PDA

View Full Version : Random soundbytes, IE redirection



MrSly
2009-12-03, 19:29
I seem to keep hearing random soundbytes (commercials) about random things. They tend to play about once every 5 minutes or so. Also, IE gets redirected often to lots of different places. Sometimes it starts itself and navigates to random sites.

Before posting here I ran ESET online antivirus, and Malwarebytes antimalware trying to fix the problem myself. Obviously, it didn't work... :)

I did what was detailed in the first post here, and here is my log. Thank you for any help you may be able to provide.


Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 11:18:33 AM, on 12/3/2009
Platform: Windows XP SP3 (WinNT 5.01.2600)
MSIE: Internet Explorer v7.00 (7.00.6000.21115)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Common Files\Symantec Shared\ccSvcHst.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\Program Files\Lavasoft\Ad-Aware\AAWService.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Symantec\LiveUpdate\AluSchedulerSvc.exe
C:\Program Files\Common Files\Nero\Nero BackItUp 4\NBService.exe
C:\WINDOWS\system32\poweroff.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\RTHDCPL.EXE
C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe
C:\Program Files\Logitech\iTouch\iTouch.exe
C:\Program Files\ATI Technologies\ATI.ACE\Core-Static\MOM.EXE
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Rubber Ducky\RubberDucky.exe
C:\Program Files\GPSoftware\Directory Opus\dopusrt.exe
C:\Program Files\POP Peeper\POPPeeper.exe
C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe
C:\Program Files\Common Files\Symantec Shared\ccSvcHst.exe
C:\Program Files\Palm\Hotsync.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Lavasoft\Ad-Aware\AAWTray.exe
C:\Program Files\Internet Explorer\IEXPLORE.EXE
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.bnsfinancial.com/fam/Sherri.htm
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
O2 - BHO: AcroIEHelperStub - {18DF081C-E8AD-4283-A596-FA578C2EBDC3} - C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelperShim.dll
O2 - BHO: NCO 2.0 IE BHO - {602ADB0E-4AFF-4217-8AA1-95DAC4DFA408} - C:\Program Files\Common Files\Symantec Shared\coShared\Browser\2.6\coIEPlg.dll
O2 - BHO: Symantec Intrusion Prevention - {6D53EC84-6AAE-4787-AEEE-F4628F01010C} - C:\PROGRA~1\COMMON~1\SYMANT~1\IDS\IPSBHO.dll
O2 - BHO: Groove GFS Browser Helper - {72853161-30C5-4D22-B7F9-0BBC1D38A37E} - C:\Program Files\Microsoft Office\Office12\GrooveShellExtensions.dll
O2 - BHO: Google Toolbar Helper - {AA58ED58-01DD-4d91-8333-CF10577473F7} - C:\Program Files\Google\Google Toolbar\GoogleToolbar_32.dll
O2 - BHO: Google Toolbar Notifier BHO - {AF69DE43-7D58-4638-B6FA-CE66B5AD205D} - C:\Program Files\Google\GoogleToolbarNotifier\5.3.4501.1418\swg.dll
O2 - BHO: Google Dictionary Compression sdch - {C84D72FE-E17D-4195-BB24-76C02E2E7C4E} - C:\Program Files\Google\Google Toolbar\Component\fastsearch_B7C5AC242193BB3E.dll
O2 - BHO: Java(tm) Plug-In 2 SSV Helper - {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Program Files\Java\jre6\bin\jp2ssv.dll
O2 - BHO: JQSIEStartDetectorImpl - {E7E6F031-17CE-4C07-BC86-EABFE594F69C} - C:\Program Files\Java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll
O3 - Toolbar: Google Toolbar - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - C:\Program Files\Google\Google Toolbar\GoogleToolbar_32.dll
O3 - Toolbar: Show Norton Toolbar - {7FEBEFE3-6B19-4349-98D2-FFB09D4B49CA} - C:\Program Files\Common Files\Symantec Shared\coShared\Browser\2.6\CoIEPlg.dll
O4 - HKLM\..\Run: [StartCCC] C:\Program Files\ATI Technologies\ATI.ACE\Core-Static\CLIStart.exe
O4 - HKLM\..\Run: [RTHDCPL] RTHDCPL.EXE
O4 - HKLM\..\Run: [GrooveMonitor] "C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe"
O4 - HKLM\..\Run: [zBrowser Launcher] C:\Program Files\Logitech\iTouch\iTouch.exe
O4 - HKLM\..\Run: [Adobe Reader Speed Launcher] "C:\Program Files\Adobe\Reader 9.0\Reader\Reader_sl.exe"
O4 - HKLM\..\Run: [Malwarebytes Anti-Malware (reboot)] "C:\Program Files\Malwarebytes' Anti-Malware\mbam.exe" /runcleanupscript
O4 - HKLM\..\Run: [ccApp] "C:\Program Files\Common Files\Symantec Shared\ccApp.exe"
O4 - HKLM\..\Run: [osCheck] "C:\Program Files\Norton 360\osCheck.exe"
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
O4 - HKCU\..\Run: [MimarSinan Rubber Ducky] "C:\Program Files\Rubber Ducky\RubberDucky.exe"
O4 - HKCU\..\Run: [Directory Opus Desktop Dblclk] "C:\Program Files\GPSoftware\Directory Opus\dopusrt.exe" /dblclk
O4 - HKCU\..\Run: [POP Peeper] "C:\Program Files\POP Peeper\POPPeeper.exe" -min
O4 - HKCU\..\Run: [swg] "C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe"
O4 - HKUS\S-1-5-19\..\RunOnce: [ShowDeskFix] regsvr32 /s /n /i:u shell32 (User 'LOCAL SERVICE')
O4 - HKUS\S-1-5-19\..\RunOnce: [IE7-11] rundll32 advpack.dll,LaunchINFSection NR_IE7en.inf,AfterUserStart (User 'LOCAL SERVICE')
O4 - HKUS\S-1-5-20\..\RunOnce: [ShowDeskFix] regsvr32 /s /n /i:u shell32 (User 'NETWORK SERVICE')
O4 - HKUS\S-1-5-18\..\RunOnce: [ShowDeskFix] regsvr32 /s /n /i:u shell32 (User 'SYSTEM')
O4 - HKUS\.DEFAULT\..\RunOnce: [ShowDeskFix] regsvr32 /s /n /i:u shell32 (User 'Default user')
O4 - Startup: AutoMailer.lnk = C:\Troopmaster Software\AutoMailer\AutoMailer.exe
O4 - Startup: OneNote 2007 Screen Clipper and Launcher.lnk = C:\Program Files\Microsoft Office\Office12\ONENOTEM.EXE
O4 - Global Startup: HotSync Manager.lnk = C:\Program Files\Palm\Hotsync.exe
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\Office12\EXCEL.EXE/3000
O9 - Extra button: Send to OneNote - {2670000A-7350-4f3c-8081-5663EE0C6C49} - C:\PROGRA~1\MICROS~2\Office12\ONBttnIE.dll
O9 - Extra 'Tools' menuitem: S&end to OneNote - {2670000A-7350-4f3c-8081-5663EE0C6C49} - C:\PROGRA~1\MICROS~2\Office12\ONBttnIE.dll
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\Office12\REFIEBAR.DLL
O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} (WUWebControl Class) - http://update.microsoft.com/microsoftupdate/v6/V5Controls/en/x86/client/wuweb_site.cab?1238780007687
O16 - DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} (MUWebControl Class) - http://update.microsoft.com/microsoftupdate/v6/V5Controls/en/x86/client/muweb_site.cab?1238779998343
O16 - DPF: {7530BFB8-7293-4D34-9923-61A11451AFC5} - http://download.eset.com/special/eos/OnlineScanner.cab
O18 - Protocol: cozi - {5356518D-FE9C-4E08-9C1F-1E872ECD367F} - C:\Program Files\Cozi Express\CoziProtocolHandler.dll
O18 - Protocol: grooveLocalGWS - {88FED34C-F0CA-4636-A375-3CB6248B04CD} - C:\Program Files\Microsoft Office\Office12\GrooveSystemServices.dll
O20 - Winlogon Notify: pxod13 - C:\WINDOWS\SYSTEM32\pxod13.dll
O23 - Service: Ati HotKey Poller - ATI Technologies Inc. - C:\WINDOWS\system32\Ati2evxx.exe
O23 - Service: Automatic LiveUpdate Scheduler - Symantec Corporation - C:\Program Files\Symantec\LiveUpdate\AluSchedulerSvc.exe
O23 - Service: Symantec Event Manager (ccEvtMgr) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccSvcHst.exe
O23 - Service: Symantec Settings Manager (ccSetMgr) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccSvcHst.exe
O23 - Service: Symantec Lic NetConnect service (CLTNetCnService) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccSvcHst.exe
O23 - Service: COM Host (comHost) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\VAScanner\comHost.exe
O23 - Service: Google Software Updater (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
O23 - Service: Java Quick Starter (JavaQuickStarterService) - Unknown owner - I:\Ceedo\Program Files\Java\jre6\bin\jqs.exe (file missing)
O23 - Service: Lavasoft Ad-Aware Service - Lavasoft - C:\Program Files\Lavasoft\Ad-Aware\AAWService.exe
O23 - Service: LiveUpdate - Symantec Corporation - C:\Program Files\Symantec\LiveUpdate\LuComServer_3_4.EXE
O23 - Service: LiveUpdate Notice - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccSvcHst.exe
O23 - Service: Nero BackItUp Scheduler 4.0 - Nero AG - C:\Program Files\Common Files\Nero\Nero BackItUp 4\NBService.exe
O23 - Service: Poweroff - Jorgen Bosman - C:\WINDOWS\system32\poweroff.exe
O23 - Service: Symantec Core LC - Unknown owner - C:\PROGRA~1\COMMON~1\SYMANT~1\CCPD-LC\symlcsvc.exe
O23 - Service: TuneUp Drive Defrag Service (TuneUp.Defrag) - TuneUp Software GmbH - C:\WINDOWS\System32\TuneUpDefragService.exe

--
End of file - 9528 bytes

Blade81
2009-12-08, 07:56
Hi,

Download DDS and save it to your desktop from here (http://www.techsupportforum.com/sectools/sUBs/dds) or here (http://download.bleepingcomputer.com/sUBs/dds.scr) or here (http://www.forospyware.com/sUBs/dds).
Disable any script blocker, and then double click dds.scr to run the tool.
When done, DDS will open two (2) logs:
DDS.txt
Attach.txt

Save both reports to your desktop. Post them back to your topic.


Download GMER (http://www.gmer.net) here by clicking download exe -button and then saving it your desktop:
Double-click .exe that you downloaded
Click rootkit-tab and then scan.
Don't check
Show All
box while scanning in progress!
When scanning is ready, click Copy.
This copies log to clipboard
Post log in your reply.

MrSly
2009-12-08, 20:13
Thank you for your assistance! Here are the first two logs you requested.


DDS (Ver_09-12-01.01) - NTFSx86
Run by Sherri at 12:00:18.09 on Tue 12/08/2009
Internet Explorer: 7.0.5730.11
Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.2815.2166 [GMT -6:00]

AV: Norton 360 *On-access scanning disabled* (Outdated) {A5F1BC7C-EA33-4247-961C-0217208396C4}
FW: Norton 360 *disabled* {371C0A40-5A0C-4AD2-A6E5-69C02037FBF3}

============== Running Processes ===============

C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\system32\svchost -k DcomLaunch
svchost.exe
C:\WINDOWS\System32\svchost.exe -k netsvcs
svchost.exe
C:\WINDOWS\system32\Ati2evxx.exe
svchost.exe
C:\Program Files\Common Files\Symantec Shared\ccSvcHst.exe
C:\Program Files\Lavasoft\Ad-Aware\AAWService.exe
C:\WINDOWS\system32\spoolsv.exe
svchost.exe
C:\Program Files\Symantec\LiveUpdate\AluSchedulerSvc.exe
C:\Program Files\Common Files\Nero\Nero BackItUp 4\NBService.exe
C:\WINDOWS\system32\poweroff.exe
C:\Program Files\Common Files\Symantec Shared\VAScanner\comHost.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\RTHDCPL.EXE
C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe
C:\Program Files\Logitech\iTouch\iTouch.exe
C:\Program Files\Adobe\Reader 9.0\Reader\Reader_sl.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Rubber Ducky\RubberDucky.exe
C:\Program Files\ATI Technologies\ATI.ACE\Core-Static\MOM.EXE
C:\Program Files\GPSoftware\Directory Opus\dopusrt.exe
C:\Program Files\Common Files\Symantec Shared\ccSvcHst.exe
C:\Program Files\POP Peeper\POPPeeper.exe
C:\Program Files\Palm\Hotsync.exe
C:\WINDOWS\System32\svchost.exe -k HTTPFilter
C:\PROGRA~1\COMMON~1\SYMANT~1\CCPD-LC\symlcsvc.exe
C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe
C:\WINDOWS\system32\wscntfy.exe
C:\Program Files\Internet Explorer\IEXPLORE.EXE
C:\DOCUME~1\Sherri\LOCALS~1\Temp\Google Toolbar\gtb11.tmp.exe
C:\Documents and Settings\Sherri\Desktop\dds.scr

============== Pseudo HJT Report ===============

uStart Page = hxxp://www.bnsfinancial.com/fam/Sherri.htm
BHO: Adobe PDF Link Helper: {18df081c-e8ad-4283-a596-fa578c2ebdc3} - c:\program files\common files\adobe\acrobat\activex\AcroIEHelperShim.dll
BHO: NCO 2.0 IE BHO: {602adb0e-4aff-4217-8aa1-95dac4dfa408} - c:\program files\common files\symantec shared\coshared\browser\2.6\coIEPlg.dll
BHO: Symantec Intrusion Prevention: {6d53ec84-6aae-4787-aeee-f4628f01010c} - c:\progra~1\common~1\symant~1\ids\IPSBHO.dll
BHO: Groove GFS Browser Helper: {72853161-30c5-4d22-b7f9-0bbc1d38a37e} - c:\program files\microsoft office\office12\GrooveShellExtensions.dll
BHO: Google Toolbar Helper: {aa58ed58-01dd-4d91-8333-cf10577473f7} - c:\program files\google\google toolbar\GoogleToolbar_32.dll
BHO: Google Toolbar Notifier BHO: {af69de43-7d58-4638-b6fa-ce66b5ad205d} - c:\program files\google\googletoolbarnotifier\5.4.4525.1752\swg.dll
BHO: Google Dictionary Compression sdch: {c84d72fe-e17d-4195-bb24-76c02e2e7c4e} - c:\program files\google\google toolbar\component\fastsearch_B7C5AC242193BB3E.dll
BHO: Java(tm) Plug-In 2 SSV Helper: {dbc80044-a445-435b-bc74-9c25c1c588a9} - c:\program files\java\jre6\bin\jp2ssv.dll
BHO: JQSIEStartDetectorImpl Class: {e7e6f031-17ce-4c07-bc86-eabfe594f69c} - c:\program files\java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll
TB: Google Toolbar: {2318c2b1-4965-11d4-9b18-009027a5cd4f} - c:\program files\google\google toolbar\GoogleToolbar_32.dll
TB: Show Norton Toolbar: {7febefe3-6b19-4349-98d2-ffb09d4b49ca} - c:\program files\common files\symantec shared\coshared\browser\2.6\CoIEPlg.dll
uRun: [ctfmon.exe] c:\windows\system32\ctfmon.exe
uRun: [MimarSinan Rubber Ducky] "c:\program files\rubber ducky\RubberDucky.exe"
uRun: [Directory Opus Desktop Dblclk] "c:\program files\gpsoftware\directory opus\dopusrt.exe" /dblclk
uRun: [POP Peeper] "c:\program files\pop peeper\POPPeeper.exe" -min
uRun: [swg] "c:\program files\google\googletoolbarnotifier\GoogleToolbarNotifier.exe"
mRun: [StartCCC] c:\program files\ati technologies\ati.ace\core-static\CLIStart.exe
mRun: [RTHDCPL] RTHDCPL.EXE
mRun: [GrooveMonitor] "c:\program files\microsoft office\office12\GrooveMonitor.exe"
mRun: [zBrowser Launcher] c:\program files\logitech\itouch\iTouch.exe
mRun: [Adobe Reader Speed Launcher] "c:\program files\adobe\reader 9.0\reader\Reader_sl.exe"
mRun: [Malwarebytes Anti-Malware (reboot)] "c:\program files\malwarebytes' anti-malware\mbam.exe" /runcleanupscript
mRun: [ccApp] "c:\program files\common files\symantec shared\ccApp.exe"
mRun: [osCheck] "c:\program files\norton 360\osCheck.exe"
dRunOnce: [ShowDeskFix] regsvr32 /s /n /i:u shell32
dRunOnce: [IE7-11] rundll32 advpack.dll,LaunchINFSection NR_IE7en.inf,AfterUserStart
StartupFolder: c:\docume~1\sherri\startm~1\programs\startup\automa~1.lnk - c:\troopmaster software\automailer\AutoMailer.exe
StartupFolder: c:\docume~1\sherri\startm~1\programs\startup\onenot~1.lnk - c:\program files\microsoft office\office12\ONENOTEM.EXE
StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\hotsyn~1.lnk - c:\program files\palm\Hotsync.exe
IE: E&xport to Microsoft Excel - c:\progra~1\micros~2\office12\EXCEL.EXE/3000
IE: {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe
IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe
IE: {2670000A-7350-4f3c-8081-5663EE0C6C49} - {48E73304-E1D6-4330-914C-F5F514E3486C} - c:\progra~1\micros~2\office12\ONBttnIE.dll
IE: {92780B25-18CC-41C8-B9BE-3C9C571A8263} - {FF059E31-CC5A-4E2E-BF3B-96E929D65503} - c:\progra~1\micros~2\office12\REFIEBAR.DLL
DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} - hxxp://update.microsoft.com/microsoftupdate/v6/V5Controls/en/x86/client/wuweb_site.cab?1238780007687
DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} - hxxp://update.microsoft.com/microsoftupdate/v6/V5Controls/en/x86/client/muweb_site.cab?1238779998343
DPF: {7530BFB8-7293-4D34-9923-61A11451AFC5} - hxxp://download.eset.com/special/eos/OnlineScanner.cab
DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_13-windows-i586.cab
DPF: {8FFBE65D-2C9C-4669-84BD-5829DC0B603C} - hxxp://fpdownload.macromedia.com/get/flashplayer/current/polarbear/ultrashim.cab
DPF: {CAFEEFAC-0016-0000-0013-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_13-windows-i586.cab
DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_13-windows-i586.cab
Handler: cozi - {5356518D-FE9C-4E08-9C1F-1E872ECD367F} - c:\program files\cozi express\CoziProtocolHandler.dll
Handler: grooveLocalGWS - {88FED34C-F0CA-4636-A375-3CB6248B04CD} - c:\program files\microsoft office\office12\GrooveSystemServices.dll
Notify: AtiExtEvent - Ati2evxx.dll
Notify: pxod13 - pxod13.dll
SSODL: WPDShServiceObj - {AAA288BA-9A4C-45B0-95D7-94D524869DB5} - c:\windows\system32\wpdshserviceobj.dll
SEH: Groove GFS Stub Execution Hook: {b5a7f190-dda6-4420-b3ba-52453494e6cd} - c:\program files\microsoft office\office12\GrooveShellExtensions.dll

============= SERVICES / DRIVERS ===============

R0 Lbd;Lbd;c:\windows\system32\drivers\Lbd.sys [2009-8-31 64160]
R2 ccEvtMgr;Symantec Event Manager;c:\program files\common files\symantec shared\CCSVCHST.EXE [2008-2-18 149352]
R2 ccSetMgr;Symantec Settings Manager;c:\program files\common files\symantec shared\CCSVCHST.EXE [2008-2-18 149352]
R2 Lavasoft Ad-Aware Service;Lavasoft Ad-Aware Service;c:\program files\lavasoft\ad-aware\AAWService.exe [2009-7-3 1028432]
R2 LiveUpdate Notice;LiveUpdate Notice;c:\program files\common files\symantec shared\CCSVCHST.EXE [2008-2-18 149352]
R2 Poweroff;Poweroff;c:\windows\system32\poweroff.exe [2009-9-30 172032]
R3 EraserUtilRebootDrv;EraserUtilRebootDrv;c:\program files\common files\symantec shared\eengine\EraserUtilRebootDrv.sys [2009-11-27 102448]
R3 NAVENG;NAVENG;c:\progra~1\common~1\symant~1\virusd~1\20091129.002\NAVENG.SYS [2009-11-29 84912]
R3 NAVEX15;NAVEX15;c:\progra~1\common~1\symant~1\virusd~1\20091129.002\NAVEX15.SYS [2009-11-29 1323568]
R3 Symantec Core LC;Symantec Core LC;c:\progra~1\common~1\symant~1\ccpd-lc\symlcsvc.exe [2009-11-27 1245064]
S3 COH_Mon;COH_Mon;c:\windows\system32\drivers\COH_Mon.sys [2008-1-12 23888]

=============== Created Last 30 ================

2009-12-03 17:18:10 0 d-----w- c:\program files\Trend Micro
2009-12-01 04:37:49 1536 ----a-w- C:\palm.grf
2009-11-27 23:32:31 0 d-----w- c:\program files\Norton 360
2009-11-27 23:31:25 806 ----a-w- c:\windows\system32\drivers\SYMEVENT.INF
2009-11-27 23:31:25 60808 ----a-w- c:\windows\system32\S32EVNT1.DLL
2009-11-27 23:31:25 124464 ----a-w- c:\windows\system32\drivers\SYMEVENT.SYS
2009-11-27 23:31:25 10635 ----a-w- c:\windows\system32\drivers\SYMEVENT.CAT
2009-11-27 23:31:17 0 d-----w- c:\program files\Symantec
2009-11-27 15:28:46 0 d-----w- c:\docume~1\sherri\applic~1\Malwarebytes
2009-11-27 15:28:41 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2009-11-27 15:28:39 19160 ----a-w- c:\windows\system32\drivers\mbam.sys
2009-11-27 15:28:39 0 d-----w- c:\program files\Malwarebytes' Anti-Malware
2009-11-27 15:28:39 0 d-----w- c:\docume~1\alluse~1\applic~1\Malwarebytes
2009-11-26 18:51:36 5136 ----a-w- c:\windows\system32\pxod13.dll
2009-11-24 02:24:11 0 d-----w- c:\docume~1\alluse~1\applic~1\PBGsavesDirectory
2009-11-23 21:39:19 0 d-----w- c:\program files\Snood
2009-11-23 21:17:15 0 d-----w- c:\program files\ReflexiveArcade

==================== Find3M ====================

2009-12-08 17:50:06 96512 ----a-w- c:\windows\system32\drivers\atapi.sys
2009-09-12 19:48:01 98304 ----a-w- c:\windows\system32\CmdLineExt.dll
2009-09-11 14:18:39 136192 ----a-w- c:\windows\system32\msv1_0.dll
2009-03-30 21:26:10 32768 --sha-w- c:\windows\system32\config\systemprofile\local settings\history\history.ie5\mshist012009033020090331\index.dat

============= FINISH: 12:01:20.90 ===============

MrSly
2009-12-08, 21:15
And here's the results from the GMER run. Also, while reading your post, IE shut down and this Google button now has appeared next to my Start button!

Thank you again for your help!


GMER 1.0.15.15273 - http://www.gmer.net
Rootkit scan 2009-12-08 13:11:25
Windows 5.1.2600 Service Pack 3
Running: lhbzvgis.exe; Driver: C:\DOCUME~1\Sherri\LOCALS~1\Temp\kwldypob.sys


---- System - GMER 1.0.15 ----

SSDT 8A90B078 ZwAlertResumeThread
SSDT 8A915008 ZwAlertThread
SSDT 8A91F5C8 ZwAllocateVirtualMemory
SSDT 8A4BF1E8 ZwConnectPort
SSDT \??\C:\WINDOWS\system32\Drivers\SYMEVENT.SYS (Symantec Event Library/Symantec Corporation) ZwCreateKey [0xAC873020]
SSDT 8A7A0008 ZwCreateMutant
SSDT 8A727008 ZwCreateThread
SSDT 8A933228 ZwDebugActiveProcess
SSDT \??\C:\WINDOWS\system32\Drivers\SYMEVENT.SYS (Symantec Event Library/Symantec Corporation) ZwDeleteKey [0xAC8732A0]
SSDT \??\C:\WINDOWS\system32\Drivers\SYMEVENT.SYS (Symantec Event Library/Symantec Corporation) ZwDeleteValueKey [0xAC873800]
SSDT 8A729068 ZwFreeVirtualMemory
SSDT 8A79C078 ZwImpersonateAnonymousToken
SSDT 8A816008 ZwImpersonateThread
SSDT 8A72F008 ZwMapViewOfSection
SSDT 8A80D078 ZwOpenEvent
SSDT 8A803110 ZwOpenProcessToken
SSDT 8A8E9198 ZwOpenSection
SSDT 8A72C008 ZwOpenThreadToken
SSDT 8A4DF558 ZwResumeThread
SSDT 8A6FC130 ZwSetContextThread
SSDT 8A72D008 ZwSetInformationProcess
SSDT 8A72B068 ZwSetInformationThread
SSDT \??\C:\WINDOWS\system32\Drivers\SYMEVENT.SYS (Symantec Event Library/Symantec Corporation) ZwSetValueKey [0xAC873A50]
SSDT 8A808200 ZwSuspendProcess
SSDT 8A762008 ZwSuspendThread
SSDT 8A8BA138 ZwTerminateProcess
SSDT 8A755078 ZwTerminateThread
SSDT 8A934870 ZwUnmapViewOfSection
SSDT 8A96A668 ZwWriteVirtualMemory

---- Kernel code sections - GMER 1.0.15 ----

.text ntkrnlpa.exe!ZwCallbackReturn + 2C40 805044DC 4 Bytes CALL FCDA90D2

---- User code sections - GMER 1.0.15 ----

.text C:\Program Files\Internet Explorer\IEXPLORE.EXE[832] ntdll.dll!RtlValidateUnicodeString + 554 7C9163BE 10 Bytes JMP 0766003A
.text C:\Program Files\Internet Explorer\IEXPLORE.EXE[832] USER32.dll!DialogBoxParamW 7E4247AB 5 Bytes JMP 3E1DF4B1 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\IEXPLORE.EXE[832] USER32.dll!DialogBoxIndirectParamW 7E432072 5 Bytes JMP 3E35295F C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\IEXPLORE.EXE[832] USER32.dll!MessageBoxIndirectA 7E43A082 5 Bytes JMP 3E3528E0 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\IEXPLORE.EXE[832] USER32.dll!DialogBoxParamA 7E43B144 5 Bytes JMP 3E352924 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\IEXPLORE.EXE[832] USER32.dll!MessageBoxExW 7E450838 5 Bytes JMP 3E35286C C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\IEXPLORE.EXE[832] USER32.dll!MessageBoxExA 7E45085C 5 Bytes JMP 3E3528A6 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\IEXPLORE.EXE[832] USER32.dll!DialogBoxIndirectParamA 7E456D7D 5 Bytes JMP 3E35299A C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\IEXPLORE.EXE[832] USER32.dll!MessageBoxIndirectW 7E4664D5 5 Bytes JMP 3E20182A C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\IEXPLORE.EXE[832] ole32.dll!OleInitialize + E37 77500521 4 Bytes JMP 076600F3
.text C:\Program Files\Internet Explorer\IEXPLORE.EXE[832] ole32.dll!CoCreateInstanceEx 77500526 2 Bytes [EB, F9] {JMP 0xfffffffffffffffb}
.text C:\Program Files\Internet Explorer\IEXPLORE.EXE[832] ole32.dll!CoImpersonateClient + 51 775156C0 4 Bytes JMP 076601A9
.text C:\Program Files\Internet Explorer\IEXPLORE.EXE[832] ole32.dll!CoGetClassObject 775156C5 2 Bytes [EB, F9] {JMP 0xfffffffffffffffb}
.text C:\Program Files\Internet Explorer\IEXPLORE.EXE[832] ole32.dll!OleLoadFromStream 77529C85 5 Bytes JMP 3E352B5C C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)

---- Devices - GMER 1.0.15 ----

AttachedDevice \Driver\Tcpip \Device\Ip SYMTDI.SYS (Network Dispatch Driver/Symantec Corporation)
AttachedDevice \Driver\Tcpip \Device\Ip Lbd.sys (Boot Driver/Lavasoft AB)
AttachedDevice \Driver\Tcpip \Device\Tcp SYMTDI.SYS (Network Dispatch Driver/Symantec Corporation)
AttachedDevice \Driver\Tcpip \Device\Tcp Lbd.sys (Boot Driver/Lavasoft AB)
AttachedDevice \Driver\Tcpip \Device\Udp SYMTDI.SYS (Network Dispatch Driver/Symantec Corporation)
AttachedDevice \Driver\Tcpip \Device\Udp Lbd.sys (Boot Driver/Lavasoft AB)
AttachedDevice \Driver\Tcpip \Device\RawIp SYMTDI.SYS (Network Dispatch Driver/Symantec Corporation)

Device -> \Driver\atapi \Device\Harddisk0\DR0 8AA70369

---- Files - GMER 1.0.15 ----

File C:\WINDOWS\system32\drivers\atapi.sys suspicious modification

---- EOF - GMER 1.0.15 ----

Blade81
2009-12-08, 21:28
Hi,

IMPORTANT I notice there are signs of one or more P2P (Peer to Peer) File Sharing Programs on your computer.


LimeWire


I'd like you to read this thread (http://forums.spybot.info/showthread.php?t=282).

Please go to Control Panel > Add/Remove Programs and uninstall the programs listed above (in red).



After that:


Please visit this webpage for download links, and instructions for running ComboFix tool:

http://www.bleepingcomputer.com/combofix/how-to-use-combofix

Please ensure you read this guide carefully first.


Please continue as follows:


Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix, link (http://www.bleepingcomputer.com/forums/topic114351.html)
Remember to re-enable them afterwards.


Click Yes to allow ComboFix to continue scanning for malware.


When the tool is finished, it will produce a report for you.

Please include the following reports for further review, and so we may continue cleansing the system:

C:\ComboFix.txt
New dds log.

A word of warning: Neither I nor sUBs are responsible for any damage you may have caused your machine by running ComboFix. This tool is not a toy and not for everyday use.





Also, while reading your post, IE shut down and this Google button now has appeared next to my Start button!
Could you take a screenshot and attach it to your reply? Would make it easier for me to understand what Google button you are referring there.

MrSly
2009-12-08, 23:51
Thank you for the information on P2P programs. My daughter reluctantly claimed responsibility for the Limewire program. We had a nice talk, and she is grounded from the computer for 1 month. I'm guessing this is where the infection came from. Limewire has been uninstalled.

Please see the attachment for a screenshot of the Google button that mysteriously appeared last time I was reading your response. I didn't see anything that said IE was doing anything, it just shut down and this Google button appeared. I restarted IE and haven't noticed any differences. And I'm afraid to click this new button for fear of loosing some digital demon.

Here is the log you asked for:

ComboFix 09-12-08.03 - Sherri 12/08/2009 15:23:48.1.2 - x86
Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.2815.2171 [GMT -6:00]
Running from: c:\documents and settings\Sherri\Desktop\ComboFix.exe
AV: Norton 360 *On-access scanning disabled* (Updated) {A5F1BC7C-EA33-4247-961C-0217208396C4}
FW: Norton 360 *disabled* {371C0A40-5A0C-4AD2-A6E5-69C02037FBF3}
.

((((((((((((((((((((((((( Files Created from 2009-11-08 to 2009-12-08 )))))))))))))))))))))))))))))))
.

2009-12-03 17:15 . 2009-12-03 17:15 -------- d-----w- c:\program files\ERUNT
2009-11-27 23:32 . 2009-12-08 17:46 -------- d-----w- c:\program files\Norton 360
2009-11-27 23:31 . 2009-12-03 17:09 60808 ----a-w- c:\windows\system32\S32EVNT1.DLL
2009-11-27 23:31 . 2009-12-03 17:09 124464 ----a-w- c:\windows\system32\drivers\SYMEVENT.SYS
2009-11-27 23:31 . 2009-12-03 17:09 -------- d-----w- c:\program files\Symantec
2009-11-27 15:28 . 2009-11-27 15:28 -------- d-----w- c:\documents and settings\Sherri\Application Data\Malwarebytes
2009-11-27 15:28 . 2009-09-10 20:54 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2009-11-27 15:28 . 2009-11-27 15:28 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
2009-11-27 15:28 . 2009-11-27 15:28 -------- d-----w- c:\documents and settings\All Users\Application Data\Malwarebytes
2009-11-27 15:28 . 2009-09-10 20:53 19160 ----a-w- c:\windows\system32\drivers\mbam.sys
2009-11-26 18:51 . 2009-11-26 18:51 5136 ----a-w- c:\windows\system32\pxod13.dll
2009-11-25 01:18 . 2009-12-08 18:07 -------- d-----w- c:\documents and settings\LocalService\Local Settings\Application Data\Google
2009-11-24 02:24 . 2009-11-24 02:24 -------- d-----w- c:\documents and settings\All Users\Application Data\PBGsavesDirectory
2009-11-23 21:39 . 2009-11-23 21:39 -------- d-----w- c:\program files\Snood
2009-11-23 21:17 . 2009-11-23 21:17 -------- d-----w- c:\program files\ReflexiveArcade

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2009-12-08 21:21 . 2009-03-31 00:07 -------- d-----w- c:\program files\Common Files\Symantec Shared
2009-12-08 20:56 . 2009-03-31 00:07 -------- d-----w- c:\documents and settings\All Users\Application Data\Symantec
2009-12-08 18:59 . 2004-08-03 21:59 96512 ----a-w- c:\windows\system32\drivers\atapi.sys
2009-12-03 17:18 . 2009-12-03 17:18 -------- d-----w- c:\program files\Trend Micro
2009-12-03 17:09 . 2009-11-27 23:31 806 ----a-w- c:\windows\system32\drivers\SYMEVENT.INF
2009-12-03 17:09 . 2009-11-27 23:31 10635 ----a-w- c:\windows\system32\drivers\SYMEVENT.CAT
2009-11-27 23:34 . 2009-03-31 00:09 -------- d-----w- c:\documents and settings\Sherri\Application Data\Symantec
2009-11-25 01:09 . 2009-03-30 21:50 -------- d--h--w- c:\program files\InstallShield Installation Information
2009-11-23 21:29 . 2009-08-31 15:41 -------- d---a-w- c:\documents and settings\All Users\Application Data\TEMP
2009-11-21 14:01 . 2009-03-31 01:50 -------- d-----w- c:\documents and settings\All Users\Application Data\Microsoft Help
2009-11-17 02:36 . 2009-04-01 13:34 70416 ----a-w- c:\documents and settings\Sherri\Local Settings\Application Data\GDIPFONTCACHEV1.DAT
2009-11-17 02:08 . 2009-03-31 01:54 -------- d-----w- c:\program files\Microsoft Works
2009-10-19 16:02 . 2009-09-21 16:02 3695616 ----a-w- c:\documents and settings\All Users\Application Data\Lavasoft\Ad-Aware\Update\AutoLaunch.exe
2009-10-19 16:02 . 2009-09-21 16:02 2353992 ----a-w- c:\documents and settings\All Users\Application Data\Lavasoft\Ad-Aware\Update\Ad-Aware.exe
2009-10-10 22:15 . 2009-09-12 19:39 -------- d-----w- c:\documents and settings\Sherri\Application Data\Desperate Housewives
2009-09-30 20:58 . 2008-02-18 19:38 9576 ----a-w- c:\documents and settings\All Users\Application Data\Symantec\LiveUpdate\LuRegManifests\Static\CCMSLLUM.DLL
2009-09-12 19:48 . 2009-09-12 19:48 98304 ----a-w- c:\windows\system32\CmdLineExt.dll
2009-09-11 14:18 . 2004-08-03 23:56 136192 ----a-w- c:\windows\system32\msv1_0.dll
.

------- Sigcheck -------

[7] 2009-12-08 . 9F3A2F5AA6875C72BF062C712CFA2674 . 96512 . . [5.1.2600.5512] . . c:\windows\system32\dllcache\atapi.sys
[-] 2009-12-08 18:59 . 84B647F9DF97B26A4412FE01CCEFE108 . 96512 . . [------] . . c:\windows\system32\drivers\atapi.sys
[7] 2008-04-13 . 9F3A2F5AA6875C72BF062C712CFA2674 . 96512 . . [5.1.2600.5512] . . c:\windows\ServicePackFiles\i386\atapi.sys
[7] 2008-04-13 . 9F3A2F5AA6875C72BF062C712CFA2674 . 96512 . . [5.1.2600.5512] . . c:\windows\SoftwareDistribution\Download\e9500597a78495f397efb821e37bf356\atapi.sys
[7] 2004-08-03 . CDFE4411A69C224BD1D11B2DA92DAC51 . 95360 . . [5.1.2600.2180] . . c:\windows\$NtServicePackUninstall$\atapi.sys
.
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"MimarSinan Rubber Ducky"="c:\program files\Rubber Ducky\RubberDucky.exe" [2005-07-02 1006592]
"Directory Opus Desktop Dblclk"="c:\program files\GPSoftware\Directory Opus\dopusrt.exe" [2008-02-23 275952]
"POP Peeper"="c:\program files\POP Peeper\POPPeeper.exe" [2009-08-17 1486848]
"swg"="c:\program files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe" [2009-08-31 39408]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"StartCCC"="c:\program files\ATI Technologies\ATI.ACE\Core-Static\CLIStart.exe" [2006-11-10 90112]
"RTHDCPL"="RTHDCPL.EXE" [2007-06-13 16377344]
"GrooveMonitor"="c:\program files\Microsoft Office\Office12\GrooveMonitor.exe" [2008-10-25 31072]
"zBrowser Launcher"="c:\program files\Logitech\iTouch\iTouch.exe" [2004-03-18 892928]
"Adobe Reader Speed Launcher"="c:\program files\Adobe\Reader 9.0\Reader\Reader_sl.exe" [2009-02-27 35696]
"Malwarebytes Anti-Malware (reboot)"="c:\program files\Malwarebytes' Anti-Malware\mbam.exe" [2009-09-10 1312080]
"ccApp"="c:\program files\Common Files\Symantec Shared\ccApp.exe" [2008-10-17 51048]
"osCheck"="c:\program files\Norton 360\osCheck.exe" [2008-02-26 988512]
"Google Quick Search Box"="c:\program files\Google\Quick Search Box\GoogleQuickSearchBox.exe" [2009-12-08 122880]

[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\RunOnce]
"ShowDeskFix"="shell32" [X]
"IE7-11"="advpack.dll" [2009-08-29 124928]

c:\documents and settings\Sherri\Start Menu\Programs\Startup\
AutoMailer.lnk - c:\troopmaster software\AutoMailer\AutoMailer.exe [2009-6-27 73728]
OneNote 2007 Screen Clipper and Launcher.lnk - c:\program files\Microsoft Office\Office12\ONENOTEM.EXE [2008-10-25 98696]

c:\documents and settings\All Users\Start Menu\Programs\Startup\
HotSync Manager.lnk - c:\program files\Palm\Hotsync.exe [2008-1-3 1392640]

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\pxod13]
2009-11-26 18:51 5136 ----a-w- c:\windows\system32\pxod13.dll

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\Lavasoft Ad-Aware Service]
@="Service"

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run-]
"osCheck"="c:\program files\Norton 360\osCheck.exe"
"SunJavaUpdateSched"="c:\program files\Java\jre6\bin\jusched.exe"

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring]
"DisableMonitoring"=dword:00000001

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecAntiVirus]
"DisableMonitoring"=dword:00000001

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecFirewall]
"DisableMonitoring"=dword:00000001

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]
"EnableFirewall"= 0 (0x0)

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"%windir%\\system32\\sessmgr.exe"=
"c:\\Program Files\\Microsoft Office\\Office12\\OUTLOOK.EXE"=
"c:\\Program Files\\Microsoft Office\\Office12\\GROOVE.EXE"=
"c:\\Program Files\\Microsoft Office\\Office12\\ONENOTE.EXE"=

R0 Lbd;Lbd;c:\windows\system32\drivers\Lbd.sys [8/31/2009 10:02 AM 64160]
R2 Lavasoft Ad-Aware Service;Lavasoft Ad-Aware Service;c:\program files\Lavasoft\Ad-Aware\AAWService.exe [7/3/2009 8:49 AM 1028432]
R2 LiveUpdate Notice;LiveUpdate Notice;c:\program files\Common Files\Symantec Shared\CCSVCHST.EXE [2/18/2008 1:37 PM 149352]
R2 Poweroff;Poweroff;c:\windows\system32\poweroff.exe [9/30/2009 11:02 PM 172032]
R3 EraserUtilRebootDrv;EraserUtilRebootDrv;c:\program files\Common Files\Symantec Shared\EENGINE\EraserUtilRebootDrv.sys [11/27/2009 6:50 PM 102448]
S3 COH_Mon;COH_Mon;c:\windows\system32\drivers\COH_Mon.sys [1/12/2008 8:32 PM 23888]

--- Other Services/Drivers In Memory ---

*NewlyCreated* - COMHOST

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Svchost - NetSvcs
UxTuneUp
.
------- Supplementary Scan -------
.
uStart Page = hxxp://www.bnsfinancial.com/fam/Sherri.htm
IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~2\Office12\EXCEL.EXE/3000
IE: Google Sidewiki... - c:\program files\Google\Google Toolbar\Component\GoogleToolbarDynamic_mui_en_60D6097707281E79.dll/cmsidewiki.html
.

**************************************************************************

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2009-12-08 15:26
Windows 5.1.2600 Service Pack 3 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully
hidden files: 0

**************************************************************************
.
--------------------- DLLs Loaded Under Running Processes ---------------------

- - - - - - - > 'winlogon.exe'(1032)
c:\windows\system32\Ati2evxx.dll
c:\windows\system32\pxod13.dll

- - - - - - - > 'explorer.exe'(3008)
c:\windows\system32\WININET.dll
c:\program files\GPSoftware\Directory Opus\dopushlp.dll
c:\windows\system32\ieframe.dll
c:\program files\Google\Quick Search Box\bin\1.2.1150.158\qsb.dll
c:\windows\system32\wpdshserviceobj.dll
c:\windows\system32\portabledevicetypes.dll
c:\windows\system32\portabledeviceapi.dll
.
Completion time: 2009-12-08 15:27:50
ComboFix-quarantined-files.txt 2009-12-08 21:27

Pre-Run: 228,657,106,944 bytes free
Post-Run: 228,663,578,624 bytes free

WindowsXP-KB310994-SP2-Pro-BootDisk-ENU.exe
[boot loader]
timeout=2
default=multi(0)disk(0)rdisk(0)partition(1)\WINDOWS
[operating systems]
c:\cmdcons\BOOTSECT.DAT="Microsoft Windows Recovery Console" /cmdcons
multi(0)disk(0)rdisk(0)partition(1)\WINDOWS="Microsoft Windows XP Professional" /noexecute=optin /fastdetect

- - End Of File - - 502A820014B648426C20398796ACD2D5

MrSly
2009-12-08, 23:56
Oops, just noticed that I was supposed to include a new dds report. Here they are:


DDS (Ver_09-12-01.01) - NTFSx86
Run by Sherri at 15:52:57.85 on Tue 12/08/2009
Internet Explorer: 7.0.5730.11
Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.2815.2187 [GMT -6:00]

AV: Norton 360 *On-access scanning disabled* (Updated) {A5F1BC7C-EA33-4247-961C-0217208396C4}
FW: Norton 360 *disabled* {371C0A40-5A0C-4AD2-A6E5-69C02037FBF3}

============== Running Processes ===============

C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\system32\svchost -k DcomLaunch
svchost.exe
C:\WINDOWS\System32\svchost.exe -k netsvcs
svchost.exe
C:\WINDOWS\system32\Ati2evxx.exe
svchost.exe
C:\Program Files\Common Files\Symantec Shared\ccSvcHst.exe
C:\Program Files\Lavasoft\Ad-Aware\AAWService.exe
C:\WINDOWS\system32\spoolsv.exe
svchost.exe
C:\Program Files\Symantec\LiveUpdate\AluSchedulerSvc.exe
C:\Program Files\Common Files\Nero\Nero BackItUp 4\NBService.exe
C:\WINDOWS\system32\poweroff.exe
C:\WINDOWS\RTHDCPL.EXE
C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe
C:\Program Files\Common Files\Symantec Shared\ccSvcHst.exe
C:\Program Files\Google\Quick Search Box\GoogleQuickSearchBox.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\GPSoftware\Directory Opus\dopusrt.exe
C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe
C:\WINDOWS\System32\svchost.exe -k HTTPFilter
C:\Program Files\Lavasoft\Ad-Aware\AAWTray.exe
C:\WINDOWS\system32\svchost.exe -k imgsvc
C:\WINDOWS\explorer.exe
C:\WINDOWS\system32\notepad.exe
C:\Program Files\Internet Explorer\IEXPLORE.EXE
C:\WINDOWS\system32\wscntfy.exe
C:\Documents and Settings\Sherri\Desktop\dds.scr

============== Pseudo HJT Report ===============

uStart Page = hxxp://www.bnsfinancial.com/fam/Sherri.htm
BHO: Adobe PDF Link Helper: {18df081c-e8ad-4283-a596-fa578c2ebdc3} - c:\program files\common files\adobe\acrobat\activex\AcroIEHelperShim.dll
BHO: NCO 2.0 IE BHO: {602adb0e-4aff-4217-8aa1-95dac4dfa408} - c:\program files\common files\symantec shared\coshared\browser\2.6\coIEPlg.dll
BHO: Symantec Intrusion Prevention: {6d53ec84-6aae-4787-aeee-f4628f01010c} - c:\progra~1\common~1\symant~1\ids\IPSBHO.dll
BHO: Groove GFS Browser Helper: {72853161-30c5-4d22-b7f9-0bbc1d38a37e} - c:\program files\microsoft office\office12\GrooveShellExtensions.dll
BHO: Google Toolbar Helper: {aa58ed58-01dd-4d91-8333-cf10577473f7} - c:\program files\google\google toolbar\GoogleToolbar_32.dll
BHO: Google Toolbar Notifier BHO: {af69de43-7d58-4638-b6fa-ce66b5ad205d} - c:\program files\google\googletoolbarnotifier\5.4.4525.1752\swg.dll
BHO: Java(tm) Plug-In 2 SSV Helper: {dbc80044-a445-435b-bc74-9c25c1c588a9} - c:\program files\java\jre6\bin\jp2ssv.dll
BHO: JQSIEStartDetectorImpl Class: {e7e6f031-17ce-4c07-bc86-eabfe594f69c} - c:\program files\java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll
TB: Show Norton Toolbar: {7febefe3-6b19-4349-98d2-ffb09d4b49ca} - c:\program files\common files\symantec shared\coshared\browser\2.6\CoIEPlg.dll
TB: Google Toolbar: {2318c2b1-4965-11d4-9b18-009027a5cd4f} - c:\program files\google\google toolbar\GoogleToolbar_32.dll
uRun: [MimarSinan Rubber Ducky] "c:\program files\rubber ducky\RubberDucky.exe"
uRun: [Directory Opus Desktop Dblclk] "c:\program files\gpsoftware\directory opus\dopusrt.exe" /dblclk
uRun: [POP Peeper] "c:\program files\pop peeper\POPPeeper.exe" -min
uRun: [swg] "c:\program files\google\googletoolbarnotifier\GoogleToolbarNotifier.exe"
mRun: [StartCCC] c:\program files\ati technologies\ati.ace\core-static\CLIStart.exe
mRun: [RTHDCPL] RTHDCPL.EXE
mRun: [GrooveMonitor] "c:\program files\microsoft office\office12\GrooveMonitor.exe"
mRun: [zBrowser Launcher] c:\program files\logitech\itouch\iTouch.exe
mRun: [Adobe Reader Speed Launcher] "c:\program files\adobe\reader 9.0\reader\Reader_sl.exe"
mRun: [Malwarebytes Anti-Malware (reboot)] "c:\program files\malwarebytes' anti-malware\mbam.exe" /runcleanupscript
mRun: [ccApp] "c:\program files\common files\symantec shared\ccApp.exe"
mRun: [osCheck] "c:\program files\norton 360\osCheck.exe"
mRun: [Google Quick Search Box] "c:\program files\google\quick search box\GoogleQuickSearchBox.exe" /autorun
dRunOnce: [ShowDeskFix] regsvr32 /s /n /i:u shell32
dRunOnce: [IE7-11] rundll32 advpack.dll,LaunchINFSection NR_IE7en.inf,AfterUserStart
StartupFolder: c:\docume~1\sherri\startm~1\programs\startup\automa~1.lnk - c:\troopmaster software\automailer\AutoMailer.exe
StartupFolder: c:\docume~1\sherri\startm~1\programs\startup\onenot~1.lnk - c:\program files\microsoft office\office12\ONENOTEM.EXE
StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\hotsyn~1.lnk - c:\program files\palm\Hotsync.exe
IE: E&xport to Microsoft Excel - c:\progra~1\micros~2\office12\EXCEL.EXE/3000
IE: Google Sidewiki... - c:\program files\google\google toolbar\component\GoogleToolbarDynamic_mui_en_60D6097707281E79.dll/cmsidewiki.html
IE: {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe
IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe
IE: {2670000A-7350-4f3c-8081-5663EE0C6C49} - {48E73304-E1D6-4330-914C-F5F514E3486C} - c:\progra~1\micros~2\office12\ONBttnIE.dll
IE: {92780B25-18CC-41C8-B9BE-3C9C571A8263} - {FF059E31-CC5A-4E2E-BF3B-96E929D65503} - c:\progra~1\micros~2\office12\REFIEBAR.DLL
DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} - hxxp://update.microsoft.com/microsoftupdate/v6/V5Controls/en/x86/client/wuweb_site.cab?1238780007687
DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} - hxxp://update.microsoft.com/microsoftupdate/v6/V5Controls/en/x86/client/muweb_site.cab?1238779998343
DPF: {7530BFB8-7293-4D34-9923-61A11451AFC5} - hxxp://download.eset.com/special/eos/OnlineScanner.cab
DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_13-windows-i586.cab
DPF: {8FFBE65D-2C9C-4669-84BD-5829DC0B603C} - hxxp://fpdownload.macromedia.com/get/flashplayer/current/polarbear/ultrashim.cab
DPF: {CAFEEFAC-0016-0000-0013-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_13-windows-i586.cab
DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_13-windows-i586.cab
Handler: cozi - {5356518D-FE9C-4E08-9C1F-1E872ECD367F} - c:\program files\cozi express\CoziProtocolHandler.dll
Handler: grooveLocalGWS - {88FED34C-F0CA-4636-A375-3CB6248B04CD} - c:\program files\microsoft office\office12\GrooveSystemServices.dll
Notify: AtiExtEvent - Ati2evxx.dll
Notify: pxod13 - pxod13.dll
SSODL: WPDShServiceObj - {AAA288BA-9A4C-45B0-95D7-94D524869DB5} - c:\windows\system32\wpdshserviceobj.dll
SEH: Groove GFS Stub Execution Hook: {b5a7f190-dda6-4420-b3ba-52453494e6cd} - c:\program files\microsoft office\office12\GrooveShellExtensions.dll

============= SERVICES / DRIVERS ===============

R0 Lbd;Lbd;c:\windows\system32\drivers\Lbd.sys [2009-8-31 64160]
R2 ccEvtMgr;Symantec Event Manager;c:\program files\common files\symantec shared\CCSVCHST.EXE [2008-2-18 149352]
R2 ccSetMgr;Symantec Settings Manager;c:\program files\common files\symantec shared\CCSVCHST.EXE [2008-2-18 149352]
R2 Lavasoft Ad-Aware Service;Lavasoft Ad-Aware Service;c:\program files\lavasoft\ad-aware\AAWService.exe [2009-7-3 1028432]
R2 LiveUpdate Notice;LiveUpdate Notice;c:\program files\common files\symantec shared\CCSVCHST.EXE [2008-2-18 149352]
R2 Poweroff;Poweroff;c:\windows\system32\poweroff.exe [2009-9-30 172032]
R3 EraserUtilRebootDrv;EraserUtilRebootDrv;c:\program files\common files\symantec shared\eengine\EraserUtilRebootDrv.sys [2009-11-27 102448]
R3 NAVENG;NAVENG;c:\progra~1\common~1\symant~1\virusd~1\20091208.002\NAVENG.SYS [2009-12-8 84912]
R3 NAVEX15;NAVEX15;c:\progra~1\common~1\symant~1\virusd~1\20091208.002\NAVEX15.SYS [2009-12-8 1323568]
S3 COH_Mon;COH_Mon;c:\windows\system32\drivers\COH_Mon.sys [2008-1-12 23888]
S3 Symantec Core LC;Symantec Core LC;c:\progra~1\common~1\symant~1\ccpd-lc\symlcsvc.exe [2009-11-27 1245064]

=============== Created Last 30 ================

2009-12-08 21:22:59 0 d-sha-r- C:\cmdcons
2009-12-08 21:22:21 98816 ----a-w- c:\windows\sed.exe
2009-12-08 21:22:21 77312 ----a-w- c:\windows\MBR.exe
2009-12-08 21:22:21 260096 ----a-w- c:\windows\PEV.exe
2009-12-08 21:22:21 161792 ----a-w- c:\windows\SWREG.exe
2009-12-03 17:18:10 0 d-----w- c:\program files\Trend Micro
2009-12-01 04:37:49 1536 ----a-w- C:\palm.grf
2009-11-27 23:32:31 0 d-----w- c:\program files\Norton 360
2009-11-27 23:31:25 806 ----a-w- c:\windows\system32\drivers\SYMEVENT.INF
2009-11-27 23:31:25 60808 ----a-w- c:\windows\system32\S32EVNT1.DLL
2009-11-27 23:31:25 124464 ----a-w- c:\windows\system32\drivers\SYMEVENT.SYS
2009-11-27 23:31:25 10635 ----a-w- c:\windows\system32\drivers\SYMEVENT.CAT
2009-11-27 23:31:17 0 d-----w- c:\program files\Symantec
2009-11-27 15:28:46 0 d-----w- c:\docume~1\sherri\applic~1\Malwarebytes
2009-11-27 15:28:41 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2009-11-27 15:28:39 19160 ----a-w- c:\windows\system32\drivers\mbam.sys
2009-11-27 15:28:39 0 d-----w- c:\program files\Malwarebytes' Anti-Malware
2009-11-27 15:28:39 0 d-----w- c:\docume~1\alluse~1\applic~1\Malwarebytes
2009-11-26 18:51:36 5136 ----a-w- c:\windows\system32\pxod13.dll
2009-11-24 02:24:11 0 d-----w- c:\docume~1\alluse~1\applic~1\PBGsavesDirectory
2009-11-23 21:39:19 0 d-----w- c:\program files\Snood
2009-11-23 21:17:15 0 d-----w- c:\program files\ReflexiveArcade

==================== Find3M ====================

2009-12-08 18:59:37 96512 ----a-w- c:\windows\system32\drivers\atapi.sys
2009-09-12 19:48:01 98304 ----a-w- c:\windows\system32\CmdLineExt.dll
2009-09-11 14:18:39 136192 ----a-w- c:\windows\system32\msv1_0.dll
2009-03-30 21:26:10 32768 --sha-w- c:\windows\system32\config\systemprofile\local settings\history\history.ie5\mshist012009033020090331\index.dat

============= FINISH: 15:53:03.95 ===============

Blade81
2009-12-09, 00:38
Hi,

Print these instructions since you won't be able to access them in recovery console.

1. Restart your computer
2. Before Windows loads, you will be prompted to choose which Operating System to start
3. Use the up and down arrow key to select Microsoft Windows Recovery Console
4. You must enter which Windows installation to log onto. Type 1 and press enter.
5. At the C:\Windows prompt, type the following bolded text, and press Enter:

copy /y c:\windows\system32\drivers\atapi.sys c:\windows\system32\drivers\atapi.sys.vir

6. At the next prompt, type the following bolded text, and press Enter:

copy /y c:\windows\system32\dllcache\atapi.sys c:\windows\system32\drivers\atapi.sys

7. At the next prompt, type the following bolded text, and press Enter:

exit

Windows will now begin loading. Re-run GMER and post back its log.

MrSly
2009-12-09, 01:21
I get a message that says "The parameter is not valid. Try /? for help".

However, I am no longer hearing the random sounds anymore, so that's a plus! :)

MrSly
2009-12-09, 01:22
I get that message when doing the first "copy......" step. I get into the console just fine.

Blade81
2009-12-09, 08:30
Hi,

When you arrive at recovery console, give this command first before those copy commands:
set allowallpaths = true

Let me know if that works.

MrSly
2009-12-09, 19:13
No change. Same message.

I typed the SET command and didn't receive any errors, so I'm guessing it worked. Then did the COPY command and still get "The parameter is not valid. Try /? for help".

Upon typing COPY /? it only has COPY source destination as options. It doesn't appear to accept any parameters for the COPY command.

Blade81
2009-12-09, 19:22
Hi,

Open notepad and then copy and paste the bolded lines below into it. Go to File > save as and name the file fixes.bat, change the Save as type to all files and save it to your desktop.
COPY /y c:\windows\system32\dllcache\atapi.sys c:\atapi.sys
DEL %0

Right click on fixes.bat file and select 'run as administrator' to execute it. Verify that c:\atapi.sys file exists and continue forward if it's present. If not, don't go further with the instructions and let me know.



Download The Avenger by Swandog46 from here (http://swandog46.geekstogo.com/avenger2/download.php).

Unzip/extract it to a folder on your desktop.

Double click on avenger.exe to run The Avenger.

Click OK.

Make sure that the box next to Scan for rootkits has a tick in it and that the box next to Automatically disable any rootkits found does not have a tick in it.

Copy all of the text in the below textbox to the clibpboard by highlighting it and then pressing Ctrl+C.

Files to move:
c:\atapi.sys|c:\windows\System32\drivers\atapi.sys

In the avenger window, click the Paste Script from Clipboard, http://img220.imageshack.us/img220/8923/pastets4.png button.

Click the Execute button.

You will be asked Are you sure you want to execute the current script?.

Click Yes.

You will now be asked First step completed --- The Avenger has been successfully set up to run on next boot. Reboot now?.

Click Yes.

Your PC will now be rebooted.

Note: If the above script contains Drivers to delete: or Drivers to disable:, then The Avenger will require two reboots to complete its operation.

If that is the case, it will force a BSOD on the first reboot. This is normal & expected behaviour.

After your PC has completed the necessary reboots, a log should automatically open. If it does not automatically open, then the log can be found at %systemdrive%\avenger.txt (typically C:\avenger.txt).

Please post this log in your next reply.

MrSly
2009-12-09, 19:39
I really appreciate all your help, not to mention the super quick responses!! That seemed to work just fine. Here's the log:

Logfile of The Avenger Version 2.0, (c) by Swandog46
http://swandog46.geekstogo.com

Platform: Windows XP

*******************

Script file opened successfully.
Script file read successfully.

Backups directory opened successfully at C:\Avenger

*******************

Beginning to process script file:

Rootkit scan active.
No rootkits found!

File move operation "c:\atapi.sys|c:\windows\System32\drivers\atapi.sys" completed successfully.

Completed script processing.

*******************

Finished! Terminate.

Blade81
2009-12-09, 19:41
Hi,

Reboot and after that run ComboFix again. Post back the resultant log :)

MrSly
2009-12-09, 21:52
In a strange turn of events, I no longer can access Norton 360 on my machine. It no longer shows up in my taskbar, and I've tried everything I can think of to get into it to turn it off before running Combofix. Something is keeping it from starting. I click on the icon on my desktop to start it, and the hard drive accesses for 3 seconds, but it never starts. I've tried running from Start/Programs with the same results. And I don't see it running in the Task Manager.

Since I couldn't get into Norton to shut it down, I figured it wasn't running. So I started Combofix. Combofix says that Norton 360 is running and it will probably cause problems with the run, including possible hardware damage (or something like that). Since I'm trying to avoid that, I rebooted the computer.

What should I do at this point?

Blade81
2009-12-10, 07:16
Hi,

Better uninstall Norton for now. You can reinstall it after we've finished. Removal tool here (http://service1.symantec.com/Support/tsgeninfo.nsf/docid/2005033108162039) if needed.

MrSly
2009-12-10, 21:11
It took a very long time to uninstall Norton (6 hours). But it's gone now. Here is the log you asked for:

ComboFix 09-12-08.03 - Sherri 12/10/2009 12:55:12.2.2 - x86
Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.2815.2331 [GMT -6:00]
Running from: c:\documents and settings\Sherri\Desktop\ComboFix.exe
.

((((((((((((((((((((((((( Files Created from 2009-11-10 to 2009-12-10 )))))))))))))))))))))))))))))))
.

2009-12-10 18:05 . 2009-12-10 18:05 -------- d-----w- c:\windows\E80F62FF5D3C4A1984099721F2928206.TMP
2009-12-03 17:18 . 2009-12-03 17:18 -------- d-----w- c:\program files\Trend Micro
2009-12-03 17:15 . 2009-12-03 17:15 -------- d-----w- c:\program files\ERUNT
2009-11-27 23:31 . 2009-12-03 17:09 60808 ----a-w- c:\windows\system32\S32EVNT1.DLL
2009-11-27 23:31 . 2009-12-03 17:09 124464 ----a-w- c:\windows\system32\drivers\SYMEVENT.SYS
2009-11-27 23:31 . 2009-12-03 17:09 -------- d-----w- c:\program files\Symantec
2009-11-27 15:28 . 2009-11-27 15:28 -------- d-----w- c:\documents and settings\Sherri\Application Data\Malwarebytes
2009-11-27 15:28 . 2009-09-10 20:54 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2009-11-27 15:28 . 2009-11-27 15:28 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
2009-11-27 15:28 . 2009-11-27 15:28 -------- d-----w- c:\documents and settings\All Users\Application Data\Malwarebytes
2009-11-27 15:28 . 2009-09-10 20:53 19160 ----a-w- c:\windows\system32\drivers\mbam.sys
2009-11-26 18:51 . 2009-11-26 18:51 5136 ----a-w- c:\windows\system32\pxod13.dll
2009-11-25 01:18 . 2009-12-08 18:07 -------- d-----w- c:\documents and settings\LocalService\Local Settings\Application Data\Google
2009-11-24 02:24 . 2009-11-24 02:24 -------- d-----w- c:\documents and settings\All Users\Application Data\PBGsavesDirectory
2009-11-23 21:39 . 2009-11-23 21:39 -------- d-----w- c:\program files\Snood
2009-11-23 21:17 . 2009-11-23 21:17 -------- d-----w- c:\program files\ReflexiveArcade

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2009-12-10 18:51 . 2009-03-31 00:07 -------- d-----w- c:\program files\Common Files\Symantec Shared
2009-12-10 18:51 . 2009-03-31 00:09 -------- d-----w- c:\documents and settings\Sherri\Application Data\Symantec
2009-12-10 18:05 . 2009-03-31 00:07 -------- d-----w- c:\documents and settings\All Users\Application Data\Symantec
2009-12-08 18:59 . 2004-08-03 21:59 96512 ----a-w- c:\windows\system32\drivers\atapi.sys
2009-12-03 17:09 . 2009-11-27 23:31 806 ----a-w- c:\windows\system32\drivers\SYMEVENT.INF
2009-12-03 17:09 . 2009-11-27 23:31 10635 ----a-w- c:\windows\system32\drivers\SYMEVENT.CAT
2009-11-25 01:09 . 2009-03-30 21:50 -------- d--h--w- c:\program files\InstallShield Installation Information
2009-11-23 21:29 . 2009-08-31 15:41 -------- d---a-w- c:\documents and settings\All Users\Application Data\TEMP
2009-11-21 14:01 . 2009-03-31 01:50 -------- d-----w- c:\documents and settings\All Users\Application Data\Microsoft Help
2009-11-17 02:36 . 2009-04-01 13:34 70416 ----a-w- c:\documents and settings\Sherri\Local Settings\Application Data\GDIPFONTCACHEV1.DAT
2009-11-17 02:08 . 2009-03-31 01:54 -------- d-----w- c:\program files\Microsoft Works
2009-10-19 16:02 . 2009-09-21 16:02 3695616 ----a-w- c:\documents and settings\All Users\Application Data\Lavasoft\Ad-Aware\Update\AutoLaunch.exe
2009-10-19 16:02 . 2009-09-21 16:02 2353992 ----a-w- c:\documents and settings\All Users\Application Data\Lavasoft\Ad-Aware\Update\Ad-Aware.exe
2009-09-12 19:48 . 2009-09-12 19:48 98304 ----a-w- c:\windows\system32\CmdLineExt.dll
.

((((((((((((((((((((((((((((( SnapShot@2009-12-08_21.26.45 )))))))))))))))))))))))))))))))))))))))))
.
+ 2009-03-30 21:26 . 2009-12-10 15:47 32768 c:\windows\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\index.dat
- 2009-03-30 21:26 . 2009-12-08 17:46 32768 c:\windows\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\index.dat
+ 2009-03-30 21:26 . 2009-12-10 15:47 32768 c:\windows\system32\config\systemprofile\Local Settings\History\History.IE5\index.dat
- 2009-03-30 21:26 . 2009-12-08 17:46 32768 c:\windows\system32\config\systemprofile\Local Settings\History\History.IE5\index.dat
+ 2009-12-10 15:47 . 2009-12-10 15:47 16384 c:\windows\system32\config\systemprofile\Cookies\index.dat
+ 2009-12-10 18:05 . 2009-12-10 18:05 22016 c:\windows\E80F62FF5D3C4A1984099721F2928206.TMP\WiseCustomCall.dll
.
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"MimarSinan Rubber Ducky"="c:\program files\Rubber Ducky\RubberDucky.exe" [2005-07-02 1006592]
"Directory Opus Desktop Dblclk"="c:\program files\GPSoftware\Directory Opus\dopusrt.exe" [2008-02-23 275952]
"POP Peeper"="c:\program files\POP Peeper\POPPeeper.exe" [2009-08-17 1486848]
"swg"="c:\program files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe" [2009-08-31 39408]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"StartCCC"="c:\program files\ATI Technologies\ATI.ACE\Core-Static\CLIStart.exe" [2006-11-10 90112]
"RTHDCPL"="RTHDCPL.EXE" [2007-06-13 16377344]
"GrooveMonitor"="c:\program files\Microsoft Office\Office12\GrooveMonitor.exe" [2008-10-25 31072]
"zBrowser Launcher"="c:\program files\Logitech\iTouch\iTouch.exe" [2004-03-18 892928]
"Adobe Reader Speed Launcher"="c:\program files\Adobe\Reader 9.0\Reader\Reader_sl.exe" [2009-02-27 35696]
"Malwarebytes Anti-Malware (reboot)"="c:\program files\Malwarebytes' Anti-Malware\mbam.exe" [2009-09-10 1312080]
"Google Quick Search Box"="c:\program files\Google\Quick Search Box\GoogleQuickSearchBox.exe" [2009-12-08 122880]

[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\RunOnce]
"ShowDeskFix"="shell32" [X]
"IE7-11"="advpack.dll" [2009-08-29 124928]

c:\documents and settings\Sherri\Start Menu\Programs\Startup\
AutoMailer.lnk - c:\troopmaster software\AutoMailer\AutoMailer.exe [2009-6-27 73728]
OneNote 2007 Screen Clipper and Launcher.lnk - c:\program files\Microsoft Office\Office12\ONENOTEM.EXE [2008-10-25 98696]

c:\documents and settings\All Users\Start Menu\Programs\Startup\
HotSync Manager.lnk - c:\program files\Palm\Hotsync.exe [2008-1-3 1392640]

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\pxod13]
2009-11-26 18:51 5136 ----a-w- c:\windows\system32\pxod13.dll

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\Lavasoft Ad-Aware Service]
@="Service"

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run-]
"osCheck"="c:\program files\Norton 360\osCheck.exe"
"SunJavaUpdateSched"="c:\program files\Java\jre6\bin\jusched.exe"

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring]
"DisableMonitoring"=dword:00000001

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecAntiVirus]
"DisableMonitoring"=dword:00000001

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecFirewall]
"DisableMonitoring"=dword:00000001

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"%windir%\\system32\\sessmgr.exe"=
"c:\\Program Files\\Microsoft Office\\Office12\\OUTLOOK.EXE"=
"c:\\Program Files\\Microsoft Office\\Office12\\GROOVE.EXE"=
"c:\\Program Files\\Microsoft Office\\Office12\\ONENOTE.EXE"=

R0 Lbd;Lbd;c:\windows\system32\drivers\Lbd.sys [8/31/2009 10:02 AM 64160]
R2 Lavasoft Ad-Aware Service;Lavasoft Ad-Aware Service;c:\program files\Lavasoft\Ad-Aware\AAWService.exe [7/3/2009 8:49 AM 1028432]
R2 Poweroff;Poweroff;c:\windows\system32\poweroff.exe [9/30/2009 11:02 PM 172032]

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Svchost - NetSvcs
UxTuneUp
.
------- Supplementary Scan -------
.
uStart Page = hxxp://www.bnsfinancial.com/fam/Sherri.htm
IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~2\Office12\EXCEL.EXE/3000
IE: Google Sidewiki... - c:\program files\Google\Google Toolbar\Component\GoogleToolbarDynamic_mui_en_60D6097707281E79.dll/cmsidewiki.html
.

**************************************************************************

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2009-12-10 12:58
Windows 5.1.2600 Service Pack 3 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully
hidden files: 0

**************************************************************************
.
--------------------- DLLs Loaded Under Running Processes ---------------------

- - - - - - - > 'winlogon.exe'(1024)
c:\windows\system32\Ati2evxx.dll
c:\windows\system32\pxod13.dll

- - - - - - - > 'explorer.exe'(3644)
c:\windows\system32\WININET.dll
c:\program files\Logitech\iTouch\iTchHk.dll
c:\program files\Common Files\Logitech\Scrolling\LgMsgHk.dll
c:\windows\system32\ieframe.dll
c:\program files\GPSoftware\Directory Opus\dopushlp.dll
c:\program files\Google\Quick Search Box\bin\1.2.1150.158\qsb.dll
c:\windows\system32\wpdshserviceobj.dll
c:\windows\system32\portabledevicetypes.dll
c:\windows\system32\portabledeviceapi.dll
.
Completion time: 2009-12-10 12:59:36
ComboFix-quarantined-files.txt 2009-12-10 18:59
ComboFix2.txt 2009-12-08 21:27

Pre-Run: 229,727,350,784 bytes free
Post-Run: 229,697,564,672 bytes free

- - End Of File - - E522F8FB0ED200D3CAD8034F7ECA1B63

Blade81
2009-12-10, 22:29
Hi,

Upload c:\windows\system32\pxod13.dll file to http://www.virustotal.com and post back the results.

MrSly
2009-12-10, 22:40
Please find attached a PDF of the results from VirusTotal.

Blade81
2009-12-10, 22:46
Thanks for the results. Let's take the needed action :)

Open notepad and copy/paste the text in the quotebox below into it:



http://forums.spybot.info/showthread.php?t=53879
Collect::
c:\windows\system32\pxod13.dll



Save this as
CFScript

A word of warning: Neither I nor sUBs are responsible for any damage you may have caused your machine. This tool is not a toy and not for everyday use.

http://img.photobucket.com/albums/v666/sUBs/CFScriptB-4.gif

Close all browser windows and refering to the picture above, drag CFScript into ComboFix.exe
Then post the resultant log.


Uninstall old Adobe Reader versions and get the latest one (9.2) here (http://www.adobe.com/support/downloads/product.jsp?product=10&platform=Windows) or get Foxit Reader here (http://www.foxitsoftware.com/pdf/reader_2/down_reader.htm). Make sure you don't install toolbar if choose Foxit Reader! You may also check free readers introduced here (http://pdfreaders.org/).


Uninstall vulnerable Flash versions by following instructions here (http://kb2.adobe.com/cps/141/tn_14157.html). Fresh version can be obtained here (http://get.adobe.com/flashplayer/).


Your Java is out of date. Older versions have vulnerabilities that malware can use to infect your system. Please follow these steps to remove older version Java components and update to the latest version...

Updating Java:

Download the latest version of Java Runtime Environment (JRE) 6 Update 17 (http://java.sun.com/javase/downloads/index.jsp).
Click the
Download
button to the right.
Select Windows on platform combobox and check the box that says:
Accept License Agreement. Click continue.

The page will refresh.
Click on the link to download Windows Offline Installation with or without Multi-language and save to your desktop.
Close any programs you may have running - especially your web browser.
Go to Start > Control Panel double-click on Add/Remove programs and remove all older versions of Java.
Check any item with Java Runtime Environment (JRE or J2SE) in the name.
Click the Remove or Change/Remove button.
Repeat as many times as necessary to remove each Java versions.
Reboot your computer once all Java components are removed.
Then from your desktop double-click on jre-6u17-windows-i586-p.exe to install the newest version. Uncheck Carbonite online backup trial if it's offered there.



Download ATF (Atribune Temp File) Cleaner© by Atribune (http://www.atribune.org/ccount/click.php?id=1) to your desktop.

Double-click ATF Cleaner.exe to open it

Under Main choose:
Windows Temp
Current User Temp
All Users Temp
Cookies
Temporary Internet Files
Prefetch
Java Cache
*The other boxes are optional*
Then click the Empty Selected button.

If you use Firefox:
Click Firefox at the top and choose: Select All
Click the Empty Selected button.
NOTE: If you would like to keep your saved passwords, please click NO at the prompt.

If you use Opera:
Click Opera at the top and choose: Select All
Click the Empty Selected button.
NOTE: If you would like to keep your saved passwords, please click NO at the prompt.

Click Exit on the Main menu to close the program.


Please run an online scan with Kaspersky Online Scanner (http://www.kaspersky.com/kos/eng/partner/default/kavwebscan.html) as instructed in the screenshot here (http://i275.photobucket.com/albums/jj285/Bleeping/KAS/KAS9.gif).


Post back its report, a fresh dds.txt log and above mentioned ComboFix resultant log.

MrSly
2009-12-10, 23:33
Wow, that's a lot of stuff! Here is the Combofix log as requested, and I'll get to work on all the other stuff and post the other logs and reports ASAP!

Thanks again for your help. I know there is NO WAY I would have been able to find all this stuff on here. You know, maybe it's time to get my daughter her OWN computer to mess up as much as she wants, and stay off this one! Anyway, thanks again!


ComboFix 09-12-08.03 - Sherri 12/10/2009 14:58:03.3.2 - x86
Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.2815.2273 [GMT -6:00]
Running from: c:\documents and settings\Sherri\Desktop\ComboFix.exe
Command switches used :: c:\documents and settings\Sherri\Desktop\CFScript

file zipped: c:\windows\system32\pxod13.dll
.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.

c:\windows\system32\pxod13.dll

.
((((((((((((((((((((((((( Files Created from 2009-11-10 to 2009-12-10 )))))))))))))))))))))))))))))))
.

2009-12-10 18:05 . 2009-12-10 18:05 -------- d-----w- c:\windows\E80F62FF5D3C4A1984099721F2928206.TMP
2009-12-03 17:18 . 2009-12-03 17:18 -------- d-----w- c:\program files\Trend Micro
2009-12-03 17:15 . 2009-12-03 17:15 -------- d-----w- c:\program files\ERUNT
2009-11-27 23:31 . 2009-12-03 17:09 60808 ----a-w- c:\windows\system32\S32EVNT1.DLL
2009-11-27 23:31 . 2009-12-03 17:09 124464 ----a-w- c:\windows\system32\drivers\SYMEVENT.SYS
2009-11-27 23:31 . 2009-12-03 17:09 -------- d-----w- c:\program files\Symantec
2009-11-27 15:28 . 2009-11-27 15:28 -------- d-----w- c:\documents and settings\Sherri\Application Data\Malwarebytes
2009-11-27 15:28 . 2009-09-10 20:54 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2009-11-27 15:28 . 2009-11-27 15:28 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
2009-11-27 15:28 . 2009-11-27 15:28 -------- d-----w- c:\documents and settings\All Users\Application Data\Malwarebytes
2009-11-27 15:28 . 2009-09-10 20:53 19160 ----a-w- c:\windows\system32\drivers\mbam.sys
2009-11-25 01:18 . 2009-12-08 18:07 -------- d-----w- c:\documents and settings\LocalService\Local Settings\Application Data\Google
2009-11-24 02:24 . 2009-11-24 02:24 -------- d-----w- c:\documents and settings\All Users\Application Data\PBGsavesDirectory
2009-11-23 21:39 . 2009-11-23 21:39 -------- d-----w- c:\program files\Snood
2009-11-23 21:17 . 2009-11-23 21:17 -------- d-----w- c:\program files\ReflexiveArcade

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2009-12-10 18:51 . 2009-03-31 00:07 -------- d-----w- c:\program files\Common Files\Symantec Shared
2009-12-10 18:51 . 2009-03-31 00:09 -------- d-----w- c:\documents and settings\Sherri\Application Data\Symantec
2009-12-10 18:05 . 2009-03-31 00:07 -------- d-----w- c:\documents and settings\All Users\Application Data\Symantec
2009-12-08 18:59 . 2004-08-03 21:59 96512 ------w- c:\windows\system32\drivers\atapi.sys
2009-12-03 17:09 . 2009-11-27 23:31 806 ----a-w- c:\windows\system32\drivers\SYMEVENT.INF
2009-12-03 17:09 . 2009-11-27 23:31 10635 ----a-w- c:\windows\system32\drivers\SYMEVENT.CAT
2009-11-25 01:09 . 2009-03-30 21:50 -------- d--h--w- c:\program files\InstallShield Installation Information
2009-11-23 21:29 . 2009-08-31 15:41 -------- d---a-w- c:\documents and settings\All Users\Application Data\TEMP
2009-11-21 14:01 . 2009-03-31 01:50 -------- d-----w- c:\documents and settings\All Users\Application Data\Microsoft Help
2009-11-17 02:36 . 2009-04-01 13:34 70416 ----a-w- c:\documents and settings\Sherri\Local Settings\Application Data\GDIPFONTCACHEV1.DAT
2009-11-17 02:08 . 2009-03-31 01:54 -------- d-----w- c:\program files\Microsoft Works
2009-10-19 16:02 . 2009-09-21 16:02 3695616 ----a-w- c:\documents and settings\All Users\Application Data\Lavasoft\Ad-Aware\Update\AutoLaunch.exe
2009-10-19 16:02 . 2009-09-21 16:02 2353992 ----a-w- c:\documents and settings\All Users\Application Data\Lavasoft\Ad-Aware\Update\Ad-Aware.exe
2009-09-12 19:48 . 2009-09-12 19:48 98304 ----a-w- c:\windows\system32\CmdLineExt.dll
.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"MimarSinan Rubber Ducky"="c:\program files\Rubber Ducky\RubberDucky.exe" [2005-07-02 1006592]
"Directory Opus Desktop Dblclk"="c:\program files\GPSoftware\Directory Opus\dopusrt.exe" [2008-02-23 275952]
"POP Peeper"="c:\program files\POP Peeper\POPPeeper.exe" [2009-08-17 1486848]
"swg"="c:\program files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe" [2009-08-31 39408]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"StartCCC"="c:\program files\ATI Technologies\ATI.ACE\Core-Static\CLIStart.exe" [2006-11-10 90112]
"RTHDCPL"="RTHDCPL.EXE" [2007-06-13 16377344]
"GrooveMonitor"="c:\program files\Microsoft Office\Office12\GrooveMonitor.exe" [2008-10-25 31072]
"zBrowser Launcher"="c:\program files\Logitech\iTouch\iTouch.exe" [2004-03-18 892928]
"Adobe Reader Speed Launcher"="c:\program files\Adobe\Reader 9.0\Reader\Reader_sl.exe" [2009-02-27 35696]
"Malwarebytes Anti-Malware (reboot)"="c:\program files\Malwarebytes' Anti-Malware\mbam.exe" [2009-09-10 1312080]
"Google Quick Search Box"="c:\program files\Google\Quick Search Box\GoogleQuickSearchBox.exe" [2009-12-08 122880]

[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\RunOnce]
"ShowDeskFix"="shell32" [X]
"IE7-11"="advpack.dll" [2009-08-29 124928]

c:\documents and settings\Sherri\Start Menu\Programs\Startup\
AutoMailer.lnk - c:\troopmaster software\AutoMailer\AutoMailer.exe [2009-6-27 73728]
OneNote 2007 Screen Clipper and Launcher.lnk - c:\program files\Microsoft Office\Office12\ONENOTEM.EXE [2008-10-25 98696]

c:\documents and settings\All Users\Start Menu\Programs\Startup\
HotSync Manager.lnk - c:\program files\Palm\Hotsync.exe [2008-1-3 1392640]

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\Lavasoft Ad-Aware Service]
@="Service"

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run-]
"osCheck"="c:\program files\Norton 360\osCheck.exe"
"SunJavaUpdateSched"="c:\program files\Java\jre6\bin\jusched.exe"

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring]
"DisableMonitoring"=dword:00000001

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecAntiVirus]
"DisableMonitoring"=dword:00000001

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecFirewall]
"DisableMonitoring"=dword:00000001

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"%windir%\\system32\\sessmgr.exe"=
"c:\\Program Files\\Microsoft Office\\Office12\\OUTLOOK.EXE"=
"c:\\Program Files\\Microsoft Office\\Office12\\GROOVE.EXE"=
"c:\\Program Files\\Microsoft Office\\Office12\\ONENOTE.EXE"=

R0 Lbd;Lbd;c:\windows\system32\drivers\Lbd.sys [8/31/2009 10:02 AM 64160]
R2 Lavasoft Ad-Aware Service;Lavasoft Ad-Aware Service;c:\program files\Lavasoft\Ad-Aware\AAWService.exe [7/3/2009 8:49 AM 1028432]
R2 Poweroff;Poweroff;c:\windows\system32\poweroff.exe [9/30/2009 11:02 PM 172032]

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Svchost - NetSvcs
UxTuneUp
.
------- Supplementary Scan -------
.
uStart Page = hxxp://www.bnsfinancial.com/fam/Sherri.htm
IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~2\Office12\EXCEL.EXE/3000
IE: Google Sidewiki... - c:\program files\Google\Google Toolbar\Component\GoogleToolbarDynamic_mui_en_60D6097707281E79.dll/cmsidewiki.html
.
- - - - ORPHANS REMOVED - - - -

Notify-pxod13 - pxod13.dll



**************************************************************************

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2009-12-10 15:25
Windows 5.1.2600 Service Pack 3 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully
hidden files: 0

**************************************************************************
.
--------------------- DLLs Loaded Under Running Processes ---------------------

- - - - - - - > 'winlogon.exe'(1028)
c:\windows\system32\Ati2evxx.dll

- - - - - - - > 'explorer.exe'(3352)
c:\windows\system32\WININET.dll
c:\program files\Logitech\iTouch\iTchHk.dll
c:\program files\Common Files\Logitech\Scrolling\LgMsgHk.dll
c:\windows\system32\ieframe.dll
c:\program files\Google\Quick Search Box\bin\1.2.1150.162\qsb.dll
c:\windows\system32\wpdshserviceobj.dll
c:\windows\system32\portabledevicetypes.dll
c:\windows\system32\portabledeviceapi.dll
.
------------------------ Other Running Processes ------------------------
.
c:\windows\system32\Ati2evxx.exe
c:\windows\system32\Ati2evxx.exe
c:\program files\Symantec\LiveUpdate\AluSchedulerSvc.exe
c:\program files\Common Files\Nero\Nero BackItUp 4\NBService.exe
c:\windows\system32\wbem\unsecapp.exe
c:\windows\system32\wscntfy.exe
c:\windows\RTHDCPL.EXE
.
**************************************************************************
.
Completion time: 2009-12-10 15:28:41 - machine was rebooted
ComboFix-quarantined-files.txt 2009-12-10 21:28
ComboFix2.txt 2009-12-10 18:59
ComboFix3.txt 2009-12-08 21:27

Pre-Run: 229,707,096,064 bytes free
Post-Run: 229,646,561,280 bytes free

- - End Of File - - 57A607FB5FBC80B0755D203AD03B111E

MrSly
2009-12-11, 04:14
Hi,
Everything completed as ordered. Kaspersky still found 3 infections. And I've run dds again with its logs and all posted below and attached.

--------------------------------------------------------------------------------
KASPERSKY ONLINE SCANNER 7.0: scan report
Thursday, December 10, 2009
Operating system: Microsoft Windows XP Professional Service Pack 3 (build 2600)
Kaspersky Online Scanner version: 7.0.26.13
Last database update: Thursday, December 10, 2009 21:43:22
Records in database: 3354383
--------------------------------------------------------------------------------

Scan settings:
scan using the following database: extended
Scan archives: yes
Scan e-mail databases: yes

Scan area - My Computer:
C:\
D:\
E:\
F:\
G:\
H:\
I:\

Scan statistics:
Objects scanned: 60430
Threats found: 2
Infected objects found: 3
Suspicious objects found: 0
Scan duration: 00:43:04


File name / Threat / Threats count
C:\Qoobox\Quarantine\[4]-Submit_2009-12-10_14.58.01.zip Infected: Trojan-Proxy.Win32.Agent.bxf 1
C:\System Volume Information\_restore{6DCBCF6C-3361-4E9D-8E00-909ED7E37635}\RP214\A0017410.exe Infected: Trojan-GameThief.Win32.OnLineGames.vgil 1
C:\System Volume Information\_restore{6DCBCF6C-3361-4E9D-8E00-909ED7E37635}\RP217\A0024052.dll Infected: Trojan-Proxy.Win32.Agent.bxf 1

Selected area has been scanned.





DDS (Ver_09-12-01.01) - NTFSx86
Run by Sherri at 20:05:41.62 on Thu 12/10/2009
Internet Explorer: 7.0.5730.11
Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.2815.2161 [GMT -6:00]


============== Running Processes ===============

C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\system32\svchost -k DcomLaunch
svchost.exe
C:\WINDOWS\System32\svchost.exe -k netsvcs
svchost.exe
C:\WINDOWS\system32\Ati2evxx.exe
svchost.exe
C:\Program Files\Lavasoft\Ad-Aware\AAWService.exe
C:\WINDOWS\system32\spoolsv.exe
svchost.exe
C:\Program Files\Symantec\LiveUpdate\AluSchedulerSvc.exe
C:\Program Files\Java\jre6\bin\jqs.exe
C:\Program Files\Common Files\Nero\Nero BackItUp 4\NBService.exe
C:\WINDOWS\system32\poweroff.exe
C:\WINDOWS\system32\wscntfy.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\RTHDCPL.EXE
C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe
C:\Program Files\Logitech\iTouch\iTouch.exe
C:\Program Files\Google\Quick Search Box\GoogleQuickSearchBox.exe
C:\Program Files\Java\jre6\bin\jusched.exe
C:\Program Files\Rubber Ducky\RubberDucky.exe
C:\WINDOWS\system32\wuauclt.exe
C:\Program Files\GPSoftware\Directory Opus\dopusrt.exe
C:\Program Files\POP Peeper\POPPeeper.exe
C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Palm\Hotsync.exe
C:\WINDOWS\System32\svchost.exe -k HTTPFilter
C:\Program Files\Internet Explorer\IEXPLORE.EXE
C:\Program Files\Java\jre6\bin\java.exe
C:\Documents and Settings\Sherri\Desktop\dds.scr

============== Pseudo HJT Report ===============

uStart Page = hxxp://www.bnsfinancial.com/fam/Sherri.htm
BHO: Adobe PDF Link Helper: {18df081c-e8ad-4283-a596-fa578c2ebdc3} - c:\program files\common files\adobe\acrobat\activex\AcroIEHelperShim.dll
BHO: Groove GFS Browser Helper: {72853161-30c5-4d22-b7f9-0bbc1d38a37e} - c:\program files\microsoft office\office12\GrooveShellExtensions.dll
BHO: Google Toolbar Helper: {aa58ed58-01dd-4d91-8333-cf10577473f7} - c:\program files\google\google toolbar\GoogleToolbar_32.dll
BHO: Google Toolbar Notifier BHO: {af69de43-7d58-4638-b6fa-ce66b5ad205d} - c:\program files\google\googletoolbarnotifier\5.4.4525.1752\swg.dll
BHO: Java(tm) Plug-In 2 SSV Helper: {dbc80044-a445-435b-bc74-9c25c1c588a9} - c:\program files\java\jre6\bin\jp2ssv.dll
BHO: JQSIEStartDetectorImpl Class: {e7e6f031-17ce-4c07-bc86-eabfe594f69c} - c:\program files\java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll
TB: Google Toolbar: {2318c2b1-4965-11d4-9b18-009027a5cd4f} - c:\program files\google\google toolbar\GoogleToolbar_32.dll
uRun: [MimarSinan Rubber Ducky] "c:\program files\rubber ducky\RubberDucky.exe"
uRun: [Directory Opus Desktop Dblclk] "c:\program files\gpsoftware\directory opus\dopusrt.exe" /dblclk
uRun: [POP Peeper] "c:\program files\pop peeper\POPPeeper.exe" -min
uRun: [swg] "c:\program files\google\googletoolbarnotifier\GoogleToolbarNotifier.exe"
uRun: [ctfmon.exe] c:\windows\system32\ctfmon.exe
mRun: [StartCCC] c:\program files\ati technologies\ati.ace\core-static\CLIStart.exe
mRun: [RTHDCPL] RTHDCPL.EXE
mRun: [GrooveMonitor] "c:\program files\microsoft office\office12\GrooveMonitor.exe"
mRun: [zBrowser Launcher] c:\program files\logitech\itouch\iTouch.exe
mRun: [Malwarebytes Anti-Malware (reboot)] "c:\program files\malwarebytes' anti-malware\mbam.exe" /runcleanupscript
mRun: [Google Quick Search Box] "c:\program files\google\quick search box\GoogleQuickSearchBox.exe" /autorun
mRun: [Adobe Reader Speed Launcher] "c:\program files\adobe\reader 9.0\reader\Reader_sl.exe"
mRun: [Adobe ARM] "c:\program files\common files\adobe\arm\1.0\AdobeARM.exe"
mRun: [SunJavaUpdateSched] "c:\program files\java\jre6\bin\jusched.exe"
dRunOnce: [ShowDeskFix] regsvr32 /s /n /i:u shell32
dRunOnce: [IE7-11] rundll32 advpack.dll,LaunchINFSection NR_IE7en.inf,AfterUserStart
StartupFolder: c:\docume~1\sherri\startm~1\programs\startup\automa~1.lnk - c:\troopmaster software\automailer\AutoMailer.exe
StartupFolder: c:\docume~1\sherri\startm~1\programs\startup\onenot~1.lnk - c:\program files\microsoft office\office12\ONENOTEM.EXE
StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\hotsyn~1.lnk - c:\program files\palm\Hotsync.exe
IE: E&xport to Microsoft Excel - c:\progra~1\micros~2\office12\EXCEL.EXE/3000
IE: Google Sidewiki... - c:\program files\google\google toolbar\component\GoogleToolbarDynamic_mui_en_60D6097707281E79.dll/cmsidewiki.html
IE: {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe
IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe
IE: {2670000A-7350-4f3c-8081-5663EE0C6C49} - {48E73304-E1D6-4330-914C-F5F514E3486C} - c:\progra~1\micros~2\office12\ONBttnIE.dll
IE: {92780B25-18CC-41C8-B9BE-3C9C571A8263} - {FF059E31-CC5A-4E2E-BF3B-96E929D65503} - c:\progra~1\micros~2\office12\REFIEBAR.DLL
DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} - hxxp://update.microsoft.com/microsoftupdate/v6/V5Controls/en/x86/client/wuweb_site.cab?1238780007687
DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} - hxxp://update.microsoft.com/microsoftupdate/v6/V5Controls/en/x86/client/muweb_site.cab?1238779998343
DPF: {7530BFB8-7293-4D34-9923-61A11451AFC5} - hxxp://download.eset.com/special/eos/OnlineScanner.cab
DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_17-windows-i586.cab
DPF: {8FFBE65D-2C9C-4669-84BD-5829DC0B603C} - hxxp://fpdownload.macromedia.com/get/flashplayer/current/polarbear/ultrashim.cab
DPF: {CAFEEFAC-0016-0000-0017-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_17-windows-i586.cab
DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_17-windows-i586.cab
DPF: {E2883E8F-472F-4FB0-9522-AC9BF37916A7} - hxxp://platformdl.adobe.com/NOS/getPlusPlus/1.6/gp.cab
Handler: cozi - {5356518D-FE9C-4E08-9C1F-1E872ECD367F} - c:\program files\cozi express\CoziProtocolHandler.dll
Handler: grooveLocalGWS - {88FED34C-F0CA-4636-A375-3CB6248B04CD} - c:\program files\microsoft office\office12\GrooveSystemServices.dll
Notify: AtiExtEvent - Ati2evxx.dll
SSODL: WPDShServiceObj - {AAA288BA-9A4C-45B0-95D7-94D524869DB5} - c:\windows\system32\wpdshserviceobj.dll
SEH: Groove GFS Stub Execution Hook: {b5a7f190-dda6-4420-b3ba-52453494e6cd} - c:\program files\microsoft office\office12\GrooveShellExtensions.dll

============= SERVICES / DRIVERS ===============

R0 Lbd;Lbd;c:\windows\system32\drivers\Lbd.sys [2009-8-31 64160]
R2 Lavasoft Ad-Aware Service;Lavasoft Ad-Aware Service;c:\program files\lavasoft\ad-aware\AAWService.exe [2009-7-3 1028432]
R2 Poweroff;Poweroff;c:\windows\system32\poweroff.exe [2009-9-30 172032]

=============== Created Last 30 ================

2009-12-10 21:46:01 73728 ----a-w- c:\windows\system32\javacpl.cpl
2009-12-10 18:05:31 0 d-----w- c:\windows\E80F62FF5D3C4A1984099721F2928206.TMP
2009-12-08 21:22:59 0 d-sha-r- C:\cmdcons
2009-12-08 21:22:21 98816 ----a-w- c:\windows\sed.exe
2009-12-08 21:22:21 77312 ----a-w- c:\windows\MBR.exe
2009-12-08 21:22:21 260096 ----a-w- c:\windows\PEV.exe
2009-12-08 21:22:21 161792 ----a-w- c:\windows\SWREG.exe
2009-12-03 17:18:10 0 d-----w- c:\program files\Trend Micro
2009-12-01 04:37:49 1536 ----a-w- C:\palm.grf
2009-11-27 23:31:25 806 ----a-w- c:\windows\system32\drivers\SYMEVENT.INF
2009-11-27 23:31:25 60808 ----a-w- c:\windows\system32\S32EVNT1.DLL
2009-11-27 23:31:25 124464 ----a-w- c:\windows\system32\drivers\SYMEVENT.SYS
2009-11-27 23:31:25 10635 ----a-w- c:\windows\system32\drivers\SYMEVENT.CAT
2009-11-27 23:31:17 0 d-----w- c:\program files\Symantec
2009-11-27 15:28:46 0 d-----w- c:\docume~1\sherri\applic~1\Malwarebytes
2009-11-27 15:28:41 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2009-11-27 15:28:39 19160 ----a-w- c:\windows\system32\drivers\mbam.sys
2009-11-27 15:28:39 0 d-----w- c:\program files\Malwarebytes' Anti-Malware
2009-11-27 15:28:39 0 d-----w- c:\docume~1\alluse~1\applic~1\Malwarebytes
2009-11-24 02:24:11 0 d-----w- c:\docume~1\alluse~1\applic~1\PBGsavesDirectory
2009-11-23 21:39:19 0 d-----w- c:\program files\Snood
2009-11-23 21:17:15 0 d-----w- c:\program files\ReflexiveArcade

==================== Find3M ====================

2009-12-10 21:45:51 411368 ----a-w- c:\windows\system32\deploytk.dll
2009-12-08 18:59:37 96512 ------w- c:\windows\system32\drivers\atapi.sys
2009-09-12 19:48:01 98304 ----a-w- c:\windows\system32\CmdLineExt.dll
2009-03-30 21:26:10 32768 --sha-w- c:\windows\system32\config\systemprofile\local settings\history\history.ie5\mshist012009033020090331\index.dat

============= FINISH: 20:05:47.90 ===============

Blade81
2009-12-11, 17:39
Hi,

Please upload C:\Qoobox\Quarantine\[4]-Submit_2009-12-10_14.58.01.zip file here (http://www.bleepingcomputer.com/submit-malware.php?channel=4). Kindly include a link to this topic.

Let me know when that's been done :)


You know, maybe it's time to get my daughter her OWN computer to mess up as much as she wants, and stay off this one!
Might not be a bad idea :laugh:

MrSly
2009-12-11, 22:07
Done. Submitting the file, I mean, not getting the new computer... :)

I'm guessing it is a virus that you want to share?

Blade81
2009-12-11, 22:37
Yes, thanks for submitting it :)

Are you still noticing any problems? If not, it's time to secure your system to prevent against further intrusions.


THESE STEPS ARE VERY IMPORTANT

Let's reset system restore
Reset and Re-enable your System Restore to remove infected files that have been backed up by Windows. The files in System Restore are protected to prevent any programs changing those files. This is the only way to clean these files: You will lose all previous restore points which are likely to be infected. Please note you need Administrator Access to do clean the restore points.

1. Turn off System Restore.
On the Desktop, right-click My Computer.
Click Properties.
Click the System Restore tab.
Check Turn off System Restore.
Click Apply, and then click OK.

2. Reboot.

3. Turn ON System Restore.
On the Desktop, right-click My Computer.
Click Properties.
Click the System Restore tab.
UN-Check *Turn off System Restore*.
Click Apply, and then click OK.
NOTE: only do this ONCE,NOT on a regular basis



Now lets uninstall ComboFix:

Click START then RUN
Now copy-paste Combofix /uninstall in the runbox and click OK



Please download OTC (http://oldtimer.geekstogo.com/OTC.exe) and save it to desktop.

Double-click OTC.exe.
Click the CleanUp! button.
Select Yes when the
Begin cleanup Process?
prompt appears.
If you are prompted to Reboot during the cleanup, select Yes.
The tool will delete itself once it finishes, if not delete it by yourself.


Note: If you receive a warning from your firewall or other security programs regarding OTC attempting to contact the internet, please allow it to do so.



UPDATING WINDOWS AND INTERNET EXPLORER

IMPORTANT: You Need to Update Windows and Internet Explorer to protect your computer from the malware that is around on the Internet. Please go to the windows update site (http://windowsupdate.microsoft.com/) to get the critical updates.

If you are running Microsoft Office, or any portion thereof, go to the Microsoft's Office Update site and make sure you have at least all the critical updates installed (Free) Microsoft Office Update.


Make your Internet Explorer more secure

This can be done by following these simple instructions:
From within Internet Explorer click on the Tools menu and then click on Options.
Click once on the Security tab
Click once on the Internet icon so it becomes highlighted.
Click once on the Custom Level button.
Change the Download signed ActiveX controls to Prompt
Change the Download unsigned ActiveX controls to Disable
Change the Initialize and script ActiveX controls not marked as safe to Disable
Change the Installation of desktop items to Prompt
Change the Launching programs and files in an IFRAME to Prompt
Change the Navigate sub-frames across different domains to Prompt
When all these settings have been made, click on the OK button.
If it prompts you as to whether or not you want to save the settings, press the Yes button.
Next press the Apply button and then the OK to exit the Internet Properties page.



The following are recommended third party programs that are designed to keep your computer clean. A link as well as a brief description is included with each item.

hosts file:
Every version of windows has a hosts file as part of them. In a very basic sense, they are used to locate webpages. We can customize a hosts file so that it blocks certain webpages. However, it can slow down certain computers. This is why using a hosts file is optional!!
Download it here (http://www.mvps.org/winhelp2002/hosts.htm). Make sure you read the instructions on how to install the hosts file. There is a good tutorial here (http://www.bleepingcomputer.com/forums/tutorial51.html)
If you decide to download the hosts file, the slowdown problems can usually be avoided by following these steps:
Click the start button (at the lower left hand corner of your screen) Click run In the dialog box, type services.msc hit enter, then locate dns client Highlight it, then double-click it. On the dropdown box, change the setting from automatic to manual. Click ok



Just a final reminder for you. I am trying to stress these two points.
UPDATE UPDATE UPDATE!!! Make sure you do this about every 1-2 weeks.
Make sure all of your security programs are up to date.
Visit Microsoft's Windows Update Site Frequently - It is important that you visit http://www.windowsupdate.com regularly. This will ensure your computer has always the latest security updates available installed on your computer. If there are new updates to install, install them immediately, reboot your computer, and revisit the site until there are no more critical updates.



Once again, please post and tell me how things are going with your system... problems etc.

Have a great day,
Blade :cool:


PS. You may reinstall Norton now :)

MrSly
2009-12-11, 23:01
I will get started doing what you said in a minute. I just wanted to say Thank You again for all your hard work. I really appreciate the help.

Oh, I still have this Google button on the bottom of my screen as shown in post #6. I don't see anything in Add/Remove Programs for it, just the Google Toolbar for IE. Any suggestions?

Blade81
2009-12-11, 23:23
You're welcome :)


Oh, I still have this Google button on the bottom of my screen as shown in post #6. I don't see anything in Add/Remove Programs for it, just the Google Toolbar for IE. Any suggestions?
It seems to be placed there by Google Toolbar (http://www.tothetech.com/blog/tech-news/google-toolbar-6-beta-for-ie.html).

MrSly
2009-12-13, 20:04
Sorry for the delay in replying, we were visiting family...

The computer seems to be working just fine now. It seems to boot faster, and none of the problems I had before are showing up anywhere. I've changed the password on this computer so my daughter can no longer use this computer. :)

Thank you very much for all your help with this particularly nasty bug!

Now, to find an anti-virus program that will help protect the computer a lot better than Norton did...

Blade81
2009-12-13, 20:16
You're welcome :)

Good free antivirus programs are:
Antivir (http://free-av.com/en/download/1/download_avira_antivir_personal__free_antivirus.html) and
Avast! (http://www.avast.com/eng/download-avast-home.html)

Good commercial ones are from:
Kaspersky (http://www.kaspersky.com/homeuser) and
ESET (http://www.eset.com/products/index.php)

Blade81
2009-12-20, 18:30
Since this issue appears to be resolved ... this Topic has been closed. Glad I could help. :)

Note:If it has been four days or more since your last post, and the helper assisting you posted a response to that post to which you did not reply, your topic will not be reopened. At that point, if you still require help, please start a new topic and include a fresh HijackThis log and a link to your previous thread.

If it has been less than four days since your last response and you need the thread re-opened, please send me or MOD a private message (pm). A valid, working link to the closed topic is required.