PDA

View Full Version : Virtumonde, jkkjk.dll problems



Uncalm
2007-12-05, 07:38
I have virtumonde on my machine. I have run through a number of different spyware removal software programs including spybot, avg, vundofix etc with no luck. Particularly difficult to get rid of are the jkkjk.dll and wvurpnl.dll files located in system32. Any assistance would be greatly appreciated. Here are my HJT and Kaspersky logs.

Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 12:39:06 AM, on 12/5/2007
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\RTHDCPL.EXE
C:\Program Files\iTunes\iTunesHelper.exe
C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\avgas.exe
C:\Program Files\Logitech\SetPoint\SetPoint.exe
C:\Program Files\BHODemon 2\BHODemon.exe
C:\Program Files\Common Files\Logitech\khalshared\KHALMNPR.EXE
C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\guard.exe
C:\WINDOWS\system32\svchost.exe
C:\Program Files\iPod\bin\iPodService.exe
C:\WINDOWS\system32\zstatus.exe
C:\WINDOWS\system32\wscntfy.exe
C:\WINDOWS\system32\wuauclt.exe
C:\Program Files\Internet Explorer\IEXPLORE.EXE
C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
C:\WINDOWS\explorer.exe
C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

O4 - HKLM\..\Run: [RTHDCPL] RTHDCPL.EXE
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\Run: [iTunesHelper] "C:\Program Files\iTunes\iTunesHelper.exe"
O4 - HKLM\..\Run: [hp 1000 firmware] "C:\Program Files\hp LaserJet 1000\fwdl.exe"
O4 - HKLM\..\Run: [Logitech Hardware Abstraction Layer] KHALMNPR.EXE
O4 - HKLM\..\Run: [!AVG Anti-Spyware] "C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\avgas.exe" /minimized
O4 - HKCU\..\Run: [SpybotSD TeaTimer] C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
O4 - Startup: BHODemon 2.0.lnk = C:\Program Files\BHODemon 2\BHODemon.exe
O4 - Global Startup: Logitech SetPoint.lnk = ?
O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office\OSA9.EXE
O9 - Extra button: AIM - {AC9E2541-2814-11d5-BC6D-00B0D0A1DE45} - C:\Program Files\AIM\aim.exe
O9 - Extra button: (no name) - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O9 - Extra 'Tools' menuitem: Spybot - Search & Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O16 - DPF: {0B79F48A-E8D6-11DB-9283-E25056D89593} (F-Secure Online Scanner 3.1) - http://support.f-secure.com/ols/fscax.cab
O16 - DPF: {0EB0E74A-2A76-4AB3-A7FB-9BD8C29F7F75} (CKAVWebScan Object) - http://www.kaspersky.com/kos/english/kavwebscan_unicode.cab
O16 - DPF: {5F8469B4-B055-49DD-83F7-62B522420ECC} (Facebook Photo Uploader Control) - http://upload.facebook.com/controls/FacebookPhotoUploader.cab
O23 - Service: Apple Mobile Device - Apple, Inc. - C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
O23 - Service: AVG Anti-Spyware Guard - GRISOFT s.r.o. - C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\guard.exe
O23 - Service: iPod Service - Apple Inc. - C:\Program Files\iPod\bin\iPodService.exe

--
End of file - 3151 bytes


Wednesday, December 05, 2007 12:34:22 AM
Operating System: Microsoft Windows XP Professional, Service Pack 2 (Build 2600)
Kaspersky Online Scanner version: 5.0.98.0
Kaspersky Anti-Virus database last update: 5/12/2007
Kaspersky Anti-Virus database records: 472813


Scan Settings
Scan using the following antivirus database extended
Scan Archives true
Scan Mail Bases true

Scan Target My Computer
A:\
C:\
D:\
E:\
F:\

Scan Statistics
Total number of scanned objects 83324
Number of viruses found 11
Number of infected objects 39
Number of suspicious objects 2
Duration of the scan process 00:21:18

Infected Object Name Virus Name Last Action
C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy\Recovery\Virtumonde30.zip/win272.exe Suspicious: Password-protected-EXE skipped

C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy\Recovery\Virtumonde30.zip ZIP: suspicious - 1 skipped

C:\Documents and Settings\LocalService\Cookies\index.dat Object is locked skipped

C:\Documents and Settings\LocalService\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat Object is locked skipped

C:\Documents and Settings\LocalService\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat.LOG Object is locked skipped

C:\Documents and Settings\LocalService\Local Settings\History\History.IE5\index.dat Object is locked skipped

C:\Documents and Settings\LocalService\Local Settings\Temporary Internet Files\Content.IE5\index.dat Object is locked skipped

C:\Documents and Settings\LocalService\NTUSER.DAT Object is locked skipped

C:\Documents and Settings\LocalService\ntuser.dat.LOG Object is locked skipped

C:\Documents and Settings\NetworkService\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat Object is locked skipped

C:\Documents and Settings\NetworkService\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat.LOG Object is locked skipped

C:\Documents and Settings\NetworkService\NTUSER.DAT Object is locked skipped

C:\Documents and Settings\NetworkService\ntuser.dat.LOG Object is locked skipped

C:\Documents and Settings\Uncalm\Cookies\index.dat Object is locked skipped

C:\Documents and Settings\Uncalm\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat Object is locked skipped

C:\Documents and Settings\Uncalm\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat.LOG Object is locked skipped

C:\Documents and Settings\Uncalm\Local Settings\History\History.IE5\index.dat Object is locked skipped

C:\Documents and Settings\Uncalm\Local Settings\History\History.IE5\MSHist012007120420071205\index.dat Object is locked skipped

C:\Documents and Settings\Uncalm\Local Settings\temp\Perflib_Perfdata_7b8.dat Object is locked skipped

C:\Documents and Settings\Uncalm\Local Settings\Temporary Internet Files\Content.IE5\index.dat Object is locked skipped

C:\Documents and Settings\Uncalm\NTUSER.DAT Object is locked skipped

C:\Documents and Settings\Uncalm\ntuser.dat.LOG Object is locked skipped

C:\Program Files\BHODemon 2\_BHODemon_RICH.log Object is locked skipped

C:\qoobox\Quarantine\C\WINDOWS\system32\ddcawvv.dll.vir Infected: Trojan.Win32.Obfuscated.lf skipped

C:\qoobox\Quarantine\C\WINDOWS\system32\lqhheall.dll.vir Infected: Trojan.Win32.BHO.abs skipped

C:\qoobox\Quarantine\C\WINDOWS\system32\winilb32.dll.vir Infected: Trojan.Win32.Dialer.qn skipped

C:\System Volume Information\MountPointManagerRemoteDatabase Object is locked skipped

C:\System Volume Information\_restore{79FAE998-C613-44F4-A4B3-34B993B24EDD}\RP106\A0010488.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.atj skipped

C:\System Volume Information\_restore{79FAE998-C613-44F4-A4B3-34B993B24EDD}\RP106\A0010490.exe Infected: not-a-virus:FraudTool.Win32.UltimateDefender.v skipped

