Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Redirect virus


  • Please log in to reply
13 replies to this topic

#1 ticomp

ticomp

  • Members
  • 9 posts
  • OFFLINE
  •  
  • Local time:07:26 AM

Posted 01 October 2011 - 03:27 AM

Hi, I have a possible redirect virus on my computer. When using firefox or IE extra tabs with unknown sites would pop out and most of my search results with yahoo or google are blocked.I have malwarebytes on but I am not able to run any scans.If i run a scan the scan box would close. I don't know what to do next.
My computer is running on Windows Xp home ed sp3 32 bits.

BC AdBot (Login to Remove)

 


#2 lilimila1977

lilimila1977

  • Members
  • 6 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:10:26 AM

Posted 01 October 2011 - 07:33 AM

Run RKill (http://www.bleepingcomputer.com/download/anti-virus/rkill) then try malwarebytes again.

#3 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,490 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:11:26 AM

Posted 01 October 2011 - 10:14 PM

If you still have trouble as this infection changes settings on your computer so that when you launch an executable, a file ending with .exe, it will instead launch the infection rather than the desired program. To fix this we must first download a Registry file that will fix these changes. From a clean computer, please download the following file and save it to a removable media such as a CD/DVD, external Drive, or USB flash drive.

FixNCR.reg

insert the removable device into the infected computer and open the folder the drive letter associated with it. You should now see the FixNCR.reg file that you had downloaded onto it. Double-click on the FixNCR.reg file to fix the Registry on your infected computer.


In any event>>>

Please download the TDSS Rootkit Removing Tool (TDSSKiller.exe) and save it to your Desktop. <-Important!!!
Be sure to download TDSSKiller.exe (v2.5.6.0) from Kaspersky's website and not TDSSKiller.zip which appears to be an older version 2.3.2.2 of the tool.
  • Double-click on TDSSKiller.exe to run the tool for known TDSS variants.
    Vista/Windows 7 users right-click and select Run As Administrator.
  • If TDSSKiller does not run, try renaming it.
  • To do this, right-click on TDSSKiller.exe, select Rename and give it a random name with the .com file extension (i.e. 123abc.com). If you do not see the file extension, please refer to How to change the file extension.
  • Click the Start Scan button.
  • Do not use the computer during the scan
  • If the scan completes with nothing found, click Close to exit.
  • If malicious objects are found, they will show in the Scan results - Select action for found objects and offer three options.
  • Ensure Cure (default) is selected, then click Continue > Reboot now to finish the cleaning process.
  • A log file named TDSSKiller_version_date_time_log.txt (i.e. TDSSKiller.2.4.0.0_27.07.2010_09.o7.26_log.txt) will be created and saved to the root directory (usually Local Disk C:).
  • Copy and paste the contents of that file in your next reply.


If TDSSKiller does not run, try renaming it. To do this, right-click on TDSSKiller.exe, select Rename and give it a random name with the .com file extension (i.e. 123abc.com). If you do not see the file extension, please refer to these[/color] instructions. [color=green]In some cases it may be necessary to redownload TDSSKiller and randomly rename it before downloading and saving to the computer.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#4 ticomp

ticomp
  • Topic Starter

  • Members
  • 9 posts
  • OFFLINE
  •  
  • Local time:07:26 AM

Posted 03 October 2011 - 06:33 PM

ok here is the log

16:22:45.0201 3176 TDSS rootkit removing tool 2.6.4.0 Oct 3 2011 17:37:01
16:22:45.0952 3176 ============================================================
16:22:45.0952 3176 Current date / time: 2011/10/03 16:22:45.0952
16:22:45.0952 3176 SystemInfo:
16:22:45.0952 3176
16:22:45.0962 3176 OS Version: 5.1.2600 ServicePack: 3.0
16:22:45.0962 3176 Product type: Workstation
16:22:45.0962 3176 ComputerName: U-9BD8B994BE274
16:22:45.0962 3176 UserName: Wing
16:22:45.0962 3176 Windows directory: C:\WINDOWS
16:22:45.0962 3176 System windows directory: C:\WINDOWS
16:22:45.0962 3176 Processor architecture: Intel x86
16:22:45.0962 3176 Number of processors: 1
16:22:45.0962 3176 Page size: 0x1000
16:22:45.0962 3176 Boot type: Normal boot
16:22:45.0962 3176 ============================================================
16:22:48.0546 3176 Initialize success
16:23:09.0565 0304 ============================================================
16:23:09.0565 0304 Scan started
16:23:09.0565 0304 Mode: Manual;
16:23:09.0565 0304 ============================================================
16:23:10.0367 0304 6d2c6ba5 (5e24ece1217b43c120c81a586fa0becc) C:\WINDOWS\2775264365:2463339610.exe
16:23:12.0590 0304 Suspicious file (Hidden): C:\WINDOWS\2775264365:2463339610.exe. md5: 5e24ece1217b43c120c81a586fa0becc
16:23:12.0590 0304 6d2c6ba5 ( HiddenFile.Multi.Generic ) - warning
16:23:12.0590 0304 6d2c6ba5 - detected HiddenFile.Multi.Generic (1)
16:23:12.0910 0304 Abiosdsk - ok
16:23:13.0130 0304 abp480n5 - ok
16:23:13.0411 0304 ac97intc (0f2d66d5f08ebe2f77bb904288dcf6f0) C:\WINDOWS\system32\drivers\ac97intc.sys
16:23:13.0441 0304 ac97intc - ok
16:23:13.0851 0304 ACPI (8fd99680a539792a30e97944fdaecf17) C:\WINDOWS\system32\DRIVERS\ACPI.sys
16:23:13.0911 0304 ACPI - ok
16:23:14.0302 0304 ACPIEC (9859c0f6936e723e4892d7141b1327d5) C:\WINDOWS\system32\DRIVERS\ACPIEC.sys
16:23:14.0302 0304 ACPIEC - ok
16:23:14.0602 0304 adpu160m - ok
16:23:14.0923 0304 aec (8bed39e3c35d6a489438b8141717a557) C:\WINDOWS\system32\drivers\aec.sys
16:23:14.0973 0304 aec - ok
16:23:15.0374 0304 AFD (355556d9e580915118cd7ef736653a89) C:\WINDOWS\System32\drivers\afd.sys
16:23:15.0394 0304 AFD - ok
16:23:16.0175 0304 AgereSoftModem (aff071b6290776e1fa162837c35eac78) C:\WINDOWS\system32\DRIVERS\AGRSM.sys
16:23:16.0615 0304 AgereSoftModem - ok
16:23:16.0986 0304 agp440 (08fd04aa961bdc77fb983f328334e3d7) C:\WINDOWS\system32\DRIVERS\agp440.sys
16:23:17.0006 0304 agp440 - ok
16:23:17.0326 0304 Aha154x - ok
16:23:17.0547 0304 aic78u2 - ok
16:23:17.0767 0304 aic78xx - ok
16:23:17.0997 0304 AliIde - ok
16:23:18.0218 0304 amsint - ok
16:23:18.0448 0304 asc - ok
16:23:18.0668 0304 asc3350p - ok
16:23:19.0029 0304 asc3550 - ok
16:23:19.0429 0304 AsyncMac (b153affac761e7f5fcfa822b9c4e97bc) C:\WINDOWS\system32\DRIVERS\asyncmac.sys
16:23:19.0429 0304 AsyncMac - ok
16:23:19.0800 0304 atapi (9f3a2f5aa6875c72bf062c712cfa2674) C:\WINDOWS\system32\DRIVERS\atapi.sys
16:23:19.0800 0304 atapi - ok
16:23:20.0100 0304 Atdisk - ok
16:23:20.0601 0304 ati2mtag (05e891b470f869866b38cb9ce1e39a16) C:\WINDOWS\system32\DRIVERS\ati2mtag.sys
16:23:20.0811 0304 ati2mtag - ok
16:23:21.0162 0304 Atmarpc (9916c1225104ba14794209cfa8012159) C:\WINDOWS\system32\DRIVERS\atmarpc.sys
16:23:21.0182 0304 Atmarpc - ok
16:23:21.0542 0304 audstub (d9f724aa26c010a217c97606b160ed68) C:\WINDOWS\system32\DRIVERS\audstub.sys
16:23:21.0542 0304 audstub - ok
16:23:21.0903 0304 Beep (da1f27d85e0d1525f6621372e7b685e9) C:\WINDOWS\system32\drivers\Beep.sys
16:23:21.0903 0304 Beep - ok
16:23:22.0283 0304 BrPar (2fe6d5be0629f706197b30c0aa05de30) C:\WINDOWS\System32\drivers\BrPar.sys
16:23:22.0283 0304 BrPar - ok
16:23:22.0624 0304 cbidf2k (90a673fc8e12a79afbed2576f6a7aaf9) C:\WINDOWS\system32\drivers\cbidf2k.sys
16:23:22.0634 0304 cbidf2k - ok
16:23:22.0944 0304 cd20xrnt - ok
16:23:23.0214 0304 Cdaudio (c1b486a7658353d33a10cc15211a873b) C:\WINDOWS\system32\drivers\Cdaudio.sys
16:23:23.0214 0304 Cdaudio - ok
16:23:23.0565 0304 Cdfs (c885b02847f5d2fd45a24e219ed93b32) C:\WINDOWS\system32\drivers\Cdfs.sys
16:23:23.0585 0304 Cdfs - ok
16:23:23.0956 0304 Cdrom (1f4260cc5b42272d71f79e570a27a4fe) C:\WINDOWS\system32\DRIVERS\cdrom.sys
16:23:23.0976 0304 Cdrom - ok
16:23:24.0356 0304 cercsr6 (84853b3fd012251690570e9e7e43343f) C:\WINDOWS\system32\drivers\cercsr6.sys
16:23:24.0376 0304 cercsr6 - ok
16:23:24.0667 0304 Changer - ok
16:23:24.0957 0304 CmBatt (0f6c187d38d98f8df904589a5f94d411) C:\WINDOWS\system32\DRIVERS\CmBatt.sys
16:23:24.0967 0304 CmBatt - ok
16:23:25.0277 0304 CmdIde - ok
16:23:25.0548 0304 Compbatt (6e4c9f21f0fae8940661144f41b13203) C:\WINDOWS\system32\DRIVERS\compbatt.sys
16:23:25.0548 0304 Compbatt - ok
16:23:25.0888 0304 Cpqarray - ok
16:23:26.0228 0304 dac2w2k - ok
16:23:26.0539 0304 dac960nt - ok
16:23:26.0819 0304 Disk (044452051f3e02e7963599fc8f4f3e25) C:\WINDOWS\system32\DRIVERS\disk.sys
16:23:26.0829 0304 Disk - ok
16:23:27.0440 0304 dmboot (d992fe1274bde0f84ad826acae022a41) C:\WINDOWS\system32\drivers\dmboot.sys
16:23:27.0690 0304 dmboot - ok
16:23:28.0081 0304 dmio (7c824cf7bbde77d95c08005717a95f6f) C:\WINDOWS\system32\drivers\dmio.sys
16:23:28.0121 0304 dmio - ok
16:23:28.0471 0304 dmload (e9317282a63ca4d188c0df5e09c6ac5f) C:\WINDOWS\system32\drivers\dmload.sys
16:23:28.0471 0304 dmload - ok
16:23:28.0792 0304 DMusic (8a208dfcf89792a484e76c40e5f50b45) C:\WINDOWS\system32\drivers\DMusic.sys
16:23:28.0802 0304 DMusic - ok
16:23:29.0092 0304 dpti2o - ok
16:23:29.0553 0304 drmkaud (8f5fcff8e8848afac920905fbd9d33c8) C:\WINDOWS\system32\drivers\drmkaud.sys
16:23:29.0563 0304 drmkaud - ok
16:23:29.0893 0304 E100B (3fca03cbca11269f973b70fa483c88ef) C:\WINDOWS\system32\DRIVERS\e100b325.sys
16:23:29.0934 0304 E100B - ok
16:23:30.0374 0304 Fastfat (38d332a6d56af32635675f132548343e) C:\WINDOWS\system32\drivers\Fastfat.sys
16:23:30.0424 0304 Fastfat - ok
16:23:31.0125 0304 Fdc (92cdd60b6730b9f50f6a1a0c1f8cdc81) C:\WINDOWS\system32\DRIVERS\fdc.sys
16:23:31.0195 0304 Fdc - ok
16:23:31.0886 0304 Fips (d88586381bd222408f9cf6b4d862714a) C:\WINDOWS\system32\drivers\Fips.sys
16:23:31.0916 0304 Fips ( Rootkit.Win32.ZAccess.e ) - infected
16:23:31.0916 0304 Fips - detected Rootkit.Win32.ZAccess.e (0)
16:23:32.0337 0304 Flpydisk (9d27e7b80bfcdf1cdd9b555862d5e7f0) C:\WINDOWS\system32\drivers\Flpydisk.sys
16:23:32.0337 0304 Flpydisk - ok
16:23:32.0768 0304 FltMgr (b2cf4b0786f8212cb92ed2b50c6db6b0) C:\WINDOWS\system32\drivers\fltmgr.sys
16:23:32.0808 0304 FltMgr - ok
16:23:33.0168 0304 Fs_Rec (3e1e2bd4f39b0e2b7dc4f4d2bcc2779a) C:\WINDOWS\system32\drivers\Fs_Rec.sys
16:23:33.0178 0304 Fs_Rec - ok
16:23:33.0539 0304 Ftdisk (6ac26732762483366c3969c9e4d2259d) C:\WINDOWS\system32\DRIVERS\ftdisk.sys
16:23:33.0579 0304 Ftdisk - ok
16:23:33.0899 0304 Gpc (0a02c63c8b144bd8c86b103dee7c86a2) C:\WINDOWS\system32\DRIVERS\msgpc.sys
16:23:33.0919 0304 Gpc - ok
16:23:34.0300 0304 hidusb (ccf82c5ec8a7326c3066de870c06daf1) C:\WINDOWS\system32\DRIVERS\hidusb.sys
16:23:34.0300 0304 hidusb - ok
16:23:34.0610 0304 hpn - ok
16:23:34.0931 0304 HTTP (f80a415ef82cd06ffaf0d971528ead38) C:\WINDOWS\system32\Drivers\HTTP.sys
16:23:35.0001 0304 HTTP - ok
16:23:35.0311 0304 i2omgmt - ok
16:23:35.0532 0304 i2omp - ok
16:23:35.0812 0304 i8042prt (4a0b06aa8943c1e332520f7440c0aa30) C:\WINDOWS\system32\DRIVERS\i8042prt.sys
16:23:35.0832 0304 i8042prt - ok
16:23:36.0172 0304 IBMPMDRV (293131c1da5f53cb05f75d637739d79c) C:\WINDOWS\system32\DRIVERS\ibmpmdrv.sys
16:23:36.0182 0304 IBMPMDRV - ok
16:23:36.0543 0304 Imapi (083a052659f5310dd8b6a6cb05edcf8e) C:\WINDOWS\system32\DRIVERS\imapi.sys
16:23:36.0553 0304 Imapi - ok
16:23:37.0174 0304 IMWEB51 (da6a6b30c431c75bbc441956f9dd0571) C:\WINDOWS\system32\DRIVERS\IMWEBN51.sys
16:23:37.0384 0304 IMWEB51 - ok
16:23:37.0685 0304 ini910u - ok
16:23:37.0955 0304 IntelIde (b5466a9250342a7aa0cd1fba13420678) C:\WINDOWS\system32\DRIVERS\intelide.sys
16:23:37.0955 0304 IntelIde - ok
16:23:38.0235 0304 intelppm (8c953733d8f36eb2133f5bb58808b66b) C:\WINDOWS\system32\DRIVERS\intelppm.sys
16:23:38.0245 0304 intelppm - ok
16:23:38.0616 0304 Ip6Fw (3bb22519a194418d5fec05d800a19ad0) C:\WINDOWS\system32\drivers\ip6fw.sys
16:23:38.0626 0304 Ip6Fw - ok
16:23:38.0987 0304 IpFilterDriver (731f22ba402ee4b62748adaf6363c182) C:\WINDOWS\system32\DRIVERS\ipfltdrv.sys
16:23:38.0997 0304 IpFilterDriver - ok
16:23:39.0347 0304 IpInIp (b87ab476dcf76e72010632b5550955f5) C:\WINDOWS\system32\DRIVERS\ipinip.sys
16:23:39.0357 0304 IpInIp - ok
16:23:39.0758 0304 IpNat (cc748ea12c6effde940ee98098bf96bb) C:\WINDOWS\system32\DRIVERS\ipnat.sys
16:23:39.0808 0304 IpNat - ok
16:23:40.0178 0304 IPSec (23c74d75e36e7158768dd63d92789a91) C:\WINDOWS\system32\DRIVERS\ipsec.sys
16:23:40.0208 0304 IPSec - ok
16:23:40.0579 0304 irda (aca5e7b54409f9cb5eed97ed0c81120e) C:\WINDOWS\system32\DRIVERS\irda.sys
16:23:40.0609 0304 irda - ok
16:23:40.0979 0304 IRENUM (c93c9ff7b04d772627a3646d89f7bf89) C:\WINDOWS\system32\DRIVERS\irenum.sys
16:23:40.0989 0304 IRENUM - ok
16:23:41.0400 0304 isapnp (05a299ec56e52649b1cf2fc52d20f2d7) C:\WINDOWS\system32\DRIVERS\isapnp.sys
16:23:41.0410 0304 isapnp - ok
16:23:41.0801 0304 Kbdclass (463c1ec80cd17420a542b7f36a36f128) C:\WINDOWS\system32\DRIVERS\kbdclass.sys
16:23:41.0811 0304 Kbdclass - ok
16:23:42.0281 0304 kmixer (692bcf44383d056aed41b045a323d378) C:\WINDOWS\system32\drivers\kmixer.sys
16:23:42.0281 0304 kmixer - ok
16:23:42.0652 0304 KSecDD (b467646c54cc746128904e1654c750c1) C:\WINDOWS\system32\drivers\KSecDD.sys
16:23:42.0662 0304 KSecDD - ok
16:23:42.0982 0304 lbrtfdc - ok
16:23:43.0273 0304 MBAMProtector (69a6268d7f81e53d568ab4e7e991caf3) C:\WINDOWS\system32\drivers\mbam.sys
16:23:43.0283 0304 MBAMProtector - ok
16:23:43.0653 0304 mnmdd (4ae068242760a1fb6e1a44bf4e16afa6) C:\WINDOWS\system32\drivers\mnmdd.sys
16:23:43.0653 0304 mnmdd - ok
16:23:44.0014 0304 Modem (dfcbad3cec1c5f964962ae10e0bcc8e1) C:\WINDOWS\system32\drivers\Modem.sys
16:23:44.0024 0304 Modem - ok
16:23:44.0404 0304 Mouclass (35c9e97194c8cfb8430125f8dbc34d04) C:\WINDOWS\system32\DRIVERS\mouclass.sys
16:23:44.0404 0304 Mouclass - ok
16:23:44.0755 0304 mouhid (b1c303e17fb9d46e87a98e4ba6769685) C:\WINDOWS\system32\DRIVERS\mouhid.sys
16:23:44.0765 0304 mouhid - ok
16:23:45.0195 0304 MountMgr (a80b9a0bad1b73637dbcbba7df72d3fd) C:\WINDOWS\system32\drivers\MountMgr.sys
16:23:45.0205 0304 MountMgr - ok
16:23:45.0506 0304 mraid35x - ok
16:23:45.0826 0304 MRxDAV (11d42bb6206f33fbb3ba0288d3ef81bd) C:\WINDOWS\system32\DRIVERS\mrxdav.sys
16:23:45.0876 0304 MRxDAV - ok
16:23:46.0497 0304 MRxSmb (7d304a5eb4344ebeeab53a2fe3ffb9f0) C:\WINDOWS\system32\DRIVERS\mrxsmb.sys
16:23:46.0628 0304 MRxSmb - ok
16:23:47.0028 0304 Msfs (c941ea2454ba8350021d774daf0f1027) C:\WINDOWS\system32\drivers\Msfs.sys
16:23:47.0028 0304 Msfs - ok
16:23:47.0489 0304 MSKSSRV (d1575e71568f4d9e14ca56b7b0453bf1) C:\WINDOWS\system32\drivers\MSKSSRV.sys
16:23:47.0489 0304 MSKSSRV - ok
16:23:47.0829 0304 MSPCLOCK (325bb26842fc7ccc1fcce2c457317f3e) C:\WINDOWS\system32\drivers\MSPCLOCK.sys
16:23:47.0829 0304 MSPCLOCK - ok
16:23:48.0170 0304 MSPQM (bad59648ba099da4a17680b39730cb3d) C:\WINDOWS\system32\drivers\MSPQM.sys
16:23:48.0180 0304 MSPQM - ok
16:23:48.0660 0304 mssmbios (af5f4f3f14a8ea2c26de30f7a1e17136) C:\WINDOWS\system32\DRIVERS\mssmbios.sys
16:23:48.0670 0304 mssmbios - ok
16:23:49.0031 0304 Mup (de6a75f5c270e756c5508d94b6cf68f5) C:\WINDOWS\system32\drivers\Mup.sys
16:23:49.0041 0304 Mup - ok
16:23:49.0452 0304 NDIS (1df7f42665c94b825322fae71721130d) C:\WINDOWS\system32\drivers\NDIS.sys
16:23:49.0512 0304 NDIS - ok
16:23:49.0862 0304 NdisTapi (0109c4f3850dfbab279542515386ae22) C:\WINDOWS\system32\DRIVERS\ndistapi.sys
16:23:49.0862 0304 NdisTapi - ok
16:23:50.0203 0304 Ndisuio (f927a4434c5028758a842943ef1a3849) C:\WINDOWS\system32\DRIVERS\ndisuio.sys
16:23:50.0213 0304 Ndisuio - ok
16:23:50.0583 0304 NdisWan (edc1531a49c80614b2cfda43ca8659ab) C:\WINDOWS\system32\DRIVERS\ndiswan.sys
16:23:50.0613 0304 NdisWan - ok
16:23:50.0954 0304 NDProxy (9282bd12dfb069d3889eb3fcc1000a9b) C:\WINDOWS\system32\drivers\NDProxy.sys
16:23:50.0954 0304 NDProxy - ok
16:23:51.0354 0304 NetBIOS (5d81cf9a2f1a3a756b66cf684911cdf0) C:\WINDOWS\system32\DRIVERS\netbios.sys
16:23:51.0364 0304 NetBIOS - ok
16:23:51.0765 0304 NetBT (74b2b2f5bea5e9a3dc021d685551bd3d) C:\WINDOWS\system32\DRIVERS\netbt.sys
16:23:51.0815 0304 NetBT - ok
16:23:52.0216 0304 Npfs (3182d64ae053d6fb034f44b6def8034a) C:\WINDOWS\system32\drivers\Npfs.sys
16:23:52.0226 0304 Npfs - ok
16:23:52.0586 0304 NSCIRDA (2adc0ca9945c65284b3d19bc18765974) C:\WINDOWS\system32\DRIVERS\nscirda.sys
16:23:52.0596 0304 NSCIRDA - ok
16:23:53.0327 0304 Ntfs (78a08dd6a8d65e697c18e1db01c5cdca) C:\WINDOWS\system32\drivers\Ntfs.sys
16:23:53.0507 0304 Ntfs - ok
16:23:53.0878 0304 Null (73c1e1f395918bc2c6dd67af7591a3ad) C:\WINDOWS\system32\drivers\Null.sys
16:23:53.0878 0304 Null - ok
16:23:54.0218 0304 NwlnkFlt (b305f3fad35083837ef46a0bbce2fc57) C:\WINDOWS\system32\DRIVERS\nwlnkflt.sys
16:23:54.0218 0304 NwlnkFlt - ok
16:23:54.0579 0304 NwlnkFwd (c99b3415198d1aab7227f2c88fd664b9) C:\WINDOWS\system32\DRIVERS\nwlnkfwd.sys
16:23:54.0589 0304 NwlnkFwd - ok
16:23:54.0949 0304 Parport (5575faf8f97ce5e713d108c2a58d7c7c) C:\WINDOWS\system32\DRIVERS\parport.sys
16:23:54.0970 0304 Parport - ok
16:23:55.0230 0304 PartMgr (beb3ba25197665d82ec7065b724171c6) C:\WINDOWS\system32\drivers\PartMgr.sys
16:23:55.0240 0304 PartMgr - ok
16:23:55.0550 0304 ParVdm (70e98b3fd8e963a6a46a2e6247e0bea1) C:\WINDOWS\system32\drivers\ParVdm.sys
16:23:55.0560 0304 ParVdm - ok
16:23:55.0851 0304 PCI (a219903ccf74233761d92bef471a07b1) C:\WINDOWS\system32\DRIVERS\pci.sys
16:23:55.0871 0304 PCI - ok
16:23:56.0171 0304 PCIDump - ok
16:23:56.0392 0304 PCIIde - ok
16:23:56.0692 0304 Pcmcia (9e89ef60e9ee05e3f2eef2da7397f1c1) C:\WINDOWS\system32\DRIVERS\pcmcia.sys
16:23:56.0732 0304 Pcmcia - ok
16:23:57.0042 0304 PDCOMP - ok
16:23:57.0263 0304 PDFRAME - ok
16:23:57.0473 0304 PDRELI - ok
16:23:57.0693 0304 PDRFRAME - ok
16:23:57.0914 0304 perc2 - ok
16:23:58.0144 0304 perc2hib - ok
16:23:58.0465 0304 PptpMiniport (efeec01b1d3cf84f16ddd24d9d9d8f99) C:\WINDOWS\system32\DRIVERS\raspptp.sys
16:23:58.0485 0304 PptpMiniport - ok
16:23:58.0875 0304 PSched (09298ec810b07e5d582cb3a3f9255424) C:\WINDOWS\system32\DRIVERS\psched.sys
16:23:58.0895 0304 PSched - ok
16:23:59.0246 0304 Ptilink (80d317bd1c3dbc5d4fe7b1678c60cadd) C:\WINDOWS\system32\DRIVERS\ptilink.sys
16:23:59.0256 0304 Ptilink - ok
16:23:59.0526 0304 ql1080 - ok
16:23:59.0746 0304 Ql10wnt - ok
16:23:59.0957 0304 ql12160 - ok
16:24:00.0177 0304 ql1240 - ok
16:24:00.0397 0304 ql1280 - ok
16:24:00.0648 0304 RasAcd (fe0d99d6f31e4fad8159f690d68ded9c) C:\WINDOWS\system32\DRIVERS\rasacd.sys
16:24:00.0658 0304 RasAcd - ok
16:24:00.0948 0304 Rasirda (0207d26ddf796a193ccd9f83047bb5fc) C:\WINDOWS\system32\DRIVERS\rasirda.sys
16:24:00.0958 0304 Rasirda - ok
16:24:01.0329 0304 Rasl2tp (11b4a627bc9614b885c4969bfa5ff8a6) C:\WINDOWS\system32\DRIVERS\rasl2tp.sys
16:24:01.0349 0304 Rasl2tp - ok
16:24:01.0719 0304 RasPppoe (5bc962f2654137c9909c3d4603587dee) C:\WINDOWS\system32\DRIVERS\raspppoe.sys
16:24:01.0729 0304 RasPppoe - ok
16:24:02.0130 0304 Raspti (fdbb1d60066fcfbb7452fd8f9829b242) C:\WINDOWS\system32\DRIVERS\raspti.sys
16:24:02.0130 0304 Raspti - ok
16:24:02.0520 0304 Rdbss (7ad224ad1a1437fe28d89cf22b17780a) C:\WINDOWS\system32\DRIVERS\rdbss.sys
16:24:02.0570 0304 Rdbss - ok
16:24:02.0921 0304 RDPCDD (4912d5b403614ce99c28420f75353332) C:\WINDOWS\system32\DRIVERS\RDPCDD.sys
16:24:02.0931 0304 RDPCDD - ok
16:24:03.0312 0304 rdpdr (15cabd0f7c00c47c70124907916af3f1) C:\WINDOWS\system32\DRIVERS\rdpdr.sys
16:24:03.0372 0304 rdpdr - ok
16:24:03.0782 0304 RDPWD (fc105dd312ed64eb66bff111e8ec6eac) C:\WINDOWS\system32\drivers\RDPWD.sys
16:24:03.0802 0304 RDPWD - ok
16:24:04.0193 0304 redbook (f828dd7e1419b6653894a8f97a0094c5) C:\WINDOWS\system32\DRIVERS\redbook.sys
16:24:04.0213 0304 redbook - ok
16:24:04.0643 0304 Secdrv (90a3935d05b494a5a39d37e71f09a677) C:\WINDOWS\system32\DRIVERS\secdrv.sys
16:24:04.0653 0304 Secdrv - ok
16:24:05.0004 0304 serenum (0f29512ccd6bead730039fb4bd2c85ce) C:\WINDOWS\system32\DRIVERS\serenum.sys
16:24:05.0004 0304 serenum - ok
16:24:05.0284 0304 Serial (cca207a8896d4c6a0c9ce29a4ae411a7) C:\WINDOWS\system32\DRIVERS\serial.sys
16:24:05.0304 0304 Serial - ok
16:24:05.0665 0304 Sfloppy (8e6b8c671615d126fdc553d1e2de5562) C:\WINDOWS\system32\drivers\Sfloppy.sys
16:24:05.0675 0304 Sfloppy - ok
16:24:05.0975 0304 Simbad - ok
16:24:06.0196 0304 Sparrow - ok
16:24:06.0446 0304 splitter (ab8b92451ecb048a4d1de7c3ffcb4a9f) C:\WINDOWS\system32\drivers\splitter.sys
16:24:06.0456 0304 splitter - ok
16:24:06.0726 0304 sr (76bb022c2fb6902fd5bdd4f78fc13a5d) C:\WINDOWS\system32\DRIVERS\sr.sys
16:24:06.0746 0304 sr - ok
16:24:07.0277 0304 Srv (47ddfc2f003f7f9f0592c6874962a2e7) C:\WINDOWS\system32\DRIVERS\srv.sys
16:24:07.0377 0304 Srv - ok
16:24:07.0718 0304 swenum (3941d127aef12e93addf6fe6ee027e0f) C:\WINDOWS\system32\DRIVERS\swenum.sys
16:24:07.0728 0304 swenum - ok
16:24:07.0968 0304 swmidi (8ce882bcc6cf8a62f2b2323d95cb3d01) C:\WINDOWS\system32\drivers\swmidi.sys
16:24:07.0988 0304 swmidi - ok
16:24:08.0319 0304 symc810 - ok
16:24:08.0529 0304 symc8xx - ok
16:24:08.0749 0304 sym_hi - ok
16:24:08.0970 0304 sym_u3 - ok
16:24:09.0320 0304 SynTP (1cde0a5c0416187b9b89e03980c6e8de) C:\WINDOWS\system32\DRIVERS\SynTP.sys
16:24:09.0410 0304 SynTP - ok
16:24:09.0791 0304 sysaudio (8b83f3ed0f1688b4958f77cd6d2bf290) C:\WINDOWS\system32\drivers\sysaudio.sys
16:24:09.0811 0304 sysaudio - ok
16:24:10.0302 0304 Tcpip (9aefa14bd6b182d61e3119fa5f436d3d) C:\WINDOWS\system32\DRIVERS\tcpip.sys
16:24:10.0392 0304 Tcpip - ok
16:24:10.0732 0304 TDPIPE (6471a66807f5e104e4885f5b67349397) C:\WINDOWS\system32\drivers\TDPIPE.sys
16:24:10.0742 0304 TDPIPE - ok
16:24:11.0083 0304 TDTCP (c56b6d0402371cf3700eb322ef3aaf61) C:\WINDOWS\system32\drivers\TDTCP.sys
16:24:11.0093 0304 TDTCP - ok
16:24:11.0473 0304 TermDD (88155247177638048422893737429d9e) C:\WINDOWS\system32\DRIVERS\termdd.sys
16:24:11.0483 0304 TermDD - ok
16:24:11.0804 0304 TosIde - ok
16:24:12.0114 0304 Udfs (5787b80c2e3c5e2f56c2a233d91fa2c9) C:\WINDOWS\system32\drivers\Udfs.sys
16:24:12.0144 0304 Udfs - ok
16:24:12.0475 0304 ultra - ok
16:24:12.0875 0304 Update (402ddc88356b1bac0ee3dd1580c76a31) C:\WINDOWS\system32\DRIVERS\update.sys
16:24:12.0995 0304 Update - ok
16:24:13.0406 0304 usbehci (65dcf09d0e37d4c6b11b5b0b76d470a7) C:\WINDOWS\system32\DRIVERS\usbehci.sys
16:24:13.0416 0304 usbehci - ok
16:24:13.0787 0304 usbhub (1ab3cdde553b6e064d2e754efe20285c) C:\WINDOWS\system32\DRIVERS\usbhub.sys
16:24:13.0807 0304 usbhub - ok
16:24:14.0177 0304 usbprint (a717c8721046828520c9edf31288fc00) C:\WINDOWS\system32\DRIVERS\usbprint.sys
16:24:14.0187 0304 usbprint - ok
16:24:14.0548 0304 USBSTOR (a32426d9b14a089eaa1d922e0c5801a9) C:\WINDOWS\system32\DRIVERS\USBSTOR.SYS
16:24:14.0558 0304 USBSTOR - ok
16:24:14.0908 0304 usbuhci (26496f9dee2d787fc3e61ad54821ffe6) C:\WINDOWS\system32\DRIVERS\usbuhci.sys
16:24:14.0918 0304 usbuhci - ok
16:24:15.0269 0304 VgaSave (0d3a8fafceacd8b7625cd549757a7df1) C:\WINDOWS\System32\drivers\vga.sys
16:24:15.0279 0304 VgaSave - ok
16:24:15.0569 0304 ViaIde - ok
16:24:15.0870 0304 VolSnap (4c8fcb5cc53aab716d810740fe59d025) C:\WINDOWS\system32\drivers\VolSnap.sys
16:24:15.0890 0304 VolSnap - ok
16:24:16.0280 0304 Wanarp (e20b95baedb550f32dd489265c1da1f6) C:\WINDOWS\system32\DRIVERS\wanarp.sys
16:24:16.0290 0304 Wanarp - ok
16:24:16.0591 0304 WDICA - ok
16:24:16.0881 0304 wdmaud (6768acf64b18196494413695f0c3a00f) C:\WINDOWS\system32\drivers\wdmaud.sys
16:24:16.0911 0304 wdmaud - ok
16:24:17.0402 0304 WpdUsb (cf4def1bf66f06964dc0d91844239104) C:\WINDOWS\system32\DRIVERS\wpdusb.sys
16:24:17.0422 0304 WpdUsb - ok
16:24:17.0812 0304 WudfPf (f15feafffbb3644ccc80c5da584e6311) C:\WINDOWS\system32\DRIVERS\WudfPf.sys
16:24:17.0842 0304 WudfPf - ok
16:24:18.0223 0304 WudfRd (28b524262bce6de1f7ef9f510ba3985b) C:\WINDOWS\system32\DRIVERS\wudfrd.sys
16:24:18.0253 0304 WudfRd - ok
16:24:18.0333 0304 MBR (0x1B8) (8f558eb6672622401da993e1e865c861) \Device\Harddisk0\DR0
16:24:18.0674 0304 \Device\Harddisk0\DR0 - ok
16:24:18.0694 0304 Boot (0x1200) (aa205cc8f04b5682c187f8a69a248fc5) \Device\Harddisk0\DR0\Partition0
16:24:18.0694 0304 \Device\Harddisk0\DR0\Partition0 - ok
16:24:18.0704 0304 ============================================================
16:24:18.0704 0304 Scan finished
16:24:18.0704 0304 ============================================================
16:24:18.0734 0248 Detected object count: 2
16:24:18.0734 0248 Actual detected object count: 2
16:26:03.0284 0248 C:\WINDOWS\2775264365:2463339610.exe - copied to quarantine
16:26:03.0284 0248 6d2c6ba5 ( HiddenFile.Multi.Generic ) - User select action: Quarantine
16:26:03.0685 0248 VerifyFileNameVersionInfo: GetFileVersionInfoSizeW(C:\WINDOWS\system32\drivers\fips.sys) error 1813
16:26:45.0975 0248 Backup copy found, using it..
16:26:46.0116 0248 C:\WINDOWS\system32\drivers\Fips.sys - will be cured on reboot
16:26:46.0116 0248 Fips ( Rootkit.Win32.ZAccess.e ) - User select action: Cure
16:26:53.0777 2992 Deinitialize success

#5 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,490 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:11:26 AM

Posted 03 October 2011 - 07:58 PM

Hello, that was a real good kill.
Rerun MBAM (MalwareBytes) like this:

Open MBAM in normal mode and click Update tab, select Check for Updates,when done
click Scanner tab,select Quick scan and scan (normal mode).
After scan click Remove Selected, Post new scan log and Reboot into normal mode.



I'd like us to scan your machine with ESET OnlineScan
  • Hold down Control and click on the following link to open ESET OnlineScan in a new window.
    ESET OnlineScan
  • Click the Posted Image button.
  • For alternate browsers only: (Microsoft Internet Explorer users can skip these steps)
    • Click on Posted Image to download the ESET Smart Installer. Save it to your desktop.
    • Double click on the Posted Image icon on your desktop.
  • Check Posted Image
  • Click the Posted Image button.
  • Accept any security warnings from your browser.
  • Under scan settings, check Posted Image and check Remove found threats
  • Click Advanced settings and select the following:
    • Scan potentially unwanted applications
    • Scan for potentially unsafe applications
    • Enable Anti-Stealth technology
  • ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this can take some time.
  • When the scan completes, push Posted Image
  • Push Posted Image, and save the file to your desktop using a unique name, such as ESETScan. Include the contents of this report in your next reply.
  • Push the Posted Image button.
  • Push Posted Image


NOTE: In some instances if no malware is found there will be no log produced.

Please ask any needed questions,post logs and Let us know how the PC is running now.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#6 ticomp

ticomp
  • Topic Starter

  • Members
  • 9 posts
  • OFFLINE
  •  
  • Local time:07:26 AM

Posted 04 October 2011 - 08:50 PM

Thanks for the fast reply. Ok here is the malware scan log.

Malwarebytes' Anti-Malware 1.51.2.1300
www.malwarebytes.org

Database version: 7862

Windows 5.1.2600 Service Pack 3
Internet Explorer 8.0.6001.18702

10/4/2011 6:40:05 PM
mbam-log-2011-10-04 (18-40-05).txt

Scan type: Quick scan
Objects scanned: 230489
Time elapsed: 20 minute(s), 15 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 3

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
c:\documents and settings\wing.u-9bd8b994be274\local settings\Temp\0.8064486261197865.exe (Rootkit.0Access) -> Quarantined and deleted successfully.
c:\documents and settings\Wing\Cookies\MM2048.DAT (Trojan.Agent) -> Quarantined and deleted successfully.
c:\documents and settings\Wing\Cookies\MM256.DAT (Trojan.Agent) -> Quarantined and deleted successfully.

#7 ticomp

ticomp
  • Topic Starter

  • Members
  • 9 posts
  • OFFLINE
  •  
  • Local time:07:26 AM

Posted 04 October 2011 - 08:51 PM

Here is the Eset scan log.

C:\Documents and Settings\NetworkService.NT AUTHORITY\Local Settings\Temporary Internet Files\Content.IE5\KFF518K8\cde3b[1].pdf JS/Exploit.Pdfka.PEJ.Gen trojan cleaned by deleting - quarantined
C:\TDSSKiller_Quarantine\03.10.2011_16.22.45\susp0000\svc0000\tsk0000.dta a variant of Win32/Sirefef.CR trojan cleaned by deleting - quarantined
C:\TDSSKiller_Quarantine\24.09.2011_22.59.49\susp0000\svc0000\tsk0000.dta a variant of Win32/Sirefef.CR trojan cleaned by deleting - quarantined
C:\WINDOWS\2775264365:2463339610.exe a variant of Win32/Sirefef.CR trojan cleaned by deleting - quarantined
C:\WINDOWS\Temp\A9R4684.tmp JS/Exploit.Pdfka.PEJ.Gen trojan cleaned by deleting - quarantined

#8 ticomp

ticomp
  • Topic Starter

  • Members
  • 9 posts
  • OFFLINE
  •  
  • Local time:07:26 AM

Posted 04 October 2011 - 09:17 PM

The redirects have stop. However, I noticed that some of my programs are taking a bit longer to open.

#9 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,490 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:11:26 AM

Posted 04 October 2011 - 09:21 PM

Hello, it looks much better.
I want to check for exploitable Apps as we found an exploit.

The redirects are stopped now,correct?



Please download MiniToolBox, save it to your desktop and run it.

Checkmark the following checkboxes:
  • Flush DNS
  • Report IE Proxy Settings
  • Reset IE Proxy Settings
  • Report FF Proxy Settings
  • Reset FF Proxy Settings
  • List content of Hosts
  • List IP configuration
  • List Winsock Entries
  • List last 10 Event Viewer log
  • List Installed Programs
  • List Users, Partitions and Memory size.
  • List Minidump Files
Click Go and post the result (Result.txt). A copy of Result.txt will be saved in the same directory the tool is run.

Note: When using "Reset FF Proxy Settings" option Firefox should be closed.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#10 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,490 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:11:26 AM

Posted 04 October 2011 - 09:32 PM

Some slowness is due to the cleaning and should be back in a day.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#11 ticomp

ticomp
  • Topic Starter

  • Members
  • 9 posts
  • OFFLINE
  •  
  • Local time:07:26 AM

Posted 04 October 2011 - 09:36 PM

Yes, the redirects have stopped. Both IE and Firefox seems to be working normally. So far I tested a few searches using yahoo and google.
minitoolbox log

MiniToolBox by Farbar
Ran by Wing (administrator) on 04-10-2011 at 19:25:38
Microsoft Windows XP Service Pack 3 (X86)

***************************************************************************

========================= Flush DNS: ===================================


Windows IP Configuration



Successfully flushed the DNS Resolver Cache.


========================= IE Proxy Settings: ==============================

Proxy is not enabled.
No Proxy Server is set.

"Reset IE Proxy Settings": IE Proxy Settings were reset.

========================= FF Proxy Settings: ==============================


"Reset FF Proxy Settings": Firefox Proxy settings were reset.

Hosts file not detected in the default directory
========================= IP Configuration: ================================

# ----------------------------------
# Interface IP Configuration
# ----------------------------------
pushd interface ip


# Interface IP Configuration for "Local Area Connection"

set address name="Local Area Connection" source=dhcp
set dns name="Local Area Connection" source=static addr=8.8.8.8 register=PRIMARY
add dns name="Local Area Connection" addr=8.8.4.4 index=2
set wins name="Local Area Connection" source=dhcp


popd
# End of interface IP configuration




Windows IP Configuration



Host Name . . . . . . . . . . . . : u-9bd8b994be274

Primary Dns Suffix . . . . . . . :

Node Type . . . . . . . . . . . . : Unknown

IP Routing Enabled. . . . . . . . : No

WINS Proxy Enabled. . . . . . . . : No

DNS Suffix Search List. . . . . . : hsd1.ca.comcast.net.



Ethernet adapter Local Area Connection:



Connection-specific DNS Suffix . : hsd1.ca.comcast.net.

Description . . . . . . . . . . . : Intel® PRO/100 VE Network Connection

Physical Address. . . . . . . . . : 00-09-6B-02-15-EF

Dhcp Enabled. . . . . . . . . . . : Yes

Autoconfiguration Enabled . . . . : Yes

IP Address. . . . . . . . . . . . : 192.168.0.103

Subnet Mask . . . . . . . . . . . : 255.255.255.0

Default Gateway . . . . . . . . . : 192.168.0.1

DHCP Server . . . . . . . . . . . : 192.168.0.1

DNS Servers . . . . . . . . . . . : 8.8.8.8

8.8.4.4

Lease Obtained. . . . . . . . . . : Tuesday, October 04, 2011 7:09:51 PM

Lease Expires . . . . . . . . . . : Tuesday, October 11, 2011 7:09:51 PM

Server: google-public-dns-a.google.com
Address: 8.8.8.8

Name: google.com
Addresses: 74.125.224.112, 74.125.224.113, 74.125.224.116, 74.125.224.115
74.125.224.114



Pinging google.com [74.125.224.112] with 32 bytes of data:



Reply from 74.125.224.112: bytes=32 time=19ms TTL=54

Reply from 74.125.224.112: bytes=32 time=18ms TTL=54



Ping statistics for 74.125.224.112:

Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),

Approximate round trip times in milli-seconds:

Minimum = 18ms, Maximum = 19ms, Average = 18ms

Server: google-public-dns-a.google.com
Address: 8.8.8.8

Name: yahoo.com
Addresses: 67.195.160.76, 72.30.2.43, 98.137.149.56, 98.139.180.149
209.191.122.70



Pinging yahoo.com [67.195.160.76] with 32 bytes of data:



Reply from 67.195.160.76: bytes=32 time=88ms TTL=48

Reply from 67.195.160.76: bytes=32 time=89ms TTL=48



Ping statistics for 67.195.160.76:

Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),

Approximate round trip times in milli-seconds:

Minimum = 88ms, Maximum = 89ms, Average = 88ms



Pinging 127.0.0.1 with 32 bytes of data:



Reply from 127.0.0.1: bytes=32 time<1ms TTL=128

Reply from 127.0.0.1: bytes=32 time<1ms TTL=128



Ping statistics for 127.0.0.1:

Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),

Approximate round trip times in milli-seconds:

Minimum = 0ms, Maximum = 0ms, Average = 0ms

===========================================================================
Interface List
0x1 ........................... MS TCP Loopback interface
0x2 ...00 09 6b 02 15 ef ...... Intel® PRO/100 VE Network Connection - Packet Scheduler Miniport
===========================================================================
===========================================================================
Active Routes:
Network Destination Netmask Gateway Interface Metric
0.0.0.0 0.0.0.0 192.168.0.1 192.168.0.103 20
127.0.0.0 255.0.0.0 127.0.0.1 127.0.0.1 1
192.168.0.0 255.255.255.0 192.168.0.103 192.168.0.103 20
192.168.0.103 255.255.255.255 127.0.0.1 127.0.0.1 20
192.168.0.255 255.255.255.255 192.168.0.103 192.168.0.103 20
224.0.0.0 240.0.0.0 192.168.0.103 192.168.0.103 20
255.255.255.255 255.255.255.255 192.168.0.103 192.168.0.103 1
Default Gateway: 192.168.0.1
===========================================================================
Persistent Routes:
None
========================= Winsock entries =====================================

Catalog5 01 mswsock.dll [File Not found] ()
Catalog5 02 C:\Windows\System32\winrnr.dll [16896] (Microsoft Corporation)
Catalog5 03 mswsock.dll [File Not found] ()
Catalog9 01 C:\Windows\system32\mswsock.dll [245248] (Microsoft Corporation)
Catalog9 02 mswsock.dll [File Not found] ()
Catalog9 03 mswsock.dll [File Not found] ()
Catalog9 04 mswsock.dll [File Not found] ()
Catalog9 05 mswsock.dll [File Not found] ()
Catalog9 06 mswsock.dll [File Not found] ()
Catalog9 07 mswsock.dll [File Not found] ()
Catalog9 08 mswsock.dll [File Not found] ()
Catalog9 09 mswsock.dll [File Not found] ()
Catalog9 10 mswsock.dll [File Not found] ()
Catalog9 11 mswsock.dll [File Not found] ()
Catalog9 12 mswsock.dll [File Not found] ()
Catalog9 13 mswsock.dll [File Not found] ()
Catalog9 14 mswsock.dll [File Not found] ()
Catalog9 15 mswsock.dll [File Not found] ()
Catalog9 16 mswsock.dll [File Not found] ()
Catalog9 17 mswsock.dll [File Not found] ()
Catalog9 18 mswsock.dll [File Not found] ()

========================= Event log errors: ===============================

Application errors:
==================
Error: (10/03/2011 00:56:47 AM) (Source: crypt32) (User: )
Description: Failed auto update retrieval of third-party root list sequence number from: <http://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootseq.txt> with error: This network connection does not exist.

Error: (10/03/2011 00:56:47 AM) (Source: crypt32) (User: )
Description: Failed auto update retrieval of third-party root list sequence number from: <http://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootseq.txt> with error: The connection with the server was terminated abnormally

Error: (10/02/2011 00:30:17 AM) (Source: crypt32) (User: )
Description: Failed auto update retrieval of third-party root list sequence number from: <http://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootseq.txt> with error: This network connection does not exist.

Error: (10/02/2011 00:30:16 AM) (Source: crypt32) (User: )
Description: Failed auto update retrieval of third-party root list sequence number from: <http://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootseq.txt> with error: The connection with the server was terminated abnormally

Error: (09/30/2011 04:48:41 AM) (Source: Application Hang) (User: )
Description: Hanging application HiJackThis.exe, version 2.0.0.4, hang module hungapp, version 0.0.0.0, hang address 0x00000000.

Error: (09/30/2011 03:11:22 AM) (Source: Application Hang) (User: )
Description: Hanging application gmer.exe, version 1.0.15.15641, hang module hungapp, version 0.0.0.0, hang address 0x00000000.

Error: (09/24/2011 11:06:12 PM) (Source: crypt32) (User: )
Description: Failed auto update retrieval of third-party root list sequence number from: <http://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootseq.txt> with error: The connection with the server was terminated abnormally

Error: (09/24/2011 10:59:41 PM) (Source: crypt32) (User: )
Description: Failed auto update retrieval of third-party root list sequence number from: <http://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootseq.txt> with error: The connection with the server was terminated abnormally

Error: (09/19/2011 09:27:40 PM) (Source: Application Error) (User: )
Description: Faulting application iexplore.exe, version 8.0.6001.18702, faulting module mshtml.dll, version 8.0.6001.19120, fault address 0x00067b98.
Processing media-specific event for [iexplore.exe!ws!]

Error: (08/14/2011 03:07:36 PM) (Source: Application Error) (User: )
Description: Faulting application iexplore.exe, version 8.0.6001.18702, faulting module mshtml.dll, version 8.0.6001.19088, fault address 0x000678d8.
Processing media-specific event for [iexplore.exe!ws!]


System errors:
=============
Error: (10/04/2011 07:12:49 PM) (Source: 0) (User: )
Description: \Device\Harddisk0\D

Error: (10/04/2011 06:47:13 PM) (Source: 0) (User: )
Description: \Device\Harddisk0\D

Error: (10/04/2011 06:18:44 PM) (Source: 0) (User: )
Description: Intel® PRO/100 VE Network Connection

Error: (10/04/2011 06:16:00 PM) (Source: 0) (User: )
Description: \Device\Harddisk0\D

Error: (10/04/2011 01:42:47 AM) (Source: 0) (User: )
Description: Intel® PRO/100 VE Network Connection

Error: (10/04/2011 01:41:50 AM) (Source: 0) (User: )
Description: \Device\Harddisk0\D

Error: (10/03/2011 11:24:18 PM) (Source: 0) (User: )
Description: \Device\Harddisk0\D

Error: (10/03/2011 11:15:02 PM) (Source: 0) (User: )
Description: Intel® PRO/100 VE Network Connection

Error: (10/03/2011 11:09:52 PM) (Source: 0) (User: )
Description: \Device\Harddisk0\D

Error: (10/03/2011 11:09:37 PM) (Source: Dhcp) (User: )
Description: The IP address lease 192.168.0.103 for the Network Card with network address 00096B0215EF has been
denied by the DHCP server 192.168.0.1 (The DHCP Server sent a DHCPNACK message).


Microsoft Office Sessions:
=========================
Error: (10/03/2011 00:56:47 AM) (Source: crypt32)(User: )
Description: http://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootseq.txtThis network connection does not exist.

Error: (10/03/2011 00:56:47 AM) (Source: crypt32)(User: )
Description: http://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootseq.txtThe connection with the server was terminated abnormally

Error: (10/02/2011 00:30:17 AM) (Source: crypt32)(User: )
Description: http://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootseq.txtThis network connection does not exist.

Error: (10/02/2011 00:30:16 AM) (Source: crypt32)(User: )
Description: http://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootseq.txtThe connection with the server was terminated abnormally

Error: (09/30/2011 04:48:41 AM) (Source: Application Hang)(User: )
Description: HiJackThis.exe2.0.0.4hungapp0.0.0.000000000

Error: (09/30/2011 03:11:22 AM) (Source: Application Hang)(User: )
Description: gmer.exe1.0.15.15641hungapp0.0.0.000000000

Error: (09/24/2011 11:06:12 PM) (Source: crypt32)(User: )
Description: http://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootseq.txtThe connection with the server was terminated abnormally

Error: (09/24/2011 10:59:41 PM) (Source: crypt32)(User: )
Description: http://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootseq.txtThe connection with the server was terminated abnormally

Error: (09/19/2011 09:27:40 PM) (Source: Application Error)(User: )
Description: iexplore.exe8.0.6001.18702mshtml.dll8.0.6001.1912000067b98

Error: (08/14/2011 03:07:36 PM) (Source: Application Error)(User: )
Description: iexplore.exe8.0.6001.18702mshtml.dll8.0.6001.19088000678d8


