Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Windows XP Fix


  • Please log in to reply
20 replies to this topic

#1 Steve Evans

Steve Evans

  • Members
  • 20 posts
  • OFFLINE
  •  
  • Local time:05:53 AM

Posted 23 July 2011 - 09:35 AM

Hi,

I've been handed a friend's father's laptop that has just started playing up. It's been infected with "Windows XP Fix". Aparently he was daft enought to actually hand over his credit card details to "activate" it. I've manually removed the trojan having found some bogus "Run" registry entries, updated the AV to MS Security Essentials, turned on Defender (which for some reason was off), and removed a futher trojan found using "MalwareBytes Anti-Malware" (I do hope that's a legit pieve of software). Alas after all this the machine still has some DNS redirection occuring, although strangely only using IE, not Firefox. Attempting to google "Microsoft Security Essentials" for example seems to work, but following the resulting links leads to some very random places.

I've run combofix (before reading the advice not to do so before posting - sorry about that) and the problem remains. I'll not post the log until instructed to do so!

Basically I'm out of ideas... help!

Thanks,

Steve

Edited by hamluis, 23 July 2011 - 10:31 AM.
Merged topics.


BC AdBot (Login to Remove)

 


#2 whoabuddy

whoabuddy

    Bleepin' Verbose


  • Malware Response Instructor
  • 2,053 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Cottonwood, AZ
  • Local time:09:53 PM

Posted 23 July 2011 - 10:17 AM

Hi Steve,

BC has an uninstall guide for Windows XP Fix, and based on what you have tried already it sounds like you have removed most of the infection, but following these instructions in order (even if you've already done them) should resolve your issue.

If not, you can use the Preparation Guide For Use Before Using Malware Removal Tools and Requesting Help referenced in the article to post a new malware removal request in the Virus, Trojan, Spyware, and Malware Removal Logs section. A user from the Malware Response Team will be able to assist you further.

Best of luck!


Meditate. Elevate. Appreciate. | "Life is a journey, love is the destination, happiness is the path!"
If I am helping you and have not responded within 48 hours, please send me a PM.
Vi Veri Universum Vivus Vici (VVVVV)
Excellent Security Advice
Proud member of UNITE

#3 Steve Evans

Steve Evans
  • Topic Starter

  • Members
  • 20 posts
  • OFFLINE
  •  
  • Local time:05:53 AM

Posted 23 July 2011 - 10:33 AM

Thank you. Interestingly Rkill has killed "c:\Program Files\Microsoft Security Client\Antimalware\MpCmdRun.exe". At first glance this would appear to be a legitimate component, although I've never heard of it. Is this likely to be where the DNS redirector is installed?

Steve

#4 whoabuddy

whoabuddy

    Bleepin' Verbose


  • Malware Response Instructor
  • 2,053 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Cottonwood, AZ
  • Local time:09:53 PM

Posted 23 July 2011 - 10:57 AM

RKill should only terminate known malware processes, but that process is from Microsoft Security Essentials, I'm not sure why it would kill it unless the A/V would interfere with the rest of the steps in the article. RKill only ends the process though, so Microsoft Security Essentials will run again when you reboot.

Your redirections could be coming from a variant of the TDSS rootkit, which is addressed in the Windows XP Fix removal process, or a bogus proxy server which RKill should have fixed. Either way once you make it through all of the steps you should be infection free!
Meditate. Elevate. Appreciate. | "Life is a journey, love is the destination, happiness is the path!"
If I am helping you and have not responded within 48 hours, please send me a PM.
Vi Veri Universum Vivus Vici (VVVVV)
Excellent Security Advice
Proud member of UNITE

#5 Broni

Broni

    The Coolest BC Computer


  • BC Advisor
  • 42,738 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Daly City, CA
  • Local time:10:53 PM

Posted 23 July 2011 - 11:12 AM

Download Security Check from HERE, and save it to your Desktop.

* Double-click SecurityCheck.exe
* Follow the onscreen instructions inside of the black box.
* A Notepad document should open automatically called checkup.txt; please post the contents of that document.

=============================================================================

Please download MiniToolBox and run it.

Checkmark following boxes:
  • Report IE Proxy Settings
  • Report FF Proxy Settings
  • List content of Hosts
  • List IP configuration
  • List last 10 Event Viewer log
  • List Users, Partitions and Memory size
Click Go and post the result.

=============================================================================

Download Malwarebytes' Anti-Malware (aka MBAM): https://www.bleepingcomputer.com/download/malwarebytes-anti-malware/ to your desktop.

* Double-click mbam-setup.exe and follow the prompts to install the program.
* At the end, be sure a checkmark is placed next to Update Malwarebytes' Anti-Malware and Launch Malwarebytes' Anti-Malware, then click Finish.
* If an update is found, it will download and install the latest version.
* Once the program has loaded, select Perform quick scan, then click Scan.
* When the scan is complete, click OK, then Show Results to view the results.
* Be sure that everything is checked, and click Remove Selected.
* When completed, a log will open in Notepad.
* Post the log back here.

Be sure to restart the computer.

The log can also be found here:
C:\Documents and Settings\Username\Application Data\Malwarebytes\Malwarebytes' Anti-Malware\Logs\log-date.txt
Or at C:\Program Files\Malwarebytes' Anti-Malware\Logs\log-date.txt

=============================================================================

Please download GMER from one of the following locations and save it to your desktop:
  • Main Mirror
    This version will download a randomly named file (Recommended)
  • Zipped Mirror
    This version will download a zip file you will need to extract first. If you use this mirror, please extract the zip file to your desktop.
  • Disconnect from the Internet and close all running programs.
  • Temporarily disable any real-time active protection so your security programs will not conflict with gmer's driver.
  • Double-click on the randomly named GMER file (i.e. n7gmo46c.exe) and allow the gmer.sys driver to load if asked.
  • Note: If you downloaded the zipped version, extract the file to its own folder such as C:\gmer and then double-click on gmer.exe.

    Posted Image
  • GMER will open to the Rootkit/Malware tab and perform an automatic quick scan when first run. (do not use the computer while the scan is in progress)
  • If you receive a WARNING!!! about rootkit activity and are asked to fully scan your system...click NO.
  • Now click the Scan button. If you see a rootkit warning window, click OK.
  • When the scan is finished, click the Save... button to save the scan results to your Desktop. Save the file as gmer.log.
  • Click the Copy button and paste the results into your next reply.
  • Exit GMER and be sure to re-enable your anti-virus, Firewall and any other security programs you had disabled.

IMPORTANT! If for some reason GMER refuses to run, try again.
If it still fails, try to UN-check "Devices" in right pane.
If still no joy, try to run it from Safe Mode.

My Website

My help doesn't cost a penny, but if you'd like to consider a donation, click DONATE

 


#6 Steve Evans

Steve Evans
  • Topic Starter

  • Members
  • 20 posts
  • OFFLINE
  •  
  • Local time:05:53 AM

Posted 23 July 2011 - 12:34 PM

Hi and thanks for the response.

At the speed this machine is currently running, this could take some time....

SecurityCheck.exe gets as far as ``Preparing Done!`` and I see no checkup.txt. How long should I wait for this to appear?

Cheers,

Steve

#7 Broni

Broni

    The Coolest BC Computer


  • BC Advisor
  • 42,738 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Daly City, CA
  • Local time:10:53 PM

Posted 23 July 2011 - 12:36 PM

You must be patient.
Without seeing some logs it's impossible to prescribe any further steps.

My Website

My help doesn't cost a penny, but if you'd like to consider a donation, click DONATE

 


#8 Steve Evans

Steve Evans
  • Topic Starter

  • Members
  • 20 posts
  • OFFLINE
  •  
  • Local time:05:53 AM

Posted 23 July 2011 - 12:46 PM

I shall have to be more patient. Checkup.txt:

Results of screen317's Security Check version 0.99.7
Windows XP Service Pack 3
Internet Explorer 8
``````````````````````````````
Antivirus/Firewall Check:

Windows Firewall Enabled!
Trend Micro RUBotted 2.0 Beta
Microsoft Security Essentials
```````````````````````````````
Anti-malware/Other Utilities Check:

Out of date Spybot installed!
Malwarebytes' Anti-Malware
Adobe Flash Player
Adobe Reader 9.4.5
Out of date Adobe Reader installed!
Mozilla Firefox (x86 en-GB..) Firefox Out of Date!
````````````````````````````````
Process Check:
objlist.exe by Laurent

Windows Defender MSMpEng.exe
Windows Defender MSASCui.exe
Malwarebytes' Anti-Malware mbamservice.exe
Malwarebytes' Anti-Malware mbamgui.exe
Microsoft Security Essentials msseces.exe
Microsoft Security Client Antimalware MsMpEng.exe
Windows Defender MSASCui.exe
Trend Micro RUBotted RUBotSrv.exe
Trend Micro RUBotted RUBottedGUI.exe
``````````End of Log````````````

Note that firefox is version 5.01, installed over the last few days, so it's not dramatically out of date.

Steve

#9 Steve Evans

Steve Evans
  • Topic Starter

  • Members
  • 20 posts
  • OFFLINE
  •  
  • Local time:05:53 AM

Posted 23 July 2011 - 12:48 PM

MiniToolBox:

MiniToolBox by Farbar
Ran by Keith (administrator) on 23-07-2011 at 18:47:50
Microsoft Windows XP Service Pack 3 (X86)

***************************************************************************

========================= IE Proxy Settings: ==============================

Proxy is not enabled.
No Proxy Server is set.

========================= FF Proxy Settings: ==============================

"network.proxy.no_proxies_on", "*.local"
"network.proxy.type", 0
========================= Hosts content: =================================

127.0.0.1 localhost

========================= IP Configuration: ================================

# ----------------------------------
# Interface IP Configuration
# ----------------------------------
pushd interface ip


# Interface IP Configuration for "Wireless Network Connection"

set address name="Wireless Network Connection" source=dhcp
set dns name="Wireless Network Connection" source=dhcp register=PRIMARY
set wins name="Wireless Network Connection" source=dhcp

# Interface IP Configuration for "Local Area Connection"

set address name="Local Area Connection" source=dhcp
set dns name="Local Area Connection" source=dhcp register=PRIMARY
set wins name="Local Area Connection" source=dhcp


popd
# End of interface IP configuration




Windows IP Configuration



Host Name . . . . . . . . . . . . : Lonestar

Primary Dns Suffix . . . . . . . :

Node Type . . . . . . . . . . . . : Hybrid

IP Routing Enabled. . . . . . . . : No

WINS Proxy Enabled. . . . . . . . : No



Ethernet adapter Wireless Network Connection:



Media State . . . . . . . . . . . : Media disconnected

Description . . . . . . . . . . . : Atheros AR5005G Wireless Network Adapter

Physical Address. . . . . . . . . : 00-C0-A8-C9-FB-42



Ethernet adapter Local Area Connection:



Connection-specific DNS Suffix . :

Description . . . . . . . . . . . : VIA Rhine II Fast Ethernet Adapter

Physical Address. . . . . . . . . : 00-14-0B-06-34-87

Dhcp Enabled. . . . . . . . . . . : Yes

Autoconfiguration Enabled . . . . : Yes

IP Address. . . . . . . . . . . . : 10.5.1.142

Subnet Mask . . . . . . . . . . . : 255.255.255.0

Default Gateway . . . . . . . . . : 10.5.1.1

DHCP Server . . . . . . . . . . . : 10.5.1.1

DNS Servers . . . . . . . . . . . : 8.8.8.8

8.8.4.4

Lease Obtained. . . . . . . . . . : 23 July 2011 18:27:08

Lease Expires . . . . . . . . . . : 23 July 2011 19:27:08

Server: google-public-dns-a.google.com
Address: 8.8.8.8

Name: google.com
Addresses: 209.85.146.106, 209.85.146.147, 209.85.146.105, 209.85.146.103
209.85.146.104, 209.85.146.99



Pinging google.com [209.85.146.106] with 32 bytes of data:



Reply from 209.85.146.106: bytes=32 time=23ms TTL=54

Reply from 209.85.146.106: bytes=32 time=22ms TTL=54



Ping statistics for 209.85.146.106:

Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),

Approximate round trip times in milli-seconds:

Minimum = 22ms, Maximum = 23ms, Average = 22ms

Server: google-public-dns-a.google.com
Address: 8.8.8.8

Name: yahoo.com
Addresses: 67.195.160.76, 69.147.125.65, 72.30.2.43, 98.137.149.56
209.191.122.70



Pinging yahoo.com [67.195.160.76] with 32 bytes of data:



Reply from 67.195.160.76: bytes=32 time=91ms TTL=53

Reply from 67.195.160.76: bytes=32 time=88ms TTL=53



Ping statistics for 67.195.160.76:

Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),

Approximate round trip times in milli-seconds:

Minimum = 88ms, Maximum = 91ms, Average = 89ms



Pinging 127.0.0.1 with 32 bytes of data:



Reply from 127.0.0.1: bytes=32 time<1ms TTL=128

Reply from 127.0.0.1: bytes=32 time<1ms TTL=128



Ping statistics for 127.0.0.1:

Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),

Approximate round trip times in milli-seconds:

Minimum = 0ms, Maximum = 0ms, Average = 0ms

===========================================================================
Interface List
0x1 ........................... MS TCP Loopback interface
0x2 ...00 c0 a8 c9 fb 42 ...... Atheros AR5005G Wireless Network Adapter - Packet Scheduler Miniport
0x10004 ...00 14 0b 06 34 87 ...... VIA Rhine II Fast Ethernet Adapter - Packet Scheduler Miniport
===========================================================================
===========================================================================
Active Routes:
Network Destination Netmask Gateway Interface Metric
0.0.0.0 0.0.0.0 10.5.1.1 10.5.1.142 20
10.5.1.0 255.255.255.0 10.5.1.142 10.5.1.142 20
10.5.1.142 255.255.255.255 127.0.0.1 127.0.0.1 20
10.255.255.255 255.255.255.255 10.5.1.142 10.5.1.142 20
127.0.0.0 255.0.0.0 127.0.0.1 127.0.0.1 1
169.254.0.0 255.255.0.0 10.5.1.142 10.5.1.142 20
224.0.0.0 240.0.0.0 10.5.1.142 10.5.1.142 20
255.255.255.255 255.255.255.255 10.5.1.142 10.5.1.142 1
255.255.255.255 255.255.255.255 10.5.1.142 2 1
Default Gateway: 10.5.1.1
===========================================================================
Persistent Routes:
None

========================= Event log errors: ===============================

Application errors:
==================
Error: (07/23/2011 10:43:06 AM) (Source: Application Hang) (User: )
Description: Hanging application mbam.exe, version 1.51.1.1076, hang module hungapp, version 0.0.0.0, hang address 0x00000000.

Error: (07/23/2011 02:01:09 AM) (Source: MPSampleSubmission) (User: )
Description: EventType mptelemetry, P1 8024402c, P2 endsearch, P3 search, P4 1.1.1593.0, P5 mpsigdwn.dll, P6 1.1.1593.0, P7 windows defender, P8 NIL, P9 mptelemetry0, P10 mptelemetry1.

Error: (07/22/2011 10:43:18 PM) (Source: Application Hang) (User: )
Description: Fault bucket 1180947459.

Error: (07/22/2011 10:43:00 PM) (Source: Application Hang) (User: )
Description: Hanging application iexplore.exe, version 8.0.6001.18702, hang module hungapp, version 0.0.0.0, hang address 0x00000000.

Error: (07/22/2011 08:00:05 PM) (Source: MPSampleSubmission) (User: )
Description: EventType mptelemetry, P1 8024402c, P2 endsearch, P3 search, P4 3.0.8402.0, P5 mpsigdwn.dll, P6 3.0.8402.0, P7 microsoft security essentials (edb4fa23-53b8-4afa-8c5d-99752cca7094), P8 NIL, P9 mptelemetry0, P10 mptelemetry1.

Error: (07/22/2011 07:12:19 PM) (Source: MPSampleSubmission) (User: )
Description: EventType mptelemetry, P1 8024402c, P2 endsearch, P3 search, P4 3.0.8402.0, P5 mpsigdwn.dll, P6 3.0.8402.0, P7 microsoft security essentials (edb4fa23-53b8-4afa-8c5d-99752cca7094), P8 NIL, P9 mptelemetry0, P10 mptelemetry1.

