Jump to content

Google redirects


Recommended Posts

Hey,

it seems that my sister has problems as many here (redirecting to some advertisment sites when clicking on any google search links), so I have check some other topic about that and I did some thing already that seems to be same for most of them and would like to ask if anyone can help me to get rid of this viruses from my sis computer (Ive already tried to remove them and it seems that everytime is unsuccesfull as I can see in taskmanager that *.exe running again)

Thx in advance

DDS LOG

DDS (Ver_2011-08-26.01) - NTFSx86

Internet Explorer: 7.0.5730.13 BrowserJavaVersion: 1.6.0_20

Run by sonja at 17:57:11 on 2011-10-28

Microsoft Windows XP Professional 5.1.2600.3.1250.386.1033.18.2037.1558 [GMT 2:00]

.

.

============== Running Processes ===============

.

C:\WINDOWS\system32\svchost -k DcomLaunch

svchost.exe

C:\WINDOWS\System32\svchost.exe -k netsvcs

svchost.exe

svchost.exe

C:\WINDOWS\system32\spoolsv.exe

C:\WINDOWS\explorer.exe

svchost.exe

C:\Program Files\Java\jre6\bin\jqs.exe

C:\Program Files\Common Files\Microsoft Shared\VS7DEBUG\mdm.exe

C:\WINDOWS\system32\HPZipm12.exe

C:\WINDOWS\system32\svchost.exe -k imgsvc

C:\WINDOWS\1723663418:3321578137.exe

C:\Program Files\ZTE Join Air\AssistantServices.exe

C:\Program Files\Canon\CAL\CALMAIN.exe

C:\Program Files\Malwarebytes' Anti-Malware\mbamservice.exe

C:\WINDOWS\system32\wscntfy.exe

C:\Program Files\Common Files\Java\Java Update\jusched.exe

C:\WINDOWS\RTHDCPL.EXE

C:\WINDOWS\system32\igfxtray.exe

C:\WINDOWS\system32\hkcmd.exe

C:\WINDOWS\system32\igfxsrvc.exe

C:\WINDOWS\system32\igfxpers.exe

C:\Program Files\ZTE Join Air\UIExec.exe

C:\Program Files\Ask.com\Updater\Updater.exe

C:\Program Files\Malwarebytes' Anti-Malware\mbamgui.exe

C:\WINDOWS\system32\ctfmon.exe

C:\Program Files\Messenger\msmsgs.exe

C:\Program Files\GIGABYTE\Common\GNConfig.exe

C:\Program Files\UltraVNC\winvnc.exe

C:\WINDOWS\System32\svchost.exe -k HTTPFilter

.

============== Pseudo HJT Report ===============

.

uStart Page = hxxp://www.google.co.uk/

uInternet Settings,ProxyServer = ftp=127.0.0.1:8123;http=127.0.0.1:8123;https=127.0.0.1:8123;socks=127.0.0.1:8123

uInternet Settings,ProxyOverride = 127.0.0.1;localhost

uWinlogon: Shell=c:\documents and settings\sonja\local settings\application data\3a04bd66\X

BHO: Ask Toolbar: {d4027c7f-154a-4066-a1ad-4243d8127440} - c:\program files\ask.com\GenericAskToolbar.dll

BHO: Java Plug-In 2 SSV Helper: {dbc80044-a445-435b-bc74-9c25c1c588a9} - c:\program files\java\jre6\bin\jp2ssv.dll

BHO: JQSIEStartDetectorImpl Class: {e7e6f031-17ce-4c07-bc86-eabfe594f69c} - c:\program files\java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll

TB: Ask Toolbar: {d4027c7f-154a-4066-a1ad-4243d8127440} - c:\program files\ask.com\GenericAskToolbar.dll

uRun: [ctfmon.exe] c:\windows\system32\ctfmon.exe

uRun: [MSMSGS] "c:\program files\messenger\msmsgs.exe" /background

uRun: [HideMyIP] c:\program files\hide my ip\HideMyIP.exe

mRun: [sunJavaUpdateSched] "c:\program files\common files\java\java update\jusched.exe"

mRun: [RTHDCPL] RTHDCPL.EXE

mRun: [igfxTray] c:\windows\system32\igfxtray.exe

mRun: [HotKeysCmds] c:\windows\system32\hkcmd.exe

mRun: [Persistence] c:\windows\system32\igfxpers.exe

mRun: [uIExec] "c:\program files\zte join air\UIExec.exe"

mRun: [<NO NAME>]

mRun: [ApnUpdater] "c:\program files\ask.com\updater\Updater.exe"

mRun: [Malwarebytes' Anti-Malware] "c:\program files\malwarebytes' anti-malware\mbamgui.exe" /starttray

StartupFolder: c:\docume~1\sonja\startm~1\programs\startup\ultrav~1.lnk - c:\program files\ultravnc\winvnc.exe

StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\gigaby~1.lnk - c:\program files\gigabyte\common\GNConfig.exe

IE: E&xport to Microsoft Excel - c:\progra~1\micros~2\office12\EXCEL.EXE/3000

IE: {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe

IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe

IE: {92780B25-18CC-41C8-B9BE-3C9C571A8263} - {FF059E31-CC5A-4E2E-BF3B-96E929D65503} - c:\progra~1\micros~2\office12\REFIEBAR.DLL

LSP: mswsock.dll

DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_20-windows-i586.cab

DPF: {CAFEEFAC-0016-0000-0020-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_20-windows-i586.cab

DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_20-windows-i586.cab

TCP: Interfaces\{934E3688-B4FA-4FF6-8734-99C45BE46D85} : NameServer = 84.255.209.79,84.255.210.79

TCP: Interfaces\{AAB07DC3-A73E-456F-9B6C-01A08BF408F6} : DhcpNameServer = 84.255.209.77 84.255.210.77

Notify: igfxcui - igfxdev.dll

.

================= FIREFOX ===================

.

FF - ProfilePath - c:\documents and settings\sonja\application data\mozilla\firefox\profiles\3nrn2pcz.default\

FF - prefs.js: browser.startup.homepage - www.google.si

FF - plugin: c:\documents and settings\sonja\application data\mozilla\firefox\profiles\3nrn2pcz.default\extensions\{e001c731-5e37-4538-a5cb-8168736a2360}\plugins\npqscan.dll

FF - plugin: c:\program files\foxit software\foxit reader\plugins\npFoxitReaderPlugin.dll

FF - plugin: c:\program files\java\jre6\bin\new_plugin\npdeployJava1.dll

FF - plugin: c:\program files\mozilla firefox\plugins\npdeployJava1.dll

.

============= SERVICES / DRIVERS ===============

.

R2 MBAMService;MBAMService;c:\program files\malwarebytes' anti-malware\mbamservice.exe [2011-10-28 366152]

R2 UI Assistant Service;UI Assistant Service;c:\program files\zte join air\AssistantServices.exe [2010-9-5 243712]

R3 MBAMProtector;MBAMProtector;c:\windows\system32\drivers\mbam.sys [2011-10-28 22216]

R3 mv2;mv2;c:\windows\system32\drivers\mv2.sys [2010-6-5 10688]

R4 MBAMSwissArmy;MBAMSwissArmy;c:\windows\system32\drivers\mbamswissarmy.sys [2011-10-28 41272]

S3 Ambfilt;Ambfilt;c:\windows\system32\drivers\Ambfilt.sys [2010-6-5 1691480]

S3 cpudrv;cpudrv;c:\program files\systemrequirementslab\cpudrv.sys [2009-12-18 11336]

S3 F-Secure Standalone Minifilter;F-Secure Standalone Minifilter;\??\c:\docume~1\sonja\locals~1\temp\onlinescanner\anti-virus\fsgk.sys --> c:\docume~1\sonja\locals~1\temp\onlinescanner\anti-virus\fsgk.sys [?]

S3 massfilter;ZTE Mass Storage Filter Driver;c:\windows\system32\drivers\massfilter.sys [2010-9-5 7680]

S3 ZTEusbnet;ZTE USB-NDIS miniport;c:\windows\system32\drivers\zteusbnet.sys [2010-9-5 110592]

S3 ZTEusbvoice;ZTE VoUSB Port;c:\windows\system32\drivers\zteusbvoice.sys [2010-9-5 105344]

.

=============== Created Last 30 ================

.

2011-10-28 15:43:02 41272 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys

2011-10-28 15:31:20 -------- d--h--w- c:\windows\PIF

2011-10-28 15:17:24 48016 --sha-w- c:\windows\system32\c_56755.nl_

2011-10-28 14:58:09 22216 ----a-w- c:\windows\system32\drivers\mbam.sys

2011-10-28 14:38:10 -------- d-----w- c:\documents and settings\sonja\application data\Malwarebytes

2011-10-28 14:38:06 -------- d-----w- c:\documents and settings\all users\application data\Malwarebytes

2011-10-28 14:38:03 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware

2011-10-28 14:09:40 134104 ----a-w- c:\program files\mozilla firefox\components\browsercomps.dll

2011-10-28 14:09:39 89048 ----a-w- c:\program files\mozilla firefox\libEGL.dll

2011-10-28 14:09:39 773080 ----a-w- c:\program files\mozilla firefox\mozsqlite3.dll

2011-10-28 14:09:39 478168 ----a-w- c:\program files\mozilla firefox\libGLESv2.dll

2011-10-28 14:09:39 2106216 ----a-w- c:\program files\mozilla firefox\D3DCompiler_43.dll

2011-10-28 14:09:39 1998168 ----a-w- c:\program files\mozilla firefox\d3dx9_43.dll

2011-10-28 14:09:39 1833944 ----a-w- c:\program files\mozilla firefox\mozjs.dll

2011-10-28 14:09:39 15832 ----a-w- c:\program files\mozilla firefox\mozalloc.dll

2011-10-28 14:03:14 -------- d-----w- c:\documents and settings\sonja\application data\QuickScan

2011-10-21 14:04:54 -------- d-sh--w- c:\documents and settings\sonja\local settings\application data\3a04bd66

2011-10-17 19:58:22 -------- d-----w- c:\documents and settings\sonja\local settings\application data\Help

.

==================== Find3M ====================

.

2011-10-28 15:41:43 64512 ----a-w- c:\windows\system32\drivers\serial.sys

2011-10-28 15:41:43 456320 ----a-w- c:\windows\system32\drivers\mrxsmb.sys

2011-09-26 09:41:20 611328 ----a-w- c:\windows\system32\uiautomationcore.dll

2011-09-26 09:41:20 220160 ----a-w- c:\windows\system32\oleacc.dll

2011-09-26 09:41:14 20480 ----a-w- c:\windows\system32\oleaccrc.dll

2011-09-19 19:18:26 576772 ----a-w- c:\windows\gsaver.exe

2011-09-19 19:18:26 40960 ----a-w- c:\windows\gsaver.dll

2011-09-19 19:18:26 371376 ----a-w- c:\windows\gsaver.scr

2011-09-19 19:18:26 18192 ----a-w- c:\windows\gsaver.dat

2011-09-09 09:12:13 599040 ----a-w- c:\windows\system32\crypt32.dll

2011-09-06 13:20:51 1858944 ----a-w- c:\windows\system32\win32k.sys

2011-08-17 21:32:17 832512 ----a-w- c:\windows\system32\wininet.dll

2011-08-17 21:32:16 78336 ----a-w- c:\windows\system32\ieencode.dll

2011-08-17 21:32:16 1830912 ------w- c:\windows\system32\inetcpl.cpl

2011-08-17 21:32:15 17408 ------w- c:\windows\system32\corpol.dll

2011-08-17 13:49:54 138496 ----a-w- c:\windows\system32\drivers\afd.sys

2011-08-17 12:22:23 389120 ----a-w- c:\windows\system32\html.iec

2011-08-12 11:51:26 26488 ----a-w- c:\windows\system32\spupdsvc.exe

.

