Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Ping.exe plus redirect


  • This topic is locked This topic is locked
23 replies to this topic

#1 edp333

edp333

  • Members
  • 66 posts
  • OFFLINE
  •  
  • Local time:06:16 AM

Posted 21 November 2011 - 11:23 AM

XP Pro SP2 1.4 Ghz 625 RAM

I closed a popup window and began hearing the download sound even though the download window is not open. A process names ping.exe is using a lot of resources and is located in the Windows pre-fetch folder.I updated MBAM and it temoved a trojan. Superantispyware delets a lot of spyware, but will not touch the ping.exe.Norton Enterprise Edition does not find any threats.I did a restore to a date before the malware, but it still reinstalls itself.

This program deletes rkill from my desktop and restarts the computer when gmer is ran.Gmer must be reinstalled after the restart.The DDS log is pasted below and the attch log is attached.

.
DDS (Ver_2011-08-26.01) - NTFSx86
Internet Explorer: 8.0.6001.18702 BrowserJavaVersion: 1.6.0_23
Run by Me at 15:47:27 on 2011-11-20
Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.511.169 [GMT -6:00]
.
.
============== Running Processes ===============
.
C:\WINDOWS\system32\svchost -k DcomLaunch
svchost.exe
C:\WINDOWS\System32\svchost.exe -k netsvcs
svchost.exe
svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\Explorer.EXE
C:\BITWARE\NT\bwprnmon.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Documents and Settings\Me\Local Settings\Application Data\Facebook\Update\FacebookUpdate.exe
C:\Program Files\TechSmith\Jing\Jing.exe
C:\Documents and Settings\Me\Local Settings\Application Data\Akamai\netsession_win.exe
C:\WINDOWS\system32\ntvdm.exe
C:\Documents and Settings\Me\Local Settings\Application Data\Akamai\netsession_win.exe
svchost.exe
C:\WINDOWS\System32\svchost.exe -k Akamai
C:\WINDOWS\system32\svchost.exe -k hpdevmgmt
C:\WINDOWS\System32\svchost.exe -k HPZ12
C:\WINDOWS\System32\svchost.exe -k HPZ12
C:\WINDOWS\System32\svchost.exe -k imgsvc
C:\WINDOWS\system32\devldr32.exe
C:\WINDOWS\system32\wuauclt.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\WINDOWS\system32\wscntfy.exe
.
============== Pseudo HJT Report ===============
.
uStart Page = hxxp://www.yahoo.com/
BHO: {02478D38-C3F9-4efb-9B51-7695ECA05670} - No File
BHO: HP Print Enhancer: {0347c33e-8762-4905-bf09-768834316c61} - d:\digital imaging\smart web printing\hpswp_printenhancer.dll
BHO: Adobe PDF Link Helper: {18df081c-e8ad-4283-a596-fa578c2ebdc3} - c:\program files\common files\adobe\acrobat\activex\AcroIEHelperShim.dll
BHO: Groove GFS Browser Helper: {72853161-30c5-4d22-b7f9-0bbc1d38a37e} - e:\office14\GROOVEEX.DLL
BHO: Office Document Cache Handler: {b4f3a835-0e21-4959-ba22-42b3008e02ff} - e:\office14\URLREDIR.DLL
BHO: uTorrentBar Toolbar: {bf7380fa-e3b4-4db2-af3e-9d8783a45bfc} - c:\program files\utorrentbar\prxtbuTo0.dll
BHO: Java™ Plug-In 2 SSV Helper: {dbc80044-a445-435b-bc74-9c25c1c588a9} - c:\program files\java\jre6\bin\jp2ssv.dll
BHO: JQSIEStartDetectorImpl Class: {e7e6f031-17ce-4c07-bc86-eabfe594f69c} - c:\program files\java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll
BHO: HP Smart BHO Class: {ffffffff-cf4e-4f2b-bdc2-0e72e116a856} - d:\digital imaging\smart web printing\hpswp_BHO.dll
TB: uTorrentBar Toolbar: {bf7380fa-e3b4-4db2-af3e-9d8783a45bfc} - c:\program files\utorrentbar\prxtbuTo0.dll
TB: {D4027C7F-154A-4066-A1AD-4243D8127440} - No File
EB: {32683183-48a0-441b-a342-7c2a440a9478} - No File
uRun: [ctfmon.exe] c:\windows\system32\ctfmon.exe
uRun: [Facebook Update] "c:\documents and settings\me\local settings\application data\facebook\update\FacebookUpdate.exe" /c /nocrashserver
uRun: [Jing] c:\program files\techsmith\jing\Jing.exe
uRun: [Akamai NetSession Interface] c:\documents and settings\me\local settings\application data\akamai\netsession_win.exe
mRun: [bwprnmon.exe] c:\bitware\nt\bwprnmon.exe
IE: E&xport to Microsoft Excel - e:\office14\EXCEL.EXE/3000
IE: Google Sidewiki... - c:\program files\google\google toolbar\component\GoogleToolbarDynamic_mui_en_96D6FF0C6D236BF8.dll/cmsidewiki.html
IE: Se&nd to OneNote - e:\office14\ONBttnIE.dll/105
IE: {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe
IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe
IE: {2670000A-7350-4f3c-8081-5663EE0C6C49} - {48E73304-E1D6-4330-914C-F5F514E3486C} - e:\office14\ONBttnIE.dll
IE: {789FE86F-6FC4-46A1-9849-EDE0DB0C95CA} - {FFFDC614-B694-4AE6-AB38-5D6374584B52} - e:\office14\ONBttnIELinkedNotes.dll
IE: {DDE87865-83C5-48c4-8357-2F5B1AA84522} - {DDE87865-83C5-48c4-8357-2F5B1AA84522} - d:\digital imaging\smart web printing\hpswp_BHO.dll
LSP: mswsock.dll
DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} - hxxp://update.microsoft.com/microsoftupdate/v6/V5Controls/en/x86/client/wuweb_site.cab?1293475629171
DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_23-windows-i586.cab
DPF: {CAFEEFAC-0016-0000-0023-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_23-windows-i586.cab
TCP: DhcpNameServer = 192.168.1.1
TCP: Interfaces\{240B3CAC-4316-41B6-9FF4-906CB11D6C23} : DhcpNameServer = 192.168.1.1
Filter: text/xml - {807573E5-5146-11D5-A672-00B0D022E945} - c:\program files\common files\microsoft shared\office14\MSOXMLMF.DLL
Notify: NavLogon - c:\windows\system32\NavLogon.dll
SSODL: WPDShServiceObj - {AAA288BA-9A4C-45B0-95D7-94D524869DB5} - c:\windows\system32\WPDShServiceObj.dll
SEH: Groove GFS Stub Execution Hook: {b5a7f190-dda6-4420-b3ba-52453494e6cd} - e:\office14\GROOVEEX.DLL
.
================= FIREFOX ===================
.
FF - ProfilePath - c:\documents and settings\me\application data\mozilla\firefox\profiles\1r1npx6m.default\
FF - prefs.js: browser.startup.homepage - hxxp://www.yahoo.com/
FF - plugin: c:\documents and settings\me\local settings\application data\facebook\video\skype\npFacebookVideoCalling.dll
FF - plugin: c:\program files\java\jre6\bin\new_plugin\npdeployJava1.dll
FF - plugin: e:\mozilla plugins\npitunes.dll
FF - plugin: e:\office14\NPAUTHZ.DLL
FF - plugin: e:\office14\NPSPWRAP.DLL
FF - plugin: e:\plugins\npdeployJava1.dll
FF - Ext: Default: {972ce4c6-7e08-4474-a285-3208198ce6fd} - e:\extensions\{972ce4c6-7e08-4474-a285-3208198ce6fd}
FF - Ext: Java Console: {CAFEEFAC-0016-0000-0023-ABCDEFFEDCBA} - e:\extensions\{CAFEEFAC-0016-0000-0023-ABCDEFFEDCBA}
FF - Ext: Microsoft .NET Framework Assistant: {20a82645-c095-46ed-80e3-08825760534b} - %profile%\extensions\{20a82645-c095-46ed-80e3-08825760534b}
FF - Ext: Microsoft .NET Framework Assistant: {20a82645-c095-46ed-80e3-08825760534b} - c:\windows\microsoft.net\framework\v3.5\windows presentation foundation\DotNetAssistantExtension
FF - Ext: Java Quick Starter: jqs@sun.com - c:\program files\java\jre6\lib\deploy\jqs\ff
.
---- FIREFOX POLICIES ----
FF - user.js: yahoo.ytff.general.dontshowhpoffer - true
============= SERVICES / DRIVERS ===============
.
R2 Akamai;Akamai NetSession Interface;c:\windows\system32\svchost.exe -k Akamai [2003-3-31 14336]
S3 MBAMSwissArmy;MBAMSwissArmy;\??\c:\windows\system32\drivers\mbamswissarmy.sys --> c:\windows\system32\drivers\mbamswissarmy.sys [?]
S3 Microsoft SharePoint Workspace Audit Service;Microsoft SharePoint Workspace Audit Service;e:\office14\GROOVE.EXE [2010-3-25 30969208]
S3 osppsvc;Office Software Protection Platform;c:\program files\common files\microsoft shared\officesoftwareprotectionplatform\OSPPSVC.EXE [2010-1-9 4640000]
S3 SndTAudio;SndTAudio;c:\windows\system32\drivers\SndTAudio.sys [2011-1-26 23608]
.
=============== Created Last 30 ================
.
2011-11-20 03:41:57 -------- d-----w- c:\windows\system32\wbem\repository\FS
2011-11-20 03:41:57 -------- d-----w- c:\windows\system32\wbem\Repository
2011-11-20 03:39:56 -------- d-----w- C:\Converted
2011-11-17 11:13:27 -------- d-----w- c:\documents and settings\me\application data\SUPERAntiSpyware.com
2011-11-17 11:12:02 -------- d-----w- c:\documents and settings\all users\application data\SUPERAntiSpyware.com
2011-11-17 11:11:10 -------- d-----w- c:\documents and settings\all users\application data\SUPERSetup
2011-11-04 10:20:28 -------- d-----w- c:\documents and settings\me\local settings\application data\Akamai
.
==================== Find3M ====================
.
2011-10-09 13:46:07 414368 ----a-w- c:\windows\system32\FlashPlayerCPLApp.cpl
2011-08-31 22:00:50 22216 -c--a-w- c:\windows\system32\drivers\mbam.sys
.
============= FINISH: 15:48:16.95 ===============

Attached Files



BC AdBot (Login to Remove)

 


#2 Noviciate

Noviciate

  • Malware Response Team
  • 5,277 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Numpty HQ
  • Local time:12:16 PM

Posted 21 November 2011 - 04:03 PM

Good evening. :)

Take a trip to this webpage for download links and instructions for running Combofix by sUBs: http://www.bleepingcomputer.com/combofix/how-to-use-combofix *

  • When prompted to save Combofix, change the filename BEFORE saving it - any name will do, as long as it has .exe at the end.
  • Please be aware that this tool may require the PC to be rebooted so close any programs you have open before you start.
  • When CF has finished, it will produce a log - C:\ComboFix.txt - copy and paste
  • Let me know how the PC is behaving.
* There are two points to note from the instructions page:

1) The Recovery Console.

