PDA

View Full Version : Help--Virus/Spyware infection



ssnipazz
2007-12-11, 02:37
Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 5:26:55 PM, on 12/10/2007
Platform: Windows XP SP1 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP1 (6.00.2800.1106)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\System32\Ati2evxx.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Adobe\Reader 8.0\Reader\Reader_sl.exe
C:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 7.0\avp.exe
C:\Program Files\AIM\aim.exe
C:\Program Files\DAEMON Tools\daemon.exe
C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
C:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 7.0\avp.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Canon\CAL\CALMAIN.exe
C:\PROGRA~1\MOZILL~1\FIREFOX.EXE
C:\WINDOWS\System32\wuauclt.exe
C:\WINDOWS\System32\lxmykokm.exe
C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.daemonsearch.com/
O3 - Toolbar: &Radio - {8E718888-423F-11D2-876E-00A0C9082467} - C:\WINDOWS\System32\msdxm.ocx
O4 - HKLM\..\Run: [Adobe Reader Speed Launcher] "C:\Program Files\Adobe\Reader 8.0\Reader\Reader_sl.exe"
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\Run: [avp] "C:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 7.0\avp.exe"
O4 - HKLM\..\Run: [45f04424] rundll32.exe "C:\WINDOWS\System32\wkmsteqe.dll",b
O4 - HKCU\..\Run: [AIM] C:\Program Files\AIM\aim.exe -cnetwait.odl
O4 - HKCU\..\Run: [DAEMON Tools] "C:\Program Files\DAEMON Tools\daemon.exe"
O4 - HKCU\..\Run: [SpybotSD TeaTimer] C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\OFFICE11\EXCEL.EXE/3000
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_01\bin\ssv.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_01\bin\ssv.dll
O9 - Extra button: Web Anti-Virus statistics - {1F460357-8A94-4D71-9CA3-AA4ACF32ED8E} - C:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 7.0\SCIEPlgn.dll
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\OFFICE11\REFIEBAR.DLL
O9 - Extra button: AIM - {AC9E2541-2814-11d5-BC6D-00B0D0A1DE45} - C:\Program Files\AIM\aim.exe
O9 - Extra button: Related - {c95fe080-8f5d-11d2-a20b-00aa003c157a} - C:\WINDOWS\web\related.htm
O9 - Extra 'Tools' menuitem: Show &Related Links - {c95fe080-8f5d-11d2-a20b-00aa003c157a} - C:\WINDOWS\web\related.htm
O9 - Extra button: (no name) - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O9 - Extra 'Tools' menuitem: Spybot - Search & Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O16 - DPF: {0EB0E74A-2A76-4AB3-A7FB-9BD8C29F7F75} (CKAVWebScan Object) - http://www.kaspersky.com/kos/english/kavwebscan_unicode.cab
O16 - DPF: {17492023-C23A-453E-A040-C7C580BBF700} (Windows Genuine Advantage Validation Tool) - http://go.microsoft.com/fwlink/?linkid=39204
O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} (WUWebControl Class) - http://update.microsoft.com/windowsupdate/v6/V5Controls/en/x86/client/wuweb_site.cab?1179626279578
O17 - HKLM\System\CCS\Services\Tcpip\..\{08E8EB52-8ECD-4662-B2EE-72F2B6199EF8}: NameServer = 208.67.220.220,208.67.222.222
O17 - HKLM\System\CS1\Services\Tcpip\Parameters: NameServer = 208.67.220.220,208.67.222.222
O17 - HKLM\System\CS1\Services\Tcpip\..\{08E8EB52-8ECD-4662-B2EE-72F2B6199EF8}: NameServer = 208.67.220.220,208.67.222.222
O17 - HKLM\System\CS2\Services\Tcpip\Parameters: NameServer = 208.67.220.220,208.67.222.222
O17 - HKLM\System\CS2\Services\Tcpip\..\{08E8EB52-8ECD-4662-B2EE-72F2B6199EF8}: NameServer = 208.67.220.220,208.67.222.222
O17 - HKLM\System\CCS\Services\Tcpip\Parameters: NameServer = 208.67.220.220,208.67.222.222
O18 - Protocol: skype4com - {FFC8B962-9B40-4DFF-9458-1830C7DD7F5D} - C:\PROGRA~1\COMMON~1\Skype\SKYPE4~1.DLL
O23 - Service: Ati HotKey Poller - ATI Technologies Inc. - C:\WINDOWS\System32\Ati2evxx.exe
O23 - Service: ATI Smart - Unknown owner - C:\WINDOWS\system32\ati2sgag.exe (file missing)
O23 - Service: Kaspersky Anti-Virus 7.0 (AVP) - Kaspersky Lab - C:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 7.0\avp.exe
O23 - Service: Canon Camera Access Library 8 (CCALib8) - Canon Inc. - C:\Program Files\Canon\CAL\CALMAIN.exe
O23 - Service: DomainService - - C:\WINDOWS\System32\lxmykokm.exe
O23 - Service: iPod Service - Apple Inc. - C:\Program Files\iPod\bin\iPodService.exe
O23 - Service: Remote Packet Capture Protocol v.0 (experimental) (rpcapd) - CACE Technologies - C:\Program Files\WinPcap\rpcapd.exe
O24 - Desktop Component 0: (no name) - C:\Program Files\Common Files\rteke.html

--
End of file - 5130 bytes



Kaspersky report:

Monday, December 10, 2007 4:40:44 PM
Operating System: Microsoft Windows XP Professional, Service Pack 1 (Build 2600)
Kaspersky Online Scanner version: 5.0.98.0
Kaspersky Anti-Virus database last update: 11/12/2007
Kaspersky Anti-Virus database records: 479356
Scan Settings
Scan using the following antivirus database extended
Scan Archives true
Scan Mail Bases true
Scan Target My Computer
A:\
C:\
D:\
E:\
Scan Statistics
Total number of scanned objects 35432
Number of viruses found 10
Number of infected objects 13
Number of suspicious objects 0
Duration of the scan process 00:48:44

Infected Object Name Virus Name Last Action
C:\WINDOWS\system32\config\system.LOG Object is locked skipped
C:\WINDOWS\system32\config\software.LOG Object is locked skipped
C:\WINDOWS\system32\config\default.LOG Object is locked skipped
C:\WINDOWS\system32\config\SAM.LOG Object is locked skipped
C:\WINDOWS\system32\config\SECURITY.LOG Object is locked skipped
C:\WINDOWS\system32\config\AppEvent.Evt Object is locked skipped
C:\WINDOWS\system32\config\SecEvent.Evt Object is locked skipped
C:\WINDOWS\system32\config\SysEvent.Evt Object is locked skipped
C:\WINDOWS\system32\config\systemprofile\Local Settings\History\History.IE5\index.dat Object is locked skipped
C:\WINDOWS\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\index.dat Object is locked skipped
C:\WINDOWS\system32\config\systemprofile\Cookies\index.dat Object is locked skipped
C:\WINDOWS\system32\config\DEFAULT Object is locked skipped
C:\WINDOWS\system32\config\SECURITY Object is locked skipped
C:\WINDOWS\system32\config\SOFTWARE Object is locked skipped
C:\WINDOWS\system32\config\SYSTEM Object is locked skipped
C:\WINDOWS\system32\config\SAM Object is locked skipped
C:\WINDOWS\system32\drivers\sptd.sys Object is locked skipped
C:\WINDOWS\system32\drivers\fidbox.idx Object is locked skipped
C:\WINDOWS\system32\drivers\fidbox.dat Object is locked skipped
C:\WINDOWS\system32\drivers\fidbox2.idx Object is locked skipped
C:\WINDOWS\system32\drivers\fidbox2.dat Object is locked skipped
C:\WINDOWS\system32\wbem\Repository\FS\OBJECTS.DATA Object is locked skipped
C:\WINDOWS\system32\wbem\Repository\FS\INDEX.BTR Object is locked skipped
C:\WINDOWS\system32\mprap.dll Infected: Trojan.Win32.BHO.abo skipped
C:\WINDOWS\system32\cnbuk.exe Object is locked skipped
C:\WINDOWS\system32\robvr Object is locked skipped
C:\WINDOWS\system32\wkmsteqe.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.bjc skipped
C:\WINDOWS\system32\atiuuurn.dll Infected: not-a-virus:AdWare.Win32.SuperJuan.ao skipped
C:\WINDOWS\Debug\PASSWD.LOG Object is locked skipped
C:\WINDOWS\Debug\oakley.log Object is locked skipped
C:\WINDOWS\Sti_Trace.log Object is locked skipped
C:\WINDOWS\wiaservc.log Object is locked skipped
C:\WINDOWS\wiadebug.log Object is locked skipped
C:\WINDOWS\SchedLgU.Txt Object is locked skipped
C:\WINDOWS\SoftwareDistribution\ReportingEvents.log Object is locked skipped
C:\WINDOWS\WindowsUpdate.log Object is locked skipped
C:\Documents and Settings\All Users\Application Data\Kaspersky Lab\AVP7\Report\report.rpt Object is locked skipped
C:\Documents and Settings\All Users\Application Data\Kaspersky Lab\AVP7\Report\detected.idx Object is locked skipped
C:\Documents and Settings\All Users\Application Data\Kaspersky Lab\AVP7\Report\detected.rpt Object is locked skipped
C:\Documents and Settings\All Users\Application Data\Kaspersky Lab\AVP7\Report\eventlog.rpt Object is locked skipped
C:\Documents and Settings\NetworkService\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat.LOG Object is locked skipped
C:\Documents and Settings\NetworkService\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat Object is locked skipped
C:\Documents and Settings\NetworkService\ntuser.dat.LOG Object is locked skipped
C:\Documents and Settings\NetworkService\NTUSER.DAT Object is locked skipped
C:\Documents and Settings\LocalService\Local Settings\History\History.IE5\index.dat Object is locked skipped
C:\Documents and Settings\LocalService\Local Settings\Temporary Internet Files\Content.IE5\index.dat Object is locked skipped
C:\Documents and Settings\LocalService\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat.LOG Object is locked skipped
C:\Documents and Settings\LocalService\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat Object is locked skipped
C:\Documents and Settings\LocalService\Cookies\index.dat Object is locked skipped
C:\Documents and Settings\LocalService\ntuser.dat.LOG Object is locked skipped
C:\Documents and Settings\LocalService\NTUSER.DAT Object is locked skipped
C:\Documents and Settings\Andy Cheng\NTUSER.DAT.LOG Object is locked skipped
C:\Documents and Settings\Andy Cheng\Local Settings\Temp\set3D6.tmp Object is locked skipped
C:\Documents and Settings\Andy Cheng\Local Settings\History\History.IE5\index.dat Object is locked skipped
C:\Documents and Settings\Andy Cheng\Local Settings\History\History.IE5\MSHist012007121020071211\index.dat Object is locked skipped
C:\Documents and Settings\Andy Cheng\Local Settings\Temporary Internet Files\Content.IE5\index.dat Object is locked skipped
C:\Documents and Settings\Andy Cheng\Local Settings\Temporary Internet Files\Content.IE5\8XQB4HUR\ptch[1] Infected: not-a-virus:AdWare.Win32.SuperJuan.ao skipped
C:\Documents and Settings\Andy Cheng\Local Settings\Temporary Internet Files\Content.IE5\8ODUYB7R\hctp[1] Infected: not-a-virus:AdWare.Win32.Virtumonde.bjc skipped
C:\Documents and Settings\Andy Cheng\Local Settings\Temporary Internet Files\Content.IE5\8ODUYB7R\gamadril20071203[1] Infected: Backdoor.Win32.Agent.dbm skipped
C:\Documents and Settings\Andy Cheng\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat.LOG Object is locked skipped
C:\Documents and Settings\Andy Cheng\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat Object is locked skipped
C:\Documents and Settings\Andy Cheng\Local Settings\Application Data\Mozilla\Firefox\Profiles\i0j6f7w6.default\Cache\_CACHE_MAP_ Object is locked skipped
C:\Documents and Settings\Andy Cheng\Local Settings\Application Data\Mozilla\Firefox\Profiles\i0j6f7w6.default\Cache\_CACHE_001_ Object is locked skipped
C:\Documents and Settings\Andy Cheng\Local Settings\Application Data\Mozilla\Firefox\Profiles\i0j6f7w6.default\Cache\_CACHE_002_ Object is locked skipped
C:\Documents and Settings\Andy Cheng\Local Settings\Application Data\Mozilla\Firefox\Profiles\i0j6f7w6.default\Cache\_CACHE_003_ Object is locked skipped
C:\Documents and Settings\Andy Cheng\Cookies\index.dat Object is locked skipped
C:\Documents and Settings\Andy Cheng\Application Data\Mozilla\Firefox\Profiles\i0j6f7w6.default\history.dat Object is locked skipped
C:\Documents and Settings\Andy Cheng\Application Data\Mozilla\Firefox\Profiles\i0j6f7w6.default\cert8.db Object is locked skipped
C:\Documents and Settings\Andy Cheng\Application Data\Mozilla\Firefox\Profiles\i0j6f7w6.default\key3.db Object is locked skipped
C:\Documents and Settings\Andy Cheng\Application Data\Mozilla\Firefox\Profiles\i0j6f7w6.default\formhistory.dat Object is locked skipped
C:\Documents and Settings\Andy Cheng\Application Data\Mozilla\Firefox\Profiles\i0j6f7w6.default\search.sqlite Object is locked skipped
C:\Documents and Settings\Andy Cheng\Application Data\Mozilla\Firefox\Profiles\i0j6f7w6.default\urlclassifier2.sqlite Object is locked skipped
C:\Documents and Settings\Andy Cheng\Application Data\trant.exe Infected: not-a-virus:FraudTool.Win32.UltimateDefender.v skipped
C:\Documents and Settings\Andy Cheng\ntuser.dat Object is locked skipped
C:\Program Files\Network Monitor\netmon.exe Infected: not-a-virus:Monitor.Win32.NetMon.a skipped
C:\System Volume Information\_restore{9DB7CD44-70C6-482B-ABBC-7163A0428A20}\RP3\A0000130.exe Infected: Trojan-Downloader.Win32.Agent.fjv skipped
C:\System Volume Information\_restore{9DB7CD44-70C6-482B-ABBC-7163A0428A20}\RP3\A0000162.exe Infected: Trojan-Downloader.Win32.Tiny.adj skipped
C:\System Volume Information\_restore{9DB7CD44-70C6-482B-ABBC-7163A0428A20}\RP3\A0000163.exe/data0002 Infected: Trojan-Downloader.Win32.PurityScan.eg skipped
C:\System Volume Information\_restore{9DB7CD44-70C6-482B-ABBC-7163A0428A20}\RP3\A0000163.exe NSIS: infected - 1 skipped
C:\System Volume Information\_restore{9DB7CD44-70C6-482B-ABBC-7163A0428A20}\RP3\A0000164.exe Infected: Trojan-Downloader.Win32.Agent.bls skipped
C:\System Volume Information\_restore{9DB7CD44-70C6-482B-ABBC-7163A0428A20}\RP5\change.log Object is locked skipped
Scan process completed.



