1. You are viewing our forum as a guest. For full access please Register. WindowsBBS.com is completely free, paid for by advertisers and donations.

Solved Google Redirect Loop

Discussion in 'Malware and Virus Removal Archive' started by Captain567, 2009/05/24.

  1. 2009/05/24
    Captain567

    Captain567 Inactive Thread Starter

    Joined:
    2009/05/24
    Messages:
    13
    Likes Received:
    0
    [Resolved] Google Redirect Loop

    Recently my brother ran an .exe, and it seems to have installed some form of malware on his computer, and unfortunately it seems to be extremely contagious, as now all three computers on the network have the same problem.

    When I open Firefox, instead of bringing me to the default homepage, a redirect error appears. Also, whenever I click on a search result, it opens in a new tab, which wouldn't happen before. However, there hasn't been any actual redirection to spam websites, oddly enough. There are some other problems with, I can't download Windows Messenger, for example, and many anti-virus and anti-spyware downloads fail.

    I've tried formatting, but because this seems to be a network wide problem, I require a solution for all computers. Here are the requested logs:

    DDS (Ver_09-05-14.01) - NTFSx86
    Run by Philip at 13:26:01.19 on Sun 05/24/2009
    Internet Explorer: 7.0.6000.16386
    Microsoft® Windows Vistaâ„¢ Ultimate 6.0.6000.0.1252.1.1033.18.2046.1536 [GMT -4:00]

    SP: Windows Defender *enabled* (Updated) {D68DDC3A-831F-4FAE-9E44-DA132C1ACF46}

    ============== Running Processes ===============

    C:\Windows\system32\wininit.exe
    C:\Windows\system32\lsm.exe
    C:\Windows\system32\svchost.exe -k DcomLaunch
    C:\Windows\system32\svchost.exe -k rpcss
    C:\Windows\System32\svchost.exe -k secsvcs
    C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted
    C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted
    C:\Windows\system32\svchost.exe -k netsvcs
    C:\Windows\system32\SLsvc.exe
    C:\Windows\system32\svchost.exe -k LocalService
    C:\Windows\system32\svchost.exe -k NetworkService
    C:\Windows\System32\spoolsv.exe
    C:\Windows\system32\svchost.exe -k LocalServiceNoNetwork
    C:\Windows\system32\taskeng.exe
    C:\Windows\system32\Dwm.exe
    C:\Windows\Explorer.EXE
    C:\Program Files\Windows Defender\MSASCui.exe
    C:\Program Files\Windows Sidebar\sidebar.exe
    C:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted
    C:\Windows\system32\svchost.exe -k imgsvc
    C:\Windows\System32\svchost.exe -k WerSvcGroup
    C:\Windows\system32\SearchIndexer.exe
    C:\Windows\system32\taskeng.exe
    C:\Program Files\Mozilla Firefox\firefox.exe
    C:\Windows\system32\SearchProtocolHost.exe
    C:\Windows\system32\SearchFilterHost.exe
    C:\Windows\system32\DllHost.exe
    C:\Windows\system32\DllHost.exe
    C:\Users\Philip\Downloads\dds.scr
    C:\Windows\system32\wbem\wmiprvse.exe

    ============== Pseudo HJT Report ===============

    uRun: [Sidebar] c:\program files\windows sidebar\sidebar.exe /autoRun
    mRun: [Windows Defender] %ProgramFiles%\Windows Defender\MSASCui.exe -hide

    ================= FIREFOX ===================

    FF - ProfilePath - c:\users\philip\appdata\roaming\mozilla\firefox\profiles\8x6iq46z.default\

    ============= SERVICES / DRIVERS ===============


    =============== Created Last 30 ================

    2009-05-24 12:00 <DIR> --d----- c:\program files\Trend Micro
    2009-05-24 11:46 134,144 a------- c:\windows\system32\drivers\Rtlh86.sys
    2009-05-24 11:46 9,728 a------- c:\windows\system32\RtNicProp32.dll
    2009-05-24 11:46 <DIR> --d----- c:\program files\Realtek
    2009-05-24 11:42 53,248 a------- c:\windows\system32\CSVer.dll
    2009-05-24 11:42 <DIR> --d----- C:\Intel
    2009-05-24 11:42 <DIR> --d----- C:\Realtek
    2009-05-24 11:42 <DIR> --d----- C:\INFUpdate
    2009-05-24 11:39 <DIR> --d----- C:\RTL8111_Vista
    2009-05-20 22:23 <DIR> --d----- c:\windows\Panther
    2009-05-20 22:23 8,192 a--s-r-- C:\BOOTSECT.BAK
    2009-05-20 22:23 438,840 a--shr-- C:\bootmgr
    2009-05-20 22:23 <DIR> --dsh--- C:\Boot
    2009-05-20 22:22 59 a----r-- c:\windows\DELL_VERSION
    2009-05-20 22:22 <DIR> --d----- c:\windows\system32\OEM
    2009-05-20 18:31 <DIR> --d----- c:\users\Philip
    2009-05-20 18:31 171,136 a--shr-- C:\grldr

    ==================== Find3M ====================

    2009-05-24 11:46 86,016 a------- c:\windows\inf\infstrng.dat
    2009-05-24 11:46 51,200 a------- c:\windows\inf\infpub.dat
    2009-05-24 11:46 86,016 a------- c:\windows\inf\infstor.dat
    2006-12-21 17:18 665,600 a------- c:\windows\inf\drvindex.dat
    2006-11-02 08:49 174 a--sh--- c:\program files\desktop.ini
    2006-11-02 08:40 287,440 a------- c:\windows\inf\perflib\0409\perfi.dat
    2006-11-02 08:40 287,440 a------- c:\windows\inf\perflib\0409\perfh.dat
    2006-11-02 08:40 30,674 a------- c:\windows\inf\perflib\0409\perfd.dat
    2006-11-02 08:40 30,674 a------- c:\windows\inf\perflib\0409\perfc.dat
    2006-11-02 05:20 287,440 a------- c:\windows\inf\perflib\0000\perfi.dat
    2006-11-02 05:20 287,440 a------- c:\windows\inf\perflib\0000\perfh.dat
    2006-11-02 05:20 30,674 a------- c:\windows\inf\perflib\0000\perfd.dat
    2006-11-02 05:20 30,674 a------- c:\windows\inf\perflib\0000\perfc.dat
    2006-11-22 10:58 8,192 a--sh--- c:\windows\users\default\NTUSER.DAT

    ============= FINISH: 13:26:25.13 ===============

    UNLESS SPECIFICALLY INSTRUCTED, DO NOT POST THIS LOG.
    IF REQUESTED, ZIP IT UP & ATTACH IT

    DDS (Ver_09-05-14.01)

    Microsoft® Windows Vistaâ„¢ Ultimate
    Boot Device: \Device\HarddiskVolume1
    Install Date: 5/20/2009 9:27:03 PM
    System Uptime: 5/24/2009 11:45:29 AM (2 hours ago)

    Motherboard: Gigabyte Technology Co., Ltd. | | EP45-DS3L
    Processor: Pentium(R) Dual-Core CPU E5200 @ 2.50GHz | Socket 775 | 3750/300mhz

    ==== Disk Partitions =========================

    A: is Removable
    C: is FIXED (NTFS) - 466 GiB total, 453.45 GiB free.
    D: is CDROM (UDF)

    ==== Disabled Device Manager Items =============

    ==== System Restore Points ===================

    RP2: 5/24/2009 11:42:59 AM - Device Driver Package Install: Intel System devices
    RP3: 5/24/2009 11:43:08 AM - Device Driver Package Install: Intel System devices
    RP4: 5/24/2009 11:43:29 AM - Device Driver Package Install: Intel IDE ATA/ATAPI controllers
    RP5: 5/24/2009 11:43:43 AM - Device Driver Package Install: Intel System devices
    RP6: 5/24/2009 11:43:53 AM - Device Driver Package Install: Intel Universal Serial Bus controllers

    ==== Installed Programs ======================

    HijackThis 2.0.2
    Mozilla Firefox (3.0.10)
    Realtek 8169 8168 8101E 8102E Ethernet Driver

    ==== End Of File ===========================
     
  2. 2009/05/24
    broni

    broni Moderator Malware Analyst

    Joined:
    2002/08/01
    Messages:
    21,701
    Likes Received:
    116
    Download GooredFix and save it to your Desktop.
    Double-click Goored.exe to run it.
    Select 1. Find Goored (no fix) by typing 1 and pressing Enter.
    A log will open, please post the contents of that log in your next reply (it can also be found on your desktop, called Goored.txt).
    Note: Do not run Option #2 yet.
     

