Please help! Google redirect can't download/run any scans.

Status
Not open for further replies.
Hello, and thank you so much in advance. I have a fairly new computer with Windows XP SP3, which started acting buggy about a week ago. The first thing I noticed is that my google clicks (on Chrome) were being redirected by sites like "jollysearchengine" etc. I've tried downloading Spybot, MBAM, AVG, and AdAware.

Spybot and MBAM's executable files won't start--I get a windows error message saying I may not have permissions to open the file. (Spybot will update, however, on first run.) I've run as Ryan (administrator), and as plain "Administrator" in safe mode. I've tried various renaming approaches, but I still get the message. AdAware "can't connect to the service", and AVG wouldn't finish install.

I then tried a handful of system restores from 1, 2, and 3 weeks earlier, to no luck. (Some did funny things such as mangle my keyboard driver; I finally stuck to one where I was able to install AVG. But even then, after only one successful scan where malware was found, AVG would only run scans 1 second in length, of 0 files.) I've since installed Avira, which seems to detect different things constantly via annoying notifications. When I click "remove" on any of them, it seems like it's not doing anything other than hiding the notification.

My computer is also running much more slowly, and preventing me from effectively doing certain school assignments.

Thanks again,
Ryan
:D:
.
DDS (Ver_2011-08-26.01) - NTFSx86
Internet Explorer: 8.0.6001.18702
Run by Ryan at 15:07:41 on 2011-09-25
Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.3327.1732 [GMT -4:00]
.
.
============== Running Processes ===============
.
C:\PROGRA~1\AVG\AVG2012\avgrsx.exe
C:\Program Files\AVG\AVG2012\avgcsrvx.exe
"\\.\globalroot\Device\svchost.exe\svchost.exe"
C:\WINDOWS\system32\svchost -k DcomLaunch
svchost.exe
C:\WINDOWS\System32\svchost.exe -k netsvcs
svchost.exe
svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Avira\AntiVir Desktop\sched.exe
svchost.exe
C:\Program Files\Avira\AntiVir Desktop\avguard.exe
C:\Program Files\Avira\AntiVir Desktop\avshadow.exe
C:\Program Files\AVG\AVG2012\avgwdsvc.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\UnlockerAssistant.exe
C:\WINDOWS\RTHDCPL.EXE
C:\Program Files\Seagate\DiscWizard\DiscWizardMonitor.exe
C:\Program Files\Seagate\DiscWizard\TimounterMonitor.exe
C:\Program Files\Common Files\Seagate\Schedule2\schedhlp.exe
C:\WINDOWS\system32\svchost.exe -k imgsvc
C:\Program Files\Linksys Wireless-G USB Wireless Network Monitor\InfoMyCa.exe
C:\Program Files\Common Files\Adobe\ARM\1.0\AdobeARM.exe
C:\Program Files\AVG\AVG2012\avgnsx.exe
C:\Program Files\AVG\AVG2012\avgemcx.exe
C:\Program Files\AVG Secure Search\vprot.exe
C:\Program Files\Avira\AntiVir Desktop\avgnt.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Hewlett-Packard\Digital Imaging\bin\hpobnz08.exe
C:\Program Files\Hewlett-Packard\Digital Imaging\bin\hpotdd01.exe
C:\Program Files\Hewlett-Packard\Digital Imaging\bin\hpoevm08.exe
C:\Program Files\Hewlett-Packard\Digital Imaging\Bin\hpoSTS08.exe
C:\Program Files\ATI Technologies\ATI.ACE\Core-Static\MOM.exe
C:\Program Files\ATI Technologies\ATI.ACE\Core-Static\ccc.exe
C:\WINDOWS\system32\dllhost.exe
C:\Program Files\AVG\AVG2012\avgui.exe
C:\WINDOWS\system32\calc.exe
C:\Program Files\Avira\AntiVir Desktop\update.exe
C:\WINDOWS\system32\NOTEPAD.EXE
C:\WINDOWS\system32\NOTEPAD.EXE
C:\Program Files\iTunes\iTunes.exe
C:\Program Files\Common Files\Apple\Mobile Device Support\AppleMobileDeviceHelper.exe
C:\Program Files\Common Files\Apple\Apple Application Support\distnoted.exe
C:\Program Files\Vuze\Azureus.exe
C:\WINDOWS\System32\svchost.exe -k HTTPFilter
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Internet Explorer\iexplore.exe
.
============== Pseudo HJT Report ===============
.
uStart Page = hxxp://www.google.com/
uSearch Page = hxxp://www.google.com/
uDefault_Search_URL = hxxp://www.google.com/
uDefault_Page_URL = hxxp://www.google.com/
uInternet Settings,ProxyOverride = *.local
uURLSearchHooks: Vuze Remote Toolbar: {ba14329e-9550-4989-b3f2-9732e92d17cc} - c:\program files\vuze_remote\prxtbVuze.dll
mWinlogon: SfcDisable=-99 (0xffffff9d)
BHO: Adobe PDF Link Helper: {18df081c-e8ad-4283-a596-fa578c2ebdc3} - c:\program files\common files\adobe\acrobat\activex\AcroIEHelperShim.dll
BHO: Conduit Engine: {30f9b915-b755-4826-820b-08fba6bd249d} - c:\program files\conduitengine\prxConduitEngine.dll
BHO: AVG Safe Search: {3ca2f312-6f6e-4b53-a66e-4e65e497c8c0} - c:\program files\avg\avg2012\avgssie.dll
BHO: AVG Security Toolbar: {95b7759c-8c7f-4bf1-b163-73684a933233} - c:\program files\avg secure search\8.0.0.34\AVG Secure Search_toolbar.dll
BHO: Vuze Remote Toolbar: {ba14329e-9550-4989-b3f2-9732e92d17cc} - c:\program files\vuze_remote\prxtbVuze.dll
BHO: Java(tm) Plug-In 2 SSV Helper: {dbc80044-a445-435b-bc74-9c25c1c588a9} - c:\program files\java\jre6\bin\jp2ssv.dll
TB: Vuze Remote Toolbar: {ba14329e-9550-4989-b3f2-9732e92d17cc} - c:\program files\vuze_remote\prxtbVuze.dll
TB: Conduit Engine: {30f9b915-b755-4826-820b-08fba6bd249d} - c:\program files\conduitengine\prxConduitEngine.dll
TB: AVG Security Toolbar: {95b7759c-8c7f-4bf1-b163-73684a933233} - c:\program files\avg secure search\8.0.0.34\AVG Secure Search_toolbar.dll
{e7df6bff-55a5-4eb7-a673-4ed3e9456d39}
uRun: [ctfmon.exe] c:\windows\system32\ctfmon.exe
uRun: [Google Update] "c:\documents and settings\ryan\local settings\application data\google\update\GoogleUpdate.exe" /c
uRun: [DAEMON Tools Pro Agent] "c:\program files\daemon tools pro\DTAgent.exe" -autorun
mRun: [UnlockerAssistant] "c:\windows\system32\UnlockerAssistant.exe"
mRun: [StartCCC] "c:\program files\ati technologies\ati.ace\core-static\CLIStart.exe" MSRun
mRun: [RTHDCPL] RTHDCPL.EXE
mRun: [NortonOnlineBackup] c:\program files\symantec\norton online backup\NOBuClient.exe
mRun: [DiscWizardMonitor.exe] c:\program files\seagate\discwizard\DiscWizardMonitor.exe
mRun: [AcronisTimounterMonitor] c:\program files\seagate\discwizard\TimounterMonitor.exe
mRun: [Seagate Scheduler2 Service] "c:\program files\common files\seagate\schedule2\schedhlp.exe"
mRun: [WUSB54Gv4] c:\program files\linksys wireless-g usb wireless network monitor\InvokeSvc3.exe
mRun: [Adobe Reader Speed Launcher] "c:\program files\adobe\reader 10.0\reader\Reader_sl.exe"
mRun: [Adobe ARM] "c:\program files\common files\adobe\arm\1.0\AdobeARM.exe"
mRun: [QuickTime Task] "c:\program files\quicktime\qttask.exe" -atboottime
mRun: [iTunesHelper] "c:\program files\itunes\iTunesHelper.exe"
mRun: [AVG_TRAY] "c:\program files\avg\avg2012\avgtray.exe"
mRun: [vProt] "c:\program files\avg secure search\vprot.exe"
mRun: [avgnt] "c:\program files\avira\antivir desktop\avgnt.exe" /min
dRun: [ctfmon.exe] ctfmon.exe
dRun: [IDMan] c:\program files\internet download manager\IDMan.exe /onboot
dRunOnce: [_nltide_3] rundll32 advpack.dll,LaunchINFSectionEx nLite.inf,C,,4,N
StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\hppsc2~1.lnk - c:\program files\hewlett-packard\digital imaging\bin\hpobnz08.exe
StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\hpoddt~1.lnk - c:\program files\hewlett-packard\digital imaging\bin\hpotdd01.exe
uPolicies-explorer: ForceClassicControlPanel = 1 (0x1)
uPolicies-explorer: NoResolveTrack = 1 (0x1)
uPolicies-explorer: NoInstrumentation = 1 (0x1)
uPolicies-explorer: NoRecentDocsNetHood = 1 (0x1)
uPolicies-explorer: NoDesktopCleanupWizard = 1 (0x1)