Error: (07/22/2011 01:32:08 AM) (Source: MPSampleSubmission) (User: )
Description: EventType mptelemetry, P1 8024402c, P2 endsearch, P3 search, P4 1.1.1593.0, P5 mpsigdwn.dll, P6 1.1.1593.0, P7 windows defender, P8 NIL, P9 mptelemetry0, P10 mptelemetry1.

Error: (07/21/2011 07:43:40 PM) (Source: MPSampleSubmission) (User: )
Description: EventType mptelemetry, P1 8024402c, P2 endsearch, P3 search, P4 3.0.8402.0, P5 mpsigdwn.dll, P6 3.0.8402.0, P7 microsoft security essentials (edb4fa23-53b8-4afa-8c5d-99752cca7094), P8 NIL, P9 mptelemetry0, P10 mptelemetry1.

Error: (07/21/2011 07:38:54 PM) (Source: MPSampleSubmission) (User: )
Description: EventType mptelemetry, P1 8024402c, P2 endsearch, P3 search, P4 3.0.8402.0, P5 mpsigdwn.dll, P6 3.0.8402.0, P7 microsoft security essentials (edb4fa23-53b8-4afa-8c5d-99752cca7094), P8 NIL, P9 mptelemetry0, P10 mptelemetry1.

Error: (07/20/2011 07:43:43 PM) (Source: MPSampleSubmission) (User: )
Description: EventType mptelemetry, P1 8024402c, P2 endsearch, P3 search, P4 3.0.8402.0, P5 mpsigdwn.dll, P6 3.0.8402.0, P7 microsoft security essentials (edb4fa23-53b8-4afa-8c5d-99752cca7094), P8 NIL, P9 mptelemetry0, P10 mptelemetry1.


System errors:
=============
Error: (07/23/2011 10:45:49 AM) (Source: Service Control Manager) (User: )
Description: The MBAMService service terminated unexpectedly. It has done this 1 time(s).

Error: (07/23/2011 10:31:06 AM) (Source: 0) (User: )
Description: \Device\Harddisk0\D

Error: (07/23/2011 10:30:59 AM) (Source: 0) (User: )
Description: \Device\Harddisk0\D

Error: (07/23/2011 10:30:53 AM) (Source: 0) (User: )
Description: \Device\Harddisk0\D

Error: (07/23/2011 10:30:46 AM) (Source: 0) (User: )
Description: \Device\Harddisk0\D

Error: (07/23/2011 10:30:40 AM) (Source: 0) (User: )
Description: \Device\Harddisk0\D

Error: (07/23/2011 10:30:34 AM) (Source: 0) (User: )
Description: \Device\Harddisk0\D

Error: (07/23/2011 10:30:25 AM) (Source: 0) (User: )
Description: \Device\Harddisk0\D

Error: (07/23/2011 10:30:18 AM) (Source: 0) (User: )
Description: \Device\Harddisk0\D

Error: (07/23/2011 10:30:11 AM) (Source: 0) (User: )
Description: \Device\Harddisk0\D


Microsoft Office Sessions:
=========================
Error: (07/23/2011 10:43:06 AM) (Source: Application Hang)(User: )
Description: mbam.exe1.51.1.1076hungapp0.0.0.000000000

Error: (07/23/2011 02:01:09 AM) (Source: MPSampleSubmission)(User: )
Description: mptelemetry8024402cendsearchsearch1.1.1593.0mpsigdwn.dll1.1.1593.0windows defenderNILNILNIL

Error: (07/22/2011 10:43:18 PM) (Source: Application Hang)(User: )
Description: 1180947459

Error: (07/22/2011 10:43:00 PM) (Source: Application Hang)(User: )
Description: iexplore.exe8.0.6001.18702hungapp0.0.0.000000000

Error: (07/22/2011 08:00:05 PM) (Source: MPSampleSubmission)(User: )
Description: mptelemetry8024402cendsearchsearch3.0.8402.0mpsigdwn.dll3.0.8402.0microsoft security essentials (edb4fa23-53b8-4afa-8c5d-99752cca7094)NILNILNIL

Error: (07/22/2011 07:12:19 PM) (Source: MPSampleSubmission)(User: )
Description: mptelemetry8024402cendsearchsearch3.0.8402.0mpsigdwn.dll3.0.8402.0microsoft security essentials (edb4fa23-53b8-4afa-8c5d-99752cca7094)NILNILNIL

Error: (07/22/2011 01:32:08 AM) (Source: MPSampleSubmission)(User: )
Description: mptelemetry8024402cendsearchsearch1.1.1593.0mpsigdwn.dll1.1.1593.0windows defenderNILNILNIL

Error: (07/21/2011 07:43:40 PM) (Source: MPSampleSubmission)(User: )
Description: mptelemetry8024402cendsearchsearch3.0.8402.0mpsigdwn.dll3.0.8402.0microsoft security essentials (edb4fa23-53b8-4afa-8c5d-99752cca7094)NILNILNIL

Error: (07/21/2011 07:38:54 PM) (Source: MPSampleSubmission)(User: )
Description: mptelemetry8024402cendsearchsearch3.0.8402.0mpsigdwn.dll3.0.8402.0microsoft security essentials (edb4fa23-53b8-4afa-8c5d-99752cca7094)NILNILNIL

Error: (07/20/2011 07:43:43 PM) (Source: MPSampleSubmission)(User: )
Description: mptelemetry8024402cendsearchsearch3.0.8402.0mpsigdwn.dll3.0.8402.0microsoft security essentials (edb4fa23-53b8-4afa-8c5d-99752cca7094)NILNILNIL


========================= Memory info: ===================================

Percentage of memory in use: 83%
Total physical RAM: 446.08 MB
Available physical RAM: 74.28 MB
Total Pagefile: 1103.87 MB
Available Pagefile: 445.68 MB
Total Virtual: 2047.88 MB
Available Virtual: 1999.3 MB

========================= Partitions: =====================================

1 Drive c: (System) (Fixed) (Total:55.88 GB) (Free:32.97 GB) NTFS

========================= Users: ========================================

User accounts for \\LONESTAR

Administrator ASPNET Guest
HelpAssistant Keith SUPPORT_388945a0


== End of log ==

#10 Steve Evans

Steve Evans
  • Topic Starter

  • Members
  • 20 posts
  • OFFLINE
  •  
  • Local time:05:53 AM

Posted 23 July 2011 - 01:09 PM

MBAM reports no errors:

Malwarebytes' Anti-Malware 1.51.1.1800
www.malwarebytes.org

Database version: 7253

Windows 5.1.2600 Service Pack 3
Internet Explorer 8.0.6001.18702

23/07/2011 19:06:43
mbam-log-2011-07-23 (19-06-42).txt

Scan type: Quick scan
Objects scanned: 155495
Time elapsed: 11 minute(s), 40 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 0

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
(No malicious items detected)


Steve

#11 Broni

Broni

    The Coolest BC Computer


  • BC Advisor
  • 42,738 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Daly City, CA
  • Local time:10:53 PM

Posted 23 July 2011 - 01:11 PM

...and GMER...

My Website

My help doesn't cost a penny, but if you'd like to consider a donation, click DONATE

 


#12 Steve Evans

Steve Evans
  • Topic Starter

  • Members
  • 20 posts
  • OFFLINE
  •  
  • Local time:05:53 AM

Posted 23 July 2011 - 01:16 PM

I'm getting there... just rebooting after MBAM. Now who's being impatient? ;-)

Steve

#13 Broni

Broni

    The Coolest BC Computer


  • BC Advisor
  • 42,738 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Daly City, CA
  • Local time:10:53 PM

Posted 23 July 2011 - 01:17 PM

Hahaha....

My Website

My help doesn't cost a penny, but if you'd like to consider a donation, click DONATE

 


#14 Steve Evans

Steve Evans
  • Topic Starter

  • Members
  • 20 posts
  • OFFLINE
  •  
  • Local time:05:53 AM

Posted 23 July 2011 - 03:40 PM

At last GMER finds a smoking gun!

