87d-784b7d6be0b3} - c:\program files\common files\adobe\acrobat\activex\AcroIEHelper.dll
BHO: Spybot-S&D IE Protection: {53707962-6f74-2d53-2644-206d7942484f} - c:\progra~1\spybot\SDHelper.dll
BHO: Java™ Plug-In 2 SSV Helper: {dbc80044-a445-435b-bc74-9c25c1c588a9} - c:\program files\java\jre6\bin\jp2ssv.dll
uRun: [ctfmon.exe] c:\windows\system32\ctfmon.exe
uRun: [SpybotSD TeaTimer] c:\program files\spybot\TeaTimer.exe
mRun: [MSSE] "c:\program files\microsoft security essentials\msseces.exe" -hide -runkey
mRun: [nmctxth] "c:\program files\common files\pure networks shared\platform\nmctxth.exe"
mRun: [Linksys Wireless Manager] "c:\program files\linksys\linksys wireless manager\LinksysWirelessManager.exe" /cm /min /lcid 1033
mRun: [NvMediaCenter] RUNDLL32.EXE c:\windows\system32\NvMcTray.dll,NvTaskbarInit
mRun: [NvCplDaemon] RUNDLL32.EXE c:\windows\system32\NvCpl.dll,NvStartup
mRun: [nwiz] c:\program files\nvidia corporation\nview\nwiz.exe /installquiet
mRun: [avast5] "c:\program files\alwil software\avast5\avastUI.exe" /nogui
mRun: [SpybotSnD] "c:\program files\spybot\SpybotSD.exe"
mRun: [IntelliPoint] "c:\program files\microsoft intellipoint\ipoint.exe"
mRun: [AlcxMonitor] ALCXMNTR.EXE
dRun: [DWQueuedReporting] "c:\progra~1\common~1\micros~1\dw\dwtrig20.exe" -t
StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\hpdigi~1.lnk - c:\program files\hp\digital imaging\bin\hpqtra08.exe
IE: Add to Google Photos Screensa&ver - c:\windows\system32\GPhotos.scr/200
IE: {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe
IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe
IE: {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - {53707962-6F74-2D53-2644-206D7942484F} - c:\progra~1\spybot\SDHelper.dll
DPF: {6F15128C-E66A-490C-B848-5000B5ABEEAC} - hxxps://h20436.www2.hp.com/ediags/dex/secure/HPDEXAXO.cab
DPF: {E2883E8F-472F-4FB0-9522-AC9BF37916A7} - hxxp://platformdl.adobe.com/NOS/getPlusPlus/1.6/gp.cab
Handler: pure-go - {4746C79A-2042-4332-8650-48966E44ABA8} - c:\program files\common files\pure networks shared\platform\puresp4.dll
SSODL: WPDShServiceObj - {AAA288BA-9A4C-45B0-95D7-94D524869DB5} - c:\windows\system32\WPDShServiceObj.dll

================= FIREFOX ===================

FF - ProfilePath - c:\docume~1\regina\applic~1\mozilla\firefox\profiles\0f3gs7ym.default\
FF - plugin: c:\documents and settings\regina\local settings\application data\google\update\1.2.183.39\npGoogleOneClick8.dll
FF - plugin: c:\program files\firefox\plugins\npdeployJava1.dll
FF - plugin: c:\program files\google\picasa3\npPicasa3.dll
FF - plugin: c:\program files\google\update\1.2.183.39\npGoogleOneClick8.dll
FF - Ext: Default: {972ce4c6-7e08-4474-a285-3208198ce6fd} - c:\program files\firefox\extensions\{972ce4c6-7e08-4474-a285-3208198ce6fd}

============= SERVICES / DRIVERS ===============

R1 aswSP;aswSP;c:\windows\system32\drivers\aswSP.sys [2010-11-22 165584]
R1 MpFilter;Microsoft Malware Protection Driver;c:\windows\system32\drivers\MpFilter.sys [2010-3-25 151216]
R2 aswFsBlk;aswFsBlk;c:\windows\system32\drivers\aswFsBlk.sys [2010-11-22 17744]
R3 WUSB54GCv3;Compact Wireless-G USB Network Adapter;c:\windows\system32\drivers\WUSB54GCv3.sys [2010-11-22 627072]
S2 avast! Antivirus;avast! Antivirus;c:\program files\alwil software\avast5\AvastSvc.exe [2010-11-22 40384]
S3 avast! Mail Scanner;avast! Mail Scanner;c:\program files\alwil software\avast5\AvastSvc.exe [2010-11-22 40384]
S3 avast! Web Scanner;avast! Web Scanner;c:\program files\alwil software\avast5\AvastSvc.exe [2010-11-22 40384]

