Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

trojan Patched!IK


  • This topic is locked This topic is locked
32 replies to this topic

#1 tim876

tim876

  • Members
  • 29 posts
  • OFFLINE
  •  
  • Local time:07:00 AM

Posted 01 July 2012 - 01:42 PM

My original post was in this thread

http://www.bleepingcomputer.com/forums/topic458869.html

I ran OTL because DDS froze up. when I run GMER, as described in the instructions, it runs a while, then reboots and says the system recovered from a serious error.

I will repeat my original post, then paste my OTL log

Posted Yesterday, 02:48 PM

I noticed google redirect type symptoms (search, and get crappy redirected results), and went straight to work

things i tried:

microsoft malware tool -> found nothing

symatec stinger -> found nothing

malwarebytes full scan -> found nothing

hitman pro

2 infected files

svchost.exe - trojan.Patched!IK

winlogon.exe - trojan.Patched!IK

I tried to repair, but it couldnt delete them


a search for these 2 files on the c drive shows the system32 copy of winlogin as 532 kb, and the servicepack/386 copy as 496 kb (they are both 496 kb on the similar non infected laptop i'm typing on)

system32 copy of svchost.exe as 39 kb, and the servicepack/386 copy as 14 kb. Again, they are both 14 kb on the non infected dell c810 laptop i'm typing on, running xp service pack 3)

infected computer is a dell c840, running xp service pack 3

it wont let me copy over the servicepack/386 version of the files over the infected ones

driving me nuts

TIA



OTL logfile created on: 7/1/2012 11:45:11 AM - Run 1
OTL by OldTimer - Version 3.2.53.1 Folder = C:\Documents and Settings\U1\Desktop
Windows XP Home Edition Service Pack 3 (Version = 5.1.2600) - Type = NTWorkstation
Internet Explorer (Version = 8.0.6001.18702)
Locale: 00000409 | Country: United States | Language: ENU | Date Format: M/d/yyyy

1023.43 Mb Total Physical Memory | 739.47 Mb Available Physical Memory | 72.25% Memory free
2.41 Gb Paging File | 2.19 Gb Available in Paging File | 90.96% Paging File free
Paging file location(s): C:\pagefile.sys 1536 3072 [binary data]

%SystemDrive% = C: | %SystemRoot% = C:\WINDOWS | %ProgramFiles% = C:\Program Files
Drive C: | 55.89 Gb Total Space | 46.35 Gb Free Space | 82.93% Space Free | Partition Type: NTFS
Drive E: | 122.73 Mb Total Space | 81.02 Mb Free Space | 66.02% Space Free | Partition Type: FAT

Computer Name: U1-C63792EBF3A7 | User Name: U1 | Logged in as Administrator.
Boot Mode: Normal | Scan Mode: Current user
Company Name Whitelist: Off | Skip Microsoft Files: Off | No Company Name Whitelist: On | File Age = 30 Days

========== Processes (SafeList) ==========

PRC - [2012/07/01 11:43:34 | 000,595,968 | ---- | M] (OldTimer Tools) -- C:\Documents and Settings\U1\desktop\OTL.exe
PRC - [2012/04/25 19:53:38 | 000,202,296 | ---- | M] (Kaspersky Lab ZAO) -- C:\Program Files\Kaspersky Lab\Kaspersky Security Scan 2.0\kss.exe
PRC - [2012/03/14 17:38:14 | 000,913,752 | ---- | M] (IObit) -- C:\Program Files\IObit\Advanced SystemCare 5\ASCService.exe
PRC - [2008/04/13 19:12:08 | 001,058,304 | ---- | M] (Microsoft Corporation) -- C:\WINDOWS\explorer.exe
PRC - [2005/04/20 10:34:12 | 000,487,936 | ---- | M] (Webroot Software, Inc.) -- C:\WINDOWS\system32\wwSecure.exe


========== Modules (No Company Name) ==========

MOD - [2012/02/20 21:29:04 | 000,087,912 | ---- | M] () -- C:\Program Files\Common Files\Apple\Apple Application Support\zlib1.dll
MOD - [2012/02/20 21:28:42 | 001,242,472 | ---- | M] () -- C:\Program Files\Common Files\Apple\Apple Application Support\libxml2.dll
MOD - [2011/11/10 22:43:26 | 000,138,072 | ---- | M] () -- C:\Program Files\IObit\Advanced SystemCare 5\ASCv5ExtMenu.dll
MOD - [2011/04/21 16:54:40 | 000,347,024 | ---- | M] () -- C:\Program Files\IObit\Advanced SystemCare 5\madexcept_.bpl
MOD - [2011/04/21 16:54:40 | 000,179,088 | ---- | M] () -- C:\Program Files\IObit\Advanced SystemCare 5\madbasic_.bpl
MOD - [2011/04/21 16:54:40 | 000,046,480 | ---- | M] () -- C:\Program Files\IObit\Advanced SystemCare 5\maddisAsm_.bpl
MOD - [2008/06/12 00:10:08 | 000,016,768 | ---- | M] () -- C:\Program Files\Adobe\Reader 9.0\Reader\ViewerPS.dll
MOD - [2006/10/12 16:28:48 | 000,757,760 | ---- | M] () -- C:\WINDOWS\system32\bcm1xsup.dll


========== Win32 Services (SafeList) ==========

SRV - File not found [Disabled | Stopped] -- %SystemRoot%\System32\hidserv.dll -- (HidServ)
SRV - File not found [On_Demand | Stopped] -- %SystemRoot%\System32\appmgmts.dll -- (AppMgmt)
SRV - [2012/06/24 11:58:38 | 000,113,120 | ---- | M] (Mozilla Foundation) [On_Demand | Stopped] -- C:\Program Files\Mozilla Maintenance Service\maintenanceservice.exe -- (MozillaMaintenance)
SRV - [2012/06/22 22:56:33 | 000,250,056 | ---- | M] (Adobe Systems Incorporated) [On_Demand | Stopped] -- C:\WINDOWS\system32\Macromed\Flash\FlashPlayerUpdateService.exe -- (AdobeFlashPlayerUpdateSvc)
SRV - [2012/04/25 19:53:38 | 000,202,296 | ---- | M] (Kaspersky Lab ZAO) [Auto | Running] -- C:\Program Files\Kaspersky Lab\Kaspersky Security Scan 2.0\kss.exe -- (KSS)
SRV - [2012/03/14 17:38:14 | 000,913,752 | ---- | M] (IObit) [Auto | Running] -- C:\Program Files\IObit\Advanced SystemCare 5\ASCService.exe -- (AdvancedSystemCareService5)
SRV - [2011/06/26 01:45:56 | 000,256,000 | R--- | M] () [Auto | Stopped] -- C:\123cf\pev.3XE -- (PEVSystemStart)
SRV - [2005/04/20 10:34:12 | 000,487,936 | ---- | M] (Webroot Software, Inc.) [Auto | Running] -- C:\WINDOWS\system32\wwSecure.exe -- (wwSecSvc)
SRV - [2004/03/18 16:55:48 | 000,065,536 | ---- | M] (HP) [On_Demand | Stopped] -- C:\WINDOWS\system32\HPZipm12.exe -- (Pml Driver HPZ12)


