Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Zero Access rootkit removed-unable to pull down an IP address


  • This topic is locked This topic is locked
50 replies to this topic

#1 NapalmDawn

NapalmDawn

  • Members
  • 35 posts
  • OFFLINE
  •  
  • Local time:07:38 AM

Posted 20 September 2011 - 02:52 PM

As per this topic here http://www.bleepingcomputer.com/forums/topic418479.html/page__gopid__2411783#entry2411783
I am posting some logs concerning the removal of Rootkit.win32.zaccess.e that infected ipsec.sys among others

AntiZeroAccess log
Webroot AntiZeroAccess 0.8 Log File
Execution time: 13/09/2011 - 00:31
Host operation System: Windows Xp X86 version 5.1.2600 Service Pack 3
00:31:22 - CheckSystem - Begin to check system...
00:31:22 - OpenRootDrive - Opening system root volume and physical drive....
00:31:22 - C Root Drive: Disk number: 0 Start sector: 0x00000800 Partition Size: 0x12A14400 sectors.
00:31:22 - PrevX Main driver extracted in "C:\WINDOWS\system32\drivers\ZeroAccess.sys".
00:31:23 - InstallAndStartDriver - Main driver was installed and now is running.
00:31:23 - CheckSystem - Warning! Disk class driver is INFECTED.
00:31:23 - CheckFile - Warning! File "afd.sys" is Infected by ZeroAccess Rootkit.
00:32:16 - DoRepair - Begin to perform system repair....
00:32:16 - DoRepair - System Disk class driver was repaired.
00:32:16 - DoRepair - Infected "afd.sys" file was renamed.
00:32:16 - DoRepair - Infected "afd.sys" file was successfully cleaned!
00:32:16 - StopAndRemoveDriver - AntiZeroAccess Driver is stopped and removed.
00:32:16 - StopAndRemoveDriver - File "ZeroAccess.sys" was deleted!
00:32:16 - Execution Ended!


Webroot AntiZeroAccess 0.8 Log File
Execution time: 13/09/2011 - 00:34
Host operation System: Windows Xp X86 version 5.1.2600 Service Pack 3
00:34:06 - CheckSystem - Begin to check system...
00:34:06 - OpenRootDrive - Opening system root volume and physical drive....
00:34:06 - C Root Drive: Disk number: 0 Start sector: 0x00000800 Partition Size: 0x12A14400 sectors.
00:34:06 - PrevX Main driver extracted in "C:\WINDOWS\system32\drivers\ZeroAccess.sys".
00:34:06 - InstallAndStartDriver - Main driver was installed and now is running.
00:34:06 - CheckSystem - Warning! Disk class driver is INFECTED.
00:34:08 - CheckFile - Warning! File "ipsec.sys" is Infected by ZeroAccess Rootkit.
00:34:35 - DoRepair - Begin to perform system repair....
00:34:35 - DoRepair - System Disk class driver was repaired.
00:34:35 - DoRepair - Infected "ipsec.sys" file was renamed.
00:34:35 - DoRepair - Infected "ipsec.sys" file was successfully cleaned!
00:34:36 - StopAndRemoveDriver - AntiZeroAccess Driver is stopped and removed.
00:34:36 - StopAndRemoveDriver - File "ZeroAccess.sys" was deleted!
00:34:36 - Execution Ended!




Combofix log
ComboFix 11-09-12.01 - Administrator1 09/13/2011 0:48.1.2 - x86
Microsoft Windows XP Home Edition 5.1.2600.3.1252.1.1033.18.2039.1723 [GMT -4:00]
Running from: D:\ComboFix.exe
.
WARNING -THIS MACHINE DOES NOT HAVE THE RECOVERY CONSOLE INSTALLED !!
.
.
((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.
.
c:\documents and settings\Administrator\Local Settings\Application Data\ApplicationHistory
c:\documents and settings\Administrator\Local Settings\Application Data\ApplicationHistory\ngen.exe.2c05686e.ini
c:\documents and settings\Administrator\Local Settings\Application Data\ApplicationHistory\SL133.tmp.36c00482.ini
c:\documents and settings\Administrator\Local Settings\Application Data\ApplicationHistory\SL86.tmp.aa6ec4ff.ini
c:\documents and settings\Administrator1\Local Settings\Application Data\ApplicationHistory
c:\documents and settings\Administrator1\Local Settings\Application Data\ApplicationHistory\ngen.exe.2c05686e.ini
c:\documents and settings\Administrator1\Local Settings\Application Data\ApplicationHistory\SL133.tmp.36c00482.ini
c:\documents and settings\Administrator1\Local Settings\Application Data\ApplicationHistory\SL86.tmp.aa6ec4ff.ini
c:\documents and settings\Neil\Local Settings\Application Data\ApplicationHistory
c:\documents and settings\Neil\Local Settings\Application Data\ApplicationHistory\ngen.exe.2c05686e.ini
c:\documents and settings\Neil\Local Settings\Application Data\ApplicationHistory\SL133.tmp.36c00482.ini
c:\documents and settings\Neil\Local Settings\Application Data\ApplicationHistory\SL86.tmp.aa6ec4ff.ini
c:\program files\HP\HPBTWD.exe
c:\windows\$NtUninstallKB12075$\1310695115\{1B372133-BFFA-4dba-9CCF-5474BED6A9F6}
c:\windows\$NtUninstallKB12075$\1310695115\L\dnnkaqhd
c:\windows\$NtUninstallKB12075$\236943133
c:\windows\assembly\GAC_MSIL\desktop.ini
.
c:\program files\Hewlett-Packard\Shared\hpqwmiex.exe . . . is infected!!
c:\program files\Hewlett-Packard\Shared\hpqwmiex.exe . . . was deleted!! You should re-install the program it pertains to
.
c:\program files\Trend Micro\RUBotted\RUBotSrv.exe . . . is infected!!
c:\program files\Trend Micro\RUBotted\RUBotSrv.exe . . . was deleted!! You should re-install the program it pertains to
.
c:\program files\Microsoft Application Virtualization Client\sftlist.exe . . . is infected!!
c:\program files\Microsoft Application Virtualization Client\sftlist.exe . . . was deleted!! You should re-install the program it pertains to
.
c:\program files\Microsoft Application Virtualization Client\sftvsa.exe . . . is infected!!
c:\program files\Microsoft Application Virtualization Client\sftvsa.exe . . . was deleted!! You should re-install the program it pertains to
.
Infected copy of c:\program files\idt\wdm\STacSV.exe was found and disinfected
Restored copy from - c:\windows\system32\stacsv.exe
.
.
((((((((((((((((((((((((((((((((((((((( Drivers/Services )))))))))))))))))))))))))))))))))))))))))))))))))
.
.
-------\Service_4e1f9ecb
.
.
((((((((((((((((((((((((( Files Created from 2011-08-13 to 2011-09-13 )))))))))))))))))))))))))))))))
.
.
2011-09-12 05:51 . 2011-09-12 05:51 -------- d-----w- C:\TDSSKiller_Quarantine
2011-09-12 05:49 . 2011-09-13 04:43 50112 --sha-w- c:\windows\system32\c_10430.nl_
2011-09-12 03:24 . 2011-09-12 03:24 -------- d-----w- c:\program files\ESET
2011-09-12 03:04 . 2011-09-12 03:04 -------- d-----w- c:\program files\Common Files\Java
2011-09-12 03:04 . 2011-09-12 03:04 73728 ----a-w- c:\windows\system32\javacpl.cpl
2011-09-12 00:24 . 2011-09-12 00:24 -------- d--h--w- c:\documents and settings\All Users\Application Data\Common Files
2011-09-12 00:18 . 2011-09-12 00:27 -------- d-----w- c:\documents and settings\All Users\Application Data\MFAData
2011-09-12 00:13 . 2011-09-12 00:13 -------- d-----w- c:\documents and settings\Administrator1\DoctorWeb
2011-09-11 02:05 . 2011-09-11 02:05 -------- d-----w- c:\documents and settings\Administrator1\Application Data\SUPERAntiSpyware.com
2011-09-11 02:04 . 2011-09-11 02:04 -------- d-----w- c:\documents and settings\All Users\Application Data\SUPERAntiSpyware.com
2011-09-11 00:53 . 2011-09-11 00:53 -------- d-----w- c:\documents and settings\LocalService\Application Data\McAfee
2011-09-11 00:51 . 2011-09-11 00:51 -------- d-----w- c:\documents and settings\All Users\Application Data\McAfee
2011-09-11 00:29 . 2011-09-11 00:29 -------- d-----w- c:\program files\WinPcap
2011-09-11 00:29 . 2011-09-11 00:29 -------- d-----w- c:\documents and settings\All Users\Application Data\Trend Micro
2011-09-11 00:28 . 2011-09-11 04:14 -------- d-----w- c:\program files\Trend Micro
2011-09-10 23:10 . 2011-09-11 04:13 -------- d-----w- C:\temp
2011-09-10 23:05 . 2011-09-11 00:50 -------- d-----w- c:\program files\Spybot - Search & Destroy
2011-09-10 22:47 . 2011-09-10 22:48 -------- d-----w- c:\documents and settings\Neil
2011-09-10 21:01 . 2011-09-10 22:16 -------- d-----w- c:\program files\MBAM
2011-09-10 20:53 . 2011-09-10 20:53 -------- d--h--w- c:\windows\PIF
2011-09-10 20:17 . 2011-09-10 20:17 -------- d-----w- c:\documents and settings\Administrator\Application Data\Malwarebytes
2011-09-03 10:17 . 2011-09-03 10:17 599040 ------w- c:\windows\system32\dllcache\crypt32.dll
.
.
.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2011-09-13 04:34 . 2008-04-15 12:00 75264 ----a-w- c:\windows\system32\drivers\ipsec.sys
2011-09-13 04:32 . 2009-08-23 08:28 138496 ----a-w- c:\windows\system32\drivers\afd.sys
2011-09-12 03:04 . 2010-04-16 02:17 472808 ----a-w- c:\windows\system32\deployJava1.dll
2011-09-11 02:24 . 2011-05-18 17:11 404640 ----a-w- c:\windows\system32\FlashPlayerCPLApp.cpl
2011-09-03 10:17 . 2008-04-15 12:00 599040 ----a-w- c:\windows\system32\crypt32.dll
2011-07-15 13:29 . 2010-04-14 21:57 456320 ----a-w- c:\windows\system32\drivers\mrxsmb.sys
2011-07-08 14:02 . 2008-04-15 12:00 10496 ----a-w- c:\windows\system32\drivers\ndistapi.sys
2011-06-24 14:10 . 2008-04-15 12:00 139656 ----a-w- c:\windows\system32\drivers\rdpwd.sys
2011-06-23 18:36 . 2010-12-16 01:14 43520 ----a-w- c:\windows\system32\licmgr10.dll
2011-06-23 18:36 . 2010-12-16 01:14 1469440 ------w- c:\windows\system32\inetcpl.cpl
2011-06-23 18:36 . 2010-10-13 22:55 916480 ----a-w- c:\windows\system32\wininet.dll
2011-06-23 12:05 . 2010-12-16 01:14 385024 ----a-w- c:\windows\system32\html.iec
2011-06-20 17:44 . 2010-06-18 17:45 293376 ----a-w- c:\windows\system32\winsrv.dll
.
.
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"Trend Micro RUBotted V2.0 Beta"="c:\program files\Trend Micro\RUBotted\RUBottedGUI.exe" [2010-12-17 1103184]
"SysTrayApp"="c:\program files\IDT\WDM\sttray.exe" [2009-06-30 458844]
"SynTPEnh"="c:\program files\Synaptics\SynTP\SynTPEnh.exe" [2009-01-16 1418536]
"Persistence"="c:\windows\system32\igfxpers.exe" [2008-02-15 131072]
"IgfxTray"="c:\windows\system32\igfxtray.exe" [2008-02-15 135168]
"hpWirelessAssistant"="c:\program files\Hewlett-Packard\HP Wireless Assistant\HPWAMain.exe" [2008-04-15 488752]
"HotKeysCmds"="c:\windows\system32\hkcmd.exe" [2008-02-15 159744]
"HostManager"="c:\program files\Common Files\AOL\1288337709\ee\AOLSoftware.exe" [2010-03-08 41800]
"AESTFltr"="c:\windows\system32\AESTFltr.exe" [2009-02-18 737280]
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\Wdf01000.sys]
@="Driver"
.
[HKEY_LOCAL_MACHINE\software\microsoft\security center]
"AntiVirusOverride"=dword:00000001
.
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"%windir%\\system32\\sessmgr.exe"=
"c:\\Program Files\\Microsoft Office\\Office12\\ONENOTE.EXE"=
"c:\\Program Files\\Common Files\\AOL\\Loader\\aolload.exe"=
"c:\\Program Files\\AIM\\aim.exe"=
"c:\\Program Files\\Common Files\\AOL\\acs\\AOLDial.exe"=
"c:\\Program Files\\Common Files\\AOL\\acs\\AOLacsd.exe"=
"c:\\Program Files\\Common Files\\AOL\\1288337709\\ee\\aolsoftware.exe"=
"c:\\Program Files\\Common Files\\AOL\\TopSpeed\\3.0\\aoltpsd3.exe"=
"c:\\Program Files\\Logitech\\Logitech Harmony Remote Software 7\\HarmonyRemote.exe"=
.
S0 25568825;25568825;c:\windows\system32\drivers\44869608.sys --> c:\windows\system32\drivers\44869608.sys [?]
S2 Norton Internet Security;Norton Internet Security;"c:\program files\Norton Internet Security\Engine\16.0.0.125\ccSvcHst.exe" /s "Norton Internet Security" /m "c:\program files\Norton Internet Security\Engine\16.0.0.125\diMaster.dll" /prefetch:1 --> c:\program files\Norton Internet Security\Engine\16.0.0.125\ccSvcHst.exe [?]
S2 NPF;NetGroup Packet Filter Driver;c:\windows\system32\drivers\npf.sys [10/20/2009 2:19 PM 50704]
S2 RUBotSrv;Trend Micro RUBotted Service;c:\program files\Trend Micro\RUBotted\RUBotSrv.exe --> c:\program files\Trend Micro\RUBotted\RUBotSrv.exe [?]
S3 AESTAud;AE Audio Service;c:\windows\system32\drivers\AESTAud.sys [3/21/2010 3:02 PM 113664]
S3 cvhsvc;Client Virtualization Handler;c:\program files\Common Files\Microsoft Shared\Virtualization Handler\CVHSVC.EXE [2/28/2010 2:33 AM 821664]
S3 L1c;NDIS Miniport Driver for Atheros AR8131/AR8132 PCI-E Ethernet Controller;c:\windows\system32\drivers\l1c51x86.sys [3/31/2009 12:11 PM 39424]
S3 McComponentHostService;McAfee Security Scan Component Host Service;"c:\program files\McAfee Security Scan\2.0.181\McCHSvc.exe" --> c:\program files\McAfee Security Scan\2.0.181\McCHSvc.exe [?]
S3 osppsvc;Office Software Protection Platform;c:\program files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE [1/9/2010 9:37 PM 4640000]
S3 RSUSBSTOR;RTS5121.Sys Realtek USB Card Reader;c:\windows\system32\drivers\RTS5121.sys [6/16/2009 7:56 PM 160256]
S3 Rts516xIR;Realtek IR Driver;c:\windows\system32\DRIVERS\Rts516xIR.sys --> c:\windows\system32\DRIVERS\Rts516xIR.sys [?]
S3 Sftfs;Sftfs;c:\windows\system32\drivers\Sftfsxp.sys [4/24/2010 1:10 AM 554344]
S3 sftlist;Application Virtualization Client;"c:\program files\Microsoft Application Virtualization Client\sftlist.exe" --> c:\program files\Microsoft Application Virtualization Client\sftlist.exe [?]
S3 Sftplay;Sftplay;c:\windows\system32\drivers\Sftplayxp.sys [4/24/2010 1:10 AM 211432]
S3 Sftredir;Sftredir;c:\windows\system32\drivers\Sftredirxp.sys [4/24/2010 1:10 AM 20584]
S3 Sftvol;Sftvol;c:\windows\system32\drivers\Sftvolxp.sys [4/24/2010 1:10 AM 18280]
S3 sftvsa;Application Virtualization Service Agent;"c:\program files\Microsoft Application Virtualization Client\sftvsa.exe" --> c:\program files\Microsoft Application Virtualization Client\sftvsa.exe [?]
.
--- Other Services/Drivers In Memory ---
.
*NewlyCreated* - PXHELP20
.
Contents of the 'Scheduled Tasks' folder
.
2011-08-23 c:\windows\Tasks\AppleSoftwareUpdate.job
- c:\program files\Apple Software Update\SoftwareUpdate.exe [2011-06-01 21:57]
.
.
------- Supplementary Scan -------
.
uStart Page = hxxp://ie.redirect.hp.com/svs/rdr?TYPE=3&tp=iehome&locale=en_us&c=91&bd=Pavilion&pf=cnnb
TCP: DhcpNameServer = 209.18.47.61 209.18.47.62
FF - ProfilePath - c:\documents and settings\Administrator1\Application Data\Mozilla\Firefox\Profiles\kdubnazq.default\
FF - prefs.js: browser.startup.homepage - hxxp://www.aol.com/
FF - Ext: Default: {972ce4c6-7e08-4474-a285-3208198ce6fd} - c:\program files\Mozilla Firefox\extensions\{972ce4c6-7e08-4474-a285-3208198ce6fd}
FF - Ext: Java Console: {CAFEEFAC-0016-0000-0015-ABCDEFFEDCBA} - c:\program files\Mozilla Firefox\extensions\{CAFEEFAC-0016-0000-0015-ABCDEFFEDCBA}
FF - Ext: Java Console: {CAFEEFAC-0016-0000-0017-ABCDEFFEDCBA} - c:\program files\Mozilla Firefox\extensions\{CAFEEFAC-0016-0000-0017-ABCDEFFEDCBA}
FF - Ext: Java Console: {CAFEEFAC-0016-0000-0019-ABCDEFFEDCBA} - c:\program files\Mozilla Firefox\extensions\{CAFEEFAC-0016-0000-0019-ABCDEFFEDCBA}
FF - Ext: Java Console: {CAFEEFAC-0016-0000-0020-ABCDEFFEDCBA} - c:\program files\Mozilla Firefox\extensions\{CAFEEFAC-0016-0000-0020-ABCDEFFEDCBA}
FF - Ext: Java Console: {CAFEEFAC-0016-0000-0021-ABCDEFFEDCBA} - c:\program files\Mozilla Firefox\extensions\{CAFEEFAC-0016-0000-0021-ABCDEFFEDCBA}
FF - Ext: Java Console: {CAFEEFAC-0016-0000-0027-ABCDEFFEDCBA} - c:\program files\Mozilla Firefox\extensions\{CAFEEFAC-0016-0000-0027-ABCDEFFEDCBA}
FF - Ext: Microsoft .NET Framework Assistant: {20a82645-c095-46ed-80e3-08825760534b} - c:\windows\Microsoft.NET\Framework\v3.5\Windows Presentation Foundation\DotNetAssistantExtension
FF - Ext: Java Quick Starter: jqs@sun.com - c:\program files\Java\jre6\lib\deploy\jqs\ff
FF - Ext: Microsoft .NET Framework Assistant: {20a82645-c095-46ed-80e3-08825760534b} - %profile%\extensions\{20a82645-c095-46ed-80e3-08825760534b}
FF - Ext: Personas: personas@christopher.beard - %profile%\extensions\personas@christopher.beard
FF - Ext: WOT: {a0d7ccb3-214d-498b-b4aa-0e8fda9a7bf7} - %profile%\extensions\{a0d7ccb3-214d-498b-b4aa-0e8fda9a7bf7}
FF - Ext: Download Statusbar: {D4DD63FA-01E4-46a7-B6B1-EDAB7D6AD389} - %profile%\extensions\{D4DD63FA-01E4-46a7-B6B1-EDAB7D6AD389}
FF - Ext: ColorfulTabs: {0545b830-f0aa-4d7e-8820-50a4629a56fe} - %profile%\extensions\{0545b830-f0aa-4d7e-8820-50a4629a56fe}
FF - Ext: DownloadHelper: {b9db16a4-6edc-47ec-a1f4-b86292ed211d} - %profile%\extensions\{b9db16a4-6edc-47ec-a1f4-b86292ed211d}
FF - Ext: Forecastfox: {0538E3E3-7E9B-4d49-8831-A227C80A7AD3} - %profile%\extensions\{0538E3E3-7E9B-4d49-8831-A227C80A7AD3}
FF - Ext: Are You Watching This?!: mark@areyouwatchingthis.com - %profile%\extensions\mark@areyouwatchingthis.com
FF - Ext: Noia 2.0 eXtreme OPT: noia2_option@kk.noia - %profile%\extensions\noia2_option@kk.noia
FF - Ext: Noia 2.0 (eXtreme): {9f08cb5a-76b1-4bcf-aff9-90e1a5d60b1e} - %profile%\extensions\{9f08cb5a-76b1-4bcf-aff9-90e1a5d60b1e}
FF - Ext: CrystalFox Qute: CrystalFox_Qute@BigRedBrent - %profile%\extensions\CrystalFox_Qute@BigRedBrent
FF - Ext: Camifox: camifox@altmusictv.com - %profile%\extensions\camifox@altmusictv.com
FF - Ext: CuteMenus - Crystal SVG: {63df8e21-711c-4074-a257-b065cadc28d8} - %profile%\extensions\{63df8e21-711c-4074-a257-b065cadc28d8}
FF - user.js: network.protocol-handler.warn-external.dnupdate - false);user_pref(network.protocol-handler.warn-external.dnupdate, false
.
- - - - ORPHANS REMOVED - - - -
.
HKLM-Run-HP Mobile Broadband - c:\swsetup\HPQWWAN\HPMobileBroadband.exe
HKLM-Run-HP BTW Detect Program - c:\program files\HP\HPBTWD.exe
SafeBoot-25568825.sys
SafeBoot-38781833.sys
SafeBoot-44155757.sys
SafeBoot-74985606.sys
.
.
.
**************************************************************************
.
catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2011-09-13 01:33
Windows 5.1.2600 Service Pack 3 NTFS
.
scanning hidden processes ...
.
scanning hidden autostart entries ...
.
scanning hidden files ...
.
.
c:\windows\$NtUninstallKB12075$:SummaryInformation 0 bytes hidden from API
.
.
**************************************************************************
.
[HKEY_LOCAL_MACHINE\System\ControlSet001\Services\Norton Internet Security]
"ImagePath"="\"c:\program files\Norton Internet Security\Engine\16.0.0.125\ccSvcHst.exe\" /s \"Norton Internet Security\" /m \"c:\program files\Norton Internet Security\Engine\16.0.0.125\diMaster.dll\" /prefetch:1"
.
[HKEY_LOCAL_MACHINE\System\ControlSet001\Services\NetBT]
"ImagePath"="system32\drivers\tsk4.tmp"
.
------------------------ Other Running Processes ------------------------
.
c:\windows\regedit.exe
.
**************************************************************************
.
Completion time: 2011-09-13 01:39:10 - machine was rebooted
ComboFix-quarantined-files.txt 2011-09-13 05:39
.
Pre-Run: 145,536,729,088 bytes free
Post-Run: 145,675,980,800 bytes free
.
- - End Of File - - 4A234943EB95E3289A912C802F58A638


Combofix Quarantine files
2011-09-13 05:37:43 . 2011-09-13 05:37:43 558 ----a-w- C:\Qoobox\Quarantine\Registry_backups\SafeBoot-74985606.sys.reg.dat
2011-09-13 05:37:43 . 2011-09-13 05:37:43 558 ----a-w- C:\Qoobox\Quarantine\Registry_backups\SafeBoot-44155757.sys.reg.dat
2011-09-13 05:37:43 . 2011-09-13 05:37:43 558 ----a-w- C:\Qoobox\Quarantine\Registry_backups\SafeBoot-38781833.sys.reg.dat
2011-09-13 05:37:43 . 2011-09-13 05:37:43 558 ----a-w- C:\Qoobox\Quarantine\Registry_backups\SafeBoot-25568825.sys.reg.dat
2011-09-13 05:37:23 . 2011-09-13 05:37:23 317 ----a-w- C:\Qoobox\Quarantine\Registry_backups\HKLM-Run-HP BTW Detect Program.reg.dat
2011-09-13 05:37:23 . 2011-09-13 05:37:23 317 ----a-w- C:\Qoobox\Quarantine\Registry_backups\HKLM-Run-HP Mobile Broadband.reg.dat
2011-09-13 04:53:17 . 2011-09-13 04:53:17 412 ----a-w- C:\Qoobox\Quarantine\Registry_backups\Service_4e1f9ecb.reg.dat
2011-09-13 04:53:09 . 2011-09-13 04:53:09 7,613 ----a-w- C:\Qoobox\Quarantine\Registry_backups\tcpip.reg
2011-09-13 04:43:05 . 2011-09-13 04:43:05 2,048 -c--a-w- C:\Qoobox\Quarantine\C\WINDOWS\$NtUninstallKB12075$\1310695115\{1B372133-BFFA-4dba-9CCF-5474BED6A9F6}.vir
2011-09-13 04:43:05 . 2011-09-13 04:43:05 44,544 -c--a-w- C:\Qoobox\Quarantine\C\WINDOWS\$NtUninstallKB12075$\1310695115\L\dnnkaqhd.vir
2011-09-13 04:39:43 . 2011-09-13 04:39:43 118 ----a-w- C:\Qoobox\Quarantine\C\WINDOWS\$NtUninstallKB12075$\_236943133_.zip
2011-09-13 04:37:32 . 2011-09-13 04:46:08 375 ----a-w- C:\Qoobox\Quarantine\catchme.log
2011-09-11 00:28:08 . 2010-12-17 13:33:10 439,632 ----a-w- C:\Qoobox\Quarantine\C\Program Files\Trend Micro\RUBotted\RUBotSrv.exe.vir
2011-09-10 22:48:20 . 2008-06-25 01:20:32 2,872 ----a-w- C:\Qoobox\Quarantine\C\Documents and Settings\Neil\Local Settings\Application Data\ApplicationHistory\ngen.exe.2c05686e.ini.vir
2011-09-10 22:48:20 . 2008-06-25 01:21:08 1,052 ----a-w- C:\Qoobox\Quarantine\C\Documents and Settings\Neil\Local Settings\Application Data\ApplicationHistory\SL133.tmp.36c00482.ini.vir
2011-09-10 22:48:20 . 2008-06-25 01:19:30 2,270 ----a-w- C:\Qoobox\Quarantine\C\Documents and Settings\Neil\Local Settings\Application Data\ApplicationHistory\SL86.tmp.aa6ec4ff.ini.vir
2010-10-25 21:09:15 . 2008-06-25 01:20:32 2,872 ----a-w- C:\Qoobox\Quarantine\C\Documents and Settings\Administrator1\Local Settings\Application Data\ApplicationHistory\ngen.exe.2c05686e.ini.vir
2010-10-25 21:09:15 . 2008-06-25 01:21:08 1,052 ----a-w- C:\Qoobox\Quarantine\C\Documents and Settings\Administrator1\Local Settings\Application Data\ApplicationHistory\SL133.tmp.36c00482.ini.vir
2010-10-25 21:09:15 . 2008-06-25 01:19:30 2,270 ----a-w- C:\Qoobox\Quarantine\C\Documents and Settings\Administrator1\Local Settings\Application Data\ApplicationHistory\SL86.tmp.aa6ec4ff.ini.vir
2010-04-24 05:10:54 . 2010-04-24 05:10:54 209,768 ----a-w- C:\Qoobox\Quarantine\C\Program Files\Microsoft Application Virtualization Client\sftvsa.exe.vir
2010-04-24 05:10:44 . 2010-04-24 05:10:44 483,688 ----a-w- C:\Qoobox\Quarantine\C\Program Files\Microsoft Application Virtualization Client\sftlist.exe.vir
2010-03-21 19:02:35 . 2009-06-30 08:44:38 221,266 ----a-w- C:\Qoobox\Quarantine\C\Program Files\IDT\WDM\STacSV.exe.vir
2009-10-08 02:30:07 . 2008-06-25 01:21:08 1,052 ----a-w- C:\Qoobox\Quarantine\C\Documents and Settings\Administrator\Local Settings\Application Data\ApplicationHistory\SL133.tmp.36c00482.ini.vir
2009-10-08 02:30:07 . 2008-06-25 01:20:32 2,872 ----a-w- C:\Qoobox\Quarantine\C\Documents and Settings\Administrator\Local Settings\Application Data\ApplicationHistory\ngen.exe.2c05686e.ini.vir
2009-10-08 02:30:07 . 2008-06-25 01:19:30 2,270 ----a-w- C:\Qoobox\Quarantine\C\Documents and Settings\Administrator\Local Settings\Application Data\ApplicationHistory\SL86.tmp.aa6ec4ff.ini.vir
2009-06-16 23:57:26 . 2009-03-30 23:02:08 319,488 ----a-w- C:\Qoobox\Quarantine\C\Program Files\HP\HPBTWD.exe.vir
2008-04-16 15:18:34 . 2008-04-16 15:18:34 165,192 ----a-w- C:\Qoobox\Quarantine\C\Program Files\Hewlett-Packard\Shared\hpqwmiex.exe.vir

BC AdBot (Login to Remove)

 


#2 NapalmDawn

NapalmDawn
  • Topic Starter

  • Members
  • 35 posts
  • OFFLINE
  •  
  • Local time:07:38 AM

Posted 20 September 2011 - 02:56 PM

I have reinstalled the corrupted HP related networking programs and copied over a fresh ipsec.sys. Basically the netbook eternally is stuck trying to get an IP.

#3 HelpBot

HelpBot

    Bleepin' Binary Bot


  • Bots
  • 12,732 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:08:38 AM

Posted 25 September 2011 - 02:55 PM

Hello and welcome to Bleeping Computer!

I am HelpBot: an automated program designed to help the Bleeping Computer Staff better assist you! This message contains very important information, so please read through all of it before doing anything.

We apologize for the delay in responding to your request for help. Here at Bleeping Computer we get overwhelmed at times, and we are trying our best to keep up. Please note that your topic was not intentionally overlooked. Our mission is to help everyone in need, but sometimes it takes just a little longer to get to every request for help. No one is ignored here.

To help Bleeping Computer better assist you please perform the following steps:

***************************************************

Posted Image In order to continue receiving help at BleepingComputer.com, YOU MUST tell me if you still need help or if your issue has already been resolved on your own or through another resource! To tell me this, please click on the following link and follow the instructions there.

CLICK THIS LINK >>> http://www.bleepingcomputer.com/logreply/419764 <<< CLICK THIS LINK



If you no longer need help, then all you needed to do was the previous instructions of telling me so. You can skip the rest of this post. If you do need help please continue with Step 2 below.

***************************************************

Posted Image If you still need help, I would like you to post a Reply to this topic (click the "Add Reply" button in the lower right hand of this page). In that reply, please include the following information:

  • If you have not done so already, include a clear description of the problems you're having, along with any steps you may have performed so far.
  • A new DDS and GMER log. For your convenience, you will find the instructions for generating these logs repeated at the bottom of this post.
    • Please do this even if you have previously posted logs for us.
    • If you were unable to produce the logs originally please try once more.
    • If you are unable to create a log please provide detailed information about your installed Windows Operating System including the Version, Edition and if it is a 32bit or a 64bit system.
    • If you are unsure about any of these characteristics just post what you can and we will guide you.
  • Please tell us if you have your original Windows CD/DVD available.
  • Upon completing the above steps and posting a reply, another staff member will review your topic and do their best to resolve your issues.

Thank you for your patience, and again sorry for the delay.

***************************************************

We need to see some information about what is happening in your machine. Please perform the following scan again:

  • Download DDS by sUBs from one of the following links if you no longer have it available. Save it to your desktop.
  • Double click on the DDS icon, allow it to run.
  • A small box will open, with an explanation about the tool. No input is needed, the scan is running.
  • Notepad will open with the results.
  • Follow the instructions that pop up for posting the results.
  • Close the program window, and delete the program from your desktop.
Please note: You may have to disable any script protection running if the scan fails to run. After downloading the tool, disconnect from the internet and disable all antivirus protection. Run the scan, enable your A/V and reconnect to the internet.

Information on A/V control HERE


We also need a new log from the GMER anti-rootkit Scanner.

Please note that if you are running a 64-bit version of Windows you will not be able to run GMER and you may skip this step.

Please first disable any CD emulation programs using the steps found in this topic:

Why we request you disable CD Emulation when receiving Malware Removal Advice


Then create another GMER log and post it as an attachment to the reply where you post your new DDS log. Instructions on how to properly create a GMER log can be found here:

How to create a GMER log


As I am just a silly little program running on the BleepingComputer.com servers, please do not send me private messages as I do not know how to read and reply to them! Thanks!

#4 NapalmDawn

NapalmDawn
  • Topic Starter

  • Members
  • 35 posts
  • OFFLINE
  •  
  • Local time:07:38 AM

Posted 27 September 2011 - 03:56 PM

CLicked the link that help was still needed. Here is the DDS log
.
DDS (Ver_2011-08-26.01) - NTFSx86
Internet Explorer: 8.0.6001.18702 BrowserJavaVersion: 1.6.0_27
Run by Administrator1 at 2:08:21 on 2011-09-27
Microsoft Windows XP Home Edition 5.1.2600.3.1252.1.1033.18.2039.1590 [GMT -4:00]
.
.
============== Running Processes ===============
.
C:\WINDOWS\system32\svchost.exe -k DcomLaunch
svchost.exe
C:\WINDOWS\System32\svchost.exe -k netsvcs
svchost.exe
C:\WINDOWS\system32\spoolsv.exe
c:\program files\idt\wdm\STacSV.exe
svchost.exe
C:\WINDOWS\system32\svchost.exe -k imgsvc
C:\WINDOWS\Explorer.EXE
C:\Program Files\Synaptics\SynTP\SynTPEnh.exe
C:\WINDOWS\system32\igfxpers.exe
C:\WINDOWS\system32\igfxtray.exe
svchost.exe
C:\WINDOWS\system32\hkcmd.exe
C:\Program Files\Common Files\AOL\1288337709\ee\AOLSoftware.exe
C:\Program Files\Hewlett-Packard\HP Wireless Assistant\HPWAMain.exe
C:\WINDOWS\system32\ctfmon.exe
C:\WINDOWS\system32\igfxsrvc.exe
C:\Program Files\Hewlett-Packard\Shared\hpqwmiex.exe
C:\Program Files\Hewlett-Packard\Shared\hpqToaster.exe
.
============== Pseudo HJT Report ===============
.
uStart Page = hxxp://ie.redirect.hp.com/svs/rdr?TYPE=3&tp=iehome&locale=en_us&c=91&bd=Pavilion&pf=cnnb
BHO: Adobe PDF Link Helper: {18df081c-e8ad-4283-a596-fa578c2ebdc3} - c:\program files\common files\adobe\acrobat\activex\AcroIEHelperShim.dll
BHO: Java™ Plug-In 2 SSV Helper: {dbc80044-a445-435b-bc74-9c25c1c588a9} - c:\program files\java\jre6\bin\jp2ssv.dll
BHO: JQSIEStartDetectorImpl Class: {e7e6f031-17ce-4c07-bc86-eabfe594f69c} - c:\program files\java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll
TB: {1017A80C-6F09-4548-A84D-EDD6AC9525F0} - No File
uRun: [ctfmon.exe] c:\windows\system32\ctfmon.exe
mRun: [SysTrayApp] %ProgramFiles%\IDT\WDM\sttray.exe
mRun: [SynTPEnh] c:\program files\synaptics\syntp\SynTPEnh.exe
mRun: [Persistence] c:\windows\system32\igfxpers.exe
mRun: [IgfxTray] c:\windows\system32\igfxtray.exe
mRun: [HotKeysCmds] c:\windows\system32\hkcmd.exe
mRun: [HostManager] c:\program files\common files\aol\1288337709\ee\AOLSoftware.exe
mRun: [AESTFltr] %SystemRoot%\system32\AESTFltr.exe /NoDlg
mRun: [WirelessAssistant] c:\program files\hewlett-packard\hp wireless assistant\HPWAMain.exe
IE: {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe
IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe
IE: {2670000A-7350-4f3c-8081-5663EE0C6C49} - {48E73304-E1D6-4330-914C-F5F514E3486C} - c:\progra~1\micros~2\office12\ONBttnIE.dll
IE: {92780B25-18CC-41C8-B9BE-3C9C571A8263} - {FF059E31-CC5A-4E2E-BF3B-96E929D65503} - c:\progra~1\micros~2\office12\REFIEBAR.DLL
DPF: {7530BFB8-7293-4D34-9923-61A11451AFC5} - hxxp://download.eset.com/special/eos/OnlineScanner.cab
DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_27-windows-i586.cab
DPF: {CAFEEFAC-0016-0000-0027-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_27-windows-i586.cab
DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_27-windows-i586.cab
TCP: DhcpNameServer = 209.18.47.61 209.18.47.62
Notify: igfxcui - igfxdev.dll
SSODL: WPDShServiceObj - {AAA288BA-9A4C-45B0-95D7-94D524869DB5} - c:\windows\system32\WPDShServiceObj.dll
.
================= FIREFOX ===================
.
FF - ProfilePath - c:\documents and settings\administrator1\application data\mozilla\firefox\profiles\kdubnazq.default\
FF - prefs.js: browser.startup.homepage - hxxp://www.aol.com/
FF - Ext: Default: {972ce4c6-7e08-4474-a285-3208198ce6fd} - c:\program files\mozilla firefox\extensions\{972ce4c6-7e08-4474-a285-3208198ce6fd}
FF - Ext: Java Console: {CAFEEFAC-0016-0000-0015-ABCDEFFEDCBA} - c:\program files\mozilla firefox\extensions\{CAFEEFAC-0016-0000-0015-ABCDEFFEDCBA}
FF - Ext: Java Console: {CAFEEFAC-0016-0000-0017-ABCDEFFEDCBA} - c:\program files\mozilla firefox\extensions\{CAFEEFAC-0016-0000-0017-ABCDEFFEDCBA}
FF - Ext: Java Console: {CAFEEFAC-0016-0000-0019-ABCDEFFEDCBA} - c:\program files\mozilla firefox\extensions\{CAFEEFAC-0016-0000-0019-ABCDEFFEDCBA}
FF - Ext: Java Console: {CAFEEFAC-0016-0000-0020-ABCDEFFEDCBA} - c:\program files\mozilla firefox\extensions\{CAFEEFAC-0016-0000-0020-ABCDEFFEDCBA}
FF - Ext: Java Console: {CAFEEFAC-0016-0000-0021-ABCDEFFEDCBA} - c:\program files\mozilla firefox\extensions\{CAFEEFAC-0016-0000-0021-ABCDEFFEDCBA}
FF - Ext: Java Console: {CAFEEFAC-0016-0000-0027-ABCDEFFEDCBA} - c:\program files\mozilla firefox\extensions\{CAFEEFAC-0016-0000-0027-ABCDEFFEDCBA}
FF - Ext: Microsoft .NET Framework Assistant: {20a82645-c095-46ed-80e3-08825760534b} - c:\windows\microsoft.net\framework\v3.5\windows presentation foundation\DotNetAssistantExtension
FF - Ext: Java Quick Starter: jqs@sun.com - c:\program files\java\jre6\lib\deploy\jqs\ff
FF - Ext: Microsoft .NET Framework Assistant: {20a82645-c095-46ed-80e3-08825760534b} - %profile%\extensions\{20a82645-c095-46ed-80e3-08825760534b}
FF - Ext: Personas: personas@christopher.beard - %profile%\extensions\personas@christopher.beard
FF - Ext: WOT: {a0d7ccb3-214d-498b-b4aa-0e8fda9a7bf7} - %profile%\extensions\{a0d7ccb3-214d-498b-b4aa-0e8fda9a7bf7}
FF - Ext: Download Statusbar: {D4DD63FA-01E4-46a7-B6B1-EDAB7D6AD389} - %profile%\extensions\{D4DD63FA-01E4-46a7-B6B1-EDAB7D6AD389}
FF - Ext: ColorfulTabs: {0545b830-f0aa-4d7e-8820-50a4629a56fe} - %profile%\extensions\{0545b830-f0aa-4d7e-8820-50a4629a56fe}
FF - Ext: DownloadHelper: {b9db16a4-6edc-47ec-a1f4-b86292ed211d} - %profile%\extensions\{b9db16a4-6edc-47ec-a1f4-b86292ed211d}
FF - Ext: Forecastfox: {0538E3E3-7E9B-4d49-8831-A227C80A7AD3} - %profile%\extensions\{0538E3E3-7E9B-4d49-8831-A227C80A7AD3}
FF - Ext: Are You Watching This?!: mark@areyouwatchingthis.com - %profile%\extensions\mark@areyouwatchingthis.com
FF - Ext: Noia 2.0 eXtreme OPT: noia2_option@kk.noia - %profile%\extensions\noia2_option@kk.noia
FF - Ext: Noia 2.0 (eXtreme): {9f08cb5a-76b1-4bcf-aff9-90e1a5d60b1e} - %profile%\extensions\{9f08cb5a-76b1-4bcf-aff9-90e1a5d60b1e}
FF - Ext: CrystalFox Qute: CrystalFox_Qute@BigRedBrent - %profile%\extensions\CrystalFox_Qute@BigRedBrent
FF - Ext: Camifox: camifox@altmusictv.com - %profile%\extensions\camifox@altmusictv.com
FF - Ext: CuteMenus - Crystal SVG: {63df8e21-711c-4074-a257-b065cadc28d8} - %profile%\extensions\{63df8e21-711c-4074-a257-b065cadc28d8}
.
---- FIREFOX POLICIES ----
FF - user.js: network.protocol-handler.warn-external.dnupdate - false);user_pref(network.protocol-handler.warn-external.dnupdate, false
.
============= SERVICES / DRIVERS ===============
.
R3 AESTAud;AE Audio Service;c:\windows\system32\drivers\AESTAud.sys [2010-3-21 113664]
R3 L1c;NDIS Miniport Driver for Atheros AR8131/AR8132 PCI-E Ethernet Controller;c:\windows\system32\drivers\l1c51x86.sys [2009-3-31 39424]
S0 25568825;25568825;c:\windows\system32\drivers\44869608.sys --> c:\windows\system32\drivers\44869608.sys [?]
S3 cvhsvc;Client Virtualization Handler;c:\program files\common files\microsoft shared\virtualization handler\CVHSVC.EXE [2010-2-28 821664]
S3 McComponentHostService;McAfee Security Scan Component Host Service;"c:\program files\mcafee security scan\2.0.181\mcchsvc.exe" --> c:\program files\mcafee security scan\2.0.181\McCHSvc.exe [?]
S3 NAVENG;NAVENG;\??\c:\documents and settings\all users\application data\norton\{0c55c096-0f1d-4f28-aaa2-85ef591126e7}\norton\definitions\virusdefs\20080829.024\naveng.sys --> c:\documents and settings\all users\application data\norton\{0c55c096-0f1d-4f28-aaa2-85ef591126e7}\norton\definitions\virusdefs\20080829.024\NAVENG.SYS [?]
S3 NAVEX15;NAVEX15;\??\c:\documents and settings\all users\application data\norton\{0c55c096-0f1d-4f28-aaa2-85ef591126e7}\norton\definitions\virusdefs\20080829.024\navex15.sys --> c:\documents and settings\all users\application data\norton\{0c55c096-0f1d-4f28-aaa2-85ef591126e7}\norton\definitions\virusdefs\20080829.024\NAVEX15.SYS [?]
S3 osppsvc;Office Software Protection Platform;c:\program files\common files\microsoft shared\officesoftwareprotectionplatform\OSPPSVC.EXE [2010-1-9 4640000]
S3 RSUSBSTOR;RTS5121.Sys Realtek USB Card Reader;c:\windows\system32\drivers\RTS5121.sys [2009-6-16 160256]
S3 Rts516xIR;Realtek IR Driver;c:\windows\system32\drivers\rts516xir.sys --> c:\windows\system32\drivers\Rts516xIR.sys [?]
S3 Sftfs;Sftfs;c:\windows\system32\drivers\Sftfsxp.sys [2010-4-24 554344]
S3 Sftplay;Sftplay;c:\windows\system32\drivers\Sftplayxp.sys [2010-4-24 211432]
S3 Sftredir;Sftredir;c:\windows\system32\drivers\Sftredirxp.sys [2010-4-24 20584]
S3 Sftvol;Sftvol;c:\windows\system32\drivers\Sftvolxp.sys [2010-4-24 18280]
S4 Norton Internet Security;Norton Internet Security;"c:\program files\norton internet security\engine\16.0.0.125\ccsvchst.exe" /s "norton internet security" /m "c:\program files\norton internet security\engine\16.0.0.125\dimaster.dll" /prefetch:1 --> c:\program files\norton internet security\engine\16.0.0.125\ccSvcHst.exe [?]
S4 sftlist;Application Virtualization Client;"c:\program files\microsoft application virtualization client\sftlist.exe" --> c:\program files\microsoft application virtualization client\sftlist.exe [?]
S4 sftvsa;Application Virtualization Service Agent;"c:\program files\microsoft application virtualization client\sftvsa.exe" --> c:\program files\microsoft application virtualization client\sftvsa.exe [?]
.
=============== Created Last 30 ================
.
2011-09-16 09:30:09 -------- d-----w- c:\documents and settings\administrator1\application data\hpqLog
2011-09-16 09:06:06 -------- d-----w- C:\SWSETUP
2011-09-13 06:11:37 388096 ----a-r- c:\documents and settings\administrator1\application data\microsoft\installer\{45a66726-69bc-466b-a7a4-12fcba4883d7}\HiJackThis.exe
2011-09-13 06:11:36 -------- d-----w- c:\program files\Hijack2
2011-09-13 05:41:38 41272 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2011-09-13 05:41:32 22712 ----a-w- c:\windows\system32\drivers\mbam.sys
2011-09-13 05:41:32 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
2011-09-13 04:37:38 98816 ----a-w- c:\windows\sed.exe
2011-09-13 04:37:38 518144 ----a-w- c:\windows\SWREG.exe
2011-09-13 04:37:38 256000 ----a-w- c:\windows\PEV.exe
2011-09-13 04:37:38 208896 ----a-w- c:\windows\MBR.exe
2011-09-13 04:37:31 -------- d-----w- C:\ComboFix
2011-09-12 05:49:39 50112 --sha-w- c:\windows\system32\c_10430.nl_
2011-09-12 03:24:35 -------- d-----w- c:\program files\ESET
2011-09-12 03:04:29 73728 ----a-w- c:\windows\system32\javacpl.cpl
2011-09-12 02:17:53 -------- d-----w- C:\temp2
2011-09-12 00:24:06 -------- d--h--w- c:\documents and settings\all users\application data\Common Files
2011-09-12 00:18:29 -------- d-----w- c:\documents and settings\all users\application data\MFAData
2011-09-12 00:13:29 -------- d-----w- c:\documents and settings\administrator1\DoctorWeb
2011-09-11 02:05:00 -------- d-----w- c:\documents and settings\administrator1\application data\SUPERAntiSpyware.com
2011-09-11 02:04:36 -------- d-----w- c:\documents and settings\all users\application data\SUPERAntiSpyware.com
2011-09-11 00:28:07 -------- d-----w- c:\program files\Trend Micro
2011-09-10 23:10:15 -------- d-----w- C:\temp
2011-09-10 23:05:18 -------- d-----w- c:\program files\Spybot - Search & Destroy
2011-09-10 21:01:51 -------- d-----w- c:\program files\MBAM
2011-09-10 20:53:19 -------- d--h--w- c:\windows\PIF
2011-09-10 20:03:19 -------- d-----w- c:\windows\pss
2011-09-03 10:17:37 599040 ------w- c:\windows\system32\dllcache\crypt32.dll
.
==================== Find3M ====================
.
2011-09-16 09:08:25 91448 ----a-w- c:\windows\system32\bcmwlcoi.dll
2011-09-16 09:08:25 2697600 ----a-w- c:\windows\system32\drivers\BCMWL5.SYS
2011-09-13 04:32:16 138496 ----a-w- c:\windows\system32\drivers\afd.sys
2011-09-12 03:04:17 472808 ----a-w- c:\windows\system32\deployJava1.dll
2011-09-11 02:24:50 404640 ----a-w- c:\windows\system32\FlashPlayerCPLApp.cpl
2011-09-03 10:17:37 599040 ----a-w- c:\windows\system32\crypt32.dll
2011-07-15 13:29:31 456320 ----a-w- c:\windows\system32\drivers\mrxsmb.sys
2011-07-08 14:02:00 10496 ----a-w- c:\windows\system32\drivers\ndistapi.sys
.
============= FINISH: 2:09:02.43 ===============


and the gmer
GMER 1.0.15.15641 - http://www.gmer.net
Rootkit scan 2011-09-27 03:26:34
Windows 5.1.2600 Service Pack 3 Harddisk0\DR0 -> \Device\Ide\IdeDeviceP0T0L0-3 WDC_WD1600BEVT-60ZCT1 rev.13.01A13
Running: gmer.exe; Driver: C:\DOCUME~1\ADMINI~2\LOCALS~1\Temp\uxldqpog.sys


---- Kernel code sections - GMER 1.0.15 ----

? C:\DOCUME~1\ADMINI~2\LOCALS~1\Temp\mbr.sys The system cannot find the file specified. !

---- User IAT/EAT - GMER 1.0.15 ----

IAT C:\Program Files\Common Files\AOL\1288337709\ee\AOLSoftware.exe[120] @ C:\WINDOWS\system32\ADVAPI32.dll [KERNEL32.dll!LoadLibraryExW] [6BFA96C4] C:\Program Files\Common Files\AOL\AOLDiag\tbdiag.dll (AOL Diagnostics/AOL Inc.)
IAT C:\Program Files\Common Files\AOL\1288337709\ee\AOLSoftware.exe[120] @ C:\WINDOWS\system32\ADVAPI32.dll [KERNEL32.dll!SetUnhandledExceptionFilter] [6BFA974B] C:\Program Files\Common Files\AOL\AOLDiag\tbdiag.dll (AOL Diagnostics/AOL Inc.)
IAT C:\Program Files\Common Files\AOL\1288337709\ee\AOLSoftware.exe[120] @ C:\WINDOWS\system32\ADVAPI32.dll [KERNEL32.dll!LoadLibraryW] [6BFA95BC] C:\Program Files\Common Files\AOL\AOLDiag\tbdiag.dll (AOL Diagnostics/AOL Inc.)
IAT C:\Program Files\Common Files\AOL\1288337709\ee\AOLSoftware.exe[120] @ C:\WINDOWS\system32\ADVAPI32.dll [KERNEL32.dll!LoadLibraryA] [6BFA953B] C:\Program Files\Common Files\AOL\AOLDiag\tbdiag.dll (AOL Diagnostics/AOL Inc.)
IAT C:\Program Files\Common Files\AOL\1288337709\ee\AOLSoftware.exe[120] @ C:\WINDOWS\system32\RPCRT4.dll [KERNEL32.dll!LoadLibraryA] [6BFA953B] C:\Program Files\Common Files\AOL\AOLDiag\tbdiag.dll (AOL Diagnostics/AOL Inc.)
IAT C:\Program Files\Common Files\AOL\1288337709\ee\AOLSoftware.exe[120] @ C:\WINDOWS\system32\RPCRT4.dll [KERNEL32.dll!LoadLibraryW] [6BFA95BC] C:\Program Files\Common Files\AOL\AOLDiag\tbdiag.dll (AOL Diagnostics/AOL Inc.)
IAT C:\Program Files\Common Files\AOL\1288337709\ee\AOLSoftware.exe[120] @ C:\WINDOWS\system32\RPCRT4.dll [KERNEL32.dll!SetUnhandledExceptionFilter] [6BFA974B] C:\Program Files\Common Files\AOL\AOLDiag\tbdiag.dll (AOL Diagnostics/AOL Inc.)
IAT C:\Program Files\Common Files\AOL\1288337709\ee\AOLSoftware.exe[120] @ C:\WINDOWS\system32\Secur32.dll [KERNEL32.dll!SetUnhandledExceptionFilter] [6BFA974B] C:\Program Files\Common Files\AOL\AOLDiag\tbdiag.dll (AOL Diagnostics/AOL Inc.)
IAT C:\Program Files\Common Files\AOL\1288337709\ee\AOLSoftware.exe[120] @ C:\WINDOWS\system32\Secur32.dll [KERNEL32.dll!LoadLibraryA] [6BFA953B] C:\Program Files\Common Files\AOL\AOLDiag\tbdiag.dll (AOL Diagnostics/AOL Inc.)
IAT C:\Program Files\Common Files\AOL\1288337709\ee\AOLSoftware.exe[120] @ C:\WINDOWS\system32\Secur32.dll [KERNEL32.dll!LoadLibraryW] [6BFA95BC] C:\Program Files\Common Files\AOL\AOLDiag\tbdiag.dll (AOL Diagnostics/AOL Inc.)
IAT C:\Program Files\Common Files\AOL\1288337709\ee\AOLSoftware.exe[120] @ C:\WINDOWS\system32\USER32.dll [KERNEL32.dll!LoadLibraryExW] [6BFA96C4] C:\Program Files\Common Files\AOL\AOLDiag\tbdiag.dll (AOL Diagnostics/AOL Inc.)
IAT C:\Program Files\Common Files\AOL\1288337709\ee\AOLSoftware.exe[120] @ C:\WINDOWS\system32\USER32.dll [KERNEL32.dll!LoadLibraryA] [6BFA953B] C:\Program Files\Common Files\AOL\AOLDiag\tbdiag.dll (AOL Diagnostics/AOL Inc.)
IAT C:\Program Files\Common Files\AOL\1288337709\ee\AOLSoftware.exe[120] @ C:\WINDOWS\system32\USER32.dll [KERNEL32.dll!SetUnhandledExceptionFilter] [6BFA974B] C:\Program Files\Common Files\AOL\AOLDiag\tbdiag.dll (AOL Diagnostics/AOL Inc.)
IAT C:\Program Files\Common Files\AOL\1288337709\ee\AOLSoftware.exe[120] @ C:\WINDOWS\system32\USER32.dll [KERNEL32.dll!LoadLibraryW] [6BFA95BC] C:\Program Files\Common Files\AOL\AOLDiag\tbdiag.dll (AOL Diagnostics/AOL Inc.)
IAT C:\Program Files\Common Files\AOL\1288337709\ee\AOLSoftware.exe[120] @ C:\WINDOWS\system32\GDI32.dll [KERNEL32.dll!SetUnhandledExceptionFilter] [6BFA974B] C:\Program Files\Common Files\AOL\AOLDiag\tbdiag.dll (AOL Diagnostics/AOL Inc.)
IAT C:\Program Files\Common Files\AOL\1288337709\ee\AOLSoftware.exe[120] @ C:\WINDOWS\system32\GDI32.dll [KERNEL32.dll!LoadLibraryExW] [6BFA96C4] C:\Program Files\Common Files\AOL\AOLDiag\tbdiag.dll (AOL Diagnostics/AOL Inc.)
IAT C:\Program Files\Common Files\AOL\1288337709\ee\AOLSoftware.exe[120] @ C:\WINDOWS\system32\GDI32.dll [KERNEL32.dll!LoadLibraryA] [6BFA953B] C:\Program Files\Common Files\AOL\AOLDiag\tbdiag.dll (AOL Diagnostics/AOL Inc.)
IAT C:\Program Files\Common Files\AOL\1288337709\ee\AOLSoftware.exe[120] @ C:\WINDOWS\system32\GDI32.dll [KERNEL32.dll!LoadLibraryW] [6BFA95BC] C:\Program Files\Common Files\AOL\AOLDiag\tbdiag.dll (AOL Diagnostics/AOL Inc.)
IAT C:\Program Files\Common Files\AOL\1288337709\ee\AOLSoftware.exe[120] @ C:\WINDOWS\system32\SHELL32.dll [KERNEL32.dll!SetUnhandledExceptionFilter] [6BFA974B] C:\Program Files\Common Files\AOL\AOLDiag\tbdiag.dll (AOL Diagnostics/AOL Inc.)
IAT C:\Program Files\Common Files\AOL\1288337709\ee\AOLSoftware.exe[120] @ C:\WINDOWS\system32\SHELL32.dll [KERNEL32.dll!LoadLibraryA] [6BFA953B] C:\Program Files\Common Files\AOL\AOLDiag\tbdiag.dll (AOL Diagnostics/AOL Inc.)
IAT C:\Program Files\Common Files\AOL\1288337709\ee\AOLSoftware.exe[120] @ C:\WINDOWS\system32\SHELL32.dll [KERNEL32.dll!LoadLibraryW] [6BFA95BC] C:\Program Files\Common Files\AOL\AOLDiag\tbdiag.dll (AOL Diagnostics/AOL Inc.)
IAT C:\Program Files\Common Files\AOL\1288337709\ee\AOLSoftware.exe[120] @ C:\WINDOWS\system32\SHELL32.dll [KERNEL32.dll!LoadLibraryExW] [6BFA96C4] C:\Program Files\Common Files\AOL\AOLDiag\tbdiag.dll (AOL Diagnostics/AOL Inc.)
IAT C:\Program Files\Common Files\AOL\1288337709\ee\AOLSoftware.exe[120] @ C:\WINDOWS\system32\SHELL32.dll [KERNEL32.dll!LoadLibraryExA] [6BFA963D] C:\Program Files\Common Files\AOL\AOLDiag\tbdiag.dll (AOL Diagnostics/AOL Inc.)
IAT C:\Program Files\Common Files\AOL\1288337709\ee\AOLSoftware.exe[120] @ C:\WINDOWS\system32\msvcrt.dll [KERNEL32.dll!SetUnhandledExceptionFilter] [6BFA974B] C:\Program Files\Common Files\AOL\AOLDiag\tbdiag.dll (AOL Diagnostics/AOL Inc.)
IAT C:\Program Files\Common Files\AOL\1288337709\ee\AOLSoftware.exe[120] @ C:\WINDOWS\system32\msvcrt.dll [KERNEL32.dll!LoadLibraryA] [6BFA953B] C:\Program Files\Common Files\AOL\AOLDiag\tbdiag.dll (AOL Diagnostics/AOL Inc.)
IAT C:\Program Files\Common Files\AOL\1288337709\ee\AOLSoftware.exe[120] @ C:\WINDOWS\system32\SHLWAPI.dll [KERNEL32.dll!SetUnhandledExceptionFilter] [6BFA974B] C:\Program Files\Common Files\AOL\AOLDiag\tbdiag.dll (AOL Diagnostics/AOL Inc.)
IAT C:\Program Files\Common Files\AOL\1288337709\ee\AOLSoftware.exe[120] @ C:\WINDOWS\system32\SHLWAPI.dll [KERNEL32.dll!LoadLibraryExA] [6BFA963D] C:\Program Files\Common Files\AOL\AOLDiag\tbdiag.dll (AOL Diagnostics/AOL Inc.)
IAT C:\Program Files\Common Files\AOL\1288337709\ee\AOLSoftware.exe[120] @ C:\WINDOWS\system32\SHLWAPI.dll [KERNEL32.dll!LoadLibraryExW] [6BFA96C4] C:\Program Files\Common Files\AOL\AOLDiag\tbdiag.dll (AOL Diagnostics/AOL Inc.)
IAT C:\Program Files\Common Files\AOL\1288337709\ee\AOLSoftware.exe[120] @ C:\WINDOWS\system32\SHLWAPI.dll [KERNEL32.dll!LoadLibraryW] [6BFA95BC] C:\Program Files\Common Files\AOL\AOLDiag\tbdiag.dll (AOL Diagnostics/AOL Inc.)
IAT C:\Program Files\Common Files\AOL\1288337709\ee\AOLSoftware.exe[120] @ C:\WINDOWS\system32\SHLWAPI.dll [KERNEL32.dll!LoadLibraryA] [6BFA953B] C:\Program Files\Common Files\AOL\AOLDiag\tbdiag.dll (AOL Diagnostics/AOL Inc.)
IAT C:\Program Files\Common Files\AOL\1288337709\ee\AOLSoftware.exe[120] @ C:\WINDOWS\system32\ole32.dll [KERNEL32.dll!LoadLibraryA] [6BFA953B] C:\Program Files\Common Files\AOL\AOLDiag\tbdiag.dll (AOL Diagnostics/AOL Inc.)
IAT C:\Program Files\Common Files\AOL\1288337709\ee\AOLSoftware.exe[120] @ C:\WINDOWS\system32\ole32.dll [KERNEL32.dll!LoadLibraryW] [6BFA95BC] C:\Program Files\Common Files\AOL\AOLDiag\tbdiag.dll (AOL Diagnostics/AOL Inc.)
IAT C:\Program Files\Common Files\AOL\1288337709\ee\AOLSoftware.exe[120] @ C:\WINDOWS\system32\ole32.dll [KERNEL32.dll!LoadLibraryExW] [6BFA96C4] C:\Program Files\Common Files\AOL\AOLDiag\tbdiag.dll (AOL Diagnostics/AOL Inc.)
IAT C:\Program Files\Common Files\AOL\1288337709\ee\AOLSoftware.exe[120] @ C:\WINDOWS\system32\ole32.dll [KERNEL32.dll!LoadLibraryExA] [6BFA963D] C:\Program Files\Common Files\AOL\AOLDiag\tbdiag.dll (AOL Diagnostics/AOL Inc.)
IAT C:\Program Files\Common Files\AOL\1288337709\ee\AOLSoftware.exe[120] @ C:\WINDOWS\system32\ole32.dll [KERNEL32.dll!SetUnhandledExceptionFilter] [6BFA974B] C:\Program Files\Common Files\AOL\AOLDiag\tbdiag.dll (AOL Diagnostics/AOL Inc.)

---- Devices - GMER 1.0.15 ----

AttachedDevice \Driver\Kbdclass \Device\KeyboardClass0 wdf01000.sys (WDF Dynamic/Microsoft Corporation)
AttachedDevice \Driver\Kbdclass \Device\KeyboardClass1 wdf01000.sys (WDF Dynamic/Microsoft Corporation)
AttachedDevice \FileSystem\Fastfat \Fat fltMgr.sys (Microsoft Filesystem Filter Manager/Microsoft Corporation)

---- Files - GMER 1.0.15 ----

File C:\WINDOWS\$NtUninstallKB12075$\1310695115 0 bytes
File C:\WINDOWS\$NtUninstallKB12075$\1310695115\L 0 bytes
File C:\WINDOWS\$NtUninstallKB12075$\1310695115\U 0 bytes
File C:\WINDOWS\$NtUninstallKB12075$\3082443094 0 bytes

---- EOF - GMER 1.0.15 ----

#5 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:08:38 AM

Posted 27 September 2011 - 11:18 PM

Hello

I would like you to download an updated version of combofix.

update combofix

Delete the version of combofix you have now on your desktop and download a new one from here

Link 1
Link 2
Link 3
**Note: It is important that it is saved directly to your desktop**

1. Close any open browsers.
2. Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.

Double click on combofix.exe & follow the prompts.
When finished, it will produce a report for you.

Note:Do not mouseclick combofix's window while it's running. That may cause it to stall

Note 2: If you recieve an error "Illegal operation attempted on a registery key that has been marked for deletion." Please restart the computer
[/list]
"information and logs"

  • In your next post I need the following
  • Log from Combofix
  • let me know of any problems you may have had
  • How is the computer doing now?

Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#6 NapalmDawn

NapalmDawn
  • Topic Starter

  • Members
  • 35 posts
  • OFFLINE
  •  
  • Local time:07:38 AM

Posted 28 September 2011 - 01:21 AM

Netbook still stuck on acquiring network address from the router. Here's the most recent combofix log. AT the start, it still reported a rootkit was present
ComboFix 11-09-26.02 - Administrator1 09/28/2011 1:43.2.2 - x86
Microsoft Windows XP Home Edition 5.1.2600.3.1252.1.1033.18.2039.1723 [GMT -4:00]
Running from: c:\documents and settings\Administrator1\Desktop\ComboFix.exe
.
WARNING -THIS MACHINE DOES NOT HAVE THE RECOVERY CONSOLE INSTALLED !!
.
.
((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.
.
c:\windows\$NtUninstallKB12075$
c:\windows\$NtUninstallKB12075$\3082443094
c:\windows\system32\oem39.inf
.
.
((((((((((((((((((((((((((((((((((((((( Drivers/Services )))))))))))))))))))))))))))))))))))))))))))))))))
.
.
-------\Legacy_NPF
.
.
((((((((((((((((((((((((( Files Created from 2011-08-28 to 2011-09-28 )))))))))))))))))))))))))))))))
.
.
2011-09-16 09:30 . 2011-09-16 09:30 -------- d-----w- c:\documents and settings\LocalService\Application Data\hpqLog
2011-09-16 09:30 . 2011-09-16 09:30 -------- d-----w- c:\documents and settings\Administrator1\Application Data\hpqLog
2011-09-16 09:06 . 2011-09-16 09:08 -------- d-----w- C:\SWSETUP
2011-09-13 06:11 . 2011-09-13 06:11 388096 ----a-r- c:\documents and settings\Administrator1\Application Data\Microsoft\Installer\{45A66726-69BC-466B-A7A4-12FCBA4883D7}\HiJackThis.exe
2011-09-13 06:11 . 2011-09-13 06:11 -------- d-----w- c:\program files\Hijack2
2011-09-13 05:41 . 2011-07-06 23:52 41272 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2011-09-13 05:41 . 2011-09-13 05:41 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
2011-09-13 05:41 . 2011-07-06 23:52 22712 ----a-w- c:\windows\system32\drivers\mbam.sys
2011-09-12 05:49 . 2011-09-13 04:43 50112 --sha-w- c:\windows\system32\c_10430.nl_
2011-09-12 03:24 . 2011-09-12 03:24 -------- d-----w- c:\program files\ESET
2011-09-12 03:04 . 2011-09-12 03:04 -------- d-----w- c:\program files\Common Files\Java
2011-09-12 03:04 . 2011-09-12 03:04 73728 ----a-w- c:\windows\system32\javacpl.cpl
2011-09-12 00:24 . 2011-09-12 00:24 -------- d--h--w- c:\documents and settings\All Users\Application Data\Common Files
2011-09-12 00:18 . 2011-09-12 00:27 -------- d-----w- c:\documents and settings\All Users\Application Data\MFAData
2011-09-12 00:13 . 2011-09-12 00:13 -------- d-----w- c:\documents and settings\Administrator1\DoctorWeb
2011-09-11 02:05 . 2011-09-11 02:05 -------- d-----w- c:\documents and settings\Administrator1\Application Data\SUPERAntiSpyware.com
2011-09-11 02:04 . 2011-09-11 02:04 -------- d-----w- c:\documents and settings\All Users\Application Data\SUPERAntiSpyware.com
2011-09-11 00:53 . 2011-09-11 00:53 -------- d-----w- c:\documents and settings\LocalService\Application Data\McAfee
2011-09-11 00:51 . 2011-09-11 00:51 -------- d-----w- c:\documents and settings\All Users\Application Data\McAfee
2011-09-11 00:28 . 2011-09-13 06:09 -------- d-----w- c:\program files\Trend Micro
2011-09-10 23:10 . 2011-09-11 04:13 -------- d-----w- C:\temp
2011-09-10 23:05 . 2011-09-11 00:50 -------- d-----w- c:\program files\Spybot - Search & Destroy
2011-09-10 22:47 . 2011-09-10 22:48 -------- d-----w- c:\documents and settings\Neil
2011-09-10 21:01 . 2011-09-10 22:16 -------- d-----w- c:\program files\MBAM
2011-09-10 20:53 . 2011-09-10 20:53 -------- d--h--w- c:\windows\PIF
2011-09-10 20:17 . 2011-09-10 20:17 -------- d-----w- c:\documents and settings\Administrator\Application Data\Malwarebytes
2011-09-03 10:17 . 2011-09-03 10:17 599040 ------w- c:\windows\system32\dllcache\crypt32.dll
.
.
.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2011-09-16 09:08 . 2010-03-21 17:54 91448 ----a-w- c:\windows\system32\bcmwlcoi.dll
2011-09-16 09:08 . 2010-03-21 17:54 2697600 ----a-w- c:\windows\system32\drivers\BCMWL5.SYS
2011-09-13 04:32 . 2009-08-23 08:28 138496 ----a-w- c:\windows\system32\drivers\afd.sys
2011-09-12 03:04 . 2010-04-16 02:17 472808 ----a-w- c:\windows\system32\deployJava1.dll
2011-09-11 02:24 . 2011-05-18 17:11 404640 ----a-w- c:\windows\system32\FlashPlayerCPLApp.cpl
2011-09-03 10:17 . 2008-04-15 12:00 599040 ----a-w- c:\windows\system32\crypt32.dll
2011-07-15 13:29 . 2010-04-14 21:57 456320 ----a-w- c:\windows\system32\drivers\mrxsmb.sys
2011-07-08 14:02 . 2008-04-15 12:00 10496 ----a-w- c:\windows\system32\drivers\ndistapi.sys
.
.
((((((((((((((((((((((((((((( SnapShot@2011-09-13_05.33.46 )))))))))))))))))))))))))))))))))))))))))
.
+ 2011-09-16 09:09 . 2010-03-21 17:54 91376 c:\windows\system32\ReinstallBackups\0011\DriverFiles\bcmwlcoi.dll
- 2008-06-25 01:26 . 2011-09-13 04:47 72096 c:\windows\system32\perfc009.dat
+ 2008-06-25 01:26 . 2011-09-28 05:54 72096 c:\windows\system32\perfc009.dat
+ 2008-04-15 12:00 . 2008-04-14 04:49 75264 c:\windows\system32\drivers\ipsec.sys
- 2008-04-15 12:00 . 2011-09-13 04:34 75264 c:\windows\system32\drivers\ipsec.sys
+ 2011-09-16 09:30 . 2011-09-16 09:30 25214 c:\windows\Installer\{1061DF04-CF33-40B0-8360-D07C9BBEB122}\controlPanelIcon.exe
- 2008-06-25 01:26 . 2011-09-13 04:47 442584 c:\windows\system32\perfh009.dat
+ 2008-06-25 01:26 . 2011-09-28 05:54 442584 c:\windows\system32\perfh009.dat
+ 2011-09-16 09:09 . 2010-03-21 17:54 2691840 c:\windows\system32\ReinstallBackups\0011\DriverFiles\BCMWL5.SYS
+ 2011-09-13 06:11 . 2011-09-13 06:11 1094656 c:\windows\Installer\535a5.msi
+ 2011-09-16 09:30 . 2011-09-16 09:30 3646464 c:\windows\Installer\182e9.msi
.
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"SysTrayApp"="c:\program files\IDT\WDM\sttray.exe" [2009-06-30 458844]
"SynTPEnh"="c:\program files\Synaptics\SynTP\SynTPEnh.exe" [2009-01-16 1418536]
"Persistence"="c:\windows\system32\igfxpers.exe" [2008-02-15 131072]
"IgfxTray"="c:\windows\system32\igfxtray.exe" [2008-02-15 135168]
"HotKeysCmds"="c:\windows\system32\hkcmd.exe" [2008-02-15 159744]
"HostManager"="c:\program files\Common Files\AOL\1288337709\ee\AOLSoftware.exe" [2010-03-08 41800]
"AESTFltr"="c:\windows\system32\AESTFltr.exe" [2009-02-18 737280]
"WirelessAssistant"="c:\program files\Hewlett-Packard\HP Wireless Assistant\HPWAMain.exe" [2009-09-01 499768]
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\Wdf01000.sys]
@="Driver"
.
[HKEY_LOCAL_MACHINE\software\microsoft\security center]
"AntiVirusOverride"=dword:00000001
.
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"%windir%\\system32\\sessmgr.exe"=
"c:\\Program Files\\Microsoft Office\\Office12\\ONENOTE.EXE"=
"c:\\Program Files\\Common Files\\AOL\\Loader\\aolload.exe"=
"c:\\Program Files\\AIM\\aim.exe"=
"c:\\Program Files\\Common Files\\AOL\\acs\\AOLDial.exe"=
"c:\\Program Files\\Common Files\\AOL\\acs\\AOLacsd.exe"=
"c:\\Program Files\\Common Files\\AOL\\1288337709\\ee\\aolsoftware.exe"=
"c:\\Program Files\\Common Files\\AOL\\TopSpeed\\3.0\\aoltpsd3.exe"=
"c:\\Program Files\\Logitech\\Logitech Harmony Remote Software 7\\HarmonyRemote.exe"=
.
R3 AESTAud;AE Audio Service;c:\windows\system32\drivers\AESTAud.sys [3/21/2010 3:02 PM 113664]
R3 L1c;NDIS Miniport Driver for Atheros AR8131/AR8132 PCI-E Ethernet Controller;c:\windows\system32\drivers\l1c51x86.sys [3/31/2009 12:11 PM 39424]
S0 25568825;25568825;c:\windows\system32\drivers\44869608.sys --> c:\windows\system32\drivers\44869608.sys [?]
S3 cvhsvc;Client Virtualization Handler;c:\program files\Common Files\Microsoft Shared\Virtualization Handler\CVHSVC.EXE [2/28/2010 2:33 AM 821664]
S3 McComponentHostService;McAfee Security Scan Component Host Service;"c:\program files\McAfee Security Scan\2.0.181\McCHSvc.exe" --> c:\program files\McAfee Security Scan\2.0.181\McCHSvc.exe [?]
S3 osppsvc;Office Software Protection Platform;c:\program files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE [1/9/2010 9:37 PM 4640000]
S3 RSUSBSTOR;RTS5121.Sys Realtek USB Card Reader;c:\windows\system32\drivers\RTS5121.sys [6/16/2009 7:56 PM 160256]
S3 Rts516xIR;Realtek IR Driver;c:\windows\system32\DRIVERS\Rts516xIR.sys --> c:\windows\system32\DRIVERS\Rts516xIR.sys [?]
S3 Sftfs;Sftfs;c:\windows\system32\drivers\Sftfsxp.sys [4/24/2010 1:10 AM 554344]
S3 Sftplay;Sftplay;c:\windows\system32\drivers\Sftplayxp.sys [4/24/2010 1:10 AM 211432]
S3 Sftredir;Sftredir;c:\windows\system32\drivers\Sftredirxp.sys [4/24/2010 1:10 AM 20584]
S3 Sftvol;Sftvol;c:\windows\system32\drivers\Sftvolxp.sys [4/24/2010 1:10 AM 18280]
S4 Norton Internet Security;Norton Internet Security;"c:\program files\Norton Internet Security\Engine\16.0.0.125\ccSvcHst.exe" /s "Norton Internet Security" /m "c:\program files\Norton Internet Security\Engine\16.0.0.125\diMaster.dll" /prefetch:1 --> c:\program files\Norton Internet Security\Engine\16.0.0.125\ccSvcHst.exe [?]
S4 sftlist;Application Virtualization Client;"c:\program files\Microsoft Application Virtualization Client\sftlist.exe" --> c:\program files\Microsoft Application Virtualization Client\sftlist.exe [?]
S4 sftvsa;Application Virtualization Service Agent;"c:\program files\Microsoft Application Virtualization Client\sftvsa.exe" --> c:\program files\Microsoft Application Virtualization Client\sftvsa.exe [?]
.
Contents of the 'Scheduled Tasks' folder
.
2011-09-27 c:\windows\Tasks\AppleSoftwareUpdate.job
- c:\program files\Apple Software Update\SoftwareUpdate.exe [2011-06-01 21:57]
.
.
------- Supplementary Scan -------
.
uStart Page = hxxp://ie.redirect.hp.com/svs/rdr?TYPE=3&tp=iehome&locale=en_us&c=91&bd=Pavilion&pf=cnnb
TCP: DhcpNameServer = 209.18.47.61 209.18.47.62
FF - ProfilePath - c:\documents and settings\Administrator1\Application Data\Mozilla\Firefox\Profiles\kdubnazq.default\
FF - prefs.js: browser.startup.homepage - hxxp://www.aol.com/
FF - Ext: Default: {972ce4c6-7e08-4474-a285-3208198ce6fd} - c:\program files\Mozilla Firefox\extensions\{972ce4c6-7e08-4474-a285-3208198ce6fd}
FF - Ext: Java Console: {CAFEEFAC-0016-0000-0015-ABCDEFFEDCBA} - c:\program files\Mozilla Firefox\extensions\{CAFEEFAC-0016-0000-0015-ABCDEFFEDCBA}
FF - Ext: Java Console: {CAFEEFAC-0016-0000-0017-ABCDEFFEDCBA} - c:\program files\Mozilla Firefox\extensions\{CAFEEFAC-0016-0000-0017-ABCDEFFEDCBA}
FF - Ext: Java Console: {CAFEEFAC-0016-0000-0019-ABCDEFFEDCBA} - c:\program files\Mozilla Firefox\extensions\{CAFEEFAC-0016-0000-0019-ABCDEFFEDCBA}
FF - Ext: Java Console: {CAFEEFAC-0016-0000-0020-ABCDEFFEDCBA} - c:\program files\Mozilla Firefox\extensions\{CAFEEFAC-0016-0000-0020-ABCDEFFEDCBA}
FF - Ext: Java Console: {CAFEEFAC-0016-0000-0021-ABCDEFFEDCBA} - c:\program files\Mozilla Firefox\extensions\{CAFEEFAC-0016-0000-0021-ABCDEFFEDCBA}
FF - Ext: Java Console: {CAFEEFAC-0016-0000-0027-ABCDEFFEDCBA} - c:\program files\Mozilla Firefox\extensions\{CAFEEFAC-0016-0000-0027-ABCDEFFEDCBA}
FF - Ext: Microsoft .NET Framework Assistant: {20a82645-c095-46ed-80e3-08825760534b} - c:\windows\Microsoft.NET\Framework\v3.5\Windows Presentation Foundation\DotNetAssistantExtension
FF - Ext: Java Quick Starter: jqs@sun.com - c:\program files\Java\jre6\lib\deploy\jqs\ff
FF - Ext: Microsoft .NET Framework Assistant: {20a82645-c095-46ed-80e3-08825760534b} - %profile%\extensions\{20a82645-c095-46ed-80e3-08825760534b}
FF - Ext: Personas: personas@christopher.beard - %profile%\extensions\personas@christopher.beard
FF - Ext: WOT: {a0d7ccb3-214d-498b-b4aa-0e8fda9a7bf7} - %profile%\extensions\{a0d7ccb3-214d-498b-b4aa-0e8fda9a7bf7}
FF - Ext: Download Statusbar: {D4DD63FA-01E4-46a7-B6B1-EDAB7D6AD389} - %profile%\extensions\{D4DD63FA-01E4-46a7-B6B1-EDAB7D6AD389}
FF - Ext: ColorfulTabs: {0545b830-f0aa-4d7e-8820-50a4629a56fe} - %profile%\extensions\{0545b830-f0aa-4d7e-8820-50a4629a56fe}
FF - Ext: DownloadHelper: {b9db16a4-6edc-47ec-a1f4-b86292ed211d} - %profile%\extensions\{b9db16a4-6edc-47ec-a1f4-b86292ed211d}
FF - Ext: Forecastfox: {0538E3E3-7E9B-4d49-8831-A227C80A7AD3} - %profile%\extensions\{0538E3E3-7E9B-4d49-8831-A227C80A7AD3}
FF - Ext: Are You Watching This?!: mark@areyouwatchingthis.com - %profile%\extensions\mark@areyouwatchingthis.com
FF - Ext: Noia 2.0 eXtreme OPT: noia2_option@kk.noia - %profile%\extensions\noia2_option@kk.noia
FF - Ext: Noia 2.0 (eXtreme): {9f08cb5a-76b1-4bcf-aff9-90e1a5d60b1e} - %profile%\extensions\{9f08cb5a-76b1-4bcf-aff9-90e1a5d60b1e}
FF - Ext: CrystalFox Qute: CrystalFox_Qute@BigRedBrent - %profile%\extensions\CrystalFox_Qute@BigRedBrent
FF - Ext: Camifox: camifox@altmusictv.com - %profile%\extensions\camifox@altmusictv.com
FF - Ext: CuteMenus - Crystal SVG: {63df8e21-711c-4074-a257-b065cadc28d8} - %profile%\extensions\{63df8e21-711c-4074-a257-b065cadc28d8}
FF - user.js: network.protocol-handler.warn-external.dnupdate - false);user_pref(network.protocol-handler.warn-external.dnupdate, false
.
.
**************************************************************************
.
catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2011-09-28 01:53
Windows 5.1.2600 Service Pack 3 NTFS
.
scanning hidden processes ...
.
scanning hidden autostart entries ...
.
scanning hidden files ...
.
scan completed successfully
hidden files: 0
.
**************************************************************************
.
[HKEY_LOCAL_MACHINE\System\ControlSet001\Services\Norton Internet Security]
"ImagePath"="\"c:\program files\Norton Internet Security\Engine\16.0.0.125\ccSvcHst.exe\" /s \"Norton Internet Security\" /m \"c:\program files\Norton Internet Security\Engine\16.0.0.125\diMaster.dll\" /prefetch:1"
.
[HKEY_LOCAL_MACHINE\System\ControlSet001\Services\NetBT]
"ImagePath"="system32\drivers\tsk4.tmp"
.
--------------------- DLLs Loaded Under Running Processes ---------------------
.
- - - - - - - > 'explorer.exe'(1892)
c:\windows\system32\WININET.dll
c:\windows\system32\ieframe.dll
c:\windows\system32\webcheck.dll
c:\windows\system32\WPDShServiceObj.dll
c:\windows\system32\PortableDeviceTypes.dll
c:\windows\system32\PortableDeviceApi.dll
.
------------------------ Other Running Processes ------------------------
.
c:\program files\idt\wdm\STacSV.exe
c:\windows\system32\igfxsrvc.exe
c:\program files\Hewlett-Packard\Shared\hpqwmiex.exe
c:\program files\Hewlett-Packard\Shared\hpqToaster.exe
.
**************************************************************************
.
Completion time: 2011-09-28 01:56:30 - machine was rebooted
ComboFix-quarantined-files.txt 2011-09-28 05:56
ComboFix2.txt 2011-09-13 05:39
.
Pre-Run: 145,307,267,072 bytes free
Post-Run: 145,338,621,952 bytes free
.
- - End Of File - - 825B1323832A1170659E32A4EE93F9B6

#7 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:08:38 AM

Posted 28 September 2011 - 08:21 AM

Is it just the wireless or is it also the network card



gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#8 NapalmDawn

NapalmDawn
  • Topic Starter

  • Members
  • 35 posts
  • OFFLINE
  •  
  • Local time:07:38 AM

Posted 28 September 2011 - 05:36 PM

Both. In running a repair, it says error in renewing IP address. Down in the sys tray, it just eternally has the little ball bouncing back and forth for the network conenction. I have removed and re-added client for MS networks and no change. The wireless card CAN properly detect nearby wireless access points but both wired and wireless connections do not complete

#9 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:08:38 AM

Posted 28 September 2011 - 06:50 PM

Greetings

Good That cleaned up some bad guys but I see some other stuff that we need to go after, so I want you to run this custom script for me.

:Run CFScript:

Open Notepad and copy/paste the text in the box into the window:

ClearJavaCache::

File::
c:\windows\system32\c_10430.nl_


Save it to your desktop as CFScript.txt

Refering to the picture above, drag CFScript.txt into ComboFix.exe
Posted Image
This will let ComboFix run again.
Restart if you have to.
Save the produced logfile to your desktop.

Note: Do not mouseclick combofix's window whilst it's running. That may cause it to stall

"information and logs"

  • In your next post I need the following

  • report from Combofix
  • let me know of any problems you may have had
  • How is the computer doing now after running the script?

Gringo

I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#10 NapalmDawn

NapalmDawn
  • Topic Starter

  • Members
  • 35 posts
  • OFFLINE
  •  
  • Local time:07:38 AM

Posted 29 September 2011 - 02:36 AM

ComboFix 11-09-26.02 - Administrator1 09/29/2011 3:08.3.2 - x86
Microsoft Windows XP Home Edition 5.1.2600.3.1252.1.1033.18.2039.1479 [GMT -4:00]
Running from: c:\documents and settings\Administrator1\Desktop\ComboFix.exe
Command switches used :: c:\documents and settings\Administrator1\Desktop\CFScript.txt
.
WARNING -THIS MACHINE DOES NOT HAVE THE RECOVERY CONSOLE INSTALLED !!
.
FILE ::
"c:\windows\system32\c_10430.nl_"
.
.
((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.
.
c:\windows\{2521BB91-29B1-4d7e-9137-AC9875D77735}
c:\windows\system32\c_10430.nl_
c:\windows\system32\d3d9caps.dat
.
.
((((((((((((((((((((((((( Files Created from 2011-08-28 to 2011-09-29 )))))))))))))))))))))))))))))))
.
.
2011-09-16 09:30 . 2011-09-16 09:30 -------- d-----w- c:\documents and settings\LocalService\Application Data\hpqLog
2011-09-16 09:30 . 2011-09-16 09:30 -------- d-----w- c:\documents and settings\Administrator1\Application Data\hpqLog
2011-09-16 09:06 . 2011-09-16 09:08 -------- d-----w- C:\SWSETUP
2011-09-13 06:11 . 2011-09-13 06:11 388096 ----a-r- c:\documents and settings\Administrator1\Application Data\Microsoft\Installer\{45A66726-69BC-466B-A7A4-12FCBA4883D7}\HiJackThis.exe
2011-09-13 06:11 . 2011-09-13 06:11 -------- d-----w- c:\program files\Hijack2
2011-09-13 05:41 . 2011-07-06 23:52 41272 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2011-09-13 05:41 . 2011-09-13 05:41 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
2011-09-13 05:41 . 2011-07-06 23:52 22712 ----a-w- c:\windows\system32\drivers\mbam.sys
2011-09-12 03:24 . 2011-09-12 03:24 -------- d-----w- c:\program files\ESET
2011-09-12 03:04 . 2011-09-12 03:04 -------- d-----w- c:\program files\Common Files\Java
2011-09-12 03:04 . 2011-09-12 03:04 73728 ----a-w- c:\windows\system32\javacpl.cpl
2011-09-12 00:24 . 2011-09-12 00:24 -------- d--h--w- c:\documents and settings\All Users\Application Data\Common Files
2011-09-12 00:18 . 2011-09-12 00:27 -------- d-----w- c:\documents and settings\All Users\Application Data\MFAData
2011-09-12 00:13 . 2011-09-12 00:13 -------- d-----w- c:\documents and settings\Administrator1\DoctorWeb
2011-09-11 02:05 . 2011-09-11 02:05 -------- d-----w- c:\documents and settings\Administrator1\Application Data\SUPERAntiSpyware.com
2011-09-11 02:04 . 2011-09-11 02:04 -------- d-----w- c:\documents and settings\All Users\Application Data\SUPERAntiSpyware.com
2011-09-11 00:53 . 2011-09-11 00:53 -------- d-----w- c:\documents and settings\LocalService\Application Data\McAfee
2011-09-11 00:51 . 2011-09-11 00:51 -------- d-----w- c:\documents and settings\All Users\Application Data\McAfee
2011-09-11 00:28 . 2011-09-13 06:09 -------- d-----w- c:\program files\Trend Micro
2011-09-10 23:10 . 2011-09-11 04:13 -------- d-----w- C:\temp
2011-09-10 23:05 . 2011-09-11 00:50 -------- d-----w- c:\program files\Spybot - Search & Destroy
2011-09-10 22:47 . 2011-09-10 22:48 -------- d-----w- c:\documents and settings\Neil
2011-09-10 21:01 . 2011-09-10 22:16 -------- d-----w- c:\program files\MBAM
2011-09-10 20:53 . 2011-09-10 20:53 -------- d--h--w- c:\windows\PIF
2011-09-10 20:17 . 2011-09-10 20:17 -------- d-----w- c:\documents and settings\Administrator\Application Data\Malwarebytes
2011-09-03 10:17 . 2011-09-03 10:17 599040 ------w- c:\windows\system32\dllcache\crypt32.dll
.
.
.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2011-09-16 09:08 . 2010-03-21 17:54 91448 ----a-w- c:\windows\system32\bcmwlcoi.dll
2011-09-16 09:08 . 2010-03-21 17:54 2697600 ----a-w- c:\windows\system32\drivers\BCMWL5.SYS
2011-09-13 04:32 . 2009-08-23 08:28 138496 ----a-w- c:\windows\system32\drivers\afd.sys
2011-09-12 03:04 . 2010-04-16 02:17 472808 ----a-w- c:\windows\system32\deployJava1.dll
2011-09-11 02:24 . 2011-05-18 17:11 404640 ----a-w- c:\windows\system32\FlashPlayerCPLApp.cpl
2011-09-03 10:17 . 2008-04-15 12:00 599040 ----a-w- c:\windows\system32\crypt32.dll
2011-07-15 13:29 . 2010-04-14 21:57 456320 ----a-w- c:\windows\system32\drivers\mrxsmb.sys
2011-07-08 14:02 . 2008-04-15 12:00 10496 ----a-w- c:\windows\system32\drivers\ndistapi.sys
.
.
((((((((((((((((((((((((((((( SnapShot@2011-09-13_05.33.46 )))))))))))))))))))))))))))))))))))))))))
.
+ 2011-09-16 09:09 . 2010-03-21 17:54 91376 c:\windows\system32\ReinstallBackups\0011\DriverFiles\bcmwlcoi.dll
- 2008-06-25 01:26 . 2011-09-13 04:47 72096 c:\windows\system32\perfc009.dat
+ 2008-06-25 01:26 . 2011-09-28 05:55 72096 c:\windows\system32\perfc009.dat
+ 2008-04-15 12:00 . 2008-04-14 04:49 75264 c:\windows\system32\drivers\ipsec.sys
- 2008-04-15 12:00 . 2011-09-13 04:34 75264 c:\windows\system32\drivers\ipsec.sys
+ 2011-09-16 09:30 . 2011-09-16 09:30 25214 c:\windows\Installer\{1061DF04-CF33-40B0-8360-D07C9BBEB122}\controlPanelIcon.exe
- 2008-06-25 01:26 . 2011-09-13 04:47 442584 c:\windows\system32\perfh009.dat
+ 2008-06-25 01:26 . 2011-09-28 05:55 442584 c:\windows\system32\perfh009.dat
+ 2011-09-16 09:09 . 2010-03-21 17:54 2691840 c:\windows\system32\ReinstallBackups\0011\DriverFiles\BCMWL5.SYS
+ 2011-09-13 06:11 . 2011-09-13 06:11 1094656 c:\windows\Installer\535a5.msi
+ 2011-09-16 09:30 . 2011-09-16 09:30 3646464 c:\windows\Installer\182e9.msi
.
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"SysTrayApp"="c:\program files\IDT\WDM\sttray.exe" [2009-06-30 458844]
"SynTPEnh"="c:\program files\Synaptics\SynTP\SynTPEnh.exe" [2009-01-16 1418536]
"Persistence"="c:\windows\system32\igfxpers.exe" [2008-02-15 131072]
"IgfxTray"="c:\windows\system32\igfxtray.exe" [2008-02-15 135168]
"HotKeysCmds"="c:\windows\system32\hkcmd.exe" [2008-02-15 159744]
"HostManager"="c:\program files\Common Files\AOL\1288337709\ee\AOLSoftware.exe" [2010-03-08 41800]
"AESTFltr"="c:\windows\system32\AESTFltr.exe" [2009-02-18 737280]
"WirelessAssistant"="c:\program files\Hewlett-Packard\HP Wireless Assistant\HPWAMain.exe" [2009-09-01 499768]
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\Wdf01000.sys]
@="Driver"
.
[HKEY_LOCAL_MACHINE\software\microsoft\security center]
"AntiVirusOverride"=dword:00000001
.
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"%windir%\\system32\\sessmgr.exe"=
"c:\\Program Files\\Microsoft Office\\Office12\\ONENOTE.EXE"=
"c:\\Program Files\\Common Files\\AOL\\Loader\\aolload.exe"=
"c:\\Program Files\\AIM\\aim.exe"=
"c:\\Program Files\\Common Files\\AOL\\acs\\AOLDial.exe"=
"c:\\Program Files\\Common Files\\AOL\\acs\\AOLacsd.exe"=
"c:\\Program Files\\Common Files\\AOL\\1288337709\\ee\\aolsoftware.exe"=
"c:\\Program Files\\Common Files\\AOL\\TopSpeed\\3.0\\aoltpsd3.exe"=
"c:\\Program Files\\Logitech\\Logitech Harmony Remote Software 7\\HarmonyRemote.exe"=
.
R3 AESTAud;AE Audio Service;c:\windows\system32\drivers\AESTAud.sys [3/21/2010 3:02 PM 113664]
R3 L1c;NDIS Miniport Driver for Atheros AR8131/AR8132 PCI-E Ethernet Controller;c:\windows\system32\drivers\l1c51x86.sys [3/31/2009 12:11 PM 39424]
S0 25568825;25568825;c:\windows\system32\drivers\44869608.sys --> c:\windows\system32\drivers\44869608.sys [?]
S3 cvhsvc;Client Virtualization Handler;c:\program files\Common Files\Microsoft Shared\Virtualization Handler\CVHSVC.EXE [2/28/2010 2:33 AM 821664]
S3 McComponentHostService;McAfee Security Scan Component Host Service;"c:\program files\McAfee Security Scan\2.0.181\McCHSvc.exe" --> c:\program files\McAfee Security Scan\2.0.181\McCHSvc.exe [?]
S3 osppsvc;Office Software Protection Platform;c:\program files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE [1/9/2010 9:37 PM 4640000]
S3 RSUSBSTOR;RTS5121.Sys Realtek USB Card Reader;c:\windows\system32\drivers\RTS5121.sys [6/16/2009 7:56 PM 160256]
S3 Rts516xIR;Realtek IR Driver;c:\windows\system32\DRIVERS\Rts516xIR.sys --> c:\windows\system32\DRIVERS\Rts516xIR.sys [?]
S3 Sftfs;Sftfs;c:\windows\system32\drivers\Sftfsxp.sys [4/24/2010 1:10 AM 554344]
S3 Sftplay;Sftplay;c:\windows\system32\drivers\Sftplayxp.sys [4/24/2010 1:10 AM 211432]
S3 Sftredir;Sftredir;c:\windows\system32\drivers\Sftredirxp.sys [4/24/2010 1:10 AM 20584]
S3 Sftvol;Sftvol;c:\windows\system32\drivers\Sftvolxp.sys [4/24/2010 1:10 AM 18280]
S4 Norton Internet Security;Norton Internet Security;"c:\program files\Norton Internet Security\Engine\16.0.0.125\ccSvcHst.exe" /s "Norton Internet Security" /m "c:\program files\Norton Internet Security\Engine\16.0.0.125\diMaster.dll" /prefetch:1 --> c:\program files\Norton Internet Security\Engine\16.0.0.125\ccSvcHst.exe [?]
S4 sftlist;Application Virtualization Client;"c:\program files\Microsoft Application Virtualization Client\sftlist.exe" --> c:\program files\Microsoft Application Virtualization Client\sftlist.exe [?]
S4 sftvsa;Application Virtualization Service Agent;"c:\program files\Microsoft Application Virtualization Client\sftvsa.exe" --> c:\program files\Microsoft Application Virtualization Client\sftvsa.exe [?]
.
Contents of the 'Scheduled Tasks' folder
.
2011-09-27 c:\windows\Tasks\AppleSoftwareUpdate.job
- c:\program files\Apple Software Update\SoftwareUpdate.exe [2011-06-01 21:57]
.
.
------- Supplementary Scan -------
.
uStart Page = hxxp://ie.redirect.hp.com/svs/rdr?TYPE=3&tp=iehome&locale=en_us&c=91&bd=Pavilion&pf=cnnb
TCP: DhcpNameServer = 209.18.47.61 209.18.47.62
FF - ProfilePath - c:\documents and settings\Administrator1\Application Data\Mozilla\Firefox\Profiles\kdubnazq.default\
FF - prefs.js: browser.startup.homepage - hxxp://www.aol.com/
FF - Ext: Default: {972ce4c6-7e08-4474-a285-3208198ce6fd} - c:\program files\Mozilla Firefox\extensions\{972ce4c6-7e08-4474-a285-3208198ce6fd}
FF - Ext: Java Console: {CAFEEFAC-0016-0000-0015-ABCDEFFEDCBA} - c:\program files\Mozilla Firefox\extensions\{CAFEEFAC-0016-0000-0015-ABCDEFFEDCBA}
FF - Ext: Java Console: {CAFEEFAC-0016-0000-0017-ABCDEFFEDCBA} - c:\program files\Mozilla Firefox\extensions\{CAFEEFAC-0016-0000-0017-ABCDEFFEDCBA}
FF - Ext: Java Console: {CAFEEFAC-0016-0000-0019-ABCDEFFEDCBA} - c:\program files\Mozilla Firefox\extensions\{CAFEEFAC-0016-0000-0019-ABCDEFFEDCBA}
FF - Ext: Java Console: {CAFEEFAC-0016-0000-0020-ABCDEFFEDCBA} - c:\program files\Mozilla Firefox\extensions\{CAFEEFAC-0016-0000-0020-ABCDEFFEDCBA}
FF - Ext: Java Console: {CAFEEFAC-0016-0000-0021-ABCDEFFEDCBA} - c:\program files\Mozilla Firefox\extensions\{CAFEEFAC-0016-0000-0021-ABCDEFFEDCBA}
FF - Ext: Java Console: {CAFEEFAC-0016-0000-0027-ABCDEFFEDCBA} - c:\program files\Mozilla Firefox\extensions\{CAFEEFAC-0016-0000-0027-ABCDEFFEDCBA}
FF - Ext: Microsoft .NET Framework Assistant: {20a82645-c095-46ed-80e3-08825760534b} - c:\windows\Microsoft.NET\Framework\v3.5\Windows Presentation Foundation\DotNetAssistantExtension
FF - Ext: Java Quick Starter: jqs@sun.com - c:\program files\Java\jre6\lib\deploy\jqs\ff
FF - Ext: Microsoft .NET Framework Assistant: {20a82645-c095-46ed-80e3-08825760534b} - %profile%\extensions\{20a82645-c095-46ed-80e3-08825760534b}
FF - Ext: Personas: personas@christopher.beard - %profile%\extensions\personas@christopher.beard
FF - Ext: WOT: {a0d7ccb3-214d-498b-b4aa-0e8fda9a7bf7} - %profile%\extensions\{a0d7ccb3-214d-498b-b4aa-0e8fda9a7bf7}
FF - Ext: Download Statusbar: {D4DD63FA-01E4-46a7-B6B1-EDAB7D6AD389} - %profile%\extensions\{D4DD63FA-01E4-46a7-B6B1-EDAB7D6AD389}
FF - Ext: ColorfulTabs: {0545b830-f0aa-4d7e-8820-50a4629a56fe} - %profile%\extensions\{0545b830-f0aa-4d7e-8820-50a4629a56fe}
FF - Ext: DownloadHelper: {b9db16a4-6edc-47ec-a1f4-b86292ed211d} - %profile%\extensions\{b9db16a4-6edc-47ec-a1f4-b86292ed211d}
FF - Ext: Forecastfox: {0538E3E3-7E9B-4d49-8831-A227C80A7AD3} - %profile%\extensions\{0538E3E3-7E9B-4d49-8831-A227C80A7AD3}
FF - Ext: Are You Watching This?!: mark@areyouwatchingthis.com - %profile%\extensions\mark@areyouwatchingthis.com
FF - Ext: Noia 2.0 eXtreme OPT: noia2_option@kk.noia - %profile%\extensions\noia2_option@kk.noia
FF - Ext: Noia 2.0 (eXtreme): {9f08cb5a-76b1-4bcf-aff9-90e1a5d60b1e} - %profile%\extensions\{9f08cb5a-76b1-4bcf-aff9-90e1a5d60b1e}
FF - Ext: CrystalFox Qute: CrystalFox_Qute@BigRedBrent - %profile%\extensions\CrystalFox_Qute@BigRedBrent
FF - Ext: Camifox: camifox@altmusictv.com - %profile%\extensions\camifox@altmusictv.com
FF - Ext: CuteMenus - Crystal SVG: {63df8e21-711c-4074-a257-b065cadc28d8} - %profile%\extensions\{63df8e21-711c-4074-a257-b065cadc28d8}
FF - user.js: network.protocol-handler.warn-external.dnupdate - false);user_pref(network.protocol-handler.warn-external.dnupdate, false
.
.
**************************************************************************
.
catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2011-09-29 03:15
Windows 5.1.2600 Service Pack 3 NTFS
.
scanning hidden processes ...
.
scanning hidden autostart entries ...
.
scanning hidden files ...
.
scan completed successfully
hidden files: 0
.
**************************************************************************
.
[HKEY_LOCAL_MACHINE\System\ControlSet001\Services\Norton Internet Security]
"ImagePath"="\"c:\program files\Norton Internet Security\Engine\16.0.0.125\ccSvcHst.exe\" /s \"Norton Internet Security\" /m \"c:\program files\Norton Internet Security\Engine\16.0.0.125\diMaster.dll\" /prefetch:1"
.
[HKEY_LOCAL_MACHINE\System\ControlSet001\Services\NetBT]
"ImagePath"="system32\drivers\tsk4.tmp"
.
--------------------- DLLs Loaded Under Running Processes ---------------------
.
- - - - - - - > 'winlogon.exe'(464)
c:\windows\system32\igfxdev.dll
.
Completion time: 2011-09-29 03:17:23
ComboFix-quarantined-files.txt 2011-09-29 07:17
ComboFix2.txt 2011-09-13 05:39
.
Pre-Run: 145,324,658,688 bytes free
Post-Run: 145,312,489,472 bytes free
.
- - End Of File - - 99828AD11400DE90DAFC88D35A8B8F9C

#11 NapalmDawn

NapalmDawn
  • Topic Starter

  • Members
  • 35 posts
  • OFFLINE
  •  
  • Local time:07:38 AM

Posted 29 September 2011 - 02:40 AM

AFter posting the log, I rebooted the machine. Still not grabbing IPs from the router. The router itself has been rebooted a few times also.

#12 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:08:38 AM

Posted 29 September 2011 - 09:10 AM

Please do the following:

Step One
Please download Junction.zip and save it to your desktop.
Unzip it and extract junction.exe to your C:\ drive.

Step Two
Now copy (Ctrl +C) and paste (Ctrl +V) the text inside the code box below into Notepad.

@ECHO OFF
cd c:\
junction -s c:\>log.txt
start log.txt
del %0
Save it to your desktop as File name: junc.bat
Save as type: All Files

Step Three
Double click junc.bat to run it. A log will be presented. Copy and paste or attach the content of the log in your next reply.

Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#13 NapalmDawn

NapalmDawn
  • Topic Starter

  • Members
  • 35 posts
  • OFFLINE
  •  
  • Local time:07:38 AM

Posted 29 September 2011 - 04:25 PM

Junction v1.06 - Windows junction creator and reparse point viewer
Copyright © 2000-2010 Mark Russinovich
Sysinternals - www.sysinternals.com


Failed to open \\?\c:\\pagefile.sys: The process cannot access the file because it is being used by another process.


...

..
Failed to open \\?\c:\\Documents and Settings\All Users\Application Data\Microsoft\Dr Watson\user.dmp: Access is denied.


.

...


Failed to open \\?\c:\\ebf538967562ef48e3d76499\amd64: Access is denied.



Failed to open \\?\c:\\ebf538967562ef48e3d76499\i386: Access is denied.


...

...

...

...

...

...

...
Failed to open \\?\c:\\Program Files\ESET\ESET Online Scanner\OnlineCmdLineScanner.exe: Access is denied.




...

...

...


Failed to open \\?\c:\\Program Files\Spybot - Search & Destroy\SpybotSD.exe: Access is denied.



Failed to open \\?\c:\\Program Files\Spybot - Search & Destroy\TeaTimer.exe: Access is denied.



Failed to open \\?\c:\\Program Files\Trend Micro\HiJackThis\HiJackThis.exe: Access is denied.


...
Failed to open \\?\c:\\Qoobox\BackEnv: Access is denied.




..
Failed to open \\?\c:\\temp\Trend Micro\HiJackThis\HiJackThis.exe: Access is denied.



Failed to open \\?\c:\\temp2\ADSSpy.exe: Access is denied.


.

...

...

...

...

...

...

...

...

...No reparse points found.

Some of these access denied ones are due to the previous rootkit. When a program that was capable of removing the rootkit found it and tried to remove it, the program would become unusable and eventually even undeletable.

#14 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:08:38 AM

Posted 29 September 2011 - 04:40 PM

Hello

We need to reset some permisions that the virus changed

Download GrantPerms.zip and save it to your desktop.

Unzip the file and depending on the system run GrantPerms.exe or GrantPerms64.exe
Copy and paste the following in the edit box:

c:\Documents and Settings\All Users\Application Data\Microsoft\Dr Watson\user.dmp
c:\ebf538967562ef48e3d76499\amd64
c:\ebf538967562ef48e3d76499\i386
c:\Program Files\ESET\ESET Online Scanner\OnlineCmdLineScanner.exe
c:\Program Files\Spybot - Search & Destroy\SpybotSD.exe
c:\Program Files\Trend Micro\HiJackThis\HiJackThis.exe
c:\temp\Trend Micro\HiJackThis\HiJackThis.exe
c:\temp2\ADSSpy.exe

Click Unlock. When it is done click "OK".
Click List Permissions and post the result (Perms.txt) that pops up. A copy of Perms.txt will be saved in the same directory the tool is run.

Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#15 NapalmDawn

NapalmDawn
  • Topic Starter

  • Members
  • 35 posts
  • OFFLINE
  •  
  • Local time:07:38 AM

Posted 29 September 2011 - 09:03 PM

GrantPerms by Farbar
Ran by Administrator1 at 2011-09-29 21:54:21

===============================================
\\?\c:\Documents and Settings\All Users\Application Data\Microsoft\Dr Watson\user.dmp

Owner: BUILTIN\Administrators

DACL(NP)(AI):
BUILTIN\Administrators FULL ALLOW (NI)
NT AUTHORITY\SYSTEM FULL ALLOW (NI)
BUILTIN\Users READ/EXECUTE ALLOW (NI)


\\?\c:\ebf538967562ef48e3d76499\amd64

Owner: BUILTIN\Administrators

DACL(NP)(AI):
BUILTIN\Administrators FULL ALLOW (CI)(OI)
NT AUTHORITY\SYSTEM FULL ALLOW (CI)(OI)
BUILTIN\Users READ/EXECUTE ALLOW (CI)(OI)


\\?\c:\ebf538967562ef48e3d76499\i386

Owner: BUILTIN\Administrators

DACL(NP)(AI):
BUILTIN\Administrators FULL ALLOW (CI)(OI)
NT AUTHORITY\SYSTEM FULL ALLOW (CI)(OI)
BUILTIN\Users READ/EXECUTE ALLOW (CI)(OI)


\\?\c:\Program Files\ESET\ESET Online Scanner\OnlineCmdLineScanner.exe

Owner: BUILTIN\Administrators

DACL(P)(AI):
BUILTIN\Administrators FULL ALLOW (NI)
NT AUTHORITY\SYSTEM FULL ALLOW (NI)
BUILTIN\Users READ/EXECUTE ALLOW (NI)


\\?\c:\Program Files\Spybot - Search & Destroy\SpybotSD.exe

Owner: BUILTIN\Administrators

DACL(P)(AI):
BUILTIN\Administrators FULL ALLOW (NI)
NT AUTHORITY\SYSTEM FULL ALLOW (NI)
BUILTIN\Users READ/EXECUTE ALLOW (NI)


\\?\c:\Program Files\Trend Micro\HiJackThis\HiJackThis.exe

Owner: BUILTIN\Administrators

DACL(P)(AI):
BUILTIN\Administrators FULL ALLOW (NI)
NT AUTHORITY\SYSTEM FULL ALLOW (NI)
BUILTIN\Users READ/EXECUTE ALLOW (NI)


\\?\c:\temp\Trend Micro\HiJackThis\HiJackThis.exe

Owner: BUILTIN\Administrators

DACL(P)(AI):
BUILTIN\Administrators FULL ALLOW (NI)
NT AUTHORITY\SYSTEM FULL ALLOW (NI)
BUILTIN\Users READ/EXECUTE ALLOW (NI)


\\?\c:\temp2\ADSSpy.exe

Owner: BUILTIN\Administrators

DACL(P)(AI):
BUILTIN\Administrators FULL ALLOW (NI)
NT AUTHORITY\SYSTEM FULL ALLOW (NI)
BUILTIN\Users READ/EXECUTE ALLOW (NI)




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users