It is recommended that you install this as, in certain circumstances, it may be the difference between a successful repair and a reformat. If you are uncertain as to whether or not you already have the Recovery Console installed, simply run CF and it will prompt you if it does not detect it.
CF will complete some, but not all, of it's removal tasks without the installation of the Console, so you are free to choose whether you want to complete this step, but it is in your interests to do so.

2) Disabling your Anti-Virus.

CF has been the victim of false-positive detections on occasion and a resident AV may incorrectly identify and delete part of the tool which won't do it much good. If you don't disable your AV, you may not get the results you hoped for!

So long, and thanks for all the fish.

 

 


#3 edp333

edp333
  • Topic Starter

  • Members
  • 66 posts
  • OFFLINE
  •  
  • Local time:06:16 AM

Posted 21 November 2011 - 06:56 PM

Thanks for the quick reply. CF gve a message that this computer had Rootkit.ZeroAccess rootkit virus. CF restarted a couple times and I do not see the ping.exe yet. The computer is running much better. Below is the CF log you requested:

ComboFix 11-11-21.01 - Me 11/21/2011 17:27:36.1.1 - x86
Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.511.311 [GMT -6:00]
Running from: c:\documents and settings\Me\Desktop\CE.exe.exe
.
ADS - WINDOWS: deleted 24 bytes in 1 streams.
.
((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.
.
c:\documents and settings\Me\Application Data\PriceGong
c:\documents and settings\Me\Application Data\PriceGong\Data\1.xml
c:\documents and settings\Me\Application Data\PriceGong\Data\a.xml
c:\documents and settings\Me\Application Data\PriceGong\Data\b.xml
c:\documents and settings\Me\Application Data\PriceGong\Data\c.xml
c:\documents and settings\Me\Application Data\PriceGong\Data\d.xml
c:\documents and settings\Me\Application Data\PriceGong\Data\e.xml
c:\documents and settings\Me\Application Data\PriceGong\Data\f.xml
c:\documents and settings\Me\Application Data\PriceGong\Data\g.xml
c:\documents and settings\Me\Application Data\PriceGong\Data\h.xml
c:\documents and settings\Me\Application Data\PriceGong\Data\i.xml
c:\documents and settings\Me\Application Data\PriceGong\Data\J.xml
c:\documents and settings\Me\Application Data\PriceGong\Data\k.xml
c:\documents and settings\Me\Application Data\PriceGong\Data\l.xml
c:\documents and settings\Me\Application Data\PriceGong\Data\m.xml
c:\documents and settings\Me\Application Data\PriceGong\Data\mru.xml
c:\documents and settings\Me\Application Data\PriceGong\Data\n.xml
c:\documents and settings\Me\Application Data\PriceGong\Data\o.xml
c:\documents and settings\Me\Application Data\PriceGong\Data\p.xml
c:\documents and settings\Me\Application Data\PriceGong\Data\q.xml
c:\documents and settings\Me\Application Data\PriceGong\Data\r.xml
c:\documents and settings\Me\Application Data\PriceGong\Data\s.xml
c:\documents and settings\Me\Application Data\PriceGong\Data\t.xml
c:\documents and settings\Me\Application Data\PriceGong\Data\u.xml
c:\documents and settings\Me\Application Data\PriceGong\Data\v.xml
c:\documents and settings\Me\Application Data\PriceGong\Data\w.xml
c:\documents and settings\Me\Application Data\PriceGong\Data\x.xml
c:\documents and settings\Me\Application Data\PriceGong\Data\y.xml
c:\documents and settings\Me\Application Data\PriceGong\Data\z.xml
c:\documents and settings\Me\WINDOWS
c:\windows\$NtUninstallKB63827$\1747151343
c:\windows\$NtUninstallKB63827$\2689816832\@
c:\windows\$NtUninstallKB63827$\2689816832\bckfg.tmp
c:\windows\$NtUninstallKB63827$\2689816832\cfg.ini
c:\windows\$NtUninstallKB63827$\2689816832\Desktop.ini
c:\windows\$NtUninstallKB63827$\2689816832\keywords
c:\windows\$NtUninstallKB63827$\2689816832\kwrd.dll
c:\windows\$NtUninstallKB63827$\2689816832\L\pwacinpe
c:\windows\$NtUninstallKB63827$\2689816832\U\00000001.@
c:\windows\$NtUninstallKB63827$\2689816832\U\00000002.@
c:\windows\$NtUninstallKB63827$\2689816832\U\00000004.@
c:\windows\$NtUninstallKB63827$\2689816832\U\80000000.@
c:\windows\$NtUninstallKB63827$\2689816832\U\80000004.@
c:\windows\$NtUninstallKB63827$\2689816832\U\80000032.@
c:\windows\CSC\d6
E:\uninstall.exe
E:\xcrashdump.dat
c:\windows\$NtUninstallKB63827$ . . . . Failed to delete
.
.
((((((((((((((((((((((((( Files Created from 2011-10-21 to 2011-11-21 )))))))))))))))))))))))))))))))
.
.
2011-11-20 03:41 . 2011-11-20 03:41 -------- d-----w- c:\windows\system32\wbem\Repository
2011-11-20 03:39 . 2011-11-20 03:39 -------- d-----w- C:\Converted
2011-11-17 11:13 . 2011-11-17 11:13 -------- d-----w- c:\documents and settings\Me\Application Data\SUPERAntiSpyware.com
2011-11-17 11:12 . 2011-11-17 11:12 -------- d-----w- c:\documents and settings\All Users\Application Data\SUPERAntiSpyware.com
2011-11-17 11:11 . 2011-11-17 11:11 -------- d-----w- c:\documents and settings\All Users\Application Data\SUPERSetup
2011-11-17 02:33 . 2011-11-20 03:39 -------- d-s---w- c:\documents and settings\Administrator
2011-11-04 10:20 . 2011-11-20 03:49 -------- d-----w- c:\documents and settings\Me\Local Settings\Application Data\Akamai
.
.
.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2011-10-09 13:46 . 2011-08-05 13:14 414368 ----a-w- c:\windows\system32\FlashPlayerCPLApp.cpl
2011-08-31 22:00 . 2011-01-05 02:11 22216 -c--a-w- c:\windows\system32\drivers\mbam.sys
.
.
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4
.
[HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{bf7380fa-e3b4-4db2-af3e-9d8783a45bfc}]
2011-05-09 09:49 176936 ----a-w- c:\program files\uTorrentBar\prxtbuTo0.dll
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Toolbar]
"{bf7380fa-e3b4-4db2-af3e-9d8783a45bfc}"= "c:\program files\uTorrentBar\prxtbuTo0.dll" [2011-05-09 176936]
.
[HKEY_CLASSES_ROOT\clsid\{bf7380fa-e3b4-4db2-af3e-9d8783a45bfc}]
.
[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Toolbar\Webbrowser]
"{BF7380FA-E3B4-4DB2-AF3E-9D8783A45BFC}"= "c:\program files\uTorrentBar\prxtbuTo0.dll" [2011-05-09 176936]
.
[HKEY_CLASSES_ROOT\clsid\{bf7380fa-e3b4-4db2-af3e-9d8783a45bfc}]
.
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"Facebook Update"="c:\documents and settings\Me\Local Settings\Application Data\Facebook\Update\FacebookUpdate.exe" [2011-08-27 137536]
"Jing"="c:\program files\TechSmith\Jing\Jing.exe" [2010-08-19 3069192]
"Akamai NetSession Interface"="c:\documents and settings\Me\Local Settings\Application Data\Akamai\netsession_win.exe" [2011-11-17 3303000]
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"bwprnmon.exe"="c:\bitware\NT\bwprnmon.exe" [2010-12-27 54272]
.
[HKLM\~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^Adobe Gamma Loader.lnk]
path=c:\documents and settings\All Users\Start Menu\Programs\Startup\Adobe Gamma Loader.lnk
backup=c:\windows\pss\Adobe Gamma Loader.lnkCommon Startup
.
[HKLM\~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^HP Digital Imaging Monitor.lnk]
path=c:\documents and settings\All Users\Start Menu\Programs\Startup\HP Digital Imaging Monitor.lnk
backup=c:\windows\pss\HP Digital Imaging Monitor.lnkCommon Startup
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\KernelFaultCheck]
c:\windows\system32\dumprep 0 -k [X]
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Adobe ARM]
2011-03-30 17:29 937920 ----a-w- c:\program files\Common Files\Adobe\ARM\1.0\AdobeARM.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Adobe Reader Speed Launcher]
2010-11-10 18:49 35736 -c--a-w- c:\program files\Adobe\Reader 10.0\Reader\reader_sl.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\AdobeAAMUpdater-1.0]
2011-04-09 08:18 499608 -c----w- c:\program files\Common Files\Adobe\OOBE\PDApp\UWA\updaterstartuputility.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\BCSSync]
2010-03-13 19:54 91520 ----a-w- e:\office14\BCSSync.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\BitTorrent DNA]
2011-01-26 20:56 323392 -c--a-w- c:\program files\DNA\btdna.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\ccApp]
2004-06-10 02:31 66680 -c--a-w- c:\program files\Common Files\Symantec Shared\ccApp.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\CloneCDTray]
2009-01-29 22:20 57344 ----a-w- e:\clonecd\CloneCDTray.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\ctfmon.exe]
2008-04-14 00:12 15360 ----a-w- c:\windows\system32\ctfmon.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\DAEMON Tools Pro Agent]
2011-03-17 08:15 842048 ----a-w- e:\daemon tools pro\DTAgent.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\HP Software Update]
2007-05-08 22:24 54840 ----a-w- d:\hp software update\hpwuSchd2.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\iTunesHelper]
2010-12-13 23:16 421160 ----a-w- E:\iTunesHelper.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\LogitechCommunicationsManager]
2007-03-06 23:48 488984 -c--a-w- c:\program files\Common Files\LogiShrd\LComMgr\Communications_Helper.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\LogitechQuickCamRibbon]
2007-03-06 23:58 1060376 ----a-w- E:\WebCam10.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\MSMSGS]
2008-04-14 00:12 1695232 ----a-w- c:\program files\Messenger\msmsgs.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\SunJavaUpdateSched]
2010-05-14 17:44 248552 -c--a-w- c:\program files\Common Files\Java\Java Update\jusched.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\uTorrent]
2011-04-10 19:36 399736 ----a-w- E:\uTorrent.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\vptray]
2004-08-03 01:36 124232 -c--a-w- c:\progra~1\SYMANT~1\VPTray.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\services]
"YahooAUService"=2 (0x2)
"osppsvc"=3 (0x3)
"ose"=3 (0x3)
"LVSrvLauncher"=2 (0x2)
"JavaQuickStarterService"=2 (0x2)
"iPod Service"=3 (0x3)
"idsvc"=3 (0x3)
"Bonjour Service"=2 (0x2)
"Apple Mobile Device"=2 (0x2)
.
[HKEY_LOCAL_MACHINE\software\microsoft\security center]
"AntiVirusOverride"=dword:00000001
.
[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecAntiVirus]
"DisableMonitoring"=dword:00000001
.
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=
"e:\\uTorrent.exe"=
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"c:\\Program Files\\Bonjour\\mDNSResponder.exe"=
"e:\\iTunes.exe"=
"e:\\Office14\\OUTLOOK.EXE"=
"c:\\Program Files\\DNA\\btdna.exe"=
"e:\\Office14\\GROOVE.EXE"=
"e:\\Office14\\ONENOTE.EXE"=
"c:\\Documents and Settings\\Me\\Local Settings\\Application Data\\Akamai\\netsession_win.exe"=
"c:\\Documents and Settings\\Me\\Local Settings\\Application Data\\Facebook\\Video\\Skype\\FacebookVideoCalling.exe"=
.
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\GloballyOpenPorts\List]
"1041:TCP"= 1041:TCP:Akamai NetSession Interface
"5000:UDP"= 5000:UDP:Akamai NetSession Interface
.
R2 Akamai;Akamai NetSession Interface;c:\windows\System32\svchost.exe -k Akamai [3/31/2003 6:00 AM 14336]
S3 Microsoft SharePoint Workspace Audit Service;Microsoft SharePoint Workspace Audit Service;e:\office14\GROOVE.EXE [3/25/2010 9:25 AM 30969208]
S3 osppsvc;Office Software Protection Platform;c:\program files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE [1/9/2010 9:37 PM 4640000]
S3 SndTAudio;SndTAudio;c:\windows\system32\drivers\SndTAudio.sys [1/26/2011 12:16 PM 23608]
S4 sptd;sptd;\SystemRoot\\SystemRoot\System32\Drivers\sptd.sys --> \SystemRoot\\SystemRoot\System32\Drivers\sptd.sys [?]
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\svchost]
HPZ12 REG_MULTI_SZ Pml Driver HPZ12 Net Driver HPZ12
hpdevmgmt REG_MULTI_SZ hpqcxs08 hpqddsvc
Akamai REG_MULTI_SZ Akamai
.
Contents of the 'Scheduled Tasks' folder
.
2011-11-17 c:\windows\Tasks\FacebookUpdateTaskUserS-1-5-21-507921405-1580818891-1343024091-1003Core.job
- c:\documents and settings\Me\Local Settings\Application Data\Facebook\Update\FacebookUpdate.exe [2011-08-27 14:33]
.
2011-11-20 c:\windows\Tasks\FacebookUpdateTaskUserS-1-5-21-507921405-1580818891-1343024091-1003UA.job
- c:\documents and settings\Me\Local Settings\Application Data\Facebook\Update\FacebookUpdate.exe [2011-08-27 14:33]
.
2011-11-21 c:\windows\Tasks\GlaryInitialize.job
- e:\glary utilities\initialize.exe [2011-05-24 22:24]
.
.
------- Supplementary Scan -------
.
uStart Page = hxxp://www.yahoo.com/
IE: E&xport to Microsoft Excel - e:\office14\EXCEL.EXE/3000
IE: Google Sidewiki... - c:\program files\Google\Google Toolbar\Component\GoogleToolbarDynamic_mui_en_96D6FF0C6D236BF8.dll/cmsidewiki.html
IE: Se&nd to OneNote - e:\office14\ONBttnIE.dll/105
TCP: DhcpNameServer = 192.168.1.1
FF - ProfilePath - c:\documents and settings\Me\Application Data\Mozilla\Firefox\Profiles\1r1npx6m.default\
FF - prefs.js: browser.startup.homepage - hxxp://www.yahoo.com/
FF - Ext: Default: {972ce4c6-7e08-4474-a285-3208198ce6fd} - e:\extensions\{972ce4c6-7e08-4474-a285-3208198ce6fd}
FF - Ext: Java Console: {CAFEEFAC-0016-0000-0023-ABCDEFFEDCBA} - e:\extensions\{CAFEEFAC-0016-0000-0023-ABCDEFFEDCBA}
FF - Ext: Microsoft .NET Framework Assistant: {20a82645-c095-46ed-80e3-08825760534b} - %profile%\extensions\{20a82645-c095-46ed-80e3-08825760534b}
FF - Ext: Microsoft .NET Framework Assistant: {20a82645-c095-46ed-80e3-08825760534b} - c:\windows\Microsoft.NET\Framework\v3.5\Windows Presentation Foundation\DotNetAssistantExtension
FF - Ext: Java Quick Starter: jqs@sun.com - c:\program files\Java\jre6\lib\deploy\jqs\ff
FF - user.js: yahoo.ytff.general.dontshowhpoffer - true
.
- - - - ORPHANS REMOVED - - - -
.
WebBrowser-{D4027C7F-154A-4066-A1AD-4243D8127440} - (no file)
MSConfigStartUp-AdobeCS5 - c:\program files\Common Files\Adobe\CS5.5ServiceManager\CS5.5ServiceManager.exe
.
.
.
**************************************************************************
.
catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2011-11-21 17:43
Windows 5.1.2600 Service Pack 3 NTFS
.
scanning hidden processes ...
.
scanning hidden autostart entries ...
.
HKLM\Software\Microsoft\Windows\CurrentVersion\Run
bwprnmon.exe = c:\bitware\NT\bwprnmon.exe?????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????
.
scanning hidden files ...
.
scan completed successfully
hidden files: 0
.
**************************************************************************
.
[HKEY_LOCAL_MACHINE\System\ControlSet002\Services\Akamai]
"ServiceDll"="c:\program files\common files\akamai/netsession_win_d768ebc.dll"
.
--------------------- LOCKED REGISTRY KEYS ---------------------
.
[HKEY_LOCAL_MACHINE\software\Microsoft\Cryptography\RNG*]
"Seed"=hex:49,31,f4,88,04,28,01,14,c5,ca,fa,5f,f5,cf,66,6e,1f,6c,42,48,3b,1d,
bb,84,6e,c3,98,a3,07,68,b8,a1,8e,3f,71,ca,a8,53,6d,af,a8,e5,29,51,a3,e5,99,\
"Seed"=hex:49,31,f4,88,04,28,01,14,c5,ca,fa,5f,f5,cf,66,6e,1f,6c,42,48,3b,1d,
bb,84,6e,c3,98,a3,07,68,b8,a1,8e,3f,71,ca,a8,53,6d,af,a8,e5,29,51,a3,e5,99,\
"Seed"=hex:49,31,f4,88,04,28,01,14,c5,ca,fa,5f,f5,cf,66,6e,1f,6c,42,48,3b,1d,
bb,84,6e,c3,98,a3,07,68,b8,a1,8e,3f,71,ca,a8,53,6d,af,a8,e5,29,51,a3,e5,99,\
"Seed"=hex:49,31,f4,88,04,28,01,14,c5,ca,fa,5f,f5,cf,66,6e,1f,6c,42,48,3b,1d,
bb,84,6e,c3,98,a3,07,68,b8,a1,8e,3f,71,ca,a8,53,6d,af,a8,e5,29,51,a3,e5,99,\
.
--------------------- DLLs Loaded Under Running Processes ---------------------
.
- - - - - - - > 'explorer.exe'(1044)
c:\windows\system32\WININET.dll
c:\progra~1\COMMON~1\MICROS~1\OFFICE14\Cultures\office.odf
e:\office14\1033\GrooveIntlResource.dll
c:\windows\system32\ieframe.dll
c:\windows\system32\webcheck.dll
c:\windows\system32\WPDShServiceObj.dll
c:\windows\system32\PortableDeviceTypes.dll
c:\windows\system32\PortableDeviceApi.dll
.
------------------------ Other Running Processes ------------------------
.
c:\windows\system32\devldr32.exe
c:\windows\system32\wscntfy.exe
.
**************************************************************************
.
Completion time: 2011-11-21 17:45:18 - machine was rebooted
ComboFix-quarantined-files.txt 2011-11-21 23:45
.
Pre-Run: 167,899,136 bytes free
Post-Run: 717,869,056 bytes free
.
WindowsXP-KB310994-SP2-Pro-BootDisk-ENU.exe
[boot loader]
timeout=2
default=multi(0)disk(0)rdisk(0)partition(2)\WINDOWS
[operating systems]
c:\cmdcons\BOOTSECT.DAT="Microsoft Windows Recovery Console" /cmdcons
UnsupportedDebug="do not select this" /debug
multi(0)disk(0)rdisk(0)partition(2)\WINDOWS="Microsoft Windows XP Professional" /fastdetect /NoExecute=OptIn
.
- - End Of File - - D7D754F0899B110C0EA72D7F51E87601

#4 Noviciate

Noviciate

  • Malware Response Team
  • 5,277 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Numpty HQ
  • Local time:12:16 PM

Posted 22 November 2011 - 03:24 PM

Good evening. :)

Pay a visit to the ESET Online Scanner.

  • Click the ESET Online Scanner button and a new window will open - you may need to maximise it.
  • Click the Run ESET Online Scanner button in the new window.
  • If you are using any other browser than IE, you will be prompted to download and run esetsmartinstaller_enu.exe and the scan will run from within the window that the executable opens.
  • Regardless of which browser you are using, you will be shown some terms and conditions and you will need to accept these to continue.
  • If you are running IE for this scan you will then be prompted to allow an ActiveX component to be downloaded, unless you already have it installed, and the scan will run inside IE.
  • When you see the Computer Scan Settings window, you will need to make the following changes:

    • UNCHECK Remove found threats - this is important.
    • Check Scan archives
    • Click on Advanced settings
    • Check Scan for potentially unsafe applications
  • Once ready, click Start to begin - not a surprise really!
  • The anti-virus definitions will now be downloaded, so don't forget to allow them through your firewall if prompted.
  • The above will take a little time, so now is a good time to fire up the kettle and open the biccies.
  • Once the scan has completed you will be shown the results - assuming that the scanner has found anything.
  • Click List of found threats and then Export to text file... and save the log somewhere convenient.
  • You can then close out the scanner - don't bother uninstalling it as you may need to use it again.
  • Please post the contents of this file in your next reply, or let me know that nothing was identified.

Will you also throw in a fresh DDS log and let me know how the PC is behaving.

So long, and thanks for all the fish.

 

 


#5 edp333

edp333
  • Topic Starter

  • Members
  • 66 posts
  • OFFLINE
  •  
  • Local time:06:16 AM

Posted 22 November 2011 - 08:00 PM

Below is the ESET log and DDS log. The DDS attach log is attached of course.

C:\Documents and Settings\Me\desktop\RemoveWAT 2.2.6.exe multiple threats
C:\Documents and Settings\Me\My Documents\Downloads\Remove WAT 2.2.6.rar probably a variant of Win32/Agent.HLPUEUX trojan
C:\Documents and Settings\Me\My Documents\Downloads\RemoveWAT 2.2.6\RemoveWAT 2.2.6.exe multiple threats
C:\Documents and Settings\NetworkService\Application Data\Sun\Java\Deployment\cache\6.0\53\645e0e75-4accfc10 a variant of Win32/Kryptik.VTC trojan
C:\WINDOWS\system32\drivers\serial.sys a variant of Win32/Olmarik.AWT trojan
E:\Flashbu\kf151.zip a variant of Win32/PSWTool.RAS.A application

DDS Log:
.
DDS (Ver_2011-08-26.01) - NTFSx86
Internet Explorer: 8.0.6001.18702 BrowserJavaVersion: 1.6.0_23
Run by Me at 18:54:20 on 2011-11-22
Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.511.191 [GMT -6:00]
.
.
============== Running Processes ===============
.
C:\WINDOWS\system32\svchost.exe -k DcomLaunch
svchost.exe
C:\WINDOWS\System32\svchost.exe -k netsvcs
svchost.exe
svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\Explorer.EXE
C:\BITWARE\NT\bwprnmon.exe
C:\Documents and Settings\Me\Local Settings\Application Data\Facebook\Update\FacebookUpdate.exe
C:\Program Files\TechSmith\Jing\Jing.exe
C:\Documents and Settings\Me\Local Settings\Application Data\Akamai\netsession_win.exe
C:\WINDOWS\system32\ctfmon.exe
C:\WINDOWS\system32\ntvdm.exe
C:\Documents and Settings\Me\Local Settings\Application Data\Akamai\netsession_win.exe
C:\WINDOWS\system32\devldr32.exe
svchost.exe
C:\WINDOWS\System32\svchost.exe -k Akamai
C:\WINDOWS\system32\svchost.exe -k hpdevmgmt
C:\WINDOWS\System32\svchost.exe -k HPZ12
C:\WINDOWS\System32\svchost.exe -k HPZ12
C:\WINDOWS\System32\svchost.exe -k imgsvc
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\WINDOWS\system32\wscntfy.exe
C:\WINDOWS\system32\taskmgr.exe
C:\WINDOWS\system32\sol.exe
.
============== Pseudo HJT Report ===============
.
uStart Page = hxxp://www.yahoo.com/
BHO: {02478D38-C3F9-4efb-9B51-7695ECA05670} - No File
BHO: HP Print Enhancer: {0347c33e-8762-4905-bf09-768834316c61} - d:\digital imaging\smart web printing\hpswp_printenhancer.dll
BHO: Adobe PDF Link Helper: {18df081c-e8ad-4283-a596-fa578c2ebdc3} - c:\program files\common files\adobe\acrobat\activex\AcroIEHelperShim.dll
BHO: Groove GFS Browser Helper: {72853161-30c5-4d22-b7f9-0bbc1d38a37e} - e:\office14\GROOVEEX.DLL
BHO: Office Document Cache Handler: {b4f3a835-0e21-4959-ba22-42b3008e02ff} - e:\office14\URLREDIR.DLL
BHO: uTorrentBar Toolbar: {bf7380fa-e3b4-4db2-af3e-9d8783a45bfc} - c:\program files\utorrentbar\prxtbuTo0.dll
BHO: Java™ Plug-In 2 SSV Helper: {dbc80044-a445-435b-bc74-9c25c1c588a9} - c:\program files\java\jre6\bin\jp2ssv.dll
BHO: JQSIEStartDetectorImpl Class: {e7e6f031-17ce-4c07-bc86-eabfe594f69c} - c:\program files\java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll
BHO: HP Smart BHO Class: {ffffffff-cf4e-4f2b-bdc2-0e72e116a856} - d:\digital imaging\smart web printing\hpswp_BHO.dll
TB: uTorrentBar Toolbar: {bf7380fa-e3b4-4db2-af3e-9d8783a45bfc} - c:\program files\utorrentbar\prxtbuTo0.dll
EB: {32683183-48a0-441b-a342-7c2a440a9478} - No File
uRun: [Facebook Update] "c:\documents and settings\me\local settings\application data\facebook\update\FacebookUpdate.exe" /c /nocrashserver
uRun: [Jing] c:\program files\techsmith\jing\Jing.exe
uRun: [Akamai NetSession Interface] c:\documents and settings\me\local settings\application data\akamai\netsession_win.exe
uRun: [ctfmon.exe] c:\windows\system32\ctfmon.exe
mRun: [bwprnmon.exe] c:\bitware\nt\bwprnmon.exe
IE: E&xport to Microsoft Excel - e:\office14\EXCEL.EXE/3000
IE: Google Sidewiki... - c:\program files\google\google toolbar\component\GoogleToolbarDynamic_mui_en_96D6FF0C6D236BF8.dll/cmsidewiki.html
IE: Se&nd to OneNote - e:\office14\ONBttnIE.dll/105
IE: {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe
IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe
IE: {2670000A-7350-4f3c-8081-5663EE0C6C49} - {48E73304-E1D6-4330-914C-F5F514E3486C} - e:\office14\ONBttnIE.dll
IE: {789FE86F-6FC4-46A1-9849-EDE0DB0C95CA} - {FFFDC614-B694-4AE6-AB38-5D6374584B52} - e:\office14\ONBttnIELinkedNotes.dll
IE: {DDE87865-83C5-48c4-8357-2F5B1AA84522} - {DDE87865-83C5-48c4-8357-2F5B1AA84522} - d:\digital imaging\smart web printing\hpswp_BHO.dll
DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} - hxxp://update.microsoft.com/microsoftupdate/v6/V5Controls/en/x86/client/wuweb_site.cab?1293475629171
DPF: {7530BFB8-7293-4D34-9923-61A11451AFC5} - hxxp://download.eset.com/special/eos/OnlineScanner.cab
DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_23-windows-i586.cab
DPF: {CAFEEFAC-0016-0000-0023-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_23-windows-i586.cab
TCP: DhcpNameServer = 192.168.1.1
TCP: Interfaces\{240B3CAC-4316-41B6-9FF4-906CB11D6C23} : DhcpNameServer = 192.168.1.1
Filter: text/xml - {807573E5-5146-11D5-A672-00B0D022E945} - c:\program files\common files\microsoft shared\office14\MSOXMLMF.DLL
Notify: NavLogon - c:\windows\system32\NavLogon.dll
SSODL: WPDShServiceObj - {AAA288BA-9A4C-45B0-95D7-94D524869DB5} - c:\windows\system32\WPDShServiceObj.dll
SEH: Groove GFS Stub Execution Hook: {b5a7f190-dda6-4420-b3ba-52453494e6cd} - e:\office14\GROOVEEX.DLL
.
================= FIREFOX ===================
.
FF - ProfilePath - c:\documents and settings\me\application data\mozilla\firefox\profiles\1r1npx6m.default\
FF - prefs.js: browser.startup.homepage - hxxp://www.yahoo.com/
FF - plugin: c:\documents and settings\me\local settings\application data\facebook\video\skype\npFacebookVideoCalling.dll
FF - plugin: c:\program files\java\jre6\bin\new_plugin\npdeployJava1.dll
FF - plugin: e:\mozilla plugins\npitunes.dll
FF - plugin: e:\office14\NPAUTHZ.DLL
FF - plugin: e:\office14\NPSPWRAP.DLL
FF - Ext: Default: {972ce4c6-7e08-4474-a285-3208198ce6fd} - e:\extensions\{972ce4c6-7e08-4474-a285-3208198ce6fd}
FF - Ext: Java Console: {CAFEEFAC-0016-0000-0023-ABCDEFFEDCBA} - e:\extensions\{CAFEEFAC-0016-0000-0023-ABCDEFFEDCBA}
FF - Ext: Microsoft .NET Framework Assistant: {20a82645-c095-46ed-80e3-08825760534b} - %profile%\extensions\{20a82645-c095-46ed-80e3-08825760534b}
FF - Ext: Microsoft .NET Framework Assistant: {20a82645-c095-46ed-80e3-08825760534b} - c:\windows\microsoft.net\framework\v3.5\windows presentation foundation\DotNetAssistantExtension
FF - Ext: Java Quick Starter: jqs@sun.com - c:\program files\java\jre6\lib\deploy\jqs\ff
.
---- FIREFOX POLICIES ----
FF - user.js: yahoo.ytff.general.dontshowhpoffer - true
.
============= SERVICES / DRIVERS ===============
.
R2 Akamai;Akamai NetSession Interface;c:\windows\system32\svchost.exe -k Akamai [2003-3-31 14336]
S3 Microsoft SharePoint Workspace Audit Service;Microsoft SharePoint Workspace Audit Service;e:\office14\GROOVE.EXE [2010-3-25 30969208]
S3 osppsvc;Office Software Protection Platform;c:\program files\common files\microsoft shared\officesoftwareprotectionplatform\OSPPSVC.EXE [2010-1-9 4640000]
S3 SndTAudio;SndTAudio;c:\windows\system32\drivers\SndTAudio.sys [2011-1-26 23608]
.
=============== Created Last 30 ================
.
2011-11-22 22:56:53 -------- d-----w- c:\program files\ESET
2011-11-21 23:16:30 98816 ----a-w- c:\windows\sed.exe
2011-11-21 23:16:30 518144 ----a-w- c:\windows\SWREG.exe
2011-11-21 23:16:30 256000 ----a-w- c:\windows\PEV.exe
2011-11-21 23:16:30 208896 ----a-w- c:\windows\MBR.exe
2011-11-21 23:16:20 -------- d-----w- C:\CE.exe
2011-11-20 03:41:57 -------- d-----w- c:\windows\system32\wbem\repository\FS
2011-11-20 03:41:57 -------- d-----w- c:\windows\system32\wbem\Repository
2011-11-20 03:39:56 -------- d-----w- C:\Converted
2011-11-17 11:13:27 -------- d-----w- c:\documents and settings\me\application data\SUPERAntiSpyware.com
2011-11-17 11:12:02 -------- d-----w- c:\documents and settings\all users\application data\SUPERAntiSpyware.com
2011-11-17 11:11:10 -------- d-----w- c:\documents and settings\all users\application data\SUPERSetup
2011-11-04 10:20:28 -------- d-----w- c:\documents and settings\me\local settings\application data\Akamai
.
==================== Find3M ====================
.
2011-10-09 13:46:07 414368 ----a-w- c:\windows\system32\FlashPlayerCPLApp.cpl
2011-08-31 22:00:50 22216 -c--a-w- c:\windows\system32\drivers\mbam.sys
.
============= FINISH: 18:55:10.17 ===============

Attached Files



#6 Noviciate

Noviciate

  • Malware Response Team
  • 5,277 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Numpty HQ
  • Local time:12:16 PM

Posted 23 November 2011 - 03:59 PM

Good evening. :)

Please download SystemLook from one of the links below and save it to your Desktop.

Download Mirror #1
Download Mirror #2


  • Double-click SystemLook.exe to run it.
  • Copy the content of the following codebox into the main textfield:

    :filefind
    serial.sys
  • Click the Look button to start the scan.
  • When finished, a notepad window will open with the results of the scan. Please post this log in your next reply.
Note: The log can also be found on your Desktop entitled SystemLook.txt

So long, and thanks for all the fish.

 

 


#7 edp333

edp333
  • Topic Starter

  • Members
  • 66 posts
  • OFFLINE
  •  
  • Local time:06:16 AM

Posted 23 November 2011 - 06:17 PM

Good evening. I followed your directions and poste below is the System look log:

SystemLook 30.07.11 by jpshortstuff
Log created at 17:14 on 23/11/2011 by Me
Administrator - Elevation successful

========== filefind ==========

Searching for "serial.sys"
C:\WINDOWS\$NtServicePackUninstall$\serial.sys -----c- 64896 bytes [16:37 13/01/2011] [06:15 04/08/2004] CD9404D115A00D249F70A371B46D5A26
C:\WINDOWS\ServicePackFiles\i386\serial.sys -----c- 64512 bytes [06:15 04/08/2004] [19:15 13/04/2008] CCA207A8896D4C6A0C9CE29A4AE411A7
C:\WINDOWS\system32\drivers\serial.sys --a---- 64512 bytes [12:00 31/03/2003] [19:15 13/04/2008] D676650D6709BF1A4B2D464ED3664367

-= EOF =-

#8 Noviciate

Noviciate

  • Malware Response Team
  • 5,277 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Numpty HQ
  • Local time:12:16 PM

Posted 24 November 2011 - 03:12 PM

Good evening. :)

Do you have access to a flashdrive of at least 128 Mb that you can wipe for a little tool? One of the drivers on your PC needs re[placing and I think that it would be a good idea to do it outside of Windows and also have a little scan while we're at it.

So long, and thanks for all the fish.

 

 


#9 edp333

edp333
  • Topic Starter

  • Members
  • 66 posts
  • OFFLINE
  •  
  • Local time:06:16 AM

Posted 25 November 2011 - 01:06 PM

Yes, I will have a usb drive ready for your next post.

#10 Noviciate

Noviciate

  • Malware Response Team
  • 5,277 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Numpty HQ
  • Local time:12:16 PM

Posted 26 November 2011 - 02:48 PM

Good evening. :)

Please read through all the instructions BEFORE you begin and ask any questions that you may have first. Be aware that an active infection may interfere with the first part of this procedure. If it doesn't go according to instructions, you may have to use a different PC to write the software to the flash drive.

  • Download both this file and this file and save them to your Desktop.
  • Insert your USB flash drive into your PC.
  • Click Start > My Computer, right click your flash drive's icon and select Format > Quick format - this will wipe the contents of the flash drive, so make sure there is nothing of value on there!
  • Double click unetbootin-xpud-windows-version number.exe that you just downloaded and OK any Security Warning that Windows may offer.
  • Select the Diskimage radio button and then click the browse button (the one with three dots on) located on the right side of the textbox field.
  • Browse to and select the xpud-0.9.2.iso file you downloaded above by double clicking it.
  • Verify the correct drive letter is selected for your USB device at the bottom and then click OK.
  • The program will install a little bootable OS onto your flash drive.
  • Once the files have been written to the drive you will be prompted to reboot - this isn't necessary, so just click Exit.
  • Next download http://noahdfear.net/downloads/driver.sh to your USB - directly or drag it there when it's downloaded.

The next part is somewhat tricky as it differs on different machines. If you are lucky, then the following will work - if it doesn't, let me know and we'll go for a different angle.

  • If it isn't already there, insert the flash drive into the sick PC and then reboot it.
  • You need to select the OS that is on the stick rather than let Windows take charge, so press F12 and choose to boot from the USB drive before Windows starts loading.
  • Follow the prompts and eventually a Welcome to xPUD screen will appear.
  • Click the File icon on the left.
  • Open the mnt folder by clicking it, just as you do in Windows.
  • I want you to identify the folder that corresponds to your hard drive, which is probably sda1, and double click it to open it.
  • The rest of this is just like using Windows, so you should breeze through it given that you already did the hard bit.
  • The first file you want is: WINDOWS\$NtServicePackUninstall$\serial.sys - this is a clean copy of your infected one.
  • I want you to right click it and copy it - we'll keep the original where it is, just in case we need another copy for any reason.
  • You then need to go back to the WINDOWS folder and locate the file system32\drivers\serial.sys
  • Right click it and rename it to serial.old - again we are keeping it safe, but disabled, just in case.
  • Now right click and paste the clean copy of serial.sys into the same folder - this gives you a clean copy as well as a renamed one in the same location.
  • If, for any reason, the PC fails to boot into Windows after you have done this, reboot using xPud, delete the new serial.sys, rename serial.old to serial.sys and things will be back how they were and all should be well again.
  • You are going to identify the folder that represents to your flash drive, so back to the mnt folder.
  • sda1, sda2 etc... will usually be your hard drive(s); sdb1 is likely to be your flash drive.
  • Click on the flash drive folder and check that you can see driver.sh that you downloaded earlier.
  • Next click Tool at the top.
  • Choose Open Terminal - this will open the Linux equivalent of a Command Window in all it's fashionable black livery.
  • Type bash driver.sh and then <ENTER>
  • You now get to sit and watch some text scroll down the Terminal window until it reports Done - which doesn't need any explanation, hopefully!
  • A report will be located on your flash drive called report.txt (an uninspired choice of name I know!), which is the purpose of this little adventure.
  • Click the Home icon on the left and Power off the machine
  • Remove the USB drive and insert back in your working computer and navigate to report.txt

    Please note - all text entries are case sensitive

    Copy and paste the contents of report.txt into your next reply, or let me know if you had any problems.

So long, and thanks for all the fish.

 

 


#11 edp333

edp333
  • Topic Starter

  • Members
  • 66 posts
  • OFFLINE
  •  
  • Local time:06:16 AM

Posted 27 November 2011 - 08:55 PM

The computer will not boot from the usb drive. After selecting the USB boot the system goes ack to the F12 screen. I will try to load the boot software onto a CD and try it again.

#12 edp333

edp333
  • Topic Starter

  • Members
  • 66 posts
  • OFFLINE
  •  
  • Local time:06:16 AM

Posted 28 November 2011 - 09:53 PM

I finally got it accomplished. Below is the report.txt from the Xpud:

Mon Nov 28 20:25:57 UTC 2011
Driver report for /mnt/sda5/WINDOWS/system32/drivers

9859c0f6936e723e4892d7141b1327d5 acpiec.sys
Microsoft Corporation

8fd99680a539792a30e97944fdaecf17 acpi.sys
Microsoft Corporation

8bed39e3c35d6a489438b8141717a557 aec.sys
Microsoft Corporation

7e775010ef291da96ad17ca4b17137d7 afd.sys
Microsoft Corporation

08fd04aa961bdc77fb983f328334e3d7 agp440.sys
Microsoft Corporation

03a7e0922acfe1b07d5db2eeb0773063 agpcpq.sys
Microsoft Corporation

cb08aed0de2dd889a8a820cd8082d83c alim1541.sys
Microsoft Corporation

95b4fb835e28aa1336ceeb07fd5b9398 amdagp.sys
Advanced Micro Devices

d7701d7e72243286cc88c9973d891057 amdk6.sys
Microsoft Corporation

8fce268cdbdd83b23419d1f35f42c7b1 amdk7.sys
Microsoft Corporation

b5b8a80875c1dededa8b02765642c32f arp1394.sys
Microsoft Corporation

b153affac761e7f5fcfa822b9c4e97bc asyncmac.sys
Microsoft Corporation

9f3a2f5aa6875c72bf062c712cfa2674 atapi.sys
Microsoft Corporation

d649c57da6fa762c64013747e5d7d2d6 ati1btxx.sys
ATI Technologies

60b6aa2dc1521da343f781b70eb7895a ati1mdxx.sys
ATI Technologies

6fdc61e8e8e17f6ecc2d9a10fa8df347 ati1pdxx.sys
ATI Technologies

9d318099bf3876a4af4bc75966d27603 ati1raxx.sys
ATI Technologies

bcaf267b10620f8c93f6e87ab726e145 ati1rvxx.sys
ATI Technologies

dac7d785cf62f5bd41441e9d6f5a6efe ati1snxx.sys
ATI Technologies

f7706dae7d101f1b19ce552d772ebfce ati1ttxx.sys
ATI Technologies

6f714b4720dd80ffa9f8d2731594ea4c ati1tuxx.sys
ATI Technologies

67ffbc158dd4d27ba3fc92c6acd87f73 ati1xbxx.sys
ATI Technologies

0d8cab1f08f7d3c4de228b49e12e596a ati1xsxx.sys
ATI Technologies

2d030c2f6b036ca0bc243e1b16d924d1 ati2mtaa.sys
ATI Technologies

8759322ffc1a50569c1e5528ee8026b7 ati2mtag.sys
ATI Technologies

993e7bd6438fe989e328c6b4bca246a9 atinbtxx.sys
ATI Technologies

ed4c2bf8403f4437987c0ba09cf48716 atinmdxx.sys
ATI Technologies

e90ac2b14e98f1a4372e5891b4278784 atinpdxx.sys
ATI Technologies

da36687d701c833430605a298731410b atinraxx.sys
ATI Technologies

a7a01b907db63898d40b0a14248ff9a2 atinrvxx.sys
ATI Technologies

ceddee2e0591894d19654d458fd3b9be atinsnxx.sys
ATI Technologies

d80a8f6c0a717446496c3a06d33b0d9c atinttxx.sys
ATI Technologies

edd66332608d27f4fd5069bcd0bc5164 atintuxx.sys
ATI Technologies

3e7d485cbd0b0d9f6ea2ad9442411831 atinxbxx.sys
ATI Technologies

77b575d7aab35d5908ae6ce681608d62 atinxsxx.sys
ATI Technologies

9916c1225104ba14794209cfa8012159 atmarpc.sys
Microsoft Corporation

39a0a59180f19946374275745b21aeba atmepvc.sys
Microsoft Corporation

ae76348a2605fb197fa8ff1d6f547836 atmlane.sys
Microsoft Corporation

e7ef69b38d17ba01f914ae8f66216a38 atmuni.sys
Microsoft Corporation

d9f724aa26c010a217c97606b160ed68 audstub.sys
Microsoft Corporation

da1f27d85e0d1525f6621372e7b685e9 beep.sys
Microsoft Corporation

f934d1b230f84e1d19dd00ac5a7a83ed bridge.sys
Microsoft Corporation

b279426e3c0c344893ed78a613a73bde bthenum.sys
Microsoft Corporation

fca6f069597b62d42495191ace3fc6c1 bthmodem.sys
Microsoft Corporation

80602b8746d3738f5886ce3d67ef06b6 bthpan.sys
Microsoft Corporation

662bfd909447dd9cc15b1a1c366583b4 bthport.sys
Microsoft Corporation

bb68cebffd181e18a26112d1b9f90f3d bthprint.sys
Microsoft Corporation

61364cd71ef63b0f038b7e9df00f1efa bthusb.sys
Microsoft Corporation

248dfa5762dde38dfddbbd44149e9d7a BVRPMPR5.SYS
bHoVS_VERSION_INFO?baStringFileInfobCommentsFCompanyNameAvanquestSoftwarel"FileDescriptionBVRPNDIS.MPRProtocolDrivervFileVersion...:rInternalNameBVRPMPR.SYSv)LegalCopyrightCopyright-AvanquestSoftware(LegalTrademarksBrOriginalFilenameBVRPMPR.SYSPrivateBuildProductNameBVRPNDISRawetherforWindows:vProductVersion...SpecialBuildDVarFileInfo$Translationt<@HL

90a673fc8e12a79afbed2576f6a7aaf9 cbidf2k.sys
Microsoft Corporation

0be5aef125be881c4f854c554f2b025c CCDECODE.sys
Microsoft Corporation

c1b486a7658353d33a10cc15211a873b cdaudio.sys
Microsoft Corporation

c885b02847f5d2fd45a24e219ed93b32 cdfs.sys
Microsoft Corporation

1f4260cc5b42272d71f79e570a27a4fe cdrom.sys
Microsoft Corporation

b562592b7f5759c99e179ca467ecfb4c cinemst2.sys
Ravisent Technologies

fe47dd8fe6d7768ff94ebec6c74b2719 classpnp.sys
Microsoft Corporation

9624293e55ad405415862b504ca95b73 cpqdap01.sys
Compaq Computer Corp

f50d9bdbb25cce075e514dc07472a22f crusoe.sys
Microsoft Corporation

7ffa171cce6a8bfc774862a578ba39a2 ctlfacem.sys
Creative Technology

71007bd2e1e26927fe3e4eb00c0beedf ctljystk.sys
Creative Technology

e65e2353a5d74ea89971cb918eeeb2f6 diskdump.sys
Microsoft Corporation

044452051f3e02e7963599fc8f4f3e25 disk.sys
Microsoft Corporation

d992fe1274bde0f84ad826acae022a41 dmboot.sys
Microsoft Corp

7c824cf7bbde77d95c08005717a95f6f dmio.sys
Microsoft Corp

e9317282a63ca4d188c0df5e09c6ac5f dmload.sys
Microsoft Corp

8a208dfcf89792a484e76c40e5f50b45 dmusic.sys
Microsoft Corporation

8f5fcff8e8848afac920905fbd9d33c8 drmkaud.sys
Microsoft Corporation

6cb08593487f5701d2d2254e693eafce drmk.sys
Microsoft Corporation

fe97d0343acfdebdd578fc67cc91fa87 dxapi.sys
Microsoft Corporation

ac7280566a7bb85cb3291f04ddc1198e dxg.sys
Microsoft Corporation

a73f5d6705b1d820c19b18782e176efd dxgthk.sys
Microsoft Corporation

ce37e3d51912e59c80c6d84337c0b4cd ElbyCDFL.sys
H`dVS_VERSION_INFO?(bStringFileInfotbCommentsCloneCDDriver<CompanyNameSlySoft,Inc.VFileDescriptionElbyCDIOFilterDrivervFileVersion,,,:rInternalNameElbyCDFL.syst(LegalCopyrightCopyright©-SlySoft,Inc.-LegalTrademarksCloneCDisatrademarkofElaborateBytesAGBrOriginalFilenameElbyCDFL.sys&PrivateBuildNobProductNameCloneCD:vProductVersion,,,LSpecialBuildWindows/XP/VISTADVarFileInfo$Translation*

178cc9403816c082d22a1d47fa1f9c85 ElbyCDIO.sys
H`;ttVS_VERSION_INFO?(StringFileInfobFCompanyNameElaborateBytesAGr%FileDescriptionElbyCDWindowsNT//XPI/OdrivervFileVersion,,,tInternalNameElbyCDIO~-LegalCopyrightCopyright©-ElaborateBytesAGQLegalTrademarksCloneDVD,CloneCD,elbyandElaborateBytesaretrademarksofElaborateBytesAGBrOriginalFilenameElbyCDIO.sys&PrivateBuildNotProductNameCDRTools:vProductVersion,,,FSpecialBuildWindowsNT//XPDVarFileInfo$Translation*

01f83e1b5dce05f5cb7d99113ca9e890 emu10k1m.sys
Creative Technology

38d332a6d56af32635675f132548343e fastfat.sys
Microsoft Corporation

92cdd60b6730b9f50f6a1a0c1f8cdc81 fdc.sys
Microsoft Corporation

cfc4cc73c903152a23e1db28eaba1f03 fetnd5bv.sys
VIA Technologies

e9648254056bce81a85380c0c3647dc4 fetnd5.sys
VIA Technologies

d45926117eb9fa946a6af572fbe1caa3 fips.sys
Microsoft Corporation

9d27e7b80bfcdf1cdd9b555862d5e7f0 flpydisk.sys
Microsoft Corporation

b2cf4b0786f8212cb92ed2b50c6db6b0 fltmgr.sys
Microsoft Corporation

3e1e2bd4f39b0e2b7dc4f4d2bcc2779a fs_rec.sys
Microsoft Corporation

455f778ee14368468560bd7cb8c854d0 fsvga.sys
Microsoft Corporation

6ac26732762483366c3969c9e4d2259d ftdisk.sys
Microsoft Corporation

3a74c423cf6bcca6982715878f450a3b gagp30kx.sys
Microsoft Corporation

065639773d8b03f33577f6cdaea21063 gameenum.sys
Microsoft Corporation

8182ff89c65e4d38b2de4bb0fb18564e GEARAspiWDM.sys
GEAR Software

4236e014632f4163f53ebb717f41594c HCF_MSFT.sys
Conexant

573c7d0a32852b48f3058cfd8026f511 hdaudbus.sys
Windows Server DDK provider

7bd2de4c85eb4241eed57672b16a7d8d hidbth.sys
Microsoft Corporation

1af592532532a402ed7c060f6954004f hidclass.sys
Microsoft Corporation

bb1a6fb7d35a91e599973fa74a619056 hidir.sys
Microsoft Corporation

96eccf28fdbf1b2cc12725818a63628d hidparse.sys
Microsoft Corporation

ccf82c5ec8a7326c3066de870c06daf1 hidusb.sys
Microsoft Corporation

d03d10f7ded688fecf50f8fbf1ea9b8a HPZid412.sys
HP

89f41658929393487b6b7d13c8528ce3 HPZipr12.sys
HP

abcb05ccdbf03000354b9553820e39f8 HPZius12.sys
HP

970178e8e003eb1481293830069624b9 hsfbs2s2.sys
Conexant

1225ebea76aac3c84df6c54fe5e5d8be hsfcxts2.sys
Conexant

ebb354438a4c5a3327fb97306260714a hsfdpsp2.sys
Conexant

f80a415ef82cd06ffaf0d971528ead38 http.sys
Microsoft Corporation

4a0b06aa8943c1e332520f7440c0aa30 i8042prt.sys
Microsoft Corporation

083a052659f5310dd8b6a6cb05edcf8e imapi.sys
Microsoft Corporation

8c953733d8f36eb2133f5bb58808b66b intelppm.sys
Microsoft Corporation

3bb22519a194418d5fec05d800a19ad0 ip6fw.sys
Microsoft Corporation

731f22ba402ee4b62748adaf6363c182 ipfltdrv.sys
Microsoft Corporation

b87ab476dcf76e72010632b5550955f5 ipinip.sys
Microsoft Corporation

cc748ea12c6effde940ee98098bf96bb ipnat.sys
Microsoft Corporation

23c74d75e36e7158768dd63d92789a91 ipsec.sys
Microsoft Corporation

b43b36b382aea10861f7c7a37f9d4ae2 irbus.sys
Microsoft Corporation

c93c9ff7b04d772627a3646d89f7bf89 irenum.sys
Microsoft Corporation

05a299ec56e52649b1cf2fc52d20f2d7 isapnp.sys
Microsoft Corporation

463c1ec80cd17420a542b7f36a36f128 kbdclass.sys
Microsoft Corporation

692bcf44383d056aed41b045a323d378 kmixer.sys
Microsoft Corporation

b467646c54cc746128904e1654c750c1 ksecdd.sys
Microsoft Corporation

0753515f78df7f271a5e61c20bcd36a1 ks.sys
Microsoft Corporation

9d7dc6fbe057ad5d25c8ce1666363431 lv302af.sys
tP`pttVS_VERSION_INFOnjnj?StringFileInfoXEbCompanyNameLabtecInc.dFileDescriptionAudiofilterforExpressPlusbFileVersion...bInternalNamelvaf.sys|,LegalCopyright©-Labtec.Allrightsreserved.@bOriginalFilenamelvaf.sys<ProductNameLabtecWebCam<bProductVersion...XEbCompanyNameLabtecInc.dFileDescriptionAudiofilterforExpressPlusbFileVersion...bInternalNamelvaf.sys|,LegalCopyright©-Labtec.Allrightsreserved.@bOriginalFilenamelvaf.sys<ProductNameLabtecWebCam<bProductVersion...DVarFileInfo$TranslationtVS_VERSION_INFOnjnj?|StringFileInfoXBbCompanyNameLabtecInc.dFileDescriptionAudiofilterforExpressPlusbFileVersion...bInternalNamelvaf.sys|,LegalCopyright©-Labtec.Allrightsreserved.@bOriginalFilenamelvaf.sys<ProductNameLabtecWebCam<bProductVersion...DVarFileInfo$Translation*

750f1a2b9e1c1a1d6a72483b777c64f9 LV302V32.SYS
tP`THbTVS_VERSION_INFOnjnj?StringFileInfoHEbCompanyNameLabtecInc.RFileDescriptionLabtecWebCamDriverbFileVersion...bInternalNamelvav.sys|,LegalCopyright©-Labtec.Allrightsreserved.@bOriginalFilenamelvav.sys<ProductNameLabtecWebCam<bProductVersion...HEbCompanyNameLabtecInc.RFileDescriptionLabtecWebCamDriverbFileVersion...bInternalNamelvav.sys|,LegalCopyright©-Labtec.Allrightsreserved.@bOriginalFilenamelvav.sys<ProductNameLabtecWebCam<bProductVersion...DVarFileInfo$TranslationtbVS_VERSION_INFOnjnj?lStringFileInfoHBbCompanyNameLabtecInc.RFileDescriptionLabtecWebCamDriverbFileVersion...bInternalNamelvav.sys|,LegalCopyright©-Labtec.Allrightsreserved.@bOriginalFilenamelvav.sys<ProductNameLabtecWebCam<bProductVersion...DVarFileInfo$Translation*

b72e763eb92b8dbe45c455ba6e4babd0 Lvckap.sys
tP`p(<VS_VERSION_INFOnjnj?StringFileInfoxEbCompanyNameLabtecInc.-FileDescriptionLabtecKernelAudioProcessingFilterDriverbFileVersion...vInternalNameLVxKAP.sys|,LegalCopyright©-Labtec.Allrightsreserved.>vOriginalFilenameLVxKAP.sys<ProductNameLabtecWebCam<bProductVersion...xEbCompanyNameLabtecInc.-FileDescriptionLabtecKernelAudioProcessingFilterDriverbFileVersion...vInternalNameLVxKAP.sys|,LegalCopyright©-Labtec.Allrightsreserved.>vOriginalFilenameLVxKAP.sys<ProductNameLabtecWebCam<bProductVersion...DVarFileInfo$Translationt<VS_VERSION_INFOnjnj?StringFileInfoxBbCompanyNameLabtecInc.-FileDescriptionLabtecKernelAudioProcessingFilterDriverbFileVersion...vInternalNameLVxKAP.sys|,LegalCopyright©-Labtec.Allrightsreserved.>vOriginalFilenameLVxKAP.sys<ProductNameLabtecWebCam<bProductVersion...DVarFileInfo$TranslationGM

e8a376abc340c35318a79b766c2406bb LVMVdrv.sys
tP`p!b!,VS_VERSION_INFOnjnj?StringFileInfohEbCompanyNameLabtecInc.t&FileDescriptionLogitechMachineVisionEngineLoaderbFileVersion...bInternalNameLVMVdrv.sys|,LegalCopyright©-Labtec.Allrightsreserved.@bOriginalFilenameLVMVdrv.sys<ProductNameLabtecWebCam<bProductVersion...hEbCompanyNameLabtecInc.t&FileDescriptionLogitechMachineVisionEngineLoaderbFileVersion...bInternalNameLVMVdrv.sys|,LegalCopyright©-Labtec.Allrightsreserved.@bOriginalFilenameLVMVdrv.sys<ProductNameLabtecWebCam<bProductVersion...DVarFileInfo$Translationt,VS_VERSION_INFOnjnj?StringFileInfohBbCompanyNameLabtecInc.t&FileDescriptionLogitechMachineVisionEngineLoaderbFileVersion...bInternalNameLVMVdrv.sys|,LegalCopyright©-Labtec.Allrightsreserved.@bOriginalFilenameLVMVdrv.sys<ProductNameLabtecWebCam<bProductVersion...DVarFileInfo$Translation*

839da24941c0395c69c681f12b721a47 LVUSBSta.sys
tP`pwd|dVS_VERSION_INFOnjnj?StringFileInfoPEbCompanyNameLabtecInc.RFileDescriptionUSBStatisticDriverbFileVersion...:rInternalNameLVUSBSta.sys|,LegalCopyright©-Labtec.Allrightsreserved.BrOriginalFilenameLVUSBSta.sys<ProductNameLabtecWebCam<bProductVersion...PEbCompanyNameLabtecInc.RFileDescriptionUSBStatisticDriverbFileVersion...:rInternalNameLVUSBSta.sys|,LegalCopyright©-Labtec.Allrightsreserved.BrOriginalFilenameLVUSBSta.sys<ProductNameLabtecWebCam<bProductVersion...DVarFileInfo$TranslationtVS_VERSION_INFOnjnj?tStringFileInfoPBbCompanyNameLabtecInc.RFileDescriptionUSBStatisticDriverbFileVersion...:rInternalNameLVUSBSta.sys|,LegalCopyright©-Labtec.Allrightsreserved.BrOriginalFilenameLVUSBSta.sys<ProductNameLabtecWebCam<bProductVersion...DVarFileInfo$Translationt

69a6268d7f81e53d568ab4e7e991caf3 mbam.sys
Malwarebytes Corporation

d1f8be91ed4ddb671d42e473e3fe71ab mcd.sys
Microsoft Corporation

195741aee20369980796b557358cd774 mdmxsdk.sys
Conexant

a7da20ab18a1bdae28b0f349e57da0d1 mf.sys
Microsoft Corporation

4ae068242760a1fb6e1a44bf4e16afa6 mnmdd.sys
Microsoft Corporation

dfcbad3cec1c5f964962ae10e0bcc8e1 modem.sys
Microsoft Corporation

35c9e97194c8cfb8430125f8dbc34d04 mouclass.sys
Microsoft Corporation

a80b9a0bad1b73637dbcbba7df72d3fd mountmgr.sys
Microsoft Corporation

70c14f5cca5cf73f8a645c73a01d8726 mqac.sys
Microsoft Corporation

11d42bb6206f33fbb3ba0288d3ef81bd mrxdav.sys
Microsoft Corporation

f3aefb11abc521122b67095044169e98 mrxsmb.sys
Microsoft Corporation

c941ea2454ba8350021d774daf0f1027 msfs.sys
Microsoft Corporation

0a02c63c8b144bd8c86b103dee7c86a2 msgpc.sys
Microsoft Corporation

d1575e71568f4d9e14ca56b7b0453bf1 mskssrv.sys
Microsoft Corporation

325bb26842fc7ccc1fcce2c457317f3e mspclock.sys
Microsoft Corporation

bad59648ba099da4a17680b39730cb3d mspqm.sys
Microsoft Corporation

af5f4f3f14a8ea2c26de30f7a1e17136 mssmbios.sys
Microsoft Corporation

e53736a9e30c45fa9e7b5eac55056d1d MSTEE.sys
Microsoft Corporation

c53775780148884ac87c455489a0c070 mtlmnt5.sys
Smart Link

54886a652bf5685192141df304e923fd mtlstrm.sys
Smart Link

6dda78a0be692b61b668fab860f276cf mtxparhm.sys
Matrox Graphics

2f625d11385b1a94360bfc70aaefdee1 mup.sys
Microsoft Corporation

b538dcd9816ea35fa4f637cfc261aaa8 mutohpen.sys
Microsoft Corporation

5b50f1b2a2ed47d560577b221da734db NABTSFEC.sys
Microsoft Corporation

7ff1f1fd8609c149aa432f95a8163d97 NdisIP.sys
Microsoft Corporation

1df7f42665c94b825322fae71721130d ndis.sys
Microsoft Corporation

1ab3d00c991ab086e69db84b6c0ed78f ndistapi.sys
Microsoft Corporation

f927a4434c5028758a842943ef1a3849 ndisuio.sys
Microsoft Corporation

edc1531a49c80614b2cfda43ca8659ab ndiswan.sys
Microsoft Corporation

6215023940cfd3702b46abc304e1d45a ndproxy.sys
Microsoft Corporation

5d81cf9a2f1a3a756b66cf684911cdf0 netbios.sys
Microsoft Corporation

74b2b2f5bea5e9a3dc021d685551bd3d netbt.sys
Microsoft Corporation

e9e47cfb2d461fa0fc75b7a74c6383ea nic1394.sys
Microsoft Corporation

be984d604d91c217355cdd3737aad25d nikedrv.sys
Diamond Multimedia Systems

1e421a6bcf2203cc61b821ada9de878b nmnt.sys
Microsoft Corporation

3182d64ae053d6fb034f44b6def8034a npfs.sys
Microsoft Corporation

78a08dd6a8d65e697c18e1db01c5cdca ntfs.sys
Microsoft Corporation

576b34ceae5b7e5d9fd2775e93b3db53 ntmtlfax.sys
Smart Link

73c1e1f395918bc2c6dd67af7591a3ad null.sys
Microsoft Corporation

2b298519edbfcf451d43e0f1e8f1006d nv4_mini.sys
NVIDIA Corporation

b305f3fad35083837ef46a0bbce2fc57 nwlnkflt.sys
Microsoft Corporation

c99b3415198d1aab7227f2c88fd664b9 nwlnkfwd.sys
Microsoft Corporation

8b8b1be2dba4025da6786c645f77f123 nwlnkipx.sys
Microsoft Corporation

56d34a67c05e94e16377c60609741ff8 nwlnknb.sys
Microsoft Corporation

c0bb7d1615e1acbdc99757f6ceaf8cf0 nwlnkspx.sys
Microsoft Corporation

36b9b950e3d2e100970a48d8bad86740 nwrdr.sys
Microsoft Corporation

4bb30ddc53ebc76895e38694580cdfe9 oprghdlr.sys
Microsoft Corporation

c90018bafdc7098619a4a95b046b30f3 p3.sys
Microsoft Corporation

5575faf8f97ce5e713d108c2a58d7c7c parport.sys
Microsoft Corporation

beb3ba25197665d82ec7065b724171c6 partmgr.sys
Microsoft Corporation

70e98b3fd8e963a6a46a2e6247e0bea1 parvdm.sys
Microsoft Corporation

ccf5f451bb1a5a2a522a76e670000ff0 pciide.sys
Microsoft Corporation

52e60f29221d0d1ac16737e8dbf7c3e9 pciidex.sys
Microsoft Corporation

a219903ccf74233761d92bef471a07b1 pci.sys
Microsoft Corporation

9e89ef60e9ee05e3f2eef2da7397f1c1 pcmcia.sys
Microsoft Corporation

e82a496c3961efc6828b508c310ce98f portcls.sys
Microsoft Corporation

a32bebaf723557681bfc6bd93e98bd26 processr.sys
Microsoft Corporation

09298ec810b07e5d582cb3a3f9255424 psched.sys
Microsoft Corporation

80d317bd1c3dbc5d4fe7b1678c60cadd ptilink.sys
Parallel Technologies

fe0d99d6f31e4fad8159f690d68ded9c rasacd.sys
Microsoft Corporation

11b4a627bc9614b885c4969bfa5ff8a6 rasl2tp.sys
Microsoft Corporation

5bc962f2654137c9909c3d4603587dee raspppoe.sys
Microsoft Corporation

efeec01b1d3cf84f16ddd24d9d9d8f99 raspptp.sys
Microsoft Corporation

fdbb1d60066fcfbb7452fd8f9829b242 raspti.sys
Microsoft Corporation

01524cd237223b18adbb48f70083f101 rawwan.sys
Microsoft Corporation

7ad224ad1a1437fe28d89cf22b17780a rdbss.sys
Microsoft Corporation

4912d5b403614ce99c28420f75353332 rdpcdd.sys
Microsoft Corporation

15cabd0f7c00c47c70124907916af3f1 rdpdr.sys
Microsoft Corporation

6728e45b66f93c08f11de2e316fc70dd rdpwd.sys
Microsoft Corporation

e9aaa0092d74a9d371659c4c38882e12 recagent.sys
Smart Link

f828dd7e1419b6653894a8f97a0094c5 redbook.sys
Microsoft Corporation

851c30df2807fcfa21e4c681a7d6440e rfcomm.sys
Microsoft Corporation

a56fe08ec7473e8580a390bb1081cdd7 rio8drv.sys
Diamond Multimedia Systems

0a854df84c77a0be205bfeab2ae4f0ec riodrv.sys
Diamond Multimedia Systems

96f7a9a7bf0c9c0440a967440065d33c rmcast.sys
Microsoft Corporation

601844cbcf617ff8c868130ca5b2039d rndismp.sys
Microsoft Corporation

726548542afeca56257ff01eb13bb6d7 rndismpx.sys
Microsoft Corporation

d8b0b4ade32574b2d9c5cc34dc0dbbe7 rootmdm.sys
Microsoft Corporation

0dbcc071a268e0340a2ba6bdd98bace4 s3gnbm.sys
SGraphics

76c465f570e90c28942d52ccb2580a10 scsiport.sys
Microsoft Corporation

8d04819a3ce51b9eb47e5689b44d43c4 sdbus.sys
Microsoft Corporation

90a3935d05b494a5a39d37e71f09a677 secdrv.sys
Macrovision Corporation

0f29512ccd6bead730039fb4bd2c85ce serenum.sys
Microsoft Corporation

d676650d6709bf1a4b2d464ed3664367 serial.old.sys
Microsoft Corporation

cd9404d115a00d249f70a371b46d5a26 serial.sys
Microsoft Corporation

0fa803c64df0914b41f807ea276bf2a6 sffdisk.sys
Microsoft Corporation

d66d22d76878bf3483a6be30183fb648 sffp_mmc.sys
Microsoft Corporation

c17c331e435ed8737525c86a7557b3ac sffp_sd.sys
Microsoft Corporation

8e6b8c671615d126fdc553d1e2de5562 sfloppy.sys
Microsoft Corporation

0b1a5e9cacb5cdd54a2815107bd7c772 sfmanm.sys
Creative Technology

6b33d0ebd30db32e27d1d78fe946a754 sisagp.sys
Silicon Integrated Systems

866d538ebe33709a5c9f5c62b73b7d14 SLIP.sys
Microsoft Corporation

d9673011648a71ed1e1f77b831bc85e6 slnt7554.sys
Smart Link

2c1779c0feb1f4a6033600305eba623a slntamr.sys
Smart Link

f9b8e30e82ee95cf3e1d3e495599b99c slnthal.sys
Smart Link

db56bb2c55723815cf549d7fc50cfceb slwdmsup.sys
Smart Link

895be38a993b9bd5abbe570d63d88a2e smbali.sys
Microsoft Corporation

017daecf0ed3aa731313433601ec40fa smclib.sys
Microsoft Corporation

da44fcebf4efb826667ed1fab6159bea SndTAudio.sys
?tStringFileInfoBv+CompanyNameWindows®CodenameLonghornDDKproviderFFileDescriptionSupportDevice`FileVersion...builtby:WinDDK.aInternalNameDriverTLegalCopyrightCopyright©-aOriginalFilenameDriverr)ProductNameWindows®CodenameLonghornDDKdriverBProductVersion...DVarFileInfo$Translationt

489703624dac94ed943c2abda022a1cd sonydcam.sys
Microsoft Corporation

ab8b92451ecb048a4d1de7c3ffcb4a9f splitter.sys
Microsoft Corporation

8ea0fd60a5b047e0c734d51aace531c9 sptd.sys
Duplex Secure

76bb022c2fb6902fd5bdd4f78fc13a5d sr.sys
Microsoft Corporation

89220b427890aa1dffd1a02648ae51c3 srv.sys
Microsoft Corporation

77813007ba6265c4b6098187e6ed79d2 StreamIP.sys
Microsoft Corporation

3e5d89099ded9e86e5639f411693218f stream.sys
Microsoft Corporation

3941d127aef12e93addf6fe6ee027e0f swenum.sys
Microsoft Corporation

8ce882bcc6cf8a62f2b2323d95cb3d01 swmidi.sys
Microsoft Corporation

b3b20f43f2242a578e29a17af976e04c symdns.sys
Symantec Corporation

42123611a49c33536ab29bdd852a9f5e SYMEVENT.SYS
Symantec Corporation

c7cfd475ec898d3bc7072d1b2dc6ef55 symfw.sys
Symantec Corporation

c7f37ed85943572700ad8db0880cc08f SymIDSCo.sys
Symantec Corporation

b18988d3d7d3ff6fce633b7aa800c18f symids.sys
Symantec Corporation

c99cebae90c6a2351b0eaab861dfc948 symndis.sys
Symantec Corporation

8ddb430ea48468c156db872a214178fc symredrv.sys
Symantec Corporation

ec1a39493fb104d317e8271162a74b94 symtdi.sys
Symantec Corporation

8b83f3ed0f1688b4958f77cd6d2bf290 sysaudio.sys
Microsoft Corporation

fd6093e3decd925f1cffc8a0dd539d72 tape.sys
Microsoft Corporation

4e53bbcc4be37d7a4bd6ef1098c89ff7 tcpip6.sys
Microsoft Corporation

9aefa14bd6b182d61e3119fa5f436d3d tcpip.sys
Microsoft Corporation

0539d5e53587f82d1b4fd74c5be205cf tdi.sys
Microsoft Corporation

6471a66807f5e104e4885f5b67349397 tdpipe.sys
Microsoft Corporation

c56b6d0402371cf3700eb322ef3aaf61 tdtcp.sys
Microsoft Corporation

88155247177638048422893737429d9e termdd.sys
Microsoft Corporation

699450901c5ccfd82357cbc531cedd23 tosdvd.sys
Microsoft Corporation

d74a8ec75305f1d3cfde7c7fc1bd62a9 tsbvcap.sys
Toshiba Corporation

8f861eda21c05857eb8197300a92501c tunmp.sys
Microsoft Corporation

d85938f272d1bcf3db3a31fc0a048928 uagp35.sys
Microsoft Corporation

5787b80c2e3c5e2f56c2a233d91fa2c9 udfs.sys
Microsoft Corporation

402ddc88356b1bac0ee3dd1580c76a31 update.sys
Microsoft Corporation

bee793d4a059caea55d6ac20e19b3a8f usb8023.sys
Microsoft Corporation

b6cc50279d6cd28e090a5d33244adc9a usb8023x.sys
Microsoft Corporation

e919708db44ed8543a7c017953148330 usbaudio.sys
Microsoft Corporation

ce97845d2e3f0d274b8bac1ed07c6149 usbcamd2.sys
Microsoft Corporation

1c1a47b40c23358245aa8d0443b6935e usbcamd.sys
Microsoft Corporation

173f317ce0db8e21322e71b7e60a27e8 usbccgp.sys
Microsoft Corporation

596eb39b50d6ebd9b734dc4ae0544693 usbd.sys
Microsoft Corporation

65dcf09d0e37d4c6b11b5b0b76d470a7 usbehci.sys
Microsoft Corporation

1ab3cdde553b6e064d2e754efe20285c usbhub.sys
Microsoft Corporation

290913dc4f1125e5a82de52579a44c43 usbintel.sys
Microsoft Corporation

791912e524cc2cc6f50b5f2b52d1eb71 usbport.sys
Microsoft Corporation

a717c8721046828520c9edf31288fc00 usbprint.sys
Microsoft Corporation

a0b8cf9deb1184fbdd20784a58fa75d4 usbscan.sys
Microsoft Corporation

a32426d9b14a089eaa1d922e0c5801a9 usbstor.sys
Microsoft Corporation

26496f9dee2d787fc3e61ad54821ffe6 usbuhci.sys
Microsoft Corporation

63bbfca7f390f4c49ed4b96bfb1633e0 usbvideo.sys
Microsoft Corporation

55e01061c74a8cefff58dc36114a8d3f vdmindvd.sys
Ravisent Technologies

0d3a8fafceacd8b7625cd549757a7df1 vga.sys
Microsoft Corporation

f76ea9ae8d32ec50159795d29674465e VIAAGP1.SYS
VIA Technologies

754292ce5848b3738281b4f3607eaef4 viaagp.sys
Microsoft Corporation

3b3efcda263b8ac14fdf9cbdd0791b2e viaide.sys
Microsoft Corporation

f4d7aa3bd65093a27e30ea75be1a1b1e viaudios.sys
VIA Technologies

e28726b72c46821a28830e077d39a55b videoprt.sys
Microsoft Corporation

4c8fcb5cc53aab716d810740fe59d025 volsnap.sys
Microsoft Corporation

16409c468ceee99b6b129fcaa5c0f206 vulfnth.sys
VIA Technologies

541447e05eddd1164a5ea925778b209d vulfntr.sys
VIA Technologies

aced8c149b30f8496c237bcba3727b48 wacompen.sys
Microsoft Corporation

0308aef61941e4af478fa1a0f83812f5 wadv07nt.sys
Intel Corporation

714038a8aa5de08e12062202cd7eaeb5 wadv08nt.sys
Intel Corporation

7bb3aa595e4507a788de1cdc63f4c8c4 wadv09nt.sys
Intel Corporation

36e6c405b6143d09687f4056fd9a0d10 wadv11nt.sys
Intel Corporation

e20b95baedb550f32dd489265c1da1f6 wanarp.sys
Microsoft Corporation

352fa0e98bc461ce1ce5d41f64db558d watv06nt.sys
Intel Corporation

791cc45de6e50445be72e8ad6401ff45 watv10nt.sys
Intel Corporation

6768acf64b18196494413695f0c3a00f wdmaud.sys
Microsoft Corporation

2f31b7f954bed437f2c75026c65caf7b wmilib.sys
Microsoft Corporation

d7467f619f574ab36286d2903e751deb wpdusb.sys
Microsoft Corporation

6abe6e225adb5a751622a9cc3bc19ce8 ws2ifsl.sys
Microsoft Corporation

c98b39829c2bbd34e454150633c62c78 WSTCODEC.SYS
Microsoft Corporation

#13 Noviciate

Noviciate

  • Malware Response Team
  • 5,277 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Numpty HQ
  • Local time:12:16 PM

Posted 29 November 2011 - 03:24 PM

Good evening. :)

Can you tell me how the PC is behaving itself now?

So long, and thanks for all the fish.

 

 


#14 edp333

edp333
  • Topic Starter

  • Members
  • 66 posts
  • OFFLINE
  •  
  • Local time:06:16 AM

Posted 29 November 2011 - 06:54 PM

The redirect on Google and/or Bing is still happening. Other than that the computer is runnung fine.

Edited by edp333, 29 November 2011 - 06:56 PM.


#15 Noviciate

Noviciate

  • Malware Response Team
  • 5,277 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Numpty HQ
  • Local time:12:16 PM

Posted 30 November 2011 - 03:47 PM

Good evening. :)

Download TDSSKiller.zip from Kaspersky from here and save it to your Desktop.

  • You will then need to extract the file(s) from the zipped folder.
  • To do this: Right-click on the zipped folder and from the menu that appears, click on Extract All...
    In the Extraction Wizard window that opens, click on Next> and in the next window that appears, click on Next> again.
    In the final window, click on Finish

  • Please close all open programs as this may result in a reboot being necessary.
  • Double click TDSSKiller.exe to begin.
  • Click Change parameters and check the two boxes under Additional Options.
  • Click Start scan and allow the tool to do just that.
  • One the scan has completed, if the tool has identified anything allow it to carry out it's default action(s) - you'll need to click Continue where appropriate.
  • Finally, if it prompts you to reboot your machine, please click Reboot Now and ensure that your machine does so.
  • If the scan finds nothing, please click the Report button and let me have a copy of the text file that opens.
  • If you reboot your machine, the log, which i'd like to see, will be located at the root of you hard drive as C:\TDSSKiller.Version_Date_Time_log.txt.
    Please check that you get the one with the right date and time. :)

So long, and thanks for all the fish.

 

 





0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users