WiredWX Hobby Weather ToolsLog in

 


Search Engine Virus

2 posters

descriptionSearch Engine Virus EmptySearch Engine Virus

more_horiz
Hi, not sure what the virus is called but it is basically giving me a problem with every search engine I use by redirecting me to spam sites. I tried downloading malwarebytes but it won't open so I can't use it. Here is my log-
Thanks for any help.


Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 11:51:21 PM, on 5/11/2009
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\brsvc01a.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\brss01a.exe
C:\WINDOWS\system32\hkcmd.exe
C:\WINDOWS\system32\igfxpers.exe
C:\Program Files\ScanSoft\PaperPort\pptd40nt.exe
C:\Program Files\Brother\ControlCenter2\brctrcen.exe
C:\Program Files\Trend Micro\OfficeScan Client\pccntmon.exe
C:\Program Files\Common Files\AOL\1226138630\ee\AOLSoftware.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Messenger\msmsgs.exe
C:\Program Files\Insight\Tools\aiclient.exe
C:\Program Files\ADP\TimeclockMgr\Dcm\Sentinel.exe
C:\Program Files\Common Files\AOL\ACS\AOLAcsd.exe
C:\Program Files\Symantec\pcAnywhere\awhost32.exe
C:\Program Files\BigFix Enterprise\BES Client\BESClient.exe
c:\WINDOWS\system32\nfsclnt.exe
C:\Program Files\Common Files\Kronos\DCMCommon\dbsrv6.exe
C:\Program Files\Executive Software\Diskeeper\DkService.exe
C:\Program Files\Marriott\Installation Gatekeeper\IGK.exe
C:\Program Files\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE
C:\Program Files\Trend Micro\OfficeScan Client\ntrtscan.exe
C:\WINDOWS\system32\svchost.exe
c:\SFU\Mapper\mapsvc.exe
C:\Program Files\Trend Micro\OfficeScan Client\tmlisten.exe
C:\Program Files\ADP\TimeclockMgr\Dcm\DCMStateMngr.exe
C:\Program Files\ADP\TimeclockMgr\Dcm\httpsvr.exe
C:\Program Files\ADP\TimeclockMgr\Dcm\appclnt.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\SecureCRT\SecureCRT.EXE
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\TEMP\YHFE93.EXE
C:\Program Files\Trend Micro\OfficeScan Client\CNTAoSMgr.exe
C:\Program Files\Internet Explorer\Iexplore.exe
C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://mgs.marriott.com/index.html
O1 - Hosts: ::1 localhost
O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\ActiveX\AcroIEHelper.dll
O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.6.0_02\bin\ssv.dll
O4 - HKLM\..\Run: [IgfxTray] C:\WINDOWS\system32\igfxtray.exe
O4 - HKLM\..\Run: [HotKeysCmds] C:\WINDOWS\system32\hkcmd.exe
O4 - HKLM\..\Run: [Persistence] C:\WINDOWS\system32\igfxpers.exe
O4 - HKLM\..\Run: [IMJPMIG8.1] "C:\WINDOWS\IME\imjp8_1\IMJPMIG.EXE" /Spoil /RemAdvDef /Migration32
O4 - HKLM\..\Run: [MSPY2002] C:\WINDOWS\system32\IME\PINTLGNT\ImScInst.exe /SYNC
O4 - HKLM\..\Run: [PHIME2002ASync] C:\WINDOWS\system32\IME\TINTLGNT\TINTSETP.EXE /SYNC
O4 - HKLM\..\Run: [PHIME2002A] C:\WINDOWS\system32\IME\TINTLGNT\TINTSETP.EXE /IMEName
O4 - HKLM\..\Run: [ScrewDrivers Client Executable] "C:\Program Files\triCerat\Simplify Printing\ScrewDrivers Client v3\sdclient.exe" -i
O4 - HKLM\..\Run: [DiskeeperSystray] "C:\Program Files\Executive Software\Diskeeper\DkIcon.exe"
O4 - HKLM\..\Run: [SSBkgdUpdate] "C:\Program Files\Common Files\Scansoft Shared\SSBkgdUpdate\SSBkgdupdate.exe" -Embedding -boot
O4 - HKLM\..\Run: [PaperPort PTD] C:\Program Files\ScanSoft\PaperPort\pptd40nt.exe
O4 - HKLM\..\Run: [IndexSearch] C:\Program Files\ScanSoft\PaperPort\IndexSearch.exe
O4 - HKLM\..\Run: [SetDefPrt] C:\Program Files\Brother\Brmfl05b\BrStDvPt.exe
O4 - HKLM\..\Run: [ControlCenter2.0] C:\Program Files\Brother\ControlCenter2\brctrcen.exe /autorun
O4 - HKLM\..\Run: [OfficeScanNT Monitor] "C:\Program Files\Trend Micro\OfficeScan Client\pccntmon.exe" -HideWindow
O4 - HKLM\..\Run: [HostManager] C:\Program Files\Common Files\AOL\1226138630\ee\AOLSoftware.exe
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
O4 - HKCU\..\Run: [MSMSGS] "C:\Program Files\Messenger\msmsgs.exe" /background
O4 - HKCU\..\Run: [AOL Fast Start] "C:\Program Files\AOL 9.0\AOL.EXE" -b
O4 - Global Startup: Adobe Reader Speed Launch.lnk = C:\Program Files\Adobe\Reader\reader_sl.exe
O4 - Global Startup: ADP Event Manager.lnk = C:\Program Files\ADP\TimeclockMgr\Dcm\EventMgr.exe
O4 - Global Startup: ADP Sentinel.lnk = C:\Program Files\ADP\TimeclockMgr\Dcm\Sentinel.exe
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\OFFICE11\EXCEL.EXE/3000
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_02\bin\ssv.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_02\bin\ssv.dll
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\OFFICE11\REFIEBAR.DLL
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O15 - Trusted Zone: http://www.MySodexho.com
O16 - DPF: PackageCab - http://ak.imgag.com/imgag/cp/install/AxCtp2.cab
O23 - Service: Asset Insight Client (AICLIENT) - Unknown owner - C:\Program Files\Insight\Tools\aiclient.exe
O23 - Service: AOL Connectivity Service (AOL ACS) - AOL LLC - C:\Program Files\Common Files\AOL\ACS\AOLAcsd.exe
O23 - Service: pcAnywhere Host Service (awhost32) - Symantec Corporation - C:\Program Files\Symantec\pcAnywhere\awhost32.exe
O23 - Service: BES Client (BESClient) - BigFix Inc. - C:\Program Files\BigFix Enterprise\BES Client\BESClient.exe
O23 - Service: BrSplService (Brother XP spl Service) - brother Industries Ltd - C:\WINDOWS\system32\brsvc01a.exe
O23 - Service: DCM - TimeclockMgr - Unknown owner - C:\Program Files\Common Files\Kronos\DCMCommon\dbsrv6.exe
O23 - Service: Diskeeper - Executive Software International, Inc. - C:\Program Files\Executive Software\Diskeeper\DkService.exe
O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\1150\Intel 32\IDriverT.exe
O23 - Service: Installation Gatekeeper - Marriott International - C:\Program Files\Marriott\Installation Gatekeeper\IGK.exe
O23 - Service: OfficeScanNT RealTime Scan (ntrtscan) - Trend Micro Inc. - C:\Program Files\Trend Micro\OfficeScan Client\ntrtscan.exe
O23 - Service: PictureTaker - LANovation - C:\WINDOWS\system32\PCTKRNT.SYS
O23 - Service: OfficeScan NT Listener (tmlisten) - Trend Micro Inc. - C:\Program Files\Trend Micro\OfficeScan Client\tmlisten.exe
O23 - Service: OfficeScan NT Proxy Service (TmProxy) - Trend Micro Inc. - C:\Program Files\Trend Micro\OfficeScan Client\TmProxy.exe

--
End of file - 6896 bytes

descriptionSearch Engine Virus EmptyRe: Search Engine Virus

more_horiz
1. Please download The Avenger by Swandog46 to your Desktop
Link: HERE or HERE.

  • Click on Avenger.zip to open the file
  • Extract avenger.exe to your desktop

Note: This tool was posted specifically for this user. If you are not this user, do NOT follow these directions as they could damage the workings of your system.


2. Now, start The Avenger program by clicking on its icon on your desktop.

  • Leave the script box empty.
  • Leave the ticked box "Scan for rootkit" ticked.
  • Then tick "Disable any rootkits found"
  • Now click on the Execute to begin execution of the script.
  • Answer "Yes" twice when prompted.

    The Avenger will automatically do the following:

  • It will Restart your computer.
  • On reboot, it will briefly open a black command window on your desktop, this is normal.
  • After the restart, it creates a log file that should open with the results of Avenger’s actions. This log file will be located at C:\avenger.txt
  • The Avenger will also have backed up all the files, etc., that you asked it to delete, and will have zipped them and moved the zip archives to C:\avenger\backup.zip.
3. Please copy/paste the content of c:\avenger.txt into your reply.

descriptionSearch Engine Virus EmptyRe: Search Engine Virus

more_horiz
Here is what I got-

Logfile of The Avenger Version 2.0, (c) by Swandog46
http://swandog46.geekstogo.com

Platform: Windows XP

*******************

Script file opened successfully.
Script file read successfully.

Backups directory opened successfully at C:\\Avenger

*******************

Beginning to process script file:

Rootkit scan active.
No rootkits found!


Completed script processing.

*******************

Finished! Terminate.

descriptionSearch Engine Virus EmptyRe: Search Engine Virus

more_horiz
Please close all anti virus, anti malware and any other open programs/windows so they do not interfere with the running of RootRepeal.

  • Please download RootRepeal.zip from [color:924f="blue"]here.
  • Extract the program file to your Desktop.
  • Run the program RootRepeal.exe and go to the Report tab and click on the Scan button.
    Search Engine Virus Ty87394lm6zwsm8gt

  • Select ALL of the checkboxes and then click OK and it will start scanning your system.
    Search Engine Virus Jzploa1hjbxcmszn3j35
  • If you have multiple drives you only need to check the C: drive or the one Windows is installed on.
  • When done, click on Save Report
  • Save it to the Desktop.
  • Please copy/paste the contents of the report in your next reply.

descriptionSearch Engine Virus EmptyRe: Search Engine Virus

more_horiz
Here's the part 1 of the report, when i tried posting the whole thing it said it was too big-

ROOTREPEAL (c) AD, 2007-2008
==================================================
Scan Time: 2009/05/13 04:56
Program Version: Version 1.2.3.0
Windows Version: Windows XP SP2
==================================================

Drivers
-------------------
Name: dump_atapi.sys
Image Path: C:\WINDOWS\System32\Drivers\dump_atapi.sys
Address: 0xAA37B000 Size: 98304 File Visible: No
Status: -

Name: dump_WMILIB.SYS
Image Path: C:\WINDOWS\System32\Drivers\dump_WMILIB.SYS
Address: 0xF7BB7000 Size: 8192 File Visible: No
Status: -

Name: rootrepeal.sys
Image Path: C:\WINDOWS\system32\drivers\rootrepeal.sys
Address: 0xA8EC8000 Size: 45056 File Visible: No
Status: -

Name: UACbommavjqdxhqorb.sys
Image Path: C:\WINDOWS\system32\drivers\UACbommavjqdxhqorb.sys
Address: 0xAA5E8000 Size: 77824 File Visible: -
Status: Hidden from Windows API!

Hidden/Locked Files
-------------------
Path: C:\hiberfil.sys
Status: Locked to the Windows API!

Path: C:\WINDOWS\system32\UACeiglqurkaqjstgy.dll
Status: Invisible to the Windows API!

Path: C:\WINDOWS\system32\uacinit.dll
Status: Invisible to the Windows API!

Path: C:\WINDOWS\system32\UACmagbxnhytybbraw.dll
Status: Invisible to the Windows API!

Path: C:\WINDOWS\system32\UACmenqnauppuiqdon.dll
Status: Invisible to the Windows API!

Path: C:\WINDOWS\system32\UACnvgxvwxpsshvwed.dat
Status: Invisible to the Windows API!

Path: C:\WINDOWS\system32\UACrcscgnjcmskjief.dll
Status: Invisible to the Windows API!

Path: C:\WINDOWS\system32\UACsdyrhllyhwyxhgg.log
Status: Invisible to the Windows API!

Path: C:\WINDOWS\system32\uactmp.db
Status: Invisible to the Windows API!

Path: C:\WINDOWS\system32\UACurdaejikvtfoxbd.dll
Status: Invisible to the Windows API!

Path: C:\WINDOWS\system32\UACwrwfpgauklwcqrq.db
Status: Invisible to the Windows API!

Path: C:\WINDOWS\system32\UACygdlbfhgysojwkp.dll
Status: Invisible to the Windows API!

Path: C:\WINDOWS\Temp\asat0000.tmp
Status: Allocation size mismatch (API: 1064960, Raw: 0)

Path: C:\WINDOWS\system32\drivers\UACbommavjqdxhqorb.sys
Status: Invisible to the Windows API!

Path: C:\Documents and Settings\Administrator\Local Settings\Temp\UAC5616.tmp
Status: Invisible to the Windows API!

Path: C:\Documents and Settings\Administrator\Local Settings\Temp\UAC5645.tmp
Status: Invisible to the Windows API!

Path: C:\Documents and Settings\Administrator\Local Settings\Temp\UACbad0.tmp
Status: Invisible to the Windows API!

Path: C:\Documents and Settings\Administrator\Local Settings\Temp\Temporary Internet Files\Content.IE5\94P12M47\fgANyEsOwiAQANDxQGWA4esVujYuDWmRYqydFEw8mwfyAl5A3_Kd9897hBFO3wNMe7r2S3sy32tusPTOR8S5atGWjbk-ipi2FeuaSm7_R5LoLFqNNhGZ7LSJNpAj5SJJUl662XvjjTLZBO8HHdSLYhzkIMWNC8AP[1].jpg
Status: Locked to the Windows API!

Path: C:\Documents and Settings\Administrator\Local Settings\Temp\Temporary Internet Files\Content.IE5\94P12M47\fgAVyEEOgjAQAMD6ILrt0t1Sv8DZxJtBwFIjsLE18VU-wg958APicebzOr5b1arDd6f6e3cpp_wQuaUxq6kU2QMMCXWeVpG0RN2vM6S5i2PeHnAAj8BnYHSOvUOyhOw3BXKM3NT_M0zknSdboQ3PugmVqYy-SlTqBw__[1].jpg
Status: Locked to the Windows API!

Path: C:\Documents and Settings\Administrator\Local Settings\Temp\Temporary Internet Files\Content.IE5\94P12M47\activity;src=1785639;met=1;v=1;pid=32736609;aid=211206853;ko=0;cid=31380194;rid=31398070;rv=1;&timestamp=1242151888687;eid1=2;ecn1=1;etm1=8;eid2=12;ecn2=1;etm2=0;eid3=11[1].gif
Status: Locked to the Windows API!

Path: C:\Documents and Settings\Administrator\Local Settings\Temp\Temporary Internet Files\Content.IE5\94P12M47\v=5;m=2;l=4830;cxt=;kw=;ts=528066;smuid=FsvDr-ROLSEbR_mhbNkVxBYwHDZW7xz-7P8w6rPR;p=ui%3DFsvDr-ROLSEbR_mhbNkVxBYwHDZW7xz-7P8w6rPR%3Btr%3DAbMp6qSw9do%3Btm%3D0-0[1]
Status: Locked to the Windows API!

Path: C:\Documents and Settings\Administrator\Local Settings\Temp\Temporary Internet Files\Content.IE5\94P12M47\realhousewivesnyc_blogs;site=bravo;sect=realhousewivesnyc;sub=blogs;pageid=37702;season=2;aff=pop;daypart=primetime;genre=reality;!category=bravo;!category=realhousewive[1]
Status: Locked to the Windows API!

Path: C:\Documents and Settings\Administrator\Local Settings\Temp\Temporary Internet Files\Content.IE5\94P12M47\realhousewivesnyc_home;site=bravo;sect=realhousewivesnyc;sub=home;pageid=1474;season=2;aff=pop;daypart=primetime;genre=reality;!category=bravo;!category=realhousewivesny[1]
Status: Locked to the Windows API!

Path: C:\Documents and Settings\Administrator\Local Settings\Temp\Temporary Internet Files\Content.IE5\94P12M47\ads%253Fcorrelator%253D1242166309562%2526output%253Dhtml%2526impl%253Difr%2526client%253Dca-pub-5440138744487553%2526slotname%253DVideo_Main_728x90%2526page_slots%253DVid[1].36
Status: Locked to the Windows API!

Path: C:\Documents and Settings\Administrator\Local Settings\Temp\Temporary Internet Files\Content.IE5\H0TUO92B\realhousewivesnyc_blogs;site=bravo;sect=realhousewivesnyc;sub=blogs;pageid=32855;season=2;aff=pop;daypart=primetime;genre=reality;!category=bravo;!category=realhousewive[1]
Status: Locked to the Windows API!

Path: C:\Documents and Settings\Administrator\Local Settings\Temp\Temporary Internet Files\Content.IE5\H0TUO92B\default;sz=160x600;in=und;news=default;site=shopping.hollywoodlife.net;host=www.hollywoodlife.net;siteurl=http%3a%2f%2fwww.hollywoodlife.net%2flayoutengine[1].htm
Status: Locked to the Windows API!

Path: C:\Documents and Settings\Administrator\Local Settings\Temp\Temporary Internet Files\Content.IE5\H0TUO92B\fgANyEsOwiAQAFDiUk_igs6Ezke8Qg9haK2AsS0RTDyC1_Jm-pZv_0nfwQzmeNiZ6Rlu7VJfpTzyXE1qrZwBrtl1NW2l5DV207ZAXkKc6_-BBGgEciBOUTwTn4R6pMCelFUCI7N6DeJkVLWE-O69t2ixu5dozA8_[1].jpg
Status: Locked to the Windows API!

Path: C:\Documents and Settings\Administrator\Local Settings\Temp\Temporary Internet Files\Content.IE5\H0TUO92B\fgANyLsNwjAQANBjIPscch_CCqmpkZU4jhEhFjYSezEEI7AEHQuQ5hXv9f58e-jh9NvBcPdTPZdHztcUCsy15iPimPa2zGvO6RbtsC6YFh9D2R6ZsRVURmH1MoonUSekDXnuNomdBJmItWERNS0dntR1xhlnLzkC_AE_[1].jpg
Status: Locked to the Windows API!

Path: C:\Documents and Settings\Administrator\Local Settings\Temp\Temporary Internet Files\Content.IE5\H0TUO92B\fgANyMsRwiAQANC1IFgSlk9sIWfPDiZAyBizIzhjDRZlT44N6Du-1_uzjjDC6XuA6R5SO9cH87XECktrfEScSy_rsjOXW5bTvmHZQo71_2h61APSjLqzySa6UHCkjVFmcMFGItuRt0Y7MkTOic6rp_YklFBy5QzwAw__[1].jpg
Status: Locked to the Windows API!

Path: C:\Documents and Settings\Administrator\Local Settings\Temp\Temporary Internet Files\Content.IE5\H0TUO92B\v=5;m=2;l=239;cxt=;kw=;ts=78094;smuid=uAxmgmTxp_NfbZwAAa8S5m9BAEBos2vbuxN3yJ3_;p=ui%3DuAxmgmTxp_NfbZwAAa8S5m9BAEBos2vbuxN3yJ3_%3Btr%3DDSORuA10XME%3Btm%3D0-0[1]
Status: Locked to the Windows API!

Path: C:\Documents and Settings\Administrator\Local Settings\Temp\Temporary Internet Files\Content.IE5\H0TUO92B\default;sz=728x90;in=und;news=default;site=shopping.hollywoodlife.net;host=www.hollywoodlife.net;siteurl=http%3a%2f%2fwww.hollywoodlife.net%2flayoutengine[1].htm
Status: Locked to the Windows API!

Path: C:\Documents and Settings\Administrator\Local Settings\Temp\Temporary Internet Files\Content.IE5\H0TUO92B\dgANyMERwiAQAMAbv1biAw7k7gBbyNcGFAnBmQgzycMqLMfafMpz9_f5XieY4HQ8QJvnmjIs-94viI9q9ba03uur6NRWrOut5G08Oot0Ry_I7NlHDo6FhFwYPHMQ8lYcZUnjM1tFxrxdjMooo5-9APwB[1].jpg
Status: Locked to the Windows API!

Path: C:\Documents and Settings\Administrator\Local Settings\Temp\Temporary Internet Files\Content.IE5\H0TUO92B\realhousewivesnyc_blogs;site=bravo;sect=realhousewivesnyc;sub=blogs;pageid=37653;season=2;aff=pop;daypart=primetime;genre=reality;!category=bravo;!category=realhousewive[1]
Status: Locked to the Windows API!

Path: C:\Documents and Settings\Administrator\Local Settings\Temp\Temporary Internet Files\Content.IE5\H0TUO92B\realhousewivesnyc_blogs;site=bravo;sect=realhousewivesnyc;sub=blogs;pageid=37653;season=2;aff=pop;daypart=primetime;genre=reality;!category=bravo;!category=realhousewive[2]
Status: Locked to the Windows API!

Path: C:\Documents and Settings\Administrator\Local Settings\Temp\Temporary Internet Files\Content.IE5\H0TUO92B\realhousewivesnyc_home;site=bravo;sect=realhousewivesnyc;sub=home;pageid=1474;season=2;aff=pop;daypart=primetime;genre=reality;!category=bravo;!category=realhousewivesny[1]
Status: Locked to the Windows API!

Path: C:\Documents and Settings\Administrator\Local Settings\Temp\Temporary Internet Files\Content.IE5\H0TUO92B\realhousewivesnyc_home;site=bravo;sect=realhousewivesnyc;sub=home;pageid=1474;season=2;aff=pop;daypart=primetime;genre=reality;!category=bravo;!category=realhousewivesny[2]
Status: Locked to the Windows API!

Path: C:\Documents and Settings\Administrator\Local Settings\Temp\Temporary Internet Files\Content.IE5\H0TUO92B\realhousewivesnyc_video;site=bravo;sect=realhousewivesnyc;sub=video;pageid=37714;season=2;aff=pop;daypart=primetime;genre=reality;!category=bravo;!category=realhousewive[1]
Status: Locked to the Windows API!

Path: C:\Documents and Settings\Administrator\Local Settings\Temp\Temporary Internet Files\Content.IE5\H0TUO92B\realhousewivesnyc_blogs;site=bravo;sect=realhousewivesnyc;sub=blogs;pageid=32855;season=2;aff=pop;daypart=primetime;genre=reality;!category=bravo;!category=realhousewive[2]
Status: Locked to the Windows API!

Path: C:\Documents and Settings\Administrator\Local Settings\Temp\Temporary Internet Files\Content.IE5\OY884PFE\;kw=Buick,Buick_Enclave,Buick_LaCrosse,Buick_Lucerne,Cadillac,Cadillac_CTS,Cadillac_DTS,Cadillac_Escalade,Cadillac_SRX,Cadillac_STS,Cadillac_XLR,Chevrolet,Chevrolet_Aval[1].htm
Status: Locked to the Windows API!

Path: C:\Documents and Settings\Administrator\Local Settings\Temp\Temporary Internet Files\Content.IE5\OY884PFE\realhousewivesnyc_video;site=bravo;sect=realhousewivesnyc;sub=video;pageid=37712;season=2;aff=pop;daypart=primetime;genre=reality;!category=bravo;!category=realhousewive[1]
Status: Locked to the Windows API!

Path: C:\Documents and Settings\Administrator\Local Settings\Temp\Temporary Internet Files\Content.IE5\OY884PFE\pixel;r=74969121;fpan=1;fpa=1242136988-56813026-73876337;fpbn=1;fpb=436485067;ns=0;url=http%3A%2F%2Fwww.heavy.com%2F%3Fpartner%3Daff180;ref=http%3A%2F%2Fwww[1].gif
Status: Locked to the Windows API!

Path: C:\Documents and Settings\Administrator\Local Settings\Temp\Temporary Internet Files\Content.IE5\OY884PFE\realhousewivesnyc_home;site=bravo;sect=realhousewivesnyc;sub=home;pageid=1474;season=2;aff=pop;daypart=primetime;genre=reality;!category=bravo;!category=realhousewivesny[1]
Status: Locked to the Windows API!

Path: C:\Documents and Settings\Administrator\Local Settings\Temp\Temporary Internet Files\Content.IE5\OY884PFE\fgANyEEOwiAQAEB8ECzQZQl-oWePxpAWKMbaTcHEt_gMv-XRD-gc5_z-vEYxitP3IKY95n5pD-ZbTU0svfMRYK5WtWVjrveipm2FusaS2v8BESgDJaAZA1lMRJ5cdtplMmQwDQ4TWgw-eu-MtD48hxCkllpduQjxAw__[1].jpg
Status: Locked to the Windows API!

Path: C:\Documents and Settings\Administrator\Local Settings\Temp\Temporary Internet Files\Content.IE5\OY884PFE\fgAVyUEOgjAQAMD1JSbe26WU7VK_wNmzqVBKDcjG1sR_-wH1OrOejmmAAS6fA4zPMNdreYmsORZYapUz4pRbXZZdJD-SHvcN8xZSLD9HZrSEZJBa9u5G7MhFN3HfBTbW2d7N_yHuPAVmZax9W-9Voxp9lwTwBQ__[1].jpg
Status: Locked to the Windows API!

