Page 1 of 2 12 LastLast
Results 1 to 10 of 17

Thread: Same Problem as Everyone Else

  1. #1
    Junior Member
    Join Date
    Jan 2009
    Posts
    9

    Default Same Problem as Everyone Else

    I spent all weekend using spybot, norton av, and hijack this, but still seem to have similar problems to others in the forum.

    common culprits are virtumonde, fakealert, and smitfraud. other symptoms are that the windows security center is weird and i cannot update windows manually/some kind of update is disabled and will not enable.

    Can someone please help?
    __________

    I made another copy of hijack this and called it DonOne.exe. The log is below. Thank you in advance for helping.

    P.S. Shouldn't my av program that I bought with money be doing all this work?


    Logfile of HijackThis v1.98.2
    Scan saved at 9:25:51 AM, on 1/20/2009
    Platform: Windows XP SP2 (WinNT 5.01.2600)
    MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)

    Running processes:
    C:\WINDOWS\System32\smss.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\services.exe
    C:\WINDOWS\system32\lsass.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\Explorer.EXE
    C:\Program Files\Common Files\Symantec Shared\ccSvcHst.exe
    C:\WINDOWS\system32\spoolsv.exe
    C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
    C:\Program Files\Symantec\LiveUpdate\ALUSchedulerSvc.exe
    C:\Program Files\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE
    C:\WINDOWS\system32\svchost.exe
    C:\Program Files\Common Files\Real\Update_OB\realsched.exe
    C:\Program Files\Common Files\Symantec Shared\ccApp.exe
    C:\Program Files\Common Files\InstallShield\UpdateService\ISUSPM.exe
    C:\WINDOWS\system32\ctfmon.exe
    C:\Program Files\Internet Explorer\iexplore.exe
    C:\WINDOWS\system32\rundll32.exe
    C:\Program Files\Internet Explorer\iexplore.exe
    C:\Documents and Settings\Compaq_Owner\Desktop\Don\DonOne.exe

    O2 - BHO: (no name) - {1E8A6170-7264-4D0F-BEAE-D42A53123C75} - C:\Program Files\Common Files\Symantec Shared\coShared\Browser\1.5\NppBho.dll
    O2 - BHO: Spybot-S&D IE Protection - {53707962-6F74-2D53-2644-206D7942484F} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
    O2 - BHO: (no name) - {6D794CB4-C7CD-4c6f-BFDC-9B77AFBDC02C} - (no file)
    O2 - BHO: (no name) - {8E90150B-196E-41AF-8777-7CFDD48C06DB} - C:\WINDOWS\system32\fccbCvsq.dll
    O2 - BHO: (no name) - {DF2FCAC1-36B0-4CF9-AB66-BFB773D25A4E} - (no file)
    O2 - BHO: (no name) - {F691A71D-E7B6-4583-8BB9-4E7A1BD044FB} - (no file)
    O3 - Toolbar: Show Norton Toolbar - {90222687-F593-4738-B738-FBEE9C7B26DF} - C:\Program Files\Common Files\Symantec Shared\coShared\Browser\1.5\UIBHO.dll
    O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Common Files\Real\Update_OB\realsched.exe" -osboot
    O4 - HKLM\..\Run: [AlcxMonitor] ALCXMNTR.EXE
    O4 - HKLM\..\Run: [ccApp] "C:\Program Files\Common Files\Symantec Shared\ccApp.exe"
    O4 - HKLM\..\Run: [Symantec PIF AlertEng] "C:\Program Files\Common Files\Symantec Shared\PIF\{B8E1DD85-8582-4c61-B58F-2F227FCA9A08}\PIFSvc.exe" /a /m "C:\Program Files\Common Files\Symantec Shared\PIF\{B8E1DD85-8582-4c61-B58F-2F227FCA9A08}\AlertEng.dll"
    O4 - HKCU\..\Run: [ISUSPM] "C:\Program Files\Common Files\InstallShield\UpdateService\ISUSPM.exe" -scheduler
    O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
    O4 - HKCU\..\Run: [SpybotSD TeaTimer] C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
    O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office10\OSA.EXE
    O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MI1933~1\Office10\EXCEL.EXE/3000
    O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0\bin\npjpi150.dll
    O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0\bin\npjpi150.dll
    O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MI1933~1\OFFICE11\REFIEBAR.DLL
    O9 - Extra button: (no name) - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
    O9 - Extra 'Tools' menuitem: Spybot - Search & Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
    O10 - Unknown file in Winsock LSP: c:\program files\bonjour\mdnsnsp.dll
    O16 - DPF: {5ED80217-570B-4DA9-BF44-BE107C0EC166} (Windows Live Safety Center Base Module) - http://cdn.scan.onecare.live.com/res...scbase6662.cab
    O16 - DPF: {6A344D34-5231-452A-8A57-D064AC9B7862} (Symantec Download Manager) - https://webdl.symantec.com/activex/symdlmgr.cab
    O16 - DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} (MUWebControl Class) - http://update.microsoft.com/microsof...?1232291276484
    O20 - AppInit_DLLs: wdcdlj.dll
    O21 - SSODL: WPDShServiceObj - {AAA288BA-9A4C-45B0-95D7-94D524869DB5} - C:\WINDOWS\system32\WPDShServiceObj.dll

  2. #2
    Emeritus- Security Expert peku006's Avatar
    Join Date
    Feb 2007
    Location
    Norway
    Posts
    3,103

    Default

    Hello and welcome to Safer Networking.

    My name is peku006 and I will be helping you to remove any infection(s) that you may have.
    I will be giving you a series of instructions that need to be followed in the order in which I give them to you.

