Jump to content

google misdirect


str898

Recommended Posts

:)

Please don't attach the scan results, use Copy/Paste

DO NOT use any TOOLS such as Combofix or HijackThis fixes without supervision.

Doing so could make your pc inoperatible and could require a full reinstall of your OS, losing all your programs and data.

Vista and Windows 7 users:

1. These tools MUST be run from the executable. (.exe) every time you run them

2. With Admin Rights (Right click, choose "Run as Administrator")

Stay with this topic until I give you the all clean post.

You might want to print these instructions out.

Please download GooredFix from one of the locations below and save it to your Desktop

Download Mirror #1

Download Mirror #2

  • Ensure all Firefox windows are closed.
  • To run the tool, double-click it (XP), or right-click and select Run As Administrator (Vista).
  • When prompted to run the scan, click Yes.
  • It doesn't take long to run, once it is finished move onto the next step

Next:

Please read carefully and follow these steps.

  • Please download
TDSSKiller.zip
  • Extract it to your desktop
  • Double click TDSSKiller.exe
  • Press Start Scan
  • Only if Malicious objects are found then ensure Cure is selected
  • Then click Continue > Reboot now

[*]Copy and paste the log in your next reply

[*]A copy of the log will be saved automatically to the root directory, root directory, (usually C:\ folder) in the form of "TDSSKiller.[Version]_[Date]_[Time]_log.txt". Please copy and paste the contents of that file here.

please post the contents of that log TDSSKiller log.

Link to post
Share on other sites

Thanks for help!

Ran gooredfix.

Ran TDSSkiller. Did not detect anything. log...

2010/10/24 17:21:34.0828 TDSS rootkit removing tool 2.4.4.0 Oct 4 2010 09:06:59

2010/10/24 17:21:34.0828 ================================================================================

2010/10/24 17:21:34.0828 SystemInfo:

2010/10/24 17:21:34.0828

2010/10/24 17:21:34.0828 OS Version: 5.1.2600 ServicePack: 2.0

2010/10/24 17:21:34.0843 Product type: Workstation

2010/10/24 17:21:34.0843 ComputerName: JEN

2010/10/24 17:21:34.0843 UserName: jenny

2010/10/24 17:21:34.0843 Windows directory: C:\WINDOWS

2010/10/24 17:21:34.0843 System windows directory: C:\WINDOWS

2010/10/24 17:21:34.0843 Processor architecture: Intel x86

2010/10/24 17:21:34.0843 Number of processors: 1

2010/10/24 17:21:34.0843 Page size: 0x1000

2010/10/24 17:21:34.0843 Boot type: Normal boot

2010/10/24 17:21:34.0843 ================================================================================

2010/10/24 17:21:35.0953 Initialize success

2010/10/24 17:21:40.0109 ================================================================================

2010/10/24 17:21:40.0109 Scan started

2010/10/24 17:21:40.0109 Mode: Manual;

2010/10/24 17:21:40.0109 ================================================================================

2010/10/24 17:21:45.0437 ================================================================================

2010/10/24 17:21:45.0437 Scan finished

2010/10/24 17:21:45.0437 ================================================================================

Link to post
Share on other sites

http://www.eset.eu/online-scanner

Go here to run an online scannner from ESET.

Click the green ESET Online Scanner button.

Read the End User License Agreement and check the box: YES, I accept the Terms of Use.

Click on the Start button next to it.

You may receive an alert on the address bar that "This site might require the following ActiveX control...Click here to install...". Click on that alert and then click Insall ActiveX component.

A new window will appear asking "Do you want to install this software?"".

Answer Yes to download and install the ActiveX controls that allows the scan to run.

Click Start.

Check Remove found threats and Scan potentially unwanted applications.

Click Scan to begin.

If offered the option to get information or buy software. Just close the window.

Wait for the scan to finish

Use notepad to open the logfile located at C:\Program Files\EsetOnlineScanner\log.txt

Copy and paste that log as a reply to this topic.

Link to post
Share on other sites

Found 2 items in scan. See log...

ESETSmartInstaller@High as CAB hook log:

OnlineScanner.ocx - registred OK

# version=7

# IEXPLORE.EXE=7.00.6000.17055 (vista_gdr.100414-0533)

# OnlineScanner.ocx=1.0.0.6211

# api_version=3.0.2

# EOSSerial=70275f46b2af2b438bd72339eb35b2d8

# end=finished

# remove_checked=true

# archives_checked=false

# unwanted_checked=true

# unsafe_checked=false

# antistealth_checked=true

# utc_time=2010-10-25 12:09:51

# local_time=2010-10-24 08:09:51 (-0500, Eastern Daylight Time)

# country="United States"

# lang=9

# osver=5.1.2600 NT Service Pack 2

# compatibility_mode=512 16777215 100 0 1006105 1006105 0 0

# compatibility_mode=1024 16777215 100 0 1129367 1129367 0 0

# compatibility_mode=8192 67108863 100 0 0 0 0 0

# scanned=210763

# found=2

# cleaned=2

# scan_time=4770

C:\Documents and Settings\All Users\Application Data\AOL Downloads\triton_suite_install\6.1.41.2\setup.exe probably a variant of Win32/Agent.HZHBURL trojan (cleaned by deleting - quarantined) 00000000000000000000000000000000 C

C:\Documents and Settings\jenny\Application Data\Mozilla\Extensions\{ec8030f7-c20a-464f-9b0e-13a3a9e97384}\textlinks@playsushi.com\components\PlaySushiFF.dll probably a variant of Win32/Adware.Gamevance.AG application (cleaned by deleting - quarantined) 00000000000000000000000000000000 C

Link to post
Share on other sites

OK. CF still did not run, even in safemode. I tried something (hopefully didn't cause problem). I remaned Combofix.exe, and ran. It ran. It said "detected the presence of rootkit activity and restarted PC to run again. It deleted a few files & folders. here is log.