  3. to hide this advert.

  4. 2009/05/24
    Captain567

    Captain567 Inactive Thread Starter

    Joined:
    2009/05/24
    Messages:
    13
    Likes Received:
    0
    I plugged in my backup harddrive and my USB drive as they've been exposed to my computer, and if I'm going to get rid of this, I want to get rid of anywhere it can be hiding, should I do a rescan with DDS and post the results?
    Here's my Goored log:

    GooredFix v1.92 by jpshortstuff
    Log created at 19:24 on 24/05/2009 running Option #1 (Philip)
    Firefox version 3.0.10 (en-US)

    =====Suspect Goored Entries=====

    =====Dumping Registry Values=====

    [HKEY_LOCAL_MACHINE\SOFTWARE\Mozilla\Mozilla Firefox 3.0.10\extensions]
    "Plugins "= "C:\Program Files\Mozilla Firefox\plugins "

    [HKEY_LOCAL_MACHINE\SOFTWARE\Mozilla\Mozilla Firefox 3.0.10\extensions]
    "Components "= "C:\Program Files\Mozilla Firefox\components "
     
  5. 2009/05/24
    broni

    broni Moderator Malware Analyst

    Joined:
    2002/08/01
    Messages:
    21,701
    Likes Received:
    116
    No.

    Print these instructions out.

    NOTE. If any of the programs listed below refuse to run, try renaming executive file to something else; for instance, rename hijackthis.exe to scanner.exe

    ***VERY IMPORTANT! Make sure, you update Superantispyware, and Malwarebytes before running the scans.***

    STEP 1. Download SUPERAntiSpyware Free for Home Users:
    http://www.superantispyware.com/

    * Double-click SUPERAntiSpyware.exe and use the default settings for installation.
    * An icon will be created on your desktop. Double-click that icon to launch the program.
    * If asked to update the program definitions, click "Yes ". If not, update the definitions before scanning by selecting "Check for Updates ". (If you encounter any problems while downloading the updates, manually download and unzip them from here: http://www.superantispyware.com/definitions.html.)
    * Close SUPERAntiSpyware.

    PHYSICALLY DISCONNECT FROM THE INTERNET

    Restart computer in Safe Mode.
    To enter Safe Mode, restart computer, and keep tapping F8 key, until menu appears; select Safe Mode; you'll see "Safe Mode" in all four corners of your screen

    * Open SUPERAntiSpyware.
    * Under Configuration and Preferences, click the Preferences button.
    * Under General and Startup tab, make sure, Start SUPERAntiSpyware when Windows starts option is UN-checked.
    * Click the Scanning Control tab.
    * Under Scanner Options make sure the following are checked (leave all others unchecked):
    - Close browsers before scanning.
    - Scan for tracking cookies.
    - Terminate memory threats before quarantining.

    * Click the Close button to leave the control center screen.
    * Back on the main screen, under Scan for Harmful Software click Scan your computer.
    * On the left, make sure you check C:\Fixed Drive.
    * On the right, under Complete Scan, choose Perform Complete Scan.
    * Click Next to start the scan. Please be patient while it scans your computer.
    * After the scan is complete, a Scan Summary box will appear with potentially harmful items that were detected. Click OK.
    * Make sure everything has a checkmark next to it and click Next.
    * A notification will appear that Quarantine and Removal is Complete. Click OK and then click the Finish button to return to the main menu.
    * If asked if you want to reboot, click Yes.
    * To retrieve the removal information after reboot, launch SUPERAntispyware again.
    - Click Preferences, then click the Statistics/Logs tab.
    - Under Scanner Logs, double-click SUPERAntiSpyware Scan Log.
    - If there are several logs, click the current dated log and press View log. A text file will open in your default text editor.
    - Please copy and paste the Scan Log results in your next reply.

    * Click Close to exit the program.
    Post SUPERAntiSpyware log.
    NOTE: Tracking cookies may be omitted from the log.

    RECONNECT TO THE INTERNET

    RESTART COMPUTER!

    STEP 2. Download Malwarebytes' Anti-Malware: http://www.malwarebytes.org/mbam.php to your desktop.
    (Malwarebytes is free to use as a manual scanner. Payment is only required if you wish to have it run and update automatically which is not necessary for our purposes)

    * Double-click mbam-setup.exe and follow the prompts to install the program.
    * At the end, be sure a checkmark is placed next to Update Malwarebytes' Anti-Malware and Launch Malwarebytes' Anti-Malware, then click Finish.
    * If an update is found, it will download and install the latest version.
    * Once the program has loaded, select Perform full scan, then click Scan.
    * When the scan is complete, click OK, then Show Results to view the results.
    * Be sure that everything is checked, and click Remove Selected.
    * When completed, a log will open in Notepad.
    * Post the log back here.

    The log can also be found here:
    C:\Documents and Settings\Username\Application Data\Malwarebytes\Malwarebytes' Anti-Malware\Logs\log-date.txt
    Or at C:\Program Files\Malwarebytes' Anti-Malware\Logs\log-date.txt

    RESTART COMPUTER!

    STEP 3. Download GMER: http://www.gmer.net/files.php, by clicking on Download EXE button.
    Alternative downloads:
    - http://majorgeeks.com/GMER_d5198.html
    - http://www.softpedia.com/get/Interne...ers/GMER.shtml
    Double click on downloaded .exe file, select Rootkit tab and click the Scan button.
    When scan is completed, click Save button, and save the results as gmer.log
    Warning ! Please, do not select the "Show all" checkbox during the scan.
    Post the log to your next reply.

    RESTART COMPUTER

    STEP 4. Download HijackThis:
    http://www.trendsecure.com/portal/en-US/tools/security_tools/hijackthis/download
    by clicking on Download HijackThis Installer
    Install, and run it.
    Post HijackThis log.
    Do NOT attempt to "fix" anything!


    DO NOT make any other changes to your computer (like installing programs, using other cleaning tools, etc.), until it's officially declared clean!!!
     
  6. 2009/05/24
    Captain567

    Captain567 Inactive Thread Starter

    Joined:
    2009/05/24
    Messages:
    13
    Likes Received:
    0
    I ran Super Antispyware twice, because I forgot to check my USB drive the first time.

    SUPERAntiSpyware Scan Log
    http://www.superantispyware.com

    Generated 05/24/2009 at 08:10 PM

    Application Version : 4.26.1002

    Core Rules Database Version : 3907
    Trace Rules Database Version: 1852

    Scan type : Complete Scan
    Total Scan Time : 00:17:55

    Memory items scanned : 270
    Memory threats detected : 0
    Registry items scanned : 4555
    Registry threats detected : 0
    File items scanned : 48033
    File threats detected : 2

    Adware.Tracking Cookie
    C:\Users\Philip\AppData\Roaming\Microsoft\Windows\Cookies\Low\philip@atdmt[1].txt

    Trojan.Agent/Gen-FakeAlert
    E:\RECYCLER\S-5-6-96-100010769-100031341-100015931-4524.COM

    SUPERAntiSpyware Scan Log
    http://www.superantispyware.com

    Generated 05/24/2009 at 08:49 PM

    Application Version : 4.26.1002

    Core Rules Database Version : 3907
    Trace Rules Database Version: 1852

    Scan type : Complete Scan
    Total Scan Time : 00:19:15

    Memory items scanned : 243
    Memory threats detected : 0
    Registry items scanned : 4555
    Registry threats detected : 0
    File items scanned : 48339
    File threats detected : 1

    Trojan.Unknown Origin
    F:\RECYCLER\S-1-6-21-2434476501-1644491937-600003330-1213\AUTORUN.EXE
     
  7. 2009/05/24
    Captain567

    Captain567 Inactive Thread Starter

    Joined:
    2009/05/24
    Messages:
    13
    Likes Received:
    0
    Malwarebytes did not want to update, but I still ran a check just in case it could find something.

    Malwarebytes' Anti-Malware 1.36
    Database version: 1945
    Windows 6.0.6000

    5/24/2009 9:30:48 PM
    mbam-log-2009-05-24 (21-30-48).txt

    Scan type: Full Scan (C:\|E:\|F:\|)
    Objects scanned: 103548
    Time elapsed: 28 minute(s), 15 second(s)

    Memory Processes Infected: 0
    Memory Modules Infected: 0
    Registry Keys Infected: 0
    Registry Values Infected: 0
    Registry Data Items Infected: 0
    Folders Infected: 0
    Files Infected: 0

    Memory Processes Infected:
    (No malicious items detected)

    Memory Modules Infected:
    (No malicious items detected)

    Registry Keys Infected:
    (No malicious items detected)

    Registry Values Infected:
    (No malicious items detected)

    Registry Data Items Infected:
    (No malicious items detected)

    Folders Infected:
    (No malicious items detected)

    Files Infected:
    (No malicious items detected)

    GMER 1.0.15.14972 - http://www.gmer.net
    Rootkit scan 2009-05-24 21:38:21
    Windows 6.0.6000


    ---- System - GMER 1.0.15 ----

    SSDT \??\C:\Program Files\SUPERAntiSpyware\SASKUTIL.sys ZwTerminateProcess [0x8AA39DF0]

    ---- Devices - GMER 1.0.15 ----

    AttachedDevice \Driver\volmgr \Device\HarddiskVolume1 fvevol.sys (BitLocker Drive Encryption Driver/Microsoft Corporation)
    AttachedDevice \Driver\volmgr \Device\HarddiskVolume2 fvevol.sys (BitLocker Drive Encryption Driver/Microsoft Corporation)
    AttachedDevice \Driver\volmgr \Device\HarddiskVolume3 fvevol.sys (BitLocker Drive Encryption Driver/Microsoft Corporation)
    AttachedDevice \Driver\volmgr \Device\HarddiskVolume4 fvevol.sys (BitLocker Drive Encryption Driver/Microsoft Corporation)
    AttachedDevice \FileSystem\fastfat \Fat fltmgr.sys (Microsoft Filesystem Filter Manager/Microsoft Corporation)

    ---- EOF - GMER 1.0.15 ----

    Logfile of Trend Micro HijackThis v2.0.2
    Scan saved at 9:41:31 PM, on 5/24/2009
    Platform: Windows Vista (WinNT 6.00.1904)
    MSIE: Internet Explorer v7.00 (7.00.6000.16386)
    Boot mode: Normal

    Running processes:
    C:\Windows\system32\taskeng.exe
    C:\Windows\system32\Dwm.exe
    C:\Windows\Explorer.EXE
    C:\Program Files\Windows Defender\MSASCui.exe
    C:\Program Files\Windows Sidebar\sidebar.exe
    C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

    R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
    R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
    R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant =
    R0 - HKLM\Software\Microsoft\Internet Explorer\Search,CustomizeSearch =
    R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName =
    O1 - Hosts: ::1 localhost
    O4 - HKLM\..\Run: [Windows Defender] %ProgramFiles%\Windows Defender\MSASCui.exe -hide
    O4 - HKCU\..\Run: [Sidebar] C:\Program Files\Windows Sidebar\sidebar.exe /autoRun
    O4 - HKUS\S-1-5-19\..\Run: [Sidebar] %ProgramFiles%\Windows Sidebar\Sidebar.exe /detectMem (User 'LOCAL SERVICE')
    O4 - HKUS\S-1-5-19\..\Run: [WindowsWelcomeCenter] rundll32.exe oobefldr.dll,ShowWelcomeCenter (User 'LOCAL SERVICE')
    O4 - HKUS\S-1-5-20\..\Run: [Sidebar] %ProgramFiles%\Windows Sidebar\Sidebar.exe /detectMem (User 'NETWORK SERVICE')
    O13 - Gopher Prefix:
    O20 - Winlogon Notify: !SASWinLogon - C:\Program Files\SUPERAntiSpyware\SASWINLO.dll

    --
    End of file - 2047 bytes
     
  8. 2009/05/24
    broni

    broni Moderator Malware Analyst

    Joined:
    2002/08/01
    Messages:
    21,701
    Likes Received:
    116
    HJT log is very strangely short...
    Then, there is no antivirus program installed.

    Please, download, and install one of these:

    - Avast! free antivirus: http://www.avast.com/eng/download-avast-home.html
    - Avira free antivirus: http://www.free-av.com/en/download/index.html

    - free PC Tools Firewall Plus: http://www.pctools.com/firewall/

    - free Comodo Internet Security (firewall + AV): http://www.personalfirewall.comodo.com/
    NOTE. During installation, Comodo will also allow you to install AV only, or firewall only, if you prefer to combine one Comodo product with some other product.

    If you decide to install Avast, or Avira, make sure, Windows firewall is turned on, or use PC Tools Firewall Plus.
    If you decide to install Comodo, make sure, Windows firewall is turned off.

    IMPORTANT! Make sure, you use only ONE antivirus, and ONE firewall.


    After installation, update the program, and run full scan.

    When done, post fresh HJT log.
     
  9. 2009/05/25
    Captain567

    Captain567 Inactive Thread Starter

    Joined:
    2009/05/24
    Messages:
    13
    Likes Received:
    0
    I used Avast!, it found one trojan in the full scan which I removed.

    Here's the HijackThis log:

    Logfile of Trend Micro HijackThis v2.0.2
    Scan saved at 3:42:08 PM, on 5/25/2009
    Platform: Windows Vista (WinNT 6.00.1904)
    MSIE: Internet Explorer v7.00 (7.00.6000.16386)
    Boot mode: Normal

    Running processes:
    C:\Windows\system32\taskeng.exe
    C:\Windows\system32\Dwm.exe
    C:\Windows\Explorer.EXE
    C:\Program Files\Windows Defender\MSASCui.exe
    C:\Program Files\Alwil Software\Avast4\ashDisp.exe
    C:\Program Files\Windows Sidebar\sidebar.exe
    C:\Windows\System32\mobsync.exe
    C:\Program Files\Mozilla Firefox\firefox.exe
    C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

    R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
    R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
    R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant =
    R0 - HKLM\Software\Microsoft\Internet Explorer\Search,CustomizeSearch =
    R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName =
    O1 - Hosts: ::1 localhost
    O4 - HKLM\..\Run: [Windows Defender] %ProgramFiles%\Windows Defender\MSASCui.exe -hide
    O4 - HKLM\..\Run: [avast!] C:\PROGRA~1\ALWILS~1\Avast4\ashDisp.exe
    O4 - HKCU\..\Run: [Sidebar] C:\Program Files\Windows Sidebar\sidebar.exe /autoRun
    O4 - HKUS\S-1-5-19\..\Run: [Sidebar] %ProgramFiles%\Windows Sidebar\Sidebar.exe /detectMem (User 'LOCAL SERVICE')
    O4 - HKUS\S-1-5-19\..\Run: [WindowsWelcomeCenter] rundll32.exe oobefldr.dll,ShowWelcomeCenter (User 'LOCAL SERVICE')
    O4 - HKUS\S-1-5-20\..\Run: [Sidebar] %ProgramFiles%\Windows Sidebar\Sidebar.exe /detectMem (User 'NETWORK SERVICE')
    O13 - Gopher Prefix:
    O20 - Winlogon Notify: !SASWinLogon - C:\Program Files\SUPERAntiSpyware\SASWINLO.dll
    O23 - Service: avast! iAVS4 Control Service (aswUpdSv) - ALWIL Software - C:\Program Files\Alwil Software\Avast4\aswUpdSv.exe
    O23 - Service: avast! Antivirus - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashServ.exe
    O23 - Service: avast! Mail Scanner - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe
    O23 - Service: avast! Web Scanner - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashWebSv.exe

    --
    End of file - 2689 bytes
     
  10. 2009/05/25
    broni

    broni Moderator Malware Analyst

    Joined:
    2002/08/01
    Messages:
    21,701
    Likes Received:
    116
    I don't really see much here, so...

    Please download ComboFix from [color= "Red"]Here[/color] or [color= "#FF0000"]Here[/color] to your Desktop.

    **Note: In the event you already have Combofix, this is a new version that I need you to download. It is important that it is saved directly to your desktop**
    1. Please, never rename Combofix unless instructed.
    2. Close any open browsers.
    3. Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.
      • Very Important! Temporarily disable your anti-virus, script blocking and any anti-malware real-time protection before performing a scan. They can interfere with ComboFix or remove some of its embedded files which may cause "unpredictable results ".
      • Click on this link to see a list of programs that should be disabled. The list is not all inclusive. If yours is not listed and you don't know how to disable it, please ask.
      • Close any open browsers.
      • WARNING: Combofix will disconnect your machine from the Internet as soon as it starts
      • Please do not attempt to re-connect your machine back to the Internet until Combofix has completely finished.
      • If there is no internet connection after running Combofix, then restart your computer to restore back your connection.
    4. Double click on combofix.exe & follow the prompts.
    5. When finished, it will produce a report for you.
    6. Please post the "C:\ComboFix.txt" along with a new HijackThis log for further review.
    **Note: Do not mouseclick combofix's window while it's running. That may cause it to stall**

    Make sure, you re-enable your security programs, when you're done with Combofix.
     
  11. 2009/05/26
    Captain567

    Captain567 Inactive Thread Starter

    Joined:
    2009/05/24
    Messages:
    13
    Likes Received:
    0
    ComboFix:

    ComboFix 09-05-26.02 - Philip 05/26/2009 19:46.2 - NTFSx86
    Microsoft® Windows Vistaâ„¢ Ultimate 6.0.6000.0.1252.1.1033.18.2046.1555 [GMT -4:00]
    Running from: c:\users\Philip\Desktop\ComboFix.exe
    AV: avast! antivirus 4.8.1335 [VPS 090526-0] *On-access scanning disabled* (Updated) {7591DB91-41F0-48A3-B128-1A293FD8233D}
    SP: avast! antivirus 4.8.1335 [VPS 090526-0] *disabled* (Updated) {7591DB91-41F0-48A3-B128-1A293FD8233D}
    SP: SUPERAntiSpyware *disabled* (Updated) {222A897C-5018-402e-943F-7E7AC8560DA7}
    SP: Windows Defender *disabled* (Updated) {D68DDC3A-831F-4FAE-9E44-DA132C1ACF46}
    .

    ((((((((((((((((((((((((( Files Created from 2009-04-26 to 2009-05-26 )))))))))))))))))))))))))))))))
    .

    2009-05-25 19:00 . 2009-02-05 20:06 51376 ----a-w c:\windows\system32\drivers\aswTdi.sys
    2009-05-25 19:00 . 2009-02-05 20:06 23152 ----a-w c:\windows\system32\drivers\aswRdr.sys
    2009-05-25 19:00 . 2009-02-05 20:07 114768 ----a-w c:\windows\system32\drivers\aswSP.sys
    2009-05-25 19:00 . 2009-02-05 20:07 20560 ----a-w c:\windows\system32\drivers\aswFsBlk.sys
    2009-05-25 19:00 . 2009-02-05 20:04 97480 ----a-w c:\windows\system32\AvastSS.scr
    2009-05-25 19:00 . 2009-02-05 20:11 1256296 ----a-w c:\windows\system32\aswBoot.exe
    2009-05-25 19:00 . 2009-02-05 20:06 51792 ----a-w c:\windows\system32\drivers\aswMonFlt.sys
    2009-05-25 19:00 . 2003-03-18 20:20 1060864 ----a-w c:\windows\system32\MFC71.dll
    2009-05-25 19:00 . 2003-03-18 19:14 499712 ----a-w c:\windows\system32\MSVCP71.dll
    2009-05-25 19:00 . 2003-02-21 02:42 348160 ----a-w c:\windows\system32\MSVCR71.dll
    2009-05-25 18:59 . 2009-05-25 18:59 -------- d-----w c:\program files\Alwil Software
    2009-05-25 01:01 . 2009-05-25 01:01 -------- d-----w c:\users\Philip\AppData\Roaming\Malwarebytes
    2009-05-25 01:01 . 2009-04-06 19:32 15504 ----a-w c:\windows\system32\drivers\mbam.sys
    2009-05-25 01:01 . 2009-05-25 01:01 -------- d-----w c:\program files\Malwarebytes' Anti-Malware
    2009-05-25 01:01 . 2009-05-25 01:01 -------- d-----w c:\programdata\Malwarebytes
    2009-05-25 01:01 . 2009-04-06 19:32 38496 ----a-w c:\windows\system32\drivers\mbamswissarmy.sys
    2009-05-24 23:47 . 2009-05-26 00:19 117760 ----a-w c:\users\Philip\AppData\Roaming\SUPERAntiSpyware.com\SUPERAntiSpyware\SDDLLS\UIREPAIR.DLL
    2009-05-24 23:46 . 2009-05-24 23:46 -------- d-----w c:\programdata\SUPERAntiSpyware.com
    2009-05-24 23:46 . 2009-05-24 23:46 -------- d-----w c:\users\Philip\AppData\Roaming\SUPERAntiSpyware.com
    2009-05-24 23:46 . 2009-05-24 23:46 -------- d-----w c:\program files\SUPERAntiSpyware
    2009-05-24 23:46 . 2009-05-24 23:46 -------- d-sh--w c:\windows\Installer
    2009-05-24 23:46 . 2009-05-24 23:46 -------- d-----w c:\program files\Common Files\Wise Installation Wizard
    2009-05-24 23:40 . 2009-05-24 23:40 -------- d--h--w c:\programdata\CanonBJ
    2009-05-24 16:00 . 2009-05-24 16:00 -------- d-----w c:\program files\Trend Micro
    2009-05-24 15:50 . 2009-05-24 15:50 -------- d-----w c:\users\Philip\AppData\Local\Mozilla
    2009-05-24 15:46 . 2008-10-16 19:08 134144 ----a-w c:\windows\system32\drivers\Rtlh86.sys
    2009-05-24 15:46 . 2008-07-21 17:08 9728 ----a-w c:\windows\system32\RtNicProp32.dll
    2009-05-24 15:46 . 2009-05-24 15:46 -------- d--h--w c:\program files\InstallShield Installation Information
    2009-05-24 15:46 . 2009-05-24 15:46 -------- d-----w c:\program files\Realtek
    2009-05-24 15:46 . 2009-05-24 15:46 -------- d-----w c:\users\Philip\AppData\Roaming\InstallShield
    2009-05-24 15:42 . 2009-05-24 15:42 -------- d-----w c:\program files\Intel
    2009-05-24 15:42 . 2008-08-19 14:56 53248 ----a-w c:\windows\system32\CSVer.dll
    2009-05-24 15:42 . 2009-05-24 15:42 -------- d-----w C:\Intel
    2009-05-24 15:42 . 2008-09-16 17:17 -------- d-----w C:\Realtek
    2009-05-24 15:42 . 2008-10-15 18:28 -------- d-----w C:\INFUpdate
    2009-05-24 15:39 . 2009-05-24 15:42 -------- d-----w C:\RTL8111_Vista
    2009-05-21 02:23 . 2009-05-21 01:28 -------- d-----w c:\windows\Panther
    2009-05-21 02:23 . 2009-05-21 02:23 -------- d-sh--w C:\Boot
    2009-05-21 02:22 . 2009-05-21 02:22 -------- d-----w c:\windows\system32\OEM
    2009-05-21 01:25 . 2009-05-20 22:29 -------- d-----w c:\windows\Debug

    .
    (((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
    .
    2009-05-26 23:36 . 2009-05-20 22:31 680 ----a-w c:\users\Philip\AppData\Local\d3d9caps.dat
    2009-05-20 22:31 . 2009-05-20 22:31 48600 ----a-w c:\users\Philip\AppData\Local\GDIPFONTCACHEV1.DAT
    2006-11-22 14:58 . 2006-11-22 14:58 8192 --sha-w c:\windows\Users\Default\NTUSER.DAT
    .

    ((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
    .
    .
    *Note* empty entries & legit default entries are not shown
    REGEDIT4

    [HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
    "Sidebar "= "c:\program files\Windows Sidebar\sidebar.exe" [2006-11-02 1196032]

    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
    "avast! "= "c:\progra~1\ALWILS~1\Avast4\ashDisp.exe" [2009-02-05 81000]

    [hkey_local_machine\software\microsoft\windows\currentversion\explorer\ShellExecuteHooks]
    "{5AE067D3-9AFB-48E0-853A-EBB7F4A000DA} "= "c:\program files\SUPERAntiSpyware\SASSEH.DLL" [2008-05-13 77824]

    [HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\!SASWinLogon]
    2008-12-22 16:05 356352 ----a-w c:\program files\SUPERAntiSpyware\SASWINLO.dll

    [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\WinDefend]
    @= "Service "

    [HKLM\~\services\sharedaccess\parameters\firewallpolicy\FirewallRules]
    "{9E71BEF5-6C05-4262-A525-642EFACC6919} "= UDP:c:\program files\Malwarebytes' Anti-Malware\mbam.exe:Malwarebytes' Anti-Malware
    "{5E8DBFB3-C692-4157-A6E9-5BE41D8C778E} "= TCP:c:\program files\Malwarebytes' Anti-Malware\mbam.exe:Malwarebytes' Anti-Malware

    [HKLM\~\services\sharedaccess\parameters\firewallpolicy\RestrictedServices\Static\System]
    "DFSR-1 "= RPort=5722|UDP:%SystemRoot%\system32\svchost.exe|Svc=DFSR:Allow inbound TCP traffic|

    R1 aswSP;avast! Self Protection;c:\windows\System32\drivers\aswSP.sys [5/25/2009 3:00 PM 114768]
    R1 SASDIFSV;SASDIFSV;c:\program files\SUPERAntiSpyware\sasdifsv.sys [4/28/2009 11:33 AM 9968]
    R1 SASKUTIL;SASKUTIL;c:\program files\SUPERAntiSpyware\SASKUTIL.SYS [4/28/2009 11:33 AM 72944]
    R2 aswFsBlk;aswFsBlk;c:\windows\System32\drivers\aswFsBlk.sys [5/25/2009 3:00 PM 20560]
    R2 aswMonFlt;aswMonFlt;c:\windows\System32\drivers\aswMonFlt.sys [5/25/2009 3:00 PM 51792]
    S3 SASENUM;SASENUM;c:\program files\SUPERAntiSpyware\SASENUM.SYS [4/28/2009 11:33 AM 7408]
    .
    .
    ------- Supplementary Scan -------
    .
    FF - ProfilePath - c:\users\Philip\AppData\Roaming\Mozilla\Firefox\Profiles\8x6iq46z.default\
    FF - prefs.js: browser.search.selectedEngine - Wikipedia (en)
    .

    **************************************************************************

    catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
    Rootkit scan 2009-05-26 19:48
    Windows 6.0.6000 NTFS

    scanning hidden processes ...

    scanning hidden autostart entries ...

    scanning hidden files ...

    scan completed successfully
    hidden files: 0

    **************************************************************************
    .
    Completion time: 2009-05-26 19:48
    ComboFix-quarantined-files.txt 2009-05-26 23:48
    ComboFix2.txt 2009-05-26 23:42

    Pre-Run: 484,517,912,576 bytes free
    Post-Run: 484,501,663,744 bytes free

    106

    And HijackThis:

    Logfile of Trend Micro HijackThis v2.0.2
    Scan saved at 7:49:24 PM, on 5/26/2009
    Platform: Windows Vista (WinNT 6.00.1904)
    MSIE: Internet Explorer v7.00 (7.00.6000.16386)
    Boot mode: Normal

    Running processes:
    C:\Windows\system32\taskeng.exe
    C:\Windows\system32\Dwm.exe
    C:\Program Files\Alwil Software\Avast4\ashDisp.exe
    C:\Program Files\Windows Sidebar\sidebar.exe
    C:\Windows\Explorer.exe
    C:\Program Files\Windows Defender\MSASCui.exe
    C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
    R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
    R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName =
    O1 - Hosts: ::1 localhost
    O4 - HKLM\..\Run: [avast!] C:\PROGRA~1\ALWILS~1\Avast4\ashDisp.exe
    O4 - HKCU\..\Run: [Sidebar] C:\Program Files\Windows Sidebar\sidebar.exe /autoRun
    O13 - Gopher Prefix:
    O20 - Winlogon Notify: !SASWinLogon - C:\Program Files\SUPERAntiSpyware\SASWINLO.dll
    O23 - Service: avast! iAVS4 Control Service (aswUpdSv) - ALWIL Software - C:\Program Files\Alwil Software\Avast4\aswUpdSv.exe
    O23 - Service: avast! Antivirus - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashServ.exe
    O23 - Service: avast! Mail Scanner - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe
    O23 - Service: avast! Web Scanner - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashWebSv.exe

    --
    End of file - 1912 bytes
     
  12. 2009/05/31
    Captain567

    Captain567 Inactive Thread Starter

    Joined:
    2009/05/24
    Messages:
    13
    Likes Received:
    0
    Minor update...

    Where I stated that there have been no redirection to spam sites, this is no longer true. Every so often when I click on a Google result, I get redirected to another site, usually something called "Ego TV ". Looking at the browsing history, before this redirect there is a connection to a server with the IP 66.45.254.166 and also 67.29.139.253. Hopefully this can help get rid of this thing once and for all.
     
  13. 2009/05/31
    broni

    broni Moderator Malware Analyst

    Joined:
    2002/08/01
    Messages:
    21,701
    Likes Received:
    116
    Please download SystemLook from one of the links below and save it to your Desktop.
    Download Mirror #1
    Download Mirror #2

    • Double-click SystemLook.exe to run it.
    • Vista users:: Right click on SystemLook.exe, click Run As Administrator
    • Copy the content of the following box into the main textfield:
    • Click the Look button to start the scan.
    • When finished, a notepad window will open with the results of the scan. Please post this log in your next reply.
    Note: The log can also be found on your Desktop entitled SystemLook.txt
     
  14. 2009/05/31
    Captain567

    Captain567 Inactive Thread Starter

    Joined:
    2009/05/24
    Messages:
    13
    Likes Received:
    0
    SystemLook v1.0 by jpshortstuff (22.05.09)
    Log created at 20:26 on 31/05/2009 by Philip (Administrator - Elevation successful)

    ========== dir ==========

    C:\Program Files\Mozilla Firefox\searchplugins - Parameters: "(none) "

    ---Files---
    amazondotcom.xml --a--- 1394 bytes [15:50 24/05/2009] [00:39 24/04/2009]
    answers.xml --a--- 2193 bytes [15:50 24/05/2009] [00:39 24/04/2009]
    creativecommons.xml --a--- 1534 bytes [15:50 24/05/2009] [00:39 24/04/2009]
    eBay.xml --a--- 2343 bytes [15:50 24/05/2009] [00:39 24/04/2009]
    google.xml --a--- 1706 bytes [15:50 24/05/2009] [00:39 24/04/2009]
    wikipedia.xml --a--- 1178 bytes [15:50 24/05/2009] [00:39 24/04/2009]
    yahoo.xml --a--- 792 bytes [15:50 24/05/2009] [00:39 24/04/2009]

    ---Folders---
    None found.

    C:\Users\Philip\AppData\Roaming\Mozilla\Firefox\Profiles\8x6iq46z.default\searchplugins - Unable to find folder.

    C:\Program Files\mozilla firefox\components - Parameters: "(none) "

    ---Files---
    aboutRights.js --a--- 2925 bytes [15:50 24/05/2009] [00:39 24/04/2009]
    aboutRobots.js --a--- 2927 bytes [15:50 24/05/2009] [00:39 24/04/2009]
    browser.xpt --a--- 348547 bytes [15:50 24/05/2009] [00:39 24/04/2009]
    browserdirprovider.dll --a--- 23032 bytes [15:50 24/05/2009] [04:38 24/04/2009]
    brwsrcmp.dll --a--- 134648 bytes [15:50 24/05/2009] [04:38 24/04/2009]
    FeedConverter.js --a--- 25339 bytes [15:50 24/05/2009] [00:39 24/04/2009]
    FeedProcessor.js --a--- 66215 bytes [15:50 24/05/2009] [00:39 24/04/2009]
    FeedWriter.js --a--- 49694 bytes [15:50 24/05/2009] [00:39 24/04/2009]
    fuelApplication.js --a--- 38238 bytes [15:50 24/05/2009] [00:39 24/04/2009]
    jsconsole-clhandler.js --a--- 1494 bytes [15:50 24/05/2009] [00:39 24/04/2009]
    nsAddonRepository.js --a--- 11659 bytes [15:50 24/05/2009] [00:39 24/04/2009]
    nsBadCertHandler.js --a--- 3104 bytes [15:50 24/05/2009] [00:39 24/04/2009]
    nsBlocklistService.js --a--- 29984 bytes [15:50 24/05/2009] [00:39 24/04/2009]
    nsBrowserContentHandler.js --a--- 33087 bytes [15:50 24/05/2009] [00:39 24/04/2009]
    nsBrowserGlue.js --a--- 32315 bytes [15:50 24/05/2009] [00:39 24/04/2009]
    nsContentDispatchChooser.js --a--- 5005 bytes [15:50 24/05/2009] [00:39 24/04/2009]
    nsContentPrefService.js --a--- 29973 bytes [15:50 24/05/2009] [00:39 24/04/2009]
    nsDefaultCLH.js --a--- 6247 bytes [15:50 24/05/2009] [00:39 24/04/2009]
    nsDownloadManagerUI.js --a--- 5737 bytes [15:50 24/05/2009] [00:39 24/04/2009]
    nsExtensionManager.js --a--- 333468 bytes [15:50 24/05/2009] [00:39 24/04/2009]
    nsHandlerService.js --a--- 51214 bytes [15:50 24/05/2009] [00:39 24/04/2009]
    nsHelperAppDlg.js --a--- 41716 bytes [15:50 24/05/2009] [00:39 24/04/2009]
    nsLivemarkService.js --a--- 36039 bytes [15:50 24/05/2009] [00:39 24/04/2009]
    nsLoginInfo.js --a--- 4302 bytes [15:50 24/05/2009] [00:39 24/04/2009]
    nsLoginManager.js --a--- 44047 bytes [15:50 24/05/2009] [00:39 24/04/2009]
    nsLoginManagerPrompter.js --a--- 40367 bytes [15:50 24/05/2009] [00:39 24/04/2009]
    nsMicrosummaryService.js --a--- 77051 bytes [15:50 24/05/2009] [00:39 24/04/2009]
    nsPlacesTransactionsService.js --a--- 33805 bytes [15:50 24/05/2009] [00:39 24/04/2009]
    nsPostUpdateWin.js --a--- 21420 bytes [15:50 24/05/2009] [00:39 24/04/2009]
    nsProxyAutoConfig.js --a--- 13682 bytes [15:50 24/05/2009] [00:39 24/04/2009]
    nsSafebrowsingApplication.js --a--- 25176 bytes [15:50 24/05/2009] [00:39 24/04/2009]
    nsSearchService.js --a--- 110913 bytes [15:50 24/05/2009] [00:39 24/04/2009]
    nsSearchSuggestions.js --a--- 24273 bytes [15:50 24/05/2009] [00:39 24/04/2009]
    nsSessionStartup.js --a--- 11428 bytes [15:50 24/05/2009] [00:39 24/04/2009]
    nsSessionStore.js --a--- 76786 bytes [15:50 24/05/2009] [00:39 24/04/2009]
    nsSetDefaultBrowser.js --a--- 2854 bytes [15:50 24/05/2009] [00:39 24/04/2009]
    nsSidebar.js --a--- 12513 bytes [15:50 24/05/2009] [00:39 24/04/2009]
    nsTaggingService.js --a--- 9967 bytes [15:50 24/05/2009] [00:39 24/04/2009]
    nsTryToClose.js --a--- 3268 bytes [15:50 24/05/2009] [00:39 24/04/2009]
    nsUpdateService.js --a--- 112848 bytes [15:50 24/05/2009] [00:39 24/04/2009]
    nsUrlClassifierLib.js --a--- 50600 bytes [15:50 24/05/2009] [00:39 24/04/2009]
    nsUrlClassifierListManager.js --a--- 19984 bytes [15:50 24/05/2009] [00:39 24/04/2009]
    nsURLFormatter.js --a--- 3097 bytes [15:50 24/05/2009] [00:39 24/04/2009]
    nsWebHandlerApp.js --a--- 6920 bytes [15:50 24/05/2009] [00:39 24/04/2009]
    pluginGlue.js --a--- 3142 bytes [15:50 24/05/2009] [00:39 24/04/2009]
    storage-Legacy.js --a--- 49926 bytes [15:50 24/05/2009] [00:39 24/04/2009]
    txEXSLTRegExFunctions.js --a--- 6667 bytes [15:50 24/05/2009] [00:39 24/04/2009]
    WebContentConverter.js --a--- 34011 bytes [15:50 24/05/2009] [00:39 24/04/2009]

    ---Folders---
    None found.

    -=End Of File=-
     
  15. 2009/05/31
    broni

    broni Moderator Malware Analyst

    Joined:
    2002/08/01
    Messages:
    21,701
    Likes Received:
    116
    Hmmm...

    1. Open Windows Explorer. Navigate to:
    C:\WINDOWS\SYSTEM32\DRIVERS\ETC
    You'll see hosts file (no extension) there.
    Open the file in Notepad, and paste the content back here.

    2. Download FoxScan from HERE, or HERE
    Double click on FoxScan.exe to start the scan.
    DOS-like window will pop-up.
    Press 2 for English. Press Enter.
    Be patient. It'll take few minutes.
    When the tool is done, it'll display:

    Search completed.
    Press any key to coninue...


    Press any key.
    Notepad window titled Rapport-FS.txt will open.
    Copy all content, and paste it back here.
     
  16. 2009/05/31
    Captain567

    Captain567 Inactive Thread Starter

    Joined:
    2009/05/24
    Messages:
    13
    Likes Received:
    0
    # Copyright (c) 1993-2006 Microsoft Corp.
    #
    # This is a sample HOSTS file used by Microsoft TCP/IP for Windows.
    #
    # This file contains the mappings of IP addresses to host names. Each
    # entry should be kept on an individual line. The IP address should
    # be placed in the first column followed by the corresponding host name.
    # The IP address and the host name should be separated by at least one
    # space.
    #
    # Additionally, comments (such as these) may be inserted on individual
    # lines or following the machine name denoted by a '#' symbol.
    #
    # For example:
    #
    # 102.54.94.97 rhino.acme.com # source server
    # 38.25.63.10 x.acme.com # x client host

    127.0.0.1 localhost
    ::1 localhost

    FoxScan has its access denied, and the log it produces is blank.
     
  17. 2009/05/31
    broni

    broni Moderator Malware Analyst

    Joined:
    2002/08/01
    Messages:
    21,701
    Likes Received:
    116
    Right click on FoxScan.exe, and click Run as Administrator
     
  18. 2009/06/01
    Captain567

    Captain567 Inactive Thread Starter

    Joined:
    2009/05/24
    Messages:
    13
    Likes Received:
    0
    Oh, of course, my mistake. Here it is:

    FoxScan Version 1.1.0
    By Loup blanc - Zebulon.fr
    Scan started Mon 06/01/2009 at 17:44

    Microsoft Windows Vista (TM) Ultimate [Version 6.0.6000]

    Mozilla Firefox version : 3.0.10 (en-US)
    Installation folder : C:\Program Files\Mozilla Firefox


    =================================================================================
    ---------- User account : Philip [Current session]
    =================================================================================


    Profile name : default
    Profile folder : C:\Users\Philip\AppData\Roaming\mozilla\firefox\Profiles\8x6iq46z.default\


    //////////// Setting \\\\\\\\\\\\\
    ======= Profile name : default =======

    Firefox update : Activated
    Add-on update : Activated
    Search engines update : Activated
    Java : Activated
    Javascript : Activated
    Proxy : No Proxy




    //////////// Add-on \\\\\\\\\\\\\

    ======= Profile name : default =======

    Installation notification for Add-on is enabled

    Name : Default
    State : Activated
    Folder : C:\Program Files\Mozilla Firefox\extensions\{972ce4c6-7e08-4474-a285-3208198ce6fd}




    //////////// Search plugins \\\\\\\\\\\\\

    ======= Profile name : default =======

    Search in "prefs.js" :

    browser.search.defaultenginename :
    browser.search.defaulturl :
    browser.search.selectedEngine : "Wikipedia (en
    keyword.URL :
    keyword.enable :


    --------- Search engines found ------------
    + Search form configured for the engine





    =================================================================================
    ---------- Common section
    =================================================================================

    //////////// DLL found in C:\Program Files\Mozilla Firefox\components \\\\\\\\\\\\\

    browserdirprovider.dll
    brwsrcmp.dll


    ------------------------------------------------------

    //////////// Search plugins \\\\\\\\\\\\\

    --------- Search engines found ------------
    + Search form configured for the engine


    C:\Program Files\Mozilla Firefox\searchplugins\amazondotcom.xml
    Template : http://www.amazon.com/exec/obidos/external-search/


    C:\Program Files\Mozilla Firefox\searchplugins\answers.xml
    Template : http://www.answers.com/main/ntquery


    C:\Program Files\Mozilla Firefox\searchplugins\creativecommons.xml
    Template : http://search.creativecommons.org/


    C:\Program Files\Mozilla Firefox\searchplugins\eBay.xml
    Template : http://rover.ebay.com/rover/1/711-47294-18009-3/4


    C:\Program Files\Mozilla Firefox\searchplugins\google.xml
    Template : http://www.google.com/search


    C:\Program Files\Mozilla Firefox\searchplugins\wikipedia.xml
    Template : http://en.wikipedia.org/wiki/Special:Search


    C:\Program Files\Mozilla Firefox\searchplugins\yahoo.xml
    Template : http://search.yahoo.com/search



    ------------------------------------------------------

    //////////// Plugins set in registry \\\\\\\\\\\\\



    ------------------------------------------------------

    //////////// Additional search... \\\\\\\\\\\\\

    ==== Additional extension ====



    =========================== End of report ===========================
     
  19. 2009/06/01
    broni

    broni Moderator Malware Analyst

    Joined:
    2002/08/01
    Messages:
    21,701
    Likes Received:
    116
    Don't worry about it. Many Vista user are either not aware of it, or they forget :)

    1. Open Windows Explorer. Navigate to:
    C:\Users\Philip\AppData\Roaming\mozilla\firefox\Profiles\8x6iq46z.default\
    Find prefs.js file. Open it in Notepad, and paste the content back here.

    2. Your MBAM version was really outdated. Uninstall your version, and download newest version, or simply download the newest definitions from here: http://www.gt500.org/malwarebytes/database.jsp. It's self-installing .exe file.
    Run full scan, and post the log.
     
  20. 2009/06/01
    Captain567

    Captain567 Inactive Thread Starter

    Joined:
    2009/05/24
    Messages:
    13
    Likes Received:
    0
    # Mozilla User Preferences

    /* Do not edit this file.
    *
    * If you make changes to this file while the application is running,
    * the changes will be overwritten when the application exits.
    *
    * To make a manual change to preferences, you can visit the URL about:config
    * For more information, see http://www.mozilla.org/unix/customizing.html#prefs
    */

    user_pref( "accessibility.typeaheadfind.flashBar ", 0);
    user_pref( "app.update.lastUpdateTime.addon-background-update-timer ", 1243784756);
    user_pref( "app.update.lastUpdateTime.background-update-timer ", 1243784756);
    user_pref( "app.update.lastUpdateTime.blocklist-background-update-timer ", 1243784756);
    user_pref( "app.update.lastUpdateTime.microsummary-generator-update-timer ", 1243785956);
    user_pref( "app.update.lastUpdateTime.search-engine-update-timer ", 1243802156);
    user_pref( "browser.download.dir ", "C:\\Users\\Philip\\Desktop ");
    user_pref( "browser.download.manager.alertOnEXEOpen ", true);
    user_pref( "browser.migration.version ", 1);
    user_pref( "browser.places.importBookmarksHTML ", false);
    user_pref( "browser.places.importDefaults ", false);
    user_pref( "browser.places.leftPaneFolderId ", -1);
    user_pref( "browser.places.migratePostDataAnnotations ", false);
    user_pref( "browser.places.smartBookmarksVersion ", 1);
    user_pref( "browser.places.updateRecentTagsUri ", false);
    user_pref( "browser.rights.3.shown ", true);
    user_pref( "browser.search.selectedEngine ", "Wikipedia (en) ");
    user_pref( "browser.startup.homepage_override.mstone ", "rv:1.9.0.10 ");
    user_pref( "extensions.enabledItems ", "{972ce4c6-7e08-4474-a285-3208198ce6fd}:3.0.10 ");
    user_pref( "extensions.lastAppVersion ", "3.0.10 ");
    user_pref( "intl.charsetmenu.browser.cache ", "windows-1252, ISO-8859-1, UTF-8 ");
    user_pref( "network.cookie.prefsMigrated ", true);
    user_pref( "print.print_printer ", "\\\\Andrzej-pc\\Canon Inkjet MP450 Series ");
    user_pref( "print.printer_\\\\Andrzej-pc\\Canon_Inkjet_MP450_Series.print_bgcolor ", false);
    user_pref( "print.printer_\\\\Andrzej-pc\\Canon_Inkjet_MP450_Series.print_bgimages ", false);
    user_pref( "print.printer_\\\\Andrzej-pc\\Canon_Inkjet_MP450_Series.print_command ", " ");
    user_pref( "print.printer_\\\\Andrzej-pc\\Canon_Inkjet_MP450_Series.print_downloadfonts ", false);
    user_pref( "print.printer_\\\\Andrzej-pc\\Canon_Inkjet_MP450_Series.print_edge_bottom ", 0);
    user_pref( "print.printer_\\\\Andrzej-pc\\Canon_Inkjet_MP450_Series.print_edge_left ", 0);
    user_pref( "print.printer_\\\\Andrzej-pc\\Canon_Inkjet_MP450_Series.print_edge_right ", 0);
    user_pref( "print.printer_\\\\Andrzej-pc\\Canon_Inkjet_MP450_Series.print_edge_top ", 0);
    user_pref( "print.printer_\\\\Andrzej-pc\\Canon_Inkjet_MP450_Series.print_evenpages ", true);
    user_pref( "print.printer_\\\\Andrzej-pc\\Canon_Inkjet_MP450_Series.print_footercenter ", " ");
    user_pref( "print.printer_\\\\Andrzej-pc\\Canon_Inkjet_MP450_Series.print_footerleft ", "&PT ");
    user_pref( "print.printer_\\\\Andrzej-pc\\Canon_Inkjet_MP450_Series.print_footerright ", "&D ");
    user_pref( "print.printer_\\\\Andrzej-pc\\Canon_Inkjet_MP450_Series.print_headercenter ", " ");
    user_pref( "print.printer_\\\\Andrzej-pc\\Canon_Inkjet_MP450_Series.print_headerleft ", "&T ");
    user_pref( "print.printer_\\\\Andrzej-pc\\Canon_Inkjet_MP450_Series.print_headerright ", "&U ");
    user_pref( "print.printer_\\\\Andrzej-pc\\Canon_Inkjet_MP450_Series.print_in_color ", true);
    user_pref( "print.printer_\\\\Andrzej-pc\\Canon_Inkjet_MP450_Series.print_margin_bottom ", "0.5 ");
    user_pref( "print.printer_\\\\Andrzej-pc\\Canon_Inkjet_MP450_Series.print_margin_left ", "0.5 ");
    user_pref( "print.printer_\\\\Andrzej-pc\\Canon_Inkjet_MP450_Series.print_margin_right ", "0.5 ");
    user_pref( "print.printer_\\\\Andrzej-pc\\Canon_Inkjet_MP450_Series.print_margin_top ", "0.5 ");
    user_pref( "print.printer_\\\\Andrzej-pc\\Canon_Inkjet_MP450_Series.print_oddpages ", true);
    user_pref( "print.printer_\\\\Andrzej-pc\\Canon_Inkjet_MP450_Series.print_orientation ", 1);
    user_pref( "print.printer_\\\\Andrzej-pc\\Canon_Inkjet_MP450_Series.print_pagedelay ", 500);
    user_pref( "print.printer_\\\\Andrzej-pc\\Canon_Inkjet_MP450_Series.print_paper_data ", 1);
    user_pref( "print.printer_\\\\Andrzej-pc\\Canon_Inkjet_MP450_Series.print_paper_height ", " 11.00 ");
    user_pref( "print.printer_\\\\Andrzej-pc\\Canon_Inkjet_MP450_Series.print_paper_size_type ", 0);
    user_pref( "print.printer_\\\\Andrzej-pc\\Canon_Inkjet_MP450_Series.print_paper_size_unit ", 0);
    user_pref( "print.printer_\\\\Andrzej-pc\\Canon_Inkjet_MP450_Series.print_paper_width ", " 8.50 ");
    user_pref( "print.printer_\\\\Andrzej-pc\\Canon_Inkjet_MP450_Series.print_reversed ", false);
    user_pref( "print.printer_\\\\Andrzej-pc\\Canon_Inkjet_MP450_Series.print_scaling ", " 1.00 ");
    user_pref( "print.printer_\\\\Andrzej-pc\\Canon_Inkjet_MP450_Series.print_shrink_to_fit ", true);
    user_pref( "print.printer_\\\\Andrzej-pc\\Canon_Inkjet_MP450_Series.print_to_file ", false);
    user_pref( "print.printer_\\\\Andrzej-pc\\Canon_Inkjet_MP450_Series.print_to_filename ", " ");
    user_pref( "print.printer_\\\\Andrzej-pc\\Canon_Inkjet_MP450_Series.print_unwriteable_margin_bottom ", 0);
    user_pref( "print.printer_\\\\Andrzej-pc\\Canon_Inkjet_MP450_Series.print_unwriteable_margin_left ", 0);
    user_pref( "print.printer_\\\\Andrzej-pc\\Canon_Inkjet_MP450_Series.print_unwriteable_margin_right ", 0);
    user_pref( "print.printer_\\\\Andrzej-pc\\Canon_Inkjet_MP450_Series.print_unwriteable_margin_top ", 0);
    user_pref( "spellchecker.dictionary ", "en-US ");
    user_pref( "urlclassifier.keyupdatetime.https://sb-ssl.google.com/safebrowsing/newkey ", 1245772224);

    Malwarebytes' Anti-Malware 1.37
    Database version: 2202
    Windows 6.0.6000

    6/1/2009 8:06:48 PM
    mbam-log-2009-06-01 (20-06-48).txt

    Scan type: Full Scan (C:\|E:\|F:\|)
    Objects scanned: 115003
    Time elapsed: 27 minute(s), 24 second(s)

    Memory Processes Infected: 0
    Memory Modules Infected: 0
    Registry Keys Infected: 0
    Registry Values Infected: 0
    Registry Data Items Infected: 0
    Folders Infected: 0
    Files Infected: 0

    Memory Processes Infected:
    (No malicious items detected)

    Memory Modules Infected:
    (No malicious items detected)

    Registry Keys Infected:
    (No malicious items detected)

    Registry Values Infected:
    (No malicious items detected)

    Registry Data Items Infected:
    (No malicious items detected)

    Folders Infected:
    (No malicious items detected)

    Files Infected:
    (No malicious items detected)
     
  21. 2009/06/01
    broni

    broni Moderator Malware Analyst

    Joined:
    2002/08/01
    Messages:
    21,701
    Likes Received:
    116
    This is a real mystery.
    There is no single sign of any, even most minor infection.
    No Goored, no Yoog presence.

    I checked those IP addresses you posted:
    66.45.254.166 belongs to Interserver, Inc - Secaucus, NJ
    67.29.139.253 belongs to Level 3 Communications, Inc. - Broomfield, CO
    Familiar?
     

Share This Page

  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.