Jump to content


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.

Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.


Google Redirect - Can't solve

  • This topic is locked This topic is locked
12 replies to this topic

#1 djiddish98


  • Members
  • 7 posts
  • Local time:08:46 PM

Posted 26 April 2011 - 07:36 PM

This thing managed to sneak it's way onto my computer (no prompt to download, no popup), restarted the computer, and took forever for me to start up windows. I then noticed that my google searches were being redirected (sometimes to multiple sites at once), so I knew my computer was compromised.

Being that I've taken care of malware before, I followed many different websites, specifically the steps in this thread.


I have the same issue with TDSSKiller and aswMBR. I opened ComboFix to install the recovery console, which it did. However, ComboFix BSOD'ed, so I restarted, loaded the Recovery Console up in order to try and run FIXMBR there, and recovery console also gave me a BSOD - I believe it was UNMOUNTABLE_BOOT_VOLUME.

Now I'm at the point where I'm out of my comfort zone. So I humbly submit to the experts. Thanks in advance!

DDS below, ark.txt and attach.txt are attached.

DDS (Ver_11-03-05.01) - NTFSx86
Run by matt at 20:23:59.71 on Tue 04/26/2011
Internet Explorer: 7.0.5730.13 BrowserJavaVersion: 1.6.0_24
Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.2038.1018 [GMT -4:00]
AV: Symantec Endpoint Protection *Enabled/Updated* {FB06448E-52B8-493A-90F3-E43226D3305C}
============== Running Processes ===============
C:\WINDOWS\system32\svchost.exe -k DcomLaunch
C:\Program Files\GuardianEdge\GuardianEdge Clients\RemovableStorageService.exe
C:\WINDOWS\system32\svchost.exe -k netsvcs
C:\Program Files\Symantec\Symantec Endpoint Protection\Smc.exe
C:\Program Files\Intel\Wireless\Bin\S24EvMon.exe
C:\Program Files\Common Files\Symantec Shared\ccSvcHst.exe
C:\Program Files\Iron Mountain\Connected BackupPC\AgentService.exe
C:\Program Files\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe
C:\Program Files\Bonjour\mDNSResponder.exe
C:\Program Files\Intel\Wireless\Bin\EvtEng.exe
C:\Program Files\Java\jre6\bin\jqs.exe
C:\Program Files\Common Files\Microsoft Shared\VS7DEBUG\mdm.exe
C:\Program Files\SigmaTel\C-Major Audio\WDM\stsystra.exe
C:\Program Files\Intel\Wireless\Bin\RegSrvc.exe
C:\Program Files\Intel\Wireless\bin\ZCfgSvc.exe
C:\Program Files\Common Files\Symantec Shared\ccApp.exe
C:\Program Files\Adobe\Acrobat 9.0\Acrobat\Acrotray.exe
C:\Program Files\Pointsec\Pointsec for PC\P95Tray.exe
C:\Program Files\Iron Mountain\Connected BackupPC\Agent.exe
C:\Program Files\Common Files\Java\Java Update\jusched.exe
C:\Program Files\GuardianEdge\GuardianEdge Clients\RemovableStorageMgmtService.exe
C:\Program Files\SigmaTel\C-Major Audio\DellXPM_5515v131\WDM\StacSV.exe
C:\WINDOWS\system32\svchost.exe -k imgsvc
C:\Program Files\Symantec\Symantec Endpoint Protection\Rtvscan.exe
C:\Program Files\Intel\Wireless\Bin\WLKeeper.exe
C:\Program Files\Symantec\Symantec Endpoint Protection\SmcGui.exe
C:\Program Files\GuardianEdge\GuardianEdge Clients\EAFRCliManager.exe
C:\Program Files\GuardianEdge\GuardianEdge Clients\RSGUIProvider.exe
C:\Program Files\Intel\Wireless\Bin\Dot1XCfg.exe
C:\Program Files\Mozilla Firefox\firefox.exe
C:\Program Files\Pidgin\pidgin.exe
C:\Documents and Settings\user\Desktop\dds.scr
============== Pseudo HJT Report ===============
uStart Page = https://maxcars.maximus.com/MaxCars/Login.aspx
uInternet Connection Wizard,ShellNext = https://meeting.maximus.com/dana-na/meeting/url_meeting/login_meeting.cgi
uInternet Settings,ProxyOverride = *.local
BHO: Adobe PDF Link Helper: {18df081c-e8ad-4283-a596-fa578c2ebdc3} - c:\program files\common files\adobe\acrobat\activex\AcroIEHelperShim.dll
BHO: Adobe PDF Conversion Toolbar Helper: {ae7cd045-e861-484f-8273-0445ee161910} - c:\program files\common files\adobe\acrobat\activex\AcroIEFavClient.dll
BHO: Java™ Plug-In 2 SSV Helper: {dbc80044-a445-435b-bc74-9c25c1c588a9} - c:\program files\java\jre6\bin\jp2ssv.dll
BHO: JQSIEStartDetectorImpl Class: {e7e6f031-17ce-4c07-bc86-eabfe594f69c} - c:\program files\java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll
BHO: SmartSelect Class: {f4971ee7-daa0-4053-9964-665d8ee6a077} - c:\program files\common files\adobe\acrobat\activex\AcroIEFavClient.dll
TB: Adobe PDF: {47833539-d0c5-4125-9fa8-0819e2eaac93} - c:\program files\common files\adobe\acrobat\activex\AcroIEFavClient.dll
uRun: [ctfmon.exe] c:\windows\system32\ctfmon.exe
mRun: [SigmatelSysTrayApp] %ProgramFiles%\SigmaTel\C-Major Audio\WDM\stsystra.exe
mRun: [HotKeysCmds] c:\windows\system32\hkcmd.exe
mRun: [IntelZeroConfig] "c:\program files\intel\wireless\bin\ZCfgSvc.exe"
mRun: [ccApp] "c:\program files\common files\symantec shared\ccApp.exe"
mRun: [Adobe Acrobat Speed Launcher] "c:\program files\adobe\acrobat 9.0\acrobat\Acrobat_sl.exe"
mRun: [Acrobat Assistant 8.0] "c:\program files\adobe\acrobat 9.0\acrobat\Acrotray.exe"
