Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Google redirect virus


  • This topic is locked This topic is locked
14 replies to this topic

#1 thomasjk

thomasjk

  • Members
  • 41 posts
  • OFFLINE
  •  
  • Local time:07:19 PM

Posted 21 June 2011 - 09:48 AM

I'm helping a friend whose machine had several infections which I was able to eliminate using Malwarebytes. The redirect issue remains and I've been unable to find a resolution. I ran TDSS Killer which found nothing. I'm attaching the DDS.SCR logs in this post. I tried to run GMER but the scans took so long one was interrupted by a power drop and the other was interrupted when the machine shutdown while my friend was away. In each case the scans run for over 5 hours. Before I got involved his ISP supprot (AT&T) attempted a scan and a re-image. Neither was successful. The scanning I did with Malwarbytes cleaned up a lot of trojans and spyware. Currently his anti-virus, Trend Micro Internet Security Pro reports the file urinawozavu.dll as a trojan gen rc1 hifj. This may not be 100% accurate because he gave me this over the phone yesterday. Trend Micro says it can't delete the file because access is denied.
Looking forward to your help.

Attached Files



BC AdBot (Login to Remove)

 


#2 CatByte

CatByte

    bleepin' tiger


  • Malware Response Team
  • 14,664 posts
  • OFFLINE
  •  
  • Gender:Not Telling
  • Location:Canada
  • Local time:07:19 PM

Posted 23 June 2011 - 04:37 PM

Hi,

Please do the following:

Download ComboFix from one of the following locations:
Link 1
Link 2

VERY IMPORTANT !!! Save ComboFix.exe to your Desktop

* IMPORTANT - Disable your AntiVirus and AntiSpyware applications, usually via a right click on the System Tray icon. They may otherwise interfere with our tools. If you have difficulty properly disabling your protective programs, refer to this link here
  • Double click on ComboFix.exe & follow the prompts.
As part of it's process, ComboFix will check to see if the Microsoft Windows Recovery Console is installed. With malware infections being as they are today, it's strongly recommended to have this pre-installed on your machine before doing any malware removal. It will allow you to boot up into a special recovery/repair mode that will allow us to more easily help you should your computer have a problem after an attempted removal of malware.

  • Follow the prompts to allow ComboFix to download and install the Microsoft Windows Recovery Console, and when prompted, agree to the End-User License Agreement to install the Microsoft Windows Recovery Console.
**Please note: If the Microsoft Windows Recovery Console is already installed, ComboFix will continue it's malware removal procedures.

Posted Image

  • Once the Microsoft Windows Recovery Console is installed using ComboFix, you should see the following message:

Posted Image

  • Click on Yes, to continue scanning for malware.
When finished, it shall produce a log for you. Please include the C:\ComboFix.txt in your next reply.
Notes:
1. Do not mouse-click Combofix's window while it is running. That may cause it to stall.
2. Do not "re-run" Combofix. If you have a problem, reply back for further instructions.

Microsoft MVP - 2010, 2011, 2012, 2013, 2014, 2015


#3 thomasjk

thomasjk
  • Topic Starter

  • Members
  • 41 posts
  • OFFLINE
  •  
  • Local time:07:19 PM

Posted 23 June 2011 - 10:25 PM

Thanks for the reply CatByte. It may take me a day or two to reply back because I can't access my friends machine without going to his house..

#4 thomasjk

thomasjk
  • Topic Starter

  • Members
  • 41 posts
  • OFFLINE
  •  
  • Local time:07:19 PM

Posted 24 June 2011 - 02:59 PM

Here is the combofix.txt file you requested.

Attached Files



#5 CatByte

CatByte

    bleepin' tiger


  • Malware Response Team
  • 14,664 posts
  • OFFLINE
  •  
  • Gender:Not Telling
  • Location:Canada
  • Local time:07:19 PM

Posted 24 June 2011 - 03:13 PM

Hi,

Please do the following:

  • Very Important! Temporarily disable your anti-virus, script blocking and any anti-malware real-time protection before following the steps below.
  • They can interfere with ComboFix or remove some of its embedded files which may cause "unpredictable results".
Copy/paste the text inside the Codebox below into notepad:

Here's how to do that:
Click Start > Run type Notepad click OK.
This will open an empty notepad file:

Copy all the text inside of the code box - Press Ctrl+C (or right click on the highlighted section and choose 'copy')

Folder::
c:\documents and settings\G Elaine Long\Local Settings\Application Data\{B96EFB11-0A42-44EA-A515-F31F315FA44B}
c:\documents and settings\arnold long\Local Settings\Application Data\{46FD53E9-896A-40F0-9892-525575F795D1}
c:\documents and settings\arnold long\Local Settings\Application Data\{4F21924B-B7D4-4C72-A387-FC066323A699}
c:\documents and settings\arnold long\Local Settings\Application Data\{AEF6A0FB-B2F7-42C2-9833-0FA0C74CB0C6}
c:\documents and settings\G Elaine Long\Local Settings\Application Data\{B9109EE0-DE75-48B8-A19E-29421686E066}
c:\documents and settings\arnold long\Local Settings\Application Data\{EFF58106-0E7F-4A54-B820-EE9FCB182ED8}
c:\documents and settings\arnold long\Local Settings\Application Data\{3EC9E4BD-D1B6-41AD-A8E1-73C8CF7C1203}
c:\documents and settings\arnold long\Local Settings\Application Data\{B7F099EF-2442-4CB8-85E7-057378396004}
c:\documents and settings\G Elaine Long\Local Settings\Application Data\{D35C80C9-60EF-4590-BE8E-B14A44ED4332}
c:\documents and settings\arnold long\Local Settings\Application Data\{6121617A-5FC7-4F0F-A092-DAF744385BDE}

File::
c:\documents and settings\G Elaine Long\Local Settings\Application Data\Xduvakob.bin
c:\windows\Xduvakob.bin

FireFox::
FF - ProfilePath - c:\documents and settings\arnold long\Application Data\Mozilla\Firefox\Profiles\i0p5q4nw.default\
FF - prefs.js: browser.search.defaulturl - hxxp://www27.yoog.com/search.php?q=
FF - user.js: browser.startup.homepage - hxxp://www27.yoog.com/
FF - user.js: browser.search.defaultenginename - Yoog Search
FF - user.js: browser.search.defaulturl - hxxp://www27.yoog.com/search.php?q=
FF - user.js: browser.search.selectedEngine - Yoog Search
FF - user.js: keyword.URL - hxxp://www27.yoog.com/search.php?q=


Now paste the copied text into the open notepad - press CTRL+V (or right click and choose 'paste')

Save this file to your desktop, Save this as "CFScript"


Here's how to do that:

1.Click File;
2.Click Save As... Change the directory to your desktop;
3.Change the Save as type to "All Files";
4.Type in the file name: CFScript
5.Click Save ...

Posted Image
  • Referring to the screenshot above, drag CFScript.txt into ComboFix.exe.
  • ComboFix will now run a scan on your system. It may reboot your system when it finishes. This is normal.
  • When finished, it shall produce a log for you.
  • Copy and paste the contents of the log in your next reply.

CAUTION: Do not mouse-click ComboFix's window while it is running. That may cause it to stall.


NEXT


  • Please open your MalwareBytes AntiMalware Program
  • Click the Update Tab and search for updates
  • If an update is found, it will download and install the latest version.
  • Once the program has loaded, select "Perform Quick Scan", then click Scan.
  • The scan may take some time to finish, so please be patient.
  • When the scan is complete, click OK, then Show Results to view the results.
  • Make sure that everything is checked, and click Remove Selected. <-- very important
  • When disinfection is completed, a log will open in Notepad and you may be prompted to Restart. (See Extra Note)
  • The log is automatically saved by MBAM and can be viewed by clicking the Logs tab in MBAM.
  • Copy&Paste the entire report in your next reply.

Extra Note:If MBAM encounters a file that is difficult to remove, you will be presented with 1 of 2 prompts, click OK to either and let MBAM proceed with the disinfection process, if asked to restart the computer, please do so immediately.



NEXT


Go here to run an online scanner from ESET.
  • Turn off the real time scanner of any existing antivirus program while performing the online scan
  • Tick the box next to YES, I accept the Terms of Use.
  • Click Start
  • When asked, allow the activeX control to install
  • Click Start
  • Make sure that the option Remove found threats is unticked and the Scan Archives option is ticked.
  • Click on Advanced Settings, ensure the options Scan for potentially unwanted applications, Scan for potentially unsafe applications, and Enable Anti-Stealth Technology are ticked.
  • Click Scan
  • Wait for the scan to finish
  • When the scan completes, press the LIST OF THREATS FOUND button
  • Press EXPORT TO TEXT FILE , name the file ESETSCAN and save it to your desktop
  • Include the contents of this report in your next reply.
  • Press the BACK button.
  • Press Finish

Microsoft MVP - 2010, 2011, 2012, 2013, 2014, 2015


#6 thomasjk

thomasjk
  • Topic Starter

  • Members
  • 41 posts
  • OFFLINE
  •  
  • Local time:07:19 PM

Posted 24 June 2011 - 03:32 PM

Great CatByte. I'll do as requested on my friends machine and report back. I may be a day or two in responding.

#7 CatByte

CatByte

    bleepin' tiger


  • Malware Response Team
  • 14,664 posts
  • OFFLINE
  •  
  • Gender:Not Telling
  • Location:Canada
  • Local time:07:19 PM

Posted 24 June 2011 - 09:40 PM

:thumbup2:

Microsoft MVP - 2010, 2011, 2012, 2013, 2014, 2015


#8 thomasjk

thomasjk
  • Topic Starter

  • Members
  • 41 posts
  • OFFLINE
  •  
  • Local time:07:19 PM

Posted 25 June 2011 - 03:57 PM

OK. CatByte here are the results you asked for. Let me know how to proceed next.