    Please observe these rules while we work:
    • If you don't know, stop and ask! Don't keep going on.
    • Please reply to this thread. Do not start a new topic.
    • Please continue to respond until I give you the "All Clear"


    If you follow these instructions, everything should go smoothly.

    Update HiJackThis

    Your version of HiJackThis is outdated. You'll have to download and install the latest version, and give me a new log.
    • Download HJTInstall.exe to your desktop.
    • Doubleclick HJTInstall.exe to install HijackThis.
    • By default it will install to C:\Program Files\Trend Micro\HijackThis .
    • Click on Install.
    • It will create a HijackThis icon on the desktop.
    • Once installed, it will launch Hijackthis.
    • Click on the Do a system scan and save a logfile button. It will scan and the log should open in Notepad. Include this log in your next reply.
    • You can delete the old version of HJT, located here:
      C:\Documents and Settings\Compaq_Owner\Desktop\Don\DonOne.exe


    Thanks peku006
    I don't help with logs thru PM. If you have problems create a thread in the forum, please.

  3. #3
    Junior Member
    Join Date
    Jan 2009
    Posts
    9

    Default

    Thank you peku006 for the help.

    New hijackthis was installed. Log file is below.

    Don

    ----------------------------------

    Logfile of Trend Micro HijackThis v2.0.2
    Scan saved at 6:50:26 PM, on 1/24/2009
    Platform: Windows XP SP2 (WinNT 5.01.2600)
    MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)
    Boot mode: Normal

    Running processes:
    C:\WINDOWS\System32\smss.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\services.exe
    C:\WINDOWS\system32\lsass.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\system32\svchost.exe
    C:\Program Files\Common Files\Symantec Shared\ccSvcHst.exe
    C:\WINDOWS\Explorer.EXE
    C:\WINDOWS\system32\spoolsv.exe
    C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
    C:\Program Files\Symantec\LiveUpdate\ALUSchedulerSvc.exe
    C:\Program Files\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE
    C:\WINDOWS\system32\svchost.exe
    C:\Program Files\Common Files\Real\Update_OB\realsched.exe
    C:\WINDOWS\system32\wscntfy.exe
    C:\Program Files\Common Files\Symantec Shared\ccApp.exe
    C:\Program Files\Common Files\InstallShield\UpdateService\ISUSPM.exe
    C:\WINDOWS\system32\ctfmon.exe
    C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
    C:\Program Files\Common Files\Symantec Shared\CCPD-LC\symlcsvc.exe
    C:\Program Files\Internet Explorer\iexplore.exe
    C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

    R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = about:blank
    O3 - Toolbar: Show Norton Toolbar - {90222687-F593-4738-B738-FBEE9C7B26DF} - C:\Program Files\Common Files\Symantec Shared\coShared\Browser\1.5\UIBHO.dll
    O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Common Files\Real\Update_OB\realsched.exe" -osboot
    O4 - HKLM\..\Run: [AlcxMonitor] ALCXMNTR.EXE
    O4 - HKLM\..\Run: [ccApp] "C:\Program Files\Common Files\Symantec Shared\ccApp.exe"
    O4 - HKLM\..\Run: [Symantec PIF AlertEng] "C:\Program Files\Common Files\Symantec Shared\PIF\{B8E1DD85-8582-4c61-B58F-2F227FCA9A08}\PIFSvc.exe" /a /m "C:\Program Files\Common Files\Symantec Shared\PIF\{B8E1DD85-8582-4c61-B58F-2F227FCA9A08}\AlertEng.dll"
    O4 - HKCU\..\Run: [ISUSPM] "C:\Program Files\Common Files\InstallShield\UpdateService\ISUSPM.exe" -scheduler
    O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
    O4 - HKCU\..\Run: [SpybotSD TeaTimer] C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
    O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office10\OSA.EXE
    O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MI1933~1\Office10\EXCEL.EXE/3000
    O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0\bin\npjpi150.dll
    O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0\bin\npjpi150.dll
    O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MI1933~1\OFFICE11\REFIEBAR.DLL
    O9 - Extra button: (no name) - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
    O9 - Extra 'Tools' menuitem: Spybot - Search & Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
    O16 - DPF: {5ED80217-570B-4DA9-BF44-BE107C0EC166} (Windows Live Safety Center Base Module) - http://cdn.scan.onecare.live.com/res...scbase6662.cab
    O16 - DPF: {6A344D34-5231-452A-8A57-D064AC9B7862} (Symantec Download Manager) - https://webdl.symantec.com/activex/symdlmgr.cab
    O16 - DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} (MUWebControl Class) - http://update.microsoft.com/microsof...?1232291276484
    O23 - Service: Apple Mobile Device - Apple Inc. - C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
    O23 - Service: Automatic LiveUpdate Scheduler - Symantec Corporation - C:\Program Files\Symantec\LiveUpdate\ALUSchedulerSvc.exe
    O23 - Service: Symantec Event Manager (ccEvtMgr) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccSvcHst.exe
    O23 - Service: Symantec Settings Manager (ccSetMgr) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccSvcHst.exe
    O23 - Service: Symantec Lic NetConnect service (CLTNetCnService) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccSvcHst.exe
    O23 - Service: COM Host (comHost) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\VAScanner\comHost.exe
    O23 - Service: iPod Service - Apple Inc. - C:\Program Files\iPod\bin\iPodService.exe
    O23 - Service: LiveUpdate - Symantec Corporation - C:\PROGRA~1\Symantec\LIVEUP~1\LUCOMS~1.EXE
    O23 - Service: LiveUpdate Notice Service Ex (LiveUpdate Notice Ex) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccSvcHst.exe
    O23 - Service: LiveUpdate Notice Service - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\PIF\{B8E1DD85-8582-4c61-B58F-2F227FCA9A08}\PIFSvc.exe
    O23 - Service: Pml Driver HPZ12 - HP - C:\WINDOWS\system32\HPZipm12.exe
    O23 - Service: Symantec Core LC - Unknown owner - C:\Program Files\Common Files\Symantec Shared\CCPD-LC\symlcsvc.exe

