View Full Version : Smithfraud and Virtumonde at least, need help
illumn8r
2008-01-29, 01:47
Hi, I need some help getting rid of these. I got this laptop from a friend who had gotten it used a while ago, it's been riddled with viruses, I got rid of most of them but can't get rid of the last few, they keep coming back. I have followed the instructions in "Before you post" and below are my HijackThis log and Kaspersky log (with the Kaspersky log it was too long to post, I have it if you need it), after reading other's posts I changed my Hijackthis.exe to illumn8r.exe before running. If this matters: whenever I log on the computer I get the following errors as well:
Windows cannot find 'C:\WINDOWS\sv3968\svchost.exe'. Make sure you typed the name correctly, and then try again. To search for a file, click the Start button, and then click Search.
Desktop
Could not load or run 'C:\WINDOWS\sv3968\svchost.exe' specified in the registry. Make sure the file exists on your computer or remove the reference to it in the registry.
RUNDLL
Error loading C:\WINDOWS\system32\wqoifqdv.dll
The specified module could not be found.
Kaspersky was run earlier today long before I cleared out what I could with SpyBot per the instructions in the Before you post area
Thanks for whatever you can do :-)
Dave
Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 6:29:31 PM, on 1/28/2008
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)
Boot mode: Normal
Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\guard.exe
C:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 6.0 SOS\avp.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\Dynex Wireless G Adapter\WLService.exe
C:\Program Files\Dynex Wireless G Adapter\WLanCfgG.exe
C:\Program Files\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE
C:\WINDOWS\system32\svchost.exe
C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\avgas.exe
C:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 6.0 SOS\avp.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
C:\WINDOWS\system32\MBOLS~1\regedit.exe
C:\Program Files\Common Files\?icrosoft.NET\n?pdb.exe
C:\Program Files\Sensormatic\NetworkClient\Bin\NtlxEventhandler.exe
C:\Program Files\Verizon Wireless\VZAccess Manager\VZAccess Manager.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\Trend Micro\HijackThis\illumn8r.exe
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page =
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Local Page =
R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName =
F3 - REG:win.ini: load=C:\WINDOWS\sv3968\svchost.exe
O2 - BHO: (no name) - {0171CAB8-76BF-4EC8-B1F8-415F96C16FF5} - (no file)
O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 7.0\ActiveX\AcroIEHelper.dll
O2 - BHO: (no name) - {0BC3BDA0-5A1D-462B-8765-906B805AE411} - (no file)
O2 - BHO: (no name) - {10D7ABD7-F467-4C2D-83AB-39F9AADB3F21} - (no file)
O2 - BHO: (no name) - {18E759E7-5480-4284-8ABC-3F13CFBD3055} - (no file)
O2 - BHO: (no name) - {19A3A01F-F36E-41AD-9409-8C7F2BE54379} - (no file)
O2 - BHO: (no name) - {49448C32-16F5-6A55-FCBC-60A395FCF1CB} - C:\WINDOWS\system32\lakzc.dll (file missing)
O2 - BHO: Spybot-S&D IE Protection - {53707962-6F74-2D53-2644-206D7942484F} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O2 - BHO: (no name) - {64AB2227-E684-4658-BFD4-0D828824DDF9} - (no file)
O2 - BHO: (no name) - {6AD09082-35C6-4BBF-AE04-E75A9DABA41E} - (no file)
O2 - BHO: (no name) - {71D10F0C-D19C-40EB-8CF3-A3BA7B073BDA} - (no file)
O2 - BHO: (no name) - {7AFF469F-42E2-4EFA-8FC9-F8A87BAECB64} - (no file)
O2 - BHO: (no name) - {8158927B-4A97-4F17-AB76-30085A632D87} - (no file)
O2 - BHO: (no name) - {8E560337-5BCC-4D1B-9F06-03F639490F62} - (no file)
O2 - BHO: (no name) - {97D0C1A3-F79C-42A4-9A39-C6521D5F5595} - (no file)
O2 - BHO: (no name) - {9AD12338-EB4F-4B0F-9EE2-CBF572E5B06D} - (no file)
O2 - BHO: (no name) - {9B679F05-F388-41BC-B35A-F04B5EEA35C9} - C:\WINDOWS\system32\xxwtr.dll (file missing)
O2 - BHO: (no name) - {B3925F4D-3300-449B-99DF-528986895DD8} - (no file)
O2 - BHO: (no name) - {B522E814-6955-4B3E-977C-1C447EE37700} - (no file)
O2 - BHO: (no name) - {B530EC1E-45AC-49F6-96CF-13FECB600B02} - (no file)
O2 - BHO: (no name) - {B70C38F2-2113-427D-A8EB-35C5369FEA32} - (no file)
O2 - BHO: (no name) - {B87F81A5-E74C-4C7F-906B-81BF0CD68705} - (no file)
O2 - BHO: (no name) - {C960E623-8C5C-43A5-A9AF-3C0B780C3981} - (no file)
O2 - BHO: (no name) - {CF5FCB91-93B3-45AA-A51E-A69B54B8F3B4} - (no file)
O2 - BHO: (no name) - {D4576C73-52BD-4401-B966-5A128C4433D4} - C:\WINDOWS\system32\ssqonkk.dll
O2 - BHO: (no name) - {D7F89752-80ED-489C-8D2A-644BADBAA3A8} - (no file)
O2 - BHO: (no name) - {ED042CC0-A7DC-4FE1-966B-A47E8DDD80EA} - C:\WINDOWS\system32\qomkl.dll (file missing)
O2 - BHO: (no name) - {EFFEF283-2DDC-45DC-AD78-39A2619BBD8C} - (no file)
O2 - BHO: (no name) - {F11A2443-CC6E-4F18-9A6B-BC7B3B3557E9} - (no file)
O2 - BHO: (no name) - {F20EEBF7-DBCB-42FC-AED1-87FF6AFCBBBD} - (no file)
O2 - BHO: (no name) - {f2a49420-375e-4f7d-9665-f692d517aad1} - (no file)
O2 - BHO: 0 - {F4CC57F3-73FC-44C0-0EB3-5C1D0A0ACBB6} - C:\Program Files\Windows NT\qujaxim363.dll (file missing)
O2 - BHO: (no name) - {F57B1642-12FA-412C-BDA6-FA99A9481245} - (no file)
O2 - BHO: (no name) - {F6523A99-1659-4847-9741-786D86CBCB96} - C:\WINDOWS\system32\ddcba.dll (file missing)
O4 - HKLM\..\Run: [SunJavaUpdateSched] C:\Program Files\Java\jre1.5.0_05\bin\jusched.exe
O4 - HKLM\..\Run: [SearchIndexer] rundll32.exe "C:\WINDOWS\system32\wqoifqdv.dll",sitypnow
O4 - HKLM\..\Run: [!AVG Anti-Spyware] "C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\avgas.exe" /minimized
O4 - HKLM\..\Run: [AVP] "C:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 6.0 SOS\avp.exe"
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
O4 - HKCU\..\Run: [Aim6] "C:\Program Files\AIM6\aim6.exe" /d locale=en-US ee://aol/imApp
O4 - HKCU\..\Run: [SpybotSD TeaTimer] C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
O4 - HKCU\..\Run: [Easa] "C:\WINDOWS\system32\MBOLS~1\regedit.exe" -vt yazb
O4 - HKCU\..\Run: [Zvvfqpb] "C:\Program Files\Common Files\?icrosoft.NET\n?pdb.exe"
O4 - HKCU\..\Run: [Router] C:\Program Files\Router\Router.exe
O4 - HKCU\..\Run: [WinTouch] C:\Documents and Settings\Administrator\Application Data\WinTouch\WinTouch.exe
O4 - HKUS\S-1-5-19\..\Run: [TaskSwitchXP] C:\Program Files\TaskSwitchXP\TaskSwitchXP.exe (User 'LOCAL SERVICE')
O4 - HKUS\S-1-5-19\..\Run: [Free Download Manager] C:\Program Files\Free Download Manager\fdm.exe -autorun (User 'LOCAL SERVICE')
O4 - HKUS\S-1-5-19\..\RunOnce: [nlsf] cmd.exe /C move /Y "%SystemRoot%\System32\syssetub.dll" "%SystemRoot%\System32\syssetup.dll" (User 'LOCAL SERVICE')
O4 - HKUS\S-1-5-20\..\Run: [TaskSwitchXP] C:\Program Files\TaskSwitchXP\TaskSwitchXP.exe (User 'NETWORK SERVICE')
O4 - HKUS\S-1-5-20\..\RunOnce: [nlsf] cmd.exe /C move /Y "%SystemRoot%\System32\syssetub.dll" "%SystemRoot%\System32\syssetup.dll" (User 'NETWORK SERVICE')
O4 - HKUS\S-1-5-18\..\Run: [TaskSwitchXP] C:\Program Files\TaskSwitchXP\TaskSwitchXP.exe (User 'SYSTEM')
O4 - HKUS\S-1-5-18\..\RunOnce: [nlsf] cmd.exe /C move /Y "%SystemRoot%\System32\syssetub.dll" "%SystemRoot%\System32\syssetup.dll" (User 'SYSTEM')
O4 - HKUS\.DEFAULT\..\Run: [TaskSwitchXP] C:\Program Files\TaskSwitchXP\TaskSwitchXP.exe (User 'Default user')
O4 - HKUS\.DEFAULT\..\RunOnce: [nlsf] cmd.exe /C move /Y "%SystemRoot%\System32\syssetub.dll" "%SystemRoot%\System32\syssetup.dll" (User 'Default user')
O4 - Startup: Adobe Gamma.lnk = C:\Program Files\Common Files\Adobe\Calibration\Adobe Gamma Loader.exe
O4 - Global Startup: Intellex Event Handler.lnk = C:\Program Files\Sensormatic\NetworkClient\Bin\NtlxEventhandler.exe
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~1\OFFICE11\EXCEL.EXE/3000
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_05\bin\npjpi150_05.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_05\bin\npjpi150_05.dll
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~1\OFFICE11\REFIEBAR.DLL
O9 - Extra button: (no name) - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O9 - Extra 'Tools' menuitem: Spybot - Search & Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O10 - Unknown file in Winsock LSP: c:\windows\system32\nwprovau.dll
O16 - DPF: {0EB0E74A-2A76-4AB3-A7FB-9BD8C29F7F75} (CKAVWebScan Object) - http://www.kaspersky.com/kos/english/kavwebscan_unicode.cab
O20 - Winlogon Notify: ssqonkk - C:\WINDOWS\SYSTEM32\ssqonkk.dll
O20 - Winlogon Notify: urqpqno - urqpqno.dll (file missing)
O20 - Winlogon Notify: xxwtr - C:\WINDOWS\system32\xxwtr.dll (file missing)
O23 - Service: Adobe LM Service - Adobe Systems - C:\Program Files\Common Files\Adobe Systems Shared\Service\Adobelmsvc.exe
O23 - Service: AVG Anti-Spyware Guard - GRISOFT s.r.o. - C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\guard.exe
O23 - Service: Kaspersky Anti-Virus 6.0 (AVP) - Kaspersky Lab - C:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 6.0 SOS\avp.exe
O23 - Service: Dynex DX-WGDTC Service (Dynex DX-WGDTC WLService) - Unknown owner - C:\Program Files\Dynex Wireless G Adapter\WLService.exe
O24 - Desktop Component 0: (no name) - C:\Program Files\Windows NT\rteremeg.html
--
End of file - 8587 bytes
Hi illumn8r
1. Download combofix from any of these links and save it to Desktop:
Link 1 (http://download.bleepingcomputer.com/sUBs/ComboFix.exe)
Link 2 (http://www.forospyware.com/sUBs/ComboFix.exe)
Link 3 (http://subs.geekstogo.com/ComboFix.exe)
**Note: It is important that it is saved directly to your desktop**
2. Double click combofix.exe & follow the prompts.
3. When finished, it shall produce a log for you (C:\ComboFix.txt). Post that log in your next reply
Note:
Do not mouseclick combofix's window whilst it's running. That may cause it to stall
Combofix should never take more that 20 minutes including the reboot if malware is detected.
If it does, open Task Manager then Processes tab (press ctrl, alt and del at the same time) and end any processes of findstr, find, sed or swreg, then combofix should continue.
If that happened we want to know, and also what process you had to end.
If you have problems with Combofix usage, see here (http://www.bleepingcomputer.com/combofix/how-to-use-combofix)
Post:
- a fresh HijackThis log
- combofix report
illumn8r
2008-01-30, 19:42
Thank you, below is the ComboFix log followed by the new HijackThis log, if it doesn't all fit I will post it next. By the way, I denied a registry change in SpyBot and told it to remember it and whatever it is keeps trying so I get a flood of notifications from spybot that it has been denied, hopefully this will fix all of that :-)
Dave
ComboFix 08-01-30.6 - Administrator 2008-01-30 11:44:24.1 - NTFSx86
Microsoft Windows XP Professional 5.1.2600.2.1252.1.1033.18.164 [GMT -5:00]
Running from: C:\Documents and Settings\Administrator\Desktop\ComboFix.exe
* Created a new restore point
WARNING -THIS MACHINE DOES NOT HAVE THE RECOVERY CONSOLE INSTALLED !!
.
((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.
C:\WINDOWS\system32\ssqonkk.dll
C:\check_LSA7.txt
C:\Documents and Settings\Administrator\Application Data\DOBE~1
C:\Documents and Settings\Administrator\Application Data\SMBOLS~1
C:\Documents and Settings\Administrator\Application Data\WinAntiSpyware 2006
C:\Documents and Settings\Administrator\Application Data\WinAntiSpyware 2006\Logs\update.log
C:\Documents and Settings\Administrator\Application Data\WinTouch
C:\Documents and Settings\Administrator\Application Data\WinTouch\config.cfg.28537b5284b09675952f56367ee67eeb
C:\Documents and Settings\Administrator\Application Data\WinTouch\config.cfg.7b6ca5c6c80b79087f30d53d29313ec9
C:\Documents and Settings\Administrator\Application Data\WinTouch\config.cfg.928b7cb8dec118f180eae1004dcb96a2
C:\Documents and Settings\Administrator\Application Data\WinTouch\config.cfg.a78d2c014699d9944b25961c105885e1
C:\Documents and Settings\Administrator\Application Data\WinTouch\config.cfg.acdc4601459077482a0498e1f5b90802
C:\Documents and Settings\Administrator\Application Data\WinTouch\config.cfg.d355fb304eb7900c4b001672ca7447c2
C:\Documents and Settings\Administrator\Application Data\WinTouch\wintouch.cfg
C:\Documents and Settings\All Users.\documents\settings
C:\Documents and Settings\All Users.\documents\settings\desktop.ini
C:\Program Files\Common Files\icroso~1.net
C:\Program Files\Common Files\icroso~1.net\n?pdb.exe
C:\Program Files\fnts~1
C:\Program Files\outerinfo
C:\Program Files\outerinfo\OiUninstaller.exe
C:\Program Files\Router
C:\Program Files\Router\UnInstall.exe
C:\Program Files\Temporary
C:\Program Files\Windows NT\rteremeg.html
C:\Program Files\winpop
C:\temp\tn3
C:\WINDOWS\cookies.ini
C:\WINDOWS\system32\D2
C:\WINDOWS\system32\drivers\core.cache.dsk . . . . failed to delete
C:\WINDOWS\system32\e9
C:\WINDOWS\system32\e9\farstadcom2.exe
C:\WINDOWS\system32\f02WtR
C:\WINDOWS\system32\fcccyxw.dll
C:\WINDOWS\system32\fcyxx.dll
C:\WINDOWS\system32\iikkj.ini
C:\WINDOWS\system32\jkkii.dll
C:\WINDOWS\system32\kekmlruf.ini
C:\WINDOWS\system32\kekmlruf.ini2
C:\WINDOWS\system32\kekmlruf.tmp
C:\WINDOWS\system32\lkmoq.bak1
C:\WINDOWS\system32\lkmoq.ini
C:\WINDOWS\system32\mbols~1
C:\WINDOWS\system32\mbols~1\??mbols\
C:\WINDOWS\system32\mbols~1\regedit.exe
C:\WINDOWS\system32\mcrh.tmp
C:\WINDOWS\system32\p2
C:\WINDOWS\system32\pac.txt
C:\WINDOWS\system32\rtwxx.ini
C:\WINDOWS\system32\rtwxx.ini2
C:\WINDOWS\system32\rtwxx.tmp
C:\WINDOWS\system32\ssqonkk.dll
C:\WINDOWS\system32\t8
C:\WINDOWS\system32\unvxw.dll
C:\WINDOWS\system32\wdlnhxvj.ini
C:\WINDOWS\system32\wdlnhxvj.ini2
C:\WINDOWS\system32\xxycf.ini
C:\WINDOWS\system32\xxyvsrs.dll
C:\WINDOWS\system32\z4
C:\WINDOWS\system32\zxdnt3d.cfg
C:\WINDOWS\system32\drivers\core.cache.dsk . . . . failed to delete
.
((((((((((((((((((((((((((((((((((((((( Drivers/Services )))))))))))))))))))))))))))))))))))))))))))))))))
.
-------\LEGACY_CMDSERVICE
-------\LEGACY_DOMAINSERVICE
-------\LEGACY_NETWORK_MONITOR
-------\LEGACY_SMTPDRV
-------\LEGACY_SYMAVC32
-------\smtpdrv
((((((((((((((((((((((((( Files Created from 2007-12-28 to 2008-01-30 )))))))))))))))))))))))))))))))
.
2008-01-30 12:20 . 2008-01-30 12:20 <DIR> d-------- C:\Temp\tn3
2008-01-30 12:14 . 2006-12-19 16:50 8,458,752 --a------ C:\WINDOWS\system32\SETC8.tmp
2008-01-30 12:14 . 2006-12-19 16:50 8,458,752 --a--c--- C:\WINDOWS\system32\dllcache\SETCA.tmp
2008-01-30 12:14 . 2007-10-10 05:34 350,720 --a------ C:\WINDOWS\system32\SETC9.tmp
2008-01-28 18:19 . 2008-01-28 18:19 167,545 --a------ C:\WINDOWS\system32\drivers\core.cache.dsk
2008-01-28 12:17 . 2008-01-28 12:17 <DIR> d-------- C:\WINDOWS\system32\Kaspersky Lab
2008-01-28 11:56 . 2008-01-28 11:56 <DIR> d-------- C:\Program Files\Trend Micro
2008-01-28 10:20 . 2008-01-30 12:19 618,272 --ahs---- C:\WINDOWS\system32\drivers\fidbox.dat
2008-01-28 10:20 . 2008-01-30 12:18 19,744 --ahs---- C:\WINDOWS\system32\drivers\fidbox2.dat
2008-01-28 10:20 . 2008-01-30 12:18 9,332 --ahs---- C:\WINDOWS\system32\drivers\fidbox.idx
2008-01-28 10:20 . 2008-01-30 12:18 2,900 --ahs---- C:\WINDOWS\system32\drivers\fidbox2.idx
2008-01-28 10:05 . 2008-01-28 10:05 <DIR> d-------- C:\Program Files\Kaspersky Lab
2008-01-28 10:05 . 2008-01-30 12:21 <DIR> d-------- C:\Documents and Settings\All Users\Application Data\Kaspersky Lab
2008-01-28 10:02 . 2008-01-28 10:02 <DIR> d-------- C:\KAV
2008-01-28 05:28 . 2006-12-06 23:14 2,330,624 -----c--- C:\WINDOWS\system32\dllcache\wmvcore.dll
2008-01-28 04:27 . 2007-07-09 08:09 584,192 --a------ C:\WINDOWS\system32\SETA1.tmp
2008-01-28 04:27 . 2007-07-09 08:09 584,192 -----c--- C:\WINDOWS\system32\dllcache\rpcrt4.dll
2008-01-28 04:18 . 2007-04-18 11:12 2,854,400 --a------ C:\WINDOWS\system32\SET94.tmp
2008-01-28 01:35 . 2005-06-28 10:21 22,752 --a------ C:\WINDOWS\system32\spupdsvc.exe
2008-01-28 01:29 . 2008-01-28 01:29 <DIR> d-------- C:\Program Files\MSXML 4.0
2008-01-28 01:29 . 2006-08-21 04:14 128,896 -----c--- C:\WINDOWS\system32\dllcache\fltmgr.sys
2008-01-28 01:29 . 2006-08-21 04:14 23,040 -----c--- C:\WINDOWS\system32\dllcache\fltmc.exe
2008-01-28 01:29 . 2006-08-21 07:21 16,896 -----c--- C:\WINDOWS\system32\dllcache\fltlib.dll
2008-01-27 18:08 . 2007-10-11 00:57 1,498,112 -----c--- C:\WINDOWS\system32\dllcache\shdocvw.dll
2008-01-27 18:08 . 2007-10-11 00:57 1,024,000 -----c--- C:\WINDOWS\system32\dllcache\browseui.dll
2008-01-27 18:08 . 2007-10-11 00:57 666,112 -----c--- C:\WINDOWS\system32\dllcache\wininet.dll
2008-01-27 18:08 . 2007-10-11 00:57 617,984 -----c--- C:\WINDOWS\system32\dllcache\urlmon.dll
2008-01-27 18:08 . 2007-10-11 00:57 474,112 -----c--- C:\WINDOWS\system32\dllcache\shlwapi.dll
2008-01-27 18:08 . 2007-10-11 00:57 151,040 -----c--- C:\WINDOWS\system32\dllcache\cdfview.dll
2008-01-27 18:08 . 2007-10-11 00:57 96,256 -----c--- C:\WINDOWS\system32\dllcache\inseng.dll
2008-01-27 17:58 . 2008-01-28 10:30 553 --ahs---- C:\WINDOWS\system32\abcdd.ini
2008-01-27 16:25 . 2008-01-30 12:17 <DIR> d--h----- C:\WINDOWS\$hf_mig$
2008-01-27 16:15 . 2007-07-30 19:19 271,224 --a------ C:\WINDOWS\system32\mucltui.dll
2008-01-27 16:15 . 2007-07-30 19:19 30,072 --a------ C:\WINDOWS\system32\mucltui.dll.mui
2008-01-27 16:14 . 2007-07-30 19:18 34,136 --a------ C:\WINDOWS\system32\wucltui.dll.mui
2008-01-27 16:14 . 2007-07-30 19:19 25,944 --a------ C:\WINDOWS\system32\wuaucpl.cpl.mui
2008-01-27 16:14 . 2007-07-30 19:19 25,944 --a------ C:\WINDOWS\system32\wuapi.dll.mui
2008-01-27 16:14 . 2007-07-30 19:18 20,312 --a------ C:\WINDOWS\system32\wuaueng.dll.mui
2008-01-25 17:55 . 2008-01-25 17:55 <DIR> d-------- C:\Documents and Settings\All Users\Application Data\Avg7
2008-01-25 13:46 . 2008-01-28 17:04 512 --a------ C:\WINDOWS\wininit.ini
2008-01-25 01:54 . 2008-01-25 01:54 <DIR> d-------- C:\Documents and Settings\Administrator\Application Data\Grisoft
2008-01-25 01:54 . 2007-05-30 07:10 10,872 --a------ C:\WINDOWS\system32\drivers\AvgAsCln.sys
2008-01-24 19:03 . 2008-01-25 17:54 <DIR> d-------- C:\Documents and Settings\All Users\Application Data\Grisoft
2008-01-24 17:56 . 2007-01-18 07:00 3,968 --a------ C:\WINDOWS\system32\drivers\AvgArCln.sys
2008-01-24 14:59 . 2008-01-24 01:29 102,664 --a------ C:\WINDOWS\system32\drivers\tmcomm.sys
2008-01-24 14:01 . 2008-01-24 14:01 <DIR> d--h----- C:\Program Files\InstallShield Installation Information
2008-01-24 14:01 . 2008-01-24 14:02 <DIR> d-------- C:\Program Files\Dynex Wireless G Adapter
2008-01-24 14:01 . 2003-10-13 15:30 94,208 --a------ C:\WINDOWS\system32\GTW32N50.dll
2008-01-24 14:01 . 2004-04-30 15:12 40,960 --a------ C:\WINDOWS\system32\WGDTC.dll
2008-01-24 14:01 . 2003-09-25 23:28 31,930 --a------ C:\WINDOWS\system32\GTNDIS3.VXD
2008-01-24 14:01 . 2003-09-25 22:15 15,872 --a------ C:\WINDOWS\system32\GTNDIS5.sys
2008-01-24 14:01 . 2008-01-24 14:01 15,781 --a------ C:\WINDOWS\system32\drivers\mdc8021x.sys
2008-01-24 14:00 . 2008-01-24 14:01 <DIR> d-------- C:\Program Files\Common Files\InstallShield
2008-01-24 04:15 . 2008-01-24 04:15 294 --ahs---- C:\WINDOWS\system32\iyejsfia.ini
2008-01-24 01:25 . 2008-01-24 15:00 <DIR> d-------- C:\Documents and Settings\Administrator\.housecall6.6
2008-01-24 00:49 . 2008-01-24 00:49 294 --ahs---- C:\WINDOWS\system32\vjabnomk.ini
2008-01-24 00:42 . 2008-01-27 23:08 <DIR> d-------- C:\WINDOWS\sv3968
2008-01-17 17:17 . 2008-01-17 17:17 294 --ahs---- C:\WINDOWS\system32\fnfisnuh.ini
2008-01-16 15:42 . 2008-01-16 15:42 474 --ahs---- C:\WINDOWS\system32\dgwkmwao.ini
2008-01-16 14:48 . 2008-01-16 15:42 354 --ahs---- C:\WINDOWS\system32\oqibxtyb.ini
2008-01-16 00:59 . 2008-01-16 00:59 294 --ahs---- C:\WINDOWS\system32\mkdtdneg.ini
2008-01-13 13:35 . 2008-01-13 13:35 <DIR> d-------- C:\Program Files\Dot1XCfg
2008-01-13 13:30 . 2008-01-13 13:30 86,016 --a------ C:\WINDOWS\system32\drivers\rdpdrr.sys
2008-01-13 13:29 . 2008-01-13 13:29 <DIR> d-------- C:\WINDOWS\system32\edcA01
2008-01-11 16:05 . 2008-01-11 17:21 354 --ahs---- C:\WINDOWS\system32\ilsspgun.ini
2008-01-11 12:59 . 2008-01-11 12:59 294 --ahs---- C:\WINDOWS\system32\lqdmqqoa.ini
2008-01-11 02:39 . 2008-01-11 02:39 294 --ahs---- C:\WINDOWS\system32\rvutofow.ini
2008-01-02 17:39 . 2008-01-02 17:39 <DIR> d-------- C:\Documents and Settings\Administrator\Application Data\Smith Micro
2008-01-02 17:32 . 2008-01-02 17:32 <DIR> d-------- C:\Program Files\Verizon Wireless
2008-01-02 17:32 . 2008-01-02 17:32 <DIR> d-------- C:\Program Files\PANTECH
2008-01-02 17:32 . 2006-11-01 17:21 319,456 --a------ C:\WINDOWS\system32\DIFxAPI.dll
2008-01-02 17:32 . 2007-08-23 00:13 77,824 --a------ C:\WINDOWS\system32\ptdmwmcp.dll
2008-01-02 17:32 . 2007-08-17 20:56 59,520 --a------ C:\WINDOWS\system32\drivers\PTDMWWAN.sys
2008-01-02 17:32 . 2007-08-17 20:56 41,856 --a------ C:\WINDOWS\system32\drivers\PTDMMdm.sys
2008-01-02 17:32 . 2007-08-17 20:56 39,936 --a------ C:\WINDOWS\system32\drivers\PTDMVsp.sys
2008-01-02 17:32 . 2007-08-17 20:56 29,952 --a------ C:\WINDOWS\system32\drivers\PTDMBus.sys
.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2008-01-13 18:30 --------- d-----w C:\Program Files\CCleaner
2007-05-20 05:42 722,176 ----a-w C:\Documents and Settings\Administrator\gotomypc_428.exe
2007-09-06 22:05 637,050 --sha-w C:\WINDOWS\system32\jhmfnanx.ini2
2007-09-03 19:05 404 --sha-w C:\WINDOWS\system32\ouojhuqq.ini2
2007-10-10 03:25 693,421 --sha-w C:\WINDOWS\system32\qymnxmiq.ini2
.
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4
[HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{0171CAB8-76BF-4EC8-B1F8-415F96C16FF5}]
[HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{0BC3BDA0-5A1D-462B-8765-906B805AE411}]
[HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{10D7ABD7-F467-4C2D-83AB-39F9AADB3F21}]
[HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{18E759E7-5480-4284-8ABC-3F13CFBD3055}]
[HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{19A3A01F-F36E-41AD-9409-8C7F2BE54379}]
[HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{44DA4E94-F6E3-41D1-BC51-E012C1923B52}]
[HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{49448C32-16F5-6A55-FCBC-60A395FCF1CB}]
C:\WINDOWS\system32\lakzc.dll
[HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{64AB2227-E684-4658-BFD4-0D828824DDF9}]
[HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{6AD09082-35C6-4BBF-AE04-E75A9DABA41E}]
[HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{71D10F0C-D19C-40EB-8CF3-A3BA7B073BDA}]
[HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{7AFF469F-42E2-4EFA-8FC9-F8A87BAECB64}]
[HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{8158927B-4A97-4F17-AB76-30085A632D87}]
[HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{8E560337-5BCC-4D1B-9F06-03F639490F62}]
[HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{97D0C1A3-F79C-42A4-9A39-C6521D5F5595}]
[HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{9AD12338-EB4F-4B0F-9EE2-CBF572E5B06D}]
[HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{9B679F05-F388-41BC-B35A-F04B5EEA35C9}]
C:\WINDOWS\system32\xxwtr.dll
[HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{B3925F4D-3300-449B-99DF-528986895DD8}]
[HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{B522E814-6955-4B3E-977C-1C447EE37700}]
[HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{B530EC1E-45AC-49F6-96CF-13FECB600B02}]
[HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{B70C38F2-2113-427D-A8EB-35C5369FEA32}]
[HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{B87F81A5-E74C-4C7F-906B-81BF0CD68705}]
[HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{C960E623-8C5C-43A5-A9AF-3C0B780C3981}]
[HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{CF5FCB91-93B3-45AA-A51E-A69B54B8F3B4}]
[HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{D4576C73-52BD-4401-B966-5A128C4433D4}]
[HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{D7F89752-80ED-489C-8D2A-644BADBAA3A8}]
[HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{ED042CC0-A7DC-4FE1-966B-A47E8DDD80EA}]
C:\WINDOWS\system32\qomkl.dll
[HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{EFFEF283-2DDC-45DC-AD78-39A2619BBD8C}]
[HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{F11A2443-CC6E-4F18-9A6B-BC7B3B3557E9}]
[HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{F20EEBF7-DBCB-42FC-AED1-87FF6AFCBBBD}]
[HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{f2a49420-375e-4f7d-9665-f692d517aad1}]
[HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{F4CC57F3-73FC-44C0-0EB3-5C1D0A0ACBB6}]
C:\Program Files\Windows NT\qujaxim363.dll
[HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{F57B1642-12FA-412C-BDA6-FA99A9481245}]
[HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{F6523A99-1659-4847-9741-786D86CBCB96}]
C:\WINDOWS\system32\ddcba.dll
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"ctfmon.exe"="C:\WINDOWS\system32\ctfmon.exe" [2004-08-03 14:56 15360]
"Aim6"="C:\Program Files\AIM6\aim6.exe" [ ]
"SpybotSD TeaTimer"="C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe" [2007-08-31 15:46 1460560]
"Easa"="C:\WINDOWS\system32\MBOLS~1\regedit.exe" [ ]
"Zvvfqpb"="C:\Program Files\Common Files\?icrosoft.NET\n?pdb.exe" [ ]
"Router"="C:\Program Files\Router\Router.exe" [ ]
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"SunJavaUpdateSched"="C:\Program Files\Java\jre1.5.0_05\bin\jusched.exe" [ ]
"!AVG Anti-Spyware"="C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\avgas.exe" [2007-06-11 04:25 6731312]
"AVP"="C:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 6.0 SOS\avp.exe" [2007-11-19 14:40 231952]
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run]
"TaskSwitchXP"="C:\Program Files\TaskSwitchXP\TaskSwitchXP.exe" [2005-08-24 14:11 61952]
"Free Download Manager"="C:\Program Files\Free Download Manager\fdm.exe" [ ]
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\RunOnce]
"nlsf"="cmd.exe" [2004-08-03 14:56 388608 C:\WINDOWS\system32\cmd.exe]
"nlhr"="C:\WINDOWS\System32\AdvPack.Dll" [2004-08-03 14:56 99840]
"tscuninstall"="C:\WINDOWS\system32\tscupgrd.exe" [2004-08-03 12:59 44544]
C:\Documents and Settings\All Users\Start Menu\Programs\Startup\
Intellex Event Handler.lnk - C:\Program Files\Sensormatic\NetworkClient\Bin\NtlxEventhandler.exe [2005-12-15 13:16:12 770048]
[HKEY_CURRENT_USER\software\microsoft\windows\currentversion\policies\system]
"DisableRegistryTools"= 0 (0x0)
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\explorer]
"NoDesktopCleanupWizard"= 1 (0x1)
"ForceClassicControlPanel"= 1 (0x1)
[HKEY_CURRENT_USER\software\microsoft\windows\currentversion\policies\explorer]
"NoInstrumentation"= 1 (0x1)
"NoSMHelp"= 1 (0x1)
[HKEY_USERS\.default\software\microsoft\windows\currentversion\policies\explorer]
"NoInstrumentation"= 1 (0x1)
"NoSMHelp"= 1 (0x1)
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\ssqonkk]
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\urqpqno]
urqpqno.dll
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\xxwtr]
C:\WINDOWS\system32\xxwtr.dll
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\System Reserved]
@=""
R1 rdpdrr;rdpdrr;C:\WINDOWS\system32\drivers\rdpdrr.sys [2008-01-13 13:30]
R2 Dynex DX-WGDTC WLService;Dynex DX-WGDTC Service;C:\Program Files\Dynex Wireless G Adapter\WLService.exe [2004-03-29 16:08]
R2 NwSapAgent;SAP Agent;C:\WINDOWS\system32\svchost.exe [2004-08-03 14:56]
R3 PTDMBus;PANTECH USB Modem Composite Device Driver ;C:\WINDOWS\system32\DRIVERS\PTDMBus.sys [2007-08-17 20:56]
R3 PTDMMdm;PANTECH USB Modem Drivers ;C:\WINDOWS\system32\DRIVERS\PTDMMdm.sys [2007-08-17 20:56]
R3 PTDMVsp;PANTECH USB Modem Serial Port ;C:\WINDOWS\system32\DRIVERS\PTDMVsp.sys [2007-08-17 20:56]
R3 PTDMWWAN;PANTECH USB Modem WWAN Driver;C:\WINDOWS\system32\DRIVERS\PTDMWWAN.sys [2007-08-17 20:56]
*Newly Created Service* - SHAREDACCESS
.
**************************************************************************
catchme 0.3.1344 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2008-01-30 12:22:01
Windows 5.1.2600 Service Pack 2 NTFS
scanning hidden processes ...
scanning hidden autostart entries ...
scanning hidden files ...
scan completed successfully
hidden files: 0
**************************************************************************
.
------------------------ Other Running Processes ------------------------
.
C:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 6.0 SOS\avp.exe
C:\Program Files\Dynex Wireless G Adapter\WLService.exe
C:\Program Files\Dynex Wireless G Adapter\WLanCfgG.exe
C:\Program Files\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE
C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\avgas.exe
C:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 6.0 SOS\avp.exe
C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
C:\Program Files\Sensormatic\NetworkClient\Bin\NtlxEventhandler.exe
.
**************************************************************************
.
Completion time: 2008-01-30 12:28:07 - machine was rebooted
ComboFix-quarantined-files.txt 2008-01-30 17:27:55
.
2008-01-28 07:06:04 --- E O F ---
illumn8r
2008-01-30, 19:43
Wouldn't all fit in one post so here is the 2nd log
Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 12:34:28 PM, on 1/30/2008
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)
Boot mode: Normal
Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\guard.exe
C:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 6.0 SOS\avp.exe
C:\Program Files\Dynex Wireless G Adapter\WLService.exe
C:\Program Files\Dynex Wireless G Adapter\WLanCfgG.exe
C:\Program Files\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\svchost.exe
C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\avgas.exe
C:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 6.0 SOS\avp.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
C:\Program Files\Sensormatic\NetworkClient\Bin\NtlxEventhandler.exe
C:\WINDOWS\system32\wuauclt.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\Trend Micro\HijackThis\illumn8r.exe
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page =
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Local Page =
R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName =
O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 7.0\ActiveX\AcroIEHelper.dll
O2 - BHO: (no name) - {49448C32-16F5-6A55-FCBC-60A395FCF1CB} - C:\WINDOWS\system32\lakzc.dll (file missing)
O2 - BHO: Spybot-S&D IE Protection - {53707962-6F74-2D53-2644-206D7942484F} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O2 - BHO: (no name) - {9B679F05-F388-41BC-B35A-F04B5EEA35C9} - C:\WINDOWS\system32\xxwtr.dll (file missing)
O2 - BHO: (no name) - {ED042CC0-A7DC-4FE1-966B-A47E8DDD80EA} - C:\WINDOWS\system32\qomkl.dll (file missing)
O2 - BHO: 0 - {F4CC57F3-73FC-44C0-0EB3-5C1D0A0ACBB6} - C:\Program Files\Windows NT\qujaxim363.dll (file missing)
O2 - BHO: (no name) - {F6523A99-1659-4847-9741-786D86CBCB96} - C:\WINDOWS\system32\ddcba.dll (file missing)
O4 - HKLM\..\Run: [SunJavaUpdateSched] C:\Program Files\Java\jre1.5.0_05\bin\jusched.exe
O4 - HKLM\..\Run: [!AVG Anti-Spyware] "C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\avgas.exe" /minimized
O4 - HKLM\..\Run: [AVP] "C:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 6.0 SOS\avp.exe"
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
O4 - HKCU\..\Run: [Aim6] "C:\Program Files\AIM6\aim6.exe" /d locale=en-US ee://aol/imApp
O4 - HKCU\..\Run: [SpybotSD TeaTimer] C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
O4 - HKCU\..\Run: [Easa] "C:\WINDOWS\system32\MBOLS~1\regedit.exe" -vt yazb
O4 - HKCU\..\Run: [Zvvfqpb] "C:\Program Files\Common Files\?icrosoft.NET\n?pdb.exe"
O4 - HKCU\..\Run: [Router] C:\Program Files\Router\Router.exe
O4 - HKUS\S-1-5-19\..\Run: [TaskSwitchXP] C:\Program Files\TaskSwitchXP\TaskSwitchXP.exe (User 'LOCAL SERVICE')
O4 - HKUS\S-1-5-19\..\Run: [Free Download Manager] C:\Program Files\Free Download Manager\fdm.exe -autorun (User 'LOCAL SERVICE')
O4 - HKUS\S-1-5-19\..\RunOnce: [nlsf] cmd.exe /C move /Y "%SystemRoot%\System32\syssetub.dll" "%SystemRoot%\System32\syssetup.dll" (User 'LOCAL SERVICE')
O4 - HKUS\S-1-5-20\..\Run: [TaskSwitchXP] C:\Program Files\TaskSwitchXP\TaskSwitchXP.exe (User 'NETWORK SERVICE')
O4 - HKUS\S-1-5-20\..\RunOnce: [nlsf] cmd.exe /C move /Y "%SystemRoot%\System32\syssetub.dll" "%SystemRoot%\System32\syssetup.dll" (User 'NETWORK SERVICE')
O4 - HKUS\S-1-5-18\..\Run: [TaskSwitchXP] C:\Program Files\TaskSwitchXP\TaskSwitchXP.exe (User 'SYSTEM')
O4 - HKUS\S-1-5-18\..\RunOnce: [nlsf] cmd.exe /C move /Y "%SystemRoot%\System32\syssetub.dll" "%SystemRoot%\System32\syssetup.dll" (User 'SYSTEM')
O4 - HKUS\.DEFAULT\..\Run: [TaskSwitchXP] C:\Program Files\TaskSwitchXP\TaskSwitchXP.exe (User 'Default user')
O4 - HKUS\.DEFAULT\..\RunOnce: [nlsf] cmd.exe /C move /Y "%SystemRoot%\System32\syssetub.dll" "%SystemRoot%\System32\syssetup.dll" (User 'Default user')
O4 - Startup: Adobe Gamma.lnk = C:\Program Files\Common Files\Adobe\Calibration\Adobe Gamma Loader.exe
O4 - Global Startup: Intellex Event Handler.lnk = C:\Program Files\Sensormatic\NetworkClient\Bin\NtlxEventhandler.exe
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~1\OFFICE11\EXCEL.EXE/3000
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_05\bin\npjpi150_05.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_05\bin\npjpi150_05.dll
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~1\OFFICE11\REFIEBAR.DLL
O9 - Extra button: (no name) - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O9 - Extra 'Tools' menuitem: Spybot - Search & Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O10 - Unknown file in Winsock LSP: c:\windows\system32\nwprovau.dll
O16 - DPF: {0EB0E74A-2A76-4AB3-A7FB-9BD8C29F7F75} (CKAVWebScan Object) - http://www.kaspersky.com/kos/english/kavwebscan_unicode.cab
O20 - Winlogon Notify: urqpqno - urqpqno.dll (file missing)
O20 - Winlogon Notify: xxwtr - C:\WINDOWS\system32\xxwtr.dll (file missing)
O23 - Service: Adobe LM Service - Adobe Systems - C:\Program Files\Common Files\Adobe Systems Shared\Service\Adobelmsvc.exe
O23 - Service: AVG Anti-Spyware Guard - GRISOFT s.r.o. - C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\guard.exe
O23 - Service: Kaspersky Anti-Virus 6.0 (AVP) - Kaspersky Lab - C:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 6.0 SOS\avp.exe
O23 - Service: Indexing Service (CiSvc) - Unknown owner - C:\WINDOWS\system32\cisvc.exe (file missing)
O23 - Service: Dynex DX-WGDTC Service (Dynex DX-WGDTC WLService) - Unknown owner - C:\Program Files\Dynex Wireless G Adapter\WLService.exe
--
End of file - 6133 bytes
Hi
We need first to disable TeaTimer that it doesn't interfere with fixes. You can re-enable it when you're clean again:
1. Run Spybot-S&D in Advanced Mode.
2. If it is not already set to do this Go to the Mode menu select "Advanced Mode"
3. On the left hand side, Click on Tools
4. Then click on the Resident Icon in the List
5. Uncheck "Resident TeaTimer" and OK any prompts.
6. Restart your computer.
Open notepad and copy/paste the text in the quotebox below into it:
Driver::
rdpdrr
File::
C:\WINDOWS\system32\SETC8.tmp
C:\WINDOWS\system32\dllcache\SETCA.tmp
C:\WINDOWS\system32\SETC9.tmp
C:\WINDOWS\system32\SETA1.tmp
C:\WINDOWS\system32\SET94.tmp
C:\WINDOWS\system32\iyejsfia.ini
C:\WINDOWS\system32\vjabnomk.ini
C:\WINDOWS\system32\fnfisnuh.ini
C:\WINDOWS\system32\dgwkmwao.ini
C:\WINDOWS\system32\oqibxtyb.ini
C:\WINDOWS\system32\mkdtdneg.ini
C:\WINDOWS\system32\drivers\rdpdrr.sys
C:\WINDOWS\system32\ilsspgun.ini
C:\WINDOWS\system32\lqdmqqoa.ini
C:\WINDOWS\system32\rvutofow.ini
C:\WINDOWS\system32\jhmfnanx.ini2
C:\WINDOWS\system32\ouojhuqq.ini2
C:\WINDOWS\system32\qymnxmiq.ini2
Folder::
C:\WINDOWS\sv3968
C:\WINDOWS\system32\edcA01
Registry::
[-HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{0171CAB8-76BF-4EC8-B1F8-415F96C16FF5}]
[-HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{0BC3BDA0-5A1D-462B-8765-906B805AE411}]
[-HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{10D7ABD7-F467-4C2D-83AB-39F9AADB3F21}]
[-HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{18E759E7-5480-4284-8ABC-3F13CFBD3055}]
[-HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{19A3A01F-F36E-41AD-9409-8C7F2BE54379}]
[-HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{44DA4E94-F6E3-41D1-BC51-E012C1923B52}]
[-HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{49448C32-16F5-6A55-FCBC-60A395FCF1CB}]
[-HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{64AB2227-E684-4658-BFD4-0D828824DDF9}]
[-HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{6AD09082-35C6-4BBF-AE04-E75A9DABA41E}]
[-HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{71D10F0C-D19C-40EB-8CF3-A3BA7B073BDA}]
[-HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{7AFF469F-42E2-4EFA-8FC9-F8A87BAECB64}]
[-HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{8158927B-4A97-4F17-AB76-30085A632D87}]
[-HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{8E560337-5BCC-4D1B-9F06-03F639490F62}]
[-HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{97D0C1A3-F79C-42A4-9A39-C6521D5F5595}]
[-HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{9AD12338-EB4F-4B0F-9EE2-CBF572E5B06D}]
[-HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{9B679F05-F388-41BC-B35A-F04B5EEA35C9}]
[-HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{B3925F4D-3300-449B-99DF-528986895DD8}]
[-HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{B522E814-6955-4B3E-977C-1C447EE37700}]
[-HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{B530EC1E-45AC-49F6-96CF-13FECB600B02}]
[-HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{B70C38F2-2113-427D-A8EB-35C5369FEA32}]
[-HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{B87F81A5-E74C-4C7F-906B-81BF0CD68705}]
[-HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{C960E623-8C5C-43A5-A9AF-3C0B780C3981}]
[-HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{CF5FCB91-93B3-45AA-A51E-A69B54B8F3B4}]
[-HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{D4576C73-52BD-4401-B966-5A128C4433D4}]
[-HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{D7F89752-80ED-489C-8D2A-644BADBAA3A8}]
[-HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{ED042CC0-A7DC-4FE1-966B-A47E8DDD80EA}]
[-HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{EFFEF283-2DDC-45DC-AD78-39A2619BBD8C}]
[-HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{F11A2443-CC6E-4F18-9A6B-BC7B3B3557E9}]
[-HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{F20EEBF7-DBCB-42FC-AED1-87FF6AFCBBBD}]
[-HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{f2a49420-375e-4f7d-9665-f692d517aad1}]
[-HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{F4CC57F3-73FC-44C0-0EB3-5C1D0A0ACBB6}]
[-HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{F57B1642-12FA-412C-BDA6-FA99A9481245}]
[-HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{F6523A99-1659-4847-9741-786D86CBCB96}]
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"Easa"=-
"Zvvfqpb"=-
"Router"=-
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\ssqonkk]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\urqpqno]
[-HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\xxwtr]
Save this as "CFScript"
Then drag the CFScript into ComboFix.exe as you see in the screenshot below.
http://img.photobucket.com/albums/v666/sUBs/CFScript.gif
This will start ComboFix again. After reboot, (in case it asks to reboot), post the contents of Combofix.txt in your next reply together with a new HijackThis log.
Combofix should never take more that 20 minutes including the reboot if malware is detected.
If it does, open Task Manager then Processes tab (press ctrl, alt and del at the same time) and end any processes of findstr, find, sed or swreg, then combofix should continue.
If that happened we want to know, and also what process you had to end.
illumn8r
2008-01-30, 22:30
Here is the Combofix log, the newest HijackThis log follows in another post.
ComboFix 08-01-30.6 - Administrator 2008-01-30 15:09:39.2 - NTFSx86
Microsoft Windows XP Professional 5.1.2600.2.1252.1.1033.18.280 [GMT -5:00]
Running from: C:\Documents and Settings\Administrator\Desktop\ComboFix.exe
Command switches used :: C:\Documents and Settings\Administrator\Desktop\CFScript.txt
* Created a new restore point
WARNING -THIS MACHINE DOES NOT HAVE THE RECOVERY CONSOLE INSTALLED !!
FILE
C:\WINDOWS\system32\dgwkmwao.ini
C:\WINDOWS\system32\dllcache\SETCA.tmp
C:\WINDOWS\system32\drivers\rdpdrr.sys
C:\WINDOWS\system32\fnfisnuh.ini
C:\WINDOWS\system32\ilsspgun.ini
C:\WINDOWS\system32\iyejsfia.ini
C:\WINDOWS\system32\jhmfnanx.ini2
C:\WINDOWS\system32\lqdmqqoa.ini
C:\WINDOWS\system32\mkdtdneg.ini
C:\WINDOWS\system32\oqibxtyb.ini
C:\WINDOWS\system32\ouojhuqq.ini2
C:\WINDOWS\system32\qymnxmiq.ini2
C:\WINDOWS\system32\rvutofow.ini
C:\WINDOWS\system32\SET94.tmp
C:\WINDOWS\system32\SETA1.tmp
C:\WINDOWS\system32\SETC8.tmp
C:\WINDOWS\system32\SETC9.tmp
C:\WINDOWS\system32\vjabnomk.ini
.
((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.
C:\WINDOWS\system32\drivers\core.cache.dsk
C:\WINDOWS\system32\drivers\rdpdrr.sys
C:\temp\tn3
C:\WINDOWS\sv3968
C:\WINDOWS\system32\_000006_.tmp.dll
C:\WINDOWS\system32\_000009_.tmp.dll
C:\WINDOWS\system32\_000011_.tmp.dll
C:\WINDOWS\system32\dgwkmwao.ini
C:\WINDOWS\system32\dllcache\SETCA.tmp
C:\WINDOWS\system32\drivers\core.cache.dsk
C:\WINDOWS\system32\drivers\rdpdrr.sys
C:\WINDOWS\system32\edcA01
C:\WINDOWS\system32\fnfisnuh.ini
C:\WINDOWS\system32\ilsspgun.ini
C:\WINDOWS\system32\iyejsfia.ini
C:\WINDOWS\system32\jhmfnanx.ini2
C:\WINDOWS\system32\lqdmqqoa.ini
C:\WINDOWS\system32\mkdtdneg.ini
C:\WINDOWS\system32\oqibxtyb.ini
C:\WINDOWS\system32\ouojhuqq.ini2
C:\WINDOWS\system32\qymnxmiq.ini2
C:\WINDOWS\system32\rvutofow.ini
C:\WINDOWS\system32\SET94.tmp
C:\WINDOWS\system32\SETA1.tmp
C:\WINDOWS\system32\SETC8.tmp
C:\WINDOWS\system32\SETC9.tmp
C:\WINDOWS\system32\vjabnomk.ini
.
((((((((((((((((((((((((((((((((((((((( Drivers/Services )))))))))))))))))))))))))))))))))))))))))))))))))
.
-------\LEGACY_RDPDRR
-------\rdpdrr
((((((((((((((((((((((((( Files Created from 2007-12-28 to 2008-01-30 )))))))))))))))))))))))))))))))
.
2008-01-28 12:17 . 2008-01-28 12:17 <DIR> d-------- C:\WINDOWS\system32\Kaspersky Lab
2008-01-28 11:56 . 2008-01-28 11:56 <DIR> d-------- C:\Program Files\Trend Micro
2008-01-28 10:20 . 2008-01-30 15:18 661,280 --ahs---- C:\WINDOWS\system32\drivers\fidbox.dat
2008-01-28 10:20 . 2008-01-30 15:15 24,352 --ahs---- C:\WINDOWS\system32\drivers\fidbox2.dat
2008-01-28 10:20 . 2008-01-30 15:15 9,908 --ahs---- C:\WINDOWS\system32\drivers\fidbox.idx
2008-01-28 10:20 . 2008-01-30 15:15 3,332 --ahs---- C:\WINDOWS\system32\drivers\fidbox2.idx
2008-01-28 10:05 . 2008-01-28 10:05 <DIR> d-------- C:\Program Files\Kaspersky Lab
2008-01-28 10:05 . 2008-01-30 15:17 <DIR> d-------- C:\Documents and Settings\All Users\Application Data\Kaspersky Lab
2008-01-28 10:02 . 2008-01-28 10:02 <DIR> d-------- C:\KAV
2008-01-28 05:28 . 2006-12-06 23:14 2,330,624 -----c--- C:\WINDOWS\system32\dllcache\wmvcore.dll
2008-01-28 04:27 . 2007-07-09 08:09 584,192 -----c--- C:\WINDOWS\system32\dllcache\rpcrt4.dll
2008-01-28 01:35 . 2005-06-28 10:21 22,752 --a------ C:\WINDOWS\system32\spupdsvc.exe
2008-01-28 01:29 . 2008-01-28 01:29 <DIR> d-------- C:\Program Files\MSXML 4.0
2008-01-28 01:29 . 2006-08-21 04:14 128,896 -----c--- C:\WINDOWS\system32\dllcache\fltmgr.sys
2008-01-28 01:29 . 2006-08-21 04:14 23,040 -----c--- C:\WINDOWS\system32\dllcache\fltmc.exe
2008-01-28 01:29 . 2006-08-21 07:21 16,896 -----c--- C:\WINDOWS\system32\dllcache\fltlib.dll
2008-01-27 18:08 . 2007-10-11 00:57 1,498,112 -----c--- C:\WINDOWS\system32\dllcache\shdocvw.dll
2008-01-27 18:08 . 2007-10-11 00:57 1,024,000 -----c--- C:\WINDOWS\system32\dllcache\browseui.dll
2008-01-27 18:08 . 2007-10-11 00:57 666,112 -----c--- C:\WINDOWS\system32\dllcache\wininet.dll
2008-01-27 18:08 . 2007-10-11 00:57 617,984 -----c--- C:\WINDOWS\system32\dllcache\urlmon.dll
2008-01-27 18:08 . 2007-10-11 00:57 474,112 -----c--- C:\WINDOWS\system32\dllcache\shlwapi.dll
2008-01-27 18:08 . 2007-10-11 00:57 151,040 -----c--- C:\WINDOWS\system32\dllcache\cdfview.dll
2008-01-27 18:08 . 2007-10-11 00:57 96,256 -----c--- C:\WINDOWS\system32\dllcache\inseng.dll
2008-01-27 17:58 . 2008-01-28 10:30 553 --ahs---- C:\WINDOWS\system32\abcdd.ini
2008-01-27 16:25 . 2008-01-30 12:17 <DIR> d--h----- C:\WINDOWS\$hf_mig$
2008-01-27 16:15 . 2007-07-30 19:19 271,224 --a------ C:\WINDOWS\system32\mucltui.dll
2008-01-27 16:15 . 2007-07-30 19:19 30,072 --a------ C:\WINDOWS\system32\mucltui.dll.mui
2008-01-27 16:14 . 2007-07-30 19:18 34,136 --a------ C:\WINDOWS\system32\wucltui.dll.mui
2008-01-27 16:14 . 2007-07-30 19:19 25,944 --a------ C:\WINDOWS\system32\wuaucpl.cpl.mui
2008-01-27 16:14 . 2007-07-30 19:19 25,944 --a------ C:\WINDOWS\system32\wuapi.dll.mui
2008-01-27 16:14 . 2007-07-30 19:18 20,312 --a------ C:\WINDOWS\system32\wuaueng.dll.mui
2008-01-25 17:55 . 2008-01-25 17:55 <DIR> d-------- C:\Documents and Settings\All Users\Application Data\Avg7
2008-01-25 13:46 . 2008-01-28 17:04 512 --a------ C:\WINDOWS\wininit.ini
2008-01-25 01:54 . 2008-01-25 01:54 <DIR> d-------- C:\Documents and Settings\Administrator\Application Data\Grisoft
2008-01-25 01:54 . 2007-05-30 07:10 10,872 --a------ C:\WINDOWS\system32\drivers\AvgAsCln.sys
2008-01-24 19:03 . 2008-01-25 17:54 <DIR> d-------- C:\Documents and Settings\All Users\Application Data\Grisoft
2008-01-24 17:56 . 2007-01-18 07:00 3,968 --a------ C:\WINDOWS\system32\drivers\AvgArCln.sys
2008-01-24 14:59 . 2008-01-24 01:29 102,664 --a------ C:\WINDOWS\system32\drivers\tmcomm.sys
2008-01-24 14:01 . 2008-01-24 14:01 <DIR> d--h----- C:\Program Files\InstallShield Installation Information
2008-01-24 14:01 . 2008-01-24 14:02 <DIR> d-------- C:\Program Files\Dynex Wireless G Adapter
2008-01-24 14:01 . 2003-10-13 15:30 94,208 --a------ C:\WINDOWS\system32\GTW32N50.dll
2008-01-24 14:01 . 2004-04-30 15:12 40,960 --a------ C:\WINDOWS\system32\WGDTC.dll
2008-01-24 14:01 . 2003-09-25 23:28 31,930 --a------ C:\WINDOWS\system32\GTNDIS3.VXD
2008-01-24 14:01 . 2003-09-25 22:15 15,872 --a------ C:\WINDOWS\system32\GTNDIS5.sys
2008-01-24 14:01 . 2008-01-24 14:01 15,781 --a------ C:\WINDOWS\system32\drivers\mdc8021x.sys
2008-01-24 14:00 . 2008-01-24 14:01 <DIR> d-------- C:\Program Files\Common Files\InstallShield
2008-01-24 01:25 . 2008-01-24 15:00 <DIR> d-------- C:\Documents and Settings\Administrator\.housecall6.6
2008-01-13 13:35 . 2008-01-13 13:35 <DIR> d-------- C:\Program Files\Dot1XCfg
2008-01-02 17:39 . 2008-01-02 17:39 <DIR> d-------- C:\Documents and Settings\Administrator\Application Data\Smith Micro
2008-01-02 17:32 . 2008-01-02 17:32 <DIR> d-------- C:\Program Files\Verizon Wireless
2008-01-02 17:32 . 2008-01-02 17:32 <DIR> d-------- C:\Program Files\PANTECH
2008-01-02 17:32 . 2006-11-01 17:21 319,456 --a------ C:\WINDOWS\system32\DIFxAPI.dll
2008-01-02 17:32 . 2007-08-23 00:13 77,824 --a------ C:\WINDOWS\system32\ptdmwmcp.dll
2008-01-02 17:32 . 2007-08-17 20:56 59,520 --a------ C:\WINDOWS\system32\drivers\PTDMWWAN.sys
2008-01-02 17:32 . 2007-08-17 20:56 41,856 --a------ C:\WINDOWS\system32\drivers\PTDMMdm.sys
2008-01-02 17:32 . 2007-08-17 20:56 39,936 --a------ C:\WINDOWS\system32\drivers\PTDMVsp.sys
2008-01-02 17:32 . 2007-08-17 20:56 29,952 --a------ C:\WINDOWS\system32\drivers\PTDMBus.sys
.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2008-01-13 18:30 --------- d-----w C:\Program Files\CCleaner
2007-05-20 05:42 722,176 ----a-w C:\Documents and Settings\Administrator\gotomypc_428.exe
.
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"ctfmon.exe"="C:\WINDOWS\system32\ctfmon.exe" [2004-08-03 14:56 15360]
"Aim6"="C:\Program Files\AIM6\aim6.exe" [ ]
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"SunJavaUpdateSched"="C:\Program Files\Java\jre1.5.0_05\bin\jusched.exe" [ ]
"!AVG Anti-Spyware"="C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\avgas.exe" [2007-06-11 04:25 6731312]
"AVP"="C:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 6.0 SOS\avp.exe" [2007-11-19 14:40 231952]
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run]
"TaskSwitchXP"="C:\Program Files\TaskSwitchXP\TaskSwitchXP.exe" [2005-08-24 14:11 61952]
"Free Download Manager"="C:\Program Files\Free Download Manager\fdm.exe" [ ]
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\RunOnce]
"nlsf"="cmd.exe" [2004-08-03 14:56 388608 C:\WINDOWS\system32\cmd.exe]
"nlhr"="C:\WINDOWS\System32\AdvPack.Dll" [2004-08-03 14:56 99840]
"tscuninstall"="C:\WINDOWS\system32\tscupgrd.exe" [2004-08-03 12:59 44544]
C:\Documents and Settings\All Users\Start Menu\Programs\Startup\
Intellex Event Handler.lnk - C:\Program Files\Sensormatic\NetworkClient\Bin\NtlxEventhandler.exe [2005-12-15 13:16:12 770048]
[HKEY_CURRENT_USER\software\microsoft\windows\currentversion\policies\system]
"DisableRegistryTools"= 0 (0x0)
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\explorer]
"NoDesktopCleanupWizard"= 1 (0x1)
"ForceClassicControlPanel"= 1 (0x1)
[HKEY_CURRENT_USER\software\microsoft\windows\currentversion\policies\explorer]
"NoInstrumentation"= 1 (0x1)
"NoSMHelp"= 1 (0x1)
[HKEY_USERS\.default\software\microsoft\windows\currentversion\policies\explorer]
"NoInstrumentation"= 1 (0x1)
"NoSMHelp"= 1 (0x1)
R2 Dynex DX-WGDTC WLService;Dynex DX-WGDTC Service;C:\Program Files\Dynex Wireless G Adapter\WLService.exe [2004-03-29 16:08]
R2 NwSapAgent;SAP Agent;C:\WINDOWS\system32\svchost.exe [2004-08-03 14:56]
R3 PTDMBus;PANTECH USB Modem Composite Device Driver ;C:\WINDOWS\system32\DRIVERS\PTDMBus.sys [2007-08-17 20:56]
R3 PTDMMdm;PANTECH USB Modem Drivers ;C:\WINDOWS\system32\DRIVERS\PTDMMdm.sys [2007-08-17 20:56]
R3 PTDMVsp;PANTECH USB Modem Serial Port ;C:\WINDOWS\system32\DRIVERS\PTDMVsp.sys [2007-08-17 20:56]
R3 PTDMWWAN;PANTECH USB Modem WWAN Driver;C:\WINDOWS\system32\DRIVERS\PTDMWWAN.sys [2007-08-17 20:56]
*Newly Created Service* - GTNDIS5
.
**************************************************************************
catchme 0.3.1344 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2008-01-30 15:17:38
Windows 5.1.2600 Service Pack 2 NTFS
scanning hidden processes ...
scanning hidden autostart entries ...
scanning hidden files ...
scan completed successfully
hidden files: 0
**************************************************************************
.
------------------------ Other Running Processes ------------------------
.
C:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 6.0 SOS\avp.exe
C:\Program Files\Dynex Wireless G Adapter\WLService.exe
C:\Program Files\Dynex Wireless G Adapter\WLanCfgG.exe
C:\Program Files\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE
C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\avgas.exe
C:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 6.0 SOS\avp.exe
C:\Program Files\Sensormatic\NetworkClient\Bin\NtlxEventhandler.exe
.
**************************************************************************
.
Completion time: 2008-01-30 15:23:41 - machine was rebooted
ComboFix-quarantined-files.txt 2008-01-30 20:23:34
ComboFix2.txt 2008-01-30 17:28:08
.
2008-01-28 07:06:04 --- E O F ---
illumn8r
2008-01-30, 22:31
Below:
Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 3:25:55 PM, on 1/30/2008
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)
Boot mode: Normal
Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\guard.exe
C:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 6.0 SOS\avp.exe
C:\Program Files\Dynex Wireless G Adapter\WLService.exe
C:\Program Files\Dynex Wireless G Adapter\WLanCfgG.exe
C:\Program Files\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE
C:\WINDOWS\system32\svchost.exe
C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\avgas.exe
C:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 6.0 SOS\avp.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Sensormatic\NetworkClient\Bin\NtlxEventhandler.exe
C:\WINDOWS\system32\wuauclt.exe
C:\WINDOWS\system32\notepad.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\Trend Micro\HijackThis\illumn8r.exe
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page =
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Local Page =
R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName =
O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 7.0\ActiveX\AcroIEHelper.dll
O2 - BHO: Spybot-S&D IE Protection - {53707962-6F74-2D53-2644-206D7942484F} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O4 - HKLM\..\Run: [SunJavaUpdateSched] C:\Program Files\Java\jre1.5.0_05\bin\jusched.exe
O4 - HKLM\..\Run: [!AVG Anti-Spyware] "C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\avgas.exe" /minimized
O4 - HKLM\..\Run: [AVP] "C:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 6.0 SOS\avp.exe"
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
O4 - HKCU\..\Run: [Aim6] "C:\Program Files\AIM6\aim6.exe" /d locale=en-US ee://aol/imApp
O4 - HKUS\S-1-5-19\..\Run: [TaskSwitchXP] C:\Program Files\TaskSwitchXP\TaskSwitchXP.exe (User 'LOCAL SERVICE')
O4 - HKUS\S-1-5-19\..\Run: [Free Download Manager] C:\Program Files\Free Download Manager\fdm.exe -autorun (User 'LOCAL SERVICE')
O4 - HKUS\S-1-5-19\..\RunOnce: [nlsf] cmd.exe /C move /Y "%SystemRoot%\System32\syssetub.dll" "%SystemRoot%\System32\syssetup.dll" (User 'LOCAL SERVICE')
O4 - HKUS\S-1-5-20\..\Run: [TaskSwitchXP] C:\Program Files\TaskSwitchXP\TaskSwitchXP.exe (User 'NETWORK SERVICE')
O4 - HKUS\S-1-5-20\..\RunOnce: [nlsf] cmd.exe /C move /Y "%SystemRoot%\System32\syssetub.dll" "%SystemRoot%\System32\syssetup.dll" (User 'NETWORK SERVICE')
O4 - HKUS\S-1-5-18\..\Run: [TaskSwitchXP] C:\Program Files\TaskSwitchXP\TaskSwitchXP.exe (User 'SYSTEM')
O4 - HKUS\S-1-5-18\..\RunOnce: [nlsf] cmd.exe /C move /Y "%SystemRoot%\System32\syssetub.dll" "%SystemRoot%\System32\syssetup.dll" (User 'SYSTEM')
O4 - HKUS\.DEFAULT\..\Run: [TaskSwitchXP] C:\Program Files\TaskSwitchXP\TaskSwitchXP.exe (User 'Default user')
O4 - HKUS\.DEFAULT\..\RunOnce: [nlsf] cmd.exe /C move /Y "%SystemRoot%\System32\syssetub.dll" "%SystemRoot%\System32\syssetup.dll" (User 'Default user')
O4 - Startup: Adobe Gamma.lnk = C:\Program Files\Common Files\Adobe\Calibration\Adobe Gamma Loader.exe
O4 - Global Startup: Intellex Event Handler.lnk = C:\Program Files\Sensormatic\NetworkClient\Bin\NtlxEventhandler.exe
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~1\OFFICE11\EXCEL.EXE/3000
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_05\bin\npjpi150_05.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_05\bin\npjpi150_05.dll
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~1\OFFICE11\REFIEBAR.DLL
O9 - Extra button: (no name) - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O9 - Extra 'Tools' menuitem: Spybot - Search & Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O10 - Unknown file in Winsock LSP: c:\windows\system32\nwprovau.dll
O16 - DPF: {0EB0E74A-2A76-4AB3-A7FB-9BD8C29F7F75} (CKAVWebScan Object) - http://www.kaspersky.com/kos/english/kavwebscan_unicode.cab
O23 - Service: Adobe LM Service - Adobe Systems - C:\Program Files\Common Files\Adobe Systems Shared\Service\Adobelmsvc.exe
O23 - Service: AVG Anti-Spyware Guard - GRISOFT s.r.o. - C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\guard.exe
O23 - Service: Kaspersky Anti-Virus 6.0 (AVP) - Kaspersky Lab - C:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 6.0 SOS\avp.exe
O23 - Service: Indexing Service (CiSvc) - Unknown owner - C:\WINDOWS\system32\cisvc.exe (file missing)
O23 - Service: Dynex DX-WGDTC Service (Dynex DX-WGDTC WLService) - Unknown owner - C:\Program Files\Dynex Wireless G Adapter\WLService.exe
--
End of file - 5100 bytes
Hi
Please do an online scan with Kaspersky Online Scanner (http://www.kaspersky.com/downloads/kws/kavwebscan.html). You will be prompted to install an ActiveX component from Kaspersky, Click Yes.
The program will launch and then start to download the latest definition files.
Once the scanner is installed and the definitions downloaded, click Next.
Now click on Scan Settings
In the scan settings make sure that the following are selected:
o Scan using the following Anti-Virus database:
+ Extended (If available otherwise Standard)
o Scan Options:
+ Scan Archives
+ Scan Mail Bases
Click OK
Now under select a target to scan select My Computer
The scan will take a while so be patient and let it run. Once the scan is complete it will display if your system has been infected.
Now click on the Save as Text button
Save the file to your desktop.
Copy and paste that information in your next post.
Note: This scanner will work with Internet Explorer Only!
Note for Internet Explorer 7 users: If at any time you have trouble with the accept button of the license, click on the Zoom tool located at the right bottom of the IE window and set the zoom to 75 %. Once the license accepted, reset to 100%.
Post:
- a fresh HijackThis log
- kaspersky report
illumn8r
2008-01-31, 21:17
Here's the Kaspersky Report in 2 parts, new HijackThis log to follow
-------------------------------------------------------------------------------
KASPERSKY ONLINE SCANNER REPORT
Thursday, January 31, 2008 2:11:44 PM
Operating System: Microsoft Windows XP Professional, Service Pack 2 (Build 2600)
Kaspersky Online Scanner version: 5.0.98.0
Kaspersky Anti-Virus database last update: 31/01/2008
Kaspersky Anti-Virus database records: 540538
-------------------------------------------------------------------------------
Scan Settings:
Scan using the following antivirus database: extended
Scan Archives: true
Scan Mail Bases: true
Scan Target - My Computer:
A:\
C:\
D:\
F:\
Scan Statistics:
Total number of scanned objects: 45241
Number of viruses found: 39
Number of infected objects: 107
Number of suspicious objects: 2
Duration of the scan process: 01:49:35
Infected Object Name / Virus Name / Last Action
C:\Documents and Settings\Administrator\.housecall6.6\Quarantine\A0005676.dll.bac_a01368 Infected: not-a-virus:AdWare.Win32.Virtumonde.ckk skipped
C:\Documents and Settings\Administrator\.housecall6.6\Quarantine\A0011647.dll.bac_a01368 Infected: not-a-virus:AdWare.Win32.Virtumonde.ady skipped
C:\Documents and Settings\Administrator\.housecall6.6\Quarantine\A0012780.dll.bac_a01368 Infected: not-a-virus:AdWare.Win32.Virtumonde.aps skipped
C:\Documents and Settings\Administrator\.housecall6.6\Quarantine\A0013068.exe.bac_a01368 Infected: Trojan-Downloader.Win32.VB.caw skipped
C:\Documents and Settings\Administrator\.housecall6.6\Quarantine\A0013069.exe.bac_a01368/data0001 Infected: not-a-virus:AdWare.Win32.PurityScan.gp skipped
C:\Documents and Settings\Administrator\.housecall6.6\Quarantine\A0013069.exe.bac_a01368 NSIS: infected - 1 skipped
C:\Documents and Settings\Administrator\.housecall6.6\Quarantine\A0013069.exe.bac_a01368 CryptFF.b: infected - 1 skipped
C:\Documents and Settings\Administrator\.housecall6.6\Quarantine\A0013070.exe.bac_a01368 Infected: Trojan-Downloader.Win32.PurityScan.ez skipped
C:\Documents and Settings\Administrator\.housecall6.6\Quarantine\A0013071.exe.bac_a01368 Infected: Trojan-Downloader.Win32.Agent.gwh skipped
C:\Documents and Settings\Administrator\.housecall6.6\Quarantine\A0013072.dll.bac_a01368 Infected: not-a-virus:AdWare.Win32.PurityScan.gl skipped
C:\Documents and Settings\Administrator\.housecall6.6\Quarantine\A0013073.exe.bac_a01368 Infected: not-a-virus:AdWare.Win32.PurityScan.gq skipped
C:\Documents and Settings\Administrator\.housecall6.6\Quarantine\A0013078.exe.bac_a01368 Infected: Trojan-Downloader.Win32.Agent.hql skipped
C:\Documents and Settings\Administrator\.housecall6.6\Quarantine\A0013261.dll.bac_a01368 Infected: not-a-virus:AdWare.Win32.PurityScan.gt skipped
C:\Documents and Settings\Administrator\.housecall6.6\Quarantine\altqmfqj.exe.bac_a01368 Infected: Trojan.Win32.Obfuscated.kp skipped
C:\Documents and Settings\Administrator\.housecall6.6\Quarantine\atuetmxg.exe.bac_a01368 Infected: Trojan-Downloader.Win32.Agent.gwe skipped
C:\Documents and Settings\Administrator\.housecall6.6\Quarantine\b122.exe.bac_a01368 Infected: Trojan-Downloader.Win32.Agent.haq skipped
C:\Documents and Settings\Administrator\.housecall6.6\Quarantine\b138.exe.bac_a01368 Infected: Trojan-Downloader.Win32.Agent.cbx skipped
C:\Documents and Settings\Administrator\.housecall6.6\Quarantine\b151.exe.bac_a01368 Infected: Trojan-Downloader.Win32.Agent.fjn skipped
C:\Documents and Settings\Administrator\.housecall6.6\Quarantine\bckvjvfg.dll.bac_a01368 Infected: not-a-virus:AdWare.Win32.Virtumonde.ace skipped
C:\Documents and Settings\Administrator\.housecall6.6\Quarantine\djibxflr.exe.bac_a01368 Infected: Trojan-Downloader.Win32.Agent.gwe skipped
C:\Documents and Settings\Administrator\.housecall6.6\Quarantine\Dot1XCfg.exe.bac_a01368 Infected: Trojan-Downloader.Win32.Adload.pr skipped
C:\Documents and Settings\Administrator\.housecall6.6\Quarantine\dykqupqa.exe.bac_a01368 Infected: Trojan.Win32.Agent.bck skipped
C:\Documents and Settings\Administrator\.housecall6.6\Quarantine\edcA011065.exe.bac_a01368 Infected: Trojan-Downloader.Win32.VB.caw skipped
C:\Documents and Settings\Administrator\.housecall6.6\Quarantine\engsejep.0xe.bac_a01368 Infected: Trojan.Win32.Agent.bck skipped
C:\Documents and Settings\Administrator\.housecall6.6\Quarantine\ErrorSafeFreeInstallW[1].cab.bac_a01368/UERS_9999_N91S1502NetInstaller.exe Infected: not-a-virus:Downloader.Win32.WinFixer.o skipped
C:\Documents and Settings\Administrator\.housecall6.6\Quarantine\ErrorSafeFreeInstallW[1].cab.bac_a01368 CAB: infected - 1 skipped
C:\Documents and Settings\Administrator\.housecall6.6\Quarantine\ErrorSafeFreeInstallW[1].cab.bac_a01368 CryptFF.b: infected - 1 skipped
C:\Documents and Settings\Administrator\.housecall6.6\Quarantine\furlmkek.dll.bac_a01368 Infected: not-a-virus:AdWare.Win32.Virtumonde.aps skipped
C:\Documents and Settings\Administrator\.housecall6.6\Quarantine\gamadril20071203[1].bac_a01368 Infected: Backdoor.Win32.Agent.dbm skipped
C:\Documents and Settings\Administrator\.housecall6.6\Quarantine\hooptsdq.exe.bac_a01368 Infected: Trojan.Win32.Obfuscated.kp skipped
C:\Documents and Settings\Administrator\.housecall6.6\Quarantine\ilevkwkw.exe.bac_a01368 Infected: Trojan-Downloader.Win32.Agent.gwe skipped
C:\Documents and Settings\Administrator\.housecall6.6\Quarantine\itorodcd.exe.bac_a01368 Infected: Trojan.Win32.Obfuscated.kp skipped
C:\Documents and Settings\Administrator\.housecall6.6\Quarantine\jgjkdvad.dll.bac_a01368 Infected: not-a-virus:AdWare.Win32.Virtumonde.aps skipped
C:\Documents and Settings\Administrator\.housecall6.6\Quarantine\lhqkqbki.exe.bac_a01368 Infected: Trojan-Downloader.Win32.Agent.gwe skipped
C:\Documents and Settings\Administrator\.housecall6.6\Quarantine\mewof83122.dll.bac_a01368 Infected: not-a-virus:AdWare.Win32.TTC.a skipped
C:\Documents and Settings\Administrator\.housecall6.6\Quarantine\mrofinu1000106.exe.bac_a01368 Infected: Trojan-Downloader.Win32.Agent.gwh skipped
C:\Documents and Settings\Administrator\.housecall6.6\Quarantine\mrofinu572.exe.bac_a01368 Infected: Trojan-Downloader.Win32.Agent.hql skipped
C:\Documents and Settings\Administrator\.housecall6.6\Quarantine\mxqfr.dll.bac_a01368 Infected: not-a-virus:AdWare.Win32.PurityScan.gt skipped
C:\Documents and Settings\Administrator\.housecall6.6\Quarantine\oedvers112.exe.bac_a01368 Infected: Trojan-Downloader.Win32.Small.buy skipped
C:\Documents and Settings\Administrator\.housecall6.6\Quarantine\plhggtgl.exe.bac_a01368 Infected: Trojan-Downloader.Win32.Agent.gwe skipped
C:\Documents and Settings\Administrator\.housecall6.6\Quarantine\qiapwumu.exe.bac_a01368 Infected: Trojan-Downloader.Win32.Agent.gwe skipped
C:\Documents and Settings\Administrator\.housecall6.6\Quarantine\rfawmmhv.exe.bac_a01368 Infected: Trojan.Win32.Agent.bck skipped
C:\Documents and Settings\Administrator\.housecall6.6\Quarantine\Router.exe.bac_a01368 Infected: Trojan-Downloader.Win32.Agent.gdi skipped
C:\Documents and Settings\Administrator\.housecall6.6\Quarantine\uqgxlxor.exe.bac_a01368 Infected: Trojan.Win32.Obfuscated.kp skipped
C:\Documents and Settings\Administrator\.housecall6.6\Quarantine\vdokbcqy.exe.bac_a01368 Infected: Trojan-Downloader.Win32.Agent.gwe skipped
C:\Documents and Settings\Administrator\.housecall6.6\Quarantine\vejwsoyr.exe.bac_a01368 Infected: Trojan.Win32.Obfuscated.kp skipped
C:\Documents and Settings\Administrator\.housecall6.6\Quarantine\vsdhbgha.exe.bac_a01368 Infected: Trojan.Win32.Obfuscated.kp skipped
C:\Documents and Settings\Administrator\.housecall6.6\Quarantine\vxatqrnl.exe.bac_a01368 Infected: Trojan.Win32.Obfuscated.kp skipped
C:\Documents and Settings\Administrator\.housecall6.6\Quarantine\wihtfoqg.exe.bac_a01368 Infected: Trojan.Win32.Obfuscated.kp skipped
C:\Documents and Settings\Administrator\.housecall6.6\Quarantine\xiraogpr.exe.bac_a01368 Infected: Trojan.Win32.Obfuscated.kp skipped
C:\Documents and Settings\Administrator\.housecall6.6\Quarantine\xnqupbmj.exe.bac_a01368 Infected: Trojan-Downloader.Win32.Agent.gwe skipped
C:\Documents and Settings\Administrator\.housecall6.6\Quarantine\xrmpshmr.exe.bac_a01368 Infected: Trojan.Win32.Obfuscated.kp skipped
C:\Documents and Settings\Administrator\.housecall6.6\Quarantine\xtnxnnvt.exe.bac_a01368 Infected: Trojan.Win32.Obfuscated.kp skipped
C:\Documents and Settings\Administrator\.housecall6.6\Quarantine\yazzsnet.exe.bac_a01368/data0003 Infected: Trojan-Downloader.Win32.PurityScan.fg skipped
C:\Documents and Settings\Administrator\.housecall6.6\Quarantine\yazzsnet.exe.bac_a01368 NSIS: infected - 1 skipped
C:\Documents and Settings\Administrator\.housecall6.6\Quarantine\yazzsnet.exe.bac_a01368 CryptFF.b: infected - 1 skipped
C:\Documents and Settings\Administrator\.housecall6.6\Quarantine\yrqoeani.exe.bac_a01368 Infected: Trojan-Downloader.Win32.Agent.gwe skipped
C:\Documents and Settings\Administrator\Application Data\Mozilla\Firefox\Profiles\390u6t72.default\cert8.db Object is locked skipped
C:\Documents and Settings\Administrator\Application Data\Mozilla\Firefox\Profiles\390u6t72.default\history.dat Object is locked skipped
C:\Documents and Settings\Administrator\Application Data\Mozilla\Firefox\Profiles\390u6t72.default\key3.db Object is locked skipped
C:\Documents and Settings\Administrator\Application Data\Mozilla\Firefox\Profiles\390u6t72.default\parent.lock Object is locked skipped
C:\Documents and Settings\Administrator\Application Data\Mozilla\Firefox\Profiles\390u6t72.default\search.sqlite Object is locked skipped
C:\Documents and Settings\Administrator\Application Data\Mozilla\Firefox\Profiles\390u6t72.default\urlclassifier2.sqlite Object is locked skipped
C:\Documents and Settings\Administrator\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\jvmimpro.jar-3ad601a5-53c65803.zip/vmain.class Infected: Exploit.Java.Gimsh.b skipped
C:\Documents and Settings\Administrator\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\jvmimpro.jar-3ad601a5-53c65803.zip ZIP: infected - 1 skipped
C:\Documents and Settings\Administrator\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\jvmimpro.jar-6b13a7e7-5aa8796c.zip/vmain.class Infected: Exploit.Java.Gimsh.b skipped
C:\Documents and Settings\Administrator\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\jvmimpro.jar-6b13a7e7-5aa8796c.zip ZIP: infected - 1 skipped
C:\Documents and Settings\Administrator\Cookies\index.dat Object is locked skipped
C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Feeds Cache\index.dat Object is locked skipped
C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat Object is locked skipped
C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat.LOG Object is locked skipped
C:\Documents and Settings\Administrator\Local Settings\Application Data\Mozilla\Firefox\Profiles\390u6t72.default\Cache\_CACHE_001_ Object is locked skipped
C:\Documents and Settings\Administrator\Local Settings\Application Data\Mozilla\Firefox\Profiles\390u6t72.default\Cache\_CACHE_002_ Object is locked skipped
C:\Documents and Settings\Administrator\Local Settings\Application Data\Mozilla\Firefox\Profiles\390u6t72.default\Cache\_CACHE_003_ Object is locked skipped
C:\Documents and Settings\Administrator\Local Settings\Application Data\Mozilla\Firefox\Profiles\390u6t72.default\Cache\_CACHE_MAP_ Object is locked skipped
C:\Documents and Settings\Administrator\Local Settings\History\History.IE5\index.dat Object is locked skipped
C:\Documents and Settings\Administrator\Local Settings\History\History.IE5\MSHist012008013120080201\index.dat Object is locked skipped
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\AntiPhishing\B3BB5BBA-E7D5-40AB-A041-A5B1C0B26C8F.dat Object is locked skipped
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\index.dat Object is locked skipped
C:\Documents and Settings\Administrator\NTUSER.DAT Object is locked skipped
C:\Documents and Settings\Administrator\ntuser.dat.LOG Object is locked skipped
C:\Documents and Settings\All Users\Application Data\Kaspersky Lab\AVP6\Report\detected.idx Object is locked skipped
C:\Documents and Settings\All Users\Application Data\Kaspersky Lab\AVP6\Report\detected.rpt Object is locked skipped
C:\Documents and Settings\All Users\Application Data\Kaspersky Lab\AVP6\Report\eventlog.rpt Object is locked skipped
C:\Documents and Settings\All Users\Application Data\Kaspersky Lab\AVP6\Report\report.rpt Object is locked skipped
C:\Documents and Settings\All Users\Application Data\Microsoft\Network\Downloader\qmgr0.dat Object is locked skipped
C:\Documents and Settings\All Users\Application Data\Microsoft\Network\Downloader\qmgr1.dat Object is locked skipped
C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy\Recovery\WebBuyingAssistant.zip/v1.8.6/wbuninst.exe Suspicious: Password-protected-EXE skipped
C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy\Recovery\WebBuyingAssistant.zip ZIP: suspicious - 1 skipped
C:\Documents and Settings\LocalService\Cookies\index.dat Object is locked skipped
C:\Documents and Settings\LocalService\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat Object is locked skipped
C:\Documents and Settings\LocalService\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat.LOG Object is locked skipped
C:\Documents and Settings\LocalService\Local Settings\History\History.IE5\index.dat Object is locked skipped
C:\Documents and Settings\LocalService\Local Settings\Temporary Internet Files\Content.IE5\index.dat Object is locked skipped
C:\Documents and Settings\LocalService\NTUSER.DAT Object is locked skipped
C:\Documents and Settings\LocalService\ntuser.dat.LOG Object is locked skipped
C:\Documents and Settings\NetworkService\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat Object is locked skipped
C:\Documents and Settings\NetworkService\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat.LOG Object is locked skipped
C:\Documents and Settings\NetworkService\NTUSER.DAT Object is locked skipped
C:\Documents and Settings\NetworkService\ntuser.dat.LOG Object is locked skipped
C:\Program Files\Sensormatic\NetworkClient\Bin\EventInstr.Dat Object is locked skipped
C:\QooBox\Quarantine\C\Program Files\Router\UnInstall.exe.vir Infected: Trojan-Downloader.Win32.Delf.dlk skipped
C:\QooBox\Quarantine\C\Program Files\Windows NT\rteremeg.html.vir Infected: Trojan-Clicker.HTML.IFrame.dn skipped
C:\QooBox\Quarantine\C\WINDOWS\system32\fcccyxw.dll.vir Infected: not-a-virus:AdWare.Win32.Virtumonde.dlm skipped
C:\QooBox\Quarantine\C\WINDOWS\system32\MBOLS~1\regedit.exe.vir Infected: Trojan-Downloader.Win32.PurityScan.fk skipped
C:\QooBox\Quarantine\C\WINDOWS\system32\unvxw.dll.vir Infected: not-a-virus:AdWare.Win32.PurityScan.gv skipped
C:\QooBox\Quarantine\C\WINDOWS\system32\xxyvsrs.dll.vir Infected: not-a-virus:AdWare.Win32.Virtumonde.dlm skipped
C:\QooBox\Quarantine\catchme2008-01-30_122038.17.zip/ssqonkk.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.dlm skipped
C:\QooBox\Quarantine\catchme2008-01-30_122038.17.zip ZIP: infected - 1 skipped
C:\QooBox\Quarantine\catchme2008-01-30_151657.35.zip/rdpdrr.sys Infected: Rootkit.Win32.Agent.to skipped
C:\QooBox\Quarantine\catchme2008-01-30_151657.35.zip ZIP: infected - 1 skipped
illumn8r
2008-01-31, 21:17
C:\System Volume Information\_restore{BE50064A-1B33-4A3A-914E-E02022F3DE80}\RP17\A0010536.exe Infected: Trojan-Clicker.Win32.Delf.ln skipped
C:\System Volume Information\_restore{BE50064A-1B33-4A3A-914E-E02022F3DE80}\RP21\A0013077.dll Infected: not-a-virus:AdWare.Win32.ZenoSearch.ad skipped
C:\System Volume Information\_restore{BE50064A-1B33-4A3A-914E-E02022F3DE80}\RP21\A0013252.exe Infected: not-a-virus:AdWare.Win32.PurityScan.gs skipped
C:\System Volume Information\_restore{BE50064A-1B33-4A3A-914E-E02022F3DE80}\RP21\A0013256.dll Infected: not-a-virus:AdWare.Win32.ZenoSearch.ad skipped
C:\System Volume Information\_restore{BE50064A-1B33-4A3A-914E-E02022F3DE80}\RP21\A0014291.exe Infected: Trojan-Downloader.Win32.VB.caw skipped
C:\System Volume Information\_restore{BE50064A-1B33-4A3A-914E-E02022F3DE80}\RP21\A0014294.dll Infected: not-a-virus:AdWare.Win32.PurityScan.gt skipped
C:\System Volume Information\_restore{BE50064A-1B33-4A3A-914E-E02022F3DE80}\RP21\A0014312.exe Infected: Trojan-Downloader.Win32.Agent.gwh skipped
C:\System Volume Information\_restore{BE50064A-1B33-4A3A-914E-E02022F3DE80}\RP21\A0014313.exe Infected: Trojan-Downloader.Win32.Agent.hql skipped
C:\System Volume Information\_restore{BE50064A-1B33-4A3A-914E-E02022F3DE80}\RP21\A0014315.exe Infected: Trojan-Downloader.Win32.Adload.pr skipped
C:\System Volume Information\_restore{BE50064A-1B33-4A3A-914E-E02022F3DE80}\RP21\A0014316.exe Infected: Trojan.Win32.Agent.bck skipped
C:\System Volume Information\_restore{BE50064A-1B33-4A3A-914E-E02022F3DE80}\RP21\A0014317.exe Infected: Trojan.Win32.Agent.bck skipped
C:\System Volume Information\_restore{BE50064A-1B33-4A3A-914E-E02022F3DE80}\RP21\A0014318.exe Infected: Trojan-Downloader.Win32.Agent.gwe skipped
C:\System Volume Information\_restore{BE50064A-1B33-4A3A-914E-E02022F3DE80}\RP21\A0014319.exe Infected: Trojan-Downloader.Win32.Agent.gwe skipped
C:\System Volume Information\_restore{BE50064A-1B33-4A3A-914E-E02022F3DE80}\RP21\A0014320.exe Infected: Trojan-Downloader.Win32.Agent.gwe skipped
C:\System Volume Information\_restore{BE50064A-1B33-4A3A-914E-E02022F3DE80}\RP21\A0014321.exe Infected: Trojan-Downloader.Win32.Agent.gwe skipped
C:\System Volume Information\_restore{BE50064A-1B33-4A3A-914E-E02022F3DE80}\RP21\A0014322.exe Infected: Trojan-Downloader.Win32.Agent.gwe skipped
C:\System Volume Information\_restore{BE50064A-1B33-4A3A-914E-E02022F3DE80}\RP21\A0014323.exe Infected: Trojan-Downloader.Win32.Agent.gwe skipped
C:\System Volume Information\_restore{BE50064A-1B33-4A3A-914E-E02022F3DE80}\RP21\A0014324.exe Infected: Trojan-Downloader.Win32.Agent.gwe skipped
C:\System Volume Information\_restore{BE50064A-1B33-4A3A-914E-E02022F3DE80}\RP21\A0014325.exe Infected: Trojan-Downloader.Win32.Agent.gwe skipped
C:\System Volume Information\_restore{BE50064A-1B33-4A3A-914E-E02022F3DE80}\RP21\A0015276.dll Infected: not-a-virus:AdWare.Win32.Agent.wx skipped
C:\System Volume Information\_restore{BE50064A-1B33-4A3A-914E-E02022F3DE80}\RP24\A0015292.exe Infected: Trojan-Clicker.Win32.Delf.mj skipped
C:\System Volume Information\_restore{BE50064A-1B33-4A3A-914E-E02022F3DE80}\RP26\A0024411.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.ash skipped
C:\System Volume Information\_restore{BE50064A-1B33-4A3A-914E-E02022F3DE80}\RP27\A0026606.exe Infected: Trojan-Downloader.Win32.PurityScan.ez skipped
C:\System Volume Information\_restore{BE50064A-1B33-4A3A-914E-E02022F3DE80}\RP27\A0026607.exe Infected: Trojan-Clicker.Win32.Delf.mj skipped
C:\System Volume Information\_restore{BE50064A-1B33-4A3A-914E-E02022F3DE80}\RP28\A0027032.dll Infected: not-a-virus:AdWare.Win32.ZenoSearch.ad skipped
C:\System Volume Information\_restore{BE50064A-1B33-4A3A-914E-E02022F3DE80}\RP29\A0027060.exe Infected: not-a-virus:AdWare.Win32.PurityScan.gs skipped
C:\System Volume Information\_restore{BE50064A-1B33-4A3A-914E-E02022F3DE80}\RP29\A0027071.exe Infected: not-a-virus:AdWare.Win32.PurityScan.gs skipped
C:\System Volume Information\_restore{BE50064A-1B33-4A3A-914E-E02022F3DE80}\RP29\A0027135.dll Infected: not-a-virus:AdWare.Win32.ZenoSearch.ad skipped
C:\System Volume Information\_restore{BE50064A-1B33-4A3A-914E-E02022F3DE80}\RP29\A0027155.exe Infected: Trojan-Downloader.Win32.PurityScan.fk skipped
C:\System Volume Information\_restore{BE50064A-1B33-4A3A-914E-E02022F3DE80}\RP31\A0027205.dll Infected: not-a-virus:AdWare.Win32.PurityScan.gv skipped
C:\System Volume Information\_restore{BE50064A-1B33-4A3A-914E-E02022F3DE80}\RP31\A0027207.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.dlm skipped
C:\System Volume Information\_restore{BE50064A-1B33-4A3A-914E-E02022F3DE80}\RP31\A0027218.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.dlm skipped
C:\System Volume Information\_restore{BE50064A-1B33-4A3A-914E-E02022F3DE80}\RP31\A0027246.exe Infected: Trojan-Downloader.Win32.Delf.dlk skipped
C:\System Volume Information\_restore{BE50064A-1B33-4A3A-914E-E02022F3DE80}\RP31\A0027247.exe Infected: Trojan-Downloader.Win32.PurityScan.fk skipped
C:\System Volume Information\_restore{BE50064A-1B33-4A3A-914E-E02022F3DE80}\RP31\A0027279.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.dlm skipped
C:\System Volume Information\_restore{BE50064A-1B33-4A3A-914E-E02022F3DE80}\RP33\change.log Object is locked skipped
C:\WINDOWS\Debug\PASSWD.LOG Object is locked skipped
C:\WINDOWS\ModemLog_PANTECH USB Modem .txt Object is locked skipped
C:\WINDOWS\SchedLgU.Txt Object is locked skipped
C:\WINDOWS\SoftwareDistribution\EventCache\{7A403015-412B-4E7A-97C4-E23C35FC42CD}.bin Object is locked skipped
C:\WINDOWS\SoftwareDistribution\ReportingEvents.log Object is locked skipped
C:\WINDOWS\Sti_Trace.log Object is locked skipped
C:\WINDOWS\sv3965\svchost.exe Infected: Trojan-Clicker.Win32.Delf.ln skipped
C:\WINDOWS\system32\CatRoot2\edb.log Object is locked skipped
C:\WINDOWS\system32\CatRoot2\tmp.edb Object is locked skipped
C:\WINDOWS\system32\config\AppEvent.Evt Object is locked skipped
C:\WINDOWS\system32\config\default Object is locked skipped
C:\WINDOWS\system32\config\default.LOG Object is locked skipped
C:\WINDOWS\system32\config\Internet.evt Object is locked skipped
C:\WINDOWS\system32\config\SAM Object is locked skipped
C:\WINDOWS\system32\config\SAM.LOG Object is locked skipped
C:\WINDOWS\system32\config\SecEvent.Evt Object is locked skipped
C:\WINDOWS\system32\config\SECURITY Object is locked skipped
C:\WINDOWS\system32\config\SECURITY.LOG Object is locked skipped
C:\WINDOWS\system32\config\software Object is locked skipped
C:\WINDOWS\system32\config\software.LOG Object is locked skipped
C:\WINDOWS\system32\config\SysEvent.Evt Object is locked skipped
C:\WINDOWS\system32\config\system Object is locked skipped
C:\WINDOWS\system32\config\system.LOG Object is locked skipped
C:\WINDOWS\system32\drivers\fidbox.dat Object is locked skipped
C:\WINDOWS\system32\drivers\fidbox.idx Object is locked skipped
C:\WINDOWS\system32\drivers\fidbox2.dat Object is locked skipped
C:\WINDOWS\system32\drivers\fidbox2.idx Object is locked skipped
C:\WINDOWS\system32\h323log.txt Object is locked skipped
C:\WINDOWS\system32\wbem\Repository\FS\INDEX.BTR Object is locked skipped
C:\WINDOWS\system32\wbem\Repository\FS\INDEX.MAP Object is locked skipped
C:\WINDOWS\system32\wbem\Repository\FS\MAPPING.VER Object is locked skipped
C:\WINDOWS\system32\wbem\Repository\FS\MAPPING1.MAP Object is locked skipped
C:\WINDOWS\system32\wbem\Repository\FS\MAPPING2.MAP Object is locked skipped
C:\WINDOWS\system32\wbem\Repository\FS\OBJECTS.DATA Object is locked skipped
C:\WINDOWS\system32\wbem\Repository\FS\OBJECTS.MAP Object is locked skipped
C:\WINDOWS\wiadebug.log Object is locked skipped
C:\WINDOWS\wiaservc.log Object is locked skipped
C:\WINDOWS\WindowsUpdate.log Object is locked skipped
Scan process completed.
illumn8r
2008-01-31, 21:19
Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 2:12:38 PM, on 1/31/2008
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v7.00 (7.00.6000.16574)
Boot mode: Normal
Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\guard.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 6.0 SOS\avp.exe
C:\Program Files\Dynex Wireless G Adapter\WLService.exe
C:\Program Files\Dynex Wireless G Adapter\WLanCfgG.exe
C:\Program Files\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE
C:\WINDOWS\system32\svchost.exe
C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\avgas.exe
C:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 6.0 SOS\avp.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Sensormatic\NetworkClient\Bin\NtlxEventhandler.exe
C:\WINDOWS\system32\WgaTray.exe
C:\Program Files\Verizon Wireless\VZAccess Manager\VZAccess Manager.exe
C:\Program Files\Mozilla Firefox\firefox.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\Trend Micro\HijackThis\illumn8r.exe
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 7.0\ActiveX\AcroIEHelper.dll
O2 - BHO: Spybot-S&D IE Protection - {53707962-6F74-2D53-2644-206D7942484F} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O4 - HKLM\..\Run: [SunJavaUpdateSched] C:\Program Files\Java\jre1.5.0_05\bin\jusched.exe
O4 - HKLM\..\Run: [!AVG Anti-Spyware] "C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\avgas.exe" /minimized
O4 - HKLM\..\Run: [AVP] "C:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 6.0 SOS\avp.exe"
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
O4 - HKCU\..\Run: [Aim6] "C:\Program Files\AIM6\aim6.exe" /d locale=en-US ee://aol/imApp
O4 - HKUS\S-1-5-19\..\Run: [TaskSwitchXP] C:\Program Files\TaskSwitchXP\TaskSwitchXP.exe (User 'LOCAL SERVICE')
O4 - HKUS\S-1-5-19\..\Run: [Free Download Manager] C:\Program Files\Free Download Manager\fdm.exe -autorun (User 'LOCAL SERVICE')
O4 - HKUS\S-1-5-19\..\RunOnce: [nlsf] cmd.exe /C move /Y "%SystemRoot%\System32\syssetub.dll" "%SystemRoot%\System32\syssetup.dll" (User 'LOCAL SERVICE')
O4 - HKUS\S-1-5-20\..\Run: [TaskSwitchXP] C:\Program Files\TaskSwitchXP\TaskSwitchXP.exe (User 'NETWORK SERVICE')
O4 - HKUS\S-1-5-20\..\RunOnce: [nlsf] cmd.exe /C move /Y "%SystemRoot%\System32\syssetub.dll" "%SystemRoot%\System32\syssetup.dll" (User 'NETWORK SERVICE')
O4 - HKUS\S-1-5-18\..\Run: [TaskSwitchXP] C:\Program Files\TaskSwitchXP\TaskSwitchXP.exe (User 'SYSTEM')
O4 - HKUS\S-1-5-18\..\RunOnce: [nlsf] cmd.exe /C move /Y "%SystemRoot%\System32\syssetub.dll" "%SystemRoot%\System32\syssetup.dll" (User 'SYSTEM')
O4 - HKUS\.DEFAULT\..\Run: [TaskSwitchXP] C:\Program Files\TaskSwitchXP\TaskSwitchXP.exe (User 'Default user')
O4 - HKUS\.DEFAULT\..\RunOnce: [nlsf] cmd.exe /C move /Y "%SystemRoot%\System32\syssetub.dll" "%SystemRoot%\System32\syssetup.dll" (User 'Default user')
O4 - Startup: Adobe Gamma.lnk = C:\Program Files\Common Files\Adobe\Calibration\Adobe Gamma Loader.exe
O4 - Global Startup: Intellex Event Handler.lnk = C:\Program Files\Sensormatic\NetworkClient\Bin\NtlxEventhandler.exe
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~1\OFFICE11\EXCEL.EXE/3000
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_05\bin\npjpi150_05.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_05\bin\npjpi150_05.dll
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~1\OFFICE11\REFIEBAR.DLL
O9 - Extra button: (no name) - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O9 - Extra 'Tools' menuitem: Spybot - Search & Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O10 - Unknown file in Winsock LSP: c:\windows\system32\nwprovau.dll
O16 - DPF: {0EB0E74A-2A76-4AB3-A7FB-9BD8C29F7F75} (CKAVWebScan Object) - http://www.kaspersky.com/kos/english/kavwebscan_unicode.cab
O17 - HKLM\System\CCS\Services\Tcpip\..\{E32F903F-C483-47E3-A48F-C3AA67460FC8}: NameServer = 66.174.95.44 66.174.92.14
O23 - Service: Adobe LM Service - Adobe Systems - C:\Program Files\Common Files\Adobe Systems Shared\Service\Adobelmsvc.exe
O23 - Service: AVG Anti-Spyware Guard - GRISOFT s.r.o. - C:\Program Files\Grisoft\AVG Anti-Spyware 7.5\guard.exe
O23 - Service: Kaspersky Anti-Virus 6.0 (AVP) - Kaspersky Lab - C:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 6.0 SOS\avp.exe
O23 - Service: Indexing Service (CiSvc) - Unknown owner - C:\WINDOWS\system32\cisvc.exe (file missing)
O23 - Service: Dynex DX-WGDTC Service (Dynex DX-WGDTC WLService) - Unknown owner - C:\Program Files\Dynex Wireless G Adapter\WLService.exe
--
End of file - 5968 bytes
Hi
Delete this folder:
C:\WINDOWS\sv3965\
Empty these folders:
C:\Documents and Settings\Administrator\.housecall6.6\Quarantine
C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy\Recovery\
C:\QooBox\Quarantine
Empty Recycle Bin.
All other viruses are in system restore and inactive.
I give you later instructions how to empty it.
Other than that, any problems left?
illumn8r
2008-02-01, 18:33
Ok, done, there is also a folder C:\WINDOWS\sv3964\
I assume I don't touch that?
Everything seems ok, when I went to get Kaspersy Online I apparently got a trial version of SOS 1st, is it ok now to run that or AVG (only using one installed of course).
Thanks for all of your help. Anything left for me to do? Empty System Restore?
Dave
Hi
"Ok, done, there is also a folder C:\WINDOWS\sv3964\
I assume I don't touch that?"
Delete that as well, it's bad for sure.
Any other C:\WINDOWS\sv396 folders?
"Everything seems ok, when I went to get Kaspersy Online I apparently got a trial version of SOS 1st, is it ok now to run that or AVG (only using one installed of course)."
You have AVG anti-spyware installed, not antivirus. You can run those two together.
illumn8r
2008-02-01, 19:20
Ok, deleted that as well. No other sv96 folders in C:\WINDOWS\
I have AVG Anti-Virus as well, I uninstalled it when I got the Kaspersky to avoid conflicts. So I guess that's it :-) Thanks again for all of your help.
Dave
Hi
Well as KAV is trial you can install AVG back if you remove KAV.
Any other issues?
illumn8r
2008-02-01, 20:05
No more issues that I can see. If anything pops up that I can't handle I will certainly post again.
Thanks for the great work :-)
Dave
Hi
Then you're clean!
Now that you are clean, please follow these simple steps in order to keep your computer clean and secure:
Looking over your log, it seems you don't have any evidence of a third party firewall.
As the term conveys, a firewall is an extra layer of security installed onto computers, which restricts access to systems from the outside world. Firewalls protect against hackers and malicious intruders. I want you to download a free firewall NOW from one of these excellent vendors:
1) Comodo (http://www.personalfirewall.comodo.com/)
2) Online Armor (http://www.tallemu.com/online_armor_free.html)
3) Sunbelt/Kerio (http://www.sunbelt-software.com/Kerio-Download.cfm)
4) Agnitum (http://www.agnitum.com/products/outpostfree/download.php)
5) ZoneAlarm (http://www.zonelabs.com/store/content/catalog/products/sku_list_za.jsp?dc=12bms&ctry=US&lang=en&lid=nav_za) (uncheck ZoneAlarm Spy Blocker during installation if you choose this one)
If you are using the built-in Windows XP firewall, it is not recommended as it does not block outgoing connections. This means that any malware on your computer is free to "phone home" for more instructions. Simply put, Windows XP contains a mediocre firewall. This firewall is NO replacement for a dedicated software solution. Remember to use only one firewall at the same time.
Your Java is out of date. Older versions have vulnerabilities that malware can use to infect your system. A malicious site could render Java content under older, vulnerable versions of Sun's software if the user has not removed them. Please follow these steps to remove older version Java components and update: Download the latest version of Java Runtime Environment (JRE) 6 Update 4 (http://java.sun.com/javase/downloads/index.jsp) and save it to your desktop.
Scroll down to where it saysThe J2SE Runtime Environment (JRE) allows end-users to run Java applications.
Click the Download button to the right.
Select Windows on platform combobox and check the box that says:
Accept License Agreement. Click continue.
The page will refresh.
Click on the link to download Windows Offline Installation with or without Multi-language and save to your desktop.
Close any programs you may have running - especially your web browser.
Go to Start > Settings > Control Panel, double-click on Add/Remove Programs and remove all older versions of Java.
Check (highlight) any item with Java Runtime Environment (JRE or J2SE) in the name.
Click the Remove or Change/Remove button.
Repeat as many times as necessary to remove each Java versions.
Reboot your computer once all Java components are removed.
Then from your desktop double-click on jre-6u4-windows-i586-p.exe to install the newest version.
Next we remove all used tools.
Please download OTMoveIt2 (http://download.bleepingcomputer.com/oldtimer/OTMoveIt2.exe) and save it to desktop.
Double-click OTMoveIt2.exe.
Click the CleanUp! button.
Select Yes when the "Begin cleanup Process?" prompt appears.
If you are prompted to Reboot during the cleanup, select Yes.
The tool will delete itself once it finishes, if not delete it by yourself.
Note: If you receive a warning from your firewall or other security programs regarding OTMoveIt2 attempting to contact the internet, please allow it to do so.
Disable and Enable System Restore. - If you are using Windows XP then you should disable and re-enable system restore to make sure there are no infected files found in a restore point.
You can find instructions on how to enable and re-enable system restore here:
Windows XP System Restore Guide (http://www.bleepingcomputer.com/forums/tutorial56.html)
Re-enable system restore with instructions from tutorial above
Make your Internet Explorer more secure - This can be done by following these simple instructions:
From within Internet Explorer click on the Tools menu and then click on Options.
Click once on the Security tab
Click once on the Internet icon so it becomes highlighted.
Click once on the Custom Level button.
Change the Download signed ActiveX controls to Prompt
Change the Download unsigned ActiveX controls to Disable
Change the Initialize and script ActiveX controls not marked as safe to Disable
Change the Installation of desktop items to Prompt
Change the Launching programs and files in an IFRAME to Prompt
Change the Navigate sub-frames across different domains to Prompt
When all these settings have been made, click on the OK button.
If it prompts you as to whether or not you want to save the settings, press the Yes button.
Next press the Apply button and then the OK to exit the Internet Properties page.
Update your AntiVirus Software - It is imperitive that you update your Antivirus software at least once a week (Even more if you wish). If you do not update your antivirus software then it will not be able to catch any of the new variants that may come out.
Visit Microsoft's Windows Update Site Frequently - It is important that you visit http://www.windowsupdate.com (http://www.windowsupdate.com) regularly. This will ensure your computer has always the latest security updates available installed on your computer. If there are new updates to install, install them immediately, reboot your computer, and revisit the site until there are no more critical updates.
Install SpywareBlaster - SpywareBlaster will added a large list of programs and sites into your Internet Explorer settings that will protect you from running and downloading known malicious programs.
A tutorial on installing & using this product can be found here:
Using SpywareBlaster to protect your computer from Spyware and Malware (http://www.bleepingcomputer.com/tutorials/tutorial49.html)
Update all these programs regularly - Make sure you update all the programs I have listed regularly. Without regular updates you WILL NOT be protected when new malicious programs are released.
Follow this list and your potential for being infected again will reduce dramatically.
Here are some additional utilities that will enhance your safety
MVPS Hosts file (http://mvps.org/winhelp2002/hosts.htm) <= The MVPS Hosts file replaces your current HOSTS file with one containing well know ad sites etc. Basically, this prevents your computer from connecting to those sites by redirecting them to 127.0.0.1 which is your local computer
Google Toolbar (http://toolbar.google.com/) <= Get the free google toolbar to help stop pop up windows.
Comodo BOCLEAN (http://www.comodo.com/boclean/boclean.html) <= Stop identity thieves from getting personal information. Instantly detects well over 1,000,000 unique, variant and repack malware in total. And it's free.
Winpatrol (http://www.winpatrol.com/) <= Download and install the free version of Winpatrol. a tutorial for this product is located here:
Using Winpatrol to protect your computer from malicious software (http://www.winpatrol.com/features.html)
Stand Up and Be Counted ---> Malware Complaints (http://www.malwarecomplaints.info/index.php) <--- where you can make difference!
The site offers people who have been (or are) victims of malware the opportunity to document their story and, in that way, launch a complaint against the malware and the makers of the malware.
Also, please read this great article by Tony Klein So How Did I Get Infected In First Place (http://castlecops.com/postlite7736-.html)
Happy surfing and stay clean! :bigthumb:
Since this issue appears resolved ... this Topic is closed. Glad I could help.
If you need this topic reopened, please request this by sending the moderating team
a PM with the address of the thread. This applies only to the original topic starter.
Everyone else please begin a New Topic.