I've read about a few people having this problem, so i've already got the logs here as asked for in the other qiestions, I'm just not sure what to do next.
Rootrepel report:
ROOTREPEAL (c) AD, 2007-2008
==================================================
Scan Time: 2009/06/23 17:23
Program Version: Version 1.2.3.0
Windows Version: Windows Vista SP1
==================================================
Drivers
-------------------
Name: (
Image Path: (
Address: 0x8B655000 Size: 90112 File Visible: No
Status: Hidden from Windows API!
Name: 3&33fd14ca&0&28
Image Path: REV_03\3&33fd14ca&0&28
Address: 0x8B60D000 Size: 294912 File Visible: No
Status: Hidden from Windows API!
Name: dump_atapi.sys
Image Path: C:\Windows\System32\Drivers\dump_atapi.sys
Address: 0x8BF4D000 Size: 32768 File Visible: No
Status: -
Name: dump_dumpata.sys
Image Path: C:\Windows\System32\Drivers\dump_dumpata.sys
Address: 0x8BF42000 Size: 45056 File Visible: No
Status: -
Name: MSIVXrtpwcsfiwcsifustuxrqpomqjckeqbvs.sys
Image Path: C:\Windows\system32\drivers\MSIVXrtpwcsfiwcsifustuxrqpomqjckeqbvs.sys
Address: 0x8AAF2000 Size: 188416 File Visible: -
Status: Hidden from Windows API!
Name: rootrepeal.sys
Image Path: C:\Windows\system32\drivers\rootrepeal.sys
Address: 0xA7425000 Size: 45056 File Visible: No
Status: -
Stealth Objects
-------------------
Object: Hidden Module [Name: luafv.sys]
Process: svchost.exe (PID: 1196) Address: 0x00de0000 Size: 106496
Object: Hidden Module [Name: winlogon.exe]
Process: svchost.exe (PID: 1196) Address: 0x01ae0000 Size: 323584
Object: Hidden Module [Name: winlogon.exe]
Process: svchost.exe (PID: 1196) Address: 0x01ff0000 Size: 323584
Object: Hidden Module [Name: WinMgmtR.dll]
Process: svchost.exe (PID: 1196) Address: 0x71ad0000 Size: 8192
Object: Hidden Module [Name: wuaueng.dll]
Process: svchost.exe (PID: 1196) Address: 0x6e960000 Size: 1814528
Object: Hidden Module [Name: adtschema.dll]
Process: svchost.exe (PID: 1196) Address: 0x6c430000 Size: 606208
Object: Hidden Module [Name: ci.dll]
Process: svchost.exe (PID: 1196) Address: 0x32f10000 Size: 913408
Object: Hidden Module [Name: tquery.dll]
Process: svchost.exe (PID: 1196) Address: 0x71f20000 Size: 1589248
Object: Hidden Module [Name: dps.dll]
Process: svchost.exe (PID: 1196) Address: 0x72c80000 Size: 139264
Object: Hidden Module [Name: profsvc.dll]
Process: svchost.exe (PID: 1196) Address: 0x73dd0000 Size: 163840
Object: Hidden Module [Name: wevtapi.dll]
Process: svchost.exe (PID: 1196) Address: 0x75200000 Size: 258048
Object: Hidden Code [ETHREAD: 0x83853668]
Process: System Address: 0x86e69128 Size: -
Object: Hidden Code [ETHREAD: 0x8389c580]
Process: System Address: 0x8389c774 Size: -
Object: Hidden Code [ETHREAD: 0x8389c2d8]
Process: System Address: 0x8389c4cc Size: -
Object: Hidden Code [ETHREAD: 0x8389d020]
Process: System Address: 0x8389d214 Size: -
Object: Hidden Code [ETHREAD: 0x8389dd78]
Process: System Address: 0xa4a12c80 Size: -
Object: Hidden Code [ETHREAD: 0x8389dad0]
Process: System Address: 0x8d8634d0 Size: -
Object: Hidden Code [ETHREAD: 0x8389d580]
Process: System Address: 0x8389d774 Size: -
Object: Hidden Code [ETHREAD: 0x858aa840]
Process: System Address: 0x8d880b68 Size: -
Hidden Services
-------------------
Service Name: MSIVXserv.sys
Image Path: C:\Windows\system32\drivers\MSIVXrtpwcsfiwcsifustuxrqpomqjckeqbvs.sys
Gmer log:
GMER 1.0.15.14972 - http://www.gmer.net
Rootkit scan 2009-06-23 17:25:13
Windows 6.0.6001 Service Pack 1
---- System - GMER 1.0.15 ----
Code 857A4138 ZwEnumerateKey
Code 855AA3A0 ZwFlushInstructionCache
Code 8583A315 IofCallDriver
Code 852803BE IofCompleteRequest
---- Devices - GMER 1.0.15 ----
AttachedDevice \Driver\tdx \Device\Ip SYMTDI.SYS
AttachedDevice \Driver\tdx \Device\Tcp SYMTDI.SYS
AttachedDevice \Driver\tdx \Device\Udp SYMTDI.SYS
AttachedDevice \Driver\tdx \Device\RawIp SYMTDI.SYS
---- Services - GMER 1.0.15 ----
Service C:\Windows\system32\drivers\MSIVXrtpwcsfiwcsifustuxrqpomqjckeqbvs.sys (*** hidden *** ) [SYSTEM] MSIVXserv.sys <-- ROOTKIT !!!
---- EOF - GMER 1.0.15 ----
Hijack this log:
Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 5:33:24 PM, on 23/06/2009
Platform: Windows Vista SP1 (WinNT 6.00.1905)
MSIE: Internet Explorer v8.00 (8.00.6001.18702)
Boot mode: Normal
Running processes:
C:\Program Files\Norton 360\Engine\3.0.0.135\ccSvcHst.exe
C:\Windows\system32\taskeng.exe
C:\Windows\system32\Dwm.exe
C:\Windows\Explorer.EXE
C:\Windows\system32\wuauclt.exe
C:\Program Files\Yahoo!\Widgets\YahooWidgetEngine.exe
C:\Program Files\Yahoo!\Widgets\YahooWidgetEngine.exe
C:\Program Files\Windows Media Player\wmpnscfg.exe
C:\Program Files\VIRGIN BROADBAND\VIRGIN BROADBAND.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Windows\system32\SearchFilterHost.exe
C:\Program Files\Trend Micro\HijackThis\HijackThis.exe
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://en.au.acer.yahoo.com/
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://en.au.acer.yahoo.com
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://en.au.acer.yahoo.com
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant =
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,CustomizeSearch =
R1 - HKCU\Software\Microsoft\Internet Explorer\SearchURL,(Default) = http://au.rd.yahoo.com/customize/ycomp/defaults/su/*http://au.yahoo.com
R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName =
R3 - URLSearchHook: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - (no file)
O1 - Hosts: ::1 localhost
O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelper.dll
O2 - BHO: (no name) - {5C255C8A-E604-49b4-9D64-90988571CECB} - (no file)
O2 - BHO: Symantec NCO BHO - {602ADB0E-4AFF-4217-8AA1-95DAC4DFA408} - C:\Program Files\Norton 360\Engine\3.0.0.135\coIEPlg.dll
O2 - BHO: Symantec Intrusion Prevention - {6D53EC84-6AAE-4787-AEEE-F4628F01010C} - C:\Program Files\Norton 360\Engine\3.0.0.135\IPSBHO.DLL
O2 - BHO: ShowBarObj Class - {83A2F9B1-01A2-4AA5-87D1-45B6B8505E96} - C:\Windows\system32\ActiveToolBand.dll
O2 - BHO: Windows Live Sign-in Helper - {9030D464-4C02-4ABF-8ECC-5164760863C6} - C:\Program Files\Common Files\Microsoft Shared\Windows Live\WindowsLiveLogin.dll
O2 - BHO: Java(tm) Plug-In 2 SSV Helper - {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Program Files\Java\jre6\bin\jp2ssv.dll
O3 - Toolbar: Acer eDataSecurity Management - {5CBE3B7C-1E47-477e-A7DD-396DB0476E29} - C:\Windows\system32\eDStoolbar.dll
O3 - Toolbar: Norton Toolbar - {7FEBEFE3-6B19-4349-98D2-FFB09D4B49CA} - C:\Program Files\Norton 360\Engine\3.0.0.135\coIEPlg.dll
O4 - HKCU\..\Run: [Mobile Partner] "C:\Program Files\VIRGIN BROADBAND\VIRGIN BROADBAND.exe"
O4 - HKCU\..\Run: [SUPERAntiSpyware] C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
O4 - HKUS\S-1-5-19\..\Run: [Sidebar] %ProgramFiles%\Windows Sidebar\Sidebar.exe /detectMem (User 'LOCAL SERVICE')
O4 - HKUS\S-1-5-19\..\Run: [WindowsWelcomeCenter] rundll32.exe oobefldr.dll,ShowWelcomeCenter (User 'LOCAL SERVICE')
O4 - HKUS\S-1-5-20\..\Run: [Sidebar] %ProgramFiles%\Windows Sidebar\Sidebar.exe /detectMem (User 'NETWORK SERVICE')
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\Office10\EXCEL.EXE/3000
O9 - Extra button: @C:\Windows\WindowsMobile\INetRepl.dll,-222 - {2EAF5BB1-070F-11D3-9307-00C04FAE2D4F} - C:\Windows\WindowsMobile\INetRepl.dll
O9 - Extra button: (no name) - {2EAF5BB2-070F-11D3-9307-00C04FAE2D4F} - C:\Windows\WindowsMobile\INetRepl.dll
O9 - Extra 'Tools' menuitem: @C:\Windows\WindowsMobile\INetRepl.dll,-223 - {2EAF5BB2-070F-11D3-9307-00C04FAE2D4F} - C:\Windows\WindowsMobile\INetRepl.dll
O13 - Gopher Prefix:
O16 - DPF: {0CCA191D-13A6-4E29-B746-314DEE697D83} (Facebook Photo Uploader 5 Control) - http://upload.facebook.com/controls/2008.10.10_v5.5.8/FacebookPhotoUploader5.cab
O16 - DPF: {5C6698D9-7BE4-4122-8EC5-291D84DBD4A0} (Facebook Photo Uploader 4 Control) - http://upload.facebook.com/controls/FacebookPhotoUploader3.cab
O17 - HKLM\System\CCS\Services\Tcpip\..\{8FA550CD-ADF1-4DF1-B391-7E2FBC87A64F}: NameServer = 123.200.191.17 123.200.191.18
O18 - Protocol: symres - {AA1061FE-6C41-421F-9344-69640C9732AB} - C:\Program Files\Norton 360\Engine\3.0.0.135\coIEPlg.dll
O20 - Winlogon Notify: !SASWinLogon - C:\Program Files\SUPERAntiSpyware\SASWINLO.dll
O23 - Service: Symantec Lic NetConnect service (CLTNetCnService) - Unknown owner - c:\Program Files\Common Files\Symantec Shared\ccSvcHst.exe (file missing)
O23 - Service: Norton 360 (N360) - Symantec Corporation - C:\Program Files\Norton 360\Engine\3.0.0.135\ccSvcHst.exe
--
End of file - 5005 bytes
Also when trying to open internet explorer, i get a message about MSIVXmheihxdumqerxpxxwitkslempgbdtqqs.dll
I'm not sure if this is related to the msivx.....sys that shows up in the scans.
Help with what to do next will be much appreciated!