mRun: [Pointsec Tray] c:\program files\pointsec\pointsec for pc\P95Tray.exe
mRun: [AgentUiRunKey] "c:\program files\iron mountain\connected backuppc\Agent.exe" -ni -sss -e http://localhost:16386/
mRun: [SunJavaUpdateSched] "c:\program files\common files\java\java update\jusched.exe"
dRunOnce: [nltide_3] rundll32 advpack.dll,LaunchINFSectionEx nLite.inf,C,,4,N
mPolicies-system: DisableCAD = 1 (0x1)
dPolicies-explorer: ForceClassicControlPanel = 1 (0x1)
IE: Append Link Target to Existing PDF - c:\program files\common files\adobe\acrobat\activex\AcroIEFavClient.dll/AcroIEAppendSelLinks.html
IE: Append to Existing PDF - c:\program files\common files\adobe\acrobat\activex\AcroIEFavClient.dll/AcroIEAppend.html
IE: Convert Link Target to Adobe PDF - c:\program files\common files\adobe\acrobat\activex\AcroIEFavClient.dll/AcroIECaptureSelLinks.html
IE: Convert to Adobe PDF - c:\program files\common files\adobe\acrobat\activex\AcroIEFavClient.dll/AcroIECapture.html
IE: E&xport to Microsoft Excel - c:\progra~1\micros~3\office12\EXCEL.EXE/3000
IE: {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe
IE: {92780B25-18CC-41C8-B9BE-3C9C571A8263} - {FF059E31-CC5A-4E2E-BF3B-96E929D65503} - c:\progra~1\micros~3\office12\REFIEBAR.DLL
Trusted Zone: bodog.com\sports
Trusted Zone: maximus.com\maxpost
DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} - hxxp://www.update.microsoft.com/microsoftupdate/v6/V5Controls/en/x86/client/muweb_site.cab?1270215371046
DPF: {7530BFB8-7293-4D34-9923-61A11451AFC5} - hxxp://download.eset.com/special/eos-beta/OnlineScanner.cab
DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_24-windows-i586.cab
DPF: {9C5FFF8F-0FE6-47AC-A0E6-85EF424F9D32} - hxxps://maxpost.maximus.com/COM/MOVEitUploadWizard6.0.0.ocx
DPF: {CAFEEFAC-0016-0000-0024-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_24-windows-i586.cab
DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_24-windows-i586.cab
DPF: {E008A543-CEFB-4559-912F-C27C2B89F13B} - hxxps://webmail.maxinc.com/dwa7W.cab
DPF: {E06E2E99-0AA1-11D4-ABA6-0060082AA75C} - hxxps://maximusfinancial.webex.com/client/T27L/webex/ieatgpc.cab
DPF: {E5F5D008-DD2C-4D32-977D-1A0ADF03058B} - hxxps://meeting.maximus.com/dana-cached/setup/JuniperSetupSP1.cab
Notify: ckpNotify - ckpNotify.dll
Notify: EARSWlNotify - EARSWlNotify.dll
Notify: GEWinlogonNotify - GENotify.dll
Notify: igfxcui - igfxdev.dll
SSODL: WPDShServiceObj - {AAA288BA-9A4C-45B0-95D7-94D524869DB5} - c:\windows\system32\WPDShServiceObj.dll
================= FIREFOX ===================
FF - ProfilePath - c:\docume~1\user\applic~1\mozilla\firefox\profiles\wepb57ru.default\
FF - plugin: c:\documents and settings\user\application data\mozilla\plugins\npatgpc.dll
FF - plugin: c:\program files\java\jre6\bin\new_plugin\npdeployJava1.dll
FF - plugin: c:\program files\microsoft silverlight\4.0.60310.0\npctrlui.dll
FF - plugin: c:\program files\mozilla firefox\plugins\npdeployJava1.dll
============= SERVICES / DRIVERS ===============
R0 GEFilter;GEFilter;c:\windows\system32\drivers\EARSFltr.sys [2010-5-26 155648]
R0 GEProtection;GEProtection;c:\windows\system32\drivers\GEProtFltr.sys [2010-8-31 19712]
R0 prot_2k;prot_2k;c:\windows\system32\drivers\prot_2k.sys [2010-2-22 224816]
R2 AgentService;AgentService;c:\program files\iron mountain\connected backuppc\AgentService.exe [2010-7-9 7587232]
R2 ccEvtMgr;Symantec Event Manager;c:\program files\common files\symantec shared\ccSvcHst.exe [2011-4-23 108456]
R2 ccSetMgr;Symantec Settings Manager;c:\program files\common files\symantec shared\ccSvcHst.exe [2011-4-23 108456]
R2 CP_OMDRV;Check Point Office Mode Module;c:\windows\system32\drivers\omdrv.sys [2010-6-22 36400]
R2 Pointsec;Pointsec;c:\windows\system32\Prot_srv.exe [2010-2-22 649776]
R2 Pointsec_start;Pointsec Service Start;c:\windows\system32\pstartSr.exe [2010-2-22 231984]
R2 RemovableStorageService;Removable Storage Service;c:\program files\guardianedge\guardianedge clients\RemovableStorageService.exe [2010-5-26 2732032]
R2 RSMgmtSrvc;Removable Storage Mgmt Service;c:\program files\guardianedge\guardianedge clients\RemovableStorageMgmtService.exe [2010-5-26 8192]
R2 Symantec AntiVirus;Symantec Endpoint Protection;c:\program files\symantec\symantec endpoint protection\Rtvscan.exe [2011-4-23 1839888]
R2 VNASC;Check Point Virtual Network Adapter - SecureClient;c:\windows\system32\drivers\vnasc.sys [2010-6-22 109072]
R2 VPN-1;VPN-1 Module;c:\windows\system32\drivers\vpn.sys [2010-6-22 671408]
R3 EAFRCliManager;EAFRCliManager;c:\program files\guardianedge\guardianedge clients\EAFRCliManager.exe [2010-5-26 266240]
R3 EraserUtilRebootDrv;EraserUtilRebootDrv;c:\program files\common files\symantec shared\eengine\EraserUtilRebootDrv.sys [2010-11-18 102448]
R3 FW1;SecuRemote Miniport;c:\windows\system32\drivers\fw.sys [2010-6-22 2234320]
R3 NAVENG;NAVENG;c:\progra~1\common~1\symant~1\virusd~1\20110426.002\NAVENG.SYS [2011-4-26 86136]
R3 NAVEX15;NAVEX15;c:\progra~1\common~1\symant~1\virusd~1\20110426.002\NAVEX15.SYS [2011-4-26 1393144]