    --
    End of file - 5136 bytes

  4. #4
    Emeritus- Security Expert peku006's Avatar
    Join Date
    Feb 2007
    Location
    Norway
    Posts
    3,103

    Default

    Hi Don

    1- Rename Hijackthis

    Rename HijackThis.exe to Don.exe by doing the following;

    • Navigate here using Windows Explorer (windows button + E) or My Computer -> Local Disk C: -> C:\Program Files\Trend Micro\HijackThis
    • Right-click on the HijackThis.exe
    • Choose from the pull-down menu; "Rename"
    • And now Rename HijackThis.exe to Don.exe
    • Now right click on the renamed hijackthis and click Send to... and then Desktop (create shortcut)...
    • Now go to your desktop and delete the old shortcut called "Hijackthis" Make sure you keep the one called Don.exe
    • Now Exit HijackThis


    2 - Scan With ComboFix

    We will begin with ComboFix.exe. Please visit this webpage for download links, and instructions for running the tool:

    http://www.bleepingcomputer.com/comb...o-use-combofix

    * Ensure you have disabled all anti virus and anti malware programs so they do not interfere with the running of ComboFix.

    How to Temporarily Disable Anti-virus

    Please include the C:\ComboFix.txt in your next reply for further review.

    3 - Run Hijackthis
    Click on the Do a system scan and save a logfile button. It will scan and the log should open in notepad

    4 - Status Check
    Please reply with


    1. the ComboFix log(C:\ComboFix.txt)
    2. a fresh HijackThis log

    Thanks peku006
    I don't help with logs thru PM. If you have problems create a thread in the forum, please.

  5. #5
    Junior Member
    Join Date
    Jan 2009
    Posts
    9

    Default

    Hi peku006,

    Thanks again for the continued help here. Things went okay but not 100% smoothly. I will detail problems encountered at each section below and include the ComboFix log at the end of the post. I apologize if the actions that I undertook were inconsistent with instructions.

    The HijackThis log will be in a subsequent post.


    Thanks,
    Don

    ____________

    1. This was straightforward and no problems were encountered.

    2. Instructions were followed but non-standard events ocurred. Due to these events, non-standard responses ocurred. It is unclear if these responses have invalidated the procedure.

    a. Norton 360 (similar to av and internet security) was disabled as instructed. Disabling procedure was similar to Norton Internet Security but not exactly. The most essential piece of the disable was that features were disabled for a 5-hour period.

    b. Spybot was initially attempted to be disabled by right-clicking the system tray icon and choosing the exit option. However, spybot was freezing and so teatimer.exe was eventually killed explicitly from Task Manager. Suspected problem is that virus is constantly trying to add to registry while spybot is constantly (via remembered decision) denying the changes.

    3. Combofix ran fairly smoothly. Documentation on website was out-of-date because it states 41 stages as opposed to the 50-some-odd stages. No consequential difference was there. The program removed several dlls several of which I had been suspecting of being components of viruses previously.

    After the reboot that ComboFix does, there was a complication. SpyBot began bringing up windows to allow/deny registry and other changes. My instructions were not to make any changes but apparently something was making changes on its own that I had to either accept or deny. Therefore, I denied some of the changes which were suspicious, especially those which seemed to be Windows api-related (like redir.dll). There were approximately 30 such windows that came up.

    Finally the startup completed and the ComboFix log came up which is below.

    __________

    ComboFix 09-01-21.04 - Compaq_Owner 2009-01-25 9:19:34.1 - NTFSx86
    Microsoft Windows XP Home Edition 5.1.2600.2.1252.1.1033.18.895.546 [GMT -5:00]
    Running from: c:\documents and settings\Compaq_Owner\Desktop\ComboFix.exe
    AV: Norton 360 *On-access scanning disabled* (Outdated)
    FW: Norton 360 *disabled*
    * Created a new restore point
    .

    ((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
    .

    c:\windows\IE4 Error Log.txt
    c:\windows\system32\euttbv.dll
    c:\windows\system32\fccbCvsq.dll
    c:\windows\system32\helsbuad.dll
    c:\windows\system32\qsvCbccf.ini
    c:\windows\system32\qsvCbccf.ini2
    c:\windows\system32\rivtxrkd.dll
    c:\windows\system32\rjqwxndg.dll
    c:\windows\system32\wpv191232083449.cpx
    c:\windows\system32\yaokolov.ini
    c:\windows\wiaserviv.log
    D:\Autorun.inf

    .
    ((((((((((((((((((((((((( Files Created from 2008-12-25 to 2009-01-25 )))))))))))))))))))))))))))))))
    .

    2009-01-24 18:49 . 2009-01-24 18:49 <DIR> d-------- c:\program files\Trend Micro
    2009-01-23 08:18 . 2009-01-23 08:18 95 --a------ c:\windows\wininit.ini
    2009-01-22 21:44 . 2009-01-22 21:44 26,624 --a------ c:\windows\system32\drivers\fsbts.sys
    2009-01-18 13:54 . 2009-01-18 14:22 <DIR> d-------- c:\program files\Spybot - Search & Destroy
    2009-01-18 13:54 . 2009-01-18 17:52 <DIR> d-------- c:\documents and settings\All Users\Application Data\Spybot - Search & Destroy
    2009-01-18 10:16 . 2009-01-18 10:19 <DIR> d-------- c:\program files\Windows Live Safety Center
    2009-01-10 19:54 . 2009-01-10 19:55 <DIR> d-------- c:\program files\FinePixViewerS
    2009-01-10 19:54 . 2009-01-10 19:59 <DIR> d-------- c:\documents and settings\Compaq_Owner\Application Data\FUJIFILM
    2009-01-02 16:57 . 2009-01-02 17:00 <DIR> d-------- c:\program files\U.B. Funkeys
    2009-01-02 16:57 . 2009-01-02 16:57 186,592 --a------ c:\windows\system32\drivers\windrvr6.sys
    2008-12-25 15:29 . 2004-08-04 00:56 159,232 --a------ c:\windows\system32\ptpusd.dll
    2008-12-25 15:29 . 2004-08-03 22:58 15,104 --a------ c:\windows\system32\drivers\usbscan.sys
    2008-12-25 15:29 . 2004-08-03 22:58 15,104 --a------ c:\windows\system32\dllcache\usbscan.sys
    2008-12-25 15:29 . 2001-08-17 22:36 5,632 --a------ c:\windows\system32\ptpusb.dll
    2008-12-25 08:17 . 2008-12-25 08:17 <DIR> d-------- c:\program files\Bonjour
    2008-12-25 08:15 . 2008-12-25 08:16 <DIR> d-------- c:\program files\iTunes
    2008-12-25 08:15 . 2008-12-25 08:15 <DIR> d-------- c:\program files\iPod
    2008-12-25 08:15 . 2008-12-25 08:16 <DIR> d-------- c:\documents and settings\All Users\Application Data\{3276BE95_AF08_429F_A64F_CA64CB79BCF6}

    .
    (((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
    .
    2009-01-25 14:27 --------- d-----w c:\program files\Common Files\Symantec Shared
    2009-01-25 14:05 --------- d-----w c:\documents and settings\All Users\Application Data\Symantec
    2009-01-20 21:17 --------- d-----w c:\program files\World of Warcraft
    2009-01-18 02:18 --------- d-----w c:\program files\Norton 360
    2009-01-18 00:44 806 ----a-w c:\windows\system32\drivers\SYMEVENT.INF
    2009-01-18 00:44 124,464 ----a-w c:\windows\system32\drivers\SYMEVENT.SYS
    2009-01-18 00:44 10,635 ----a-w c:\windows\system32\drivers\SYMEVENT.CAT
    2009-01-18 00:44 --------- d-----w c:\program files\Symantec
    2009-01-15 02:56 --------- d-----w c:\documents and settings\Compaq_Owner\Application Data\U3
    2009-01-11 00:54 --------- d--h--w c:\program files\InstallShield Installation Information
    2008-12-31 16:20 --------- d-----w c:\documents and settings\Compaq_Owner\Application Data\Juniper Networks
    2008-12-25 17:39 --------- d-----w c:\documents and settings\Compaq_Owner\Application Data\Apple Computer
    2008-12-25 13:26 --------- d-----w c:\program files\Apple Software Update
    2008-12-25 13:15 --------- d-----w c:\program files\Common Files\Apple
    2008-12-25 13:14 --------- d-----w c:\program files\QuickTime
    2008-12-23 19:26 5,988 ----a-w c:\documents and settings\Compaq_Owner\Application Data\wklnhst.dat
    2008-12-11 11:57 333,184 ----a-w c:\windows\system32\drivers\srv.sys
    2007-11-11 12:01 45,248 ----a-w c:\documents and settings\Compaq_Owner\Application Data\GDIPFONTCACHEV1.DAT
    .

    ((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
    .
    .
    *Note* empty entries & legit default entries are not shown
    REGEDIT4

    [HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
    "ISUSPM"="c:\program files\Common Files\InstallShield\UpdateService\ISUSPM.exe" [2006-09-11 218032]
    "ctfmon.exe"="c:\windows\system32\ctfmon.exe" [2004-08-03 15360]
    "SpybotSD TeaTimer"="c:\program files\Spybot - Search & Destroy\TeaTimer.exe" [2008-09-16 1833296]

    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
    "TkBellExe"="c:\program files\Common Files\Real\Update_OB\realsched.exe" [2006-08-02 180269]
    "ccApp"="c:\program files\Common Files\Symantec Shared\ccApp.exe" [2007-01-10 115816]
    "Symantec PIF AlertEng"="c:\program files\Common Files\Symantec Shared\PIF\{B8E1DD85-8582-4c61-B58F-2F227FCA9A08}\PIFSvc.exe" [2008-01-29 583048]

    c:\documents and settings\All Users\Start Menu\Programs\Startup\
    Microsoft Office.lnk - c:\program files\Microsoft Office\Office10\OSA.EXE [2001-02-13 83360]

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\UserFaultCheck]
    c:\windows\system32\dumprep 0 -u [X]

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\SiSPower]
    --a------ 2005-01-04 18:54 49152 c:\windows\system32\SiSPower.dll

    [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\services]
    "xmlprov"=3 (0x3)
    "wscsvc"=2 (0x2)
    "Viewpoint Manager Service"=2 (0x2)
    "iPod Service"=3 (0x3)
    "IDriverT"=3 (0x3)
    "gusvc"=3 (0x3)
    "Bonjour Service"=2 (0x2)

    [HKEY_LOCAL_MACHINE\software\microsoft\security center]
    "AntiVirusDisableNotify"=dword:00000001

    [HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring]
    "DisableMonitoring"=dword:00000001

    [HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecAntiVirus]
    "DisableMonitoring"=dword:00000001

    [HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecFirewall]
    "DisableMonitoring"=dword:00000001

    [HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]
    "EnableFirewall"= 0 (0x0)

    [HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
    "%windir%\\system32\\sessmgr.exe"=
    "c:\\Program Files\\Yahoo!\\Messenger\\YahooMessenger.exe"=
    "c:\\Program Files\\Yahoo!\\Messenger\\YServer.exe"=
    "c:\\Program Files\\Common Files\\AOL\\Loader\\aolload.exe"=
    "c:\\Program Files\\Bonjour\\mDNSResponder.exe"=
    "c:\\Program Files\\iTunes\\iTunes.exe"=

    R0 fsbts;fsbts;c:\windows\system32\drivers\fsbts.sys [2009-01-22 26624]
    R3 EraserUtilRebootDrv;EraserUtilRebootDrv;c:\program files\Common Files\Symantec Shared\EENGINE\EraserUtilRebootDrv.sys [2008-09-05 99376]
    S3 F-Secure Standalone Minifilter;F-Secure Standalone Minifilter;\??\c:\documents and settings\Compaq_Owner\Local Settings\Temp\{FC621529-FD3E-465D-8F62-902AC5C4F67A}\fsgk.sys --> c:\documents and settings\Compaq_Owner\Local Settings\Temp\{FC621529-FD3E-465D-8F62-902AC5C4F67A}\fsgk.sys [?]
    S4 Viewpoint Manager Service;Viewpoint Manager Service;c:\program files\Viewpoint\Common\ViewpointService.exe [2007-11-22 24652]

    --- Other Services/Drivers In Memory ---

    *NewlyCreated* - COMHOST

    [HKEY_CURRENT_USER\software\microsoft\windows\currentversion\explorer\mountpoints2\{2c9f5c80-7ff2-11dd-a15a-0013d40bfa4c}]
    \Shell\AutoRun\command - F:\LaunchU3.exe -a

    [HKEY_CURRENT_USER\software\microsoft\windows\currentversion\explorer\mountpoints2\{f9b408d0-bc63-11d9-842c-806d6172696f}]
    \Shell\AutoRun\command - c:\windows\system32\RunDLL32.EXE Shell32.DLL,ShellExec_RunDLL Info.exe protect.ed 480 480
    .
    Contents of the 'Scheduled Tasks' folder

    2009-01-19 c:\windows\Tasks\AppleSoftwareUpdate.job
    - c:\program files\Apple Software Update\SoftwareUpdate.exe [2008-07-30 12:34]
    .
    - - - - ORPHANS REMOVED - - - -

    BHO-{8F693F65-7FDE-4B61-9A94-BD0C92869669} - c:\windows\system32\fccbCvsq.dll
    HKLM-Run-AlcxMonitor - ALCXMNTR.EXE
    ShellExecuteHooks-{FA010552-4A27-4cb1-A1BB-3E2D697F1639} - (no file)
    Notify-opnlKBsT - (no file)


    .
    ------- Supplementary Scan -------
    .
    uStart Page = hxxp://www.google.com/
    mStart Page = about:blank
    mDefault_Search_URL = hxxp://www.google.com/ie
    uSearchURL,(Default) = hxxp://www.google.com/search?q=%s
    mSearchAssistant = hxxp://www.google.com/ie
    IE: E&xport to Microsoft Excel - c:\progra~1\MI1933~1\Office10\EXCEL.EXE/3000
    Trusted Zone: musicmatch.com\online
    .

    **************************************************************************

    catchme 0.3.1367 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
    Rootkit scan 2009-01-25 09:26:47
    Windows 5.1.2600 Service Pack 2 NTFS

    scanning hidden processes ...

    scanning hidden autostart entries ...

    scanning hidden files ...

    scan completed successfully
    hidden files: 0

    **************************************************************************
    .
    ------------------------ Other Running Processes ------------------------
    .
    c:\program files\Common Files\Symantec Shared\ccSvcHst.exe
    c:\program files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
    c:\program files\Symantec\LiveUpdate\AluSchedulerSvc.exe
    c:\program files\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE
    c:\progra~1\Symantec\LIVEUP~1\LUCOMS~1.EXE
    c:\program files\Symantec\LiveUpdate\AUPDATE.EXE
    c:\program files\Symantec\LiveUpdate\LuCallbackProxy.exe
    c:\program files\Symantec\LiveUpdate\LuCallbackProxy.exe
    c:\program files\Symantec\LiveUpdate\LuCallbackProxy.exe
    c:\program files\Symantec\LiveUpdate\LuCallbackProxy.exe
    c:\program files\Symantec\LiveUpdate\LuCallbackProxy.exe
    c:\program files\Symantec\LiveUpdate\LuCallbackProxy.exe
    c:\program files\Symantec\LiveUpdate\LuCallbackProxy.exe
    c:\program files\Symantec\LiveUpdate\LuCallbackProxy.exe
    c:\program files\Symantec\LiveUpdate\LuCallbackProxy.exe
    c:\program files\Symantec\LiveUpdate\LuCallbackProxy.exe
    .
    **************************************************************************
    .
    Completion time: 2009-01-25 9:36:11 - machine was rebooted
    ComboFix-quarantined-files.txt 2009-01-25 14:36:07

    Pre-Run: 86,388,346,880 bytes free
    Post-Run: 86,336,475,136 bytes free

    175 --- E O F --- 2009-01-15 08:02:52

  6. #6
    Junior Member
    Join Date
    Jan 2009
    Posts
    9

    Default

    Hijack This log is below. Thank you.

    _____________

    Logfile of Trend Micro HijackThis v2.0.2
    Scan saved at 10:14:15 AM, on 1/25/2009
    Platform: Windows XP SP2 (WinNT 5.01.2600)
    MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)
    Boot mode: Normal

    Running processes:
    C:\WINDOWS\System32\smss.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\services.exe
    C:\WINDOWS\system32\lsass.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\system32\svchost.exe
    C:\Program Files\Common Files\Symantec Shared\ccSvcHst.exe
    C:\WINDOWS\system32\spoolsv.exe
    C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
    C:\Program Files\Symantec\LiveUpdate\ALUSchedulerSvc.exe
    C:\Program Files\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE
    C:\WINDOWS\system32\svchost.exe
    C:\Program Files\Common Files\Real\Update_OB\realsched.exe
    C:\Program Files\Common Files\Symantec Shared\ccApp.exe
    C:\Program Files\Common Files\InstallShield\UpdateService\ISUSPM.exe
    C:\WINDOWS\system32\ctfmon.exe
    C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
    C:\WINDOWS\system32\wuauclt.exe
    C:\WINDOWS\explorer.exe
    C:\Program Files\Internet Explorer\IEXPLORE.EXE
    C:\Program Files\Trend Micro\HijackThis\Don.exe

    R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = about:blank
    O2 - BHO: (no name) - {1E8A6170-7264-4D0F-BEAE-D42A53123C75} - C:\Program Files\Common Files\Symantec Shared\coShared\Browser\1.5\NppBho.dll
    O2 - BHO: Spybot-S&D IE Protection - {53707962-6F74-2D53-2644-206D7942484F} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
    O3 - Toolbar: Show Norton Toolbar - {90222687-F593-4738-B738-FBEE9C7B26DF} - C:\Program Files\Common Files\Symantec Shared\coShared\Browser\1.5\UIBHO.dll
    O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Common Files\Real\Update_OB\realsched.exe" -osboot
    O4 - HKLM\..\Run: [ccApp] "C:\Program Files\Common Files\Symantec Shared\ccApp.exe"
    O4 - HKLM\..\Run: [Symantec PIF AlertEng] "C:\Program Files\Common Files\Symantec Shared\PIF\{B8E1DD85-8582-4c61-B58F-2F227FCA9A08}\PIFSvc.exe" /a /m "C:\Program Files\Common Files\Symantec Shared\PIF\{B8E1DD85-8582-4c61-B58F-2F227FCA9A08}\AlertEng.dll"
    O4 - HKCU\..\Run: [ISUSPM] "C:\Program Files\Common Files\InstallShield\UpdateService\ISUSPM.exe" -scheduler
    O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
    O4 - HKCU\..\Run: [SpybotSD TeaTimer] C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
    O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office10\OSA.EXE
    O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MI1933~1\Office10\EXCEL.EXE/3000
    O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0\bin\npjpi150.dll
    O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0\bin\npjpi150.dll
    O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MI1933~1\OFFICE11\REFIEBAR.DLL
    O9 - Extra button: (no name) - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
    O9 - Extra 'Tools' menuitem: Spybot - Search & Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
    O16 - DPF: {5ED80217-570B-4DA9-BF44-BE107C0EC166} (Windows Live Safety Center Base Module) - http://cdn.scan.onecare.live.com/res...scbase6662.cab
    O16 - DPF: {6A344D34-5231-452A-8A57-D064AC9B7862} (Symantec Download Manager) - https://webdl.symantec.com/activex/symdlmgr.cab
    O16 - DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} (MUWebControl Class) - http://update.microsoft.com/microsof...?1232291276484
    O23 - Service: Apple Mobile Device - Apple Inc. - C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
    O23 - Service: Automatic LiveUpdate Scheduler - Symantec Corporation - C:\Program Files\Symantec\LiveUpdate\ALUSchedulerSvc.exe
    O23 - Service: Symantec Event Manager (ccEvtMgr) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccSvcHst.exe
    O23 - Service: Symantec Settings Manager (ccSetMgr) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccSvcHst.exe
    O23 - Service: Symantec Lic NetConnect service (CLTNetCnService) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccSvcHst.exe
    O23 - Service: COM Host (comHost) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\VAScanner\comHost.exe
    O23 - Service: iPod Service - Apple Inc. - C:\Program Files\iPod\bin\iPodService.exe
    O23 - Service: LiveUpdate - Symantec Corporation - C:\PROGRA~1\Symantec\LIVEUP~1\LUCOMS~1.EXE
    O23 - Service: LiveUpdate Notice Service Ex (LiveUpdate Notice Ex) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccSvcHst.exe
    O23 - Service: LiveUpdate Notice Service - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\PIF\{B8E1DD85-8582-4c61-B58F-2F227FCA9A08}\PIFSvc.exe
    O23 - Service: Pml Driver HPZ12 - HP - C:\WINDOWS\system32\HPZipm12.exe
    O23 - Service: Symantec Core LC - Unknown owner - C:\Program Files\Common Files\Symantec Shared\CCPD-LC\symlcsvc.exe

    --
    End of file - 5271 bytes

  7. #7
    Emeritus- Security Expert peku006's Avatar
    Join Date
    Feb 2007
    Location
    Norway
    Posts
    3,103

    Default

    Hi Don

    Spybot popup
    The reason why the TeaTimer asked you is because it would ask you about any similar changes in the registry without regarding if it is good or not.
    There are so many registry keys that it is impossible to classify them by default. So the user have to decide if he want to allow it or not.
    The TeaTimer is making snapshot files when you start it the first time and the tool is comparing the current registry with the snapshot files.
    If you want to make a new snapshot files please shutdown the TeaTimer with the Resident icon and then start it manually from the Spybot S&D program folder.
    There is no possibility yet to hide the popups which remind you which keys are blocked. As a workaround, you can only make new snap shot files
    1 - Disable Spybot Teatimer temporarily
    1. Right click the Spybot Icon in the system tray near the clock (looks like a blue/white calendar with a padlock symbol).
    2. Click once on Resident Protection, then right click the Spybot icon again and make sure Resident Protection is now Unchecked. The Spybot icon in the System tray should now be now colorless.
    3. Go to Start > All Programs > Spybot - Search & Destroy > Spybot Search & Destroy.
    4. Click on Mode > Advanced Mode. When it prompts you, click Yes.
    5. On the left hand side, click on Tools.
    6. Check (tick) this box if it is not yet ticked: Resident.
    7. You will notice that Resident is now added under Tools. Click on Resident.
    8. Uncheck (untick) this box: Resident "TeaTimer" (Protection of over-all system settings) active.
    9. Exit Spybot Search & Destroy.