ComboFix 10-10-23.02 - jenny 10/24/2010 21:19:40.2.1 - x86

Microsoft Windows XP Professional 5.1.2600.2.1252.1.1033.18.1535.1122 [GMT -4:00]

Running from: c:\documents and settings\jenny\Desktop\winexp.exe

FW: McAfee Firewall *enabled* {94894B63-8C7F-4050-BDA4-813CA00DA3E8}

WARNING -THIS MACHINE DOES NOT HAVE THE RECOVERY CONSOLE INSTALLED !!

.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))

.

c:\documents and settings\jenny\Application Data\inst.exe

c:\program files\Fast Browser Search

c:\program files\Shared

c:\windows\Downloaded Program Files\popcaploader.inf

Infected copy of c:\windows\system32\drivers\dmio.sys was found and disinfected

Restored copy from - Kitty had a snack :)

.

((((((((((((((((((((((((((((((((((((((( Drivers/Services )))))))))))))))))))))))))))))))))))))))))))))))))

.

-------\Legacy_USNJSVC

-------\Service_usnjsvc

((((((((((((((((((((((((( Files Created from 2010-09-25 to 2010-10-25 )))))))))))))))))))))))))))))))

.

2010-10-24 22:41 . 2010-10-24 22:41 -------- d-----w- c:\program files\ESET

2010-10-10 21:13 . 2010-10-10 21:13 -------- d-----w- c:\documents and settings\jenny\Application Data\AVG10

2010-10-10 21:10 . 2010-10-10 21:10 -------- d--h--w- c:\documents and settings\All Users\Application Data\Common Files

2010-10-10 21:08 . 2010-10-24 21:48 -------- d-----w- c:\documents and settings\All Users\Application Data\AVG10

2010-10-10 20:02 . 2010-10-10 20:02 -------- d-----w- c:\documents and settings\jenny\Application Data\Malwarebytes

2010-10-10 19:56 . 2010-10-10 21:07 -------- d-----w- c:\documents and settings\All Users\Application Data\MFAData

2010-10-10 01:33 . 2010-10-10 01:33 -------- d-----w- c:\documents and settings\Administrator

2010-10-09 19:39 . 2010-04-29 19:39 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys

2010-10-09 19:38 . 2010-04-29 19:39 20952 ----a-w- c:\windows\system32\drivers\mbam.sys

2010-10-02 15:21 . 2010-10-02 15:21 388096 ----a-r- c:\documents and settings\jenny\Application Data\Microsoft\Installer\{45A66726-69BC-466B-A7A4-12FCBA4883D7}\HiJackThis.exe

2010-10-02 15:21 . 2010-10-02 15:21 -------- d-----w- c:\program files\Trend Micro

2010-10-02 12:41 . 2010-08-12 12:15 15880 ----a-w- c:\windows\system32\lsdelete.exe

2010-10-02 02:52 . 2010-08-12 12:15 64288 ----a-w- c:\windows\system32\drivers\Lbd.sys

2010-10-02 02:52 . 2010-10-02 02:52 95024 ----a-w- c:\windows\system32\drivers\SBREDrv.sys

2010-10-02 02:19 . 2010-10-02 02:19 -------- d-----w- c:\documents and settings\jenny\Local Settings\Application Data\Sunbelt Software

2010-10-02 02:17 . 2010-10-02 02:17 -------- dc-h--w- c:\documents and settings\All Users\Application Data\{ECC164E0-3133-4C70-A831-F08DB2940F70}

2010-09-30 18:22 . 2010-09-30 18:22 -------- d-----w- c:\windows\system32\wbem\Repository

2010-09-30 17:51 . 2010-09-30 17:51 -------- d-----w- c:\documents and settings\All Users\Application Data\Malwarebytes

2010-09-30 17:51 . 2010-10-10 20:02 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware

.

(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))

.

2010-10-02 20:24 . 2007-07-30 19:54 60416 ----a-w- c:\windows\ALCFDRTM.VER

2010-09-13 20:27 . 2010-09-13 20:27 25680 ----a-w- c:\windows\system32\drivers\AVGIDSEH.sys

2010-08-01 15:43 . 2007-07-30 00:35 107888 ----a-w- c:\windows\system32\CmdLineExt.dll

.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))

.

.

*Note* empty entries & legit default entries are not shown

REGEDIT4

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]

"DAEMON Tools"="c:\program files\DAEMON Tools\daemon.exe" [2007-04-03 165784]

"Google Update"="c:\documents and settings\jenny\Local Settings\Application Data\Google\Update\GoogleUpdate.exe" [2008-11-16 133104]

"swg"="c:\program files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe" [2009-06-04 39408]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]

"NvCplDaemon"="c:\windows\system32\NvCpl.dll" [2006-10-22 7700480]

"nwiz"="nwiz.exe" [2006-10-22 1622016]

"NvMediaCenter"="c:\windows\system32\NvMcTray.dll" [2006-10-22 86016]

"SoundMan"="SOUNDMAN.EXE" [2007-06-24 77824]

"Acrobat Assistant 7.0"="c:\program files\Adobe\Adobe Acrobat 7.0\Distillr\Acrotray.exe" [2004-12-14 483328]

"SunJavaUpdateSched"="c:\program files\Java\jre6\bin\jusched.exe" [2009-12-15 149280]

