View Full Version : Smitfraud case
superglue
2007-06-06, 18:27
Hello.
I've scaned it with the on-line AntiVirus and it found this:
Scan Results: 135338 files scanned. 2 viruses were detected.
File Infection Status Path
fccywuv.dll Win32/Chisyne!generic infected C:\WINDOWS\system32\
sfewkdbx.dll Win32/Vundo.DB infected C:\WINDOWS\system32\
I can't find the second file anymore, i think he deleted it.
I also ran some scans with Spybot, and it always finds Smitfraud.
Here is the HJT log:
Logfile of HijackThis v1.99.1
Scan saved at 6:22:43 PM, on 6/6/2007
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)
Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Analog Devices\SoundMAX\SMax4PNP.exe
C:\PROGRA~1\NORTON~1\navapw32.exe
C:\Program Files\Norton AntiVirus\navapsvc.exe
C:\oracle\ora90\bin\agntsrvc.exe
C:\oracle\ora90\BIN\TNSLSNR.exe
C:\WINDOWS\system32\cmd.exe
c:\oracle\ora90\bin\ORACLE.EXE
C:\Program Files\Analog Devices\SoundMAX\SMAgent.exe
C:\WINDOWS\system32\svchost.exe
C:\oracle\ora90\bin\dbsnmp.exe
C:\Program Files\Mozilla Firefox\firefox.exe
C:\WINDOWS\system32\wscntfy.exe
C:\WINDOWS\explorer.exe
C:\New Folder\HijackThis.exe
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar = http://us.rd.yahoo.com/customize/ie/defaults/sb/msgr8/*http://www.yahoo.com/ext/search/search.html
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://www.yahoo.com/
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://us.rd.yahoo.com/customize/ie/defaults/su/msgr8/*http://www.yahoo.com
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Bar = http://us.rd.yahoo.com/customize/ie/defaults/sb/msgr8/*http://www.yahoo.com/ext/search/search.html
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = about:blank
R1 - HKCU\Software\Microsoft\Internet Explorer\SearchURL,(Default) = http://us.rd.yahoo.com/customize/ie/defaults/su/msgr8/*http://www.yahoo.com
R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,AutoConfigURL = http://192.168.5.253/proxy.pac
R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyServer = http://192.168.5.253/proxy.pac
R3 - URLSearchHook: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - (no file)
O3 - Toolbar: Norton AntiVirus - {42CDD1BF-3FFB-4238-8AD1-7859DF00B1D6} - C:\Program Files\Norton AntiVirus\NavShExt.dll
O4 - HKLM\..\Run: [SoundMAXPnP] C:\Program Files\Analog Devices\SoundMAX\SMax4PNP.exe
O4 - HKLM\..\Run: [SoundMAX] "C:\Program Files\Analog Devices\SoundMAX\Smax4.exe" /tray
O4 - HKLM\..\Run: [NAV Agent] C:\PROGRA~1\NORTON~1\navapw32.exe
O4 - HKLM\..\Run: [ApachInc] rundll32.exe "C:\WINDOWS\system32\tcatrrpy.dll",realset
O4 - HKLM\..\Run: [j0211237] rundll32 C:\WINDOWS\system32\j0211237.dll sook
O4 - HKCU\..\Run: [Yahoo! Pager] "C:\Program Files\Yahoo!\Messenger\YahooMessenger.exe" -quiet
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~3\OFFICE11\EXCEL.EXE/3000
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~3\OFFICE11\REFIEBAR.DLL
O9 - Extra button: Yahoo! Messenger - {E5D12C4E-7B4F-11D3-B5C9-0050045C3C96} - C:\Program Files\Yahoo!\Messenger\YahooMessenger.exe
O9 - Extra 'Tools' menuitem: Yahoo! Messenger - {E5D12C4E-7B4F-11D3-B5C9-0050045C3C96} - C:\Program Files\Yahoo!\Messenger\YahooMessenger.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O16 - DPF: {30528230-99f7-4bb4-88d8-fa1d4f56a2ab} (Installation Support) - C:\Program Files\Yahoo!\Common\Yinsthelper.dll
O16 - DPF: {7B297BFD-85E4-4092-B2AF-16A91B2EA103} (WScanCtl Class) - http://www.ca.com/us/securityadvisor/virusinfo/webscan.cab
O18 - Protocol: ms-help - {314111C7-A502-11D2-BBCA-00C04F8EC294} - C:\Program Files\Common Files\Microsoft Shared\Help\hxds.dll
O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
O23 - Service: SQL Server (SQLEXPRESS) (MSSQL$SQLEXPRESS) - Unknown owner - c:\Program Files\Microsoft SQL Server\MSSQL.1\MSSQL\Binn\sqlservr.exe" -sSQLEXPRESS (file missing)
O23 - Service: Norton AntiVirus Auto Protect Service (navapsvc) - Symantec Corporation - C:\Program Files\Norton AntiVirus\navapsvc.exe
O23 - Service: Oracle OLAP 9.0.1.0.1 (OLAPServer) - Oracle Corporation - C:\oracle\ora90\bin\xsolap.exe
O23 - Service: Oracle OLAP Agent - Unknown owner - C:\oracle\ora90\bin\xsaagent.exe
O23 - Service: OracleOraHome90Agent - Oracle Corporation - C:\oracle\ora90\bin\agntsrvc.exe
O23 - Service: OracleOraHome90ClientCache - Unknown owner - C:\oracle\ora90\BIN\ONRSD.EXE
O23 - Service: OracleOraHome90HTTPServer - Unknown owner - C:\oracle\ora90\Apache\Apache\Apache.exe
O23 - Service: OracleOraHome90PagingServer - Unknown owner - C:\oracle\ora90/bin/pagntsrv.exe
O23 - Service: OracleOraHome90SNMPPeerEncapsulator - Unknown owner - C:\oracle\ora90\BIN\ENCSVC.EXE
O23 - Service: OracleOraHome90SNMPPeerMasterAgent - Unknown owner - C:\oracle\ora90\BIN\AGNTSVC.EXE
O23 - Service: OracleOraHome90TNSListener - Unknown owner - C:\oracle\ora90\BIN\TNSLSNR.exe
O23 - Service: OracleServiceIULIANA - Oracle Corporation - c:\oracle\ora90\bin\ORACLE.EXE
O23 - Service: ScriptBlocking Service (SBService) - Symantec Corporation - C:\PROGRA~1\COMMON~1\SYMANT~1\SCRIPT~1\SBServ.exe
O23 - Service: SoundMAX Agent Service (SoundMAX Agent Service (default)) - Analog Devices, Inc. - C:\Program Files\Analog Devices\SoundMAX\SMAgent.exe
O23 - Service: Visibroker Smart Agent (xsSmartAgent) - Unknown owner - C:\oracle\ora90\bin\osagent.exe
Thanks in advance!
Hi superglue
Rename HijackThis.exe to scanner.exe and post back a fresh HijackThis log, please :)
superglue
2007-06-07, 14:04
Hi, thanks for answering. The infection got quite worse, and now my antivirus finds two more files infected with the Vundo Trojan.
I renamed HJT like you asked me.. Here is the log file.
Logfile of HijackThis v1.99.1
Scan saved at 2:04:43 PM, on 6/7/2007
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)
Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\Analog Devices\SoundMAX\SMax4PNP.exe
C:\PROGRA~1\NORTON~1\navapw32.exe
C:\Program Files\Norton AntiVirus\navapsvc.exe
C:\oracle\ora90\bin\agntsrvc.exe
C:\oracle\ora90\BIN\TNSLSNR.exe
C:\WINDOWS\system32\cmd.exe
c:\oracle\ora90\bin\ORACLE.EXE
C:\Program Files\Analog Devices\SoundMAX\SMAgent.exe
C:\WINDOWS\system32\svchost.exe
C:\oracle\ora90\bin\dbsnmp.exe
C:\Program Files\Analog Devices\SoundMAX\smax4.exe
C:\WINDOWS\system32\wscntfy.exe
C:\Program Files\Mozilla Firefox\firefox.exe
C:\Program Files\Yahoo!\Messenger\ymsgr_tray.exe
C:\New Folder\scanner.exe
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar = http://us.rd.yahoo.com/customize/ie/defaults/sb/msgr8/*http://www.yahoo.com/ext/search/search.html
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://www.yahoo.com/
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://us.rd.yahoo.com/customize/ie/defaults/su/msgr8/*http://www.yahoo.com
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Bar = http://us.rd.yahoo.com/customize/ie/defaults/sb/msgr8/*http://www.yahoo.com/ext/search/search.html
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = about:blank
R1 - HKCU\Software\Microsoft\Internet Explorer\SearchURL,(Default) = http://us.rd.yahoo.com/customize/ie/defaults/su/msgr8/*http://www.yahoo.com
R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,AutoConfigURL = http://192.168.5.253/proxy.pac
R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyServer = http://192.168.5.253/proxy.pac
R3 - URLSearchHook: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - (no file)
O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 7.0\ActiveX\AcroIEHelper.dll
O2 - BHO: (no name) - {54CBB12C-3481-4C5D-942D-4976C0F0A406} - C:\WINDOWS\system32\fccywuv.dll
O2 - BHO: (no name) - {92A444D2-F945-4dd9-89A1-896A6C2D8D22} - C:\WINDOWS\system32\isldeawj.dll
O2 - BHO: (no name) - {9D343939-F1F4-4443-B54C-5FCA29722684} - C:\WINDOWS\system32\mljjh.dll
O2 - BHO: CNavExtBho Class - {BDF3E430-B101-42AD-A544-FADC6B084872} - C:\Program Files\Norton AntiVirus\NavShExt.dll
O2 - BHO: (no name) - {C90025C0-21E4-451A-BCC6-C1407F804CB3} - C:\WINDOWS\system32\cvutrhcg.dll
O3 - Toolbar: Norton AntiVirus - {42CDD1BF-3FFB-4238-8AD1-7859DF00B1D6} - C:\Program Files\Norton AntiVirus\NavShExt.dll
O4 - HKLM\..\Run: [SoundMAXPnP] C:\Program Files\Analog Devices\SoundMAX\SMax4PNP.exe
O4 - HKLM\..\Run: [SoundMAX] "C:\Program Files\Analog Devices\SoundMAX\smax4.exe" /tray
O4 - HKLM\..\Run: [NAV Agent] C:\PROGRA~1\NORTON~1\navapw32.exe
O4 - HKLM\..\Run: [ApachInc] rundll32.exe "C:\WINDOWS\system32\gpowaimm.dll",realset
O4 - HKCU\..\Run: [Yahoo! Pager] "C:\Program Files\Yahoo!\Messenger\YahooMessenger.exe" -quiet
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~3\OFFICE11\EXCEL.EXE/3000
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~3\OFFICE11\REFIEBAR.DLL
O9 - Extra button: Yahoo! Messenger - {E5D12C4E-7B4F-11D3-B5C9-0050045C3C96} - C:\Program Files\Yahoo!\Messenger\YahooMessenger.exe
O9 - Extra 'Tools' menuitem: Yahoo! Messenger - {E5D12C4E-7B4F-11D3-B5C9-0050045C3C96} - C:\Program Files\Yahoo!\Messenger\YahooMessenger.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O16 - DPF: {30528230-99f7-4bb4-88d8-fa1d4f56a2ab} (Installation Support) - C:\Program Files\Yahoo!\Common\Yinsthelper.dll
O16 - DPF: {7B297BFD-85E4-4092-B2AF-16A91B2EA103} (WScanCtl Class) - http://www.ca.com/us/securityadvisor/virusinfo/webscan.cab
O18 - Protocol: ms-help - {314111C7-A502-11D2-BBCA-00C04F8EC294} - C:\Program Files\Common Files\Microsoft Shared\Help\hxds.dll
O20 - Winlogon Notify: fccywuv - C:\WINDOWS\SYSTEM32\fccywuv.dll
O20 - Winlogon Notify: mljjh - C:\WINDOWS\system32\mljjh.dll
O20 - Winlogon Notify: wineak32 - C:\WINDOWS\SYSTEM32\wineak32.dll
O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
O23 - Service: SQL Server (SQLEXPRESS) (MSSQL$SQLEXPRESS) - Unknown owner - c:\Program Files\Microsoft SQL Server\MSSQL.1\MSSQL\Binn\sqlservr.exe" -sSQLEXPRESS (file missing)
O23 - Service: Norton AntiVirus Auto Protect Service (navapsvc) - Symantec Corporation - C:\Program Files\Norton AntiVirus\navapsvc.exe
O23 - Service: Oracle OLAP 9.0.1.0.1 (OLAPServer) - Oracle Corporation - C:\oracle\ora90\bin\xsolap.exe
O23 - Service: Oracle OLAP Agent - Unknown owner - C:\oracle\ora90\bin\xsaagent.exe
O23 - Service: OracleOraHome90Agent - Oracle Corporation - C:\oracle\ora90\bin\agntsrvc.exe
O23 - Service: OracleOraHome90ClientCache - Unknown owner - C:\oracle\ora90\BIN\ONRSD.EXE
O23 - Service: OracleOraHome90HTTPServer - Unknown owner - C:\oracle\ora90\Apache\Apache\Apache.exe
O23 - Service: OracleOraHome90PagingServer - Unknown owner - C:\oracle\ora90/bin/pagntsrv.exe
O23 - Service: OracleOraHome90SNMPPeerEncapsulator - Unknown owner - C:\oracle\ora90\BIN\ENCSVC.EXE
O23 - Service: OracleOraHome90SNMPPeerMasterAgent - Unknown owner - C:\oracle\ora90\BIN\AGNTSVC.EXE
O23 - Service: OracleOraHome90TNSListener - Unknown owner - C:\oracle\ora90\BIN\TNSLSNR.exe
O23 - Service: OracleServiceIULIANA - Oracle Corporation - c:\oracle\ora90\bin\ORACLE.EXE
O23 - Service: ScriptBlocking Service (SBService) - Symantec Corporation - C:\PROGRA~1\COMMON~1\SYMANT~1\SCRIPT~1\SBServ.exe
O23 - Service: SoundMAX Agent Service (SoundMAX Agent Service (default)) - Analog Devices, Inc. - C:\Program Files\Analog Devices\SoundMAX\SMAgent.exe
O23 - Service: Visibroker Smart Agent (xsSmartAgent) - Unknown owner - C:\oracle\ora90\bin\osagent.exe
Hi
Please download VundoFix.exe (http://www.atribune.org/ccount/click.php?id=4) to your desktop.
Double-click VundoFix.exe to run it.
Click the Scan for Vundo button.
Once it's done scanning, click the Remove Vundo button.
You will receive a prompt asking if you want to remove the files, click YES
Once you click yes, your desktop will go blank as it starts removing Vundo.
When completed, it will prompt that it will reboot your computer, click OK.
Please post the contents of C:\vundofix.txt and a new HiJackThis log in a reply to this thread.
