Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Antivirals inaccessible & BSOD atapsi.sys


  • This topic is locked This topic is locked
14 replies to this topic

#1 Haertig

Haertig

  • Members
  • 29 posts
  • OFFLINE
  •  
  • Local time:11:05 AM

Posted 29 August 2011 - 07:17 PM

My infection started out with a Rogueware infection of some sort claiming various programs were infected and blocking access to antivirals. Also, browsers were being redirected when pointed to antiviral sites.

It deactivated Avira scans.
Access to MalwareBytes was blocked.
Downloaded Malwarebytes anew and immediately scanned. Found several things including -
Backdoor.0Access
Rogue.SecurityProtection
Rogue.SpyPro

Ran SuperAntiSpyware - it removed some 700 tracking cookies.

Uninstalled Avira.

Downloaded and installed Microsoft Security Essentials. Could not start real time scanning, update or manual scan.

Downloaded latest ComboFix. Ran, not understanding I shouldn't.

CF paused indicating I should disable MSSE. Tried to, but it indicated it wasn't running. Proceeded.

Part way through CF advised that it had detected rootkit action (it identified the rootkit, but I failed to note down the name). It indicated that the rootkit was embedded in the TCP/IP stack and was difficult to remove and that if I had IP problems when CF finished to reboot and, if necessary run CF again. CF then rebooted the computer and restarted itself. It proceeded to completion finding several problems (alas, a second run of CF seems to have overwritten the CF log file.)

When computer rebooted after CF I started getting BSOD about 1 minute after desktop appears (computer is still loading things when it happens).

Stop: 0x0000008E(0xC0000005,0xF748671D,0xA14CB39C,0X0000000

atapi.sys Address F748671D

Nothing further I did corrected this. Will boot in Safe Mode with Networking.

Tried to uninstall MSSE, but can't in Safe Mode.

Ran ComboFix again.

Downloaded Avira and ran. It found and quarantined a lot of stuff.

Current situation -

Access to AntiMalwareBytes denied.
Can run Avira manual scan; cannot turn on real time scan or update.
Browser redirects seem to have gone away.
Can only run in safe mode, else get BSOD.

Any help will be gratefully appreciated and I apologize for originally posting in the wrong forum and for posting logs.

Animal moved original post (Anti-Virals Blocked & BSOD 0x0000008E) to proper forum (Am I infected and what do I do)and cryptodan explained proper procedure (thanks!).

DDS Log pasted below.
Attach.txt and ARK.txt are attached.


