Win32/rustock.m

View previous topic View next topic Go down

Win32/rustock.m

Post by Hardykat on 21st December 2009, 6:08 pm

Hi.
This is going to be lengthy, just to warn you.

I have a problem that has been going on for a while and really need it fixed. So thanks in advance to anyone that can help me.

I have a Dell desktop computer that is running WinXP/SP3. It's my work computer and it is linked to a network. I'm running AVG Anti Virus Free version 9.0.717. It's set to run a scan at start up and I also run Malwarebyte Anti-Malware at least a couple times a week.

Anyway, the computer picked up a nasty virus. I didn't find out until I sent a email to my home e-mail address from my work address and it infected my home computer. On my home comp, It disabled Safe Mode, slowed it down, disabled McAfee (I have comcast at home and McAfee came with the service). After a two day battle, I got the home computer to work again. Now I'm trying to fix the work computer. I have admin rights to my work computer, so I have access to the system. I ran AVG and the I get 2 infected files:
C:\\WINDOWS\system32\services.exe[720]memory_0094000
C:\\WINDOWS\system32\services.exe
Both have been infected with the Win32/Rustock.M.AVG removes the infection then requires a restart. After the restart, things are fine for a while, but when I try to do a google search, I get all these redirects then a Virus Threat alert form AVE about "autorun.inf". I run Malware, it finds the trojans and I have to do a restart to remove them.

I also changed my browser from IE to Firefox thinking that would cut down on the Google Redirects.

I'm doing this same process almost every day. HELP! How can I get rid of this rustock virus/trojan/whatever it is? I've attached my HIJackThis scan:

Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 12:14:33 PM, on 12/21/2009
Platform: Windows XP SP3 (WinNT 5.01.2600)
MSIE: Internet Explorer v7.00 (7.00.6000.16827)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\AVG\AVG9\avgchsvx.exe
C:\Program Files\AVG\AVG9\avgrsx.exe
C:\Program Files\AVG\AVG9\avgcsrvx.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\AVG\AVG9\avgwdsvc.exe
C:\Program Files\Bonjour\mDNSResponder.exe
C:\PROGRA~1\SYMANT~1\SYMANT~1\DefWatch.exe
C:\Program Files\Java\jre6\bin\jqs.exe
C:\Program Files\Common Files\LightScribe\LSSrvc.exe
C:\Program Files\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE
C:\Program Files\AVG\AVG9\avgnsx.exe
C:\WINDOWS\system32\srvany.exe
C:\WINDOWS\system32\svchost.exe
C:\pvsw\bin\w3dbsmgr.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\hkcmd.exe
C:\WINDOWS\system32\igfxpers.exe
C:\PROGRA~1\SYMANT~1\SYMANT~1\vptray.exe
C:\PROGRA~1\AVG\AVG9\avgtray.exe
C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe
C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Adobe\Acrobat 6.0\Distillr\acrotray.exe
C:\Program Files\Common Files\Ahead\Lib\NMIndexStoreSvr.exe
C:\Program Files\Common Files\Ahead\Lib\NMIndexingService.exe
C:\Program Files\Mozilla Firefox\firefox.exe
C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = [You must be registered and logged in to see this link.]
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = [You must be registered and logged in to see this link.]
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = [You must be registered and logged in to see this link.]
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Bar = [You must be registered and logged in to see this link.]
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = [You must be registered and logged in to see this link.]
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = [You must be registered and logged in to see this link.]
R1 - HKCU\Software\Microsoft\Internet Connection Wizard,ShellNext = [You must be registered and logged in to see this link.]
R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = *.local
O2 - BHO: (no name) - {02478D38-C3F9-4efb-9B51-7695ECA05670} - (no file)
O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 6.0\Acrobat\ActiveX\AcroIEHelper.dll
O2 - BHO: WormRadar.com IESiteBlocker.NavFilter - {3ca2f312-6f6e-4b53-a66e-4e65e497c8c0} - C:\Program Files\AVG\AVG9\avgssie.dll
O2 - BHO: Google Toolbar Helper - {aa58ed58-01dd-4d91-8333-cf10577473f7} - C:\Program Files\Google\Google Toolbar\GoogleToolbar_32.dll
O2 - BHO: AcroIEToolbarHelper Class - {ae7cd045-e861-484f-8273-0445ee161910} - C:\Program Files\Adobe\Acrobat 6.0\Acrobat\AcroIEFavClient.dll
O2 - BHO: Google Toolbar Notifier BHO - {af69de43-7d58-4638-b6fa-ce66b5ad205d} - C:\Program Files\Google\GoogleToolbarNotifier\5.4.4525.1752\swg.dll
O2 - BHO: Java(tm) Plug-In 2 SSV Helper - {dbc80044-a445-435b-bc74-9c25c1c588a9} - C:\Program Files\Java\jre6\bin\jp2ssv.dll
O2 - BHO: JQSIEStartDetectorImpl - {e7e6f031-17ce-4c07-bc86-eabfe594f69c} - C:\Program Files\Java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll
O3 - Toolbar: Adobe PDF - {47833539-D0C5-4125-9FA8-0819E2EAAC93} - C:\Program Files\Adobe\Acrobat 6.0\Acrobat\AcroIEFavClient.dll
O3 - Toolbar: Google Toolbar - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - C:\Program Files\Google\Google Toolbar\GoogleToolbar_32.dll
O4 - HKLM\..\Run: [igfxtray] C:\WINDOWS\system32\igfxtray.exe
O4 - HKLM\..\Run: [igfxhkcmd] C:\WINDOWS\system32\hkcmd.exe
O4 - HKLM\..\Run: [igfxpers] C:\WINDOWS\system32\igfxpers.exe
O4 - HKLM\..\Run: [vptray] C:\PROGRA~1\SYMANT~1\SYMANT~1\vptray.exe
O4 - HKLM\..\Run: [masqform.exe] C:\Program Files\PureEdge\Viewer 6.0\masqform.exe -UpdateCurrentUser
O4 - HKLM\..\Run: [Adobe Reader Speed Launcher] "C:\Program Files\Adobe\Reader 8.0\Reader\Reader_sl.exe"
O4 - HKLM\..\Run: [PeachtreePrefetcher.exe] "C:\PROGRA~1\SAGESO~1\PEACHT~1\PeachtreePrefetcher.exe" /configfile:peachtreeprefetcher.winstart.config
O4 - HKLM\..\Run: [NeroFilterCheck] C:\Program Files\Common Files\Ahead\Lib\NeroCheck.exe
O4 - HKLM\..\Run: [AVG9_TRAY] C:\PROGRA~1\AVG\AVG9\avgtray.exe
O4 - HKCU\..\Run: [BgMonitor_{79662E04-7C6C-4d9f-84C7-88D8A56B10AA}] "C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe"
O4 - HKCU\..\Run: [swg] "C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe"
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
O4 - Global Startup: Acrobat Assistant.lnk = C:\Program Files\Adobe\Acrobat 6.0\Distillr\acrotray.exe
O8 - Extra context menu item: E&xport to Microsoft Excel - [You must be registered and logged in to see this link.]
O8 - Extra context menu item: google sidewiki... - [You must be registered and logged in to see this link.] Files\Google\Google Toolbar\Component\GoogleToolbarDynamic_mui_en_60D6097707281E79.dll/cmsidewiki.html
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\OFFICE11\REFIEBAR.DLL
O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O11 - Options group: [java_sun] Java (Sun)
O16 - DPF: {4871a87a-bfdd-4106-8153-ffde2bac2967} (DLM Control) - [You must be registered and logged in to see this link.]
O16 - DPF: {6F750202-1362-4815-A476-88533DE61D0C} (Kodak Gallery Easy Upload Manager Class) - [You must be registered and logged in to see this link.]
O16 - DPF: {6F750203-1362-4815-A476-88533DE61D0C} (Kodak Gallery Easy Upload Manager Class) - [You must be registered and logged in to see this link.]
O16 - DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} (Shockwave Flash Object) - [You must be registered and logged in to see this link.]
O17 - HKLM\System\CCS\Services\Tcpip\Parameters: Domain = cerm.local
O17 - HKLM\Software\..\Telephony: DomainName = cerm.local
O17 - HKLM\System\CS1\Services\Tcpip\Parameters: Domain = cerm.local
O18 - Protocol: linkscanner - {F274614C-63F8-47D5-A4D1-FBDDE494F8D1} - C:\Program Files\AVG\AVG9\avgpp.dll
O20 - Winlogon Notify: avgrsstarter - C:\WINDOWS\SYSTEM32\avgrsstx.dll
O23 - Service: AVG Free WatchDog (avg9wd) - AVG Technologies CZ, s.r.o. - C:\Program Files\AVG\AVG9\avgwdsvc.exe
O23 - Service: Background Intelligent Transfer Service (BITS) - Unknown owner - C:\WINDOWS\
O23 - Service: ##Id_String1.6844F930_1628_4223_B5CC_5BB94B879762## (bonjour service) - Apple Computer, Inc. - C:\Program Files\Bonjour\mDNSResponder.exe
O23 - Service: DefWatch - Symantec Corporation - C:\PROGRA~1\SYMANT~1\SYMANT~1\DefWatch.exe
O23 - Service: FLEXnet Licensing Service (flexnet licensing service) - Macrovision Europe Ltd. - C:\Program Files\Common Files\Macrovision Shared\FLEXnet Publisher\FNPLicensingService.exe
O23 - Service: Google Software Updater (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\1050\Intel 32\IDriverT.exe
O23 - Service: Java Quick Starter (javaquickstarterservice) - Sun Microsystems, Inc. - C:\Program Files\Java\jre6\bin\jqs.exe
O23 - Service: LightScribeService Direct Disc Labeling Service (LightScribeService) - Hewlett-Packard Company - C:\Program Files\Common Files\LightScribe\LSSrvc.exe
O23 - Service: NMIndexingService - Nero AG - C:\Program Files\Common Files\Ahead\Lib\NMIndexingService.exe
O23 - Service: Symantec AntiVirus Client (Norton AntiVirus Server) - Symantec Corporation - C:\PROGRA~1\SYMANT~1\SYMANT~1\Rtvscan.exe
O23 - Service: Pervasive.SQL Workgroup Engine - Unknown owner - C:\WINDOWS\system32\srvany.exe
O23 - Service: Automatic Updates (wuauserv) - Unknown owner - C:\WINDOWS\