Prior to taking all the necessary procedures, I myself have (for a whole day) tried to fix the problem. I tried System Restore (didn't work, all my saved restore points were gone.), Deleting the spyware manually in the Startup Menu and in the Control Panel, and through the same thing through Safe Mode.

When that didn't work, I somehow lost access to my Control Panel. It simply disappeared from my Start Menu, and when I tried to get there via Explorer, it went to an adware website. Same thing happened with my Desktop Properties. When I tried right clicking on my desktop and clicking properties, it says that there are restrictions on my computer and I need to contact the computer administrator. Also, all my desktop icons are permanently highlighted blue. I was able to get rid of that every time by deleting a file called rtake.htm in Desktop Properties, but after I lost access to that it went crazy.

I downloaded Kaspersky's antivirus software (trial version) and it detected loads (150+ viruses). Pretty much every one of them was deleted except for one, which was called mprap.dll. That one would not delete no matter everything I have tried. That was when I went to school today and found this website.

I came home, did all the procedures, and after Spybot deleted the spyware it found, I now once again have access to my Desktop Properties and Control Panel. Everything else is still screwed up, however. Kaspersky is spamming suspicious files, and Spybot is repeatedly asking me about detected registry key changes.

Hope I gave you an adequate amount of information, and thank you for taking the time to read this :).

P.S. When I came home to start doing the Spybot checks and HJT checks, a radio station started playing on my speakers. I'm pretty much certain it was the virus playing it, but it was nontheless quite humorous.

Thank you,
Andy.

Shaba
2007-12-11, 14:07
Hi ssnipazz and welcome to Safer Networking forums :)

Rename HijackThis.exe to ssnipazz.exe and post back a fresh HijackThis log, please.

ssnipazz
2007-12-12, 00:51
Hello, and thank you for the help :)

Log:

Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 3:49:09 PM, on 12/11/2007
Platform: Windows XP SP1 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP1 (6.00.2800.1106)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\System32\Ati2evxx.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\Adobe\Reader 8.0\Reader\Reader_sl.exe
C:\Program Files\AIM\aim.exe
C:\Program Files\DAEMON Tools\daemon.exe
C:\WINDOWS\System32\lxmykokm.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Canon\CAL\CALMAIN.exe
C:\WINDOWS\System32\wuauclt.exe
C:\Program Files\Trend Micro\HijackThis\ssnipazz.exe

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.daemonsearch.com/
O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelper.dll
O2 - BHO: (no name) - {1973049C-A58F-47C2-9BC7-1772B34C7C09} - (no file)
O2 - BHO: (no name) - {4D3AA09F-AC08-44C8-B947-300F044ACC6F} - (no file)
O2 - BHO: Spybot-S&D IE Protection - {53707962-6F74-2D53-2644-206D7942484F} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O2 - BHO: (no name) - {71D9FCEE-3B7C-4875-A88E-61B69542AB74} - C:\WINDOWS\System32\ddccb.dll
O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.6.0_01\bin\ssv.dll
O2 - BHO: {568d7911-7ad6-cc08-07a4-84caa4d81fc7} - {7cf18d4a-ac48-4a70-80cc-6da71197d865} - C:\WINDOWS\System32\dlsefekt.dll
O2 - BHO: (no name) - {7E853D72-626A-48EC-A868-BA8D5E23E045} - (no file)
O2 - BHO: (no name) - {BBB05D9E-0297-404D-A6BF-D8F2876B84A6} - C:\WINDOWS\System32\ssqrsts.dll (file missing)
O2 - BHO: (no name) - {D9F8DB7A-2FC6-435C-9CF2-6523ED7293E2} - C:\WINDOWS\System32\mprap.dll
O2 - BHO: e404 helper - {F10587E9-0E47-4CBE-84AE-7DD20B8684BB} - C:\Program Files\E404 Helper\e404.v5.dll
O3 - Toolbar: &Radio - {8E718888-423F-11D2-876E-00A0C9082467} - C:\WINDOWS\System32\msdxm.ocx
O4 - HKLM\..\Run: [Adobe Reader Speed Launcher] "C:\Program Files\Adobe\Reader 8.0\Reader\Reader_sl.exe"
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\Run: [45f04424] rundll32.exe "C:\WINDOWS\System32\kaovomff.dll",b
O4 - HKCU\..\Run: [AIM] C:\Program Files\AIM\aim.exe -cnetwait.odl
O4 - HKCU\..\Run: [DAEMON Tools] "C:\Program Files\DAEMON Tools\daemon.exe"
O4 - HKCU\..\Run: [SpybotSD TeaTimer] C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\OFFICE11\EXCEL.EXE/3000
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_01\bin\ssv.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_01\bin\ssv.dll
O9 - Extra button: Web Anti-Virus statistics - {1F460357-8A94-4D71-9CA3-AA4ACF32ED8E} - C:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 7.0\SCIEPlgn.dll
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\OFFICE11\REFIEBAR.DLL
O9 - Extra button: AIM - {AC9E2541-2814-11d5-BC6D-00B0D0A1DE45} - C:\Program Files\AIM\aim.exe
O9 - Extra button: Related - {c95fe080-8f5d-11d2-a20b-00aa003c157a} - C:\WINDOWS\web\related.htm
O9 - Extra 'Tools' menuitem: Show &Related Links - {c95fe080-8f5d-11d2-a20b-00aa003c157a} - C:\WINDOWS\web\related.htm
O9 - Extra button: (no name) - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O9 - Extra 'Tools' menuitem: Spybot - Search & Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O16 - DPF: {0EB0E74A-2A76-4AB3-A7FB-9BD8C29F7F75} (CKAVWebScan Object) - http://www.kaspersky.com/kos/english/kavwebscan_unicode.cab
O16 - DPF: {17492023-C23A-453E-A040-C7C580BBF700} (Windows Genuine Advantage Validation Tool) - http://go.microsoft.com/fwlink/?linkid=39204
O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} (WUWebControl Class) - http://update.microsoft.com/windowsupdate/v6/V5Controls/en/x86/client/wuweb_site.cab?1179626279578
O17 - HKLM\System\CCS\Services\Tcpip\..\{08E8EB52-8ECD-4662-B2EE-72F2B6199EF8}: NameServer = 208.67.220.220,208.67.222.222
O17 - HKLM\System\CS1\Services\Tcpip\Parameters: NameServer = 208.67.220.220,208.67.222.222
O17 - HKLM\System\CS1\Services\Tcpip\..\{08E8EB52-8ECD-4662-B2EE-72F2B6199EF8}: NameServer = 208.67.220.220,208.67.222.222
O17 - HKLM\System\CS2\Services\Tcpip\Parameters: NameServer = 208.67.220.220,208.67.222.222
O17 - HKLM\System\CS2\Services\Tcpip\..\{08E8EB52-8ECD-4662-B2EE-72F2B6199EF8}: NameServer = 208.67.220.220,208.67.222.222
O17 - HKLM\System\CCS\Services\Tcpip\Parameters: NameServer = 208.67.220.220,208.67.222.222
O18 - Protocol: skype4com - {FFC8B962-9B40-4DFF-9458-1830C7DD7F5D} - C:\PROGRA~1\COMMON~1\Skype\SKYPE4~1.DLL
O20 - Winlogon Notify: knklkdwvsopaf - C:\WINDOWS\SYSTEM32\kqflrtkv.dll
O20 - Winlogon Notify: ssqrsts - C:\WINDOWS\
O23 - Service: Ati HotKey Poller - ATI Technologies Inc. - C:\WINDOWS\System32\Ati2evxx.exe
O23 - Service: ATI Smart - Unknown owner - C:\WINDOWS\system32\ati2sgag.exe (file missing)
O23 - Service: Kaspersky Anti-Virus 7.0 (AVP) - Kaspersky Lab - C:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 7.0\avp.exe
O23 - Service: Canon Camera Access Library 8 (CCALib8) - Canon Inc. - C:\Program Files\Canon\CAL\CALMAIN.exe
O23 - Service: DomainService - - C:\WINDOWS\System32\lxmykokm.exe
O23 - Service: iPod Service - Apple Inc. - C:\Program Files\iPod\bin\iPodService.exe
O23 - Service: Remote Packet Capture Protocol v.0 (experimental) (rpcapd) - CACE Technologies - C:\Program Files\WinPcap\rpcapd.exe
O24 - Desktop Component 0: (no name) - C:\Program Files\Common Files\rteke.html

--
End of file - 6070 bytes


Should I disable my Kaspersky and/or SpyBot programs? If I do not, they both spam messages about detecting new files, and I don't know whether or not I should delete those files or to wait for your instructions.

Thank you,
Andy

Shaba
2007-12-12, 10:22
Hi

You should disable Spybot TeaTimer, rest can be as is:

We need first to disable TeaTimer that it doesn't interfere with fixes. You can re-enable it when you're clean again:

1. Run Spybot-S&D in Advanced Mode.
2. If it is not already set to do this Go to the Mode menu select "Advanced Mode"
3. On the left hand side, Click on Tools
4. Then click on the Resident Icon in the List
5. Uncheck "Resident TeaTimer" and OK any prompts.
6. Restart your computer.

After that:

1. Download combofix from one of these links and save it to Desktop:
Link1 (http://download.bleepingcomputer.com/sUBs/ComboFix.exe)
Link2 (http://subs.geekstogo.com/ComboFix.exe)
2. Double click combofix.exe & follow the prompts.
3. When finished, it shall produce a log for you. Post that log in your next reply

Note:
Do not mouseclick combofix's window whilst it's running. That may cause it to stall

Combofix should never take more that 20 minutes including the reboot if malware is detected.
If it does, open Task Manager then Processes tab (press ctrl, alt and del at the same time) and end any processes of findstr, find, sed or swreg, then combofix should continue.
If that happened we want to know, and also what process you had to end.

Post:

- a fresh HijackThis log
- combofix report

ssnipazz
2007-12-12, 21:56
HiJackThis log:

Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 12:55:43 PM, on 12/12/2007
Platform: Windows XP SP1 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP1 (6.00.2800.1106)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\System32\Ati2evxx.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Canon\CAL\CALMAIN.exe
C:\Program Files\Adobe\Reader 8.0\Reader\Reader_sl.exe
C:\Program Files\AIM\aim.exe
C:\Program Files\DAEMON Tools\daemon.exe
C:\WINDOWS\System32\wuauclt.exe
C:\Program Files\Mozilla Firefox\firefox.exe
C:\Program Files\Trend Micro\HijackThis\ssnipazz.exe

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.daemonsearch.com/
O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelper.dll
O2 - BHO: Spybot-S&D IE Protection - {53707962-6F74-2D53-2644-206D7942484F} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.6.0_01\bin\ssv.dll
O2 - BHO: e404 helper - {F10587E9-0E47-4CBE-84AE-7DD20B8684BB} - C:\Program Files\E404 Helper\e404.v5.dll
O3 - Toolbar: &Radio - {8E718888-423F-11D2-876E-00A0C9082467} - C:\WINDOWS\System32\msdxm.ocx
O4 - HKLM\..\Run: [Adobe Reader Speed Launcher] "C:\Program Files\Adobe\Reader 8.0\Reader\Reader_sl.exe"
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKCU\..\Run: [AIM] C:\Program Files\AIM\aim.exe -cnetwait.odl
O4 - HKCU\..\Run: [DAEMON Tools] "C:\Program Files\DAEMON Tools\daemon.exe"
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\OFFICE11\EXCEL.EXE/3000
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_01\bin\ssv.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_01\bin\ssv.dll
O9 - Extra button: Web Anti-Virus statistics - {1F460357-8A94-4D71-9CA3-AA4ACF32ED8E} - C:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 7.0\SCIEPlgn.dll
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\OFFICE11\REFIEBAR.DLL
O9 - Extra button: AIM - {AC9E2541-2814-11d5-BC6D-00B0D0A1DE45} - C:\Program Files\AIM\aim.exe
O9 - Extra button: Related - {c95fe080-8f5d-11d2-a20b-00aa003c157a} - C:\WINDOWS\web\related.htm
O9 - Extra 'Tools' menuitem: Show &Related Links - {c95fe080-8f5d-11d2-a20b-00aa003c157a} - C:\WINDOWS\web\related.htm
O9 - Extra button: (no name) - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O9 - Extra 'Tools' menuitem: Spybot - Search & Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O16 - DPF: {0EB0E74A-2A76-4AB3-A7FB-9BD8C29F7F75} (CKAVWebScan Object) - http://www.kaspersky.com/kos/english/kavwebscan_unicode.cab
O16 - DPF: {17492023-C23A-453E-A040-C7C580BBF700} (Windows Genuine Advantage Validation Tool) - http://go.microsoft.com/fwlink/?linkid=39204
O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} (WUWebControl Class) - http://update.microsoft.com/windowsupdate/v6/V5Controls/en/x86/client/wuweb_site.cab?1179626279578
O17 - HKLM\System\CCS\Services\Tcpip\..\{08E8EB52-8ECD-4662-B2EE-72F2B6199EF8}: NameServer = 208.67.220.220,208.67.222.222
O17 - HKLM\System\CS1\Services\Tcpip\Parameters: NameServer = 208.67.220.220,208.67.222.222
O17 - HKLM\System\CS1\Services\Tcpip\..\{08E8EB52-8ECD-4662-B2EE-72F2B6199EF8}: NameServer = 208.67.220.220,208.67.222.222
O17 - HKLM\System\CS2\Services\Tcpip\Parameters: NameServer = 208.67.220.220,208.67.222.222
O17 - HKLM\System\CS2\Services\Tcpip\..\{08E8EB52-8ECD-4662-B2EE-72F2B6199EF8}: NameServer = 208.67.220.220,208.67.222.222
O17 - HKLM\System\CCS\Services\Tcpip\Parameters: NameServer = 208.67.220.220,208.67.222.222
O18 - Protocol: skype4com - {FFC8B962-9B40-4DFF-9458-1830C7DD7F5D} - C:\PROGRA~1\COMMON~1\Skype\SKYPE4~1.DLL
O20 - Winlogon Notify: ssqrsts - C:\WINDOWS\
O23 - Service: Ati HotKey Poller - ATI Technologies Inc. - C:\WINDOWS\System32\Ati2evxx.exe
O23 - Service: ATI Smart - Unknown owner - C:\WINDOWS\system32\ati2sgag.exe (file missing)
O23 - Service: Kaspersky Anti-Virus 7.0 (AVP) - Kaspersky Lab - C:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 7.0\avp.exe
O23 - Service: Canon Camera Access Library 8 (CCALib8) - Canon Inc. - C:\Program Files\Canon\CAL\CALMAIN.exe
O23 - Service: iPod Service - Apple Inc. - C:\Program Files\iPod\bin\iPodService.exe
O23 - Service: Remote Packet Capture Protocol v.0 (experimental) (rpcapd) - CACE Technologies - C:\Program Files\WinPcap\rpcapd.exe

--
End of file - 5038 bytes




My ComboFix report:

ComboFix 07-12-12.3 - Andy Cheng 2007-12-12 12:47:02.1 - FAT32x86
Microsoft Windows XP Professional 5.1.2600.1.1252.1.1033.18.702 [GMT -8:00]
Running from: C:\Documents and Settings\Andy Cheng\Desktop\ComboFix.exe
* Created a new restore point
.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.

C:\Documents and Settings\Andy Cheng\Application Data\ICROSO~1.NET
C:\Documents and Settings\Andy Cheng\Application Data\YSTEM3~1
C:\Documents and Settings\Andy Cheng\My Documents\RACLE~1
C:\Documents and Settings\Andy Cheng\My Documents\YMBOLS~1
C:\Program Files\Common Files\rteke.html
C:\WINDOWS\asembl~1
C:\WINDOWS\cookies.ini
C:\WINDOWS\system32\appatc~1
C:\WINDOWS\system32\atiuuurn.dll
C:\WINDOWS\system32\bccdd.bak2
C:\WINDOWS\system32\bccdd.ini
C:\WINDOWS\system32\bccdd.ini2
C:\WINDOWS\system32\bccdd.tmp
C:\WINDOWS\system32\cnbuk.exe
C:\WINDOWS\system32\cywgkhvo.exe
C:\WINDOWS\System32\ddccb.dll
C:\WINDOWS\system32\dlsefekt.dll
C:\WINDOWS\system32\drivers\tgjxubaj.dat
C:\WINDOWS\system32\ebqefitv.dll
C:\WINDOWS\system32\goilaofk.ini
C:\WINDOWS\system32\gtfpcwje.dll
C:\WINDOWS\system32\hfuveisu.exe
C:\WINDOWS\system32\hmvsjlnf.exe
C:\WINDOWS\system32\ilrmissn.dll
C:\WINDOWS\system32\jevqgove.exe
C:\WINDOWS\system32\jwgatiaq.ini
C:\WINDOWS\system32\kfoaliog.dll
C:\WINDOWS\system32\kjmdlime.dll
C:\WINDOWS\system32\kqflrtkv.dll
C:\WINDOWS\system32\lwtjlplk.exe
C:\WINDOWS\system32\lxmykokm.exe
C:\WINDOWS\system32\mprap.dll
C:\WINDOWS\system32\mqxytiqb.exe
C:\WINDOWS\system32\nwfuvurq.ini
C:\WINDOWS\system32\oqockqiq.exe
C:\WINDOWS\system32\orodwhmr.dll
C:\WINDOWS\system32\pccxeawi.exe
C:\WINDOWS\system32\qaitagwj.dll
C:\WINDOWS\system32\qruvufwn.dll
C:\WINDOWS\system32\rhtrnwbu.exe
C:\WINDOWS\system32\rmhwdoro.ini
C:\WINDOWS\system32\tjufdncs.dll
C:\WINDOWS\system32\vdoiiepw.exe
C:\WINDOWS\system32\vgcddukd.dll
C:\WINDOWS\system32\wgwhmlxn.dll
C:\WINDOWS\system32\wkpcjcpv.exe
C:\WINDOWS\system32\wnsxs~1
C:\WINDOWS\system32\xgpithxr.dll
C:\WINDOWS\system32\yjosaihw.dll

.
((((((((((((((((((((((((((((((((((((((( Drivers/Services )))))))))))))))))))))))))))))))))))))))))))))))))

.
-------\LEGACY_AVNHRYBQ
-------\LEGACY_CMDSERVICE
-------\LEGACY_DOMAINSERVICE
-------\avnhrybq
-------\DomainService


((((((((((((((((((((((((( Files Created from 2007-11-12 to 2007-12-12 )))))))))))))))))))))))))))))))
.

2007-12-11 22:15 . 2007-12-12 12:34 913,022 ---hs---- C:\WINDOWS\system32\abqmhchg.ini
2007-12-11 22:14 . 2007-12-11 22:14 97 --a------ C:\WINDOWS\system32\mcrh.tmp
2007-12-11 17:24 . 2007-12-11 21:20 913,082 ---hs---- C:\WINDOWS\system32\qmamnwls.ini
2007-12-10 22:04 . 2007-12-11 15:43 896,282 ---hs---- C:\WINDOWS\system32\ffmovoak.ini
2007-12-10 17:29 . 2007-12-10 22:02 859,004 ---hs---- C:\WINDOWS\system32\gtjctdbh.ini
2007-12-10 17:26 . 2007-12-10 17:26 <DIR> d-------- C:\Program Files\Trend Micro
2007-12-10 15:21 . 2007-12-10 15:21 <DIR> d-------- C:\WINDOWS\system32\Kaspersky Lab
2007-12-10 15:19 . 2007-12-10 15:19 <DIR> d-------- C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy
2007-12-10 15:15 . 2007-12-10 17:25 858,884 ---hs---- C:\WINDOWS\system32\eqetsmkw.ini
2007-12-09 20:46 . 2007-12-09 21:16 82,061 --a------ C:\WINDOWS\system32\drivers\klick.dat
2007-12-09 20:46 . 2007-12-09 21:16 81,549 --a------ C:\WINDOWS\system32\drivers\klin.dat
2007-12-09 20:43 . 2007-12-09 20:43 <DIR> d-------- C:\Documents and Settings\All Users\Application Data\Kaspersky Lab
2007-12-09 20:43 . 2007-12-12 12:51 32 --ahs---- C:\WINDOWS\system32\drivers\fidbox2.idx
2007-12-09 20:43 . 2007-12-12 12:51 32 --ahs---- C:\WINDOWS\system32\drivers\fidbox2.dat
2007-12-09 20:43 . 2007-12-12 12:51 32 --ahs---- C:\WINDOWS\system32\drivers\fidbox.idx
2007-12-09 20:43 . 2007-12-12 12:51 32 --ahs---- C:\WINDOWS\system32\drivers\fidbox.dat
2007-12-09 20:38 . 2007-12-09 20:39 22,352 --a------ C:\Documents and Settings\Andy Cheng\Application Data\info.dat
2007-12-09 20:16 . 2007-12-09 20:16 11,991 --a------ C:\WINDOWS\system32\hqfahxwvsnp
2007-12-09 20:16 . 2007-12-09 20:16 3 --a------ C:\WINDOWS\system32\RunOnce.tmp
2007-12-09 20:16 . 2007-12-09 20:16 0 --a------ C:\WINDOWS\system32\robvr
2007-12-09 20:11 . 2007-12-09 20:11 <DIR> d-------- C:\Program Files\E404 Helper
2007-12-08 12:51 . 2007-12-08 12:51 <DIR> d-------- C:\Program Files\DAEMON Tools
2007-12-08 12:48 . 2007-12-08 12:48 685,816 --a------ C:\WINDOWS\system32\drivers\sptd.sys
2007-12-07 22:48 . 2007-12-07 22:48 <DIR> d--hs---- C:\FOUND.021
2007-12-03 16:11 . 2007-12-03 16:11 <DIR> d--hs---- C:\FOUND.020
2007-12-01 13:46 . 2007-12-01 13:46 <DIR> d--hs---- C:\FOUND.019
2007-11-26 16:02 . 2007-11-26 16:02 <DIR> d-------- C:\Program Files\Ventrilo
2007-11-26 16:02 . 2007-11-26 16:02 <DIR> d-------- C:\Program Files\Common Files\Wise Installation Wizard
2007-11-22 19:46 . 2007-11-22 19:46 <DIR> d-------- C:\Documents and Settings\Andy Cheng\Application Data\skypePM
2007-11-22 19:46 . 2007-11-22 19:46 32 --a------ C:\Documents and Settings\All Users\Application Data\ezsid.dat
2007-11-22 19:44 . 2007-11-22 19:44 <DIR> d-------- C:\Documents and Settings\Andy Cheng\Application Data\Skype
2007-11-22 19:43 . 2007-11-22 19:43 <DIR> d-------- C:\Program Files\Skype
2007-11-22 19:43 . 2007-11-22 19:43 <DIR> d-------- C:\Program Files\Common Files\Skype
2007-11-22 19:43 . 2007-11-22 19:43 <DIR> d-------- C:\Documents and Settings\All Users\Application Data\Skype
2007-11-20 20:34 . 2007-11-20 20:34 <DIR> d-------- C:\Documents and Settings\Andy Cheng\Application Data\ZoomBrowser EX
2007-11-20 20:31 . 2002-08-29 03:41 150,528 --a------ C:\WINDOWS\system32\ptpusd.dll
2007-11-20 20:31 . 2002-08-29 01:48 14,208 --a------ C:\WINDOWS\system32\drivers\usbscan.sys
2007-11-20 20:31 . 2002-08-29 01:48 14,208 --a------ C:\WINDOWS\system32\dllcache\usbscan.sys
2007-11-20 20:31 . 2001-08-17 22:36 5,632 --a------ C:\WINDOWS\system32\ptpusb.dll
2007-11-19 16:05 . 2007-11-19 16:05 <DIR> d-------- C:\Documents and Settings\All Users\Application Data\ZoomBrowser
2007-11-19 16:04 . 2007-11-19 16:04 <DIR> d-------- C:\Program Files\Canon
2007-11-19 16:03 . 2007-11-19 16:03 <DIR> d-------- C:\Program Files\Common Files\Canon
2007-11-16 19:43 . 2007-11-16 19:43 <DIR> d-------- C:\Sierra
2007-11-16 19:43 . 2007-11-16 19:43 <DIR> d-------- C:\Program Files\NHN USA
2007-11-16 19:43 . 2007-11-16 19:43 <DIR> d-------- C:\Program Files\Atari
2007-11-16 19:43 . 2007-11-16 19:43 <DIR> d-------- C:\IJJI
2007-11-16 19:43 . 2007-11-16 19:43 <DIR> d-------- C:\Documents and Settings\All Users\Application Data\IJJIGame
2007-11-16 19:42 . 2007-11-16 19:43 <DIR> d-------- C:\Program Files\Common Files\qfiw
2007-11-14 22:19 . 2007-11-14 22:19 <DIR> d-------- C:\Program Files\Ventrilo(2)

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2007-09-27 20:08 692,224 ----a-w C:\WINDOWS\system32\ijjiSetup.exe
2007-08-06 10:16 80 --sh--r C:\WINDOWS\system32\488CB70509.dll
.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{F10587E9-0E47-4CBE-84AE-7DD20B8684BB}]
2007-12-09 20:11 17920 --a------ C:\Program Files\E404 Helper\e404.v5.dll

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"AIM"="C:\Program Files\AIM\aim.exe" [2006-08-01 15:35]
"Steam"="" []
"DAEMON Tools"="C:\Program Files\DAEMON Tools\daemon.exe" [2007-12-06 04:06]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"Adobe Reader Speed Launcher"="C:\Program Files\Adobe\Reader 8.0\Reader\Reader_sl.exe" [2007-05-11 03:06]
"QuickTime Task"="C:\Program Files\QuickTime\qttask.exe" [2007-06-29 06:24]

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\ssqrsts]

R3 klim5;Kaspersky Anti-Virus NDIS Filter;C:\WINDOWS\System32\DRIVERS\klim5.sys
S3 GVCplDrv;GVCplDrv;C:\WINDOWS\System32\drivers\GVCplDrv.sys
S3 NPF;NetGroup Packet Filter Driver;C:\WINDOWS\System32\drivers\npf.sys
S3 VNICPKT5;VNICPKT5 Protocol Driver;\??\C:\WINDOWS\System32\VNICPKT5.SYS

*Newly Created Service* - ALG
*Newly Created Service* - IPNAT
.
Contents of the 'Scheduled Tasks' folder
"2007-11-01 02:32:02 C:\WINDOWS\Tasks\AppleSoftwareUpdate.job"
- C:\Program Files\Apple Software Update\SoftwareUpdate.exe
.
**************************************************************************

catchme 0.3.1333 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2007-12-12 12:53:16
Windows 5.1.2600 Service Pack 1 FAT NTAPI

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully
hidden files: 0

**************************************************************************
.
Completion time: 2007-12-12 12:54:01 - machine was rebooted

Thanks again :)
Andy.

Shaba
2007-12-13, 10:05
Hi

Combofix removed much but still much left:

Open notepad and copy/paste the text in the quotebox below into it:


File::
C:\WINDOWS\system32\abqmhchg.ini
C:\WINDOWS\system32\mcrh.tmp
C:\WINDOWS\system32\qmamnwls.ini
C:\WINDOWS\system32\ffmovoak.ini
C:\WINDOWS\system32\gtjctdbh.ini
C:\WINDOWS\system32\eqetsmkw.ini
C:\WINDOWS\system32\hqfahxwvsnp
C:\WINDOWS\system32\robvr

Folder::
C:\Program Files\E404 Helper

Registry::
[-HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{F10587E9-0E47-4CBE-84AE-7DD20B8684BB}]

[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\ssqrsts]


Save this as "CFScript"

Then drag the CFScript into ComboFix.exe as you see in the screenshot below.

http://img.photobucket.com/albums/v666/sUBs/CFScript.gif

This will start ComboFix again. After reboot, (in case it asks to reboot), post the contents of Combofix.txt in your next reply together with a new HijackThis log.

Combofix should never take more that 20 minutes including the reboot if malware is detected.
If it does, open Task Manager then Processes tab (press ctrl, alt and del at the same time) and end any processes of findstr, find, sed or swreg, then combofix should continue.
If that happened we want to know, and also what process you had to end.

ssnipazz
2007-12-13, 22:19
ComboFix 07-12-12.3 - Andy Cheng 2007-12-13 13:15:37.2 - FAT32x86
Microsoft Windows XP Professional 5.1.2600.1.1252.1.1033.18.755 [GMT -8:00]
Running from: C:\Documents and Settings\Andy Cheng\Desktop\ComboFix.exe
Command switches used :: C:\Documents and Settings\Andy Cheng\Desktop\CFScript.txt
* Created a new restore point
.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.

C:\Program Files\E404 Helper
C:\Program Files\E404 Helper\e404.v5.dll

.
((((((((((((((((((((((((( Files Created from 2007-11-13 to 2007-12-13 )))))))))))))))))))))))))))))))
.

2007-12-11 22:15 . 2007-12-12 12:34 913,022 ---hs---- C:\WINDOWS\system32\abqmhchg.ini
2007-12-11 22:14 . 2007-12-11 22:14 97 --a------ C:\WINDOWS\system32\mcrh.tmp
2007-12-11 17:24 . 2007-12-11 21:20 913,082 ---hs---- C:\WINDOWS\system32\qmamnwls.ini
2007-12-10 22:04 . 2007-12-11 15:43 896,282 ---hs---- C:\WINDOWS\system32\ffmovoak.ini
2007-12-10 17:29 . 2007-12-10 22:02 859,004 ---hs---- C:\WINDOWS\system32\gtjctdbh.ini
2007-12-10 17:26 . 2007-12-10 17:26 <DIR> d-------- C:\Program Files\Trend Micro
2007-12-10 15:21 . 2007-12-10 15:21 <DIR> d-------- C:\WINDOWS\system32\Kaspersky Lab
2007-12-10 15:19 . 2007-12-10 15:19 <DIR> d-------- C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy
2007-12-10 15:15 . 2007-12-10 17:25 858,884 ---hs---- C:\WINDOWS\system32\eqetsmkw.ini
2007-12-09 20:46 . 2007-12-09 21:16 82,061 --a------ C:\WINDOWS\system32\drivers\klick.dat
2007-12-09 20:46 . 2007-12-09 21:16 81,549 --a------ C:\WINDOWS\system32\drivers\klin.dat
2007-12-09 20:43 . 2007-12-09 20:43 <DIR> d-------- C:\Documents and Settings\All Users\Application Data\Kaspersky Lab
2007-12-09 20:43 . 2007-12-13 00:21 32 --ahs---- C:\WINDOWS\system32\drivers\fidbox2.idx
2007-12-09 20:43 . 2007-12-13 00:21 32 --ahs---- C:\WINDOWS\system32\drivers\fidbox2.dat
2007-12-09 20:43 . 2007-12-13 00:21 32 --ahs---- C:\WINDOWS\system32\drivers\fidbox.idx
2007-12-09 20:43 . 2007-12-13 00:21 32 --ahs---- C:\WINDOWS\system32\drivers\fidbox.dat
2007-12-09 20:38 . 2007-12-09 20:39 22,352 --a------ C:\Documents and Settings\Andy Cheng\Application Data\info.dat
2007-12-09 20:16 . 2007-12-09 20:16 11,991 --a------ C:\WINDOWS\system32\hqfahxwvsnp
2007-12-09 20:16 . 2007-12-09 20:16 3 --a------ C:\WINDOWS\system32\RunOnce.tmp
2007-12-09 20:16 . 2007-12-09 20:16 0 --a------ C:\WINDOWS\system32\robvr
2007-12-08 12:51 . 2007-12-08 12:51 <DIR> d-------- C:\Program Files\DAEMON Tools
2007-12-08 12:48 . 2007-12-08 12:48 685,816 --a------ C:\WINDOWS\system32\drivers\sptd.sys
2007-12-07 22:48 . 2007-12-07 22:48 <DIR> d--hs---- C:\FOUND.021
2007-12-03 16:11 . 2007-12-03 16:11 <DIR> d--hs---- C:\FOUND.020
2007-12-01 13:46 . 2007-12-01 13:46 <DIR> d--hs---- C:\FOUND.019
2007-11-26 16:02 . 2007-11-26 16:02 <DIR> d-------- C:\Program Files\Ventrilo
2007-11-26 16:02 . 2007-11-26 16:02 <DIR> d-------- C:\Program Files\Common Files\Wise Installation Wizard
2007-11-22 19:46 . 2007-11-22 19:46 <DIR> d-------- C:\Documents and Settings\Andy Cheng\Application Data\skypePM
2007-11-22 19:46 . 2007-11-22 19:46 32 --a------ C:\Documents and Settings\All Users\Application Data\ezsid.dat
2007-11-22 19:44 . 2007-11-22 19:44 <DIR> d-------- C:\Documents and Settings\Andy Cheng\Application Data\Skype
2007-11-22 19:43 . 2007-11-22 19:43 <DIR> d-------- C:\Program Files\Skype
2007-11-22 19:43 . 2007-11-22 19:43 <DIR> d-------- C:\Program Files\Common Files\Skype
2007-11-22 19:43 . 2007-11-22 19:43 <DIR> d-------- C:\Documents and Settings\All Users\Application Data\Skype
2007-11-20 20:34 . 2007-11-20 20:34 <DIR> d-------- C:\Documents and Settings\Andy Cheng\Application Data\ZoomBrowser EX
2007-11-20 20:31 . 2002-08-29 03:41 150,528 --a------ C:\WINDOWS\system32\ptpusd.dll
2007-11-20 20:31 . 2002-08-29 01:48 14,208 --a------ C:\WINDOWS\system32\drivers\usbscan.sys
2007-11-20 20:31 . 2002-08-29 01:48 14,208 --a------ C:\WINDOWS\system32\dllcache\usbscan.sys
2007-11-20 20:31 . 2001-08-17 22:36 5,632 --a------ C:\WINDOWS\system32\ptpusb.dll
2007-11-19 16:05 . 2007-11-19 16:05 <DIR> d-------- C:\Documents and Settings\All Users\Application Data\ZoomBrowser
2007-11-19 16:04 . 2007-11-19 16:04 <DIR> d-------- C:\Program Files\Canon
2007-11-19 16:03 . 2007-11-19 16:03 <DIR> d-------- C:\Program Files\Common Files\Canon
2007-11-16 19:43 . 2007-11-16 19:43 <DIR> d-------- C:\Sierra
2007-11-16 19:43 . 2007-11-16 19:43 <DIR> d-------- C:\Program Files\NHN USA
2007-11-16 19:43 . 2007-11-16 19:43 <DIR> d-------- C:\Program Files\Atari
2007-11-16 19:43 . 2007-11-16 19:43 <DIR> d-------- C:\IJJI
2007-11-16 19:43 . 2007-11-16 19:43 <DIR> d-------- C:\Documents and Settings\All Users\Application Data\IJJIGame
2007-11-16 19:42 . 2007-11-16 19:43 <DIR> d-------- C:\Program Files\Common Files\qfiw
2007-11-14 22:19 . 2007-11-14 22:19 <DIR> d-------- C:\Program Files\Ventrilo(2)

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2007-09-27 20:08 692,224 ----a-w C:\WINDOWS\system32\ijjiSetup.exe
2007-08-06 10:16 80 --sh--r C:\WINDOWS\system32\488CB70509.dll
.

((((((((((((((((((((((((((((( snapshot@2007-12-12_12.53.24.70 )))))))))))))))))))))))))))))))))))))))))
.
+ 2007-03-13 18:57:12 163,328 ----a-w C:\WINDOWS\erdnt\subs\F3M\ERDNT.EXE
- 2007-12-12 20:52:36 16,384 ----a-w C:\WINDOWS\system32\config\systemprofile\Cookies\index.dat
+ 2007-12-13 21:12:52 16,384 ----a-w C:\WINDOWS\system32\config\systemprofile\Cookies\index.dat
- 2007-12-12 20:52:36 32,768 ----a-w C:\WINDOWS\system32\config\systemprofile\Local Settings\History\History.IE5\index.dat
+ 2007-12-13 21:12:52 32,768 ----a-w C:\WINDOWS\system32\config\systemprofile\Local Settings\History\History.IE5\index.dat
- 2007-12-12 20:52:36 49,152 ----a-w C:\WINDOWS\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\index.dat
+ 2007-12-13 21:12:52 49,152 ----a-w C:\WINDOWS\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\index.dat
- 2007-12-12 20:46:50 241,664 ----a-w C:\WINDOWS\system32\config\systemprofile\ntuser.dat
+ 2007-12-13 21:15:28 241,664 ----a-w C:\WINDOWS\system32\config\systemprofile\ntuser.dat
- 2007-09-05 06:21:04 40,836 ----a-w C:\WINDOWS\system32\perfc009.dat
+ 2007-12-12 20:53:56 40,836 ----a-w C:\WINDOWS\system32\perfc009.dat
- 2007-09-05 06:21:04 314,508 ----a-w C:\WINDOWS\system32\perfh009.dat
+ 2007-12-12 20:53:56 314,508 ----a-w C:\WINDOWS\system32\perfh009.dat
.
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"AIM"="C:\Program Files\AIM\aim.exe" [2006-08-01 15:35]
"Steam"="" []
"DAEMON Tools"="C:\Program Files\DAEMON Tools\daemon.exe" [2007-12-06 04:06]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"Adobe Reader Speed Launcher"="C:\Program Files\Adobe\Reader 8.0\Reader\Reader_sl.exe" [2007-05-11 03:06]
"QuickTime Task"="C:\Program Files\QuickTime\qttask.exe" [2007-06-29 06:24]

R3 klim5;Kaspersky Anti-Virus NDIS Filter;C:\WINDOWS\System32\DRIVERS\klim5.sys
S3 GVCplDrv;GVCplDrv;C:\WINDOWS\System32\drivers\GVCplDrv.sys
S3 NPF;NetGroup Packet Filter Driver;C:\WINDOWS\System32\drivers\npf.sys
S3 VNICPKT5;VNICPKT5 Protocol Driver;\??\C:\WINDOWS\System32\VNICPKT5.SYS

.
Contents of the 'Scheduled Tasks' folder
"2007-11-01 02:32:02 C:\WINDOWS\Tasks\AppleSoftwareUpdate.job"
- C:\Program Files\Apple Software Update\SoftwareUpdate.exe
.
**************************************************************************

catchme 0.3.1333 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2007-12-13 13:17:36
Windows 5.1.2600 Service Pack 1 FAT NTAPI

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully
hidden files: 0

**************************************************************************
.
Completion time: 2007-12-13 13:18:15
C:\ComboFix2.txt ... 2007-12-12 12:54





HiJackThis log:

Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 1:19:41 PM, on 12/13/2007
Platform: Windows XP SP1 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP1 (6.00.2800.1106)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\System32\Ati2evxx.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Canon\CAL\CALMAIN.exe
C:\Program Files\Adobe\Reader 8.0\Reader\Reader_sl.exe
C:\Program Files\AIM\aim.exe
C:\Program Files\DAEMON Tools\daemon.exe
C:\WINDOWS\explorer.exe
C:\WINDOWS\system32\notepad.exe
C:\Program Files\Mozilla Firefox\firefox.exe
C:\Program Files\Trend Micro\HijackThis\ssnipazz.exe

O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelper.dll
O2 - BHO: Spybot-S&D IE Protection - {53707962-6F74-2D53-2644-206D7942484F} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.6.0_01\bin\ssv.dll
O3 - Toolbar: &Radio - {8E718888-423F-11D2-876E-00A0C9082467} - C:\WINDOWS\System32\msdxm.ocx
O4 - HKLM\..\Run: [Adobe Reader Speed Launcher] "C:\Program Files\Adobe\Reader 8.0\Reader\Reader_sl.exe"
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKCU\..\Run: [AIM] C:\Program Files\AIM\aim.exe -cnetwait.odl
O4 - HKCU\..\Run: [DAEMON Tools] "C:\Program Files\DAEMON Tools\daemon.exe"
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\OFFICE11\EXCEL.EXE/3000
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_01\bin\ssv.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_01\bin\ssv.dll
O9 - Extra button: Web Anti-Virus statistics - {1F460357-8A94-4D71-9CA3-AA4ACF32ED8E} - C:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 7.0\SCIEPlgn.dll
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\OFFICE11\REFIEBAR.DLL
O9 - Extra button: AIM - {AC9E2541-2814-11d5-BC6D-00B0D0A1DE45} - C:\Program Files\AIM\aim.exe
O9 - Extra button: Related - {c95fe080-8f5d-11d2-a20b-00aa003c157a} - C:\WINDOWS\web\related.htm
O9 - Extra 'Tools' menuitem: Show &Related Links - {c95fe080-8f5d-11d2-a20b-00aa003c157a} - C:\WINDOWS\web\related.htm
O9 - Extra button: (no name) - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O9 - Extra 'Tools' menuitem: Spybot - Search & Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O16 - DPF: {0EB0E74A-2A76-4AB3-A7FB-9BD8C29F7F75} (CKAVWebScan Object) - http://www.kaspersky.com/kos/english/kavwebscan_unicode.cab
O16 - DPF: {17492023-C23A-453E-A040-C7C580BBF700} (Windows Genuine Advantage Validation Tool) - http://go.microsoft.com/fwlink/?linkid=39204
O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} (WUWebControl Class) - http://update.microsoft.com/windowsupdate/v6/V5Controls/en/x86/client/wuweb_site.cab?1179626279578
O17 - HKLM\System\CCS\Services\Tcpip\..\{08E8EB52-8ECD-4662-B2EE-72F2B6199EF8}: NameServer = 208.67.220.220,208.67.222.222
O17 - HKLM\System\CS1\Services\Tcpip\Parameters: NameServer = 208.67.220.220,208.67.222.222
O17 - HKLM\System\CS1\Services\Tcpip\..\{08E8EB52-8ECD-4662-B2EE-72F2B6199EF8}: NameServer = 208.67.220.220,208.67.222.222
O17 - HKLM\System\CS2\Services\Tcpip\Parameters: NameServer = 208.67.220.220,208.67.222.222
O17 - HKLM\System\CS2\Services\Tcpip\..\{08E8EB52-8ECD-4662-B2EE-72F2B6199EF8}: NameServer = 208.67.220.220,208.67.222.222
O17 - HKLM\System\CCS\Services\Tcpip\Parameters: NameServer = 208.67.220.220,208.67.222.222
O18 - Protocol: skype4com - {FFC8B962-9B40-4DFF-9458-1830C7DD7F5D} - C:\PROGRA~1\COMMON~1\Skype\SKYPE4~1.DLL
O23 - Service: Ati HotKey Poller - ATI Technologies Inc. - C:\WINDOWS\System32\Ati2evxx.exe
O23 - Service: ATI Smart - Unknown owner - C:\WINDOWS\system32\ati2sgag.exe (file missing)
O23 - Service: Kaspersky Anti-Virus 7.0 (AVP) - Kaspersky Lab - C:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 7.0\avp.exe
O23 - Service: Canon Camera Access Library 8 (CCALib8) - Canon Inc. - C:\Program Files\Canon\CAL\CALMAIN.exe
O23 - Service: iPod Service - Apple Inc. - C:\Program Files\iPod\bin\iPodService.exe
O23 - Service: Remote Packet Capture Protocol v.0 (experimental) (rpcapd) - CACE Technologies - C:\Program Files\WinPcap\rpcapd.exe

--
End of file - 4789 bytes


Thanks again,
Andy.

Shaba
2007-12-14, 09:43
Hi

It looks like that some files were actually folders and that's why script partially failed, we'll try again:

Delete these:

C:\WINDOWS\system32\hqfahxwvsnp
C:\WINDOWS\system32\robvr

Empty Recycle Bin

Open notepad and copy/paste the text in the quotebox below into it:


File::
C:\WINDOWS\system32\abqmhchg.ini
C:\WINDOWS\system32\mcrh.tmp
C:\WINDOWS\system32\qmamnwls.ini
C:\WINDOWS\system32\ffmovoak.ini
C:\WINDOWS\system32\gtjctdbh.ini
C:\WINDOWS\system32\eqetsmkw.ini


Save this as "CFScript"

Then drag the CFScript into ComboFix.exe as you see in the screenshot below.

http://img.photobucket.com/albums/v666/sUBs/CFScript.gif

This will start ComboFix again. After reboot, (in case it asks to reboot), post the contents of Combofix.txt in your next reply together with a new HijackThis log.

Combofix should never take more that 20 minutes including the reboot if malware is detected.
If it does, open Task Manager then Processes tab (press ctrl, alt and del at the same time) and end any processes of findstr, find, sed or swreg, then combofix should continue.
If that happened we want to know, and also what process you had to end.

ssnipazz
2007-12-15, 01:09
I manually deleted the two files you listed, then I ran Combofix. By the way, my desktop icons are no longer permanently highlighted blue! Every time I follow your replies, things seem to be getting better. Thanks!

ComboFix:

ComboFix 07-12-12.3 - Andy Cheng 2007-12-14 16:03:24.3 - FAT32x86
Microsoft Windows XP Professional 5.1.2600.1.1252.1.1033.18.720 [GMT -8:00]
Running from: C:\Documents and Settings\Andy Cheng\Desktop\ComboFix.exe
Command switches used :: C:\Documents and Settings\Andy Cheng\Desktop\CFScript.txt
* Created a new restore point

FILE
C:\WINDOWS\system32\abqmhchg.ini
C:\WINDOWS\system32\eqetsmkw.ini
C:\WINDOWS\system32\ffmovoak.ini
C:\WINDOWS\system32\gtjctdbh.ini
C:\WINDOWS\system32\mcrh.tmp
C:\WINDOWS\system32\qmamnwls.ini
.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.

C:\WINDOWS\system32\abqmhchg.ini
C:\WINDOWS\system32\eqetsmkw.ini
C:\WINDOWS\system32\ffmovoak.ini
C:\WINDOWS\system32\gtjctdbh.ini
C:\WINDOWS\system32\mcrh.tmp
C:\WINDOWS\system32\qmamnwls.ini

.
((((((((((((((((((((((((( Files Created from 2007-11-15 to 2007-12-15 )))))))))))))))))))))))))))))))
.

2007-12-10 17:26 . 2007-12-10 17:26 <DIR> d-------- C:\Program Files\Trend Micro
2007-12-10 15:21 . 2007-12-10 15:21 <DIR> d-------- C:\WINDOWS\system32\Kaspersky Lab
2007-12-10 15:19 . 2007-12-10 15:19 <DIR> d-------- C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy
2007-12-09 20:46 . 2007-12-09 21:16 82,061 --a------ C:\WINDOWS\system32\drivers\klick.dat
2007-12-09 20:46 . 2007-12-09 21:16 81,549 --a------ C:\WINDOWS\system32\drivers\klin.dat
2007-12-09 20:43 . 2007-12-09 20:43 <DIR> d-------- C:\Documents and Settings\All Users\Application Data\Kaspersky Lab
2007-12-09 20:43 . 2007-12-13 23:41 32 --ahs---- C:\WINDOWS\system32\drivers\fidbox2.idx
2007-12-09 20:43 . 2007-12-13 23:41 32 --ahs---- C:\WINDOWS\system32\drivers\fidbox2.dat
2007-12-09 20:43 . 2007-12-13 23:41 32 --ahs---- C:\WINDOWS\system32\drivers\fidbox.idx
2007-12-09 20:43 . 2007-12-13 23:41 32 --ahs---- C:\WINDOWS\system32\drivers\fidbox.dat
2007-12-09 20:38 . 2007-12-09 20:39 22,352 --a------ C:\Documents and Settings\Andy Cheng\Application Data\info.dat
2007-12-09 20:16 . 2007-12-09 20:16 3 --a------ C:\WINDOWS\system32\RunOnce.tmp
2007-12-08 12:51 . 2007-12-08 12:51 <DIR> d-------- C:\Program Files\DAEMON Tools
2007-12-08 12:48 . 2007-12-08 12:48 685,816 --a------ C:\WINDOWS\system32\drivers\sptd.sys
2007-12-07 22:48 . 2007-12-07 22:48 <DIR> d--hs---- C:\FOUND.021
2007-12-03 16:11 . 2007-12-03 16:11 <DIR> d--hs---- C:\FOUND.020
2007-12-01 13:46 . 2007-12-01 13:46 <DIR> d--hs---- C:\FOUND.019
2007-11-26 16:02 . 2007-11-26 16:02 <DIR> d-------- C:\Program Files\Ventrilo
2007-11-26 16:02 . 2007-11-26 16:02 <DIR> d-------- C:\Program Files\Common Files\Wise Installation Wizard
2007-11-22 19:46 . 2007-11-22 19:46 <DIR> d-------- C:\Documents and Settings\Andy Cheng\Application Data\skypePM
2007-11-22 19:46 . 2007-11-22 19:46 32 --a------ C:\Documents and Settings\All Users\Application Data\ezsid.dat
2007-11-22 19:44 . 2007-11-22 19:44 <DIR> d-------- C:\Documents and Settings\Andy Cheng\Application Data\Skype
2007-11-22 19:43 . 2007-11-22 19:43 <DIR> d-------- C:\Program Files\Skype
2007-11-22 19:43 . 2007-11-22 19:43 <DIR> d-------- C:\Program Files\Common Files\Skype
2007-11-22 19:43 . 2007-11-22 19:43 <DIR> d-------- C:\Documents and Settings\All Users\Application Data\Skype
2007-11-20 20:34 . 2007-11-20 20:34 <DIR> d-------- C:\Documents and Settings\Andy Cheng\Application Data\ZoomBrowser EX
2007-11-20 20:31 . 2002-08-29 03:41 150,528 --a------ C:\WINDOWS\system32\ptpusd.dll
2007-11-20 20:31 . 2002-08-29 01:48 14,208 --a------ C:\WINDOWS\system32\drivers\usbscan.sys
2007-11-20 20:31 . 2002-08-29 01:48 14,208 --a------ C:\WINDOWS\system32\dllcache\usbscan.sys
2007-11-20 20:31 . 2001-08-17 22:36 5,632 --a------ C:\WINDOWS\system32\ptpusb.dll
2007-11-19 16:05 . 2007-11-19 16:05 <DIR> d-------- C:\Documents and Settings\All Users\Application Data\ZoomBrowser
2007-11-19 16:04 . 2007-11-19 16:04 <DIR> d-------- C:\Program Files\Canon
2007-11-19 16:03 . 2007-11-19 16:03 <DIR> d-------- C:\Program Files\Common Files\Canon
2007-11-16 19:43 . 2007-11-16 19:43 <DIR> d-------- C:\Sierra
2007-11-16 19:43 . 2007-11-16 19:43 <DIR> d-------- C:\Program Files\NHN USA
2007-11-16 19:43 . 2007-11-16 19:43 <DIR> d-------- C:\Program Files\Atari
2007-11-16 19:43 . 2007-11-16 19:43 <DIR> d-------- C:\IJJI
2007-11-16 19:43 . 2007-11-16 19:43 <DIR> d-------- C:\Documents and Settings\All Users\Application Data\IJJIGame
2007-11-16 19:42 . 2007-11-16 19:43 <DIR> d-------- C:\Program Files\Common Files\qfiw

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2007-11-15 06:19 --------- d-----w C:\Program Files\Ventrilo(2)
2007-09-27 20:08 692,224 ----a-w C:\WINDOWS\system32\ijjiSetup.exe
2007-08-06 10:16 80 --sh--r C:\WINDOWS\system32\488CB70509.dll
.

((((((((((((((((((((((((((((( snapshot@2007-12-12_12.53.24.70 )))))))))))))))))))))))))))))))))))))))))
.
+ 2007-03-13 18:57:12 163,328 ----a-w C:\WINDOWS\erdnt\subs\F3M\ERDNT.EXE
- 2007-12-12 20:52:36 16,384 ----a-w C:\WINDOWS\system32\config\systemprofile\Cookies\index.dat
+ 2007-12-14 23:01:52 16,384 ----a-w C:\WINDOWS\system32\config\systemprofile\Cookies\index.dat
- 2007-12-12 20:52:36 32,768 ----a-w C:\WINDOWS\system32\config\systemprofile\Local Settings\History\History.IE5\index.dat
+ 2007-12-14 23:01:52 32,768 ----a-w C:\WINDOWS\system32\config\systemprofile\Local Settings\History\History.IE5\index.dat
- 2007-12-12 20:52:36 49,152 ----a-w C:\WINDOWS\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\index.dat
+ 2007-12-14 23:08:18 32,768 ----a-w C:\WINDOWS\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\index.dat
- 2007-12-12 20:46:50 241,664 ----a-w C:\WINDOWS\system32\config\systemprofile\ntuser.dat
+ 2007-12-15 00:03:18 241,664 ----a-w C:\WINDOWS\system32\config\systemprofile\ntuser.dat
- 2007-09-05 06:21:04 40,836 ----a-w C:\WINDOWS\system32\perfc009.dat
+ 2007-12-12 20:53:56 40,836 ----a-w C:\WINDOWS\system32\perfc009.dat
- 2007-09-05 06:21:04 314,508 ----a-w C:\WINDOWS\system32\perfh009.dat
+ 2007-12-12 20:53:56 314,508 ----a-w C:\WINDOWS\system32\perfh009.dat
.
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"AIM"="C:\Program Files\AIM\aim.exe" [2006-08-01 15:35]
"Steam"="" []
"DAEMON Tools"="C:\Program Files\DAEMON Tools\daemon.exe" [2007-12-06 04:06]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"Adobe Reader Speed Launcher"="C:\Program Files\Adobe\Reader 8.0\Reader\Reader_sl.exe" [2007-05-11 03:06]
"QuickTime Task"="C:\Program Files\QuickTime\qttask.exe" [2007-06-29 06:24]

R3 klim5;Kaspersky Anti-Virus NDIS Filter;C:\WINDOWS\System32\DRIVERS\klim5.sys
S3 GVCplDrv;GVCplDrv;C:\WINDOWS\System32\drivers\GVCplDrv.sys
S3 NPF;NetGroup Packet Filter Driver;C:\WINDOWS\System32\drivers\npf.sys
S3 VNICPKT5;VNICPKT5 Protocol Driver;\??\C:\WINDOWS\System32\VNICPKT5.SYS

.
Contents of the 'Scheduled Tasks' folder
"2007-11-01 02:32:02 C:\WINDOWS\Tasks\AppleSoftwareUpdate.job"
- C:\Program Files\Apple Software Update\SoftwareUpdate.exe
.
**************************************************************************

catchme 0.3.1333 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2007-12-14 16:05:09
Windows 5.1.2600 Service Pack 1 FAT NTAPI

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully
hidden files: 0

**************************************************************************
.
Completion time: 2007-12-14 16:05:46
C:\ComboFix3.txt ... 2007-12-12 12:54
C:\ComboFix2.txt ... 2007-12-13 13:18




HiJackThis:

Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 4:09:16 PM, on 12/14/2007
Platform: Windows XP SP1 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP1 (6.00.2800.1106)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\System32\Ati2evxx.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Canon\CAL\CALMAIN.exe
C:\Program Files\AIM\aim.exe
C:\Program Files\DAEMON Tools\daemon.exe
C:\WINDOWS\explorer.exe
C:\WINDOWS\system32\notepad.exe
C:\Program Files\Mozilla Firefox\firefox.exe
C:\Program Files\Trend Micro\HijackThis\ssnipazz.exe

O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelper.dll
O2 - BHO: Spybot-S&D IE Protection - {53707962-6F74-2D53-2644-206D7942484F} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.6.0_01\bin\ssv.dll
O3 - Toolbar: &Radio - {8E718888-423F-11D2-876E-00A0C9082467} - C:\WINDOWS\System32\msdxm.ocx
O4 - HKLM\..\Run: [Adobe Reader Speed Launcher] "C:\Program Files\Adobe\Reader 8.0\Reader\Reader_sl.exe"
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKCU\..\Run: [AIM] C:\Program Files\AIM\aim.exe -cnetwait.odl
O4 - HKCU\..\Run: [DAEMON Tools] "C:\Program Files\DAEMON Tools\daemon.exe"
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\OFFICE11\EXCEL.EXE/3000
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_01\bin\ssv.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_01\bin\ssv.dll
O9 - Extra button: Web Anti-Virus statistics - {1F460357-8A94-4D71-9CA3-AA4ACF32ED8E} - C:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 7.0\SCIEPlgn.dll
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\OFFICE11\REFIEBAR.DLL
O9 - Extra button: AIM - {AC9E2541-2814-11d5-BC6D-00B0D0A1DE45} - C:\Program Files\AIM\aim.exe
O9 - Extra button: Related - {c95fe080-8f5d-11d2-a20b-00aa003c157a} - C:\WINDOWS\web\related.htm
O9 - Extra 'Tools' menuitem: Show &Related Links - {c95fe080-8f5d-11d2-a20b-00aa003c157a} - C:\WINDOWS\web\related.htm
O9 - Extra button: (no name) - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O9 - Extra 'Tools' menuitem: Spybot - Search & Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O16 - DPF: {0EB0E74A-2A76-4AB3-A7FB-9BD8C29F7F75} (CKAVWebScan Object) - http://www.kaspersky.com/kos/english/kavwebscan_unicode.cab
O16 - DPF: {17492023-C23A-453E-A040-C7C580BBF700} (Windows Genuine Advantage Validation Tool) - http://go.microsoft.com/fwlink/?linkid=39204
O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} (WUWebControl Class) - http://update.microsoft.com/windowsupdate/v6/V5Controls/en/x86/client/wuweb_site.cab?1179626279578
O17 - HKLM\System\CCS\Services\Tcpip\..\{08E8EB52-8ECD-4662-B2EE-72F2B6199EF8}: NameServer = 208.67.220.220,208.67.222.222
O17 - HKLM\System\CS1\Services\Tcpip\Parameters: NameServer = 208.67.220.220,208.67.222.222
O17 - HKLM\System\CS1\Services\Tcpip\..\{08E8EB52-8ECD-4662-B2EE-72F2B6199EF8}: NameServer = 208.67.220.220,208.67.222.222
O17 - HKLM\System\CS2\Services\Tcpip\Parameters: NameServer = 208.67.220.220,208.67.222.222
O17 - HKLM\System\CS2\Services\Tcpip\..\{08E8EB52-8ECD-4662-B2EE-72F2B6199EF8}: NameServer = 208.67.220.220,208.67.222.222
O17 - HKLM\System\CCS\Services\Tcpip\Parameters: NameServer = 208.67.220.220,208.67.222.222
O18 - Protocol: skype4com - {FFC8B962-9B40-4DFF-9458-1830C7DD7F5D} - C:\PROGRA~1\COMMON~1\Skype\SKYPE4~1.DLL
O23 - Service: Ati HotKey Poller - ATI Technologies Inc. - C:\WINDOWS\System32\Ati2evxx.exe
O23 - Service: ATI Smart - Unknown owner - C:\WINDOWS\system32\ati2sgag.exe (file missing)
O23 - Service: Kaspersky Anti-Virus 7.0 (AVP) - Kaspersky Lab - C:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 7.0\avp.exe
O23 - Service: Canon Camera Access Library 8 (CCALib8) - Canon Inc. - C:\Program Files\Canon\CAL\CALMAIN.exe
O23 - Service: iPod Service - Apple Inc. - C:\Program Files\iPod\bin\iPodService.exe
O23 - Service: Remote Packet Capture Protocol v.0 (experimental) (rpcapd) - CACE Technologies - C:\Program Files\WinPcap\rpcapd.exe

--
End of file - 4733 bytes


Thanks again!
Andy

Shaba
2007-12-15, 11:04
Hi

Looks better :)

Have you set these?

O17 - HKLM\System\CCS\Services\Tcpip\..\{08E8EB52-8ECD-4662-B2EE-72F2B6199EF8}: NameServer = 208.67.220.220,208.67.222.222
O17 - HKLM\System\CS1\Services\Tcpip\Parameters: NameServer = 208.67.220.220,208.67.222.222
O17 - HKLM\System\CS1\Services\Tcpip\..\{08E8EB52-8ECD-4662-B2EE-72F2B6199EF8}: NameServer = 208.67.220.220,208.67.222.222
O17 - HKLM\System\CS2\Services\Tcpip\Parameters: NameServer = 208.67.220.220,208.67.222.222
O17 - HKLM\System\CS2\Services\Tcpip\..\{08E8EB52-8ECD-4662-B2EE-72F2B6199EF8}: NameServer = 208.67.220.220,208.67.222.222
O17 - HKLM\System\CCS\Services\Tcpip\Parameters: NameServer = 208.67.220.220,208.67.222.222

Re-scan with kaspersky

Post:

- a fresh HijackThis log
- kaspersky report

ssnipazz
2007-12-15, 11:15
Have you set these?

O17 - HKLM\System\CCS\Services\Tcpip\..\{08E8EB52-8ECD-4662-B2EE-72F2B6199EF8}: NameServer = 208.67.220.220,208.67.222.222
O17 - HKLM\System\CS1\Services\Tcpip\Parameters: NameServer = 208.67.220.220,208.67.222.222
O17 - HKLM\System\CS1\Services\Tcpip\..\{08E8EB52-8ECD-4662-B2EE-72F2B6199EF8}: NameServer = 208.67.220.220,208.67.222.222
O17 - HKLM\System\CS2\Services\Tcpip\Parameters: NameServer = 208.67.220.220,208.67.222.222
O17 - HKLM\System\CS2\Services\Tcpip\..\{08E8EB52-8ECD-4662-B2EE-72F2B6199EF8}: NameServer = 208.67.220.220,208.67.222.222
O17 - HKLM\System\CCS\Services\Tcpip\Parameters: NameServer = 208.67.220.220,208.67.222.222


Sorry, I don't quite understand what you mean by that. Could I get an explanation please?

Regards,
Andy

Shaba
2007-12-15, 11:19
Hi

Those are DNS servers of OpenDNS (http://www.opendns.com/)

Spybot may have set them in case you have had zlob.dnschanger infection or they may have been set by you.

ssnipazz
2007-12-15, 21:28
Kasper Scan:

Saturday, December 15, 2007 12:26:30 PM
Operating System: Microsoft Windows XP Professional, Service Pack 1 (Build 2600)
Kaspersky Online Scanner version: 5.0.98.0
Kaspersky Anti-Virus database last update: 15/12/2007
Kaspersky Anti-Virus database records: 483327
Scan Settings
Scan using the following antivirus database extended
Scan Archives true
Scan Mail Bases true
Scan Target My Computer
A:\
C:\
D:\
E:\
Scan Statistics
Total number of scanned objects 34303
Number of viruses found 11
Number of infected objects 51
Number of suspicious objects 0
Duration of the scan process 00:39:51

Infected Object Name Virus Name Last Action
C:\WINDOWS\system32\config\system.LOG Object is locked skipped
C:\WINDOWS\system32\config\software.LOG Object is locked skipped
C:\WINDOWS\system32\config\default.LOG Object is locked skipped
C:\WINDOWS\system32\config\SAM.LOG Object is locked skipped
C:\WINDOWS\system32\config\SECURITY.LOG Object is locked skipped
C:\WINDOWS\system32\config\AppEvent.Evt Object is locked skipped
C:\WINDOWS\system32\config\SecEvent.Evt Object is locked skipped
C:\WINDOWS\system32\config\SysEvent.Evt Object is locked skipped
C:\WINDOWS\system32\config\systemprofile\Local Settings\History\History.IE5\index.dat Object is locked skipped
C:\WINDOWS\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\index.dat Object is locked skipped
C:\WINDOWS\system32\config\systemprofile\Cookies\index.dat Object is locked skipped
C:\WINDOWS\system32\config\SECURITY Object is locked skipped
C:\WINDOWS\system32\config\SOFTWARE Object is locked skipped
C:\WINDOWS\system32\config\SYSTEM Object is locked skipped
C:\WINDOWS\system32\config\DEFAULT Object is locked skipped
C:\WINDOWS\system32\config\SAM Object is locked skipped
C:\WINDOWS\system32\drivers\sptd.sys Object is locked skipped
C:\WINDOWS\system32\drivers\fidbox.idx Object is locked skipped
C:\WINDOWS\system32\drivers\fidbox.dat Object is locked skipped
C:\WINDOWS\system32\drivers\fidbox2.idx Object is locked skipped
C:\WINDOWS\system32\drivers\fidbox2.dat Object is locked skipped
C:\WINDOWS\system32\wbem\Repository\FS\OBJECTS.DATA Object is locked skipped
C:\WINDOWS\system32\wbem\Repository\FS\INDEX.BTR Object is locked skipped
C:\WINDOWS\system32\h323log.txt Object is locked skipped
C:\WINDOWS\Debug\PASSWD.LOG Object is locked skipped
C:\WINDOWS\Debug\oakley.log Object is locked skipped
C:\WINDOWS\Sti_Trace.log Object is locked skipped
C:\WINDOWS\wiaservc.log Object is locked skipped
C:\WINDOWS\wiadebug.log Object is locked skipped
C:\WINDOWS\SchedLgU.Txt Object is locked skipped
C:\WINDOWS\SoftwareDistribution\ReportingEvents.log Object is locked skipped
C:\WINDOWS\WindowsUpdate.log Object is locked skipped
C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy\Recovery\NetworkMonitor1.zip/netmon.exe Infected: not-a-virus:Monitor.Win32.NetMon.a skipped
C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy\Recovery\NetworkMonitor1.zip ZIP: infected - 1 skipped
C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy\Recovery\NousTechUDefender.zip/trant.exe Infected: not-a-virus:FraudTool.Win32.UltimateDefender.v skipped
C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy\Recovery\NousTechUDefender.zip ZIP: infected - 1 skipped
C:\Documents and Settings\NetworkService\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat.LOG Object is locked skipped
C:\Documents and Settings\NetworkService\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat Object is locked skipped
C:\Documents and Settings\NetworkService\ntuser.dat.LOG Object is locked skipped
C:\Documents and Settings\NetworkService\NTUSER.DAT Object is locked skipped
C:\Documents and Settings\LocalService\Local Settings\History\History.IE5\index.dat Object is locked skipped
C:\Documents and Settings\LocalService\Local Settings\Temporary Internet Files\Content.IE5\index.dat Object is locked skipped
C:\Documents and Settings\LocalService\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat.LOG Object is locked skipped
C:\Documents and Settings\LocalService\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat Object is locked skipped
C:\Documents and Settings\LocalService\Cookies\index.dat Object is locked skipped
C:\Documents and Settings\LocalService\ntuser.dat.LOG Object is locked skipped
C:\Documents and Settings\LocalService\NTUSER.DAT Object is locked skipped
C:\Documents and Settings\Andy Cheng\NTUSER.DAT.LOG Object is locked skipped
C:\Documents and Settings\Andy Cheng\Local Settings\History\History.IE5\index.dat Object is locked skipped
C:\Documents and Settings\Andy Cheng\Local Settings\History\History.IE5\MSHist012007121520071216\index.dat Object is locked skipped
C:\Documents and Settings\Andy Cheng\Local Settings\Temporary Internet Files\Content.IE5\index.dat Object is locked skipped
C:\Documents and Settings\Andy Cheng\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat.LOG Object is locked skipped
C:\Documents and Settings\Andy Cheng\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat Object is locked skipped
C:\Documents and Settings\Andy Cheng\Local Settings\Temp\flaEE.tmp Object is locked skipped
C:\Documents and Settings\Andy Cheng\Cookies\index.dat Object is locked skipped
C:\Documents and Settings\Andy Cheng\Application Data\Aim\eawbzuwq\wwwANDYnet\cert8.db Object is locked skipped
C:\Documents and Settings\Andy Cheng\Application Data\Aim\eawbzuwq\wwwANDYnet\key3.db Object is locked skipped
C:\Documents and Settings\Andy Cheng\ntuser.dat Object is locked skipped
C:\System Volume Information\_restore{9DB7CD44-70C6-482B-ABBC-7163A0428A20}\RP3\A0000130.exe Infected: Trojan-Downloader.Win32.Agent.fjv skipped
C:\System Volume Information\_restore{9DB7CD44-70C6-482B-ABBC-7163A0428A20}\RP3\A0000162.exe Infected: Trojan-Downloader.Win32.Tiny.adj skipped
C:\System Volume Information\_restore{9DB7CD44-70C6-482B-ABBC-7163A0428A20}\RP3\A0000163.exe/data0002 Infected: Trojan-Downloader.Win32.PurityScan.eg skipped
C:\System Volume Information\_restore{9DB7CD44-70C6-482B-ABBC-7163A0428A20}\RP3\A0000163.exe NSIS: infected - 1 skipped
C:\System Volume Information\_restore{9DB7CD44-70C6-482B-ABBC-7163A0428A20}\RP3\A0000164.exe Infected: Trojan-Downloader.Win32.Agent.bls skipped
C:\System Volume Information\_restore{9DB7CD44-70C6-482B-ABBC-7163A0428A20}\RP5\A0000347.exe Infected: not-a-virus:Monitor.Win32.NetMon.a skipped
C:\System Volume Information\_restore{9DB7CD44-70C6-482B-ABBC-7163A0428A20}\RP5\A0000348.exe Infected: not-a-virus:FraudTool.Win32.UltimateDefender.v skipped
C:\System Volume Information\_restore{9DB7CD44-70C6-482B-ABBC-7163A0428A20}\RP5\A0000365.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.bjc skipped
C:\System Volume Information\_restore{9DB7CD44-70C6-482B-ABBC-7163A0428A20}\RP5\A0000376.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.bjc skipped
C:\System Volume Information\_restore{9DB7CD44-70C6-482B-ABBC-7163A0428A20}\RP5\A0000387.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.bjc skipped
C:\System Volume Information\_restore{9DB7CD44-70C6-482B-ABBC-7163A0428A20}\RP5\A0000682.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.bjc skipped
C:\System Volume Information\_restore{9DB7CD44-70C6-482B-ABBC-7163A0428A20}\RP5\A0000741.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.bjc skipped
C:\System Volume Information\_restore{9DB7CD44-70C6-482B-ABBC-7163A0428A20}\RP6\A0000763.dll Infected: not-a-virus:AdWare.Win32.SuperJuan.ao skipped
C:\System Volume Information\_restore{9DB7CD44-70C6-482B-ABBC-7163A0428A20}\RP6\A0000764.dll Infected: not-a-virus:AdWare.Win32.SuperJuan.ao skipped
C:\System Volume Information\_restore{9DB7CD44-70C6-482B-ABBC-7163A0428A20}\RP6\A0000765.dll Infected: not-a-virus:AdWare.Win32.SuperJuan.ao skipped
C:\System Volume Information\_restore{9DB7CD44-70C6-482B-ABBC-7163A0428A20}\RP6\A0000766.dll Infected: not-a-virus:AdWare.Win32.SuperJuan.ao skipped
C:\System Volume Information\_restore{9DB7CD44-70C6-482B-ABBC-7163A0428A20}\RP6\A0000767.dll Infected: not-a-virus:AdWare.Win32.SuperJuan.ao skipped
C:\System Volume Information\_restore{9DB7CD44-70C6-482B-ABBC-7163A0428A20}\RP6\A0000768.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.bjc skipped
C:\System Volume Information\_restore{9DB7CD44-70C6-482B-ABBC-7163A0428A20}\RP6\A0000769.dll Infected: not-a-virus:AdWare.Win32.SuperJuan.ao skipped
C:\System Volume Information\_restore{9DB7CD44-70C6-482B-ABBC-7163A0428A20}\RP6\A0000770.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.bjc skipped
C:\System Volume Information\_restore{9DB7CD44-70C6-482B-ABBC-7163A0428A20}\RP6\A0000771.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.bjc skipped
C:\System Volume Information\_restore{9DB7CD44-70C6-482B-ABBC-7163A0428A20}\RP6\A0000772.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.bjc skipped
C:\System Volume Information\_restore{9DB7CD44-70C6-482B-ABBC-7163A0428A20}\RP6\A0000773.dll Infected: not-a-virus:AdWare.Win32.SuperJuan.ao skipped
C:\System Volume Information\_restore{9DB7CD44-70C6-482B-ABBC-7163A0428A20}\RP6\A0000774.dll Infected: not-a-virus:AdWare.Win32.SuperJuan.ao skipped
C:\System Volume Information\_restore{9DB7CD44-70C6-482B-ABBC-7163A0428A20}\RP6\A0000775.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.bjc skipped
C:\System Volume Information\_restore{9DB7CD44-70C6-482B-ABBC-7163A0428A20}\RP6\A0000776.dll Infected: not-a-virus:AdWare.Win32.SuperJuan.ao skipped
C:\System Volume Information\_restore{9DB7CD44-70C6-482B-ABBC-7163A0428A20}\RP6\A0000777.dll Infected: not-a-virus:AdWare.Win32.SuperJuan.ao skipped
C:\System Volume Information\_restore{9DB7CD44-70C6-482B-ABBC-7163A0428A20}\RP7\A0000875.dll Infected: not-a-virus:AdWare.Win32.Agent.xi skipped
C:\System Volume Information\_restore{9DB7CD44-70C6-482B-ABBC-7163A0428A20}\RP9\change.log Object is locked skipped
C:\qoobox\Quarantine\C\WINDOWS\system32\atiuuurn.dll.vir Infected: not-a-virus:AdWare.Win32.SuperJuan.ao skipped
C:\qoobox\Quarantine\C\WINDOWS\system32\dlsefekt.dll.vir Infected: not-a-virus:AdWare.Win32.SuperJuan.ao skipped
C:\qoobox\Quarantine\C\WINDOWS\system32\ebqefitv.dll.vir Infected: not-a-virus:AdWare.Win32.SuperJuan.ao skipped
C:\qoobox\Quarantine\C\WINDOWS\system32\gtfpcwje.dll.vir Infected: not-a-virus:AdWare.Win32.SuperJuan.ao skipped
C:\qoobox\Quarantine\C\WINDOWS\system32\ilrmissn.dll.vir Infected: not-a-virus:AdWare.Win32.SuperJuan.ao skipped
C:\qoobox\Quarantine\C\WINDOWS\system32\kfoaliog.dll.vir Infected: not-a-virus:AdWare.Win32.Virtumonde.bjc skipped
C:\qoobox\Quarantine\C\WINDOWS\system32\kjmdlime.dll.vir Infected: not-a-virus:AdWare.Win32.SuperJuan.ao skipped
C:\qoobox\Quarantine\C\WINDOWS\system32\orodwhmr.dll.vir Infected: not-a-virus:AdWare.Win32.Virtumonde.bjc skipped
C:\qoobox\Quarantine\C\WINDOWS\system32\qaitagwj.dll.vir Infected: not-a-virus:AdWare.Win32.Virtumonde.bjc skipped
C:\qoobox\Quarantine\C\WINDOWS\system32\qruvufwn.dll.vir Infected: not-a-virus:AdWare.Win32.Virtumonde.bjc skipped
C:\qoobox\Quarantine\C\WINDOWS\system32\tjufdncs.dll.vir Infected: not-a-virus:AdWare.Win32.SuperJuan.ao skipped
C:\qoobox\Quarantine\C\WINDOWS\system32\vgcddukd.dll.vir Infected: not-a-virus:AdWare.Win32.SuperJuan.ao skipped
C:\qoobox\Quarantine\C\WINDOWS\system32\wgwhmlxn.dll.vir Infected: not-a-virus:AdWare.Win32.Virtumonde.bjc skipped
C:\qoobox\Quarantine\C\WINDOWS\system32\xgpithxr.dll.vir Infected: not-a-virus:AdWare.Win32.SuperJuan.ao skipped
C:\qoobox\Quarantine\C\WINDOWS\system32\yjosaihw.dll.vir Infected: not-a-virus:AdWare.Win32.SuperJuan.ao skipped
C:\qoobox\Quarantine\C\Program Files\E404 Helper\e404.v5.dll.vir Infected: not-a-virus:AdWare.Win32.Agent.xi skipped
C:\qoobox\Quarantine\catchme2007-12-12_125306.93.zip/tgjxubaj.dat Infected: Rootkit.Win32.Agent.ql skipped
C:\qoobox\Quarantine\catchme2007-12-12_125306.93.zip/mprap.dll Infected: Trojan.Win32.BHO.abo skipped
C:\qoobox\Quarantine\catchme2007-12-12_125306.93.zip ZIP: infected - 2 skipped
Scan process completed.



Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 12:27:55 PM, on 12/15/2007
Platform: Windows XP SP1 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP1 (6.00.2800.1106)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\System32\Ati2evxx.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\AIM\aim.exe
C:\Program Files\DAEMON Tools\daemon.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Canon\CAL\CALMAIN.exe
C:\Program Files\Mozilla Firefox\firefox.exe
C:\Program Files\Trend Micro\HijackThis\ssnipazz.exe

O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelper.dll
O2 - BHO: Spybot-S&D IE Protection - {53707962-6F74-2D53-2644-206D7942484F} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.6.0_01\bin\ssv.dll
O3 - Toolbar: &Radio - {8E718888-423F-11D2-876E-00A0C9082467} - C:\WINDOWS\System32\msdxm.ocx
O4 - HKLM\..\Run: [Adobe Reader Speed Launcher] "C:\Program Files\Adobe\Reader 8.0\Reader\Reader_sl.exe"
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKCU\..\Run: [AIM] C:\Program Files\AIM\aim.exe -cnetwait.odl
O4 - HKCU\..\Run: [DAEMON Tools] "C:\Program Files\DAEMON Tools\daemon.exe"
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\OFFICE11\EXCEL.EXE/3000
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_01\bin\ssv.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_01\bin\ssv.dll
O9 - Extra button: Web Anti-Virus statistics - {1F460357-8A94-4D71-9CA3-AA4ACF32ED8E} - C:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 7.0\SCIEPlgn.dll
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\OFFICE11\REFIEBAR.DLL
O9 - Extra button: AIM - {AC9E2541-2814-11d5-BC6D-00B0D0A1DE45} - C:\Program Files\AIM\aim.exe
O9 - Extra button: Related - {c95fe080-8f5d-11d2-a20b-00aa003c157a} - C:\WINDOWS\web\related.htm
O9 - Extra 'Tools' menuitem: Show &Related Links - {c95fe080-8f5d-11d2-a20b-00aa003c157a} - C:\WINDOWS\web\related.htm
O9 - Extra button: (no name) - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O9 - Extra 'Tools' menuitem: Spybot - Search & Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O16 - DPF: {0EB0E74A-2A76-4AB3-A7FB-9BD8C29F7F75} (CKAVWebScan Object) - http://www.kaspersky.com/kos/english/kavwebscan_unicode.cab
O16 - DPF: {17492023-C23A-453E-A040-C7C580BBF700} (Windows Genuine Advantage Validation Tool) - http://go.microsoft.com/fwlink/?linkid=39204
O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} (WUWebControl Class) - http://update.microsoft.com/windowsupdate/v6/V5Controls/en/x86/client/wuweb_site.cab?1179626279578
O17 - HKLM\System\CCS\Services\Tcpip\..\{08E8EB52-8ECD-4662-B2EE-72F2B6199EF8}: NameServer = 208.67.220.220,208.67.222.222
O17 - HKLM\System\CS1\Services\Tcpip\Parameters: NameServer = 208.67.220.220,208.67.222.222
O17 - HKLM\System\CS1\Services\Tcpip\..\{08E8EB52-8ECD-4662-B2EE-72F2B6199EF8}: NameServer = 208.67.220.220,208.67.222.222
O17 - HKLM\System\CS2\Services\Tcpip\Parameters: NameServer = 208.67.220.220,208.67.222.222
O17 - HKLM\System\CS2\Services\Tcpip\..\{08E8EB52-8ECD-4662-B2EE-72F2B6199EF8}: NameServer = 208.67.220.220,208.67.222.222
O17 - HKLM\System\CCS\Services\Tcpip\Parameters: NameServer = 208.67.220.220,208.67.222.222
O18 - Protocol: skype4com - {FFC8B962-9B40-4DFF-9458-1830C7DD7F5D} - C:\PROGRA~1\COMMON~1\Skype\SKYPE4~1.DLL
O23 - Service: Ati HotKey Poller - ATI Technologies Inc. - C:\WINDOWS\System32\Ati2evxx.exe
O23 - Service: ATI Smart - Unknown owner - C:\WINDOWS\system32\ati2sgag.exe (file missing)
O23 - Service: Kaspersky Anti-Virus 7.0 (AVP) - Kaspersky Lab - C:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 7.0\avp.exe
O23 - Service: Canon Camera Access Library 8 (CCALib8) - Canon Inc. - C:\Program Files\Canon\CAL\CALMAIN.exe
O23 - Service: iPod Service - Apple Inc. - C:\Program Files\iPod\bin\iPodService.exe
O23 - Service: Remote Packet Capture Protocol v.0 (experimental) (rpcapd) - CACE Technologies - C:\Program Files\WinPcap\rpcapd.exe

--
End of file - 4701 bytes


Thanks again,
Andy

HiJackThis log:

Shaba
2007-12-16, 11:03
Hi

Empty these folders:

C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy\Recovery
C:\qoobox\Quarantine\

Empty Recycle Bin.

All other viruses are in system restore and inactive.

I give you later instructions how to empty it.

Other than that, any problems left?

ssnipazz
2007-12-16, 21:48
Empty these folders:

C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy\Recovery
C:\qoobox\Quarantine\

Empty Recycle Bin.


Done!

It appears as though my computer is back to normal again. Nothing seems suspicious, there is no lag, and there are no signs of any more infections!

Thanks so much!
Andy

Shaba
2007-12-17, 10:23
Hi

Then you're clean!

Now that you are clean, please follow these simple steps in order to keep your computer clean and secure:

Looking over your log, it seems you don't have any evidence of a third party firewall.

As the term conveys, a firewall is an extra layer of security installed onto computers, which restricts access to systems from the outside world. Firewalls protect against hackers and malicious intruders. I want you to download a free firewall NOW from one of these excellent vendors:

1) Comodo (http://www.personalfirewall.comodo.com/)
2) Sunbelt/Kerio (http://www.sunbelt-software.com/Kerio-Download.cfm)
3) Agnitum (http://www.agnitum.com/products/outpostfree/download.php)
4) ZoneAlarm (http://www.zonelabs.com/store/content/catalog/products/sku_list_za.jsp?dc=12bms&ctry=US&lang=en&lid=nav_za)

If you are using the built-in Windows XP firewall, it is not recommended as it does not block outgoing connections. This means that any malware on your computer is free to "phone home" for more instructions. Simply put, Windows XP contains a mediocre firewall. This firewall is NO replacement for a dedicated software solution. Remember to use only one firewall at the same time.

Your Java is out of date. Older versions have vulnerabilities that malware can use to infect your system. A malicious site could render Java content under older, vulnerable versions of Sun's software if the user has not removed them. Please follow these steps to remove older version Java components and update: Download the latest version of Java Runtime Environment (JRE) 6 Update 3 (http://java.sun.com/javase/downloads/index.jsp) and save it to your desktop.
Scroll down to where it says "Java Runtime Environment (JRE) 6u3...allows end-users to run Java applications".
Click the "Download" button to the right.
Read the License Agreement and then check the box that says: "Accept License Agreement".
The page will refresh.
Click on the link to download Windows Offline Installation and save the file to your desktop.
Close any programs you may have running - especially your web browser.
Go to Start > Settings > Control Panel, double-click on Add/Remove Programs and remove all older versions of Java.
Check (highlight) any item with Java Runtime Environment (JRE or J2SE) in the name.
Click the Remove or Change/Remove button.
Repeat as many times as necessary to remove each Java versions.
Reboot your computer once all Java components are removed.
Then from your desktop double-click on jre-6u3-windows-i586-p.exe to install the newest version.

Next we remove all used tools.

Please download OTMoveIt (http://download.bleepingcomputer.com/oldtimer/OTMoveIt.exe) and save it to desktop.

Double-click OTMoveIt.exe.
Click the CleanUp! button.
Select Yes when the "Begin cleanup Process?" prompt appears.
If you are prompted to Reboot during the cleanup, select Yes.
The tool will delete itself once it finishes, if not delete it by yourself.


Note: If you receive a warning from your firewall or other security programs regarding OTMoveIt attempting to contact the internet, please allow it to do so.

Disable and Enable System Restore. - If you are using Windows XP then you should disable and re-enable system restore to make sure there are no infected files found in a restore point.

You can find instructions on how to enable and re-enable system restore here:

Windows XP System Restore Guide (http://www.bleepingcomputer.com/forums/tutorial56.html)

Re-enable system restore with instructions from tutorial above

Make your Internet Explorer more secure - This can be done by following these simple instructions:
From within Internet Explorer click on the Tools menu and then click on Options.
Click once on the Security tab
Click once on the Internet icon so it becomes highlighted.
Click once on the Custom Level button.
Change the Download signed ActiveX controls to Prompt

Change the Download unsigned ActiveX controls to Disable

Change the Initialize and script ActiveX controls not marked as safe to Disable

Change the Installation of desktop items to Prompt

Change the Launching programs and files in an IFRAME to Prompt

Change the Navigate sub-frames across different domains to Prompt

When all these settings have been made, click on the OK button.

If it prompts you as to whether or not you want to save the settings, press the Yes button.
Next press the Apply button and then the OK to exit the Internet Properties page.

Update your AntiVirus Software - It is imperitive that you update your Antivirus software at least once a week (Even more if you wish). If you do not update your antivirus software then it will not be able to catch any of the new variants that may come out.


Visit Microsoft's Windows Update Site Frequently - It is important that you visit http://www.windowsupdate.com (http://www.windowsupdate.com) regularly. This will ensure your computer has always the latest security updates available installed on your computer. If there are new updates to install, install them immediately, reboot your computer, and revisit the site until there are no more critical updates.


Install Ad-Aware - Install and download Ad-Aware. You should also scan your computer with program on a regular basis just as you would an antivirus software in conjunction with Spybot.

A tutorial on installing & using this product can be found here:

Using Ad-aware 2007 to remove Spyware, Malware, & Hijackers from Your Computer (http://www.bleepingcomputer.com/forums/?showtutorial=48)

Install SpywareBlaster - SpywareBlaster will added a large list of programs and sites into your Internet Explorer settings that will protect you from running and downloading known malicious programs.

A tutorial on installing & using this product can be found here:

Using SpywareBlaster to protect your computer from Spyware and Malware (http://www.bleepingcomputer.com/tutorials/tutorial49.html)


Update all these programs regularly - Make sure you update all the programs I have listed regularly. Without regular updates you WILL NOT be protected when new malicious programs are released.
Follow this list and your potential for being infected again will reduce dramatically.

Here are some additional utilities that will enhance your safety

MVPS Hosts file (http://mvps.org/winhelp2002/hosts.htm) <= The MVPS Hosts file replaces your current HOSTS file with one containing well know ad sites etc. Basically, this prevents your computer from connecting to those sites by redirecting them to 127.0.0.1 which is your local computer
Google Toolbar (http://toolbar.google.com/) <= Get the free google toolbar to help stop pop up windows.
Comodo BOCLEAN (http://www.comodo.com/boclean/boclean.html) <= Stop identity thieves from getting personal information. Instantly detects well over 1,000,000 unique, variant and repack malware in total. And it's free.
Winpatrol (http://www.winpatrol.com/) <= Download and install the free version of Winpatrol. a tutorial for this product is located here:
Using Winpatrol to protect your computer from malicious software (http://www.winpatrol.com/features.html)

Stand Up and Be Counted ---> Malware Complaints (http://www.malwarecomplaints.info/index.php) <--- where you can make difference!

The site offers people who have been (or are) victims of malware the opportunity to document their story and, in that way, launch a complaint against the malware and the makers of the malware.

Also, please read this great article by Tony Klein So How Did I Get Infected In First Place (http://castlecops.com/postlite7736-.html)

Happy surfing and stay clean! :bigthumb:

Shaba
2007-12-19, 11:00
Since this issue appears resolved ... this Topic is closed.

If you need this topic reopened, please request this by sending the moderating team
a PM with the address of the thread. This applies only to the original topic starter.

Everyone else please begin a New Topic.