Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Search result redirect problems


  • This topic is locked This topic is locked
27 replies to this topic

#1 AB Marshall

AB Marshall

  • Members
  • 19 posts
  • OFFLINE
  •  
  • Local time:06:49 PM

Posted 14 October 2012 - 02:43 PM

Apparently I have malware on Windows Vista Home Premium. Here are the results from DDS scan;

DDS (Ver_2012-10-14.05) - NTFS_x86
Internet Explorer: 9.0.8112.16421
Run by AB at 11:18:08 on 2012-10-14
Microsoft® Windows Vista™ Home Premium 6.0.6002.2.1252.1.1033.18.3061.1246 [GMT -7:00]
.
SP: Windows Defender *Enabled/Updated* {D68DDC3A-831F-4fae-9E44-DA132C1ACF46}
.
============== Running Processes ================
.
C:\Windows\system32\wininit.exe
C:\Windows\system32\lsm.exe
C:\Windows\system32\SLsvc.exe
C:\Windows\System32\WLTRYSVC.EXE
C:\Windows\System32\bcmwltry.exe
C:\Windows\system32\WLANExt.exe
C:\Windows\System32\spoolsv.exe
C:\Windows\system32\taskeng.exe
C:\Windows\system32\rundll32.exe
C:\Windows\system32\Dwm.exe
C:\Windows\Explorer.EXE
C:\Windows\system32\aestsrv.exe
C:\Windows\system32\taskeng.exe
C:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 2013\avp.exe
C:\Program Files\Intel\Intel Matrix Storage Manager\Iaantmon.exe
C:\Windows\system32\STacSV.exe
C:\Program Files\DellTPad\Apoint.exe
C:\Windows\OEM02Mon.exe
C:\Windows\System32\igfxtray.exe
C:\Windows\System32\hkcmd.exe
C:\Windows\System32\igfxpers.exe
C:\Program Files\Dell\Dell Webcam Manager\DellWMgr.exe
C:\Program Files\Intel\Intel Matrix Storage Manager\IAAnotif.exe
C:\Windows\System32\WLTRAY.EXE
C:\Windows\system32\SearchIndexer.exe
C:\Program Files\Google\Google Desktop Search\GoogleDesktop.exe
C:\Program Files\Dell\MediaDirect\PCMService.exe
C:\Windows\system32\DRIVERS\xaudio.exe
C:\Program Files\Sigmatel\C-Major Audio\WDM\sttray.exe
C:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 2013\avp.exe
C:\Program Files\Digital Line Detect\DLG.exe
C:\Program Files\Dell\QuickSet\quickset.exe
C:\Program Files\DellTPad\ApMsgFwd.exe
C:\Program Files\DellTPad\HidFind.exe
C:\Program Files\DellTPad\Apntex.exe
C:\Windows\system32\igfxsrvc.exe
C:\Program Files\Google\Google Desktop Search\GoogleDesktop.exe
C:\Windows\system32\wbem\wmiprvse.exe
C:\Windows\system32\wuauclt.exe
C:\Program Files\Mozilla Firefox\firefox.exe
C:\Users\AB\Downloads\gmer\gmer.exe
C:\Windows\system32\wbem\wmiprvse.exe
C:\Windows\system32\svchost.exe -k DcomLaunch
C:\Windows\system32\svchost.exe -k rpcss
C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted
C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted
C:\Windows\system32\svchost.exe -k netsvcs
C:\Windows\system32\svchost.exe -k GPSvcGroup
C:\Windows\system32\svchost.exe -k LocalService
C:\Windows\system32\svchost.exe -k NetworkService
C:\Windows\system32\svchost.exe -k LocalServiceNoNetwork
C:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted
C:\Windows\system32\svchost.exe -k imgsvc
C:\Windows\System32\svchost.exe -k WerSvcGroup
C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation
.
============== Pseudo HJT Report ===============
.
uStart Page = hxxp://www.google.com/ig/dell?hl=en&client=dell-usuk&channel=us&ibd=3080412
uWindow Title = Internet Explorer provided by Dell
uDefault_Page_URL = hxxp://www.google.com/ig/dell?hl=en&client=dell-usuk&channel=us&ibd=3080412
mDefault_Page_URL = hxxp://www.google.com/ig/dell?hl=en&client=dell-usuk&channel=us&ibd=3080412
BHO: Adobe PDF Reader Link Helper: {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - c:\program files\common files\adobe\acrobat\activex\AcroIEHelper.dll
BHO: Content Blocker Plugin: {5564CC73-EFA7-4CBF-918A-5CF7FBBFFF4F} - c:\program files\kaspersky lab\kaspersky anti-virus 2013\ieext\contentblocker\ie_content_blocker_plugin.dll
BHO: Virtual Keyboard Plugin: {73455575-E40C-433C-9784-C78DC7761455} - c:\program files\kaspersky lab\kaspersky anti-virus 2013\ieext\virtualkeyboard\ie_virtual_keyboard_plugin.dll
BHO: SSVHelper Class: {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - c:\program files\java\jre1.6.0_04\bin\ssv.dll
BHO: CBrowserHelperObject Object: {CA6319C0-31B7-401E-A518-A07C3DB8F777} - c:\program files\dell\bae\BAE.dll
BHO: URL Advisor Plugin: {E33CF602-D945-461A-83F0-819F76A199F8} - c:\program files\kaspersky lab\kaspersky anti-virus 2013\ieext\urladvisor\klwtbbho.dll
mRun: [Apoint] c:\program files\delltpad\Apoint.exe
mRun: [OEM02Mon.exe] c:\windows\OEM02Mon.exe
mRun: [IgfxTray] c:\windows\system32\igfxtray.exe
mRun: [HotKeysCmds] c:\windows\system32\hkcmd.exe
mRun: [Persistence] c:\windows\system32\igfxpers.exe
mRun: [DELL Webcam Manager] "c:\program files\dell\dell webcam manager\DellWMgr.exe" /s
mRun: [IAAnotif] "c:\program files\intel\intel matrix storage manager\Iaanotif.exe"
mRun: [Broadcom Wireless Manager UI] c:\windows\system32\WLTRAY.exe
mRun: [Adobe Reader Speed Launcher] "c:\program files\adobe\reader 8.0\reader\Reader_sl.exe"
mRun: [Google Desktop Search] "c:\program files\google\google desktop search\GoogleDesktop.exe" /startup
mRun: [dscactivate] "c:\program files\dell support center\gs_agent\custom\dsca.exe"
mRun: [PCMService] "c:\program files\dell\mediadirect\PCMService.exe"
mRun: [APSDaemon] "c:\program files\common files\apple\apple application support\APSDaemon.exe"
mRun: [SigmatelSysTrayApp] c:\program files\sigmatel\c-major audio\wdm\sttray.exe
mRun: [AVP] "c:\program files\kaspersky lab\kaspersky anti-virus 2013\avp.exe"
StartupFolder: c:\progra~2\micros~1\windows\startm~1\programs\startup\digita~1.lnk - c:\program files\digital line detect\DLG.exe
StartupFolder: c:\progra~2\micros~1\windows\startm~1\programs\startup\quickset.lnk - c:\program files\dell\quickset\quickset.exe
mPolicies-Explorer: BindDirectlyToPropertySetStorage = dword:0
mPolicies-System: ConsentPromptBehaviorAdmin = dword:1
mPolicies-System: EnableLUA = dword:0
mPolicies-System: EnableUIADesktopToggle = dword:0
IE: {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - {CAFEEFAC-0016-0000-0004-ABCDEFFEDCBC} - c:\program files\java\jre1.6.0_04\bin\ssv.dll
IE: {0C4CC089-D306-440D-9772-464E226F6539} - {0BA14598-4178-4CE5-B1F1-B5C6408A3F2E} - c:\program files\kaspersky lab\kaspersky anti-virus 2013\ieext\virtualkeyboard\ie_virtual_keyboard_plugin.dll
IE: {CCF151D8-D089-449F-A5A4-D9909053F20F} - {CCF151D8-D089-449F-A5A4-D9909053F20F} - c:\program files\kaspersky lab\kaspersky anti-virus 2013\ieext\urladvisor\klwtbbho.dll
DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_04-windows-i586.cab
DPF: {CAFEEFAC-0016-0000-0004-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_04-windows-i586.cab
DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_04-windows-i586.cab
TCP: NameServer = 192.168.1.254
TCP: Interfaces\{05DEACFC-5381-49B3-9369-ACEBF9BF0ABF} : DHCPNameServer = 192.168.1.254
Notify: igfxcui - igfxdev.dll
LSA: Security Packages = kerberos msv1_0 schannel wdigest tspkg
.
================= FIREFOX ===================
.
FF - ProfilePath - c:\users\ab\appdata\roaming\mozilla\firefox\profiles\7dmfqdhk.default\
FF - prefs.js: browser.startup.homepage - hxxp://www.google.com/webhp?complete=0&hl=en
FF - plugin: c:\windows\system32\macromed\flash\NPSWF32_11_4_402_265.dll
FF - ExtSQL: 2012-08-21 15:58; {20a82645-c095-46ed-80e3-08825760534b}; c:\windows\microsoft.net\framework\v3.5\windows presentation foundation\DotNetAssistantExtension
FF - ExtSQL: 2012-08-22 16:40; {b9db16a4-6edc-47ec-a1f4-b86292ed211d}; c:\users\ab\appdata\roaming\mozilla\firefox\profiles\7dmfqdhk.default\extensions\{b9db16a4-6edc-47ec-a1f4-b86292ed211d}
FF - ExtSQL: 2012-08-23 17:41; {d40f5e7b-d2cf-4856-b441-cc613eeffbe3}; c:\users\ab\appdata\roaming\mozilla\firefox\profiles\7dmfqdhk.default\extensions\{d40f5e7b-d2cf-4856-b441-cc613eeffbe3}.xpi
FF - ExtSQL: 2012-08-24 10:38; {d10d0bf8-f5b5-c8b4-a8b2-2b9879e08c5d}; c:\users\ab\appdata\roaming\mozilla\firefox\profiles\7dmfqdhk.default\extensions\{d10d0bf8-f5b5-c8b4-a8b2-2b9879e08c5d}.xpi
FF - ExtSQL: 2012-09-27 06:39; {e4a8a97b-f2ed-450b-b12d-ee082ba24781}; c:\users\ab\appdata\roaming\mozilla\firefox\profiles\7dmfqdhk.default\extensions\{e4a8a97b-f2ed-450b-b12d-ee082ba24781}.xpi
FF - ExtSQL: 2012-10-13 11:16; content_blocker@kaspersky.com; c:\program files\kaspersky lab\kaspersky anti-virus 2013\ffext\content_blocker@kaspersky.com
FF - ExtSQL: 2012-10-13 11:17; url_advisor@kaspersky.com; c:\program files\kaspersky lab\kaspersky anti-virus 2013\ffext\url_advisor@kaspersky.com
FF - ExtSQL: 2012-10-13 11:17; virtual_keyboard@kaspersky.com; c:\program files\kaspersky lab\kaspersky anti-virus 2013\ffext\virtual_keyboard@kaspersky.com
.
============= SERVICES / DRIVERS ===============
.
R1 KLIM6;Kaspersky Anti-Virus NDIS 6 Filter;c:\windows\system32\drivers\klim6.sys [2012-8-2 24408]
R1 kltdi;kltdi;c:\windows\system32\drivers\kltdi.sys [2012-6-8 43608]
R1 kneps;kneps;c:\windows\system32\drivers\kneps.sys [2012-8-13 144344]
R2 AESTFilters;Andrea ST Filters Service;c:\windows\system32\AEstSrv.exe [2008-4-11 73728]
R2 AVP;Kaspersky Anti-Virus Service;c:\program files\kaspersky lab\kaspersky anti-virus 2013\avp.exe [2012-8-17 218880]
R2 FontCache;Windows Font Cache Service;c:\windows\system32\svchost.exe -k LocalServiceAndNoImpersonation [2008-1-20 21504]
R3 IntcHdmiAddService;Intel® High Definition Audio HDMI Service;c:\windows\system32\drivers\IntcHdmi.sys [2008-4-12 111616]
R3 klkbdflt;Kaspersky Lab KLKBDFLT;c:\windows\system32\drivers\klkbdflt.sys [2012-5-25 25944]
R3 klmouflt;Kaspersky Lab KLMOUFLT;c:\windows\system32\drivers\klmouflt.sys [2012-7-25 25944]
S3 MozillaMaintenance;Mozilla Maintenance Service;c:\program files\mozilla maintenance service\maintenanceservice.exe [2012-8-21 115168]
.
=============== Created Last 30 ================
.
2012-10-13 18:16:31 -------- d-----w- c:\programdata\Kaspersky Lab
2012-10-13 18:16:31 -------- d-----w- c:\program files\Kaspersky Lab
2012-10-13 18:15:18 75096 ----a-w- c:\windows\system32\drivers\klflt.sys
2012-10-12 14:08:01 96224 ----a-w- c:\program files\mozilla firefox\webapprt-stub.exe
2012-10-12 14:08:01 73696 ----a-w- c:\program files\mozilla firefox\breakpadinjector.dll
2012-10-12 14:08:01 157272 ----a-w- c:\program files\mozilla firefox\webapp-uninstaller.exe
2012-10-10 14:55:02 985088 ----a-w- c:\windows\system32\crypt32.dll
2012-10-10 14:55:02 98304 ----a-w- c:\windows\system32\cryptnet.dll
2012-10-10 14:55:02 133120 ----a-w- c:\windows\system32\cryptsvc.dll
2012-10-10 14:54:56 172544 ----a-w- c:\windows\system32\wintrust.dll
2012-10-10 14:54:55 219648 ----a-w- c:\windows\system32\d3d10_1core.dll
2012-10-10 14:54:55 1069056 ----a-w- c:\windows\system32\DWrite.dll
2012-10-10 14:54:54 683008 ----a-w- c:\windows\system32\d2d1.dll
2012-10-10 14:54:54 160768 ----a-w- c:\windows\system32\d3d10_1.dll
2012-10-10 14:54:54 1172480 ----a-w- c:\windows\system32\d3d10warp.dll
2012-10-10 14:54:50 2048 ----a-w- c:\windows\system32\tzres.dll
2012-10-10 14:54:43 3602816 ----a-w- c:\windows\system32\ntkrnlpa.exe
2012-10-10 14:54:43 3550080 ----a-w- c:\windows\system32\ntoskrnl.exe
2012-10-10 14:28:56 221568 ----a-w- c:\windows\system32\drivers\netio.sys
2012-10-09 01:54:36 5120 ----a-w- c:\windows\system32\wmi.dll
2012-10-09 01:54:36 157696 ----a-w- c:\windows\system32\imagehlp.dll
2012-10-09 01:54:36 12800 ----a-w- c:\windows\system32\drivers\fs_rec.sys
2012-10-09 01:49:21 2047488 ----a-w- c:\windows\system32\win32k.sys
2012-10-09 01:46:59 369664 ----a-w- c:\windows\system32\WMPhoto.dll
2012-10-09 01:46:59 252928 ----a-w- c:\windows\system32\dxdiag.exe
2012-10-09 01:46:59 195584 ----a-w- c:\windows\system32\dxdiagn.dll
2012-10-09 01:46:58 974848 ----a-w- c:\windows\system32\WindowsCodecs.dll
2012-10-09 01:46:58 519680 ----a-w- c:\windows\system32\d3d11.dll
2012-10-09 01:46:58 321024 ----a-w- c:\windows\system32\PhotoMetadataHandler.dll
2012-10-09 01:46:58 189440 ----a-w- c:\windows\system32\WindowsCodecsExt.dll
2012-10-09 01:42:21 377344 ----a-w- c:\windows\system32\winhttp.dll
2012-10-09 01:42:20 1218048 ----a-w- c:\program files\windows journal\NBDoc.DLL
2012-10-09 01:42:19 983040 ----a-w- c:\program files\windows journal\JNTFiltr.dll
2012-10-09 01:42:19 964608 ----a-w- c:\program files\windows journal\JNWDRV.dll
2012-10-09 01:42:19 936960 ----a-w- c:\program files\common files\microsoft shared\ink\journal.dll
2012-10-09 01:42:19 47104 ----a-w- c:\program files\windows journal\PDIALOG.exe
2012-10-09 01:42:19 1404928 ----a-w- c:\program files\common files\microsoft shared\ink\InkObj.dll
2012-10-09 01:42:04 23552 ----a-w- c:\windows\system32\mciseq.dll
2012-10-09 01:42:04 189952 ----a-w- c:\windows\system32\winmm.dll
2012-10-09 01:40:59 53120 ----a-w- c:\windows\system32\drivers\partmgr.sys
2012-10-09 01:40:59 429056 ----a-w- c:\windows\system32\EncDec.dll
2012-10-09 01:40:42 707584 ----a-w- c:\program files\common files\system\wab32.dll
2012-10-09 01:40:41 49152 ----a-w- c:\windows\system32\csrsrv.dll
2012-10-09 01:40:41 180736 ----a-w- c:\windows\system32\drivers\rdpwd.sys
2012-10-09 01:33:20 9728 ----a-w- c:\windows\system32\lsass.exe
2012-10-09 01:33:20 72704 ----a-w- c:\windows\system32\secur32.dll
2012-10-09 01:33:20 440704 ----a-w- c:\windows\system32\drivers\ksecdd.sys
2012-10-09 01:33:20 278528 ----a-w- c:\windows\system32\schannel.dll
2012-10-09 01:33:20 204288 ----a-w- c:\windows\system32\ncrypt.dll
2012-10-09 01:33:20 1259008 ----a-w- c:\windows\system32\lsasrv.dll
2012-10-09 01:23:10 2422272 ----a-w- c:\windows\system32\wucltux.dll
2012-10-09 01:23:00 88576 ----a-w- c:\windows\system32\wudriver.dll
2012-10-09 01:22:58 33792 ----a-w- c:\windows\system32\wuapp.exe
2012-10-09 01:22:58 171904 ----a-w- c:\windows\system32\wuwebv.dll
2012-10-07 23:56:06 -------- d-----w- c:\users\ab\appdata\local\Apple Computer
2012-10-07 19:14:07 -------- d-----w- c:\windows\system32\vi-VN
2012-10-07 19:14:07 -------- d-----w- c:\windows\system32\eu-ES
2012-10-07 19:14:07 -------- d-----w- c:\windows\system32\ca-ES
2012-10-07 18:58:50 -------- d-----w- c:\windows\system32\EventProviders
2012-10-07 18:56:59 37376 ----a-w- c:\windows\system32\EhStorPwdMgr.dll
2012-10-07 18:55:59 62208 ----a-w- c:\windows\system32\drivers\ohci1394.sys
2012-10-05 14:06:56 6980552 ----a-w- c:\programdata\microsoft\windows defender\definition updates\{7883fa77-5c7f-4a8d-bd12-5451acb2e954}\mpengine.dll
2012-10-05 14:02:28 94208 --sha-r- c:\windows\system32\nsisvcz.dll
2012-09-27 14:16:38 -------- d-----w- c:\users\ab\appdata\local\Apple
2012-09-15 23:51:13 172032 ----a-w- c:\windows\system32\igfxres.dll
.
==================== Find3M ====================
.
2012-10-13 19:10:56 25944 ----a-w- c:\windows\system32\drivers\klmouflt.sys
2012-10-13 19:10:56 25944 ----a-w- c:\windows\system32\drivers\klkbdflt.sys
2012-10-09 01:46:59 4096 ----a-w- c:\windows\system32\drivers\en-us\dxgkrnl.sys.mui
2012-08-22 23:21:53 696520 ----a-w- c:\windows\system32\FlashPlayerApp.exe
2012-08-22 23:21:52 73416 ----a-w- c:\windows\system32\FlashPlayerCPLApp.cpl
2012-08-13 23:49:44 144344 ----a-w- c:\windows\system32\drivers\kneps.sys
2012-08-02 22:09:30 24408 ----a-w- c:\windows\system32\drivers\klim6.sys
2012-07-31 18:33:30 88688 ----a-w- c:\windows\system32\cpwmon2k.dll
.
============= FINISH: 11:19:52.77 ===============

Attached Files



BC AdBot (Login to Remove)

 


#2 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:01:49 AM

Posted 15 October 2012 - 07:32 PM

Hi,

Welcome to Bleeping Computer. My name is m0le and I will be helping you with your log.
  • Please subscribe to this topic, if you haven't already. Click the Watch This Topic button at the top on the right.

  • Please avoid installing/uninstalling or updating any programs and attempting any unsupervised fixes or scans. This can make helping you impossible.

  • Please reply to this post so I know you are there.
The forum is busy and we need to have replies as soon as possible. If I haven't had a reply after 3 days I will bump the topic and if you do not reply by the following day after that then I will close the topic.

Once I receive a reply then I will return with your first instructions.

Thanks :thumbup2:
Posted Image
m0le is a proud member of UNITE

#3 AB Marshall

AB Marshall
  • Topic Starter

  • Members
  • 19 posts
  • OFFLINE
  •  
  • Local time:06:49 PM

Posted 15 October 2012 - 08:12 PM

Hello m0le,
Thanks for the response. I can do that.
Auburn

#4 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:01:49 AM

Posted 16 October 2012 - 06:00 PM

Okay, can you start by running aswMBR and also let me know why you suspect malware

Please download aswMBR ( 511KB ) to your desktop.
  • Double click the aswMBR.exe icon to run it
  • Click the Scan button to start the scan
  • On completion of the scan, click the save log button, save it to your desktop and post it in your next reply.

Posted Image
m0le is a proud member of UNITE

#5 AB Marshall

AB Marshall
  • Topic Starter

  • Members
  • 19 posts
  • OFFLINE
  •  
  • Local time:06:49 PM

Posted 17 October 2012 - 08:54 AM

When I use Google some though not all of the result links are redirected. Mostly I use Firefox but I've tried IE & the redirects happen there as well. My bookmarks work & there is no problem when I use web addresses.

Here is the aswMBR log;

aswMBR version 0.9.9.1665 Copyright© 2011 AVAST Software
Run date: 2012-10-17 06:43:10
-----------------------------
06:43:10.722 OS Version: Windows 6.0.6002 Service Pack 2
06:43:10.722 Number of processors: 2 586 0xF0D
06:43:10.722 ComputerName: BOX1525 UserName: AB
06:43:12.687 Initialize success
06:43:55.671 Disk 0 (boot) \Device\Harddisk0\DR0 -> \Device\Ide\IAAStorageDevice-0
06:43:55.686 Disk 0 Vendor: SAMSUNG_ HS10 Size: 238475MB BusType: 3
06:43:55.717 Disk 0 MBR read successfully
06:43:55.717 Disk 0 MBR scan
06:43:55.717 Disk 0 Windows VISTA default MBR code
06:43:55.733 Disk 0 Partition 1 00 DE Dell Utility Dell 8.0 62 MB offset 63
06:43:55.749 Disk 0 Partition 2 00 07 HPFS/NTFS NTFS 10240 MB offset 129024
06:43:55.764 Disk 0 Partition 3 80 (A) 07 HPFS/NTFS NTFS 225610 MB offset 21100544
06:43:55.780 Disk 0 Partition - 00 0F Extended LBA 2560 MB offset 483151872
06:43:55.827 Disk 0 Partition 4 00 DD MSDOS5.0 2559 MB offset 483153920
06:43:55.842 Disk 0 scanning sectors +488394752
06:43:55.920 Disk 0 scanning C:\Windows\system32\drivers
06:44:05.109 Service scanning
06:44:09.851 Service kl1 C:\Windows\system32\DRIVERS\kl1.sys **LOCKED** 5
06:44:10.007 Service KLIM6 C:\Windows\system32\DRIVERS\klim6.sys **LOCKED** 5
06:44:10.101 Service klkbdflt C:\Windows\system32\DRIVERS\klkbdflt.sys **LOCKED** 5
06:44:10.147 Service klmouflt C:\Windows\system32\DRIVERS\klmouflt.sys **LOCKED** 5
06:44:10.225 Service kltdi C:\Windows\system32\DRIVERS\kltdi.sys **LOCKED** 5
06:44:10.288 Service kneps C:\Windows\system32\DRIVERS\kneps.sys **LOCKED** 5
06:44:25.061 Modules scanning
06:44:30.958 Disk 0 trace - called modules:
06:44:31.005 ntkrnlpa.exe CLASSPNP.SYS disk.sys iastor.sys hal.dll
06:44:31.020 1 nt!IofCallDriver -> \Device\Harddisk0\DR0[0x8645b148]
06:44:31.036 3 CLASSPNP.SYS[8ada68b3] -> nt!IofCallDriver -> \Device\Ide\IAAStorageDevice-0[0x8593f030]
06:44:31.067 Scan finished successfully
06:45:51.932 Disk 0 MBR has been saved successfully to "C:\Users\AB\Desktop\MBR.dat"
06:45:51.963 The log file has been saved successfully to "C:\Users\AB\Desktop\aswMBR.txt"

#6 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:01:49 AM

Posted 17 October 2012 - 02:56 PM

We'll run a couple of good tools back to back and see what we can find. Redirects from Google are usually adware

Please download Posted Image Malwarebytes Anti-Malware and save it to your desktop.
  • Make sure you are connected to the Internet.
  • Double-click on mbam-setup.exe to install the application or, if you are using Vista, right-click and select Run As Administrator on mbam-setup.exe to install the application.
  • When the installation begins, follow the prompts and do not make any changes to default settings.
  • When installation has finished, make sure you leave both of these checked:
    • Update Malwarebytes' Anti-Malware
    • Launch Malwarebytes' Anti-Malware
  • Then click Finish.
  • MBAM will automatically start and you will be asked to update the program before performing a scan. If an update is found, the program will automatically update itself. Press the OK button to close that box and continue.
    If MBAM won't update then download and update MBAM on a clean computer then save the rules.ref folder to a memory stick. This file is found here: 'C:\Documents and Settings\All Users\Application Data\Malwarebytes\Malwarebytes' Anti-Malware' then transfer it across to the infected computer.
  • On the Scanner tab:
    • Make sure the "Perform Full Scan" option is selected.
    • Then click on the Scan button.
  • If asked to select the drives to scan, leave all the drives selected and click on the Start Scan button.
  • The scan will begin and "Scan in progress" will show at the top. It may take some time to complete so please be patient.
  • When the scan is finished, a message box will say "The scan completed successfully. Click 'Show Results' to display all objects found".
  • Click OK to close the message box and continue with the removal process.
  • Back at the main Scanner screen, click on the Show Results button to see a list of any malware that was found.
  • Make sure that everything is checked, and click Remove Selected.
  • When removal is completed, a log report will open in Notepad.
  • The log is automatically saved and can be viewed by clicking the Logs tab in MBAM.
  • Copy and paste the contents of that report in your next reply and exit MBAM.
Note: If MBAM encounters a file that is difficult to remove, you may be asked to reboot your computer so it can proceed with the disinfection process. Regardless if prompted to restart the computer or not, please do so immediately. Failure to reboot normally (not into safe mode) will prevent MBAM from removing all the malware. MBAM may make changes to your registry as part of its disinfection routine. If you're using other security programs that detect registry changes, they may alert you after scanning with MBAM. Please permit the program to allow the changes.


Then SAS


Download Superantispyware
  • Load Superantispyware and click the check for updates button.
  • Once the update is finished click the scan your computer button.
  • Check Perform Complete Scan and then next.
  • Superantispyware will now scan your computer and when its finished it will list all the infections it has found.
  • Make sure that they all have a check next to them and press next.
  • Click finish and you will be taken back to the main interface.
  • Click Preferences and then click the statistics/logs tab. Click the dated log and press view log and a text file will appear.
  • Copy and paste the log onto the forum.

Posted Image
m0le is a proud member of UNITE

#7 AB Marshall

AB Marshall
  • Topic Starter

  • Members
  • 19 posts
  • OFFLINE
  •  
  • Local time:06:49 PM

Posted 17 October 2012 - 08:13 PM

Hello m0le,
I ran the scans. Thanks for pointing out that I probably had adware (not malware). Superantispyware found 16 infections. I just Googled without redirects. Grand!

Here are the logs beginning w/Malwarebytes' Anti-Malware;
Malwarebytes Anti-Malware 1.65.1.1000
www.malwarebytes.org

Database version: v2012.10.17.12

Windows Vista Service Pack 2 x86 NTFS
Internet Explorer 9.0.8112.16421
AB :: BOX1525 [administrator]

10/17/2012 3:19:26 PM
mbam-log-2012-10-17 (15-19-26).txt

Scan type: Full scan (C:\|D:\|)
Scan options enabled: Memory | Startup | Registry | File System | Heuristics/Extra | Heuristics/Shuriken | PUP | PUM
Scan options disabled: P2P
Objects scanned: 291776
Time elapsed: 1 hour(s), 38 minute(s), 40 second(s)

Memory Processes Detected: 0
(No malicious items detected)

Memory Modules Detected: 0
(No malicious items detected)

Registry Keys Detected: 0
(No malicious items detected)

Registry Values Detected: 0
(No malicious items detected)

Registry Data Items Detected: 0
(No malicious items detected)

Folders Detected: 0
(No malicious items detected)

Files Detected: 0
(No malicious items detected)

(end)

& tonight's winner ...
SUPERAntiSpyware Scan Log
http://www.superantispyware.com

Generated 10/17/2012 at 05:49 PM

Application Version : 5.6.1012

Core Rules Database Version : 9427
Trace Rules Database Version: 7239

Scan type : Complete Scan
Total Scan Time : 00:42:00

Operating System Information
Windows Vista Home Premium 32-bit, Service Pack 2 (Build 6.00.6002)
UAC Off - Administrator

Memory items scanned : 577
Memory threats detected : 0
Registry items scanned : 35638
Registry threats detected : 0
File items scanned : 33184
File threats detected : 16

Adware.Tracking Cookie
.dmtracker.com [ C:\USERS\AB\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\7DMFQDHK.DEFAULT\COOKIES.SQLITE ]
.statcounter.com [ C:\USERS\AB\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\7DMFQDHK.DEFAULT\COOKIES.SQLITE ]
.superstats.com [ C:\USERS\AB\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\7DMFQDHK.DEFAULT\COOKIES.SQLITE ]
.kaspersky.122.2o7.net [ C:\USERS\AB\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\7DMFQDHK.DEFAULT\COOKIES.SQLITE ]
.microsoftsto.112.2o7.net [ C:\USERS\AB\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\7DMFQDHK.DEFAULT\COOKIES.SQLITE ]
.imrworldwide.com [ C:\USERS\AB\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\7DMFQDHK.DEFAULT\COOKIES.SQLITE ]
.imrworldwide.com [ C:\USERS\AB\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\7DMFQDHK.DEFAULT\COOKIES.SQLITE ]
conversion.buddymedia.com [ C:\USERS\AB\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\7DMFQDHK.DEFAULT\COOKIES.SQLITE ]
.buddymedia.com [ C:\USERS\AB\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\7DMFQDHK.DEFAULT\COOKIES.SQLITE ]
.supertracking.net [ C:\USERS\AB\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\7DMFQDHK.DEFAULT\COOKIES.SQLITE ]
.supertracking.net [ C:\USERS\AB\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\7DMFQDHK.DEFAULT\COOKIES.SQLITE ]
click.livesearchnow.com [ C:\USERS\AB\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\7DMFQDHK.DEFAULT\COOKIES.SQLITE ]
.xiti.com [ C:\USERS\AB\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\7DMFQDHK.DEFAULT\COOKIES.SQLITE ]
.liveperson.net [ C:\USERS\AB\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\7DMFQDHK.DEFAULT\COOKIES.SQLITE ]
server.iad.liveperson.net [ C:\USERS\AB\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\7DMFQDHK.DEFAULT\COOKIES.SQLITE ]
.liveperson.net [ C:\USERS\AB\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\7DMFQDHK.DEFAULT\COOKIES.SQLITE ]

Thank you for this, thank you very much. Hopefully this gives my system a clean bill of health. I will continue using Superantispyware unless you suggest otherwise. Also, I am on a trial version of Kaspersky Anti-Virus which I will register soon. The computer came with Norton.

Cheers,
Auburn Marshall

#8 AB Marshall

AB Marshall
  • Topic Starter

  • Members
  • 19 posts
  • OFFLINE
  •  
  • Local time:06:49 PM

Posted 17 October 2012 - 08:22 PM

I just noticed the log shows tracking cookies in Mozilla Firefox, none for Internet Explorer. Checking that out I was redirected in IE.
Partial success but apparently there are still a few bugs in the other browser.

AB

#9 AB Marshall

AB Marshall
  • Topic Starter

  • Members
  • 19 posts
  • OFFLINE
  •  
  • Local time:06:49 PM

Posted 18 October 2012 - 10:47 AM

Firefox isn't clean either. I was just redirected on new Google searches. Superantispyware seemed to be working after the scan yesterday, at least in Firefox. But today the redirects have reappeared.

#10 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:01:49 AM

Posted 18 October 2012 - 06:16 PM

Yes, the SAS log shows only tracking cookies and so I was surprised that it worked. Then I saw the posts afterwards...

Let's start with IE

Let's take a look at the registry and see what's been attached.

Open Notepad (go to Start > Run and type in Notepad and click OK).
Copy/paste the following text inside the code box into a new notepad document.

@ECHO OFF
regedit /e look1.txt "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\SearchScopes"
regedit /e look2.txt "HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\SearchScopes"
Type look*.txt >log.txt
start log.txt
del look1.txt look2.txt
del %0
  • Go to the File menu at the top of the Notepad and select Save as.
  • Select save in: desktop
  • Fill in File name: look.bat
  • Save as type: All file types (*.*)
  • Click save
  • Close the Notepad.
  • Locate look.bat on the desktop.
  • Double click the icon or Right-click to run it as administrator if you have Vista or Windows 7.
  • A notepad opens, copy and paste the content (log.txt) to your reply.

Posted Image
m0le is a proud member of UNITE

#11 AB Marshall

AB Marshall
  • Topic Starter

  • Members
  • 19 posts
  • OFFLINE
  •  
  • Local time:06:49 PM

Posted 19 October 2012 - 08:41 AM

Windows Registry Editor Version 5.00

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\SearchScopes]
"DefaultScope"="{6A1806CD-94D4-4689-BA73-E35EA1EA9990}"
"Version"=dword:00000001

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}]
"DisplayName"="@ieframe.dll,-12512"
@="Bing"
"URL"="http://www.bing.com/search?q={searchTerms}&FORM=IE8SRC"

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{6A1806CD-94D4-4689-BA73-E35EA1EA9990}]
"DisplayName"="Google"
"URL"="http://www.google.com/search?q={searchTerms}&rls=com.microsoft:{language}:{referrer:source?}&ie={inputEncoding}&oe={outputEncoding}&sourceid=ie7&rlz=1I7DKUS"

Windows Registry Editor Version 5.00

[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\SearchScopes]
"DefaultScope"="{6A1806CD-94D4-4689-BA73-E35EA1EA9990}"
"Version"=dword:00000001
"KnownProvidersUpgradeTime"=hex:0e,40,df,18,57,a9,cd,01
"DownloadRetries"=dword:00000000

[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}]
"DisplayName"="Bing"
@="Live Search"
"URL"="http://www.bing.com/search?q={searchTerms}&src=IE-SearchBox&FORM=IE8SRC"
"TopResultURLFallback"="http://www.bing.com/search?q={searchTerms}&src=ie9tr"
"SuggestionsURLFallback"="http://api.bing.com/qsml.aspx?query={searchTerms}&maxwidth={ie:maxWidth}&rowheight={ie:rowHeight}&sectionHeight={ie:sectionHeight}&FORM=IE8SSC&market={language}"
"FaviconURLFallback"="http://www.bing.com/favicon.ico"
"FaviconPath"="C:\\Users\\AB\\AppData\\LocalLow\\Microsoft\\Internet Explorer\\Services\\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico"

[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\SearchScopes\{6A1806CD-94D4-4689-BA73-E35EA1EA9990}]
"DisplayName"="Google"
"URL"="http://www.google.com/search?q={searchTerms}&rls=com.microsoft:{language}:{referrer:source?}&ie={inputEncoding}&oe={outputEncoding}&sourceid=ie7&rlz=1I7DKUS"
"TopResultURLFallback"=""
"SuggestionsURLFallback"="http://clients5.google.com/complete/search?hl={language}&q={searchTerms}&client=ie8&inputencoding={inputEncoding}&outputencoding={outputEncoding}"
"FaviconURLFallback"="http://www.google.com/favicon.ico"
"FaviconPath"="C:\\Users\\AB\\AppData\\LocalLow\\Microsoft\\Internet Explorer\\Services\\search_{6A1806CD-94D4-4689-BA73-E35EA1EA9990}.ico"

#12 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:01:49 AM

Posted 19 October 2012 - 08:13 PM

That looks okay so let's run something a bit more powerful now

Please download ComboFix from one of these locations:* IMPORTANT !!! Save ComboFix.exe to your Desktop making sure you rename it comfix.exe
  • Disable your AntiVirus and AntiSpyware applications including Firewalls, usually via a right click on the System Tray icon. They may otherwise interfere with our tools. (Click on this link to see a list of programs that should be disabled. The list is not all inclusive.)
  • Double click on Comfix.exe & follow the prompts.
  • As part of it's process, ComboFix will check to see if the Microsoft Windows Recovery Console is installed. With malware infections being as they are today, it's strongly recommended to have this pre-installed on your machine before doing any malware removal. It will allow you to boot up into a special recovery/repair mode that will allow us to more easily help you should your computer have a problem after an attempted removal of malware.
  • Follow the prompts to allow ComboFix to download and install the Microsoft Windows Recovery Console, and when prompted, agree to the End-User License Agreement to install the Microsoft Windows Recovery Console.
**Please note: If the Microsoft Windows Recovery Console is already installed, ComboFix will continue it's malware removal procedures.

Posted Image


Once the Microsoft Windows Recovery Console is installed using ComboFix, you should see the following message:

Posted Image


Click on Yes, to continue scanning for malware.

When finished, it shall produce a log for you. Please include the C:\ComboFix.txt in your next reply.

If you receive the message "Illegal operation attempted on a registry key that has been marked for deletion." then please reboot the system.
Posted Image
m0le is a proud member of UNITE

#13 AB Marshall

AB Marshall
  • Topic Starter

  • Members
  • 19 posts
  • OFFLINE
  •  
  • Local time:06:49 PM

Posted 20 October 2012 - 12:01 PM

ComboFix 12-10-19.01 - AB 10/20/2012 9:37.1.2 - x86
Microsoft® Windows Vista™ Home Premium 6.0.6002.2.1252.1.1033.18.3061.1870 [GMT -7:00]
Running from: c:\users\AB\Desktop\comfix.exe
SP: Windows Defender *Enabled/Updated* {D68DDC3A-831F-4fae-9E44-DA132C1ACF46}
.
.
((((((((((((((((((((((((( Files Created from 2012-09-20 to 2012-10-20 )))))))))))))))))))))))))))))))
.
.
2012-10-20 16:49 . 2012-10-20 16:49 -------- d-----w- c:\users\Default\AppData\Local\temp
2012-10-18 23:34 . 2012-10-18 23:34 -------- d-----w- c:\users\AB\AppData\Roaming\Apple Computer
2012-10-18 00:04 . 2012-10-18 00:04 -------- d-----w- c:\users\AB\AppData\Roaming\SUPERAntiSpyware.com
2012-10-18 00:03 . 2012-10-18 00:04 -------- d-----w- c:\program files\SUPERAntiSpyware
2012-10-18 00:03 . 2012-10-18 00:03 -------- d-----w- c:\programdata\SUPERAntiSpyware.com
2012-10-17 22:13 . 2012-10-17 22:13 -------- d-----w- c:\users\AB\AppData\Roaming\Malwarebytes
2012-10-17 22:12 . 2012-10-17 22:12 -------- d-----w- c:\programdata\Malwarebytes
2012-10-17 22:12 . 2012-10-17 22:14 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
2012-10-17 22:12 . 2012-09-30 02:54 22856 ----a-w- c:\windows\system32\drivers\mbam.sys
2012-10-13 18:16 . 2012-10-20 16:23 -------- d-----w- c:\programdata\Kaspersky Lab
2012-10-13 18:16 . 2012-10-13 18:16 -------- d-----w- c:\program files\Kaspersky Lab
2012-10-13 18:15 . 2012-08-14 01:24 75096 ----a-w- c:\windows\system32\drivers\klflt.sys
2012-10-12 14:08 . 2012-10-12 14:08 96224 ----a-w- c:\program files\Mozilla Firefox\webapprt-stub.exe
2012-10-12 14:08 . 2012-10-12 14:08 73696 ----a-w- c:\program files\Mozilla Firefox\breakpadinjector.dll
2012-10-12 14:08 . 2012-10-12 14:08 157272 ----a-w- c:\program files\Mozilla Firefox\webapp-uninstaller.exe
2012-10-10 14:55 . 2012-06-02 00:02 985088 ----a-w- c:\windows\system32\crypt32.dll
2012-10-10 14:55 . 2012-06-02 00:02 98304 ----a-w- c:\windows\system32\cryptnet.dll
2012-10-10 14:55 . 2012-06-02 00:02 133120 ----a-w- c:\windows\system32\cryptsvc.dll
2012-10-10 14:54 . 2012-08-24 15:53 172544 ----a-w- c:\windows\system32\wintrust.dll
2012-10-10 14:54 . 2012-03-01 14:46 219648 ----a-w- c:\windows\system32\d3d10_1core.dll
2012-10-10 14:54 . 2012-02-29 13:41 1069056 ----a-w- c:\windows\system32\DWrite.dll
2012-10-10 14:54 . 2012-03-01 14:46 160768 ----a-w- c:\windows\system32\d3d10_1.dll
2012-10-10 14:54 . 2012-02-29 14:08 1172480 ----a-w- c:\windows\system32\d3d10warp.dll
2012-10-10 14:54 . 2012-02-29 13:44 683008 ----a-w- c:\windows\system32\d2d1.dll
2012-10-10 14:54 . 2012-09-13 13:28 2048 ----a-w- c:\windows\system32\tzres.dll
2012-10-10 14:54 . 2012-08-29 11:27 3602816 ----a-w- c:\windows\system32\ntkrnlpa.exe
2012-10-10 14:54 . 2012-08-29 11:27 3550080 ----a-w- c:\windows\system32\ntoskrnl.exe
2012-10-10 14:28 . 2010-04-05 20:00 221568 ----a-w- c:\windows\system32\drivers\netio.sys
2012-10-09 01:54 . 2012-02-29 15:11 5120 ----a-w- c:\windows\system32\wmi.dll
2012-10-09 01:54 . 2012-02-29 15:09 157696 ----a-w- c:\windows\system32\imagehlp.dll
2012-10-09 01:54 . 2012-02-29 13:32 12800 ----a-w- c:\windows\system32\drivers\fs_rec.sys
2012-10-09 01:49 . 2012-07-04 14:02 2047488 ----a-w- c:\windows\system32\win32k.sys
2012-10-09 01:46 . 2012-10-09 01:46 369664 ----a-w- c:\windows\system32\WMPhoto.dll
2012-10-09 01:46 . 2012-10-09 01:46 252928 ----a-w- c:\windows\system32\dxdiag.exe
2012-10-09 01:46 . 2012-10-09 01:46 195584 ----a-w- c:\windows\system32\dxdiagn.dll
2012-10-09 01:46 . 2012-10-09 01:46 974848 ----a-w- c:\windows\system32\WindowsCodecs.dll
2012-10-09 01:46 . 2012-10-09 01:46 519680 ----a-w- c:\windows\system32\d3d11.dll
2012-10-09 01:46 . 2012-10-09 01:46 321024 ----a-w- c:\windows\system32\PhotoMetadataHandler.dll
2012-10-09 01:46 . 2012-10-09 01:46 189440 ----a-w- c:\windows\system32\WindowsCodecsExt.dll
2012-10-09 01:42 . 2011-11-16 16:23 377344 ----a-w- c:\windows\system32\winhttp.dll
2012-10-09 01:42 . 2012-02-01 15:11 1218048 ----a-w- c:\program files\Windows Journal\NBDoc.DLL
2012-10-09 01:42 . 2012-02-01 15:10 983040 ----a-w- c:\program files\Windows Journal\JNTFiltr.dll
2012-10-09 01:42 . 2012-02-01 15:10 964608 ----a-w- c:\program files\Windows Journal\JNWDRV.dll
2012-10-09 01:42 . 2012-02-01 15:10 936960 ----a-w- c:\program files\Common Files\Microsoft Shared\ink\journal.dll
2012-10-09 01:42 . 2012-02-01 15:10 1404928 ----a-w- c:\program files\Common Files\Microsoft Shared\ink\InkObj.dll
2012-10-09 01:42 . 2012-02-01 13:58 47104 ----a-w- c:\program files\Windows Journal\PDIALOG.exe
2012-10-09 01:42 . 2011-10-14 16:03 189952 ----a-w- c:\windows\system32\winmm.dll
2012-10-09 01:42 . 2011-10-14 16:00 23552 ----a-w- c:\windows\system32\mciseq.dll
2012-10-09 01:40 . 2012-03-20 23:28 53120 ----a-w- c:\windows\system32\drivers\partmgr.sys
2012-10-09 01:40 . 2011-10-14 16:02 429056 ----a-w- c:\windows\system32\EncDec.dll
2012-10-09 01:40 . 2011-09-30 15:57 707584 ----a-w- c:\program files\Common Files\System\wab32.dll
2012-10-09 01:40 . 2012-05-01 14:03 180736 ----a-w- c:\windows\system32\drivers\rdpwd.sys
2012-10-09 01:40 . 2011-10-25 15:56 49152 ----a-w- c:\windows\system32\csrsrv.dll
2012-10-09 01:33 . 2012-06-04 15:26 440704 ----a-w- c:\windows\system32\drivers\ksecdd.sys
2012-10-09 01:33 . 2012-06-02 00:04 278528 ----a-w- c:\windows\system32\schannel.dll
2012-10-09 01:33 . 2012-06-02 00:03 204288 ----a-w- c:\windows\system32\ncrypt.dll
2012-10-09 01:33 . 2011-11-16 16:23 72704 ----a-w- c:\windows\system32\secur32.dll
2012-10-09 01:33 . 2011-11-16 16:21 1259008 ----a-w- c:\windows\system32\lsasrv.dll
2012-10-09 01:33 . 2011-11-16 14:12 9728 ----a-w- c:\windows\system32\lsass.exe
2012-10-09 01:23 . 2012-06-02 22:19 53784 ----a-w- c:\windows\system32\wuauclt.exe
2012-10-09 01:23 . 2012-06-02 22:19 45080 ----a-w- c:\windows\system32\wups2.dll
2012-10-09 01:23 . 2012-06-02 22:12 2422272 ----a-w- c:\windows\system32\wucltux.dll
2012-10-09 01:23 . 2012-06-02 22:19 1933848 ----a-w- c:\windows\system32\wuaueng.dll
2012-10-09 01:23 . 2012-06-02 22:19 35864 ----a-w- c:\windows\system32\wups.dll
2012-10-09 01:23 . 2012-06-02 22:19 577048 ----a-w- c:\windows\system32\wuapi.dll
2012-10-09 01:23 . 2012-06-02 22:12 88576 ----a-w- c:\windows\system32\wudriver.dll
2012-10-09 01:22 . 2012-06-02 22:19 171904 ----a-w- c:\windows\system32\wuwebv.dll
2012-10-09 01:22 . 2012-06-02 22:12 33792 ----a-w- c:\windows\system32\wuapp.exe
2012-10-07 23:56 . 2012-10-07 23:56 -------- d-----w- c:\users\AB\AppData\Local\Apple Computer
2012-10-07 19:14 . 2012-10-07 19:14 -------- d-----w- c:\windows\system32\ca-ES
2012-10-07 19:14 . 2012-10-07 19:14 -------- d-----w- c:\windows\system32\eu-ES
2012-10-07 19:14 . 2012-10-07 19:14 -------- d-----w- c:\windows\system32\vi-VN
2012-10-07 18:58 . 2012-10-07 18:58 -------- d-----w- c:\windows\system32\EventProviders
2012-10-07 18:56 . 2009-04-11 06:28 344064 ----a-w- c:\windows\system32\msrd3x40.dll
2012-10-07 18:55 . 2009-04-11 06:28 140288 ----a-w- c:\windows\system32\wpcsvc.dll
2012-10-05 14:06 . 2012-08-30 08:17 6980552 ----a-w- c:\programdata\Microsoft\Windows Defender\Definition Updates\{7883FA77-5C7F-4A8D-BD12-5451ACB2E954}\mpengine.dll
2012-10-05 14:02 . 2012-10-05 14:02 94208 --sha-r- c:\windows\system32\nsisvcz.dll
2012-09-27 14:16 . 2012-09-27 14:16 -------- d-----w- c:\program files\Common Files\Apple
2012-09-27 14:16 . 2012-09-27 14:16 -------- d-----w- c:\users\AB\AppData\Local\Apple
2012-09-27 14:16 . 2012-09-27 14:16 -------- d-----w- c:\programdata\Apple
.
.
.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2012-10-13 19:10 . 2012-07-25 21:53 25944 ----a-w- c:\windows\system32\drivers\klmouflt.sys
2012-10-13 19:10 . 2012-05-26 02:38 25944 ----a-w- c:\windows\system32\drivers\klkbdflt.sys
2012-10-09 01:46 . 2012-10-09 01:46 4096 ----a-w- c:\windows\system32\drivers\en-US\dxgkrnl.sys.mui
2012-08-13 23:49 . 2012-08-13 23:49 144344 ----a-w- c:\windows\system32\drivers\kneps.sys
2012-08-02 22:09 . 2012-08-02 22:09 24408 ----a-w- c:\windows\system32\drivers\klim6.sys
2012-07-31 18:33 . 2012-09-05 00:23 88688 ----a-w- c:\windows\system32\cpwmon2k.dll
2012-10-12 14:08 . 2012-08-22 01:08 261600 ----a-w- c:\program files\mozilla firefox\components\browsercomps.dll
.
.
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4
.
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"SUPERAntiSpyware"="c:\program files\SUPERAntiSpyware\SUPERAntiSpyware.exe" [2012-10-16 4762496]
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"Apoint"="c:\program files\DellTPad\Apoint.exe" [2007-09-07 159744]
"OEM02Mon.exe"="c:\windows\OEM02Mon.exe" [2007-08-28 36864]
"IgfxTray"="c:\windows\system32\igfxtray.exe" [2008-03-06 141848]
"HotKeysCmds"="c:\windows\system32\hkcmd.exe" [2008-03-06 166424]
"Persistence"="c:\windows\system32\igfxpers.exe" [2008-03-06 133656]
"DELL Webcam Manager"="c:\program files\Dell\Dell Webcam Manager\DellWMgr.exe" [2007-07-27 118784]
"IAAnotif"="c:\program files\Intel\Intel Matrix Storage Manager\Iaanotif.exe" [2007-03-21 174872]
"Broadcom Wireless Manager UI"="c:\windows\system32\WLTRAY.exe" [2007-12-12 3444736]
"Adobe Reader Speed Launcher"="c:\program files\Adobe\Reader 8.0\Reader\Reader_sl.exe" [2007-05-11 40048]
"Google Desktop Search"="c:\program files\Google\Google Desktop Search\GoogleDesktop.exe" [2008-04-12 1838592]
"dscactivate"="c:\program files\Dell Support Center\gs_agent\custom\dsca.exe" [2008-02-14 16384]
"PCMService"="c:\program files\Dell\MediaDirect\PCMService.exe" [2007-11-01 189736]
"APSDaemon"="c:\program files\Common Files\Apple\Apple Application Support\APSDaemon.exe" [2012-02-21 59240]
"SigmatelSysTrayApp"="c:\program files\SigmaTel\C-Major Audio\WDM\sttray.exe" [2007-11-12 405504]
"AVP"="c:\program files\Kaspersky Lab\Kaspersky Anti-Virus 2013\avp.exe" [2012-08-18 218880]
.
c:\programdata\Microsoft\Windows\Start Menu\Programs\Startup\
Digital Line Detect.lnk - c:\program files\Digital Line Detect\DLG.exe [2008-4-12 50688]
QuickSet.lnk - c:\program files\Dell\QuickSet\quickset.exe [2007-9-7 1180952]
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\system]
"ConsentPromptBehaviorAdmin"= 1 (0x1)
"EnableLUA"= 0 (0x0)
"EnableUIADesktopToggle"= 0 (0x0)
.
[hkey_local_machine\software\microsoft\windows\currentversion\explorer\ShellExecuteHooks]
"{5AE067D3-9AFB-48E0-853A-EBB7F4A000DA}"= "c:\program files\SUPERAntiSpyware\SASSEH.DLL" [2011-07-19 113024]
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\windows]
"AppInit_DLLs"=c:\progra~1\Google\GOOGLE~2\GoogleDesktopNetwork3.dll
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\!SASCORE]
@=""
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\Wdf01000.sys]
@="Driver"
.
[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring]
"DisableMonitoring"=dword:00000001
.
[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\KasperskyAntiVirus]
"DisableMonitoring"=dword:00000001
.
[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecAntiVirus]
"DisableMonitoring"=dword:00000001
.
[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecFirewall]
"DisableMonitoring"=dword:00000001
.
S2 !SASCORE;SAS Core Service;c:\program files\SUPERAntiSpyware\SASCORE.EXE [x]
S2 AESTFilters;Andrea ST Filters Service;c:\windows\system32\aestsrv.exe [x]
.
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\svchost]
LocalServiceAndNoImpersonation REG_MULTI_SZ FontCache
.
Contents of the 'Scheduled Tasks' folder
.
2012-10-20 c:\windows\Tasks\Iwykvlglt.job
- c:\windows\system32\nsisvcz.dll [2012-10-05 14:02]
.
.
------- Supplementary Scan -------
.
uStart Page = hxxp://www.google.com/ig/dell?hl=en&client=dell-usuk&channel=us&ibd=3080412
TCP: DhcpNameServer = 192.168.0.1
FF - ProfilePath - c:\users\AB\AppData\Roaming\Mozilla\Firefox\Profiles\7dmfqdhk.default\
FF - prefs.js: browser.startup.homepage - hxxp://www.google.com/webhp?complete=0&hl=en
FF - ExtSQL: 2012-08-21 15:58; {20a82645-c095-46ed-80e3-08825760534b}; c:\windows\Microsoft.NET\Framework\v3.5\Windows Presentation Foundation\DotNetAssistantExtension
FF - ExtSQL: 2012-08-22 16:40; {b9db16a4-6edc-47ec-a1f4-b86292ed211d}; c:\users\AB\AppData\Roaming\Mozilla\Firefox\Profiles\7dmfqdhk.default\extensions\{b9db16a4-6edc-47ec-a1f4-b86292ed211d}
FF - ExtSQL: 2012-08-23 17:41; {d40f5e7b-d2cf-4856-b441-cc613eeffbe3}; c:\users\AB\AppData\Roaming\Mozilla\Firefox\Profiles\7dmfqdhk.default\extensions\{d40f5e7b-d2cf-4856-b441-cc613eeffbe3}.xpi
FF - ExtSQL: 2012-08-24 10:38; {d10d0bf8-f5b5-c8b4-a8b2-2b9879e08c5d}; c:\users\AB\AppData\Roaming\Mozilla\Firefox\Profiles\7dmfqdhk.default\extensions\{d10d0bf8-f5b5-c8b4-a8b2-2b9879e08c5d}.xpi
FF - ExtSQL: 2012-09-27 06:39; {e4a8a97b-f2ed-450b-b12d-ee082ba24781}; c:\users\AB\AppData\Roaming\Mozilla\Firefox\Profiles\7dmfqdhk.default\extensions\{e4a8a97b-f2ed-450b-b12d-ee082ba24781}.xpi
FF - ExtSQL: 2012-10-13 11:16; content_blocker@kaspersky.com; c:\program files\Kaspersky Lab\Kaspersky Anti-Virus 2013\FFExt\content_blocker@kaspersky.com
FF - ExtSQL: 2012-10-13 11:17; url_advisor@kaspersky.com; c:\program files\Kaspersky Lab\Kaspersky Anti-Virus 2013\FFExt\url_advisor@kaspersky.com
FF - ExtSQL: 2012-10-13 11:17; virtual_keyboard@kaspersky.com; c:\program files\Kaspersky Lab\Kaspersky Anti-Virus 2013\FFExt\virtual_keyboard@kaspersky.com
.
.
**************************************************************************
.
catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2012-10-20 09:49
Windows 6.0.6002 Service Pack 2 NTFS
.
scanning hidden processes ...
.
scanning hidden autostart entries ...
.
scanning hidden files ...
.
.
c:\users\AB\AppData\Local\Temp\catchme.dll 53248 bytes executable
.
scan completed successfully
hidden files: 1
.
**************************************************************************
.
--------------------- LOCKED REGISTRY KEYS ---------------------
.
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0000\AllUserSettings]
@Denied: (A) (Users)
@Denied: (A) (Everyone)
@Allowed: (B 1 2 3 4 5) (S-1-5-20)
"BlindDial"=dword:00000000
.
Completion time: 2012-10-20 09:52:58
ComboFix-quarantined-files.txt 2012-10-20 16:52
.
Pre-Run: 188,598,464,512 bytes free
Post-Run: 188,527,169,536 bytes free
.
- - End Of File - - 8DACE013056ABD0325F83EDDB52CF2F0

#14 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:01:49 AM

Posted 20 October 2012 - 01:44 PM

Malicious .job file hooked on a file used for network capabilities. Let's remove that.

1. Close any open browsers.

2. Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.

3. Open notepad and copy/paste the text in the box below into it:

File::
c:\windows\Tasks\Iwykvlglt.job

RegLock::
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0000\AllUserSettings]


Save this as CFScript.txt, in the same location as Comfix.exe (called ComboFix.exe in the below graphic)


Posted Image

Refering to the picture above, drag CFScript into ComboFix.exe

If the program requests for you to update Combofix then click Yes.

When finished, it shall produce a log for you at C:\ComboFix.txt which I will require in your next reply.


Then please run ESET's online scanner

I'd like us to scan your machine with ESET OnlineScan
  • Hold down Control and click on the following link to open ESET OnlineScan in a new window.
    ESET OnlineScan
  • Click the Posted Image button.
  • For alternate browsers only: (Microsoft Internet Explorer users can skip these steps)
    • Click on Posted Image to download the ESET Smart Installer. Save it to your desktop.
    • Double click on the Posted Image icon on your desktop.
  • Check Posted Image
  • Click the Posted Image button.
  • Accept any security warnings from your browser.
  • Under scan settings, check Posted Image and check Remove found threats
  • Click Advanced settings and select the following:
    • Scan potentially unwanted applications
    • Scan for potentially unsafe applications
    • Enable Anti-Stealth technology
  • ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this can take some time.
  • Copy and paste the resulting log in your next reply
If no log is generated that means nothing was found. Please let me know if this happens.

If you think a log should have been generated then go to C:\Program Files\ESET\ESET Online Scanner\log.txt to find it.
Posted Image
m0le is a proud member of UNITE

#15 AB Marshall

AB Marshall
  • Topic Starter

  • Members
  • 19 posts
  • OFFLINE
  •  
  • Local time:06:49 PM

Posted 20 October 2012 - 02:50 PM

I ran the new ComboFix scan. I'll post the log for now & come back with the ESET log later.
I didn't disable Kaspersky Anti Virus or Windows firewall this time. I thought of it after the scan started but the scan seemed to run well enough.

ComboFix 12-10-19.01 - AB 10/20/2012 12:12:52.2.2 - x86
Microsoft® Windows Vista™ Home Premium 6.0.6002.2.1252.1.1033.18.3061.1822 [GMT -7:00]
Running from: c:\users\AB\Desktop\comfix.exe
Command switches used :: c:\users\AB\Desktop\CFScript.txt
SP: Windows Defender *Enabled/Updated* {D68DDC3A-831F-4fae-9E44-DA132C1ACF46}
.
FILE ::
"c:\windows\Tasks\Iwykvlglt.job"
.
/wow section - STAGE 4
.
.
((((((((((((((((((((((((( Files Created from 2012-09-20 to 2012-10-20 )))))))))))))))))))))))))))))))
.
.
2012-10-20 19:28 . 2012-10-20 19:28 -------- d-----w- c:\users\Default\AppData\Local\temp
2012-10-18 23:34 . 2012-10-18 23:34 -------- d-----w- c:\users\AB\AppData\Roaming\Apple Computer
2012-10-18 00:04 . 2012-10-18 00:04 -------- d-----w- c:\users\AB\AppData\Roaming\SUPERAntiSpyware.com
2012-10-18 00:03 . 2012-10-18 00:04 -------- d-----w- c:\program files\SUPERAntiSpyware
2012-10-18 00:03 . 2012-10-18 00:03 -------- d-----w- c:\programdata\SUPERAntiSpyware.com
2012-10-17 22:13 . 2012-10-17 22:13 -------- d-----w- c:\users\AB\AppData\Roaming\Malwarebytes
2012-10-17 22:12 . 2012-10-17 22:12 -------- d-----w- c:\programdata\Malwarebytes
2012-10-17 22:12 . 2012-10-17 22:14 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
2012-10-17 22:12 . 2012-09-30 02:54 22856 ----a-w- c:\windows\system32\drivers\mbam.sys
2012-10-13 18:16 . 2012-10-20 18:29 -------- d-----w- c:\programdata\Kaspersky Lab
2012-10-13 18:16 . 2012-10-13 18:16 -------- d-----w- c:\program files\Kaspersky Lab
2012-10-13 18:15 . 2012-08-14 01:24 75096 ----a-w- c:\windows\system32\drivers\klflt.sys
2012-10-12 14:08 . 2012-10-12 14:08 96224 ----a-w- c:\program files\Mozilla Firefox\webapprt-stub.exe
2012-10-12 14:08 . 2012-10-12 14:08 73696 ----a-w- c:\program files\Mozilla Firefox\breakpadinjector.dll
2012-10-12 14:08 . 2012-10-12 14:08 157272 ----a-w- c:\program files\Mozilla Firefox\webapp-uninstaller.exe
2012-10-10 14:55 . 2012-06-02 00:02 985088 ----a-w- c:\windows\system32\crypt32.dll
2012-10-10 14:55 . 2012-06-02 00:02 98304 ----a-w- c:\windows\system32\cryptnet.dll
2012-10-10 14:55 . 2012-06-02 00:02 133120 ----a-w- c:\windows\system32\cryptsvc.dll
2012-10-10 14:54 . 2012-08-24 15:53 172544 ----a-w- c:\windows\system32\wintrust.dll
2012-10-10 14:54 . 2012-03-01 14:46 219648 ----a-w- c:\windows\system32\d3d10_1core.dll
2012-10-10 14:54 . 2012-02-29 13:41 1069056 ----a-w- c:\windows\system32\DWrite.dll
2012-10-10 14:54 . 2012-03-01 14:46 160768 ----a-w- c:\windows\system32\d3d10_1.dll
2012-10-10 14:54 . 2012-02-29 14:08 1172480 ----a-w- c:\windows\system32\d3d10warp.dll
2012-10-10 14:54 . 2012-02-29 13:44 683008 ----a-w- c:\windows\system32\d2d1.dll
2012-10-10 14:54 . 2012-09-13 13:28 2048 ----a-w- c:\windows\system32\tzres.dll
2012-10-10 14:54 . 2012-08-29 11:27 3602816 ----a-w- c:\windows\system32\ntkrnlpa.exe
2012-10-10 14:54 . 2012-08-29 11:27 3550080 ----a-w- c:\windows\system32\ntoskrnl.exe
2012-10-10 14:28 . 2010-04-05 20:00 221568 ----a-w- c:\windows\system32\drivers\netio.sys
2012-10-09 01:54 . 2012-02-29 15:11 5120 ----a-w- c:\windows\system32\wmi.dll
2012-10-09 01:54 . 2012-02-29 15:09 157696 ----a-w- c:\windows\system32\imagehlp.dll
2012-10-09 01:54 . 2012-02-29 13:32 12800 ----a-w- c:\windows\system32\drivers\fs_rec.sys
2012-10-09 01:49 . 2012-07-04 14:02 2047488 ----a-w- c:\windows\system32\win32k.sys
2012-10-09 01:46 . 2012-10-09 01:46 369664 ----a-w- c:\windows\system32\WMPhoto.dll
2012-10-09 01:46 . 2012-10-09 01:46 252928 ----a-w- c:\windows\system32\dxdiag.exe
2012-10-09 01:46 . 2012-10-09 01:46 195584 ----a-w- c:\windows\system32\dxdiagn.dll
2012-10-09 01:46 . 2012-10-09 01:46 974848 ----a-w- c:\windows\system32\WindowsCodecs.dll
2012-10-09 01:46 . 2012-10-09 01:46 519680 ----a-w- c:\windows\system32\d3d11.dll
2012-10-09 01:46 . 2012-10-09 01:46 321024 ----a-w- c:\windows\system32\PhotoMetadataHandler.dll
2012-10-09 01:46 . 2012-10-09 01:46 189440 ----a-w- c:\windows\system32\WindowsCodecsExt.dll
2012-10-09 01:42 . 2011-11-16 16:23 377344 ----a-w- c:\windows\system32\winhttp.dll
2012-10-09 01:42 . 2012-02-01 15:11 1218048 ----a-w- c:\program files\Windows Journal\NBDoc.DLL
2012-10-09 01:42 . 2012-02-01 15:10 983040 ----a-w- c:\program files\Windows Journal\JNTFiltr.dll
2012-10-09 01:42 . 2012-02-01 15:10 964608 ----a-w- c:\program files\Windows Journal\JNWDRV.dll
2012-10-09 01:42 . 2012-02-01 15:10 936960 ----a-w- c:\program files\Common Files\Microsoft Shared\ink\journal.dll
2012-10-09 01:42 . 2012-02-01 15:10 1404928 ----a-w- c:\program files\Common Files\Microsoft Shared\ink\InkObj.dll
2012-10-09 01:42 . 2012-02-01 13:58 47104 ----a-w- c:\program files\Windows Journal\PDIALOG.exe
2012-10-09 01:42 . 2011-10-14 16:03 189952 ----a-w- c:\windows\system32\winmm.dll
2012-10-09 01:42 . 2011-10-14 16:00 23552 ----a-w- c:\windows\system32\mciseq.dll
2012-10-09 01:40 . 2012-03-20 23:28 53120 ----a-w- c:\windows\system32\drivers\partmgr.sys
2012-10-09 01:40 . 2011-10-14 16:02 429056 ----a-w- c:\windows\system32\EncDec.dll
2012-10-09 01:40 . 2011-09-30 15:57 707584 ----a-w- c:\program files\Common Files\System\wab32.dll
2012-10-09 01:40 . 2012-05-01 14:03 180736 ----a-w- c:\windows\system32\drivers\rdpwd.sys
2012-10-09 01:40 . 2011-10-25 15:56 49152 ----a-w- c:\windows\system32\csrsrv.dll
2012-10-09 01:33 . 2012-06-04 15:26 440704 ----a-w- c:\windows\system32\drivers\ksecdd.sys
2012-10-09 01:33 . 2012-06-02 00:04 278528 ----a-w- c:\windows\system32\schannel.dll
2012-10-09 01:33 . 2012-06-02 00:03 204288 ----a-w- c:\windows\system32\ncrypt.dll
2012-10-09 01:33 . 2011-11-16 16:23 72704 ----a-w- c:\windows\system32\secur32.dll
2012-10-09 01:33 . 2011-11-16 16:21 1259008 ----a-w- c:\windows\system32\lsasrv.dll
2012-10-09 01:33 . 2011-11-16 14:12 9728 ----a-w- c:\windows\system32\lsass.exe
2012-10-09 01:23 . 2012-06-02 22:19 53784 ----a-w- c:\windows\system32\wuauclt.exe
2012-10-09 01:23 . 2012-06-02 22:19 45080 ----a-w- c:\windows\system32\wups2.dll
2012-10-09 01:23 . 2012-06-02 22:12 2422272 ----a-w- c:\windows\system32\wucltux.dll
2012-10-09 01:23 . 2012-06-02 22:19 1933848 ----a-w- c:\windows\system32\wuaueng.dll
2012-10-09 01:23 . 2012-06-02 22:19 35864 ----a-w- c:\windows\system32\wups.dll
2012-10-09 01:23 . 2012-06-02 22:19 577048 ----a-w- c:\windows\system32\wuapi.dll
2012-10-09 01:23 . 2012-06-02 22:12 88576 ----a-w- c:\windows\system32\wudriver.dll
2012-10-09 01:22 . 2012-06-02 22:19 171904 ----a-w- c:\windows\system32\wuwebv.dll
2012-10-09 01:22 . 2012-06-02 22:12 33792 ----a-w- c:\windows\system32\wuapp.exe
2012-10-07 23:56 . 2012-10-07 23:56 -------- d-----w- c:\users\AB\AppData\Local\Apple Computer
2012-10-07 19:14 . 2012-10-07 19:14 -------- d-----w- c:\windows\system32\ca-ES
2012-10-07 19:14 . 2012-10-07 19:14 -------- d-----w- c:\windows\system32\eu-ES
2012-10-07 19:14 . 2012-10-07 19:14 -------- d-----w- c:\windows\system32\vi-VN
2012-10-07 18:58 . 2012-10-07 18:58 -------- d-----w- c:\windows\system32\EventProviders
2012-10-07 18:56 . 2009-04-11 06:28 344064 ----a-w- c:\windows\system32\msrd3x40.dll
2012-10-07 18:55 . 2009-04-11 06:28 140288 ----a-w- c:\windows\system32\wpcsvc.dll
2012-10-05 14:06 . 2012-08-30 08:17 6980552 ----a-w- c:\programdata\Microsoft\Windows Defender\Definition Updates\{7883FA77-5C7F-4A8D-BD12-5451ACB2E954}\mpengine.dll
2012-10-05 14:02 . 2012-10-05 14:02 94208 --sha-r- c:\windows\system32\nsisvcz.dll
2012-09-27 14:16 . 2012-09-27 14:16 -------- d-----w- c:\program files\Common Files\Apple
2012-09-27 14:16 . 2012-09-27 14:16 -------- d-----w- c:\users\AB\AppData\Local\Apple
2012-09-27 14:16 . 2012-09-27 14:16 -------- d-----w- c:\programdata\Apple
.
.
.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2012-10-13 19:10 . 2012-07-25 21:53 25944 ----a-w- c:\windows\system32\drivers\klmouflt.sys
2012-10-13 19:10 . 2012-05-26 02:38 25944 ----a-w- c:\windows\system32\drivers\klkbdflt.sys
2012-10-09 01:46 . 2012-10-09 01:46 4096 ----a-w- c:\windows\system32\drivers\en-US\dxgkrnl.sys.mui
2012-08-13 23:49 . 2012-08-13 23:49 144344 ----a-w- c:\windows\system32\drivers\kneps.sys
2012-08-02 22:09 . 2012-08-02 22:09 24408 ----a-w- c:\windows\system32\drivers\klim6.sys
2012-07-31 18:33 . 2012-09-05 00:23 88688 ----a-w- c:\windows\system32\cpwmon2k.dll
2012-10-12 14:08 . 2012-08-22 01:08 261600 ----a-w- c:\program files\mozilla firefox\components\browsercomps.dll
.
.
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4
.
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"SUPERAntiSpyware"="c:\program files\SUPERAntiSpyware\SUPERAntiSpyware.exe" [2012-10-16 4762496]
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"Apoint"="c:\program files\DellTPad\Apoint.exe" [2007-09-07 159744]
"OEM02Mon.exe"="c:\windows\OEM02Mon.exe" [2007-08-28 36864]
"IgfxTray"="c:\windows\system32\igfxtray.exe" [2008-03-06 141848]
"HotKeysCmds"="c:\windows\system32\hkcmd.exe" [2008-03-06 166424]
"Persistence"="c:\windows\system32\igfxpers.exe" [2008-03-06 133656]
"DELL Webcam Manager"="c:\program files\Dell\Dell Webcam Manager\DellWMgr.exe" [2007-07-27 118784]
"IAAnotif"="c:\program files\Intel\Intel Matrix Storage Manager\Iaanotif.exe" [2007-03-21 174872]
"Broadcom Wireless Manager UI"="c:\windows\system32\WLTRAY.exe" [2007-12-12 3444736]
"Adobe Reader Speed Launcher"="c:\program files\Adobe\Reader 8.0\Reader\Reader_sl.exe" [2007-05-11 40048]
"Google Desktop Search"="c:\program files\Google\Google Desktop Search\GoogleDesktop.exe" [2008-04-12 1838592]
"dscactivate"="c:\program files\Dell Support Center\gs_agent\custom\dsca.exe" [2008-02-14 16384]
"PCMService"="c:\program files\Dell\MediaDirect\PCMService.exe" [2007-11-01 189736]
"APSDaemon"="c:\program files\Common Files\Apple\Apple Application Support\APSDaemon.exe" [2012-02-21 59240]
"SigmatelSysTrayApp"="c:\program files\SigmaTel\C-Major Audio\WDM\sttray.exe" [2007-11-12 405504]
"AVP"="c:\program files\Kaspersky Lab\Kaspersky Anti-Virus 2013\avp.exe" [2012-08-18 218880]
.
c:\programdata\Microsoft\Windows\Start Menu\Programs\Startup\
Digital Line Detect.lnk - c:\program files\Digital Line Detect\DLG.exe [2008-4-12 50688]
QuickSet.lnk - c:\program files\Dell\QuickSet\quickset.exe [2007-9-7 1180952]
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\system]
"ConsentPromptBehaviorAdmin"= 1 (0x1)
"EnableLUA"= 0 (0x0)
"EnableUIADesktopToggle"= 0 (0x0)
.
[hkey_local_machine\software\microsoft\windows\currentversion\explorer\ShellExecuteHooks]
"{5AE067D3-9AFB-48E0-853A-EBB7F4A000DA}"= "c:\program files\SUPERAntiSpyware\SASSEH.DLL" [2011-07-19 113024]
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\windows]
"AppInit_DLLs"=c:\progra~1\Google\GOOGLE~2\GoogleDesktopNetwork3.dll
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\!SASCORE]
@=""
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\Wdf01000.sys]
@="Driver"
.
[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring]
"DisableMonitoring"=dword:00000001
.
[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\KasperskyAntiVirus]
"DisableMonitoring"=dword:00000001
.
[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecAntiVirus]
"DisableMonitoring"=dword:00000001
.
[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecFirewall]
"DisableMonitoring"=dword:00000001
.
S2 !SASCORE;SAS Core Service;c:\program files\SUPERAntiSpyware\SASCORE.EXE [x]
S2 AESTFilters;Andrea ST Filters Service;c:\windows\system32\aestsrv.exe [x]
.
.
--- Other Services/Drivers In Memory ---
.
*NewlyCreated* - WS2IFSL
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\svchost]
LocalServiceAndNoImpersonation REG_MULTI_SZ FontCache
.
Contents of the 'Scheduled Tasks' folder
.
2012-10-20 c:\windows\Tasks\Iwykvlglt.job
- c:\windows\system32\nsisvcz.dll [2012-10-05 14:02]
.
.
------- Supplementary Scan -------
.
uStart Page = hxxp://www.google.com/ig/dell?hl=en&client=dell-usuk&channel=us&ibd=3080412
TCP: DhcpNameServer = 192.168.0.1
FF - ProfilePath - c:\users\AB\AppData\Roaming\Mozilla\Firefox\Profiles\7dmfqdhk.default\
FF - prefs.js: browser.startup.homepage - hxxp://www.google.com/webhp?complete=0&hl=en
FF - ExtSQL: 2012-08-21 15:58; {20a82645-c095-46ed-80e3-08825760534b}; c:\windows\Microsoft.NET\Framework\v3.5\Windows Presentation Foundation\DotNetAssistantExtension
FF - ExtSQL: 2012-08-22 16:40; {b9db16a4-6edc-47ec-a1f4-b86292ed211d}; c:\users\AB\AppData\Roaming\Mozilla\Firefox\Profiles\7dmfqdhk.default\extensions\{b9db16a4-6edc-47ec-a1f4-b86292ed211d}
FF - ExtSQL: 2012-08-23 17:41; {d40f5e7b-d2cf-4856-b441-cc613eeffbe3}; c:\users\AB\AppData\Roaming\Mozilla\Firefox\Profiles\7dmfqdhk.default\extensions\{d40f5e7b-d2cf-4856-b441-cc613eeffbe3}.xpi
FF - ExtSQL: 2012-08-24 10:38; {d10d0bf8-f5b5-c8b4-a8b2-2b9879e08c5d}; c:\users\AB\AppData\Roaming\Mozilla\Firefox\Profiles\7dmfqdhk.default\extensions\{d10d0bf8-f5b5-c8b4-a8b2-2b9879e08c5d}.xpi
FF - ExtSQL: 2012-09-27 06:39; {e4a8a97b-f2ed-450b-b12d-ee082ba24781}; c:\users\AB\AppData\Roaming\Mozilla\Firefox\Profiles\7dmfqdhk.default\extensions\{e4a8a97b-f2ed-450b-b12d-ee082ba24781}.xpi
FF - ExtSQL: 2012-10-13 11:16; content_blocker@kaspersky.com; c:\program files\Kaspersky Lab\Kaspersky Anti-Virus 2013\FFExt\content_blocker@kaspersky.com
FF - ExtSQL: 2012-10-13 11:17; url_advisor@kaspersky.com; c:\program files\Kaspersky Lab\Kaspersky Anti-Virus 2013\FFExt\url_advisor@kaspersky.com
FF - ExtSQL: 2012-10-13 11:17; virtual_keyboard@kaspersky.com; c:\program files\Kaspersky Lab\Kaspersky Anti-Virus 2013\FFExt\virtual_keyboard@kaspersky.com
.
.
**************************************************************************
.
catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2012-10-20 12:28
Windows 6.0.6002 Service Pack 2 NTFS
.
scanning hidden processes ...
.
scanning hidden autostart entries ...
.
scanning hidden files ...
.
scan completed successfully
hidden files: 0
.
**************************************************************************
.
Completion time: 2012-10-20 12:33:22
ComboFix-quarantined-files.txt 2012-10-20 19:33
ComboFix2.txt 2012-10-20 16:52
.
Pre-Run: 188,392,140,800 bytes free
Post-Run: 188,360,888,320 bytes free
.
- - End Of File - - E40E77632117D16D5AEF63E572E9C6A6




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users