C:\System Volume Information\_restore{79FAE998-C613-44F4-A4B3-34B993B24EDD}\RP106\A0010491.exe Infected: not-a-virus:Downloader.Win32.UltimateFix.d skipped

C:\System Volume Information\_restore{79FAE998-C613-44F4-A4B3-34B993B24EDD}\RP106\A0010497.exe Infected: Trojan-Downloader.Win32.Alphabet.gen skipped

C:\System Volume Information\_restore{79FAE998-C613-44F4-A4B3-34B993B24EDD}\RP106\A0010511.exe Infected: Virus.Win32.Virut.av skipped

C:\System Volume Information\_restore{79FAE998-C613-44F4-A4B3-34B993B24EDD}\RP106\A0010531.dll Infected: Trojan.Win32.Dialer.qn skipped

C:\System Volume Information\_restore{79FAE998-C613-44F4-A4B3-34B993B24EDD}\RP109\A0010582.exe Infected: not-a-virus:FraudTool.Win32.UltimateDefender.v skipped

C:\System Volume Information\_restore{79FAE998-C613-44F4-A4B3-34B993B24EDD}\RP109\A0010583.exe Infected: not-a-virus:Downloader.Win32.UltimateFix.d skipped

C:\System Volume Information\_restore{79FAE998-C613-44F4-A4B3-34B993B24EDD}\RP109\A0010589.dll Infected: Trojan.Win32.Obfuscated.lf skipped

C:\System Volume Information\_restore{79FAE998-C613-44F4-A4B3-34B993B24EDD}\RP109\A0010591.dll Infected: Trojan.Win32.Dialer.qn skipped

C:\System Volume Information\_restore{79FAE998-C613-44F4-A4B3-34B993B24EDD}\RP111\A0010642.exe Infected: not-a-virus:FraudTool.Win32.UltimateDefender.v skipped

C:\System Volume Information\_restore{79FAE998-C613-44F4-A4B3-34B993B24EDD}\RP111\A0010643.exe Infected: not-a-virus:Downloader.Win32.UltimateFix.d skipped

C:\System Volume Information\_restore{79FAE998-C613-44F4-A4B3-34B993B24EDD}\RP112\A0010694.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.atj skipped

C:\System Volume Information\_restore{79FAE998-C613-44F4-A4B3-34B993B24EDD}\RP114\A0010776.exe Infected: Trojan-Downloader.Win32.Alphabet.gen skipped

C:\System Volume Information\_restore{79FAE998-C613-44F4-A4B3-34B993B24EDD}\RP114\A0010818.exe Infected: Trojan-Downloader.Win32.Alphabet.gen skipped

C:\System Volume Information\_restore{79FAE998-C613-44F4-A4B3-34B993B24EDD}\RP114\A0010829.exe Infected: not-a-virus:FraudTool.Win32.UltimateDefender.v skipped

C:\System Volume Information\_restore{79FAE998-C613-44F4-A4B3-34B993B24EDD}\RP114\A0010830.exe Infected: not-a-virus:Downloader.Win32.UltimateFix.d skipped

C:\System Volume Information\_restore{79FAE998-C613-44F4-A4B3-34B993B24EDD}\RP115\A0010868.exe Infected: Trojan-Downloader.Win32.Alphabet.gen skipped

C:\System Volume Information\_restore{79FAE998-C613-44F4-A4B3-34B993B24EDD}\RP115\A0010870.exe Infected: not-a-virus:FraudTool.Win32.UltimateDefender.v skipped

C:\System Volume Information\_restore{79FAE998-C613-44F4-A4B3-34B993B24EDD}\RP115\A0010871.exe Infected: not-a-virus:Downloader.Win32.UltimateFix.d skipped

C:\System Volume Information\_restore{79FAE998-C613-44F4-A4B3-34B993B24EDD}\RP116\A0010921.exe Infected: not-a-virus:FraudTool.Win32.UltimateDefender.v skipped

C:\System Volume Information\_restore{79FAE998-C613-44F4-A4B3-34B993B24EDD}\RP116\A0010922.exe Infected: not-a-virus:Downloader.Win32.UltimateFix.d skipped

C:\System Volume Information\_restore{79FAE998-C613-44F4-A4B3-34B993B24EDD}\RP118\A0012213.exe Infected: not-a-virus:FraudTool.Win32.UltimateDefender.v skipped

C:\System Volume Information\_restore{79FAE998-C613-44F4-A4B3-34B993B24EDD}\RP118\A0012214.exe Infected: not-a-virus:Downloader.Win32.UltimateFix.d skipped

C:\System Volume Information\_restore{79FAE998-C613-44F4-A4B3-34B993B24EDD}\RP118\A0012245.exe Infected: not-a-virus:FraudTool.Win32.UltimateDefender.v skipped

C:\System Volume Information\_restore{79FAE998-C613-44F4-A4B3-34B993B24EDD}\RP118\A0012250.exe Infected: not-a-virus:FraudTool.Win32.UltimateDefender.v skipped

C:\System Volume Information\_restore{79FAE998-C613-44F4-A4B3-34B993B24EDD}\RP118\A0012279.dll Infected: not-a-virus:AdWare.Win32.SecToolBar.k skipped

C:\System Volume Information\_restore{79FAE998-C613-44F4-A4B3-34B993B24EDD}\RP119\A0012306.dll Infected: Trojan.Win32.Obfuscated.lf skipped

C:\System Volume Information\_restore{79FAE998-C613-44F4-A4B3-34B993B24EDD}\RP119\A0012307.dll Infected: Trojan.Win32.BHO.abs skipped

C:\System Volume Information\_restore{79FAE998-C613-44F4-A4B3-34B993B24EDD}\RP119\A0012308.dll Infected: Trojan.Win32.Dialer.qn skipped

C:\System Volume Information\_restore{79FAE998-C613-44F4-A4B3-34B993B24EDD}\RP120\A0012336.dll Infected: Trojan.Win32.Dialer.qn skipped

C:\System Volume Information\_restore{79FAE998-C613-44F4-A4B3-34B993B24EDD}\RP120\A0012337.dll Infected: Trojan.Win32.Dialer.qn skipped

C:\System Volume Information\_restore{79FAE998-C613-44F4-A4B3-34B993B24EDD}\RP120\change.log Object is locked skipped

