Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

New Variant of Zero Access Rootkit Ouchie!


  • This topic is locked This topic is locked
27 replies to this topic

#1 Dan.Newton

Dan.Newton

  • Members
  • 23 posts
  • OFFLINE
  •  
  • Local time:03:32 AM

Posted 21 May 2012 - 08:17 PM

Attached File  dds.txt   16.43KB   4 downloadsAttached File  attach.txt   17.58KB   1 downloads

BC AdBot (Login to Remove)

 


#2 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:04:32 AM

Posted 21 May 2012 - 11:45 PM

Hello and Welcome to Bleeping Computer!!

My name is Gringo and I'll be glad to help you with your computer problems.

I have put together somethings for you to keep in mind while I am helping you to make things go easier and faster for both of us

  • Please do not run any tools unless instructed to do so.
    • We ask you to run different tools in a specific order to ensure the malware is completely removed from your machine, and running any additional tools may detect false positives, interfere with our tools, or cause unforeseen damage or system instability.
  • Please do not attach logs or use code boxes, just copy and paste the text.
    • Due to the high volume of logs we receive it helps to receive everything in the same format, and code boxes make the logs very difficult to read. Also, attachments require us to download and open the reports when it is easier to just read the reports in your post.
  • Please read every post completely before doing anything.
    • Pay special attention to the NOTE: lines, these entries identify an individual issue or important step in the cleanup process.
  • Please provide feedback about your experience as we go.
    • A short statement describing how the computer is working helps us understand where to go next, for example: I am still getting redirected, the computer is running normally, etc. Please do not describe the computer as "the same", this requires the extra step of looking back at your previous post.
NOTE: At the top of your post, click on the Watch Topic Button, select Immediate Notification, and click on Proceed. This will send you an e-mail as soon as I reply to your topic, allowing us to resolve the issue faster.

NOTE: Backup any files that cannot be replaced. Removing malware can be unpredictable and this step can save a lot of hartaches if things don't go as planed. You can put them on a CD/DVD, external drive or a pen drive, anywhere except on the computer.

NOTE: It is good practice to copy and paste the instructions into notepad and print them in case it is necessary for you to go offline during the cleanup process. To open notepad, navigate to Start Menu > All Programs > Accessories > Notepad. Please remember to copy the entire post so you do not miss any instructions.

Security Check

  • Download Security Check by screen317 from here.
  • Save it to your Desktop.
  • Double click SecurityCheck.exe and follow the onscreen instructions inside of the black box.
  • A Notepad document should open automatically called checkup.txt; please post the contents of that document.



Run Combofix:

You may be asked to install or update the Recovery Console (Win XP Only) if this happens please allow it to do so (you will need to be connected to the internet for this)

Before you run Combofix I will need you to turn off any security software you have running, If you do not know how to do this you can find out >here< or >here<

Combofix may need to reboot your computer more than once to do its job this is normal.

You can download Combofix from one of these links.
Link 1
Link 2
Link 3
1. Close any open browsers or any other programs that are open.
2. Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.

Double click on combofix.exe & follow the prompts.
When finished, it will produce a report for you.

Note 1: Do not mouseclick combofix's window while it's running. That may cause it to stall

Note 2: If you recieve an error "Illegal operation attempted on a registery key that has been marked for deletion." Please restart the computer

"information and logs"

  • In your next post I need the following
  • Log from Combofix
  • let me know of any problems you may have had
  • How is the computer doing now?

Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#3 Dan.Newton

Dan.Newton
  • Topic Starter

  • Members
  • 23 posts
  • OFFLINE
  •  
  • Local time:03:32 AM

Posted 22 May 2012 - 08:07 AM

Bleepin Gringo, thank you for your kind and timely offer to help. Thanks also for the detailed instructions. I have attached logs of the dds.txt and attach.txt files. I also have the results of a gmer scan. Will you be needing those?
In the mean time, I'll just follow the instructions.

#4 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:04:32 AM

Posted 22 May 2012 - 08:10 AM

go ahead and give me the GMer scan with the combofix report


Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#5 Dan.Newton

Dan.Newton
  • Topic Starter

  • Members
  • 23 posts
  • OFFLINE
  •  
  • Local time:03:32 AM

Posted 22 May 2012 - 08:23 AM

Results of screen317's Security Check version 0.99.34
Windows XP Service Pack 3 x86
Internet Explorer 8
``````````````````````````````
Antivirus/Firewall Check:

Windows Security Center service is not running! This report may not be accurate!
Symantec AntiVirus
Sophos Virus Removal Tool
Antivirus up to date!
```````````````````````````````
Anti-malware/Other Utilities Check:

Malwarebytes Anti-Malware version 1.61.0.1400
Java™ 6 Update 30
Java version out of date!
Adobe Flash Player 11.2.202.235
Adobe Reader X (10.1.3)
Mozilla Firefox (for.)
````````````````````````````````
Process Check:
objlist.exe by Laurent

Malwarebytes Anti-Malware mbamservice.exe
Malwarebytes Anti-Malware mbamgui.exe
Symantec AntiVirus DefWatch.exe
``````````End of Log````````````

A warning popped up saying: Netsh.exe Entry Point not found. The procedure entry point MigrateWinsockConfiguration could not be located in the dynamic link library MSWSock.dll.

#6 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:04:32 AM

Posted 22 May 2012 - 08:36 AM

OK give me the combofix report


gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#7 Dan.Newton

Dan.Newton
  • Topic Starter

  • Members
  • 23 posts
  • OFFLINE
  •  
  • Local time:03:32 AM

Posted 22 May 2012 - 10:07 AM

I keep trying to uncheck symantec autoprotect and it will not allow that. If I r-click lower right it resets itself. If I open symantec and try there it will not allow.

#8 Dan.Newton

Dan.Newton
  • Topic Starter

  • Members
  • 23 posts
  • OFFLINE
  •  
  • Local time:03:32 AM

Posted 22 May 2012 - 12:37 PM

OK. Finally got Symantec outta there. Results of ComboFix:
ComboFix 12-05-22.02 - Dan 05/22/2012 13:09:00.1.1 - x86
Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.2046.894 [GMT -4:00]
Running from: c:\documents and settings\Dan\Desktop\ComboFix.exe
AV: Symantec AntiVirus Corporate Edition *Disabled/Updated* {FB06448E-52B8-493A-90F3-E43226D3305C}
.
.
((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.
.
c:\documents and settings\All Users\Application Data\TEMP
c:\documents and settings\Dan\GoToAssistDownloadHelper.exe
c:\documents and settings\Dan\Local Settings\Application Data\{1ad4135c-b36a-5032-e9d8-d2df74d2e69a}
c:\documents and settings\Dan\Local Settings\Application Data\{1ad4135c-b36a-5032-e9d8-d2df74d2e69a}\@
c:\documents and settings\Dan\Local Settings\Application Data\{1ad4135c-b36a-5032-e9d8-d2df74d2e69a}\L\00000004.@
c:\documents and settings\Dan\Local Settings\Application Data\{1ad4135c-b36a-5032-e9d8-d2df74d2e69a}\L\80000032.@
c:\documents and settings\Dan\Local Settings\Application Data\{1ad4135c-b36a-5032-e9d8-d2df74d2e69a}\n
c:\documents and settings\Dan\Local Settings\Application Data\{1ad4135c-b36a-5032-e9d8-d2df74d2e69a}\U\00000004.@
c:\documents and settings\Dan\Local Settings\Application Data\{1ad4135c-b36a-5032-e9d8-d2df74d2e69a}\U\00000008.@
c:\documents and settings\Dan\Local Settings\Application Data\{1ad4135c-b36a-5032-e9d8-d2df74d2e69a}\U\000000cb.@
c:\documents and settings\Dan\Local Settings\Application Data\{1ad4135c-b36a-5032-e9d8-d2df74d2e69a}\U\80000000.@
c:\documents and settings\Dan\Local Settings\Application Data\{1ad4135c-b36a-5032-e9d8-d2df74d2e69a}\U\80000032.@
c:\program files\GuffinsEI
c:\program files\Search Toolbar
c:\program files\Search Toolbar\icon.ico
c:\program files\Search Toolbar\SearchToolbar.dll
c:\program files\Search Toolbar\SearchToolbarUninstall.exe
c:\program files\Search Toolbar\SearchToolbarUpdater.exe
c:\program files\TelevisionFanatic
c:\program files\TelevisionFanatic\bar\Cache\07949C14
c:\program files\TelevisionFanatic\bar\Cache\0794A079
c:\program files\TelevisionFanatic\bar\Cache\0794A3F4.bmp
c:\program files\TelevisionFanatic\bar\Cache\0794A58A.bmp
c:\program files\TelevisionFanatic\bar\Cache\0794A953.bmp
c:\program files\TelevisionFanatic\bar\Cache\0794A9EF.bmp
c:\program files\TelevisionFanatic\bar\Cache\0794AA8C.bmp
c:\program files\TelevisionFanatic\bar\Cache\0794AB28.bmp
c:\program files\TelevisionFanatic\bar\Cache\0794ABB4.bmp
c:\program files\TelevisionFanatic\bar\Cache\0794AC51.bmp
c:\program files\TelevisionFanatic\bar\Cache\0794AD2B.bmp
c:\program files\TelevisionFanatic\bar\Cache\0794ADA8.bmp
c:\program files\TelevisionFanatic\bar\Cache\0794AE25.bmp
c:\program files\TelevisionFanatic\bar\Cache\0794AEA2.bmp
c:\program files\TelevisionFanatic\bar\Cache\0794B634.jhtml
c:\program files\TelevisionFanatic\bar\Cache\0794DD44
c:\program files\TelevisionFanatic\bar\Cache\0794FF33.bmp
c:\program files\TelevisionFanatic\bar\Cache\files.ini
c:\program files\TelevisionFanatic\bar\gen1\COMMON.T8S
c:\program files\TelevisionFanatic\bar\History\search3
c:\program files\TelevisionFanatic\bar\IE9Mesg\COMMON.T8S
c:\program files\TelevisionFanatic\bar\Message\COMMON.T8S
c:\program files\TelevisionFanatic\bar\Message\COMMON\8_step1.gif
c:\program files\TelevisionFanatic\bar\Message\COMMON\anemone.js
c:\program files\TelevisionFanatic\bar\Message\COMMON\bd_grad.gif
c:\program files\TelevisionFanatic\bar\Message\COMMON\hpguard.js
c:\program files\TelevisionFanatic\bar\Message\COMMON\hpguard1.htm
c:\program files\TelevisionFanatic\bar\Message\COMMON\hpguard2.htm
c:\program files\TelevisionFanatic\bar\Message\COMMON\hpp_ok.png
c:\program files\TelevisionFanatic\bar\Message\COMMON\hpp_x.png
c:\program files\TelevisionFanatic\bar\Message\COMMON\hpp_x2.png
c:\program files\TelevisionFanatic\bar\Message\COMMON\index.htm
c:\program files\TelevisionFanatic\bar\Message\COMMON\mid_dots.gif
c:\program files\TelevisionFanatic\bar\Message\COMMON\mws_logo.gif
c:\program files\TelevisionFanatic\bar\Message\COMMON\protect.htm
c:\program files\TelevisionFanatic\bar\Message\COMMON\rebut4b.htm
c:\program files\TelevisionFanatic\bar\Message\COMMON\shield.png
c:\program files\TelevisionFanatic\bar\Message\COMMON\stop.gif
c:\program files\TelevisionFanatic\bar\Message\COMMON\systrayp.htm
c:\program files\TelevisionFanatic\bar\Message\COMMON\tp_grad.gif
c:\program files\TelevisionFanatic\bar\Settings\prevcfg2.htm
c:\program files\TelevisionFanatic\bar\Settings\s_pid.dat
c:\program files\TelevisionFanatic\bar\Settings\s_w1.dat
c:\program files\TelevisionFanatic\bar\Settings\s_w2.dat
c:\program files\TelevisionFanatic\bar\Settings\setting3.htm
c:\program files\TelevisionFanatic\TelevisionFanatic\Cache\PopupProperties100016728.html
c:\program files\TelevisionFanatic\TelevisionFanatic\Cache\PopupProperties100016730.html
c:\program files\TelevisionFanatic\TelevisionFanatic\Cache\PopupProperties100065028.html
c:\program files\TelevisionFanatic\TelevisionFanatic\Cache\PopupProperties200821787.html
c:\program files\TelevisionFanatic\TelevisionFanatic\Cache\Radio.html
c:\program files\TelevisionFanatic\TelevisionFanatic\Cache\VideosAffinityBtn.html
c:\windows\EventSystem.log
c:\windows\Installer\{1ad4135c-b36a-5032-e9d8-d2df74d2e69a}
c:\windows\Installer\{1ad4135c-b36a-5032-e9d8-d2df74d2e69a}\@
c:\windows\Installer\{1ad4135c-b36a-5032-e9d8-d2df74d2e69a}\L\00000004.@
c:\windows\Installer\{1ad4135c-b36a-5032-e9d8-d2df74d2e69a}\L\201d3dde
c:\windows\Installer\{1ad4135c-b36a-5032-e9d8-d2df74d2e69a}\n
c:\windows\Installer\{1ad4135c-b36a-5032-e9d8-d2df74d2e69a}\U\00000004.@
c:\windows\Installer\{1ad4135c-b36a-5032-e9d8-d2df74d2e69a}\U\00000008.@
c:\windows\Installer\{1ad4135c-b36a-5032-e9d8-d2df74d2e69a}\U\000000cb.@
c:\windows\Installer\{1ad4135c-b36a-5032-e9d8-d2df74d2e69a}\U\80000000.@
c:\windows\Installer\{1ad4135c-b36a-5032-e9d8-d2df74d2e69a}\U\80000032.@
.
.
((((((((((((((((((((((((((((((((((((((( Drivers/Services )))))))))))))))))))))))))))))))))))))))))))))))))
.
.
-------\Legacy_MYWEBSEARCHSERVICE
-------\Legacy_TELEVISIONFANATICSERVICE
.
.
((((((((((((((((((((((((( Files Created from 2012-04-22 to 2012-05-22 )))))))))))))))))))))))))))))))
.
.
2012-05-22 13:40 . 2012-05-22 13:40 40776 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2012-05-19 09:53 . 2012-05-19 09:53 -------- d-sh--w- c:\documents and settings\NetworkService\PrivacIE
2012-05-19 09:52 . 2012-05-19 09:52 -------- d-sh--w- c:\documents and settings\NetworkService\IECompatCache
2012-05-18 18:28 . 2012-05-18 18:28 73728 ----a-r- c:\documents and settings\Dan\Application Data\Microsoft\Installer\{B829E117-D072-41EA-9606-9826A38D34C1}\SVRTgui.exe1_810EDD9E2F0A4E2BACF86673C38D9F48.exe
2012-05-18 18:28 . 2012-05-18 18:28 73728 ----a-r- c:\documents and settings\Dan\Application Data\Microsoft\Installer\{B829E117-D072-41EA-9606-9826A38D34C1}\SVRTgui.exe_810EDD9E2F0A4E2BACF86673C38D9F48.exe
2012-05-18 18:28 . 2012-05-18 18:28 73728 ----a-r- c:\documents and settings\Dan\Application Data\Microsoft\Installer\{B829E117-D072-41EA-9606-9826A38D34C1}\ARPPRODUCTICON.exe
2012-05-18 18:28 . 2012-05-18 18:28 -------- d-----w- c:\program files\Sophos
2012-05-18 11:46 . 2012-05-22 17:23 -------- d-----w- c:\program files\Common Files\McciSysNetWirelessEncryptionConstant
2012-05-18 10:14 . 2012-05-18 10:14 -------- d-----w- c:\documents and settings\Dan\Application Data\Search Settings
2012-05-18 10:13 . 2012-05-18 10:14 -------- d-----w- c:\program files\pdfforge Toolbar
2012-05-18 10:13 . 2012-05-18 10:14 -------- d-----w- c:\program files\Application Updater
2012-05-18 10:13 . 2012-05-18 10:13 -------- d-----w- c:\program files\Common Files\Spigot
2012-05-09 12:00 . 2008-04-14 04:15 60032 -c--a-w- c:\windows\system32\dllcache\usbaudio.sys
2012-05-09 12:00 . 2008-04-14 04:15 60032 ----a-w- c:\windows\system32\drivers\USBAUDIO.sys
2012-04-30 13:35 . 2012-05-22 16:56 -------- d-----w- c:\documents and settings\All Users\Application Data\boost_interprocess
2012-04-30 13:34 . 2012-05-22 17:03 -------- d-----w- c:\documents and settings\Dan\Application Data\Skype
2012-04-30 13:34 . 2012-04-30 13:34 -------- d-----w- c:\program files\Common Files\Skype
2012-04-30 13:34 . 2012-04-30 13:35 -------- d-----r- c:\program files\Skype
2012-04-30 13:34 . 2012-04-30 13:35 -------- d-----w- c:\documents and settings\All Users\Application Data\Skype
2012-04-25 17:37 . 2012-04-25 17:37 -------- d-----w- c:\documents and settings\Dan\Local Settings\Application Data\Esha_Research,_Inc
2012-04-25 17:34 . 2012-04-25 17:34 -------- d-----w- c:\documents and settings\Dan\Local Settings\Application Data\Citrix
2012-04-25 16:11 . 2012-04-25 16:12 -------- d-----w- C:\SQL2KSP4
2012-04-25 13:55 . 2012-04-25 13:55 -------- d-----w- c:\windows\Downloaded Installations
2012-04-25 13:53 . 2012-05-16 19:17 -------- d-----w- c:\documents and settings\Dan\Application Data\Esha Research
2012-04-25 13:46 . 2012-05-16 19:47 -------- d-----w- c:\program files\ESHA Research
2012-04-25 13:46 . 2012-04-25 13:46 -------- d-----w- c:\program files\Crystal Decisions
2012-04-25 13:46 . 2012-04-25 13:46 -------- d-----w- c:\program files\Common Files\Crystal Decisions
2012-04-25 13:44 . 2009-04-07 17:50 23720 ----a-w- c:\windows\system32\novamnk6.dll
2012-04-25 13:44 . 2009-04-07 17:50 18600 ----a-w- c:\windows\system32\novamik6.dll
2012-04-25 13:44 . 2012-04-25 13:44 -------- d-----w- c:\program files\Softland
2012-04-25 13:35 . 2012-04-25 13:41 -------- d-----w- c:\program files\Microsoft SQL Server
.
.
.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2012-05-05 15:06 . 2012-04-10 13:16 419488 ----a-w- c:\windows\system32\FlashPlayerApp.exe
2012-05-05 15:06 . 2011-07-05 11:46 70304 ----a-w- c:\windows\system32\FlashPlayerCPLApp.cpl
2012-04-11 13:12 . 2008-04-14 12:00 1862272 ----a-w- c:\windows\system32\win32k.sys
2012-04-11 13:10 . 2008-04-14 12:00 2192640 ----a-w- c:\windows\system32\ntoskrnl.exe
2012-04-11 12:35 . 2008-04-14 00:01 2069120 ----a-w- c:\windows\system32\ntkrnlpa.exe
2012-04-04 19:56 . 2011-01-03 23:54 22344 ----a-w- c:\windows\system32\drivers\mbam.sys
2012-03-22 19:12 . 2012-03-22 19:12 4435968 ----a-w- c:\windows\system32\GPhotos.scr
2012-03-01 11:01 . 2008-04-14 12:00 916992 ----a-w- c:\windows\system32\wininet.dll
2012-03-01 11:01 . 2008-04-14 12:00 43520 ------w- c:\windows\system32\licmgr10.dll
2012-03-01 11:01 . 2008-04-14 12:00 1469440 ------w- c:\windows\system32\inetcpl.cpl
2012-02-29 14:10 . 2008-04-14 12:00 177664 ----a-w- c:\windows\system32\wintrust.dll
2012-02-29 14:10 . 2008-04-14 12:00 148480 ----a-w- c:\windows\system32\imagehlp.dll
2012-02-29 12:17 . 2008-04-14 12:00 385024 ------w- c:\windows\system32\html.iec
.
.
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4
.
[HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{96673559-e653-4cdc-8923-f89347a952c0}]
2010-08-16 17:38 262312 ----a-w- c:\program files\verizontb\auxi\verizonAu.dll
.
[HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{f8d96645-337c-419b-8792-b6c126145811}]
2010-08-16 17:38 86696 ----a-w- c:\program files\verizontb\verizonDx.dll
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Toolbar]
"{f8d96645-337c-419b-8792-b6c126145811}"= "c:\program files\verizontb\verizonDx.dll" [2010-08-16 86696]
.
[HKEY_CLASSES_ROOT\clsid\{f8d96645-337c-419b-8792-b6c126145811}]
.
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"swg"="c:\program files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe" [2011-01-20 39408]
"Skype"="c:\program files\Skype\Phone\Skype.exe" [2012-04-05 17356424]
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"SoundMAXPnP"="c:\program files\Analog Devices\Core\smax4pnp.exe" [2004-10-14 1404928]
"ATIPTA"="c:\program files\ATI Technologies\ATI Control Panel\atiptaxx.exe" [2004-08-25 339968]
"ccApp"="c:\program files\Common Files\Symantec Shared\ccApp.exe" [2009-08-03 53096]
"vptray"="c:\progra~1\SYMANT~1\VPTray.exe" [2009-09-01 125368]
"VERIZONDM"="c:\program files\VERIZONDM\bin\sprtcmd.exe" [2010-09-29 206120]
"VerizonServicepoint.exe"="c:\program files\Verizon\VSP\VerizonServicepoint.exe" [2010-03-16 4281584]
"Verizon_McciTrayApp"="c:\program files\Verizon\McciTrayApp.exe" [2010-03-17 1565696]
"HP Software Update"="c:\program files\HP\HP Software Update\HPWuSchd2.exe" [2004-09-13 49152]
"Adobe ARM"="c:\program files\Common Files\Adobe\ARM\1.0\AdobeARM.exe" [2012-01-03 843712]
"Malwarebytes' Anti-Malware"="c:\program files\Malwarebytes' Anti-Malware\mbamgui.exe" [2012-04-04 462408]
"SunJavaUpdateSched"="c:\program files\Common Files\Java\Java Update\jusched.exe" [2011-06-09 254696]
"APSDaemon"="c:\program files\Common Files\Apple\Apple Application Support\APSDaemon.exe" [2011-11-02 59240]
"QuickTime Task"="c:\program files\QuickTime\qttask.exe" [2011-10-24 421888]
"iTunesHelper"="c:\program files\iTunes\iTunesHelper.exe" [2012-01-16 421736]
"itype"="c:\program files\Microsoft IntelliType Pro\itype.exe" [2008-06-10 1442888]
"IntelliPoint"="c:\program files\Microsoft IntelliPoint\ipoint.exe" [2008-06-10 1406024]
"SearchSettings"="c:\program files\Common Files\Spigot\Search Settings\SearchSettings.exe" [2012-05-16 992648]
.
c:\documents and settings\All Users\Start Menu\Programs\Startup\
Driver performer.lnk - c:\documents and settings\Dan\Local Settings\Temp\7ZipSfx.000\dp.exe [N/A]
HP Digital Imaging Monitor.lnk - c:\program files\HP\Digital Imaging\bin\hpqtra08.exe [2004-11-4 258048]
HP Image Zone Fast Start.lnk - c:\program files\HP\Digital Imaging\bin\hpqthb08.exe [2004-11-4 53248]
.
[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecAntiVirus]
"DisableMonitoring"=dword:00000001
.
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=
"c:\\Program Files\\Skype\\Phone\\Skype.exe"=
.
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\GloballyOpenPorts\List]
"50000:UDP"= 50000:UDP:IHA_MessageCenter
.
R2 Application Updater;Application Updater;c:\program files\Application Updater\ApplicationUpdater.exe [5/16/2012 6:16 PM 785344]
R2 IHA_MessageCenter;IHA_MessageCenter;c:\program files\Verizon\IHA_MessageCenter\Bin\Verizon_IHAMessageCenter.exe [10/13/2010 6:06 PM 290832]
R2 MBAMService;MBAMService;c:\program files\Malwarebytes' Anti-Malware\mbamservice.exe [1/3/2011 7:54 PM 654408]
R2 MSSQL$ESHA;SQL Server (ESHA);c:\program files\Microsoft SQL Server\MSSQL.1\MSSQL\Binn\sqlservr.exe [12/10/2010 10:29 PM 29293408]
R2 ServicepointService;ServicepointService;c:\program files\Verizon\VSP\ServicepointService.exe [1/20/2011 3:20 PM 689392]
R2 Skype C2C Service;Skype C2C Service;c:\documents and settings\All Users\Application Data\Skype\Toolbars\Skype C2C Service\c2c_service.exe [4/9/2012 11:20 AM 3063968]
R2 sprtsvc_verizondm;SupportSoft Sprocket Service (verizondm);c:\program files\VERIZONDM\bin\sprtsvc.exe [9/29/2010 7:00 AM 206120]
R2 tgsrvc_verizondm;SupportSoft Repair Service (verizondm);c:\program files\VERIZONDM\bin\tgsrvc.exe [9/29/2010 7:00 AM 185640]
R3 EraserUtilRebootDrv;EraserUtilRebootDrv;c:\program files\Common Files\Symantec Shared\EENGINE\EraserUtilRebootDrv.sys [2/9/2012 4:43 PM 106104]
R3 MBAMProtector;MBAMProtector;c:\windows\system32\drivers\mbam.sys [1/3/2011 7:54 PM 22344]
S0 cerc6;cerc6; [x]
S2 clr_optimization_v4.0.30319_32;Microsoft .NET Framework NGEN v4.0.30319_X86;c:\windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe [3/18/2010 2:16 PM 130384]
S2 gupdate;Google Update Service (gupdate);c:\program files\Google\Update\GoogleUpdate.exe [1/20/2011 6:50 PM 136176]
S2 SkypeUpdate;Skype Updater;c:\program files\Skype\Updater\Updater.exe [4/5/2012 11:37 AM 158856]
S3 AdobeFlashPlayerUpdateSvc;Adobe Flash Player Update Service;c:\windows\system32\Macromed\Flash\FlashPlayerUpdateService.exe [4/10/2012 9:16 AM 257696]
S3 gupdatem;Google Update Service (gupdatem);c:\program files\Google\Update\GoogleUpdate.exe [1/20/2011 6:50 PM 136176]
S3 MBAMSwissArmy;MBAMSwissArmy;c:\windows\system32\drivers\mbamswissarmy.sys [5/22/2012 9:40 AM 40776]
S3 SavRoam;SAVRoam;c:\program files\Symantec AntiVirus\SavRoam.exe [9/1/2009 2:15 PM 116664]
S3 WPFFontCache_v0400;Windows Presentation Foundation Font Cache 4.0.0.0;c:\windows\Microsoft.NET\Framework\v4.0.30319\WPF\WPFFontCache_v0400.exe [3/18/2010 2:16 PM 753504]
.
Contents of the 'Scheduled Tasks' folder
.
2012-05-22 c:\windows\Tasks\Adobe Flash Player Updater.job
- c:\windows\system32\Macromed\Flash\FlashPlayerUpdateService.exe [2012-04-10 15:06]
.
2012-05-19 c:\windows\Tasks\AppleSoftwareUpdate.job
- c:\program files\Apple Software Update\SoftwareUpdate.exe [2011-06-01 21:57]
.
2012-05-22 c:\windows\Tasks\FinalTorrent Update Checker.job
- c:\program files\FinalTorrent\FTCheckForUpdates.exe [2012-02-29 19:24]
.
2012-05-22 c:\windows\Tasks\GoogleUpdateTaskMachineCore.job
- c:\program files\Google\Update\GoogleUpdate.exe [2011-01-20 22:50]
.
2012-05-22 c:\windows\Tasks\GoogleUpdateTaskMachineUA.job
- c:\program files\Google\Update\GoogleUpdate.exe [2011-01-20 22:50]
.
2012-05-22 c:\windows\Tasks\User_Feed_Synchronization-{4D9195C0-9A75-481D-8B12-3FC963817E65}.job
- c:\windows\system32\msfeedssync.exe [2009-03-08 09:31]
.
.
------- Supplementary Scan -------
.
uStart Page = hxxp://www.google.com/
uDefault_Search_URL = hxxp://www.google.com/ie
uInternet Settings,ProxyOverride = *.local
uSearchAssistant = hxxp://www.google.com/ie
uSearchURL,(Default) = hxxp://www.google.com/search?q=%s
IE: Add to Google Photos Screensa&ver - c:\windows\system32\GPhotos.scr/200
IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~2\Office12\EXCEL.EXE/3000
TCP: DhcpNameServer = 192.168.1.1 192.168.1.1
.
- - - - ORPHANS REMOVED - - - -
.
URLSearchHooks-{81017EA9-9AA8-4A6A-9734-7AF40E7D593F} - (no file)
WebBrowser-{D4027C7F-154A-4066-A1AD-4243D8127440} - (no file)
HKLM-Run-McciSysNetWirelessEncryptionConstant - c:\program files\Common Files\McciSysNetWirelessEncryptionConstant\McciSysNetWirelessEncryptionConstant.exe
AddRemove-Search Toolbar - c:\program files\Search Toolbar\SearchToolbarUninstall.exe
.
.
.
**************************************************************************
.
catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2012-05-22 13:26
Windows 5.1.2600 Service Pack 3 NTFS
.
scanning hidden processes ...
.
scanning hidden autostart entries ...
.
scanning hidden files ...
.
scan completed successfully
hidden files: 0
.
**************************************************************************
.
--------------------- DLLs Loaded Under Running Processes ---------------------
.
- - - - - - - > 'winlogon.exe'(704)
c:\windows\system32\Ati2evxx.dll
.
- - - - - - - > 'explorer.exe'(5216)
c:\windows\system32\WININET.dll
c:\program files\Common Files\Spigot\Search Settings\wth.dll
c:\windows\system32\msi.dll
c:\windows\system32\ieframe.dll
c:\windows\system32\webcheck.dll
c:\windows\system32\WPDShServiceObj.dll
c:\windows\system32\PortableDeviceTypes.dll
c:\windows\system32\PortableDeviceApi.dll
.
------------------------ Other Running Processes ------------------------
.
c:\windows\system32\Ati2evxx.exe
c:\program files\Common Files\Symantec Shared\ccSetMgr.exe
c:\program files\Common Files\Symantec Shared\ccEvtMgr.exe
c:\program files\Common Files\Symantec Shared\SPBBC\SPBBCSvc.exe
c:\windows\system32\Ati2evxx.exe
c:\program files\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe
c:\program files\Bonjour\mDNSResponder.exe
c:\program files\Symantec AntiVirus\DefWatch.exe
c:\program files\Java\jre6\bin\jqs.exe
c:\program files\Common Files\Motive\McciCMService.exe
c:\program files\Microsoft SQL Server\90\Shared\sqlbrowser.exe
c:\program files\Microsoft SQL Server\90\Shared\sqlwriter.exe
c:\program files\Symantec AntiVirus\Rtvscan.exe
c:\program files\Symantec AntiVirus\DoScan.exe
c:\program files\Canon\CAL\CALMAIN.exe
c:\windows\system32\wscntfy.exe
c:\program files\iPod\bin\iPodService.exe
c:\program files\HP\Digital Imaging\bin\hpqgalry.exe
c:\program files\Verizon\VSP\VerizonServicepointComHandler.exe
c:\windows\system32\msiexec.exe
.
**************************************************************************
.
Completion time: 2012-05-22 13:31:50 - machine was rebooted
ComboFix-quarantined-files.txt 2012-05-22 17:31
.
Pre-Run: 215,009,935,360 bytes free
Post-Run: 217,504,047,104 bytes free
.
WindowsXP-KB310994-SP2-Pro-BootDisk-ENU.exe
[boot loader]
timeout=2
default=multi(0)disk(0)rdisk(0)partition(1)\WINDOWS
[operating systems]
c:\cmdcons\BOOTSECT.DAT="Microsoft Windows Recovery Console" /cmdcons
UnsupportedDebug="do not select this" /debug
multi(0)disk(0)rdisk(0)partition(1)\WINDOWS="Microsoft Windows XP Professional" /noexecute=optin /fastdetect
.
- - End Of File - - F7BAA44FA937335CD01BB5F724BBD013

#9 Dan.Newton

Dan.Newton
  • Topic Starter

  • Members
  • 23 posts
  • OFFLINE
  •  
  • Local time:03:32 AM

Posted 22 May 2012 - 12:39 PM

And GMER:
GMER 1.0.15.15641 - http://www.gmer.net
Rootkit scan 2012-05-22 06:04:36
Windows 5.1.2600 Service Pack 3 Harddisk0\DR0 -> \Device\Ide\IdeDeviceP0T0L0-3 WDC_WD2500JD-75HBB0 rev.08.02D08
Running: gmer.majorgeek.exe; Driver: C:\DOCUME~1\Dan\LOCALS~1\Temp\kwpyrfob.sys


---- System - GMER 1.0.15 ----

SSDT 89CAB698 ZwAlertResumeThread
SSDT 89D48F50 ZwAlertThread
SSDT 89C111E0 ZwAllocateVirtualMemory
SSDT 89CD9D80 ZwConnectPort
SSDT 89CAE2D0 ZwCreateMutant
SSDT 89D16008 ZwCreateThread
SSDT \??\C:\WINDOWS\system32\Drivers\SYMEVENT.SYS (Symantec Event Library/Symantec Corporation) ZwDeleteValueKey [0xB1890690]
SSDT 89C59200 ZwFreeVirtualMemory
SSDT 89CAFAD8 ZwImpersonateAnonymousToken
SSDT 89CB0718 ZwImpersonateThread
SSDT 89D18C20 ZwMapViewOfSection
SSDT 89CCCA28 ZwOpenEvent
SSDT 89D34B28 ZwOpenProcessToken
SSDT 89C841E8 ZwOpenThreadToken
SSDT 89DD4CC8 ZwQueryValueKey
SSDT 89BD3AF0 ZwResumeThread
SSDT 89E41628 ZwSetContextThread
SSDT 89C86518 ZwSetInformationProcess
SSDT 89E021F8 ZwSetInformationThread
SSDT \??\C:\WINDOWS\system32\Drivers\SYMEVENT.SYS (Symantec Event Library/Symantec Corporation) ZwSetValueKey [0xB18908E0]
SSDT 89D06B08 ZwSuspendProcess
SSDT 89BCCFD0 ZwSuspendThread
SSDT 89D35610 ZwTerminateProcess
SSDT 89C7E170 ZwTerminateThread
SSDT 89C5E210 ZwUnmapViewOfSection
SSDT 89C2D230 ZwWriteVirtualMemory

---- Kernel code sections - GMER 1.0.15 ----

.text ntkrnlpa.exe!ZwCallbackReturn + 2580 80501D90 4 Bytes CALL 86D9E5D6
init C:\WINDOWS\system32\drivers\senfilt.sys entry point in "init" section [0xB9B56F80]
? C:\DOCUME~1\Dan\LOCALS~1\Temp\aswMBR.sys The system cannot find the file specified. !
? C:\DOCUME~1\Dan\LOCALS~1\Temp\mbr.sys The system cannot find the file specified. !

---- User code sections - GMER 1.0.15 ----

.text C:\Program Files\Internet Explorer\iexplore.exe[540] ADVAPI32.dll!RegSetValueExW 77DDD767 6 Bytes JMP 100013AD C:\Program Files\Common Files\Spigot\Search Settings\wth.dll (WTH Dynamic Link Library/Spigot, Inc.)
.text C:\Program Files\Internet Explorer\iexplore.exe[540] ADVAPI32.dll!RegSetValueW 77E36116 6 Bytes JMP 1000138A C:\Program Files\Common Files\Spigot\Search Settings\wth.dll (WTH Dynamic Link Library/Spigot, Inc.)
.text C:\Program Files\Internet Explorer\iexplore.exe[540] USER32.dll!DialogBoxParamW 7E4247AB 5 Bytes JMP 3E215505 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[540] USER32.dll!SetWindowsHookExW 7E42820F 5 Bytes JMP 3E2E9AA5 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[540] USER32.dll!CallNextHookEx 7E42B3C6 5 Bytes JMP 3E2DD119 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[540] USER32.dll!CreateWindowExW 7E42D0A3 5 Bytes JMP 3E2EDB14 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[540] USER32.dll!UnhookWindowsHookEx 7E42D5F3 5 Bytes JMP 3E254686 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[540] USER32.dll!DialogBoxIndirectParamW 7E432072 5 Bytes JMP 3E3E53AF C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[540] USER32.dll!MessageBoxIndirectA 7E43A082 5 Bytes JMP 3E3E52E1 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[540] USER32.dll!DialogBoxParamA 7E43B144 5 Bytes JMP 3E3E534C C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[540] USER32.dll!MessageBoxExW 7E450838 5 Bytes JMP 3E3E51B2 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[540] USER32.dll!MessageBoxExA 7E45085C 5 Bytes JMP 3E3E5214 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[540] USER32.dll!DialogBoxIndirectParamA 7E456D7D 5 Bytes JMP 3E3E5412 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[540] USER32.dll!MessageBoxIndirectW 7E4664D5 5 Bytes JMP 3E3E5276 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[540] ole32.dll!CoCreateInstance 774FF1BC 5 Bytes JMP 3E2EDB70 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[540] ole32.dll!OleLoadFromStream 7752983B 5 Bytes JMP 3E3E5717 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[540] CRYPT32.dll!CryptMsgCountersignEncoded + 27A 77A92F52 7 Bytes JMP 02C5ECC0
.text C:\Program Files\Internet Explorer\iexplore.exe[540] CRYPT32.dll!CertComparePublicKeyInfo + 1E8 77A9B751 7 Bytes JMP 02C5ECA0
.text C:\Program Files\Internet Explorer\iexplore.exe[2196] ADVAPI32.dll!RegSetValueExW 77DDD767 6 Bytes JMP 100013AD C:\Program Files\Common Files\Spigot\Search Settings\wth.dll (WTH Dynamic Link Library/Spigot, Inc.)
.text C:\Program Files\Internet Explorer\iexplore.exe[2196] ADVAPI32.dll!RegSetValueW 77E36116 6 Bytes JMP 1000138A C:\Program Files\Common Files\Spigot\Search Settings\wth.dll (WTH Dynamic Link Library/Spigot, Inc.)
.text C:\Program Files\Internet Explorer\iexplore.exe[2196] USER32.dll!DialogBoxParamW 7E4247AB 5 Bytes JMP 3E215505 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[2196] USER32.dll!SetWindowsHookExW 7E42820F 5 Bytes JMP 3E2E9AA5 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[2196] USER32.dll!CallNextHookEx 7E42B3C6 5 Bytes JMP 3E2DD119 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[2196] USER32.dll!CreateWindowExW 7E42D0A3 5 Bytes JMP 3E2EDB14 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[2196] USER32.dll!UnhookWindowsHookEx 7E42D5F3 5 Bytes JMP 3E254686 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[2196] USER32.dll!DialogBoxIndirectParamW 7E432072 5 Bytes JMP 3E3E53AF C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[2196] USER32.dll!MessageBoxIndirectA 7E43A082 5 Bytes JMP 3E3E52E1 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[2196] USER32.dll!DialogBoxParamA 7E43B144 5 Bytes JMP 3E3E534C C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[2196] USER32.dll!MessageBoxExW 7E450838 5 Bytes JMP 3E3E51B2 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[2196] USER32.dll!MessageBoxExA 7E45085C 5 Bytes JMP 3E3E5214 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[2196] USER32.dll!DialogBoxIndirectParamA 7E456D7D 5 Bytes JMP 3E3E5412 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[2196] USER32.dll!MessageBoxIndirectW 7E4664D5 5 Bytes JMP 3E3E5276 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[2196] ole32.dll!CoCreateInstance 774FF1BC 5 Bytes JMP 3E2EDB70 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[2196] ole32.dll!OleLoadFromStream 7752983B 5 Bytes JMP 3E3E5717 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[2196] CRYPT32.dll!CryptMsgCountersignEncoded + 27A 77A92F52 7 Bytes JMP 0414ECC0
.text C:\Program Files\Internet Explorer\iexplore.exe[2196] CRYPT32.dll!CertComparePublicKeyInfo + 1E8 77A9B751 7 Bytes JMP 0414ECA0
.text C:\Program Files\Internet Explorer\iexplore.exe[4992] ADVAPI32.dll!RegSetValueExW 77DDD767 6 Bytes JMP 100013AD C:\Program Files\Common Files\Spigot\Search Settings\wth.dll (WTH Dynamic Link Library/Spigot, Inc.)
.text C:\Program Files\Internet Explorer\iexplore.exe[4992] ADVAPI32.dll!RegSetValueW 77E36116 6 Bytes JMP 1000138A C:\Program Files\Common Files\Spigot\Search Settings\wth.dll (WTH Dynamic Link Library/Spigot, Inc.)
.text C:\Program Files\Internet Explorer\iexplore.exe[4992] USER32.dll!DialogBoxParamW 7E4247AB 5 Bytes JMP 3E215505 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[4992] USER32.dll!SetWindowsHookExW 7E42820F 5 Bytes JMP 3E2E9AA5 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[4992] USER32.dll!CallNextHookEx 7E42B3C6 5 Bytes JMP 3E2DD119 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[4992] USER32.dll!CreateWindowExW 7E42D0A3 5 Bytes JMP 3E2EDB14 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[4992] USER32.dll!UnhookWindowsHookEx 7E42D5F3 5 Bytes JMP 3E254686 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[4992] USER32.dll!DialogBoxIndirectParamW 7E432072 5 Bytes JMP 3E3E53AF C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[4992] USER32.dll!MessageBoxIndirectA 7E43A082 5 Bytes JMP 3E3E52E1 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[4992] USER32.dll!DialogBoxParamA 7E43B144 5 Bytes JMP 3E3E534C C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[4992] USER32.dll!MessageBoxExW 7E450838 5 Bytes JMP 3E3E51B2 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[4992] USER32.dll!MessageBoxExA 7E45085C 5 Bytes JMP 3E3E5214 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[4992] USER32.dll!DialogBoxIndirectParamA 7E456D7D 5 Bytes JMP 3E3E5412 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[4992] USER32.dll!MessageBoxIndirectW 7E4664D5 5 Bytes JMP 3E3E5276 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[4992] ole32.dll!CoCreateInstance 774FF1BC 5 Bytes JMP 3E2EDB70 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[4992] ole32.dll!OleLoadFromStream 7752983B 5 Bytes JMP 3E3E5717 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[4992] CRYPT32.dll!CryptMsgCountersignEncoded + 27A 77A92F52 7 Bytes JMP 0414ECC0
.text C:\Program Files\Internet Explorer\iexplore.exe[4992] CRYPT32.dll!CertComparePublicKeyInfo + 1E8 77A9B751 7 Bytes JMP 0414ECA0
.text C:\Program Files\Internet Explorer\iexplore.exe[5224] ADVAPI32.dll!RegSetValueExW 77DDD767 6 Bytes JMP 100013AD C:\Program Files\Common Files\Spigot\Search Settings\wth.dll (WTH Dynamic Link Library/Spigot, Inc.)
.text C:\Program Files\Internet Explorer\iexplore.exe[5224] ADVAPI32.dll!RegSetValueW 77E36116 6 Bytes JMP 1000138A C:\Program Files\Common Files\Spigot\Search Settings\wth.dll (WTH Dynamic Link Library/Spigot, Inc.)
.text C:\Program Files\Internet Explorer\iexplore.exe[5224] USER32.dll!DialogBoxParamW 7E4247AB 5 Bytes JMP 3E215505 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[5224] USER32.dll!CreateWindowExW 7E42D0A3 5 Bytes JMP 3E2EDB14 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[5224] USER32.dll!DialogBoxIndirectParamW 7E432072 5 Bytes JMP 3E3E53AF C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[5224] USER32.dll!MessageBoxIndirectA 7E43A082 5 Bytes JMP 3E3E52E1 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[5224] USER32.dll!DialogBoxParamA 7E43B144 5 Bytes JMP 3E3E534C C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[5224] USER32.dll!MessageBoxExW 7E450838 5 Bytes JMP 3E3E51B2 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[5224] USER32.dll!MessageBoxExA 7E45085C 5 Bytes JMP 3E3E5214 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[5224] USER32.dll!DialogBoxIndirectParamA 7E456D7D 5 Bytes JMP 3E3E5412 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[5224] USER32.dll!MessageBoxIndirectW 7E4664D5 5 Bytes JMP 3E3E5276 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)

---- Devices - GMER 1.0.15 ----

AttachedDevice \FileSystem\Ntfs \Ntfs SYMEVENT.SYS (Symantec Event Library/Symantec Corporation)
AttachedDevice \Driver\Tcpip \Device\Ip SYMTDI.SYS (Network Dispatch Driver/Symantec Corporation)
AttachedDevice \Driver\Tcpip \Device\Tcp SYMTDI.SYS (Network Dispatch Driver/Symantec Corporation)
AttachedDevice \Driver\Tcpip \Device\Udp SYMTDI.SYS (Network Dispatch Driver/Symantec Corporation)
AttachedDevice \Driver\Tcpip \Device\RawIp SYMTDI.SYS (Network Dispatch Driver/Symantec Corporation)
AttachedDevice \FileSystem\Fastfat \Fat fltMgr.sys (Microsoft Filesystem Filter Manager/Microsoft Corporation)
AttachedDevice \FileSystem\Fastfat \Fat SYMEVENT.SYS (Symantec Event Library/Symantec Corporation)
---- Processes - GMER 1.0.15 ----

Library c:\windows\system32\n (*** hidden *** ) @ C:\WINDOWS\System32\svchost.exe [1160] 0x02B60000
Library c:\windows\system32\n (*** hidden *** ) @ C:\WINDOWS\Explorer.EXE [1368] 0x01700000
Library c:\windows\system32\n (*** hidden *** ) @ C:\Program Files\Internet Explorer\iexplore.exe [4992] 0x03740000

---- Files - GMER 1.0.15 ----

File C:\Documents and Settings\Dan\Cookies\4THMWR64.txt 845 bytes
File C:\Documents and Settings\Dan\Cookies\IA7867C4.txt 77 bytes
File C:\Documents and Settings\Dan\Cookies\P46N62DE.txt 407 bytes
File C:\Documents and Settings\Dan\Cookies\S4KPWLEC.txt 288 bytes
File C:\Documents and Settings\Dan\Cookies\F7Y0RP4D.txt 3334 bytes
File C:\Documents and Settings\Dan\Cookies\RVD799IR.txt 1889 bytes
File C:\Documents and Settings\Dan\Cookies\DY7H6D50.txt 3004 bytes
File C:\Documents and Settings\Dan\Cookies\B9DDNVYU.txt 1996 bytes
File C:\Documents and Settings\Dan\Cookies\UBDF2D1J.txt 312 bytes

---- EOF - GMER 1.0.15 ----

#10 Dan.Newton

Dan.Newton
  • Topic Starter

  • Members
  • 23 posts
  • OFFLINE
  •  
  • Local time:03:32 AM

Posted 22 May 2012 - 12:45 PM

It has been suggested that I dump Symantec and install Avast. Does this seem appropriate? now would be the logical time to do this, before I redo all the tamper and autorun stuff.
But, you Bleepin Gringo, the computer does seem to working normally, thank you very much.
Also many thanks to the several kind folks over at the chat who helped me turn Symantec off: lurch, jedi316. A lovely gesture by you all.
Too early to tell, but you may have collectively given the bad guys a poke in the eye.
As my son says,"ten thumbs up!"

#11 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:04:32 AM

Posted 22 May 2012 - 01:58 PM

Greetings

It has been suggested that I dump Symantec and install Avast. Does this seem appropriate? now would be the logical time to do this, before I redo all the tamper and autorun stuff.

Depends if you like Symantec or not, At this time I like MSE but we will have time for that later as we do have some more work to do first

I want you to run these next,

tdsskiller:

Please read carefully and follow these steps.
  • Download TDSSKiller and save it to your Desktop.
  • doubleclick on TDSSKiller.exe to run the application, then on Start Scan.
  • If an infected file is detected, the default action will be Cure, click on Continue.
  • If a suspicious file is detected, the default action will be Skip, click on Continue.
  • It may ask you to reboot the computer to complete the process. Click on Reboot Now.
  • If no reboot is require, click on Report. A log file should appear. Please copy and paste the contents of that file here.
  • If a reboot is required, the report can also be found in your root directory, (usually C:\ folder) in the form of "TDSSKiller.[Version]_[Date]_[Time]_log.txt". Please copy and paste the contents of that file here.

Please download aswMBR to your desktop.
  • Double click the aswMBR.exe icon to run it
  • it will ask to download extra definitions - ALLOW IT
  • Click the Scan button to start the scan
  • On completion of the scan, click the save log button, save it to your desktop and post it in your next reply.

If you have any problems running either one come back and let me know

please reply with the reports from TDSSKiller and aswMBR

Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#12 Dan.Newton

Dan.Newton
  • Topic Starter

  • Members
  • 23 posts
  • OFFLINE
  •  
  • Local time:03:32 AM

Posted 22 May 2012 - 02:23 PM

OK, I ran the TDSSKiller. It didn't find anything. But the report could not be copied by r-click. It did no ask for a re-boot, and sis not find anything it thought suspicious or threatening.

#13 Dan.Newton

Dan.Newton
  • Topic Starter

  • Members
  • 23 posts
  • OFFLINE
  •  
  • Local time:03:32 AM

Posted 22 May 2012 - 03:06 PM

and here's the aswMBR.txt log:
aswMBR version 0.9.9.1665 Copyright© 2011 AVAST Software
Run date: 2012-05-22 15:26:34
-----------------------------
15:26:34.984 OS Version: Windows 5.1.2600 Service Pack 3
15:26:34.984 Number of processors: 1 586 0x605
15:26:34.984 ComputerName: MYHOME-17C8B773 UserName: Dan
15:26:35.812 Initialize success
15:34:13.984 AVAST engine defs: 12052200
15:34:30.593 Disk 0 (boot) \Device\Harddisk0\DR0 -> \Device\Ide\IdeDeviceP0T0L0-3
15:34:30.593 Disk 0 Vendor: WDC_WD2500JD-75HBB0 08.02D08 Size: 238418MB BusType: 3
15:34:30.625 Disk 0 MBR read successfully
15:34:30.625 Disk 0 MBR scan
15:34:30.671 Disk 0 Windows XP default MBR code
15:34:30.687 Disk 0 Partition 1 80 (A) 07 HPFS/NTFS NTFS 238417 MB offset 2048
15:34:30.687 Disk 0 scanning sectors +488280064
15:34:30.765 Disk 0 scanning C:\WINDOWS\system32\drivers
15:34:42.734 Service scanning
15:35:14.234 Modules scanning
15:35:20.062 Disk 0 trace - called modules:
15:35:20.093 ntkrnlpa.exe CLASSPNP.SYS disk.sys atapi.sys hal.dll pciide.sys PCIIDEX.SYS
15:35:20.093 1 nt!IofCallDriver -> \Device\Harddisk0\DR0[0x89dfcab8]
15:35:20.593 3 CLASSPNP.SYS[ba0e8fd7] -> nt!IofCallDriver -> \Device\Ide\IdeDeviceP0T0L0-3[0x89dc2d98]
15:35:21.156 AVAST engine scan C:\WINDOWS
15:35:47.156 AVAST engine scan C:\WINDOWS\system32
15:41:53.781 AVAST engine scan C:\WINDOWS\system32\drivers
15:42:14.078 AVAST engine scan C:\Documents and Settings\Dan
15:44:48.421 File: C:\Documents and Settings\Dan\Application Data\Sun\Java\Deployment\cache\6.0\57\225fb39-29596569 **INFECTED** Win32:Karagany-HB [Trj]
15:51:22.156 AVAST engine scan C:\Documents and Settings\All Users
15:53:00.218 Scan finished successfully
15:59:11.156 Disk 0 MBR has been saved successfully to "C:\Documents and Settings\Dan\Desktop\MBR.dat"
15:59:11.187 The log file has been saved successfully to "C:\Documents and Settings\Dan\Desktop\aswMBR.txt"
15:59:46.875 Disk 0 MBR has been saved successfully to "C:\Documents and Settings\Dan\Desktop\MBR.dat"
15:59:46.875 The log file has been saved successfully to "C:\Documents and Settings\Dan\Desktop\aswMBR.txt"
16:03:47.859 Disk 0 MBR has been saved successfully to "C:\Documents and Settings\Dan\Desktop\MBR.dat"
16:03:47.859 The log file has been saved successfully to "C:\Documents and Settings\Dan\Desktop\aswMBR.txt"

#14 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:04:32 AM

Posted 22 May 2012 - 04:57 PM

Greetings Dan.Newton

At this time I would like you to run this script for me and it is a good time to check out the computer to see if there is anything else that needs to be addressed.

:Run CFScript:

Open Notepad and copy/paste the text in the box into the window:

ClearJavaCache::

Folder::
c:\documents and settings\Dan\Application Data\Search Settings
c:\program files\Common Files\Spigot

Save it to your desktop as CFScript.txt

Refering to the picture above, drag CFScript.txt into ComboFix.exe
Posted Image
This will let ComboFix run again.
Restart if you have to.
Save the produced logfile to your desktop.

Note: Do not mouseclick combofix's window whilst it's running. That may cause it to stall

Note 2: If you recieve an error "Illegal operation attempted on a registery key that has been marked for deletion." Please restart the computer

"information and logs"

  • In your next post I need the following

  • report from Combofix
  • let me know of any problems you may have had
  • How is the computer doing now after running the script?

Gringo

I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#15 Dan.Newton

Dan.Newton
  • Topic Starter

  • Members
  • 23 posts
  • OFFLINE
  •  
  • Local time:03:32 AM

Posted 22 May 2012 - 06:11 PM

Combofix with the script:
ComboFix 12-05-22.02 - Dan 05/22/2012 18:44:23.2.1 - x86
Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.2046.836 [GMT -4:00]
Running from: c:\documents and settings\Dan\Desktop\ComboFix.exe
Command switches used :: c:\documents and settings\Dan\Desktop\cfscript.txt
AV: Symantec AntiVirus Corporate Edition *Disabled/Updated* {FB06448E-52B8-493A-90F3-E43226D3305C}
.
.
((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.
.
c:\documents and settings\Dan\Application Data\Search Settings
c:\program files\Common Files\Spigot
c:\program files\Common Files\Spigot\Search Settings\baidu_ff.xml
c:\program files\Common Files\Spigot\Search Settings\baidu_ie.xml
c:\program files\Common Files\Spigot\Search Settings\config.ini
c:\program files\Common Files\Spigot\Search Settings\Lang\res1031.ini
c:\program files\Common Files\Spigot\Search Settings\Lang\res1033.ini
c:\program files\Common Files\Spigot\Search Settings\Lang\res1034.ini
c:\program files\Common Files\Spigot\Search Settings\Lang\res1036.ini
c:\program files\Common Files\Spigot\Search Settings\Lang\res1040.ini
c:\program files\Common Files\Spigot\Search Settings\SearchSettings.exe
c:\program files\Common Files\Spigot\Search Settings\wth.dll
c:\program files\Common Files\Spigot\Search Settings\yahoo_ff.xml
c:\program files\Common Files\Spigot\Search Settings\yahoo_ie.xml
c:\program files\Common Files\Spigot\Search Settings\yandex_ff.xml
c:\program files\Common Files\Spigot\Search Settings\yandex_ie.xml
.
Infected copy of c:\windows\system32\kernel32.dll was found and disinfected
Restored copy from - c:\windows\$hf_mig$\KB959426\SP3QFE\kernel32.dll
.
.
((((((((((((((((((((((((( Files Created from 2012-04-22 to 2012-05-22 )))))))))))))))))))))))))))))))
.
.
2012-05-19 09:53 . 2012-05-19 09:53 -------- d-sh--w- c:\documents and settings\NetworkService\PrivacIE
2012-05-19 09:52 . 2012-05-19 09:52 -------- d-sh--w- c:\documents and settings\NetworkService\IECompatCache
2012-05-18 18:28 . 2012-05-18 18:28 73728 ----a-r- c:\documents and settings\Dan\Application Data\Microsoft\Installer\{B829E117-D072-41EA-9606-9826A38D34C1}\SVRTgui.exe1_810EDD9E2F0A4E2BACF86673C38D9F48.exe
2012-05-18 18:28 . 2012-05-18 18:28 73728 ----a-r- c:\documents and settings\Dan\Application Data\Microsoft\Installer\{B829E117-D072-41EA-9606-9826A38D34C1}\SVRTgui.exe_810EDD9E2F0A4E2BACF86673C38D9F48.exe
2012-05-18 18:28 . 2012-05-18 18:28 73728 ----a-r- c:\documents and settings\Dan\Application Data\Microsoft\Installer\{B829E117-D072-41EA-9606-9826A38D34C1}\ARPPRODUCTICON.exe
2012-05-18 18:28 . 2012-05-18 18:28 -------- d-----w- c:\program files\Sophos
2012-05-18 11:46 . 2012-05-22 17:23 -------- d-----w- c:\program files\Common Files\McciSysNetWirelessEncryptionConstant
2012-05-18 10:13 . 2012-05-18 10:14 -------- d-----w- c:\program files\pdfforge Toolbar
2012-05-18 10:13 . 2012-05-18 10:14 -------- d-----w- c:\program files\Application Updater
2012-05-09 12:00 . 2008-04-14 04:15 60032 -c--a-w- c:\windows\system32\dllcache\usbaudio.sys
2012-05-09 12:00 . 2008-04-14 04:15 60032 ----a-w- c:\windows\system32\drivers\USBAUDIO.sys
2012-04-30 13:35 . 2012-05-22 22:57 -------- d-----w- c:\documents and settings\All Users\Application Data\boost_interprocess
2012-04-30 13:34 . 2012-05-22 22:44 -------- d-----w- c:\documents and settings\Dan\Application Data\Skype
2012-04-30 13:34 . 2012-04-30 13:34 -------- d-----w- c:\program files\Common Files\Skype
2012-04-30 13:34 . 2012-04-30 13:35 -------- d-----r- c:\program files\Skype
2012-04-30 13:34 . 2012-04-30 13:35 -------- d-----w- c:\documents and settings\All Users\Application Data\Skype
2012-04-25 17:37 . 2012-04-25 17:37 -------- d-----w- c:\documents and settings\Dan\Local Settings\Application Data\Esha_Research,_Inc
2012-04-25 17:34 . 2012-04-25 17:34 -------- d-----w- c:\documents and settings\Dan\Local Settings\Application Data\Citrix
2012-04-25 16:11 . 2012-04-25 16:12 -------- d-----w- C:\SQL2KSP4
2012-04-25 13:55 . 2012-04-25 13:55 -------- d-----w- c:\windows\Downloaded Installations
2012-04-25 13:53 . 2012-05-16 19:17 -------- d-----w- c:\documents and settings\Dan\Application Data\Esha Research
2012-04-25 13:46 . 2012-05-16 19:47 -------- d-----w- c:\program files\ESHA Research
2012-04-25 13:46 . 2012-04-25 13:46 -------- d-----w- c:\program files\Crystal Decisions
2012-04-25 13:46 . 2012-04-25 13:46 -------- d-----w- c:\program files\Common Files\Crystal Decisions
2012-04-25 13:44 . 2009-04-07 17:50 23720 ----a-w- c:\windows\system32\novamnk6.dll
2012-04-25 13:44 . 2009-04-07 17:50 18600 ----a-w- c:\windows\system32\novamik6.dll
2012-04-25 13:44 . 2012-04-25 13:44 -------- d-----w- c:\program files\Softland
2012-04-25 13:35 . 2012-04-25 13:41 -------- d-----w- c:\program files\Microsoft SQL Server
.
.
.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2012-05-05 15:06 . 2012-04-10 13:16 419488 ----a-w- c:\windows\system32\FlashPlayerApp.exe
2012-05-05 15:06 . 2011-07-05 11:46 70304 ----a-w- c:\windows\system32\FlashPlayerCPLApp.cpl
2012-04-11 13:12 . 2008-04-14 12:00 1862272 ----a-w- c:\windows\system32\win32k.sys
2012-04-11 13:10 . 2008-04-14 12:00 2192640 ----a-w- c:\windows\system32\ntoskrnl.exe
2012-04-11 12:35 . 2008-04-14 00:01 2069120 ----a-w- c:\windows\system32\ntkrnlpa.exe
2012-04-04 19:56 . 2011-01-03 23:54 22344 ----a-w- c:\windows\system32\drivers\mbam.sys
2012-03-22 19:12 . 2012-03-22 19:12 4435968 ----a-w- c:\windows\system32\GPhotos.scr
2012-03-01 11:01 . 2008-04-14 12:00 916992 ----a-w- c:\windows\system32\wininet.dll
2012-03-01 11:01 . 2008-04-14 12:00 43520 ------w- c:\windows\system32\licmgr10.dll
2012-03-01 11:01 . 2008-04-14 12:00 1469440 ------w- c:\windows\system32\inetcpl.cpl
2012-02-29 14:10 . 2008-04-14 12:00 177664 ----a-w- c:\windows\system32\wintrust.dll
2012-02-29 14:10 . 2008-04-14 12:00 148480 ----a-w- c:\windows\system32\imagehlp.dll
2012-02-29 12:17 . 2008-04-14 12:00 385024 ------w- c:\windows\system32\html.iec
.
.
((((((((((((((((((((((((((((( SnapShot@2012-05-22_17.21.44 )))))))))))))))))))))))))))))))))))))))))
.
+ 2012-05-22 22:56 . 2012-05-22 22:56 16384 c:\windows\Temp\Perflib_Perfdata_284.dat
+ 2012-05-22 22:55 . 2012-05-22 22:55 16384 c:\windows\Temp\Perflib_Perfdata_250.dat
+ 2008-04-14 12:00 . 2009-03-22 00:29 991744 c:\windows\system32\kernel32.dll
.
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4
.
[HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{96673559-e653-4cdc-8923-f89347a952c0}]
2010-08-16 17:38 262312 ----a-w- c:\program files\verizontb\auxi\verizonAu.dll
.
[HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{f8d96645-337c-419b-8792-b6c126145811}]
2010-08-16 17:38 86696 ----a-w- c:\program files\verizontb\verizonDx.dll
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Toolbar]
"{f8d96645-337c-419b-8792-b6c126145811}"= "c:\program files\verizontb\verizonDx.dll" [2010-08-16 86696]
.
[HKEY_CLASSES_ROOT\clsid\{f8d96645-337c-419b-8792-b6c126145811}]
.
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"swg"="c:\program files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe" [2011-01-20 39408]
"Skype"="c:\program files\Skype\Phone\Skype.exe" [2012-04-05 17356424]
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"SoundMAXPnP"="c:\program files\Analog Devices\Core\smax4pnp.exe" [2004-10-14 1404928]
"ATIPTA"="c:\program files\ATI Technologies\ATI Control Panel\atiptaxx.exe" [2004-08-25 339968]
"ccApp"="c:\program files\Common Files\Symantec Shared\ccApp.exe" [2009-08-03 53096]
"vptray"="c:\progra~1\SYMANT~1\VPTray.exe" [2009-09-01 125368]
"VERIZONDM"="c:\program files\VERIZONDM\bin\sprtcmd.exe" [2010-09-29 206120]
"VerizonServicepoint.exe"="c:\program files\Verizon\VSP\VerizonServicepoint.exe" [2010-03-16 4281584]
"Verizon_McciTrayApp"="c:\program files\Verizon\McciTrayApp.exe" [2010-03-17 1565696]
"HP Software Update"="c:\program files\HP\HP Software Update\HPWuSchd2.exe" [2004-09-13 49152]
"Adobe ARM"="c:\program files\Common Files\Adobe\ARM\1.0\AdobeARM.exe" [2012-01-03 843712]
"Malwarebytes' Anti-Malware"="c:\program files\Malwarebytes' Anti-Malware\mbamgui.exe" [2012-04-04 462408]
"SunJavaUpdateSched"="c:\program files\Common Files\Java\Java Update\jusched.exe" [2011-06-09 254696]
"APSDaemon"="c:\program files\Common Files\Apple\Apple Application Support\APSDaemon.exe" [2011-11-02 59240]
"QuickTime Task"="c:\program files\QuickTime\qttask.exe" [2011-10-24 421888]
"iTunesHelper"="c:\program files\iTunes\iTunesHelper.exe" [2012-01-16 421736]
"itype"="c:\program files\Microsoft IntelliType Pro\itype.exe" [2008-06-10 1442888]
"IntelliPoint"="c:\program files\Microsoft IntelliPoint\ipoint.exe" [2008-06-10 1406024]
.
c:\documents and settings\All Users\Start Menu\Programs\Startup\
Driver performer.lnk - c:\documents and settings\Dan\Local Settings\Temp\7ZipSfx.000\dp.exe [N/A]
HP Digital Imaging Monitor.lnk - c:\program files\HP\Digital Imaging\bin\hpqtra08.exe [2004-11-4 258048]
HP Image Zone Fast Start.lnk - c:\program files\HP\Digital Imaging\bin\hpqthb08.exe [2004-11-4 53248]
.
[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecAntiVirus]
"DisableMonitoring"=dword:00000001
.
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=
"c:\\Program Files\\Skype\\Phone\\Skype.exe"=
.
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\GloballyOpenPorts\List]
"50000:UDP"= 50000:UDP:IHA_MessageCenter
.
R2 Application Updater;Application Updater;c:\program files\Application Updater\ApplicationUpdater.exe [5/16/2012 6:16 PM 785344]
R2 MBAMService;MBAMService;c:\program files\Malwarebytes' Anti-Malware\mbamservice.exe [1/3/2011 7:54 PM 654408]
R2 MSSQL$ESHA;SQL Server (ESHA);c:\program files\Microsoft SQL Server\MSSQL.1\MSSQL\Binn\sqlservr.exe [12/10/2010 10:29 PM 29293408]
R2 ServicepointService;ServicepointService;c:\program files\Verizon\VSP\ServicepointService.exe [1/20/2011 3:20 PM 689392]
R2 Skype C2C Service;Skype C2C Service;c:\documents and settings\All Users\Application Data\Skype\Toolbars\Skype C2C Service\c2c_service.exe [4/9/2012 11:20 AM 3063968]
R2 sprtsvc_verizondm;SupportSoft Sprocket Service (verizondm);c:\program files\VERIZONDM\bin\sprtsvc.exe [9/29/2010 7:00 AM 206120]
R2 tgsrvc_verizondm;SupportSoft Repair Service (verizondm);c:\program files\VERIZONDM\bin\tgsrvc.exe [9/29/2010 7:00 AM 185640]
R3 EraserUtilRebootDrv;EraserUtilRebootDrv;c:\program files\Common Files\Symantec Shared\EENGINE\EraserUtilRebootDrv.sys [2/9/2012 4:43 PM 106104]
R3 MBAMProtector;MBAMProtector;c:\windows\system32\drivers\mbam.sys [1/3/2011 7:54 PM 22344]
S0 cerc6;cerc6; [x]
S2 clr_optimization_v4.0.30319_32;Microsoft .NET Framework NGEN v4.0.30319_X86;c:\windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe [3/18/2010 2:16 PM 130384]
S2 gupdate;Google Update Service (gupdate);c:\program files\Google\Update\GoogleUpdate.exe [1/20/2011 6:50 PM 136176]
S2 IHA_MessageCenter;IHA_MessageCenter;c:\program files\Verizon\IHA_MessageCenter\Bin\Verizon_IHAMessageCenter.exe [10/13/2010 6:06 PM 290832]
S2 SkypeUpdate;Skype Updater;c:\program files\Skype\Updater\Updater.exe [4/5/2012 11:37 AM 158856]
S3 AdobeFlashPlayerUpdateSvc;Adobe Flash Player Update Service;c:\windows\system32\Macromed\Flash\FlashPlayerUpdateService.exe [4/10/2012 9:16 AM 257696]
S3 gupdatem;Google Update Service (gupdatem);c:\program files\Google\Update\GoogleUpdate.exe [1/20/2011 6:50 PM 136176]
S3 SavRoam;SAVRoam;c:\program files\Symantec AntiVirus\SavRoam.exe [9/1/2009 2:15 PM 116664]
S3 WPFFontCache_v0400;Windows Presentation Foundation Font Cache 4.0.0.0;c:\windows\Microsoft.NET\Framework\v4.0.30319\WPF\WPFFontCache_v0400.exe [3/18/2010 2:16 PM 753504]
.
Contents of the 'Scheduled Tasks' folder
.
2012-05-22 c:\windows\Tasks\Adobe Flash Player Updater.job
- c:\windows\system32\Macromed\Flash\FlashPlayerUpdateService.exe [2012-04-10 15:06]
.
2012-05-19 c:\windows\Tasks\AppleSoftwareUpdate.job
- c:\program files\Apple Software Update\SoftwareUpdate.exe [2011-06-01 21:57]
.
2012-05-22 c:\windows\Tasks\FinalTorrent Update Checker.job
- c:\program files\FinalTorrent\FTCheckForUpdates.exe [2012-02-29 19:24]
.
2012-05-22 c:\windows\Tasks\GoogleUpdateTaskMachineCore.job
- c:\program files\Google\Update\GoogleUpdate.exe [2011-01-20 22:50]
.
2012-05-22 c:\windows\Tasks\GoogleUpdateTaskMachineUA.job
- c:\program files\Google\Update\GoogleUpdate.exe [2011-01-20 22:50]
.
2012-05-22 c:\windows\Tasks\User_Feed_Synchronization-{4D9195C0-9A75-481D-8B12-3FC963817E65}.job
- c:\windows\system32\msfeedssync.exe [2009-03-08 09:31]
.
.
------- Supplementary Scan -------
.
uStart Page = hxxp://www.google.com/
uDefault_Search_URL = hxxp://www.google.com/ie
uInternet Settings,ProxyOverride = *.local
uSearchAssistant = hxxp://www.google.com/ie
uSearchURL,(Default) = hxxp://www.google.com/search?q=%s
IE: Add to Google Photos Screensa&ver - c:\windows\system32\GPhotos.scr/200
IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~2\Office12\EXCEL.EXE/3000
TCP: DhcpNameServer = 192.168.1.1 192.168.1.1
.
- - - - ORPHANS REMOVED - - - -
.
HKLM-Run-SearchSettings - c:\program files\Common Files\Spigot\Search Settings\SearchSettings.exe
.
.
.
**************************************************************************
.
catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2012-05-22 19:01
Windows 5.1.2600 Service Pack 3 NTFS
.
scanning hidden processes ...
.
scanning hidden autostart entries ...
.
scanning hidden files ...
.
scan completed successfully
hidden files: 0
.
**************************************************************************
.
--------------------- DLLs Loaded Under Running Processes ---------------------
.
- - - - - - - > 'winlogon.exe'(704)
c:\windows\system32\Ati2evxx.dll
.
- - - - - - - > 'explorer.exe'(4660)
c:\windows\system32\WININET.dll
c:\windows\system32\msi.dll
c:\windows\system32\ieframe.dll
c:\windows\system32\webcheck.dll
c:\windows\system32\WPDShServiceObj.dll
c:\windows\system32\PortableDeviceTypes.dll
c:\windows\system32\PortableDeviceApi.dll
.
------------------------ Other Running Processes ------------------------
.
c:\windows\system32\Ati2evxx.exe
c:\program files\Common Files\Symantec Shared\ccSetMgr.exe
c:\program files\Common Files\Symantec Shared\ccEvtMgr.exe
c:\program files\Common Files\Symantec Shared\SPBBC\SPBBCSvc.exe
c:\windows\system32\Ati2evxx.exe
c:\program files\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe
c:\program files\Bonjour\mDNSResponder.exe
c:\program files\Symantec AntiVirus\DefWatch.exe
c:\program files\Java\jre6\bin\jqs.exe
c:\program files\Common Files\Motive\McciCMService.exe
c:\program files\Symantec AntiVirus\DoScan.exe
c:\program files\Microsoft SQL Server\90\Shared\sqlbrowser.exe
c:\program files\Microsoft SQL Server\90\Shared\sqlwriter.exe
c:\program files\Symantec AntiVirus\Rtvscan.exe
c:\windows\system32\wscntfy.exe
c:\program files\iPod\bin\iPodService.exe
c:\program files\HP\Digital Imaging\bin\hpqgalry.exe
c:\program files\Verizon\VSP\VerizonServicepointComHandler.exe
c:\windows\system32\msiexec.exe
.
**************************************************************************
.
Completion time: 2012-05-22 19:06:56 - machine was rebooted
ComboFix-quarantined-files.txt 2012-05-22 23:06
ComboFix2.txt 2012-05-22 17:31
.
Pre-Run: 217,419,976,704 bytes free
Post-Run: 217,485,660,160 bytes free
.
- - End Of File - - BA03D9B7C4A97AD12066EF8C3BEBC263




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users