Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Win32/olmasco.AD trojan present in Operating memory


  • This topic is locked This topic is locked
36 replies to this topic

#1 sohash

sohash

  • Members
  • 24 posts
  • OFFLINE
  •  
  • Local time:10:18 AM

Posted 14 November 2012 - 01:48 AM

Hi,
My system was recently infected which got cleaned a week ago. But looks like it did not get cleaned completely as ESET antivirus caught the folowing trojan as per the log

Operating memory a variant of Win32/Olmasco.AD trojan


This was not caught by AntiMalware or Spybot or Symantec. But anyways , EST is not able to clean it.
So I tried to run TDSSKiller but that doesnt start . I tried multiple versions of TDSSKiller but none started. I even ran Rkill and the restarted the machine and again tried to run TDSSKiller but it doesnt work .

This is causing the redirect of websites in my browser. Also when I start the computer , I can see 2-3 batch program run (black windows) and then the window closes.
Can anybody pls help what needs to be done to remove this type of trojan

Thanks in advance.

BC AdBot (Login to Remove)

 


#2 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:08:18 PM

Posted 14 November 2012 - 01:57 AM

Greetings and Welcome to The Forums!!

My name is Gringo and I'll be glad to help you with your malware problems.

I have put together somethings for you to keep in mind while I am helping you to make things go easier and faster for both of us

  • Please do not run any tools unless instructed to do so.
    • We ask you to run different tools in a specific order to ensure the malware is completely removed from your machine, and running any additional tools may detect false positives, interfere with our tools, or cause unforeseen damage or system instability.
  • Please do not attach logs or use code boxes, just copy and paste the text.
    • Due to the high volume of logs we receive it helps to receive everything in the same format, and code boxes make the logs very difficult to read. Also, attachments require us to download and open the reports when it is easier to just read the reports in your post.
  • Please read every post completely before doing anything.
    • Pay special attention to the NOTE: lines, these entries identify an individual issue or important step in the cleanup process.
  • Please provide feedback about your experience as we go.
    • A short statement describing how the computer is working helps us understand where to go next, for example: I am still getting redirected, the computer is running normally, etc. Please do not describe the computer as "the same", this requires the extra step of looking back at your previous post.
NOTE: At the top of your post, click on the Watch Topic Button, select Immediate Notification, and click on Proceed. This will send you an e-mail as soon as I reply to your topic, allowing us to resolve the issue faster.

NOTE: Backup any files that cannot be replaced. Removing malware can be unpredictable and this step can save a lot of heartaches if things don't go as planed. You can put them on a CD/DVD, external drive or a pen drive, anywhere except on the computer.

NOTE: It is good practice to copy and paste the instructions into notepad and print them in case it is necessary for you to go offline during the cleanup process. To open notepad, navigate to Start Menu > All Programs > Accessories > Notepad. Please remember to copy the entire post so you do not miss any instructions.




I need to get some reports to get a base to start from so I need you to run these programs first.


-DeFogger-

  • Please download DeFogger to your desktop.

    Double click DeFogger to run the tool.
  • The application window will appear
  • Click the Disable button to disable your CD Emulation drivers
  • Click Yes to continue
  • A 'Finished!' message will appear
  • Click OK
  • DeFogger may ask you to reboot the machine, if it does - click OK
Do not re-enable these drivers until otherwise instructed.


-Security Check-

  • Download Security Check by screen317 from here.
  • Save it to your Desktop.
  • Double click SecurityCheck.exe and follow the onscreen instructions inside of the black box.
  • A Notepad document should open automatically called checkup.txt; please post the contents of that document.


-Download DDS-

  • Please download DDS from one of the links below and save it to your desktop:

    Posted Image
    Download DDS and save it to your desktop

    Link1
    Link2
    Link3


    • Double-Click on dds.scr and a command window will appear. This is normal.
    • Shortly after two logs will appear:
    • DDS.txt
    • Attach.txt
  • A window will open instructing you save & post the logs
  • Save the logs to a convenient place such as your desktop
  • Copy the contents of both logs & post in your next reply

information and logs

  • In your next post I need the following

  • both reports from DDS
  • report from security check
  • let me know of any problems you may have had

Gringo

I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#3 sohash

sohash
  • Topic Starter

  • Members
  • 24 posts
  • OFFLINE
  •  
  • Local time:10:18 AM

Posted 14 November 2012 - 02:20 AM

Thanks Gringo for taking this up.
Will be posting the logs shortly.

#4 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:08:18 PM

Posted 14 November 2012 - 02:24 AM

OK good I will be around for a little while longer


gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#5 sohash

sohash
  • Topic Starter

  • Members
  • 24 posts
  • OFFLINE
  •  
  • Local time:10:18 AM

Posted 14 November 2012 - 02:27 AM

Will be pasting the logs in the replies
(Also while running Security check - got a small window opened saying " Line -1 ; Error : Variable must be of type object". After pressing OK it went fine

#6 sohash

sohash
  • Topic Starter

  • Members
  • 24 posts
  • OFFLINE
  •  
  • Local time:10:18 AM

Posted 14 November 2012 - 02:28 AM

DDS LOG
_________
__________



DDS (Ver_2012-11-07.01) - NTFS_x86
Internet Explorer: 9.0.8112.16450 BrowserJavaVersion: 1.6.0_22
Run by Ashutosh.Sohani at 12:47:34 on 2012-11-14
.
============== Running Processes ================
.
C:\Windows\system32\wininit.exe
C:\Windows\system32\lsm.exe
C:\Program Files\Symantec\Symantec Endpoint Protection\Smc.exe
C:\Program Files\Common Files\Symantec Shared\ccSvcHst.exe
C:\Windows\System32\spoolsv.exe
C:\Program Files\Common Files\Adobe\ARM\1.0\armsvc.exe
C:\Program Files\Microsoft\BingBar\7.1.391.0\BBSvc.exe
C:\Windows\system32\DWRCS.EXE
C:\ProgramData\DatacardService\HWDeviceService.exe
C:\ProgramData\Skype\Toolbars\Skype C2C Service\c2c_service.exe
C:\Program Files\HCL\SoftScan\Ws_Softscan.exe
C:\Program Files\Symantec\Symantec Endpoint Protection\Rtvscan.exe
C:\Program Files\Spybot - Search & Destroy\SDWinSec.exe
C:\Windows\System32\alg.exe
C:\Windows\system32\DWRCST.exe
C:\Windows\system32\taskhost.exe
C:\Windows\system32\Dwm.exe
C:\Windows\Explorer.EXE
C:\Program Files\Symantec\Symantec Endpoint Protection\SmcGui.exe
C:\ProgramData\DatacardService\DCSHelper.exe
C:\Program Files\Common Files\Symantec Shared\ccApp.exe
C:\Program Files\Synaptics\SynTP\SynTPEnh.exe
C:\Program Files\Microsoft Lync\communicator.exe
C:\Program Files\Synaptics\SynTP\SynTPHelper.exe
C:\Windows\system32\SearchIndexer.exe
C:\Program Files\Mozilla Firefox\firefox.exe
C:\Program Files\Mozilla Firefox\plugin-container.exe
C:\Windows\system32\Macromed\Flash\FlashPlayerPlugin_11_4_402_287.exe
C:\Windows\system32\Macromed\Flash\FlashPlayerPlugin_11_4_402_287.exe
C:\Program Files\Microsoft\BingBar\7.1.391.0\SeaPort.exe
C:\Windows\system32\SearchProtocolHost.exe
C:\Windows\system32\SearchFilterHost.exe
C:\Windows\system32\conhost.exe
C:\Windows\system32\svchost.exe -k DcomLaunch
C:\Windows\system32\svchost.exe -k RPCSS
C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted
C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted
C:\Windows\system32\svchost.exe -k netsvcs
C:\Windows\system32\svchost.exe -k LocalService
C:\Windows\system32\svchost.exe -k NetworkService
C:\Windows\system32\svchost.exe -k LocalServiceNoNetwork
C:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted
C:\Windows\system32\svchost.exe -k imgsvc
C:\Windows\System32\svchost.exe -k secsvcs
C:\Windows\system32\svchost.exe -k bthsvcs
C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation
C:\Windows\system32\svchost.exe -k defragsvc
.
============== Pseudo HJT Report ===============
.
uStart Page = about:blank
BHO: Adobe PDF Link Helper: {18DF081C-E8AD-4283-A596-FA578C2EBDC3} - c:\program files\common files\adobe\acrobat\activex\AcroIEHelperShim.dll
BHO: Lync Browser Helper: {31D09BA0-12F5-4CCE-BE8A-2923E76605DA} - c:\program files\microsoft lync\OCHelper.dll
BHO: Spybot-S&D IE Protection: {53707962-6F74-2D53-2644-206D7942484F} - c:\program files\spybot - search & destroy\SDHelper.dll
BHO: SSVHelper Class: {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - f:\java1.6\jre6\bin\ssv.dll
BHO: Skype Browser Helper: {AE805869-2E5C-4ED4-8F7B-F1F7851A4497} - c:\program files\skype\toolbars\internet explorer\skypeieplugin.dll
BHO: Bing Bar Helper: {d2ce3e00-f94a-4740-988e-03dc2f38c34f} - c:\program files\microsoft\bingbar\7.1.391.0\BingExt.dll
BHO: Java™ Plug-In 2 SSV Helper: {DBC80044-A445-435b-BC74-9C25C1C588A9} - f:\java1.6\jre6\bin\jp2ssv.dll
TB: Bing Bar: {8dcb7100-df86-4384-8842-8fa844297b3f} -
mRun: [ccApp] "c:\program files\common files\symantec shared\ccApp.exe"
mRun: [SynTPEnh] c:\program files\synaptics\syntp\SynTPEnh.exe
mRun: [Communicator] "c:\program files\microsoft lync\communicator.exe" /fromrunkey
mRun: [Adobe ARM] "c:\program files\common files\adobe\arm\1.0\AdobeARM.exe"
mRun: [DameWare MRC Agent] c:\windows\system32\DWRCST.exe
uPolicies-Explorer: NoDriveTypeAutoRun = dword:145
uPolicies-Explorer: NoDrives = dword:0
mPolicies-Explorer: NoDriveTypeAutoRun = dword:255
mPolicies-Explorer: NoAutorun = dword:1
mPolicies-Explorer: NoDrives = dword:0
mPolicies-System: ConsentPromptBehaviorAdmin = dword:0
mPolicies-System: ConsentPromptBehaviorUser = dword:3
mPolicies-System: EnableLUA = dword:0
mPolicies-System: EnableUIADesktopToggle = dword:0
mPolicies-System: PromptOnSecureDesktop = dword:0
mPolicies-System: dontdisplaylastusername = dword:1
mPolicies-System: legalnoticecaption = !!WARNING!!
mPolicies-System: legalnoticetext = The computer you are about to log on and the associated network/other
resources are intended for use by company authorized personnel only The
company reserves the right to intercept,monitor,capture,audit,inspect and disclose
any or all users of this system,associated resources and the files there-in.
Captured usage data is likely to be utilized for computer forensics and tendered
as legal evidence. Unauthorized or improper use of this system may lead to
administrative and disciplinary action. Improper use may result in the
company commencing appropriate civil and criminal proceedings,
as may be advised. By using this system, the user consents to the above
terms and conditions of use.
IE: E&xport to Microsoft Excel - c:\progra~1\micros~1\office12\EXCEL.EXE/3000
IE: {31D09BA0-12F5-4CCE-BE8A-2923E76605DA} - {31D09BA0-12F5-4CCE-BE8A-2923E76605DA} - c:\program files\microsoft lync\OCHelper.dll
IE: {898EA8C8-E7FF-479B-8935-AEC46303B9E5} - {898EA8C8-E7FF-479B-8935-AEC46303B9E5} - c:\program files\skype\toolbars\internet explorer\skypeieplugin.dll
IE: {92780B25-18CC-41C8-B9BE-3C9C571A8263} - {FF059E31-CC5A-4E2E-BF3B-96E929D65503}
IE: {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - {53707962-6F74-2D53-2644-206D7942484F} - c:\program files\spybot - search & destroy\SDHelper.dll
Trusted Zone: hcl.com
Trusted Zone: hcl.com
Trusted Zone: hcl.in
Trusted Zone: hcl.in
Trusted Zone: myhcl.com
Trusted Zone: myhcl.com
Trusted Zone: myhcl.in
Trusted Zone: myhcl.in
Trusted Zone: nda-hclt-cer
DPF: {166B1BCA-3F9C-11CF-8075-444553540000} - hxxp://download.macromedia.com/pub/shockwave/cabs/director/sw.cab
DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_22-windows-i586.cab
DPF: {CAFEEFAC-0015-0000-0013-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.5.0/jinstall-1_5_0_13-windows-i586.cab
DPF: {CAFEEFAC-0016-0000-0022-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_22-windows-i586.cab
DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_22-windows-i586.cab
DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} - hxxp://fpdownload2.macromedia.com/get/shockwave/cabs/flash/swflash.cab
DPF: {E06E2E99-0AA1-11D4-ABA6-0060082AA75C} - hxxps://alfresco.webex.com/client/T27LB/nbr/ieatgpc1.cab
TCP: NameServer = 192.168.0.1 192.168.0.1
TCP: Interfaces\{4286F2FE-4C6B-42B3-92A3-BFA589921DD8} : DHCPNameServer = 192.168.0.1 192.168.0.1
TCP: Interfaces\{4286F2FE-4C6B-42B3-92A3-BFA589921DD8}\163786 : DHCPNameServer = 192.168.1.1
TCP: Interfaces\{4286F2FE-4C6B-42B3-92A3-BFA589921DD8}\8434C40234F42505 : DHCPNameServer = 10.113.96.113 10.113.96.114 10.137.13.100
TCP: Interfaces\{4286F2FE-4C6B-42B3-92A3-BFA589921DD8}\8434C445D27474E4 : DHCPNameServer = 10.113.71.54 10.113.26.54
TCP: Interfaces\{4286F2FE-4C6B-42B3-92A3-BFA589921DD8}\E424D4C4 : DHCPNameServer = 192.168.1.1
TCP: Interfaces\{F34A4E83-FD33-465F-B515-AB759EF7A999} : DHCPNameServer = 192.168.42.129
Handler: skype-ie-addon-data - {91774881-D725-4E58-B298-07617B9B86A8} - c:\program files\skype\toolbars\internet explorer\skypeieplugin.dll
Handler: skype4com - {FFC8B962-9B40-4DFF-9458-1830C7DD7F5D} - c:\program files\common files\skype\Skype4COM.dll
.
================= FIREFOX ===================
.
FF - ProfilePath - c:\users\ashutosh.sohani\appdata\roaming\mozilla\firefox\profiles\0rq5t2vj.default\
FF - prefs.js: browser.startup.homepage - hxxp://www.myhcl.in/
FF - prefs.js: keyword.URL - hxxp://www.google.com/search?ie=UTF-8&oe=UTF-8&sourceid=navclient&gfns=1&q=
FF - prefs.js: network.proxy.type - 0
FF - plugin: c:\program files\adobe\reader 10.0\reader\air\nppdf32.dll
FF - plugin: c:\program files\common files\research in motion\bbwebsllauncher\NPWebSLLauncher.dll
FF - plugin: c:\program files\google\update\1.3.21.123\npGoogleUpdate3.dll
FF - plugin: c:\program files\microsoft silverlight\4.1.10329.0\npctrlui.dll
FF - plugin: c:\program files\mozilla firefox\plugins\npMeetingJoinPluginOC.dll
FF - plugin: c:\program files\research in motion limited\blackberry app world browser plugin\npappworld.dll
FF - plugin: c:\program files\unity\webplayer\loader\npUnity3D32.dll
FF - plugin: c:\windows\system32\macromed\flash\NPSWF32_11_4_402_287.dll
FF - plugin: f:\java1.6\jre6\bin\new_plugin\npdeployJava1.dll
FF - plugin: f:\java1.6\jre6\bin\new_plugin\npjp2.dll
FF - ExtSQL: 2012-10-07 19:01; {82AF8DCA-6DE9-405D-BD5E-43525BDAD38A}; c:\program files\mozilla firefox\extensions\{82AF8DCA-6DE9-405D-BD5E-43525BDAD38A}
FF - ExtSQL: 2012-11-09 08:14; jid1-yZwVFzbsyfMrqQ@jetpack; c:\users\ashutosh.sohani\appdata\roaming\mozilla\firefox\profiles\0rq5t2vj.default\extensions\jid1-yZwVFzbsyfMrqQ@jetpack
.
============= SERVICES / DRIVERS ===============
.
.
=============== Created Last 30 ================
.
2012-11-14 02:51:22 -------- d-----w- c:\program files\Mozilla Maintenance Service
2012-11-14 02:51:17 588728 ----a-w- c:\program files\mozilla firefox\gkmedias.dll
2012-11-14 02:51:17 43960 ----a-w- c:\program files\mozilla firefox\mozglue.dll
2012-11-14 02:51:17 157352 ----a-w- c:\program files\mozilla firefox\maintenanceservice_installer.exe
2012-11-14 02:51:17 129976 ----a-w- c:\program files\mozilla firefox\maintenanceservice.exe
2012-11-13 11:13:26 -------- d-----w- c:\program files\ESET
2012-11-13 10:14:12 -------- d-sh--w- C:\$RECYCLE.BIN
2012-11-13 09:09:26 208896 ----a-w- c:\windows\MBR.exe
2012-11-13 09:09:25 98816 ----a-w- c:\windows\sed.exe
2012-11-13 09:09:25 256000 ----a-w- c:\windows\PEV.exe
2012-11-13 09:08:20 -------- d-----w- C:\ComboFix
2012-11-10 21:25:23 -------- d-----w- c:\programdata\Spybot - Search & Destroy
2012-11-10 21:25:23 -------- d-----w- c:\program files\Spybot - Search & Destroy
2012-11-10 09:38:22 388096 ----a-r- c:\users\ashutosh.sohani\appdata\roaming\microsoft\installer\{45a66726-69bc-466b-a7a4-12fcba4883d7}\HiJackThis.exe
2012-11-10 09:38:21 -------- d-----w- c:\program files\Trend Micro
2012-11-10 01:15:13 26624 ----a-w- c:\windows\system32\drivers\ew_juextctrl.sys
2012-11-10 01:15:13 186880 ----a-w- c:\windows\system32\drivers\ew_juwwanecm.sys
2012-11-10 01:15:11 89856 ----a-w- c:\windows\system32\drivers\ew_jucdcacm.sys
2012-11-10 01:15:11 861696 ----a-w- c:\windows\system32\drivers\mod7700.sys
2012-11-10 01:15:11 73984 ----a-w- c:\windows\system32\drivers\ew_jubusenum.sys
2012-11-10 01:15:11 66688 ----a-w- c:\windows\system32\drivers\ew_jucdcecm.sys
2012-11-10 01:15:11 350720 ----a-w- c:\windows\system32\drivers\ewusbwwan.sys
2012-11-10 01:15:11 25856 ----a-w- c:\windows\system32\drivers\ewdcsc.sys
2012-11-10 01:15:11 195200 ----a-w- c:\windows\system32\drivers\ewusbmdm.sys
2012-11-10 01:15:11 19200 ----a-w- c:\windows\system32\drivers\ew_hwupgrade.sys
2012-11-10 01:15:11 11136 ----a-w- c:\windows\system32\drivers\ew_usbenumfilter.sys
2012-11-10 01:15:11 102784 ----a-w- c:\windows\system32\drivers\ew_hwusbdev.sys
2012-11-09 03:14:21 -------- d-----w- c:\users\ashutosh.sohani\appdata\roaming\LavasoftStatistics
2012-11-09 02:44:29 -------- d-----w- c:\program files\Toolbar Cleaner
2012-11-08 20:27:07 -------- d-----w- c:\users\ashutosh.sohani\appdata\roaming\Bitmeter2
2012-11-08 20:27:07 -------- d-----w- c:\programdata\Bitmeter2
2012-11-08 20:27:06 -------- d-----w- c:\program files\Codebox
2012-11-07 03:40:38 -------- d-----w- c:\users\ashutosh.sohani\appdata\local\temp
2012-11-03 07:40:57 -------- d-----w- c:\program files\CCleaner
2012-11-03 06:48:10 -------- d-----w- c:\users\ashutosh.sohani\appdata\roaming\Malwarebytes
2012-11-03 06:47:28 -------- d-----w- c:\programdata\Malwarebytes
2012-11-03 06:47:25 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
2012-11-02 23:32:27 9575864 ----a-w- c:\windows\system32\FlashPlayerInstaller.exe
2012-11-02 23:19:48 -------- d-----w- c:\users\ashutosh.sohani\appdata\local\Macromedia
2012-11-02 22:52:58 696760 ----a-w- c:\windows\system32\FlashPlayerApp.exe
.
==================== Find3M ====================
.
2012-11-02 23:32:34 73656 ----a-w- c:\windows\system32\FlashPlayerCPLApp.cpl
2012-10-04 20:03:00 174056 ----a-w- c:\windows\system32\drivers\wpshelper.sys
2012-09-20 04:35:36 83168 ----a-w- c:\windows\system32\drivers\ssudbus.sys
2012-09-20 04:35:36 181344 ----a-w- c:\windows\system32\drivers\ssudserd.sys
2012-09-20 04:35:36 181344 ----a-w- c:\windows\system32\drivers\ssudmdm.sys
2012-08-24 06:59:17 1800704 ----a-w- c:\windows\system32\jscript9.dll
2012-08-24 06:51:27 1129472 ----a-w- c:\windows\system32\wininet.dll
2012-08-24 06:51:02 1427968 ----a-w- c:\windows\system32\inetcpl.cpl
2012-08-24 06:47:26 142848 ----a-w- c:\windows\system32\ieUnatt.exe
2012-08-24 06:47:12 420864 ----a-w- c:\windows\system32\vbscript.dll
2012-08-24 06:43:58 2382848 ----a-w- c:\windows\system32\mshtml.tlb
.
============= FINISH: 12:51:02.00 ===============

#7 sohash

sohash
  • Topic Starter

  • Members
  • 24 posts
  • OFFLINE
  •  
  • Local time:10:18 AM

Posted 14 November 2012 - 02:30 AM

ATTACH.TXT LOG
______

.
UNLESS SPECIFICALLY INSTRUCTED, DO NOT POST THIS LOG.
IF REQUESTED, ZIP IT UP & ATTACH IT
.
DDS (Ver_2012-11-07.01)
.
.
==== Disk Partitions =========================
.
.
==== Disabled Device Manager Items =============
.
==== System Restore Points ===================
.
No restore point in system.
.
==== Installed Programs ======================
.
Update for Microsoft Office 2007 (KB2508958)
32 Bit HP BiDi Channel Components Installer
7-Zip 4.65
ActiveCheck component for HP Active Support Library
Adobe AIR
Adobe Flash Player 11 ActiveX
Adobe Flash Player 11 Plugin
Adobe Reader X (10.1.4)
Adobe Shockwave Player 11.5
airtel
Aptana Studio 3
Bing Bar
BitMeter
BlackBerry App World Browser Plugin
BlackBerry Desktop Software 6.0.1
CamStudio
CamStudio OSS Desktop Recorder
CCleaner
Cisco EAP-FAST Module
Cisco LEAP Module
Cisco PEAP Module
Code Head Calculated Risk
Configuration Manager Client
Contact Mgr
Dia (remove only)
ESET Online Scanner v3
FileZilla Client 3.5.2
GIMP 2.6.11
Google Chrome
Google Update Helper
GoToMeeting 5.0.0.799
HeidiSQL 5.1
HiJackThis
Hotfix for Office (KB2475891)
HP BatteryCheck 1.00 A7
HP Customer Experience Enhancements
HPAsset component for HP Active Support Library
Illumination Software Creator version 4.3
Inkscape 0.48.2
IrfanView (remove only)
J2SE Runtime Environment 5.0 Update 13
Java Auto Updater
Java DB 10.5.3.0
Java™ 6 Update 22
Java™ SE Development Kit 6 Update 16
Java™ SE Development Kit 6 Update 20
JumpStart 4th Grade
LiveUpdate 3.3 (Symantec Corporation)
Luke - Lucene Index Toolbox
Malwarebytes Anti-Malware version 1.65.1.1000
Microsoft Conferencing Add-in for Microsoft Office Outlook
Microsoft Lync 2010
Microsoft Office 2007 Service Pack 2 (SP2)
Microsoft Office Access MUI (English) 2007
Microsoft Office Access Setup Metadata MUI (English) 2007
Microsoft Office Excel MUI (English) 2007
Microsoft Office InfoPath MUI (English) 2007
Microsoft Office Live Meeting 2007
Microsoft Office Outlook MUI (English) 2007
Microsoft Office PowerPoint MUI (English) 2007
Microsoft Office Professional Plus 2007
Microsoft Office Proof (English) 2007
Microsoft Office Proof (French) 2007
Microsoft Office Proof (Spanish) 2007
Microsoft Office Proofing (English) 2007
Microsoft Office Proofing Tools 2007 Service Pack 2 (SP2)
Microsoft Office Publisher MUI (English) 2007
Microsoft Office Shared MUI (English) 2007
Microsoft Office Shared Setup Metadata MUI (English) 2007
Microsoft Office Word MUI (English) 2007
Microsoft Silverlight
Microsoft Visual C++ 2005 Redistributable
Microsoft Visual C++ 2008 Redistributable - x86 9.0.21022
Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729.17
Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729.4148
Microsoft_VC90_CRT_x86
Mozilla Firefox 12.0 (x86 en-US)
Mozilla Maintenance Service
MSVC80_x86_v2
MSVC90_x86
MSXML 4.0 SP2 (KB925672)
MSXML 4.0 SP2 (KB954430)
MSXML 4.0 SP2 (KB973688)
MySQL Server 5.1
MySQL Tools for 5.0
MySQL Workbench 5.0 OSS
Notepad++
OpenERP 6.0
OpenERP 6.1
OpenERP GTK Client 6.0
OpenERP Server 6.0
OpenERP Server 6.1-1
OpenERP Web Client 6.0
PostgreSQL 8.4
Python 2.3 lxml-1.2
Python 2.3 pycairo-1.0.2
Python 2.3 pygtk-2.8.6
Python 2.3.5
REALTEK Wireless LAN Software
Safari
Samsung Kies
SAMSUNG USB Driver for Mobile Phones
Security Update for 2007 Microsoft Office System (KB2288621)
Security Update for 2007 Microsoft Office System (KB2553089)
Security Update for 2007 Microsoft Office System (KB2553090)
Security Update for Microsoft Office 2007 suites (KB2596615) 32-Bit Edition
Security Update for Microsoft Office 2007 suites (KB2596666) 32-Bit Edition
Security Update for Microsoft Office 2007 suites (KB2596672) 32-Bit Edition
Security Update for Microsoft Office 2007 suites (KB2596744) 32-Bit Edition
Security Update for Microsoft Office 2007 suites (KB2596754) 32-Bit Edition
Security Update for Microsoft Office 2007 suites (KB2596785) 32-Bit Edition
Security Update for Microsoft Office 2007 suites (KB2596792) 32-Bit Edition
Security Update for Microsoft Office 2007 suites (KB2596856) 32-Bit Edition
Security Update for Microsoft Office 2007 suites (KB2596871) 32-Bit Edition
Security Update for Microsoft Office 2007 suites (KB2596880) 32-Bit Edition
Security Update for Microsoft Office 2007 suites (KB2597162) 32-Bit Edition
Security Update for Microsoft Office 2007 suites (KB2597969) 32-Bit Edition
Security Update for Microsoft Office 2007 suites (KB2687441) 32-Bit Edition
Security Update for Microsoft Office Access 2007 (KB979440)
Security Update for Microsoft Office Excel 2007 (KB2597161) 32-Bit Edition
Security Update for Microsoft Office InfoPath 2007 (KB2510061)
Security Update for Microsoft Office InfoPath 2007 (KB2596786) 32-Bit Edition
Security Update for Microsoft Office PowerPoint 2007 (KB2596764) 32-Bit Edition
Security Update for Microsoft Office PowerPoint 2007 (KB2596912) 32-Bit Edition
Security Update for Microsoft Office Publisher 2007 (KB2596705) 32-Bit Edition
Security Update for Microsoft Office system 2007 (KB974234)
Security Update for Microsoft Office Visio Viewer 2007 (KB973709)
Security Update for Microsoft Office Word 2007 (KB2596917) 32-Bit Edition
Skype Click to Call
Skype™ 5.10
SMConverter 1.1.0
SMRecorder 1.2.4
SoftScan
Spybot - Search & Destroy
StyleEditor
Symantec Endpoint Protection
Synaptics Pointing Device Driver
Tata Photon+
Tersus Visual Programming Platform
TTSL Olive VME101 Dialer
Unity Web Player
Update for 2007 Microsoft Office System (KB967642)
Update for Outlook 2007 Junk Email Filter (KB2536413)
WampServer 2.0
WaveMaker
WebEx
WebEx Recorder and Player
XML Marker version 1.1
.
==== End Of File ===========================

SECURITY CHECK LOG
__________________



Results of screen317's Security Check version 0.99.54
Windows 7 x86 (UAC is disabled!)
Out of date service pack!!
Internet Explorer 9
``````````````Antivirus/Firewall Check:``````````````
Windows Firewall Enabled!
WMI entry may not exist for antivirus; attempting automatic update.
`````````Anti-malware/Other Utilities Check:`````````
Spybot - Search & Destroy
Malwarebytes Anti-Malware version 1.65.1.1000
CCleaner
Java DB 10.5.3.0
Java™ 6 Update 22
Java™ SE Development Kit 6 Update 16
Java™ SE Development Kit 6 Update 20
Java version out of Date!
Adobe Flash Player 11.4.402.287
Adobe Reader X (10.1.4)
Mozilla Firefox 12.0 Firefox out of Date!
Google Chrome 23.0.1271.64
````````Process Check: objlist.exe by Laurent````````
`````````````````System Health check`````````````````
Total Fragmentation on Drive C: 5%
````````````````````End of Log``````````````````````

#8 sohash

sohash
  • Topic Starter

  • Members
  • 24 posts
  • OFFLINE
  •  
  • Local time:10:18 AM

Posted 14 November 2012 - 02:34 AM

Also now and then , I can hear some audio file playing in background without me downloading it (Has happened atleast 2-3 times)

#9 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:08:18 PM

Posted 14 November 2012 - 03:07 AM

Hello


These are the programs I would like you to run next, if you have any problems with these just skip it and run the next one.


-AdwCleaner-

  • Please download AdwCleaner by Xplode onto your desktop.
  • Close all open programs and internet browsers.
  • Double click on AdwCleaner.exe to run the tool.
  • Click on Delete.
  • Confirm each time with Ok.
  • Your computer will be rebooted automatically. A text file will open after the restart.
  • Please post the content of that logfile with your next answer.
  • You can find the logfile at C:\AdwCleaner[S1].txt as well.

--RogueKiller--

  • Download & SAVE to your Desktop RogueKiller or from here
  • Quit all programs that you may have started.
  • Please disconnect any USB or external drives from the computer before you run this scan!
  • For Vista or Windows 7, right-click and select "Run as Administrator to start"
  • For Windows XP, double-click to start.
  • Wait until Prescan has finished ...
  • Then Click on "Scan" button
  • Wait until the Status box shows "Scan Finished"
  • click on "delete"
  • Wait until the Status box shows "Deleting Finished"
  • Click on "Report" and copy/paste the content of the Notepad into your next reply.
  • The log should be found in RKreport[1].txt on your Desktop
  • Exit/Close RogueKiller+

Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#10 sohash

sohash
  • Topic Starter

  • Members
  • 24 posts
  • OFFLINE
  •  
  • Local time:10:18 AM

Posted 14 November 2012 - 05:25 AM

ADWCLEANER log
_____________________




# AdwCleaner v2.007 - Logfile created 11/14/2012 at 15:40:12
# Updated 06/11/2012 by Xplode
# Operating system : Windows 7 Professional (32 bits)
# User : Ashutosh.Sohani - LP-D8D3852B1B7D
# Boot Mode : Normal
# Running from : C:\Users\Ashutosh.Sohani\Desktop\adwcleaner.exe
# Option [Delete]


***** [Services] *****


***** [Files / Folders] *****


***** [Registry] *****

Key Deleted : HKCU\Software\Conduit
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{66EEF543-A9AC-4A9D-AA3C-1ED148AC8EEE}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{BCFF5F55-6F44-11D2-86F8-00104B265ED5}
Key Deleted : HKLM\Software\Conduit
Key Deleted : HKLM\SOFTWARE\Software

***** [Internet Browsers] *****

-\\ Internet Explorer v9.0.8112.16421

[OK] Registry is clean.

-\\ Mozilla Firefox v12.0 (en-US)

Profile name : default
File : C:\Users\Ashutosh.Sohani\AppData\Roaming\Mozilla\Firefox\Profiles\0rq5t2vj.default\prefs.js

[OK] File is clean.

-\\ Google Chrome v [Unable to get version]

File : C:\Users\Ashutosh.Sohani\AppData\Local\Google\Chrome\User Data\Default\Preferences

[OK] File is clean.

*************************

AdwCleaner[S1].txt - [1162 octets] - [14/11/2012 15:40:12]

########## EOF - C:\AdwCleaner[S1].txt - [1222 octets] ##########

#11 sohash

sohash
  • Topic Starter

  • Members
  • 24 posts
  • OFFLINE
  •  
  • Local time:10:18 AM

Posted 14 November 2012 - 05:32 AM

Actually for RogueKiller , I got 4 logfiles.

I clicked on delete the first time and it again back with registry entries and I again clicked on delete (I hope I did it right).
For the third time I clicked on process tab and found that it already had killed a process so I tried to delete but there was no change

After that even though it shows Drivers and also in MBR shows fix MBR , I left it as it is.

Here is the first logfile for Roguekiller

RogueKiller V8.2.3 [11/07/2012] by Tigzy
mail: tigzyRK<at>gmail<dot>com
Feedback: http://www.geekstogo.com/forum/files/file/413-roguekiller/
Website: http://tigzy.geekstogo.com/roguekiller.php
Blog: http://tigzyrk.blogspot.com

Operating System: Windows 7 (6.1.7600 ) 32 bits version
Started in : Normal mode
User : Ashutosh.Sohani [Admin rights]
Mode : Scan -- Date : 11/14/2012 15:45:24

¤¤¤ Bad processes : 1 ¤¤¤
[SUSP PATH] DCSHelper.exe -- C:\ProgramData\DatacardService\DCSHelper.exe -> KILLED [TermProc]

¤¤¤ Registry Entries : 8 ¤¤¤
[HJPOL] HKLM\[...]\System : DisableRegistryTools (0) -> FOUND
[HJ] HKLM\[...]\System : ConsentPromptBehaviorAdmin (0) -> FOUND
[HJ] HKLM\[...]\System : EnableLUA (0) -> FOUND
[HJ DESK] HKCU\[...]\ClassicStartMenu : {59031a47-3f72-44a7-89c5-5595fe6b30ee} (1) -> FOUND
[HJ DESK] HKCU\[...]\ClassicStartMenu : {20D04FE0-3AEA-1069-A2D8-08002B30309D} (1) -> FOUND
[HJ DESK] HKCU\[...]\ClassicStartMenu : {645FF040-5081-101B-9F08-00AA002F954E} (1) -> FOUND
[HJ DESK] HKLM\[...]\NewStartPanel : {59031a47-3f72-44a7-89c5-5595fe6b30ee} (1) -> FOUND
[HJ DESK] HKLM\[...]\NewStartPanel : {20D04FE0-3AEA-1069-A2D8-08002B30309D} (1) -> FOUND

¤¤¤ Particular Files / Folders: ¤¤¤

¤¤¤ Driver : [LOADED] ¤¤¤
SSDT[13] : NtAlertResumeThread @ 0x83314069 -> HOOKED (Unknown @ 0x87B31958)
SSDT[14] : NtAlertThread @ 0x832C1DC6 -> HOOKED (Unknown @ 0x87B24758)
SSDT[19] : NtAllocateVirtualMemory @ 0x8328343B -> HOOKED (Unknown @ 0x87BE0378)
SSDT[59] : ExpInterlockedPopEntrySListResume @ 0x832AFF42 -> HOOKED (Unknown @ 0x87947D50)
SSDT[74] : NtCreateMutant @ 0x832B62C3 -> HOOKED (Unknown @ 0x87BFD178)
SSDT[87] : NtCreateThread @ 0x8331229A -> HOOKED (Unknown @ 0x87BE0CA8)
SSDT[131] : NtFreeVirtualMemory @ 0x830EA96D -> HOOKED (Unknown @ 0x87BE1B00)
SSDT[145] : NtImpersonateAnonymousToken @ 0x8322A048 -> HOOKED (Unknown @ 0x87B5DB10)
SSDT[147] : NtImpersonateThread @ 0x8328FCB3 -> HOOKED (Unknown @ 0x87B404A8)
SSDT[168] : NtMapViewOfSection @ 0x832B6585 -> HOOKED (Unknown @ 0x87BEBF08)
SSDT[177] : NtOpenEvent @ 0x832B8C15 -> HOOKED (Unknown @ 0x87B406D8)
SSDT[191] : NtOpenProcessToken @ 0x83273F11 -> HOOKED (Unknown @ 0x87B963E8)
SSDT[199] : NtOpenThreadToken @ 0x83273775 -> HOOKED (Unknown @ 0x87BF7A98)
SSDT[304] : NtResumeThread @ 0x832A967D -> HOOKED (Unknown @ 0x87B66778)
SSDT[316] : NtSetContextThread @ 0x83313B17 -> HOOKED (Unknown @ 0x87B89940)
SSDT[333] : NtSetInformationProcess @ 0x83284A35 -> HOOKED (Unknown @ 0x87BEB310)
SSDT[335] : NtSetInformationThread @ 0x832A0E22 -> HOOKED (Unknown @ 0x87BF7268)
SSDT[366] : NtSuspendProcess @ 0x83313FA3 -> HOOKED (Unknown @ 0x87B80338)
SSDT[367] : NtSuspendThread @ 0x832D0D04 -> HOOKED (Unknown @ 0x8797C5B8)
SSDT[370] : NtTerminateProcess @ 0x832991B5 -> HOOKED (Unknown @ 0x87B669A8)
SSDT[371] : NtTerminateThread @ 0x832ABF92 -> HOOKED (Unknown @ 0x87B725A8)
SSDT[385] : NtUnmapViewOfSection @ 0x832B338A -> HOOKED (Unknown @ 0x87B56488)
SSDT[399] : NtWriteVirtualMemory @ 0x832BEC63 -> HOOKED (Unknown @ 0x87BE1CB8)

¤¤¤ Infection : Root.MBR ¤¤¤

¤¤¤ HOSTS File: ¤¤¤
--> C:\Windows\system32\drivers\etc\hosts

127.0.0.1 localhost


¤¤¤ MBR Check: ¤¤¤

+++++ PhysicalDrive0: +++++
--- User ---
[MBR] b82537d53728360bb3338f21a36c4489
[BSP] 6cc8b66dcb99ee5a5e444df68528afb2 : Windows 7/8 MBR Code
Partition table:
0 - [ACTIVE] NTFS (0x07) [VISIBLE] Offset (sectors): 2048 | Size: 100 Mo
1 - [XXXXXX] NTFS (0x07) [VISIBLE] Offset (sectors): 206848 | Size: 49900 Mo
2 - [XXXXXX] EXTEN-LBA (0x0f) [VISIBLE] Offset (sectors): 102402048 | Size: 186416 Mo
3 - [XXXXXX] FAT32-LBA (0x0c) [VISIBLE] Offset (sectors): 484182016 | Size: 2055 Mo
User = LL1 ... OK!
User != LL2 ... KO!
--- LL2 ---
[MBR] 98ee2a3c8bf6f0314742a18b6cc017ee
[BSP] 2e3d41a2bfbac14bd81e0d653791ffd7 : MaxSS MBR Code!
Partition table:
0 - [ACTIVE] NTFS (0x07) [VISIBLE] Offset (sectors): 2048 | Size: 100 Mo
1 - [XXXXXX] NTFS (0x07) [VISIBLE] Offset (sectors): 206848 | Size: 49900 Mo
2 - [XXXXXX] EXTEN-LBA (0x0f) [VISIBLE] Offset (sectors): 102402048 | Size: 186416 Mo
3 - [XXXXXX] FAT32-LBA (0x0c) [VISIBLE] Offset (sectors): 484182016 | Size: 2055 Mo

Finished : << RKreport[1]_S_11142012_02d1545.txt >>
RKreport[1]_S_11142012_02d1545.txt

#12 sohash

sohash
  • Topic Starter

  • Members
  • 24 posts
  • OFFLINE
  •  
  • Local time:10:18 AM

Posted 14 November 2012 - 05:36 AM

Second Roguekiller report

RogueKiller V8.2.3 [11/07/2012] by Tigzy
mail: tigzyRK<at>gmail<dot>com
Feedback: http://www.geekstogo.com/forum/files/file/413-roguekiller/
Website: http://tigzy.geekstogo.com/roguekiller.php
Blog: http://tigzyrk.blogspot.com

Operating System: Windows 7 (6.1.7600 ) 32 bits version
Started in : Normal mode
User : Ashutosh.Sohani [Admin rights]
Mode : Remove -- Date : 11/14/2012 15:46:32

¤¤¤ Bad processes : 1 ¤¤¤
[SUSP PATH] DCSHelper.exe -- C:\ProgramData\DatacardService\DCSHelper.exe -> KILLED [TermProc]

¤¤¤ Registry Entries : 8 ¤¤¤
[HJPOL] HKLM\[...]\System : DisableRegistryTools (0) -> DELETED
[HJ] HKLM\[...]\System : ConsentPromptBehaviorAdmin (0) -> REPLACED (2)
[HJ] HKLM\[...]\System : EnableLUA (0) -> REPLACED (1)
[HJ DESK] HKCU\[...]\ClassicStartMenu : {59031a47-3f72-44a7-89c5-5595fe6b30ee} (1) -> REPLACED (0)
[HJ DESK] HKCU\[...]\ClassicStartMenu : {20D04FE0-3AEA-1069-A2D8-08002B30309D} (1) -> REPLACED (0)
[HJ DESK] HKCU\[...]\ClassicStartMenu : {645FF040-5081-101B-9F08-00AA002F954E} (1) -> REPLACED (0)
[HJ DESK] HKLM\[...]\NewStartPanel : {59031a47-3f72-44a7-89c5-5595fe6b30ee} (1) -> REPLACED (0)
[HJ DESK] HKLM\[...]\NewStartPanel : {20D04FE0-3AEA-1069-A2D8-08002B30309D} (1) -> REPLACED (0)

¤¤¤ Particular Files / Folders: ¤¤¤

¤¤¤ Driver : [LOADED] ¤¤¤
SSDT[13] : NtAlertResumeThread @ 0x83314069 -> HOOKED (Unknown @ 0x87B31958)
SSDT[14] : NtAlertThread @ 0x832C1DC6 -> HOOKED (Unknown @ 0x87B24758)
SSDT[19] : NtAllocateVirtualMemory @ 0x8328343B -> HOOKED (Unknown @ 0x87BE0378)
SSDT[59] : ExpInterlockedPopEntrySListResume @ 0x832AFF42 -> HOOKED (Unknown @ 0x87947D50)
SSDT[74] : NtCreateMutant @ 0x832B62C3 -> HOOKED (Unknown @ 0x87BFD178)
SSDT[87] : NtCreateThread @ 0x8331229A -> HOOKED (Unknown @ 0x87BE0CA8)
SSDT[131] : NtFreeVirtualMemory @ 0x830EA96D -> HOOKED (Unknown @ 0x87BE1B00)
SSDT[145] : NtImpersonateAnonymousToken @ 0x8322A048 -> HOOKED (Unknown @ 0x87B5DB10)
SSDT[147] : NtImpersonateThread @ 0x8328FCB3 -> HOOKED (Unknown @ 0x87B404A8)
SSDT[168] : NtMapViewOfSection @ 0x832B6585 -> HOOKED (Unknown @ 0x87BEBF08)
SSDT[177] : NtOpenEvent @ 0x832B8C15 -> HOOKED (Unknown @ 0x87B406D8)
SSDT[191] : NtOpenProcessToken @ 0x83273F11 -> HOOKED (Unknown @ 0x87B963E8)
SSDT[199] : NtOpenThreadToken @ 0x83273775 -> HOOKED (Unknown @ 0x87BF7A98)
SSDT[304] : NtResumeThread @ 0x832A967D -> HOOKED (Unknown @ 0x87B66778)
SSDT[316] : NtSetContextThread @ 0x83313B17 -> HOOKED (Unknown @ 0x87B89940)
SSDT[333] : NtSetInformationProcess @ 0x83284A35 -> HOOKED (Unknown @ 0x87BEB310)
SSDT[335] : NtSetInformationThread @ 0x832A0E22 -> HOOKED (Unknown @ 0x87BF7268)
SSDT[366] : NtSuspendProcess @ 0x83313FA3 -> HOOKED (Unknown @ 0x87B80338)
SSDT[367] : NtSuspendThread @ 0x832D0D04 -> HOOKED (Unknown @ 0x8797C5B8)
SSDT[370] : NtTerminateProcess @ 0x832991B5 -> HOOKED (Unknown @ 0x87B669A8)
SSDT[371] : NtTerminateThread @ 0x832ABF92 -> HOOKED (Unknown @ 0x87B725A8)
SSDT[385] : NtUnmapViewOfSection @ 0x832B338A -> HOOKED (Unknown @ 0x87B56488)
SSDT[399] : NtWriteVirtualMemory @ 0x832BEC63 -> HOOKED (Unknown @ 0x87BE1CB8)

¤¤¤ Infection : Root.MBR ¤¤¤

¤¤¤ HOSTS File: ¤¤¤
--> C:\Windows\system32\drivers\etc\hosts

127.0.0.1 localhost


¤¤¤ MBR Check: ¤¤¤

+++++ PhysicalDrive0: +++++
--- User ---
[MBR] b82537d53728360bb3338f21a36c4489
[BSP] 6cc8b66dcb99ee5a5e444df68528afb2 : Windows 7/8 MBR Code
Partition table:
0 - [ACTIVE] NTFS (0x07) [VISIBLE] Offset (sectors): 2048 | Size: 100 Mo
1 - [XXXXXX] NTFS (0x07) [VISIBLE] Offset (sectors): 206848 | Size: 49900 Mo
2 - [XXXXXX] EXTEN-LBA (0x0f) [VISIBLE] Offset (sectors): 102402048 | Size: 186416 Mo
3 - [XXXXXX] FAT32-LBA (0x0c) [VISIBLE] Offset (sectors): 484182016 | Size: 2055 Mo
User = LL1 ... OK!
User != LL2 ... KO!
--- LL2 ---
[MBR] 98ee2a3c8bf6f0314742a18b6cc017ee
[BSP] 2e3d41a2bfbac14bd81e0d653791ffd7 : MaxSS MBR Code!
Partition table:
0 - [ACTIVE] NTFS (0x07) [VISIBLE] Offset (sectors): 2048 | Size: 100 Mo
1 - [XXXXXX] NTFS (0x07) [VISIBLE] Offset (sectors): 206848 | Size: 49900 Mo
2 - [XXXXXX] EXTEN-LBA (0x0f) [VISIBLE] Offset (sectors): 102402048 | Size: 186416 Mo
3 - [XXXXXX] FAT32-LBA (0x0c) [VISIBLE] Offset (sectors): 484182016 | Size: 2055 Mo

Finished : << RKreport[2]_D_11142012_02d1546.txt >>
RKreport[1]_S_11142012_02d1545.txt ; RKreport[2]_D_11142012_02d1546.txt




THIRD ROGUEKILLER report

____________________________


RogueKiller V8.2.3 [11/07/2012] by Tigzy
mail: tigzyRK<at>gmail<dot>com
Feedback: http://www.geekstogo.com/forum/files/file/413-roguekiller/
Website: http://tigzy.geekstogo.com/roguekiller.php
Blog: http://tigzyrk.blogspot.com

Operating System: Windows 7 (6.1.7600 ) 32 bits version
Started in : Normal mode
User : Ashutosh.Sohani [Admin rights]
Mode : Remove -- Date : 11/14/2012 15:46:43

¤¤¤ Bad processes : 1 ¤¤¤
[SUSP PATH] DCSHelper.exe -- C:\ProgramData\DatacardService\DCSHelper.exe -> KILLED [TermProc]

¤¤¤ Registry Entries : 0 ¤¤¤

¤¤¤ Particular Files / Folders: ¤¤¤

¤¤¤ Driver : [LOADED] ¤¤¤
SSDT[13] : NtAlertResumeThread @ 0x83314069 -> HOOKED (Unknown @ 0x87B31958)
SSDT[14] : NtAlertThread @ 0x832C1DC6 -> HOOKED (Unknown @ 0x87B24758)
SSDT[19] : NtAllocateVirtualMemory @ 0x8328343B -> HOOKED (Unknown @ 0x87BE0378)
SSDT[59] : ExpInterlockedPopEntrySListResume @ 0x832AFF42 -> HOOKED (Unknown @ 0x87947D50)
SSDT[74] : NtCreateMutant @ 0x832B62C3 -> HOOKED (Unknown @ 0x87BFD178)
SSDT[87] : NtCreateThread @ 0x8331229A -> HOOKED (Unknown @ 0x87BE0CA8)
SSDT[131] : NtFreeVirtualMemory @ 0x830EA96D -> HOOKED (Unknown @ 0x87BE1B00)
SSDT[145] : NtImpersonateAnonymousToken @ 0x8322A048 -> HOOKED (Unknown @ 0x87B5DB10)
SSDT[147] : NtImpersonateThread @ 0x8328FCB3 -> HOOKED (Unknown @ 0x87B404A8)
SSDT[168] : NtMapViewOfSection @ 0x832B6585 -> HOOKED (Unknown @ 0x87BEBF08)
SSDT[177] : NtOpenEvent @ 0x832B8C15 -> HOOKED (Unknown @ 0x87B406D8)
SSDT[191] : NtOpenProcessToken @ 0x83273F11 -> HOOKED (Unknown @ 0x87B963E8)
SSDT[199] : NtOpenThreadToken @ 0x83273775 -> HOOKED (Unknown @ 0x87BF7A98)
SSDT[304] : NtResumeThread @ 0x832A967D -> HOOKED (Unknown @ 0x87B66778)
SSDT[316] : NtSetContextThread @ 0x83313B17 -> HOOKED (Unknown @ 0x87B89940)
SSDT[333] : NtSetInformationProcess @ 0x83284A35 -> HOOKED (Unknown @ 0x87BEB310)
SSDT[335] : NtSetInformationThread @ 0x832A0E22 -> HOOKED (Unknown @ 0x87BF7268)
SSDT[366] : NtSuspendProcess @ 0x83313FA3 -> HOOKED (Unknown @ 0x87B80338)
SSDT[367] : NtSuspendThread @ 0x832D0D04 -> HOOKED (Unknown @ 0x8797C5B8)
SSDT[370] : NtTerminateProcess @ 0x832991B5 -> HOOKED (Unknown @ 0x87B669A8)
SSDT[371] : NtTerminateThread @ 0x832ABF92 -> HOOKED (Unknown @ 0x87B725A8)
SSDT[385] : NtUnmapViewOfSection @ 0x832B338A -> HOOKED (Unknown @ 0x87B56488)
SSDT[399] : NtWriteVirtualMemory @ 0x832BEC63 -> HOOKED (Unknown @ 0x87BE1CB8)

¤¤¤ Infection : Root.MBR ¤¤¤

¤¤¤ HOSTS File: ¤¤¤
--> C:\Windows\system32\drivers\etc\hosts

127.0.0.1 localhost


¤¤¤ MBR Check: ¤¤¤

+++++ PhysicalDrive0: +++++
--- User ---
[MBR] b82537d53728360bb3338f21a36c4489
[BSP] 6cc8b66dcb99ee5a5e444df68528afb2 : Windows 7/8 MBR Code
Partition table:
0 - [ACTIVE] NTFS (0x07) [VISIBLE] Offset (sectors): 2048 | Size: 100 Mo
1 - [XXXXXX] NTFS (0x07) [VISIBLE] Offset (sectors): 206848 | Size: 49900 Mo
2 - [XXXXXX] EXTEN-LBA (0x0f) [VISIBLE] Offset (sectors): 102402048 | Size: 186416 Mo
3 - [XXXXXX] FAT32-LBA (0x0c) [VISIBLE] Offset (sectors): 484182016 | Size: 2055 Mo
User = LL1 ... OK!
User != LL2 ... KO!
--- LL2 ---
[MBR] 98ee2a3c8bf6f0314742a18b6cc017ee
[BSP] 2e3d41a2bfbac14bd81e0d653791ffd7 : MaxSS MBR Code!
Partition table:
0 - [ACTIVE] NTFS (0x07) [VISIBLE] Offset (sectors): 2048 | Size: 100 Mo
1 - [XXXXXX] NTFS (0x07) [VISIBLE] Offset (sectors): 206848 | Size: 49900 Mo
2 - [XXXXXX] EXTEN-LBA (0x0f) [VISIBLE] Offset (sectors): 102402048 | Size: 186416 Mo
3 - [XXXXXX] FAT32-LBA (0x0c) [VISIBLE] Offset (sectors): 484182016 | Size: 2055 Mo

Finished : << RKreport[3]_D_11142012_02d1546.txt >>
RKreport[1]_S_11142012_02d1545.txt ; RKreport[2]_D_11142012_02d1546.txt ; RKreport[3]_D_11142012_02d1546.txt




FOURTH Roguekiller report
______________________


RogueKiller V8.2.3 [11/07/2012] by Tigzy
mail: tigzyRK<at>gmail<dot>com
Feedback: http://www.geekstogo.com/forum/files/file/413-roguekiller/
Website: http://tigzy.geekstogo.com/roguekiller.php
Blog: http://tigzyrk.blogspot.com

Operating System: Windows 7 (6.1.7600 ) 32 bits version
Started in : Normal mode
User : Ashutosh.Sohani [Admin rights]
Mode : Remove -- Date : 11/14/2012 15:47:05

¤¤¤ Bad processes : 1 ¤¤¤
[SUSP PATH] DCSHelper.exe -- C:\ProgramData\DatacardService\DCSHelper.exe -> KILLED [TermProc]

¤¤¤ Registry Entries : 0 ¤¤¤

¤¤¤ Particular Files / Folders: ¤¤¤

¤¤¤ Driver : [LOADED] ¤¤¤
SSDT[13] : NtAlertResumeThread @ 0x83314069 -> HOOKED (Unknown @ 0x87B31958)
SSDT[14] : NtAlertThread @ 0x832C1DC6 -> HOOKED (Unknown @ 0x87B24758)
SSDT[19] : NtAllocateVirtualMemory @ 0x8328343B -> HOOKED (Unknown @ 0x87BE0378)
SSDT[59] : ExpInterlockedPopEntrySListResume @ 0x832AFF42 -> HOOKED (Unknown @ 0x87947D50)
SSDT[74] : NtCreateMutant @ 0x832B62C3 -> HOOKED (Unknown @ 0x87BFD178)
SSDT[87] : NtCreateThread @ 0x8331229A -> HOOKED (Unknown @ 0x87BE0CA8)
SSDT[131] : NtFreeVirtualMemory @ 0x830EA96D -> HOOKED (Unknown @ 0x87BE1B00)
SSDT[145] : NtImpersonateAnonymousToken @ 0x8322A048 -> HOOKED (Unknown @ 0x87B5DB10)
SSDT[147] : NtImpersonateThread @ 0x8328FCB3 -> HOOKED (Unknown @ 0x87B404A8)
SSDT[168] : NtMapViewOfSection @ 0x832B6585 -> HOOKED (Unknown @ 0x87BEBF08)
SSDT[177] : NtOpenEvent @ 0x832B8C15 -> HOOKED (Unknown @ 0x87B406D8)
SSDT[191] : NtOpenProcessToken @ 0x83273F11 -> HOOKED (Unknown @ 0x87B963E8)
SSDT[199] : NtOpenThreadToken @ 0x83273775 -> HOOKED (Unknown @ 0x87BF7A98)
SSDT[304] : NtResumeThread @ 0x832A967D -> HOOKED (Unknown @ 0x87B66778)
SSDT[316] : NtSetContextThread @ 0x83313B17 -> HOOKED (Unknown @ 0x87B89940)
SSDT[333] : NtSetInformationProcess @ 0x83284A35 -> HOOKED (Unknown @ 0x87BEB310)
SSDT[335] : NtSetInformationThread @ 0x832A0E22 -> HOOKED (Unknown @ 0x87BF7268)
SSDT[366] : NtSuspendProcess @ 0x83313FA3 -> HOOKED (Unknown @ 0x87B80338)
SSDT[367] : NtSuspendThread @ 0x832D0D04 -> HOOKED (Unknown @ 0x8797C5B8)
SSDT[370] : NtTerminateProcess @ 0x832991B5 -> HOOKED (Unknown @ 0x87B669A8)
SSDT[371] : NtTerminateThread @ 0x832ABF92 -> HOOKED (Unknown @ 0x87B725A8)
SSDT[385] : NtUnmapViewOfSection @ 0x832B338A -> HOOKED (Unknown @ 0x87B56488)
SSDT[399] : NtWriteVirtualMemory @ 0x832BEC63 -> HOOKED (Unknown @ 0x87BE1CB8)

¤¤¤ Infection : Root.MBR ¤¤¤

¤¤¤ HOSTS File: ¤¤¤
--> C:\Windows\system32\drivers\etc\hosts

127.0.0.1 localhost


¤¤¤ MBR Check: ¤¤¤

+++++ PhysicalDrive0: +++++
--- User ---
[MBR] b82537d53728360bb3338f21a36c4489
[BSP] 6cc8b66dcb99ee5a5e444df68528afb2 : Windows 7/8 MBR Code
Partition table:
0 - [ACTIVE] NTFS (0x07) [VISIBLE] Offset (sectors): 2048 | Size: 100 Mo
1 - [XXXXXX] NTFS (0x07) [VISIBLE] Offset (sectors): 206848 | Size: 49900 Mo
2 - [XXXXXX] EXTEN-LBA (0x0f) [VISIBLE] Offset (sectors): 102402048 | Size: 186416 Mo
3 - [XXXXXX] FAT32-LBA (0x0c) [VISIBLE] Offset (sectors): 484182016 | Size: 2055 Mo
User = LL1 ... OK!
User != LL2 ... KO!
--- LL2 ---
[MBR] 98ee2a3c8bf6f0314742a18b6cc017ee
[BSP] 2e3d41a2bfbac14bd81e0d653791ffd7 : MaxSS MBR Code!
Partition table:
0 - [ACTIVE] NTFS (0x07) [VISIBLE] Offset (sectors): 2048 | Size: 100 Mo
1 - [XXXXXX] NTFS (0x07) [VISIBLE] Offset (sectors): 206848 | Size: 49900 Mo
2 - [XXXXXX] EXTEN-LBA (0x0f) [VISIBLE] Offset (sectors): 102402048 | Size: 186416 Mo
3 - [XXXXXX] FAT32-LBA (0x0c) [VISIBLE] Offset (sectors): 484182016 | Size: 2055 Mo

Finished : << RKreport[4]_D_11142012_02d1547.txt >>
RKreport[1]_S_11142012_02d1545.txt ; RKreport[2]_D_11142012_02d1546.txt ; RKreport[3]_D_11142012_02d1546.txt ; RKreport[4]_D_11142012_02d1547.txt

#13 sohash

sohash
  • Topic Starter

  • Members
  • 24 posts
  • OFFLINE
  •  
  • Local time:10:18 AM

Posted 14 November 2012 - 05:40 AM

So effectively , I deleted registry entries - not sure if that I was supposed to do as I deleted twice for that and also tried to delete process twice which was
already killed so no change.
Still there are MBR and drivers which need to be fixed I guess.

#14 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:08:18 PM

Posted 14 November 2012 - 07:54 AM

Hello

I Would like you to do the following.

Please print out or make a copy in notpad of any instructions given, as sometimes it is necessary to go offline and you will lose access to them.

Run Combofix:

You may be asked to install or update the Recovery Console (Win XP Only) if this happens please allow it to do so (you will need to be connected to the internet for this)

Before you run Combofix I will need you to turn off any security software you have running, If you do not know how to do this you can find out >here< or >here<

Combofix may need to reboot your computer more than once to do its job this is normal.

You can download Combofix from one of these links. I want you to save it to the desktop and run it from there.
Link 1
Link 2
Link 3
1. Close any open browsers or any other programs that are open.
2. Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.

Double click on combofix.exe & follow the prompts.
When finished, it will produce a report for you.

Note 1: Do not mouseclick combofix's window while it's running. That may cause it to stall

Note 2: If you recieve an error "Illegal operation attempted on a registery key that has been marked for deletion." Please restart the computer

"information and logs"

  • In your next post I need the following
  • Log from Combofix
  • let me know of any problems you may have had
  • How is the computer doing now?

Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#15 sohash

sohash
  • Topic Starter

  • Members
  • 24 posts
  • OFFLINE
  •  
  • Local time:10:18 AM

Posted 14 November 2012 - 05:00 PM

I ran Combofix. Here are the observations
1. When I opened Firefox for dirst time - it said registery entries deleted so I rebooted
2. The browser loaded with my home page bit when I typed www.google.com and tried to load , the system gave the blue sceen saying memory dump.
3. I again rebooted and was able to open the browser. It is still trying to redirect (as per the information appearing at bottom of firefox where it tells which webiste it is connected to. Also at the top it gives a temporary toolbar saying the site is trying to redirect.

So looks like the problem is still there. Just wanted to point out that in the Roguekiller report , it did catch MBR but I did not click on the Fix MBR. So if you notice in the last log that virus/trojan still appears.

Anyways here is the Combofix log

_________________________________




ComboFix 12-11-14.01 - Ashutosh.Sohani 11/15/2012 2:08.3.2 - x86
Running from: c:\users\Ashutosh.Sohani\Desktop\ComboFix.exe
* Created a new restore point
.
.
((((((((((((((((((((((((( Files Created from 2012-10-14 to 2012-11-14 )))))))))))))))))))))))))))))))
.
.
2012-11-14 21:18 . 2012-11-14 21:18 -------- d-----w- c:\users\postgres\AppData\Local\temp
2012-11-14 21:18 . 2012-11-14 21:18 -------- d-----w- c:\users\Default\AppData\Local\temp
2012-11-14 21:18 . 2012-11-14 21:18 -------- d-----w- c:\users\Administrator\AppData\Local\temp
2012-11-14 21:18 . 2012-11-14 21:18 -------- d-----w- c:\users\admin\AppData\Local\temp
2012-11-14 02:51 . 2012-11-14 02:51 -------- d-----w- c:\program files\Mozilla Maintenance Service
2012-11-14 02:51 . 2012-11-14 02:51 588728 ----a-w- c:\program files\Mozilla Firefox\gkmedias.dll
2012-11-14 02:51 . 2012-11-14 02:51 43960 ----a-w- c:\program files\Mozilla Firefox\mozglue.dll
2012-11-14 02:51 . 2012-11-14 02:51 157352 ----a-w- c:\program files\Mozilla Firefox\maintenanceservice_installer.exe
2012-11-14 02:51 . 2012-11-14 02:51 129976 ----a-w- c:\program files\Mozilla Firefox\maintenanceservice.exe
2012-11-13 11:13 . 2012-11-13 11:13 -------- d-----w- c:\program files\ESET
2012-11-10 21:25 . 2012-11-12 12:06 -------- d-----w- c:\programdata\Spybot - Search & Destroy
2012-11-10 21:25 . 2012-11-10 21:30 -------- d-----w- c:\program files\Spybot - Search & Destroy
2012-11-10 09:38 . 2012-11-10 09:38 388096 ----a-r- c:\users\Ashutosh.Sohani\AppData\Roaming\Microsoft\Installer\{45A66726-69BC-466B-A7A4-12FCBA4883D7}\HiJackThis.exe
2012-11-10 09:38 . 2012-11-10 09:38 -------- d-----w- c:\program files\Trend Micro
2012-11-10 01:15 . 2012-08-03 10:00 26624 ----a-w- c:\windows\system32\drivers\ew_juextctrl.sys
2012-11-10 01:15 . 2012-08-03 10:00 186880 ----a-w- c:\windows\system32\drivers\ew_juwwanecm.sys
2012-11-10 01:15 . 2012-08-03 10:00 89856 ----a-w- c:\windows\system32\drivers\ew_jucdcacm.sys
2012-11-10 01:15 . 2012-08-03 10:00 861696 ----a-w- c:\windows\system32\drivers\mod7700.sys
2012-11-10 01:15 . 2012-08-03 10:00 73984 ----a-w- c:\windows\system32\drivers\ew_jubusenum.sys
2012-11-10 01:15 . 2012-08-03 10:00 66688 ----a-w- c:\windows\system32\drivers\ew_jucdcecm.sys
2012-11-10 01:15 . 2012-08-03 10:00 350720 ----a-w- c:\windows\system32\drivers\ewusbwwan.sys
2012-11-10 01:15 . 2012-08-03 10:00 25856 ----a-w- c:\windows\system32\drivers\ewdcsc.sys
2012-11-10 01:15 . 2012-08-03 10:00 195200 ----a-w- c:\windows\system32\drivers\ewusbmdm.sys
2012-11-10 01:15 . 2012-08-03 10:00 19200 ----a-w- c:\windows\system32\drivers\ew_hwupgrade.sys
2012-11-10 01:15 . 2012-08-03 10:00 11136 ----a-w- c:\windows\system32\drivers\ew_usbenumfilter.sys
2012-11-10 01:15 . 2012-08-03 10:00 102784 ----a-w- c:\windows\system32\drivers\ew_hwusbdev.sys
2012-11-09 03:14 . 2012-11-09 03:14 -------- d-----w- c:\users\Ashutosh.Sohani\AppData\Roaming\LavasoftStatistics
2012-11-09 02:44 . 2012-11-14 01:41 -------- d-----w- c:\program files\Toolbar Cleaner
2012-11-09 02:44 . 2012-11-13 10:18 -------- d-----w- c:\users\LTECH
2012-11-08 20:27 . 2012-11-10 22:00 -------- d-----w- c:\programdata\Bitmeter2
2012-11-08 20:27 . 2012-11-08 20:38 -------- d-----w- c:\users\Ashutosh.Sohani\AppData\Roaming\Bitmeter2
2012-11-08 20:27 . 2012-11-08 20:27 -------- d-----w- c:\program files\Codebox
2012-11-07 03:40 . 2012-11-14 21:20 -------- d-----w- c:\users\Ashutosh.Sohani\AppData\Local\temp
2012-11-03 07:40 . 2012-11-03 07:41 -------- d-----w- c:\program files\CCleaner
2012-11-03 06:48 . 2012-11-03 06:48 -------- d-----w- c:\users\Ashutosh.Sohani\AppData\Roaming\Malwarebytes
2012-11-03 06:47 . 2012-11-03 06:47 -------- d-----w- c:\programdata\Malwarebytes
2012-11-03 06:47 . 2012-11-03 07:23 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
2012-11-02 23:32 . 2012-11-02 23:32 9575864 ----a-w- c:\windows\system32\FlashPlayerInstaller.exe
2012-11-02 23:19 . 2012-11-02 23:19 -------- d-----w- c:\users\Ashutosh.Sohani\AppData\Local\Macromedia
2012-11-02 22:52 . 2012-11-02 23:32 696760 ----a-w- c:\windows\system32\FlashPlayerApp.exe
.
.
.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2012-11-02 23:32 . 2012-02-21 03:50 73656 ----a-w- c:\windows\system32\FlashPlayerCPLApp.cpl
2012-10-04 20:03 . 2010-06-10 01:07 174056 ----a-w- c:\windows\system32\drivers\wpshelper.sys
2012-09-26 15:27 . 2012-10-04 15:32 4659712 ----a-w- c:\windows\system32\Redemption.dll
2012-09-26 15:27 . 2012-09-26 15:27 90112 ----a-w- c:\windows\MAMCityDownload.ocx
2012-09-26 15:27 . 2012-09-26 15:27 330240 ----a-w- c:\windows\MASetupCaller.dll
2012-09-26 15:27 . 2012-09-26 15:27 30568 ----a-w- c:\windows\MusiccityDownload.exe
2012-09-26 15:27 . 2012-09-26 15:27 974848 ----a-w- c:\windows\system32\cis-2.4.dll
2012-09-26 15:27 . 2012-09-26 15:27 81920 ----a-w- c:\windows\system32\issacapi_bs-2.3.dll
2012-09-26 15:27 . 2012-09-26 15:27 65536 ----a-w- c:\windows\system32\issacapi_pe-2.3.dll
2012-09-26 15:27 . 2012-09-26 15:27 57344 ----a-w- c:\windows\system32\MTXSYNCICON.dll
2012-09-26 15:27 . 2012-09-26 15:27 57344 ----a-w- c:\windows\system32\MK_Lyric.dll
2012-09-26 15:27 . 2012-09-26 15:27 57344 ----a-w- c:\windows\system32\issacapi_se-2.3.dll
2012-09-26 15:27 . 2012-09-26 15:27 569344 ----a-w- c:\windows\system32\muzdecode.ax
2012-09-26 15:27 . 2012-09-26 15:27 491520 ----a-w- c:\windows\system32\muzapp.dll
2012-09-26 15:27 . 2012-09-26 15:27 49152 ----a-w- c:\windows\system32\MaJGUILib.dll
2012-09-26 15:27 . 2012-09-26 15:27 45320 ----a-w- c:\windows\system32\MAMACExtract.dll
2012-09-26 15:27 . 2012-09-26 15:27 45056 ----a-w- c:\windows\system32\MaXMLProto.dll
2012-09-26 15:27 . 2012-09-26 15:27 45056 ----a-w- c:\windows\system32\MACXMLProto.dll
2012-09-26 15:27 . 2012-09-26 15:27 40960 ----a-w- c:\windows\system32\MTTELECHIP.dll
2012-09-26 15:27 . 2012-09-26 15:27 352256 ----a-w- c:\windows\system32\MSLUR71.dll
2012-09-26 15:27 . 2012-09-26 15:27 258048 ----a-w- c:\windows\system32\muzoggsp.ax
2012-09-26 15:27 . 2012-09-26 15:27 245760 ----a-w- c:\windows\system32\MSCLib.dll
2012-09-26 15:27 . 2012-09-26 15:27 24576 ----a-w- c:\windows\system32\MASetupCleaner.exe
2012-09-26 15:27 . 2012-09-26 15:27 200704 ----a-w- c:\windows\system32\muzwmts.dll
2012-09-26 15:27 . 2012-09-26 15:27 155648 ----a-w- c:\windows\system32\MSFLib.dll
2012-09-26 15:27 . 2012-09-26 15:27 143360 ----a-w- c:\windows\system32\3DAudio.ax
2012-09-26 15:27 . 2012-09-26 15:27 135168 ----a-w- c:\windows\system32\muzaf1.dll
2012-09-26 15:27 . 2012-09-26 15:27 131072 ----a-w- c:\windows\system32\muzmpgsp.ax
2012-09-26 15:27 . 2012-09-26 15:27 122880 ----a-w- c:\windows\system32\muzeffect.ax
2012-09-26 15:27 . 2012-09-26 15:27 118784 ----a-w- c:\windows\system32\MaDRM.dll
2012-09-26 15:27 . 2012-09-26 15:27 110592 ----a-w- c:\windows\system32\muzmp4sp.ax
2012-09-26 15:27 . 2012-10-04 15:31 821824 ----a-w- c:\windows\system32\dgderapi.dll
2012-09-20 04:35 . 2012-10-04 15:35 83168 ----a-w- c:\windows\system32\drivers\ssudbus.sys
2012-09-20 04:35 . 2012-10-04 15:35 181344 ----a-w- c:\windows\system32\drivers\ssudserd.sys
2012-09-20 04:35 . 2012-10-04 15:35 181344 ----a-w- c:\windows\system32\drivers\ssudmdm.sys
2012-08-24 06:59 . 2012-10-04 03:52 1800704 ----a-w- c:\windows\system32\jscript9.dll
2012-08-24 06:51 . 2012-10-04 03:52 1129472 ----a-w- c:\windows\system32\wininet.dll
2012-08-24 06:51 . 2012-10-04 03:52 1427968 ----a-w- c:\windows\system32\inetcpl.cpl
2012-08-24 06:47 . 2012-10-04 03:52 142848 ----a-w- c:\windows\system32\ieUnatt.exe
2012-08-24 06:47 . 2012-10-04 03:52 420864 ----a-w- c:\windows\system32\vbscript.dll
2012-08-24 06:43 . 2012-10-04 03:52 2382848 ----a-w- c:\windows\system32\mshtml.tlb
2012-11-14 02:51 . 2012-01-30 23:48 97208 ----a-w- c:\program files\mozilla firefox\components\browsercomps.dll
.
.
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"ccApp"="c:\program files\Common Files\Symantec Shared\ccApp.exe" [2011-09-02 115624]
"SynTPEnh"="c:\program files\Synaptics\SynTP\SynTPEnh.exe" [2010-01-22 1684776]
"Communicator"="c:\program files\Microsoft Lync\communicator.exe" [2012-03-24 12071200]
"Adobe ARM"="c:\program files\Common Files\Adobe\ARM\1.0\AdobeARM.exe" [2012-07-27 919008]
"DameWare MRC Agent"="c:\windows\system32\DWRCST.exe" [2009-02-04 78848]
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\system]
"ConsentPromptBehaviorUser"= 3 (0x3)
"EnableUIADesktopToggle"= 0 (0x0)
"PromptOnSecureDesktop"= 0 (0x0)
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\explorer]
"NoAutorun"= 1 (0x1)
.
[HKEY_LOCAL_MACHINE\system\currentcontrolset\services\tcpip\parameters\persistentroutes]
"172.24.0.0,255.255.0.0,192.168.2.254,1"=""
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\ccEvtMgr]
@="Service"
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\ccSetMgr]
@="Service"
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\Symantec Antivirus]
@="Service"
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\KiesAirMessage]
2012-09-26 15:28 580096 ----a-w- f:\software\kies\KiesAirMessage.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\KiesPreload]
2012-09-28 14:48 965560 ----a-w- f:\software\kies\Kies.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\KiesTrayAgent]
2012-09-28 14:48 309688 ----a-w- f:\software\kies\KiesTrayAgent.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\OliveDcService]
2009-12-30 10:24 96768 ----a-w- c:\program files\Tata Photon+\Olive\VME101\Drivers\OliveDcService.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Skype]
2012-07-13 08:03 17418928 ----a-r- c:\program files\Skype\Phone\Skype.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecAntiVirus]
"DisableMonitoring"=dword:00000001
.
R1 SBRE;SBRE;c:\windows\system32\drivers\SBREdrv.sys [x]
R2 BBSvc;BingBar Service;c:\program files\Microsoft\BingBar\7.1.391.0\BBSvc.exe [x]
R2 HWDeviceService.exe;HWDeviceService.exe;c:\programdata\DatacardService\HWDeviceService.exe [x]
R2 Skype C2C Service;Skype C2C Service;c:\programdata\Skype\Toolbars\Skype C2C Service\c2c_service.exe [x]
R2 SkypeUpdate;Skype Updater;c:\program files\Skype\Updater\Updater.exe [x]
R3 dg_ssudbus;SAMSUNG Mobile USB Composite Device Driver (DEVGURU Ver.);c:\windows\system32\DRIVERS\ssudbus.sys [x]
R3 ew_hwusbdev;Huawei MobileBroadband USB PNP Device;c:\windows\system32\DRIVERS\ew_hwusbdev.sys [x]
R3 ewusbmbb;HUAWEI USB-WWAN miniport;c:\windows\system32\DRIVERS\ewusbwwan.sys [x]
R3 openerp-server-6.0;OpenERP Server 6.0;c:\program files\OpenERP 6.0\Server\service\OpenERPServerService.exe [x]
R3 openerp-server-6.1;OpenERP Server 6.1;c:\program files\OpenERP 6.1-1\service\OpenERPServerService.exe [x]
R3 openerp-web-6.0;OpenERP Web 6.0;c:\program files\OpenERP 6.0\Web\service\OpenERPWebService.exe [x]
R3 postgresql-8.4;postgresql-8.4 - PostgreSQL Server 8.4;C:/Program Files/PostgreSQL/8.4/bin/pg_ctl.exe runservice -N postgresql-8.4 -D C:/Program Files/PostgreSQL/8.4/data -w [x]
R3 ssudmdm;SAMSUNG Mobile USB Modem Drivers (DEVGURU Ver.);c:\windows\system32\DRIVERS\ssudmdm.sys [x]
R3 ssudserd;SAMSUNG Mobile USB Diagnostic Serial Port(DEVGURU Ver.);c:\windows\system32\DRIVERS\ssudserd.sys [x]
R3 wirelessusbser;Wireless USB Device for Legacy Serial Communication;c:\windows\system32\DRIVERS\3GDatausbser.sys [x]
R4 airtel. RunOuc;airtel. OUC;c:\program files\airtel\UpdateDog\ouc.exe [x]
S1 dwvkbd;DameWare Virtual Keyboard 32 bit Driver;c:\windows\system32\DRIVERS\dwvkbd.sys [x]
S2 SBSDWSCService;SBSD Security Center Service;c:\program files\Spybot - Search & Destroy\SDWinSec.exe [x]
S2 SoftScan;SoftScan;c:\program files\HCL\SoftScan\Ws_Softscan.exe [x]
S3 BBUpdate;BBUpdate;c:\program files\Microsoft\BingBar\7.1.391.0\SeaPort.exe [x]
S3 DwMirror;DwMirror;c:\windows\system32\DRIVERS\DamewareMini.sys [x]
S3 EraserUtilRebootDrv;EraserUtilRebootDrv;c:\program files\Common Files\Symantec Shared\EENGINE\EraserUtilRebootDrv.sys [x]
S3 huawei_enumerator;huawei_enumerator;c:\windows\system32\DRIVERS\ew_jubusenum.sys [x]
S3 RTL8167;Realtek 8167 NT Driver;c:\windows\system32\DRIVERS\Rt86win7.sys [x]
S3 rtl8192se;Realtek Wireless LAN 802.11n PCI-E NIC NT Driver;c:\windows\system32\DRIVERS\rtl8192se.sys [x]
S3 seehcri;Sony Ericsson seehcri Device Driver;c:\windows\system32\DRIVERS\seehcri.sys [x]
.
.
--- Other Services/Drivers In Memory ---
.
*NewlyCreated* - TRUESIGHT
*Deregistered* - TrueSight
.
Contents of the 'Scheduled Tasks' folder
.
2012-11-14 c:\windows\Tasks\Adobe Flash Player Updater.job
- c:\windows\system32\Macromed\Flash\FlashPlayerUpdateService.exe [2012-11-02 23:32]
.
2012-11-14 c:\windows\Tasks\GoogleUpdateTaskMachineCore.job
- c:\program files\Google\Update\GoogleUpdate.exe [2012-11-09 04:23]
.
2012-11-14 c:\windows\Tasks\GoogleUpdateTaskMachineUA.job
- c:\program files\Google\Update\GoogleUpdate.exe [2012-11-09 04:23]
.
.
------- Supplementary Scan -------
.
uStart Page = about:blank
IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~1\Office12\EXCEL.EXE/3000
Trusted Zone: hcl.com
Trusted Zone: hcl.in
Trusted Zone: myhcl.com
Trusted Zone: myhcl.in
Trusted Zone: nda-hclt-cer
TCP: DhcpNameServer = 192.168.0.1 192.168.0.1
FF - ProfilePath - c:\users\Ashutosh.Sohani\AppData\Roaming\Mozilla\Firefox\Profiles\0rq5t2vj.default\
FF - prefs.js: browser.startup.homepage - hxxp://www.myhcl.in/
FF - prefs.js: keyword.URL - hxxp://www.google.com/search?ie=UTF-8&oe=UTF-8&sourceid=navclient&gfns=1&q=
FF - prefs.js: network.proxy.type - 0
FF - ExtSQL: 2012-10-07 19:01; {82AF8DCA-6DE9-405D-BD5E-43525BDAD38A}; c:\program files\Mozilla Firefox\extensions\{82AF8DCA-6DE9-405D-BD5E-43525BDAD38A}
FF - ExtSQL: 2012-11-09 08:14; jid1-yZwVFzbsyfMrqQ@jetpack; c:\users\Ashutosh.Sohani\AppData\Roaming\Mozilla\Firefox\Profiles\0rq5t2vj.default\extensions\jid1-yZwVFzbsyfMrqQ@jetpack
.
.
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\postgresql-8.4]
"ImagePath"="C:/Program Files/PostgreSQL/8.4/bin/pg_ctl.exe runservice -N \"postgresql-8.4\" -D \"C:/Program Files/PostgreSQL/8.4/data\" -w"
.
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\MySQL]
"ImagePath"="\"c:\program files\MySQL\MySQL Server 5.1\bin\mysqld\" --defaults-file=\"c:\program files\MySQL\MySQL Server 5.1\my.ini\" MySQL"
.
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\postgresql-8.4]
"ImagePath"="C:/Program Files/PostgreSQL/8.4/bin/pg_ctl.exe runservice -N \"postgresql-8.4\" -D \"C:/Program Files/PostgreSQL/8.4/data\" -w"
.
--------------------- LOCKED REGISTRY KEYS ---------------------
.
[HKEY_USERS\S-1-5-21-333653013-2304839960-3876203932-192390_Classes\CLSID\{5ED60779-4DE2-4E07-B862-974CA4FF2E9C}]
@Denied: (Full) (Everyone)
@Allowed: (Read) (RestrictedCode)
"scansk"=hex(0):6e,ff,49,c1,0e,ed,ab,1b,46,4d,43,61,ee,83,c4,28,0a,4c,12,00,1f,
75,ef,eb,6a,33,fb,65,b7,9e,6e,9a,be,2d,7b,09,1e,48,d6,03,00,00,00,00,00,00,\
.
[HKEY_USERS\S-1-5-21-333653013-2304839960-3876203932-192390_Classes\CLSID\{a5e5614b-c7ce-4b6e-85ef-9fbb26a3ab41}]
@Denied: (Full) (Everyone)
@Allowed: (Read) (RestrictedCode)
"Model"=dword:00000064
"Therad"=dword:00000026
"MData"=hex(0):2b,8f,78,29,5a,0c,ce,ec,48,d4,68,e5,9f,6a,96,3e,ab,de,c5,81,26,
38,95,44,75,07,18,dd,fb,11,42,94,27,b7,99,0d,2a,ba,05,1a,a2,02,c9,3e,9b,f9,\
.
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0001\AllUserSettings]
@Denied: (A) (Users)
@Denied: (A) (Everyone)
@Allowed: (B 1 2 3 4 5) (S-1-5-20)
"BlindDial"=dword:00000000
.
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0002\AllUserSettings]
@Denied: (A) (Users)
@Denied: (A) (Everyone)
@Allowed: (B 1 2 3 4 5) (S-1-5-20)
"BlindDial"=dword:00000000
.
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0005\AllUserSettings]
@Denied: (A) (Users)
@Denied: (A) (Everyone)
@Allowed: (B 1 2 3 4 5) (S-1-5-20)
"BlindDial"=dword:00000000
.
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0006\AllUserSettings]
@Denied: (A) (Users)
@Denied: (A) (Everyone)
@Allowed: (B 1 2 3 4 5) (S-1-5-20)
"BlindDial"=dword:00000000
.
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\PCW\Security]
@Denied: (Full) (Everyone)
.
Completion time: 2012-11-15 03:06:26
ComboFix-quarantined-files.txt 2012-11-14 21:36
ComboFix2.txt 2012-11-13 10:17
.
Pre-Run: 14,029,303,808 bytes free
Post-Run: 14,069,469,184 bytes free
.
- - End Of File - - 630223F686C3CA658042E4E85E5BA2DF




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users