Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

yet another Google redirect...


  • This topic is locked This topic is locked
20 replies to this topic

#1 black&gold

black&gold

  • Members
  • 30 posts
  • OFFLINE
  •  
  • Local time:08:57 PM

Posted 30 July 2011 - 12:48 PM

Hey there, for the past few days I seem to have been having a similar problem to SpiderP and several others who have mentioned Google redirect issues on Firefox. I'm using XP. I attempted fixing this on my own firstly. I tried scanning with SAS, Spybot, and others and to no avail, except for Malware Bytes. It found some BHO crap and I got rid of that, but the problem did not cease. However, now I wasn't always getting redirected. It seemed like links to more major and more secure sites would work fine, but lesser sites would get redirected. For example, a google search for football will yield links to the NFL's site and a bunch of other stuff. The official NFL page will load correctly, yet something like a fan site or the NFL's wiki page and such will almost always get redirected.

Some redirects must have caused a drive by to load some other crap on my PC too. At least that is what I guessed when I saw 2 suspicious processes in my task manager. avmeter32 and docprop32. Neither caused any further noticeable problems, but are obviously undesirables. Killbox wouldn't work on them, and I didn't know how to get rid of them, so I went back to a sys restore point from earlier in the week. Then those two processes vanished, and I searched through my registry for them and they were fortunately no longer there. But the redirect issues persisted. No scans (including rootkitbuster which I hadn't ever used before) have been able to find any other malware since then.

Here is my DDS.txt log. (attach log and GMER log are attached)

Also, sincere thanks in advance for taking time to help me out.

.
DDS (Ver_2011-06-23.01) - NTFSx86
Internet Explorer: 7.0.5730.11 BrowserJavaVersion: 1.6.0_21
Run by Kcin at 2:23:15 on 2011-07-30
Microsoft Windows XP Professional 5.1.2600.2.1252.1.1033.18.1015.416 [GMT -4:00]
.
.
============== Running Processes ===============
.
E:\WINDOWS\system32\svchost -k DcomLaunch
svchost.exe
E:\WINDOWS\System32\svchost.exe -k netsvcs
svchost.exe
svchost.exe
E:\WINDOWS\system32\spoolsv.exe
E:\Program Files\Symantec\Norton Ghost 2003\GhostStartService.exe
E:\Program Files\Java\jre6\bin\jqs.exe
E:\WINDOWS\system32\slserv.exe
E:\WINDOWS\Explorer.EXE
E:\WINDOWS\system32\wscntfy.exe
E:\Program Files\Intel\NCS\PROSet\PRONoMgr.exe
E:\WINDOWS\system32\igfxtray.exe
E:\Program Files\Symantec\Norton Ghost 2003\GhostStartTrayApp.exe
E:\Program Files\Common Files\Java\Java Update\jusched.exe
E:\WINDOWS\system32\ctfmon.exe
E:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
E:\WINDOWS\system32\taskmgr.exe
E:\Program Files\Mozilla Firefox\firefox.exe
E:\Program Files\Mozilla Firefox\plugin-container.exe
.
============== Pseudo HJT Report ===============
.
uStart Page = hxxp://www.google.com/
uRun: [ctfmon.exe] e:\windows\system32\ctfmon.exe
uRun: [Steam] "e:\program files\steam\Steam.exe" -silent
mRun: [PRONoMgr.exe] e:\program files\intel\ncs\proset\PRONoMgr.exe
mRun: [IgfxTray] e:\windows\system32\igfxtray.exe
mRun: [HotKeysCmds] e:\windows\system32\hkcmd.exe
mRun: [GhostStartTrayApp] e:\program files\symantec\norton ghost 2003\GhostStartTrayApp.exe
mRun: [GrooveMonitor] "e:\program files\microsoft office\office12\GrooveMonitor.exe"
mRun: [Adobe Reader Speed Launcher] "e:\program files\adobe\reader 9.0\reader\Reader_sl.exe"
mRun: [Adobe ARM] "e:\program files\common files\adobe\arm\1.0\AdobeARM.exe"
mRun: [SunJavaUpdateSched] "e:\program files\common files\java\java update\jusched.exe"
dRunOnce: [ShowDeskFix] regsvr32 /s /n /i:u shell32
StartupFolder: e:\docume~1\kcin\startm~1\programs\startup\onenot~1.lnk - e:\program files\microsoft office\office12\ONENOTEM.EXE
IE: E&xport to Microsoft Excel - e:\progra~1\micros~2\office12\EXCEL.EXE/3000
IE: {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe
IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - e:\program files\messenger\msmsgs.exe
IE: {2670000A-7350-4f3c-8081-5663EE0C6C49} - {48E73304-E1D6-4330-914C-F5F514E3486C} - e:\progra~1\micros~2\office12\ONBttnIE.dll
IE: {92780B25-18CC-41C8-B9BE-3C9C571A8263} - {FF059E31-CC5A-4E2E-BF3B-96E929D65503} - e:\progra~1\micros~2\office12\REFIEBAR.DLL
DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_21-windows-i586.cab
DPF: {CAFEEFAC-0016-0000-0021-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_21-windows-i586.cab
DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_21-windows-i586.cab
TCP: DhcpNameServer = 192.168.1.1
TCP: Interfaces\{1FF5871F-4112-43D3-AFAB-38FD21EFC1FE} : DhcpNameServer = 192.168.1.1
Handler: grooveLocalGWS - {88FED34C-F0CA-4636-A375-3CB6248B04CD} - e:\progra~1\micros~2\office12\GR99D3~1.DLL
Notify: !SASWinLogon - e:\program files\superantispyware\SASWINLO.DLL
Notify: igfxcui - igfxsrvc.dll
SSODL: WPDShServiceObj - {AAA288BA-9A4C-45B0-95D7-94D524869DB5} - e:\windows\system32\wpdshserviceobj.dll
SEH: Groove GFS Stub Execution Hook: {b5a7f190-dda6-4420-b3ba-52453494e6cd} - e:\progra~1\micros~2\office12\GRA8E1~1.DLL
SEH: SABShellExecuteHook Class: {5ae067d3-9afb-48e0-853a-ebb7f4a000da} - e:\program files\superantispyware\SASSEH.DLL
Hosts: 127.0.0.1 www.spywareinfo.com
.
================= FIREFOX ===================
.
FF - ProfilePath - e:\documents and settings\kcin\application data\mozilla\firefox\profiles\s1vv91m2.default\
FF - plugin: e:\program files\java\jre6\bin\new_plugin\npdeployJava1.dll
FF - plugin: e:\program files\pando networks\media booster\npPandoWebPlugin.dll
FF - Ext: Default: {972ce4c6-7e08-4474-a285-3208198ce6fd} - e:\program files\mozilla firefox\extensions\{972ce4c6-7e08-4474-a285-3208198ce6fd}
FF - Ext: Java Console: {CAFEEFAC-0016-0000-0021-ABCDEFFEDCBA} - e:\program files\mozilla firefox\extensions\{CAFEEFAC-0016-0000-0021-ABCDEFFEDCBA}
FF - Ext: Personas: personas@christopher.beard - %profile%\extensions\personas@christopher.beard
FF - Ext: XUL Cache: {5f5dcf4a-ce3e-4321-85a7-d85090815500} - %profile%\extensions\{5f5dcf4a-ce3e-4321-85a7-d85090815500}
FF - Ext: XUL Cache: {737a3a44-c251-4585-8c7d-3985d7bdde65} - %profile%\extensions\{737a3a44-c251-4585-8c7d-3985d7bdde65}
FF - Ext: XUL Cache: {a1ea016b-ef39-4632-831d-f6c560f132fb} - %profile%\extensions\{a1ea016b-ef39-4632-831d-f6c560f132fb}
FF - Ext: Java Quick Starter: jqs@sun.com - e:\program files\java\jre6\lib\deploy\jqs\ff
.
============= SERVICES / DRIVERS ===============
.
R1 GhPciScan;GhostPciScanner;e:\program files\symantec\norton ghost 2003\GhPciScan.sys [2002-8-14 5632]
R1 SASDIFSV;SASDIFSV;e:\program files\superantispyware\sasdifsv.sys [2010-2-17 12872]
R1 SASKUTIL;SASKUTIL;e:\program files\superantispyware\SASKUTIL.SYS [2010-5-10 67656]
S3 npggsvc;nProtect GameGuard Service;e:\windows\system32\gamemon.des -service --> e:\windows\system32\GameMon.des -service [?]
.
=============== Created Last 30 ================
.
2011-07-28 20:37:37 190032 ----a-w- e:\windows\system32\drivers\tmcomm.sys
2011-07-28 20:01:19 388096 ----a-r- e:\documents and settings\kcin\application data\microsoft\installer\{45a66726-69bc-466b-a7a4-12fcba4883d7}\HiJackThis.exe
2011-07-28 20:01:17 -------- d-----w- e:\program files\Trend Micro
2011-07-28 06:30:48 -------- d-----w- e:\windows\system32\wbem\repository\FS
2011-07-28 06:30:48 -------- d-----w- e:\windows\system32\wbem\Repository
2011-07-28 05:38:50 0 ---ha-w- e:\documents and settings\kcin\wzgfncihuf.tmp
2011-07-28 04:25:01 -------- d-----w- E:\!KillBox
2011-07-08 11:04:49 -------- d-----w- e:\program files\Steam
2011-07-08 11:03:30 -------- d-----w- e:\program files\common files\Steam
.
==================== Find3M ====================
.
2011-07-06 23:52:42 41272 ----a-w- e:\windows\system32\drivers\mbamswissarmy.sys
2011-07-06 23:52:42 22712 ----a-w- e:\windows\system32\drivers\mbam.sys
.
============= FINISH: 2:24:33.96 ===============