GMER 1.0.15.15641 - http://www.gmer.net
Rootkit scan 2011-07-23 21:36:48
Windows 5.1.2600 Service Pack 3 Harddisk0\DR0 -> \Device\Ide\IdeDeviceP0T0L0-3 WDC_WD600BEVS-07LAT0 rev.01.06M01
Running: z669lywb.exe; Driver: C:\DOCUME~1\Keith\LOCALS~1\Temp\kwdiapow.sys


---- Kernel code sections - GMER 1.0.15 ----

.text KDCOM.DLL!KdSendPacket F7A5E345 6 Bytes [FA, 8D, 46, 01, 25, FF]
.text KDCOM.DLL!KdSendPacket F7A5E34D 5 Bytes [80, 79, 07, 48, 0D]
.text KDCOM.DLL!KdSendPacket F7A5E353 29 Bytes [FF, FF, FF, 40, 0F, B6, F0, ...]
.text KDCOM.DLL!KdSendPacket F7A5E371 28 Bytes [FF, FF, FF, 42, 0F, B6, FA, ...]
.text KDCOM.DLL!KdD0Transition + 8 F7A5E38E 17 Bytes [08, 03, 55, F8, 03, D8, 81, ...]
.text KDCOM.DLL!KdD0Transition + 1A F7A5E3A0 42 Bytes [FF, FF, FF, 43, 0F, B6, C3, ...]
.text KDCOM.DLL!KdDebuggerInitialize0 + 25 F7A5E3CB 6 Bytes [00, C9, C2, 08, 00, 55] {ADD CL, CL; RET 0x8; PUSH EBP}
.text KDCOM.DLL!KdDebuggerInitialize0 + 2C F7A5E3D2 23 Bytes [EC, 83, C8, FF, 83, 7D, 08, ...]
.text KDCOM.DLL!KdDebuggerInitialize0 + 44 F7A5E3EA 162 Bytes [42, 5E, F6, C1, 01, 74, 0A, ...]
.text KDCOM.DLL!KdRestore + 2D F7A5E48D 1 Byte [43]
.text KDCOM.DLL!KdRestore + 2D F7A5E48D 77 Bytes [43, 08, 89, 45, FC, 8B, 55, ...]
.text KDCOM.DLL!KdRestore + 7C F7A5E4DC 25 Bytes [C9, C2, 08, 00, 55, 8B, EC, ...]
.text KDCOM.DLL!KdRestore + 97 F7A5E4F7 21 Bytes [89, 06, 89, 46, 08, 89, 46, ...]
.text KDCOM.DLL!KdRestore + 19F F7A5E5FF 118 Bytes [68, 3B, E6, A5, F7, FF, 15, ...]
.text ...
PAGEKD KDCOM.DLL!KdReceivePacket + 2 F7A5EF4E 205 Bytes [F0, 8D, 45, FC, 50, 53, 56, ...]
PAGEKD KDCOM.DLL!KdReceivePacket + D0 F7A5F01C 2 Bytes [75, 0E] {JNZ 0x10}
PAGEKD KDCOM.DLL!KdReceivePacket + D3 F7A5F01F 1 Byte [C0]
PAGEKD KDCOM.DLL!KdReceivePacket + D3 F7A5F01F 103 Bytes [C0, 02, 83, C2, 02, 84, DB, ...]
PAGEKD KDCOM.DLL!KdReceivePacket + 13B F7A5F087 131 Bytes [7D, 0C, B8, 4D, 5A, 00, 00, ...]
PAGEKD ...

---- User code sections - GMER 1.0.15 ----

.text C:\WINDOWS\system32\SearchIndexer.exe[2100] kernel32.dll!WriteFile 7C810E27 7 Bytes JMP 00585C0C C:\WINDOWS\system32\MSSRCH.DLL (mssrch.dll/Microsoft Corporation)

---- Kernel IAT/EAT - GMER 1.0.15 ----

IAT \WINDOWS\system32\ntkrnlpa.exe[KDCOM.dll!KdD0Transition] [F7A5E5DF] \WINDOWS\system32\KDCOM.DLL (Kernel Debugger HW Extension DLL/Microsoft Corporation)
IAT \WINDOWS\system32\ntkrnlpa.exe[KDCOM.dll!KdD3Transition] [F7A5E5E9] \WINDOWS\system32\KDCOM.DLL (Kernel Debugger HW Extension DLL/Microsoft Corporation)
IAT \WINDOWS\system32\ntkrnlpa.exe[KDCOM.dll!KdRestore] [F7A5E619] \WINDOWS\system32\KDCOM.DLL (Kernel Debugger HW Extension DLL/Microsoft Corporation)
IAT \WINDOWS\system32\ntkrnlpa.exe[KDCOM.dll!KdReceivePacket] [F7A5E60D] \WINDOWS\system32\KDCOM.DLL (Kernel Debugger HW Extension DLL/Microsoft Corporation)
IAT \WINDOWS\system32\ntkrnlpa.exe[KDCOM.dll!KdDebuggerInitialize0] [F7A5E5F3] \WINDOWS\system32\KDCOM.DLL (Kernel Debugger HW Extension DLL/Microsoft Corporation)
IAT \WINDOWS\system32\ntkrnlpa.exe[KDCOM.dll!KdSave] [F7A5E625] \WINDOWS\system32\KDCOM.DLL (Kernel Debugger HW Extension DLL/Microsoft Corporation)
IAT \WINDOWS\system32\ntkrnlpa.exe[KDCOM.dll!KdDebuggerInitialize1] [F7A5E5FF] \WINDOWS\system32\KDCOM.DLL (Kernel Debugger HW Extension DLL/Microsoft Corporation)
IAT \WINDOWS\system32\ntkrnlpa.exe[KDCOM.dll!KdSendPacket] [F7A5E631] \WINDOWS\system32\KDCOM.DLL (Kernel Debugger HW Extension DLL/Microsoft Corporation)
IAT \WINDOWS\system32\hal.dll[KDCOM.dll!KdRestore] [F7A5E619] \WINDOWS\system32\KDCOM.DLL (Kernel Debugger HW Extension DLL/Microsoft Corporation)
IAT \WINDOWS\system32\KDCOM.DLL[HAL.dll!READ_PORT_UCHAR] 736F746E
IAT \WINDOWS\system32\KDCOM.DLL[HAL.dll!WRITE_PORT_UCHAR] 6C6E726B
IAT \WINDOWS\system32\KDCOM.DLL[HAL.dll!HalQueryRealTimeClock] 6578652E
IAT \WINDOWS\system32\KDCOM.DLL[HAL.dll!HalInitSystem] 00000000
IAT \WINDOWS\system32\KDCOM.DLL[HAL.dll!KdComPortInUse] 2E6C6168

---- Threads - GMER 1.0.15 ----

Thread System [4:108] 84F750B3
Thread System [4:116] 84F75923
Thread System [4:120] 84F767FB

---- Processes - GMER 1.0.15 ----

Process C:\Program Files\Google\Update\GoogleUpdate.exe (*** hidden *** ) 368

---- Disk sectors - GMER 1.0.15 ----

Disk \Device\Harddisk0\DR0 TDL4@MBR code has been found <-- ROOTKIT !!!
Disk \Device\Harddisk0\DR0 sector 00: rootkit-like behavior

---- EOF - GMER 1.0.15 ----

#15 Broni

Broni

    The Coolest BC Computer


  • BC Advisor
  • 42,738 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Daly City, CA
  • Local time:10:53 PM

Posted 23 July 2011 - 04:13 PM

Download TDSSKiller and save it to your desktop.
  • Doubleclick on TDSSKiller.exe to run the application, then on Start Scan.
  • If an infected file is detected, the default action will be Cure, click on Continue.
  • If a suspicious file is detected, the default action will be Skip, click on Continue.
  • It may ask you to reboot the computer to complete the process. Click on Reboot Now.
  • If no reboot is require, click on Report. A log file should appear. Please copy and paste the contents of that file here.
  • If a reboot is required, the report can also be found in your root directory (usually C:\ folder) in the form of TDSSKiller_xxxx_log.txt. Please copy and paste the contents of that file here.

My Website

My help doesn't cost a penny, but if you'd like to consider a donation, click DONATE

 





0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users