=========================== Installed Programs ============================

Acrobat.com (Version: 0.0.0)
Acrobat.com (Version: 1.1.377)
Adobe AIR (Version: 1.0.4990)
Adobe AIR (Version: 1.0.8.4990)
Adobe Flash Player 10 ActiveX (Version: 10.2.159.1)
Adobe Flash Player 10 Plugin (Version: 10.3.181.26)
Adobe Reader 9 (Version: 9.0.0)
Adobe Shockwave Player 11.5 (Version: 11.5.9.615)
Agere Systems AC'97 Modem (Version: 2.1.31)
AIM 7
ATI Display Driver (Version: 7.983-040210m-013821C-IBM)
Brother HL-5040
Download Updater (AOL LLC)
ESET Online Scanner v3
GOM Player
HiJackThis (Version: 1.0.0)
IBM ThinkPad Power Management Driver (Version: 1.25.01)
IBM ThinkPad UltraNav Driver
Install CHEM210 Skills
Java Auto Updater (Version: 2.0.2.1)
Java™ 6 Update 20 (Version: 6.0.200)
Malwarebytes' Anti-Malware version 1.51.2.1300 (Version: 1.51.2.1300)
Media Player Codec Pack 3.3.1
Microsoft Compression Client Pack 1.0 for Windows XP (Version: 1)
Microsoft Internationalized Domain Names Mitigation APIs
Microsoft National Language Support Downlevel APIs
Microsoft Silverlight (Version: 4.0.60531.0)
Microsoft User-Mode Driver Framework Feature Pack 1.0
Mozilla Firefox 7.0.1 (x86 en-US) (Version: 7.0.1)
OpenOffice.org 3.2 (Version: 3.2.9502)
Search Settings 1.2
WebFldrs XP (Version: 9.50.7523)
Windows Genuine Advantage Notifications (KB905474) (Version: 1.9.0040.0)
Windows Genuine Advantage Validation Tool (KB892130)
Windows Genuine Advantage Validation Tool (KB892130) (Version: 1.7.0069.2)
Windows Internet Explorer 7 (Version: 20070813.185237)
Windows Internet Explorer 8 (Version: 20090308.140743)
Windows Media Format 11 runtime
Windows Media Player 11
Windows XP Service Pack 3 (Version: 20080414.031525)
WinZip 12.0 (Version: 12.0.8252)

========================= Memory info: ===================================

Percentage of memory in use: 66%
Total physical RAM: 510.98 MB
Available physical RAM: 172.08 MB
Total Pagefile: 1249.59 MB
Available Pagefile: 915.9 MB
Total Virtual: 2047.88 MB
Available Virtual: 1988.37 MB

========================= Partitions: =====================================

1 Drive c: () (Fixed) (Total:37.26 GB) (Free:15.33 GB) NTFS

========================= Users: ========================================

User accounts for \\U-9BD8B994BE274

Administrator Guest HelpAssistant
SUPPORT_388945a0 Wing

========================= Minidump Files ==================================

No minidump file found

**** End of log ****

#12 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,490 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:11:26 AM

Posted 04 October 2011 - 10:08 PM

OK, look s good lets cleanup.

We need to update Java and Adobe Reader.
Important Note: Your version of Java is out of date. Older versions have vulnerabilities that malicious sites can use to exploit and infect your system.Please follow these steps to remove older version Java components and update:
  • Download the latest version of Java Runtime Environment (JRE) Version 7 and save it to your desktop.
  • Look for "Java Platform, Standard Edition".
  • Click the "Download JRE" button to the right.
  • Read the License Agreement, and then check the box that says: "Accept License Agreement".
  • From the list, select your OS and Platform (32-bit or 64-bit).
  • If a download for an Offline Installation is available, it is recommended to choose that and save the file to your desktop.
  • Close any programs you may have running - especially your web browser.
Go to Posted Image > Control Panel, double-click on Add/Remove Programs or Programs and Features in Vista/Windows 7 and remove all older versions of Java.
  • Check (highlight) any item with Java Runtime Environment (JRE or J2SE) in the name.
  • Click the Remove or Change/Remove button and follow the onscreen instructions for the Java uninstaller.
  • Repeat as many times as necessary to remove each Java versions.
  • Reboot your computer once all Java components are removed.
  • Then from your desktop double-click on jre-7-windows-i586.exe to install the newest version.
  • If using Windows 7 or Vista and the installer refuses to launch due to insufficient user permissions, then Run As Administrator.
  • When the Java Setup - Welcome window opens, click the Install > button.
  • If offered to install a Toolbar, just uncheck the box before continuing unless you want it.
  • The McAfee Security Scan Plus tool is installed by default unless you uncheck the McAfee installation box when updating Java.
Note: The Java Quick Starter (JQS.exe) adds a service to improve the initial startup time of Java applets and applications but it's not necessary.
To disable the JQS service if you don't want to use it:
  • Go to Start > Control Panel > Java > Advanced > Miscellaneous and uncheck the box for Java Quick Starter.
  • Click Ok and reboot your computer.


Similarly Update to Adobe Reader X (10.1.0)
Note UN check the box so you do not install the toolbar,unless you really want it..

Free! Google Toolbar search Google from any web page, block pop-ups

Yes, install Google Toolbar - optional[/i



If there are no more problems or signs of infection, you should Create a New Restore Point to prevent possible reinfection from an old one. Some of the malware you picked up could have been saved in System Restore. Since this is a protected directory your tools cannot access to delete these files, they sometimes can reinfect your system if you accidentally use an old restore point. Setting a new restore point AFTER cleaning your system will help prevent this and enable your computer to "roll-back" to a clean working state.

The easiest and safest way to do this is:
  • Go to Start > Programs > Accessories > System Tools and click "System Restore".
  • Choose the radio button marked "Create a Restore Point" on the first screen then click "Next". Give the R.P. a name, then click "Create". The new point will be stamped with the current date and time. Keep a log of this so you can find it easily should you need to use System Restore.
  • Then use Disk Cleanup to remove all but the most recently created Restore Point.
  • Go to Start > Run and type: Cleanmgr
  • Click "Ok". Disk Cleanup will scan your files for several minutes, then open.
  • Click the "More Options" tab, then click the "Clean up" button under System Restore.
  • Click Ok. You will be prompted with "Are you sure you want to delete all but the most recent restore point?"
  • Click Yes, then click Ok.
  • Click Yes again when prompted with "[i]Are you sure you want to perform these actions?"
  • Disk Cleanup will remove the files and close automatically.
Vista Users can refer to these links: Create a New Restore Point and Disk Cleanup.

Tips to protect yourself against malware and reduce the potential for re-infection:Avoid gaming sites, pirated software, cracking tools, keygens, and peer-to-peer (P2P) file sharing programs. They are a security risk which can make your computer susceptible to a smörgåsbord of malware infections, remote attacks, exposure of personal information, and identity theft. Many malicious worms and Trojans spread across P2P file sharing networks, gaming and underground sites. Users visiting such pages may see innocuous-looking banner ads containing code which can trigger pop-up ads and malicious Flash ads that install viruses, Trojans and spyware. Ads are a target for hackers because they offer a stealthy way to distribute malware to a wide range of Internet users. The best way to reduce the risk of infection is to avoid these types of web sites and not use any P2P applications. Read P2P Software User Advisories and Risks of File-Sharing Technology.

Keeping Autorun enabled on USB and other removable drives has become a significant security risk due to the increasing number of malware variants that can infect them and transfer the infection to your computer. To learn more about this risk, please read:
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#13 ticomp

ticomp
  • Topic Starter

  • Members
  • 9 posts
  • OFFLINE
  •  
  • Local time:07:26 AM

Posted 04 October 2011 - 10:21 PM

Again, Thank you so much for your help boopme. Your fast replies and simple step by step instructions were very help.

#14 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,490 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:11:26 AM

Posted 04 October 2011 - 10:24 PM

You're welcome and thank you !!
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users