Note: It is possible that VundoFix encountered a file it could not remove. In this case, VundoFix will run on reboot, simply follow the above instructions starting from "Click the Scan for Vundo button" when VundoFix appears upon rebooting.
superglue
2007-06-07, 16:55
I'm sorry it took that long but my computer is working very slowly now, since only winlogon "eats" between 50 and 80% CPU.
Vundofix did not find one of the files that was pointed as infected by my antivirus : fccywuv.dll.
After the second reboot performed by vundofix, his list was empty but the Remove Vundo button was still active, so i clicked it.
If i have to perform another VundoFix scan please tell me to. (hope this will not be necesary :red:)
These are the logs:
VundoFix V6.4.2
Checking Java version...
Sun Java not detected
Scan started at 2:24:03 PM 6/7/2007
Listing files found while scanning....
C:\WINDOWS\system32\hjjlm.bak1
C:\WINDOWS\system32\hjjlm.bak2
C:\WINDOWS\system32\hjjlm.ini
C:\WINDOWS\system32\hjjlm.ini2
C:\WINDOWS\system32\hjjlm.tmp
C:\WINDOWS\system32\mljjh.dll
C:\WINDOWS\system32\sfewkdbx.dll
Beginning removal...
Attempting to delete C:\WINDOWS\system32\hjjlm.bak1
C:\WINDOWS\system32\hjjlm.bak1 Has been deleted!
Attempting to delete C:\WINDOWS\system32\hjjlm.bak2
C:\WINDOWS\system32\hjjlm.bak2 Has been deleted!
Attempting to delete C:\WINDOWS\system32\hjjlm.ini
C:\WINDOWS\system32\hjjlm.ini Has been deleted!
Attempting to delete C:\WINDOWS\system32\hjjlm.ini2
C:\WINDOWS\system32\hjjlm.ini2 Has been deleted!
Attempting to delete C:\WINDOWS\system32\hjjlm.tmp
C:\WINDOWS\system32\hjjlm.tmp Has been deleted!
Attempting to delete C:\WINDOWS\system32\mljjh.dll
C:\WINDOWS\system32\mljjh.dll Could not be deleted.
Performing Repairs to the registry.
Done!
Beginning removal...
Attempting to delete C:\WINDOWS\system32\hjjlm.ini
C:\WINDOWS\system32\hjjlm.ini Could not be deleted.
Attempting to delete C:\WINDOWS\system32\hjjlm.ini2
C:\WINDOWS\system32\hjjlm.ini2 Has been deleted!
Attempting to delete C:\WINDOWS\system32\mljjh.dll
C:\WINDOWS\system32\mljjh.dll Could not be deleted.
Performing Repairs to the registry.
Done!
Beginning removal...
HJT log:
Logfile of HijackThis v1.99.1
Scan saved at 4:54:42 PM, on 6/7/2007
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)
Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Norton AntiVirus\navapsvc.exe
C:\oracle\ora90\bin\agntsrvc.exe
C:\oracle\ora90\BIN\TNSLSNR.exe
C:\WINDOWS\system32\cmd.exe
c:\oracle\ora90\bin\ORACLE.EXE
C:\Program Files\Analog Devices\SoundMAX\SMAgent.exe
C:\WINDOWS\system32\svchost.exe
C:\oracle\ora90\bin\dbsnmp.exe
C:\WINDOWS\system32\wscntfy.exe
C:\Program Files\Analog Devices\SoundMAX\SMax4PNP.exe
C:\Program Files\Analog Devices\SoundMAX\smax4.exe
C:\PROGRA~1\NORTON~1\navapw32.exe
C:\Program Files\Mozilla Firefox\firefox.exe
C:\Program Files\Yahoo!\Messenger\ymsgr_tray.exe
C:\New Folder\scanner.exe
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar = http://us.rd.yahoo.com/customize/ie/defaults/sb/msgr8/*http://www.yahoo.com/ext/search/search.html
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://www.yahoo.com/
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://us.rd.yahoo.com/customize/ie/defaults/su/msgr8/*http://www.yahoo.com
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Bar = http://us.rd.yahoo.com/customize/ie/defaults/sb/msgr8/*http://www.yahoo.com/ext/search/search.html
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = about:blank
R1 - HKCU\Software\Microsoft\Internet Explorer\SearchURL,(Default) = http://us.rd.yahoo.com/customize/ie/defaults/su/msgr8/*http://www.yahoo.com
R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,AutoConfigURL = http://192.168.5.253/proxy.pac
R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyServer = http://192.168.5.253/proxy.pac
R3 - URLSearchHook: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - (no file)
O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 7.0\ActiveX\AcroIEHelper.dll
O2 - BHO: (no name) - {54CBB12C-3481-4C5D-942D-4976C0F0A406} - C:\WINDOWS\system32\fccywuv.dll
O2 - BHO: (no name) - {92A444D2-F945-4dd9-89A1-896A6C2D8D22} - C:\WINDOWS\system32\isldeawj.dll
O2 - BHO: CNavExtBho Class - {BDF3E430-B101-42AD-A544-FADC6B084872} - C:\Program Files\Norton AntiVirus\NavShExt.dll
O2 - BHO: (no name) - {C90025C0-21E4-451A-BCC6-C1407F804CB3} - C:\WINDOWS\system32\cvutrhcg.dll
O2 - BHO: (no name) - {FB9F0438-CC7B-4095-8E9F-9EE1D3B96F64} - C:\WINDOWS\system32\mljjh.dll
O3 - Toolbar: Norton AntiVirus - {42CDD1BF-3FFB-4238-8AD1-7859DF00B1D6} - C:\Program Files\Norton AntiVirus\NavShExt.dll
O4 - HKLM\..\Run: [SoundMAXPnP] C:\Program Files\Analog Devices\SoundMAX\SMax4PNP.exe
O4 - HKLM\..\Run: [SoundMAX] "C:\Program Files\Analog Devices\SoundMAX\smax4.exe" /tray
O4 - HKLM\..\Run: [NAV Agent] C:\PROGRA~1\NORTON~1\navapw32.exe
O4 - HKLM\..\Run: [ApachInc] rundll32.exe "C:\WINDOWS\system32\gpowaimm.dll",realset
O4 - HKCU\..\Run: [Yahoo! Pager] "C:\Program Files\Yahoo!\Messenger\YahooMessenger.exe" -quiet
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~3\OFFICE11\EXCEL.EXE/3000
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~3\OFFICE11\REFIEBAR.DLL
O9 - Extra button: Yahoo! Messenger - {E5D12C4E-7B4F-11D3-B5C9-0050045C3C96} - C:\Program Files\Yahoo!\Messenger\YahooMessenger.exe
O9 - Extra 'Tools' menuitem: Yahoo! Messenger - {E5D12C4E-7B4F-11D3-B5C9-0050045C3C96} - C:\Program Files\Yahoo!\Messenger\YahooMessenger.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O16 - DPF: {30528230-99f7-4bb4-88d8-fa1d4f56a2ab} (Installation Support) - C:\Program Files\Yahoo!\Common\Yinsthelper.dll
O16 - DPF: {7B297BFD-85E4-4092-B2AF-16A91B2EA103} (WScanCtl Class) - http://www.ca.com/us/securityadvisor/virusinfo/webscan.cab
O18 - Protocol: ms-help - {314111C7-A502-11D2-BBCA-00C04F8EC294} - C:\Program Files\Common Files\Microsoft Shared\Help\hxds.dll
O20 - Winlogon Notify: fccywuv - C:\WINDOWS\SYSTEM32\fccywuv.dll
O20 - Winlogon Notify: mljjh - C:\WINDOWS\system32\mljjh.dll
O20 - Winlogon Notify: wineak32 - C:\WINDOWS\SYSTEM32\wineak32.dll
O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
O23 - Service: SQL Server (SQLEXPRESS) (MSSQL$SQLEXPRESS) - Unknown owner - c:\Program Files\Microsoft SQL Server\MSSQL.1\MSSQL\Binn\sqlservr.exe" -sSQLEXPRESS (file missing)
O23 - Service: Norton AntiVirus Auto Protect Service (navapsvc) - Symantec Corporation - C:\Program Files\Norton AntiVirus\navapsvc.exe
O23 - Service: Oracle OLAP 9.0.1.0.1 (OLAPServer) - Oracle Corporation - C:\oracle\ora90\bin\xsolap.exe
O23 - Service: Oracle OLAP Agent - Unknown owner - C:\oracle\ora90\bin\xsaagent.exe
O23 - Service: OracleOraHome90Agent - Oracle Corporation - C:\oracle\ora90\bin\agntsrvc.exe
O23 - Service: OracleOraHome90ClientCache - Unknown owner - C:\oracle\ora90\BIN\ONRSD.EXE
O23 - Service: OracleOraHome90HTTPServer - Unknown owner - C:\oracle\ora90\Apache\Apache\Apache.exe
O23 - Service: OracleOraHome90PagingServer - Unknown owner - C:\oracle\ora90/bin/pagntsrv.exe
O23 - Service: OracleOraHome90SNMPPeerEncapsulator - Unknown owner - C:\oracle\ora90\BIN\ENCSVC.EXE
O23 - Service: OracleOraHome90SNMPPeerMasterAgent - Unknown owner - C:\oracle\ora90\BIN\AGNTSVC.EXE
O23 - Service: OracleOraHome90TNSListener - Unknown owner - C:\oracle\ora90\BIN\TNSLSNR.exe
O23 - Service: OracleServiceIULIANA - Oracle Corporation - c:\oracle\ora90\bin\ORACLE.EXE
O23 - Service: ScriptBlocking Service (SBService) - Symantec Corporation - C:\PROGRA~1\COMMON~1\SYMANT~1\SCRIPT~1\SBServ.exe
O23 - Service: SoundMAX Agent Service (SoundMAX Agent Service (default)) - Analog Devices, Inc. - C:\Program Files\Analog Devices\SoundMAX\SMAgent.exe
O23 - Service: Visibroker Smart Agent (xsSmartAgent) - Unknown owner - C:\oracle\ora90\bin\osagent.exe
Hi
1. Download this file - combofix.exe (http://download.bleepingcomputer.com/sUBs/ComboFix.exe)
and save it to your desktop.
2. Go to start -> run.
type this in box and click ok
"%userprofile%\desktop\ComboFix.exe" /v fccywuv isldeawj cvutrhcg mljjh gpowaimm wineak32
3. When finished, it shall produce a log for you. Post that log in your next reply
4. Reboot
Note:
Do not mouseclick combofix's window whilst it's running. That may cause it to stall
Post:
- a fresh HijackThis log
- combofix report
superglue
2007-06-07, 18:55
Did that, but still geting those nasty pop-ups, and the antivirus still prompts me by showing fccywuv.dll and mljjh.dll as infected.
Here are the logs.
"superglue" - 2007-06-07 18:30:15 Service Pack 2 NTFS
ComboFix 07-06-3B - Running from: "C:\Documents and Settings\superglue\Desktop\"
Command switches used :: "/v fccywuv isldeawj cvutrhcg mljjh gpowaimm wineak32"
(((((((((((((((((((((((((((((((((((((((((((( V Log )))))))))))))))))))))))))))))))))))))))))))))))))))))))
C:\WINDOWS\system32\isldeawj.dll
C:\WINDOWS\system32\cvutrhcg.dll
C:\WINDOWS\system32\wineak32.dll
C:\WINDOWS\system32\bwqsbdax.dll
C:\WINDOWS\system32\wineak32.dll
C:\WINDOWS\system32\hjjlm.bak2
C:\WINDOWS\system32\hjjlm.ini
C:\WINDOWS\system32\hjjlm.ini2
C:\WINDOWS\system32\hjjlm.tmp
C:\WINDOWS\system32\mmiawopg.ini
C:\WINDOWS\system32\hjjlm.bak2
C:\WINDOWS\system32\hjjlm.ini
C:\WINDOWS\system32\hjjlm.ini2
C:\WINDOWS\system32\hjjlm.tmp
C:\WINDOWS\system32\fccywuv.dll
C:\WINDOWS\system32\mljjh.dll
C:\WINDOWS\system32\gpowaimm.dll
* * * POST RUN FILES/FOLDERS * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * *
C:\WINDOWS\system32\fccywuv.dll
C:\WINDOWS\system32\mljjh.dll
((((((((((((((((((((((((( Files Created from 2007-05-07 to 2007-06-07 )))))))))))))))))))))))))))))))
2007-06-07 14:24 <DIR> d-------- C:\VundoFix Backups
2007-06-06 18:09 <DIR> d-------- C:\New Folder
2007-06-06 17:05 <DIR> d-------- C:\WINDOWS\CSC
2007-06-06 15:26 <DIR> d-------- C:\DOCUME~1\ALLUSE~1\APPLIC~1\Spybot - Search & Destroy
2007-06-06 02:06 14,868 --a------ C:\WINDOWS\system32\aljmnlcf.exe
2007-06-06 02:06 10,752 --a------ C:\WINDOWS\system32\j0211237.dll
2007-06-05 10:42 263,220 --------- C:\WINDOWS\system32\mljjh.dll
2007-06-05 10:33 33,302 --a------ C:\WINDOWS\system32\fccywuv.dll
2007-05-25 17:19 <DIR> d-------- C:\WINDOWS\system32\appmgmt
2007-05-23 16:24 <DIR> d-------- C:\WINDOWS\pss
2007-05-23 12:14 <DIR> d-------- C:\Program Files\Ulead PhotoImpact 8
2007-05-20 11:53 5,632 --a------ C:\WINDOWS\system32\ptpusb.dll
2007-05-20 11:53 159,232 --a------ C:\WINDOWS\system32\ptpusd.dll
2007-05-20 11:53 15,104 --a------ C:\WINDOWS\system32\drivers\usbscan.sys
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
2007-06-05 10:29:29 -------- d-----w C:\Program Files\StrongDC++
2007-05-25 16:11:10 -------- d-----w C:\Program Files\Yahoo!
2007-05-23 09:26:57 -------- d--h--w C:\Program Files\InstallShield Installation Information
2007-05-04 19:41:45 -------- d-----w C:\DOCUME~1\SUPERG~1\APPLIC~1\VoipDiscount
2007-05-04 08:59:25 -------- d-----w C:\DOCUME~1\SUPERG~1\APPLIC~1\Help
2007-05-02 11:13:53 -------- d-----w C:\Program Files\DC1300
2007-05-01 15:48:51 -------- d--h--r C:\DOCUME~1\SUPERG~1\APPLIC~1\yahoo!