"NVRaidService"="c:\windows\system32\nvraidservice.exe" [2005-01-17 84480]

"HPDJ Taskbar Utility"="c:\windows\system32\spool\drivers\w32x86\3\hpztsb04.exe" [2006-01-13 196608]

"NeroFilterCheck"="c:\windows\system32\NeroCheck.exe" [2001-07-09 155648]

"RealTray"="c:\program files\Real\RealPlayer\RealPlay.exe" [2008-09-29 26112]

"ArcSoft Connection Service"="c:\program files\Common Files\ArcSoft\Connection Service\Bin\ACDaemon.exe" [2010-03-18 207360]

"Zune Launcher"="c:\program files\Zune\ZuneLauncher.exe" [2009-09-04 158448]

"EEventManager"="c:\progra~1\EPSONS~1\EVENTM~1\EEventManager.exe" [2009-01-12 669520]

"FUFAXSTM"="c:\program files\Epson Software\FAX Utility\FUFAXSTM.exe" [2009-02-06 843776]

"Bing Bar"="c:\program files\MSN Toolbar\Platform\5.0.1423.0\mswinext.exe" [2010-03-24 243544]

"Microsoft Default Manager"="c:\program files\Microsoft\Search Enhancement Pack\Default Manager\DefMgr.exe" [2009-11-11 288088]

"QuickTime Task"="c:\program files\QuickTime\QTTask.exe" [2010-03-19 421888]

"iTunesHelper"="c:\program files\iTunes\iTunesHelper.exe" [2010-06-15 141624]

c:\documents and settings\All Users\Start Menu\Programs\Startup\

Adobe Acrobat Speed Launcher.lnk - c:\windows\Installer\{AC76BA86-1033-0000-7760-000000000002}\SC_Acrobat.exe [2007-6-24 25214]

Adobe Gamma.lnk - c:\program files\Common Files\Adobe\Calibration\Adobe Gamma Loader.exe [2005-3-16 113664]

America Online 8.0 Tray Icon.lnk - c:\program files\America Online 8.0\aoltray.exe [2008-9-29 36939]

AOL Companion.lnk - c:\program files\AOL Companion\companion.exe [2008-9-29 217162]

Kodak EasyShare software.lnk - c:\program files\Kodak\Kodak EasyShare software\bin\EasyShare.exe [2008-10-30 282624]

Microsoft Office.lnk - c:\program files\Microsoft Office\Office10\OSA.EXE [2001-2-13 83360]

SATARAID5.lnk - c:\program files\Silicon Image\3114 SATARAID5\sam.jar [2007-6-24 1510673]

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\Lavasoft Ad-Aware Service]

@="Service"

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\MCODS]

@=""

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\Wdf01000.sys]

@="Driver"

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\McAfeeFirewall]

"DisableMonitoring"=dword:00000001

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]

"EnableFirewall"= 0 (0x0)

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]

"c:\\Program Files\\Microsoft Games\\Age of Empires III\\age3y.exe"=

"c:\\Program Files\\Windows Live\\Messenger\\msnmsgr.exe"=

"c:\\Program Files\\Windows Live\\Messenger\\livecall.exe"=

"c:\\Program Files\\Sony\\Station\\LaunchPad\\LaunchPad.exe"=

"c:\\Program Files\\LucasArts\\Star Wars JK II Jedi Outcast\\GameData\\jk2mp.exe"=

"c:\\WINDOWS\\system32\\dpvsetup.exe"=

"c:\\Program Files\\LucasArts\\Star Wars Galactic Battlegrounds\\Game\\battlegrounds_x1.exe"=

"c:\\Program Files\\Microsoft Games\\Age of Empires II\\age2_x1\\age2_x1.icd"=

"c:\\Program Files\\2K Games\\Dungeon Siege 2 Broken World\\DungeonSiege2.exe"=

"c:\\Program Files\\Microsoft Games\\Age of Empires II\\age2_x1\\age2_x1.exe"=

"c:\\Program Files\\Activision\\Empires Dawn of the Modern World\\Empires_DMW.exe"=

"c:\\WINDOWS\\system32\\dplaysvr.exe"=

"c:\\Program Files\\Electronic Arts\\The Lord of the Rings, The Rise of the Witch-king\\patchget.dat"=

"c:\\Program Files\\Electronic Arts\\The Lord of the Rings, The Rise of the Witch-king\\game.dat"=

"c:\\Program Files\\LucasArts\\Star Wars Battlefront II\\GameData\\BattlefrontII.exe"=

"c:\\Program Files\\Red Storm Entertainment\\The Sum of All Fears\\SOAF.exe"=

"c:\\Sierra\\Empire Earth\\Empire Earth.exe"=

"c:\\Program Files\\Kodak\\Kodak EasyShare software\\bin\\EasyShare.exe"=

"c:\\Sierra\\Empire Earth - The Art of Conquest\\EE-AOC.exe"=

"c:\\WINDOWS\\system32\\dpnsvr.exe"=

"c:\\Program Files\\Bullfrog\\Dungeon Keeper 2\\Dkii.exe"=

"c:\\Program Files\\AIM6\\aim6.exe"=

"c:\\Program Files\\Electronic Arts\\The Battle for Middle-earth II\\game.dat"=

"c:\\Program Files\\LucasArts\\Star Wars Empire at War Forces of Corruption\\swfoc.exe"=

"c:\\Program Files\\Messenger\\msmsgs.exe"=

"c:\\Program Files\\Microsoft Games\\Age of Empires III\\age3x.exe"=

"c:\\Program Files\\Microsoft Games\\Age of Empires III\\age3.exe"=

"c:\\Program Files\\Ubisoft\\Heroes of Might and Magic V - Tribes of the East\\bin\\H5_Game.exe"=

"c:\\Program Files\\Epson Software\\Event Manager\\EEventManager.exe"=

"c:\\Program Files\\EpsonNet\\EpsonNet Setup\\tool09\\ENEasyApp.exe"=

"c:\\Program Files\\Ventrilo\\Ventrilo.exe"=

"c:\\Program Files\\Bonjour\\mDNSResponder.exe"=

"c:\\Program Files\\iTunes\\iTunes.exe"=

R0 AVGIDSEH;AVGIDSEH;c:\windows\system32\drivers\AVGIDSEH.sys [9/13/2010 4:27 PM 25680]

R0 Lbd;Lbd;c:\windows\system32\drivers\Lbd.sys [10/1/2010 10:52 PM 64288]

R1 bckd;bckd;c:\windows\system32\drivers\bckd.sys [12/11/2009 6:52 PM 74088]

R2 ASTSRV;Nalpeiron Licensing Service;c:\windows\system32\ASTSRV.EXE [9/18/2008 2:58 PM 57344]

R2 bckwfs;Blue Coat K9 Web Protection;c:\program files\Blue Coat K9 Web Protection\k9filter.exe [12/11/2009 6:52 PM 1078632]

R2 Lavasoft Ad-Aware Service;Lavasoft Ad-Aware Service;c:\program files\Lavasoft\Ad-Aware\AAWService.exe [8/12/2010 8:15 AM 1357464]

R2 SemLPT;SemLPT;c:\windows\system32\drivers\Semlpt.sys [11/25/1997 6:32 PM 41984]

R2 Viewpoint Manager Service;Viewpoint Manager Service;c:\program files\Viewpoint\Common\ViewpointService.exe [11/6/2007 8:50 PM 24652]

S3 busbcrw;USB Card Reader Writer driver;c:\windows\system32\drivers\busbcrw.sys [4/23/2003 9:45 AM 16896]

S3 Lavasoft Kernexplorer;Lavasoft helper driver;c:\program files\Lavasoft\Ad-Aware\kernexplorer.sys [8/12/2010 8:15 AM 15008]

S3 STVqx3;Intel Play QX3 Microscope;c:\windows\system32\drivers\STVqx3.SYS [1/12/2009 8:09 PM 131776]

S4 sptd;sptd;c:\windows\system32\drivers\sptd.sys [6/24/2007 9:05 PM 682232]

.

Contents of the 'Scheduled Tasks' folder

2010-10-25 c:\windows\Tasks\Ad-Aware Update (Weekly).job

- c:\program files\Lavasoft\Ad-Aware\Ad-AwareAdmin.exe [2010-08-12 03:17]

2010-10-21 c:\windows\Tasks\AppleSoftwareUpdate.job

- c:\program files\Apple Software Update\SoftwareUpdate.exe [2008-07-30 16:34]

2010-10-25 c:\windows\Tasks\Check Updates for Windows Live Toolbar.job

- c:\program files\Windows Live Toolbar\MSNTBUP.EXE [2007-10-19 16:20]

2010-10-24 c:\windows\Tasks\GoogleUpdateTaskUserS-1-5-21-606747145-1897051121-839522115-1003Core.job

- c:\documents and settings\jenny\Local Settings\Application Data\Google\Update\GoogleUpdate.exe [2008-11-16 21:39]

2010-10-25 c:\windows\Tasks\GoogleUpdateTaskUserS-1-5-21-606747145-1897051121-839522115-1003UA.job

- c:\documents and settings\jenny\Local Settings\Application Data\Google\Update\GoogleUpdate.exe [2008-11-16 21:39]

.

.

------- Supplementary Scan -------

.

uStart Page = hxxp://www.yahoo.com/

uInternet Settings,ProxyOverride = *.local

uSearchURL,(Default) = hxxp://search.yahoo.com/search?fr=mcafee&p=%s

IE: &Windows Live Search - c:\program files\Windows Live Toolbar\msntb.dll/search.htm

IE: Add to Google Photos Screensa&ver - c:\windows\system32\GPhotos.scr/200

IE: Add to Windows &Live Favorites - http://favorites.live.com/quickadd.aspx

IE: Convert link target to Adobe PDF - c:\program files\Adobe\Adobe Acrobat 7.0\Acrobat\AcroIEFavClient.dll/AcroIECapture.html

IE: Convert link target to existing PDF - c:\program files\Adobe\Adobe Acrobat 7.0\Acrobat\AcroIEFavClient.dll/AcroIEAppend.html

IE: Convert selected links to Adobe PDF - c:\program files\Adobe\Adobe Acrobat 7.0\Acrobat\AcroIEFavClient.dll/AcroIECaptureSelLinks.html

IE: Convert selected links to existing PDF - c:\program files\Adobe\Adobe Acrobat 7.0\Acrobat\AcroIEFavClient.dll/AcroIEAppendSelLinks.html

IE: Convert selection to Adobe PDF - c:\program files\Adobe\Adobe Acrobat 7.0\Acrobat\AcroIEFavClient.dll/AcroIECapture.html

IE: Convert selection to existing PDF - c:\program files\Adobe\Adobe Acrobat 7.0\Acrobat\AcroIEFavClient.dll/AcroIEAppend.html

IE: Convert to Adobe PDF - c:\program files\Adobe\Adobe Acrobat 7.0\Acrobat\AcroIEFavClient.dll/AcroIECapture.html

IE: Convert to existing PDF - c:\program files\Adobe\Adobe Acrobat 7.0\Acrobat\AcroIEFavClient.dll/AcroIEAppend.html

IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~2\Office12\EXCEL.EXE/3000

Trusted Zone: turbotax.com

.

- - - - ORPHANS REMOVED - - - -

URLSearchHooks-{9ee802e8-c931-47ab-b570-aa8f791598ca} - c:\program files\eMusic\tbeMus.dll

BHO-{9ee802e8-c931-47ab-b570-aa8f791598ca} - c:\program files\eMusic\tbeMus.dll

Toolbar-{9ee802e8-c931-47ab-b570-aa8f791598ca} - c:\program files\eMusic\tbeMus.dll

WebBrowser-{9EE802E8-C931-47AB-B570-AA8F791598CA} - c:\program files\eMusic\tbeMus.dll

HKCU-Run-Aim6 - (no file)

AddRemove-AIM_6 - c:\program files\AIM6\uninst.exe

AddRemove-eMusic Toolbar - c:\progra~1\eMusic\UNWISE.EXE

AddRemove-Playsushi - c:\program files\PlaySushi\psuninst.exe

AddRemove-{B931FB80-537A-4600-00AD-AC5DEDB6C25B} - c:\program files\Electronic Arts\The Lord of the Rings

**************************************************************************

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net

Rootkit scan 2010-10-24 21:45

Windows 5.1.2600 Service Pack 2 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully

hidden files: 0

**************************************************************************

.

--------------------- LOCKED REGISTRY KEYS ---------------------

[HKEY_USERS\S-1-5-21-606747145-1897051121-839522115-1003\Software\SecuROM\!CAUTION! NEVER A OR CHANGE ANY KEY*]

"??"=hex:57,5e,01,b6,1f,56,5a,ce,6d,c2,12,3f,f5,59,c2,2f,f7,1e,19,e3,ca,6b,c4,

16,b9,ef,18,26,bf,1f,a4,dd,63,e1,8b,62,23,68,65,41,68,7c,ae,6e,62,87,91,76,\

"??"=hex:fa,d7,a5,76,06,3e,0c,b4,31,4d,75,f7,34,22,99,de

[HKEY_USERS\S-1-5-21-606747145-1897051121-839522115-1003\Software\SecuROM\License information*]

"datasecu"=hex:10,2b,f2,3e,5f,a2,c1,2e,af,75,ad,c5,bd,ef,c3,ca,80,f0,fa,a6,4d,

ad,69,ce,2e,87,0b,65,24,da,8f,e8,0b,78,98,1e,90,be,f4,27,46,02,f3,46,5e,7e,\

"rkeysecu"=hex:57,94,b2,4d,4c,cd,fe,bf,32,a3,20,a6,ce,19,23,b7

[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{A483C63A-CDBC-426E-BF93-872502E8144E}]

@Denied: (A 2) (Everyone)

@="FlashBroker"

"LocalizedString"="@c:\\WINDOWS\\system32\\Macromed\\Flash\\FlashUtil10k_ActiveX.exe,-101"

[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{A483C63A-CDBC-426E-BF93-872502E8144E}\Elevation]

"Enabled"=dword:00000001

[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{A483C63A-CDBC-426E-BF93-872502E8144E}\LocalServer32]

@="c:\\WINDOWS\\system32\\Macromed\\Flash\\FlashUtil10k_ActiveX.exe"

[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{A483C63A-CDBC-426E-BF93-872502E8144E}\TypeLib]

@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"

[HKEY_LOCAL_MACHINE\software\Classes\Interface\{E3F2C3CB-5EB8-4A04-B22C-7E3B4B6AF30F}]

@Denied: (A 2) (Everyone)

@="IFlashBroker4"

[HKEY_LOCAL_MACHINE\software\Classes\Interface\{E3F2C3CB-5EB8-4A04-B22C-7E3B4B6AF30F}\ProxyStubClsid32]

@="{00020424-0000-0000-C000-000000000046}"

[HKEY_LOCAL_MACHINE\software\Classes\Interface\{E3F2C3CB-5EB8-4A04-B22C-7E3B4B6AF30F}\TypeLib]

@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"

"Version"="1.0"

[HKEY_LOCAL_MACHINE\System\MountedDevices]

@Denied: (Read) (Administrators)

"\\??\\Volume{fd642d68-216d-11dc-a450-806d6172696f}"=hex:5c,00,3f,00,3f,00,5c,

00,49,00,44,00,45,00,23,00,43,00,64,00,52,00,6f,00,6d,00,4c,00,49,00,54,00,\

"\\??\\Volume{fd642d69-216d-11dc-a450-806d6172696f}"=hex:5c,00,3f,00,3f,00,5c,

00,53,00,54,00,4f,00,52,00,41,00,47,00,45,00,23,00,52,00,65,00,6d,00,6f,00,\

"\\??\\Volume{fd642d6a-216d-11dc-a450-806d6172696f}"=hex:46,22,0a,00,00,7e,00,

00,00,00,00,00

"\\??\\Volume{fd642d6b-216d-11dc-a450-806d6172696f}"=hex:27,45,5f,13,00,7e,00,

00,00,00,00,00

"\\??\\Volume{fd642d6c-216d-11dc-a450-806d6172696f}"=hex:77,aa,93,00,00,7e,00,

00,00,00,00,00

"\\DosDevices\\C:"=hex:46,22,0a,00,00,7e,00,00,00,00,00,00

"\\DosDevices\\D:"=hex:5c,00,3f,00,3f,00,5c,00,53,00,54,00,4f,00,52,00,41,00,

47,00,45,00,23,00,52,00,65,00,6d,00,6f,00,76,00,61,00,62,00,6c,00,65,00,4d,\

"\\DosDevices\\E:"=hex:ac,e6,fc,1e,00,7e,00,00,00,00,00,00

"\\DosDevices\\F:"=hex:5c,00,3f,00,3f,00,5c,00,49,00,44,00,45,00,23,00,43,00,

64,00,52,00,6f,00,6d,00,4c,00,49,00,54,00,45,00,2d,00,4f,00,4e,00,5f,00,44,\

"\\DosDevices\\G:"=hex:5c,00,3f,00,3f,00,5c,00,53,00,54,00,4f,00,52,00,41,00,

47,00,45,00,23,00,52,00,65,00,6d,00,6f,00,76,00,61,00,62,00,6c,00,65,00,4d,\

"\\??\\Volume{b0736c49-2298-11dc-ad35-0015f255540f}"=hex:5c,00,3f,00,3f,00,5c,

00,53,00,54,00,4f,00,52,00,41,00,47,00,45,00,23,00,52,00,65,00,6d,00,6f,00,\

"\\??\\Volume{b0736c4a-2298-11dc-ad35-0015f255540f}"=hex:5c,00,3f,00,3f,00,5c,

00,53,00,54,00,4f,00,52,00,41,00,47,00,45,00,23,00,52,00,65,00,6d,00,6f,00,\

"\\DosDevices\\H:"=hex:3f,70,09,14,00,7e,00,00,00,00,00,00

"\\??\\Volume{b0736c4b-2298-11dc-ad35-0015f255540f}"=hex:5c,00,3f,00,3f,00,5c,

00,53,00,54,00,4f,00,52,00,41,00,47,00,45,00,23,00,52,00,65,00,6d,00,6f,00,\

"\\DosDevices\\I:"=hex:5c,00,3f,00,3f,00,5c,00,53,00,54,00,4f,00,52,00,41,00,

47,00,45,00,23,00,52,00,65,00,6d,00,6f,00,76,00,61,00,62,00,6c,00,65,00,4d,\

"\\??\\Volume{b0736c4c-2298-11dc-ad35-0015f255540f}"=hex:5c,00,3f,00,3f,00,5c,

00,53,00,54,00,4f,00,52,00,41,00,47,00,45,00,23,00,52,00,65,00,6d,00,6f,00,\

"\\DosDevices\\J:"=hex:5c,00,3f,00,3f,00,5c,00,53,00,54,00,4f,00,52,00,41,00,

47,00,45,00,23,00,52,00,65,00,6d,00,6f,00,76,00,61,00,62,00,6c,00,65,00,4d,\

"\\??\\Volume{33946d24-22b5-11dc-8309-806d6172696f}"=hex:5c,00,3f,00,3f,00,5c,

00,49,00,44,00,45,00,23,00,43,00,64,00,52,00,6f,00,6d,00,4c,00,49,00,54,00,\

"\\??\\Volume{9b224c92-22ba-11dc-830a-0015f2553c0f}"=hex:5c,00,3f,00,3f,00,5c,

00,53,00,43,00,53,00,49,00,23,00,43,00,64,00,52,00,6f,00,6d,00,26,00,56,00,\

"\\DosDevices\\K:"=hex:5c,00,3f,00,3f,00,5c,00,53,00,43,00,53,00,49,00,23,00,

43,00,64,00,52,00,6f,00,6d,00,26,00,56,00,65,00,6e,00,5f,00,51,00,44,00,35,\

"\\??\\Volume{7638819e-2821-11dc-8311-0015f2553c0f}"=hex:5c,00,3f,00,3f,00,5c,

00,53,00,54,00,4f,00,52,00,41,00,47,00,45,00,23,00,52,00,65,00,6d,00,6f,00,\

"\\??\\Volume{05a88b64-365d-11dc-8314-0015f2553c0f}"=hex:5c,00,3f,00,3f,00,5c,

00,53,00,54,00,4f,00,52,00,41,00,47,00,45,00,23,00,52,00,65,00,6d,00,6f,00,\

"\\??\\Volume{b9d2c4e6-4093-11dc-831a-0015f2553c0f}"=hex:5c,00,3f,00,3f,00,5c,

00,53,00,54,00,4f,00,52,00,41,00,47,00,45,00,23,00,52,00,65,00,6d,00,6f,00,\

"\\DosDevices\\L:"=hex:5c,00,3f,00,3f,00,5c,00,53,00,54,00,4f,00,52,00,41,00,

47,00,45,00,23,00,52,00,65,00,6d,00,6f,00,76,00,61,00,62,00,6c,00,65,00,4d,\

"\\DosDevices\\M:"=hex:51,db,00,2c,00,7e,00,00,00,00,00,00

"\\??\\Volume{f1fc5342-7442-11dc-97de-806d6172696f}"=hex:ee,0b,b1,ca,00,7e,00,

00,00,00,00,00

"\\??\\Volume{f1fc5343-7442-11dc-97de-806d6172696f}"=hex:ee,0b,b1,ca,00,a0,e1,

1e,23,00,00,00

"\\??\\Volume{b7dd1ee8-7443-11dc-8213-806d6172696f}"=hex:d4,48,d4,48,00,7e,00,

00,00,00,00,00