========== Driver Services (SafeList) ==========

DRV - File not found [Kernel | On_Demand | Stopped] -- -- (WDICA)
DRV - File not found [Kernel | On_Demand | Stopped] -- -- (PDRFRAME)
DRV - File not found [Kernel | On_Demand | Stopped] -- -- (PDRELI)
DRV - File not found [Kernel | On_Demand | Stopped] -- -- (PDFRAME)
DRV - File not found [Kernel | On_Demand | Stopped] -- -- (PDCOMP)
DRV - File not found [Kernel | System | Stopped] -- -- (PCIDump)
DRV - File not found [Kernel | System | Stopped] -- -- (lbrtfdc)
DRV - File not found [Kernel | System | Stopped] -- -- (i2omgmt)
DRV - File not found [Kernel | System | Stopped] -- -- (Changer)
DRV - [2012/06/29 20:42:25 | 000,040,776 | ---- | M] (Malwarebytes Corporation) [Kernel | On_Demand | Stopped] -- C:\WINDOWS\system32\drivers\mbamswissarmy.sys -- (MBAMSwissArmy)
DRV - [2006/10/12 16:28:42 | 000,604,928 | ---- | M] (Broadcom Corporation) [Kernel | On_Demand | Running] -- C:\WINDOWS\system32\drivers\BCMWL5.SYS -- (BCM43XX)
DRV - [2005/11/24 19:51:38 | 000,245,248 | ---- | M] (Ralink Technology, Corp.) [Kernel | On_Demand | Stopped] -- C:\WINDOWS\system32\drivers\rt73.sys -- (RT73)
DRV - [2005/06/18 02:48:46 | 000,019,968 | ---- | M] (WikiTek Inc.) [Kernel | On_Demand | Running] -- C:\WINDOWS\system32\drivers\ss.sys -- (StreamSurge) StreamSurge Driver (miniport)
DRV - [2005/03/02 13:47:54 | 000,015,872 | ---- | M] (Gemtek Technology Co.) [Kernel | On_Demand | Stopped] -- C:\Program Files\Belkin\F5D9050\BKNDIS5.sys -- (BKNDIS5)
DRV - [2004/04/09 19:00:26 | 000,017,153 | ---- | M] (Dell Inc) [Kernel | System | Running] -- C:\WINDOWS\system32\drivers\omci.sys -- (omci)
DRV - [2001/08/17 14:28:00 | 000,762,780 | ---- | M] (3Com, Inc.) [Kernel | On_Demand | Stopped] -- C:\WINDOWS\system32\drivers\3CWMCRU.sys -- (3CWMCRU)
DRV - [2001/08/17 12:13:14 | 000,046,108 | ---- | M] (Xircom, Inc.) [Kernel | On_Demand | Running] -- C:\WINDOWS\system32\drivers\cben5.sys -- (CBEN5)
DRV - [2001/08/17 07:11:06 | 000,066,591 | ---- | M] (3Com Corporation) [Kernel | On_Demand | Running] -- C:\WINDOWS\system32\drivers\el90xbc5.sys -- (EL90XBC)


========== Standard Registry (SafeList) ==========


========== Internet Explorer ==========

IE - HKLM\..\SearchScopes,DefaultScope = {0633EE93-D776-472f-A0FF-E1416B8B2E3A}
IE - HKLM\..\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}: "URL" = http://search.live.com/results.aspx?q={searchTerms}&src={referrer:source?}

IE - HKCU\SOFTWARE\Microsoft\Internet Explorer\Main,Start Page = http://www.google.com/
IE - HKCU\..\SearchScopes,DefaultScope = {0633EE93-D776-472f-A0FF-E1416B8B2E3A}
IE - HKCU\..\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}: "URL" = http://www.bing.com/search?q={searchTerms}&src=IE-SearchBox&FORM=IE8SRC
IE - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings: "ProxyEnable" = 0
IE - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings: "ProxyOverride" = *.local

========== FireFox ==========

FF - prefs.js..browser.startup.homepage: "http://www.google.com/"
FF - prefs.js..network.proxy.type: 0
FF - user.js - File not found

FF - HKLM\Software\MozillaPlugins\@adobe.com/FlashPlayer: C:\WINDOWS\system32\Macromed\Flash\NPSWF32_11_3_300_262.dll ()
FF - HKLM\Software\MozillaPlugins\@Apple.com/iTunes,version=: File not found
FF - HKLM\Software\MozillaPlugins\@Apple.com/iTunes,version=1.0: C:\Program Files\iTunes\Mozilla Plugins\npitunes.dll ()
FF - HKLM\Software\MozillaPlugins\@java.com/JavaPlugin: C:\Program Files\Java\jre6\bin\plugin2\npjp2.dll (Sun Microsystems, Inc.)
FF - HKLM\Software\MozillaPlugins\@Microsoft.com/NpCtrl,version=1.0: c:\Program Files\Microsoft Silverlight\5.1.10411.0\npctrl.dll ( Microsoft Corporation)
FF - HKCU\Software\MozillaPlugins\@tools.google.com/Google Update;version=3: C:\Documents and Settings\U1\Local Settings\Application Data\Google\Update\1.3.21.111\npGoogleUpdate3.dll (Google Inc.)
FF - HKCU\Software\MozillaPlugins\@tools.google.com/Google Update;version=9: C:\Documents and Settings\U1\Local Settings\Application Data\Google\Update\1.3.21.111\npGoogleUpdate3.dll (Google Inc.)

FF - HKEY_LOCAL_MACHINE\software\mozilla\Mozilla Firefox 13.0.1\extensions\\Components: C:\Program Files\Mozilla Firefox\components [2012/06/24 11:58:44 | 000,000,000 | ---D | M]
FF - HKEY_LOCAL_MACHINE\software\mozilla\Mozilla Firefox 13.0.1\extensions\\Plugins: C:\Program Files\Mozilla Firefox\plugins
FF - HKEY_CURRENT_USER\software\mozilla\Firefox\Extensions\\{41206C9C-7B72-11E1-826D-B8AC6F996F26}: C:\Documents and Settings\U1\Local Settings\Application Data\{41206C9C-7B72-11E1-826D-B8AC6F996F26}\ [2012/03/31 15:45:26 | 000,000,000 | ---D | M]

[2011/10/15 20:48:58 | 000,000,000 | ---D | M] (No name found) -- C:\Documents and Settings\U1\Application Data\Mozilla\Extensions
[2012/05/09 10:41:36 | 000,000,000 | ---D | M] (No name found) -- C:\Documents and Settings\U1\Application Data\Mozilla\Firefox\Profiles\oludu5vi.default\extensions
[2012/05/08 18:30:17 | 000,000,000 | ---D | M] (No name found) -- C:\Program Files\Mozilla Firefox\extensions
[2011/10/25 08:42:36 | 000,000,000 | ---D | M] ("SlipStream SP Image Decoders") -- C:\Program Files\Mozilla Firefox\extensions\{41697025-CA0B-4687-99DE-ABC82C5A630B}
[2011/10/25 08:42:36 | 000,000,000 | ---D | M] ("SlipStream SP Integrator") -- C:\Program Files\Mozilla Firefox\extensions\{9d613b03-9b7c-4fa0-b2f8-32f7cc24873f}
[2012/06/24 11:58:42 | 000,085,472 | ---- | M] (Mozilla Foundation) -- C:\Program Files\mozilla firefox\components\browsercomps.dll
[2012/06/24 11:58:23 | 000,002,252 | ---- | M] () -- C:\Program Files\mozilla firefox\searchplugins\bing.xml
[2012/06/24 11:58:23 | 000,002,040 | ---- | M] () -- C:\Program Files\mozilla firefox\searchplugins\twitter.xml

========== Chrome ==========

CHR - default_search_provider: Google (Enabled)
CHR - default_search_provider: search_url = {google:baseURL}search?{google:RLZ}{google:acceptedSuggestion}{google:originalQueryForSuggestion}{google:searchFieldtrialParameter}{google:instantFieldTrialGroupParameter}sourceid=chrome&ie={inputEncoding}&q={searchTerms}
CHR - default_search_provider: suggest_url = {google:baseSuggestURL}search?{google:searchFieldtrialParameter}{google:instantFieldTrialGroupParameter}client=chrome&hl={language}&q={searchTerms}
CHR - plugin: Remoting Viewer (Enabled) = internal-remoting-viewer
CHR - plugin: Native Client (Enabled) = C:\Documents and Settings\U1\Local Settings\Application Data\Google\Chrome\Application\19.0.1084.56\ppGoogleNaClPluginChrome.dll
CHR - plugin: Chrome PDF Viewer (Enabled) = C:\Documents and Settings\U1\Local Settings\Application Data\Google\Chrome\Application\19.0.1084.56\pdf.dll
CHR - plugin: Shockwave Flash (Enabled) = C:\Documents and Settings\U1\Local Settings\Application Data\Google\Chrome\Application\19.0.1084.56\gcswf32.dll
CHR - plugin: Adobe Acrobat (Enabled) = C:\Program Files\Adobe\Reader 9.0\Reader\Browser\nppdf32.dll
CHR - plugin: Microsoft\u00AE DRM (Enabled) = C:\Program Files\Windows Media Player\npdrmv2.dll
CHR - plugin: Microsoft\u00AE DRM (Enabled) = C:\Program Files\Windows Media Player\npwmsdrm.dll
CHR - plugin: Windows Media Player Plug-in Dynamic Link Library (Enabled) = C:\Program Files\Windows Media Player\npdsplay.dll
CHR - plugin: Google Update (Enabled) = C:\Documents and Settings\U1\Local Settings\Application Data\Google\Update\1.3.21.111\npGoogleUpdate3.dll
CHR - plugin: Java™ Platform SE 6 U31 (Enabled) = C:\Program Files\Java\jre6\bin\plugin2\npjp2.dll
CHR - plugin: Silverlight Plug-In (Enabled) = c:\Program Files\Microsoft Silverlight\5.0.61118.0\npctrl.dll
CHR - Extension: YouTube = C:\Documents and Settings\U1\Local Settings\Application Data\Google\Chrome\User Data\Default\Extensions\blpcfgokakmgnkcojhhkbfbldkacnbeo\4.2.5_0\
CHR - Extension: Google Search = C:\Documents and Settings\U1\Local Settings\Application Data\Google\Chrome\User Data\Default\Extensions\coobgpohoikkiipiblmjeljniedjpjpf\0.0.0.19_0\
CHR - Extension: Gmail = C:\Documents and Settings\U1\Local Settings\Application Data\Google\Chrome\User Data\Default\Extensions\pjkljhegncpnkpknbcohdijeoejaedia\7_0\

O1 HOSTS File: ([2012/04/12 23:06:19 | 000,000,784 | ---- | M]) - C:\WINDOWS\system32\drivers\etc\hosts
O1 - Hosts: 127.0.0.1 localhost
O1 - Hosts: 127.0.0.1 http://www.democraticunderground.com
O2 - BHO: (Java™ Plug-In SSV Helper) - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre6\bin\ssv.dll (Sun Microsystems, Inc.)
O2 - BHO: (NOW!Imaging) - {9AA2F14F-E956-44B8-8694-A5B615CDF341} - C:\Program Files\Web Accelerator\components\NOWImaging.dll (SlipStream Data Inc.)
O2 - BHO: (Prefetch) - {A66AA08A-9BF0-4e87-99E6-6972731D6B99} - C:\Program Files\Web Accelerator\Prefetch.dll (SlipStream Data Inc.)
O6 - HKLM\Software\Policies\Microsoft\Internet Explorer\Infodelivery present
O6 - HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: NoDriveAutoRun = 67108863
O6 - HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: NoDriveTypeAutoRun = 323
O7 - HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: NoDriveTypeAutoRun = 323
O7 - HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: NoDriveAutoRun = 67108863
O10 - NameSpace_Catalog5\Catalog_Entries\000000000004 [] - C:\Program Files\Bonjour\mdnsNSP.dll (Apple Inc.)
O16 - DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} http://java.sun.com/update/1.6.0/jinstall-1_6_0_31-windows-i586.cab (Java Plug-in 1.6.0_31)
O16 - DPF: {CAFEEFAC-0016-0000-0031-ABCDEFFEDCBA} http://java.sun.com/update/1.6.0/jinstall-1_6_0_31-windows-i586.cab (Java Plug-in 1.6.0_31)
O16 - DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} http://java.sun.com/update/1.6.0/jinstall-1_6_0_31-windows-i586.cab (Java Plug-in 1.6.0_31)
O16 - DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} http://fpdownload.macromedia.com/pub/shockwave/cabs/flash/swflash.cab (Shockwave Flash Object)
O20 - HKLM Winlogon: Shell - (Explorer.exe) - C:\WINDOWS\explorer.exe (Microsoft Corporation)
O20 - HKLM Winlogon: UserInit - (C:\WINDOWS\system32\userinit.exe) - C:\WINDOWS\system32\userinit.exe (Microsoft Corporation)
O32 - HKLM CDRom: AutoRun - 1
O32 - AutoRun File - [2011/10/11 09:30:22 | 000,000,000 | ---- | M] () - C:\AUTOEXEC.BAT -- [ NTFS ]
O34 - HKLM BootExecute: (autocheck autochk *)
O35 - HKLM\..comfile [open] -- "%1" %*
O35 - HKLM\..exefile [open] -- "%1" %*
O37 - HKLM\...com [@ = comfile] -- "%1" %*
O37 - HKLM\...exe [@ = exefile] -- "%1" %*
O38 - SubSystems\\Windows: (ServerDll=winsrv:UserServerDllInitialization,3)
O38 - SubSystems\\Windows: (ServerDll=winsrv:ConServerDllInitialization,2)