R3 pnetmdm;PdaNet Modem;c:\windows\system32\drivers\pnetmdm.sys [2010-8-31 9472]
S2 clr_optimization_v4.0.30319_32;Microsoft .NET Framework NGEN v4.0.30319_X86;c:\windows\microsoft.net\framework\v4.0.30319\mscorsvw.exe [2010-3-18 130384]
S2 PEVSystemStart;PEVSystemStart;c:\combofix\PEV.cfxxe [2011-4-26 256512]
S3 LV_Tracker;LV_Tracker;c:\windows\system32\drivers\LV_Tracker.sys [2010-7-9 45384]
S3 Netaapl;Apple Mobile Device Ethernet Service;c:\windows\system32\drivers\netaapl.sys [2010-11-15 18432]
S3 WinRM;Windows Remote Management (WS-Management);c:\windows\system32\svchost.exe -k WINRM [2008-4-14 14336]
S3 WPFFontCache_v0400;Windows Presentation Foundation Font Cache;c:\windows\microsoft.net\framework\v4.0.30319\wpf\WPFFontCache_v0400.exe [2010-3-18 753504]
=============== Created Last 30 ================
2011-04-27 00:05:39 -------- d-sha-r- C:\cmdcons
2011-04-27 00:02:30 89088 ----a-w- c:\windows\MBR.exe
2011-04-27 00:02:29 98816 ----a-w- c:\windows\sed.exe
2011-04-27 00:02:29 256512 ----a-w- c:\windows\PEV.exe
2011-04-27 00:02:29 161792 ----a-w- c:\windows\SWREG.exe
2011-04-27 00:01:54 -------- d-s---w- C:\ComboFix
2011-04-26 21:38:24 73728 ----a-w- c:\windows\system32\javacpl.cpl
2011-04-26 21:38:24 472808 ----a-w- c:\program files\mozilla firefox\plugins\npdeployJava1.dll
2011-04-26 21:29:28 -------- d-----w- C:\MGtools
2011-04-26 21:21:05 2418162 ----a-w- C:\MGtools.exe
2011-04-26 15:11:37 -------- d-----w- c:\program files\Spybot - Search & Destroy
2011-04-26 15:11:37 -------- d-----w- c:\docume~1\alluse~1\applic~1\Spybot - Search & Destroy
2011-04-26 03:31:08 -------- d-----w- c:\docume~1\user\applic~1\Malwarebytes
2011-04-26 03:31:01 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2011-04-26 03:31:01 -------- d-----w- c:\docume~1\alluse~1\applic~1\Malwarebytes
2011-04-26 03:30:58 20952 ----a-w- c:\windows\system32\drivers\mbam.sys
2011-04-26 03:30:58 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
2011-04-26 03:11:35 388096 ----a-r- c:\docume~1\user\applic~1\microsoft\installer\{45a66726-69bc-466b-a7a4-12fcba4883d7}\HiJackThis.exe
2011-04-26 03:11:34 -------- d-----w- c:\program files\Trend Micro
2011-04-23 19:55:58 87456 ----a-w- c:\windows\system32\FwsVpn.dll
2011-04-23 19:55:58 43768 ----a-w- c:\windows\system32\drivers\srtspx.sys
2011-04-23 19:55:58 321016 ----a-w- c:\windows\system32\drivers\srtspl.sys
2011-04-23 19:55:58 107936 ----a-w- c:\windows\system32\SymVPN.dll
2011-04-23 19:55:57 287352 ----a-w- c:\windows\system32\drivers\srtsp.sys
==================== Find3M ====================
2011-04-27 00:11:36 17408 ----a-w- c:\windows\system32\rpcnetp.exe
2011-04-27 00:11:32 57752 ----a-w- c:\windows\system32\rpcnet.dll
2011-04-26 21:38:09 472808 ----a-w- c:\windows\system32\deployJava1.dll
2011-04-23 19:59:37 60808 ----a-w- c:\windows\system32\S32EVNT1.DLL
2011-03-04 06:45:07 434176 ----a-w- c:\windows\system32\vbscript.dll
2011-03-03 13:21:11 1857920 ----a-w- c:\windows\system32\win32k.sys
2011-02-17 19:00:29 832512 ----a-w- c:\windows\system32\wininet.dll
2011-02-17 19:00:28 78336 ----a-w- c:\windows\system32\ieencode.dll
2011-02-17 19:00:28 1830912 ------w- c:\windows\system32\inetcpl.cpl
2011-02-17 19:00:27 17408 ----a-w- c:\windows\system32\corpol.dll
2011-02-17 12:32:12 5120 ----a-w- c:\windows\system32\xpsp4res.dll
2011-02-17 11:44:16 389120 ----a-w- c:\windows\system32\html.iec
2011-02-15 20:33:42 34816 ----a-w- c:\windows\system32\identprv.dll
2011-02-15 12:56:39 290432 ----a-w- c:\windows\system32\atmfd.dll
2011-02-09 13:53:52 270848 ----a-w- c:\windows\system32\sbe.dll
2011-02-09 13:53:52 186880 ----a-w- c:\windows\system32\encdec.dll
2011-02-08 13:33:55 978944 ----a-w- c:\windows\system32\mfc42.dll
2011-02-08 13:33:55 974848 ----a-w- c:\windows\system32\mfc42u.dll
2011-02-02 07:58:35 2067456 ----a-w- c:\windows\system32\mstscax.dll
2011-01-27 11:57:06 677888 ----a-w- c:\windows\system32\mstsc.exe
=================== ROOTKIT ====================
Stealth MBR rootkit/Mebroot/Sinowal/TDL4 detector 0.4.2 by Gmer, http://www.gmer.net
Windows 5.1.2600 Disk: Hitachi_HTS722080K9A300 rev.DCBOCA1H -> Harddisk0\DR0 -> \Device\Ide\IdeDeviceP1T0L0-e
device: opened successfully
user: MBR read successfully
Disk trace:
called modules: ntkrnlpa.exe CLASSPNP.SYS disk.sys >>UNKNOWN [0x89CEB4F0]<<
_asm { PUSH EBP; MOV EBP, ESP; PUSH ECX; MOV EAX, [EBP+0x8]; CMP EAX, [0x89cf17d0]; MOV EAX, [0x89cf184c]; PUSH EBX; PUSH ESI; MOV ESI, [EBP+0xc]; MOV EBX, [ESI+0x60]; PUSH EDI; JNZ 0x20; MOV [EBP+0x8], EAX; }
1 ntkrnlpa!IofCallDriver[0x804EF1A6] -> \Device\Harddisk0\DR0[0x89DE5AB8]
3 CLASSPNP[0xBA108FD7] -> ntkrnlpa!IofCallDriver[0x804EF1A6] -> [0x89CCECF0]
\Driver\atapi[0x89DB9AE8] -> IRP_MJ_CREATE -> 0x89CEB4F0
error: Read A device attached to the system is not functioning.
kernel: MBR read successfully
_asm { JMP 0x1c; }
detected disk devices:
detected hooks:
\Driver\atapi DriverStartIo -> 0x89CEB33B
user & kernel MBR OK
Warning: possible TDL3 rootkit infection !
============= FINISH: 20:25:26.95 ===============

I was able to fix this myself, but if an expert would like to check some logs and help me with cleanup, that would be greatly appreciated.

Again, I did not click on any fake anti-virus/recovery links. I was on a public wifi (hotel wifi), but I believe this infection was delivered via a java exploit, which certainly scares me.

I had the following symptoms:

TDSSKiller would crash after loading 80%
aswMBR would detect and error, but was unable to fix
MBRCheck found suspicious MBR, claimed to fix my MBR, but it was still infected after reboot

ESET scanner did not detect any infections. Spybot found click.giftload, but that's it. Malwarebytes found some registry keys that turned off anti-virus, but that's it (and they kept popping up). Symanetec Anti Virus was entirely useless in this entire ordeal.

I ran combofix in order to install the recovery console, but I would receive a BSOD after combofix began scanning (IRQL_NOT_LESS_THAN), as well as a BSOD when trying to load the installed Recovery Console (UNMOUNTABLE_BOOT_VOLUME). I tried to create a recovery CD, but when loading that, I received a BSOD related to pci.sys. I thought I was stuck.

The rootkit was redirecting my search engine links to various websites, as well as randomly opening tabs. Svchost.exe would accrue a large memory footrint and would occassionally cause a crash in General Host 32 (I think). My startup also took much longer than normal. Other than that, computer was functioning as normal.

When I ran RKUnhooker, I noticed a driver entitled ?_empty_? which the atapi.sys referenced, which I imagine how this effer got hooked in.

Two bleepingcomputer links helped me


This guide helped me identify exactly what was wrong with my computer. Once I was able to duplicate my MBR pre-boot, the VirusTotal scan produced many hits. If I scanned my post-boot MBR dump, Virustotal did not pick up any infections.

Here's my pre-boot MBR scan which picked up the infections - I'm wondering if the boo/TDSS.m is causing the combofix BSODs


The post-boot MBR was clean


This link provided me a boot tool which allowed me to fix my MBR without BSOD - since I couldn't load recovery console without BSOD, I couldn't run FIXMBR there.


I can now run TDSSKiller and it scans fine. MBRCheck scans fine. Malwarebytes and ESET are ok with my system. I feel good after spending about 24 hours researching and fighting this bad boy.

EDIT: Posts merged ~Budapest

Attached Files

Edited by Budapest, 30 April 2011 - 01:08 AM.

BC AdBot (Login to Remove)


#2 m0le


    Can U Dig It?

  • Malware Response Team
  • 34,527 posts
  • Gender:Male
  • Location:London, UK
  • Local time:01:46 AM

Posted 04 May 2011 - 06:45 PM


Welcome to Bleeping Computer. My name is m0le and I will be helping you with your log.
  • Please subscribe to this topic, if you haven't already. Click the Watch This Topic button at the top on the right.

  • Please avoid installing/uninstalling or updating any programs and attempting any unsupervised fixes or scans. This can make helping you impossible.

  • Please reply to this post so I know you are there.
The forum is busy and we need to have replies as soon as possible. If I haven't had a reply after 3 days I will bump the topic and if you do not reply by the following day after that then I will close the topic.

Once I receive a reply then I will return with your first instructions.

Thanks :thumbup2:
Posted Image
m0le is a proud member of UNITE

#3 djiddish98

  • Topic Starter

  • Members
  • 7 posts
  • Local time:08:46 PM

Posted 04 May 2011 - 07:35 PM

Thanks for checking in. I assume you want new runs of all the logs - let me know what you'd like to look at and I can post.

#4 m0le


    Can U Dig It?

  • Malware Response Team
  • 34,527 posts
  • Gender:Male
  • Location:London, UK
  • Local time:01:46 AM

Posted 04 May 2011 - 07:53 PM

It seems like you've got a handle on this. We can't condone the use of Combofix - it should only be run with support from a helper though as it can cause your machine real problems.

I don't want to see a full run of logs but would like to see an MBAM and ESET scan

Please download Posted Image Malwarebytes Anti-Malware and save it to your desktop.
  • Make sure you are connected to the Internet.
  • Double-click on mbam-setup.exe to install the application or, if you are using Vista, right-click and select Run As Administrator on mbam-setup.exe to install the application.
  • When the installation begins, follow the prompts and do not make any changes to default settings.
  • When installation has finished, make sure you leave both of these checked:
    • Update Malwarebytes' Anti-Malware
    • Launch Malwarebytes' Anti-Malware
  • Then click Finish.
  • MBAM will automatically start and you will be asked to update the program before performing a scan. If an update is found, the program will automatically update itself. Press the OK button to close that box and continue.
    If MBAM won't update then download and update MBAM on a clean computer then save the rules.ref folder to a memory stick. This file is found here: 'C:\Documents and Settings\All Users\Application Data\Malwarebytes\Malwarebytes' Anti-Malware' then transfer it across to the infected computer.
  • On the Scanner tab:
    • Make sure the "Perform Full Scan" option is selected.
    • Then click on the Scan button.
  • If asked to select the drives to scan, leave all the drives selected and click on the Start Scan button.
  • The scan will begin and "Scan in progress" will show at the top. It may take some time to complete so please be patient.
  • When the scan is finished, a message box will say "The scan completed successfully. Click 'Show Results' to display all objects found".
  • Click OK to close the message box and continue with the removal process.
  • Back at the main Scanner screen, click on the Show Results button to see a list of any malware that was found.
  • Make sure that everything is checked, and click Remove Selected.
  • When removal is completed, a log report will open in Notepad.
  • The log is automatically saved and can be viewed by clicking the Logs tab in MBAM.
  • Copy and paste the contents of that report in your next reply and exit MBAM.
Note: If MBAM encounters a file that is difficult to remove, you may be asked to reboot your computer so it can proceed with the disinfection process. Regardless if prompted to restart the computer or not, please do so immediately. Failure to reboot normally (not into safe mode) will prevent MBAM from removing all the malware. MBAM may make changes to your registry as part of its disinfection routine. If you're using other security programs that detect registry changes, they may alert you after scanning with MBAM. Please permit the program to allow the changes.


I'd like us to scan your machine with ESET OnlineScan
  • Hold down Control and click on the following link to open ESET OnlineScan in a new window.
    ESET OnlineScan
  • Click the Posted Image button.
  • For alternate browsers only: (Microsoft Internet Explorer users can skip these steps)
    • Click on Posted Image to download the ESET Smart Installer. Save it to your desktop.
    • Double click on the Posted Image icon on your desktop.
  • Check Posted Image
  • Click the Posted Image button.
  • Accept any security warnings from your browser.
  • Under scan settings, check Posted Image and check Remove found threats
  • Click Advanced settings and select the following:
    • Scan potentially unwanted applications
    • Scan for potentially unsafe applications
    • Enable Anti-Stealth technology
  • ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this can take some time.
  • When the scan completes, push Posted Image
  • Push Posted Image, and save the file to your desktop using a unique name, such as ESETScan. Include the contents of this report in your next reply.
  • Push the Posted Image button.
  • Push Posted Image
If no log is generated that means nothing was found. Please let me know if this happens.
Posted Image
m0le is a proud member of UNITE

#5 djiddish98

  • Topic Starter

  • Members
  • 7 posts
  • Local time:08:46 PM

Posted 05 May 2011 - 10:01 AM


Malwarebytes' Anti-Malware

Database version: 6444

Windows 5.1.2600 Service Pack 3
Internet Explorer 7.0.5730.13

4/25/2011 11:45:03 PM
mbam-log-2011-04-25 (23-45-03).txt

Scan type: Quick scan
Objects scanned: 167885
Time elapsed: 10 minute(s), 48 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 1
Registry Data Items Infected: 2
Folders Infected: 0
Files Infected: 0

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\ForceClassicControlPanel (Hijack.ControlPanelStyle) -> Value: ForceClassicControlPanel -> Quarantined and deleted successfully.

Registry Data Items Infected:
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\StartMenuLogoff (PUM.Hijack.StartMenu) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\AntiVirusDisableNotify (PUM.Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.

Folders Infected:
(No malicious items detected)

Files Infected:
(No malicious items detected)


C:\Documents and Settings\user\Local Settings\Application Data\Mozilla\Firefox\Profiles\wepb57ru.default\Cache\D\4B\DA053d01 HTML/ScrInject.B.Gen virus
C:\MGtools\Process.exe Win32/PrcView application


With regards to Combofix - I was trying to only use it to install the recovery console (in my attempt to run FIXMBR). However, it didn't give me the option to stop after that, so I got a scan/BSOD.


#6 m0le


    Can U Dig It?

  • Malware Response Team
  • 34,527 posts
  • Gender:Male
  • Location:London, UK
  • Local time:01:46 AM

Posted 05 May 2011 - 03:53 PM

Just the usual remnants from a malware infection. Registry entries which are useless without files and the infected file which started the whole thing off.

Please run Superantispyware next

Download and scan with SUPERAntiSpyware Free for Home Users
  • Double-click SUPERAntiSpyware.exe and use the default settings for installation.
  • An icon will be created on your desktop. Double-click that icon to launch the program.
  • If asked to update the program definitions, click "Yes". If not, update the definitions before scanning by selecting "Check for Updates". (If you encounter any problems while downloading the updates, manually download them from here. Double-click on the hyperlink for Download Installer and save SASDEFINITIONS.EXE to your desktop. Then double-click on SASDEFINITIONS.EXE to install the definitions.)
  • In the Main Menu, click the Preferences... button.
  • Click the Scanning Control tab.
  • Under Scanner Options make sure the following are checked (leave all others unchecked):
    • Close browsers before scanning.
    • Scan for tracking cookies.
    • Terminate memory threats before quarantining.
  • Click the "Close" button to leave the control center screen.
  • Back on the main screen, under "Scan for Harmful Software" click Scan your computer.
  • On the left, make sure you check C:\Fixed Drive.
  • On the right, under "Complete Scan", choose Perform Complete Scan.
  • Click "Next" to start the scan. Please be patient while it scans your computer.
  • After the scan is complete, a Scan Summary box will appear with potentially harmful items that were detected. Click "OK".
  • Make sure everything has a checkmark next to it and click "Next".
  • A notification will appear that "Quarantine and Removal is Complete". Click "OK" and then click the "Finish" button to return to the main menu.
  • If asked if you want to reboot, click "Yes".
  • To retrieve the removal information after reboot, launch SUPERAntispyware again.
    • Click Preferences, then click the Statistics/Logs tab.
    • Under Scanner Logs, double-click SUPERAntiSpyware Scan Log.
    • If there are several logs, click the current dated log and press View log. A text file will open in your default text editor.
    • Please copy and paste the Scan Log results in your next reply.
  • Click Close to exit the program.

Posted Image
m0le is a proud member of UNITE

#7 djiddish98

  • Topic Starter

  • Members
  • 7 posts
  • Local time:08:46 PM

Posted 06 May 2011 - 06:26 AM

Here's the SUPERAntiSpyware Log - How did this thing even get on my computer? Could there be a java exploit that can be run simply by loading a page? Also, should I avoid Hotel, semi-public wifi? Thanks!

SUPERAntiSpyware Scan Log

Generated 05/05/2011 at 10:39 PM

Application Version : 4.52.1000

Core Rules Database Version : 6999
Trace Rules Database Version: 4811

Scan type : Complete Scan
Total Scan Time : 01:39:58

Memory items scanned : 764
Memory threats detected : 0
Registry items scanned : 6125
Registry threats detected : 1
File items scanned : 104996
File threats detected : 255