--
End of file - 8612 bytes

Hardykat
Novice
Novice

Posts Posts : 28
Joined Joined : 2009-12-21
Gender Gender : Female
OS OS : Windows 7 Home Premium
Protection Protection : Norton 360,
Points Points : 25791
# Likes # Likes : 0

View user profile

Back to top Go down

Re: Win32/rustock.m

Post by Belahzur on 21st December 2009, 6:55 pm

Hello.
Hardy fan too eh? Goofy Let the Hardy party begin, Jeff forever.

  • Open HijackThis
  • Choose "Do a system scan only"
  • Check the boxes in front of these lines:


    O2 - BHO: (no name) - {02478D38-C3F9-4efb-9B51-7695ECA05670} - (no file)



  • Press "Fix Checked"
  • Close Hijack This.

Please download and run this tool.

Download Malwarebytes' Anti-Malware from [You must be registered and logged in to see this link.]

Double Click mbam-setup.exe to install the application.

  • Make sure a checkmark is placed next to Update Malwarebytes' Anti-Malware and Launch Malwarebytes' Anti-Malware, then click Finish.
  • If an update is found, it will download and install the latest version.
  • Once the program has loaded, select "Perform Quick Scan", then click Scan.
  • The scan may take some time to finish,so please be patient.
  • When the scan is complete, click OK, then Show Results to view the results.
  • Make sure that everything is checked, and click Remove Selected.
  • When disinfection is completed, a log will open in Notepad and you may be prompted to Restart. (See Note)
  • The log is automatically saved by MBAM and can be viewed by clicking the Logs tab in MBAM.
Note:
If MBAM encounters a file that is difficult to remove, you will be presented with 1 of 2 prompts.
Click OK to either and let MBAM proceed with the disinfection process.
If asked to restart the computer, please do so immediately.


Post the contents of the MBAM Log.


[You must be registered and logged in to see this link.] - [You must be registered and logged in to see this link.] - Please PM me if I fail to respond within 24hrs.


Belahzur
Administrator
Administrator

Posts Posts : 34918
Joined Joined : 2008-08-03
Gender Gender : Male
OS OS : 7 Home Premium x64
Points Points : 245101
# Likes # Likes : 1

View user profile

Back to top Go down

Re: Win32/rustock.m

Post by Hardykat on 21st December 2009, 8:02 pm

Hooray! Hardy Party!

Sorry it took so long, but here it is:

Malwarebytes' Anti-Malware 1.42
Database version: 3405
Windows 5.1.2600 Service Pack 3
Internet Explorer 7.0.5730.13

12/21/2009 2:57:03 PM
mbam-log-2009-12-21 (14-56-55).txt

Scan type: Quick Scan
Objects scanned: 201878
Time elapsed: 39 minute(s), 37 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 2
Folders Infected: 0
Files Infected: 0

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\BITS\ImagePath (Hijack.WindowsUpdates) -> Bad: (%fystemRoot%\system32\svchost.exe -k netsvcs) Good: (%SystemRoot%\System32\svchost.exe -k netsvcs) -> No action taken.
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\wuauserv\ImagePath (Hijack.WindowsUpdates) -> Bad: (%fystemroot%\system32\svchost.exe -k netsvcs) Good: (%SystemRoot%\System32\svchost.exe -k netsvcs) -> No action taken.

Folders Infected:
(No malicious items detected)

Files Infected:
(No malicious items detected)

______________

Also while Malwarebytes was scanning, AVG popped up that virus threat again:

"Accessed File is detected

Groups\autorun.inf

Virus detected as worm\autorun.ay

detected at opening"

tried to look up what that worm file was on avg's website, but could find the definition.

Hardykat
Novice
Novice

Posts Posts : 28
Joined Joined : 2009-12-21
Gender Gender : Female
OS OS : Windows 7 Home Premium
Protection Protection : Norton 360,
Points Points : 25791
# Likes # Likes : 0

View user profile

Back to top Go down

Re: Win32/rustock.m

Post by Belahzur on 21st December 2009, 8:04 pm

Looks like we need to go deeper.

Download the GMER rootkit scan from here: [You must be registered and logged in to see this link.]

  1. Unzip it and start GMER.
  2. Click the >>> tab and then click the Scan button.
  3. Once done, click the Copy button.
  4. This will copy the results to your clipboard.
  5. Paste the results in your next reply.
Note:
If you're having problems with running GMER.exe, try it in safe mode. This tools works in safe mode.
You can also try renaming it since some malware blocks GMER.


[You must be registered and logged in to see this link.] - [You must be registered and logged in to see this link.] - Please PM me if I fail to respond within 24hrs.


Belahzur
Administrator
Administrator

Posts Posts : 34918
Joined Joined : 2008-08-03
Gender Gender : Male
OS OS : 7 Home Premium x64
Points Points : 245101
# Likes # Likes : 1

View user profile

Back to top Go down

Re: Win32/rustock.m

Post by Hardykat on 21st December 2009, 10:18 pm

The GMER scan is taking a long time and I'm about to leave work. What I'll do is run it as soon as I get into tomorrow morning. I'll post up the results then. Thanks for help me out.

Hardykat
Novice
Novice

Posts Posts : 28
Joined Joined : 2009-12-21
Gender Gender : Female
OS OS : Windows 7 Home Premium
Protection Protection : Norton 360,
Points Points : 25791
# Likes # Likes : 0

View user profile

Back to top Go down

Re: Win32/rustock.m

Post by Belahzur on 21st December 2009, 10:23 pm

Not a problem.


[You must be registered and logged in to see this link.] - [You must be registered and logged in to see this link.] - Please PM me if I fail to respond within 24hrs.


Belahzur
Administrator
Administrator

Posts Posts : 34918
Joined Joined : 2008-08-03
Gender Gender : Male
OS OS : 7 Home Premium x64
Points Points : 245101
# Likes # Likes : 1

View user profile

Back to top Go down

Re: Win32/rustock.m

Post by Hardykat on 22nd December 2009, 4:24 pm

Alright I'm back. Ran the GMER scan.

GMER 1.0.15.15281 - [You must be registered and logged in to see this link.]
Rootkit scan 2009-12-22 11:23:18
Windows 5.1.2600 Service Pack 3
Running: vz0kxfvh.exe; Driver: C:\DOCUME~1\jcureton\LOCALS~1\Temp\agldapow.sys


---- System - GMER 1.0.15 ----

SSDT \SystemRoot\System32\drivers\48ea34fa.sys ZwCreateEvent [0xEEA30F2D] <-- ROOTKIT !!!
SSDT \SystemRoot\System32\drivers\48ea34fa.sys ZwCreateKey [0xEEA2F005] <-- ROOTKIT !!!
SSDT \SystemRoot\System32\drivers\48ea34fa.sys ZwOpenKey [0xEEA2F0C5] <-- ROOTKIT !!!

---- Kernel code sections - GMER 1.0.15 ----

? C:\WINDOWS\System32\drivers\48ea34fa.sys The system cannot find the file specified.

---- User code sections - GMER 1.0.15 ----

.text C:\WINDOWS\system32\hkcmd.exe[128] ADVAPI32.dll!CryptDestroyKey 77DE9EBC 7 Bytes JMP 00D1299A
.text C:\WINDOWS\system32\hkcmd.exe[128] ADVAPI32.dll!CryptDecrypt 77DEA129 7 Bytes JMP 00D1294A
.text C:\WINDOWS\system32\hkcmd.exe[128] ADVAPI32.dll!CryptEncrypt 77DEE360 7 Bytes JMP 00D1290E
.text C:\WINDOWS\system32\hkcmd.exe[128] WS2_32.dll!closesocket 71AB3E2B 5 Bytes JMP 00D128F2
.text C:\WINDOWS\system32\hkcmd.exe[128] WS2_32.dll!send 71AB4C27 5 Bytes JMP 00D1277E
.text C:\WINDOWS\system32\hkcmd.exe[128] WS2_32.dll!WSARecv 71AB4CB5 5 Bytes JMP 00D12870
.text C:\WINDOWS\system32\hkcmd.exe[128] WS2_32.dll!recv 71AB676F 5 Bytes JMP 00D127B6
.text C:\WINDOWS\system32\hkcmd.exe[128] WS2_32.dll!WSASend 71AB68FA 5 Bytes JMP 00D127EE
.text C:\WINDOWS\system32\igfxpers.exe[184] ADVAPI32.dll!CryptDestroyKey 77DE9EBC 7 Bytes JMP 00D0299A
.text C:\WINDOWS\system32\igfxpers.exe[184] ADVAPI32.dll!CryptDecrypt 77DEA129 7 Bytes JMP 00D0294A
.text C:\WINDOWS\system32\igfxpers.exe[184] ADVAPI32.dll!CryptEncrypt 77DEE360 7 Bytes JMP 00D0290E
.text C:\WINDOWS\system32\igfxpers.exe[184] WS2_32.dll!closesocket 71AB3E2B 5 Bytes JMP 00D028F2
.text C:\WINDOWS\system32\igfxpers.exe[184] WS2_32.dll!send 71AB4C27 5 Bytes JMP 00D0277E
.text C:\WINDOWS\system32\igfxpers.exe[184] WS2_32.dll!WSARecv 71AB4CB5 5 Bytes JMP 00D02870
.text C:\WINDOWS\system32\igfxpers.exe[184] WS2_32.dll!recv 71AB676F 5 Bytes JMP 00D027B6
.text C:\WINDOWS\system32\igfxpers.exe[184] WS2_32.dll!WSASend 71AB68FA 5 Bytes JMP 00D027EE
.text C:\Program Files\Bonjour\mDNSResponder.exe[320] WS2_32.dll!closesocket 71AB3E2B 5 Bytes JMP 00D828F2
.text C:\Program Files\Bonjour\mDNSResponder.exe[320] WS2_32.dll!send 71AB4C27 5 Bytes JMP 00D8277E
.text C:\Program Files\Bonjour\mDNSResponder.exe[320] WS2_32.dll!WSARecv 71AB4CB5 5 Bytes JMP 00D82870
.text C:\Program Files\Bonjour\mDNSResponder.exe[320] WS2_32.dll!recv 71AB676F 5 Bytes JMP 00D827B6
.text C:\Program Files\Bonjour\mDNSResponder.exe[320] WS2_32.dll!WSASend 71AB68FA 5 Bytes JMP 00D827EE
.text C:\Program Files\Bonjour\mDNSResponder.exe[320] ADVAPI32.dll!CryptDestroyKey 77DE9EBC 7 Bytes JMP 00D8299A
.text C:\Program Files\Bonjour\mDNSResponder.exe[320] ADVAPI32.dll!CryptDecrypt 77DEA129 7 Bytes JMP 00D8294A
.text C:\Program Files\Bonjour\mDNSResponder.exe[320] ADVAPI32.dll!CryptEncrypt 77DEE360 7 Bytes JMP 00D8290E
? C:\WINDOWS\system32\winlogon.exe[676] C:\WINDOWS\system32\ntdll.dll image checksum mismatch; number of sections mismatch; time/date stamp mismatch; unknown module: WINMM.dllunknown module: MSGINA.dllunknown module: RASAPI32.dllunknown module: MPR.dllunknown module: AUTHZ.dllunknown module: NDdeApi.dllunknown module: PROFMAP.dllunknown module: SETUPAPI.dllunknown module: VERSION.dllunknown module: WINSTA.dllunknown module: WINTRUST.dll
.text C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe[724] ADVAPI32.dll!CryptDestroyKey 77DE9EBC 7 Bytes JMP 00E7299A
.text C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe[724] ADVAPI32.dll!CryptDecrypt 77DEA129 7 Bytes JMP 00E7294A
.text C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe[724] ADVAPI32.dll!CryptEncrypt 77DEE360 7 Bytes JMP 00E7290E
.text C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe[724] WS2_32.dll!closesocket 71AB3E2B 5 Bytes JMP 00E728F2
.text C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe[724] WS2_32.dll!send 71AB4C27 5 Bytes JMP 00E7277E
.text C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe[724] WS2_32.dll!WSARecv 71AB4CB5 5 Bytes JMP 00E72870
.text C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe[724] WS2_32.dll!recv 71AB676F 5 Bytes JMP 00E727B6
.text C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe[724] WS2_32.dll!WSASend 71AB68FA 5 Bytes JMP 00E727EE
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexStoreSvr.exe[880] ADVAPI32.dll!CryptDestroyKey 77DE9EBC 7 Bytes JMP 02D5299A
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexStoreSvr.exe[880] ADVAPI32.dll!CryptDecrypt 77DEA129 7 Bytes JMP 02D5294A
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexStoreSvr.exe[880] ADVAPI32.dll!CryptEncrypt 77DEE360 7 Bytes JMP 02D5290E
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexStoreSvr.exe[880] WS2_32.dll!closesocket 71AB3E2B 5 Bytes JMP 02D528F2
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexStoreSvr.exe[880] WS2_32.dll!send 71AB4C27 5 Bytes JMP 02D5277E
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexStoreSvr.exe[880] WS2_32.dll!WSARecv 71AB4CB5 5 Bytes JMP 02D52870
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexStoreSvr.exe[880] WS2_32.dll!recv 71AB676F 5 Bytes JMP 02D527B6
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexStoreSvr.exe[880] WS2_32.dll!WSASend 71AB68FA 5 Bytes JMP 02D527EE
.text C:\pvsw\bin\w3dbsmgr.exe[1880] ADVAPI32.dll!CryptDestroyKey 77DE9EBC 7 Bytes JMP 0088299A
.text C:\pvsw\bin\w3dbsmgr.exe[1880] ADVAPI32.dll!CryptDecrypt 77DEA129 7 Bytes JMP 0088294A
.text C:\pvsw\bin\w3dbsmgr.exe[1880] ADVAPI32.dll!CryptEncrypt 77DEE360 7 Bytes JMP 0088290E
.text C:\pvsw\bin\w3dbsmgr.exe[1880] WS2_32.dll!closesocket 71AB3E2B 5 Bytes JMP 008828F2
.text C:\pvsw\bin\w3dbsmgr.exe[1880] WS2_32.dll!send 71AB4C27 5 Bytes JMP 0088277E
.text C:\pvsw\bin\w3dbsmgr.exe[1880] WS2_32.dll!WSARecv 71AB4CB5 5 Bytes JMP 00882870
.text C:\pvsw\bin\w3dbsmgr.exe[1880] WS2_32.dll!recv 71AB676F 5 Bytes JMP 008827B6
.text C:\pvsw\bin\w3dbsmgr.exe[1880] WS2_32.dll!WSASend 71AB68FA 5 Bytes JMP 008827EE
.text C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe[2652] ADVAPI32.dll!CryptDestroyKey 77DE9EBC 7 Bytes JMP 017C299A
.text C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe[2652] ADVAPI32.dll!CryptDecrypt 77DEA129 7 Bytes JMP 017C294A
.text C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe[2652] ADVAPI32.dll!CryptEncrypt 77DEE360 7 Bytes JMP 017C290E
.text C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe[2652] WS2_32.dll!closesocket 71AB3E2B 5 Bytes JMP 017C28F2
.text C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe[2652] WS2_32.dll!send 71AB4C27 5 Bytes JMP 017C277E
.text C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe[2652] WS2_32.dll!WSARecv 71AB4CB5 5 Bytes JMP 017C2870
.text C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe[2652] WS2_32.dll!recv 71AB676F 5 Bytes JMP 017C27B6
.text C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe[2652] WS2_32.dll!WSASend 71AB68FA 5 Bytes JMP 017C27EE
.text C:\Program Files\Microsoft Office\OFFICE11\OUTLOOK.EXE[2684] ADVAPI32.dll!CryptDestroyKey 77DE9EBC 7 Bytes JMP 02F9299A
.text C:\Program Files\Microsoft Office\OFFICE11\OUTLOOK.EXE[2684] ADVAPI32.dll!CryptDecrypt 77DEA129 7 Bytes JMP 02F9294A
.text C:\Program Files\Microsoft Office\OFFICE11\OUTLOOK.EXE[2684] ADVAPI32.dll!CryptEncrypt 77DEE360 7 Bytes JMP 02F9290E
.text C:\Program Files\Microsoft Office\OFFICE11\OUTLOOK.EXE[2684] WS2_32.dll!closesocket 71AB3E2B 5 Bytes JMP 02F928F2
.text C:\Program Files\Microsoft Office\OFFICE11\OUTLOOK.EXE[2684] WS2_32.dll!send 71AB4C27 5 Bytes JMP 02F9277E
.text C:\Program Files\Microsoft Office\OFFICE11\OUTLOOK.EXE[2684] WS2_32.dll!WSARecv 71AB4CB5 5 Bytes JMP 02F92870
.text C:\Program Files\Microsoft Office\OFFICE11\OUTLOOK.EXE[2684] WS2_32.dll!recv 71AB676F 5 Bytes JMP 02F927B6
.text C:\Program Files\Microsoft Office\OFFICE11\OUTLOOK.EXE[2684] WS2_32.dll!WSASend 71AB68FA 5 Bytes JMP 02F927EE
.text C:\Program Files\AVG\AVG9\avgnsx.exe[2936] ADVAPI32.dll!CryptDestroyKey 77DE9EBC 7 Bytes JMP 0149299A
.text C:\Program Files\AVG\AVG9\avgnsx.exe[2936] ADVAPI32.dll!CryptDecrypt 77DEA129 7 Bytes JMP 0149294A
.text C:\Program Files\AVG\AVG9\avgnsx.exe[2936] ADVAPI32.dll!CryptEncrypt 77DEE360 7 Bytes JMP 0149290E
.text C:\Program Files\AVG\AVG9\avgnsx.exe[2936] WS2_32.dll!closesocket 71AB3E2B 5 Bytes JMP 014928F2
.text C:\Program Files\AVG\AVG9\avgnsx.exe[2936] WS2_32.dll!send 71AB4C27 5 Bytes JMP 0149277E
.text C:\Program Files\AVG\AVG9\avgnsx.exe[2936] WS2_32.dll!WSARecv 71AB4CB5 5 Bytes JMP 01492870
.text C:\Program Files\AVG\AVG9\avgnsx.exe[2936] WS2_32.dll!recv 71AB676F 5 Bytes JMP 014927B6
.text C:\Program Files\AVG\AVG9\avgnsx.exe[2936] WS2_32.dll!WSASend 71AB68FA 5 Bytes JMP 014927EE
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexingService.exe[3064] ADVAPI32.dll!CryptDestroyKey 77DE9EBC 7 Bytes JMP 00D0299A
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexingService.exe[3064] ADVAPI32.dll!CryptDecrypt 77DEA129 7 Bytes JMP 00D0294A
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexingService.exe[3064] ADVAPI32.dll!CryptEncrypt 77DEE360 7 Bytes JMP 00D0290E
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexingService.exe[3064] WS2_32.dll!closesocket 71AB3E2B 5 Bytes JMP 00D028F2
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexingService.exe[3064] WS2_32.dll!send 71AB4C27 5 Bytes JMP 00D0277E
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexingService.exe[3064] WS2_32.dll!WSARecv 71AB4CB5 5 Bytes JMP 00D02870
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexingService.exe[3064] WS2_32.dll!recv 71AB676F 5 Bytes JMP 00D027B6
.text C:\Program Files\Common Files\Ahead\Lib\NMIndexingService.exe[3064] WS2_32.dll!WSASend 71AB68FA 5 Bytes JMP 00D027EE
.text C:\WINDOWS\Explorer.EXE[3668] ADVAPI32.dll!CryptDestroyKey 77DE9EBC 7 Bytes JMP 00EF299A
.text C:\WINDOWS\Explorer.EXE[3668] ADVAPI32.dll!CryptDecrypt 77DEA129 7 Bytes JMP 00EF294A
.text C:\WINDOWS\Explorer.EXE[3668] ADVAPI32.dll!CryptEncrypt 77DEE360 7 Bytes JMP 00EF290E
.text C:\WINDOWS\Explorer.EXE[3668] WS2_32.dll!closesocket 71AB3E2B 5 Bytes JMP 00EF28F2
.text C:\WINDOWS\Explorer.EXE[3668] WS2_32.dll!send 71AB4C27 5 Bytes JMP 00EF277E
.text C:\WINDOWS\Explorer.EXE[3668] WS2_32.dll!WSARecv 71AB4CB5 5 Bytes JMP 00EF2870
.text C:\WINDOWS\Explorer.EXE[3668] WS2_32.dll!recv 71AB676F 5 Bytes JMP 00EF27B6
.text C:\WINDOWS\Explorer.EXE[3668] WS2_32.dll!WSASend 71AB68FA 5 Bytes JMP 00EF27EE
.text C:\Program Files\Microsoft Office\OFFICE11\WINWORD.EXE[4016] ADVAPI32.dll!CryptDestroyKey 77DE9EBC 7 Bytes JMP 0261299A
.text C:\Program Files\Microsoft Office\OFFICE11\WINWORD.EXE[4016] ADVAPI32.dll!CryptDecrypt 77DEA129 7 Bytes JMP 0261294A
.text C:\Program Files\Microsoft Office\OFFICE11\WINWORD.EXE[4016] ADVAPI32.dll!CryptEncrypt 77DEE360 7 Bytes JMP 0261290E
.text C:\Program Files\Microsoft Office\OFFICE11\WINWORD.EXE[4016] WS2_32.dll!closesocket 71AB3E2B 5 Bytes JMP 026128F2
.text C:\Program Files\Microsoft Office\OFFICE11\WINWORD.EXE[4016] WS2_32.dll!send 71AB4C27 5 Bytes JMP 0261277E
.text C:\Program Files\Microsoft Office\OFFICE11\WINWORD.EXE[4016] WS2_32.dll!WSARecv 71AB4CB5 5 Bytes JMP 02612870
.text C:\Program Files\Microsoft Office\OFFICE11\WINWORD.EXE[4016] WS2_32.dll!recv 71AB676F 5 Bytes JMP 026127B6
.text C:\Program Files\Microsoft Office\OFFICE11\WINWORD.EXE[4016] WS2_32.dll!WSASend 71AB68FA 5 Bytes JMP 026127EE

---- Devices - GMER 1.0.15 ----

Device \FileSystem\Ntfs \Ntfs 48ea34fa.sys

AttachedDevice \Driver\Tcpip \Device\Ip avgtdix.sys (AVG Network connection watcher/AVG Technologies CZ, s.r.o.)
AttachedDevice \Driver\Tcpip \Device\Ip 48ea34fa.sys
AttachedDevice \Driver\Tcpip \Device\Tcp avgtdix.sys (AVG Network connection watcher/AVG Technologies CZ, s.r.o.)
AttachedDevice \Driver\Tcpip \Device\Tcp 48ea34fa.sys

Device \Driver\avgtdix \Device\AvgTdi 48ea34fa.sys
Device \Driver\atapi \Device\Ide\IdeDeviceP0T0L0-3 82D08618
Device \Driver\atapi \Device\Ide\IdePort0 82D08618
Device \Driver\atapi \Device\Ide\IdePort1 82D08618
Device \Driver\atapi \Device\Ide\IdeDeviceP1T0L0-e 82D08618

AttachedDevice \Driver\Tcpip \Device\Udp avgtdix.sys (AVG Network connection watcher/AVG Technologies CZ, s.r.o.)
AttachedDevice \Driver\Tcpip \Device\Udp 48ea34fa.sys
AttachedDevice \Driver\Tcpip \Device\RawIp avgtdix.sys (AVG Network connection watcher/AVG Technologies CZ, s.r.o.)
AttachedDevice \Driver\Tcpip \Device\RawIp 48ea34fa.sys

---- Services - GMER 1.0.15 ----

Service C:\WINDOWS\System32\drivers\48ea34fa.sys (*** hȋdden *** ) [SYSTEM] 48ea34fa <-- ROOTKIT !!!

---- Registry - GMER 1.0.15 ----

Reg HKLM\SYSTEM\CurrentControlSet\Services\48ea34fa@ImagePath \SystemRoot\System32\drivers\48ea34fa.sys
Reg HKLM\SYSTEM\CurrentControlSet\Services\48ea34fa@Type 1
Reg HKLM\SYSTEM\CurrentControlSet\Services\48ea34fa@Start 1
Reg HKLM\SYSTEM\CurrentControlSet\Services\48ea34fa@ErrorControl 1
Reg HKLM\SYSTEM\CurrentControlSet\Services\48ea34fa@F96ZK6nPB Z3Jpemltdm96aW0ubmFtZQ==
Reg HKLM\SYSTEM\ControlSet003\Services\48ea34fa@ImagePath \SystemRoot\System32\drivers\48ea34fa.sys
Reg HKLM\SYSTEM\ControlSet003\Services\48ea34fa@Type 1
Reg HKLM\SYSTEM\ControlSet003\Services\48ea34fa@Start 1
Reg HKLM\SYSTEM\ControlSet003\Services\48ea34fa@ErrorControl 1
Reg HKLM\SYSTEM\ControlSet003\Services\48ea34fa@F96ZK6nPB Z3Jpemltdm96aW0ubmFtZQ==
Reg HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Print\Printers\Microsoft Office Document Image Writer@ChangeID 151156
Reg HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Print\Printers\microsoft xps document writer@ChangeID 1408812
Reg HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Print\Printers\Peachtree E-mail Writer v2@ChangeID 1408546

---- Disk sectors - GMER 1.0.15 ----

Disk \Device\Harddisk0\DR0 sector 00: rootkit-like behavior;

---- EOF - GMER 1.0.15 ----

Hardykat
Novice
Novice

Posts Posts : 28
Joined Joined : 2009-12-21
Gender Gender : Female
OS OS : Windows 7 Home Premium
Protection Protection : Norton 360,
Points Points : 25791
# Likes # Likes : 0

View user profile

Back to top Go down

Re: Win32/rustock.m

Post by Belahzur on 22nd December 2009, 4:41 pm

1. Please download The Avenger by Swandog46 to your Desktop
Link: [You must be registered and logged in to see this link.]

  • Click on Avenger.zip to open the file
  • Extract avenger.exe to your desktop
2. Copy all the text contained in the code box below to your Clipboard by highlighting it and pressing (Ctrl+CCrying


Drivers to disable:
48ea34fa

Drivers to delete:
48ea34fa

Files to delete:
C:\WINDOWS\System32\drivers\48ea34fa.sys

Registry keys to delete:
HKLM\SYSTEM\CurrentControlSet\Services\48ea34fa
HKLM\SYSTEM\ControlSet003\Services\48ea34fa

Note: the above code was created specifically for this user. If you are not this user, do NOT follow these directions as they could damage the workings of your system.


3. Now, start The Avenger program by clicking on its icon on your desktop.

  • Under "Input script here:", paste in the script from the quote box above.
  • Leave the ticked box "Scan for rootkit" ticked.
  • Then tick "Disable any rootkits found"
  • Now click on the Execute to begin execution of the script.
  • Answer "Yes" twice when prompted.

    The Avenger will automatically do the following:

  • It will Restart your computer.
  • On reboot, it will briefly open a black command window on your desktop, this is normal.
  • After the restart, it creates a log file that should open with the results of Avengerís actions. This log file will be located at C:\avenger.txt
  • The Avenger will also have backed up all the files, etc., that you asked it to delete, and will have zipped them and moved the zip archives to C:\avenger\backup.zip.
4. Please copy/paste the content of c:\avenger.txt into your reply.


[You must be registered and logged in to see this link.] - [You must be registered and logged in to see this link.] - Please PM me if I fail to respond within 24hrs.


Belahzur
Administrator
Administrator

Posts Posts : 34918
Joined Joined : 2008-08-03
Gender Gender : Male
OS OS : 7 Home Premium x64
Points Points : 245101
# Likes # Likes : 1

View user profile

Back to top Go down

Re: Win32/rustock.m

Post by Hardykat on 22nd December 2009, 5:01 pm

/////////////////////////////////////////
Avenger Pre-Processor log
//////////////////////////////////////////

Platform: Windows XP (build 2600, Service Pack 3)
Tue Dec 22 11:50:56 2009

11:50:52: Warning: Skipping potentially dangerous line:
"HKLM\SYSTEM\CurrentControlSet\Services\48ea34fa" (Registry key deletion mode)
11:50:56: Error: Execution aborted by user!


//////////////////////////////////////////


Logfile of The Avenger Version 2.0, (c) by Swandog46
[You must be registered and logged in to see this link.]

Platform: Windows XP

*******************

Script file opened successfully.
Script file read successfully.

Backups directory opened successfully at C:\Avenger

*******************

Beginning to process script file:

Rootkit scan active.
No rootkits found!

Driver "48ea34fa" disabled successfully.
Driver "48ea34fa" deleted successfully.
File "C:\WINDOWS\System32\drivers\48ea34fa.sys" deleted successfully.

Error: registry key "HKLM\SYSTEM\CurrentControlSet\Services\48ea34fa" not found!
Deletion of registry key "HKLM\SYSTEM\CurrentControlSet\Services\48ea34fa" failed!
Status: 0xc0000034 (STATUS_OBJECT_NAME_NOT_FOUND)
--> the object does not exist

Registry key "HKLM\SYSTEM\ControlSet003\Services\48ea34fa" deleted successfully.

Completed script processing.

*******************

Finished! Terminate.

Hardykat
Novice
Novice

Posts Posts : 28
Joined Joined : 2009-12-21
Gender Gender : Female
OS OS : Windows 7 Home Premium
Protection Protection : Norton 360,
Points Points : 25791
# Likes # Likes : 0

View user profile

Back to top Go down

Re: Win32/rustock.m

Post by Belahzur on 22nd December 2009, 5:43 pm

Well, that takes care of that rootkit.

Hello.

  • Download combofix from here
    [You must be registered and logged in to see this link.]
    [You must be registered and logged in to see this link.]

    1. If you are using Firefox, make sure that your download settings are as follows:

    * Tools->Options->Main tab
    * Set to "Always ask me where to Save the files".

    2. During the download, rename Combofix to Combo-Fix as follows:





    3. It is important you rename Combofix during the download, but not after.
    4. Please do not rename Combofix to other names, but only to the one indicated.
    5. Close any open browsers.
    6. Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.

  • We need to disable your local AV (Anti-virus) before running Combofix.
  • See [You must be registered and logged in to see this link.] for how to disable your AV.
  • Double click on ComboFix.exe.
  • Follow the prompts. NOTE:
  • ComboFix will check to see if the Microsoft Windows Recovery Console is installed.
    ***It's strongly recommended to have the Recovery Console installed before doing any malware removal.***

    **Please note: If the Microsoft Windows Recovery Console is already installed, ComboFix will automatically proceed with its scan.


  • The Recovery Console provides a recovery/repair mode should a problem occur during a Combofix run.



  • Allow ComboFix to download the Recovery Console.
  • Accept the End-User License Agreement.
  • The Recovery Console will be installed.
  • You will then get this next prompt that asks if you want to continue the malware scan, select yes



  • Allow combofix to run
  • Post C:\combofix.txt back here.

    Note:
    Do not mouseclick combofix's window whilst it's running. That may cause it to stall.


[You must be registered and logged in to see this link.] - [You must be registered and logged in to see this link.] - Please PM me if I fail to respond within 24hrs.


Belahzur
Administrator
Administrator

Posts Posts : 34918
Joined Joined : 2008-08-03
Gender Gender : Male
OS OS : 7 Home Premium x64
Points Points : 245101
# Likes # Likes : 1

View user profile

Back to top Go down

Re: Win32/rustock.m

Post by Hardykat on 22nd December 2009, 7:24 pm

ComboFix 09-12-21.08 - jcureton 12/22/2009 13:46:22.1.1 - x86
Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.510.219 [GMT -5:00]
Running from: c:\documents and settings\jcureton\Desktop\Combo-Fix.exe
.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.

c:\recycler\S-1-5-21-65292792-1611355699-2963753518-1135
C:\Thumbs.db

.
original MBR restored successfully !
.
((((((((((((((((((((((((((((((((((((((( Drivers/Services )))))))))))))))))))))))))))))))))))))))))))))))))
.

-------\Legacy_ACPI32
-------\Legacy_ATI64SI
-------\Legacy_I386SI
-------\Legacy_KSI32SK
-------\Legacy_NETSIK
-------\Legacy_SYSTEMNTMI
-------\Legacy_WS2_32SIK


((((((((((((((((((((((((( Files Created from 2009-11-22 to 2009-12-22 )))))))))))))))))))))))))))))))
.

2009-12-22 19:04 . 2009-12-22 19:04 -------- d-----w- c:\windows\LastGood
2009-12-21 17:13 . 2009-12-21 17:13 -------- d-----w- c:\program files\Trend Micro
2009-12-15 19:23 . 2009-12-15 19:23 0 ----a-w- c:\windows\nsreg.dat
2009-12-15 19:23 . 2009-12-15 19:23 -------- d-----w- c:\documents and settings\jcureton\Local Settings\Application Data\Mozilla
2009-12-15 18:14 . 2009-12-15 18:14 -------- d-----w- c:\documents and settings\Administrator\Application Data\Malwarebytes
2009-12-14 14:20 . 2009-12-14 14:20 -------- d-----w- c:\documents and settings\HelpAssistant.ALLENTERRI\temp
2009-12-14 14:20 . 2009-10-23 15:24 49152 ----a-w- c:\documents and settings\HelpAssistant.ALLENTERRI\PNPrint3.exe
2009-12-11 18:53 . 2009-12-11 18:53 -------- d-----w- c:\documents and settings\HelpAssistant\temp
2009-12-11 18:53 . 2009-10-23 15:24 49152 ----a-w- c:\documents and settings\HelpAssistant\PNPrint3.exe
2009-12-02 19:27 . 2009-12-02 19:27 -------- d-----w- c:\program files\Bonjour
2009-12-02 19:08 . 2009-12-02 19:08 -------- d-----w- c:\program files\Common Files\Macrovision Shared

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2009-12-22 14:01 . 2009-11-03 14:38 -------- d-----w- c:\documents and settings\All Users\Application Data\avg9
2009-12-18 15:49 . 2009-04-17 16:44 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
2009-12-18 15:49 . 2009-04-17 16:45 4844296 ----a-w- c:\documents and settings\All Users\Application Data\Malwarebytes\Malwarebytes' Anti-Malware\mbam-setup.exe
2009-12-18 13:52 . 2009-12-22 13:56 294656 ----a-w- c:\documents and settings\All Users\Application Data\avg9\update\backup\avglngx.dll
2009-12-15 16:33 . 2008-02-05 17:38 -------- d-----w- c:\program files\Java
2009-12-15 16:32 . 2009-11-13 18:31 152576 ----a-w- c:\documents and settings\jcureton\Application Data\Sun\Java\jre1.6.0_17\lzma.dll
2009-12-15 16:32 . 2009-11-13 18:31 79488 ----a-w- c:\documents and settings\jcureton\Application Data\Sun\Java\jre1.6.0_17\gtapi.dll
2009-12-14 13:52 . 2009-12-22 13:56 4043032 ----a-w- c:\documents and settings\All Users\Application Data\avg9\update\backup\avgui.exe
2009-12-14 13:51 . 2009-12-22 13:56 3776280 ----a-w- c:\documents and settings\All Users\Application Data\avg9\update\backup\setup.exe
2009-12-14 13:51 . 2009-12-18 13:52 2352920 ----a-w- c:\documents and settings\All Users\Application Data\avg9\update\backup\avgresf.dll
2009-12-14 13:51 . 2009-12-22 13:56 3967256 ----a-w- c:\documents and settings\All Users\Application Data\avg9\update\backup\avgcorex.dll
2009-12-11 16:42 . 2009-07-06 21:18 -------- d-----w- c:\documents and settings\jcureton\Application Data\AdobeUM
2009-12-11 14:54 . 2009-12-11 14:53 5586040 ----a-w- c:\documents and settings\jcureton\Application Data\Adobe\Acrobat\6.0\Updater\atmo212_enu.exe
2009-12-11 14:53 . 2009-12-11 14:50 15919168 ----a-w- c:\documents and settings\jcureton\Application Data\Adobe\Acrobat\6.0\Updater\Ac60PrP1.exe
2009-12-03 21:14 . 2009-04-17 16:44 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2009-12-03 21:13 . 2009-04-17 16:44 19160 ----a-w- c:\windows\system32\drivers\mbam.sys
2009-12-02 19:35 . 2009-04-17 20:45 76216 ----a-w- c:\documents and settings\jcureton\Local Settings\Application Data\GDIPFONTCACHEV1.DAT
2009-12-02 19:27 . 2007-05-22 17:38 -------- d-----w- c:\program files\Common Files\Adobe
2009-11-17 16:01 . 2009-04-03 13:54 -------- d-----w- c:\program files\True Sword 5
2009-11-17 16:01 . 2007-06-15 17:00 -------- d-----w- c:\program files\Topo USA 5.0
2009-11-17 16:01 . 2007-05-22 15:58 -------- d--h--w- c:\program files\InstallShield Installation Information
2009-11-17 16:00 . 2009-11-17 16:00 -------- d-----w- c:\documents and settings\jcureton\Application Data\Simple Star
2009-11-17 16:00 . 2007-05-22 18:36 -------- d-----w- c:\program files\NewTech Infosystems
2009-11-10 14:52 . 2009-06-12 19:30 360584 ----a-w- c:\windows\system32\drivers\avgtdix.sys
2009-11-03 14:39 . 2009-06-12 19:30 28424 ----a-w- c:\windows\system32\drivers\avgmfx86.sys
2009-11-03 14:38 . 2009-06-12 19:30 333192 ----a-w- c:\windows\system32\drivers\avgldx86.sys
2009-11-03 14:38 . 2009-06-12 19:30 12464 ----a-w- c:\windows\system32\avgrsstx.dll
2009-11-03 14:38 . 2009-06-12 19:30 -------- d-----w- c:\program files\AVG
2009-10-26 21:39 . 2009-10-26 21:39 75824 ----a-w- c:\documents and settings\kfluker\Local Settings\Application Data\GDIPFONTCACHEV1.DAT
2009-10-26 21:38 . 2009-10-26 21:38 -------- d-----w- c:\documents and settings\kfluker\Application Data\PureEdge
2009-10-23 15:24 . 2009-10-23 15:24 21243276 ------w- c:\documents and settings\jcureton\fsmprint3.0.tmp
2009-10-23 15:24 . 2009-10-23 15:24 49152 ------w- c:\documents and settings\jcureton\PNPrint3.exe
2009-10-11 09:17 . 2009-04-02 13:52 411368 ----a-w- c:\windows\system32\deploytk.dll
.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"BgMonitor_{79662E04-7C6C-4d9f-84C7-88D8A56B10AA}"="c:\program files\Common Files\Ahead\Lib\NMBgMonitor.exe" [2006-12-23 143360]
"swg"="c:\program files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe" [2008-07-23 68856]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"igfxtray"="c:\windows\system32\igfxtray.exe" [2005-09-20 94208]
"igfxhkcmd"="c:\windows\system32\hkcmd.exe" [2005-09-20 77824]
"igfxpers"="c:\windows\system32\igfxpers.exe" [2005-09-20 114688]
"vptray"="c:\progra~1\SYMANT~1\SYMANT~1\vptray.exe" [2003-05-21 90112]
"masqform.exe"="c:\program files\PureEdge\Viewer 6.0\masqform.exe" [2003-12-03 1052672]
"Adobe Reader Speed Launcher"="c:\program files\Adobe\Reader 8.0\Reader\Reader_sl.exe" [2008-01-12 39792]
"PeachtreePrefetcher.exe"="c:\progra~1\SAGESO~1\PEACHT~1\PeachtreePrefetcher.exe" [2007-09-24 32768]
"NeroFilterCheck"="c:\program files\Common Files\Ahead\Lib\NeroCheck.exe" [2006-01-12 155648]
"AVG9_TRAY"="c:\progra~1\AVG\AVG9\avgtray.exe" [2009-12-14 2033432]

c:\documents and settings\All Users\Start Menu\Programs\Startup\
Acrobat Assistant.lnk - c:\program files\Adobe\Acrobat 6.0\Distillr\acrotray.exe [2003-5-15 217193]

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\avgrsstarter]
2009-11-03 14:38 12464 ----a-w- c:\windows\system32\avgrsstx.dll

[HKEY_LOCAL_MACHINE\software\microsoft\security center]
"AntiVirusOverride"=dword:00000001

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=
"c:\\Program Files\\CrossLoop\\CrossLoopConnect.exe"=
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"c:\\Program Files\\LimeWire\\LimeWire.exe"=
"c:\\Program Files\\Bonjour\\mDNSResponder.exe"=

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\GloballyOpenPorts\List]
"1583:TCP"= 1583:TCP:Pervasive DBEngine
"3351:TCP"= 3351:TCP:Pervasive DBEngine
"65533:TCP"= 65533:TCP:Services
"52344:TCP"= 52344:TCP:Services
"2479:TCP"= 2479:TCP:Services
"2453:TCP"= 2453:TCP:Services
"3389:TCP"= 3389:TCP:Remote Desktop

R1 avgldx86;AVG Free AVI Loader Driver x86;c:\windows\system32\drivers\avgldx86.sys [6/12/2009 2:30 PM 333192]
R1 avgtdix;AVG Free8 Network Redirector;c:\windows\system32\drivers\avgtdix.sys [6/12/2009 2:30 PM 360584]
R2 avg9wd;AVG Free WatchDog;c:\program files\AVG\AVG9\avgwdsvc.exe [11/3/2009 9:38 AM 285392]
R2 Pervasive.SQL Workgroup Engine;Pervasive.SQL Workgroup Engine;c:\windows\system32\srvany.exe [4/7/2008 8:14 AM 13608]
.
------- Supplementary Scan -------
.
mSearch Bar = [You must be registered and logged in to see this link.]
uInternet Settings,ProxyOverride = *.local
IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~2\OFFICE11\EXCEL.EXE/3000
IE: google sidewiki... - c:\program files\Google\Google Toolbar\Component\GoogleToolbarDynamic_mui_en_60D6097707281E79.dll/cmsidewiki.html
FF - ProfilePath - c:\documents and settings\jcureton\Application Data\Mozilla\Firefox\Profiles\e71tqq80.default\
FF - prefs.js: browser.startup.homepage - [You must be registered and logged in to see this link.]
.

**************************************************************************

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, [You must be registered and logged in to see this link.]
Rootkit scan 2009-12-22 14:10
Windows 5.1.2600 Service Pack 3 NTFS

scanning hȋdden processes ...

scanning hȋdden autostart entries ...

scanning hȋdden files ...

scan completed successfully
hȋdden files: 0

**************************************************************************
.
--------------------- DLLs Loaded Under Running Processes ---------------------

- - - - - - - > 'lsass.exe'(720)
c:\program files\Bonjour\mdnsNSP.dll

- - - - - - - > 'explorer.exe'(4076)
c:\windows\system32\WPDShServiceObj.dll
c:\windows\system32\PortableDeviceTypes.dll
c:\windows\system32\PortableDeviceApi.dll
.
------------------------ Other Running Processes ------------------------
.
c:\program files\AVG\AVG9\avgchsvx.exe
c:\program files\AVG\AVG9\avgrsx.exe
c:\program files\AVG\AVG9\avgcsrvx.exe
c:\program files\Bonjour\mDNSResponder.exe
c:\progra~1\SYMANT~1\SYMANT~1\DefWatch.exe
c:\program files\Java\jre6\bin\jqs.exe
c:\program files\Common Files\LightScribe\LSSrvc.exe
c:\program files\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE
c:\program files\AVG\AVG9\avgnsx.exe
c:\pvsw\bin\w3dbsmgr.exe
c:\program files\Common Files\Ahead\Lib\NMIndexStoreSvr.exe
c:\program files\Common Files\Ahead\Lib\NMIndexingService.exe
.
**************************************************************************
.
Completion time: 2009-12-22 14:21:16 - machine was rebooted
ComboFix-quarantined-files.txt 2009-12-22 19:21