=============== Created Last 30 ================

2010-12-28 03:56:46 6273872 ----a-w- c:\docume~1\alluse~1\applic~1\microsoft\microsoft antimalware\definition updates\{bf6e25d3-363b-43f5-aa8b-f59e19075980}\mpengine.dll
2010-12-28 03:55:45 -------- d-----w- c:\windows\system32\wbem\repository\FS
2010-12-28 03:55:45 -------- d-----w- c:\windows\system32\wbem\Repository
2010-12-28 03:54:19 -------- d-----w- c:\program files\bfgclient
2010-12-28 03:53:39 -------- d--h--w- c:\windows\msdownld.tmp
2010-12-28 03:51:49 -------- d-----w- c:\program files\JRE
2010-12-28 01:32:57 -------- d-----w- c:\docume~1\regina\applic~1\SUPERAntiSpyware.com
2010-12-28 01:26:48 -------- d-----w- c:\program files\SUPERAntiSpyware
2010-12-27 23:38:26 -------- d-----w- c:\docume~1\alluse~1\applic~1\STOPzilla!
2010-12-25 23:37:20 -------- d-----w- c:\docume~1\alluse~1\applic~1\MysteryChronicles
2010-12-25 17:00:46 -------- d-----w- c:\windows\pss
2010-12-24 23:27:52 -------- d-----w- c:\docume~1\regina\applic~1\Big Fish Games
2010-12-24 23:25:12 -------- d-----w- c:\program files\Mystery Chronicles - Murder Among Friends
2010-12-24 23:21:06 -------- d-----w- c:\program files\Mystery Case Files - Dire Grove
2010-12-24 23:20:29 -------- d-----w- c:\docume~1\alluse~1\applic~1\BigFishGamesCache
2010-12-20 03:59:53 -------- d-----w- c:\docume~1\regina\applic~1\My Games
2010-12-20 03:57:58 4379984 ----a-w- c:\windows\system32\D3DX9_40.dll
2010-12-20 03:54:24 -------- d-----w- c:\windows\Logs
2010-12-20 02:58:02 -------- d-----w- c:\program files\Firaxis Games
2010-12-20 02:47:50 -------- d-----w- c:\program files\EVEREST
2010-12-16 04:53:28 -------- d-----w- c:\docume~1\regina\applic~1\OpenOffice.org
2010-12-16 04:50:32 -------- d-----w- c:\program files\OpenOffice.org 3
2010-12-16 04:50:04 411368 ----a-w- c:\windows\system32\deployJava1.dll
2010-12-16 04:37:21 -------- d-----w- c:\program files\OPEN OFFICE
2010-12-16 02:55:32 40960 -c----w- c:\windows\system32\dllcache\ndproxy.sys
2010-12-16 02:55:14 45568 -c----w- c:\windows\system32\dllcache\wab.exe

==================== Find3M ====================

2010-11-26 04:58:57 14267896 ----a-w- c:\program files\picasa38-setup.exe
2010-11-22 21:34:42 241428 ----a-w- c:\windows\system32\nvdrsdb1.bin
2010-11-22 21:34:42 241428 ----a-w- c:\windows\system32\nvdrsdb0.bin
2010-11-22 21:34:42 1 ----a-w- c:\windows\system32\nvdrssel.bin
2010-11-18 18:12:44 81920 ----a-w- c:\windows\system32\isign32.dll
2010-11-12 18:46:58 4280320 ----a-w- c:\windows\system32\GPhotos.scr
2010-11-06 00:26:58 916480 ----a-w- c:\windows\system32\wininet.dll
2010-11-06 00:26:58 43520 ----a-w- c:\windows\system32\licmgr10.dll
2010-11-06 00:26:58 1469440 ----a-w- c:\windows\system32\inetcpl.cpl
2010-11-03 12:25:54 385024 ----a-w- c:\windows\system32\html.iec
2010-10-28 13:13:22 290048 ----a-w- c:\windows\system32\atmfd.dll
2010-10-26 13:25:00 1853312 ----a-w- c:\windows\system32\win32k.sys
2010-10-19 20:51:33 222080 ------w- c:\windows\system32\MpSigStub.exe
2010-10-16 18:55:00 888424 ----a-w- c:\windows\system32\nvdispco32.dll
2010-10-16 18:55:00 813672 ----a-w- c:\windows\system32\nvgenco32.dll
2010-10-16 18:55:00 6359552 ----a-w- c:\windows\system32\nv4_disp.dll
2010-10-16 18:55:00 61440 ----a-w- c:\windows\system32\OpenCL.dll
2010-10-16 18:55:00 4882432 ----a-w- c:\windows\system32\nvcuda.dll
2010-10-16 18:55:00 2932840 ----a-w- c:\windows\system32\nvcuvid.dll
2010-10-16 18:55:00 2666600 ----a-w- c:\windows\system32\nvcuvenc.dll
2010-10-16 18:55:00 2293194 ----a-w- c:\windows\system32\nvdata.bin
2010-10-16 18:55:00 1462272 ----a-w- c:\windows\system32\nvapi.dll
2010-10-16 18:55:00 14532608 ----a-w- c:\windows\system32\nvoglnt.dll
2010-10-16 18:55:00 13012992 ----a-w- c:\windows\system32\nvcompiler.dll
2010-10-16 18:04:22 81920 ----a-w- c:\windows\system32\nvwddi.dll
2010-10-16 18:04:16 277608 ----a-w- c:\windows\system32\nvmccs.dll
2010-10-16 18:04:16 13851752 ----a-w- c:\windows\system32\nvcpl.dll
2010-10-16 18:04:16 110696 ----a-w- c:\windows\system32\nvmctray.dll
2010-10-16 18:04:14 156776 ----a-w- c:\windows\system32\nvsvc32.exe
2010-10-16 18:04:14 145000 ----a-w- c:\windows\system32\nvcolor.exe

=================== ROOTKIT ====================

Stealth MBR rootkit/Mebroot/Sinowal/TDL4 detector 0.4.2 by Gmer, http://www.gmer.net
Windows 5.1.2600 Disk: WDC_WD1600JB-00GVA0 rev.08.02D08 -> Harddisk0\DR0 -> \Device\Ide\IdePort0 P0T0L0-3

device: opened successfully
user: MBR read successfully

Disk trace:
called modules: ntkrnlpa.exe CLASSPNP.SYS disk.sys ACPI.sys hal.dll >>UNKNOWN [0x8A7AB555]<<
_asm { PUSH EBP; MOV EBP, ESP; PUSH ECX; MOV EAX, [EBP+0x8]; CMP EAX, [0x8a7b17b0]; MOV EAX, [0x8a7b182c]; PUSH EBX; PUSH ESI; MOV ESI, [EBP+0xc]; MOV EBX, [ESI+0x60]; PUSH EDI; JNZ 0x20; MOV [EBP+0x8], EAX; }
1 ntkrnlpa!IofCallDriver[0x804EE130] -> \Device\Harddisk0\DR0[0x8A7C2AB8]
3 CLASSPNP[0xB8108FD7] -> ntkrnlpa!IofCallDriver[0x804EE130] -> \Device\0000005b[0x8A7C5F18]
5 ACPI[0xB7F7F620] -> ntkrnlpa!IofCallDriver[0x804EE130] -> [0x8A76CD98]
\Driver\atapi[0x8A795958] -> IRP_MJ_CREATE -> 0x8A7AB555
kernel: MBR read successfully
_asm { XOR AX, AX; MOV SS, AX; MOV SP, 0x7c00; STI ; PUSH AX; POP ES; PUSH AX; POP DS; CLD ; MOV SI, 0x7c1b; MOV DI, 0x61b; PUSH AX; PUSH DI; MOV CX, 0x1e5; REP MOVSB ; RETF ; MOV BP, 0x7be; MOV CL, 0x4; CMP [BP+0x0], CH; JL 0x2e; JNZ 0x3a; }
detected disk devices:
\Device\Ide\IdeDeviceP0T0L0-3 -> \??\IDE#DiskWDC_WD1600JB-00GVA0_____________________08.02D08#5&47d9b4e&0&0.0.0#{53f56307-b6bf-11d0-94f2-00a0c91efb8b} device not found
detected hooks:
\Driver\atapi DriverStartIo -> 0x8A7AB39B
user & kernel MBR OK
Warning: possible TDL3 rootkit infection !

============= FINISH: 6:03:46.95 ===============

Attached Files



BC AdBot (Login to Remove)

 


#2 B-boy/StyLe/

B-boy/StyLe/

    Bleepin' Freestyler


  • Malware Response Team
  • 8,307 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Bulgaria
  • Local time:06:07 PM

Posted 03 January 2011 - 04:12 PM

Hello and welcome to Bleeping Computer :welcome:

We apologize for the delay in responding to your request for help. Here at Bleeping Computer we get overwhelmed at times, and we are trying our best to keep up. Please note that your topic was not intentionally overlooked. Our mission is to help everyone in need, but sometimes it takes just a little longer to get to every request for help. No one is ignored here.

If you have since resolved the original problem you were having, we would appreciate you letting us know. If not please perform the following steps below so we can have a look at the current condition of your machine.

If you have not done so, include a clear description of the problems you're having, along with any steps you may have performed so far.

Upon completing the steps below another staff member will review your topic an do their best to resolve your issues.

If you have already posted a DDS log, please do so again, as your situation may have changed.
Use the 'Add Reply' and add the new log to this thread.

Thanks and again sorry for the delay.

We need to see some information about what is happening in your machine. Please perform the following scan:
  • Download DDS by sUBs from one of the following links. Save it to your desktop.
  • Double click on the DDS icon, allow it to run.
  • A small box will open, with an explaination about the tool. No input is needed, the scan is running.
  • Notepad will open with the results.
  • Follow the instructions that pop up for posting the results.
  • Close the program window, and delete the program from your desktop.
Please note: You may have to disable any script protection running if the scan fails to run. After downloading the tool, disconnect from the internet and disable all antivirus protection. Run the scan, enable your A/V and reconnect to the internet.

Information on A/V control HERE

We also need a new log from the GMER anti-rootkit scanner. Please first disable any CD emulation programs using the steps found in this topic:

Why we request you disable CD Emulation when receiving Malware Removal Advice

Then create another GMER log and post it as an attachment to the reply where you post your new DDS log. Instructions on how to properly create a GMER log can be found here:

How to create a GMER log



If the system has been used after topic creation time we need to take a look at fresh logs. So, please post fresh copies of dds.txt & attach.txt logs.


Regards,
Georgi :hello:

cXfZ4wS.png


#3 SpeedyStone

SpeedyStone
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:09:07 AM

Posted 04 January 2011 - 04:27 PM

I've attached the GMER and other files. The DDS log is below. I hope I didn't mess up, but I also ran TDSSKiller. I thought I ran it so that it would only generate a report, but it showed it found a root kit infection and says it will clean it on reboot. The report is attached, as well. I haven't rebooted yet... so if something needs to be changed, hopefully, it can be.

Thanks for the help!!!