Attached Files



BC AdBot (Login to Remove)

 


#2 CatByte

CatByte

    bleepin' tiger


  • Malware Response Team
  • 14,664 posts
  • OFFLINE
  •  
  • Gender:Not Telling
  • Location:Canada
  • Local time:09:57 PM

Posted 30 July 2011 - 04:08 PM

Hi,

Please do the following:

Download ComboFix from one of the following locations:
Link 1
Link 2

VERY IMPORTANT !!! Save ComboFix.exe to your Desktop

* IMPORTANT - Disable your AntiVirus and AntiSpyware applications, usually via a right click on the System Tray icon. They may otherwise interfere with our tools. If you have difficulty properly disabling your protective programs, refer to this link here
  • Double click on ComboFix.exe & follow the prompts.
As part of it's process, ComboFix will check to see if the Microsoft Windows Recovery Console is installed. With malware infections being as they are today, it's strongly recommended to have this pre-installed on your machine before doing any malware removal. It will allow you to boot up into a special recovery/repair mode that will allow us to more easily help you should your computer have a problem after an attempted removal of malware.

  • Follow the prompts to allow ComboFix to download and install the Microsoft Windows Recovery Console, and when prompted, agree to the End-User License Agreement to install the Microsoft Windows Recovery Console.
**Please note: If the Microsoft Windows Recovery Console is already installed, ComboFix will continue it's malware removal procedures.

Posted Image

  • Once the Microsoft Windows Recovery Console is installed using ComboFix, you should see the following message:

Posted Image

  • Click on Yes, to continue scanning for malware.
When finished, it shall produce a log for you. Please include the C:\ComboFix.txt in your next reply.
Notes:
1. Do not mouse-click Combofix's window while it is running. That may cause it to stall.
2. Do not "re-run" Combofix. If you have a problem, reply back for further instructions.

Microsoft MVP - 2010, 2011, 2012, 2013, 2014, 2015


#3 black&gold

black&gold
  • Topic Starter

  • Members
  • 30 posts
  • OFFLINE
  •  
  • Local time:08:57 PM

Posted 30 July 2011 - 05:15 PM

Hi, thank you for the help.

It seems I am having an issue with Combofix though. I followed the instructions verbatim. It installed the Microsoft Recovery Console without a problem, then it did it's scan. I'm not sure if the scan had fully completed or not, though the last time I saw it, it had gone through some stages or phases or whatever it called them. Now it said the scan should only take around 10 minutes, and I believe that is about all the longer it took. When I checked it again, my PC was restarting itself. I figured this to be a normal part of it's process, but when it rebooted, I got an error msg that said something to the tune of "PC just recovered from a serious error". I wrote down the tech details.
E:\DOCUME~1/Kcin/LOCALS~1\Temp\WER06ce.dir00\Mini072011-01.dmp
E:\DOCUME~1/Kcin/LOCALS~1\Temp\WER06ce.dir00\sysdata.xml

I don't think anything is interfering with it as I turned everything off. Anyways, I did not send the error report and didn't try to load anything for a little while. Then I tried bringing up the task manager and it took like a millennium for that to come up which is odd, so I assumed perhaps Combofix was running in the background and doing it's thing. However, Combofix never automatically came up and I don't see anywhere that it could have produced a log. Hopefully I'm just missing something simple.

I was going to try running it again, but I remembered that you said to check here first.

#4 CatByte

CatByte

    bleepin' tiger


  • Malware Response Team
  • 14,664 posts
  • OFFLINE
  •  
  • Gender:Not Telling
  • Location:Canada
  • Local time:09:57 PM

Posted 30 July 2011 - 05:57 PM

Hi

Please boot into safe mode and run it again,

thanks

To Enter Safemode
  • Go to Start> Shut off your Computer> Restart
  • As the computer starts to boot-up, Tap the F8 KEY repeatedly,
  • this will bring up a menu.
  • Use the Up and Down Arrow Keys to scroll up to Safemode
  • Then press the Enter Key on your Keyboard
  • go into your usual account

Microsoft MVP - 2010, 2011, 2012, 2013, 2014, 2015


#5 black&gold

black&gold
  • Topic Starter

  • Members
  • 30 posts
  • OFFLINE
  •  
  • Local time:08:57 PM

Posted 30 July 2011 - 06:16 PM

Ok thank you I will try that.

#6 CatByte

CatByte

    bleepin' tiger


  • Malware Response Team
  • 14,664 posts
  • OFFLINE
  •  
  • Gender:Not Telling
  • Location:Canada
  • Local time:09:57 PM

Posted 30 July 2011 - 07:29 PM

:thumbup2:

Microsoft MVP - 2010, 2011, 2012, 2013, 2014, 2015


#7 black&gold

black&gold
  • Topic Starter

  • Members
  • 30 posts
  • OFFLINE
  •  
  • Local time:08:57 PM

Posted 30 July 2011 - 07:39 PM

Thanks for the continued help. Here is the combofix log.


ComboFix 11-07-31.01 - Kcin 07/30/2011 19:27:37.2.1 - x86 MINIMAL
Microsoft Windows XP Professional 5.1.2600.2.1252.1.1033.18.1015.805 [GMT -4:00]
Running from: e:\documents and settings\Kcin\Desktop\ComboFix.exe
.
.
((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.
.
e:\documents and settings\Kcin\Application Data\Mozilla\Firefox\Profiles\s1vv91m2.default\extensions\{5f5dcf4a-ce3e-4321-85a7-d85090815500}
e:\documents and settings\Kcin\Application Data\Mozilla\Firefox\Profiles\s1vv91m2.default\extensions\{5f5dcf4a-ce3e-4321-85a7-d85090815500}\chrome\xulcache.jar
e:\documents and settings\Kcin\Application Data\Mozilla\Firefox\Profiles\s1vv91m2.default\extensions\{5f5dcf4a-ce3e-4321-85a7-d85090815500}\defaults\preferences\xulcache.js
e:\documents and settings\Kcin\Application Data\Mozilla\Firefox\Profiles\s1vv91m2.default\extensions\{5f5dcf4a-ce3e-4321-85a7-d85090815500}\install.rdf
e:\documents and settings\Kcin\Application Data\Mozilla\Firefox\Profiles\s1vv91m2.default\extensions\{737a3a44-c251-4585-8c7d-3985d7bdde65}
e:\documents and settings\Kcin\Application Data\Mozilla\Firefox\Profiles\s1vv91m2.default\extensions\{737a3a44-c251-4585-8c7d-3985d7bdde65}\chrome\xulcache.jar
e:\documents and settings\Kcin\Application Data\Mozilla\Firefox\Profiles\s1vv91m2.default\extensions\{737a3a44-c251-4585-8c7d-3985d7bdde65}\defaults\preferences\xulcache.js
e:\documents and settings\Kcin\Application Data\Mozilla\Firefox\Profiles\s1vv91m2.default\extensions\{737a3a44-c251-4585-8c7d-3985d7bdde65}\install.rdf
e:\documents and settings\Kcin\Application Data\Mozilla\Firefox\Profiles\s1vv91m2.default\extensions\{a1ea016b-ef39-4632-831d-f6c560f132fb}
e:\documents and settings\Kcin\Application Data\Mozilla\Firefox\Profiles\s1vv91m2.default\extensions\{a1ea016b-ef39-4632-831d-f6c560f132fb}\chrome.manifest
e:\documents and settings\Kcin\Application Data\Mozilla\Firefox\Profiles\s1vv91m2.default\extensions\{a1ea016b-ef39-4632-831d-f6c560f132fb}\chrome\xulcache.jar
e:\documents and settings\Kcin\Application Data\Mozilla\Firefox\Profiles\s1vv91m2.default\extensions\{a1ea016b-ef39-4632-831d-f6c560f132fb}\defaults\preferences\xulcache.js
e:\documents and settings\Kcin\Application Data\Mozilla\Firefox\Profiles\s1vv91m2.default\extensions\{a1ea016b-ef39-4632-831d-f6c560f132fb}\install.rdf
e:\documents and settings\Kcin\wzgfncihuf.tmp
e:\documents and settings\Mark\Application Data\Mozilla\Firefox\Profiles\90b6x5d3.default\extensions\{5f5dcf4a-ce3e-4321-85a7-d85090815500}
e:\documents and settings\Mark\Application Data\Mozilla\Firefox\Profiles\90b6x5d3.default\extensions\{5f5dcf4a-ce3e-4321-85a7-d85090815500}\chrome\xulcache.jar
e:\documents and settings\Mark\Application Data\Mozilla\Firefox\Profiles\90b6x5d3.default\extensions\{5f5dcf4a-ce3e-4321-85a7-d85090815500}\defaults\preferences\xulcache.js
e:\documents and settings\Mark\Application Data\Mozilla\Firefox\Profiles\90b6x5d3.default\extensions\{5f5dcf4a-ce3e-4321-85a7-d85090815500}\install.rdf
e:\documents and settings\Mark\Application Data\Mozilla\Firefox\Profiles\90b6x5d3.default\extensions\{737a3a44-c251-4585-8c7d-3985d7bdde65}
e:\documents and settings\Mark\Application Data\Mozilla\Firefox\Profiles\90b6x5d3.default\extensions\{737a3a44-c251-4585-8c7d-3985d7bdde65}\chrome\xulcache.jar
e:\documents and settings\Mark\Application Data\Mozilla\Firefox\Profiles\90b6x5d3.default\extensions\{737a3a44-c251-4585-8c7d-3985d7bdde65}\defaults\preferences\xulcache.js
e:\documents and settings\Mark\Application Data\Mozilla\Firefox\Profiles\90b6x5d3.default\extensions\{737a3a44-c251-4585-8c7d-3985d7bdde65}\install.rdf
e:\documents and settings\Mark\Application Data\Mozilla\Firefox\Profiles\90b6x5d3.default\extensions\{a1ea016b-ef39-4632-831d-f6c560f132fb}
e:\documents and settings\Mark\Application Data\Mozilla\Firefox\Profiles\90b6x5d3.default\extensions\{a1ea016b-ef39-4632-831d-f6c560f132fb}\chrome.manifest
e:\documents and settings\Mark\Application Data\Mozilla\Firefox\Profiles\90b6x5d3.default\extensions\{a1ea016b-ef39-4632-831d-f6c560f132fb}\chrome\xulcache.jar
e:\documents and settings\Mark\Application Data\Mozilla\Firefox\Profiles\90b6x5d3.default\extensions\{a1ea016b-ef39-4632-831d-f6c560f132fb}\defaults\preferences\xulcache.js
e:\documents and settings\Mark\Application Data\Mozilla\Firefox\Profiles\90b6x5d3.default\extensions\{a1ea016b-ef39-4632-831d-f6c560f132fb}\install.rdf
E:\Install.exe
e:\program files\Steam\Steam.exe
.
.
((((((((((((((((((((((((( Files Created from 2011-06-28 to 2011-07-30 )))))))))))))))))))))))))))))))
.
.
2011-07-30 21:23 . 2011-07-30 21:23 -------- d-----w- e:\windows\system32\LogFiles
2011-07-28 20:37 . 2011-07-28 20:37 190032 ----a-w- e:\windows\system32\drivers\tmcomm.sys
2011-07-28 20:01 . 2011-07-28 20:01 388096 ----a-r- e:\documents and settings\Kcin\Application Data\Microsoft\Installer\{45A66726-69BC-466B-A7A4-12FCBA4883D7}\HiJackThis.exe
2011-07-28 20:01 . 2011-07-28 20:01 -------- d-----w- e:\program files\Trend Micro
2011-07-28 06:30 . 2011-07-28 06:30 -------- d-----w- e:\windows\system32\wbem\Repository
2011-07-28 04:25 . 2011-07-28 04:25 -------- d-----w- E:\!KillBox
2011-07-08 11:04 . 2011-07-30 23:36 -------- d-----w- e:\program files\Steam
2011-07-08 11:03 . 2011-07-08 20:31 -------- d-----w- e:\program files\Common Files\Steam
.
.
.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2011-07-06 23:52 . 2010-06-19 18:44 41272 ----a-w- e:\windows\system32\drivers\mbamswissarmy.sys
2011-07-06 23:52 . 2010-06-19 18:44 22712 ----a-w- e:\windows\system32\drivers\mbam.sys
.
.
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"PRONoMgr.exe"="e:\program files\Intel\NCS\PROSet\PRONoMgr.exe" [2003-03-11 86016]
"IgfxTray"="e:\windows\system32\igfxtray.exe" [2006-04-01 155648]
"HotKeysCmds"="e:\windows\system32\hkcmd.exe" [2006-04-01 126976]
"GhostStartTrayApp"="e:\program files\Symantec\Norton Ghost 2003\GhostStartTrayApp.exe" [2002-08-14 94208]
"GrooveMonitor"="e:\program files\Microsoft Office\Office12\GrooveMonitor.exe" [2006-10-27 31016]
"Adobe Reader Speed Launcher"="e:\program files\Adobe\Reader 9.0\Reader\Reader_sl.exe" [2010-06-20 35760]
"Adobe ARM"="e:\program files\Common Files\Adobe\ARM\1.0\AdobeARM.exe" [2010-09-21 932288]
"SunJavaUpdateSched"="e:\program files\Common Files\Java\Java Update\jusched.exe" [2010-05-14 248552]
.
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\RunOnce]
"ShowDeskFix"="shell32" [X]
.
e:\documents and settings\Kcin\Start Menu\Programs\Startup\
OneNote 2007 Screen Clipper and Launcher.lnk - e:\program files\Microsoft Office\Office12\ONENOTEM.EXE [2006-10-26 98632]
.
[hkey_local_machine\software\microsoft\windows\currentversion\explorer\ShellExecuteHooks]
"{5AE067D3-9AFB-48E0-853A-EBB7F4A000DA}"= "e:\program files\SUPERAntiSpyware\SASSEH.DLL" [2008-05-13 77824]
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\!SASWinLogon]
2009-09-03 22:21 548352 ----a-w- e:\program files\SUPERAntiSpyware\SASWINLO.DLL
.
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]
"EnableFirewall"= 0 (0x0)
.
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"e:\\WINDOWS\\system32\\sessmgr.exe"=
"e:\\Program Files\\Microsoft Office\\Office12\\OUTLOOK.EXE"=
"e:\\Program Files\\Microsoft Office\\Office12\\GROOVE.EXE"=
"e:\\Program Files\\Microsoft Office\\Office12\\ONENOTE.EXE"=
"c:\\Program Files\\THQ\\DarkCrusade\\DarkCrusade.exe"=
"e:\\Program Files\\THQ\\Dawn of War - Soulstorm\\Soulstorm.exe"=
"e:\\Program Files\\mektek.net\\MTX\\mtx.exe"=
"e:\\Program Files\\THQ\\DarkCrusade\\DarkCrusade.exe"=
"e:\\Documents and Settings\\Kcin\\My Documents\\Mekwar4\\Mechwarrior Mercenaries - Mektek Mekpak\\MW4Mercs.exe"=
"e:\\Program Files\\Pando Networks\\Media Booster\\PMB.exe"=
"e:\\Program Files\\Turbine\\DDO Unlimited\\dndclient.exe"=
"e:\\Program Files\\Turbine\\The Lord of the Rings Online\\lotroclient.exe"=
"e:\\Program Files\\Steam\\steamapps\\shatterstar27\\team fortress 2\\hl2.exe"=
.
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\GloballyOpenPorts\List]
"58848:TCP"= 58848:TCP:Pando Media Booster
"58848:UDP"= 58848:UDP:Pando Media Booster
.
R1 GhPciScan;GhostPciScanner;e:\program files\Symantec\Norton Ghost 2003\GhPciScan.sys [8/14/2002 3:11 PM 5632]
S1 SASDIFSV;SASDIFSV;e:\program files\SUPERAntiSpyware\sasdifsv.sys [2/17/2010 2:25 PM 12872]
S1 SASKUTIL;SASKUTIL;e:\program files\SUPERAntiSpyware\SASKUTIL.SYS [5/10/2010 2:41 PM 67656]
S3 npggsvc;nProtect GameGuard Service;e:\windows\system32\GameMon.des -service --> e:\windows\system32\GameMon.des -service [?]
.
.
------- Supplementary Scan -------
.
uStart Page = hxxp://www.google.com/
IE: E&xport to Microsoft Excel - e:\progra~1\MICROS~2\Office12\EXCEL.EXE/3000
TCP: DhcpNameServer = 192.168.1.1
FF - ProfilePath - e:\documents and settings\Kcin\Application Data\Mozilla\Firefox\Profiles\s1vv91m2.default\
FF - Ext: Default: {972ce4c6-7e08-4474-a285-3208198ce6fd} - e:\program files\Mozilla Firefox\extensions\{972ce4c6-7e08-4474-a285-3208198ce6fd}
FF - Ext: Java Console: {CAFEEFAC-0016-0000-0021-ABCDEFFEDCBA} - e:\program files\Mozilla Firefox\extensions\{CAFEEFAC-0016-0000-0021-ABCDEFFEDCBA}
FF - Ext: Personas: personas@christopher.beard - %profile%\extensions\personas@christopher.beard
FF - Ext: Java Quick Starter: jqs@sun.com - e:\program files\Java\jre6\lib\deploy\jqs\ff
.
- - - - ORPHANS REMOVED - - - -
.
HKCU-Run-Steam - e:\program files\Steam\Steam.exe
AddRemove-Steam App 440 - e:\program files\Steam\steam.exe
.
.
.
**************************************************************************
.
catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2011-07-30 19:37
Windows 5.1.2600 Service Pack 2 NTFS
.
scanning hidden processes ...
.
scanning hidden autostart entries ...
.
scanning hidden files ...
.
scan completed successfully
hidden files: 0
.
**************************************************************************
.
[HKEY_LOCAL_MACHINE\System\ControlSet001\Services\npggsvc]
"ImagePath"="e:\windows\system32\GameMon.des -service"
.
--------------------- DLLs Loaded Under Running Processes ---------------------
.
- - - - - - - > 'winlogon.exe'(224)
e:\program files\SUPERAntiSpyware\SASWINLO.DLL
.
Completion time: 2011-07-30 19:41:47
ComboFix-quarantined-files.txt 2011-07-30 23:41
.
Pre-Run: 55,494,430,720 bytes free
Post-Run: 55,471,644,672 bytes free
.
- - End Of File - - 74BBF04EBDC1DA8687840DD4604CA378

#8 CatByte

CatByte

    bleepin' tiger


  • Malware Response Team
  • 14,664 posts
  • OFFLINE
  •  
  • Gender:Not Telling
  • Location:Canada
  • Local time:09:57 PM

Posted 30 July 2011 - 07:59 PM

Hi,

Please do the following:


  • Please open your MalwareBytes AntiMalware Program
  • Click the Update Tab and search for updates
  • If an update is found, it will download and install the latest version.
  • Once the program has loaded, select "Perform Quick Scan", then click Scan.
  • The scan may take some time to finish, so please be patient.
  • When the scan is complete, click OK, then Show Results to view the results.
  • Make sure that everything is checked, and click Remove Selected. <-- very important
  • When disinfection is completed, a log will open in Notepad and you may be prompted to Restart. (See Extra Note)
  • The log is automatically saved by MBAM and can be viewed by clicking the Logs tab in MBAM.
  • Copy&Paste the entire report in your next reply.

Extra Note:If MBAM encounters a file that is difficult to remove, you will be presented with 1 of 2 prompts, click OK to either and let MBAM proceed with the disinfection process, if asked to restart the computer, please do so immediately.



NEXT


Go here to run an online scanner from ESET.
  • Turn off the real time scanner of any existing antivirus program while performing the online scan
  • Tick the box next to YES, I accept the Terms of Use.
  • Click Start
  • When asked, allow the activeX control to install
  • Click Start
  • Make sure that the option Remove found threats is unticked and the Scan Archives option is ticked.
  • Click on Advanced Settings, ensure the options Scan for potentially unwanted applications, Scan for potentially unsafe applications, and Enable Anti-Stealth Technology are ticked.
  • Click Scan
  • Wait for the scan to finish
  • When the scan completes, press the LIST OF THREATS FOUND button
  • Press EXPORT TO TEXT FILE , name the file ESETSCAN and save it to your desktop
  • Include the contents of this report in your next reply.
  • Press the BACK button.
  • Press Finish

Microsoft MVP - 2010, 2011, 2012, 2013, 2014, 2015


#9 black&gold

black&gold
  • Topic Starter

  • Members
  • 30 posts
  • OFFLINE
  •  
  • Local time:08:57 PM

Posted 30 July 2011 - 08:50 PM

Okay, well Malwarebytes didn't find anything. I'll proceed with that ESET program. Here is the MBAM log anyway, though this may be unnecessary to post it. B)

Malwarebytes' Anti-Malware 1.51.1.1800
www.malwarebytes.org

Database version: 7332

Windows 5.1.2600 Service Pack 2
Internet Explorer 7.0.5730.11

7/30/2011 9:40:48 PM
mbam-log-2011-07-30 (21-40-48).txt

Scan type: Quick scan
Objects scanned: 158254
Time elapsed: 7 minute(s), 25 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 0

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
(No malicious items detected)

Edited by black&gold, 30 July 2011 - 08:51 PM.


#10 CatByte

CatByte

    bleepin' tiger


  • Malware Response Team
  • 14,664 posts
  • OFFLINE
  •  
  • Gender:Not Telling
  • Location:Canada
  • Local time:09:57 PM

Posted 31 July 2011 - 06:25 AM

:thumbup2:

Microsoft MVP - 2010, 2011, 2012, 2013, 2014, 2015


#11 black&gold

black&gold
  • Topic Starter

  • Members
  • 30 posts
  • OFFLINE
  •  
  • Local time:08:57 PM

Posted 31 July 2011 - 02:48 PM

Okay, sorry for the delay. The first time I ran ESET, it stalled at 70%. I got a partial log. Then I ran it again overnight. It took like over 8 hours to complete. Finally something found the problematic stuff though! ESET scanned the C drive as well (which is an older drive from when this was my roomate's pc). It's a mostly full drive (was only like 37 gigs), I still use some programs on it, and I didn't think there would be any problems on it. The scan says it has found threats on both drives. It's been like a year since a second drive was added though and I haven't had issues until now. Anyways, without further ado, here is my log.


C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy\Recovery\FraudAVCare6.zip Win32/Bagle.gen.zip worm
C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy\Recovery\FraudAVCare7.zip Win32/Bagle.gen.zip worm
C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy\Recovery\WinAgentieu.zip Win32/Bagle.gen.zip worm
C:\Documents and Settings\Mark-on\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\file\Show.class-54976855-402e6dfb.class probably a variant of Java/TrojanDownloader.Agent.AB trojan
C:\Documents and Settings\Mark-on\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\A.jar-3bef1dd3-1ea97f76.zip a variant of Java/Exploit.Agent.NAL trojan
C:\Documents and Settings\Mark-on\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\gsb50.jar-e1cc989-3b6bc3b7.zip OSX/Exploit.Smid.B trojan
C:\Documents and Settings\Mark-on\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\jvmseria.jar-56150ada-6fe5e441.zip multiple threats
C:\Documents and Settings\Mark-on\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\piu.bin-51e72c40-7dd26ebd.zip multiple threats
C:\Documents and Settings\Mark-on\Desktop\DOW extras\War 40k stuff\jZipV1c.exe a variant of Win32/Adware.Toolbar.Shopper.AA application
C:\Documents and Settings\Mark-on\Local Settings\Application Data\{09942D21-7653-4CEA-B79C-49CB0B4E487F}\chrome\content\overlay.xul probably a variant of Win32/Agent.NVQFFQI trojan
C:\Program Files\AIM\Sysfiles\WxBug.EXE Win32/Adware.WBug.A application
C:\WINDOWS\isocozofuqoqiwog.dll a variant of Win32/Cimag.BX trojan
C:\WINDOWS\system32\fjhdyfhsn.bat BAT/Agent.NGA trojan
E:\Documents and Settings\All Users\Documents\DAWN OF WAR SOULSTORM addons\DOW Extras\jZipV1c.exe a variant of Win32/Adware.Toolbar.Shopper.AA application
E:\Documents and Settings\Kcin\Application Data\Sun\Java\Deployment\cache\6.0\10\6b1e720a-6b0cb08b Java/Agent.BV trojan
E:\Documents and Settings\Kcin\Application Data\Sun\Java\Deployment\cache\6.0\3\465c2a43-1401403f multiple threats
E:\Documents and Settings\Kcin\Application Data\Sun\Java\Deployment\cache\6.0\38\2ef758e6-7b4fef50 Java/Agent.BV trojan
E:\Documents and Settings\Kcin\Application Data\Sun\Java\Deployment\cache\6.0\45\6dfd656d-6549483d Java/TrojanDownloader.OpenStream.NCA trojan
E:\Documents and Settings\Kcin\Application Data\Sun\Java\Deployment\cache\6.0\48\d126230-575c11d1 Java/Agent.BV trojan
E:\Documents and Settings\Kcin\Application Data\Sun\Java\Deployment\cache\6.0\50\7baf0ab2-65047adc a variant of Java/Agent.BR trojan
E:\Documents and Settings\Kcin\Application Data\Sun\Java\Deployment\cache\6.0\61\384ba27d-7f07e459 a variant of Java/Agent.AF trojan
E:\Documents and Settings\Kcin\Application Data\Sun\Java\Deployment\cache\6.0\8\1d87cc08-7067aed0 probably a variant of Java/Agent.BR trojan
E:\Documents and Settings\Kcin\Application Data\Sun\Java\Deployment\cache\6.0\9\7be78a09-1fe942e3 probably a variant of Java/TrojanDownloader.OpenStream.NCC trojan
E:\Documents and Settings\Kcin\My Documents\DAWN OF WAR SOULSTORM addons\DOW Extras\jZipV1c.exe a variant of Win32/Adware.Toolbar.Shopper.AA application
E:\Documents and Settings\Mark\Application Data\Sun\Java\Deployment\cache\6.0\60\58a0ccfc-22099bb5 multiple threats
E:\Documents and Settings\Mark\Application Data\Sun\Java\Deployment\cache\6.0\7\69057507-381ffa8a multiple threats
E:\Qoobox\Quarantine\E\Documents and Settings\Kcin\Application Data\Mozilla\Firefox\Profiles\s1vv91m2.default\extensions\{5f5dcf4a-ce3e-4321-85a7-d85090815500}\chrome\xulcache.jar.vir JS/Agent.NDJ trojan
E:\Qoobox\Quarantine\E\Documents and Settings\Kcin\Application Data\Mozilla\Firefox\Profiles\s1vv91m2.default\extensions\{737a3a44-c251-4585-8c7d-3985d7bdde65}\chrome\xulcache.jar.vir JS/Agent.NDJ trojan
E:\Qoobox\Quarantine\E\Documents and Settings\Kcin\Application Data\Mozilla\Firefox\Profiles\s1vv91m2.default\extensions\{a1ea016b-ef39-4632-831d-f6c560f132fb}\chrome.manifest.vir Win32/TrojanDownloader.Tracur.F trojan
E:\Qoobox\Quarantine\E\Documents and Settings\Kcin\Application Data\Mozilla\Firefox\Profiles\s1vv91m2.default\extensions\{a1ea016b-ef39-4632-831d-f6c560f132fb}\chrome\xulcache.jar.vir JS/Agent.NDJ trojan
E:\Qoobox\Quarantine\E\Documents and Settings\Mark\Application Data\Mozilla\Firefox\Profiles\90b6x5d3.default\extensions\{5f5dcf4a-ce3e-4321-85a7-d85090815500}\chrome\xulcache.jar.vir JS/Agent.NDJ trojan
E:\Qoobox\Quarantine\E\Documents and Settings\Mark\Application Data\Mozilla\Firefox\Profiles\90b6x5d3.default\extensions\{737a3a44-c251-4585-8c7d-3985d7bdde65}\chrome\xulcache.jar.vir JS/Agent.NDJ trojan
E:\Qoobox\Quarantine\E\Documents and Settings\Mark\Application Data\Mozilla\Firefox\Profiles\90b6x5d3.default\extensions\{a1ea016b-ef39-4632-831d-f6c560f132fb}\chrome.manifest.vir Win32/TrojanDownloader.Tracur.F trojan
E:\Qoobox\Quarantine\E\Documents and Settings\Mark\Application Data\Mozilla\Firefox\Profiles\90b6x5d3.default\extensions\{a1ea016b-ef39-4632-831d-f6c560f132fb}\chrome\xulcache.jar.vir JS/Agent.NDJ trojan
E:\System Volume Information\_restore{FA316BF3-580B-4DE6-A5F3-335D133C21CA}\RP115\A0008900.manifest Win32/TrojanDownloader.Tracur.F trojan
E:\System Volume Information\_restore{FA316BF3-580B-4DE6-A5F3-335D133C21CA}\RP115\A0008901.manifest Win32/TrojanDownloader.Tracur.F trojan
E:\System Volume Information\_restore{FA316BF3-580B-4DE6-A5F3-335D133C21CA}\RP116\A0008934.manifest Win32/TrojanDownloader.Tracur.F trojan
E:\System Volume Information\_restore{FA316BF3-580B-4DE6-A5F3-335D133C21CA}\RP116\A0008935.manifest Win32/TrojanDownloader.Tracur.F trojan
E:\System Volume Information\_restore{FA316BF3-580B-4DE6-A5F3-335D133C21CA}\RP116\A0008941.manifest Win32/TrojanDownloader.Tracur.F trojan
E:\System Volume Information\_restore{FA316BF3-580B-4DE6-A5F3-335D133C21CA}\RP116\A0008942.manifest Win32/TrojanDownloader.Tracur.F trojan
E:\System Volume Information\_restore{FA316BF3-580B-4DE6-A5F3-335D133C21CA}\RP116\A0008943.dll a variant of Win32/Kryptik.QVO trojan
E:\System Volume Information\_restore{FA316BF3-580B-4DE6-A5F3-335D133C21CA}\RP116\A0008950.manifest Win32/TrojanDownloader.Tracur.F trojan
E:\System Volume Information\_restore{FA316BF3-580B-4DE6-A5F3-335D133C21CA}\RP116\A0008951.manifest Win32/TrojanDownloader.Tracur.F trojan
E:\System Volume Information\_restore{FA316BF3-580B-4DE6-A5F3-335D133C21CA}\RP119\A0010208.manifest Win32/TrojanDownloader.Tracur.F trojan
E:\System Volume Information\_restore{FA316BF3-580B-4DE6-A5F3-335D133C21CA}\RP119\A0010209.manifest Win32/TrojanDownloader.Tracur.F trojan

Edited by black&gold, 31 July 2011 - 02:49 PM.


#12 CatByte

CatByte

    bleepin' tiger


  • Malware Response Team
  • 14,664 posts
  • OFFLINE
  •  
  • Gender:Not Telling
  • Location:Canada
  • Local time:09:57 PM

Posted 31 July 2011 - 05:36 PM

hi,

A lot of what is found is either in quarantine already or old system restore points which will be cleaned up when we remove our tools on the final clean up.

Please do the following:

  • Very Important! Temporarily disable your anti-virus, script blocking and any anti-malware real-time protection before following the steps below.
  • They can interfere with ComboFix or remove some of its embedded files which may cause "unpredictable results".
Copy/paste the text inside the Codebox below into notepad:

Here's how to do that:
Click Start > Run type Notepad click OK.
This will open an empty notepad file:

Copy all the text inside of the code box - Press Ctrl+C (or right click on the highlighted section and choose 'copy')

File::
C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy\Recovery\FraudAVCare6.zip 
C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy\Recovery\FraudAVCare7.zip 
C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy\Recovery\WinAgentieu.zip 
C:\Documents and Settings\Mark-on\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\file\Show.class-54976855-402e6dfb.class 
C:\Documents and Settings\Mark-on\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\A.jar-3bef1dd3-1ea97f76.zip 
C:\Documents and Settings\Mark-on\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\gsb50.jar-e1cc989-3b6bc3b7.zip 
C:\Documents and Settings\Mark-on\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\jvmseria.jar-56150ada-6fe5e441.zip 
C:\Documents and Settings\Mark-on\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\piu.bin-51e72c40-7dd26ebd.zip 
C:\Documents and Settings\Mark-on\Desktop\DOW extras\War 40k stuff\jZipV1c.exe 
C:\Documents and Settings\Mark-on\Local Settings\Application Data\{09942D21-7653-4CEA-B79C-49CB0B4E487F}\chrome\content\overlay.xul 
C:\Program Files\AIM\Sysfiles\WxBug.EXE 
C:\WINDOWS\isocozofuqoqiwog.dll 
C:\WINDOWS\system32\fjhdyfhsn.bat 
E:\Documents and Settings\All Users\Documents\DAWN OF WAR SOULSTORM addons\DOW Extras\jZipV1c.exe 
E:\Documents and Settings\Kcin\Application Data\Sun\Java\Deployment\cache\6.0\10\6b1e720a-6b0cb08b 
E:\Documents and Settings\Kcin\Application Data\Sun\Java\Deployment\cache\6.0\3\465c2a43-1401403f 
E:\Documents and Settings\Kcin\Application Data\Sun\Java\Deployment\cache\6.0\38\2ef758e6-7b4fef50 
E:\Documents and Settings\Kcin\Application Data\Sun\Java\Deployment\cache\6.0\45\6dfd656d-6549483d 
E:\Documents and Settings\Kcin\Application Data\Sun\Java\Deployment\cache\6.0\48\d126230-575c11d1 
E:\Documents and Settings\Kcin\Application Data\Sun\Java\Deployment\cache\6.0\50\7baf0ab2-65047adc 
E:\Documents and Settings\Kcin\Application Data\Sun\Java\Deployment\cache\6.0\61\384ba27d-7f07e459 
E:\Documents and Settings\Kcin\Application Data\Sun\Java\Deployment\cache\6.0\8\1d87cc08-7067aed0 
E:\Documents and Settings\Kcin\Application Data\Sun\Java\Deployment\cache\6.0\9\7be78a09-1fe942e3 
E:\Documents and Settings\Kcin\My Documents\DAWN OF WAR SOULSTORM addons\DOW Extras\jZipV1c.exe 
E:\Documents and Settings\Mark\Application Data\Sun\Java\Deployment\cache\6.0\60\58a0ccfc-22099bb5 
E:\Documents and Settings\Mark\Application Data\Sun\Java\Deployment\cache\6.0\7\69057507-381ffa8a 

Now paste the copied text into the open notepad - press CTRL+V (or right click and choose 'paste')

Save this file to your desktop, Save this as "CFScript"


Here's how to do that:

1.Click File;
2.Click Save As... Change the directory to your desktop;
3.Change the Save as type to "All Files";
4.Type in the file name: CFScript
5.Click Save ...

Posted Image
  • Referring to the screenshot above, drag CFScript.txt into ComboFix.exe.
  • ComboFix will now run a scan on your system. It may reboot your system when it finishes. This is normal.
  • When finished, it shall produce a log for you.
  • Copy and paste the contents of the log in your next reply.

CAUTION: Do not mouse-click ComboFix's window while it is running. That may cause it to stall.



NEXT




Please advise how the computer is running and if there are any outstanding issues

Edited by CatByte, 31 July 2011 - 06:42 PM.

Microsoft MVP - 2010, 2011, 2012, 2013, 2014, 2015


#13 black&gold

black&gold
  • Topic Starter

  • Members
  • 30 posts
  • OFFLINE
  •  
  • Local time:08:57 PM

Posted 31 July 2011 - 06:15 PM

Ok, thanks. I'll do that now. I guess I might as well try it in safemode first since that was the only way combofix seemed to work before. Everything else ran just fine in normal windows though. Maybe I bumped the combofix window while it was running that first time. :whistle:

#14 CatByte

CatByte

    bleepin' tiger


  • Malware Response Team
  • 14,664 posts
  • OFFLINE
  •  
  • Gender:Not Telling
  • Location:Canada
  • Local time:09:57 PM

Posted 31 July 2011 - 06:42 PM

Yes,

try running it in safe mode, just in case

Microsoft MVP - 2010, 2011, 2012, 2013, 2014, 2015


#15 black&gold

black&gold
  • Topic Starter

  • Members
  • 30 posts
  • OFFLINE
  •  
  • Local time:08:57 PM

Posted 31 July 2011 - 07:17 PM

Ok I ran combofix in safemode. Everything worked fine, it created a log. However when it finished I got some type of error message that mentioned that their server was temporarily unavailable and that I would have to manually upload something later on to E:\CF-Submit.htm
Not sure quite what that means.

But here is my log. Also I noticed that when Combofix rebooted my system, after CF was finished doing it's thing. I brought my task manager up and saw that there were 2 or 3 less processes running than usual. One was just superantispyware's real time thing which I turned off before. But I don't know what else wasn't there. Probably for the better though. Machine seems to be running fine. I tried googling a couple things and haven't got any hijacks yet. So far, so good, but haven't surfed around much. Thank you for the continued help.

Here is the log.

ComboFix 11-07-31.01 - Kcin 07/31/2011 19:25:07.3.1 - x86 MINIMAL
Microsoft Windows XP Professional 5.1.2600.2.1252.1.1033.18.1015.804 [GMT -4:00]
Running from: e:\documents and settings\Kcin\Desktop\ComboFix.exe
Command switches used :: e:\documents and settings\Kcin\Desktop\CFScript.txt
.
FILE ::
"c:\documents and settings\All Users\Application Data\Spybot - Search & Destroy\Recovery\FraudAVCare6.zip"
"c:\documents and settings\All Users\Application Data\Spybot - Search & Destroy\Recovery\FraudAVCare7.zip"
"c:\documents and settings\All Users\Application Data\Spybot - Search & Destroy\Recovery\WinAgentieu.zip"
"c:\documents and settings\Mark-on\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\file\Show.class-54976855-402e6dfb.class"
"c:\documents and settings\Mark-on\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\A.jar-3bef1dd3-1ea97f76.zip"
"c:\documents and settings\Mark-on\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\gsb50.jar-e1cc989-3b6bc3b7.zip"
"c:\documents and settings\Mark-on\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\jvmseria.jar-56150ada-6fe5e441.zip"
"c:\documents and settings\Mark-on\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\piu.bin-51e72c40-7dd26ebd.zip"
"c:\documents and settings\Mark-on\Desktop\DOW extras\War 40k stuff\jZipV1c.exe"
"c:\documents and settings\Mark-on\Local Settings\Application Data\{09942D21-7653-4CEA-B79C-49CB0B4E487F}\chrome\content\overlay.xul"
"c:\program files\AIM\Sysfiles\WxBug.EXE"
"c:\windows\isocozofuqoqiwog.dll"
"c:\windows\system32\fjhdyfhsn.bat"
"e:\documents and settings\All Users\Documents\DAWN OF WAR SOULSTORM addons\DOW Extras\jZipV1c.exe"
"e:\documents and settings\Kcin\Application Data\Sun\Java\Deployment\cache\6.0\10\6b1e720a-6b0cb08b"
"e:\documents and settings\Kcin\Application Data\Sun\Java\Deployment\cache\6.0\3\465c2a43-1401403f"
"e:\documents and settings\Kcin\Application Data\Sun\Java\Deployment\cache\6.0\38\2ef758e6-7b4fef50"
"e:\documents and settings\Kcin\Application Data\Sun\Java\Deployment\cache\6.0\45\6dfd656d-6549483d"
"e:\documents and settings\Kcin\Application Data\Sun\Java\Deployment\cache\6.0\48\d126230-575c11d1"
"e:\documents and settings\Kcin\Application Data\Sun\Java\Deployment\cache\6.0\50\7baf0ab2-65047adc a"
"e:\documents and settings\Kcin\Application Data\Sun\Java\Deployment\cache\6.0\61\384ba27d-7f07e459 a"
"e:\documents and settings\Kcin\Application Data\Sun\Java\Deployment\cache\6.0\8\1d87cc08-7067aed0"
"e:\documents and settings\Kcin\Application Data\Sun\Java\Deployment\cache\6.0\9\7be78a09-1fe942e3"
"e:\documents and settings\Kcin\My Documents\DAWN OF WAR SOULSTORM addons\DOW Extras\jZipV1c.exe"
"e:\documents and settings\Mark\Application Data\Sun\Java\Deployment\cache\6.0\60\58a0ccfc-22099bb5"
"e:\documents and settings\Mark\Application Data\Sun\Java\Deployment\cache\6.0\7\69057507-381ffa8a"
.
.
((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.
.
c:\documents and settings\All Users\Application Data\Spybot - Search & Destroy\Recovery\FraudAVCare6.zip
c:\documents and settings\All Users\Application Data\Spybot - Search & Destroy\Recovery\FraudAVCare7.zip
c:\documents and settings\All Users\Application Data\Spybot - Search & Destroy\Recovery\WinAgentieu.zip
c:\documents and settings\Mark-on\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\file\Show.class-54976855-402e6dfb.class
c:\documents and settings\Mark-on\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\A.jar-3bef1dd3-1ea97f76.zip
c:\documents and settings\Mark-on\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\gsb50.jar-e1cc989-3b6bc3b7.zip
c:\documents and settings\Mark-on\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\jvmseria.jar-56150ada-6fe5e441.zip
c:\documents and settings\Mark-on\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\piu.bin-51e72c40-7dd26ebd.zip
c:\documents and settings\Mark-on\Local Settings\Application Data\{09942D21-7653-4CEA-B79C-49CB0B4E487F}\chrome\content\overlay.xul
c:\program files\AIM\Sysfiles\WxBug.EXE
c:\windows\isocozofuqoqiwog.dll
c:\windows\system32\fjhdyfhsn.bat
e:\documents and settings\All Users\Documents\DAWN OF WAR SOULSTORM addons\DOW Extras\jZipV1c.exe
e:\documents and settings\Kcin\Application Data\Sun\Java\Deployment\cache\6.0\10\6b1e720a-6b0cb08b
e:\documents and settings\Kcin\Application Data\Sun\Java\Deployment\cache\6.0\3\465c2a43-1401403f
e:\documents and settings\Kcin\Application Data\Sun\Java\Deployment\cache\6.0\38\2ef758e6-7b4fef50
e:\documents and settings\Kcin\Application Data\Sun\Java\Deployment\cache\6.0\45\6dfd656d-6549483d
e:\documents and settings\Kcin\Application Data\Sun\Java\Deployment\cache\6.0\48\d126230-575c11d1
e:\documents and settings\Kcin\Application Data\Sun\Java\Deployment\cache\6.0\8\1d87cc08-7067aed0
e:\documents and settings\Kcin\Application Data\Sun\Java\Deployment\cache\6.0\9\7be78a09-1fe942e3
e:\documents and settings\Kcin\My Documents\DAWN OF WAR SOULSTORM addons\DOW Extras\jZipV1c.exe
e:\documents and settings\Mark\Application Data\Sun\Java\Deployment\cache\6.0\60\58a0ccfc-22099bb5
e:\documents and settings\Mark\Application Data\Sun\Java\Deployment\cache\6.0\7\69057507-381ffa8a
.
.
((((((((((((((((((((((((( Files Created from 2011-06-28 to 2011-07-31 )))))))))))))))))))))))))))))))
.
.
2011-07-31 01:53 . 2011-07-31 01:53 -------- d-----w- e:\program files\ESET
2011-07-30 21:23 . 2011-07-30 21:23 -------- d-----w- e:\windows\system32\LogFiles
2011-07-28 20:37 . 2011-07-28 20:37 190032 ----a-w- e:\windows\system32\drivers\tmcomm.sys
2011-07-28 20:01 . 2011-07-28 20:01 388096 ----a-r- e:\documents and settings\Kcin\Application Data\Microsoft\Installer\{45A66726-69BC-466B-A7A4-12FCBA4883D7}\HiJackThis.exe
2011-07-28 20:01 . 2011-07-28 20:01 -------- d-----w- e:\program files\Trend Micro
2011-07-28 06:30 . 2011-07-28 06:30 -------- d-----w- e:\windows\system32\wbem\Repository
2011-07-28 04:25 . 2011-07-28 04:25 -------- d-----w- E:\!KillBox
2011-07-08 11:04 . 2011-07-30 23:36 -------- d-----w- e:\program files\Steam
2011-07-08 11:03 . 2011-07-08 20:31 -------- d-----w- e:\program files\Common Files\Steam
.
.
.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2011-07-06 23:52 . 2010-06-19 18:44 41272 ----a-w- e:\windows\system32\drivers\mbamswissarmy.sys
2011-07-06 23:52 . 2010-06-19 18:44 22712 ----a-w- e:\windows\system32\drivers\mbam.sys
.
.
((((((((((((((((((((((((((((( SnapShot@2011-07-30_23.37.51 )))))))))))))))))))))))))))))))))))))))))
.
+ 2011-07-31 23:37 . 2011-07-31 23:37 16384 e:\windows\temp\Perflib_Perfdata_6b0.dat
.
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"PRONoMgr.exe"="e:\program files\Intel\NCS\PROSet\PRONoMgr.exe" [2003-03-11 86016]
"IgfxTray"="e:\windows\system32\igfxtray.exe" [2006-04-01 155648]
"HotKeysCmds"="e:\windows\system32\hkcmd.exe" [2006-04-01 126976]
"GhostStartTrayApp"="e:\program files\Symantec\Norton Ghost 2003\GhostStartTrayApp.exe" [2002-08-14 94208]
"GrooveMonitor"="e:\program files\Microsoft Office\Office12\GrooveMonitor.exe" [2006-10-27 31016]
"Adobe Reader Speed Launcher"="e:\program files\Adobe\Reader 9.0\Reader\Reader_sl.exe" [2010-06-20 35760]
"Adobe ARM"="e:\program files\Common Files\Adobe\ARM\1.0\AdobeARM.exe" [2010-09-21 932288]
"SunJavaUpdateSched"="e:\program files\Common Files\Java\Java Update\jusched.exe" [2010-05-14 248552]
.
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\RunOnce]
"ShowDeskFix"="shell32" [X]
.
e:\documents and settings\Kcin\Start Menu\Programs\Startup\
OneNote 2007 Screen Clipper and Launcher.lnk - e:\program files\Microsoft Office\Office12\ONENOTEM.EXE [2006-10-26 98632]
.
[hkey_local_machine\software\microsoft\windows\currentversion\explorer\ShellExecuteHooks]
"{5AE067D3-9AFB-48E0-853A-EBB7F4A000DA}"= "e:\program files\SUPERAntiSpyware\SASSEH.DLL" [2008-05-13 77824]
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\!SASWinLogon]
2009-09-03 22:21 548352 ----a-w- e:\program files\SUPERAntiSpyware\SASWINLO.DLL
.
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"e:\\WINDOWS\\system32\\sessmgr.exe"=
"e:\\Program Files\\Microsoft Office\\Office12\\OUTLOOK.EXE"=
"e:\\Program Files\\Microsoft Office\\Office12\\GROOVE.EXE"=
"e:\\Program Files\\Microsoft Office\\Office12\\ONENOTE.EXE"=
"c:\\Program Files\\THQ\\DarkCrusade\\DarkCrusade.exe"=
"e:\\Program Files\\THQ\\Dawn of War - Soulstorm\\Soulstorm.exe"=
"e:\\Program Files\\mektek.net\\MTX\\mtx.exe"=
"e:\\Program Files\\THQ\\DarkCrusade\\DarkCrusade.exe"=
"e:\\Documents and Settings\\Kcin\\My Documents\\Mekwar4\\Mechwarrior Mercenaries - Mektek Mekpak\\MW4Mercs.exe"=
"e:\\Program Files\\Pando Networks\\Media Booster\\PMB.exe"=
"e:\\Program Files\\Turbine\\DDO Unlimited\\dndclient.exe"=
"e:\\Program Files\\Turbine\\The Lord of the Rings Online\\lotroclient.exe"=
"e:\\Program Files\\Steam\\steamapps\\shatterstar27\\team fortress 2\\hl2.exe"=
.
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\GloballyOpenPorts\List]
"58848:TCP"= 58848:TCP:Pando Media Booster
"58848:UDP"= 58848:UDP:Pando Media Booster
.
R1 GhPciScan;GhostPciScanner;e:\program files\Symantec\Norton Ghost 2003\GhPciScan.sys [8/14/2002 3:11 PM 5632]
R1 SASDIFSV;SASDIFSV;e:\program files\SUPERAntiSpyware\sasdifsv.sys [2/17/2010 2:25 PM 12872]
R1 SASKUTIL;SASKUTIL;e:\program files\SUPERAntiSpyware\SASKUTIL.SYS [5/10/2010 2:41 PM 67656]
S3 CFcatchme;CFcatchme;\??\e:\docume~1\Kcin\LOCALS~1\Temp\CFcatchme.sys --> e:\docume~1\Kcin\LOCALS~1\Temp\CFcatchme.sys [?]
S3 npggsvc;nProtect GameGuard Service;e:\windows\system32\GameMon.des -service --> e:\windows\system32\GameMon.des -service [?]
.
.
------- Supplementary Scan -------
.
uStart Page = hxxp://www.google.com/
IE: E&xport to Microsoft Excel - e:\progra~1\MICROS~2\Office12\EXCEL.EXE/3000
TCP: DhcpNameServer = 192.168.1.1
FF - ProfilePath - e:\documents and settings\Kcin\Application Data\Mozilla\Firefox\Profiles\s1vv91m2.default\
FF - Ext: Default: {972ce4c6-7e08-4474-a285-3208198ce6fd} - e:\program files\Mozilla Firefox\extensions\{972ce4c6-7e08-4474-a285-3208198ce6fd}
FF - Ext: Java Console: {CAFEEFAC-0016-0000-0021-ABCDEFFEDCBA} - e:\program files\Mozilla Firefox\extensions\{CAFEEFAC-0016-0000-0021-ABCDEFFEDCBA}
FF - Ext: Personas: personas@christopher.beard - %profile%\extensions\personas@christopher.beard
FF - Ext: Java Quick Starter: jqs@sun.com - e:\program files\Java\jre6\lib\deploy\jqs\ff
.
.
**************************************************************************
.
catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2011-07-31 19:45
Windows 5.1.2600 Service Pack 2 NTFS
.
scanning hidden processes ...
.
scanning hidden autostart entries ...
.
scanning hidden files ...
.
scan completed successfully
hidden files: 0
.
**************************************************************************
.
[HKEY_LOCAL_MACHINE\System\ControlSet001\Services\npggsvc]
"ImagePath"="e:\windows\system32\GameMon.des -service"
.
--------------------- DLLs Loaded Under Running Processes ---------------------
.
- - - - - - - > 'winlogon.exe'(660)
e:\program files\SUPERAntiSpyware\SASWINLO.DLL
.
- - - - - - - > 'explorer.exe'(1004)
e:\windows\system32\wpdshserviceobj.dll
e:\windows\system32\portabledevicetypes.dll
e:\windows\system32\portabledeviceapi.dll
.
------------------------ Other Running Processes ------------------------
.
e:\program files\Symantec\Norton Ghost 2003\GhostStartService.exe
e:\program files\Java\jre6\bin\jqs.exe
e:\windows\system32\wscntfy.exe
.
**************************************************************************
.
Completion time: 2011-07-31 19:51:09 - machine was rebooted
ComboFix-quarantined-files.txt 2011-07-31 23:51
ComboFix2.txt 2011-07-30 23:41
.
Pre-Run: 55,128,604,672 bytes free
Post-Run: 55,298,527,232 bytes free
.
- - End Of File - - 6BC8B37E94593426A8827ECB971C02C6




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users