Gray

DDS Log
===============================================
.
DDS (Ver_2011-08-26.01) - NTFSx86 NETWORK
Internet Explorer: 7.0.5730.13 BrowserJavaVersion: 1.6.0_20
Run by Owner at 16:11:41 on 2011-08-29
Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.1535.1074 [GMT -7:00]
.
AV: AntiVir Desktop *Enabled/Outdated* {AD166499-45F9-482A-A743-FDD3350758C7}
AV: Microsoft Security Essentials *Enabled/Updated* {EDB4FA23-53B8-4AFA-8C5D-99752CCA7095}
.
============== Running Processes ===============
.
C:\WINDOWS\system32\svchost.exe -k DcomLaunch
svchost.exe
C:\WINDOWS\system32\svchost.exe -k netsvcs
svchost.exe
svchost.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\Mozilla Firefox\firefox.exe
.
============== Pseudo HJT Report ===============
.
uStart Page = hxxp://www.google.com/advanced_search?hl=en
uInternet Settings,ProxyOverride = <local>
BHO: Adobe PDF Link Helper: {18df081c-e8ad-4283-a596-fa578c2ebdc3} - c:\program files\common files\adobe\acrobat\activex\AcroIEHelperShim.dll
BHO: AVG Safe Search: {3ca2f312-6f6e-4b53-a66e-4e65e497c8c0} - c:\program files\avg\avg9\avgssie.dll
BHO: Adobe PDF Conversion Toolbar Helper: {ae7cd045-e861-484f-8273-0445ee161910} - c:\program files\common files\adobe\acrobat\activex\AcroIEFavClient.dll
BHO: Google Toolbar Notifier BHO: {af69de43-7d58-4638-b6fa-ce66b5ad205d} - c:\program files\google\googletoolbarnotifier\5.1.1309.3572\swg.dll
BHO: Java™ Plug-In 2 SSV Helper: {dbc80044-a445-435b-bc74-9c25c1c588a9} - c:\program files\java\jre6\bin\jp2ssv.dll
BHO: JQSIEStartDetectorImpl Class: {e7e6f031-17ce-4c07-bc86-eabfe594f69c} - c:\program files\java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll
BHO: SmartSelect Class: {f4971ee7-daa0-4053-9964-665d8ee6a077} - c:\program files\common files\adobe\acrobat\activex\AcroIEFavClient.dll
TB: Adobe PDF: {47833539-d0c5-4125-9fa8-0819e2eaac93} - c:\program files\common files\adobe\acrobat\activex\AcroIEFavClient.dll
uRun: [SUPERAntiSpyware] c:\program files\superantispyware\SUPERAntiSpyware.exe
uRun: [ctfmon.exe] c:\windows\system32\ctfmon.exe
mRun: [SynTPLpr] c:\program files\synaptics\syntp\SynTPLpr.exe
mRun: [SynTPEnh] c:\program files\synaptics\syntp\SynTPEnh.exe
mRun: [gemstrmw] c:\windows\system32\gemstrmw.exe /r
mRun: [IntelZeroConfig] "c:\program files\intel\wireless\bin\ZCfgSvc.exe"
mRun: [IntelWireless] "c:\program files\intel\wireless\bin\ifrmewrk.exe" /tf Intel PROSet/Wireless
mRun: [Adobe Acrobat Speed Launcher] "c:\program files\adobe\acrobat 9.0\acrobat\Acrobat_sl.exe"
mRun: [NotebookHardwareControl] "c:\program files\notebook hardware control\nhc.exe" -quiet
mRun: [SunJavaUpdateSched] "c:\program files\common files\java\java update\jusched.exe"
mRun: [Omnipage] c:\program files\scansoft\omnipagese\opware32.exe
mRun: [QuickTime Task] "c:\program files\quicktime\qttask.exe" -atboottime
mRun: [MSC] "c:\program files\microsoft security client\msseces.exe" -hide -runkey
mRun: [Malwarebytes' Anti-Malware (reboot)] "c:\program files\malwarebytes' anti-malware\mbam.exe" /runcleanupscript
mRun: [KernelFaultCheck] %systemroot%\system32\dumprep 0 -k
mRun: [avgnt] "c:\program files\avira\antivir desktop\avgnt.exe" /min
StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\truela~1.lnk - c:\program files\home diagnostics, inc\truemanager diabetes management software\TRUELauncher.exe
uPolicies-explorer: EditLevel = 0 (0x0)
uPolicies-explorer: NoCommonGroups = 0 (0x0)
IE: Append Link Target to Existing PDF - c:\program files\common files\adobe\acrobat\activex\AcroIEFavClient.dll/AcroIEAppendSelLinks.html
IE: Append to Existing PDF - c:\program files\common files\adobe\acrobat\activex\AcroIEFavClient.dll/AcroIEAppend.html
IE: Convert Link Target to Adobe PDF - c:\program files\common files\adobe\acrobat\activex\AcroIEFavClient.dll/AcroIECaptureSelLinks.html
IE: Convert to Adobe PDF - c:\program files\common files\adobe\acrobat\activex\AcroIEFavClient.dll/AcroIECapture.html
IE: E&xport to Microsoft Excel - c:\progra~1\micros~2\office12\EXCEL.EXE/3000
IE: {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe
IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe
IE: {2670000A-7350-4f3c-8081-5663EE0C6C49} - {48E73304-E1D6-4330-914C-F5F514E3486C} - c:\progra~1\micros~2\office12\ONBttnIE.dll
IE: {92780B25-18CC-41C8-B9BE-3C9C571A8263} - {FF059E31-CC5A-4E2E-BF3B-96E929D65503} - c:\progra~1\micros~2\office12\REFIEBAR.DLL
DPF: {7530BFB8-7293-4D34-9923-61A11451AFC5} - hxxp://download.eset.com/special/eos/OnlineScanner.cab
DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_20-windows-i586.cab
DPF: {CAFEEFAC-0015-0000-0010-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.5.0/jinstall-1_5_0_10-windows-i586.cab
DPF: {CAFEEFAC-0016-0000-0020-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_20-windows-i586.cab
DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_20-windows-i586.cab
DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} - hxxp://fpdownload2.macromedia.com/get/shockwave/cabs/flash/swflash.cab
TCP: DhcpNameServer = 192.168.0.1
TCP: Interfaces\{89B1157E-B6AE-45F5-921C-C44BF14CF797} : DhcpNameServer = 192.168.0.1
TCP: Interfaces\{A56D6008-BB34-4811-B8C4-9F8A1165FFFD} : DhcpNameServer = 192.168.0.1
Notify: !SASWinLogon - c:\program files\superantispyware\SASWINLO.DLL
Notify: igfxcui - igfxsrvc.dll
SSODL: WPDShServiceObj - {AAA288BA-9A4C-45B0-95D7-94D524869DB5} - c:\windows\system32\WPDShServiceObj.dll
SEH: Eudora's Shell Extension: {edb0e980-90bd-11d4-8599-0008c7d3b6f8} - c:\progra~1\qualcomm\eudora\EuShlExt.dll
SEH: SABShellExecuteHook Class: {5ae067d3-9afb-48e0-853a-ebb7f4a000da} - c:\program files\superantispyware\SASSEH.DLL
.
================= FIREFOX ===================
.
FF - ProfilePath - c:\documents and settings\owner\application data\mozilla\firefox\profiles\no14s4he.default\
FF - prefs.js: browser.startup.homepage - hxxp://www.google.com/advanced_search?hl=en
FF - plugin: c:\program files\google\google earth\plugin\npgeplugin.dll
FF - plugin: c:\program files\google\google updater\2.4.1536.6592\npCIDetect13.dll
FF - plugin: c:\program files\google\update\1.3.21.65\npGoogleUpdate3.dll
FF - plugin: c:\program files\java\jre6\bin\new_plugin\npdeployJava1.dll
FF - Ext: Default: {972ce4c6-7e08-4474-a285-3208198ce6fd} - c:\program files\mozilla firefox\extensions\{972ce4c6-7e08-4474-a285-3208198ce6fd}
FF - Ext: Java Console: {CAFEEFAC-0016-0000-0020-ABCDEFFEDCBA} - c:\program files\mozilla firefox\extensions\{CAFEEFAC-0016-0000-0020-ABCDEFFEDCBA}
FF - Ext: Microsoft .NET Framework Assistant: {20a82645-c095-46ed-80e3-08825760534b} - c:\windows\microsoft.net\framework\v3.5\windows presentation foundation\DotNetAssistantExtension
FF - Ext: Java Quick Starter: jqs@sun.com - c:\program files\java\jre6\lib\deploy\jqs\ff
FF - Ext: Microsoft .NET Framework Assistant: {20a82645-c095-46ed-80e3-08825760534b} - %profile%\extensions\{20a82645-c095-46ed-80e3-08825760534b}
.
============= SERVICES / DRIVERS ===============
.
R0 EUBAKUP;EUBAKUP;c:\windows\system32\drivers\eubakup.sys [2010-3-1 26248]
R0 EUFS;EUFS;c:\windows\system32\drivers\eufs.sys [2010-3-1 20616]
R3 EuDisk;EASEUS Disk Enumerator;c:\windows\system32\drivers\EuDisk.sys [2010-3-1 122504]
S0 cerc6;cerc6; [x]
S1 avgio;avgio;c:\program files\avira\antivir desktop\avgio.sys [2011-8-28 11608]
S1 MpFilter;Microsoft Malware Protection Driver;c:\windows\system32\drivers\MpFilter.sys [2011-4-18 165648]
S1 MpKsl35e686f9;MpKsl35e686f9;\??\c:\documents and settings\all users\application data\microsoft\microsoft antimalware\definition updates\{a43f0f0e-dd8b-4209-a9af-85c56ae5c992}\mpksl35e686f9.sys --> c:\documents and settings\all users\application data\microsoft\microsoft antimalware\definition updates\{a43f0f0e-dd8b-4209-a9af-85c56ae5c992}\MpKsl35e686f9.sys [?]
S1 SASDIFSV;SASDIFSV;\??\c:\program files\superantispyware\sasdifsv.sys --> c:\program files\superantispyware\SASDIFSV.SYS [?]
S1 SASKUTIL;SASKUTIL;\??\c:\program files\superantispyware\saskutil.sys --> c:\program files\superantispyware\SASKUTIL.sys [?]
S2 AntiVirSchedulerService;Avira AntiVir Scheduler;c:\program files\avira\antivir desktop\sched.exe [2011-8-28 136360]
S2 AntiVirService;Avira AntiVir Guard;c:\program files\avira\antivir desktop\avguard.exe [2011-8-28 269480]
S2 avgntflt;avgntflt;c:\windows\system32\drivers\avgntflt.sys [2011-8-28 66616]
S2 gupdate;Google Update Service (gupdate);c:\program files\google\update\GoogleUpdate.exe [2010-2-16 135664]
S2 hasplms;HASP License Manager;c:\windows\system32\hasplms.exe -run --> c:\windows\system32\hasplms.exe -run [?]
S2 MSSQL$HDI;SQL Server (HDI);c:\program files\microsoft sql server\mssql.1\mssql\binn\sqlservr.exe [2007-2-10 29178224]
S3 cpuz132;cpuz132;\??\c:\docume~1\owner\locals~1\temp\cpuz132\cpuz132_x32.sys --> c:\docume~1\owner\locals~1\temp\cpuz132\cpuz132_x32.sys [?]
S3 EUDSKACS;EUDSKACS;c:\windows\system32\drivers\eudskacs.sys [2010-3-1 14216]
S3 GTWINSER;GTWINSER;c:\windows\system32\drivers\GTwinSER.sys [2010-6-5 66912]
S3 gupdatem;Google Update Service (gupdatem);c:\program files\google\update\GoogleUpdate.exe [2010-2-16 135664]
S3 MBAMSwissArmy;MBAMSwissArmy;c:\windows\system32\drivers\mbamswissarmy.sys [2010-2-19 41272]
S3 SASENUM;SASENUM;\??\c:\program files\superantispyware\sasenum.sys --> c:\program files\superantispyware\SASENUM.SYS [?]
S3 SolarWinds TFTP Server;SolarWinds TFTP Server;c:\program files\solarwinds\tftpserver\SolarWinds TFTP Server.exe [2008-7-25 61440]
.
=============== Created Last 30 ================
.
2011-08-29 06:29:47 -------- d-----w- c:\documents and settings\owner\application data\Avira
2011-08-29 06:20:10 66616 ----a-w- c:\windows\system32\drivers\avgntflt.sys
2011-08-29 06:20:09 -------- d-----w- c:\program files\Avira
2011-08-29 06:20:09 -------- d-----w- c:\documents and settings\all users\application data\Avira
2011-08-29 05:12:23 -------- d-s---w- C:\ComboFix
2011-08-29 04:11:30 98816 ----a-w- c:\windows\sed.exe
2011-08-29 04:11:30 518144 ----a-w- c:\windows\SWREG.exe
2011-08-29 04:11:30 256000 ----a-w- c:\windows\PEV.exe
2011-08-29 04:11:30 208896 ----a-w- c:\windows\MBR.exe
2011-08-29 00:49:36 7152464 ----a-w- c:\documents and settings\all users\application data\microsoft\microsoft antimalware\definition updates\{a43f0f0e-dd8b-4209-a9af-85c56ae5c992}\mpengine.dll
2011-08-29 00:49:36 222080 ------w- c:\windows\system32\MpSigStub.exe
2011-08-29 00:44:53 -------- d-----w- c:\program files\Microsoft Security Client
2011-08-29 00:33:55 -------- d-----w- C:\2e1529a226759ef7fdf32585af37da
.
==================== Find3M ====================
.
2011-08-29 22:31:05 22528 ----a-w- c:\windows\system32\drivers\nhcDriver.sys
2011-07-07 02:52:42 41272 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2011-07-07 02:52:42 22712 ----a-w- c:\windows\system32\drivers\mbam.sys
.
=================== ROOTKIT ====================
.
Stealth MBR rootkit/Mebroot/Sinowal/TDL4 detector 0.4.2 by Gmer, http://www.gmer.net
Windows 5.1.2600 Disk: WDC_WD1600BEVE-00UYT0 rev.01.04A01 -> Harddisk0\DR0 -> \Device\Ide\IdeDeviceP0T0L0-3
.
device: opened successfully
user: MBR read successfully
.
Disk trace:
called modules: ntoskrnl.exe CLASSPNP.SYS disk.sys ACPI.sys hal.dll >>UNKNOWN [0x8A6984D0]<<
_asm { PUSH EBP; MOV EBP, ESP; PUSH ECX; MOV EAX, [EBP+0x8]; CMP EAX, [0x8a69e7d0]; MOV EAX, [0x8a69e84c]; PUSH EBX; PUSH ESI; MOV ESI, [EBP+0xc]; MOV EBX, [ESI+0x60]; PUSH EDI; JNZ 0x20; MOV [EBP+0x8], EAX; }
1 nt!IofCallDriver[0x804E37D5] -> \Device\Harddisk0\DR0[0x8A729AB8]
3 CLASSPNP[0xF7657FD7] -> nt!IofCallDriver[0x804E37D5] -> \Device\00000090[0x8A72B9E8]
5 ACPI[0xF75AE620] -> nt!IofCallDriver[0x804E37D5] -> [0x8A715940]
\Driver\atapi[0x8A65F340] -> IRP_MJ_CREATE -> 0x8A6984D0
error: Read A device attached to the system is not functioning.
kernel: MBR read successfully
_asm { XOR AX, AX; MOV SS, AX; MOV SP, 0x7c00; STI ; PUSH AX; POP ES; PUSH AX; POP DS; CLD ; MOV SI, 0x7c1b; MOV DI, 0x61b; PUSH AX; PUSH DI; MOV CX, 0x1e5; REP MOVSB ; RETF ; MOV BP, 0x7be; MOV CL, 0x4; CMP [BP+0x0], CH; JL 0x2e; JNZ 0x3a; }
detected disk devices:
detected hooks:
\Driver\atapi DriverStartIo -> 0x8A69831B
user & kernel MBR OK
copy of MBR has been found in sector 156280320
Warning: possible TDL3 rootkit infection !
.
============= FINISH: 16:12:45.99 ===============

Attached Files



BC AdBot (Login to Remove)

 


#2 HelpBot

HelpBot

    Bleepin' Binary Bot


  • Bots
  • 12,743 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:02:05 PM

Posted 03 September 2011 - 07:20 PM

Hello and welcome to Bleeping Computer!

I am HelpBot: an automated program designed to help the Bleeping Computer Staff better assist you! This message contains very important information, so please read through all of it before doing anything.

We apologize for the delay in responding to your request for help. Here at Bleeping Computer we get overwhelmed at times, and we are trying our best to keep up. Please note that your topic was not intentionally overlooked. Our mission is to help everyone in need, but sometimes it takes just a little longer to get to every request for help. No one is ignored here.

To help Bleeping Computer better assist you please perform the following steps:

***************************************************

Posted Image In order to continue receiving help at BleepingComputer.com, YOU MUST tell me if you still need help or if your issue has already been resolved on your own or through another resource! To tell me this, please click on the following link and follow the instructions there.

CLICK THIS LINK >>> http://www.bleepingcomputer.com/logreply/416633 <<< CLICK THIS LINK



If you no longer need help, then all you needed to do was the previous instructions of telling me so. You can skip the rest of this post. If you do need help please continue with Step 2 below.

***************************************************

Posted Image If you still need help, I would like you to post a Reply to this topic (click the "Add Reply" button in the lower right hand of this page). In that reply, please include the following information:

  • If you have not done so already, include a clear description of the problems you're having, along with any steps you may have performed so far.
  • A new DDS and GMER log. For your convenience, you will find the instructions for generating these logs repeated at the bottom of this post.
    • Please do this even if you have previously posted logs for us.
    • If you were unable to produce the logs originally please try once more.
    • If you are unable to create a log please provide detailed information about your installed Windows Operating System including the Version, Edition and if it is a 32bit or a 64bit system.
    • If you are unsure about any of these characteristics just post what you can and we will guide you.
  • Please tell us if you have your original Windows CD/DVD available.
  • Upon completing the above steps and posting a reply, another staff member will review your topic and do their best to resolve your issues.

Thank you for your patience, and again sorry for the delay.

***************************************************

We need to see some information about what is happening in your machine. Please perform the following scan again:

  • Download DDS by sUBs from one of the following links if you no longer have it available. Save it to your desktop.
  • Double click on the DDS icon, allow it to run.
  • A small box will open, with an explanation about the tool. No input is needed, the scan is running.
  • Notepad will open with the results.
  • Follow the instructions that pop up for posting the results.
  • Close the program window, and delete the program from your desktop.
Please note: You may have to disable any script protection running if the scan fails to run. After downloading the tool, disconnect from the internet and disable all antivirus protection. Run the scan, enable your A/V and reconnect to the internet.

Information on A/V control HERE


We also need a new log from the GMER anti-rootkit Scanner.

Please note that if you are running a 64-bit version of Windows you will not be able to run GMER and you may skip this step.

Please first disable any CD emulation programs using the steps found in this topic:

Why we request you disable CD Emulation when receiving Malware Removal Advice


Then create another GMER log and post it as an attachment to the reply where you post your new DDS log. Instructions on how to properly create a GMER log can be found here:

How to create a GMER log


As I am just a silly little program running on the BleepingComputer.com servers, please do not send me private messages as I do not know how to read and reply to them! Thanks!

#3 Haertig

Haertig
  • Topic Starter

  • Members
  • 29 posts
  • OFFLINE
  •  
  • Local time:11:05 AM

Posted 04 September 2011 - 01:50 PM

Heloo Bleepsters,

This is bump per the instructions of the bot.

There has been no change to the situation since the first post.

I do not have the original Windows XP - Pro install disk.

Quoted below the the DSD log file. Attached are the Attach log file and the GMER log file.

Thanks!