C:\WINDOWS\Debug\PASSWD.LOG Object is locked skipped

C:\WINDOWS\SchedLgU.Txt Object is locked skipped

C:\WINDOWS\SoftwareDistribution\ReportingEvents.log Object is locked skipped

C:\WINDOWS\Sti_Trace.log Object is locked skipped

C:\WINDOWS\system32\CatRoot2\edb.log Object is locked skipped

C:\WINDOWS\system32\CatRoot2\tmp.edb Object is locked skipped

C:\WINDOWS\system32\config\AppEvent.Evt Object is locked skipped

C:\WINDOWS\system32\config\default Object is locked skipped

C:\WINDOWS\system32\config\default.LOG Object is locked skipped

C:\WINDOWS\system32\config\SAM Object is locked skipped

C:\WINDOWS\system32\config\SAM.LOG Object is locked skipped

C:\WINDOWS\system32\config\SecEvent.Evt Object is locked skipped

C:\WINDOWS\system32\config\SECURITY Object is locked skipped

C:\WINDOWS\system32\config\SECURITY.LOG Object is locked skipped

C:\WINDOWS\system32\config\software Object is locked skipped

C:\WINDOWS\system32\config\software.LOG Object is locked skipped

C:\WINDOWS\system32\config\SysEvent.Evt Object is locked skipped

C:\WINDOWS\system32\config\system Object is locked skipped

C:\WINDOWS\system32\config\system.LOG Object is locked skipped

C:\WINDOWS\system32\DRVVUC.0LL Infected: Trojan.Win32.Dialer.qn skipped

C:\WINDOWS\system32\DRVXEW.0LL Infected: Trojan.Win32.Dialer.qn skipped

C:\WINDOWS\system32\efcawxu.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.atj skipped

C:\WINDOWS\system32\h323log.txt Object is locked skipped

C:\WINDOWS\system32\wbem\Repository\FS\INDEX.BTR Object is locked skipped

C:\WINDOWS\system32\wbem\Repository\FS\INDEX.MAP Object is locked skipped

C:\WINDOWS\system32\wbem\Repository\FS\MAPPING.VER Object is locked skipped

C:\WINDOWS\system32\wbem\Repository\FS\MAPPING1.MAP Object is locked skipped

C:\WINDOWS\system32\wbem\Repository\FS\MAPPING2.MAP Object is locked skipped

C:\WINDOWS\system32\wbem\Repository\FS\OBJECTS.DATA Object is locked skipped

C:\WINDOWS\system32\wbem\Repository\FS\OBJECTS.MAP Object is locked skipped

C:\WINDOWS\system32\wvurpnl.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.bhf skipped

C:\WINDOWS\wiadebug.log Object is locked skipped

C:\WINDOWS\wiaservc.log Object is locked skipped

C:\WINDOWS\WindowsUpdate.log Object is locked skipped

E:\System Volume Information\MountPointManagerRemoteDatabase Object is locked skipped

E:\System Volume Information\_restore{79FAE998-C613-44F4-A4B3-34B993B24EDD}\RP120\change.log Object is locked skipped

F:\System Volume Information\MountPointManagerRemoteDatabase Object is locked skipped

F:\System Volume Information\_restore{79FAE998-C613-44F4-A4B3-34B993B24EDD}\RP120\change.log Object is locked skipped

Scan process completed.

pskelley
2007-12-06, 21:59
Welcome to Safer Networking, I wish to be sure you have viewed and understand this information.
"BEFORE you POST" (READ this Procedure before Requesting Assistance)
http://forums.spybot.info/showthread.php?t=288
All advice given is taken at your own risk.
Please make sure you have read this information so we are on the same page.

Make sure word wrap is turned off in notepad.

You have a Vundo infection which can be very hard to remove. This will take some time and unless you are patient, understand how to follow directions and are comfortable working on your computer, you may want to seek local professional help. If you wish to proceed, read and follow the directions carefully.

I can see the infection in your System Restore files so DO NOT do a System Restore until we clean those, and a couple of times in the Kaspersky, but nothing is showing in the HJT log at this point. I will ask you to download and use tools, if you have these onboard, delete them and download the newest, up to date version, from the links I provide.

1) TeaTimer will block changes we must make, use these instruction to turn it off until we are done.
http://russelltexas.com/malware/teatimer.htm

2) C:\Program Files\Trend Micro\HijackThis\HijackThis.exe <<< rename HJT, call it Uncalm.exe that will work, after a restart we should be able to see the junk.

3) Thanks to Atribune and any others who helped with this fix.

http://vundofix.atribune.org/ <<< tutorial

"Download VundoFix" to your Desktop

http://www.atribune.org/ccount/click.php?id=4

Double-click VundoFix.exe to run it.
When VundoFix opens, click the Scan for Vundo button.
Once it's done scanning, click the Remove Vundo button.
You will receive a prompt asking if you want to remove the files, click YES
Once you click yes, your desktop will go blank as it starts removing Vundo.
When completed, it will prompt that it will reboot your computer, click OK.
Note: It is possible that VundoFix encountered a file it could not remove.
In this case, VundoFix will attempt run on reboot, simply follow the above instructions starting from "Click
the Scan for Vundo button." when VundoFix appears at reboot. Vundofix.txt will be on the C:\

(wait until you finish to post reports and logs)

4) Thanks to sUBs and anyone else who helped with this fix.

Download ComboFix from Here (http://www.techsupportforum.com/sectools/sUBs/ComboFix.exe) or Here (http://download.bleepingcomputer.com/sUBs/ComboFix.exe) to your Desktop

Double click combofix.exe and follow the prompts.
When finished, it shall produce a log for you. Post that log and a HiJackthis log in your next reply

Note: Do not mouseclick combofix's window while its running. That may cause it to stall

Post the Vundofix.txt, combofix log and a new HJT log.

The junk will download more, stay offline except when troubleshooting until we get you clean.

Thanks

Uncalm
2007-12-06, 23:30
Thanks so much for your help! Here are the logs:

Vundo

C:\windows\system32\satsjybb.exe

Beginning removal...

Attempting to delete C:\windows\system32\satsjybb.exe
C:\windows\system32\satsjybb.exe Has been deleted!

Performing Repairs to the registry.
Done!


ComboFix 07-12-02.7 - Uncalm 2007-12-06 16:26:55.2 - NTFSx86
Microsoft Windows XP Professional 5.1.2600.2.1252.1.1033.18.1589 [GMT -5:00]
Running from: C:\Documents and Settings\Uncalm\Desktop\ComboFix.exe
* Created a new restore point
.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.

C:\Documents and Settings\Uncalm\Favorites\Online Security Guide.lnk
C:\WINDOWS\system32\fnfcyytw.ini
C:\WINDOWS\system32\gjsbdltg.dll
C:\WINDOWS\system32\gtldbsjg.ini
C:\WINDOWS\system32\iqyaieje.dll
C:\WINDOWS\system32\kjkkj.ini
C:\WINDOWS\system32\kjkkj.ini2
C:\WINDOWS\system32\klyfnoij.dll
C:\WINDOWS\system32\wtyycfnf.dll

.
((((((((((((((((((((((((((((((((((((((( Drivers/Services )))))))))))))))))))))))))))))))))))))))))))))))))

.
-------\LEGACY_DOMAINSERVICE
-------\DomainService


((((((((((((((((((((((((( Files Created from 2007-11-06 to 2007-12-06 )))))))))))))))))))))))))))))))
.

2007-12-06 00:31 . 2007-12-06 00:31 <DIR> d-------- C:\Documents and Settings\Uncalm\Application Data\acccore
2007-12-05 16:26 . 2007-12-05 16:26 205 --a------ C:\WINDOWS\wininit.ini
2007-12-04 23:51 . 2007-12-04 23:51 <DIR> d-------- C:\WINDOWS\system32\Kaspersky Lab
2007-12-04 23:51 . 2007-12-04 23:51 <DIR> d-------- C:\Documents and Settings\All Users\Application Data\Kaspersky Lab
2007-12-04 22:43 . 2007-12-04 22:43 164 --a------ C:\install.dat
2007-12-04 21:44 . 2007-12-04 21:44 <DIR> d-------- C:\Program Files\Trend Micro
2007-12-04 10:21 . 2007-12-04 10:21 <DIR> d-------- C:\Documents and Settings\Administrator\Application Data\Grisoft
2007-12-04 08:45 . 2007-12-04 08:45 801,974 ---hs---- C:\WINDOWS\system32\sxrsvyhe.ini
2007-12-04 05:36 . 2007-12-04 05:36 <DIR> d-------- C:\Documents and Settings\Uncalm\Application Data\Grisoft
2007-12-04 05:35 . 2007-12-04 05:35 <DIR> d-------- C:\Documents and Settings\All Users\Application Data\Grisoft
2007-12-04 05:35 . 2007-05-30 07:10 10,872 --a------ C:\WINDOWS\system32\drivers\AvgAsCln.sys
2007-12-04 05:27 . 2007-12-05 23:26 <DIR> d-------- C:\VundoFix Backups
2007-12-04 05:23 . 2007-12-04 05:23 102,912 --a------ C:\WINDOWS\system32\DRVXEW.0LL
2007-12-04 03:01 . 2007-12-04 03:03 <DIR> d-------- C:\Program Files\BHODemon 2
2007-12-04 02:42 . 2007-12-04 02:42 1,148,902 --a------ C:\Install
2007-12-02 23:26 . 2007-12-02 23:26 102,912 --a------ C:\WINDOWS\system32\DRVVUC.0LL
2007-12-02 23:26 . 2007-12-02 23:26 34,304 --a------ C:\WINDOWS\system32\efcawxu.dll
2007-12-02 19:44 . 2007-12-02 19:49 8,192 --a------ C:\WINDOWS\system32\edb.chk
2007-12-02 19:17 . 2007-12-02 19:17 <DIR> d-------- C:\Documents and Settings\Administrator\Application Data\Lavasoft
2007-12-02 14:45 . 2007-12-02 14:45 336,480 --a------ C:\WINDOWS\system32\jkkjk.dll
2007-12-02 05:52 . 2007-12-04 23:49 <DIR> d-------- C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy
2007-12-02 05:18 . 2007-12-02 05:18 <DIR> d-------- C:\Program Files\Lavasoft
2007-12-02 05:18 . 2007-12-02 05:18 <DIR> d-------- C:\Documents and Settings\Uncalm\Application Data\Lavasoft
2007-12-02 05:14 . 2007-12-02 05:14 2,126 --a------ C:\WINDOWS\system32\wpa.dbl
2007-12-02 04:57 . 2007-12-02 04:57 35,840 --------- C:\WINDOWS\system32\wvurpnl.dll

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2007-12-06 12:28 --------- d-----w C:\Documents and Settings\Uncalm\Application Data\U3
2007-10-29 07:23 --------- d-----w C:\Program Files\Java
2007-10-29 07:22 --------- d-----w C:\Program Files\Common Files\Java
2007-10-24 04:48 --------- d-----w C:\Program Files\Paint Shop Pro 6
2007-10-20 08:34 575 ----a-w C:\WINDOWS\Fonts\2ndamend.txt
2007-10-06 07:10 --------- d-----w C:\Program Files\AOD
2007-10-06 07:10 --------- d-----w C:\Program Files\AIM
2007-10-06 07:10 --------- d-----w C:\Documents and Settings\Uncalm\Application Data\Aim
2007-09-09 04:01 724,992 ----a-w C:\WINDOWS\iun6002.exe
2007-09-06 06:18 159,803 ----a-w C:\WINDOWS\closewnd.exe
.

((((((((((((((((((((((((((((( snapshot@2007-12-04_21.58.29.95 )))))))))))))))))))))))))))))))))))))))))
.
+ 2007-05-07 21:38:46 500,120 ----a-w C:\WINDOWS\Downloaded Program Files\daas_s.dll
+ 2007-05-07 21:39:00 192,920 ----a-w C:\WINDOWS\Downloaded Program Files\fsauc.dll
+ 2007-05-07 21:39:24 254,360 ----a-w C:\WINDOWS\Downloaded Program Files\fscax.dll
+ 2005-05-24 17:27:16 213,048 ----a-w C:\WINDOWS\system32\Kaspersky Lab\Kaspersky Online Scanner\kavss.dll
+ 2007-08-29 20:47:20 94,208 ----a-w C:\WINDOWS\system32\Kaspersky Lab\Kaspersky Online Scanner\kavuninstall.exe
+ 2007-08-29 20:49:54 950,272 ----a-w C:\WINDOWS\system32\Kaspersky Lab\Kaspersky Online Scanner\kavwebscan.dll
.
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{79B3844B-6DAC-4B78-B0B8-C99D8BBDCD50}]
2007-12-02 04:57 35840 --------- C:\WINDOWS\system32\wvurpnl.dll

[HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{7FD8C819-98F5-49EB-BA9E-F7A1614449E0}]
2007-12-02 14:45 336480 --a------ C:\WINDOWS\system32\jkkjk.dll

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"RTHDCPL"="RTHDCPL.EXE" [2007-06-14 23:03 C:\WINDOWS\RTHDCPL.exe]
"QuickTime Task"="C:\Program Files\QuickTime\qttask.exe" [2007-09-01 14:20]
"iTunesHelper"="C:\Program Files\iTunes\iTunesHelper.exe" [2007-08-15 19:15]
"hp 1000 firmware"="C:\Program Files\hp LaserJet 1000\fwdl.exe" [2001-12-15 11:10]
"Logitech Hardware Abstraction Layer"="KHALMNPR.EXE" [2007-01-23 14:44 C:\WINDOWS\KHALMNPR.Exe]
"!AVG Anti-Spyware"="C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\avgas.exe" [2007-06-11 04:25]

C:\Documents and Settings\All Users\Start Menu\Programs\Startup\
Logitech SetPoint.lnk - C:\Program Files\Logitech\SetPoint\SetPoint.exe [2007-09-06 00:58:28]
Microsoft Office.lnk - C:\Program Files\Microsoft Office\Office\OSA9.EXE [2000-01-21 03:15:54]

[HKEY_CURRENT_USER\software\microsoft\windows\currentversion\policies\system]
"DisableRegistryTools"= 0 (0x0)

[hkey_local_machine\software\microsoft\windows\currentversion\explorer\shellexecutehooks]
"{79B3844B-6DAC-4B78-B0B8-C99D8BBDCD50}"= C:\WINDOWS\system32\wvurpnl.dll [2007-12-02 04:57 35840]

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\wvurpnl]
wvurpnl.dll 2007-12-02 04:57 35840 C:\WINDOWS\system32\wvurpnl.dll

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\zzrwsjcp]
zzrwsjcp.dll

[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\lsa]
Authentication Packages REG_MULTI_SZ msv1_0 C:\WINDOWS\system32\jkkjk.dll

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\WdfLoadGroup]
@=""

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\!AVG Anti-Spyware]
C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\avgas.exe /minimized

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Aim6]


[HKEY_CURRENT_USER\software\microsoft\windows\currentversion\explorer\mountpoints2\G]
\Shell\AutoRun\command - G:\LaunchU3.exe -a

.
Contents of the 'Scheduled Tasks' folder
"2007-12-06 08:00:00 C:\WINDOWS\Tasks\AdwareAlert Scheduled Scan.job"
- C:\Program Files\AdwareAlert\AdwareAlert.ex
- C:\Program Files\AdwareAlert.UncalmWRuns AdwareAlert to scan your computer for malicious and potenially unwanted programs.
"2007-11-28 00:49:00 C:\WINDOWS\Tasks\AppleSoftwareUpdate.job"
- C:\Program Files\Apple Software Update\SoftwareUpdate.exe
.
**************************************************************************

catchme 0.3.1318 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2007-12-06 16:28:50
Windows 5.1.2600 Service Pack 2 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully
hidden files: 0

**************************************************************************
.
Completion time: 2007-12-06 16:29:16 - machine was rebooted
.
--- E O F ---


Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 4:29:56 PM, on 12/6/2007
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\RTHDCPL.EXE
C:\Program Files\iTunes\iTunesHelper.exe
C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\avgas.exe
C:\Program Files\Logitech\SetPoint\SetPoint.exe
C:\Program Files\BHODemon 2\BHODemon.exe
C:\Program Files\Common Files\Logitech\khalshared\KHALMNPR.EXE
C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\guard.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\zstatus.exe
C:\Program Files\iPod\bin\iPodService.exe
C:\WINDOWS\system32\wscntfy.exe
C:\WINDOWS\system32\wuauclt.exe
C:\WINDOWS\system32\wuauclt.exe
C:\Program Files\Trend Micro\HijackThis\Uncalm.exe

O2 - BHO: (no name) - {79B3844B-6DAC-4B78-B0B8-C99D8BBDCD50} - C:\WINDOWS\system32\wvurpnl.dll
O2 - BHO: (no name) - {7FD8C819-98F5-49EB-BA9E-F7A1614449E0} - C:\WINDOWS\system32\jkkjk.dll
O4 - HKLM\..\Run: [RTHDCPL] RTHDCPL.EXE
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\Run: [iTunesHelper] "C:\Program Files\iTunes\iTunesHelper.exe"
O4 - HKLM\..\Run: [hp 1000 firmware] "C:\Program Files\hp LaserJet 1000\fwdl.exe"
O4 - HKLM\..\Run: [Logitech Hardware Abstraction Layer] KHALMNPR.EXE
O4 - HKLM\..\Run: [!AVG Anti-Spyware] "C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\avgas.exe" /minimized
O4 - Startup: BHODemon 2.0.lnk = C:\Program Files\BHODemon 2\BHODemon.exe
O4 - Global Startup: Logitech SetPoint.lnk = ?
O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office\OSA9.EXE
O9 - Extra button: AIM - {AC9E2541-2814-11d5-BC6D-00B0D0A1DE45} - C:\Program Files\AIM\aim.exe
O16 - DPF: {0B79F48A-E8D6-11DB-9283-E25056D89593} (F-Secure Online Scanner 3.1) - http://support.f-secure.com/ols/fscax.cab
O16 - DPF: {0EB0E74A-2A76-4AB3-A7FB-9BD8C29F7F75} (CKAVWebScan Object) - http://www.kaspersky.com/kos/english/kavwebscan_unicode.cab
O16 - DPF: {5F8469B4-B055-49DD-83F7-62B522420ECC} (Facebook Photo Uploader Control) - http://upload.facebook.com/controls/FacebookPhotoUploader.cab
O20 - Winlogon Notify: wvurpnl - C:\WINDOWS\SYSTEM32\wvurpnl.dll
O20 - Winlogon Notify: zzrwsjcp - zzrwsjcp.dll (file missing)
O23 - Service: Apple Mobile Device - Apple, Inc. - C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
O23 - Service: AVG Anti-Spyware Guard - GRISOFT s.r.o. - C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\guard.exe
O23 - Service: iPod Service - Apple Inc. - C:\Program Files\iPod\bin\iPodService.exe

--
End of file - 3043 bytes

pskelley
2007-12-06, 23:54
Thanks for returning your information, when you post these reports, please do not cut off any of it, post the complete report. You did not post the top of the Vundofix that tells me the version you ran.

Read and follow the directions carefully

1) Open Vundofix by Doubleclicking on it, then point your mouse to the white box above the buttons and right click, then click on Add More Files. When the next window opens, copy and paste the files into the boxes and click on Add File(s), then click on Close Window. Then click Remove Vundo.

(files to add)
C:\WINDOWS\system32\efcawxu.dll
C:\WINDOWS\system32\jkkjk.dll
C:\WINDOWS\system32\wvurpnl.dll


2) How to make files and folders visible:
Click Start > Open My Computer.
Select the Tools menu and click Folder Options.
Select the View Tab. Under the Hidden files and folders heading, select Show hidden files and folders.
Uncheck: Hide file extensions for known file types
Uncheck the Hide protected operating system files (recommended) option.
Click Yes to confirm. Click OK.
You may reverse this for safety when we are finished.

3) Please download ATF Cleaner by Atribune
http://www.atribune.org/content/view/25/2/
Save it to your Desktop. We will use this later.

4) AVG Anti-Spyware: Deactivate the Resident Shield
- Before proceeding, deactivate the "Resident Shield" as this may prevent changes to the registry.
- To do this, click "Change State" to the right of the Resident Shield option in the main window.
- You will clearly see the status change to Inactive if you have done this correctly.

5) Open HijackThis and choose "Do a system scan only" then check the box in front of these line items:

O2 - BHO: (no name) - {79B3844B-6DAC-4B78-B0B8-C99D8BBDCD50} - C:\WINDOWS\system32\wvurpnl.dll
O2 - BHO: (no name) - {7FD8C819-98F5-49EB-BA9E-F7A1614449E0} - C:\WINDOWS\system32\jkkjk.dll
O20 - Winlogon Notify: wvurpnl - C:\WINDOWS\SYSTEM32\wvurpnl.dll
O20 - Winlogon Notify: zzrwsjcp - zzrwsjcp.dll (file missing)

Close all programs but HJT and all browser windows, then click on "Fix Checked"

6) RIGHT Click on Start then click on Explore. Locate and delete these items:

C:\WINDOWS\SYSTEM32\wvurpnl.dll <<< check to make sure that one is gone

7) Run ATF Cleaner
Double-click ATF-Cleaner.exe to run the program.
Click Select All found at the bottom of the list.
Click the Empty Selected button.
Click Exit on the Main menu to close the program.

Restart and post the Vundofix report and a new HJT log. Please include some feedback.

Thanks

Uncalm
2007-12-07, 00:33
I ran vundofix. The jkkjk.dll seems to be gone along with efcawxu.dll. However wvurpnl.dll is still present. When I ran vundofix it would state that wvurpnl.dll is in use and you must reboot to remove it. So I let vundofix reboot the computer. Upon reboot the same thing would happen again.

I also noticed a ddccy.dll now present as well.

Here is the vundofix log. I apologize but sometimes it doesn't seem to post the version and whatnot at the top of the log. I see thats its there in between though.

Beginning removal...

Attempting to delete C:\WINDOWS\system32\efcawxu.dll
C:\WINDOWS\system32\efcawxu.dll Has been deleted!

Attempting to delete C:\WINDOWS\system32\jkkjk.dll
C:\WINDOWS\system32\jkkjk.dll Has been deleted!

Attempting to delete C:\WINDOWS\system32\wvurpnl.dll
C:\WINDOWS\system32\wvurpnl.dll Could not be deleted.

Attempting to delete C:\WINDOWS\system32\wvurpnl.dll
C:\WINDOWS\system32\wvurpnl.dll Could not be deleted.

Performing Repairs to the registry.
Done!

VundoFix V6.7.0

Checking Java version...

Scan started at 5:12:05 PM 12/6/2007

Listing files found while scanning....

No infected files were found.


Beginning removal...

Attempting to delete C:\\Windows\system32\wvurpnl.dll
C:\\Windows\system32\wvurpnl.dll Could not be deleted.

Performing Repairs to the registry.
Done!

Beginning removal...

Attempting to delete C:\\Windows\system32\wvurpnl.dll
C:\\Windows\system32\wvurpnl.dll Could not be deleted.

Performing Repairs to the registry.
Done!


Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 5:33:55 PM, on 12/6/2007
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\guard.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\wscntfy.exe
C:\WINDOWS\RTHDCPL.EXE
C:\Program Files\iTunes\iTunesHelper.exe
C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\avgas.exe
C:\Program Files\Logitech\SetPoint\SetPoint.exe
C:\Program Files\Common Files\Logitech\khalshared\KHALMNPR.EXE
C:\Program Files\BHODemon 2\BHODemon.exe
C:\Program Files\iPod\bin\iPodService.exe
C:\WINDOWS\system32\zstatus.exe
C:\WINDOWS\system32\wuauclt.exe
C:\WINDOWS\explorer.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Trend Micro\HijackThis\Uncalm.exe

O2 - BHO: (no name) - {C0C19E7A-6BA9-41B2-B40B-B51CAA365D9D} - C:\WINDOWS\system32\ddccy.dll
O4 - HKLM\..\Run: [RTHDCPL] RTHDCPL.EXE
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\Run: [iTunesHelper] "C:\Program Files\iTunes\iTunesHelper.exe"
O4 - HKLM\..\Run: [hp 1000 firmware] "C:\Program Files\hp LaserJet 1000\fwdl.exe"
O4 - HKLM\..\Run: [Logitech Hardware Abstraction Layer] KHALMNPR.EXE
O4 - HKLM\..\Run: [!AVG Anti-Spyware] "C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\avgas.exe" /minimized
O4 - Startup: BHODemon 2.0.lnk = C:\Program Files\BHODemon 2\BHODemon.exe
O4 - Global Startup: Logitech SetPoint.lnk = ?
O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office\OSA9.EXE
O9 - Extra button: AIM - {AC9E2541-2814-11d5-BC6D-00B0D0A1DE45} - C:\Program Files\AIM\aim.exe
O16 - DPF: {0B79F48A-E8D6-11DB-9283-E25056D89593} (F-Secure Online Scanner 3.1) - http://support.f-secure.com/ols/fscax.cab
O16 - DPF: {0EB0E74A-2A76-4AB3-A7FB-9BD8C29F7F75} (CKAVWebScan Object) - http://www.kaspersky.com/kos/english/kavwebscan_unicode.cab
O16 - DPF: {5F8469B4-B055-49DD-83F7-62B522420ECC} (Facebook Photo Uploader Control) - http://upload.facebook.com/controls/FacebookPhotoUploader.cab
O23 - Service: Apple Mobile Device - Apple, Inc. - C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
O23 - Service: AVG Anti-Spyware Guard - GRISOFT s.r.o. - C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\guard.exe
O23 - Service: iPod Service - Apple Inc. - C:\Program Files\iPod\bin\iPodService.exe

--
End of file - 2834 bytes

pskelley
2007-12-07, 00:43
You understand by now the junk is tricky and will morph and appear again. We seem to have only this one in the log now:
C:\WINDOWS\system32\ddccy.dll

Follow the same proceedure, add that file to the fix and click Remove Vundo, then run HJT and remove the item in the log, it should look like this:

O2 - BHO: (no name) - {C0C19E7A-6BA9-41B2-B40B-B51CAA365D9D} - C:\WINDOWS\system32\ddccy.dll (file missing)

Post a new HJT log.

Thanks

Uncalm
2007-12-07, 01:16
It seems that vundofix successfuly removed it but it didnt show up in the new HJT log.

Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 6:12:59 PM, on 12/6/2007
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\RTHDCPL.EXE
C:\Program Files\iTunes\iTunesHelper.exe
C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\avgas.exe
C:\Program Files\Logitech\SetPoint\SetPoint.exe
C:\Program Files\BHODemon 2\BHODemon.exe
C:\Program Files\Common Files\Logitech\khalshared\KHALMNPR.EXE
C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\guard.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\zstatus.exe
C:\Program Files\iPod\bin\iPodService.exe
C:\WINDOWS\system32\wscntfy.exe
C:\Program Files\Trend Micro\HijackThis\Uncalm.exe

O4 - HKLM\..\Run: [RTHDCPL] RTHDCPL.EXE
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\Run: [iTunesHelper] "C:\Program Files\iTunes\iTunesHelper.exe"
O4 - HKLM\..\Run: [hp 1000 firmware] "C:\Program Files\hp LaserJet 1000\fwdl.exe"
O4 - HKLM\..\Run: [Logitech Hardware Abstraction Layer] KHALMNPR.EXE
O4 - HKLM\..\Run: [!AVG Anti-Spyware] "C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\avgas.exe" /minimized
O4 - Startup: BHODemon 2.0.lnk = C:\Program Files\BHODemon 2\BHODemon.exe
O4 - Global Startup: Logitech SetPoint.lnk = ?
O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office\OSA9.EXE
O9 - Extra button: AIM - {AC9E2541-2814-11d5-BC6D-00B0D0A1DE45} - C:\Program Files\AIM\aim.exe
O16 - DPF: {0B79F48A-E8D6-11DB-9283-E25056D89593} (F-Secure Online Scanner 3.1) - http://support.f-secure.com/ols/fscax.cab
O16 - DPF: {0EB0E74A-2A76-4AB3-A7FB-9BD8C29F7F75} (CKAVWebScan Object) - http://www.kaspersky.com/kos/english/kavwebscan_unicode.cab
O16 - DPF: {5F8469B4-B055-49DD-83F7-62B522420ECC} (Facebook Photo Uploader Control) - http://upload.facebook.com/controls/FacebookPhotoUploader.cab
O23 - Service: Apple Mobile Device - Apple, Inc. - C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
O23 - Service: AVG Anti-Spyware Guard - GRISOFT s.r.o. - C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\guard.exe
O23 - Service: iPod Service - Apple Inc. - C:\Program Files\iPod\bin\iPodService.exe

--
End of file - 2658 bytes

pskelley
2007-12-07, 01:25
Thanks for that feedback, let's see what Kaspersky shows us now. First, remove combofix, C:\qoobox\quarantine\ folder, Vundofix and the Vundofix Backups folder, then please use these settings this time:
Expect some infected files, we still need to clean System Restore files.


Run this online scan using Internet Explorer:
Kaspersky Online Scanner from http://www.kaspersky.com/virusscanner

Next Click on Launch Kaspersky Online Scanner

You will be prompted to install an ActiveX component from Kaspersky, Click Yes.

* The program will launch and then begin downloading the latest definition files:
* Once the files have been downloaded click on NEXT
* Now click on Scan Settings
* In the scan settings make that the following are selected:
* Scan using the following Anti-Virus database:
* Standard
* Scan Options:
* Scan Archives
* Scan Mail Bases
* Click OK
* Now under select a target to scan:
* Select My Computer
* This will program will start and scan your system.
* The scan will take a while so be patient and let it run.
* Once the scan is complete it will display if your system has been infected.
* Now click on the Save as Text button:
* Save the file to your desktop.

Then post it here.

Thanks

Uncalm
2007-12-07, 09:45
Here is the Kaspersky scan:

Friday, December 07, 2007 2:45:27 AM
Operating System: Microsoft Windows XP Professional, Service Pack 2 (Build 2600)
Kaspersky Online Scanner version: 5.0.98.0
Kaspersky Anti-Virus database last update: 7/12/2007
Kaspersky Anti-Virus database records: 444827


Scan Settings
Scan using the following antivirus database standard
Scan Archives true
Scan Mail Bases true

Scan Target My Computer
A:\
C:\
D:\
E:\
F:\

Scan Statistics
Total number of scanned objects 83472
Number of viruses found 7
Number of infected objects 16
Number of suspicious objects 2
Duration of the scan process 00:21:28

Infected Object Name Virus Name Last Action
C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy\Recovery\Virtumonde30.zip/win272.exe Suspicious: Password-protected-EXE skipped

C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy\Recovery\Virtumonde30.zip ZIP: suspicious - 1 skipped

C:\Documents and Settings\LocalService\Cookies\index.dat Object is locked skipped

C:\Documents and Settings\LocalService\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat Object is locked skipped

C:\Documents and Settings\LocalService\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat.LOG Object is locked skipped

C:\Documents and Settings\LocalService\Local Settings\History\History.IE5\index.dat Object is locked skipped

C:\Documents and Settings\LocalService\Local Settings\Temporary Internet Files\Content.IE5\index.dat Object is locked skipped

C:\Documents and Settings\LocalService\NTUSER.DAT Object is locked skipped

C:\Documents and Settings\LocalService\ntuser.dat.LOG Object is locked skipped

C:\Documents and Settings\NetworkService\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat Object is locked skipped

C:\Documents and Settings\NetworkService\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat.LOG Object is locked skipped

C:\Documents and Settings\NetworkService\NTUSER.DAT Object is locked skipped

C:\Documents and Settings\NetworkService\ntuser.dat.LOG Object is locked skipped

C:\Documents and Settings\Uncalm\Cookies\index.dat Object is locked skipped

C:\Documents and Settings\Uncalm\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat Object is locked skipped

C:\Documents and Settings\Uncalm\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat.LOG Object is locked skipped

C:\Documents and Settings\Uncalm\Local Settings\History\History.IE5\index.dat Object is locked skipped

C:\Documents and Settings\Uncalm\Local Settings\History\History.IE5\MSHist012007120620071207\index.dat Object is locked skipped

C:\Documents and Settings\Uncalm\Local Settings\Temporary Internet Files\Content.IE5\index.dat Object is locked skipped

C:\Documents and Settings\Uncalm\NTUSER.DAT Object is locked skipped

C:\Documents and Settings\Uncalm\ntuser.dat.LOG Object is locked skipped

C:\Program Files\BHODemon 2\_BHODemon_RICH.log Object is locked skipped

C:\System Volume Information\MountPointManagerRemoteDatabase Object is locked skipped

C:\System Volume Information\_restore{79FAE998-C613-44F4-A4B3-34B993B24EDD}\RP106\A0010497.exe Infected: Trojan-Downloader.Win32.Alphabet.gen skipped

C:\System Volume Information\_restore{79FAE998-C613-44F4-A4B3-34B993B24EDD}\RP106\A0010511.exe Infected: Virus.Win32.Virut.av skipped

C:\System Volume Information\_restore{79FAE998-C613-44F4-A4B3-34B993B24EDD}\RP106\A0010531.dll Infected: Trojan.Win32.Dialer.qn skipped

C:\System Volume Information\_restore{79FAE998-C613-44F4-A4B3-34B993B24EDD}\RP109\A0010589.dll Infected: Trojan.Win32.Obfuscated.lf skipped

C:\System Volume Information\_restore{79FAE998-C613-44F4-A4B3-34B993B24EDD}\RP109\A0010591.dll Infected: Trojan.Win32.Dialer.qn skipped

C:\System Volume Information\_restore{79FAE998-C613-44F4-A4B3-34B993B24EDD}\RP114\A0010776.exe Infected: Trojan-Downloader.Win32.Alphabet.gen skipped

C:\System Volume Information\_restore{79FAE998-C613-44F4-A4B3-34B993B24EDD}\RP114\A0010818.exe Infected: Trojan-Downloader.Win32.Alphabet.gen skipped

C:\System Volume Information\_restore{79FAE998-C613-44F4-A4B3-34B993B24EDD}\RP115\A0010868.exe Infected: Trojan-Downloader.Win32.Alphabet.gen skipped

C:\System Volume Information\_restore{79FAE998-C613-44F4-A4B3-34B993B24EDD}\RP119\A0012306.dll Infected: Trojan.Win32.Obfuscated.lf skipped

C:\System Volume Information\_restore{79FAE998-C613-44F4-A4B3-34B993B24EDD}\RP119\A0012307.dll Infected: Trojan.Win32.BHO.abs skipped

C:\System Volume Information\_restore{79FAE998-C613-44F4-A4B3-34B993B24EDD}\RP119\A0012308.dll Infected: Trojan.Win32.Dialer.qn skipped

C:\System Volume Information\_restore{79FAE998-C613-44F4-A4B3-34B993B24EDD}\RP120\A0012336.dll Infected: Trojan.Win32.Dialer.qn skipped

C:\System Volume Information\_restore{79FAE998-C613-44F4-A4B3-34B993B24EDD}\RP120\A0012337.dll Infected: Trojan.Win32.Dialer.qn skipped

C:\System Volume Information\_restore{79FAE998-C613-44F4-A4B3-34B993B24EDD}\RP121\A0012475.exe Infected: Trojan-Downloader.Win32.Tiny.id skipped

C:\System Volume Information\_restore{79FAE998-C613-44F4-A4B3-34B993B24EDD}\RP124\change.log Object is locked skipped

C:\WINDOWS\Debug\PASSWD.LOG Object is locked skipped

C:\WINDOWS\SchedLgU.Txt Object is locked skipped

C:\WINDOWS\SoftwareDistribution\ReportingEvents.log Object is locked skipped

C:\WINDOWS\Sti_Trace.log Object is locked skipped

C:\WINDOWS\system32\CatRoot2\edb.log Object is locked skipped

C:\WINDOWS\system32\CatRoot2\tmp.edb Object is locked skipped

C:\WINDOWS\system32\config\AppEvent.Evt Object is locked skipped

C:\WINDOWS\system32\config\default Object is locked skipped

C:\WINDOWS\system32\config\default.LOG Object is locked skipped

C:\WINDOWS\system32\config\SAM Object is locked skipped

C:\WINDOWS\system32\config\SAM.LOG Object is locked skipped

C:\WINDOWS\system32\config\SecEvent.Evt Object is locked skipped

C:\WINDOWS\system32\config\SECURITY Object is locked skipped

C:\WINDOWS\system32\config\SECURITY.LOG Object is locked skipped

C:\WINDOWS\system32\config\software Object is locked skipped

C:\WINDOWS\system32\config\software.LOG Object is locked skipped

C:\WINDOWS\system32\config\SysEvent.Evt Object is locked skipped

C:\WINDOWS\system32\config\system Object is locked skipped

C:\WINDOWS\system32\config\system.LOG Object is locked skipped

C:\WINDOWS\system32\DRVVUC.0LL Infected: Trojan.Win32.Dialer.qn skipped

C:\WINDOWS\system32\DRVXEW.0LL Infected: Trojan.Win32.Dialer.qn skipped

C:\WINDOWS\system32\h323log.txt Object is locked skipped

C:\WINDOWS\system32\wbem\Repository\FS\INDEX.BTR Object is locked skipped

C:\WINDOWS\system32\wbem\Repository\FS\INDEX.MAP Object is locked skipped

C:\WINDOWS\system32\wbem\Repository\FS\MAPPING.VER Object is locked skipped

C:\WINDOWS\system32\wbem\Repository\FS\MAPPING1.MAP Object is locked skipped

C:\WINDOWS\system32\wbem\Repository\FS\MAPPING2.MAP Object is locked skipped

C:\WINDOWS\system32\wbem\Repository\FS\OBJECTS.DATA Object is locked skipped

C:\WINDOWS\system32\wbem\Repository\FS\OBJECTS.MAP Object is locked skipped

C:\WINDOWS\wiadebug.log Object is locked skipped

C:\WINDOWS\wiaservc.log Object is locked skipped

C:\WINDOWS\WindowsUpdate.log Object is locked skipped

E:\System Volume Information\MountPointManagerRemoteDatabase Object is locked skipped

E:\System Volume Information\_restore{79FAE998-C613-44F4-A4B3-34B993B24EDD}\RP124\change.log Object is locked skipped

F:\System Volume Information\MountPointManagerRemoteDatabase Object is locked skipped

F:\System Volume Information\_restore{79FAE998-C613-44F4-A4B3-34B993B24EDD}\RP124\change.log Object is locked skipped

Scan process completed.

pskelley
2007-12-07, 15:49
Thanks for returning your scan results: Kaspersky Online Scanner
Number of infected objects 16
Number of suspicious objects 2

The first two are active infections and dangerous, once you delete them, also empty your Recycle Bin.

(delete the files in red)
C:\WINDOWS\system32\DRVVUC.0LL Infected: Trojan.Win32.Dialer.qn skipped

C:\WINDOWS\system32\DRVXEW.0LL Infected: Trojan.Win32.Dialer.qn skipped

C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy\Recovery\ <<< delete the contents of the Spybot S&D Recovery folder.
http://ict.cas.psu.edu/training/howto/util/removespybot.htm#1

Once the above is done, restart the computer and clean the System Restore files like this:
MANUAL INSTRUCTIONS FOR SYSTEM RESTORE
Turn off System Restore.
On the Desktop, right-click My Computer.
Click Properties.
Click the System Restore tab.
Check Turn off System Restore.
Click Apply, and then click OK.

Reboot

Turn ON System Restore,
On the Desktop, right-click My Computer.
Click Properties.
Click the System Restore tab.
UN-Check *Turn off System Restore*.
Click Apply, and then click OK.

Scan again and if you followed the directions, you should be clean. I do not need to see a clean scan result. I will post this information for you now so you can benefit from it.

Happy Holidays:santa:

Some good information for you:
http://users.telenet.be/bluepatchy/miekiemoes/slowcomputer.html

Here is some great information from experts in this field that will help you stay clean and safe online.
http://users.telenet.be/bluepatchy/miekiemoes/prevention.html
http://forums.spybot.info/showthread.php?t=279
http://russelltexas.com/malware/allclear.htm
http://forum.malwareremoval.com/viewtopic.php?t=14
http://www.bleepingcomputer.com/forums/topict2520.html
http://cybercoyote.org/security/not-admin.shtml

Thanks...pskelley
Safer Networking Forums
http://www.spybot.info/en/donate/index.html
If you are reading this information...thank a teacher,
If you are reading it in English...thank a soldier.

Uncalm
2007-12-08, 02:12
Thanks for your help again!

Everything appears to be clean.

The only other thing thats bothering me is there is a random window that pops up during startup in the blue windows welcome screen that I have to click ok for windows to start. Is that something I need to worry about? Its definitely only been there since I had this spyware problem, so thats why I am concerned.

pskelley
2007-12-08, 02:19
random window that pops up during startup in the blue windows welcome screen that I have to click ok for windows to startThe key word is random, I would need to know exactly what it is, anything that is on that window before I could begin to troubleshoot.
See if you can supply more information.

Thanks

Uncalm
2007-12-08, 04:16
There is literally no information given in the window. Just a small black box abotu the size of a text character in the upper left corner and a close "x" in the upper right wich doesn't work. I have to click the ok at the bottom to proceed. It doesn't seem to be affecting anything. I could take a screenshot of it I suppose.

pskelley
2007-12-08, 12:02
A ss of nothing will not help me, might not be able to help with that one. I would suggest trying this program: http://www.ccleaner.com/
Take the tour so you will know what you are doing, and download the basic program, avoid the junk they offer along with it.

Follow these instructions to clean the registry of leftovers.
1) Registry cleaner > 5. Issues
2) scan for issues
3) Fix selected issues <<< when you click this you get an option
to Backup the Registry. Always choose YES, never work in your Registry without a Backup.
Save the Backup to your Desktop
I leave the Backup on my Desktop for a week
or so, then I right click and delete it. DO NOT
doubleclick or it will return the old registry backup.

Thanks

Uncalm
2007-12-08, 20:59
The cleaner seems to have taken care of it.

Thanks again for all your help! :beerbeerb: