Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Repeat Attacks From \device\harddiskvolume1\program files\mozilla firefox\firefox.exe


  • This topic is locked This topic is locked
3 replies to this topic

#1 Sp1

Sp1

  • Members
  • 2 posts
  • OFFLINE
  •  
  • Local time:03:44 AM

Posted 16 June 2011 - 03:46 AM

Today being a bit cautious I did a few general Google Searches and it seems the constant attack warnings had stopped. But then I tried to enter one of my normal sites and it seemed the virus/trogen or whatever it is tried to re-direct me to a Fake App. Again the website and IP address was different than before but once again I recieved this warning

THE ATTACK WAS RESULTED FROM \DEVICE\HARDDISKVOLUME1\PROGRAMFILES\MOZILLAFIREFOX\FIREFOX.EXE

So now being something at a loss I would very much appreciate any help you guys at Bleeping Computer can offer. I have followed the Preparation Guide For Use Before Using Malware Removal Tools and Requesting Help and have pasted the DDS log below plus I have attached the DDS, GMER files and a copy of today's Norton Attack Report.

if I have missed anything out please let me know.

Thanks,


.
DDS (Ver_2011-06-12.02) - NTFSx86
Internet Explorer: 7.0.5730.11
Run by Head Quartrers at 17:37:04 on 2011-06-16
Microsoft Windows XP Professional 5.1.2600.2.1252.1.1033.18.639.96 [GMT 10:00]
.
.
============== Running Processes ===============
.
C:\WINDOWS\system32\svchost -k DcomLaunch
svchost.exe
C:\WINDOWS\System32\svchost.exe -k netsvcs
C:\WINDOWS\System32\svchost.exe -k netsvcs
C:\WINDOWS\Explorer.EXE
C:\Program Files\Norton Internet Security\Engine\17.8.0.5\ccSvcHst.exe
C:\Program Files\Venturi\Client\ventc.exe
C:\Program Files\Venturi\squid\ventcsquid.exe
C:\Program Files\Venturi\squid\ventcdnsserver.exe
C:\Program Files\Venturi\squid\ventcdnsserver.exe
C:\Program Files\Venturi\squid\ventcdnsserver.exe
C:\Program Files\Venturi\squid\ventcdnsserver.exe
C:\Program Files\Venturi\squid\ventcdnsserver.exe
C:\Program Files\Venturi\squid\ventcdnsserver.exe
C:\Program Files\Venturi\squid\ventcunlinkd.exe
C:\WINDOWS\system32\wscntfy.exe
C:\Program Files\Norton Internet Security\Engine\17.8.0.5\ccSvcHst.exe
C:\Program Files\Venturi\Configurator\ventcfg.exe
svchost.exe
C:\Program Files\Mozilla Firefox\firefox.exe
C:\Documents and Settings\Head Quartrers\Application Data\Mozilla\Firefox\Profiles\yxghx9pk.default\extensions\{E173B749-DB5B-4fd2-BA0E-94ECEA0CA55B}\components\afom.exe
C:\WINDOWS\system32\svchost.exe -k imgsvc
.
============== Pseudo HJT Report ===============
.
uStart Page = hxxp://www.msn.com
mStart Page = hxxp://www.msn.com
BHO: Symantec NCO BHO: {602adb0e-4aff-4217-8aa1-95dac4dfa408} - c:\program files\norton internet security\engine\17.8.0.5\coIEPlg.dll
BHO: Symantec Intrusion Prevention: {6d53ec84-6aae-4787-aeee-f4628f01010c} - c:\program files\norton internet security\engine\17.8.0.5\IPSBHO.DLL
TB: Norton Toolbar: {7febefe3-6b19-4349-98d2-ffb09d4b49ca} - c:\program files\norton internet security\engine\17.8.0.5\coIEPlg.dll
mRun: [Venturi Configurator] c:\program files\venturi\configurator\ventcfg.exe -nomsgbox
TCP: DhcpNameServer = 220.101.191.16 220.101.191.17 125.63.255.11 125.63.255.74
TCP: Interfaces\{7DA2A7FC-DE0A-43E2-A73B-185DE3B6400E} : DhcpNameServer = 220.101.191.16 220.101.191.17 125.63.255.11 125.63.255.74
Handler: cdo - {CD00020A-8B95-11D1-82DB-00C04FB1625D} - c:\program files\common files\microsoft shared\web folders\PKMCDO.DLL
Notify: LBTWlgn - c:\program files\common files\logishrd\bluetooth\LBTWlgn.dll
SSODL: WPDShServiceObj - {AAA288BA-9A4C-45B0-95D7-94D524869DB5} - c:\windows\system32\wpdshserviceobj.dll
Hosts: 127.0.0.1 www.spywareinfo.com
.
================= FIREFOX ===================
.
FF - ProfilePath - c:\documents and settings\head quartrers\application data\mozilla\firefox\profiles\yxghx9pk.default\
.
---- FIREFOX POLICIES ----
FF - user.js: browser.cache.memory.capacity - 16000
FF - user.js: browser.chrome.favicons - false
FF - user.js: browser.display.show_image_placeholders - true
FF - user.js: browser.turbo.enabled - true
FF - user.js: browser.urlbar.autocomplete.enabled - true
FF - user.js: browser.urlbar.autofill - true
FF - user.js: browser.urlbar.hideGoButton -
FF - user.js: content.max.tokenizing.time - 2250000
FF - user.js: content.maxtextrun - 4095
FF - user.js: content.notify.backoffcount - 5
FF - user.js: content.notify.interval - 750000
FF - user.js: content.notify.ontimer - true
FF - user.js: content.switch.threshold - 750000
FF - user.js: dom.disable_window_status_change - true
FF - user.js: network.http.max-connections - 32
FF - user.js: network.http.max-connections-per-server - 8
FF - user.js: network.http.max-persistent-connections-per-proxy - 8
FF - user.js: network.http.max-persistent-connections-per-server - 4
FF - user.js: network.http.pipelining - true
FF - user.js: network.http.pipelining.firstrequest - true
FF - user.js: network.http.pipelining.maxrequests - 8
FF - user.js: network.http.proxy.pipelining - true
FF - user.js: network.http.request.max-start-delay - 0
FF - user.js: nglayout.initialpaint.delay - 750
FF - user.js: plugin.expose_full_path - true
FF - user.js: ui.submenuDelay - 0
.
============= SERVICES / DRIVERS ===============
.
R0 fsbts;fsbts;c:\windows\system32\drivers\fsbts.sys [2009-8-23 33920]
R0 SymDS;Symantec Data Store;c:\windows\system32\drivers\nis\1108000.005\symds.sys [2010-9-26 328752]
R0 SymEFA;Symantec Extended File Attributes;c:\windows\system32\drivers\nis\1108000.005\symefa.sys [2010-9-26 173104]
R1 ccHP;Symantec Hash Provider;c:\windows\system32\drivers\nis\1108000.005\cchpx86.sys [2010-9-26 501888]
R1 SymIRON;Symantec Iron Driver;c:\windows\system32\drivers\nis\1108000.005\ironx86.sys [2010-9-26 116784]
R2 BHDrvx86;BHDrvx86;c:\documents and settings\all users.windows\application data\norton\{0c55c096-0f1d-4f28-aaa2-85ef591126e7}\nis_17.0.0.136\definitions\bashdefs\20110519.002\BHDrvx86.sys [2011-6-15 810616]
R2 LBeepKE;Logitech Beep Suppression Driver;c:\windows\system32\drivers\LBeepKE.sys [2011-3-6 10448]
R2 NIS;Norton Internet Security;c:\program files\norton internet security\engine\17.8.0.5\ccsvchst.exe [2010-9-26 126392]
R2 VenturiClient;Venturi Client;c:\program files\venturi\client\VentC.exe [2011-6-15 2487648]
R3 EraserUtilRebootDrv;EraserUtilRebootDrv;c:\program files\common files\symantec shared\eengine\EraserUtilRebootDrv.sys [2011-6-4 105592]
R3 IDSxpx86;IDSxpx86;c:\documents and settings\all users.windows\application data\norton\{0c55c096-0f1d-4f28-aaa2-85ef591126e7}\nis_17.0.0.136\definitions\ipsdefs\20110615.001\IDSXpx86.sys [2011-6-16 355256]
R3 NAVENG;NAVENG;c:\documents and settings\all users.windows\application data\norton\{0c55c096-0f1d-4f28-aaa2-85ef591126e7}\nis_17.0.0.136\definitions\virusdefs\20110615.002\NAVENG.SYS [2011-6-16 86008]
R3 NAVEX15;NAVEX15;c:\documents and settings\all users.windows\application data\norton\{0c55c096-0f1d-4f28-aaa2-85ef591126e7}\nis_17.0.0.136\definitions\virusdefs\20110615.002\NAVEX15.SYS [2011-6-16 1542392]
R3 vwinter;Venturi Wireless Intercepter;c:\windows\system32\drivers\vwinter.sys [2011-6-15 47392]
R3 vwredir;Venturi Wireless Redirector;c:\windows\system32\drivers\vwredir.sys [2011-6-15 85792]
S0 eBoost;eBoostr caching filter driver;c:\windows\system32\drivers\eboost.sys --> c:\windows\system32\drivers\eBoost.sys [?]
S0 Partizan;Partizan;c:\windows\system32\drivers\partizan.sys --> c:\windows\system32\drivers\Partizan.sys [?]
S3 MBAMSwissArmy;MBAMSwissArmy;\??\c:\windows\system32\drivers\mbamswissarmy.sys --> c:\windows\system32\drivers\mbamswissarmy.sys [?]
S3 Revoflt;Revoflt;c:\windows\system32\drivers\revoflt.sys [2011-5-16 27064]
S3 utdrv;utdrv; [x]
.
=============== File Associations ===============
.
JSEFile=NOTEPAD.EXE %1
VBEFile=NOTEPAD.EXE %1
VBSFile=NOTEPAD.EXE %1
.
=============== Created Last 30 ================
.
2011-06-15 22:05:56 -------- d-----w- c:\program files\UnHackMe
2011-06-15 13:56:24 85792 ----a-w- c:\windows\system32\drivers\vwredir.sys
2011-06-15 13:56:24 47392 ----a-w- c:\windows\system32\drivers\vwinter.sys
2011-06-15 13:56:23 -------- d-----w- c:\program files\Venturi
2011-06-05 03:00:19 -------- d-----w- c:\program files\NETGATE
2011-06-04 09:14:27 -------- d-----w- c:\program files\MSXML 4.0
2011-06-03 10:59:49 -------- d-----w- c:\documents and settings\head quartrers\application data\Norton Utilities
2011-06-03 06:38:52 -------- d-----w- c:\documents and settings\head quartrers\local settings\application data\Thinstall
2011-06-03 06:38:52 -------- d-----w- c:\documents and settings\head quartrers\application data\Thinstall
2011-06-02 16:38:32 -------- d-----w- c:\documents and settings\all users.windows\application data\Spybot - Search & Destroy
2011-05-28 18:02:39 -------- d-----w- c:\documents and settings\head quartrers\application data\Malwarebytes
2011-05-28 18:02:28 -------- d-----w- c:\documents and settings\all users.windows\application data\Malwarebytes
2011-05-28 04:38:36 -------- d-----w- c:\documents and settings\all users.windows\application data\IObit
2011-05-28 04:16:02 -------- d-----w- c:\documents and settings\head quartrers\application data\IObit
2011-05-28 04:16:01 -------- d-----w- c:\program files\IObit
2011-05-28 03:38:57 -------- d-----w- c:\documents and settings\head quartrers\application data\GlarySoft
2011-05-28 02:30:23 -------- d-----w- c:\documents and settings\head quartrers\application data\DriverCure
2011-05-28 02:30:22 -------- d-----w- c:\documents and settings\head quartrers\application data\SpeedMaxPc
2011-05-28 02:29:46 -------- d-----w- c:\documents and settings\all users.windows\application data\SpeedMaxPc
2011-05-28 00:12:48 -------- d-----w- c:\documents and settings\head quartrers\application data\WinPatrol
2011-05-27 22:07:57 -------- d-----w- c:\documents and settings\head quartrers\application data\TweakNow PowerPack 2011
2011-05-27 17:04:08 -------- d-----w- c:\documents and settings\head quartrers\local settings\application data\Identities
2011-05-27 14:17:27 -------- d-----w- c:\documents and settings\head quartrers\application data\AnvSoft
2011-05-27 10:49:47 -------- d-----w- C:\Inetpub
2011-05-27 10:36:13 -------- d-----w- c:\documents and settings\head quartrers\application data\SystemSpeedBooster
2011-05-27 10:36:13 -------- d-----w- c:\documents and settings\all users.windows\application data\SystemSpeedBooster
2011-05-27 10:02:03 -------- d-----w- c:\documents and settings\head quartrers\application data\Camfrog
2011-05-27 10:01:57 -------- d-----w- c:\documents and settings\head quartrers\local settings\application data\CrashRpt
2011-05-27 07:09:40 -------- d-----w- c:\documents and settings\head quartrers\local settings\application data\Xenocode
2011-05-17 09:14:12 -------- d-----w- c:\documents and settings\head quartrers\application data\VS Revo Group
2011-05-17 08:42:12 -------- d-----w- c:\documents and settings\head quartrers\application data\Logishrd
.
==================== Find3M ====================
.
2011-06-15 22:07:20 2 --shatr- c:\windows\winstart.bat
2011-06-15 17:00:39 404640 ----a-w- c:\windows\system32\FlashPlayerCPLApp.cpl
2011-05-17 08:59:07 16400 ----a-w- c:\windows\system32\drivers\LNonPnP.sys
2011-05-06 22:51:27 737280 ----a-w- c:\windows\iun6002.exe
2011-04-27 13:28:39 472808 ----a-w- c:\windows\system32\deployJava1.dll
2011-04-07 13:26:39 2720 ----a-w- c:\windows\system32\ASOROSet.bin
2011-04-05 09:13:10 103424 ----a-w- c:\windows\system32\PowerUp3_nat.dll
2011-04-04 13:18:57 74338 ----a-w- c:\windows\system32\drivers\el90Xbc5.SYS
2011-03-12 21:56:47 774144 ----a-w- c:\program files\RngInterstitial.dll
.
============= FINISH: 17:39:16.64 ===============





.
UNLESS SPECIFICALLY INSTRUCTED, DO NOT POST THIS LOG.
IF REQUESTED, ZIP IT UP & ATTACH IT
.
DDS (Ver_2011-06-12.02)
.
Microsoft Windows XP Professional
Boot Device: \Device\HarddiskVolume1
Install Date: 7/05/2011 9:09:35 PM
System Uptime: 16/06/2011 5:25:31 PM (0 hours ago)
.
Motherboard: Dell Computer Corporation | | Latitude C610
Processor: Intel® Pentium® III Mobile CPU 1000MHz | Microprocessor | 730/133mhz
.
==== Disk Partitions =========================
.
C: is FIXED (NTFS) - 112 GiB total, 56.999 GiB free.
D: is CDROM ()
.
==== Disabled Device Manager Items =============
.
==== System Restore Points ===================
.
No restore point in system.
.
==== Installed Programs ======================
.
.
Adobe Flash Player 10 Plugin
Camfrog Video Chat 6.0
Logitech SetPoint 6.20
Microsoft .NET Framework 3.5 SP1
Microsoft Office XP Professional with FrontPage
Microsoft Visual C++ 2008 ATL Update kb973924 - x86 9.0.30729.4148
Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729.17
Microsoft Visual C++ Run Time Lib Setup
Mozilla Firefox 4.0.1 (x86 en-US)
MSXML 4.0 SP2 (KB954430)
MSXML 6 Service Pack 2 (KB973686)
Norton Internet Security
PartyPoker
PCTEL 2304WT V.9x MDC Modem Drivers
Revo Uninstaller Pro 2.5.3
Software Update for Web Folders
Unlocker 1.9.1
Unwired
Venturi
Windows XP Hotfix - KB885884
WinRAR archiver
.
==== Event Viewer Messages From Past Week ========
.
16/06/2011 2:58:08 AM, error: Service Control Manager [7026] - The following boot-start or system-start driver(s) failed to load: eBoost
16/06/2011 2:43:06 AM, error: Service Control Manager [7034] - The Advanced SystemCare Service service terminated unexpectedly. It has done this 1 time(s).
16/06/2011 2:14:35 AM, error: Service Control Manager [7034] - The Spy Emergency Engine Service service terminated unexpectedly. It has done this 1 time(s).
15/06/2011 11:10:38 PM, error: Service Control Manager [7023] - The System Restore Service service terminated with the following error: The process cannot access the file because it is being used by another process.
15/06/2011 11:10:30 PM, error: SRService [104] - The System Restore initialization process failed.
.
==== End Of File ===========================

Attached Files



BC AdBot (Login to Remove)

 


#2 SweetTech

SweetTech

    Agent ST


  • Members
  • 13,421 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Antarctica
  • Local time:01:44 PM

Posted 23 June 2011 - 05:25 PM

Hello and welcome to the forums!

My secret agent name on the forums is SweetTech (you can call me ST for short), it's a pleasure to meet you. :)

I am very sorry for the delay in responding, but as you can see we are at the moment being flooded with logs which, when paired with the never-ending shortage of helpers, resulted in the delayed responding to your thread.

I would be glad to take a look at your log and help you with solving any malware problems.

If you have since resolved the issues you were originally experiencing, or have received help elsewhere, please inform me so that this topic can be closed.

If you have not, please adhere to the guidelines below and then follow instructions as outlined further below:

  • Logs from malware removal programs (OTL is one of them) can take some time to analyze. I need you to be patient while I analyze any logs you post. Please remember, I am a volunteer, and I do have a life outside of these forums.
  • Please make sure to carefully read any instruction that I give you. Attention to detail is important! Since I cannot see or directly interact with your computer I am dependent on you to "be my eyes" and provide as much information as you can regarding the current state of your computer.
  • If you're not sure, or if something unexpected happens, do NOT continue! Stop and ask!
  • In Windows Vista and Windows 7, all tools need to be started by right clicking and selecting Run as Administrator!
  • If I instruct you to download a specific tool in which you already have, please delete the copy that you have and re-download the tool. The reason I ask you to do this is because these tools are updated fairly regularly.
  • Do not do things I do not ask for, such as running a spyware scan on your computer. The one thing that you should always do, is to make sure sure that your anti-virus definitions are up-to-date!
  • Please do not use the Attachment feature for any log file. Do a Copy/Paste of the entire contents of the log file and submit it inside your post.
  • I am going to stick with you until ALL malware is gone from your system. I would appreciate it if you would do the same. From this point, we're in this together ;)
    Because of this, you must reply within three days
    failure to reply will result in the topic being closed!
  • Lastly, I am no magician. I will try very hard to fix your issues, but no promises can be made. Also be aware that some infections are so severe that you might need to resort to reformatting and reinstalling your operating system.
    Don't worry, this only happens in severe cases, but it sadly does happen. Be prepared to back up your data. Have means of backing up your data available.

____________________________________________________

Rootkit UnHooker (RkU)
Please download Rootkit Unhooker from one of the following links and save it to your desktop.
Link 1 (.exe file)
Link 2 (zipped file)
Link 3 (.rar file)In order to use this tool if you downloaded from either of the second two links, you will need to extract the RKUnhookerLE.exe file using a program capable of extracing ZIP and RAR compressed files. If you don't have an extraction program, you can downlaod, install and use the free 7-zip utility.

  • Double-click on RKUnhookerLE.exe to start the program.
    Vista/Windows 7 users right-click and select Run As Administrator.
  • Click the Report tab, then click Scan.
  • Check Drivers, Stealth Code, and uncheck the rest.
  • Click OK.
  • Wait until it's finished and then go to File > Save Report.
  • Save the report to your Desktop.
  • Copy and paste the contents of the report into your next reply.
-- Note: You may get this warning...just ignore it, click OK and continue: "Rootkit Unhooker has detected a parasite inside itself! It is recommended to remove parasite, okay?".



NEXT:


Running OTL

We need to create a FULL OTL Report
  • Please download OTL from here:
  • Save it to your desktop.
  • Double click on the Posted Image icon on your desktop.
  • Click the "Scan All Users" checkbox.
  • Change the "Extra Registry" option to "SafeList"
  • Push the Posted Image button.
  • Two reports will open, copy and paste them in a reply here:
    • OTL.txt <-- Will be opened
    • Extras.txt <-- Will be minimized

NEXT:


Please provide an update on how things are running in your next reply.

Have I helped you? If you'd like to assist in the fight against malware, click here Posted Image


The instructions seen in this post have been specifically tailored to this user and the issues they are experiencing with their computer. If you think you have a similar problem, please first read this topic, and then begin your own, new thread. I do not offer private support via Private Message.


#3 SweetTech

SweetTech

    Agent ST


  • Members
  • 13,421 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Antarctica
  • Local time:01:44 PM

Posted 25 June 2011 - 12:58 PM

Hi!

It's been several days since I last posted instructions for you to complete. Do you still require assistance in getting your computer cleaned up?

Please Note: Unless notified in advance, threads with no response in 3 days get closed.

If for any reason you cannot complete instructions within that time, that's fine, just put a post here so that I know you're still here. We get a lot of people who simply leave & if there is no contact for that amount of time I will have to assume you have abandoned your topic.


Thanks,
SweetTech.

Have I helped you? If you'd like to assist in the fight against malware, click here Posted Image


The instructions seen in this post have been specifically tailored to this user and the issues they are experiencing with their computer. If you think you have a similar problem, please first read this topic, and then begin your own, new thread. I do not offer private support via Private Message.


#4 SweetTech

SweetTech

    Agent ST


  • Members
  • 13,421 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Antarctica
  • Local time:01:44 PM

Posted 26 June 2011 - 11:03 AM

Due to lack of feedback this thread will now be closed. If you still require assistance, and would like to have your thread re-opened, please feel free to send me a Private Message (PM) being sure to include a link to your topic, and I'd be happy to re-open it.


Have I helped you? If you'd like to assist in the fight against malware, click here Posted Image


The instructions seen in this post have been specifically tailored to this user and the issues they are experiencing with their computer. If you think you have a similar problem, please first read this topic, and then begin your own, new thread. I do not offer private support via Private Message.





0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users