============= FINISH: 17:57:37,45 ===============

TDS LOG

17:36:40.0109 1476 TDSS rootkit removing tool 2.6.14.0 Oct 28 2011 11:11:01

17:36:40.0375 1476 ============================================================

17:36:40.0375 1476 Current date / time: 2011/10/28 17:36:40.0375

17:36:40.0375 1476 SystemInfo:

17:36:40.0375 1476

17:36:40.0375 1476 OS Version: 5.1.2600 ServicePack: 3.0

17:36:40.0375 1476 Product type: Workstation

17:36:40.0375 1476 ComputerName: SONJA-SOBA

17:36:40.0375 1476 UserName: sonja

17:36:40.0375 1476 Windows directory: C:\WINDOWS

17:36:40.0375 1476 System windows directory: C:\WINDOWS

17:36:40.0375 1476 Processor architecture: Intel x86

17:36:40.0375 1476 Number of processors: 2

17:36:40.0375 1476 Page size: 0x1000

17:36:40.0375 1476 Boot type: Safe boot with network

17:36:40.0375 1476 ============================================================

17:36:41.0375 1476 Initialize success

17:36:43.0078 0508 ============================================================

17:36:43.0078 0508 Scan started

17:36:43.0078 0508 Mode: Manual;

17:36:43.0078 0508 ============================================================

17:36:43.0953 0508 .mrxsmb - ok

17:36:44.0046 0508 3a04bd66 ( Rootkit.Win32.PMax.gen ) - infected

17:36:44.0046 0508 3a04bd66 - detected Rootkit.Win32.PMax.gen (0)

17:36:44.0093 0508 Abiosdsk - ok

17:36:44.0109 0508 abp480n5 - ok

17:36:44.0156 0508 ACPI (8fd99680a539792a30e97944fdaecf17) C:\WINDOWS\system32\DRIVERS\ACPI.sys

17:36:44.0156 0508 ACPI - ok

17:36:44.0203 0508 ACPIEC (9859c0f6936e723e4892d7141b1327d5) C:\WINDOWS\system32\drivers\ACPIEC.sys

17:36:44.0203 0508 ACPIEC - ok

17:36:44.0203 0508 adpu160m - ok

17:36:44.0250 0508 aec (8bed39e3c35d6a489438b8141717a557) C:\WINDOWS\system32\drivers\aec.sys

17:36:44.0250 0508 aec - ok

17:36:44.0281 0508 AegisP (15e655baa989444f56787ef558823643) C:\WINDOWS\system32\DRIVERS\AegisP.sys

17:36:44.0281 0508 AegisP - ok

17:36:44.0328 0508 AFD (1e44bc1e83d8fd2305f8d452db109cf9) C:\WINDOWS\System32\drivers\afd.sys

17:36:44.0328 0508 AFD - ok

17:36:44.0328 0508 Aha154x - ok

17:36:44.0359 0508 aic78u2 - ok

17:36:44.0375 0508 aic78xx - ok

17:36:44.0421 0508 AliIde - ok

17:36:44.0500 0508 Ambfilt (267fc636801edc5ab28e14036349e3be) C:\WINDOWS\system32\drivers\Ambfilt.sys

17:36:44.0515 0508 Ambfilt - ok

17:36:44.0531 0508 amsint - ok

17:36:44.0562 0508 asc - ok

17:36:44.0578 0508 asc3350p - ok

17:36:44.0609 0508 asc3550 - ok

17:36:44.0687 0508 AsyncMac (b153affac761e7f5fcfa822b9c4e97bc) C:\WINDOWS\system32\DRIVERS\asyncmac.sys

17:36:44.0687 0508 AsyncMac - ok

17:36:44.0703 0508 atapi (9f3a2f5aa6875c72bf062c712cfa2674) C:\WINDOWS\system32\DRIVERS\atapi.sys

17:36:44.0703 0508 atapi - ok

17:36:44.0718 0508 Atdisk - ok

17:36:44.0750 0508 Atmarpc (9916c1225104ba14794209cfa8012159) C:\WINDOWS\system32\DRIVERS\atmarpc.sys

17:36:44.0750 0508 Atmarpc - ok

17:36:44.0796 0508 audstub (d9f724aa26c010a217c97606b160ed68) C:\WINDOWS\system32\DRIVERS\audstub.sys

17:36:44.0796 0508 audstub - ok

17:36:44.0828 0508 Beep (da1f27d85e0d1525f6621372e7b685e9) C:\WINDOWS\system32\drivers\Beep.sys

17:36:44.0828 0508 Beep - ok

17:36:44.0890 0508 cbidf2k (90a673fc8e12a79afbed2576f6a7aaf9) C:\WINDOWS\system32\drivers\cbidf2k.sys

17:36:44.0890 0508 cbidf2k - ok

17:36:44.0906 0508 cd20xrnt - ok

17:36:44.0953 0508 Cdaudio (c1b486a7658353d33a10cc15211a873b) C:\WINDOWS\system32\drivers\Cdaudio.sys

17:36:44.0953 0508 Cdaudio - ok

17:36:44.0968 0508 Cdfs (c885b02847f5d2fd45a24e219ed93b32) C:\WINDOWS\system32\drivers\Cdfs.sys

17:36:44.0968 0508 Cdfs - ok

17:36:45.0000 0508 Cdrom (1f4260cc5b42272d71f79e570a27a4fe) C:\WINDOWS\system32\DRIVERS\cdrom.sys

17:36:45.0000 0508 Cdrom - ok

17:36:45.0015 0508 Changer - ok

17:36:45.0078 0508 CmdIde - ok

17:36:45.0125 0508 Cpqarray - ok

17:36:45.0203 0508 cpudrv (d01f685f8b4598d144b0cce9ff95d8d5) C:\Program Files\SystemRequirementsLab\cpudrv.sys

17:36:45.0203 0508 cpudrv - ok

17:36:45.0218 0508 dac2w2k - ok

17:36:45.0250 0508 dac960nt - ok

17:36:45.0296 0508 Disk (044452051f3e02e7963599fc8f4f3e25) C:\WINDOWS\system32\DRIVERS\disk.sys

17:36:45.0296 0508 Disk - ok

17:36:45.0359 0508 dmboot (d992fe1274bde0f84ad826acae022a41) C:\WINDOWS\system32\drivers\dmboot.sys

17:36:45.0359 0508 dmboot - ok

17:36:45.0375 0508 dmio (7c824cf7bbde77d95c08005717a95f6f) C:\WINDOWS\system32\drivers\dmio.sys

17:36:45.0375 0508 dmio - ok

17:36:45.0437 0508 dmload (e9317282a63ca4d188c0df5e09c6ac5f) C:\WINDOWS\system32\drivers\dmload.sys

17:36:45.0437 0508 dmload - ok

17:36:45.0468 0508 DMusic (8a208dfcf89792a484e76c40e5f50b45) C:\WINDOWS\system32\drivers\DMusic.sys

17:36:45.0468 0508 DMusic - ok

17:36:45.0500 0508 dpti2o - ok

17:36:45.0531 0508 drmkaud (8f5fcff8e8848afac920905fbd9d33c8) C:\WINDOWS\system32\drivers\drmkaud.sys

17:36:45.0531 0508 drmkaud - ok

17:36:45.0687 0508 F-Secure Standalone Minifilter - ok

17:36:45.0718 0508 Fastfat (38d332a6d56af32635675f132548343e) C:\WINDOWS\system32\drivers\Fastfat.sys

17:36:45.0718 0508 Fastfat - ok

17:36:45.0750 0508 Fdc (92cdd60b6730b9f50f6a1a0c1f8cdc81) C:\WINDOWS\system32\drivers\Fdc.sys

17:36:45.0750 0508 Fdc - ok

17:36:45.0781 0508 Fips (d45926117eb9fa946a6af572fbe1caa3) C:\WINDOWS\system32\drivers\Fips.sys

17:36:45.0781 0508 Fips - ok

17:36:45.0796 0508 Flpydisk (9d27e7b80bfcdf1cdd9b555862d5e7f0) C:\WINDOWS\system32\drivers\Flpydisk.sys

17:36:45.0796 0508 Flpydisk - ok

17:36:45.0828 0508 FltMgr (b2cf4b0786f8212cb92ed2b50c6db6b0) C:\WINDOWS\system32\drivers\fltmgr.sys

17:36:45.0828 0508 FltMgr - ok

17:36:45.0859 0508 Fs_Rec (3e1e2bd4f39b0e2b7dc4f4d2bcc2779a) C:\WINDOWS\system32\drivers\Fs_Rec.sys

17:36:45.0859 0508 Fs_Rec - ok

17:36:45.0875 0508 Ftdisk (6ac26732762483366c3969c9e4d2259d) C:\WINDOWS\system32\DRIVERS\ftdisk.sys

17:36:45.0875 0508 Ftdisk - ok

17:36:45.0921 0508 Gpc (0a02c63c8b144bd8c86b103dee7c86a2) C:\WINDOWS\system32\DRIVERS\msgpc.sys

17:36:45.0921 0508 Gpc - ok

17:36:45.0937 0508 HDAudBus (573c7d0a32852b48f3058cfd8026f511) C:\WINDOWS\system32\DRIVERS\HDAudBus.sys

17:36:45.0937 0508 HDAudBus - ok

17:36:45.0984 0508 hidusb (ccf82c5ec8a7326c3066de870c06daf1) C:\WINDOWS\system32\DRIVERS\hidusb.sys

17:36:45.0984 0508 hidusb - ok

17:36:46.0015 0508 hpn - ok

17:36:46.0062 0508 HPZid412 (9f1d80908658eb7f1bf70809e0b51470) C:\WINDOWS\system32\DRIVERS\HPZid412.sys

17:36:46.0062 0508 HPZid412 - ok

17:36:46.0078 0508 HPZipr12 (f7e3e9d50f9cd3de28085a8fdaa0a1c3) C:\WINDOWS\system32\DRIVERS\HPZipr12.sys

17:36:46.0078 0508 HPZipr12 - ok

17:36:46.0109 0508 HPZius12 (cf1b7951b4ec8d13f3c93b74bb2b461b) C:\WINDOWS\system32\DRIVERS\HPZius12.sys

17:36:46.0109 0508 HPZius12 - ok

17:36:46.0156 0508 HTTP (f80a415ef82cd06ffaf0d971528ead38) C:\WINDOWS\system32\Drivers\HTTP.sys

17:36:46.0156 0508 HTTP - ok

17:36:46.0171 0508 i2omgmt - ok

17:36:46.0203 0508 i2omp - ok

17:36:46.0234 0508 i8042prt (4a0b06aa8943c1e332520f7440c0aa30) C:\WINDOWS\system32\drivers\i8042prt.sys

17:36:46.0234 0508 i8042prt - ok

17:36:46.0375 0508 ialm (3b743262b6456167888d15f1121b3bf7) C:\WINDOWS\system32\DRIVERS\igxpmp32.sys

17:36:46.0421 0508 ialm - ok

17:36:46.0500 0508 Imapi (083a052659f5310dd8b6a6cb05edcf8e) C:\WINDOWS\system32\DRIVERS\imapi.sys

17:36:46.0515 0508 Imapi - ok

17:36:46.0546 0508 ini910u - ok

17:36:46.0703 0508 IntcAzAudAddService (718f495096df8d94fb66c9c962646372) C:\WINDOWS\system32\drivers\RtkHDAud.sys

17:36:46.0750 0508 IntcAzAudAddService - ok

17:36:46.0765 0508 IntelIde - ok

17:36:46.0796 0508 intelppm (8c953733d8f36eb2133f5bb58808b66b) C:\WINDOWS\system32\DRIVERS\intelppm.sys

17:36:46.0796 0508 intelppm - ok

17:36:46.0828 0508 Ip6Fw (3bb22519a194418d5fec05d800a19ad0) C:\WINDOWS\system32\drivers\ip6fw.sys

17:36:46.0843 0508 Ip6Fw - ok

17:36:46.0859 0508 IpFilterDriver (731f22ba402ee4b62748adaf6363c182) C:\WINDOWS\system32\DRIVERS\ipfltdrv.sys

17:36:46.0859 0508 IpFilterDriver - ok

17:36:46.0875 0508 IpInIp (b87ab476dcf76e72010632b5550955f5) C:\WINDOWS\system32\DRIVERS\ipinip.sys

17:36:46.0875 0508 IpInIp - ok

17:36:46.0906 0508 IpNat (cc748ea12c6effde940ee98098bf96bb) C:\WINDOWS\system32\DRIVERS\ipnat.sys

17:36:46.0906 0508 IpNat - ok

17:36:46.0953 0508 IPSec (23c74d75e36e7158768dd63d92789a91) C:\WINDOWS\system32\DRIVERS\ipsec.sys

17:36:46.0953 0508 IPSec - ok

17:36:46.0968 0508 IRENUM (c93c9ff7b04d772627a3646d89f7bf89) C:\WINDOWS\system32\DRIVERS\irenum.sys

17:36:46.0968 0508 IRENUM - ok

17:36:47.0015 0508 isapnp (05a299ec56e52649b1cf2fc52d20f2d7) C:\WINDOWS\system32\DRIVERS\isapnp.sys

17:36:47.0015 0508 isapnp - ok

17:36:47.0046 0508 Kbdclass (463c1ec80cd17420a542b7f36a36f128) C:\WINDOWS\system32\DRIVERS\kbdclass.sys

17:36:47.0046 0508 Kbdclass - ok

17:36:47.0078 0508 kbdhid (9ef487a186dea361aa06913a75b3fa99) C:\WINDOWS\system32\DRIVERS\kbdhid.sys

17:36:47.0078 0508 kbdhid - ok

17:36:47.0109 0508 kmixer (692bcf44383d056aed41b045a323d378) C:\WINDOWS\system32\drivers\kmixer.sys

17:36:47.0109 0508 kmixer - ok

17:36:47.0125 0508 KSecDD (b467646c54cc746128904e1654c750c1) C:\WINDOWS\system32\drivers\KSecDD.sys

17:36:47.0125 0508 KSecDD - ok

17:36:47.0171 0508 lbrtfdc - ok

17:36:47.0234 0508 massfilter (f0435fe3c1ec2659d2bbf073ca0752ee) C:\WINDOWS\system32\DRIVERS\massfilter.sys

17:36:47.0234 0508 massfilter - ok

17:36:47.0281 0508 mnmdd (4ae068242760a1fb6e1a44bf4e16afa6) C:\WINDOWS\system32\drivers\mnmdd.sys

17:36:47.0281 0508 mnmdd - ok

17:36:47.0359 0508 Modem (dfcbad3cec1c5f964962ae10e0bcc8e1) C:\WINDOWS\system32\drivers\Modem.sys

17:36:47.0359 0508 Modem - ok

17:36:47.0406 0508 Monfilt (c7d9f9717916b34c1b00dd4834af485c) C:\WINDOWS\system32\drivers\Monfilt.sys

17:36:47.0421 0508 Monfilt - ok

17:36:47.0453 0508 Mouclass (35c9e97194c8cfb8430125f8dbc34d04) C:\WINDOWS\system32\DRIVERS\mouclass.sys

17:36:47.0453 0508 Mouclass - ok

17:36:47.0468 0508 mouhid (b1c303e17fb9d46e87a98e4ba6769685) C:\WINDOWS\system32\DRIVERS\mouhid.sys

17:36:47.0468 0508 mouhid - ok

17:36:47.0484 0508 MountMgr (a80b9a0bad1b73637dbcbba7df72d3fd) C:\WINDOWS\system32\drivers\MountMgr.sys

17:36:47.0484 0508 MountMgr - ok

17:36:47.0500 0508 mraid35x - ok

17:36:47.0531 0508 MRxDAV (11d42bb6206f33fbb3ba0288d3ef81bd) C:\WINDOWS\system32\DRIVERS\mrxdav.sys

17:36:47.0531 0508 MRxDAV - ok

17:36:47.0578 0508 MRxSmb (31f81b9da501be5596042df6c0ffdb2d) C:\WINDOWS\system32\DRIVERS\mrxsmb.sys

17:36:47.0578 0508 MRxSmb ( Rootkit.Win32.ZAccess.e ) - infected

17:36:47.0578 0508 MRxSmb - detected Rootkit.Win32.ZAccess.e (0)

17:36:47.0625 0508 Msfs (c941ea2454ba8350021d774daf0f1027) C:\WINDOWS\system32\drivers\Msfs.sys

17:36:47.0625 0508 Msfs - ok

17:36:47.0656 0508 MSKSSRV (d1575e71568f4d9e14ca56b7b0453bf1) C:\WINDOWS\system32\drivers\MSKSSRV.sys

17:36:47.0656 0508 MSKSSRV - ok

17:36:47.0687 0508 MSPCLOCK (325bb26842fc7ccc1fcce2c457317f3e) C:\WINDOWS\system32\drivers\MSPCLOCK.sys

17:36:47.0687 0508 MSPCLOCK - ok

17:36:47.0703 0508 MSPQM (bad59648ba099da4a17680b39730cb3d) C:\WINDOWS\system32\drivers\MSPQM.sys

17:36:47.0703 0508 MSPQM - ok

17:36:47.0718 0508 mssmbios (af5f4f3f14a8ea2c26de30f7a1e17136) C:\WINDOWS\system32\DRIVERS\mssmbios.sys

17:36:47.0718 0508 mssmbios - ok

17:36:47.0765 0508 Mup (de6a75f5c270e756c5508d94b6cf68f5) C:\WINDOWS\system32\drivers\Mup.sys

17:36:47.0765 0508 Mup - ok

17:36:47.0796 0508 mv2 (a0f0b16316276017e682410b5612a707) C:\WINDOWS\system32\DRIVERS\mv2.sys

17:36:47.0796 0508 mv2 - ok

17:36:47.0843 0508 NDIS (1df7f42665c94b825322fae71721130d) C:\WINDOWS\system32\drivers\NDIS.sys

17:36:47.0843 0508 NDIS - ok

17:36:47.0859 0508 NdisTapi (0109c4f3850dfbab279542515386ae22) C:\WINDOWS\system32\DRIVERS\ndistapi.sys

17:36:47.0859 0508 NdisTapi - ok

17:36:47.0890 0508 Ndisuio (f927a4434c5028758a842943ef1a3849) C:\WINDOWS\system32\DRIVERS\ndisuio.sys

17:36:47.0906 0508 Ndisuio - ok

17:36:47.0921 0508 NdisWan (edc1531a49c80614b2cfda43ca8659ab) C:\WINDOWS\system32\DRIVERS\ndiswan.sys

17:36:47.0921 0508 NdisWan - ok

17:36:48.0000 0508 NDProxy (9282bd12dfb069d3889eb3fcc1000a9b) C:\WINDOWS\system32\drivers\NDProxy.sys

17:36:48.0000 0508 NDProxy - ok

17:36:48.0046 0508 NetBIOS (5d81cf9a2f1a3a756b66cf684911cdf0) C:\WINDOWS\system32\DRIVERS\netbios.sys

17:36:48.0046 0508 NetBIOS - ok

17:36:48.0062 0508 NetBT (74b2b2f5bea5e9a3dc021d685551bd3d) C:\WINDOWS\system32\DRIVERS\netbt.sys

17:36:48.0062 0508 NetBT - ok

17:36:48.0171 0508 Npfs (3182d64ae053d6fb034f44b6def8034a) C:\WINDOWS\system32\drivers\Npfs.sys

17:36:48.0171 0508 Npfs - ok

17:36:48.0187 0508 Ntfs (78a08dd6a8d65e697c18e1db01c5cdca) C:\WINDOWS\system32\drivers\Ntfs.sys

17:36:48.0203 0508 Ntfs - ok

17:36:48.0250 0508 Null (73c1e1f395918bc2c6dd67af7591a3ad) C:\WINDOWS\system32\drivers\Null.sys

17:36:48.0250 0508 Null - ok

17:36:48.0281 0508 NwlnkFlt (b305f3fad35083837ef46a0bbce2fc57) C:\WINDOWS\system32\DRIVERS\nwlnkflt.sys

17:36:48.0281 0508 NwlnkFlt - ok

17:36:48.0296 0508 NwlnkFwd (c99b3415198d1aab7227f2c88fd664b9) C:\WINDOWS\system32\DRIVERS\nwlnkfwd.sys

17:36:48.0296 0508 NwlnkFwd - ok

17:36:48.0359 0508 Parport (5575faf8f97ce5e713d108c2a58d7c7c) C:\WINDOWS\system32\DRIVERS\parport.sys

17:36:48.0359 0508 Parport - ok

17:36:48.0375 0508 PartMgr (beb3ba25197665d82ec7065b724171c6) C:\WINDOWS\system32\drivers\PartMgr.sys

17:36:48.0375 0508 PartMgr - ok

17:36:48.0406 0508 ParVdm (70e98b3fd8e963a6a46a2e6247e0bea1) C:\WINDOWS\system32\drivers\ParVdm.sys

17:36:48.0406 0508 ParVdm - ok

17:36:48.0421 0508 PCI (a219903ccf74233761d92bef471a07b1) C:\WINDOWS\system32\DRIVERS\pci.sys

17:36:48.0421 0508 PCI - ok

17:36:48.0437 0508 PCIDump - ok

17:36:48.0468 0508 PCIIde (ccf5f451bb1a5a2a522a76e670000ff0) C:\WINDOWS\system32\DRIVERS\pciide.sys