"\\??\\Volume{9ac1e0cf-ad67-11dc-8232-0015f2553c0f}"=hex:5c,00,3f,00,3f,00,5c,

00,53,00,54,00,4f,00,52,00,41,00,47,00,45,00,23,00,52,00,65,00,6d,00,6f,00,\

"\\??\\Volume{9ac1e0d0-ad67-11dc-8232-0015f2553c0f}"=hex:5c,00,3f,00,3f,00,5c,

00,53,00,54,00,4f,00,52,00,41,00,47,00,45,00,23,00,52,00,65,00,6d,00,6f,00,\

"\\??\\Volume{01e1ec52-b306-11dc-84f6-806d6172696f}"=hex:5c,00,3f,00,3f,00,5c,

00,49,00,44,00,45,00,23,00,43,00,64,00,52,00,6f,00,6d,00,4c,00,49,00,54,00,\

"\\??\\Volume{01e1ec55-b306-11dc-84f6-0015f2553c0f}"=hex:5c,00,3f,00,3f,00,5c,

00,53,00,54,00,4f,00,52,00,41,00,47,00,45,00,23,00,52,00,65,00,6d,00,6f,00,\

"\\??\\Volume{531b1e08-c950-11dc-9340-806d6172696f}"=hex:5c,00,3f,00,3f,00,5c,

00,49,00,44,00,45,00,23,00,43,00,64,00,52,00,6f,00,6d,00,4c,00,49,00,54,00,\

"\\??\\Volume{16f88ccc-ce09-11dc-97b3-806d6172696f}"=hex:5c,00,3f,00,3f,00,5c,

00,49,00,44,00,45,00,23,00,43,00,64,00,52,00,6f,00,6d,00,4c,00,49,00,54,00,\

"\\??\\Volume{de5fbb41-0037-11dd-97c7-0015f2553c0f}"=hex:3f,70,09,14,00,7e,00,

00,00,00,00,00

"\\??\\Volume{62b54370-608b-11dd-9803-0015f2553c0f}"=hex:5c,00,3f,00,3f,00,5c,

00,53,00,54,00,4f,00,52,00,41,00,47,00,45,00,23,00,52,00,65,00,6d,00,6f,00,\

"\\??\\Volume{b62b1613-88ca-11dd-9826-0015f2553c0f}"=hex:51,db,00,2c,00,7e,00,

00,00,00,00,00

"\\DosDevices\\N:"=hex:5c,00,3f,00,3f,00,5c,00,53,00,54,00,4f,00,52,00,41,00,

47,00,45,00,23,00,52,00,65,00,6d,00,6f,00,76,00,61,00,62,00,6c,00,65,00,4d,\

"\\??\\Volume{4e078aec-9992-11dd-9831-0015f2553c0f}"=hex:5c,00,3f,00,3f,00,5c,

00,53,00,54,00,4f,00,52,00,41,00,47,00,45,00,23,00,52,00,65,00,6d,00,6f,00,\

"\\??\\Volume{5dd94b98-dab7-11dd-9855-0015f2553c0f}"=hex:5c,00,3f,00,3f,00,5c,

00,55,00,53,00,42,00,53,00,54,00,4f,00,52,00,23,00,43,00,64,00,52,00,6f,00,\

"\\??\\Volume{5dd94b99-dab7-11dd-9855-0015f2553c0f}"=hex:5c,00,3f,00,3f,00,5c,

00,53,00,54,00,4f,00,52,00,41,00,47,00,45,00,23,00,52,00,65,00,6d,00,6f,00,\

"\\??\\Volume{d4904264-55aa-11de-989a-0015f2553c0f}"=hex:5c,00,3f,00,3f,00,5c,

00,53,00,54,00,4f,00,52,00,41,00,47,00,45,00,23,00,52,00,65,00,6d,00,6f,00,\

"\\??\\Volume{66c60340-6673-11de-989e-0015f2553c0f}"=hex:5c,00,3f,00,3f,00,5c,

00,53,00,54,00,4f,00,52,00,41,00,47,00,45,00,23,00,52,00,65,00,6d,00,6f,00,\

"\\??\\Volume{5411cb7e-8f83-11de-98ac-0015f2553c0f}"=hex:5c,00,3f,00,3f,00,5c,

00,53,00,54,00,4f,00,52,00,41,00,47,00,45,00,23,00,52,00,65,00,6d,00,6f,00,\

"\\??\\Volume{756eca30-b891-11de-98bc-0015f2553c0f}"=hex:5c,00,3f,00,3f,00,5c,

00,53,00,54,00,4f,00,52,00,41,00,47,00,45,00,23,00,52,00,65,00,6d,00,6f,00,\

"\\??\\Volume{756eca31-b891-11de-98bc-0015f2553c0f}"=hex:5c,00,3f,00,3f,00,5c,

00,53,00,54,00,4f,00,52,00,41,00,47,00,45,00,23,00,52,00,65,00,6d,00,6f,00,\

"\\??\\Volume{8847815b-e14d-11de-963c-0015f2553c0f}"=hex:5c,00,3f,00,3f,00,5c,

00,53,00,54,00,4f,00,52,00,41,00,47,00,45,00,23,00,52,00,65,00,6d,00,6f,00,\

"\\??\\Volume{9d35fe43-35e4-11df-967b-0015f2553c0f}"=hex:5c,00,3f,00,3f,00,5c,

00,53,00,54,00,4f,00,52,00,41,00,47,00,45,00,23,00,52,00,65,00,6d,00,6f,00,\

"\\??\\Volume{4f35e91e-5f5b-11df-968d-0015f2553c0f}"=hex:5c,00,3f,00,3f,00,5c,

00,53,00,54,00,4f,00,52,00,41,00,47,00,45,00,23,00,52,00,65,00,6d,00,6f,00,\

"\\??\\Volume{24412b5a-80b3-11df-9b4d-806d6172696f}"=hex:6c,ed,6c,ed,00,7e,00,

00,00,00,00,00

"\\??\\Volume{aa5f6363-8222-11df-9b50-0015f2553c0f}"=hex:c6,82,ef,63,00,7e,00,

00,00,00,00,00

"\\??\\Volume{bf777611-83a0-11df-9b52-0015f2553c0f}"=hex:5c,00,3f,00,3f,00,5c,

00,53,00,54,00,4f,00,52,00,41,00,47,00,45,00,23,00,52,00,65,00,6d,00,6f,00,\

"\\??\\Volume{3bf5e673-926b-11df-9b56-0015f2553c0f}"=hex:ac,e6,fc,1e,00,7e,00,

00,00,00,00,00

.

--------------------- DLLs Loaded Under Running Processes ---------------------

- - - - - - - > 'explorer.exe'(2852)

c:\windows\system32\WININET.dll

c:\windows\system32\ieframe.dll

c:\windows\WinSxS\x86_Microsoft.VC80.CRT_1fc8b3b9a1e18e3b_8.0.50727.4053_x-ww_e6967989\MSVCR80.dll

c:\windows\system32\mshtml.dll

c:\windows\system32\mslbui.dll

c:\windows\IME\SPGRMR.DLL

c:\program files\Common Files\Microsoft Shared\Ink\SKCHUI.DLL

c:\windows\system32\WPDShServiceObj.dll

c:\windows\system32\PortableDeviceTypes.dll

c:\windows\system32\PortableDeviceApi.dll

.

------------------------ Other Running Processes ------------------------

.

c:\program files\Common Files\EPSON\EBAPI\eEBSVC.exe

c:\program files\Common Files\ArcSoft\Connection Service\Bin\ACService.exe

c:\program files\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe

c:\program files\Bonjour\mDNSResponder.exe

c:\program files\Common Files\Intuit\Update Service\IntuitUpdateService.exe

c:\program files\Java\jre6\bin\jqs.exe

c:\program files\Common Files\Microsoft Shared\VS7Debug\mdm.exe

c:\windows\system32\nvsvc32.exe

c:\program files\Microsoft\Search Enhancement Pack\SeaPort\SeaPort.exe

c:\program files\VentSrv\ventrilo_svc.exe

c:\program files\VentSrv\ventrilo_srv.exe

c:\windows\wanmpsvc.exe

c:\program files\Common Files\Microsoft Shared\Windows Live\WLIDSVC.EXE

c:\windows\system32\ZuneBusEnum.exe

c:\program files\Windows Media Player\WMPNetwk.exe

c:\program files\Common Files\Microsoft Shared\Windows Live\WLIDSvcM.exe

c:\windows\System32\wbem\unsecapp.exe

c:\windows\system32\wscntfy.exe

c:\windows\SOUNDMAN.EXE

c:\windows\system32\devldr32.exe

c:\program files\iPod\bin\iPodService.exe

c:\program files\Lavasoft\Ad-Aware\AAWTray.exe

.

**************************************************************************

.

Completion time: 2010-10-24 21:59:43 - machine was rebooted

ComboFix-quarantined-files.txt 2010-10-25 01:58

ComboFix2.txt 2007-11-11 18:38

Pre-Run: 21,336,088,576 bytes free

Post-Run: 22,137,614,336 bytes free

- - End Of File - - 1F6F30C22346E4114FF229DEA6E63D4A

Link to post
Share on other sites

Good job

The following will implement some cleanup procedures as well as reset System Restore points:

For XP:

  • Click START run
  • Now type winexp.exe /Uninstall in the runbox and click OK. Note the space between the X and the U, it needs to be there.

Here's my usual all clean post

To be on the safe side, I would also change all my passwords.

This infection appears to have been cleaned, but as the malware could be configured to run any program a remote attacker requires, it's impossible to be 100% sure that any machine is clean.

Log looks good :)

  • Make your Internet Explorer more secure - This can be done by following these simple instructions:
    1. From within Internet Explorer click on the Tools menu and then click on Options.
    2. Click once on the Security tab
    3. Click once on the Internet icon so it becomes highlighted.
    4. Click once on the Custom Level button.
    5. Change the Download signed ActiveX controls to Prompt
    6. Change the Download unsigned ActiveX controls to Disable
    7. Change the Initialize and script ActiveX controls not marked as safe to Disable
    8. Change the Installation of desktop items to Prompt
    9. Change the Launching programs and files in an IFRAME to Prompt
    10. Change the Navigate sub-frames across different domains to Prompt
    11. When all these settings have been made, click on the OK button.
    12. If it prompts you as to whether or not you want to save the settings, press the Yes button.
    13. Next press the Apply button and then the OK to exit the Internet Properties page.

    [*]Update your AntiVirus Software - It is imperative that you update your Antivirus software at least once a week

    (Even more if you wish). If you do not update your antivirus software then it will not be able to catch any of the new variants that may come out.

    [*]Use a Firewall - I can not stress how important it is that you use a Firewall on your computer.

    Without a firewall your computer is succeptible to being hacked and taken over.

    I am very serious about this and see it happen almost every day with my clients.

    Simply using a Firewall in its default configuration can lower your risk greatly.

    [*]Visit Microsoft's Windows Update Site Frequently - It is important that you visit http://www.windowsupdate.com regularly.

    This will ensure your computer has always the latest security updates available installed on your computer.

    If there are new updates to install, install them immediately, reboot your computer, and revisit the site

    until there are no more critical updates.

Only run one Anti-Virus and Firewall program.

I would suggest you read:

PC Safety and Security--What Do I Need?.

How to Prevent Malware:

Link to post
Share on other sites

Guest
This topic is now closed to further replies.
  • Recently Browsing   0 members

    • No registered users viewing this page.
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.