========== Files/Folders - Created Within 30 Days ==========

[2012/07/01 11:41:56 | 000,595,968 | ---- | C] (OldTimer Tools) -- C:\Documents and Settings\U1\Desktop\OTL.exe
[2012/07/01 11:24:53 | 002,134,616 | ---- | C] (Kaspersky Lab ZAO) -- C:\Documents and Settings\U1\Desktop\tdsskiller.exe
[2012/06/30 18:37:56 | 000,607,260 | R--- | C] (Swearware) -- C:\Documents and Settings\U1\Desktop\dds.scr
[2012/06/30 13:33:12 | 016,208,824 | ---- | C] (Microsoft Corporation) -- C:\Documents and Settings\U1\Desktop\Windows-KB890830-V4.9.exe
[2012/06/30 12:11:50 | 000,000,000 | --SD | C] -- C:\123cf
[2012/06/30 09:27:43 | 000,000,000 | RHSD | C] -- C:\cmdcons
[2012/06/30 09:24:04 | 000,518,144 | ---- | C] (SteelWerX) -- C:\WINDOWS\SWREG.exe
[2012/06/30 09:24:04 | 000,406,528 | ---- | C] (SteelWerX) -- C:\WINDOWS\SWSC.exe
[2012/06/30 09:24:04 | 000,212,480 | ---- | C] (SteelWerX) -- C:\WINDOWS\SWXCACLS.exe
[2012/06/30 09:24:04 | 000,060,416 | ---- | C] (NirSoft) -- C:\WINDOWS\NIRCMD.exe
[2012/06/30 09:23:19 | 000,000,000 | ---D | C] -- C:\Qoobox
[2012/06/30 09:22:18 | 000,000,000 | ---D | C] -- C:\WINDOWS\erdnt
[2012/06/29 20:06:37 | 000,040,776 | ---- | C] (Malwarebytes Corporation) -- C:\WINDOWS\System32\drivers\mbamswissarmy.sys
[2012/06/29 19:14:17 | 000,000,000 | ---D | C] -- C:\Documents and Settings\U1\Local Settings\Application Data\NPE
[2012/06/29 19:14:17 | 000,000,000 | ---D | C] -- C:\Documents and Settings\All Users\Application Data\Norton
[2012/06/29 19:14:08 | 002,841,104 | ---- | C] (Symantec Corporation) -- C:\Documents and Settings\U1\Desktop\NPE.exe
[2012/06/29 18:42:46 | 000,000,000 | ---D | C] -- C:\WINDOWS\pss
[2012/06/29 14:39:18 | 000,000,000 | ---D | C] -- C:\Documents and Settings\U1\Start Menu\Programs\Kaspersky Security Scan
[2012/06/29 14:37:54 | 000,000,000 | ---D | C] -- C:\Program Files\Kaspersky Lab
[2012/06/29 14:37:53 | 000,000,000 | ---D | C] -- C:\Documents and Settings\All Users\Application Data\Kaspersky Lab
[2012/06/29 14:29:17 | 000,180,000 | ---- | C] (Kaspersky Lab) -- C:\Documents and Settings\U1\Desktop\kss12.0.1.117EN_RU_DE_FR_2926.exe
[2012/06/29 12:56:24 | 000,000,000 | ---D | C] -- C:\Documents and Settings\U1\Application Data\TeamViewer
[2012/06/29 12:56:18 | 000,000,000 | ---D | C] -- C:\Documents and Settings\U1\temp
[2012/06/28 17:13:22 | 000,000,000 | ---D | C] -- C:\Documents and Settings\All Users\Application Data\Sophos
[2012/06/28 17:13:12 | 000,000,000 | ---D | C] -- C:\Documents and Settings\U1\Start Menu\Programs\Sophos
[2012/06/28 17:12:34 | 000,000,000 | ---D | C] -- C:\Program Files\Sophos
[2012/06/28 16:43:17 | 000,000,000 | ---D | C] -- C:\Program Files\HitmanPro
[2012/06/28 16:43:17 | 000,000,000 | ---D | C] -- C:\Documents and Settings\All Users\Start Menu\Programs\HitmanPro
[2012/06/28 15:51:29 | 000,014,664 | ---- | C] (McAfee, Inc.) -- C:\WINDOWS\stinger.sys
[2012/06/28 15:50:17 | 000,000,000 | ---D | C] -- C:\Program Files\stinger
[2012/06/13 08:27:56 | 000,521,728 | ---- | C] (Microsoft Corporation) -- C:\WINDOWS\System32\dllcache\jsdbgui.dll
[6 C:\Documents and Settings\All Users\Application Data\*.tmp files -> C:\Documents and Settings\All Users\Application Data\*.tmp -> ]
[4 C:\WINDOWS\*.tmp files -> C:\WINDOWS\*.tmp -> ]
[2 C:\WINDOWS\System32\*.tmp files -> C:\WINDOWS\System32\*.tmp -> ]

========== Files - Modified Within 30 Days ==========

[2012/07/01 11:43:34 | 000,595,968 | ---- | M] (OldTimer Tools) -- C:\Documents and Settings\U1\Desktop\OTL.exe
[2012/07/01 11:24:31 | 000,000,306 | ---- | M] () -- C:\WINDOWS\tasks\GlaryInitialize.job
[2012/07/01 11:23:38 | 000,013,646 | ---- | M] () -- C:\WINDOWS\System32\wpa.dbl
[2012/07/01 11:23:31 | 000,002,048 | --S- | M] () -- C:\WINDOWS\bootstat.dat
[2012/07/01 11:10:26 | 002,134,616 | ---- | M] (Kaspersky Lab ZAO) -- C:\Documents and Settings\U1\Desktop\tdsskiller.exe
[2012/07/01 11:03:00 | 000,000,664 | ---- | M] () -- C:\WINDOWS\System32\d3d9caps.dat
[2012/07/01 10:53:15 | 000,000,830 | ---- | M] () -- C:\WINDOWS\tasks\Adobe Flash Player Updater.job
[2012/06/30 20:20:01 | 000,000,966 | ---- | M] () -- C:\WINDOWS\tasks\GoogleUpdateTaskUserS-1-5-21-507921405-1563985344-1957994488-1004UA.job
[2012/06/30 18:38:16 | 000,607,260 | R--- | M] (Swearware) -- C:\Documents and Settings\U1\Desktop\dds.scr
[2012/06/30 14:47:03 | 000,000,284 | ---- | M] () -- C:\WINDOWS\tasks\AppleSoftwareUpdate.job
[2012/06/30 13:41:52 | 000,014,664 | ---- | M] (McAfee, Inc.) -- C:\WINDOWS\stinger.sys
[2012/06/30 13:30:58 | 016,208,824 | ---- | M] (Microsoft Corporation) -- C:\Documents and Settings\U1\Desktop\Windows-KB890830-V4.9.exe
[2012/06/30 11:20:01 | 000,000,914 | ---- | M] () -- C:\WINDOWS\tasks\GoogleUpdateTaskUserS-1-5-21-507921405-1563985344-1957994488-1004Core.job
[2012/06/30 09:27:51 | 000,000,327 | RHS- | M] () -- C:\boot.ini
[2012/06/29 20:42:25 | 000,040,776 | ---- | M] (Malwarebytes Corporation) -- C:\WINDOWS\System32\drivers\mbamswissarmy.sys
[2012/06/29 19:29:39 | 000,000,211 | ---- | M] () -- C:\Boot.bak
[2012/06/29 19:14:14 | 002,841,104 | ---- | M] (Symantec Corporation) -- C:\Documents and Settings\U1\Desktop\NPE.exe
[2012/06/29 15:21:20 | 000,000,882 | ---- | M] () -- C:\WINDOWS\System32\.crusader
[2012/06/29 14:53:31 | 000,002,025 | ---- | M] () -- C:\WINDOWS\Mng7.ini
[2012/06/29 14:38:56 | 000,000,814 | ---- | M] () -- C:\Documents and Settings\U1\Desktop\Kaspersky Security Scan.lnk
[2012/06/29 14:29:22 | 000,180,000 | ---- | M] (Kaspersky Lab) -- C:\Documents and Settings\U1\Desktop\kss12.0.1.117EN_RU_DE_FR_2926.exe
[2012/06/29 10:29:28 | 000,380,918 | ---- | M] () -- C:\WINDOWS\System32\perfh009.dat
[2012/06/29 10:29:27 | 000,053,166 | ---- | M] () -- C:\WINDOWS\System32\perfc009.dat
[2012/06/28 17:13:12 | 000,002,068 | ---- | M] () -- C:\Documents and Settings\U1\Desktop\Sophos Virus Removal Tool.lnk
[2012/06/28 16:43:17 | 000,001,610 | ---- | M] () -- C:\Documents and Settings\All Users\Desktop\HitmanPro.lnk
[2012/06/28 16:25:50 | 000,000,406 | ---- | M] () -- C:\WINDOWS\SA4_WKSP.INI
[2012/06/28 16:08:33 | 000,001,493 | ---- | M] () -- C:\Documents and Settings\U1\Application Data\Microsoft\Internet Explorer\Quick Launch\Windows Explorer (2).lnk
[2012/06/28 09:20:22 | 000,001,374 | ---- | M] () -- C:\WINDOWS\imsins.BAK
[2012/06/28 08:34:47 | 000,000,741 | ---- | M] () -- C:\Documents and Settings\U1\Desktop\Glary Utilities.lnk
[2012/06/26 18:05:18 | 002,024,166 | ---- | M] () -- C:\Documents and Settings\U1\Desktop\03.wmv
[2012/06/22 22:56:29 | 000,426,184 | ---- | M] (Adobe Systems Incorporated) -- C:\WINDOWS\System32\FlashPlayerApp.exe
[2012/06/22 22:56:28 | 000,070,344 | ---- | M] (Adobe Systems Incorporated) -- C:\WINDOWS\System32\FlashPlayerCPLApp.cpl
[2012/06/16 18:01:25 | 000,000,784 | ---- | M] () -- C:\Documents and Settings\All Users\Desktop\Malwarebytes Anti-Malware.lnk
[2012/06/13 10:12:25 | 000,129,296 | ---- | M] () -- C:\WINDOWS\System32\FNTCACHE.DAT
[2012/06/11 20:29:30 | 000,002,261 | ---- | M] () -- C:\Documents and Settings\U1\Desktop\Google Chrome.lnk
[2012/06/11 20:29:30 | 000,002,239 | ---- | M] () -- C:\Documents and Settings\U1\Application Data\Microsoft\Internet Explorer\Quick Launch\Google Chrome.lnk
[2012/06/11 10:52:26 | 000,022,036 | -H-- | M] () -- C:\WINDOWS\System32\mlfcache.dat
[2012/06/02 15:19:44 | 000,022,040 | ---- | M] (Microsoft Corporation) -- C:\WINDOWS\System32\wucltui.dll.mui
[2012/06/02 15:19:38 | 000,329,240 | ---- | M] (Microsoft Corporation) -- C:\WINDOWS\System32\wucltui.dll
[2012/06/02 15:19:38 | 000,329,240 | ---- | M] (Microsoft Corporation) -- C:\WINDOWS\System32\dllcache\wucltui.dll
[2012/06/02 15:19:38 | 000,219,160 | ---- | M] (Microsoft Corporation) -- C:\WINDOWS\System32\dllcache\wuaucpl.cpl
[2012/06/02 15:19:38 | 000,210,968 | ---- | M] (Microsoft Corporation) -- C:\WINDOWS\System32\dllcache\wuweb.dll
[2012/06/02 15:19:34 | 000,097,304 | ---- | M] (Microsoft Corporation) -- C:\WINDOWS\System32\dllcache\cdm.dll
[2012/06/02 15:19:34 | 000,097,304 | ---- | M] (Microsoft Corporation) -- C:\WINDOWS\System32\cdm.dll
[2012/06/02 15:19:34 | 000,053,784 | ---- | M] (Microsoft Corporation) -- C:\WINDOWS\System32\dllcache\wuauclt.exe
[2012/06/02 15:19:34 | 000,045,080 | ---- | M] (Microsoft Corporation) -- C:\WINDOWS\System32\wups2.dll
[2012/06/02 15:19:34 | 000,035,864 | ---- | M] (Microsoft Corporation) -- C:\WINDOWS\System32\wups.dll
[2012/06/02 15:19:34 | 000,035,864 | ---- | M] (Microsoft Corporation) -- C:\WINDOWS\System32\dllcache\wups.dll
[2012/06/02 15:19:34 | 000,015,384 | ---- | M] (Microsoft Corporation) -- C:\WINDOWS\System32\wuapi.dll.mui
[2012/06/02 15:19:24 | 000,577,048 | ---- | M] (Microsoft Corporation) -- C:\WINDOWS\System32\wuapi.dll
[2012/06/02 15:19:24 | 000,577,048 | ---- | M] (Microsoft Corporation) -- C:\WINDOWS\System32\dllcache\wuapi.dll
[2012/06/02 15:19:18 | 001,933,848 | ---- | M] (Microsoft Corporation) -- C:\WINDOWS\System32\dllcache\wuaueng.dll
[2012/06/02 15:18:58 | 000,275,696 | ---- | M] (Microsoft Corporation) -- C:\WINDOWS\System32\mucltui.dll
[2012/06/02 15:18:58 | 000,017,136 | ---- | M] (Microsoft Corporation) -- C:\WINDOWS\System32\mucltui.dll.mui
[6 C:\Documents and Settings\All Users\Application Data\*.tmp files -> C:\Documents and Settings\All Users\Application Data\*.tmp -> ]
[4 C:\WINDOWS\*.tmp files -> C:\WINDOWS\*.tmp -> ]
[2 C:\WINDOWS\System32\*.tmp files -> C:\WINDOWS\System32\*.tmp -> ]

========== Files Created - No Company Name ==========

[2012/06/30 09:27:51 | 000,000,211 | ---- | C] () -- C:\Boot.bak
[2012/06/30 09:27:46 | 000,260,272 | RHS- | C] () -- C:\cmldr
[2012/06/30 09:24:04 | 000,256,000 | ---- | C] () -- C:\WINDOWS\PEV.exe
[2012/06/30 09:24:04 | 000,208,896 | ---- | C] () -- C:\WINDOWS\MBR.exe
[2012/06/30 09:24:04 | 000,098,816 | ---- | C] () -- C:\WINDOWS\sed.exe
[2012/06/30 09:24:04 | 000,080,412 | ---- | C] () -- C:\WINDOWS\grep.exe
[2012/06/30 09:24:04 | 000,068,096 | ---- | C] () -- C:\WINDOWS\zip.exe
[2012/06/29 14:39:18 | 000,000,814 | ---- | C] () -- C:\Documents and Settings\U1\Desktop\Kaspersky Security Scan.lnk
[2012/06/28 17:13:12 | 000,002,068 | ---- | C] () -- C:\Documents and Settings\U1\Desktop\Sophos Virus Removal Tool.lnk
[2012/06/28 16:43:17 | 000,001,610 | ---- | C] () -- C:\Documents and Settings\All Users\Desktop\HitmanPro.lnk
[2012/06/28 09:15:18 | 000,225,262 | ---- | C] () -- C:\WINDOWS\System32\dllcache\msimain.sdb
[2012/06/26 18:05:17 | 002,024,166 | ---- | C] () -- C:\Documents and Settings\U1\Desktop\03.wmv
[2012/06/11 10:52:26 | 000,022,036 | -H-- | C] () -- C:\WINDOWS\System32\mlfcache.dat
[2012/05/02 09:20:28 | 000,000,125 | ---- | C] () -- C:\Documents and Settings\U1\Local Settings\Application Data\fusioncache.dat
[2012/03/30 11:09:11 | 000,003,072 | ---- | C] () -- C:\WINDOWS\System32\iacenc.dll
[2012/01/12 08:51:25 | 000,002,025 | ---- | C] () -- C:\WINDOWS\Mng7.ini
[2011/10/15 23:56:54 | 000,000,664 | ---- | C] () -- C:\WINDOWS\System32\d3d9caps.dat
[2011/10/14 20:54:35 | 000,086,016 | ---- | C] () -- C:\WINDOWS\System32\preflib.dll
[2011/10/14 20:54:33 | 000,757,760 | ---- | C] () -- C:\WINDOWS\System32\bcm1xsup.dll
[2011/10/14 20:54:33 | 000,020,480 | ---- | C] () -- C:\WINDOWS\System32\WLTRYSVC.EXE
[2011/10/13 10:12:10 | 000,000,008 | RHS- | C] () -- C:\WINDOWS\System32\Desktop_.ini
[2011/10/12 15:58:20 | 000,040,960 | ---- | C] () -- C:\WINDOWS\System32\F5D9050.dll
[2011/10/12 14:53:20 | 000,000,406 | ---- | C] () -- C:\WINDOWS\SA4_WKSP.INI
[2011/10/12 14:53:20 | 000,000,033 | ---- | C] () -- C:\WINDOWS\SA4_DRAW.INI
[2011/10/12 14:53:18 | 000,009,136 | ---- | C] () -- C:\WINDOWS\System32\inetwh16.dll
[2011/10/12 14:25:10 | 000,104,253 | ---- | C] () -- C:\WINDOWS\hpoins04.dat
[2011/10/12 14:25:10 | 000,017,176 | ---- | C] () -- C:\WINDOWS\hpomdl04.dat
[2011/10/12 14:21:55 | 000,000,376 | ---- | C] () -- C:\WINDOWS\ODBC.INI
[2011/10/12 14:14:42 | 000,000,231 | ---- | C] () -- C:\WINDOWS\POWERPNT.INI
[2011/10/12 14:14:18 | 000,000,064 | ---- | C] () -- C:\WINDOWS\exchng32.ini
[2011/10/12 14:14:18 | 000,000,026 | ---- | C] () -- C:\WINDOWS\datalink.ini
[2011/10/12 14:14:01 | 000,000,032 | ---- | C] () -- C:\WINDOWS\GRAPH5.INI
[2011/10/12 14:13:59 | 000,000,000 | ---- | C] () -- C:\WINDOWS\WINHELP.INI
[2011/10/11 09:33:25 | 000,002,048 | --S- | C] () -- C:\WINDOWS\bootstat.dat
[2011/10/11 09:26:32 | 000,021,640 | ---- | C] () -- C:\WINDOWS\System32\emptyregdb.dat
[2011/10/11 04:15:15 | 000,004,161 | ---- | C] () -- C:\WINDOWS\ODBCINST.INI
[2011/10/11 04:13:24 | 000,129,296 | ---- | C] () -- C:\WINDOWS\System32\FNTCACHE.DAT

< End of report >

Edited by tim876, 01 July 2012 - 01:57 PM.


BC AdBot (Login to Remove)

 


#2 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,773 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:08:00 AM

Posted 02 July 2012 - 12:06 AM

Greetings and Welcome to The Forums!!

My name is Gringo and I'll be glad to help you with your computer problems.

I have put together somethings for you to keep in mind while I am helping you to make things go easier and faster for both of us

  • Please do not run any tools unless instructed to do so.
    • We ask you to run different tools in a specific order to ensure the malware is completely removed from your machine, and running any additional tools may detect false positives, interfere with our tools, or cause unforeseen damage or system instability.
  • Please do not attach logs or use code boxes, just copy and paste the text.
    • Due to the high volume of logs we receive it helps to receive everything in the same format, and code boxes make the logs very difficult to read. Also, attachments require us to download and open the reports when it is easier to just read the reports in your post.
  • Please read every post completely before doing anything.
    • Pay special attention to the NOTE: lines, these entries identify an individual issue or important step in the cleanup process.
  • Please provide feedback about your experience as we go.
    • A short statement describing how the computer is working helps us understand where to go next, for example: I am still getting redirected, the computer is running normally, etc. Please do not describe the computer as "the same", this requires the extra step of looking back at your previous post.
NOTE: At the top of your post, click on the Watch Topic Button, select Immediate Notification, and click on Proceed. This will send you an e-mail as soon as I reply to your topic, allowing us to resolve the issue faster.

NOTE: Backup any files that cannot be replaced. Removing malware can be unpredictable and this step can save a lot of hartaches if things don't go as planed. You can put them on a CD/DVD, external drive or a pen drive, anywhere except on the computer.

NOTE: It is good practice to copy and paste the instructions into notepad and print them in case it is necessary for you to go offline during the cleanup process. To open notepad, navigate to Start Menu > All Programs > Accessories > Notepad. Please remember to copy the entire post so you do not miss any instructions.

Security Check

  • Download Security Check by screen317 from here.
  • Save it to your Desktop.
  • Double click SecurityCheck.exe and follow the onscreen instructions inside of the black box.
  • A Notepad document should open automatically called checkup.txt; please post the contents of that document.



Run Combofix:

You may be asked to install or update the Recovery Console (Win XP Only) if this happens please allow it to do so (you will need to be connected to the internet for this)

Before you run Combofix I will need you to turn off any security software you have running, If you do not know how to do this you can find out >here< or >here<

Combofix may need to reboot your computer more than once to do its job this is normal.

You can download Combofix from one of these links.
Link 1
Link 2
Link 3
1. Close any open browsers or any other programs that are open.
2. Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.

Double click on combofix.exe & follow the prompts.
When finished, it will produce a report for you.

Note 1: Do not mouseclick combofix's window while it's running. That may cause it to stall

Note 2: If you recieve an error "Illegal operation attempted on a registery key that has been marked for deletion." Please restart the computer

"information and logs"

  • In your next post I need the following
  • Log from Combofix
  • let me know of any problems you may have had
  • How is the computer doing now?

Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#3 tim876

tim876
  • Topic Starter

  • Members
  • 29 posts
  • OFFLINE
  •  
  • Local time:07:00 AM

Posted 02 July 2012 - 12:48 PM

here's the security tool log

Results of screen317's Security Check version 0.99.42
Windows XP Service Pack 3 x86
Internet Explorer 8
``````````````Antivirus/Firewall Check:``````````````
Windows Firewall Enabled!
Sophos Virus Removal Tool
`````````Anti-malware/Other Utilities Check:`````````
Malwarebytes Anti-Malware version 1.61.0.1400
Java™ 6 Update 31
Java version out of Date!
Adobe Flash Player 11.3.300.262
Adobe Reader 9 Adobe Reader out of Date!
Mozilla Firefox (13.0.1)
````````Process Check: objlist.exe by Laurent````````
Kaspersky Lab Kaspersky Security Scan 2.0 kss.exe
`````````````````System Health check`````````````````
Total Fragmentation on Drive C:: 3%
````````````````````End of Log``````````````````````

i ran combofix, but it gets to the line where it says it could take 10 minutes or double for badly infected, i let it sit for an hour without touching it, and then had to reboot because it was totally frozen

after reboot, a re-run hitman pro shows the Patched!IK trojan still there in winlogin.exe and svchost.exe

(I did not use the hitman tool to modify anything, only to confirm the the original evidence of the infected files, hitman pro is the only thing that has identified them

#4 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,773 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:08:00 AM

Posted 02 July 2012 - 01:46 PM

  • push the "windows key" + "R" (between the "Ctrl" button and "Alt" Button)
  • please copy and past the following into the box
ComboFix /nombr
  • click ok

copy and paste the report into this topic for me to review

Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#5 tim876

tim876
  • Topic Starter

  • Members
  • 29 posts
  • OFFLINE
  •  
  • Local time:07:00 AM

Posted 02 July 2012 - 02:33 PM

I uninstalled kaspersky, rebooted and checked the process list to see that kss.exe was not running, in case that could be what is hanging up combifix

but a re-run of combifix still hung up at the

'However, scan times for badly infected machines many easily double' line after running 2 hours.

#6 tim876

tim876
  • Topic Starter

  • Members
  • 29 posts
  • OFFLINE
  •  
  • Local time:07:00 AM

Posted 02 July 2012 - 02:52 PM

i did:

•push the "windows key" + "R" (between the "Ctrl" button and "Alt" Button)

•please copy and past the following into the box


ComboFix /nombr


•click ok


but a re-run of combifix still hung up at the

'However, scan times for badly infected machines many easily double' line.

Edited by tim876, 02 July 2012 - 06:41 PM.


#7 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,773 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:08:00 AM

Posted 02 July 2012 - 10:10 PM

Greetings

I want you to run these next,

tdsskiller:

Please read carefully and follow these steps.
  • Download TDSSKiller and save it to your Desktop.
  • doubleclick on TDSSKiller.exe to run the application, then on Start Scan.
  • If an infected file is detected, the default action will be Cure, click on Continue.
  • If a suspicious file is detected, the default action will be Skip, click on Continue.
  • It may ask you to reboot the computer to complete the process. Click on Reboot Now.
  • If no reboot is require, click on Report. A log file should appear. Please copy and paste the contents of that file here.
  • If a reboot is required, the report can also be found in your root directory, (usually C:\ folder) in the form of "TDSSKiller.[Version]_[Date]_[Time]_log.txt". Please copy and paste the contents of that file here.

Please download aswMBR to your desktop.
  • Double click the aswMBR.exe icon to run it
  • it will ask to download extra definitions - ALLOW IT
  • Click the Scan button to start the scan
  • On completion of the scan, click the save log button, save it to your desktop and post it in your next reply.

If you have any problems running either one come back and let me know

please reply with the reports from TDSSKiller and aswMBR

Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#8 tim876

tim876
  • Topic Starter

  • Members
  • 29 posts
  • OFFLINE
  •  
  • Local time:07:00 AM

Posted 03 July 2012 - 12:52 AM

tdss didnt find anything, i selected the report, but when i right click for the 'copy', it shows nothing - no way to copy the report)



aswMBR version 0.9.9.1665 Copyright© 2011 AVAST Software
Run date: 2012-07-02 23:57:48
-----------------------------
23:57:48.958 OS Version: Windows 5.1.2600 Service Pack 3
23:57:48.958 Number of processors: 1 586 0x204
23:57:48.958 ComputerName: U1-C63792EBF3A7 UserName: U1
23:57:51.942 Initialize success
00:06:34.624 AVAST engine defs: 12070202
00:06:44.929 Disk 0 (boot) \Device\Harddisk0\DR0 -> \Device\Ide\IdeDeviceP0T0L0-3
00:06:44.959 Disk 0 Vendor: TOSHIBA_MK6025GAS KA200K Size: 57231MB BusType: 3
00:06:45.009 Disk 0 MBR read successfully
00:06:45.039 Disk 0 MBR scan
00:06:45.179 Disk 0 Windows XP default MBR code
00:06:45.229 Disk 0 Partition 1 80 (A) 07 HPFS/NTFS NTFS 57231 MB offset 63
00:06:45.279 Disk 0 scanning sectors +117210240
00:06:45.389 Disk 0 scanning C:\WINDOWS\system32\drivers
00:07:17.075 Service scanning
00:07:54.449 Modules scanning
00:08:13.416 Disk 0 trace - called modules:
00:08:13.536 ntoskrnl.exe CLASSPNP.SYS disk.sys atapi.sys hal.dll intelide.sys
00:08:13.566 1 nt!IofCallDriver -> \Device\Harddisk0\DR0[0x86f62ab8]
00:08:16.190 3 CLASSPNP.SYS[f7658fd7] -> nt!IofCallDriver -> \Device\Ide\IdeDeviceP0T0L0-3[0x86f43b00]
00:08:17.812 AVAST engine scan C:\WINDOWS
00:08:31.251 AVAST engine scan C:\WINDOWS\system32
00:16:30.711 AVAST engine scan C:\WINDOWS\system32\drivers
00:17:20.402 AVAST engine scan C:\Documents and Settings\U1
00:26:32.256 File: C:\Documents and Settings\U1\Local Settings\Temporary Internet Files\Content.IE5\IAP9AU06\bmjsjqklcvxzbtbmindl[1].exe **INFECTED** Win32:Crypt-NFM [Trj]
00:31:45.556 AVAST engine scan C:\Documents and Settings\All Users
00:32:27.617 Scan finished successfully
00:34:26.428 Disk 0 MBR has been saved successfully to "C:\Documents and Settings\U1\Desktop\MBR.dat"
00:34:26.478 The log file has been saved successfully to "C:\Documents and Settings\U1\Desktop\aswMBR.txt"

#9 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,773 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:08:00 AM

Posted 03 July 2012 - 12:56 AM

SystemLook:

Please download SystemLook from one of the links below and save it to your Desktop.

Download Mirror #1
Download Mirror #2

  • Double-click SystemLook.exe to run it.
  • Copy the content of the following codebox into the main textfield:
:filefind
explorer.exe
svchost.exe
winlogon.exe
  • Click the Look button to start the scan.
  • When finished, a notepad window will open with the results of the scan. Please post this log in your next reply.
Note: The log can also be found on your Desktop entitled SystemLook.txt
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#10 tim876

tim876
  • Topic Starter

  • Members
  • 29 posts
  • OFFLINE
  •  
  • Local time:07:00 AM

Posted 03 July 2012 - 09:00 AM

ystemLook 30.07.11 by jpshortstuff
Log created at 08:53 on 03/07/2012 by U1
Administrator - Elevation successful

========== filefind ==========

Searching for "explorer.exe"
C:\WINDOWS\explorer.exe --a---- 1058304 bytes [12:00 04/08/2004] [00:12 14/04/2008] F91848E81316F1D29E82327F1B942598
C:\WINDOWS\$NtServicePackUninstall$\explorer.exe -----c- 1032192 bytes [01:07 16/10/2011] [12:00 04/08/2004] A0732187050030AE399B241436565E64
C:\WINDOWS\ServicePackFiles\i386\explorer.exe ------- 1033728 bytes [00:12 14/04/2008] [00:12 14/04/2008] 12896823FB95BFB3DC9B46BCAEDC9923

Searching for "svchost.exe"
C:\Program Files\Malwarebytes' Anti-Malware\Chameleon\svchost.exe --a---- 199240 bytes [20:49 08/01/2012] [20:56 04/04/2012] 097D0E812D7A9A3101CE46CB2BE0474D
C:\WINDOWS\$NtServicePackUninstall$\svchost.exe -----c- 14336 bytes [01:07 16/10/2011] [12:00 04/08/2004] 8F078AE4ED187AAABC0A305146DE6716
C:\WINDOWS\ServicePackFiles\i386\svchost.exe ------- 14336 bytes [00:12 14/04/2008] [00:12 14/04/2008] 27C6D03BCDB8CFEB96B716F3D8BE3E18
C:\WINDOWS\system32\svchost.exe --a---- 39424 bytes [12:00 04/08/2004] [00:12 14/04/2008] BECCD01646BE62982D9EBF5B09C20B24

Searching for "winlogon.exe"
C:\Program Files\Malwarebytes' Anti-Malware\Chameleon\winlogon.exe --a---- 199240 bytes [20:49 08/01/2012] [20:56 04/04/2012] 097D0E812D7A9A3101CE46CB2BE0474D
C:\WINDOWS\$NtServicePackUninstall$\winlogon.exe -----c- 502272 bytes [01:07 16/10/2011] [12:00 04/08/2004] 01C3346C241652F43AED8E2149881BFE
C:\WINDOWS\ServicePackFiles\i386\winlogon.exe ------- 507904 bytes [00:12 14/04/2008] [00:12 14/04/2008] ED0EF0A136DEC83DF69F04118870003E
C:\WINDOWS\system32\winlogon.exe --a---- 544768 bytes [12:00 04/08/2004] [00:12 14/04/2008] 80D07F80CA30809E1F274C342D671E0C

-= EOF =-

#11 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,773 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:08:00 AM

Posted 03 July 2012 - 01:14 PM

Greetings

Lets run this now.

Blitzblank.

Download BlitzBlank and save it to your desktop. Open Blitzblank.exe

  • Click OK at the warning (and take note of it, this is a VERY powerful tool!).
  • Click the Script tab and copy/paste the following text there:
CopyFile:
C:\WINDOWS\ServicePackFiles\i386\explorer.exe C:\WINDOWS\explorer.exe
C:\WINDOWS\ServicePackFiles\i386\svchost.exe C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\ServicePackFiles\i386\winlogon.exe C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\ServicePackFiles\i386\explorer.exe C:\WINDOWS\system32\dllcache\explorer.exe
C:\WINDOWS\ServicePackFiles\i386\winlogon.exe C:\WINDOWS\system32\dllcache\winlogon.exe
C:\WINDOWS\ServicePackFiles\i386\svchost.exe C:\WINDOWS\system32\dllcache\svchost.exe
  • Click Execute Now. Your computer will need to reboot in order to replace the files.
  • When done, post me the report created by Blitzblank. you can find it at the root of the drive Normaly C:\

I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#12 tim876

tim876
  • Topic Starter

  • Members
  • 29 posts
  • OFFLINE
  •  
  • Local time:07:00 AM

Posted 03 July 2012 - 02:35 PM

BlitzBlank 1.0.0.32

File/Registry Modification Engine native application
CopyFileOnReboot: sourceFile = "\??\c:\windows\servicepackfiles\i386\explorer.exe", destinationFile = "\??\c:\windows\explorer.exe"CopyFileOnReboot: sourceFile = "\??\c:\windows\servicepackfiles\i386\svchost.exe", destinationFile = "\??\c:\windows\system32\svchost.exe"CopyFileOnReboot: sourceFile = "\??\c:\windows\servicepackfiles\i386\winlogon.exe", destinationFile = "\??\c:\windows\system32\winlogon.exe"CopyFileOnReboot: sourceFile = "\??\c:\windows\servicepackfiles\i386\explorer.exe", destinationFile = "\??\c:\windows\system32\dllcache\explorer.exe"CopyFileOnReboot: sourceFile = "\??\c:\windows\servicepackfiles\i386\winlogon.exe", destinationFile = "\??\c:\windows\system32\dllcache\winlogon.exe"CopyFileOnReboot: sourceFile = "\??\c:\windows\servicepackfiles\i386\svchost.exe", destinationFile = "\??\c:\windows\system32\dllcache\svchost.exe"

I think that did it. I re-ran Hitman pro (i have been running it for detect only, not modify), as that was the tool that verified the trojan in the first place_. it came up clean

tried browsing, as so far no redirects (although it didnt redirect every time before, it would have done it in the number of test i gave it. So all symptoms that prompted me to post this thread are now gone - THANKS! By far the toughest virus/trojan I've ever dealt with

i ran webroot window washer with 7 pass bleach (which i periodically do) because i saw

Files\Content.IE5\IAP9AU06\bmjsjqklcvxzbtbmindl[1].exe **INFECTED** Win32:Crypt-NFM

from the aswMBR log in post 8 of this thread

one concern i had, is that while searching this forum for patched!IK (while waiting in between the last 2 posts in this thread) was a reference to virut and virux which sounds really really nasty (patched!IK referenced in post 9, virut/virux in post 10 of thread link below)

http://www.bleepingcomputer.com/forums/topic247388.html

do you think what we had here is related to that? I assume that because the system filed of svchost.exe, winlogon.exe etc, have been copied over, there's no way to analyse them with virscan mentioned in that thread (post 8). but does it look like Patched!IK is related to virut or separate?

Edited by tim876, 03 July 2012 - 03:42 PM.


#13 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,773 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:08:00 AM

Posted 03 July 2012 - 04:18 PM

Greetings


IF it was virut there would be allot more files infected


I want you to try and run combofix once more please



gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#14 tim876

tim876
  • Topic Starter

  • Members
  • 29 posts
  • OFFLINE
  •  
  • Local time:07:00 AM

Posted 03 July 2012 - 08:00 PM

doublechecked to make sure antivirus and firwall were off, and re-ran combofix

after an hour, still hung at the

'However, scan times for badly infected machines many easily double' line, and didnt touch the machine after running it

no other applications running or open

EDIT: now 2 hours, still hung at same spot

EDIT: now 3 hours, same thing

Edited by tim876, 03 July 2012 - 10:21 PM.


#15 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,773 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:08:00 AM

Posted 04 July 2012 - 11:33 AM

Hello

Run this custom script and when it is complete I need to know how the computer is doing

Run OTL Script

  • Double-click OTL.exe to start the program.
  • Copy and Paste the following code into the Posted Image textbox. Do not include the word Code
    :OTL
    :otl
    FF - user.js - File not found
    FF - HKLM\Software\MozillaPlugins\@Apple.com/iTunes,version=: File not found
    :Files
    ipconfig /flushdns /c
    :Commands
    [PURITY]
    [emptyjava]
    [EMPTYFLASH]
    
  • Then click the Run Fix button at the top.
  • Click Posted Image.
  • OTL may ask to reboot the machine. Please do so if asked.
  • The report should appear in Notepad after the reboot.Copy and Paste that report in your next reply.

Let me know How things are doing

Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users