Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Win xp pro infected with TDSS and google survey redirect


  • This topic is locked This topic is locked
17 replies to this topic

#1 bbrex

bbrex

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:04:05 PM

Posted 19 February 2011 - 07:07 PM

Hello, I was directed to this sight by a fellow Bleeping computer user handle EYEC.

Using Windows XP pro SP3 version 2002 with Firefox.

I'm infected with a JS survey redirect that occurs when the keyword google is used. See image below.

Posted Image

When JS is disabled I get an OOPs screen telling me to enable Java.

I have competed these steps already.

All run in SAFE mode:

1. I have run the Kapersky TDSS Kill, it found nothing.
2. Ran MBAM, it found three threats and removed them the first pass, second pass none.
3. Spybot S&D found one and removed, second pass nothing.
4. Deleted and replaced the hosts file.
5. Found a related RichVideo.exe and asssociated uninstallrichvideo.exe and several registry components, I was finally able to remove using Moveon Boot utility.

I have run the DDS tool and have the logs available if needed.
I'm now going to MBAM scan again in normal mode.

Edited by bbrex, 19 February 2011 - 07:09 PM.


BC AdBot (Login to Remove)

 


#2 CatByte

CatByte

    bleepin' tiger


  • Malware Response Team
  • 14,664 posts
  • OFFLINE
  •  
  • Gender:Not Telling
  • Location:Canada
  • Local time:05:05 PM

Posted 19 February 2011 - 09:59 PM

Hi,

Please do the following:


Please download DDS from either of these links

LINK 1
LINK 2

and save it to your desktop.
  • Disable any script blocking protection
  • Double click dds to run the tool.
  • When done, two DDS.txt's will open.
  • Save both reports to your desktop.
---------------------------------------------------
Please include the contents of the following in your next reply:

DDS.txt
Attach.txt.


NEXT


Download GMER Rootkit Scanner from here to your desktop. It will be a randomly named executable.
  • Double click the exe file.
  • If it gives you a warning about rootkit activity and asks if you want to run scan...click on NO, then use the following settings for a more complete scan.

    Posted Image
    Click the image to enlarge it
  • In the right panel, you will see several boxes that have been checked. Ensure the following are unchecked
    • IAT/EAT
    • Drives/Partition other than Systemdrive (typically C:\)
    • Show All (don't miss this one)
  • Then click the Scan button & wait for it to finish.
  • Once done click on the [Save..] button, and in the File name area, type in "Gmer.txt" or it will save as a .log file which cannot be uploaded to your post.
  • Save it where you can easily find it, such as your desktop, and attach it in reply.

**Caution**
Rootkit scans often produce false positives. Do NOT take any action on any "<--- ROOKIT" entries

Microsoft MVP - 2010, 2011, 2012, 2013, 2014, 2015


#3 CatByte

CatByte

    bleepin' tiger


  • Malware Response Team
  • 14,664 posts
  • OFFLINE
  •  
  • Gender:Not Telling
  • Location:Canada
  • Local time:05:05 PM

Posted 19 February 2011 - 10:00 PM

double post

Edited by CatByte, 19 February 2011 - 10:01 PM.

Microsoft MVP - 2010, 2011, 2012, 2013, 2014, 2015


#4 bbrex

bbrex
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:04:05 PM

Posted 20 February 2011 - 12:42 PM

Thanks for your attention.

MBAM full scan in normal mode turned up nothing.

In the interim I've dumped AVG free edition and have downloaded Comodo anti-virus, haven't completed a full scan with it yet but it did isolate and remove several things, but this is still an issue.

.UnclassifiedMalware@1 c:\recyclexbi.exe\recyclexbi.exe

ApplicUnsaf.Win32.AdTool.DNS.~A@162435776 C:\Documents and Settings\Einstien\Local Settings\Temp\REEKmnEK.scr.part

TrojWare.Win32.TrojanDownloader.Hilldoor.at@8708391 C:\Documents and Settings\Einstien\Desktop\mp3splitter.exe

Backdoor.Win32.Jaan.~PKA@95972880 C:\Program Files\Cakewalk\Shared Utilities\mp3enc.exe

UnclassifiedMalware@50847170 C:\Documents and Settings\Einstien\Shared\at the bonfire new hot single.mp3

TrojWare.Win32.Trojan.Agent.Gen@162320894 C:\System Volume Information\_restore{0F950C30-A0B7-4379-ABCA-E2FC0035C983}\RP199\A0093661.exe

Backdoor.Win32.Jaan.~PKA@95972880 C:\System Volume Information\_restore{0F950C30-A0B7-4379-ABCA-E2FC0035C983}\RP204\A0094370.exe

I have attached DDS and GMER logs.

Attached Files

  • Attached File  DDS.txt   9.63KB   2 downloads
  • Attached File  GMER.zip   16.66KB   1 downloads


#5 CatByte

CatByte

    bleepin' tiger


  • Malware Response Team
  • 14,664 posts
  • OFFLINE
  •  
  • Gender:Not Telling
  • Location:Canada
  • Local time:05:05 PM

Posted 20 February 2011 - 12:54 PM

Hi,

Please disable your anti-virus and don't run any further scans till we are done as it could interfere with what I am doing, thanks


Download ComboFix from one of the following locations:
Link 1
Link 2

VERY IMPORTANT !!! Save ComboFix.exe to your Desktop

* IMPORTANT - Disable your AntiVirus and AntiSpyware applications, usually via a right click on the System Tray icon. They may otherwise interfere with our tools. If you have difficulty properly disabling your protective programs, refer to this link here
  • Double click on ComboFix.exe & follow the prompts.
As part of it's process, ComboFix will check to see if the Microsoft Windows Recovery Console is installed. With malware infections being as they are today, it's strongly recommended to have this pre-installed on your machine before doing any malware removal. It will allow you to boot up into a special recovery/repair mode that will allow us to more easily help you should your computer have a problem after an attempted removal of malware.

  • Follow the prompts to allow ComboFix to download and install the Microsoft Windows Recovery Console, and when prompted, agree to the End-User License Agreement to install the Microsoft Windows Recovery Console.
**Please note: If the Microsoft Windows Recovery Console is already installed, ComboFix will continue it's malware removal procedures.