    Download and Unzip to your Desktop: ResetTeaTimer.bat.zip >
    Double-click ResetTeaTimer.bat to remove all entries set by TeaTimer.

    Restart your computer for the changes to take effect.

    2 - Download and Run Malwarebytes' Anti-Malware
    Please download Malwarebytes Anti-Malware and save it to your desktop.
    alternate download link 1
    alternate download link 2

    • Double-click on Download_mbam-setup.exe to install the application.
    • When the installation begins, follow the prompts and do not make any changes to default settings.
    • When installation has finished, make sure you leave both of these checked:
    • Update Malwarebytes' Anti-Malware
    • Launch Malwarebytes' Anti-Malware
    • Then click Finish.

    MBAM will automatically start and you will be asked to update the program before performing a scan.
    • If an update is found, the program will automatically update itself.
    • Press the OK button to close that box and continue.
    • If you encounter any problems while downloading the updates, manually download them from here and just double-click on mbam-rules.exe to install.

    On the Scanner tab:
    • Make sure the "Perform full scan" option is selected.
    • Then click on the Scan button.
    • If asked to select the drives to scan, leave all the drives selected and click on the Start Scan button
    • The scan will begin and "Scan in progress" will show at the top. It may take some time to complete so please be patient.
    • When the scan is finished, a message box will say "The scan completed successfully. Click 'Show Results' to display all objects found".
    • Click OK to close the message box and continue with the removal process.

    Back at the main Scanner screen:
    • Click on the Show Results button to see a list of any malware that was found.
    • Make sure that everything is checked, and click Remove Selected.
    • When removal is completed, a log report will open in Notepad and you may be prompted to restart your computer. (see Note below)
    • The log is automatically saved and can be viewed by clicking the Logs tab in MBAM.
    • The log can also be found here:

      C:\Documents and Settings\Username\Application Data\Malwarebytes\Malwarebytes' Anti-Malware\Logs\mbam-log-date (time).txt
    • Copy and paste the contents of that report in your next reply and exit MBAM.


    Note: If MBAM encounters a file that is difficult to remove, you will be presented with 1 of 2 prompts. Click OK to either and let MBAM proceed with the disinfection process. If asked to restart the computer, please do so immediately. Failure to reboot will prevent MBAM from removing all the malware.


    4 - Status Check
    Please reply with

    the Malwarebytes' Anti-Malware Log

    Thanks peku006
    I don't help with logs thru PM. If you have problems create a thread in the forum, please.

  8. #8
    Junior Member
    Join Date
    Jan 2009
    Posts
    9

    Default

    Hi peku006,

    Things seemed to go smoothly. Below is a log.


    Don


    ______

    Malwarebytes' Anti-Malware 1.33
    Database version: 1692
    Windows 5.1.2600 Service Pack 2

    1/25/2009 3:15:36 PM
    mbam-log-2009-01-25 (15-15-36).txt

    Scan type: Full Scan (C:\|D:\|)
    Objects scanned: 195972
    Time elapsed: 1 hour(s), 41 minute(s), 14 second(s)

    Memory Processes Infected: 0
    Memory Modules Infected: 0
    Registry Keys Infected: 0
    Registry Values Infected: 0
    Registry Data Items Infected: 0
    Folders Infected: 0
    Files Infected: 33

    Memory Processes Infected:
    (No malicious items detected)

    Memory Modules Infected:
    (No malicious items detected)

    Registry Keys Infected:
    (No malicious items detected)

    Registry Values Infected:
    (No malicious items detected)

    Registry Data Items Infected:
    (No malicious items detected)

    Folders Infected:
    (No malicious items detected)

    Files Infected:
    C:\Documents and Settings\Compaq_Owner\Desktop\Don\backups\backup-20090121-070636-607.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
    C:\Documents and Settings\Compaq_Owner\Desktop\Don\backups\backup-20090121-070825-972.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
    C:\Documents and Settings\Compaq_Owner\Desktop\Don\backups\backup-20090121-070847-582.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
    C:\Documents and Settings\Compaq_Owner\Desktop\Don\backups\backup-20090121-071128-683.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
    C:\Documents and Settings\Compaq_Owner\Desktop\Don\backups\backup-20090124-124706-339.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
    C:\Documents and Settings\Compaq_Owner\Desktop\Don\backups\backup-20090124-124706-627.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
    C:\Documents and Settings\Compaq_Owner\Desktop\Don\backups\backup-20090124-124750-951.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
    C:\Qoobox\Quarantine\C\WINDOWS\system32\euttbv.dll.vir (Trojan.Vundo) -> Quarantined and deleted successfully.
    C:\Qoobox\Quarantine\C\WINDOWS\system32\fccbCvsq.dll.vir (Trojan.Vundo) -> Quarantined and deleted successfully.
    C:\Qoobox\Quarantine\C\WINDOWS\system32\helsbuad.dll.vir (Trojan.Vundo) -> Quarantined and deleted successfully.
    C:\Qoobox\Quarantine\C\WINDOWS\system32\rivtxrkd.dll.vir (Trojan.Vundo) -> Quarantined and deleted successfully.
    C:\Qoobox\Quarantine\C\WINDOWS\system32\rjqwxndg.dll.vir (Trojan.Vundo) -> Quarantined and deleted successfully.
    C:\System Volume Information\_restore{2466A83D-1B81-456E-9766-38C2B7E48210}\RP866\A0086236.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
    C:\System Volume Information\_restore{2466A83D-1B81-456E-9766-38C2B7E48210}\RP866\A0086237.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
    C:\System Volume Information\_restore{2466A83D-1B81-456E-9766-38C2B7E48210}\RP866\A0086238.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
    C:\System Volume Information\_restore{2466A83D-1B81-456E-9766-38C2B7E48210}\RP866\A0086239.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
    C:\System Volume Information\_restore{2466A83D-1B81-456E-9766-38C2B7E48210}\RP866\A0086241.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
    C:\System Volume Information\_restore{2466A83D-1B81-456E-9766-38C2B7E48210}\RP866\A0086242.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
    C:\System Volume Information\_restore{2466A83D-1B81-456E-9766-38C2B7E48210}\RP867\A0087241.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
    C:\System Volume Information\_restore{2466A83D-1B81-456E-9766-38C2B7E48210}\RP871\A0089349.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
    C:\System Volume Information\_restore{2466A83D-1B81-456E-9766-38C2B7E48210}\RP872\A0089359.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
    C:\System Volume Information\_restore{2466A83D-1B81-456E-9766-38C2B7E48210}\RP872\A0089362.exe (Trojan.Waledac) -> Quarantined and deleted successfully.
    C:\System Volume Information\_restore{2466A83D-1B81-456E-9766-38C2B7E48210}\RP875\A0089424.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
    C:\System Volume Information\_restore{2466A83D-1B81-456E-9766-38C2B7E48210}\RP875\A0089430.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
    C:\System Volume Information\_restore{2466A83D-1B81-456E-9766-38C2B7E48210}\RP877\A0089462.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
    C:\System Volume Information\_restore{2466A83D-1B81-456E-9766-38C2B7E48210}\RP877\A0089464.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
    C:\System Volume Information\_restore{2466A83D-1B81-456E-9766-38C2B7E48210}\RP877\A0089467.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
    C:\System Volume Information\_restore{2466A83D-1B81-456E-9766-38C2B7E48210}\RP878\A0089473.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
    C:\System Volume Information\_restore{2466A83D-1B81-456E-9766-38C2B7E48210}\RP879\A0089495.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
    C:\System Volume Information\_restore{2466A83D-1B81-456E-9766-38C2B7E48210}\RP879\A0089496.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
    C:\System Volume Information\_restore{2466A83D-1B81-456E-9766-38C2B7E48210}\RP879\A0089497.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
    C:\System Volume Information\_restore{2466A83D-1B81-456E-9766-38C2B7E48210}\RP879\A0089498.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
    C:\System Volume Information\_restore{2466A83D-1B81-456E-9766-38C2B7E48210}\RP879\A0089499.dll (Trojan.Vundo) -> Quarantined and deleted successfully.

  9. #9
    Emeritus- Security Expert peku006's Avatar
    Join Date
    Feb 2007
    Location
    Norway
    Posts
    3,103

    Default

    Hi Don

    Looking good

    We will run one online scan to be sure that there is nothing left.

    1 - Clean temp files

    • Download and Run ATF Cleaner
      Download ATF (Atribune Temp File) Cleaner© by Atribune to your desktop.Double-click ATF Cleaner.exe to open it.

      Under Main choose:
      • Windows Temp
        Current User Temp
        All Users Temp
        Temporary Internet Files
        Prefetch
        Java Cache

        *The other boxes are optional*
        Then click the Empty Selected button.

      if you use Firefox:
      • Click Firefox at the top and choose: Select All
        Click the Empty Selected button.
        NOTE: If you would like to keep your saved passwords, please click NO at the prompt.

      if you use Opera:
      • Click Opera at the top and choose: Select All
        Click the Empty Selected button.
        NOTE: If you would like to keep your saved passwords, please click NO at the prompt.


      Click Exit on the Main menu to close the program


    2 - F-Secure Online Scan
    1. Please go to F-Secure website to perform an online scan. Click on Start scanning at the bottom of the page.
    2. You may be prompted to install an ActiveX before you are able to accept the License Agreement. If prompted, please install it. After installing, the Accept button will be available.
    3. Click on Accept to accept the License Agreement.
    4. Click on Custom Scan.
      • Under Virus Scan Options, select the Scan whole system option.
      • Under Other Scan Options, select these options:
        • Scan all files
        • Scan whole system for rootkits
        • Scan whole system for spyware
        • Scan inside archives
        • Use advanced heuristics
    5. Click Start.
    6. It will start installing the scanner and virus definitions. Once the installation is done, it will start scanning automatically. This takes a while. Please be patient.
    7. Click on I want decide item by item.
    8. Under Actions, select None for all infections found.
    9. Click Next.
    10. Click on Show Report.
    11. Please copy and paste this report in your next reply.
    12. Click Finish.


    3 - Run Hijackthis
    Click on the Do a system scan and save a logfile button. It will scan and the log should open in notepad

    4- Status Check
    Please reply with

    1. the F-Secure online scanner report
    2. a fresh HijackThis log

    Thanks peku006
    I don't help with logs thru PM. If you have problems create a thread in the forum, please.

  10. #10
    Junior Member
    Join Date
    Jan 2009
    Posts
    9

    Default

    Hi peku006,

    I completed step#1 and ran into problems with step#2. IE was freezing often when loading any web pages (including this one) before I began the f-secure stuff. The f-secure scan was also taking extremely long (17,000 files in 12 hours, which would mean a ~5 day period to run) and took all available RAM. It also started conflicting with Norton 360 since it took more than 5 hours. I could not re-disable Norton 360 because it was completely frozen, too. Therefore, I had to reboot and bring down Norton completely. Now I am retrying the f-secure scan.

    Thanks.


    Don

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •