I have finally destroyed this virus/rootkit. what I did :
go to save mode !!
used Avast boot-scan
used combofix (did find an empty folder IEtoolbar, but i don’t think that one has to do anything with this)
used DrWeb latest scan (performed a full scan!! after it’s quick scan)
used MBAM (i still could download and update everything)
used Avira anti-rootkit
used Smitfraudfix (but it didn’t find anyting i guess)
DrWeb did remove the actual virus i guess, it was a file (not exact name, since i didn’t log it, i lost the exact name) named approximatly a000056… (don’t remember the extension, but in system restore it was detected by drWeb as .bat)
After all this I repeated that list once again in safe mode after restart except avast boot-scan.
As last step I did the parts avast-boot-scan/MBAM/DRWEB/AVira-antiRootkit again, this time in windows normal mode (although both normal and safe mode didn’t find anything anymore (except for a false positive on combofix and smitfraudfix, which I also removed on the first repeat).
I also had something noone mentioned before here: i could download and update unlike some other victims, but my computer couldn’t make use of usb-sticks anymore, neither did my card-reader work anymore or any camera i attached, only one usb-connected storage device did work, a lacie external hard drive, the fault that came up while trying to connect an usb-stick, in the logbook, was LDMS (Logical Disk Management Service could not start), the virus must have done that, since it appeared after the first restart after the virus got on the computer.
here is a part of the log, just after the virus got on the computer (i don’t know but it looks like it did try to download other viruses/malware?)
(found in warnings.log)
18/04/2009 1:22:13 1240010533 Gunther 1904 Sign of “Win32:Piptea [trj]” has been found in “C:\Documents and Settings\Gunther\Local Settings\Temporary Internet Files\Content.IE5\SI41YKJK\20090411074831[1].exe[UPX]” file.
18/04/2009 1:23:50 1240010630 Gunther 1904 Sign of “Win32:Piptea [trj]” has been found in “C:\WINDOWS\rvvv64624.exe[UPX]” file.
18/04/2009 1:28:06 1240010886 Gunther 2740 Sign of “Win32:Piptea [trj]” has been found in “C:\Documents and Settings\Gunther\Local Settings\Temporary Internet Files\Content.IE5\SI41YKJK\20090411074831[1].exe[UPX]” file.
18/04/2009 1:28:59 1240010939 Gunther 2740 Sign of “Win32:WalDrop [Drp]” has been found in “C:\Documents and Settings\Gunther\Local Settings\Temporary Internet Files\Content.IE5\SI41YKJK\20090417083429[1].exe” file.
The sites it blocked are:
(found in nshield.log)
18.04.2009 01:24:20 Network Shield: blocked access to malicious site hxviewworldmy1.com/download/1/20099/0 [ C:\WINDOWS\system32\svchost.exe ( 1224 ) ]
18.04.2009 01:39:05 Network Shield: blocked access to malicious site catch-you.ru/files/winsetup66.exe [ C:\WINDOWS\system32\svchost.exe ( 944 ) ]
18.04.2009 01:39:06 Network Shield: blocked access to malicious site catch-you.ru/files/ftp_non_crp.exe [ C:\WINDOWS\system32\svchost.exe ( 944 ) ]
18.04.2009 02:24:14 Network Shield: blocked access to malicious site catch-you.ru/files/winsetup66.exe [ PID 1756 ( 1756 ) ]
21.04.2009 14:55:45 Network Shield: blocked access to malicious site easyfriskdisease.cn/?wm=70000 [ C:\WINDOWS\system32\svchost.exe ( 1152 ) ]
24.04.2009 10:00:03 Network Shield: blocked access to malicious site f1.catch-you.ru/winglsetup.exe [ C:\WINDOWS\system32\svchost.exe ( 944 ) ]
24.04.2009 10:00:48 Network Shield: blocked access to malicious site f1.catch-you.ru/ftp_non_crp.exe [ C:\WINDOWS\system32\svchost.exe ( 944 ) ]
25.04.2009 12:50:01 Network Shield: blocked access to malicious site directitfast.com/seneka/engine/engine.php?d=NjoiCDE9Z2lta2xnVVZaW1FIV1VZXV5fXF5dVl1AQUNHQ0JETklCVkROR0qys7OysaPn4e7g7ra/vb27paa04OH3//OloKu9/uj388Scy8DSlJWXnJmTm52LwdyNhJyClIeAh4iZ6euPk46ZrKCspPmrquqqrOypvqK5vLWj77qxraa7t6u/9bmlu/mOgI+G2Y2Jio3Emog= [ C:\WINDOWS\system32\svchost.exe ( 968 ) ]
28.04.2009 00:09:30 Network Shield: blocked access to malicious site 82.98.193.102 [ C:\Program Files\Internet Explorer\iexplore.exe ( 5536 ) ]
Hope this might help some of you or the programmers.
regards