2007-04-26 16:29:51 -------- d-----w C:\Program Files\Winamp
2007-04-26 12:13:54 -------- d-----w C:\DOCUME~1\SUPERG~1\APPLIC~1\AdobeUM
2007-04-25 12:22:09 -------- d-----w C:\Program Files\Oracle
2007-04-24 22:33:23 -------- d-----w C:\Program Files\Common Files\Ahead
2007-04-24 22:31:33 -------- d-----w C:\DOCUME~1\SUPERG~1\APPLIC~1\Ahead
2007-04-24 22:30:17 -------- d-----w C:\Program Files\Nero
2007-04-24 22:21:57 -------- d-----w C:\Program Files\Microsoft ActiveSync
2007-04-24 09:11:52 -------- d-----w C:\Program Files\HAM
2007-04-24 09:06:00 151,774 ----a-w C:\WINDOWS\HAM Uninstaller.exe
2007-04-23 16:07:23 -------- d-----w C:\Program Files\Common Files\ODBC
2007-04-23 16:07:20 -------- d-----w C:\Program Files\Common Files\SpeechEngines
2007-04-23 15:38:47 -------- d-----w C:\DOCUME~1\SUPERG~1\APPLIC~1\Ulead Systems
2007-04-23 15:36:41 -------- d-----w C:\DOCUME~1\SUPERG~1\APPLIC~1\vlc
2007-04-23 15:36:15 -------- d-----w C:\Program Files\VideoLAN
2007-04-23 15:15:48 -------- d-----w C:\Program Files\WinAce
2007-04-23 15:04:50 1,156 ----a-w C:\WINDOWS\mozver.dat
2007-04-23 14:42:08 -------- d-----w C:\Program Files\Norton AntiVirus
2007-04-23 14:39:52 -------- d-----w C:\Program Files\Symantec
2007-04-23 14:39:47 -------- d-----w C:\Program Files\Common Files\Symantec Shared
2007-04-23 14:39:37 -------- d-----w C:\DOCUME~1\SUPERG~1\APPLIC~1\Symantec
2007-04-23 14:37:09 0 ----a-w C:\WINDOWS\nsreg.dat
2007-04-23 14:34:45 -------- d-----w C:\Program Files\Common Files\InstallShield
2007-04-23 14:18:19 -------- d-----w C:\Program Files\Microsoft SQL Server
2007-04-23 14:16:57 -------- d-----w C:\Program Files\Microsoft.NET
2007-04-23 14:15:29 -------- d-----w C:\Program Files\Microsoft Device Emulator
2007-04-23 14:15:22 -------- d-----w C:\Program Files\Microsoft SQL Server 2005 Mobile Edition
2007-04-23 14:11:10 -------- d-----w C:\Program Files\Microsoft Visual Studio 8
2007-04-23 14:10:59 -------- d-----w C:\Program Files\MSBuild
2007-04-23 14:10:52 -------- d-----w C:\Program Files\HTML Help Workshop
2007-04-23 14:10:05 -------- d-----w C:\Program Files\Common Files\Merge Modules
2007-04-23 14:07:28 -------- d-----w C:\Program Files\Common Files\Business Objects
2007-04-23 14:06:41 -------- d-----w C:\Program Files\CE Remote Tools
2007-04-23 13:54:54 -------- d-----w C:\Program Files\DAEMON Tools
2007-04-23 13:53:40 639,224 ----a-w C:\WINDOWS\system32\drivers\sptd.sys
2007-04-23 13:46:27 -------- d-----w C:\Program Files\Marvell
2007-04-23 13:39:44 -------- d-----w C:\Program Files\Analog Devices
2007-04-23 13:17:38 -------- d-----w C:\Program Files\microsoft frontpage
2007-04-23 13:17:21 0 --sha-r C:\MSDOS.SYS
2007-04-23 13:17:21 0 --sha-r C:\IO.SYS
2007-04-23 13:17:21 0 ----a-w C:\CONFIG.SYS
2007-04-23 13:17:21 0 ----a-w C:\AUTOEXEC.BAT
2007-04-23 13:16:00 -------- d--h--w C:\Program Files\WindowsUpdate
2007-04-23 13:15:56 -------- d-----w C:\Program Files\Online Services
2007-04-23 13:14:56 -------- d-----w C:\Program Files\Common Files\MSSoap
2007-04-23 13:14:44 -------- d-----w C:\Program Files\Movie Maker
2007-04-23 13:13:47 21,640 ----a-w C:\WINDOWS\system32\emptyregdb.dat
2007-04-23 13:13:23 -------- d-----w C:\Program Files\Messenger
2007-04-23 13:13:17 -------- d-----w C:\Program Files\MSN Gaming Zone
2007-04-23 13:13:05 -------- d-----w C:\Program Files\Windows NT
2007-04-16 12:37:50 25 ---h--w C:\WINDOWS\qtf.dat
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
*Note* empty entries & legit default entries are not shown
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects]
{06849E9F-C8D7-4D59-B87D-784B7D6BE0B3}=C:\Program Files\Adobe\Acrobat 7.0\ActiveX\AcroIEHelper.dll [2004-12-14 01:56]
{28D5E39C-ABBB-4A44-B194-7B367CCFFD1E}=C:\WINDOWS\system32\mljjh.dll [2007-06-05 10:42]
{54CBB12C-3481-4C5D-942D-4976C0F0A406}=C:\WINDOWS\system32\fccywuv.dll [2007-06-05 10:33]
{BDF3E430-B101-42AD-A544-FADC6B084872}=C:\Program Files\Norton AntiVirus\NavShExt.dll [2001-08-16 16:35]
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"SoundMAXPnP"="C:\Program Files\Analog Devices\SoundMAX\SMax4PNP.exe" [2004-10-14 09:11]
"SoundMAX"="C:\Program Files\Analog Devices\SoundMAX\smax4.exe" [2004-09-23 12:41]
"NAV Agent"="C:\PROGRA~1\NORTON~1\navapw32.exe" [2001-08-16 17:52]
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"Yahoo! Pager"="C:\Program Files\Yahoo!\Messenger\YahooMessenger.exe" [2007-03-27 15:22]
[HKEY_USERS\.default\software\microsoft\windows\currentversion\runonce]
"RunNarrator"=Narrator.exe
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ShellExecuteHooks]
"{54CBB12C-3481-4C5D-942D-4976C0F0A406}"="C:\WINDOWS\system32\fccywuv.dll" [2007-06-05 10:33]
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\fccywuv]
fccywuv.dll
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\mljjh]
C:\WINDOWS\system32\mljjh.dll
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^Adobe Reader Speed Launch.lnk]
path=C:\Documents and Settings\All Users\Start Menu\Programs\Startup\Adobe Reader Speed Launch.lnk
backup=C:\WINDOWS\pss\Adobe Reader Speed Launch.lnkCommon Startup
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupfolder\C:^Documents and Settings^superglue^Start Menu^Programs^Startup^Yahoo! Widget Engine.lnk]
path=C:\Documents and Settings\superglue\Start Menu\Programs\Startup\Yahoo! Widget Engine.lnk
backup=C:\WINDOWS\pss\Yahoo! Widget Engine.lnkStartup
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\ApachInc]
rundll32.exe "C:\WINDOWS\system32\tcatrrpy.dll",realset
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\DAEMON Tools]
"C:\Program Files\DAEMON Tools\daemon.exe" -lang 1033
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\DC1300 Monitor]
C:\Program Files\DC1300\DCMnt1_0\DC1300mi.exe
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\j0211237]
rundll32 C:\WINDOWS\system32\j0211237.dll sook
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\NeroFilterCheck]
C:\WINDOWS\system32\NeroCheck.exe
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\VoipDiscount]
"C:\Program Files\VoipDiscount.com\VoipDiscount\VoipDiscount.exe" -nosplash -minimized
HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\svchost *netsvcs*
Contents of the 'Scheduled Tasks' folder
2007-06-07 15:42:41 C:\WINDOWS\tasks\Symantec NetDetect.job
**************************************************************************
catchme 0.3.692 W2K/XP/Vista - userland rootkit detector by Gmer, http://www.gmer.net
Rootkit scan 2007-06-07 18:42:31
Windows 5.1.2600 Service Pack 2 NTFS
scanning hidden processes ...
scanning hidden autostart entries ...
scanning hidden files ...
scan completed successfully
hidden files: 0
**************************************************************************
Completion time: 2007-06-07 18:45:58 - machine was rebooted
C:\ComboFix-quarantined-files.txt ... 2007-06-07 18:45
--- E O F ---
2007-06-05 10:34 19456 --a------ C:\Qoobox\Quarantine\C\WINDOWS\system32\wineak32.dll.vir
2007-06-06 11:04 125460 --a------ C:\Qoobox\Quarantine\C\WINDOWS\system32\bwqsbdax.dll.vir
2007-06-06 14:18 125460 --a------ C:\Qoobox\Quarantine\C\WINDOWS\system32\cvutrhcg.dll.vir
2007-06-07 09:19 55316 --a------ C:\Qoobox\Quarantine\C\WINDOWS\system32\isldeawj.dll.vir
2007-06-07 11:19 131124 --a------ C:\Qoobox\Quarantine\C\WINDOWS\system32\gpowaimm.dll.vir
2007-06-07 13:55 1010445 --a------ C:\Qoobox\Quarantine\C\WINDOWS\system32\mmiawopg.ini.vir
2007-06-07 16:44 683412 --a------ C:\Qoobox\Quarantine\C\WINDOWS\system32\hjjlm.ini.vir
2007-06-07 16:44 683412 --a------ C:\Qoobox\Quarantine\C\WINDOWS\system32\hjjlm.tmp.vir
2007-06-07 17:01 908206 --a------ C:\Qoobox\Quarantine\C\WINDOWS\system32\hjjlm.bak2.vir
2007-06-07 18:39 906983 --a------ C:\Qoobox\Quarantine\C\WINDOWS\system32\hjjlm.ini2.vir
Folder PATH listing for volume Magazie
Volume serial number is 08A9-89C2
C:\QOOBOX
\---Quarantine
+---C
| +---avenger
| \---WINDOWS
| \---system32
| bwqsbdax.dll.vir
| cvutrhcg.dll.vir
| gpowaimm.dll.vir
| hjjlm.bak2.vir
| hjjlm.ini.vir
| hjjlm.ini2.vir
| hjjlm.tmp.vir
| isldeawj.dll.vir
| mmiawopg.ini.vir
| wineak32.dll.vir
|
\---Registry_backups
superglue
2007-06-07, 18:57
and the HJT log:
Logfile of HijackThis v1.99.1
Scan saved at 6:57:01 PM, on 6/7/2007
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)
Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\Analog Devices\SoundMAX\SMax4PNP.exe
C:\Program Files\Analog Devices\SoundMAX\smax4.exe
C:\PROGRA~1\NORTON~1\navapw32.exe
C:\Program Files\Norton AntiVirus\navapsvc.exe
C:\oracle\ora90\bin\agntsrvc.exe
C:\oracle\ora90\BIN\TNSLSNR.exe
C:\WINDOWS\system32\cmd.exe
c:\oracle\ora90\bin\ORACLE.EXE
C:\Program Files\Mozilla Firefox\firefox.exe
C:\Program Files\Analog Devices\SoundMAX\SMAgent.exe
C:\WINDOWS\system32\svchost.exe
C:\oracle\ora90\bin\dbsnmp.exe
C:\WINDOWS\system32\wscntfy.exe
C:\Program Files\Yahoo!\Messenger\ymsgr_tray.exe
C:\New Folder\scanner.exe
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://www.yahoo.com/
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://us.rd.yahoo.com/customize/ie/defaults/su/msgr8/*http://www.yahoo.com
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Bar = http://us.rd.yahoo.com/customize/ie/defaults/sb/msgr8/*http://www.yahoo.com/ext/search/search.html
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = about:blank
R1 - HKCU\Software\Microsoft\Internet Explorer\SearchURL,(Default) = http://us.rd.yahoo.com/customize/ie/defaults/su/msgr8/*http://www.yahoo.com
R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,AutoConfigURL = http://192.168.5.253/proxy.pac
R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyServer = http://192.168.5.253/proxy.pac
R3 - URLSearchHook: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - (no file)
O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 7.0\ActiveX\AcroIEHelper.dll
O2 - BHO: (no name) - {43678BA0-790E-4EA9-BFDA-AE2D47C1C9F7} - C:\WINDOWS\system32\mljjh.dll
O2 - BHO: (no name) - {54CBB12C-3481-4C5D-942D-4976C0F0A406} - C:\WINDOWS\system32\fccywuv.dll
O2 - BHO: CNavExtBho Class - {BDF3E430-B101-42AD-A544-FADC6B084872} - C:\Program Files\Norton AntiVirus\NavShExt.dll
O3 - Toolbar: Norton AntiVirus - {42CDD1BF-3FFB-4238-8AD1-7859DF00B1D6} - C:\Program Files\Norton AntiVirus\NavShExt.dll
O4 - HKLM\..\Run: [SoundMAXPnP] C:\Program Files\Analog Devices\SoundMAX\SMax4PNP.exe
O4 - HKLM\..\Run: [SoundMAX] "C:\Program Files\Analog Devices\SoundMAX\smax4.exe" /tray
O4 - HKLM\..\Run: [NAV Agent] C:\PROGRA~1\NORTON~1\navapw32.exe
O4 - HKCU\..\Run: [Yahoo! Pager] "C:\Program Files\Yahoo!\Messenger\YahooMessenger.exe" -quiet
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~3\OFFICE11\EXCEL.EXE/3000
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~3\OFFICE11\REFIEBAR.DLL
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O16 - DPF: {30528230-99f7-4bb4-88d8-fa1d4f56a2ab} (Installation Support) - C:\Program Files\Yahoo!\Common\Yinsthelper.dll
O16 - DPF: {7B297BFD-85E4-4092-B2AF-16A91B2EA103} (WScanCtl Class) - http://www.ca.com/us/securityadvisor/virusinfo/webscan.cab
O18 - Protocol: ms-help - {314111C7-A502-11D2-BBCA-00C04F8EC294} - C:\Program Files\Common Files\Microsoft Shared\Help\hxds.dll
O20 - Winlogon Notify: fccywuv - C:\WINDOWS\SYSTEM32\fccywuv.dll
O20 - Winlogon Notify: mljjh - C:\WINDOWS\system32\mljjh.dll
O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
O23 - Service: SQL Server (SQLEXPRESS) (MSSQL$SQLEXPRESS) - Unknown owner - c:\Program Files\Microsoft SQL Server\MSSQL.1\MSSQL\Binn\sqlservr.exe" -sSQLEXPRESS (file missing)
O23 - Service: Norton AntiVirus Auto Protect Service (navapsvc) - Symantec Corporation - C:\Program Files\Norton AntiVirus\navapsvc.exe
O23 - Service: Oracle OLAP 9.0.1.0.1 (OLAPServer) - Oracle Corporation - C:\oracle\ora90\bin\xsolap.exe
O23 - Service: Oracle OLAP Agent - Unknown owner - C:\oracle\ora90\bin\xsaagent.exe
O23 - Service: OracleOraHome90Agent - Oracle Corporation - C:\oracle\ora90\bin\agntsrvc.exe
O23 - Service: OracleOraHome90ClientCache - Unknown owner - C:\oracle\ora90\BIN\ONRSD.EXE
O23 - Service: OracleOraHome90HTTPServer - Unknown owner - C:\oracle\ora90\Apache\Apache\Apache.exe
O23 - Service: OracleOraHome90PagingServer - Unknown owner - C:\oracle\ora90/bin/pagntsrv.exe
O23 - Service: OracleOraHome90SNMPPeerEncapsulator - Unknown owner - C:\oracle\ora90\BIN\ENCSVC.EXE
O23 - Service: OracleOraHome90SNMPPeerMasterAgent - Unknown owner - C:\oracle\ora90\BIN\AGNTSVC.EXE
O23 - Service: OracleOraHome90TNSListener - Unknown owner - C:\oracle\ora90\BIN\TNSLSNR.exe
O23 - Service: OracleServiceIULIANA - Oracle Corporation - c:\oracle\ora90\bin\ORACLE.EXE
O23 - Service: ScriptBlocking Service (SBService) - Symantec Corporation - C:\PROGRA~1\COMMON~1\SYMANT~1\SCRIPT~1\SBServ.exe
O23 - Service: SoundMAX Agent Service (SoundMAX Agent Service (default)) - Analog Devices, Inc. - C:\Program Files\Analog Devices\SoundMAX\SMAgent.exe
O23 - Service: Visibroker Smart Agent (xsSmartAgent) - Unknown owner - C:\oracle\ora90\bin\osagent.exe
Hi
Well that's not promising.
First we'll need to backup registry:
Start -> Run -> regedit -> ok. Then File -> Export. Give it a name and press Save.
Save text below as fix.reg on Notepad (save it as all files (*.*)) on Desktop
Windows Registry Editor Version 5.00
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ShellExecuteHooks]
"{54CBB12C-3481-4C5D-942D-4976C0F0A406}"=-
[-HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\j0211237]
It should look like this -> http://users.telenet.be/bluepatchy/miekiemoes/images/reg.gif
Doubleclick fix.reg, press Yes and ok.
(In case you are unsure how to create a reg file, take a look here (http://www.nellie2.co.uk/file.htm#How_to_Make_a_.Reg_File_) with screenshots.)
1. Please download The Avenger (http://swandog46.geekstogo.com/avenger.zip) by Swandog46 to your Desktop. Click on Avenger.zip to open the file Extract avenger.exe to your desktop
2. Copy all the text contained in the code box below to your Clipboard by highlighting it and pressing (Ctrl+C):
Files to delete:
C:\WINDOWS\system32\fccywuv.dll
C:\WINDOWS\system32\mljjh.dll
C:\WINDOWS\system32\aljmnlcf.exe
C:\WINDOWS\system32\j0211237.dll
Note: the above code was created specifically for this user. If you are not this user, do NOT follow these directions as they could damage the workings of your system.
3. Now, start The Avenger program by clicking on its icon on your desktop.
Under "Script file to execute" choose "Input Script Manually".
Now click on the Magnifying Glass icon which will open a new window titled "View/edit script"
Paste the text copied to clipboard into this window by pressing (Ctrl+V).
Click Done
Now click on the Green Light to begin execution of the script
Answer "Yes" twice when prompted.
4. The Avenger will automatically do the following:
It will Restart your computer. ( In cases where the code to execute contains "Drivers to Unload", The Avenger will actually restart your system twice.)
On reboot, it will briefly open a black command window on your desktop, this is normal.
After the restart, it creates a log file that should open with the results of Avenger’s actions. This log file will be located at C:\avenger.txt
The Avenger will also have backed up all the files, etc., that you asked it to delete, and will have zipped them and moved the zip archives to C:\avenger\backup.zip.
5. Please copy/paste the content of c:\avenger.txt into your reply along with a fresh HJT log by using Add/Reply
Re-run combofix
Post:
- a fresh HijackThis log
- c:\avenger.txt
- combofix report
superglue
2007-06-07, 20:10
Seems to be working. The antivirus stopped bugging me. I re-ran combofix with the previous argument ("%userprofile%\desktop\ComboFix.exe" /v fccywuv isldeawj cvutrhcg mljjh gpowaimm wineak32)
Avenger Log:
Logfile of The Avenger version 1, by Swandog46
Running from registry key:
\Registry\Machine\System\CurrentControlSet\Services\^ulkncvy
*******************
Script file located at: \??\C:\WINDOWS\system32\acgvqndk.txt
Script file opened successfully.
Script file read successfully
Backups directory opened successfully at C:\Avenger
*******************
Beginning to process script file:
File C:\WINDOWS\system32\fccywuv.dll deleted successfully.
File C:\WINDOWS\system32\mljjh.dll deleted successfully.
File C:\WINDOWS\system32\aljmnlcf.exe deleted successfully.
File C:\WINDOWS\system32\j0211237.dll deleted successfully.
Completed script processing.
*******************
Finished! Terminate.
Combofix log:
"superglue" - 2007-06-07 19:59:32 Service Pack 2 NTFS
ComboFix 07-06-3B - Running from: "C:\Documents and Settings\superglue\Desktop\"
Command switches used :: "/v fccywuv isldeawj cvutrhcg mljjh gpowaimm wineak32"
((((((((((((((((((((((((( Files Created from 2007-05-07 to 2007-06-07 )))))))))))))))))))))))))))))))
2007-06-07 19:56 <DIR> d-------- C:\avenger
2007-06-07 18:46 49,152 --a------ C:\WINDOWS\nircmd.exe
2007-06-07 14:24 <DIR> d-------- C:\VundoFix Backups
2007-06-06 18:09 <DIR> d-------- C:\New Folder
2007-06-06 17:05 <DIR> d-------- C:\WINDOWS\CSC
2007-06-06 15:26 <DIR> d-------- C:\DOCUME~1\ALLUSE~1\APPLIC~1\Spybot - Search & Destroy
2007-05-25 17:19 <DIR> d-------- C:\WINDOWS\system32\appmgmt
2007-05-23 16:24 <DIR> d-------- C:\WINDOWS\pss
2007-05-23 12:14 <DIR> d-------- C:\Program Files\Ulead PhotoImpact 8
2007-05-20 11:53 5,632 --a------ C:\WINDOWS\system32\ptpusb.dll
2007-05-20 11:53 159,232 --a------ C:\WINDOWS\system32\ptpusd.dll
2007-05-20 11:53 15,104 --a------ C:\WINDOWS\system32\drivers\usbscan.sys
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
2007-06-05 10:29:29 -------- d-----w C:\Program Files\StrongDC++
2007-05-25 16:11:10 -------- d-----w C:\Program Files\Yahoo!
2007-05-23 09:26:57 -------- d--h--w C:\Program Files\InstallShield Installation Information
2007-05-04 19:41:45 -------- d-----w C:\DOCUME~1\SUPERG~1\APPLIC~1\VoipDiscount
2007-05-04 08:59:25 -------- d-----w C:\DOCUME~1\SUPERG~1\APPLIC~1\Help
2007-05-02 11:13:53 -------- d-----w C:\Program Files\DC1300
2007-05-01 15:48:51 -------- d--h--r C:\DOCUME~1\SUPERG~1\APPLIC~1\yahoo!
2007-04-26 16:29:51 -------- d-----w C:\Program Files\Winamp
2007-04-26 12:13:54 -------- d-----w C:\DOCUME~1\SUPERG~1\APPLIC~1\AdobeUM
2007-04-25 12:22:09 -------- d-----w C:\Program Files\Oracle
2007-04-24 22:33:23 -------- d-----w C:\Program Files\Common Files\Ahead
2007-04-24 22:31:33 -------- d-----w C:\DOCUME~1\SUPERG~1\APPLIC~1\Ahead
2007-04-24 22:30:17 -------- d-----w C:\Program Files\Nero
2007-04-24 22:21:57 -------- d-----w C:\Program Files\Microsoft ActiveSync
2007-04-24 09:11:52 -------- d-----w C:\Program Files\HAM
2007-04-24 09:06:00 151,774 ----a-w C:\WINDOWS\HAM Uninstaller.exe
2007-04-23 16:07:23 -------- d-----w C:\Program Files\Common Files\ODBC
2007-04-23 16:07:20 -------- d-----w C:\Program Files\Common Files\SpeechEngines
2007-04-23 15:38:47 -------- d-----w C:\DOCUME~1\SUPERG~1\APPLIC~1\Ulead Systems
2007-04-23 15:36:41 -------- d-----w C:\DOCUME~1\SUPERG~1\APPLIC~1\vlc
2007-04-23 15:36:15 -------- d-----w C:\Program Files\VideoLAN
2007-04-23 15:15:48 -------- d-----w C:\Program Files\WinAce
2007-04-23 15:04:50 1,156 ----a-w C:\WINDOWS\mozver.dat
2007-04-23 14:42:08 -------- d-----w C:\Program Files\Norton AntiVirus
2007-04-23 14:39:52 -------- d-----w C:\Program Files\Symantec
2007-04-23 14:39:47 -------- d-----w C:\Program Files\Common Files\Symantec Shared
2007-04-23 14:39:37 -------- d-----w C:\DOCUME~1\SUPERG~1\APPLIC~1\Symantec
2007-04-23 14:37:09 0 ----a-w C:\WINDOWS\nsreg.dat
2007-04-23 14:34:45 -------- d-----w C:\Program Files\Common Files\InstallShield
2007-04-23 14:18:19 -------- d-----w C:\Program Files\Microsoft SQL Server
2007-04-23 14:16:57 -------- d-----w C:\Program Files\Microsoft.NET
2007-04-23 14:15:29 -------- d-----w C:\Program Files\Microsoft Device Emulator
2007-04-23 14:15:22 -------- d-----w C:\Program Files\Microsoft SQL Server 2005 Mobile Edition
2007-04-23 14:11:10 -------- d-----w C:\Program Files\Microsoft Visual Studio 8
2007-04-23 14:10:59 -------- d-----w C:\Program Files\MSBuild
2007-04-23 14:10:52 -------- d-----w C:\Program Files\HTML Help Workshop
2007-04-23 14:10:05 -------- d-----w C:\Program Files\Common Files\Merge Modules
2007-04-23 14:07:28 -------- d-----w C:\Program Files\Common Files\Business Objects
2007-04-23 14:06:41 -------- d-----w C:\Program Files\CE Remote Tools
2007-04-23 13:54:54 -------- d-----w C:\Program Files\DAEMON Tools
2007-04-23 13:53:40 639,224 ----a-w C:\WINDOWS\system32\drivers\sptd.sys
2007-04-23 13:46:27 -------- d-----w C:\Program Files\Marvell
2007-04-23 13:39:44 -------- d-----w C:\Program Files\Analog Devices
2007-04-23 13:17:38 -------- d-----w C:\Program Files\microsoft frontpage
2007-04-23 13:17:21 0 --sha-r C:\MSDOS.SYS
2007-04-23 13:17:21 0 --sha-r C:\IO.SYS
2007-04-23 13:17:21 0 ----a-w C:\CONFIG.SYS
2007-04-23 13:17:21 0 ----a-w C:\AUTOEXEC.BAT
2007-04-23 13:16:00 -------- d--h--w C:\Program Files\WindowsUpdate
2007-04-23 13:15:56 -------- d-----w C:\Program Files\Online Services
2007-04-23 13:14:56 -------- d-----w C:\Program Files\Common Files\MSSoap
2007-04-23 13:14:44 -------- d-----w C:\Program Files\Movie Maker
2007-04-23 13:13:47 21,640 ----a-w C:\WINDOWS\system32\emptyregdb.dat
2007-04-23 13:13:23 -------- d-----w C:\Program Files\Messenger
2007-04-23 13:13:17 -------- d-----w C:\Program Files\MSN Gaming Zone
2007-04-23 13:13:05 -------- d-----w C:\Program Files\Windows NT
2007-04-16 12:37:50 25 ---h--w C:\WINDOWS\qtf.dat
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
*Note* empty entries & legit default entries are not shown
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects]
{06849E9F-C8D7-4D59-B87D-784B7D6BE0B3}=C:\Program Files\Adobe\Acrobat 7.0\ActiveX\AcroIEHelper.dll [2004-12-14 01:56]
{54CBB12C-3481-4C5D-942D-4976C0F0A406}=C:\WINDOWS\system32\fccywuv.dll []
{7BB7F77B-EBB2-4B9A-ACA4-2C574C068525}=C:\WINDOWS\system32\mljjh.dll []
{BDF3E430-B101-42AD-A544-FADC6B084872}=C:\Program Files\Norton AntiVirus\NavShExt.dll [2001-08-16 16:35]
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"SoundMAXPnP"="C:\Program Files\Analog Devices\SoundMAX\SMax4PNP.exe" [2004-10-14 09:11]
"SoundMAX"="C:\Program Files\Analog Devices\SoundMAX\smax4.exe" [2004-09-23 12:41]
"NAV Agent"="C:\PROGRA~1\NORTON~1\navapw32.exe" [2001-08-16 17:52]
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"Yahoo! Pager"="C:\PROGRA~1\Yahoo!\MESSEN~1\YAHOOM~1.exe" [2007-03-27 15:22]
[HKEY_USERS\.default\software\microsoft\windows\currentversion\runonce]
"RunNarrator"=Narrator.exe
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ShellExecuteHooks]
"{54CBB12C-3481-4C5D-942D-4976C0F0A406}"="C:\WINDOWS\system32\fccywuv.dll" []
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\fccywuv]
fccywuv.dll
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\mljjh]
C:\WINDOWS\system32\mljjh.dll
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^Adobe Reader Speed Launch.lnk]
path=C:\Documents and Settings\All Users\Start Menu\Programs\Startup\Adobe Reader Speed Launch.lnk
backup=C:\WINDOWS\pss\Adobe Reader Speed Launch.lnkCommon Startup
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupfolder\C:^Documents and Settings^superglue^Start Menu^Programs^Startup^Yahoo! Widget Engine.lnk]
path=C:\Documents and Settings\superglue\Start Menu\Programs\Startup\Yahoo! Widget Engine.lnk
backup=C:\WINDOWS\pss\Yahoo! Widget Engine.lnkStartup
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\ApachInc]
rundll32.exe "C:\WINDOWS\system32\tcatrrpy.dll",realset
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\DAEMON Tools]
"C:\Program Files\DAEMON Tools\daemon.exe" -lang 1033
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\DC1300 Monitor]
C:\Program Files\DC1300\DCMnt1_0\DC1300mi.exe
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\NeroFilterCheck]
C:\WINDOWS\system32\NeroCheck.exe
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\VoipDiscount]
"C:\Program Files\VoipDiscount.com\VoipDiscount\VoipDiscount.exe" -nosplash -minimized
HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\svchost *netsvcs*
Contents of the 'Scheduled Tasks' folder
2007-06-07 16:57:37 C:\WINDOWS\tasks\Symantec NetDetect.job
**************************************************************************
catchme 0.3.692 W2K/XP/Vista - userland rootkit detector by Gmer, http://www.gmer.net
Rootkit scan 2007-06-07 20:02:39
Windows 5.1.2600 Service Pack 2 NTFS
scanning hidden processes ...
scanning hidden autostart entries ...
scanning hidden files ...
scan completed successfully
hidden files: 0
**************************************************************************
Completion time: 2007-06-07 20:03:06
C:\ComboFix-quarantined-files.txt ... 2007-06-07 20:03
C:\ComboFix2.txt ... 2007-06-07 18:45
--- E O F ---
superglue
2007-06-07, 20:11
HJT log:
Logfile of HijackThis v1.99.1
Scan saved at 8:06:24 PM, on 6/7/2007
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)
Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\Analog Devices\SoundMAX\SMax4PNP.exe
C:\Program Files\Analog Devices\SoundMAX\smax4.exe
C:\PROGRA~1\NORTON~1\navapw32.exe
C:\Program Files\Norton AntiVirus\navapsvc.exe
C:\oracle\ora90\bin\agntsrvc.exe
C:\oracle\ora90\BIN\TNSLSNR.exe
C:\WINDOWS\system32\cmd.exe
c:\oracle\ora90\bin\ORACLE.EXE
C:\Program Files\Analog Devices\SoundMAX\SMAgent.exe
C:\WINDOWS\system32\svchost.exe
C:\oracle\ora90\bin\dbsnmp.exe
C:\WINDOWS\system32\wscntfy.exe
C:\PROGRA~1\Yahoo!\MESSEN~1\ymsgr_tray.exe
C:\WINDOWS\system32\wuauclt.exe
C:\New Folder\scanner.exe
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://www.yahoo.com/
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://us.rd.yahoo.com/customize/ie/defaults/su/msgr8/*http://www.yahoo.com
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Bar = http://us.rd.yahoo.com/customize/ie/defaults/sb/msgr8/*http://www.yahoo.com/ext/search/search.html
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = about:blank
R1 - HKCU\Software\Microsoft\Internet Explorer\SearchURL,(Default) = http://us.rd.yahoo.com/customize/ie/defaults/su/msgr8/*http://www.yahoo.com
R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,AutoConfigURL = http://192.168.5.253/proxy.pac
R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyServer = http://192.168.5.253/proxy.pac
R3 - URLSearchHook: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - (no file)
O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 7.0\ActiveX\AcroIEHelper.dll
O2 - BHO: (no name) - {54CBB12C-3481-4C5D-942D-4976C0F0A406} - C:\WINDOWS\system32\fccywuv.dll (file missing)
O2 - BHO: (no name) - {7BB7F77B-EBB2-4B9A-ACA4-2C574C068525} - C:\WINDOWS\system32\mljjh.dll (file missing)
O2 - BHO: CNavExtBho Class - {BDF3E430-B101-42AD-A544-FADC6B084872} - C:\Program Files\Norton AntiVirus\NavShExt.dll
O3 - Toolbar: Norton AntiVirus - {42CDD1BF-3FFB-4238-8AD1-7859DF00B1D6} - C:\Program Files\Norton AntiVirus\NavShExt.dll
O4 - HKLM\..\Run: [SoundMAXPnP] C:\Program Files\Analog Devices\SoundMAX\SMax4PNP.exe
O4 - HKLM\..\Run: [SoundMAX] "C:\Program Files\Analog Devices\SoundMAX\smax4.exe" /tray
O4 - HKLM\..\Run: [NAV Agent] C:\PROGRA~1\NORTON~1\navapw32.exe
O4 - HKCU\..\Run: [Yahoo! Pager] "C:\PROGRA~1\Yahoo!\MESSEN~1\YAHOOM~1.EXE" -quiet
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~3\OFFICE11\EXCEL.EXE/3000
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~3\OFFICE11\REFIEBAR.DLL
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O16 - DPF: {30528230-99f7-4bb4-88d8-fa1d4f56a2ab} (Installation Support) - C:\Program Files\Yahoo!\Common\Yinsthelper.dll
O16 - DPF: {7B297BFD-85E4-4092-B2AF-16A91B2EA103} (WScanCtl Class) - http://www.ca.com/us/securityadvisor/virusinfo/webscan.cab
O18 - Protocol: ms-help - {314111C7-A502-11D2-BBCA-00C04F8EC294} - C:\Program Files\Common Files\Microsoft Shared\Help\hxds.dll
O20 - Winlogon Notify: fccywuv - fccywuv.dll (file missing)
O20 - Winlogon Notify: mljjh - C:\WINDOWS\system32\mljjh.dll (file missing)
O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
O23 - Service: SQL Server (SQLEXPRESS) (MSSQL$SQLEXPRESS) - Unknown owner - c:\Program Files\Microsoft SQL Server\MSSQL.1\MSSQL\Binn\sqlservr.exe" -sSQLEXPRESS (file missing)
O23 - Service: Norton AntiVirus Auto Protect Service (navapsvc) - Symantec Corporation - C:\Program Files\Norton AntiVirus\navapsvc.exe
O23 - Service: Oracle OLAP 9.0.1.0.1 (OLAPServer) - Oracle Corporation - C:\oracle\ora90\bin\xsolap.exe
O23 - Service: Oracle OLAP Agent - Unknown owner - C:\oracle\ora90\bin\xsaagent.exe
O23 - Service: OracleOraHome90Agent - Oracle Corporation - C:\oracle\ora90\bin\agntsrvc.exe
O23 - Service: OracleOraHome90ClientCache - Unknown owner - C:\oracle\ora90\BIN\ONRSD.EXE
O23 - Service: OracleOraHome90HTTPServer - Unknown owner - C:\oracle\ora90\Apache\Apache\Apache.exe
O23 - Service: OracleOraHome90PagingServer - Unknown owner - C:\oracle\ora90/bin/pagntsrv.exe
O23 - Service: OracleOraHome90SNMPPeerEncapsulator - Unknown owner - C:\oracle\ora90\BIN\ENCSVC.EXE
O23 - Service: OracleOraHome90SNMPPeerMasterAgent - Unknown owner - C:\oracle\ora90\BIN\AGNTSVC.EXE
O23 - Service: OracleOraHome90TNSListener - Unknown owner - C:\oracle\ora90\BIN\TNSLSNR.exe
O23 - Service: OracleServiceIULIANA - Oracle Corporation - c:\oracle\ora90\bin\ORACLE.EXE
O23 - Service: ScriptBlocking Service (SBService) - Symantec Corporation - C:\PROGRA~1\COMMON~1\SYMANT~1\SCRIPT~1\SBServ.exe
O23 - Service: SoundMAX Agent Service (SoundMAX Agent Service (default)) - Analog Devices, Inc. - C:\Program Files\Analog Devices\SoundMAX\SMAgent.exe
O23 - Service: Visibroker Smart Agent (xsSmartAgent) - Unknown owner - C:\oracle\ora90\bin\osagent.exe
Hi
Well, avenger is one of strongest tools available when it comes to deleting so I'm glad it didn't fail.
Open HijackThis, click do system scan only and checkmark these:
R3 - URLSearchHook: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - (no file)
O2 - BHO: (no name) - {54CBB12C-3481-4C5D-942D-4976C0F0A406} - C:\WINDOWS\system32\fccywuv.dll (file missing)
O2 - BHO: (no name) - {7BB7F77B-EBB2-4B9A-ACA4-2C574C068525} - C:\WINDOWS\system32\mljjh.dll (file missing)
O20 - Winlogon Notify: fccywuv - fccywuv.dll (file missing)
O20 - Winlogon Notify: mljjh - C:\WINDOWS\system32\mljjh.dll (file missing)
Close all windows including browser and press fix checked.
Reboot
Please do an online scan with Kaspersky Online Scanner (http://www.kaspersky.com/downloads/kws/kavwebscan.html). You will be prompted to install an ActiveX component from Kaspersky, Click Yes.
The program will launch and then start to download the latest definition files.
Once the scanner is installed and the definitions downloaded, click Next.
Now click on Scan Settings
In the scan settings make sure that the following are selected:
o Scan using the following Anti-Virus database:
+ Extended (If available otherwise Standard)
o Scan Options:
+ Scan Archives
+ Scan Mail Bases
Click OK
Now under select a target to scan select My Computer
The scan will take a while so be patient and let it run. Once the scan is complete it will display if your system has been infected.
Now click on the Save as Text button
Save the file to your desktop.
Copy and paste that information in your next post.
Post:
- a fresh HijackThis log
- kaspersky report
superglue
2007-06-07, 23:02
Kaspersky log:
-------------------------------------------------------------------------------
KASPERSKY ONLINE SCANNER REPORT
Thursday, June 07, 2007 10:56:31 PM
Operating System: Microsoft Windows XP Professional, Service Pack 2 (Build 2600)
Kaspersky Online Scanner version: 5.0.93.0
Kaspersky Anti-Virus database last update: 7/06/2007
Kaspersky Anti-Virus database records: 341420
-------------------------------------------------------------------------------
Scan Settings:
Scan using the following antivirus database: extended
Scan Archives: true
Scan Mail Bases: true
Scan Target - My Computer:
C:\
D:\
E:\
F:\
G:\
H:\
I:\
Scan Statistics:
Total number of scanned objects: 142195
Number of viruses found: 10
Number of infected objects: 42
Number of suspicious objects: 4
Duration of the scan process: 01:55:07
Infected Object Name / Virus Name / Last Action
C:\avenger\backup.zip/avenger/fccywuv.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.jp skipped
C:\avenger\backup.zip/avenger/j0211237.dll Infected: Trojan-Clicker.Win32.Small.mw skipped
C:\avenger\backup.zip/avenger/mljjh.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.fp skipped
C:\avenger\backup.zip ZIP: infected - 3 skipped
C:\Documents and Settings\LocalService\Cookies\index.dat Object is locked skipped
C:\Documents and Settings\LocalService\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat Object is locked skipped
C:\Documents and Settings\LocalService\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat.LOG Object is locked skipped
C:\Documents and Settings\LocalService\Local Settings\History\History.IE5\index.dat Object is locked skipped
C:\Documents and Settings\LocalService\Local Settings\Temporary Internet Files\Content.IE5\index.dat Object is locked skipped
C:\Documents and Settings\LocalService\NTUSER.DAT Object is locked skipped
C:\Documents and Settings\LocalService\ntuser.dat.LOG Object is locked skipped
C:\Documents and Settings\NetworkService\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat Object is locked skipped
C:\Documents and Settings\NetworkService\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat.LOG Object is locked skipped
C:\Documents and Settings\NetworkService\Local Settings\Temp\Perflib_Perfdata_108.dat Object is locked skipped
C:\Documents and Settings\NetworkService\NTUSER.DAT Object is locked skipped
C:\Documents and Settings\NetworkService\ntuser.dat.LOG Object is locked skipped
C:\Documents and Settings\superglue\Application Data\Mozilla\Firefox\Profiles\19hyasob.default\cert8.db Object is locked skipped
C:\Documents and Settings\superglue\Application Data\Mozilla\Firefox\Profiles\19hyasob.default\formhistory.dat Object is locked skipped
C:\Documents and Settings\superglue\Application Data\Mozilla\Firefox\Profiles\19hyasob.default\history.dat Object is locked skipped
C:\Documents and Settings\superglue\Application Data\Mozilla\Firefox\Profiles\19hyasob.default\key3.db Object is locked skipped
C:\Documents and Settings\superglue\Application Data\Mozilla\Firefox\Profiles\19hyasob.default\parent.lock Object is locked skipped
C:\Documents and Settings\superglue\Application Data\Mozilla\Firefox\Profiles\19hyasob.default\search.sqlite Object is locked skipped
C:\Documents and Settings\superglue\Application Data\Mozilla\Firefox\Profiles\19hyasob.default\urlclassifier2.sqlite Object is locked skipped
C:\Documents and Settings\superglue\Cookies\index.dat Object is locked skipped
C:\Documents and Settings\superglue\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat Object is locked skipped
C:\Documents and Settings\superglue\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat.LOG Object is locked skipped
C:\Documents and Settings\superglue\Local Settings\Application Data\Mozilla\Firefox\Profiles\19hyasob.default\Cache\_CACHE_001_ Object is locked skipped
C:\Documents and Settings\superglue\Local Settings\Application Data\Mozilla\Firefox\Profiles\19hyasob.default\Cache\_CACHE_002_ Object is locked skipped
C:\Documents and Settings\superglue\Local Settings\Application Data\Mozilla\Firefox\Profiles\19hyasob.default\Cache\_CACHE_003_ Object is locked skipped
C:\Documents and Settings\superglue\Local Settings\Application Data\Mozilla\Firefox\Profiles\19hyasob.default\Cache\_CACHE_MAP_ Object is locked skipped
C:\Documents and Settings\superglue\Local Settings\History\History.IE5\index.dat Object is locked skipped
C:\Documents and Settings\superglue\Local Settings\Temp\Perflib_Perfdata_a38.dat Object is locked skipped
C:\Documents and Settings\superglue\Local Settings\Temp\~DF1D0E.tmp Object is locked skipped
C:\Documents and Settings\superglue\Local Settings\Temporary Internet Files\Content.IE5\index.dat Object is locked skipped
C:\Documents and Settings\superglue\NTUSER.DAT Object is locked skipped
C:\Documents and Settings\superglue\ntuser.dat.LOG Object is locked skipped
C:\oracle\ora90\network\agent\blackout.q Object is locked skipped
C:\oracle\ora90\network\agent\ereg.q Object is locked skipped
C:\oracle\ora90\network\agent\evocc1.q Object is locked skipped
C:\oracle\ora90\network\agent\job.q Object is locked skipped
C:\oracle\ora90\network\agent\jstat1.q Object is locked skipped
C:\oracle\ora90\network\agent\reco\service.vps Object is locked skipped
C:\oracle\ora90\network\agent\user.q Object is locked skipped
C:\oracle\ora90\network\log\agntsrvc.log Object is locked skipped
C:\oracle\ora90\network\log\dbsnmp.log Object is locked skipped
C:\oracle\ora90\network\log\listener.log Object is locked skipped
C:\oracle\ora90\network\log\OracleOraHome90Agent.nohup Object is locked skipped
C:\oracle\oradata\iuliana\CONTROL01.CTL Object is locked skipped
C:\oracle\oradata\iuliana\CONTROL02.CTL Object is locked skipped
C:\oracle\oradata\iuliana\CONTROL03.CTL Object is locked skipped
C:\oracle\oradata\iuliana\CWMLITE01.DBF Object is locked skipped
C:\oracle\oradata\iuliana\DRSYS01.DBF Object is locked skipped
C:\oracle\oradata\iuliana\EXAMPLE01.DBF Object is locked skipped
C:\oracle\oradata\iuliana\INDX01.DBF Object is locked skipped
C:\oracle\oradata\iuliana\REDO03.LOG Object is locked skipped
C:\oracle\oradata\iuliana\SYSTEM01.DBF Object is locked skipped
C:\oracle\oradata\iuliana\TEMP01.DBF Object is locked skipped
C:\oracle\oradata\iuliana\TOOLS01.DBF Object is locked skipped
C:\oracle\oradata\iuliana\UNDOTBS01.DBF Object is locked skipped
C:\oracle\oradata\iuliana\USERS01.DBF Object is locked skipped
C:\Program Files\Microsoft SQL Server\MSSQL.1\MSSQL\Data\master.mdf Object is locked skipped
C:\Program Files\Microsoft SQL Server\MSSQL.1\MSSQL\Data\mastlog.ldf Object is locked skipped
C:\Program Files\Microsoft SQL Server\MSSQL.1\MSSQL\Data\model.mdf Object is locked skipped
C:\Program Files\Microsoft SQL Server\MSSQL.1\MSSQL\Data\modellog.ldf Object is locked skipped
C:\Program Files\Microsoft SQL Server\MSSQL.1\MSSQL\Data\msdbdata.mdf Object is locked skipped
C:\Program Files\Microsoft SQL Server\MSSQL.1\MSSQL\Data\msdblog.ldf Object is locked skipped
C:\Program Files\Microsoft SQL Server\MSSQL.1\MSSQL\Data\tempdb.mdf Object is locked skipped
C:\Program Files\Microsoft SQL Server\MSSQL.1\MSSQL\Data\templog.ldf Object is locked skipped
C:\Program Files\Microsoft SQL Server\MSSQL.1\MSSQL\LOG\ERRORLOG Object is locked skipped
C:\Program Files\Microsoft SQL Server\MSSQL.1\MSSQL\LOG\log_165.trc Object is locked skipped
C:\Program Files\Norton AntiVirus\Quarantine\03060D6C.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.jp skipped
C:\Program Files\Norton AntiVirus\Quarantine\05C85AF7.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.jp skipped
C:\Program Files\Norton AntiVirus\Quarantine\1BCA3D07.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.jp skipped
C:\Program Files\Norton AntiVirus\Quarantine\1BFB32D1.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.jp skipped
C:\Program Files\Norton AntiVirus\Quarantine\1E6F08FA.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.jp skipped
C:\Program Files\Norton AntiVirus\Quarantine\1E8C02D9.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.jp skipped
C:\Program Files\Norton AntiVirus\Quarantine\1E9356D2.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.jp skipped
C:\Program Files\Norton AntiVirus\Quarantine\1E9D54C7.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.jp skipped
C:\Program Files\Norton AntiVirus\Quarantine\222E4891.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.jp skipped
C:\Program Files\Norton AntiVirus\Quarantine\22AD4D73.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.fp skipped
C:\Program Files\Norton AntiVirus\Quarantine\23D4690A.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.fp skipped
C:\Program Files\Norton AntiVirus\Quarantine\23EF38ED.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.fp skipped
C:\Program Files\Norton AntiVirus\Quarantine\23FC60DF.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.fp skipped
C:\Program Files\Norton AntiVirus\Quarantine\24055ED4.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.fp skipped
C:\Program Files\Norton AntiVirus\Quarantine\3B1B6091.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.fp skipped
C:\Program Files\Norton AntiVirus\Quarantine\415C168A.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.fp skipped
C:\Program Files\Norton AntiVirus\Quarantine\5A343A58.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.fp skipped
C:\Program Files\Norton AntiVirus\Quarantine\5E565DCB.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.fp skipped
C:\Program Files\Yahoo!\Messenger\logs\billing_superglue.log Object is locked skipped
C:\Program Files\Yahoo!\Messenger\logs\client_superglue.log Object is locked skipped
C:\Program Files\Yahoo!\Messenger\logs\network_superglue.log Object is locked skipped
C:\QooBox\Quarantine\C\WINDOWS\system32\bwqsbdax.dll.vir Suspicious: Packed.Win32.Morphine.a skipped
C:\QooBox\Quarantine\C\WINDOWS\system32\cvutrhcg.dll.vir Suspicious: Packed.Win32.Morphine.a skipped
C:\QooBox\Quarantine\C\WINDOWS\system32\gpowaimm.dll.vir Object is locked skipped
C:\QooBox\Quarantine\C\WINDOWS\system32\wineak32.dll.vir Infected: Trojan.Win32.Dialer.qn skipped
C:\System Volume Information\MountPointManagerRemoteDatabase Object is locked skipped
C:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP44\A0006928.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.fp skipped
C:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP46\A0007084.dll Infected: Trojan.Win32.BHO.bd skipped
C:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP46\A0007109.exe Infected: Trojan.Win32.Agent.anr skipped
C:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP46\A0007110.exe Infected: Trojan.Win32.Agent.anr skipped
C:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP46\A0007112.exe Infected: Trojan.Win32.Agent.anr skipped
C:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP46\A0007113.exe Infected: Trojan.Win32.Agent.anr skipped
C:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP46\A0007199.dll Suspicious: Packed.Win32.Morphine.a skipped
C:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP46\A0007200.dll Infected: Trojan.Win32.Dialer.qn skipped
C:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP46\A0007201.dll Suspicious: Packed.Win32.Morphine.a skipped
C:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP46\A0007301.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.jp skipped
C:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP46\A0007302.dll Infected: Trojan-Clicker.Win32.Small.mw skipped
C:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP46\A0007303.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.fp skipped
C:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP46\change.log Object is locked skipped
C:\WINDOWS\Debug\PASSWD.LOG Object is locked skipped
C:\WINDOWS\SchedLgU.Txt Object is locked skipped
C:\WINDOWS\SoftwareDistribution\ReportingEvents.log Object is locked skipped
C:\WINDOWS\Sti_Trace.log Object is locked skipped
C:\WINDOWS\system32\CatRoot2\edb.log Object is locked skipped
C:\WINDOWS\system32\CatRoot2\tmp.edb Object is locked skipped
C:\WINDOWS\system32\config\AppEvent.Evt Object is locked skipped
C:\WINDOWS\system32\config\default Object is locked skipped
C:\WINDOWS\system32\config\default.LOG Object is locked skipped
C:\WINDOWS\system32\config\SAM Object is locked skipped
C:\WINDOWS\system32\config\SAM.LOG Object is locked skipped
C:\WINDOWS\system32\config\SecEvent.Evt Object is locked skipped
C:\WINDOWS\system32\config\SECURITY Object is locked skipped
C:\WINDOWS\system32\config\SECURITY.LOG Object is locked skipped
C:\WINDOWS\system32\config\software Object is locked skipped
C:\WINDOWS\system32\config\software.LOG Object is locked skipped
C:\WINDOWS\system32\config\SysEvent.Evt Object is locked skipped
C:\WINDOWS\system32\config\system Object is locked skipped
C:\WINDOWS\system32\config\system.LOG Object is locked skipped
C:\WINDOWS\system32\drivers\sptd.sys Object is locked skipped
C:\WINDOWS\system32\h323log.txt Object is locked skipped
C:\WINDOWS\system32\wbem\Repository\FS\INDEX.BTR Object is locked skipped
C:\WINDOWS\system32\wbem\Repository\FS\INDEX.MAP Object is locked skipped
C:\WINDOWS\system32\wbem\Repository\FS\MAPPING.VER Object is locked skipped
C:\WINDOWS\system32\wbem\Repository\FS\MAPPING1.MAP Object is locked skipped
C:\WINDOWS\system32\wbem\Repository\FS\MAPPING2.MAP Object is locked skipped
C:\WINDOWS\system32\wbem\Repository\FS\OBJECTS.DATA Object is locked skipped
C:\WINDOWS\system32\wbem\Repository\FS\OBJECTS.MAP Object is locked skipped
C:\WINDOWS\wiadebug.log Object is locked skipped
C:\WINDOWS\wiaservc.log Object is locked skipped
C:\WINDOWS\WindowsUpdate.log Object is locked skipped
D:\System Volume Information\MountPointManagerRemoteDatabase Object is locked skipped
E:\System Volume Information\MountPointManagerRemoteDatabase Object is locked skipped
F:\Kit\i_bpk_lite.exe/data.rar/bpkhk.dll Infected: not-a-virus:Monitor.Win32.Perflogger.az skipped
F:\Kit\i_bpk_lite.exe/data.rar/bpkwb.dll Infected: not-a-virus:Monitor.Win32.Perflogger.az skipped
F:\Kit\i_bpk_lite.exe/data.rar/bpk.exe Infected: not-a-virus:Monitor.Win32.Perflogger.az skipped
F:\Kit\i_bpk_lite.exe/data.rar/BPKr.exe Infected: Trojan-Spy.Win32.Perfloger.o skipped
F:\Kit\i_bpk_lite.exe/data.rar Infected: Trojan-Spy.Win32.Perfloger.o skipped
F:\Kit\i_bpk_lite.exe RarSFX: infected - 5 skipped
F:\Kit\Y! Messenger Stuff\De sters din friends list-ul altuia\ZaksNoBuddy_Install.exe/0001\F7\ZaksNoBuddy.exe Infected: HackTool.Win32.VB.hf skipped
F:\Kit\Y! Messenger Stuff\De sters din friends list-ul altuia\ZaksNoBuddy_Install.exe Tarma: infected - 1 skipped
F:\Kit\Y! Messenger Stuff\De sters din friends list-ul altuia\ZaksNoBuddy_Install.exe UPX: infected - 1 skipped
F:\System Volume Information\MountPointManagerRemoteDatabase Object is locked skipped
G:\System Volume Information\MountPointManagerRemoteDatabase Object is locked skipped
Scan process completed.
superglue
2007-06-07, 23:03
HJT log:
Logfile of HijackThis v1.99.1
Scan saved at 10:59:58 PM, on 6/7/2007
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)
Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\Analog Devices\SoundMAX\SMax4PNP.exe
C:\Program Files\Analog Devices\SoundMAX\smax4.exe
C:\PROGRA~1\NORTON~1\navapw32.exe
C:\Program Files\Norton AntiVirus\navapsvc.exe
C:\oracle\ora90\bin\agntsrvc.exe
C:\oracle\ora90\BIN\TNSLSNR.exe
C:\WINDOWS\system32\cmd.exe
c:\oracle\ora90\bin\ORACLE.EXE
C:\Program Files\Analog Devices\SoundMAX\SMAgent.exe
C:\WINDOWS\system32\svchost.exe
C:\oracle\ora90\bin\dbsnmp.exe
C:\WINDOWS\system32\wscntfy.exe
C:\Program Files\Yahoo!\Messenger\ymsgr_tray.exe
C:\WINDOWS\system32\wuauclt.exe
C:\New Folder\scanner.exe
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://www.yahoo.com/
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://us.rd.yahoo.com/customize/ie/defaults/su/msgr8/*http://www.yahoo.com
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Bar = http://us.rd.yahoo.com/customize/ie/defaults/sb/msgr8/*http://www.yahoo.com/ext/search/search.html
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = about:blank
R1 - HKCU\Software\Microsoft\Internet Explorer\SearchURL,(Default) = http://us.rd.yahoo.com/customize/ie/defaults/su/msgr8/*http://www.yahoo.com
R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,AutoConfigURL = http://192.168.5.253/proxy.pac
R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyServer = http://192.168.5.253/proxy.pac
O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 7.0\ActiveX\AcroIEHelper.dll
O2 - BHO: CNavExtBho Class - {BDF3E430-B101-42AD-A544-FADC6B084872} - C:\Program Files\Norton AntiVirus\NavShExt.dll
O3 - Toolbar: Norton AntiVirus - {42CDD1BF-3FFB-4238-8AD1-7859DF00B1D6} - C:\Program Files\Norton AntiVirus\NavShExt.dll
O4 - HKLM\..\Run: [SoundMAXPnP] C:\Program Files\Analog Devices\SoundMAX\SMax4PNP.exe
O4 - HKLM\..\Run: [SoundMAX] "C:\Program Files\Analog Devices\SoundMAX\smax4.exe" /tray
O4 - HKLM\..\Run: [NAV Agent] C:\PROGRA~1\NORTON~1\navapw32.exe
O4 - HKCU\..\Run: [Yahoo! Pager] "C:\Program Files\Yahoo!\Messenger\YahooMessenger.exe" -quiet
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~3\OFFICE11\EXCEL.EXE/3000
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~3\OFFICE11\REFIEBAR.DLL
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O16 - DPF: {0EB0E74A-2A76-4AB3-A7FB-9BD8C29F7F75} (CKAVWebScan Object) - http://www.kaspersky.com/kos/english/kavwebscan_unicode.cab
O16 - DPF: {30528230-99f7-4bb4-88d8-fa1d4f56a2ab} (Installation Support) - C:\Program Files\Yahoo!\Common\Yinsthelper.dll
O16 - DPF: {7B297BFD-85E4-4092-B2AF-16A91B2EA103} (WScanCtl Class) - http://www.ca.com/us/securityadvisor/virusinfo/webscan.cab
O18 - Protocol: ms-help - {314111C7-A502-11D2-BBCA-00C04F8EC294} - C:\Program Files\Common Files\Microsoft Shared\Help\hxds.dll
O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
O23 - Service: SQL Server (SQLEXPRESS) (MSSQL$SQLEXPRESS) - Unknown owner - c:\Program Files\Microsoft SQL Server\MSSQL.1\MSSQL\Binn\sqlservr.exe" -sSQLEXPRESS (file missing)
O23 - Service: Norton AntiVirus Auto Protect Service (navapsvc) - Symantec Corporation - C:\Program Files\Norton AntiVirus\navapsvc.exe
O23 - Service: Oracle OLAP 9.0.1.0.1 (OLAPServer) - Oracle Corporation - C:\oracle\ora90\bin\xsolap.exe
O23 - Service: Oracle OLAP Agent - Unknown owner - C:\oracle\ora90\bin\xsaagent.exe
O23 - Service: OracleOraHome90Agent - Oracle Corporation - C:\oracle\ora90\bin\agntsrvc.exe
O23 - Service: OracleOraHome90ClientCache - Unknown owner - C:\oracle\ora90\BIN\ONRSD.EXE
O23 - Service: OracleOraHome90HTTPServer - Unknown owner - C:\oracle\ora90\Apache\Apache\Apache.exe
O23 - Service: OracleOraHome90PagingServer - Unknown owner - C:\oracle\ora90/bin/pagntsrv.exe
O23 - Service: OracleOraHome90SNMPPeerEncapsulator - Unknown owner - C:\oracle\ora90\BIN\ENCSVC.EXE
O23 - Service: OracleOraHome90SNMPPeerMasterAgent - Unknown owner - C:\oracle\ora90\BIN\AGNTSVC.EXE
O23 - Service: OracleOraHome90TNSListener - Unknown owner - C:\oracle\ora90\BIN\TNSLSNR.exe
O23 - Service: OracleServiceIULIANA - Oracle Corporation - c:\oracle\ora90\bin\ORACLE.EXE
O23 - Service: ScriptBlocking Service (SBService) - Symantec Corporation - C:\PROGRA~1\COMMON~1\SYMANT~1\SCRIPT~1\SBServ.exe
O23 - Service: SoundMAX Agent Service (SoundMAX Agent Service (default)) - Analog Devices, Inc. - C:\Program Files\Analog Devices\SoundMAX\SMAgent.exe
O23 - Service: Visibroker Smart Agent (xsSmartAgent) - Unknown owner - C:\oracle\ora90\bin\osagent.exe
Hi
Empty these folders:
C:\avenger\backup.zip
C:\Program Files\Norton AntiVirus\Quarantine
C:\QooBox\Quarantine\
Delete these:
F:\Kit\Y! Messenger Stuff\De sters din friends list-ul altuia\ZaksNoBuddy_Install.exe
F:\Kit\i_bpk_lite.exe
Empty Recycle Bin
Re-scan with kaspersky
Post:
- a fresh HijackThis log
- kaspersky report
superglue
2007-06-08, 17:17
-------------------------------------------------------------------------------
KASPERSKY ONLINE SCANNER REPORT
Friday, June 08, 2007 5:10:41 PM
Operating System: Microsoft Windows XP Professional, Service Pack 2 (Build 2600)
Kaspersky Online Scanner version: 5.0.93.0
Kaspersky Anti-Virus database last update: 8/06/2007
Kaspersky Anti-Virus database records: 341095
-------------------------------------------------------------------------------
Scan Settings:
Scan using the following antivirus database: extended
Scan Archives: true
Scan Mail Bases: true
Scan Target - My Computer:
C:\
D:\
E:\
F:\
G:\
H:\
I:\
Scan Statistics:
Total number of scanned objects: 142486
Number of viruses found: 12
Number of infected objects: 163
Number of suspicious objects: 2
Duration of the scan process: 01:59:14
Infected Object Name / Virus Name / Last Action
C:\Documents and Settings\LocalService\Cookies\index.dat Object is locked skipped
C:\Documents and Settings\LocalService\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat Object is locked skipped
C:\Documents and Settings\LocalService\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat.LOG Object is locked skipped
C:\Documents and Settings\LocalService\Local Settings\History\History.IE5\index.dat Object is locked skipped
C:\Documents and Settings\LocalService\Local Settings\Temporary Internet Files\Content.IE5\index.dat Object is locked skipped
C:\Documents and Settings\LocalService\NTUSER.DAT Object is locked skipped
C:\Documents and Settings\LocalService\ntuser.dat.LOG Object is locked skipped
C:\Documents and Settings\NetworkService\Cookies\index.dat Object is locked skipped
C:\Documents and Settings\NetworkService\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat Object is locked skipped
C:\Documents and Settings\NetworkService\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat.LOG Object is locked skipped
C:\Documents and Settings\NetworkService\Local Settings\History\History.IE5\index.dat Object is locked skipped
C:\Documents and Settings\NetworkService\Local Settings\Temporary Internet Files\Content.IE5\index.dat Object is locked skipped
C:\Documents and Settings\NetworkService\NTUSER.DAT Object is locked skipped
C:\Documents and Settings\NetworkService\ntuser.dat.LOG Object is locked skipped
C:\Documents and Settings\superglue\Application Data\Mozilla\Firefox\Profiles\19hyasob.default\cert8.db Object is locked skipped
C:\Documents and Settings\superglue\Application Data\Mozilla\Firefox\Profiles\19hyasob.default\formhistory.dat Object is locked skipped
C:\Documents and Settings\superglue\Application Data\Mozilla\Firefox\Profiles\19hyasob.default\history.dat Object is locked skipped
C:\Documents and Settings\superglue\Application Data\Mozilla\Firefox\Profiles\19hyasob.default\key3.db Object is locked skipped
C:\Documents and Settings\superglue\Application Data\Mozilla\Firefox\Profiles\19hyasob.default\parent.lock Object is locked skipped
C:\Documents and Settings\superglue\Application Data\Mozilla\Firefox\Profiles\19hyasob.default\search.sqlite Object is locked skipped
C:\Documents and Settings\superglue\Application Data\Mozilla\Firefox\Profiles\19hyasob.default\urlclassifier2.sqlite Object is locked skipped
C:\Documents and Settings\superglue\Cookies\index.dat Object is locked skipped
C:\Documents and Settings\superglue\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat Object is locked skipped
C:\Documents and Settings\superglue\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat.LOG Object is locked skipped
C:\Documents and Settings\superglue\Local Settings\Application Data\Mozilla\Firefox\Profiles\19hyasob.default\Cache\_CACHE_001_ Object is locked skipped
C:\Documents and Settings\superglue\Local Settings\Application Data\Mozilla\Firefox\Profiles\19hyasob.default\Cache\_CACHE_002_ Object is locked skipped
C:\Documents and Settings\superglue\Local Settings\Application Data\Mozilla\Firefox\Profiles\19hyasob.default\Cache\_CACHE_003_ Object is locked skipped
C:\Documents and Settings\superglue\Local Settings\Application Data\Mozilla\Firefox\Profiles\19hyasob.default\Cache\_CACHE_MAP_ Object is locked skipped
C:\Documents and Settings\superglue\Local Settings\History\History.IE5\index.dat Object is locked skipped
C:\Documents and Settings\superglue\Local Settings\History\History.IE5\MSHist012007060820070609\index.dat Object is locked skipped
C:\Documents and Settings\superglue\Local Settings\Temp\Perflib_Perfdata_f2c.dat Object is locked skipped
C:\Documents and Settings\superglue\Local Settings\Temporary Internet Files\Content.IE5\index.dat Object is locked skipped
C:\Documents and Settings\superglue\NTUSER.DAT Object is locked skipped
C:\Documents and Settings\superglue\ntuser.dat.LOG Object is locked skipped
C:\Program Files\Yahoo!\Messenger\logs\billing_superglue.log Object is locked skipped
C:\Program Files\Yahoo!\Messenger\logs\client_superglue.log Object is locked skipped
C:\Program Files\Yahoo!\Messenger\logs\network_superglue.log Object is locked skipped
C:\System Volume Information\MountPointManagerRemoteDatabase Object is locked skipped
superglue
2007-06-08, 17:19
C:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP44\A0006928.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.fp skipped
C:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP46\A0007084.dll Infected: Trojan.Win32.BHO.bd skipped
C:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP46\A0007109.exe Infected: Trojan.Win32.Agent.anr skipped
C:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP46\A0007110.exe Infected: Trojan.Win32.Agent.anr skipped
C:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP46\A0007111.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.ar skipped
C:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP46\A0007112.exe Infected: Trojan.Win32.Agent.anr skipped
C:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP46\A0007113.exe Infected: Trojan.Win32.Agent.anr skipped
C:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP46\A0007178.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.ar skipped
C:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP46\A0007198.dll Infected: Trojan.Win32.BHO.o skipped
C:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP46\A0007199.dll Suspicious: Packed.Win32.Morphine.a skipped
C:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP46\A0007200.dll Infected: Trojan.Win32.Dialer.qn skipped
C:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP46\A0007201.dll Suspicious: Packed.Win32.Morphine.a skipped
C:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP46\A0007210.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.ar skipped
C:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP46\A0007301.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.jp skipped
C:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP46\A0007302.dll Infected: Trojan-Clicker.Win32.Small.mw skipped
C:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP46\A0007303.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.fp skipped
C:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP47\A0007463.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.ar skipped
C:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP47\A0007464.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.ar skipped
C:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP47\A0007465.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.ar skipped
C:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP47\A0007466.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.ar skipped
C:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP47\A0007467.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.ar skipped
C:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP47\A0007468.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.jp skipped
C:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP47\A0007469.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.jp skipped
C:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP47\A0007470.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.ar skipped
C:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP47\A0007471.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.ar skipped
C:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP47\A0007472.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.ar skipped
C:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP47\A0007473.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.ar skipped
C:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP47\A0007474.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.ar skipped
C:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP47\A0007475.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.ar skipped
C:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP47\A0007476.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.ar skipped
C:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP47\A0007477.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.ar skipped
C:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP47\A0007478.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.ar skipped
C:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP47\A0007479.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.ar skipped
C:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP47\A0007480.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.ar skipped
C:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP47\A0007481.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.ar skipped
C:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP47\A0007482.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.jp skipped
C:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP47\A0007483.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.jp skipped
C:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP47\A0007484.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.jp skipped
C:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP47\A0007485.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.ar skipped
C:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP47\A0007486.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.jp skipped
C:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP47\A0007487.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.ar skipped
C:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP47\A0007488.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.ar skipped
C:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP47\A0007489.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.ar skipped
C:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP47\A0007490.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.ar skipped
C:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP47\A0007491.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.ar skipped
C:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP47\A0007492.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.ar skipped
C:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP47\A0007493.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.ar skipped
C:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP47\A0007494.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.ar skipped
C:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP47\A0007495.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.ar skipped
C:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP47\A0007496.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.ar skipped
C:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP47\A0007497.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.ar skipped
C:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP47\A0007498.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.ar skipped
C:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP47\A0007499.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.ar skipped
C:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP47\A0007500.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.ar skipped
C:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP47\A0007501.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.ar skipped
C:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP47\A0007502.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.fp skipped
C:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP47\A0007503.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.ar skipped
C:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP47\A0007504.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.ar skipped
C:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP47\A0007505.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.ar skipped
C:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP47\A0007506.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.ar skipped
C:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP47\A0007507.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.ar skipped
C:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP47\A0007508.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.ar skipped
C:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP47\A0007509.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.fp skipped
C:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP47\A0007510.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.ar skipped
C:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP47\A0007511.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.jp skipped
C:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP47\A0007512.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.ar skipped
C:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP47\A0007513.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.ar skipped
C:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP47\A0007514.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.fp skipped
C:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP47\A0007515.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.ar skipped
C:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP47\A0007516.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.ar skipped
C:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP47\A0007517.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.ar skipped
C:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP47\A0007518.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.ar skipped
C:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP47\A0007519.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.ar skipped
C:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP47\A0007520.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.ar skipped
C:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP47\A0007521.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.ar skipped
C:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP47\A0007522.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.ar skipped
C:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP47\A0007523.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.ar skipped
C:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP47\A0007524.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.ar skipped
C:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP47\A0007525.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.ar skipped
C:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP47\A0007526.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.ar skipped
C:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP47\A0007527.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.ar skipped
C:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP47\A0007528.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.ar skipped
C:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP47\A0007529.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.ar skipped
C:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP47\A0007530.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.ar skipped
C:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP47\A0007531.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.ar skipped
C:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP47\A0007532.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.ar skipped
C:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP47\A0007533.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.ar skipped
C:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP47\A0007534.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.ar skipped
C:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP47\A0007535.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.ar skipped
C:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP47\A0007536.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.ar skipped
C:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP47\A0007537.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.ar skipped
C:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP47\A0007538.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.ar skipped
C:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP47\A0007539.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.ar skipped
C:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP47\A0007540.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.ar skipped
C:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP47\A0007541.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.ar skipped
C:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP47\A0007542.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.ar skipped
C:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP47\A0007543.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.ar skipped
C:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP47\A0007544.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.ar skipped
C:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP47\A0007545.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.ar skipped
C:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP47\A0007546.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.ar skipped
C:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP47\A0007547.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.ar skipped
C:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP47\A0007548.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.ar skipped
C:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP47\A0007549.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.ar skipped
C:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP47\A0007550.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.ar skipped
C:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP47\A0007551.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.ar skipped
C:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP47\A0007552.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.ar skipped
C:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP47\A0007553.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.ar skipped
C:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP47\A0007554.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.ar skipped
C:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP47\A0007555.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.ar skipped
C:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP47\A0007556.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.ar skipped
C:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP47\A0007557.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.ar skipped
C:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP47\A0007558.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.ar skipped
C:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP47\A0007559.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.ar skipped
C:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP47\A0007560.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.ar skipped
C:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP47\A0007561.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.ar skipped
C:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP47\A0007562.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.ar skipped
C:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP47\A0007563.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.ar skipped
C:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP47\A0007564.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.ar skipped
C:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP47\A0007565.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.ar skipped
C:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP47\A0007566.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.fp skipped
C:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP47\A0007567.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.ar skipped
C:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP47\A0007568.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.fp skipped
C:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP47\A0007569.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.fp skipped
C:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP47\A0007570.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.fp skipped
C:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP47\A0007571.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.ar skipped
C:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP47\A0007572.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.ar skipped
C:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP47\A0007573.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.ar skipped
C:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP47\A0007574.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.ar skipped
C:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP47\A0007577.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.ar skipped
C:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP47\A0007578.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.ar skipped
superglue
2007-06-08, 17:20
C:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP47\A0007579.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.ar skipped
C:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP47\A0007580.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.ar skipped
C:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP47\A0007581.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.jp skipped
C:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP47\A0007582.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.fp skipped
C:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP47\A0007584.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.ar skipped
C:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP47\A0007585.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.ar skipped
C:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP47\A0007586.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.ar skipped
C:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP47\A0007587.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.jp skipped
C:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP47\A0007588.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.ar skipped
C:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP47\A0007589.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.ar skipped
C:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP47\A0007590.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.ar skipped
C:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP47\A0007591.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.ar skipped
C:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP47\A0007592.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.fp skipped
C:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP47\A0007593.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.ar skipped
C:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP47\A0007594.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.ar skipped
C:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP47\A0007595.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.ar skipped
C:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP47\A0007596.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.ar skipped
C:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP47\A0007597.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.ar skipped
C:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP47\A0007598.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.ar skipped
C:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP47\A0007599.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.ar skipped
C:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP47\A0007600.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.ar skipped
C:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP47\A0007601.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.ar skipped
C:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP47\A0007602.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.ar skipped
C:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP47\A0007603.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.ar skipped
C:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP47\A0007604.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.ar skipped
C:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP47\A0007605.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.ar skipped
C:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP47\change.log Object is locked skipped
C:\WINDOWS\Debug\PASSWD.LOG Object is locked skipped
C:\WINDOWS\SchedLgU.Txt Object is locked skipped
C:\WINDOWS\SoftwareDistribution\ReportingEvents.log Object is locked skipped
C:\WINDOWS\Sti_Trace.log Object is locked skipped
C:\WINDOWS\system32\config\AppEvent.Evt Object is locked skipped
C:\WINDOWS\system32\config\default Object is locked skipped
C:\WINDOWS\system32\config\default.LOG Object is locked skipped
C:\WINDOWS\system32\config\SAM Object is locked skipped
C:\WINDOWS\system32\config\SAM.LOG Object is locked skipped
C:\WINDOWS\system32\config\SecEvent.Evt Object is locked skipped
C:\WINDOWS\system32\config\SECURITY Object is locked skipped
C:\WINDOWS\system32\config\SECURITY.LOG Object is locked skipped
C:\WINDOWS\system32\config\software Object is locked skipped
C:\WINDOWS\system32\config\software.LOG Object is locked skipped
C:\WINDOWS\system32\config\SysEvent.Evt Object is locked skipped
C:\WINDOWS\system32\config\system Object is locked skipped
C:\WINDOWS\system32\config\system.LOG Object is locked skipped
C:\WINDOWS\system32\drivers\sptd.sys Object is locked skipped
C:\WINDOWS\system32\h323log.txt Object is locked skipped
C:\WINDOWS\system32\wbem\Repository\FS\INDEX.BTR Object is locked skipped
C:\WINDOWS\system32\wbem\Repository\FS\INDEX.MAP Object is locked skipped
C:\WINDOWS\system32\wbem\Repository\FS\MAPPING.VER Object is locked skipped
C:\WINDOWS\system32\wbem\Repository\FS\MAPPING1.MAP Object is locked skipped
C:\WINDOWS\system32\wbem\Repository\FS\MAPPING2.MAP Object is locked skipped
C:\WINDOWS\system32\wbem\Repository\FS\OBJECTS.DATA Object is locked skipped
C:\WINDOWS\system32\wbem\Repository\FS\OBJECTS.MAP Object is locked skipped
C:\WINDOWS\wiadebug.log Object is locked skipped
C:\WINDOWS\wiaservc.log Object is locked skipped
C:\WINDOWS\WindowsUpdate.log Object is locked skipped
D:\System Volume Information\MountPointManagerRemoteDatabase Object is locked skipped
E:\System Volume Information\MountPointManagerRemoteDatabase Object is locked skipped
F:\System Volume Information\MountPointManagerRemoteDatabase Object is locked skipped
F:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP47\A0007609.exe/0001\F7\ZaksNoBuddy.exe Infected: HackTool.Win32.VB.hf skipped
F:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP47\A0007609.exe Tarma: infected - 1 skipped
F:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP47\A0007609.exe UPX: infected - 1 skipped
F:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP47\A0007611.exe/data.rar/bpkhk.dll Infected: not-a-virus:Monitor.Win32.Perflogger.az skipped
F:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP47\A0007611.exe/data.rar/bpkwb.dll Infected: not-a-virus:Monitor.Win32.Perflogger.az skipped
F:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP47\A0007611.exe/data.rar/bpk.exe Infected: not-a-virus:Monitor.Win32.Perflogger.az skipped
F:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP47\A0007611.exe/data.rar/BPKr.exe Infected: Trojan-Spy.Win32.Perfloger.o skipped
F:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP47\A0007611.exe/data.rar Infected: Trojan-Spy.Win32.Perfloger.o skipped
F:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP47\A0007611.exe RarSFX: infected - 5 skipped
F:\System Volume Information\_restore{704C7861-487F-45D7-819F-97C2BD52F12A}\RP47\change.log Object is locked skipped
G:\System Volume Information\MountPointManagerRemoteDatabase Object is locked skipped
Scan process completed.
superglue
2007-06-08, 17:21
And the HJT log:
Logfile of HijackThis v1.99.1
Scan saved at 5:14:51 PM, on 6/8/2007
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)
Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\Analog Devices\SoundMAX\SMax4PNP.exe
C:\Program Files\Analog Devices\SoundMAX\smax4.exe
C:\PROGRA~1\NORTON~1\navapw32.exe
C:\Program Files\Norton AntiVirus\navapsvc.exe
C:\oracle\ora90\bin\agntsrvc.exe
C:\oracle\ora90\BIN\TNSLSNR.exe
C:\WINDOWS\system32\cmd.exe
c:\oracle\ora90\bin\ORACLE.EXE
C:\Program Files\Analog Devices\SoundMAX\SMAgent.exe
C:\WINDOWS\system32\svchost.exe
C:\oracle\ora90\bin\dbsnmp.exe
C:\WINDOWS\system32\wscntfy.exe
C:\WINDOWS\system32\wuauclt.exe
C:\Program Files\Yahoo!\Messenger\ymsgr_tray.exe
C:\New Folder\scanner.exe
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://www.yahoo.com/
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://us.rd.yahoo.com/customize/ie/defaults/su/msgr8/*http://www.yahoo.com
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Bar = http://us.rd.yahoo.com/customize/ie/defaults/sb/msgr8/*http://www.yahoo.com/ext/search/search.html
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = about:blank
R1 - HKCU\Software\Microsoft\Internet Explorer\SearchURL,(Default) = http://us.rd.yahoo.com/customize/ie/defaults/su/msgr8/*http://www.yahoo.com
R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,AutoConfigURL = http://192.168.5.253/proxy.pac
R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyServer = http://192.168.5.253/proxy.pac
O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 7.0\ActiveX\AcroIEHelper.dll
O2 - BHO: CNavExtBho Class - {BDF3E430-B101-42AD-A544-FADC6B084872} - C:\Program Files\Norton AntiVirus\NavShExt.dll
O3 - Toolbar: Norton AntiVirus - {42CDD1BF-3FFB-4238-8AD1-7859DF00B1D6} - C:\Program Files\Norton AntiVirus\NavShExt.dll
O4 - HKLM\..\Run: [SoundMAXPnP] C:\Program Files\Analog Devices\SoundMAX\SMax4PNP.exe
O4 - HKLM\..\Run: [SoundMAX] "C:\Program Files\Analog Devices\SoundMAX\smax4.exe" /tray
O4 - HKLM\..\Run: [NAV Agent] C:\PROGRA~1\NORTON~1\navapw32.exe
O4 - HKCU\..\Run: [Yahoo! Pager] "C:\Program Files\Yahoo!\Messenger\YahooMessenger.exe" -quiet
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~3\OFFICE11\EXCEL.EXE/3000
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~3\OFFICE11\REFIEBAR.DLL
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O16 - DPF: {0EB0E74A-2A76-4AB3-A7FB-9BD8C29F7F75} (CKAVWebScan Object) - http://www.kaspersky.com/kos/english/kavwebscan_unicode.cab
O16 - DPF: {30528230-99f7-4bb4-88d8-fa1d4f56a2ab} (Installation Support) - C:\Program Files\Yahoo!\Common\Yinsthelper.dll
O16 - DPF: {7B297BFD-85E4-4092-B2AF-16A91B2EA103} (WScanCtl Class) - http://www.ca.com/us/securityadvisor/virusinfo/webscan.cab
O18 - Protocol: ms-help - {314111C7-A502-11D2-BBCA-00C04F8EC294} - C:\Program Files\Common Files\Microsoft Shared\Help\hxds.dll
O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
O23 - Service: SQL Server (SQLEXPRESS) (MSSQL$SQLEXPRESS) - Unknown owner - c:\Program Files\Microsoft SQL Server\MSSQL.1\MSSQL\Binn\sqlservr.exe" -sSQLEXPRESS (file missing)
O23 - Service: Norton AntiVirus Auto Protect Service (navapsvc) - Symantec Corporation - C:\Program Files\Norton AntiVirus\navapsvc.exe
O23 - Service: Oracle OLAP 9.0.1.0.1 (OLAPServer) - Oracle Corporation - C:\oracle\ora90\bin\xsolap.exe
O23 - Service: Oracle OLAP Agent - Unknown owner - C:\oracle\ora90\bin\xsaagent.exe
O23 - Service: OracleOraHome90Agent - Oracle Corporation - C:\oracle\ora90\bin\agntsrvc.exe
O23 - Service: OracleOraHome90ClientCache - Unknown owner - C:\oracle\ora90\BIN\ONRSD.EXE
O23 - Service: OracleOraHome90HTTPServer - Unknown owner - C:\oracle\ora90\Apache\Apache\Apache.exe
O23 - Service: OracleOraHome90PagingServer - Unknown owner - C:\oracle\ora90/bin/pagntsrv.exe
O23 - Service: OracleOraHome90SNMPPeerEncapsulator - Unknown owner - C:\oracle\ora90\BIN\ENCSVC.EXE
O23 - Service: OracleOraHome90SNMPPeerMasterAgent - Unknown owner - C:\oracle\ora90\BIN\AGNTSVC.EXE
O23 - Service: OracleOraHome90TNSListener - Unknown owner - C:\oracle\ora90\BIN\TNSLSNR.exe
O23 - Service: OracleServiceIULIANA - Oracle Corporation - c:\oracle\ora90\bin\ORACLE.EXE
O23 - Service: ScriptBlocking Service (SBService) - Symantec Corporation - C:\PROGRA~1\COMMON~1\SYMANT~1\SCRIPT~1\SBServ.exe
O23 - Service: SoundMAX Agent Service (SoundMAX Agent Service (default)) - Analog Devices, Inc. - C:\Program Files\Analog Devices\SoundMAX\SMAgent.exe
O23 - Service: Visibroker Smart Agent (xsSmartAgent) - Unknown owner - C:\oracle\ora90\bin\osagent.exe
Hi
Logs look good.
All viruses are in system restore and inactive at the moment. I give you later instructions how to empty it.
Other than that, any problems left?
superglue
2007-06-08, 19:03
Hi
Logs look good.
All viruses are in system restore and inactive at the moment. I give you later instructions how to empty it.
Other than that, any problems left?
No. All things are going smoothly :)).
I'll wait for those other instructions.
Thanks alot!
Hi
Then you're clean!
Now that you are clean, please follow these simple steps in order to keep your computer clean and secure:
Looking over your log, it seems you don't have any evidence of a third party firewall.
As the term conveys, a firewall is an extra layer of security installed onto computers, which restricts access to systems from the outside world. Firewalls protect against hackers and malicious intruders. I want you to download a free firewall NOW from one of these excellent vendors:
1) ZoneAlarm (http://www.zonelabs.com/store/content/catalog/products/sku_list_za.jsp?dc=12bms&ctry=US&lang=en&lid=nav_za)
2) Agnitum (http://www.agnitum.com/products/outpostfree/download.php)
3) Sunbelt/Kerio (http://www.sunbelt-software.com/Kerio-Download.cfm)
4) Comodo (http://www.personalfirewall.comodo.com/)
If you are using the built-in Windows XP firewall, it is not recommended as it does not block outgoing connections. This means that any malware on your computer is free to "phone home" for more instructions. Simply put, Windows XP contains a mediocre firewall. This firewall is NO replacement for a dedicated software solution. Remember to use only one firewall at the same time.
Update Acrobat Reader to version 8.0.
Disable and Enable System Restore. - If you are using Windows XP then you should disable and re-enable system restore to make sure there are no infected files found in a restore point.
You can find instructions on how to enable and reenable system restore here:
Windows XP System Restore Guide (http://www.bleepingcomputer.com/forums/tutorial56.html)
Reenable system restore with instructions from tutorial above
Make your Internet Explorer more secure - This can be done by following these simple instructions:
From within Internet Explorer click on the Tools menu and then click on Options.
Click once on the Security tab
Click once on the Internet icon so it becomes highlighted.
Click once on the Custom Level button.
Change the Download signed ActiveX controls to Prompt
Change the Download unsigned ActiveX controls to Disable
Change the Initialize and script ActiveX controls not marked as safe to Disable
Change the Installation of desktop items to Prompt
Change the Launching programs and files in an IFRAME to Prompt
Change the Navigate sub-frames across different domains to Prompt
When all these settings have been made, click on the OK button.
If it prompts you as to whether or not you want to save the settings, press the Yes button.
Next press the Apply button and then the OK to exit the Internet Properties page.
Use an AntiVirus Software - It is very important that your computer has an anti-virus software running on your machine. This alone can save you a lot of trouble with malware in the future.
See this link for a listing of some online & their stand-alone antivirus programs:
Virus, Spyware, and Malware Protection and Removal Resources (http://www.bleepingcomputer.com/forums/topic405.html)
Update your AntiVirus Software - It is imperitive that you update your Antivirus software at least once a week (Even more if you wish). If you do not update your antivirus software then it will not be able to catch any of the new variants that may come out.
Use a Firewall - I can not stress how important it is that you use a Firewall on your computer. Without a firewall your computer is succeptible to being hacked and taken over. I am very serious about this and see it happen almost every day with my clients. Simply using a Firewall in its default configuration can lower your risk greatly.
For a tutorial on Firewalls and a listing of some available ones see the link below:
Understanding and Using Firewalls (http://www.bleepingcomputer.com/tutorials/tutorial60.html)
Visit Microsoft's Windows Update Site Frequently - It is important that you visit http://www.windowsupdate.com (http://www.windowsupdate.com) regularly. This will ensure your computer has always the latest security updates available installed on your computer. If there are new updates to install, install them immediately, reboot your computer, and revisit the site until there are no more critical updates.
Install Ad-Aware - Install and download Ad-Aware. ou should also scan your computer with program on a regular basis just as you would an antivirus software in conjunction with Spybot.
A tutorial on installing & using this product can be found here:
Using Ad-aware to remove Spyware, Malware, & Hijackers from Your Computer (http://www.bleepingcomputer.com/forums/?showtutorial=48)
Install Spybot - Search and Destroy - Install and download Spybot - Search and Destroy with its TeaTimer option.
This will provide real-time spyware & hijacker protection on your computer alongside your virus protection. You should also scan your computer with program on a regular basis just as you would an anti virus software. A tutorial on installing & using this product can be found here:
Instructions for - Spybot S & D and Ad-aware (http://www.bleepingcomputer.com/forums/?showtutorial=43)
Install SpywareBlaster - SpywareBlaster will added a large list of programs and sites into your Internet Explorer settings that will protect you from running and downloading known malicious programs.
A tutorial on installing & using this product can be found here:
Using SpywareBlaster to protect your computer from Spyware and Malware (http://www.bleepingcomputer.com/tutorials/tutorial49.html)
Update all these programs regularly - Make sure you update all the programs I have listed regularly. Without regular updates you WILL NOT be protected when new malicious programs are released.
Follow this list and your potential for being infected again will reduce dramatically.
Here are some additional utilities that will enhance your safety
IE/Spyad (http://www.spywarewarrior.com/uiuc/resource.htm) <= IE/Spyad places over 4000 websites and domains in the IE Restricted list which will severely impair attempts to infect your system. It basically prevents any downloads (Cookies etc) from the sites listed, although you will still be able to connect to the sites.
MVPS Hosts file (http://mvps.org/winhelp2002/hosts.htm) <= The MVPS Hosts file replaces your current HOSTS file with one containing well know ad sites etc. Basically, this prevents your coputer from connecting to those sites by redirecting them to 127.0.0.1 which is your local computer
Google Toolbar (http://toolbar.google.com/) <= Get the free google toolbar to help stop pop up windows.
Winpatrol (http://www.winpatrol.com/) <= Download and install the free version of Winpatrol. a tutorial for this product is located here:
Using Winpatrol to protect your computer from malicious software (http://www.winpatrol.com/features.html)
Stand Up and Be Counted ---> Malware Complaints (http://www.malwarecomplaints.info/index.php) <--- where you can make difference!
The site offers people who have been (or are) victims of malware the opportunity to document their story and, in that way, launch a complaint against the malware and the makers of the malware.
Also, please read this great article by Tony Klein So How Did I Get Infected In First Place (http://castlecops.com/postlite7736-.html)
Happy surfing and stay clean!
superglue
2007-06-08, 19:36
Thank you very much for helping. I am grateful. Keep up the good work.
Since this issue appears resolved ... this Topic is closed.
If you need this topic reopened, please request this by sending the moderating team
a PM with the address of the thread. This applies only to the original topic starter.
Everyone else please begin a New Topic.