17:36:48.0468 0508 PCIIde - ok

17:36:48.0500 0508 Pcmcia (9e89ef60e9ee05e3f2eef2da7397f1c1) C:\WINDOWS\system32\drivers\Pcmcia.sys

17:36:48.0515 0508 Pcmcia - ok

17:36:48.0515 0508 PDCOMP - ok

17:36:48.0546 0508 PDFRAME - ok

17:36:48.0562 0508 PDRELI - ok

17:36:48.0578 0508 PDRFRAME - ok

17:36:48.0609 0508 perc2 - ok

17:36:48.0625 0508 perc2hib - ok

17:36:48.0734 0508 PptpMiniport (efeec01b1d3cf84f16ddd24d9d9d8f99) C:\WINDOWS\system32\DRIVERS\raspptp.sys

17:36:48.0734 0508 PptpMiniport - ok

17:36:48.0765 0508 PSched (09298ec810b07e5d582cb3a3f9255424) C:\WINDOWS\system32\DRIVERS\psched.sys

17:36:48.0765 0508 PSched - ok

17:36:48.0781 0508 Ptilink (80d317bd1c3dbc5d4fe7b1678c60cadd) C:\WINDOWS\system32\DRIVERS\ptilink.sys

17:36:48.0781 0508 Ptilink - ok

17:36:48.0812 0508 ql1080 - ok

17:36:48.0828 0508 Ql10wnt - ok

17:36:48.0843 0508 ql12160 - ok

17:36:48.0875 0508 ql1240 - ok

17:36:48.0890 0508 ql1280 - ok

17:36:48.0937 0508 RasAcd (fe0d99d6f31e4fad8159f690d68ded9c) C:\WINDOWS\system32\DRIVERS\rasacd.sys

17:36:48.0937 0508 RasAcd - ok

17:36:48.0968 0508 Rasl2tp (11b4a627bc9614b885c4969bfa5ff8a6) C:\WINDOWS\system32\DRIVERS\rasl2tp.sys

17:36:48.0968 0508 Rasl2tp - ok

17:36:49.0046 0508 RasPppoe (5bc962f2654137c9909c3d4603587dee) C:\WINDOWS\system32\DRIVERS\raspppoe.sys

17:36:49.0046 0508 RasPppoe - ok

17:36:49.0078 0508 Raspti (fdbb1d60066fcfbb7452fd8f9829b242) C:\WINDOWS\system32\DRIVERS\raspti.sys

17:36:49.0078 0508 Raspti - ok

17:36:49.0109 0508 Rdbss (7ad224ad1a1437fe28d89cf22b17780a) C:\WINDOWS\system32\DRIVERS\rdbss.sys

17:36:49.0109 0508 Rdbss - ok

17:36:49.0125 0508 RDPCDD (4912d5b403614ce99c28420f75353332) C:\WINDOWS\system32\DRIVERS\RDPCDD.sys

17:36:49.0125 0508 RDPCDD - ok

17:36:49.0156 0508 rdpdr (15cabd0f7c00c47c70124907916af3f1) C:\WINDOWS\system32\DRIVERS\rdpdr.sys

17:36:49.0156 0508 rdpdr - ok

17:36:49.0218 0508 RDPWD (fc105dd312ed64eb66bff111e8ec6eac) C:\WINDOWS\system32\drivers\RDPWD.sys

17:36:49.0218 0508 RDPWD - ok

17:36:49.0265 0508 redbook (f828dd7e1419b6653894a8f97a0094c5) C:\WINDOWS\system32\DRIVERS\redbook.sys

17:36:49.0265 0508 redbook - ok

17:36:49.0359 0508 RT61 (ef64988c8e699e2481d1fd45bf472ef0) C:\WINDOWS\system32\DRIVERS\RT61.sys

17:36:49.0375 0508 RT61 - ok

17:36:49.0406 0508 RTLE8023xp (832f27e6962a14ebf3b09af0e65fd7b4) C:\WINDOWS\system32\DRIVERS\Rtenicxp.sys

17:36:49.0406 0508 RTLE8023xp - ok

17:36:49.0484 0508 Secdrv (90a3935d05b494a5a39d37e71f09a677) C:\WINDOWS\system32\DRIVERS\secdrv.sys

17:36:49.0484 0508 Secdrv - ok

17:36:49.0515 0508 serenum (0f29512ccd6bead730039fb4bd2c85ce) C:\WINDOWS\system32\DRIVERS\serenum.sys

17:36:49.0515 0508 serenum - ok

17:36:49.0562 0508 Serial (a1f5f705c0219abb1fc05e49af9c284d) C:\WINDOWS\system32\DRIVERS\serial.sys

17:36:49.0562 0508 Serial ( Rootkit.Win32.ZAccess.g ) - infected

17:36:49.0562 0508 Serial - detected Rootkit.Win32.ZAccess.g (0)

17:36:49.0625 0508 Sfloppy (8e6b8c671615d126fdc553d1e2de5562) C:\WINDOWS\system32\drivers\Sfloppy.sys

17:36:49.0625 0508 Sfloppy - ok

17:36:49.0656 0508 Simbad - ok

17:36:49.0687 0508 Sparrow - ok

17:36:49.0718 0508 splitter (ab8b92451ecb048a4d1de7c3ffcb4a9f) C:\WINDOWS\system32\drivers\splitter.sys

17:36:49.0718 0508 splitter - ok

17:36:49.0750 0508 sr (76bb022c2fb6902fd5bdd4f78fc13a5d) C:\WINDOWS\system32\DRIVERS\sr.sys

17:36:49.0765 0508 sr - ok

17:36:49.0796 0508 Srv (47ddfc2f003f7f9f0592c6874962a2e7) C:\WINDOWS\system32\DRIVERS\srv.sys

17:36:49.0796 0508 Srv - ok

17:36:49.0828 0508 swenum (3941d127aef12e93addf6fe6ee027e0f) C:\WINDOWS\system32\DRIVERS\swenum.sys

17:36:49.0828 0508 swenum - ok

17:36:49.0859 0508 swmidi (8ce882bcc6cf8a62f2b2323d95cb3d01) C:\WINDOWS\system32\drivers\swmidi.sys

17:36:49.0859 0508 swmidi - ok

17:36:49.0906 0508 symc810 - ok

17:36:49.0921 0508 symc8xx - ok

17:36:49.0937 0508 sym_hi - ok

17:36:49.0968 0508 sym_u3 - ok

17:36:49.0984 0508 sysaudio (8b83f3ed0f1688b4958f77cd6d2bf290) C:\WINDOWS\system32\drivers\sysaudio.sys

17:36:49.0984 0508 sysaudio - ok

17:36:50.0046 0508 Tcpip (9aefa14bd6b182d61e3119fa5f436d3d) C:\WINDOWS\system32\DRIVERS\tcpip.sys

17:36:50.0062 0508 Tcpip - ok

17:36:50.0078 0508 TDPIPE (6471a66807f5e104e4885f5b67349397) C:\WINDOWS\system32\drivers\TDPIPE.sys

17:36:50.0078 0508 TDPIPE - ok

17:36:50.0109 0508 TDTCP (c56b6d0402371cf3700eb322ef3aaf61) C:\WINDOWS\system32\drivers\TDTCP.sys

17:36:50.0109 0508 TDTCP - ok

17:36:50.0140 0508 TermDD (88155247177638048422893737429d9e) C:\WINDOWS\system32\DRIVERS\termdd.sys

17:36:50.0140 0508 TermDD - ok

17:36:50.0171 0508 TosIde - ok

17:36:50.0234 0508 Udfs (5787b80c2e3c5e2f56c2a233d91fa2c9) C:\WINDOWS\system32\drivers\Udfs.sys

17:36:50.0234 0508 Udfs - ok

17:36:50.0312 0508 ultra - ok

17:36:50.0359 0508 Update (402ddc88356b1bac0ee3dd1580c76a31) C:\WINDOWS\system32\DRIVERS\update.sys

17:36:50.0359 0508 Update - ok

17:36:50.0421 0508 usbccgp (173f317ce0db8e21322e71b7e60a27e8) C:\WINDOWS\system32\DRIVERS\usbccgp.sys

17:36:50.0421 0508 usbccgp - ok

17:36:50.0453 0508 usbehci (65dcf09d0e37d4c6b11b5b0b76d470a7) C:\WINDOWS\system32\DRIVERS\usbehci.sys

17:36:50.0453 0508 usbehci - ok

17:36:50.0484 0508 usbhub (1ab3cdde553b6e064d2e754efe20285c) C:\WINDOWS\system32\DRIVERS\usbhub.sys

17:36:50.0484 0508 usbhub - ok

17:36:50.0515 0508 usbprint (a717c8721046828520c9edf31288fc00) C:\WINDOWS\system32\DRIVERS\usbprint.sys

17:36:50.0515 0508 usbprint - ok

17:36:50.0562 0508 usbscan (a0b8cf9deb1184fbdd20784a58fa75d4) C:\WINDOWS\system32\DRIVERS\usbscan.sys

17:36:50.0562 0508 usbscan - ok

17:36:50.0578 0508 usbstor (a32426d9b14a089eaa1d922e0c5801a9) C:\WINDOWS\system32\DRIVERS\USBSTOR.SYS

17:36:50.0578 0508 usbstor - ok

17:36:50.0625 0508 usbuhci (26496f9dee2d787fc3e61ad54821ffe6) C:\WINDOWS\system32\DRIVERS\usbuhci.sys

17:36:50.0625 0508 usbuhci - ok

17:36:50.0625 0508 VgaSave (0d3a8fafceacd8b7625cd549757a7df1) C:\WINDOWS\System32\drivers\vga.sys

17:36:50.0625 0508 VgaSave - ok

17:36:50.0656 0508 ViaIde - ok

17:36:50.0687 0508 VolSnap (4c8fcb5cc53aab716d810740fe59d025) C:\WINDOWS\system32\drivers\VolSnap.sys

17:36:50.0687 0508 VolSnap - ok

17:36:50.0734 0508 Wanarp (e20b95baedb550f32dd489265c1da1f6) C:\WINDOWS\system32\DRIVERS\wanarp.sys

17:36:50.0734 0508 Wanarp - ok

17:36:50.0765 0508 WDICA - ok

17:36:50.0796 0508 wdmaud (6768acf64b18196494413695f0c3a00f) C:\WINDOWS\system32\drivers\wdmaud.sys

17:36:50.0796 0508 wdmaud - ok

17:36:50.0937 0508 WS2IFSL (6abe6e225adb5a751622a9cc3bc19ce8) C:\WINDOWS\System32\drivers\ws2ifsl.sys

17:36:50.0937 0508 WS2IFSL - ok

17:36:51.0078 0508 ZTEusbmdm6k (c2215c6ada8b1e9feb507cee9b446661) C:\WINDOWS\system32\DRIVERS\ZTEusbmdm6k.sys

17:36:51.0078 0508 ZTEusbmdm6k - ok

17:36:51.0078 0508 ZTEusbnet (9862f9d2ff50ae748ed42c022e6aac15) C:\WINDOWS\system32\DRIVERS\ZTEusbnet.sys

17:36:51.0093 0508 ZTEusbnet - ok

17:36:51.0109 0508 ZTEusbnmea (f16ce3c7690ab7426dc96520d54a737e) C:\WINDOWS\system32\DRIVERS\ZTEusbnmea.sys

17:36:51.0109 0508 ZTEusbnmea - ok

17:36:51.0140 0508 ZTEusbser6k (c2215c6ada8b1e9feb507cee9b446661) C:\WINDOWS\system32\DRIVERS\ZTEusbser6k.sys

17:36:51.0140 0508 ZTEusbser6k - ok

17:36:51.0156 0508 ZTEusbvoice (f16ce3c7690ab7426dc96520d54a737e) C:\WINDOWS\system32\DRIVERS\ZTEusbvoice.sys

17:36:51.0156 0508 ZTEusbvoice - ok

17:36:51.0218 0508 MBR (0x1B8) (8f558eb6672622401da993e1e865c861) \Device\Harddisk0\DR0

17:36:51.0328 0508 \Device\Harddisk0\DR0 - ok

17:36:51.0343 0508 MBR (0x1B8) (65e858a8a0293be11a920b0bc99d695e) \Device\Harddisk1\DR3

17:36:51.0546 0508 \Device\Harddisk1\DR3 - ok

17:36:51.0578 0508 Boot (0x1200) (b6f83b27eb2df10e40d293e99e3c56c5) \Device\Harddisk0\DR0\Partition0

17:36:51.0578 0508 \Device\Harddisk0\DR0\Partition0 - ok

17:36:51.0578 0508 Boot (0x1200) (ba91506c3a681d3767519021253e3bff) \Device\Harddisk0\DR0\Partition1

17:36:51.0578 0508 \Device\Harddisk0\DR0\Partition1 - ok

17:36:51.0609 0508 Boot (0x1200) (3b9f01806bd218e002dcb7d67aa82f5a) \Device\Harddisk1\DR3\Partition0

17:36:51.0609 0508 \Device\Harddisk1\DR3\Partition0 - ok

17:36:51.0625 0508 ============================================================

17:36:51.0625 0508 Scan finished

17:36:51.0625 0508 ============================================================

17:36:51.0656 0408 Detected object count: 3

17:36:51.0656 0408 Actual detected object count: 3

17:40:40.0796 0408 HKLM\SYSTEM\ControlSet001\services\3a04bd66 - will be deleted on reboot

17:40:40.0828 0408 HKLM\SYSTEM\ControlSet003\services\3a04bd66 - will be deleted on reboot

17:40:40.0828 0408 C:\WINDOWS\1723663418:3321578137.exe - will be deleted on reboot

17:40:40.0828 0408 3a04bd66 ( Rootkit.Win32.PMax.gen ) - User select action: Delete

17:40:40.0953 0408 VerifyFileNameVersionInfo: GetFileVersionInfoSizeW(C:\WINDOWS\system32\drivers\mrxsmb.sys) error 1813

17:40:41.0609 0408 Backup copy found, using it..

17:40:41.0625 0408 C:\WINDOWS\system32\DRIVERS\mrxsmb.sys - will be cured on reboot

17:40:41.0625 0408 MRxSmb ( Rootkit.Win32.ZAccess.e ) - User select action: Cure

17:40:41.0687 0408 VerifyFileNameVersionInfo: GetFileVersionInfoSizeW(C:\WINDOWS\system32\drivers\serial.sys) error 1813

17:40:44.0281 0408 Backup copy found, using it..

17:40:44.0281 0408 C:\WINDOWS\system32\DRIVERS\serial.sys - will be cured on reboot

17:40:44.0281 0408 Serial ( Rootkit.Win32.ZAccess.g ) - User select action: Cure

17:40:55.0390 1448 Deinitialize success

bump

Link to post
Share on other sites

:welcome:

Whether you wish to continue with cleaning or not, you should be aware that you may have been infected by a backdoor trojan. This type of program has the ability to steal passwords and other information from your system. If you are using your computer for sensitive purposes such as internet banking then I recommend you take the following steps immediately:

  • Use another, uninfected computer to change all your internet passwords, especially ones with financial implications such as banks, paypal, ebay, etc. You should also change the passwords for any other site you use.
  • Call your bank(s), credit card company or any other institution which may be affected and advise them that your login/password or credit card information may have been stolen and ask what steps to take with regard to your account.
  • Consider what other private information could possibly have been taken from your computer and take appropriate steps
  • Removing this infection can also disable the ability to connect to the internet.

This infection can almost certainly be cleaned, but as the malware could be configured to run any program a remote attacker requires, it will be impossible to be 100% sure that the machine is clean, if this is unacceptable to you then you should consider reformatting the system partition and reinstalling Windows as this is the only 100% sure answer.

Please post back to let me know how you wish to proceed.

Link to post
Share on other sites

Please don't attach the scans / logs for these tools, use "copy/paste".

DO NOT use any TOOLS such as Combofix or HijackThis fixes without supervision.

Doing so could make your pc inoperatible and could require a full reinstall of your OS, losing all your programs and data.

Please run a new MBAM scan being sure to update before scanning.

Post the scan results

Also please describe how your computer behaves at the moment.

Please don't attach the scans / logs, use "copy/paste".

Link to post
Share on other sites

so at moment google search redirects me to some spam sites, Ive tried to remove "trojan" with mbam with no success (it should be deleted at next reboot but I can see file running again in task manager 1723663418:3321578137.exe) with normal login there is no chance running mbam and after every use I need to reinstall it as I lose permision to run it - so I can run it under safe mode where all those problems are not present and this is what scan log shows up

Malwarebytes' Anti-Malware 1.51.2.1300

www.malwarebytes.org

Database version: 8062

Windows 5.1.2600 Service Pack 3 (Safe Mode)

Internet Explorer 7.0.5730.13

1.11.2011 18:22:38

mbam-log-2011-11-01 (18-22-31).txt

Scan type: Quick scan

Objects scanned: 166633

Time elapsed: 2 minute(s), 12 second(s)

Memory Processes Infected: 0

Memory Modules Infected: 0

Registry Keys Infected: 1

Registry Values Infected: 1

Registry Data Items Infected: 0

Folders Infected: 0

Files Infected: 1

Memory Processes Infected:

(No malicious items detected)

Memory Modules Infected:

(No malicious items detected)

Registry Keys Infected:

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\3a04bd66 (Backdoor.0Access) -> No action taken.

Registry Values Infected:

HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell (Backdoor.Agent.Gen) -> Value: Shell -> No action taken.

Registry Data Items Infected:

(No malicious items detected)

Folders Infected:

(No malicious items detected)

Files Infected:

c:\WINDOWS\1723663418:3321578137.exe (Backdoor.0Access) -> No action taken.

Link to post
Share on other sites

Nasty backdoor.

Vista and Windows 7 users:

1. These tools MUST be run from the executable. (.exe) every time you run them

2. With Admin Rights (Right click, choose "Run as Administrator")

Download ComboFix from one of these locations:

Link 1

Link 2 If using this link, Right Click and select Save As.

* IMPORTANT !!! Save ComboFix.exe to your Desktop

  • Disable your AntiVirus and AntiSpyware applications, usually via a right click on the System Tray icon. They may otherwise interfere with our tools. Note: If you are having difficulty properly disabling your protective programs, or are unsure as to what programs need to be disabled, please refer to the information available through this link : Protective Programs
  • Double click on ComboFix.exe & follow the prompts.
    Notes: Combofix will run without the Recovery Console installed. Skip the Recovery Console part if you're running Vista or Windows 7.
    Note: If you have XP SP3, use the XP SP2 package.
    If Vista or Windows 7, skip the Recovery Console part
  • As part of it's process, ComboFix will check to see if the Microsoft Windows Recovery Console is installed. With malware infections being as they are today, it's strongly recommended to have this pre-installed on your machine before doing any malware removal. It will allow you to boot up into a special recovery/repair mode that will allow us to more easily help you should your computer have a problem after an attempted removal of malware.
  • Follow the prompts to allow ComboFix to download and install the Microsoft Windows Recovery Console, and when prompted, agree to the End-User License Agreement to install the Microsoft Windows Recovery Console.

**Please note: If the Microsoft Windows Recovery Console is already installed, ComboFix will continue it's malware removal procedures.

RC1.png

Once the Microsoft Windows Recovery Console is installed using ComboFix, you should see the following message:

RC2-1.png

Click on Yes, to continue scanning for malware.

When finished, it shall produce a log for you. Please include the C:\ComboFix.txt using Copy / Paste in your next reply.

Notes:

1.Do not mouse-click Combofix's window while it is running. That may cause it to stall.

2. ComboFix may reset a number of Internet Explorer's settings, including making I-E the default browser.

3. Combofix prevents autorun of ALL CD, floppy and USB devices to assist with malware removal & increase security. If this is an issue or makes it difficult for you -- please tell your helper.

4. CF disconnects your machine from the internet. The connection is automatically restored before CF completes its run. If CF runs into difficulty and terminates prematurely, the connection can be manually restored by restarting your machine.

Give it atleast 20-30 minutes to finish if needed.

Please do not attach the scan results from Combofx. Use copy/paste.

Also please describe how your computer behaves at the moment.

Link to post
Share on other sites

Nice, that combo thing helped :) that *exe is not runing anymore google searches doesnt redirects me to some spam sites MBAM didnt found any infected files and here is CF log , thx a lot

ComboFix 11-11-01.04 - sonja 01.11.2011 20:46:16.1.2 - x86

Microsoft Windows XP Professional 5.1.2600.3.1250.386.1033.18.2037.1696 [GMT 1:00]

Running from: c:\documents and settings\sonja\Desktop\ComboFix.exe

.

.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))

.

.

c:\documents and settings\sonja\Local Settings\Application Data\3a04bd66

c:\documents and settings\sonja\Local Settings\Application Data\3a04bd66\@

c:\documents and settings\sonja\Local Settings\Application Data\3a04bd66\U\80000000.@

c:\documents and settings\sonja\Local Settings\Application Data\3a04bd66\U\800000cb.@

c:\documents and settings\sonja\Local Settings\Application Data\3a04bd66\X

c:\windows\$NtUninstallKB30877$

c:\windows\$NtUninstallKB30877$\1494491125

c:\windows\$NtUninstallKB30877$\973389158\@

c:\windows\$NtUninstallKB30877$\973389158\L\hqyiebyj

c:\windows\$NtUninstallKB30877$\973389158\loader.tlb

c:\windows\$NtUninstallKB30877$\973389158\U\@00000001

c:\windows\$NtUninstallKB30877$\973389158\U\@000000c0

c:\windows\$NtUninstallKB30877$\973389158\U\@000000cb

c:\windows\$NtUninstallKB30877$\973389158\U\@000000cf

c:\windows\$NtUninstallKB30877$\973389158\U\@80000000

c:\windows\$NtUninstallKB30877$\973389158\U\@800000c0

c:\windows\$NtUninstallKB30877$\973389158\U\@800000cb

c:\windows\$NtUninstallKB30877$\973389158\U\@800000cf

c:\windows\{2521BB91-29B1-4d7e-9137-AC9875D77735}

c:\windows\help\tours\htmltour\unlock_playing.htm

c:\windows\system32\

c:\windows\system32\c_56755.nls

c:\windows\system32\d3d9caps.dat

.

Infected copy of c:\windows\system32\drivers\serial.sys was found and disinfected

Restored copy from - The cat found it :)

Infected copy of c:\program files\Canon\CAL\CALMAIN.exe was found and disinfected

Restored copy from - c:\system volume information\_restore{47971820-01C5-43B2-A53B-A9DFAC5B7F74}\RP518\A0019741.exe

.

Infected copy of c:\program files\Java\jre6\bin\jqs.exe was found and disinfected

Restored copy from - c:\system volume information\_restore{47971820-01C5-43B2-A53B-A9DFAC5B7F74}\RP518\A0019737.exe

.

Infected copy of c:\program files\Malwarebytes' Anti-Malware\mbamservice.exe was found and disinfected

Restored copy from - c:\system volume information\_restore{47971820-01C5-43B2-A53B-A9DFAC5B7F74}\RP526\A0021931.exe

.

Infected copy of c:\program files\Common Files\Microsoft Shared\VS7DEBUG\mdm.exe was found and disinfected

Restored copy from - c:\system volume information\_restore{47971820-01C5-43B2-A53B-A9DFAC5B7F74}\RP518\A0019738.exe

.

Infected copy of c:\windows\system32\HPZipm12.exe was found and disinfected

Restored copy from - c:\system volume information\_restore{47971820-01C5-43B2-A53B-A9DFAC5B7F74}\RP518\A0019739.exe

.

Infected copy of c:\program files\ZTE Join Air\AssistantServices.exe was found and disinfected

Restored copy from - c:\system volume information\_restore{47971820-01C5-43B2-A53B-A9DFAC5B7F74}\RP518\A0019740.exe

.

Infected copy of c:\program files\Canon\CAL\CALMAIN.exe was found and disinfected

Restored copy from - c:\system volume information\_restore{47971820-01C5-43B2-A53B-A9DFAC5B7F74}\RP518\A0019741.exe

Infected copy of c:\program files\Common Files\Microsoft Shared\VS7DEBUG\mdm.exe was found and disinfected

Restored copy from - c:\system volume information\_restore{47971820-01C5-43B2-A53B-A9DFAC5B7F74}\RP518\A0019738.exe

Infected copy of c:\windows\system32\HPZipm12.exe was found and disinfected

Restored copy from - c:\system volume information\_restore{47971820-01C5-43B2-A53B-A9DFAC5B7F74}\RP518\A0019739.exe

Infected copy of c:\program files\ZTE Join Air\AssistantServices.exe was found and disinfected

Restored copy from - c:\system volume information\_restore{47971820-01C5-43B2-A53B-A9DFAC5B7F74}\RP518\A0019740.exe

.

((((((((((((((((((((((((((((((((((((((( Drivers/Services )))))))))))))))))))))))))))))))))))))))))))))))))

.

.

-------\Service_.mrxsmb

.

.

((((((((((((((((((((((((( Files Created from 2011-10-01 to 2011-11-01 )))))))))))))))))))))))))))))))

.

.

2011-11-01 19:44 . 2011-10-28 15:41 64512 -c--a-w- c:\windows\system32\dllcache\serial.sys

2011-11-01 19:44 . 2011-10-28 15:41 64512 ----a-w- c:\windows\system32\drivers\serial.sys

2011-10-28 15:31 . 2011-10-28 15:31 -------- d--h--w- c:\windows\PIF

2011-10-28 15:17 . 2011-10-28 15:42 48016 --sha-w- c:\windows\system32\c_56755.nl_

2011-10-28 14:58 . 2011-08-31 16:00 22216 ----a-w- c:\windows\system32\drivers\mbam.sys

2011-10-28 14:38 . 2011-10-28 14:38 -------- d-----w- c:\documents and settings\sonja\Application Data\Malwarebytes

2011-10-28 14:38 . 2011-10-28 14:38 -------- d-----w- c:\documents and settings\All Users\Application Data\Malwarebytes

2011-10-28 14:38 . 2011-11-01 19:49 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware

2011-10-28 14:35 . 2011-10-28 14:35 -------- d-----w- c:\documents and settings\Administrator

2011-10-28 14:09 . 2011-09-29 07:33 134104 ----a-w- c:\program files\Mozilla Firefox\components\browsercomps.dll

2011-10-28 14:09 . 2011-09-29 07:33 89048 ----a-w- c:\program files\Mozilla Firefox\libEGL.dll

2011-10-28 14:09 . 2011-09-29 07:33 773080 ----a-w- c:\program files\Mozilla Firefox\mozsqlite3.dll

2011-10-28 14:09 . 2011-09-29 07:33 478168 ----a-w- c:\program files\Mozilla Firefox\libGLESv2.dll

2011-10-28 14:09 . 2011-09-29 07:33 1833944 ----a-w- c:\program files\Mozilla Firefox\mozjs.dll

2011-10-28 14:09 . 2011-09-29 07:33 15832 ----a-w- c:\program files\Mozilla Firefox\mozalloc.dll

2011-10-28 14:09 . 2011-09-29 00:26 2106216 ----a-w- c:\program files\Mozilla Firefox\D3DCompiler_43.dll

2011-10-28 14:09 . 2011-09-29 00:26 1998168 ----a-w- c:\program files\Mozilla Firefox\d3dx9_43.dll

2011-10-28 14:03 . 2011-10-28 14:03 -------- d-----w- c:\documents and settings\sonja\Application Data\QuickScan

2011-10-17 19:58 . 2011-10-17 19:58 -------- d-----w- c:\documents and settings\sonja\Local Settings\Application Data\Help

.

.

.

(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))

.

2011-10-28 15:41 . 2006-02-28 12:00 456320 ----a-w- c:\windows\system32\drivers\mrxsmb.sys

2011-09-26 09:41 . 2008-07-29 17:59 611328 ----a-w- c:\windows\system32\uiautomationcore.dll

2011-09-26 09:41 . 2006-02-28 12:00 220160 ----a-w- c:\windows\system32\oleacc.dll

2011-09-26 09:41 . 2006-02-28 12:00 20480 ----a-w- c:\windows\system32\oleaccrc.dll

2011-09-19 19:18 . 2011-09-19 19:18 576772 ----a-w- c:\windows\gsaver.exe

2011-09-19 19:18 . 2011-09-19 19:18 40960 ----a-w- c:\windows\gsaver.dll

2011-09-19 19:18 . 2011-09-19 19:18 18192 ----a-w- c:\windows\gsaver.dat

2011-09-09 09:12 . 2006-02-28 12:00 599040 ----a-w- c:\windows\system32\crypt32.dll

2011-09-06 13:20 . 2006-02-28 12:00 1858944 ----a-w- c:\windows\system32\win32k.sys

2011-08-17 21:32 . 2006-02-28 12:00 832512 ----a-w- c:\windows\system32\wininet.dll

2011-08-17 21:32 . 2006-02-28 12:00 78336 ----a-w- c:\windows\system32\ieencode.dll

2011-08-17 21:32 . 2006-02-28 12:00 1830912 ------w- c:\windows\system32\inetcpl.cpl

2011-08-17 21:32 . 2006-02-28 12:00 17408 ------w- c:\windows\system32\corpol.dll

2011-08-17 13:49 . 2006-02-28 12:00 138496 ----a-w- c:\windows\system32\drivers\afd.sys

2011-08-17 12:22 . 2006-02-28 12:00 389120 ----a-w- c:\windows\system32\html.iec

2011-08-12 11:51 . 2010-06-05 20:59 26488 ----a-w- c:\windows\system32\spupdsvc.exe

2011-09-29 07:33 . 2011-10-28 14:09 134104 ----a-w- c:\program files\mozilla firefox\components\browsercomps.dll

.

.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))

.

.

*Note* empty entries & legit default entries are not shown

REGEDIT4

.

[HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{D4027C7F-154A-4066-A1AD-4243D8127440}]

2011-08-23 19:20 1515688 ----a-w- c:\program files\Ask.com\GenericAskToolbar.dll

.

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Toolbar]

"{D4027C7F-154A-4066-A1AD-4243D8127440}"= "c:\program files\Ask.com\GenericAskToolbar.dll" [2011-08-23 1515688]

.

[HKEY_CLASSES_ROOT\clsid\{d4027c7f-154a-4066-a1ad-4243d8127440}]

[HKEY_CLASSES_ROOT\GenericAskToolbar.ToolbarWnd.1]

[HKEY_CLASSES_ROOT\TypeLib\{2996F0E7-292B-4CAE-893F-47B8B1C05B56}]

[HKEY_CLASSES_ROOT\GenericAskToolbar.ToolbarWnd]

.

[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Toolbar\Webbrowser]

"{D4027C7F-154A-4066-A1AD-4243D8127440}"= "c:\program files\Ask.com\GenericAskToolbar.dll" [2011-08-23 1515688]

.

[HKEY_CLASSES_ROOT\clsid\{d4027c7f-154a-4066-a1ad-4243d8127440}]

[HKEY_CLASSES_ROOT\GenericAskToolbar.ToolbarWnd.1]

[HKEY_CLASSES_ROOT\TypeLib\{2996F0E7-292B-4CAE-893F-47B8B1C05B56}]

[HKEY_CLASSES_ROOT\GenericAskToolbar.ToolbarWnd]

.

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]

"SunJavaUpdateSched"="c:\program files\Common Files\Java\Java Update\jusched.exe" [2010-02-18 248040]

"RTHDCPL"="RTHDCPL.EXE" [2010-04-06 19523104]

"IgfxTray"="c:\windows\system32\igfxtray.exe" [2009-01-21 134656]

"HotKeysCmds"="c:\windows\system32\hkcmd.exe" [2009-01-21 166912]

"Persistence"="c:\windows\system32\igfxpers.exe" [2009-01-21 134656]

"UIExec"="c:\program files\ZTE Join Air\UIExec.exe" [2009-03-24 132608]

"ApnUpdater"="c:\program files\Ask.com\Updater\Updater.exe" [2011-08-23 887976]

"Malwarebytes' Anti-Malware"="c:\program files\Malwarebytes' Anti-Malware\mbamgui.exe" [2011-08-31 449608]

.

c:\documents and settings\sonja\Start Menu\Programs\Startup\

UltraVNC Server.lnk - c:\program files\UltraVNC\winvnc.exe [2010-6-5 1590216]

.

c:\documents and settings\All Users\Start Menu\Programs\Startup\

Gigabyte Wireless Utility.lnk - c:\program files\GIGABYTE\Common\GNConfig.exe [2010-6-5 753664]

.

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]

"EnableFirewall"= 0 (0x0)

.

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]

"%windir%\\system32\\sessmgr.exe"=

"%windir%\\Network Diagnostic\\xpnetdiag.exe"=

"c:\\Program Files\\UltraVNC\\winvnc.exe"=

"c:\\Program Files\\UltraVNC\\vncviewer.exe"=

"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpqscnvw.exe"=

"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpqkygrp.exe"=

.

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\GloballyOpenPorts\List]

"5900:TCP"= 5900:TCP:vnc5900

"5800:TCP"= 5800:TCP:vnc5800

.

R2 MBAMService;MBAMService;c:\program files\Malwarebytes' Anti-Malware\mbamservice.exe [28.10.2011 15:58 366152]

R2 UI Assistant Service;UI Assistant Service;c:\program files\ZTE Join Air\AssistantServices.exe [5.9.2010 12:30 241664]

R3 MBAMProtector;MBAMProtector;c:\windows\system32\drivers\mbam.sys [28.10.2011 15:58 22216]

R3 mv2;mv2;c:\windows\system32\drivers\mv2.sys [5.6.2010 22:26 10688]

S3 Ambfilt;Ambfilt;c:\windows\system32\drivers\Ambfilt.sys [5.6.2010 22:10 1691480]

S3 cpudrv;cpudrv;c:\program files\SystemRequirementsLab\cpudrv.sys [18.12.2009 9:58 11336]

S3 F-Secure Standalone Minifilter;F-Secure Standalone Minifilter;\??\c:\docume~1\sonja\LOCALS~1\Temp\OnlineScanner\Anti-Virus\fsgk.sys --> c:\docume~1\sonja\LOCALS~1\Temp\OnlineScanner\Anti-Virus\fsgk.sys [?]

S3 massfilter;ZTE Mass Storage Filter Driver;c:\windows\system32\drivers\massfilter.sys [5.9.2010 11:09 7680]

S3 MBAMSwissArmy;MBAMSwissArmy;\??\c:\windows\system32\drivers\mbamswissarmy.sys --> c:\windows\system32\drivers\mbamswissarmy.sys [?]

S3 ZTEusbnet;ZTE USB-NDIS miniport;c:\windows\system32\drivers\zteusbnet.sys [5.9.2010 11:09 110592]

S3 ZTEusbvoice;ZTE VoUSB Port;c:\windows\system32\drivers\zteusbvoice.sys [5.9.2010 11:09 105344]

.

Contents of the 'Scheduled Tasks' folder

.

2011-11-01 c:\windows\Tasks\Scheduled Update for Ask Toolbar.job

- c:\program files\Ask.com\UpdateTask.exe [2011-08-23 19:20]

.

.

------- Supplementary Scan -------

.

uStart Page = hxxp://www.google.co.uk/

uInternet Settings,ProxyServer = ftp=127.0.0.1:8123;http=127.0.0.1:8123;https=127.0.0.1:8123;socks=127.0.0.1:8123

uInternet Settings,ProxyOverride = 127.0.0.1;localhost

IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~2\Office12\EXCEL.EXE/3000

TCP: Interfaces\{934E3688-B4FA-4FF6-8734-99C45BE46D85}: NameServer = 84.255.209.79,84.255.210.79

FF - ProfilePath - c:\documents and settings\sonja\Application Data\Mozilla\Firefox\Profiles\3nrn2pcz.default\

FF - prefs.js: browser.startup.homepage - www.google.si

.

- - - - ORPHANS REMOVED - - - -

.

HKCU-Run-HideMyIP - c:\program files\Hide My IP\HideMyIP.exe

SafeBoot-03872273.sys

.

.

.

**************************************************************************

.

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net

Rootkit scan 2011-11-01 20:51

Windows 5.1.2600 Service Pack 3 NTFS

.

scanning hidden processes ...

.

scanning hidden autostart entries ...

.

scanning hidden files ...

.

scan completed successfully

hidden files: 0

.

**************************************************************************

.

--------------------- DLLs Loaded Under Running Processes ---------------------

.

- - - - - - - > 'explorer.exe'(1768)

c:\windows\system32\WININET.dll

c:\windows\system32\ieframe.dll

.

------------------------ Other Running Processes ------------------------

.

c:\windows\RTHDCPL.EXE

c:\program files\Java\jre6\bin\jqs.exe

c:\windows\system32\igfxsrvc.exe

c:\program files\Common Files\Microsoft Shared\VS7DEBUG\mdm.exe

c:\windows\system32\HPZipm12.exe

c:\program files\Canon\CAL\CALMAIN.exe

c:\windows\system32\wscntfy.exe

.

**************************************************************************

.

Completion time: 2011-11-01 20:53:31 - machine was rebooted

ComboFix-quarantined-files.txt 2011-11-01 19:53

.

Pre-Run: 59.669.598.208 bytes free

Post-Run: 59.830.927.360 bytes free

.

WindowsXP-KB310994-SP2-Pro-BootDisk-ENU.exe

[boot loader]

timeout=2

default=multi(0)disk(0)rdisk(0)partition(2)\WINDOWS

[operating systems]

c:\cmdcons\BOOTSECT.DAT="Microsoft Windows Recovery Console" /cmdcons

UnsupportedDebug="do not select this" /debug

multi(0)disk(0)rdisk(0)partition(2)\WINDOWS="Microsoft Windows XP Professional" /noexecute=optin /fastdetect

.

- - End Of File - - BC9B4CAA18DF8C4192564F20E71F9239

MBAM log

Malwarebytes' Anti-Malware 1.51.2.1300

www.malwarebytes.org

Database version: 8064

Windows 5.1.2600 Service Pack 3

Internet Explorer 7.0.5730.13

1.11.2011 21:05:31

mbam-log-2011-11-01 (21-05-31).txt

Scan type: Quick scan

Objects scanned: 165662

Time elapsed: 2 minute(s), 2 second(s)

Memory Processes Infected: 0

Memory Modules Infected: 0

Registry Keys Infected: 0

Registry Values Infected: 0

Registry Data Items Infected: 0

Folders Infected: 0

Files Infected: 0

Memory Processes Infected:

(No malicious items detected)

Memory Modules Infected:

(No malicious items detected)

Registry Keys Infected:

(No malicious items detected)

Registry Values Infected:

(No malicious items detected)

Registry Data Items Infected:

(No malicious items detected)

Folders Infected:

(No malicious items detected)

Files Infected:

(No malicious items detected)

Link to post
Share on other sites

Use Add/Remove programs and remove Ask.com if listed

Next:

Copy/paste the text in the Codebox below into notepad:

Here's how to do that:

Click Start > Run type Notepad click OK.

This will open an empty notepad file:

Take your mouse, and place your cursor at the beginning of the text in the box below, then click and hold the left mouse button, while pulling your mouse over the text. This should highlight the text. Now release the left mouse button. Now, with the cursor over the highlighted text, right click the mouse for options, and select 'copy'. Now over the empty Notepad box, right click your mouse again, and select 'paste' and you will have copied and pasted the text.

KillAll::

File::
c:\windows\system32\c_56755.nl_

DDS::
uInternet Settings,ProxyServer = ftp=127.0.0.1:8123;http=127.0.0.1:8123;https=127.0.0.1:8123;socks=127.0.0.1:8123
uInternet Settings,ProxyOverride = 127.0.0.1;localhost

Folder::
c:\program files\Ask.com

Save this file to your desktop, Save this as "CFScript"

Here's how to do that:

1.Click File;

2.Click Save As... Change the directory to your desktop;

3.Change the Save as type to "All Files";

4.Type in the file name: CFScript

5.Click Save ...

CFScriptB-4.gif

Drag CFScript.txt into ComboFix.exe

Then post the results log using Copy / Paste

Also please describe how your computer behaves at the moment.

Link to post
Share on other sites

ComboFix 11-11-01.04 - sonja 01.11.2011 21:44:29.2.2 - x86

Microsoft Windows XP Professional 5.1.2600.3.1250.386.1033.18.2037.1358 [GMT 1:00]

Running from: c:\documents and settings\sonja\Desktop\ComboFix.exe

Command switches used :: c:\documents and settings\sonja\Desktop\CFScript.txt

.

FILE ::

"c:\windows\system32\c_56755.nl_"

.

.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))

.

.

c:\windows\system32\c_56755.nl_

.

.

((((((((((((((((((((((((( Files Created from 2011-10-01 to 2011-11-01 )))))))))))))))))))))))))))))))

.

.

2011-11-01 20:02 . 2011-08-31 16:00 22216 ----a-w- c:\windows\system32\drivers\mbam.sys

2011-11-01 19:44 . 2011-10-28 15:41 64512 -c--a-w- c:\windows\system32\dllcache\serial.sys

2011-11-01 19:44 . 2011-10-28 15:41 64512 ----a-w- c:\windows\system32\drivers\serial.sys

2011-10-28 15:31 . 2011-10-28 15:31 -------- d--h--w- c:\windows\PIF

2011-10-28 14:38 . 2011-10-28 14:38 -------- d-----w- c:\documents and settings\sonja\Application Data\Malwarebytes

2011-10-28 14:38 . 2011-10-28 14:38 -------- d-----w- c:\documents and settings\All Users\Application Data\Malwarebytes

2011-10-28 14:38 . 2011-11-01 20:02 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware

2011-10-28 14:35 . 2011-10-28 14:35 -------- d-----w- c:\documents and settings\Administrator

2011-10-28 14:09 . 2011-09-29 07:33 134104 ----a-w- c:\program files\Mozilla Firefox\components\browsercomps.dll

2011-10-28 14:09 . 2011-09-29 07:33 89048 ----a-w- c:\program files\Mozilla Firefox\libEGL.dll

2011-10-28 14:09 . 2011-09-29 07:33 773080 ----a-w- c:\program files\Mozilla Firefox\mozsqlite3.dll

2011-10-28 14:09 . 2011-09-29 07:33 478168 ----a-w- c:\program files\Mozilla Firefox\libGLESv2.dll

2011-10-28 14:09 . 2011-09-29 07:33 1833944 ----a-w- c:\program files\Mozilla Firefox\mozjs.dll

2011-10-28 14:09 . 2011-09-29 07:33 15832 ----a-w- c:\program files\Mozilla Firefox\mozalloc.dll

2011-10-28 14:09 . 2011-09-29 00:26 2106216 ----a-w- c:\program files\Mozilla Firefox\D3DCompiler_43.dll

2011-10-28 14:09 . 2011-09-29 00:26 1998168 ----a-w- c:\program files\Mozilla Firefox\d3dx9_43.dll

2011-10-28 14:03 . 2011-10-28 14:03 -------- d-----w- c:\documents and settings\sonja\Application Data\QuickScan

2011-10-17 19:58 . 2011-10-17 19:58 -------- d-----w- c:\documents and settings\sonja\Local Settings\Application Data\Help

.

.

.

(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))

.

2011-10-28 15:41 . 2006-02-28 12:00 456320 ----a-w- c:\windows\system32\drivers\mrxsmb.sys

2011-09-26 09:41 . 2008-07-29 17:59 611328 ----a-w- c:\windows\system32\uiautomationcore.dll

2011-09-26 09:41 . 2006-02-28 12:00 220160 ----a-w- c:\windows\system32\oleacc.dll

2011-09-26 09:41 . 2006-02-28 12:00 20480 ----a-w- c:\windows\system32\oleaccrc.dll

2011-09-19 19:18 . 2011-09-19 19:18 576772 ----a-w- c:\windows\gsaver.exe

2011-09-19 19:18 . 2011-09-19 19:18 40960 ----a-w- c:\windows\gsaver.dll

2011-09-19 19:18 . 2011-09-19 19:18 18192 ----a-w- c:\windows\gsaver.dat

2011-09-09 09:12 . 2006-02-28 12:00 599040 ----a-w- c:\windows\system32\crypt32.dll

2011-09-06 13:20 . 2006-02-28 12:00 1858944 ----a-w- c:\windows\system32\win32k.sys

2011-08-17 21:32 . 2006-02-28 12:00 832512 ----a-w- c:\windows\system32\wininet.dll

2011-08-17 21:32 . 2006-02-28 12:00 78336 ----a-w- c:\windows\system32\ieencode.dll

2011-08-17 21:32 . 2006-02-28 12:00 1830912 ------w- c:\windows\system32\inetcpl.cpl

2011-08-17 21:32 . 2006-02-28 12:00 17408 ------w- c:\windows\system32\corpol.dll

2011-08-17 13:49 . 2006-02-28 12:00 138496 ----a-w- c:\windows\system32\drivers\afd.sys

2011-08-17 12:22 . 2006-02-28 12:00 389120 ----a-w- c:\windows\system32\html.iec

2011-08-12 11:51 . 2010-06-05 20:59 26488 ----a-w- c:\windows\system32\spupdsvc.exe

2011-09-29 07:33 . 2011-10-28 14:09 134104 ----a-w- c:\program files\mozilla firefox\components\browsercomps.dll

.

.

((((((((((((((((((((((((((((( SnapShot@2011-11-01_19.51.23 )))))))))))))))))))))))))))))))))))))))))

.

+ 2011-11-01 20:48 . 2011-11-01 20:48 16384 c:\windows\temp\Perflib_Perfdata_198.dat

.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))

.

.

*Note* empty entries & legit default entries are not shown

REGEDIT4

.

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]

"SunJavaUpdateSched"="c:\program files\Common Files\Java\Java Update\jusched.exe" [2010-02-18 248040]

"RTHDCPL"="RTHDCPL.EXE" [2010-04-06 19523104]

"IgfxTray"="c:\windows\system32\igfxtray.exe" [2009-01-21 134656]

"HotKeysCmds"="c:\windows\system32\hkcmd.exe" [2009-01-21 166912]

"Persistence"="c:\windows\system32\igfxpers.exe" [2009-01-21 134656]

"Malwarebytes' Anti-Malware"="c:\program files\Malwarebytes' Anti-Malware\mbamgui.exe" [2011-08-31 449608]

.

c:\documents and settings\sonja\Start Menu\Programs\Startup\

UltraVNC Server.lnk - c:\program files\UltraVNC\winvnc.exe [2010-6-5 1590216]

.

c:\documents and settings\All Users\Start Menu\Programs\Startup\

Gigabyte Wireless Utility.lnk - c:\program files\GIGABYTE\Common\GNConfig.exe [2010-6-5 753664]

.

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]

"EnableFirewall"= 0 (0x0)

.

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]

"%windir%\\system32\\sessmgr.exe"=

"%windir%\\Network Diagnostic\\xpnetdiag.exe"=

"c:\\Program Files\\UltraVNC\\winvnc.exe"=

"c:\\Program Files\\UltraVNC\\vncviewer.exe"=

"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpqscnvw.exe"=

"c:\\Program Files\\HP\\Digital Imaging\\bin\\hpqkygrp.exe"=

.

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\GloballyOpenPorts\List]

"5900:TCP"= 5900:TCP:vnc5900

"5800:TCP"= 5800:TCP:vnc5800

.

R2 MBAMService;MBAMService;c:\program files\Malwarebytes' Anti-Malware\mbamservice.exe [1.11.2011 21:02 366152]

R3 MBAMProtector;MBAMProtector;c:\windows\system32\drivers\mbam.sys [1.11.2011 21:02 22216]

R3 mv2;mv2;c:\windows\system32\drivers\mv2.sys [5.6.2010 22:26 10688]

S3 Ambfilt;Ambfilt;c:\windows\system32\drivers\Ambfilt.sys [5.6.2010 22:10 1691480]

S3 cpudrv;cpudrv;c:\program files\SystemRequirementsLab\cpudrv.sys [18.12.2009 9:58 11336]

S3 F-Secure Standalone Minifilter;F-Secure Standalone Minifilter;\??\c:\docume~1\sonja\LOCALS~1\Temp\OnlineScanner\Anti-Virus\fsgk.sys --> c:\docume~1\sonja\LOCALS~1\Temp\OnlineScanner\Anti-Virus\fsgk.sys [?]

S3 massfilter;ZTE Mass Storage Filter Driver;c:\windows\system32\DRIVERS\massfilter.sys --> c:\windows\system32\DRIVERS\massfilter.sys [?]

S3 ZTEusbnet;ZTE USB-NDIS miniport;c:\windows\system32\DRIVERS\ZTEusbnet.sys --> c:\windows\system32\DRIVERS\ZTEusbnet.sys [?]

S3 ZTEusbvoice;ZTE VoUSB Port;c:\windows\system32\DRIVERS\ZTEusbvoice.sys --> c:\windows\system32\DRIVERS\ZTEusbvoice.sys [?]

.

.

------- Supplementary Scan -------

.

uStart Page = hxxp://www.google.co.uk/

IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~2\Office12\EXCEL.EXE/3000

TCP: Interfaces\{934E3688-B4FA-4FF6-8734-99C45BE46D85}: NameServer = 84.255.209.79,84.255.210.79

FF - ProfilePath - c:\documents and settings\sonja\Application Data\Mozilla\Firefox\Profiles\3nrn2pcz.default\

FF - prefs.js: browser.startup.homepage - www.google.si

.

- - - - ORPHANS REMOVED - - - -

.

WebBrowser-{D4027C7F-154A-4066-A1AD-4243D8127440} - (no file)

.

.

.

**************************************************************************

.

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net

Rootkit scan 2011-11-01 21:48

Windows 5.1.2600 Service Pack 3 NTFS

.

scanning hidden processes ...

.

scanning hidden autostart entries ...

.

scanning hidden files ...

.

scan completed successfully

hidden files: 0

.

**************************************************************************

.

--------------------- DLLs Loaded Under Running Processes ---------------------

.

- - - - - - - > 'explorer.exe'(3976)

c:\windows\system32\WININET.dll

c:\windows\system32\ieframe.dll

.

------------------------ Other Running Processes ------------------------

.

c:\program files\Java\jre6\bin\jqs.exe

c:\program files\Common Files\Microsoft Shared\VS7DEBUG\mdm.exe

c:\windows\system32\HPZipm12.exe

c:\program files\Canon\CAL\CALMAIN.exe

c:\windows\RTHDCPL.EXE

c:\windows\system32\igfxsrvc.exe

c:\windows\system32\wscntfy.exe

.

**************************************************************************

.

Completion time: 2011-11-01 21:50:41 - machine was rebooted

ComboFix-quarantined-files.txt 2011-11-01 20:50

ComboFix2.txt 2011-11-01 19:53

.

Pre-Run: 59.767.750.656 bytes free

Post-Run: 59.753.934.848 bytes free

.

- - End Of File - - A35AF9CF19A1D74BD974D303CA33B950

Link to post
Share on other sites

Good job thumbup.gif

The following will implement some cleanup procedures as well as reset System Restore points:

For XP:

  • Click START run
  • Now type ComboFix /Uninstall in the runbox and click OK. Note the space between the X and the /, it needs to be there.

For Vista / Windows 7

  • Click START Search
  • Now type ComboFix /Uninstall in the runbox and click OK. Note the space between the X and the /, it needs to be there.

If you used DeFogger

To re-enable your Emulation drivers, double click DeFogger to run the tool.

  • The application window will appear
  • Click the Re-enable button to re-enable your CD Emulation drivers
  • Click Yes to continue
  • A 'Finished!' message will appear
  • Click OK
  • DeFogger will now ask to reboot the machine - click OK

IMPORTANT! If you receive an error message while running DeFogger, please post the log defogger_enable which will appear on your desktop.

Your Emulation drivers are now re-enabled.

Here's my usual all clean post

To be on the safe side, I would also change all my passwords.

This infection appears to have been cleaned, but as the malware could be configured to run any program a remote attacker requires, it's impossible to be 100% sure that any machine is clean.

Log looks good :D

  • Make your Internet Explorer more secure - This can be done by following these simple instructions:
    1. From within Internet Explorer click on the Tools menu and then click on Options.
    2. Click once on the Security tab
    3. Click once on the Internet icon so it becomes highlighted.
    4. Click once on the Custom Level button.
    5. Change the Download signed ActiveX controls to Prompt
    6. Change the Download unsigned ActiveX controls to Disable
    7. Change the Initialize and script ActiveX controls not marked as safe to Disable
    8. Change the Installation of desktop items to Prompt
    9. Change the Launching programs and files in an IFRAME to Prompt
    10. Change the Navigate sub-frames across different domains to Prompt
    11. When all these settings have been made, click on the OK button.
    12. If it prompts you as to whether or not you want to save the settings, press the Yes button.
    13. Next press the Apply button and then the OK to exit the Internet Properties page.

    [*]Update your AntiVirus Software - It is imperative that you update your Antivirus software at least once a week

    (Even more if you wish). If you do not update your antivirus software then it will not be able to catch any of the new variants that may come out.

    [*]Use a Firewall - I can not stress how important it is that you use a Firewall on your computer.

    Without a firewall your computer is succeptible to being hacked and taken over.

    I am very serious about this and see it happen almost every day with my clients.

    Simply using a Firewall in its default configuration can lower your risk greatly.

    [*]Using a secure browser plugin M86 SecureBrowsing makes it safe to search, surf and socialize online. This free browser plug-in displays security icons next to links on search engines and social networking sites like Facebook, Twitter and LinkedIn, so you'll know which pages are safe and which ones to avoid.

    •Free browser plug-in for Internet Explorer and Firefox

    •Real-time safety ratings

    •Ideal for Facebook, Twitter and LinkedIn

    [*] JAVA Click this link and click on the Free JAVA Download

    [*]Visit Microsoft's Windows Update Site Frequently - It is important that you visit http://www.windowsupdate.com regularly.

    This will ensure your computer has always the latest security updates available installed on your computer.

    If there are new updates to install, install them immediately, reboot your computer, and revisit the site

    until there are no more critical updates.

Only run one Anti-Virus and Firewall program.

I would suggest you read:

PC Safety and Security--What Do I Need?.

How to Prevent Malware:

The full version of Malwarebytes' Anti-Malware could have helped protect your computer against this threat.

We use different ways of protecting your computer(s):

  • Dynamically Blocks Malware Sites & Servers
  • Malware Execution Prevention

Save yourself the hassle and get protected.

Link to post
Share on other sites

Guest
This topic is now closed to further replies.
  • Recently Browsing   0 members

    • No registered users viewing this page.
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.