Gray

==============================================
.
DDS (Ver_2011-08-26.01) - NTFSx86 NETWORK
Internet Explorer: 7.0.5730.13 BrowserJavaVersion: 1.6.0_20
Run by Owner at 9:25:11 on 2011-09-04
Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.1535.966 [GMT -7:00]
.
AV: AntiVir Desktop *Enabled/Outdated* {AD166499-45F9-482A-A743-FDD3350758C7}
AV: Microsoft Security Essentials *Enabled/Updated* {EDB4FA23-53B8-4AFA-8C5D-99752CCA7095}
.
============== Running Processes ===============
.
C:\WINDOWS\system32\svchost.exe -k DcomLaunch
svchost.exe
C:\WINDOWS\system32\svchost.exe -k netsvcs
svchost.exe
svchost.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\Qualcomm\Eudora\Eudora.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Mozilla Firefox\firefox.exe
C:\Program Files\Mozilla Firefox\plugin-container.exe
.
============== Pseudo HJT Report ===============
.
uStart Page = hxxp://www.google.com/advanced_search?hl=en
uInternet Settings,ProxyOverride = <local>
BHO: Adobe PDF Link Helper: {18df081c-e8ad-4283-a596-fa578c2ebdc3} - c:\program files\common files\adobe\acrobat\activex\AcroIEHelperShim.dll
BHO: AVG Safe Search: {3ca2f312-6f6e-4b53-a66e-4e65e497c8c0} - c:\program files\avg\avg9\avgssie.dll
BHO: Adobe PDF Conversion Toolbar Helper: {ae7cd045-e861-484f-8273-0445ee161910} - c:\program files\common files\adobe\acrobat\activex\AcroIEFavClient.dll
BHO: Google Toolbar Notifier BHO: {af69de43-7d58-4638-b6fa-ce66b5ad205d} - c:\program files\google\googletoolbarnotifier\5.1.1309.3572\swg.dll
BHO: Java™ Plug-In 2 SSV Helper: {dbc80044-a445-435b-bc74-9c25c1c588a9} - c:\program files\java\jre6\bin\jp2ssv.dll
BHO: JQSIEStartDetectorImpl Class: {e7e6f031-17ce-4c07-bc86-eabfe594f69c} - c:\program files\java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll
BHO: SmartSelect Class: {f4971ee7-daa0-4053-9964-665d8ee6a077} - c:\program files\common files\adobe\acrobat\activex\AcroIEFavClient.dll
TB: Adobe PDF: {47833539-d0c5-4125-9fa8-0819e2eaac93} - c:\program files\common files\adobe\acrobat\activex\AcroIEFavClient.dll
uRun: [SUPERAntiSpyware] c:\program files\superantispyware\SUPERAntiSpyware.exe
uRun: [ctfmon.exe] c:\windows\system32\ctfmon.exe
uRunOnce: [FlashPlayerUpdate] c:\windows\system32\macromed\flash\FlashUtil10k_Plugin.exe -update plugin
mRun: [SynTPLpr] c:\program files\synaptics\syntp\SynTPLpr.exe
mRun: [SynTPEnh] c:\program files\synaptics\syntp\SynTPEnh.exe
mRun: [gemstrmw] c:\windows\system32\gemstrmw.exe /r
mRun: [IntelZeroConfig] "c:\program files\intel\wireless\bin\ZCfgSvc.exe"
mRun: [IntelWireless] "c:\program files\intel\wireless\bin\ifrmewrk.exe" /tf Intel PROSet/Wireless
mRun: [Adobe Acrobat Speed Launcher] "c:\program files\adobe\acrobat 9.0\acrobat\Acrobat_sl.exe"
mRun: [NotebookHardwareControl] "c:\program files\notebook hardware control\nhc.exe" -quiet
mRun: [SunJavaUpdateSched] "c:\program files\common files\java\java update\jusched.exe"
mRun: [Omnipage] c:\program files\scansoft\omnipagese\opware32.exe
mRun: [QuickTime Task] "c:\program files\quicktime\qttask.exe" -atboottime
mRun: [MSC] "c:\program files\microsoft security client\msseces.exe" -hide -runkey
mRun: [Malwarebytes' Anti-Malware (reboot)] "c:\program files\malwarebytes' anti-malware\mbam.exe" /runcleanupscript
mRun: [KernelFaultCheck] %systemroot%\system32\dumprep 0 -k
mRun: [avgnt] "c:\program files\avira\antivir desktop\avgnt.exe" /min
StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\truela~1.lnk - c:\program files\home diagnostics, inc\truemanager diabetes management software\TRUELauncher.exe
uPolicies-explorer: EditLevel = 0 (0x0)
uPolicies-explorer: NoCommonGroups = 0 (0x0)
IE: Append Link Target to Existing PDF - c:\program files\common files\adobe\acrobat\activex\AcroIEFavClient.dll/AcroIEAppendSelLinks.html
IE: Append to Existing PDF - c:\program files\common files\adobe\acrobat\activex\AcroIEFavClient.dll/AcroIEAppend.html
IE: Convert Link Target to Adobe PDF - c:\program files\common files\adobe\acrobat\activex\AcroIEFavClient.dll/AcroIECaptureSelLinks.html
IE: Convert to Adobe PDF - c:\program files\common files\adobe\acrobat\activex\AcroIEFavClient.dll/AcroIECapture.html
IE: E&xport to Microsoft Excel - c:\progra~1\micros~2\office12\EXCEL.EXE/3000
IE: {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe
IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe
IE: {2670000A-7350-4f3c-8081-5663EE0C6C49} - {48E73304-E1D6-4330-914C-F5F514E3486C} - c:\progra~1\micros~2\office12\ONBttnIE.dll
IE: {92780B25-18CC-41C8-B9BE-3C9C571A8263} - {FF059E31-CC5A-4E2E-BF3B-96E929D65503} - c:\progra~1\micros~2\office12\REFIEBAR.DLL
DPF: {7530BFB8-7293-4D34-9923-61A11451AFC5} - hxxp://download.eset.com/special/eos/OnlineScanner.cab
DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_20-windows-i586.cab
DPF: {CAFEEFAC-0015-0000-0010-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.5.0/jinstall-1_5_0_10-windows-i586.cab
DPF: {CAFEEFAC-0016-0000-0020-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_20-windows-i586.cab
DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_20-windows-i586.cab
DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} - hxxp://fpdownload2.macromedia.com/get/shockwave/cabs/flash/swflash.cab
TCP: DhcpNameServer = 192.168.0.1
TCP: Interfaces\{89B1157E-B6AE-45F5-921C-C44BF14CF797} : DhcpNameServer = 192.168.0.1
TCP: Interfaces\{A56D6008-BB34-4811-B8C4-9F8A1165FFFD} : DhcpNameServer = 192.168.1.1 205.171.3.65
Notify: !SASWinLogon - c:\program files\superantispyware\SASWINLO.DLL
Notify: igfxcui - igfxsrvc.dll
SSODL: WPDShServiceObj - {AAA288BA-9A4C-45B0-95D7-94D524869DB5} - c:\windows\system32\WPDShServiceObj.dll
SEH: Eudora's Shell Extension: {edb0e980-90bd-11d4-8599-0008c7d3b6f8} - c:\progra~1\qualcomm\eudora\EuShlExt.dll
SEH: SABShellExecuteHook Class: {5ae067d3-9afb-48e0-853a-ebb7f4a000da} - c:\program files\superantispyware\SASSEH.DLL
.
================= FIREFOX ===================
.
FF - ProfilePath - c:\documents and settings\owner\application data\mozilla\firefox\profiles\no14s4he.default\
FF - prefs.js: browser.startup.homepage - hxxp://www.google.com/advanced_search?hl=en
FF - plugin: c:\program files\google\google earth\plugin\npgeplugin.dll
FF - plugin: c:\program files\google\google updater\2.4.1536.6592\npCIDetect13.dll
FF - plugin: c:\program files\google\update\1.3.21.65\npGoogleUpdate3.dll
FF - plugin: c:\program files\java\jre6\bin\new_plugin\npdeployJava1.dll
FF - Ext: Default: {972ce4c6-7e08-4474-a285-3208198ce6fd} - c:\program files\mozilla firefox\extensions\{972ce4c6-7e08-4474-a285-3208198ce6fd}
FF - Ext: Java Console: {CAFEEFAC-0016-0000-0020-ABCDEFFEDCBA} - c:\program files\mozilla firefox\extensions\{CAFEEFAC-0016-0000-0020-ABCDEFFEDCBA}
FF - Ext: Microsoft .NET Framework Assistant: {20a82645-c095-46ed-80e3-08825760534b} - c:\windows\microsoft.net\framework\v3.5\windows presentation foundation\DotNetAssistantExtension
FF - Ext: Java Quick Starter: jqs@sun.com - c:\program files\java\jre6\lib\deploy\jqs\ff
FF - Ext: Microsoft .NET Framework Assistant: {20a82645-c095-46ed-80e3-08825760534b} - %profile%\extensions\{20a82645-c095-46ed-80e3-08825760534b}
.
============= SERVICES / DRIVERS ===============
.
R0 EUBAKUP;EUBAKUP;c:\windows\system32\drivers\eubakup.sys [2010-3-1 26248]
R0 EUFS;EUFS;c:\windows\system32\drivers\eufs.sys [2010-3-1 20616]
R3 EuDisk;EASEUS Disk Enumerator;c:\windows\system32\drivers\EuDisk.sys [2010-3-1 122504]
S0 cerc6;cerc6; [x]
S1 avgio;avgio;c:\program files\avira\antivir desktop\avgio.sys [2011-8-28 11608]
S1 MpFilter;Microsoft Malware Protection Driver;c:\windows\system32\drivers\MpFilter.sys [2011-4-18 165648]
S1 MpKsl35e686f9;MpKsl35e686f9;\??\c:\documents and settings\all users\application data\microsoft\microsoft antimalware\definition updates\{a43f0f0e-dd8b-4209-a9af-85c56ae5c992}\mpksl35e686f9.sys --> c:\documents and settings\all users\application data\microsoft\microsoft antimalware\definition updates\{a43f0f0e-dd8b-4209-a9af-85c56ae5c992}\MpKsl35e686f9.sys [?]
S1 SASDIFSV;SASDIFSV;\??\c:\program files\superantispyware\sasdifsv.sys --> c:\program files\superantispyware\SASDIFSV.SYS [?]
S1 SASKUTIL;SASKUTIL;\??\c:\program files\superantispyware\saskutil.sys --> c:\program files\superantispyware\SASKUTIL.sys [?]
S2 AntiVirSchedulerService;Avira AntiVir Scheduler;c:\program files\avira\antivir desktop\sched.exe [2011-8-28 136360]
S2 AntiVirService;Avira AntiVir Guard;c:\program files\avira\antivir desktop\avguard.exe [2011-8-28 269480]
S2 avgntflt;avgntflt;c:\windows\system32\drivers\avgntflt.sys [2011-8-28 66616]
S2 gupdate;Google Update Service (gupdate);c:\program files\google\update\GoogleUpdate.exe [2010-2-16 135664]
S2 hasplms;HASP License Manager;c:\windows\system32\hasplms.exe -run --> c:\windows\system32\hasplms.exe -run [?]
S2 MSSQL$HDI;SQL Server (HDI);c:\program files\microsoft sql server\mssql.1\mssql\binn\sqlservr.exe [2007-2-10 29178224]
S3 cpuz132;cpuz132;\??\c:\docume~1\owner\locals~1\temp\cpuz132\cpuz132_x32.sys --> c:\docume~1\owner\locals~1\temp\cpuz132\cpuz132_x32.sys [?]
S3 EUDSKACS;EUDSKACS;c:\windows\system32\drivers\eudskacs.sys [2010-3-1 14216]
S3 GTWINSER;GTWINSER;c:\windows\system32\drivers\GTwinSER.sys [2010-6-5 66912]
S3 gupdatem;Google Update Service (gupdatem);c:\program files\google\update\GoogleUpdate.exe [2010-2-16 135664]
S3 MBAMSwissArmy;MBAMSwissArmy;c:\windows\system32\drivers\mbamswissarmy.sys [2010-2-19 41272]
S3 SASENUM;SASENUM;\??\c:\program files\superantispyware\sasenum.sys --> c:\program files\superantispyware\SASENUM.SYS [?]
S3 SolarWinds TFTP Server;SolarWinds TFTP Server;c:\program files\solarwinds\tftpserver\SolarWinds TFTP Server.exe [2008-7-25 61440]
.
=============== Created Last 30 ================
.
2011-08-29 06:29:47 -------- d-----w- c:\documents and settings\owner\application data\Avira
2011-08-29 06:20:10 66616 ----a-w- c:\windows\system32\drivers\avgntflt.sys
2011-08-29 06:20:09 -------- d-----w- c:\program files\Avira
2011-08-29 06:20:09 -------- d-----w- c:\documents and settings\all users\application data\Avira
2011-08-29 05:12:23 -------- d-s---w- C:\ComboFix
2011-08-29 04:11:30 98816 ----a-w- c:\windows\sed.exe
2011-08-29 04:11:30 518144 ----a-w- c:\windows\SWREG.exe
2011-08-29 04:11:30 256000 ----a-w- c:\windows\PEV.exe
2011-08-29 04:11:30 208896 ----a-w- c:\windows\MBR.exe
2011-08-29 00:49:36 7152464 ----a-w- c:\documents and settings\all users\application data\microsoft\microsoft antimalware\definition updates\{a43f0f0e-dd8b-4209-a9af-85c56ae5c992}\mpengine.dll
2011-08-29 00:49:36 222080 ------w- c:\windows\system32\MpSigStub.exe
2011-08-29 00:44:53 -------- d-----w- c:\program files\Microsoft Security Client
2011-08-29 00:33:55 -------- d-----w- C:\2e1529a226759ef7fdf32585af37da
.
==================== Find3M ====================
.
2011-08-30 14:42:08 22528 ----a-w- c:\windows\system32\drivers\nhcDriver.sys
2011-07-07 02:52:42 41272 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2011-07-07 02:52:42 22712 ----a-w- c:\windows\system32\drivers\mbam.sys
.
=================== ROOTKIT ====================
.
Stealth MBR rootkit/Mebroot/Sinowal/TDL4 detector 0.4.2 by Gmer, http://www.gmer.net
Windows 5.1.2600 Disk: WDC_WD1600BEVE-00UYT0 rev.01.04A01 -> Harddisk0\DR0 -> \Device\Ide\IdeDeviceP0T0L0-3
.
device: opened successfully
user: MBR read successfully
.
Disk trace:
called modules: ntoskrnl.exe CLASSPNP.SYS disk.sys ACPI.sys hal.dll >>UNKNOWN [0x8A6A14D0]<<
_asm { PUSH EBP; MOV EBP, ESP; PUSH ECX; MOV EAX, [EBP+0x8]; CMP EAX, [0x8a6a77d0]; MOV EAX, [0x8a6a784c]; PUSH EBX; PUSH ESI; MOV ESI, [EBP+0xc]; MOV EBX, [ESI+0x60]; PUSH EDI; JNZ 0x20; MOV [EBP+0x8], EAX; }
1 nt!IofCallDriver[0x804E37D5] -> \Device\Harddisk0\DR0[0x8A735AB8]
3 CLASSPNP[0xF7657FD7] -> nt!IofCallDriver[0x804E37D5] -> \Device\00000090[0x8A72B338]
5 ACPI[0xF75AE620] -> nt!IofCallDriver[0x804E37D5] -> [0x8A78E940]
\Driver\atapi[0x8A6681E8] -> IRP_MJ_CREATE -> 0x8A6A14D0
error: Read A device attached to the system is not functioning.
kernel: MBR read successfully
_asm { XOR AX, AX; MOV SS, AX; MOV SP, 0x7c00; STI ; PUSH AX; POP ES; PUSH AX; POP DS; CLD ; MOV SI, 0x7c1b; MOV DI, 0x61b; PUSH AX; PUSH DI; MOV CX, 0x1e5; REP MOVSB ; RETF ; MOV BP, 0x7be; MOV CL, 0x4; CMP [BP+0x0], CH; JL 0x2e; JNZ 0x3a; }
detected disk devices:
detected hooks:
\Driver\atapi DriverStartIo -> 0x8A6A131B
user & kernel MBR OK
copy of MBR has been found in sector 156280320
Warning: possible TDL3 rootkit infection !
.
============= FINISH: 9:26:32.74 ===============
========================================================

Attached Files



#4 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:06:05 PM

Posted 04 September 2011 - 07:24 PM

Hi,

Welcome to Bleeping Computer. My name is m0le and I will be helping you with your log.
  • Please subscribe to this topic, if you haven't already. Click the Watch This Topic button at the top on the right.

  • Please avoid installing/uninstalling or updating any programs and attempting any unsupervised fixes or scans. This can make helping you impossible.

  • Please reply to this post so I know you are there.
The forum is busy and we need to have replies as soon as possible. If I haven't had a reply after 3 days I will bump the topic and if you do not reply by the following day after that then I will close the topic.

----------------------------------------------

A clear TDL3 infection but it has already disabled your normal mode leaving us with only safe.

We can try some fixes in safe mode but may have to go outside of the Windows operating system later.

  • Download TDSSKiller and save it to your Desktop.

  • Extract its contents to your desktop and make sure TDSSKiller.exe (the contents of the zipped file) is on the Desktop itself, not within a folder on the desktop.

  • Go to Start > Run (Or you can hold down your Windows key and press R) and copy and paste the following into the text field. (make sure you include the quote marks) Then press OK.

    "%userprofile%\Desktop\TDSSKiller.exe" -l report.txt

  • Now click Start Scan.
  • If Malicious objects are found, ensure Cure is selected then click Continue > Reboot now.
  • Click Close
  • Finally press Report and copy and paste the contents into your next reply. If you've rebooted then the log will be found at C:\

Posted Image
m0le is a proud member of UNITE

#5 Haertig

Haertig
  • Topic Starter

  • Members
  • 29 posts
  • OFFLINE
  •  
  • Local time:11:05 AM

Posted 04 September 2011 - 07:50 PM

Hey M0le,

Thank you for helping me!

Rann TDSS. It found two baddies. I selected CURE and rebooted. (Log quoted below.)

The machine successfully rebooted into normal mode and Avira successfully loaded and started running.

Is there anything else you wish me to do?

Do you have any preference between using Avira or Microsoft Security Essentials?

Thanks!


Gray


===========================================================================
2011/09/04 17:42:58.0884 1188 TDSS rootkit removing tool 2.5.17.0 Aug 22 2011 15:46:57
2011/09/04 17:42:59.0365 1188 ================================================================================
2011/09/04 17:42:59.0365 1188 SystemInfo:
2011/09/04 17:42:59.0365 1188
2011/09/04 17:42:59.0365 1188 OS Version: 5.1.2600 ServicePack: 3.0
2011/09/04 17:42:59.0365 1188 Product type: Workstation
2011/09/04 17:42:59.0365 1188 ComputerName: OWNER-D6D3A1C7F
2011/09/04 17:42:59.0365 1188 UserName: Owner
2011/09/04 17:42:59.0365 1188 Windows directory: C:\WINDOWS
2011/09/04 17:42:59.0365 1188 System windows directory: C:\WINDOWS
2011/09/04 17:42:59.0365 1188 Processor architecture: Intel x86
2011/09/04 17:42:59.0365 1188 Number of processors: 1
2011/09/04 17:42:59.0365 1188 Page size: 0x1000
2011/09/04 17:42:59.0365 1188 Boot type: Normal boot
2011/09/04 17:42:59.0365 1188 ================================================================================
2011/09/04 17:43:00.0707 1188 Initialize success
2011/09/04 17:43:28.0747 0680 Deinitialize success

#6 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:06:05 PM

Posted 04 September 2011 - 07:56 PM

The log wasn't complete but I can imagine what it removed.

Please now run Combofix

Please download ComboFix from one of these locations:* IMPORTANT !!! Save ComboFix.exe to your Desktop making sure you rename it comfix.exe
  • Disable your AntiVirus and AntiSpyware applications including Firewalls, usually via a right click on the System Tray icon. They may otherwise interfere with our tools. (Click on this link to see a list of programs that should be disabled. The list is not all inclusive.)
  • Double click on Comfix.exe & follow the prompts.
  • As part of it's process, ComboFix will check to see if the Microsoft Windows Recovery Console is installed. With malware infections being as they are today, it's strongly recommended to have this pre-installed on your machine before doing any malware removal. It will allow you to boot up into a special recovery/repair mode that will allow us to more easily help you should your computer have a problem after an attempted removal of malware.
  • Follow the prompts to allow ComboFix to download and install the Microsoft Windows Recovery Console, and when prompted, agree to the End-User License Agreement to install the Microsoft Windows Recovery Console.
**Please note: If the Microsoft Windows Recovery Console is already installed, ComboFix will continue it's malware removal procedures.

Posted Image


Once the Microsoft Windows Recovery Console is installed using ComboFix, you should see the following message:

Posted Image


Click on Yes, to continue scanning for malware.

When finished, it shall produce a log for you. Please include the C:\ComboFix.txt in your next reply.
Posted Image
m0le is a proud member of UNITE

#7 Haertig

Haertig
  • Topic Starter

  • Members
  • 29 posts
  • OFFLINE
  •  
  • Local time:11:05 AM

Posted 04 September 2011 - 08:44 PM

Hello, M0le,

Ran ComboFix - it informed me that Avira and Microsoft Security Essentials were running and that I should disable them. I verified that Avira was disabled and that MSSE was uninstalled and went ahead.

CF finished and rebooted the computer. During the reboot Avira was enabled and claimed to have found a RootKit. (Avira log quoted below.) It claimed to have quarantined it. CF took a long time to produce a report, which is attached.

Anything else you would like me to do?

Thanks!


Gray



Avira AntiVir Personal
Report file date: Sunday, September 04, 2011 18:19

Scanning for 3331852 virus strains and unwanted programs.

The program is running as an unrestricted full version.
Online services are available:

Licensee : Avira AntiVir Personal - Free Antivirus
Serial number : 0000149996-ADJIE-0000001
Platform : Windows XP
Windows version : (Service Pack 3) [5.1.2600]
Boot mode : Normally booted
Username : SYSTEM
Computer name : OWNER-D6D3A1C7F

Version information:
BUILD.DAT : 10.2.0.700 35934 Bytes 7/21/2011 17:12:00
AVSCAN.EXE : 10.3.0.7 484008 Bytes 7/21/2011 19:12:28
AVSCAN.DLL : 10.0.5.0 47464 Bytes 7/21/2011 19:15:00
LUKE.DLL : 10.3.0.5 45416 Bytes 7/21/2011 19:13:59
LUKERES.DLL : 10.0.0.1 12648 Bytes 2/11/2010 07:40:49
AVSCPLR.DLL : 10.3.0.7 119656 Bytes 7/21/2011 19:12:28
AVREG.DLL : 10.3.0.9 90472 Bytes 7/21/2011 19:12:21
VBASE000.VDF : 7.10.0.0 19875328 Bytes 11/6/2009 17:05:36
VBASE001.VDF : 7.11.0.0 13342208 Bytes 12/14/2010 14:53:55
VBASE002.VDF : 7.11.3.0 1950720 Bytes 2/9/2011 14:53:56
VBASE003.VDF : 7.11.5.225 1980416 Bytes 4/7/2011 19:14:25
VBASE004.VDF : 7.11.8.178 2354176 Bytes 5/31/2011 19:14:28
VBASE005.VDF : 7.11.10.251 1788416 Bytes 7/7/2011 19:14:29
VBASE006.VDF : 7.11.13.60 6411776 Bytes 8/16/2011 00:42:12
VBASE007.VDF : 7.11.13.61 2048 Bytes 8/16/2011 00:42:12
VBASE008.VDF : 7.11.13.62 2048 Bytes 8/16/2011 00:42:12
VBASE009.VDF : 7.11.13.63 2048 Bytes 8/16/2011 00:42:13
VBASE010.VDF : 7.11.13.64 2048 Bytes 8/16/2011 00:42:13
VBASE011.VDF : 7.11.13.65 2048 Bytes 8/16/2011 00:42:13
VBASE012.VDF : 7.11.13.66 2048 Bytes 8/16/2011 00:42:13
VBASE013.VDF : 7.11.13.95 166400 Bytes 8/17/2011 00:42:16
VBASE014.VDF : 7.11.13.125 209920 Bytes 8/18/2011 00:42:19
VBASE015.VDF : 7.11.13.157 184832 Bytes 8/22/2011 00:42:21
VBASE016.VDF : 7.11.13.201 128000 Bytes 8/24/2011 00:42:23
VBASE017.VDF : 7.11.13.234 160768 Bytes 8/25/2011 00:42:25
VBASE018.VDF : 7.11.14.16 141312 Bytes 8/30/2011 00:42:27
VBASE019.VDF : 7.11.14.48 133120 Bytes 8/31/2011 00:42:29
VBASE020.VDF : 7.11.14.78 156160 Bytes 9/2/2011 00:42:31
VBASE021.VDF : 7.11.14.79 2048 Bytes 9/2/2011 00:42:31
VBASE022.VDF : 7.11.14.80 2048 Bytes 9/2/2011 00:42:32
VBASE023.VDF : 7.11.14.81 2048 Bytes 9/2/2011 00:42:32
VBASE024.VDF : 7.11.14.82 2048 Bytes 9/2/2011 00:42:32
VBASE025.VDF : 7.11.14.83 2048 Bytes 9/2/2011 00:42:32
VBASE026.VDF : 7.11.14.84 2048 Bytes 9/2/2011 00:42:32
VBASE027.VDF : 7.11.14.85 2048 Bytes 9/2/2011 00:42:33
VBASE028.VDF : 7.11.14.86 2048 Bytes 9/2/2011 00:42:33
VBASE029.VDF : 7.11.14.87 2048 Bytes 9/2/2011 00:42:33
VBASE030.VDF : 7.11.14.88 2048 Bytes 9/2/2011 00:42:33
VBASE031.VDF : 7.11.14.92 32256 Bytes 9/4/2011 00:42:34
Engineversion : 8.2.6.54
AEVDF.DLL : 8.1.2.1 106868 Bytes 4/21/2011 14:53:28
AESCRIPT.DLL : 8.1.3.76 1626490 Bytes 9/5/2011 00:43:16
AESCN.DLL : 8.1.7.2 127349 Bytes 4/21/2011 14:53:27
AESBX.DLL : 8.2.1.34 323957 Bytes 7/21/2011 19:11:50
AERDL.DLL : 8.1.9.13 639349 Bytes 7/21/2011 19:11:49
AEPACK.DLL : 8.2.10.10 684407 Bytes 9/5/2011 00:43:10
AEOFFICE.DLL : 8.1.2.13 201083 Bytes 9/5/2011 00:43:05
AEHEUR.DLL : 8.1.2.164 3654007 Bytes 9/5/2011 00:43:04
AEHELP.DLL : 8.1.17.7 254327 Bytes 9/5/2011 00:42:43
AEGEN.DLL : 8.1.5.9 401780 Bytes 9/5/2011 00:42:41
AEEMU.DLL : 8.1.3.0 393589 Bytes 4/21/2011 14:53:14
AECORE.DLL : 8.1.23.0 196983 Bytes 9/5/2011 00:42:38
AEBB.DLL : 8.1.1.0 53618 Bytes 4/21/2011 14:53:14
AVWINLL.DLL : 10.0.0.0 19304 Bytes 4/21/2011 14:53:36
AVPREF.DLL : 10.0.3.2 44904 Bytes 7/21/2011 19:12:20
AVREP.DLL : 10.0.0.10 174120 Bytes 7/21/2011 19:12:22
AVARKT.DLL : 10.0.26.1 255336 Bytes 7/21/2011 19:12:00
AVEVTLOG.DLL : 10.0.0.9 203112 Bytes 7/21/2011 19:12:10
SQLITE3.DLL : 3.6.19.0 355688 Bytes 7/21/2011 22:12:31
AVSMTP.DLL : 10.0.0.17 63848 Bytes 4/21/2011 14:53:36
NETNT.DLL : 10.0.0.0 11624 Bytes 4/21/2011 14:53:46
RCIMAGE.DLL : 10.0.0.35 2589544 Bytes 7/21/2011 19:15:09
RCTEXT.DLL : 10.0.64.0 97640 Bytes 7/21/2011 19:15:09

Configuration settings for the scan:
Jobname.............................: avguard_async_scan
Configuration file..................: C:\Documents and Settings\All Users\Application Data\Avira\AntiVir Desktop\TEMP\AVGUARD_4e9cd564\guard_slideup.avp
Logging.............................: Default
Primary action......................: interactive
Secondary action....................: quarantine
Scan master boot sector.............: on
Scan boot sector....................: off
Process scan........................: on
Scan registry.......................: off
Search for rootkits.................: off
Integrity checking of system files..: off
Scan all files......................: All files
Scan archives.......................: on
Recursion depth.....................: 20
Smart extensions....................: on
Macro heuristic.....................: on
File heuristic......................: Complete

Start of the scan: Sunday, September 04, 2011 18:19

The scan of running processes will be started
Scan process 'Catchme.tmp' - '1' Module(s) have been scanned
Scan process 'pev.3XE' - '1' Module(s) have been scanned
Scan process 'avscan.exe' - '1' Module(s) have been scanned
Scan process 'Dot1XCfg.exe' - '1' Module(s) have been scanned
Scan process 'HDIDeviceServer.exe' - '1' Module(s) have been scanned
Scan process 'wscntfy.exe' - '1' Module(s) have been scanned
Scan process 'avgnt.exe' - '1' Module(s) have been scanned
Scan process 'opware32.exe' - '1' Module(s) have been scanned
Scan process 'jusched.exe' - '1' Module(s) have been scanned
Scan process 'PEV.exe' - '1' Module(s) have been scanned
Scan process 'nhc.exe' - '1' Module(s) have been scanned
Scan process 'Acrobat_sl.exe' - '1' Module(s) have been scanned
Scan process 'ifrmewrk.exe' - '1' Module(s) have been scanned
Scan process 'ZCfgSvc.exe' - '1' Module(s) have been scanned
Scan process 'SynTPEnh.exe' - '1' Module(s) have been scanned
Scan process 'SynTPLpr.exe' - '1' Module(s) have been scanned
Scan process 'Catchme.tmp' - '1' Module(s) have been scanned
Scan process 'CF3793.3XE' - '1' Module(s) have been scanned
Scan process 'wmiprvse.exe' - '1' Module(s) have been scanned
Scan process 'CF3793.3XE' - '1' Module(s) have been scanned
Scan process 'alg.exe' - '1' Module(s) have been scanned
Scan process 'CALMAIN.exe' - '1' Module(s) have been scanned
Scan process 'wuauclt.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'sqlwriter.exe' - '1' Module(s) have been scanned
Scan process 'RegSrvc.exe' - '1' Module(s) have been scanned
Scan process 'sqlservr.exe' - '1' Module(s) have been scanned
Scan process 'jqs.exe' - '1' Module(s) have been scanned
Scan process 'hasplms.exe' - '1' Module(s) have been scanned
Scan process 'avshadow.exe' - '1' Module(s) have been scanned
Scan process 'EvtEng.exe' - '1' Module(s) have been scanned
Scan process 'mscorsvw.exe' - '1' Module(s) have been scanned
Scan process 'avguard.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'sched.exe' - '1' Module(s) have been scanned
Scan process 'SCardSvr.exe' - '1' Module(s) have been scanned
Scan process 'spoolsv.exe' - '1' Module(s) have been scanned
Scan process 'rundll32.exe' - '1' Module(s) have been scanned
Scan process 'Explorer.EXE' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'S24EvMon.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'Ati2evxx.exe' - '1' Module(s) have been scanned
Scan process 'lsass.exe' - '1' Module(s) have been scanned
Scan process 'services.exe' - '1' Module(s) have been scanned
Scan process 'winlogon.exe' - '1' Module(s) have been scanned
Scan process 'csrss.exe' - '1' Module(s) have been scanned
Scan process 'smss.exe' - '1' Module(s) have been scanned

Starting the file scan:

Begin scan in 'C:\WINDOWS\system32\drivers\serial.sys'
C:\WINDOWS\system32\drivers\serial.sys
[DETECTION] Contains recognition pattern of the RKIT/ZAccess.c.1 root kit

Beginning disinfection:
C:\WINDOWS\system32\drivers\serial.sys
[DETECTION] Contains recognition pattern of the RKIT/ZAccess.c.1 root kit
[NOTE] The registration entry <HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Serial\ImagePath> was successfully repaired.
[NOTE] The registration entry <HKEY_LOCAL_MACHINE\System\ControlSet002\Services\Serial\ImagePath> was successfully repaired.
[NOTE] The registration entry <HKEY_LOCAL_MACHINE\System\ControlSet003\Services\Serial\ImagePath> was successfully repaired.
[NOTE] The registration entry <HKEY_LOCAL_MACHINE\System\ControlSet004\Services\Serial\ImagePath> was successfully repaired.
[NOTE] The file was moved to the quarantine directory under the name '4c6e80b1.qua'.


End of the scan: Sunday, September 04, 2011 18:20
Used time: 00:05 Minute(s)

The scan has been done completely.

0 Scanned directories
52 Files were scanned
1 Viruses and/or unwanted programs were found
0 Files were classified as suspicious
0 files were deleted
0 Viruses and unwanted programs were repaired
1 Files were moved to quarantine
0 Files were renamed
0 Files cannot be scanned
51 Files not concerned
0 Archives were scanned
0 Warnings
1 Notes


The scan results will be transferred to the Guard.


=============================================================

Attached Files

  • Attached File  log.txt   112.1KB   2 downloads


#8 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:06:05 PM

Posted 05 September 2011 - 07:59 PM

The infected serial.sys file couldn't be replaced by Combofix as it couldn't find a backup. The Avira run quarantined the file instead - fortunately this system file is not a crucial one.

Please now scan with ESET's online scanner

I'd like us to scan your machine with ESET OnlineScan
  • Hold down Control and click on the following link to open ESET OnlineScan in a new window.
    ESET OnlineScan
  • Click the Posted Image button.
  • For alternate browsers only: (Microsoft Internet Explorer users can skip these steps)
    • Click on Posted Image to download the ESET Smart Installer. Save it to your desktop.
    • Double click on the Posted Image icon on your desktop.
  • Check Posted Image
  • Click the Posted Image button.
  • Accept any security warnings from your browser.
  • Under scan settings, check Posted Image and check Remove found threats
  • Click Advanced settings and select the following:
    • Scan potentially unwanted applications
    • Scan for potentially unsafe applications
    • Enable Anti-Stealth technology
  • ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this can take some time.
  • Copy and paste the resulting log in your next reply
If no log is generated that means nothing was found. Please let me know if this happens.
Posted Image
m0le is a proud member of UNITE

#9 Haertig

Haertig
  • Topic Starter

  • Members
  • 29 posts
  • OFFLINE
  •  
  • Local time:11:05 AM

Posted 06 September 2011 - 05:50 PM

Hey M0le,

ESET hangs up telling me that it can not get update and asks if the proxy is configured. The Use Custom Proxy box is not checked.

It also indicated I had run EST before and would just download the updates.

Tried to run with Avira realtime scanning both on and off.


Meanwhile, back at the ranch.....

After running ComboFix, Avira scanning was left on. When it ran later that evening it found and quarantined a bunch of baddies. Avira log attached.

A second Avira scan run after a couple of reboots came out clean.


Thanks!


Gray

Attached Files



#10 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:06:05 PM

Posted 06 September 2011 - 07:07 PM

Avira found and deleted the stored and quarantined viruses. None of these files were active on your machine.


As to the Proxy issue.

In Internet Explorer: Tools Menu -> Internet Options -> Connections Tab ->Lan Settings > uncheck "use a proxy server" and check to "Automatically detect settings".

In Firefox you find the Proxy server settings this like this. In Tools Menu -> Options... -> Advanced Tab -> Network Tab -> "Settings" under Connection Select "auto-detect Proxy settings for this network"
Posted Image
m0le is a proud member of UNITE

#11 Haertig

Haertig
  • Topic Starter

  • Members
  • 29 posts
  • OFFLINE
  •  
  • Local time:11:05 AM

Posted 08 September 2011 - 12:10 AM

Hello M0le,

Dealing with the proxy stuff in Firefox did the trick.

Ran ESET. Part way through (about 35% done) the machine locked up. I think this a hardware thing - this machine occasionally does this. The machine becomes completely unresponsive - even the cursor is locked and the three fingered salute can't be invoked - though the screen remains intact. I have to hold down the power button to force a shut down and reboot.

At the time the machine froze, ESET had found 3 problems, but, because the machine had frozen, I couldn't get a log. I reran ESET and the second time around it found no problems. I went to "Manage Quarantine" and the three files listed were all in the Eudora attachment file and are -
formamaz!.html
=iso_8859-5BZm9ybSO2Mg===
restore_form.html

I inadvertently restored the restore_form.html file, not understanding what the restore button did. Couldn't figure out any way to "unrestore" so a ran ESET a third time, presuming that it would catch it again, and it apparently did.

This is what it found -
C:\Documents and Settings\Owner\Application Data\Qualcomm\Eudora\attach\restore_form.html HTML/Phishing.Gen trojan cleaned by deleting - quarantined


Anything else to do?


Thanks!


Gray

#12 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:06:05 PM

Posted 08 September 2011 - 12:57 PM

We just need to tidy up and we're done...

You're clean. Good stuff! :thumbup2:

Let's do some clearing up

If you used DeFogger now is the time to enable your CD emulation software again.

Uninstall ComboFix

Remove Combofix now that we're done with it.
  • Please press the Windows Key and R on your keyboard. This will bring up the Run... command.
    (For Vista/Windows 7 please click Start -> All Programs -> Accessories -> Run)
  • Now type in Combofix /Uninstall in the runbox and click OK. (Notice the space between "Combofix" and "/")
  • Please follow the prompts to uninstall Combofix.
  • You will then receive a message saying Combofix was uninstalled successfully once it's done uninstalling itself.
This will uninstall Combofix and anything associated with it.


We Need to Clean Up our Mess
Download and Run OTC

We will now remove the tools we used during this fix using OTC.

  • Download OTC by OldTimer and save it to your desktop.
  • Double click Posted Image icon to start the program. If you are using Vista, please right-click and choose run as administrator
  • Then Click the big Posted Image button.
  • You will get a prompt saying "Being Cleanup Process". Please select Yes.
  • Restart your computer when prompted.
If you still have any tools or logs leftover on your computer you can go ahead and delete those off of your computer now.
------------------------------------------------------------------------------------------------------------------------

Here's some advice on how you can keep your PC clean


Use and update your AntiVirus Software

You must have a good antivirus. There are plenty to choose from but I personally recommend the free options of Avast and Avira Antivir - though if you choose Avira you should make sure that you uncheck the box offering to install the Ask toolbar. If you want to purchase a security program then I recommend any of the following: AVG, Norton, McAfee, Kaspersky and ESET Nod32.

It is imperative that you update your Antivirus software at least once a week (Even more if you wish). If you do not update your antivirus software then it will not be able to catch any of the new variants that may come out. If you use a commercial antivirus program you must make sure you keep renewing your subscription. Otherwise, once your subscription runs out, you may not be able to update the programs virus definitions.


Make sure your applications have all of their updates

Use this next program to check for updates for programs already on your system. Download Security Check by screen317 from here or here.

  • Save it to your Desktop.
  • Double click SecurityCheck.exe and follow the onscreen instructions inside of the black box.
  • A Notepad document should open automatically, make sure that updates on any that are flagged are carried out as soon as possible

It is also possible for other programs on your computer to have security vulnerability that can allow malware to infect you. Therefore, it is also a good idea to check for the latest versions of commonly installed applications that are regularly patched to fix vulnerabilities. You can check these by visiting Secunia Software Inspector and Calendar of Updates.


Install an AntiSpyware Program

A highly recommended AntiSpyware program is SuperAntiSpyware. You can download the free Home Version. or the Pro version for a 15 day trial period.

Installing this or another recommended program will provide spyware & hijacker protection on your computer alongside your virus protection. You should scan your computer with an AntiSpyware program on a regular basis just as you would an antivirus software.


Finally, here's a treasure trove of antivirus, antimalware and antispyware resources


That's it Haertig, happy surfing!

Cheers.

m0le
Posted Image
m0le is a proud member of UNITE

#13 Haertig

Haertig
  • Topic Starter

  • Members
  • 29 posts
  • OFFLINE
  •  
  • Local time:11:05 AM

Posted 08 September 2011 - 01:26 PM

Thanks for all your help, M0le!

A $50 donation has been made.

Do you have any thoughts on Microsoft Security Essentials?


Gray

#14 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:06:05 PM

Posted 08 September 2011 - 04:23 PM

MSE is a pretty average product. Microsoft felt that they needed to show that they consider security as important, after all, most people own a machine with a MS operating system which attracts the malware writers who are trying to disrupt as many users as possible.

The problem is that specialist security companies hold security as the only important thing - you won't be seeing a Norton browser or a McAfee keyboard. This means that their analysts are much faster reacting and more focused to deal with the new variants which invade all computers early on in their lifespan as they are not recognised as yet.

I would disable MSE and use a proper security suite (free or paid-for)

Thank you very much for the donation :)

Edited by m0le, 08 September 2011 - 04:24 PM.

Posted Image
m0le is a proud member of UNITE

#15 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:06:05 PM

Posted 14 September 2011 - 05:54 PM

It appears that this issue is resolved, therefore I am closing the topic. If that is not the case and you need or wish to continue with this topic, please send me or any Moderator a Personal Message (PM) that you would like this topic re-opened.
Posted Image
m0le is a proud member of UNITE




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users