Jump to content

Browser redirect and proxy trojan


Recommended Posts

Logfile of Trend Micro HijackThis v2.0.4

Scan saved at 11:21:20 PM, on 6/10/2010

Platform: Windows XP SP3 (WinNT 5.01.2600)

MSIE: Internet Explorer v6.00 SP3 (6.00.2900.5512)

Boot mode: Normal

Running processes:

C:\DOMINO\System32\smss.exe

C:\DOMINO\system32\winlogon.exe

C:\DOMINO\system32\services.exe

C:\DOMINO\system32\lsass.exe

C:\DOMINO\system32\svchost.exe

C:\Program Files\Common Files\iS3\Anti-Spyware\SZServer.exe

C:\DOMINO\system32\svchost.exe

C:\DOMINO\system32\spoolsv.exe

D:\Program Files\tune\TuneUpUtilitiesService32.exe

D:\Program Files\Malwarebytes' Anti-Malware\mbamservice.exe

D:\Program Files\tune\TuneUpUtilitiesApp32.exe

C:\DOMINO\system32\wscntfy.exe

C:\DOMINO\Explorer.EXE

C:\DOMINO\system32\msiexec.exe

D:\Program Files\STOPzilla\STOPzilla.exe

C:\DOMINO\System32\svchost.exe

D:\Program Files\highjack\Trend Micro\HiJackThis\HiJackThis.exe

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Local Page =

O2 - BHO: IDM Helper - {0055C089-8582-441B-A0BF-17B458C2A3A8} - E:\Programs files\Program Store\idm\Internet Download Manager\IDMIECC.dll

O2 - BHO: STOPzilla Browser Helper Object - {E3215F20-3212-11D6-9F8B-00D0B743919D} - D:\Program Files\STOPzilla\SZIEBHO.dll

O4 - HKLM\..\Run: [Malwarebytes' Anti-Malware] "D:\Program Files\Malwarebytes' Anti-Malware\mbamgui.exe" /starttray

O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\DOMINO\Network Diagnostic\xpnetdiag.exe

O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\DOMINO\Network Diagnostic\xpnetdiag.exe

O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe

O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe

O17 - HKLM\System\CCS\Services\Tcpip\..\{EB14D061-B68D-4785-BEC2-83B8E55E1482}: NameServer = 192.168.1.1

O22 - SharedTaskScheduler: Browseui preloader - {438755C2-A8BA-11D1-B96B-00A0C90312E1} - C:\DOMINO\system32\browseui.dll

O22 - SharedTaskScheduler: Component Categories cache daemon - {8C7461EF-2B13-11d2-BE35-3078302C2030} - C:\DOMINO\system32\browseui.dll

O23 - Service: MBAMService - Malwarebytes Corporation - D:\Program Files\Malwarebytes' Anti-Malware\mbamservice.exe

O23 - Service: STOPzilla Service (szserver) - iS3, Inc. - C:\Program Files\Common Files\iS3\Anti-Spyware\SZServer.exe

O23 - Service: TuneUp Drive Defrag Service (TuneUp.Defrag) - TuneUp Software - D:\Program Files\tune\TuneUpDefragService.exe

O23 - Service: TuneUp Utilities Service (TuneUp.UtilitiesSvc) - TuneUp Software - D:\Program Files\tune\TuneUpUtilitiesService32.exe

--

End of file - 2725 bytes

Link to post
Share on other sites

Hello KivaAndrois

Welcome to Malwarebytes.

=====================

  • Download OTL to your desktop.
  • Double click on OTL to run it.
  • When the window appears, underneath Output at the top change it to Minimal Output.
  • Under the Standard Registry box change it to All.
  • Under Custom scan's and fixes section paste in the below in bold


    netsvcs

    %SYSTEMDRIVE%\*.*

    %systemroot%\*. /mp /s

    CREATERESTOREPOINT

    %systemroot%\system32\*.dll /lockedfiles

    %systemroot%\Tasks\*.job /lockedfiles

    %systemroot%\System32\config\*.sav

    %systemroot%\system32\drivers\*.sys /90


  • Check the boxes beside LOP Check and Purity Check.
  • Click the Run Scan button. Do not change any settings unless otherwise told to do so. The scan wont take long.
    • When the scan completes, it will open two notepad windows. OTL.Txt and Extras.Txt. These are saved in the same location as OTL.
    • Please copy (Edit->Select All, Edit->Copy) the contents of these files, one at a time, and post it with your next reply.

====================

Download the following GMER Rootkit Scanner from Here

  • Download the randomly named EXE file to your Desktop. Remember what its name is since it is randomly named.
  • Double click on the new random named exe file you downloaded and run it. If prompted about the Security Warning and Unknown Publisher go ahead and click on Run
  • It may take a minute to load and become available.
  • If it gives you a warning about rootkit activity and asks if you want to run a full scan...click on NO, then use the following settings for a more complete scan..
  • In the right panel, you will see several boxes that have been checked. Ensure the following are UNCHECKED


  • IAT/EAT

  • Drives/Partition other than Systemdrive (typically only C:\ should be checked)

  • Show All (don't miss this one)


  • Then click the Scan button & wait for it to finish.
  • Once done click on the [save..] button, and in the File name area, type in "ark.txt" or it will save as a .log file which cannot be uploaded to your post.
  • Save it where you can easily find it, such as your desktop
  • **Caution** Rootkit scans often produce false positives. Do NOT take any action on any "<--- ROOKIT" entries
  • Click OK and quit the GMER program.
  • Note: On Firefox you need to go to Tools/Options/Main then under the Downloads section, click on Always ask me where to save files so that you can choose the name and where to save to, in this case your Desktop.
  • Post that log in your next reply.

Link to post
Share on other sites

logs are in text uploads because they can't even post quarter of my OTL logs

Gmer Logs (1.)gmer logs without IAT (2.)gmer logs with IAT

1.

GMER 1.0.15.15281 - http://www.gmer.net

Rootkit scan 2010-06-13 18:48:25

Windows 5.1.2600 Service Pack 3

Running: r6sq9dz7.exe; Driver: C:\DOCUME~1\KIVAAN~1.FIR\LOCALS~1\Temp\pfpcrpoc.sys

---- System - GMER 1.0.15 ----

SSDT F995C946 ZwCreateKey

SSDT F995C93C ZwCreateThread

SSDT F995C94B ZwDeleteKey

SSDT F995C955 ZwDeleteValueKey

SSDT F995C95A ZwLoadKey

SSDT F995C928 ZwOpenProcess

SSDT F995C92D ZwOpenThread

SSDT F995C964 ZwReplaceKey

SSDT F995C95F ZwRestoreKey

SSDT F995C950 ZwSetValueKey

SSDT szkgfs.sys (STOPzilla Kernel Guard File System, x86-32 /iS3, Inc.) ZwTerminateProcess [0xF9225710]

---- Devices - GMER 1.0.15 ----

AttachedDevice \FileSystem\Ntfs \Ntfs szkgfs.sys (STOPzilla Kernel Guard File System, x86-32 /iS3, Inc.)

---- Registry - GMER 1.0.15 ----

Reg HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows@DeviceNotSelectedTimeout 15

Reg HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows@GDIProcessHandleQuota 10000

Reg HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows@Spooler yes

Reg HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows@swapdisk

Reg HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows@TransmissionRetryTimeout 90

Reg HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows@USERProcessHandleQuota 10000

---- EOF - GMER 1.0.15 ----

2.

GMER 1.0.15.15281 - http://www.gmer.net

Rootkit scan 2010-06-13 19:19:00

Windows 5.1.2600 Service Pack 3

Running: r6sq9dz7.exe; Driver: C:\DOCUME~1\KIVAAN~1.FIR\LOCALS~1\Temp\pfpcrpoc.sys

---- System - GMER 1.0.15 ----

SSDT F995C946 ZwCreateKey

SSDT F995C93C ZwCreateThread

SSDT F995C94B ZwDeleteKey

SSDT F995C955 ZwDeleteValueKey

SSDT F995C95A ZwLoadKey

SSDT F995C928 ZwOpenProcess

SSDT F995C92D ZwOpenThread

SSDT F995C964 ZwReplaceKey

SSDT F995C95F ZwRestoreKey

SSDT F995C950 ZwSetValueKey

SSDT szkgfs.sys (STOPzilla Kernel Guard File System, x86-32 /iS3, Inc.) ZwTerminateProcess [0xF9225710]

---- User IAT/EAT - GMER 1.0.15 ----

IAT C:\DOMINO\Explorer.EXE[428] @ C:\DOMINO\Explorer.EXE [KERNEL32.dll!GetProcAddress] [5CB77774] C:\DOMINO\system32\ShimEng.dll (Shim Engine DLL/Microsoft Corporation)

IAT C:\DOMINO\Explorer.EXE[428] @ C:\DOMINO\system32\ADVAPI32.dll [KERNEL32.dll!GetProcAddress] [5CB77774] C:\DOMINO\system32\ShimEng.dll (Shim Engine DLL/Microsoft Corporation)

IAT C:\DOMINO\Explorer.EXE[428] @ C:\DOMINO\system32\RPCRT4.dll [KERNEL32.dll!GetProcAddress] [5CB77774] C:\DOMINO\system32\ShimEng.dll (Shim Engine DLL/Microsoft Corporation)

IAT C:\DOMINO\Explorer.EXE[428] @ C:\DOMINO\system32\Secur32.dll [KERNEL32.dll!GetProcAddress] [5CB77774] C:\DOMINO\system32\ShimEng.dll (Shim Engine DLL/Microsoft Corporation)

IAT C:\DOMINO\Explorer.EXE[428] @ C:\DOMINO\system32\GDI32.dll [KERNEL32.dll!GetProcAddress] [5CB77774] C:\DOMINO\system32\ShimEng.dll (Shim Engine DLL/Microsoft Corporation)

IAT C:\DOMINO\Explorer.EXE[428] @ C:\DOMINO\system32\USER32.dll [KERNEL32.dll!GetProcAddress] [5CB77774] C:\DOMINO\system32\ShimEng.dll (Shim Engine DLL/Microsoft Corporation)

IAT C:\DOMINO\Explorer.EXE[428] @ C:\DOMINO\system32\msvcrt.dll [KERNEL32.dll!GetProcAddress] [5CB77774] C:\DOMINO\system32\ShimEng.dll (Shim Engine DLL/Microsoft Corporation)

IAT C:\DOMINO\Explorer.EXE[428] @ C:\DOMINO\system32\ole32.dll [KERNEL32.dll!GetProcAddress] [5CB77774] C:\DOMINO\system32\ShimEng.dll (Shim Engine DLL/Microsoft Corporation)

IAT C:\DOMINO\Explorer.EXE[428] @ C:\DOMINO\system32\SHLWAPI.dll [KERNEL32.dll!GetProcAddress] [5CB77774] C:\DOMINO\system32\ShimEng.dll (Shim Engine DLL/Microsoft Corporation)

IAT C:\DOMINO\Explorer.EXE[428] @ C:\DOMINO\system32\CRYPT32.dll [KERNEL32.dll!GetProcAddress] [5CB77774] C:\DOMINO\system32\ShimEng.dll (Shim Engine DLL/Microsoft Corporation)

IAT C:\DOMINO\Explorer.EXE[428] @ C:\DOMINO\system32\NETAPI32.dll [KERNEL32.dll!GetProcAddress] [5CB77774] C:\DOMINO\system32\ShimEng.dll (Shim Engine DLL/Microsoft Corporation)

IAT C:\DOMINO\Explorer.EXE[428] @ C:\DOMINO\system32\WININET.dll [KERNEL32.dll!GetProcAddress] [5CB77774] C:\DOMINO\system32\ShimEng.dll (Shim Engine DLL/Microsoft Corporation)

IAT C:\DOMINO\Explorer.EXE[428] @ C:\DOMINO\system32\SHELL32.dll [KERNEL32.dll!GetProcAddress] [5CB77774] C:\DOMINO\system32\ShimEng.dll (Shim Engine DLL/Microsoft Corporation)

IAT C:\DOMINO\Explorer.EXE[428] @ C:\DOMINO\system32\USERENV.dll [KERNEL32.dll!GetProcAddress] [5CB77774] C:\DOMINO\system32\ShimEng.dll (Shim Engine DLL/Microsoft Corporation)

IAT C:\DOMINO\Explorer.EXE[428] @ C:\DOMINO\system32\iphlpapi.dll [KERNEL32.dll!GetProcAddress] [5CB77774] C:\DOMINO\system32\ShimEng.dll (Shim Engine DLL/Microsoft Corporation)

IAT C:\DOMINO\Explorer.EXE[428] @ C:\DOMINO\system32\WS2_32.dll [KERNEL32.dll!GetProcAddress] [5CB77774] C:\DOMINO\system32\ShimEng.dll (Shim Engine DLL/Microsoft Corporation)

IAT C:\DOMINO\Explorer.EXE[428] @ C:\DOMINO\system32\WS2HELP.dll [KERNEL32.dll!GetProcAddress] [5CB77774] C:\DOMINO\system32\ShimEng.dll (Shim Engine DLL/Microsoft Corporation)

---- Devices - GMER 1.0.15 ----

AttachedDevice \FileSystem\Ntfs \Ntfs szkgfs.sys (STOPzilla Kernel Guard File System, x86-32 /iS3, Inc.)

---- Registry - GMER 1.0.15 ----

Reg HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows@DeviceNotSelectedTimeout 15

Reg HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows@GDIProcessHandleQuota 10000

Reg HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows@Spooler yes

Reg HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows@swapdisk

Reg HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows@TransmissionRetryTimeout 90

Reg HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows@USERProcessHandleQuota 10000

---- EOF - GMER 1.0.15 ----

OTL.Txt

Extras.Txt

Link to post
Share on other sites

Download ComboFix from one of these locations:

Link 1

Link 2

* IMPORTANT !!! Save ComboFix.exe to your Desktop

  • Disable your AntiVirus and AntiSpyware applications, usually via a right click on the System Tray icon. They may otherwise interfere with our tools
  • Double click on ComboFix.exe & follow the prompts.
  • As part of it's process, ComboFix will check to see if the Microsoft Windows Recovery Console is installed. With malware infections being as they are today, it's strongly recommended to have this pre-installed on your machine before doing any malware removal. It will allow you to boot up into a special recovery/repair mode that will allow us to more easily help you should your computer have a problem after an attempted removal of malware.
  • Follow the prompts to allow ComboFix to download and install the Microsoft Windows Recovery Console, and when prompted, agree to the End-User License Agreement to install the Microsoft Windows Recovery Console.

**Please note: If the Microsoft Windows Recovery Console is already installed, ComboFix will continue it's malware removal procedures.

Once the Microsoft Windows Recovery Console is installed using ComboFix, you should see the following message:

Click on Yes, to continue scanning for malware.

When finished, it shall produce a log for you. Please include the C:\ComboFix.txt in your next reply.

Link to post
Share on other sites

ComboFix 10-06-09.04 - KivaAndrois 06/14/2010 19:14:05.1.1 - x86

Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.254.117 [GMT 5:00]

Running from: d:\files from somewhere\Rootkit removal\ComboFix.exe

SP: Spy Emergency *disabled* (Updated) {82117492-906E-4b02-A33A-84D42A2DD907}

.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))

.

c:\domino\Owahua.exe

.

((((((((((((((((((((((((( Files Created from 2010-05-14 to 2010-06-14 )))))))))))))))))))))))))))))))

.

2010-06-14 13:39 . 2010-06-14 13:39 -------- d-----w- c:\documents and settings\KivaAndrois.FIRE-4648B45927\Application Data\Uniblue

2010-06-14 08:02 . 2010-06-14 08:02 -------- d-----w- c:\program files\ElcomSoft

2010-06-14 00:10 . 2010-06-14 00:10 -------- d-----w- c:\documents and settings\KivaAndrois.FIRE-4648B45927\Application Data\Se Analyzer Tool SA

2010-06-13 22:42 . 2010-06-13 22:42 -------- d-----w- c:\documents and settings\KivaAndrois.FIRE-4648B45927\Local Settings\Application Data\Identities

2010-06-13 16:30 . 2010-05-26 03:03 218544 ----a-w- c:\documents and settings\KivaAndrois.FIRE-4648B45927\Application Data\Flock\Browser\Profiles\bxbfi9qt.default\extensions\mozilla_cc@internetdownloadmanager.com\components\idmmzcc.dll

2010-06-13 14:56 . 2010-06-13 14:56 -------- d-----w- c:\documents and settings\KivaAndrois.FIRE-4648B45927\DoctorWeb

2010-06-13 10:17 . 2010-06-13 10:54 -------- d-----w- c:\domino\system32\NtmsData

2010-06-12 15:25 . 2010-06-12 15:26 -------- d-----w- c:\documents and settings\All Users\Application Data\Comodo Downloader

2010-06-12 12:33 . 2010-06-12 12:33 -------- d-----w- c:\documents and settings\KivaAndrois.FIRE-4648B45927\Application Data\Media Player Classic

2010-06-12 11:59 . 2010-06-12 12:02 -------- d-----w- c:\domino\SxsCaPendDel

2010-06-12 01:37 . 2010-06-12 01:37 -------- d-----w- c:\documents and settings\KivaAndrois.FIRE-4648B45927\Local Settings\Application Data\Max Secure Software

2010-06-11 21:34 . 2010-06-11 21:34 185344 ----a-w- c:\domino\system32\drivers\KeDetective130.sys

2010-06-11 17:59 . 2010-06-13 12:35 -------- d-----w- c:\program files\ESET

2010-06-11 08:47 . 2010-06-11 08:47 12224 ----a-w- c:\documents and settings\Bot\Local Settings\Application Data\GDIPFONTCACHEV1.DAT

2010-06-10 19:10 . 2010-06-10 19:10 214448 ----a-w- c:\documents and settings\Bot\Application Data\IDM\idmmzcc3\components\idmmzcc.dll

2010-06-10 19:09 . 2009-09-09 08:43 210352 ----a-w- c:\domino\system32\idmmbc.dll

2010-06-10 19:05 . 2010-06-10 19:13 -------- d-----w- c:\documents and settings\Bot\Application Data\IDM

2010-06-10 19:05 . 2010-06-12 16:27 -------- d-----w- c:\documents and settings\Bot\Application Data\DMCache

2010-06-10 18:20 . 2010-06-10 18:20 388096 ----a-r- c:\documents and settings\Bot\Application Data\Microsoft\Installer\{45A66726-69BC-466B-A7A4-12FCBA4883D7}\HiJackThis.exe

2010-06-10 17:12 . 2010-04-29 10:39 38224 ----a-w- c:\domino\system32\drivers\mbamswissarmy.sys

2010-06-10 17:12 . 2010-06-10 17:12 -------- d-----w- c:\documents and settings\All Users\Application Data\Malwarebytes

2010-06-10 17:12 . 2010-04-29 10:39 20952 ----a-w- c:\domino\system32\drivers\mbam.sys

2010-06-10 11:24 . 2010-06-10 11:24 61440 ---ha-w- C:\SZKGFS.dat

2010-06-10 11:20 . 2010-06-10 11:34 -------- d-----w- c:\documents and settings\All Users\Application Data\SITEguard

2010-06-10 11:18 . 2010-06-10 11:18 -------- d-----w- c:\program files\Common Files\iS3

2010-06-10 11:18 . 2010-06-13 00:11 -------- d-----w- c:\documents and settings\All Users\Application Data\STOPzilla!

2010-06-10 07:36 . 2008-04-13 19:15 26368 -c--a-w- c:\domino\system32\dllcache\usbstor.sys

2010-06-10 06:00 . 2010-06-10 06:00 -------- d-----w- c:\documents and settings\Bot\Application Data\TuneUp Software

2010-06-10 05:07 . 2010-06-10 05:07 -------- d-----w- c:\documents and settings\Bot\Local Settings\Application Data\Identities

2010-06-10 05:04 . 2010-06-10 05:04 -------- d-----w- c:\documents and settings\Bot\Local Settings\Application Data\Opera

.

(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))

.

2010-06-14 14:01 . 2010-06-09 20:33 -------- d-----w- c:\documents and settings\KivaAndrois.FIRE-4648B45927\Application Data\DMCache

2010-06-13 23:10 . 2010-06-09 20:33 -------- d-----w- c:\documents and settings\KivaAndrois.FIRE-4648B45927\Application Data\IDM

2010-06-12 22:24 . 2010-06-09 20:32 -------- d-----w- c:\documents and settings\KivaAndrois.FIRE-4648B45927\Application Data\uTorrent

2010-06-10 22:29 . 2010-06-09 20:34 28672 ----a-w- c:\documents and settings\KivaAndrois.FIRE-4648B45927\Application Data\IDM\NP_IDM5.dll

2010-06-10 22:29 . 2010-06-09 20:34 28672 ----a-w- c:\documents and settings\KivaAndrois.FIRE-4648B45927\Application Data\IDM\NP_IDM4.dll

2010-06-10 22:29 . 2010-06-09 20:34 28672 ----a-w- c:\documents and settings\KivaAndrois.FIRE-4648B45927\Application Data\IDM\NP_IDM3.dll

2010-06-10 22:29 . 2010-06-09 20:34 28672 ----a-w- c:\documents and settings\KivaAndrois.FIRE-4648B45927\Application Data\IDM\NP_IDM2.dll

2010-06-10 22:29 . 2010-06-09 20:34 28672 ----a-w- c:\documents and settings\KivaAndrois.FIRE-4648B45927\Application Data\IDM\NP_IDM1.dll

2010-06-10 18:34 . 2010-06-09 18:20 86321 ----a-w- c:\domino\pchealth\helpctr\OfflineCache\index.dat

2010-06-09 20:52 . 2010-06-09 20:52 -------- d-----w- c:\documents and settings\KivaAndrois.FIRE-4648B45927\Application Data\Malwarebytes

2010-06-09 20:35 . 2010-06-09 20:35 0 ----a-w- c:\domino\nsreg.dat

2010-06-09 20:34 . 2010-06-09 20:34 -------- d-----w- c:\documents and settings\KivaAndrois.FIRE-4648B45927\Application Data\Flock

2010-06-09 20:34 . 2010-06-09 20:34 214448 ----a-w- c:\documents and settings\KivaAndrois.FIRE-4648B45927\Application Data\IDM\idmmzcc3\components\idmmzcc.dll

2010-06-09 20:28 . 2010-06-09 20:28 -------- d-----w- c:\program files\uTorrent Ultra Accelerator

2010-06-09 19:53 . 2010-06-09 19:53 144 ----a-w- c:\domino\system32\lkfl.dat

2010-06-09 19:52 . 2010-06-09 19:52 4212 ---ha-w- c:\domino\system32\zllictbl.dat

2010-06-09 19:46 . 2010-06-09 19:46 -------- d-----w- c:\documents and settings\Bot\Application Data\Malwarebytes

2010-06-09 19:38 . 2010-06-09 19:38 -------- d-----w- c:\documents and settings\Bot\Application Data\Uniblue

2010-06-09 18:58 . 2010-06-09 18:58 -------- d-----w- c:\documents and settings\KivaAndrois.FIRE-4648B45927\Application Data\TuneUp Software

2010-06-09 18:58 . 2010-06-09 18:57 -------- d-----w- c:\documents and settings\All Users\Application Data\TuneUp Software

2010-06-09 18:35 . 2010-06-09 18:35 12224 ----a-w- c:\documents and settings\KivaAndrois.FIRE-4648B45927\Local Settings\Application Data\GDIPFONTCACHEV1.DAT

2010-06-09 18:17 . 2010-06-09 18:17 21640 ----a-w- c:\domino\system32\emptyregdb.dat

2010-06-05 20:41 . 2010-06-05 20:41 -------- d-----w- c:\program files\microsoft frontpage

2010-05-07 13:06 . 2010-06-09 18:59 30536 ----a-w- c:\domino\system32\TURegOpt.exe

2010-05-07 13:01 . 2010-06-09 18:59 30024 ----a-w- c:\domino\system32\uxtuneup.dll

2010-04-26 03:25 . 2010-06-09 20:35 214448 ----a-w- c:\documents and settings\KivaAndrois.FIRE-4648B45927\Application Data\Flock\Browser\Profiles\bxbfi9qt.default\extensions\mozilla_cc@internetdownloadmanager.com-trash\components\idmmzcc.dll

.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))

.

.

*Note* empty entries & legit default entries are not shown

REGEDIT4

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce]

"RegistryBooster"="d:\program files\RegistryBooster\launcher.exe" [2010-05-26 46456]

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\rootrepeal.sys]

@=""

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]

"EnableFirewall"= 0 (0x0)

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]

"c:\\DOMINO\\Network Diagnostic\\xpnetdiag.exe"=

"c:\\DOMINO\\system32\\sessmgr.exe"=

"d:\\MY STUFF\\INTERNET BROWSERS\\Opera\\opera.exe"=

"e:\\Programs files\\Program Store\\u\\uTorrent.exe"=

R0 szkg5;szkg5;c:\domino\system32\drivers\SZKG.sys [12/7/2009 5:59 PM 61328]

R0 szkgfs;szkgfs;c:\domino\system32\drivers\SZKGFS.sys [2/24/2010 3:06 PM 173328]

R2 TuneUp.UtilitiesSvc;TuneUp Utilities Service;d:\program files\tune\TuneUpUtilitiesService32.exe [5/7/2010 6:04 PM 1051976]

R3 TuneUpUtilitiesDrv;TuneUpUtilitiesDrv;d:\program files\tune\TuneUpUtilitiesDriver32.sys [2/25/2010 11:18 AM 10064]

S0 is3srv;is3srv;c:\domino\system32\drivers\is3srv.sys [12/7/2009 5:59 PM 61328]

S3 icsak;icsak; [x]

S3 MBAMProtector;MBAMProtector;c:\domino\system32\drivers\mbam.sys [6/10/2010 10:12 PM 20952]

S3 NDISKIO;NDISKIO;\??\c:\docume~1\Bot\LOCALS~1\Temp\91ca8452.nmc\nse\bin\ndiskio.sys --> c:\docume~1\Bot\LOCALS~1\Temp\91ca8452.nmc\nse\bin\ndiskio.sys [?]

S4 MBAMService;MBAMService;d:\program files\Malwarebytes' Anti-Malware\mbamservice.exe [6/10/2010 10:12 PM 304464]

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Svchost - NetSvcs

UxTuneUp

.

.

------- Supplementary Scan -------

.

uInternet Connection Wizard,ShellNext = hxxp://www.free-av.com/

IE: Download all links with IDM - e:\programs files\Program Store\idm\Internet Download Manager\IEGetAll.htm

IE: Download FLV video content with IDM - e:\programs files\Program Store\idm\Internet Download Manager\IEGetVL.htm

IE: Download with IDM - e:\programs files\Program Store\idm\Internet Download Manager\IEExt.htm

LSP: c:\domino\system32\idmmbc.dll

TCP: {EB14D061-B68D-4785-BEC2-83B8E55E1482} = 192.168.1.1

.

**************************************************************************

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net

Rootkit scan 2010-06-14 19:19

Windows 5.1.2600 Service Pack 3 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully

hidden files: 0

**************************************************************************

.

--------------------- DLLs Loaded Under Running Processes ---------------------

- - - - - - - > 'lsass.exe'(820)

c:\domino\system32\idmmbc.dll

.

Completion time: 2010-06-14 19:22:38

ComboFix-quarantined-files.txt 2010-06-14 14:22

Pre-Run: 2,498,248,704 bytes free

Post-Run: 2,477,559,808 bytes free

WindowsXP-KB310994-SP2-Pro-BootDisk-ENU.exe

[boot loader]

timeout=2

default=multi(0)disk(0)rdisk(0)partition(1)\DOMINO

[operating systems]

c:\cmdcons\BOOTSECT.DAT="Microsoft Windows Recovery Console" /cmdcons

multi(0)disk(0)rdisk(0)partition(1)\DOMINO="Microsoft Windows XP Professional" /noexecute=optin /fastdetect

- - End Of File - - ADAC2927ACD130C13C9FEA47AE21CF87

Link to post
Share on other sites

Download TDSSKiller and save it to your Desktop.

  • Right click on the file and choose extract all extract the file to your desktop then run it.
  • If prompted to restart the computer type in Y then it will restart.
  • Or if you are prompted with a hidden service warning do go ahead and delete it.
  • Once completed it will create a log in your C:\ drive
  • Please post the contents of that log

========

Update Run Malwarebytes

Please update\run Malwarebytes' Anti-Malware.

Double Click the Malwarebytes Anti-Malware icon to run the application.

  • Click on the update tab then click on Check for updates.
  • If an update is found, it will download and install the latest version.
  • Once the update has loaded, go to the Scanner tab and select "Perform Quick Scan", then click Scan.
  • The scan may take some time to finish,so please be patient.
  • When the scan is complete, click OK, then Show Results to view the results.
  • Make sure that everything is checked, and click Remove Selected.
  • When disinfection is completed, a log will open in Notepad and you may be prompted to Restart.(See Extra Note)
  • The log is automatically saved by MBAM and can be viewed by clicking the Logs tab in MBAM.
  • Copy&Paste the entire report in your next reply.

Extra Note:

If MBAM encounters a file that is difficult to remove,you will be presented with 1 of 2 prompts,click OK to either and let MBAM proceed with the disinfection process,if asked to restart the computer,please do so immediatley.

=====

Please do a scan with Kaspersky Online Scanner

Note: If you are using Windows Vista, open your browser by right-clicking on its icon and select 'Run as administrator' to perform this scan.

Click on the Accept button and install any components it needs.

  • The program will install and then begin downloading the latest definition files.
  • After the files have been downloaded on the left side of the page in the Scan section select My Computer
  • This will start the program and scan your system.
  • The scan will take a while, so be patient and let it run.
  • Once the scan is complete, click on View scan report
  • Now, click on the Save Report as button.
  • Save the file to your desktop.
  • Copy and paste that information in your next post.

Link to post
Share on other sites

  • 3 weeks later...
  • Staff

Due to the lack of feedback this topic is closed to prevent others from posting here. If you need this topic reopened, please send a Private Message to any one of the moderating team members. Please include a link to this thread with your request. This applies only to the originator of this thread.

Other members who need assistance please start your own topic in a new thread. Thanks!

Link to post
Share on other sites

Guest
This topic is now closed to further replies.
  • Recently Browsing   0 members

    • No registered users viewing this page.
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.