Articles

Google search getting redirected.

Dell latitude D610
October 1, 2008 at 12:39:06
Specs: Windows XP Pro Version 20, 2.13 GHZ, 2 GB RAM

I also have the infection that is redirecting my google search to various random sites. My ad-aware, norton anti-virus have been corrupted. I re-installed them but they are not able to access their definiton update sites. When I first had the infection I ran MalawareBytes. It removed a number of Trojans. It seemed also to fix my hijacked search. But after I rebooted the system the problem is back again. Any help would be greatly appreciated. Thanks much.

See More: Google search getting redirected.

Report •


#1
October 1, 2008 at 13:03:06

Please download Malwarebytes' Anti-Malware from one of these sites:

MalwareBytes1

MalwareBytes2

1. Double Click mbam-setup.exe to install the application.
2. Make sure a checkmark is placed next to Update Malwarebytes' Anti-Malware and Launch Malwarebytes' Anti-Malware, then click Finish.
3. If an update is found, it will download and install the latest version.
4. Once the program has loaded, select "Perform Quick Scan", then click Scan. The scan may take some time to finish,so please be patient.
5. When the scan is complete, click OK, then Show Results to view the results.
6. Make sure that everything found is checked, and click Remove Selected.
7. When disinfection is completed, a log will open in Notepad and you may be prompted to Restart. If MBAM encounters a file that is difficult to remove,you will be presented with 1 of 2 prompts,click OK to either and let MBAM proceed with the disinfection process,if asked to restart the computer,please do so immediately.
8. The log is automatically saved by MBAM and can be viewed by clicking the Logs tab in MBAM.
9. Copy&Paste the entire report in your next reply.


Please download and install the latest version of HijackThis v2.0.2:


Download the "HijackThis" Installer from this link:
Hijack This


1. Save " HJTInstall.exe" to your desktop.
2. Double click on HJTInstall.exe to run the program.
3. By default it will install to C:\Program Files\Trend Micro\HijackThis.
4. Accept the license agreement by clicking the "I Accept" button.
5.Click on the "Do a system scan and save a log file" button. It will scan and then ask you to save the log.
6. Click "Save log" to save the log file and then the log will open in Notepad.
7. Click on "Edit > Select All" then click on "Edit > Copy" to copy the entire contents of the log.
8. Paste the log in your next reply.
9. Do NOT have HijackThis fix anything yet! Most of what it finds will be harmless or even required.


Report •

#2
October 1, 2008 at 14:19:17

Malwarebytes log
--------------------

Malwarebytes' Anti-Malware 1.28
Database version: 1225
Windows 5.1.2600 Service Pack 2

10/1/2008 5:07:01 PM
mbam-log-2008-10-01 (17-07-01).txt

Scan type: Quick Scan
Objects scanned: 67445
Time elapsed: 19 minute(s), 17 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 2
Registry Values Infected: 0
Registry Data Items Infected: 2
Folders Infected: 0
Files Infected: 2

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\tdssdata (Trojan.Agent) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\tdss (Trojan.Agent) -> Quarantined and deleted successfully.

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit (Trojan.Agent) -> Data: c:\windows\system32\ -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit (Trojan.Agent) -> Data: system32\ -> Quarantined and deleted successfully.

Folders Infected:
(No malicious items detected)

Files Infected:
C:\WINDOWS\system32\ (Trojan.Agent) -> Delete on reboot.
C:\WINDOWS\system32\drivers\ (Trojan.Agent) -> Delete on reboot.

--------------------
HijackThis log
--------------------

Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 5:17:23 PM, on 10/1/2008
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v7.00 (7.00.6000.16705)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\system32\basfipm.exe
C:\PROGRA~1\SYMANT~1\SYMANT~1\DefWatch.exe
C:\WINDOWS\system32\inetsrv\inetinfo.exe
C:\Program Files\Common Files\Microsoft Shared\VS7Debug\mdm.exe
C:\Program Files\Dell\NICCONFIGSVC\NICCONFIGSVC.exe
C:\PROGRA~1\SYMANT~1\SYMANT~1\Rtvscan.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\wltrysvc.exe
C:\WINDOWS\System32\bcmwltry.exe
C:\WINDOWS\system32\mqsvc.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\system32\mqtgsvc.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\Apoint\Apoint.exe
C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe
C:\Program Files\Dell\QuickSet\quickset.exe
C:\WINDOWS\system32\WLTRAY.exe
C:\Program Files\Symantec_Client_Security\Symantec AntiVirus\vptray.exe
C:\Program Files\Apoint\Apntex.exe
C:\Program Files\Java\jre1.6.0_05\bin\jusched.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Digital Line Detect\DLG.exe
C:\Program Files\Malwarebytes' Anti-Malware\mbam.exe
C:\Program Files\Mozilla Firefox\firefox.exe
C:\WINDOWS\system32\NOTEPAD.EXE
C:\Program Files\HijackThis\HijackThis.exe

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.yahoo.com/
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://www.yahoo.com
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.yahoo.com
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Window Title = Windows Internet Explorer provided by Yahoo!
R3 - URLSearchHook: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - (no file)
O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 7.0\ActiveX\AcroIEHelper.dll
O2 - BHO: DriveLetterAccess - {5CA3D70E-1895-11CF-8E15-001234567890} - C:\WINDOWS\system32\dla\tfswshx.dll
O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.6.0_05\bin\ssv.dll
O4 - HKLM\..\Run: [Apoint] C:\Program Files\Apoint\Apoint.exe
O4 - HKLM\..\Run: [ATIPTA] C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe
O4 - HKLM\..\Run: [Dell QuickSet] C:\Program Files\Dell\QuickSet\quickset.exe
O4 - HKLM\..\Run: [Dell Wireless Manager UI] C:\WINDOWS\system32\WLTRAY
O4 - HKLM\..\Run: [vptray] C:\Program Files\Symantec_Client_Security\Symantec AntiVirus\vptray.exe
O4 - HKLM\..\Run: [SunJavaUpdateSched] C:\Program Files\Java\jre1.6.0_05\bin\jusched.exe
O4 - HKLM\..\Run: [MSConfig] C:\WINDOWS\PCHealth\HelpCtr\Binaries\MSConfig.exe /auto
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
O4 - Global Startup: Digital Line Detect.lnk = ?
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\OFFICE11\EXCEL.EXE/3000
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_05\bin\ssv.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_05\bin\ssv.dll
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\OFFICE11\REFIEBAR.DLL
O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O16 - DPF: {3EA4FA88-E0BE-419A-A732-9B79B87A6ED0} (CTVUAxCtrl Object) - http://dl.tvunetworks.com/TVUAx.cab
O16 - DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} (MUWebControl Class) - http://update.microsoft.com/microso...
O16 - DPF: {8FEFF364-6A5F-4966-A917-A3AC28411659} (SopCore Control) - http://download.sopcast.cn/download...
O16 - DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} - http://fpdownload2.macromedia.com/g...
O16 - DPF: {E06E2E99-0AA1-11D4-ABA6-0060082AA75C} (GpcContainer Class) - https://lumenosevents.webex.com/client/T25L/event/ieatgpc.cab
O17 - HKLM\System\CCS\Services\Tcpip\Parameters: Domain = mis.mediware.com
O17 - HKLM\Software\..\Telephony: DomainName = mis.mediware.com
O17 - HKLM\System\CCS\Services\Tcpip\Parameters: SearchList = cdidomain.cdiconsulting.com
O17 - HKLM\System\CCS\Services\Tcpip\Parameters: NameServer = 65.24.7.10 65.24.7.11
O23 - Service: Ati HotKey Poller - ATI Technologies Inc. - C:\WINDOWS\system32\Ati2evxx.exe
O23 - Service: Broadcom ASF IP monitoring service v6.0.4 (BAsfIpM) - Broadcom Corp. - C:\WINDOWS\system32\basfipm.exe
O23 - Service: DefWatch - Symantec Corporation - C:\PROGRA~1\SYMANT~1\SYMANT~1\DefWatch.exe
O23 - Service: NICCONFIGSVC - Dell Inc. - C:\Program Files\Dell\NICCONFIGSVC\NICCONFIGSVC.exe
O23 - Service: Dell Wireless WLAN Tray Service (wltrysvc) - Unknown owner - C:\WINDOWS\System32\wltrysvc.exe

--
End of file - 5660 bytes

Thanks.


Report •

#3
October 1, 2008 at 14:25:41

Your java is out of date and may have been exploited.
Download the latest version of java from this link Java
Click on the JRE 6 Update 7 download button.
Check the box that says: "Accept License Agreement". The page will refresh.
Click on the link to download Windows Offline Installation with or without Multi-language and save to your desktop.
Close any programs you may have running - especially your web browser.
Go to Start > Control Panel double-click on Add/Remove programs and remove all older versions of Java. Check any item with Java Runtime Environment (JRE or J2SE) in the name. It should have the "coffee cup" icon next to it.
Click the Remove or Change/Remove button. Repeat as many times as necessary to remove each Java versions.
Reboot your computer once all Java components are removed
Then from your desktop double-click on jre-6u7-windows-i586-p.exe to install the newest version.

Please download ComboFix to the desktop from one of the following links:

Link1

Link 2

Link 3

Combofix is a powerful tool so follow the instructions exactly or you could damage your computer.

Very Important! Temporarily disable your anti-virus, script blocking and any anti-malware real-time protection before performing a scan. They can interfere with Combofix and remove some of its embedded files which may cause "unpredictable results".
Click on This Link to see a list of programs that should be disabled. The list is not all inclusive. If yours is not listed and you don't know how to disable it, please ask.

In your case to run Combofix do the following:
1. Go offline turn off your Norton antivirus, Ad-Aware and any other antispyware that you may have.
2. Run Combofix and save its log.
3. Restart the computer to get the antivirus running again but leave the antispyware programs off until we get the computer cleaned.
4. Post the Combofix log.


Remember to re-enable the protection again afterwards before connecting to the Internet.

Double-click combofix.exe
Follow the prompts.
(Don't click on the window while the program is running or move the mouse, it will cause your system to hang.)
Please post the log it produces.


Report •

Related Solutions

#4
October 1, 2008 at 15:46:08

Here is the ComboFix log:

ComboFix 08-09-30.03 - VishalG 2008-10-01 18:01:05.1 - NTFSx86
Microsoft Windows XP Professional 5.1.2600.2.1252.1.1033.18.1635 [GMT -4:00]
Running from: C:\AntiVirusSpywares\ComboFix.exe

[color=red][b]WARNING -THIS MACHINE DOES NOT HAVE THE RECOVERY CONSOLE INSTALLED !![/b][/color]
.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.

C:\WINDOWS\Downloaded Program Files\setup.inf
C:\WINDOWS\system\oeminfo.ini
C:\WINDOWS\system32\Cache
C:\WINDOWS\system32\config\systemprofile\My Documents\My Documents.url
C:\WINDOWS\system32\config\systemprofile\My Documents\My Music\My Music.url
C:\WINDOWS\system32\config\systemprofile\My Documents\My Pictures\My Pictures.url
C:\WINDOWS\system32\config\systemprofile\My Documents\My Videos\My Video.url
C:\WINDOWS\system32\drivers\fad.sys
C:\WINDOWS\system32\drivers\tdssserv.sys
C:\WINDOWS\system32\mdm.exe
C:\WINDOWS\system32\tdssadw.dll
C:\WINDOWS\system32\TDSSerrors.log
C:\WINDOWS\system32\tdssinit.dll
C:\WINDOWS\system32\tdssl.dll
C:\WINDOWS\system32\TDSSlog.dll
C:\WINDOWS\system32\tdssmain.dll
C:\WINDOWS\system32\tdssserf.dll
C:\WINDOWS\system32\TDSSserf1.dll
C:\WINDOWS\system32\tdssservers.dat

.
((((((((((((((((((((((((((((((((((((((( Drivers/Services )))))))))))))))))))))))))))))))))))))))))))))))))
.

-------\Legacy_TDSSSERV
-------\Service_TDSSserv


((((((((((((((((((((((((( Files Created from 2008-09-01 to 2008-10-01 )))))))))))))))))))))))))))))))
.

2008-10-01 17:51 . 2008-06-10 02:32 73,728 --a------ C:\WINDOWS\system32\javacpl.cpl
2008-10-01 17:49 . 2008-10-01 17:51 <DIR> d-------- C:\Program Files\Java
2008-10-01 17:49 . 2008-10-01 17:49 <DIR> d-------- C:\Program Files\Common Files\Java
2008-10-01 14:50 . 2008-10-01 14:50 <DIR> d--h----- C:\WINDOWS\PIF
2008-09-30 15:54 . 2008-09-30 15:54 <DIR> d-------- C:\Program Files\CCleaner
2008-09-30 15:54 . 2008-10-01 16:10 <DIR> d-------- C:\AntiVirusSpywares
2008-09-30 05:50 . 2008-09-30 05:50 <DIR> d-------- C:\Embaracadero ER licencse file
2008-09-30 03:47 . 2008-09-30 03:48 <DIR> d-------- C:\Program Files\TuneXP
2008-09-30 03:47 . 2008-09-30 03:46 720,896 --a------ C:\WINDOWS\iun6002.exe
2008-09-30 03:28 . 2008-09-30 03:59 <DIR> d-------- C:\Program Files\WhatsRunning
2008-09-29 23:12 . 2008-10-01 16:07 <DIR> d-------- C:\Program Files\Malwarebytes' Anti-Malware
2008-09-29 23:12 . 2008-09-29 23:12 <DIR> d-------- C:\Documents and Settings\vishalg.MEDIWARE\Application Data\Malwarebytes
2008-09-29 23:12 . 2008-09-29 23:12 <DIR> d-------- C:\Documents and Settings\All Users\Application Data\Malwarebytes
2008-09-29 23:12 . 2008-09-10 00:04 38,528 --a------ C:\WINDOWS\system32\drivers\mbamswissarmy.sys
2008-09-29 23:12 . 2008-09-10 00:03 17,200 --a------ C:\WINDOWS\system32\drivers\mbam.sys
2008-09-29 20:13 . 2008-09-29 20:13 <DIR> d-------- C:\Documents and Settings\All Users\Application Data\Lavasoft
2008-09-28 23:32 . 2008-09-29 19:53 <DIR> d-------- C:\Program Files\MSX
2008-09-28 23:31 . 2008-09-29 19:36 <DIR> d-------- C:\Program Files\Applications
2008-09-23 22:53 . 2008-09-23 22:53 0 --a------ C:\WINDOWS\iplayer.INI
2008-09-12 07:44 . 2008-09-12 16:03 <DIR> d-------- C:\WINDOWS\system32\CatRoot_bak
2008-09-11 21:52 . 2008-09-11 21:52 <DIR> d-------- C:\9cbad75a1e18be01a7e5aa67f1

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2008-10-01 19:00 73,496 ----a-w C:\WINDOWS\system32\drivers\SYMEVENT.SYS
2008-10-01 19:00 --------- d-----w C:\Program Files\Symantec
2008-10-01 19:00 --------- d-----w C:\Program Files\Common Files\Symantec Shared
2008-10-01 18:44 --------- d-----w C:\Program Files\Lavasoft
2008-10-01 18:43 --------- d-----w C:\Program Files\Common Files\Wise Installation Wizard
2008-10-01 05:08 --------- d-----w C:\Program Files\Infragistics
2008-10-01 02:28 --------- d-----w C:\Program Files\Common Files\Adobe
2008-09-30 00:13 --------- d-----w C:\Documents and Settings\vishalg.MEDIWARE\Application Data\Lavasoft
2008-09-13 18:03 --------- d-----w C:\Documents and Settings\All Users\Application Data\Microsoft Help
2008-09-12 12:16 --------- d-----w C:\Program Files\McAfee
2008-08-08 18:48 --------- d-----w C:\Program Files\Microsoft Silverlight
.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"ctfmon.exe"="C:\WINDOWS\system32\ctfmon.exe" [2004-08-04 15360]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"Dell Wireless Manager UI"="C:\WINDOWS\system32\WLTRAY" [X]
"Apoint"="C:\Program Files\Apoint\Apoint.exe" [2004-09-13 155648]
"ATIPTA"="C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe" [2005-05-12 344064]
"Dell QuickSet"="C:\Program Files\Dell\QuickSet\quickset.exe" [2005-03-04 606208]
"vptray"="C:\Program Files\Symantec_Client_Security\Symantec AntiVirus\vptray.exe" [2003-05-21 90112]
"MSConfig"="C:\WINDOWS\PCHealth\HelpCtr\Binaries\MSConfig.exe" [2004-08-04 158208]
"SunJavaUpdateSched"="C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe" [2008-06-10 144784]

C:\Documents and Settings\All Users\Start Menu\Programs\Startup\
Digital Line Detect.lnk - C:\Program Files\Digital Line Detect\DLG.exe [2005-09-20 24576]

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\drivers32]
"vidc.I420"= i263_32.drv
"msacm.g723"= g723.acm
"vidc.I263"= i263_32.drv
"msacm.imc"= imc32.acm

[HKLM\~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^Adobe Gamma Loader.lnk]
path=C:\Documents and Settings\All Users\Start Menu\Programs\Startup\Adobe Gamma Loader.lnk
backup=C:\WINDOWS\pss\Adobe Gamma Loader.lnkCommon Startup

[HKLM\~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^Adobe Reader Speed Launch.lnk]
path=C:\Documents and Settings\All Users\Start Menu\Programs\Startup\Adobe Reader Speed Launch.lnk
backup=C:\WINDOWS\pss\Adobe Reader Speed Launch.lnkCommon Startup

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Client Access Service]
--a------ 2005-10-19 06:40 20531 C:\Program Files\IBM\Client Access\cwbsvstr.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\dla]
--a------ 2004-12-06 02:05 127035 C:\WINDOWS\system32\dla\tfswctrl.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\DVDLauncher]
--a------ 2004-04-26 09:04 53248 C:\Program Files\CyberLink\PowerDVD\DVDLauncher.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\mcagent_exe]
--a------ 2007-08-03 23:33 582992 C:\Program Files\McAfee.com\Agent\mcagent.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Synchronization Manager]
--a------ 2004-08-04 08:00 143360 C:\WINDOWS\system32\mobsync.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\UpdateManager]
--a------ 2004-01-07 02:01 110592 C:\Program Files\Common Files\Sonic\Update Manager\sgtray.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\MsmqIntCert]
--a------ 2007-07-06 08:46 177152 C:\WINDOWS\system32\mqrt.dll

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\services]
"wuauserv"=2 (0x2)
"usnjsvc"=3 (0x3)
"SQLWriter"=2 (0x2)
"SQLBrowser"=2 (0x2)
"Norton AntiVirus Server"=2 (0x2)
"MSSQLServerADHelper"=3 (0x3)
"MSSQL$SQLEXPRESS"=2 (0x2)
"Cwbrxd"=3 (0x3)
"aawservice"=2 (0x2)
"WMPNetworkSvc"=3 (0x3)
"MpfService"=2 (0x2)
"McNASvc"=2 (0x2)
"mcmscsvc"=2 (0x2)

[HKEY_LOCAL_MACHINE\software\microsoft\security center]
"AntiVirusOverride"=dword:00000001

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\McAfeeAntiVirus]
"DisableMonitoring"=dword:00000001

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\McAfeeFirewall]
"DisableMonitoring"=dword:00000001

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]
"EnableFirewall"= 0 (0x0)

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"C:\\Program Files\\Messenger\\msmsgs.exe"=
"C:\\Program Files\\Common Files\\McAfee\\MNA\\McNASvc.exe"=

R3 GTIPCI21;GTIPCI21;C:\WINDOWS\system32\DRIVERS\gtipci21.sys [2004-05-03 80384]
S4 msvsmon80;Visual Studio 2005 Remote Debugger;C:\Program Files\Microsoft Visual Studio 8\Common7\IDE\Remote Debugger\x86\msvsmon.exe [2006-12-02 2805000]
.
Contents of the 'Scheduled Tasks' folder
.
- - - - ORPHANS REMOVED - - - -

MSConfigStartUp-ANTIVIRUS - C:\Program Files\MSX\MSx.exe
MSConfigStartUp-MsnMsgr - C:\Program Files\MSN Messenger\MsnMsgr.Exe
MSConfigStartUp-SunJavaUpdateSched - C:\Program Files\Java\jre1.6.0_05\bin\jusched.exe


.
------- Supplementary Scan -------
.
FireFox -: Profile - C:\Documents and Settings\vishalg.MEDIWARE\Application Data\Mozilla\Firefox\Profiles\l80s6j0o.default\
FireFox -: prefs.js - STARTUP.HOMEPAGE - hxxp://www.google.com/
FF -: plugin - C:\Program Files\Adobe\Acrobat 7.0\Reader\browser\nppdf32.dll
FF -: plugin - c:\Program Files\Microsoft Silverlight\2.0.30523.8\npctrl.dll
.

**************************************************************************

catchme 0.3.1361 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2008-10-01 18:17:44
Windows 5.1.2600 Service Pack 2 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully
hidden files: 0

**************************************************************************
.
--------------------- DLLs Loaded Under Running Processes ---------------------

PROCESS: C:\WINDOWS\system32\winlogon.exe
-> C:\WINDOWS\system32\NavLogon.dll
.
r Running Proce
.
C:\WINDOWS\system32\ati2evxx.exe
C:\WINDOWS\system32\scardsvr.exe
C:\WINDOWS\system32\msdtc.exe
C:\WINDOWS\system32\BAsfIpM.exe
C:\Program Files\Symantec_Client_Security\Symantec AntiVirus\DefWatch.exe
C:\WINDOWS\system32\inetsrv\inetinfo.exe
C:\Program Files\Common Files\Microsoft Shared\VS7Debug\mdm.exe
C:\Program Files\Dell\NicConfigSvc\NicConfigSvc.exe
C:\WINDOWS\system32\WLTRYSVC.EXE
C:\WINDOWS\system32\BCMWLTRY.EXE
C:\WINDOWS\system32\mqsvc.exe
C:\WINDOWS\system32\ati2evxx.exe
C:\WINDOWS\system32\mqtgsvc.exe
C:\WINDOWS\system32\WLTRAY.EXE
C:\Program Files\Apoint\ApntEx.exe
C:\WINDOWS\system32\imapi.exe
.
**************************************************************************
.
Completion time: 2008-10-01 18:26:44 - machine was rebooted
ComboFix-quarantined-files.txt 2008-10-01 22:26:34

Pre-Run: 29,394,235,392 bytes free
Post-Run: 29,432,037,376 bytes free

195 --- E O F --- 2008-08-13 09:22:36

Thanks.


Report •

#5
October 1, 2008 at 17:38:24

Empty the restore folder. Go to start>control panel>system>system restore tab>check the box beside "turn off system restore>apply (takes a minute)>ok. Go back and uncheck the box to turn system restore back on>apply>ok.


Download ATF Cleaner from this link:
http://www.majorgeeks.com/ATF_Cleaner_d4949.html
Run ATF-Cleaner
Double-click ATF-Cleaner.exe to run the program.
Under Main choose: Select All
Click the Empty Selected button.

Please run Esets online scanner from this link:

ESET

1. Note: You will need to use Internet explorer for this scan
2. Tick the box next to YES, I accept the Terms of Use.
3. Click Start
4. When asked, allow the activex control to install
5. Click Start
6. Make sure that the option Remove found threats is unticked ( Iwant to see what is found first), and the option Scan unwanted applications is checked
7. Click Scan
8. Wait for the scan to finish
9. Use notepad to open the logfile located at C:\Program Files\EsetOnlineScanner\log.txt
10. Copy and paste that log in your next reply.


Report •

#6
October 1, 2008 at 23:42:55

Following is what I got after running the Eset online scan:

# version=4
# OnlineScanner.ocx=1.0.0.56
# OnlineScannerDLLA.dll=1, 0, 0, 51
# OnlineScannerDLLW.dll=1, 0, 0, 51
# OnlineScannerUninstaller.exe=1, 0, 0, 49
# vers_standard_module=3487 (20081002)
# vers_arch_module=1.064 (20080214)
# vers_adv_heur_module=1.066 (20070917)
# EOSSerial=adbcb40596a3a142bbf161b0ceceeb4f
# end=finished
# remove_checked=false
# unwanted_checked=true
# utc_time=2008-10-02 06:33:07
# local_time=2008-10-02 02:33:07 (-0500, Eastern Daylight Time)
# country="United States"
# osver=5.1.2600 NT Service Pack 2
# scanned=507660
# found=1
# scan_time=12458
C:\WINDOWS\system32\run.vbs VBS/TrojanDownloader.Small.L trojan 3252BA7EEB6AF0F7FF03A251857F7C0A

Thanks.


Report •

#7
October 2, 2008 at 06:48:31

Please go to Virus Total and upload the following file for analysis:

C:\WINDOWS\system32\run.vb

Use the browse button at the site to find the file, once you find the file double click it and it should appear in the empty space to the left of the browse button> click "send file".

Post the results in your reply.


Report •

#8
October 2, 2008 at 09:39:54

Here's the result from VirusTotal:

File run.vbs received on 10.02.2008 18:28:23 (CET)
Current status: finished
Result: 19/36 (52.78%)

Antivirus Version Last Update Result
AhnLab-V3 2008.10.3.0 2008.10.02 -
AntiVir 7.8.1.34 2008.10.02 -
Authentium 5.1.0.4 2008.10.02 VBS/Psyme.AW
Avast 4.8.1248.0 2008.10.02 VBS:Agent-BP
AVG 8.0.0.161 2008.10.02 -
BitDefender 7.2 2008.10.02 Trojan.Script.2781
CAT-QuickHeal 9.50 2008.10.01 VBS/Small.GG1
ClamAV 0.93.1 2008.10.02 -
DrWeb 4.44.0.09170 2008.10.02 -
eSafe 7.0.17.0 2008.10.01 -
eTrust-Vet 31.6.6121 2008.10.02 VBS/SillyDlScript.AQD
Ewido 4.0 2008.10.02 Downloader.Small.gg
F-Prot 4.4.4.56 2008.10.02 VBS/Psyme.AW
F-Secure 8.0.14332.0 2008.10.02 Trojan-Downloader.VBS.Small.gg
Fortinet 3.113.0.0 2008.10.02 VBS/Small.GF!tr.dldr
GData 19 2008.10.02 Trojan.Script.2781
Ikarus T3.1.1.34.0 2008.10.02 Trojan-Downloader.VBS.Small.gg
K7AntiVirus 7.10.481 2008.10.02 -
Kaspersky 7.0.0.125 2008.10.02 Trojan-Downloader.VBS.Small.gg
McAfee 5396 2008.10.02 Generic Downloader.o
Microsoft 1.4005 2008.10.02 TrojanDownloader:VBS/Psyme.F
NOD32 3490 2008.10.02 VBS/TrojanDownloader.Small.L
Norman 5.80.02 2008.10.02 -
Panda 9.0.0.4 2008.10.02 -
PCTools 4.4.2.0 2008.10.02 VBS.Psyme.FY
Prevx1 V2 2008.10.02 -
Rising 20.63.62.00 2008.09.28 Trojan.DL.Script.VBS.Agent.xiy
SecureWeb-Gateway 6.7.6 2008.10.02 VBScript.Vulnerable.gen!High (suspicious)
Sophos 4.34.0 2008.10.02 -
Sunbelt 3.1.1668.1 2008.09.24 -
Symantec 10 2008.10.02 -
TheHacker 6.3.0.9.098 2008.10.01 -
TrendMicro 8.700.0.1004 2008.10.02 -
VBA32 3.12.8.6 2008.10.02 -
ViRobot 2008.10.2.1403 2008.10.02 -
VirusBuster 4.5.11.0 2008.10.02 HTML.Psyme.Gen

Additional information
File size: 1058 bytes
MD5...: 3252ba7eeb6af0f7ff03a251857f7c0a
SHA1..: 4f6218616c766e17d73d538f006dc710a9c49a1c
SHA256: 40bb2e870b3439d38aad7c9251928f50b2f557b6f03759e0ca5b8dbb6a96fc99
SHA512: a0ce2a144ab103618486e09175a4d79ff4478c000595746cc32dd696138d84c9
79062e93ec2cab216acb09034cab3ce1c45ec8705768bd8f0368b7030e56f2f6
PEiD..: -
TrID..: File type identification
Unknown!
PEInfo: -

Thanks.


Report •

#9
October 2, 2008 at 10:59:18

Please download the OTMoveIt2 by OldTimer and save it to your desktop.

1. Please double-click OTMoveIt2.exe to run it. (Note: If you are running on Vista, right-click on the file and choose Run As Administrator).
2. Copy the everything between the X's (not the X's) to the clipboard by highlighting ALL of them and pressing CTRL + C (or, after highlighting, right-click and choose Copy):
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
C:\WINDOWS\system32\run.vb

XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX

4. Return to OTMoveIt2, right click in the "Paste Custom List Of Files/Patterns To Move" window (under the yellow bar) and choose Paste.
5. Click the red Moveit! button.
6. Copy everything in the Results window (under the green bar) to the clipboard by highlighting ALL of them and pressing CTRL + C (or, after highlighting, right-click and choose copy), and paste it in your next reply.
6. Close OTMoveIt2

Note: If a file or folder cannot be moved immediately you may be asked to reboot the machine to finish the move process. If you are asked to reboot the machine choose Yes. In this case, after the reboot, open Notepad (Start->All Programs->Accessories->Notepad), click File->Open, in the File Name box enter *.log and press the Enter key, navigate to the C:\_OTMoveIt\MovedFiles folder, and open the newest .log file present, and copy/paste the contents of that document back here in your next post.

If the file "C:\AntiVirusSpywares" is something you creared there is no need to run the following Combofix script.

Open Notepad and copy/paste everything between the X"s into it and make sure the first word (such as KILLALL, Or File, etc.) is at the very top of the page.
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
DirLook::
C:\AntiVirusSpywares

XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
Go to File on the top bar and choose" Save As", Change the "Save As Type" to All Files, Name it CFScript.txt then save it to your desktop.
Then drag/drop the CFScript.txt onto ComboFix.exe (the red symbol on your desktop) if combofix does not auto start click "run".


Report •

#10
October 2, 2008 at 11:52:15

Here is the result from OTMoveIt2:

-------------------
C:\WINDOWS\system32\run.vbs moved successfully.

OTMoveIt2 by OldTimer - Version 1.0.4.3 log created on 10022008_144315
-------------------

Yes, I created the C:\AntiVirusSpywares folder to temporarily house the various utilities that I am downloading.

Thanks.


Report •

#11
October 2, 2008 at 12:01:55

Go to start> run> type in combofix /u (Note the space after combofix)then press enter. Give it a minute. This will uninstall Combofix.

Next, go to start> control panel> add/remove programs and uninstall Hijack This.

You should keep Malwarebytes and AFT Cleaner.

You should consider adding "Spywareblaster" to your arsenol of antispyware tools, you can download it from this link Spywareblaster

Just download it,install it, and update it. Its free and runs in the background, so you don't actually run it, and re-writes malicious script before it can install on your computer. Look for updates weekly as there is no auto-update on the free version.

Your computer should be clean, how is it operating.


Report •

#12
October 2, 2008 at 13:12:53

Thank you, the system is running much better. It still takes a while to boot though. Anyway to improve that?

Also, I have this folder called C:\9cbad75a1e18be01a7e5aa67f1. It seems like a windows update folder that was never cleaned up? It's got folders called scdiag and update which I am not able to access. Sometime back I lost my internet connection while windows update was going on. I started to get number of Delayed Write failures. Could this folder be a residue of that?

Thanks.


Report •

#13
October 2, 2008 at 13:34:50

I've seen those folders before but I have not seen them uninstalled or deleted yet. You might try updating to SP3 to improve startup time, and run error checker then defrag.

Report •

#14
October 2, 2008 at 15:28:37

Installed Service Pack 3. Will do the disk cleanup as you suggested. One more question. Presently I only have Norton Anti-Virus running. I will install Spywareblaster. Should I run a software Firewall also? (My computer is behind one of those wireless Linksys routers.) I don't mind running a different service, each for anti-virus/spyware/firewall. But do you have any thoughts on whether it is more efficient to have a single provider of all these services.

Thanks.


Report •

#15
October 2, 2008 at 17:17:46

You can download the free version of Zonealarm Firewall from this link:

Zonealarm Free Version

I don't think what is more efficient should weigh to heavily on you but rather what uses the least resources, does the best job and is least costly. Often one product line does not do that. Of course, you must decide all that as you have to live with it.

Glad we could help.


Report •

#16
October 2, 2008 at 20:07:13

Thank you so much for your help/advice, jabuck. This would have taken a long time for me to sort out on my own.

Report •

#17
October 2, 2008 at 20:15:43

Glad we could help.

Report •


Ask Question