mPolicies-explorer: NoDesktopCleanupWizard = 1 (0x1)
dPolicies-explorer: ForceClassicControlPanel = 1 (0x1)
dPolicies-explorer: NoResolveTrack = 1 (0x1)
dPolicies-explorer: NoInstrumentation = 1 (0x1)
dPolicies-explorer: NoRecentDocsNetHood = 1 (0x1)
dPolicies-explorer: NoDesktopCleanupWizard = 1 (0x1)
IE: {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe
LSP: mswsock.dll
DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_25-windows-i586.cab
DPF: {CAFEEFAC-0016-0000-0025-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_25-windows-i586.cab
DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_25-windows-i586.cab
TCP: DhcpNameServer = 192.168.1.1 71.252.0.12
TCP: Interfaces\{2A5235AD-192B-435F-8916-D490017C23D3} : DhcpNameServer = 192.168.1.1 71.252.0.12
Handler: linkscanner - {F274614C-63F8-47D5-A4D1-FBDDE494F8D1} - c:\program files\avg\avg2012\avgpp.dll
Notify: AtiExtEvent - Ati2evxx.dll
SSODL: WPDShServiceObj - {AAA288BA-9A4C-45B0-95D7-94D524869DB5} - c:\windows\system32\WPDShServiceObj.dll
SecurityProviders: schannel.dll, credssp.dll, digest.dll
LSA: Authentication Packages = msv1_0 relog_ap
.
============= SERVICES / DRIVERS ===============
.
R0 AVGIDSEH;AVGIDSEH;c:\windows\system32\drivers\AVGIDSEH.sys [2011-7-11 23120]
R0 Avgrkx86;AVG Anti-Rootkit Driver;c:\windows\system32\drivers\avgrkx86.sys [2011-7-11 32464]
R1 avgio;avgio;c:\program files\avira\antivir desktop\avgio.sys [2011-9-20 11608]
R1 Avgldx86;AVG AVI Loader Driver;c:\windows\system32\drivers\avgldx86.sys [2011-7-11 229840]
R1 Avgmfx86;AVG Mini-Filter Resident Anti-Virus Shield;c:\windows\system32\drivers\avgmfx86.sys [2011-8-8 40016]
R1 Avgtdix;AVG TDI Driver;c:\windows\system32\drivers\avgtdix.sys [2011-7-11 295248]
R2 AntiVirSchedulerService;Avira AntiVir Scheduler;c:\program files\avira\antivir desktop\sched.exe [2011-9-20 136360]
R2 AntiVirService;Avira AntiVir Guard;c:\program files\avira\antivir desktop\avguard.exe [2011-9-20 269480]
R2 avgntflt;avgntflt;c:\windows\system32\drivers\avgntflt.sys [2011-9-20 66616]
R2 avgwd;AVG WatchDog;c:\program files\avg\avg2012\avgwdsvc.exe [2011-8-2 192776]
R2 MSSQL$BWDATOOLSET;SQL Server (BWDATOOLSET);c:\program files\daodb\mssql.1\mssql\binn\sqlservr.exe [2010-12-10 29293408]
R3 AVGIDSDriver;AVGIDSDriver;c:\windows\system32\drivers\AVGIDSDriver.sys [2011-7-11 134608]
R3 AVGIDSFilter;AVGIDSFilter;c:\windows\system32\drivers\AVGIDSFilter.sys [2011-7-11 24272]
R3 AVGIDSShim;AVGIDSShim;c:\windows\system32\drivers\AVGIDSShim.sys [2011-7-11 16720]
R3 usbfilter;AMD USB Filter Driver;c:\windows\system32\drivers\usbfilter.sys [2011-6-1 30392]
S2 AODService;AODService;c:\program files\amd\overdrive\AODAssist.exe [2010-4-22 136616]
S2 AVGIDSAgent;AVGIDSAgent;c:\program files\avg\avg2012\AVGIDSAgent.exe [2011-9-1 5265248]
S2 NOBU;Norton Online Backup;c:\program files\symantec\norton online backup\nobuagent.exe service --> c:\program files\symantec\norton online backup\NOBuAgent.exe service [?]
S2 SgtSch2Svc;Seagate Scheduler2 Service;c:\program files\common files\seagate\schedule2\schedul2.exe [2009-10-16 431456]
S3 Ambfilt;Ambfilt;c:\windows\system32\drivers\Ambfilt.sys [2011-6-1 1691480]
S3 AtiHDAudioService;ATI Function Driver for HD Audio Service;c:\windows\system32\drivers\AtihdXP3.sys [2011-5-13 101904]
S3 DAUpdaterSvc;Dragon Age: Origins - Content Updater;c:\program files\dragon age\bin_ship\daupdatersvc.service.exe [2009-12-15 25832]
S3 MSICDSetup;MSICDSetup;\??\e:\cdriver.sys --> e:\CDriver.sys [?]
S3 RTL8187B;TRENDnet TEW-424UB 54M USB Dongle;c:\windows\system32\drivers\RTL8187B.sys [2011-8-22 264576]
.
=============== Created Last 30 ================
.
2011-09-20 06:46:38 -------- d-----w- c:\windows\system32\NtmsData
2011-09-20 06:34:37 -------- d-----w- c:\documents and settings\ryan\application data\Avira
2011-09-20 06:24:37 66616 ----a-w- c:\windows\system32\drivers\avgntflt.sys
2011-09-20 06:24:37 -------- d-----w- c:\program files\Avira
2011-09-20 06:24:37 -------- d-----w- c:\documents and settings\all users\application data\Avira
2011-09-20 06:03:32 -------- d-----w- c:\program files\Szzzzz
2011-09-20 05:58:33 -------- d-----w- c:\program files\AVG Secure Search
2011-09-20 05:38:46 -------- d-----w- c:\windows\system32\wbem\repository\FS
2011-09-20 05:38:46 -------- d-----w- c:\windows\system32\wbem\Repository
2011-09-20 04:16:10 19072 ----a-w- c:\windows\system32\drivers\PS2.sys
2011-09-20 04:16:09 -------- d-----w- C:\HP
2011-09-20 03:34:11 -------- d-----w- c:\documents and settings\ryan\application data\AVG2012
2011-09-20 03:33:24 -------- d-----w- c:\documents and settings\ryan\application data\AVG Secure Search
2011-09-20 03:33:21 -------- d-----w- c:\program files\common files\AVG Secure Search
2011-09-20 03:32:58 -------- d-----w- c:\windows\system32\drivers\AVG
2011-09-20 03:32:58 -------- d-----w- c:\documents and settings\all users\application data\AVG2012
2011-09-20 03:32:40 -------- d-----w- c:\program files\AVG
2011-09-20 00:40:45 48016 --sha-w- c:\windows\system32\c_84883.nl_
2011-09-20 00:39:40 -------- d-----w- c:\documents and settings\ryan\application data\Malwarebytes
2011-09-20 00:39:33 -------- d--h--w- c:\windows\PIF
2011-09-19 23:56:47 41272 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2011-09-19 23:56:35 -------- d-----w- c:\documents and settings\all users\application data\Malwarebytes
2011-09-19 23:56:32 22216 ----a-w- c:\windows\system32\drivers\mbam.sys
2011-09-19 22:42:14 -------- d--h--w- c:\documents and settings\all users\application data\Common Files
2011-09-19 22:40:07 -------- d-----w- c:\documents and settings\all users\application data\MFAData
2011-09-19 22:38:52 -------- d-----w- c:\documents and settings\all users\application data\Spybot - Search & Destroy
2011-09-19 22:19:54 64512 ----a-w- c:\windows\system32\drivers\Lbd.sys
2011-09-19 22:19:49 -------- d-----w- c:\program files\Lavasoft
2011-09-16 01:06:07 -------- d-----w- c:\program files\TabIt
2011-09-15 08:42:48 -------- d-----w- c:\documents and settings\ryan\.bitrock
2011-09-12 06:37:19 153088 ----a-w- c:\windows\system32\xvid.ax
2011-09-12 06:37:18 -------- d-----w- c:\program files\Xvid
2011-09-12 06:30:52 -------- d-----w- c:\program files\common files\xing shared
2011-09-12 04:57:56 60032 ----a-w- c:\windows\system32\drivers\USBAUDIO.sys
2011-09-07 14:18:31 599552 ------w- c:\windows\system32\dllcache\crypt32.dll
2011-09-05 17:04:56 183696 ----a-w- c:\program files\internet explorer\plugins\nppdf32.dll
2011-08-27 00:05:00 -------- d-----w- C:\PFiles
.
==================== Find3M ====================
.
2011-09-09 09:11:14 599552 ----a-w- c:\windows\system32\crypt32.dll
2011-07-17 23:08:56 17408 ----a-w- c:\windows\system32\drivers\1306959348.sys
2011-07-15 13:29:35 457856 ----a-w- c:\windows\system32\drivers\mrxsmb.sys
2011-07-11 05:14:38 295248 ----a-w- c:\windows\system32\drivers\avgtdix.sys
2011-07-11 05:14:30 16720 ----a-w- c:\windows\system32\drivers\AVGIDSShim.sys
2011-07-11 05:14:28 24272 ----a-w- c:\windows\system32\drivers\AVGIDSFilter.sys
2011-07-11 05:14:28 23120 ----a-w- c:\windows\system32\drivers\AVGIDSEH.sys
2011-07-11 05:14:26 134608 ----a-w- c:\windows\system32\drivers\AVGIDSDriver.sys
2011-07-11 05:13:46 229840 ----a-w- c:\windows\system32\drivers\avgldx86.sys
2011-07-11 05:13:42 32464 ----a-w- c:\windows\system32\drivers\avgrkx86.sys
2011-07-08 14:02:00 10496 ----a-w- c:\windows\system32\drivers\ndistapi.sys
.
============= FINISH: 15:08:22.79 ===============
 
:snwelcome:


Please read Before You Post
While best efforts are made to assist in removing infections safely, unexpected stuff can happen. It is advisable that you back up your important data before starting any clean up procedure. Neither Safer Networking Forums nor the Analyst providing the advice may be held responsible for any loss.

Until we deem your system clean I am going to ask you not to install or uninstall any software or hardware except for the programs we may run.


You have two Antivirus programs installed, AVG and Avira, this will severely hamper system performance, you need to uninstall one via Programs and Features in the Control Panel. If it gives you problems uninstalling you can uninstall it with this program, you can just use the free version

http://www.revouninstaller.com/revo_uninstaller_free_download.html




Then run this scan

Download aswMBR.exe ( 511KB ) to your desktop.

Double click the aswMBR.exe to run it

Click the "Scan" button to start scan
aswMBR1.png


On completion of the scan click save log, save it to your desktop and post in your next reply
aswMBR2.png
 
Hi Ken,

I've uninstalled Avira. I downloaded aswMBR.exe which then prompted me for an install of latest definitions from AVAST, so I went ahead. This added some extra options to the scan. I chose quick scan.

I don't think the scan completed, it seems to crash every time. I was able to save a log in the middle of the scan, up to the last entry I could glance at.

(Side note, the program will only run immediately after I download it. Second attempts will give me the windows permissions message I described.)


aswMBR version 0.9.8.986 Copyright(c) 2011 AVAST Software
Run date: 2011-09-28 01:51:27
-----------------------------
01:51:27.015 OS Version: Windows 5.1.2600 Service Pack 3
01:51:27.015 Number of processors: 2 586 0x603
01:51:27.015 ComputerName: RIZZLEBOT UserName: Ryan
01:51:32.515 Initialize success
01:51:35.765 AVAST engine defs: 11092701
01:51:43.796 Disk 0 (boot) \Device\Harddisk0\DR0 -> \Device\Ide\IdeDeviceP0T0L0-4
01:51:43.796 Disk 0 Vendor: ST31000528AS CC3E Size: 953869MB BusType: 3
01:51:43.796 Disk 1 \Device\Harddisk1\DR1 -> \Device\Ide\IdeDeviceP0T1L0-c
01:51:43.796 Disk 1 Vendor: Hitachi_HDT725040VLA360 V5COA58A Size: 381554MB BusType: 3
01:51:45.843 Disk 0 MBR read successfully
01:51:45.843 Disk 0 MBR scan
01:51:45.921 Disk 0 Windows XP default MBR code
01:51:45.921 Disk 0 scanning sectors +1953504000
01:51:46.030 Disk 0 scanning C:\WINDOWS\system32\drivers
01:51:46.296 File: C:\WINDOWS\system32\drivers\1306959348.sys **INFECTED** Win32:Alureon-AMS [Trj]
01:51:50.624 File: C:\WINDOWS\system32\drivers\i8042prt.sys **INFECTED** Win32:Alureon-AJI [Rtk]
01:51:58.140 Disk 0 MBR has been saved successfully to "C:\Documents and Settings\Ryan\Desktop\MBR.dat"
01:51:58.140 The log file has been saved successfully to "C:\Documents and Settings\Ryan\Desktop\aswMBR.txt"
 
Hi,

It ran just fine but you have some nasty stuff going on. We need to run Combofix, if it wont run you will have to uninstall AVG temporarily, but lets try just disabling it



Download ComboFix from one of these locations:

Link 1
Link 2


* IMPORTANT !!! Save ComboFix.exe to your Desktop


  • Disable your AntiVirus and AntiSpyware applications, usually via a right click on the System Tray icon. They may otherwise interfere with our tools
  • See this Link for programs that need to be disabled and instruction on how to disable them.
  • Remember to re-enable them when we're done.

  • Double click on ComboFix.exe & follow the prompts.

  • As part of it's process, ComboFix will check to see if the Microsoft Windows Recovery Console is installed. With malware infections being as they are today, it's strongly recommended to have this pre-installed on your machine before doing any malware removal. It will allow you to boot up into a special recovery/repair mode that will allow us to more easily help you should your computer have a problem after an attempted removal of malware.

  • Follow the prompts to allow ComboFix to download and install the Microsoft Windows Recovery Console, and when prompted, agree to the End-User License Agreement to install the Microsoft Windows Recovery Console.

**Please note: If the Microsoft Windows Recovery Console is already installed, ComboFix will continue it's malware removal procedures.


RC1.png


Once the Microsoft Windows Recovery Console is installed using ComboFix, you should see the following message:
RC2-1.png

Click on Yes, to continue scanning for malware.

When finished, it shall produce a log for you. Please include the C:\ComboFix.txt in your next reply.

*If there is no internet connection when Combofix has completely finished then restart your computer to restore back the connections.
 
Hey,

I uninstalled AVG. Combofix ran after install, and told me I have the ZeroAccess rootkit. Yikes. It then restarted my computer, and tried to run on startup. After a half hour of waiting, I closed it. Now, it won't run. I'll keep trying though. I don't think a log was saved anywhere.

Thanks,
Ryan
 
Yep, thats what I figured, Combofix may have removed it.

Run aswMBR again and post a new log, then drag Combofix to the trash and lets grab a new copy but do it this way


Download Combofix from any of the links below. You must rename it before saving it. Save it to your desktop.

Link 1
Link 2


CF_download_FF.gif



CF_download_rename.gif


* IMPORTANT !!! Save ComboFix.exe to your Desktop


  • Disable your AntiVirus and AntiSpyware applications, usually via a right click on the System Tray icon. They may otherwise interfere with our tools
  • See this Link for programs that need to be disabled and instruction on how to disable them.
  • Remember to re-enable them when we're done.

  • Double click on ComboFix.exe & follow the prompts.

  • As part of it's process, ComboFix will check to see if the Microsoft Windows Recovery Console is installed. With malware infections being as they are today, it's strongly recommended to have this pre-installed on your machine before doing any malware removal. It will allow you to boot up into a special recovery/repair mode that will allow us to more easily help you should your computer have a problem after an attempted removal of malware.

  • Follow the prompts to allow ComboFix to download and install the Microsoft Windows Recovery Console, and when prompted, agree to the End-User License Agreement to install the Microsoft Windows Recovery Console.

**Please note: If the Microsoft Windows Recovery Console is already installed, ComboFix will continue it's malware removal procedures.


RC1.png


Once the Microsoft Windows Recovery Console is installed using ComboFix, you should see the following message:
RC2-1.png

Click on Yes, to continue scanning for malware.

When finished, it shall produce a log for you. Please include the C:\ComboFix.txt in your next reply.

*If there is no internet connection when Combofix has completely finished then restart your computer to restore back the connections.
 
Hey Ken,

aswMBR finished scanning this time. Should I have it rewrite the MBR? I won't run Combofix until I know what to do with this.

Thanks again for your time.


aswMBR version 0.9.8.986 Copyright(c) 2011 AVAST Software
Run date: 2011-09-28 14:28:51
-----------------------------
14:28:51.671 OS Version: Windows 5.1.2600 Service Pack 3
14:28:51.671 Number of processors: 2 586 0x603
14:28:51.671 ComputerName: RIZZLEBOT UserName: Ryan
14:28:54.500 Initialize success
14:29:01.453 AVAST engine defs: 11092701
14:29:03.765 Disk 0 (boot) \Device\Harddisk0\DR0 -> \Device\Ide\IdeDeviceP0T0L0-4
14:29:03.765 Disk 0 Vendor: ST31000528AS CC3E Size: 953869MB BusType: 3
14:29:03.765 Disk 1 \Device\Harddisk1\DR1 -> \Device\Ide\IdeDeviceP0T1L0-c
14:29:03.765 Disk 1 Vendor: Hitachi_HDT725040VLA360 V5COA58A Size: 381554MB BusType: 3
14:29:05.781 Disk 0 MBR read successfully
14:29:05.781 Disk 0 MBR scan
14:29:05.796 Disk 0 Windows XP default MBR code
14:29:05.796 Disk 0 scanning sectors +1953504000
14:29:05.843 Disk 0 scanning C:\WINDOWS\system32\drivers
14:29:06.015 File: C:\WINDOWS\system32\drivers\1306959348.sys **INFECTED** Win32:Alureon-AMS [Trj]
14:29:14.718 Service scanning
14:29:14.890 Service 1306959348 C:\WINDOWS\System32\Drivers\1306959348.sys **LOCKED** 5
14:29:14.968 Service sptd C:\WINDOWS\System32\Drivers\sptd.sys **LOCKED** 32
14:29:15.484 Modules scanning
14:29:25.140 Disk 0 trace - called modules:
14:29:25.156 ntoskrnl.exe CLASSPNP.SYS disk.sys ACPI.sys hal.dll atapi.sys sptd.sys pciide.sys PCIIDEX.SYS
14:29:25.171 1 nt!IofCallDriver -> \Device\Harddisk0\DR0[0x8a2aaab8]
14:29:25.171 3 CLASSPNP.SYS[f7637fd7] -> nt!IofCallDriver -> \Device\00000075[0x8a2caf18]
14:29:25.171 5 ACPI.sys[f7498620] -> nt!IofCallDriver -> \Device\Ide\IdeDeviceP0T0L0-4[0x8a2bd940]
14:29:40.953 AVAST engine scan C:\WINDOWS
14:30:02.250 AVAST engine scan C:\WINDOWS\system32
14:30:03.875 File: C:\WINDOWS\system32\ati2evxx.exe **INFECTED** Win32:Patched-WQ [Trj]
14:30:21.625 File: C:\WINDOWS\system32\HPZipm12.exe **INFECTED** Win32:Patched-WQ [Trj]
14:30:34.281 File: C:\WINDOWS\system32\msiexec.exe **INFECTED** Win32:Patched-WQ [Trj]
14:30:59.000 File: C:\WINDOWS\system32\wuauclt.exe **INFECTED** Win32:Patched-WQ [Trj]
14:31:32.562 AVAST engine scan C:\WINDOWS\system32\drivers
14:31:32.703 File: C:\WINDOWS\system32\drivers\1306959348.sys **INFECTED** Win32:Alureon-AMS [Trj]
14:32:13.453 AVAST engine scan C:\Documents and Settings\Ryan
14:37:00.578 Disk 0 MBR has been saved successfully to "C:\Documents and Settings\Ryan\Desktop\MBR.dat"
14:37:00.578 The log file has been saved successfully to "C:\Documents and Settings\Ryan\Desktop\aswMBR.txt"
14:39:49.281 AVAST engine scan C:\Documents and Settings\All Users
14:40:38.078 Scan finished successfully
14:40:43.734 Disk 0 MBR has been saved successfully to "C:\Documents and Settings\Ryan\Desktop\MBR.dat"
14:40:43.734 The log file has been saved successfully to "C:\Documents and Settings\Ryan\Desktop\aswMBR.txt"
 
No , dont fix the MBR, your still infected with Zero Access, run Combofix, it i will remove it. If CF gives you problems running, try running it in Safemode


Safemode with Network Support

To Enter Safemode
  • Go to Start> Shut off your Computer> Restart
  • As the computer starts to boot-up, Tap the F8 KEY somewhat rapidly,
    this will bring up a menu.
  • Use the Up and Down Arrow Keys to scroll up to Safemode with Networking
  • Then press the Enter Key on your Keyboard
Tutorial if you need it How to boot into Safemode
 
:D:

Ran it in safe mode, looks like it did something. It froze on startup during "Preparing Log Report... Do not run any programs..." but I was able to find this:


ComboFix 11-09-28.03 - Administrator 09/28/2011 15:13:48.1.2 - x86 NETWORK
Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.3327.3068 [GMT -4:00]
Running from: C:\Documents and Settings\Administrator.RIZZLEBOT\Desktop\Combo-Fix.exe


((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))


C:\Documents and Settings\Guest\Application Data\IDM\idmmzcc3
C:\Documents and Settings\Guest\Application Data\IDM\idmmzcc3\chrome.manifest
C:\Documents and Settings\Guest\Application Data\IDM\idmmzcc3\chrome\idmmzcc.jar
C:\Documents and Settings\Guest\Application Data\IDM\idmmzcc3\components\idmmzcc.dll
C:\Documents and Settings\Guest\Application Data\IDM\idmmzcc3\components\iIDMMzCC.xpt
C:\Documents and Settings\Guest\Application Data\IDM\idmmzcc3\components2\idmhelper.js
C:\Documents and Settings\Guest\Application Data\IDM\idmmzcc3\components2\idmhelper2.js
C:\Documents and Settings\Guest\Application Data\IDM\idmmzcc3\components2\idmmzcc.dll
C:\Documents and Settings\Guest\Application Data\IDM\idmmzcc3\components2\idmmzcc64.dll
C:\Documents and Settings\Guest\Application Data\IDM\idmmzcc3\components2\iIDMHelper.xpt
C:\Documents and Settings\Guest\Application Data\IDM\idmmzcc3\components2\iIDMHelper2.xpt
C:\Documents and Settings\Guest\Application Data\IDM\idmmzcc3\components2\iIDMMzCC.xpt
C:\Documents and Settings\Guest\Application Data\IDM\idmmzcc3\install.js
C:\Documents and Settings\Guest\Application Data\IDM\idmmzcc3\install.rdf
C:\Documents and Settings\Guest\Application Data\IDM\idmmzcc3\META-INF\manifest.mf
C:\Documents and Settings\Guest\Application Data\IDM\idmmzcc3\META-INF\zigbert.rsa
C:\Documents and Settings\Guest\Application Data\IDM\idmmzcc3\META-INF\zigbert.sf
C:\Install.exe
C:\Program Files\Toolbar
C:\WINDOWS\{2521BB91-29B1-4d7e-9137-AC9875D77735}
C:\WINDOWS\system\VB40032.DLL
C:\WINDOWS\system32\comct332.ocx
C:\WINDOWS\system32\d3d9caps.dat
C:\WINDOWS\system32\drivers\1306959348.sys

Infected copy of C:\WINDOWS\system32\drivers\i8042prt.sys was found and disinfected
Restored copy from - The cat found it :)
Infected copy of C:\WINDOWS\system32\msiexec.exe was found and disinfected
Restored copy from - C:\System Volume Information\_restore{F3B8BC6E-AF50-413E-B41E-200C885DC238}\RP107\A0012990.exe

Infected copy of C:\WINDOWS\system32\wuauclt.exe was found and disinfected
Restored copy from - C:\System Volume Information\_restore{F3B8BC6E-AF50-413E-B41E-200C885DC238}\RP103\A0011287.exe

Infected copy of C:\Program Files\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe was found and disinfected
Restored copy from - C:\System Volume Information\_restore{F3B8BC6E-AF50-413E-B41E-200C885DC238}\RP107\A0012886.exe

Infected copy of c:\windows\system32\Ati2evxx.exe was found and disinfected
Restored copy from - C:\WINDOWS\system32\ReinstallBackups\0001\DriverFiles\B_95628\ati2evxx.exe

Infected copy of C:\Program Files\AVG\AVG2012\avgwdsvc.exe was found and disinfected
Restored copy from - C:\System Volume Information\_restore{F3B8BC6E-AF50-413E-B41E-200C885DC238}\RP123\A0014467.exe

Infected copy of C:\Program Files\Bonjour\mDNSResponder.exe was found and disinfected
Restored copy from - C:\System Volume Information\_restore{F3B8BC6E-AF50-413E-B41E-200C885DC238}\RP107\A0012887.exe

Infected copy of C:\Program Files\Symantec\Norton Online Backup\NOBuAgent.exe was found and disinfected
Restored copy from - C:\System Volume Information\_restore{F3B8BC6E-AF50-413E-B41E-200C885DC238}\RP107\A0012888.exe

Infected copy of C:\WINDOWS\system32\HPZipm12.exe was found and disinfected
Restored copy from - C:\System Volume Information\_restore{F3B8BC6E-AF50-413E-B41E-200C885DC238}\RP107\A0012979.exe

Infected copy of C:\Program Files\Common Files\Seagate\Schedule2\schedul2.exe was found and disinfected
Restored copy from - C:\System Volume Information\_restore{F3B8BC6E-AF50-413E-B41E-200C885DC238}\RP107\A0012889.exe

Infected copy of C:\Program Files\Microsoft SQL Server\90\Shared\sqlwriter.exe was found and disinfected
Restored copy from - C:\System Volume Information\_restore{F3B8BC6E-AF50-413E-B41E-200C885DC238}\RP107\A0012890.exe

Infected copy of C:\Program Files\Linksys Wireless-G USB Wireless Network Monitor\WLService.exe was found and disinfected
Restored copy from - C:\System Volume Information\_restore{F3B8BC6E-AF50-413E-B41E-200C885DC238}\RP99\A0010442.exe

Infected copy of C:\Program Files\Linksys Wireless-G USB Wireless Network Monitor\WLService.exe was found and disinfected
Restored copy from - C:\System Volume Information\_restore{F3B8BC6E-AF50-413E-B41E-200C885DC238}\RP99\A0010442.exe

((((((((((((((((((((((((((((((((((((((( Drivers/Services )))))))))))))))))))))))))))))))))))))))))))))))))
.

-------\Service_87c5b98f
-------\Service_1306959348


((((((((((((((((((((((((( Files Created from 2011-08-28 to 2011-09-28 )))))))))))))))))))))))))))))))


2011-09-28 19:19:05 . 2011-09-28 19:19:05 -------- d-----w- C:\WINDOWS\system32\xircom
2011-09-28 19:19:05 . 2011-09-28 19:19:05 -------- d-----w- C:\WINDOWS\system32\wbem\snmp
2011-09-28 19:19:05 . 2011-09-28 19:19:05 -------- d-----w- C:\WINDOWS\srchasst
2011-09-28 19:19:05 . 2011-09-28 19:19:05 -------- d-----w- C:\Program Files\microsoft frontpage
2011-09-28 15:23:35 . 2008-04-14 12:00:00 52480 ----a-w- C:\WINDOWS\system32\drivers\i8042prt.sys
2011-09-28 05:43:49 . 2011-09-28 05:43:49 -------- d-----w- C:\Documents and Settings\Ryan\Local Settings\Application Data\VS Revo Group
2011-09-28 05:43:45 . 2009-12-30 15:20:56 27064 ----a-w- C:\WINDOWS\system32\drivers\revoflt.sys
2011-09-28 05:43:44 . 2011-09-28 05:43:44 -------- d-----w- C:\Program Files\VS Revo Group
2011-09-27 03:58:43 . 2011-09-27 03:59:10 -------- d-----w- C:\Program Files\autoFlix
2011-09-25 21:52:50 . 2011-09-25 21:52:58 -------- d-----w- C:\Program Files\Spybot - Search & Destroy
2011-09-20 07:15:49 . 2011-09-20 07:16:07 -------- d-----w- C:\Program Files\ERUNT
2011-09-20 06:46:38 . 2011-09-20 06:47:22 -------- d-----w- C:\WINDOWS\system32\NtmsData
2011-09-20 06:03:32 . 2011-09-20 06:07:24 -------- d-----w- C:\Program Files\Szzzzz
2011-09-20 05:58:33 . 2011-09-20 05:58:37 -------- d-----w- C:\Program Files\AVG Secure Search
2011-09-20 05:38:46 . 2011-09-20 05:38:46 -------- d-----w- C:\WINDOWS\system32\wbem\Repository
2011-09-20 04:16:10 . 2005-12-12 21:27:00 19072 ----a-w- C:\WINDOWS\system32\drivers\PS2.sys
2011-09-20 04:16:09 . 2011-09-20 04:16:09 -------- d-----w- C:\HP
2011-09-20 03:56:06 . 2011-09-20 03:56:13 -------- d-----w- C:\Program Files\Common Files\Adobe
2011-09-20 03:34:11 . 2011-09-20 03:34:11 -------- d-----w- C:\Documents and Settings\Ryan\Application Data\AVG2012
2011-09-20 03:33:24 . 2011-09-20 03:33:24 -------- d-----w- C:\Documents and Settings\Ryan\Application Data\AVG Secure Search
2011-09-20 03:33:21 . 2011-09-20 03:33:22 -------- d-----w- C:\Program Files\Common Files\AVG Secure Search
2011-09-20 03:32:58 . 2011-09-27 13:25:02 -------- d-----w- C:\WINDOWS\system32\drivers\AVG
2011-09-20 03:32:58 . 2011-09-20 06:34:19 -------- d-----w- C:\Documents and Settings\All Users\Application Data\AVG2012
2011-09-20 03:32:40 . 2011-09-20 03:32:40 -------- d-----w- C:\Program Files\AVG
2011-09-20 00:40:45 . 2011-09-27 07:16:32 48016 --sha-w- C:\WINDOWS\system32\c_84883.nl_
2011-09-20 00:39:40 . 2011-09-20 00:39:40 -------- d-----w- C:\Documents and Settings\Ryan\Application Data\Malwarebytes
2011-09-20 00:39:33 . 2011-09-20 00:39:33 -------- d--h--w- C:\WINDOWS\PIF
2011-09-19 23:56:47 . 2011-09-19 23:56:54 41272 ----a-w- C:\WINDOWS\system32\drivers\mbamswissarmy.sys
2011-09-19 23:56:35 . 2011-09-19 23:56:35 -------- d-----w- C:\Documents and Settings\All Users\Application Data\Malwarebytes
2011-09-19 23:56:32 . 2011-08-31 21:00:50 22216 ----a-w- C:\WINDOWS\system32\drivers\mbam.sys
2011-09-19 23:01:32 . 2011-09-20 00:39:49 -------- d-----w- C:\Documents and Settings\Administrator
2011-09-19 22:42:14 . 2011-09-19 22:42:14 -------- d--h--w- C:\Documents and Settings\All Users\Application Data\Common Files
2011-09-19 22:40:07 . 2011-09-28 15:16:56 -------- d-----w- C:\Documents and Settings\All Users\Application Data\MFAData
2011-09-19 22:38:52 . 2011-09-25 21:52:50 -------- d-----w- C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy
2011-09-19 22:19:54 . 2011-08-18 19:25:12 64512 ----a-w- C:\WINDOWS\system32\drivers\Lbd.sys
2011-09-19 22:19:49 . 2011-09-19 22:19:52 -------- d-----w- C:\Documents and Settings\All Users\Application Data\Lavasoft
2011-09-19 22:19:49 . 2011-09-19 22:19:49 -------- d-----w- C:\Program Files\Lavasoft
2011-09-16 01:06:07 . 2011-09-20 00:39:16 -------- d-----w- C:\Program Files\TabIt
2011-09-15 08:42:48 . 2011-09-15 08:42:48 -------- d-----w- C:\Documents and Settings\Ryan\.bitrock
2011-09-12 08:31:36 . 2011-09-12 08:31:36 -------- d-----w- C:\WINDOWS\Sun
2011-09-12 06:37:19 . 2011-05-23 09:52:08 153088 ----a-w- C:\WINDOWS\system32\xvid.ax
2011-09-12 06:37:18 . 2011-09-15 08:43:19 -------- d-----w- C:\Program Files\Xvid
2011-09-12 06:30:52 . 2011-09-12 06:30:52 -------- d-----w- C:\Program Files\Common Files\xing shared
2011-09-12 06:30:36 . 2011-09-12 06:30:55 -------- d-----w- C:\Program Files\Real
2011-09-12 04:57:56 . 2008-04-14 04:15:14 60032 ----a-w- C:\WINDOWS\system32\drivers\USBAUDIO.sys
2011-09-07 14:18:31 . 2011-09-09 09:11:14 599552 ------w- C:\WINDOWS\system32\dllcache\crypt32.dll
2011-09-05 17:04:56 . 2011-09-05 17:04:56 183696 ----a-w- C:\Program Files\Internet Explorer\Plugins\nppdf32.dll
.


(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))

2011-09-09 09:11:14 . 2010-03-13 00:44:06 599552 ----a-w- C:\WINDOWS\system32\crypt32.dll
2011-08-08 10:08:58 . 2011-08-08 10:08:58 40016 ----a-w- C:\WINDOWS\system32\drivers\avgmfx86.sys
2011-07-15 13:29:35 . 2011-02-17 13:19:38 457856 ----a-w- C:\WINDOWS\system32\drivers\mrxsmb.sys
2011-07-11 05:14:38 . 2011-07-11 05:14:38 295248 ----a-w- C:\WINDOWS\system32\drivers\avgtdix.sys
2011-07-11 05:14:30 . 2011-07-11 05:14:30 16720 ----a-w- C:\WINDOWS\system32\drivers\AVGIDSShim.sys
2011-07-11 05:14:28 . 2011-07-11 05:14:28 24272 ----a-w- C:\WINDOWS\system32\drivers\AVGIDSFilter.sys
2011-07-11 05:14:28 . 2011-07-11 05:14:28 23120 ----a-w- C:\WINDOWS\system32\drivers\AVGIDSEH.sys
2011-07-11 05:14:26 . 2011-07-11 05:14:26 134608 ----a-w- C:\WINDOWS\system32\drivers\AVGIDSDriver.sys
2011-07-11 05:13:46 . 2011-07-11 05:13:46 229840 ----a-w- C:\WINDOWS\system32\drivers\avgldx86.sys
2011-07-11 05:13:42 . 2011-07-11 05:13:42 32464 ----a-w- C:\WINDOWS\system32\drivers\avgrkx86.sys
2011-07-08 14:02:00 . 2008-04-14 12:00:00 10496 ----a-w- C:\WINDOWS\system32\drivers\ndistapi.sys

Does this look complete?
 
Thats not the entire report, it can be found here
C:\ComboFix.txt

Just open it and go to EDIT> Select All...........EDIT> Copy and paste into this thread.

Combofix removed some nasty stuff a lot of your legit system and program files where infected





Please download Malwarebytes from Here or Here

  • Double-click mbam-setup.exe and follow the prompts to install the program.
  • At the end, be sure a checkmark is placed next to Update Malwarebytes' Anti-Malware and Launch Malwarebytes' Anti-Malware, then click Finish.
  • If an update is found, it will download and install the latest version.
  • Once the program has loaded, select Perform quick scan, then click Scan.
    MBAMCapture.jpg
  • When the scan is complete, click OK, then Show Results to view the results.
  • Be sure that everything is checked, and click Remove Selected .
  • When completed, a log will open in Notepad. Please save it to a convenient location and post the results.
  • Note: If you receive a notice that some of the items couldn't be removed, that they have been added to the delete on reboot list, please reboot.
Post the report please



Post the following, take as many replies as you need to post it all

1. Complete Combofix log
2. Malwarebytes log
 
No such file was ever written into C:\. I suppose I could run it again?

Here's MBAM


Malwarebytes' Anti-Malware 1.51.2.1300
www.malwarebytes.org

Database version: 7820

Windows 5.1.2600 Service Pack 3
Internet Explorer 8.0.6001.18702

9/28/2011 5:57:47 PM
mbam-log-2011-09-28 (17-57-47).txt

Scan type: Quick scan
Objects scanned: 215655
Time elapsed: 6 minute(s), 41 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 1

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
c:\documents and settings\Ryan\my documents\downloads\xvidsetup.exe (Adware.Agent) -> Quarantined and deleted successfully.
 
Thats fine. Let me ask you, is your system running any better ?

Run this free online virus scanner and post the log, then run aswMBR again and let me see the new log

This may take awhile which is fine, I wont be back online to late this evening


ESET Online Scanner
I'd like us to scan your machine with ESET OnlineScan

*Note
It is recommended to disable onboard antivirus program and antispyware programs while performing scans so there are no conflicts and it will speed up scan time.
Please don't go surfing while your resident protection is disabled!
Once the scan is finished remember to re-enable your antivirus along with your antispyware programs.



  1. Hold down Control and click on the following link to open ESET OnlineScan in a new window.
    ESET OnlineScan
  2. Click the
    esetOnline.png
    button.
  3. For alternate browsers only: (Microsoft Internet Explorer users can skip these steps)
    1. Click on
      esetSmartInstall.png
      to download the ESET Smart Installer. Save it to your desktop.
    2. Double click on the
      esetSmartInstallDesktopIcon.png
      icon on your desktop.
  4. Check
    esetAcceptTerms.png
  5. Click the
    esetStart.png
    button.
  6. Accept any security warnings from your browser.
  7. Check
    esetScanArchives.png
  8. Make sure that the option "Remove found threats" is Unchecked
  9. Push the Start button.
  10. ESET will then download updates for itself, install itself, and begin
    scanning your computer. Please be patient as this can take some time.
  11. When the scan completes, push
    esetListThreats.png
  12. Push
    esetExport.png
    , and save the file to your desktop using a unique name, such as
    ESETScan. Include the contents of this report in your next reply.
  13. Push the
    esetBack.png
    button.
  14. Push
    esetFinish.png
Please make sure you include the following items in your next post:
The log that was produced after running ESET Online Scanner.
 
I suppose it is! The browser has sped up; no more redirects. I jumped the gun and tried to run Spybot, but still--permissions message. So I uninstalled it. I'll post the logs asap, and wait before I reinstall any other programs.
 
ESET: (I did not set it to fix these)
C:\Documents and Settings\Ryan\My Documents\Downloads\Console.Classix.keymaker.by.CORE.zip a variant of Win32/Kryptik.QND trojan
C:\Documents and Settings\Ryan\My Documents\Downloads\TabIt_patch (1).zip a variant of Win32/Kryptik.SWG trojan
C:\Documents and Settings\Ryan\My Documents\Downloads\TabIt_patch.zip a variant of Win32/Kryptik.SWG trojan
C:\Program Files\AVG\AVG2012\avgnsx.exe Win32/Patched.HN trojan
C:\Program Files\Linksys Wireless-G USB Wireless Network Monitor\WUSB54Gv4.exe Win32/Patched.HN trojan
C:\Qoobox\Quarantine\C\Program Files\AVG\AVG2012\avgwdsvc.exe.vir Win32/Patched.HN trojan
C:\Qoobox\Quarantine\C\Program Files\Bonjour\mDNSResponder.exe.vir Win32/Patched.HN trojan
C:\Qoobox\Quarantine\C\Program Files\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe.vir Win32/Patched.HN trojan
C:\Qoobox\Quarantine\C\Program Files\Common Files\Seagate\Schedule2\schedul2.exe.vir Win32/Patched.HN trojan
C:\Qoobox\Quarantine\C\Program Files\Linksys Wireless-G USB Wireless Network Monitor\WLService.exe.vir Win32/Patched.HN trojan
C:\Qoobox\Quarantine\C\Program Files\Microsoft SQL Server\90\Shared\sqlwriter.exe.vir Win32/Patched.HN trojan
C:\Qoobox\Quarantine\C\Program Files\Symantec\Norton Online Backup\NOBuAgent.exe.vir Win32/Patched.HN trojan
C:\Qoobox\Quarantine\C\WINDOWS\assembly\GAC_MSIL\desktop.ini.vir a variant of Win32/Sirefef.CH trojan
C:\Qoobox\Quarantine\C\WINDOWS\system32\Ati2evxx.exe.vir Win32/Patched.HN trojan
C:\Qoobox\Quarantine\C\WINDOWS\system32\HPZipm12.exe.vir Win32/Patched.HN trojan
C:\Qoobox\Quarantine\C\WINDOWS\system32\msiexec.exe.vir Win32/Patched.HN trojan
C:\Qoobox\Quarantine\C\WINDOWS\system32\wuauclt.exe.vir Win32/Patched.HN trojan
C:\Qoobox\Quarantine\C\WINDOWS\system32\Drivers\1306959348.sys.vir Win32/Sirefef.CL trojan
C:\Qoobox\Quarantine\C\WINDOWS\system32\Drivers\i8042prt.sys.vir a variant of Win32/Rootkit.Kryptik.DM trojan
C:\WINDOWS\system32\c_84883.nl_ a variant of Win32/Sirefef.CR trojan
C:\WINDOWS\system32\ReinstallBackups\0002\DriverFiles\i386\i8042prt.sys a variant of Win32/Rootkit.Kryptik.DM trojan
F:\old drive\Azureus Downloads\Sibelius 5.1 Eng + Keygen\Sibelius 5.1 Eng + Keygen.iso probably a variant of Win32/Agent.JBLLXIL trojan
F:\old drive\Azureus Downloads\Sony ACIDpro 7.0 build 502+Keygen[H33T]-MasterUploader\Keygen\Keygen.exe a variant of Win32/Keygen.AR application
Operating memory Win32/Patched.HN trojan




aswMBR version 0.9.8.986 Copyright(c) 2011 AVAST Software
Run date: 2011-09-28 21:06:28
-----------------------------
21:06:28.096 OS Version: Windows 5.1.2600 Service Pack 3
21:06:28.096 Number of processors: 2 586 0x603
21:06:28.096 ComputerName: RIZZLEBOT UserName: Ryan
21:06:31.877 Initialize success
21:06:38.737 AVAST engine defs: 11092701
21:06:40.534 Disk 0 (boot) \Device\Harddisk0\DR0 -> \Device\Ide\IdeDeviceP0T0L0-4
21:06:40.534 Disk 0 Vendor: ST31000528AS CC3E Size: 953869MB BusType: 3
21:06:40.534 Disk 1 \Device\Harddisk1\DR1 -> \Device\Ide\IdeDeviceP0T1L0-c
21:06:40.534 Disk 1 Vendor: Hitachi_HDT725040VLA360 V5COA58A Size: 381554MB BusType: 3
21:06:42.596 Disk 0 MBR read successfully
21:06:42.596 Disk 0 MBR scan
21:06:42.612 Disk 0 Windows XP default MBR code
21:06:42.612 Disk 0 scanning sectors +1953504000
21:06:42.659 Disk 0 scanning C:\WINDOWS\system32\drivers
21:06:51.253 Service scanning
21:06:55.534 Service sptd C:\WINDOWS\System32\Drivers\sptd.sys **LOCKED** 32
21:06:56.050 Modules scanning
21:07:00.144 Disk 0 trace - called modules:
21:07:00.159 ntoskrnl.exe CLASSPNP.SYS disk.sys ACPI.sys hal.dll atapi.sys sptd.sys pciide.sys PCIIDEX.SYS
21:07:00.175 1 nt!IofCallDriver -> \Device\Harddisk0\DR0[0x8a22eab8]
21:07:00.175 3 CLASSPNP.SYS[f7637fd7] -> nt!IofCallDriver -> \Device\00000077[0x8a285f18]
21:07:00.175 5 ACPI.sys[f7498620] -> nt!IofCallDriver -> \Device\Ide\IdeDeviceP0T0L0-4[0x8a282d98]
21:07:07.706 AVAST engine scan C:\WINDOWS
21:07:23.363 AVAST engine scan C:\WINDOWS\system32
21:08:44.099 AVAST engine scan C:\WINDOWS\system32\drivers
21:09:08.912 AVAST engine scan C:\Documents and Settings\Ryan
21:16:50.529 AVAST engine scan C:\Documents and Settings\All Users
21:17:47.749 Scan finished successfully
21:22:24.518 Disk 0 MBR has been saved successfully to "C:\Documents and Settings\Ryan\Desktop\MBR.dat"
21:22:24.518 The log file has been saved successfully to "C:\Documents and Settings\Ryan\Desktop\aswMBR.txt"
 
:bigthumb:

We will remove the bad stuff after this scan

Download CKScanner by askey127 from Here & save it to your Desktop.
  • Doubleclick CKScanner.exe then click Search For Files
  • When the cursor hourglass disappears, click Save List To File
  • A message box will verify the file saved
  • Double-click the CKFiles.txt icon on your desktop then copy/paste the contents in your next reply
 
CKScanner - Additional Security Risks - These are not necessarily bad
c:\documents and settings\ryan\my documents\vuze downloads\daemon tools pro advanced 4.36.0309.0160 + crack (twisttm)\daemon tools pro advanced 4.36.0309.0160 setup.exe
c:\documents and settings\ryan\my documents\vuze downloads\daemon tools pro advanced 4.36.0309.0160 + crack (twisttm)\free latest software.url
c:\documents and settings\ryan\my documents\vuze downloads\daemon tools pro advanced 4.36.0309.0160 + crack (twisttm)\crack\dtagent_loader_0.4.au3
c:\documents and settings\ryan\my documents\vuze downloads\daemon tools pro advanced 4.36.0309.0160 + crack (twisttm)\crack\dtagent_loader_0.4.exe
c:\documents and settings\ryan\my documents\vuze downloads\daemon tools pro advanced 4.36.0309.0160 + crack (twisttm)\crack\dt_loader.ini
c:\documents and settings\ryan\my documents\vuze downloads\daemon tools pro advanced 4.36.0309.0160 + crack (twisttm)\crack\dt_loader_0.4.au3
c:\documents and settings\ryan\my documents\vuze downloads\daemon tools pro advanced 4.36.0309.0160 + crack (twisttm)\crack\dt_loader_0.4.exe
c:\documents and settings\ryan\my documents\vuze downloads\daemon tools pro advanced 4.36.0309.0160 + crack (twisttm)\crack\imgeditor_loader_0.4.au3
c:\documents and settings\ryan\my documents\vuze downloads\daemon tools pro advanced 4.36.0309.0160 + crack (twisttm)\crack\imgeditor_loader_0.4.exe
c:\documents and settings\ryan\my documents\vuze downloads\daemon tools pro advanced 4.36.0309.0160 + crack (twisttm)\crack\success your future-free degree,bsc,mba.url
c:\documents and settings\ryan\my documents\vuze downloads\dragon.age.origins.true.ultimate.edition-curlyqu\dragon.age.origins.true.ultimate.edition-curlyqu\05 - crack\daorigins.exe
c:\documents and settings\ryan\my documents\vuze downloads\dragon.age.origins.true.ultimate.edition-reece56364\dragon.age.origins.true.ultimate.edition-reece56364\05 - crack\daorigins.exe
c:\program files\old program files\magiciso\crack\magic.iso.maker.v5.4.b251_patch.exe
c:\program files\old program files\magiciso\crack\resurrection.nfo
scanner sequence 3.IE.11.TSNAXV
----- EOF -----
 
Good Morning,

Let me take a second to explain how you infected this computer, let me explain first about the seriousness of the infection you have, many years ago when viruses first started appearing, they where more of an annoyance than anything else, written by kids and people that had nothing better to do with there time, but not anymore, this garbage is written by Cyber Criminals, and there goal is to steal anything they can from you like your bank account log ins, credit card info and all your passwords, most of these gangs of criminals come from the uKraine. The infections nowadays are not to be taken lightly.

You infected your system by downloading Illegal Software via the torrents that are cracked or keygens. Besides being illegal, there the number one way of infecting your system as all cracked/keygens contain malicious code in one form or another. This forum along with all the rest of the malware removal forums do not support the use of illegal software except for there removal. If i was to continue helping you it could be construed in the eyes of the law as aiding and abetting a crime, and this is a crime, this software has basically been stolen. I am going to give you the benefit of the doubt that you are not aware of the dangers of downloading cracked or keygen software, but before we can continue this software has to be uninstalled. You can do that via Add Remove Programs in the Control Panel. Those programs are infected and need to go, but this is your call, if you decide not to uninstall them then this thread will be closed and no further help will be offered.

If you decide to remove them, do that and then run CKScanner again and post a new log, the ball is in your court, let me know what you decide.
 
Alright, I've uninstalled the stolen programs and cleaned out the download folder. I shall not want. :angel: Thank you for your patience, it's very much appreciated. And no, I didn't know keygens were forms of malware.

CKScanner - Additional Security Risks - These are not necessarily bad
scanner sequence 3.RP.11.FMAAAD
----- EOF -----
 
Great, thanks for understanding. Trust me, you will save yourself a whole lot of grief by just downloading and installing programs you may want legally.

Most of what ESET found where in Qoobox which are backups of what Combofix removed and when where done we will remove Combofix and the backups.

Lets run aswMBR for the last time and make sure nothing has returned.


Then run this scanner and lets take a final look to make sure we did not miss anything

Are the redirects still gone ???

OTL by OldTimer
  • Download OTL to your desktop.
  • Double click on the icon to run it. Make sure all other windows are closed and to let it run uninterrupted.
  • When the window appears, underneath Output at the top change it to Minimal Output.
  • Click the "Scan All Users" checkbox.
  • Check the boxes beside LOP Check and Purity Check.
  • Click the Run Scan button. Do not change any settings unless otherwise told to do so. The scan wont take long.
    • When the scan completes, it will open two notepad windows. OTL.Txt and Extras.Txt.
      Note:These logs can be located in the OTL. folder on you C:\ drive if they fail to open automatically.
    • Please copy (Edit->Select All, Edit->Copy) the contents of these files, one at a time, and post it with your next reply. You may need two posts to fit them both in.
 
Funny how these seem to take longer every time.

aswMBR version 0.9.8.986 Copyright(c) 2011 AVAST Software
Run date: 2011-09-29 17:58:34
-----------------------------
17:58:34.803 OS Version: Windows 5.1.2600 Service Pack 3
17:58:34.803 Number of processors: 2 586 0x603
17:58:34.803 ComputerName: RIZZLEBOT UserName: Ryan
17:58:36.100 Initialize success
17:59:21.053 AVAST engine defs: 11092901
17:59:23.740 Disk 0 (boot) \Device\Harddisk0\DR0 -> \Device\Ide\IdeDeviceP0T0L0-4
17:59:23.740 Disk 0 Vendor: ST31000528AS CC3E Size: 953869MB BusType: 3
17:59:23.740 Disk 1 \Device\Harddisk1\DR1 -> \Device\Ide\IdeDeviceP0T1L0-c
17:59:23.740 Disk 1 Vendor: Hitachi_HDT725040VLA360 V5COA58A Size: 381554MB BusType: 3
17:59:25.772 Disk 0 MBR read successfully
17:59:25.772 Disk 0 MBR scan
17:59:25.818 Disk 0 Windows XP default MBR code
17:59:25.834 Disk 0 scanning sectors +1953504000
17:59:25.928 Disk 0 scanning C:\WINDOWS\system32\drivers
17:59:38.584 Service scanning
17:59:39.209 Service sptd C:\WINDOWS\System32\Drivers\sptd.sys **LOCKED** 32
17:59:39.725 Modules scanning
17:59:54.006 Disk 0 trace - called modules:
17:59:54.037
17:59:58.209 AVAST engine scan C:\WINDOWS
18:00:56.725 AVAST engine scan C:\WINDOWS\system32
18:04:06.553 AVAST engine scan C:\WINDOWS\system32\drivers
18:05:31.178 AVAST engine scan C:\Documents and Settings\Ryan
18:17:57.725 AVAST engine scan C:\Documents and Settings\All Users
18:19:11.037 Scan finished successfully
18:19:31.053 Disk 0 MBR has been saved successfully to "C:\Documents and Settings\Ryan\Desktop\MBR.dat"
18:19:31.053 The log file has been saved successfully to "C:\Documents and Settings\Ryan\Desktop\aswMBR.txt"

should I be concerned about sptd.sys being "locked"? I read somewhere that this had to do with DaemonTools mounting .isos to a CD drive, but I uninstalled that.
 
Status
Not open for further replies.
Back
Top