Posted Image

  • Once the Microsoft Windows Recovery Console is installed using ComboFix, you should see the following message:

Posted Image

  • Click on Yes, to continue scanning for malware.
When finished, it shall produce a log for you. Please include the C:\ComboFix.txt in your next reply.
Notes:
1. Do not mouse-click Combofix's window while it is running. That may cause it to stall.
2. Do not "re-run" Combofix. If you have a problem, reply back for further instructions.

Microsoft MVP - 2010, 2011, 2012, 2013, 2014, 2015


#6 bbrex

bbrex
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:04:05 PM

Posted 20 February 2011 - 02:11 PM

Disabled Comodo.

Combo was installed and ran, had one memory sector read error:

The instruction at "0x7df191ed" referenced memory at "0x7df191ed" memory could not be read. clicked ok at this point.

It did install Microsoft recovery console.

Results of scan:

ComboFix 11-02-20.01 - Einstien 02/20/2011 12:42:57.1.1 - x86
Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.1023.608 [GMT -6:00]
Running from: c:\documents and settings\Einstien\Desktop\ComboFix.exe
AV: COMODO Antivirus *Disabled/Updated* {043803A5-4F86-4ef7-AFC5-F6E02A79969B}
FW: COMODO Firewall *Disabled* {043803A3-4F86-4ef6-AFC5-F6E02A79969B}
.
PEV Error: LocalAppDataFolder

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.

C:\RecyclexBi.exe
c:\windows\Downloaded Program Files\RdxIE.dll
c:\windows\system32\AAD.DLL
c:\windows\system32\AAK.dll
c:\windows\system32\drivers\npf.sys
c:\windows\system32\Packet.dll
c:\windows\system32\pthreadVC.dll
c:\windows\system32\sstray.exe
c:\windows\system32\wpcap.dll

.
((((((((((((((((((((((((((((((((((((((( Drivers/Services )))))))))))))))))))))))))))))))))))))))))))))))))
.

-------\Legacy_NPF
-------\Service_NPF


((((((((((((((((((((((((( Files Created from 2011-01-20 to 2011-02-20 )))))))))))))))))))))))))))))))
.

2011-02-19 08:38 . 2011-02-19 08:38 -------- d-----w- C:\VritualRoot
2011-02-19 08:38 . 2011-02-19 08:38 -------- d-----w- c:\documents and settings\Einstien\Local Settings\Application Data\COMODO
2011-02-19 07:40 . 2011-02-19 07:40 -------- d-----w- c:\documents and settings\Einstien\Application Data\EMCO
2011-02-19 07:39 . 2011-02-19 07:39 -------- d-----w- c:\program files\EMCO
2011-02-19 04:29 . 2011-02-20 18:28 1474832 ----a-w- c:\windows\system32\drivers\sfi.dat
2011-02-19 04:24 . 2011-02-19 08:38 -------- d-----w- c:\documents and settings\All Users\Application Data\Comodo
2011-02-19 04:24 . 2011-02-19 04:26 -------- d-----w- c:\program files\COMODO
2011-02-19 04:24 . 2011-02-19 04:24 1700352 ----a-w- c:\windows\system32\gdiplus.dll
2011-01-30 20:57 . 2011-01-30 20:57 103864 ----a-w- c:\program files\Mozilla Firefox\plugins\nppdf32.dll
2011-01-30 20:57 . 2011-01-30 20:57 103864 ----a-w- c:\program files\Internet Explorer\PLUGINS\nppdf32.dll

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2011-01-21 14:44 . 2002-08-29 12:00 439296 ----a-w- c:\windows\system32\shimgvw.dll
2011-01-07 14:09 . 2002-08-29 12:00 290048 ----a-w- c:\windows\system32\atmfd.dll
2011-01-06 23:37 . 2011-01-06 23:37 94784 ----a-w- c:\windows\system32\drivers\inspect.sys
2011-01-06 23:37 . 2011-01-06 23:37 27576 ----a-w- c:\windows\system32\drivers\cmdhlp.sys
2011-01-06 23:37 . 2011-01-06 23:37 239368 ----a-w- c:\windows\system32\drivers\cmdGuard.sys
2011-01-06 23:37 . 2011-01-06 23:37 15592 ----a-w- c:\windows\system32\drivers\cmderd.sys
2010-12-31 13:10 . 2002-08-29 12:00 1854976 ----a-w- c:\windows\system32\win32k.sys
2010-12-29 07:42 . 2010-12-29 07:42 285480 ----a-w- c:\windows\system32\guard32.dll
2010-12-22 12:34 . 2002-08-29 12:00 301568 ----a-w- c:\windows\system32\kerberos.dll
2010-12-21 00:09 . 2009-03-07 20:47 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2010-12-21 00:08 . 2009-03-07 20:47 20952 ----a-w- c:\windows\system32\drivers\mbam.sys
2010-12-20 22:15 . 2005-02-18 21:19 667136 ----a-w- c:\windows\system32\wininet.dll
2010-12-20 22:15 . 2002-08-29 12:00 61952 ----a-w- c:\windows\system32\tdc.ocx
2010-12-20 22:15 . 2004-08-04 07:56 81920 ------w- c:\windows\system32\ieencode.dll
2010-12-20 17:26 . 2002-08-29 12:00 730112 ----a-w- c:\windows\system32\lsasrv.dll
2010-12-20 15:30 . 2004-08-04 05:59 369664 ------w- c:\windows\system32\html.iec
2010-12-09 15:15 . 2002-08-29 12:00 718336 ----a-w- c:\windows\system32\ntdll.dll
2010-12-09 14:30 . 2002-08-29 12:00 33280 ----a-w- c:\windows\system32\csrsrv.dll
2010-12-09 13:38 . 2002-08-29 12:00 2192768 ----a-w- c:\windows\system32\ntoskrnl.exe
2010-12-09 13:07 . 2002-08-29 01:04 2069376 ----a-w- c:\windows\system32\ntkrnlpa.exe
2003-04-01 04:57 . 2003-06-15 22:10 1461870 -c--a-w- c:\program files\mailwasher2b16.zl9
2002-08-29 12:00 . 2003-06-14 21:09 66048 -c--a-w- c:\program files\NOTEPAD.EXE
2001-03-15 14:06 . 2003-06-15 21:42 350720 -c----w- c:\program files\AlternateTuning.exe
1998-09-08 05:32 . 2003-06-15 21:50 344576 -c----w- c:\program files\plugger.exe
.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"NVIEW"="nview.dll" [2003-05-02 835654]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"NvCplDaemon"="c:\windows\System32\NvCpl.dll" [2003-05-02 4640768]
"nwiz"="nwiz.exe" [2003-05-02 323584]
"LXCYCATS"="c:\windows\System32\spool\DRIVERS\W32X86\3\LXCYtime.dll" [2006-11-21 106496]
"Adobe Reader Speed Launcher"="c:\program files\Adobe\Reader 9.0\Reader\Reader_sl.exe" [2011-01-31 35760]
"Adobe ARM"="c:\program files\Common Files\Adobe\ARM\1.0\AdobeARM.exe" [2010-09-21 932288]
"COMODO Internet Security"="c:\program files\COMODO\COMODO Internet Security\cfp.exe" [2011-01-18 2548552]
"COMODO"="c:\program files\COMODO\COMODO GeekBuddy\CLPSLA.exe" [2011-02-07 210648]
"CPA"="c:\program files\COMODO\COMODO GeekBuddy\Cpa.exe" [2011-02-08 914144]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce]
"AvgUninstallURL"="start http:" [X]

