Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

AV Security Essentials running but can't find


  • This topic is locked This topic is locked
49 replies to this topic

#1 spyder9179

spyder9179

  • Members
  • 38 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:12:20 PM

Posted 13 August 2013 - 09:04 AM

As instructed, here's the new topic, with dds logs and combofix log.

 

 

DDS log:

 

DDS (Ver_2012-11-20.01) - NTFS_x86
Internet Explorer: 8.0.6001.18702  BrowserJavaVersion: 10.21.2
Run by Russell at 9:00:12 on 2013-08-13
Microsoft Windows XP Professional  5.1.2600.3.1252.1.1033.18.1014.432 [GMT -5:00]
.
AV: AV Security Essentials *Enabled/Updated* {0DCFFBED-0F7C-4BCA-9478-79A858843522}
FW: AV Security Essentials *Enabled*
.
============== Running Processes ================
.
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Broadcom\ASFIPMon\AsfIpMon.exe
C:\Program Files\Java\jre7\bin\jqs.exe
C:\Program Files\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE
C:\Program Files\Microsoft SQL Server\MSSQL$MICROSOFTSMLBIZ\Binn\sqlservr.exe
C:\Program Files\Dell\QuickSet\NICCONFIGSVC.exe
C:\WINDOWS\system32\HPZipm12.exe
C:\WINDOWS\system32\StacSV.exe
C:\Program Files\Wave Systems Corp\Trusted Drive Manager\TdmService.exe
C:\WINDOWS\system32\dllhost.exe
C:\WINDOWS\system32\dllhost.exe
C:\WINDOWS\System32\alg.exe
C:\WINDOWS\system32\wbem\wmiprvse.exe
C:\WINDOWS\system32\msdtc.exe
C:\Program Files\DellTPad\Apoint.exe
C:\WINDOWS\system32\hkcmd.exe
C:\WINDOWS\system32\igfxpers.exe
C:\Program Files\Wave Systems Corp\Services Manager\Docmgr\bin\WavXDocMgr.exe
C:\Program Files\Wave Systems Corp\SecureUpgrade.exe
C:\Program Files\BillP Studios\WinPatrol\winpatrol.exe
C:\Program Files\Sharp\Sharpdesk\FtpServer.exe
C:\WINDOWS\system32\igfxsrvc.exe
C:\Program Files\Common Files\Java\Java Update\jusched.exe
C:\Program Files\DellTPad\ApMsgFwd.exe
C:\Program Files\DellTPad\HidFind.exe
C:\Program Files\Sharp\Sharpdesk\nsapp.exe
C:\WINDOWS\system32\ctfmon.exe
C:\WINDOWS\explorer.exe
C:\Program Files\Mozilla Firefox\firefox.exe
C:\Program Files\Mozilla Firefox\plugin-container.exe
C:\WINDOWS\system32\wbem\wmiprvse.exe
C:\WINDOWS\system32\svchost.exe -k DcomLaunch
C:\WINDOWS\system32\svchost.exe -k rpcss
C:\WINDOWS\System32\svchost.exe -k netsvcs
C:\WINDOWS\system32\svchost.exe -k NetworkService
C:\WINDOWS\system32\svchost.exe -k LocalService
C:\WINDOWS\system32\svchost.exe -k LocalService
C:\WINDOWS\system32\svchost.exe -k imgsvc
C:\WINDOWS\System32\svchost.exe -k HTTPFilter
C:\WINDOWS\system32\svchost.exe -k netsvcs
.
============== Pseudo HJT Report ===============
.
uStart Page = hxxp://www.sharp-pcservice.com/
uInternet Connection Wizard,ShellNext = iexplore
uSearchAssistant = hxxp://www.google.com/ie
uSearchURL,(Default) = hxxp://www.google.com/search?q=%s
BHO: Adobe PDF Reader Link Helper: {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - c:\program files\common files\adobe\acrobat\activex\AcroIEHelper.dll
BHO: Java™ Plug-In SSV Helper: {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - c:\program files\java\jre7\bin\ssv.dll
BHO: CBrowserHelperObject Object: {CA6319C0-31B7-401E-A518-A07C3DB8F777} - c:\program files\dell\bae\BAE.dll
BHO: Java™ Plug-In 2 SSV Helper: {DBC80044-A445-435b-BC74-9C25C1C588A9} - c:\program files\java\jre7\bin\jp2ssv.dll
mRun: [Apoint] c:\program files\delltpad\Apoint.exe
mRun: [HotKeysCmds] c:\windows\system32\hkcmd.exe
mRun: [Persistence] c:\windows\system32\igfxpers.exe
mRun: [WavXMgr] c:\program files\wave systems corp\services manager\docmgr\bin\WavXDocMgr.exe
mRun: [SecureUpgrade] c:\program files\wave systems corp\SecureUpgrade.exe
mRun: [Broadcom Wireless Manager UI] c:\windows\system32\WLTRAY.exe
mRun: [SN0XRCV] c:\windows\system32\spool\drivers\w32x86\3\SN0XRCV.exe
mRun: [IgfxTray] c:\windows\system32\igfxtray.exe
mRun: [WinPatrol] c:\program files\billp studios\winpatrol\winpatrol.exe -expressboot
mRun: [Adobe ARM] "c:\program files\common files\adobe\arm\1.0\AdobeARM.exe"
mRun: [IndexTray] "c:\program files\sharp\sharpdesk\IndexTray.exe" /n
mRun: [TypeRegChecker] "c:\program files\sharp\sharpdesk\TypeRegChecker.exe"
mRun: [FtpServer.exe] "c:\program files\sharp\sharpdesk\FtpServer.exe" -usedefault
mRun: [SunJavaUpdateSched] "c:\program files\common files\java\java update\jusched.exe"
uPolicies-Explorer: NoDriveTypeAutoRun = dword:323
uPolicies-Explorer: NoDriveAutoRun = dword:67108863
uPolicies-Explorer: NoDrives = dword:0
mPolicies-Explorer: NoDriveAutoRun = dword:67108863
mPolicies-Explorer: NoDriveTypeAutoRun = dword:323
mPolicies-Explorer: NoDrives = dword:0
mPolicies-Windows\System: Allow-LogonScript-NetbiosDisabled = dword:1
mPolicies-Explorer: NoDriveTypeAutoRun = dword:323
mPolicies-Explorer: NoDriveAutoRun = dword:67108863
IE: Save video on Savevid.com - c:\program files\savevidplug-in\redirect.htm
IE: {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe
IE: {FA9B9510-9FCB-4ca0-818C-5D0987B47C4D} - c:\program files\pokerstars.net\PokerStarsUpdate.exe
IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe
.
INFO: HKCU has more than 50 listed domains.
If you wish to scan all of them, select the 'Force scan all domains' option.
.
DPF: {31435657-9980-0010-8000-00AA00389B71} - hxxp://download.microsoft.com/download/e/2/f/e2fcec4b-6c8b-48b7-adab-ab9c403a978f/wvc1dmo.cab
DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} - hxxp://www.update.microsoft.com/windowsupdate/v6/V5Controls/en/x86/client/wuweb_site.cab?1205437441578
DPF: {7530BFB8-7293-4D34-9923-61A11451AFC5} - hxxp://download.eset.com/special/eos/OnlineScanner.cab
DPF: {BF985246-09BF-11D2-BE62-006097DF57F6} - hxxp://simcity.ea.com/play/classic/SimCityX.cab
DPF: {DF780F87-FF2B-4DF8-92D0-73DB16A1543A} - hxxp://www.shockwave.com/content/insaniquarium/sis/popcaploader_v10.cab
TCP: Interfaces\{5C2CC0E4-AF4F-42F4-B6CE-2F05D1E1DE91} : NameServer = 192.168.1.1
Handler: sds - {79E0F14C-9C52-4218-89A7-7C4B0563D121} - c:\program files\sharp\sharpdesk\ExplorerExtensions.dll
Notify: igfxcui - igfxdev.dll
SSODL: WPDShServiceObj - {AAA288BA-9A4C-45B0-95D7-94D524869DB5} - c:\windows\system32\WPDShServiceObj.dll
.
================= FIREFOX ===================
.
FF - ProfilePath - c:\documents and settings\russell\application data\mozilla\firefox\profiles\gxn98iam.default\
FF - plugin: c:\documents and settings\russell\application data\mozilla\plugins\npatgpc.dll
FF - plugin: c:\documents and settings\russell\local settings\application data\unity\webplayer\loader\npUnity3D32.dll
FF - plugin: c:\program files\adobe\reader 10.0\reader\air\nppdf32.dll
FF - plugin: c:\program files\java\jre7\bin\plugin2\npjp2.dll
FF - plugin: c:\windows\system32\adobe\director\np32dsw_1166636.dll
FF - plugin: c:\windows\system32\macromed\flash\NPSWF32_11_7_700_224.dll
.
============= SERVICES / DRIVERS ===============
.
R2 ASFIPmon;Broadcom ASF IP and SMBIOS Mailbox Monitor;c:\program files\broadcom\asfipmon\AsfIpMon.exe [2007-6-20 79168]
R2 Wave UCSPlus;Wave UCSPlus;c:\windows\system32\dllhost.exe [2004-8-11 5120]
R3 DXEC01;DXEC01;c:\windows\system32\drivers\dxec01.sys [2006-11-2 97536]
S3 ACRUSBTM;ACRUSBTM;c:\windows\system32\drivers\ACRUSBTM.SYS [2011-12-20 28672]
S3 FlyUsb;FLY Fusion;c:\windows\system32\drivers\FlyUsb.sys [2010-12-30 18560]
S3 rkhdrv40;Rootkit Unhooker Driver; [x]
.
=============== Created Last 30 ================
.
2013-08-12 15:27:54    --------    d--h--w-    c:\windows\PIF
2013-08-02 18:15:59    --------    d-----w-    C:\RkUnhooker
2013-08-02 17:48:32    256000    ----a-w-    c:\windows\PEV.exe
2013-08-02 17:48:32    208896    ----a-w-    c:\windows\MBR.exe
2013-08-02 17:48:31    98816    ----a-w-    c:\windows\sed.exe
2013-07-28 08:00:42    --------    d-----w-    c:\windows\system32\MRT
.
==================== Find3M  ====================
.
2013-06-12 05:02:38    71048    ----a-w-    c:\windows\system32\FlashPlayerCPLApp.cpl
2013-06-12 05:02:38    692104    ----a-w-    c:\windows\system32\FlashPlayerApp.exe
2013-06-08 04:55:44    385024    ----a-w-    c:\windows\system32\html.iec
2013-06-07 21:56:06    920064    ----a-w-    c:\windows\system32\wininet.dll
2013-06-07 21:56:06    43520    ----a-w-    c:\windows\system32\licmgr10.dll
2013-06-07 21:56:05    1469440    ------w-    c:\windows\system32\inetcpl.cpl
2013-06-04 07:23:02    562688    ----a-w-    c:\windows\system32\qedit.dll
2013-06-04 01:40:45    1876736    ----a-w-    c:\windows\system32\win32k.sys
.
============= FINISH:  9:01:18.20 ===============
 

______________________________________________________________________________

 

 

 

Combofix log:

 

 

 

Attached Files



BC AdBot (Login to Remove)

 


#2 spyder9179

spyder9179
  • Topic Starter

  • Members
  • 38 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:12:20 PM

Posted 13 August 2013 - 09:16 AM

Oops, sorry, here's the combofix log:

 

ComboFix 13-08-12.01 - Russell 08/13/2013   9:07.10.1 - x86
Microsoft Windows XP Professional  5.1.2600.3.1252.1.1033.18.1014.660 [GMT -5:00]
Running from: c:\documents and settings\Russell\Desktop\virus removal\ComboFix.exe
AV: AV Security Essentials *Enabled/Updated* {0DCFFBED-0F7C-4BCA-9478-79A858843522}
FW: AV Security Essentials *Enabled* {D10C07E6-AEFB-465F-BC5B-70565A6EF70C}
.
.
(((((((((((((((((((((((((   Files Created from 2013-07-13 to 2013-08-13  )))))))))))))))))))))))))))))))
.
.
2013-08-12 15:27 . 2013-08-12 15:27    --------    d--h--w-    c:\windows\PIF
2013-08-02 18:15 . 2013-08-02 18:16    --------    d-----w-    C:\RkUnhooker
2013-07-28 08:00 . 2013-07-28 08:04    --------    d-----w-    c:\windows\system32\MRT
.
.
.
((((((((((((((((((((((((((((((((((((((((   Find3M Report   ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2013-08-12 15:17 . 2008-03-12 20:19    0    ----a-w-    c:\documents and settings\Russell\Local Settings\Application Data\WavXMapDrive.bat
2013-06-12 05:02 . 2012-06-11 19:20    692104    ----a-w-    c:\windows\system32\FlashPlayerApp.exe
2013-06-12 05:02 . 2011-07-08 14:45    71048    ----a-w-    c:\windows\system32\FlashPlayerCPLApp.cpl
2013-06-08 04:55 . 2004-08-11 23:00    385024    ----a-w-    c:\windows\system32\html.iec
2013-06-07 21:56 . 2004-08-11 23:00    920064    ----a-w-    c:\windows\system32\wininet.dll
2013-06-07 21:56 . 2004-08-11 23:00    43520    ----a-w-    c:\windows\system32\licmgr10.dll
2013-06-07 21:56 . 2004-08-11 23:00    1469440    ------w-    c:\windows\system32\inetcpl.cpl
2013-06-04 07:23 . 2004-08-11 23:00    562688    ----a-w-    c:\windows\system32\qedit.dll
2013-06-04 01:40 . 2004-08-11 23:00    1876736    ----a-w-    c:\windows\system32\win32k.sys
2013-04-27 11:00 . 2013-08-07 16:18    305680    ----a-w-    c:\program files\mozilla firefox\plugins\ieatgpc.dll
.
.
(((((((((((((((((((((((((((((((((((((   Reg Loading Points   ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"Apoint"="c:\program files\DellTPad\Apoint.exe" [2007-09-10 159744]
"HotKeysCmds"="c:\windows\system32\hkcmd.exe" [2007-09-10 166424]
"Persistence"="c:\windows\system32\igfxpers.exe" [2007-09-10 137752]
"WavXMgr"="c:\program files\Wave Systems Corp\Services Manager\Docmgr\bin\WavXDocMgr.exe" [2007-09-10 92160]
"SecureUpgrade"="c:\program files\Wave Systems Corp\SecureUpgrade.exe" [2007-09-14 218424]
"Broadcom Wireless Manager UI"="c:\windows\system32\WLTRAY.exe" [2007-10-09 2183168]
"SN0XRCV"="c:\windows\system32\spool\drivers\w32x86\3\SN0XRCV.exe" [2006-10-23 102400]
"IgfxTray"="c:\windows\system32\igfxtray.exe" [2007-09-10 141848]
"WinPatrol"="c:\program files\BillP Studios\WinPatrol\winpatrol.exe" [2011-05-15 325512]
"Adobe ARM"="c:\program files\Common Files\Adobe\ARM\1.0\AdobeARM.exe" [2013-04-04 958576]
"IndexTray"="c:\program files\Sharp\Sharpdesk\IndexTray.exe" [2008-09-20 106496]
"TypeRegChecker"="c:\program files\Sharp\Sharpdesk\TypeRegChecker.exe" [2008-09-20 57344]
"FtpServer.exe"="c:\program files\Sharp\Sharpdesk\FtpServer.exe" [2008-06-13 704512]
"SunJavaUpdateSched"="c:\program files\Common Files\Java\Java Update\jusched.exe" [2013-03-12 253816]
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\Wdf01000.sys]
@="Driver"
.
[HKLM\~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^HP Digital Imaging Monitor.lnk]
path=c:\documents and settings\All Users\Start Menu\Programs\Startup\HP Digital Imaging Monitor.lnk
backup=c:\windows\pss\HP Digital Imaging Monitor.lnkCommon Startup
.
[HKLM\~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^Service Manager.lnk]
path=c:\documents and settings\All Users\Start Menu\Programs\Startup\Service Manager.lnk
backup=c:\windows\pss\Service Manager.lnkCommon Startup
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\FtpServer.exe]
2008-06-13 08:16    704512    ----a-w-    c:\program files\SHARP\Sharpdesk\FTPServer.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\HP Software Update]
2005-12-15 16:18    49152    ----a-w-    c:\program files\HP\HP Software Update\hpwuSchd2.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\IndexTray]
2008-09-20 07:16    106496    ----a-w-    c:\program files\SHARP\Sharpdesk\IndexTray.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\KADxMain]
2006-11-02 20:05    282624    ----a-w-    c:\windows\system32\KADxMain.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\PDVDDXSrv]
2006-10-20 23:23    118784    ------w-    c:\program files\CyberLink\PowerDVD DX\PDVDDXSrv.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\SharpTray]
2008-09-20 07:34    32768    ----a-w-    c:\program files\SHARP\Sharpdesk\SharpTray.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\SigmatelSysTrayApp]
2007-09-14 01:37    405504    ----a-w-    c:\windows\stsystra.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\TypeRegChecker]
2008-09-20 07:18    57344    ----a-w-    c:\program files\SHARP\Sharpdesk\TypeRegChecker.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\security center]
"AntiVirusOverride"=dword:00000001
.
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]
"EnableFirewall"= 0 (0x0)
.
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=
"c:\\Documents and Settings\\Russell\\Application Data\\uTorrent\\uTorrent.exe"=
.
R2 ASFIPmon;Broadcom ASF IP and SMBIOS Mailbox Monitor;c:\program files\Broadcom\ASFIPMon\AsfIpMon.exe [6/20/2007 3:30 PM 79168]
R2 Wave UCSPlus;Wave UCSPlus;c:\windows\system32\dllhost.exe [8/11/2004 6:00 PM 5120]
R3 DXEC01;DXEC01;c:\windows\system32\drivers\dxec01.sys [11/2/2006 1:32 PM 97536]
S3 ACRUSBTM;ACRUSBTM;c:\windows\system32\drivers\ACRUSBTM.SYS [12/20/2011 5:05 PM 28672]
S3 FlyUsb;FLY Fusion;c:\windows\system32\drivers\FlyUsb.sys [12/30/2010 10:54 AM 18560]
S3 rkhdrv40;Rootkit Unhooker Driver; [x]
.
--- Other Services/Drivers In Memory ---
.
*NewlyCreated* - 75693854
*Deregistered* - 75693854
.
Contents of the 'Scheduled Tasks' folder
.
2013-08-13 c:\windows\Tasks\Adobe Flash Player Updater.job
- c:\windows\system32\Macromed\Flash\FlashPlayerUpdateService.exe [2012-06-11 05:02]
.
.
------- Supplementary Scan -------
.
uStart Page = hxxp://www.sharp-pcservice.com/
uInternet Connection Wizard,ShellNext = iexplore
uSearchAssistant = hxxp://www.google.com/ie
uSearchURL,(Default) = hxxp://www.google.com/search?q=%s
IE: Save video on Savevid.com - c:\program files\SavevidPlug-in\redirect.htm
TCP: Interfaces\{5C2CC0E4-AF4F-42F4-B6CE-2F05D1E1DE91}: NameServer = 192.168.1.1
FF - ProfilePath - c:\documents and settings\Russell\Application Data\Mozilla\Firefox\Profiles\gxn98iam.default\
.
.
**************************************************************************
.
catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2013-08-13 09:12
Windows 5.1.2600 Service Pack 3 NTFS
.
scanning hidden processes ...  
.
scanning hidden autostart entries ...
.
scanning hidden files ...  
.
scan completed successfully
hidden files: 0
.
**************************************************************************
.
--------------------- LOCKED REGISTRY KEYS ---------------------
.
[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}]
@Denied: (A 2) (Everyone)
@="FlashBroker"
"LocalizedString"="@c:\\WINDOWS\\system32\\Macromed\\Flash\\FlashUtil32_11_7_700_224_ActiveX.exe,-101"
.
[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\Elevation]
"Enabled"=dword:00000001
.
[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\LocalServer32]
@="c:\\WINDOWS\\system32\\Macromed\\Flash\\FlashUtil32_11_7_700_224_ActiveX.exe"
.
[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\TypeLib]
@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"
.
[HKEY_LOCAL_MACHINE\software\Classes\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}]
@Denied: (A 2) (Everyone)
@="IFlashBroker5"
.
[HKEY_LOCAL_MACHINE\software\Classes\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}\ProxyStubClsid32]
@="{00020424-0000-0000-C000-000000000046}"
.
[HKEY_LOCAL_MACHINE\software\Classes\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}\TypeLib]
@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"
"Version"="1.0"
.
--------------------- DLLs Loaded Under Running Processes ---------------------
.
- - - - - - - > 'winlogon.exe'(928)
c:\windows\System32\BCMLogon.dll
.
- - - - - - - > 'explorer.exe'(388)
c:\windows\system32\WININET.dll
c:\program files\BillP Studios\WinPatrol\PATROLPRO.DLL
c:\windows\system32\ieframe.dll
c:\windows\system32\webcheck.dll
c:\windows\system32\WPDShServiceObj.dll
c:\windows\system32\PortableDeviceTypes.dll
c:\windows\system32\PortableDeviceApi.dll
.
Completion time: 2013-08-13  09:14:23
ComboFix-quarantined-files.txt  2013-08-13 14:14
ComboFix2.txt  2013-08-12 15:42
ComboFix3.txt  2013-08-12 15:24
ComboFix4.txt  2013-08-09 13:39
ComboFix5.txt  2013-08-13 14:05
.
Pre-Run: 29,413,474,304 bytes free
Post-Run: 29,396,692,992 bytes free
.
- - End Of File - - D8E49258EAA0CDB8542A45500C88BEBB
8F558EB6672622401DA993E1E865C861
 



#3 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:05:20 PM

Posted 16 August 2013 - 06:20 PM

Hi,

Welcome to Bleeping Computer. My name is m0le and I will be helping you with your log.
  • Please subscribe to this topic, if you haven't already. Click the Watch This Topic button at the top on the right.
  • Please avoid installing/uninstalling or updating any programs and attempting any unsupervised fixes or scans. This can make helping you impossible.
  • Please reply to this post so I know you are there.
The forum is busy and we need to have replies as soon as possible. If I haven't had a reply after 3 days I will bump the topic and if you do not reply by the following day after that then I will close the topic.

Once I receive a reply then I will return with your first instructions.

Thanks :thumbup2:
Posted Image
m0le is a proud member of UNITE

#4 spyder9179

spyder9179
  • Topic Starter

  • Members
  • 38 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:12:20 PM

Posted 19 August 2013 - 08:03 AM

Ready when you are...



#5 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:05:20 PM

Posted 20 August 2013 - 06:07 PM

Please run both MBAM and SAS.

Please download mbam-logo-new100_big.jpgMalwarebytes Anti-Malware and save it to your desktop.
  • Make sure you are connected to the Internet.
  • Double-click on mbam-setup.exe to install the application or, if you are using Vista, right-click and select Run As Administrator on mbam-setup.exe to install the application.
  • When the installation begins, follow the prompts and do not make any changes to default settings.
  • When installation has finished, make sure you leave both of these checked:
    • Update Malwarebytes' Anti-Malware
    • Launch Malwarebytes' Anti-Malware
  • Then click Finish.
  • MBAM will automatically start and you will be asked to update the program before performing a scan. If an update is found, the program will automatically update itself. Press the OK button to close that box and continue.
    If MBAM won't update then download and update MBAM on a clean computer then save the rules.ref folder to a memory stick. This file is found here: 'C:\Documents and Settings\All Users\Application Data\Malwarebytes\Malwarebytes' Anti-Malware' then transfer it across to the infected computer.
  • On the Scanner tab:
    • Make sure the "Perform Full Scan" option is selected.
    • Then click on the Scan button.
  • If asked to select the drives to scan, leave all the drives selected and click on the Start Scan button.
  • The scan will begin and "Scan in progress" will show at the top. It may take some time to complete so please be patient.
  • When the scan is finished, a message box will say "The scan completed successfully. Click 'Show Results' to display all objects found".
  • Click OK to close the message box and continue with the removal process.
  • Back at the main Scanner screen, click on the Show Results button to see a list of any malware that was found.
  • Make sure that everything is checked, and click Remove Selected.
  • When removal is completed, a log report will open in Notepad.
  • The log is automatically saved and can be viewed by clicking the Logs tab in MBAM.
  • Copy and paste the contents of that report in your next reply and exit MBAM.
Note: If MBAM encounters a file that is difficult to remove, you may be asked to reboot your computer so it can proceed with the disinfection process. Regardless if prompted to restart the computer or not, please do so immediately. Failure to reboot normally (not into safe mode) will prevent MBAM from removing all the malware. MBAM may make changes to your registry as part of its disinfection routine. If you're using other security programs that detect registry changes, they may alert you after scanning with MBAM. Please permit the program to allow the changes.


Then

Download Superantispyware
  • Load Superantispyware and click the check for updates button.
  • Once the update is finished click the scan your computer button.
  • Check Perform Complete Scan and then next.
  • Superantispyware will now scan your computer and when its finished it will list all the infections it has found.
  • Make sure that they all have a check next to them and press next.
  • Click finish and you will be taken back to the main interface.
  • Click Preferences and then click the statistics/logs tab. Click the dated log and press view log and a text file will appear.
  • Copy and paste the log onto the forum.

Posted Image
m0le is a proud member of UNITE

#6 spyder9179

spyder9179
  • Topic Starter

  • Members
  • 38 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:12:20 PM

Posted 21 August 2013 - 01:42 PM

MBAM LOG:

 

 

 

Malwarebytes Anti-Malware 1.75.0.1300
www.malwarebytes.org

Database version: v2013.08.21.03

Windows XP Service Pack 3 x86 NTFS
Internet Explorer 8.0.6001.18702
Russell :: LAPTOP [administrator]

8/21/2013 8:18:07 AM
mbam-log-2013-08-21 (08-18-07).txt

Scan type: Full scan (C:\|D:\|)
Scan options enabled: Memory | Startup | Registry | File System | Heuristics/Extra | Heuristics/Shuriken | PUP | PUM
Scan options disabled: P2P
Objects scanned: 299861
Time elapsed: 1 hour(s), 17 minute(s), 35 second(s)

Memory Processes Detected: 0
(No malicious items detected)

Memory Modules Detected: 0
(No malicious items detected)

Registry Keys Detected: 0
(No malicious items detected)

Registry Values Detected: 0
(No malicious items detected)

Registry Data Items Detected: 0
(No malicious items detected)

Folders Detected: 0
(No malicious items detected)

Files Detected: 0
(No malicious items detected)

(end)
 

 

 

SAS LOG:

 

SUPERAntiSpyware Scan Log
http://www.superantispyware.com

Generated 08/21/2013 at 10:37 AM

Application Version : 5.6.1032

Core Rules Database Version : 10705
Trace Rules Database Version: 8517

Scan type       : Complete Scan
Total Scan Time : 00:52:55

Operating System Information
Windows XP Professional 32-bit, Service Pack 3 (Build 5.01.2600)
Administrator

Memory items scanned      : 512
Memory threats detected   : 0
Registry items scanned    : 38782
Registry threats detected : 4
File items scanned        : 45651
File threats detected     : 195

Browser Hijacker.Internet Explorer Settings Hijack
    HKU\S-1-5-19\Software\Microsoft\Internet Explorer\SearchScopes#URL [ http://findgala.com/?&uid=8050&q={searchTerms} ]
    HKU\S-1-5-19_Classes\Software\Microsoft\Internet Explorer\SearchScopes#URL [ http://findgala.com/?&uid=8050&q={searchTerms} ]
    HKU\S-1-5-20\Software\Microsoft\Internet Explorer\SearchScopes#URL [ http://findgala.com/?&uid=8050&q={searchTerms} ]
    HKU\S-1-5-20_Classes\Software\Microsoft\Internet Explorer\SearchScopes#URL [ http://findgala.com/?&uid=8050&q={searchTerms} ]

Adware.Tracking Cookie
    C:\Documents and Settings\Russell\Cookies\russell@247realmedia[2].txt [ /247realmedia ]
    C:\Documents and Settings\Russell\Cookies\russell@2o7[2].txt [ /2o7 ]
    C:\Documents and Settings\Russell\Cookies\russell@a1.interclick[2].txt [ /a1.interclick ]
    C:\Documents and Settings\Russell\Cookies\russell@ad.wsod[1].txt [ /ad.wsod ]
    C:\Documents and Settings\Russell\Cookies\russell@ad.yieldmanager[1].txt [ /ad.yieldmanager ]
    C:\Documents and Settings\Russell\Cookies\russell@ad.yieldmanager[2].txt [ /ad.yieldmanager ]
    C:\Documents and Settings\Russell\Cookies\russell@adbrite[1].txt [ /adbrite ]
    C:\Documents and Settings\Russell\Cookies\russell@adbrite[2].txt [ /adbrite ]
    C:\Documents and Settings\Russell\Cookies\russell@adbrite[3].txt [ /adbrite ]
    C:\Documents and Settings\Russell\Cookies\russell@ads.addynamix[1].txt [ /ads.addynamix ]
    C:\Documents and Settings\Russell\Cookies\russell@ads.bighealthtree[1].txt [ /ads.bighealthtree ]
    C:\Documents and Settings\Russell\Cookies\russell@ads.blogtalkradio[2].txt [ /ads.blogtalkradio ]
    C:\Documents and Settings\Russell\Cookies\russell@ads.bridgetrack[1].txt [ /ads.bridgetrack ]
    C:\Documents and Settings\Russell\Cookies\russell@ads.financialcontent[1].txt [ /ads.financialcontent ]
    C:\Documents and Settings\Russell\Cookies\russell@ads.lycos[1].txt [ /ads.lycos ]
    C:\Documents and Settings\Russell\Cookies\russell@ads.undertone[1].txt [ /ads.undertone ]
    C:\Documents and Settings\Russell\Cookies\russell@ads.undertone[2].txt [ /ads.undertone ]
    C:\Documents and Settings\Russell\Cookies\russell@ads.undertone[4].txt [ /ads.undertone ]
    C:\Documents and Settings\Russell\Cookies\russell@adserver.adtechus[2].txt [ /adserver.adtechus ]
    C:\Documents and Settings\Russell\Cookies\russell@advertise[2].txt [ /advertise ]
    C:\Documents and Settings\Russell\Cookies\russell@advertise[3].txt [ /advertise ]
    C:\Documents and Settings\Russell\Cookies\russell@advertising[1].txt [ /advertising ]
    C:\Documents and Settings\Russell\Cookies\russell@advertising[3].txt [ /advertising ]
    C:\Documents and Settings\Russell\Cookies\russell@advertising[4].txt [ /advertising ]
    C:\Documents and Settings\Russell\Cookies\russell@adxpose[1].txt [ /adxpose ]
    C:\Documents and Settings\Russell\Cookies\russell@affiliate.gmtracker[1].txt [ /affiliate.gmtracker ]
    C:\Documents and Settings\Russell\Cookies\russell@affiliate.hbytracker[1].txt [ /affiliate.hbytracker ]
    C:\Documents and Settings\Russell\Cookies\russell@amznshopbop.122.2o7[1].txt [ /amznshopbop.122.2o7 ]
    C:\Documents and Settings\Russell\Cookies\russell@apmebf[2].txt [ /apmebf ]
    C:\Documents and Settings\Russell\Cookies\russell@atdmt[2].txt [ /atdmt ]
    C:\Documents and Settings\Russell\Cookies\russell@beacon.dmsinsights[2].txt [ /beacon.dmsinsights ]
    C:\Documents and Settings\Russell\Cookies\russell@burstnet[1].txt [ /burstnet ]
    C:\Documents and Settings\Russell\Cookies\russell@burstnet[3].txt [ /burstnet ]
    C:\Documents and Settings\Russell\Cookies\russell@cdn1.trafficmp[1].txt [ /cdn1.trafficmp ]
    C:\Documents and Settings\Russell\Cookies\russell@cdn4.specificclick[1].txt [ /cdn4.specificclick ]
    C:\Documents and Settings\Russell\Cookies\russell@clickbooth[1].txt [ /clickbooth ]
    C:\Documents and Settings\Russell\Cookies\russell@content.yieldmanager[2].txt [ /content.yieldmanager ]
    C:\Documents and Settings\Russell\Cookies\russell@content.yieldmanager[3].txt [ /content.yieldmanager ]
    C:\Documents and Settings\Russell\Cookies\russell@content.yieldmanager[5].txt [ /content.yieldmanager ]
    C:\Documents and Settings\Russell\Cookies\russell@dc.tremormedia[1].txt [ /dc.tremormedia ]
    C:\Documents and Settings\Russell\Cookies\russell@dc.tremormedia[2].txt [ /dc.tremormedia ]
    C:\Documents and Settings\Russell\Cookies\russell@dc.tremormedia[3].txt [ /dc.tremormedia ]
    C:\Documents and Settings\Russell\Cookies\russell@dc.tremormedia[5].txt [ /dc.tremormedia ]
    C:\Documents and Settings\Russell\Cookies\russell@doubleclick[1].txt [ /doubleclick ]
    C:\Documents and Settings\Russell\Cookies\russell@doubleclick[2].txt [ /doubleclick ]
    C:\Documents and Settings\Russell\Cookies\russell@doubleclick[3].txt [ /doubleclick ]
    C:\Documents and Settings\Russell\Cookies\russell@doubleclick[4].txt [ /doubleclick ]
    C:\Documents and Settings\Russell\Cookies\russell@eas.apm.emediate[2].txt [ /eas.apm.emediate ]
    C:\Documents and Settings\Russell\Cookies\russell@educationcom.112.2o7[1].txt [ /educationcom.112.2o7 ]
    C:\Documents and Settings\Russell\Cookies\russell@enhance[1].txt [ /enhance ]
    C:\Documents and Settings\Russell\Cookies\russell@eyewonder[2].txt [ /eyewonder ]
    C:\Documents and Settings\Russell\Cookies\russell@gettyimages.122.2o7[2].txt [ /gettyimages.122.2o7 ]
    C:\Documents and Settings\Russell\Cookies\russell@glammedia[2].txt [ /glammedia ]
    C:\Documents and Settings\Russell\Cookies\russell@greenlightmedia.go2cloud[2].txt [ /greenlightmedia.go2cloud ]
    C:\Documents and Settings\Russell\Cookies\russell@homestore.122.2o7[1].txt [ /homestore.122.2o7 ]
    C:\Documents and Settings\Russell\Cookies\russell@imrworldwide[2].txt [ /imrworldwide ]
    C:\Documents and Settings\Russell\Cookies\russell@imrworldwide[3].txt [ /imrworldwide ]
    C:\Documents and Settings\Russell\Cookies\russell@interclick[1].txt [ /interclick ]
    C:\Documents and Settings\Russell\Cookies\russell@intermundomedia[1].txt [ /intermundomedia ]
    C:\Documents and Settings\Russell\Cookies\russell@invitemedia[1].txt [ /invitemedia ]
    C:\Documents and Settings\Russell\Cookies\russell@invitemedia[3].txt [ /invitemedia ]
    C:\Documents and Settings\Russell\Cookies\russell@invitemedia[4].txt [ /invitemedia ]
    C:\Documents and Settings\Russell\Cookies\russell@jmp.clickbooth[2].txt [ /jmp.clickbooth ]
    C:\Documents and Settings\Russell\Cookies\russell@lfstmedia[1].txt [ /lfstmedia ]
    C:\Documents and Settings\Russell\Cookies\russell@liveperson[1].txt [ /liveperson ]
    C:\Documents and Settings\Russell\Cookies\russell@liveperson[3].txt [ /liveperson ]
    C:\Documents and Settings\Russell\Cookies\russell@lucidmedia[1].txt [ /lucidmedia ]
    C:\Documents and Settings\Russell\Cookies\russell@lucidmedia[2].txt [ /lucidmedia ]
    C:\Documents and Settings\Russell\Cookies\russell@lucidmedia[3].txt [ /lucidmedia ]
    C:\Documents and Settings\Russell\Cookies\russell@media.adfrontiers[1].txt [ /media.adfrontiers ]
    C:\Documents and Settings\Russell\Cookies\russell@media6degrees[2].txt [ /media6degrees ]
    C:\Documents and Settings\Russell\Cookies\russell@media6degrees[3].txt [ /media6degrees ]
    C:\Documents and Settings\Russell\Cookies\russell@media6degrees[4].txt [ /media6degrees ]
    C:\Documents and Settings\Russell\Cookies\russell@mediabrandsww[2].txt [ /mediabrandsww ]
    C:\Documents and Settings\Russell\Cookies\russell@mediaplex[1].txt [ /mediaplex ]
    C:\Documents and Settings\Russell\Cookies\russell@mediaplex[2].txt [ /mediaplex ]
    C:\Documents and Settings\Russell\Cookies\russell@microsoftsto.112.2o7[1].txt [ /microsoftsto.112.2o7 ]
    C:\Documents and Settings\Russell\Cookies\russell@mm.chitika[2].txt [ /mm.chitika ]
    C:\Documents and Settings\Russell\Cookies\russell@network.realmedia[2].txt [ /network.realmedia ]
    C:\Documents and Settings\Russell\Cookies\russell@nextag[2].txt [ /nextag ]
    C:\Documents and Settings\Russell\Cookies\russell@qnsr[1].txt [ /qnsr ]
    C:\Documents and Settings\Russell\Cookies\russell@questionmarket[1].txt [ /questionmarket ]
    C:\Documents and Settings\Russell\Cookies\russell@questionmarket[2].txt [ /questionmarket ]
    C:\Documents and Settings\Russell\Cookies\russell@questionmarket[3].txt [ /questionmarket ]
    C:\Documents and Settings\Russell\Cookies\russell@questionmarket[4].txt [ /questionmarket ]
    C:\Documents and Settings\Russell\Cookies\russell@r1-ads.ace.advertising[1].txt [ /r1-ads.ace.advertising ]
    C:\Documents and Settings\Russell\Cookies\russell@readersdigest.122.2o7[1].txt [ /readersdigest.122.2o7 ]
    C:\Documents and Settings\Russell\Cookies\russell@realmedia[1].txt [ /realmedia ]
    C:\Documents and Settings\Russell\Cookies\russell@realmedia[2].txt [ /realmedia ]
    C:\Documents and Settings\Russell\Cookies\russell@revsci[1].txt [ /revsci ]
    C:\Documents and Settings\Russell\Cookies\russell@revsci[2].txt [ /revsci ]
    C:\Documents and Settings\Russell\Cookies\russell@ru4[1].txt [ /ru4 ]
    C:\Documents and Settings\Russell\Cookies\russell@sales.liveperson[2].txt [ /sales.liveperson ]
    C:\Documents and Settings\Russell\Cookies\russell@search.321findit[1].txt [ /search.321findit ]
    C:\Documents and Settings\Russell\Cookies\russell@search.amazeclick[1].txt [ /search.amazeclick ]
    C:\Documents and Settings\Russell\Cookies\russell@search.boltfind[2].txt [ /search.boltfind ]
    C:\Documents and Settings\Russell\Cookies\russell@search.clickcheer[2].txt [ /search.clickcheer ]
    C:\Documents and Settings\Russell\Cookies\russell@search.clicksare[2].txt [ /search.clicksare ]
    C:\Documents and Settings\Russell\Cookies\russell@search.clicksclick[1].txt [ /search.clicksclick ]
    C:\Documents and Settings\Russell\Cookies\russell@search.clicksfind[1].txt [ /search.clicksfind ]
    C:\Documents and Settings\Russell\Cookies\russell@search.clicksthe[1].txt [ /search.clicksthe ]
    C:\Documents and Settings\Russell\Cookies\russell@search.clicksthis[2].txt [ /search.clicksthis ]
    C:\Documents and Settings\Russell\Cookies\russell@search.clickwhale[2].txt [ /search.clickwhale ]
    C:\Documents and Settings\Russell\Cookies\russell@search.findsmy[1].txt [ /search.findsmy ]
    C:\Documents and Settings\Russell\Cookies\russell@search.findxml[1].txt [ /search.findxml ]
    C:\Documents and Settings\Russell\Cookies\russell@search.hippofind[2].txt [ /search.hippofind ]
    C:\Documents and Settings\Russell\Cookies\russell@search.orfind[2].txt [ /search.orfind ]
    C:\Documents and Settings\Russell\Cookies\russell@search.seekfinds[1].txt [ /search.seekfinds ]
    C:\Documents and Settings\Russell\Cookies\russell@search.toseeking[1].txt [ /search.toseeking ]
    C:\Documents and Settings\Russell\Cookies\russell@search.toseeking[2].txt [ /search.toseeking ]
    C:\Documents and Settings\Russell\Cookies\russell@server.cpmstar[2].txt [ /server.cpmstar ]
    C:\Documents and Settings\Russell\Cookies\russell@serving-sys[1].txt [ /serving-sys ]
    C:\Documents and Settings\Russell\Cookies\russell@shefinds[1].txt [ /shefinds ]
    C:\Documents and Settings\Russell\Cookies\russell@specificclick[1].txt [ /specificclick ]
    C:\Documents and Settings\Russell\Cookies\russell@specificclick[2].txt [ /specificclick ]
    C:\Documents and Settings\Russell\Cookies\russell@specificmedia[1].txt [ /specificmedia ]
    C:\Documents and Settings\Russell\Cookies\russell@statcounter[2].txt [ /statcounter ]
    C:\Documents and Settings\Russell\Cookies\russell@surveymonkey.122.2o7[1].txt [ /surveymonkey.122.2o7 ]
    C:\Documents and Settings\Russell\Cookies\russell@target.db.advertising[2].txt [ /target.db.advertising ]
    C:\Documents and Settings\Russell\Cookies\russell@theclickcheck[1].txt [ /theclickcheck ]
    C:\Documents and Settings\Russell\Cookies\russell@trafficking.nabbr[2].txt [ /trafficking.nabbr ]
    C:\Documents and Settings\Russell\Cookies\russell@tribalfusion[1].txt [ /tribalfusion ]
    C:\Documents and Settings\Russell\Cookies\russell@tribalfusion[2].txt [ /tribalfusion ]
    C:\Documents and Settings\Russell\Cookies\russell@tribalfusion[3].txt [ /tribalfusion ]
    C:\Documents and Settings\Russell\Cookies\russell@viacom.adbureau[2].txt [ /viacom.adbureau ]
    C:\Documents and Settings\Russell\Cookies\russell@viewablemedia[2].txt [ /viewablemedia ]
    C:\Documents and Settings\Russell\Cookies\russell@viewablemedia[3].txt [ /viewablemedia ]
    C:\Documents and Settings\Russell\Cookies\russell@www.burstnet[1].txt [ /www.burstnet ]
    C:\Documents and Settings\Russell\Cookies\russell@www.burstnet[2].txt [ /www.burstnet ]
    C:\Documents and Settings\Russell\Cookies\russell@www.burstnet[3].txt [ /www.burstnet ]
    C:\Documents and Settings\Russell\Cookies\russell@www.find-fast-answers[1].txt [ /www.find-fast-answers ]
    C:\Documents and Settings\Russell\Cookies\russell@www.find-quick-results[1].txt [ /www.find-quick-results ]
    C:\Documents and Settings\Russell\Cookies\russell@www.glammedia[1].txt [ /www.glammedia ]
    C:\Documents and Settings\Russell\Cookies\russell@www.googleadservices[2].txt [ /www.googleadservices ]
    C:\Documents and Settings\Russell\Cookies\russell@www.shefinds[1].txt [ /www.shefinds ]
    C:\Documents and Settings\Russell\Cookies\russell@xml.happytofind[1].txt [ /xml.happytofind ]
    C:\Documents and Settings\Russell\Cookies\russell@xml.mediality[1].txt [ /xml.mediality ]
    C:\Documents and Settings\Russell\Cookies\russell@xml.trafficengine[2].txt [ /xml.trafficengine ]
    C:\Documents and Settings\Russell\Cookies\russell@yieldmanager[1].txt [ /yieldmanager ]
    C:\Documents and Settings\Russell\Cookies\russell@yieldmanager[3].txt [ /yieldmanager ]
    C:\Documents and Settings\Russell\Cookies\5CUBZGYN.txt [ /at.atwola.com ]
    C:\Documents and Settings\Russell\Cookies\FV6T5PWU.txt [ /a1.interclick.com ]
    C:\Documents and Settings\Russell\Cookies\0FCBGMI0.txt [ /lucidmedia.com ]
    C:\Documents and Settings\Russell\Cookies\WV4332NG.txt [ /realmedia.com ]
    C:\Documents and Settings\Russell\Cookies\UQ2R2RFU.txt [ /eyeviewads.com ]
    C:\Documents and Settings\Russell\Cookies\R6KG7KE4.txt [ /casalemedia.com ]
    C:\Documents and Settings\Russell\Cookies\EH06Z6E0.txt [ /revsci.net ]
    C:\Documents and Settings\Russell\Cookies\XOLLYAFS.txt [ /interclick.com ]
    C:\Documents and Settings\Russell\Cookies\4F4SY9ZR.txt [ /adtechus.com ]
    C:\Documents and Settings\Russell\Cookies\1UNTKLDT.txt [ /ads.nlop.com ]
    C:\Documents and Settings\Russell\Cookies\IB6SXOW3.txt [ /ads.pubmatic.com ]
    C:\Documents and Settings\Russell\Cookies\SUBFHQ63.txt [ /media6degrees.com ]
    C:\Documents and Settings\Russell\Cookies\2LHMHR03.txt [ /invitemedia.com ]
    accounts.youtube.com [ C:\DOCUMENTS AND SETTINGS\RUSSELL\LOCAL SETTINGS\APPLICATION DATA\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
    .doubleclick.net [ C:\DOCUMENTS AND SETTINGS\RUSSELL\LOCAL SETTINGS\APPLICATION DATA\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
    .invitemedia.com [ C:\DOCUMENTS AND SETTINGS\RUSSELL\LOCAL SETTINGS\APPLICATION DATA\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
    .invitemedia.com [ C:\DOCUMENTS AND SETTINGS\RUSSELL\LOCAL SETTINGS\APPLICATION DATA\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
    ad.yieldmanager.com [ C:\DOCUMENTS AND SETTINGS\RUSSELL\LOCAL SETTINGS\APPLICATION DATA\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
    ad.yieldmanager.com [ C:\DOCUMENTS AND SETTINGS\RUSSELL\LOCAL SETTINGS\APPLICATION DATA\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
    ad.yieldmanager.com [ C:\DOCUMENTS AND SETTINGS\RUSSELL\LOCAL SETTINGS\APPLICATION DATA\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
    accounts.google.com [ C:\DOCUMENTS AND SETTINGS\RUSSELL\LOCAL SETTINGS\APPLICATION DATA\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
    accounts.google.com [ C:\DOCUMENTS AND SETTINGS\RUSSELL\LOCAL SETTINGS\APPLICATION DATA\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
    accounts.google.com [ C:\DOCUMENTS AND SETTINGS\RUSSELL\LOCAL SETTINGS\APPLICATION DATA\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
    .atdmt.com [ C:\DOCUMENTS AND SETTINGS\RUSSELL\LOCAL SETTINGS\APPLICATION DATA\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
    .atdmt.com [ C:\DOCUMENTS AND SETTINGS\RUSSELL\LOCAL SETTINGS\APPLICATION DATA\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
    ad.yieldmanager.com [ C:\DOCUMENTS AND SETTINGS\RUSSELL\LOCAL SETTINGS\APPLICATION DATA\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
    ad.yieldmanager.com [ C:\DOCUMENTS AND SETTINGS\RUSSELL\LOCAL SETTINGS\APPLICATION DATA\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
    ad.yieldmanager.com [ C:\DOCUMENTS AND SETTINGS\RUSSELL\LOCAL SETTINGS\APPLICATION DATA\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
    ad.yieldmanager.com [ C:\DOCUMENTS AND SETTINGS\RUSSELL\LOCAL SETTINGS\APPLICATION DATA\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
    .advertising.com [ C:\DOCUMENTS AND SETTINGS\RUSSELL\LOCAL SETTINGS\APPLICATION DATA\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
    .advertising.com [ C:\DOCUMENTS AND SETTINGS\RUSSELL\LOCAL SETTINGS\APPLICATION DATA\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
    .advertising.com [ C:\DOCUMENTS AND SETTINGS\RUSSELL\LOCAL SETTINGS\APPLICATION DATA\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
    .advertising.com [ C:\DOCUMENTS AND SETTINGS\RUSSELL\LOCAL SETTINGS\APPLICATION DATA\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
    .advertising.com [ C:\DOCUMENTS AND SETTINGS\RUSSELL\LOCAL SETTINGS\APPLICATION DATA\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
    .advertising.com [ C:\DOCUMENTS AND SETTINGS\RUSSELL\LOCAL SETTINGS\APPLICATION DATA\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
    .adinterax.com [ C:\DOCUMENTS AND SETTINGS\RUSSELL\LOCAL SETTINGS\APPLICATION DATA\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
    .adinterax.com [ C:\DOCUMENTS AND SETTINGS\RUSSELL\LOCAL SETTINGS\APPLICATION DATA\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
    .invitemedia.com [ C:\DOCUMENTS AND SETTINGS\RUSSELL\LOCAL SETTINGS\APPLICATION DATA\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
    .at.atwola.com [ C:\DOCUMENTS AND SETTINGS\RUSSELL\LOCAL SETTINGS\APPLICATION DATA\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
    www.trackerboats.com [ C:\DOCUMENTS AND SETTINGS\RUSSELL\LOCAL SETTINGS\APPLICATION DATA\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
    www.trackerboats.com [ C:\DOCUMENTS AND SETTINGS\RUSSELL\LOCAL SETTINGS\APPLICATION DATA\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
    www.trackerboats.com [ C:\DOCUMENTS AND SETTINGS\RUSSELL\LOCAL SETTINGS\APPLICATION DATA\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
    www.trackerboats.com [ C:\DOCUMENTS AND SETTINGS\RUSSELL\LOCAL SETTINGS\APPLICATION DATA\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
    www.trackerboats.com [ C:\DOCUMENTS AND SETTINGS\RUSSELL\LOCAL SETTINGS\APPLICATION DATA\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
    www.trackerboats.com [ C:\DOCUMENTS AND SETTINGS\RUSSELL\LOCAL SETTINGS\APPLICATION DATA\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
    .trackerboats.com [ C:\DOCUMENTS AND SETTINGS\RUSSELL\LOCAL SETTINGS\APPLICATION DATA\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
    .trackerboats.com [ C:\DOCUMENTS AND SETTINGS\RUSSELL\LOCAL SETTINGS\APPLICATION DATA\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
    .trackerboats.com [ C:\DOCUMENTS AND SETTINGS\RUSSELL\LOCAL SETTINGS\APPLICATION DATA\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
    .trackerboats.com [ C:\DOCUMENTS AND SETTINGS\RUSSELL\LOCAL SETTINGS\APPLICATION DATA\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
    .trackerboats.com [ C:\DOCUMENTS AND SETTINGS\RUSSELL\LOCAL SETTINGS\APPLICATION DATA\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
    .trackerboats.com [ C:\DOCUMENTS AND SETTINGS\RUSSELL\LOCAL SETTINGS\APPLICATION DATA\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
    .trackerboats.com [ C:\DOCUMENTS AND SETTINGS\RUSSELL\LOCAL SETTINGS\APPLICATION DATA\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
    .trackerboats.com [ C:\DOCUMENTS AND SETTINGS\RUSSELL\LOCAL SETTINGS\APPLICATION DATA\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
    .trackermarine.com [ C:\DOCUMENTS AND SETTINGS\RUSSELL\LOCAL SETTINGS\APPLICATION DATA\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]

Adware.CouponBar
    C:\WINDOWS\SYSTEM32\CPNPRT2.CID
 



#7 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:05:20 PM

Posted 21 August 2013 - 06:55 PM

The SAS scan showed Gala on the system. This is a persistent browser redirect malware and may need some manual fixing.

 

Are the problems still there?


Posted Image
m0le is a proud member of UNITE

#8 spyder9179

spyder9179
  • Topic Starter

  • Members
  • 38 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:12:20 PM

Posted 22 August 2013 - 08:18 AM

yes, all symptoms are still present.



#9 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:05:20 PM

Posted 22 August 2013 - 06:21 PM

Let's take a look at the registry

Open Notepad (go to Start > Run and type in Notepad and click OK).
Copy/paste the following text inside the code box into a new notepad document.

@ECHO OFF
regedit /e look1.txt "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\SearchScopes"
regedit /e look2.txt "HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\SearchScopes"
Type look*.txt >log.txt
start log.txt
del look1.txt look2.txt
del %0
  • Go to the File menu at the top of the Notepad and select Save as.
  • Select save in: desktop
  • Fill in File name: look.bat
  • Save as type: All file types (*.*)
  • Click save
  • Close the Notepad.
  • Locate look.bat on the desktop.
  • Double click the icon or Right-click to run it as administrator if you have Vista or Windows 7.
  • A notepad opens, copy and paste the content (log.txt) to your reply.

 


Posted Image
m0le is a proud member of UNITE

#10 spyder9179

spyder9179
  • Topic Starter

  • Members
  • 38 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:12:20 PM

Posted 23 August 2013 - 08:11 AM

Windows Registry Editor Version 5.00

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\SearchScopes]
"DefaultScope"=""

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}]
@="Live Search"
"DisplayName"="@ieframe.dll,-12512"
"URL"="http://search.live.com/results.aspx?q={searchTerms}&src={referrer:source?}"

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{6A1806CD-94D4-4689-BA73-E35EA1EA9990}]
"DisplayName"="Google"
"URL"="http://www.google.com/search?q={searchTerms}&rls=com.microsoft:{language}:{referrer:source?}&ie={inputEncoding}&oe={outputEncoding}&sourceid=ie7"
"FaviconURL"="http://www.google.com/favicon.ico"
"SuggestionsURL"="http://clients5.google.com/complete/search?hl={language}&q={searchTerms}&client=ie8&inputencoding={inputEncoding}&outputencoding={outputEncoding}"
"ShowSearchSuggestions"=dword:00000001
"SortIndex"=dword:00000000

Windows Registry Editor Version 5.00

[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\SearchScopes]
"DefaultScope"="{6A1806CD-94D4-4689-BA73-E35EA1EA9990}"
"DownloadRetries"=dword:00000000
"DownloadUpdates"=dword:00000001
"Version"=dword:00000002
"UpgradeTime"=hex:36,3c,04,98,ca,f5,ca,01

[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}]
@="Bing"
"DisplayName"="@ieframe.dll,-12512"
"URL"="http://www.bing.com/search?q={searchTerms}&FORM=IE8SRC"

[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\SearchScopes\{6A1806CD-94D4-4689-BA73-E35EA1EA9990}]
@="Bing"
"DisplayName"="@ieframe.dll,-12512"
"URL"="http://www.bing.com/search?q={searchTerms}&FORM=IE8SRC"
"FaviconPath"="C:\\Documents and Settings\\Russell\\Local Settings\\Application Data\\Microsoft\\Internet Explorer\\Services\\search_{6A1806CD-94D4-4689-BA73-E35EA1EA9990}.ico"
 

 



#11 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:05:20 PM

Posted 24 August 2013 - 07:02 PM

We Need to Run a Batch Script
 

  • Go to Start -> Run...
  • Enter notepad in the Run dialog box.
  • Press 10-14-2011%205-56-14%20PM.png.
  • Highlight the contents of the following codebox, and copy and paste that text into notepad.
     
    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\SearchScopes]
    "DefaultScope"="{6A1806CD-94D4-4689-BA73-E35EA1EA9990}"
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}]
    [-HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}]
    del /f /q "%~f0"
  • Select File -> Save.
  • Press the Desktop button on the left side of the save dialog.
  • In the 10-14-2011%206-00-58%20PM.png box, type in Fix.bat.
  • Press 10-14-2011%206-02-54%20PM.png.
  • Close Notepad.
  • Double click 10-14-2011%206-03-18%20PM.png on your desktop.

Now rerun the original Searchscopes batch search and post the new log


Posted Image
m0le is a proud member of UNITE

#12 spyder9179

spyder9179
  • Topic Starter

  • Members
  • 38 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:12:20 PM

Posted 26 August 2013 - 08:21 AM

Windows Registry Editor Version 5.00

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\SearchScopes]
"DefaultScope"=""

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}]
@="Live Search"
"DisplayName"="@ieframe.dll,-12512"
"URL"="http://search.live.com/results.aspx?q={searchTerms}&src={referrer:source?}"

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{6A1806CD-94D4-4689-BA73-E35EA1EA9990}]
"DisplayName"="Google"
"URL"="http://www.google.com/search?q={searchTerms}&rls=com.microsoft:{language}:{referrer:source?}&ie={inputEncoding}&oe={outputEncoding}&sourceid=ie7"
"FaviconURL"="http://www.google.com/favicon.ico"
"SuggestionsURL"="http://clients5.google.com/complete/search?hl={language}&q={searchTerms}&client=ie8&inputencoding={inputEncoding}&outputencoding={outputEncoding}"
"ShowSearchSuggestions"=dword:00000001
"SortIndex"=dword:00000000

Windows Registry Editor Version 5.00

[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\SearchScopes]
"DefaultScope"="{6A1806CD-94D4-4689-BA73-E35EA1EA9990}"
"DownloadRetries"=dword:00000000
"DownloadUpdates"=dword:00000001
"Version"=dword:00000002
"UpgradeTime"=hex:36,3c,04,98,ca,f5,ca,01

[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}]
@="Bing"
"DisplayName"="@ieframe.dll,-12512"
"URL"="http://www.bing.com/search?q={searchTerms}&FORM=IE8SRC"

[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\SearchScopes\{6A1806CD-94D4-4689-BA73-E35EA1EA9990}]
@="Bing"
"DisplayName"="@ieframe.dll,-12512"
"URL"="http://www.bing.com/search?q={searchTerms}&FORM=IE8SRC"
"FaviconPath"="C:\\Documents and Settings\\Russell\\Local Settings\\Application Data\\Microsoft\\Internet Explorer\\Services\\search_{6A1806CD-94D4-4689-BA73-E35EA1EA9990}.ico"
 

 



#13 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:05:20 PM

Posted 26 August 2013 - 06:32 PM

Sorry, let me just check. Is the above a log after the batch script was activated or a copy of the original log?


Posted Image
m0le is a proud member of UNITE

#14 spyder9179

spyder9179
  • Topic Starter

  • Members
  • 38 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:12:20 PM

Posted 26 August 2013 - 07:30 PM

I ran fix.bat and then ran look.bat again, which is what I thought you meant. This is the log from that.

#15 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:05:20 PM

Posted 27 August 2013 - 08:02 PM

Yes, that is the correct script so it might be my script that's wrong.

Try this script
  • Go to Start -> Run...
  • Enter notepad in the Run dialog box.
  • Press 10-14-2011%205-56-14%20PM.png.
  • Highlight the contents of the following codebox, and copy and paste that text into notepad.
    Windows Registry Editor Version 5.00
     
    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\SearchScopes]
    "DefaultScope"="{6A1806CD-94D4-4689-BA73-E35EA1EA9990}"
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}]
    [-HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}]
    
  • Select File -> Save.
  • Press the Desktop button on the left side of the save dialog.
  • In the 10-14-2011%206-00-58%20PM.png box, type in Fix.bat.
  • Press 10-14-2011%206-02-54%20PM.png.
  • Close Notepad.
  • Double click 10-14-2011%206-03-18%20PM.png on your desktop.
Now rerun the original Searchscopes batch search and post the new log
Posted Image
m0le is a proud member of UNITE




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users