ComboFix log:

ComboFix 11-06-25.03 - arnold long 06/25/2011 13:08:04.2.1 - x86
Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.958.617 [GMT -4:00]
Running from: c:\documents and settings\arnold long\Desktop\ComboFix.exe
Command switches used :: c:\documents and settings\arnold long\Desktop\CFScript.txt
AV: Microsoft Security Essentials *Disabled/Updated* {BCF43643-A118-4432-AEDE-D861FCBCFCDF}
AV: Trend Micro Titanium Maximum Security *Disabled/Updated* {7D2296BC-32CC-4519-917E-52E652474AF5}
.
FILE ::
"c:\documents and settings\G Elaine Long\Local Settings\Application Data\Xduvakob.bin"
"c:\windows\Xduvakob.bin"
.
.
((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.
.
c:\documents and settings\arnold long\Local Settings\Application Data\{3EC9E4BD-D1B6-41AD-A8E1-73C8CF7C1203}
c:\documents and settings\arnold long\Local Settings\Application Data\{3EC9E4BD-D1B6-41AD-A8E1-73C8CF7C1203}\chrome.manifest
c:\documents and settings\arnold long\Local Settings\Application Data\{3EC9E4BD-D1B6-41AD-A8E1-73C8CF7C1203}\chrome\content\_cfg.js
c:\documents and settings\arnold long\Local Settings\Application Data\{3EC9E4BD-D1B6-41AD-A8E1-73C8CF7C1203}\install.rdf
c:\documents and settings\arnold long\Local Settings\Application Data\{46FD53E9-896A-40F0-9892-525575F795D1}
c:\documents and settings\arnold long\Local Settings\Application Data\{46FD53E9-896A-40F0-9892-525575F795D1}\chrome.manifest
c:\documents and settings\arnold long\Local Settings\Application Data\{46FD53E9-896A-40F0-9892-525575F795D1}\chrome\content\_cfg.js
c:\documents and settings\arnold long\Local Settings\Application Data\{46FD53E9-896A-40F0-9892-525575F795D1}\install.rdf
c:\documents and settings\arnold long\Local Settings\Application Data\{4F21924B-B7D4-4C72-A387-FC066323A699}
c:\documents and settings\arnold long\Local Settings\Application Data\{4F21924B-B7D4-4C72-A387-FC066323A699}\chrome\content\_cfg.js
c:\documents and settings\arnold long\Local Settings\Application Data\{4F21924B-B7D4-4C72-A387-FC066323A699}\install.rdf
c:\documents and settings\arnold long\Local Settings\Application Data\{6121617A-5FC7-4F0F-A092-DAF744385BDE}
c:\documents and settings\arnold long\Local Settings\Application Data\{6121617A-5FC7-4F0F-A092-DAF744385BDE}\chrome.manifest
c:\documents and settings\arnold long\Local Settings\Application Data\{6121617A-5FC7-4F0F-A092-DAF744385BDE}\chrome\content\_cfg.js
c:\documents and settings\arnold long\Local Settings\Application Data\{6121617A-5FC7-4F0F-A092-DAF744385BDE}\install.rdf
c:\documents and settings\arnold long\Local Settings\Application Data\{AEF6A0FB-B2F7-42C2-9833-0FA0C74CB0C6}
c:\documents and settings\arnold long\Local Settings\Application Data\{AEF6A0FB-B2F7-42C2-9833-0FA0C74CB0C6}\chrome.manifest
c:\documents and settings\arnold long\Local Settings\Application Data\{AEF6A0FB-B2F7-42C2-9833-0FA0C74CB0C6}\chrome\content\_cfg.js
c:\documents and settings\arnold long\Local Settings\Application Data\{AEF6A0FB-B2F7-42C2-9833-0FA0C74CB0C6}\install.rdf
c:\documents and settings\arnold long\Local Settings\Application Data\{B7F099EF-2442-4CB8-85E7-057378396004}
c:\documents and settings\arnold long\Local Settings\Application Data\{B7F099EF-2442-4CB8-85E7-057378396004}\chrome.manifest
c:\documents and settings\arnold long\Local Settings\Application Data\{B7F099EF-2442-4CB8-85E7-057378396004}\chrome\content\_cfg.js
c:\documents and settings\arnold long\Local Settings\Application Data\{B7F099EF-2442-4CB8-85E7-057378396004}\install.rdf
c:\documents and settings\arnold long\Local Settings\Application Data\{EFF58106-0E7F-4A54-B820-EE9FCB182ED8}
c:\documents and settings\arnold long\Local Settings\Application Data\{EFF58106-0E7F-4A54-B820-EE9FCB182ED8}\chrome.manifest
c:\documents and settings\arnold long\Local Settings\Application Data\{EFF58106-0E7F-4A54-B820-EE9FCB182ED8}\chrome\content\_cfg.js
c:\documents and settings\arnold long\Local Settings\Application Data\{EFF58106-0E7F-4A54-B820-EE9FCB182ED8}\install.rdf
c:\documents and settings\G Elaine Long\Local Settings\Application Data\{B9109EE0-DE75-48B8-A19E-29421686E066}
c:\documents and settings\G Elaine Long\Local Settings\Application Data\{B9109EE0-DE75-48B8-A19E-29421686E066}\chrome.manifest
c:\documents and settings\G Elaine Long\Local Settings\Application Data\{B9109EE0-DE75-48B8-A19E-29421686E066}\chrome\content\_cfg.js
c:\documents and settings\G Elaine Long\Local Settings\Application Data\{B9109EE0-DE75-48B8-A19E-29421686E066}\install.rdf
c:\documents and settings\G Elaine Long\Local Settings\Application Data\{B96EFB11-0A42-44EA-A515-F31F315FA44B}
c:\documents and settings\G Elaine Long\Local Settings\Application Data\{B96EFB11-0A42-44EA-A515-F31F315FA44B}\chrome.manifest
c:\documents and settings\G Elaine Long\Local Settings\Application Data\{B96EFB11-0A42-44EA-A515-F31F315FA44B}\chrome\content\_cfg.js
c:\documents and settings\G Elaine Long\Local Settings\Application Data\{B96EFB11-0A42-44EA-A515-F31F315FA44B}\install.rdf
c:\documents and settings\G Elaine Long\Local Settings\Application Data\{D35C80C9-60EF-4590-BE8E-B14A44ED4332}
c:\documents and settings\G Elaine Long\Local Settings\Application Data\{D35C80C9-60EF-4590-BE8E-B14A44ED4332}\chrome.manifest
c:\documents and settings\G Elaine Long\Local Settings\Application Data\{D35C80C9-60EF-4590-BE8E-B14A44ED4332}\chrome\content\_cfg.js
c:\documents and settings\G Elaine Long\Local Settings\Application Data\{D35C80C9-60EF-4590-BE8E-B14A44ED4332}\install.rdf
c:\documents and settings\G Elaine Long\Local Settings\Application Data\Xduvakob.bin
c:\windows\Xduvakob.bin
.
.
((((((((((((((((((((((((( Files Created from 2011-05-25 to 2011-06-25 )))))))))))))))))))))))))))))))
.
.
2011-06-20 21:17 . 2011-06-20 21:17 -------- d-----w- c:\windows\system32\wbem\Repository
2011-06-18 07:01 . 2011-06-18 11:59 -------- d-----w- c:\windows\SxsCaPendDel
2011-06-17 17:20 . 2011-05-29 16:32 302592 ----a-w- C:\gmer.exe
2011-06-17 17:08 . 2011-06-17 17:08 -------- d-----w- c:\program files\Sophos
2011-06-17 17:08 . 2011-06-17 03:41 1376832 ----a-w- C:\sar_15_sfx.exe
2011-06-17 16:59 . 2011-06-16 19:28 1441584 ----a-w- C:\TDSSKiller.exe
2011-06-17 16:20 . 2011-06-15 00:26 7283008 ----a-w- C:\stinger10.2.0.112.exe
2011-06-16 20:19 . 2011-06-16 20:19 -------- d-----w- c:\documents and settings\LocalService\Application Data\Trend Micro
2011-06-16 20:19 . 2011-06-16 20:10 92112 ----a-w- c:\windows\system32\drivers\tmtdi.sys
2011-06-16 20:18 . 2011-06-16 20:10 64080 ----a-w- c:\windows\system32\drivers\tmevtmgr.sys
2011-06-16 20:18 . 2011-06-16 20:10 80464 ----a-w- c:\windows\system32\drivers\tmactmon.sys
2011-06-16 20:18 . 2011-06-16 20:10 189520 ----a-w- c:\windows\system32\drivers\tmcomm.sys
2011-06-16 20:18 . 2011-06-16 20:18 -------- d-----w- c:\documents and settings\LocalService\Local Settings\Application Data\Trend Micro
2011-06-16 20:14 . 2011-06-16 20:30 -------- d-----w- c:\documents and settings\All Users\Application Data\Trend Micro
2011-06-16 19:40 . 2011-06-16 19:40 -------- d--h--w- c:\windows\system32\GroupPolicy
2011-06-16 19:02 . 2011-06-16 19:02 -------- d-----w- c:\documents and settings\arnold long\Application Data\Malwarebytes
2011-06-16 19:02 . 2011-06-16 19:02 -------- d-----w- c:\documents and settings\All Users\Application Data\Malwarebytes
2011-06-16 19:02 . 2011-06-16 20:13 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
2011-06-16 16:29 . 2011-06-16 16:34 -------- d-----w- c:\documents and settings\All Users\Application Data\Bomgar-SCC-4DFA2F50
2011-06-16 15:48 . 2011-06-16 16:12 -------- d-----w- c:\documents and settings\All Users\Application Data\Bomgar-SCC-4DFA25C0
2011-06-16 15:03 . 2011-06-16 15:03 -------- d-----w- c:\documents and settings\All Users\Application Data\Uninstall
2011-06-16 15:02 . 2011-06-16 15:02 -------- d-----w- c:\program files\Common Files\SureThing Shared
2011-06-15 22:49 . 2011-04-21 13:37 105472 ------w- c:\windows\system32\dllcache\mup.sys
2011-06-09 11:27 . 2008-04-14 00:12 26624 ----a-w- c:\documents and settings\LocalService\Application Data\Microsoft\UPnP Device Host\upnphost\udhisapi.dll
2011-06-08 23:24 . 2011-06-08 23:29 -------- d-----w- c:\documents and settings\arnold long\Local Settings\Application Data\Browser Guard
2011-06-08 20:14 . 2011-06-08 20:10 35328 ----a-w- c:\windows\system32\drivers\pcntpci5.sys
2011-06-08 20:14 . 2011-06-08 20:10 14208 ----a-w- c:\windows\system32\drivers\battc.sys
2011-06-08 20:14 . 2011-06-08 20:10 13952 ----a-w- c:\windows\system32\drivers\cmbatt.sys
2011-06-08 20:14 . 2011-06-08 20:10 10240 ----a-w- c:\windows\system32\drivers\compbatt.sys
2011-06-08 19:49 . 2011-06-08 20:58 9216 ----a-w- c:\windows\system32\Native.exe
2011-06-08 19:49 . 2011-06-08 20:16 -------- d-----w- C:\ReimageUndo
2011-06-08 19:32 . 2011-06-08 21:15 -------- d-----w- C:\rei
2011-06-08 19:32 . 2011-06-08 19:32 -------- d-----w- c:\program files\Reimage
2011-06-07 01:45 . 2011-06-07 01:45 -------- d-----w- C:\RE 20ToolKit
2011-06-07 00:56 . 2011-06-07 00:56 -------- d-sh--w- c:\documents and settings\Administrator\IETldCache
2011-06-06 20:00 . 2011-06-06 20:00 75776 --sh--r- c:\windows\system32\msportsp.dll
2011-05-30 19:28 . 2011-05-30 19:28 -------- d-----w- c:\documents and settings\G Elaine Long\.jagex_cache_32
.
.
.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2011-06-08 20:10 . 2005-08-16 09:40 209624 ----a-w- c:\windows\system32\wuweb.dll
2011-06-08 20:10 . 2005-08-16 09:40 183296 ----a-w- c:\windows\system32\wuaueng1.dll
2011-06-08 20:10 . 2005-08-16 09:40 165888 ----a-w- c:\windows\system32\wuauclt1.exe
2011-06-08 20:10 . 2005-08-16 09:18 10752 ----a-w- c:\windows\system32\wpdtrace.dll
2011-06-08 20:10 . 2008-07-25 15:16 16896 ----a-w- c:\windows\system32\mscorier.dll
2011-06-08 20:10 . 2008-07-25 15:16 106496 ----a-w- c:\windows\system32\mscories.dll
2011-06-08 20:10 . 2005-08-16 09:18 354816 ----a-w- c:\windows\system32\winhttp.dll
2011-06-08 20:10 . 2005-08-16 09:18 75776 ----a-w- c:\windows\system32\strmfilt.dll
2011-06-08 20:10 . 2005-08-16 09:18 331776 ----a-w- c:\windows\system32\wpdmtpdr.dll
2011-06-08 20:10 . 2005-08-16 09:18 65536 ----a-w- c:\windows\system32\jgsh400.dll
2011-06-08 20:10 . 2005-08-16 09:18 45568 ----a-w- c:\windows\system32\jgsd400.dll
2011-06-08 20:10 . 2006-12-20 15:35 11868 ----a-w- c:\windows\system32\drivers\mdmxsdk.sys
2011-06-08 20:10 . 2005-08-16 09:18 44544 ----a-w- c:\windows\system32\jgaw400.dll
2011-06-08 20:10 . 2005-08-16 09:18 35840 ----a-w- c:\windows\system32\jgmd400.dll
2011-06-08 20:10 . 2005-08-16 09:18 191488 ----a-w- c:\windows\system32\iuengine.dll
2011-06-08 20:10 . 2005-08-16 09:18 25088 ----a-w- c:\windows\system32\httpapi.dll
2011-06-08 20:10 . 2004-08-04 04:00 265728 ----a-w- c:\windows\system32\drivers\http.sys
2011-06-07 01:41 . 2010-05-29 02:16 1324 ------w- c:\documents and settings\G Elaine Long\Local Settings\Application Data\d3d9caps.tmp
2011-05-02 15:31 . 2005-08-16 09:40 692736 ----a-w- c:\windows\system32\inetcomm.dll
2011-04-29 16:19 . 2005-08-16 09:18 456320 ----a-w- c:\windows\system32\drivers\mrxsmb.sys
2011-04-25 16:11 . 2005-08-16 09:18 916480 ----a-w- c:\windows\system32\wininet.dll
2011-04-25 16:11 . 2005-08-16 09:18 43520 ----a-w- c:\windows\system32\licmgr10.dll
2011-04-25 16:11 . 2005-08-16 09:18 1469440 ----a-w- c:\windows\system32\inetcpl.cpl
2011-04-25 12:01 . 2005-08-16 09:18 385024 ----a-w- c:\windows\system32\html.iec
2011-04-21 13:37 . 2005-08-16 09:18 105472 ----a-w- c:\windows\system32\drivers\mup.sys
.
.
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4
.
[HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{9EBF8AAF-0A31-4786-909A-97A0EF101743}]
2011-01-05 00:31 1536000 ------w- c:\program files\AddThis Toolbar\Toolbar.dll
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Toolbar]
"{B43176CC-4D9E-493B-A636-D9CBFE39C6DA}"= "c:\program files\AddThis Toolbar\Toolbar.dll" [2011-01-05 1536000]
.
[HKEY_CLASSES_ROOT\clsid\{b43176cc-4d9e-493b-a636-d9cbfe39c6da}]
[HKEY_CLASSES_ROOT\FCTB000061107.IEToolbar.3]
[HKEY_CLASSES_ROOT\TypeLib\{58E510FE-36D8-4DEF-9385-CD04A1F555A3}]
[HKEY_CLASSES_ROOT\FCTB000061107.IEToolbar]
.
[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Toolbar\Webbrowser]
"{B43176CC-4D9E-493B-A636-D9CBFE39C6DA}"= "c:\program files\AddThis Toolbar\Toolbar.dll" [2011-01-05 1536000]
.
[HKEY_CLASSES_ROOT\clsid\{b43176cc-4d9e-493b-a636-d9cbfe39c6da}]
[HKEY_CLASSES_ROOT\FCTB000061107.IEToolbar.3]
[HKEY_CLASSES_ROOT\TypeLib\{58E510FE-36D8-4DEF-9385-CD04A1F555A3}]
[HKEY_CLASSES_ROOT\FCTB000061107.IEToolbar]
.
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"DellSupport"="c:\program files\Dell Support\DSAgnt.exe" [2006-08-29 395776]
"DellSupportCenter"="c:\program files\Dell Support Center\bin\sprtcmd.exe" [2008-08-13 206064]
"Skype"="c:\program files\Skype\Phone\Skype.exe" [2011-01-26 15026056]
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"ATT-SST_McciTrayApp"="c:\program files\ATT-SST\McciTrayApp.exe" [2008-09-02 1529856]
"dellsupportcenter"="c:\program files\Dell Support Center\bin\sprtcmd.exe" [2008-08-13 206064]
"NvCplDaemon"="c:\windows\system32\NvCpl.dll" [2006-08-23 7630848]
"ISUSPM Startup"="c:\progra~1\COMMON~1\INSTAL~1\UPDATE~1\ISUSPM.exe" [2004-07-27 221184]
"Conime"="c:\windows\system32\conime.exe" [2008-04-14 27648]
"EKIJ5000StatusMonitor"="c:\windows\System32\spool\DRIVERS\W32X86\3\EKIJ5000MUI.exe" [2009-08-03 1626112]
"QuickTime Task"="c:\program files\QuickTime\qttask.exe" [2008-09-06 413696]
"iTunesHelper"="c:\program files\iTunes\iTunesHelper.exe" [2011-03-07 421160]
"AppleSyncNotifier"="c:\program files\Common Files\Apple\Mobile Device Support\AppleSyncNotifier.exe" [2010-10-08 47904]
"Adobe Reader Speed Launcher"="c:\program files\Adobe\Reader 9.0\Reader\Reader_sl.exe" [2011-01-31 35760]
"Adobe ARM"="c:\program files\Common Files\Adobe\ARM\1.0\AdobeARM.exe" [2010-09-21 932288]
"MSN Toolbar"="c:\program files\MSN Toolbar\Platform\4.0.0401.0\mswinext.exe" [2010-02-12 240992]
"Microsoft Default Manager"="c:\program files\Microsoft\Search Enhancement Pack\Default Manager\DefMgr.exe" [2009-07-17 288080]
"TkBellExe"="c:\program files\real\realplayer\update\realsched.exe" [2010-11-21 274608]
"Trend Micro Browser Guard"="c:\program files\Trend Micro\Browser Guard\BGUI.EXE" [2011-02-26 787984]
"ehTray"="c:\windows\ehome\ehtray.exe" [2011-06-08 64512]
"Trend Micro Titanium"="c:\program files\Trend Micro\Titanium\UIFramework\uiWinMgr.exe" [2011-02-17 1111568]
"Trend Micro Client Framework"="c:\program files\Trend Micro\UniClient\UiFrmWrk\UIWatchDog.exe" [2011-02-10 116752]
"DWQueuedReporting"="c:\progra~1\COMMON~1\MICROS~1\DW\dwtrig20.exe" [2007-02-26 437160]
.
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run]
"DWQueuedReporting"="c:\progra~1\COMMON~1\MICROS~1\DW\dwtrig20.exe" [2007-02-26 437160]
.
c:\documents and settings\G Elaine Long\Start Menu\Programs\Startup\
Microsoft Office OneNote 2003 Quick Launch.lnk - c:\program files\Microsoft Office\OFFICE11\ONENOTEM.EXE [2007-4-19 64864]
.
c:\documents and settings\All Users\Start Menu\Programs\Startup\
Digital Line Detect.lnk - c:\program files\Digital Line Detect\DLG.exe [2006-12-20 24576]
Microsoft Office OneNote 2003 Quick Launch.lnk - c:\program files\Microsoft Office\OFFICE11\ONENOTEM.EXE [2007-4-19 64864]
.
[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\TrendAntiVirus]
"DisableMonitoring"=dword:00000001
.
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"c:\\Program Files\\Messenger\\msmsgs.exe"=
"c:\\Documents and Settings\\Dee Duncan\\Application Data\\MySpace\\IM\\bin\\MySpaceIM.exe"=
"c:\\Program Files\\LimeWire\\LimeWire.exe"=
"c:\\Program Files\\Skype\\Plugin Manager\\skypePM.exe"=
"c:\\Program Files\\Kodak\\AiO\\Center\\AiOHomeCenter.exe"=
"c:\\Program Files\\Kodak\\AiO\\Center\\Kodak.Statistics.exe"=
"c:\\Program Files\\Kodak\\AiO\\Center\\NetworkPrinterDiscovery.exe"=
"c:\\Program Files\\Kodak\\AiO\\Firmware\\KodakAiOUpdater.exe"=
"c:\\Documents and Settings\\All Users\\Application Data\\Kodak\\Installer\\Setup.exe"=
"c:\\Program Files\\AddThis Toolbar\\TroubleShooter.exe"=
"c:\\Program Files\\AddThis Toolbar\\ToolbarUpdate.exe"=
"c:\\Program Files\\Skype\\Phone\\Skype.exe"=
"c:\\Program Files\\Bonjour\\mDNSResponder.exe"=
"c:\\Program Files\\iTunes\\iTunes.exe"=
.
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\GloballyOpenPorts\List]
"9323:TCP"= 9323:TCP:EKDiscovery
"9324:TCP"= 9324:TCP:EKDiscovery
"9322:TCP"= 9322:TCP:EKDiscovery
.
R2 Kodak AiO Network Discovery Service;Kodak AiO Network Discovery Service;c:\program files\Kodak\AiO\Center\ekdiscovery.exe [8/5/2009 1:49 PM 284016]
R2 tmevtmgr;tmevtmgr;c:\windows\system32\drivers\tmevtmgr.sys [6/16/2011 4:18 PM 64080]
S1 MpKsl1a47caa5;MpKsl1a47caa5;\??\c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{D4EAD139-238B-4C27-B594-64A44AF32C0F}\MpKsl1a47caa5.sys --> c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{D4EAD139-238B-4C27-B594-64A44AF32C0F}\MpKsl1a47caa5.sys [?]
S1 MpKsl1e24514a;MpKsl1e24514a;\??\c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{B2E13C63-0881-401C-B077-F4FFBF1C10F7}\MpKsl1e24514a.sys --> c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{B2E13C63-0881-401C-B077-F4FFBF1C10F7}\MpKsl1e24514a.sys [?]
S1 MpKsl2c7435f5;MpKsl2c7435f5;\??\c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{4D14E363-DD78-45B1-B8F2-D0030DD3D441}\MpKsl2c7435f5.sys --> c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{4D14E363-DD78-45B1-B8F2-D0030DD3D441}\MpKsl2c7435f5.sys [?]
S1 MpKsl343450ce;MpKsl343450ce;\??\c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{6E433DF4-0549-4193-9933-6A3DCDDC6C58}\MpKsl343450ce.sys --> c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{6E433DF4-0549-4193-9933-6A3DCDDC6C58}\MpKsl343450ce.sys [?]
S1 MpKsl433be526;MpKsl433be526;\??\c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{F5BA268D-4720-41FD-83AB-57512EF231EF}\MpKsl433be526.sys --> c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{F5BA268D-4720-41FD-83AB-57512EF231EF}\MpKsl433be526.sys [?]
S1 MpKsl56d99f23;MpKsl56d99f23;\??\c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{D4EAD139-238B-4C27-B594-64A44AF32C0F}\MpKsl56d99f23.sys --> c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{D4EAD139-238B-4C27-B594-64A44AF32C0F}\MpKsl56d99f23.sys [?]
S1 MpKsl5baacb70;MpKsl5baacb70;\??\c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{C3ECEEEF-C2D3-4772-9C6B-DDDFFB45DC66}\MpKsl5baacb70.sys --> c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{C3ECEEEF-C2D3-4772-9C6B-DDDFFB45DC66}\MpKsl5baacb70.sys [?]
S1 MpKsl662f1aeb;MpKsl662f1aeb;\??\c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{0EBAC481-EC24-42AB-895D-11C8B9F3C0C1}\MpKsl662f1aeb.sys --> c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{0EBAC481-EC24-42AB-895D-11C8B9F3C0C1}\MpKsl662f1aeb.sys [?]
S1 MpKsl6e386087;MpKsl6e386087;\??\c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{2FBE8987-6230-408C-9FD3-657719061596}\MpKsl6e386087.sys --> c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{2FBE8987-6230-408C-9FD3-657719061596}\MpKsl6e386087.sys [?]
S1 MpKsl793af8fa;MpKsl793af8fa;\??\c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{3B425AFE-4FDB-4067-A34E-D9F3909FC531}\MpKsl793af8fa.sys --> c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{3B425AFE-4FDB-4067-A34E-D9F3909FC531}\MpKsl793af8fa.sys [?]
S1 MpKsl7c62a682;MpKsl7c62a682;\??\c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{F6E80FCD-C1B7-4F66-B04C-0FA1B7ADAD2A}\MpKsl7c62a682.sys --> c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{F6E80FCD-C1B7-4F66-B04C-0FA1B7ADAD2A}\MpKsl7c62a682.sys [?]
S1 MpKsl84bcbc6e;MpKsl84bcbc6e;\??\c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{88244ABF-F2E2-4218-AEFB-098377B1C784}\MpKsl84bcbc6e.sys --> c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{88244ABF-F2E2-4218-AEFB-098377B1C784}\MpKsl84bcbc6e.sys [?]
S1 MpKsla6f5a148;MpKsla6f5a148;\??\c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{C7CB1336-925B-4250-8D16-D4E21E454448}\MpKsla6f5a148.sys --> c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{C7CB1336-925B-4250-8D16-D4E21E454448}\MpKsla6f5a148.sys [?]
S1 MpKsle46f72d7;MpKsle46f72d7;\??\c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{AF7DC1FB-EE81-443B-A3C7-8F17BCBAC318}\MpKsle46f72d7.sys --> c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{AF7DC1FB-EE81-443B-A3C7-8F17BCBAC318}\MpKsle46f72d7.sys [?]
S1 MpKsleda9a48e;MpKsleda9a48e;\??\c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{CBE312E0-3C21-4F99-85F1-C98F4705C153}\MpKsleda9a48e.sys --> c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{CBE312E0-3C21-4F99-85F1-C98F4705C153}\MpKsleda9a48e.sys [?]
S1 MpKslefb721d5;MpKslefb721d5;\??\c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{33AC33C1-9F92-4CA3-A660-4050DFA14104}\MpKslefb721d5.sys --> c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{33AC33C1-9F92-4CA3-A660-4050DFA14104}\MpKslefb721d5.sys [?]
S2 Amsp;Trend Micro Solution Platform;c:\program files\Trend Micro\AMSP\coreServiceShell.exe [6/16/2011 4:16 PM 188272]
S3 MBAMSwissArmy;MBAMSwissArmy;\??\c:\windows\system32\drivers\mbamswissarmy.sys --> c:\windows\system32\drivers\mbamswissarmy.sys [?]
S3 MEMSWEEP2;MEMSWEEP2;\??\c:\windows\system32\6.tmp --> c:\windows\system32\6.tmp [?]
.
[HKEY_LOCAL_MACHINE\software\microsoft\active setup\installed components\{A509B1FF-37FF-4bFF-8CFF-4F3A747040FF}]
2009-03-08 08:32 128512 ----a-w- c:\windows\system32\advpack.dll
.
Contents of the 'Scheduled Tasks' folder
.
2011-06-18 c:\windows\Tasks\AppleSoftwareUpdate.job
- c:\program files\Apple Software Update\SoftwareUpdate.exe [2008-07-30 16:34]
.
2011-06-24 c:\windows\Tasks\RealUpgradeLogonTaskS-1-5-21-2732942092-1405617663-19741926-1006.job
- c:\program files\Real\RealUpgrade\realupgrade.exe [2010-11-05 16:33]
.
2011-06-24 c:\windows\Tasks\RealUpgradeLogonTaskS-1-5-21-2732942092-1405617663-19741926-1010.job
- c:\program files\Real\RealUpgrade\realupgrade.exe [2010-11-05 16:33]
.
2011-06-24 c:\windows\Tasks\RealUpgradeLogonTaskS-1-5-21-2732942092-1405617663-19741926-1016.job
- c:\program files\Real\RealUpgrade\realupgrade.exe [2010-11-05 16:33]
.
2011-06-24 c:\windows\Tasks\RealUpgradeLogonTaskS-1-5-21-2732942092-1405617663-19741926-1019.job
- c:\program files\Real\RealUpgrade\realupgrade.exe [2010-11-05 16:33]
.
2011-06-24 c:\windows\Tasks\RealUpgradeLogonTaskS-1-5-21-2732942092-1405617663-19741926-1020.job
- c:\program files\Real\RealUpgrade\realupgrade.exe [2010-11-05 16:33]
.
2011-06-24 c:\windows\Tasks\RealUpgradeScheduledTaskS-1-5-21-2732942092-1405617663-19741926-1006.job
- c:\program files\Real\RealUpgrade\realupgrade.exe [2010-11-05 16:33]
.
2011-06-12 c:\windows\Tasks\RealUpgradeScheduledTaskS-1-5-21-2732942092-1405617663-19741926-1010.job
- c:\program files\Real\RealUpgrade\realupgrade.exe [2010-11-05 16:33]
.
2011-06-20 c:\windows\Tasks\RealUpgradeScheduledTaskS-1-5-21-2732942092-1405617663-19741926-1016.job
- c:\program files\Real\RealUpgrade\realupgrade.exe [2010-11-05 16:33]
.
2011-06-23 c:\windows\Tasks\RealUpgradeScheduledTaskS-1-5-21-2732942092-1405617663-19741926-1019.job
- c:\program files\Real\RealUpgrade\realupgrade.exe [2010-11-05 16:33]
.
2011-06-20 c:\windows\Tasks\RealUpgradeScheduledTaskS-1-5-21-2732942092-1405617663-19741926-1020.job
- c:\program files\Real\RealUpgrade\realupgrade.exe [2010-11-05 16:33]
.
2011-06-25 c:\windows\Tasks\User_Feed_Synchronization-{2F95BB85-2AAA-4374-98FE-796094BEC066}.job
- c:\windows\system32\msfeedssync.exe [2006-10-17 08:31]
.
2011-06-25 c:\windows\Tasks\User_Feed_Synchronization-{5A62DFCC-B247-4014-9D7D-E7AFB8B4547F}.job
- c:\windows\system32\msfeedssync.exe [2006-10-17 08:31]
.
2011-06-25 c:\windows\Tasks\User_Feed_Synchronization-{C11FE340-5533-4391-9E44-30E101F9541C}.job
- c:\windows\system32\msfeedssync.exe [2006-10-17 08:31]
.
.
------- Supplementary Scan -------
.
uStart Page = hxxp://att.my.yahoo.com/
uInternet Settings,ProxyOverride = *.local
Trusted Zone: motive.com\pattta.att
Trusted Zone: motive.com\patttbc.att
TCP: DhcpNameServer = 192.168.1.254 192.168.1.254
FF - ProfilePath - c:\documents and settings\arnold long\Application Data\Mozilla\Firefox\Profiles\i0p5q4nw.default\
FF - user.js: general.useragent.extra.zencast - Creative ZENcast v1.01.06
FF - user.js: keyword.enabled - true
FF - user.js: general.useragent.extra.zencast - );user_pref(yahoo.ytff.general.dontshowhpoffer, true
.
.
**************************************************************************
.
catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2011-06-25 13:20
Windows 5.1.2600 Service Pack 3 NTFS
.
scanning hidden processes ...
.
scanning hidden autostart entries ...
.
scanning hidden files ...
.
scan completed successfully
hidden files: 0
.
**************************************************************************
.
[HKEY_LOCAL_MACHINE\System\ControlSet001\Services\MEMSWEEP2]
"ImagePath"="\??\c:\windows\system32\6.tmp"
.
Completion time: 2011-06-25 13:23:09
ComboFix-quarantined-files.txt 2011-06-25 17:23
ComboFix2.txt 2011-06-24 19:54
.
Pre-Run: 13,447,016,448 bytes free
Post-Run: 13,551,009,792 bytes free
.
- - End Of File - - 7EDF1CF0B303109C8B249E0D28A5B1FA


MalwareBytes Log:

Malwarebytes' Anti-Malware 1.51.0.1200
www.malwarebytes.org

Database version: 6948

Windows 5.1.2600 Service Pack 3
Internet Explorer 8.0.6001.18702

6/25/2011 1:32:57 PM
mbam-log-2011-06-25 (13-32-57).txt

Scan type: Quick scan
Objects scanned: 234433
Time elapsed: 6 minute(s), 30 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 1

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
c:\documents and settings\arnold long\my documents\downloads\driverperformer_z.exe (PUP.Adware.Agent) -> Quarantined and deleted successfully.

Esetscan Log:

C:\Documents and Settings\arnold long\Application Data\Sun\Java\Deployment\cache\6.0\1\532f4a01-31fa47ec Java/Agent.CK trojan
C:\Documents and Settings\arnold long\Application Data\Sun\Java\Deployment\cache\6.0\10\4137e5ca-4fe6c2ff Win32/Adware.XPAntiSpyware.AB application
C:\Documents and Settings\arnold long\Local Settings\Application Data\Microsoft\CD Burning\WINDOWS\urinawozavu.dll a variant of Win32/Kryptik.OSP trojan
C:\Qoobox\Quarantine\C\WINDOWS\urinawozavu.dll.vir a variant of Win32/Kryptik.OSP trojan
C:\rei\Temp\20110608_1539\Installer\C_drive\Documents and Settings\arnold long\Local Settings\temp\az3.exe a variant of Win32/Kryptik.OSL trojan
C:\rei\Temp\20110608_1539\Installer\C_drive\Program Files\search toolbar\searchtoolbar.dll Win32/Toolbar.Zugo application
C:\rei\Temp\20110608_1539\Installer\C_drive\WINDOWS\abuvea.exe Win32/TrojanDownloader.FakeAlert.BGV trojan
C:\rei\Temp\20110608_1539\Installer\C_drive\WINDOWS\system32\nwsapagents.dll Win32/Agent.OLC trojan
C:\System Volume Information\_restore{129201FA-B0AC-49B3-96B2-DEB8B91E727B}\RP22\A0014625.exe Win32/TrojanDownloader.FakeAlert.BGV trojan
C:\System Volume Information\_restore{129201FA-B0AC-49B3-96B2-DEB8B91E727B}\RP3\A0007038.exe Win32/Adware.XPAntiSpyware.AB application
C:\System Volume Information\_restore{129201FA-B0AC-49B3-96B2-DEB8B91E727B}\RP3\A0008038.exe a variant of Win32/Kryptik.OUF trojan
C:\System Volume Information\_restore{129201FA-B0AC-49B3-96B2-DEB8B91E727B}\RP3\A0008040.exe a variant of Win32/Kryptik.OSN trojan
C:\System Volume Information\_restore{129201FA-B0AC-49B3-96B2-DEB8B91E727B}\RP3\A0008613.dll Win32/Agent.OLC trojan
C:\System Volume Information\_restore{129201FA-B0AC-49B3-96B2-DEB8B91E727B}\RP3\A0008615.dll Win32/Toolbar.Zugo application
C:\System Volume Information\_restore{129201FA-B0AC-49B3-96B2-DEB8B91E727B}\RP3\A0008616.exe Win32/TrojanDownloader.FakeAlert.BGV trojan
C:\System Volume Information\_restore{129201FA-B0AC-49B3-96B2-DEB8B91E727B}\RP33\A0025032.dll a variant of Win32/Kryptik.OSP trojan

#9 CatByte

CatByte

    bleepin' tiger


  • Malware Response Team
  • 14,664 posts
  • OFFLINE
  •  
  • Gender:Not Telling
  • Location:Canada
  • Local time:07:19 PM

Posted 25 June 2011 - 04:14 PM

Hi

Please do the following:

  • Very Important! Temporarily disable your anti-virus, script blocking and any anti-malware real-time protection before following the steps below.
  • They can interfere with ComboFix or remove some of its embedded files which may cause "unpredictable results".
Copy/paste the text inside the Codebox below into notepad:

Here's how to do that:
Click Start > Run type Notepad click OK.
This will open an empty notepad file:

Copy all the text inside of the code box - Press Ctrl+C (or right click on the highlighted section and choose 'copy')


Registry::
[-HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{9EBF8AAF-0A31-4786-909A-97A0EF101743}]
[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Toolbar\Webbrowser]
"{B43176CC-4D9E-493B-A636-D9CBFE39C6DA}"=-
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Toolbar]
"{B43176CC-4D9E-493B-A636-D9CBFE39C6DA}"=-
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"c:\\Program Files\\AddThis Toolbar\\TroubleShooter.exe"=-
"c:\\Program Files\\AddThis Toolbar\\ToolbarUpdate.exe"=-


File::
c:\program files\AddThis Toolbar\Toolbar.dll
C:\Documents and Settings\arnold long\Application Data\Sun\Java\Deployment\cache\6.0\1\532f4a01-31fa47ec 
C:\Documents and Settings\arnold long\Application Data\Sun\Java\Deployment\cache\6.0\10\4137e5ca-4fe6c2ff 
C:\Documents and Settings\arnold long\Local Settings\Application Data\Microsoft\CD Burning\WINDOWS\urinawozavu.dll 
C:\rei\Temp\20110608_1539\Installer\C_drive\Documents and Settings\arnold long\Local Settings\temp\az3.exe 
C:\rei\Temp\20110608_1539\Installer\C_drive\Program Files\search toolbar\searchtoolbar.dll 
C:\rei\Temp\20110608_1539\Installer\C_drive\WINDOWS\abuvea.exe 
C:\rei\Temp\20110608_1539\Installer\C_drive\WINDOWS\system32\nwsapagents.dll 



Now paste the copied text into the open notepad - press CTRL+V (or right click and choose 'paste')

Save this file to your desktop, Save this as "CFScript"


Here's how to do that:

1.Click File;
2.Click Save As... Change the directory to your desktop;
3.Change the Save as type to "All Files";
4.Type in the file name: CFScript
5.Click Save ...

Posted Image
  • Referring to the screenshot above, drag CFScript.txt into ComboFix.exe.
  • ComboFix will now run a scan on your system. It may reboot your system when it finishes. This is normal.
  • When finished, it shall produce a log for you.
  • Copy and paste the contents of the log in your next reply.

CAUTION: Do not mouse-click ComboFix's window while it is running. That may cause it to stall.


NEXT


Visit ADOBEand download the latest version of Acrobat Reader (version X)
Having the latest updates ensures there are no security vulnerabilities in your system.

NEXT

Posted Image
Your Java is out of date. Older versions have vulnerabilities that malware can use to infect your system. Please follow these steps to remove older version Java components and update.
  • Download the latest version of Java Runtime Environment (JRE) 26 and save it to your desktop.
  • Scroll down to where it says JDK 6 Update 26 (JDK or JRE)
  • Click the Download JRE button to the right
  • Select the Windows platform from the dropdown menu.
  • Read the License Agreement and then check the box that says: "I agree to the Java SE Runtime Environment 6u26 with JavaFX 1 License Agreement". Click on Continue. The page will refresh.
  • Click on the link to download Windows Offline Installation and save the file to your desktop.
  • Close any programs you may have running - especially your web browser.
  • Go to Start > Control Panel, double-click on Add or Remove Programs and remove all older versions of Java.
  • Check (highlight) any item with Java Runtime Environment (JRE or J2SE or Java™ 6) in the name.
  • Click the Remove or Change/Remove button.
  • Repeat as many times as necessary to remove each Java versions.
  • Reboot your computer once all Java components are removed.
  • Then from your desktop double-click on jre-6u26-windows-i586.exe to install the newest version.
  • After the install is complete, go into the Control Panel (using Classic View) and double-click the Java Icon. (looks like a coffee cup)
    • On the General tab, under Temporary Internet Files, click the Settings button.
    • Next, click on the Delete Files button
    • There are two options in the window to clear the cache - Leave BOTH Checked
      Applications and Applets
      Trace and Log Files
  • Click OK on Delete Temporary Files Window
    Note: This deletes ALL the Downloaded Applications and Applets from the CACHE.
  • Click OK to leave the Temporary Files Window
  • Click OK to leave the Java Control Panel.


NEXT


Please advise how the computer is running now and if there are any outstanding issues

Edited by CatByte, 25 June 2011 - 04:20 PM.

Microsoft MVP - 2010, 2011, 2012, 2013, 2014, 2015


#10 thomasjk

thomasjk
  • Topic Starter

  • Members
  • 41 posts
  • OFFLINE
  •  
  • Local time:07:19 PM

Posted 26 June 2011 - 10:52 AM

The redirection is gone. I'll be applying your last recommendations in the next day or two.

#11 thomasjk

thomasjk
  • Topic Starter

  • Members
  • 41 posts
  • OFFLINE
  •  
  • Local time:07:19 PM

Posted 28 June 2011 - 12:49 PM

CatByte here is the last combofix log. I've updated Adobe Reader and the Java per your instructions. The machine is running well. No more re-directs during Google searches. The Trend Micro AV does not flag any issues. It looks like the machine is clean to me. Please post any other recommendations if needed.

ComboFix 11-06-27.04 - arnold long 06/28/2011 13:11:02.3.1 - x86
Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.958.524 [GMT -4:00]
Running from: c:\documents and settings\arnold long\Desktop\ComboFix.exe
Command switches used :: c:\documents and settings\arnold long\Desktop\CFScript.txt
AV: Microsoft Security Essentials *Disabled/Updated* {BCF43643-A118-4432-AEDE-D861FCBCFCDF}
AV: Trend Micro Titanium Maximum Security *Disabled/Updated* {7D2296BC-32CC-4519-917E-52E652474AF5}
.
FILE ::
"c:\documents and settings\G Elaine Long\Local Settings\Application Data\Xduvakob.bin"
"c:\windows\Xduvakob.bin"
.
.
((((((((((((((((((((((((( Files Created from 2011-05-28 to 2011-06-28 )))))))))))))))))))))))))))))))
.
.
2011-06-25 17:41 . 2011-06-25 17:41 -------- d-----w- c:\program files\ESET
2011-06-25 17:24 . 2011-05-29 13:11 39984 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2011-06-25 17:24 . 2011-05-29 13:11 22712 ----a-w- c:\windows\system32\drivers\mbam.sys
2011-06-20 21:17 . 2011-06-20 21:17 -------- d-----w- c:\windows\system32\wbem\Repository
2011-06-18 07:01 . 2011-06-18 11:59 -------- d-----w- c:\windows\SxsCaPendDel
2011-06-17 17:20 . 2011-05-29 16:32 302592 ----a-w- C:\gmer.exe
2011-06-17 17:08 . 2011-06-17 17:08 -------- d-----w- c:\program files\Sophos
2011-06-17 17:08 . 2011-06-17 03:41 1376832 ----a-w- C:\sar_15_sfx.exe
2011-06-17 16:59 . 2011-06-16 19:28 1441584 ----a-w- C:\TDSSKiller.exe
2011-06-17 16:20 . 2011-06-15 00:26 7283008 ----a-w- C:\stinger10.2.0.112.exe
2011-06-16 20:19 . 2011-06-16 20:19 -------- d-----w- c:\documents and settings\LocalService\Application Data\Trend Micro
2011-06-16 20:19 . 2011-06-16 20:10 92112 ----a-w- c:\windows\system32\drivers\tmtdi.sys
2011-06-16 20:18 . 2011-06-16 20:10 64080 ----a-w- c:\windows\system32\drivers\tmevtmgr.sys
2011-06-16 20:18 . 2011-06-16 20:10 80464 ----a-w- c:\windows\system32\drivers\tmactmon.sys
2011-06-16 20:18 . 2011-06-16 20:10 189520 ----a-w- c:\windows\system32\drivers\tmcomm.sys
2011-06-16 20:18 . 2011-06-16 20:18 -------- d-----w- c:\documents and settings\LocalService\Local Settings\Application Data\Trend Micro
2011-06-16 20:14 . 2011-06-16 20:30 -------- d-----w- c:\documents and settings\All Users\Application Data\Trend Micro
2011-06-16 19:40 . 2011-06-16 19:40 -------- d--h--w- c:\windows\system32\GroupPolicy
2011-06-16 19:02 . 2011-06-16 19:02 -------- d-----w- c:\documents and settings\arnold long\Application Data\Malwarebytes
2011-06-16 19:02 . 2011-06-16 19:02 -------- d-----w- c:\documents and settings\All Users\Application Data\Malwarebytes
2011-06-16 19:02 . 2011-06-25 17:24 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
2011-06-16 16:29 . 2011-06-16 16:34 -------- d-----w- c:\documents and settings\All Users\Application Data\Bomgar-SCC-4DFA2F50
2011-06-16 15:48 . 2011-06-16 16:12 -------- d-----w- c:\documents and settings\All Users\Application Data\Bomgar-SCC-4DFA25C0
2011-06-16 15:03 . 2011-06-16 15:03 -------- d-----w- c:\documents and settings\All Users\Application Data\Uninstall
2011-06-16 15:02 . 2011-06-16 15:02 -------- d-----w- c:\program files\Common Files\SureThing Shared
2011-06-15 22:49 . 2011-04-21 13:37 105472 ------w- c:\windows\system32\dllcache\mup.sys
2011-06-09 11:27 . 2008-04-14 00:12 26624 ----a-w- c:\documents and settings\LocalService\Application Data\Microsoft\UPnP Device Host\upnphost\udhisapi.dll
2011-06-08 23:24 . 2011-06-08 23:29 -------- d-----w- c:\documents and settings\arnold long\Local Settings\Application Data\Browser Guard
2011-06-08 20:14 . 2011-06-08 20:10 35328 ----a-w- c:\windows\system32\drivers\pcntpci5.sys
2011-06-08 20:14 . 2011-06-08 20:10 14208 ----a-w- c:\windows\system32\drivers\battc.sys
2011-06-08 20:14 . 2011-06-08 20:10 13952 ----a-w- c:\windows\system32\drivers\cmbatt.sys
2011-06-08 20:14 . 2011-06-08 20:10 10240 ----a-w- c:\windows\system32\drivers\compbatt.sys
2011-06-08 19:49 . 2011-06-08 20:58 9216 ----a-w- c:\windows\system32\Native.exe
2011-06-08 19:49 . 2011-06-08 20:16 -------- d-----w- C:\ReimageUndo
2011-06-08 19:32 . 2011-06-08 21:15 -------- d-----w- C:\rei
2011-06-08 19:32 . 2011-06-08 19:32 -------- d-----w- c:\program files\Reimage
2011-06-07 01:45 . 2011-06-07 01:45 -------- d-----w- C:\RE 20ToolKit
2011-06-07 00:56 . 2011-06-07 00:56 -------- d-sh--w- c:\documents and settings\Administrator\IETldCache
2011-06-06 20:00 . 2011-06-06 20:00 75776 --sh--r- c:\windows\system32\msportsp.dll
2011-05-30 19:28 . 2011-05-30 19:28 -------- d-----w- c:\documents and settings\G Elaine Long\.jagex_cache_32
.
.
.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2011-06-08 20:10 . 2005-08-16 09:40 209624 ----a-w- c:\windows\system32\wuweb.dll
2011-06-08 20:10 . 2005-08-16 09:40 183296 ----a-w- c:\windows\system32\wuaueng1.dll
2011-06-08 20:10 . 2005-08-16 09:40 165888 ----a-w- c:\windows\system32\wuauclt1.exe
2011-06-08 20:10 . 2005-08-16 09:18 10752 ----a-w- c:\windows\system32\wpdtrace.dll
2011-06-08 20:10 . 2008-07-25 15:16 16896 ----a-w- c:\windows\system32\mscorier.dll
2011-06-08 20:10 . 2008-07-25 15:16 106496 ----a-w- c:\windows\system32\mscories.dll
2011-06-08 20:10 . 2005-08-16 09:18 354816 ----a-w- c:\windows\system32\winhttp.dll
2011-06-08 20:10 . 2005-08-16 09:18 75776 ----a-w- c:\windows\system32\strmfilt.dll
2011-06-08 20:10 . 2005-08-16 09:18 331776 ----a-w- c:\windows\system32\wpdmtpdr.dll
2011-06-08 20:10 . 2005-08-16 09:18 65536 ----a-w- c:\windows\system32\jgsh400.dll
2011-06-08 20:10 . 2005-08-16 09:18 45568 ----a-w- c:\windows\system32\jgsd400.dll
2011-06-08 20:10 . 2006-12-20 15:35 11868 ----a-w- c:\windows\system32\drivers\mdmxsdk.sys
2011-06-08 20:10 . 2005-08-16 09:18 44544 ----a-w- c:\windows\system32\jgaw400.dll
2011-06-08 20:10 . 2005-08-16 09:18 35840 ----a-w- c:\windows\system32\jgmd400.dll
2011-06-08 20:10 . 2005-08-16 09:18 191488 ----a-w- c:\windows\system32\iuengine.dll
2011-06-08 20:10 . 2005-08-16 09:18 25088 ----a-w- c:\windows\system32\httpapi.dll
2011-06-08 20:10 . 2004-08-04 04:00 265728 ----a-w- c:\windows\system32\drivers\http.sys
2011-06-07 01:41 . 2010-05-29 02:16 1324 ------w- c:\documents and settings\G Elaine Long\Local Settings\Application Data\d3d9caps.tmp
2011-05-02 15:31 . 2005-08-16 09:40 692736 ----a-w- c:\windows\system32\inetcomm.dll
2011-04-29 16:19 . 2005-08-16 09:18 456320 ----a-w- c:\windows\system32\drivers\mrxsmb.sys
2011-04-25 16:11 . 2005-08-16 09:18 916480 ----a-w- c:\windows\system32\wininet.dll
2011-04-25 16:11 . 2005-08-16 09:18 43520 ----a-w- c:\windows\system32\licmgr10.dll
2011-04-25 16:11 . 2005-08-16 09:18 1469440 ----a-w- c:\windows\system32\inetcpl.cpl
2011-04-25 12:01 . 2005-08-16 09:18 385024 ----a-w- c:\windows\system32\html.iec
2011-04-21 13:37 . 2005-08-16 09:18 105472 ----a-w- c:\windows\system32\drivers\mup.sys
.
.
((((((((((((((((((((((((((((( SnapShot@2011-06-25_17.20.33 )))))))))))))))))))))))))))))))))))))))))
.
+ 2011-06-26 15:58 . 2011-06-26 15:58 16384 c:\windows\Temp\Perflib_Perfdata_79c.dat
- 2011-06-25 11:38 . 2009-01-23 00:24 8981856 c:\windows\SoftwareDistribution\Download\Install\NDP20SP2-KB958481-x86.exe
.
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4
.
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"DellSupport"="c:\program files\Dell Support\DSAgnt.exe" [2006-08-29 395776]
"DellSupportCenter"="c:\program files\Dell Support Center\bin\sprtcmd.exe" [2008-08-13 206064]
"Skype"="c:\program files\Skype\Phone\Skype.exe" [2011-01-26 15026056]
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"ATT-SST_McciTrayApp"="c:\program files\ATT-SST\McciTrayApp.exe" [2008-09-02 1529856]
"dellsupportcenter"="c:\program files\Dell Support Center\bin\sprtcmd.exe" [2008-08-13 206064]
"NvCplDaemon"="c:\windows\system32\NvCpl.dll" [2006-08-23 7630848]
"ISUSPM Startup"="c:\progra~1\COMMON~1\INSTAL~1\UPDATE~1\ISUSPM.exe" [2004-07-27 221184]
"Conime"="c:\windows\system32\conime.exe" [2008-04-14 27648]
"EKIJ5000StatusMonitor"="c:\windows\System32\spool\DRIVERS\W32X86\3\EKIJ5000MUI.exe" [2009-08-03 1626112]
"QuickTime Task"="c:\program files\QuickTime\qttask.exe" [2008-09-06 413696]
"iTunesHelper"="c:\program files\iTunes\iTunesHelper.exe" [2011-03-07 421160]
"AppleSyncNotifier"="c:\program files\Common Files\Apple\Mobile Device Support\AppleSyncNotifier.exe" [2010-10-08 47904]
"Adobe Reader Speed Launcher"="c:\program files\Adobe\Reader 9.0\Reader\Reader_sl.exe" [2011-01-31 35760]
"Adobe ARM"="c:\program files\Common Files\Adobe\ARM\1.0\AdobeARM.exe" [2010-09-21 932288]
"MSN Toolbar"="c:\program files\MSN Toolbar\Platform\4.0.0401.0\mswinext.exe" [2010-02-12 240992]
"Microsoft Default Manager"="c:\program files\Microsoft\Search Enhancement Pack\Default Manager\DefMgr.exe" [2009-07-17 288080]
"TkBellExe"="c:\program files\real\realplayer\update\realsched.exe" [2010-11-21 274608]
"Trend Micro Browser Guard"="c:\program files\Trend Micro\Browser Guard\BGUI.EXE" [2011-02-26 787984]
"ehTray"="c:\windows\ehome\ehtray.exe" [2011-06-08 64512]
"Trend Micro Titanium"="c:\program files\Trend Micro\Titanium\UIFramework\uiWinMgr.exe" [2011-02-17 1111568]
"Trend Micro Client Framework"="c:\program files\Trend Micro\UniClient\UiFrmWrk\UIWatchDog.exe" [2011-02-10 116752]
"DWQueuedReporting"="c:\progra~1\COMMON~1\MICROS~1\DW\dwtrig20.exe" [2007-02-26 437160]
.
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run]
"DWQueuedReporting"="c:\progra~1\COMMON~1\MICROS~1\DW\dwtrig20.exe" [2007-02-26 437160]
.
c:\documents and settings\G Elaine Long\Start Menu\Programs\Startup\
Microsoft Office OneNote 2003 Quick Launch.lnk - c:\program files\Microsoft Office\OFFICE11\ONENOTEM.EXE [2007-4-19 64864]
.
c:\documents and settings\All Users\Start Menu\Programs\Startup\
Digital Line Detect.lnk - c:\program files\Digital Line Detect\DLG.exe [2006-12-20 24576]
Microsoft Office OneNote 2003 Quick Launch.lnk - c:\program files\Microsoft Office\OFFICE11\ONENOTEM.EXE [2007-4-19 64864]
.
[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\TrendAntiVirus]
"DisableMonitoring"=dword:00000001
.
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"c:\\Program Files\\Messenger\\msmsgs.exe"=
"c:\\Documents and Settings\\Dee Duncan\\Application Data\\MySpace\\IM\\bin\\MySpaceIM.exe"=
"c:\\Program Files\\LimeWire\\LimeWire.exe"=
"c:\\Program Files\\Skype\\Plugin Manager\\skypePM.exe"=
"c:\\Program Files\\Kodak\\AiO\\Center\\AiOHomeCenter.exe"=
"c:\\Program Files\\Kodak\\AiO\\Center\\Kodak.Statistics.exe"=
"c:\\Program Files\\Kodak\\AiO\\Center\\NetworkPrinterDiscovery.exe"=
"c:\\Program Files\\Kodak\\AiO\\Firmware\\KodakAiOUpdater.exe"=
"c:\\Documents and Settings\\All Users\\Application Data\\Kodak\\Installer\\Setup.exe"=
"c:\\Program Files\\AddThis Toolbar\\ToolbarUpdate.exe"=
"c:\\Program Files\\Skype\\Phone\\Skype.exe"=
"c:\\Program Files\\Bonjour\\mDNSResponder.exe"=
"c:\\Program Files\\iTunes\\iTunes.exe"=
.
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\GloballyOpenPorts\List]
"9323:TCP"= 9323:TCP:EKDiscovery
"9324:TCP"= 9324:TCP:EKDiscovery
"9322:TCP"= 9322:TCP:EKDiscovery
.
R2 Kodak AiO Network Discovery Service;Kodak AiO Network Discovery Service;c:\program files\Kodak\AiO\Center\ekdiscovery.exe [8/5/2009 1:49 PM 284016]
R2 tmevtmgr;tmevtmgr;c:\windows\system32\drivers\tmevtmgr.sys [6/16/2011 4:18 PM 64080]
S1 MpKsl1a47caa5;MpKsl1a47caa5;\??\c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{D4EAD139-238B-4C27-B594-64A44AF32C0F}\MpKsl1a47caa5.sys --> c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{D4EAD139-238B-4C27-B594-64A44AF32C0F}\MpKsl1a47caa5.sys [?]
S1 MpKsl1e24514a;MpKsl1e24514a;\??\c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{B2E13C63-0881-401C-B077-F4FFBF1C10F7}\MpKsl1e24514a.sys --> c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{B2E13C63-0881-401C-B077-F4FFBF1C10F7}\MpKsl1e24514a.sys [?]
S1 MpKsl2c7435f5;MpKsl2c7435f5;\??\c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{4D14E363-DD78-45B1-B8F2-D0030DD3D441}\MpKsl2c7435f5.sys --> c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{4D14E363-DD78-45B1-B8F2-D0030DD3D441}\MpKsl2c7435f5.sys [?]
S1 MpKsl343450ce;MpKsl343450ce;\??\c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{6E433DF4-0549-4193-9933-6A3DCDDC6C58}\MpKsl343450ce.sys --> c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{6E433DF4-0549-4193-9933-6A3DCDDC6C58}\MpKsl343450ce.sys [?]
S1 MpKsl433be526;MpKsl433be526;\??\c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{F5BA268D-4720-41FD-83AB-57512EF231EF}\MpKsl433be526.sys --> c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{F5BA268D-4720-41FD-83AB-57512EF231EF}\MpKsl433be526.sys [?]
S1 MpKsl56d99f23;MpKsl56d99f23;\??\c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{D4EAD139-238B-4C27-B594-64A44AF32C0F}\MpKsl56d99f23.sys --> c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{D4EAD139-238B-4C27-B594-64A44AF32C0F}\MpKsl56d99f23.sys [?]
S1 MpKsl5baacb70;MpKsl5baacb70;\??\c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{C3ECEEEF-C2D3-4772-9C6B-DDDFFB45DC66}\MpKsl5baacb70.sys --> c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{C3ECEEEF-C2D3-4772-9C6B-DDDFFB45DC66}\MpKsl5baacb70.sys [?]
S1 MpKsl662f1aeb;MpKsl662f1aeb;\??\c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{0EBAC481-EC24-42AB-895D-11C8B9F3C0C1}\MpKsl662f1aeb.sys --> c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{0EBAC481-EC24-42AB-895D-11C8B9F3C0C1}\MpKsl662f1aeb.sys [?]
S1 MpKsl6e386087;MpKsl6e386087;\??\c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{2FBE8987-6230-408C-9FD3-657719061596}\MpKsl6e386087.sys --> c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{2FBE8987-6230-408C-9FD3-657719061596}\MpKsl6e386087.sys [?]
S1 MpKsl793af8fa;MpKsl793af8fa;\??\c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{3B425AFE-4FDB-4067-A34E-D9F3909FC531}\MpKsl793af8fa.sys --> c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{3B425AFE-4FDB-4067-A34E-D9F3909FC531}\MpKsl793af8fa.sys [?]
S1 MpKsl7c62a682;MpKsl7c62a682;\??\c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{F6E80FCD-C1B7-4F66-B04C-0FA1B7ADAD2A}\MpKsl7c62a682.sys --> c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{F6E80FCD-C1B7-4F66-B04C-0FA1B7ADAD2A}\MpKsl7c62a682.sys [?]
S1 MpKsl84bcbc6e;MpKsl84bcbc6e;\??\c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{88244ABF-F2E2-4218-AEFB-098377B1C784}\MpKsl84bcbc6e.sys --> c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{88244ABF-F2E2-4218-AEFB-098377B1C784}\MpKsl84bcbc6e.sys [?]
S1 MpKsla6f5a148;MpKsla6f5a148;\??\c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{C7CB1336-925B-4250-8D16-D4E21E454448}\MpKsla6f5a148.sys --> c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{C7CB1336-925B-4250-8D16-D4E21E454448}\MpKsla6f5a148.sys [?]
S1 MpKsle46f72d7;MpKsle46f72d7;\??\c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{AF7DC1FB-EE81-443B-A3C7-8F17BCBAC318}\MpKsle46f72d7.sys --> c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{AF7DC1FB-EE81-443B-A3C7-8F17BCBAC318}\MpKsle46f72d7.sys [?]
S1 MpKsleda9a48e;MpKsleda9a48e;\??\c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{CBE312E0-3C21-4F99-85F1-C98F4705C153}\MpKsleda9a48e.sys --> c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{CBE312E0-3C21-4F99-85F1-C98F4705C153}\MpKsleda9a48e.sys [?]
S1 MpKslefb721d5;MpKslefb721d5;\??\c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{33AC33C1-9F92-4CA3-A660-4050DFA14104}\MpKslefb721d5.sys --> c:\documents and settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{33AC33C1-9F92-4CA3-A660-4050DFA14104}\MpKslefb721d5.sys [?]
S2 Amsp;Trend Micro Solution Platform;c:\program files\Trend Micro\AMSP\coreServiceShell.exe [6/16/2011 4:16 PM 188272]
S3 MBAMSwissArmy;MBAMSwissArmy;c:\windows\system32\drivers\mbamswissarmy.sys [6/25/2011 1:24 PM 39984]
S3 MEMSWEEP2;MEMSWEEP2;\??\c:\windows\system32\6.tmp --> c:\windows\system32\6.tmp [?]
.
[HKEY_LOCAL_MACHINE\software\microsoft\active setup\installed components\{A509B1FF-37FF-4bFF-8CFF-4F3A747040FF}]
2009-03-08 08:32 128512 ----a-w- c:\windows\system32\advpack.dll
.
Contents of the 'Scheduled Tasks' folder
.
2011-06-18 c:\windows\Tasks\AppleSoftwareUpdate.job
- c:\program files\Apple Software Update\SoftwareUpdate.exe [2008-07-30 16:34]
.
2011-06-26 c:\windows\Tasks\RealUpgradeLogonTaskS-1-5-21-2732942092-1405617663-19741926-1006.job
- c:\program files\Real\RealUpgrade\realupgrade.exe [2010-11-05 16:33]
.
2011-06-26 c:\windows\Tasks\RealUpgradeLogonTaskS-1-5-21-2732942092-1405617663-19741926-1010.job
- c:\program files\Real\RealUpgrade\realupgrade.exe [2010-11-05 16:33]
.
2011-06-26 c:\windows\Tasks\RealUpgradeLogonTaskS-1-5-21-2732942092-1405617663-19741926-1016.job
- c:\program files\Real\RealUpgrade\realupgrade.exe [2010-11-05 16:33]
.
2011-06-26 c:\windows\Tasks\RealUpgradeLogonTaskS-1-5-21-2732942092-1405617663-19741926-1019.job
- c:\program files\Real\RealUpgrade\realupgrade.exe [2010-11-05 16:33]
.
2011-06-26 c:\windows\Tasks\RealUpgradeLogonTaskS-1-5-21-2732942092-1405617663-19741926-1020.job
- c:\program files\Real\RealUpgrade\realupgrade.exe [2010-11-05 16:33]
.
2011-06-24 c:\windows\Tasks\RealUpgradeScheduledTaskS-1-5-21-2732942092-1405617663-19741926-1006.job
- c:\program files\Real\RealUpgrade\realupgrade.exe [2010-11-05 16:33]
.
2011-06-12 c:\windows\Tasks\RealUpgradeScheduledTaskS-1-5-21-2732942092-1405617663-19741926-1010.job
- c:\program files\Real\RealUpgrade\realupgrade.exe [2010-11-05 16:33]
.
2011-06-20 c:\windows\Tasks\RealUpgradeScheduledTaskS-1-5-21-2732942092-1405617663-19741926-1016.job
- c:\program files\Real\RealUpgrade\realupgrade.exe [2010-11-05 16:33]
.
2011-06-23 c:\windows\Tasks\RealUpgradeScheduledTaskS-1-5-21-2732942092-1405617663-19741926-1019.job
- c:\program files\Real\RealUpgrade\realupgrade.exe [2010-11-05 16:33]
.
2011-06-20 c:\windows\Tasks\RealUpgradeScheduledTaskS-1-5-21-2732942092-1405617663-19741926-1020.job
- c:\program files\Real\RealUpgrade\realupgrade.exe [2010-11-05 16:33]
.
2011-06-28 c:\windows\Tasks\User_Feed_Synchronization-{2F95BB85-2AAA-4374-98FE-796094BEC066}.job
- c:\windows\system32\msfeedssync.exe [2006-10-17 08:31]
.
2011-06-28 c:\windows\Tasks\User_Feed_Synchronization-{5A62DFCC-B247-4014-9D7D-E7AFB8B4547F}.job
- c:\windows\system32\msfeedssync.exe [2006-10-17 08:31]
.
2011-06-28 c:\windows\Tasks\User_Feed_Synchronization-{C11FE340-5533-4391-9E44-30E101F9541C}.job
- c:\windows\system32\msfeedssync.exe [2006-10-17 08:31]
.
.
------- Supplementary Scan -------
.
uStart Page = hxxp://att.my.yahoo.com/
uInternet Settings,ProxyOverride = *.local
Trusted Zone: motive.com\pattta.att
Trusted Zone: motive.com\patttbc.att
TCP: DhcpNameServer = 192.168.1.254 192.168.1.254
FF - ProfilePath - c:\documents and settings\arnold long\Application Data\Mozilla\Firefox\Profiles\i0p5q4nw.default\
FF - user.js: general.useragent.extra.zencast - Creative ZENcast v1.01.06
FF - user.js: keyword.enabled - true
FF - user.js: general.useragent.extra.zencast - );user_pref(yahoo.ytff.general.dontshowhpoffer, true
.
.
**************************************************************************
.
catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2011-06-28 13:23
Windows 5.1.2600 Service Pack 3 NTFS
.
scanning hidden processes ...
.
scanning hidden autostart entries ...
.
scanning hidden files ...
.
scan completed successfully
hidden files: 0
.
**************************************************************************
.
[HKEY_LOCAL_MACHINE\System\ControlSet001\Services\MEMSWEEP2]
"ImagePath"="\??\c:\windows\system32\6.tmp"
.
--------------------- DLLs Loaded Under Running Processes ---------------------
.
- - - - - - - > 'explorer.exe'(5580)
c:\windows\system32\WININET.dll
c:\windows\system32\ieframe.dll
c:\windows\system32\webcheck.dll
c:\windows\system32\WPDShServiceObj.dll
c:\windows\system32\PortableDeviceTypes.dll
c:\windows\system32\PortableDeviceApi.dll
.
Completion time: 2011-06-28 13:30:21
ComboFix-quarantined-files.txt 2011-06-28 17:30
ComboFix2.txt 2011-06-25 17:23
ComboFix3.txt 2011-06-24 19:54
.
Pre-Run: 13,032,058,880 bytes free
Post-Run: 13,016,436,736 bytes free
.
- - End Of File - - 453BD65E9AB997A05F8951B1CFC456A4