====================


DDS (Ver_10-12-12.02) - NTFSx86
Run by regina at 11:54:54.64 on Tue 01/04/2011
Internet Explorer: 8.0.6001.18702
Microsoft Windows XP Home Edition 5.1.2600.3.1252.1.1033.18.2302.1833 [GMT -6:00]

AV: avast! Antivirus *Enabled/Updated* {7591DB91-41F0-48A3-B128-1A293FD8233D}
AV: Microsoft Security Essentials *Disabled/Outdated* {BCF43643-A118-4432-AEDE-D861FCBCFCDF}

============== Running Processes ===============

C:\WINDOWS\system32\svchost -k DcomLaunch
svchost.exe
C:\WINDOWS\System32\svchost.exe -k netsvcs
svchost.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\RUNDLL32.EXE
C:\Program Files\Alwil Software\Avast5\avastUI.exe
C:\Program Files\Microsoft IntelliPoint\ipoint.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\system32\ctfmon.exe
C:\WINDOWS\system32\wuauclt.exe
C:\WINDOWS\system32\wuauclt.exe
C:\WINDOWS\system32\taskmgr.exe
C:\Documents and Settings\regina\Application Data\U3\01653009D7527CBA\LaunchPad.exe
C:\Documents and Settings\regina\Desktop\BLEEPING_MALWARE_PROGRAMS\dds.scr

============== Pseudo HJT Report ===============

uStart Page = hxxp://www.facebook.com/
mWinlogon: Userinit=userinit.exe
BHO: Adobe PDF Reader Link Helper: {06849e9f-c8d7-4d59-b87d-784b7d6be0b3} - c:\program files\common files\adobe\acrobat\activex\AcroIEHelper.dll
BHO: Spybot-S&D IE Protection: {53707962-6f74-2d53-2644-206d7942484f} - c:\progra~1\spybot\SDHelper.dll
BHO: Java™ Plug-In 2 SSV Helper: {dbc80044-a445-435b-bc74-9c25c1c588a9} - c:\program files\java\jre6\bin\jp2ssv.dll
uRun: [ctfmon.exe] c:\windows\system32\ctfmon.exe
uRun: [SpybotSD TeaTimer] c:\program files\spybot\TeaTimer.exe
mRun: [MSSE] "c:\program files\microsoft security essentials\msseces.exe" -hide -runkey
mRun: [nmctxth] "c:\program files\common files\pure networks shared\platform\nmctxth.exe"
mRun: [Linksys Wireless Manager] "c:\program files\linksys\linksys wireless manager\LinksysWirelessManager.exe" /cm /min /lcid 1033
mRun: [NvMediaCenter] RUNDLL32.EXE c:\windows\system32\NvMcTray.dll,NvTaskbarInit
mRun: [NvCplDaemon] RUNDLL32.EXE c:\windows\system32\NvCpl.dll,NvStartup
mRun: [nwiz] c:\program files\nvidia corporation\nview\nwiz.exe /installquiet
mRun: [avast5] "c:\program files\alwil software\avast5\avastUI.exe" /nogui
mRun: [SpybotSnD] "c:\program files\spybot\SpybotSD.exe"
mRun: [IntelliPoint] "c:\program files\microsoft intellipoint\ipoint.exe"
mRun: [AlcxMonitor] ALCXMNTR.EXE
dRun: [DWQueuedReporting] "c:\progra~1\common~1\micros~1\dw\dwtrig20.exe" -t
StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\hpdigi~1.lnk - c:\program files\hp\digital imaging\bin\hpqtra08.exe
IE: Add to Google Photos Screensa&ver - c:\windows\system32\GPhotos.scr/200
IE: {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe
IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe
IE: {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - {53707962-6F74-2D53-2644-206D7942484F} - c:\progra~1\spybot\SDHelper.dll
DPF: {6F15128C-E66A-490C-B848-5000B5ABEEAC} - hxxps://h20436.www2.hp.com/ediags/dex/secure/HPDEXAXO.cab
DPF: {E2883E8F-472F-4FB0-9522-AC9BF37916A7} - hxxp://platformdl.adobe.com/NOS/getPlusPlus/1.6/gp.cab
Handler: pure-go - {4746C79A-2042-4332-8650-48966E44ABA8} - c:\program files\common files\pure networks shared\platform\puresp4.dll
SSODL: WPDShServiceObj - {AAA288BA-9A4C-45B0-95D7-94D524869DB5} - c:\windows\system32\WPDShServiceObj.dll

================= FIREFOX ===================

FF - ProfilePath - c:\docume~1\regina\applic~1\mozilla\firefox\profiles\0f3gs7ym.default\
FF - plugin: c:\documents and settings\regina\local settings\application data\google\update\1.2.183.39\npGoogleOneClick8.dll
FF - plugin: c:\program files\firefox\plugins\npdeployJava1.dll
FF - plugin: c:\program files\google\picasa3\npPicasa3.dll
FF - plugin: c:\program files\google\update\1.2.183.39\npGoogleOneClick8.dll
FF - Ext: Default: {972ce4c6-7e08-4474-a285-3208198ce6fd} - c:\program files\firefox\extensions\{972ce4c6-7e08-4474-a285-3208198ce6fd}

============= SERVICES / DRIVERS ===============

R1 aswSP;aswSP;c:\windows\system32\drivers\aswSP.sys [2010-11-22 165584]
R1 MpFilter;Microsoft Malware Protection Driver;c:\windows\system32\drivers\MpFilter.sys [2010-3-25 151216]
R2 aswFsBlk;aswFsBlk;c:\windows\system32\drivers\aswFsBlk.sys [2010-11-22 17744]
S2 avast! Antivirus;avast! Antivirus;c:\program files\alwil software\avast5\AvastSvc.exe [2010-11-22 40384]
S3 avast! Mail Scanner;avast! Mail Scanner;c:\program files\alwil software\avast5\AvastSvc.exe [2010-11-22 40384]
S3 avast! Web Scanner;avast! Web Scanner;c:\program files\alwil software\avast5\AvastSvc.exe [2010-11-22 40384]
S3 WUSB54GCv3;Compact Wireless-G USB Network Adapter;c:\windows\system32\drivers\WUSB54GCv3.sys [2010-11-22 627072]

=============== Created Last 30 ================

2011-01-04 17:52:02 -------- d-----w- c:\program files\ZONEALARM
2011-01-01 21:37:13 -------- d-----w- c:\docume~1\regina\applic~1\funkitron
2011-01-01 00:07:09 -------- d-----w- c:\docume~1\alluse~1\applic~1\MumboJumbo
2011-01-01 00:06:22 -------- d-----w- c:\program files\MumboJumbo
2010-12-31 21:55:45 -------- d-----w- c:\docume~1\alluse~1\applic~1\PopCap Games
2010-12-31 21:54:35 -------- d-----w- c:\program files\PopCap Games
2010-12-28 03:56:46 6273872 ----a-w- c:\docume~1\alluse~1\applic~1\microsoft\microsoft antimalware\definition updates\{bf6e25d3-363b-43f5-aa8b-f59e19075980}\mpengine.dll
2010-12-28 03:55:45 -------- d-----w- c:\windows\system32\wbem\repository\FS
2010-12-28 03:55:45 -------- d-----w- c:\windows\system32\wbem\Repository
2010-12-28 03:54:19 -------- d-----w- c:\program files\bfgclient
2010-12-28 03:53:39 -------- d--h--w- c:\windows\msdownld.tmp
2010-12-28 03:51:49 -------- d-----w- c:\program files\JRE
2010-12-28 01:32:57 -------- d-----w- c:\docume~1\regina\applic~1\SUPERAntiSpyware.com
2010-12-28 01:26:48 -------- d-----w- c:\program files\SUPERAntiSpyware
2010-12-27 23:38:26 -------- d-----w- c:\docume~1\alluse~1\applic~1\STOPzilla!
2010-12-25 23:37:20 -------- d-----w- c:\docume~1\alluse~1\applic~1\MysteryChronicles
2010-12-25 17:00:46 -------- d-----w- c:\windows\pss
2010-12-24 23:27:52 -------- d-----w- c:\docume~1\regina\applic~1\Big Fish Games
2010-12-24 23:25:12 -------- d-----w- c:\program files\Mystery Chronicles - Murder Among Friends
2010-12-24 23:21:06 -------- d-----w- c:\program files\Mystery Case Files - Dire Grove
2010-12-24 23:20:29 -------- d-----w- c:\docume~1\alluse~1\applic~1\BigFishGamesCache
2010-12-20 03:59:53 -------- d-----w- c:\docume~1\regina\applic~1\My Games
2010-12-20 03:57:58 4379984 ----a-w- c:\windows\system32\D3DX9_40.dll
2010-12-20 03:54:24 -------- d-----w- c:\windows\Logs
2010-12-20 02:58:02 -------- d-----w- c:\program files\Firaxis Games
2010-12-20 02:47:50 -------- d-----w- c:\program files\EVEREST
2010-12-16 04:53:28 -------- d-----w- c:\docume~1\regina\applic~1\OpenOffice.org
2010-12-16 04:50:32 -------- d-----w- c:\program files\OpenOffice.org 3
2010-12-16 04:50:04 411368 ----a-w- c:\windows\system32\deployJava1.dll
2010-12-16 04:37:21 -------- d-----w- c:\program files\OPEN OFFICE
2010-12-16 02:55:32 40960 -c----w- c:\windows\system32\dllcache\ndproxy.sys
2010-12-16 02:55:14 45568 -c----w- c:\windows\system32\dllcache\wab.exe

==================== Find3M ====================

2010-11-26 04:58:57 14267896 ----a-w- c:\program files\picasa38-setup.exe
2010-11-22 21:34:42 241428 ----a-w- c:\windows\system32\nvdrsdb1.bin
2010-11-22 21:34:42 241428 ----a-w- c:\windows\system32\nvdrsdb0.bin
2010-11-22 21:34:42 1 ----a-w- c:\windows\system32\nvdrssel.bin
2010-11-18 18:12:44 81920 ----a-w- c:\windows\system32\isign32.dll
2010-11-12 18:46:58 4280320 ----a-w- c:\windows\system32\GPhotos.scr
2010-11-06 00:26:58 916480 ----a-w- c:\windows\system32\wininet.dll
2010-11-06 00:26:58 43520 ----a-w- c:\windows\system32\licmgr10.dll
2010-11-06 00:26:58 1469440 ----a-w- c:\windows\system32\inetcpl.cpl
2010-11-03 12:25:54 385024 ----a-w- c:\windows\system32\html.iec
2010-10-28 13:13:22 290048 ----a-w- c:\windows\system32\atmfd.dll
2010-10-26 13:25:00 1853312 ----a-w- c:\windows\system32\win32k.sys
2010-10-19 20:51:33 222080 ------w- c:\windows\system32\MpSigStub.exe
2010-10-16 18:55:00 888424 ----a-w- c:\windows\system32\nvdispco32.dll
2010-10-16 18:55:00 813672 ----a-w- c:\windows\system32\nvgenco32.dll
2010-10-16 18:55:00 6359552 ----a-w- c:\windows\system32\nv4_disp.dll
2010-10-16 18:55:00 61440 ----a-w- c:\windows\system32\OpenCL.dll
2010-10-16 18:55:00 4882432 ----a-w- c:\windows\system32\nvcuda.dll
2010-10-16 18:55:00 2932840 ----a-w- c:\windows\system32\nvcuvid.dll
2010-10-16 18:55:00 2666600 ----a-w- c:\windows\system32\nvcuvenc.dll
2010-10-16 18:55:00 2293194 ----a-w- c:\windows\system32\nvdata.bin
2010-10-16 18:55:00 1462272 ----a-w- c:\windows\system32\nvapi.dll
2010-10-16 18:55:00 14532608 ----a-w- c:\windows\system32\nvoglnt.dll
2010-10-16 18:55:00 13012992 ----a-w- c:\windows\system32\nvcompiler.dll
2010-10-16 18:04:22 81920 ----a-w- c:\windows\system32\nvwddi.dll
2010-10-16 18:04:16 277608 ----a-w- c:\windows\system32\nvmccs.dll
2010-10-16 18:04:16 13851752 ----a-w- c:\windows\system32\nvcpl.dll
2010-10-16 18:04:16 110696 ----a-w- c:\windows\system32\nvmctray.dll
2010-10-16 18:04:14 156776 ----a-w- c:\windows\system32\nvsvc32.exe
2010-10-16 18:04:14 145000 ----a-w- c:\windows\system32\nvcolor.exe

=================== ROOTKIT ====================

Stealth MBR rootkit/Mebroot/Sinowal/TDL4 detector 0.4.2 by Gmer, http://www.gmer.net
Windows 5.1.2600 Disk: WDC_WD1600JB-00GVA0 rev.08.02D08 -> Harddisk0\DR0 -> \Device\Ide\IdePort0 P0T0L0-3

device: opened successfully
user: MBR read successfully

Disk trace:
called modules: ntkrnlpa.exe CLASSPNP.SYS disk.sys ACPI.sys hal.dll >>UNKNOWN [0x8A7AB555]<<
_asm { PUSH EBP; MOV EBP, ESP; PUSH ECX; MOV EAX, [EBP+0x8]; CMP EAX, [0x8a7b17b0]; MOV EAX, [0x8a7b182c]; PUSH EBX; PUSH ESI; MOV ESI, [EBP+0xc]; MOV EBX, [ESI+0x60]; PUSH EDI; JNZ 0x20; MOV [EBP+0x8], EAX; }
1 ntkrnlpa!IofCallDriver[0x804EE130] -> \Device\Harddisk0\DR0[0x8A7C2AB8]
3 CLASSPNP[0xB8108FD7] -> ntkrnlpa!IofCallDriver[0x804EE130] -> \Device\0000005b[0x8A7C5F18]
5 ACPI[0xB7F7F620] -> ntkrnlpa!IofCallDriver[0x804EE130] -> [0x8A76CD98]
\Driver\atapi[0x8A795958] -> IRP_MJ_CREATE -> 0x8A7AB555
kernel: MBR read successfully
_asm { XOR AX, AX; MOV SS, AX; MOV SP, 0x7c00; STI ; PUSH AX; POP ES; PUSH AX; POP DS; CLD ; MOV SI, 0x7c1b; MOV DI, 0x61b; PUSH AX; PUSH DI; MOV CX, 0x1e5; REP MOVSB ; RETF ; MOV BP, 0x7be; MOV CL, 0x4; CMP [BP+0x0], CH; JL 0x2e; JNZ 0x3a; }
detected disk devices:
\Device\Ide\IdeDeviceP0T0L0-3 -> \??\IDE#DiskWDC_WD1600JB-00GVA0_____________________08.02D08#5&47d9b4e&0&0.0.0#{53f56307-b6bf-11d0-94f2-00a0c91efb8b} device not found
detected hooks:
\Driver\atapi DriverStartIo -> 0x8A7AB39B
user & kernel MBR OK
Warning: possible TDL3 rootkit infection !

============= FINISH: 11:56:23.39 ===============

Attached Files



#4 CatByte

CatByte

    bleepin' tiger


  • Malware Response Team
  • 14,664 posts
  • OFFLINE
  •  
  • Gender:Not Telling
  • Location:Canada
  • Local time:11:07 AM

Posted 04 January 2011 - 08:54 PM

Hi,

Go ahead and reboot and let TDSSKiller clean up that rootkit,

then run the following:

Download ComboFix from either of these locations:
Link 1
Link 2


VERY IMPORTANT !!!
Save ComboFix.exe to your Desktop

* IMPORTANT - Disable your AntiVirus and AntiSpyware applications, usually via a right click on the System Tray icon. They may otherwise interfere with our tools. If you have difficulty properly disabling your protective programs, refer to this link here
  • Double click on ComboFix.exe & follow the prompts.
As part of it's process, ComboFix will check to see if the Microsoft Windows Recovery Console is installed. With malware infections being as they are today, it's strongly recommended to have this pre-installed on your machine before doing any malware removal. It will allow you to boot up into a special recovery/repair mode that will allow us to more easily help you should your computer have a problem after an attempted removal of malware.

  • Follow the prompts to allow ComboFix to download and install the Microsoft Windows Recovery Console, and when prompted, agree to the End-User License Agreement to install the Microsoft Windows Recovery Console.
**Please note: If the Microsoft Windows Recovery Console is already installed, ComboFix will continue it's malware removal procedures.

Posted Image

  • Once the Microsoft Windows Recovery Console is installed using ComboFix, you should see the following message:

Posted Image

  • Click on Yes, to continue scanning for malware.
When finished, it shall produce a log for you. Please include the C:\ComboFix.txt in your next reply.
Notes:
1. Do not mouse-click Combofix's window while it is running. That may cause it to stall.
2. Do not "re-run" Combofix. If you have a problem, reply back for further instructions.



Please make sure you include the combo fix log in your next reply as well as describe how your computer is running now

Microsoft MVP - 2010, 2011, 2012, 2013, 2014, 2015


#5 SpeedyStone

SpeedyStone
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:09:07 AM

Posted 05 January 2011 - 06:30 PM

It seems to be working better now. I tested IE and Firefox by trying to go to SpyBot. It got there repeatedly, which was not the case before. No redirects at all. Avast still is not starting up, but Microsoft Security Essentials seems to be working good now. So, I think it's getting there.

Thanks for the help.... the ComboFix is attached. It does report finding rootkit activity. So... let me know what's the next step.


Thanks!!

Attached Files



#6 SpeedyStone

SpeedyStone
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:09:07 AM

Posted 05 January 2011 - 06:56 PM

I just noticed a new directory under Program Files. It's called QooBox. It looks like it's related to ComboFix, but I'm not sure. Can you confirm that? One other question... Avast still isn't working properly. Should I reinstall it?

Thanks so much!!

#7 CatByte

CatByte

    bleepin' tiger


  • Malware Response Team
  • 14,664 posts
  • OFFLINE
  •  
  • Gender:Not Telling
  • Location:Canada
  • Local time:11:07 AM

Posted 05 January 2011 - 08:03 PM

Hi,

Yes, uninstall Avast completely. You have two antivirus programs installed. More than one can cause system slow downs, conflicts and crashes.

Please do the following:

  • Please open your MalwareBytes AntiMalware Program
  • Click the Update Tab and search for updates
  • If an update is found, it will download and install the latest version.
  • Once the program has loaded, select "Perform Quick Scan", then click Scan.
  • The scan may take some time to finish, so please be patient.
  • When the scan is complete, click OK, then Show Results to view the results.
  • Make sure that everything is checked, and click Remove Selected. <-- very important
  • When disinfection is completed, a log will open in Notepad and you may be prompted to Restart. (See Extra Note)
  • The log is automatically saved by MBAM and can be viewed by clicking the Logs tab in MBAM.
  • Copy&Paste the entire report in your next reply.

Extra Note:If MBAM encounters a file that is difficult to remove, you will be presented with 1 of 2 prompts, click OK to either and let MBAM proceed with the disinfection process, if asked to restart the computer, please do so immediately.



NEXT


Go here to run an online scanner from ESET.
  • Note: You will need to use Internet explorer for this scan
  • Turn off the real time scanner of any existing antivirus program while performing the online scan
  • Tick the box next to YES, I accept the Terms of Use.
  • Click Start
  • When asked, allow the activeX control to install
  • Click Start
  • Make sure that the option Remove found threats is unticked and the Scan Archives option is ticked.
  • Click on Advanced Settings, ensure the options Scan for potentially unwanted applications, Scan for potentially unsafe applications, and Enable Anti-Stealth Technology are ticked.
  • Click Scan
  • Wait for the scan to finish
  • When the scan completes, press the LIST OF THREATS FOUND button
  • Press EXPORT TO TEXT FILE , name the file ESETSCAN and save it to your desktop
  • Include the contents of this report in your next reply.
  • Press the BACK button.
  • Press Finish

Edited by CatByte, 05 January 2011 - 08:16 PM.

Microsoft MVP - 2010, 2011, 2012, 2013, 2014, 2015


#8 SpeedyStone

SpeedyStone
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:09:07 AM

Posted 05 January 2011 - 10:09 PM

I've attached a copy of the MalWareBytes log. It ran clean on quick, so I ran it again on full... also clean. To run ESET online scanner, it is asking to install OnlineScanner.cab Should I install it... and can it be removed once installed?

Thanks!!

Attached Files



#9 CatByte

CatByte

    bleepin' tiger


  • Malware Response Team
  • 14,664 posts
  • OFFLINE
  •  
  • Gender:Not Telling
  • Location:Canada
  • Local time:11:07 AM

Posted 05 January 2011 - 11:30 PM

Yes, go ahead and install the ESET files, there is a checkbox that is checked by default to uninstall all files once the scan is complete.

Microsoft MVP - 2010, 2011, 2012, 2013, 2014, 2015


#10 SpeedyStone

SpeedyStone
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:09:07 AM

Posted 06 January 2011 - 06:35 AM

The scan finished, but did not give me an option to save a file or list threats found. Probably because it showed no threats were found. So, does this mean the system is clean now?

#11 CatByte

CatByte

    bleepin' tiger


  • Malware Response Team
  • 14,664 posts
  • OFFLINE
  •  
  • Gender:Not Telling
  • Location:Canada
  • Local time:11:07 AM

Posted 06 January 2011 - 10:12 PM

Hi

Please do the following:

Please download and install the latest Java

http://java.com/en/download/index.jsp



NEXT



Visit ADOBEand download the latest version of Acrobat Reader (version X)
Having the latest updates ensures there are no security vulnerabilities in your system.


NEXT


Please post a fresh DDS log and advise how your computer is running now and if there are any outstanding issues.

Microsoft MVP - 2010, 2011, 2012, 2013, 2014, 2015


#12 SpeedyStone

SpeedyStone
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:09:07 AM

Posted 07 January 2011 - 09:56 AM

Seems to be working nicely... I've attached the DDS log.

My one concern is, in the attach.txt log, there's is an installed program listed as "PSSWCORE". It does not show up in Add/Remove Programs. Just from the name... it doesn't sound like something inviting. Do you have any ideas what it would be... and if I need to try to get rid of it?

I found entries in the Registry that references it...

HKEY_CLASSES_ROOT\Installer\Products\CDD2E27F8BD309142AD13688D359F57E
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\CDD2E27F8BD309142AD13688D359F57E

Under this is...
HKEY_CLASSES_ROOT\Installer\Products\CDD2E27F8BD309142AD13688D359F57E\SourceList\Net
1 == REG_EXPAND_SZ = C:\DOCUME~1\regina\LOCALS~1\Temp\7zS2449\setup\HPPhotoSmartCore\

The directory "7zS2449" does not exist. The package name is PSSWCORE.msi

It appears, based on Google searches, to be part of the HP drivers for their printers. But, that's a really stupid name then... at least to me... as PSSW seems a lot like abbreviation for "password" to me. If I was going to write malware, I don't suppose I'd name part of it something as obvious as "MALWARE FILE"... but then, if I was making a printer driver for a major manufacturer, I don't think I'd call it that either. Hopefully, I'm just being paranoid. (says the guy that, hopefully, just got rid of a rootkit virus)


Thanks!!!

Attached Files



#13 CatByte

CatByte

    bleepin' tiger


  • Malware Response Team
  • 14,664 posts
  • OFFLINE
  •  
  • Gender:Not Telling
  • Location:Canada
  • Local time:11:07 AM

Posted 07 January 2011 - 01:33 PM

Hi,

Yes that is legitimate HP Software,they do seem to select strange sounding names that doesn't seem to relate to the program itself, but the names must make sense to the programmers i suppose. Fortunately google is a wealth of information.

You apprear to be clean, just some housekeeping to do now, please do the following?

You can delete the DDS and GMER logs and programs from your desktop.


NEXT


Follow these steps to uninstall Combofix

  • Make sure your security programs are totally disabled.
  • Click START then RUN
  • Now copy/paste Combofix /uninstall into the runbox and click OK. Note the space between the ..X and the /U, it needs to be there.

Posted Image


If there are any logs/tools remaining on your desktop > right click and delete them.


NEXT


Below I have included a number of recommendations for how to protect your computer against malware infections.

  • It is good security practice to change your passwords to all your online accounts on a fairly regular basis, this is especially true after an infection. Refer to this Microsoft article
    Strong passwords: How to create and use them
    Then consider a password keeper, to keep all your passwords safe.

  • Keep Windows updated by regularly checking their website at :
    http://windowsupdate.microsoft.com/
    This will ensure your computer has always the latest security updates available installed on your computer.

  • Make Internet Explorer more secure
    • Click Start > Run
    • Type Inetcpl.cpl & click OK
    • Click on the Security tab
    • Click Reset all zones to default level
    • Make sure the Internet Zone is selected & Click Custom level
    • In the ActiveX section, set the first two options ("Download signed and unsigned ActiveX controls) to "Prompt", and ("Initialize and Script ActiveX controls not marked as safe") to "Disable".
    • Next Click OK, then Apply button and then OK to exit the Internet Properties page.

  • Download TFC to your desktop
    • Close any open windows.
    • Double click the TFC icon to run the program
    • TFC will close all open programs itself in order to run,
    • Click the Start button to begin the process.
    • Allow TFC to run uninterrupted.
    • The program should not take long to finish it's job
    • Once its finished it should automatically reboot your machine,
    • if it doesn't, manually reboot to ensure a complete clean
    It's normal after running TFC cleaner that the PC will be slower to boot the first time.

  • WOT, Web of Trust, warns you about risky websites that try to scam visitors, deliver malware or send spam. Protect your computer against online threats by using WOT as your front-line layer of protection when browsing or searching in unfamiliar territory. WOT's color-coded icons show you ratings for 21 million websites, helping you avoid the dangerous sites:
    • Green to go
    • Yellow for caution
    • Red to stop
    WOT has an addon available for both Firefox and IE

  • Keep a backup of your important files - Now, more than ever, it's especially important to protect your digital files and memories. This article is full of good information on alternatives for home backup solutions.

  • ERUNT (Emergency Recovery Utility NT) allows you to keep a complete backup of your registry and restore it when needed. The standard registry backup options that come with Windows back up most of the registry but not all of it. ERUNT however creates a complete backup set, including the Security hive and user related sections. ERUNT is easy to use and since it creates a full backup, there are no options or choices other than to select the location of the backup files. The backup set includes a small executable that will launch the registry restore if needed.

  • In light of your recent issue, I'm sure you'd like to avoid any future infections. Please take a look at this well written article:
    PC Safety and Security--What Do I Need?.


**Be very wary with any security software that is advertised in popups or in other ways. They are not only usually of no use, but often have malware in them.


Should you wish to contribute to my ongoing fight against malware, donations are being accepted >>Here<<


Thank you for your patience, and performing all of the procedures requested.

Please respond one last time so we can consider the thread resolved and close it, thank-you

Microsoft MVP - 2010, 2011, 2012, 2013, 2014, 2015


#14 SpeedyStone

SpeedyStone
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:09:07 AM

Posted 10 January 2011 - 02:38 PM

Thank you for the help!! I believe this can be closed now. I'm getting about hardening the system and such. Hopefully, this will not be happening again.

#15 CatByte

CatByte

    bleepin' tiger


  • Malware Response Team
  • 14,664 posts
  • OFFLINE
  •  
  • Gender:Not Telling
  • Location:Canada
  • Local time:11:07 AM

Posted 10 January 2011 - 07:08 PM

It appears that this issue is resolved, therefore I am closing the topic. If that is not the case and you need or wish to continue with this topic, please send me or any Moderator a Personal Message (PM) that you would like this topic re-opened.

Microsoft MVP - 2010, 2011, 2012, 2013, 2014, 2015





0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users