Path: C:\Documents and Settings\Administrator\Local Settings\Temp\Temporary Internet Files\Content.IE5\OY884PFE\default;sz=300x250;in=und;news=default;site=shopping.hollywoodlife.net;host=www.hollywoodlife.net;siteurl=http%3a%2f%2fwww.hollywoodlife.net%2flayoutengine[1].htm
Status: Locked to the Windows API!

Path: C:\Documents and Settings\Administrator\Local Settings\Temp\Temporary Internet Files\Content.IE5\WJTQYC3Q\;kw=Buick,Buick_Enclave,Buick_LaCrosse,Buick_Lucerne,Cadillac,Cadillac_CTS,Cadillac_DTS,Cadillac_Escalade,Cadillac_SRX,Cadillac_STS,Cadillac_XLR,Chevrolet,Chevrolet_Aval[1].htm
Status: Locked to the Windows API!

Path: C:\Documents and Settings\Administrator\Local Settings\Temp\Temporary Internet Files\Content.IE5\WJTQYC3Q\fgANiEEOwiAQADdee_MXHmDB3UDxC32EIS1SjLUbwcQXevNPcpnJzPE7_CaY4DQcYH7FW7vWt8ijpApra3JBXIrVdd1FyjPred-wbDGn2j9SQE9IvtOPFHhxic7smMmw7abe7KyLjv3ovWJjPhSCMsrou2SAPw__[1].jpg
Status: Locked to the Windows API!

descriptionSearch Engine Virus EmptyRe: Search Engine Virus

more_horiz
Part 2 of report-

Path: C:\Documents and Settings\Administrator\Local Settings\Temp\Temporary Internet Files\Content.IE5\WJTQYC3Q\%2Fserve%2Fv%3D5%3Bm%3D3%3Bl%3D4831%3Bc%3D13998%3Bb%3D81666%3Bts%3D20090512120303%3Bp%3Dui%253DFsvDr-ROLSEbR_mhbNkVxBYwHDZW7xz-7P8w6rPR%253Btr%253DHRsAi0StuvG%253Btm%253D0-0&r=0
Status: Locked to the Windows API!

Path: C:\Documents and Settings\Administrator\Local Settings\Temp\Temporary Internet Files\Content.IE5\WJTQYC3Q\v=5;m=2;l=4831;cxt=;kw=;ts=488025;smuid=FsvDr-ROLSEbR_mhbNkVxBYwHDZW7xz-7P8w6rPR;p=ui%3DFsvDr-ROLSEbR_mhbNkVxBYwHDZW7xz-7P8w6rPR%3Btr%3DHRsAi0StuvG%3Btm%3D0-0[1]
Status: Locked to the Windows API!

Path: C:\Documents and Settings\Administrator\Local Settings\Temp\Temporary Internet Files\Content.IE5\WJTQYC3Q\v=5;m=2;l=4832;cxt=;kw=;ts=214113;smuid=FsvDr-ROLSEbR_mhbNkVxBYwHDZW7xz-7P8w6rPR;p=ui%3DFsvDr-ROLSEbR_mhbNkVxBYwHDZW7xz-7P8w6rPR%3Btr%3DFdtXfgC5Qab%3Btm%3D0-0[1]
Status: Locked to the Windows API!

Path: C:\Documents and Settings\Administrator\Local Settings\Temp\Temporary Internet Files\Content.IE5\WJTQYC3Q\realhousewivesnyc_blogs;site=bravo;sect=realhousewivesnyc;sub=blogs;pageid=37702;season=2;aff=pop;daypart=primetime;genre=reality;!category=bravo;!category=realhousewive[1]
Status: Locked to the Windows API!

Path: C:\Documents and Settings\Administrator\Local Settings\Temp\Temporary Internet Files\Content.IE5\WJTQYC3Q\realhousewivesnyc_video;site=bravo;sect=realhousewivesnyc;sub=video;pageid=37714;season=2;aff=pop;daypart=primetime;genre=reality;!category=bravo;!category=realhousewive[1]
Status: Locked to the Windows API!

Path: C:\Documents and Settings\Administrator\Local Settings\Temp\Temporary Internet Files\Content.IE5\WJTQYC3Q\realhousewivesnyc_video;site=bravo;sect=realhousewivesnyc;sub=video;pageid=37714;season=2;aff=pop;daypart=primetime;genre=reality;!category=bravo;!category=realhousewive[2]
Status: Locked to the Windows API!

Path: C:\Documents and Settings\Administrator\Local Settings\Temp\Temporary Internet Files\Content.IE5\WJTQYC3Q\dref=http%253A%252F%25[1].jsp%253Fsid%253D12213%2526S%253Dca%2526search%253DFind+It%2526T%253Dmodesto%2526PG%253DL%2526SRC%253Dcomwp%2526C%253DTaxis%2526R%253DN%2526STYPE%253DS
Status: Locked to the Windows API!

Path: C:\Documents and Settings\Administrator\Local Settings\Temp\Temporary Internet Files\Content.IE5\WJTQYC3Q\fgANykEOwiAQAMCNN-NDjAdY7MKu-IXe_IAhtFIaa4lg4lf9jb1O5rj_3Xro4XTYQXyHR7vXTynPPFaYWitXxCGfdZ3WUvIr6bgumJeQxro5OoPkUAhtFOaOmMUGttSJYxLhQS6OxNtIvA1R1pgvea-MMnouCeAP[1].jpg
Status: Locked to the Windows API!

Path: C:\Documents and Settings\Administrator\Local Settings\Temp\Temporary Internet Files\Content.IE5\WJTQYC3Q\fgANyNENwiAUBVAcCF6h9F3pCv322xCkFGMtEUycwJmcwbiNC-j5PO_n6zOJSRy-OxFufm7Hei_lkmMVS2tlJDplreqylZKvSYVtpbz6FOv_CXuygcDEETxoGGh4DmA4NnbGwGDLHq4Ha4Y0zj5652QnO3UuSYgf[1].jpg
Status: Locked to the Windows API!

Stealth Objects
-------------------
Object: Hidden Module [Name: UACrcscgnjcmskjief.dll]
Process: winlogon.exe (PID: 468) Address: 0x006b0000 Size: 45056

Object: Hidden Module [Name: UACeiglqurkaqjstgy.dll]
Process: winlogon.exe (PID: 468) Address: 0x10000000 Size: 40960

Object: Hidden Module [Name: UACrcscgnjcmskjief.dll]
Process: services.exe (PID: 512) Address: 0x00730000 Size: 45056

Object: Hidden Module [Name: UACeiglqurkaqjstgy.dll]
Process: services.exe (PID: 512) Address: 0x10000000 Size: 40960

Object: Hidden Module [Name: UACrcscgnjcmskjief.dll]
Process: lsass.exe (PID: 524) Address: 0x00880000 Size: 45056

Object: Hidden Module [Name: UACeiglqurkaqjstgy.dll]
Process: lsass.exe (PID: 524) Address: 0x10000000 Size: 40960

Object: Hidden Module [Name: UACeiglqurkaqjstgy.dll]
Process: svchost.exe (PID: 724) Address: 0x10000000 Size: 40960

Object: Hidden Module [Name: UACrcscgnjcmskjief.dll]
Process: svchost.exe (PID: 724) Address: 0x00800000 Size: 45056

Object: Hidden Module [Name: UACrcscgnjcmskjief.dll]
Process: svchost.exe (PID: 772) Address: 0x00800000 Size: 45056

Object: Hidden Module [Name: UACeiglqurkaqjstgy.dll]
Process: svchost.exe (PID: 772) Address: 0x10000000 Size: 40960

Object: Hidden Module [Name: UACrcscgnjcmskjief.dll]
Process: svchost.exe (PID: 840) Address: 0x00800000 Size: 45056

Object: Hidden Module [Name: UACeiglqurkaqjstgy.dll]
Process: svchost.exe (PID: 840) Address: 0x10000000 Size: 40960

Object: Hidden Module [Name: UACrcscgnjcmskjief.dll]
Process: svchost.exe (PID: 928) Address: 0x00800000 Size: 45056

Object: Hidden Module [Name: UACeiglqurkaqjstgy.dll]
Process: svchost.exe (PID: 928) Address: 0x10000000 Size: 40960

Object: Hidden Module [Name: UACrcscgnjcmskjief.dll]
Process: svchost.exe (PID: 968) Address: 0x00800000 Size: 45056

Object: Hidden Module [Name: UACeiglqurkaqjstgy.dll]
Process: svchost.exe (PID: 968) Address: 0x10000000 Size: 40960

Object: Hidden Module [Name: UACrcscgnjcmskjief.dll]
Process: brsvc01a.exe (PID: 1152) Address: 0x00950000 Size: 45056

Object: Hidden Module [Name: UACeiglqurkaqjstgy.dll]
Process: brsvc01a.exe (PID: 1152) Address: 0x10000000 Size: 40960

Object: Hidden Module [Name: UACrcscgnjcmskjief.dll]
Process: spoolsv.exe (PID: 1200) Address: 0x00aa0000 Size: 45056

Object: Hidden Module [Name: UACeiglqurkaqjstgy.dll]
Process: spoolsv.exe (PID: 1200) Address: 0x10000000 Size: 40960

Object: Hidden Module [Name: UACrcscgnjcmskjief.dll]
Process: Explorer.EXE (PID: 1356) Address: 0x00ae0000 Size: 45056

Object: Hidden Module [Name: UACeiglqurkaqjstgy.dll]
Process: Explorer.EXE (PID: 1356) Address: 0x10000000 Size: 40960

Object: Hidden Module [Name: UACrcscgnjcmskjief.dll]
Process: brss01a.exe (PID: 1476) Address: 0x00a60000 Size: 45056

Object: Hidden Module [Name: UACeiglqurkaqjstgy.dll]
Process: brss01a.exe (PID: 1476) Address: 0x10000000 Size: 40960

Object: Hidden Module [Name: UACeiglqurkaqjstgy.dll]
Process: hkcmd.exe (PID: 1628) Address: 0x00a00000 Size: 40960

Object: Hidden Module [Name: UACrcscgnjcmskjief.dll]
Process: hkcmd.exe (PID: 1628) Address: 0x00ac0000 Size: 45056

Object: Hidden Module [Name: UACrcscgnjcmskjief.dll]
Process: igfxpers.exe (PID: 1636) Address: 0x00a60000 Size: 45056

Object: Hidden Module [Name: UACeiglqurkaqjstgy.dll]
Process: igfxpers.exe (PID: 1636) Address: 0x10000000 Size: 40960

Object: Hidden Module [Name: UACrcscgnjcmskjief.dll]
Process: pptd40nt.exe (PID: 1792) Address: 0x00c60000 Size: 45056

Object: Hidden Module [Name: UACeiglqurkaqjstgy.dll]
Process: pptd40nt.exe (PID: 1792) Address: 0x10000000 Size: 40960

Object: Hidden Module [Name: UACrcscgnjcmskjief.dll]
Process: pccntmon.exe (PID: 1832) Address: 0x00bd0000 Size: 45056

Object: Hidden Module [Name: UACeiglqurkaqjstgy.dll]
Process: pccntmon.exe (PID: 1832) Address: 0x00b00000 Size: 40960

Object: Hidden Module [Name: UACeiglqurkaqjstgy.dll]
Process: AOLSoftware.exe (PID: 1840) Address: 0x10000000 Size: 40960

Object: Hidden Module [Name: UACrcscgnjcmskjief.dll]
Process: AOLSoftware.exe (PID: 1840) Address: 0x00950000 Size: 45056

Object: Hidden Module [Name: UACrcscgnjcmskjief.dll]
Process: ctfmon.exe (PID: 1864) Address: 0x009b0000 Size: 45056

Object: Hidden Module [Name: UACeiglqurkaqjstgy.dll]
Process: ctfmon.exe (PID: 1864) Address: 0x10000000 Size: 40960

Object: Hidden Module [Name: UACeiglqurkaqjstgy.dll]
Process: Sentinel.exe (PID: 1980) Address: 0x00e10000 Size: 40960

Object: Hidden Module [Name: UACrcscgnjcmskjief.dll]
Process: Sentinel.exe (PID: 1980) Address: 0x00ee0000 Size: 45056

Object: Hidden Module [Name: UACrcscgnjcmskjief.dll]
Process: svchost.exe (PID: 152) Address: 0x00800000 Size: 45056

Object: Hidden Module [Name: UACeiglqurkaqjstgy.dll]
Process: svchost.exe (PID: 152) Address: 0x10000000 Size: 40960

Object: Hidden Module [Name: UACeiglqurkaqjstgy.dll]
Process: aiclient.exe (PID: 212) Address: 0x008c0000 Size: 40960

Object: Hidden Module [Name: UACrcscgnjcmskjief.dll]
Process: aiclient.exe (PID: 212) Address: 0x00990000 Size: 45056

Object: Hidden Module [Name: UACrcscgnjcmskjief.dll]
Process: AOLAcsd.exe (PID: 224) Address: 0x00a50000 Size: 45056

Object: Hidden Module [Name: UACeiglqurkaqjstgy.dll]
Process: AOLAcsd.exe (PID: 224) Address: 0x10000000 Size: 40960

Object: Hidden Module [Name: UACrcscgnjcmskjief.dll]
Process: awhost32.exe (PID: 284) Address: 0x01060000 Size: 45056

Object: Hidden Module [Name: UACeiglqurkaqjstgy.dll]
Process: awhost32.exe (PID: 284) Address: 0x00fa0000 Size: 40960

Object: Hidden Module [Name: UACrcscgnjcmskjief.dll]
Process: BESClient.exe (PID: 332) Address: 0x00ce0000 Size: 45056

Object: Hidden Module [Name: UACeiglqurkaqjstgy.dll]
Process: BESClient.exe (PID: 332) Address: 0x10000000 Size: 40960

Object: Hidden Module [Name: UACrcscgnjcmskjief.dll]
Process: nfsclnt.exe (PID: 112) Address: 0x00900000 Size: 45056

Object: Hidden Module [Name: UACeiglqurkaqjstgy.dll]
Process: nfsclnt.exe (PID: 112) Address: 0x10000000 Size: 40960

Object: Hidden Module [Name: UACrcscgnjcmskjief.dll]
Process: dbsrv6.exe (PID: 424) Address: 0x00ae0000 Size: 45056

Object: Hidden Module [Name: UACeiglqurkaqjstgy.dll]
Process: dbsrv6.exe (PID: 424) Address: 0x10000000 Size: 40960

Object: Hidden Module [Name: UACeiglqurkaqjstgy.dll]
Process: DkService.exe (PID: 148) Address: 0x008b0000 Size: 40960

Object: Hidden Module [Name: UACrcscgnjcmskjief.dll]
Process: DkService.exe (PID: 148) Address: 0x00a80000 Size: 45056

Object: Hidden Module [Name: UACrcscgnjcmskjief.dll]
Process: IGK.exe (PID: 832) Address: 0x00830000 Size: 45056

Object: Hidden Module [Name: UACeiglqurkaqjstgy.dll]
Process: IGK.exe (PID: 832) Address: 0x10000000 Size: 40960

Object: Hidden Module [Name: System.ServiceProcess.dll]
Process: IGK.exe (PID: 832) Address: 0x00ee0000 Size: 126976

Object: Hidden Module [Name: UACrcscgnjcmskjief.dll]
Process: MDM.EXE (PID: 1068) Address: 0x00ad0000 Size: 45056

Object: Hidden Module [Name: UACeiglqurkaqjstgy.dll]
Process: MDM.EXE (PID: 1068) Address: 0x10000000 Size: 40960

Object: Hidden Module [Name: UACeiglqurkaqjstgy.dll]
Process: ntrtscan.exe (PID: 1284) Address: 0x009e0000 Size: 40960

Object: Hidden Module [Name: UACrcscgnjcmskjief.dll]
Process: ntrtscan.exe (PID: 1284) Address: 0x00ab0000 Size: 45056

Object: Hidden Module [Name: UACrcscgnjcmskjief.dll]
Process: svchost.exe (PID: 1520) Address: 0x00800000 Size: 45056

Object: Hidden Module [Name: UACeiglqurkaqjstgy.dll]
Process: svchost.exe (PID: 1520) Address: 0x10000000 Size: 40960

Object: Hidden Module [Name: UACeiglqurkaqjstgy.dll]
Process: tmlisten.exe (PID: 1740) Address: 0x00dc0000 Size: 40960

Object: Hidden Module [Name: UACrcscgnjcmskjief.dll]
Process: tmlisten.exe (PID: 1740) Address: 0x00e80000 Size: 45056

Object: Hidden Module [Name: UACrcscgnjcmskjief.dll]
Process: mapsvc.exe (PID: 2168) Address: 0x00a40000 Size: 45056

Object: Hidden Module [Name: UACeiglqurkaqjstgy.dll]
Process: mapsvc.exe (PID: 2168) Address: 0x10000000 Size: 40960

Object: Hidden Module [Name: UACeiglqurkaqjstgy.dll]
Process: DCMStateMngr.exe (PID: 2208) Address: 0x00e10000 Size: 40960

Object: Hidden Module [Name: UACrcscgnjcmskjief.dll]
Process: DCMStateMngr.exe (PID: 2208) Address: 0x00ee0000 Size: 45056

Object: Hidden Module [Name: UACeiglqurkaqjstgy.dll]
Process: httpsvr.exe (PID: 2256) Address: 0x00e30000 Size: 40960

Object: Hidden Module [Name: UACrcscgnjcmskjief.dll]
Process: httpsvr.exe (PID: 2256) Address: 0x00f00000 Size: 45056

Object: Hidden Module [Name: UACeiglqurkaqjstgy.dll]
Process: appclnt.exe (PID: 2328) Address: 0x00e10000 Size: 40960

Object: Hidden Module [Name: UACrcscgnjcmskjief.dll]
Process: appclnt.exe (PID: 2328) Address: 0x00ee0000 Size: 45056

Object: Hidden Module [Name: UACrcscgnjcmskjief.dll]
Process: svchost.exe (PID: 2484) Address: 0x00a90000 Size: 45056

Object: Hidden Module [Name: UACeiglqurkaqjstgy.dll]
Process: svchost.exe (PID: 2484) Address: 0x10000000 Size: 40960

Object: Hidden Module [Name: UACrcscgnjcmskjief.dll]
Process: UE16F1.EXE (PID: 2628) Address: 0x00770000 Size: 45056

Object: Hidden Module [Name: UACeiglqurkaqjstgy.dll]
Process: UE16F1.EXE (PID: 2628) Address: 0x10000000 Size: 40960

Object: Hidden Module [Name: UACrcscgnjcmskjief.dll]
Process: alg.exe (PID: 2924) Address: 0x007a0000 Size: 45056

Object: Hidden Module [Name: UACeiglqurkaqjstgy.dll]
Process: alg.exe (PID: 2924) Address: 0x10000000 Size: 40960

Object: Hidden Module [Name: UACrcscgnjcmskjief.dll]
Process: CNTAoSMgr.exe (PID: 3460) Address: 0x00860000 Size: 45056

Object: Hidden Module [Name: UACeiglqurkaqjstgy.dll]
Process: CNTAoSMgr.exe (PID: 3460) Address: 0x10000000 Size: 40960

Object: Hidden Module [Name: UACrcscgnjcmskjief.dll]
Process: RootRepeal.exe (PID: 1424) Address: 0x00f00000 Size: 45056

Object: Hidden Module [Name: UACeiglqurkaqjstgy.dll]
Process: RootRepeal.exe (PID: 1424) Address: 0x10000000 Size: 40960

Object: Hidden Module [Name: UACrcscgnjcmskjief.dll]
Process: IEXPLORE.EXE (PID: 3364) Address: 0x00ab0000 Size: 45056

Object: Hidden Module [Name: UACeiglqurkaqjstgy.dll]
Process: IEXPLORE.EXE (PID: 3364) Address: 0x10000000 Size: 40960

Object: Hidden Module [Name: UACrcscgnjcmskjief.dll]
Process: Iexplore.exe (PID: 1664) Address: 0x00ab0000 Size: 45056

Object: Hidden Module [Name: UACeiglqurkaqjstgy.dll]
Process: Iexplore.exe (PID: 1664) Address: 0x10000000 Size: 40960

Object: Hidden Module [Name: UACrcscgnjcmskjief.dll]
Process: wmiprvse.exe (PID: 1352) Address: 0x00880000 Size: 45056

Object: Hidden Module [Name: UACeiglqurkaqjstgy.dll]
Process: wmiprvse.exe (PID: 1352) Address: 0x10000000 Size: 40960

Hidden Services
-------------------
Service Name: UACd.sys
Image Path: C:\WINDOWS\system32\drivers\UACbommavjqdxhqorb.sys

descriptionSearch Engine Virus EmptyRe: Search Engine Virus

more_horiz
Hello.
That found the troublemaker, so we can kill it now. We'll need to use the avenger again.

1. Copy all the text contained in the code box below to your Clipboard by highlighting it and pressing (Ctrl+C):


Drivers to delete:
UACd.sys

Files to delete:
C:\WINDOWS\system32\drivers\UACbommavjqdxhqorb.sys


Note: the above code was created specifically for this user. If you are not this user, do NOT follow these directions as they could damage the workings of your system.


2. Now, start The Avenger program by clicking on its icon on your desktop.

  • Under "Input script here:", paste in the script from the quote box above.
  • Leave the ticked box "Scan for rootkit" ticked.
  • Then tick "Disable any rootkits found"
  • Now click on the Execute to begin execution of the script.
  • Answer "Yes" twice when prompted.

    The Avenger will automatically do the following:

  • It will Restart your computer.
  • On reboot, it will briefly open a black command window on your desktop, this is normal.
  • After the restart, it creates a log file that should open with the results of Avenger’s actions. This log file will be located at C:\avenger.txt
  • The Avenger will also have backed up all the files, etc., that you asked it to delete, and will have zipped them and moved the zip archives to C:\avenger\backup.zip.
3. Please copy/paste the content of c:\avenger.txt into your reply.

descriptionSearch Engine Virus EmptyThank you

more_horiz
Worked out perfectly, thanks for all your help, I'll be sending a donation soon thanks again. Thank You!

descriptionSearch Engine Virus EmptyRe: Search Engine Virus

more_horiz
We aren't done here, all we did so far was kill the main driver.

Please download and run this tool.

Download Malwarebytes' Anti-Malware from Here

Double Click mbam-setup.exe to install the application.

  • Make sure a checkmark is placed next to Update Malwarebytes' Anti-Malware and Launch Malwarebytes' Anti-Malware, then click Finish.
  • If an update is found, it will download and install the latest version.
  • Once the program has loaded, select "Perform Quick Scan", then click Scan.
  • The scan may take some time to finish,so please be patient.
  • When the scan is complete, click OK, then Show Results to view the results.
  • Make sure that everything is checked, and click Remove Selected.
  • When disinfection is completed, a log will open in Notepad and you may be prompted to Restart. (See Note)
  • The log is automatically saved by MBAM and can be viewed by clicking the Logs tab in MBAM.
Note:
If MBAM encounters a file that is difficult to remove, you will be presented with 1 of 2 prompts.
Click OK to either and let MBAM proceed with the disinfection process.
If asked to restart the computer, please do so immediately.


Post the contents of the MBAM Log.

descriptionSearch Engine Virus EmptyRe: Search Engine Virus

more_horiz
I downloaded malwarebytes but it's not opening.

descriptionSearch Engine Virus EmptyRe: Search Engine Virus

more_horiz
Got it going here's the report-

alwarebytes' Anti-Malware 1.36
Database version: 1945
Windows 5.1.2600 Service Pack 2

5/14/2009 1:17:58 AM
mbam-log-2009-05-14 (01-17-58).txt

Scan type: Full Scan (C:\|)
Objects scanned: 121296
Time elapsed: 25 minute(s), 27 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 1
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 1

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\UAC (Rootkit.Trace) -> Quarantined and deleted successfully.

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
C:\WINDOWS\system32\uacinit.dll (Trojan.Agent) -> Quarantined and deleted successfully.

descriptionSearch Engine Virus EmptyRe: Search Engine Virus

more_horiz

  • Please download DDS by sUBs to your Desktop (Important!!) from one of these locations:
    Link 1
    Link 2
  • Double click DDS.scr to run.
  • When complete, two logs will open. Save both of the report to your Desktop.
  • Copy and paste DDS.txt back here, I don't need to see attach.txt.

descriptionSearch Engine Virus EmptyRe: Search Engine Virus

more_horiz
Here is the DDS.txt-


DDS (Ver_09-05-14.01) - NTFSx86
Run by Administrator at 23:00:13.46 on Thu 05/14/2009
Internet Explorer: 6.0.2900.2180
Microsoft Windows XP Professional 5.1.2600.2.1252.1.1033.18.1014.448 [GMT -7:00]

AV: Trend Micro OfficeScan Antivirus *On-access scanning enabled* (Updated) {4E214C56-2E1F-450F-A2B8-81256A6BDB98}

============== Running Processes ===============

C:\WINDOWS\system32\svchost -k DcomLaunch
svchost.exe
C:\WINDOWS\System32\svchost.exe -k netsvcs
svchost.exe
svchost.exe
C:\WINDOWS\system32\brsvc01a.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\brss01a.exe
C:\WINDOWS\system32\igfxpers.exe
C:\Program Files\ScanSoft\PaperPort\pptd40nt.exe
C:\Program Files\Brother\ControlCenter2\brctrcen.exe
C:\Program Files\Trend Micro\OfficeScan Client\pccntmon.exe
C:\Program Files\Common Files\AOL\1226138630\ee\AOLSoftware.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Messenger\msmsgs.exe
C:\Program Files\ADP\TimeclockMgr\Dcm\Sentinel.exe
svchost.exe
C:\Program Files\Insight\Tools\aiclient.exe
C:\Program Files\Common Files\AOL\ACS\AOLAcsd.exe
C:\Program Files\Symantec\pcAnywhere\awhost32.exe
C:\Program Files\BigFix Enterprise\BES Client\BESClient.exe
c:\WINDOWS\system32\nfsclnt.exe
C:\Program Files\Common Files\Kronos\DCMCommon\dbsrv6.exe
C:\Program Files\Executive Software\Diskeeper\DkService.exe
C:\Program Files\Marriott\Installation Gatekeeper\IGK.exe
C:\Program Files\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE
C:\Program Files\Trend Micro\OfficeScan Client\ntrtscan.exe
C:\WINDOWS\system32\svchost.exe -k imgsvc
C:\Program Files\Trend Micro\OfficeScan Client\tmlisten.exe
c:\SFU\Mapper\mapsvc.exe
C:\Program Files\ADP\TimeclockMgr\Dcm\DCMStateMngr.exe
C:\Program Files\ADP\TimeclockMgr\Dcm\httpsvr.exe
C:\Program Files\ADP\TimeclockMgr\Dcm\appclnt.exe
svchost
C:\WINDOWS\TEMP\AR983D.EXE
C:\Program Files\Trend Micro\OfficeScan Client\CNTAoSMgr.exe
C:\Program Files\SecureCRT\SecureCRT.EXE
C:\Program Files\Internet Explorer\iexplore.exe
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\XXYZCDY7\dds[1].scr

============== Pseudo HJT Report ===============

uStart Page = hxxp://mgs.marriott.com/index.html
uInternet Connection Wizard,ShellNext = iexplore
BHO: AcroIEHlprObj Class: {06849e9f-c8d7-4d59-b87d-784b7d6be0b3} - c:\program files\adobe\activex\AcroIEHelper.dll
BHO: SSVHelper Class: {761497bb-d6f0-462c-b6eb-d4daf1d92d43} - c:\program files\java\jre1.6.0_02\bin\ssv.dll
uRun: [ctfmon.exe] c:\windows\system32\ctfmon.exe
uRun: [MSMSGS] "c:\program files\messenger\msmsgs.exe" /background
uRun: [AOL Fast Start] "c:\program files\aol 9.0\AOL.EXE" -b
mRun: [IgfxTray] c:\windows\system32\igfxtray.exe
mRun: [HotKeysCmds] c:\windows\system32\hkcmd.exe
mRun: [Persistence] c:\windows\system32\igfxpers.exe
mRun: [IMJPMIG8.1] "c:\windows\ime\imjp8_1\IMJPMIG.EXE" /Spoil /RemAdvDef /Migration32
mRun: [MSPY2002] c:\windows\system32\ime\pintlgnt\ImScInst.exe /SYNC
mRun: [PHIME2002ASync] c:\windows\system32\ime\tintlgnt\TINTSETP.EXE /SYNC
mRun: [PHIME2002A] c:\windows\system32\ime\tintlgnt\TINTSETP.EXE /IMEName
mRun: [ScrewDrivers Client Executable] "c:\program files\tricerat\simplify printing\screwdrivers client v3\sdclient.exe" -i
mRun: [DiskeeperSystray] "c:\program files\executive software\diskeeper\DkIcon.exe"
mRun: [SSBkgdUpdate] "c:\program files\common files\scansoft shared\ssbkgdupdate\SSBkgdupdate.exe" -Embedding -boot
mRun: [PaperPort PTD] c:\program files\scansoft\paperport\pptd40nt.exe
mRun: [IndexSearch] c:\program files\scansoft\paperport\IndexSearch.exe
mRun: [SetDefPrt] c:\program files\brother\brmfl05b\BrStDvPt.exe
mRun: [ControlCenter2.0] c:\program files\brother\controlcenter2\brctrcen.exe /autorun
mRun: [OfficeScanNT Monitor] "c:\program files\trend micro\officescan client\pccntmon.exe" -HideWindow
mRun: [HostManager] c:\program files\common files\aol\1226138630\ee\AOLSoftware.exe
mRun: [KernelFaultCheck] %systemroot%\system32\dumprep 0 -k
StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\adober~1.lnk - c:\program files\adobe\reader\reader_sl.exe
StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\adpeve~1.lnk - c:\program files\adp\timeclockmgr\dcm\EventMgr.exe
StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\adpsen~1.lnk - c:\program files\adp\timeclockmgr\dcm\Sentinel.exe
uPolicies-explorer: NoActiveDesktopChanges = 00000000
uPolicies-system: EnableProfileQuota = 1 (0x1)
mPolicies-explorer: NoSMConfigurePrograms = 1 (0x1)
IE: E&xport to Microsoft Excel - c:\progra~1\micros~2\office11\EXCEL.EXE/3000
IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe
IE: {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - {CAFEEFAC-0016-0000-0002-ABCDEFFEDCBC} - c:\program files\java\jre1.6.0_02\bin\ssv.dll
IE: {92780B25-18CC-41C8-B9BE-3C9C571A8263} - {FF059E31-CC5A-4E2E-BF3B-96E929D65503} - c:\progra~1\micros~2\office11\REFIEBAR.DLL
Trusted Zone: MySodexho.com
Trusted Zone: MySodexho.com\www
DPF: Microsoft XML Parser for Java - file://c:\windows\java\classes\xmldso.cab
DPF: PackageCab - hxxp://ak.imgag.com/imgag/cp/install/AxCtp2.cab
DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_02-windows-i586.cab
DPF: {CAFEEFAC-0015-0000-0011-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.5.0/jinstall-1_5_0_11-windows-i586.cab
DPF: {CAFEEFAC-0016-0000-0002-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_02-windows-i586.cab
DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_02-windows-i586.cab
Notify: igfxcui - igfxdev.dll
Notify: PCANotify - PCANotify.dll
SSODL: WPDShServiceObj - {AAA288BA-9A4C-45B0-95D7-94D524869DB5} - c:\windows\system32\WPDShServiceObj.dll
LSA: Authentication Packages = msv1_0 c:\windows\system32\nnnlmMgd

============= SERVICES / DRIVERS ===============

R1 AW_HOST;AW_HOST;c:\windows\system32\drivers\AW_HOST5.sys [2002-2-11 33496]
R1 awlegacy;awlegacy;c:\windows\system32\drivers\AWLEGACY.sys [2000-9-11 10816]
R2 awhost32;pcAnywhere Host Service;c:\program files\symantec\pcanywhere\awhost32.exe [2002-2-15 114749]
R2 Client for NFS;Client for NFS;c:\windows\system32\nfsclnt.exe [2005-12-16 53408]
R2 DCM - TimeclockMgr;DCM - TimeclockMgr;c:\program files\common files\kronos\dcmcommon\dbsrv6.exe [2007-8-7 38912]
R2 Installation Gatekeeper;Installation Gatekeeper;c:\program files\marriott\installation gatekeeper\IGK.exe [2003-7-21 7168]
R2 Mapsvc;User Name Mapping;c:\sfu\mapper\mapsvc.exe [2005-12-16 111728]
R2 TmFilter;Trend Micro Filter;c:\program files\trend micro\officescan client\TmXPFlt.sys [2008-5-27 225296]
R2 TmPreFilter;Trend Micro PreFilter;c:\program files\trend micro\officescan client\tmpreflt.sys [2008-5-27 36368]
R3 NfsRdr;NfsRdr;c:\windows\system32\drivers\nfsrdr.sys [2005-12-16 305664]
R3 Portmap;Portmap;c:\windows\system32\drivers\portmap.sys [2005-12-16 35072]
R3 RpcXdr;RpcXdr;c:\windows\system32\drivers\rpcxdr.sys [2005-12-16 55872]
S2 zkvjoynct;zkvjoynct;c:\windows\system32\drivers\znptynsz.sys [2009-5-13 60288]
S3 S3Inc;S3Inc;c:\windows\system32\drivers\s3mt3d.sys [2006-5-31 41216]
S3 TmProxy;OfficeScan NT Proxy Service;c:\program files\trend micro\officescan client\TmProxy.exe [2008-6-4 652552]

=============== Created Last 30 ================

2009-05-13 23:03 15,504 a------- c:\windows\system32\drivers\mbam.sys
2009-05-13 23:03 38,496 a------- c:\windows\system32\drivers\mbamswissarmy.sys
2009-05-13 23:03 --d----- c:\program files\Malwarebytes' Anti-Malware
2009-05-13 01:02 60,288 a------- c:\windows\system32\drivers\znptynsz.sys
2009-05-09 11:06 0 a------- C:\LOG67.tmp
2009-05-08 14:59 0 a------- C:\LOG4D6.tmp
2009-05-08 12:33 0 a------- C:\LOG4A1.tmp
2009-05-06 03:02 3,794,557 a------- c:\windows\system32\uactmp.db
2009-05-06 00:39 1,077,198 a------- c:\windows\system32\UACwrwfpgauklwcqrq.db
2009-05-06 00:39 224 a------- c:\windows\system32\UACnvgxvwxpsshvwed.dat
2009-05-06 00:39 52,224 a------- c:\windows\system32\drivers\UACbommavjqdxhqorb.sys
2009-05-06 00:39 24,064 a------- c:\windows\system32\UACmenqnauppuiqdon.dll
2009-05-05 15:08 0 a------- C:\LOG933.tmp
2009-05-04 16:49 0 a------- C:\LOG7F7.tmp
2009-05-04 10:16 0 a------- C:\LOG715.tmp
2009-05-01 16:24 0 a------- C:\LOG39A.tmp
2009-04-30 16:54 0 a------- C:\LOG263.tmp
2009-04-28 13:13 0 a------- C:\LOG8AE.tmp
2009-04-27 10:58 0 a------- C:\LOG719.tmp
2009-04-24 10:37 0 a------- C:\LOG126.tmp
2009-04-20 15:15 0 a------- C:\LOG6B5.tmp

==================== Find3M ====================

2009-03-06 07:44 283,648 a------- c:\windows\system32\pdh.dll
2009-02-20 01:30 659,456 a------- c:\windows\system32\wininet.dll
2009-02-20 01:30 81,920 a------- c:\windows\system32\ieencode.dll
2008-06-30 22:41 255,401 a--sh--- c:\windows\system32\dgMmlnnn.ini2
2008-11-26 19:12 869,880 a--sh--- c:\windows\system32\nqrCLkkj.ini2

============= FINISH: 23:00:24.25 ===============

descriptionSearch Engine Virus EmptyRe: Search Engine Virus

more_horiz
Please download the OTMoveIt3 by OldTimer.

  • Save it to your desktop.
  • Please double-click OTMoveIt3.exe to run it.
  • Copy the bolded text below to the clipboard by highlighting ALL of them and pressing CTRL + C (or, after highlighting, right-click and choose Copy):


    :services
    zkvjoynct
    UACd.sys

    :files
    c:\windows\system32\drivers\znptynsz.sys
    C:\LOG*.tmp
    c:\windows\system32\uactmp.db
    c:\windows\system32\UACwrwfpgauklwcqrq.db
    c:\windows\system32\UACnvgxvwxpsshvwed.dat
    c:\windows\system32\drivers\UACbommavjqdxhqorb.sys
    c:\windows\system32\UACmenqnauppuiqdon.dll
    c:\windows\system32\dgMmlnnn.ini2
    c:\windows\system32\nqrCLkkj.ini2

    :reg
    [HKEY_LOCAL_MACHINE\system\currentcontrolset\control\lsa]
    "Authentication Packages"=hex(7):6d,73,76,31,5f,30,00,00


  • Return to OTMoveIt3, right click in the "Paste instructions for items to be Moved" window (under the light blue bar) and choose Paste.
  • Click the red Moveit! button.
  • Copy everything in the Results window (under the green bar) to the clipboard by highlighting ALL of them and pressing CTRL + C (or, after highlighting, right-click and choose copy), and paste it in your next reply.
  • Close OTMoveIt3
If a file or folder cannot be moved immediately you may be asked to reboot the machine to finish the move process. If you are asked to reboot the machine choose Yes.

Please post the OTMoveIt log.

descriptionSearch Engine Virus EmptyRe: Search Engine Virus

more_horiz
========== SERVICES/DRIVERS ==========

Service\Driver zkvjoynct deleted successfully.
Service\Driver UACd.sys not found.
Service\Driver key UACd.sys deleted successfully.
========== FILES ==========
c:\windows\system32\drivers\znptynsz.sys moved successfully.
C:\LOG10A0.tmp moved successfully.
C:\LOG10E.tmp moved successfully.
C:\LOG10F.tmp moved successfully.
C:\LOG11A8.tmp moved successfully.
C:\LOG1204.tmp moved successfully.
C:\LOG120B.tmp moved successfully.
C:\LOG126.tmp moved successfully.
C:\LOG1346.tmp moved successfully.
C:\LOG145B.tmp moved successfully.
C:\LOG1B.tmp moved successfully.
C:\LOG1C8.tmp moved successfully.
C:\LOG25A.tmp moved successfully.
C:\LOG261.tmp moved successfully.
C:\LOG263.tmp moved successfully.
C:\LOG2D6.tmp moved successfully.
C:\LOG351.tmp moved successfully.
C:\LOG39A.tmp moved successfully.
C:\LOG3F3.tmp moved successfully.
C:\LOG421.tmp moved successfully.
C:\LOG423.tmp moved successfully.
C:\LOG4A1.tmp moved successfully.
C:\LOG4D6.tmp moved successfully.
C:\LOG526.tmp moved successfully.
C:\LOG552.tmp moved successfully.
C:\LOG59.tmp moved successfully.
C:\LOG5B5.tmp moved successfully.
C:\LOG5F.tmp moved successfully.
C:\LOG62C.tmp moved successfully.
C:\LOG67.tmp moved successfully.
C:\LOG6B5.tmp moved successfully.
C:\LOG70.tmp moved successfully.
C:\LOG70F.tmp moved successfully.
C:\LOG715.tmp moved successfully.
C:\LOG719.tmp moved successfully.
C:\LOG738.tmp moved successfully.
C:\LOG7F7.tmp moved successfully.
C:\LOG80.tmp moved successfully.
C:\LOG8AE.tmp moved successfully.
C:\LOG933.tmp moved successfully.
C:\LOG969.tmp moved successfully.
C:\LOG98C.tmp moved successfully.
C:\LOG9A0.tmp moved successfully.
C:\LOG9AC.tmp moved successfully.
C:\LOG9D2.tmp moved successfully.
C:\LOGA7.tmp moved successfully.
C:\LOGB0.tmp moved successfully.
C:\LOGB4.tmp moved successfully.
C:\LOGB8.tmp moved successfully.
C:\LOGBA.tmp moved successfully.
C:\LOGC1.tmp moved successfully.
C:\LOGCA6.tmp moved successfully.
C:\LOGCAC.tmp moved successfully.
C:\LOGCB5.tmp moved successfully.
C:\LOGCBD.tmp moved successfully.
C:\LOGCC4.tmp moved successfully.
C:\LOGCDE.tmp moved successfully.
C:\LOGCE1.tmp moved successfully.
C:\LOGCF.tmp moved successfully.
C:\LOGD8.tmp moved successfully.
C:\LOGDF2.tmp moved successfully.
C:\LOGE2D.tmp moved successfully.
C:\LOGE8.tmp moved successfully.
C:\LOGF2.tmp moved successfully.
C:\LOGFA.tmp moved successfully.
C:\LOGFB.tmp moved successfully.
c:\windows\system32\uactmp.db moved successfully.
c:\windows\system32\UACwrwfpgauklwcqrq.db moved successfully.
c:\windows\system32\UACnvgxvwxpsshvwed.dat moved successfully.
c:\windows\system32\drivers\UACbommavjqdxhqorb.sys moved successfully.
LoadLibrary failed for c:\windows\system32\UACmenqnauppuiqdon.dll
c:\windows\system32\UACmenqnauppuiqdon.dll NOT unregistered.
c:\windows\system32\UACmenqnauppuiqdon.dll moved successfully.
c:\windows\system32\dgMmlnnn.ini2 moved successfully.
c:\windows\system32\nqrCLkkj.ini2 moved successfully.
========== REGISTRY ==========
HKEY_LOCAL_MACHINE\system\currentcontrolset\control\lsa\\"Authentication Packages"|hex(7):6d,73,76,31,5f,30,00,00 /E : value set successfully!

OTMoveIt3 by OldTimer - Version 1.0.11.0 log created on 05152009_015252

descriptionSearch Engine Virus EmptyRe: Search Engine Virus

more_horiz
privacy_tip Permissions in this forum:
You cannot reply to topics in this forum