#12 CatByte

CatByte

    bleepin' tiger


  • Malware Response Team
  • 14,664 posts
  • OFFLINE
  •  
  • Gender:Not Telling
  • Location:Canada
  • Local time:07:19 PM

Posted 28 June 2011 - 02:38 PM

ComboFix 11-06-27.04 - arnold long 06/28/2011 13:11:02.3.1 - x86
Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.958.524 [GMT -4:00]
Running from: c:\documents and settings\arnold long\Desktop\ComboFix.exe
Command switches used :: c:\documents and settings\arnold long\Desktop\CFScript.txt
AV: Microsoft Security Essentials *Disabled/Updated* {BCF43643-A118-4432-AEDE-D861FCBCFCDF}
AV: Trend Micro Titanium Maximum Security *Disabled/Updated* {7D2296BC-32CC-4519-917E-52E652474AF5}


combofix is showing two AV's installed, if you have uninstalled Trend Micro, then it is picking up on left overs, so use the removal tool:

http://esupport.trendmicro.com/Pages/How-do-I-remove-old-or-new-versions-of-Trend-Micro-products-in-my-comp.aspx


Now we just have some housekeeping to do, please do the following:


You can delete the DDS logs and program from your desktop.


NEXT


Follow these steps to uninstall Combofix

  • Make sure your security programs are totally disabled.
  • Click START then RUN
  • Now copy/paste Combofix /uninstall into the runbox and click OK. Note the space between the ..X and the /U, it needs to be there.

Posted Image


If there are any logs/tools remaining on your desktop > right click and delete them.


NEXT


Below I have included a number of recommendations for how to protect your computer against malware infections.

  • It is good security practice to change your passwords to all your online accounts on a fairly regular basis, this is especially true after an infection. Refer to this Microsoft article
    Strong passwords: How to create and use them
    Then consider a password keeper, to keep all your passwords safe. KeePass is a small utility that allows you to manage all your passwords.

  • Keep Windows updated by regularly checking their website at :
    http://windowsupdate.microsoft.com/
    This will ensure your computer has always the latest security updates available installed on your computer.

  • Make Internet Explorer more secure
    • Click Start > Run
    • Type Inetcpl.cpl & click OK
    • Click on the Security tab
    • Click Reset all zones to default level
    • Make sure the Internet Zone is selected & Click Custom level
    • In the ActiveX section, set the first two options ("Download signed and unsigned ActiveX controls) to "Prompt", and ("Initialize and Script ActiveX controls not marked as safe") to "Disable".
    • Next Click OK, then Apply button and then OK to exit the Internet Properties page.

  • Download TFC to your desktop
    • Close any open windows.
    • Double click the TFC icon to run the program
    • TFC will close all open programs itself in order to run,
    • Click the Start button to begin the process.
    • Allow TFC to run uninterrupted.
    • The program should not take long to finish it's job
    • Once its finished it should automatically reboot your machine,
    • if it doesn't, manually reboot to ensure a complete clean
    It's normal after running TFC cleaner that the PC will be slower to boot the first time.

  • WOT, Web of Trust, warns you about risky websites that try to scam visitors, deliver malware or send spam. Protect your computer against online threats by using WOT as your front-line layer of protection when browsing or searching in unfamiliar territory. WOT's color-coded icons show you ratings for 21 million websites, helping you avoid the dangerous sites:
    • Green to go
    • Yellow for caution
    • Red to stop
    WOT has an addon available for both Firefox and IE

  • Keep a backup of your important files - Now, more than ever, it's especially important to protect your digital files and memories. This article is full of good information on alternatives for home backup solutions.

  • ERUNT (Emergency Recovery Utility NT) allows you to keep a complete backup of your registry and restore it when needed. The standard registry backup options that come with Windows back up most of the registry but not all of it. ERUNT however creates a complete backup set, including the Security hive and user related sections. ERUNT is easy to use and since it creates a full backup, there are no options or choices other than to select the location of the backup files. The backup set includes a small executable that will launch the registry restore if needed.

  • In light of your recent issue, I'm sure you'd like to avoid any future infections. Please take a look at this well written article:
    PC Safety and Security--What Do I Need?.


**Be very wary with any security software that is advertised in popups or in other ways. They are not only usually of no use, but often have malware in them.


Thank you for your patience, and performing all of the procedures requested.

Please respond one last time so we can consider the thread resolved and close it, thank-you.

Microsoft MVP - 2010, 2011, 2012, 2013, 2014, 2015


#13 thomasjk

thomasjk
  • Topic Starter

  • Members
  • 41 posts
  • OFFLINE
  •  
  • Local time:07:19 PM

Posted 30 June 2011 - 10:27 PM

Hi CatByte. Thanks for all your help. My friends machine is now working well with no Google re-directs. His AV software is no longer flagging any threats. I consider this issue resolved.

#14 CatByte

CatByte

    bleepin' tiger


  • Malware Response Team
  • 14,664 posts
  • OFFLINE
  •  
  • Gender:Not Telling
  • Location:Canada
  • Local time:07:19 PM

Posted 01 July 2011 - 07:30 AM

you are welcome

stay safe :hello:

~CB

Microsoft MVP - 2010, 2011, 2012, 2013, 2014, 2015


#15 CatByte

CatByte

    bleepin' tiger


  • Malware Response Team
  • 14,664 posts
  • OFFLINE
  •  
  • Gender:Not Telling
  • Location:Canada
  • Local time:07:19 PM

Posted 01 July 2011 - 07:30 AM

It appears that this issue is resolved, therefore I am closing the topic. If that is not the case and you need or wish to continue with this topic, please send me or any Moderator a Personal Message (PM) that you would like this topic re-opened.

Microsoft MVP - 2010, 2011, 2012, 2013, 2014, 2015





0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users