Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Google Search redirect


  • This topic is locked This topic is locked
23 replies to this topic

#1 kephyr

kephyr

  • Members
  • 59 posts
  • OFFLINE
  •  
  • Local time:01:42 PM

Posted 30 August 2012 - 01:15 PM

Had a problem with search redirects. Posted in Am I Infected? forum and worked through instructions there. Final instructions were to post here.

Here's the DDS log:

.
DDS (Ver_2011-08-26.01) - NTFSx86
Internet Explorer: 8.0.6001.18702 BrowserJavaVersion: 1.6.0_31
Run by David at 11:03:20 on 2012-08-30
Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.3037.2028 [GMT -4:00]
.
AV: Command Anti-Malware *Enabled/Updated* {2565CEEE-6BDB-4A6D-AD6D-F682F2695014}
.
============== Running Processes ===============
.
C:\WINDOWS\system32\svchost -k DcomLaunch
svchost.exe
C:\WINDOWS\System32\svchost.exe -k netsvcs
svchost.exe
svchost.exe
C:\WINDOWS\system32\spoolsv.exe
svchost.exe
C:\Program Files\SafeCentral\Server\AuthPluginServer.exe
C:\Program Files\SafeCentral\Updater\AuthUpdaterService.exe
C:\Program Files\Authentium\CSAM5\avrpts.exe
C:\WINDOWS\system32\svchost.exe -k hpdevmgmt
C:\WINDOWS\system32\svchost.exe -k HPService
C:\Program Files\Java\jre6\bin\jqs.exe
C:\Program Files\Malwarebytes' Anti-Malware\mbamservice.exe
C:\WINDOWS\System32\svchost.exe -k HPZ12
C:\WINDOWS\System32\svchost.exe -k HPZ12
C:\WINDOWS\system32\SHSrv.exe
C:\WINDOWS\system32\svchost.exe -k imgsvc
C:\Program Files\Common Files\Authentium\AntiVirus5\vsedsps.exe
C:\Program Files\SafeCentral\WebAdvisor\WebAdvisor.exe
C:\WINDOWS\system32\SearchIndexer.exe
C:\Program Files\Yahoo!\SoftwareUpdate\YahooAUService.exe
C:\Program Files\Common Files\Authentium\AntiVirus5\vseamps.exe
C:\Program Files\Common Files\Authentium\AntiVirus5\vseqrts.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\SafeCentral\WebAdvisor\WebAdvisorHelper.exe
C:\WINDOWS\RTHDCPL.EXE
C:\WINDOWS\system32\igfxtray.exe
C:\WINDOWS\system32\hkcmd.exe
C:\WINDOWS\system32\igfxpers.exe
C:\PROGRA~1\AUTHEN~1\CSAM5\avtray.exe
C:\WINDOWS\system32\igfxsrvc.exe
C:\Program Files\Common Files\Java\Java Update\jusched.exe
C:\Program Files\SafeCentral\Updater\Updater.exe
C:\Program Files\HP\hpcoretech\hpcmpmgr.exe
C:\Program Files\SafeCentral\SecureDesktop\securedesktop.exe
C:\Program Files\CyberLink\PowerDVD DX\PDVDDXSrv.exe
C:\Program Files\HP\HP Software Update\HPWuSchd2.exe
C:\WINDOWS\vVX3000.exe
C:\Program Files\Malwarebytes' Anti-Malware\mbamgui.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Skype\Phone\Skype.exe
C:\Program Files\Common Files\InstallShield\UpdateService\ISUSPM.exe
C:\PROGRA~1\Yahoo!\Messenger\YahooMessenger.exe
C:\Program Files\Messenger\msmsgs.exe
C:\Program Files\SafeCentral\SecureDesktop\safecentralloader.exe
C:\WINDOWS\system32\SHUIDetectSrv.exe
C:\Program Files\HP\Digital Imaging\bin\hpqtra08.exe
C:\Program Files\Windows Desktop Search\WindowsSearch.exe
C:\Program Files\SafeCentral\Browser\firefox.exe
C:\PROGRA~1\Yahoo!\Messenger\YahooMessenger.exe
C:\Program Files\HP\Digital Imaging\bin\hpqSTE08.exe
C:\Program Files\HP\Digital Imaging\bin\hpqbam08.exe
C:\Program Files\HP\Digital Imaging\bin\hpqgpc01.exe
C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
C:\WINDOWS\system32\SearchProtocolHost.exe
.
============== Pseudo HJT Report ===============
.
mDefault_Page_URL = hxxp://http://www.yahoo.com/?ilc=8.yahoo.com
mStart Page = hxxp://http://www.yahoo.com/?ilc=8.yahoo.com
uURLSearchHooks: YTNavAssistPlugin Class: {81017ea9-9aa8-4a6a-9734-7af40e7d593f} - c:\program files\yahoo!\companion\installs\cpn1\yt.dll
mURLSearchHooks: YTNavAssistPlugin Class: {81017ea9-9aa8-4a6a-9734-7af40e7d593f} - c:\program files\yahoo!\companion\installs\cpn1\yt.dll
BHO: &Yahoo! Toolbar Helper: {02478d38-c3f9-4efb-9b51-7695eca05670} - c:\program files\yahoo!\companion\installs\cpn1\yt.dll
BHO: HP Print Enhancer: {0347c33e-8762-4905-bf09-768834316c61} - c:\program files\hp\digital imaging\smart web printing\hpswp_printenhancer.dll
BHO: Adobe PDF Link Helper: {18df081c-e8ad-4283-a596-fa578c2ebdc3} - c:\program files\common files\adobe\acrobat\activex\AcroIEHelperShim.dll
BHO: Java™ Plug-In SSV Helper: {761497bb-d6f0-462c-b6eb-d4daf1d92d43} - c:\program files\java\jre6\bin\ssv.dll
BHO: Java™ Plug-In 2 SSV Helper: {dbc80044-a445-435b-bc74-9c25c1c588a9} - c:\program files\java\jre6\bin\jp2ssv.dll
BHO: JQSIEStartDetectorImpl Class: {e7e6f031-17ce-4c07-bc86-eabfe594f69c} - c:\program files\java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll
BHO: HP Smart BHO Class: {ffffffff-cf4e-4f2b-bdc2-0e72e116a856} - c:\program files\hp\digital imaging\smart web printing\hpswp_BHO.dll
TB: SafeCentral: {15b523a9-da7a-49cf-93d5-ea6e5be6283d} - c:\program files\safecentral\plugins\iescplugin.dll
TB: Yahoo! Toolbar: {ef99bd32-c1fb-11d2-892f-0090271d4f88} - c:\program files\yahoo!\companion\installs\cpn1\yt.dll
EB: HP Smart Web Printing: {555d4d79-4bd2-4094-a395-cfc534424a05} - c:\program files\hp\digital imaging\smart web printing\hpswp_bho.dll
uRun: [ctfmon.exe] c:\windows\system32\ctfmon.exe
uRun: [Skype] "c:\program files\skype\phone\Skype.exe" /minimized /regrun
uRun: [ISUSPM] "c:\program files\common files\installshield\updateservice\ISUSPM.exe" -scheduler
uRun: [Messenger (Yahoo!)] "c:\progra~1\yahoo!\messenger\YahooMessenger.exe" -quiet
uRun: [MSMSGS] "c:\program files\messenger\msmsgs.exe" /background
mRun: [RTHDCPL] RTHDCPL.EXE
mRun: [Alcmtr] ALCMTR.EXE
mRun: [IgfxTray] c:\windows\system32\igfxtray.exe
mRun: [HotKeysCmds] c:\windows\system32\hkcmd.exe
mRun: [Persistence] c:\windows\system32\igfxpers.exe
mRun: [CSAM5 tray] c:\progra~1\authen~1\csam5\avtray.exe
mRun: [Adobe ARM] "c:\program files\common files\adobe\arm\1.0\AdobeARM.exe"
mRun: [SunJavaUpdateSched] "c:\program files\common files\java\java update\jusched.exe"
mRun: [SafeCentralUpdater] c:\program files\safecentral\updater\Updater.exe
mRun: [deskband_mgr.exe] c:\program files\safecentral\securedesktop\deskband_mgr.exe
mRun: [HP Component Manager] "c:\program files\hp\hpcoretech\hpcmpmgr.exe"
mRun: [DXDllRegExe] c:\windows\system32\dxdllreg.exe
mRun: [PDVDDXSrv] "c:\program files\cyberlink\powerdvd dx\PDVDDXSrv.exe"
mRun: [HP Software Update] c:\program files\hp\hp software update\HPWuSchd2.exe
mRun: [<NO NAME>]
mRun: [VX3000] c:\windows\vVX3000.exe
mRun: [Malwarebytes' Anti-Malware] "c:\program files\malwarebytes' anti-malware\mbamgui.exe" /starttray
dRunOnce: [FlashPlayerUpdate] c:\windows\system32\macromed\flash\FlashUtil32_11_3_300_271_ActiveX.exe -update activex
StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\hpdigi~1.lnk - c:\program files\hp\digital imaging\bin\hpqtra08.exe
StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\window~1.lnk - c:\program files\windows desktop search\WindowsSearch.exe
IE: E&xport to Microsoft Excel - c:\progra~1\micros~2\office12\EXCEL.EXE/3000
IE: {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe
IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe
IE: {2670000A-7350-4f3c-8081-5663EE0C6C49} - {48E73304-E1D6-4330-914C-F5F514E3486C} - c:\progra~1\micros~2\office12\ONBttnIE.dll
IE: {92780B25-18CC-41C8-B9BE-3C9C571A8263} - {FF059E31-CC5A-4E2E-BF3B-96E929D65503} - c:\progra~1\micros~2\office12\REFIEBAR.DLL
IE: {DDE87865-83C5-48c4-8357-2F5B1AA84522} - {DDE87865-83C5-48c4-8357-2F5B1AA84522} - c:\program files\hp\digital imaging\smart web printing\hpswp_BHO.dll
LSP: mswsock.dll
DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} - hxxp://windowsupdate.microsoft.com/windowsupdate/v6/V5Controls/en/x86/client/wuweb_site.cab?1333627265546
DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_31-windows-i586.cab
DPF: {CAFEEFAC-0016-0000-0031-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_31-windows-i586.cab
DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_31-windows-i586.cab
TCP: DhcpNameServer = 10.1.10.1
TCP: Interfaces\{237D27ED-A667-4DF2-A1C7-CC9374CE620C} : DhcpNameServer = 10.1.10.1
Handler: cetihpz - {CF184AD3-CDCB-4168-A3F7-8E447D129300} - c:\program files\hp\hpcoretech\comp\hpuiprot.dll
Handler: skype4com - {FFC8B962-9B40-4DFF-9458-1830C7DD7F5D} - c:\progra~1\common~1\skype\SKYPE4~1.DLL
Notify: cadmon - c:\program files\safecentral\securedesktop\cadmon.dll
Notify: igfxcui - igfxdev.dll
SSODL: WPDShServiceObj - {AAA288BA-9A4C-45B0-95D7-94D524869DB5} - c:\windows\system32\WPDShServiceObj.dll
SEH: Windows Desktop Search Namespace Manager: {56f9679e-7826-4c84-81f3-532071a8bcc5} - c:\program files\windows desktop search\MSNLNamespaceMgr.dll
.
================= FIREFOX ===================
.
FF - ProfilePath - c:\documents and settings\david\application data\mozilla\firefox\profiles\31cqujs6.default\
FF - prefs.js: browser.search.defaulturl - hxxp://search.yahoo.com/search?fr=mkg030&p=
FF - prefs.js: browser.search.selectedEngine - Google
FF - prefs.js: browser.startup.homepage - hxxp://www.msn.com/
FF - prefs.js: keyword.URL - hxxp://search.yahoo.com/search?fr=mkg030&p=
FF - component: c:\program files\safecentral\browser\extensions\downloadui@safecentral.com\components\FFSCdownload.dll
FF - component: c:\program files\safecentral\browser\extensions\sa_rrr_plugin@authentium.com\components\WebAdvisorFF.dll
FF - component: c:\program files\safecentral\browser\extensions\scextension@authentium.com\components\FavoritesSB.dll
FF - component: c:\program files\safecentral\browser\extensions\scx@authentium.com\components\Scx.dll
FF - plugin: c:\program files\adobe\reader 10.0\reader\air\nppdf32.dll
FF - plugin: c:\program files\java\jre6\bin\npdeployJava1.dll
FF - plugin: c:\program files\java\jre6\bin\plugin2\npdeployJava1.dll
FF - plugin: c:\program files\java\jre6\bin\plugin2\npjp2.dll
FF - plugin: c:\windows\system32\macromed\flash\NPSWF32_11_3_300_271.dll
.
============= SERVICES / DRIVERS ===============
.
R0 Apix;Apix;c:\windows\system32\drivers\Apix.sys [2010-11-19 41872]
R1 A2DDA;A2 Direct Disk Access Support Driver;c:\nhcs downloads\emsisoft\emsisoftemergencykit\run\a2ddax86.sys [2012-7-12 17904]
R1 SHDrv;SHDrv;c:\windows\system32\drivers\shdrv.sys [2010-11-19 148880]
R2 AMP;AMP;c:\windows\system32\drivers\amp.sys [2012-3-6 137536]
R2 AMPSE;AMPSE;c:\windows\system32\drivers\ampse.sys [2012-3-6 1197888]
R2 AuthPluginServer;AuthPluginServer;c:\program files\safecentral\server\AuthPluginServer.exe [2011-5-20 931664]
R2 AuthUpdaterService;AuthUpdaterService;c:\program files\safecentral\updater\AuthUpdaterService.exe [2011-5-20 2807632]
R2 avrpts;CSAM5 Reporting Service;c:\program files\authentium\csam5\avrpts.exe [2012-3-15 166720]
R2 MBAMService;MBAMService;c:\program files\malwarebytes' anti-malware\mbamservice.exe [2012-8-21 655944]
R2 SHSrv;SHSrv;c:\windows\system32\SHSrv.exe [2010-11-19 92048]
R2 vseamps;vseamps;c:\program files\common files\authentium\antivirus5\vseamps.exe [2012-3-6 97088]
R2 vsedsps;vsedsps;c:\program files\common files\authentium\antivirus5\vsedsps.exe [2012-3-6 97088]
R2 vseqrts;vseqrts;c:\program files\common files\authentium\antivirus5\vseqrts.exe [2012-3-6 142144]
R2 WebAdvisor;WebAdvisor;c:\program files\safecentral\webadvisor\WebAdvisor.exe [2011-5-20 2369360]
R3 IntcHdmiAddService;Intel® High Definition Audio HDMI Service;c:\windows\system32\drivers\IntcHdmi.sys [2012-4-5 110080]
R3 MBAMProtector;MBAMProtector;c:\windows\system32\drivers\mbam.sys [2012-8-21 22344]
S0 cerc6;cerc6; [x]
S2 SkypeUpdate;Skype Updater;c:\program files\skype\updater\Updater.exe [2012-7-3 160944]
S3 AdobeFlashPlayerUpdateSvc;Adobe Flash Player Update Service;c:\windows\system32\macromed\flash\FlashPlayerUpdateService.exe [2012-4-5 250056]
S3 MozillaMaintenance;Mozilla Maintenance Service;c:\program files\mozilla maintenance service\maintenanceservice.exe [2012-5-4 113120]
S3 WinRM;Windows Remote Management (WS-Management);c:\windows\system32\svchost.exe -k WINRM [2008-4-13 39424]
.
=============== Created Last 30 ================
.
2012-08-30 07:53:03 912 ----a-w- c:\documents and settings\all users\application data\gvapaaa.tmp
2012-08-29 21:58:05 874 ----a-w- c:\documents and settings\all users\application data\chwoaaa.tmp
2012-08-29 17:24:40 -------- d-----w- c:\program files\ESET
2012-08-21 20:35:58 22344 ----a-w- c:\windows\system32\drivers\mbam.sys
2012-08-21 20:35:58 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
2012-08-21 19:45:01 910 ----a-w- c:\documents and settings\all users\application data\iwfnaaa.tmp
2012-08-21 19:38:53 -------- d-----w- c:\documents and settings\david\application data\Malwarebytes
2012-08-21 19:38:49 -------- d-----w- c:\documents and settings\all users\application data\Malwarebytes
2012-08-20 14:28:09 917 ----a-w- c:\documents and settings\all users\application data\muxoaaa.tmp
.
==================== Find3M ====================
.
2012-08-30 12:59:24 544768 ----a-w- c:\windows\system32\winlogon.exe
2012-08-30 12:59:24 39424 ----a-w- c:\windows\system32\svchost.exe
2012-08-30 12:59:24 1058304 ----a-w- c:\windows\explorer.exe
2012-08-15 20:32:33 70344 ----a-w- c:\windows\system32\FlashPlayerCPLApp.cpl
2012-08-15 20:32:33 426184 ----a-w- c:\windows\system32\FlashPlayerApp.exe
2012-07-06 13:58:51 78336 ----a-w- c:\windows\system32\browser.dll
2012-07-04 14:05:18 139784 ----a-w- c:\windows\system32\drivers\rdpwd.sys
2012-07-03 13:40:15 1866112 ----a-w- c:\windows\system32\win32k.sys
2012-07-02 17:49:33 916992 ----a-w- c:\windows\system32\wininet.dll
2012-07-02 17:49:32 43520 ------w- c:\windows\system32\licmgr10.dll
2012-07-02 17:49:32 1469440 ------w- c:\windows\system32\inetcpl.cpl
2012-07-02 12:05:43 385024 ------w- c:\windows\system32\html.iec
2012-06-07 00:59:42 1070152 ----a-w- c:\windows\system32\MSCOMCTL.OCX
2012-06-05 15:50:25 1372672 ----a-w- c:\windows\system32\msxml6.dll
2012-06-05 15:50:25 1172480 ----a-w- c:\windows\system32\msxml3.dll
2012-06-04 04:32:08 152576 ----a-w- c:\windows\system32\schannel.dll
2012-06-02 19:19:44 22040 ----a-w- c:\windows\system32\wucltui.dll.mui
2012-06-02 19:19:38 219160 ----a-w- c:\windows\system32\wuaucpl.cpl
2012-06-02 19:19:38 15384 ----a-w- c:\windows\system32\wuaucpl.cpl.mui
2012-06-02 19:19:34 15384 ----a-w- c:\windows\system32\wuapi.dll.mui
2012-06-02 19:19:30 17944 ----a-w- c:\windows\system32\wuaueng.dll.mui
2012-06-02 19:18:58 275696 ----a-w- c:\windows\system32\mucltui.dll
2012-06-02 19:18:58 214256 ----a-w- c:\windows\system32\muweb.dll
2012-06-02 19:18:58 17136 ----a-w- c:\windows\system32\mucltui.dll.mui
.
============= FINISH: 11:03:48.95 ===============


Heres the GMER log:

GMER 1.0.15.15641 - http://www.gmer.net
Rootkit scan 2012-08-30 14:06:26
Windows 5.1.2600 Service Pack 3 Harddisk0\DR0 -> \Device\Ide\IAAStorageDevice-1 ST325031 rev.CC44
Running: g5szr1mp.exe; Driver: C:\DOCUME~1\David\LOCALS~1\Temp\ugrcraoc.sys


---- System - GMER 1.0.15 ----

INT 0xFF apix.sys (Apix/SafeCentral, Inc) BA10D050

---- Kernel code sections - GMER 1.0.15 ----

PAGE ntkrnlpa.exe!IoDeleteSymbolicLink 80573F30 1 Byte [CD]
PAGE ntkrnlpa.exe!IoDeleteSymbolicLink 80573F30 8 Bytes [CD, FF, 68, 30, 3F, 57, 80, ...] {INT 0xff; PUSH 0x80573f30; NOP }
PAGE ntkrnlpa.exe!IoCreateFile 8057693A 1 Byte [CD]
PAGE ntkrnlpa.exe!IoCreateFile 8057693A 8 Bytes [CD, FF, 68, 3A, 69, 57, 80, ...] {INT 0xff; PUSH 0x8057693a; NOP }
PAGE ntkrnlpa.exe!NtFsControlFile 8057929C 1 Byte [CD]
PAGE ntkrnlpa.exe!NtFsControlFile 8057929C 7 Bytes [CD, FF, 68, 9C, 92, 57, 80] {INT 0xff; PUSH 0x8057929c}
PAGE ntkrnlpa.exe!ZwUnloadDriver 80584306 1 Byte [CD]
PAGE ntkrnlpa.exe!ZwUnloadDriver 80584306 7 Bytes [CD, FF, 68, 06, 43, 58, 80] {INT 0xff; PUSH 0x80584306}
PAGE ntkrnlpa.exe!NtClose 805BC538 1 Byte [CD]
PAGE ntkrnlpa.exe!NtClose 805BC538 11 Bytes [CD, FF, 68, 38, C5, 5B, 80, ...] {INT 0xff; PUSH 0x805bc538; NOP ; NOP ; NOP ; NOP }
PAGE ntkrnlpa.exe!NtDuplicateObject 805BE010 2 Bytes [CD, FF] {INT 0xff}
PAGE ntkrnlpa.exe!NtDuplicateObject + 3 805BE013 3 Bytes [10, E0, 5B] {ADC AL, AH; POP EBX}
PAGE ntkrnlpa.exe!NtOpenProcess 805CB456 10 Bytes [CD, FF, 68, 56, B4, 5C, 80, ...] {INT 0xff; PUSH 0x805cb456; NOP ; NOP ; NOP }
PAGE ntkrnlpa.exe!ZwCreateThread 805D1038 2 Bytes [CD, FF] {INT 0xff}
PAGE ntkrnlpa.exe!ZwCreateThread + 3 805D103B 3 Bytes [38, 10, 5D] {CMP [EAX], DL; POP EBP}
PAGE ntkrnlpa.exe!ZwCreateProcessEx 805D119A 2 Bytes [CD, FF] {INT 0xff}
PAGE ntkrnlpa.exe!ZwCreateProcessEx + 3 805D119D 3 Bytes [9A, 11, 5D]
PAGE ntkrnlpa.exe!ZwCreateProcess 805D1250 1 Byte [CD]
PAGE ntkrnlpa.exe!ZwCreateProcess 805D1250 7 Bytes [CD, FF, 68, 50, 12, 5D, 80] {INT 0xff; PUSH 0x805d1250}
PAGE ntkrnlpa.exe!ZwTerminateProcess 805D22D8 1 Byte [CD]
PAGE ntkrnlpa.exe!ZwTerminateProcess 805D22D8 8 Bytes [CD, FF, 68, D8, 22, 5D, 80, ...] {INT 0xff; PUSH 0x805d22d8; NOP }
PAGE ntkrnlpa.exe!ZwTerminateThread 805D24D2 1 Byte [CD]
PAGE ntkrnlpa.exe!ZwTerminateThread 805D24D2 7 Bytes [CD, FF, 68, D2, 24, 5D, 80] {INT 0xff; PUSH 0x805d24d2}
PAGE ntkrnlpa.exe!ZwResumeThread 805D4A18 2 Bytes [CD, FF] {INT 0xff}
PAGE ntkrnlpa.exe!ZwResumeThread + 4 805D4A1C 2 Bytes [4A, 5D] {DEC EDX; POP EBP}
PAGE ntkrnlpa.exe!ZwAccessCheckAndAuditAlarm 805F4B16 1 Byte [CD]
PAGE ntkrnlpa.exe!ZwAccessCheckAndAuditAlarm 805F4B16 7 Bytes [CD, FF, 68, 16, 4B, 5F, 80] {INT 0xff; PUSH 0x805f4b16}
PAGE ntkrnlpa.exe!ZwQueryValueKey 806221FA 2 Bytes [CD, FF] {INT 0xff}
PAGE ntkrnlpa.exe!ZwQueryValueKey + 3 806221FD 3 Bytes [FA, 21, 62]
PAGE ntkrnlpa.exe!ZwSetValueKey 80622548 2 Bytes [CD, FF] {INT 0xff}
PAGE ntkrnlpa.exe!ZwSetValueKey + 3 8062254B 3 Bytes [48, 25, 62]
PAGE ntkrnlpa.exe!ZwCreateKey 80623FD6 10 Bytes [CD, FF, 68, D6, 3F, 62, 80, ...] {INT 0xff; PUSH 0x80623fd6; NOP ; NOP ; NOP }
PAGE ntkrnlpa.exe!ZwDeleteKey 80624472 2 Bytes [CD, FF] {INT 0xff}
PAGE ntkrnlpa.exe!ZwDeleteKey + 3 80624475 3 Bytes [72, 44, 62]
PAGE ntkrnlpa.exe!ZwDeleteValueKey 80624642 2 Bytes [CD, FF] {INT 0xff}
PAGE ntkrnlpa.exe!ZwDeleteValueKey + 3 80624645 3 Bytes [42, 46, 62]
PAGE ntkrnlpa.exe!ZwOpenKey 806253B4 10 Bytes [CD, FF, 68, B4, 53, 62, 80, ...] {INT 0xff; PUSH 0x806253b4; NOP ; NOP ; NOP }
.text win32k.sys!EngAcquireSemaphore + 20EE BF8082F2 1 Byte [CD]
.text win32k.sys!EngAcquireSemaphore + 20EE BF8082F2 11 Bytes [CD, FF, 68, F2, 82, 80, BF, ...] {INT 0xff; PUSH 0xbf8082f2; NOP ; NOP ; NOP ; NOP }
.text win32k.sys!EngFreeUserMem + 674 BF80991D 1 Byte [CD]
.text win32k.sys!EngFreeUserMem + 674 BF80991D 8 Bytes [CD, FF, 68, 1D, 99, 80, BF, ...] {INT 0xff; PUSH 0xbf80991d; NOP }
.text win32k.sys!EngFreeUserMem + 5BD5 BF80EE7E 1 Byte [CD]
.text win32k.sys!EngFreeUserMem + 5BD5 BF80EE7E 8 Bytes [CD, FF, 68, 7E, EE, 80, BF, ...] {INT 0xff; PUSH 0xbf80ee7e; NOP }
.text win32k.sys!XLATEOBJ_iXlate + 2EDB BF85DC4E 1 Byte [CD]
.text win32k.sys!XLATEOBJ_iXlate + 2EDB BF85DC4E 8 Bytes [CD, FF, 68, 4E, DC, 85, BF, ...] {INT 0xff; PUSH 0xbf85dc4e; NOP }
.text win32k.sys!XLATEOBJ_iXlate + 3581 BF85E2F4 1 Byte [CD]
.text win32k.sys!XLATEOBJ_iXlate + 3581 BF85E2F4 7 Bytes [CD, FF, 68, F4, E2, 85, BF] {INT 0xff; PUSH 0xbf85e2f4}
.text win32k.sys!EngCreatePalette + 88 BF85F5F0 1 Byte [CD]
.text win32k.sys!EngCreatePalette + 88 BF85F5F0 11 Bytes [CD, FF, 68, F0, F5, 85, BF, ...] {INT 0xff; PUSH 0xbf85f5f0; NOP ; NOP ; NOP ; NOP }
.text win32k.sys!EngGetCurrentCodePage + 35FB BF8731B9 1 Byte [CD]
.text win32k.sys!EngGetCurrentCodePage + 35FB BF8731B9 7 Bytes [CD, FF, 68, B9, 31, 87, BF] {INT 0xff; PUSH 0xbf8731b9}
.text win32k.sys!EngGetCurrentCodePage + 4138 BF873CF6 1 Byte [CD]
.text win32k.sys!EngGetCurrentCodePage + 4138 BF873CF6 8 Bytes [CD, FF, 68, F6, 3C, 87, BF, ...] {INT 0xff; PUSH 0xbf873cf6; NOP }
.text win32k.sys!EngGradientFill + 26EE BF89439B 1 Byte [CD]
.text win32k.sys!EngGradientFill + 26EE BF89439B 11 Bytes [CD, FF, 68, 9B, 43, 89, BF, ...] {INT 0xff; PUSH 0xbf89439b; NOP ; NOP ; NOP ; NOP }
.text win32k.sys!EngFillPath + 1797 BF8CA411 2 Bytes [CD, FF] {INT 0xff}
.text win32k.sys!EngFillPath + 179A BF8CA414 3 Bytes [11, A4, 8C]
.text win32k.sys!PATHOBJ_vGetBounds + 418C BF8CF6C6 2 Bytes [CD, FF] {INT 0xff}
.text win32k.sys!PATHOBJ_vGetBounds + 418F BF8CF6C9 3 Bytes [C6, F6, 8C]
? C:\DOCUME~1\David\LOCALS~1\Temp\mbr.sys The system cannot find the file specified. !

---- User code sections - GMER 1.0.15 ----

.text C:\WINDOWS\system32\SearchIndexer.exe[276] kernel32.dll!WriteFile 7C810E27 7 Bytes JMP 00585C0C C:\WINDOWS\system32\MSSRCH.DLL (mssrch.dll/Microsoft Corporation)
.text C:\WINDOWS\system32\svchost.exe[1048] kernel32.dll!CreateProcessInternalW 7C8197B0 5 Bytes JMP 0063483D
.text C:\Program Files\SafeCentral\Browser\firefox.exe[2528] ntdll.dll!LdrLoadDll 7C91632D 5 Bytes JMP 004013F0 C:\Program Files\SafeCentral\Browser\firefox.exe (Firefox/Mozilla Corporation)
.text C:\Program Files\SafeCentral\Browser\firefox.exe[2528] kernel32.dll!CreateProcessW 7C802336 5 Bytes JMP 1015D1DC C:\Program Files\SafeCentral\SecureDesktop\extra\hookFF.dll (The component of the SafeCentral Element/SafeCentral, Inc)
.text C:\Program Files\SafeCentral\Browser\firefox.exe[2528] WS2_32.dll!getaddrinfo 71AB2A6F 5 Bytes JMP 1015D2A4 C:\Program Files\SafeCentral\SecureDesktop\extra\hookFF.dll (The component of the SafeCentral Element/SafeCentral, Inc)
.text C:\Program Files\SafeCentral\Browser\firefox.exe[2528] WS2_32.dll!FreeAddrInfoW 71AB2B0B 5 Bytes JMP 1015D27C C:\Program Files\SafeCentral\SecureDesktop\extra\hookFF.dll (The component of the SafeCentral Element/SafeCentral, Inc)
.text C:\Program Files\SafeCentral\Browser\firefox.exe[2528] WS2_32.dll!gethostbyname 71AB5355 5 Bytes JMP 1015D2CC C:\Program Files\SafeCentral\SecureDesktop\extra\hookFF.dll (The component of the SafeCentral Element/SafeCentral, Inc)
.text C:\Program Files\SafeCentral\Browser\firefox.exe[2528] USER32.dll!DispatchMessageW 7E418A01 5 Bytes JMP 1015D254 C:\Program Files\SafeCentral\SecureDesktop\extra\hookFF.dll (The component of the SafeCentral Element/SafeCentral, Inc)
.text C:\Program Files\SafeCentral\Browser\firefox.exe[2528] USER32.dll!CreateWindowExW 7E42D0A3 5 Bytes JMP 1015D204 C:\Program Files\SafeCentral\SecureDesktop\extra\hookFF.dll (The component of the SafeCentral Element/SafeCentral, Inc)
.text C:\Program Files\SafeCentral\Browser\firefox.exe[2528] USER32.dll!CreateWindowExA 7E42E4A9 5 Bytes JMP 1015D22C C:\Program Files\SafeCentral\SecureDesktop\extra\hookFF.dll (The component of the SafeCentral Element/SafeCentral, Inc)
.text C:\WINDOWS\Explorer.EXE[2896] kernel32.dll!CreateProcessInternalW 7C8197B0 5 Bytes JMP 00B4483D
.text C:\Program Files\SafeCentral\SecureDesktop\safecentralloader.exe[3712] kernel32.dll!CreateProcessW 7C802336 5 Bytes JMP 10142F64 C:\Program Files\SafeCentral\SecureDesktop\hook.dll (The component of the SafeCentral Element/SafeCentral, Inc)
.text C:\Program Files\SafeCentral\SecureDesktop\safecentralloader.exe[3712] USER32.dll!DispatchMessageW 7E418A01 5 Bytes JMP 10142FDC C:\Program Files\SafeCentral\SecureDesktop\hook.dll (The component of the SafeCentral Element/SafeCentral, Inc)
.text C:\Program Files\SafeCentral\SecureDesktop\safecentralloader.exe[3712] USER32.dll!CreateWindowExW 7E42D0A3 5 Bytes JMP 10142F8C C:\Program Files\SafeCentral\SecureDesktop\hook.dll (The component of the SafeCentral Element/SafeCentral, Inc)
.text C:\Program Files\SafeCentral\SecureDesktop\safecentralloader.exe[3712] USER32.dll!CreateWindowExA 7E42E4A9 5 Bytes JMP 10142FB4 C:\Program Files\SafeCentral\SecureDesktop\hook.dll (The component of the SafeCentral Element/SafeCentral, Inc)
.text C:\Program Files\SafeCentral\SecureDesktop\safecentralloader.exe[3712] SHELL32.dll!Shell_NotifyIcon 7CA28C76 5 Bytes JMP 10142F3C C:\Program Files\SafeCentral\SecureDesktop\hook.dll (The component of the SafeCentral Element/SafeCentral, Inc)
.text C:\Program Files\SafeCentral\SecureDesktop\safecentralloader.exe[3712] SHELL32.dll!Shell_NotifyIconW 7CA2A5DF 5 Bytes JMP 10142F14 C:\Program Files\SafeCentral\SecureDesktop\hook.dll (The component of the SafeCentral Element/SafeCentral, Inc)
.text C:\Program Files\SafeCentral\SecureDesktop\safecentralloader.exe[3712] WS2_32.dll!getaddrinfo 71AB2A6F 5 Bytes JMP 1014302C C:\Program Files\SafeCentral\SecureDesktop\hook.dll (The component of the SafeCentral Element/SafeCentral, Inc)
.text C:\Program Files\SafeCentral\SecureDesktop\safecentralloader.exe[3712] WS2_32.dll!FreeAddrInfoW 71AB2B0B 5 Bytes JMP 10143004 C:\Program Files\SafeCentral\SecureDesktop\hook.dll (The component of the SafeCentral Element/SafeCentral, Inc)
.text C:\Program Files\SafeCentral\SecureDesktop\safecentralloader.exe[3712] WS2_32.dll!gethostbyname 71AB5355 5 Bytes JMP 10143054 C:\Program Files\SafeCentral\SecureDesktop\hook.dll (The component of the SafeCentral Element/SafeCentral, Inc)

---- Devices - GMER 1.0.15 ----

Device \FileSystem\Cdfs \Cdfs DLAIFS_M.SYS (Drive Letter Access Component/Roxio)

---- Files - GMER 1.0.15 ----

File C:\WINDOWS\system32\config\systemprofile\Cookies\KASSHNC2.txt 116 bytes
File C:\WINDOWS\system32\config\systemprofile\Cookies\SLE9STY4.txt 1446 bytes
File C:\WINDOWS\system32\config\systemprofile\Cookies\YJVWQWF7.txt 94 bytes
File C:\WINDOWS\system32\config\systemprofile\Cookies\9OEPHEAY.txt 701 bytes
File C:\WINDOWS\system32\config\systemprofile\Cookies\RRT0GI7D.txt 2065 bytes
File C:\WINDOWS\system32\config\systemprofile\Cookies\S3JX7IZZ.txt 0 bytes
File C:\WINDOWS\system32\config\systemprofile\Cookies\66RJLGTS.txt 1920 bytes
File C:\WINDOWS\system32\config\systemprofile\Cookies\RGCL9XN0.txt 736 bytes
File C:\WINDOWS\system32\config\systemprofile\Cookies\BVYUTPAC.txt 1760 bytes
File C:\WINDOWS\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\00YFOOSH\8d521c8172f0b5ee300e54a8b6ed837b[1].swf 23085 bytes
File C:\WINDOWS\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\00YFOOSH\ads[2].js 10917 bytes
File C:\WINDOWS\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\ACIRBED0\dvtp_src[1].js 9038 bytes
File C:\WINDOWS\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\ACIRBED0\517388346_10_148_111[1].jpg 4665 bytes
File C:\WINDOWS\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\ACIRBED0\517391482_16_148_111[1].jpg 4019 bytes
File C:\WINDOWS\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\ACIRBED0\27252-2[1].js 2582 bytes
File C:\WINDOWS\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\ACIRBED0\youtubevideodownload_com[3].htm 21538 bytes
File C:\WINDOWS\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\MEFX9SOH\protect[1].js 0 bytes
File C:\WINDOWS\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\MEFX9SOH\411answers_com[1].txt 0 bytes

---- EOF - GMER 1.0.15 ----

Thanks for your help
Attached File  attach.txt   12.89KB   1 downloads

BC AdBot (Login to Remove)

 


#2 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:02:42 PM

Posted 30 August 2012 - 10:01 PM

Greetings and Welcome to The Forums!!

My name is Gringo and I'll be glad to help you with your computer problems.

I have put together somethings for you to keep in mind while I am helping you to make things go easier and faster for both of us

  • Please do not run any tools unless instructed to do so.
    • We ask you to run different tools in a specific order to ensure the malware is completely removed from your machine, and running any additional tools may detect false positives, interfere with our tools, or cause unforeseen damage or system instability.
  • Please do not attach logs or use code boxes, just copy and paste the text.
    • Due to the high volume of logs we receive it helps to receive everything in the same format, and code boxes make the logs very difficult to read. Also, attachments require us to download and open the reports when it is easier to just read the reports in your post.
  • Please read every post completely before doing anything.
    • Pay special attention to the NOTE: lines, these entries identify an individual issue or important step in the cleanup process.
  • Please provide feedback about your experience as we go.
    • A short statement describing how the computer is working helps us understand where to go next, for example: I am still getting redirected, the computer is running normally, etc. Please do not describe the computer as "the same", this requires the extra step of looking back at your previous post.
NOTE: At the top of your post, click on the Watch Topic Button, select Immediate Notification, and click on Proceed. This will send you an e-mail as soon as I reply to your topic, allowing us to resolve the issue faster.

NOTE: Backup any files that cannot be replaced. Removing malware can be unpredictable and this step can save a lot of hartaches if things don't go as planed. You can put them on a CD/DVD, external drive or a pen drive, anywhere except on the computer.

NOTE: It is good practice to copy and paste the instructions into notepad and print them in case it is necessary for you to go offline during the cleanup process. To open notepad, navigate to Start Menu > All Programs > Accessories > Notepad. Please remember to copy the entire post so you do not miss any instructions.

Security Check

  • Download Security Check by screen317 from here.
  • Save it to your Desktop.
  • Double click SecurityCheck.exe and follow the onscreen instructions inside of the black box.
  • A Notepad document should open automatically called checkup.txt; please post the contents of that document.



Run Combofix:

You may be asked to install or update the Recovery Console (Win XP Only) if this happens please allow it to do so (you will need to be connected to the internet for this)

Before you run Combofix I will need you to turn off any security software you have running, If you do not know how to do this you can find out >here< or >here<

Combofix may need to reboot your computer more than once to do its job this is normal.

You can download Combofix from one of these links.
Link 1
Link 2
Link 3
1. Close any open browsers or any other programs that are open.
2. Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.

Double click on combofix.exe & follow the prompts.
When finished, it will produce a report for you.

Note 1: Do not mouseclick combofix's window while it's running. That may cause it to stall

Note 2: If you recieve an error "Illegal operation attempted on a registery key that has been marked for deletion." Please restart the computer

"information and logs"

  • In your next post I need the following
  • Log from Combofix
  • let me know of any problems you may have had
  • How is the computer doing now?

Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#3 kephyr

kephyr
  • Topic Starter

  • Members
  • 59 posts
  • OFFLINE
  •  
  • Local time:01:42 PM

Posted 31 August 2012 - 12:04 PM

I ran both programs. I'm still getting re-directed when I do a search and Malwarebyte is still reporting that it blocked an outgoing access attempt.

here are the logs:

Checkup:

Results of screen317's Security Check version 0.99.49
Windows XP Service Pack 3 x86
Internet Explorer 8
``````````````Antivirus/Firewall Check:``````````````
Windows Firewall Enabled!
Command Anti-Malware
Antivirus up to date! (On Access scanning disabled!)
`````````Anti-malware/Other Utilities Check:`````````
Malwarebytes Anti-Malware version 1.62.0.1300
CCleaner
Java™ 6 Update 31
Java version out of Date!
Adobe Flash Player 11.3.300.271
Adobe Reader X (10.1.4)
Mozilla Firefox (14.0.1)
````````Process Check: objlist.exe by Laurent````````
Malwarebytes Anti-Malware mbamservice.exe
Common Files Authentium AntiVirus5 vsedsps.exe
Common Files Authentium AntiVirus5 vseamps.exe
Common Files Authentium AntiVirus5 vseqrts.exe
`````````````````System Health check`````````````````
Total Fragmentation on Drive C:: 7%
````````````````````End of Log``````````````````````



ComboFix:

ComboFix 12-08-30.05 - David 08/31/2012 12:42:03.1.2 - x86
Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.3037.2060 [GMT -4:00]
Running from: c:\documents and settings\David\Desktop\ComboFix.exe
AV: Command Anti-Malware *Disabled/Updated* {2565CEEE-6BDB-4A6D-AD6D-F682F2695014}
.
.
((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.
.
C:\data
c:\data\default\us_sres.data
c:\documents and settings\All Users\Application Data\chwoaaa.tmp
c:\documents and settings\All Users\Application Data\go_0molg.pad
c:\documents and settings\All Users\Application Data\gvapaaa.tmp
c:\documents and settings\All Users\Application Data\iwfnaaa.tmp
c:\documents and settings\All Users\Application Data\muxoaaa.tmp
c:\documents and settings\All Users\Application Data\uwgpaaa.tmp
c:\documents and settings\All Users\Application Data\zak_lo0i7g.pad
c:\documents and settings\David\Desktop\svchost.exe
c:\windows\expl.dat
c:\windows\system32\dllc.dat
c:\windows\system32\svch.dat
c:\windows\system32\URTTemp
c:\windows\system32\URTTemp\fusion.dll
c:\windows\system32\URTTemp\mscoree.dll
c:\windows\system32\URTTemp\mscoree.dll.local
c:\windows\system32\URTTemp\mscorsn.dll
c:\windows\system32\URTTemp\mscorwks.dll
c:\windows\system32\URTTemp\msvcr71.dll
c:\windows\system32\URTTemp\regtlib.exe
c:\windows\system32\winl.dat
.
c:\windows\system32\winlogon.exe . . . is infected!!
.
c:\windows\system32\svchost.exe . . . is infected!!
.
c:\windows\explorer.exe . . . is infected!!
.
.
((((((((((((((((((((((((( Files Created from 2012-07-28 to 2012-08-31 )))))))))))))))))))))))))))))))
.
.
2012-08-29 17:24 . 2012-08-29 17:24 -------- d-----w- c:\program files\ESET
2012-08-21 20:35 . 2012-08-21 20:43 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
2012-08-21 20:35 . 2012-07-03 17:46 22344 ----a-w- c:\windows\system32\drivers\mbam.sys
2012-08-21 19:38 . 2012-08-21 19:38 -------- d-----w- c:\documents and settings\David\Application Data\Malwarebytes
2012-08-21 19:38 . 2012-08-21 19:38 -------- d-----w- c:\documents and settings\All Users\Application Data\Malwarebytes
2012-08-20 14:20 . 2012-08-20 14:20 -------- d-sh--w- c:\documents and settings\NetworkService\IETldCache
2012-08-19 19:51 . 2012-08-19 19:51 -------- d-sh--w- c:\windows\system32\config\systemprofile\IETldCache
2012-08-19 19:50 . 2012-08-19 19:50 -------- d-sh--w- c:\windows\system32\config\systemprofile\PrivacIE
2012-08-19 19:49 . 2012-08-31 16:44 -------- d-----w- c:\windows\system32\config\systemprofile\Application Data\HPAppData
2012-08-19 19:49 . 2012-08-19 19:49 -------- d-----w- c:\windows\system32\config\systemprofile\Application Data\Yahoo!
.
.
.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2012-08-30 12:59 . 2008-04-13 23:00 544768 ----a-w- c:\windows\system32\winlogon.exe
2012-08-30 12:59 . 2008-04-13 23:00 39424 ----a-w- c:\windows\system32\svchost.exe
2012-08-30 12:59 . 2008-04-13 23:00 1058304 ----a-w- c:\windows\explorer.exe
2012-08-15 20:32 . 2012-04-05 15:16 70344 ----a-w- c:\windows\system32\FlashPlayerCPLApp.cpl
2012-08-15 20:32 . 2012-04-05 15:16 426184 ----a-w- c:\windows\system32\FlashPlayerApp.exe
2012-07-06 13:58 . 2008-04-13 23:00 78336 ----a-w- c:\windows\system32\browser.dll
2012-07-04 14:05 . 2012-04-05 02:37 139784 ----a-w- c:\windows\system32\drivers\rdpwd.sys
2012-07-03 13:40 . 2008-04-13 23:00 1866112 ----a-w- c:\windows\system32\win32k.sys
2012-07-02 17:49 . 2008-04-13 23:00 916992 ----a-w- c:\windows\system32\wininet.dll
2012-07-02 17:49 . 2008-04-13 23:00 43520 ------w- c:\windows\system32\licmgr10.dll
2012-07-02 17:49 . 2008-04-13 23:00 1469440 ------w- c:\windows\system32\inetcpl.cpl
2012-07-02 12:05 . 2008-04-13 23:00 385024 ------w- c:\windows\system32\html.iec
2012-06-07 00:59 . 2012-06-07 00:59 1070152 ----a-w- c:\windows\system32\MSCOMCTL.OCX
2012-06-05 15:50 . 2008-04-13 23:00 1372672 ----a-w- c:\windows\system32\msxml6.dll
2012-06-05 15:50 . 2008-04-13 23:00 1172480 ----a-w- c:\windows\system32\msxml3.dll
2012-06-04 04:32 . 2008-04-13 23:00 152576 ----a-w- c:\windows\system32\schannel.dll
2012-06-02 19:19 . 2012-04-05 12:01 22040 ----a-w- c:\windows\system32\wucltui.dll.mui
2012-06-02 19:19 . 2012-04-05 12:01 15384 ----a-w- c:\windows\system32\wuaucpl.cpl.mui
2012-06-02 19:19 . 2012-04-05 02:38 329240 ----a-w- c:\windows\system32\wucltui.dll
2012-06-02 19:19 . 2012-04-05 02:38 219160 ----a-w- c:\windows\system32\wuaucpl.cpl
2012-06-02 19:19 . 2012-04-05 02:38 210968 ----a-w- c:\windows\system32\wuweb.dll
2012-06-02 19:19 . 2012-04-05 12:01 45080 ----a-w- c:\windows\system32\wups2.dll
2012-06-02 19:19 . 2012-04-05 12:01 15384 ----a-w- c:\windows\system32\wuapi.dll.mui
2012-06-02 19:19 . 2012-04-05 02:38 53784 ----a-w- c:\windows\system32\wuauclt.exe
2012-06-02 19:19 . 2012-04-05 02:38 35864 ----a-w- c:\windows\system32\wups.dll
2012-06-02 19:19 . 2008-04-13 23:00 97304 ----a-w- c:\windows\system32\cdm.dll
2012-06-02 19:19 . 2012-04-05 12:01 17944 ----a-w- c:\windows\system32\wuaueng.dll.mui
2012-06-02 19:19 . 2012-04-05 02:38 577048 ----a-w- c:\windows\system32\wuapi.dll
2012-06-02 19:19 . 2012-04-05 02:38 1933848 ----a-w- c:\windows\system32\wuaueng.dll
2012-06-02 19:18 . 2012-04-06 20:24 275696 ----a-w- c:\windows\system32\mucltui.dll
2012-06-02 19:18 . 2012-04-06 20:24 214256 ----a-w- c:\windows\system32\muweb.dll
2012-06-02 19:18 . 2012-04-06 20:24 17136 ----a-w- c:\windows\system32\mucltui.dll.mui
2012-07-26 14:25 . 2012-04-05 15:06 136672 ----a-w- c:\program files\mozilla firefox\components\browsercomps.dll
.
.
------- Sigcheck -------
Note: Unsigned files aren't necessarily malware.
.
[-] 2012-08-30 . 0B1DF5BFBBE448171C15BEBE81464EE4 . 544768 . . [5.1.2600.5512] . . c:\windows\system32\winlogon.exe
.
[-] 2012-08-30 . 82E4B2260CBE150912EE619C98EF8252 . 39424 . . [5.1.2600.5512] . . c:\windows\system32\svchost.exe
.
[-] 2012-08-30 . 89E6793404CBBAC0A564505880E3332F . 1058304 . . [6.00.2900.5512] . . c:\windows\explorer.exe
.
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4
.
[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\URLSearchHooks]
"{81017EA9-9AA8-4A6A-9734-7AF40E7D593F}"= "c:\program files\Yahoo!\Companion\Installs\cpn1\yt.dll" [2012-06-11 1524056]
.
[HKEY_CLASSES_ROOT\clsid\{81017ea9-9aa8-4a6a-9734-7af40e7d593f}]
[HKEY_CLASSES_ROOT\yt.YTNavAssistPlugin.1]
[HKEY_CLASSES_ROOT\TypeLib\{003028C2-EA1C-4676-A316-B5CB50917002}]
[HKEY_CLASSES_ROOT\yt.YTNavAssistPlugin]
.
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"Skype"="c:\program files\Skype\Phone\Skype.exe" [2012-07-13 17418928]
"ISUSPM"="c:\program files\Common Files\InstallShield\UpdateService\ISUSPM.exe" [2006-09-11 218032]
"Messenger (Yahoo!)"="c:\progra~1\Yahoo!\Messenger\YahooMessenger.exe" [2012-05-25 6595928]
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"RTHDCPL"="RTHDCPL.EXE" [2008-07-31 16806912]
"IgfxTray"="c:\windows\system32\igfxtray.exe" [2008-08-15 150040]
"HotKeysCmds"="c:\windows\system32\hkcmd.exe" [2008-08-15 178712]
"Persistence"="c:\windows\system32\igfxpers.exe" [2008-08-15 150040]
"CSAM5 tray"="c:\progra~1\AUTHEN~1\CSAM5\avtray.exe" [2012-03-15 154432]
"Adobe ARM"="c:\program files\Common Files\Adobe\ARM\1.0\AdobeARM.exe" [2012-07-27 919008]
"SunJavaUpdateSched"="c:\program files\Common Files\Java\Java Update\jusched.exe" [2012-01-18 254696]
"SafeCentralUpdater"="c:\program files\SafeCentral\Updater\Updater.exe" [2011-05-20 1681232]
"deskband_mgr.exe"="c:\program files\SafeCentral\SecureDesktop\deskband_mgr.exe" [2011-05-20 509776]
"HP Component Manager"="c:\program files\HP\hpcoretech\hpcmpmgr.exe" [2003-12-22 241664]
"PDVDDXSrv"="c:\program files\CyberLink\PowerDVD DX\PDVDDXSrv.exe" [2009-02-05 128232]
"HP Software Update"="c:\program files\HP\HP Software Update\HPWuSchd2.exe" [2009-11-18 54576]
"VX3000"="c:\windows\vVX3000.exe" [2009-06-26 757248]
"Malwarebytes' Anti-Malware"="c:\program files\Malwarebytes' Anti-Malware\mbamgui.exe" [2012-07-03 462920]
.
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\RunOnce]
"FlashPlayerUpdate"="c:\windows\system32\Macromed\Flash\FlashUtil32_11_3_300_271_ActiveX.exe" [2012-08-15 686792]
.
c:\documents and settings\All Users\Start Menu\Programs\Startup\
HP Digital Imaging Monitor.lnk - c:\program files\HP\Digital Imaging\bin\hpqtra08.exe [2009-11-18 275072]
Windows Search.lnk - c:\program files\Windows Desktop Search\WindowsSearch.exe [2008-5-26 123904]
.
[hkey_local_machine\software\microsoft\windows\currentversion\explorer\ShellExecuteHooks]
"{56F9679E-7826-4C84-81F3-532071A8BCC5}"= "c:\program files\Windows Desktop Search\MSNLNamespaceMgr.dll" [2009-05-25 304128]
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\cadmon]
2011-05-20 16:17 83792 ----a-w- c:\program files\SafeCentral\SecureDesktop\cadmon.dll
.
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"c:\\Program Files\\Skype\\Phone\\Skype.exe"=
.
R0 Apix;Apix;c:\windows\system32\drivers\Apix.sys [11/19/2010 4:09 PM 41872]
R1 A2DDA;A2 Direct Disk Access Support Driver;c:\nhcs downloads\Emsisoft\EmsisoftEmergencyKit\Run\a2ddax86.sys [7/12/2012 2:56 AM 17904]
R1 SHDrv;SHDrv;c:\windows\system32\drivers\shdrv.sys [11/19/2010 4:09 PM 148880]
R2 AMP;AMP;c:\windows\system32\drivers\amp.sys [3/6/2012 5:37 PM 137536]
R2 AMPSE;AMPSE;c:\windows\system32\drivers\ampse.sys [3/6/2012 5:37 PM 1197888]
R2 AuthPluginServer;AuthPluginServer;c:\program files\SafeCentral\Server\AuthPluginServer.exe [5/20/2011 12:02 PM 931664]
R2 AuthUpdaterService;AuthUpdaterService;c:\program files\SafeCentral\Updater\AuthUpdaterService.exe [5/20/2011 12:22 PM 2807632]
R2 avrpts;CSAM5 Reporting Service;c:\program files\Authentium\CSAM5\avrpts.exe [3/15/2012 2:16 PM 166720]
R2 MBAMService;MBAMService;c:\program files\Malwarebytes' Anti-Malware\mbamservice.exe [8/21/2012 4:36 PM 655944]
R2 SHSrv;SHSrv;c:\windows\system32\SHSrv.exe [11/19/2010 4:09 PM 92048]
R2 vseamps;vseamps;c:\program files\Common Files\Authentium\AntiVirus5\vseamps.exe [3/6/2012 5:31 PM 97088]
R2 vsedsps;vsedsps;c:\program files\Common Files\Authentium\AntiVirus5\vsedsps.exe [3/6/2012 5:31 PM 97088]
R2 vseqrts;vseqrts;c:\program files\Common Files\Authentium\AntiVirus5\vseqrts.exe [3/6/2012 5:31 PM 142144]
R2 WebAdvisor;WebAdvisor;c:\program files\SafeCentral\WebAdvisor\WebAdvisor.exe [5/20/2011 12:11 PM 2369360]
R3 IntcHdmiAddService;Intel® High Definition Audio HDMI Service;c:\windows\system32\drivers\IntcHdmi.sys [4/5/2012 7:35 AM 110080]
R3 MBAMProtector;MBAMProtector;c:\windows\system32\drivers\mbam.sys [8/21/2012 4:35 PM 22344]
S0 cerc6;cerc6; [x]
S2 SkypeUpdate;Skype Updater;c:\program files\Skype\Updater\Updater.exe [7/3/2012 1:19 PM 160944]
S3 AdobeFlashPlayerUpdateSvc;Adobe Flash Player Update Service;c:\windows\system32\Macromed\Flash\FlashPlayerUpdateService.exe [4/5/2012 11:16 AM 250056]
S3 MozillaMaintenance;Mozilla Maintenance Service;c:\program files\Mozilla Maintenance Service\maintenanceservice.exe [5/4/2012 11:40 AM 113120]
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\svchost]
HPZ12 REG_MULTI_SZ Pml Driver HPZ12 Net Driver HPZ12
HPService REG_MULTI_SZ HPSLPSVC
hpdevmgmt REG_MULTI_SZ hpqcxs08 hpqddsvc
.
Contents of the 'Scheduled Tasks' folder
.
2012-08-31 c:\windows\Tasks\Adobe Flash Player Updater.job
- c:\windows\system32\Macromed\Flash\FlashPlayerUpdateService.exe [2012-04-05 20:32]
.
2012-08-31 c:\windows\Tasks\Authentium Updater.job
- c:\program files\Common Files\Authentium\Updater\amu.exe [2009-10-15 16:20]
.
.
------- Supplementary Scan -------
.
mStart Page = hxxp://http://www.yahoo.com/?ilc=8.yahoo.com
IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~2\Office12\EXCEL.EXE/3000
TCP: DhcpNameServer = 10.1.10.1
FF - ProfilePath - c:\documents and settings\David\Application Data\Mozilla\Firefox\Profiles\31cqujs6.default\
FF - prefs.js: browser.search.defaulturl - hxxp://search.yahoo.com/search?fr=mkg030&p=
FF - prefs.js: browser.search.selectedEngine - Google
FF - prefs.js: browser.startup.homepage - hxxp://www.msn.com/
FF - prefs.js: keyword.URL - hxxp://search.yahoo.com/search?fr=mkg030&p=
.
- - - - ORPHANS REMOVED - - - -
.
HKLM-Run-DXDllRegExe - c:\windows\system32\dxdllreg.exe
.
.
.
**************************************************************************
.
catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2012-08-31 12:47
Windows 5.1.2600 Service Pack 3 NTFS
.
scanning hidden processes ...
.
scanning hidden autostart entries ...
.
scanning hidden files ...
.
scan completed successfully
hidden files: 0
.
**************************************************************************
.
--------------------- LOCKED REGISTRY KEYS ---------------------
.
[HKEY_USERS\.Default\Software\Microsoft\Internet Explorer\User Preferences]
@Denied: (2) (LocalSystem)
"88D7D0879DAB32E14DE5B3A805A34F98AFF34F5977"=hex:01,00,00,00,d0,8c,9d,df,01,15,
d1,11,8c,7a,00,c0,4f,c2,97,eb,01,00,00,00,66,aa,1c,29,b7,aa,95,44,ba,52,ad,\
"2D53CFFC5C1A3DD2E97B7979AC2A92BD59BC839E81"=hex:01,00,00,00,d0,8c,9d,df,01,15,
d1,11,8c,7a,00,c0,4f,c2,97,eb,01,00,00,00,66,aa,1c,29,b7,aa,95,44,ba,52,ad,\
.
--------------------- DLLs Loaded Under Running Processes ---------------------
.
- - - - - - - > 'winlogon.exe'(748)
c:\program files\SafeCentral\SecureDesktop\cadmon.dll
c:\windows\system32\igfxdev.dll
.
Completion time: 2012-08-31 12:48:59
ComboFix-quarantined-files.txt 2012-08-31 16:48
.
Pre-Run: 233,253,974,016 bytes free
Post-Run: 234,899,480,576 bytes free
.
WindowsXP-KB310994-SP2-Pro-BootDisk-ENU.exe
[boot loader]
timeout=2
default=multi(0)disk(0)rdisk(0)partition(1)\WINDOWS
[operating systems]
c:\cmdcons\BOOTSECT.DAT="Microsoft Windows Recovery Console" /cmdcons
UnsupportedDebug="do not select this" /debug
multi(0)disk(0)rdisk(0)partition(1)\WINDOWS="Microsoft Windows XP Professional" /noexecute=optin /fastdetect
.
- - End Of File - - D831BA032DC909F0A64D7CFB47A58DC5


Thanks for your help.

#4 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:02:42 PM

Posted 31 August 2012 - 12:14 PM

SystemLook:

Please download SystemLook from one of the links below and save it to your Desktop.

Download Mirror #1
Download Mirror #2

  • Double-click SystemLook.exe to run it.
  • Copy the content of the following codebox into the main textfield:
:filefind
explorer.exe
svchost.exe
winlogon.exe
  • Click the Look button to start the scan.
  • When finished, a notepad window will open with the results of the scan. Please post this log in your next reply.
Note: The log can also be found on your Desktop entitled SystemLook.txt
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#5 kephyr

kephyr
  • Topic Starter

  • Members
  • 59 posts
  • OFFLINE
  •  
  • Local time:01:42 PM

Posted 31 August 2012 - 12:38 PM

Heres the results:

SystemLook 30.07.11 by jpshortstuff
Log created at 13:35 on 31/08/2012 by David
Administrator - Elevation successful

========== filefind ==========

Searching for "explorer.exe"
C:\Documents and Settings\David\Desktop\explorer.exe --a---- 1058304 bytes [01:41 30/08/2012] [23:00 13/04/2008] 89E6793404CBBAC0A564505880E3332F
C:\WINDOWS\explorer.exe --a---- 1058304 bytes [23:00 13/04/2008] [12:59 30/08/2012] 89E6793404CBBAC0A564505880E3332F

Searching for "svchost.exe"
C:\Program Files\Malwarebytes' Anti-Malware\Chameleon\svchost.exe --a---- 217672 bytes [20:42 21/08/2012] [17:46 03/07/2012] 8A7F34F0BBD076EC3815680A7309114F
C:\WINDOWS\system32\svchost.exe --a---- 39424 bytes [23:00 13/04/2008] [12:59 30/08/2012] 82E4B2260CBE150912EE619C98EF8252

Searching for "winlogon.exe"
C:\Documents and Settings\David\Desktop\winlogon.exe --a---- 544768 bytes [01:43 30/08/2012] [23:00 13/04/2008] 0B1DF5BFBBE448171C15BEBE81464EE4
C:\Program Files\Malwarebytes' Anti-Malware\Chameleon\winlogon.exe --a---- 217672 bytes [20:42 21/08/2012] [17:46 03/07/2012] 8A7F34F0BBD076EC3815680A7309114F
C:\WINDOWS\system32\winlogon.exe --a---- 544768 bytes [23:00 13/04/2008] [12:59 30/08/2012] 0B1DF5BFBBE448171C15BEBE81464EE4

-= EOF =-

#6 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:02:42 PM

Posted 31 August 2012 - 12:51 PM

Greetings

It does not look like you have replacements for these files - I need to know if you have another XP computer we can copy the files from?


SystemLook:

Please download SystemLook from one of the links below and save it to your Desktop.

Download Mirror #1
Download Mirror #2

  • Double-click SystemLook.exe to run it.
  • Copy the content of the following codebox into the main textfield:
:filefind
explorer.*
svchost.*
winlogon.*
  • Click the Look button to start the scan.
  • When finished, a notepad window will open with the results of the scan. Please post this log in your next reply.
Note: The log can also be found on your Desktop entitled SystemLook.txt
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#7 kephyr

kephyr
  • Topic Starter

  • Members
  • 59 posts
  • OFFLINE
  •  
  • Local time:01:42 PM

Posted 31 August 2012 - 01:17 PM

Yes I do. the computer I am using to communicate with you is XP sp3. I've been using a key drive to download and copy since the infected computer does not play nice on the network. I only connect it when I have to to download things.

#8 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:02:42 PM

Posted 31 August 2012 - 01:20 PM

Greetings

We need to get copies of these files from these locations

C:\WINDOWS\explorer.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\winlogon.exe

Put them on a pen drive and then take the to the infected computer

Move them to the C: drive so they will be like this (don't try to move them to the correct location as windows will not allow you to do it)

C:\explorer.exe
C:\svchost.exe
C:\winlogon.exe

when this is complete rerun system look for me so I can see they are in the correct place

gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#9 kephyr

kephyr
  • Topic Starter

  • Members
  • 59 posts
  • OFFLINE
  •  
  • Local time:01:42 PM

Posted 31 August 2012 - 01:37 PM

Done.

Heres the new stsyemlook file:

SystemLook 30.07.11 by jpshortstuff
Log created at 14:34 on 31/08/2012 by David
Administrator - Elevation successful

========== filefind ==========

Searching for "explorer.exe"
C:\explorer.exe --a---- 1033728 bytes [18:33 31/08/2012] [00:12 14/04/2008] 12896823FB95BFB3DC9B46BCAEDC9923
C:\Documents and Settings\David\Desktop\explorer.exe --a---- 1058304 bytes [01:41 30/08/2012] [23:00 13/04/2008] 89E6793404CBBAC0A564505880E3332F
C:\WINDOWS\explorer.exe --a---- 1058304 bytes [23:00 13/04/2008] [12:59 30/08/2012] 89E6793404CBBAC0A564505880E3332F

Searching for "svchost.exe"
C:\svchost.exe --a---- 14336 bytes [18:33 31/08/2012] [00:12 14/04/2008] 27C6D03BCDB8CFEB96B716F3D8BE3E18
C:\Program Files\Malwarebytes' Anti-Malware\Chameleon\svchost.exe --a---- 217672 bytes [20:42 21/08/2012] [17:46 03/07/2012] 8A7F34F0BBD076EC3815680A7309114F
C:\WINDOWS\system32\svchost.exe --a---- 39424 bytes [23:00 13/04/2008] [12:59 30/08/2012] 82E4B2260CBE150912EE619C98EF8252

Searching for "winlogon.exe"
C:\winlogon.exe --a---- 507904 bytes [18:33 31/08/2012] [00:12 14/04/2008] ED0EF0A136DEC83DF69F04118870003E
C:\Documents and Settings\David\Desktop\winlogon.exe --a---- 544768 bytes [01:43 30/08/2012] [23:00 13/04/2008] 0B1DF5BFBBE448171C15BEBE81464EE4
C:\Program Files\Malwarebytes' Anti-Malware\Chameleon\winlogon.exe --a---- 217672 bytes [20:42 21/08/2012] [17:46 03/07/2012] 8A7F34F0BBD076EC3815680A7309114F
C:\WINDOWS\system32\winlogon.exe --a---- 544768 bytes [23:00 13/04/2008] [12:59 30/08/2012] 0B1DF5BFBBE448171C15BEBE81464EE4

-= EOF =-

Thanks for all your help!

#10 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:02:42 PM

Posted 31 August 2012 - 03:12 PM

Greetings

That is perfect!!

Lets run this now.

Blitzblank.

Download BlitzBlank and save it to your desktop. Open Blitzblank.exe

  • Click OK at the warning (and take note of it, this is a VERY powerful tool!).
  • Click the Script tab and copy/paste the following text there:
CopyFile:
C:\explorer.exe C:\WINDOWS\explorer.exe
C:\svchost.exe C:\WINDOWS\system32\svchost.exe
C:\winlogon.exe C:\WINDOWS\system32\winlogon.exe
C:\explorer.exe C:\WINDOWS\system32\dllcache\explorer.exe
C:\winlogon.exe C:\WINDOWS\system32\dllcache\winlogon.exe
C:\svchost.exe C:\WINDOWS\system32\dllcache\svchost.exe
  • Click Execute Now. Your computer will need to reboot in order to replace the files.
  • When done, post me the report created by Blitzblank. you can find it at the root of the drive Normaly C:\

I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#11 kephyr

kephyr
  • Topic Starter

  • Members
  • 59 posts
  • OFFLINE
  •  
  • Local time:01:42 PM

Posted 31 August 2012 - 03:39 PM

Does the program initiate the reboot or do I have to?

#12 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:02:42 PM

Posted 31 August 2012 - 04:00 PM

it should do it on its own but if it does not go ahead and do it
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#13 kephyr

kephyr
  • Topic Starter

  • Members
  • 59 posts
  • OFFLINE
  •  
  • Local time:01:42 PM

Posted 31 August 2012 - 04:13 PM

I tried to do a restart, but it seems not to respond. 10 minutes later, I can still open and close programs. Should I just hit the power button?

#14 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:02:42 PM

Posted 31 August 2012 - 04:14 PM

yes go ahead and rerun system look for me


gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#15 kephyr

kephyr
  • Topic Starter

  • Members
  • 59 posts
  • OFFLINE
  •  
  • Local time:01:42 PM

Posted 31 August 2012 - 04:27 PM

When I started it back up, there was a blue screen with the script on it about 4 times.

Here's the Systemlook log:

SystemLook 30.07.11 by jpshortstuff
Log created at 17:21 on 31/08/2012 by David
Administrator - Elevation successful

========== filefind ==========

Searching for "explorer.exe"
C:\explorer.exe --a---- 1033728 bytes [18:33 31/08/2012] [00:12 14/04/2008] 12896823FB95BFB3DC9B46BCAEDC9923
C:\Documents and Settings\David\Desktop\explorer.exe --a---- 1058304 bytes [01:41 30/08/2012] [23:00 13/04/2008] 89E6793404CBBAC0A564505880E3332F
C:\WINDOWS\explorer.exe --a---- 1033728 bytes [23:00 13/04/2008] [21:19 31/08/2012] 12896823FB95BFB3DC9B46BCAEDC9923
C:\WINDOWS\system32\dllcache\explorer.exe --a--c- 1033728 bytes [21:19 31/08/2012] [21:19 31/08/2012] 12896823FB95BFB3DC9B46BCAEDC9923

Searching for "svchost.exe"
C:\svchost.exe --a---- 14336 bytes [18:33 31/08/2012] [00:12 14/04/2008] 27C6D03BCDB8CFEB96B716F3D8BE3E18
C:\Program Files\Malwarebytes' Anti-Malware\Chameleon\svchost.exe --a---- 217672 bytes [20:42 21/08/2012] [17:46 03/07/2012] 8A7F34F0BBD076EC3815680A7309114F
C:\WINDOWS\system32\svchost.exe --a---- 14336 bytes [23:00 13/04/2008] [21:19 31/08/2012] 27C6D03BCDB8CFEB96B716F3D8BE3E18
C:\WINDOWS\system32\dllcache\svchost.exe --a--c- 14336 bytes [21:19 31/08/2012] [21:19 31/08/2012] 27C6D03BCDB8CFEB96B716F3D8BE3E18

Searching for "winlogon.exe"
C:\winlogon.exe --a---- 507904 bytes [18:33 31/08/2012] [00:12 14/04/2008] ED0EF0A136DEC83DF69F04118870003E
C:\Documents and Settings\David\Desktop\winlogon.exe --a---- 544768 bytes [01:43 30/08/2012] [23:00 13/04/2008] 0B1DF5BFBBE448171C15BEBE81464EE4
C:\Program Files\Malwarebytes' Anti-Malware\Chameleon\winlogon.exe --a---- 217672 bytes [20:42 21/08/2012] [17:46 03/07/2012] 8A7F34F0BBD076EC3815680A7309114F
C:\WINDOWS\system32\winlogon.exe --a---- 507904 bytes [23:00 13/04/2008] [21:19 31/08/2012] ED0EF0A136DEC83DF69F04118870003E
C:\WINDOWS\system32\dllcache\winlogon.exe --a--c- 507904 bytes [21:19 31/08/2012] [21:19 31/08/2012] ED0EF0A136DEC83DF69F04118870003E

-= EOF =-




1 user(s) are reading this topic

0 members, 1 guests, 0 anonymous users