Pre-Run: 20,732,616,704 bytes free
Post-Run: 22,250,094,592 bytes free

WindowsXP-KB310994-SP2-Pro-BootDisk-ENU.exe
[boot loader]
timeout=2
default=multi(0)disk(0)rdisk(0)partition(1)\WINDOWS
[operating systems]
c:\cmdcons\BOOTSECT.DAT="Microsoft Windows Recovery Console" /cmdcons
multi(0)disk(0)rdisk(0)partition(1)\WINDOWS="Microsoft Windows XP Professional" /noexecute=optin /fastdetect
multi(0)disk(0)rdisk(0)partition(2)\WINNT="Microsoft Windows 2000 Professional" /fastdetect

- - End Of File - - C90658A3FA448B4E147F554812310E09

Hardykat
Novice
Novice

Posts Posts : 28
Joined Joined : 2009-12-21
Gender Gender : Female
OS OS : Windows 7 Home Premium
Protection Protection : Norton 360,
Points Points : 25791
# Likes # Likes : 0

View user profile

Back to top Go down

Re: Win32/rustock.m

Post by Belahzur on 22nd December 2009, 8:27 pm

Click Start > Run and copy/paste the following bolded text into the Run box and click OK:

ComboFix /uninstall

This will also reset your restore points.

How is the machine running now?


[You must be registered and logged in to see this link.] - [You must be registered and logged in to see this link.] - Please PM me if I fail to respond within 24hrs.


Belahzur
Administrator
Administrator

Posts Posts : 34918
Joined Joined : 2008-08-03
Gender Gender : Male
OS OS : 7 Home Premium x64
Points Points : 245101
# Likes # Likes : 1

View user profile

Back to top Go down

Re: Win32/rustock.m

Post by Hardykat on 22nd December 2009, 8:34 pm

Big Grin It's not slow anymore! It's not taking me forever to do a 2 minute job anymore. I think that got it. Thanks very much!

As soon as I get back from christmas vacation, definitely sending a donation your way.

Hardykat
Novice
Novice

Posts Posts : 28
Joined Joined : 2009-12-21
Gender Gender : Female
OS OS : Windows 7 Home Premium
Protection Protection : Norton 360,
Points Points : 25791
# Likes # Likes : 0

View user profile

Back to top Go down

Re: Win32/rustock.m

Post by Belahzur on 22nd December 2009, 8:43 pm

Okay, run one more MBAM scan, then I think were done.


[You must be registered and logged in to see this link.] - [You must be registered and logged in to see this link.] - Please PM me if I fail to respond within 24hrs.


Belahzur
Administrator
Administrator

Posts Posts : 34918
Joined Joined : 2008-08-03
Gender Gender : Male
OS OS : 7 Home Premium x64
Points Points : 245101
# Likes # Likes : 1

View user profile

Back to top Go down

Re: Win32/rustock.m

Post by Hardykat on 22nd December 2009, 9:15 pm

Malwarebytes' Anti-Malware 1.42
Database version: 3405
Windows 5.1.2600 Service Pack 3
Internet Explorer 7.0.5730.13

12/22/2009 4:15:07 PM
mbam-log-2009-12-22 (16-15-07).txt

Scan type: Quick Scan
Objects scanned: 184089
Time elapsed: 25 minute(s), 51 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 0

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
(No malicious items detected)

Hardykat
Novice
Novice

Posts Posts : 28
Joined Joined : 2009-12-21
Gender Gender : Female
OS OS : Windows 7 Home Premium
Protection Protection : Norton 360,
Points Points : 25791
# Likes # Likes : 0

View user profile

Back to top Go down

Re: Win32/rustock.m

Post by Belahzur on 22nd December 2009, 10:59 pm

Good work, I'd say that's a rap. Smile

We need to make a new restore point.

To turn off System Restore, follow these steps:
1. Click Start, right-click My Computer, and then click Properties.
2. Click the System Restore tab.
3. Click the Turn off System Restore check box (or the Turn off System Restore on all drives check box), and then click OK.
4. Click Yes when you receive the prompt to the turn off System Restore.

Now we need to make a new restore point.
To turn on System Restore, follow these steps:
1. Click Start, right-click My Computer, and then click Properties.
2. Click the System Restore tab.
3. Click the Turn off System Restore check box (To turn on System Restore), and then click OK.

Below I have included a number of recommendations for how to protect your computer in order to prevent future malware infections. Please take these recommendations seriously; these few simple steps can stave off the vast majority of spyware problems. As happy as we are to help you, for your sake we would rather not have repeat customers. Goofy

1) Please navigate to [You must be registered and logged in to see this link.] and download all the "critical updates" for Windows. This can patch many of the security holes through which attackers can gain access to your computer.

Please either enable Automatic Updates under Start -> Control Panel -> Automatic Updates , or get into the habit of checking for Windows updates regularly. I cannot stress enough how important this is.

2) In order to protect yourself against spyware, you should consider installing and running the following free programs:

[You must be registered and logged in to see this link.]
A tutorial on using Ad-Aware to remove spyware from your computer may be found [You must be registered and logged in to see this link.].

[You must be registered and logged in to see this link.]
A tutorial on using Spybot to remove spyware from your computer may be found [You must be registered and logged in to see this link.]. Please also remember to enable Spybot's "Immunize" and "TeaTimer" features.

[You must be registered and logged in to see this link.]
A tutorial on using SpywareBlaster to prevent spyware from ever installing on your computer may be found [You must be registered and logged in to see this link.].

[You must be registered and logged in to see this link.]
A tutorial on using SpywareGuard for realtime protection against spyware and hijackers may be found [You must be registered and logged in to see this link.].

Make sure to keep these programs up-to-date and to run them regularly, as this can prevent a great deal of spyware hassle.

3) Please consider using an alternate browser. Mozilla's Firefox browser is fantastic; it is much more secure than Internet Explorer, immune to almost all known browser hijackers, and also has the best built-in popup blocker (as an added benefit!) that I have ever seen. If you are interested, Firefox may be downloaded from here:
[You must be registered and logged in to see this link.]
I also recommand the following add-ons for Firefox, they will help keep you safe from malicious scripts or activeX exploits.
[You must be registered and logged in to see this link.]
[You must be registered and logged in to see this link.]
[You must be registered and logged in to see this link.]

4) Also make sure to run your antivirus software regularly, and to keep it up-to-date.

To help you keep your software updated, please considering using this free software program that will check for program updates.
[You must be registered and logged in to see this link.]

5) Finally, consider maintaining a firewall. Some good free firewalls are [You must be registered and logged in to see this link.], or
[You must be registered and logged in to see this link.]
A tutorial on understanding and using firewalls may be found [You must be registered and logged in to see this link.].

Please also read Tony Klein's excellent article: [You must be registered and logged in to see this link.]

If you would take a moment to fill out our feedback form, we would appreciate it.
The link can be found [You must be registered and logged in to see this link.].

Hopefully this should take care of your problems! Good luck. Big Grin


[You must be registered and logged in to see this link.] - [You must be registered and logged in to see this link.] - Please PM me if I fail to respond within 24hrs.


Belahzur
Administrator
Administrator

Posts Posts : 34918
Joined Joined : 2008-08-03
Gender Gender : Male
OS OS : 7 Home Premium x64
Points Points : 245101
# Likes # Likes : 1

View user profile

Back to top Go down

View previous topic View next topic Back to top

- Similar topics

 
Permissions in this forum:
You cannot reply to topics in this forum