[HKEY_CURRENT_USER\software\microsoft\windows\currentversion\policies\explorer]
"NoRecentDocsNetHood"= 01000000
"NoSMMyDocs"= 01000000
"NoSMMyPictures"= 01000000

[hkey_local_machine\software\microsoft\windows\currentversion\explorer\ShellExecuteHooks]
"{5AE067D3-9AFB-48E0-853A-EBB7F4A000DA}"= "c:\program files\SUPERAntiSpyware\SASSEH.DLL" [2008-05-13 77824]

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\!SASWinLogon]
2008-12-22 16:05 356352 ----a-w- c:\program files\SUPERAntiSpyware\SASWINLO.dll

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\windows]
"AppInit_DLLs"=c:\windows\system32\guard32.dll

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\CLPSLS]
@="Service"

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\EverioService]
2007-11-01 23:13 151552 ------w- c:\program files\CyberLink\PCM4Everio\EverioService.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\EzPrint]
2007-06-25 14:34 82608 ----a-w- c:\program files\Lexmark 3400 Series\ezprint.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\lxcymon.exe]
2007-06-25 14:34 291504 ----a-w- c:\program files\Lexmark 3400 Series\lxcymon.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\NeroCheck]
2006-01-12 21:40 155648 ----a-w- c:\windows\system32\NeroCheck.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\services]
"mnmsrvc"=3 (0x3)
"Messenger"=2 (0x2)

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]
"EnableFirewall"= 0 (0x0)

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=
"c:\\Program Files\\Winamp Remote\\bin\\Orb.exe"=
"c:\\Program Files\\Winamp Remote\\bin\\OrbTray.exe"=
"c:\\Program Files\\Winamp Remote\\bin\\OrbStreamerClient.exe"=
"c:\\WINDOWS\\system32\\lxcycoms.exe"=
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"c:\\Program Files\\Ares\\Ares.exe"=
"c:\\Program Files\\REAPER\\reamote.exe"=

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\GloballyOpenPorts\List]
"1723:TCP"= 1723:TCP:@xpsp2res.dll,-22015
"1701:UDP"= 1701:UDP:@xpsp2res.dll,-22016
"500:UDP"= 500:UDP:@xpsp2res.dll,-22017

R0 Si3112r;Silicon Image SiI 3112 SATARaid Controller;c:\windows\system32\drivers\Si3112r.sys [6/15/2003 7:36 asm 84529]
R1 cmderd;COMODO Internet Security Eradication Driver;c:\windows\system32\drivers\cmderd.sys [1/6/2011 5:37 psm 15592]
R1 cmdGuard;COMODO Internet Security Sandbox Driver;c:\windows\system32\drivers\cmdGuard.sys [1/6/2011 5:37 psm 239368]
R1 cmdHlp;COMODO Internet Security Helper Driver;c:\windows\system32\drivers\cmdhlp.sys [1/6/2011 5:37 psm 27576]
R1 SASDIFSV;SASDIFSV;c:\program files\SUPERAntiSpyware\sasdifsv.sys [1/15/2009 3:17 psm 8944]
R1 SASKUTIL;SASKUTIL;c:\program files\SUPERAntiSpyware\SASKUTIL.SYS [1/15/2009 3:17 psm 55024]
R2 CLPSLS;COMODO livePCsupport Service;c:\program files\COMODO\COMODO GeekBuddy\CLPSLS.exe [2/7/2011 5:12 asm 151432]
R2 lxcy_device;lxcy_device;c:\windows\system32\lxcycoms.exe -service --> c:\windows\system32\lxcycoms.exe -service [?]
S3 JL2005;JL2005A Toy Camera;c:\windows\system32\Drivers\toywdm.sys --> c:\windows\system32\Drivers\toywdm.sys [?]
S3 SASENUM;SASENUM;c:\program files\SUPERAntiSpyware\SASENUM.SYS [1/15/2009 3:17 psm 7408]
.
.
------- Supplementary Scan -------
.
uStart Page = hxxp://www.google.com/
mStart Page =
mSearch Bar =
DPF: DirectAnimation Java Classes - file://c:\windows\Java\classes\dajava.cab
DPF: Microsoft XML Parser for Java - file://c:\windows\Java\classes\xmldso.cab
DPF: {6632A7E9-FE1F-43D2-A04A-A15951ED63E0} - hxxp://mediaplayer.walmart.com/installer/install.cab
FF - ProfilePath - c:\documents and settings\Einstien\Application Data\Mozilla\Firefox\Profiles\ps8387d2.default\
FF - prefs.js: browser.search.selectedEngine - AVG Secure Search
FF - prefs.js: browser.startup.homepage - hxxp://www.yahoo.com/
FF - prefs.js: keyword.URL - hxxp://search.avg.com/route/?d=4aef5cc6&v=6.010.006.004&i=23&tp=ab&iy=&ychte=us&lng=en-US&q=
FF - Ext: Default: {972ce4c6-7e08-4474-a285-3208198ce6fd} - c:\program files\Mozilla Firefox\extensions\{972ce4c6-7e08-4474-a285-3208198ce6fd}
.
- - - - ORPHANS REMOVED - - - -

Toolbar-{CCC7A320-B3CA-4199-B1A6-9F516DD69829} - (no file)
WebBrowser-{CCC7A320-B3CA-4199-B1A6-9F516DD69829} - (no file)
HKCU-Run-RecyclexBi.exe - c:\recyclexbi.exe\RecyclexBi.exe
HKLM-Run-nForce Tray Options - sstray.exe
HKU-Default-Run-RecyclexBi.exe - c:\recyclexbi.exe\RecyclexBi.exe
MSConfigStartUp-Pop-Up Stopper - c:\program files\Panicware\Pop-Up Stopper\dpps2.exe
AddRemove-Barricade - c:\program files\SMC\Barricade\Uninst.isu



**************************************************************************

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2011-02-20 12:56
Windows 5.1.2600 Service Pack 3 NTFS

detected NTDLL code modification:
ZwClose, ZwOpenFile

scanning hidden processes ...

scanning hidden autostart entries ...

HKLM\Software\Microsoft\Windows\CurrentVersion\Run
LXCYCATS = rundll32 c:\windows\System32\spool\DRIVERS\W32X86\3\LXCYtime.dll,_RunDLLEntry@16???????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????

scanning hidden files ...

scan completed successfully
hidden files: 0

**************************************************************************
.
--------------------- DLLs Loaded Under Running Processes ---------------------

- - - - - - - > 'winlogon.exe'(452)
c:\program files\SUPERAntiSpyware\SASWINLO.dll

- - - - - - - > 'lsass.exe'(508)
c:\windows\system32\guard32.dll

- - - - - - - > 'explorer.exe'(2512)
c:\windows\system32\guard32.dll
c:\windows\system32\nView.dll
c:\windows\system32\WPDShServiceObj.dll
c:\windows\system32\PortableDeviceTypes.dll
c:\windows\system32\PortableDeviceApi.dll
.
------------------------ Other Running Processes ------------------------
.
c:\program files\COMODO\COMODO Internet Security\cmdagent.exe
c:\program files\Common Files\LightScribe\LSSrvc.exe
c:\windows\system32\lxcycoms.exe
c:\windows\System32\nvsvc32.exe
c:\windows\system32\LEXBCES.EXE
c:\windows\system32\LEXPPS.EXE
c:\program files\COMODO\COMODO GeekBuddy\CLPS.exe
c:\windows\system32\rundll32.exe
c:\windows\System32\wbem\unsecapp.exe
c:\windows\system32\wscntfy.exe
.
**************************************************************************
.
Completion time: 2011-02-20 13:03:16 - machine was rebooted
ComboFix-quarantined-files.txt 2011-02-20 19:03

Pre-Run: 19,028,152,320 bytes free
Post-Run: 19,088,076,800 bytes free

WindowsXP-KB310994-SP2-Pro-BootDisk-ENU.exe
[boot loader]
timeout=2
default=multi(0)disk(0)rdisk(0)partition(1)\WINDOWS
[operating systems]
c:\cmdcons\BOOTSECT.DAT="Microsoft Windows Recovery Console" /cmdcons
UnsupportedDebug="do not select this" /debug
multi(0)disk(0)rdisk(0)partition(1)\WINDOWS="Microsoft Windows XP Professional" /fastdetect /NoExecute=OptIn

- - End Of File - - 8D511569CEA94CCE9607D7D1341DC750

Edited by bbrex, 20 February 2011 - 02:12 PM.


#7 CatByte

CatByte

    bleepin' tiger


  • Malware Response Team
  • 14,664 posts
  • OFFLINE
  •  
  • Gender:Not Telling
  • Location:Canada
  • Local time:05:05 PM

Posted 20 February 2011 - 02:34 PM

Hi,

This isn't the normal location where notepad.exe resides. Did you install it in program files yourself?

2002-08-29 12:00 . 2003-06-14 21:09 66048 -c--a-w- c:\program files\NOTEPAD.EXE

Let's check it's authenticity.

Please do the following:


submit a file to virustotal for analysis
  • Use the browse button on that page to navigate to the location of the file to be scanned.
  • In the right hand panel,
  • click on the file c:\program files\NOTEPAD.EXE
  • then click the open button.
  • The file will now be displayed in the submit box.
  • Scroll down a bit and click "send file", wait for the results
  • If you get a message saying File has already been analyzed: click Reanalyze file now
  • Once scanned, copy and paste the link to the results page in your next reply.



NEXT


Please download Malwarebytes' Anti-Malware
  • Double Click mbam-setup.exe to install the application.
  • Make sure a checkmark is placed next to Update Malwarebytes' Anti-Malware and Launch Malwarebytes' Anti-Malware, then click Finish.
  • If an update is found, it will download and install the latest version.
  • Once the program has loaded, select "Perform Quick Scan", then click Scan.
  • The scan may take some time to finish, so please be patient.
  • When the scan is complete, click OK, then Show Results to view the results.
  • Make sure that everything is checked, and click Remove Selected. <-- very important
  • When disinfection is completed, a log will open in Notepad and you may be prompted to Restart. (See Extra Note)
  • The log is automatically saved by MBAM and can be viewed by clicking the Logs tab in MBAM.
  • Copy&Paste the entire report in your next reply.

Extra Note:If MBAM encounters a file that is difficult to remove, you will be presented with 1 of 2 prompts, click OK to either and let MBAM proceed with the disinfection process, if asked to restart the computer, please do so immediately.



NEXT


Go here to run an online scanner from ESET.
  • Note: You will need to use Internet explorer for this scan
  • Turn off the real time scanner of any existing antivirus program while performing the online scan
  • Tick the box next to YES, I accept the Terms of Use.
  • Click Start
  • When asked, allow the activeX control to install
  • Click Start
  • Make sure that the option Remove found threats is unticked and the Scan Archives option is ticked.
  • Click on Advanced Settings, ensure the options Scan for potentially unwanted applications, Scan for potentially unsafe applications, and Enable Anti-Stealth Technology are ticked.
  • Click Scan
  • Wait for the scan to finish
  • When the scan completes, press the LIST OF THREATS FOUND button
  • Press EXPORT TO TEXT FILE , name the file ESETSCAN and save it to your desktop
  • Include the contents of this report in your next reply.
  • Press the BACK button.
  • Press Finish

Microsoft MVP - 2010, 2011, 2012, 2013, 2014, 2015


#8 bbrex

bbrex
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:04:05 PM

Posted 21 February 2011 - 12:51 AM

I'm back finally...

Combofix seems to have fixed the original issue of google redirect, but would like to continue to try to get this thing as clean as possible.

Ok on the notepad.exe, it's been a long time since I completed this computer, I seem to remember accidently deleting it and I had to go find ( on the interweb ) another Notepad.exe from somewhere, it could very well be a malware.

At any rate here is the scan link.

http://www.virustotal.com/file-scan/report.html?id=865f34fe7ba81e9622ddbdfc511547d190367bbf3dad21ceb6da3eec621044f5-1298266383


MBAM Scan log:

Malwarebytes' Anti-Malware 1.50.1.1100
www.malwarebytes.org

Database version: 5822

Windows 5.1.2600 Service Pack 3
Internet Explorer 6.0.2900.5512

2/20/2011 10:03:15 psm
mbam-log-2011-02-20 (22-03-15).txt

Scan type: Full scan (C:\|)
Objects scanned: 206523
Time elapsed: 7 hour(s), 55 minute(s), 52 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 1

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
c:\system volume information\_restore{0f950c30-a0b7-4379-abca-e2fc0035c983}\RP204\A0094378.exe (Trojan.SpyEyes) -> Quarantined and deleted successfully.

And finally from the ESET scan:

C:\Installable programs\AVI-MPEG-ASF-WMV_Splitter_v2[2].31.zip probably a variant of Win32/Agent.IMLTJPQ trojan

#9 CatByte

CatByte

    bleepin' tiger


  • Malware Response Team
  • 14,664 posts
  • OFFLINE
  •  
  • Gender:Not Telling
  • Location:Canada
  • Local time:05:05 PM

Posted 21 February 2011 - 03:54 AM

Please do the following:

Please download SystemLook from one of the links below and save it to your Desktop.
Download Mirror #1
Download Mirror #2

  • Double-click SystemLook.exe to run it.
  • Copy the content of the following codebox into the main textfield:

    :filefind
    notepad*
    
  • Click the Look button to start the scan.
  • When finished, a notepad window will open with the results of the scan. Please post this log in your next reply.
Note: The log can also be found on your Desktop entitled SystemLook.txt

Microsoft MVP - 2010, 2011, 2012, 2013, 2014, 2015


#10 bbrex

bbrex
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:04:05 PM

Posted 21 February 2011 - 10:59 AM

SystemLook 04.09.10 by jpshortstuff
Log created at 09:54 on 21/02/2011 by Einstien
Administrator - Elevation successful

========== filefind ==========

Searching for "notepad*"
C:\Documents and Settings\Default User\Start Menu\Programs\Accessories\Notepad.lnk --a--c- 1519 bytes [02:20 15/06/2003] [02:20 15/06/2003] 81928B17A28F2588C3240C40F0566FED
C:\Documents and Settings\Einstien\Start Menu\Programs\Accessories\Notepad.lnk --a---- 578 bytes [18:08 13/07/2003] [18:08 13/07/2003] BF3DFE5138321F975E477F6B00212D95
C:\Program Files\NOTEPAD.EXE --a--c- 66048 bytes [21:09 14/06/2003] [12:00 29/08/2002] 562A3B03546536307AC47FCB0CEADCDE
C:\WINDOWS\notepad.exe --a--c- 69120 bytes [21:09 14/06/2003] [00:12 14/04/2008] 5E28284F9B5F9097640D58A73D38AD4C
C:\WINDOWS\$NtServicePackUninstall$\notepad.exe -----c- 69120 bytes [22:36 20/09/2008] [07:56 04/08/2004] 388B8FBC36A8558587AFC90FB23A3B99
C:\WINDOWS\Help\notepad.chm --a--c- 25236 bytes [12:00 29/08/2002] [12:00 29/08/2002] CC28209EAE1F1C3012ACD5FE3E2BF9B9
C:\WINDOWS\Help\notepad.hlp --a--c- 12521 bytes [12:00 29/08/2002] [12:00 29/08/2002] EB9D47ECA3C4621620C37170E70AE647
C:\WINDOWS\Prefetch\NOTEPAD.EXE-336351A9.pf --a---- 30082 bytes [04:02 15/02/2011] [05:46 21/02/2011] 9F7A9147DBCCF1147C44B3AAA064EBD6
C:\WINDOWS\ServicePackFiles\i386\notepad.exe -----c- 69120 bytes [07:56 04/08/2004] [00:12 14/04/2008] 5E28284F9B5F9097640D58A73D38AD4C
C:\WINDOWS\system32\notepad.exe --a---- 69120 bytes [12:00 29/08/2002] [00:12 14/04/2008] 5E28284F9B5F9097640D58A73D38AD4C
C:\WINDOWS\system32\config\systemprofile\Start Menu\Programs\Accessories\Notepad.lnk --a--c- 1519 bytes [02:22 15/06/2003] [02:20 15/06/2003] 81928B17A28F2588C3240C40F0566FED
C:\WINDOWS\system32\dllcache\notepad.exe --a--c- 69120 bytes [21:09 14/06/2003] [00:12 14/04/2008] 5E28284F9B5F9097640D58A73D38AD4C

-= EOF =-

#11 CatByte

CatByte

    bleepin' tiger


  • Malware Response Team
  • 14,664 posts
  • OFFLINE
  •  
  • Gender:Not Telling
  • Location:Canada
  • Local time:05:05 PM

Posted 21 February 2011 - 01:17 PM

Hi

Please do the following:

  • Very Important! Temporarily disable your anti-virus, script blocking and any anti-malware real-time protection before following the steps below.
  • They can interfere with ComboFix or remove some of its embedded files which may cause "unpredictable results".
Copy/paste the text inside the Codebox below into notepad:

Here's how to do that:
Click Start > Run type Notepad click OK.
This will open an empty notepad file:

Copy all the text inside of the code box - Press Ctrl+C (or right click on the highlighted section and choose 'copy')

http://www.bleepingcomputer.com/forums/topic380425.html/page__view__findpost__p__2142254

Collect::
C:\Program Files\NOTEPAD.EXE

File::
C:\Installable programs\AVI-MPEG-ASF-WMV_Splitter_v2[2].31.zip

Now paste the copied text into the open notepad - press CTRL+V (or right click and choose 'paste')

Save this file to your desktop, Save this as "CFScript"


Here's how to do that:

1.Click File;
2.Click Save As... Change the directory to your desktop;
3.Change the Save as type to "All Files";
4.Type in the file name: CFScript
5.Click Save ...

Posted Image
  • Referring to the screenshot above, drag CFScript.txt into ComboFix.exe.
  • ComboFix will now run a scan on your system. It may reboot your system when it finishes. This is normal.
  • When finished, it shall produce a log for you.
  • Copy and paste the contents of the log in your next reply.

CAUTION: Do not mouse-click ComboFix's window while it is running. That may cause it to stall.


NEXT


Visit ADOBEand download the latest version of Acrobat Reader (version X)
Having the latest updates ensures there are no security vulnerabilities in your system.

NEXT

Posted Image
Your Java is out of date. Older versions have vulnerabilities that malware can use to infect your system. Please follow these steps to remove older version Java components and update.
  • Download the latest version of Java Runtime Environment (JRE) 24 and save it to your desktop.
  • Scroll down to where it says JDK 6 Update 24 (JDK or JRE)
  • Click the Download JRE button to the right
  • Select the Windows platform from the dropdown menu.
  • Read the License Agreement and then check the box that says: "I agree to the Java SE Runtime Environment 6u24 with JavaFX 1 License Agreement". Click on Continue. The page will refresh.
  • Click on the link to download Windows Offline Installation and save the file to your desktop.
  • Close any programs you may have running - especially your web browser.
  • Go to Start > Control Panel, double-click on Add or Remove Programs and remove all older versions of Java.
  • Check (highlight) any item with Java Runtime Environment (JRE or J2SE or Java™ 6) in the name.
  • Click the Remove or Change/Remove button.
  • Repeat as many times as necessary to remove each Java versions.
  • Reboot your computer once all Java components are removed.
  • Then from your desktop double-click on jre-6u24-windows-i586.exe to install the newest version.
  • After the install is complete, go into the Control Panel (using Classic View) and double-click the Java Icon. (looks like a coffee cup)
    • On the General tab, under Temporary Internet Files, click the Settings button.
    • Next, click on the Delete Files button
    • There are two options in the window to clear the cache - Leave BOTH Checked
      Applications and Applets
      Trace and Log Files
  • Click OK on Delete Temporary Files Window
    Note: This deletes ALL the Downloaded Applications and Applets from the CACHE.
  • Click OK to leave the Temporary Files Window
  • Click OK to leave the Java Control Panel.


NEXT



Please advise how your computer is running now and if there are any outstanding issues

Edited by CatByte, 21 February 2011 - 01:18 PM.

Microsoft MVP - 2010, 2011, 2012, 2013, 2014, 2015


#12 bbrex

bbrex
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:04:05 PM

Posted 21 February 2011 - 03:57 PM

System is working fine now...."Thank you" , the original issue was gone on the first pass of combofix, here is the second pass of combofix running the script.

Combofix attempted to upload a file but couldn't and archived at C:\CF-submit.htm, is there anything I need to do with this?

ComboFix 11-02-20.01 - Einstien 02/21/2011 14:09:51.2.1 - x86
Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.1023.674 [GMT -6:00]
Running from: c:\documents and settings\Einstien\Desktop\ComboFix.exe
Command switches used :: c:\documents and settings\Einstien\Desktop\CFScript.txt
AV: COMODO Antivirus *Disabled/Updated* {043803A5-4F86-4ef7-AFC5-F6E02A79969B}
FW: COMODO Firewall *Disabled* {043803A3-4F86-4ef6-AFC5-F6E02A79969B}

FILE ::
"c:\installable programs\AVI-MPEG-ASF-WMV_Splitter_v2[2].31.zip"

file zipped: c:\program files\NOTEPAD.EXE
.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.

c:\installable programs\AVI-MPEG-ASF-WMV_Splitter_v2[2].31.zip
c:\program files\NOTEPAD.EXE

.
((((((((((((((((((((((((( Files Created from 2011-01-21 to 2011-02-21 )))))))))))))))))))))))))))))))
.

2011-02-21 04:13 . 2011-02-21 04:13 -------- d-----w- c:\program files\ESET
2011-02-19 08:38 . 2011-02-19 08:38 -------- d-----w- C:\VritualRoot
2011-02-19 08:38 . 2011-02-19 08:38 -------- d-----w- c:\documents and settings\Einstien\Local Settings\Application Data\COMODO
2011-02-19 07:40 . 2011-02-19 07:40 -------- d-----w- c:\documents and settings\Einstien\Application Data\EMCO
2011-02-19 07:39 . 2011-02-19 07:39 -------- d-----w- c:\program files\EMCO
2011-02-19 04:29 . 2011-02-21 18:11 1474832 ----a-w- c:\windows\system32\drivers\sfi.dat
2011-02-19 04:24 . 2011-02-19 08:38 -------- d-----w- c:\documents and settings\All Users\Application Data\Comodo
2011-02-19 04:24 . 2011-02-19 04:26 -------- d-----w- c:\program files\COMODO
2011-02-19 04:24 . 2011-02-19 04:24 1700352 ----a-w- c:\windows\system32\gdiplus.dll
2011-01-30 20:57 . 2011-01-30 20:57 103864 ----a-w- c:\program files\Mozilla Firefox\plugins\nppdf32.dll
2011-01-30 20:57 . 2011-01-30 20:57 103864 ----a-w- c:\program files\Internet Explorer\PLUGINS\nppdf32.dll

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2011-01-21 14:44 . 2002-08-29 12:00 439296 ----a-w- c:\windows\system32\shimgvw.dll
2011-01-07 14:09 . 2002-08-29 12:00 290048 ----a-w- c:\windows\system32\atmfd.dll
2011-01-06 23:37 . 2011-01-06 23:37 94784 ----a-w- c:\windows\system32\drivers\inspect.sys
2011-01-06 23:37 . 2011-01-06 23:37 27576 ----a-w- c:\windows\system32\drivers\cmdhlp.sys
2011-01-06 23:37 . 2011-01-06 23:37 239368 ----a-w- c:\windows\system32\drivers\cmdGuard.sys
2011-01-06 23:37 . 2011-01-06 23:37 15592 ----a-w- c:\windows\system32\drivers\cmderd.sys
2010-12-31 13:10 . 2002-08-29 12:00 1854976 ----a-w- c:\windows\system32\win32k.sys
2010-12-29 07:42 . 2010-12-29 07:42 285480 ----a-w- c:\windows\system32\guard32.dll
2010-12-22 12:34 . 2002-08-29 12:00 301568 ----a-w- c:\windows\system32\kerberos.dll
2010-12-21 00:09 . 2009-03-07 20:47 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2010-12-21 00:08 . 2009-03-07 20:47 20952 ----a-w- c:\windows\system32\drivers\mbam.sys
2010-12-20 22:15 . 2005-02-18 21:19 667136 ----a-w- c:\windows\system32\wininet.dll
2010-12-20 22:15 . 2002-08-29 12:00 61952 ----a-w- c:\windows\system32\tdc.ocx
2010-12-20 22:15 . 2004-08-04 07:56 81920 ------w- c:\windows\system32\ieencode.dll
2010-12-20 17:26 . 2002-08-29 12:00 730112 ----a-w- c:\windows\system32\lsasrv.dll
2010-12-20 15:30 . 2004-08-04 05:59 369664 ------w- c:\windows\system32\html.iec
2010-12-09 15:15 . 2002-08-29 12:00 718336 ----a-w- c:\windows\system32\ntdll.dll
2010-12-09 14:30 . 2002-08-29 12:00 33280 ----a-w- c:\windows\system32\csrsrv.dll
2010-12-09 13:38 . 2002-08-29 12:00 2192768 ----a-w- c:\windows\system32\ntoskrnl.exe
2010-12-09 13:07 . 2002-08-29 01:04 2069376 ----a-w- c:\windows\system32\ntkrnlpa.exe
2003-04-01 04:57 . 2003-06-15 22:10 1461870 -c--a-w- c:\program files\mailwasher2b16.zl9
2001-03-15 14:06 . 2003-06-15 21:42 350720 -c----w- c:\program files\AlternateTuning.exe
1998-09-08 05:32 . 2003-06-15 21:50 344576 -c----w- c:\program files\plugger.exe
.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"NVIEW"="nview.dll" [2003-05-02 835654]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"NvCplDaemon"="c:\windows\System32\NvCpl.dll" [2003-05-02 4640768]
"nwiz"="nwiz.exe" [2003-05-02 323584]
"LXCYCATS"="c:\windows\System32\spool\DRIVERS\W32X86\3\LXCYtime.dll" [2006-11-21 106496]
"Adobe Reader Speed Launcher"="c:\program files\Adobe\Reader 9.0\Reader\Reader_sl.exe" [2011-01-31 35760]
"Adobe ARM"="c:\program files\Common Files\Adobe\ARM\1.0\AdobeARM.exe" [2010-09-21 932288]
"COMODO Internet Security"="c:\program files\COMODO\COMODO Internet Security\cfp.exe" [2011-01-18 2548552]
"COMODO"="c:\program files\COMODO\COMODO GeekBuddy\CLPSLA.exe" [2011-02-07 210648]
"CPA"="c:\program files\COMODO\COMODO GeekBuddy\Cpa.exe" [2011-02-08 914144]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce]
"AvgUninstallURL"="start http:" [X]

[HKEY_CURRENT_USER\software\microsoft\windows\currentversion\policies\explorer]
"NoRecentDocsNetHood"= 01000000
"NoSMMyDocs"= 01000000
"NoSMMyPictures"= 01000000

[hkey_local_machine\software\microsoft\windows\currentversion\explorer\ShellExecuteHooks]
"{5AE067D3-9AFB-48E0-853A-EBB7F4A000DA}"= "c:\program files\SUPERAntiSpyware\SASSEH.DLL" [2008-05-13 77824]

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\!SASWinLogon]
2008-12-22 16:05 356352 ----a-w- c:\program files\SUPERAntiSpyware\SASWINLO.dll

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\windows]
"AppInit_DLLs"=c:\windows\system32\guard32.dll

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\CLPSLS]
@="Service"

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\EverioService]
2007-11-01 23:13 151552 ------w- c:\program files\CyberLink\PCM4Everio\EverioService.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\EzPrint]
2007-06-25 14:34 82608 ----a-w- c:\program files\Lexmark 3400 Series\ezprint.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\lxcymon.exe]
2007-06-25 14:34 291504 ----a-w- c:\program files\Lexmark 3400 Series\lxcymon.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\NeroCheck]
2006-01-12 21:40 155648 ----a-w- c:\windows\system32\NeroCheck.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\services]
"mnmsrvc"=3 (0x3)
"Messenger"=2 (0x2)

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]
"EnableFirewall"= 0 (0x0)

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=
"c:\\Program Files\\Winamp Remote\\bin\\Orb.exe"=
"c:\\Program Files\\Winamp Remote\\bin\\OrbTray.exe"=
"c:\\Program Files\\Winamp Remote\\bin\\OrbStreamerClient.exe"=
"c:\\WINDOWS\\system32\\lxcycoms.exe"=
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"c:\\Program Files\\Ares\\Ares.exe"=
"c:\\Program Files\\REAPER\\reamote.exe"=

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\GloballyOpenPorts\List]
"1723:TCP"= 1723:TCP:@xpsp2res.dll,-22015
"1701:UDP"= 1701:UDP:@xpsp2res.dll,-22016
"500:UDP"= 500:UDP:@xpsp2res.dll,-22017

R0 Si3112r;Silicon Image SiI 3112 SATARaid Controller;c:\windows\system32\drivers\Si3112r.sys [6/15/2003 7:36 asm 84529]
R1 cmderd;COMODO Internet Security Eradication Driver;c:\windows\system32\drivers\cmderd.sys [1/6/2011 5:37 psm 15592]
R1 cmdGuard;COMODO Internet Security Sandbox Driver;c:\windows\system32\drivers\cmdGuard.sys [1/6/2011 5:37 psm 239368]
R1 cmdHlp;COMODO Internet Security Helper Driver;c:\windows\system32\drivers\cmdhlp.sys [1/6/2011 5:37 psm 27576]
R1 SASDIFSV;SASDIFSV;c:\program files\SUPERAntiSpyware\sasdifsv.sys [1/15/2009 3:17 psm 8944]
R1 SASKUTIL;SASKUTIL;c:\program files\SUPERAntiSpyware\SASKUTIL.SYS [1/15/2009 3:17 psm 55024]
R2 CLPSLS;COMODO livePCsupport Service;c:\program files\COMODO\COMODO GeekBuddy\CLPSLS.exe [2/7/2011 5:12 asm 151432]
R2 lxcy_device;lxcy_device;c:\windows\system32\lxcycoms.exe -service --> c:\windows\system32\lxcycoms.exe -service [?]
S3 JL2005;JL2005A Toy Camera;c:\windows\system32\Drivers\toywdm.sys --> c:\windows\system32\Drivers\toywdm.sys [?]
S3 SASENUM;SASENUM;c:\program files\SUPERAntiSpyware\SASENUM.SYS [1/15/2009 3:17 psm 7408]

--- Other Services/Drivers In Memory ---

*NewlyCreated* - CFCATCHME
*Deregistered* - CFcatchme
.
.
------- Supplementary Scan -------
.
uStart Page = hxxp://www.google.com/
mSearch Bar =
DPF: DirectAnimation Java Classes - file://c:\windows\Java\classes\dajava.cab
DPF: Microsoft XML Parser for Java - file://c:\windows\Java\classes\xmldso.cab
DPF: {6632A7E9-FE1F-43D2-A04A-A15951ED63E0} - hxxp://mediaplayer.walmart.com/installer/install.cab
FF - ProfilePath - c:\documents and settings\Einstien\Application Data\Mozilla\Firefox\Profiles\ps8387d2.default\
FF - prefs.js: browser.search.selectedEngine - AVG Secure Search
FF - prefs.js: browser.startup.homepage - hxxp://www.google.com/
FF - prefs.js: keyword.URL - hxxp://search.avg.com/route/?d=4aef5cc6&v=6.010.006.004&i=23&tp=ab&iy=&ychte=us&lng=en-US&q=
FF - Ext: Default: {972ce4c6-7e08-4474-a285-3208198ce6fd} - c:\program files\Mozilla Firefox\extensions\{972ce4c6-7e08-4474-a285-3208198ce6fd}
.

**************************************************************************

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2011-02-21 14:16
Windows 5.1.2600 Service Pack 3 NTFS

detected NTDLL code modification:
ZwClose, ZwOpenFile

scanning hidden processes ...

scanning hidden autostart entries ...

HKLM\Software\Microsoft\Windows\CurrentVersion\Run
LXCYCATS = rundll32 c:\windows\System32\spool\DRIVERS\W32X86\3\LXCYtime.dll,_RunDLLEntry@16???????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????

scanning hidden files ...

scan completed successfully
hidden files: 0

**************************************************************************
.
--------------------- DLLs Loaded Under Running Processes ---------------------

- - - - - - - > 'winlogon.exe'(460)
c:\windows\system32\guard32.dll
c:\program files\SUPERAntiSpyware\SASWINLO.dll

- - - - - - - > 'lsass.exe'(516)
c:\windows\system32\guard32.dll
.
Completion time: 2011-02-21 14:18:49
ComboFix-quarantined-files.txt 2011-02-21 20:18
ComboFix2.txt 2011-02-20 19:03

Pre-Run: 19,420,536,832 bytes free
Post-Run: 19,401,220,096 bytes free

- - End Of File - - 67F645CEC035FC0A10F33286CD00CB4A

#13 CatByte

CatByte

    bleepin' tiger


  • Malware Response Team
  • 14,664 posts
  • OFFLINE
  •  
  • Gender:Not Telling
  • Location:Canada
  • Local time:05:05 PM

Posted 21 February 2011 - 05:05 PM

Please do the following:

Please open this link HERE in a new window.

In the box marked Link to topic where this file was requested: please paste in the following text
http://www.bleepingcomputer.com/forums/topic380425.html/page__view__findpost__p__2142596

Click the Browse button and navigate to C:\Qoobox\Quarantine

There should be a zip file there called [4]-Submit_****-**-**_**.**.**.zip ( the * denotes Date and Time stamp )
Select this file and click Open
In the Largest box please put
File Requested By CatByte
Failed Collect::

Finally click SendFile

Please return here and let me know when that file has been uploaded.

Microsoft MVP - 2010, 2011, 2012, 2013, 2014, 2015


#14 bbrex

bbrex
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:04:05 PM

Posted 21 February 2011 - 08:15 PM

File submitted. Thanks again CAT.

#15 CatByte

CatByte

    bleepin' tiger


  • Malware Response Team
  • 14,664 posts
  • OFFLINE
  •  
  • Gender:Not Telling
  • Location:Canada
  • Local time:05:05 PM

Posted 21 February 2011 - 08:46 PM

Thanks

Please post a fresh DDS log and advise how the computer is running now and if there are any outstanding issues

Microsoft MVP - 2010, 2011, 2012, 2013, 2014, 2015





0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users