Adware.Tracking Cookie
C:\Documents and Settings\user\Cookies\matt@pointroll[2].txt
C:\Documents and Settings\user\Cookies\matt@www.find-quick-results[1].txt
C:\Documents and Settings\user\Cookies\matt@ads.undertone[1].txt
C:\Documents and Settings\user\Cookies\matt@imrworldwide[2].txt
C:\Documents and Settings\user\Cookies\matt@advertise[1].txt
C:\Documents and Settings\user\Cookies\matt@invitemedia[1].txt
C:\Documents and Settings\user\Cookies\matt@a1.interclick[1].txt
C:\Documents and Settings\user\Cookies\matt@eset.122.2o7[1].txt
C:\Documents and Settings\user\Cookies\matt@interclick[2].txt
C:\Documents and Settings\user\Cookies\matt@legolas-media[2].txt
C:\Documents and Settings\LocalService\Cookies\system@247realmedia[1].txt
C:\Documents and Settings\LocalService\Cookies\system@2o7[2].txt
C:\Documents and Settings\LocalService\Cookies\system@ad.yieldmanager[1].txt
C:\Documents and Settings\LocalService\Cookies\system@adbrite[1].txt
C:\Documents and Settings\LocalService\Cookies\system@ads.addynamix[1].txt
C:\Documents and Settings\LocalService\Cookies\system@ads.bighealthtree[1].txt
C:\Documents and Settings\LocalService\Cookies\system@ads.financialcontent[2].txt
C:\Documents and Settings\LocalService\Cookies\system@ads.pointroll[2].txt
C:\Documents and Settings\LocalService\Cookies\system@ads.pubmatic[1].txt
C:\Documents and Settings\LocalService\Cookies\system@adserver.adtechus[1].txt
C:\Documents and Settings\LocalService\Cookies\system@advertising[2].txt
C:\Documents and Settings\LocalService\Cookies\system@adxpose[1].txt
C:\Documents and Settings\LocalService\Cookies\system@apmebf[2].txt
C:\Documents and Settings\LocalService\Cookies\system@ar.atwola[1].txt
C:\Documents and Settings\LocalService\Cookies\system@at.atwola[2].txt
C:\Documents and Settings\LocalService\Cookies\system@atdmt[1].txt
C:\Documents and Settings\LocalService\Cookies\system@bizzclick[1].txt
C:\Documents and Settings\LocalService\Cookies\system@burstnet[1].txt
C:\Documents and Settings\LocalService\Cookies\system@cdn.jemamedia[1].txt
C:\Documents and Settings\LocalService\Cookies\system@cdn1.trafficmp[1].txt
C:\Documents and Settings\LocalService\Cookies\system@collective-media[1].txt
C:\Documents and Settings\LocalService\Cookies\system@content.yieldmanager[1].txt
C:\Documents and Settings\LocalService\Cookies\system@content.yieldmanager[3].txt
C:\Documents and Settings\LocalService\Cookies\system@dc.tremormedia[1].txt
C:\Documents and Settings\LocalService\Cookies\system@digitalentertainment.122.2o7[1].txt
C:\Documents and Settings\LocalService\Cookies\system@doubleclick[2].txt
C:\Documents and Settings\LocalService\Cookies\system@fastclick[1].txt
C:\Documents and Settings\LocalService\Cookies\system@imrworldwide[2].txt
C:\Documents and Settings\LocalService\Cookies\system@insightexpressai[1].txt
C:\Documents and Settings\LocalService\Cookies\system@invitemedia[2].txt
C:\Documents and Settings\LocalService\Cookies\system@lucidmedia[1].txt
C:\Documents and Settings\LocalService\Cookies\system@media6degrees[2].txt
C:\Documents and Settings\LocalService\Cookies\system@mediabrandsww[1].txt
C:\Documents and Settings\LocalService\Cookies\system@mediaplex[2].txt
C:\Documents and Settings\LocalService\Cookies\system@mtvn.112.2o7[1].txt
C:\Documents and Settings\LocalService\Cookies\system@pointroll[2].txt
C:\Documents and Settings\LocalService\Cookies\system@questionmarket[2].txt
C:\Documents and Settings\LocalService\Cookies\system@realmedia[2].txt
C:\Documents and Settings\LocalService\Cookies\system@revsci[2].txt
C:\Documents and Settings\LocalService\Cookies\system@ru4[1].txt
C:\Documents and Settings\LocalService\Cookies\system@search.clicksclick[1].txt
C:\Documents and Settings\LocalService\Cookies\system@search.clicksthe[1].txt
C:\Documents and Settings\LocalService\Cookies\system@search.clicksthis[2].txt
C:\Documents and Settings\LocalService\Cookies\system@search.orfind[1].txt
C:\Documents and Settings\LocalService\Cookies\system@search.toseeking[1].txt
C:\Documents and Settings\LocalService\Cookies\system@serving-sys[1].txt
C:\Documents and Settings\LocalService\Cookies\system@sportingnews.122.2o7[1].txt
C:\Documents and Settings\LocalService\Cookies\system@t.pointroll[1].txt
C:\Documents and Settings\LocalService\Cookies\system@tacoda.at.atwola[1].txt
C:\Documents and Settings\LocalService\Cookies\system@trafficengine[1].txt
C:\Documents and Settings\LocalService\Cookies\system@trafficmp[2].txt
C:\Documents and Settings\LocalService\Cookies\system@tribalfusion[2].txt
C:\Documents and Settings\LocalService\Cookies\system@viacom.adbureau[2].txt
C:\Documents and Settings\LocalService\Cookies\system@viewablemedia[2].txt
C:\Documents and Settings\LocalService\Cookies\system@www.burstbeacon[1].txt
C:\Documents and Settings\LocalService\Cookies\system@www.burstnet[1].txt
C:\Documents and Settings\LocalService\Cookies\system@yieldmanager[1].txt
C:\Documents and Settings\LocalService\Cookies\system@zedo[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@247realmedia[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@2o7[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@a1.interclick[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@ad.yieldmanager[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@ad.yieldmanager[3].txt
C:\Documents and Settings\NetworkService\Cookies\system@adbrite[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@admarketplace[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@ads.addynamix[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@ads.ask[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@ads.associatedcontent[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@ads.bighealthtree[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@ads.blogtalkradio[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@ads.cpxadroit[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@ads.financialcontent[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@ads.lycos[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@ads.pointroll[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@ads.pubmatic[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@ads.pureleads[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@ads.react2media[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@ads.undertone[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@adserver.adtechus[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@adserver.valwa[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@adtechus[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@adtech[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@advertisefirst[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@advertise[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@advertising[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@advertising[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@adx.bidsystem[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@adxpose[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@affiliate.gmtracker[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@amtk-media[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@andomedia[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@apmebf[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@apmebf[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@ar.atwola[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@associatedcontent.112.2o7[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@at.atwola[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@atdmt[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@atwola[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@beacon.dmsinsights[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@bizzclick[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@bridge2.admarketplace[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@bs.serving-sys[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@burstbeacon[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@burstnet[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@businessfind[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@buycom.122.2o7[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@casalemedia[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@cdn.jemamedia[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@cdn1.trafficmp[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@citi.bridgetrack[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@click.fastpartner[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@clickkick[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@clicks.thespecialsearch[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@clicks.thespecialsearch[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@clicksor[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@clickthrough.kanoodle[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@collective-media[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@collective-media[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@content.yieldmanager[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@content.yieldmanager[3].txt
C:\Documents and Settings\NetworkService\Cookies\system@counters.gigya[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@crackle[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@dc.tremormedia[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@dealfind[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@dealtime[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@digitalentertainment.122.2o7[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@doubleclick[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@eas.apm.emediate[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@educationcom.112.2o7[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@educationsuccess.122.2o7[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@ehg-players.hitbox[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@ehg-wss.hitbox[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@enhance[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@enhance[3].txt
C:\Documents and Settings\NetworkService\Cookies\system@eyewonder[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@fastclick[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@fbogroup.122.2o7[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@findology[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@friendfinder[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@gotacha.rotator.hadj7.adjuggler[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@headcountmgmt[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@hitbox[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@imrworldwide[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@in.getclicky[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@indieclick[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@insightexpressai[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@interclick[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@intermundomedia[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@invitemedia[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@invitemedia[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@kontera[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@legolas-media[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@liveperson[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@liveperson[3].txt
C:\Documents and Settings\NetworkService\Cookies\system@liveperson[4].txt
C:\Documents and Settings\NetworkService\Cookies\system@lucidmedia[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@lucidmedia[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@lucidmedia[3].txt
C:\Documents and Settings\NetworkService\Cookies\system@media6degrees[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@media6degrees[3].txt
C:\Documents and Settings\NetworkService\Cookies\system@mediabrandsww[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@mediaforceltd.go2jump[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@mediaplex[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@mediaplex[3].txt
C:\Documents and Settings\NetworkService\Cookies\system@mediatraffic[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@mm.chitika[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@mm.chitika[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@msite.martiniadnetwork[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@mtvn.112.2o7[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@myroitracking[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@network.realmedia[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@optimize.indieclick[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@overture[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@p354t1s3578352.kronos.bravenetmedia[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@p373t1s2877920.kronos.bravenetmedia[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@pfizer.122.2o7[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@pointroll[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@pro-market[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@questionmarket[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@questionmarket[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@rcntelecom.112.2o7[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@realmedia[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@revenue[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@revsci[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@ru4[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@sales.liveperson[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@search.321findit[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@search.amazeclick[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@search.boltfind[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@search.clickbowl[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@search.clickcheer[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@search.clicksclick[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@search.clicksfind[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@search.clicksthe[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@search.clicksthis[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@search.clickwhale[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@search.findsmy[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@search.hippofind[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@search.orfind[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@search.seekfinds[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@search.toseeking[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@searchnet.chitika[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@server.cpmstar[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@server.iad.liveperson[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@serving-sys[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@shefinds[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@specificclick[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@specificmedia[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@stat.dealtime[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@statcounter[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@statse.webtrendslive[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@surfaccuracy[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@t.pointroll[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@tacoda.at.atwola[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@theclickcheck[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@tracking.waterfrontmedia[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@traffic.buyservices[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@trafficengine[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@trafficking.nabbr[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@trafficmp[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@traveladvertising[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@tribalfusion[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@uiadserver[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@user.lucidmedia[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@viacom.adbureau[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@viewablemedia[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@www.burstbeacon[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@www.burstnet[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@www.businessfind[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@www.crackle[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@www.dealfind[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@www.find-quick-results[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@www.findeven[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@www.finditquick[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@www.findsearchengineresults[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@www.findstuff[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@www.icityfind[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@www.mediatraffic[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@www.plomedia[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@www.shefinds[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@www.trackimizer[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@xml.trafficengine[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@yieldmanager[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@zedo[1].txt
secure-us.imrworldwide.com [ C:\Documents and Settings\user\Application Data\Macromedia\Flash Player\#SharedObjects\UY677JFF ]


#8 m0le


    Can U Dig It?

  • Malware Response Team
  • 34,527 posts
  • Gender:Male
  • Location:London, UK
  • Local time:01:46 AM

Posted 06 May 2011 - 08:11 PM

This explains the ways that infection can spread.


From what you have decribed, you are right that you had a variant of TDSS, probably TDL4 and this is why you were getting BSOD with Combofix and also why TDSSKiller was stalling.

The cleaning up that I have been doing with you is just the tail-end of the infection. Is the machine experiencing any problems currently?
Posted Image
m0le is a proud member of UNITE

#9 djiddish98

  • Topic Starter

  • Members
  • 7 posts
  • Local time:08:46 PM

Posted 07 May 2011 - 08:29 AM

The computer is showing no signs of the infection - fixing the MBR was the solution.


#10 m0le


    Can U Dig It?

  • Malware Response Team
  • 34,527 posts
  • Gender:Male
  • Location:London, UK
  • Local time:01:46 AM

Posted 07 May 2011 - 08:30 AM

Yes, I think so. Let's clear up then...

You're clean. Good stuff! :thumbup2:

Let's do some clearing up

Uninstall ComboFix

Remove Combofix now that we're done with it.
  • Please press the Windows Key and R on your keyboard. This will bring up the Run... command.
    (For Vista/Windows 7 please click Start -> All Programs -> Accessories -> Run)
  • Now type in Combofix /Uninstall in the runbox and click OK. (Notice the space between "Combofix" and "/")
  • Please follow the prompts to uninstall Combofix.
  • You will then receive a message saying Combofix was uninstalled successfully once it's done uninstalling itself.
This will uninstall Combofix and anything associated with it.

We Need to Clean Up our Mess
Download and Run OTC

We will now remove the tools we used during this fix using OTC.

  • Download OTC by OldTimer and save it to your desktop.
  • Double click Posted Image icon to start the program. If you are using Vista, please right-click and choose run as administrator
  • Then Click the big Posted Image button.
  • You will get a prompt saying "Being Cleanup Process". Please select Yes.
  • Restart your computer when prompted.
If you still have any tools or logs leftover on your computer you can go ahead and delete those off of your computer now.

Here's some advice on how you can keep your PC clean

Use and update your AntiVirus Software

You must have a good antivirus. There are plenty to choose from but I personally recommend the free options of Avast and Avira Antivir. If you want to purchase a security program then I recommend any of the following: AVG, Norton, McAfee, Kaspersky and ESET Nod32.

It is imperative that you update your Antivirus software at least once a week (Even more if you wish). If you do not update your antivirus software then it will not be able to catch any of the new variants that may come out. If you use a commercial antivirus program you must make sure you keep renewing your subscription. Otherwise, once your subscription runs out, you may not be able to update the programs virus definitions.

Make sure your applications have all of their updates

Use this next program to check for updates for programs already on your system. Download Security Check by screen317 from here or here.

  • Save it to your Desktop.
  • Double click SecurityCheck.exe and follow the onscreen instructions inside of the black box.
  • A Notepad document should open automatically, make sure that updates on any that are flagged are carried out as soon as possible

It is also possible for other programs on your computer to have security vulnerability that can allow malware to infect you. Therefore, it is also a good idea to check for the latest versions of commonly installed applications that are regularly patched to fix vulnerabilities. You can check these by visiting Secunia Software Inspector and Calendar of Updates.

Install an AntiSpyware Program

A highly recommended AntiSpyware program is SuperAntiSpyware. You can download the free Home Version. or the Pro version for a 15 day trial period.

Installing this or another recommended program will provide spyware & hijacker protection on your computer alongside your virus protection. You should scan your computer with an AntiSpyware program on a regular basis just as you would an antivirus software.

Finally, here's a treasure trove of antivirus, antimalware and antispyware resources

That's it, happy surfing!


Posted Image
m0le is a proud member of UNITE

#11 djiddish98

  • Topic Starter

  • Members
  • 7 posts
  • Local time:08:46 PM

Posted 07 May 2011 - 08:57 AM

Thanks for all the help m0le. Good luck with your future clients!

#12 m0le


    Can U Dig It?

  • Malware Response Team
  • 34,527 posts
  • Gender:Male
  • Location:London, UK
  • Local time:01:46 AM

Posted 07 May 2011 - 09:02 AM

Thanks :thumbup2:
Posted Image
m0le is a proud member of UNITE

#13 m0le


    Can U Dig It?

  • Malware Response Team
  • 34,527 posts
  • Gender:Male
  • Location:London, UK
  • Local time:01:46 AM

Posted 11 May 2011 - 07:35 PM

It appears that this issue is resolved, therefore I am closing the topic. If that is not the case and you need or wish to continue with this topic, please send me or any Moderator a Personal Message (PM) that you would like this topic re-opened.
Posted Image
m0le is a proud member of UNITE

0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users